Commit Graph

  • e371a3e672 Accepting request 220922 from mozilla:Factory Stephan Kulow 2014-02-06 06:06:30 +00:00
  • 3d05b3f5d6 Accepting request 220922 from mozilla:Factory Stephan Kulow 2014-02-06 06:06:30 +00:00
  • 22d260f91d * MFSA 2014-12/CVE-2014-1490/CVE-2014-1491 NSS ticket handling issues Wolfgang Rosenauer 2014-02-05 06:01:36 +00:00
  • 17f8bab0f2 * MFSA 2014-12/CVE-2014-1490/CVE-2014-1491 NSS ticket handling issues Wolfgang Rosenauer 2014-02-05 06:01:36 +00:00
  • 84c1caae7c Accepting request 213275 from mozilla:Factory Stephan Kulow 2014-01-10 20:21:02 +00:00
  • 441ef15ac2 Accepting request 213275 from mozilla:Factory Stephan Kulow 2014-01-10 20:21:02 +00:00
  • b36212447c OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=148 Wolfgang Rosenauer 2014-01-09 10:26:13 +00:00
  • 14100a1118 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=148 Wolfgang Rosenauer 2014-01-09 10:26:13 +00:00
  • d55b02c72c * Reordered the cipher suites offered in SSL/TLS client hello messages to match modern best practices. * Improved SSL/TLS false start. In addition to enabling the SSL_ENABLE_FALSE_START option, an application must now register a callback using the SSL_SetCanFalseStartCallback function. * When false start is enabled, libssl will sometimes return unencrypted, unauthenticated data from PR_Recv (CVE-2013-1740, bmo#919877) New functionality * Implemented OCSP querying using the HTTP GET method, which is the new default, and will fall back to the HTTP POST method. * Implemented OCSP server functionality for testing purposes (httpserv utility). * Support SHA-1 signatures with TLS 1.2 client authentication. * Added the --empty-password command-line option to certutil, to be used with -N: use an empty password when creating a new database. * Added the -w command-line option to pp: don't wrap long output lines. New functions * CERT_ForcePostMethodForOCSP * CERT_GetSubjectNameDigest * CERT_GetSubjectPublicKeyDigest * SSL_PeerCertificateChain * SSL_RecommendedCanFalseStart * SSL_SetCanFalseStartCallback New types * CERT_REV_M_FORCE_POST_METHOD_FOR_OCSP: When this flag is used, libpkix will never attempt to use the HTTP GET method for OCSP requests; it will always use POST. Wolfgang Rosenauer 2014-01-09 10:24:37 +00:00
  • 186557c50a * Reordered the cipher suites offered in SSL/TLS client hello messages to match modern best practices. * Improved SSL/TLS false start. In addition to enabling the SSL_ENABLE_FALSE_START option, an application must now register a callback using the SSL_SetCanFalseStartCallback function. * When false start is enabled, libssl will sometimes return unencrypted, unauthenticated data from PR_Recv (CVE-2013-1740, bmo#919877) New functionality * Implemented OCSP querying using the HTTP GET method, which is the new default, and will fall back to the HTTP POST method. * Implemented OCSP server functionality for testing purposes (httpserv utility). * Support SHA-1 signatures with TLS 1.2 client authentication. * Added the --empty-password command-line option to certutil, to be used with -N: use an empty password when creating a new database. * Added the -w command-line option to pp: don't wrap long output lines. New functions * CERT_ForcePostMethodForOCSP * CERT_GetSubjectNameDigest * CERT_GetSubjectPublicKeyDigest * SSL_PeerCertificateChain * SSL_RecommendedCanFalseStart * SSL_SetCanFalseStartCallback New types * CERT_REV_M_FORCE_POST_METHOD_FOR_OCSP: When this flag is used, libpkix will never attempt to use the HTTP GET method for OCSP requests; it will always use POST. Wolfgang Rosenauer 2014-01-09 10:24:37 +00:00
