jpierre%netscape.com
6eeafa0a3a
Stop referencing deleted quickder.h header
2002-08-08 01:55:34 +00:00
jpierre%netscape.com
81744b6f54
Updates to quick DER decoder, bug # 161215
...
Fixes from Terry's review :
- remove quick allocator
- always allocate entry array even if there is 0 entry
- rename DecodeConstructed to DecodeExplicit and use a better test for that case
- other misc small fixes
Also move SEC_QuickDERDecodeItem to secasn1.h
2002-08-08 01:54:38 +00:00
wtc%netscape.com
dd0afb2cee
Bug 148220: implements FIPS 198 conformance. r=relyea.
...
Modified Files: alghmac.c alghmac.h lowpbe.c pkcs11c.c
2002-08-07 23:27:58 +00:00
nelsonb%netscape.com
3843ef99c0
Fix bug 160207 by changing the error alerts we send for failed decryption.
2002-08-07 20:01:51 +00:00
jpierre%netscape.com
9b074c9def
Fix for 157649 - allow crlutil to do partial decoding so it can be used as a test program
2002-08-07 03:53:07 +00:00
jpierre%netscape.com
b4ea41c359
Additional error reporting
2002-08-07 03:47:23 +00:00
jpierre%netscape.com
1e8c079b69
Implement partial CRL decoding. Fix for 149816. r=wtc . Uses new quick DER decoder
2002-08-07 03:44:12 +00:00
jpierre%netscape.com
7759ca21de
Reorder functions to avoid forward declaration of DecodePointer
2002-08-07 03:40:47 +00:00
jpierre%netscape.com
4607bbf866
Be consistent in memory allocations - use QuickZAlloc
2002-08-07 03:36:46 +00:00
jpierre%netscape.com
42d8685ccc
Add new quick DER decoder. r=wtc
2002-08-07 03:25:47 +00:00
wtc%netscape.com
fdc41cd064
Bug 161316: make pk11pqg.h C++ safe.
2002-08-06 18:31:35 +00:00
jpierre%netscape.com
55bbc1b2b7
Fix for 158141 - add 5 minute slop time for OCSP
2002-08-04 02:50:40 +00:00
relyea%netscape.com
1b5946f3a0
Turn on reset functionality for multiaccessdb clients.
2002-08-02 21:41:01 +00:00
relyea%netscape.com
c0dd962ed9
1) factor out fortezzav1 from the chain processing code to make the code easier
...
to read.
2) only extract keys if we are using fortezzav1 cert (should speed up cert verify
a bit).
3) Add function to verify a specific CA cert to verify a userCert Usage.
2002-08-02 17:51:20 +00:00
relyea%netscape.com
ff0e1ac35e
Merge back 3.5 changes to the tip
2002-08-02 17:43:36 +00:00
jpierre%netscape.com
8fa534cac0
Fix compiler warnings on NT
2002-08-02 00:53:15 +00:00
jpierre%netscape.com
9ee98f355e
Fix incorrect macro usage
2002-08-02 00:28:23 +00:00
nelsonb%netscape.com
8e038c1211
Correct the test of IP addresses in Subject Alternative Name extensions.
...
bug 103752.
2002-08-01 22:51:56 +00:00
relyea%netscape.com
fee201085d
Don't crash if we try to read a nickname that has an invalid cert with it.
2002-08-01 22:28:11 +00:00
ian.mcgreer%sun.com
67ce0992b6
this was obviously backwards
2002-08-01 14:23:49 +00:00
wtc%netscape.com
79910e8ffd
Bug 157730: minor tweak suggested by brendan.
2002-08-01 05:17:49 +00:00
relyea%netscape.com
dc346d44ed
1) collections have size values that need to be updated.
...
2) handle the case where we can't get the encoding from the cert.
3) Check the cert validity when we first extract it.
2002-08-01 01:21:28 +00:00
relyea%netscape.com
4befeb7bba
Arg.. version 1.63 was a misapplied patch, (supposed to be checked into the
...
3.5 branch). The result is 1.63 backs out 1.62, which is not the intent.
restore 1.62.
