summaryrefslogtreecommitdiffstats
path: root/net/third_party
Commit message (Expand)AuthorAgeFilesLines
* Revert 138795 - Revert "nss: revert encrypted and origin bound certificates s...agl@chromium.org2012-05-2410-879/+39
* Revert "nss: revert encrypted and origin bound certificates support."agl@chromium.org2012-05-2410-39/+879
* nss: revert encrypted and origin bound certificates support.agl@chromium.org2012-05-2410-879/+39
* Update URL for upstream NSS bug.agl@chromium.org2012-05-221-1/+1
* Roll NSS from 136057:137477rsleevi@chromium.org2012-05-181-0/+4
* If generating a domain bound cert fails, continue the connection without it.mattm@chromium.org2012-05-082-1/+3
* Only call SSL_OptionSet in an initial handshake.wtc@chromium.org2012-05-024-25/+0
* net: don't set NSS options in a callback.agl@chromium.org2012-04-304-1/+26
* nss: reject DH generators and public values equal to zero or one.agl@chromium.org2012-04-254-4/+84
* Set svn:executable bit on scripts that are executable.maruel@chromium.org2012-04-231-0/+1
* net: only False Start with forward secret servers.agl@chromium.org2012-04-204-5/+66
* net: False Start only for NPN capable servers.agl@google.com2012-04-104-0/+10
* Set ss->ssl3.hs.recvMessageSeq to 0 in dtls_RehandshakeCleanup.wtc@chromium.org2012-03-312-1/+3
* Add DTLS support to NSS, contributed by Eric Rescorla.wtc@chromium.org2012-03-3021-127/+5435
* Update NSS to NSS 3.13.4 pre-release snapshot 20120319.wtc@chromium.org2012-03-2023-879/+705
* Add a boolean |has_context| argument to the TLS ExportKeyingMaterialwtc@chromium.org2012-03-157-29/+261
* Fix a buffer length bug and nits in the next protocol negotiation (NPN)wtc@chromium.org2012-03-125-10/+98
* Fix pkgconfig wrapper for 64 bitspiman@chromium.org2012-03-091-1/+1
* Change the old type name PRArenaPool to PLArenaPool.wtc@chromium.org2012-03-091-1/+1
* Update net/third_party/nss to NSS 3.13.3.wtc@chromium.org2012-03-0343-3920/+2254
* Fix a (harmless) clang warning in nss.thakis@chromium.org2012-02-213-1/+18
* Pick up the fix for NSS bug 718554 (a SSL_ForceHandshake bug).wtc@chromium.org2012-01-202-4/+4
* Fix compile error for net/third_party/mozilla_security_manager/nsNSSCertTrust...Guanqun.Lu@gmail.com2012-01-141-6/+15
* Initialized variable to fix -Wmaybe-uninitialized warning.asharif@chromium.org2012-01-131-1/+1
* net: rename NSS's 'ssl' to 'libssl'agl@chromium.org2011-12-151-1/+1
* This applies GUIDs to certificate and key nicknames whengspencer@chromium.org2011-12-123-59/+80
* Add bugzilla link for net/third_party/nss/patches/getrequestedclientcerttypes...mattm@chromium.org2011-12-071-1/+1
* Add NSS function to retrieve TLS client cert types requested by server.mattm@chromium.org2011-12-067-1/+142
* Allow linker initialization of lazy instancejoth@chromium.org2011-11-151-2/+2
* Add the encrypted client certificates TLS extension and enable it ifwtc@chromium.org2011-11-109-49/+579
* net: add missing return value in SSL_SetNextProtoCallbackagl@chromium.org2011-10-283-19/+33
* NSS: update NPN patch to fix comment style and ssl.def.agl@chromium.org2011-10-253-13/+15
* Fix a comment nit for SSLNextProtoCallback.wtc@chromium.org2011-10-192-2/+2
* net: rework the NPN patch.agl@chromium.org2011-10-187-186/+332
* Change the default of the SSL_ENABLE_OB_CERTS option to PR_FALSE.wtc@chromium.org2011-10-132-2/+2
* net: disable 1/n-1 record splitting when False Start is disabled.agl@chromium.org2011-10-052-13/+15
* Fix libssl to build properly with use_system_zlib==0.bradchen@google.com2011-10-041-1/+3
* net: update NSS patches.agl@chromium.org2011-10-0316-341/+322
* Update cbcrandomiv.patch to the currently proposed patch (v10) for thewtc@chromium.org2011-09-302-106/+286
* Fallback from platform client auth to NSS client auth.mattm@chromium.org2011-09-275-225/+247
* Add a license header to net/third_party/nss/patches/applypatches.sh.wtc@chromium.org2011-09-271-0/+4
* Introduce a typedef for users of the SSL cert trust bits. This allows lots of...pkasting@chromium.org2011-09-202-8/+8
* Allow SSL_HandshakeNegotiatedExtension to be called before the handshakewtc@chromium.org2011-08-254-8/+53
* Updated ob_cert extension number to match with the change in opensslmdietz@google.com2011-08-252-2/+2
* Linux: allow linking directly with Kerberos instead of using dlopen.phajdan.jr@chromium.org2011-08-244-896/+0
* Fix revert 98028: add file that drover --revert forgot to adddpolukhin@chromium.org2011-08-244-0/+896
* Always transfer ownership of inputs to SSL_RestartHandshakeAfterCertReq,wtc@chromium.org2011-08-243-68/+132
* Linux: allow linking directly with Kerberos instead of using dlopen.phajdan.jr@chromium.org2011-08-234-896/+0
* Send only one byte of data in the first CBC encrypted aplication datawtc@chromium.org2011-08-184-1/+97
* Add an NSS function to restart the handshake after a client certificatewtc@chromium.org2011-08-177-19/+202