Граф коммитов

4105 Коммитов

Автор SHA1 Сообщение Дата
relyea%netscape.com 1ed41d69c9 Fix LINUX breakage (define MAXPATHLEN if it wasn't defined the the standard
system headers).
2003-02-04 23:39:15 +00:00
relyea%netscape.com c5679652a6 Add code to handle symlinks.
Add verbose output to print out hashes and signatures.
2003-02-04 23:18:08 +00:00
relyea%netscape.com b66f562dec Add program which will mangle exactly 1 bit in a file. 2003-02-04 23:16:56 +00:00
relyea%netscape.com 883af5be6e Fix windows build breakage. 2003-02-04 19:03:11 +00:00
kaie%netscape.com a7bcf48918 b=191301 Crash if I cancel "Choose token" dialog on Cert import
r=javi sr=darin a=dbaron
2003-02-04 01:37:23 +00:00
relyea%netscape.com 2cf013ba38 Shell script to set up the path before running the signing tool 2003-02-03 21:06:57 +00:00
relyea%netscape.com cb166d81a7 Generate .chk file at build time when we build shlibsign 2003-02-03 21:06:18 +00:00
relyea%netscape.com ab6d0dea43 Check bug 188856 into the tip.
1)return proper error code in more cases. 2) Fix bug in DH KeyPair Generation.

the essential part of this fix in pkcs11c.c where we add the CKA_NETSCAPE_DB
attribute on Diffie-Hellman key gen. I don't know why the code would have even
thought of working without this (unless we were testing with pregenerated
keys).

The rest of the fix is to surface more of the PKCS #11 error back up. There is
a separate bug to continue tracking the issue of lost PKCS #11 errors.
2003-01-31 23:39:34 +00:00
kaie%netscape.com 8fdd6beaad b=189974 Profile Switching fails after JavaScript based cert import
PSM portion of fix
r=javi sr=darin a=asa
2003-01-31 22:33:49 +00:00
nelsonb%netscape.com 7874d8d788 Fix an uninitialized variable. Bug 191396. 2003-01-31 22:26:56 +00:00
nelsonb%netscape.com 91b818b389 Fix crash in CERT_CheckKeyUsage caused by dereferencing a returned pointer
without checkin it for NULL.
2003-01-31 02:49:13 +00:00
nelsonb%netscape.com 04c74fc4ac Fix bug 191396. Don't generate SEC_ERROR_LIBRARY_FAILURE unnecessarily
while doing dsa signatures.
2003-01-31 02:39:36 +00:00
relyea%netscape.com 2d71279799 FIPS library verifier. 2003-01-30 23:38:07 +00:00
relyea%netscape.com bd68779b0c FIPS library verifier 2003-01-30 23:36:37 +00:00
wtc%netscape.com 751c48b5e5 Bug 191214: fixed the object leaks in signtool that prevented NSS_Shutdown
from succeeding and added the NSS_Shutdown call back.  r=jpierre.
Modified Files: certgen.c sign.c signtool.c
2003-01-30 23:11:13 +00:00
wtc%netscape.com 5f51d20223 Bug 177387: temporarily added freebl_GetLibraryFilePathname to libfreebl.a.
This function has the same semantics as the NSPR 4.3 function
PR_GetLibraryFilePathname. This patch should be backed out when NSPR 4.3 is
released.
Modified Files: config.mk manifest.mn
Added Files: libpath.c
2003-01-30 07:00:32 +00:00
jpierre%netscape.com 4efd6d4409 Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute. r=wtc 2003-01-30 05:12:10 +00:00
jpierre%netscape.com e3c369562b Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute . r=wtc 2003-01-30 03:02:55 +00:00
jpierre%netscape.com 468dc9f9ab Patch for memory leak . Bug 189976 . r=wtc 2003-01-30 02:59:35 +00:00
wtc%netscape.com fedddcffe2 Bug 191214: backed out the previous checkin until this bug (object leaks)
is fixed.
2003-01-30 01:50:31 +00:00
wtc%netscape.com 4dbc437731 Bug 171263: signtool should call NSS_Shutdown before it exits. 2003-01-30 00:39:37 +00:00
relyea%netscape.com 3788b0eeec Move LIBJAR definitions around so that NT builds. 2003-01-29 23:37:10 +00:00
kaie%netscape.com 69c368b1a9 b=165301 False mixed content (encrypted page with unencrypted information) Security Warning
r=javi sr=darin a=asa
2003-01-29 03:52:01 +00:00
relyea%netscape.com 807a5de681 1) add vfyserv to the standard build.
2) add tool to build shared library signature files for FIP's.

