Commit Graph

158 Commits

Author SHA1 Message Date
wtc%netscape.com
89cbb2e3ff Bug 168368: fixed an uninitialized memory read in CERT_CreateRDN. It
should not call va_arg if 'ava0' is NULL (which means 'ava0' is the last
argument).
2002-09-13 00:28:55 +00:00
jpierre%netscape.com
117e6ec849 Fix for 167856 - memory leaks in CRL cache 2002-09-11 01:08:06 +00:00
jpierre%netscape.com
5df90591e2 Fix for 167849 - copy DER subject before adding an issuer to the hash table in CRL cache 2002-09-11 00:28:22 +00:00
jpierre%netscape.com
524901374d Fix for 167649 - invalidate CRL cache when new CRL object is imported into a token 2002-09-10 04:49:09 +00:00
wtc%netscape.com
b560bf3371 Bug 160805: fixed a leak and a double free of the arena introduced in the
previous checkin.
2002-09-08 03:25:30 +00:00
jpierre%netscape.com
e2b8be5319 Fix compiler warnings 2002-09-07 01:24:27 +00:00
wtc%netscape.com
6d4ccd8d26 Bug 166933: fixed build breakage on the Mac.
Modified files: certdb/crl.c certhigh/certhigh.c softoken/dbmshim.c
2002-09-06 20:17:42 +00:00
nicolson%netscape.com
e179fe8904 Fix 164126: makefile build error.
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
jpierre%netscape.com
c16a17bc7a Fix for 162983 - consider all certs revoked if there is a bad CRL in the cache 2002-09-06 06:53:03 +00:00
wtc%netscape.com
a897ae16a9 Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.
The patch for this checkin is attached to bug 166785.
2002-09-06 00:27:52 +00:00
wtc%netscape.com
a1d5df2a05 Fixed unresolved symbol DPCache_Refresh, which I believe is a misspelling
of DP_RefreshCache.
2002-09-05 16:34:27 +00:00
jpierre%netscape.com
3a78c9b53c Fix for 166714 - make SEC_FindCrlByName use the CRL cache 2002-09-05 06:12:33 +00:00
nelsonb%netscape.com
b324789645 Treat empty SubjectAltName extensions as if they were non-existant.
Bugs 162979 166454.
2002-09-04 00:42:01 +00:00
jpierre%netscape.com
5e5a705cb7 Fix for 160805 . Make a copy of items into the arena before calling SEC_QuickDERDecodeItem where needed 2002-08-31 00:37:52 +00:00
jpierre%netscape.com
29333f104f Implement the CRL cache . Bug 149854 2002-08-30 22:57:03 +00:00
jpierre%netscape.com
463500a5ab Convert slow SEC_ASN1DecodeItem calls to SEC_QuickDERDecodeItem where possible. Performance improvement. Bug #160805 . r=relyea 2002-08-24 00:52:47 +00:00
wtc%netscape.com
2190605135 Bug 164035: checked in a small code optimization suggested by
J�rg Brunsmann <joerg_brunsmann@yahoo.de>. Use the local variable that
has the same value.
2002-08-22 18:05:32 +00:00
wtc%netscape.com
401d42ef18 Bug 163863: removed duplicate PORT_Memset calls in CERT_KeyFromDERCert.
Thanks to J�rg Brunsmann <joerg_brunsmann@yahoo.de> for the fix.
2002-08-21 18:05:20 +00:00
relyea%netscape.com
0fb6e546c6 bug 161552: Make the recipient list traversal functions call the internal
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
jpierre%netscape.com
6eeafa0a3a Stop referencing deleted quickder.h header 2002-08-08 01:55:34 +00:00
jpierre%netscape.com
1e8c079b69 Implement partial CRL decoding. Fix for 149816. r=wtc . Uses new quick DER decoder 2002-08-07 03:44:12 +00:00
relyea%netscape.com
c0dd962ed9 1) factor out fortezzav1 from the chain processing code to make the code easier
to read.
