Граф коммитов

28 Коммитов

Автор SHA1 Сообщение Дата
nelsonb%netscape.com 6151df3eff Make libSSL build for WinCE. 2002-04-04 00:14:12 +00:00
ian.mcgreer%sun.com a335422e9d bug 132889, sense of boolean 'blocking' is reversed within the HANDLE_ERR macro of ssl_WriteV 2002-03-22 22:48:02 +00:00
nelsonb%netscape.com 03a3ae9da0 1. the sslSecurityInfo and sslGather structs are now part of the sslSocket
rather than being pointed to by the sslSocket.  This reduces the number
of malloc/free calls, and greatly reduces pointer fetches, and null
pointer checks.  sslGather and sslSecurityInfo are separately initialized.
2. SSL_ResetHandshake no longer deallocates and reallocates the sslSecurityInfo and all its subcomponents.
3. Many places that formerly did not check for memory allocation failures
now do check, and do the right thing when allocation failed.
2002-02-27 04:40:17 +00:00
nelsonb%netscape.com 0a1fd23a7b Change ssl_GetPeerInfo to no longer assume that an address is IPV6 if
it's not IPv4.  Fixes a bug on systems that don't support IPV6, but
do support other address families.
2002-02-26 00:28:15 +00:00
wtc%netscape.com 603554bfee Bugzilla bug 70217: ported NSS to BeOS. The patch is contributed by
Christopher Seawood <seawood@netscape.com>.
2002-02-22 04:23:30 +00:00
relyea%netscape.com 7bfd9c97ec Clean up compilier warnings on Solaris and Linux, most particularly:
1) Implicit declaration of function.
2) Possibly unitialized variables.

