diff options
author | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-06-29 10:53:05 +0000 |
---|---|---|
committer | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-06-29 10:53:05 +0000 |
commit | d5700d7ba712cbc99c5aa3409a94d9816c3f5782 (patch) | |
tree | 1698865658f62644877e9eb29a7aa68ed90c3185 /net/third_party/nss/README.chromium | |
parent | 319fff3e31773e5522fe2b468c2e9908764c858d (diff) | |
download | chromium_src-d5700d7ba712cbc99c5aa3409a94d9816c3f5782.zip chromium_src-d5700d7ba712cbc99c5aa3409a94d9816c3f5782.tar.gz chromium_src-d5700d7ba712cbc99c5aa3409a94d9816c3f5782.tar.bz2 |
Update dependency to NSS >= 3.14.3 and NSPR >= 4.9.2
Technically NSS 3.14.3 depends on NSPR 4.9.5, but Debian stable still
ships 4.9.2 on stable, so this is the lower bound.
3.14.3 contains a number of important security fixes, and support for
older systems is no longer desirable.
BUG=245370
R=thestig@chromium.org, wtc@chromium.org
Review URL: https://chromiumcodereview.appspot.com/18063013
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209278 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/third_party/nss/README.chromium')
-rw-r--r-- | net/third_party/nss/README.chromium | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/net/third_party/nss/README.chromium b/net/third_party/nss/README.chromium index 197c2d6..4c7e137 100644 --- a/net/third_party/nss/README.chromium +++ b/net/third_party/nss/README.chromium @@ -75,10 +75,6 @@ Patches: patches/cbc.patch https://code.google.com/p/chromium/issues/detail?id=172658#c12 - * Define AES_256_KEY_LENGTH if the system blapit.h header doesn't define it. - Remove this patch when all system NSS packages are NSS 3.12.10 or later. - patches/aes256keylength.patch - * Change ssl3_SuiteBOnly to always return PR_TRUE. The softoken in NSS versions older than 3.15 report an EC key size range of 112 bits to 571 bits, even when it is compiled to support only the NIST P-256, P-384, and |