Commit Graph

23 Commits

Author SHA1 Message Date
Reed Loden
984577563b Bug 454406 - "SSL handshakes fail after asking PSM to remember user's choice of client auth cert" (backed out changeset 6615b044bcd8 from bug 431819) 2008-10-01 01:01:39 -05:00
Kai Engert
0f228913f3 Bug 431819, SSL client auth, repeated prompts for client certificate
r=rrelyea, r=dveditz
2008-06-18 21:36:29 +02:00
dveditz@cruzio.com
aca5dcbb7e bug 295922 change default for "select cert automatically", r/sr=biesi, blocking1.9+ 2008-03-07 02:52:21 -08:00
wtc@google.com
7d9ede46bb Bug 415033: added a hidden preference (in about:config) for enabling or disabling the TLS session ticket extension. The patch is contributed by Nagendra Modadugu <ngm+mozilla@google.com>. r=wtc,rrelyea,kengert a1.9+=damons Modified Files: netwerk/base/public/security-prefs.js security/manager/ssl/src/nsNSSComponent.cpp 2008-02-26 15:09:39 -08:00
dtownsend@oxymoronical.com
e52758a05e Bug 341472: ship with fewer security warnings showing by default. p=Adam Guthrie <ispiked@gmail.com>, r=darin.moz@gmail.com, ui-r=beltzner, a=wanted-firefox3 2007-08-20 07:22:42 -07:00
kaie@kuix.de
5b82067aa4 Bug 382223, Add support for Camellia to PSM
Patch contributed by okazaki
r=kengert
2007-07-25 15:53:30 -07:00
kaie@kuix.de
30adde7d1d Bug 110161, enable OCSP by defaultr=cbiesinger, sr=mconnor 2007-06-05 12:27:42 -07:00
kaie@kuix.de
146b7c014e Bug 110161. Code related to the plan to enable OCSP by default.r=rrelyea, toolkit r=mconnor 2007-05-30 16:13:28 -07:00
kaie%kuix.de
99c1cc7b57 bug 235773, Patch v13
This check in will make PSM aware of ECC cipher suites. Nightly builds will not yet contain ECC, because NSS is still
being compiled with ECC disabled.
r=rrelyea/darin
2006-05-16 00:33:44 +00:00
kaie%kuix.de
4c135d354c bug 236933, Disable SSL2 and other weak ciphers by default
This checkin changes the default prefs only
r=darin
2006-02-22 12:40:17 +00:00
gavin%gavinsharp.com
2c41e8ddeb Bug 289640: Remove unused preference security.ui.enable, patch by Daniel Cater <DJCater@Gmail.com>, r=kaie, sr=darin 2006-01-16 15:08:30 +00:00
wtc%netscape.com
5cae1f1bc7 Bug 190960: added the DHE ciphersuites back because the underlying NSS bug
(bug 188856) that broke them has been fixed. r=kaie. sr=bryner. a=asa for
mozilla1.3.
Modified Files:
	netwerk/base/public/security-prefs.js
	security/manager/pki/resources/content/ssl3tlsciphers2.xul
	security/manager/pki/resources/locale/en-US/pref-ssl.dtd
	security/manager/ssl/src/nsNSSComponent.cpp
2003-02-19 15:08:50 +00:00
kaie%netscape.com
c422b330bd b=190640 Remove the DHE ciphersuites until they work
r=javi sr=bryner a=asa
2003-01-28 15:06:29 +00:00
kaie%netscape.com
8ac4991f54 b=184940 Enable additional SSL ciphers, add configuration UI
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
ddrinan%netscape.com
18974de8f4 Bug 85720 - domestic DES 56-bit cipher pref. r=ssaux,sr=blizzard 2001-08-02 23:46:30 +00:00
ddrinan%netscape.com
2ac1f43cb1 Enable support for OCSP. Bug#80178, r=mcgreer@netscape.com, sr=blizzard@mozilla.org 2001-05-15 17:59:10 +00:00
thayes%netscape.com
a189244f9e Bug 79528 r=ddrinan/sr=ben Add edit window for SSL ciphers 2001-05-09 04:04:32 +00:00
ddrinan%netscape.com
c256ed06c8 Fix for bug #75277, enable tls. r=javi@netscape.com, sr=darin@netscape.com 2001-04-18 00:46:04 +00:00
jgmyers%netscape.com
d72d1758bc distinguish weak crypto in PSM2: bug 31896 r=dmose ser=darin 2001-04-01 19:37:29 +00:00
dougt%netscape.com
128f95aa9b Relanding Necko Changes.
Revising nsIChannel to allow for overlapped i/o. This consists of three parts:

1. Factoring nsIChannel into a protocol specific part, the nsIChannel, and a socket specific, the nsITransport.
2. Derive the nsIChannel from a nsIRequest.
2. Changes the notification system from necko and the URILoader to pass the nsIRequest interface instead of nsIChannel interface.

This goal stems from wanting to be able to have active AsyncRead and AsyncWrite operations on nsSocketTransport.
This is desired because it would greatly simplify the task of maintaining persistent/reusable socket connections
for FTP, HTTP, and Imap (and potentially other protocols). The problem with the existing nsIChannel interface is
that it does not allow one to selectively suspend just one of the read or write operations while keeping the other active.

r=darin@netscape.com
sr=rpotts@netscape.com
2001-02-21 20:38:08 +00:00
disttsc%bart.nl
3d2d80d536 Back out dougt's channel changes 2001-02-12 03:14:23 +00:00
dougt%netscape.com
1b9ca82439 Revising nsIChannel to allow for overlapped i/o. This consists of three parts:
1. Factoring nsIChannel into a protocol specific part, the nsIChannel, and a socket specific, the nsITransport.
2. Derive the nsIChannel from a nsIRequest.
2. Changes the notification system from necko and the URILoader to pass the nsIRequest interface instead of nsIChannel interface.

This goal stems from wanting to be able to have active AsyncRead and AsyncWrite operations on nsSocketTransport.
This is desired because it would greatly simplify the task of maintaining persistent/reusable socket connections
for FTP, HTTP, and Imap (and potentially other protocols).  The problem with the existing nsIChannel interface is
that it does not allow one to selectively suspend just one of the read or write operations while keeping the other active.

The full details of the change on written up in the netlib newsgroup.

r=darin@netscape.com
sr=rpotts@netscape.com
2001-02-10 00:16:26 +00:00
bryner%uiuc.edu
43b47e9463 Moving files out of security/base at request of security team. The new home for these files is in netwerk. Bug 53648. r=scc. a=gagan,brendan. 2000-09-22 04:42:20 +00:00