relyea%netscape.com
1ed41d69c9
Fix LINUX breakage (define MAXPATHLEN if it wasn't defined the the standard
...
system headers).
2003-02-04 23:39:15 +00:00
relyea%netscape.com
c5679652a6
Add code to handle symlinks.
...
Add verbose output to print out hashes and signatures.
2003-02-04 23:18:08 +00:00
relyea%netscape.com
b66f562dec
Add program which will mangle exactly 1 bit in a file.
2003-02-04 23:16:56 +00:00
relyea%netscape.com
883af5be6e
Fix windows build breakage.
2003-02-04 19:03:11 +00:00
kaie%netscape.com
a7bcf48918
b=191301 Crash if I cancel "Choose token" dialog on Cert import
...
r=javi sr=darin a=dbaron
2003-02-04 01:37:23 +00:00
relyea%netscape.com
2cf013ba38
Shell script to set up the path before running the signing tool
2003-02-03 21:06:57 +00:00
relyea%netscape.com
cb166d81a7
Generate .chk file at build time when we build shlibsign
2003-02-03 21:06:18 +00:00
relyea%netscape.com
ab6d0dea43
Check bug 188856 into the tip.
...
1)return proper error code in more cases. 2) Fix bug in DH KeyPair Generation.
the essential part of this fix in pkcs11c.c where we add the CKA_NETSCAPE_DB
attribute on Diffie-Hellman key gen. I don't know why the code would have even
thought of working without this (unless we were testing with pregenerated
keys).
The rest of the fix is to surface more of the PKCS #11 error back up. There is
a separate bug to continue tracking the issue of lost PKCS #11 errors.
2003-01-31 23:39:34 +00:00
kaie%netscape.com
8fdd6beaad
b=189974 Profile Switching fails after JavaScript based cert import
...
PSM portion of fix
r=javi sr=darin a=asa
2003-01-31 22:33:49 +00:00
nelsonb%netscape.com
7874d8d788
Fix an uninitialized variable. Bug 191396.
2003-01-31 22:26:56 +00:00
nelsonb%netscape.com
91b818b389
Fix crash in CERT_CheckKeyUsage caused by dereferencing a returned pointer
...
without checkin it for NULL.
2003-01-31 02:49:13 +00:00
nelsonb%netscape.com
04c74fc4ac
Fix bug 191396. Don't generate SEC_ERROR_LIBRARY_FAILURE unnecessarily
...
while doing dsa signatures.
2003-01-31 02:39:36 +00:00
relyea%netscape.com
2d71279799
FIPS library verifier.
2003-01-30 23:38:07 +00:00
relyea%netscape.com
bd68779b0c
FIPS library verifier
2003-01-30 23:36:37 +00:00
wtc%netscape.com
751c48b5e5
Bug 191214: fixed the object leaks in signtool that prevented NSS_Shutdown
...
from succeeding and added the NSS_Shutdown call back. r=jpierre.
Modified Files: certgen.c sign.c signtool.c
2003-01-30 23:11:13 +00:00
wtc%netscape.com
5f51d20223
Bug 177387: temporarily added freebl_GetLibraryFilePathname to libfreebl.a.
...
This function has the same semantics as the NSPR 4.3 function
PR_GetLibraryFilePathname. This patch should be backed out when NSPR 4.3 is
released.
Modified Files: config.mk manifest.mn
Added Files: libpath.c
2003-01-30 07:00:32 +00:00
jpierre%netscape.com
4efd6d4409
Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute. r=wtc
2003-01-30 05:12:10 +00:00
jpierre%netscape.com
e3c369562b
Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute . r=wtc
2003-01-30 03:02:55 +00:00
jpierre%netscape.com
468dc9f9ab
Patch for memory leak . Bug 189976 . r=wtc
2003-01-30 02:59:35 +00:00
wtc%netscape.com
fedddcffe2
Bug 191214: backed out the previous checkin until this bug (object leaks)
...
is fixed.
2003-01-30 01:50:31 +00:00
wtc%netscape.com
4dbc437731
Bug 171263: signtool should call NSS_Shutdown before it exits.
2003-01-30 00:39:37 +00:00
relyea%netscape.com
3788b0eeec
Move LIBJAR definitions around so that NT builds.
2003-01-29 23:37:10 +00:00
kaie%netscape.com
69c368b1a9
b=165301 False mixed content (encrypted page with unencrypted information) Security Warning
...
r=javi sr=darin a=asa
2003-01-29 03:52:01 +00:00
relyea%netscape.com
807a5de681
1) add vfyserv to the standard build.
