14838 Commits

Author SHA1 Message Date
Dana Keeler
06ed800ebe bug 1591691 - avoid network I/O when importing enterprise roots on MacOS r=spohl
Differential Revision: https://phabricator.services.mozilla.com/D51009

--HG--
extra : moz-landing-system : lando
2019-11-01 19:40:07 +00:00
Dragana Damjanovic
e7b8f84a64 Bug 1581637 - Part 8 - Add Http3Session/Http3Stream. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D46652

--HG--
extra : moz-landing-system : lando
2019-11-01 14:55:55 +00:00
Sean Feng
78953e2b7f Bug 1592355 - Convert certList to raw array for Pins verification r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D50967

--HG--
extra : moz-landing-system : lando
2019-10-31 23:56:32 +00:00
Haik Aftandilian
8d7d869309 Bug 1593041 - Add com.apple.security.smartcard entitlement to Firefox r=spohl
Add the com.apple.security.smartcard entitlement to Firefox's entitlements list.

Needed for clients of some CryptoTokenKit.framework API's, per SmartCardServices(7).

Differential Revision: https://phabricator.services.mozilla.com/D51303

--HG--
extra : moz-landing-system : lando
2019-11-01 15:43:10 +00:00
Nicholas Nethercote
a518709339 Bug 1587162 - Fix UBSAN complaints about pref callbacks. r=erahm
Lots of these callbacks have a non-`void*` final parameter, which UBSAN
complains about. This commit changes them to have a `void*` parameter.

This requires undoing the machinery added in the first two commits of bug
1473631: `TypePrefChangeFunc` and `PREF_CHANGE_METHOD`. The resulting code is
simpler (which is good) and more boilerplate-y (which is bad) but avoids the
undefined behaviour (which is good).

Differential Revision: https://phabricator.services.mozilla.com/D50901

--HG--
extra : moz-landing-system : lando
2019-11-01 02:57:20 +00:00
ffxbld
c1e90a0ee7 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D51261

--HG--
extra : moz-landing-system : lando
2019-10-31 14:46:55 +00:00
Dana Keeler
18ab5dba01 bug 1591691 - avoid network I/O when importing enterprise roots on Windows r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D51007

--HG--
extra : moz-landing-system : lando
2019-10-31 00:36:53 +00:00
Andreea Pavel
8846cf3d21 Backed out 13 changesets (bug 1581637) for xpchell failures at test_anonymous-coalescing.js on a CLOSED TREE
Backed out changeset 3a458217248d (bug 1581637)
Backed out changeset a5df33ec7393 (bug 1581637)
Backed out changeset c5d8950b4a4b (bug 1581637)
Backed out changeset 97ff4a06c2da (bug 1581637)
Backed out changeset 496ec0c5a60f (bug 1581637)
Backed out changeset 63b7f1ff1714 (bug 1581637)
Backed out changeset 6b80553abc74 (bug 1581637)
Backed out changeset 6b6b75fbec7f (bug 1581637)
Backed out changeset f09b9a4ba633 (bug 1581637)
Backed out changeset 21b721e37d39 (bug 1581637)
Backed out changeset 58ca75a25253 (bug 1581637)
Backed out changeset c28174eaccbe (bug 1581637)
Backed out changeset e6ff3db0a421 (bug 1581637)
2019-10-31 02:45:42 +02:00
Dana Keeler
06dafb8707 bug 1591271 - osclientcerts: support RSA-PSS on Windows r=kjacobs
Differential Revision: https://phabricator.services.mozilla.com/D50662

--HG--
extra : moz-landing-system : lando
2019-10-30 22:45:07 +00:00
Dragana Damjanovic
50665cfef1 Bug 1581637 - Part 8 - Add Http3Session/Http3Stream. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D46652

--HG--
extra : moz-landing-system : lando
2019-10-30 21:09:09 +00:00
Razvan Maries
5946283fbc Backed out changeset 8a690dff4180 (bug 1591691) for build bustages on EnterpriseRoots.cpp. CLOSED TREE 2019-10-30 22:51:25 +02:00
Dana Keeler
e7f3e82efb bug 1591691 - avoid network I/O when importing enterprise roots on Windows r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D51007

