searching for reviewer(mt)
5180835aac1d: Bug 1498437 - Require that the server negotiate TLS 1.3 if we sent ESNI. r=mt
EKR <ekr@rtfm.com> - Thu, 11 Oct 2018 18:51:04 -0700 - rev 14914
Push 3207 by ekr@mozilla.com at 2018-10-12 14:44 +0000
Bug 1498437 - Require that the server negotiate TLS 1.3 if we sent ESNI. r=mt Reviewers: mt Tags: #secure-revision Bug #: 1498437 Differential Revision: https://phabricator.services.mozilla.com/D8496
77ae602f995a: Bug 1471566 - fix OSS fuzzing build, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 08 Oct 2018 15:00:24 +0200 - rev 14911
Push 3205 by franziskuskiefer@gmail.com at 2018-10-10 08:12 +0000
Bug 1471566 - fix OSS fuzzing build, r=mt Differential Revision: https://phabricator.services.mozilla.com/D7996
dc4500650617: Bug 1495451 - Fix issues flagged by coverity. r=mt
EKR <ekr@rtfm.com> - Mon, 01 Oct 2018 16:20:33 -0700 - rev 14910
Push 3204 by ekr@mozilla.com at 2018-10-02 01:29 +0000
Bug 1495451 - Fix issues flagged by coverity. r=mt Tags: #secure-revision Bug #: 1495451 Differential Revision: https://phabricator.services.mozilla.com/D7358
94bcc2706b98: Bug 1479787 - clang-format, r=mt,keeler
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 03 Aug 2018 12:11:13 +0200 - rev 14908
Push 3202 by franziskuskiefer@gmail.com at 2018-10-01 08:30 +0000
Bug 1479787 - clang-format, r=mt,keeler Differential Revision: https://phabricator.services.mozilla.com/D2721
403437c461fd: Bug 1479787 - build mozpkix as part of NSS, r=mt,keeler
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 03 Aug 2018 10:35:44 +0200 - rev 14907
Push 3202 by franziskuskiefer@gmail.com at 2018-10-01 08:30 +0000
Bug 1479787 - build mozpkix as part of NSS, r=mt,keeler Differential Revision: https://phabricator.services.mozilla.com/D2719 Differential Revision: https://phabricator.services.mozilla.com/D2720 Differential Revision: https://phabricator.services.mozilla.com/D2861
a706ba3c4fa9: Bug 1494901 - Implement ESNI. r=mt
EKR <ekr@rtfm.com> - Sat, 30 Jun 2018 16:45:09 -0700 - rev 14501
Push 3201 by ekr@mozilla.com at 2018-09-28 14:01 +0000
Bug 1494901 - Implement ESNI. r=mt Phabricator: https://phabricator.services.mozilla.com/D6042
64de5aec1c11: Bug 1478698, preserve leading zeros when computing TLS 1.3 DHE key share, r=mt
Robert Relyea <rrelyea@redhat.com> - Tue, 25 Sep 2018 09:33:20 +0200 - rev 14500
Push 3200 by dueno@redhat.com at 2018-09-27 07:43 +0000
Bug 1478698, preserve leading zeros when computing TLS 1.3 DHE key share, r=mt
4d002e297849: Bug 1488967 - Move tls-interop back to mozilla/tls-interop from fork r=mt
J.C. Jones <jjones@mozilla.com> - Wed, 05 Sep 2018 16:54:10 -0700 - rev 14499
Push 3199 by jjones@mozilla.com at 2018-09-25 16:12 +0000
Bug 1488967 - Move tls-interop back to mozilla/tls-interop from fork r=mt The tests/interop/interop.sh script is using a forked repository of tls-interop, which is merging back into the mainline. Going forward, we should use the mainline repo.
