relyea%netscape.com
115f203647
fix bug 203450
...
jarevil.c:345: warning: implicit declaration of function \
`__CERT_AddTempCertToPerm'
Obviously missing a declaration somewhere.
r=jpierr, wtc
2003-10-09 22:17:04 +00:00
jpierre%netscape.com
7f696b676c
Fix for bug 55898 - print name of certificate causing failure in certutil . r=wtc
2003-10-08 01:00:37 +00:00
nelsonb%netscape.com
810ec798b2
Eliminate one of several redundant OID table lookups. Bug 207033.
2003-10-07 17:19:55 +00:00
nelsonb%netscape.com
8464dc0bb6
Eliminate unnecessary copying of CA names in HandleCertRequest.
...
Bug 204686.
2003-10-07 02:24:01 +00:00
nelsonb%netscape.com
655adbd496
The "valid CA" trust flag now overrides other CA cert checks.
...
Works for SSL client as well as other usages. Bug 200225
2003-10-07 02:17:56 +00:00
nelsonb%netscape.com
0cd1f0b182
Export new function PK11_ExportEncryptedPrivKeyInfo. Bug 207033.
2003-10-07 01:29:32 +00:00
nelsonb%netscape.com
a1a6a4697c
Create new function SECKEYEncryptedPrivateKeyInfo which is just like
...
SECKEYEncryptedPrivateKeyInfo except that it identifies the private
key by a private key pointer, rather than by a certificate. Bug 207033.
2003-10-07 01:26:38 +00:00
nelsonb%netscape.com
8dd13ab659
Make tstclnt work with IPv6 addresses. Bug 161610.
2003-10-06 23:50:11 +00:00
nelsonb%netscape.com
7fab02474b
Check for presence of secmod.db file prior to acting on it, for all
...
cases except "multiaccess:". Bug 220217. r=relyea
2003-10-06 23:33:03 +00:00
nelsonb%netscape.com
96f28b4691
Detect Zero length certs and zero length CA names. Bug 204686.
...
Also, eliminate unnecessary copying of incoming certs.
2003-10-03 02:01:18 +00:00
wtc%netscape.com
9bb8114b44
Bug 220963: need to handle the possibility that symKey may be NULL before
...
dereferencing it.
2003-10-01 23:01:46 +00:00
jpierre%netscape.com
60c78ee111
Fix for bug 141882 - convert email query keys to lowercase when searching . r=wtc
2003-09-30 02:33:40 +00:00
jpierre%netscape.com
347ed6b99f
Fix for bug 94413 - OCSP needs more fine tuned error messages. r=wtc
2003-09-30 01:18:55 +00:00
nelsonb%netscape.com
4b6b1fdf59
Move a brace so vi will find the beginning of the function.
2003-09-27 01:45:35 +00:00
jpierre%netscape.com
79d90909dc
Fix for bug 219539 - support GeneralizedTime in NSS tools
2003-09-27 00:01:45 +00:00
jpierre%netscape.com
e608b7e0f4
Fix for bug 219539 - support GeneralizedTime in NSS tools
2003-09-26 06:18:40 +00:00
nelsonb%netscape.com
3ec40f0ab7
Don't use windowed exponentiation for small public exponents.
...
Speeds up public key operations. Path contributed by
Sheueling Chang Shantz <sheueling.chang@sun.com>,
Stephen Fung <stephen.fung@sun.com>, and
Douglas Stebila <douglas@stebila.ca> of Sun Laboratories.
2003-09-26 02:15:12 +00:00
nelsonb%netscape.com
cff36272e2
Correct an inaccurate log message.
2003-09-25 21:40:02 +00:00
jpierre%netscape.com
ec42f9469e
Fix typo
2003-09-25 00:25:06 +00:00
nelsonb%netscape.com
7bff061d97
Fix usage message to list all commands. Also, fix a few lines of
...
code that did not follow the file's convention for indentation.
Bug 203870.
2003-09-24 21:49:49 +00:00
nelsonb%netscape.com
b1d1bb21fa
Fix bug 204549. Properly handle memory allocation failures.
2003-09-23 20:47:43 +00:00
wtc%netscape.com
3a76d91edd
Bugzilla bug 204549: find_objects_by_template was not setting *statusOpt
...
before one return statement. r=nelsonb.
2003-09-23 20:34:15 +00:00
nelsonb%netscape.com
aeaa70ccff
Correctly compute certificate fingerprints. Bug 220016.
