searching for reviewer(mt)
6d6a45ae267a3cc52a1b6d7db4ec224e1d313f93: Bug 1537701 - Update SSL ciphers and protocols for Android Q; r=mt
Petru Lingurar <petru.lingurar@softvision.ro> - Tue, 14 May 2019 13:09:22 +0000 - rev 473913
Push 113116 by rgurzau@mozilla.com at Wed, 15 May 2019 16:03:00 +0000
Bug 1537701 - Update SSL ciphers and protocols for Android Q; r=mt Added the new Android API 29+ ciphers https://developer.android.com/reference/javax/net/ssl/SSLEngine#cipher-suites and also added TLSv1.3 https://developer.android.com/reference/javax/net/ssl/SSLEngine#protocols Will prefer ChaCha20-Poly1305 which is fastest, thoroughly vetted and battle tested - https://blog.cloudflare.com/do-the-chacha-better-mobile-performance-with-cryptography/ Beside the new additions will still keep support for previous TLSv1.2 and already used ciphers still compatible with Android Q while favoring the 128 versions. Differential Revision: https://phabricator.services.mozilla.com/D30646
ab7db57ad2ac2ebb1818346220f2045968b49415: bug 1549249 - build bustage follow-up r=mt,dveditz a=tomprince
Dana Keeler <dkeeler@mozilla.com> - Tue, 07 May 2019 00:16:00 +0000 - rev 472750
Push 113044 by ryanvm@gmail.com at Tue, 07 May 2019 01:22:27 +0000
bug 1549249 - build bustage follow-up r=mt,dveditz a=tomprince SECItem uses an unsigned int to indicate its length. We need to cast a size_t down to the appropriate size. This is safe because what we're casting will always fit in an unsigned int on the platforms we're using (it's just the size of the intermediate certificate we added). Differential Revision: https://phabricator.services.mozilla.com/D30144
c0639f6015671b79711e355b6c28eb7ca76294b7: Bug 1510898: disable sha1_32 in Nightly builds. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 30 Nov 2018 04:39:59 +0000 - rev 458220
Push 111775 by opoprus@mozilla.com at Fri, 08 Feb 2019 10:16:11 +0000
Bug 1510898: disable sha1_32 in Nightly builds. r=mt Differential Revision: https://phabricator.services.mozilla.com/D13365
7ab42c7de77dc87e141c62138850f7583fbac874: Bug 1494311: Making the mtransport API a little more IPC friendly, and establishing a proper base-class. r=mt,mjf
Byron Campen [:bwc] <docfaraday@gmail.com> - Tue, 29 Jan 2019 14:56:19 +0000 - rev 455945
Push 111564 by shindli@mozilla.com at Tue, 29 Jan 2019 21:55:19 +0000
Bug 1494311: Making the mtransport API a little more IPC friendly, and establishing a proper base-class. r=mt,mjf Differential Revision: https://phabricator.services.mozilla.com/D17272
4458937e3ee03803dee195a36b540fbd36134f17: Bug 1505733: add recording of DTLS protocol version used by PeerConnections. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Sat, 10 Nov 2018 20:29:57 +0000 - rev 446131
Push 109839 by ccoroiu@mozilla.com at Wed, 14 Nov 2018 10:01:06 +0000
Bug 1505733: add recording of DTLS protocol version used by PeerConnections. r=mt Differential Revision: https://phabricator.services.mozilla.com/D11300
ae266baf08fe02facf73233fccf30140a42ef0f4: Bug 1227519: remove DHE ciphers from WebRTC DTLS handshake. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Mon, 22 Oct 2018 22:58:48 +0000 - rev 442496
Push 109178 by ebalazs@mozilla.com at Tue, 23 Oct 2018 09:34:17 +0000
