Граф коммитов

10632 Коммитов

Автор SHA1 Сообщение Дата
Haik Aftandilian 871aa1294d Bug 1307573 - Remove unused system.sb mach-lookups from OS X content sandbox; r=jimm
MozReview-Commit-ID: JDnLDbYs2IV

--HG--
extra : rebase_source : cba1eb50169fdb6d50ad8c900c98c8855cc71793
2016-10-03 17:11:01 -07:00
Gian-Carlo Pascutto f0dece11a4 Bug 1308564 - Tie logging to MOZ_SANDBOX_VERBOSE instead of DEBUG. r=jld
MozReview-Commit-ID: JHIzIvbjA0Q

--HG--
extra : rebase_source : bb5652209a3fdb9e5cccb6c3cc4058fd74173fd1
2016-10-07 21:33:12 +02:00
Gian-Carlo Pascutto f255eedb86 Bug 1308851 - Open up devices for NVIDIA proprietary driver in the sandbox. r=jld
MozReview-Commit-ID: 5OMRNSPBbe1

--HG--
extra : rebase_source : bb554a1f72a9e6bbde9250542989f5c34dfe7267
2016-10-10 20:51:21 +02:00
Cykesiopka 275d94abd0 Bug 1296317 - Stop calling PR_SetError() in VerifyCert() and VerifySSLServerCert(). r=keeler
The PR_SetError() + PR_GetError() pattern currently used is error prone and
unnecessary. The functions involved can instead return mozilla::pkix::Result,
which is equally expressive and more robust.

MozReview-Commit-ID: Hkd39eqTvds

--HG--
extra : rebase_source : f09e37c6a3a930c30cce003139df86bc84d771ee
2016-10-10 15:44:41 +08:00
Carsten "Tomcat" Book 401922b6ce Backed out changeset 1f6f908368e5 (bug 1305289) for gtest failures 2016-10-10 09:33:01 +02:00
Sergei Chernov 0449e02200 Bug 1305289 - Certificate Transparency - basic UI indicator; r=Dolske,keeler
MozReview-Commit-ID: b0SUW2WNJT

--HG--
extra : rebase_source : 893d9945de71004ccda3222782273ad953d8a598
2016-09-28 20:19:56 +03:00
Phil Ringnalda 9251041b3b Merge autoland to m-c, a=merge
MozReview-Commit-ID: 8JQRDBBl2l8
2016-10-08 16:47:23 -07:00
ffxbld ba04bb95b6 No bug, Automated HPKP preload list update from host bld-linux64-spot-307 - a=hpkp-update 2016-10-08 14:26:37 -07:00
ffxbld ad799ee214 No bug, Automated HSTS preload list update from host bld-linux64-spot-307 - a=hsts-update 2016-10-08 14:26:35 -07:00
Gian-Carlo Pascutto 5810afce39 Bug 1308568 - Add missing filesystem calls to Allow in case broker is disabled. r=haik
MozReview-Commit-ID: 6AdKbBH0NMh

--HG--
extra : rebase_source : aaf58affb124719b3d65dc819d98e7227abff8ec
2016-10-07 22:09:57 +02:00
Cykesiopka a4fb559557 Bug 1308132 - Use std::unique_ptr instead of mozilla::UniquePtr as the underlying type for ScopedNSSTypes.h UniqueX types.
MozReview-Commit-ID: IAaBhPTjZft

--HG--
extra : rebase_source : 1675da2e63b222dd7ea9ee9d481fb9c04a490d1a
extra : histedit_source : 23fbbd8c96c7d014d57591579a44c666b9197362
2016-10-06 17:01:58 +08:00
Cykesiopka ff965dc7b2 Bug 1305930 - Stop using PL_strnlen() in PSM.
strnlen() is available on all the platforms we care about, so we should use that
instead.

MozReview-Commit-ID: H3ac5AHiRJk

--HG--
extra : rebase_source : 911f292e97facf5807a1bc1654bdbc1fab87c8bc
extra : histedit_source : 17ff8322acc90bb88efd428aab1e0e0fc785ed61
2016-10-05 00:32:23 +08:00
Cykesiopka 1d6f642d9d Bug 1186286 - Consult more than just the CN when deleting a cert so it's always clear what's being deleted. r=mgoodwin
Deleting certs via the cert manager results in a confirmation dialog popping up.
This dialog contains a list of certs that were selected for deletion.

Currently, only the Common Name of each cert is used to represent it in the list.
This is a problem for certs that don't have a CN. More jarringly, the cert
manager itself falls back to various other attributes, so for example selecting
a cert that is represented by its OU ends up popping up a dialog where an empty
list is shown.

