summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* Bug 1815868 - pin an older version of the ubuntu:18.04 and 20.04 docker ↵Julien Cristau2023-02-096-6/+6
| | | | | | | | | images r=nkulatova As of the images dated 20230126, our docker-in-docker-based image build process dies trying to retrieve the base images. Differential Revision: https://phabricator.services.mozilla.com/D169316
* Bug 1810702 - remove nested table in rst doc ↵ogiorgis2023-02-071-379/+307
| | | | | | | | | | r=firefox-source-docs-reviewers,ahal These tables are not taken into account by sphinx, appear badly in html and trigger a problem when you want to build the doc in text mode. Differential Revision: https://phabricator.services.mozilla.com/D168766
* Bug 1815246 - Export NSS_CMSSignerInfo_GetDigestAlgTag. r=djacksonKai Engert2023-02-071-0/+6
| | | | Differential Revision: https://phabricator.services.mozilla.com/D169060
* Bug 1812671 - build failure while implicitly casting SECStatus to PRUInt32. ↵František Krenželok2023-01-302-2/+2
| | | | | | | | r=nss-reviewers,mt Author of the patch: Bob Relyea <rrelyea@redhat.com> Differential Revision: https://phabricator.services.mozilla.com/D167983
* Documentation: Release notes for NSS 3.88Anna Weine2023-01-262-13/+100
|
* Bug 1212915 - Add check for ClientHello SID max length. This is tested by ↵NSS_3_88_BETA1Leander Schwarz2023-01-162-2/+3
| | | | | | | | Bogo tests Server-TooLongSessionID-TLS1*. r=djackson Depends on D147675 Differential Revision: https://phabricator.services.mozilla.com/D147726
* Bug 1771100 - Added EarlyData ALPN test support to BoGo shim. r=djacksonLeander Schwarz2023-01-164-54/+151
| | | | Differential Revision: https://phabricator.services.mozilla.com/D157290
* Bug 1790357: ECH client - Discard resumption TLS < 1.3 Session(IDs|Tickets) ↵Leander Schwarz2023-01-162-4/+41
| | | | | | if ECH configs are setup. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D157110
* Bug 1714245 - On HRR skip PSK incompatible with negotiated ciphersuites hash ↵Leander Schwarz2023-01-163-2/+17
| | | | | | algorithm. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D156660
* Bug 1789410 - ECH client: Send ech_required alert on server negotiating TLS ↵Leander Schwarz2023-01-166-32/+41
| | | | | | 1.2. Fixed misleading Gtest, enabled corresponding BoGo test. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D156565
* Bug 1771100 - Added Bogo ECH rejection test support. r=djacksonLeander Schwarz2023-01-162-9/+67
| | | | Differential Revision: https://phabricator.services.mozilla.com/D154631
* Bug 1771100 - Added ECH 0Rtt support to BoGo shim. r=djacksonLeander Schwarz2023-01-163-5/+109
| | | | Differential Revision: https://phabricator.services.mozilla.com/D154209
* Backed out changeset 7f64f5d3df09 for build bustageMartin Thomson2023-01-149-11/+12
|
* Bug 1747957 - RSA OAEP Wycheproof JSON, r=jschanckMartin Thomson2023-01-1226-7834/+14449
| | | | | | Depends on D134922 Differential Revision: https://phabricator.services.mozilla.com/D134923
* Bug 1747957 - RSA decrypt Wycheproof JSON, r=jschanckMartin Thomson2023-01-1211-27327/+5935
| | | | | | Depends on D134921 Differential Revision: https://phabricator.services.mozilla.com/D134922
* Bug 1747957 - ECDSA Wycheproof JSON, r=jschanckMartin Thomson2023-01-1210-32339/+24352
| | | | | | Depends on D134920 Differential Revision: https://phabricator.services.mozilla.com/D134921
* Bug 1747957 - ECDH Wycheproof JSON, r=jschanckMartin Thomson2023-01-125-51862/+194
| | | | | | Depends on D134886 Differential Revision: https://phabricator.services.mozilla.com/D134920
* Bug 1747957 - PKCS#1v1.5 wycheproof json, r=nss-reviewers,nkulatovaMartin Thomson2023-01-1220-87156/+19489
| | | | | | Depends on D134853 Differential Revision: https://phabricator.services.mozilla.com/D134886
* Bug 1747957 - Use X25519 wycheproof json, r=nss-reviewers,jschanckMartin Thomson2023-01-1211-11713/+508
| | | | | | Depends on D134846 Differential Revision: https://phabricator.services.mozilla.com/D134853
