Commit Graph

11727 Commits

Author SHA1 Message Date
ffxbld
3dc6ceb427 No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-04-30 07:50:30 -07:00
ffxbld
0d823cefd8 No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-04-30 07:50:27 -07:00
ffxbld
38fdbbcaa4 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-29 07:55:26 -07:00
ffxbld
ca0521550a No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-29 07:55:24 -07:00
Wes Kocher
f831128354 Merge autoland to central, a=merge
MozReview-Commit-ID: B7tVdcR40eh
2017-04-28 15:43:18 -07:00
David Keeler
1ef3597000 bug 1360623 - add hash algorithm constants to pykey for easier consumer use r=jcj
For signing, pykey.py delegates to 3rd party libraries. One of these libraries
expects hash algorithms to be specified in the form "SHA-256" whereas the other
expects "sha256". Consumers of pykey shouldn't need to be aware of this detail.
This patch introduces constants HASH_SHA1, HASH_SHA256, etc. and changes pykey
to determine which string literals to use itself.

MozReview-Commit-ID: 27laM2uXMwJ

--HG--
extra : rebase_source : 9b74f486f7535671fd26c59e3e9cc3b4459f15e0
2017-04-28 11:06:28 -07:00
ffxbld
784ec1af14 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-28 07:52:40 -07:00
ffxbld
ce8bde832b No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-28 07:52:37 -07:00
David Keeler
f900f10f03 bug 1361201 - decrease OCSP soft timeout to 1 second on prerelease builds r=jcj
MozReview-Commit-ID: ENYyG8ZeXYe

--HG--
extra : rebase_source : 5c30b914a39a2dce89190c7d5db703952408aae3
2017-05-01 17:05:31 -07:00
David Keeler
3caa6189aa bug 1349312 - part 2/2: add pyct.py and generate test certificate transparency information r=Cykesiopka,jcj
MozReview-Commit-ID: 9Htv04PfRzb

This introduces pyct.py with the capability of generating Signed Certificate
Timestamps for our test certificates. Also introduces a simple testcase that
should validate correctly under current CT requirements as well as one that does
not validate due to an insufficient number of SCTs.

(Note that "validate" in this case does not refer to the overall TLS handshake
result, because CT is not currently required. It more or less refers to the
value of certificateTransparencyStatus of the SSLStatus of the connection's
securityInfo - see nsISSLStatus.idl.)

--HG--
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.key => security/manager/ssl/tests/unit/test_ct/default-ee.key
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.key.keyspec => security/manager/ssl/tests/unit/test_ct/default-ee.key.keyspec
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.pem => security/manager/ssl/tests/unit/test_ct/default-ee.pem
rename : security/manager/ssl/tests/unit/bad_certs/default-ee.pem.certspec => security/manager/ssl/tests/unit/test_ct/default-ee.pem.certspec
rename : security/manager/ssl/tests/unit/bad_certs/test-ca.pem => security/manager/ssl/tests/unit/test_ct/test-ca.pem
rename : security/manager/ssl/tests/unit/bad_certs/test-ca.pem.certspec => security/manager/ssl/tests/unit/test_ct/test-ca.pem.certspec
extra : rebase_source : 66c5a5e16eeb47c97972248d61a4f1cbadf59a49
2017-04-17 14:55:35 -07:00
David Keeler
c138b8d0b6 bug 1349312 - part 1/2: patch CT implementation to include debug-only test logs r=Cykesiopka,jcj
MozReview-Commit-ID: Gay4bliuiDc

This modifies getCTKnownLogs.py to inject 3 debug-only Certificate Transparency
log keys and 2 organizations ("Mozilla Test Org 1" and "2") for use with
integration tests. Also updates CTKnownLogs.h as generated by the python script.

The debug logs use the "default", "secp256r1", and "alternate" keys that are
already present in our testing infrastructure (see pykey.py).

--HG--
extra : rebase_source : 3d4fc736f840cd080fab6b8c6c5b53cc9361abf2
2017-04-19 14:02:26 -07:00
David Keeler
455ab646d3 bug 1337950 - work around failing to load a FIPS PKCS#11 module DB in NSS initialization r=Cykesiopka,jcj
Firefox essentially does not support running NSS in FIPS mode any longer. This
has always been the case on Android from what I can tell and it has been the
case on OS X since at least version 34 (see bug 1047584). It became the case on
Windows as of version 53 (see bug 1295937). Unfortunately, before this patch,
if a user attempted to run an affected version of Firefox using a profile
directory containing an NSS database collection that had FIPS enabled, NSS
initialization would fail and fall back to running in no DB mode, which had the
side-effect of making any saved passwords and certificates unavailable. This
patch attempts to detect and work around this failure mode by moving the
PKCS#11 module DB (which is where the FIPS bit is set) to a backup location and
basically running with a fresh, non-FIPS module DB. This allows Firefox to
initialize NSS with the preexisting key and certificate databases available.

MozReview-Commit-ID: 1E4u1ngZyRv

--HG--
rename : security/manager/ssl/tests/unit/test_sdr_preexisting.js => security/manager/ssl/tests/unit/test_broken_fips.js
rename : security/manager/ssl/tests/unit/test_sdr_preexisting/key3.db => security/manager/ssl/tests/unit/test_broken_fips/key3.db
extra : rebase_source : 887f457e998d6e57c6536573fbe3cb10547fe154
2017-04-20 10:31:22 -07:00
Wes Kocher
be34ade6b6 Merge autoland to central, a=merge
MozReview-Commit-ID: 2pgVZdnDKno
2017-04-27 12:44:03 -07:00
ffxbld
068e6f2925 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-04-27 07:52:27 -07:00
ffxbld
7d28817077 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-04-27 07:52:24 -07:00
Jed Davis
3c4e538953 Bug 1361238 - Re-allow accept4, used by accessibility. r=gcp
MozReview-Commit-ID: 3M3T3bkx4nP

--HG--
extra : rebase_source : b67332889615ae34cc67737da361f21ae545aeb4
2017-05-01 21:51:11 -06:00
Jed Davis
7d9acbdace Bug 1358647 - Disallow bind/listen/accept for Linux content processes. r=gcp
MozReview-Commit-ID: Cz9MKxOJnsS

--HG--
extra : rebase_source : d3ab7ff9020066d5fe9ac3121c88c85b9fde6224
2017-04-25 19:29:32 -06:00
Wes Kocher
226702fd85 Merge m-c to autoland a=merge
MozReview-Commit-ID: LOGgOErcV9L
2017-04-26 17:43:38 -07:00
ffxbld
ce5ccb6a8c No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-04-26 08:02:08 -07:00
ffxbld
728d6a0b30 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-04-26 08:02:05 -07:00
ffxbld
876c7dd305 No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2017-04-25 07:57:31 -07:00
ffxbld
1d0cdb27cb No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2017-04-25 07:57:28 -07:00
David Keeler
fe73f5843c bug 1356499 - put NCSCCS pins into production mode r=mgoodwin
As requested by James Burton<jb@0.me.uk> and vouched for (via email) by
Lucas Garron <lgarron@google.com>.

