| OLD | NEW |
| 1 Name: Network Security Services (NSS) | 1 Name: Network Security Services (NSS) |
| 2 URL: http://www.mozilla.org/projects/security/pki/nss/ | 2 URL: http://www.mozilla.org/projects/security/pki/nss/ |
| 3 Version: 3.23 RTM | 3 Version: 3.23 RTM |
| 4 Security Critical: Yes | 4 Security Critical: Yes |
| 5 License: MPL 2 | 5 License: MPL 2 |
| 6 License File: NOT_SHIPPED | 6 License File: LICENSE |
| 7 | 7 |
| 8 This directory includes a copy of NSS's libssl from the hg repo at: | 8 This directory includes a file from NSS's libssl from the hg repo at: |
| 9 https://hg.mozilla.org/projects/nss | 9 https://hg.mozilla.org/projects/nss |
| 10 | 10 |
| 11 The same module appears in crypto/third_party/nss (and third_party/nss on some | |
| 12 platforms), so we don't repeat the license file here. | |
| 13 | |
| 14 The snapshot was updated to the hg tag: NSS_3_23_RTM | 11 The snapshot was updated to the hg tag: NSS_3_23_RTM |
| 15 | |
| 16 Patches: | |
| 17 | |
| 18 * Cache the peer's intermediate CA certificates in session ID, so that | |
| 19 they're available when we resume a session. | |
| 20 patches/cachecerts.patch | |
| 21 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 | |
| 22 | |
| 23 * Add a function to export whether the last handshake on a socket resumed a | |
| 24 previous session. | |
| 25 patches/didhandshakeresume.patch | |
| 26 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 | |
| 27 | |
| 28 * Add function to retrieve TLS client cert types requested by server. | |
| 29 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 | |
| 30 patches/getrequestedclientcerttypes.patch | |
| 31 | |
| 32 * Add a function to restart a handshake after a client certificate request. | |
| 33 patches/restartclientauth.patch | |
| 34 | |
| 35 * Add support for TLS Channel IDs | |
| 36 patches/channelid.patch | |
| 37 | |
| 38 * Add support for extracting the tls-unique channel binding value | |
| 39 patches/tlsunique.patch | |
| 40 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 | |
| 41 | |
| 42 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. | |
| 43 This change was made in https://chromiumcodereview.appspot.com/10454066. | |
| 44 patches/secretexporterlocks.patch | |
| 45 | |
| 46 * Fix session cache lock creation race. | |
| 47 patches/cachelocks.patch | |
| 48 https://bugzilla.mozilla.org/show_bug.cgi?id=764646 | |
| 49 | |
| 50 * Add a function to allow the cipher suites preference order to be set. | |
| 51 patches/cipherorder.patch | |
| 52 | |
| 53 * Add explicit functions for managing the SSL/TLS session cache. | |
| 54 This is a temporary workaround until Chromium migrates to NSS's | |
| 55 asynchronous certificate verification. | |
| 56 patches/sessioncache.patch | |
| 57 | |
| 58 * Add a comment explaining why signature_algorithms extension should be at | |
| 59 the end of the extension list. This works around a bug in WebSphere | |
| 60 Application Server 7.0, which is intolerant to the final extension having | |
| 61 zero length. This also ensures that the padding extension has non-zero | |
| 62 length. | |
| 63 patches/reorderextensions.patch | |
| 64 | |
| 65 * Fix an unused method when disabling PKCS#11 bypass mode | |
| 66 patches/nobypass.patch | |
| 67 | |
| 68 Apply the patches to NSS by running the patches/applypatches.sh script. Read | |
| 69 the comments at the top of patches/applypatches.sh for instructions. | |
| 70 | |
| OLD | NEW |