Граф коммитов

13648 Коммитов

Автор SHA1 Сообщение Дата
Gurzau Raul ac1914ecba Backed out 6 changesets (bug 1421501) for bustages on security/nss/lib/freebl/mpi/mp_comba.c on a CLOSED TREE
Backed out changeset cae4910806c7 (bug 1421501)
Backed out changeset 600a005d3613 (bug 1421501)
Backed out changeset 7381597721d2 (bug 1421501)
Backed out changeset 1ee0d35a041f (bug 1421501)
Backed out changeset 772dea1abb7f (bug 1421501)
Backed out changeset c119767aec7b (bug 1421501)
2018-08-23 17:13:42 +03:00
Robert Helmer 7a1006824c Bug 1421501 - export NSS [Init,Shutdown]Context symbols r=fkiefer
MozReview-Commit-ID: Kmhn1dBSYUD

--HG--
extra : rebase_source : 1deef9e50a578b4ff24f3d44fafe4992838d0ceb
2018-08-09 08:35:48 -07:00
ffxbld 1eb4a76ba4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D4071

--HG--
extra : moz-landing-system : lando
2018-08-23 13:31:44 +00:00
Dipen Patel 1e7897dcaa Bug 1468225 - remove method nsICertificateDialogs.viewCert and its uses. r=Gijs,keeler
- Remove the viewCert method from nsICertificateDialogs
- Remove all associated C++ code
- Directly invoke UI window where it was previous called.
- Update tests

MozReview-Commit-ID: 9b62Go0DjE9

Differential Revision: https://phabricator.services.mozilla.com/D3358

--HG--
extra : moz-landing-system : lando
2018-08-22 17:38:33 +00:00
Gian-Carlo Pascutto ac0adb0b5e Bug 1480755 - Add support for new Mesa device probing. r=jld
MozReview-Commit-ID: CD9ATGHUOZ1

Differential Revision: https://phabricator.services.mozilla.com/D3910

--HG--
extra : moz-landing-system : lando
2018-08-22 01:52:44 +00:00
J.C. Jones 9ddc263762 Bug 1470914 - land NSS d3f512d4f76e UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : b1659503f5e91eae88beb66f129719960303c7fa
2018-08-21 11:07:22 -07:00
Dorel Luca 07c6e76122 Merge mozilla-inbound to mozilla-central. a=merge 2018-08-21 12:54:24 +03:00
Mike Hommey e685fe000f Bug 1341222 - Fix building in-tree NSS against system NSPR. r=froydnj 2018-08-21 07:25:11 +09:00
Haik Aftandilian 25e42d1fc7 Bug 1484051 - Limit Mac Flash sandbox file-access mds rules r=Alex_Gaynor 2018-08-17 15:05:47 -07:00
Dragana Damjanovic ae60f1a2d4 Bug 1480704 - Detect the presents of a MITM. r=mikedeboer,keeler
Bug 1480704 - Detect the presents of a MITM.

Differential Revision: https://phabricator.services.mozilla.com/D2715

--HG--
extra : moz-landing-system : lando
2018-08-17 22:12:17 +00:00
Tiberius Oros 246f2b4fab Merge inbound to mozilla-central. a=merge 2018-08-17 00:32:50 +03:00
Jed Davis c6eafa306d Bug 1480554 - Fix missing include in SandboxOpenedFiles.cpp. r=gcp 2018-08-16 09:15:56 -06:00
Jed Davis 5e630f7ccf Bug 1481978 - Change IPC CloseSuperfluousFds to prevent accidentally heap-allocating closures. r=glandium
Closures are nice but -- as pointed out in bug 1481978 comment #2 --
it's a footgun to take a std::function argument in a context where heap
allocation isn't safe.

Fortunately, non-capturing closures convert to C function pointers,
so a C-style interface with a void* context can still be relatively
ergonomic.
2018-08-15 19:08:40 -06:00
Kai Engert fdf57fee14 Bug 1470914, land NSS beta snapshot 6349fa699c3b UPGRADE_NSS_RELEASE, r=me 2018-08-15 14:42:53 +02:00
Haik Aftandilian fd21ba0b31 Bug 1483058 - [Mac] Camera not accessible by Adobe Flash applets r=Alex_Gaynor
Allow access to services needed for the Flash plugin to access cameras.