MozReview-Commit-ID: HD9laXzJpRg

--HG--
extra : rebase_source : 7c632c6772509a3c4c03cf971ee0f62ad5225275
2017-04-25 14:33:07 -07:00
David Keeler
f821131b3b bug 1361893 - remove two unnecessary mutexes and a cast from SSLServerCertVerification.cpp r=kmckinley
gSSLVerificationPK11Mutex isn't used at all - it can be removed
gSSLVerificationTelemetryMutex is unnecessary because telemetry has its own lock:

https://dxr.mozilla.org/mozilla-central/rev/a748acbebbde373a88868dc02910fb2bc5e6a023/toolkit/components/telemetry/TelemetryHistogram.cpp#1135
https://dxr.mozilla.org/mozilla-central/rev/a748acbebbde373a88868dc02910fb2bc5e6a023/toolkit/components/telemetry/TelemetryHistogram.cpp#1984

The nsNSSSocketInfo* cast in SSLServerCertVerificationResult::Run() is
unnecessary because mInfoObject is a RefPtr<nsNSSSocketInfo>.

MozReview-Commit-ID: DG7qWGg2amQ

--HG--
extra : rebase_source : 0a475d7aba75ba4debecc7cec2ed14319082d9ab
2017-05-03 16:44:17 -07:00
Wes Kocher
05a47acee9 Merge m-c to inbound a=merge
MozReview-Commit-ID: 3NCtyMc525N
2017-04-24 16:14:52 -07:00
Wes Kocher
94ff05c50d Merge autoland to central, a=merge
MozReview-Commit-ID: EaYU8ma2C4H
2017-04-24 15:45:27 -07:00
ffxbld
baf47b352e No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-24 07:53:50 -07:00
ffxbld
e2320972af No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-24 07:53:47 -07:00
ffxbld
313e5199bf No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2017-04-23 07:58:17 -07:00
ffxbld
16b68f30f8 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2017-04-23 07:58:14 -07:00
David Parks
532fe74f04 Bug 1347710 - Enable sandbox protections for the Windows GPU process. r=bobowen
The sandbox works with levels.  The GPU sandbox level defaults to 1 in all builds.  It is controlled by security.sandbox.gpu.level.
2017-04-24 09:46:09 -07:00
ffxbld
cfbd9ba5ea No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-21 07:57:04 -07:00
ffxbld
7e0a6b7086 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-21 07:57:01 -07:00
Carsten "Tomcat" Book
975e251aff merge mozilla-inbound to mozilla-central a=merge 2017-04-21 10:57:02 +02:00
Wes Kocher
4f3c2d9829 Merge m-c to autoland, a=merge
MozReview-Commit-ID: DPzfAm14Tdx
2017-04-20 15:52:28 -07:00
Nathan Froyd
35bd9439ac Bug 1357741 - make nsCertOverrideService's locking more efficient; r=keeler
nsCertOverrideService uses a ReentrantMonitor to protect its inner
state.  However, there's no way for nsCertOverrideService's methods to
be re-entered when calling outside code.  The use of ReentrantMonitor
appears to be compensating for an unclear division of locking
responsibilities, by enabling every method to simply lock the
ReentrantMonitor upon entrance without care for who might have locked it
beforehand.

Using Mutex is cheaper than ReentrantMonitor, and also forces us to
make explicit who's required to do locking, and who needs to do work
with the lock held.
2017-04-20 10:02:19 -04:00
David Keeler
af0ce9fbd6 bug 1357226 - work around a library inefficiency with EC keys when verifying ECDSA signatures r=fkiefer,jcj
Calling VFY_VerifyDigestDirect causes the provided SECKEYPublicKey to be
reimported to the softoken regardless of if it already exists on it. EC keys
must be verified upon import (to see if the point is on the curve to avoid some
small subgroup attacks), and so repeatedly doing this with a static key (say,
for example, a key corresponding to a built-in certificate transparency log) is
inefficient. This patch alters the certificate transparency implementation to
import these keys each once and then use PK11_Verify for ECDSA signature
verification, which doesn't have the same drawback.

Since this change causes CertVerifier to hold an NSS resource (via its
MultiLogCTVerifier having a list of CTLogVerifier, each of which now has a
SECKEYPublicKey), nsNSSComponent has to make sure it goes away before shutting
down NSS. This patch ensures this happens in nsNSSComponent::ShutdownNSS().

MozReview-Commit-ID: 6VSmz7S53y2

--HG--
extra : rebase_source : 4994db9de80a6c1aec3d7e322ff30d040140ce92
2017-04-11 14:11:28 -07:00
Sebastian Hengst
380838cbce merge mozilla-central to autoland. r=merge a=merge 2017-04-19 18:57:30 +02:00
ffxbld
305510c8ee No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-19 08:02:50 -07:00
ffxbld
9847509d90 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-19 08:02:47 -07:00
Mike Hommey
34e619d1c1 Bug 1357323 - Remove support for gonk in the build system. r=gps
Everything depending on the widget being gonk can go away, as well as
everything depending on MOZ_AUDIO_CHANNEL_MANAGER, which was only
defined on gonk builds under b2g/ (which goes away in bug 1357326).

--HG--
extra : rebase_source : 9f0aeeb7eea8417fa4e06d662d566d67ecaf2a24
2017-04-18 16:56:09 +09:00
Cykesiopka
150742ba74 Bug 641120 - Enhance PKCS #11 module load dialog. r=keeler
This changes does several things:
1. Changes some titles to include the word "driver" for better clarity.
2. Moves and cleans up the JS implementation of load_device.xul. Having a
   cleaner implementation in a separate file makes the code easier to discover
   and maintain.
3. Removes code that tries to show a special case message if a module was
   already loaded.
3A. The backend code doesn't provide distinction from this case and failure to
    add in general.
3B. The backend code would only return the error code being checked for if a
    blank module name was provided.
4. Adds tests.

MozReview-Commit-ID: 8BxKWKw5rvp

--HG--
extra : rebase_source : 15a29bf7d46f523a11eac37c9f0c6efb2b5d0114
2017-04-18 22:18:53 +08:00
Wes Kocher
be39489f68 Merge m-c to autoland, a=merge 2017-04-18 14:40:48 -07:00
ffxbld
672628fae3 No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2017-04-18 07:50:59 -07:00
ffxbld
52a0317e95 No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2017-04-18 07:50:56 -07:00
Jed Davis
e6622cfe8a Bug 1355273 - Allow inotify_init alongside inotify_init1. r=Alex_Gaynor,gcp
MozReview-Commit-ID: 5hAapLdbmeh

--HG--
extra : rebase_source : 2646d97dbdbf8803468c7115b50ae9ab91eae1ca
2017-04-14 16:17:39 -06:00
David Keeler
07f34ebd2f bug 1352262 - make OCSP timeout values configurable r=Cykesiopka,jcj
The default OCSP timeout for soft-fail DV is still 2 seconds. This patch makes
it configurable on the interval (0, 5] seconds.

