searching for reviewer(keeler)
82a474df494f100be870eb9aa8079e749f7f5103: Bug 1559114 - Optimize CRLite intermediates download r=glasserc,jcj,keeler
Mathieu Leplatre <mathieu@mozilla.com> - Tue, 18 Jun 2019 23:18:59 +0000 - rev 479158
Push 113465 by cbrindusan@mozilla.com at Wed, 19 Jun 2019 03:59:07 +0000
Bug 1559114 - Optimize CRLite intermediates download r=glasserc,jcj,keeler Differential Revision: https://phabricator.services.mozilla.com/D34880
9e8b490acc3bafc44b3cafd9b3472bac3d9d353c: Bug 1559322 - Use "GreD" and "GreBinD" instead of "CurProcD" to remove macOS-specific hack and influence from firefox-appdir. r=keeler
Masatoshi Kimura <VYV03354@nifty.ne.jp> - Tue, 18 Jun 2019 18:43:05 +0000 - rev 479144
Push 113465 by cbrindusan@mozilla.com at Wed, 19 Jun 2019 03:59:07 +0000
Bug 1559322 - Use "GreD" and "GreBinD" instead of "CurProcD" to remove macOS-specific hack and influence from firefox-appdir. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D35011
4d299dcdcaaa45c2ed52093e942f4da533d80d0b: Bug 1546816 - Part 2: Change nsNSSCallback to prepare for moving cert verifications to the parent process if the socket process performs network access. r=keeler
Dragana Damjanovic <dd.mozilla@gmail.com> - Tue, 04 Jun 2019 22:20:30 +0000 - rev 479028
Push 113453 by shindli@mozilla.com at Sat, 15 Jun 2019 21:56:53 +0000
Bug 1546816 - Part 2: Change nsNSSCallback to prepare for moving cert verifications to the parent process if the socket process performs network access. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D28742
dbb07b64cdf9fc9653272a81b12291f65dd24ca5: Bug 1546816 - Part 1: Changes needed for performing cert verification on the parent proces while networking access is on the socket process. r=keeler
Dragana Damjanovic <dd.mozilla@gmail.com> - Fri, 14 Jun 2019 12:40:12 +0000 - rev 479027
Push 113453 by shindli@mozilla.com at Sat, 15 Jun 2019 21:56:53 +0000
Bug 1546816 - Part 1: Changes needed for performing cert verification on the parent proces while networking access is on the socket process. r=keeler This patche changes only security/manager/ssl/SSLServerCertVerification.cpp. Differential Revision: https://phabricator.services.mozilla.com/D28741
2cb598f04b626920e8f4ef50e60c25c09b32be0f: Bug 1558735 part 2. Stop using [array] in nsIX509Cert.getEmailAddresses. r=keeler
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 15 Jun 2019 03:51:58 +0000 - rev 479015
Push 113448 by apavel@mozilla.com at Sat, 15 Jun 2019 10:07:35 +0000
Bug 1558735 part 2. Stop using [array] in nsIX509Cert.getEmailAddresses. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34671
b05b7c15f189a1db0f8a401a7edeb8a52ab2cabd: Bug 1558735 part 1. Stop using [array] in nsIX509Cert.getRawDER. r=keeler,mayhemer
Boris Zbarsky <bzbarsky@mit.edu> - Fri, 14 Jun 2019 18:17:20 +0000 - rev 479014
Push 113448 by apavel@mozilla.com at Sat, 15 Jun 2019 10:07:35 +0000
Bug 1558735 part 1. Stop using [array] in nsIX509Cert.getRawDER. r=keeler,mayhemer Differential Revision: https://phabricator.services.mozilla.com/D34670
99fdfc9a7b82a60aeb356105ff836bf02192c35b: Bug 1558856 - Collect values of MitM-related preferences r=keeler
Tim D. Smith <tdsmith@mozilla.com> - Fri, 14 Jun 2019 18:01:22 +0000 - rev 478991
Push 113448 by apavel@mozilla.com at Sat, 15 Jun 2019 10:07:35 +0000
