c4850aa1c407e7dad4f94d28676d92ac75eeacf6: Bug 1370667 - fail on wrong NSS_SSL_TESTS parameters r=franziskuskiefer
Kai Engert <kaie> - Tue, 22 Aug 2017 05:33:00 +0200 - rev 13542
Push 2333 by franziskuskiefer@gmail.com at Tue, 22 Aug 2017 13:13:14 +0000
Bug 1370667 - fail on wrong NSS_SSL_TESTS parameters r=franziskuskiefer
31dfdf2057f881332329fd5df5b884b5fa60603e: Bug 1370667 - enable ssl tests again, r=bustage
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 22 Aug 2017 14:30:20 +0200 - rev 13541
Push 2333 by franziskuskiefer@gmail.com at Tue, 22 Aug 2017 13:13:14 +0000
Bug 1370667 - enable ssl tests again, r=bustage
0ca145683a7035d8c488ec59a2f11b1b9286b88e: Bug 1370667, automatically run/skip fips tests based on NSS_FORCE_FIPS, r=franziskus
Kai Engert <kaie@kuix.de> - Mon, 21 Aug 2017 17:20:35 +0200 - rev 13540
Push 2332 by kaie@kuix.de at Mon, 21 Aug 2017 15:20:22 +0000
Bug 1370667, automatically run/skip fips tests based on NSS_FORCE_FIPS, r=franziskus
30c6078f307516729317acc64a0f969823db2cde: Bug 1376494 - don't initialise the deterministic rng twice, r=ttaubert
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 21 Aug 2017 11:56:13 +0200 - rev 13539
Push 2331 by franziskuskiefer@gmail.com at Mon, 21 Aug 2017 10:42:57 +0000
Bug 1376494 - don't initialise the deterministic rng twice, r=ttaubert Differential Revision: https://nss-review.dev.mozaws.net/D348
711b3866b2ce311baa27316c53aeeab6f7980e86: Bug 1370667 - don't do startup tests when not in fips mode, r=ttaubert,rrelyea
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 18 Aug 2017 11:17:18 +0200 - rev 13538
Push 2331 by franziskuskiefer@gmail.com at Mon, 21 Aug 2017 10:42:57 +0000
Bug 1370667 - don't do startup tests when not in fips mode, r=ttaubert,rrelyea Differential Revision: https://nss-review.dev.mozaws.net/D348
317881476c6e08be5c1e561c0c032d7b3f40d1c2: Bug 1376494 - NULL check argument to PK11_FreeSymKey, r=rrelyea
Martin Thomson <martin.thomson@gmail.com> - Mon, 21 Aug 2017 16:29:21 +1000 - rev 13537
Push 2330 by martin.thomson@gmail.com at Mon, 21 Aug 2017 06:29:41 +0000
Bug 1376494 - NULL check argument to PK11_FreeSymKey, r=rrelyea
f4666e28214bfed32f67d0f8255a22b50f3bc403: Bug 1334106 - improve mpi fuzzing, r=bustage
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 21 Aug 2017 07:16:17 +0200 - rev 13536
Push 2329 by franziskuskiefer@gmail.com at Mon, 21 Aug 2017 05:18:07 +0000
Bug 1334106 - improve mpi fuzzing, r=bustage
f07c161ac5c8a01dfb22160970762150ad93fe18: Bug 1368980 - Fix an assertion that was comparing an unsigned >= 0 unhelpfully. r=mt NSS_TLS13_DRAFT19_BRANCH
Patrick McManus <mcmanus@ducksong.com> - Mon, 21 Aug 2017 09:33:18 +1000 - rev 13535
Push 2328 by martin.thomson@gmail.com at Sun, 20 Aug 2017 23:36:10 +0000
Bug 1368980 - Fix an assertion that was comparing an unsigned >= 0 unhelpfully. r=mt Differential Revision: https://nss-review.dev.mozaws.net/D415
b05b124f610577e8bdbd77d86f1ab894df9cdf8d: Bug 1334106 - improve mpi fuzzing, r=bustage
Franziskus Kiefer <franziskuskiefer@gmail.com> - Sun, 20 Aug 2017 21:57:59 +0200 - rev 13534
Push 2327 by franziskuskiefer@gmail.com at Sun, 20 Aug 2017 20:03:39 +0000
Bug 1334106 - improve mpi fuzzing, r=bustage
8606d1442fe4eecd2a4ffebf2828d57f009827a4: Bug 1334106 - improve mpi fuzzing, r=me
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 18 Aug 2017 10:11:07 +0200 - rev 13533
Push 2326 by franziskuskiefer@gmail.com at Fri, 18 Aug 2017 08:11:35 +0000
Bug 1334106 - improve mpi fuzzing, r=me
0f34fb88edaab713e44977f5c33ff69a742c8da2: Bug 1386475 - Ensure early data is delivered before the handshake callback fires, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Wed, 02 Aug 2017 12:00:59 +1000 - rev 13532
Push 2325 by martin.thomson@gmail.com at Fri, 18 Aug 2017 03:56:44 +0000
Bug 1386475 - Ensure early data is delivered before the handshake callback fires, r=ekr
d50a14c51077c38506ea2304c315b39ed1b739e6: Bug 1386475 - Wow, we still have EndOfEarlyData as an alert, a=bustage
Martin Thomson <martin.thomson@gmail.com> - Fri, 18 Aug 2017 12:00:05 +1000 - rev 13531
