04505948cead24b52eade7cd81b7a22de558b1c4: Bug 570340: don't use amd64 assembly code on mingw-w64 because it's not yet
wtc%google.com - Fri, 06 Apr 2012 01:49:06 +0000 - rev 10294
Bug 570340: don't use amd64 assembly code on mingw-w64 because it's not yet mingw-w64 compatible. The patch is contributed by Jacek Caban <jacek@codeweavers.com>. r=wtc.
6648d15e2b5aef205e9d52d9248315f693de4074: Bug 540535: Don't call ss->sec.uncache() if the SSL_NO_CACHE option is
wtc%google.com - Fri, 06 Apr 2012 01:30:35 +0000 - rev 10293
Bug 540535: Don't call ss->sec.uncache() if the SSL_NO_CACHE option is enabled. Patch contributed by Alexei Volkov <alvolkov.bgs@gmail.com> and Eric Rescorla <ekr@rtfm.com>. r=wtc.
f1e1df1ba5dfead46d6bb58cc6eaeb98059ba4e5: Bug 681065: rename dtls1con.c to dtlscon.c.
wtc%google.com - Fri, 06 Apr 2012 00:34:25 +0000 - rev 10292
Bug 681065: rename dtls1con.c to dtlscon.c. Modified Files: manifest.mn Added Files: dtlscon.c Removed Files: dtls1con.c
bb5746690e18905f9e2b5befbeb88377aa788761: Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be NSS_3_13_4_BRANCH NSS_3_13_4_BETA2
wtc%google.com - Thu, 05 Apr 2012 21:14:22 +0000 - rev 10291
Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be zero length if a secret key disguised as an RSA key cannot be decoded. This allows us to decode secret keys that have an improperly encoded modulus (a zero-length integer). The patch is partially contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=Kaspar Brand. Modified Files: Tag: NSS_3_13_4_BRANCH keydb.c lowkey.c lowkeyti.h
d7b59324ae77f1d9f833d66fa94a62235893820b: Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be
wtc%google.com - Thu, 05 Apr 2012 21:10:04 +0000 - rev 10290
Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be zero length if a secret key disguised as an RSA key cannot be decoded. This allows us to decode secret keys that have an improperly encoded modulus (a zero-length integer). The patch is partially contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=Kaspar Brand. Modified Files: keydb.c lowkey.c lowkeyti.h
d01852bd7089979d54d6b886409972f7eff39992: Bug 681065: export the new DTLS_GetTimeout function.
wtc%google.com - Thu, 05 Apr 2012 01:43:30 +0000 - rev 10289
Bug 681065: export the new DTLS_GetTimeout function.
b4822dbd34e813a056780f298786f2571e3d764e: Bug 681065: Implement DTLS (Datagram TLS) 1.0. The patch is contributed by
wtc%google.com - Wed, 04 Apr 2012 03:37:07 +0000 - rev 10288
Bug 681065: Implement DTLS (Datagram TLS) 1.0. The patch is contributed by Eric Rescorla <ekr@rtfm.com>. r=wtc. Modified Files: SSLerrs.h derive.c manifest.mn ssl.def ssl.h ssl3con.c ssl3gthr.c ssl3prot.h sslcon.c ssldef.c sslerr.h sslgathr.c sslimpl.h sslproto.h sslsecur.c sslsock.c sslt.h Added Files: dtls1con.c
cdec07d2eca6cb9acd1cbdad76702884feccd82c: Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style. NSS_3_13_4_BRANCH
wtc%google.com - Wed, 04 Apr 2012 00:09:17 +0000 - rev 10287
Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style. Tag: NSS_3_13_4_BRANCH
43b63a4fc46a8dd60388819826d31db1f96be706: Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style.
wtc%google.com - Wed, 04 Apr 2012 00:08:41 +0000 - rev 10286
Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style.
