wtc%netscape.com
6edc864d6e
Bug 131826: checked in the README file of zlib 1.1.4.
2003-02-08 09:10:36 +00:00
wtc%netscape.com
7d4ad3fc60
Bug 131826: upgraded to zlib 1.1.4.
...
Modified Files:
adler32.c compress.c crc32.c deflate.c deflate.h example.c
gzio.c infblock.c infblock.h infcodes.c infcodes.h inffast.c
inffast.h inflate.c inftrees.c inftrees.h infutil.c infutil.h
minigzip.c trees.c uncompr.c zconf.h zlib.h zutil.c zutil.h
2003-02-08 08:50:42 +00:00
wtc%netscape.com
899b4b00c5
Bug 131826: added maketree.c from zlib 1.1.4.
2003-02-08 08:37:00 +00:00
wtc%netscape.com
51a2c07941
Removed unused files stubs.c and zip_nodl.c.
2003-02-08 08:35:07 +00:00
wtc%netscape.com
23f47b2e4d
Bug 131826: added new header files from zlib 1.1.4.
...
Added Files: trees.h inffixed.h
2003-02-08 08:30:11 +00:00
relyea%netscape.com
dae21534d8
Sigh, the QA scripts look for the word 'failed', but it's common that we
...
can't open the shared library and isn't a real failure, so change the wording
2003-02-08 01:52:37 +00:00
relyea%netscape.com
c40beead4c
Skip corruption test if someone has locked down the shared library on us.
2003-02-08 00:02:06 +00:00
wtc%netscape.com
34372e7cee
Exit with 1 rather than -1 on failure. Make sure the program exit with 1
...
on all failures. Remove the symlink, if a file/symlink by that name already
exists, before creating it to avoid the EEXIST error.
2003-02-07 23:41:15 +00:00
wtc%netscape.com
8d38bb626b
Use <> around standard/system header files. This file does not need
...
string.h, but it should include stdio.h because it uses fprintf and printf.
2003-02-07 23:21:53 +00:00
nelsonb%netscape.com
923827d462
Fix bug 190527. Properly extend buffer when data exceeds 512 bytes.
2003-02-07 23:09:35 +00:00
relyea%netscape.com
d3fd98806e
Fix signed/unsigned display issue.
...
Add more loggin information on errors (rev 1.3 added this but lost it's log).
2003-02-07 23:05:07 +00:00
relyea%netscape.com
bcafc7572b
*** empty log message ***
2003-02-07 23:02:43 +00:00
relyea%netscape.com
4dd6b2da64
Add test to see if the shlib was actually changed.
2003-02-07 21:13:10 +00:00
relyea%netscape.com
aa9dafae78
Add Mangle logging...
2003-02-07 21:12:26 +00:00
relyea%netscape.com
70e3aa6345
Add debugging information. Turn on tempararily to get debug info from tinderbox failures.
2003-02-07 19:22:42 +00:00
kirk.erickson%sun.com
03a251009f
Moved rules.mk include to the end.
2003-02-07 07:16:37 +00:00
wtc%netscape.com
e1fe9f07a3
Set the default compiler to cc.
2003-02-07 06:57:57 +00:00
nelsonb%netscape.com
645cb762cb
Move the implementation of the TLS Pseudo Random Function (PRF) from
...
pkcs11c.c into a new file: tlsprf.c.
2003-02-07 06:42:20 +00:00
nelsonb%netscape.com
f9133aa19e
Fix the dbtests test on Windows, when run in all.sh.
...
The problem was that fips.sh created a file in . named dbtest, which was
actually some text output by a previous test. This dbtest file prevented
the dbtest program from running. The text file now has another name.
2003-02-07 06:32:59 +00:00
kirk.erickson%sun.com
edc53c0499
Resolves bug 189504 (Build Linux RPMS).
2003-02-07 05:56:15 +00:00
nelsonb%netscape.com
d6bf23b21d
MKS shell doesn't know about echor command. Does any shell?
