Commit message (Collapse) | Author | Age | Lines | |
---|---|---|---|---|
* | Expose TLS 1.3 cipher suite prefs. | wolfbeast | 2019-02-10 | -1/+9 |
| | ||||
* | Never let "localhost" get sent to a proxy. | wolfbeast | 2019-02-07 | -0/+7 |
| | | | | Also make "No proxy for" editable always when usable. | |||
* | Remove NS_IMPL_CYCLE_COLLECTION_TRAVERSE_SCRIPT_OBJECTS | wolfbeast | 2019-01-18 | -1/+0 |
| | ||||
* | Telemetry: Remove stubs and related code | adeshkp | 2019-01-12 | -337/+14 |
| | ||||
* | Do not report resource-timing subdocument loads triggered by that subdocument. | wolfbeast | 2018-12-14 | -0/+31 |
| | ||||
* | backport m-c bug 1333172 - Avoid 1100 warnings by replacing ↵ | Gaming4JC | 2018-10-23 | -1/+3 |
| | | | | NS_ENSURE_SUCCESS in nsNetUtilInlines.h:180 | |||
* | backport m-c bug 1333174 - Don't use NS_ENSURE_SUCCESS at nsIOService:793 | Gaming4JC | 2018-10-22 | -1/+3 |
| | | | | Log spam fix. Suppresses 1,100 instances of NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80520012 emitted from netwerk/base/nsIOService.cpp during linux64 debug testing. Backports [m-c 1333174](https://bugzilla.mozilla.org/show_bug.cgi?id=1333174). | |||
* | Clean up a number of unused variables. | wolfbeast | 2018-09-29 | -42/+0 |
| | | | | Tag #21. | |||
* | Remove all C++ Telemetry Accumulation calls. | wolfbeast | 2018-09-03 | -308/+3 |
| | | | | | This creates a number of stubs and leaves some surrounding code that may be irrelevant (eg. recorded time stamps, status variables). Stub resolution/removal should be a follow-up to this. | |||
* | Remove support for TLS session caches in TLSServerSocket. | wolfbeast | 2018-09-01 | -23/+2 |
| | | | | This resolves #738 | |||
* | Reinstate RC4 and mark 3DES weak. | wolfbeast | 2018-08-17 | -0/+2 |
| | | | | Tag #709 | |||
* | Make nsAtomicFileOutputStream::DoOpen() fail if the file is read-only. | wolfbeast | 2018-07-10 | -0/+7 |
| | | | | This means we don't leave behind prefs-<n>.js files when prefs.js is read-only. | |||
* | Merge pull request #540 from janekptacijarabaci/security_csp_script_redirect_1 | Moonchild | 2018-06-24 | -2/+38 |
|\ | | | | | Fix CSP: Scripts with valid nonce should not be blocked if URL redirects | |||
| * | CSP: Support for "LoadInfo::GetLoadingContext" and ↵ | janekptacijarabaci | 2018-06-21 | -2/+38 |
| | | | | | | | | | | | | "LoadInfo::GetLoadingContextXPCOM()" https://bugzilla.mozilla.org/show_bug.cgi?id=1439713 (partially) | |||
* | | Fix SSL status ambiguity. | wolfbeast | 2018-06-20 | -3/+20 |
|/ | | | | | - Adds CipherSuite string with the full suite - Changes CipherName to be the actual cipher name instead of the (erroneous) full suite like Firefox does. | |||
* | Sanity-check in nsStandardURL::Deserialize(). r=mayhemer, a=RyanVM | Valentin Gosu | 2018-06-07 | -1/+3 |
| | | | | | | Also add test for faulty nsStandardURL deserialization. See Bug 1392739. | |||
* | Revert "Disable TLS 1.3 by default for now until our NSS can be updated to ↵ | wolfbeast | 2018-06-06 | -1/+1 |
| | | | | | | the latest spec." This reverts commit 6c3f95480a191ce432ddfb2aa400a6d70c4884a8. | |||
* | Merge pull request #412 from g4jc/hsts_priming_removal_backport | Moonchild | 2018-05-30 | -71/+2 |
|\ | | | | | Remove support and tests for HSTS priming from the tree. Fixes #384 | |||
| * | Remove support and tests for HSTS priming from the tree. Fixes #384 | Gaming4JC | 2018-05-26 | -71/+2 |
| | | ||||
* | | Fix sec pref locations and enable HPKP checking by default. | wolfbeast | 2018-05-29 | -0/+11 |
|/ | | | | Some prefs were incorrectly in all.js (ocsp and hpkp) | |||
* | Revert incorrect UAO optimization that broke SSUAO | JustOff | 2018-05-15 | -22/+0 |
| | ||||
* | Remove other gonk widget conditionals and unused files. | wolfbeast | 2018-05-13 | -5/+0 |
| | | | | Tag #288. | |||
* | Remove MOZ_WIDGET_GONK [2/2] | wolfbeast | 2018-05-13 | -75/+1 |
| | | | | Tag #288 | |||
* | Remove MOZ_B2G leftovers and some dead B2G-only components. | wolfbeast | 2018-05-12 | -1/+1 |
| | ||||
