Commit message (Collapse) | Author | Age | Lines | |
---|---|---|---|---|
* | Issue #1467 - Part 4: Rename NSS_SQLSTORE to MOZ_SECURITY_SQLSTORE. | wolfbeast | 2020-04-14 | -3/+3 |
| | | | | Rename the build config option accordingly. | |||
* | Issue #1467 - Part 3: Use UTF-8 file paths for NSS-SQL database. | wolfbeast | 2020-04-14 | -2/+11 |
| | ||||
* | Issue #1467 - Part 1: Set up conditional NSS-SQL builds. | wolfbeast | 2020-04-14 | -0/+11 |
| | | | | | | | - Adds buildconfig option --enable-nss-sqlstore - Prefixes NSS dbinit with either sql: or dbm: depending on config - Pre-initializes mozStorage when NSS-SQL storage is used to prevent an sqlite3_config race in NSS Init | |||
* | Issue #1053 - Remove android support from nsNSSComponent.cpp | Matt A. Tobin | 2020-04-14 | -61/+17 |
| | ||||
* | Telemetry: Remove stubs and related code | adeshkp | 2019-01-12 | -17/+0 |
| | ||||
* | Remove AccumulateCipherSuite() | wolfbeast | 2018-11-08 | -2/+2 |
| | | | | This resolves #858 | |||
* | Remove all C++ Telemetry Accumulation calls. | wolfbeast | 2018-09-03 | -17/+0 |
| | | | | | This creates a number of stubs and leaves some surrounding code that may be irrelevant (eg. recorded time stamps, status variables). Stub resolution/removal should be a follow-up to this. | |||
* | Remove support for TLS session caches in TLSServerSocket. | wolfbeast | 2018-09-01 | -14/+0 |
| | | | | This resolves #738 | |||
* | Fix missed in32->int64 in df852120098dc7ba5df4a76126c6297c6d2d1b7b | wolfbeast | 2018-08-17 | -1/+1 |
| | | | | Tag #709. | |||
* | Reinstate RC4 and mark 3DES weak. | wolfbeast | 2018-08-17 | -1/+7 |
| | | | | Tag #709 | |||
* | Extend {EnabledWeakCiphers} bit field to allow more cipher suites. | wolfbeast | 2018-08-17 | -8/+8 |
| | | | | Tag #709. | |||
* | Request NSS to use DBM as the storage file format | JustOff | 2018-06-06 | -2/+2 |
| | ||||
* | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -6/+9 |
| | | | | Issue #4 point 4 | |||
* | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+8 |
| | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 | |||
* | Add Camellia to the active cipher suites. | wolfbeast | 2018-02-02 | -0/+8 |
| | | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. | |||
* | Add m-esr52 at 52.6.0 | Matt A. Tobin | 2018-02-02 | -0/+2499 |