33f5160584ccdf9cdcb50793b9b8919eee05afd3: Bug 1236720 - clang-format, a=bustage
Martin Thomson <martin.thomson@gmail.com> - Thu, 02 Nov 2017 19:06:42 +1100 - rev 14080
Push 2855 by martin.thomson@gmail.com at Thu, 02 Nov 2017 08:08:11 +0000
Bug 1236720 - clang-format, a=bustage
ff98dd3880a3258a052ba3d684d024a68472ee70: branch for 3.34 release NSS_3_34_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 02 Nov 2017 09:03:20 +0100 - rev 14079
Push 2854 by franziskuskiefer@gmail.com at Thu, 02 Nov 2017 08:08:00 +0000
branch for 3.34 release DONTBUILD
7345a09561bb4290f7ffeba55329671cb524b9c5: Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt
Robert Relyea <rrelyea@redhat.com> - Wed, 01 Nov 2017 12:42:41 -0700 - rev 14078
Push 2853 by elio.maldonado.batiz@gmail.com at Wed, 01 Nov 2017 19:44:20 +0000
Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt - Original patch by Robert Relyea was modified to make the tests gtests unit tests - Tests modifications are a collaboration between Martin Thomson and Elio Maldonado
9d1576864bf1f1f1e32fba87f8f16e83d0d92f94: Bug 1398679 - Make cipher specs properly directional, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Mon, 11 Sep 2017 15:49:53 +1000 - rev 14077
Push 2852 by martin.thomson@gmail.com at Wed, 01 Nov 2017 04:30:05 +0000
Bug 1398679 - Make cipher specs properly directional, r=ekr This makes each cipher spec unidirectional. This is a tiny bit less efficient in TLS 1.2 and earlier, where some of the material could be shared (a few pointers essentially) but it is much more efficient for TLS 1.3. There is now only one variable of each type on the specs. Up to now, the specs had two copies of almost everything to support being used for both read and write. Now there are separate specs for reading and writing. We only duplicate the pointers to the master secret, and the cipher definitions. This also does away with the backing array that was used to hold two copies of specs. Cipher specs are allocated on the heap as they are used and reference counted, using the same system as is already used for TLS 1.3. This uses the |direction| attribute that was previously added for TLS 1.3 and uses that more thoroughly.
24354fddeda32cef1501f763428885a88165016a: Bug 1413038 - Flatten client_ and server_random, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Tue, 31 Oct 2017 10:18:04 +1100 - rev 14076
Push 2851 by martin.thomson@gmail.com at Tue, 31 Oct 2017 00:56:30 +0000
Bug 1413038 - Flatten client_ and server_random, r=ekr
01ba3ad3ee1e464a8b8891d13a389b0fbadb7784: Added tag NSS_3_34_BETA1 for changeset 32c9bbad2655
Kai Engert <kaie@kuix.de> - Mon, 30 Oct 2017 12:14:36 +0100 - rev 14075
Push 2850 by kaie@kuix.de at Mon, 30 Oct 2017 11:14:17 +0000
Added tag NSS_3_34_BETA1 for changeset 32c9bbad2655 DONTBUILD
32c9bbad265504522441f601333f0b89861a15d1: Bug 1202413, because PK11_CreateGenericObject() leaks by design, add non-leaking PK11_CreateManagedGenericObject() API, early patch reviewed by Martin Thomson, r=kaie NSS_3_34_BETA1
Bob Relyea <rrelyea@redhat.com> - Mon, 30 Oct 2017 10:38:09 +0100 - rev 14074
Push 2849 by kaie@kuix.de at Mon, 30 Oct 2017 09:37:57 +0000
Bug 1202413, because PK11_CreateGenericObject() leaks by design, add non-leaking PK11_CreateManagedGenericObject() API, early patch reviewed by Martin Thomson, r=kaie
c04395842414d18ca772b35df0c20eb9ce8d4c9c: Bug 1341302, certutil: document RSA-PSS options, r=hkario, r=kaie
Daiki Ueno <dueno@redhat.com> - Fri, 27 Oct 2017 11:11:31 +0200 - rev 14073
Push 2848 by dueno@redhat.com at Fri, 27 Oct 2017 15:00:22 +0000
Bug 1341302, certutil: document RSA-PSS options, r=hkario, r=kaie
0b57f11ba44208b61b63fedc72adef7c12c23491: Bug 1406891, Make pk12util documentation mention only working ciphers, r=hkario, r=kaie
Daiki Ueno <dueno@redhat.com> - Mon, 09 Oct 2017 12:05:37 +0200 - rev 14072
Push 2847 by dueno@redhat.com at Fri, 27 Oct 2017 14:50:45 +0000
Bug 1406891, Make pk12util documentation mention only working ciphers, r=hkario, r=kaie
