searching for reviewer(rbarnes)
8192716611b6d4ab389b0ba2e1fd68be77abefd2: Bug 1343202 - Move Buffer definition into its own file; r=keeler,rbarnes
Stephanie Ouillon <stephouillon@mozilla.com> - Thu, 17 Aug 2017 09:23:29 +0200 - rev 426736
Push 7761 by jlund@mozilla.com at Fri, 15 Sep 2017 00:19:52 +0000
Bug 1343202 - Move Buffer definition into its own file; r=keeler,rbarnes MozReview-Commit-ID: JHAXllvfG3x
ad5adacd8e14472b0abcf9065efbcc96d5a859c4: Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes
J.C. Jones <jjones@mozilla.com> - Wed, 01 Feb 2017 15:21:04 -0700 - rev 395063
Push 7391 by mtabara@mozilla.com at Mon, 12 Jun 2017 13:08:53 +0000
Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes This change includes the FIDO "App ID" as part of the function used to generate the wrapping key used in the NSS-based U2F soft token, cryptographically binding the "Key Handle" to the site that Key Handle is intended for. This is a breaking change with existing registered U2F keys, but since our soft token is hidden behind a pref, it does not attempt to be backward-compatible. - Updated for rbarnes' and qdot's reviews comments. Thanks! - Made more strict in size restrictions, and added a version field to help us be this strict. - Bugfix for an early unprotected buffer use (Thanks again rbarnes!) - Fix a sneaky memory leak re: CryptoBuffer.ToSECItem MozReview-Commit-ID: Jf6gNPauT4Y
713c0a78c2c12b999dcba625c358405531c468bc: Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes
J.C. Jones <jjones@mozilla.com> - Wed, 01 Feb 2017 15:21:04 -0700 - rev 394505
Push 7391 by mtabara@mozilla.com at Mon, 12 Jun 2017 13:08:53 +0000
Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes This change includes the FIDO "App ID" as part of the function used to generate the wrapping key used in the NSS-based U2F soft token, cryptographically binding the "Key Handle" to the site that Key Handle is intended for. This is a breaking change with existing registered U2F keys, but since our soft token is hidden behind a pref, it does not attempt to be backward-compatible. - Updated for rbarnes' and qdot's reviews comments. Thanks! - Made more strict in size restrictions, and added a version field to help us be this strict. - Bugfix for an early unprotected buffer use (Thanks again rbarnes!) MozReview-Commit-ID: Jf6gNPauT4Y
f1cb42c8da5b70ea5f5391c6c3a78af914426725: bug 1301956 - add more Mozilla resources to preloaded pins r=keeler,rbarnes DONTBUILD NPOTB
Julien Vehent <jvehent@mozilla.com> - Tue, 29 Nov 2016 13:15:32 -0800 - rev 369690
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
bug 1301956 - add more Mozilla resources to preloaded pins r=keeler,rbarnes DONTBUILD NPOTB Also trims the pinset for said Mozilla resources to just DigiCert and Let's Encrypt (as a backup).
