summaryrefslogtreecommitdiff
path: root/netwerk/base
Commit message (Collapse)AuthorAge
* Remove support for TLS session caches in TLSServerSocket.wolfbeast2018-09-01
| | | | This resolves #738
* Reinstate RC4 and mark 3DES weak.wolfbeast2018-08-17
| | | | Tag #709
* Make nsAtomicFileOutputStream::DoOpen() fail if the file is read-only.wolfbeast2018-07-10
| | | | This means we don't leave behind prefs-<n>.js files when prefs.js is read-only.
* Merge pull request #540 from janekptacijarabaci/security_csp_script_redirect_1Moonchild2018-06-24
|\ | | | | Fix CSP: Scripts with valid nonce should not be blocked if URL redirects
| * CSP: Support for "LoadInfo::GetLoadingContext" and ↵janekptacijarabaci2018-06-21
| | | | | | | | | | | | "LoadInfo::GetLoadingContextXPCOM()" https://bugzilla.mozilla.org/show_bug.cgi?id=1439713 (partially)
* | Fix SSL status ambiguity.wolfbeast2018-06-20
|/ | | | | - Adds CipherSuite string with the full suite - Changes CipherName to be the actual cipher name instead of the (erroneous) full suite like Firefox does.
* Sanity-check in nsStandardURL::Deserialize(). r=mayhemer, a=RyanVMValentin Gosu2018-06-07
| | | | | | Also add test for faulty nsStandardURL deserialization. See Bug 1392739.
* Revert "Disable TLS 1.3 by default for now until our NSS can be updated to ↵wolfbeast2018-06-06
| | | | | | the latest spec." This reverts commit 6c3f95480a191ce432ddfb2aa400a6d70c4884a8.
* Merge pull request #412 from g4jc/hsts_priming_removal_backportMoonchild2018-05-30
|\ | | | | Remove support and tests for HSTS priming from the tree. Fixes #384
| * Remove support and tests for HSTS priming from the tree. Fixes #384Gaming4JC2018-05-26
| |
* | Fix sec pref locations and enable HPKP checking by default.wolfbeast2018-05-29
|/ | | | Some prefs were incorrectly in all.js (ocsp and hpkp)
* Revert incorrect UAO optimization that broke SSUAOJustOff2018-05-15
|
* Remove other gonk widget conditionals and unused files.wolfbeast2018-05-13
| | | | Tag #288.
* Remove MOZ_WIDGET_GONK [2/2]wolfbeast2018-05-13
| | | | Tag #288
* Remove MOZ_B2G leftovers and some dead B2G-only components.wolfbeast2018-05-12
|
* Bug 1182569: Update ContentSecurityManager to handle docshell loadsjanekptacijarabaci2018-04-30
|
* moebius#158: The Performance Resource Timing (added support for "workerStart")janekptacijarabaci2018-04-29
| | | | https://github.com/MoonchildProductions/moebius/pull/158
* Disable TLS 1.3 by default for now until our NSS can be updated to the ↵wolfbeast2018-04-25
| | | | latest spec.
* moebius#187: DOM - nsIContentPolicy - context (document)janekptacijarabaci2018-04-23
| | | | https://github.com/MoonchildProductions/moebius/pull/187
* Revert "Bug 1182569: Update ContentSecurityManager to handle docshell loads"janekptacijarabaci2018-04-22
| | | | This reverts commit 2e33335820b2816bee111e78588ac82e401c86ae.
* Bug 1182569: Update ContentSecurityManager to handle docshell loadsjanekptacijarabaci2018-04-22
| | | | native in moebius
* Bug 1323683 - Fold nsIURIWithQuery into nsIURIjanekptacijarabaci2018-04-22
| | | | native in moebius
* moebius#230: Consider blocking top level window data: URIs (part 3/3 without ↵janekptacijarabaci2018-04-22
| | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/230
* moebius#226: Consider blocking top level window data: URIs (part 2/2 without ↵janekptacijarabaci2018-04-22
| | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/226
* moebius#223: Consider blocking top level window data: URIs (part 1/3 without ↵janekptacijarabaci2018-04-22
| | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/223
* Bug 1433609 - Ensure that deserialized URL is correct. r=mayhemer, a=RyanVMValentin Gosu2018-04-19
| | | | MozReview-Commit-ID: BMQfPzPhDhc
* Bug 1361699 - Add buffer when writing hashstore to file. r=gcp, r=mcmanus, ↵Thomas Nguyen2018-04-19
| | | | | | | | | | | | | a=RyanVM We write a lot of 4-bytes prefixes to file which call many system calls. We should use a buffer and only write to file if the buffer is full or finish writing. nsIBufferedOutputStream is a good candidate to do that MozReview-Commit-ID: CzGOd7iXVTv --HG-- extra : source : 8f2b4efc5f0d3191a7e80d9324933621e111b44a
* moebius#131: URL parser - stop preserving empty passwordsjanekptacijarabaci2018-04-15
| | | | https://github.com/MoonchildProductions/moebius/issues/131
* moebius#130: URL parser - fix: don't allow empty host namejanekptacijarabaci2018-04-15
| | | | https://github.com/MoonchildProductions/moebius/issues/130
* Remove Rust URL parser CAPIwolfbeast2018-03-13
| | | | Part 2 for #58
* DevTools - network - implement the secureConnectionStart property for the ↵janekptacijarabaci2018-03-01
| | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit)
* Activate TLS 1.3 by default.wolfbeast2018-02-24
| | | | This resolves #15.
* Merge branch 'security_tls_1-3_1' into TLS-1.3wolfbeast2018-02-23
|\
| * Bug 1343600 - Add TLS handshake Start/Stop eventsjanekptacijarabaci2018-02-11
| |
* | CSP: Upgrade SO navigational requests per spec.janekptacijarabaci2018-02-22
| |
* | Crypto Services (utils) - Support for SHA224-512janekptacijarabaci2018-02-21
| |
* | Remove Windows XP specific code in netwerk.wolfbeast2018-02-19
| |
* | Add newChannel2 back to NetUtil.jsmMatt A. Tobin2018-02-10
|/
* Disable static DHE + AES suites by default (common combination for weak DH keys)wolfbeast2018-02-02
| | | | Issue #4 point 5
* Disable 3DES cipher by default + re-order a few things.wolfbeast2018-02-02
| | | | Issue #4 point 4
* Add RSA-AES + SHA256/384 suites for web compatibility.wolfbeast2018-02-02
| | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3
* Add Camellia to the active cipher suites.wolfbeast2018-02-02
| | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project.
* Add m-esr52 at 52.6.0Matt A. Tobin2018-02-02