Граф коммитов

2812 Коммитов

Автор SHA1 Сообщение Дата
bishakhabanerjee%netscape.com 6a76698c4e patch to correct false failure reporting - bug 167825 2003-07-03 17:50:18 +00:00
nelsonb%netscape.com c93f000588 Add missing declaration of NSS_Get_SECKEY_EncryptedPrivateKeyInfoTemplate 2003-07-03 07:04:30 +00:00
nelsonb%netscape.com c636fad8e7 Fix bug 211049. Another issue with empty pointer lists from group
decodings.  Patch by Wan-Teh Chang <wtc@netscape.com>.
2003-07-01 01:16:57 +00:00
nelsonb%netscape.com 99c2efd227 Change the function definitions in dev so that the ctags program will
produce valid tags from these sources.
2003-07-01 00:32:22 +00:00
wtc%netscape.com 083003b9a2 Bug 210660: backed out the main change in the fix for bug 145322 because
the adoption of session is not thread safe.  This eliminates most of the
saving of sessions, but we must be correct first, and then optimize.
r=nicolson,nelsonb.
Modified Files: pk11func.h pk11skey.c
2003-06-27 22:28:50 +00:00
nelsonb%netscape.com c27a303c8d Fix several bugs reported in bug 210707.
Change loops over RDNs and AVAs to detect NULL pointers.
Change list of attribute type "keywords" to match RFCs and internet
drafts.
Quote attribute values strings that contain adjacent embedded blanks.
Don't quote hex string values.
Always use hex string values when type OID is unrecognized.
2003-06-27 00:33:05 +00:00
nelsonb%netscape.com 7c5e03d5f4 Move the declaration for CERT_CompareNameSpace from cert.h to genname.h
because it is a private function.  Change the interface for this
function so that it returns a SECStatus, unambiguously indicating the
success or failure of the name constraints test.  The function no
longer takes a list of cert subject names, instead, it takes a list
of cert pointers, and optionally outputs one of those pointers when
an error occurs.  This eliminates a cert reference leak.
2003-06-26 01:56:34 +00:00
nelsonb%netscape.com 7665e37260 This patch extracts rfc822 names from a cert's distinguished name at the
time when the list of cert names is being built and builds a GeneralName
out of it, just as if the rfc822 name had come from a subject alt name
extension. This way, no special handling is needed of either directory
names or rfc822 names in the name constraints code.  The special "phase 1"
loop in cert_CompareNameWithConstraints disappears compmletely.  And all
the cases in the (former phase 2) loop can now simply assert that the
name's type matches the constraint's type exactly.

