Граф коммитов

211 Коммитов

Автор SHA1 Сообщение Дата
alexei.volkov.bugs%sun.com 3b9a109d82 353908: klocwork OOM crash in tdcache.c. r=nelson 2006-10-09 22:29:12 +00:00
alexei.volkov.bugs%sun.com 4cc26433e6 353742: klocwork null ptr dereferences in pki3hack.c. r=nelson 2006-10-09 22:21:41 +00:00
alexei.volkov.bugs%sun.com a168b0dbcc 353375: Klocwork 76513 - Null ptr deref in nssCertificateList_DoCallback. r=nelson 2006-10-09 18:51:55 +00:00
alexei.volkov.bugs%sun.com a7edef3088 353371: Klocwork 91117 - Null Pointer Dereference in CERT_CertChainFromCert. r=nelson 2006-10-09 18:45:02 +00:00
nelson%bolyard.com d4df5484a3 Bug 354313. Fix leak in STAN_GetCERTCertificateName. r=julien,rrelyea 2006-10-01 05:37:24 +00:00
alexei.volkov.bugs%sun.com d64e3427a6 337013: OOM crash [@ nssArena_Destroy - nssTrustDomain_TraverseCertificatesBySubject][@ nssArena_Destroy - nssTrustDomain_TraverseCertificatesByNickname] Dereferencing possibly NULL "tmpArena". r=nelson, sr=julien 2006-08-30 17:57:20 +00:00
julien.pierre.bugs%sun.com 45f5a763d7 Fix for bug 225525 . Resolve race assigning NSSCertificate fields which leaked memory and slot reference. r=nelson 2006-08-22 22:54:11 +00:00
nelson%bolyard.com 80a2861232 Fix race in CERT_NewTempCertificate. Bug 341323. r=julien,rrelyea 2006-08-22 03:30:14 +00:00
alexei.volkov.bugs%sun.com d5aa4d29c5 [Bug 337008] OOM crash [@ nssList_Add - STAN_InitTokenForSlotInfo - STAN_LoadDefaultNSS3TrustDomain][@ nssList_Clone - nssList_CreateIterator - STAN_LoadDefaultNSS3TrustDomain] Dereferencing possibly NULL "(td)->tokenList". r=nelson, sr=wtc 2006-06-13 21:36:29 +00:00
nelson%bolyard.com 505671ed77 Eliminate a crash and plug a leak in the error path for function
nssSMIMEProfile_Create. Coverity bug 337101. r=alexei.volkov.
2006-05-18 23:29:19 +00:00
alexei.volkov.bugs%sun.com e05b17bc20 [Bug 337008] OOM crash [@ nssList_Add - STAN_InitTokenForSlotInfo - STAN_LoadDefaultNSS3TrustDomain][@ nssList_Clone - nssList_CreateIterator - STAN_LoadDefaultNSS3TrustDomain] Dereferencing possibly NULL "(td)->tokenList". r=nelson, sr=wtc 2006-05-18 21:00:58 +00:00
alexei.volkov.bugs%sun.com e1b759198c [Bug 337009] OOM crash [@ nssList_Count - nssTrustDomain_GetCertsFromCache] Dereferencing possibly NULL "certList". r=nelson 2006-05-17 20:38:59 +00:00
wtchang%redhat.com 2c62bf1d13 Bugzilla bug 334683: removed extraneous semicolons. r=alexei.volkov.
Modified files: cmd/certutil/certutil.c lib/pki/pkistore.h
2006-04-19 19:04:23 +00:00
julien.pierre.bugs%sun.com 7ceb91038f Fix for bug 311164 . Initialize stan cert store object early to fix a race condition. r=nelson 2006-04-07 05:49:04 +00:00
wtchang%redhat.com 6893edd94b Bugzilla bug 300068: fixed the bug that "collection" is used uninitialized
if "td", "c", or "cc" is NULL.  The patch is contributed by Wolfgang
Rosenauer <mozilla@rosenauer.org>. r=wtc.