The default OCSP timeout for EV and hard-fail DV is still 10 seconds. This patch
makes it configurable on the interval (0, 20] seconds.

MozReview-Commit-ID: CPd8pwYrJhj

--HG--
extra : rebase_source : 45bd7d06ea013f0a776ea18be9408dedb18271d8
2017-03-31 15:21:40 -07:00
Sebastian Hengst
8bd051237a merge mozilla-inbound to mozilla-central. r=merge a=merge
MozReview-Commit-ID: JpAhOPjgvkF
2017-04-15 19:59:24 +02:00
Alex Gaynor
82705afe91 Bug 1354678 - Switch our sandbox policies to use C++ raw strings and put them in a new header file r=haik
r=haik

MozReview-Commit-ID: Fr5liCjcJtg

--HG--
extra : rebase_source : 3e90f7075e4e5b410ba0b8a08b0c6e403eb925f6
2017-04-14 13:12:09 -04:00
Wes Kocher
20dd5f52c2 Merge m-c to autoland, a=merge 2017-04-13 17:35:34 -07:00
Wes Kocher
514e230373 Merge inbound to central, a=merge 2017-04-13 17:24:01 -07:00
Wes Kocher
4fab232444 Merge autoland to central, a=merge 2017-04-13 13:03:43 -07:00
ffxbld
32e6a63b97 No bug, Automated HPKP preload list update from host bld-linux64-spot-362 - a=hpkp-update 2017-04-13 07:54:30 -07:00
ffxbld
cba3850a02 No bug, Automated HSTS preload list update from host bld-linux64-spot-362 - a=hsts-update 2017-04-13 07:54:28 -07:00
Wes Kocher
2986c817dc Merge autoland to central, a=merge CLOSED TREE 2017-04-12 15:13:30 -07:00
David Keeler
d35dad15a5 bug 1353216 - disable certificate transparency processing for performance concerns r=jcj
MozReview-Commit-ID: 2k7FwC5RCWC

--HG--
extra : rebase_source : 00abdf845929f247bdbb1007a94928f18f8194f4
2017-04-12 10:13:29 -07:00
David Keeler
47263aefb3 bug 1349762 - handle two GlobalSign EV root transfers r=Cykesiopka,jcj
(adapted from bug 1349762 comment 0)
Google Trust Services (GTS) recently purchased two roots from GlobalSign that
are both enabled for EV treatment: "GlobalSign Root CA - R2" and "GlobalSign ECC
Root CA - R4".

However, GTS does not have an EV audit, so we are going to turn off EV treatment
for both of those root certificates.

But "GlobalSign Root CA - R2" has intermediate cert "GlobalSign Extended
Validation CA - SHA256 - G2" that continues to be controlled by GlobalSign, to
be used to migrate their customers off dependence on that root.

This patch removes EV treatment for "GlobalSign ECC Root CA - R4". It also
removes EV treatment for all chains rooted in "GlobalSign Root CA - R2" unless
the "GlobalSign Extended Validation CA - SHA256 - G2" intermediate is in the
chain.

MozReview-Commit-ID: Ej9L9zTwoPN

--HG--
extra : rebase_source : 575f1a48646cf728d879d0cf53c888654e4a32ad
2017-04-03 17:17:38 -07:00
Franziskus Kiefer
c2f4575446 Bug 1345368 - land NSS fa15eb3ce158, r=me 2017-04-12 06:01:03 +02:00
ffxbld
2fc8c8d483 No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2017-04-11 08:57:53 -07:00
ffxbld
7f47ddac39 No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2017-04-11 08:57:50 -07:00
Carsten "Tomcat" Book
ee9da45454 merge mozilla-inbound to mozilla-central a=merge 2017-04-11 10:17:24 +02:00
Ehsan Akhgari
1d72f5911e Bug 1347461 - Part 2: Always initialize all DataStorage classes in the content process at initialization time; r=keeler 2017-04-10 22:44:36 -04:00
Ehsan Akhgari
c0b6db9d07 Bug 1347461 - Part 1: Add a C++ API for the list of DataStorage classes; r=keeler 2017-04-10 22:44:32 -04:00
Alex Gaynor
54bd982c43 Bug 1355083 - Switch from using a #define to alter a sandbox policy to a normal param r=haik
r=haik

MozReview-Commit-ID: KqmRra6NqPa

--HG--
extra : rebase_source : 02bf4390738f8a43ecc07c0a236a2553781df223
2017-04-10 09:53:47 -04:00
Wes Kocher
5eabc03c18 Merge m-c to autoland a=merge 2017-04-10 16:55:21 -07:00
Wes Kocher
05965b79a9 Merge inbound to central, a=merge 2017-04-10 16:32:45 -07:00
Sebastian Hengst
1828ea89ca Backed out changeset 7fdcabdbb675 (bug 1024669) for failing mda, GTest and talos jobs. r=backout on a CLOSED TREE 2017-04-10 19:05:44 +02:00
ffxbld
624d25b298 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-04-10 07:41:09 -07:00
ffxbld
b365172b0d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-04-10 07:41:06 -07:00
Franziskus Kiefer
8cab0b55cc Bug 1345368 - land NSS 7228445b43ac, r=me 2017-04-10 06:00:57 +02:00
Jed Davis
7d599256ca Bug 1354731 - Quietly fail mknod of character devices in content sandbox. r=gcp
MozReview-Commit-ID: 2aehI5V7tQp

--HG--
extra : rebase_source : ea933354e4018542e4dedda63318153c7cfbdd4e
2017-04-11 13:22:26 -06:00
Franziskus Kiefer
de3194dead Bug 1345368 - root hashes follow-up
--HG--
extra : rebase_source : 3a66b23bb951e77d67db10dfcf1703e4e3899826
2017-04-13 10:42:05 +02:00
ffxbld
eace920a03 No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2017-04-09 08:46:38 -07:00
ffxbld
f409b0e1aa No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2017-04-09 08:46:35 -07:00
ffxbld
c4fdb67bca No bug, Automated HPKP preload list update from host bld-linux64-spot-382 - a=hpkp-update 2017-04-08 07:53:50 -07:00
ffxbld
f0ff3df6e9 No bug, Automated HSTS preload list update from host bld-linux64-spot-382 - a=hsts-update 2017-04-08 07:53:47 -07:00
ffxbld
1d4ad52861 No bug, Automated HPKP preload list update from host bld-linux64-spot-307 - a=hpkp-update 2017-04-07 08:52:29 -07:00
ffxbld
f0a8966894 No bug, Automated HSTS preload list update from host bld-linux64-spot-307 - a=hsts-update 2017-04-07 08:52:27 -07:00
Mark Banner
585bf398ea Bug 1342459 - Enable no-undef on browser/base, and clean up unnecessary no-undef references. r=mossop
MozReview-Commit-ID: KVrAnAjMD1E

