Граф коммитов

143 Коммитов

Автор SHA1 Сообщение Дата
javi%netscape.com 218a44e67b Final patch for Bug 155626 which enables 3rd party apps to use the NSS
libraries to encode/decode OCSP responses/requests on their own.
2002-07-03 20:18:10 +00:00
javi%netscape.com 1f078c5776 Break up OCSP so that 3rd party apps can send off an OCSP request and parse
it.
2002-07-03 00:02:39 +00:00
relyea%netscape.com af924e2843 Initialize type fields to supress purify uninitialized reference warnings. 2002-06-28 03:00:10 +00:00
relyea%netscape.com 87a3188583 Collect the full names of the certs, not just the stan names. 2002-06-25 22:57:22 +00:00
relyea%netscape.com 7caefab6ed Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs. 2002-06-24 22:36:59 +00:00
jpierre%netscape.com 165951e036 Fix for 141256 - rewrite OCSP HTTP download code to fix error handling 2002-06-06 01:05:40 +00:00
ian.mcgreer%sun.com dc613b61ee bug 144309, return value of STAN_GetCERTCertificate not checked
r=wtc
2002-05-20 18:05:11 +00:00
jpierre%netscape.com 338f2f561a Fix for 141256 - correct HTTP parsing for OCSP in NSS 2002-05-15 23:59:40 +00:00
ian.mcgreer%sun.com f0d29104b1 bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate. 2002-05-02 19:00:13 +00:00
relyea%netscape.com cec43732fb Use NewTempCert and AddTempCert when importing because the cert may already exist
in the cache.
2002-04-29 23:54:07 +00:00
relyea%netscape.com 23724ed2c8 Don't crash when getting a single user cert, but old certs are in the database
with the same subject, but no keys.
2002-04-24 18:29:04 +00:00
relyea%netscape.com ce09346d8c Token and cert processing fixes:
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
   2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
   3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
   4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
   5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
wtc%netscape.com 1b62c0e373 Bugzilla bug 108021: removed unused variable 'validity'. 2002-02-27 19:39:26 +00:00
relyea%netscape.com 6d7e648d51 remove LastUpdate time checks from Crl's when verifying certificates. 2002-02-27 18:56:24 +00:00
relyea%netscape.com 226cb8ac42 CRL issues: 1) return url when finding and importing CRL's.
2) fix CERT_ImportCRL so it actually works.

NOTE: Calls of SEC_NewCrl() should verify the signature on the CRL before
importing!.
2002-02-26 02:02:53 +00:00
ian.mcgreer%sun.com d9f18429d4 Fix cert leaks when building a chain. There are several client auth bugs filed, this may not be for any one in particular, but was found with tstclnt. 2002-02-02 20:01:22 +00:00
ian.mcgreer%sun.com f2b84b4779 fix cert leak found by client auth 2002-02-01 18:18:13 +00:00
relyea%netscape.com 9a66c5386d Indexes are zero based. Do our realloc when index == size (not after). 2002-01-30 00:25:34 +00:00
relyea%netscape.com 57e5fbda2e Fix nickname check for filtering cert lists. 2002-01-12 16:43:29 +00:00
javi%netscape.com 531a6a7a9d Changes required to get the trunk of NSS building on the Mac. 2002-01-09 23:22:23 +00:00
ian.mcgreer%sun.com 401e82cad4 remove unneeded hack, put in a couple of error checks 2001-12-20 16:50:22 +00:00
ian.mcgreer%sun.com 6f2d3b5cd6 missed as part of last checkin, hack needed when certs come out of crypto context or cache 2001-12-14 18:50:49 +00:00
relyea%netscape.com 75f3b7599d Clean up compilier warnings on Solaris and Linux, most particularly:
1) Implicit declaration of function.
2) Possibly unitialized variables.