--HG--
extra : moz-landing-system : lando
2019-10-30 19:55:42 +00:00
Gijs Kruitbosch
8af91551b6 Bug 1585732 - use staticprefs for media.cubeb.sandbox, r=haik
Differential Revision: https://phabricator.services.mozilla.com/D50955

--HG--
extra : moz-landing-system : lando
2019-10-29 23:33:45 +00:00
Gijs Kruitbosch
1bb658765f Bug 1585732 - use staticprefs for security.sandbox.content.level, r=haik
Differential Revision: https://phabricator.services.mozilla.com/D50954

--HG--
extra : moz-landing-system : lando
2019-10-29 23:32:39 +00:00
Sean Feng
74eaf3ce20 Bug 1592083 - Convert certList to raw array for nsITransportSecurityInfo r=keeler,Ehsan,kershaw
This patch converts the certList attribute of nsITransportSecurityInfo
from nsIX509CertList to Array<nsIx509Cert>

Differential Revision: https://phabricator.services.mozilla.com/D48745

--HG--
extra : moz-landing-system : lando
2019-10-29 17:20:07 +00:00
Haik Aftandilian
87432d9ae1 Bug 1586888 - Test security/sandbox/test/browser_content_sandbox_fs.js has failures on macOS Catalina r=gcp
Don't test with directories not present on macOS 10.15.

Differential Revision: https://phabricator.services.mozilla.com/D49499

--HG--
extra : moz-landing-system : lando
2019-10-29 10:45:43 +00:00
ffxbld
b6ddb7ea53 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D50806

--HG--
extra : moz-landing-system : lando
2019-10-28 13:17:59 +00:00
Sean Feng
ce3169b453 Bug 1590709 - Fix crash in TransportSecurityInfo::ReadCertList r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D50557

--HG--
extra : moz-landing-system : lando
2019-10-25 18:20:53 +00:00
Dana Keeler
bca86d27cc bug 1589824 - pass a typed array to OS.File.writeAtomic in certificate export r=Gijs
OS.File.writeAtomic expects either a utf-8 string or a typed array. This patch
fixes instances in pippki.js in certificate export where this was not
guaranteed to be the case. It also extends the test for this functionality to
cover more cases.

Differential Revision: https://phabricator.services.mozilla.com/D50117

--HG--
extra : moz-landing-system : lando
2019-10-25 17:37:20 +00:00
Dana Keeler
2e5c90833c bug 1590888 - reinstate filtering of client certificate selection during the TLS handshake r=kjacobs
Bug 1267643 removed filtering of client certificates based on the
"certificate_authorities" list sent in the client certificate request from the
server in TLS handshakes because it is impossible to implement as specified
without false negatives (i.e. excluding certificates that could be usable but
don't seem to be according to the certificates the client is aware of). In
practice, however, it seems enough users rely on this behavior[0] that we
should add it back until the platform can save client certificate selections
across restarts and the "select one automatically" option is removed (see also
bug 634697).

[0] See e.g. bug 1588703, bug 1590297, bug 1590596, bug 1074195 comment 27,
and any other duplicates of this bug.

Differential Revision: https://phabricator.services.mozilla.com/D50355

--HG--
extra : moz-landing-system : lando
2019-10-25 17:11:25 +00:00
Martin Thomson
afe157c082 Bug 1576790 - Enable version downgrade sentinel in TLS, r=keeler
This change enables the version downgrade sentinel across all channels.  We
don't have good telemetry on this, but Chrome reports 0.02%, which is low enough
to just make the change without additional validation on our end.

This only really affects intercepting middleboxes that forward the real server's
ServerHello.random.  That's a terrible idea, and, as above, the evidence
suggests that this is now rare enough to have those boxes break connections.
The pref will remain for those cases where problems persist.

