Граф коммитов

4423 Коммитов

Автор SHA1 Сообщение Дата
jaggernaut%netscape.com 2d7ed90a69 Bug 73353: clean up MODULE/REQUIRES story. r=cls, sr=bryner 2003-07-13 22:29:00 +00:00
scott%scott-macgregor.org 20c4cde927 change the doctype from window to dialog. Thanks to Christian Biesinger for pointing that out.
r/sr=mscott
2003-07-12 03:31:16 +00:00
scott%scott-macgregor.org 2a9620c300 Bug #212459 --> Give the certificate manager a face lift. Add a 5 pixel border around the tabbox,
add an ok button which can be used to dismiss the window, inherit the ok/help buttons from the dialog
overlay.

Add spacing between the tree control and the edit / delete buttons underneath the tree control.

r=kaie
sr=sspitzer
2003-07-12 00:36:01 +00:00
wtc%netscape.com 40490b50de Backed out Bob Relyea's workaround for the deadlock in rev. 1.15. The
correct fix is in rev. 1.36 of tdcache.c (see Bugzilla bug 212112).
2003-07-11 21:52:04 +00:00
nicolson%netscape.com 9eaa5fbd47 Remove dependency on secrng.h. We don't need it. 2003-07-11 18:13:26 +00:00
nelsonb%netscape.com 20f4c61bd1 Restore sslreq.txt to text form, where it will have different line
endings on unix, than on windows or on Mac.
2003-07-11 04:14:24 +00:00
nelsonb%netscape.com f23e6eb763 Test with the new file sslreq.dat rather than the old file sslreq.txt. 2003-07-11 04:05:12 +00:00
nelsonb%netscape.com 886c06287a This is sslreq.txt with a different file name, to clearly show that
this file is to be treated as a binary file, not as text.
2003-07-11 03:55:55 +00:00
wtc%netscape.com 788ad0837b Bug 212112: we don't need to lock td->cache->lock while calling
STAN_ForceCERTCertificateUpdate.  This fixed a recursive deadlock.
r=mcgreer.
2003-07-10 01:24:17 +00:00
nelsonb%netscape.com 0545cae9b8 Change cert_GetCertificateEmailAddresses to return NULL rather than
a pointer to an empty string when a cert has no email addresses.
Partial fix for bug 211540.  Modified certdb/alg1485.c
2003-07-09 04:14:23 +00:00
wtc%netscape.com 04e80d83ca Bug 212004: in CERT_IsUserCert we should test for a null cert->trust and
treat it as no trust.  r=nelsonb.
2003-07-09 04:12:16 +00:00
nelsonb%netscape.com 6228d8c075 Export SEC_DupCRL and declare it in certdb.h. Bug 208194.
Modified Files:	nss/nss.def certdb/certdb.h
2003-07-09 04:00:48 +00:00
wtc%netscape.com 485a88c60e Bug 211384: fixed the bug that importing a CRL that already exists in the
DB causes NSS_Shutdown to fail.  Two files were changed.  1. crl.c: we
should not obtain a slot reference because PK11_FindCrlByName already
obtained a slot reference.  2. pk11cert.c: cleaned up code and fixed a slot
reference leak if the SECITEM_AllocItem call fails.  r=nelsonb.
2003-07-08 18:41:28 +00:00
wtc%netscape.com b290411a4b Re-enabled the fix for bug 208177. 2003-07-08 18:11:24 +00:00
kaie%netscape.com 26fcd4cf0b b=210948 Some file dialogs have harcoded filter description
patch from Vincent B�ron
r=kaie sr=brendan
2003-07-08 14:46:21 +00:00
kaie%netscape.com e97cef79b0 b=195574 SSL extremely flaky if Ask for Master Password is 'Every time'
r=darin sr=brendan
2003-07-08 14:41:02 +00:00
bishakhabanerjee%netscape.com 6a76698c4e patch to correct false failure reporting - bug 167825 2003-07-03 17:50:18 +00:00
nelsonb%netscape.com c93f000588 Add missing declaration of NSS_Get_SECKEY_EncryptedPrivateKeyInfoTemplate 2003-07-03 07:04:30 +00:00
nelsonb%netscape.com c636fad8e7 Fix bug 211049. Another issue with empty pointer lists from group
decodings.  Patch by Wan-Teh Chang <wtc@netscape.com>.
2003-07-01 01:16:57 +00:00
nelsonb%netscape.com 99c2efd227 Change the function definitions in dev so that the ctags program will
produce valid tags from these sources.
2003-07-01 00:32:22 +00:00
wtc%netscape.com 083003b9a2 Bug 210660: backed out the main change in the fix for bug 145322 because
the adoption of session is not thread safe.  This eliminates most of the
saving of sessions, but we must be correct first, and then optimize.
r=nicolson,nelsonb.
Modified Files: pk11func.h pk11skey.c
2003-06-27 22:28:50 +00:00
nelsonb%netscape.com c27a303c8d Fix several bugs reported in bug 210707.
Change loops over RDNs and AVAs to detect NULL pointers.
Change list of attribute type "keywords" to match RFCs and internet
drafts.
Quote attribute values strings that contain adjacent embedded blanks.
Don't quote hex string values.
Always use hex string values when type OID is unrecognized.
2003-06-27 00:33:05 +00:00
nelsonb%netscape.com 7c5e03d5f4 Move the declaration for CERT_CompareNameSpace from cert.h to genname.h
because it is a private function.  Change the interface for this
function so that it returns a SECStatus, unambiguously indicating the
success or failure of the name constraints test.  The function no
longer takes a list of cert subject names, instead, it takes a list
of cert pointers, and optionally outputs one of those pointers when
an error occurs.  This eliminates a cert reference leak.
2003-06-26 01:56:34 +00:00
nelsonb%netscape.com 7665e37260 This patch extracts rfc822 names from a cert's distinguished name at the
time when the list of cert names is being built and builds a GeneralName
out of it, just as if the rfc822 name had come from a subject alt name
extension. This way, no special handling is needed of either directory
names or rfc822 names in the name constraints code.  The special "phase 1"
loop in cert_CompareNameWithConstraints disappears compmletely.  And all
the cases in the (former phase 2) loop can now simply assert that the
name's type matches the constraint's type exactly.

