summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Added tag NSS_3_39_RTM for changeset 7d22cf3cb3f2NSS_3_39_BRANCHKai Engert2018-08-310-0/+0
|
* Set version numbers to 3.39 finalNSS_3_39_RTMKai Engert2018-08-313-6/+6
|
* Added tag NSS_3_39_BETA2 for changeset ef8f08163ee7Kai Engert2018-08-280-0/+0
|
* Added tag NSS_3_39_BETA1 for changeset 2256950aa563NSS_3_39_BETA2Kai Engert2018-08-280-0/+0
|
* Let's keep version numbers at 3.39 beta for another few daysNSS_3_39_BETA1Kai Engert2018-08-283-6/+6
| | | | DONTBUILD
* Added tag NSS_3_39_BETA1 for changeset f1156092523eJ.C. Jones2018-08-270-0/+0
|
* Set version numbers to 3.39 finalJ.C. Jones2018-08-273-6/+6
|
* Bug 1483129 - Update interop tests, a=bustageMartin Thomson2018-08-271-2/+3
|
* Bug 1483129 - Update bogo tests, a=bustageMartin Thomson2018-08-273-5/+13
|
* Bug 1483128 - Option to disable SSLv2-compatible ClientHello, r=uenoMartin Thomson2018-08-176-5/+52
|
* Bug 1483416 - Disable false start if there might be a downgrade, r=ekrMartin Thomson2018-08-152-34/+82
|
* Bug 1483129 - TLS 1.3 RFC version, r=ekrMartin Thomson2018-07-0914-162/+226
| | | | | | | | | | | | | | | | | | | | | | | | This retains the ability to negotiate draft versions of DTLS 1.3, but uses the final RFC version for TLS 1.3. This also refactors the handling of the downgrade sentinel. As we've discovered - to our dismay - some MitM boxes forward handshake messages when they shouldn't. This could result in triggering the downgrade sentinel. I've done two things here: - The server always sets the sentinel. It reduces the assumed version if it only supports a draft version though on the basis that the client might expect the full version. - The client has a new option SSL_ENABLE_HELLO_DOWNGRADE_CHECK which is disabled by default. The client will reject a handshake that appears to be a downgrade only when this is explicitly enabled. The client will allow an apparent downgrade to TLS 1.2 if it is running a draft version of TLS 1.3. The allowance for a draft version is now only effective for DTLS 1.3. Tests for version downgrade have been updated and enabled. These were rotten in a few ways, but nothing dramatic.
* Bug 1485531 - Disable ssl_dtls test for now, a=bustageMartin Thomson2018-08-241-1/+1
|
* Bug 1471967, skip unrecognized session tickets in TLS 1.3, r=ekrDaiki Ueno2018-08-222-11/+17
| | | | | | | | | | | | | | | | Summary: In TLS 1.3, upon receiving a malformed ticket, server doesn't immediately abort the connection, but rejects client's resumption attempt. Reviewers: ekr Reviewed By: ekr Subscribers: mt, ekr, kaie, ueno, rrelyea, HubertKario Tags: #secure-revision, PHID-PROJ-ffhf7tdvqze7zrdn6dh3 Bug #: 1471967 Differential Revision: https://phabricator.services.mozilla.com/D3620
* Dummy change to trigger a build to test latest NSPR commitsKai Engert2018-08-221-1/+0
|
* Bug 1479425 - Add cipher-list argument to nss_bogo_shim, r=franziskusJonas Allmann2018-08-211-1/+35
| | | | | | | This adds nss-cipher as argument to the nss_bogo_shim to support tls-interop ciphersuite tests. Note that this is different from the cipher argument that bogo uses to avoid test failures (NSS doesn't understand the OpenSSL cipher strings that bogo uses). Differential Revision: https://phabricator.services.mozilla.com/D2510
* Bug 1287291 - Use a PRK of the same size as the hash, r=franziskusMartin Thomson2018-08-151-20/+18
|
* Bug 1423075 - Remove -z option for tstclnt/selfserv, r=kaieMartin Thomson2018-08-153-39/+8