Differential Revision: https://phabricator.services.mozilla.com/D50387

--HG--
extra : moz-landing-system : lando
2019-10-24 00:49:51 +00:00
Dana Keeler
e064323a59 bug 1063276 - include the peer cert chain from the TLS handshake when verifying server certificates r=kjacobs
Differential Revision: https://phabricator.services.mozilla.com/D50129

--HG--
extra : moz-landing-system : lando
2019-10-24 22:48:40 +00:00
ffxbld
f5837b4bc2 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D50470

--HG--
extra : moz-landing-system : lando
2019-10-24 14:42:33 +00:00
Dana Keeler
766d2e096c Bug 1584401 - build osclientcerts in-tree on Windows. r=jcj,kjacobs
This adds a preliminary implementation of a PKCS#11 module that allows Firefox
to access client certificates for TLS client authentication on Windows.
2019-09-18 10:27:50 -07:00
Haik Aftandilian
43ab4ea7a3 Bug 1587962 - [10.15] "Use keyboard navigation" and "jump to spot" scrolling preferences do not work r=spohl
Update sandbox rules to allow services and files needed for global UI system preferences.

Update tests now that stat() calls on the filesystem are permitted.

Differential Revision: https://phabricator.services.mozilla.com/D50298

--HG--
extra : moz-landing-system : lando
2019-10-23 19:56:56 +00:00
Marcus Burghardt
ec4fc41539 Bug 1586081 - Remove special EV treatment from GlobalSign Extended Validation CA - SHA256 - G2. r=keeler
In 2017-04, due a transition of two CA certs from GobalSign to Google, a temporary and exceptional EV treatment was deployed in PSM for this transition:
https://bugzilla.mozilla.org/show_bug.cgi?id=1349762

This exception was removed with this patch.

Differential Revision: https://phabricator.services.mozilla.com/D49106

--HG--
extra : moz-landing-system : lando
2019-10-15 17:11:35 +00:00
Geoff Brown
de6c41dd8a Bug 1585119 - Re-enable yet more mochitests on android; r=geckoview-reviewers,snorp
Most of these tests have been disabled for a long time; they run well
in the current test environment.
This completes my review of skipped Android tests.

Differential Revision: https://phabricator.services.mozilla.com/D49954

--HG--
extra : moz-landing-system : lando
2019-10-22 20:10:27 +00:00
Tim Nguyen
6d79a27dfb Bug 1590387 - Remove remaining usages of XUL textboxes. r=bgrins
Differential Revision: https://phabricator.services.mozilla.com/D50063

--HG--
extra : moz-landing-system : lando
2019-10-22 19:27:23 +00:00
Daniel Varga
964a732b29 Backed out changeset 055ba7efc9cd (bug 1584401) for rust build bustage. On a CLOSED TREE 2019-10-22 22:04:40 +03:00
Dana Keeler
28cc0dc938 bug 1584401 - build osclientcerts in-tree on Windows r=jcj,kjacobs
This adds a preliminary implementation of a PKCS#11 module that allows Firefox
to access client certificates for TLS client authentication on Windows.
2019-09-18 10:27:50 -07:00
Gian-Carlo Pascutto
c92f1fd819 Bug 1581239 - Verify that sandboxed processes' access to /proc/self/fd is blocked. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D46815

--HG--
extra : moz-landing-system : lando
2019-10-18 01:12:38 +00:00
Mihai Alexandru Michis
44e67f1a7f Backed out changeset 11e5baee978e (bug 1580315) for issues related to certList. CLOSED TREE 2019-10-21 23:50:35 +03:00
Sean Feng
2279d51cf5 Bug 1580315 - Convert certList to raw array for nsITransportSecurityInfo r=keeler,Ehsan,kershaw
This patch converts the certList attribute of nsITransportSecurityInfo
from nsIX509CertList to Array<nsIx509Cert>

Differential Revision: https://phabricator.services.mozilla.com/D48745

--HG--
extra : moz-landing-system : lando
2019-10-21 19:49:01 +00:00
ffxbld
4c889635b4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D49928

