d347147e92d561d69dc33110f89ccbd48728a162: bustage fix attempt, try to increase ping timeout to 60 seconds
kaie%kuix.de - Tue, 17 Apr 2012 23:22:09 +0000 - rev 10302
bustage fix attempt, try to increase ping timeout to 60 seconds
1851c2f4b8a3aaacf97af823c29b26cf1f0dc247: Attempt test failure bustage fix, bug 741873, use 10 second timeout for ping response
kaie%kuix.de - Tue, 17 Apr 2012 13:45:01 +0000 - rev 10301
Attempt test failure bustage fix, bug 741873, use 10 second timeout for ping response
3c5f0d573232ebf185e6cddb5332812a48cf09ef: Bug 741873, test suite should fail if OCSP server cannot be reached, r=rrelyea
kaie%kuix.de - Mon, 16 Apr 2012 14:49:58 +0000 - rev 10300
Bug 741873, test suite should fail if OCSP server cannot be reached, r=rrelyea
d7e72c2a0c30ad6b87700903683b656e5b31c4e2: Bug 590364, backout, keep the old MD5 signature default for 3.13.x, r=rrelyea
kaie%kuix.de - Mon, 16 Apr 2012 14:42:07 +0000 - rev 10299
Bug 590364, backout, keep the old MD5 signature default for 3.13.x, r=rrelyea
48bfc34fb318d68bf9d0af631825ecc28e1b5199: Bug 745224 - nss_Init leaks memory, author: kdudka@redhat.com, r=rrelyea
emaldona%redhat.com - Sat, 14 Apr 2012 01:44:12 +0000 - rev 10298
Bug 745224 - nss_Init leaks memory, author: kdudka@redhat.com, r=rrelyea
2effc70f4682315a3bef78a5471a42e363ac1a24: Bug 741870, Update OCSP server testing, update the cert generation script and ocsp server config file template, r=rrelyea - not part of the build
kaie%kuix.de - Wed, 11 Apr 2012 19:30:16 +0000 - rev 10297
Bug 741870, Update OCSP server testing, update the cert generation script and ocsp server config file template, r=rrelyea - not part of the build
0aa8aab5b469ac32f6674d6ce43b8d14e99620fe: Bug 741870, Update OCSP server testing. Landing new test certificates. No code change, no review.
kaie%kuix.de - Wed, 11 Apr 2012 12:59:36 +0000 - rev 10296
Bug 741870, Update OCSP server testing. Landing new test certificates. No code change, no review.
0e42fdc38a8ec020a8a2bdcf7a5019577408e0ba: Change versions numbers to NSS 3.13.4 final NSS_3_13_4_BRANCH NSS_3_13_4_RTM
kaie%kuix.de - Fri, 06 Apr 2012 15:20:44 +0000 - rev 10295
Change versions numbers to NSS 3.13.4 final
04505948cead24b52eade7cd81b7a22de558b1c4: Bug 570340: don't use amd64 assembly code on mingw-w64 because it's not yet
wtc%google.com - Fri, 06 Apr 2012 01:49:06 +0000 - rev 10294
Bug 570340: don't use amd64 assembly code on mingw-w64 because it's not yet mingw-w64 compatible. The patch is contributed by Jacek Caban <jacek@codeweavers.com>. r=wtc.
6648d15e2b5aef205e9d52d9248315f693de4074: Bug 540535: Don't call ss->sec.uncache() if the SSL_NO_CACHE option is
wtc%google.com - Fri, 06 Apr 2012 01:30:35 +0000 - rev 10293
Bug 540535: Don't call ss->sec.uncache() if the SSL_NO_CACHE option is enabled. Patch contributed by Alexei Volkov <alvolkov.bgs@gmail.com> and Eric Rescorla <ekr@rtfm.com>. r=wtc.
f1e1df1ba5dfead46d6bb58cc6eaeb98059ba4e5: Bug 681065: rename dtls1con.c to dtlscon.c.