3762ca8ff332: Bug 1485989, integrate tlsfuzzer interop tests with Taskcluster, r=mt
Daiki Ueno <dueno@redhat.com> - Mon, 24 Sep 2018 17:28:24 +0200 - rev 14498
Push 3198 by dueno@redhat.com at 2018-09-24 15:28 +0000
Bug 1485989, integrate tlsfuzzer interop tests with Taskcluster, r=mt Summary: As a start, it only tests TLS 1.3 so far; 8 out of 18 are skipped because of failures. Reviewers: franziskus, HubertKario, mt Reviewed By: mt Subscribers: mt Bug #: 1485989 Differential Revision: https://phabricator.services.mozilla.com/D4217
2c85f81f9b5e: Bug 1489691 - CTR_Update_HW_AES assert failure r=mt
Dipen Patel <bugzilla@pansara.org> - Fri, 21 Sep 2018 18:25:21 -0700 - rev 14491
Push 3191 by jjones@mozilla.com at 2018-09-22 01:28 +0000
Bug 1489691 - CTR_Update_HW_AES assert failure r=mt Summary: The assert for outlen == 0 was being hit when multiple cipher updates that were not block aligned were invoked for a single context. The assumption that intel_aes_ctr_worker() set outlen to zero was incorrect. It only sets the return result to 0. Reviewers: mt Reviewed By: mt Subscribers: rhelmer Bug #: 1489691 Differential Revision: https://phabricator.services.mozilla.com/D5984
36d2e0ea6e9f: Bug 1486925 - explicitly specify x86 files in freebl_base.gypi; r=mt
Nathan Froyd <froydnj@mozilla.com> - Wed, 29 Aug 2018 12:01:30 -0400 - rev 14487
Push 3187 by martin.thomson@gmail.com at 2018-09-06 01:00 +0000
Bug 1486925 - explicitly specify x86 files in freebl_base.gypi; r=mt Just because we're compiling for !x64 on Windows, it does not follow that we are necessarily compiling for x86.
22c307916092: Bug 1317013 - report tls1.3 as an option, r=mt
ui.manish <1991manish.kumar@gmail.com> - Mon, 03 Sep 2018 22:50:05 +0200 - rev 14485
Push 3185 by martin.thomson@gmail.com at 2018-09-04 00:47 +0000
Bug 1317013 - report tls1.3 as an option, r=mt
bbf9ca0f57ea: Bug 1481275, don't send certificate request when resuming with PSK, r=mt
Daiki Ueno <dueno@redhat.com> - Thu, 16 Aug 2018 18:06:16 +0200 - rev 14445
Push 3162 by dueno@redhat.com at 2018-08-16 16:06 +0000
Bug 1481275, don't send certificate request when resuming with PSK, r=mt Reviewers: mt, ekr Reviewed By: mt Subscribers: mt, ekr, kaie, ueno, rrelyea, HubertKario Bug #: 1481275 Differential Revision: https://phabricator.services.mozilla.com/D3425
6349fa699c3b: Bug 1414931, send correct alert on inconsistent signature scheme, r=mt
Daiki Ueno <dueno@redhat.com> - Wed, 15 Aug 2018 10:25:34 +0200 - rev 14443
Push 3160 by dueno@redhat.com at 2018-08-15 08:27 +0000
Bug 1414931, send correct alert on inconsistent signature scheme, r=mt Summary: This fixes the corner cases where incorrect alert is sent (or even no alert is sent): - when the client's CertificateVerify is signed with rsa_pss_pss_*, while the certificate is RSA - when the client's CertificateVerify is signed with rsa_pss_rsae_*, while the certificate is RSA-PSS - when ServerKeyExchange is signed with an inconsistent signature scheme with the server certificate Reviewers: mt Reviewed By: mt Bug #: 1414931 Differential Revision: https://phabricator.services.mozilla.com/D3321
d26e112957a9: Bug 1481209 - update bogo config error description, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 07 Aug 2018 15:07:40 +0200 - rev 14442
Push 3159 by franziskuskiefer@gmail.com at 2018-08-15 06:33 +0000
Bug 1481209 - update bogo config error description, r=mt Differential Revision: https://phabricator.services.mozilla.com/D2854
560be4656a89: Bug 1481873, correct signature_algorithms extension handling, r=mt
