Граф коммитов

3060 Коммитов

Автор SHA1 Сообщение Дата
Phil Ringnalda 9c92a69a82 Merge autoland to m-c, a=merge 2016-10-01 14:00:21 -07:00
ffxbld 20d52ee5f4 No bug, Automated HPKP preload list update from host bld-linux64-spot-316 - a=hpkp-update 2016-10-01 05:51:40 -07:00
ffxbld eddc6a1d95 No bug, Automated HSTS preload list update from host bld-linux64-spot-316 - a=hsts-update 2016-10-01 05:51:37 -07:00
Cykesiopka 8b1a108f37 Bug 1304587 - Avoid using types that correspond to char/char16_t strings in PKCS #11 IDL files. r=keeler
Typically, the interfaces involved don't need to use raw char/char16_t strings,
and hence can benefit from the additional safety of using the Mozilla string
classes.

In some places, this patch also changes some UTF-16 APIs to UTF-8 where the
implementations can never actually support UTF-16. This reduces the amount of
code and runtime conversion.

MozReview-Commit-ID: y8o5wLBohe

--HG--
extra : rebase_source : 130c8b77a98d21d5b9a0efeccae8861d89fa8f02
2016-10-01 00:46:13 +08:00
Cykesiopka 9a3244d164 Bug 1305531 - Add test cases to test_sdr.js to ensure recommended way of using encryptString() and decryptString() works. r=keeler
MozReview-Commit-ID: 5vPxUZyzGSz

--HG--
extra : rebase_source : 6aba7627e3c0c79ea633933ce7f140c20b16c9d9
2016-10-01 09:29:29 +08:00
Cykesiopka e95a6f224a Bug 1305531 - Use ACString instead of AUTF8String in nsISecretDecoderRing.idl to unbreak decrypting saved usernames and passwords. r=keeler
Bug 1275841 switched some IDL types from "string" to "AUTF8String".
This had the unintentional effect of breaking decryption of previously saved
passwords that contained special characters.

In particular, the AUTF8String type means XPConnect may convert any strings
using that type to UTF-16 when crossing XPConnect boundaries.
However, crypto-SDR.js (responsible for encrypting and decrypting for the
password manager) expects to do conversions between UTF-16 and UTF-8 itself.
What ends up happening is crypto-SDR.js decrypts a saved password and tries to
convert from UTF-8 to UTF-16, but fails because the decrypted text is already
UTF-16.

The solution is to use ACString instead of AUTF8String. ACString does not result
in automatic encoding changes, so the expectations of crypto-SDR.js are met
again, and lets SecretDecoderRing.cpp keep the benefit of working with smart
string types.

This change probably breaks passwords saved after Bug 1275841 landed and before
this patch landed, but the number of passwords this patch breaks is probably
much lower than the number of passwords that would be broken if this patch did
not land.

MozReview-Commit-ID: 6Z01zfwJ6t7

--HG--
extra : rebase_source : 514e78f2e1c2cef3b3692656b20daf3b068a4fee
2016-10-01 09:29:28 +08:00
David Keeler 8d6b6a78fe bug 1243923 - add support for the CA/Browser Forum EV OID r=Cykesiopka,jcj
MozReview-Commit-ID: 4zqzistEhvo

--HG--
extra : rebase_source : 62d28c3715fcb225ec83ba422621dd3f8c40f708
2016-09-02 16:39:15 -07:00
David Keeler a0181b703e Bug 1305422 - part 15 - don't call size_forward in nsPKCS12Blob; r=mgoodwin,nfroyd
Before this patch, nsPKCS12Blob::digest_read used size_forward to perform a size
check on a buffer. However, the entire set of {digest_open, digest_close,
digest_read, digest_write} was unnecessary because NSS provides this
functionality by default when using SEC_PKCS12DecoderStart. This patch
simplifies things by removing the extraneous implementations.
2016-09-29 19:33:57 -07:00
Carsten "Tomcat" Book 5b45193594 merge mozilla-inbound to mozilla-central a=merge 2016-09-29 11:44:58 +02:00
Martin Thomson 9ddbbc7158 Bug 1306003 - Enable P-521, r=ekr,rbarnes
MozReview-Commit-ID: 1oF98CACtQV

--HG--
extra : rebase_source : 61c6a4c87a5de305e7701654a3c5e7ecdacc75de
2016-09-29 10:40:40 +10:00
Carsten "Tomcat" Book 572e74ee99 merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Carsten "Tomcat" Book 762cd18602 Merge mozilla-central to autoland 2016-09-28 16:52:13 +02:00
Masatoshi Kimura 5169b351fb Bug 1305561 - Do not check renego extension when TLS version is 1.3. r=keeler
MozReview-Commit-ID: JtT6hLcbl3W

