Commit Graph

6426 Commits

Author SHA1 Message Date
Dana Keeler
3c7bb27e9f bug 1487258 - load enterprise roots on a background at startup r=jcj
Loading enterprise roots could potentially take a while, so we certainly
shouldn't do it on the main thread at startup. Note that this doesn't address
the case where a user enables the feature while Firefox is running. This isn't
great but since it's an about:config preference rather than a first-class
preference exposed in about:preferences, we can probably get away with it for
now.

Differential Revision: https://phabricator.services.mozilla.com/D4708

--HG--
extra : moz-landing-system : lando
2018-09-05 17:15:53 +00:00
J.C. Jones
3def42e421 Bug 1488622 - land NSS 229a3a57f42a UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 4f7f3eaabf04e02d91d483158c9220929a316da6
2018-09-05 08:20:33 -07:00
Dana Keeler
8b93bfbb06 bug 832834 - reimplement nsSecureBrowserUIImpl r=franziskus,Felipe
It turns out nsSecureBrowserUIImpl is considerably more complicated than it
needs to be. This patch reimplements it in terms of OnLocationChange only, which
is all it needs to produce the same behavior as before.

Differential Revision: https://phabricator.services.mozilla.com/D3548

--HG--
extra : moz-landing-system : lando
2018-09-05 17:12:36 +00:00
Kris Maglione
1c20e8cbbb Bug 1486147: Part 2 - Update JS string enumerator callers to use JS iteration. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D4270

--HG--
extra : rebase_source : 2adadcc8e51a7bce1da02f4bee1333b77bfa9944
extra : histedit_source : 9df920fd186f8c96a5d8b9cbff53ea9529f26ee0
2018-08-24 16:22:40 -07:00
Ehsan Akhgari
8ee774da84 Bug 1487396 - Part 1: Enable the secure browser UI object to keep track of the newly added content blocking states for each document; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D4809
2018-09-04 14:20:22 -04:00
shindli
fd77c051cb Backed out changeset 99e8a7cd7726 (bug 1484761) as requested by the developer on IRC on a CLOSED TREE 2018-09-04 09:09:49 +03:00
Daniel Varga
f46d581d52 Merge mozilla-inbound to mozilla-central. a=merge 2018-09-04 00:54:07 +03:00
ffxbld
9e951cf226 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D4852

--HG--
extra : moz-landing-system : lando
2018-09-03 13:16:32 +00:00
trisha
88400e06ef Bug 1484761 - Change "security certificates" to "certificates" on the new cert error pages r=johannh 2018-08-31 19:12:02 +05:30
J.C. Jones
0f1a889215 Bug 1488622 - cleanup incorrectly-landed .orig files UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 900e72219bf53a84f136f482a25fefd280a6b13b
2018-09-07 11:49:21 -07:00
Dana Keeler
1d12fc8a92 bug 1487517 - un-do ciphersuite hiding from bug 1279479 and bug 1316300 r=mt
In bug 1279479 and bug 1316300 we hid some ciphersuites from TLS 1.3
handshakes, assuming we would fall back to TLS 1.2 if the peer needed them.
However, as of bug 1479501, we don't fall back by default, so this just means
we can't negotiate these ciphersuites. This patch un-hides these ciphersuites
from the TLS 1.3 handshake.

Differential Revision: https://phabricator.services.mozilla.com/D4725

--HG--
extra : moz-landing-system : lando
2018-08-31 00:18:36 +00:00
Henri Sivonen
580f807a65 Bug 1487310 - Let XPCOM strings manage their own buffer in LossyUTF8ToUTF16(). r=keeler
This does not change the outward behavior of LossyUTF8ToUTF16(). Both
ToNewUnicode() and CopyASCIItoUTF16() convert from Latin1 to UTF-16.

MozReview-Commit-ID: 8SDgvoGaN4A

Differential Revision: https://phabricator.services.mozilla.com/D4639

--HG--
extra : moz-landing-system : lando
2018-08-30 17:29:51 +00:00
ffxbld
055f6b25a3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D4660

--HG--
extra : moz-landing-system : lando
2018-08-30 12:53:09 +00:00
Alexander Surkov
b27e40d606 Bug 1486674 - get rid of nsIDOMXULCheckboxElement, r=smaug 2018-08-30 08:17:11 +08:00
arthur.iakab
d2e647e133 Backed out 10 changesets (bug 1485305)for failing browser chrome tests on browser_loadDisallowInherit.js
Backed out changeset 138b8596a9cd (bug 1485305)
Backed out changeset d9f04aeeeef7 (bug 1485305)
Backed out changeset cd063d8afe4e (bug 1485305)
Backed out changeset 2f8a5a03ccb5 (bug 1485305)
Backed out changeset 8085d1eefd7c (bug 1485305)
Backed out changeset 3aaccb374a59 (bug 1485305)
Backed out changeset 3a111e9e5c9c (bug 1485305)
Backed out changeset 61aa1cfb0b01 (bug 1485305)
Backed out changeset bca973d90acc (bug 1485305)
Backed out changeset 4eb33bf25d6f (bug 1485305)
2018-09-18 20:30:07 +03:00
Jonathan Kingston
23bfc5f0ef Bug 1485305 - misc Ensure loadURI always passes a triggeringPrincipal() r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D4560

--HG--
extra : source : edc4d8898d26a199fb230489a644b88c2fd8f739
2018-08-29 15:48:52 +01:00
Tiberius Oros
3235f6720f Backed out 10 changesets (bug 1485305) for failures at browser/content/browser.js on a CLOSED TREE
Backed out changeset 63c50fd60ae4 (bug 1485305)
Backed out changeset bf0f2adb765e (bug 1485305)
Backed out changeset 721871bb64f1 (bug 1485305)
Backed out changeset e9da73786c5f (bug 1485305)
Backed out changeset e02038177b6b (bug 1485305)
Backed out changeset 35bd32f99f60 (bug 1485305)
Backed out changeset f40900bf8621 (bug 1485305)
Backed out changeset 03632075ac2c (bug 1485305)
Backed out changeset 2fee48378f73 (bug 1485305)
Backed out changeset 6263695b3cb8 (bug 1485305)
2018-09-18 14:46:54 +03:00
Jonathan Kingston
f1ecf040f7 Bug 1485305 - misc Ensure loadURI always passes a triggeringPrincipal() r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D4560

--HG--
extra : source : 5911bc1f2f1fb6d576fba38af242f9d8cb412b16
2018-08-29 15:48:52 +01:00
Nicholas Nethercote
e51afbee7e Bug 1486690 - Remove unnecessary checks after moz_xrealloc() calls. r=glandium
--HG--
extra : rebase_source : c036680008cef1f87ed94700f9146022ce879e53
2018-08-28 15:56:23 +10:00
Nicholas Nethercote
ac5efebb4b Bug 1486690 - Remove unnecessary checks after moz_xmalloc() calls. r=glandium
There are surprisingly many of them.

(Plus a couple of unnecessary checks after `new` calls that were nearby.)

--HG--
extra : rebase_source : 47b6d5d7c5c99b1b50b396daf7a3b67abfd74fc1
2018-08-28 15:56:01 +10:00
ffxbld
73e4fdc8f6 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D4325

--HG--
extra : moz-landing-system : lando
2018-08-27 12:53:01 +00:00
Johann Hofmann
a05ff7f01f Bug 1484246 - Part 1 - Add more explanation to certificate errors caused by Symantec distrust. r=Gijs,keeler
Differential Revision: https://phabricator.services.mozilla.com/D3877

--HG--
extra : rebase_source : 0f45bb71e4e2d9437c687a991c55f33ab492b7bf
2018-08-21 15:04:02 +02:00
Brendan Dahl
f6923ccc24 Bug 1485426 - Use createXULElement instead of createElement in XUL docs. r=bgrins
Preparing for transitioning to XHTML.

MozReview-Commit-ID: JLlmUxsvhIB

Differential Revision: https://phabricator.services.mozilla.com/D4265

--HG--
extra : moz-landing-system : lando
2018-08-25 00:16:27 +00:00
David Keeler
1cd81e4c5a bug 1485087 - remove the option to use the TLS session cache from nsITLSServerSocket r=jryans,mayhemer
As initially implemented, nsITLSServerSocket by default enabled the use of the
TLS session cache provided by NSS. However, no consumers of nsITLSServerSocket
actually used it. Because it was an option, though, PSM had to jump through some
hoops to a) make it work in the first place and b) not have NSS panic on
shutdown. Furthermore, it meant increased memory usage for every user of Firefox
(and again, nothing actually used the feature, so this was for naught).

In bug 1479918, we discovered that if PSM shut down before Necko, NSS could
attempt to acquire a lock on the session cache that had been deleted, causing a
shutdown hang. We probably should make it less easy to make this mistake in NSS,
but in the meantime bug 1479918 needs uplifting and this workaround is the
safest, most straight-forward way to achieve this.

Differential Revision: https://phabricator.services.mozilla.com/D3919

--HG--
extra : moz-landing-system : lando
2018-08-24 16:00:34 +00:00
Kris Maglione
3a5c05e76f Bug 1484496: Part 5e - Convert remaining nsISimpleEnumerator users to use JS iteration. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D3733

--HG--
extra : rebase_source : c0fac176d7b3d840c4dbb14f8d95ccfc7f83a5a8
extra : histedit_source : a92c40117d0808a3ad68c972f622a7a42c9ae8ba
2018-08-18 18:13:14 -07:00
Kris Maglione
2dee0aae3c Bug 1484496: Part 4b - Add intrinsic type information to most nsSimpleEnumerators. r=froydnj
This allows JS callers to automatically get the correct types during
interation, without having to explicitly specify them.

