Граф коммитов

4194 Коммитов

Автор SHA1 Сообщение Дата
wtc%netscape.com 6edc864d6e Bug 131826: checked in the README file of zlib 1.1.4. 2003-02-08 09:10:36 +00:00
wtc%netscape.com 7d4ad3fc60 Bug 131826: upgraded to zlib 1.1.4.
Modified Files:
	adler32.c compress.c crc32.c deflate.c deflate.h example.c
	gzio.c infblock.c infblock.h infcodes.c infcodes.h inffast.c
	inffast.h inflate.c inftrees.c inftrees.h infutil.c infutil.h
	minigzip.c trees.c uncompr.c zconf.h zlib.h zutil.c zutil.h
2003-02-08 08:50:42 +00:00
wtc%netscape.com 899b4b00c5 Bug 131826: added maketree.c from zlib 1.1.4. 2003-02-08 08:37:00 +00:00
wtc%netscape.com 51a2c07941 Removed unused files stubs.c and zip_nodl.c. 2003-02-08 08:35:07 +00:00
wtc%netscape.com 23f47b2e4d Bug 131826: added new header files from zlib 1.1.4.
Added Files: trees.h inffixed.h
2003-02-08 08:30:11 +00:00
relyea%netscape.com dae21534d8 Sigh, the QA scripts look for the word 'failed', but it's common that we
can't open the shared library and isn't a real failure, so change the wording
2003-02-08 01:52:37 +00:00
relyea%netscape.com c40beead4c Skip corruption test if someone has locked down the shared library on us. 2003-02-08 00:02:06 +00:00
wtc%netscape.com 34372e7cee Exit with 1 rather than -1 on failure. Make sure the program exit with 1
on all failures. Remove the symlink, if a file/symlink by that name already
exists, before creating it to avoid the EEXIST error.
2003-02-07 23:41:15 +00:00
wtc%netscape.com 8d38bb626b Use <> around standard/system header files. This file does not need
string.h, but it should include stdio.h because it uses fprintf and printf.
2003-02-07 23:21:53 +00:00
nelsonb%netscape.com 923827d462 Fix bug 190527. Properly extend buffer when data exceeds 512 bytes. 2003-02-07 23:09:35 +00:00
relyea%netscape.com d3fd98806e Fix signed/unsigned display issue.
Add more loggin information on errors (rev 1.3 added this but lost it's log).
2003-02-07 23:05:07 +00:00
relyea%netscape.com bcafc7572b *** empty log message *** 2003-02-07 23:02:43 +00:00
relyea%netscape.com 4dd6b2da64 Add test to see if the shlib was actually changed. 2003-02-07 21:13:10 +00:00
relyea%netscape.com aa9dafae78 Add Mangle logging... 2003-02-07 21:12:26 +00:00
relyea%netscape.com 70e3aa6345 Add debugging information. Turn on tempararily to get debug info from tinderbox failures. 2003-02-07 19:22:42 +00:00
kirk.erickson%sun.com 03a251009f Moved rules.mk include to the end. 2003-02-07 07:16:37 +00:00
wtc%netscape.com e1fe9f07a3 Set the default compiler to cc. 2003-02-07 06:57:57 +00:00
nelsonb%netscape.com 645cb762cb Move the implementation of the TLS Pseudo Random Function (PRF) from
pkcs11c.c into a new file: tlsprf.c.
2003-02-07 06:42:20 +00:00
nelsonb%netscape.com f9133aa19e Fix the dbtests test on Windows, when run in all.sh.
The problem was that fips.sh created a file in . named dbtest, which was
actually some text output by a previous test.  This dbtest file prevented
the dbtest program from running.  The text file now has another name.
