Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(92)

Side by Side Diff: net/third_party/nss/README.chromium

Issue 14522022: Update NSS libSSL to NSS_3_15_BETA2. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Sync README.chromium Created 7 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 Name: Network Security Services (NSS) 1 Name: Network Security Services (NSS)
2 URL: http://www.mozilla.org/projects/security/pki/nss/ 2 URL: http://www.mozilla.org/projects/security/pki/nss/
3 Version: 3.14 3 Version: 3.15 Beta 2
4 Security Critical: Yes 4 Security Critical: Yes
5 License: MPL 2 5 License: MPL 2
6 License File: NOT_SHIPPED 6 License File: NOT_SHIPPED
7 7
8 This directory includes a copy of NSS's libssl from the CVS repo at: 8 This directory includes a copy of NSS's libssl from the hg repo at:
9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot 9 https://hg.mozilla.org/projects/nss
10 10
11 The same module appears in crypto/third_party/nss (and third_party/nss on some 11 The same module appears in crypto/third_party/nss (and third_party/nss on some
12 platforms), so we don't repeat the license file here. 12 platforms), so we don't repeat the license file here.
13 13
14 The snapshot was updated to the CVS tag: NSS_3_14_RTM 14 The snapshot was updated to the hg tag: NSS_3_15_BETA2
15 15
16 Patches: 16 Patches:
17 17
18 * Commenting out a couple of functions because they need NSS symbols 18 * Commenting out a couple of functions because they need NSS symbols
19 which may not exist in the system NSS library. 19 which may not exist in the system NSS library.
20 patches/versionskew.patch 20 patches/versionskew.patch
21 21
22 * Send empty renegotiation info extension instead of SCSV unless TLS is 22 * Send empty renegotiation info extension instead of SCSV unless TLS is
23 disabled. 23 disabled.
24 patches/renegoscsv.patch 24 patches/renegoscsv.patch
25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042
26 26
27 * Cache the peer's intermediate CA certificates in session ID, so that 27 * Cache the peer's intermediate CA certificates in session ID, so that
28 they're available when we resume a session. 28 they're available when we resume a session.
29 patches/cachecerts.patch 29 patches/cachecerts.patch
30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478
31 31
32 * Add the SSL_PeerCertificateChain function 32 * Add the SSL_PeerCertificateChain function
33 patches/peercertchain.patch 33 patches/peercertchain.patch
34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485
35 35
36 * Add OCSP stapling support
37 patches/ocspstapling.patch
38 https://bugzilla.mozilla.org/show_bug.cgi?id=360420
39
40 * Add support for client auth with native crypto APIs on Mac and Windows 36 * Add support for client auth with native crypto APIs on Mac and Windows
41 patches/clientauth.patch 37 patches/clientauth.patch
42 ssl/sslplatf.c 38 ssl/sslplatf.c
43 39
44 * Add a function to export whether the last handshake on a socket resumed a 40 * Add a function to export whether the last handshake on a socket resumed a
45 previous session. 41 previous session.
46 patches/didhandshakeresume.patch 42 patches/didhandshakeresume.patch
47 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 43 https://bugzilla.mozilla.org/show_bug.cgi?id=731798
48 44
49 * Add a function to restart a handshake after a client certificate request.
50 patches/restartclientauth.patch
51
52 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake 45 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake
53 is finished. 46 is finished.
54 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 47 https://bugzilla.mozilla.org/show_bug.cgi?id=681839
55 patches/negotiatedextension.patch 48 patches/negotiatedextension.patch
56 49
57 * Add function to retrieve TLS client cert types requested by server. 50 * Add function to retrieve TLS client cert types requested by server.
58 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 51 https://bugzilla.mozilla.org/show_bug.cgi?id=51413
59 patches/getrequestedclientcerttypes.patch 52 patches/getrequestedclientcerttypes.patch
60 53
61 * Enable False Start only when the server supports forward secrecy. 54 * Add a function to restart a handshake after a client certificate request.