  • bdf63cb76e - update to 3.15.4 * required for Firefox 27 * regular CA root store update (1.96) * some OSCP improvments * other bugfixes - removed obsolete char.patch Wolfgang Rosenauer 2014-01-07 08:49:30 +00:00
  • 58591dfdb2 - update to 3.15.4 * required for Firefox 27 * regular CA root store update (1.96) * some OSCP improvments * other bugfixes - removed obsolete char.patch Wolfgang Rosenauer 2014-01-07 08:49:30 +00:00
  • df1ba0228c Accepting request 210076 from mozilla:Factory Stephan Kulow 2013-12-10 16:43:53 +00:00
  • a73555f5b8 Accepting request 210076 from mozilla:Factory Stephan Kulow 2013-12-10 16:43:53 +00:00
  • 3807e06c56 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=144 Wolfgang Rosenauer 2013-12-09 19:28:29 +00:00
  • 583d3a0e12 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=144 Wolfgang Rosenauer 2013-12-09 19:28:29 +00:00
  • 700c409a77 - update to 3.15.3.1 (bnc#854367) * includes certstore update (1.95) (bmo#946351) (explicitely distrust AC DG Tresor SSL) Wolfgang Rosenauer 2013-12-09 12:35:34 +00:00
  • 09fb13cf21 - update to 3.15.3.1 (bnc#854367) * includes certstore update (1.95) (bmo#946351) (explicitely distrust AC DG Tresor SSL) Wolfgang Rosenauer 2013-12-09 12:35:34 +00:00
  • 4ceb44bc38 Accepting request 209434 from mozilla:Factory Stephan Kulow 2013-12-07 06:46:23 +00:00
  • a24fc6f228 Accepting request 209434 from mozilla:Factory Stephan Kulow 2013-12-07 06:46:23 +00:00
  • 15d54c1f4e Accepting request 209419 from openSUSE:Factory:PowerLE Wolfgang Rosenauer 2013-12-04 17:44:48 +00:00
  • a86677e628 Accepting request 209419 from openSUSE:Factory:PowerLE Wolfgang Rosenauer 2013-12-04 17:44:48 +00:00
  • fbcfc6c0ac Accepting request 206762 from mozilla:Factory Stephan Kulow 2013-11-20 09:48:47 +00:00
  • c284190dfc Accepting request 206762 from mozilla:Factory Stephan Kulow 2013-11-20 09:48:47 +00:00
  • de18d97a09 - update to 3.15.3 (bnc#850148) * fix CVE-2013-5605 Wolfgang Rosenauer 2013-11-12 20:37:56 +00:00
  • 38ebd6f8e7 - update to 3.15.3 (bnc#850148) * fix CVE-2013-5605 Wolfgang Rosenauer 2013-11-12 20:37:56 +00:00
  • 1d701a1c1b - update to 3.15.3 * CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates, when the CERTVerifyLog log parameter is given (bmo#910438) * NSS advertises TLS 1.2 ciphersuites in a TLS 1.1 ClientHello (bmo#919677) Wolfgang Rosenauer 2013-11-11 22:19:45 +00:00
  • d14ddaa1f0 - update to 3.15.3 * CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates, when the CERTVerifyLog log parameter is given (bmo#910438) * NSS advertises TLS 1.2 ciphersuites in a TLS 1.1 ClientHello (bmo#919677) Wolfgang Rosenauer 2013-11-11 22:19:45 +00:00
  • acb5a1f027 Accepting request 201263 from mozilla:Factory Stephan Kulow 2013-09-29 15:50:27 +00:00
  • 7b55833f6c Accepting request 201263 from mozilla:Factory Stephan Kulow 2013-09-29 15:50:27 +00:00
  • 483bf15d0b OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=136 Wolfgang Rosenauer 2013-09-28 08:34:54 +00:00
  • dc0fe543b4 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=136 Wolfgang Rosenauer 2013-09-28 08:34:54 +00:00
  • 067f9add2d - update to 3.15.2 (bnc#842979) Wolfgang Rosenauer 2013-09-28 08:24:06 +00:00
  • 5e4a477e3f - update to 3.15.2 (bnc#842979) Wolfgang Rosenauer 2013-09-28 08:24:06 +00:00