2003-02-07 05:48:34 +00:00
nelsonb%netscape.com
e7ff335e8c
Remove unreferenced local variables from functions.
2003-02-07 05:08:01 +00:00
wtc%netscape.com
5376fc6d82
Moved the definition of MD_LIB_RELEASE_FILES from manifest.mn to Makefile
...
so that it is right next to the definition of CHECKLOC, which it uses.
2003-02-06 22:37:37 +00:00
relyea%netscape.com
929ac59217
Clean up tests
...
Suppress error messages which we were expecting because it causes the QA
scripts to report a QA failure.
2003-02-06 19:06:39 +00:00
relyea%netscape.com
6b8ac1fb4b
Mangle will be changing the shared libraries, so it should link with them.
2003-02-06 18:18:42 +00:00
wtc%netscape.com
7870b01f6d
Bug 177387: Put the configuration/assignments before the rules in Makefile.
...
Define MD_LIB_RELEASE_FILES in manifest.mn so that the *.chk files are
included in the mdbinary.jar files generated by the release target.
2003-02-06 16:56:46 +00:00
relyea%netscape.com
6d2419f541
Turn on FIPS test again.
2003-02-06 16:13:44 +00:00
relyea%netscape.com
d32d519e9e
Introduce shell variables for DLL_PREFIX and DLL_SUFFIX
2003-02-06 16:13:22 +00:00
wtc%netscape.com
edb8b5fe44
Support both ";" and ":" as PATH separators on Windows. MKS Korn shell
...
uses ";" but Cygwin bash uses ":".
2003-02-06 14:52:43 +00:00
wtc%netscape.com
82345876f3
Backed out the previous checkin because it doesn't work on Windows.
2003-02-06 05:33:33 +00:00
wtc%netscape.com
2574db9f16
Bug 188441: compile with -D_USE_BIG_FDS on HP-UX. This ensures that fd_set
...
is large enough for 60,000 file descriptors.
2003-02-06 04:43:03 +00:00
wtc%netscape.com
92c86ec530
Bug 177387: include the *.chk files in the mdbinary.jar files generated by
...
the release makefile target.
Modified Files: lib/freebl/manifest.mn lib/softoken/manifest.mn
2003-02-06 03:52:37 +00:00
relyea%netscape.com
c611d55441
Remove mangle test until we can get the correct library name inside fips.sh for all platforms
2003-02-06 01:07:39 +00:00
relyea%netscape.com
8bc877fcf9
Add check to 1) make sure we are in FIPS mode. and 2) to verify that we
...
detect corrupted shared libraries while in FIPS mode.
2003-02-06 00:50:00 +00:00
relyea%netscape.com
d25559ff9f
The NSPR get shared lib interface requires the library name only,
...
not a partial path to the library. This affects AIX.
2003-02-06 00:49:09 +00:00
relyea%netscape.com
c613b5df3c
Try to load the new module before we've unloaded the old one. This now
...
works in NSS, and it allows us to back out if the new one didn't load (because
FIPS could not verify the shared module for instance).
2003-02-05 00:35:53 +00:00
relyea%netscape.com
9eb1dbcff9
Update db test to verify cert8 not cert7
2003-02-05 00:33:52 +00:00
relyea%netscape.com
bc5d891538
Surface the Err codes if we fail to shift to FIPS mode.
...
Add new option to verify that we have shifted to FIPS mode.
2003-02-05 00:31:15 +00:00
relyea%netscape.com
b8ee14395c
1) turn on mangle builds.
...
2) better fix for the missing MAXPATHLEN missing define.
3) make room for the '\0' in the pathname.
2003-02-05 00:29:35 +00:00
relyea%netscape.com
1ed41d69c9
Fix LINUX breakage (define MAXPATHLEN if it wasn't defined the the standard
...
system headers).
2003-02-04 23:39:15 +00:00
relyea%netscape.com
c5679652a6
Add code to handle symlinks.
...
Add verbose output to print out hashes and signatures.
