wtc%netscape.com
59a795178e
Bug 201808:We don't need to use _declspec(dllexport) to export
...
C_GetFunctionList now. nssckbi.def takes care of that.
Modified Files: ckapi.perl nssck.api
2003-04-17 00:07:06 +00:00
wtc%netscape.com
5ca106ce02
Bug 201808: added nssckbi.def, which exports C_GetFunctionList.
...
Modified Files: manifest.mn
Added Files: nssckbi.def
2003-04-16 22:22:22 +00:00
jpierre%netscape.com
d07c7a50f5
Fix for 201259 . Make the default client auth callback NSS_GetClientAuthData work with dual-key certs. r=nelsonb, sr=wtc
2003-04-09 22:23:10 +00:00
nelsonb%netscape.com
92fc1f3b0f
Fix bug 200225. Don't report invalid CA cert on trusted root CAs.
2003-04-08 04:49:39 +00:00
wtc%netscape.com
7ce0258abb
Set NSS version to 3.9 Beta.
2003-04-08 00:29:54 +00:00
jpierre%netscape.com
277eb23aae
Fix for bug 200394 - update softoken version to 3.8 . r=wtc
2003-04-03 02:14:59 +00:00
wtc%netscape.com
bf0da69d28
Set NSS version to 3.8.
2003-04-02 23:27:01 +00:00
jpierre%netscape.com
ed4c7c9bc6
Fix for 199227 - keep enumerating certs in tokens even if one token fails. r=relyea
2003-04-01 00:07:05 +00:00
wtc%netscape.com
86445ec495
Bug 195127: Turn off debugging output now that we have the AIX tinderbox
...
working correctly.
2003-03-29 04:30:02 +00:00
nelsonb%netscape.com
3f52ba47c1
Changes to enable ECC over characteristic 2^m fields.
...
Contribution from Vipul Gupta <Vipul.Gupta@Sun.COM>
Modified Files:
nss/cmd/strsclnt/strsclnt.c nss/lib/cryptohi/seckey.c
nss/lib/freebl/blapit.h nss/lib/freebl/ec.c
nss/lib/freebl/manifest.mn nss/lib/freebl/mpi/Makefile
nss/lib/softoken/ecdecode.c nss/lib/softoken/pkcs11.c
nss/lib/ssl/ssl3con.c nss/lib/util/secoid.c
nss/lib/util/secoidt.h
2003-03-29 00:18:30 +00:00
nelsonb%netscape.com
29640f53f9
Add missing return statement.
2003-03-27 03:07:47 +00:00
nelsonb%netscape.com
365a37032d
Add support for Elliptic Curve Cryptography. Bug 195135.
...
Contributor(s):
* Sheueling Chang Shantz <sheueling.chang@sun.com> and
* Douglas Stebila <douglas@stebila.ca>, Sun Microsystems Laboratories
Added Files:
GF2m_ecl.c GF2m_ecl.h mpi/mp_gf2m.c mpi/mp_gf2m.h
mpi/tests/mptest-b.c
2003-03-26 05:03:11 +00:00
wtc%netscape.com
a98f4c0628
Bug 199082: checked in Nelson's patch, which
...
a) changes selfserv to test the return value from NSS_Shutdown.
b) changes SECMOD_Shutdown to set the error code SEC_ERROR_BUSY before
returning SECFailure.
c) Adds a new function SSL_ShutdownServerSessionIDCache to ssl.h.
d) Changes selfserv to call SSL_ShutdownServerSessionIDCache before calling
NSS_Shutdown.
Modified Files:
cmd/selfserv/selfserv.c lib/pk11wrap/pk11util.c
lib/ssl/ssl.def lib/ssl/ssl.h lib/ssl/ssl3con.c
lib/ssl/sslimpl.h lib/ssl/sslsnce.c
2003-03-26 00:31:13 +00:00
jpierre%netscape.com
edf2084f38
Fix build
2003-03-25 02:13:33 +00:00
ian.mcgreer%sun.com
26d35ef643
bug 198622, redundant memset calls
2003-03-24 22:25:52 +00:00
relyea%netscape.com
126930373b
Bug 142867: pk12util needs to be able to import intermediate CA's into hw
...
tokens.