These warnings have indicated some real problems in the code, so many changes
are not just to silence the warnings, but to fix the problems. Others were
inocuous, but the warnings were silenced to reduce the noise.
2001-12-07 01:36:25 +00:00
ian.mcgreer%sun.com 8069de9d9e land changes for handling temporary and cached certs in 3.4
* separate trust object from cert object
* move handling of cryptoki objects into libdev
* implement digest in libdev (for trust object indexing)
* fixes in cache implementation; connect cache to 3.4 certs
* implement CERT_NewTempCertificate via crypto context
2001-11-28 16:23:51 +00:00
ian.mcgreer%sun.com ae568747bb get signtool working 2001-11-08 21:23:35 +00:00
ian.mcgreer%sun.com 70bdc6a50c a plethora of changes for handling S/MIME certs 2001-11-08 20:46:11 +00:00
relyea%netscape.com e27189dd1d Land BOB_WORK_BRANCH unto the tip.
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
wtc%netscape.com 73ee93a7cc Bugzilla bug 106836: fixed misspelled "Privilege". The patch is
contributed by timeless@mac.com.
2001-10-26 21:30:58 +00:00
ian.mcgreer%sun.com 2ca32641b4 implement FindCertIssuer through Stan 2001-10-19 20:04:27 +00:00
ian.mcgreer%sun.com b8d11ef9b7 add usage to find best parameters 2001-10-19 18:11:31 +00:00
ian.mcgreer%sun.com 593d3fefdd add ability to notify user that chain is incomplete 2001-10-17 15:48:09 +00:00
ian.mcgreer%sun.com 37be52a584 implement CERT_CertChainFromCert using Stan 2001-10-17 14:35:01 +00:00
relyea%netscape.com f0a6a83eca Fix warnings on Linux, Solaris, AIX, HP. 2001-09-20 21:41:34 +00:00
kaie%netscape.com 9b0222970d Mozilla bug 99052, fixing crash.
Adding null and error checks.
r=nelsonb
2001-09-12 21:53:31 +00:00
ddrinan%netscape.com b55bd9f255 Bug 54104 - fix to find the built in CA certs 2001-08-07 18:56:13 +00:00
relyea%netscape.com ec2f86824c Add new semantic when importing a cert chain for the case where the cert chain
may have otherwise invalid CA's, but that the CA's should be implicitly trusted.
2001-05-03 16:31:34 +00:00
wtc%netscape.com a83eb31b00 Bugzilla bug #63768: removed references to the obsolete PURE_LIBRARY,
HAVE_PURIFY etc. make variables in NSS files.  Reviewed by nelson Bolyard.
Modified Files:
	cmd/platrules.mk cmd/crmf-cgi/config.mk cmd/crmftest/config.mk
	cmd/lib/config.mk cmd/zlib/config.mk lib/base/config.mk
	lib/certdb/config.mk lib/certhigh/config.mk lib/ckfw/config.mk
	lib/crmf/config.mk lib/cryptohi/config.mk
	lib/fortcrypt/swfort/config.mk lib/freebl/config.mk
	lib/jar/config.mk lib/nss/config.mk lib/pk11wrap/config.mk
	lib/pkcs12/config.mk lib/pkcs7/config.mk lib/smime/config.mk
	lib/softoken/config.mk lib/ssl/config.mk lib/util/config.mk
2001-02-02 01:49:57 +00:00
nelsonb%netscape.com eea673c43a MSVC won't let you initialize a pointer in a data structure with the
address of an external variable that comes from another DLL.
This is a fundamental difference between WIN32 DLLs and Unix DSOs.
So, for every SEC_ASN1Template inside of libnss3 that is referenced by
other templates outside of libnss3, a new "chooser" function was created
that returns the address of that template.  For WIN32, the templates
outside of libnss3 access libnss3's templates by the chooser function
rather than by direct reference.  Some simple macros allow Unix to
continue to use direct references, avoiding the extra function calls.
With these changes, all.sh (qa script) passes all tests on NT with DLLs.
Modified Files:
	cmd/checkcert/checkcert.c cmd/lib/secutil.c lib/asn1/asn1t.h
	lib/certdb/certdb.c lib/certdb/certt.h lib/certdb/crl.c
	lib/certhigh/certreq.c lib/crmf/asn1cmn.c lib/crmf/crmfcont.c
	lib/crmf/crmftmpl.c lib/cryptohi/secsign.c lib/nss/nss.def
	lib/pkcs12/p12local.c lib/pkcs12/p12tmpl.c
	lib/pkcs7/certread.c lib/pkcs7/p7decode.c lib/pkcs7/p7local.c
	lib/smime/cmsasn1.c lib/smime/cmsattr.c lib/smime/cmspubkey.c
	lib/smime/cmssigdata.c lib/smime/smimeutil.c
	lib/softoken/keydb.c lib/softoken/keydbt.h lib/util/secalgid.c
	lib/util/secasn1.h lib/util/secasn1d.c lib/util/secasn1t.h
	lib/util/secasn1u.c lib/util/secdig.c lib/util/secdig.h
	lib/util/secoid.h
2001-01-07 08:13:13 +00:00
wtc%netscape.com 119735b937 Bugzilla bug #64261: moved certread.c from lib/certhigh to lib/pkcs7.
As a result of this move I have to export one more data symbol
(SECAnyTemplate) from libnss3.so. :(  Removed the temporary workaround
in coreconf/rules.mk.
Modified Files:
	coreconf/rules.mk nss/lib/certhigh/manifest.mn
	nss/lib/nss/mapfile nss/lib/nss/nss.def
	nss/lib/pkcs7/manifest.mn
Added Files:
	nss/lib/pkcs7/certread.c
Removed Files:
	nss/lib/certhigh/certread.c
2001-01-05 02:18:55 +00:00
nelsonb%netscape.com 3255d3af0e Fix a UMR, one of many where the SECItem type field was uninitialized.
bug 39483.  Also, eliminate a warning about calling an undeclared function
by including the header file.
2000-09-18 23:53:18 +00:00
nelsonb%netscape.com d856a6e4f8 Create a new function, CERT_DupCertList(), and call it instead of calling
CERT_CertChainFromCert in ssl_DupSocket().  This is MUCH faster.  This is
the first approximation of the right fix.  The next step is to consider
doing ref counting instead of actual duplication.  Fixes bug 51425 .
2000-09-09 06:08:46 +00:00
chrisk%netscape.com f7113ab1b2 Merge smimetk_branch to tip... 2000-06-13 21:56:37 +00:00
relyea%netscape.com 9fd7059a19 Initial NSS Open Source checkin 2000-03-31 20:13:40 +00:00