searching for reviewer(mt)
bbf9ca0f57ea: Bug 1481275, don't send certificate request when resuming with PSK, r=mt
Daiki Ueno <dueno@redhat.com> - Thu, 16 Aug 2018 18:06:16 +0200 - rev 14445
Push 3162 by dueno@redhat.com at 2018-08-16 16:06 +0000
Bug 1481275, don't send certificate request when resuming with PSK, r=mt Reviewers: mt, ekr Reviewed By: mt Subscribers: mt, ekr, kaie, ueno, rrelyea, HubertKario Bug #: 1481275 Differential Revision: https://phabricator.services.mozilla.com/D3425
6349fa699c3b: Bug 1414931, send correct alert on inconsistent signature scheme, r=mt
Daiki Ueno <dueno@redhat.com> - Wed, 15 Aug 2018 10:25:34 +0200 - rev 14443
Push 3160 by dueno@redhat.com at 2018-08-15 08:27 +0000
Bug 1414931, send correct alert on inconsistent signature scheme, r=mt Summary: This fixes the corner cases where incorrect alert is sent (or even no alert is sent): - when the client's CertificateVerify is signed with rsa_pss_pss_*, while the certificate is RSA - when the client's CertificateVerify is signed with rsa_pss_rsae_*, while the certificate is RSA-PSS - when ServerKeyExchange is signed with an inconsistent signature scheme with the server certificate Reviewers: mt Reviewed By: mt Bug #: 1414931 Differential Revision: https://phabricator.services.mozilla.com/D3321
d26e112957a9: Bug 1481209 - update bogo config error description, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 07 Aug 2018 15:07:40 +0200 - rev 14442
Push 3159 by franziskuskiefer@gmail.com at 2018-08-15 06:33 +0000
Bug 1481209 - update bogo config error description, r=mt Differential Revision: https://phabricator.services.mozilla.com/D2854
560be4656a89: Bug 1481873, correct signature_algorithms extension handling, r=mt
Daiki Ueno <dueno@redhat.com> - Fri, 10 Aug 2018 11:34:21 +0200 - rev 14441
Push 3158 by dueno@redhat.com at 2018-08-10 09:38 +0000
Bug 1481873, correct signature_algorithms extension handling, r=mt Summary: This fixes a couple of issues in signature_algorithms extension handling: - MAX_SIGNATURE_SCHEMES is out of sync with ssl_IsSupportedSignatureScheme() - when the extension consists of many bogus/duplicate entries followed by a valid signature scheme, ssl_ParseSignatureSchemes() gives up too early Reviewers: mt Reviewed By: mt Subscribers: HubertKario Bug #: 1481873 Differential Revision: https://phabricator.services.mozilla.com/D3014
e2a0d66b122f: Bug 1443854 - update boring version and enable some tests, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 01 Aug 2018 11:52:57 +0200 - rev 14436
Push 3153 by franziskuskiefer@gmail.com at 2018-08-02 09:00 +0000
Bug 1443854 - update boring version and enable some tests, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1346
d80deec80110: Bug 1476200 - remove usage of DER_Lengths and deprecate it, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 02 Aug 2018 10:17:06 +0200 - rev 14435
Push 3152 by franziskuskiefer@gmail.com at 2018-08-02 08:20 +0000
Bug 1476200 - remove usage of DER_Lengths and deprecate it, r=mt Differential Revision: https://phabricator.services.mozilla.com/D2183
c84a61acb17d: Bug 1469816, Update label for KeyUpdate to draft-28, r=mt
Daiki Ueno <dueno@redhat.com> - Wed, 20 Jun 2018 16:02:51 +0200 - rev 14410
Push 3128 by dueno@redhat.com at 2018-06-27 13:09 +0000
Bug 1469816, Update label for KeyUpdate to draft-28, r=mt
