Commit Graph

3210 Commits

Author SHA1 Message Date
ian.mcgreer%sun.com
05bc7f4136 bug 138626, remove deleted cert from cache even if references still exist 2002-04-25 19:37:30 +00:00
ian.mcgreer%sun.com
2e14215952 reorganize token cache so that cache entries for imported objects are created from the token, not from the user-supplied template 2002-04-25 19:33:47 +00:00
relyea%netscape.com
b02d968215 NSS 3.4 has branch, that makes the tip at least NSS 3.5 2002-04-25 18:51:45 +00:00
relyea%netscape.com
0008ea5125 Don't set the Token value before fetching CRL attributes. This code is fetching
attributes from a known CRL, not looking up new attributes (I'm pretty sure that
CVS apropos would show I checked in the previously wrong code).

bob
2002-04-25 18:33:45 +00:00
seawood%netscape.com
c0ec608df6 Add 'make install' target to build. It's "MRE-friendly". (See http://www.mozilla.org/projects/embedding/MRE.html for details.)
Changes:
* Added EXTRA_COMPONENTS variable to build.  Use it to automagically install files into the components dir.
* Added SYSINSTALL variable.  Use it install files onto the system.
* Move mozilla-config generation from configure to makefiles
* mozilla-config will now generate paths based upon the MRE-based directory layout.
* Generate mozilla script from template

The installation heirarchy currently looks like:
$prefix -> /bin/mozilla
           /bin/mozilla-config
           /include/mozilla-ver/*
           /lib/mozilla-ver  (mozappdir)
                            /components
                            /res
                            /defaults
                            /chrome

There is preliminary build support for MRE dirs as well though the component manager hasn't had MRE support added yet.

$prefix -> /lib/mre/mre-ver  (mredir)
                            /components
2002-04-25 02:52:44 +00:00
sonja.mirtitsch%sun.com
adb8e67a58 trying a version that can test tip as default for tinderbox and 341
as default for nightly QA
2002-04-25 01:04:10 +00:00
relyea%netscape.com
8747bf72ad Don't crash if our cache entry is not found. 2002-04-25 00:45:42 +00:00
relyea%netscape.com
35695b7987 Turn off caching for non-hardware tokens for now until we fix some of our
tokens which can be updated out-of-band to use the proper 'removable token'
semantics.
2002-04-25 00:25:58 +00:00
relyea%netscape.com
df120eb43d Don't crash if we don't find the profile (and thus don't have a slot to free). 2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com
217231840b This is a real corner case. If a search is done by issuer/serial, and the returned cert was in the cache, need to see if the cert's slot was removed. If so, destroy the cert and retry the search on the present tokens. 2002-04-24 19:39:41 +00:00
relyea%netscape.com
23724ed2c8 Don't crash when getting a single user cert, but old certs are in the database
with the same subject, but no keys.
2002-04-24 18:29:04 +00:00
relyea%netscape.com
ac5aeb9932 Look up both DER encoded serial numbers (PKCS #11 spec), and decode serial
numbers (Old NSS) when looking up certs by issuer and SN.
2002-04-24 18:27:17 +00:00
relyea%netscape.com
71e35b07b7 Authenticate to tokens before looking up user certs. 2002-04-24 18:25:48 +00:00
kaie%netscape.com
9bd7d0e5ad b=129067 Deleted certs still appear in Cert Manager, uses slow workaround, which should get removed once bug 138626 is fixed.
r=javi sr=alecf
2002-04-24 00:51:33 +00:00
kaie%netscape.com
d71f02939c b=134992 Fix crash when displaying some S/Mime messages.
r=javi sr=alecf
2002-04-24 00:40:49 +00:00
kaie%netscape.com
b18280dee7 b=139349 Need to use dont_AddRef with GetCertAtIndex
r=bryner sr=alecf
2002-04-24 00:35:05 +00:00
kaie%netscape.com
bb35709550 b=139325 Leaking CERTCertificate references from nsNSSCertificate::GetChain
r=bryner/javi sr=alecf
2002-04-24 00:15:12 +00:00
thayes%netscape.com
df2c867541 Reserved Netscape extension (NETSCAPE 1 18) 2002-04-23 23:48:20 +00:00
ian.mcgreer%sun.com
9221a5bd63 fix shutdown leaks 2002-04-23 17:22:13 +00:00
kaie%netscape.com
fb19288806 b=125607 Temporary workaround for better displaying signed S/Mime messages w/ attachments from IMAP servers.
