Commit Graph

2957 Commits

Author SHA1 Message Date
wtc%netscape.com
1d74ff3063 Bugzilla bug 128599: link libnss3.so with -R $ORIGIN on Solaris to help it
find libsoftokn3.so.  Fixed an outdated comment in softoken/config.mk.
2002-03-03 02:34:32 +00:00
wtc%netscape.com
e853ff7e07 Bugzilla bug 112198: use the correct root certs module name for Darwin. 2002-03-03 02:29:31 +00:00
wtc%netscape.com
2dfbc7deeb Bugzilla bug 122261: removed an assertion on bad input. Bad input should
be reported by returning a failure status.  Thanks to erl@voxi.com
(Erland Lewin) for the bug report.  r=relyea,kaie.
2002-03-02 15:31:25 +00:00
jpierre%netscape.com
44ae883a06 Fix bug 128347 - add -string argument to pass strings to PKCS#11 modules upon addition 2002-03-02 01:56:27 +00:00
oeschger%netscape.com
abbee7ebcb updating UI in Cert Manager: 'Restore' button should say 'Import', a=asa/drivers for trunk, sr=alecf, r=ssaux, bug=114454 2002-03-02 01:08:25 +00:00
relyea%netscape.com
9a0f03ede1 Implement PQG Generate and Verify. 2002-03-02 00:53:11 +00:00
relyea%netscape.com
0a88feb486 Implement PKCS #11 2.11 DSA PQG Parameter generation. 2002-03-02 00:52:05 +00:00
relyea%netscape.com
27a4ab74b6 Make makepqg build dynamic.
Call the dynamic high-level functions to accomplish the generation.
2002-03-02 00:50:39 +00:00
ian.mcgreer%sun.com
ffa4c947ec modify last patch to only take effect if the slot certs are not publicly readable, and to not update the token cert list more than once 2002-03-01 21:43:57 +00:00
ian.mcgreer%sun.com
213696bc04 another fix for bug 125808, force update of cache after login/logout 2002-03-01 16:28:53 +00:00
wtc%netscape.com
d0c71c0e9d Bugzilla bug 112987: merged changes contributed by FreeBSD developer
Jeremy <reg@shale.csir.co.za>.  r=wtc.
2002-03-01 16:08:12 +00:00
relyea%netscape.com
dfe3ee8685 Don't go searching for the matching certs if they weren't on the token the
private key lived on.
2002-03-01 02:15:00 +00:00
relyea%netscape.com
39c2b9d38b When we free the clists, clear out our head pointer (don't keep pointing to
freed memory);
2002-03-01 02:13:42 +00:00
nelsonb%netscape.com
ebc48d2fa1 Fix Usage message. Add missing \n to string. 2002-03-01 01:53:07 +00:00
jpierre%netscape.com
3a5e730566 Fix for 128355 - add SECMOD_AddNewModuleEx to take module parameters 2002-03-01 00:37:42 +00:00
ian.mcgreer%sun.com
3e984aecf0 bug 125808, refresh trust and slot pointers of cert after token removal/insertion 2002-02-28 22:55:30 +00:00
relyea%netscape.com
089b31a446 Fix PSM name problem.
Fix crash when trying to access/delete an non-existant object.
2002-02-28 21:30:13 +00:00
relyea%netscape.com
459a3ef1a6 Load builtins even if we are openning the database read only. 2002-02-28 21:28:47 +00:00
ian.mcgreer%sun.com
09c00fbd12 bug 126653, intermediate cert should have valid CA trust 2002-02-28 19:41:51 +00:00
cathleen%netscape.com
7a8a52afaa fix build bustage due to nsCRT::strlen(char* s) removed 2002-02-28 05:14:10 +00:00
ian.mcgreer%sun.com
bec85f00b2 misdeclared function signature 2002-02-28 01:32:32 +00:00
ian.mcgreer%sun.com
061674f14c fix aix bustage 2002-02-27 23:17:12 +00:00
ian.mcgreer%sun.com
0900842e0a bug 125808, smart card cache fixes 2002-02-27 22:41:56 +00:00
ian.mcgreer%sun.com
e9ae28e48e fix looking up a key on a token 2002-02-27 22:12:06 +00:00
bishakhabanerjee%netscape.com
208526857e Bug 127785 - checked in cseawood's patch 2002-02-27 21:49:41 +00:00
ian.mcgreer%sun.com
d58fbac280 partial fix for bug 125808, if the otken is not logged in when the cert cache loading is done, retry later 2002-02-27 21:36:19 +00:00
oeschger%netscape.com
ce586a48b0 these syntax updates fell through the cracks of the Monday check-in for restoring context-sensitive help, r=andrew, security r=ssaux, sr=alecf, a=asa, bug=124902 2002-02-27 21:12:23 +00:00
wtc%netscape.com
1b62c0e373 Bugzilla bug 108021: removed unused variable 'validity'. 2002-02-27 19:39:26 +00:00
relyea%netscape.com
6d7e648d51 remove LastUpdate time checks from Crl's when verifying certificates. 2002-02-27 18:56:24 +00:00
relyea%netscape.com
dc5064178b Don't crash on when adding certs with null url's . 2002-02-27 16:59:33 +00:00
relyea%netscape.com
cebd4b1a6f The KRL reserved handled should be different from the primordial CRL handle
so that CRL matching code will work correctly.
2002-02-27 16:57:45 +00:00
kaie%netscape.com
f6be46bd1d b=125259 r=rangansen sr=shaver a=asa
Edit CA dialog misshaped
2002-02-27 09:50:21 +00:00
nelsonb%netscape.com
681ff24ca9 1. the sslSecurityInfo and sslGather structs are now part of the sslSocket
rather than being pointed to by the sslSocket.  This reduces the number
of malloc/free calls, and greatly reduces pointer fetches, and null
pointer checks.  sslGather and sslSecurityInfo are separately initialized.
2. SSL_ResetHandshake no longer deallocates and reallocates the sslSecurityInfo and all its subcomponents.
3. Many places that formerly did not check for memory allocation failures
now do check, and do the right thing when allocation failed.
2002-02-27 04:40:17 +00:00
wtc%netscape.com
0fa341362b Bugzilla bug 127517: Darwin optimized build should use -O2. The patch is
contributed by Brian Ryner <bryner@netscape.com>.
2002-02-27 01:48:41 +00:00
ian.mcgreer%sun.com
0d658ba4f8 bug 125796, make sure all CERTCertificates are destroyed as such, and that cache collisions when traversing are handled correctly (by destroying extra reference) 2002-02-26 16:21:48 +00:00
nicolson%netscape.com
72347524cb Initial checkin of the keystore code. It's not complete yet, but
I want others to be able to see it and comment on it.
2002-02-26 04:19:33 +00:00
relyea%netscape.com
bd56c1e043 When using global params, noCertDB implies noKeyDB as well bug 127312 2002-02-26 02:28:21 +00:00
relyea%netscape.com
226cb8ac42 CRL issues: 1) return url when finding and importing CRL's.
2) fix CERT_ImportCRL so it actually works.