...
2) add tool to build shared library signature files for FIP's.
Code to verify requires NSPR changes before we can check it in.
2003-01-28 18:53:22 +00:00
relyea%netscape.com
fa9c0d1f91
New header file to dump defines for managing signed FIPs libraries.
2003-01-28 18:50:02 +00:00
relyea%netscape.com
97ee121321
Compile modutil with shared libraries.
2003-01-28 16:44:33 +00:00
relyea%netscape.com
ca368d8e94
Export functions needed for modutil to be compiled dynamically.
2003-01-28 16:41:46 +00:00
relyea%netscape.com
2a6c459c18
Remove dead code and symbols from lib jar so that modutil can compile when
...
linked with it.
2003-01-28 16:39:32 +00:00
relyea%netscape.com
88f5c92825
Sign 3 sets of changes are here:
...
1) Provide accessor functions for the PK11_DefaultArray so that modutil
does not have to link statically to access it.
2) Try setting the attribute on an object before we go to the work of copying
it (Function Only used in Java).
3) Optimize searching for the more common types of attributes.
2003-01-28 16:38:04 +00:00
kaie%netscape.com
6b9785edcd
b=190640 Remove the DHE ciphersuites until they work
...
r=javi sr=bryner a=asa
2003-01-28 15:06:29 +00:00
kaie%netscape.com
64cd67a3d0
b=190394 "website certified by an unknown authority" - nssckbi not found breaks PKI trust
...
r=dougt sr=darin a=asa
2003-01-27 23:53:02 +00:00
wtc%netscape.com
6d046ab3c2
Bug 90010: added support for parisc64. I received this patch from
...
Christopher Blizzard <blizzard@mozilla.org>.
2003-01-27 22:36:06 +00:00
wtc%netscape.com
d4ac75f3a6
Bug 190396.
...
Don't fail the search if the token returned an error that indicates that it
legitimately couldn't find a CRL
2003-01-24 06:37:03 +00:00
relyea%netscape.com
04df2266d3
Bug 167756. Clean up previous patch: add lastState field, and set the SSL Error on failure.
2003-01-23 22:02:37 +00:00
relyea%netscape.com
797a5bc51c
Write changes back to the database when we correct incorrect user bit settings.
2003-01-23 19:38:53 +00:00
relyea%netscape.com
48191e6dde
Set the size value when extracting a key 19011.
2003-01-23 17:30:15 +00:00
relyea%netscape.com
c5e06bef79
Check for token removal before continuing SSL sessions which have client auth
...
with certs associated with that token. bug 167756.
2003-01-23 17:27:34 +00:00
relyea%netscape.com
a54ce85446
Fix bug 180824 Version 3.4 string hard coded in default token name.
2003-01-23 17:16:50 +00:00
wtc%netscape.com
722dc7dcf5
Bug 90010: added support for Linux for s390 and s390x. The patch is
...
contributed by Gerhard Tonn <GerhardTonn@swol.de>.
2003-01-23 17:16:32 +00:00
ian.mcgreer%sun.com
c05c7c3f1e
always use explicit serial numbers on generated certs, should fix QA failures on leia
2003-01-23 15:38:03 +00:00
jpierre%netscape.com
d68a388386
Fix for bug #126930 - make SSL_ConfigServreSessionIDCache work on OS/2 by not using shared memory in single process mode. r=nelsonb
2003-01-23 00:15:08 +00:00
wtc%netscape.com
dcfc314ddc
Bug 190112: PK11_ReadAttribute needs to call PK11_ExitSlotMonitor before
...
we return because of allocation failure.
2003-01-22 17:44:36 +00:00
wtc%netscape.com
ba247cd419
Bug 189546: updated the comments to reflect what the new code does.
2003-01-22 06:24:53 +00:00
timeless%mozdev.org
e87b036988
Bug 179798 cookie confirm dialog no longer works in embedding (doesn't call nsIPrompt service)
...
patch by mvl@exedo.nl r=dwitte sr=darin
2003-01-22 05:52:33 +00:00
nelsonb%netscape.com
e5ea957b6e
Add OIDs for AES Key Wrap mechanism.
2003-01-22 04:35:54 +00:00
wtc%netscape.com
ddc27a6bbf
Bug 189546: moved the switch statement for known key lengths to the
...
beginning of PK11_GetKeyLength to work around a deadlock in nCipher
module if PK11_ExtractKeyValue is called.