Bug 1558856 - Collect values of MitM-related preferences r=keeler Having these values in telemetry will let us understand the prevalence of MitM in the wild, count instances of broken AV MitM, and understand how often these values have been manually configured. Differential Revision: https://phabricator.services.mozilla.com/D34741
595c5084ff826edbc6bc6b7df11b2e9e35549c9a: Bug 1557161 - enable rkv consumers to migrate LMDB environments across architecture changes r=lina,keeler,froydnj
Myk Melez <myk@mykzilla.org> - Thu, 13 Jun 2019 19:14:59 +0000 - rev 478760
Push 113435 by shindli@mozilla.com at Fri, 14 Jun 2019 03:43:52 +0000
Bug 1557161 - enable rkv consumers to migrate LMDB environments across architecture changes r=lina,keeler,froydnj Differential Revision: https://phabricator.services.mozilla.com/D33863
69447a62f68b41dff5f02fe81aa7adce598f7cf1: Bug 1558056 - Exit tlsserver when parent process died. r=keeler
Masatoshi Kimura <VYV03354@nifty.ne.jp> - Wed, 12 Jun 2019 23:19:45 +0000 - rev 478648
Push 113434 by shindli@mozilla.com at Thu, 13 Jun 2019 22:05:34 +0000
Bug 1558056 - Exit tlsserver when parent process died. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34288
381a74484140c4183bc8d3b094848a95214795ed: Bug 1315460 - Removal of keygen element r=keeler,baku,jld,hsivonen
Jonathan Kingston <jkt@mozilla.com> - Thu, 13 Jun 2019 08:58:07 +0000 - rev 478647
Push 113434 by shindli@mozilla.com at Thu, 13 Jun 2019 22:05:34 +0000
Bug 1315460 - Removal of keygen element r=keeler,baku,jld,hsivonen Differential Revision: https://phabricator.services.mozilla.com/D22810
38ce9b0a4a7e64c9e0da7b51f4d05b564d3c1609: Bug 1558650. Stop using [array] in nsIOSKeyStore. r=keeler
Boris Zbarsky <bzbarsky@mit.edu> - Wed, 12 Jun 2019 23:25:27 +0000 - rev 478588
Push 113428 by opoprus@mozilla.com at Thu, 13 Jun 2019 10:07:38 +0000
Bug 1558650. Stop using [array] in nsIOSKeyStore. r=keeler This also removes the two extra copies of the byte buffer that we had; we don't need to copy it more than once. Once we have it in an std::vector, we can pass that around by reference, not by value or by creating new vectors from copies of its buffer. Differential Revision: https://phabricator.services.mozilla.com/D34630
5d3cfd9c5a471cbeb78d80651100cbed958ae9c4: Bug 1558877. Remove nsITLSServerSocket.setCipherSuites. r=keeler
Boris Zbarsky <bzbarsky@mit.edu> - Wed, 12 Jun 2019 23:21:49 +0000 - rev 478587
Push 113428 by opoprus@mozilla.com at Thu, 13 Jun 2019 10:07:38 +0000
Bug 1558877. Remove nsITLSServerSocket.setCipherSuites. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34746
c06271bb0d83ce15e65826e730d03f183163697d: Bug 1558739. Stop using [array] in nsIX509CertDB.exportPKCS12File. r=keeler
Boris Zbarsky <bzbarsky@mit.edu> - Wed, 12 Jun 2019 23:06:48 +0000 - rev 478575
Push 113428 by opoprus@mozilla.com at Thu, 13 Jun 2019 10:07:38 +0000
Bug 1558739. Stop using [array] in nsIX509CertDB.exportPKCS12File. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34676
547109ab8d7bb037fa42996e1837f7d231b5d615: Bug 1558977 - Upgrade NSS 3.45 r=keeler
J.C. Jones <jjones@mozilla.com> - Wed, 12 Jun 2019 23:22:22 +0000 - rev 478573
Push 113428 by opoprus@mozilla.com at Thu, 13 Jun 2019 10:07:38 +0000
Bug 1558977 - Upgrade NSS 3.45 r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34784
495ea01636a298cc319b1234797ce5bb43b3281d: Bug 1558557. Stop using [array] in nsISecretDecoderRing. r=keeler
