summaryrefslogtreecommitdiffstats
path: root/netwerk
Commit message (Collapse)AuthorAgeLines
...
* | Merge pull request #126 from ↵New Tobin Paradigm2018-04-12-1/+1
|\ \ | | | | | | | | | | | | janekptacijarabaci/js_X-Content-Type-Options_nosniff_json_1 Align XCTO: nosniff allowed script MIME types with the spec
| * | Bug 1431095 - Change Content-Type-Options: nosniff allowed script MIME types ↵janekptacijarabaci2018-04-03-1/+1
| | | | | | | | | | | | to match the spec
* | | Remove base conditional code for crash reporter and injector.wolfbeast2018-03-30-11/+0
|/ /
* | Be more explicit with a lock.wolfbeast2018-03-17-2/+3
| |
* | Bug 1440775 - Make fetch API force-cache and only-if-cached use ↵Ben Kelly2018-03-14-4/+4
| | | | | | | | | | | | | | | | | | | | VALIDATE_NEVER instead of LOAD_FROM_CACHE. r=mayhemer, a=RyanVM --HG-- extra : source : 60fb09de57ec145923da102f856399d3323f632b extra : amend_source : b42db87defcc5615773cfa4659af9ff5b9cd4b72 extra : intermediate-source : 599641c7992def734cb352d9413aa51bf0e9793f extra : histedit_source : 1d42c837225bdf000d3a68bef46a862be87d4044
* | Bug 1334465 - Set mIPCClosed to true before calling SendDeleteSelf in order ↵Valentin Gosu2018-03-14-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | to avoid race. r=bagder, a=ritu In the previous code, a race condition could cause us to call SendSetPriority() after calling SendDeleteSelf. For example: T1: SendDeleteSelf() T2: if (!mIPCClosed) SendSetPriority() T1: mIPCClosed = true MozReview-Commit-ID: 3XOwCaphb2o --HG-- extra : rebase_source : d6e6886402d1e0b0afed23c25a9fb18d8ca29ad6 extra : intermediate-source : cfc9afe916091e6449f7d748991e2a19187dc817 extra : source : 4ebdab0e332892378558817e30d0138c95199ce5
* | Bug 1334465 - Make HttpChannelParent::mIPCClosed atomic. r=bagder, a=rituValentin Gosu2018-03-14-1/+1
| | | | | | | | | | | | | | | | | | MozReview-Commit-ID: 6irCJMAjzjW --HG-- extra : rebase_source : 2357ab0b9d1d693dac9e5f4f16f34f370c6591b5 extra : intermediate-source : 48b9f6671588c3c2b8d3b4ea6ba1267f5e297f83 extra : source : bd315ae86709c3459a3dbf0778022ff3b1908723
* | Bug 1416529. r=mcmanus, a=rituNicholas Hurley2018-03-14-9/+24
| | | | | | | | | | | | | | MozReview-Commit-ID: CD1l5vLB4yy --HG-- extra : rebase_source : d74f8ca96dab4e0d25d79948fcddbf8dab98bb36
* | Remove Rust URL parser CAPIwolfbeast2018-03-13-826/+0
| | | | | | | | Part 2 for #58
* | DevTools - network - implement the secureConnectionStart property for the ↵janekptacijarabaci2018-03-01-4/+141
| | | | | | | | | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit)
* | Activate TLS 1.3 by default.wolfbeast2018-02-24-1/+1
| | | | | | | | This resolves #15.