MozReview-Commit-ID: 3z4BebW8Ucd

--HG--
extra : rebase_source : 468eb3de470e3ec42471c80183a9c48ebfb130c9
extra : histedit_source : 90e1d2fc73aaba4ded68d933b6ea3a6092d60636
2016-10-07 20:14:27 +08:00
Cykesiopka 77d242f817 Bug 1186286 - Move some code around to facilitate code reuse for the subsequent patch. r=mgoodwin
The existing code in head.js is moved out because it doesn't need to be there
now, and probably not in the near future.

MozReview-Commit-ID: GWUW9wT3fzF

--HG--
extra : rebase_source : b7ba2a621df205bda8bdb0cbd493a22ce49a705f
extra : histedit_source : e9094261bc717ffd0a320b180fba4aab21122fa4
2016-10-07 20:11:35 +08:00
Phil Ringnalda ef58a75ffd Merge m-c to autoland 2016-10-06 20:24:09 -07:00
Phil Ringnalda fd7b7476c2 Merge m-i to m-c, a=merge
MozReview-Commit-ID: 93ZdJbK1x05
2016-10-06 19:58:18 -07:00
Gian-Carlo Pascutto bbcb394669 Bug 1289718 - Clean up stat/stat64 wrapper. Deal with non-default TMPDIR. r=jld
MozReview-Commit-ID: DW63be9qd3z

--HG--
extra : rebase_source : 0a1860c70a631b24bcafecb4946c044148536004
2016-10-06 13:25:13 +02:00
Gian-Carlo Pascutto f3a1ed7502 Bug 1289718 - Extend sandbox file broker to handle paths, support more syscalls. r=jld,tedd
MozReview-Commit-ID: DW415ABoaeN
MozReview-Commit-ID: cXrlXNlEwh
MozReview-Commit-ID: CIX6d7td6Bc
MozReview-Commit-ID: DCQ9DGBBjm4
MozReview-Commit-ID: BOYSSof3t7
MozReview-Commit-ID: LmsTqv0GzC2
MozReview-Commit-ID: HOWR0HEHmMg
MozReview-Commit-ID: 6IzqdrUP7lD
MozReview-Commit-ID: 6r6sqOVekVu
MozReview-Commit-ID: 5FL2WkhIxFx
MozReview-Commit-ID: CcTyHn76p46
MozReview-Commit-ID: F8erB4Tvn2V
MozReview-Commit-ID: D9m10t0Rodc
MozReview-Commit-ID: I1llpEBgDP6

--HG--
extra : rebase_source : 1d50d5b7a9936c76decdf268a4e66e34ee7b200c
2016-09-27 17:25:06 +02:00
Cykesiopka ca5051d9c8 Bug 1296214 - Stop storing handle to CERTCertificate in ExtendedValidation.cpp. r=keeler
This may save us some memory and reduce the number of static constructors.

MozReview-Commit-ID: FNIkiFtRjfK

--HG--
extra : rebase_source : d2781f11db7a1f8370c0e6c6c8e6f0fb52122614
2016-10-06 16:43:45 +08:00
Franziskus Kiefer dc37f9c34a Bug 1305970 - land NSS 0x6b3812492e71, r=me
--HG--
extra : rebase_source : c08070e4b100c8a9d9a648cdf4d0cb3e16c2c86f
2016-10-05 17:52:14 +02:00
Carsten "Tomcat" Book 3522f1d38a merge mozilla-inbound to mozilla-central a=merge 2016-10-05 15:42:48 +02:00
Bob Owen 61b439db23 Bug 1307375: Add the use of MOZ_LOG to windows sandbox logging. r=jimm 2016-10-05 08:10:46 +01:00
Wes Kocher 5a2fb874ca Merge inbound to central, a=merge 2016-10-04 17:32:01 -07:00
Tom Schuster 774a8bf34d Bug 1302163 - Change code to use SprintfLiteral instead of snprintf. r=ehsan 2016-10-04 17:57:51 +02:00
Cykesiopka ebfb27c403 Bug 1142350 - Remove nsIUserCertPicker, nsICertPickDialogs and associated code from mozilla-central. r=keeler
The code is used in comm-central, but is unused in mozilla-central. It will be
imported into comm-central in Bug 1297368.

