Граф коммитов

4833 Коммитов

Автор SHA1 Сообщение Дата
Wes Kocher 323540c8ac Merge autoland to m-c a=merge
MozReview-Commit-ID: 30wEaH7LuuE
2017-05-03 13:17:05 -07:00
ffxbld 1e6ecc6322 No bug, Automated HPKP preload list update from host bld-linux64-spot-364 - a=hpkp-update 2017-05-03 08:06:32 -07:00
ffxbld 5f67a395c5 No bug, Automated HSTS preload list update from host bld-linux64-spot-364 - a=hsts-update 2017-05-03 08:06:29 -07:00
Wes Kocher e141e24ffb Merge m-c to autoland, a=merge
MozReview-Commit-ID: 1peTFbNMVnU
2017-05-02 17:38:11 -07:00
ffxbld abe68d5dad No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-05-02 08:06:54 -07:00
ffxbld e46e6eacbf No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-05-02 08:06:51 -07:00
Ting-Yu Lin 918033ba12 Bug 1321754 Part 2 - Update reftest and crashtest expectations for stylo. r=heycam
MozReview-Commit-ID: AunZ2DE209M

--HG--
extra : rebase_source : 4a091cd55581039c8d81f4db9bfbe2af8c0d0863
2017-04-28 14:53:16 +08:00
ffxbld ae8c2e2354 No bug, Automated HPKP preload list update from host bld-linux64-spot-306 - a=hpkp-update 2017-05-01 07:56:05 -07:00
ffxbld a2f0c5af03 No bug, Automated HSTS preload list update from host bld-linux64-spot-306 - a=hsts-update 2017-05-01 07:56:03 -07:00
ffxbld 3dc6ceb427 No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-04-30 07:50:30 -07:00
ffxbld 0d823cefd8 No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-04-30 07:50:27 -07:00
ffxbld 38fdbbcaa4 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-29 07:55:26 -07:00
ffxbld ca0521550a No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-29 07:55:24 -07:00
Wes Kocher f831128354 Merge autoland to central, a=merge
MozReview-Commit-ID: B7tVdcR40eh
2017-04-28 15:43:18 -07:00
David Keeler 1ef3597000 bug 1360623 - add hash algorithm constants to pykey for easier consumer use r=jcj
For signing, pykey.py delegates to 3rd party libraries. One of these libraries
expects hash algorithms to be specified in the form "SHA-256" whereas the other
expects "sha256". Consumers of pykey shouldn't need to be aware of this detail.
This patch introduces constants HASH_SHA1, HASH_SHA256, etc. and changes pykey
to determine which string literals to use itself.

MozReview-Commit-ID: 27laM2uXMwJ

--HG--
extra : rebase_source : 9b74f486f7535671fd26c59e3e9cc3b4459f15e0
2017-04-28 11:06:28 -07:00
ffxbld 784ec1af14 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-28 07:52:40 -07:00
ffxbld ce8bde832b No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-28 07:52:37 -07:00
David Keeler f900f10f03 bug 1361201 - decrease OCSP soft timeout to 1 second on prerelease builds r=jcj
MozReview-Commit-ID: ENYyG8ZeXYe

--HG--
extra : rebase_source : 5c30b914a39a2dce89190c7d5db703952408aae3
2017-05-01 17:05:31 -07:00
David Keeler 3caa6189aa bug 1349312 - part 2/2: add pyct.py and generate test certificate transparency information r=Cykesiopka,jcj
MozReview-Commit-ID: 9Htv04PfRzb

This introduces pyct.py with the capability of generating Signed Certificate
Timestamps for our test certificates. Also introduces a simple testcase that
should validate correctly under current CT requirements as well as one that does
not validate due to an insufficient number of SCTs.

(Note that "validate" in this case does not refer to the overall TLS handshake
result, because CT is not currently required. It more or less refers to the
value of certificateTransparencyStatus of the SSLStatus of the connection's
securityInfo - see nsISSLStatus.idl.)