2003-02-04 23:18:08 +00:00
relyea%netscape.com
b66f562dec
Add program which will mangle exactly 1 bit in a file.
2003-02-04 23:16:56 +00:00
relyea%netscape.com
883af5be6e
Fix windows build breakage.
2003-02-04 19:03:11 +00:00
kaie%netscape.com
a7bcf48918
b=191301 Crash if I cancel "Choose token" dialog on Cert import
...
r=javi sr=darin a=dbaron
2003-02-04 01:37:23 +00:00
relyea%netscape.com
2cf013ba38
Shell script to set up the path before running the signing tool
2003-02-03 21:06:57 +00:00
relyea%netscape.com
cb166d81a7
Generate .chk file at build time when we build shlibsign
2003-02-03 21:06:18 +00:00
relyea%netscape.com
ab6d0dea43
Check bug 188856 into the tip.
...
1)return proper error code in more cases. 2) Fix bug in DH KeyPair Generation.
the essential part of this fix in pkcs11c.c where we add the CKA_NETSCAPE_DB
attribute on Diffie-Hellman key gen. I don't know why the code would have even
thought of working without this (unless we were testing with pregenerated
keys).
The rest of the fix is to surface more of the PKCS #11 error back up. There is
a separate bug to continue tracking the issue of lost PKCS #11 errors.
2003-01-31 23:39:34 +00:00
kaie%netscape.com
8fdd6beaad
b=189974 Profile Switching fails after JavaScript based cert import
...
PSM portion of fix
r=javi sr=darin a=asa
2003-01-31 22:33:49 +00:00
nelsonb%netscape.com
7874d8d788
Fix an uninitialized variable. Bug 191396.
2003-01-31 22:26:56 +00:00
nelsonb%netscape.com
91b818b389
Fix crash in CERT_CheckKeyUsage caused by dereferencing a returned pointer
...
without checkin it for NULL.
2003-01-31 02:49:13 +00:00
nelsonb%netscape.com
04c74fc4ac
Fix bug 191396. Don't generate SEC_ERROR_LIBRARY_FAILURE unnecessarily
...
while doing dsa signatures.
2003-01-31 02:39:36 +00:00
relyea%netscape.com
2d71279799
FIPS library verifier.
2003-01-30 23:38:07 +00:00
relyea%netscape.com
bd68779b0c
FIPS library verifier
2003-01-30 23:36:37 +00:00
wtc%netscape.com
751c48b5e5
Bug 191214: fixed the object leaks in signtool that prevented NSS_Shutdown
...
from succeeding and added the NSS_Shutdown call back. r=jpierre.
Modified Files: certgen.c sign.c signtool.c
2003-01-30 23:11:13 +00:00
wtc%netscape.com
5f51d20223
Bug 177387: temporarily added freebl_GetLibraryFilePathname to libfreebl.a.
...
This function has the same semantics as the NSPR 4.3 function
PR_GetLibraryFilePathname. This patch should be backed out when NSPR 4.3 is
released.
Modified Files: config.mk manifest.mn
Added Files: libpath.c
2003-01-30 07:00:32 +00:00
jpierre%netscape.com
4efd6d4409
Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute. r=wtc
2003-01-30 05:12:10 +00:00
jpierre%netscape.com
e3c369562b
Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute . r=wtc
2003-01-30 03:02:55 +00:00
jpierre%netscape.com
468dc9f9ab
Patch for memory leak . Bug 189976 . r=wtc
2003-01-30 02:59:35 +00:00
wtc%netscape.com
fedddcffe2
Bug 191214: backed out the previous checkin until this bug (object leaks)
...
is fixed.
2003-01-30 01:50:31 +00:00
wtc%netscape.com
4dbc437731
Bug 171263: signtool should call NSS_Shutdown before it exits.
2003-01-30 00:39:37 +00:00
relyea%netscape.com
3788b0eeec
Move LIBJAR definitions around so that NT builds.
