Commit message (Collapse) | Author | Age | Lines | ||
---|---|---|---|---|---|
... | |||||
* | | Bug 1334465 - Set mIPCClosed to true before calling SendDeleteSelf in order ↵ | Valentin Gosu | 2018-03-14 | -1/+1 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | to avoid race. r=bagder, a=ritu In the previous code, a race condition could cause us to call SendSetPriority() after calling SendDeleteSelf. For example: T1: SendDeleteSelf() T2: if (!mIPCClosed) SendSetPriority() T1: mIPCClosed = true MozReview-Commit-ID: 3XOwCaphb2o --HG-- extra : rebase_source : d6e6886402d1e0b0afed23c25a9fb18d8ca29ad6 extra : intermediate-source : cfc9afe916091e6449f7d748991e2a19187dc817 extra : source : 4ebdab0e332892378558817e30d0138c95199ce5 | ||||
* | | Bug 1334465 - Make HttpChannelParent::mIPCClosed atomic. r=bagder, a=ritu | Valentin Gosu | 2018-03-14 | -1/+1 | |
| | | | | | | | | | | | | | | | | | | MozReview-Commit-ID: 6irCJMAjzjW --HG-- extra : rebase_source : 2357ab0b9d1d693dac9e5f4f16f34f370c6591b5 extra : intermediate-source : 48b9f6671588c3c2b8d3b4ea6ba1267f5e297f83 extra : source : bd315ae86709c3459a3dbf0778022ff3b1908723 | ||||
* | | Bug 1416529. r=mcmanus, a=ritu | Nicholas Hurley | 2018-03-14 | -9/+24 | |
| | | | | | | | | | | | | | | MozReview-Commit-ID: CD1l5vLB4yy --HG-- extra : rebase_source : d74f8ca96dab4e0d25d79948fcddbf8dab98bb36 | ||||
* | | Remove Rust URL parser CAPI | wolfbeast | 2018-03-13 | -826/+0 | |
| | | | | | | | | Part 2 for #58 | ||||
* | | DevTools - network - implement the secureConnectionStart property for the ↵ | janekptacijarabaci | 2018-03-01 | -4/+141 | |
| | | | | | | | | | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit) | ||||
* | | Activate TLS 1.3 by default. | wolfbeast | 2018-02-24 | -1/+1 | |
| | | | | | | | | This resolves #15. | ||||
* | | Merge branch 'security_tls_1-3_1' into TLS-1.3 | wolfbeast | 2018-02-23 | -93/+390 | |
|\ \ | |||||
| * | | Style clean up | janekptacijarabaci | 2018-02-11 | -1/+0 | |
| | | | |||||
| * | | Bug 1344340 - "An unknown error has occurred (804b000c)" appears in the ↵ | janekptacijarabaci | 2018-02-11 | -0/+2 | |
| | | | | | | | | | | | | statusbar when loading some sites | ||||
| * | | Bug 1328955 - When a client tries TLS1.3 with EarlyData and a server falls ↵ | janekptacijarabaci | 2018-02-11 | -3/+8 | |
| | | | | | | | | | | | | back to tls1.2,we should reconnect using tls1.3 without EarlyData | ||||
| * | | Bug 1351392 - Fix transport status events for http2 and ftp | janekptacijarabaci | 2018-02-11 | -0/+4 | |
| | | | |||||
| * | | Bug 1344890 - h2 tls 1.3 early data problem with https://echo.filippo.io/foo | janekptacijarabaci | 2018-02-11 | -0/+5 | |
| | | | |||||
| * | | Bug 1322373 - TLS 1.3 early-data for http/2 | janekptacijarabaci | 2018-02-11 | -82/+342 | |
| | | | |||||
| * | | Bug 1345240 - h2 stalls on failed early data hard reload | janekptacijarabaci | 2018-02-11 | -0/+6 | |
| | | | |||||
| * | | Bug 1343600 - Add TLS handshake Start/Stop events | janekptacijarabaci | 2018-02-11 | -8/+24 | |
| | | | |||||
| * | | Bug 1340164 - Fix socket transport status events | janekptacijarabaci | 2018-02-11 | -0/+49 | |
| | | | |||||
* | | | Merge branch '_native_52ESR_http_events_1' into TLS-1.3 | wolfbeast | 2018-02-23 | -0/+49 | |
|\ \ \ | |||||
| * | | | Fix socket transport status events | janekptacijarabaci | 2018-02-04 | -0/+49 | |
| | | | | | | | | | | | | | | | | | | | | | | | | Bug(s): https://bugzilla.mozilla.org/show_bug.cgi?id=1340164 (native in moebius) | ||||
* | | | | CSP: Upgrade SO navigational requests per spec. | janekptacijarabaci | 2018-02-22 | -0/+7 | |
| | | | | |||||
* | | | | Identify as Goanna + set Goanna platform version. | wolfbeast | 2018-02-21 | -1/+1 | |
| | | | | |||||
* | | | | Read Firefox UA compatmode from a pref instead of hard-coded. | wolfbeast | 2018-02-21 | -7/+24 | |
| | | | | | | | | | | | | | | | | In case of a missing pref, a hard-coded value is still used from the ctor. | ||||
* | | | | Update UA construction. | wolfbeast | 2018-02-21 | -10/+56 | |
| | | | | |||||
* | | | | Crypto Services (utils) - Support for SHA224-512 | janekptacijarabaci | 2018-02-21 | -1/+2 | |
| | | | | |||||
* | | | | Remove obsolete WinXPWifiScanner class. | wolfbeast | 2018-02-19 | -447/+4 | |
| | | | | | | | | | | | | | | | | Tag #22 | ||||
* | | | | Remove Windows XP specific code in netwerk. | wolfbeast | 2018-02-19 | -39/+1 | |
| | | | | |||||
* | | | | Two (and more) extensions together - http resume - basilisk crashes | janekptacijarabaci | 2018-02-18 | -1/+76 | |
| |_|/ |/| | | |||||
* | | | Add newChannel2 back to NetUtil.jsm | Matt A. Tobin | 2018-02-10 | -0/+35 | |
| |/ |/| | |||||
* | | Check ScriptExtensions property of combining marks when available. | wolfbeast | 2018-02-08 | -3/+34 | |
| | | |||||
* | | Force punycode display for IDNs with a <dotless-i/j, combining mark above> ↵ | wolfbeast | 2018-02-08 | -5/+14 | |
| | | | | | | | | sequence. | ||||
* | | Limit displayed user/host strings to sane lengths. | wolfbeast | 2018-02-07 | -0/+30 | |
|/ | |||||
* | Merge branch 'goanna-gfx' | wolfbeast | 2018-02-03 | -0/+1 | |
|\ | |||||
| * | Implement WebP image decoder. | wolfbeast | 2018-02-03 | -0/+1 | |
| | | |||||
* | | Disable static DHE + AES suites by default (common combination for weak DH keys) | wolfbeast | 2018-02-02 | -2/+2 | |
| | | | | | | | | Issue #4 point 5 | ||||
* | | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -2/+4 | |
| | | | | | | | | Issue #4 point 4 | ||||
* | | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+4 | |
| | | | | | | | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 | ||||
* | | Add Camellia to the active cipher suites. | wolfbeast | 2018-02-02 | -0/+4 | |
|/ | | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. | ||||
* | Add m-esr52 at 52.6.0 | Matt A. Tobin | 2018-02-02 | -0/+457763 | |