MozReview-Commit-ID: BEY9BR0YRiD

--HG--
extra : rebase_source : 6d34c1e82cd749a009f26be50fde0537373f2f9e
2016-09-21 19:34:12 +08:00
Wes Kocher b4e6b8fba5 Merge m-c to autoland, a=merge 2016-10-04 17:42:48 -07:00
Franziskus Kiefer eb4364e341 Bug 1305970 - land NSS 0xe7553afc7665, r=me
--HG--
extra : rebase_source : ab9c9f3eaa86da51eb3a498535f9ff4b7777b7d6
2016-10-04 07:59:19 +02:00
David Keeler ee56723139 bug 1304188 - introduce X509.jsm r=Cykesiopka,jcj
This is mostly a preliminary review request, although I think everything that
should be done in this bug is present. This intentionally does not include
support for decoding extensions or subject public keys.

MozReview-Commit-ID: 4ewu66Xx411

--HG--
extra : rebase_source : 6105cf16e46d5d2cc9355cf38f8d0098a8a40462
2016-09-20 15:36:25 -07:00
Haik Aftandilian 4f170e903e Bug 1307282 - Remove redundant read-metadata rights from the content sandbox; r=gcp
MozReview-Commit-ID: CILCWk4nINs

--HG--
extra : rebase_source : b3d738365a978505fdbc5ba0a94de62a8824e2f2
2016-09-30 11:59:48 -07:00
Haik Aftandilian bef74339e5 Bug 1307282 - Remove unused sandbox ruleset macros; r=gcp
MozReview-Commit-ID: A7x55tDN4b9

--HG--
extra : rebase_source : 52ef8da1bf9df868c3f9cc0cbdfdee2147425454
2016-09-28 16:37:52 -07:00
Ryan VanderMeulen e980397fb4 Merge m-c to autoland. a=merge 2016-10-07 23:22:46 -04:00
David Keeler a80e2f28a3 bug 1289865 - look in more registry locations for enterprise roots r=Cykesiopka,mhowell
This adds the following locations:
HKLM\SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificates
HKLM\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates
to the location that was already being searched, which is:
HKLM\SOFTWARE\Microsoft\SystemCertificates

MozReview-Commit-ID: LGOT4YNEqLV

--HG--
extra : rebase_source : 735230f03b4e9b94f350cdbd3930b68975824458
2016-10-06 16:14:06 -07:00
Sebastian Hengst c96a2d24c7 Backed out changeset 9887bfe1f8fa (bug 1308568) on request of its developer. r=backout 2016-10-07 22:07:47 +02:00
Gian-Carlo Pascutto ad0af05265 Bug 1308568 - Add missing filesystem calls to Allow in case broker is disabled. r=haik
MozReview-Commit-ID: 6AdKbBH0NMh

--HG--
extra : rebase_source : 5b9eb1e2668d6490bf6688d14e61c2c359f46b50
2016-10-07 20:58:11 +02:00
Sebastian Hengst fd0ca58e46 No bug - Fix eslint warnings which popped up with delay. r=eslint-fix 2016-10-07 16:58:58 +02:00
Mark Goodwin 19e1ce84e0 Bug 1306471 - Modify the SiteSecurityService to allow dynamic pin preloads r=keeler
MozReview-Commit-ID: JLbJcMuvcyI

--HG--
extra : rebase_source : fec1e75d3ca35d17d71d797e46c45983aaeb0c12
2016-10-06 11:00:43 +01:00
Phil Ringnalda 9c92a69a82 Merge autoland to m-c, a=merge 2016-10-01 14:00:21 -07:00
ffxbld 20d52ee5f4 No bug, Automated HPKP preload list update from host bld-linux64-spot-316 - a=hpkp-update 2016-10-01 05:51:40 -07:00
ffxbld eddc6a1d95 No bug, Automated HSTS preload list update from host bld-linux64-spot-316 - a=hsts-update 2016-10-01 05:51:37 -07:00
Cykesiopka 8b1a108f37 Bug 1304587 - Avoid using types that correspond to char/char16_t strings in PKCS #11 IDL files. r=keeler
Typically, the interfaces involved don't need to use raw char/char16_t strings,
and hence can benefit from the additional safety of using the Mozilla string
classes.

In some places, this patch also changes some UTF-16 APIs to UTF-8 where the
implementations can never actually support UTF-16. This reduces the amount of
code and runtime conversion.

MozReview-Commit-ID: y8o5wLBohe

--HG--
extra : rebase_source : 130c8b77a98d21d5b9a0efeccae8861d89fa8f02
2016-10-01 00:46:13 +08:00
Cykesiopka 9a3244d164 Bug 1305531 - Add test cases to test_sdr.js to ensure recommended way of using encryptString() and decryptString() works. r=keeler
MozReview-Commit-ID: 5vPxUZyzGSz

--HG--
extra : rebase_source : 6aba7627e3c0c79ea633933ce7f140c20b16c9d9
2016-10-01 09:29:29 +08:00
Cykesiopka e95a6f224a Bug 1305531 - Use ACString instead of AUTF8String in nsISecretDecoderRing.idl to unbreak decrypting saved usernames and passwords. r=keeler
Bug 1275841 switched some IDL types from "string" to "AUTF8String".
This had the unintentional effect of breaking decryption of previously saved
passwords that contained special characters.