2003-01-29 23:37:10 +00:00
kaie%netscape.com
69c368b1a9
b=165301 False mixed content (encrypted page with unencrypted information) Security Warning
...
r=javi sr=darin a=asa
2003-01-29 03:52:01 +00:00
relyea%netscape.com
807a5de681
1) add vfyserv to the standard build.
...
2) add tool to build shared library signature files for FIP's.
Code to verify requires NSPR changes before we can check it in.
2003-01-28 18:53:22 +00:00
relyea%netscape.com
fa9c0d1f91
New header file to dump defines for managing signed FIPs libraries.
2003-01-28 18:50:02 +00:00
relyea%netscape.com
97ee121321
Compile modutil with shared libraries.
2003-01-28 16:44:33 +00:00
relyea%netscape.com
ca368d8e94
Export functions needed for modutil to be compiled dynamically.
2003-01-28 16:41:46 +00:00
relyea%netscape.com
2a6c459c18
Remove dead code and symbols from lib jar so that modutil can compile when
...
linked with it.
2003-01-28 16:39:32 +00:00
relyea%netscape.com
88f5c92825
Sign 3 sets of changes are here:
...
1) Provide accessor functions for the PK11_DefaultArray so that modutil
does not have to link statically to access it.
2) Try setting the attribute on an object before we go to the work of copying
it (Function Only used in Java).
3) Optimize searching for the more common types of attributes.
2003-01-28 16:38:04 +00:00
kaie%netscape.com
6b9785edcd
b=190640 Remove the DHE ciphersuites until they work
...
r=javi sr=bryner a=asa
2003-01-28 15:06:29 +00:00
kaie%netscape.com
64cd67a3d0
b=190394 "website certified by an unknown authority" - nssckbi not found breaks PKI trust
...
r=dougt sr=darin a=asa
2003-01-27 23:53:02 +00:00
wtc%netscape.com
6d046ab3c2
Bug 90010: added support for parisc64. I received this patch from
...
Christopher Blizzard <blizzard@mozilla.org>.
2003-01-27 22:36:06 +00:00
wtc%netscape.com
d4ac75f3a6
Bug 190396.
...
Don't fail the search if the token returned an error that indicates that it
legitimately couldn't find a CRL
2003-01-24 06:37:03 +00:00
relyea%netscape.com
04df2266d3
Bug 167756. Clean up previous patch: add lastState field, and set the SSL Error on failure.
2003-01-23 22:02:37 +00:00
relyea%netscape.com
797a5bc51c
Write changes back to the database when we correct incorrect user bit settings.
2003-01-23 19:38:53 +00:00
relyea%netscape.com
48191e6dde
Set the size value when extracting a key 19011.
2003-01-23 17:30:15 +00:00
relyea%netscape.com
c5e06bef79
Check for token removal before continuing SSL sessions which have client auth
...
with certs associated with that token. bug 167756.
2003-01-23 17:27:34 +00:00
relyea%netscape.com
a54ce85446
Fix bug 180824 Version 3.4 string hard coded in default token name.
2003-01-23 17:16:50 +00:00
wtc%netscape.com
722dc7dcf5
Bug 90010: added support for Linux for s390 and s390x. The patch is
...
contributed by Gerhard Tonn <GerhardTonn@swol.de>.
2003-01-23 17:16:32 +00:00
ian.mcgreer%sun.com
c05c7c3f1e
always use explicit serial numbers on generated certs, should fix QA failures on leia
2003-01-23 15:38:03 +00:00
jpierre%netscape.com
d68a388386
Fix for bug #126930 - make SSL_ConfigServreSessionIDCache work on OS/2 by not using shared memory in single process mode. r=nelsonb
2003-01-23 00:15:08 +00:00
wtc%netscape.com
dcfc314ddc
Bug 190112: PK11_ReadAttribute needs to call PK11_ExitSlotMonitor before
...
we return because of allocation failure.
2003-01-22 17:44:36 +00:00
wtc%netscape.com
ba247cd419
Bug 189546: updated the comments to reflect what the new code does.