This patch also factors out the code that creates new CERTGeneralNames and
that copies a single CERTGeneralName into new separate functions.  This
eliminates a lot of duplicated code whose correctness required lengthy
inspection.  Now these primitive operations are centralized.
2003-06-26 01:25:10 +00:00
bishakhabanerjee%netscape.com ef5d950b09 enabling log scraping in header instead 2003-06-25 21:57:21 +00:00
bishakhabanerjee%netscape.com 545f6a1359 enabling log scraping in header instead, where RESULTDIRURL gets created 2003-06-25 21:56:19 +00:00
bishakhabanerjee%netscape.com 6ca298a1d2 removed new variable for Win platform - extra - don't need 2003-06-25 21:39:54 +00:00
bishakhabanerjee%netscape.com 1ee600f7ff fix URL for Windows platform 2003-06-25 20:43:18 +00:00
bishakhabanerjee%netscape.com 1b045cce39 taking out un-needed stuff 2003-06-25 17:39:38 +00:00
wtc%netscape.com 17581e0660 Shorten the clickable text portion of RESULTDIRURL. 2003-06-25 04:23:34 +00:00
bishakhabanerjee%netscape.com 2eb554c104 enabling log scraping 2003-06-25 00:55:13 +00:00
nelsonb%netscape.com a09e87bce0 Whitespace cleanup. This patch causes numerous lines that were wider
than 80 columns to be folded according to NSS coding conventions.
This patch does not fix any run-time error.
2003-06-23 23:15:33 +00:00
nelsonb%netscape.com 2ab3bc3979 CERT_EncodeGeneralName and CERT_DecodeGeneralName contain large switch
statements that repeat code for every case.  This patch factors out that
common code from the cases, making the switches much smaller and reducing
bloat.
2003-06-21 08:10:07 +00:00
nelsonb%netscape.com 66f40f98bd Cleanup CERT_GetGeneralNameByType so that it detects when it has
encountered a general name of a type that it doesn't recognize, and
so that it properly casts the return value to be of the right type.
2003-06-21 07:07:47 +00:00
nelsonb%netscape.com 9b63114ba0 The general name code uses arenas, which is good, but it never marks
and releases space in the arenas, so the arenas just grow and grow
until the test is completely over.  This patch adds comments showing
where mark and release calls could (and probably should) be added.
It also changes CERT_CopyGeneralName to have only two exit paths,
two return statements, in preparation for the eventual use of mark and
release.
2003-06-21 06:44:43 +00:00
nelsonb%netscape.com 1042ec6f88 a) Add more missing null pointer tests that I discovered. Bug 208649.
b) change all PORT_*Alloc calls that allocate new structs or arrays of
same to use the PORT_*New* macros instead.
c) ifdef out some dead functions that are rife with failure to detect
allocation failures.
2003-06-21 05:23:07 +00:00
relyea%netscape.com 663b108222 Fix deadlock bugscape 46733 2003-06-20 23:34:46 +00:00
bishakhabanerjee%netscape.com 9948f8316d sigh, another time 2003-06-20 23:24:11 +00:00
bishakhabanerjee%netscape.com 4d3b8d3282 one more time, trying to make link clickable 2003-06-20 18:36:57 +00:00
nelsonb%netscape.com a98e4fc078 Declare src argument to SEC_ASN1DecodeItem to be const. 2003-06-20 01:52:19 +00:00
bishakhabanerjee%netscape.com bc5d5ce9dc echo out RESULTDIRURL; r=wtc 2003-06-19 23:04:25 +00:00
bishakhabanerjee%netscape.com 3d71f8851a made RESULTDIRURL clickable link; r=wtc 2003-06-19 23:03:59 +00:00
nelsonb%netscape.com 1b06e46683 Carry Wan-Teh's fix for bug 208996 forward to trunk. 2003-06-19 03:48:19 +00:00
nelsonb%netscape.com a4f1b04288 Fix numerous more potential NULL pointer deref crashes. Bug 208038 2003-06-19 01:08:53 +00:00
bishakhabanerjee%netscape.com 05dc77c485 checking in version 1.60 with additional space 2003-06-18 19:13:11 +00:00
bishakhabanerjee%netscape.com 1f57ddfe70 backing out my recent changes - some platforms showing tests failed 2003-06-18 08:13:07 +00:00
bishakhabanerjee%netscape.com 709b88a2cb had to put in netscape specific unix base dir as well 2003-06-18 07:11:15 +00:00
bishakhabanerjee%netscape.com 06eeeca399 put URL specific stuff inside nscp specific loop 2003-06-18 06:02:28 +00:00
nelsonb%netscape.com 40399ce6d5 Further refinements to the Name Constraints checking logic, to make it
more compliant with RFC 3280.  Bug 208047.
2003-06-18 04:32:44 +00:00
nelsonb%netscape.com 9c76888937 Move declarations of NSS private functions for general names from cert.h
to genname.h, and eliminate declarations from cert.h that were also
in genname.h.  If we ever decide to make any of these functions public,
we can move their declarations back to cert.h.
2003-06-18 00:38:12 +00:00
nelsonb%netscape.com bbf159fcc1 Make CERT_DecodeAVAValue take const inputs and detect NULL pointers.
Rewrite CERT_CompareAVA to compare the type OIDs first, and then if
the values are not of the same encoding, convert them before comparing.
Also, do comparisons of printableString encoding properly.  Bug 208649.
2003-06-17 23:44:14 +00:00
bishakhabanerjee%netscape.com ed88f342da modified header to print link of resultsdir to browser log 2003-06-17 21:21:33 +00:00
nelsonb%netscape.com 4bc3e0e70c const. Got it? Const! 2003-06-11 23:12:38 +00:00
nelsonb%netscape.com 786e999bda Harden SECITEM_CompareItem against NULL pointers. 2003-06-07 03:05:49 +00:00
nelsonb%netscape.com 546ef9889f Rewrite of cert_CompareNameWithConstraints and the static functions it
calls, to make it conform with RFC 3280.  Bug 208047.
2003-06-06 09:12:21 +00:00
nelsonb%netscape.com 3245c4d36c Rewrite SECITEM_ItemsAreEqual to be faster when item lengths are not
equal and to not crash if an item contains a NULL data pointer.
2003-06-06 04:51:26 +00:00
nelsonb%netscape.com 95ac53508c Add new OIDs for directory name attribute types. Bug 207711. 2003-06-06 04:48:45 +00:00
nelsonb%netscape.com 216592c31b Augment and centralize the list of known cert name attribute types.
Bug 207711.
2003-06-06 01:17:04 +00:00
nelsonb%netscape.com f4f2e9f053 Eliminate more NULL pointer dereferences. Bug 207740. 2003-06-05 04:59:38 +00:00
wtc%netscape.com 446bef339f Bug 208343: removed two Baltimore root certificates.
Modified Files: certdata.c certdata.txt
2003-06-05 00:53:27 +00:00
nelsonb%netscape.com 9eb66804cf PORT_Alloc and PORT_ZAlloc always allocate at least one byte, even if
the caller requests zero bytes.  This patch makes PORT_ArenaAlloc
and PORT_ArenaZAlloc do the same.
2003-06-03 23:24:31 +00:00
ian.mcgreer%sun.com 115ea01683 bug 156256, removed unused Stan files with long names 2003-06-03 20:59:15 +00:00
wtc%netscape.com 9ad0b80e3a Bug 207379: added instructions for removing a builtin root CA cert from
NSS.
2003-06-02 23:16:51 +00:00
nelsonb%netscape.com ba44a2b994 Back out rev 1.27, which turned verbose mode on by default for debugging
QA test script failures that only occurred on tinderbox machines.
bug 207313 is now fixed.
2003-06-02 20:39:48 +00:00
wtc%netscape.com a2aaa0dd1a Bug 204555: Eliminated other potential crashes in code related to
certificate names.  r=wtc.  (The patch is Nelson's.)
2003-06-02 18:10:43 +00:00
nelsonb%netscape.com d8286a7935 This patch does two things, one large and one small. Bug 207313.
1, It uses two new symbols SSOCK_FD and STDIN_FD instead of 0 and 1 to
reference members of the poll set array.  I just could never remember whether
pollset[0] was the socket or was stdin.  Now I don't have to remember.
This changes a lot of lines, but is very simple.
2. It implementa a new flag clientSpeaksFirst, set with the -f option.
The only effect of this flag is whether the value of
pollset[SSOCK_FD].in_flags is initially zero (if true) or PR_POLL_READ (if false).  Note that pollset[SSOCK_FD].in_flags is set to PR_POLL_READ after
each succesful write to the socket.
2003-06-01 03:01:39 +00:00