2003-03-24 19:09:08 +00:00
relyea%netscape.com
6f6bad23cb
bug 168393 PK11SDR_Decrypt() does not call PK11_Authenticate() before search
...
for the key.
2003-03-22 00:22:26 +00:00
relyea%netscape.com
4492ee1630
bug 198470 "Cached certs not updated after token reset." r=ian.mgreer r=wtc
2003-03-22 00:18:45 +00:00
wtc%netscape.com
e60662c072
Resurrected the workaround in revision 1.2. It may be difficult for some
...
OSF1 users to upgrade their C compiler to the required versions.
2003-03-21 15:10:11 +00:00
wtc%netscape.com
a5c5715cab
Bugzilla 198461: fixed build problem on OpenBSD. The patch is contributed
...
by timeless@bemail.org .
2003-03-21 05:24:29 +00:00
wtc%netscape.com
47c8a2f084
Bugzilla 198481: fixed all build problems with gcc on Solaris.
...
1. Removed the workarounds we put in before -- hardcoding LD to
/usr/ccs/bin/ld and passing the -B/usr/ccs/bin/ flag to gcc.
2. Use the compiler, $(CC), to build shared libraries.
3. If gcc is used, determine whether gcc uses GNU ld or Solaris
ld and set the new make variable GCC_USE_GNU_LD accordingly.
Modified Files:
coreconf/SunOS5.mk nss/cmd/platlibs.mk nss/lib/freebl/Makefile
2003-03-21 03:31:00 +00:00
relyea%netscape.com
9f0836d49e
Add OID Definition for AOL screenname attribute.
2003-03-20 23:53:39 +00:00
wtc%netscape.com
ba7bdf8f1c
White space change simply to cause the Mozilla tinderboxes to rebuild.
2003-03-20 23:12:43 +00:00
nelsonb%netscape.com
de78b20e51
Fix type mismatches in return values that were breaking gcc builds.
...
No bug number.
2003-03-18 03:24:59 +00:00
relyea%netscape.com
abfd3a64f2
Make indention style consistant with SSL's usage, not softoken/pk11 usage.
2003-03-13 16:36:43 +00:00
wtc%netscape.com
79ff346dcb
Bug 197147: removed an invalid/unnecessary comparison of two
...
PRIntervalTimes in pk11_InDelayPeriod.
2003-03-13 01:16:00 +00:00
relyea%netscape.com
d9b9435a62
Allow for tokens that don't require login. bug 197082
2003-03-12 19:22:32 +00:00
jpierre%netscape.com
52ed6170ab
Fix for 192590 - add ability to encode NSSCMSRecipientInfo . r=javi, wtc
2003-03-11 03:38:54 +00:00
wtc%netscape.com
5fc33ad0f7
Bug 196776: the 'src' argument to the ASN.1 encoding functions should be
...
declared 'const'.
Modified Files: secasn1.h secasn1e.c
2003-03-11 02:31:16 +00:00
jpierre%netscape.com
322b4851d6
Fix for bug 175167 - don't use mark & release in QuickDER decoder . r=wtc
2003-03-07 01:13:22 +00:00
relyea%netscape.com
62acf06bc9
Remove external use of SEC_TraversePermCerts(). Bug 130968.
2003-03-05 01:04:33 +00:00
relyea%netscape.com
3db543d86d
Bug 185245. including wtc's comments.
...
Don't reference memory beyond the end the the data element when decoding a
SubjectEntry. Prevents crashes from corrupted Subject Entries.
2003-03-05 01:02:03 +00:00
relyea%netscape.com
c62f62ef69
Fix memory leaks. (roll fixes from 3.7 BRANCH).
2003-03-05 00:59:36 +00:00
relyea%netscape.com
b47c2269f6
bug 162976: make crl update atomic. Set up new Crl with a new Object ID which is different from the old one.
2003-03-04 22:36:27 +00:00
relyea%netscape.com
a9f27f307f
Bug 162976. Make CRL updates 'atomic' . Insert new CRL before deleting the
...
old one.b
2003-03-04 22:34:56 +00:00
relyea%netscape.com
9024b2c79f
Fix QA failures on tip (don't dereference through a NULL pointer).