Differential Revision: https://phabricator.services.mozilla.com/D3357

--HG--
extra : moz-landing-system : lando
2018-08-14 19:58:12 +00:00
Henri Sivonen 3edc601325 Bug 1402247 - Use encoding_rs for XPCOM string encoding conversions. r=Nika,erahm,froydnj.
Correctness improvements:

 * UTF errors are handled safely per spec instead of dangerously truncating
   strings.

 * There are fewer converter implementations.

Performance improvements:

 * The old code did exact buffer length math, which meant doing UTF math twice
   on each input string (once for length calculation and another time for
   conversion). Exact length math is more complicated when handling errors
   properly, which the old code didn't do. The new code does UTF math on the
   string content only once (when converting) but risks allocating more than
   once. There are heuristics in place to lower the probability of
   reallocation in cases where the double math avoidance isn't enough of a
   saving to absorb an allocation and memcpy.

 * Previously, in UTF-16 <-> UTF-8 conversions, an ASCII prefix was optimized
   but a single non-ASCII code point pessimized the rest of the string. The
   new code tries to get back on the fast ASCII path.

 * UTF-16 to Latin1 conversion guarantees less about handling of out-of-range
   input to eliminate an operation from the inner loop on x86/x86_64.

 * When assigning to a pre-existing string, the new code tries to reuse the
   old buffer instead of first releasing the old buffer and then allocating a
   new one.

 * When reallocating from the new code, the memcpy covers only the data that
   is part of the logical length of the old string instead of memcpying the
   whole capacity. (For old callers old excess memcpy behavior is preserved
   due to bogus callers. See bug 1472113.)

 * UTF-8 strings in XPConnect that are in the Latin1 range are passed to
   SpiderMonkey as Latin1.

New features:

 * Conversion between UTF-8 and Latin1 is added in order to enable faster
   future interop between Rust code (or otherwise UTF-8-using code) and text
   node and SpiderMonkey code that uses Latin1.

MozReview-Commit-ID: JaJuExfILM9
2018-08-14 14:43:42 +03:00
David Keeler d2cf0c7ffc bug 1479918 - fix HSTS update script to only access XHR headers after each request has completed r=sfraser
When the HSTS preload script was reworked to use async/await in bug 1436369,
`fetchstatus` would create an asynchronous xml http request and then attempt to
access a response header from it. However, there was nothing to ensure that the
request had completed before this code ran. This patch ensures that the request
has completed before the response header is used.

This patch also replaces a lingering instance of `Ci.nsISSLStatusProvider` that
should have been changed to `Ci.nsITransportSecurityInfo` in bug 1475647.

Finally, this patch removes the old, redundant getHSTSPreloadList.js in
security/manager/tools as well as the unused nsSTSPreloadList.errors file in
security/manager/ssl.

Differential Revision: https://phabricator.services.mozilla.com/D2807

--HG--
extra : moz-landing-system : lando
2018-08-13 20:25:21 +00:00
David Keeler f9c800c5c1 bug 1460062 - Enforce Symantec distrust in Firefox 63 r=franziskus
This patch implements the Symantec distrust plan on Nightly only for now.

Differential Revision: https://phabricator.services.mozilla.com/D2959

--HG--
extra : moz-landing-system : lando
2018-08-13 14:59:47 +00:00
Martin Thomson 59b2975f6c Bug 1479501 - Disable TLS version fallback, r=ekr
--HG--
extra : source : 91fcd26d7794d96c757a44cdffe6e799ccdc6d3a
extra : amend_source : f72f8d7c6500b3fe825dd24d676558438609e699
2018-08-10 12:10:35 +10:00
ffxbld 6107a2a1fc No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D3490

--HG--
extra : moz-landing-system : lando
2018-08-16 10:57:34 +00:00
Franziskus Kiefer 83ef3e317f Bug 1470914 - land NSS 01d970fe9048 UPGRADE_NSS_RELEASE, r=me 2018-08-10 10:13:05 +02:00
ffxbld 92a9c277ad No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2997
2018-08-09 09:45:18 -04:00
Dipen Patel b78f5b5ec5 Bug 1468224 - remove dialogs from nsIX509CertDB PKCS12File methods. r=keeler
- enhance nsIX509CertDB.importPKCS12File to accept a password and return error code.
- enhance nsIX509CertDB.exportPKCS12File to accept a password and return error code.
- remove password and error prompts being invoked in C++ layer to Javascript layer.
- update unit tests
- add unit test for importing certs with empty string password and no passwords.
- remove unused code