2003-09-23 02:05:47 +00:00
jpierre%netscape.com
945c4207d2
Fix for 215182 - certutil prints incorrect nickname. r=wtc
2003-09-23 00:10:54 +00:00
wtc%netscape.com
95dc921cc9
Bugzilla bug 219713: fixed build bustage on all Unix platforms. We need
...
to export CERT_TimeChoiceTemplate as data for Unix.
2003-09-19 18:00:48 +00:00
jpierre%netscape.com
1b89629c4e
Fix for 219082 - support GeneralizedTime in PKCS#7 signatures. r=nelsonb, sr=wtc
2003-09-19 04:16:19 +00:00
jpierre%netscape.com
a1dfac9b48
Fix for 219524 - support GeneralizedTime in S/MIME v3 signatures. r=wtc, sr=nelsonb
2003-09-19 04:14:50 +00:00
jpierre%netscape.com
7d744437c3
Fix for bug 143334 : add support for GeneralizedTime in certificates and CRLs. r=wtc,nelsonb
2003-09-19 04:08:51 +00:00
jpierre%netscape.com
ac38bd8aeb
Fix for 215214 - make certutil show all instances of certs . r=wtc
2003-09-18 02:00:32 +00:00
wtc%netscape.com
b58d136a9c
The isOnList function is now unused.
2003-09-18 01:28:52 +00:00
jpierre%netscape.com
81db50ddf4
Fix for bug 215186 - add missing options to PK11_ListCerts . r=wtc
2003-09-18 00:22:18 +00:00
jpierre%netscape.com
58f736296d
Add comment in the header for PK11_FindSlotsByAliases
2003-09-12 22:11:31 +00:00
wtc%netscape.com
eb363f3753
Bugzilla bug 215152: removed redundant pointer tests. Use
...
SEC_ERROR_LIBRARY_FAILURE for NSS internal errors.
2003-09-12 20:01:56 +00:00
wtc%netscape.com
f56dde49b6
Bugzilla bug 217247: improved the memory leak fix for the appData nicknames
...
returned by PK11_ListCerts. Instead of allocating them from the heap first
and copying to the arena, allocate them from the arena directly. r=jpierre
Modified Files: certhigh.c pk11cert.c pki3hack.h pki3hack.c
2003-09-12 19:38:04 +00:00
wtc%netscape.com
ecf1666d78
Bugzilla bug 214535: fixed a recursive dead lock on cache->lock. We must
...
not call nssSlot_IsTokenPresent while cache->lock is locked because
that function may call nssToken_Remove, which locks cache->lock. r=mcgreer
2003-09-12 19:17:15 +00:00
wtc%netscape.com
8b5794a66c
Bugzilla bug 208971: remove obsolete Mac CFM build files from NSS.
2003-09-11 00:04:38 +00:00
wtc%netscape.com
ab28bc253c
Bugzilla bug 208971: removed obsolete Mac CFM build files from NSS.
2003-09-11 00:01:07 +00:00
jpierre%netscape.com
763808f28e
Fix for 215152 - better error handling
2003-09-10 01:33:25 +00:00
jpierre%netscape.com
568a561eeb
Fix for bug 215152 . Improve error handling in PK11_FindSlotsByAliases
2003-09-10 01:31:54 +00:00
nelsonb%netscape.com
1eb6b9c682
Further enhance the verbose debugging command line option in tstclnt
...
for the case where client auth is requested by the server. It will
now report the name of the cert sent to the server, or "send no cert".
2003-09-09 20:22:54 +00:00
jpierre%netscape.com
8af297a802
Prevent crash if certlist is NULL
2003-09-09 00:54:20 +00:00
jpierre%netscape.com
bebd4ca8a9
Fix bug 214307 - add certutil batch mode . r=wtc
2003-09-08 23:30:29 +00:00
jpierre%netscape.com
ff3aebe85f
Add PORT_Strpbrk macro
2003-09-08 23:29:14 +00:00
jpierre%netscape.com
f886a5b696
Fix for bug 72291 . resolve memory leak on nicknames . r=relyea
2003-09-05 00:15:52 +00:00
jpierre%netscape.com
61d58e111a
Remove erroneous assertions
2003-09-03 23:52:01 +00:00
jpierre%netscape.com
3bc888cc5f
Fix for bug 215152 . Export PK11_FindSlotsByAliases. r=relyea
2003-09-03 22:55:10 +00:00
jpierre%netscape.com
509dede7ea
Add PK11_FindSlotsByAliases function . r=relyea
2003-09-03 22:48:20 +00:00
jpierre%netscape.com
4ee83fcf13
Fix for 216701 - verify CRLs with cert verification date rather than CRL lastupdate date
2003-08-30 01:07:21 +00:00
wtc%netscape.com
4f4355b894
Bugzilla bug 214674: made the Linux implementation of sslMutex really work.
