| OLD | NEW |
| 1 Name: Network Security Services (NSS) | 1 Name: Network Security Services (NSS) |
| 2 URL: http://www.mozilla.org/projects/security/pki/nss/ | 2 URL: http://www.mozilla.org/projects/security/pki/nss/ |
| 3 Version: 3.14 | 3 Version: 3.15 Beta 2 |
| 4 Security Critical: Yes | 4 Security Critical: Yes |
| 5 License: MPL 2 | 5 License: MPL 2 |
| 6 License File: NOT_SHIPPED | 6 License File: NOT_SHIPPED |
| 7 | 7 |
| 8 This directory includes a copy of NSS's libssl from the CVS repo at: | 8 This directory includes a copy of NSS's libssl from the hg repo at: |
| 9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot | 9 https://hg.mozilla.org/projects/nss |
| 10 | 10 |
| 11 The same module appears in crypto/third_party/nss (and third_party/nss on some | 11 The same module appears in crypto/third_party/nss (and third_party/nss on some |
| 12 platforms), so we don't repeat the license file here. | 12 platforms), so we don't repeat the license file here. |
| 13 | 13 |
| 14 The snapshot was updated to the CVS tag: NSS_3_14_RTM | 14 The snapshot was updated to the hg tag: NSS_3_15_BETA2 |
| 15 | 15 |
| 16 Patches: | 16 Patches: |
| 17 | 17 |
| 18 * Commenting out a couple of functions because they need NSS symbols | 18 * Commenting out a couple of functions because they need NSS symbols |
| 19 which may not exist in the system NSS library. | 19 which may not exist in the system NSS library. |
| 20 patches/versionskew.patch | 20 patches/versionskew.patch |
| 21 | 21 |
| 22 * Send empty renegotiation info extension instead of SCSV unless TLS is | 22 * Send empty renegotiation info extension instead of SCSV unless TLS is |
| 23 disabled. | 23 disabled. |
| 24 patches/renegoscsv.patch | 24 patches/renegoscsv.patch |
| 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 | 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 |
| 26 | 26 |
| 27 * Cache the peer's intermediate CA certificates in session ID, so that | 27 * Cache the peer's intermediate CA certificates in session ID, so that |
| 28 they're available when we resume a session. | 28 they're available when we resume a session. |
| 29 patches/cachecerts.patch | 29 patches/cachecerts.patch |
| 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 | 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 |
| 31 | 31 |
| 32 * Add the SSL_PeerCertificateChain function | 32 * Add the SSL_PeerCertificateChain function |
| 33 patches/peercertchain.patch | 33 patches/peercertchain.patch |
| 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 | 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 |
| 35 | 35 |
| 36 * Add OCSP stapling support | |
| 37 patches/ocspstapling.patch | |
| 38 https://bugzilla.mozilla.org/show_bug.cgi?id=360420 | |
| 39 | |
| 40 * Add support for client auth with native crypto APIs on Mac and Windows | 36 * Add support for client auth with native crypto APIs on Mac and Windows |
| 41 patches/clientauth.patch | 37 patches/clientauth.patch |
| 42 ssl/sslplatf.c | 38 ssl/sslplatf.c |
| 43 | 39 |
| 44 * Add a function to export whether the last handshake on a socket resumed a | 40 * Add a function to export whether the last handshake on a socket resumed a |
| 45 previous session. | 41 previous session. |
| 46 patches/didhandshakeresume.patch | 42 patches/didhandshakeresume.patch |
| 47 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 | 43 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 |
| 48 | 44 |
| 49 * Add a function to restart a handshake after a client certificate request. | |
| 50 patches/restartclientauth.patch | |
| 51 | |
| 52 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake | 45 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake |
| 53 is finished. | 46 is finished. |
| 54 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 | 47 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 |
| 55 patches/negotiatedextension.patch | 48 patches/negotiatedextension.patch |
| 56 | 49 |
| 57 * Add function to retrieve TLS client cert types requested by server. | 50 * Add function to retrieve TLS client cert types requested by server. |
| 58 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 | 51 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 |
| 59 patches/getrequestedclientcerttypes.patch | 52 patches/getrequestedclientcerttypes.patch |