Code to verify requires NSPR changes before we can check it in.
2003-01-28 18:53:22 +00:00
relyea%netscape.com fa9c0d1f91 New header file to dump defines for managing signed FIPs libraries. 2003-01-28 18:50:02 +00:00
relyea%netscape.com 97ee121321 Compile modutil with shared libraries. 2003-01-28 16:44:33 +00:00
relyea%netscape.com ca368d8e94 Export functions needed for modutil to be compiled dynamically. 2003-01-28 16:41:46 +00:00
relyea%netscape.com 2a6c459c18 Remove dead code and symbols from lib jar so that modutil can compile when
linked with it.
2003-01-28 16:39:32 +00:00
relyea%netscape.com 88f5c92825 Sign 3 sets of changes are here:
1) Provide accessor functions for the PK11_DefaultArray so that modutil
does not have to link statically to access it.

2) Try setting the attribute on an object before we go to the work of copying
it (Function Only used in Java).

3) Optimize searching for the more common types of attributes.
2003-01-28 16:38:04 +00:00
kaie%netscape.com 6b9785edcd b=190640 Remove the DHE ciphersuites until they work
r=javi sr=bryner a=asa
2003-01-28 15:06:29 +00:00
kaie%netscape.com 64cd67a3d0 b=190394 "website certified by an unknown authority" - nssckbi not found breaks PKI trust
r=dougt sr=darin a=asa
2003-01-27 23:53:02 +00:00
wtc%netscape.com 6d046ab3c2 Bug 90010: added support for parisc64. I received this patch from
Christopher Blizzard <blizzard@mozilla.org>.
2003-01-27 22:36:06 +00:00
wtc%netscape.com d4ac75f3a6 Bug 190396.
Don't fail the search if the token returned an error that indicates that it
legitimately couldn't find a CRL
2003-01-24 06:37:03 +00:00
relyea%netscape.com 04df2266d3 Bug 167756. Clean up previous patch: add lastState field, and set the SSL Error on failure. 2003-01-23 22:02:37 +00:00
relyea%netscape.com 797a5bc51c Write changes back to the database when we correct incorrect user bit settings. 2003-01-23 19:38:53 +00:00
relyea%netscape.com 48191e6dde Set the size value when extracting a key 19011. 2003-01-23 17:30:15 +00:00
relyea%netscape.com c5e06bef79 Check for token removal before continuing SSL sessions which have client auth
with certs associated with that token. bug 167756.
2003-01-23 17:27:34 +00:00
relyea%netscape.com a54ce85446 Fix bug 180824 Version 3.4 string hard coded in default token name. 2003-01-23 17:16:50 +00:00
wtc%netscape.com 722dc7dcf5 Bug 90010: added support for Linux for s390 and s390x. The patch is
contributed by Gerhard Tonn <GerhardTonn@swol.de>.
2003-01-23 17:16:32 +00:00
ian.mcgreer%sun.com c05c7c3f1e always use explicit serial numbers on generated certs, should fix QA failures on leia 2003-01-23 15:38:03 +00:00
jpierre%netscape.com d68a388386 Fix for bug #126930 - make SSL_ConfigServreSessionIDCache work on OS/2 by not using shared memory in single process mode. r=nelsonb 2003-01-23 00:15:08 +00:00
wtc%netscape.com dcfc314ddc Bug 190112: PK11_ReadAttribute needs to call PK11_ExitSlotMonitor before
we return because of allocation failure.
2003-01-22 17:44:36 +00:00
wtc%netscape.com ba247cd419 Bug 189546: updated the comments to reflect what the new code does. 2003-01-22 06:24:53 +00:00
timeless%mozdev.org e87b036988 Bug 179798 cookie confirm dialog no longer works in embedding (doesn't call nsIPrompt service)
patch by mvl@exedo.nl r=dwitte sr=darin
2003-01-22 05:52:33 +00:00
nelsonb%netscape.com e5ea957b6e Add OIDs for AES Key Wrap mechanism. 2003-01-22 04:35:54 +00:00
wtc%netscape.com ddc27a6bbf Bug 189546: moved the switch statement for known key lengths to the
beginning of PK11_GetKeyLength to work around a deadlock in nCipher
module if PK11_ExtractKeyValue is called.
2003-01-22 03:55:21 +00:00