* Bug 1766767 - Move scripts to python3, r=nss-reviewers,jschanckMartin Thomson2023-01-129-12/+11
| | | | Differential Revision: https://phabricator.services.mozilla.com/D166506
* Bug 1809627 - Properly link FuzzingEngine for oss-fuzz. r=djacksonChristian Holler2023-01-111-0/+4
| | | | Differential Revision: https://phabricator.services.mozilla.com/D166524
* Doc: release notes for NSS 3.79.3Benjamin Beurdouche2023-01-101-0/+58
|
* Bug 1805907 - Extending RSA-PSS bltest test coverage (Adding SHA-256 and ↵Natalia Kulatova2023-01-0926-1/+26
| | | | | | | | SHA-384) r=nss-reviewers,bbeurdouche The patch adds the RSA-PSS + SHA2 test vectors. (Before, there was just the SHA-1 ones). Differential Revision: https://phabricator.services.mozilla.com/D164811
* WIP: Bug 1804091 NSS needs to move off of DSA for integrity checks. ↵Robert Relyea2023-01-0511-489/+1005
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | r=nss-reviewers,jschanck When we first added integrity checks to NSS for FIPS compliance, the only signature method allowed was DSA. NIST will be sunsetting DSA in 2023, so we need to update our integrity checks again. Since the time we added these checks, NIST has started accepting HMAC as a valid signature algorithm for integrity checks. HMAC is easier, faster and requires smaller .chk files and openssl and gnutls has been using hmac now for years for this purpose. Since we need to move off of DSA anyway it's time to move to HMAC. This patch does this move. shlibsign now produces HMAC_256 by default. It moves the version number up because even though nss includes a type field, previous versions of NSS did not look at the type field when checking integrity. Bumping the version number will cause previous versions of NSS to fail early if presented with a newly generated integrity check file (even though it should fail later anyway). shlibsign now has the ability to generate 'legacy' check files so it can be used to generate check files for older versions of NSS. NSS can still accept older check files unless NSS_STRICT_INTEGRITY is set at compile time. This means tools which may be using old shlibsign to resign nss shared libraries will continue to work. At some point we can remove all DSA support (maybe after one enterprise release cycle). While completing this work, we also complete some integrity code cleanup. There are lots of magic numbers defining where things fall in the integrity check header. These are now moved to a structure and defined in the shsign.h header. Both shlibsign and shvfy have been updated to use this header. New test cases are not needed since fips.sh adequately tests our integrity code (both normal case and against mangled libraries which should fail). Though the lowhash test was updated to catch a particular issue we can run into when we use the LOWHASH code. On RHEL-7, we use the NSSLOWHASH_ interface in freebl in libc, which needs to run independently of nspr and nssutil. This requirement puts a pretty heavy burned on freebl to be self-contained when used for NSSLOWHASH_, including running integrity checks. The previous test program linked with nssutil and nspr (just like all of the rest of the nss tests) and weren't detecting issues when unimplemented stub functions where called. This patch includes fixing those lowhash tests and also implementing the stubs needed by the current integrity check code. cmd/lowhashtest/Makefile remove linking lowhashtest with all the libraries except freebl. cmd/lowhashtest/lowhashtest.c remove any dependency NSPR or NSSUTIL in the code. cmd/lowhashtest/manifest.mn remove spurious requires statements. cmd/shlibsign/shlibsign.c add hmac code. add ability to select the hash type from the command line. separate signature processing into their own functions for DSA and HMAC General cleanups. Use PR_ARRAY_SIZE rather then a custom define. move error printing outside utility functions (so we don't have to pass around filenames everywhere) Use NSSSignChkHeader