Bug 1227519: remove DHE ciphers from WebRTC DTLS handshake. r=mt Differential Revision: https://phabricator.services.mozilla.com/D7965
62f5e5f579e7dddadf97483f4df5db093ae3e4eb: Bug 1498068: fixed SRTP key length assertion for GCM 128 bit. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Tue, 16 Oct 2018 03:30:57 +0000 - rev 441530
Push 109010 by shindli@mozilla.com at Wed, 17 Oct 2018 01:00:16 +0000
Bug 1498068: fixed SRTP key length assertion for GCM 128 bit. r=mt Differential Revision: https://phabricator.services.mozilla.com/D8324
432a98e50d2bfab224328254266069aef1a474cc: Bug 1479787 - use NSS mozpkix in Firefox, r=mt,keeler,glandium
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 02 Oct 2018 14:59:34 +0200 - rev 439155
Push 108518 by franziskuskiefer@gmail.com at Tue, 02 Oct 2018 14:41:25 +0000
Bug 1479787 - use NSS mozpkix in Firefox, r=mt,keeler,glandium Differential Revision: https://phabricator.services.mozilla.com/D2725 Differential Revision: https://phabricator.services.mozilla.com/D2860
fd2a0cc4b40afeb46ac88965237bfefaa58702ae: Bug 1479787 - delete mozpkix, r=mt,keeler
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 02 Oct 2018 12:40:22 +0200 - rev 439154
Push 108518 by franziskuskiefer@gmail.com at Tue, 02 Oct 2018 14:41:25 +0000
Bug 1479787 - delete mozpkix, r=mt,keeler Differential Revision: https://phabricator.services.mozilla.com/D2722
b2b65230f72439afb4e030f0301931c1da35d313: Bug 1491511: add Telemetry for SRTP cipher usage. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Wed, 19 Sep 2018 00:08:25 +0000 - rev 437372
Push 108057 by btara@mozilla.com at Thu, 20 Sep 2018 04:17:33 +0000
Bug 1491511: add Telemetry for SRTP cipher usage. r=mt Bug 1491511: add Telemetry for SRTP cipher usage. r=mt Differential Revision: https://phabricator.services.mozilla.com/D5956
cf2e01678e1f28b0df299da82a160969373e26ab: Bug 1480869: define SRTP ciphers suites inside mtransport r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Tue, 11 Sep 2018 03:58:34 +0000 - rev 435652
Push 107698 by csabou@mozilla.com at Tue, 11 Sep 2018 10:17:55 +0000
Bug 1480869: define SRTP ciphers suites inside mtransport r=mt define SRTP cipher suites inside mtransport Differential Revision: https://phabricator.services.mozilla.com/D5490
07600cea66576d9be76041dc5e6fb6b4b5dfbefa: bug 1487517 - un-do ciphersuite hiding from bug 1279479 and bug 1316300 r=mt
Dana Keeler <dkeeler@mozilla.com> - Fri, 31 Aug 2018 00:18:36 +0000 - rev 434183
Push 107287 by rgurzau@mozilla.com at Fri, 31 Aug 2018 04:09:26 +0000
bug 1487517 - un-do ciphersuite hiding from bug 1279479 and bug 1316300 r=mt In bug 1279479 and bug 1316300 we hid some ciphersuites from TLS 1.3 handshakes, assuming we would fall back to TLS 1.2 if the peer needed them. However, as of bug 1479501, we don't fall back by default, so this just means we can't negotiate these ciphersuites. This patch un-hides these ciphersuites from the TLS 1.3 handshake. Differential Revision: https://phabricator.services.mozilla.com/D4725
34ee6df8cb72825769ac3fc3cb946fea424e0f9e: Bug 1484024: add Telemetry histogram for DTLS ciphers on RTCPeerConnection r=francois,mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 24 Aug 2018 22:49:42 +0000 - rev 433406