kaie%netscape.com 153d01add8 b=188363 Bad error messages when server uses an invalid cert (-8054)
r=nelsonb sr=blizzard
2003-01-22 03:41:35 +00:00
nelsonb%netscape.com 2770ec645e Implement new AES Key Wrap mechanisms. Bug 167818. 2003-01-22 03:13:04 +00:00
wtc%netscape.com f20a97ef6a Bug 189345: we incorrectly assumed that a C_XxxFinal call to determine the
length of the buffer would also terminate the active operation if the
buffer length is 0.  PKCS#11 says it doesn't, so we need to make the
additional C_XxxFinal call even if the buffer length is 0.  Allocate a
buffer from the heap if the stack buffer is too small and free the
heap-allocated buffer before we return from pk11_Finalize.  We can use the
stack buffer if count is equal to its size.
2003-01-21 19:33:24 +00:00
seawood%netscape.com a4b8644bc9 I always forget to change both the declaration & the definition.
Thanks to bird@anduin.net for the patch.
Fixing OS/2 bustage.
2003-01-19 06:43:19 +00:00
seawood%netscape.com 6e4b727afc Callback functions must be defined as such.
Fixing OS/2 bustage.
2003-01-19 02:43:13 +00:00
kaie%netscape.com 499c2e67f7 b=189205 Implement early shutdown of NSS resources
r=javi sr=darin
2003-01-18 14:03:00 +00:00
relyea%netscape.com 402a4a6710 Bug 198364. Tokens keys do not own their handles. Don't let the key
get destroyed when freed.
2003-01-18 01:49:33 +00:00
nelsonb%netscape.com 48e8c13dcd When wrapping secret keys with an unpadded block cipher, null padd the keys
as necessary, per the PKCS 11 spec.  Also, implement padding and unpadding
for single-part only ciphers.
2003-01-17 05:50:08 +00:00
wtc%netscape.com 12a72288a3 Bug 145029: fixed compiler warnings (mostly "xxx might be used
uninitialized").
2003-01-17 02:49:11 +00:00
nelsonb%netscape.com 3c2c7f33bb One more fix for HPUX and Solaris. 2003-01-16 01:44:43 +00:00
jpierre%netscape.com 8796ef7732 Fix incorrect usage of QuickDER . See bug 160805 comment 16 2003-01-16 00:56:10 +00:00
nelsonb%netscape.com 5c71d8774b Fix compilation error. This file is only compiled on 2 platforms. 2003-01-16 00:55:53 +00:00
nelsonb%netscape.com a234db694e Switch from the old vendor-defined mechanism numbers to the new official
PKCS 11 mechanism numbers.  These numbers will appear in v2.20.
2003-01-16 00:43:58 +00:00
nelsonb%netscape.com fc19041388 Enforce that softoken's mechanisms are used only with the PKCS 11
functions that they're defined to work with.
2003-01-16 00:28:05 +00:00
nelsonb%netscape.com 472aaf52b9 Complete the addition of AES Key Wrap to blapi in freebl. 2003-01-16 00:15:21 +00:00
nelsonb%netscape.com 1a0e61f69a Remove the implementation of CKM_KEY_WRAP_LYNKS from softoken. 2003-01-16 00:14:07 +00:00
nelsonb%netscape.com 8d818d5064 aeskeywrap.c - implement AES Key Wrap algorithm from RFC 3394 2003-01-14 22:16:04 +00:00
glen.beasley%sun.com 3810215899 solaris pkg version 2003-01-14 20:26:36 +00:00
bishakhabanerjee%netscape.com 1403d269af Bug 171263 - NSS test apps to check return value of NSS_Shutdown 2003-01-14 01:03:21 +00:00
bishakhabanerjee%netscape.com 45ba9d6985 Bug 171263 - NSS test apps shd check return value of NSS_Shutdown 2003-01-13 22:36:39 +00:00
glen.beasley%sun.com 0a41355aa2 solaris pkging support 2003-01-13 20:35:36 +00:00
glen.beasley%sun.com b765908949 solaris pkg support 2003-01-13 19:44:21 +00:00
glen.beasley%sun.com 1b2cfef182 Solaris pkg support 2003-01-13 19:43:15 +00:00
relyea%netscape.com 3f15ddacc5 Check for Empty CRL list as well.
Bug 164501.
2003-01-10 19:09:46 +00:00
relyea%netscape.com 0c506b280f Declare PK11_TokenRefresh() 2003-01-10 17:53:01 +00:00
relyea%netscape.com ab1f73ddf5 Add the ability to generate certs with multiple DNS names. 2003-01-09 22:59:42 +00:00