ca18ca4ba00d: Bug 1464971 - improve ecdsa and dsa, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 29 May 2018 09:38:49 +0200 - rev 14400
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1464971 - improve ecdsa and dsa, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1441
db7f6facd8df: Bug 1464616 - make sure arenas are the same, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 06 Jun 2018 10:42:53 +0200 - rev 14399
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1464616 - make sure arenas are the same, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1565
26bfb61fde63: Bug 1465186 - null earlier in sftkdb_decodeCipherText, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 06 Jun 2018 10:28:17 +0200 - rev 14398
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1465186 - null earlier in sftkdb_decodeCipherText, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1554
9391fc982e71: Bug 1464224 - delete nssmkey, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 01 Jun 2018 11:00:52 +0200 - rev 14397
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1464224 - delete nssmkey, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1486
798e88281cef: Bug 1465241 - always init tmpArena, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 05 Jun 2018 10:59:44 +0200 - rev 14396
Push 3120 by franziskuskiefer@gmail.com at 2018-06-06 08:24 +0000
Bug 1465241 - always init tmpArena, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1552
e36e5500f653: Bug 1464618 - null salt, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 05 Jun 2018 11:08:43 +0200 - rev 14395
Push 3120 by franziskuskiefer@gmail.com at 2018-06-06 08:24 +0000
Bug 1464618 - null salt, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1553
c368cc029700: Bug 1466468 - coverity CID 1435922: Uninitialized members in RecordSizeDefaultsTest, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 04 Jun 2018 09:11:24 +0200 - rev 14384
Push 3113 by franziskuskiefer@gmail.com at 2018-06-04 08:29 +0000
Bug 1466468 - coverity CID 1435922: Uninitialized members in RecordSizeDefaultsTest, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1527
8002af887838: Bug 1466365 - Add a missing test for MAC failure. r=mt
EKR <ekr@rtfm.com> - Sat, 02 Jun 2018 11:10:37 -0700 - rev 14383
Push 3112 by ekr@mozilla.com at 2018-06-03 00:58 +0000
Bug 1466365 - Add a missing test for MAC failure. r=mt Reviewers: mt Tags: #secure-revision Differential Revision: https://phabricator.services.mozilla.com/D1517
f08049a0df4a: Bug 1457716 - Fix CertificateRequest processing for TLS 1.3. r=mt
EKR <ekr@rtfm.com> - Sun, 29 Apr 2018 21:24:28 -0700 - rev 14375
Push 3105 by ekr@mozilla.com at 2018-05-28 20:37 +0000
Bug 1457716 - Fix CertificateRequest processing for TLS 1.3. r=mt Reviewers: mt Tags: #secure-revision Bug #: 1457716 Differential Revision: https://phabricator.services.mozilla.com/D1062
aa6678175aad: Bug 1459456 - check maximum DH and RSA key length in TLS, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 15 May 2018 12:25:08 +0200 - rev 14355
Push 3087 by franziskuskiefer@gmail.com at 2018-05-18 07:49 +0000
Bug 1459456 - check maximum DH and RSA key length in TLS, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1212
aedfebde210d: Bug 1454367 - Fix TlsExtensionTestGeneric.AlpnZeroLength r=mt
Tim Taubert <ttaubert@mozilla.com> - Thu, 17 May 2018 11:24:55 +0200 - rev 14353