2003-03-03 19:46:22 +00:00
wtc%netscape.com
8f947046b1
Bug 195127: 1. Enable DEBUG_SHVERIFY. 2. Added debug output to print the
...
file name if PR_Open fails.
2003-03-01 01:53:11 +00:00
relyea%netscape.com
ed4ffe44f6
bug 19590
...
RFE:Add ability to encode/decode NSSCMSRecipientInfo structures
r=javi,wtc
2003-02-28 23:32:29 +00:00
ian.mcgreer%sun.com
4a82c09e70
bug 191757, InitOIDHash() not threadsafe
...
r=relyea
2003-02-28 21:13:20 +00:00
wtc%netscape.com
888f478faf
Bug 195196: fixed a typo.
2003-02-27 14:49:30 +00:00
nelsonb%netscape.com
f87129ad87
Add support for Elliptic Curve Cryptography. Bug 195135.
...
Modified Files:
cmd/lib/SECerrs.h cmd/selfserv/selfserv.c
cmd/tstclnt/tstclnt.c lib/cryptohi/keyhi.h
lib/cryptohi/keythi.h lib/cryptohi/seckey.c
lib/cryptohi/secvfy.c lib/freebl/Makefile lib/freebl/blapi.h
lib/freebl/blapit.h lib/freebl/ldvector.c lib/freebl/loader.c
lib/freebl/loader.h lib/freebl/manifest.mn lib/nss/nss.def
lib/pk11wrap/pk11skey.c lib/pk11wrap/pk11slot.c
lib/softoken/lowkeyti.h lib/softoken/manifest.mn
lib/softoken/pkcs11.c lib/softoken/pkcs11c.c
lib/softoken/pkcs11t.h lib/ssl/ssl3con.c lib/ssl/ssl3prot.h
lib/ssl/sslcon.c lib/ssl/sslenum.c lib/ssl/sslimpl.h
lib/ssl/sslinfo.c lib/ssl/sslproto.h lib/ssl/sslsecur.c
lib/ssl/sslsock.c lib/ssl/sslt.h lib/util/secerr.h
lib/util/secoid.c lib/util/secoidt.h
Added Files:
lib/freebl/GFp_ecl.c lib/freebl/GFp_ecl.h lib/freebl/ec.c
lib/freebl/ec.h lib/softoken/ecdecode.c
2003-02-27 01:31:38 +00:00
nelsonb%netscape.com
53f415bde5
Fix bug 194840. Get new random seed before each attempt to sign with DSA.
2003-02-25 23:45:23 +00:00
wtc%netscape.com
3d99d3f6a8
Bug 190537: build OS/2 DLLs using the map files to control symbol export.
...
The patch is contributed by Javier Pedemonte <pedemont@us.ibm.com>.
Modified files: coreconf/OS2.mk coreconf/rules.mk nss/lib/ckfw/nssck.api
2003-02-25 01:40:04 +00:00
nelsonb%netscape.com
15064057ce
Fix bug 160207. Make TLS implementation resistant to timing attacks on
...
CBC block mode cipher suites in TLS. See bug for details.
2003-02-21 23:00:16 +00:00
wtc%netscape.com
08b98e2fe3
Bug 194309: cvs removed libpath.c because the freebl_GetLibraryFilePathname
...
function has been replaced by the new NSPR 4.3 function
PR_GetLibraryFilePathname.
2003-02-21 02:40:52 +00:00
wtc%netscape.com
c049211d54
Bug 194309: replaced freebl_GetLibraryFilePathname by the new NSPR 4.3
...
function PR_GetLibraryFilePathname.
Modified files: config.mk manifest.mn shvfy.c
2003-02-21 00:41:24 +00:00
wtc%netscape.com
0cf4cab50e
Bug 194222: Removed SECMOD_CallOnce. It is replaced by the new NSPR 4.3
...
function PR_CallOnceWithArg.