* | Bug 1182569: Update ContentSecurityManager to handle docshell loads | janekptacijarabaci | 2018-04-30 | -10/+4 |
| | ||||
* | moebius#158: The Performance Resource Timing (added support for "workerStart") | janekptacijarabaci | 2018-04-29 | -1/+45 |
| | | | | https://github.com/MoonchildProductions/moebius/pull/158 | |||
* | Disable TLS 1.3 by default for now until our NSS can be updated to the ↵ | wolfbeast | 2018-04-25 | -1/+1 |
| | | | | latest spec. | |||
* | moebius#187: DOM - nsIContentPolicy - context (document) | janekptacijarabaci | 2018-04-23 | -2/+30 |
| | | | | https://github.com/MoonchildProductions/moebius/pull/187 | |||
* | Revert "Bug 1182569: Update ContentSecurityManager to handle docshell loads" | janekptacijarabaci | 2018-04-22 | -4/+10 |
| | | | | This reverts commit 2e33335820b2816bee111e78588ac82e401c86ae. | |||
* | Bug 1182569: Update ContentSecurityManager to handle docshell loads | janekptacijarabaci | 2018-04-22 | -10/+4 |
| | | | | native in moebius | |||
* | Bug 1323683 - Fold nsIURIWithQuery into nsIURI | janekptacijarabaci | 2018-04-22 | -64/+45 |
| | | | | native in moebius | |||
* | moebius#230: Consider blocking top level window data: URIs (part 3/3 without ↵ | janekptacijarabaci | 2018-04-22 | -0/+29 |
| | | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/230 | |||
* | moebius#226: Consider blocking top level window data: URIs (part 2/2 without ↵ | janekptacijarabaci | 2018-04-22 | -0/+32 |
| | | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/226 | |||
* | moebius#223: Consider blocking top level window data: URIs (part 1/3 without ↵ | janekptacijarabaci | 2018-04-22 | -0/+14 |
| | | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/223 | |||
* | Bug 1433609 - Ensure that deserialized URL is correct. r=mayhemer, a=RyanVM | Valentin Gosu | 2018-04-19 | -15/+49 |
| | | | | MozReview-Commit-ID: BMQfPzPhDhc | |||
* | Bug 1361699 - Add buffer when writing hashstore to file. r=gcp, r=mcmanus, ↵ | Thomas Nguyen | 2018-04-19 | -4/+4 |
| | | | | | | | | | | | | | a=RyanVM We write a lot of 4-bytes prefixes to file which call many system calls. We should use a buffer and only write to file if the buffer is full or finish writing. nsIBufferedOutputStream is a good candidate to do that MozReview-Commit-ID: CzGOd7iXVTv --HG-- extra : source : 8f2b4efc5f0d3191a7e80d9324933621e111b44a | |||
* | moebius#131: URL parser - stop preserving empty passwords | janekptacijarabaci | 2018-04-15 | -3/+9 |
| | | | | https://github.com/MoonchildProductions/moebius/issues/131 | |||
* | moebius#130: URL parser - fix: don't allow empty host name | janekptacijarabaci | 2018-04-15 | -10/+21 |
| | | | | https://github.com/MoonchildProductions/moebius/issues/130 | |||
* | Remove Rust URL parser CAPI | wolfbeast | 2018-03-13 | -826/+0 |
| | | | | Part 2 for #58 | |||
* | DevTools - network - implement the secureConnectionStart property for the ↵ | janekptacijarabaci | 2018-03-01 | -1/+16 |
| | | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit) | |||
* | Activate TLS 1.3 by default. | wolfbeast | 2018-02-24 | -1/+1 |
| | | | | This resolves #15. | |||
* | Merge branch 'security_tls_1-3_1' into TLS-1.3 | wolfbeast | 2018-02-23 | -7/+9 |
|\ | ||||
| * | Bug 1343600 - Add TLS handshake Start/Stop events | janekptacijarabaci | 2018-02-11 | -7/+9 |
| | | ||||
* | | CSP: Upgrade SO navigational requests per spec. | janekptacijarabaci | 2018-02-22 | -0/+7 |
| | | ||||
* | | Crypto Services (utils) - Support for SHA224-512 | janekptacijarabaci | 2018-02-21 | -1/+2 |
| | | ||||
* | | Remove Windows XP specific code in netwerk. | wolfbeast | 2018-02-19 | -26/+1 |
| | | ||||
* | | Add newChannel2 back to NetUtil.jsm | Matt A. Tobin | 2018-02-10 | -0/+35 |
|/ | ||||
* | Disable static DHE + AES suites by default (common combination for weak DH keys) | wolfbeast | 2018-02-02 | -2/+2 |
| | | | | Issue #4 point 5 | |||
* | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -2/+4 |
| | | | | Issue #4 point 4 | |||
* | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+4 |
| | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 |