summaryrefslogtreecommitdiffstats
path: root/net/third_party/nss/ssl/ssl3con.c
Commit message (Expand)AuthorAgeFilesLines
* Update the bundled libssl to NSS 3.18 RTMrsleevi2015-04-031-137/+181
* Use dlsym(RTLD_DEFAULT) instead of dlsym(dlopen(NULL)) in aesgcmchromium.patch.ppi2015-03-031-8/+3
* net: move the FALLBACK_SCSV to the back of the cipher suite list.agl2014-10-291-9/+11
* Ignore out-of-order DTLS ChangeCipherSpec.wtc@chromium.org2014-06-061-0/+8
* Update net/third_party/nss to NSS 3.15.5 Beta 2.wtc@chromium.org2014-01-211-1/+1
* Use NSSRWLock instead of PRRWLock in sslSessionID. This avoids the bugswtc@chromium.org2014-01-091-21/+21
* Update net/third_party/nss to NSS 3.15.4.wtc@chromium.org2014-01-071-177/+262
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-271-1/+1
* Revert 242219 "Defer TLS session caching until after certificate..."rsleevi@chromium.org2013-12-211-1/+1
* Defer TLS session caching until after certificate verificationrsleevi@chromium.org2013-12-211-1/+1
* net: use model NSS socket to save setting the cipher order every time.agl@chromium.org2013-12-071-10/+12
* net: implement TLS_FALLBACK_SCSV.agl@chromium.org2013-12-071-2/+33
* Use SHA-1 in TLS 1.2 client auth if the server requests it.davidben@chromium.org2013-12-041-24/+61
* nss: fix order of parenthesis.agl@chromium.org2013-12-031-1/+1
* net: boost AES-GCM ciphers if the machine has AES-NI.agl@chromium.org2013-12-021-0/+38
* Certificate Transparency TLS extension patch for NSSekasper@google.com2013-11-211-0/+15
* Update to the latest False Start code from NSS upstream.wtc@chromium.org2013-11-191-75/+72
* Support new ChannelID extension.agl@chromium.org2013-11-181-6/+52
* net: don't add padding extension for SSLv3.agl@chromium.org2013-11-121-1/+1
* NSS: add `padding' extension when we might hit the F5 bug.agl@chromium.org2013-11-081-0/+22
* Include a fix for NSS bug 934016rsleevi@chromium.org2013-11-021-0/+5
* Update to the new definitions of CKM_NSS_CHACHA20_POLY1305 andwtc@chromium.org2013-10-241-11/+11
* Make SSL False Start work with asynchronous certificate validationwtc@chromium.org2013-10-091-38/+131
* net: don't send resumption ClientHello records with versions > 0x0301.agl@chromium.org2013-10-071-4/+6
* NSS: don't advertise TLS 1.2-only ciphersuites in a TLS 1.1 ClientHello.agl@chromium.org2013-09-261-25/+38
* NSS: fix session cache lock initialisation.agl@chromium.org2013-09-201-2/+1
* net: add ChaCha20+Poly1305 support to libssl.agl@chromium.org2013-09-171-2/+67
* The NSS client auth (as opposed to NSS_PLATFORM_CLIENT_AUTH) also needswtc@chromium.org2013-09-121-49/+69
* Prefer to generate SHA-1 signatures for TLS 1.2 client authentication ifwtc@chromium.org2013-09-061-5/+28
* On Windows, prefer to generate SHA-1 signatures for TLS 1.2 clientwtc@chromium.org2013-08-301-6/+90
* Make the AES-GCM cipher suites work in DTLS, by moving thewtc@chromium.org2013-08-211-115/+78
* Implement the AES GCM cipher suites for TLS.wtc@chromium.org2013-08-151-207/+538
* net: avoid uninitialised data warning in the event of a decryption failure.agl@chromium.org2013-08-011-13/+14
* Update net/third_party/nss/ssl to NSS 3.15.1.wtc@chromium.org2013-08-011-78/+69
* net: support ALPN.agl@chromium.org2013-07-031-1/+3
* Remove dummy change in ssl3con.c.agl@chromium.org2013-07-011-2/+0
* net: use NSS's function for selecting NPN rather than a callback.agl@chromium.org2013-07-011-0/+2
* Miscellaneous cleanup of TLS 1.2 code.wtc@chromium.org2013-06-171-169/+166
* Support the new TLS 1.2 HMAC-SHA256 cipher suites specified inwtc@chromium.org2013-06-061-3/+38
* Support the new supported_signature_algorithms field of thewtc@chromium.org2013-05-311-3/+62
* Implement TLS 1.2.wtc@chromium.org2013-05-301-137/+715
* Fix bugs in the code in ssl3_HandleHandshakeMessage that handles awtc@chromium.org2013-05-061-18/+28
* Update NSS libSSL to NSS_3_15_BETA2.wtc@chromium.org2013-05-021-152/+182
* Use CERT_GetCertKeyType to get KeyType for ssl3_PlatformSignHashes. mef@chromium.org2013-04-261-2/+3
* Revert "net: don't do TLS False Start with RC4."agl@chromium.org2013-04-261-8/+2
* net: don't do TLS False Start with RC4.agl@chromium.org2013-04-191-2/+8
* When performing an SSL renegotiation and requesting a certificate status, cle...rsleevi@chromium.org2013-02-231-0/+4
* The hashAlg field of CK_NSS_MAC_CONSTANT_TIME_PARAMS has beenwtc@chromium.org2013-02-081-3/+3
* net: implement CBC processing in constant-time in libssl.agl@chromium.org2013-02-061-57/+385
* Ensure the patched NSS libssl used on Win and Mac behaves the same as upstrea...rsleevi@chromium.org2012-11-151-6/+4