wtc%google.com - Fri, 06 Apr 2012 00:34:25 +0000 - rev 10292
Bug 681065: rename dtls1con.c to dtlscon.c. Modified Files: manifest.mn Added Files: dtlscon.c Removed Files: dtls1con.c
bb5746690e18905f9e2b5befbeb88377aa788761: Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be NSS_3_13_4_BRANCH NSS_3_13_4_BETA2
wtc%google.com - Thu, 05 Apr 2012 21:14:22 +0000 - rev 10291
Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be zero length if a secret key disguised as an RSA key cannot be decoded. This allows us to decode secret keys that have an improperly encoded modulus (a zero-length integer). The patch is partially contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=Kaspar Brand. Modified Files: Tag: NSS_3_13_4_BRANCH keydb.c lowkey.c lowkeyti.h
d7b59324ae77f1d9f833d66fa94a62235893820b: Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be
wtc%google.com - Thu, 05 Apr 2012 21:10:04 +0000 - rev 10290
Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to be zero length if a secret key disguised as an RSA key cannot be decoded. This allows us to decode secret keys that have an improperly encoded modulus (a zero-length integer). The patch is partially contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=Kaspar Brand. Modified Files: keydb.c lowkey.c lowkeyti.h
d01852bd7089979d54d6b886409972f7eff39992: Bug 681065: export the new DTLS_GetTimeout function.
wtc%google.com - Thu, 05 Apr 2012 01:43:30 +0000 - rev 10289
Bug 681065: export the new DTLS_GetTimeout function.
b4822dbd34e813a056780f298786f2571e3d764e: Bug 681065: Implement DTLS (Datagram TLS) 1.0. The patch is contributed by
wtc%google.com - Wed, 04 Apr 2012 03:37:07 +0000 - rev 10288
Bug 681065: Implement DTLS (Datagram TLS) 1.0. The patch is contributed by Eric Rescorla <ekr@rtfm.com>. r=wtc. Modified Files: SSLerrs.h derive.c manifest.mn ssl.def ssl.h ssl3con.c ssl3gthr.c ssl3prot.h sslcon.c ssldef.c sslerr.h sslgathr.c sslimpl.h sslproto.h sslsecur.c sslsock.c sslt.h Added Files: dtls1con.c
cdec07d2eca6cb9acd1cbdad76702884feccd82c: Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style. NSS_3_13_4_BRANCH
wtc%google.com - Wed, 04 Apr 2012 00:09:17 +0000 - rev 10287
Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style. Tag: NSS_3_13_4_BRANCH
43b63a4fc46a8dd60388819826d31db1f96be706: Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style.
wtc%google.com - Wed, 04 Apr 2012 00:08:41 +0000 - rev 10286
Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style.
250fee8f1897e8c534876f2be208c267a64f489a: Bug 565047: Block export cipher suites when TLS 1.1 is negotiated. The
wtc%google.com - Tue, 03 Apr 2012 02:30:54 +0000 - rev 10285
Bug 565047: Block export cipher suites when TLS 1.1 is negotiated. The patch is contributed by Brian Smith <bsmith@mozilla.com>. r=wtc. Modified Files: SSLerrs.h ssl3con.c sslerr.h
242d9742edfa1d3871c6cb928f50d39519641a3c: Bug 697910: ssl3_HandleHandshake should handle SECWouldBlock from
wtc%google.com - Tue, 03 Apr 2012 02:00:14 +0000 - rev 10284
Bug 697910: ssl3_HandleHandshake should handle SECWouldBlock from ssl3_HandleHandshakeMessage when the handshake message spans multiple TLS records. Patch by Brian Smith <bsmith@mozilla.com>. r=wtc.
cd0b2db24f82511391ef9b6a001b6fa0507f1980: Bug 741481: cert_InitLocks should reset certRefCountLock to NULL after NSS_3_13_4_BRANCH
wtc%google.com - Tue, 03 Apr 2012 00:38:19 +0000 - rev 10283
Bug 741481: cert_InitLocks should reset certRefCountLock to NULL after calling PZ_DestroyLock(certRefCountLock). The patch is contributed by Ben Chan <benchan@chromium.org>. r=wtc. Tag: NSS_3_13_4_BRANCH
(0) -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 tip