--HG--
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.key => security/manager/ssl/tests/unit/test_ct/default-ee.key
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.key.keyspec => security/manager/ssl/tests/unit/test_ct/default-ee.key.keyspec
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.pem => security/manager/ssl/tests/unit/test_ct/default-ee.pem
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.pem.certspec => security/manager/ssl/tests/unit/test_ct/default-ee.pem.certspec
rename : security/manager/ssl/tests/unit/bad_certs/test-ca.pem => security/manager/ssl/tests/unit/test_ct/test-ca.pem
rename : security/manager/ssl/tests/unit/bad_certs/test-ca.pem.certspec => security/manager/ssl/tests/unit/test_ct/test-ca.pem.certspec
extra : rebase_source : 66c5a5e16eeb47c97972248d61a4f1cbadf59a49
2017-04-17 14:55:35 -07:00
David Keeler c138b8d0b6 bug 1349312 - part 1/2: patch CT implementation to include debug-only test logs r=Cykesiopka,jcj
MozReview-Commit-ID: Gay4bliuiDc

This modifies getCTKnownLogs.py to inject 3 debug-only Certificate Transparency
log keys and 2 organizations ("Mozilla Test Org 1" and "2") for use with
integration tests. Also updates CTKnownLogs.h as generated by the python script.

The debug logs use the "default", "secp256r1", and "alternate" keys that are
already present in our testing infrastructure (see pykey.py).

--HG--
extra : rebase_source : 3d4fc736f840cd080fab6b8c6c5b53cc9361abf2
2017-04-19 14:02:26 -07:00
David Keeler 455ab646d3 bug 1337950 - work around failing to load a FIPS PKCS#11 module DB in NSS initialization r=Cykesiopka,jcj
Firefox essentially does not support running NSS in FIPS mode any longer. This
has always been the case on Android from what I can tell and it has been the
case on OS X since at least version 34 (see bug 1047584). It became the case on
Windows as of version 53 (see bug 1295937). Unfortunately, before this patch,
if a user attempted to run an affected version of Firefox using a profile
directory containing an NSS database collection that had FIPS enabled, NSS
initialization would fail and fall back to running in no DB mode, which had the
side-effect of making any saved passwords and certificates unavailable. This
patch attempts to detect and work around this failure mode by moving the
PKCS#11 module DB (which is where the FIPS bit is set) to a backup location and
basically running with a fresh, non-FIPS module DB. This allows Firefox to
initialize NSS with the preexisting key and certificate databases available.

MozReview-Commit-ID: 1E4u1ngZyRv

--HG--
rename : security/manager/ssl/tests/unit/test_sdr_preexisting.js => security/manager/ssl/tests/unit/test_broken_fips.js
rename : security/manager/ssl/tests/unit/test_sdr_preexisting/key3.db => security/manager/ssl/tests/unit/test_broken_fips/key3.db
extra : rebase_source : 887f457e998d6e57c6536573fbe3cb10547fe154
2017-04-20 10:31:22 -07:00
Wes Kocher be34ade6b6 Merge autoland to central, a=merge
MozReview-Commit-ID: 2pgVZdnDKno
2017-04-27 12:44:03 -07:00
ffxbld 068e6f2925 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-04-27 07:52:27 -07:00
ffxbld 7d28817077 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-04-27 07:52:24 -07:00
Wes Kocher 226702fd85 Merge m-c to autoland a=merge
MozReview-Commit-ID: LOGgOErcV9L
2017-04-26 17:43:38 -07:00
ffxbld ce5ccb6a8c No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-04-26 08:02:08 -07:00
ffxbld 728d6a0b30 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-04-26 08:02:05 -07:00
ffxbld 876c7dd305 No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2017-04-25 07:57:31 -07:00
ffxbld 1d0cdb27cb No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2017-04-25 07:57:28 -07:00
David Keeler fe73f5843c bug 1356499 - put NCSCCS pins into production mode r=mgoodwin
As requested by James Burton<jb@0.me.uk> and vouched for (via email) by
Lucas Garron <lgarron@google.com>.

MozReview-Commit-ID: HD9laXzJpRg

--HG--
extra : rebase_source : 7c632c6772509a3c4c03cf971ee0f62ad5225275
2017-04-25 14:33:07 -07:00
Wes Kocher 94ff05c50d Merge autoland to central, a=merge
MozReview-Commit-ID: EaYU8ma2C4H
2017-04-24 15:45:27 -07:00
ffxbld baf47b352e No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-24 07:53:50 -07:00
ffxbld e2320972af No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-24 07:53:47 -07:00
ffxbld 313e5199bf No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-04-23 07:58:17 -07:00
ffxbld 16b68f30f8 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-04-23 07:58:14 -07:00
ffxbld cfbd9ba5ea No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-21 07:57:04 -07:00
ffxbld 7e0a6b7086 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-21 07:57:01 -07:00
Carsten "Tomcat" Book 975e251aff merge mozilla-inbound to mozilla-central a=merge 2017-04-21 10:57:02 +02:00
Wes Kocher 4f3c2d9829 Merge m-c to autoland, a=merge
MozReview-Commit-ID: DPzfAm14Tdx
2017-04-20 15:52:28 -07:00
Nathan Froyd 35bd9439ac Bug 1357741 - make nsCertOverrideService's locking more efficient; r=keeler
nsCertOverrideService uses a ReentrantMonitor to protect its inner
state.  However, there's no way for nsCertOverrideService's methods to
be re-entered when calling outside code.  The use of ReentrantMonitor
appears to be compensating for an unclear division of locking
responsibilities, by enabling every method to simply lock the
ReentrantMonitor upon entrance without care for who might have locked it
beforehand.