Daiki Ueno <dueno@redhat.com> - Fri, 10 Aug 2018 11:34:21 +0200 - rev 14441
Push 3158 by dueno@redhat.com at 2018-08-10 09:38 +0000
Bug 1481873, correct signature_algorithms extension handling, r=mt Summary: This fixes a couple of issues in signature_algorithms extension handling: - MAX_SIGNATURE_SCHEMES is out of sync with ssl_IsSupportedSignatureScheme() - when the extension consists of many bogus/duplicate entries followed by a valid signature scheme, ssl_ParseSignatureSchemes() gives up too early Reviewers: mt Reviewed By: mt Subscribers: HubertKario Bug #: 1481873 Differential Revision: https://phabricator.services.mozilla.com/D3014
e2a0d66b122f: Bug 1443854 - update boring version and enable some tests, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 01 Aug 2018 11:52:57 +0200 - rev 14436
Push 3153 by franziskuskiefer@gmail.com at 2018-08-02 09:00 +0000
Bug 1443854 - update boring version and enable some tests, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1346
d80deec80110: Bug 1476200 - remove usage of DER_Lengths and deprecate it, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Thu, 02 Aug 2018 10:17:06 +0200 - rev 14435
Push 3152 by franziskuskiefer@gmail.com at 2018-08-02 08:20 +0000
Bug 1476200 - remove usage of DER_Lengths and deprecate it, r=mt Differential Revision: https://phabricator.services.mozilla.com/D2183
c84a61acb17d: Bug 1469816, Update label for KeyUpdate to draft-28, r=mt
Daiki Ueno <dueno@redhat.com> - Wed, 20 Jun 2018 16:02:51 +0200 - rev 14410
Push 3128 by dueno@redhat.com at 2018-06-27 13:09 +0000
Bug 1469816, Update label for KeyUpdate to draft-28, r=mt
ca18ca4ba00d: Bug 1464971 - improve ecdsa and dsa, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 29 May 2018 09:38:49 +0200 - rev 14400
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1464971 - improve ecdsa and dsa, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1441
db7f6facd8df: Bug 1464616 - make sure arenas are the same, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 06 Jun 2018 10:42:53 +0200 - rev 14399
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1464616 - make sure arenas are the same, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1565
26bfb61fde63: Bug 1465186 - null earlier in sftkdb_decodeCipherText, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 06 Jun 2018 10:28:17 +0200 - rev 14398
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1465186 - null earlier in sftkdb_decodeCipherText, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1554
9391fc982e71: Bug 1464224 - delete nssmkey, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Fri, 01 Jun 2018 11:00:52 +0200 - rev 14397
Push 3121 by franziskuskiefer@gmail.com at 2018-06-08 12:51 +0000
Bug 1464224 - delete nssmkey, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1486
798e88281cef: Bug 1465241 - always init tmpArena, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 05 Jun 2018 10:59:44 +0200 - rev 14396
Push 3120 by franziskuskiefer@gmail.com at 2018-06-06 08:24 +0000
Bug 1465241 - always init tmpArena, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1552
e36e5500f653: Bug 1464618 - null salt, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 05 Jun 2018 11:08:43 +0200 - rev 14395
Push 3120 by franziskuskiefer@gmail.com at 2018-06-06 08:24 +0000
Bug 1464618 - null salt, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1553
c368cc029700: Bug 1466468 - coverity CID 1435922: Uninitialized members in RecordSizeDefaultsTest, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 04 Jun 2018 09:11:24 +0200 - rev 14384
