Commit message (Collapse) | Author | Age | Lines | |
---|---|---|---|---|
* | Bug 1328955 - When a client tries TLS1.3 with EarlyData and a server falls ↵ | janekptacijarabaci | 2018-02-11 | -3/+8 |
| | | | | back to tls1.2,we should reconnect using tls1.3 without EarlyData | |||
* | Bug 1351392 - Fix transport status events for http2 and ftp | janekptacijarabaci | 2018-02-11 | -0/+4 |
| | ||||
* | Bug 1344890 - h2 tls 1.3 early data problem with https://echo.filippo.io/foo | janekptacijarabaci | 2018-02-11 | -0/+5 |
| | ||||
* | Bug 1322373 - TLS 1.3 early-data for http/2 | janekptacijarabaci | 2018-02-11 | -82/+342 |
| | ||||
* | Bug 1345240 - h2 stalls on failed early data hard reload | janekptacijarabaci | 2018-02-11 | -0/+6 |
| | ||||
* | Bug 1343600 - Add TLS handshake Start/Stop events | janekptacijarabaci | 2018-02-11 | -8/+24 |
| | ||||
* | Bug 1340164 - Fix socket transport status events | janekptacijarabaci | 2018-02-11 | -0/+49 |
| | ||||
* | Check ScriptExtensions property of combining marks when available. | wolfbeast | 2018-02-08 | -3/+34 |
| | ||||
* | Force punycode display for IDNs with a <dotless-i/j, combining mark above> ↵ | wolfbeast | 2018-02-08 | -5/+14 |
| | | | | sequence. | |||
* | Limit displayed user/host strings to sane lengths. | wolfbeast | 2018-02-07 | -0/+30 |
| | ||||
* | Merge branch 'goanna-gfx' | wolfbeast | 2018-02-03 | -0/+1 |
|\ | ||||
| * | Implement WebP image decoder. | wolfbeast | 2018-02-03 | -0/+1 |
| | | ||||
* | | Disable static DHE + AES suites by default (common combination for weak DH keys) | wolfbeast | 2018-02-02 | -2/+2 |
| | | | | | | | | Issue #4 point 5 | |||
* | | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -2/+4 |
| | | | | | | | | Issue #4 point 4 | |||
* | | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+4 |
| | | | | | | | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 | |||
* | | Add Camellia to the active cipher suites. | wolfbeast | 2018-02-02 | -0/+4 |
|/ | | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. | |||
* | Add m-esr52 at 52.6.0 | Matt A. Tobin | 2018-02-02 | -0/+457763 |