9ae3299373a3effb749e390488d7dca4650c1a64: Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert NSS_3_33_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Fri, 02 Jun 2017 10:21:51 +1000 - rev 14088
Push 2860 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:07:05 +0000
Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
a49bbf6c19d5d1190792e8c1a928bfb6a5e9bc07: Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert NSS_3_34_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Fri, 02 Jun 2017 10:21:51 +1000 - rev 14087
Push 2859 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:06:08 +0000
Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
72ddcd9b1621dac3571bb228dd49f244b21c3549: Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
Martin Thomson <martin.thomson@gmail.com> - Fri, 02 Jun 2017 10:21:51 +1000 - rev 14086
Push 2858 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:04:09 +0000
Bug 1354152 - Reject records with plaintext >2^14, r=ttaubert
374352c46d6af58e0ac0396e7a6d3aba6aed7535: Bug 1411475 - Set the record layer version, r=ekr
Martin Thomson <martin.thomson@gmail.com> - Mon, 06 Nov 2017 09:54:53 +1100 - rev 14085
Push 2858 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:04:09 +0000
Bug 1411475 - Set the record layer version, r=ekr
c3eba3a9483abede4c35fa92b5c950a35cd9b639: Bug 1411475 - Google Hack, r=ekr
Martin Thomson <martin.thomson@gmail.com> - Wed, 25 Oct 2017 10:45:53 +1100 - rev 14084
Push 2858 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:04:09 +0000
Bug 1411475 - Google Hack, r=ekr This makes the TLS 1.3 handshake look like TLS 1.2. The trickiest part here is in 0-RTT. I've chosen to remember that the alternative handshake was used and send a ChangeCipherSpec if the previous session used the alternative AND if the client enables the alternative. This assumes that a server will commit to supporting - and selecting - this alternative handshake type for as long as it supports 0-RTT from sessions that have the alternative handshake type. That is, if you negotiate the alternative handshake and the server supports 0-RTT, then it will not just support TLS 1.3 for the duration of the ticket, but also the alternative handshake type. A client can disable the alternative handshake because the version in the ClientHello indicates whether the client intended to send a CCS, but the server cannot refuse to pick it if the client offers. Of course, if we agree that the final TLS 1.3 is in this form, we don't have a problem, it's only an issue because we need to switch-hit. I chose to remove the Facebook alternative content type hack as all signs indicate that it doesn't help.
95e6175cfd96112c407f57d78894a974a50ebafb: Bug 1413038 - Flatten client_ and server_random, r=ekr
Martin Thomson <martin.thomson@gmail.com> - Tue, 31 Oct 2017 10:18:04 +1100 - rev 14083
Push 2858 by martin.thomson@gmail.com at Mon, 06 Nov 2017 02:04:09 +0000
Bug 1413038 - Flatten client_ and server_random, r=ekr
eb44d62c13bd41be9528ffbf2e9f5ba1fbb3f01d: update version to 3.35
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 03 Nov 2017 16:28:39 +0100 - rev 14082
Push 2857 by franziskuskiefer@gmail.com at Fri, 03 Nov 2017 15:29:23 +0000
update version to 3.35 DONTBUILD
229e236d1ca7b1d2ad0812597461a8761b504b99: Bug 1413632: Give poly1305.h an #include statement to provide definition for its size_t usage. r=ttaubert
Daniel Holbert <dholbert@cs.stanford.edu> - Thu, 02 Nov 2017 12:20:54 +0100 - rev 14081
Push 2856 by ttaubert@mozilla.com at Thu, 02 Nov 2017 11:22:10 +0000
Bug 1413632: Give poly1305.h an #include statement to provide definition for its size_t usage. r=ttaubert
33f5160584ccdf9cdcb50793b9b8919eee05afd3: Bug 1236720 - clang-format, a=bustage
Martin Thomson <martin.thomson@gmail.com> - Thu, 02 Nov 2017 19:06:42 +1100 - rev 14080
Push 2855 by martin.thomson@gmail.com at Thu, 02 Nov 2017 08:08:11 +0000
Bug 1236720 - clang-format, a=bustage
ff98dd3880a3258a052ba3d684d024a68472ee70: branch for 3.34 release NSS_3_34_BRANCH
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 02 Nov 2017 09:03:20 +0100 - rev 14079
Push 2854 by franziskuskiefer@gmail.com at Thu, 02 Nov 2017 08:08:00 +0000
branch for 3.34 release DONTBUILD
7345a09561bb4290f7ffeba55329671cb524b9c5: Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt
Robert Relyea <rrelyea@redhat.com> - Wed, 01 Nov 2017 12:42:41 -0700 - rev 14078
Push 2853 by elio.maldonado.batiz@gmail.com at Wed, 01 Nov 2017 19:44:20 +0000
Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt - Original patch by Robert Relyea was modified to make the tests gtests unit tests - Tests modifications are a collaboration between Martin Thomson and Elio Maldonado
9d1576864bf1f1f1e32fba87f8f16e83d0d92f94: Bug 1398679 - Make cipher specs properly directional, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Mon, 11 Sep 2017 15:49:53 +1000 - rev 14077
Push 2852 by martin.thomson@gmail.com at Wed, 01 Nov 2017 04:30:05 +0000
Bug 1398679 - Make cipher specs properly directional, r=ekr This makes each cipher spec unidirectional. This is a tiny bit less efficient in TLS 1.2 and earlier, where some of the material could be shared (a few pointers essentially) but it is much more efficient for TLS 1.3. There is now only one variable of each type on the specs. Up to now, the specs had two copies of almost everything to support being used for both read and write. Now there are separate specs for reading and writing. We only duplicate the pointers to the master secret, and the cipher definitions. This also does away with the backing array that was used to hold two copies of specs. Cipher specs are allocated on the heap as they are used and reference counted, using the same system as is already used for TLS 1.3. This uses the |direction| attribute that was previously added for TLS 1.3 and uses that more thoroughly.