250fee8f1897e8c534876f2be208c267a64f489a: Bug 565047: Block export cipher suites when TLS 1.1 is negotiated. The
wtc%google.com - Tue, 03 Apr 2012 02:30:54 +0000 - rev 10285
Bug 565047: Block export cipher suites when TLS 1.1 is negotiated. The patch is contributed by Brian Smith <bsmith@mozilla.com>. r=wtc. Modified Files: SSLerrs.h ssl3con.c sslerr.h
242d9742edfa1d3871c6cb928f50d39519641a3c: Bug 697910: ssl3_HandleHandshake should handle SECWouldBlock from
wtc%google.com - Tue, 03 Apr 2012 02:00:14 +0000 - rev 10284
Bug 697910: ssl3_HandleHandshake should handle SECWouldBlock from ssl3_HandleHandshakeMessage when the handshake message spans multiple TLS records. Patch by Brian Smith <bsmith@mozilla.com>. r=wtc.
cd0b2db24f82511391ef9b6a001b6fa0507f1980: Bug 741481: cert_InitLocks should reset certRefCountLock to NULL after NSS_3_13_4_BRANCH
wtc%google.com - Tue, 03 Apr 2012 00:38:19 +0000 - rev 10283
Bug 741481: cert_InitLocks should reset certRefCountLock to NULL after calling PZ_DestroyLock(certRefCountLock). The patch is contributed by Ben Chan <benchan@chromium.org>. r=wtc. Tag: NSS_3_13_4_BRANCH
445e053913ca65dd5f56659adac24eda77709025: Bug 741481: cert_InitLocks should reset certRefCountLock to NULL after
wtc%google.com - Tue, 03 Apr 2012 00:33:36 +0000 - rev 10282
Bug 741481: cert_InitLocks should reset certRefCountLock to NULL after calling PZ_DestroyLock(certRefCountLock). The patch is contributed by Ben Chan <benchan@chromium.org>. r=wtc.
5aa694dc13d8d0c56abc5977feea984dc79b8a26: Bug 734534: Fix nits in the next protocol negotiation (NPN) functions. NSS_3_13_4_BRANCH NSS_3_13_4_BETA1
wtc%google.com - Sat, 31 Mar 2012 23:16:38 +0000 - rev 10281
Bug 734534: Fix nits in the next protocol negotiation (NPN) functions. r=agl. Tag: NSS_3_13_4_BRANCH
7ccee63aa410303d04ebaad853ed3b84a797d3a2: fixup commit for branch 'NSS_3_13_4_BRANCH' NSS_3_13_4_BRANCH
cvs2hg - Sat, 31 Mar 2012 15:54:05 +0000 - rev 10280
fixup commit for branch 'NSS_3_13_4_BRANCH'
3097ccfec15a42e0f6d8a73ff8739e0beeca32cc: fixup commit for tag 'NSS_3_13_4_BASE' NSS_3_13_4_BASE
cvs2hg - Sat, 31 Mar 2012 15:54:04 +0000 - rev 10279
fixup commit for tag 'NSS_3_13_4_BASE'
daae0dee97135afb8bbda95da8ada95b71a9f894: Bug 647364: Revert the incorrect reference count bug fixes in the previous
wtc%google.com - Sat, 31 Mar 2012 15:54:03 +0000 - rev 10278
Bug 647364: Revert the incorrect reference count bug fixes in the previous checkin. PKIX_DECREF already sets its argument to NULL.
f51d946ac80bc648dde9713842d7dee01e972457: Bug 715073: grab the CKA_ID from the pubkey argument in lg_mkSecretKeyRep.
wtc%google.com - Sat, 31 Mar 2012 04:59:37 +0000 - rev 10277
Bug 715073: grab the CKA_ID from the pubkey argument in lg_mkSecretKeyRep. The patch is contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=wtc.
630cc113bd2233ea2d13a3a630b97b8dfc4deb9e: Bug 715073: ASN.1 types that must have at least one content octet are not
wtc%google.com - Sat, 31 Mar 2012 04:50:22 +0000 - rev 10276
Bug 715073: ASN.1 types that must have at least one content octet are not allowed to be zero length. When returning a SECItem of zero length, set the data pointer to NULL. The patch is contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=rrelyea,wtc.
319f379d6261e057cdf17a1f89cc980f30ae608b: Change the NSS version on the trunk to 3.13.5 Beta.
wtc%google.com - Sat, 31 Mar 2012 02:02:35 +0000 - rev 10275
Change the NSS version on the trunk to 3.13.5 Beta. Modified Files: lib/nss/nss.h lib/softoken/softkver.h lib/ssl/ssl.def lib/util/nssutil.h
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 tip