Modified files: nss/nssinit.c pk11wrap/pk11cert.c pk11wrap/secmodi.h
2003-02-20 16:58:57 +00:00
jpierre%netscape.com
507f9b47a8
Patch for 193961 - incorporate Wan-Teh's feedback
2003-02-19 21:50:49 +00:00
jpierre%netscape.com
580265aeb3
Fix for bug 193691 . Make QuickDER return an error rather than assert if extraneous data is present in the buffer
2003-02-19 02:29:48 +00:00
wtc%netscape.com
3294d2a320
Bug 193367: do not call PR_Now() in a loop. r=nelsonb.
2003-02-18 23:26:39 +00:00
ian.mcgreer%sun.com
fbd8eb30c2
bug 174200, don't attempt to decode cert when destroying it, handle failure
...
to decode cert serial number
r=nelsonb
2003-02-18 20:53:14 +00:00
wtc%netscape.com
b485d030fd
Bug 188856: it is not necessary to declare 'crv' in these blocks because it
...
is already declared in the outer scope.
2003-02-18 02:47:04 +00:00
wtc%netscape.com
629dd8c57a
Bug 192617: export NSS_CMSRecipientInfo_Wrap/UnwrapBulkKey from the smime3
...
shared library.
2003-02-18 00:45:34 +00:00
relyea%netscape.com
4c4ce5586d
Bug 167756. Address Nelson's review comments. remove socket specific latency
...
in favor of a slot specific latency test (already done by pk11wrap code).
2003-02-15 01:21:25 +00:00
relyea%netscape.com
7737f1bf2b
bug193367: Don't blindly copy all the certs from a given S/MIME message into the db.
2003-02-15 00:23:04 +00:00
wtc%netscape.com
42ae3a8e2c
There should be no token after #endif.
2003-02-14 05:32:35 +00:00
relyea%netscape.com
f9dd52a261
Turn off debugging output now that we have the tinderboxen working correctly.
2003-02-13 17:41:45 +00:00
relyea%netscape.com
d104d1a923
Always free the key reference passed to us from the client
2003-02-10 22:36:45 +00:00
nelsonb%netscape.com
a39cc492bc
Fix bug 190527. Properly extend buffer when data exceeds 512 bytes.
2003-02-07 23:09:35 +00:00
relyea%netscape.com
267c0b8095
Add debugging information. Turn on tempararily to get debug info from tinderbox failures.
2003-02-07 19:22:42 +00:00
nelsonb%netscape.com
140acf91e3
Move the implementation of the TLS Pseudo Random Function (PRF) from
...
pkcs11c.c into a new file: tlsprf.c.
2003-02-07 06:42:20 +00:00
nelsonb%netscape.com
63cbaffd59
Remove unreferenced local variables from functions.
2003-02-07 05:08:01 +00:00
wtc%netscape.com
5cc66223d8
Backed out the previous checkin because it doesn't work on Windows.
2003-02-06 05:33:33 +00:00
wtc%netscape.com
025206b16f
Bug 177387: include the *.chk files in the mdbinary.jar files generated by
...
the release makefile target.
Modified Files: lib/freebl/manifest.mn lib/softoken/manifest.mn
2003-02-06 03:52:37 +00:00
relyea%netscape.com
90be81e5ad
The NSPR get shared lib interface requires the library name only,
...
not a partial path to the library. This affects AIX.
2003-02-06 00:49:09 +00:00
relyea%netscape.com
f419ac9454
Try to load the new module before we've unloaded the old one. This now
...
works in NSS, and it allows us to back out if the new one didn't load (because
FIPS could not verify the shared module for instance).
2003-02-05 00:35:53 +00:00
relyea%netscape.com
447f0c56f9
Check bug 188856 into the tip.
...
1)return proper error code in more cases. 2) Fix bug in DH KeyPair Generation.
the essential part of this fix in pkcs11c.c where we add the CKA_NETSCAPE_DB
attribute on Diffie-Hellman key gen. I don't know why the code would have even
thought of working without this (unless we were testing with pregenerated
keys).
The rest of the fix is to surface more of the PKCS #11 error back up. There is
a separate bug to continue tracking the issue of lost PKCS #11 errors.
2003-01-31 23:39:34 +00:00
nelsonb%netscape.com
3f08900d2f
Fix an uninitialized variable. Bug 191396.
2003-01-31 22:26:56 +00:00
nelsonb%netscape.com
340366e2ff
Fix crash in CERT_CheckKeyUsage caused by dereferencing a returned pointer
...
without checkin it for NULL.