01aafb2359c9423afd979ec57c401e5034d285fa: Bug 1311379 - Stop using Scoped.h NSS types in WebCryptoTask.(cpp|h). r=rbarnes,ttaubert
Cykesiopka <cykesiopka.bmo@gmail.com> - Fri, 18 Nov 2016 00:49:25 +0800 - rev 368361
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1311379 - Stop using Scoped.h NSS types in WebCryptoTask.(cpp|h). r=rbarnes,ttaubert Scoped.h is deprecated. MozReview-Commit-ID: CAcnrB9v3dH
32425af1283dbf644676809cf06c5a98bd539b4d: Bug 1308890 - Make use of ScopedAutoSECItem in CryptoKey.cpp. r=rbarnes
Cykesiopka <cykesiopka.bmo@gmail.com> - Fri, 14 Oct 2016 10:36:54 +0800 - rev 360891
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1308890 - Make use of ScopedAutoSECItem in CryptoKey.cpp. r=rbarnes ScopedAutoSECItem is useful for getting rid of this pattern: > ScopedSECItem item(SECITEM_AllocItem(nullptr, nullptr, 0)); While this pattern works, ScopedAutoSECItem is slightly superior in that it doesn't unnecessarily cause a SECItem to be allocated from the heap. Moreover, this moves us further away from Scoped.h, which is deprecated. MozReview-Commit-ID: B30MNTHzzTc
96f862cb3d91729aeaef135b9a9c62d726d47053: bug 1282008 - update CNNIC whitelist to remove expired certificates r=rbarnes
David Keeler <dkeeler@mozilla.com> - Thu, 06 Oct 2016 14:45:51 -0700 - rev 360661
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
bug 1282008 - update CNNIC whitelist to remove expired certificates r=rbarnes MozReview-Commit-ID: 1OopsrAxXrv
51cbff25e0179690152ccbead503c3b2da58367e: Bug 1306003 - Enable P-521, r=ekr,rbarnes
Martin Thomson <martin.thomson@gmail.com> - Thu, 29 Sep 2016 10:40:40 +1000 - rev 358562
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1306003 - Enable P-521, r=ekr,rbarnes MozReview-Commit-ID: 1oF98CACtQV
5436f8c05f6d05eaf561cba34c845b0328e949df: bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 14 Sep 2016 15:11:15 -0700 - rev 357601
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes MozReview-Commit-ID: 2uwHPxk0VhZ
2df66e8b7411fa3f7a998f9d87dc967371577c17: bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 14 Sep 2016 15:11:15 -0700 - rev 357577
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes MozReview-Commit-ID: 2uwHPxk0VhZ
43c724bde81cd7dbd154e8741da017b86c43cdbd: Bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes a=gchang
David Keeler <dkeeler@mozilla.com> - Wed, 14 Sep 2016 15:11:15 -0700 - rev 355955
Push 6570 by raliiev@mozilla.com at Mon, 14 Nov 2016 12:26:13 +0000
Bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes a=gchang MozReview-Commit-ID: 2uwHPxk0VhZ
1f8a3181ab8f6208f0a84a174b2ef82d77032ece: Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Tue, 12 Jul 2016 07:26:11 +0200 - rev 344635
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
d9659c22b3c57496b2f79e2b99cb530df7375b5a: bug 1265113 - implement platform support for enterprise roots r=Cykesiopka,mhowell,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 13 Apr 2016 15:36:22 -0700 - rev 338223
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
bug 1265113 - implement platform support for enterprise roots r=Cykesiopka,mhowell,rbarnes MozReview-Commit-ID: JKxwCjoH0Oa
280b570936bb63f08ffb135d7dafb8f4d4153973: bug 1182742 - allow users to override small key size errors r=rbarnes
David Keeler <dkeeler@mozilla.com> - Mon, 11 Apr 2016 13:45:47 -0700 - rev 332225
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
bug 1182742 - allow users to override small key size errors r=rbarnes Key size enforcement for TLS certificates happens at two levels: PSM and NSS. PSM enforces a minimum of 1024 bits. NSS enforces a minimum of 1023 bits by default. The NSS error is not overridable, but the PSM error is. This change allows users to connect to devices with small RSA keys (as little as 512 bits) using the certificate error override functionality. MozReview-Commit-ID: 2TZ8c4I3hXC