These warnings have indicated some real problems in the code, so many changes
are not just to silence the warnings, but to fix the problems. Others were
inocuous, but the warnings were silenced to reduce the noise.
2001-12-07 01:36:25 +00:00
nelsonb%netscape.com d098b3e649 Put better comments by the table of preconfigured policies. 2001-11-02 04:00:27 +00:00
nelsonb%netscape.com edd355609a Add support to TLS for new 128-bit and 256-bit AES ciphersuites. 87021. 2001-09-21 03:07:35 +00:00
nelsonb%netscape.com 7b1e351c0f Implement new function SSL_GetChannelInfo(). Bugzilla bug 78959. 2001-09-18 01:59:21 +00:00
nelsonb%netscape.com 6d1b0f65c7 Change PR_Writev so it will drive the handshake when len == 0.
Patch by John G Myers.  Bug 87359.
2001-06-23 00:01:17 +00:00
nelsonb%netscape.com e8def47c7b Add a workaround for bug 80092. If the last write returned WOULDBLOCK
and data is now buffered for sending and the application calls PR_Poll
to poll on read, poll on write also.  This way, if the socket becomes
writable, the application's read attempt will send (more of) the buffered
write data.
2001-05-18 20:44:35 +00:00
nelsonb%netscape.com 71c0d2d9df Disable TCP Nagle delays on SSL sockets for NSS 3.3. Bug 67898.
Modified Files:
	ssldef.c sslimpl.h sslsecur.c sslsock.c
2001-05-08 23:12:34 +00:00
nelsonb%netscape.com d41f41137f Eliminate cause of assertion failure that occurs when SSL is not the top
protocol on the socket's stack.
2001-04-26 21:53:11 +00:00
nelsonb%netscape.com 9ee8d78f1c Implementation of 5 DHE ciphersuites, client side only.
Contributed by Dr Stephen Henson <stephen.henson@gemplus.com>
2001-04-11 00:29:18 +00:00
nelsonb%netscape.com 68f0773b6f Reinterpret the READ and WRITE poll flags depending on the state of the
socket and the SSL handshake.  Rename the badly named "connected" flag.
Bugzilla bugs 56924, 56926, 66706.
Modified Files:
    ssl3con.c sslauth.c sslcon.c ssldef.c sslgathr.c sslimpl.h
    sslsecur.c sslsock.c
2001-03-16 23:26:06 +00:00
nelsonb%netscape.com 4a2c9e4a11 Modify ssl_FindSocket() to set error PR_BAD_DESCRIPTOR_ERROR when it
cannot find the SSL layer on the specified PRFileDesc. Ensure all
callers detect when ssl_FindSocket returns NULL and handle it properly.
Bug 68241. Reviewed by jgmyers and relyea.
Modified Files:
 	prelib.c sslauth.c sslsecur.c sslsock.c
2001-02-09 02:11:31 +00:00
nelsonb%netscape.com b63a17a085 Make SSL API consistent in using SECStatus as return value for functions
that return only values in that enumeration.  Bug 68097. R&A = relyea.
Modified Files:
 	lib/ssl/ssl.h lib/ssl/sslauth.c lib/ssl/sslsecur.c
 	lib/ssl/sslsnce.c lib/ssl/sslsock.c cmd/selfserv/selfserv.c
 	cmd/strsclnt/strsclnt.c
2001-02-09 00:32:14 +00:00
nelsonb%netscape.com 98da57cc81 When half-duplex applications (e.g. one thread per socket, doing alternate
reading and writing) call PR_Send and PR_Recv with a non-infinite timeout
value, use that value for both underlying read and write operations.
Fixes bug 67402.  Reviewed by Wan-Teh.
2001-02-07 02:06:05 +00:00
nelsonb%netscape.com 4bd80af9b2 Coalesce the final Finished message in the SSL handshake and the first
record of application data into a single write, when possible, to avoid
TCP's "Nagle" delays.  Fixes bug 67898.  r&a: wtc.  Modified Files:
	ssl3con.c sslimpl.h sslsecur.c sslsock.c
2001-02-07 00:34:56 +00:00
nelsonb%netscape.com 39d089077d Add implementation of SSL_RSA_WITH_RC4_128_SHA SSL3 cipher suite,
which is not enabled by default.  Bug 59795.
2001-01-13 02:05:15 +00:00
nelsonb%netscape.com 194d65d7b1 Remove all vestiges of old pre-NSS socks client implementation from NSS.
Bug 51471.
2001-01-13 01:52:59 +00:00
nelsonb%netscape.com 8aed37f6f6 Changes to deal with exporting data from Windows DLLs.
SECHashObjects[] is no longer exported.
New function HASH_GetHashObject returns pointer to selected const object.
SSL statistics are now in a structure whose address is obtained via a
call to SSL_GetStatistics().
On NT, the new symbol NSS_USE_STATIC_LIBS must be declared in programs
that use the static SSL library.
Also, propagate "const" declaration for SECHashObjects.
2001-01-05 01:38:26 +00:00
larryh%netscape.com cf691e615e Bugzilla: 64132. NSS lock instrumentation 2001-01-03 19:51:22 +00:00
jgmyers%netscape.com d33a0e465b support IPv6 in ssl: bug 48657 r=nelsonb 2000-09-12 20:15:44 +00:00
nelsonb%netscape.com 55543ba43b Stop using "reserved" fields of PRIOMethods by name. Fixes bug 52092. 2000-09-11 22:37:12 +00:00
nelsonb%netscape.com fcd529acd8 Create a new function, CERT_DupCertList(), and call it instead of calling
CERT_CertChainFromCert in ssl_DupSocket().  This is MUCH faster.  This is
the first approximation of the right fix.  The next step is to consider
doing ref counting instead of actual duplication.  Fixes bug 51425 .
2000-09-09 06:08:46 +00:00
nelsonb%netscape.com b3137b12fc Fix the logic in client and server to detect version roll-back attack,
rolling back from TLS (SSL 3.1) to SSL 3.0.  Provide a new SSL socket
option to disable roll-back detection in servers, since certain TLS
clients are doing it incorrectly.
2000-05-24 03:35:23 +00:00
relyea%netscape.com 5dea64f5a5 Initial NSS Open Source checkin 2000-03-31 20:13:40 +00:00