2) only extract keys if we are using fortezzav1 cert (should speed up cert verify
a bit).
3) Add function to verify a specific CA cert to verify a userCert Usage.
2002-08-02 17:51:20 +00:00
jpierre%netscape.com
8fa534cac0 Fix compiler warnings on NT 2002-08-02 00:53:15 +00:00
jpierre%netscape.com
9ee98f355e Fix incorrect macro usage 2002-08-02 00:28:23 +00:00
nelsonb%netscape.com
8e038c1211 Correct the test of IP addresses in Subject Alternative Name extensions.
bug 103752.
2002-08-01 22:51:56 +00:00
nelsonb%netscape.com
ca36e61638 Fix code to work when subjectAltName extension not present in server cert.
Bug 103752.
2002-07-30 23:15:43 +00:00
nelsonb%netscape.com
ac73526c2c Examine SubjectAltName extensions for SSL server name matching.
Bug 103752.
2002-07-30 19:32:33 +00:00
jpierre%netscape.com
a82b9f46ba 158005 - add new CRL decode and import functions . Benefits are :
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
jpierre%netscape.com
9a7c0e7303 Fix for 156802 - remove improper check in CRL decoding 2002-07-19 00:12:13 +00:00
jpierre%netscape.com
9bfb36161f Fix for 154212 2002-07-10 00:56:16 +00:00
jpierre%netscape.com
c101367238 Fix for 154212 - update patch for CERT_SaveSMimeProfile based on Bob's comments 2002-07-10 00:07:39 +00:00
jpierre%netscape.com
967d483ebe Add new CERT_VerifyCertificate function - fix for 149832 2002-07-04 03:09:49 +00:00
relyea%netscape.com
6880c87a8d More performance improvements in listing certs:
1) reduce more short term memory allocate/frees.
	2) remove sha1 hash calculations from critical paths.
	3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
jpierre%netscape.com
7ecdf837d4 Fix for 154212 - make CERT_SaveSMimeProfile copy the cert to the database if it comes from an external source 2002-06-27 00:18:35 +00:00
relyea%netscape.com
ffa0ecc514 Reduce the cost of decoding a certificate. 2002-06-20 18:53:16 +00:00
rangansen%netscape.com
bff8c533ce exporting CERT_VerifyCertChain. r=relyea 2002-06-19 15:58:51 +00:00
relyea%netscape.com
e84f17e0ea Add series to keep track of object handle value validity. 2002-06-13 21:42:41 +00:00
relyea%netscape.com
dc0b0c243c Don't crash if url is specified, but the crl is broken 2002-05-21 21:26:52 +00:00
ian.mcgreer%sun.com
dc613b61ee bug 144309, return value of STAN_GetCERTCertificate not checked
r=wtc
2002-05-20 18:05:11 +00:00
jpierre%netscape.com
e1a3c306e8 Fix for bug 142868 - CA certificates are imported with NULL nicknames . 2002-05-10 20:21:38 +00:00
relyea%netscape.com
56f8e3b5e8 Automatically create a NULL email profile for certs with email addresses which
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
f0d29104b1 bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate. 2002-05-02 19:00:13 +00:00
wtc%netscape.com
d3e14fdce2 Deleted code that was made obsolete by the previous revision. 2002-04-25 21:10:09 +00:00
ian.mcgreer%sun.com
05bc7f4136 bug 138626, remove deleted cert from cache even if references still exist 2002-04-25 19:37:30 +00:00
relyea%netscape.com
df120eb43d Don't crash if we don't find the profile (and thus don't have a slot to free). 2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com
f9f60b9735 NewTemp has to be matched with AddTempCertToPerm 2002-04-22 20:27:52 +00:00
relyea%netscape.com
ce09346d8c Token and cert processing fixes:
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
   2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
   3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
   4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
   5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
abac680269 fix bugs in cert import with smart card cache 2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7256cf9ec bug 135521, change cert lookups on tokens to be actual finds instead of traversals 2002-04-15 15:22:11 +00:00
relyea%netscape.com
7aa8e229f4 Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00