Push 3113 by franziskuskiefer@gmail.com at 2018-06-04 08:29 +0000
Bug 1466468 - coverity CID 1435922: Uninitialized members in RecordSizeDefaultsTest, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1527
8002af887838: Bug 1466365 - Add a missing test for MAC failure. r=mt
EKR <ekr@rtfm.com> - Sat, 02 Jun 2018 11:10:37 -0700 - rev 14383
Push 3112 by ekr@mozilla.com at 2018-06-03 00:58 +0000
Bug 1466365 - Add a missing test for MAC failure. r=mt Reviewers: mt Tags: #secure-revision Differential Revision: https://phabricator.services.mozilla.com/D1517
f08049a0df4a: Bug 1457716 - Fix CertificateRequest processing for TLS 1.3. r=mt
EKR <ekr@rtfm.com> - Sun, 29 Apr 2018 21:24:28 -0700 - rev 14375
Push 3105 by ekr@mozilla.com at 2018-05-28 20:37 +0000
Bug 1457716 - Fix CertificateRequest processing for TLS 1.3. r=mt Reviewers: mt Tags: #secure-revision Bug #: 1457716 Differential Revision: https://phabricator.services.mozilla.com/D1062
aa6678175aad: Bug 1459456 - check maximum DH and RSA key length in TLS, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 15 May 2018 12:25:08 +0200 - rev 14355
Push 3087 by franziskuskiefer@gmail.com at 2018-05-18 07:49 +0000
Bug 1459456 - check maximum DH and RSA key length in TLS, r=mt Differential Revision: https://phabricator.services.mozilla.com/D1212
aedfebde210d: Bug 1454367 - Fix TlsExtensionTestGeneric.AlpnZeroLength r=mt
Tim Taubert <ttaubert@mozilla.com> - Thu, 17 May 2018 11:24:55 +0200 - rev 14353
Push 3085 by ttaubert@mozilla.com at 2018-05-17 09:25 +0000
Bug 1454367 - Fix TlsExtensionTestGeneric.AlpnZeroLength r=mt Reviewers: mt Reviewed By: mt Bug #: 1454367 Differential Revision: https://phabricator.services.mozilla.com/D951
f896eefd6c8e: Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt NSS_3_37_BRANCH NSS_3_37_BETA2
Tim Taubert <ttaubert@mozilla.com> - Thu, 26 Apr 2018 10:50:18 +0200 - rev 14337
Push 3071 by jjones@mozilla.com at 2018-04-26 12:14 +0000
Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt Reviewers: mt Reviewed By: mt Bug #: 1454321 Differential Revision: https://phabricator.services.mozilla.com/D947
e3c274f32416: Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt
Tim Taubert <ttaubert@mozilla.com> - Thu, 26 Apr 2018 10:50:18 +0200 - rev 14334
Push 3069 by ttaubert@mozilla.com at 2018-04-26 08:51 +0000
Bug 1454321 - Add tests for invalid ECDH ServerKeyExchange.Signature.algorithm values r=mt Reviewers: mt Reviewed By: mt Bug #: 1454321 Differential Revision: https://phabricator.services.mozilla.com/D947
7c7ed1181ed8: Bug 1453920 - Add some more tests for invalid ServerKeyExchange.ECParams r=mt
Tim Taubert <ttaubert@mozilla.com> - Fri, 13 Apr 2018 14:50:48 +0200 - rev 14328
Push 3063 by ttaubert@mozilla.com at 2018-04-13 12:51 +0000
Bug 1453920 - Add some more tests for invalid ServerKeyExchange.ECParams r=mt Reviewers: mt Reviewed By: mt Bug #: 1453920 Differential Revision: https://phabricator.services.mozilla.com/D939
c329a8089a7c: Bug 1444050 - Abort if the server picks TLS 1.2 but SH.session_id equals the fake SID r=mt
Tim Taubert <ttaubert@mozilla.com> - Wed, 11 Apr 2018 10:31:21 +0200 - rev 14318
Push 3053 by ttaubert@mozilla.com at 2018-04-11 08:31 +0000
Bug 1444050 - Abort if the server picks TLS 1.2 but SH.session_id equals the fake SID r=mt Reviewers: mt Reviewed By: mt Bug #: 1444050 Differential Revision: https://phabricator.services.mozilla.com/D698
4b99544d414d: Bug 1443760 - Send alerts for unsupported/unwanted signature algorithms in TLS 1.3 CertificateVerify messages r=mt