Boris Zbarsky <bzbarsky@mit.edu> - Wed, 12 Jun 2019 02:15:23 +0000 - rev 478385
Push 113419 by dluca@mozilla.com at Wed, 12 Jun 2019 12:45:34 +0000
Bug 1558557. Stop using [array] in nsISecretDecoderRing. r=keeler The UTF-16 to UTF-8 conversion is now handled by XPConnect, because we're using AUTF8String for the type. Differential Revision: https://phabricator.services.mozilla.com/D34560
75b682ea45b0e046b711b4f9a6ac65538d774ae7: Bug 1558569. Stop using [array] in nsISiteSecurityService. r=keeler
Boris Zbarsky <bzbarsky@mit.edu> - Tue, 11 Jun 2019 21:23:21 +0000 - rev 478333
Push 113419 by dluca@mozilla.com at Wed, 12 Jun 2019 12:45:34 +0000
Bug 1558569. Stop using [array] in nsISiteSecurityService. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34568
69692b1002702003f7e14d550598a6763ef645f6: Bug 1557931 - Stop using ACString parameters in nsICertOverrideService. r=keeler
Masatoshi Kimura <VYV03354@nifty.ne.jp> - Tue, 11 Jun 2019 16:50:38 +0000 - rev 478319
Push 113419 by dluca@mozilla.com at Wed, 12 Jun 2019 12:45:34 +0000
Bug 1557931 - Stop using ACString parameters in nsICertOverrideService. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D34274
ce509bb0895aac04378f959a5c6627fb10b384d8: Bug 1557161 - enable rkv consumers to migrate LMDB environments across architecture changes r=lina,keeler,froydnj
Myk Melez <myk@mykzilla.org> - Mon, 10 Jun 2019 18:14:46 +0000 - rev 478113
Push 113405 by nerli@mozilla.com at Tue, 11 Jun 2019 03:22:35 +0000
Bug 1557161 - enable rkv consumers to migrate LMDB environments across architecture changes r=lina,keeler,froydnj Differential Revision: https://phabricator.services.mozilla.com/D33863
48fdc8d56a8b22bc1debc17547f84900877730cb: Bug 1547015 - Implement a clearAllOverrides method in nsICertOverrideService. r=johannh,keeler
Nihanth Subramanya <nhnt11@gmail.com> - Mon, 03 Jun 2019 21:29:56 +0000 - rev 476689
Push 113305 by cbrindusan@mozilla.com at Tue, 04 Jun 2019 03:54:43 +0000
Bug 1547015 - Implement a clearAllOverrides method in nsICertOverrideService. r=johannh,keeler Differential Revision: https://phabricator.services.mozilla.com/D32886
7c8a87a7e1904310b7aac949427ab19b2193395d: Bug 1553797 - Fix OneCRL tests when MOZ_NEW_CERT_STORAGE is disabled r=keeler
Mathieu Leplatre <mathieu@mozilla.com> - Fri, 24 May 2019 14:32:13 +0000 - rev 475678
Push 113228 by dluca@mozilla.com at Tue, 28 May 2019 09:48:00 +0000
Bug 1553797 - Fix OneCRL tests when MOZ_NEW_CERT_STORAGE is disabled r=keeler Differential Revision: https://phabricator.services.mozilla.com/D32331
f3534b56753ed9d04b018bd6b0549923775e5661: Bug 1492305 - Fix LibSecret unlocking & NSS return values r=keeler,MattN
Kevin Jacobs <kjacobs@mozilla.com> - Wed, 22 May 2019 18:25:59 +0000 - rev 475255
Push 113198 by aciure@mozilla.com at Fri, 24 May 2019 04:03:55 +0000
Bug 1492305 - Fix LibSecret unlocking & NSS return values r=keeler,MattN This fixes issues with the NSS and LibSecret keystore not correctly rejecting unlocking of the key store. Updated for dynamic loading of LibSecret and a bug workaround added elsewhere (updated green try below) Depends on D9969. Differential Revision: https://phabricator.services.mozilla.com/D7713
1765feffe210b2348826f3e333eade8ce923dd6c: Bug 1552339 - On Android, direct attestations are anonymized r=keeler
J.C. Jones <jjones@mozilla.com> - Tue, 21 May 2019 21:44:05 +0000 - rev 475026