2003-01-22 06:24:53 +00:00
timeless%mozdev.org
e87b036988
Bug 179798 cookie confirm dialog no longer works in embedding (doesn't call nsIPrompt service)
...
patch by mvl@exedo.nl r=dwitte sr=darin
2003-01-22 05:52:33 +00:00
nelsonb%netscape.com
e5ea957b6e
Add OIDs for AES Key Wrap mechanism.
2003-01-22 04:35:54 +00:00
wtc%netscape.com
ddc27a6bbf
Bug 189546: moved the switch statement for known key lengths to the
...
beginning of PK11_GetKeyLength to work around a deadlock in nCipher
module if PK11_ExtractKeyValue is called.
2003-01-22 03:55:21 +00:00
kaie%netscape.com
153d01add8
b=188363 Bad error messages when server uses an invalid cert (-8054)
...
r=nelsonb sr=blizzard
2003-01-22 03:41:35 +00:00
nelsonb%netscape.com
2770ec645e
Implement new AES Key Wrap mechanisms. Bug 167818.
2003-01-22 03:13:04 +00:00
wtc%netscape.com
f20a97ef6a
Bug 189345: we incorrectly assumed that a C_XxxFinal call to determine the
...
length of the buffer would also terminate the active operation if the
buffer length is 0. PKCS#11 says it doesn't, so we need to make the
additional C_XxxFinal call even if the buffer length is 0. Allocate a
buffer from the heap if the stack buffer is too small and free the
heap-allocated buffer before we return from pk11_Finalize. We can use the
stack buffer if count is equal to its size.
2003-01-21 19:33:24 +00:00
seawood%netscape.com
a4b8644bc9
I always forget to change both the declaration & the definition.
...
Thanks to bird@anduin.net for the patch.
Fixing OS/2 bustage.
2003-01-19 06:43:19 +00:00
seawood%netscape.com
6e4b727afc
Callback functions must be defined as such.
...
Fixing OS/2 bustage.
2003-01-19 02:43:13 +00:00
kaie%netscape.com
499c2e67f7
b=189205 Implement early shutdown of NSS resources
...
r=javi sr=darin
2003-01-18 14:03:00 +00:00
relyea%netscape.com
402a4a6710
Bug 198364. Tokens keys do not own their handles. Don't let the key
...
get destroyed when freed.
2003-01-18 01:49:33 +00:00
nelsonb%netscape.com
48e8c13dcd
When wrapping secret keys with an unpadded block cipher, null padd the keys
...
as necessary, per the PKCS 11 spec. Also, implement padding and unpadding
for single-part only ciphers.
2003-01-17 05:50:08 +00:00
wtc%netscape.com
12a72288a3
Bug 145029: fixed compiler warnings (mostly "xxx might be used
...
uninitialized").
2003-01-17 02:49:11 +00:00
nelsonb%netscape.com
3c2c7f33bb
One more fix for HPUX and Solaris.
2003-01-16 01:44:43 +00:00
jpierre%netscape.com
8796ef7732
Fix incorrect usage of QuickDER . See bug 160805 comment 16
2003-01-16 00:56:10 +00:00
nelsonb%netscape.com
5c71d8774b
Fix compilation error. This file is only compiled on 2 platforms.
2003-01-16 00:55:53 +00:00
nelsonb%netscape.com
a234db694e
Switch from the old vendor-defined mechanism numbers to the new official
...
PKCS 11 mechanism numbers. These numbers will appear in v2.20.
2003-01-16 00:43:58 +00:00
nelsonb%netscape.com
fc19041388
Enforce that softoken's mechanisms are used only with the PKCS 11
...
functions that they're defined to work with.
2003-01-16 00:28:05 +00:00
nelsonb%netscape.com
472aaf52b9
Complete the addition of AES Key Wrap to blapi in freebl.
2003-01-16 00:15:21 +00:00
nelsonb%netscape.com
1a0e61f69a
Remove the implementation of CKM_KEY_WRAP_LYNKS from softoken.