17e4c84b299dba389fdb6cbc856629d11fea55bc: Bug 842818 - Inline CloneData() and clean up ImportKeyTask::SetKeyData() r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Thu, 17 Mar 2016 11:02:11 +0100 - rev 330299
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 842818 - Inline CloneData() and clean up ImportKeyTask::SetKeyData() r=rbarnes
ffcb400c1a48223f5ed74bd4f89b5fbe9602f70e: Bug 842818 - Run WebCrypto tests in Workers r=mt,rbarnes
Tim Taubert <ttaubert@mozilla.com> - Mon, 21 Sep 2015 19:53:01 +0200 - rev 330295
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 842818 - Run WebCrypto tests in Workers r=mt,rbarnes
201173cd688629e57570cf67d1e91c2ae84b3f5f: bug 1239166 - platform work to support Microsoft Family Safety functionality r=froydnj,mgoodwin,mhowell,rbarnes,vladan
David Keeler <dkeeler@mozilla.com> - Tue, 12 Jan 2016 15:39:43 -0800 - rev 329246
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
bug 1239166 - platform work to support Microsoft Family Safety functionality r=froydnj,mgoodwin,mhowell,rbarnes,vladan MozReview-Commit-ID: GhpJqJB97r9
ef37a752e6cd360da991756ffb73d4319780d11a: Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Tue, 01 Mar 2016 09:19:28 -0800 - rev 328843
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
e769e96e86802aa52db21ec1be64b000d748611e: Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Tue, 01 Mar 2016 09:17:56 -0800 - rev 328842
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
3b4efd3e713cba744009493a8283e524275e8d03: Bug 1257325 - Silence VS2015 compiler warnings in CryptoKey.cpp f=gps r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Fri, 18 Mar 2016 11:24:57 +0100 - rev 327207
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1257325 - Silence VS2015 compiler warnings in CryptoKey.cpp f=gps r=rbarnes
55a7478c3343c5f0f02921a4d1613b53b4318535: Bug 1243311 - Add structured cloning tests for CryptoKeys r=rbarnes
Tim Taubert <tim@timtaubert.de> - Wed, 09 Mar 2016 21:18:38 +0100 - rev 325797
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1243311 - Add structured cloning tests for CryptoKeys r=rbarnes
06a4d2d48fb2cdb90d93a942808eae19190d5d60: Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Mon, 29 Feb 2016 08:46:48 -0800 - rev 322455
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
846e31fe5eb27639054fe70967844edbbe6d6be4: Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Mon, 29 Feb 2016 08:44:39 -0800 - rev 322454
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
b9799dc9819901ff4aca62a05672c6fabbe8199a: Bug 1241757 - Permit export of JWK with empty key_ops field, r=rbarnes
Martin Thomson <martin.thomson@gmail.com> - Fri, 22 Jan 2016 18:07:39 +1100 - rev 320552
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1241757 - Permit export of JWK with empty key_ops field, r=rbarnes
84b8eef80b22d4d129c3c6d5b5ac6f4d99742f00: Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Wed, 23 Dec 2015 11:50:05 -0800 - rev 320279
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
b9aecc2e6334a47faf1435bdd9abfc33713f58fd: Bug 1234813 - Tests for: sendBeacon should not throw if blocked by Content Policy. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Wed, 23 Dec 2015 11:45:26 -0800 - rev 320278
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1234813 - Tests for: sendBeacon should not throw if blocked by Content Policy. r=rbarnes
92e279613f0e6d98c0d206a5d9e7f7106a9dea2c: Bug 1191936 - Add more test vectors and a test for deterministic signatures r=rbarnes
Tim Taubert <tim@timtaubert.de> - Fri, 22 Jan 2016 15:37:35 +0100 - rev 318136
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Add more test vectors and a test for deterministic signatures r=rbarnes
29a076e8bc0d803b73533c95def47b7bdaf93dc9: Bug 1191936 - Implement SPKI/PKCS#8/JWK import/export for RSA-PSS r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Wed, 14 Oct 2015 13:38:05 +0200 - rev 318135
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Implement SPKI/PKCS#8/JWK import/export for RSA-PSS r=rbarnes