Differential Revision: https://phabricator.services.mozilla.com/D3728

--HG--
extra : rebase_source : b708f382d8ea571d199c669bfed5b5a7ca9ffac4
extra : histedit_source : 7df6feb82088c8a5ca45dc28fe4d2b852c177fee
2018-08-18 21:06:32 -07:00
Kris Maglione
65c28aa0ad Bug 1484496: Part 2 - Add common base class for all nsISimpleEnumerator implementations. r=froydnj
In order to allow JS callers to use nsISimpleEnumerator instances with the JS
iteration protocol, we'll need to additional methods to every instance. Since
we currently have a large number of unrelated implementations, it would be
best if they could share the same implementation for the JS portion of the
protocol.

This patch adds a stub nsSimpleEnumerator base class, and updates all existing
implementations to inherit from it. A follow-up will add a new base interface
to this class, and implement the additional functionality required for JS
iteration.

Differential Revision: https://phabricator.services.mozilla.com/D3725

--HG--
extra : rebase_source : ad66d7b266856d5a750c772e4710679fab9434b1
extra : histedit_source : a83ebffbf2f0b191ba7de9007f73def6b9a955b8
2018-08-18 14:22:47 -07:00
ffxbld
1eb4a76ba4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D4071

--HG--
extra : moz-landing-system : lando
2018-08-23 13:31:44 +00:00
Dipen Patel
1e7897dcaa Bug 1468225 - remove method nsICertificateDialogs.viewCert and its uses. r=Gijs,keeler
- Remove the viewCert method from nsICertificateDialogs
- Remove all associated C++ code
- Directly invoke UI window where it was previous called.
- Update tests

MozReview-Commit-ID: 9b62Go0DjE9

Differential Revision: https://phabricator.services.mozilla.com/D3358

--HG--
extra : moz-landing-system : lando
2018-08-22 17:38:33 +00:00
Dragana Damjanovic
ae60f1a2d4 Bug 1480704 - Detect the presents of a MITM. r=mikedeboer,keeler
Bug 1480704 - Detect the presents of a MITM.

Differential Revision: https://phabricator.services.mozilla.com/D2715

--HG--
extra : moz-landing-system : lando
2018-08-17 22:12:17 +00:00
ffxbld
6107a2a1fc No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D3490

--HG--
extra : moz-landing-system : lando
2018-08-16 10:57:34 +00:00
Henri Sivonen
3edc601325 Bug 1402247 - Use encoding_rs for XPCOM string encoding conversions. r=Nika,erahm,froydnj.
Correctness improvements:

 * UTF errors are handled safely per spec instead of dangerously truncating
   strings.

 * There are fewer converter implementations.

Performance improvements:

 * The old code did exact buffer length math, which meant doing UTF math twice
   on each input string (once for length calculation and another time for
   conversion). Exact length math is more complicated when handling errors
   properly, which the old code didn't do. The new code does UTF math on the
   string content only once (when converting) but risks allocating more than
   once. There are heuristics in place to lower the probability of
   reallocation in cases where the double math avoidance isn't enough of a
   saving to absorb an allocation and memcpy.

 * Previously, in UTF-16 <-> UTF-8 conversions, an ASCII prefix was optimized
   but a single non-ASCII code point pessimized the rest of the string. The
   new code tries to get back on the fast ASCII path.

 * UTF-16 to Latin1 conversion guarantees less about handling of out-of-range
   input to eliminate an operation from the inner loop on x86/x86_64.

 * When assigning to a pre-existing string, the new code tries to reuse the
   old buffer instead of first releasing the old buffer and then allocating a
   new one.

 * When reallocating from the new code, the memcpy covers only the data that
   is part of the logical length of the old string instead of memcpying the
   whole capacity. (For old callers old excess memcpy behavior is preserved
   due to bogus callers. See bug 1472113.)

 * UTF-8 strings in XPConnect that are in the Latin1 range are passed to
   SpiderMonkey as Latin1.

New features:

 * Conversion between UTF-8 and Latin1 is added in order to enable faster
   future interop between Rust code (or otherwise UTF-8-using code) and text
   node and SpiderMonkey code that uses Latin1.

MozReview-Commit-ID: JaJuExfILM9
2018-08-14 14:43:42 +03:00
David Keeler
d2cf0c7ffc bug 1479918 - fix HSTS update script to only access XHR headers after each request has completed r=sfraser
When the HSTS preload script was reworked to use async/await in bug 1436369,
`fetchstatus` would create an asynchronous xml http request and then attempt to
access a response header from it. However, there was nothing to ensure that the
request had completed before this code ran. This patch ensures that the request
has completed before the response header is used.

This patch also replaces a lingering instance of `Ci.nsISSLStatusProvider` that
should have been changed to `Ci.nsITransportSecurityInfo` in bug 1475647.

Finally, this patch removes the old, redundant getHSTSPreloadList.js in
security/manager/tools as well as the unused nsSTSPreloadList.errors file in
security/manager/ssl.

Differential Revision: https://phabricator.services.mozilla.com/D2807

--HG--
extra : moz-landing-system : lando
2018-08-13 20:25:21 +00:00
David Keeler
f9c800c5c1 bug 1460062 - Enforce Symantec distrust in Firefox 63 r=franziskus
This patch implements the Symantec distrust plan on Nightly only for now.

Differential Revision: https://phabricator.services.mozilla.com/D2959

--HG--
extra : moz-landing-system : lando
2018-08-13 14:59:47 +00:00
Martin Thomson
59b2975f6c Bug 1479501 - Disable TLS version fallback, r=ekr
--HG--
extra : source : 91fcd26d7794d96c757a44cdffe6e799ccdc6d3a
extra : amend_source : f72f8d7c6500b3fe825dd24d676558438609e699
2018-08-10 12:10:35 +10:00
ffxbld
92a9c277ad No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2997
2018-08-09 09:45:18 -04:00
Dipen Patel
b78f5b5ec5 Bug 1468224 - remove dialogs from nsIX509CertDB PKCS12File methods. r=keeler
- enhance nsIX509CertDB.importPKCS12File to accept a password and return error code.
- enhance nsIX509CertDB.exportPKCS12File to accept a password and return error code.
- remove password and error prompts being invoked in C++ layer to Javascript layer.
- update unit tests
- add unit test for importing certs with empty string password and no passwords.
- remove unused code

MozReview-Commit-ID: 23ypAzBarOp

--HG--
extra : rebase_source : df608a240c6fa7ce4278145861e57882f0803e02
2018-08-02 20:57:07 -07:00
Ciure Andrei
9f8ebbde60 Merge inbound to mozilla-central. a=merge 2018-08-07 00:58:13 +03:00
ffxbld
de6c35a6a2 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2771
2018-08-06 15:09:53 -04:00
Franziskus Kiefer
3695d15b7d Bug 1478668 - follow-up fixing error-case returns, r=keeler
--HG--
extra : rebase_source : c2a73c701c68529e0473566b3035b525ff48a932
2018-08-06 11:18:01 +02:00
Masatoshi Kimura
3b21b7868b Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : c09366fb93e5b0f72abe1e99d3094e3d96a934fb
extra : intermediate-source : 5950c9d63c3b4fd63a25464a7b50944aaec7079f
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Dana Keeler
58da26473a bug 1411458 - add a test for bug 1411458 r=jcj
MozReview-Commit-ID: LrZN4DATEVP

--HG--
extra : rebase_source : f71a1278484a97e38a7c44fdf47cc0c690a0716b
2017-10-25 11:33:03 -07:00
arthur.iakab
cb046df12d Backed out changeset 163c65f9c522 (bug 1484761)for browser chrome failures on browser_aboutCertError.js 2018-10-08 20:44:33 +03:00
trisha
229b14cdfe Bug 1484761 - Change "security certificates" to "certificates" on the new cert error pages r=johannh 2018-09-27 17:04:41 +08:00
Franziskus Kiefer
a52a8495f9 Bug 1479787 - use NSS mozpkix in Firefox, r=mt,keeler,glandium
Differential Revision: https://phabricator.services.mozilla.com/D2725
Differential Revision: https://phabricator.services.mozilla.com/D2860

--HG--
extra : rebase_source : 189c13c2a3104c106fcabad5998af6cb2e20d4a5
2018-10-02 14:59:34 +02:00
Cosmin Sabou
de8c2bd891 Backed out changeset 5950c9d63c3b (bug 1090497) for build bustages on several files. CLOSED TREE 2018-08-02 19:59:53 +03:00
Masatoshi Kimura
feea19030c Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : a62521fdc66def4e4d5d7bf52e68365a786b5c55
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Franziskus Kiefer
e279c84c4e Bug 1470914 - land NSS e2a0d66b122f UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 078fe0962637a3888c6a874e2f5d3690ae5aaaab
2018-08-02 12:53:56 +02:00
Noemi Erli
8f66a71e70 Merge inbound to mozilla-central. a=merge 2018-08-02 11:54:46 +03:00
dvarga
956d57e7f2 Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-08-02 01:26:29 +03:00
Nika Layzell
7a9f60fafb Bug 1479484 - Part 1: Add make_dafsa.py to the virtualenv's python path, r=froydnj
Summary:
The plan is to also expose perfecthash.py from this module on the python path.
This also allows us to stop using explicit module loading to load make_dafsa.py.

make_dafsa.py was moved into tools/ to avoid any extra python files from
accidentally ending up on the python path.

Reviewers: froydnj!

Tags: #secure-revision

Bug #: 1479484

Differential Revision: https://phabricator.services.mozilla.com/D2614


--HG--
rename : xpcom/ds/make_dafsa.py => xpcom/ds/tools/make_dafsa.py
2018-08-01 17:54:41 -04:00
David Keeler
249a65b3d3 bug 1433409 - avoid acquiring nsNSSComponent.mMutex when we don't have to r=franziskus
In some cases, nsNSSComponent functions were acquiring nsNSSComponent's mMutex
to check mNSSInitialized to see if it had been initialized. It turns out this is
unnecessary in some cases because those functions are only callable if
nsNSSComponent has been initialized. This fixes those instances and renames
'mNSSInitialized' to 'mNonIdempotentCleanupMustHappen' to make it clear exactly
what that boolean represents.