--HG--
extra : rebase_source : 7a9651c055e2c6e959d42d08e5be9de2e2265346
2017-04-03 11:46:56 +01:00
Alex Gaynor
44ae0c536b Bug 1295700 - Don't allow content processes to access the weave director on macOS r=haik
These directories contain sensitive content, and access is not necessary now that we have file content processes.

r=haik

MozReview-Commit-ID: FiRJkMnlYUx

--HG--
extra : rebase_source : 0bcdefcb1ea410fb26c3f8373673488e2a5fdd75
2017-04-06 15:20:23 -04:00
ffxbld
fcd9f1480d No bug, Automated HPKP preload list update from host bld-linux64-spot-382 - a=hpkp-update 2017-04-06 07:59:12 -07:00
ffxbld
09db00ce74 No bug, Automated HSTS preload list update from host bld-linux64-spot-382 - a=hsts-update 2017-04-06 07:59:09 -07:00
Phil Ringnalda
5da888bcd4 Merge m-c to autoland 2017-04-05 21:34:29 -07:00
Phil Ringnalda
4c78879252 Backed out 2 changesets (bug 1329294) for Win8 debug bustage in test_refresh_firefox.py TestFirefoxRefresh.testReset, a=merged-around-permaorange
Backed out changeset 08e2719fe7be (bug 1329294)
Backed out changeset 3b1bbf6392f4 (bug 1329294)
2017-04-05 21:32:08 -07:00
Wes Kocher
3d900a5d7e Merge inbound to central, a=merge 2017-04-05 14:16:37 -07:00
Bob Owen
f84f44fbfa Bug 1329294 Part 2: Enable content temp file test on Windows. r=haik 2017-04-05 16:34:36 +01:00
ffxbld
b8cce08120 No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-04-05 08:18:11 -07:00
ffxbld
82ea6b684f No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-04-05 08:18:09 -07:00
Alex Gaynor
beb64a1329 Bug 1353040 - Switch from sandbox_init to sandbox_init_with_parameters. r=haik
This API produces much more readable code (though slightly more verbose). While this is not a publicly documented API on macOS, it is used by both WebKit and Chrome.

MozReview-Commit-ID: LVxYT4wBLck

--HG--
extra : rebase_source : 9688981ea0bb4e71f084afc404af705fa68f84a3
2017-04-04 13:40:36 -04:00
Patrick McManus
58fc1b834e Bug 1337791 - Part 1: JoinConnection() from psm. r=keeler 2017-04-03 17:23:09 -04:00
ffxbld
e1482d742a No bug, Automated HPKP preload list update from host bld-linux64-spot-314 - a=hpkp-update 2017-04-04 07:51:21 -07:00
ffxbld
1d823b887b No bug, Automated HSTS preload list update from host bld-linux64-spot-314 - a=hsts-update 2017-04-04 07:51:19 -07:00
ffxbld
381a7b8f8a No bug, Automated HPKP preload list update from host bld-linux64-spot-382 - a=hpkp-update 2017-04-03 08:07:24 -07:00
ffxbld
89740567f2 No bug, Automated HSTS preload list update from host bld-linux64-spot-382 - a=hsts-update 2017-04-03 08:07:21 -07:00
Franziskus Kiefer
d040cb9cea Bug 1345368 - land NSS 1fb7e5f584de, r=me
--HG--
extra : rebase_source : 6ac73d3dc219a02194914ae4cfbe2027c258bbfe
2017-04-03 06:00:54 +02:00
ffxbld
de880295b7 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-04-02 07:47:41 -07:00
ffxbld
c5fb8d9bde No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-04-02 07:47:38 -07:00
ffxbld
fd99701caf No bug, Automated HPKP preload list update from host bld-linux64-spot-308 - a=hpkp-update 2017-04-01 08:01:15 -07:00
ffxbld
91174d78b7 No bug, Automated HSTS preload list update from host bld-linux64-spot-308 - a=hsts-update 2017-04-01 08:01:12 -07:00
Kate McKinley
d082c41757 Bug 1322044 - Only mark a subdomain cached when includeSubDomains is true r=ckerschb,keeler
MozReview-Commit-ID: 3lFkuLauyGg

--HG--
extra : rebase_source : c356f1d4bef73b634eed6ca4d8078281ebc3ce3c
2017-02-13 13:36:01 +09:00
Wes Kocher
264adb55c2 Merge m-c to autoland, a=merge 2017-04-05 14:20:01 -07:00
Cykesiopka
a4b87029fc Bug 1346315 - Enable gcc/clang -Wextra for security/apps/, security/manager/pki/ and security/manager/ssl/. r=keeler
-Wextra implies -Wmissing-field-initializers, but since the latter warning seems
to warn about mostly uninteresting instances (XPCOM module definitions etc), we
disable it for now.

(Note that -Wall is already enabled by default for all directories for gcc and
clang.)

MozReview-Commit-ID: 8RdF51sLPC8

--HG--
extra : rebase_source : 003c1c04e090ec215d058f5adf4c9e72558bbae3
2017-04-04 16:56:26 +08:00
Alex Gaynor
49d40030b6 Bug 1348269 - When SpawnTarget fails during Windows sandboxed process creation, log more information r=bobowen
r=bobowen

MozReview-Commit-ID: HTLPYg870rt

--HG--
extra : rebase_source : 5c7fc4045324d442ff372ec700b57c12c4d10080
2017-04-04 10:54:14 -04:00
Haik Aftandilian
5c4955b4d4 Bug 1354674 - Introduce, but don't enable, a level 3 Mac content sandbox with home directory read access disabled r=Alex_Gaynor
MozReview-Commit-ID: 2LThF6XTsoo

--HG--
extra : rebase_source : 8731aa87bde647cfdbea05cde8376e42f49d9a08
2017-04-07 18:14:01 -07:00
Cervantes Yu
cc5836fbae Bug 1024669 - Part 1: Annotate crash reports with thread names. r=gsvelto
NS_SetCurrentThreadName() is added as an alternative to PR_SetCurrentThreadName()
inside libxul. The thread names are collected in the form of crash annotation to
be processed on socorro.