--HG--
extra : moz-landing-system : lando
2019-10-21 13:23:30 +00:00
J.C. Jones
71a6cf2bcd Bug 1577822 - land NSS NSS_3_47_RTM UPGRADE_NSS_RELEASE, r=kjacobs
2019-10-18  J.C. Jones  <jjones@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.47 final
	[7ccb4ade5577] [NSS_3_47_RTM] <NSS_3_47_BRANCH>

	* .hgtags:
	Added tag NSS_3_47_BETA4 for changeset d3c8638f85cd
	[d5bd7be1bf2a]

Differential Revision: https://phabricator.services.mozilla.com/D49813

--HG--
extra : moz-landing-system : lando
2019-10-18 22:42:33 +00:00
J.C. Jones
00dafac3ef Bug 1577822 - land NSS NSS_3_47_BETA4 UPGRADE_NSS_RELEASE, r=kjacobs
2019-10-18  Deian Stefan  <deian@cs.ucsd.edu>

	* lib/softoken/pkcs11c.c:
	Bug 1459141 - Rewrite softoken CBC pad check to be constant
	r=jcj,kjacobs

	[d3c8638f85cd] [NSS_3_47_BETA4]

2019-10-17  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/pk11_gtest/pk11_cbc_unittest.cc:
	Bug 1589120 - Additional test vectors for CBC padding. r=jcj

	This patch adds more test vectors for AES-CBC and 3DES-CBC padding.

	[7f17b911ac99]

	* gtests/pk11_gtest/manifest.mn,
	gtests/pk11_gtest/pk11_aeskeywrappad_unittest.cc,
	gtests/pk11_gtest/pk11_gtest.gyp:
	Bug 1589120 - Tests for padded AES key wrap r=jcj

	This patch adds test vectors for padded AES Key Wrap. AES-CBC and
	3DES-CBC ports of the same vectors will be included in a separate
	revision.

	[fb4d9b6ea2c4]

2019-10-16  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/ssl_gtest/tls_agent.cc, gtests/ssl_gtest/tls_agent.h,
	gtests/ssl_gtest/tls_subcerts_unittest.cc, lib/ssl/ssl3con.c,
	lib/ssl/sslimpl.h, lib/ssl/tls13subcerts.c,
	tests/common/certsetup.sh, tests/ssl_gtests/ssl_gtests.sh:
	Bug 1588244 - SSLExp_DelegateCredential to support 'rsaEncryption'
	end-entity certs with default scheme override r=mt

	If an end-entity cert has an SPKI type of 'rsaEncryption', override
	the DC alg to be `ssl_sig_rsa_pss_rsae_sha256`.

	[93383e0fb833]

2019-10-16  J.C. Jones  <jjones@mozilla.com>

	* .hgtags:
	Added tag NSS_3_47_BETA3 for changeset f10c3e0757b7
	[fa8a67bee2dc]

Differential Revision: https://phabricator.services.mozilla.com/D49774

--HG--
extra : moz-landing-system : lando
2019-10-18 17:05:24 +00:00
Sean Feng
d08c434be2 Bug 1580315 - Use cert array to do certList serialization r=keeler
The internal representation of certList has been converted to
cert array, and this patch does it for the serialization.

Differential Revision: https://phabricator.services.mozilla.com/D49347

--HG--
extra : moz-landing-system : lando
2019-10-18 13:42:54 +00:00
Marcus Burghardt
b7e036202f Bug 1585449 - Disable EV treatment for Global Chambersign Root – 2008 root. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D48959

--HG--
extra : moz-landing-system : lando
2019-10-11 20:15:29 +00:00
ffxbld
716fe01e26 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D49605

--HG--
extra : moz-landing-system : lando
2019-10-17 14:34:51 +00:00
Srujana Peddinti
e41bc4753a Bug 1570009 - Part 3 : Added GPU Process testing to the framework. r=bobowen
Adds support for creating and using a PSandboxTesting actor in the GPU process.

