Commit Graph

212 Commits

Author SHA1 Message Date
Francesco Lodolo (:flod)
0b2047cb81 Bug 320231 - Update localization notes for length-limited PKCS#11 strings in pipnss.properties r=Pike
MozReview-Commit-ID: 11iUjRi8eUX

--HG--
extra : rebase_source : 029f6e8a06a0d2903297d1726352c584f69ce69d
2017-12-06 12:11:59 +01:00
David Keeler
36f5d05cd8 bug 1397837 - remove vestigial references to "code signing" from PSM r=Cykesiopka,snorp
As of bug 1257362, the platform does not verify code signing certificates in
general, so anything involving the code signing trust of certificates can go.

MozReview-Commit-ID: 9g9kM62xfYZ

--HG--
extra : rebase_source : 5bec64e5f451c8433aff0de82a91f7bd54c24608
2017-12-01 16:16:20 -08:00
David Keeler
65f33e8410 bug 1257362 - remove the code-signing usage from certverifier as nothing uses it r=Cykesiopka
MozReview-Commit-ID: 6nWy8k6fMvw

--HG--
extra : rebase_source : fa9f78d39b89bfd3416a7a869bf6436d19ac74bc
2017-10-02 16:24:38 -07:00
David Keeler
6bbfc835f0 bug 1406396 - work around NSS utils potentially loading spurious root cert modules r=mgoodwin
NSS command-line utilities may add a built-in root certificate module with the
name "Root Certs" if run on a profile that has a copy of the module file (which
is an unexpected configuration in general for Firefox). This can cause breakage.
To work around this, PSM now simply deletes any module named "Root Certs" at
startup. In an effort to prevent PSM from deleting unrelated modules
coincidentally named "Root Certs", we also prevent the user from using the
Firefox UI to name modules "Root Certs".

MozReview-Commit-ID: ABja3wpShO9

--HG--
extra : rebase_source : cfc62fb3fabf491a72f009601f3ec6973244642e
2017-10-13 11:27:30 -07:00
David Keeler
d26e95be10 bug 1257403 - don't bother verifying CA or email certificates when importing r=Cykesiopka
Incidentally, this means we can remove certificateUsageVerifyCA and
certificateUsageStatusResponder from CertVerifier, since we no longer use them.

MozReview-Commit-ID: Bbqn8fShfTm

--HG--
extra : rebase_source : 012cb08dcbe33fe889c9f6824959b1a02cd0bdc7
2017-09-22 15:42:20 -07:00
Matthew Noorenberghe
601308df05 Bug 306730 - Do not include the token name in prompts for the internal key slot. r=keeler
MozReview-Commit-ID: 3TPZrTQxQC5

--HG--
extra : rebase_source : eacd92dfa3937f8f05f4de0617eb09099517a504
2017-09-12 14:42:19 -07:00
Evan Tseng
4697753e00 Bug 1382135 - Remove all colon signs on sub-dialogs because we already removed them all on each category pane and we should make same thing for sub-dialogs. r=jaws
MozReview-Commit-ID: 8md6CFBSM3B

--HG--
extra : rebase_source : 80bff2dec6a20d7710aa3252c3e2fb295286b294
2017-08-01 11:54:54 +08:00
Cykesiopka
150742ba74 Bug 641120 - Enhance PKCS #11 module load dialog. r=keeler
This changes does several things:
1. Changes some titles to include the word "driver" for better clarity.
2. Moves and cleans up the JS implementation of load_device.xul. Having a
   cleaner implementation in a separate file makes the code easier to discover
   and maintain.
3. Removes code that tries to show a special case message if a module was
   already loaded.
3A. The backend code doesn't provide distinction from this case and failure to
    add in general.
3B. The backend code would only return the error code being checked for if a
    blank module name was provided.
4. Adds tests.

MozReview-Commit-ID: 8BxKWKw5rvp

--HG--
extra : rebase_source : 15a29bf7d46f523a11eac37c9f0c6efb2b5d0114
2017-04-18 22:18:53 +08:00
David Keeler
f69c130b16 bug 1239344 - remove error alert for successful PKCS12 operations r=Cykesiopka
MozReview-Commit-ID: Hr6s2v2GmZQ

--HG--
extra : rebase_source : 232c80db1816ab7045cc5dec42c1aeeae3fc6042
2017-03-03 11:12:54 -08:00
Sergei Chernov
b3b80907d0 Bug 1320566 - Certificate Transparency - implement CT Policy. r=Dolske,keeler
MozReview-Commit-ID: LcMdKcgBStG

--HG--
extra : rebase_source : 38b2531e9abb8a84d32c437d13fab881f2c49f18
2017-01-09 08:22:28 +02:00
David Keeler
858957f033 bug 857627 - 2/4: remove nsIX509Cert.nickname r=Cykesiopka,jcj
In general, any code that was using nsIX509Cert.nickname should be able to use
the attribute displayName (if using nickname for display purposes) or the
attribute dbKey (if using nickname as a unique identifier for a certificate).

