summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Bug 1769302 - NSS 3.79 should depend on NSPR 4.34. r=bbeurdoucheNSS_3_79_1_BETA1NSS_3_79_BRANCHKai Engert2022-05-251-1/+1
| | | | Differential Revision: https://phabricator.services.mozilla.com/D147375
* Release notes for NSS 3.79Dennis Jackson2022-05-312-16/+94
|
* Added tag NSS_3_79_RTM for changeset 3463596523beDennis Jackson2022-05-260-0/+0
|
* Set version numbers to 3.79 finalNSS_3_79_RTMDennis Jackson2022-05-263-6/+6
|
* Added tag NSS_3_79_BETA2 for changeset 82f9862369bdDennis Jackson2022-05-200-0/+0
|
* Bug 1767590 - Initialize pointers passed to ↵NSS_3_79_BETA2Dennis Jackson2022-05-202-3/+3
| | | | | | | | | | NSS_CMSDigestContext_FinishMultiple r=nss-reviewers,jschanck As NSS_CMSDigestContext_FinishMultiple may leave its outparam unchanged when it returns SECSuccess, ensure that we set the value to NULL prior to invoking it. If this has happened because data was missing and hence the digest was never updated, the secasn1d parser will notice the missing child and raise a decodeError. Differential Revision: https://phabricator.services.mozilla.com/D145425
* Added tag NSS_3_79_BETA1 for changeset 2efccbd85918Dennis Jackson2022-05-200-0/+0
|
* Bug 1766978 - improve error handling after ↵NSS_3_79_BETA1John M. Schanck2022-05-191-5/+11
| | | | | | nssCKFWInstance_CreateObjectHandle. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D146765
* Bug 1757075 NSS does not properly import or export pkcs12 files with large ↵Robert Relyea2022-03-184-20/+78
| | | | | | | | passwords and pkcs5v2 encoding. Don't use NULL when encoding UTF8 with pkcs5v2. Fix a bug here when converting from UCS2 to UTF8 we would add a double NULL when adding a NULL. Differential Revision: https://phabricator.services.mozilla.com/D141538
* Remove nspr.patch mistakenly committed in e3ac914bc684Dennis Jackson2022-05-171-121/+0
|
* Bug 1764788 - Correct invalid record inner and outter content type alerts. ↵Leander Schwarz2022-05-175-28/+256
| | | | | | | | | | r=djackson Added test cases for alerts during and pre handshake as well as TLS 1.3 only after handshake (application data) cases due to unsupported de- and encryption of lower TLS version records in gtest. Adjusted some test cases that expect failed connections to the updated alerts. Differential Revision: https://phabricator.services.mozilla.com/D144029
* Bug 1765753 - TLS 1.3 Server: Send protocol_version alert on unsupported ↵Leander Schwarz2022-05-172-6/+37
| | | | | | ClientHello.legacy_version. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D144279
* Bug 1765753 - Added RFC8422 compliant TLS <= 1.2 undefined/compressed ↵Leander Schwarz2022-05-172-1/+25
| | | | | | ECPointFormat extension alerts. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D144420
* Bug 1387919 - Fix secasn1d parsing of indefinite SEQUENCE inside indefinite ↵John M. Schanck2022-05-164-3/+85
| | | | | | | | | | | | | | | | | | | | | | | | GROUP. r=keeler,nss-reviewers,djackson In an iteration over elements of an indefinite-length encoded GROUP (sec_asn1d_next_in_group), the child of the current state is responsible for parsing the GROUP's end-of-contents octets---a call to sec_asn1d_parse_end_of_contents(state->child) sets the endofcontents flag for state->child and a later call to sec_asn1d_next_in_group checks state->child->endofcontents and terminates the iteration. In an iteration over elements of an indefinite-length encoded SEQUENCE (sec_asn1d_next_in_sequence), on the other hand, the current state, not its child, handles the end-of-contents octets. Prior to this commit, an error would occur when state pointed to an indefinite-length encoded GROUP and state->child pointed to an indefinite-length encoded SEQUENCE. In this case, state->child would be passed to sec_asn1d_parse_end_of_contents to parse the SEQUENCE's end-of-contents octets. This would set the endofcontents flag for state->child, and this would be misinterpreted as an end-of-iteration signal for the surrounding GROUP. Differential Revision: https://phabricator.services.mozilla.com/D142985
* Bug 1753315 - Add SECMOD_LockedModuleHasRemovableSlots. r=rrelyeaJohn M. Schanck2022-05-166-10/+60
| | | | Differential Revision: https://phabricator.services.mozilla.com/D137702
* Bug 1769295 - selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo. ↵Kai Engert2022-05-134-31/+181
| | | | | | r=rrelyea Differential Revision: https://phabricator.services.mozilla.com/D146334
* Bug 1454072 - Use of uninitialized pointer in lg_init after alloc fail. ↵John M. Schanck2022-05-111-6/+1