Differential Revision: https://phabricator.services.mozilla.com/D42386

--HG--
extra : moz-landing-system : lando
2019-10-14 15:26:47 +00:00
Srujana Peddinti
847842be97 Bug 1570009 - Part 2 : Added Content Process testing to the framework. r=bobowen
Adds the ability to create and run sandbox tests in a content process.

Differential Revision: https://phabricator.services.mozilla.com/D37913

--HG--
extra : moz-landing-system : lando
2019-10-14 15:08:47 +00:00
Srujana Peddinti
51255aa5b8 Bug 1570009 - Part 1: Create a top-level actor in child processes capable of testing the sandbox. r=bobowen,dmajor
This patch includes a new browser chrome mochitest that uses a new XPCOM service (moxISandboxTest) to create a new top-level actor (PSandboxTesting) between the chrome process and any supported child processes (in later parts of this patch set). The framework is makes it easy to add new C/C++ instructions to be tested for permission under real sandbox conditions. Test results can be conditioned on the type of OS, process, sandbox level, etc.

Differential Revision: https://phabricator.services.mozilla.com/D37706

--HG--
extra : moz-landing-system : lando
2019-10-15 07:19:54 +00:00
J.C. Jones
ab56e5f10e Bug 1577822 - land NSS NSS_3_47_BETA3 UPGRADE_NSS_RELEASE, r=kjacobs
2019-10-16  J.C. Jones  <jjones@mozilla.com>

	* lib/softoken/pkcs11c.c:
	Bug 1459141 - Backed out changeset 474d62c9d0db for PK11_Wrap/Unwrap
	issues r=me
	[f10c3e0757b7] [NSS_3_47_BETA3]

2019-10-15  J.C. Jones  <jjones@mozilla.com>

	* .hgtags:
	Added tag NSS_3_47_BETA2 for changeset f657d65428c6
	[3ca8b20b24ee]

	* cmd/addbuiltin/addbuiltin.c:
	Bug 1465613 - Fixup clang format a=bustage
	[f657d65428c6] [NSS_3_47_BETA2]

2019-10-11  Marcus Burghardt  <mburghardt@mozilla.com>

	* automation/abi-check/expected-report-libnss3.so.txt, automation/abi-
	check/expected-report-libsmime3.so.txt, automation/abi-check
	/expected-report-libssl3.so.txt, cmd/addbuiltin/addbuiltin.c,
	cmd/lib/secutil.c, gtests/softoken_gtest/manifest.mn,
	gtests/softoken_gtest/softoken_gtest.gyp,
	gtests/softoken_gtest/softoken_nssckbi_testlib_gtest.cc,
	lib/certdb/certdb.c, lib/certdb/certt.h, lib/ckfw/builtins/README,
	lib/ckfw/builtins/certdata.txt, lib/ckfw/builtins/manifest.mn,
	lib/ckfw/builtins/nssckbi.h, lib/ckfw/builtins/testlib/Makefile,
	lib/ckfw/builtins/testlib/builtins-testlib.gyp,
	lib/ckfw/builtins/testlib/certdata-testlib.txt,
	lib/ckfw/builtins/testlib/config.mk,
	lib/ckfw/builtins/testlib/manifest.mn, lib/ckfw/builtins/testlib
	/nssckbi-testlib.rc,
	lib/ckfw/builtins/testlib/testcert_err_distrust.txt,
	lib/ckfw/builtins/testlib/testcert_no_distrust.txt,
	lib/ckfw/builtins/testlib/testcert_ok_distrust.txt,
	lib/ckfw/manifest.mn, lib/nss/nss.def, lib/pki/pki3hack.c,
	lib/softoken/sdb.c, lib/util/pkcs11n.h, nss.gyp, tests/cert/cert.sh:
	Bug 1465613 - Created two new fields for scheduled distrust from
	builtins and updated support commands. r=jcj,kjacobs,mt

	Added two new fields do scheduled distrust of CAs in
	nssckbi/builtins. Also, created a testlib to validate these fields
	with gtests.