|
* Bug 1482747 - Test updates for -J options, r=franziskusMartin Thomson2018-08-152-98/+137
|
* Bug 1482747 - Options for controlling signature scheme in tstclnt/selfserv, ↵Martin Thomson2018-08-154-28/+210
| | | | r=franziskus
* Bug 1478638, additional patch for july 2018 CA batch, r=kwilsonKai Engert2018-08-161-0/+120
|
* Bug 1481275, don't send certificate request when resuming with PSK, r=mtDaiki Ueno2018-08-162-8/+46
| | | | | | | | | | | | Reviewers: mt, ekr Reviewed By: mt Subscribers: mt, ekr, kaie, ueno, rrelyea, HubertKario Bug #: 1481275 Differential Revision: https://phabricator.services.mozilla.com/D3425
* Dummy change to trigger a build to test latest NSPR commitsKai Engert2018-08-151-0/+1
|
* Bug 1414931, send correct alert on inconsistent signature scheme, r=mtDaiki Ueno2018-08-153-26/+117
| | | | | | | | | | | | | | | | | | | | Summary: This fixes the corner cases where incorrect alert is sent (or even no alert is sent): - when the client's CertificateVerify is signed with rsa_pss_pss_*, while the certificate is RSA - when the client's CertificateVerify is signed with rsa_pss_rsae_*, while the certificate is RSA-PSS - when ServerKeyExchange is signed with an inconsistent signature scheme with the server certificate Reviewers: mt Reviewed By: mt Bug #: 1414931 Differential Revision: https://phabricator.services.mozilla.com/D3321
* Bug 1481209 - update bogo config error description, r=mtFranziskus Kiefer2018-08-071-8/+8
| | | | Differential Revision: https://phabricator.services.mozilla.com/D2854
* Bug 1481873, correct signature_algorithms extension handling, r=mtDaiki Ueno2018-08-103-7/+28
| | | | | | | | | | | | | | | | | Summary: This fixes a couple of issues in signature_algorithms extension handling: - MAX_SIGNATURE_SCHEMES is out of sync with ssl_IsSupportedSignatureScheme() - when the extension consists of many bogus/duplicate entries followed by a valid signature scheme, ssl_ParseSignatureSchemes() gives up too early Reviewers: mt Reviewed By: mt Subscribers: HubertKario Bug #: 1481873 Differential Revision: https://phabricator.services.mozilla.com/D3014
* Bug 1472254 - Suppress -Wpragma-pack warning spamMasatoshi Kimura2018-07-202-2/+8
|
* Bug 1394098 - firefox-53.0.3/security/nss/lib/ckfw/ckfw.h:1606: bad ↵Venkatesh Pitta2018-08-071-1/+1
| | | | | | | | | declaration, r=emaldona,franziscus - Explictly cast away the const when calling SetPIN - Fixes: this error: - passing argument 7 of ‘fwSession->mdSession->SetPIN’ - discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
* Bug 1394098 - firefox-53.0.3/security/nss/lib/ckfw/ckfw.h:1606: bad ↵Ventakesh Pitta2018-08-072-3/+3
| | | | declaration, r=emaldona,franziscus
* Bug 1478623 - Add r/w constraints to modified registers to asm blocks in ↵Mike Hommey2018-07-261-19/+19
| | | | | | | | | | | | | | | | | | mpi_arm.c. r=fkiefer While bug 1477929 fixed the obvious build failure, it still allowed the compiler to break things when it inlines the mpi_arm.c functions into its callers via LTO. The problem is that all those assembly blocks take a length as input in a register, and decrement that register. They also update both registers they're passed in with pointers, via post-indexed offsets on ldr and str. But the constraints are not explicit about those writes to the registers, so the compiler may decide to reuse them as if they had their original value in code following the inlined code. It actually happily does so, which leads to interesting crashes.