MozReview-Commit-ID: G9CfMJDfLqe

--HG--
extra : rebase_source : 1c464dab8f028568cedd5a42cf87428b8bb63fc0
2016-11-18 13:12:29 -08:00
David Keeler
7c5c99fcce bug 1313491 - include more context when determining EV status r=Cykesiopka,jcj,mgoodwin
When doing TLS session resumption, the AuthCertificate hook is bypassed, which
means that the front-end doesn't know whether or not to show the EV indicator.
To deal with this, the platform attempts an EV verification. Before this patch,
this verification lacked much of the original context (e.g. stapled OCSP
responses, SCTs, the hostname, and in particular the first-party origin key).
Furthermore, it was unclear from a code architecture standpoint that a full
verification was even occurring. This patch brings the necessary context to the
verification and makes it much more clear that it is happening. It also takes
the opportunity to remove some unnecessary EV-related fields and information in
code and data structures that don't require it.

MozReview-Commit-ID: LTmZU4Z1YXL

--HG--
extra : rebase_source : 7db702f2037fae83c87fbb6aca75b4420544dff9
2016-10-31 17:02:57 -07:00
Cykesiopka
1c951538c1 Bug 1312154 – Stop using nsIDialogParamBlock in downloadcert.(js|xul). r=keeler
nsIDialogParamBlock isn't a great API, and is best avoided.

This patch also updates downloadcert.js to match modern PSM style, and adds a
test.

MozReview-Commit-ID: J2g2H0iBAn4

--HG--
extra : rebase_source : 9365f7b1c7a88caef84f0353e18510dcab9a5d32
2016-10-28 02:13:38 +08:00
Sergei Chernov
8e3719b7e2 Bug 1305289 - Certificate Transparency - basic UI indicator; r=Dolske,keeler
MozReview-Commit-ID: b0SUW2WNJT

--HG--
extra : rebase_source : 2bfa8895246f862f3e49c0c9674a8e862137f8a6
2016-09-28 20:19:56 +03:00
Cykesiopka
7658cbf8e1 Bug 1308888 - Simplify passing handle to the cert to view in the cert viewer. r=keeler
The cert viewer currently supports two ways to pass a handle to the cert:
1. Passing the nickname of the cert via window.name.
2. Via an nsIDialogParamBlock, which is itself accessed through window.arguments.

Method 1 is unused and unnecessary.
Method 2 is overly complex: the relevant nsIX509Cert can just be passed directly.

This patch does the following:
1. Makes it so that there is only a single, straightforward way to pass a handle
to the cert.
2. Makes the cert viewer title localisable while we're nearby.
3. Renames viewCertDetails.js to better reflect the current use of the file.

MozReview-Commit-ID: pqtfNgvImT

--HG--
rename : security/manager/pki/resources/content/viewCertDetails.js => security/manager/pki/resources/content/certViewer.js
extra : rebase_source : 776a27111ab26cdcdc91b002890c43a3fe4f48e8
2016-10-21 00:33:36 +08:00
Carsten "Tomcat" Book
401922b6ce Backed out changeset 1f6f908368e5 (bug 1305289) for gtest failures 2016-10-10 09:33:01 +02:00
Sergei Chernov
0449e02200 Bug 1305289 - Certificate Transparency - basic UI indicator; r=Dolske,keeler
MozReview-Commit-ID: b0SUW2WNJT

--HG--
extra : rebase_source : 893d9945de71004ccda3222782273ad953d8a598
2016-09-28 20:19:56 +03:00
Cykesiopka
1d6f642d9d Bug 1186286 - Consult more than just the CN when deleting a cert so it's always clear what's being deleted. r=mgoodwin
Deleting certs via the cert manager results in a confirmation dialog popping up.
This dialog contains a list of certs that were selected for deletion.

Currently, only the Common Name of each cert is used to represent it in the list.
This is a problem for certs that don't have a CN. More jarringly, the cert
manager itself falls back to various other attributes, so for example selecting
a cert that is represented by its OU ends up popping up a dialog where an empty
list is shown.