MozReview-Commit-ID: 4RpAWzTuvPs
2017-02-07 18:57:23 +08:00
Cervantes Yu
364e524eca Bug 1024669 - Part 1: Annotate crash reports with thread names. r=gsvelto
MozReview-Commit-ID: 4RpAWzTuvPs
2017-02-07 18:57:23 +08:00
Bob Owen
48b2af658f Bug 1329294 Part 2: Enable content temp file test on Windows. r=haik 2017-04-10 14:39:58 +01:00
Carsten "Tomcat" Book
02ddc23c74 Backed out changeset 7a52d887bcea (bug 1024669) for bustage 2017-04-10 11:43:49 +02:00
Cervantes Yu
ece1ce1a7d Bug 1024669 - Part 1: Annotate crash reports with thread names. r=gsvelto
MozReview-Commit-ID: 4RpAWzTuvPs
2017-02-07 18:57:23 +08:00
Wes Kocher
23ba88918a Merge m-c to autoland, a=merge 2017-03-31 17:52:17 -07:00
ffxbld
4e20a5b623 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2017-03-31 08:52:14 -07:00
ffxbld
7df2a596c5 No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2017-03-31 08:52:11 -07:00
David Keeler
11c347b6b7 bug 1351604 - don't ship DER.jsm and X509.jsm until they're actually used in production r=Cykesiopka
MozReview-Commit-ID: 2DlMrB5TfKU

--HG--
extra : rebase_source : 9944352ccc66a5fdbd843bda8e4d2b26328d1bdd
2017-03-30 11:00:54 -07:00
Franziskus Kiefer
c2c9435c51 Bug 1345368 - land NSS 215207b4864c, r=me
--HG--
extra : rebase_source : 727d919dd9bd85ee2a5b6dc3d71653d022d136ad
2017-03-31 06:01:05 +02:00
ffxbld
8aa12a88dc No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-03-30 07:59:23 -07:00
ffxbld
27b59fd695 No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-03-30 07:59:20 -07:00
Tim Taubert
00b8400985 Bug 1351779 - Removed unused variable 'loopDetected' from PathBuildingStep::Check() r=keeler 2017-03-29 20:17:06 +02:00
Ryan VanderMeulen
cf8bee36b5 Merge m-c to inbound. a=merge 2017-03-29 09:44:13 -04:00
Ryan VanderMeulen
f4a0d77ffc Merge inbound to m-c. a=merge 2017-03-29 09:41:54 -04:00
Bob Owen
22ff7c4117 Bug 1337331 Part 7: Re-apply - Allow a special all paths rule in the Windows process sandbox when using semantics FILES_ALLOW_READONLY. r=jimm
This also changes the read only related status checks in filesystem_interception.cc to include STATUS_NETWORK_OPEN_RESTRICTION (0xC0000201), which gets returned in some cases and fails because we never ask the broker.

Carrying r=jimm from original changeset:
https://hg.mozilla.org/mozilla-central/rev/1755a454e2de

MozReview-Commit-ID: 4tfygPiKG9Z
2017-03-28 08:36:16 +01:00
Bob Owen
6a5727b408 Bug 1337331 Part 6: Re-apply - Change USER_NON_ADMIN access token level from whitelist to blacklist containing Admin SIDs. r=jimm
Carrying r=jimm from original changeset:
https://hg.mozilla.org/mozilla-central/rev/0e6bf137521e

MozReview-Commit-ID: ExTtkUIPXH8
2017-03-29 14:23:17 +01:00
Franziskus Kiefer
d6f74d9372 Bug 1345368 - land NSS 215207b4864c, r=me
--HG--
rename : security/nss/gtests/ssl_gtest/databuffer.h => security/nss/cpputil/databuffer.h
rename : security/nss/gtests/ssl_gtest/tls_parser.cc => security/nss/cpputil/tls_parser.cc
rename : security/nss/gtests/ssl_gtest/tls_parser.h => security/nss/cpputil/tls_parser.h
extra : rebase_source : 2242a1632ba3a96988a341d84b4abe78dbd4e0b2
2017-03-29 06:01:13 +02:00
Bob Owen
2a12392590 Bug 1344453 Part 2: Add FILES_ALLOW_READONLY rule to all paths when Windows child process should have full read access. r=jimm 2017-03-28 08:36:16 +01:00
Bob Owen
0ee38abf35 Bug 1344453 Part 1: Allow a special all paths rule in the Windows process sandbox when using semantics FILES_ALLOW_READONLY. r=jimm
This also changes the read only related status checks in filesystem_interception.cc to include STATUS_NETWORK_OPEN_RESTRICTION (0xC0000201), which gets returned in some cases and fails because we never ask the broker.
2017-03-28 08:36:16 +01:00
Wes Kocher
f48488db89 Backed out changeset e46f832ac262 (bug 1351604) for browser_all_files_referenced.js failures a=backout
--HG--
extra : rebase_source : a091c76e54559dafa6435c22962231249c9dbac1
2017-03-31 13:20:37 -07:00
David Keeler
093a9fef3a bug 1351604 - don't ship DER.jsm and X509.jsm until they're actually used in production r=Cykesiopka
MozReview-Commit-ID: 2DlMrB5TfKU

--HG--
extra : rebase_source : eef6c21564d831feda43c85e14630b495b5b5761
2017-03-30 11:00:54 -07:00
David Keeler
cb2ce54903 bug 1347859 - prevent dialog overflow in certificate exception dialog by resizing to content r=Cykesiopka
MozReview-Commit-ID: HDjE9QldcxF

--HG--
extra : rebase_source : c0240e37ee10ece4e908b0f542627ab41457242a
2017-03-30 14:00:29 -07:00
Cykesiopka
f4a14ffb4c Bug 1342737 - Avoid using nsCRT.h and nsCRTGlue.h in PSM. r=keeler
There are a few places where we can use the safer functionality provided by the
Mozilla string classes instead.

Also fixes Bug 1268657 (remove vestigial
TransportSecurityInfo::SetShortSecurityDescription declaration).

MozReview-Commit-ID: Cxv5B4bsDua

--HG--
extra : rebase_source : 074a154c9000807d6dd466f23e92289e0d4c76d8
2017-03-28 22:57:15 +08:00
Cykesiopka
593e14fdee Bug 1350599 - Use guaranteed preloaded test domains instead of real domains in HSTS tests. r=keeler
Some of our tests currently assume that certain real domains are HSTS preloaded.
While most of the time these domains are in fact preloaded, this may change
during periods of maintenance or other events.

To avoid this, the changes here perform the following renames:
bugzilla.mozilla.org -> includesubdomains.preloaded.test
login.persona.org -> includesubdomains2.preloaded.test
www.torproject.org -> noincludesubdomains.preloaded.test

In addition, some tests that refer to mozilla.com (but don't depend on it being
preloaded) are made to refer to example.com instead to avoid referring to real
domains in tests.