Push 3085 by ttaubert@mozilla.com at 2018-05-17 09:25 +0000
Bug 1454367 - Fix TlsExtensionTestGeneric.AlpnZeroLength r=mt Reviewers: mt Reviewed By: mt Bug #: 1454367 Differential Revision: https://phabricator.services.mozilla.com/D951
f896eefd6c8e: Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt NSS_3_37_BRANCH NSS_3_37_BETA2
Tim Taubert <ttaubert@mozilla.com> - Thu, 26 Apr 2018 10:50:18 +0200 - rev 14337
Push 3071 by jjones@mozilla.com at 2018-04-26 12:14 +0000
Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt Reviewers: mt Reviewed By: mt Bug #: 1454321 Differential Revision: https://phabricator.services.mozilla.com/D947
e3c274f32416: Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt
Tim Taubert <ttaubert@mozilla.com> - Thu, 26 Apr 2018 10:50:18 +0200 - rev 14334
Push 3069 by ttaubert@mozilla.com at 2018-04-26 08:51 +0000
Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt Reviewers: mt Reviewed By: mt Bug #: 1454321 Differential Revision: https://phabricator.services.mozilla.com/D947
7c7ed1181ed8: Bug 1453920 - Add some more tests for invalid ServerKeyExchange.ECParams r=mt
Tim Taubert <ttaubert@mozilla.com> - Fri, 13 Apr 2018 14:50:48 +0200 - rev 14328
Push 3063 by ttaubert@mozilla.com at 2018-04-13 12:51 +0000
Bug 1453920 - Add some more tests for invalid ServerKeyExchange.ECParams r=mt Reviewers: mt Reviewed By: mt Bug #: 1453920 Differential Revision: https://phabricator.services.mozilla.com/D939
c329a8089a7c: Bug 1444050 - Abort if the server picks TLS 1.2 but SH.session_id equals the fake SID r=mt
Tim Taubert <ttaubert@mozilla.com> - Wed, 11 Apr 2018 10:31:21 +0200 - rev 14318
Push 3053 by ttaubert@mozilla.com at 2018-04-11 08:31 +0000
Bug 1444050 - Abort if the server picks TLS 1.2 but SH.session_id equals the fake SID r=mt Reviewers: mt Reviewed By: mt Bug #: 1444050 Differential Revision: https://phabricator.services.mozilla.com/D698
4b99544d414d: Bug 1443760 - Send alerts for unsupported/unwanted signature algorithms in TLS 1.3 CertificateVerify messages r=mt
Tim Taubert <ttaubert@mozilla.com> - Wed, 07 Mar 2018 13:29:21 +0100 - rev 14314
Push 3049 by ttaubert@mozilla.com at 2018-04-09 16:02 +0000
Bug 1443760 - Send alerts for unsupported/unwanted signature algorithms in TLS 1.3 CertificateVerify messages r=mt Reviewers: mt Bug #: 1443760 Differential Revision: https://phabricator.services.mozilla.com/D693
1bde21f90bd1: Bug 1447816 - Fix assignment where a comparison intended r=mt
J.C. Jones <jjones@mozilla.com> - Thu, 22 Mar 2018 07:13:05 -0700 - rev 14297
Push 3033 by jjones@mozilla.com at 2018-03-22 14:16 +0000
Bug 1447816 - Fix assignment where a comparison intended r=mt Summary: Coverity found an unintended assignment in dtls_GatherData in a PORT_Assert, which is only evaluated in debug builds. Reviewers: mt Reviewed By: mt Bug #: 1447816 Differential Revision: https://phabricator.services.mozilla.com/D787
da99ed4c1eb0: Bug 1447825 - Check sslBuffer_Append in ssl_CallCustomExtensionSenders r=mt
J.C. Jones <jjones@mozilla.com> - Wed, 21 Mar 2018 15:07:11 -0700 - rev 14296
Push 3032 by jjones@mozilla.com at 2018-03-22 14:00 +0000
Bug 1447825 - Check sslBuffer_Append in ssl_CallCustomExtensionSenders r=mt Coverity caught that one use of sslBuffer_Append doesn't check the return, which is abnormal. Since cleanup is the same either way, it's a matter for OOM propagation. This adds the check in a minimal way.