2003-01-16 00:14:07 +00:00
nelsonb%netscape.com
8d818d5064
aeskeywrap.c - implement AES Key Wrap algorithm from RFC 3394
2003-01-14 22:16:04 +00:00
glen.beasley%sun.com
3810215899
solaris pkg version
2003-01-14 20:26:36 +00:00
bishakhabanerjee%netscape.com
1403d269af
Bug 171263 - NSS test apps to check return value of NSS_Shutdown
2003-01-14 01:03:21 +00:00
bishakhabanerjee%netscape.com
45ba9d6985
Bug 171263 - NSS test apps shd check return value of NSS_Shutdown
2003-01-13 22:36:39 +00:00
glen.beasley%sun.com
0a41355aa2
solaris pkging support
2003-01-13 20:35:36 +00:00
glen.beasley%sun.com
b765908949
solaris pkg support
2003-01-13 19:44:21 +00:00
glen.beasley%sun.com
1b2cfef182
Solaris pkg support
2003-01-13 19:43:15 +00:00
relyea%netscape.com
3f15ddacc5
Check for Empty CRL list as well.
...
Bug 164501.
2003-01-10 19:09:46 +00:00
relyea%netscape.com
0c506b280f
Declare PK11_TokenRefresh()
2003-01-10 17:53:01 +00:00
relyea%netscape.com
ab1f73ddf5
Add the ability to generate certs with multiple DNS names.
2003-01-09 22:59:42 +00:00
glen.beasley%sun.com
3300c59b7d
Solaris pkg copyright
2003-01-09 22:53:13 +00:00
relyea%netscape.com
1544ed637e
Remember to include the global: tag
2003-01-09 18:44:26 +00:00
relyea%netscape.com
b2f0cd3e28
backport NSS 3.7 fixes to the tip.
2003-01-09 18:15:11 +00:00
wtc%netscape.com
570a9e5387
Bug 186201: should handle a null 'environ' pointer, which can happen on
...
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com
c1b180a77c
Bug 187629: do not refresh a CERTCertificate if the same instance of a
...
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
dbaron%dbaron.org
f2cd5e3e66
Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag
2003-01-08 23:19:20 +00:00
dbaron%dbaron.org
3da694f7ae
Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag
2003-01-08 22:45:23 +00:00
wtc%netscape.com
27fc2706ca
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com
3e2a98c878
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com
388899d82d
Need to call SSL_ClearSessionCache before calling NSS_Shutdown.
2003-01-08 21:40:52 +00:00
bishakhabanerjee%netscape.com
b09495bd63
checking return value of NSS_Shutdown. Bug 171263
2003-01-07 22:53:13 +00:00
bishakhabanerjee%netscape.com
53f2c2caf6
checking return value of NSS_Shutdown. Bug 171263
2003-01-07 22:31:36 +00:00
bishakhabanerjee%netscape.com
36e8d3c8c6
new revision: 1.19; previous revision: 1.18
2003-01-07 22:29:54 +00:00
bishakhabanerjee%netscape.com
cfca3d09e1
set and exported NSS_STRICT_SHUTDOWN. Bug 171263
2003-01-07 22:10:10 +00:00
kaie%netscape.com
233f20dbed
b=184940 Enable additional SSL ciphers, add configuration UI
...
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
kaie%netscape.com
3c02966450
b=177260 Fix known leaks in PSM, track blocking PSM UI, track open SSL sockets
...
r=javi sr=darin
2003-01-06 22:23:49 +00:00
kairo%kairo.at
a7555a91fe
change all localeVersion strings, as well as brand.dtd/region.dtd to 1.3b; bug 185698, r=tao, sr=blizzard
2003-01-03 19:57:47 +00:00
dbaron%fas.harvard.edu
0a31e6afb5
Change my email address from dbaron@fas.harvard.edu to dbaron@dbaron.org. Comment changes only.
2003-01-01 23:53:20 +00:00
nicolson%netscape.com
5d7f9a2a14
Upgrade version from 3.2 to 3.3.
...
Uncomment MessageDigest implementations (doh!).