--HG--
extra : rebase_source : 32e1e28bad773bd7333468b6f93d01cc05ab4321
extra : source : faaf8817705900a1134e2be7bc9c349a33e670aa
2016-09-27 20:06:22 +09:00
Sergei Chernov 976d5c3f1d Bug 1293231 - Certificate Transparency - basic telemetry reports; r=Cykesiopka,keeler
MozReview-Commit-ID: EGvuZADObJo

--HG--
extra : rebase_source : 9a059c9f8e2fdf9bfc693b0b5649808b1beeb67b
2016-08-11 13:41:50 +03:00
Martin Thomson 6158ad648f Bug 1304926 - Enable specific named groups, r=keeler
MozReview-Commit-ID: KIe6D9iRAXt

--HG--
extra : rebase_source : a8f6d712b59bf373e52a88b8451c8db4a3f71d65
extra : amend_source : 071e9f4c3ebe336af3888b76e778d0d753d326fc
2016-09-26 15:06:42 +10:00
EKR bf2bd2813c Bug 1304919 - PSM changes to support TLS 1.3 key exchange, r=mt
MozReview-Commit-ID: 1GMk8PajbHj

--HG--
extra : rebase_source : 3a5ee2f04595b54fc50b84b8e9c4196f31adb1f0
extra : source : b54d608edfa874dfd3d8305e771490a4b25cf641
2016-09-23 14:27:29 +10:00
ffxbld 3c8aea1193 No bug, Automated HPKP preload list update from host bld-linux64-spot-389 - a=hpkp-update 2016-09-24 06:03:53 -07:00
ffxbld 45fdba1af2 No bug, Automated HSTS preload list update from host bld-linux64-spot-389 - a=hsts-update 2016-09-24 06:03:51 -07:00
David Keeler b1cb7643ef bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
MozReview-Commit-ID: 2uwHPxk0VhZ

--HG--
extra : rebase_source : 1c7b5d2559139fa8286342decf4e4f7c83317e29
2016-09-14 15:11:15 -07:00
Sebastian Hengst d8888f81d1 Backed out changeset 2df66e8b7411 (bug 1302140) for Windows build bustage in CertVerifier.cpp. r=backout on a CLOSED TREE 2016-09-21 20:47:08 +02:00
David Keeler d374bc442a bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
MozReview-Commit-ID: 2uwHPxk0VhZ

--HG--
extra : rebase_source : 5b1342abc2eb260ec91464b3a1d331baf8968460
2016-09-14 15:11:15 -07:00
ffxbld 653cac986e No bug, Automated HPKP preload list update from host bld-linux64-spot-593 - a=hpkp-update 2016-09-17 05:55:01 -07:00
ffxbld 873ec403ea No bug, Automated HSTS preload list update from host bld-linux64-spot-593 - a=hsts-update 2016-09-17 05:54:58 -07:00
David Keeler 2b1cac9df4 bug 1299676 - introduce der.jsm as a minimal js ASN.1 DER decoder r=Cykesiopka,jcj
MozReview-Commit-ID: 29oNa3S3s6a

--HG--
extra : rebase_source : 6e55bc8a105d480d33d58cd5d4bdcdf68a83e26c
2016-08-23 16:30:38 -07:00
ffxbld 3107c66acb No bug, Automated HPKP preload list update from host bld-linux64-spot-424 - a=hpkp-update 2016-09-10 05:50:42 -07:00
ffxbld e1dae8a80b No bug, Automated HSTS preload list update from host bld-linux64-spot-424 - a=hsts-update 2016-09-10 05:50:40 -07:00
Cykesiopka 80c7f24081 Bug 1274135 - Replace char_ptr_cast() and uint8_t_ptr_cast() with mozilla::BitwiseCast. r=keeler,valentin
The functions aren't necessary now that we have BitwiseCast.

MozReview-Commit-ID: 2nzOuwAop4Y

--HG--
extra : rebase_source : 0cb2c16f484a81b2e77384564973b58ac2d10fb9
2016-09-08 20:46:26 +08:00
Wes Kocher ac33516b3c Merge m-c to autoland, a=merge 2016-09-07 18:07:50 -07:00
Ryan VanderMeulen 57d3c61d9b Backed out changeset db5d2a3899c0 (bug 1274135) for bustage. 2016-09-07 20:52:18 -04:00
Cykesiopka 0193f94d53 Bug 1274135 - Replace char_ptr_cast() and uint8_t_ptr_cast() with mozilla::BitwiseCast. r=keeler,valentin
The functions aren't necessary now that we have BitwiseCast.

