c2e4eb8d2ede1a95405d9b72b76b67ff3dd209a5: Bug 436414, fix memory leak bustage, TBR=rrelyea NSS_3_15_3_BETA1
Kai Engert <kaie@kuix.de> - Wed, 16 Oct 2013 13:21:32 +0200 - rev 10875
Push 178 by kaie@kuix.de at Wed, 16 Oct 2013 11:22:09 +0000
Bug 436414, fix memory leak bustage, TBR=rrelyea
338ba2997251b5c68293a7792e59bcfdeda7fbed: Bug 923277, backout changeset 5349343fa84a because it causes NSS test automation failures as a side effect
Kai Engert <kaie@kuix.de> - Tue, 15 Oct 2013 21:08:23 +0200 - rev 10874
Push 177 by kaie@kuix.de at Tue, 15 Oct 2013 19:08:30 +0000
Bug 923277, backout changeset 5349343fa84a because it causes NSS test automation failures as a side effect
612d7d1eb9e71dc1ff38f1ca442ab281ea2bcd02: Bug 925100: ensure a size is <= half of the maximum PRUint32 value
Wan-Teh Chang <wtc@google.com> - Mon, 14 Oct 2013 17:37:37 -0700 - rev 10873
Push 176 by wtc@google.com at Tue, 15 Oct 2013 00:37:46 +0000
Bug 925100: ensure a size is <= half of the maximum PRUint32 value before passing it to NSPR memory allocation functions. r=rrelyea. Adam Langley wrote the first version of the patch.
c3db6134802b786b6d7ba8aff8ed448b4b9fb1f6: Bug 925591: Support 2048- and 3072-bit DSA certificates. r=wtc.
Kaspar Brand <mozbugzilla@velox.ch> - Fri, 11 Oct 2013 10:27:37 -0700 - rev 10872
Push 175 by wtc@google.com at Fri, 11 Oct 2013 17:27:47 +0000
Bug 925591: Support 2048- and 3072-bit DSA certificates. r=wtc.
d29898e0981c5a98294329f58118b45ad63758b7: Bug 910438: Have CERT_VerifyCert return the correct result when certificate verification fails and a verifyLog is not used, r=briansmith, r=rrelyea
Brian Smith <brian@briansmith.org> - Fri, 11 Oct 2013 01:41:13 -0700 - rev 10871
Push 174 by brian@briansmith.org at Fri, 11 Oct 2013 09:16:10 +0000
Bug 910438: Have CERT_VerifyCert return the correct result when certificate verification fails and a verifyLog is not used, r=briansmith, r=rrelyea
5349343fa84ab637a673776b9a5d5fa2692ac47a: Bug 923277: Add error name to vfychain cert error messages, r=emaldona
Brian Smith <brian@briansmith.org> - Fri, 11 Oct 2013 01:17:48 -0700 - rev 10870
Push 173 by brian@briansmith.org at Fri, 11 Oct 2013 08:18:54 +0000
Bug 923277: Add error name to vfychain cert error messages, r=emaldona
41112f4893862f3a97b377d2105d129fc04a1bf1: Bug 922269: Document the ownership of the CERTCertificate objects in
Wan-Teh Chang <wtc@google.com> - Wed, 09 Oct 2013 15:51:48 -0700 - rev 10869
Push 172 by wtc@google.com at Wed, 09 Oct 2013 22:51:58 +0000
Bug 922269: Document the ownership of the CERTCertificate objects in CERTCertList. r=ryan.sleevi.
741d64d4656cec4bd4d3ac1e1580aba564de4461: Bug 922269: Fix the "called from ssl3_xxx" comments. r=bsmith.
Wan-Teh Chang <wtc@google.com> - Wed, 09 Oct 2013 14:48:51 -0700 - rev 10868
Push 171 by wtc@google.com at Wed, 09 Oct 2013 21:49:05 +0000
Bug 922269: Fix the "called from ssl3_xxx" comments. r=bsmith.