Using Mutex is cheaper than ReentrantMonitor, and also forces us to
make explicit who's required to do locking, and who needs to do work
with the lock held.
2017-04-20 10:02:19 -04:00
David Keeler af0ce9fbd6 bug 1357226 - work around a library inefficiency with EC keys when verifying ECDSA signatures r=fkiefer,jcj
Calling VFY_VerifyDigestDirect causes the provided SECKEYPublicKey to be
reimported to the softoken regardless of if it already exists on it. EC keys
must be verified upon import (to see if the point is on the curve to avoid some
small subgroup attacks), and so repeatedly doing this with a static key (say,
for example, a key corresponding to a built-in certificate transparency log) is
inefficient. This patch alters the certificate transparency implementation to
import these keys each once and then use PK11_Verify for ECDSA signature
verification, which doesn't have the same drawback.

Since this change causes CertVerifier to hold an NSS resource (via its
MultiLogCTVerifier having a list of CTLogVerifier, each of which now has a
SECKEYPublicKey), nsNSSComponent has to make sure it goes away before shutting
down NSS. This patch ensures this happens in nsNSSComponent::ShutdownNSS().

MozReview-Commit-ID: 6VSmz7S53y2

--HG--
extra : rebase_source : 4994db9de80a6c1aec3d7e322ff30d040140ce92
2017-04-11 14:11:28 -07:00
Cervantes Yu cc5836fbae Bug 1024669 - Part 1: Annotate crash reports with thread names. r=gsvelto
NS_SetCurrentThreadName() is added as an alternative to PR_SetCurrentThreadName()
inside libxul. The thread names are collected in the form of crash annotation to
be processed on socorro.

MozReview-Commit-ID: 4RpAWzTuvPs
2017-02-07 18:57:23 +08:00
ffxbld 305510c8ee No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-19 08:02:50 -07:00
ffxbld 9847509d90 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-19 08:02:47 -07:00
Cykesiopka 150742ba74 Bug 641120 - Enhance PKCS #11 module load dialog. r=keeler
This changes does several things:
1. Changes some titles to include the word "driver" for better clarity.
2. Moves and cleans up the JS implementation of load_device.xul. Having a
   cleaner implementation in a separate file makes the code easier to discover
   and maintain.
3. Removes code that tries to show a special case message if a module was
   already loaded.
3A. The backend code doesn't provide distinction from this case and failure to
    add in general.
3B. The backend code would only return the error code being checked for if a
    blank module name was provided.
4. Adds tests.

MozReview-Commit-ID: 8BxKWKw5rvp

--HG--
extra : rebase_source : 15a29bf7d46f523a11eac37c9f0c6efb2b5d0114
2017-04-18 22:18:53 +08:00
ffxbld 672628fae3 No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-18 07:50:59 -07:00
ffxbld 52a0317e95 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-18 07:50:56 -07:00
David Keeler 07f34ebd2f bug 1352262 - make OCSP timeout values configurable r=Cykesiopka,jcj
The default OCSP timeout for soft-fail DV is still 2 seconds. This patch makes
it configurable on the interval (0, 5] seconds.

The default OCSP timeout for EV and hard-fail DV is still 10 seconds. This patch
makes it configurable on the interval (0, 20] seconds.

MozReview-Commit-ID: CPd8pwYrJhj

--HG--
extra : rebase_source : 45bd7d06ea013f0a776ea18be9408dedb18271d8
2017-03-31 15:21:40 -07:00
Florian Queze f935ddc4b3 Bug 1356569 - Remove notifyObservers' last parameter when it is falsy, r=jaws. 2017-04-14 21:51:39 +02:00
Florian Queze 37f2343b9a Bug 1356569 - Remove appendElement's last parameter when it is false, r=jaws. 2017-04-14 21:51:39 +02:00