MozReview-Commit-ID: 2nzOuwAop4Y

--HG--
extra : rebase_source : 196449249eec75b8eb10e59662231c3f4e83c268
2016-09-01 15:58:51 +08:00
Michael Layzell 36e08437d0 Bug 1018486 - Part 8: Various other changes, r=smaug
MozReview-Commit-ID: B0dsomkWgEk
2016-09-07 10:50:45 -04:00
David Keeler 4398285f58 bug 1301157 - remove nsPSMBackgroundThread (dead code) r=jcj
As of bug 1284946, nothing uses nsPSMBackgroundThread, so it's just dead code
that is removed by this patch.

MozReview-Commit-ID: 24HWFHIeCX9

--HG--
extra : rebase_source : 0cdf572fa2b742d9a78b6f099d8a2cf465813ccb
2016-09-07 12:43:27 -07:00
Cykesiopka 63654161d3 Bug 1252385 - Remove unused nsNSSCertTrust methods. r=mgoodwin
MozReview-Commit-ID: 4vcFlcv5FJo

--HG--
extra : transplant_source : %EB%CC%1ARI%AE%B0%D0L%EF%CE7L%91%C43%92%22%B9%2B
2016-09-03 22:47:20 +08:00
Cykesiopka 2e47d34ebc Bug 1256302 - Remove CertVerifier::InitCertVerifierLog(). r=jcj 2016-09-02 10:45:47 +02:00
Nicholas Nethercote 742fc7eb48 Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:

  nsAutoCString spec;
  uri->GetSpec(spec);
  printf("uri: %s", spec.get());

to be changed to this:

  printf("uri: %s", uri->GetSpecOrDefault().get());

This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.

I will fold this into part 1 before landing.

--HG--
extra : rebase_source : ddc19a5624354ac098be019ca13cc24b99b80ddc
2016-08-26 16:02:31 +10:00
David Keeler abc60241f8 bug 1290613 - test_ev_certs.js cleanup r=Cykesiopka,mgoodwin
MozReview-Commit-ID: KcCV161J3qV

--HG--
rename : security/manager/ssl/tests/unit/test_ev_certs/ev-valid-anypolicy-int.pem => security/manager/ssl/tests/unit/test_ev_certs/anyPolicy-int-path-ee.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/ev-valid-anypolicy-int.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/anyPolicy-int-path-ee.pem.certspec
rename : security/manager/ssl/tests/unit/test_ev_certs/int-ev-valid-anypolicy-int.pem => security/manager/ssl/tests/unit/test_ev_certs/anyPolicy-int-path-int.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/int-ev-valid-anypolicy-int.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/anyPolicy-int-path-int.pem.certspec
rename : security/manager/ssl/tests/unit/test_ev_certs/no-ocsp-url-cert.pem => security/manager/ssl/tests/unit/test_ev_certs/no-ocsp-ee-path-ee.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/no-ocsp-url-cert.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/no-ocsp-ee-path-ee.pem.certspec
rename : security/manager/ssl/tests/unit/test_ev_certs/non-ev-root.pem => security/manager/ssl/tests/unit/test_ev_certs/non-ev-root-path-ee.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/non-ev-root.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/non-ev-root-path-ee.pem.certspec
rename : security/manager/ssl/tests/unit/test_ev_certs/int-non-ev-root.pem => security/manager/ssl/tests/unit/test_ev_certs/non-ev-root-path-int.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/int-non-ev-root.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/non-ev-root-path-int.pem.certspec
rename : security/manager/ssl/tests/unit/test_ev_certs/ev-valid.pem => security/manager/ssl/tests/unit/test_ev_certs/test-oid-path-ee.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/ev-valid.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/test-oid-path-ee.pem.certspec
rename : security/manager/ssl/tests/unit/test_ev_certs/int-ev-valid.key => security/manager/ssl/tests/unit/test_ev_certs/test-oid-path-int.key
rename : security/manager/ssl/tests/unit/test_ev_certs/int-ev-valid.key.keyspec => security/manager/ssl/tests/unit/test_ev_certs/test-oid-path-int.key.keyspec
rename : security/manager/ssl/tests/unit/test_ev_certs/int-ev-valid.pem => security/manager/ssl/tests/unit/test_ev_certs/test-oid-path-int.pem
rename : security/manager/ssl/tests/unit/test_ev_certs/int-ev-valid.pem.certspec => security/manager/ssl/tests/unit/test_ev_certs/test-oid-path-int.pem.certspec
extra : rebase_source : 4a84a44616a396ae484550fcfcaf0df5e533dd51
2016-08-01 17:01:27 -07:00
David Keeler dcd144713e bug 1290613 - remove unnecessary invalidIdentities parameter from startOCSPResponder r=Cykesiopka
MozReview-Commit-ID: KBiRbkLllmu