1fba432e1cab3cefc95fca1553d9fbd850fb73c8: Bug 1191936 - Implement RSA-PSS signing and verification r=rbarnes,smaug
Tim Taubert <ttaubert@mozilla.com> - Tue, 13 Oct 2015 20:22:43 +0200 - rev 318134
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Implement RSA-PSS signing and verification r=rbarnes,smaug
1faac7557b25577cfd94e4cd3b3c7c3922177cc9: Bug 1191936 - Implement RSA-PSS key generation r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Tue, 13 Oct 2015 18:48:18 +0200 - rev 318133
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Implement RSA-PSS key generation r=rbarnes
9e347384b8db9a52e062c82d86436deaf23df07a: Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug
Tim Taubert <tim@timtaubert.de> - Tue, 26 Jan 2016 14:57:52 +0100 - rev 318107
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug
f05cc5ce1dc7ca7305df5598e7c40386c090b6c2: Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug a=lizzard
Tim Taubert <tim@timtaubert.de> - Tue, 26 Jan 2016 14:57:52 +0100 - rev 316620
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug a=lizzard
bb6bfd172d6e40b5d6a87d8118faf860c02f8545: bug 1239455 - rework telemetry for SHA-1 certificates to reflect possible policy states r=Cykesiopka,mgoodwin,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 13 Jan 2016 12:50:42 -0800 - rev 315966
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
bug 1239455 - rework telemetry for SHA-1 certificates to reflect possible policy states r=Cykesiopka,mgoodwin,rbarnes Before this patch, we were measuring where SHA-1 was being used in TLS certificates: nowhere, in end-entities, in intermediates, or in both. However, the possible SHA-1 policies don't differentiate between end-entities and intermediates and instead depended on whether or not each certificate has a notBefore value after 2015 (i.e. >= 0:00:00 1 January 2016 UTC). We need to gather telemetry on the possible policy configurations.
ad017d0208ef846761e835eabcc247dd64bae24a: bug 1232766 - update the preloaded pinset for Google domains r=rbarnes
David Keeler <dkeeler@mozilla.com> - Mon, 28 Dec 2015 12:30:14 -0800 - rev 315343
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
bug 1232766 - update the preloaded pinset for Google domains r=rbarnes Also includes a script for making this process faster in the future.
e1ddfdbf048c2bbedaad6dd845eb3c7ac0aa8d56: Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm
Tim Taubert <ttaubert@mozilla.com> - Thu, 03 Dec 2015 19:12:11 +0100 - rev 315232
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm
dab1794bd567ccf78b74340a7bb1b430c2a7c159: Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes
Richard Barnes <rbarnes@mozilla.com> - Tue, 05 Jan 2016 12:36:17 -0500 - rev 313722
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes
83cb1c2445fa081a67d379d975557afd56bf4979: Bug 1221808 - have the control centre crop the end for URIs without a host. r=rbarnes
Mark Hammond <mhammond@skippinet.com.au> - Tue, 29 Dec 2015 15:46:46 +1100 - rev 312892
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1221808 - have the control centre crop the end for URIs without a host. r=rbarnes
f745c6e024a325921801db0394add38c86f34add: bug 1234417 - fix a leak in CreateECPublicKey r=rbarnes
David Keeler <dkeeler@mozilla.com> - Mon, 21 Dec 2015 17:14:41 -0800 - rev 312859
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
bug 1234417 - fix a leak in CreateECPublicKey r=rbarnes Before this patch, CreateECPublicKey would create a SECKEYPublicKey allocated on a scoped arena. It would then call CryptoKey::PublicKeyValid, which has the side-effect of importing the key to the internal PKCS#11 slot. When the arena went out of scope, the memory for the key would be released, but the reference to the slot wouldn't, causing a leak. This patch fixes the leak by making the SECKEYPublicKey a ScopedSECKEYPublicKey (which ensures that the type-specific "destructor" SECKEY_DestroyPublicKey is called, which releases the reference to the PKCS#11 slot).