Tim Taubert <ttaubert@mozilla.com> - Wed, 07 Mar 2018 13:29:21 +0100 - rev 14314
Push 3049 by ttaubert@mozilla.com at 2018-04-09 16:02 +0000
Bug 1443760 - Send alerts for unsupported/unwanted signature algorithms in TLS 1.3 CertificateVerify messages r=mt Reviewers: mt Bug #: 1443760 Differential Revision: https://phabricator.services.mozilla.com/D693
1bde21f90bd1: Bug 1447816 - Fix assignment where a comparison intended r=mt
J.C. Jones <jjones@mozilla.com> - Thu, 22 Mar 2018 07:13:05 -0700 - rev 14297
Push 3033 by jjones@mozilla.com at 2018-03-22 14:16 +0000
Bug 1447816 - Fix assignment where a comparison intended r=mt Summary: Coverity found an unintended assignment in dtls_GatherData in a PORT_Assert, which is only evaluated in debug builds. Reviewers: mt Reviewed By: mt Bug #: 1447816 Differential Revision: https://phabricator.services.mozilla.com/D787
da99ed4c1eb0: Bug 1447825 - Check sslBuffer_Append in ssl_CallCustomExtensionSenders r=mt
J.C. Jones <jjones@mozilla.com> - Wed, 21 Mar 2018 15:07:11 -0700 - rev 14296
Push 3032 by jjones@mozilla.com at 2018-03-22 14:00 +0000
Bug 1447825 - Check sslBuffer_Append in ssl_CallCustomExtensionSenders r=mt Coverity caught that one use of sslBuffer_Append doesn't check the return, which is abnormal. Since cleanup is the same either way, it's a matter for OOM propagation. This adds the check in a minimal way.
c5dffd6269ea: Bug 1446643 - Update to TLS 1.3 draft-26. r=mt
EKR <ekr@rtfm.com> - Thu, 15 Mar 2018 12:01:09 +0000 - rev 14295
Push 3031 by ekr@mozilla.com at 2018-03-17 15:34 +0000
Bug 1446643 - Update to TLS 1.3 draft-26. r=mt - Update version number - Forbid negotiating < TLS 1.3 with supported_versions - Change to version number 0303 after HRR. Plus test - Update AAD. https://phabricator.services.mozilla.com/D753
b33b017eede5: Bug 1432144 - clean-up sid handling, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 07 Feb 2018 09:42:26 +0100 - rev 14245
Push 2987 by franziskuskiefer@gmail.com at 2018-02-07 14:37 +0000
Bug 1432144 - clean-up sid handling, r=mt Summary: SIDs usage is pretty messy. In this patch I move all *sid to point to ss->sec.ci.sid (unless the SID is purely local to the function). This allows us to free sids when uncaching them. Reviewers: mt Reviewed By: mt Bug #: 1432144 Differential Revision: https://phabricator.services.mozilla.com/D517
094455a4b8b8: Bug 1432748 - don't export resumption token when client auth was used, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Mon, 29 Jan 2018 10:08:42 +0100 - rev 14240
Push 2982 by franziskuskiefer@gmail.com at 2018-01-29 09:30 +0000
Bug 1432748 - don't export resumption token when client auth was used, r=mt Reviewers: mt Reviewed By: mt Bug #: 1432748 Differential Revision: https://phabricator.services.mozilla.com/D436
13338bc12a3c: Bug 1432820 - coverity issues from bug 1399439, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 24 Jan 2018 17:39:22 +0100 - rev 14236
Push 2978 by franziskuskiefer@gmail.com at 2018-01-25 08:31 +0000
Bug 1432820 - coverity issues from bug 1399439, r=mt Differential Revision: https://phabricator.services.mozilla.com/D434
21b6e41668f6: Bug 1399439 - API for external TLS session caches, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Tue, 16 Jan 2018 13:50:59 +0100 - rev 14227
Push 2969 by franziskuskiefer@gmail.com at 2018-01-22 11:20 +0000
Bug 1399439 - API for external TLS session caches, r=mt Reviewers: mt, ekr Bug #: 1399439 Differential Revision: https://phabricator.services.mozilla.com/D284