NOTE: Calls of SEC_NewCrl() should verify the signature on the CRL before
importing!.
2002-02-26 02:02:53 +00:00
oeschger%netscape.com
86c5368302 restore context-sensitive help to ui: new help file to include and updated syntax, bug=124902, a=asa/drivers, sr=alecf, r=andreww, r=ssaux for security ui 2002-02-26 01:14:09 +00:00
relyea%netscape.com
82ac932cf2 Bug 125728 truncate utf8 correctly in the pkcs11 string. 2002-02-26 00:33:42 +00:00
relyea%netscape.com
ae01fe45e4 Changes to allow protected pin path to work in applications that code for it. 2002-02-26 00:28:50 +00:00
nelsonb%netscape.com
4bfe43978d Change ssl_GetPeerInfo to no longer assume that an address is IPV6 if
it's not IPv4.  Fixes a bug on systems that don't support IPV6, but
do support other address families.
2002-02-26 00:28:15 +00:00
wtc%netscape.com
1a7fc6755d Removed the temporary depend->clean hack for NSS 3.4 update.
Modified Files:
	Makefile.in security/manager/Makefile.in
	security/nss/makefile.win
2002-02-23 04:41:30 +00:00
wtc%netscape.com
11bbf1a4da Temporary hack for the NSS 3.4 update (BeOS port, etc.) Will remove
tomorrow.
Modified files: Makefile.in security/manager/Makefile.in
                security/nss/makefile.win
2002-02-22 21:26:29 +00:00
seawood%netscape.com
1c02e4f877 Use blocking sockets for SSL connections since BeOS does not have support for nonblocking sockets.
Bug #70217 r=wtc a=shaver
2002-02-22 09:30:31 +00:00
wtc%netscape.com
6c79ece2fe Bugzilla bug 70217: ported NSS to BeOS. The patch is contributed by
Christopher Seawood <seawood@netscape.com>.
2002-02-22 04:23:30 +00:00
ian.mcgreer%sun.com
bc5808a5ed bug 125359, by default the ASN.1 en/decoder should treat all numbers as signed. But many source/target items desire unsigned integers (specifically, bignums in the crypto stuff), so implement an siUnsignedInteger type which notifies the en/decoder to handle the conversion.
r=nelsonb
2002-02-21 22:41:44 +00:00
nelsonb%netscape.com
e2f58af25a Fix warning on Windows builds. Bug 104541. 2002-02-21 21:23:14 +00:00
nicolson%netscape.com
856d45b4e1 fixes to make it work better on windows. 2002-02-21 01:23:12 +00:00
wtc%netscape.com
4f99429abb Fixed misspelling. 2002-02-21 00:06:14 +00:00