MozReview-Commit-ID: 3987moJnKGk

--HG--
extra : rebase_source : 0ec49c9a410ba891f11668e7e11c48b7547e1825
2017-03-27 22:56:38 +08:00
Cykesiopka
0e63ffc494 Bug 1350868 - Semi-manually update nsSTSPreloadList.inc to include test domains. r=keeler
Periodic updates on m-c are currently broken due to Bug 1350619, so this change
inserts the test domains into the preload list semi-manually.

MozReview-Commit-ID: EBOiQcKDSHr

--HG--
extra : rebase_source : bc5880af95dc9934132d0e9251d9060ad9c6871a
2017-03-29 07:21:34 +08:00
Cykesiopka
bbd1adad48 Bug 1350868 - Make HSTS preload script preload test domains for use in tests. r=keeler
This lets us migrate off depending on real preloaded domains and onto
domains that are guaranteed to have the correct characteristics.

MozReview-Commit-ID: 4TyOfdIA9I7

--HG--
extra : rebase_source : f49109de9292dec31b72d87819dd52b5a6b659ed
2017-03-29 07:21:01 +08:00
Adam Velebil
69da80395b Bug 1308100 - Replace PL_strlen/PL_strnlen with strlen/strnlen;r=erahm
MozReview-Commit-ID: CGnzomkIsi5
***
Bug 1308100 - Replace PL_strlen/PL_strnlen with strlen/strnlen;r?erahm

--HG--
extra : rebase_source : a14b1538ed91848ecd02fb4607bce4cb9b2ab7c4
2017-04-13 20:47:00 +02:00
Bob Owen
927986bc20 Bug 1337331 Part 5: Re-apply - Add KEY_WOW64_64Key and KEY_WOW64_32KEY to the Chromium sandbox allowed registry read flags. r=aklotz
Carrying r=aklotz from previous changset:
https://hg.mozilla.org/mozilla-central/rev/d24db55deb85
2016-12-22 11:11:07 +00:00
Cykesiopka
dbb0d99a70 Bug 1319252 - Remove nsIX509Cert.getAllTokenNames(). r=keeler,mossop
nsIX509Cert.getAllTokenNames() is only used (improperly) to determine if a
certificate is a built-in. nsIX509Cert.isBuiltInRoot should be used instead.

MozReview-Commit-ID: LBwI8nTc05C

--HG--
extra : rebase_source : 9494cd1243395b0d293022e981f64be560a54dec
2017-03-19 16:02:26 +08:00
Florian Queze
f935ddc4b3 Bug 1356569 - Remove notifyObservers' last parameter when it is falsy, r=jaws. 2017-04-14 21:51:39 +02:00
Florian Queze
37f2343b9a Bug 1356569 - Remove appendElement's last parameter when it is false, r=jaws. 2017-04-14 21:51:39 +02:00
Florian Queze
37ff4fc7cc Bug 1356569 - Remove addObserver's last parameter when it is false, r=jaws. 2017-04-14 21:51:38 +02:00
Sebastian Hengst
a07223d699 Backed out changeset 322fde2d53bf (bug 1356569) so bug 1355161 can be backed out. r=backout 2017-04-14 23:39:22 +02:00
Sebastian Hengst
9e0ecf32c5 Backed out changeset e1f191aad863 (bug 1356569) 2017-04-14 23:39:17 +02:00
Sebastian Hengst
738d097aae Backed out changeset 55f3df15eaa6 (bug 1356569) 2017-04-14 23:39:17 +02:00
Florian Queze
3c564a2b02 Bug 1356569 - Remove notifyObservers' last parameter when it is falsy, r=jaws. 2017-04-14 21:51:39 +02:00
Florian Queze
93a734a3ce Bug 1356569 - Remove appendElement's last parameter when it is false, r=jaws. 2017-04-14 21:51:39 +02:00
Florian Queze
95d4d20c17 Bug 1356569 - Remove addObserver's last parameter when it is false, r=jaws. 2017-04-14 21:51:38 +02:00
Phil Ringnalda
81c566a8a2 Merge autoland to m-c, a=merge 2017-03-25 18:38:42 -07:00
Phil Ringnalda
2e782ce511 Bug 1350599 - disable hsts tests which depend on bugzilla.mozilla.org always being in the preload list, a=bustage
--HG--
extra : source : 997b98cce1aebf76641e14c79ac250cdb147041c
2017-03-25 14:04:24 -07:00
Carsten "Tomcat" Book
5f408d092d Merge mozilla-central to mozilla-inbound 2017-03-24 14:29:00 +01:00
Carsten "Tomcat" Book
0a1fc914ce Backed out changeset d9872fdd25f8 (bug 1337331) for causing build problems for others + on request on bob 2017-03-24 11:24:13 +01:00
Carsten "Tomcat" Book
50ef4d1d1b Backed out changeset 226c893c5d62 (bug 1337331) 2017-03-24 11:23:42 +01:00
Carsten "Tomcat" Book
3a931395eb Backed out changeset 438b6307c802 (bug 1337331) 2017-03-24 11:23:40 +01:00
Carsten "Tomcat" Book
8dd606e5ce Backed out changeset c4aa6b85411d (bug 1337331) 2017-03-24 11:23:37 +01:00
Carsten "Tomcat" Book
a69a0cc262 Backed out changeset 5cd2e692ee0c (bug 1337331) 2017-03-24 11:23:35 +01:00
Carsten "Tomcat" Book
ed6b3bc409 Backed out changeset 0dd9bae0b6b1 (bug 1337331) 2017-03-24 11:23:33 +01:00
Wes Kocher
2ea6238e55 Merge inbound to central, a=merge
MozReview-Commit-ID: 6od53T3ozcm
2017-03-23 16:15:37 -07:00
ffxbld
e21d1dde53 No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-03-23 07:49:00 -07:00
ffxbld
4458112d90 No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-03-23 07:48:58 -07:00
Bob Owen
b99c6e7ae0 Bug 1337331 Part 6: Re-apply - Change USER_NON_ADMIN access token level from whitelist to blacklist containing Admin SIDs. r=jimm
Carrying r=jimm from original changeset:
https://hg.mozilla.org/mozilla-central/rev/0e6bf137521e

MozReview-Commit-ID: ExTtkUIPXH8
2017-03-23 10:29:05 +00:00
Franziskus Kiefer
c055a4757e Bug 1345368 - land NSS 06158d335df0, r=me
--HG--
extra : rebase_source : 75bb3b75d3bbbd4ba3a4e199fa0ad8c999ab38af
2017-03-24 08:38:05 +01:00
Wes Kocher
04968c7c99 Merge m-c to autoland, a=merge
MozReview-Commit-ID: DwtKxCKV42X
2017-03-24 17:20:07 -07:00
David Keeler
d4f3dd148e bug 1345612 - avoid calling NS_NewURI on IP addresses when checking certificate overrides r=Cykesiopka
When determining if a certificate error override is allowed for a host, we
consult nsISiteSecurityService::IsSecureURI to see if the host is HSTS/HPKP.
This API takes an nsIURI, but the calling code only has a hostname as an
nsCString. Calling NS_NewURI works in all situations we will encounter except
when the hostname is an IPv6 address. Since IP addresses are never HSTS/HPKP
anyway, we can skip the NS_NewURI / IsSecureURI calls in those cases as a
workaround.