2003-01-01 02:58:22 +00:00
nicolson%netscape.com
6162fa3b3d
Add DigestTest to all.pl.
...
Make DigestTest and SigTest return nonzero error code on failure.
2003-01-01 02:57:50 +00:00
seawood%netscape.com
cd1497a3ab
Add hack upon dependency hack to Avoid constant NSS rebuilds when pulling from CVS.
2002-12-28 05:50:17 +00:00
seawood%netscape.com
4588fb970a
Start installing GRE libraries & components into a separate dist/gre directory as part of the default build.
...
Bug #186241 r=dougt
2002-12-28 01:15:07 +00:00
wtc%netscape.com
b75e4a55f8
Bug 183612: added some comments.
2002-12-24 02:25:36 +00:00
wtc%netscape.com
71527c989a
Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
...
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
nicolson%netscape.com
a46f58f6b3
Fix 186097: ProofOfPossession.encode() has paranoid assertion.
2002-12-19 02:31:38 +00:00
wtc%netscape.com
587dca7fd1
Bug 183612: renamed some new functions to be consistent with existing
...
function names containing SubjectKey and PublicKey. Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com
67dbcd1b25
Bug 186058
2002-12-18 23:55:53 +00:00
nicolson%netscape.com
1a0dc15ee3
Partial fix for 184754: assertion violation in get_token_certs_for_cache.
...
Don't assert if we fail to lookup the cert we just imported. It could
be a bug in the PKCS #11 driver. Instead, throw an exception.
2002-12-18 23:14:48 +00:00
kaie%netscape.com
0b56a2ae45
Temporary fix for bug 182803.
...
While this masks the reported crashes, this is nothing more than a workaround patch.
As long as this patch is in place, any attempt to do profile switching at run time will fail.
We need real fixes for bug 181230 and 177260.
r=javi sr=darin
2002-12-18 12:50:35 +00:00
wtc%netscape.com
24e76ce1c2
Bug 183612: fixed the bug that 'extra' may be used uninitialized. r=javi.
2002-12-18 02:06:01 +00:00
wtc%netscape.com
c37a82ab51
Set NSS version to 3.8 Beta on the trunk.
2002-12-17 23:04:46 +00:00
wtc%netscape.com
42182a9d9e
Export CERT_DestroyOCSPResponse in 3.7. Moved HASH_GetHashObjectByOidTag,
...
HASH_GetHashTypeByOidTag, and SECITEM_ItemsAreEqual from 3.7 to 3.8.
2002-12-17 23:02:53 +00:00
relyea%netscape.com
8ab634d5b8
Make sure the session is protected over PKCS #11 calls.
2002-12-17 18:22:38 +00:00
wtc%netscape.com
59393fce3e
Need to test for null pointers before destroying the lock and condition
...
variable. If NSS initialization fails, this lock and condition variable
may not get created.
2002-12-17 02:47:46 +00:00
wtc%netscape.com
cc65e89c5e
I made a mistake in the previous checkin. certdb.h doesn't need to be
...
included because the new function CERT_FindCertBySubjKeyID is declared in
cert.h.
2002-12-17 02:08:51 +00:00
wtc%netscape.com
0d2d65efb2
Bug 183612: added support for looking up a cert by subject key ID and
...
creating a CMS recipient info from a subject key ID. The patch was
contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc.
Modified Files:
certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c
certdb/stanpcertdb.c nss/nss.def nss/nssinit.c
pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h
pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c
smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h
smime/smime.def
2002-12-17 01:39:46 +00:00
dougt%netscape.com
9ed66e1abc
Allow caller to obtain cert. r=mstoltz, javi. sr=dveditz, b=179016
2002-12-13 22:26:43 +00:00
kaie%netscape.com
6fc801b267
b=182258 Give separate signature validity and sender address mismatch feedback
...
r=javi sr=bienvenu
2002-12-13 20:47:32 +00:00
relyea%netscape.com
cd008946a6
Increment the tmpbuf pointer to the correct index point
2002-12-13 19:02:13 +00:00