2003-01-31 02:49:13 +00:00
nelsonb%netscape.com
9b5a756ce6
Fix bug 191396. Don't generate SEC_ERROR_LIBRARY_FAILURE unnecessarily
...
while doing dsa signatures.
2003-01-31 02:39:36 +00:00
relyea%netscape.com
e7212afe42
FIPS library verifier.
2003-01-30 23:38:07 +00:00
relyea%netscape.com
691d3e25e1
FIPS library verifier
2003-01-30 23:36:37 +00:00
wtc%netscape.com
060a90105f
Bug 177387: temporarily added freebl_GetLibraryFilePathname to libfreebl.a.
...
This function has the same semantics as the NSPR 4.3 function
PR_GetLibraryFilePathname. This patch should be backed out when NSPR 4.3 is
released.
Modified Files: config.mk manifest.mn
Added Files: libpath.c
2003-01-30 07:00:32 +00:00
jpierre%netscape.com
7f77163102
Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute. r=wtc
2003-01-30 05:12:10 +00:00
jpierre%netscape.com
da30938629
Fix for 190424 - don't query CKA_NETSCAPE_EMAIL attribute . r=wtc
2003-01-30 03:02:55 +00:00
jpierre%netscape.com
455618e1a1
Patch for memory leak . Bug 189976 . r=wtc
2003-01-30 02:59:35 +00:00
relyea%netscape.com
99d710be9c
New header file to dump defines for managing signed FIPs libraries.
2003-01-28 18:50:02 +00:00
relyea%netscape.com
6be85505ba
Export functions needed for modutil to be compiled dynamically.
2003-01-28 16:41:46 +00:00
relyea%netscape.com
d58c1ec22c
Remove dead code and symbols from lib jar so that modutil can compile when
...
linked with it.
2003-01-28 16:39:32 +00:00
relyea%netscape.com
368b83f17c
Sign 3 sets of changes are here:
...
1) Provide accessor functions for the PK11_DefaultArray so that modutil
does not have to link statically to access it.
2) Try setting the attribute on an object before we go to the work of copying
it (Function Only used in Java).
3) Optimize searching for the more common types of attributes.
2003-01-28 16:38:04 +00:00
wtc%netscape.com
228b3e52ed
Bug 190396.
...
Don't fail the search if the token returned an error that indicates that it
legitimately couldn't find a CRL
2003-01-24 06:37:03 +00:00
relyea%netscape.com
998b101109
Bug 167756. Clean up previous patch: add lastState field, and set the SSL Error on failure.
2003-01-23 22:02:37 +00:00
relyea%netscape.com
17117c5e23
Write changes back to the database when we correct incorrect user bit settings.
2003-01-23 19:38:53 +00:00
relyea%netscape.com
f83c287af6
Set the size value when extracting a key 19011.
2003-01-23 17:30:15 +00:00
relyea%netscape.com
7d03017158
Check for token removal before continuing SSL sessions which have client auth
...
with certs associated with that token. bug 167756.
2003-01-23 17:27:34 +00:00
relyea%netscape.com
61a6011027
Fix bug 180824 Version 3.4 string hard coded in default token name.
2003-01-23 17:16:50 +00:00
jpierre%netscape.com
f593a5bac0
Fix for bug #126930 - make SSL_ConfigServreSessionIDCache work on OS/2 by not using shared memory in single process mode. r=nelsonb
2003-01-23 00:15:08 +00:00
wtc%netscape.com
8518277691
Bug 190112: PK11_ReadAttribute needs to call PK11_ExitSlotMonitor before
...
we return because of allocation failure.
2003-01-22 17:44:36 +00:00
wtc%netscape.com
0a514a798c
Bug 189546: updated the comments to reflect what the new code does.
2003-01-22 06:24:53 +00:00
nelsonb%netscape.com
8a025005e9
Add OIDs for AES Key Wrap mechanism.
2003-01-22 04:35:54 +00:00
wtc%netscape.com
b4f31cb711
Bug 189546: moved the switch statement for known key lengths to the
...
beginning of PK11_GetKeyLength to work around a deadlock in nCipher
module if PK11_ExtractKeyValue is called.