2003-02-07 06:32:59 +00:00
kirk.erickson%sun.com edc53c0499 Resolves bug 189504 (Build Linux RPMS). 2003-02-07 05:56:15 +00:00
nelsonb%netscape.com d6bf23b21d MKS shell doesn't know about echor command. Does any shell? 2003-02-07 05:48:34 +00:00
nelsonb%netscape.com e7ff335e8c Remove unreferenced local variables from functions. 2003-02-07 05:08:01 +00:00
wtc%netscape.com 5376fc6d82 Moved the definition of MD_LIB_RELEASE_FILES from manifest.mn to Makefile
so that it is right next to the definition of CHECKLOC, which it uses.
2003-02-06 22:37:37 +00:00
relyea%netscape.com 929ac59217 Clean up tests
Suppress error messages which we were expecting because it causes the QA
scripts to report a QA failure.
2003-02-06 19:06:39 +00:00
relyea%netscape.com 6b8ac1fb4b Mangle will be changing the shared libraries, so it should link with them. 2003-02-06 18:18:42 +00:00
wtc%netscape.com 7870b01f6d Bug 177387: Put the configuration/assignments before the rules in Makefile.
Define MD_LIB_RELEASE_FILES in manifest.mn so that the *.chk files are
included in the mdbinary.jar files generated by the release target.
2003-02-06 16:56:46 +00:00
relyea%netscape.com 6d2419f541 Turn on FIPS test again. 2003-02-06 16:13:44 +00:00
relyea%netscape.com d32d519e9e Introduce shell variables for DLL_PREFIX and DLL_SUFFIX 2003-02-06 16:13:22 +00:00
wtc%netscape.com edb8b5fe44 Support both ";" and ":" as PATH separators on Windows. MKS Korn shell
uses ";" but Cygwin bash uses ":".
2003-02-06 14:52:43 +00:00
wtc%netscape.com 82345876f3 Backed out the previous checkin because it doesn't work on Windows. 2003-02-06 05:33:33 +00:00
wtc%netscape.com 2574db9f16 Bug 188441: compile with -D_USE_BIG_FDS on HP-UX. This ensures that fd_set
is large enough for 60,000 file descriptors.
2003-02-06 04:43:03 +00:00
wtc%netscape.com 92c86ec530 Bug 177387: include the *.chk files in the mdbinary.jar files generated by
the release makefile target.
Modified Files: lib/freebl/manifest.mn lib/softoken/manifest.mn
2003-02-06 03:52:37 +00:00
relyea%netscape.com c611d55441 Remove mangle test until we can get the correct library name inside fips.sh for all platforms 2003-02-06 01:07:39 +00:00
relyea%netscape.com 8bc877fcf9 Add check to 1) make sure we are in FIPS mode. and 2) to verify that we
detect corrupted shared libraries while in FIPS mode.
2003-02-06 00:50:00 +00:00
relyea%netscape.com d25559ff9f The NSPR get shared lib interface requires the library name only,
not a partial path to the library. This affects AIX.
2003-02-06 00:49:09 +00:00
relyea%netscape.com c613b5df3c Try to load the new module before we've unloaded the old one. This now
works in NSS, and it allows us to back out if the new one didn't load (because
FIPS could not verify the shared module for instance).
2003-02-05 00:35:53 +00:00
relyea%netscape.com 9eb1dbcff9 Update db test to verify cert8 not cert7 2003-02-05 00:33:52 +00:00
relyea%netscape.com bc5d891538 Surface the Err codes if we fail to shift to FIPS mode.
Add new option to verify that we have shifted to FIPS mode.
2003-02-05 00:31:15 +00:00
relyea%netscape.com b8ee14395c 1) turn on mangle builds.
2) better fix for the missing MAXPATHLEN missing define.
3) make room for the '\0' in the pathname.
2003-02-05 00:29:35 +00:00
relyea%netscape.com 1ed41d69c9 Fix LINUX breakage (define MAXPATHLEN if it wasn't defined the the standard
system headers).
2003-02-04 23:39:15 +00:00
relyea%netscape.com c5679652a6 Add code to handle symlinks.
