wtc%netscape.com
89cbb2e3ff
Bug 168368: fixed an uninitialized memory read in CERT_CreateRDN. It
...
should not call va_arg if 'ava0' is NULL (which means 'ava0' is the last
argument).
2002-09-13 00:28:55 +00:00
jpierre%netscape.com
117e6ec849
Fix for 167856 - memory leaks in CRL cache
2002-09-11 01:08:06 +00:00
jpierre%netscape.com
5df90591e2
Fix for 167849 - copy DER subject before adding an issuer to the hash table in CRL cache
2002-09-11 00:28:22 +00:00
jpierre%netscape.com
524901374d
Fix for 167649 - invalidate CRL cache when new CRL object is imported into a token
2002-09-10 04:49:09 +00:00
wtc%netscape.com
b560bf3371
Bug 160805: fixed a leak and a double free of the arena introduced in the
...
previous checkin.
2002-09-08 03:25:30 +00:00
jpierre%netscape.com
e2b8be5319
Fix compiler warnings
2002-09-07 01:24:27 +00:00
wtc%netscape.com
6d4ccd8d26
Bug 166933: fixed build breakage on the Mac.
...
Modified files: certdb/crl.c certhigh/certhigh.c softoken/dbmshim.c
2002-09-06 20:17:42 +00:00
nicolson%netscape.com
e179fe8904
Fix 164126: makefile build error.
...
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
jpierre%netscape.com
c16a17bc7a
Fix for 162983 - consider all certs revoked if there is a bad CRL in the cache
2002-09-06 06:53:03 +00:00
wtc%netscape.com
a897ae16a9
Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.
...
The patch for this checkin is attached to bug 166785.
2002-09-06 00:27:52 +00:00
wtc%netscape.com
a1d5df2a05
Fixed unresolved symbol DPCache_Refresh, which I believe is a misspelling
...
of DP_RefreshCache.
2002-09-05 16:34:27 +00:00
jpierre%netscape.com
3a78c9b53c
Fix for 166714 - make SEC_FindCrlByName use the CRL cache
2002-09-05 06:12:33 +00:00
nelsonb%netscape.com
b324789645
Treat empty SubjectAltName extensions as if they were non-existant.
...
Bugs 162979 166454.
2002-09-04 00:42:01 +00:00
jpierre%netscape.com
5e5a705cb7
Fix for 160805 . Make a copy of items into the arena before calling SEC_QuickDERDecodeItem where needed
2002-08-31 00:37:52 +00:00
jpierre%netscape.com
29333f104f
Implement the CRL cache . Bug 149854
2002-08-30 22:57:03 +00:00
jpierre%netscape.com
463500a5ab
Convert slow SEC_ASN1DecodeItem calls to SEC_QuickDERDecodeItem where possible. Performance improvement. Bug #160805 . r=relyea
2002-08-24 00:52:47 +00:00
wtc%netscape.com
2190605135
Bug 164035: checked in a small code optimization suggested by
...
J�rg Brunsmann <joerg_brunsmann@yahoo.de>. Use the local variable that
has the same value.
2002-08-22 18:05:32 +00:00
wtc%netscape.com
401d42ef18
Bug 163863: removed duplicate PORT_Memset calls in CERT_KeyFromDERCert.
...
Thanks to J�rg Brunsmann <joerg_brunsmann@yahoo.de> for the fix.
2002-08-21 18:05:20 +00:00
relyea%netscape.com
0fb6e546c6
bug 161552: Make the recipient list traversal functions call the internal
...
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
jpierre%netscape.com
6eeafa0a3a
Stop referencing deleted quickder.h header
2002-08-08 01:55:34 +00:00
jpierre%netscape.com
1e8c079b69
Implement partial CRL decoding. Fix for 149816. r=wtc . Uses new quick DER decoder
2002-08-07 03:44:12 +00:00
relyea%netscape.com
c0dd962ed9
1) factor out fortezzav1 from the chain processing code to make the code easier
...
to read.
2) only extract keys if we are using fortezzav1 cert (should speed up cert verify
a bit).