Differential Revision: https://phabricator.services.mozilla.com/D2577

--HG--
extra : moz-landing-system : lando
2018-08-01 20:56:28 +00:00
ffxbld
6a905af472 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2501
2018-08-01 16:18:31 -04:00
Franziskus Kiefer
e6061725f9 Bug 1478668 - windows key store adapter, r=keeler
OS key-store adapter for Windows Credential Manager.
It looks like Windows doesn't allow locking the credential manager without locking the desktop. So `lock` and `unlock` are no-ops here.

Depends on D2487.

Differential Revision: https://phabricator.services.mozilla.com/D2550

--HG--
extra : moz-landing-system : lando
2018-08-01 09:34:59 +00:00
Dorel Luca
fa7b36bf43 Backed out changeset e80000bf992c (bug 1478668) for build bustage 2018-08-01 12:26:14 +03:00
Franziskus Kiefer
2b958d46de Bug 1478668 - windows key store adapter, r=keeler
OS key-store adapter for Windows Credential Manager.
It looks like Windows doesn't allow locking the credential manager without locking the desktop. So `lock` and `unlock` are no-ops here.

Depends on D2487.

Differential Revision: https://phabricator.services.mozilla.com/D2550

--HG--
extra : moz-landing-system : lando
2018-08-01 07:52:13 +00:00
David Keeler
6cb94e9111 bug 1478667 - implement OS key-store adapter for OS X r=franziskus,spohl
This implements support for OS-backed storage of secrets using the OS X keychain
APIs.

Differential Revision: https://phabricator.services.mozilla.com/D2487

--HG--
extra : moz-landing-system : lando
2018-07-31 20:52:56 +00:00
Boris Zbarsky
754087a992 Bug 1446940 part 5. Stop getting docshells from windows via getInterface in dom/editor/etc code. r=kmag 2018-08-01 13:07:11 -04:00
David Keeler
89db979440 bug 1475084 - add tests for tampered COSE signatures in add-ons r=dveditz
Differential Revision: https://phabricator.services.mozilla.com/D2148

--HG--
extra : moz-landing-system : lando
2018-07-30 21:48:53 +00:00
Kris Maglione
031076f2f3 Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : source : fcfb99baa0f0fb60a7c420a712c6ae7c72576871
extra : histedit_source : 5be9b7b29a52a4b8376ee0bdfc5c08b12e3c775a
2018-05-21 16:58:23 -07:00
Kris Maglione
02ba563399 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : source : 0d69b4fb1ed43751cfcbc0b4f2fe3b6a49bc0494
extra : histedit_source : d0ce31513ffaae2fd7f01f6567a97b6d2d96b797%2Cfff837de7a00fa90809d2c3e755097180dfd56d8
2018-05-20 18:10:16 -07:00
Narcis Beleuzu
561ccb2ceb Backed out 2 changesets (bug 1463016, bug 1463291) for geckoview failures
Backed out changeset fcfb99baa0f0 (bug 1463291)
Backed out changeset 0d69b4fb1ed4 (bug 1463016)
2018-07-29 03:55:23 +03:00
Kris Maglione
cb1ee1e34d Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : rebase_source : a13c59d1a5ed000187c7fd8e7339408ad6e2dee6
2018-05-21 16:58:23 -07:00
Kris Maglione
636f1839e5 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : rebase_source : 36565ef5e74360aad14062005e5bdab2939e888b
2018-05-20 18:10:16 -07:00
Jeff Gilbert
0e128a3868 Bug 1470985 - s/PodEqual/ArrayEqual/ from ArrayUtils.h. - r=waldo
We can't use memcmp to compare PODs, largely because of undefined
padding. The rest of the Pod* functions are fine though, since we're
replicating or zeroing PODs.

MozReview-Commit-ID: LSspAi8qCWw
2018-07-27 14:11:18 -07:00
Csoregi Natalia
3708e71462 Merge inbound to mozilla-central. a=merge 2018-07-27 00:58:11 +03:00
Franziskus Kiefer
4b196d2f5b Bug 1472104 - autograph COSE test-case, r=keeler
This adds a test with an extension signed by autorgraph with cose and pk7.

Differential Revision: https://phabricator.services.mozilla.com/D1855

--HG--
extra : moz-landing-system : lando
2018-07-26 09:18:38 +00:00
Dipen Patel
7641beb1f8 Bug 1475647 - Remove nsISSLStatusProvider interface. r=baku,Gijs,jchen,jryans,keeler,mcmanus
- Access nsISSLStatus directly as a member of nsITransportSecurityInfo
and nsISecureBrowserUI.  This is part of a larger effort to consolidate
nsISSLStatus and nsITransportSecurityInfo.
- The TabParent implementation of GetSecInfo will always return null.
- Removed unnecessary QueryInterface calls
- Style adherence updates

MozReview-Commit-ID: Dzy6t2zYljL

--HG--
extra : rebase_source : 9c400bed3c9d29a186fc987c9bd0ffceb37bfd94
2018-07-13 11:48:55 -07:00
Andreea Pavel
d0f6470c17 Backed out changeset c235d6f86c22 (bug 1475647) for breaking firefox ui at testing/firefox-ui/tests/puppeteer/test_tabbar.py on a CLOSED TREE 2018-07-25 19:34:58 +03:00
Dipen Patel
8670057dd5 Bug 1475647 - Remove nsISSLStatusProvider interface. r=baku,Gijs,jchen,jryans,keeler,mcmanus
- Access nsISSLStatus directly as a member of nsITransportSecurityInfo
and nsISecureBrowserUI.  This is part of a larger effort to consolidate
nsISSLStatus and nsITransportSecurityInfo.
- The TabParent implementation of GetSecInfo will always return null.
- Removed unnecessary QueryInterface calls
- Style adherence updates

MozReview-Commit-ID: Dzy6t2zYljL

--HG--
extra : rebase_source : fbfbcf7608efbfb35c9be4018ff0f4e70b2768d2
2018-07-13 11:48:55 -07:00
Franziskus Kiefer
3d0b306faa Bug 1464828 - DAR API with libsecret and NSS back-end, r=keeler,m_and_m,froydnj
This implements an API in `nsIOSKeyStore.idl` and `OSKeyStore.cpp` to encrypt and decrypt bytes with a key that is stored in the OS key store.
There are two OS adapters in this patch.
Libsecret is used on Linux if available.
The NSS key store is used as fallback if no OS specific key store is implemented.

Differential Revision: https://phabricator.services.mozilla.com/D1858

--HG--
extra : rebase_source : 99d7d646968a46a13ffa61885bb246f6d3e443e4
2018-07-26 16:05:35 +02:00
David Keeler
8dc4d88166 bug 1475775 - clean up old NSS DB file after upgrade if necessary r=franziskus,mattn
Reviewers: franziskus, mattn

Bug #: 1475775

Differential Revision: https://phabricator.services.mozilla.com/D2202

--HG--
rename : security/manager/ssl/tests/unit/test_sdr_preexisting_with_password.js => security/manager/ssl/tests/unit/test_sdr_upgraded_with_password.js
rename : security/manager/ssl/tests/unit/test_sdr_preexisting_with_password/key3.db => security/manager/ssl/tests/unit/test_sdr_upgraded_with_password/key3.db
extra : rebase_source : 8c736b786e3bf22644bc7c14bf6d6ce20ddd38ad
extra : amend_source : 8fccc2f496d9cb99915725f09e2fbe81217326bb
2018-07-17 13:51:00 -07:00
trisha
fbed68adb3 Bug 1463759 Change the copy of certificate error pages r=johannh
MozReview-Commit-ID: LbZBwSk1xX4

--HG--
extra : rebase_source : 27329d727b15b7310df81494d16de38bd0760d42
2018-07-04 18:15:43 +05:30
David Keeler
85865937f5 bug 1300420 - add enterprise root support for OS X r=spohl,franziskus
If the preference security.enterprise_roots.enabled is set to true, the platform will import trusted TLS certificates from the OS X keystore.

Differential Revision: https://phabricator.services.mozilla.com/D2169

--HG--
extra : moz-landing-system : lando
2018-07-20 19:28:09 +00:00
ffxbld
8463a3ef58 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2237

--HG--
extra : moz-landing-system : lando
2018-07-19 13:45:10 +00:00
David Keeler
bb80df018c bug 1301547 - remove ancient workaround in client certificate code r=franziskus
Apparently a prehistoric server implementation would send a
certificate_authorities field that didn't include the outer DER SEQUENCE tag, so
PSM attempted to detect this and work around it. Telemetry indicates this is
unnecessary now: https://mzl.la/2Lbi1Lz

--HG--
extra : rebase_source : 6669586d657efb243070a4ceb231583b40823543
extra : amend_source : e87f7c84c6c1a51637914bde5950268409b70571
2018-07-16 16:30:15 -07:00
Coroiu Cristina
f3162b921c Merge mozilla-central to mozilla-inbound a=merge on a CLOSED TREE 2018-07-17 12:48:47 +03:00
Kris Maglione
adc29b7d10 Bug 1473631: Part 13 - Replace pref observers with callbacks in DataStorage. r=njn
MozReview-Commit-ID: 4UFghn8JDTu

--HG--
extra : rebase_source : eaf2096d9c6abc2e192c3f6bb637b3473bfd62d8
2018-07-05 15:13:13 -07:00
Kris Maglione
0bfdb4329f Bug 1473631: Part 0a - Make preference callbacks typesafe. r=njn
I initially tried to avoid this, but decided it was necessary given the number
of times I had to repeat the same pattern of casting a variable to void*, and
then casting it back in a part of code far distant from the original type.