| 60 | 53 |
| 61 * Enable False Start only when the server supports forward secrecy. | 54 * Add a function to restart a handshake after a client certificate request. |
| 62 patches/falsestartnpn.patch | 55 patches/restartclientauth.patch |
| 63 https://bugzilla.mozilla.org/show_bug.cgi?id=810582 | |
| 64 https://bugzilla.mozilla.org/show_bug.cgi?id=810583 | |
| 65 | 56 |
| 66 * Add support for TLS Channel IDs | 57 * Add support for TLS Channel IDs |
| 67 patches/channelid.patch | 58 patches/channelid.patch |
| 68 | 59 |
| 69 * Add support for extracting the tls-unique channel binding value | 60 * Add support for extracting the tls-unique channel binding value |
| 70 patches/tlsunique.patch | 61 patches/tlsunique.patch |
| 71 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 | 62 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 |
| 72 | 63 |
| 73 * Don't crash when the SSL keylog file cannot be opened. | |
| 74 patches/sslkeylogerror.patch | |
| 75 https://bugzilla.mozilla.org/show_bug.cgi?id=810579 | |
| 76 | |
| 77 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro | 64 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro |
| 78 definition was moved from the internal header ec.h to blapit.h. When | 65 definition was moved from the internal header ec.h to blapit.h. When |
| 79 compiling against older system NSS headers, we need to define the macro. | 66 compiling against older system NSS headers, we need to define the macro. |
| 80 patches/ecpointform.patch | 67 patches/ecpointform.patch |
| 81 | 68 |
| 82 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. | 69 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. |
| 83 This change was made in https://chromiumcodereview.appspot.com/10454066. | 70 This change was made in https://chromiumcodereview.appspot.com/10454066. |
| 84 patches/secretexporterlocks.patch | 71 patches/secretexporterlocks.patch |
| 85 | 72 |
| 86 * Implement CBC processing in constant-time to address the "Lucky Thirteen" | 73 * Allow the constant-time CBC processing code to be compiled against older |
| 87 attack. | 74 NSS that doesn't contain the CBC constant-time changes. |
| 88 patches/cbc.patch | 75 patches/cbc.patch |
| 89 https://bugzilla.mozilla.org/show_bug.cgi?id=822365 | 76 https://code.google.com/p/chromium/issues/detail?id=172658#c12 |
| 90 | |
| 91 * Fix a crash in dtls_FreeHandshakeMessages. | |
| 92 patches/dtlsinitclist.patch | |
| 93 https://bugzilla.mozilla.org/show_bug.cgi?id=822433 (fixed in NSS 3.14.2) | |
| 94 | 77 |
| 95 * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it. | 78 * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it. |
| 96 Remove this patch when all system NSS packages are NSS 3.12.10 or later. | 79 Remove this patch when all system NSS packages are NSS 3.12.10 or later. |
| 97 patches/aes256keylength.patch | 80 patches/aes256keylength.patch |
| 98 | 81 |
| 82 * Change ssl3_SuiteBOnly to always return PR_TRUE. The softoken in NSS |
| 83 versions older than 3.15 report an EC key size range of 112 bits to 571 |
| 84 bits, even when it is compiled to support only the NIST P-256, P-384, and |
| 85 P-521 curves. Remove this patch when all system NSS softoken packages are |
| 86 NSS 3.15 or later. |
| 87 patches/suitebonly.patch |
| 88 |
| 89 * Define the SECItemArray type and declare the SECItemArray handling |
| 90 functions, which were added in NSS 3.15. Remove this patch when all system |
| 91 NSS packages are NSS 3.15 or later. |
| 92 patches/secitemarray.patch |
| 93 |
| 94 * Remove unused variables in ssl3_SendCertificateStatus. |
| 95 patches/unusedvariables.patch |
| 96 https://bugzilla.mozilla.org/show_bug.cgi?id=866949 |
| 97 |
| 99 Apply the patches to NSS by running the patches/applypatches.sh script. Read | 98 Apply the patches to NSS by running the patches/applypatches.sh script. Read |
| 100 the comments at the top of patches/applypatches.sh for instructions. | 99 the comments at the top of patches/applypatches.sh for instructions. |
| 101 | 100 |
| 102 The ssl/bodge directory contains files taken from the NSS repo that we required | 101 The ssl/bodge directory contains files taken from the NSS repo that we required |
| 103 for building libssl outside of its usual build environment. | 102 for building libssl outside of its usual build environment. |
| OLD | NEW |