c5dffd6269ea: Bug 1446643 - Update to TLS 1.3 draft-26. r=mt
EKR <ekr@rtfm.com> - Thu, 15 Mar 2018 12:01:09 +0000 - rev 14295
Push 3031 by ekr@mozilla.com at 2018-03-17 15:34 +0000
Bug 1446643 - Update to TLS 1.3 draft-26. r=mt - Update version number - Forbid negotiating < TLS 1.3 with supported_versions - Change to version number 0303 after HRR. Plus test - Update AAD. https://phabricator.services.mozilla.com/D753
b33b017eede5: Bug 1432144 - clean-up sid handling, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 07 Feb 2018 09:42:26 +0100 - rev 14245
Push 2987 by franziskuskiefer@gmail.com at 2018-02-07 14:37 +0000
Bug 1432144 - clean-up sid handling, r=mt Summary: SIDs usage is pretty messy. In this patch I move all *sid to point to ss->sec.ci.sid (unless the SID is purely local to the function). This allows us to free sids when uncaching them. Reviewers: mt Reviewed By: mt Bug #: 1432144 Differential Revision: https://phabricator.services.mozilla.com/D517
094455a4b8b8: Bug 1432748 - don't export resumption token when client auth was used, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 29 Jan 2018 10:08:42 +0100 - rev 14240
Push 2982 by franziskuskiefer@gmail.com at 2018-01-29 09:30 +0000
Bug 1432748 - don't export resumption token when client auth was used, r=mt Reviewers: mt Reviewed By: mt Bug #: 1432748 Differential Revision: https://phabricator.services.mozilla.com/D436
13338bc12a3c: Bug 1432820 - coverity issues from bug 1399439, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 24 Jan 2018 17:39:22 +0100 - rev 14236
Push 2978 by franziskuskiefer@gmail.com at 2018-01-25 08:31 +0000
Bug 1432820 - coverity issues from bug 1399439, r=mt Differential Revision: https://phabricator.services.mozilla.com/D434
21b6e41668f6: Bug 1399439 - API for external TLS session caches, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 16 Jan 2018 13:50:59 +0100 - rev 14227
Push 2969 by franziskuskiefer@gmail.com at 2018-01-22 11:20 +0000
Bug 1399439 - API for external TLS session caches, r=mt Reviewers: mt, ekr Bug #: 1399439 Differential Revision: https://phabricator.services.mozilla.com/D284
faaff377f79b: Bug 1429475: Tests for delayed failure and be more aggressive about making failures persistent. r=mt, wtc
EKR <ekr@rtfm.com> - Tue, 09 Jan 2018 20:51:12 -0800 - rev 14226
Push 2968 by ekr@mozilla.com at 2018-01-21 18:48 +0000
Bug 1429475: Tests for delayed failure and be more aggressive about making failures persistent. r=mt, wtc Summary: - Make any call to ssl3_GatherCompleteHandshake (which transitively means any read from the wire) return PR_IO_ERROR if an alert has been sent. - Patch up a few of the tests to handle this new behavior properly. These tests actually were a bit harder to follow so they should also be a bit clearer. - Add a new set of tests for certificate authentication failure. Reviewers: mt Differential Revision: https://phabricator.services.mozilla.com/D365
39c74bc63a1e: Bug 1427673 - Fix NULL pointer to PORT_Memcpy(). r=mt
EKR <ekr@rtfm.com> - Tue, 02 Jan 2018 21:25:15 -0800 - rev 14225
Push 2967 by ekr@mozilla.com at 2018-01-21 18:13 +0000
Bug 1427673 - Fix NULL pointer to PORT_Memcpy(). r=mt Reviewers: mt Bug #: 1427673 Differential Revision: https://phabricator.services.mozilla.com/D348
010767c7c339: Bug 1413634, If TLS server has no signature algorithm overlap with the client hello list, the NSS server sends an incorrect TLS alert, r=mt
Kai Engert <kaie@kuix.de> - Thu, 18 Jan 2018 13:16:49 +0100 - rev 14221
Push 2964 by kaie@kuix.de at 2018-01-18 12:16 +0000
Bug 1413634, If TLS server has no signature algorithm overlap with the client hello list, the NSS server sends an incorrect TLS alert, r=mt
82aff3e2439e: Bug 1427653 - fix clang-format in docker images, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 03 Jan 2018 10:20:05 +0100 - rev 14199
Push 2944 by franziskuskiefer@gmail.com at 2018-01-03 09:52 +0000
Bug 1427653 - fix clang-format in docker images, r=mt Differential Revision: https://phabricator.services.mozilla.com/D350
5a14f42384eb: Bug 1423557, cryptohi: make RSA-PSS parameter check stricter, r=mt