2003-01-22 03:55:21 +00:00
kaie%netscape.com
153d01add8
b=188363 Bad error messages when server uses an invalid cert (-8054)
...
r=nelsonb sr=blizzard
2003-01-22 03:41:35 +00:00
nelsonb%netscape.com
2770ec645e
Implement new AES Key Wrap mechanisms. Bug 167818.
2003-01-22 03:13:04 +00:00
wtc%netscape.com
f20a97ef6a
Bug 189345: we incorrectly assumed that a C_XxxFinal call to determine the
...
length of the buffer would also terminate the active operation if the
buffer length is 0. PKCS#11 says it doesn't, so we need to make the
additional C_XxxFinal call even if the buffer length is 0. Allocate a
buffer from the heap if the stack buffer is too small and free the
heap-allocated buffer before we return from pk11_Finalize. We can use the
stack buffer if count is equal to its size.
2003-01-21 19:33:24 +00:00
seawood%netscape.com
a4b8644bc9
I always forget to change both the declaration & the definition.
...
Thanks to bird@anduin.net for the patch.
Fixing OS/2 bustage.
2003-01-19 06:43:19 +00:00
seawood%netscape.com
6e4b727afc
Callback functions must be defined as such.
...
Fixing OS/2 bustage.
2003-01-19 02:43:13 +00:00
kaie%netscape.com
499c2e67f7
b=189205 Implement early shutdown of NSS resources
...
r=javi sr=darin
2003-01-18 14:03:00 +00:00
relyea%netscape.com
402a4a6710
Bug 198364. Tokens keys do not own their handles. Don't let the key
...
get destroyed when freed.
2003-01-18 01:49:33 +00:00
nelsonb%netscape.com
48e8c13dcd
When wrapping secret keys with an unpadded block cipher, null padd the keys
...
as necessary, per the PKCS 11 spec. Also, implement padding and unpadding
for single-part only ciphers.
2003-01-17 05:50:08 +00:00
wtc%netscape.com
12a72288a3
Bug 145029: fixed compiler warnings (mostly "xxx might be used
...
uninitialized").
2003-01-17 02:49:11 +00:00
nelsonb%netscape.com
3c2c7f33bb
One more fix for HPUX and Solaris.
2003-01-16 01:44:43 +00:00
jpierre%netscape.com
8796ef7732
Fix incorrect usage of QuickDER . See bug 160805 comment 16
2003-01-16 00:56:10 +00:00
nelsonb%netscape.com
5c71d8774b
Fix compilation error. This file is only compiled on 2 platforms.
2003-01-16 00:55:53 +00:00
nelsonb%netscape.com
a234db694e
Switch from the old vendor-defined mechanism numbers to the new official
...
PKCS 11 mechanism numbers. These numbers will appear in v2.20.
2003-01-16 00:43:58 +00:00
nelsonb%netscape.com
fc19041388
Enforce that softoken's mechanisms are used only with the PKCS 11
...
functions that they're defined to work with.
2003-01-16 00:28:05 +00:00
nelsonb%netscape.com
472aaf52b9
Complete the addition of AES Key Wrap to blapi in freebl.
2003-01-16 00:15:21 +00:00
nelsonb%netscape.com
1a0e61f69a
Remove the implementation of CKM_KEY_WRAP_LYNKS from softoken.
2003-01-16 00:14:07 +00:00
nelsonb%netscape.com
8d818d5064
aeskeywrap.c - implement AES Key Wrap algorithm from RFC 3394
2003-01-14 22:16:04 +00:00
glen.beasley%sun.com
3810215899
solaris pkg version
2003-01-14 20:26:36 +00:00
bishakhabanerjee%netscape.com
1403d269af
Bug 171263 - NSS test apps to check return value of NSS_Shutdown
2003-01-14 01:03:21 +00:00
bishakhabanerjee%netscape.com
45ba9d6985
Bug 171263 - NSS test apps shd check return value of NSS_Shutdown
2003-01-13 22:36:39 +00:00
glen.beasley%sun.com
0a41355aa2
solaris pkging support
2003-01-13 20:35:36 +00:00
glen.beasley%sun.com
b765908949
solaris pkg support
2003-01-13 19:44:21 +00:00
glen.beasley%sun.com
1b2cfef182
Solaris pkg support
2003-01-13 19:43:15 +00:00
relyea%netscape.com
3f15ddacc5
Check for Empty CRL list as well.
...
Bug 164501.
