OLD | NEW |
---|---|
1 Name: Network Security Services (NSS) | 1 Name: Network Security Services (NSS) |
2 URL: http://www.mozilla.org/projects/security/pki/nss/ | 2 URL: http://www.mozilla.org/projects/security/pki/nss/ |
3 Version: 3.14 | 3 Version: 3.15 Beta 2 |
4 Security Critical: Yes | 4 Security Critical: Yes |
5 License: MPL 2 | 5 License: MPL 2 |
6 License File: NOT_SHIPPED | 6 License File: NOT_SHIPPED |
7 | 7 |
8 This directory includes a copy of NSS's libssl from the CVS repo at: | 8 This directory includes a copy of NSS's libssl from the hg repo at: |
9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot | 9 https://hg.mozilla.org/projects/nss |
10 | 10 |
11 The same module appears in crypto/third_party/nss (and third_party/nss on some | 11 The same module appears in crypto/third_party/nss (and third_party/nss on some |
12 platforms), so we don't repeat the license file here. | 12 platforms), so we don't repeat the license file here. |
13 | 13 |
14 The snapshot was updated to the CVS tag: NSS_3_14_RTM | 14 The snapshot was updated to the hg tag: NSS_3_15_BETA2 |
15 | 15 |
16 Patches: | 16 Patches: |
17 | 17 |
18 * Commenting out a couple of functions because they need NSS symbols | 18 * Commenting out a couple of functions because they need NSS symbols |
19 which may not exist in the system NSS library. | 19 which may not exist in the system NSS library. |
20 patches/versionskew.patch | 20 patches/versionskew.patch |
21 | 21 |
22 * Send empty renegotiation info extension instead of SCSV unless TLS is | 22 * Send empty renegotiation info extension instead of SCSV unless TLS is |
23 disabled. | 23 disabled. |
24 patches/renegoscsv.patch | 24 patches/renegoscsv.patch |
25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 | 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 |
26 | 26 |
27 * Cache the peer's intermediate CA certificates in session ID, so that | 27 * Cache the peer's intermediate CA certificates in session ID, so that |
28 they're available when we resume a session. | 28 they're available when we resume a session. |
29 patches/cachecerts.patch | 29 patches/cachecerts.patch |
30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 | 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 |
31 | 31 |
32 * Add the SSL_PeerCertificateChain function | 32 * Add the SSL_PeerCertificateChain function |
33 patches/peercertchain.patch | 33 patches/peercertchain.patch |
34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 | 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 |
35 | 35 |
36 * Add OCSP stapling support | |
37 patches/ocspstapling.patch | |
38 https://bugzilla.mozilla.org/show_bug.cgi?id=360420 | |
39 | |
40 * Add support for client auth with native crypto APIs on Mac and Windows | 36 * Add support for client auth with native crypto APIs on Mac and Windows |
41 patches/clientauth.patch | 37 patches/clientauth.patch |
42 ssl/sslplatf.c | 38 ssl/sslplatf.c |
43 | 39 |
44 * Add a function to export whether the last handshake on a socket resumed a | 40 * Add a function to export whether the last handshake on a socket resumed a |
45 previous session. | 41 previous session. |
46 patches/didhandshakeresume.patch | 42 patches/didhandshakeresume.patch |
47 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 | 43 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 |
48 | 44 |
49 * Add a function to restart a handshake after a client certificate request. | |
50 patches/restartclientauth.patch | |
51 | |
52 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake | 45 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake |
53 is finished. | 46 is finished. |
54 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 | 47 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 |
55 patches/negotiatedextension.patch | 48 patches/negotiatedextension.patch |
56 | 49 |
57 * Add function to retrieve TLS client cert types requested by server. | 50 * Add function to retrieve TLS client cert types requested by server. |
58 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 | 51 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 |
59 patches/getrequestedclientcerttypes.patch | 52 patches/getrequestedclientcerttypes.patch |
60 | 53 |
