Граф коммитов

3980 Коммитов

Автор SHA1 Сообщение Дата
wtc%netscape.com 570a9e5387 Bug 186201: should handle a null 'environ' pointer, which can happen on
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com c1b180a77c Bug 187629: do not refresh a CERTCertificate if the same instance of a
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
dbaron%dbaron.org f2cd5e3e66 Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 23:19:20 +00:00
dbaron%dbaron.org 3da694f7ae Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 22:45:23 +00:00
wtc%netscape.com 27fc2706ca Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com 3e2a98c878 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
	base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
	pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
	util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com 388899d82d Need to call SSL_ClearSessionCache before calling NSS_Shutdown. 2003-01-08 21:40:52 +00:00
bishakhabanerjee%netscape.com b09495bd63 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:53:13 +00:00
bishakhabanerjee%netscape.com 53f2c2caf6 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:31:36 +00:00
bishakhabanerjee%netscape.com 36e8d3c8c6 new revision: 1.19; previous revision: 1.18 2003-01-07 22:29:54 +00:00
bishakhabanerjee%netscape.com cfca3d09e1 set and exported NSS_STRICT_SHUTDOWN. Bug 171263 2003-01-07 22:10:10 +00:00
kaie%netscape.com 233f20dbed b=184940 Enable additional SSL ciphers, add configuration UI
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
kaie%netscape.com 3c02966450 b=177260 Fix known leaks in PSM, track blocking PSM UI, track open SSL sockets
r=javi sr=darin
2003-01-06 22:23:49 +00:00
kairo%kairo.at a7555a91fe change all localeVersion strings, as well as brand.dtd/region.dtd to 1.3b; bug 185698, r=tao, sr=blizzard 2003-01-03 19:57:47 +00:00
dbaron%fas.harvard.edu 0a31e6afb5 Change my email address from dbaron@fas.harvard.edu to dbaron@dbaron.org. Comment changes only. 2003-01-01 23:53:20 +00:00
nicolson%netscape.com 5d7f9a2a14 Upgrade version from 3.2 to 3.3.
Uncomment MessageDigest implementations (doh!).
2003-01-01 02:58:22 +00:00
nicolson%netscape.com 6162fa3b3d Add DigestTest to all.pl.
Make DigestTest and SigTest return nonzero error code on failure.
2003-01-01 02:57:50 +00:00
seawood%netscape.com cd1497a3ab Add hack upon dependency hack to Avoid constant NSS rebuilds when pulling from CVS. 2002-12-28 05:50:17 +00:00
seawood%netscape.com 4588fb970a Start installing GRE libraries & components into a separate dist/gre directory as part of the default build.
Bug #186241 r=dougt
2002-12-28 01:15:07 +00:00
wtc%netscape.com b75e4a55f8 Bug 183612: added some comments. 2002-12-24 02:25:36 +00:00
wtc%netscape.com 71527c989a Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
nicolson%netscape.com a46f58f6b3 Fix 186097: ProofOfPossession.encode() has paranoid assertion. 2002-12-19 02:31:38 +00:00
wtc%netscape.com 587dca7fd1 Bug 183612: renamed some new functions to be consistent with existing
function names containing SubjectKey and PublicKey.  Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com 67dbcd1b25 Bug 186058 2002-12-18 23:55:53 +00:00
nicolson%netscape.com 1a0dc15ee3 Partial fix for 184754: assertion violation in get_token_certs_for_cache.
Don't assert if we fail to lookup the cert we just imported. It could
be a bug in the PKCS #11 driver. Instead, throw an exception.
2002-12-18 23:14:48 +00:00
kaie%netscape.com 0b56a2ae45 Temporary fix for bug 182803.
While this masks the reported crashes, this is nothing more than a workaround patch.
As long as this patch is in place, any attempt to do profile switching at run time will fail.
We need real fixes for bug 181230 and 177260.
r=javi sr=darin
2002-12-18 12:50:35 +00:00
wtc%netscape.com 24e76ce1c2 Bug 183612: fixed the bug that 'extra' may be used uninitialized. r=javi. 2002-12-18 02:06:01 +00:00
wtc%netscape.com c37a82ab51 Set NSS version to 3.8 Beta on the trunk. 2002-12-17 23:04:46 +00:00
wtc%netscape.com 42182a9d9e Export CERT_DestroyOCSPResponse in 3.7. Moved HASH_GetHashObjectByOidTag,
HASH_GetHashTypeByOidTag, and SECITEM_ItemsAreEqual from 3.7 to 3.8.
