429536b172873e80f1f79eb16d6fcc03ec439bd5: close NSS_3_14_5_RELEASE_BRANCH NSS_3_14_5_RELEASE_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:23 +0200 - rev 13633
Push 2413 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:52 +0000
close NSS_3_14_5_RELEASE_BRANCH
840ab8f4720fa5cd9c3bda83fcdc79a3a00d5e96: close NSS_3_15_3_RELEASE_BRANCH NSS_3_15_3_RELEASE_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:18 +0200 - rev 13632
Push 2412 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:44 +0000
close NSS_3_15_3_RELEASE_BRANCH
1acdc787d935b912f90a553b9647a7621d7cd320: close NSS_3_15_5 NSS_3_15_5
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:15 +0200 - rev 13631
Push 2411 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:36 +0000
close NSS_3_15_5
d06a4a2f6168857454a4bd145b6bb210e4600245: close NSS_3_16_3_PLUS_BRANCH NSS_3_16_3_PLUS_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:12 +0200 - rev 13630
Push 2410 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:28 +0000
close NSS_3_16_3_PLUS_BRANCH
57bcf36f4c9c2bdc90089d1feb63ce8cd6f1dd95: close NSS_3_19_1_WITH_CKBI_1_98_BRANCH NSS_3_19_1_WITH_CKBI_1_98_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:09 +0200 - rev 13629
Push 2409 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:21 +0000
close NSS_3_19_1_WITH_CKBI_1_98_BRANCH
58a3aedccc14f13a42961b993e974cbe6097a2ea: close NSS_3_19_2_WITH_CKBI_1_98_BRANCH NSS_3_19_2_WITH_CKBI_1_98_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:06 +0200 - rev 13628
Push 2408 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:13 +0000
close NSS_3_19_2_WITH_CKBI_1_98_BRANCH
be524b4277cb79ee904c4b689c3437cfd160d9c2: close NSS_3_19_3_PLUS_BRANCH NSS_3_19_3_PLUS_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:03 +0200 - rev 13627
Push 2407 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:14:05 +0000
close NSS_3_19_3_PLUS_BRANCH
7ec8becaf3f3192453e004f9ed759b35bbaa569f: close NSS_3_19_2_X_BRANCH NSS_3_19_2_X_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:52:00 +0200 - rev 13626
Push 2406 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:13:58 +0000
close NSS_3_19_2_X_BRANCH
4ae79191cb8a6398a356c9742ddeca263b020da2: close BUG923089_BRANCH BUG923089_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:51:57 +0200 - rev 13625
Push 2405 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:13:48 +0000
close BUG923089_BRANCH
d612538f270d99e01b2b30a7c87784e0c0bcd682: close BUG1236720_BRANCH BUG1236720_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 29 Sep 2017 14:51:55 +0200 - rev 13624
Push 2404 by franziskuskiefer@gmail.com at Thu, 05 Oct 2017 07:13:40 +0000
close BUG1236720_BRANCH
6fb9c5396d52e007c1cdc7330e062589478fdb5e: Bug 1396525 - put keaGroup and sigScheme in the cache so we can put it in SSLChannelInfo, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 04 Oct 2017 10:05:29 +0200 - rev 13623
Push 2403 by franziskuskiefer@gmail.com at Wed, 04 Oct 2017 08:36:46 +0000
Bug 1396525 - put keaGroup and sigScheme in the cache so we can put it in SSLChannelInfo, r=mt Summary: This adds originalKeaGroup and resumed fields to the SSLChannelInfo, which provide information about the key exchange group of the original TLS handshake when the session is resumed, and information whether a session is resumed or not. To do this this patch adds the keaGroup and sigScheme to the session cache and the session ticket. Reviewers: mt Reviewed By: mt Bug #: 1396525 Differential Revision: https://phabricator.services.mozilla.com/D29
c1866d7d7f15b3ea9de3659fbd2fdaaf4f2ae273: Bug 1287711 - Make writes to SSLKEYLOGFILE thread-safe, r=mt
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 14:55:02 -0700 - rev 13622