glen.beasley%sun.com 3300c59b7d Solaris pkg copyright 2003-01-09 22:53:13 +00:00
relyea%netscape.com 1544ed637e Remember to include the global: tag 2003-01-09 18:44:26 +00:00
relyea%netscape.com b2f0cd3e28 backport NSS 3.7 fixes to the tip. 2003-01-09 18:15:11 +00:00
wtc%netscape.com 570a9e5387 Bug 186201: should handle a null 'environ' pointer, which can happen on
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com c1b180a77c Bug 187629: do not refresh a CERTCertificate if the same instance of a
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
dbaron%dbaron.org f2cd5e3e66 Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 23:19:20 +00:00
dbaron%dbaron.org 3da694f7ae Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 22:45:23 +00:00
wtc%netscape.com 27fc2706ca Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com 3e2a98c878 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
	base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
	pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
	util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com 388899d82d Need to call SSL_ClearSessionCache before calling NSS_Shutdown. 2003-01-08 21:40:52 +00:00
bishakhabanerjee%netscape.com b09495bd63 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:53:13 +00:00
bishakhabanerjee%netscape.com 53f2c2caf6 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:31:36 +00:00
bishakhabanerjee%netscape.com 36e8d3c8c6 new revision: 1.19; previous revision: 1.18 2003-01-07 22:29:54 +00:00
bishakhabanerjee%netscape.com cfca3d09e1 set and exported NSS_STRICT_SHUTDOWN. Bug 171263 2003-01-07 22:10:10 +00:00
kaie%netscape.com 233f20dbed b=184940 Enable additional SSL ciphers, add configuration UI
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
kaie%netscape.com 3c02966450 b=177260 Fix known leaks in PSM, track blocking PSM UI, track open SSL sockets
r=javi sr=darin
2003-01-06 22:23:49 +00:00
kairo%kairo.at a7555a91fe change all localeVersion strings, as well as brand.dtd/region.dtd to 1.3b; bug 185698, r=tao, sr=blizzard 2003-01-03 19:57:47 +00:00
dbaron%fas.harvard.edu 0a31e6afb5 Change my email address from dbaron@fas.harvard.edu to dbaron@dbaron.org. Comment changes only. 2003-01-01 23:53:20 +00:00
nicolson%netscape.com 5d7f9a2a14 Upgrade version from 3.2 to 3.3.
Uncomment MessageDigest implementations (doh!).
2003-01-01 02:58:22 +00:00
nicolson%netscape.com 6162fa3b3d Add DigestTest to all.pl.
Make DigestTest and SigTest return nonzero error code on failure.
2003-01-01 02:57:50 +00:00
seawood%netscape.com cd1497a3ab Add hack upon dependency hack to Avoid constant NSS rebuilds when pulling from CVS. 2002-12-28 05:50:17 +00:00
seawood%netscape.com 4588fb970a Start installing GRE libraries & components into a separate dist/gre directory as part of the default build.
Bug #186241 r=dougt
2002-12-28 01:15:07 +00:00
wtc%netscape.com b75e4a55f8 Bug 183612: added some comments. 2002-12-24 02:25:36 +00:00
wtc%netscape.com 71527c989a Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
nicolson%netscape.com a46f58f6b3 Fix 186097: ProofOfPossession.encode() has paranoid assertion. 2002-12-19 02:31:38 +00:00
wtc%netscape.com 587dca7fd1 Bug 183612: renamed some new functions to be consistent with existing
function names containing SubjectKey and PublicKey.  Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com 67dbcd1b25 Bug 186058 2002-12-18 23:55:53 +00:00
nicolson%netscape.com 1a0dc15ee3 Partial fix for 184754: assertion violation in get_token_certs_for_cache.
Don't assert if we fail to lookup the cert we just imported. It could
be a bug in the PKCS #11 driver. Instead, throw an exception.
2002-12-18 23:14:48 +00:00