Kai Engert
ba79675783
Bug 487712, Pick up NSS_HEAD_20090409 to fix WINCE
...
Got r=nelson and r=rrelyea in today's NSS conference call.
CLOSED TREE
2009-04-10 02:00:56 +02:00
Kai Engert
f8a04239b0
Bug 461082, Deliver NSS 3.12.2 and NSPR 4.7.2 to Mozilla
...
r=wtc
2008-10-23 02:38:29 +02:00
Kai Engert
7ad8828630
Bug 450646, Upgrade Mozilla to NSS 3.12.1 release candidate 1
...
r=rrelyea
2008-08-15 06:12:54 +02:00
Benjamin Smedberg
2f67dc2ab9
Import NSS_3_12_RC4
2008-06-06 08:40:11 -04:00
roc+@cs.cmu.edu
0054412272
Bug 374866. Reftests for text-transform. r=dbaron
2007-03-22 16:01:14 -07:00
wtc%google.com
be8510e449
Bug 431805: initialize error_stack_index to an invalid TPD index instead of
...
0, which is a valid TPD index. Improved comments. r=nelson.
Modified Files:
base/error.c nss/nssinit.c
2008-05-17 03:44:41 +00:00
wtc%google.com
c212d6ec7a
Bug 431929: Release the lock before returning. Acquire the lock after
...
null checks. r=nelson.
2008-05-13 01:22:35 +00:00
wtc%google.com
52654fad56
Bug 431805: fixed the leak of the primordial thread's error stack. The
...
patch is contributed by Boying Lu <brian.lu@sun.com>. r=wtc.
Modified files: base/base.h base/error.c nss/nssinit.c
2008-05-10 01:03:18 +00:00
nelson%bolyard.com
1e6ff45cf0
Fix build bustage in optimized builds.
2008-02-23 06:18:27 +00:00
nelson%bolyard.com
6bcb45bdde
Bug 370536: Memory leaks in pointer tracker code in DEBUG builds. r=rrelyea
2008-02-23 05:29:39 +00:00
wtc%google.com
e53dc87810
Bug 415264: Use the equivalent PR_ROTATE_LEFT32 calls. r=nelson
...
Modified files: lib/base/hash.c lib/pki/pkistore.c
2008-02-03 01:59:49 +00:00
nelson%bolyard.com
2efb83f575
[Bug 331043] Improve hash performance using _rotr intrinsic, r=brendan,nelson
2008-01-27 00:43:57 +00:00
christophe.ravel.bugs%sun.com
5ba34627e5
Bug 389781 NSS should be built size-optimized on Linux, Windows, and Mac
...
r=julien.pierre.boogz
2007-08-15 15:30:08 +00:00
rrelyea%redhat.com
4bb6912318
Bug 391291 Implement Shared Database Integrity checks.
...
r=nelson (plus review from kengert)
2007-08-09 22:36:20 +00:00
alexei.volkov.bugs%sun.com
075cd7e56c
354403:: nssList_CreateIterator returns pointer to a freed memory if the function fails to allocate a lock. r=nelson
2006-09-29 20:13:30 +00:00
alexei.volkov.bugs%sun.com
153dd9531a
341115: Multiple NULL ptr dereferences in nss/lib/base/arena.c. r=nelson
2006-07-17 21:51:32 +00:00
wtchang%redhat.com
45db1b5756
Bugzilla Bug 317052: removed the obsolete file lib/base/whatnspr.c from
...
CVS. r=relyea.
Modified Files:
base.h error.c manifest.mn
Removed Files:
whatnspr.c
2005-12-19 17:53:28 +00:00
wtchang%redhat.com
1f412b9dda
Bugzilla Bug 267158: removed the $Name$ RCS keyword from our source files.
...
This keyword adds noise to the output of "ident libnss3.so | grep NSS"
on our debug build, and appears to cause spurious CVS conflicts. r=nelsonb.
2005-01-20 02:25:51 +00:00
gerv%gerv.net
2cdff0bb4f
Bug 236613: change to MPL/LGPL/GPL tri-license.
2004-04-25 15:03:26 +00:00
wchang0222%aol.com
92d497302e
Bugzilla bug 229293: fixed compiler warning "unary minus operator applied
...
to unsigned type". r=relyea,jpierre.
2004-02-11 19:37:18 +00:00
nelsonb%netscape.com
684a62349d
Bound stan error stack at 16 error codes to limit growth.
...
Bugscape bug 54021. r=wtc.
2003-12-02 02:05:47 +00:00
wtc%netscape.com
3e2a98c878
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
util/secerr.h
2003-01-08 21:48:47 +00:00
ian.mcgreer%sun.com
dc9b4b2415
bug 172247, don't allow import of duplicate issuer/serial certs
2002-11-21 20:43:15 +00:00
relyea%netscape.com
e106f58801
Bug 164501. Return a proper error code from PK11_FindCrlByName() so the CRL
...
code can decide if there is a hw or system failure preventing the reading of a
CRL or if the CRL is just not there.