Add verbose output to print out hashes and signatures.
2003-02-04 23:18:08 +00:00
relyea%netscape.com b66f562dec Add program which will mangle exactly 1 bit in a file. 2003-02-04 23:16:56 +00:00
relyea%netscape.com 883af5be6e Fix windows build breakage. 2003-02-04 19:03:11 +00:00
kaie%netscape.com a7bcf48918 b=191301 Crash if I cancel "Choose token" dialog on Cert import
r=javi sr=darin a=dbaron
2003-02-04 01:37:23 +00:00
relyea%netscape.com 2cf013ba38 Shell script to set up the path before running the signing tool 2003-02-03 21:06:57 +00:00
relyea%netscape.com cb166d81a7 Generate .chk file at build time when we build shlibsign 2003-02-03 21:06:18 +00:00
relyea%netscape.com ab6d0dea43 Check bug 188856 into the tip.
1)return proper error code in more cases. 2) Fix bug in DH KeyPair Generation.

the essential part of this fix in pkcs11c.c where we add the CKA_NETSCAPE_DB
attribute on Diffie-Hellman key gen. I don't know why the code would have even
thought of working without this (unless we were testing with pregenerated
keys).

The rest of the fix is to surface more of the PKCS #11 error back up. There is
a separate bug to continue tracking the issue of lost PKCS #11 errors.
2003-01-31 23:39:34 +00:00
kaie%netscape.com 8fdd6beaad b=189974 Profile Switching fails after JavaScript based cert import
PSM portion of fix
r=javi sr=darin a=asa
2003-01-31 22:33:49 +00:00
nelsonb%netscape.com 7874d8d788 Fix an uninitialized variable. Bug 191396. 2003-01-31 22:26:56 +00:00
nelsonb%netscape.com 91b818b389 Fix crash in CERT_CheckKeyUsage caused by dereferencing a returned pointer
without checkin it for NULL.
2003-01-31 02:49:13 +00:00
nelsonb%netscape.com 04c74fc4ac Fix bug 191396. Don't generate SEC_ERROR_LIBRARY_FAILURE unnecessarily
while doing dsa signatures.
2003-01-31 02:39:36 +00:00
relyea%netscape.com 2d71279799 FIPS library verifier. 2003-01-30 23:38:07 +00:00
relyea%netscape.com bd68779b0c FIPS library verifier 2003-01-30 23:36:37 +00:00
wtc%netscape.com 751c48b5e5 Bug 191214: fixed the object leaks in signtool that prevented NSS_Shutdown
from succeeding and added the NSS_Shutdown call back.  r=jpierre.
Modified Files: certgen.c sign.c signtool.c
2003-01-30 23:11:13 +00:00
wtc%netscape.com 5f51d20223 Bug 177387: temporarily added freebl_GetLibraryFilePathname to libfreebl.a.
This function has the same semantics as the NSPR 4.3 function
PR_GetLibraryFilePathname. This patch should be backed out when NSPR 4.3 is
released.
Modified Files: config.mk manifest.mn
Added Files: libpath.c
2003-01-30 07:00:32 +00:00
jpierre%netscape.com 4efd6d4409 Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute. r=wtc 2003-01-30 05:12:10 +00:00
jpierre%netscape.com e3c369562b Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute . r=wtc 2003-01-30 03:02:55 +00:00
jpierre%netscape.com 468dc9f9ab Patch for memory leak . Bug 189976 . r=wtc 2003-01-30 02:59:35 +00:00
wtc%netscape.com fedddcffe2 Bug 191214: backed out the previous checkin until this bug (object leaks)
is fixed.
2003-01-30 01:50:31 +00:00
wtc%netscape.com 4dbc437731 Bug 171263: signtool should call NSS_Shutdown before it exits. 2003-01-30 00:39:37 +00:00
relyea%netscape.com 3788b0eeec Move LIBJAR definitions around so that NT builds. 2003-01-29 23:37:10 +00:00
kaie%netscape.com 69c368b1a9 b=165301 False mixed content (encrypted page with unencrypted information) Security Warning
r=javi sr=darin a=asa
2003-01-29 03:52:01 +00:00
relyea%netscape.com 807a5de681 1) add vfyserv to the standard build.
