summaryrefslogtreecommitdiffstats
path: root/dom/crypto
Commit message (Collapse)AuthorAgeLines
* Check for integer overflow in AesTask::DoCrypto() (DiD)wolfbeast2018-02-08-0/+5
| | | | | | | | | | | | After calling mResult.SetLength(mData.Length() + 16) we should check that the integer addition didn't overflow. It seems at the moment impossible to create ArrayBuffers of size >= 0x0xfffffff0, however adding a check here doesn't hurt. mResult.Length() is passed to the PK11 API functions as a maxOut parameter and should be checked by the softoken crypto algorithm implementations. AES-ECB and AES-GCM seem to do that correctly.
* Add m-esr52 at 52.6.0Matt A. Tobin2018-02-02-0/+13414