MozReview-Commit-ID: 3z4BebW8Ucd

--HG--
extra : rebase_source : 468eb3de470e3ec42471c80183a9c48ebfb130c9
extra : histedit_source : 90e1d2fc73aaba4ded68d933b6ea3a6092d60636
2016-10-07 20:14:27 +08:00
Cykesiopka
ebfb27c403 Bug 1142350 - Remove nsIUserCertPicker, nsICertPickDialogs and associated code from mozilla-central. r=keeler
The code is used in comm-central, but is unused in mozilla-central. It will be
imported into comm-central in Bug 1297368.

MozReview-Commit-ID: BEY9BR0YRiD

--HG--
extra : rebase_source : 6d34c1e82cd749a009f26be50fde0537373f2f9e
2016-09-21 19:34:12 +08:00
Joseph Yeh
d51b2b87d0 Bug 1298872 - Fix text cropped and overflowed in advanced pane in-content dialogs; r=MattN
MozReview-Commit-ID: C7Q5VnipTIa

--HG--
extra : rebase_source : 7a7a967c6a58c2d54ed69ec6a41802f5b6fe747f
2016-09-05 18:11:08 +08:00
David Cook
7d4c71cc9c Bug 1115718 - Check for empty issuer name in mozilla::pkix; r=keeler
MozReview-Commit-ID: 6Ymgo7dQE7b

--HG--
extra : rebase_source : 54ee27fd46c2139125a40deabb11a6aca04c84bc
2016-07-28 20:36:18 -05:00
Cykesiopka
8297eb8984 Bug 1281665 - Change nsIClientAuthDialogs.chooseCertificate() to use hostname instead of CN. r=keeler
chooseCertificate() currently uses a concatenation of the Common Name of the
server cert and the port of the server to allow the user to identify the server
requesting client authentication. Unfortunately, this approach is flawed, since
it doesn't take into account things like SAN entries, which might be very
different from the CN.

Using the hostname instead avoids this problem.

MozReview-Commit-ID: 6XjGCknWNi9

--HG--
extra : transplant_source : k%10N%7B%E8%A4%9B%C9%9A%23Q%D1%99%D2%A3%C0.%2B%7F%A5
2016-07-26 20:16:58 +08:00
Tom Tromey
5538d692d3 Bug 1286877 - do not set c-basic-offset for python-mode; r=gps
This removes the unnecessary setting of c-basic-offset from all
python-mode files.

This was automatically generated using

    perl -pi -e 's/; *c-basic-offset: *[0-9]+//'

... on the affected files.

The bulk of these files are moz.build files but there a few others as
well.

MozReview-Commit-ID: 2pPf3DEiZqx

--HG--
extra : rebase_source : 0a7dcac80b924174a2c429b093791148ea6ac204
2016-07-14 10:16:42 -06:00
David Keeler
56d2f86c86 bug 1284946 - remove usages-related APIs from nsIX509Cert r=Cykesiopka,Felipe,jcj
nsIX509Cert provided the APIs getUsagesArray, requestUsagesArrayAsync, and
getUsagesString. These APIs were problematic in that the synchronous ones would
cause certificate verification to block the main thread and the asynchronous one
was needlessly indirect in its definition (it made use of two additional
special-case xpidl types) and needlessly complex in its implementation (it
required nsNSSComponent to manually manage a background thread without the aid
of recent improvements in that area (e.g. CryptoTask)). Furthermore, these APIs
would return string descriptions of the usages the certificate in question had
been verified for rather than using more concrete identifiers or values. This
paradigm is usable but imprecise. The new nsIX509CertDB API
asyncVerifyCertAtTime is much more expressive, enforces off-main-thread
computation, and makes use of CryptoTask for a simple implementation. Using this
API, previous uses of the old nsIX509Cert APIs can be replaced. As an additional
benefit, this removes a ton of obsolete C++ code.

MozReview-Commit-ID: KXVTcjAKehu

--HG--
extra : rebase_source : 50c51f73b2b61ed0ad4dc9702cc5df470ce998bc
2016-07-06 14:45:36 -07:00
Cykesiopka
577a05865b Bug 307081 - Make nsIClientAuthDialogs::ChooseCertificate() pass an nsIArray of nsIX509Certs, not strings. r=kats,keeler
This provides implementations of ChooseCertificate() with more flexibility, and
allows callers of ChooseCertificate() to be less complex.