98403e8b5d48b3f1de0aefe2bfd5750e0c9e1470: Bug 1278071, decrease the number of iterations by factor 10, as a temporary workaround to test timeouts, r=fkiefer
Kai Engert <kaie@kuix.de> - Fri, 27 Oct 2017 09:26:42 +0200 - rev 14071
Push 2846 by kaie@kuix.de at Fri, 27 Oct 2017 07:26:18 +0000
Bug 1278071, decrease the number of iterations by factor 10, as a temporary workaround to test timeouts, r=fkiefer
300a20af3d82f1df466b55434fa61ee6da443013: Bug 1411500, Check return values in cryptohi_unittest.cc, r=fkiefer
Daiki Ueno <dueno@redhat.com> - Wed, 25 Oct 2017 10:21:30 +0200 - rev 14070
Push 2845 by dueno@redhat.com at Thu, 26 Oct 2017 15:11:23 +0000
Bug 1411500, Check return values in cryptohi_unittest.cc, r=fkiefer
785735cc93fc5135f4ee40a183cb5e4705835491: Bug 1278071, increase number of iterations for export to PKCS #12. Fix suggested by Dan Veditz. Thanks to Hubert Kario for performance analysis. r=fkiefer
Kai Engert <kaie@kuix.de> - Thu, 26 Oct 2017 16:23:24 +0200 - rev 14069
Push 2844 by kaie@kuix.de at Thu, 26 Oct 2017 14:23:00 +0000
Bug 1278071, increase number of iterations for export to PKCS #12. Fix suggested by Dan Veditz. Thanks to Hubert Kario for performance analysis. r=fkiefer
afd225fc78ee955fc9b60163bddba30a92b46a5d: Bug 1410909, ignore whitespace changes in the ABI report, r=fkiefer
Kai Engert <kaie@kuix.de> - Thu, 26 Oct 2017 16:20:22 +0200 - rev 14068
Push 2843 by kaie@kuix.de at Thu, 26 Oct 2017 14:19:58 +0000
Bug 1410909, ignore whitespace changes in the ABI report, r=fkiefer
e1214758f30b4838596523ba40fa78c872e3ac0b: Record known and acceptable ABI changes (added functions). Recorded in bug 1401594, r=fkiefer
Kai Engert <kaie@kuix.de> - Wed, 25 Oct 2017 14:56:26 +0200 - rev 14067
Push 2842 by kaie@kuix.de at Wed, 25 Oct 2017 12:56:03 +0000
Record known and acceptable ABI changes (added functions). Recorded in bug 1401594, r=fkiefer
3dfd171371fa3f5e98a47cc52976db4a3c56cc56: Bug 1408080, October 2017 batch of root CA changes, part 2, r=kwilson
Kai Engert <kaie@kuix.de> - Wed, 25 Oct 2017 07:52:37 +0200 - rev 14066
Push 2841 by kaie@kuix.de at Wed, 25 Oct 2017 05:52:16 +0000
Bug 1408080, October 2017 batch of root CA changes, part 2, r=kwilson
84e886ea090e36c69df58a71665a97bd25c62d02: Bug 1400844, Implement handling of RSA-PSS signatures on certificates, r=mt
Daiki Ueno <dueno@redhat.com> - Tue, 24 Oct 2017 13:45:06 +0200 - rev 14065
Push 2840 by dueno@redhat.com at Tue, 24 Oct 2017 11:45:35 +0000
Bug 1400844, Implement handling of RSA-PSS signatures on certificates, r=mt This series adds high level API to sign and verify RSA-PSS signatures on certificates and utilizes them in tools.
4698be108cbc660dfff365939da470044bd04442: Bug 1396525, whitelist expected and acceptabled ABI changes, r=ttaubert
Kai Engert <kaie@kuix.de> - Tue, 24 Oct 2017 12:12:16 +0200 - rev 14064
Push 2839 by kaie@kuix.de at Tue, 24 Oct 2017 10:11:56 +0000
Bug 1396525, whitelist expected and acceptabled ABI changes, r=ttaubert
8c97d04ae5c26071ab40aac6547a8d36ce528ffa: Bug 1398679 - Move much of the cipher spec code into a dedicated file, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Mon, 11 Sep 2017 15:48:47 +1000 - rev 14063
Push 2838 by martin.thomson@gmail.com at Mon, 23 Oct 2017 23:06:57 +0000
Bug 1398679 - Move much of the cipher spec code into a dedicated file, r=ekr This is preliminary work, just to keep the renaming and other such tedious things separate from the main event. This should just move stuff around. There should be no substantive changes.
5ba8fb8bfa3599905f2eb40f7bab43d6a8ff2244: Bug 1409587 - Remove TLS compression, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Wed, 18 Oct 2017 12:00:11 +1100 - rev 14062
Push 2838 by martin.thomson@gmail.com at Mon, 23 Oct 2017 23:06:57 +0000
Bug 1409587 - Remove TLS compression, r=ekr
e225cddff7fec66da6d7ed48335c3dad8b153add: Bug 1410909, abi-checks are broken, test patch v1
Kai Engert <kaie@kuix.de> - Mon, 23 Oct 2017 16:38:14 +0200 - rev 14061
Push 2837 by kaie@kuix.de at Mon, 23 Oct 2017 14:37:55 +0000
Bug 1410909, abi-checks are broken, test patch v1
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 tip