| | | | | | r=nss-reviewers,nkulatova Differential Revision: https://phabricator.services.mozilla.com/D142715
* Bug 1766907 - Update mercurial in clang-format docker image. r=mtJohn M. Schanck2022-05-061-1/+8
| | | | Differential Revision: https://phabricator.services.mozilla.com/D145355
* Fix formatting of lib/mozpkix/include/pkix/pkixtypes.hJohn M. Schanck2022-05-031-5/+4
|
* Bug 205717 - Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls. r=rrelyeaJohn M. Schanck2022-04-282-16/+14
| | | | Differential Revision: https://phabricator.services.mozilla.com/D144633
* Set version numbers to 3.79 betaDennis Jackson2022-04-284-7/+7
|
* Release notes for NSS 3.78Dennis Jackson2022-04-282-25/+75
|
* Bug 1755264 - Added TLS 1.3 zero-length inner plaintext checks and tests, ↵NSS_3_78_BETA1Leander Schwarz2022-04-215-28/+336
| | | | | | zero-length record/fragment handling tests. Enabled tls fuzzer empty alert test. r=djackson Differential Revision: https://phabricator.services.mozilla.com/D141841
* Bug 1294978 - Reworked overlong record size checks and added TLS1.3 specific ↵Leander Schwarz2022-04-216-46/+352
| | | | | | | | | | | | | | | | | | | | | | | | | boundaries. r=djackson Old overlong record check flow: 1.) There is a check for the default maximally allowed record size in ssl3gthr.c/ssl3_GatherData after reception of TLS records. In the same file the DTLS reception buffers are set to the maximum possible record size in dtls_GatherData. 2.) Next the ssl3_HandleRecord handler checks TLS and DTLS records sizes, considering possibly set size limits by the record-size-limit-extension and the maximally approximated cipher expansion possible in NSS. 3.) Until this patch there was a less strict redundant size check in ssl3con.c/ssl3_UnprotectRecord. In tls13con.c/tls13_UnprotectRecord and ssl3con.c/ssl3_UnprotectRecord the plaintext size is checked for validity after unprotecting (plaintext checks were not changed in this patch). 4.) DTLS errors regarding record size and unprotecting are inconsistently sometimes propagated to the peer (alerts) and sometimes silently dropped. Changes: 1.) In ssl3gthr.c TLS 1.3 specific cases for overlong record checks and DTLS buffer allocation have been added. 2.) The ssl3_HandleRecord handler checks for RFC compliant records sizes (all TLS versions), considering limits set by record_size_limit_extension. This is less strict for TLS <= 1.2, stricter checks have been moved to the unprotection functions to create a similar 'check flow/levels' for all TLS versions. 3.) - TLS <= 1.2: Moved strict check for maximum allowed plaintext + approximated maximum cipher expansion to ssl3con.c/ssl3_UnprotectRecord. - TLS 1.3: Added strict check for maximum allowed plaintext + actually used cipher expansion to tls13con.c/tls13_UnprotectRecord. (Maximum allowed plaintext considers limits set by record_size_limit_extension) 4.) Following RFC6347, Section 4.1.2.7 DTLS errors regarding records and unprotecting and now consistently dropped silently. Added Tests: - Positive tests (All (D)TLS versions): Test that largest valid plainext + encryption expansion are successfully sent and handled. - Negative tests (All (D)TLS versions): Test that all added/updated boundaries lead to the expected alerts. Tested with smallest illegal record size for each of the mentioned checks. Differential Revision: https://phabricator.services.mozilla.com/D138529
* Bug 1763120 - Add ECH Grease Support to tstclnt r=nss-reviewers,jschanckDennis Jackson2022-04-212-2/+27
| | | | Differential Revision: https://phabricator.services.mozilla.com/D142942
* Bug 1765003 - Add a strict variant of moz::pkix::CheckCertHostname. r=djacksonJohn Schanck2022-04-213-0/+27
| | | | Differential Revision: https://phabricator.services.mozilla.com/D143853
* Bug 1166338 - Change SSL_REUSE_SERVER_ECDHE_KEY default to false. r=djacksonJohn M. Schanck2022-04-219-17/+10
| | | | Differential Revision: https://phabricator.services.mozilla.com/D143514
* Bug 1760813 - Make SEC_PKCS12EnableCipher succeed r=rrelyeaMarcin Cieślak2022-04-041-6/+1
| | | | Differential Revision: https://phabricator.services.mozilla.com/D142247
* Bug 1762489 - Update zlib in NSS to 1.2.12. r=nss-reviewers,djacksonJohn M. Schanck2022-04-0119-992/+10769
| | | | Differential Revision: https://phabricator.services.mozilla.com/D142635
* Set version numbers to 3.78 BetaJohn M. Schanck2022-03-316-19/+7
|
* Release notes for NSS 3.77John M. Schanck2022-03-312-12/+122
|