A portion of this work involves reimplementing
nsNSSCertificate::FormatUIStrings() in JS and improving UI strings for l10n.

MozReview-Commit-ID: CE7Uc2ntwmZ

--HG--
extra : transplant_source : R%A8eC%CEO2%DC%20%F7%B4V%F3g%E6h%EB%D5%8D3
2016-06-24 00:12:16 -07:00
Cykesiopka
313db6b516 Bug 307081 - Clean up nsIClientAuthDialogs.idl and implementations. r=kats,keeler
This fixes the following in the IDL:
1. Misleading or unclear parameter names in the IDL. |cn| in practice is the
   concatenation of the CN of the server cert and the port of the server, and
   |issuer| is the Organization of the issuer cert of the server cert.
2. Use of the |wstring| type. |AString| is generally preferred, and has the
   benefit of letting implementations skip null checks due to the use of
   references.
3. Using an explicit |canceled| outparam instead of just setting a return type.
   There is no need for the outparam if the return type can be used.
4. Using |long| (int32_t) for |selectedIndex|. |unsigned long| (uint32_t) is
   more logical, and paves the way for future changes.

This fixes the following in the Android implementation:
1. Lack of checks to ensure the QueryInterface() call succeeded. In practice,
   the call will always succeed, but it's good practice to check anyways.
2. Setting a variable to an nsIPrefService instance initially, then later
   setting it to a pref branch instance later on. This is confusing and
   unnecessary.

This fixes the following in the desktop implementation:
1. Lack of null pointer checking.
2. Trying to get a parent window ref off a context that doesn't actually support
   doing so.
3. Setting a variable to an nsIPrefService instance initially, then later
   setting it to a pref branch instance later on. This is confusing and
   unnecessary.
4. Abusal of the CAPS bundle.
5. Unnecessary variables.
6. Variables declared far away from where they are used.
7. Variable shadowing.
8. Style issues.
9. Lack of documentation.

This also fixes the following:
1. Lack of localisation notes.

MozReview-Commit-ID: FTc6XecJd6h

--HG--
extra : transplant_source : %ABQ%8F%E6%A3%25%FE%94%E4%D6X%3D%28%2C%05%5E%FB%84.-
2016-06-24 00:12:11 -07:00
Onno Ekker
f1de083a08 Bug 1279953 - Ambiguous string usage for "not encrypted page". r=dolske
--HG--
extra : rebase_source : e6ea020d8b98e9bef2e895e5312edc47d839cc2c
2016-06-13 22:14:04 +02:00
Jared Wein
e889366796 Bug 1268159 - Use GreD in addition to XCurProcD for browser_misused_characters_in_strings.js to cover more string files. r=gijs
MozReview-Commit-ID: IlC170W0nlG
* * *
[mq]: temp

MozReview-Commit-ID: GF0k4zvONPD
2016-04-29 09:28:48 -04:00
Cykesiopka
33825b4eb1 Bug 1257031 - Return more informative error code when encountering invalid integers rather than SEC_ERROR_BAD_DER. r=keeler
Also adds some missing l10n entries to nsserrors.properties (but not for errors
that are specific to TLS 1.3, since TLS 1.3 is not yet finalised).

MozReview-Commit-ID: A42fmTDTe8W

--HG--
extra : transplant_source : x%F7s%DB%05%B4%81%9Dm%FDC%A1f%B3%0D%7DR%C1%BA%B1
2016-04-21 16:41:22 -07:00
David Keeler
13d02ebbb6 bug 1264761 - improve handling of x509 versions in certificate manager r=Cykesiopka
MozReview-Commit-ID: B7EPx63ttlt

--HG--
extra : rebase_source : a39e04a7b2393130888ecfe02b09b495c9e068af
2016-04-18 11:07:24 -07:00
Wes Kocher
01ea27062a Backed out changeset bb60c7a0b0c5 (bug 1264761) for build failures in nsNSSCertHelper CLOSED TREE
MozReview-Commit-ID: KwFHe6X2WCE
2016-04-19 16:09:49 -07:00
David Keeler
9ae62ef7c9 bug 1264761 - improve handling of x509 versions in certificate manager r=Cykesiopka
MozReview-Commit-ID: B7EPx63ttlt

--HG--
extra : rebase_source : 0234079b42b1a3e46b4a6a790049b8f0769fc79a
2016-04-18 11:07:24 -07:00
David Keeler
7dd242bb39 bug 1261936 - stop using the subject common name in certificate verification error messages r=Cykesiopka
MozReview-Commit-ID: G08cV5GmNDh