This changes our preference callback registration functions to match the type
of the callback's closure argument to the actual type of the closure pointer
passed, and then casting it to the type of our generic callback function. This
ensures that the callback function always gets an argument of the type it's
actually expecting without adding any additional runtime memory or
QueryInterface overhead for tracking it.

MozReview-Commit-ID: 9tLKBe10ddP

--HG--
extra : rebase_source : 7524fa8dcd5585f5a31fdeb37d95714f1bb94922
2018-07-06 12:24:41 -07:00
ffxbld
e42f8d1c4c No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D2163

--HG--
extra : moz-landing-system : lando
2018-07-16 18:20:48 +00:00
David Keeler
4cb1fcaa51 bug 1475105 - refactor platform-specific enterprise root code into its own file r=franziskus
By separating the platform-specific code that finds enterprise roots to load
into its own file, we can make it easier to both add support for other
platforms and maintain the implementations going forward.

Differential Revision: https://phabricator.services.mozilla.com/D2103

--HG--
extra : moz-landing-system : lando
2018-07-13 17:30:16 +00:00
Brian Grinstead
a2384c2234 Bug 1475304 - Remove broadcasters that only have one observer;r=Gijs,johannh
MozReview-Commit-ID: KbYBy2RjK1i

--HG--
extra : rebase_source : 285700446cd9c183fbf6589d461c88b755d4af8c
2018-07-16 11:47:58 -07:00
ffxbld
e67dfde604 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D2093

--HG--
extra : moz-landing-system : lando
2018-07-12 13:23:01 +00:00
Gurzau Raul
cf965b1f59 Merge inbound to mozilla-central. a=merge 2018-07-12 01:04:09 +03:00
Jan de Mooij
4f7b2378dc Bug 1474273 - Add xpc::CurrentNativeGlobal and use it instead of NativeGlobal(JS::CurrentGlobalOrNull(cx)). r=bz 2018-07-11 14:07:02 +02:00
Mathieu Leplatre
4300c52ada Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : f6932e5c3014ce0bb8e29e08468e4e533130273e
2018-06-14 20:54:19 +02:00
Noemi Erli
d218f98059 Backed out changeset 101f97abc1d4 (bug 1458917) for Talos failures on a CLOSED TREE 2018-07-11 05:11:11 +03:00
Mathieu Leplatre
068afbc416 Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : 171ed0ff11e2b60a17055412c64584dfe5ab90d5
2018-06-14 20:54:19 +02:00
David Keeler
4e4ecfddb6 bug 1470918 - use only one thread for all DataStorage instances r=franziskus,froydnj
This introduces a helper class that provides one thread all DataStorage
instances can use to do background work. This thread should have a light
workload which mainly consists of reading some files at startup, periodically
writing to these files, and writing them again at shutdown. One thread should be
able to handle this and in any case having multiple threads trying to perform
i/o at the same time would probably be less efficient than merely performing the
work sequentially.

Differential Revision: https://phabricator.services.mozilla.com/D1890

--HG--
extra : moz-landing-system : lando
2018-07-09 19:50:33 +00:00
David Keeler
2542b77071 bug 1471932 - avoid deadlock when loading 3rd party roots r=franziskus
ChangeCertTrustWithPossibleAuthentication should never be called while holding
nsNSSComponent::mMutex, because doing so can result in showing the master
password dialog, which spins the event loop, which can cause other code to run
that may attempt to acquire the same lock (e.g. speculative connect checking
nsNSSComponent to see if the user has smart cards or client certificates).

Differential Revision: https://phabricator.services.mozilla.com/D2011

--HG--
extra : moz-landing-system : lando
2018-07-09 19:34:02 +00:00
ffxbld
05d14001f5 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D2023

--HG--
extra : moz-landing-system : lando
2018-07-09 11:29:08 +00:00
Tiberius Oros
65a30935a5 Merge inbound to mozilla-central. a=merge 2018-07-03 00:53:57 +03:00
Mark Banner
312a9dd7f5 Bug 1470455 - Add the 'expected' arguments to throws/rejects for security/manager/ssl/tests/unit/test_sts_parser.js. r=keeler
MozReview-Commit-ID: 7eXMuESG1nF

--HG--
extra : rebase_source : 0297376918f141cc7fc36b17192deb4f85e9cf00
2018-06-22 11:56:44 +01:00
ffxbld
45647ab56b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1912

--HG--
extra : moz-landing-system : lando
2018-07-02 11:49:52 +00:00
Franziskus Kiefer
b3c2f7b624 Bug 1470030 - follow-up fixing covertiy null-deref issue, r=keeler
Summary: Coverity found this issue. We shouldn't continue if n is null because CERT_LIST_NEXT dereferences n.

Differential Revision: https://phabricator.services.mozilla.com/D1876

--HG--
extra : rebase_source : 8023a38425194099f334c6624ce2bd5f2e50cb95
extra : amend_source : 27947d33f9dbb0afa9ae5927dde874957eb4017c
2018-07-02 10:39:19 +02:00
Margareta Eliza Balazs
b7abfb1fa3 Backed out changeset 9aa9b21d0108 (bug 1458917) for android reftest failures @ mozilla::net::nsSocketTransport::InitiateSocket on a CLOSED TREE 2018-06-28 15:47:07 +03:00
Mathieu Leplatre
028d1b3c75 Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : 772245debd83d36396b8f37de5374af44908079b
2018-06-14 20:54:19 +02:00
David Keeler
9b69a30991 bug 1470030 - convert manually-written nsINSSComponent definition to idl r=fkiefer
Defining nsINSSComponent in idl rather than manually in a header file allows us
to make full use of the machinery that already exists to process and generate
the correct definitions. Furthermore, it enables us to define JS-accessible APIs
on nsINSSComponent, which enables us to build frontend features that can work
directly with the data and functionality the underlying implementation has
access to.

MozReview-Commit-ID: JFI9s12wmRE

--HG--
extra : rebase_source : 16b660e37db681c8823cbb6b7ff59dd0d35f7e73
2018-06-20 16:43:18 -07:00
Dorel Luca
cb4cac9822 Backed out changeset 23948209664a (bug 1458917) for Eslint failure and reftest crashes. CLOSED TREE 2018-06-27 17:48:57 +03:00
Mathieu Leplatre
ecf7e33ee7 Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : fd52d047a5355b3b454bf4171402b949b8e084e3
2018-06-14 20:54:19 +02:00
ffxbld@mozilla.com
e762be2e5e No Bug, mozilla-central repo-update HSTS HPKP remote-settings. a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1745
2018-06-21 09:34:33 -04:00
Gurzau Raul
18dd35caa7 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-19 13:05:34 +03:00
Andi-Bogdan Postelnicu
80f61e9bf9 Bug 1453795 - PSM-Security - Initialize member fields in classes/ structures. r=keeler
--HG--
extra : rebase_source : 80312f8c119e8b999216fcd99df3764e66d3c43a
2018-06-18 12:31:47 +03:00
ffxbld
49e314358a No Bug, mozilla-central repo-update HSTS HPKP remote-settings. r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1693
2018-06-18 17:38:40 -04:00
Mark Banner
b30ac6aacd Bug 1456762 - Remove now unnecessary import-globals-from statements in html files. r=mossop
Depends on D1643

MozReview-Commit-ID: 84M50HDg0wl

Differential Revision: https://phabricator.services.mozilla.com/D1644
2018-06-16 08:21:33 +00:00
Dorel Luca
b53fbe3617 Merge mozilla-central to autoland 2018-06-15 05:43:31 +03:00
Andi-Bogdan Postelnicu
9acd552c83 Bug 1453795 - Security/Manager - Initialize member fields in classes/ structures. r=dkeeler 2018-06-14 11:31:03 +03:00
ffxbld
bc0b3720c9 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings. r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1615
2018-06-12 17:28:55 -04:00
Dipen Patel
e9b298da8e Bug 1463936 - Set default security.pki.name_matching_mode to enforce (3) for all builds. r=jcj
MozReview-Commit-ID: CK3zoKfGfEr

--HG--
extra : rebase_source : fe20f240a66d809177d30043fd9f41682073cd34
2018-06-11 14:52:07 -07:00
Joel Maher
50b91c0a14 Bug 1405428 - skip-if = verify on mochitests which do not pass test-verify. r=gbrown 2018-06-10 05:01:47 -04:00
Narcis Beleuzu
854ba596ee Backed out changeset 2b65a8f99622 (bug 1465562) for mochitest failures on test_cache_padding.html. CLOSED TREE 2018-06-09 00:14:44 +03:00
David Keeler
5d4f4e7312 bug 1439383 - clean up the load loadable roots thread when we're done with it r=froydnj,jcj
MozReview-Commit-ID: J5GnpwxYguz

--HG--
extra : rebase_source : 8e403d3619f2a6a9b726c9da512e8878e2703f21
2018-06-07 15:11:49 -07:00
David Keeler
8fc3ab5cf3 bug 1465562 - ensure succeededCertChain is set in TLS handshakes with session resumption r=fkiefer
When doing TLS session resumption, Firefox currently does not have enough
information to trivially reconstitute the original connection's security
information. Consequently, we have to rebuild the certificate chain in the
handshake callback. Before this patch, we determined the EV and CT status of the
connection but did not set the succeeded cert chain unless the certificate was
EV. This was insufficient. In this patch, we set the succeeded cert chain
regardless of if the certificate is EV or not (provided we found a valid chain).

