8f54441131ab172941c1f778fef4eb1b8e131e35: Bug 1415505 - add clean only target to build.sh, r=ttaubert
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 08 Nov 2017 12:24:29 +0100 - rev 14106
Push 2872 by franziskuskiefer@gmail.com at Wed, 08 Nov 2017 11:26:39 +0000
Bug 1415505 - add clean only target to build.sh, r=ttaubert Reviewers: ttaubert Reviewed By: ttaubert Differential Revision: https://phabricator.services.mozilla.com/D104
a5c7d29ff26d3a8e33dc4f8db45348791b8c5500: Added tag NSS_3_34_BETA2 for changeset 21c72a0d912e NSS_3_34_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 08 Nov 2017 11:39:11 +0100 - rev 14105
Push 2871 by franziskuskiefer@gmail.com at Wed, 08 Nov 2017 10:40:36 +0000
Added tag NSS_3_34_BETA2 for changeset 21c72a0d912e
21c72a0d912eff92994652d4c6f4f5809f2a5af9: Bug 1411475 - Set the record layer version, r=ekr NSS_3_34_BRANCH NSS_3_34_BETA2
Martin Thomson <martin.thomson@gmail.com> - Mon, 06 Nov 2017 09:54:53 +1100 - rev 14104
Push 2871 by franziskuskiefer@gmail.com at Wed, 08 Nov 2017 10:40:36 +0000
Bug 1411475 - Set the record layer version, r=ekr
cf8adf59ff562ff1892bebb603719ecef4bfded3: Bug 1411475 - Google Hack, r=ekr NSS_3_34_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Wed, 25 Oct 2017 10:45:53 +1100 - rev 14103
Push 2871 by franziskuskiefer@gmail.com at Wed, 08 Nov 2017 10:40:36 +0000
Bug 1411475 - Google Hack, r=ekr This makes the TLS 1.3 handshake look like TLS 1.2. The trickiest part here is in 0-RTT. I've chosen to remember that the alternative handshake was used and send a ChangeCipherSpec if the previous session used the alternative AND if the client enables the alternative. This assumes that a server will commit to supporting - and selecting - this alternative handshake type for as long as it supports 0-RTT from sessions that have the alternative handshake type. That is, if you negotiate the alternative handshake and the server supports 0-RTT, then it will not just support TLS 1.3 for the duration of the ticket, but also the alternative handshake type. A client can disable the alternative handshake because the version in the ClientHello indicates whether the client intended to send a CCS, but the server cannot refuse to pick it if the client offers. Of course, if we agree that the final TLS 1.3 is in this form, we don't have a problem, it's only an issue because we need to switch-hit. I chose to remove the Facebook alternative content type hack as all signs indicate that it doesn't help.
0f717c127bcbc61c83b16613d8261d02d239788d: Bug 1413038 - Flatten client_ and server_random, r=ekr NSS_3_34_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Tue, 31 Oct 2017 10:18:04 +1100 - rev 14102
Push 2871 by franziskuskiefer@gmail.com at Wed, 08 Nov 2017 10:40:36 +0000
Bug 1413038 - Flatten client_ and server_random, r=ekr
6da6e699fa02bbf1763acba4176f994c6a5ddf62: Bug 1415171, Fix handling of default RSA-PSS parameters, r=mt
Daiki Ueno <dueno@redhat.com> - Wed, 08 Nov 2017 11:13:25 +0100 - rev 14101
Push 2870 by dueno@redhat.com at Wed, 08 Nov 2017 10:34:10 +0000
Bug 1415171, Fix handling of default RSA-PSS parameters, r=mt Reviewers: mt, rrelyea Reviewed By: mt Bug #: 1415171 Differential Revision: https://phabricator.services.mozilla.com/D202
d515199921dd703087f7e0e03eb71058a015934d: Bug 1259061, removed MP_MEMCPY from libmpi, r=franziskus
Jonas Allmann <jallmann@mozilla.com> - Tue, 07 Nov 2017 16:38:05 +0100 - rev 14100
Push 2869 by franziskuskiefer@gmail.com at Tue, 07 Nov 2017 15:45:15 +0000
Bug 1259061, removed MP_MEMCPY from libmpi, r=franziskus Reviewers: franziskus Reviewed By: franziskus Bug #: 1259061 Differential Revision: https://phabricator.services.mozilla.com/D204
0a8a324c896610710a8784d76eb331799b066c6a: Bug 1259053, removed MP_MEMSET from libmpi, r=franziskus
Jonas Allmann <jallmann@mozilla.com> - Tue, 07 Nov 2017 16:37:37 +0100 - rev 14099
Push 2869 by franziskuskiefer@gmail.com at Tue, 07 Nov 2017 15:45:15 +0000
Bug 1259053, removed MP_MEMSET from libmpi, r=franziskus Reviewers: franziskus Reviewed By: franziskus Bug #: 1259053 Differential Revision: https://phabricator.services.mozilla.com/D203
ba3a668b2e3d3987db38312a0be7c14f9cdb6b7e: Bug 1414297 - Use VS2017 for NSS on Taskcluster r=ttaubert
David Major <dmajor@mozilla.com> - Fri, 03 Nov 2017 18:08:27 +0100 - rev 14098
Push 2868 by ttaubert@mozilla.com at Tue, 07 Nov 2017 13:54:47 +0000
Bug 1414297 - Use VS2017 for NSS on Taskcluster r=ttaubert
de569c50ac57ceef36f84cfe9298e182af24623d: Bug 1369091 - check that e > 2 and odd in RSA_NewKey, r=franziskus
Jonas Allmann <jallmann@mozilla.com> - Tue, 07 Nov 2017 12:55:55 +0100 - rev 14097
Push 2867 by franziskuskiefer@gmail.com at Tue, 07 Nov 2017 11:59:17 +0000
Bug 1369091 - check that e > 2 and odd in RSA_NewKey, r=franziskus Summary: Patch for bug 1369091 Reviewers: franziskus Reviewed By: franziskus Bug #: 1369091 Differential Revision: https://phabricator.services.mozilla.com/D165