Push 107050 by ncsoregi@mozilla.com at Sat, 25 Aug 2018 21:40:07 +0000
Bug 1484024: add Telemetry histogram for DTLS ciphers on RTCPeerConnection r=francois,mt Added a Telemetry histrogram which collects which DTLS cipher got negotiated when a RTCPeerConnection connected. Differential Revision: https://phabricator.services.mozilla.com/D3551
ddb66025724b2ebae3b0d8493c0093e6fcfce1af: Bug 1453795 - DOM/Crypto - Initialize member fields in classes/ structures. r=mt
Andi-Bogdan Postelnicu <bpostelnicu@mozilla.com> - Wed, 11 Jul 2018 10:37:57 +0300 - rev 426673
Push 105283 by bpostelnicu@mozilla.com at Sun, 15 Jul 2018 13:28:20 +0000
Bug 1453795 - DOM/Crypto - Initialize member fields in classes/ structures. r=mt
444064b5910ead569165e8a1ef60136107f43e79: Bug 1446880: updated IDP interface to use RTCIdentityProviderOptions. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Tue, 20 Mar 2018 11:15:10 +0000 - rev 411861
Push 101767 by nerli@mozilla.com at Thu, 05 Apr 2018 10:44:37 +0000
Bug 1446880: updated IDP interface to use RTCIdentityProviderOptions. r=mt MozReview-Commit-ID: 2xwDYR2kk27
64c883d5d65f8769bc385d75f2ea4152c5e38525: Bug 1446880: update setIdentityProvider() to take RTCIdentityProviderOptions. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Mon, 19 Mar 2018 06:16:20 +0000 - rev 411860
Push 101767 by nerli@mozilla.com at Thu, 05 Apr 2018 10:44:37 +0000
Bug 1446880: update setIdentityProvider() to take RTCIdentityProviderOptions. r=mt MozReview-Commit-ID: Hx3LV9Uw7fi
3d162d7e272182ae3723448ecd6dbf84c6ccf4b2: Bug 1446880: updated IDP interface to use RTCIdentityProviderOptions. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Tue, 20 Mar 2018 11:15:10 +0000 - rev 411760
Push 101752 by nbeleuzu@mozilla.com at Wed, 04 Apr 2018 22:10:17 +0000
Bug 1446880: updated IDP interface to use RTCIdentityProviderOptions. r=mt MozReview-Commit-ID: 2xwDYR2kk27
7142d472f2a4efb014983d4f2c01fa4128084d4d: Bug 1446880: update setIdentityProvider() to take RTCIdentityProviderOptions. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Mon, 19 Mar 2018 06:16:20 +0000 - rev 411759
Push 101752 by nbeleuzu@mozilla.com at Wed, 04 Apr 2018 22:10:17 +0000
Bug 1446880: update setIdentityProvider() to take RTCIdentityProviderOptions. r=mt MozReview-Commit-ID: Hx3LV9Uw7fi
8715148b05f8799a2de5104078b601dd7706f11f: Bug 1442128 - support aes128gcm encryption in PushCrypto.jsm. r=kitcambridge,mt
Mark Hammond <mhammond@skippinet.com.au> - Tue, 20 Feb 2018 12:01:08 +1100 - rev 408951
Push 101078 by shindli@mozilla.com at Tue, 20 Mar 2018 10:16:31 +0000
Bug 1442128 - support aes128gcm encryption in PushCrypto.jsm. r=kitcambridge,mt MozReview-Commit-ID: HqLxm7wuZuv
0665d23d7e8788a07048f1454ea4457c0197b9d0: Bug 1445860: set PeerIdenity only on transmitting Transceivers. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Wed, 14 Mar 2018 20:47:45 -0700 - rev 408662
Push 100996 by btara@mozilla.com at Sat, 17 Mar 2018 10:37:43 +0000
Bug 1445860: set PeerIdenity only on transmitting Transceivers. r=mt MozReview-Commit-ID: 10rKPDwuh9d
6425eadbba7a31dc9f758a74e8eae69b0b150b5a: Bug 1440467 - Add a pref to always connect to the Push server without existing subscriptions. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Thu, 22 Feb 2018 19:58:20 -0800 - rev 405474