r=ducarroz sr=bienvenu
2002-04-22 23:02:29 +00:00
ian.mcgreer%sun.com
caad76ef9c avoid use of iterator 2002-04-22 20:44:07 +00:00
ian.mcgreer%sun.com
f9f60b9735 NewTemp has to be matched with AddTempCertToPerm 2002-04-22 20:27:52 +00:00
relyea%netscape.com
ce09346d8c Token and cert processing fixes:
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
   2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
   3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
   4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
   5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
9596c39faa file is no longer part of build (functionality in devtoken.c) 2002-04-22 18:28:30 +00:00
ian.mcgreer%sun.com
a4591dfe82 overwrite old entry during import, so that changing trust works correctly 2002-04-22 15:21:06 +00:00
ian.mcgreer%sun.com
abac680269 fix bugs in cert import with smart card cache 2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7ab27bc63 re-sync the trust domain cache with token insertion/removal 2002-04-19 23:06:44 +00:00
nicolson%netscape.com
9c53042faa JSS 3.2 features check-in. 2002-04-19 22:42:05 +00:00
ian.mcgreer%sun.com
36e1d960b7 * make sure the token cache returns failure in overflow case
* change internal module trust order again, builtins uses 100, and internal module must come first
2002-04-19 19:30:12 +00:00
ian.mcgreer%sun.com
3a62ba7fdd try again, the default is 50 so the internal module must be higher 2002-04-19 19:19:33 +00:00
ian.mcgreer%sun.com
7061750a28 make sure the internal module defaults to trust order > 50 2002-04-19 19:01:45 +00:00
ian.mcgreer%sun.com
7c6de6462d improve synchronization between the token state and token cache operations 2002-04-19 17:32:22 +00:00
ian.mcgreer%sun.com
a4d9b8b514 Only fall back to email search if the "nickname" has an @ character. This is because email searches will not go through the cache, so should be avoided if possible. 2002-04-19 16:22:31 +00:00
ian.mcgreer%sun.com
5377ca2a6c Fixes for smart card cache. Don't do cache searches by email address, since GetAttributeValue does not set that field. Handle removal correctly for item at tail of list. Don't search token after a successful cache search that returned zero hits. 2002-04-19 16:14:13 +00:00
kaie%netscape.com
da66977564 b=137154 PSM needs to call SSL_ClearSessionCache before switching profiles
r=javi sr=alecf
2002-04-18 22:25:26 +00:00
jpierre%netscape.com
2d21c59ccc Fix for 138084 - free slot list if NSC_Initialize fails 2002-04-18 20:54:22 +00:00
ian.mcgreer%sun.com
ee8ba26ef6 catch non-present tokens before searching them 2002-04-18 19:37:12 +00:00
ian.mcgreer%sun.com
f618a840b0 two fixes for certs with multiple instances 2002-04-18 19:26:17 +00:00
relyea%netscape.com
8964d7d12e Don't crash if we try to get the name of a non-existant token. 2002-04-18 17:54:30 +00:00
relyea%netscape.com
77950da5b1 Remember the nickname in the cache entry so that we can always free it when the cert goes away, even if the nickname has changes.
Also, initialize subjectList to NULL at the beginning, so we don't try to add nickname when we aren't supposed to.
2002-04-18 17:52:55 +00:00
relyea%netscape.com
a9286881d6 We need to make sure we always return a trust object, even if that object says
there is no trust.
2002-04-18 17:50:40 +00:00
ian.mcgreer%sun.com
5dbec9a12d landing new smart card cache, bug 135429 2002-04-18 17:30:05 +00:00
nicolson%netscape.com
cdc867c54c update NSS version. 2002-04-18 14:33:16 +00:00
wtc%netscape.com
f971211696 Bugzilla bug 126087: removed symKey->refLock because we are using atomic
routines on symKey->refCount now.  Declare symKey->refCount as PRInt32 to
match the prototype of PR_AtomicIncrement/Decrement.
Modified files: pk11skey.c secmodti.h
2002-04-17 01:03:23 +00:00
jgmyers%netscape.com
3052458a05 Remove unneeded ForceHandshake code which broke IMAP/SSL over SOCKS: bug 133434 r=kaie@netscape.com sr=brendan@mozilla.org a=asa 2002-04-16 22:49:33 +00:00
wtc%netscape.com
8236aafeec Bugzilla bug 133584: PK11_SaveSMimeProfile also needs to free free_slot if
it returns on error.