Push 113187 by btara@mozilla.com at Thu, 23 May 2019 04:45:24 +0000
Bug 1552339 - On Android, direct attestations are anonymized r=keeler Differential Revision: https://phabricator.services.mozilla.com/D32057
ee7e04b12dd34b89aff8a4e0ba5ae3dc5be7d9f9: Bug 1548542 - Remove notions of Kinto in blocklists unit tests r=keeler,Gijs
Mathieu Leplatre <mathieu@mozilla.com> - Wed, 22 May 2019 11:25:04 +0000 - rev 474945
Push 113181 by shindli@mozilla.com at Wed, 22 May 2019 15:39:08 +0000
Bug 1548542 - Remove notions of Kinto in blocklists unit tests r=keeler,Gijs Differential Revision: https://phabricator.services.mozilla.com/D31221
0b5457f890300631908ed9571c2ccc58fef9cf39: Bug 1552602 - Disable FIDO U2F API for Android r=keeler,bzbarsky
J.C. Jones <jjones@mozilla.com> - Mon, 20 May 2019 16:46:43 +0000 - rev 474749
Push 113171 by aiakab@mozilla.com at Tue, 21 May 2019 21:56:33 +0000
Bug 1552602 - Disable FIDO U2F API for Android r=keeler,bzbarsky Per https://bugzilla.mozilla.org/show_bug.cgi?id=1550625#c5 there is no mechanism available for FIDO U2F JS API operations on Android. The exposed API is FIDO2/WebAuthn-only. As such, Firefox cannot support FIDO U2F JS API operations on Android, and we should disable the u2f preference so that window.u2f is not set inappropriately. Updated to fix test_interfaces.js Differential Revision: https://phabricator.services.mozilla.com/D31695
aa75c6a5ee7bd9455bb6805d471c18ebc6630653: Bug 1536463 - remove expiring security.pkcs11_modules_loaded telemetry. r=keeler
Julien Cristau <jcristau@mozilla.com> - Mon, 15 Apr 2019 12:53:37 +0000 - rev 474482
Push 113162 by rgurzau@mozilla.com at Mon, 20 May 2019 13:50:44 +0000
Bug 1536463 - remove expiring security.pkcs11_modules_loaded telemetry. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D27273
8e8ea33ecb3da138dbd0af56c2e5550902e7b05a: Bug 1552602 - Disable FIDO U2F API for Android r=keeler
J.C. Jones <jjones@mozilla.com> - Fri, 17 May 2019 23:45:47 +0000 - rev 474411
Push 113152 by dluca@mozilla.com at Sat, 18 May 2019 10:33:03 +0000
Bug 1552602 - Disable FIDO U2F API for Android r=keeler Per https://bugzilla.mozilla.org/show_bug.cgi?id=1550625#c5 there is no mechanism available for FIDO U2F JS API operations on Android. The exposed API is FIDO2/WebAuthn-only. As such, Firefox cannot support FIDO U2F JS API operations on Android, and we should disable the u2f preference so that window.u2f is not set inappropriately. Differential Revision: https://phabricator.services.mozilla.com/D31695
e3e9a5ca05997babb20fb7eee0e85dcb921844a3: Bug 1551229 - Make it easier to test Android WebAuthn in local builds r=keeler
J.C. Jones <jjones@mozilla.com> - Thu, 16 May 2019 17:37:35 +0000 - rev 474392
Push 113152 by dluca@mozilla.com at Sat, 18 May 2019 10:33:03 +0000
Bug 1551229 - Make it easier to test Android WebAuthn in local builds r=keeler Depends on D31360 Differential Revision: https://phabricator.services.mozilla.com/D31361
02f6bb0dec8a9c95ed4a01235ee684b24fd95251: Bug 1552539 - Refactor Android WebAuthn methods to use more GeckoBundles r=keeler
J.C. Jones <jjones@mozilla.com> - Fri, 17 May 2019 18:36:01 +0000 - rev 474384
Push 113152 by dluca@mozilla.com at Sat, 18 May 2019 10:33:03 +0000
Bug 1552539 - Refactor Android WebAuthn methods to use more GeckoBundles r=keeler Differential Revision: https://phabricator.services.mozilla.com/D31636