Push 100235 by aiakab@mozilla.com at Tue, 27 Feb 2018 10:06:18 +0000
Bug 1440467 - Add a pref to always connect to the Push server without existing subscriptions. r=mt MozReview-Commit-ID: ARXbgfaMJDd
e21956fd51a330cad2301e49bb458e2ca94c5368: bug 1421084 - part 4/4 - remove nsNSSShutDown.h and (hopefully) all references to it r=mt,ttaubert
David Keeler <dkeeler@mozilla.com> - Wed, 24 Jan 2018 14:44:01 -0800 - rev 402144
Push 99498 by rgurzau@mozilla.com at Thu, 01 Feb 2018 21:59:17 +0000
bug 1421084 - part 4/4 - remove nsNSSShutDown.h and (hopefully) all references to it r=mt,ttaubert MozReview-Commit-ID: 2mhvHsC5Nil
0d42218045d9de6b746b09669dedb0e30e8005c3: bug 1421084 - part 3/4 - remove nsNSSShutDownObject::shutdown and virtualDestroyNSSReference r=mt,ttaubert
David Keeler <dkeeler@mozilla.com> - Wed, 24 Jan 2018 14:29:08 -0800 - rev 402143
Push 99498 by rgurzau@mozilla.com at Thu, 01 Feb 2018 21:59:17 +0000
bug 1421084 - part 3/4 - remove nsNSSShutDownObject::shutdown and virtualDestroyNSSReference r=mt,ttaubert MozReview-Commit-ID: ErL7ZjAGVVC
ecb9941ee0344bd6952724e371589c3d0834e30d: bug 1421084 - part 2/4 - remove nsNSSShutDownObject::isAlreadyShutDown() r=mt,ttaubert
David Keeler <dkeeler@mozilla.com> - Tue, 23 Jan 2018 12:22:56 -0800 - rev 402142
Push 99498 by rgurzau@mozilla.com at Thu, 01 Feb 2018 21:59:17 +0000
bug 1421084 - part 2/4 - remove nsNSSShutDownObject::isAlreadyShutDown() r=mt,ttaubert MozReview-Commit-ID: DlS16pHE0Ik
b2b6ca8d0f70173d7b18bca53fa4e7a57dba9a14: bug 1421084 - part 1/4 - remove now-unnecessary nsNSSShutDownPreventionLock r=mt,ttaubert
David Keeler <dkeeler@mozilla.com> - Tue, 23 Jan 2018 10:37:47 -0800 - rev 402141
Push 99498 by rgurzau@mozilla.com at Thu, 01 Feb 2018 21:59:17 +0000
bug 1421084 - part 1/4 - remove now-unnecessary nsNSSShutDownPreventionLock r=mt,ttaubert As of bug 1417680, the NSS shutdown tracking infrastructure is unnecessary (and does nothing anyway). This series of changesets removes the remaining pieces in a way that is hopefully easy to confirm is correct. MozReview-Commit-ID: 8Y5wpsyNlGc
4d60239251ae8b0447cbb66c6c91794c81454467: Bug 1353762 - Check for OOM when creating WebCryptoTasks r=keeler,mt
Tim Taubert <ttaubert@mozilla.com> - Mon, 28 Aug 2017 14:26:10 +0200 - rev 377153
Push 94226 by ttaubert@mozilla.com at Mon, 28 Aug 2017 12:28:12 +0000
Bug 1353762 - Check for OOM when creating WebCryptoTasks r=keeler,mt
0861e5c3f2718bb52d9eefd42b2f6ec51acf4ae3: Bug 1345665 - Improve push crypto tests. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Wed, 10 May 2017 10:35:42 -0700 - rev 358062
Push 90256 by ryanvm@gmail.com at Fri, 12 May 2017 16:11:50 +0000
Bug 1345665 - Improve push crypto tests. r=mt MozReview-Commit-ID: 5zkqDEryGsA
7c9b4296270538c9156649969b32c137895d3c34: Bug 1345665 - Implement the "aes128gcm" push decryption scheme. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Thu, 11 May 2017 22:03:26 -0700 - rev 358061
Push 90256 by ryanvm@gmail.com at Fri, 12 May 2017 16:11:50 +0000
Bug 1345665 - Implement the "aes128gcm" push decryption scheme. r=mt MozReview-Commit-ID: 3touVfeSDwE
f43eac0536675171e34e22eb6e4b1664b4574daf: Bug 1345665 - Refactor push decryption into separate decoder classes. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Wed, 10 May 2017 10:44:51 -0700 - rev 358060
