Граф коммитов

10594 Коммитов

Автор SHA1 Сообщение Дата
Phil Ringnalda 9c92a69a82 Merge autoland to m-c, a=merge 2016-10-01 14:00:21 -07:00
ffxbld 20d52ee5f4 No bug, Automated HPKP preload list update from host bld-linux64-spot-316 - a=hpkp-update 2016-10-01 05:51:40 -07:00
ffxbld eddc6a1d95 No bug, Automated HSTS preload list update from host bld-linux64-spot-316 - a=hsts-update 2016-10-01 05:51:37 -07:00
Cykesiopka 8b1a108f37 Bug 1304587 - Avoid using types that correspond to char/char16_t strings in PKCS #11 IDL files. r=keeler
Typically, the interfaces involved don't need to use raw char/char16_t strings,
and hence can benefit from the additional safety of using the Mozilla string
classes.

In some places, this patch also changes some UTF-16 APIs to UTF-8 where the
implementations can never actually support UTF-16. This reduces the amount of
code and runtime conversion.

MozReview-Commit-ID: y8o5wLBohe

--HG--
extra : rebase_source : 130c8b77a98d21d5b9a0efeccae8861d89fa8f02
2016-10-01 00:46:13 +08:00
Cykesiopka 9a3244d164 Bug 1305531 - Add test cases to test_sdr.js to ensure recommended way of using encryptString() and decryptString() works. r=keeler
MozReview-Commit-ID: 5vPxUZyzGSz

--HG--
extra : rebase_source : 6aba7627e3c0c79ea633933ce7f140c20b16c9d9
2016-10-01 09:29:29 +08:00
Cykesiopka e95a6f224a Bug 1305531 - Use ACString instead of AUTF8String in nsISecretDecoderRing.idl to unbreak decrypting saved usernames and passwords. r=keeler
Bug 1275841 switched some IDL types from "string" to "AUTF8String".
This had the unintentional effect of breaking decryption of previously saved
passwords that contained special characters.

In particular, the AUTF8String type means XPConnect may convert any strings
using that type to UTF-16 when crossing XPConnect boundaries.
However, crypto-SDR.js (responsible for encrypting and decrypting for the
password manager) expects to do conversions between UTF-16 and UTF-8 itself.
What ends up happening is crypto-SDR.js decrypts a saved password and tries to
convert from UTF-8 to UTF-16, but fails because the decrypted text is already
UTF-16.

The solution is to use ACString instead of AUTF8String. ACString does not result
in automatic encoding changes, so the expectations of crypto-SDR.js are met
again, and lets SecretDecoderRing.cpp keep the benefit of working with smart
string types.

This change probably breaks passwords saved after Bug 1275841 landed and before
this patch landed, but the number of passwords this patch breaks is probably
much lower than the number of passwords that would be broken if this patch did
not land.

MozReview-Commit-ID: 6Z01zfwJ6t7

--HG--
extra : rebase_source : 514e78f2e1c2cef3b3692656b20daf3b068a4fee
2016-10-01 09:29:28 +08:00
David Keeler 8d6b6a78fe bug 1243923 - add support for the CA/Browser Forum EV OID r=Cykesiopka,jcj
MozReview-Commit-ID: 4zqzistEhvo

--HG--
extra : rebase_source : 62d28c3715fcb225ec83ba422621dd3f8c40f708
2016-09-02 16:39:15 -07:00
David Keeler a0181b703e Bug 1305422 - part 15 - don't call size_forward in nsPKCS12Blob; r=mgoodwin,nfroyd
Before this patch, nsPKCS12Blob::digest_read used size_forward to perform a size
check on a buffer. However, the entire set of {digest_open, digest_close,
digest_read, digest_write} was unnecessary because NSS provides this
functionality by default when using SEC_PKCS12DecoderStart. This patch
simplifies things by removing the extraneous implementations.
2016-09-29 19:33:57 -07:00
Carsten "Tomcat" Book 5b45193594 merge mozilla-inbound to mozilla-central a=merge 2016-09-29 11:44:58 +02:00
Franziskus Kiefer 27936d1ae9 Bug 1305970 - land NSS 0x233a44e96b22, r=me
--HG--
extra : amend_source : ba5ab6511baabb43e260faa7a5705c48dea908c4
2016-09-29 07:59:34 +02:00
Martin Thomson 9ddbbc7158 Bug 1306003 - Enable P-521, r=ekr,rbarnes
MozReview-Commit-ID: 1oF98CACtQV