2003-01-10 19:09:46 +00:00
relyea%netscape.com
0c506b280f
Declare PK11_TokenRefresh()
2003-01-10 17:53:01 +00:00
relyea%netscape.com
ab1f73ddf5
Add the ability to generate certs with multiple DNS names.
2003-01-09 22:59:42 +00:00
glen.beasley%sun.com
3300c59b7d
Solaris pkg copyright
2003-01-09 22:53:13 +00:00
relyea%netscape.com
1544ed637e
Remember to include the global: tag
2003-01-09 18:44:26 +00:00
relyea%netscape.com
b2f0cd3e28
backport NSS 3.7 fixes to the tip.
2003-01-09 18:15:11 +00:00
wtc%netscape.com
570a9e5387
Bug 186201: should handle a null 'environ' pointer, which can happen on
...
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com
c1b180a77c
Bug 187629: do not refresh a CERTCertificate if the same instance of a
...
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
dbaron%dbaron.org
f2cd5e3e66
Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag
2003-01-08 23:19:20 +00:00
dbaron%dbaron.org
3da694f7ae
Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag
2003-01-08 22:45:23 +00:00
wtc%netscape.com
27fc2706ca
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com
3e2a98c878
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com
388899d82d
Need to call SSL_ClearSessionCache before calling NSS_Shutdown.
2003-01-08 21:40:52 +00:00
bishakhabanerjee%netscape.com
b09495bd63
checking return value of NSS_Shutdown. Bug 171263
2003-01-07 22:53:13 +00:00
bishakhabanerjee%netscape.com
53f2c2caf6
checking return value of NSS_Shutdown. Bug 171263
2003-01-07 22:31:36 +00:00
bishakhabanerjee%netscape.com
36e8d3c8c6
new revision: 1.19; previous revision: 1.18
2003-01-07 22:29:54 +00:00
bishakhabanerjee%netscape.com
cfca3d09e1
set and exported NSS_STRICT_SHUTDOWN. Bug 171263
2003-01-07 22:10:10 +00:00
kaie%netscape.com
233f20dbed
b=184940 Enable additional SSL ciphers, add configuration UI
...
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
kaie%netscape.com
3c02966450
b=177260 Fix known leaks in PSM, track blocking PSM UI, track open SSL sockets
...
r=javi sr=darin
2003-01-06 22:23:49 +00:00
kairo%kairo.at
a7555a91fe
change all localeVersion strings, as well as brand.dtd/region.dtd to 1.3b; bug 185698, r=tao, sr=blizzard
2003-01-03 19:57:47 +00:00
dbaron%fas.harvard.edu
0a31e6afb5
Change my email address from dbaron@fas.harvard.edu to dbaron@dbaron.org. Comment changes only.
2003-01-01 23:53:20 +00:00
nicolson%netscape.com
5d7f9a2a14
Upgrade version from 3.2 to 3.3.
...
Uncomment MessageDigest implementations (doh!).
2003-01-01 02:58:22 +00:00
nicolson%netscape.com
6162fa3b3d
Add DigestTest to all.pl.
...
Make DigestTest and SigTest return nonzero error code on failure.
2003-01-01 02:57:50 +00:00
seawood%netscape.com
cd1497a3ab
Add hack upon dependency hack to Avoid constant NSS rebuilds when pulling from CVS.
2002-12-28 05:50:17 +00:00
seawood%netscape.com
4588fb970a
Start installing GRE libraries & components into a separate dist/gre directory as part of the default build.
...
Bug #186241 r=dougt
2002-12-28 01:15:07 +00:00
wtc%netscape.com
b75e4a55f8
Bug 183612: added some comments.
2002-12-24 02:25:36 +00:00
wtc%netscape.com
71527c989a
Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
...
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
nicolson%netscape.com
a46f58f6b3
Fix 186097: ProofOfPossession.encode() has paranoid assertion.
2002-12-19 02:31:38 +00:00
wtc%netscape.com
587dca7fd1
Bug 183612: renamed some new functions to be consistent with existing
...
function names containing SubjectKey and PublicKey. Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com
67dbcd1b25
Bug 186058
2002-12-18 23:55:53 +00:00
nicolson%netscape.com
1a0dc15ee3
Partial fix for 184754: assertion violation in get_token_certs_for_cache.
...
Don't assert if we fail to lookup the cert we just imported. It could
be a bug in the PKCS #11 driver. Instead, throw an exception.
2002-12-18 23:14:48 +00:00