Push 90256 by ryanvm@gmail.com at Fri, 12 May 2017 16:11:50 +0000
Bug 1345665 - Refactor push decryption into separate decoder classes. r=mt This patch moves the decryption methods into a base `Decoder` class, and an intermediate `OldSchemeDecoder` with subclasses for aesgcm and aesgcm128. The base class provides a `decrypt` method that computes the ECDH shared secret, derives the key and nonce, decrypts each record, and removes padding. Subclasses implement `deriveKeyAndNonce`, `unpadChunk`, `chunkSize`, and `padSize`. MozReview-Commit-ID: IuGPaofWKNq
2cedd1aab52c76a8f39bc9bf57a3798c0129353c: Bug 1342579: remove js version from threeUnbundledConnections test (really bug 1342144). r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Thu, 27 Apr 2017 10:03:07 -0700 - rev 355160
Push 89652 by drno@ohlmeier.org at Thu, 27 Apr 2017 18:19:12 +0000
Bug 1342579: remove js version from threeUnbundledConnections test (really bug 1342144). r=mt MozReview-Commit-ID: 7IQ0uFD55GE
1979070698f1faf642802fd1be5b7c5a51dd0657: Bug 1303867: destroy SSL FD to send out DTLS allert on close. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Thu, 20 Apr 2017 19:52:24 -0700 - rev 354700
Push 89524 by ihsiao@mozilla.com at Tue, 25 Apr 2017 03:30:28 +0000
Bug 1303867: destroy SSL FD to send out DTLS allert on close. r=mt MozReview-Commit-ID: EaMkehmTcs3
830770d5c2b8dbcd7218d1ca9e49fa9126e07954: Bug 1342579: verify that a single PC can connect to different endpoints. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 24 Feb 2017 15:50:07 -0800 - rev 347195
Push 87995 by cbook@mozilla.com at Mon, 13 Mar 2017 14:25:56 +0000
Bug 1342579: verify that a single PC can connect to different endpoints. r=mt MozReview-Commit-ID: 8AKh3hvFIj9
63b5159df4e5c815db0400ce3e3258727423cae1: Bug 1279479 - Remove DHE cipher suites from TLS 1.3 ClientHello. r=keeler,mt
Masatoshi Kimura <VYV03354@nifty.ne.jp> - Wed, 01 Mar 2017 20:57:08 +0900 - rev 345716
Push 87660 by cbook@mozilla.com at Fri, 03 Mar 2017 12:06:50 +0000
Bug 1279479 - Remove DHE cipher suites from TLS 1.3 ClientHello. r=keeler,mt Hiding cipher suites behind fallback to measure the impact of DHE removal. This patch itself will not improve security because MITM can trigger the fallback. Unlike the previous attempt, this patch will not affect WebRTC because it does not touch default cipher prefs. MozReview-Commit-ID: 82paUEuPu99
356449a93a4c2f3262b982d3fd621d880c919ac9: Bug 1340854 - Properly report TLS handshake telemetry for 0 length reads. r=mt
EKR <ekr@rtfm.com> - Sat, 18 Feb 2017 11:27:21 -0800 - rev 343679
Push 87185 by ekr@mozilla.com at Mon, 20 Feb 2017 00:03:40 +0000
Bug 1340854 - Properly report TLS handshake telemetry for 0 length reads. r=mt
58f35b43e9f8b38575e9c5773485e05e916b7cee: Bug 1329193: Use es6 classes in PeerConnection.js. r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Thu, 05 Jan 2017 22:47:25 -0500 - rev 328896
Push 85584 by cbook@mozilla.com at Wed, 11 Jan 2017 15:52:28 +0000
Bug 1329193: Use es6 classes in PeerConnection.js. r=mt MozReview-Commit-ID: FtVZXPA9ckJ
294ce2352aa7574de1353a6f75ccc0a664752589: Bug 1323998 - Stop using Scoped.h NSS types in dtlsidentity.(cpp|h) and nricectx.cpp. r=mt