--HG--
extra : rebase_source : 61c6a4c87a5de305e7701654a3c5e7ecdacc75de
2016-09-29 10:40:40 +10:00
Haik Aftandilian c7963e7731 Bug 1284588 - OS X: Disable content process write access to user files in the home directory; r=gcp
Changes the semantics of the security.sandbox.content.level pref on OS X with
respect to file access to the user's home directory. With the fix, Nightly
defaults to 2 while other releases will default to 1. The level values now
have the following meaning.

*) security.sandbox.content.level=0 disables content process sandboxing.
No change here.

*) security.sandbox.content.level=1 blocks write access to the majority of the
home directory.

*) security.sandbox.content.level=2 includes the write access blocking in
level 1, but also blocks both read and write access to ~/Library and $PROFILE
excluding the extensions and weave subdirectories.

Prior to this fix, Nightly defaulted to a value of 1 while all other releases
used 0. The value of 1 meant that read/write access to ~/Library and the
$PROFILE dir (excluding $PROFILE/{extensions,weave}) was prevented.

The strength of a level=1 sandbox is reduced by this with fix,
but level=1 becomes the first ride-the-trains content sandbox candidate,
Nightly changes to level=2, and higher levels still indicate a more
restrictive sandbox.

MozReview-Commit-ID: 7NJAe24T4pU

--HG--
extra : rebase_source : 8cb5ea82004ad631fe688bafffa9dc9979568679
2016-09-26 11:30:08 -07:00
Carsten "Tomcat" Book 572e74ee99 merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
David Parks 1748bfae57 Bug 1269114 - [x86_64] Last picked directory not saved when using Flash Player uploader. r=jimm
Adds a couple of registry paths to the broker's ALLOW policy.
2016-09-24 02:54:12 -07:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Jed Davis 75b81d566f Bug 1303813 - Allow media plugins to call madvise with MADV_FREE. r=gcp
--HG--
extra : rebase_source : 42fa66774311cc1dcf2c18643c7118483acff89d
2016-09-26 16:10:00 -04:00
Jed Davis cb2e7d319f Bug 1304220 - Allow media plugins to use the times(2) syscall. r=gcp
--HG--
extra : rebase_source : 595bf264b48968ec25d02c82866ef02ef87a59fa
2016-09-26 16:32:00 -04:00
Carsten "Tomcat" Book 762cd18602 Merge mozilla-central to autoland 2016-09-28 16:52:13 +02:00
Masatoshi Kimura 5169b351fb Bug 1305561 - Do not check renego extension when TLS version is 1.3. r=keeler
MozReview-Commit-ID: JtT6hLcbl3W

--HG--
extra : rebase_source : 32e1e28bad773bd7333468b6f93d01cc05ab4321
extra : source : faaf8817705900a1134e2be7bc9c349a33e670aa
2016-09-27 20:06:22 +09:00
Sergei Chernov 976d5c3f1d Bug 1293231 - Certificate Transparency - basic telemetry reports; r=Cykesiopka,keeler
MozReview-Commit-ID: EGvuZADObJo

--HG--
extra : rebase_source : 9a059c9f8e2fdf9bfc693b0b5649808b1beeb67b
2016-08-11 13:41:50 +03:00
Martin Thomson 6158ad648f Bug 1304926 - Enable specific named groups, r=keeler
MozReview-Commit-ID: KIe6D9iRAXt

--HG--
extra : rebase_source : a8f6d712b59bf373e52a88b8451c8db4a3f71d65
extra : amend_source : 071e9f4c3ebe336af3888b76e778d0d753d326fc
2016-09-26 15:06:42 +10:00
EKR bf2bd2813c Bug 1304919 - PSM changes to support TLS 1.3 key exchange, r=mt
MozReview-Commit-ID: 1GMk8PajbHj