61 * Enable False Start only when the server supports forward secrecy. | 54 * Add a function to restart a handshake after a client certificate request. |
62 patches/falsestartnpn.patch | 55 patches/restartclientauth.patch |
63 https://bugzilla.mozilla.org/show_bug.cgi?id=810582 | |
64 https://bugzilla.mozilla.org/show_bug.cgi?id=810583 | |
65 | 56 |
66 * Add support for TLS Channel IDs | 57 * Add support for TLS Channel IDs |
67 patches/channelid.patch | 58 patches/channelid.patch |
68 | 59 |
69 * Add support for extracting the tls-unique channel binding value | 60 * Add support for extracting the tls-unique channel binding value |
70 patches/tlsunique.patch | 61 patches/tlsunique.patch |
71 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 | 62 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 |
72 | 63 |
73 * Don't crash when the SSL keylog file cannot be opened. | |
74 patches/sslkeylogerror.patch | |
75 https://bugzilla.mozilla.org/show_bug.cgi?id=810579 | |
76 | |
77 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro | 64 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro |
78 definition was moved from the internal header ec.h to blapit.h. When | 65 definition was moved from the internal header ec.h to blapit.h. When |
79 compiling against older system NSS headers, we need to define the macro. | 66 compiling against older system NSS headers, we need to define the macro. |
80 patches/ecpointform.patch | 67 patches/ecpointform.patch |
81 | 68 |
82 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. | 69 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. |
83 This change was made in https://chromiumcodereview.appspot.com/10454066. | 70 This change was made in https://chromiumcodereview.appspot.com/10454066. |
84 patches/secretexporterlocks.patch | 71 patches/secretexporterlocks.patch |
85 | 72 |
86 * Implement CBC processing in constant-time to address the "Lucky Thirteen" | 73 * Allow the constant-time CBC processing code to be compiled against older |
87 attack. | 74 NSS that doesn't contain the CBC constant-time changes. |
88 patches/cbc.patch | 75 patches/cbc.patch |
89 https://bugzilla.mozilla.org/show_bug.cgi?id=822365 | 76 https://code.google.com/p/chromium/issues/detail?id=172658#c12 |
90 | |
91 * Fix a crash in dtls_FreeHandshakeMessages. | |
92 patches/dtlsinitclist.patch | |
93 https://bugzilla.mozilla.org/show_bug.cgi?id=822433 (fixed in NSS 3.14.2) | |
94 | 77 |
95 * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it. | 78 * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it. |
96 Remove this patch when all system NSS packages are NSS 3.12.10 or later. | 79 Remove this patch when all system NSS packages are NSS 3.12.10 or later. |
97 patches/aes256keylength.patch | 80 patches/aes256keylength.patch |
98 | 81 |
82 * Change ssl3_SuiteBOnly to always return PR_TRUE. The softoken in NSS | |
83 versions older than 3.15 report an incorrect EC key size range. Remove | |
84 this patch when all system NSS softoken packages are NSS 3.15 or later. | |
85 patches/suitebonly.patch | |
Ryan Sleevi
2013/05/01 19:06:08
Could you explain this more (if not here, then jus
wtc
2013/05/01 21:52:16
Done. I added an explanation to the README.chromiu
| |
86 | |
87 * Define the SECItemArray type and declare the SECItemArray handling | |
88 functions, which were added in NSS 3.15. Remove this patch when all system | |
89 NSS packages are NSS 3.15 or later. | |
90 patches/secitemarray.patch | |
91 | |
92 * Remove unused variables in ssl3_SendCertificateStatus. | |
93 patches/unusedvariables.patch | |
94 https://bugzilla.mozilla.org/show_bug.cgi?id=866949 | |
95 | |
99 Apply the patches to NSS by running the patches/applypatches.sh script. Read | 96 Apply the patches to NSS by running the patches/applypatches.sh script. Read |
100 the comments at the top of patches/applypatches.sh for instructions. | 97 the comments at the top of patches/applypatches.sh for instructions. |
101 | 98 |
102 The ssl/bodge directory contains files taken from the NSS repo that we required | 99 The ssl/bodge directory contains files taken from the NSS repo that we required |
103 for building libssl outside of its usual build environment. | 100 for building libssl outside of its usual build environment. |
OLD | NEW |