Cykesiopka <cykesiopka.bmo@gmail.com> - Wed, 21 Dec 2016 22:09:10 +0800 - rev 326990
Push 85073 by cbook@mozilla.com at Thu, 22 Dec 2016 15:25:55 +0000
Bug 1323998 - Stop using Scoped.h NSS types in dtlsidentity.(cpp|h) and nricectx.cpp. r=mt Scoped.h is deprecated. MozReview-Commit-ID: IRFLV2mfN4J
d840edb5b3ec4c3c313af96a2a68408cd00f3e07: Bug 1306359 - Stop using Scoped.h NSS types in RTCCertificate.(cpp|h). r=mt
Cykesiopka <cykesiopka.bmo@gmail.com> - Thu, 15 Dec 2016 22:19:16 +0800 - rev 326246
Push 84924 by philringnalda@gmail.com at Sat, 17 Dec 2016 22:02:52 +0000
Bug 1306359 - Stop using Scoped.h NSS types in RTCCertificate.(cpp|h). r=mt Scoped.h is deprecated. MozReview-Commit-ID: BHBVng3Dhmw
887e43c3474fdb24fdc2a8f43682abf170d78a66: Bug 1322274: Test sender.replaceTrack and other methods on close in parallel. r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Wed, 07 Dec 2016 18:37:51 -0500 - rev 325614
Push 84737 by philringnalda@gmail.com at Sun, 11 Dec 2016 21:50:03 +0000
Bug 1322274: Test sender.replaceTrack and other methods on close in parallel. r=mt MozReview-Commit-ID: 1aDeoLVDHkL
d5447e1a4829a221aff8a55f769cf77ff015d144: Bug 1322274: Use this._async() wrapper in PeerConnection.js for cleaner code r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Sun, 27 Nov 2016 10:34:46 -0500 - rev 325613
Push 84737 by philringnalda@gmail.com at Sun, 11 Dec 2016 21:50:03 +0000
Bug 1322274: Use this._async() wrapper in PeerConnection.js for cleaner code r=mt MozReview-Commit-ID: C5wwHiitrEz
02d05b00f0ad457aa55009a0cf43fe57380dbfa2: Bug 1322274: Use async/await in PeerConnection.js r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Mon, 21 Nov 2016 15:27:23 -0500 - rev 325612
Push 84737 by philringnalda@gmail.com at Sun, 11 Dec 2016 21:50:03 +0000
Bug 1322274: Use async/await in PeerConnection.js r=mt MozReview-Commit-ID: Gst18ZHPlvl
a5336dc0dedca722c8aff65644c50ad02e436f5a: Bug 1322274: Use destructuring in PeerConnection.js r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Sat, 19 Nov 2016 16:47:10 -0500 - rev 325611
Push 84737 by philringnalda@gmail.com at Sun, 11 Dec 2016 21:50:03 +0000
Bug 1322274: Use destructuring in PeerConnection.js r=mt MozReview-Commit-ID: 6qselFFnGJp
e09ad423360bda5f6d7ec91ff3b64a5928fe1609: Bug 1322274: Make internal pc._legacyCatchAndCloseGuard responsible for checking closed state. r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Thu, 17 Nov 2016 01:56:26 -0500 - rev 325610
Push 84737 by philringnalda@gmail.com at Sun, 11 Dec 2016 21:50:03 +0000
Bug 1322274: Make internal pc._legacyCatchAndCloseGuard responsible for checking closed state. r=mt MozReview-Commit-ID: LYS2pjg9GEv
42e13e249e20fe640d42938814ef46888f0af84c: Bug 1322274: Make internal pc._legacyCatchAndCloseGuard responsible for returning content promise. r=mt
Jan-Ivar Bruaroey <jib@mozilla.com> - Thu, 17 Nov 2016 00:22:43 -0500 - rev 325609
Push 84737 by philringnalda@gmail.com at Sun, 11 Dec 2016 21:50:03 +0000
Bug 1322274: Make internal pc._legacyCatchAndCloseGuard responsible for returning content promise. r=mt MozReview-Commit-ID: WovvgG4Olp
ca0017c90ad0fb11dbf4ecd3409f9bf196059869: bug 1195434 - specify what signature schemes the platform will actually accept in TLS handshakes r=mt