MozReview-Commit-ID: 23ypAzBarOp

--HG--
extra : rebase_source : df608a240c6fa7ce4278145861e57882f0803e02
2018-08-02 20:57:07 -07:00
Kris Maglione 25c94b46d8 Bug 1481021: Part 1 - Fix tests that rely on permissive COWs or SpecialPowers side-effects in frame script scopes. r=bz
Right now, a lot of test code relies on side-effects of SpecialPowers being
loaded into frame script globals. In particular:

- It forces permissive COWs from those scopes, which allows frame scripts to
  pass objects from those scopes to unprivileged content that they otherwise
  wouldn't.
- It imports a bunch of helper modules and WebIDL globals which would
  otherwise not be available.

Fortunately, this seems to only impact test code at this point. But there's a
real down-the-road risk of it impacting shipping code, which ends up working
in automation due to the side-effects of SpecialPowers, but failing in real
world use.

MozReview-Commit-ID: G27eSSOHymX

--HG--
extra : rebase_source : 1702e63fed719fc92def2bdbbb8a7c53572432db
extra : source : 41bedc526dd6ec6b7e8c7be1c832ac60c81d6263
2018-08-07 14:13:06 -07:00
Ciure Andrei 9f8ebbde60 Merge inbound to mozilla-central. a=merge 2018-08-07 00:58:13 +03:00
ffxbld de6c35a6a2 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2771
2018-08-06 15:09:53 -04:00
Franziskus Kiefer 3695d15b7d Bug 1478668 - follow-up fixing error-case returns, r=keeler
--HG--
extra : rebase_source : c2a73c701c68529e0473566b3035b525ff48a932
2018-08-06 11:18:01 +02:00
Masatoshi Kimura 3b21b7868b Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : c09366fb93e5b0f72abe1e99d3094e3d96a934fb
extra : intermediate-source : 5950c9d63c3b4fd63a25464a7b50944aaec7079f
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Narcis Beleuzu 4684ccf98e Merge inbound to mozilla-central. a=merge 2018-08-03 01:28:14 +03:00
David Keeler 23a3da73fa bug 1476473 - disable EV treatment for DocuSign roots r=franziskus
Differential Revision: https://phabricator.services.mozilla.com/D2255

--HG--
extra : moz-landing-system : lando
2018-08-02 07:39:14 +00:00
Cosmin Sabou de8c2bd891 Backed out changeset 5950c9d63c3b (bug 1090497) for build bustages on several files. CLOSED TREE 2018-08-02 19:59:53 +03:00
Masatoshi Kimura feea19030c Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : a62521fdc66def4e4d5d7bf52e68365a786b5c55
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Franziskus Kiefer e279c84c4e Bug 1470914 - land NSS e2a0d66b122f UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 078fe0962637a3888c6a874e2f5d3690ae5aaaab
2018-08-02 12:53:56 +02:00
Noemi Erli 8f66a71e70 Merge inbound to mozilla-central. a=merge 2018-08-02 11:54:46 +03:00
dvarga 956d57e7f2 Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-08-02 01:26:29 +03:00
Nika Layzell 7a9f60fafb Bug 1479484 - Part 1: Add make_dafsa.py to the virtualenv's python path, r=froydnj
Summary:
The plan is to also expose perfecthash.py from this module on the python path.
This also allows us to stop using explicit module loading to load make_dafsa.py.

make_dafsa.py was moved into tools/ to avoid any extra python files from
accidentally ending up on the python path.

Reviewers: froydnj!