--HG--
extra : rebase_source : 3a5ee2f04595b54fc50b84b8e9c4196f31adb1f0
extra : source : b54d608edfa874dfd3d8305e771490a4b25cf641
2016-09-23 14:27:29 +10:00
Martin Thomson eb1023f573 Bug 1304919 - Update NSS to trunk, r=ekr
MozReview-Commit-ID: g0XqOwNzkz

--HG--
extra : rebase_source : f3b55831f927074846ce3def0e72941ba3c93ebf
2016-09-26 10:47:58 +10:00
ffxbld 3c8aea1193 No bug, Automated HPKP preload list update from host bld-linux64-spot-389 - a=hpkp-update 2016-09-24 06:03:53 -07:00
ffxbld 45fdba1af2 No bug, Automated HSTS preload list update from host bld-linux64-spot-389 - a=hsts-update 2016-09-24 06:03:51 -07:00
Carsten "Tomcat" Book a65e4225ef merge mozilla-inbound to mozilla-central a=merge 2016-09-23 12:05:53 +02:00
Kai Engert c4ae869e28 Bug 1296266, land NSS_3_27_BETA4, r=franziskus 2016-09-22 21:21:30 +02:00
Haik Aftandilian 497d8e9b73 Bug 1299329 - Remove printing-related privileges from content process sandbox; r=gcp
MozReview-Commit-ID: 9fnfkKvjpGx

--HG--
extra : rebase_source : bc1361b350171920ae8e19747c77287ea82f6f8f
2016-09-16 16:09:51 -07:00
David Keeler b1cb7643ef bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
MozReview-Commit-ID: 2uwHPxk0VhZ

--HG--
extra : rebase_source : 1c7b5d2559139fa8286342decf4e4f7c83317e29
2016-09-14 15:11:15 -07:00
Sebastian Hengst d8888f81d1 Backed out changeset 2df66e8b7411 (bug 1302140) for Windows build bustage in CertVerifier.cpp. r=backout on a CLOSED TREE 2016-09-21 20:47:08 +02:00
David Keeler d374bc442a bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
MozReview-Commit-ID: 2uwHPxk0VhZ

--HG--
extra : rebase_source : 5b1342abc2eb260ec91464b3a1d331baf8968460
2016-09-14 15:11:15 -07:00
Wes Kocher da7b1c61a1 Merge inbound to central, a=merge 2016-09-19 15:51:39 -07:00
Franziskus Kiefer 5162ef8799 Bug 1296266 - NSS 3.27 tip d9f7136f2ae3, r=ttaubert
--HG--
extra : rebase_source : 44fbdcc69ba19a91ca6dcc9f2a3f1610ffad7e89
2016-09-16 10:00:57 -07:00
Phil Ringnalda 7405ef6df8 Merge m-c to autoland 2016-09-17 12:03:25 -07:00
ffxbld 653cac986e No bug, Automated HPKP preload list update from host bld-linux64-spot-593 - a=hpkp-update 2016-09-17 05:55:01 -07:00
ffxbld 873ec403ea No bug, Automated HSTS preload list update from host bld-linux64-spot-593 - a=hsts-update 2016-09-17 05:54:58 -07:00
Joseph Yeh d51b2b87d0 Bug 1298872 - Fix text cropped and overflowed in advanced pane in-content dialogs; r=MattN
MozReview-Commit-ID: C7Q5VnipTIa

--HG--
extra : rebase_source : 7a7a967c6a58c2d54ed69ec6a41802f5b6fe747f
2016-09-05 18:11:08 +08:00
Bob Owen fe5ccaf977 Bug 1303325: Revert changes to policy_target.cc that cause issue with CoInitializeSecurity. r=aklotz
This also reverts the Bug 1287426 Part 8 patch that turned the USER_NON_ADMIN loken into a restricted token.

