Upstream version 9.38.198.0
[platform/framework/web/crosswalk.git] / src / third_party / tlslite / README.chromium
1 Name: tlslite
2 URL: http://trevp.net/tlslite/
3 Version: 0.4.6
4 Security Critical: No
5 License: Public domain and BSD
6
7 Description: Python TLS implementation for use with test server.
8
9 Source: https://pypi.python.org/packages/source/t/tlslite/tlslite-0.4.6.tar.gz
10 MD5: 2f92ebea557802969653f29c7faafbc2
11 SHA-512: 7b933499dfdafbdf3775c7e86bbc82a6fcee0b37a818d9106fe84436176df7f4
12          2f185f61a64c6548214909cfce530f5d143414173ffc8f074faf87f34c87f38c
13
14 Local Modifications:
15 - Drop docs/, scripts/, and tests/ directories.
16 - patches/tls_intolerant.patch: allow TLSLite to simulate a TLS-intolerant server.
17 - patches/channel_id.patch: add basic ChannelID support. (Signatures are not
18   checked.)
19 - patches/signed_certificate_timestamps.patch: add support for sending Signed
20   Certificate Timestamps over a TLS extension.
21 - patches/fallback_scsv.patch: add support for TLS_FALLBACK_SCSV. See
22   https://tools.ietf.org/html/draft-bmoeller-tls-downgrade-scsv-01
23 - patches/status_request.patch: add support for sending stapled OCSP responses.
24 - patches/pycrypto.patch: fix PyCrypto support code.
25 - patches/client_cipher_preferences.patch: honor client cipher preferences.
26   tlslite's current ordering will otherwise negotiate
27   TLS_RSA_WITH_3DES_EDE_CBC_SHA.
28 - patches/ssl3_padding.patch: SSL3 requires minimal padding in CBC mode.
29 - patches/srp_cert.patch: Prefer srp + cert over srp, to fix tlslite tests after
30   client_cipher_preferences.patch.
31 - patches/fix_test_file.patch: Fix #! line in random test file to appease our
32   presubmit checks.
33 - patches/dhe_rsa.patch: Implement DHE_RSA-based cipher suites.
34 - patches/req_cert_types.patch: Add a reqCertTypes parameter to populate the
35   certificate_types field of CertificateRequest.
36 - patches/ignore_write_failure.patch: Don't invalidate sessions on write
37   failures.
38 - patches/intolerance_options.patch: Add an option to further control
39   simulated TLS version intolerance.