MozReview-Commit-ID: AuKrlBwX1Qh

--HG--
extra : rebase_source : 357ec38ce8c768ac5218d05ccaea5d1b45af8dfd
2018-06-07 10:41:25 -07:00
Kris Maglione
7b7264f453 Bug 1464548: Part 3 - Update callers to use defineLazyGlobalGetters. r=mccr8
MozReview-Commit-ID: 9APGewiDDYB

--HG--
extra : rebase_source : 2931dd0eec0e4206414b698a9700fc20d922eb3a
2018-05-25 17:02:29 -07:00
ffxbld
9511e1aa4b No bug, mozilla-central repo-update. r=mtabara
No bug, Automated HSTS preload list update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated HPKP preload list update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated blocklist update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated remote settings update from task PFJDsn1_RJyPxtwQXtin8A

Differential Revision: https://phabricator.services.mozilla.com/D1580
2018-06-07 14:03:58 -04:00
David Keeler
d4901f4908 bug 1466942 - avoid l10n string bundles in nsNSSComponent initialization r=fkiefer
Before this patch, nsNSSComponent initialization would call PK11_ConfigurePKCS11
with some localized strings, which contributed to startup time. Also,
PK11_UnconfigurePKCS11 was never called, so the memory allocated to these
strings would stick around forever. This patch addresses both of these problems
by not calling PK11_ConfigurePKCS11. This means that some properties of NSS'
internal "PKCS#11 slots/tokens" have to be localized when displaying them to the
user.

MozReview-Commit-ID: BbAgbgpFfFG

--HG--
extra : rebase_source : b633da8fea683675d0c0514a378954332afeb024
2018-06-04 17:07:06 -07:00
Narcis Beleuzu
cf464eabfe Merge inbound to mozilla-central. a=merge 2018-06-06 20:00:09 +03:00
Sylvestre Ledru
a3ce8a59cd Bug 1464869 - Fix flake8/pep8 issue by hand in security/ r=fkiefer
MozReview-Commit-ID: ExDsMJ9KzJQ

--HG--
extra : rebase_source : e17c44e94c371d168f3c34ecbd640fb87cd2e863
2018-05-27 10:36:45 +02:00
Sylvestre Ledru
9fa6cfa8d4 Bug 1464869 - Run autopep8 on security/ r=fkiefer
MozReview-Commit-ID: K3aWVqsO0O8

--HG--
extra : rebase_source : 6bcf97b8b4a6e70113f36d8097f26816ce4b0acf
2018-05-26 06:47:27 -07:00
Narcis Beleuzu
cce21bfe40 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-06 12:52:15 +03:00
Boris Zbarsky
5945884066 Bug 1466727 part 6. Stop using nsITreeColumn in layout. r=mossop 2018-06-05 23:01:37 -04:00
Boris Zbarsky
3473c823b2 Bug 1466727 part 2. Remove use of nsITreeColumn in xpidl interfaces. r=mossop
There is one actual behavior change here, in the webidl version of
TreeBoxObject::GetCellAt.  I believe this change fixes a leak of the
nsTreeColumn, but could use careful review.

I tried to avoid changes not needed to get this compiling.  There will be a lot
more cleanup in the next few changesets.
2018-06-05 23:01:36 -04:00
arthur.iakab
fd0ee7c9b8 Merge inbound to mozilla-central a=merge 2018-06-06 00:58:30 +03:00
Boris Zbarsky
d20d5e61f5 Bug 1466673 part 4. Stop using nsITreeColumns in various other C++ code. r=mossop 2018-06-05 13:30:17 -04:00
Miko Mynttinen
4c85ef17cc Bug 1465060 - Part 1: Fix warnings for std::move() use r=froydnj
MozReview-Commit-ID: HpdFXqQdIOO

--HG--
extra : rebase_source : 1e7eea4f2d4ec16ec0c559a8afb26976ddbf4d07
2018-06-01 17:59:07 +02:00
arthur.iakab
7e765f798b Backed out 2 changesets (bug 1465060) for build bustages on security/sandbox/linux/reporter/SandboxReporter.cpp
Backed out changeset 7c8905b6b226 (bug 1465060)
Backed out changeset 10446073eca8 (bug 1465060)
2018-06-03 19:25:41 +03:00
Miko Mynttinen
8d9dc85cd4 Bug 1465060 - Part 1: Fix warnings for std::move() use r=froydnj
MozReview-Commit-ID: HpdFXqQdIOO

--HG--
extra : rebase_source : 619d0e0ff63a2453c80f0c4d9beb906d43fa9b01
2018-06-01 17:59:07 +02:00
Andreea Pavel
4ced6e8b2d Merge mozilla-central to autoland. a=merge 2018-06-03 07:27:01 +03:00
ffxbld
ee72038b8e No bug, Automated HSTS preload list update from task BqRcopwHQbGAhBJA_2Vuzw
Summary:
No bug, Automated HPKP preload list update from task BqRcopwHQbGAhBJA_2Vuzw

No bug, Automated blocklist update from task BqRcopwHQbGAhBJA_2Vuzw

No bug, Automated remote settings update from task BqRcopwHQbGAhBJA_2Vuzw

Reviewers: mtabara, jlund

Reviewed By: mtabara

Differential Revision: https://phabricator.services.mozilla.com/D1473

--HG--
extra : rebase_source : 8326a0602e40d57f8fb3da5dd047a5b3840bc77f
2018-06-01 15:56:55 +01:00
Emilio Cobos Álvarez
fffb25b74f Bug 1465585: Switch from mozilla::Move to std::move. r=froydnj
This was done automatically replacing:

  s/mozilla::Move/std::move/
  s/ Move(/ std::move(/
  s/(Move(/(std::move(/

Removing the 'using mozilla::Move;' lines.

And then with a few manual fixups, see the bug for the split series..

MozReview-Commit-ID: Jxze3adipUh
2018-06-01 10:45:27 +02:00
David Keeler
1fa719d5ca bug 1461803 - minor cleanup in PSM: (re)move nsNSSErrors to NSSErrorsService r=jcj
Also removes displayUnknownCertErrorAlert, which was declared but never used.
Also removes some unnecessary ns(I)CertOverrideService OID stuff.

MozReview-Commit-ID: 4o7c1TkKeKJ

--HG--
extra : rebase_source : a8069b76fc847e6b4d158e4b30a75bde3e290ed9
2018-06-01 16:23:17 -07:00
David Keeler
23798b7e5f bug 1465976 - remove all find*ByName APIs from PSM PKCS#11 module/slot/token interfaces r=fkiefer,jcj
Before this patch, we exposed a few interfaces that revolved around mapping a
name to a specific PKCS#11 module, slot, or token. These APIs were all either
problematic and/or unnecessary. In theory there could be two tokens in different
modules with the same name, so nsIPK11TokenDB.findTokenByName wasn't guaranteed
to return what the consumer expected it to. In general, these APIs were used by
front-end code to go from a handle on the specific object in question to a
string identifier and then back to a handle on the object. This was unnecessary
- we can just retain the original handle.

MozReview-Commit-ID: IbqLbV4wceA

--HG--
extra : rebase_source : 05d39afd6bed0aa5e7694e1c79baf836edc03214
2018-05-31 14:46:06 -07:00
Andreea Pavel
38bcf897f1 Merge mozilla-inbound to mozilla-central. a=merge 2018-05-31 13:04:21 +03:00
arthur.iakab
f1046ac67f Merge mozilla-central to inbound 2018-05-31 01:08:35 +03:00
Andrea Marchesini
1273dc5391 Bug 1446933 - Remove 'using namespace mozilla::net' from BackgroundUtils.h, r=qdot 2018-05-30 21:21:17 +02:00
David Keeler
b0ca052e73 bug 1465258 - remove load group workaround in new OCSP code r=jcj
The patch for bug 1456489 included a workaround for the issue that origin
attributes weren't honored on channels that didn't have a load group set (bug
1456742). Now that that's fixed, we don't need the workaround.

MozReview-Commit-ID: I4ExIqt6dYo

--HG--
extra : rebase_source : d323c0860989985b72933dcffd62743b9d73644d
2018-05-29 16:03:37 -07:00
David Keeler
6031c1d1be bug 1464505 - remove some unused localization helpers from nsNSSComponent r=fkiefer
nsNSSComponent::PIPBundleFormatStringFromName and ::GetNSSBundleString are now
unused. They can be removed (which means that nsNSSComponent::mNSSErrorsBundle
can be removed as well).

MozReview-Commit-ID: GAaGawSDL2n

--HG--
extra : rebase_source : 3f683a902e292c6b0cf736773e71fb893074c32b
2018-05-25 13:02:02 -07:00
David Keeler
4483c4670c bug 1464510 - test_ssl_status.js needs to be run sequentially (it uses hardcoded ports) r=mgoodwin
MozReview-Commit-ID: 7MeWq9ZCRd9

--HG--
extra : rebase_source : 421aa6246d71b3ea24f835769c8af61c7658fd02
2018-05-25 13:54:43 -07:00
David Keeler
571854a7c1 bug 1464520 - hard-code the builtin roots module name to avoid a dependency on l10n in nsNSSComponent r=fkiefer,jcj
nsNSSComponent startup and shutdown would be simpler if there were no direct
dependencies on localized strings. This patch removes a dependency on the
localized name of the builtin roots module by hard-coding the name internally
and then mapping it to/from the localized version as appropriate.

MozReview-Commit-ID: 30kbpWFYbzm

--HG--
extra : rebase_source : 3d384af5a9fa45d5ac1f78e1fcb0dd9e4b94267d
2018-05-25 11:22:48 -07:00
David Keeler
d0f63cd6ba bug 1463901 - re-arrange some nsNSSComponent initialization/shutdown operations to avoid hanging r=jcj
Before this patch, if nsNSSComponent initialization failed after allocating the
XPCOM object for the component but before dispatching the load loadable roots
task, BlockUntilLoadableRootsLoaded would block indefinitely in ShutdownNSS
(called from ~nsNSSComponent).

This patch re-arranges some things so that nsNSSComponent cleanup won't block on
the load loadable roots task if it never fired. It also splits the cleanup into
idempotent operations and operations that can only be run once.