Daiki Ueno <dueno@redhat.com> - Tue, 02 Jan 2018 10:19:21 +0100 - rev 14197
Push 2942 by dueno@redhat.com at 2018-01-02 13:14 +0000
Bug 1423557, cryptohi: make RSA-PSS parameter check stricter, r=mt Summary: This adds a check on unsupported hash/mask algorithms and invalid trailer field, when converting SECKEYRSAPSSParams to CK_RSA_PKCS_PSS_PARAMS for both signing and verification. It also add missing support for SHA224 as underlying hash algorithm. Reviewers: mt Reviewed By: mt Bug #: 1423557 Differential Revision: https://phabricator.services.mozilla.com/D322
b88d7c2e5158: Bug 1423016 - DTLS support for tstclnt. r=mt
EKR <ekr@rtfm.com> - Sat, 11 Nov 2017 11:50:18 +0800 - rev 14186
Push 2932 by ekr@mozilla.com at 2017-12-05 00:41 +0000
Bug 1423016 - DTLS support for tstclnt. r=mt Reviewers: mt Differential Revision: https://phabricator.services.mozilla.com/D314
0bd865cf27a7: Bug 1417331, disable keylog tests if keylogfile is disabled, r=mt
Kai Engert <kaie@kuix.de> - Mon, 04 Dec 2017 13:07:43 +0100 - rev 14181
Push 2927 by kaie@kuix.de at 2017-12-04 12:07 +0000
Bug 1417331, disable keylog tests if keylogfile is disabled, r=mt
2e84661d39fa: NSS_TLS13_DRAFT19_BRANCH merge follow-up, remove ssl3encode, r=mt,ttaubert
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 29 Nov 2017 09:24:33 +0100 - rev 14171
Push 2920 by franziskuskiefer@gmail.com at 2017-11-29 08:28 +0000
NSS_TLS13_DRAFT19_BRANCH merge follow-up, remove ssl3encode, r=mt,ttaubert Reviewers: mt, ttaubert Reviewed By: mt, ttaubert Differential Revision: https://phabricator.services.mozilla.com/D283
36dc2b60c1f6: Bug 1417331 - fix key log unit tests, r=mt
Peter Wu <peter@lekensteyn.nl> - Wed, 15 Nov 2017 07:48:54 +0000 - rev 14169
Push 2918 by martin.thomson@gmail.com at 2017-11-27 05:40 +0000
Bug 1417331 - fix key log unit tests, r=mt The key log unit tests were never activated because the SSLKEYLOGFILE environment variable was not properly set (putenv claims the pointer and requires it to be valid after invocation) after changing to PR_SetEnv. The test failures did not show up because gtest somehow swallows errors for the child process. Set "throw_on_failure" in the child to fix this. And finally fix the invalid tests (client random size 1? nope) and ensure 0-RTT is triggered such that CLIENT_EARLY_TRAFFIC_SECRET can be tested.
4affba537fdd: Bug 1415795 - revert renaming of SSL_UseAltServerHelloType, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 21 Nov 2017 07:53:09 +0100 - rev 14138
Push 2895 by franziskuskiefer@gmail.com at 2017-11-21 06:56 +0000
Bug 1415795 - revert renaming of SSL_UseAltServerHelloType, r=mt Summary: Reverting name change of experimental API (transplanted changed from 3.34 branch). blocks D222 Reviewers: mt Reviewed By: mt Bug #: 1415795 Differential Revision: https://phabricator.services.mozilla.com/D261
6da6e699fa02: Bug 1415171, Fix handling of default RSA-PSS parameters, r=mt
Daiki Ueno <dueno@redhat.com> - Wed, 08 Nov 2017 11:13:25 +0100 - rev 14101
Push 2870 by dueno@redhat.com at 2017-11-08 10:34 +0000
Bug 1415171, Fix handling of default RSA-PSS parameters, r=mt Reviewers: mt, rrelyea Reviewed By: mt Bug #: 1415171 Differential Revision: https://phabricator.services.mozilla.com/D202
7345a09561bb: Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt
Robert Relyea <rrelyea@redhat.com> - Wed, 01 Nov 2017 12:42:41 -0700 - rev 14078
Push 2853 by elio.maldonado.batiz@gmail.com at 2017-11-01 19:44 +0000
Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt - Original patch by Robert Relyea was modified to make the tests gtests unit tests - Tests modifications are a collaboration between Martin Thomson and Elio Maldonado
84e886ea090e: Bug 1400844, Implement handling of RSA-PSS signatures on certificates, r=mt
Daiki Ueno <dueno@redhat.com> - Tue, 24 Oct 2017 13:45:06 +0200 - rev 14065
Push 2840 by dueno@redhat.com at 2017-10-24 11:45 +0000
Bug 1400844, Implement handling of RSA-PSS signatures on certificates, r=mt This series adds high level API to sign and verify RSA-PSS signatures on certificates and utilizes them in tools.