Push 2324 by martin.thomson@gmail.com at Fri, 18 Aug 2017 02:00:18 +0000
Bug 1386475 - Wow, we still have EndOfEarlyData as an alert, a=bustage
f4a9de53fe5a6c0ed6ba5290b5901c0c2eeb56ce: Bug 1386475 - Ensure early data is delivered before the handshake callback fires, r=ekr
Martin Thomson <martin.thomson@gmail.com> - Wed, 02 Aug 2017 12:00:59 +1000 - rev 13530
Push 2323 by martin.thomson@gmail.com at Fri, 18 Aug 2017 01:37:21 +0000
Bug 1386475 - Ensure early data is delivered before the handshake callback fires, r=ekr
984849c0a0f1e2e62cbe5654e679c90b7a5a8f94: Bug 1389570 - set slot->flags for user pin initialized when in nodb mode, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 17 Aug 2017 11:18:37 +0200 - rev 13529
Push 2322 by franziskuskiefer@gmail.com at Thu, 17 Aug 2017 09:19:48 +0000
Bug 1389570 - set slot->flags for user pin initialized when in nodb mode, r=mt Summary: NSS_NoDB_Init("."); PK11SlotInfo* slot = PK11_GetInternalKeySlot(); PK11_NeedUserInit(slot) used to returned PR_TRUE because we never set the init flag that's checked by that function when we start in noDB mode. This patch fixes that. As mentioned in the patch this is not the nicest way to fix this. The way login/init status and these flags are handled shold probably be rewritten. Differential Revision: https://nss-review.dev.mozaws.net/D406
d83f2573b84eccb40a6e517340b488e7d2ad538b: Bug 1389056 - set NSS_USE_64 on sparc64, r=me
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 16 Aug 2017 12:23:46 +0200 - rev 13528
Push 2321 by franziskuskiefer@gmail.com at Wed, 16 Aug 2017 10:26:14 +0000
Bug 1389056 - set NSS_USE_64 on sparc64, r=me DONTBUILD
431b37b7225c1ec796e7381bf37702070a643f55: Bug 1389263 - Fix possibly uninitialized value 'curve' in ssl_ecdh_unittest.cc r=franziskus
Tim Taubert <ttaubert@mozilla.com> - Fri, 11 Aug 2017 11:38:55 +0200 - rev 13527
Push 2320 by ttaubert@mozilla.com at Fri, 11 Aug 2017 12:13:09 +0000
Bug 1389263 - Fix possibly uninitialized value 'curve' in ssl_ecdh_unittest.cc r=franziskus Differential Revision: https://nss-review.dev.mozaws.net/D404
8019abedc833059e7333aadb269a2412fe6a14f5: Bug 1389052 - Fix aligned_alloc emulation on i686, r=franziskus
Daiki Ueno <dueno@redhat.com> - Thu, 10 Aug 2017 11:54:47 +0200 - rev 13526
Push 2319 by franziskuskiefer@gmail.com at Fri, 11 Aug 2017 07:25:52 +0000
Bug 1389052 - Fix aligned_alloc emulation on i686, r=franziskus
b5d2871052447cb738b89055c8079bb2be9ef16a: Bug 1385203 - Rework fragmentation for fuzzer, r=ttaubert NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Thu, 10 Aug 2017 14:02:40 +1000 - rev 13525
Push 2318 by martin.thomson@gmail.com at Thu, 10 Aug 2017 10:19:48 +0000
Bug 1385203 - Rework fragmentation for fuzzer, r=ttaubert
e8f0e4ee2c8ca0e381ee9a79ac59d2e4d1c64df4: Bug 1385203 - Use sslBuffer for encoding more widely, r=ekr NSS_TLS13_DRAFT19_BRANCH
Martin Thomson <martin.thomson@gmail.com> - Tue, 01 Aug 2017 21:21:38 +1000 - rev 13524
Push 2318 by martin.thomson@gmail.com at Thu, 10 Aug 2017 10:19:48 +0000
Bug 1385203 - Use sslBuffer for encoding more widely, r=ekr This removes ssl3_Append[Number]ToItem and switches more places to using buffers. The advantage with that, aside from a consistent interface, is that encoding using sslBuffer is length checked. A new field is added to the struct so that it can be used for encoding directly onto the stack rather than relying on reallocation when the space limit is reached. New macros are added so that the internals of sslBuffer aren't accessed directly. Not all instances of these accesses have been fixed. Differential Revision: https://nss-review.dev.mozaws.net/D390
990be4e30bf8a5f5619e0e6630ef7cc0784905fb: Bug 1383824 - set slot->isLoggedIn after setting password, r=ttaubert
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 10 Aug 2017 10:40:49 +0200 - rev 13523
Push 2317 by franziskuskiefer@gmail.com at Thu, 10 Aug 2017 08:45:30 +0000
Bug 1383824 - set slot->isLoggedIn after setting password, r=ttaubert Differential Revision: https://nss-review.dev.mozaws.net/D391
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 tip