Unfortunately if nsNSSComponent initialization fails, Firefox is likely to exit
or fail promptly anyway (since it is essential to so many other components).
However, quitting outright is probably a better experience than hanging
indefinitely.

MozReview-Commit-ID: RWmBUV2pEU

--HG--
extra : rebase_source : e2d06178ecc8ca8681eef18cb3af0a9ac8f83d1c
2018-05-23 15:39:38 -07:00
David Keeler
ca855468dd bug 1461037 - lossily convert invalid UTF8 in certificates for display purposes r=jcj
In debug builds, we assert if any UTF8-to-UTF16 conversion fails. If we have
invalid UTF8 in a certificate, we don't want to assert. So, we now lossily
convert invalid UTF8 in certificates for any display purposes.
This also handles fields that are supposed to be ASCII in a similar way.

MozReview-Commit-ID: 6TdVPDTmNlh

--HG--
extra : rebase_source : 17000bd0671551bbdae534a4eaf4946c1b0beb83
2018-05-15 16:41:46 -07:00
David Keeler
f4f551dca4 bug 1465562 - ensure succeededCertChain is set in TLS handshakes with session resumption r=fkiefer
When doing TLS session resumption, Firefox currently does not have enough
information to trivially reconstitute the original connection's security
information. Consequently, we have to rebuild the certificate chain in the
handshake callback. Before this patch, we determined the EV and CT status of the
connection but did not set the succeeded cert chain unless the certificate was
EV. This was insufficient. In this patch, we set the succeeded cert chain
regardless of if the certificate is EV or not (provided we found a valid chain).

MozReview-Commit-ID: AuKrlBwX1Qh

--HG--
extra : rebase_source : cafb17548666f6330038012e36fa23ef382f361a
2018-06-07 10:41:25 -07:00
ffxbld
af37fd8a7f No Bug, mozilla-central repo-update HSTS HPKP remote-settings. r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1652
2018-06-14 13:01:41 -04:00
Csoregi Natalia
2f779be8d9 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-06-02 01:03:45 +03:00
David Keeler
0dec465e26 bug 1465933 - remove GetPIPNSSBundleString from nsINSSComponent r=fkiefer
At this point, all uses of GetPIPNSSBundleString *should* be on the main thread,
so we can just remove the nsINSSComponent version and rely on the
nsNSSCertHelper instance.

MozReview-Commit-ID: Lt7AgokGKRH

--HG--
extra : rebase_source : 95d3cf6e011468e2aa9df9bb69372ac4d3430286
2018-05-31 12:26:04 -07:00
Narcis Beleuzu
59ffb03449 Backed out changeset 01b407d8a5af (bug 1453795) for build bustages on CertVerifier.h . CLOSED TREE 2018-06-19 07:38:57 +03:00
Andi-Bogdan Postelnicu
be47373507 Bug 1453795 - PSM-Security - Initialize member fields in classes/ structures. r=keeler
--HG--
extra : rebase_source : 4e22100b95356d8f36f26459c985dbfb064453d1
2018-06-18 12:31:47 +03:00
David Keeler
d8f748b996 bug 401240 - part 2/2 - reimplement PKCS#12 import/export without goto r=fkiefer
MozReview-Commit-ID: JUMmTPrEYND

--HG--
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12.js
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12_with_master_password.js
extra : rebase_source : 3bf01e722f496b4dba634ed5d0345ce1fe0ceea7
2018-05-11 11:37:50 -07:00
David Keeler
18117a994a bug 401240 - part 1/2 - run ./mach clang-format on nsPKCS12Blob r=fkiefer
MozReview-Commit-ID: 81m6dxhg8Pv

--HG--
extra : rebase_source : c9d3bed637e163cc6347f6626067aaf9b773db8c
2018-05-11 11:09:00 -07:00
Nika Layzell
2d188849ae Bug 1455217 - Part 3: Use the new xpidl Promise type instead of nsISupports, r=bz 2018-05-14 17:55:54 -04:00
J.C. Jones
db950df22f Bug 1461373 - Set BRNameMatchingPolicy to "Enforce" for Nightly r=keeler
Summary:
Change the security.pki.name_matching_mode pref to 3 for Enforce on Nightly.

BR_9_2_1_SUBJECT_ALT_NAMES show that ~99.98% of encountered certificates have
an acceptable SAN, so our compatibility risk is about 0.02%.

BR_9_2_2_SUBJECT_COMMON_NAME also shows, 99.89% of certificate common names are
present in a subject alternative name extension, giving a worst-case of 0.11%
risk, though BR_9_2_1_SUBJECT_ALT_NAMES is more what we're affecting here.

Test Plan: none

Reviewers: keeler

Tags: #secure-revision

Bug #: 1461373

Differential Revision: https://phabricator.services.mozilla.com/D1277

--HG--
extra : transplant_source : %BF%7D%DEi%C7%9BhE%D0%C2d%9D0%AC%F8%9EM%E0%60U
2018-05-14 09:55:15 -07:00
Kris Maglione
250e7028e3 Bug 1385057: Remove most code for handling unpacked side-loaded extensions. r=aswan,keeler
MozReview-Commit-ID: H4cSRBws4Ml

--HG--
extra : rebase_source : ddddef92344b6414ae4e5635b9841fcc274dfca9
2018-05-09 16:04:04 -07:00
Margareta Eliza Balazs
4f9a2ba08e Merge inbound to mozilla-central. a=merge 2018-05-11 12:36:02 +03:00
J.C. Jones
4139925b80 Bug 1441914 - Make security.pki.distrust_ca_policy a bitmask r=fkiefer r=keeler
Per Bug 1437754 comment 10, the pref security.pki.distrust_ca_policy makes more
sense as a bitmask than a state. To permit future nuance, let's go ahead and do
that before people start implementing atop Bug 1456112.

This does permit both 0b10 and 0b11 to enable the functionality for Firefox 63.

--HG--
extra : transplant_source : %84%AF%89%E0%89dT%01%10%84%A0%3B%A5%28%2A%D3%E1%B0%0D%E7
2018-05-07 15:46:22 -07:00
David Keeler
6499399d3c bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : 73d39788ce39adcbe01c89867061f64d05a3876b
2018-05-07 17:05:30 -07:00
Coroiu Cristina
683720f5ee Backed out changeset 0693ec09dd68 (bug 1427248) for bustage at build/src/security/manager/ssl/nsNSSComponent.cpp on a CLOSED TREE 2018-05-10 23:32:46 +03:00
David Keeler
65635d2855 bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : ad0fb83a0de3632e3a967e91aec3d8070b22dedc
2018-05-07 17:05:30 -07:00
ffxbld
7c7bbfe6e0 No bug, Automated HSTS preload list update from task XSqPd8faStCdsylVmzvQ6w
Summary:
No bug, Automated HPKP preload list update from task XSqPd8faStCdsylVmzvQ6w

No bug, Automated blocklist update from task XSqPd8faStCdsylVmzvQ6w

Reviewers: sfraser, aki

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1256

--HG--
extra : rebase_source : 855e19990c75e2613bd311976297fb6513e02b94
2018-05-10 12:14:28 +01:00
Csoregi Natalia
f034c0ab5d Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-05-10 12:52:31 +03:00
David Keeler
3b971d708e bug 1460312 - cancel the timeout timer in OCSP request implementation r=jcj
Bug 1456489 cleaned up our OCSP request implementation a bit. One simplification
it made was to not cancel the timeout timer. It turns out that if we don't, the
OCSPRequest that constitutes the timeout callback's closure might not be valid
if the request has completed (because the timer doesn't own a strong reference
to it). The fix is simple: cancel the timer when the request completes. Note
that we don't have to do the reverse because necko has a strong reference to the
request.

MozReview-Commit-ID: 2WHFLAcGBAw

--HG--
extra : rebase_source : c4216f6792c1d62cbd046b1b3802226c51fbe8af
2018-05-09 10:06:49 -07:00
David Keeler
e218ab3e3b bug 1460350 - re-land bug 1415991 (remove support for verifying signed unpacked add-ons) r=kmag
(Backed out changeset 6bbf8dc0b86e (which was a backout of changeset 0a5795108e0a))

MozReview-Commit-ID: EZFn7dLBcdh

--HG--
extra : rebase_source : 8fac1e33a7f108a248ecde35779b2c63ce7d9172
2018-05-09 10:19:37 -07:00
Kris Maglione
01c298aca6 Bug 1460092: Add ESLint rule to enforce use of ChromeUtils.generateQI. r=Gijs
Also fixes existing code which fails the rule.

MozReview-Commit-ID: CkLFgsspGMU

--HG--
extra : rebase_source : 86a43837659aa2ad83a87eab53b7aa8d39ccf55b
2018-05-08 18:36:22 -07:00
David Keeler
6ea4fb08d4 bug 1456489 - prevent making OCSP requests on the main thread r=fkiefer,jcj
OCSP requests cannot be performed on the main thread. If we were to wait for a
response from the network, we would be blocking the main thread for an
unnaceptably long time. If we were to spin the event loop while waiting (which
is what we do currently), other parts of the code that assume this will never
happen (which is essentially all of them) can break.

As of bug 867473, no certificate verification happens on the main thread, so no
OCSP requests happen on the main thread. Given this, we can go ahead and
prohibit such requests.

Incidentally, this gives us an opportunity to improve the current OCSP
implementation, which has a few drawbacks (the largest of which is that it's
unclear that its ownership model is implemented correctly).

This also removes OCSP GET support. Due to recent OCSP server implementations
(namely, the ability to cache OCSP POST request responses), OCSP GET is not a
compelling technology to pursue. Furthermore, continued support presents a
maintenance burden.

