14 Commits

Author SHA1 Message Date
gerv%gerv.net
f465fa7d7e Bug 716563 - update license to MPL 2. r=rrelyea.
git-svn-id: svn://10.0.0.236/trunk@263750 18797224-902f-48f8-a5cc-f745e15eee43
2012-04-25 14:50:19 +00:00
wtc%google.com
39e8820abe Bug 681065: Implement DTLS (Datagram TLS) 1.0. The patch is contributed by
Eric Rescorla <ekr@rtfm.com>.  r=wtc.
Modified Files:
	SSLerrs.h derive.c manifest.mn ssl.def ssl.h ssl3con.c
	ssl3gthr.c ssl3prot.h sslcon.c ssldef.c sslerr.h sslgathr.c
	sslimpl.h sslproto.h sslsecur.c sslsock.c sslt.h
Added Files:
	dtls1con.c


git-svn-id: svn://10.0.0.236/trunk@263637 18797224-902f-48f8-a5cc-f745e15eee43
2012-04-04 03:37:07 +00:00
kaie%kuix.de
f0bd270bae Bug 542832 - SSL_RestartHandshakeAfterServerCert is broken, patch by Brian Smith, r=rrelyea
git-svn-id: svn://10.0.0.236/trunk@263384 18797224-902f-48f8-a5cc-f745e15eee43
2012-02-11 12:58:47 +00:00
kaie%kuix.de
1d479025ca Bug 542832 - SSL_RestartHandshakeAfterServerCert is broken, patch by Brian Smith, r=rrelyea
git-svn-id: svn://10.0.0.236/trunk@263383 18797224-902f-48f8-a5cc-f745e15eee43
2012-02-11 12:57:28 +00:00
wtc%google.com
1e99b8cb20 Bug 525092: Support TLS false start. The patch is contributed by Adam
Langley of Google <agl@chromium.org>.  r=wtc.
Modified Files:
	cmd/strsclnt/strsclnt.c cmd/tstclnt/tstclnt.c lib/ssl/ssl.h
	lib/ssl/ssl3con.c lib/ssl/ssl3gthr.c lib/ssl/sslimpl.h
	lib/ssl/sslsecur.c lib/ssl/sslsock.c tests/ssl/sslstress.txt


git-svn-id: svn://10.0.0.236/trunk@260919 18797224-902f-48f8-a5cc-f745e15eee43
2010-07-30 03:00:17 +00:00
nelson%bolyard.com
e61ba41ed5 Back out last patch, because it seems to have made tinderboxes fail on
Windows. Sheriff Nelson


git-svn-id: svn://10.0.0.236/trunk@255148 18797224-902f-48f8-a5cc-f745e15eee43
2008-11-20 07:37:25 +00:00
nelson%bolyard.com
9196c7463d Bug 462874: Can not reliably wait for close_notify
Patch by Miloslav Trmac <mitr@redhat.com>, r=nelson


git-svn-id: svn://10.0.0.236/trunk@255138 18797224-902f-48f8-a5cc-f745e15eee43
2008-11-20 00:45:25 +00:00
nelsonb%netscape.com
66cf75f421 Implement two new SSL socket options: SSL_BYPASS_PKCS11 and SSL_NO_LOCKS.
Reorganize the SSL Socket structure contents to obviate ssl3 pointer.
Move much of the ECC code from ssl3con to new file ssl3ecc.c.  derive.c
implements derivation of the SSL/TLS master secret and the encryption and
MAC keys and IVs without using PKCS11. Bug 305147. r=rrelyea.
Modified Files: ssl/config.mk ssl/manifest.mn ssl/ssl.h ssl/ssl3con.c
    ssl/ssl3gthr.c ssl/sslauth.c ssl/sslcon.c ssl/ssldef.c ssl/sslgathr.c
    ssl/sslimpl.h ssl/sslinfo.c ssl/sslnonce.c ssl/sslsecur.c ssl/sslsnce.c
    ssl/sslsock.c
Added Files: ssl/derive.c ssl/ssl3ecc.c


git-svn-id: svn://10.0.0.236/trunk@179892 18797224-902f-48f8-a5cc-f745e15eee43
2005-09-09 03:02:16 +00:00
gerv%gerv.net
62b0f34e77 Bug 236613: change to MPL/LGPL/GPL tri-license. Restore Id: lines.
git-svn-id: svn://10.0.0.236/trunk@155606 18797224-902f-48f8-a5cc-f745e15eee43
2004-04-27 23:04:40 +00:00
gerv%gerv.net
43cb9e1492 Bug 236613: change to MPL/LGPL/GPL tri-license.
git-svn-id: svn://10.0.0.236/trunk@155484 18797224-902f-48f8-a5cc-f745e15eee43
2004-04-25 15:03:26 +00:00
nelsonb%netscape.com
76f9a42d49 1. the sslSecurityInfo and sslGather structs are now part of the sslSocket
rather than being pointed to by the sslSocket.  This reduces the number
of malloc/free calls, and greatly reduces pointer fetches, and null
pointer checks.  sslGather and sslSecurityInfo are separately initialized.
2. SSL_ResetHandshake no longer deallocates and reallocates the sslSecurityInfo and all its subcomponents.
3. Many places that formerly did not check for memory allocation failures
now do check, and do the right thing when allocation failed.


git-svn-id: svn://10.0.0.236/trunk@115407 18797224-902f-48f8-a5cc-f745e15eee43
2002-02-27 04:40:17 +00:00
nelsonb%netscape.com
31f013d0e6 In ssl3_GatherData, the value of gs->inbuf.len was incorrect during the
GS_HEADER state.  It should be correct in all states.
In ssl_DestroyGather, prior to freeing the buffers, the code zeroed out
the ciphertext buffer.  It now zeros out the plaintext buffer instead.


git-svn-id: svn://10.0.0.236/trunk@83200 18797224-902f-48f8-a5cc-f745e15eee43
2000-12-02 00:54:01 +00:00
nelsonb%netscape.com
f845bee819 With this change, SSL will not crash if the next lower layer's Recv
function returns more data than we asked for.  SSL will turn that event
into a PR_BUFFER_OVERFLOW_ERROR error.  iWS team asked for this.


git-svn-id: svn://10.0.0.236/trunk@80640 18797224-902f-48f8-a5cc-f745e15eee43
2000-10-07 02:22:22 +00:00
relyea%netscape.com
a4d4d45374 Initial NSS Open Source checkin
git-svn-id: svn://10.0.0.236/trunk@64788 18797224-902f-48f8-a5cc-f745e15eee43
2000-03-31 20:13:40 +00:00