...
They were no-ops in multiprocess mode before. The patch is Nelson
Bolyard's. r=wtc.
2003-08-28 22:23:59 +00:00
jpierre%netscape.com
9260c97765
Fix for 214201. remove unused variable
2003-08-27 01:47:57 +00:00
wtc%netscape.com
b881a9a0c6
Bugzilla bug 72291: have PK11_ListCerts return all the cert instances on
...
tokens. The patch is Julien Pierre's, with changes by Wan-Teh Chang.
Modified Files: pk11wrap/pk11cert.c pki/pki3hack.c pki/pki3hack.h
2003-08-25 19:18:02 +00:00
wtc%netscape.com
408be85418
Bugzilla bug 209827: disable optimization to work around what appears to
...
be a VACPP optimizer bug.
2003-08-22 22:34:07 +00:00
jpierre%netscape.com
ad699539d3
Fix for bug 216944 - CERT_VerifyCertificate optimizations issues . r= wtc
2003-08-22 18:47:07 +00:00
wtc%netscape.com
4520771cc7
Fix from Ian to address Bugzilla bug 202179.
...
The fix restores some old code that was removed as part of our
performance work (Bugzilla bug 145322). Thus, there may be a
slight performance hit, but obviously, we need to have correct
code first.
This is a part of the code I really don't like. To summarize,
there was a hack put in a long time ago to make sure that the
PKCS#11 session in which the SSL keys are generated was never
closed until the last key was deleted. This only worked by chance,
and if any part of the code was changed (as was the case here), this
unstable equilibrium would be lost. As with all hacks, it wasn't
really documented, so the problem escaped our notice. As a result of
putting the hack back in, we're going back to the horribly wasteful
operation of opening 4 sessions and immediately closing them. I intend
to have a proper solution in a later release.
2003-08-12 18:21:55 +00:00
wtc%netscape.com
5d4cb72997
Deleted useless local variable 'arena' in cert_ImportCAChain.
2003-08-08 23:15:50 +00:00
wtc%netscape.com
f4184b8ca1
Bugzilla bug 214695: fixed incorrect use of PR_AtomicDecrement on reference
...
counts. The reference count should not be read "naked". Instead, we
should simply use the return value of PR_AtomicDecrement for the result of
the decrement.
Modified Files: dev/devmod.c dev/devslot.c dev/devtoken.c pki/certificate.c
pki/pkibase.c
2003-08-01 02:02:47 +00:00
nelsonb%netscape.com
e7297b0a76
Fix bug 213084. Detect when cert in signature cannot be imported.
...
Detect NULL pointer, don't crash.
2003-07-31 00:16:27 +00:00
bishakhabanerjee%netscape.com
670906f939
Bug 213903: removing unused variables 'delold', 'save', 'entry'
2003-07-28 22:55:16 +00:00
bishakhabanerjee%netscape.com
0a15715c3b
Bug 213902 : removing unused variable "next" in "cert_DecodeNameConstraintSubTree"
2003-07-28 21:53:16 +00:00
jpierre%netscape.com
ca7885b3d5
Allow freebl to build correctly under MS VC++ .net 2003 . sr=nelsonb
2003-07-22 02:04:57 +00:00
wtc%netscape.com
c5f5509f3f
Bugzilla bug 213158: fixed the misspelling of "attach". The patch is
...
contributed by Pierre Chanial <chanial@noos.fr>.
Modified Files: pk11slot.c secmodt.h
2003-07-19 20:49:35 +00:00
wtc%netscape.com
40490b50de
Backed out Bob Relyea's workaround for the deadlock in rev. 1.15. The
...
correct fix is in rev. 1.36 of tdcache.c (see Bugzilla bug 212112).
2003-07-11 21:52:04 +00:00
nelsonb%netscape.com
20f4c61bd1
Restore sslreq.txt to text form, where it will have different line
...
endings on unix, than on windows or on Mac.