* Bug 1443854 - update boring version and enable some tests, r=mtFranziskus Kiefer2018-08-012-17/+12
| | | | Differential Revision: https://phabricator.services.mozilla.com/D1346
* Bug 1476200 - remove usage of DER_Lengths and deprecate it, r=mtFranziskus Kiefer2018-08-022-27/+5
| | | | Differential Revision: https://phabricator.services.mozilla.com/D2183
* Bug 1479988 - Log the TLS 1.3 Finished result, r=ekrMartin Thomson2018-08-011-0/+1
|
* Bug 1478638, July 2018 batch of root CA changes, r=kwilsonKai Engert2018-07-282-137/+169
|
* Bug 1476672 - Enabled openssl interop tests, r=franziskusJonas Allmann2018-07-274-72/+80
| | | | | | | | Reviewers: franziskus Bug #: 1476672 Differential Revision: https://phabricator.services.mozilla.com/D2223
* Bug 1296986, Disable parameter unsafeAllowMissingParameters in ↵Kai Engert2018-07-267-41/+145
| | | | _SGN_VerifyPKCS1DigestInfo, based on a patch contributed by David Benjamin (davidben@google.com), r=fkiefer
* Bug 1474274 - fix signature of getDefaultRSAPrivateKey and ↵Martin Liška2018-07-261-4/+4
| | | | getDefaultRSAPublicKeyWrong in rsaperf, r=franziskus
* no bug, NSS 3.39 requires NSPR 4.20, r=franziskusKai Engert2018-07-251-1/+1
|
* Dummy change to trigger a build to test latest NSPR commitsKai Engert2018-07-251-1/+0
|
* Bug 1477929 - Use a stricter constraint for the register passed to cbz. ↵Mike Hommey2018-07-241-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | r=fkiefer libfreebl3.so fails to build on arm with LTO enabled with the following error: INFO - <inline asm>:2:9: error: operand must be a register in range [r0, r7] INFO - cbz r10, 2f INFO - ^ INFO - LLVM ERROR: Error parsing inline asm It's not clear from the ARM documentation for CBZ whether that's a problem with llvm or a limitation of the CBZ instruction, but at least the version of LLVM we use insists that CBZ is used with a core register (between r0 and r7, included). That instruction comes from inline asm blocks, and in normal builds, it just happens to work because the variable that is passed to CBZ is a function argument, one of the four first arguments, such that it is register allocated. The compiler just decides to use that register directly. With LTO, the function actually ends up inlined in its caller, and the register allocated to the variable can end up outside the core register range. The GCC documentation for machine-constraints indicates the `l` constraint exists to limit the possible registers: "In Thumb State the core registers r0-r7. In ARM state this is an alias for the r constraint." (CBZ being only used on thumb)
* Bug 1474887, skip NSS shutdown in error path, r=rrelyeaKai Engert2018-07-231-4/+5
|
* Bug 1475274, Provide a way to specify tokens by PKCS #11 URI, r=rrelyeaDaiki Ueno2018-07-235-38/+71
| | | | | | | | | | Summary: This patch allows client applications to specify tokens unambiguously with PKCS #11 URI, instead of token name. It also includes a minor fixes to PKCS #11 URI handling that previously treated the scheme case sensitively. Reviewers: kaie, rrelyea Bug #: 1475274 Differential Revision: https://phabricator.services.mozilla.com/D2099
* Bug 1389967 In MinGW, work around a pointer to a function thunk disappearing ↵Tom Ritter2018-05-211-0/+29
| | | | when we unload nssckbi r=franziskus,dmajor
* Bug 291383, certutil: Allow -F to delete orphaned private key, r=kaieDaiki Ueno2018-07-205-58/+145
| | | | | | | | | | | | Summary: This change makes it possible to remove orphaned private key with the `-F` command. Similarly to `-R` (bug 430198), it reads a key ID from `-k`. Reviewers: kaie Reviewed By: kaie Bug #: 291383 Differential Revision: https://phabricator.services.mozilla.com/D2094
* Bug 1474887, nss-policy-check: a tool to check a NSS policy configuration ↵Kai Engert2018-07-1719-65/+682
| | | | for errors, r=rrelyea
* Bug 1471985, abi-check, r=bustageDaiki Ueno2018-07-161-2/+0
| | | | Remove the first two lines of abidiff output.
* Bug 1471985, abi-check, r=bustageDaiki Ueno2018-07-161-0/+7
|
* Bug 1471985, make SECKEY_Get{Public,Private}KeyType consistent on RSA-PSS, ↵Daiki Ueno2018-07-167-24/+113
| | | | | | | | | | | | | | | | | | | | | | | | | | r=rrelyea,fkiefer Summary: In bug 1413596, we changed SECKEY_GetPrivateKeyType() to return rsaPssKey, if the private key is restricted to RSA-PSS when importing. Although the intention of this change was to extend the certutil output to provide more information about key types, it introduced inconsistency with the existing code, as SECKEY_GetPublicKeyType() still returns rsaKey. This patch partially revert the change and determine the actual (restricted) key type in a different way, using CERT_GetCertKeyType() and PK11_GetCertFromPrivateKey(). Reviewers: rrelyea, franziskus Reviewed By: franziskus Subscribers: franziskus Bug #: 1471985 Differential Revision: https://phabricator.services.mozilla.com/D1911
* Bug 1474875, Typo in policy handling for DTLS-VERSION-MAX, r=uenoKai Engert2018-07-131-1/+1
|
* Bug 1444148 - clang-format, a=bustageMartin Thomson2018-07-111-92/+102
|