2) add tool to build shared library signature files for FIP's.

Code to verify requires NSPR changes before we can check it in.
2003-01-28 18:53:22 +00:00
relyea%netscape.com fa9c0d1f91 New header file to dump defines for managing signed FIPs libraries. 2003-01-28 18:50:02 +00:00
relyea%netscape.com 97ee121321 Compile modutil with shared libraries. 2003-01-28 16:44:33 +00:00
relyea%netscape.com ca368d8e94 Export functions needed for modutil to be compiled dynamically. 2003-01-28 16:41:46 +00:00
relyea%netscape.com 2a6c459c18 Remove dead code and symbols from lib jar so that modutil can compile when
linked with it.
2003-01-28 16:39:32 +00:00
relyea%netscape.com 88f5c92825 Sign 3 sets of changes are here:
1) Provide accessor functions for the PK11_DefaultArray so that modutil
does not have to link statically to access it.

2) Try setting the attribute on an object before we go to the work of copying
it (Function Only used in Java).

3) Optimize searching for the more common types of attributes.
2003-01-28 16:38:04 +00:00
kaie%netscape.com 6b9785edcd b=190640 Remove the DHE ciphersuites until they work
r=javi sr=bryner a=asa
2003-01-28 15:06:29 +00:00
kaie%netscape.com 64cd67a3d0 b=190394 "website certified by an unknown authority" - nssckbi not found breaks PKI trust
r=dougt sr=darin a=asa
2003-01-27 23:53:02 +00:00
wtc%netscape.com 6d046ab3c2 Bug 90010: added support for parisc64. I received this patch from
Christopher Blizzard <blizzard@mozilla.org>.
2003-01-27 22:36:06 +00:00
wtc%netscape.com d4ac75f3a6 Bug 190396.
Don't fail the search if the token returned an error that indicates that it
legitimately couldn't find a CRL
2003-01-24 06:37:03 +00:00
relyea%netscape.com 04df2266d3 Bug 167756. Clean up previous patch: add lastState field, and set the SSL Error on failure. 2003-01-23 22:02:37 +00:00
relyea%netscape.com 797a5bc51c Write changes back to the database when we correct incorrect user bit settings. 2003-01-23 19:38:53 +00:00
relyea%netscape.com 48191e6dde Set the size value when extracting a key 19011. 2003-01-23 17:30:15 +00:00
relyea%netscape.com c5e06bef79 Check for token removal before continuing SSL sessions which have client auth
with certs associated with that token. bug 167756.
2003-01-23 17:27:34 +00:00
relyea%netscape.com a54ce85446 Fix bug 180824 Version 3.4 string hard coded in default token name. 2003-01-23 17:16:50 +00:00
wtc%netscape.com 722dc7dcf5 Bug 90010: added support for Linux for s390 and s390x. The patch is
contributed by Gerhard Tonn <GerhardTonn@swol.de>.
2003-01-23 17:16:32 +00:00
ian.mcgreer%sun.com c05c7c3f1e always use explicit serial numbers on generated certs, should fix QA failures on leia 2003-01-23 15:38:03 +00:00
jpierre%netscape.com d68a388386 Fix for bug #126930 - make SSL_ConfigServreSessionIDCache work on OS/2 by not using shared memory in single process mode. r=nelsonb 2003-01-23 00:15:08 +00:00
wtc%netscape.com dcfc314ddc Bug 190112: PK11_ReadAttribute needs to call PK11_ExitSlotMonitor before
we return because of allocation failure.
