5886 Commits

Author SHA1 Message Date
julien.pierre.bugs%sun.com
d15ad02799 Fix for bug 335021. Add SEC_ASN1_CONSTRUCTED to S/MIME EKP template. r=relyea 2006-04-29 00:18:42 +00:00
rrelyea%redhat.com
5f24a2a77c Attachment #215739: Use SSE2 multiply instructions on intel processors. for bug #326482
r=nelson r=wtc
2006-04-28 17:06:22 +00:00
benjamin%smedbergs.us
ec18f62436 Bug 333308 - make clean/distclean misses various files, patch by Mike Hommey <mh+mozilla@glandium.org>, r=me 2006-04-28 14:54:54 +00:00
christophe.ravel.bugs%sun.com
a8e64c65ca [Bug 334843] Add rpath for HP-UX on pa-risc
r+ neil.williams.
2006-04-27 23:36:20 +00:00
glen.beasley%sun.com
dd3ed23796 JSS version 4.2.3 RTM 2006-04-27 23:18:44 +00:00
alexei.volkov.bugs%sun.com
143f21193c [Bug 334274] double free in CRMF_EncryptedKeyGetEncryptedValue. r=nelson 2006-04-27 22:09:28 +00:00
alexei.volkov.bugs%sun.com
f5f5d893ff [Bug 334326] DecodeV4DBCertEntry: Variable "(entry)->nickname" tracked as NULL was passed to a function that dereferences it. r=rrelyea 2006-04-27 18:35:24 +00:00
bzbarsky%mit.edu
0c3706888c Rename GetNodePrincipal to NodePrincipal. Bug 327246, r+sr=sicking 2006-04-27 18:21:11 +00:00
alexei.volkov.bugs%sun.com
20919d892f [Bug 334454] Variable "(key)->pkcs11Slot" tracked as NULL was passed to a function that dereferences it. [@ SECKEY_CopyPrivateKey - SSL_ConfigSecureServer]. r=nelson 2006-04-26 19:40:56 +00:00
alexei.volkov.bugs%sun.com
49cb46e26c [Bug 333389] sftk_NewAttribute should not crash when so is NULL [@ sftk_NewAttribute]. r=nelson 2006-04-26 19:18:00 +00:00
alexei.volkov.bugs%sun.com
c353bf9e7b [Bug 334522] pk12util crash in SEC_PKCS12DecoderValidateBags. r=nelson 2006-04-26 06:47:30 +00:00
gijskruitbosch%gmail.com
1419d819b2 Bug 153232 - Missing break; for BAD_SIGNATURE case
r+sr = Kai Engert
2006-04-25 14:33:15 +00:00
nelson%bolyard.com
b9c189458d Disable AMD64 assembly optimizations. Bug 334057. r=nelson 2006-04-25 05:51:23 +00:00
nelson%bolyard.com
249561bf3b Bug 294537: ssltap should display ASCII CA names from cert request message
r=alexei.volkov
2006-04-25 04:58:45 +00:00
nelson%bolyard.com
f02321e973 Backout the last change, undoing the fix for bug 320336 and bug 333405. 2006-04-25 04:39:24 +00:00
alexei.volkov.bugs%sun.com
7fc553fcf8 [Bug 334277] double free in [@ sftk_FreeAttribute - sftk_DeleteAttributeType]. r=relyea 2006-04-25 02:33:58 +00:00
alexei.volkov.bugs%sun.com
97c78b7911 [Bug 334276] double free in [@ SECKEY_CopyPublicKey]. r=nelson 2006-04-25 02:23:52 +00:00
wtchang%redhat.com
530dee8657 Bugzilla Bug 335275: include pk11pqg.h to declare the PK11_PQG_ functions.
The PK11_PQG_ functions operate on PQGParams, so we declare pqgParams as
a pointer to PQGParams, and cast a SECKEYParams pointer to a PQGParams
pointer. (SECKEYParams and PQGParams are isomorphic.)  r=nelson.