This patch also factors out the code that creates new CERTGeneralNames and
that copies a single CERTGeneralName into new separate functions.  This
eliminates a lot of duplicated code whose correctness required lengthy
inspection.  Now these primitive operations are centralized.
2003-06-26 01:25:10 +00:00
bishakhabanerjee%netscape.com ef5d950b09 enabling log scraping in header instead 2003-06-25 21:57:21 +00:00
bishakhabanerjee%netscape.com 545f6a1359 enabling log scraping in header instead, where RESULTDIRURL gets created 2003-06-25 21:56:19 +00:00
bishakhabanerjee%netscape.com 6ca298a1d2 removed new variable for Win platform - extra - don't need 2003-06-25 21:39:54 +00:00
bishakhabanerjee%netscape.com 1ee600f7ff fix URL for Windows platform 2003-06-25 20:43:18 +00:00
bishakhabanerjee%netscape.com 1b045cce39 taking out un-needed stuff 2003-06-25 17:39:38 +00:00
wtc%netscape.com 17581e0660 Shorten the clickable text portion of RESULTDIRURL. 2003-06-25 04:23:34 +00:00
bishakhabanerjee%netscape.com 2eb554c104 enabling log scraping 2003-06-25 00:55:13 +00:00
jst%netscape.com abefba9053 Fixing bug 209884. Writing an inline helper to safely get an nsIScriptContext from a JSContext and making direct callers of JS_GetContextPrivate() use the helper. r=caillon@aillon.org, sr=peterv@netscape.com 2003-06-24 21:43:01 +00:00
nelsonb%netscape.com a09e87bce0 Whitespace cleanup. This patch causes numerous lines that were wider
than 80 columns to be folded according to NSS coding conventions.
This patch does not fix any run-time error.
2003-06-23 23:15:33 +00:00
jshin%mailaps.org a02a46efd1 bug 205649 : replace U+00E5 represented in ISO-8859-1 (0xe5) with U+00E5 in
UTF-8 in all XUL files to make them to be genuinely encoded in UTF-8. All the
changes are in comments so that this shouldn't affect anything at run-time.
(r=hwaara)
2003-06-23 13:18:12 +00:00
nelsonb%netscape.com 2ab3bc3979 CERT_EncodeGeneralName and CERT_DecodeGeneralName contain large switch
statements that repeat code for every case.  This patch factors out that
common code from the cases, making the switches much smaller and reducing
bloat.
2003-06-21 08:10:07 +00:00
nelsonb%netscape.com 66f40f98bd Cleanup CERT_GetGeneralNameByType so that it detects when it has
encountered a general name of a type that it doesn't recognize, and
so that it properly casts the return value to be of the right type.
2003-06-21 07:07:47 +00:00
nelsonb%netscape.com 9b63114ba0 The general name code uses arenas, which is good, but it never marks
and releases space in the arenas, so the arenas just grow and grow
until the test is completely over.  This patch adds comments showing
where mark and release calls could (and probably should) be added.
It also changes CERT_CopyGeneralName to have only two exit paths,
two return statements, in preparation for the eventual use of mark and
release.
2003-06-21 06:44:43 +00:00
nelsonb%netscape.com 1042ec6f88 a) Add more missing null pointer tests that I discovered. Bug 208649.
b) change all PORT_*Alloc calls that allocate new structs or arrays of
same to use the PORT_*New* macros instead.
c) ifdef out some dead functions that are rife with failure to detect
allocation failures.
2003-06-21 05:23:07 +00:00
relyea%netscape.com 663b108222 Fix deadlock bugscape 46733 2003-06-20 23:34:46 +00:00
bishakhabanerjee%netscape.com 9948f8316d sigh, another time 2003-06-20 23:24:11 +00:00
bishakhabanerjee%netscape.com 4d3b8d3282 one more time, trying to make link clickable 2003-06-20 18:36:57 +00:00
nelsonb%netscape.com a98e4fc078 Declare src argument to SEC_ASN1DecodeItem to be const. 2003-06-20 01:52:19 +00:00
brendan%mozilla.org e66f3155de Don't include private and unnecessary js header files. 2003-06-19 23:13:59 +00:00
bishakhabanerjee%netscape.com bc5d5ce9dc echo out RESULTDIRURL; r=wtc 2003-06-19 23:04:25 +00:00
bishakhabanerjee%netscape.com 3d71f8851a made RESULTDIRURL clickable link; r=wtc 2003-06-19 23:03:59 +00:00
nelsonb%netscape.com 1b06e46683 Carry Wan-Teh's fix for bug 208996 forward to trunk. 2003-06-19 03:48:19 +00:00
nelsonb%netscape.com a4f1b04288 Fix numerous more potential NULL pointer deref crashes. Bug 208038 2003-06-19 01:08:53 +00:00
bishakhabanerjee%netscape.com 05dc77c485 checking in version 1.60 with additional space 2003-06-18 19:13:11 +00:00
neil%parkwaycc.co.uk 6741a52ed1 Bug 209661 remove unnecessary NS_LITERAL_CSTRING( with ).get() r=jag sr=alecf 2003-06-18 14:31:45 +00:00
bishakhabanerjee%netscape.com 1f57ddfe70 backing out my recent changes - some platforms showing tests failed 2003-06-18 08:13:07 +00:00