2002-07-31 18:55:59 +00:00
relyea%netscape.com
d9d3b45f9e
Bug 157730. Don't crash on bogus input from a PKCS #11 device.
...
review = be & wtc.
a = asa
2002-07-31 18:50:11 +00:00
relyea%netscape.com
bc8d48d520
Protection against Token misbehaving tokens
2002-07-31 02:00:13 +00:00
wtc%netscape.com
2bd38c9821
Bug 148220: FIPS 198's key size requirement broke the NSS QA. Backing it
...
out.
2002-07-31 00:55:35 +00:00
wtc%netscape.com
9590c529f0
Bug 148220: the previous checkin missed the inclusion of secerr.h.
2002-07-30 23:19:44 +00:00
nelsonb%netscape.com
ca36e61638
Fix code to work when subjectAltName extension not present in server cert.
...
Bug 103752.
2002-07-30 23:15:43 +00:00
wtc%netscape.com
e29a299bc0
Bug 148220: enforce FIPS 198's requirement on the secret key's length.
...
Added an assertion. Set the error code on error return.
2002-07-30 22:59:13 +00:00
relyea%netscape.com
18b74cde82
Fix pkcs12 memory leak.
2002-07-30 22:51:13 +00:00
bishakhabanerjee%netscape.com
4225da3758
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 21:25:56 +00:00
bishakhabanerjee%netscape.com
65f7eca2f9
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 20:57:44 +00:00
bishakhabanerjee%netscape.com
e630b647c5
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 20:44:13 +00:00
bishakhabanerjee%netscape.com
ed1acde055
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 20:36:29 +00:00
nelsonb%netscape.com
ac73526c2c
Examine SubjectAltName extensions for SSL server name matching.
...
Bug 103752.
2002-07-30 19:32:33 +00:00
bishakhabanerjee%netscape.com
532b7c841e
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 19:01:18 +00:00
bishakhabanerjee%netscape.com
a37737a1ca
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 18:49:46 +00:00
bishakhabanerjee%netscape.com
a5ff71eccd
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 18:44:36 +00:00
wtc%netscape.com
fe44dda52c
Bug 159976: removed the incorrect linker options for building a bundle on
...
Mac OS X. The patch is contributed by Ben Hines <bhines@alumni.ucsd.edu>.
2002-07-29 21:48:39 +00:00
nelsonb%netscape.com
b26f28e997
Add missing const qualifiers to NSS's regular expression match functions.
2002-07-29 21:30:31 +00:00
wtc%netscape.com
869ca6f82b
Fixed the comment. The length of the secret may be larger than 64 bytes.
2002-07-26 18:20:59 +00:00
wtc%netscape.com
80aae405d5
Removed unused ASN.1 templates and unnecessary declarations.
...
Modified Files: lowcert.c pcertt.h
2002-07-25 03:59:38 +00:00
relyea%netscape.com
2cf20e0041
return certs in sorted order.
2002-07-23 00:34:20 +00:00
bishakhabanerjee%netscape.com
5c04279163
Setting number of tests to 252 to take out warnings on nightly QA reports -Bug 156959
2002-07-19 23:46:10 +00:00
wtc%netscape.com
bb5752e0f0
Bug 158339: we should not call secmod_freeParams if RNG_RNGInit fails.
2002-07-19 18:31:30 +00:00
jpierre%netscape.com
d57baf5140
Fix for 158221 - make crlutil save memory by using the new PK11_ImportCRL function with the CRL_DECODE_DONT_COPY_DER option
2002-07-19 01:07:27 +00:00
jpierre%netscape.com
a82b9f46ba
158005 - add new CRL decode and import functions . Benefits are :
...
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
jpierre%netscape.com
9a7c0e7303
Fix for 156802 - remove improper check in CRL decoding
2002-07-19 00:12:13 +00:00
jpierre%netscape.com
c509948a27
Remove unreferenced variables
2002-07-18 23:50:03 +00:00
jpierre%netscape.com
24426f202b
Fix for 139292 - NSS_NoDBInit regression
2002-07-18 23:08:55 +00:00