	[52024949df95]

2019-10-14  Martin Thomson  <martin.thomson@gmail.com>

	* lib/ssl/tls13con.c:
	Bug 1588557 - Fix debug statement, r=jcj

	[0f563a2571c3]

2019-10-15  Dana Keeler  <dkeeler@mozilla.com>

	* gtests/mozpkix_gtest/pkixder_universal_types_tests.cpp,
	lib/mozpkix/include/pkix/pkixder.h, lib/mozpkix/lib/pkixcert.cpp:
	bug 1579060 - fix handling of issuerUniqueID and subjectUniqueID in
	mozilla::pkix::BackCert r=jcj

	According to RFC 5280, the definitions of issuerUniqueID and
	subjectUniqueID in TBSCertificate are as follows:

	 issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
	subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,

	where UniqueIdentifier is a BIT STRING.

	IMPLICIT tags replace the tag of the underlying type. For these
	fields, there is no specified class (just a tag number within the
	class), and the underlying type of BIT STRING is "primitive" (i.e.
	not constructed). Thus, the tags should be of the form CONTEXT
	SPECIFIC | [number in class], which comes out to 0x81 and 0x82,
	respectively.

	When originally implemented, mozilla::pkix incorrectly required that
	the CONSTRUCTED bit also be set for these fields. Consequently, the
	library would reject any certificate that actually contained these
	fields. Evidently such certificates are rare.

	[c50f933d37a5]

2019-10-14  Deian Stefan  <deian@cs.ucsd.edu>

	* lib/softoken/pkcs11c.c:
	Bug 1459141 - Rewrite softoken CBC pad check to be constant time.
	r=kjacobs,jcj
	[474d62c9d0db]

2019-10-11  J.C. Jones  <jjones@mozilla.com>

	* .hgtags:
	Added tag NSS_3_47_BETA1 for changeset 93245f5733b3
	[f60dbafbc182]

Differential Revision: https://phabricator.services.mozilla.com/D49470

--HG--
extra : moz-landing-system : lando
2019-10-16 19:12:50 +00:00
J.C. Jones
962e9e53a9 Backed out changeset 3eb63c112f5a (Bug 1577822) for breaking WebAuthn mochitests UPGRADE_NSS_RELEASE
Differential Revision: https://phabricator.services.mozilla.com/D49374

--HG--
extra : moz-landing-system : lando
2019-10-16 04:36:58 +00:00
J.C. Jones
4309dccf1b Bug 1577822 - land NSS NSS_3_47_BETA2 UPGRADE_NSS_RELEASE, r=kjacobs
2019-10-15  J.C. Jones  <jjones@mozilla.com>

	* cmd/addbuiltin/addbuiltin.c:
	Bug 1465613 - Fixup clang format a=bustage
	[f657d65428c6] [NSS_3_47_BETA2]

2019-10-11  Marcus Burghardt  <mburghardt@mozilla.com>

	* automation/abi-check/expected-report-libnss3.so.txt, automation/abi-
	check/expected-report-libsmime3.so.txt, automation/abi-check
	/expected-report-libssl3.so.txt, cmd/addbuiltin/addbuiltin.c,
	cmd/lib/secutil.c, gtests/softoken_gtest/manifest.mn,
	gtests/softoken_gtest/softoken_gtest.gyp,
	gtests/softoken_gtest/softoken_nssckbi_testlib_gtest.cc,
	lib/certdb/certdb.c, lib/certdb/certt.h, lib/ckfw/builtins/README,
	lib/ckfw/builtins/certdata.txt, lib/ckfw/builtins/manifest.mn,
	lib/ckfw/builtins/nssckbi.h, lib/ckfw/builtins/testlib/Makefile,
	lib/ckfw/builtins/testlib/builtins-testlib.gyp,
	lib/ckfw/builtins/testlib/certdata-testlib.txt,
	lib/ckfw/builtins/testlib/config.mk,
	lib/ckfw/builtins/testlib/manifest.mn, lib/ckfw/builtins/testlib
	/nssckbi-testlib.rc,
	lib/ckfw/builtins/testlib/testcert_err_distrust.txt,
	lib/ckfw/builtins/testlib/testcert_no_distrust.txt,
	lib/ckfw/builtins/testlib/testcert_ok_distrust.txt,
	lib/ckfw/manifest.mn, lib/nss/nss.def, lib/pki/pki3hack.c,
	lib/softoken/sdb.c, lib/util/pkcs11n.h, nss.gyp, tests/cert/cert.sh:
	Bug 1465613 - Created two new fields for scheduled distrust from
	builtins and updated support commands. r=jcj,kjacobs,mt