2002-04-16 22:40:07 +00:00
dbragg%netscape.com
bcc260038d Regular milestone update of localeVersion values to 1.0.0. Bug 126785. r=tao, sr=alecf, a=asa 2002-04-16 22:19:10 +00:00
sonja.mirtitsch%sun.com
f091c5b444 changes for jdk 1.4; and mccrel move 2002-04-16 20:57:42 +00:00
relyea%netscape.com
117c6b4800 Don't free the temp secmod.db name until we are through using it. 2002-04-16 00:24:34 +00:00
ian.mcgreer%sun.com
b4146d9933 bug 63815, AIX compiler fails to build ckhelper.c in debug mode 2002-04-15 21:04:00 +00:00
ian.mcgreer%sun.com
54e6d33515 fix bbroken solaris x86 build 2002-04-15 16:20:39 +00:00
ian.mcgreer%sun.com
a7256cf9ec bug 135521, change cert lookups on tokens to be actual finds instead of traversals 2002-04-15 15:22:11 +00:00
ian.mcgreer%sun.com
a9ff4e3f4d fix a cert reference leak in strsclnt 2002-04-15 14:24:15 +00:00
kaie%netscape.com
1f3856b5a5 b=136908 Make CRL manager UI work again.
r=kaie sr=ben
2002-04-15 12:18:13 +00:00
kirk.erickson%sun.com
9cf5576b32 Resolves 126087. Backed out of slot->keyCount atomic instructions. 2002-04-14 14:07:12 +00:00
ian.mcgreer%sun.com
6d36e7eddc fix error statement 2002-04-12 19:17:48 +00:00
relyea%netscape.com
7aa8e229f4 Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
ian.mcgreer%sun.com
341d4faa3c bug 136806, don't authenticate to friendly slots when adding certs 2002-04-12 18:07:49 +00:00
ian.mcgreer%sun.com
55b154c58d testing theory that unmatched atomic increment/decrement is causing occasional tinderbox failures. See bug 126087. 2002-04-12 15:51:11 +00:00
kaie%netscape.com
805157a4b3 b=102633 Changed cipher prefs dialog.
Allow the user to enable additional ciphers.
Disable two cipher suites that are no longer in use (said the NSS team).
r=javi/nelsonb/cotter sr=alecf
2002-04-12 04:44:29 +00:00
kaie%netscape.com
cc964d5bed b=119418 Fix handling of opaque signed S/Mime messages.
Also fixes some other S/Mime issues, as described in the bug.
r=ddrinan/ducarroz/darin sr=alecf
2002-04-12 04:26:40 +00:00
relyea%netscape.com
9b84261e2a Update the version field in the handle when doing the automatic update. 2002-04-12 03:43:34 +00:00
ian.mcgreer%sun.com
85eee15af6 additional fix for the patch from bug 126087. Must not set symKey->slot to NULL after leaving the freelist lock, or somebody else might pick up the symKey from the freelist, have their slot NULL'ed, and whamo.. 2002-04-11 23:05:38 +00:00
ian.mcgreer%sun.com
a07c97c4aa key should be freed when refcount == 0 after decrement. See bug 126087. 2002-04-11 19:15:31 +00:00
kaie%netscape.com
3bb822a9ab b=102633 Allow the user to enable additional ciphers, dynamically obtaining a list of ciphers from NSS.
Disable support for two ciphers that are no longer in use.
r=javi/nelsonb/cotter sr=alecf
2002-04-11 05:07:09 +00:00
kaie%netscape.com
c360fab9ce b=119481 Fix various unitialized variables.
r=kaie/javi sr=kin
2002-04-11 05:01:29 +00:00
kaie%netscape.com
583eafcb12 b=118319 Fix memory leak.
r=javi/wtc sr=blizzard
2002-04-11 04:35:08 +00:00
kaie%netscape.com
4a5807462b b=119481 Fix various unitialized variables.
r=kaie/javi sr=kin
2002-04-11 04:31:53 +00:00
kaie%netscape.com
1fa789d4cb b=129740 Fix client auth with profiles migrated from Communicator.
r=javi sr=alecf
2002-04-11 04:24:20 +00:00
kaie%netscape.com
568e70767c b=132543 Fix crash when downloading CRL
r=javi sr=alecf
2002-04-11 04:21:18 +00:00
relyea%netscape.com
f0c6675537 bug 128586 (and other) importing non-NSS pkcs#12 files.
We need to decode the privatekeyinfo attributes if they exist.
2002-04-11 00:59:43 +00:00
nelsonb%netscape.com
12322a141f Add enum names for use in forward declarations. 2002-04-10 23:27:50 +00:00
wtc%netscape.com
0d4ecebd48 Bugzilla bug 136625: prevent pk11_cert_collect from storing NULL in the
certData.certs array so that pk11_searchCertsAndTrust won't deference a
NULL pointer.  r=relyea.
