summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeLines
* Simplify value setting.wolfbeast2020-01-11-66/+39
| | | | | This gets rid of unused boolean return values on setters and a level of indirection for calls to set values.
* Issue #1348 - Part 3: Set IS_PRIVATE input scope in private browsing.wolfbeast2020-01-11-9/+28
| | | | | | | | | Microsoft IME on Windows 10 20H1 (build 19025+) supports IME private mode by input scope. Although previous Windows versions use an undocumented API for Edge and IE only, the next Windows 10 release will use a public API for it. We pre-empt this potential privacy concern by setting the IS_PRIVATE flag when in PB mode.
* Issue #1348 - Part 2: Teach IMEState about Private Browsing mode.wolfbeast2020-01-11-8/+21
|
* Issue #1348 - Part 1: Clean up input scope support for IMM32.Makoto Kato2020-01-11-50/+26
| | | | Use AutoTArray to set input scope.
* Reject sample rates that are out-of-range for libsoundtouch.wolfbeast2020-01-11-3/+8
| | | | | We never reach this with our normal use of this lib but adding the sanity check just in case. (ported from upstream)
* Bug 1599054 - allow callers to ommit sending OAuth2 client_secret parameter.Gaming4JC2020-01-11-2/+21
|
* Bug 1597933 - Use URLSearchParams for setting params for OAuth2 ↵Gaming4JC2020-01-11-20/+37
| | | | authorization request.
* Bug 1597933 - use fetch + URLSearchParms instead of Http.jsm to request ↵Gaming4JC2020-01-11-32/+32
| | | | OAuth2 access token.
* Bug 1597933 - don't pass string constants to determine OAuth refresh token ↵Gaming4JC2020-01-11-10/+16
| | | | or not.
* Bug 1597933 - improve OAuth2 params parsing.Gaming4JC2020-01-11-15/+7
|
* Bug 1597933 - clean up OAuth2 code: remove responseType which is always code.Gaming4JC2020-01-11-9/+6
| | | | Response type token is part of the OAuth 2.0 Implicit Flow which is not used in Mail Applications, but also discouraged by the OAuth Working Group: https://developer.okta.com/blog/2019/05/01/is-the-oauth-implicit-flow-dead
* Bug 1453643 - Enable proper retry on oauth2 authenication failure.Gaming4JC2020-01-11-26/+34
| | | | This prevents mail applications from attempting to use an unauthenticated connection to mailbox(s) and avoid unexpected deletion of local mbox files and subsequent re-download of mailbox content over imap.
* Bug 1176399 - Multiple requests for master password when GMail OAuth2 is ↵Gaming4JC2020-01-11-21/+101
| | | | enabled.
* Merge branch 'master' into releasewolfbeast2019-12-09-0/+4
|\
| * No Issue - Execute the precomplete command on *nix AltPackagingMatt A. Tobin2019-12-09-0/+4
| | | | | | | | Windows does not need this as mar generation is dependent on the NSIS Installer which already contains the call
* | Merge branch 'master' into releasewolfbeast2019-12-07-20/+34
|\|
| * Merge branch 'release'wolfbeast2019-12-07-0/+0
| |\ | |/ |/|
* | Merge branch 'master' into releasewolfbeast2019-12-06-75268/+595601
|\ \
* | | Force clobber.wolfbeast2019-10-24-1/+1
| | |
* | | Update NSS versionwolfbeast2019-10-24-6/+7
| | |
* | | Add length checks for cryptographic primitivesKevin Jacobs2019-10-24-9/+56
| | | | | | | | | | | | | | | This rollup patch adds additional length checks around cryptographic primitives.
* | | Support longer (up to RFC maximum) HKDF outputswolfbeast2019-10-24-8/+25
| | | | | | | | | | | | | | | | | | HKDF-Expand enforces a maximum output length much shorter than stated in the RFC. This patch aligns the implementation with the RFC by allocating more output space when necessary.
* | | Add size checks to WebGLContext::BufferData()wolfbeast2019-10-24-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | On MacOS, particularly large allocations within the platform limits (1.2G+) will fail and crash. This adds a specific size check for that when working around driver bugs (default). While there, added a generic size_t limited size check for the platform, and reporting OOM if too large.
* | | Fix type barrier in IonBuilder::jsop_getimport.wolfbeast2019-10-24-3/+1
| | |
* | | Adjust tokenization of U+0000Henri Sivonen2019-10-24-13/+2
| | |
* | | Prevent nr_ice_component_insert_pair from leaking.Byron Campen2019-10-24-1/+6
| | |
* | | Leverage strings to get working dirs in nsUpdateDriver.wolfbeast2019-10-24-13/+18
| | |
* | | Ensure that file actors created after the database was closed are expired.Simon Giesecke2019-10-23-0/+3
| | |
* | | Avoid following the prototype chainwolfbeast2019-10-23-3/+20
| | | | | | | | | | | | | | | No longer follow the value's prototype chain when creating index updates in IndexedDB.