David Keeler <dkeeler@mozilla.com> - Thu, 03 Nov 2016 12:53:23 -0700 - rev 321585
Push 83647 by kwierso@gmail.com at Tue, 08 Nov 2016 22:08:41 +0000
bug 1195434 - specify what signature schemes the platform will actually accept in TLS handshakes r=mt MozReview-Commit-ID: A3T4EgEfcfy
ef16dca832723f5023ee5af5ddcf87a02d1e9188: Bug 1306714: Use RFC 7983 detection for DTLS packets. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 30 Sep 2016 00:00:54 -0700 - rev 319601
Push 83207 by philringnalda@gmail.com at Thu, 27 Oct 2016 01:59:11 +0000
Bug 1306714: Use RFC 7983 detection for DTLS packets. r=mt MozReview-Commit-ID: L1BYAFmJOug
8f1273f17e6f0665d1ae0e8fff595bec69194b62: Bug 1307577 - Switch to `createCodebasePrincipal` in `PushRecord`. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Thu, 20 Oct 2016 10:29:58 -0700 - rev 318918
Push 83036 by ryanvm@gmail.com at Fri, 21 Oct 2016 15:09:08 +0000
Bug 1307577 - Switch to `createCodebasePrincipal` in `PushRecord`. r=mt `createCodebasePrincipalFromOrigin` mangles the origin after extracting the suffix. The proper long-term fix is to serialize and store the original principal, instead of reconstructing a new codebase principal from the scope and origin suffix. MozReview-Commit-ID: bS2lRx3n7j
60695923e60db47f2abc48eaf1c31c0c666c5cf9: Bug 1310061: avoid interop issues with SHA384. r=mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 14 Oct 2016 11:49:32 -0700 - rev 318098
Push 82850 by drno@ohlmeier.org at Sat, 15 Oct 2016 19:05:09 +0000
Bug 1310061: avoid interop issues with SHA384. r=mt MozReview-Commit-ID: 67cJdDWCMAs
493604f175c858dc059b28e6496e9fc13bd938b4: Bug 1309859 - Send two key shares in tls1.3 client hello, r=mt,keeler
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 13 Oct 2016 14:15:51 +0200 - rev 317995
Push 82810 by franziskuskiefer@gmail.com at Fri, 14 Oct 2016 16:56:33 +0000
Bug 1309859 - Send two key shares in tls1.3 client hello, r=mt,keeler
82ceed71dac7fd1b76c9bbc4a63fd43404494ac2: Bug 1301469 - Add localized decryption errors for invalid headers and padding. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Wed, 05 Oct 2016 08:57:52 -0700 - rev 316910
Push 82569 by ryanvm@gmail.com at Fri, 07 Oct 2016 13:44:46 +0000
Bug 1301469 - Add localized decryption errors for invalid headers and padding. r=mt Web Crypto returns an unhelpful "operation failed for an operation-specific reason" error if the actual decryption fails, but we can report more useful errors for missing and invalid header values. MozReview-Commit-ID: JRdGHBUodmb
74d4c026cca8d64b9176912a7493d102da4bad8b: Bug 1301469 - Handle exceptions thrown by `PushCrypto.decodeMsg` as decryption errors. r=mt
Kit Cambridge <kit@yakshaving.ninja> - Wed, 05 Oct 2016 08:56:55 -0700 - rev 316909
Push 82569 by ryanvm@gmail.com at Fri, 07 Oct 2016 13:44:46 +0000
Bug 1301469 - Handle exceptions thrown by `PushCrypto.decodeMsg` as decryption errors. r=mt Previously, errors thrown by `decodeMsg` and `getCryptoParams` would bubble up to the catch handler in `receivedPushMessage`, causing us to report "ACK_NOT_DELIVERED" instead of "ACK_DECRYPTION_ERROR" in the ack sent to the server. MozReview-Commit-ID: FZFzYdebQGy