3993 Commits

Author SHA1 Message Date
nelsonb%netscape.com
c74e098433 aeskeywrap.c - implement AES Key Wrap algorithm from RFC 3394 2003-01-14 22:16:04 +00:00
glen.beasley%sun.com
63fb2576a6 solaris pkg version 2003-01-14 20:26:36 +00:00
bishakhabanerjee%netscape.com
f96d105632 Bug 171263 - NSS test apps to check return value of NSS_Shutdown 2003-01-14 01:03:21 +00:00
bishakhabanerjee%netscape.com
3f8b500ca5 Bug 171263 - NSS test apps shd check return value of NSS_Shutdown 2003-01-13 22:36:39 +00:00
glen.beasley%sun.com
a448ee37c6 solaris pkging support 2003-01-13 20:35:36 +00:00
glen.beasley%sun.com
0ba6c54296 solaris pkg support 2003-01-13 19:44:21 +00:00
glen.beasley%sun.com
d362c01efd Solaris pkg support 2003-01-13 19:43:15 +00:00
relyea%netscape.com
6418dccb57 Check for Empty CRL list as well.
Bug 164501.
2003-01-10 19:09:46 +00:00
relyea%netscape.com
536df41f30 Declare PK11_TokenRefresh() 2003-01-10 17:53:01 +00:00
relyea%netscape.com
449530f503 Add the ability to generate certs with multiple DNS names. 2003-01-09 22:59:42 +00:00
glen.beasley%sun.com
173ecd55e4 Solaris pkg copyright 2003-01-09 22:53:13 +00:00
relyea%netscape.com
5c9c0d249b Remember to include the global: tag 2003-01-09 18:44:26 +00:00
relyea%netscape.com
e99b341301 backport NSS 3.7 fixes to the tip. 2003-01-09 18:15:11 +00:00
wtc%netscape.com
22b938bb47 Bug 186201: should handle a null 'environ' pointer, which can happen on
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com
ec08fd394a Bug 187629: do not refresh a CERTCertificate if the same instance of a
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
dbaron%dbaron.org
b9083989bb Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 23:19:20 +00:00
dbaron%dbaron.org
84f33505f2 Bug 178643: Remove uses of NS_INIT_ISUPPORTS, since it is no longer needed. r=timeless sr=jag 2003-01-08 22:45:23 +00:00
wtc%netscape.com
39a4a9cc69 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com
cd80470fa2 Bug 186586: If at NSS shutdown there are still certs in the cert caches,
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later.  New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
	base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
	pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
	util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com
209f994fd3 Need to call SSL_ClearSessionCache before calling NSS_Shutdown. 2003-01-08 21:40:52 +00:00
bishakhabanerjee%netscape.com
c50dfa28ad checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:53:13 +00:00
bishakhabanerjee%netscape.com
1b239a8ed0 checking return value of NSS_Shutdown. Bug 171263 2003-01-07 22:31:36 +00:00
bishakhabanerjee%netscape.com
985e092196 new revision: 1.19; previous revision: 1.18 2003-01-07 22:29:54 +00:00
bishakhabanerjee%netscape.com
2430651225 set and exported NSS_STRICT_SHUTDOWN. Bug 171263 2003-01-07 22:10:10 +00:00
kaie%netscape.com
8ac4991f54 b=184940 Enable additional SSL ciphers, add configuration UI
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
kaie%netscape.com
b6f99631b7 b=177260 Fix known leaks in PSM, track blocking PSM UI, track open SSL sockets
r=javi sr=darin
2003-01-06 22:23:49 +00:00
kairo%kairo.at
a6f4446e42 change all localeVersion strings, as well as brand.dtd/region.dtd to 1.3b; bug 185698, r=tao, sr=blizzard 2003-01-03 19:57:47 +00:00
dbaron%fas.harvard.edu
a34c46af22 Change my email address from dbaron@fas.harvard.edu to dbaron@dbaron.org. Comment changes only. 2003-01-01 23:53:20 +00:00
nicolson%netscape.com
9460ab9be1 Upgrade version from 3.2 to 3.3.
Uncomment MessageDigest implementations (doh!).
