Commit Graph

3285 Commits

Author SHA1 Message Date
Nicholas Nethercote
942ce2868b Bug 1175807 - Remove PL_DHashTableEnumerate() uses from nsNSSShutdown. r=honzab.
The doPK11Logout() change is straightforward.

In contrast, the loop in evaporateAllNSSResources() is *weird*. Nevertheless,
this change preserves its behaviour.
2015-06-17 21:09:27 -07:00
Nathan Froyd
8780083336 Bug 1161627 - part 2 - machine-convert TemporaryRef<T> to already_AddRefed<T>; r=ehsan
This conversion was done with the script:

  find . -name '*.cpp' -o -name '*.h' -o -name '*.mm' -o -name '*.idl' | \
    egrep -v 'cairo-win32-refptr.h|RefPtr.h|TestRefPtr.cpp' | \
    xargs sed -i -e 's/mozilla::TemporaryRef</already_AddRefed</g' \
                 -e 's/TemporaryRef</already_AddRefed</g'

Manual fixups were performed in the following instances:

- We handled mfbt/RefPtr.h manually so as to not convert TemporaryRef itself
  into already_AddRefed.

- The following files had explicit Move() calls added to make up for the lack
  of a copy constructor on already_AddRefed:

  dom/base/ImageEncoder.cpp
  dom/media/MediaTaskQueue.{h,cpp}
  dom/media/webaudio/PannerNode.cpp

- A redundant overload for MediaTaskQueue::Dispatch was deleted.

- A few manual fixups were required in mfbt/tests/TestRefPtr.cpp.