24354fddeda32cef1501f763428885a88165016a: Bug 1413038 - Flatten client_ and server_random, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Tue, 31 Oct 2017 10:18:04 +1100 - rev 14076
Push 2851 by martin.thomson@gmail.com at Tue, 31 Oct 2017 00:56:30 +0000
Bug 1413038 - Flatten client_ and server_random, r=ekr
01ba3ad3ee1e464a8b8891d13a389b0fbadb7784: Added tag NSS_3_34_BETA1 for changeset 32c9bbad2655
Kai Engert <kaie@kuix.de> - Mon, 30 Oct 2017 12:14:36 +0100 - rev 14075
Push 2850 by kaie@kuix.de at Mon, 30 Oct 2017 11:14:17 +0000
Added tag NSS_3_34_BETA1 for changeset 32c9bbad2655 DONTBUILD
32c9bbad265504522441f601333f0b89861a15d1: Bug 1202413, because PK11_CreateGenericObject() leaks by design, add non-leaking PK11_CreateManagedGenericObject() API, early patch reviewed by Martin Thomson, r=kaie NSS_3_34_BETA1
Bob Relyea <rrelyea@redhat.com> - Mon, 30 Oct 2017 10:38:09 +0100 - rev 14074
Push 2849 by kaie@kuix.de at Mon, 30 Oct 2017 09:37:57 +0000
Bug 1202413, because PK11_CreateGenericObject() leaks by design, add non-leaking PK11_CreateManagedGenericObject() API, early patch reviewed by Martin Thomson, r=kaie
c04395842414d18ca772b35df0c20eb9ce8d4c9c: Bug 1341302, certutil: document RSA-PSS options, r=hkario, r=kaie
Daiki Ueno <dueno@redhat.com> - Fri, 27 Oct 2017 11:11:31 +0200 - rev 14073
Push 2848 by dueno@redhat.com at Fri, 27 Oct 2017 15:00:22 +0000
Bug 1341302, certutil: document RSA-PSS options, r=hkario, r=kaie
0b57f11ba44208b61b63fedc72adef7c12c23491: Bug 1406891, Make pk12util documentation mention only working ciphers, r=hkario, r=kaie
Daiki Ueno <dueno@redhat.com> - Mon, 09 Oct 2017 12:05:37 +0200 - rev 14072
Push 2847 by dueno@redhat.com at Fri, 27 Oct 2017 14:50:45 +0000
Bug 1406891, Make pk12util documentation mention only working ciphers, r=hkario, r=kaie
98403e8b5d48b3f1de0aefe2bfd5750e0c9e1470: Bug 1278071, decrease the number of iterations by factor 10, as a temporary workaround to test timeouts, r=fkiefer
Kai Engert <kaie@kuix.de> - Fri, 27 Oct 2017 09:26:42 +0200 - rev 14071
Push 2846 by kaie@kuix.de at Fri, 27 Oct 2017 07:26:18 +0000
Bug 1278071, decrease the number of iterations by factor 10, as a temporary workaround to test timeouts, r=fkiefer
300a20af3d82f1df466b55434fa61ee6da443013: Bug 1411500, Check return values in cryptohi_unittest.cc, r=fkiefer
Daiki Ueno <dueno@redhat.com> - Wed, 25 Oct 2017 10:21:30 +0200 - rev 14070
Push 2845 by dueno@redhat.com at Thu, 26 Oct 2017 15:11:23 +0000
Bug 1411500, Check return values in cryptohi_unittest.cc, r=fkiefer
785735cc93fc5135f4ee40a183cb5e4705835491: Bug 1278071, increase number of iterations for export to PKCS #12. Fix suggested by Dan Veditz. Thanks to Hubert Kario for performance analysis. r=fkiefer
Kai Engert <kaie@kuix.de> - Thu, 26 Oct 2017 16:23:24 +0200 - rev 14069
Push 2844 by kaie@kuix.de at Thu, 26 Oct 2017 14:23:00 +0000
Bug 1278071, increase number of iterations for export to PKCS #12. Fix suggested by Dan Veditz. Thanks to Hubert Kario for performance analysis. r=fkiefer
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 tip