summaryrefslogtreecommitdiff
path: root/security
Commit message (Collapse)AuthorAge
...
* Issue #1280 - Follow-up: Get rid of HPKP pinning mode.adesh2020-11-10
| | | | | | This was a leftover from HPKP removal. Also remove a couple of unused variables from security/manager/ssl/nsSiteSecurityService.cpp.
* Issue #1656 - Nuke the remaining vim lines in UXPMoonchild2020-10-26
| | | | Closes #1656
* Issue #1656 - Part 9: Single-line-comment style.Moonchild2020-09-24
|
* Issue #1656 - Part 8: Devtools and misc.Moonchild2020-09-24
|
* Issue #1656 - Part 6: Clean up the build filesMoonchild2020-09-23
|
* Issue #1656 - Part 4: Manual cleanupMoonchild2020-09-23
|
* Issue #1656 - Part 4: Tackle *.idl, *.css, *.ipdlh, *.webidl, *.ccMoonchild2020-09-23
|
* Issue #1656 - Part 3: Nuke more vim config lines in the tree.Moonchild2020-09-23
| | | | Another S&R run with some smarter matching.
* Issue #1656 - Part 1: Nuke most vim config lines in the tree.Moonchild2020-09-23
| | | | | | Since these are just interpreted comments, there's 0 impact on actual code. This removes all lines that match /* vim: set(.*)tw=80: */ with S&R -- there are a few others scattered around which will be removed manually in a second part.
* Issue #1280 - Remove hostname parameter to trust domain.adeshkp2020-09-12
| | | | | | Host name was purely being used for HPKP and since HPKP is killed, this can also go. Currently it doesn't do anything other than generating build warnings.
* [NSS] Version and build bumpMoonchild2020-08-29
|
* [NSS] Prevent slotLock race in NSC_GetTokenInfoJ.C. Jones2020-08-29
| | | | | Basically, NSC_GetTokenInfo doesn't lock slot->slotLock before accessing slot after obtaining it, even though slotLock is defined as its lock.
* [NSS] Version and build bumpMoonchild2020-07-09
|
* [NSS] Implement constant-time GCD and modular inversionSohaib ul Hassan2020-07-09
| | | | | | | | | | | | The implementation is based on the work by Bernstein and Yang (https://eprint.iacr.org/2019/266) "Fast constant-time gcd computation and modular inversion". It fixes the old mp_gcd and s_mp_invmod_odd_m functions. The patch also fixes mpl_significant_bits s_mp_div_2d and s_mp_mul_2d by having less control flow to reduce side-channel leaks. Co-authored by : Billy Bob Brumley
* Issue #439 - Remove, fix and clean up automated testsMoonchild2020-06-08
| | | | | | | With the big amount of code churn around DOM a lot of tests broke severely enough that they caused build bustage. This commit cleans up, removes or otherwise fixes tests that are broken, no longer relevant or obsolete.
* [NSS] Bump NSS versionMoonchild2020-06-03
|
* [NSS] Force a fixed length for DSA exponentiationMoonchild2020-06-03
|
* Merge pull request #1502 from athenian200/nss348_solarisMoonchild2020-03-31
|\ | | | | Un-bust building of NSS after update to 3.48 on Solaris.
| * Issue #1501 - Un-bust building of NSS after update to 3.48 on Solaris.athenian2002020-03-30
| |
* | Issue #1280 - Un-bust certerror pages and ForgetAboutSitewolfbeast2020-03-31
|/
* Issue #1280 - Part 2: Remove HPKP tests.wolfbeast2020-03-28
|
* Issue #1280 - Part 1: Remove HPKP components.wolfbeast2020-03-28
| | | | | This also removes leftover plumbing for storing preload information in SiteSecurityService since no service still uses it.
