searching for reviewer(rbarnes)
8192716611b6: Bug 1343202 - Move Buffer definition into its own file; r=keeler,rbarnes
Stephanie Ouillon <stephouillon@mozilla.com> - Thu, 17 Aug 2017 09:23:29 +0200 - rev 426736
Push 7761 by jlund@mozilla.com at Fri, 15 Sep 2017 00:19:52 +0000
Bug 1343202 - Move Buffer definition into its own file; r=keeler,rbarnes MozReview-Commit-ID: JHAXllvfG3x
ad5adacd8e14: Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes
J.C. Jones <jjones@mozilla.com> - Wed, 01 Feb 2017 15:21:04 -0700 - rev 395063
Push 7391 by mtabara@mozilla.com at Mon, 12 Jun 2017 13:08:53 +0000
Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes This change includes the FIDO "App ID" as part of the function used to generate the wrapping key used in the NSS-based U2F soft token, cryptographically binding the "Key Handle" to the site that Key Handle is intended for. This is a breaking change with existing registered U2F keys, but since our soft token is hidden behind a pref, it does not attempt to be backward-compatible. - Updated for rbarnes' and qdot's reviews comments. Thanks! - Made more strict in size restrictions, and added a version field to help us be this strict. - Bugfix for an early unprotected buffer use (Thanks again rbarnes!) - Fix a sneaky memory leak re: CryptoBuffer.ToSECItem MozReview-Commit-ID: Jf6gNPauT4Y
713c0a78c2c1: Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes
J.C. Jones <jjones@mozilla.com> - Wed, 01 Feb 2017 15:21:04 -0700 - rev 394505
Push 7391 by mtabara@mozilla.com at Mon, 12 Jun 2017 13:08:53 +0000
Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes This change includes the FIDO "App ID" as part of the function used to generate the wrapping key used in the NSS-based U2F soft token, cryptographically binding the "Key Handle" to the site that Key Handle is intended for. This is a breaking change with existing registered U2F keys, but since our soft token is hidden behind a pref, it does not attempt to be backward-compatible. - Updated for rbarnes' and qdot's reviews comments. Thanks! - Made more strict in size restrictions, and added a version field to help us be this strict. - Bugfix for an early unprotected buffer use (Thanks again rbarnes!) MozReview-Commit-ID: Jf6gNPauT4Y
f1cb42c8da5b: bug 1301956 - add more Mozilla resources to preloaded pins r=keeler,rbarnes DONTBUILD NPOTB
Julien Vehent <jvehent@mozilla.com> - Tue, 29 Nov 2016 13:15:32 -0800 - rev 369690
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
bug 1301956 - add more Mozilla resources to preloaded pins r=keeler,rbarnes DONTBUILD NPOTB Also trims the pinset for said Mozilla resources to just DigiCert and Let's Encrypt (as a backup).
01aafb2359c9: Bug 1311379 - Stop using Scoped.h NSS types in WebCryptoTask.(cpp|h). r=rbarnes,ttaubert
Cykesiopka <cykesiopka.bmo@gmail.com> - Fri, 18 Nov 2016 00:49:25 +0800 - rev 368361
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1311379 - Stop using Scoped.h NSS types in WebCryptoTask.(cpp|h). r=rbarnes,ttaubert Scoped.h is deprecated. MozReview-Commit-ID: CAcnrB9v3dH
32425af1283d: Bug 1308890 - Make use of ScopedAutoSECItem in CryptoKey.cpp. r=rbarnes
Cykesiopka <cykesiopka.bmo@gmail.com> - Fri, 14 Oct 2016 10:36:54 +0800 - rev 360891
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1308890 - Make use of ScopedAutoSECItem in CryptoKey.cpp. r=rbarnes ScopedAutoSECItem is useful for getting rid of this pattern: > ScopedSECItem item(SECITEM_AllocItem(nullptr, nullptr, 0)); While this pattern works, ScopedAutoSECItem is slightly superior in that it doesn't unnecessarily cause a SECItem to be allocated from the heap. Moreover, this moves us further away from Scoped.h, which is deprecated. MozReview-Commit-ID: B30MNTHzzTc
96f862cb3d91: bug 1282008 - update CNNIC whitelist to remove expired certificates r=rbarnes
David Keeler <dkeeler@mozilla.com> - Thu, 06 Oct 2016 14:45:51 -0700 - rev 360661
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
bug 1282008 - update CNNIC whitelist to remove expired certificates r=rbarnes MozReview-Commit-ID: 1OopsrAxXrv
51cbff25e017: Bug 1306003 - Enable P-521, r=ekr,rbarnes
Martin Thomson <martin.thomson@gmail.com> - Thu, 29 Sep 2016 10:40:40 +1000 - rev 358562
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1306003 - Enable P-521, r=ekr,rbarnes MozReview-Commit-ID: 1oF98CACtQV
5436f8c05f6d: bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 14 Sep 2016 15:11:15 -0700 - rev 357601
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes MozReview-Commit-ID: 2uwHPxk0VhZ
2df66e8b7411: bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 14 Sep 2016 15:11:15 -0700 - rev 357577