instead of a Buf with magic offsets for the Check file Header. Add ability to make old style .chk files for old versions of NSS. Add option to revert to DSA Add option to use old version numbers: only valid if DSA is set. lib/freebl/Makefile All NSS_STRICT_INTEGRITY to be set at build time. Setting NSS_STRICT_INTEGRITY only accepts hmac256, hmac384, hmac512. If it's not set, NSS will accept older .chk file formats (like DSA-2). lib/freebl/nsslowhash.c lowhashtest files expect to set NSS_FIPS to force fips mode when testing the lowhash interface, but NSS_FIPS was not being looked at in the nsslow_GetFIPSEnabled. NOTE: setting NSS_FIPS to true will force FIPS mode if the system isn't already in FIPS mode. Setting it to FALSE will not turn it off if the system is already in FIPS mode. lib/freebl/shsign.h Update version. Add new defines for HMAC add new Header structure to remove magic offsets into a raw buffer in the code. lib/freebl/shvfy.c Add HMAC processing. Turn off DSA processing if NSS_STRICT_INTEGERITY is set. Refactor the signature processing. lib/freebl/stubs.c Add SECITEM_ItemsAreEqual for HMAC shvfy Add implementations for SECITEM_ItemsAreEqual, SECITEM_ZfreeItem, and PR_GetEnvSecure. The first is new. The second solves and existing bug which is only seen on RHEL7, and the last is needed for the fix to nsslowhash.c above. PR_GetEnvSecure() calls secure_getenv if _USE_GNU is set, otherwise it falls back to the normal getenv. This should be safe since it's only used in LOWHASH to get the NSS_FIPS environment variable, which only has the effect of making LOWHASH run in fips mode when it otherwise wouldn't. lib/freebl/stubs.c Add SECITEM_ItemsAreEqual for HMAC shvfy tests/lowhash/lowhash.sh Make the test executable so it can be run on it's own. Differential Revision: https://phabricator.services.mozilla.com/D164137
* Bug 1805815 - Add initial testing with ACVP vector sets using acvp-rust ↵Iaroslav Gridin2023-01-054-0/+118
| | | | | | r=nss-reviewers,bbeurdouche Differential Revision: https://phabricator.services.mozilla.com/D164770
* Bug 1806369 - Don't clone libFuzzer, rely on clang instead. r=djackson,truberChristian Holler2023-01-054-27/+9
| | | | Differential Revision: https://phabricator.services.mozilla.com/D165006
* Set version numbers to 3.88 BetaDennis Jackson2023-01-054-7/+7
|
* Documentation: Release notes for NSS 3.87Dennis Jackson2023-01-052-18/+82
|
* Bug 1807911 - Remove +x permissions on source code r=nss-reviewers,bbeurdoucheSylvestre Ledru2022-12-30266-0/+0
| | | | Differential Revision: https://phabricator.services.mozilla.com/D165677
* Bug 1807822 - nss doc: remove non breaking space - r=nss-reviewers,bbeurdoucheSylvestre Ledru2022-12-28135-7927/+7927
| | | | | | | done with: $ LC_ALL=C sed -i 's/\xc2\xa0/ /g' $(fd .rst) Differential Revision: https://phabricator.services.mozilla.com/D165617
* Bug 1807822 - nss doc: remove some whitespaces r=nss-reviewers,bbeurdoucheSylvestre Ledru2022-12-2839-181/+181
| | | | | | | | | Done with: find . -type f -name '*.rst' -exec sed --in-place 's/[[:space:]]\+$//' {} \+ Depends on D165615 Differential Revision: https://phabricator.services.mozilla.com/D165616
* Bug 1807822 - nss doc: remove some 'eval' r=nss-reviewers,bbeurdoucheSylvestre Ledru2022-12-2878-117/+117
| | | | | | | Done with: sed -i -e "s|.. code:: eval|.. code::|g" $(fd .rst) Differential Revision: https://phabricator.services.mozilla.com/D165615
* Bug 1807822 - nss doc: remove some 'notranslate' r=nss-reviewers,bbeurdoucheSylvestre Ledru2022-12-2838-380/+380
| | | | | | | | done with: L=$(rg "code:: notranslate"|cut -d: -f1|sort -u) sed -i -e "s|.. code:: notranslate|.. code::|g" $L Differential Revision: https://phabricator.services.mozilla.com/D165614
* Bug 1806393 - Use non-empty password for p12 test files used by Thunderbird. ↵Kai Engert2022-12-191-4/+4
| | | | | | r=bbeurdouche,nss-reviewers Differential Revision: https://phabricator.services.mozilla.com/D165019