  • cf8599cc0e - version 3.15.2 * Support for AES-GCM ciphersuites that use the SHA-256 PRF * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs * Add PK11_CipherFinal macro * sizeof() used incorrectly * nssutil_ReadSecmodDB() leaks memory * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake is finished. * Deprecate the SSL cipher policy code * Avoid uninitialized data read in the event of a decryption failure. (CVE-2013-1739) Wolfgang Rosenauer 2013-09-28 08:17:22 +00:00
  • 5163190a91 - version 3.15.2 * Support for AES-GCM ciphersuites that use the SHA-256 PRF * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs * Add PK11_CipherFinal macro * sizeof() used incorrectly * nssutil_ReadSecmodDB() leaks memory * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake is finished. * Deprecate the SSL cipher policy code * Avoid uninitialized data read in the event of a decryption failure. (CVE-2013-1739) Wolfgang Rosenauer 2013-09-28 08:17:22 +00:00
  • dc856ecc99 Accepting request 201249 from home:elvigia:branches:mozilla:Factory Wolfgang Rosenauer 2013-09-28 08:13:46 +00:00
  • a2949dce64 Accepting request 201249 from home:elvigia:branches:mozilla:Factory Wolfgang Rosenauer 2013-09-28 08:13:46 +00:00
  • 984f9476b3 Accepting request 182306 from mozilla:Factory Stephan Kulow 2013-07-05 18:37:37 +00:00
  • cd0c020b2e Accepting request 182306 from mozilla:Factory Stephan Kulow 2013-07-05 18:37:37 +00:00
  • 38ee6dfd36 Accepting request 182277 from home:lnussel:branches:Base:System Wolfgang Rosenauer 2013-07-05 12:48:09 +00:00
  • 7dddfd6c24 Accepting request 182277 from home:lnussel:branches:Base:System Wolfgang Rosenauer 2013-07-05 12:48:09 +00:00
  • 5188d74565 Accepting request 181869 from mozilla:Factory Stephan Kulow 2013-07-04 08:11:56 +00:00
  • e071638690 Accepting request 181869 from mozilla:Factory Stephan Kulow 2013-07-04 08:11:56 +00:00
  • 50955e7e97 rebase patch Wolfgang Rosenauer 2013-07-03 12:27:52 +00:00
  • 997d66ac8e rebase patch Wolfgang Rosenauer 2013-07-03 12:27:52 +00:00
  • febd37237a - update to 3.15.1 * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246 and RFC 5289) are supported, allowing TLS to be used without MD5 and SHA-1. Note the following limitations: The hash function used in the signature for TLS 1.2 client authentication must be the hash function of the TLS 1.2 PRF, which is always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet supported. * some bugfixes and improvements Wolfgang Rosenauer 2013-07-03 12:00:07 +00:00
  • 1256cc6819 - update to 3.15.1 * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246 and RFC 5289) are supported, allowing TLS to be used without MD5 and SHA-1. Note the following limitations: The hash function used in the signature for TLS 1.2 client authentication must be the hash function of the TLS 1.2 PRF, which is always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet supported. * some bugfixes and improvements Wolfgang Rosenauer 2013-07-03 12:00:07 +00:00
  • 8c18216fc4 Accepting request 181778 from home:lnussel:branches:Base:System Wolfgang Rosenauer 2013-07-03 10:36:27 +00:00
  • 80c4a0174f Accepting request 181778 from home:lnussel:branches:Base:System Wolfgang Rosenauer 2013-07-03 10:36:27 +00:00
  • 2327bba08a Accepting request 178606 from mozilla:Factory Stephan Kulow 2013-06-14 14:46:40 +00:00
  • 4089d6b89b Accepting request 178606 from mozilla:Factory Stephan Kulow 2013-06-14 14:46:40 +00:00
  • 7e9cc41132 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=125 Wolfgang Rosenauer 2013-06-12 08:21:54 +00:00