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes MozReview-Commit-ID: 2uwHPxk0VhZ
43c724bde81c: Bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes a=gchang
David Keeler <dkeeler@mozilla.com> - Wed, 14 Sep 2016 15:11:15 -0700 - rev 355955
Push 6570 by raliiev@mozilla.com at Mon, 14 Nov 2016 12:26:13 +0000
Bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes a=gchang MozReview-Commit-ID: 2uwHPxk0VhZ
1f8a3181ab8f: Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Tue, 12 Jul 2016 07:26:11 +0200 - rev 344635
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
d9659c22b3c5: bug 1265113 - implement platform support for enterprise roots r=Cykesiopka,mhowell,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 13 Apr 2016 15:36:22 -0700 - rev 338223
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
bug 1265113 - implement platform support for enterprise roots r=Cykesiopka,mhowell,rbarnes MozReview-Commit-ID: JKxwCjoH0Oa
280b570936bb: bug 1182742 - allow users to override small key size errors r=rbarnes
David Keeler <dkeeler@mozilla.com> - Mon, 11 Apr 2016 13:45:47 -0700 - rev 332225
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
bug 1182742 - allow users to override small key size errors r=rbarnes Key size enforcement for TLS certificates happens at two levels: PSM and NSS. PSM enforces a minimum of 1024 bits. NSS enforces a minimum of 1023 bits by default. The NSS error is not overridable, but the PSM error is. This change allows users to connect to devices with small RSA keys (as little as 512 bits) using the certificate error override functionality. MozReview-Commit-ID: 2TZ8c4I3hXC
17e4c84b299d: Bug 842818 - Inline CloneData() and clean up ImportKeyTask::SetKeyData() r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Thu, 17 Mar 2016 11:02:11 +0100 - rev 330299
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 842818 - Inline CloneData() and clean up ImportKeyTask::SetKeyData() r=rbarnes
ffcb400c1a48: Bug 842818 - Run WebCrypto tests in Workers r=mt,rbarnes
Tim Taubert <ttaubert@mozilla.com> - Mon, 21 Sep 2015 19:53:01 +0200 - rev 330295
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 842818 - Run WebCrypto tests in Workers r=mt,rbarnes
201173cd6886: bug 1239166 - platform work to support Microsoft Family Safety functionality r=froydnj,mgoodwin,mhowell,rbarnes,vladan
David Keeler <dkeeler@mozilla.com> - Tue, 12 Jan 2016 15:39:43 -0800 - rev 329246
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
bug 1239166 - platform work to support Microsoft Family Safety functionality r=froydnj,mgoodwin,mhowell,rbarnes,vladan MozReview-Commit-ID: GhpJqJB97r9
ef37a752e6cd: Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Tue, 01 Mar 2016 09:19:28 -0800 - rev 328843
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
e769e96e8680: Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Tue, 01 Mar 2016 09:17:56 -0800 - rev 328842
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field. r=rbarnes
3b4efd3e713c: Bug 1257325 - Silence VS2015 compiler warnings in CryptoKey.cpp f=gps r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Fri, 18 Mar 2016 11:24:57 +0100 - rev 327207
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1257325 - Silence VS2015 compiler warnings in CryptoKey.cpp f=gps r=rbarnes
55a7478c3343: Bug 1243311 - Add structured cloning tests for CryptoKeys r=rbarnes
Tim Taubert <tim@timtaubert.de> - Wed, 09 Mar 2016 21:18:38 +0100 - rev 325797
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1243311 - Add structured cloning tests for CryptoKeys r=rbarnes
06a4d2d48fb2: Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Mon, 29 Feb 2016 08:46:48 -0800 - rev 322455
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1243586 - Test Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
846e31fe5eb2: Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Mon, 29 Feb 2016 08:44:39 -0800 - rev 322454
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1243586 - Implement Upgrade-Insecure-Requests HTTP Request Header Field (r=rbarnes)
b9799dc98199: Bug 1241757 - Permit export of JWK with empty key_ops field, r=rbarnes
Martin Thomson <martin.thomson@gmail.com> - Fri, 22 Jan 2016 18:07:39 +1100 - rev 320552
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1241757 - Permit export of JWK with empty key_ops field, r=rbarnes
84b8eef80b22: Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Wed, 23 Dec 2015 11:50:05 -0800 - rev 320279
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1234813 - sendBeacon should not throw if blocked by Content Policy. r=rbarnes
b9aecc2e6334: Bug 1234813 - Tests for: sendBeacon should not throw if blocked by Content Policy. r=rbarnes