2003-01-01 02:58:22 +00:00
nicolson%netscape.com
5e1bcfd6d2 Add DigestTest to all.pl.
Make DigestTest and SigTest return nonzero error code on failure.
2003-01-01 02:57:50 +00:00
seawood%netscape.com
bbb7dec113 Add hack upon dependency hack to Avoid constant NSS rebuilds when pulling from CVS. 2002-12-28 05:50:17 +00:00
seawood%netscape.com
d5efcdfb6d Start installing GRE libraries & components into a separate dist/gre directory as part of the default build.
Bug #186241 r=dougt
2002-12-28 01:15:07 +00:00
wtc%netscape.com
6eb33bd89e Bug 183612: added some comments. 2002-12-24 02:25:36 +00:00
wtc%netscape.com
158222292b Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
nicolson%netscape.com
76ceb77be4 Fix 186097: ProofOfPossession.encode() has paranoid assertion. 2002-12-19 02:31:38 +00:00
wtc%netscape.com
b5e025dea3 Bug 183612: renamed some new functions to be consistent with existing
function names containing SubjectKey and PublicKey.  Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com
04963b62bb Bug 186058 2002-12-18 23:55:53 +00:00
nicolson%netscape.com
a7f090b8a6 Partial fix for 184754: assertion violation in get_token_certs_for_cache.
Don't assert if we fail to lookup the cert we just imported. It could
be a bug in the PKCS #11 driver. Instead, throw an exception.
2002-12-18 23:14:48 +00:00
kaie%netscape.com
5245de3429 Temporary fix for bug 182803.
While this masks the reported crashes, this is nothing more than a workaround patch.
As long as this patch is in place, any attempt to do profile switching at run time will fail.
We need real fixes for bug 181230 and 177260.
r=javi sr=darin
2002-12-18 12:50:35 +00:00
wtc%netscape.com
ee51cff828 Bug 183612: fixed the bug that 'extra' may be used uninitialized. r=javi. 2002-12-18 02:06:01 +00:00
wtc%netscape.com
8c5bcf00c1 Set NSS version to 3.8 Beta on the trunk. 2002-12-17 23:04:46 +00:00
wtc%netscape.com
a67a4928f3 Export CERT_DestroyOCSPResponse in 3.7. Moved HASH_GetHashObjectByOidTag,
HASH_GetHashTypeByOidTag, and SECITEM_ItemsAreEqual from 3.7 to 3.8.
2002-12-17 23:02:53 +00:00
relyea%netscape.com
2602912c3d Make sure the session is protected over PKCS #11 calls. 2002-12-17 18:22:38 +00:00
wtc%netscape.com
1c4cebd09f Need to test for null pointers before destroying the lock and condition
variable.  If NSS initialization fails, this lock and condition variable
may not get created.
2002-12-17 02:47:46 +00:00
wtc%netscape.com
5a045514c6 I made a mistake in the previous checkin. certdb.h doesn't need to be
included because the new function CERT_FindCertBySubjKeyID is declared in
cert.h.
2002-12-17 02:08:51 +00:00
wtc%netscape.com
12860a5501 Bug 183612: added support for looking up a cert by subject key ID and
creating a CMS recipient info from a subject key ID.  The patch was
contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc.
Modified Files:
	certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c
	certdb/stanpcertdb.c nss/nss.def nss/nssinit.c
	pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h
	pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c
	smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h
	smime/smime.def
2002-12-17 01:39:46 +00:00
dougt%netscape.com
8d74b970e3 Allow caller to obtain cert. r=mstoltz, javi. sr=dveditz, b=179016 2002-12-13 22:26:43 +00:00
kaie%netscape.com
3880b9cdab b=182258 Give separate signature validity and sender address mismatch feedback
r=javi sr=bienvenu
2002-12-13 20:47:32 +00:00
relyea%netscape.com
3e6d515d45 Increment the tmpbuf pointer to the correct index point 2002-12-13 19:02:13 +00:00
nicolson%netscape.com
f5c66b92aa Fix 180827: Update version strings for JSS 3.3. 2002-12-13 06:12:30 +00:00