  • 8893871f59 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=125 Wolfgang Rosenauer 2013-06-12 08:21:54 +00:00
  • 68c257da8e - update to 3.15 * Packaging + removed obsolete patches * nss-disable-expired-testcerts.patch * bug-834091.patch * New Functionality + Support for OCSP Stapling (RFC 6066, Certificate Status Request) has been added for both client and server sockets. TLS client applications may enable this via a call to SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE); + Added function SECITEM_ReallocItemV2. It replaces function SECITEM_ReallocItem, which is now declared as obsolete. + Support for single-operation (eg: not multi-part) symmetric key encryption and decryption, via PK11_Encrypt and PK11_Decrypt. + certutil has been updated to support creating name constraints extensions. * New Functions in ssl.h SSL_PeerStapledOCSPResponse - Returns the server's stapled OCSP response, when used with a TLS client socket that negotiated the status_request extension. SSL_SetStapledOCSPResponses - Set's a stapled OCSP response for a TLS server socket to return when clients send the status_request extension. in ocsp.h CERT_PostOCSPRequest - Primarily intended for testing, permits the sending and receiving of raw OCSP request/responses. in secpkcs7.h SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a PKCS#7 signature at a specific time other than the present time. Wolfgang Rosenauer 2013-06-11 15:41:13 +00:00
  • 506ad33ba3 - update to 3.15 * Packaging + removed obsolete patches * nss-disable-expired-testcerts.patch * bug-834091.patch * New Functionality + Support for OCSP Stapling (RFC 6066, Certificate Status Request) has been added for both client and server sockets. TLS client applications may enable this via a call to SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE); + Added function SECITEM_ReallocItemV2. It replaces function SECITEM_ReallocItem, which is now declared as obsolete. + Support for single-operation (eg: not multi-part) symmetric key encryption and decryption, via PK11_Encrypt and PK11_Decrypt. + certutil has been updated to support creating name constraints extensions. * New Functions in ssl.h SSL_PeerStapledOCSPResponse - Returns the server's stapled OCSP response, when used with a TLS client socket that negotiated the status_request extension. SSL_SetStapledOCSPResponses - Set's a stapled OCSP response for a TLS server socket to return when clients send the status_request extension. in ocsp.h CERT_PostOCSPRequest - Primarily intended for testing, permits the sending and receiving of raw OCSP request/responses. in secpkcs7.h SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a PKCS#7 signature at a specific time other than the present time. Wolfgang Rosenauer 2013-06-11 15:41:13 +00:00
  • d082e6733c Accepting request 173001 from mozilla:Factory Stephan Kulow 2013-04-24 08:47:42 +00:00
  • 9fbe48bbad Accepting request 173001 from mozilla:Factory Stephan Kulow 2013-04-24 08:47:42 +00:00
  • d9b17089be Accepting request 171078 from home:namtrac:bugfix Wolfgang Rosenauer 2013-04-16 11:16:38 +00:00
  • ddbab3a3b8 Accepting request 171078 from home:namtrac:bugfix Wolfgang Rosenauer 2013-04-16 11:16:38 +00:00
  • b3ca3f8b30 Accepting request 162347 from mozilla:Factory Stephan Kulow 2013-04-05 07:29:13 +00:00
  • 35724cb521 Accepting request 162347 from mozilla:Factory Stephan Kulow 2013-04-05 07:29:13 +00:00
  • decd0449c4 (nss-disable-expired-testcerts.patch) (bug-834091.patch; bmo#834091) Wolfgang Rosenauer 2013-04-03 07:43:24 +00:00