MozReview-Commit-ID: 4ACDY09nCBA

--HG--
extra : rebase_source : 072564adf1836720e147b8250afca7cebe4dbf62
2018-04-23 18:09:35 +02:00
David Keeler
6da3ace3da bug 686149 - improve PKCS7 certificate export to not use legacy path building r=fkiefer
MozReview-Commit-ID: 2U4J8uUlvaN

--HG--
extra : rebase_source : c416a552e31a6ef38a5d394374e212f00210b334
2018-05-02 10:22:58 -07:00
arthur.iakab
f2042a4c1f Merge inbound to mozilla-central a=merge 2018-05-08 15:42:06 +03:00
J.C. Jones
8d99d56270 Bug 1456112 - Add a pref to implement the last Symantec Distrust step r=keeler
This adds another preference (DistrustSymantecRootsRegardlessOfDate == 2) that
stops permitting certificates issued after 1 June 2016, and updates the test to
check it.

--HG--
extra : transplant_source : %F1%DE%16m%F2%DD%A8Ei%EF%B4%CAo%BF%8D%A6%A6%5E%D4%89
2018-05-04 09:34:45 -07:00
David Keeler
999c7366ef bug 1346297 - remove expired family safety telemetry probe r=jcj
MozReview-Commit-ID: BCc5Fa9jWJ2

--HG--
extra : rebase_source : fa965818e96fae6f2c23d33c9bcf6cb224b7935b
extra : amend_source : a1c08417b0a5f3b8de4c5b2025c559111e6597c2
2018-05-03 12:44:14 -07:00
ffxbld
ab372e51b4 No bug, Automated HSTS preload list update from task AUKIqPPXTDSaxMvWC7BXWg
Summary: No bug, Automated HPKP preload list update from task AUKIqPPXTDSaxMvWC7BXWg

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1117

--HG--
extra : rebase_source : d68fc2b597321f42c66b798db4f8f9cf0b209a73
2018-05-03 12:44:37 +01:00
David Keeler
066f38fa62 bug 1458074 - un-do the firefox-appdir addition in PSM's xpcshell.ini r=kmag
Bug 1372694 added a firefox-appdir line to PSM's xpcshell.ini. It turns out this
breaks running these tests locally because utilities like BadCertServer can't be
found. I looks like the change isn't necessary, so the simplest thing to do
would be to just remove the addition.

MozReview-Commit-ID: 8fg8ujPWxRe

--HG--
extra : rebase_source : ffef9b067dacb94c4bd554f97556ab95f58efd2b
2018-04-30 15:21:41 -07:00
ffxbld
b9d16384c0 No bug, Automated HSTS preload list update from task QWd7FyT5RE-MJF4dSdL4TQ
Summary: No bug, Automated HPKP preload list update from task QWd7FyT5RE-MJF4dSdL4TQ

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1063

--HG--
extra : rebase_source : 7d37ffc7fcbca533ae8cf1b532671b78407ac8cd
2018-04-30 12:45:23 +01:00
Kris Maglione
a259026c9d Bug 1456035: Part 4 - Convert callers of XPCOMUtils.generateQI to ChromeUtils.generateQI. r=mccr8
This also removes any redundant Ci.nsISupports elements in the interface
lists.

This was done using the following script:

acecb401b7/processors/chromeutils-generateQI.jsm

MozReview-Commit-ID: AIx10P8GpZY

--HG--
extra : rebase_source : a29c07530586dc18ba040f19215475ac20fcfb3b
2018-04-22 20:55:06 -07:00
ffxbld
1a695c2e33 No bug, Automated HSTS preload list update from task GjhOFReSQGqVESpdTdZ3FA
Summary: No bug, Automated HPKP preload list update from task GjhOFReSQGqVESpdTdZ3FA

Reviewers: sfraser

Reviewed By: sfraser

Tags: #secure-revision

Differential Revision: https://phabricator.services.mozilla.com/D1045

--HG--
extra : rebase_source : 53c75df4ac650d24bb7f4da8e7d3eab675dcac3b
2018-04-26 16:19:47 +01:00
Margareta Eliza Balazs
fa0ffa186e Merge mozilla-central to autoland. a=merge CLOSED TREE
--HG--
rename : toolkit/mozapps/extensions/internal/XPIProviderUtils.js => toolkit/mozapps/extensions/internal/XPIDatabase.jsm
2018-04-24 14:51:28 +03:00
Tim Nguyen
92c9a958e1 Bug 1372694 - Stop making the default theme a heavyweight theme. r=kmag,aswan
MozReview-Commit-ID: 30wMauuc9oo

--HG--
rename : browser/base/content/default-theme-icon.svg => toolkit/mozapps/extensions/content/default-theme-icon.svg
extra : rebase_source : 5e4cf784135f4a8e40a2ed8357ba651e7fce9728
2018-04-01 13:53:31 +02:00
Sylvestre Ledru
aefcd1c84b Bug 1448934 - Fix some spelling mistakes in locales/en-US r=flod
MozReview-Commit-ID: vGVudVgB31

--HG--
extra : rebase_source : cdc39375a3485a3133878c4dbbffe60c0b26e917
2018-04-24 10:26:35 +02:00
ffxbld
23863f75f8 No bug, Automated HSTS preload list update from task NB7sJcsHTtqWs431n9VnuQ
Summary:
No bug, Automated HPKP preload list update from task NB7sJcsHTtqWs431n9VnuQ

No bug, Automated blocklist update from task NB7sJcsHTtqWs431n9VnuQ

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1012

--HG--
extra : rebase_source : d69fb8de90258fb3030bfcd323e1564247558972
2018-04-23 11:54:49 +01:00
J.C. Jones
6fad8e3ff1 Bug 1441338 - Change pgo certificates to use certspec/keyspec files r=keeler r=franziskus
(This also fixes Bug 879740 and Bug 1204543.)

build/pgo/certs contains an NSS database set that has a bunch of hand-generated
certificates, and many of these hand-generated certificates are specifically
depended upon for a variety of unit tests. This patch changes all of these to
use the "pycert.py" and "pykey.py" utilities that produce deterministic keys
and certificates.

The naming convention here is new, and defined in the README. It is based on
the mochitest runtest.py naming convention that imports .ca and .client
PEM-encoded certificates.

Unfortunately, the updates to build/pgo/genpgocert.py to generate these files
depends on OpenSSL in order to produce PKCS12 archives for pk11tool to import
into NSS. This could be done with pure-NSS tooling, but it'd require some new
command line functionality, which is out-of-scope for this change.

Note that build/pgo/genpgocert.py no longer takes arguments when run. It's not
run automatically anywhere that I can see, but could (reasonably) be, now.

Differential Revision: https://phabricator.services.mozilla.com/D971

--HG--
extra : amend_source : bc389b9b0a807a4889feb14db439daa28635dfe9
2018-04-23 11:14:17 +02:00
Cosmin Sabou
4595d43d3a Merge inbound to mozilla-central. a=merge
--HG--
rename : browser/modules/offlineAppCache.jsm => toolkit/modules/offlineAppCache.jsm
2018-04-20 01:29:10 +03:00
David Keeler
2c25bac533 bug 867473 - (4/4) remove nsIX509Cert.issuer and getChain r=jcj
These functions cause main-thread certificate verifications, which is bad for
performance. In general, nsIX509CertDB.asyncVerifyCertAtTime should be used
instead.

MozReview-Commit-ID: 9nkUDmyFY0k

--HG--
extra : rebase_source : d3e8a02e2d21e5507e71681b88f0360edf64b790
2018-04-17 13:07:52 -07:00
David Keeler
df11944f15 bug 867473 - (3/4) replace use of nsIX509Cert.getChain() with an asynchronous API r=fkiefer,jcj
MozReview-Commit-ID: 8Ag6BrlyASU

--HG--
extra : rebase_source : 0c50d55c90301b19139d6f4a50694f1458d752f4
2018-04-17 12:41:23 -07:00
David Keeler
4ad6f791bc bug 867473 - (2/4) move certificate chain utility functions to a shared location r=fkiefer,jcj
MozReview-Commit-ID: JxlN95YLwRq

--HG--
extra : rebase_source : b4a5cacdc336cb8cfa0bad5a2a705667928e5167
2018-04-17 12:37:15 -07:00
David Keeler
98a4d728f8 bug 867473 - (1/4) refactor certificate chain utility functions in certViewer.js r=fkiefer,jcj
MozReview-Commit-ID: EvDtrr4t1ZO

--HG--
extra : rebase_source : a0787be343b55466135c02d944f3c199310b8d51
2018-04-17 12:33:04 -07:00
Nika Layzell
5e2e5fc993 Bug 1444991 - Part 5: Make some XPCOM methods more strongly typed, r=bz
This patch goes through and changes a bunch of places in our tree which mention
this bug to use the new feature, making the methods more strongly typed.

