Граф коммитов

69 Коммитов

Автор SHA1 Сообщение Дата
Kai Engert ba79675783 Bug 487712, Pick up NSS_HEAD_20090409 to fix WINCE
Got r=nelson and r=rrelyea in today's NSS conference call.
CLOSED TREE
2009-04-10 02:00:56 +02:00
Kai Engert f8a04239b0 Bug 461082, Deliver NSS 3.12.2 and NSPR 4.7.2 to Mozilla
r=wtc
2008-10-23 02:38:29 +02:00
Kai Engert 7ad8828630 Bug 450646, Upgrade Mozilla to NSS 3.12.1 release candidate 1
r=rrelyea
2008-08-15 06:12:54 +02:00
Benjamin Smedberg 2f67dc2ab9 Import NSS_3_12_RC4 2008-06-06 08:40:11 -04:00
roc+@cs.cmu.edu 0054412272 Bug 374866. Reftests for text-transform. r=dbaron 2007-03-22 16:01:14 -07:00
wtc%google.com be8510e449 Bug 431805: initialize error_stack_index to an invalid TPD index instead of
0, which is a valid TPD index.  Improved comments.  r=nelson.
Modified Files:
	base/error.c nss/nssinit.c
2008-05-17 03:44:41 +00:00
wtc%google.com c212d6ec7a Bug 431929: Release the lock before returning. Acquire the lock after
null checks.  r=nelson.
2008-05-13 01:22:35 +00:00
wtc%google.com 52654fad56 Bug 431805: fixed the leak of the primordial thread's error stack. The
patch is contributed by Boying Lu <brian.lu@sun.com>.  r=wtc.
Modified files: base/base.h base/error.c nss/nssinit.c
2008-05-10 01:03:18 +00:00
nelson%bolyard.com 1e6ff45cf0 Fix build bustage in optimized builds. 2008-02-23 06:18:27 +00:00
nelson%bolyard.com 6bcb45bdde Bug 370536: Memory leaks in pointer tracker code in DEBUG builds. r=rrelyea 2008-02-23 05:29:39 +00:00
wtc%google.com e53dc87810 Bug 415264: Use the equivalent PR_ROTATE_LEFT32 calls. r=nelson
Modified files: lib/base/hash.c lib/pki/pkistore.c
2008-02-03 01:59:49 +00:00
nelson%bolyard.com 2efb83f575 [Bug 331043] Improve hash performance using _rotr intrinsic, r=brendan,nelson 2008-01-27 00:43:57 +00:00
christophe.ravel.bugs%sun.com 5ba34627e5 Bug 389781 NSS should be built size-optimized on Linux, Windows, and Mac
r=julien.pierre.boogz
2007-08-15 15:30:08 +00:00
rrelyea%redhat.com 4bb6912318 Bug 391291 Implement Shared Database Integrity checks.
r=nelson (plus review from kengert)
2007-08-09 22:36:20 +00:00
alexei.volkov.bugs%sun.com 075cd7e56c 354403:: nssList_CreateIterator returns pointer to a freed memory if the function fails to allocate a lock. r=nelson 2006-09-29 20:13:30 +00:00
alexei.volkov.bugs%sun.com 153dd9531a 341115: Multiple NULL ptr dereferences in nss/lib/base/arena.c. r=nelson 2006-07-17 21:51:32 +00:00
wtchang%redhat.com 45db1b5756 Bugzilla Bug 317052: removed the obsolete file lib/base/whatnspr.c from
CVS.  r=relyea.
Modified Files:
	base.h error.c manifest.mn
Removed Files:
	whatnspr.c
2005-12-19 17:53:28 +00:00
wtchang%redhat.com 1f412b9dda Bugzilla Bug 267158: removed the $Name$ RCS keyword from our source files.
This keyword adds noise to the output of "ident libnss3.so | grep NSS"
on our debug build, and appears to cause spurious CVS conflicts. r=nelsonb.
2005-01-20 02:25:51 +00:00
gerv%gerv.net 2cdff0bb4f Bug 236613: change to MPL/LGPL/GPL tri-license. 2004-04-25 15:03:26 +00:00
wchang0222%aol.com 92d497302e Bugzilla bug 229293: fixed compiler warning "unary minus operator applied
to unsigned type". r=relyea,jpierre.
2004-02-11 19:37:18 +00:00
nelsonb%netscape.com 684a62349d Bound stan error stack at 16 error codes to limit growth.
Bugscape bug 54021. r=wtc.