	Added two new fields do scheduled distrust of CAs in
	nssckbi/builtins. Also, created a testlib to validate these fields
	with gtests.

	[52024949df95]

2019-10-14  Martin Thomson  <martin.thomson@gmail.com>

	* lib/ssl/tls13con.c:
	Bug 1588557 - Fix debug statement, r=jcj

	[0f563a2571c3]

2019-10-15  Dana Keeler  <dkeeler@mozilla.com>

	* gtests/mozpkix_gtest/pkixder_universal_types_tests.cpp,
	lib/mozpkix/include/pkix/pkixder.h, lib/mozpkix/lib/pkixcert.cpp:
	bug 1579060 - fix handling of issuerUniqueID and subjectUniqueID in
	mozilla::pkix::BackCert r=jcj

	According to RFC 5280, the definitions of issuerUniqueID and
	subjectUniqueID in TBSCertificate are as follows:

	 issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
	subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,

	where UniqueIdentifier is a BIT STRING.

	IMPLICIT tags replace the tag of the underlying type. For these
	fields, there is no specified class (just a tag number within the
	class), and the underlying type of BIT STRING is "primitive" (i.e.
	not constructed). Thus, the tags should be of the form CONTEXT
	SPECIFIC | [number in class], which comes out to 0x81 and 0x82,
	respectively.

	When originally implemented, mozilla::pkix incorrectly required that
	the CONSTRUCTED bit also be set for these fields. Consequently, the
	library would reject any certificate that actually contained these
	fields. Evidently such certificates are rare.

	[c50f933d37a5]

2019-10-14  Deian Stefan  <deian@cs.ucsd.edu>

	* lib/softoken/pkcs11c.c:
	Bug 1459141 - Rewrite softoken CBC pad check to be constant time.
	r=kjacobs,jcj
	[474d62c9d0db]

2019-10-11  J.C. Jones  <jjones@mozilla.com>

	* .hgtags:
	Added tag NSS_3_47_BETA1 for changeset 93245f5733b3
	[f60dbafbc182]

Differential Revision: https://phabricator.services.mozilla.com/D49365

--HG--
extra : moz-landing-system : lando
2019-10-16 00:57:04 +00:00
Sean Feng
2fa45cc172 Bug 1580315 - Change certList internal representation to Array r=keeler
This patch intends to change the internal reprensentation of certList
from nsIX509CertList to Array for TransportSecurityInfo.

Differential Revision: https://phabricator.services.mozilla.com/D48744

--HG--
extra : moz-landing-system : lando
2019-10-15 19:57:23 +00:00
ffxbld
cbc7251ad9 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D49151

--HG--
extra : moz-landing-system : lando
2019-10-14 13:16:30 +00:00
J.C. Jones
685c607058 Bug 1577822 - land NSS NSS_3_47_BETA1 UPGRADE_NSS_RELEASE, r=kjacobs
2019-10-11  Kai Engert  <kaie@kuix.de>

	* automation/release/nspr-version.txt:
	Bug 1583068 - Require NSPR version 4.23 r=jcj
	[93245f5733b3] [NSS_3_47_BETA1]

2019-10-11  Kevin Jacobs  <kjacobs@mozilla.com>

	* coreconf/config.gypi, lib/freebl/freebl.gyp:
	Bug 1152625 - Add gyp flag for disabling ARM HW AES r=jcj

	Adds an option to disable ARMv8 HW AES, if `-Ddisable_arm_hw_aes=1`
	is passed to build.sh.