* Bug 1762244 - resolve mpitests build failure on Windows. ↵John M. Schanck2022-03-301-1/+5
| | | | | | r=nss-reviewers,nkulatova Differential Revision: https://phabricator.services.mozilla.com/D142481
* Bug 1761779 - Fix link to TLS page on wireshark wiki r=sylvestreManuel Bucher2022-03-301-1/+1
| | | | Differential Revision: https://phabricator.services.mozilla.com/D142434
* Release notes for NSS 3.76.1John M. Schanck2022-03-251-0/+68
|
* Release notes for NSS 3.68.3John M. Schanck2022-03-251-0/+72
|
* Bug 1754890 - Add two D-TRUST 2020 root certificates. r=KathleenWilsonNSS_3_77_BETA1John M. Schanck2022-03-241-0/+246
| | | | | | Depends on D141920 Differential Revision: https://phabricator.services.mozilla.com/D141921
* Bug 1751298 - Add Telia Root CA v2 root certificate. r=KathleenWilsonJohn M. Schanck2022-03-241-0/+165
| | | | | | Depends on D141919 Differential Revision: https://phabricator.services.mozilla.com/D141920
* Bug 1751305 - Remove expired explicitly distrusted certificates from ↵John M. Schanck2022-03-241-311/+0
| | | | | | certdata.txt. r=KathleenWilson Differential Revision: https://phabricator.services.mozilla.com/D141919
* Bug 1005084 - support specific RSA-PSS parameters in mozilla::pkix r=jschanckDana Keeler2022-03-2313-50/+542
| | | | | | | | | | | | This patch adds support to mozilla::pkix for certificates signed with RSA-PSS using one of the following parameters permitted by the CA/Browser Forum Baseline Requirements 1.8.1: * SHA-256, MGF-1 with SHA-256, and a salt length of 32 bytes * SHA-384, MGF-1 with SHA-384, and a salt length of 48 bytes * SHA-512, MGF-1 with SHA-512, and a salt length of 64 bytes Differential Revision: https://phabricator.services.mozilla.com/D141539
* Bug 1753535 - Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate. r=rrelyeaJohn M. Schanck2022-03-231-2/+1
| | | | | | | | | | | | | | | The `stateEnd->parent != state` check was added in Bug 95458 to avoid a crash in `sec_asn1d_free_child`. The diagnosis in Bug 95458 is incorrect---the crash was actually due to a `PORT_Assert(0)` that was meant to highlight a memory leak when `SEC_ASN1DecoderStart` was called with `their_pool==NULL`. The offending assertion was removed in Bug 95311, which makes the `stateEnd` check obsolete. In Bug 1753535 it was observed that the `stateEnd` check could read from a poisoned region of an arena when the decoder was used in a streaming mode. This read-after-poison could lead to an arena memory leak, although this is mitigated by the fact that the read-after-poison is on an error-handling path where the caller typically frees the entire arena. Differential Revision: https://phabricator.services.mozilla.com/D140861
* Bug 1756271 - Remove token member from NSSSlot struct. r=rrelyeaJohn M. Schanck2022-03-235-65/+40
| | | | Differential Revision: https://phabricator.services.mozilla.com/D139547
* Bug 1602379 - Provide secure variants of mpp_pprime and mpp_make_prime. r=mtJohn M. Schanck2022-03-2311-18/+80
| | | | Differential Revision: https://phabricator.services.mozilla.com/D139866
* Backed out changeset 6c1092f5203fJohn M. Schanck2022-03-2211-80/+18
| | | | Caused Windows gyp build failures for cmd/mpitests
* Bug 1757279 - Support UTF-8 library path in the module spec string. ↵Masatoshi Kimura2022-03-222-2/+61
| | | | | | r=nss-reviewers,jschanck Differential Revision: https://phabricator.services.mozilla.com/D139785
* Bug 1396616 - Update nssUTF8_Length to RFC 3629 and fix buffer overrun. ↵Masatoshi Kimura2022-03-228-20/+293
| | | | | | r=nss-reviewers,jschanck Differential Revision: https://phabricator.services.mozilla.com/D139790
* Bug 1602379 - Provide secure variants of mpp_pprime and mpp_make_prime. r=mtJohn M. Schanck2022-03-2211-18/+80
| | | | Differential Revision: https://phabricator.services.mozilla.com/D139866
* Bug 1760827 - Add a CI Target for gcc-11. r=nss-reviewers,nkulatovaDennis Jackson2022-03-222-3/+14
| | | | | | Depends on D141764 Differential Revision: https://phabricator.services.mozilla.com/D141765
* Bug 1760828 - Change to makefiles for gcc-4.8. r=nss-reviewers,mtDennis Jackson2022-03-221-1/+1
| | | | | | Depends on D131425 Differential Revision: https://phabricator.services.mozilla.com/D141764
* Bug 1741688 - Update googletest to 1.11.0 r=nss-reviewers,mtJ08nY2022-03-22126-14631/+10170
| | | | Differential Revision: https://phabricator.services.mozilla.com/D131425
* Bug 1759525 - Add SetTls13GreaseEchSize to experimental API. r=mtDennis Jackson2022-03-227-10/+43
| | | | Differential Revision: https://phabricator.services.mozilla.com/D140984