--HG--
extra : rebase_source : c79b34d893e7acddc8ee02a6c354dcaa1de07d61
2016-04-04 16:25:24 -07:00
Cykesiopka
1a9cf03eb1 Bug 1251009 - Remove unused nsICertificateDialogs.notifyCACertExists() method. r=keeler, r=mfinkle
MozReview-Commit-ID: 5CFAsy5e1Cl

--HG--
extra : rebase_source : eed2fc5d3511c140dfe6046079347e9a881e2803
2016-03-16 12:48:59 -07:00
Cykesiopka
370bac0f07 Bug 1064402 - Part 1: Remove Import button in Servers tab of the Certificate Manager. r=keeler
It no longer serves any useful purpose:
1. It is no longer possible to add explicit trust for server certs post Bug 825583.
1A. The Add Exception feature is better suited for this anyways.
2. It isn't possible to set explicit distrust in the Cert Manager, only remove explicit trust.
3. Importing may also inadvertently cause verification failures (see Bug 1202636).
2016-02-06 20:40:57 -08:00
Panos Astithas
92b2551106 Bug 1207146 - Add a link to expert technical information in the cert error page. r=Gijs,keeler 2015-12-04 19:46:13 +02:00
Mark Goodwin
31adb1a5c5 Bug 901698 - Implement OCSP-must-staple; r=keeler 2015-11-13 16:49:08 +00:00
Steven Englehardt
73079800c9 Bug 1153010 - Disambiguate error messages for mixed content and weak/broken cipher. r=keeler,tanvi,dolske 2015-07-08 09:04:11 +02:00
Cykesiopka
0a9aea4ab2 Bug 1145679 - Reject EV status for end-entity EV certs with overly long validity periods. r=keeler
--HG--
extra : rebase_source : ec44bb566cce8ab14f740457d6ba1d863b39c256
2015-06-29 22:19:00 +02:00
Cykesiopka
71fd1e3612 Bug 1169530 - Add l10n string for SSL_ERROR_WEAK_SERVER_CERT_KEY. r=dkeeler
Also removes the strings for the SSL_ERROR_UNUSED_5 and SSL_ERROR_UNUSED_10 errors.

--HG--
extra : rebase_source : 252d8f50085ccc57294a71c31f3b8b37c9cf2a90
2015-05-28 22:50:00 +02:00
Tim Taubert
ab7196486a Bug 1060112 - Don't treat OCSP responses omitting the requested certificate status as "unknown certificate" responses blocking the connection r=keeler 2015-05-21 13:39:34 -04:00
Cykesiopka
f7b3a781d8 Bug 1153446 - Replace instances of double spacing with single spacing in nsserrors.properties. r=dkeeler 2015-05-01 02:40:00 +02:00
David Cooper
bb6cbdf02b Bug 667471 - Pretty print names of ECDSA with SHA-2 algorithms in Certificate Viewer. r=dkeeler
--HG--
extra : rebase_source : eb961cbdf8fe1ccf74642d86c03ee6c41c30f2d4
2015-03-27 23:13:00 +01:00
Cykesiopka
ae28024d8c Bug 1131227 - Make the about:certerror Unknown Issuer string mention missing intermediates and unimported roots. r=keeler 2015-03-17 14:33:00 +01:00
Masatoshi Kimura
35c856f796 Bug 1143082 - Fix a message in the mixed content UI. r=dolske 2015-03-17 20:34:58 +09:00
Cykesiopka
5814296e8c Bug 1141815 - Remove nsIDOMCryptoDialogs interface and associated implementation; r=keeler 2015-03-12 10:24:05 +01:00
Cykesiopka
de906ce3ce Bug 1130418 - Remove broken e-mail cert trust editing UI. r=emk
--HG--
extra : rebase_source : fb4c89e251e2ce3e4d9cf002a0cda4166a589a2c
2015-03-02 19:54:00 +01:00
Cykesiopka
4419d0186e Bug 1130413 - Remove unused nsITokenPasswordDialogs::GetPassword() function. r=jjones
--HG--
extra : rebase_source : 85b9e442d6b5be401fdd389cc251add8a633bb23
2015-02-26 13:05:00 +01:00
Brian Smith
2672d3b5d3 Bug 1077864, Part 3: update nsserrors.properties so error message gets localized. 2015-02-23 16:04:23 -08:00
Cykesiopka
d92c1180e0 Bug 1130405 - Remove unused pippki strings. r=jcj 2015-02-11 05:08:00 -05:00