jpierre%netscape.com
c8ebc52544
Fix crash in certutil if usage is omitted
2003-11-11 00:01:32 +00:00
relyea%netscape.com
14c8c093a3
Repair error case for DH code in previous patch.
2003-11-07 16:21:40 +00:00
relyea%netscape.com
8cac9b6d61
Verify Parameters from the user before passing it on to freebl. r=nelson
2003-11-07 03:38:59 +00:00
relyea%netscape.com
4af3118d62
Add defines for DH and RSA key limits
2003-11-07 03:36:33 +00:00
nelsonb%netscape.com
314acd2bb7
Correct the validity checks on certain ASN.1 objects, allowing some that
...
were previous disallowed, and vice versa. Bug 53339.
2003-11-07 01:41:22 +00:00
nelsonb%netscape.com
87e5cbd19a
Fix some bugs in the code that formats OIDs for printing.
...
Bugscape bug 53334.
2003-11-06 02:02:32 +00:00
nelsonb%netscape.com
390b635832
Grow handshake message buffer once per message, not once per each message
...
segment received. Bugscape bug 53418.
2003-11-05 06:22:57 +00:00
wchang0222%aol.com
d45bb29e40
Set NSS version to 3.9 Beta 2.
2003-11-04 05:52:51 +00:00
nelsonb%netscape.com
0feb5dfd5f
Fix numerous errors (mostly off-by-1 errors) in the code that formats
...
and prints certs and CRLs. This code is common to certutil and pp.
Bug 222568 r=nicholson (for this portion).
2003-11-04 02:16:42 +00:00
nelsonb%netscape.com
bc763436c5
Better cleanup. Plug leaks in pp. bug 222568. r=nicolson (this part).
2003-11-04 01:51:54 +00:00
nelsonb%netscape.com
374349f143
Rename get_oid_string to CERT_GetOidString and export it. Also, export
...
CERT_DestroyOidSequence. bug 222568. r=jpierre (for this portion).
2003-11-04 01:48:39 +00:00
wchang0222%aol.com
1cd3ab9050
Bugzilla bug 223624: fixed the compiler warning that case ecKey is not
...
handled in the switch statement. r=nelsonb.
2003-11-01 05:17:16 +00:00
nelsonb%netscape.com
afd97d4f96
Remove one unnecessary transition from the SSL3 state machine.
...
Reduce the number of reallocations of the SSL3 handshake message buffer.
Bugscape bugs 53287 and 53337
2003-10-31 07:01:05 +00:00
nelsonb%netscape.com
522e0fe2b8
Enable generation of DES2 keys with mechanism CKM_DES2_KEY_GEN. Bug 201521
2003-10-31 02:33:16 +00:00
nelsonb%netscape.com
a973e0dc48
Correct the code that detects DES2 keys based on their lengths. Bug 201521
2003-10-30 22:31:09 +00:00
jpierre%netscape.com
1a37e6c822
Fix for 223494 - cmsutil signing does not work with hardware tokens. r=wtc, relyea
2003-10-28 02:34:15 +00:00
wchang0222%aol.com
2316ca4f0e
Bugzilla bug 223624: declare pk11_FindAttrInTemplate before it is used.
...
r=nelsonb.
2003-10-25 14:10:11 +00:00
wchang0222%aol.com
d5bd3135a1
Bugzilla bug 223624: use PR_MAX to avoid redefining MAX, a macro commonly
...
defined in system headers. r=nelsonb.
2003-10-25 14:08:31 +00:00
wchang0222%aol.com
76cb52bad5
Bugzilla bug 223624: removed an extraneous format string for fprintf.
...
r=nelsonb.
2003-10-25 14:05:08 +00:00
wchang0222%aol.com
8cfbd7293c
Bugzilla bug 223624: node->error is a 'long', so it should match a %ld
...
format. r=nelsonb.
2003-10-25 14:01:43 +00:00
jpierre%netscape.com
4d26e30240
Initialize crlHandle . r=wtc
2003-10-25 00:41:14 +00:00
nelsonb%netscape.com
1ce0f542ee
Require DES, DES2 and DES3 keys to have correct length in all cases.
...
Expand DES2 keys to be DES3 keys when used with DES3 mechanisms.
Bug 201521.
2003-10-25 00:12:34 +00:00
wchang0222%aol.com
4bab03c0f6
Bugzilla bug 173715: fixed a crash in OCSP. We incorrectly assumed that
...
'addr' was the last IP address of the host when PR_EnumerateHostEnt
returned 0 and attempted to connect to 'addr', resulting in an assertion
failure in PR_Connect. The fix is to not use 'addr' when
PR_EnumerateHostEnt returns 0. r=relyea.
2003-10-24 17:17:37 +00:00
wchang0222%aol.com
e4c6ee1dbb
Removed the nonexistent directory 'rngtest' from DIRS.
2003-10-24 06:22:58 +00:00
wchang0222%aol.com
6dac9765c9
Removed nonexistent directory "crypto" from DIRS.