2002-10-10 20:30:19 +00:00
jpierre%netscape.com
7387d1c618
Fix compiler warnings
2002-09-07 01:24:27 +00:00
nicolson%netscape.com
76c9ac877e
Fix 164126: makefile build error.
...
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
ian.mcgreer%sun.com
7fe4b2d767
avoid use of iterator
2002-04-22 20:44:07 +00:00
ian.mcgreer%sun.com
f15a36dade
define nss_ZREALLOCARRAY, fix bugs in nss_ZRealloc
2002-04-04 16:14:26 +00:00
wtc%netscape.com
6f489cbb5e
Fixed a memory leak on memory allocation error. r=mcgreer. (bug 129709)
2002-03-15 22:09:45 +00:00
wtc%netscape.com
b0d2ee6180
Bugzilla bug 131078: fixed compiler warnings. r=mcgreer.
2002-03-15 06:07:41 +00:00
relyea%netscape.com
a53fdba92d
When we free the clists, clear out our head pointer (don't keep pointing to
...
freed memory);
2002-03-01 02:13:42 +00:00
ian.mcgreer%sun.com
2d9cc8cc7a
misdeclared function signature
2002-02-28 01:32:32 +00:00
ian.mcgreer%sun.com
4d009626c2
fix aix bustage
2002-02-27 23:17:12 +00:00
relyea%netscape.com
afc3897ce2
Bug 120651: Memory leaks in PK11_GetCertList.
...
1) Fix leaks in error paths (bfind.c -- found by inspection).
2) Don't allocate hash table data out of the arena. PL_Hash grows and shrinks
the hash buckets as necessary. In arenas they will just grow.
3) Don't allocate temparary locks out of the global instance arena pool.
2002-02-13 02:26:47 +00:00
relyea%netscape.com
a5f6f6c5b3
Fix memory leak in hash table keys. Hash tables stay around forever.
...
keys go into and out of the table. the old code allocated the keys from
the hash table's arena, so they would grow without bounds. Now the keys
are allocated from the heap, and get freed when they are expunged from the
table.
2002-02-06 02:42:08 +00:00
ian.mcgreer%sun.com
e62a65dd6c
some of the output in bug 123081 shows potential leaks around iterators, since the iterator is explicitly freed allocate it in its own block to avoid this
2002-02-05 22:08:12 +00:00
ian.mcgreer%sun.com
18d1d08e68
cleanup suggested by review by Nelson
2002-02-05 03:53:50 +00:00
relyea%netscape.com
9694fb3322
Fix thread local storage leak.
2002-01-31 19:18:55 +00:00
ian.mcgreer%sun.com
3b7ccbb61c
fix core when token list is emptied (caused by switch to fips mode)
2002-01-23 17:39:29 +00:00
ian.mcgreer%sun.com
f161d6d8f4
memory leak fixes
2002-01-08 15:37:42 +00:00
ian.mcgreer%sun.com
276a29db57
detect hash collisions so that the caller can handle it
2001-12-12 20:23:07 +00:00
ian.mcgreer%sun.com
b53f50dc35
original intent for concurrent list iteration, fixes bug 114727. a better long-term solution is needing for traversing the high-level token lists.
2001-12-12 00:07:25 +00:00
ian.mcgreer%sun.com
7619d8f5ee
check in error const
2001-12-10 19:14:32 +00:00
jpierre%netscape.com
151d643065
Patch for 107323 - fix compiler warnings
2001-12-06 21:25:32 +00:00
ian.mcgreer%sun.com
87e2811f81
fix memory leaks
2001-11-29 19:34:08 +00:00
ian.mcgreer%sun.com
c3cb1b39dc
land changes for handling temporary and cached certs in 3.4
...
* separate trust object from cert object
* move handling of cryptoki objects into libdev
* implement digest in libdev (for trust object indexing)
* fixes in cache implementation; connect cache to 3.4 certs
* implement CERT_NewTempCertificate via crypto context
2001-11-28 16:23:51 +00:00
ian.mcgreer%sun.com
988042619c
fix unneeded lock release in list iteration
2001-11-16 19:36:43 +00:00
relyea%netscape.com
e03f762c52
Land BOB_WORK_BRANCH unto the tip.
...
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
ian.mcgreer%sun.com
c9abd4b045
add ability to notify user that chain is incomplete
2001-10-17 15:48:09 +00:00
ian.mcgreer%sun.com
b4f4d660f8
fix iteration for empty list
2001-10-17 14:37:48 +00:00