MozReview-Commit-ID: JXa8cGvqqTA

--HG--
extra : rebase_source : b8dcd2cb4211af230f867ce3954d5333b7a49684
2017-03-20 13:42:27 -07:00
ffxbld
71d521184f No bug, Automated HPKP preload list update from host bld-linux64-spot-388 - a=hpkp-update 2017-03-22 07:50:19 -07:00
ffxbld
cebf9f4e25 No bug, Automated HSTS preload list update from host bld-linux64-spot-388 - a=hsts-update 2017-03-22 07:50:16 -07:00
Mark Banner
d7d8be9285 Bug 1347712 - Move toolkit/.eslintrc.js rules into a 'recommended' set within eslint-plugin-mozilla. r=jaws
MozReview-Commit-ID: Jy4apKnmWcV

--HG--
rename : toolkit/.eslintrc.js => tools/lint/eslint/eslint-plugin-mozilla/lib/configs/recommended.js
extra : rebase_source : ae0c740c1c2a9cf620c1ac34024622ade12e6fd4
2017-03-22 10:43:00 +01:00
Mark Banner
bd625e4e9f Bug 1347712 - Change the testing configurations into ESLint configurations within eslint-plugin-mozilla - automatically update .eslintrc.js test config files for new config locations. r=jaws
MozReview-Commit-ID: LH0CQOPfoe6

--HG--
extra : rebase_source : 83eaf40c5cbb5e25cfb3f3b5afadf4fbf0422c92
2017-03-20 12:36:37 +01:00
Wes Kocher
9a54a919a0 Merge m-c to autoland, a=merge
MozReview-Commit-ID: 2LT2oEKZno8
2017-03-21 16:20:49 -07:00
ffxbld
06c4675584 No bug, Automated HPKP preload list update from host bld-linux64-spot-094 - a=hpkp-update 2017-03-21 08:22:11 -07:00
ffxbld
eb520767a4 No bug, Automated HSTS preload list update from host bld-linux64-spot-094 - a=hsts-update 2017-03-21 08:22:08 -07:00
ffxbld
ee7cfd05d7 No bug, Automated HPKP preload list update from host bld-linux64-spot-036 - a=hpkp-update 2017-03-20 08:25:08 -07:00
ffxbld
e5d6472d23 No bug, Automated HSTS preload list update from host bld-linux64-spot-036 - a=hsts-update 2017-03-20 08:25:05 -07:00
David Keeler
39eddacacc bug 1344478 - isAlreadyShutDown should return true for nsNSSShutDownObjects created after NSS shut down r=Cykesiopka,ttaubert
MozReview-Commit-ID: 5bUTLz6mGKC

In general, it is possible to create a new nsNSSShutDownObject after
nsNSSShutDownList::shutdown() had been called. Before this patch, at that point,
isAlreadyShutDown() would incorrectly return false, which could lead to code
calling NSS functions, which would probably lead to a crash (because NSS could
be uninitialized at that point). This change merges
nsNSSShutDownList::shutdown() with evaporateAllNSSResources() into
evaporateAllNSSResourcesAndShutDown() for simplicity and makes it so
isAlreadyShutDown() returns true if called after that point.

--HG--
extra : rebase_source : badab89a9e197f18fcd943f16cc77c6aa6664f0d
2017-03-13 15:26:40 -07:00
David Keeler
82a2ae61a8 bug 1348713 - ensure CT information is set in the case of session resumption r=jcj
MozReview-Commit-ID: 7fLnMu9f1kC

--HG--
extra : rebase_source : ca5ccbf40b715bb0c9d6869da3820e55c7564df5
2017-03-20 17:10:33 -07:00
Franziskus Kiefer
5a25c3f857 Bug 1345368 - land NSS d621b1e53054, r=me
--HG--
extra : rebase_source : 3030e2bdde664359d725bda01379c858492b7686
2017-03-20 06:02:00 +01:00
ffxbld
cd43949ff3 No bug, Automated HPKP preload list update from host bld-linux64-spot-022 - a=hpkp-update 2017-03-19 08:13:10 -07:00
ffxbld
076dd6fc40 No bug, Automated HSTS preload list update from host bld-linux64-spot-022 - a=hsts-update 2017-03-19 08:13:07 -07:00
Sebastian Hengst
b65c89dc29 merge autoland to mozilla-central. r=merge a=merge
MozReview-Commit-ID: LKBh8rimLx2
2017-03-18 16:16:20 +01:00
ffxbld
ce7c4bf1e0 No bug, Automated HPKP preload list update from host bld-linux64-spot-022 - a=hpkp-update 2017-03-18 08:07:40 -07:00
ffxbld
3b9e9a6e0f No bug, Automated HSTS preload list update from host bld-linux64-spot-022 - a=hsts-update 2017-03-18 08:07:37 -07:00
Wes Kocher
ee28f4ee71 Merge inbound to central, a=merge
MozReview-Commit-ID: Fq7B78wD7Wv
2017-03-17 11:03:59 -07:00
ffxbld
c2a60adfc7 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-03-17 08:38:33 -07:00
ffxbld
21a93c9f95 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-03-17 08:38:31 -07:00
Carsten "Tomcat" Book
3e0a5441c6 Merge mozilla-central to mozilla-inbound 2017-03-17 14:55:15 +01:00
Franziskus Kiefer
deb6b3311d Bug 1345368 - land NSS 37ccb22f8e51, r=me
--HG--
extra : rebase_source : 9e311a3410733d0db12818c57542c8321b8fddad
2017-03-17 06:01:56 +01:00
Jonathan Kew
17d57d21e1 Bug 1340351 - Allow sandboxed content process on macOS to access fonts synced by Adobe Creative Cloud. r=haik 2017-03-16 22:26:43 +00:00
Wes Kocher
653e4de273 Merge autoland to central, a=merge
MozReview-Commit-ID: EeBZDKaZKly
2017-03-16 13:38:47 -07:00
ffxbld
006005beff No bug, Automated HPKP preload list update from host bld-linux64-spot-308 - a=hpkp-update 2017-03-16 07:57:12 -07:00
ffxbld
d003925309 No bug, Automated HSTS preload list update from host bld-linux64-spot-308 - a=hsts-update 2017-03-16 07:57:09 -07:00
Carsten "Tomcat" Book
468f7d8e9f merge mozilla-inbound to mozilla-central a=merge 2017-03-16 15:35:50 +01:00
flyingrub
a8f1cea361 Bug 1346299 - Remove Telemetry Probe: KEYGEN_GENERATED_KEY_TYPE r=jcj,keeler
Removed the probe in Histogram.json and the code related to it in nsKeygenHandler.cpp

