Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(330)

Side by Side Diff: third_party/tlslite/README.chromium

Issue 92443002: Extract Certificate Transparency SCTs from stapled OCSP responses (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@extract_scts
Patch Set: Fix C++11 compile error Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/tools/testserver/testserver.py ('k') | third_party/tlslite/patches/status_request.patch » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Name: tlslite 1 Name: tlslite
2 URL: http://trevp.net/tlslite/ 2 URL: http://trevp.net/tlslite/
3 Version: 0.3.8 3 Version: 0.3.8
4 Security Critical: No 4 Security Critical: No
5 License: Public domain 5 License: Public domain
6 6
7 Local Modifications: 7 Local Modifications:
8 8
9 - patches/close_notify.patch: tlslite/TLSRecordLayer.py was changed to force 9 - patches/close_notify.patch: tlslite/TLSRecordLayer.py was changed to force
10 the socket to be closed when the SSL connection is closed. This is is 10 the socket to be closed when the SSL connection is closed. This is is
(...skipping 20 matching lines...) Expand all
31 - patches/parse_chain.patch: tlslite/X509CertChain.py and tlslite/X509.py were 31 - patches/parse_chain.patch: tlslite/X509CertChain.py and tlslite/X509.py were
32 updated to add a parseChain method, that can parse multiple certificates from 32 updated to add a parseChain method, that can parse multiple certificates from
33 a PEM string. 33 a PEM string.
34 - patches/tls_intolerant.patch: allow TLSLite to simulate a TLS-intolerant serve r. 34 - patches/tls_intolerant.patch: allow TLSLite to simulate a TLS-intolerant serve r.
35 - patches/channel_id.patch: add basic ChannelID support. (Signatures are not 35 - patches/channel_id.patch: add basic ChannelID support. (Signatures are not
36 checked.) 36 checked.)
37 - patches/signed_certificate_timestamps.patch: add support for sending Signed 37 - patches/signed_certificate_timestamps.patch: add support for sending Signed
38 Certificate Timestamps over a TLS extension. 38 Certificate Timestamps over a TLS extension.
39 - patches/fallback_scsv.patch: add support for TLS_FALLBACK_SCSV. See 39 - patches/fallback_scsv.patch: add support for TLS_FALLBACK_SCSV. See
40 https://tools.ietf.org/html/draft-bmoeller-tls-downgrade-scsv-01 40 https://tools.ietf.org/html/draft-bmoeller-tls-downgrade-scsv-01
41 - patches/status_request.patch: add support for sending stapled OCSP responses.
OLDNEW
« no previous file with comments | « net/tools/testserver/testserver.py ('k') | third_party/tlslite/patches/status_request.patch » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698