2003-07-11 04:14:24 +00:00
nelsonb%netscape.com
f23e6eb763
Test with the new file sslreq.dat rather than the old file sslreq.txt.
2003-07-11 04:05:12 +00:00
nelsonb%netscape.com
886c06287a
This is sslreq.txt with a different file name, to clearly show that
...
this file is to be treated as a binary file, not as text.
2003-07-11 03:55:55 +00:00
wtc%netscape.com
788ad0837b
Bug 212112: we don't need to lock td->cache->lock while calling
...
STAN_ForceCERTCertificateUpdate. This fixed a recursive deadlock.
r=mcgreer.
2003-07-10 01:24:17 +00:00
nelsonb%netscape.com
0545cae9b8
Change cert_GetCertificateEmailAddresses to return NULL rather than
...
a pointer to an empty string when a cert has no email addresses.
Partial fix for bug 211540. Modified certdb/alg1485.c
2003-07-09 04:14:23 +00:00
wtc%netscape.com
04e80d83ca
Bug 212004: in CERT_IsUserCert we should test for a null cert->trust and
...
treat it as no trust. r=nelsonb.
2003-07-09 04:12:16 +00:00
nelsonb%netscape.com
6228d8c075
Export SEC_DupCRL and declare it in certdb.h. Bug 208194.
...
Modified Files: nss/nss.def certdb/certdb.h
2003-07-09 04:00:48 +00:00
wtc%netscape.com
485a88c60e
Bug 211384: fixed the bug that importing a CRL that already exists in the
...
DB causes NSS_Shutdown to fail. Two files were changed. 1. crl.c: we
should not obtain a slot reference because PK11_FindCrlByName already
obtained a slot reference. 2. pk11cert.c: cleaned up code and fixed a slot
reference leak if the SECITEM_AllocItem call fails. r=nelsonb.
2003-07-08 18:41:28 +00:00
bishakhabanerjee%netscape.com
6a76698c4e
patch to correct false failure reporting - bug 167825
2003-07-03 17:50:18 +00:00
nelsonb%netscape.com
c93f000588
Add missing declaration of NSS_Get_SECKEY_EncryptedPrivateKeyInfoTemplate
2003-07-03 07:04:30 +00:00
nelsonb%netscape.com
c636fad8e7
Fix bug 211049. Another issue with empty pointer lists from group
...
decodings. Patch by Wan-Teh Chang <wtc@netscape.com>.
2003-07-01 01:16:57 +00:00
nelsonb%netscape.com
99c2efd227
Change the function definitions in dev so that the ctags program will
...
produce valid tags from these sources.
2003-07-01 00:32:22 +00:00
wtc%netscape.com
083003b9a2
Bug 210660: backed out the main change in the fix for bug 145322 because
...
the adoption of session is not thread safe. This eliminates most of the
saving of sessions, but we must be correct first, and then optimize.
r=nicolson,nelsonb.
Modified Files: pk11func.h pk11skey.c
2003-06-27 22:28:50 +00:00
nelsonb%netscape.com
c27a303c8d
Fix several bugs reported in bug 210707.
...
Change loops over RDNs and AVAs to detect NULL pointers.
Change list of attribute type "keywords" to match RFCs and internet
drafts.
Quote attribute values strings that contain adjacent embedded blanks.
Don't quote hex string values.
Always use hex string values when type OID is unrecognized.
2003-06-27 00:33:05 +00:00
nelsonb%netscape.com
7c5e03d5f4
Move the declaration for CERT_CompareNameSpace from cert.h to genname.h
...
because it is a private function. Change the interface for this
function so that it returns a SECStatus, unambiguously indicating the
success or failure of the name constraints test. The function no
longer takes a list of cert subject names, instead, it takes a list
of cert pointers, and optionally outputs one of those pointers when
an error occurs. This eliminates a cert reference leak.
2003-06-26 01:56:34 +00:00
nelsonb%netscape.com
7665e37260
This patch extracts rfc822 names from a cert's distinguished name at the
...
time when the list of cert names is being built and builds a GeneralName
out of it, just as if the rfc822 name had come from a subject alt name
extension. This way, no special handling is needed of either directory
names or rfc822 names in the name constraints code. The special "phase 1"
loop in cert_CompareNameWithConstraints disappears compmletely. And all
the cases in the (former phase 2) loop can now simply assert that the
name's type matches the constraint's type exactly.