31953bf83dfd9710390419a006d41c51ff61b101: Bug 1551229 - Make it easier to test Android WebAuthn in local builds r=keeler
J.C. Jones <jjones@mozilla.com> - Thu, 16 May 2019 17:37:35 +0000 - rev 474377
Push 113152 by dluca@mozilla.com at Sat, 18 May 2019 10:33:03 +0000
Bug 1551229 - Make it easier to test Android WebAuthn in local builds r=keeler Depends on D31360 Differential Revision: https://phabricator.services.mozilla.com/D31361
b0887a64bb5fa71d8a2428579f581c7a8dadddf2: Bug 1551229 - Anonmyize all 'direct' attestation requests on Android r=keeler
J.C. Jones <jjones@mozilla.com> - Thu, 16 May 2019 17:37:35 +0000 - rev 474213
Push 113144 by shindli@mozilla.com at Fri, 17 May 2019 16:44:55 +0000
Bug 1551229 - Anonmyize all 'direct' attestation requests on Android r=keeler The code that blocks on a UX prompt for a Direct Attestation has to be disabled for Android, as Android has no UX at present. Until Bug 1550164 resolves, we'll have to let direct attestations be downgraded to anonymized ("None") attestations. Differential Revision: https://phabricator.services.mozilla.com/D31360
862aa43181c3bcb046b6159141c29a4c960680a6: Bug 1551342 - Fix conflicts w/ Android FIDO2 and Rust u2f-hid-rs r=keeler
J.C. Jones <jjones@mozilla.com> - Thu, 16 May 2019 07:54:44 +0000 - rev 474169
Push 113134 by ncsoregi@mozilla.com at Thu, 16 May 2019 22:01:33 +0000
Bug 1551342 - Fix conflicts w/ Android FIDO2 and Rust u2f-hid-rs r=keeler Differential Revision: https://phabricator.services.mozilla.com/D31366
0ab201cfaf67e1ef4a74c483586764405a79e306: Bug 1535210 - Set SSL STATE_IS_BROKEN flag for TLS1.0 and TLS 1.1 connections. r=keeler
Kevin Jacobs <kjacobs@mozilla.com> - Wed, 15 May 2019 23:34:52 +0000 - rev 474020
Push 113120 by dvarga@mozilla.com at Thu, 16 May 2019 04:21:05 +0000
Bug 1535210 - Set SSL STATE_IS_BROKEN flag for TLS1.0 and TLS 1.1 connections. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D29576
d9a6ddf122884cf34e3fc650d2b21a4ab5076124: Bug 1551342 - Update U2F, WebAuthn, and CredMan tests for Android r=keeler
J.C. Jones <jjones@mozilla.com> - Wed, 15 May 2019 21:34:58 +0000 - rev 474003
Push 113120 by dvarga@mozilla.com at Thu, 16 May 2019 04:21:05 +0000
Bug 1551342 - Update U2F, WebAuthn, and CredMan tests for Android r=keeler The new Android functionality can conflict with the tests' expected behavior, so it should be generally disabled, like the Rust module. Differential Revision: https://phabricator.services.mozilla.com/D31266
edd79d65116b36e10075a90726bb657f93daf26c: Bug 1551230 - Enable WebAuthn for Nightly Fennec r=KevinJacobs,keeler
J.C. Jones <jjones@mozilla.com> - Mon, 13 May 2019 16:24:57 +0000 - rev 473624
Push 113093 by apavel@mozilla.com at Mon, 13 May 2019 22:09:34 +0000
Bug 1551230 - Enable WebAuthn for Nightly Fennec r=KevinJacobs,keeler Differential Revision: https://phabricator.services.mozilla.com/D30937
d8e0bfeb5fa39545f737a6979c94a210d947ab22: Bug 1391438 - Support FIDO2 for WebAuthn on Android r=snorp,keeler
J.C. Jones <jjones@mozilla.com> - Fri, 10 May 2019 16:40:17 +0000 - rev 473459
Push 113084 by rmaries@mozilla.com at Sat, 11 May 2019 10:04:51 +0000
Bug 1391438 - Support FIDO2 for WebAuthn on Android r=snorp,keeler Support using the Google Play-provided FIDO2 API for Web Authentication. FIDO U2F API support is being handled subsequently in Bug 1550625. This patch uses the privileged APIs and thus will only work on Fennec Nightly, Beta, and Release builds. Differential Revision: https://phabricator.services.mozilla.com/D1148