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Wed, 23 Dec 2015 11:45:26 -0800 - rev 320278
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1234813 - Tests for: sendBeacon should not throw if blocked by Content Policy. r=rbarnes
92e279613f0e: Bug 1191936 - Add more test vectors and a test for deterministic signatures r=rbarnes
Tim Taubert <tim@timtaubert.de> - Fri, 22 Jan 2016 15:37:35 +0100 - rev 318136
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Add more test vectors and a test for deterministic signatures r=rbarnes
29a076e8bc0d: Bug 1191936 - Implement SPKI/PKCS#8/JWK import/export for RSA-PSS r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Wed, 14 Oct 2015 13:38:05 +0200 - rev 318135
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Implement SPKI/PKCS#8/JWK import/export for RSA-PSS r=rbarnes
1fba432e1cab: Bug 1191936 - Implement RSA-PSS signing and verification r=rbarnes,smaug
Tim Taubert <ttaubert@mozilla.com> - Tue, 13 Oct 2015 20:22:43 +0200 - rev 318134
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Implement RSA-PSS signing and verification r=rbarnes,smaug
1faac7557b25: Bug 1191936 - Implement RSA-PSS key generation r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Tue, 13 Oct 2015 18:48:18 +0200 - rev 318133
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1191936 - Implement RSA-PSS key generation r=rbarnes
9e347384b8db: Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug
Tim Taubert <tim@timtaubert.de> - Tue, 26 Jan 2016 14:57:52 +0100 - rev 318107
Push 5913 by jlund@mozilla.com at Mon, 25 Apr 2016 16:57:49 +0000
Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug
f05cc5ce1dc7: Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug a=lizzard
Tim Taubert <tim@timtaubert.de> - Tue, 26 Jan 2016 14:57:52 +0100 - rev 316620
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1200341 - Implement HKDF for WebCrypto r=rbarnes,smaug a=lizzard
bb6bfd172d6e: bug 1239455 - rework telemetry for SHA-1 certificates to reflect possible policy states r=Cykesiopka,mgoodwin,rbarnes
David Keeler <dkeeler@mozilla.com> - Wed, 13 Jan 2016 12:50:42 -0800 - rev 315966
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
bug 1239455 - rework telemetry for SHA-1 certificates to reflect possible policy states r=Cykesiopka,mgoodwin,rbarnes Before this patch, we were measuring where SHA-1 was being used in TLS certificates: nowhere, in end-entities, in intermediates, or in both. However, the possible SHA-1 policies don't differentiate between end-entities and intermediates and instead depended on whether or not each certificate has a notBefore value after 2015 (i.e. >= 0:00:00 1 January 2016 UTC). We need to gather telemetry on the possible policy configurations.
ad017d0208ef: bug 1232766 - update the preloaded pinset for Google domains r=rbarnes
David Keeler <dkeeler@mozilla.com> - Mon, 28 Dec 2015 12:30:14 -0800 - rev 315343
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
bug 1232766 - update the preloaded pinset for Google domains r=rbarnes Also includes a script for making this process faster in the future.
e1ddfdbf048c: Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm
Tim Taubert <ttaubert@mozilla.com> - Thu, 03 Dec 2015 19:12:11 +0100 - rev 315232
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm
dab1794bd567: Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes
Richard Barnes <rbarnes@mozilla.com> - Tue, 05 Jan 2016 12:36:17 -0500 - rev 313722
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes
83cb1c2445fa: Bug 1221808 - have the control centre crop the end for URIs without a host. r=rbarnes
Mark Hammond <mhammond@skippinet.com.au> - Tue, 29 Dec 2015 15:46:46 +1100 - rev 312892
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
Bug 1221808 - have the control centre crop the end for URIs without a host. r=rbarnes
f745c6e024a3: bug 1234417 - fix a leak in CreateECPublicKey r=rbarnes
David Keeler <dkeeler@mozilla.com> - Mon, 21 Dec 2015 17:14:41 -0800 - rev 312859
Push 5703 by raliiev@mozilla.com at Mon, 07 Mar 2016 14:18:41 +0000
bug 1234417 - fix a leak in CreateECPublicKey r=rbarnes Before this patch, CreateECPublicKey would create a SECKEYPublicKey allocated on a scoped arena. It would then call CryptoKey::PublicKeyValid, which has the side-effect of importing the key to the internal PKCS#11 slot. When the arena went out of scope, the memory for the key would be released, but the reference to the slot wouldn't, causing a leak. This patch fixes the leak by making the SECKEYPublicKey a ScopedSECKEYPublicKey (which ensures that the type-specific "destructor" SECKEY_DestroyPublicKey is called, which releases the reference to the PKCS#11 slot).