faaff377f79b: Bug 1429475: Tests for delayed failure and be more aggressive about making failures persistent. r=mt, wtc
EKR <ekr@rtfm.com> - Tue, 09 Jan 2018 20:51:12 -0800 - rev 14226
Push 2968 by ekr@mozilla.com at 2018-01-21 18:48 +0000
Bug 1429475: Tests for delayed failure and be more aggressive about making failures persistent. r=mt, wtc Summary: - Make any call to ssl3_GatherCompleteHandshake (which transitively means any read from the wire) return PR_IO_ERROR if an alert has been sent. - Patch up a few of the tests to handle this new behavior properly. These tests actually were a bit harder to follow so they should also be a bit clearer. - Add a new set of tests for certificate authentication failure. Reviewers: mt Differential Revision: https://phabricator.services.mozilla.com/D365
39c74bc63a1e: Bug 1427673 - Fix NULL pointer to PORT_Memcpy(). r=mt
EKR <ekr@rtfm.com> - Tue, 02 Jan 2018 21:25:15 -0800 - rev 14225
Push 2967 by ekr@mozilla.com at 2018-01-21 18:13 +0000
Bug 1427673 - Fix NULL pointer to PORT_Memcpy(). r=mt Reviewers: mt Bug #: 1427673 Differential Revision: https://phabricator.services.mozilla.com/D348
010767c7c339: Bug 1413634, If TLS server has no signature algorithm overlap with the client hello list, the NSS server sends an incorrect TLS alert, r=mt
Kai Engert <kaie@kuix.de> - Thu, 18 Jan 2018 13:16:49 +0100 - rev 14221
Push 2964 by kaie@kuix.de at 2018-01-18 12:16 +0000
Bug 1413634, If TLS server has no signature algorithm overlap with the client hello list, the NSS server sends an incorrect TLS alert, r=mt
82aff3e2439e: Bug 1427653 - fix clang-format in docker images, r=mt
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 03 Jan 2018 10:20:05 +0100 - rev 14199
Push 2944 by franziskuskiefer@gmail.com at 2018-01-03 09:52 +0000
Bug 1427653 - fix clang-format in docker images, r=mt Differential Revision: https://phabricator.services.mozilla.com/D350
5a14f42384eb: Bug 1423557, cryptohi: make RSA-PSS parameter check stricter, r=mt
Daiki Ueno <dueno@redhat.com> - Tue, 02 Jan 2018 10:19:21 +0100 - rev 14197
Push 2942 by dueno@redhat.com at 2018-01-02 13:14 +0000
Bug 1423557, cryptohi: make RSA-PSS parameter check stricter, r=mt Summary: This adds a check on unsupported hash/mask algorithms and invalid trailer field, when converting SECKEYRSAPSSParams to CK_RSA_PKCS_PSS_PARAMS for both signing and verification. It also add missing support for SHA224 as underlying hash algorithm. Reviewers: mt Reviewed By: mt Bug #: 1423557 Differential Revision: https://phabricator.services.mozilla.com/D322
b88d7c2e5158: Bug 1423016 - DTLS support for tstclnt. r=mt
EKR <ekr@rtfm.com> - Sat, 11 Nov 2017 11:50:18 +0800 - rev 14186
Push 2932 by ekr@mozilla.com at 2017-12-05 00:41 +0000
Bug 1423016 - DTLS support for tstclnt. r=mt Reviewers: mt Differential Revision: https://phabricator.services.mozilla.com/D314
0bd865cf27a7: Bug 1417331, disable keylog tests if keylogfile is disabled, r=mt
Kai Engert <kaie@kuix.de> - Mon, 04 Dec 2017 13:07:43 +0100 - rev 14181
Push 2927 by kaie@kuix.de at 2017-12-04 12:07 +0000
Bug 1417331, disable keylog tests if keylogfile is disabled, r=mt
2e84661d39fa: NSS_TLS13_DRAFT19_BRANCH merge follow-up, remove ssl3encode, r=mt,ttaubert
Franziskus Kiefer <franziskuskiefer@gmail.com> - Wed, 29 Nov 2017 09:24:33 +0100 - rev 14171
Push 2920 by franziskuskiefer@gmail.com at 2017-11-29 08:28 +0000
NSS_TLS13_DRAFT19_BRANCH merge follow-up, remove ssl3encode, r=mt,ttaubert Reviewers: mt, ttaubert Reviewed By: mt, ttaubert Differential Revision: https://phabricator.services.mozilla.com/D283