chrome/moz.build
author J.C. Jones <jjones@mozilla.com>
Wed, 01 Feb 2017 15:21:04 -0700
changeset 395063 ad5adacd8e14472b0abcf9065efbcc96d5a859c4
parent 373392 f1c406b29e039ccc8eff1c115c89ee835959e58d
child 521352 5384779a3b1f8835ebd2fbe16103744111d3896d
permissions -rw-r--r--
Bug 1260318 - Scope U2F Soft Tokens to a single AppID r=qdot,rbarnes This change includes the FIDO "App ID" as part of the function used to generate the wrapping key used in the NSS-based U2F soft token, cryptographically binding the "Key Handle" to the site that Key Handle is intended for. This is a breaking change with existing registered U2F keys, but since our soft token is hidden behind a pref, it does not attempt to be backward-compatible. - Updated for rbarnes' and qdot's reviews comments. Thanks! - Made more strict in size restrictions, and added a version field to help us be this strict. - Bugfix for an early unprotected buffer use (Thanks again rbarnes!) - Fix a sneaky memory leak re: CryptoBuffer.ToSECItem MozReview-Commit-ID: Jf6gNPauT4Y

# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*-
# vim: set filetype=python:
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.

TEST_DIRS += ['test']

XPIDL_SOURCES += [
    'nsIChromeRegistry.idl',
    'nsIToolkitChromeRegistry.idl',
]

XPIDL_MODULE = 'chrome'

EXPORTS.mozilla.chrome += [
    'RegistryMessageUtils.h',
]

UNIFIED_SOURCES += [
    'nsChromeProtocolHandler.cpp',
    'nsChromeRegistry.cpp',
    'nsChromeRegistryChrome.cpp',
    'nsChromeRegistryContent.cpp',
]

include('/ipc/chromium/chromium-config.mozbuild')

FINAL_LIBRARY = 'xul'

LOCAL_INCLUDES += [
    '!/xpcom',
    '/dom/base',
    '/netwerk/base',
    '/netwerk/protocol/res',
    '/xpcom/components'
]

if 'gtk' in CONFIG['MOZ_WIDGET_TOOLKIT']:
    CXXFLAGS += CONFIG['TK_CFLAGS']

with Files("**"):
    BUG_COMPONENT = ("Toolkit", "Startup and Profile System")