882e6011c18f: Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm a=sylvestre
Tim Taubert <tim@timtaubert.de> - Thu, 21 Jan 2016 14:15:33 +0100 - rev 310912
Push 5513 by raliiev@mozilla.com at Mon, 25 Jan 2016 13:55:34 +0000
Bug 1230209 - Add more telemetry for Geolocation usage f=bsmedberg r=tanvi,rbarnes,jdm a=sylvestre
80c32daf6812: Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
Richard Barnes <rbarnes@mozilla.com> - Tue, 05 Jan 2016 12:36:17 -0500 - rev 310615
Push 5513 by raliiev@mozilla.com at Mon, 25 Jan 2016 13:55:34 +0000
Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
fdaceb3b6338: Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
Richard Barnes <rbarnes@mozilla.com> - Tue, 05 Jan 2016 12:36:17 -0500 - rev 304186
Push 5458 by kwierso@gmail.com at Tue, 05 Jan 2016 20:00:50 +0000
Bug 1236975 - Re-enable SHA-1 certificates r=keeler,rbarnes a=lizzard
2955c61e6ecf: Bug 1196039 - Telemetry for certificate lifetime. r=rbarnes,vladan
Kate McKinley <kmckinley@mozilla.com> - Thu, 17 Sep 2015 10:04:52 -0700 - rev 295814
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1196039 - Telemetry for certificate lifetime. r=rbarnes,vladan
d9bd3e512cd0: Bug 1172785 - RTCCertificate implementation, r=rbarnes
Martin Thomson <martin.thomson@gmail.com> - Mon, 06 Jul 2015 10:40:04 -0700 - rev 283242
Push 5067 by raliiev@mozilla.com at Mon, 21 Sep 2015 14:04:52 +0000
Bug 1172785 - RTCCertificate implementation, r=rbarnes
3d4cdf59f57f: Bug 1169890 - Check return values for CryptoBuffer.Assign() calls r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Sat, 30 May 2015 08:28:45 +0200 - rev 278722
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1169890 - Check return values for CryptoBuffer.Assign() calls r=rbarnes
924686491f34: Bug 1050175 - Add raw import/export for EC public keys to the WebCrypto API r=rbarnes,smaug
Tim Taubert <ttaubert@mozilla.com> - Tue, 28 Apr 2015 09:13:16 +0200 - rev 276868
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1050175 - Add raw import/export for EC public keys to the WebCrypto API r=rbarnes,smaug
82f24d061990: Bug 1106087 - Add test to ensure we can export newly generated ECDH private keys r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Fri, 24 Apr 2015 16:07:56 +0200 - rev 276455
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1106087 - Add test to ensure we can export newly generated ECDH private keys r=rbarnes
7627c939c0bd: Bug 1106087 - Recreate newly generated ECDH private keys with an CKA_EC_POINT attribute to support JWK and PKCS8 export r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Sat, 25 Apr 2015 14:53:43 +0200 - rev 276454
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1106087 - Recreate newly generated ECDH private keys with an CKA_EC_POINT attribute to support JWK and PKCS8 export r=rbarnes
08e444427294: Bug 1158927 - Calls to CryptoKey::PrivateKeyToPkcs8() and ::PublicKeyToSpki() should check return values r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Mon, 27 Apr 2015 20:47:12 +0200 - rev 276431
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1158927 - Calls to CryptoKey::PrivateKeyToPkcs8() and ::PublicKeyToSpki() should check return values r=rbarnes
8ba0f2121ecf: Bug 1133747 - Fix intermittent test_WebCrypto_Reject_Generating_Keys_Without_Usages.html failures by requesting a longer timeout r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Fri, 22 May 2015 01:56:18 -0400 - rev 276430
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1133747 - Fix intermittent test_WebCrypto_Reject_Generating_Keys_Without_Usages.html failures by requesting a longer timeout r=rbarnes
9b2794a71298: Bug 1074139 - Bump test timeout to fix intermittent test_WebCrypto_RSA_OAEP.html timeouts r=rbarnes
Tim Taubert <ttaubert@mozilla.com> - Mon, 27 Apr 2015 10:02:12 +0200 - rev 276429
Push 4932 by jlund@mozilla.com at Mon, 10 Aug 2015 18:23:06 +0000
Bug 1074139 - Bump test timeout to fix intermittent test_WebCrypto_RSA_OAEP.html timeouts r=rbarnes