--HG--
extra : rebase_source : 3332140b7944b3115c2b20fc6688ccd55e04f6e8
2016-08-03 15:01:50 -07:00
ffxbld 21ac721516 No bug, Automated HPKP preload list update from host bld-linux64-spot-561 - a=hpkp-update 2016-08-27 05:56:54 -07:00
ffxbld a2da90fae1 No bug, Automated HSTS preload list update from host bld-linux64-spot-561 - a=hsts-update 2016-08-27 05:56:51 -07:00
Ryan VanderMeulen 69113163cf Merge m-c to inbound. a=merge 2016-08-24 09:09:05 -04:00
David Keeler de93e5e361 bug 1296619 - add a test to ensure that prompting for the master password probably works r=Cykesiopka
MozReview-Commit-ID: 5p5Pn5Mk1km

--HG--
extra : rebase_source : e6ca122e4000048aad6fcde377ae25c51ece343f
2016-08-18 15:31:56 -07:00
Cykesiopka ba96e52654 Bug 1296219 - Use the Mozilla Base64 functions instead of the NSPR ones in PSM. r=keeler
NSPR should generally be avoided in favour of modern C++ code.

This patch does not convert uses of the NSS Base64 functions. It does however
take the opportunity to switch over some IDL functions to use the safer Mozilla
string classes, and fixes Bug 1251050 along the way.

MozReview-Commit-ID: CM8g9DzIcnC

--HG--
extra : rebase_source : 9d07db1bcefc9d9ed6a1f7e102f5c01bd9caa522
2016-08-23 13:29:15 +08:00
Cykesiopka a16f7b0f6a Bug 1296316 - Convert nsNSSShutDownObject::CalledFromType to an enum class. r=mgoodwin
enum classes are in general safer than plain enums, and as such should be
preferred.

MozReview-Commit-ID: 1FK89SNhdk4

--HG--
extra : rebase_source : 764c4855026c02d8c9e33ca33637fec54ea5ca31
2016-08-20 23:00:19 +08:00
Dragana Damjanovic 3cf6ee23d9 Bug 1264578 - NSS support for http with TLS 1.3. r=keeler
--HG--
extra : rebase_source : 26b322f6d6f8e0160087c5214024dc9cccd328f9
2016-08-19 05:01:00 -04:00
Kan-Ru Chen b6d880aca1 Bug 1297276 - Rename mfbt/unused.h to mfbt/Unused.h for consistency. r=froydnj
The patch is generated from following command:

  rgrep -l unused.h|xargs sed -i -e s,mozilla/unused.h,mozilla/Unused.h,

MozReview-Commit-ID: AtLcWApZfES


--HG--
rename : mfbt/unused.h => mfbt/Unused.h
2016-08-24 14:47:04 +08:00
Wes Kocher bb22cc4067 Merge inbound to central, a=merge 2016-08-19 18:16:20 -07:00
Cykesiopka a2072b8e93 Bug 1275841 - Make nsISecretDecoderRing.idl encryptString() and decryptString() use the Mozilla string classes. r=keeler
The Mozilla string classes don't require manual memory management and
automatically keep track of length, making them a safer choice than raw C
strings.

MozReview-Commit-ID: EwCiiP9EhDr

--HG--
extra : transplant_source : %05%D4%B6s%C1%DBye%2C3%C3%85%DB%22%91h%B4%27%E1l
2016-08-19 09:37:48 +08:00
Cykesiopka a120c3d754 Bug 1275841 - Remove unnecessary methods and interfaces from nsISecretDecoderRing.idl. r=keeler
1. encrypt() and decrypt() are C++ only.
The only callers are in SecretDecoderRing.cpp, and binary add-ons aren't
supported anymore. So, there is no need for these methods to be defined in the
IDL, and they should be treated as private to the nsISecretDecoderRing
implementation.

2. nsISecretDecoderRingConfig has never been implemented.
The interface and implementation are currently just bloat. If there is a need
for specifying the window for prompts in the future, a better way can be devised
then.

MozReview-Commit-ID: 1wXCDTIBJA2

--HG--
extra : transplant_source : %D7%27%5E3%BF%E9%16%0E%A3%8B%E1%8E%ADj%3F%25%B3i%9Al
2016-08-19 09:37:43 +08:00
Cykesiopka 1f4d5333d5 Bug 1275841 - Move nsISecretDecoderRing.idl from netwerk/ to security/manager/ssl. r=mcmanus
The interfaces defined within have basically nothing to do with Necko.

MozReview-Commit-ID: 5J4D3w61Yry

--HG--
rename : netwerk/base/nsISecretDecoderRing.idl => security/manager/ssl/nsISecretDecoderRing.idl
extra : transplant_source : %AAP%26%5D%DE%ED%F6Q%C4%5Eia%F1%84T%8D%A7E%8Aw
2016-08-19 09:37:38 +08:00