3) Add function to verify a specific CA cert to verify a userCert Usage.
2002-08-02 17:51:20 +00:00
jpierre%netscape.com
8fa534cac0
Fix compiler warnings on NT
2002-08-02 00:53:15 +00:00
jpierre%netscape.com
9ee98f355e
Fix incorrect macro usage
2002-08-02 00:28:23 +00:00
nelsonb%netscape.com
8e038c1211
Correct the test of IP addresses in Subject Alternative Name extensions.
...
bug 103752.
2002-08-01 22:51:56 +00:00
nelsonb%netscape.com
ca36e61638
Fix code to work when subjectAltName extension not present in server cert.
...
Bug 103752.
2002-07-30 23:15:43 +00:00
nelsonb%netscape.com
ac73526c2c
Examine SubjectAltName extensions for SSL server name matching.
...
Bug 103752.
2002-07-30 19:32:33 +00:00
jpierre%netscape.com
a82b9f46ba
158005 - add new CRL decode and import functions . Benefits are :
...
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
jpierre%netscape.com
9a7c0e7303
Fix for 156802 - remove improper check in CRL decoding
2002-07-19 00:12:13 +00:00
jpierre%netscape.com
9bfb36161f
Fix for 154212
2002-07-10 00:56:16 +00:00
jpierre%netscape.com
c101367238
Fix for 154212 - update patch for CERT_SaveSMimeProfile based on Bob's comments
2002-07-10 00:07:39 +00:00
jpierre%netscape.com
967d483ebe
Add new CERT_VerifyCertificate function - fix for 149832
2002-07-04 03:09:49 +00:00
relyea%netscape.com
6880c87a8d
More performance improvements in listing certs:
...
1) reduce more short term memory allocate/frees.
2) remove sha1 hash calculations from critical paths.
3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
jpierre%netscape.com
7ecdf837d4
Fix for 154212 - make CERT_SaveSMimeProfile copy the cert to the database if it comes from an external source
2002-06-27 00:18:35 +00:00
relyea%netscape.com
ffa0ecc514
Reduce the cost of decoding a certificate.
2002-06-20 18:53:16 +00:00
rangansen%netscape.com
bff8c533ce
exporting CERT_VerifyCertChain. r=relyea
2002-06-19 15:58:51 +00:00
relyea%netscape.com
e84f17e0ea
Add series to keep track of object handle value validity.
2002-06-13 21:42:41 +00:00
relyea%netscape.com
dc0b0c243c
Don't crash if url is specified, but the crl is broken
2002-05-21 21:26:52 +00:00
ian.mcgreer%sun.com
dc613b61ee
bug 144309, return value of STAN_GetCERTCertificate not checked
...
r=wtc
2002-05-20 18:05:11 +00:00
jpierre%netscape.com
e1a3c306e8
Fix for bug 142868 - CA certificates are imported with NULL nicknames .
2002-05-10 20:21:38 +00:00
relyea%netscape.com
56f8e3b5e8
Automatically create a NULL email profile for certs with email addresses which
...
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
f0d29104b1
bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate.
2002-05-02 19:00:13 +00:00
wtc%netscape.com
d3e14fdce2
Deleted code that was made obsolete by the previous revision.
2002-04-25 21:10:09 +00:00
ian.mcgreer%sun.com
05bc7f4136
bug 138626, remove deleted cert from cache even if references still exist
2002-04-25 19:37:30 +00:00
relyea%netscape.com
df120eb43d
Don't crash if we don't find the profile (and thus don't have a slot to free).
2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com
f9f60b9735
NewTemp has to be matched with AddTempCertToPerm
2002-04-22 20:27:52 +00:00
relyea%netscape.com
ce09346d8c
Token and cert processing fixes:
...
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
abac680269
fix bugs in cert import with smart card cache
2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7256cf9ec
bug 135521, change cert lookups on tokens to be actual finds instead of traversals
2002-04-15 15:22:11 +00:00
relyea%netscape.com
7aa8e229f4
Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
...
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00