MozReview-Commit-ID: E8lGbx19e2C

--HG--
extra : rebase_source : ef958749e6ad2e2b617fd1efdd09cdd3185bef18
2017-03-14 11:54:57 +01:00
David Keeler
8c5524fc2e bug 1339921 - disable clang's shadowed field warning in a mozilla::pkix gtest class r=Cykesiopka,dholbert
pkixocsp_VerifyEncodedResponse_GetCertTrust has a field trustDomain that
deliberately shadows the field it inherits from so that code doesn't use it by
accident.

MozReview-Commit-ID: 1Y4W6sA7lHD

--HG--
extra : rebase_source : d2d3180e6c65ea49255545216230525b96af010d
2017-03-14 15:58:04 -07:00
Cykesiopka
7995951109 Bug 1338897 - Avoid using NSS Base64 functions in PSM. r=keeler
The NSS Base64 functions are less safe and convenient to use than the XPCOM ones.
They're also an unnecessary dependency on NSS.

The NSS Base64 functions behave slightly differently than the XPCOM ones:
1. ATOB_ConvertAsciiToItem() / NSSBase64_DecodeBuffer() silently ignore invalid
   characters like CRLF, space and so on. Base64Decode() will return an error
   if these characters are encountered.
2. BTOA_DataToAscii() will produce output that has CRLF inserted every 64
   characters. Base64Encode() doesn't do this.

For the reasons listed below, no unexpected compatibility issues should arise:
1. AppSignatureVerification.cpp already filters out CRLF and spaces for Manifest
   and Signature values before decoding.
2. ExtendedValidation.cpp is only given what should be valid hard-coded input to
   decode.
3. ContentSignatureVerifier.cpp already splits on CRLF for when it needs to
   decode PEM certs. Spaces shouldn't be likely.
   For Content-Signature header verification, examination of real input to a
   running instance of Firefox suggests CRLF and spaces will not be present in
   the header to decode.
4. nsCryptoHash.cpp encode is affected, but we actually don't want the CRLF
   behaviour.
5. nsDataSignatureVerifier.cpp decode is affected, but we add whitespace
   stripping to maintain backwards compatibility.
6. nsKeygenHandler.cpp encode is affected, but the previous CRLF behaviour was
   arguably a bug, since neither WHATWG or W3C specs specified this.

MozReview-Commit-ID: IWMFxqVZMeX

--HG--
extra : rebase_source : 4863b2e5eabef0555e8e1ebe39216d0d9393f3e9
2017-03-17 23:31:40 +08:00
Wes Kocher
1b3ffba4d5 Merge m-c to autoland, a=merge
MozReview-Commit-ID: CtdOO1SeODv
2017-03-16 14:07:44 -07:00
David Major
ed12ea611f Bug 1346078: Remove nsAString_internal and just use the nsAString name directly. r=bsmedberg
MozReview-Commit-ID: DWDEDMIVKm7

--HG--
extra : rebase_source : 7fe8dc07c816dca234c67761e61cdee372a87e97
2017-03-10 15:17:23 +13:00
ffxbld
0aeaee1eb9 No bug, Automated HPKP preload list update from host bld-linux64-spot-038 - a=hpkp-update 2017-03-15 08:12:33 -07:00
ffxbld
00c6b3b68c No bug, Automated HSTS preload list update from host bld-linux64-spot-038 - a=hsts-update 2017-03-15 08:12:30 -07:00
Wes Kocher
0902d5e08e Merge m-c to inbound, a=merge
MozReview-Commit-ID: AzYu7EXTIlg
2017-03-14 17:23:26 -07:00
ffxbld
ca7015fa45 No bug, Automated HPKP preload list update from host bld-linux64-spot-032 - a=hpkp-update 2017-03-14 08:14:06 -07:00
ffxbld
9f405f7b6e No bug, Automated HSTS preload list update from host bld-linux64-spot-032 - a=hsts-update 2017-03-14 08:14:03 -07:00
Ehsan Akhgari
99f016e209 Bug 1346486 - Add a memory reporter for PSM DataStorage caches; r=keeler 2017-03-14 14:34:30 -04:00
Jim Porter
5e6b22bdde Bug 1346671 - Enable the no-useless-concat eslint rule in toolkit/ r=jaws
MozReview-Commit-ID: 1a422BiLEhK

--HG--
extra : rebase_source : a83b8d753e2a48593904ef0755d5517908588b93
2017-03-13 17:34:24 -05:00
David Major
dc67bfc9a3 Bug 1344629 - Part 6: Rewrite unnecessary uses of nsLiteralString. r=dbaron
There's an antipattern where nsLiteralString is used as an unnecessary intermediary in converting from CharT* to CharT*,
e.g. CallAFunctionThatTakesACharPointer(NS_LITERAL_CSTRING("foo").get());
or
NS_NAMED_LITERAL_STRING(foo, "abc");
CallAFunctionThatTakesACharPointer(foo.get());

This patch rewrites the callsites that can be trivially changed to use char*/char16_t*.

I'd somewhat like to remove nsTLiteralString::get() altogether, but in code that's less straightforward than these examples, get() is useful enough to keep.

MozReview-Commit-ID: Kh1rUziVllo

--HG--
extra : rebase_source : c21a65694d6e1c42fd88f73632f7ac8f38d005ae
2017-03-14 15:26:27 +13:00
Iris Hsiao
5cece96e1c Backed out 12 changesets (bug 1344629) for stylo build bustage
Backed out changeset cf4273d3ac30 (bug 1344629)
Backed out changeset a96390e044e0 (bug 1344629)
Backed out changeset d9b330f9bc24 (bug 1344629)
Backed out changeset 2b460fe020af (bug 1344629)
Backed out changeset 0ada91b0452e (bug 1344629)
Backed out changeset 083304fcd6bd (bug 1344629)
Backed out changeset 53d7d1ce2c97 (bug 1344629)
Backed out changeset 55eee7078ae4 (bug 1344629)
Backed out changeset 7d3c06b3eca9 (bug 1344629)
Backed out changeset e5df14c3db61 (bug 1344629)
Backed out changeset 636095ff2815 (bug 1344629)
Backed out changeset 0be052ad24c1 (bug 1344629)
2017-03-14 11:52:24 +08:00