Push 2402 by martin.thomson@gmail.com at Tue, 03 Oct 2017 22:23:34 +0000
Bug 1287711 - Make writes to SSLKEYLOGFILE thread-safe, r=mt Protect writes to the keylog file with a lock. Differential Revision: https://phabricator.services.mozilla.com/D86
965b5533bf61ecf85e71203fa26ab33e60bb7125: Bug 1287711 - Remove RSA premaster secret from keylog file, r=mt
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 14:49:25 -0700 - rev 13621
Push 2401 by martin.thomson@gmail.com at Tue, 03 Oct 2017 21:51:18 +0000
Bug 1287711 - Remove RSA premaster secret from keylog file, r=mt Since the master secret is logged via "CLIENT_RANDOM", there is little reason to log the RSA premaster secret. Differential Revision: https://phabricator.services.mozilla.com/D85
68da790a91ea7e1a38190b4763796419b33a4d81: Bug 1287711 - Use correct APIs, a=bustage
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 13:56:12 -0700 - rev 13620
Push 2400 by martin.thomson@gmail.com at Tue, 03 Oct 2017 21:23:52 +0000
Bug 1287711 - Use correct APIs, a=bustage
24729e83ed5c74caea7660d8884d0e448d584d5e: Bug 1287711 - Use PR_SetEnv, a=bustage
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 13:41:28 -0700 - rev 13619
Push 2399 by martin.thomson@gmail.com at Tue, 03 Oct 2017 20:42:22 +0000
Bug 1287711 - Use PR_SetEnv, a=bustage
488c17f05a1ff5c9867c78af2708062c02c49ad8: Bug 1404161 - remove unsound assertion in PK11_GetAttributes r=franziskus
David Keeler <dkeeler@mozilla.com> - Tue, 03 Oct 2017 19:36:23 +0200 - rev 13618
Push 2398 by franziskuskiefer@gmail.com at Tue, 03 Oct 2017 17:41:18 +0000
Bug 1404161 - remove unsound assertion in PK11_GetAttributes r=franziskus Differential Revision: https://phabricator.services.mozilla.com/D88
ffe09c48221c90d66411834e7da1f852fd2af24a: Bug 1404911 - make AEAD destructor virtual, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 02 Oct 2017 14:45:49 +0200 - rev 13617
Push 2398 by franziskuskiefer@gmail.com at Tue, 03 Oct 2017 17:41:18 +0000
Bug 1404911 - make AEAD destructor virtual, r=mt Differential Revision: https://phabricator.services.mozilla.com/D90
bc6d9e5391daa9807599dffee447ec4368210bf7: Bug 1287711 - Implement SSLKEYLOGFILE for TLS 1.3 (v2)
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 10:24:36 -0700 - rev 13616
Push 2397 by martin.thomson@gmail.com at Tue, 03 Oct 2017 17:32:01 +0000
Bug 1287711 - Implement SSLKEYLOGFILE for TLS 1.3 (v2) Summary: Extend the previous keylogging functionality with TLS 1.3 support. Verified that a session between nss (selfserv) and boringssl 15868b3bbaa resulted in the same keys and that it can be used with Wireshark. Reviewers: mt, ekr Reviewed By: mt Bug #: 1287711 Differential Revision: https://phabricator.services.mozilla.com/D82
76d5048d2b8a35308808446de43e85d6cf0cb283: Backed out changeset 3e803b9a08c8 NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Sun, 01 Oct 2017 09:34:29 +1100 - rev 13615
Push 2396 by martin.thomson@gmail.com at Sat, 30 Sep 2017 22:35:01 +0000
Backed out changeset 3e803b9a08c8
3e803b9a08c8820f035cfe9189409c101144f8a9: Bug 1287711 - Implement SSLKEYLOGFILE for TLS 1.3, r=mt NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Sat, 30 Sep 2017 19:55:22 +1000 - rev 13614
Push 2395 by martin.thomson@gmail.com at Sat, 30 Sep 2017 09:57:39 +0000
Bug 1287711 - Implement SSLKEYLOGFILE for TLS 1.3, r=mt Extend the previous keylogging functionality with TLS 1.3 support. The keys are identical and decrypt successfully in Wireshark. selfserv rejected early data for some reason though and did not log the early traffic secret as a result. Differential Revision: https://phabricator.services.mozilla.com/D82
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 tip