2003-01-22 17:44:36 +00:00
wtc%netscape.com ba247cd419 Bug 189546: updated the comments to reflect what the new code does. 2003-01-22 06:24:53 +00:00
timeless%mozdev.org e87b036988 Bug 179798 cookie confirm dialog no longer works in embedding (doesn't call nsIPrompt service)
patch by mvl@exedo.nl r=dwitte sr=darin
2003-01-22 05:52:33 +00:00
nelsonb%netscape.com e5ea957b6e Add OIDs for AES Key Wrap mechanism. 2003-01-22 04:35:54 +00:00
wtc%netscape.com ddc27a6bbf Bug 189546: moved the switch statement for known key lengths to the
beginning of PK11_GetKeyLength to work around a deadlock in nCipher
module if PK11_ExtractKeyValue is called.
2003-01-22 03:55:21 +00:00
kaie%netscape.com 153d01add8 b=188363 Bad error messages when server uses an invalid cert (-8054)
r=nelsonb sr=blizzard
2003-01-22 03:41:35 +00:00
nelsonb%netscape.com 2770ec645e Implement new AES Key Wrap mechanisms. Bug 167818. 2003-01-22 03:13:04 +00:00
wtc%netscape.com f20a97ef6a Bug 189345: we incorrectly assumed that a C_XxxFinal call to determine the
length of the buffer would also terminate the active operation if the
buffer length is 0.  PKCS#11 says it doesn't, so we need to make the
additional C_XxxFinal call even if the buffer length is 0.  Allocate a
buffer from the heap if the stack buffer is too small and free the
heap-allocated buffer before we return from pk11_Finalize.  We can use the
stack buffer if count is equal to its size.
2003-01-21 19:33:24 +00:00
seawood%netscape.com a4b8644bc9 I always forget to change both the declaration & the definition.
Thanks to bird@anduin.net for the patch.
Fixing OS/2 bustage.
2003-01-19 06:43:19 +00:00
seawood%netscape.com 6e4b727afc Callback functions must be defined as such.
Fixing OS/2 bustage.
2003-01-19 02:43:13 +00:00
kaie%netscape.com 499c2e67f7 b=189205 Implement early shutdown of NSS resources
r=javi sr=darin
2003-01-18 14:03:00 +00:00
relyea%netscape.com 402a4a6710 Bug 198364. Tokens keys do not own their handles. Don't let the key
get destroyed when freed.
2003-01-18 01:49:33 +00:00
nelsonb%netscape.com 48e8c13dcd When wrapping secret keys with an unpadded block cipher, null padd the keys
as necessary, per the PKCS 11 spec.  Also, implement padding and unpadding
for single-part only ciphers.
2003-01-17 05:50:08 +00:00
wtc%netscape.com 12a72288a3 Bug 145029: fixed compiler warnings (mostly "xxx might be used
uninitialized").
2003-01-17 02:49:11 +00:00
nelsonb%netscape.com 3c2c7f33bb One more fix for HPUX and Solaris. 2003-01-16 01:44:43 +00:00
jpierre%netscape.com 8796ef7732 Fix incorrect usage of QuickDER . See bug 160805 comment 16 2003-01-16 00:56:10 +00:00
nelsonb%netscape.com 5c71d8774b Fix compilation error. This file is only compiled on 2 platforms. 2003-01-16 00:55:53 +00:00
nelsonb%netscape.com a234db694e Switch from the old vendor-defined mechanism numbers to the new official
PKCS 11 mechanism numbers.  These numbers will appear in v2.20.
2003-01-16 00:43:58 +00:00
nelsonb%netscape.com fc19041388 Enforce that softoken's mechanisms are used only with the PKCS 11
functions that they're defined to work with.