* | Merge branch 'security_tls_1-3_1' into TLS-1.3wolfbeast2018-02-23-93/+390
|\ \
| * | Style clean upjanekptacijarabaci2018-02-11-1/+0
| | |
| * | Bug 1344340 - "An unknown error has occurred (804b000c)" appears in the ↵janekptacijarabaci2018-02-11-0/+2
| | | | | | | | | | | | statusbar when loading some sites
| * | Bug 1328955 - When a client tries TLS1.3 with EarlyData and a server falls ↵janekptacijarabaci2018-02-11-3/+8
| | | | | | | | | | | | back to tls1.2,we should reconnect using tls1.3 without EarlyData
| * | Bug 1351392 - Fix transport status events for http2 and ftpjanekptacijarabaci2018-02-11-0/+4
| | |
| * | Bug 1344890 - h2 tls 1.3 early data problem with https://echo.filippo.io/foojanekptacijarabaci2018-02-11-0/+5
| | |
| * | Bug 1322373 - TLS 1.3 early-data for http/2janekptacijarabaci2018-02-11-82/+342
| | |
| * | Bug 1345240 - h2 stalls on failed early data hard reloadjanekptacijarabaci2018-02-11-0/+6
| | |
| * | Bug 1343600 - Add TLS handshake Start/Stop eventsjanekptacijarabaci2018-02-11-8/+24
| | |
| * | Bug 1340164 - Fix socket transport status eventsjanekptacijarabaci2018-02-11-0/+49
| | |
* | | Merge branch '_native_52ESR_http_events_1' into TLS-1.3wolfbeast2018-02-23-0/+49
|\ \ \
| * | | Fix socket transport status eventsjanekptacijarabaci2018-02-04-0/+49
| | | | | | | | | | | | | | | | | | | | | | | | Bug(s): https://bugzilla.mozilla.org/show_bug.cgi?id=1340164 (native in moebius)
* | | | CSP: Upgrade SO navigational requests per spec.janekptacijarabaci2018-02-22-0/+7
| | | |
* | | | Identify as Goanna + set Goanna platform version.wolfbeast2018-02-21-1/+1
| | | |
* | | | Read Firefox UA compatmode from a pref instead of hard-coded.wolfbeast2018-02-21-7/+24
| | | | | | | | | | | | | | | | In case of a missing pref, a hard-coded value is still used from the ctor.
* | | | Update UA construction.wolfbeast2018-02-21-10/+56
| | | |
* | | | Crypto Services (utils) - Support for SHA224-512janekptacijarabaci2018-02-21-1/+2
| | | |
* | | | Remove obsolete WinXPWifiScanner class.wolfbeast2018-02-19-447/+4
| | | | | | | | | | | | | | | | Tag #22
* | | | Remove Windows XP specific code in netwerk.wolfbeast2018-02-19-39/+1
| | | |
* | | | Two (and more) extensions together - http resume - basilisk crashesjanekptacijarabaci2018-02-18-1/+76
| |_|/ |/| |
* | | Add newChannel2 back to NetUtil.jsmMatt A. Tobin2018-02-10-0/+35
| |/ |/|
* | Check ScriptExtensions property of combining marks when available.wolfbeast2018-02-08-3/+34
| |
* | Force punycode display for IDNs with a <dotless-i/j, combining mark above> ↵wolfbeast2018-02-08-5/+14
| | | | | | | | sequence.
* | Limit displayed user/host strings to sane lengths.wolfbeast2018-02-07-0/+30
|/
* Merge branch 'goanna-gfx'wolfbeast2018-02-03-0/+1
|\
| * Implement WebP image decoder.wolfbeast2018-02-03-0/+1
| |
* | Disable static DHE + AES suites by default (common combination for weak DH keys)wolfbeast2018-02-02-2/+2
| | | | | | | | Issue #4 point 5
* | Disable 3DES cipher by default + re-order a few things.wolfbeast2018-02-02-2/+4
| | | | | | | | Issue #4 point 4
* | Add RSA-AES + SHA256/384 suites for web compatibility.wolfbeast2018-02-02-0/+4
| | | | | | | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3
* | Add Camellia to the active cipher suites.wolfbeast2018-02-02-0/+4
|/ | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project.
* Add m-esr52 at 52.6.0Matt A. Tobin2018-02-02-0/+457763