summaryrefslogtreecommitdiffstats
path: root/netwerk/base
Commit message (Collapse)AuthorAgeLines
* Revert "Disable TLS 1.3 by default for now until our NSS can be updated to ↵wolfbeast2018-06-06-1/+1
| | | | | | the latest spec." This reverts commit 6c3f95480a191ce432ddfb2aa400a6d70c4884a8.
* Merge pull request #412 from g4jc/hsts_priming_removal_backportMoonchild2018-05-30-71/+2
|\ | | | | Remove support and tests for HSTS priming from the tree. Fixes #384
| * Remove support and tests for HSTS priming from the tree. Fixes #384Gaming4JC2018-05-26-71/+2
| |
* | Fix sec pref locations and enable HPKP checking by default.wolfbeast2018-05-29-0/+11
|/ | | | Some prefs were incorrectly in all.js (ocsp and hpkp)
* Revert incorrect UAO optimization that broke SSUAOJustOff2018-05-15-22/+0
|
* Remove other gonk widget conditionals and unused files.wolfbeast2018-05-13-5/+0
| | | | Tag #288.
* Remove MOZ_WIDGET_GONK [2/2]wolfbeast2018-05-13-75/+1
| | | | Tag #288
* Remove MOZ_B2G leftovers and some dead B2G-only components.wolfbeast2018-05-12-1/+1
|
* Bug 1182569: Update ContentSecurityManager to handle docshell loadsjanekptacijarabaci2018-04-30-10/+4
|
* moebius#158: The Performance Resource Timing (added support for "workerStart")janekptacijarabaci2018-04-29-1/+45
| | | | https://github.com/MoonchildProductions/moebius/pull/158
* Disable TLS 1.3 by default for now until our NSS can be updated to the ↵wolfbeast2018-04-25-1/+1
| | | | latest spec.
* moebius#187: DOM - nsIContentPolicy - context (document)janekptacijarabaci2018-04-23-2/+30
| | | | https://github.com/MoonchildProductions/moebius/pull/187
* Revert "Bug 1182569: Update ContentSecurityManager to handle docshell loads"janekptacijarabaci2018-04-22-4/+10
| | | | This reverts commit 2e33335820b2816bee111e78588ac82e401c86ae.
* Bug 1182569: Update ContentSecurityManager to handle docshell loadsjanekptacijarabaci2018-04-22-10/+4
| | | | native in moebius
* Bug 1323683 - Fold nsIURIWithQuery into nsIURIjanekptacijarabaci2018-04-22-64/+45
| | | | native in moebius
* moebius#230: Consider blocking top level window data: URIs (part 3/3 without ↵janekptacijarabaci2018-04-22-0/+29
| | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/230
* moebius#226: Consider blocking top level window data: URIs (part 2/2 without ↵janekptacijarabaci2018-04-22-0/+32
| | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/226
* moebius#223: Consider blocking top level window data: URIs (part 1/3 without ↵janekptacijarabaci2018-04-22-0/+14
| | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/223
* Bug 1433609 - Ensure that deserialized URL is correct. r=mayhemer, a=RyanVMValentin Gosu2018-04-19-15/+49
| | | | MozReview-Commit-ID: BMQfPzPhDhc
* Bug 1361699 - Add buffer when writing hashstore to file. r=gcp, r=mcmanus, ↵Thomas Nguyen2018-04-19-4/+4
| | | | | | | | | | | | | a=RyanVM We write a lot of 4-bytes prefixes to file which call many system calls. We should use a buffer and only write to file if the buffer is full or finish writing. nsIBufferedOutputStream is a good candidate to do that MozReview-Commit-ID: CzGOd7iXVTv --HG-- extra : source : 8f2b4efc5f0d3191a7e80d9324933621e111b44a
* moebius#131: URL parser - stop preserving empty passwordsjanekptacijarabaci2018-04-15-3/+9
| | | | https://github.com/MoonchildProductions/moebius/issues/131
* moebius#130: URL parser - fix: don't allow empty host namejanekptacijarabaci2018-04-15-10/+21
| | | | https://github.com/MoonchildProductions/moebius/issues/130
* Remove Rust URL parser CAPIwolfbeast2018-03-13-826/+0
| | | | Part 2 for #58
* DevTools - network - implement the secureConnectionStart property for the ↵janekptacijarabaci2018-03-01-1/+16
| | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit)
* Activate TLS 1.3 by default.wolfbeast2018-02-24-1/+1
| | | | This resolves #15.
* Merge branch 'security_tls_1-3_1' into TLS-1.3wolfbeast2018-02-23-7/+9
|\
| * Bug 1343600 - Add TLS handshake Start/Stop eventsjanekptacijarabaci2018-02-11-7/+9
| |
* | CSP: Upgrade SO navigational requests per spec.janekptacijarabaci2018-02-22-0/+7
| |
* | Crypto Services (utils) - Support for SHA224-512janekptacijarabaci2018-02-21-1/+2
| |
* | Remove Windows XP specific code in netwerk.wolfbeast2018-02-19-26/+1
| |
* | Add newChannel2 back to NetUtil.jsmMatt A. Tobin2018-02-10-0/+35
|/
* Disable static DHE + AES suites by default (common combination for weak DH keys)wolfbeast2018-02-02-2/+2
| | | | Issue #4 point 5
* Disable 3DES cipher by default + re-order a few things.wolfbeast2018-02-02-2/+4
| | | | Issue #4 point 4
* Add RSA-AES + SHA256/384 suites for web compatibility.wolfbeast2018-02-02-0/+4
| | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3
* Add Camellia to the active cipher suites.wolfbeast2018-02-02-0/+4
| | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project.
* Add m-esr52 at 52.6.0Matt A. Tobin2018-02-02-0/+67756