  • a1f8432feb (nss-disable-expired-testcerts.patch) (bug-834091.patch; bmo#834091) Wolfgang Rosenauer 2013-04-03 07:43:24 +00:00
  • 2843a9e569 * MFSA 2013-40/CVE-2013-0791 (bmo#629816) Out-of-bounds array read in CERT_DecodeCertPackage Wolfgang Rosenauer 2013-04-02 21:31:01 +00:00
  • 1400caed25 * MFSA 2013-40/CVE-2013-0791 (bmo#629816) Out-of-bounds array read in CERT_DecodeCertPackage Wolfgang Rosenauer 2013-04-02 21:31:01 +00:00
  • 3f1abb24a5 - disable tests with expired certificates - add SEC_PKCS7VerifyDetachedSignatureAtTime using patch from mozilla tree to fulfill Firefox 21 requirements Wolfgang Rosenauer 2013-04-02 20:29:32 +00:00
  • 15f7757c6e - disable tests with expired certificates - add SEC_PKCS7VerifyDetachedSignatureAtTime using patch from mozilla tree to fulfill Firefox 21 requirements Wolfgang Rosenauer 2013-04-02 20:29:32 +00:00
  • 6abe0100b2 Accepting request 156925 from mozilla:Factory Stephan Kulow 2013-03-01 09:52:35 +00:00
  • c5c5dba1e1 Accepting request 156925 from mozilla:Factory Stephan Kulow 2013-03-01 09:52:35 +00:00
  • 0c76898e5d - update to 3.14.3 * No new major functionality is introduced in this release. This release is a patch release to address CVE-2013-1620 (bmo#822365) * "certutil -a" was not correctly producing ASCII output as requested. (bmo#840714) * NSS 3.14.2 broke compilation with older versions of sqlite that lacked the SQLITE_FCNTL_TEMPFILENAME file control. NSS 3.14.3 now properly compiles when used with older versions of sqlite (bmo#837799) - remove system-sqlite.patch - add aarch64 support Wolfgang Rosenauer 2013-02-28 22:53:05 +00:00
  • 38168bf8bb - update to 3.14.3 * No new major functionality is introduced in this release. This release is a patch release to address CVE-2013-1620 (bmo#822365) * "certutil -a" was not correctly producing ASCII output as requested. (bmo#840714) * NSS 3.14.2 broke compilation with older versions of sqlite that lacked the SQLITE_FCNTL_TEMPFILENAME file control. NSS 3.14.3 now properly compiles when used with older versions of sqlite (bmo#837799) - remove system-sqlite.patch - add aarch64 support Wolfgang Rosenauer 2013-02-28 22:53:05 +00:00
  • f520a374c9 Accepting request 147589 from mozilla:Factory Stephan Kulow 2013-01-10 12:33:23 +00:00
  • 3ec4a7d061 Accepting request 147589 from mozilla:Factory Stephan Kulow 2013-01-10 12:33:23 +00:00
  • 2111bb58f3 - updated CA database (nssckbi-1.93.patch) * MFSA 2013-20/CVE-2013-0743 (bmo#825022, bnc#796628) revoke mis-issued intermediate certificates from TURKTRUST Wolfgang Rosenauer 2013-01-08 17:55:59 +00:00
  • 99a81b336e - updated CA database (nssckbi-1.93.patch) * MFSA 2013-20/CVE-2013-0743 (bmo#825022, bnc#796628) revoke mis-issued intermediate certificates from TURKTRUST Wolfgang Rosenauer 2013-01-08 17:55:59 +00:00
  • 1559d15884 (bmo#825022, bnc#796628) Wolfgang Rosenauer 2013-01-05 14:50:59 +00:00
  • e5e52b65d8 (bmo#825022, bnc#796628) Wolfgang Rosenauer 2013-01-05 14:50:59 +00:00
  • e3044a76f2 Accepting request 146971 from mozilla:Factory Ismail Dönmez 2013-01-04 12:11:52 +00:00
  • 4d27219c9a Accepting request 146971 from mozilla:Factory Ismail Dönmez 2013-01-04 12:11:52 +00:00
  • c623ffa21d OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=111 Wolfgang Rosenauer 2013-01-04 11:03:16 +00:00
  • 9e5952a272 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=111 Wolfgang Rosenauer 2013-01-04 11:03:16 +00:00
  • 6ad1916470 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=110 Wolfgang Rosenauer 2012-12-30 18:23:59 +00:00