2003-12-02 02:05:47 +00:00
wtc%netscape.com 3e2a98c878 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
	base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
	pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
	util/secerr.h
2003-01-08 21:48:47 +00:00
ian.mcgreer%sun.com dc9b4b2415 bug 172247, don't allow import of duplicate issuer/serial certs 2002-11-21 20:43:15 +00:00
relyea%netscape.com e106f58801 Bug 164501. Return a proper error code from PK11_FindCrlByName() so the CRL
code can decide if there is a hw or system failure preventing the reading of a
CRL or if the CRL is just not there.
2002-10-10 20:30:19 +00:00
jpierre%netscape.com 7387d1c618 Fix compiler warnings 2002-09-07 01:24:27 +00:00
nicolson%netscape.com 76c9ac877e Fix 164126: makefile build error.
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
ian.mcgreer%sun.com 7fe4b2d767 avoid use of iterator 2002-04-22 20:44:07 +00:00
ian.mcgreer%sun.com f15a36dade define nss_ZREALLOCARRAY, fix bugs in nss_ZRealloc 2002-04-04 16:14:26 +00:00
wtc%netscape.com 6f489cbb5e Fixed a memory leak on memory allocation error. r=mcgreer. (bug 129709) 2002-03-15 22:09:45 +00:00
wtc%netscape.com b0d2ee6180 Bugzilla bug 131078: fixed compiler warnings. r=mcgreer. 2002-03-15 06:07:41 +00:00
relyea%netscape.com a53fdba92d When we free the clists, clear out our head pointer (don't keep pointing to
freed memory);
2002-03-01 02:13:42 +00:00
ian.mcgreer%sun.com 2d9cc8cc7a misdeclared function signature 2002-02-28 01:32:32 +00:00
ian.mcgreer%sun.com 4d009626c2 fix aix bustage 2002-02-27 23:17:12 +00:00
relyea%netscape.com afc3897ce2 Bug 120651: Memory leaks in PK11_GetCertList.
1) Fix leaks in error paths (bfind.c -- found by inspection).
2) Don't allocate hash table data out of the arena. PL_Hash grows and shrinks
the hash buckets as necessary. In arenas they will just grow.
3) Don't allocate temparary locks out of the global instance arena pool.
2002-02-13 02:26:47 +00:00
relyea%netscape.com a5f6f6c5b3 Fix memory leak in hash table keys. Hash tables stay around forever.
keys go into and out of the table. the old code allocated the keys from
the hash table's arena, so they would grow without bounds. Now the keys
are allocated from the heap, and get freed when they are expunged from the
table.
2002-02-06 02:42:08 +00:00
ian.mcgreer%sun.com e62a65dd6c some of the output in bug 123081 shows potential leaks around iterators, since the iterator is explicitly freed allocate it in its own block to avoid this 2002-02-05 22:08:12 +00:00
ian.mcgreer%sun.com 18d1d08e68 cleanup suggested by review by Nelson 2002-02-05 03:53:50 +00:00
relyea%netscape.com 9694fb3322 Fix thread local storage leak. 2002-01-31 19:18:55 +00:00
ian.mcgreer%sun.com 3b7ccbb61c fix core when token list is emptied (caused by switch to fips mode) 2002-01-23 17:39:29 +00:00
ian.mcgreer%sun.com f161d6d8f4 memory leak fixes 2002-01-08 15:37:42 +00:00
ian.mcgreer%sun.com 276a29db57 detect hash collisions so that the caller can handle it 2001-12-12 20:23:07 +00:00
ian.mcgreer%sun.com b53f50dc35 original intent for concurrent list iteration, fixes bug 114727. a better long-term solution is needing for traversing the high-level token lists. 2001-12-12 00:07:25 +00:00
ian.mcgreer%sun.com 7619d8f5ee check in error const 2001-12-10 19:14:32 +00:00
jpierre%netscape.com 151d643065 Patch for 107323 - fix compiler warnings 2001-12-06 21:25:32 +00:00
ian.mcgreer%sun.com 87e2811f81 fix memory leaks 2001-11-29 19:34:08 +00:00
ian.mcgreer%sun.com c3cb1b39dc land changes for handling temporary and cached certs in 3.4
* separate trust object from cert object
* move handling of cryptoki objects into libdev
* implement digest in libdev (for trust object indexing)
* fixes in cache implementation; connect cache to 3.4 certs
* implement CERT_NewTempCertificate via crypto context
2001-11-28 16:23:51 +00:00
ian.mcgreer%sun.com 988042619c fix unneeded lock release in list iteration 2001-11-16 19:36:43 +00:00
relyea%netscape.com e03f762c52 Land BOB_WORK_BRANCH unto the tip.
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
ian.mcgreer%sun.com c9abd4b045 add ability to notify user that chain is incomplete 2001-10-17 15:48:09 +00:00
ian.mcgreer%sun.com b4f4d660f8 fix iteration for empty list 2001-10-17 14:37:48 +00:00