2006-04-25 01:26:42 +00:00
wtchang%redhat.com
085b36691e Bugzilla Bug 320336: SECITEM_AllocItem should return a NULL pointer if the
allocation of its 'data' buffer fails. r=nelson.  This checkin fixed bug
333405 as a byproduct.
Modified files: secitem.c secitem.h
2006-04-24 22:50:13 +00:00
nelson%bolyard.com
dbe80e7489 Remove call to printf in ecl/ecp_224.c Bug 334448. r=wtchang 2006-04-24 21:27:38 +00:00
wtchang%redhat.com
1fe17580e4 Bugzilla bug 335275: compile with the GCC flag
-Werror-implicit-function-declaration. r=nelsonb.
Modified files: Linux.mk SunOS5.mk
2006-04-24 20:07:15 +00:00
nelson%bolyard.com
dafe77ce6c Display TLS hello extensions and alerts. Display ECC cipher suites.
Bug 333600 and bug 334314. r=Alexei.Volkov
2006-04-24 06:11:41 +00:00
nelson%bolyard.com
1930ea6074 Put nss.def file sections in numeric order, and alphabetical order
within sections.
2006-04-24 05:08:04 +00:00
nelson%bolyard.com
0c05899fa2 Bug 323350. sr=rrelyea. This patch makes 3 changes:
1) it adds a new ifdef which enables SSL to limit itself to the 3 Suite B
   curves.
2) it corrects the creation and parsing of the Supported Curve extension to
   conform with the lastest definition, by using 2 bytes to encode the list
   length,
3) it changes the algorithm that picks the curve for ECDHE to choose a curve
   that is at least as strong as the "weakest link", is mutually supported
   by client and server, and is the fastest for its size.
2006-04-23 00:17:18 +00:00
julien.pierre.bugs%sun.com
ff004c3373 Fix for bug 335039. Declare nssCKFWCRyptoOperation_UpdateCombo. r=wtchang 2006-04-22 05:30:18 +00:00
julien.pierre.bugs%sun.com
0a709d0578 Fix red tree on Windows. 2006-04-22 05:18:20 +00:00
alexei.volkov.bugs%sun.com
fc87dbb2fe [Bug 334183] Double free on error because CERT_FindCertIssuer unexpectedly calls CERT_DestroyCertificate. r=alexei 2006-04-22 02:09:09 +00:00
julien.pierre.bugs%sun.com
1d134e6b56 Fix for bug 331413 . replace signal with sigaction; fix logging. r=wtchang 2006-04-22 01:28:14 +00:00
alexei.volkov.bugs%sun.com
76a9749ba0 Patch contributed by timeless@bemail.org
[Bug 334449] oom Crash in crmf_template_copy_secalg. r=nelson
2006-04-22 01:25:57 +00:00
alexei.volkov.bugs%sun.com
d4f39e6449 Patch contributed by timeless@bemail.org
[Bug 334436] nsslowcert_UpdateSubjectEmailAddr doesn't consistently use emailAddrs as a guard of nemailAddrs guarding emailAddrs[0]. r=nelson
2006-04-22 01:19:41 +00:00
alexei.volkov.bugs%sun.com
aea5eb0f12 Patch contributed by timeless@bemail.org
[Bug 334328] nsspkcs5_PKCS12PBE: Variable "A" tracked as NULL was dereferenced. r=nelson
2006-04-22 01:13:15 +00:00
alexei.volkov.bugs%sun.com
86494ef39a [Bug 334275] double free in [@ PK11_ListPublicKeysInSlot]. r=nelson 2006-04-22 01:08:17 +00:00
alexei.volkov.bugs%sun.com
9c061b607a [Bug 334273] double free in SECKEY_DecodeDERSubjectPublicKeyInfo. r=nelson 2006-04-22 01:03:18 +00:00
alexei.volkov.bugs%sun.com
5f88dfbdaa [Bug 334240] double free in nsslowkey_ConvertToPublicKey if SECITEM_CopyItem or SECITEM_CopyItem fail. r=nelson 2006-04-22 00:59:13 +00:00
alexei.volkov.bugs%sun.com
8feb62dbd0 [Bug 334236] double free in PK11_ListPrivKeysInSlot if keys allocation fails. r=nelson 2006-04-22 00:55:29 +00:00
wtchang%redhat.com
e8b0114d09 Bugzilla Bug 333932: fixed Solaris SPARC GCC build failures.