  • 61b05c4267 OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=110 Wolfgang Rosenauer 2012-12-30 18:23:59 +00:00
  • a1999709e3 - updated CA database (nssckbi-1.93.patch) (bmo#825022) Wolfgang Rosenauer 2012-12-30 18:06:05 +00:00
  • 41f3cb6358 - updated CA database (nssckbi-1.93.patch) (bmo#825022) Wolfgang Rosenauer 2012-12-30 18:06:05 +00:00
  • 74714d0afe Accepting request 146303 from mozilla:Factory Ismail Dönmez 2012-12-28 21:45:31 +00:00
  • 60d88fc972 Accepting request 146303 from mozilla:Factory Ismail Dönmez 2012-12-28 21:45:31 +00:00
  • c2393f18b1 - update to 3.14.1 RTM * minimal requirement for Gecko 20 * several bugfixes Wolfgang Rosenauer 2012-12-18 13:54:06 +00:00
  • 9cd1b1b874 - update to 3.14.1 RTM * minimal requirement for Gecko 20 * several bugfixes Wolfgang Rosenauer 2012-12-18 13:54:06 +00:00
  • a0772781ad Accepting request 139298 from mozilla:Factory Stephan Kulow 2012-10-26 15:26:31 +00:00
  • ba6f4f590a Accepting request 139298 from mozilla:Factory Stephan Kulow 2012-10-26 15:26:31 +00:00
  • 450d9e2858 - update to 3.14 RTM * Support for TLS 1.1 (RFC 4346) * Experimental support for DTLS 1.0 (RFC 4347) and DTLS-SRTP (RFC 5764) * Support for AES-CTR, AES-CTS, and AES-GCM * Support for Keying Material Exporters for TLS (RFC 5705) * Support for certificate signatures using the MD5 hash algorithm is now disabled by default * The NSS license has changed to MPL 2.0. Previous releases were released under a MPL 1.1/GPL 2.0/LGPL 2.1 tri-license. For more information about MPL 2.0, please see http://www.mozilla.org/MPL/2.0/FAQ.html. For an additional explanation on GPL/LGPL compatibility, see security/nss/COPYING in the source code. * Export and DES cipher suites are disabled by default. Non-ECC AES and Triple DES cipher suites are enabled by default - disabled OCSP testcases since they need external network (nss-disable-ocsp-test.patch) Wolfgang Rosenauer 2012-10-25 14:10:44 +00:00
  • eb3cdf4581 - update to 3.14 RTM * Support for TLS 1.1 (RFC 4346) * Experimental support for DTLS 1.0 (RFC 4347) and DTLS-SRTP (RFC 5764) * Support for AES-CTR, AES-CTS, and AES-GCM * Support for Keying Material Exporters for TLS (RFC 5705) * Support for certificate signatures using the MD5 hash algorithm is now disabled by default * The NSS license has changed to MPL 2.0. Previous releases were released under a MPL 1.1/GPL 2.0/LGPL 2.1 tri-license. For more information about MPL 2.0, please see http://www.mozilla.org/MPL/2.0/FAQ.html. For an additional explanation on GPL/LGPL compatibility, see security/nss/COPYING in the source code. * Export and DES cipher suites are disabled by default. Non-ECC AES and Triple DES cipher suites are enabled by default - disabled OCSP testcases since they need external network (nss-disable-ocsp-test.patch) Wolfgang Rosenauer 2012-10-25 14:10:44 +00:00
  • d8a08a738d Accepting request 130997 from mozilla:Factory Ismail Dönmez 2012-08-16 19:45:00 +00:00
  • 0d4bc1d5e6 Accepting request 130997 from mozilla:Factory Ismail Dönmez 2012-08-16 19:45:00 +00:00
  • 30f3212ee6 - update to 3.13.6 RTM * root CA update * other bugfixes Wolfgang Rosenauer 2012-08-16 04:53:56 +00:00
  • 579c8a7cf9 - update to 3.13.6 RTM * root CA update * other bugfixes Wolfgang Rosenauer 2012-08-16 04:53:56 +00:00
  • e7aec60cd7 Accepting request 123277 from mozilla:Factory Stephan Kulow 2012-06-06 14:08:48 +00:00
  • a5bceb9c75 Accepting request 123277 from mozilla:Factory Stephan Kulow 2012-06-06 14:08:48 +00:00