There are probably more places in tree which could be changed, but I didn't try
to find them.
2018-04-17 19:21:05 -04:00
ffxbld
34c1dbb780 No bug, Automated HSTS preload list update from task H62DxEEORdK66XAfNOW16w
Summary:
No bug, Automated HPKP preload list update from task H62DxEEORdK66XAfNOW16w

No bug, Automated blocklist update from task H62DxEEORdK66XAfNOW16w

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D990

--HG--
extra : rebase_source : 37159492c64768f9d70c08d38756c5c749b949a8
2018-04-19 14:28:52 +01:00
shindli
805cb19c1d Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-04-17 01:45:58 +03:00
ffxbld
dfc349cf61 No bug, Automated HSTS preload list update from task bXFc8JIdQA-9jXbS0HWQ5Q
Summary: No bug, Automated HPKP preload list update from task bXFc8JIdQA-9jXbS0HWQ5Q

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D949

--HG--
extra : rebase_source : d7e310d16a0e74b84b3317c379b16ab1d14224bc
2018-04-16 11:54:18 +01:00
ffxbld
63b501185d No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-04-13 13:48:38 -07:00
ffxbld
2bdc792b00 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-04-13 13:48:34 -07:00
Sebastian Hengst
0819f35e51 Backed out 4 changesets (bug 525063) on request from Andi. a=backout
Backed out changeset 516c4fb1e4b8 (bug 525063)
Backed out changeset 6ff8aaef2866 (bug 525063)
Backed out changeset bf13e4103150 (bug 525063)
Backed out changeset d7d2f08e051c (bug 525063)
2018-04-13 16:01:28 +03:00
Kris Maglione
f3fde21a8b Bug 1453835: Remove unused nsIDataSignatureVerifier utility. r=keeler
MozReview-Commit-ID: ElmHAzKu9TA

--HG--
extra : rebase_source : 20baffc4e0cb175327cc2edc4a6cacb762a9e378
2018-04-12 16:19:49 -07:00
ffxbld
dd8da1bdb9 No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-04-12 13:46:52 -07:00
ffxbld
ad2621e3a9 No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-04-12 13:46:48 -07:00
Margareta Eliza Balazs
1dff32311e Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-04-12 12:46:52 +03:00
ffxbld
5fc7975f83 No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-04-11 20:02:24 -07:00
ffxbld
b3933f31e5 No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-04-11 20:02:20 -07:00
Franziskus Kiefer
96474d646c Bug 1450967 - MITM error string update, r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D894

--HG--
extra : rebase_source : fe99a9d36c0a08b129f3008ac7b5e7b0dc1dd2ca
2018-04-12 08:44:31 +02:00
Tristan Bourvon
a3a77c0312 Bug 525063 - Initialize uninitialized class attributes in m-c. r=ehsan 2018-04-10 21:11:02 +02:00
arthur.iakab
280690d83e Merge mozilla-central to inbound 2018-04-11 01:02:05 +03:00
Nika Layzell
0c3ba13e4c Bug 1437167 - Part 1: Stop using PRIntervalTime as the argument to CondVar::Wait and Monitor::Wait, r=mstange, r=froydnj 2018-04-10 17:49:47 -04:00
ffxbld
a822851bc4 No bug, Automated HPKP preload list update from host bld-linux64-spot-327 - a=hpkp-update 2018-04-10 13:54:43 -07:00
ffxbld
7951af6d38 No bug, Automated HSTS preload list update from host bld-linux64-spot-327 - a=hsts-update 2018-04-10 13:54:39 -07:00
David Keeler
fd3dbbaaa3 bug 1453741 - (2/2) remove nsIX509CertDB.findCertByEmailAddress r=fkiefer,jcj
nsIX509CertDB.findCertByEmailAddress performs multiple certificate verifications
on the main thread, which is bad because it blocks the main thread and can cause
nested event loop spinning. Firefox doesn't even use this function. Other
products that use this function will either have to re-implement it locally or
find some other workaround.

MozReview-Commit-ID: HShl0H8cgxs

--HG--
extra : rebase_source : 63ee16b600ca7c2867352ee1ad791eb79b82a77c
2018-04-12 12:46:25 -07:00
David Keeler
2b9926416f bug 1453741 - (1/2) remove nsIX509CertDB.verifyCert{AtTime,Now} r=fkiefer,jcj
These functions perform certificate verification on the main thread, which is
already a bad idea. They can also cause OCSP requests to be made from the main
thread, which will cause nested event loop spinning, which is an even worse
idea. Luckily this really only affects tests.

MozReview-Commit-ID: LqDAgDmlyER

--HG--
extra : rebase_source : c86414db0b6d6e7e83b5e3f371506b773813cdbf
2018-04-11 16:23:48 -07:00
ffxbld
be73b556ca No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-04-09 13:41:47 -07:00
ffxbld
f6fd590531 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-04-09 13:41:43 -07:00
ffxbld
ed89d1323c No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-04-08 13:36:33 -07:00
ffxbld
47fd054933 No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-04-08 13:36:29 -07:00
ffxbld
115b36861c No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-04-07 13:43:15 -07:00
ffxbld
56215bff29 No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-04-07 13:43:11 -07:00
Noemi Erli
eb61878455 Merge inbound to mozilla-central. a=merge 2018-04-07 00:55:15 +03:00
ffxbld
befd24c6b5 No bug, Automated HPKP preload list update from host bld-linux64-spot-327 - a=hpkp-update 2018-04-06 13:51:28 -07:00
ffxbld
22c60c2e4c No bug, Automated HSTS preload list update from host bld-linux64-spot-327 - a=hsts-update 2018-04-06 13:51:24 -07:00
Franziskus Kiefer
29fd899298 Bug 1450967 - mitm detection v0.0.1, r=keeler,johannh
Differential Revision: https://phabricator.services.mozilla.com/D839

--HG--
extra : amend_source : 7f1df88370d425230cfbe656742c30255dc6e08e
2018-03-16 11:36:50 +01:00
ffxbld
f148878e67 No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-04-05 13:52:51 -07:00
ffxbld
5aba0e69b8 No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-04-05 13:52:47 -07:00
ffxbld
b9a5abc6cb No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-04-04 13:55:30 -07:00
ffxbld
2586dc163b No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-04-04 13:55:26 -07:00
Cosmin Sabou
0ae0457289 Backed out changeset 5be07e86738e (bug 1439383) for causing leaks (bug 1401883). a=backout 2018-04-04 21:03:38 +03:00
ffxbld
ea8050e2b0 No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2018-04-03 13:48:33 -07:00
ffxbld
08d5281463 No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2018-04-03 13:48:29 -07:00
ffxbld
5158a406f7 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-04-02 14:03:17 -07:00
ffxbld
68c7ae8378 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-04-02 14:03:13 -07:00
ffxbld
dafc1094f6 No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-04-01 19:11:09 -07:00
ffxbld
bc62258c3c No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-04-01 19:11:05 -07:00
ffxbld
f7fdb9dae5 No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-03-31 14:00:13 -07:00
ffxbld
0cc199f815 No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-03-31 14:00:10 -07:00
ffxbld
dd8e8d3d86 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-30 21:57:51 -07:00
ffxbld
796d46d5c5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-30 21:57:48 -07:00
Ciure Andrei
5d841a3421 Merge inbound to mozilla-central. a=merge 2018-03-30 01:06:18 +03:00
ffxbld
a9fc548e72 No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-03-29 13:39:43 -07:00
ffxbld
768c746599 No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-03-29 13:39:39 -07:00
David Keeler
d8435632fc bug 1424311 - don't persist the certificate exception dialog's size so it doesn't grow unboundedly r=jcj
window.sizeToContent() apparently interacts poorly with windows that have a
persisted size (see bug 90276, which is a 5-digit bug that hasn't been touched
in over a decade). As a workaround, don't persist the certificate exception
dialog's size. This means we have to call window.sizeToContent() more often and
unfortunately results in the window growing and shrinking again on Windows, but
at least it will always be the "right size" for its content.

MozReview-Commit-ID: 9UT3X8IEqZg

--HG--
extra : rebase_source : 9d968748bd77328eea4ae11e1ae746de9401fb4d
2018-03-28 13:43:03 -07:00
ffxbld
3a0bbe90a6 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-03-28 13:43:42 -07:00
ffxbld
cb9393f7c7 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-03-28 13:43:38 -07:00
Margareta Eliza Balazs
7f19ad998a Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-03-28 00:59:33 +03:00
Margareta Eliza Balazs
adebb06ac1 Merge inbound to mozilla-central. a=merge 2018-03-28 00:48:11 +03:00
ffxbld
a359cb4b0f No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-03-27 13:35:58 -07:00
ffxbld
75fdd4ddaf No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-03-27 13:35:54 -07:00
Henri Sivonen
77b94189e1 Bug 1448756 - Use AssignLiteral and AssignASCII for short zero-terminated strings in PSM. r=keeler.
MozReview-Commit-ID: 9GUHkUG6SlP

--HG--
extra : rebase_source : 593c57761877018db8c7f4acfd7f0f8251060074
2018-03-26 09:13:14 +03:00
David Keeler
b0d30e4bf9 bug 1449060 - remove some dynamic OIDs from the certificate viewer that don't serve any purpose r=fkiefer
MozReview-Commit-ID: IccdDvYMTP4

--HG--
extra : rebase_source : bedc23b8b49cc6f4fedf5d7f17932bc971e78d20
2018-03-26 17:21:04 -07:00
Franziskus Kiefer
5c6b90f0b8 Bug 1448787 - separate error for self-signed certs, r=keeler,johannh
Reviewed By: keeler, johannh

Bug #: 1448787

Differential Revision: https://phabricator.services.mozilla.com/D805

--HG--
extra : rebase_source : 3a9317445c7df5f09675da67888930304b75fc4b
2018-03-29 11:51:33 +02:00
Franziskus Kiefer
806baa5430 Bug 1415279 - Move error strings for certError and netError pages to frontend, r=johannh,keeler,Honza,snorp
This patch moves all TLS error string handling to the frontend.
Dev-tools doesn't show the same error code as the page does anymore but only the error code as string.
All logging of these error messages has been removed.

Bug #: 1415279

Differential Revision: https://phabricator.services.mozilla.com/D607

--HG--
extra : rebase_source : 61e2d94cb21ef4c02b81448531609205c85a9707
2018-03-27 13:31:52 +02:00
ffxbld
a3336ea2e2 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-03-26 13:20:52 -07:00
ffxbld
9eb99d8544 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-03-26 13:20:48 -07:00
ffxbld
5dd69d1516 No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-03-25 13:32:21 -07:00
ffxbld
97b38a3ffb No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-03-25 13:32:17 -07:00
shindli
2640499cc4 Merge autoland to mozilla-central. a=merge 2018-03-25 12:32:20 +03:00
ffxbld
854a93183e No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-25 00:41:27 -07:00
ffxbld
65b51bcedd No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-25 00:41:23 -07:00
ffxbld
d380323764 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-24 00:08:51 -07:00