In particular, the AUTF8String type means XPConnect may convert any strings
using that type to UTF-16 when crossing XPConnect boundaries.
However, crypto-SDR.js (responsible for encrypting and decrypting for the
password manager) expects to do conversions between UTF-16 and UTF-8 itself.
What ends up happening is crypto-SDR.js decrypts a saved password and tries to
convert from UTF-8 to UTF-16, but fails because the decrypted text is already
UTF-16.

The solution is to use ACString instead of AUTF8String. ACString does not result
in automatic encoding changes, so the expectations of crypto-SDR.js are met
again, and lets SecretDecoderRing.cpp keep the benefit of working with smart
string types.

This change probably breaks passwords saved after Bug 1275841 landed and before
this patch landed, but the number of passwords this patch breaks is probably
much lower than the number of passwords that would be broken if this patch did
not land.

MozReview-Commit-ID: 6Z01zfwJ6t7

--HG--
extra : rebase_source : 514e78f2e1c2cef3b3692656b20daf3b068a4fee
2016-10-01 09:29:28 +08:00
David Keeler 8d6b6a78fe bug 1243923 - add support for the CA/Browser Forum EV OID r=Cykesiopka,jcj
MozReview-Commit-ID: 4zqzistEhvo

--HG--
extra : rebase_source : 62d28c3715fcb225ec83ba422621dd3f8c40f708
2016-09-02 16:39:15 -07:00
David Keeler a0181b703e Bug 1305422 - part 15 - don't call size_forward in nsPKCS12Blob; r=mgoodwin,nfroyd
Before this patch, nsPKCS12Blob::digest_read used size_forward to perform a size
check on a buffer. However, the entire set of {digest_open, digest_close,
digest_read, digest_write} was unnecessary because NSS provides this
functionality by default when using SEC_PKCS12DecoderStart. This patch
simplifies things by removing the extraneous implementations.
2016-09-29 19:33:57 -07:00
Carsten "Tomcat" Book 5b45193594 merge mozilla-inbound to mozilla-central a=merge 2016-09-29 11:44:58 +02:00
Franziskus Kiefer 27936d1ae9 Bug 1305970 - land NSS 0x233a44e96b22, r=me
--HG--
extra : amend_source : ba5ab6511baabb43e260faa7a5705c48dea908c4
2016-09-29 07:59:34 +02:00
Martin Thomson 9ddbbc7158 Bug 1306003 - Enable P-521, r=ekr,rbarnes
MozReview-Commit-ID: 1oF98CACtQV

--HG--
extra : rebase_source : 61c6a4c87a5de305e7701654a3c5e7ecdacc75de
2016-09-29 10:40:40 +10:00
Haik Aftandilian c7963e7731 Bug 1284588 - OS X: Disable content process write access to user files in the home directory; r=gcp
Changes the semantics of the security.sandbox.content.level pref on OS X with
respect to file access to the user's home directory. With the fix, Nightly
defaults to 2 while other releases will default to 1. The level values now
have the following meaning.

*) security.sandbox.content.level=0 disables content process sandboxing.
No change here.

*) security.sandbox.content.level=1 blocks write access to the majority of the
home directory.

*) security.sandbox.content.level=2 includes the write access blocking in
level 1, but also blocks both read and write access to ~/Library and $PROFILE
excluding the extensions and weave subdirectories.

Prior to this fix, Nightly defaulted to a value of 1 while all other releases
used 0. The value of 1 meant that read/write access to ~/Library and the
$PROFILE dir (excluding $PROFILE/{extensions,weave}) was prevented.

The strength of a level=1 sandbox is reduced by this with fix,
but level=1 becomes the first ride-the-trains content sandbox candidate,
Nightly changes to level=2, and higher levels still indicate a more
restrictive sandbox.

MozReview-Commit-ID: 7NJAe24T4pU

--HG--
extra : rebase_source : 8cb5ea82004ad631fe688bafffa9dc9979568679
2016-09-26 11:30:08 -07:00
Carsten "Tomcat" Book 572e74ee99 merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
David Parks 1748bfae57 Bug 1269114 - [x86_64] Last picked directory not saved when using Flash Player uploader. r=jimm
Adds a couple of registry paths to the broker's ALLOW policy.
2016-09-24 02:54:12 -07:00