2002-04-10 17:56:52 +00:00
wtc%netscape.com
09eb8a090a Bugzilla bug 119418: export NSS_CMSMessage_IsEncrypted. 2002-04-10 17:54:02 +00:00
ian.mcgreer%sun.com
e62cf2fe9d bug 135871, CERT_ImportCerts not storing temp certs
r=relyea
2002-04-09 23:46:57 +00:00
nicolson%netscape.com
aee0f2e0e1 login to token before importing private key. 2002-04-09 19:23:49 +00:00
relyea%netscape.com
8aeb4d9e03 Handle yet another PKCS #11 device which has non-standard behavior, but is well established in the market place. 2002-04-09 17:58:00 +00:00
relyea%netscape.com
78033ccb01 Add the ability to test the multi-access database feature with existing test cases. 2002-04-08 23:39:44 +00:00
relyea%netscape.com
710d547b27 Add database update capabilities to NSS softoken for multi-access database. 2002-04-08 23:37:49 +00:00
nicolson%netscape.com
ad470cfd5c merge JDK 1.4 changes to the trunk. 2002-04-08 21:46:56 +00:00
wtc%netscape.com
fa6cabf3a9 Restored the 'static' qualifier that was accidentally deleted in the
previous revision.
2002-04-05 19:38:03 +00:00
wtc%netscape.com
02c4bae431 Bug 135728: include pki3hack.h for the declaration of
STAN_AddModuleToDefaultTrustDomain, etc. r=mcgreer.
2002-04-05 19:30:38 +00:00
wtc%netscape.com
95f21cf9dd Bug 135728: should return SECFailure because the function's return type
is SECStatus.  r=mcgreer.
2002-04-05 19:25:48 +00:00
ian.mcgreer%sun.com
a1eb08fab6 remove unused Stan build files 2002-04-05 19:08:32 +00:00
ian.mcgreer%sun.com
c2e59a5608 fix broken 64-bit platforms 2002-04-05 15:19:37 +00:00
jpierre%netscape.com
dc6f8c3867 Fix world record warning message 2002-04-05 10:23:58 +00:00
relyea%netscape.com
57da95c52b Tempararily back out random change so that we don't actually read *every* file in system32. 2002-04-05 09:18:57 +00:00
relyea%netscape.com
1e4fbdcfa4 Multi-access database changes. 2002-04-05 09:17:51 +00:00
nelsonb%netscape.com
153a1e1fa9 WinCE mods (2nd try). Use NSPR for file system I/O on WinCE.
Change algorithm for selecting files to read for seeding the PRNG.
Old algorithm sometimes read very few files if opens failed.
2002-04-05 03:49:35 +00:00
nelsonb%netscape.com
ead7be632b Don't build nss/cmd or nss/lib/fortcrypt on WinCE. 2002-04-05 03:34:57 +00:00
nelsonb%netscape.com
130c1e83db On WinCE, DBM's dbopen uses NSPR file open flags rather than libc's
file open flags (which are not defined on WinCE).
2002-04-05 03:33:42 +00:00
nelsonb%netscape.com
977f0c234a Stop linking in wsock32.lib and winmm.lib on Windows. We haven't needed
these since we started linking with NSPR's DLLs, and they don't exist
on WinCE.
2002-04-05 03:30:37 +00:00
relyea%netscape.com
328abf7121 Fix linux build errors 2002-04-05 03:29:50 +00:00
relyea%netscape.com
68c7d19edd return the correct error codes to make all.sh happy. 2002-04-05 03:16:41 +00:00
sonja.mirtitsch%sun.com
1a80c72971 fixed a bug that had resulted in tinderbox results not always being uploaded 2002-04-05 01:41:34 +00:00
relyea%netscape.com
d0385fe4ca Add ';' so Solaris and Linux will build 2002-04-05 01:09:39 +00:00
nelsonb%netscape.com
c2c7b26b40 New platform files for WinCE. 2002-04-05 00:52:32 +00:00
relyea%netscape.com
24ff51d1d9 Link certutil dynamically. 2002-04-05 00:12:21 +00:00
relyea%netscape.com
9edd53c39f Add symbols so the certutil can be linked dynmically 2002-04-05 00:11:25 +00:00
relyea%netscape.com
f7df04f838 Don't try verifying the db's in a multi-access database case 2002-04-05 00:10:39 +00:00