- Comments, using declarations, and forward declarations relating to
  TemporaryRef in dom/canvas/ and gfx/layers/ were changed to refer to
  already_AddRefed.
2015-06-17 10:00:52 -04:00
Cykesiopka
66018edcb1 Bug 1145679 - Part 2 - Tests. r=keeler 2015-06-29 22:19:00 +02:00
Cykesiopka
f7f78003a7 Bug 1145679 - Reject EV status for end-entity EV certs with overly long validity periods. r=keeler 2015-06-29 22:19:00 +02:00
David Keeler
ae70af8b30 bug 1174292 - convert test_cert_version.js to generate certificates at build time r=Cykesiopka
Also remove redundant test-cases.
2015-06-12 14:56:07 -07:00
Carsten "Tomcat" Book
c0d1c199e1 merge mozilla-inbound to mozilla-central a=merge 2015-06-29 14:17:02 +02:00
ffxbld
cb1f9a7dd3 No bug, Automated HPKP preload list update from host bld-linux64-spot-098 - a=hpkp-update 2015-06-27 03:33:49 -07:00
ffxbld
cac5bebc1b No bug, Automated HSTS preload list update from host bld-linux64-spot-098 - a=hsts-update 2015-06-27 03:33:47 -07:00
Carsten "Tomcat" Book
8b1114a78a merge mozilla-inbound to mozilla-central a=merge 2015-06-22 14:03:17 +02:00
Ryan VanderMeulen
c3e8750eeb Bug 1029775 - Skip test_ocsp_stapling_expired.js on B2G debug for frequent intermittent failures. 2015-06-21 21:22:08 -04:00
ffxbld
057a53995e No bug, Automated HPKP preload list update from host bld-linux64-spot-224 - a=hpkp-update 2015-06-20 03:33:00 -07:00
ffxbld
f0d19ca99d No bug, Automated HSTS preload list update from host bld-linux64-spot-224 - a=hsts-update 2015-06-20 03:32:58 -07:00
Ryan VanderMeulen
8d4e051843 Bug 1176097 - Update NSS to NSS_3_19_2_RTM. 2015-06-19 14:01:18 -04:00
Bob Owen
d4b55fc9ff Bug 1177594: Use a USER_RESTRICTED token level on GMP process when integrity levels are available. r=cpearce 2015-06-26 14:19:12 +01:00
Ryan VanderMeulen
e6131fc8b8 Backed out changeset 8b4e4083639e (bug 1171931) for B2G debug emulator bustage. 2015-06-25 19:48:42 -04:00
Bob Owen
791d7b4fed Bug 1172388: Use a USER_RESTRICTED access level token on Windows 10. r=cpearce 2015-06-19 23:35:43 +01:00
Jed Davis
48019b0f2f Bug 1176085 - Fix second/nanosecond confusion in Linux sandbox start error case. r=kang 2015-06-19 14:26:44 -07:00
Juan Gomez
2128198065 Bug 1171931 - Refactor duplicated code using XRE_IsParent/ContentProcess. r=froydnj 2015-06-24 14:11:00 -04:00
Benoit Girard
9b4532466d Bug 1172216 - Move nsStackwalk to mozglue. r=glandium 2015-06-10 16:32:45 -04:00
Bob Owen
1db067e6c3 Bug 1165895: Add NPAPI sandbox rule for the crash server pipe and x64 Temp dir write access. r=bbondy 2015-06-18 12:01:38 +01:00
Masatoshi Kimura
1c7ec03144 Bug 1165549 - Update fallback whitelist. r=keeler 2015-06-17 20:52:33 +09:00
David Keeler
79155a676a bug 1173565 - convert test_pinning_dynamic.js to generate certificates at build time r=Cykesiopka
Also fixes up references to test_pinning_dynamic certificates in test_pinning_header_parsing.js
2015-06-09 10:35:47 -07:00
Cykesiopka
e70c89f67a Bug 1171820 - Convert test_bug483440.html mochitest to an xpcshell test. r=keeler 2015-06-13 00:51:00 +02:00
Birunthan Mohanathas
a42b09b30a Bug 1164714 - Move netwerk/test/TestSTSParser.cpp into security/manager/ssl/tests/. r=keeler 2015-06-14 21:37:12 -07:00
David Keeler
431de766f3 bug 1172615 - check for and return early in the case of authentication bypass in AuthCertificateHook r=mcmanus 2015-06-08 13:18:23 -07:00
Jed Davis
fa57b1cb74 Bug 1168555 - Work around Nuwa not always being single-threaded when a normal content process is. r=kang 2015-06-10 13:38:00 -04:00
Kai Engert
aa51c10842 Bug 1174102 - Update to NSS 3.19.2, landing NSS_3_19_2_BETA1, r=nss-confcall 2015-06-12 11:10:17 +02:00
Cykesiopka
f1d2214a0b Bug 1171819 - Convert test_cert_eku-*.js to generate certificates at build time. r=keeler 2015-06-10 22:50:00 +02:00
Mike Perry
4d57a5909c Bug 629558 - Pref to make Intermediate Cert Store memory-only. r=keeler 2015-06-10 14:14:00 +02:00
Atul Kumar
bc61093971 Bug 1136301 - Null check for mCert->slot added in destructorSafeDestroyNSSReference & MarkForPermDeletion. Formatting update in MarkForPermDeletion. r=keeler 2015-06-10 09:46:16 -07:00
David Keeler
08dfe96c6a bug 1170303 - treat malformed name information in certificates as a domain name mismatch r=Cykesiopka 2015-06-01 13:55:23 -07:00
David Keeler
1bf24e0cc5 bug 1171557 - make test_cert_trust.js certs a bit more realistic r=mgoodwin
According to the Baseline Requirements, root certificates MUST NOT
have the extendedKeyUsage extension. The extension is optional for
intermediates and required for end-entity certificates. This change
modifies the test certificates so they're more in line with the BRs.
2015-06-03 15:37:38 -07:00
David Keeler
25303078e1 bug 1171557 - convert test_cert_trust.js to generate certificates at build time r=mgoodwin 2015-06-03 15:12:00 -07:00
Eric Rahm
2099cabb09 Bug 1145893 - Shutdown nsNSSComponent background threads during xpcom-shutdown. r=keeler, a=me 2015-03-23 10:58:25 -07:00
Richard Barnes
d42e1cb659 Bug 1010068 - Disable OCSP for DV certificates in Firefox for Android r=keeler 2015-05-28 13:29:13 -07:00
Ryan VanderMeulen
8587d45e26 Backed out changeset fda85020d842 (bug 1010068) for Android test_cert_overrides.js failures.
CLOSED TREE
2015-06-08 11:37:33 -04:00
Richard Barnes
bab111cb93 Bug 1010068 - Disable OCSP for DV certificates in Firefox for Android r=keeler 2015-05-28 13:29:13 -07:00
Carsten "Tomcat" Book
21dc4a9b86 merge mozilla-inbound to mozilla-central a=merge 2015-06-08 11:55:30 +02:00
ffxbld
042e53a84e No bug, Automated HPKP preload list update from host bld-linux64-spot-1061 - a=hpkp-update 2015-06-06 03:26:59 -07:00
ffxbld
29fbbef606 No bug, Automated HSTS preload list update from host bld-linux64-spot-1061 - a=hsts-update 2015-06-06 03:26:57 -07:00
Jed Davis
2f1671edf0 Bug 1055310 - Step 3: Move syscall interceptions into SandboxFilter.cpp. r=kang
We can now keep the part of the policy implemented by upcalls to
userspace in the same place as the part of the policy that's handled
entirely in the kernel.  This will become more useful in the future
(e.g., bug 930258).
2015-06-05 15:17:40 -07:00
Jed Davis
64e7f2da49 Bug 1055310 - Step 2: Move SIGSYS handling to Chromium TrapRegistry. r=kang
This is more complicated than I'd like it to be, because we don't have
a good way to combine a specific trap function's knowledge that we want
to get a crash dump with the SIGSYS handler's copy of the unprocessed
signal info (which breakpad wants).  The bpf_dsl interface requires a
specific trap function type (via the TrapRegistry superclass), so even
if we implement our own registry we can't change what's passed to it.
Normally we could use thread-local storage to get around that, but it's
not async signal safe.

