Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(307)

Side by Side Diff: net/third_party/nss/README.chromium

Issue 10836273: Replace hardcoded ssl_variant_stream with ss->protocolVariant. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Name: Network Security Services (NSS) 1 Name: Network Security Services (NSS)
2 URL: http://www.mozilla.org/projects/security/pki/nss/ 2 URL: http://www.mozilla.org/projects/security/pki/nss/
3 Version: 3.13.4 pre-release snapshot 20120319 3 Version: 3.13.4 pre-release snapshot 20120319
4 Security Critical: Yes 4 Security Critical: Yes
5 License: MPL 1.1/GPL 2.0/LGPL 2.1 5 License: MPL 1.1/GPL 2.0/LGPL 2.1
6 License FILE: NOT_SHIPPED 6 License FILE: NOT_SHIPPED
7 7
8 This directory includes a copy of NSS's libssl from the CVS repo at: 8 This directory includes a copy of NSS's libssl from the CVS repo at:
9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot 9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot
10 10
(...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after
83 instead of crSpec to support False Start. 83 instead of crSpec to support False Start.
84 https://bugzilla.mozilla.org/show_bug.cgi?id=766137 84 https://bugzilla.mozilla.org/show_bug.cgi?id=766137
85 patches/getchannelinfo.patch 85 patches/getchannelinfo.patch
86 86
87 * Add support for extracting the tls-unique channel binding value 87 * Add support for extracting the tls-unique channel binding value
88 patches/tlsunique.patch 88 patches/tlsunique.patch
89 89
90 * Don't crash when the SSL keylog file cannot be opened. 90 * Don't crash when the SSL keylog file cannot be opened.
91 patches/sslkeylogerror.patch 91 patches/sslkeylogerror.patch
92 92
93 * Sets the record layer version number of ClientHello to at most TLS 1.0 93 * Set the record layer version number of ClientHello to at most TLS 1.0
94 if we don't know what protocol version the server supports. 94 if we don't know what protocol version the server supports.
95 https://bugzilla.mozilla.org/show_bug.cgi?id=774547 95 https://bugzilla.mozilla.org/show_bug.cgi?id=774547
96 patches/recordlayerversion.patch 96 patches/recordlayerversion.patch
97 97
98 * Replace hardcoded ssl_variant_stream by ss->protocolVariant.
99 https://bugzilla.mozilla.org/show_bug.cgi?id=681065
100 patches/sslprotocolvariant.patch
101
98 Apply the patches to NSS by running the patches/applypatches.sh script. Read 102 Apply the patches to NSS by running the patches/applypatches.sh script. Read
99 the comments at the top of patches/applypatches.sh for instructions. 103 the comments at the top of patches/applypatches.sh for instructions.
100 104
101 The ssl/bodge directory contains files taken from the NSS repo that we required 105 The ssl/bodge directory contains files taken from the NSS repo that we required
102 for building libssl outside of its usual build environment. 106 for building libssl outside of its usual build environment.
OLDNEW
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698