2003-01-16 00:28:05 +00:00
nelsonb%netscape.com 472aaf52b9 Complete the addition of AES Key Wrap to blapi in freebl. 2003-01-16 00:15:21 +00:00
nelsonb%netscape.com 1a0e61f69a Remove the implementation of CKM_KEY_WRAP_LYNKS from softoken. 2003-01-16 00:14:07 +00:00
nelsonb%netscape.com 8d818d5064 aeskeywrap.c - implement AES Key Wrap algorithm from RFC 3394 2003-01-14 22:16:04 +00:00
glen.beasley%sun.com 3810215899 solaris pkg version 2003-01-14 20:26:36 +00:00
bishakhabanerjee%netscape.com 1403d269af Bug 171263 - NSS test apps to check return value of NSS_Shutdown 2003-01-14 01:03:21 +00:00
bishakhabanerjee%netscape.com 45ba9d6985 Bug 171263 - NSS test apps shd check return value of NSS_Shutdown 2003-01-13 22:36:39 +00:00
glen.beasley%sun.com 0a41355aa2 solaris pkging support 2003-01-13 20:35:36 +00:00
glen.beasley%sun.com b765908949 solaris pkg support 2003-01-13 19:44:21 +00:00
glen.beasley%sun.com 1b2cfef182 Solaris pkg support 2003-01-13 19:43:15 +00:00
relyea%netscape.com 3f15ddacc5 Check for Empty CRL list as well.
Bug 164501.
2003-01-10 19:09:46 +00:00
relyea%netscape.com 0c506b280f Declare PK11_TokenRefresh() 2003-01-10 17:53:01 +00:00
relyea%netscape.com ab1f73ddf5 Add the ability to generate certs with multiple DNS names. 2003-01-09 22:59:42 +00:00
glen.beasley%sun.com 3300c59b7d Solaris pkg copyright 2003-01-09 22:53:13 +00:00
relyea%netscape.com 1544ed637e Remember to include the global: tag 2003-01-09 18:44:26 +00:00
relyea%netscape.com b2f0cd3e28 backport NSS 3.7 fixes to the tip. 2003-01-09 18:15:11 +00:00
wtc%netscape.com 570a9e5387 Bug 186201: should handle a null 'environ' pointer, which can happen on
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com c1b180a77c Bug 187629: do not refresh a CERTCertificate if the same instance of a
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
dbaron%dbaron.org f2cd5e3e66 Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 23:19:20 +00:00
dbaron%dbaron.org 3da694f7ae Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 22:45:23 +00:00
wtc%netscape.com 27fc2706ca Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com 3e2a98c878 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
	base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
	pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
	util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com 388899d82d Need to call SSL_ClearSessionCache before calling NSS_Shutdown. 2003-01-08 21:40:52 +00:00
bishakhabanerjee%netscape.com b09495bd63 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:53:13 +00:00
bishakhabanerjee%netscape.com 53f2c2caf6 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:31:36 +00:00
bishakhabanerjee%netscape.com 36e8d3c8c6 new revision: 1.19; previous revision: 1.18 2003-01-07 22:29:54 +00:00
bishakhabanerjee%netscape.com cfca3d09e1 set and exported NSS_STRICT_SHUTDOWN. Bug 171263 2003-01-07 22:10:10 +00:00
kaie%netscape.com 233f20dbed b=184940 Enable additional SSL ciphers, add configuration UI
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
kaie%netscape.com 3c02966450 b=177260 Fix known leaks in PSM, track blocking PSM UI, track open SSL sockets
r=javi sr=darin
2003-01-06 22:23:49 +00:00
kairo%kairo.at a7555a91fe change all localeVersion strings, as well as brand.dtd/region.dtd to 1.3b; bug 185698, r=tao, sr=blizzard 2003-01-03 19:57:47 +00:00
dbaron%fas.harvard.edu 0a31e6afb5 Change my email address from dbaron@fas.harvard.edu to dbaron@dbaron.org. Comment changes only. 2003-01-01 23:53:20 +00:00
nicolson%netscape.com 5d7f9a2a14 Upgrade version from 3.2 to 3.3.
Uncomment MessageDigest implementations (doh!).