4be429189df6d552d133e4fdda1d20a8b18b9fa7: Bug 436414, bustage fix, long hostnames, allow pp to not wrap the OCSP URL, TBR=rrelyea
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 14:42:38 +0200 - rev 10867
Push 170 by kaie@kuix.de at Tue, 08 Oct 2013 12:42:55 +0000
Bug 436414, bustage fix, long hostnames, allow pp to not wrap the OCSP URL, TBR=rrelyea
b7e765fda4cfc81e6286daae7d8e699b90e7a66b: Bug 436414, bustage fix, regular expression to extract port number failed if hostname contains a digit
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 11:41:04 +0200 - rev 10866
Push 169 by kaie@kuix.de at Tue, 08 Oct 2013 09:41:12 +0000
Bug 436414, bustage fix, regular expression to extract port number failed if hostname contains a digit
4ebfd5d268679854f95bb10ee32cb387fcd5583c: fix obvious mistake in version number
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 10:11:34 +0200 - rev 10865
Push 168 by kaie@kuix.de at Tue, 08 Oct 2013 08:11:42 +0000
fix obvious mistake in version number
a9ee920bd5cf67c60a04e7d678602f93aec2e16e: Bug 436414, support OCSP via HTTP GET. Part 4, enhance libPKIX portion of OCSP client code. r=rrelyea
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 10:03:22 +0200 - rev 10864
Push 167 by kaie@kuix.de at Tue, 08 Oct 2013 08:07:55 +0000
Bug 436414, support OCSP via HTTP GET. Part 4, enhance libPKIX portion of OCSP client code. r=rrelyea
654082cbd7028c94110afcac7c9b71f3c1367b36: Bug 436414, support OCSP via HTTP GET. Part 3, enhance classic portion of OCSP client code. r=rrelyea
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 10:03:16 +0200 - rev 10863
Push 167 by kaie@kuix.de at Tue, 08 Oct 2013 08:07:55 +0000
Bug 436414, support OCSP via HTTP GET. Part 3, enhance classic portion of OCSP client code. r=rrelyea
43bc35615a4eddd1a221891091f9d7d78dcbfe35: Bug 436414, support OCSP via HTTP GET. Part 2, local testing. r=rrelyea
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 10:03:09 +0200 - rev 10862
Push 167 by kaie@kuix.de at Tue, 08 Oct 2013 08:07:55 +0000
Bug 436414, support OCSP via HTTP GET. Part 2, local testing. r=rrelyea
bfc9085d067603c4638c7d9e6b047a3aa4b46619: Bug 436414, support OCSP via HTTP GET. Part 1, add OCSP server support to httpserv. r=rrelyea
Kai Engert <kaie@kuix.de> - Tue, 08 Oct 2013 10:03:00 +0200 - rev 10861
Push 167 by kaie@kuix.de at Tue, 08 Oct 2013 08:07:55 +0000
Bug 436414, support OCSP via HTTP GET. Part 1, add OCSP server support to httpserv. r=rrelyea
fc6df00517093e85d5e27da260ce7c9f7a4d458f: Bug 923696: don't send resumption ClientHello records with versions > 0x0301.
Adam Langley <agl@chromium.org> - Mon, 07 Oct 2013 14:26:14 -0700 - rev 10860
Push 166 by wtc@google.com at Mon, 07 Oct 2013 21:26:34 +0000
Bug 923696: don't send resumption ClientHello records with versions > 0x0301. Best we can tell, F5 BIG-IP devices with firmware < 10.2.4 hang the connection when a ClientHello record is received with version > 0x0301 and is longer than 255 bytes. r=wtc.
dec241b62016119d86e88f80782534b4cae8d889: Bug 922780: NSC_DecryptUpdate should also check the input data length
Wan-Teh Chang <wtc@google.com> - Tue, 01 Oct 2013 21:35:42 -0700 - rev 10859
Push 165 by wtc@google.com at Wed, 02 Oct 2013 04:36:06 +0000
Bug 922780: NSC_DecryptUpdate should also check the input data length for block ciphers when the output buffer is provided. r=sleevi.
9695a2d56c4d0988d41fdb133f7786566938049d: Bug 731485: Add the SSL_PeerCertificateChain function. r=ryan.sleevi.
Wan-Teh Chang <wtc@google.com> - Mon, 30 Sep 2013 11:40:13 -0700 - rev 10858
Push 164 by wtc@google.com at Mon, 30 Sep 2013 18:40:23 +0000
Bug 731485: Add the SSL_PeerCertificateChain function. r=ryan.sleevi.
e1d859f01bff32e70033183b5b88ca53a99adbf0: Bug 921696: CERT_DecodeOidSequence should cleanup the arena on failure.
Ryan Sleevi <ryan.sleevi@gmail.com> - Fri, 27 Sep 2013 19:54:35 -0700 - rev 10857
Push 163 by ryan.sleevi@gmail.com at Sat, 28 Sep 2013 02:55:24 +0000
Bug 921696: CERT_DecodeOidSequence should cleanup the arena on failure.
574d0c70a2c73ba3c7bdf9007dbb230dcc5efbe1: Bug 920899: Fix bad memset in hmac_test. r=wtc.
Mike Frysinger <vapier@gentoo.org> - Fri, 27 Sep 2013 12:49:55 -0700 - rev 10856
Push 162 by wtc@google.com at Fri, 27 Sep 2013 19:50:08 +0000
Bug 920899: Fix bad memset in hmac_test. r=wtc.
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 tip