* | | Issue #1255 - Port upstream fix from libexpatwolfbeast2019-10-23-7/+13
| | |
* | | Issue #1253 - Reset performance object on navigationwolfbeast2019-10-23-1/+13
| | | | | | | | | | | | | | | | | | | | | This also addresses clearing of document dependent JS slots which might get out of sync with innerWindow navigation; relevant comments added. This resolves #1253
* | | Don't treat format warnings as errors in xpconnectMatt A. Tobin2019-10-21-1/+1
| | | | | | | | | | | | GCC 9 compiler does not like the way we have it in XPCWrappedNative.cpp
* | | Fix build errors with newer glibc versionsMatt A. Tobin2019-10-21-14/+4
| | |
* | | No Issue - Expand HWA over RDP to Windows 8.1 and 10.wolfbeast2019-10-21-1/+1
| | | | | | | | | | | | | | | | | | | | | When Mozilla implemented this initially, only Windows 8 existed. Because of the strict equal check, 8.1 and 10 didn't get HWA over RDP while they are perfectly capable of doing so with RemoteFX. This change allows any version of Windows from 8.0 onwards to use HWA over RDP.
* | | No issue - Update TZ data to 2019cwolfbeast2019-10-21-106/+103
| | |
* | | No issue - Add 360 Safeguard to DLL blocklistMoonchild2019-10-21-0/+3
| | | | | | | | | | | | | | | 360 Safeguard/360 Total Security (Qihoo) causes crashes in a11y components. This adds the offending dll to the injection blocklist. See BZ bug 1536227 for details.
* | | Issue #1243 - Update List of NSS Exported SymbolsGaming4JC2019-10-21-0/+2
| | | | | | | | | | | | Add NSS_CMSSignedData_GetDigestAlgs and NSS_CMSSignedData_hasDigests which are required for security patches in mailnews applications. Ref: m-c bug 1526473
* | | Issue #1231 - Correct defines for Mac and keep universal prefs generic.wolfbeast2019-10-21-6/+6
| | |
* | | Issue #1231 - Stop using ICC profiles on Linux.adeshkp2019-10-21-1/+8
| | | | | | | | | | | | | | | General consensus seems to be that color management on Linux desktops is not mature enough to enable by default.
* | | Merge commit '18a2244f5b1e28c2d38dd95bf93d02cef0173178' into releasewolfbeast2019-10-21-2/+7
|\ \ \
* \ \ \ Merge branch 'master' into releasewolfbeast2019-09-06-20345/+581
|\ \ \ \
| | | | * Merge pull request #1314 from g4jc/mailnews_patchesNew Tobin Paradigm2019-12-06-20/+34
| | | |/| | | | | | | | | | | Mailnews Nov/Dec Updates
| | | | * Bug 1571481 - Improve multipart/alternative.Gaming4JC2019-12-02-20/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | w/ Fixup for 1464056 - Follow-up: rename pref to align with mailnews.p7m_external (which was already in 52.x but missing a single line) Tag #1311
| | | | * Bug 1482248 - don't crash on empty file name in ↵Gaming4JC2019-12-02-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nsMsgLocalStoreUtils::nsShouldIgnoreFile. Tag #1311
| | | | * Bug 1509685 - Add more bounds checking in ↵Gaming4JC2019-12-02-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nsMsgDBView::UpdateDisplayMessage() to avoid crashes Tag #1311
| | | * | Update NSS version.wolfbeast2019-12-06-6/+8
| | | | |
| | | * | Add missing call to WaitForIsDebuggerRegisteredwolfbeast2019-12-06-0/+6
| | | | |
| | | * | [NSS] Bug 1586176 - EncryptUpdate should use maxout not block size.Craig Disselkoen2019-12-06-1/+1
| | | | |
| | | * | Check return value of PeerConnectionImpl::GetFingerprint.Christian Holler2019-12-06-1/+2
| | | | |
| | | * | [NSS] Bug 1508776 - Remove unneeded refcounting from SFTKSessionJ.C. Jones2019-12-06-24/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | SFTKSession objects are only ever actually destroyed at PK11 session closure, as the session is always the final holder -- and asserting refCount == 1 shows that to be true. Because of that, NSC_CloseSession can just call `sftk_DestroySession` directly and leave `sftk_FreeSession` as a no-op to be removed in the future.