882e6011c18f968f3e6993e4fac60c68ae6366a0: Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm a=sylvestre
Tim Taubert <tim@timtaubert.de> - Thu, 21 Jan 2016 14:15:33 +0100 - rev 310912
Push 5513 by raliiev@mozilla.com at Mon, 25 Jan 2016 13:55:34 +0000
Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm a=sylvestre
80c32daf68127fd396979eb193d0b23b2f16c5a8: Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
Richard Barnes <rbarnes@mozilla.com> - Tue, 05 Jan 2016 12:36:17 -0500 - rev 310615
Push 5513 by raliiev@mozilla.com at Mon, 25 Jan 2016 13:55:34 +0000
Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
fdaceb3b6338ee31877d24877377be8493ec3acd: Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
Richard Barnes <rbarnes@mozilla.com> - Tue, 05 Jan 2016 12:36:17 -0500 - rev 304186
Push 5458 by kwierso@gmail.com at Tue, 05 Jan 2016 20:00:50 +0000
Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
2955c61e6ecfcf8ee76272191fdcb190c6d97951: Bug 1196039 - Telemetry for certificate lifetime. r=rbarnes,vladan
Kate McKinley <kmckinley@mozilla.com> - Thu, 17 Sep 2015 10:04:52 -0700 - rev 295814
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1196039 - Telemetry for certificate lifetime. r=rbarnes,vladan
d9bd3e512cd05066ca26895bd2386b50977db2e6: Bug 1172785 - RTCCertificate implementation, r=rbarnes
Martin Thomson <martin.thomson@gmail.com> - Mon, 06 Jul 2015 10:40:04 -0700 - rev 283242
Push 5067 by raliiev@mozilla.com at Mon, 21 Sep 2015 14:04:52 +0000
Bug 1172785 - RTCCertificate implementation, r=rbarnes
3d4cdf59f57f73a4e2484c2ad29ce82c27ce9bad: Bug 1169890 - Check return values for CryptoBuffer.Assign() calls r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Sat, 30 May 2015 08:28:45 +0200 - rev 278722
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1169890 - Check return values for CryptoBuffer.Assign() calls r=rbarnes
924686491f340c1e2bb9213a0d35823245a0633f: Bug 1050175 - Add raw import/export for EC public keys to the WebCrypto API r=rbarnes,smaug
Tim Taubert <ttaubert@mozilla.com> - Tue, 28 Apr 2015 09:13:16 +0200 - rev 276868
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1050175 - Add raw import/export for EC public keys to the WebCrypto API r=rbarnes,smaug
82f24d061990e464e02ed3977ff10da01d326c1b: Bug 1106087 - Add test to ensure we can export newly generated ECDH private keys r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Fri, 24 Apr 2015 16:07:56 +0200 - rev 276455
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1106087 - Add test to ensure we can export newly generated ECDH private keys r=rbarnes
7627c939c0bde6a3ac8d51983f9a794360a1005c: Bug 1106087 - Recreate newly generated ECDH private keys with an CKA_EC_POINT attribute to support JWK and PKCS8 export r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Sat, 25 Apr 2015 14:53:43 +0200 - rev 276454
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1106087 - Recreate newly generated ECDH private keys with an CKA_EC_POINT attribute to support JWK and PKCS8 export r=rbarnes
08e444427294e4889509c78fcd26f43268cd7206: Bug 1158927 - Calls to CryptoKey::PrivateKeyToPkcs8() and ::PublicKeyToSpki() should check return values r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Mon, 27 Apr 2015 20:47:12 +0200 - rev 276431
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1158927 - Calls to CryptoKey::PrivateKeyToPkcs8() and ::PublicKeyToSpki() should check return values r=rbarnes
8ba0f2121ecfa723d3d1ccb0cd593850a05f5873: Bug 1133747 - Fix intermittent test_WebCrypto_Reject_Generating_Keys_Without_Usages.html failures by requesting a longer timeout r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Fri, 22 May 2015 01:56:18 -0400 - rev 276430
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1133747 - Fix intermittent test_WebCrypto_Reject_Generating_Keys_Without_Usages.html failures by requesting a longer timeout r=rbarnes
9b2794a71298c35cb38f2ffda487f79824dfeead: Bug 1074139 - Bump test timeout to fix intermittent test_WebCrypto_RSA_OAEP.html timeouts r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Mon, 27 Apr 2015 10:02:12 +0200 - rev 276429
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1074139 - Bump test timeout to fix intermittent test_WebCrypto_RSA_OAEP.html timeouts r=rbarnes