* Bug 1798823 - Additional zero-length RSA modulus checks. r=nkulatovaNSS_3_87_BETA1John M. Schanck2022-12-152-12/+21
| | | | Differential Revision: https://phabricator.services.mozilla.com/D163622
* Bug 1798823 - add checks for zero-length RSA modulus to avoid memory errors ↵Iaroslav Gridin2022-12-152-0/+26
| | | | | | and failed assertions later r=nss-reviewers,nkulatova,jschanck Differential Revision: https://phabricator.services.mozilla.com/D162111
* Bug 1730353 - Add support for the LoongArch 64-bit architecture. ↵yetist2022-12-141-1/+1
| | | | | | r=nss-reviewers,djackson Differential Revision: https://phabricator.services.mozilla.com/D142421
* Bug 1751705 - Update ECCKiila generated files r=nss-reviewers,nkulatovaIaroslav Gridin2022-12-122-854/+1967
| | | | Differential Revision: https://phabricator.services.mozilla.com/D135765
* Bug 1751707 - Add configuration option to enable source-based coverage ↵Iaroslav Gridin2022-12-124-2/+12
| | | | | | sanitizer r=nss-reviewers,mt Differential Revision: https://phabricator.services.mozilla.com/D135764
* Bug 1774654 tstclnt crashes when accessing gnutls server without a user cert ↵Robert Relyea2022-12-081-5/+5
| | | | | | | | | in the database. The filter functions do not handle NULL CERTCertLists, but CERT_FindUserCertsByUsage can return a NULL cert list. If it returns a NULL list, we should just fail at the point (there are no certs available). Differential Revision: https://phabricator.services.mozilla.com/D164273
* Bug 1749030 - Modification of supported compilers r=nss-reviewers,bbeurdoucheAnna Weine2022-12-082-37/+9
| | | | | | | Adding: clang-10. Removing: gcc-6, gcc-9, gcc-10. Differential Revision: https://phabricator.services.mozilla.com/D162545
* Bug 1803595 - Updating the compiler parsing for build ↵Natalia Kulatova2022-12-082-2/+12
| | | | | | | | r=nss-reviewers,bbeurdouche The patch now introduces a new flag for ninja build - cc_is_cc. It states if the compiler we use is cc (that's indeed often stands for gcc, but for some cases the compiler check fails). Differential Revision: https://phabricator.services.mozilla.com/D163602
* Bug 1804071 - Fix rng stub signature for fuzzing builds. ↵Jesse Schwartzentruber2022-12-081-1/+3
| | | | | | r=nss-reviewers,jschanck Differential Revision: https://phabricator.services.mozilla.com/D163846
* Bug 1803226 - NULL password encoding incorrect. r=nss-reviewers,jschanckRobert Relyea2022-12-081-3/+2
| | | | | | | | The test for adding the unicode null in the null password case was incorrect from Bug 1757075 (https://bugzilla.mozilla.org/show_bug.cgi?id=1757075). The sense of the test was backwards meaning that no null was added. We didn't notice because NSS and openssl tolerate incorrect null password encoding. It was picked up in gnutls interop testing. Differential Revision: https://phabricator.services.mozilla.com/D163498
* Set version numbers to 3.87 BetaJohn M. Schanck2022-12-084-7/+7
|
* Documentation: Release notes for NSS 3.86John M. Schanck2022-12-082-5/+92
|
* Bug 1803211: Disable libpkix for static builds r=bbeurdouche,nss-reviewersskhamis2022-12-021-1/+1
| | | | Differential Revision: https://phabricator.services.mozilla.com/D163369
* Set version numbers to 3.86 BetaNSS_3_86_BETA1John M. Schanck2022-12-014-7/+7
|
* Bug 1803190 conscious language removal in NSSRobert Relyea2022-11-306-33/+11
| | | | | | | Clean up problemantic terms are master, slave, whitelist, blacklist. These are usually easily changes to main/server, client, allowlist, and blocklist (or other similiar terms, which are often more descriptive anyway). Things related to the tls/ssl master key, which part of the tls spec and needs to first be handled by the tls ietf working group. Differential Revision: https://phabricator.services.mozilla.com/D163522
* Bug 1803453 - Set CKA_NSS_SERVER_DISTRUST_AFTER and ↵John M. Schanck2022-11-301-6/+25
| | | | | | CKA_NSS_EMAIL_DISTRUST_AFTER for 3 TrustCor Root Certificates. r=KathleenWilson Differential Revision: https://phabricator.services.mozilla.com/D163527