d7b02bc7cf44b2eba303a009a5b2e836d0345b69: Bug 1547877 - enable configuration of new cert storage implementation r=keeler
Myk Melez <myk@mykzilla.org> - Thu, 02 May 2019 23:02:13 +0000 - rev 472400
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1547877 - enable configuration of new cert storage implementation r=keeler Differential Revision: https://phabricator.services.mozilla.com/D29306
47e5e0e6249438e34b11bb582f8a69accf82ae6a: Bug 1547013 - Enable automatically fixing MitM errors by default. r=keeler
Johann Hofmann <jhofmann@mozilla.com> - Thu, 02 May 2019 22:08:44 +0000 - rev 472397
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1547013 - Enable automatically fixing MitM errors by default. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D29764
cf300fac03a9138303b69d90641041a994e51c7d: Bug 1538161 - Vendor rust_cascade r=keeler
Mark Goodwin <mgoodwin@mozilla.com> - Wed, 01 May 2019 19:25:27 +0000 - rev 472156
Push 112983 by nerli@mozilla.com at Thu, 02 May 2019 04:40:32 +0000
Bug 1538161 - Vendor rust_cascade r=keeler Differential Revision: https://phabricator.services.mozilla.com/D24557
54d6029f69a58769752692246ae768701580defb: Bug 1547860 - Update test_tls_server to use TLS 1.3 client cert alert logic r=keeler
J.C. Jones <jc@mozilla.com> - Tue, 30 Apr 2019 21:32:51 +0000 - rev 472066
Push 112974 by ccoroiu@mozilla.com at Wed, 01 May 2019 04:27:55 +0000
Bug 1547860 - Update test_tls_server to use TLS 1.3 client cert alert logic r=keeler Differential Revision: https://phabricator.services.mozilla.com/D29384
aa674b410265213ab67b295f854ef353613a83e3: Bug 1547701 - Use LOAD_BYPASS_URL_ClASSIFIER flag for OCSP request. r=keeler
dlee <dlee@mozilla.com> - Mon, 29 Apr 2019 18:07:23 +0000 - rev 471884
Push 112959 by archaeopteryx@coole-files.de at Tue, 30 Apr 2019 11:38:46 +0000
Bug 1547701 - Use LOAD_BYPASS_URL_ClASSIFIER flag for OCSP request. r=keeler If OCSP request is blocked, we can't get the certificate revocation informatoin. Add nsIChannel::LOAD_BYPASS_URL_ClASSIFIER to enfore URL classifier bypasses OCSP request. Differential Revision: https://phabricator.services.mozilla.com/D29230
ea8bdd612f43f22fa90fe1f87245e73fd1c5319d: Bug 1538161 - Vendor rust_cascade r=keeler
Mark Goodwin <mgoodwin@mozilla.com> - Mon, 29 Apr 2019 19:29:38 +0000 - rev 471811
Push 112953 by shindli@mozilla.com at Tue, 30 Apr 2019 04:15:04 +0000
Bug 1538161 - Vendor rust_cascade r=keeler Differential Revision: https://phabricator.services.mozilla.com/D24557
3fa81f747c9399c04c3c9b7bd76acedcfe3c21dd: Bug 1538161 - Vendor rust_cascade r=keeler
Mark Goodwin <mgoodwin@mozilla.com> - Mon, 29 Apr 2019 14:04:07 +0000 - rev 471744
Push 112948 by shindli@mozilla.com at Mon, 29 Apr 2019 21:58:23 +0000
Bug 1538161 - Vendor rust_cascade r=keeler Differential Revision: https://phabricator.services.mozilla.com/D24557
377dc8053f59bc5ccc3efde2210093cb8e44e5c5: Bug 1541927 - Don't readd CA via policy if it already exists. r=keeler
Michael Kaply <mozilla@kaply.com> - Fri, 26 Apr 2019 21:56:06 +0000 - rev 471610
Push 112929 by nbeleuzu@mozilla.com at Sat, 27 Apr 2019 09:55:23 +0000
Bug 1541927 - Don't readd CA via policy if it already exists. r=keeler Differential Revision: https://phabricator.services.mozilla.com/D28523