MozReview-Commit-ID: 9fNeyhAHw55

--HG--
extra : rebase_source : adbe59260d512b5d17b6e3ea6c1fe484c06eb555
2016-09-16 13:49:53 +01:00
Carsten "Tomcat" Book d2c3fe7fd3 merge autoland to mozilla-central a=merge 2016-09-14 12:07:02 +02:00
Joseph Yeh eb7643afdc Bug 1049001 - Convert the certManager dialog to in-content; r=MattN
MozReview-Commit-ID: GKkbxlWboPO

--HG--
extra : rebase_source : 6a4814b3d3f7d733a6361f8adcca76371df6039f
2016-09-13 14:27:13 -07:00
David Keeler 2b1cac9df4 bug 1299676 - introduce der.jsm as a minimal js ASN.1 DER decoder r=Cykesiopka,jcj
MozReview-Commit-ID: 29oNa3S3s6a

--HG--
extra : rebase_source : 6e55bc8a105d480d33d58cd5d4bdcdf68a83e26c
2016-08-23 16:30:38 -07:00
Haik Aftandilian 9de1898bc2 Bug 1290619 - Content sandbox rules should use actual profile directory, not Profiles/*/ regex's; r=jimm
Passes the profile dir to the content process as a -profile CLI
option so that the correct profile dir can be used in the OS X content
sandbox rules.  Only enabled on OS X for now.

On Nightly, profile directories will now be read/write protected
from the content process (apart from a few profile subdirectories) even
when they don't reside in ~/Library.

xpcshell tests invoke the content process without providing a
profile directory. In that case, we don't need to add filesystem
profile dir. read/write exclusion rules to the sandbox.

This patch adds two new macros to the content sandbox rule set:
|profileDir| holds the path to the profile or the emptry string;
|hasProfileDir| is a boolean (1 or 0) that indicates whether or
not the profile directory rules should be added. If |hasProfileDir|
is 0, profile directory exclusion rules don't need to be added
and |profileDir| is not used.

MozReview-Commit-ID: rrTcQwTNdT

--HG--
extra : rebase_source : 3d5b612c8eb3a1d0da028eba277cd9d6f0c9ac00
2016-08-30 13:32:21 -07:00
Gregory Szorc 99515b1b1a Bug 1283203 - Update to Visual Studio 2015 Update 3, SDK 10.14393.0; r=glandium
Visual Studio 2015 Update 3 has been out for a few months. It appears
stable. So let's start using it.

As part of this, we also update the Windows SDK to the version
corresponding with the Windows 10 Anniversary Update (10.14393.0).

MozReview-Commit-ID: C36sRlKqa8t

--HG--
extra : rebase_source : 2fd46d6053d3eaf62dd8b2b291881c5172cc6056
2016-09-09 10:35:15 -07:00
Bob Owen 182a56ac2a Bug 1301034: Log when non-static file policy AddRule calls fail in Windows SandboxBroker. r=jimm
MozReview-Commit-ID: DA5NizLfFfA

--HG--
extra : rebase_source : 23ea76054c98ab071b0d03e5fc0d7e57d1668244
2016-09-12 11:11:22 +01:00
ffxbld 3107c66acb No bug, Automated HPKP preload list update from host bld-linux64-spot-424 - a=hpkp-update 2016-09-10 05:50:42 -07:00
ffxbld e1dae8a80b No bug, Automated HSTS preload list update from host bld-linux64-spot-424 - a=hsts-update 2016-09-10 05:50:40 -07:00
Igor 60cd1e3bb7 Bug 1296180 - Replace more uses of PR_ARRAY_SIZE with mozilla::ArrayLength. r=keeler,mt 2016-09-09 13:17:52 -07:00
Carsten "Tomcat" Book 0f2c669a48 merge mozilla-inbound to mozilla-central a=merge 2016-09-09 12:02:43 +02:00
Phil Ringnalda 4b1303cc59 Back out 1eb6e4e4060f (bug 1296180) for Windows warning-as-error bustage
CLOSED TREE
2016-09-08 23:30:12 -07:00
Igor d42cc2cb4e Bug 1296180 - Replace more uses of PR_ARRAY_SIZE with mozilla::ArrayLengh. r=mt 2016-09-08 22:35:12 -07:00