Tags: #secure-revision

Bug #: 1479484

Differential Revision: https://phabricator.services.mozilla.com/D2614


--HG--
rename : xpcom/ds/make_dafsa.py => xpcom/ds/tools/make_dafsa.py
2018-08-01 17:54:41 -04:00
David Keeler 249a65b3d3 bug 1433409 - avoid acquiring nsNSSComponent.mMutex when we don't have to r=franziskus
In some cases, nsNSSComponent functions were acquiring nsNSSComponent's mMutex
to check mNSSInitialized to see if it had been initialized. It turns out this is
unnecessary in some cases because those functions are only callable if
nsNSSComponent has been initialized. This fixes those instances and renames
'mNSSInitialized' to 'mNonIdempotentCleanupMustHappen' to make it clear exactly
what that boolean represents.

Differential Revision: https://phabricator.services.mozilla.com/D2577

--HG--
extra : moz-landing-system : lando
2018-08-01 20:56:28 +00:00
ffxbld 6a905af472 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2501
2018-08-01 16:18:31 -04:00
Franziskus Kiefer e6061725f9 Bug 1478668 - windows key store adapter, r=keeler
OS key-store adapter for Windows Credential Manager.
It looks like Windows doesn't allow locking the credential manager without locking the desktop. So `lock` and `unlock` are no-ops here.

Depends on D2487.

Differential Revision: https://phabricator.services.mozilla.com/D2550

--HG--
extra : moz-landing-system : lando
2018-08-01 09:34:59 +00:00
Dorel Luca fa7b36bf43 Backed out changeset e80000bf992c (bug 1478668) for build bustage 2018-08-01 12:26:14 +03:00
Franziskus Kiefer 2b958d46de Bug 1478668 - windows key store adapter, r=keeler
OS key-store adapter for Windows Credential Manager.
It looks like Windows doesn't allow locking the credential manager without locking the desktop. So `lock` and `unlock` are no-ops here.

Depends on D2487.

Differential Revision: https://phabricator.services.mozilla.com/D2550

--HG--
extra : moz-landing-system : lando
2018-08-01 07:52:13 +00:00
Bogdan Tara bd351673a5 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-08-01 01:05:56 +03:00
David Keeler 6cb94e9111 bug 1478667 - implement OS key-store adapter for OS X r=franziskus,spohl
This implements support for OS-backed storage of secrets using the OS X keychain
APIs.

Differential Revision: https://phabricator.services.mozilla.com/D2487

--HG--
extra : moz-landing-system : lando
2018-07-31 20:52:56 +00:00
Jed Davis 09db14abce Bug 1439057 - Tighten /dev/shm access in Linux content sandbox policy. r=gcp
This patch uses the shared memory name prefixes introduced in bug 1447867
to prevent access to /dev/shm files of other applications or other
processes within the same browser instance.

When a shared memory implementation that doesn't use shm_open is available
(specifically, the memfd_create support to be added in bug 1440203),
/dev/shm access is completely denied.

MozReview-Commit-ID: L2ylG5KrXTU
2018-07-31 10:41:29 -06:00
David Keeler 89db979440 bug 1475084 - add tests for tampered COSE signatures in add-ons r=dveditz
Differential Revision: https://phabricator.services.mozilla.com/D2148

--HG--
extra : moz-landing-system : lando
2018-07-30 21:48:53 +00:00
Kris Maglione 031076f2f3 Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : source : fcfb99baa0f0fb60a7c420a712c6ae7c72576871
extra : histedit_source : 5be9b7b29a52a4b8376ee0bdfc5c08b12e3c775a
2018-05-21 16:58:23 -07:00
Kris Maglione 02ba563399 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : source : 0d69b4fb1ed43751cfcbc0b4f2fe3b6a49bc0494
extra : histedit_source : d0ce31513ffaae2fd7f01f6567a97b6d2d96b797%2Cfff837de7a00fa90809d2c3e755097180dfd56d8
2018-05-20 18:10:16 -07:00
Narcis Beleuzu 561ccb2ceb Backed out 2 changesets (bug 1463016, bug 1463291) for geckoview failures
Backed out changeset fcfb99baa0f0 (bug 1463291)
Backed out changeset 0d69b4fb1ed4 (bug 1463016)
2018-07-29 03:55:23 +03:00
Kris Maglione cb1ee1e34d Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : rebase_source : a13c59d1a5ed000187c7fd8e7339408ad6e2dee6
2018-05-21 16:58:23 -07:00
Kris Maglione 636f1839e5 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : rebase_source : 36565ef5e74360aad14062005e5bdab2939e888b
2018-05-20 18:10:16 -07:00