6c4aced0b56b: Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt
Robert Relyea <rrelya@redhat.com> - Fri, 20 Oct 2017 09:21:42 -0700 - rev 14056
Push 2833 by elio.maldonado.batiz@gmail.com at 2017-10-20 16:28 +0000
Bug 1236720 - Provide sym key derive mechanism as result of encryption of message, r=mt - The test part of the original patched modifified to convert it into a gtests unit test - Modifications where a collaboration betewen Martin Thompson and Elio Maldonado
24695a55c095: Bug 1405565 - ssl_keylog_unittest: ignore remove failure, r=mt
Peter Wu <peter@lekensteyn.nl> - Sun, 15 Oct 2017 19:21:23 +0100 - rev 14049
Push 2826 by martin.thomson@gmail.com at 2017-10-16 04:28 +0000
Bug 1405565 - ssl_keylog_unittest: ignore remove failure, r=mt The file normally does not exist (ENOENT), only when running tests manually (direct execution of the ssl_gtests binary) you will run into existing files. Ignore the return result to please Coverity.
a34a2d72112f: Bug 1405565 - ssl_keylog_unittest: ignore remove failure, r=mt NSS_TLS13_DRAFT19_BRANCH
Peter Wu <peter@lekensteyn.nl> - Sun, 15 Oct 2017 19:21:23 +0100 - rev 14047
Push 2824 by martin.thomson@gmail.com at 2017-10-16 04:17 +0000
Bug 1405565 - ssl_keylog_unittest: ignore remove failure, r=mt The file normally does not exist (ENOENT), only when running tests manually (direct execution of the ssl_gtests binary) you will run into existing files. Ignore the return result to please Coverity.
a0cb1758c33f: Bug 1295163 - Actually enable TlsZeroRttReplayTest, r=mt NSS_TLS13_DRAFT19_BRANCH
Peter Wu <peter@lekensteyn.nl> - Wed, 04 Oct 2017 23:31:08 +0100 - rev 14033
Push 2813 by martin.thomson@gmail.com at 2017-10-08 23:35 +0000
Bug 1295163 - Actually enable TlsZeroRttReplayTest, r=mt
6fb9c5396d52: Bug 1396525 - put keaGroup and sigScheme in the cache so we can put it in SSLChannelInfo, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 04 Oct 2017 10:05:29 +0200 - rev 13623
Push 2403 by franziskuskiefer@gmail.com at 2017-10-04 08:36 +0000
Bug 1396525 - put keaGroup and sigScheme in the cache so we can put it in SSLChannelInfo, r=mt Summary: This adds originalKeaGroup and resumed fields to the SSLChannelInfo, which provide information about the key exchange group of the original TLS handshake when the session is resumed, and information whether a session is resumed or not. To do this this patch adds the keaGroup and sigScheme to the session cache and the session ticket. Reviewers: mt Reviewed By: mt Bug #: 1396525 Differential Revision: https://phabricator.services.mozilla.com/D29
c1866d7d7f15: Bug 1287711 - Make writes to SSLKEYLOGFILE thread-safe, r=mt
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 14:55:02 -0700 - rev 13622
Push 2402 by martin.thomson@gmail.com at 2017-10-03 22:23 +0000
Bug 1287711 - Make writes to SSLKEYLOGFILE thread-safe, r=mt Protect writes to the keylog file with a lock. Differential Revision: https://phabricator.services.mozilla.com/D86
965b5533bf61: Bug 1287711 - Remove RSA premaster secret from keylog file, r=mt
Martin Thomson <martin.thomson@gmail.com> - Tue, 03 Oct 2017 14:49:25 -0700 - rev 13621
Push 2401 by martin.thomson@gmail.com at 2017-10-03 21:51 +0000
Bug 1287711 - Remove RSA premaster secret from keylog file, r=mt Since the master secret is logged via "CLIENT_RANDOM", there is little reason to log the RSA premaster secret. Differential Revision: https://phabricator.services.mozilla.com/D85