62 patches/falsestartnpn.patch 55 patches/restartclientauth.patch
63 https://bugzilla.mozilla.org/show_bug.cgi?id=810582
64 https://bugzilla.mozilla.org/show_bug.cgi?id=810583
65 56
66 * Add support for TLS Channel IDs 57 * Add support for TLS Channel IDs
67 patches/channelid.patch 58 patches/channelid.patch
68 59
69 * Add support for extracting the tls-unique channel binding value 60 * Add support for extracting the tls-unique channel binding value
70 patches/tlsunique.patch 61 patches/tlsunique.patch
71 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 62 https://bugzilla.mozilla.org/show_bug.cgi?id=563276
72 63
73 * Don't crash when the SSL keylog file cannot be opened.
74 patches/sslkeylogerror.patch
75 https://bugzilla.mozilla.org/show_bug.cgi?id=810579
76
77 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro 64 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro
78 definition was moved from the internal header ec.h to blapit.h. When 65 definition was moved from the internal header ec.h to blapit.h. When
79 compiling against older system NSS headers, we need to define the macro. 66 compiling against older system NSS headers, we need to define the macro.
80 patches/ecpointform.patch 67 patches/ecpointform.patch
81 68
82 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. 69 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock.
83 This change was made in https://chromiumcodereview.appspot.com/10454066. 70 This change was made in https://chromiumcodereview.appspot.com/10454066.
84 patches/secretexporterlocks.patch 71 patches/secretexporterlocks.patch
85 72
86 * Implement CBC processing in constant-time to address the "Lucky Thirteen" 73 * Allow the constant-time CBC processing code to be compiled against older
87 attack. 74 NSS that doesn't contain the CBC constant-time changes.
88 patches/cbc.patch 75 patches/cbc.patch
89 https://bugzilla.mozilla.org/show_bug.cgi?id=822365 76 https://code.google.com/p/chromium/issues/detail?id=172658#c12
90
91 * Fix a crash in dtls_FreeHandshakeMessages.
92 patches/dtlsinitclist.patch
93 https://bugzilla.mozilla.org/show_bug.cgi?id=822433 (fixed in NSS 3.14.2)
94 77
95 * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it. 78 * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it.
96 Remove this patch when all system NSS packages are NSS 3.12.10 or later. 79 Remove this patch when all system NSS packages are NSS 3.12.10 or later.
97 patches/aes256keylength.patch 80 patches/aes256keylength.patch
98 81
82 * Change ssl3_SuiteBOnly to always return PR_TRUE. The softoken in NSS
83 versions older than 3.15 report an incorrect EC key size range. Remove
84 this patch when all system NSS softoken packages are NSS 3.15 or later.
85 patches/suitebonly.patch
Ryan Sleevi 2013/05/01 19:06:08 Could you explain this more (if not here, then jus
wtc 2013/05/01 21:52:16 Done. I added an explanation to the README.chromiu
86
87 * Define the SECItemArray type and declare the SECItemArray handling
88 functions, which were added in NSS 3.15. Remove this patch when all system
89 NSS packages are NSS 3.15 or later.
90 patches/secitemarray.patch
91
92 * Remove unused variables in ssl3_SendCertificateStatus.
93 patches/unusedvariables.patch
94 https://bugzilla.mozilla.org/show_bug.cgi?id=866949
95
99 Apply the patches to NSS by running the patches/applypatches.sh script. Read 96 Apply the patches to NSS by running the patches/applypatches.sh script. Read
100 the comments at the top of patches/applypatches.sh for instructions. 97 the comments at the top of patches/applypatches.sh for instructions.
101 98
102 The ssl/bodge directory contains files taken from the NSS repo that we required 99 The ssl/bodge directory contains files taken from the NSS repo that we required
103 for building libssl outside of its usual build environment. 100 for building libssl outside of its usual build environment.
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698