0b745e9ecd500577d9da5049ea21980a5f0659d6: Bug 1539549 - update cert blocklist using single transaction r=keeler
Myk Melez <myk@mykzilla.org> - Fri, 26 Apr 2019 20:10:59 +0000 - rev 471599
Push 112929 by nbeleuzu@mozilla.com at Sat, 27 Apr 2019 09:55:23 +0000
Bug 1539549 - update cert blocklist using single transaction r=keeler Differential Revision: https://phabricator.services.mozilla.com/D28540
80374044414da9f5b3634c91345d07612754fcda: Bug 1515465 - Enable EV Treatment for eMudhra Technologies Limited root certificates r=keeler
Kevin Jacobs <kjacobs@mozilla.com> - Thu, 25 Apr 2019 17:46:16 +0000 - rev 471371
Push 112918 by rmaries@mozilla.com at Fri, 26 Apr 2019 09:59:41 +0000
Bug 1515465 - Enable EV Treatment for eMudhra Technologies Limited root certificates r=keeler Differential Revision: https://phabricator.services.mozilla.com/D28583
4ec3f8bab9f32fbcbe04dfda2aa32f8a59389d37: Bug 1532757 - Enable EV Treatment for Hongkong Post Root CA 3 root certificate r=keeler
Kevin Jacobs <kjacobs@mozilla.com> - Wed, 24 Apr 2019 17:08:18 +0000 - rev 471174
Push 112895 by cbrindusan@mozilla.com at Wed, 24 Apr 2019 22:47:15 +0000
Bug 1532757 - Enable EV Treatment for Hongkong Post Root CA 3 root certificate r=keeler This patch enables EV validation for //CN=Hongkong Post Root CA 3// root. Differential Revision: https://phabricator.services.mozilla.com/D28580
e2994266144ab6b2e4a8ee202e949c35cf91a12a: Bug 1545878 - correct certutil path on macOS r=keeler
Myk Melez <myk@mykzilla.org> - Wed, 24 Apr 2019 15:40:44 +0000 - rev 471162
Push 112895 by cbrindusan@mozilla.com at Wed, 24 Apr 2019 22:47:15 +0000
Bug 1545878 - correct certutil path on macOS r=keeler Differential Revision: https://phabricator.services.mozilla.com/D28261
1bb8ad86564867e495067346bef2fa53a6a66872: Bug 1511989, enable TLS 1.3 post-handshake authentication r=keeler
Daiki Ueno <dueno@redhat.com> - Tue, 16 Apr 2019 05:08:16 +0000 - rev 469752
Push 112816 by cbrindusan@mozilla.com at Wed, 17 Apr 2019 09:52:45 +0000
Bug 1511989, enable TLS 1.3 post-handshake authentication r=keeler This adds a config option to enable client authentication through the TLS 1.3 post-handshake auth mechanism. Differential Revision: https://phabricator.services.mozilla.com/D26540
aad1c782f75344b91db649f459dab7691d6a8942: Bug 1542835 - Expose SSLChannelInfo.resumed on nsISSLSocketControl, r=keeler,mayhemer
Michal Novotny <michal.novotny@gmail.com> - Sat, 13 Apr 2019 09:58:00 +0000 - rev 469400
Push 112787 by apavel@mozilla.com at Sat, 13 Apr 2019 21:53:37 +0000
Bug 1542835 - Expose SSLChannelInfo.resumed on nsISSLSocketControl, r=keeler,mayhemer This patch adds resumed attribute to nsISSLSocketControl, which is needed in tests that check SSL resumption (e.g. bug 1500533). Differential Revision: https://phabricator.services.mozilla.com/D26597
92392a7812125784fd9c7342bb0d1c5f6355d929: Bug 1541841 - Ship Remote Settings dump for security-state/intermediates r=keeler
Mathieu Leplatre <mathieu@mozilla.com> - Tue, 09 Apr 2019 08:28:59 +0000 - rev 468527
Push 112733 by csabou@mozilla.com at Tue, 09 Apr 2019 16:30:22 +0000
Bug 1541841 - Ship Remote Settings dump for security-state/intermediates r=keeler Ship Remote Settings dump for security-state/intermediates Differential Revision: https://phabricator.services.mozilla.com/D26301