summaryrefslogtreecommitdiffstats
path: root/net/third_party/nss
Commit message (Expand)AuthorAgeFilesLines
* Change the default of the SSL_ENABLE_OB_CERTS option to PR_FALSE.wtc@chromium.org2011-10-132-2/+2
* net: disable 1/n-1 record splitting when False Start is disabled.agl@chromium.org2011-10-052-13/+15
* Fix libssl to build properly with use_system_zlib==0.bradchen@google.com2011-10-041-1/+3
* net: update NSS patches.agl@chromium.org2011-10-0316-341/+322
* Update cbcrandomiv.patch to the currently proposed patch (v10) for thewtc@chromium.org2011-09-302-106/+286
* Fallback from platform client auth to NSS client auth.mattm@chromium.org2011-09-275-225/+247
* Add a license header to net/third_party/nss/patches/applypatches.sh.wtc@chromium.org2011-09-271-0/+4
* Allow SSL_HandshakeNegotiatedExtension to be called before the handshakewtc@chromium.org2011-08-254-8/+53
* Updated ob_cert extension number to match with the change in opensslmdietz@google.com2011-08-252-2/+2
* Always transfer ownership of inputs to SSL_RestartHandshakeAfterCertReq,wtc@chromium.org2011-08-243-68/+132
* Send only one byte of data in the first CBC encrypted aplication datawtc@chromium.org2011-08-184-1/+97
* Add an NSS function to restart the handshake after a client certificatewtc@chromium.org2011-08-177-19/+202
* Revert "net: Precede each CBC encrypted application data record with an empty...agl@chromium.org2011-08-094-106/+2
* SSL_ForceHandshake should send the saved write data in the SSL socket.wtc@chromium.org2011-08-054-2/+74
* net: fix caching of peer's cert chain in session objects.agl@chromium.org2011-08-022-3/+12
* net: allow SSL secrets to be exported sooner.agl@chromium.org2011-07-264-48/+56
* net: add NSS support for RFC 5705agl@chromium.org2011-07-227-22/+361
* net: update NSS patches to reflect recent changes.agl@chromium.org2011-07-226-30/+573
* Added client hello handler for the TLS origin bound cert extensionrkn@chromium.org2011-07-221-0/+1
* Merge upstream NSS changes from the cached info extension.rkn@chromium.org2011-07-196-11/+220
* Add client-side support for the origin bound certificate TLS extension.rkn@chromium.org2011-07-145-4/+103
* Remove the comments setting emands and vim tab width and expansion variables.tony@chromium.org2011-07-111-6/+0
* net: Precede each CBC encrypted application data record with an empty one.agl@chromium.org2011-07-074-2/+106
* net: measure the latency difference of resume handshakes.agl@chromium.org2011-06-295-0/+82
* Use crnss.dll and crnspr.dll with the component build.rvargas@google.com2011-06-281-0/+1
* Revert "net: Precede each CBC encrypted application data record with an empty...agl@chromium.org2011-06-274-106/+2
* net: Precede each CBC encrypted application data record with an empty one.agl@chromium.org2011-06-274-2/+106
* net: mention upstream Mozilla bug for cachedinfo.agl@chromium.org2011-06-241-0/+1
* net: include patch for cached info and fix whitespace.agl@chromium.org2011-06-248-103/+775
* Added client-side support for the TLS cached inforkn@chromium.org2011-06-229-66/+416
* net: rebase NSS patches. No code change.agl@chromium.org2011-06-219-659/+660
* Remove rendundant use of product_name in gyp files.evan@chromium.org2011-06-091-1/+0
* Remove the TLS Snap Start code from NSS.wtc@chromium.org2011-06-0914-3769/+146
* Final gyp patch to make use of the new cross-platform POSIX defines toolkit_u...tony@chromium.org2011-05-231-2/+2
* Globally replace <(library) with static_libraryevan@chromium.org2011-05-191-1/+1
* Increase warning level to 4 on Visual Studiomaruel@chromium.org2011-05-031-1/+2
* Update to NSS 3.12.9. falsestart.patch, falsestart2.patch, andwtc@chromium.org2011-02-1816-593/+21
* Update the NSS patches. Add snapstart2.patch and peercertchain.patch.wtc@chromium.org2011-02-176-32/+243
* Add the NSS patch for SSL client auth with native crypto APIs on Macwtc@chromium.org2011-02-163-99/+708
* Remove whitespace at the end of lines.wtc@chromium.org2011-02-161-4/+4
* Remove the unused PlatformAuthInfo structure definition.wtc@chromium.org2011-02-161-13/+0
* The current implementation of client authentication for Windows and Mac match...rsleevi@chromium.org2011-02-125-214/+1
* Do not pass CRYPT_NOHASHOID to CryptSignHash with CALG_SSL3_SHAMD5.rsleevi@chromium.org2011-02-091-2/+2
* When performing SSL client authentication on Windows via NSS, change the retu...rsleevi@chromium.org2011-02-053-20/+28
* Return more specific error messages when performing a SSL client auth handsha...rsleevi@chromium.org2011-02-051-15/+21
* When performing a SSL renegotiation handshake, do not send Certificate/Certif...rsleevi@chromium.org2010-12-103-31/+134
* nss: add support for OCSP stapling.agl@chromium.org2010-11-2211-1/+778
* ssl3_PlatformSignHashes should set buf->len to thewtc@chromium.org2010-11-121-3/+3
* NSS: always record the ServerHello data.agl@chromium.org2010-11-121-14/+14
* Fix inconsistent line ending style. Set svn:eol-style to LF.wtc@chromium.org2010-11-041-2/+2