Commit message (Collapse) | Author | Age | Lines | |
---|---|---|---|---|
* | Disable TLS 1.3 by default for now until our NSS can be updated to the ↵ | wolfbeast | 2018-04-25 | -1/+1 |
| | | | | latest spec. | |||
* | moebius#187: DOM - nsIContentPolicy - context (document) | janekptacijarabaci | 2018-04-23 | -2/+30 |
| | | | | https://github.com/MoonchildProductions/moebius/pull/187 | |||
* | Revert "Bug 1182569: Update ContentSecurityManager to handle docshell loads" | janekptacijarabaci | 2018-04-22 | -4/+10 |
| | | | | This reverts commit 2e33335820b2816bee111e78588ac82e401c86ae. | |||
* | Bug 1182569: Update ContentSecurityManager to handle docshell loads | janekptacijarabaci | 2018-04-22 | -10/+4 |
| | | | | native in moebius | |||
* | Bug 1323683 - Fold nsIURIWithQuery into nsIURI | janekptacijarabaci | 2018-04-22 | -64/+45 |
| | | | | native in moebius | |||
* | moebius#230: Consider blocking top level window data: URIs (part 3/3 without ↵ | janekptacijarabaci | 2018-04-22 | -0/+29 |
| | | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/230 | |||
* | moebius#226: Consider blocking top level window data: URIs (part 2/2 without ↵ | janekptacijarabaci | 2018-04-22 | -0/+32 |
| | | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/226 | |||
* | moebius#223: Consider blocking top level window data: URIs (part 1/3 without ↵ | janekptacijarabaci | 2018-04-22 | -0/+14 |
| | | | | | | tests) https://github.com/MoonchildProductions/moebius/pull/223 | |||
* | Bug 1433609 - Ensure that deserialized URL is correct. r=mayhemer, a=RyanVM | Valentin Gosu | 2018-04-19 | -15/+49 |
| | | | | MozReview-Commit-ID: BMQfPzPhDhc | |||
* | Bug 1361699 - Add buffer when writing hashstore to file. r=gcp, r=mcmanus, ↵ | Thomas Nguyen | 2018-04-19 | -4/+4 |
| | | | | | | | | | | | | | a=RyanVM We write a lot of 4-bytes prefixes to file which call many system calls. We should use a buffer and only write to file if the buffer is full or finish writing. nsIBufferedOutputStream is a good candidate to do that MozReview-Commit-ID: CzGOd7iXVTv --HG-- extra : source : 8f2b4efc5f0d3191a7e80d9324933621e111b44a | |||
* | moebius#131: URL parser - stop preserving empty passwords | janekptacijarabaci | 2018-04-15 | -3/+9 |
| | | | | https://github.com/MoonchildProductions/moebius/issues/131 | |||
* | moebius#130: URL parser - fix: don't allow empty host name | janekptacijarabaci | 2018-04-15 | -10/+21 |
| | | | | https://github.com/MoonchildProductions/moebius/issues/130 | |||
* | Remove Rust URL parser CAPI | wolfbeast | 2018-03-13 | -826/+0 |
| | | | | Part 2 for #58 | |||
* | DevTools - network - implement the secureConnectionStart property for the ↵ | janekptacijarabaci | 2018-03-01 | -1/+16 |
| | | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit) | |||
* | Activate TLS 1.3 by default. | wolfbeast | 2018-02-24 | -1/+1 |
| | | | | This resolves #15. | |||
* | Merge branch 'security_tls_1-3_1' into TLS-1.3 | wolfbeast | 2018-02-23 | -7/+9 |
|\ | ||||
| * | Bug 1343600 - Add TLS handshake Start/Stop events | janekptacijarabaci | 2018-02-11 | -7/+9 |
| | | ||||
* | | CSP: Upgrade SO navigational requests per spec. | janekptacijarabaci | 2018-02-22 | -0/+7 |
| | | ||||
* | | Crypto Services (utils) - Support for SHA224-512 | janekptacijarabaci | 2018-02-21 | -1/+2 |
| | | ||||
* | | Remove Windows XP specific code in netwerk. | wolfbeast | 2018-02-19 | -26/+1 |
| | | ||||
* | | Add newChannel2 back to NetUtil.jsm | Matt A. Tobin | 2018-02-10 | -0/+35 |
|/ | ||||
* | Disable static DHE + AES suites by default (common combination for weak DH keys) | wolfbeast | 2018-02-02 | -2/+2 |
| | | | | Issue #4 point 5 | |||
* | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -2/+4 |
| | | | | Issue #4 point 4 | |||
* | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+4 |
| | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 | |||
* | Add Camellia to the active cipher suites. | wolfbeast | 2018-02-02 | -0/+4 |
| | | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. | |||
* | Add m-esr52 at 52.6.0 | Matt A. Tobin | 2018-02-02 | -0/+67756 |