2005-07-08 17:06:15 +00:00
wtchang%redhat.com 9ee0623105 Bugzilla Bug 298962: Removed dead code: nssBestCertificate_SetArgs,
nssBestCertificate_Callback, and nssBestCertificateCB. r=jpierre,nelsonb.
Modified files: certificate.c pkitm.h
2005-06-28 17:55:29 +00:00
wtchang%redhat.com 2a3bb9d1e0 Bugzilla Bug 295754: moved duplicate function subject_list_sort to
certificate.c and renamed it nssCertificate_SubjectListSort.
r=relyea,nelsonb.
Modified files: certificate.c pkim.h pkistore.c tdcache.c
2005-06-27 21:50:06 +00:00
wtchang%redhat.com dd3c6f24d1 Bugzilla Bug 295754: fixed a crash in subject_list_sort if a cert is not
decodable (e.g., it has unsupported critical extension). r=relyea,nelsonb.
Modified Files: pkistore.c tdcache.c
2005-06-24 00:33:28 +00:00
julien.pierre.bugs%sun.com afed9f1c17 Fix for 283765. Fix for UMR in NSSUsage. r=julien 2005-03-04 04:32:04 +00:00
wtchang%redhat.com 82b1183c84 Bugzilla Bug 267158: removed the $Name$ RCS keyword from our source files.
This keyword adds noise to the output of "ident libnss3.so | grep NSS"
on our debug build, and appears to cause spurious CVS conflicts. r=nelsonb.
2005-01-20 02:25:51 +00:00
julien.pierre.bugs%sun.com 69a7452f8e Include nssrwlk.h for NSSRWLock_ funtions 2004-10-07 04:36:03 +00:00
relyea%netscape.com e715f98c50 Bugzilla Bug 252702
NSS needs to handle better token insertion and removal.

Applied from patch to NSS 3.9
2004-07-29 23:38:14 +00:00
relyea%netscape.com 7e82fd4194 Bug 250687
NSS Crashes or leaks Cert references if bad certs are passed up by PKCS #11 modules.
r=nelson
sr=ian
2004-07-21 18:18:05 +00:00
ian.mcgreer%sun.com be72ca16c5 bug 180268, reimplement ssl step-up for builtins 2004-05-17 20:08:38 +00:00
gerv%gerv.net 3634d4d94b Bug 236613: change to MPL/LGPL/GPL tri-license. 2004-04-25 15:03:26 +00:00
nelsonb%netscape.com c3a3521876 Enable a chain to validate when a perm cert has been issued by a
temp cert.  Bug 233038. r=ian,relyea
2004-02-07 07:17:31 +00:00
wchang0222%aol.com fac46295ff Bugzilla bug 228624: we need to call STAN_ForceCERTCertificateUpdate if
the cert's instances changed.  r=relyea.
2003-12-19 22:33:12 +00:00
wchang0222%aol.com 991ddf2ba6 Bugzilla bug 228624: made PK11_ListCertsInSlot reach into the Stan layer
to obtain the correct nicknames of the cert instances (pk11cert.c).  Fixed
the bug that if a cert we want to add the the cache is already in the
cache, we should merge the instances of the cert before destroying the
duplicate cert (tdcache.c).  r=jpierre,relyea.
2003-12-18 18:23:17 +00:00
wchang0222%aol.com e3cda94421 Bugzilla bug 228618: fixed an incorrect use of realloc. Fixed an unused
variable compiler warning.  r=jpierre.
2003-12-16 04:24:57 +00:00
nelsonb%netscape.com b904b47318 Detect empty emailAddr strings in CERTCertificates. Bugzilla bug 211540.
Modified Files:
    cmd/dbck/dbck.c cmd/signtool/util.c lib/certdb/certdb.c
    lib/certdb/stanpcertdb.c lib/pkcs7/p7decode.c lib/pki/certificate.c
    lib/pki/pki3hack.c lib/smime/cmssiginfo.c lib/softoken/pkcs11u.c
2003-11-15 00:10:01 +00:00
nelsonb%netscape.com d1e962a746 Workaround race. Reduce leaks. Not a real fix. Bugzilla bug 225525. 2003-11-13 03:41:32 +00:00
nelsonb%netscape.com 1b6811ad2b Eliminate some leaks in Stan cert code.