2002-12-17 23:02:53 +00:00
relyea%netscape.com 8ab634d5b8 Make sure the session is protected over PKCS #11 calls. 2002-12-17 18:22:38 +00:00
wtc%netscape.com 59393fce3e Need to test for null pointers before destroying the lock and condition
variable.  If NSS initialization fails, this lock and condition variable
may not get created.
2002-12-17 02:47:46 +00:00
wtc%netscape.com cc65e89c5e I made a mistake in the previous checkin. certdb.h doesn't need to be
included because the new function CERT_FindCertBySubjKeyID is declared in
cert.h.
2002-12-17 02:08:51 +00:00
wtc%netscape.com 0d2d65efb2 Bug 183612: added support for looking up a cert by subject key ID and
creating a CMS recipient info from a subject key ID.  The patch was
contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc.
Modified Files:
	certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c
	certdb/stanpcertdb.c nss/nss.def nss/nssinit.c
	pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h
	pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c
	smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h
	smime/smime.def
2002-12-17 01:39:46 +00:00
dougt%netscape.com 9ed66e1abc Allow caller to obtain cert. r=mstoltz, javi. sr=dveditz, b=179016 2002-12-13 22:26:43 +00:00
kaie%netscape.com 6fc801b267 b=182258 Give separate signature validity and sender address mismatch feedback
r=javi sr=bienvenu
2002-12-13 20:47:32 +00:00
relyea%netscape.com cd008946a6 Increment the tmpbuf pointer to the correct index point 2002-12-13 19:02:13 +00:00
nicolson%netscape.com f3f2064030 Fix 180827: Update version strings for JSS 3.3. 2002-12-13 06:12:30 +00:00
wtc%netscape.com 31af94e751 Bug 185074: open the files we just did a "chmod -w" on once to work around
a Mac OS X NFS bug. Subsequent opens will see the file is readonly with no
delay.
2002-12-13 02:06:34 +00:00
nelsonb%netscape.com 1942331c4e Clean up command line options parsing and Usage message. 2002-12-13 01:25:45 +00:00
relyea%netscape.com f37146e332 Use correct sense of the timeout value. 2002-12-13 00:25:21 +00:00
nelsonb%netscape.com d442ab6107 Support SHA256, SHA384, and SHA512 hashes in NSS. 2002-12-12 06:05:45 +00:00
relyea%netscape.com b96f690161 Don't break solaris or linux (add the ';') 2002-12-11 17:56:49 +00:00
relyea%netscape.com 3fbd2fdc4d Export new command to pull for token change events. 2002-12-11 17:53:20 +00:00
relyea%netscape.com 0a024139f7 Program to test smartcard removal and insertion detection. 2002-12-11 17:44:53 +00:00
relyea%netscape.com 2c6c4ceeae Add token removal blocking function. 2002-12-11 17:43:24 +00:00
thayes%netscape.com b815bf47be Bug 184557: Allow usage specified on command line (-u) to be used to validate
certificates used for signing (-S option).  Also add special handling for
nickname "NONE" in the -Y option.  This specifies that no certificate and
encryption key preference should be included in the signature object.
2002-12-11 01:44:37 +00:00
wtc%netscape.com 177487f4d0 Bug 180294: moved the OpenVMS build from the POSIX subsystem to native
VMS (GNV).  The patch is contributed by Colin Blakes <colin@theblakes.com>.
Modified files: OpenVMS.mk config.mk rules.mk nsinstall/nsinstall.c
2002-12-10 20:27:45 +00:00
relyea%netscape.com 7f3a67f9d9 Sigh, this is what was breaking the Linux builds... incorrect initializer. 2002-12-10 18:09:16 +00:00
relyea%netscape.com 52f2bf446b Make SubjectAltEncode a public function. Fixes build breakage in Linux 2002-12-10 17:41:16 +00:00
relyea%netscape.com cc608e2484 Add test cases for multiple email addresses in a single certificate. 2002-12-10 17:19:00 +00:00