de7e5e67e878d52df4650173bc5c3500ab07b770: Bug 1414718 - Have a single way to signal a CA cert, r=ueno
Martin Thomson <martin.thomson@gmail.com> - Mon, 06 Nov 2017 15:19:31 +1100 - rev 14096
Push 2866 by martin.thomson@gmail.com at Tue, 07 Nov 2017 01:20:04 +0000
Bug 1414718 - Have a single way to signal a CA cert, r=ueno
dc2a456230bfd4c409377dfc5f034646a8101dae: Bug 1411475 - Fixup merge trash, r=ekr
Martin Thomson <martin.thomson@gmail.com> - Tue, 07 Nov 2017 12:00:24 +1100 - rev 14095
Push 2866 by martin.thomson@gmail.com at Tue, 07 Nov 2017 01:20:04 +0000
Bug 1411475 - Fixup merge trash, r=ekr
f56ef220b8626ebcfbcc5ab2bfa409d8175e043f: Bug 1400591 - ssl3con.c signed/unsigned compilation warnings r=ttaubert
Jean-Luc Bonnafoux <jeanluc.bonnafoux@wanadoo.fr> - Mon, 06 Nov 2017 14:50:27 +0100 - rev 14094
Push 2865 by ttaubert@mozilla.com at Mon, 06 Nov 2017 13:51:06 +0000
Bug 1400591 - ssl3con.c signed/unsigned compilation warnings r=ttaubert Reviewers: ttaubert Reviewed By: ttaubert Bug #: 1400591 Differential Revision: https://phabricator.services.mozilla.com/D93
0d11d3b8c6a1d8868d07af12e3e00d94048a69fc: Bug 1414777 - pkcs11uri.c fix unsigned / signed mismatch r=ttaubert
Jean-Luc Bonnafoux <jeanluc.bonnafoux@wanadoo.fr> - Mon, 06 Nov 2017 12:25:15 +0100 - rev 14093
Push 2864 by ttaubert@mozilla.com at Mon, 06 Nov 2017 11:26:01 +0000
Bug 1414777 - pkcs11uri.c fix unsigned / signed mismatch r=ttaubert Summary: pkcs11uri.c fix unsigned / signed mismatch Reviewers: ttaubert Reviewed By: ttaubert Bug #: 1414777 Differential Revision: https://phabricator.services.mozilla.com/D193
c710811a5cc7db91c214a7d44b2cd8e280435570: Bug 1414747 - secport.c fix signed / unsigned mismatch r=ttaubert
jbonnafo <jeanluc.bonnafoux@wanadoo.fr> - Mon, 06 Nov 2017 10:45:35 +0100 - rev 14092
Push 2863 by ttaubert@mozilla.com at Mon, 06 Nov 2017 09:47:17 +0000
Bug 1414747 - secport.c fix signed / unsigned mismatch r=ttaubert
12b9406a5c6707209322378ae8c9af7fc7e8d809: Bug 1411475 - Set the record layer version, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Fri, 27 Oct 2017 16:45:10 +1100 - rev 14091
Push 2862 by martin.thomson@gmail.com at Mon, 06 Nov 2017 04:23:28 +0000
Bug 1411475 - Set the record layer version, r=ekr This refactors the code so that the cipher specs have a field that includes the record layer version number. This is used to cap the ClientHello record version, as well as set the 1.0/1.2 version as necessary for the two TLS 1.3 versions.
bc1c987491f52b141a28421202273780f3236e58: Bug 1411475 - Google Hack, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Wed, 25 Oct 2017 10:45:53 +1100 - rev 14090
Push 2862 by martin.thomson@gmail.com at Mon, 06 Nov 2017 04:23:28 +0000
Bug 1411475 - Google Hack, r=ekr This makes the TLS 1.3 handshake look like TLS 1.2. The trickiest part here is in 0-RTT. I've chosen to remember that the alternative handshake was used and send a ChangeCipherSpec if the previous session used the alternative AND if the client enables the alternative. This assumes that a server will commit to supporting - and selecting - this alternative handshake type for as long as it supports 0-RTT from sessions that have the alternative handshake type. That is, if you negotiate the alternative handshake and the server supports 0-RTT, then it will not just support TLS 1.3 for the duration of the ticket, but also the alternative handshake type. A client can disable the alternative handshake because the version in the ClientHello indicates whether the client intended to send a CCS, but the server cannot refuse to pick it if the client offers. Of course, if we agree that the final TLS 1.3 is in this form, we don't have a problem, it's only an issue because we need to switch-hit. I chose to remove the Facebook alternative content type hack as all signs indicate that it doesn't help.
0713bc0a60b9642a52e55a1c373c1a4c8c76ce1c: Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert NSS_3_32_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Fri, 02 Jun 2017 10:21:51 +1000 - rev 14089
Push 2861 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:07:48 +0000
Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
9ae3299373a3effb749e390488d7dca4650c1a64: Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert NSS_3_33_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Fri, 02 Jun 2017 10:21:51 +1000 - rev 14088
Push 2860 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:07:05 +0000
Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
a49bbf6c19d5d1190792e8c1a928bfb6a5e9bc07: Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert NSS_3_34_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Fri, 02 Jun 2017 10:21:51 +1000 - rev 14087
Push 2859 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:06:08 +0000
Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 tip