As a result there is an imperfect compromise: the trap function returns
a failure with ENOSYS, Chromium's SIGSYS handler writes it into the
context, our SIGSYS handler reads it back out and uses a copy of
the original signal context for the crash dump.  Other error codes
(and returning ENOSYS via the seccomp-bpf policy itself) are handled
normally.
2015-06-05 15:17:35 -07:00
Jed Davis
6ded24dd65 Bug 1055310 - Step 1: Convert seccomp-bpf policies to Chromium PolicyCompiler. r=kang
This completely rewrites SandboxFilter.cpp and removes SandboxAssembler.
System calls are now loosely grouped by what they do, now that order
doesn't matter, and most of the intersection the content and media
plugin whitelists is moved into a common superclass.  Hopefully this
improves the readability and comprehensibility of the syscall policies.

Also, the macros that take the syscall name are gone, because a plain
case label usually suffices now (the CASES_FOR_thing macros are a little
unsightly, but they're relatively simple), and at one point we saw
strange macro expansion issues with system header files that #define'd
some syscall names.

The signal handling is not migrated yet, so Trap() actions can't be used
yet; the next patch will take care of that, and to keep the intermediate
state working there's a minimal shim.

Bonus fix: non-const global variables use the "g" prefix; "s" is for
static class members and static variables in a function (where the
default is to allocate a separate copy per instance/activation).
2015-06-05 15:17:32 -07:00
David Keeler
d4c6327b1a bug 969985 - cleanup of test_certificate_usages.js - see the rest of this commit message r=mgoodwin
Converts test_certificate_usages.js to generate certificates at build time.
Also does miscellaneous cleanup to use modern JS practices.
Since the test_cert_eku-* suite of tests covers the extended key usage extension,
removes superfluous testcases involving EKU.
Finally, renames test_certificate_usages.js to test_cert_keyUsage.js for a more
consistent naming scheme.
2015-06-02 10:58:59 -07:00
Eric Rahm
9100016c49 Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
  PR_LOG_ERROR   -> LogLevel::Error
  PR_LOG_WARNING -> LogLevel::Warning
  PR_LOG_WARN    -> LogLevel::Warning
  PR_LOG_INFO    -> LogLevel::Info
  PR_LOG_DEBUG   -> LogLevel::Debug
  PR_LOG_NOTICE  -> LogLevel::Debug
  PR_LOG_VERBOSE -> LogLevel::Verbose

Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.

Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-03 15:25:57 -07:00
Eric Rahm
7973ebd946 Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj 2015-06-03 15:22:35 -07:00
Eric Rahm
1fcdde9ba3 Bug 1165515 - Part 5: Convert instances of PR_LOG_ALWAYS. r=froydnj
Most instances were converted to PR_LOG_INFO, some to PR_LOG_DEBUG, and some
to PR_LOG_ERROR.
2015-06-03 15:22:30 -07:00
Eric Rahm
6d13987359 Bug 1165515 - Part 3: Convert PR_LOG_TEST to MOZ_LOG_TEST. r=froydnj 2015-06-03 15:22:28 -07:00
Cykesiopka
dc66b3aeb9 Bug 1169195 - Convert test_bug644006.html mochitest to an xpcshell test. r=keeler 2015-06-02 22:49:00 -04:00
Bob Owen
eaea331c4f Bug 1166669: Enable process-level mitigations for the Windows content process sandbox. r=tabraldes 2015-06-03 09:13:00 +01:00