Граф коммитов

11 Коммитов

Автор SHA1 Сообщение Дата
nelsonb%netscape.com 720374d8c3 When half-duplex applications (e.g. one thread per socket, doing alternate
reading and writing) call PR_Send and PR_Recv with a non-infinite timeout
value, use that value for both underlying read and write operations.
Fixes bug 67402.  Reviewed by Wan-Teh.
2001-02-07 02:06:05 +00:00
nelsonb%netscape.com 4207bb1bdb Coalesce the final Finished message in the SSL handshake and the first
record of application data into a single write, when possible, to avoid
TCP's "Nagle" delays.  Fixes bug 67898.  r&a: wtc.  Modified Files:
	ssl3con.c sslimpl.h sslsecur.c sslsock.c
2001-02-07 00:34:56 +00:00
nelsonb%netscape.com 14c87961d5 Add implementation of SSL_RSA_WITH_RC4_128_SHA SSL3 cipher suite,
which is not enabled by default.  Bug 59795.
2001-01-13 02:05:15 +00:00
nelsonb%netscape.com d5ae266115 Remove all vestiges of old pre-NSS socks client implementation from NSS.
Bug 51471.
2001-01-13 01:52:59 +00:00
nelsonb%netscape.com 1311ab52d4 Changes to deal with exporting data from Windows DLLs.
SECHashObjects[] is no longer exported.
New function HASH_GetHashObject returns pointer to selected const object.
SSL statistics are now in a structure whose address is obtained via a
call to SSL_GetStatistics().
On NT, the new symbol NSS_USE_STATIC_LIBS must be declared in programs
that use the static SSL library.
Also, propagate "const" declaration for SECHashObjects.
2001-01-05 01:38:26 +00:00
larryh%netscape.com 351f30a205 Bugzilla: 64132. NSS lock instrumentation 2001-01-03 19:51:22 +00:00
jgmyers%netscape.com 51e59fccb4 support IPv6 in ssl: bug 48657 r=nelsonb 2000-09-12 20:15:44 +00:00
nelsonb%netscape.com ed8cacc2c9 Stop using "reserved" fields of PRIOMethods by name. Fixes bug 52092. 2000-09-11 22:37:12 +00:00
nelsonb%netscape.com d856a6e4f8 Create a new function, CERT_DupCertList(), and call it instead of calling
CERT_CertChainFromCert in ssl_DupSocket().  This is MUCH faster.  This is
the first approximation of the right fix.  The next step is to consider
doing ref counting instead of actual duplication.  Fixes bug 51425 .
2000-09-09 06:08:46 +00:00
nelsonb%netscape.com 0ea2ec3f99 Fix the logic in client and server to detect version roll-back attack,
rolling back from TLS (SSL 3.1) to SSL 3.0.  Provide a new SSL socket
option to disable roll-back detection in servers, since certain TLS
clients are doing it incorrectly.
2000-05-24 03:35:23 +00:00
relyea%netscape.com 9fd7059a19 Initial NSS Open Source checkin 2000-03-31 20:13:40 +00:00