2003-01-01 02:58:22 +00:00
nicolson%netscape.com 6162fa3b3d Add DigestTest to all.pl.
Make DigestTest and SigTest return nonzero error code on failure.
2003-01-01 02:57:50 +00:00
seawood%netscape.com cd1497a3ab Add hack upon dependency hack to Avoid constant NSS rebuilds when pulling from CVS. 2002-12-28 05:50:17 +00:00
seawood%netscape.com 4588fb970a Start installing GRE libraries & components into a separate dist/gre directory as part of the default build.
Bug #186241 r=dougt
2002-12-28 01:15:07 +00:00
wtc%netscape.com b75e4a55f8 Bug 183612: added some comments. 2002-12-24 02:25:36 +00:00
wtc%netscape.com 71527c989a Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
nicolson%netscape.com a46f58f6b3 Fix 186097: ProofOfPossession.encode() has paranoid assertion. 2002-12-19 02:31:38 +00:00
wtc%netscape.com 587dca7fd1 Bug 183612: renamed some new functions to be consistent with existing
function names containing SubjectKey and PublicKey.  Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com 67dbcd1b25 Bug 186058 2002-12-18 23:55:53 +00:00
nicolson%netscape.com 1a0dc15ee3 Partial fix for 184754: assertion violation in get_token_certs_for_cache.
Don't assert if we fail to lookup the cert we just imported. It could
be a bug in the PKCS #11 driver. Instead, throw an exception.
2002-12-18 23:14:48 +00:00
kaie%netscape.com 0b56a2ae45 Temporary fix for bug 182803.
While this masks the reported crashes, this is nothing more than a workaround patch.
As long as this patch is in place, any attempt to do profile switching at run time will fail.
We need real fixes for bug 181230 and 177260.
r=javi sr=darin
2002-12-18 12:50:35 +00:00
wtc%netscape.com 24e76ce1c2 Bug 183612: fixed the bug that 'extra' may be used uninitialized. r=javi. 2002-12-18 02:06:01 +00:00
wtc%netscape.com c37a82ab51 Set NSS version to 3.8 Beta on the trunk. 2002-12-17 23:04:46 +00:00
wtc%netscape.com 42182a9d9e Export CERT_DestroyOCSPResponse in 3.7. Moved HASH_GetHashObjectByOidTag,
HASH_GetHashTypeByOidTag, and SECITEM_ItemsAreEqual from 3.7 to 3.8.
2002-12-17 23:02:53 +00:00
relyea%netscape.com 8ab634d5b8 Make sure the session is protected over PKCS #11 calls. 2002-12-17 18:22:38 +00:00
wtc%netscape.com 59393fce3e Need to test for null pointers before destroying the lock and condition
variable.  If NSS initialization fails, this lock and condition variable
may not get created.
2002-12-17 02:47:46 +00:00
wtc%netscape.com cc65e89c5e I made a mistake in the previous checkin. certdb.h doesn't need to be
included because the new function CERT_FindCertBySubjKeyID is declared in
cert.h.
2002-12-17 02:08:51 +00:00
wtc%netscape.com 0d2d65efb2 Bug 183612: added support for looking up a cert by subject key ID and
creating a CMS recipient info from a subject key ID.  The patch was
contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc.
Modified Files:
	certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c
	certdb/stanpcertdb.c nss/nss.def nss/nssinit.c
	pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h
	pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c
	smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h
	smime/smime.def
2002-12-17 01:39:46 +00:00
dougt%netscape.com 9ed66e1abc Allow caller to obtain cert. r=mstoltz, javi. sr=dveditz, b=179016 2002-12-13 22:26:43 +00:00
kaie%netscape.com 6fc801b267 b=182258 Give separate signature validity and sender address mismatch feedback
r=javi sr=bienvenu
2002-12-13 20:47:32 +00:00
relyea%netscape.com cd008946a6 Increment the tmpbuf pointer to the correct index point 2002-12-13 19:02:13 +00:00