	Depends on D34473

	[9abcea09fdd4]

2019-10-11  Makoto Kato  <m_kato@ga2.so-net.ne.jp>

	* lib/freebl/aes-armv8.c:
	Bug 1152625 - Part 2. Remove __builtin_assume to avoid crash on PGO.
	r=kjacobs,mt

	`AESContext->iv` doesn't align to 16 bytes on PGO build, so we
	should remove __builtin_assume. Also, I guess that `expandedKey` has
	same problem.

	[1b0f5c5335ee]

	* lib/freebl/Makefile, lib/freebl/aes-armv8.c, lib/freebl/aes-armv8.h,
	lib/freebl/freebl.gyp, lib/freebl/intel-aes.h,
	lib/freebl/rijndael.c:
	Bug 1152625 - Support AES HW acceleration on ARMv8. r=kjacobs,jcj

	[efb895a43899]

2019-09-06  Martin Thomson  <mt@lowentropy.net>

	* gtests/ssl_gtest/ssl_auth_unittest.cc,
	gtests/ssl_gtest/ssl_ciphersuite_unittest.cc,
	gtests/ssl_gtest/ssl_extension_unittest.cc,
	gtests/ssl_gtest/ssl_fuzz_unittest.cc,
	gtests/ssl_gtest/tls_esni_unittest.cc, lib/ssl/ssl3con.c,
	lib/ssl/ssl3exthandle.c, lib/ssl/sslimpl.h, lib/ssl/tls13con.c:
	Bug 1549225 - Up front Signature Scheme validation, r=ueno

	Summary: This patch started as an attempt to ensure that a DSA
	signature scheme would not be advertised if we weren't willing to
	negotiate versions less than TLS 1.3. Then I realized that we didn't
	do the same for PKCS#1 RSA.

	Then I realized that we were still willing to try to establish
	connections when we had a certificate that we couldn't use.

	Then I realized that ssl3_config_match_init() wasn't being run
	consistently. On resumption, we only ran it when we were PARANOID.
	That's silly because we weren't checking policies.

	Then I realized that we were allowing ECDSA certificates to be used
	when the named group in the certificate was disabled. We weren't
	enforcing that consistently either. However, I also discovered that
	the check we have wouldn't work without a tweak because in TLS 1.3
	the named group is part of the signature scheme; the configured
	named groups are only used prior to TLS 1.3 when selecting
	ECDSA/ECDH certificates.

	So that sounds like a lot of changes but what it boils down to is
	more robust checking of the configuration prior to starting a
	connection. As a result, we should be offering fewer options that
	we're unwilling or unable to follow through on. A good number of
	tests needed tweaking as a result because we were relying on getting
	past the checks in those tests. No real problems were found as a
	result; this just moves failures that might arise from
	misconfiguration a little earlier in the process.

	[9b418f0a4912]

2019-10-08  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/pk11_gtest/pk11_der_private_key_import_unittest.cc,
	lib/pk11wrap/pk11pk12.c:
	Bug 1586947 - Store nickname during EC key import. r=jcj

	This patch stores the nickname (if specified) during EC key import.
	This was already done for all other key types.

	[c319019aee75]

2019-10-08  Marcus Burghardt  <mburghardt@mozilla.com>

	* lib/certdb/stanpcertdb.c, lib/pk11wrap/pk11load.c,
	lib/pki/pki3hack.c:
	Bug 1586456 - Unnecessary conditional in pki3hack, pk11load and
	stanpcertdb. r=jcj

	Some conditionals that are always true were removed.

	[b34061c3a377]

Differential Revision: https://phabricator.services.mozilla.com/D49030

--HG--
extra : moz-landing-system : lando
2019-10-12 00:01:25 +00:00
ffxbld
8d4072c53b No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D48836

--HG--
extra : moz-landing-system : lando
2019-10-10 14:38:00 +00:00
Johann Hofmann
ede37582aa Bug 1583067 - Use correct window opener for chrome windows in certManager.js. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D47923

--HG--
extra : moz-landing-system : lando
2019-10-08 21:37:57 +00:00