2003-10-24 05:29:08 +00:00
wchang0222%aol.com
ee1dc4bffd
Bugzilla bug 223427: added a note section so that the linker knows we're
...
not executing off the stack. This patch is received from Christopher
Blizzard of Red Hat <blizzard@redhat.com>.
2003-10-24 04:47:23 +00:00
wchang0222%aol.com
4327068745
Bugzilla bug 222065: fixed a bug (inside #ifdef WINNT) introduced in the
...
previous checkin.
2003-10-22 01:00:10 +00:00
bishakhabanerjee%netscape.com
b5a0a53d62
NIST PKITS tests:first checkin, without CRLS:bug 177398:six sections implemented
2003-10-21 21:35:04 +00:00
nelsonb%netscape.com
b6e5abc24b
Add new -N option, which completely suppresses the initialization and use
...
of the SSL server session ID cache. Used to test the fix for bug 222726.
2003-10-19 05:18:11 +00:00
nelsonb%netscape.com
0aaf7a10b3
Put the NSS 3.9 block back in ASCII sorting order, AGAIN.
2003-10-19 04:41:20 +00:00
nelsonb%netscape.com
9413aae7aa
When the SSL_NO_CACHE option is set on an SSL server socket, don't touch
...
the server session cache AT ALL. Bug 222726
2003-10-19 01:55:50 +00:00
nelsonb%netscape.com
6436ed5ab3
Declare SSL_NO_STEP_DOWN option. Partial fix to bug 148452.
2003-10-19 01:31:41 +00:00
nelsonb%netscape.com
47dc9b03e8
SSL_ShutdownServerSessionIDCache no longer leaks the cache memory.
...
Bug 222065. r=wchang0222
2003-10-19 01:25:10 +00:00
relyea%netscape.com
e07da99055
221067 NSS needs to be able to create token symkeys from unwrap and derive.
2003-10-18 00:38:04 +00:00
nelsonb%netscape.com
02bc947b35
Detect buffer overruns caused by flawed application-supplied callbacks,
...
and avoid crashing due to them. Bugscape bug 52528. r=wchang
2003-10-17 21:12:13 +00:00
relyea%netscape.com
5eeaac60fc
Incorporate WTC's review comments..
2003-10-17 17:56:56 +00:00
ian.mcgreer%sun.com
a3fb7ce4e9
missed SSL ECC test files in last checkin
2003-10-17 14:10:18 +00:00
ian.mcgreer%sun.com
5c2c5888f9
ECC code landing.
...
Contributed by Sheuling Chang, Stephen Fung, Vipul Gupta, Nils Gura,
and Douglas Stebila of Sun Labs
2003-10-17 13:45:42 +00:00
nelsonb%netscape.com
525a14b3ed
Put the NSS 3.9 block in ASCII sorting order.
2003-10-17 05:45:19 +00:00
relyea%netscape.com
952d217499
Bug 156770 When we do a file import and give a bad password we get wrong errors back
...
When we fail to decode based on a bad password, don't continue.
So once we've tried failed to decode a ANS.1 stream, don't continue collecting
more data.
On microsoft.pfx files, we would wind up decoding to the end of the encrypted
stream, then fail in the padding in PKCS #7 . This code bypasses this problem by
making sure we don't continue to try to decode data once we've hit a bad
password failure.
2003-10-16 23:49:15 +00:00
jpierre%netscape.com
8963533a51
Fix for bug 222180 . remove redundant code
2003-10-15 01:40:10 +00:00
jpierre%netscape.com
4efbc18260
Fix for bug 222180 . Change to quick decoder . r=wtc
2003-10-15 01:34:22 +00:00
nelsonb%netscape.com
5251bce355
Eliminate redundant function declarations. Bug 208854. r=wchang0222
2003-10-14 17:44:33 +00:00
relyea%netscape.com
be2e372c47
Fix tinderbox breakage
2003-10-12 22:55:09 +00:00
nelsonb%netscape.com
886718db18
Correctly handle a NULL moduleSpecList. Bug 220217.
2003-10-11 01:49:24 +00:00
nelsonb%netscape.com
159d38edba
This file has been dead code since NSS 3.4 released, if not sooner.
2003-10-11 01:10:51 +00:00
jpierre%netscape.com
f2e03876cf
Fix for bug 221743 - incorrect certificate usage macro
2003-10-10 23:22:31 +00:00
relyea%netscape.com
40c2250bfc
Bug 191467
...
Multipart signing and verifying broken for several mechanisms in softoken
Reporter: Andreas.Sterbenz@sun.com (Andreas Sterbenz)
sr=nelsonb
2003-10-10 15:32:26 +00:00
relyea%netscape.com
df0d80f9a5
Bug 203866
...
Make unloaded modules visible for administrative purposes.
sr=wtc r=nelson
2003-10-10 15:29:43 +00:00
relyea%netscape.com
e64bfbce5e
Bug 203866. Make unloaded modules visible for administrative purposes.
...
sr=wtc r=nelson
2003-10-10 15:26:23 +00:00