r=christophe.ravel
2006-04-22 00:13:29 +00:00
alexei.volkov.bugs%sun.com
5f22914b4a [Bug 334234] PK11_NewSlotInfo returns freed objects if lock allocations fail. r=nelson 2006-04-21 23:29:37 +00:00
wtchang%redhat.com
6f1bd4dc40 Bugzilla Bug 334533: in getPQseed we always set the most significant bit of
SEED to 1 to make NIST CMVP's PQG parameter validation tool happy. In
PQG_ParamGenSeedLen we require the length of SEED be at least 20 bytes.
r=nelson.
2006-04-21 17:48:30 +00:00
wtchang%redhat.com
37a7e6c417 Bugzilla Bug 298522: changed RSA modulus size to 1024 bits and added known
answer tests for RSA SHA1, SHA256, SHA384, and SHA512 signatures.  The
patch is written by Glen Beasley. r=wtc.
2006-04-21 17:13:50 +00:00
wtchang%redhat.com
d0604ba735 Bugzilla Bug 236245: Use a stack buffer for ec_params.data in
ssl3_SendECDHServerKeyExchange. r=nelson.
2006-04-21 16:19:48 +00:00
wtchang%redhat.com
333657e660 Bugzilla Bug 334553: fixed the comments because mp_digit is actually 64-bit
(unsigned long or unsigned long long). r=nelson.
2006-04-21 16:13:02 +00:00
rrelyea%redhat.com
5cd56974be Performance tests for ec curves. Test's freebl and pkcs11 interfaces. 2006-04-21 01:40:48 +00:00
wtchang%redhat.com
432ccc0173 Bugzilla Bug 326754: checked the change back in. We failed the NIST DSA
PQGGen test for some other reason (bug 334533).
2006-04-20 21:55:24 +00:00
kaie%kuix.de
d68044ddc1 Bug 333691, [@ nsSSLThread::requestPoll - nsSSLIOLayerPoll]
r=rrelyea
2006-04-20 16:21:57 +00:00
kaie%kuix.de
9607d14ac4 Bug 333385, [@ nsKeygenThread::UserCanceled]
r=rrelyea
2006-04-20 16:21:26 +00:00
kaie%kuix.de
5161526b15 Bug 333404, freeString is unused DEADCODE in nsCrypto::ImportUserCertificates
r=rrelyea
2006-04-20 16:21:00 +00:00
kaie%kuix.de
15c4bee847 Bug 333767, nsNSSCertificateDB::AddCertFromBase64 mishandles trust settings
r=darin/kengert
2006-04-20 16:20:32 +00:00
nelson%bolyard.com
fe04651c77 Bug 80092: SSL write indicates all data sent when some is buffered.
SSL now follows NSPR socket semantics and never returns a short write
count on a blocking socket.  On a blocking socket, it returns either
the full count or -1 (with an error code set).
For non-blocking sockets, SSL no longer returns a full write count
when some of the data remains buffered in the SSL record layer.
Instead it returns a number is that always at least 1 byte short of a
full write count, so that the caller will  keep retrying until it is done.
SSL makes sure that the first byte sent by the caller in the retry
matches the last byte previously buffered.  r=rrelyea.
Modified Files: ssl3con.c sslcon.c ssldef.c sslimpl.h sslsecur.c
2006-04-20 08:46:34 +00:00
nelson%bolyard.com
43a7c5e950 Fix buffer overflow regression. Bug 236245. sr=wtchang 2006-04-20 06:57:54 +00:00
alexei.volkov.bugs%sun.com
b67f75bc05 Patch contributed by timeless@bemail.org
[Bug 334459] Variable "cipherName" tracked as NULL was passed to a
 function that dereferences it. [@ PORT_Strdup - SSL_SecurityStatus]. r=nelson
2006-04-20 00:20:45 +00:00