This patch also factors out the code that creates new CERTGeneralNames and
that copies a single CERTGeneralName into new separate functions. This
eliminates a lot of duplicated code whose correctness required lengthy
inspection. Now these primitive operations are centralized.
2003-06-26 01:25:10 +00:00
bishakhabanerjee%netscape.com
ef5d950b09
enabling log scraping in header instead
2003-06-25 21:57:21 +00:00
bishakhabanerjee%netscape.com
545f6a1359
enabling log scraping in header instead, where RESULTDIRURL gets created
2003-06-25 21:56:19 +00:00
bishakhabanerjee%netscape.com
6ca298a1d2
removed new variable for Win platform - extra - don't need
2003-06-25 21:39:54 +00:00
bishakhabanerjee%netscape.com
1ee600f7ff
fix URL for Windows platform
2003-06-25 20:43:18 +00:00
bishakhabanerjee%netscape.com
1b045cce39
taking out un-needed stuff
2003-06-25 17:39:38 +00:00
wtc%netscape.com
17581e0660
Shorten the clickable text portion of RESULTDIRURL.
2003-06-25 04:23:34 +00:00
bishakhabanerjee%netscape.com
2eb554c104
enabling log scraping
2003-06-25 00:55:13 +00:00
nelsonb%netscape.com
a09e87bce0
Whitespace cleanup. This patch causes numerous lines that were wider
...
than 80 columns to be folded according to NSS coding conventions.
This patch does not fix any run-time error.
2003-06-23 23:15:33 +00:00
nelsonb%netscape.com
2ab3bc3979
CERT_EncodeGeneralName and CERT_DecodeGeneralName contain large switch
...
statements that repeat code for every case. This patch factors out that
common code from the cases, making the switches much smaller and reducing
bloat.
2003-06-21 08:10:07 +00:00
nelsonb%netscape.com
66f40f98bd
Cleanup CERT_GetGeneralNameByType so that it detects when it has
...
encountered a general name of a type that it doesn't recognize, and
so that it properly casts the return value to be of the right type.
2003-06-21 07:07:47 +00:00
nelsonb%netscape.com
9b63114ba0
The general name code uses arenas, which is good, but it never marks
...
and releases space in the arenas, so the arenas just grow and grow
until the test is completely over. This patch adds comments showing
where mark and release calls could (and probably should) be added.
It also changes CERT_CopyGeneralName to have only two exit paths,
two return statements, in preparation for the eventual use of mark and
release.
2003-06-21 06:44:43 +00:00
nelsonb%netscape.com
1042ec6f88
a) Add more missing null pointer tests that I discovered. Bug 208649.
...
b) change all PORT_*Alloc calls that allocate new structs or arrays of
same to use the PORT_*New* macros instead.
c) ifdef out some dead functions that are rife with failure to detect
allocation failures.
2003-06-21 05:23:07 +00:00
relyea%netscape.com
663b108222
Fix deadlock bugscape 46733
2003-06-20 23:34:46 +00:00
bishakhabanerjee%netscape.com
9948f8316d
sigh, another time
2003-06-20 23:24:11 +00:00
bishakhabanerjee%netscape.com
4d3b8d3282
one more time, trying to make link clickable
2003-06-20 18:36:57 +00:00
nelsonb%netscape.com
a98e4fc078
Declare src argument to SEC_ASN1DecodeItem to be const.
2003-06-20 01:52:19 +00:00
bishakhabanerjee%netscape.com
bc5d5ce9dc
echo out RESULTDIRURL; r=wtc
2003-06-19 23:04:25 +00:00
bishakhabanerjee%netscape.com
3d71f8851a
made RESULTDIRURL clickable link; r=wtc
2003-06-19 23:03:59 +00:00
nelsonb%netscape.com
1b06e46683
Carry Wan-Teh's fix for bug 208996 forward to trunk.
2003-06-19 03:48:19 +00:00
nelsonb%netscape.com
a4f1b04288
Fix numerous more potential NULL pointer deref crashes. Bug 208038
2003-06-19 01:08:53 +00:00
bishakhabanerjee%netscape.com
05dc77c485
checking in version 1.60 with additional space
2003-06-18 19:13:11 +00:00
bishakhabanerjee%netscape.com
1f57ddfe70
backing out my recent changes - some platforms showing tests failed
2003-06-18 08:13:07 +00:00