* Issue #1498 - Part 6: Remove STS preloadlist pref.wolfbeast2020-03-27
|
* Issue #1498 - Part 5: Update SSService CID and correct mismatch.wolfbeast2020-03-27
|
* Issue #1498 - Part 4: Remove clearPreloads.wolfbeast2020-03-27
| | | | Also tag #1280
* Issue #1498 - Part 3: Remove support for storing "knockout" values.wolfbeast2020-03-27
|
* Issue #1498 - Part 1: Stop persisting preload states.wolfbeast2020-03-27
| | | | | | Since we don't use preloading anymore for either HPKP or HSTS, we no longer need persistent storage in the profile for preload states. Tag #1280 also
* Issue #1498 - Part 1: Stop using HSTS preload lists.wolfbeast2020-03-27
|
* Take nsSiteSecurityService out of UNIFIED_SOURCESMatt A. Tobin2020-03-25
| | | | It exceeded the obj file sections limit because of the HSTS preload list so it cannot be built in UNIFIED mode.
* Issue #447 - Update HSTS preload listwolfbeast2020-03-24
|
* Issue #1467 - Part 4: Rename NSS_SQLSTORE to MOZ_SECURITY_SQLSTORE.wolfbeast2020-03-19
| | | | Rename the build config option accordingly.
* Issue #1467 - Part 3: Use UTF-8 file paths for NSS-SQL database.wolfbeast2020-03-17
|
* Issue #1467 - Part 1: Set up conditional NSS-SQL builds.wolfbeast2020-03-16
| | | | | | | - Adds buildconfig option --enable-nss-sqlstore - Prefixes NSS dbinit with either sql: or dbm: depending on config - Pre-initializes mozStorage when NSS-SQL storage is used to prevent an sqlite3_config race in NSS Init
* Issue #1053 - Remove android support from nsNSSComponent.cppMatt A. Tobin2020-02-28
|
* Issue #447 - Update HSTS preload list & reduce debug spewwolfbeast2020-02-01
| | | | | Commented out spewing dump() statements in loops. With the ever growing HSTS list it takes too much time and is pointless to display.
* Issue #1338 - Follow-up: Also cache the most recent PBKDF1 hashKai Engert2020-01-23
| | | | This rewrites the caching mechanism to apply to both PBKDF1 and PBKDF2
* Issue #1338 - Bump NSS versionwolfbeast2020-01-20
| | | | | | | Our NSS version is closer to the currently-released .1, so bump version to that. Note: we still have some additional patches to the in-tree version in place so this isn't a 100% match to the RTM one.
* Issue #1338: Follow-up: Cache the most recent PBKDF2 password hash,Kai Engert2020-01-14
| | | | | | to speed up repeated SDR operations. Landed on NSS-3.48 for Bug 1606992
* Issue #1338 - Followup: certdb: propagate trust information if trustDaiki Ueno2020-01-10
| | | | | | | | | | | | | module is loaded afterwards, Summary: When the builtin trust module is loaded after some temp certs being created, these temp certs are usually not accompanied by trust information. This causes a problem in UXP as it loads the module from a separate thread while accessing the network cache which populates temp certs. This change makes it properly roll up the trust information, if a temp cert doesn't have trust information.
* Issue #1338 - Un-bust building of NSS after update to 3.48 on Linux.wolfbeast2020-01-10
|
* Be more consistent about decoding IP addresses in PSM.wolfbeast2020-01-09
|
* Issue #1338 - Part 2: Update NSS to 3.48-RTMwolfbeast2020-01-02
|
* Issue #1118 - Part 6: Fix various tests that are no longer correct.wolfbeast2019-12-22
| | | | | The behavior change of document.open() requires these tests to be changed to account for the new spec behavior.
* Update NSS version.wolfbeast2019-12-06
|
* [NSS] Bug 1586176 - EncryptUpdate should use maxout not block size.Craig Disselkoen2019-12-06
|
* [NSS] Bug 1508776 - Remove unneeded refcounting from SFTKSessionJ.C. Jones2019-12-06
| | | | | | | | SFTKSession objects are only ever actually destroyed at PK11 session closure, as the session is always the final holder -- and asserting refCount == 1 shows that to be true. Because of that, NSC_CloseSession can just call `sftk_DestroySession` directly and leave `sftk_FreeSession` as a no-op to be removed in the future.
* Issue #447 - Update HSTS preload listwolfbeast2019-11-19
|
* Issue #1289 - Part 3: Update tests.wolfbeast2019-11-14
|
* Issue #1289 - Part 2: Clear out the preload list except for testwolfbeast2019-11-14
| | | | domains.
* Issue #1289 - Part 1: Add a pref to disable HPKP header processing.wolfbeast2019-11-14
|