Partial fix to bugscape bug 53573.
2003-11-11 21:46:53 +00:00
wtc%netscape.com f56dde49b6 Bugzilla bug 217247: improved the memory leak fix for the appData nicknames
returned by PK11_ListCerts.  Instead of allocating them from the heap first
and copying to the arena, allocate them from the arena directly.  r=jpierre
Modified Files: certhigh.c pk11cert.c pki3hack.h pki3hack.c
2003-09-12 19:38:04 +00:00
wtc%netscape.com b881a9a0c6 Bugzilla bug 72291: have PK11_ListCerts return all the cert instances on
tokens.  The patch is Julien Pierre's, with changes by Wan-Teh Chang.
Modified Files: pk11wrap/pk11cert.c pki/pki3hack.c pki/pki3hack.h
2003-08-25 19:18:02 +00:00
wtc%netscape.com f4184b8ca1 Bugzilla bug 214695: fixed incorrect use of PR_AtomicDecrement on reference
counts.  The reference count should not be read "naked".  Instead, we
should simply use the return value of PR_AtomicDecrement for the result of
the decrement.
Modified Files: dev/devmod.c dev/devslot.c dev/devtoken.c pki/certificate.c
pki/pkibase.c
2003-08-01 02:02:47 +00:00
wtc%netscape.com 788ad0837b Bug 212112: we don't need to lock td->cache->lock while calling
STAN_ForceCERTCertificateUpdate.  This fixed a recursive deadlock.
r=mcgreer.
2003-07-10 01:24:17 +00:00
wtc%netscape.com f7e98250bc Bug 204011: fixed the bug that nssPKIObjectCollection_AddInstances frees an
instance twice if add_object_instance fails.  r=mcgreer.
2003-05-02 03:01:13 +00:00
jpierre%netscape.com ed4c7c9bc6 Fix for 199227 - keep enumerating certs in tokens even if one token fails. r=relyea 2003-04-01 00:07:05 +00:00
ian.mcgreer%sun.com fbd8eb30c2 bug 174200, don't attempt to decode cert when destroying it, handle failure
to decode cert serial number
r=nelsonb
2003-02-18 20:53:14 +00:00
jpierre%netscape.com 7f77163102 Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute. r=wtc 2003-01-30 05:12:10 +00:00
jpierre%netscape.com da30938629 Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute . r=wtc 2003-01-30 03:02:55 +00:00
wtc%netscape.com ec08fd394a Bug 187629: do not refresh a CERTCertificate if the same instance of a
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
wtc%netscape.com 39a4a9cc69 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com cd80470fa2 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
	base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
	pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
	util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com 12860a5501 Bug 183612: added support for looking up a cert by subject key ID and
creating a CMS recipient info from a subject key ID.  The patch was
contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc.
Modified Files:
	certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c
	certdb/stanpcertdb.c nss/nss.def nss/nssinit.c
	pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h
	pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c
	smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h
	smime/smime.def
2002-12-17 01:39:46 +00:00
ian.mcgreer%sun.com 9ec0046baa bug 177366, clean up refcounting
r=relyea
2002-11-06 18:53:55 +00:00
ian.mcgreer%sun.com b9d29eefdc bug 174634, fix handling of authorityCertIssuer in chain construction 2002-10-22 14:43:08 +00:00
relyea%netscape.com 5fd94ca1a9 Bug 164501. Return a proper error code from PK11_FindCrlByName() so the CRL
code can decide if there is a hw or system failure preventing the reading of a
CRL or if the CRL is just not there.
2002-10-10 20:30:19 +00:00
ian.mcgreer%sun.com 6199159d80 bug 171224, changes to path construction
r=nelsonb
2002-10-01 14:32:15 +00:00
wtc%netscape.com 22503c53a1 Bug 171422: removed unused (and incorrect) code. r=mcgreer. 2002-09-30 20:33:44 +00:00