2003-01-22 03:55:21 +00:00
nelsonb%netscape.com
65a0422f22
Implement new AES Key Wrap mechanisms. Bug 167818.
2003-01-22 03:13:04 +00:00
wtc%netscape.com
fdf8f4dc25
Bug 189345: we incorrectly assumed that a C_XxxFinal call to determine the
...
length of the buffer would also terminate the active operation if the
buffer length is 0. PKCS#11 says it doesn't, so we need to make the
additional C_XxxFinal call even if the buffer length is 0. Allocate a
buffer from the heap if the stack buffer is too small and free the
heap-allocated buffer before we return from pk11_Finalize. We can use the
stack buffer if count is equal to its size.
2003-01-21 19:33:24 +00:00
relyea%netscape.com
65a9359e6e
Bug 198364. Tokens keys do not own their handles. Don't let the key
...
get destroyed when freed.
2003-01-18 01:49:33 +00:00
nelsonb%netscape.com
b39068212e
When wrapping secret keys with an unpadded block cipher, null padd the keys
...
as necessary, per the PKCS 11 spec. Also, implement padding and unpadding
for single-part only ciphers.
2003-01-17 05:50:08 +00:00
wtc%netscape.com
3cfd1da0cc
Bug 145029: fixed compiler warnings (mostly "xxx might be used
...
uninitialized").
2003-01-17 02:49:11 +00:00
nelsonb%netscape.com
66dbe61852
One more fix for HPUX and Solaris.
2003-01-16 01:44:43 +00:00
jpierre%netscape.com
bd1c6e2d6f
Fix incorrect usage of QuickDER . See bug 160805 comment 16
2003-01-16 00:56:10 +00:00
nelsonb%netscape.com
52c0e7f513
Fix compilation error. This file is only compiled on 2 platforms.
2003-01-16 00:55:53 +00:00
nelsonb%netscape.com
191e2830e1
Switch from the old vendor-defined mechanism numbers to the new official
...
PKCS 11 mechanism numbers. These numbers will appear in v2.20.
2003-01-16 00:43:58 +00:00
nelsonb%netscape.com
48e7307212
Enforce that softoken's mechanisms are used only with the PKCS 11
...
functions that they're defined to work with.
2003-01-16 00:28:05 +00:00
nelsonb%netscape.com
b4debe71ef
Complete the addition of AES Key Wrap to blapi in freebl.
2003-01-16 00:15:21 +00:00
nelsonb%netscape.com
f8ffa9b2df
Remove the implementation of CKM_KEY_WRAP_LYNKS from softoken.
2003-01-16 00:14:07 +00:00
nelsonb%netscape.com
c74e098433
aeskeywrap.c - implement AES Key Wrap algorithm from RFC 3394
2003-01-14 22:16:04 +00:00
relyea%netscape.com
6418dccb57
Check for Empty CRL list as well.
...
Bug 164501.
2003-01-10 19:09:46 +00:00
relyea%netscape.com
536df41f30
Declare PK11_TokenRefresh()
2003-01-10 17:53:01 +00:00
relyea%netscape.com
5c9c0d249b
Remember to include the global: tag
2003-01-09 18:44:26 +00:00
relyea%netscape.com
e99b341301
backport NSS 3.7 fixes to the tip.
2003-01-09 18:15:11 +00:00
wtc%netscape.com
22b938bb47
Bug 186201: should handle a null 'environ' pointer, which can happen on
...
Solaris if NSS is loaded with dlopen() by an executable linked with the
RTLD_GROUP flag.
2003-01-09 04:34:31 +00:00
wtc%netscape.com
ec08fd394a
Bug 187629: do not refresh a CERTCertificate if the same instance of a
...
cached cert is added to the collection.
2003-01-09 04:29:01 +00:00
wtc%netscape.com
39a4a9cc69
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
2003-01-08 21:58:29 +00:00
wtc%netscape.com
cd80470fa2
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
util/secerr.h
2003-01-08 21:48:47 +00:00
wtc%netscape.com
6eb33bd89e
Bug 183612: added some comments.
2002-12-24 02:25:36 +00:00
wtc%netscape.com
158222292b
Bug 183612: SECMOD_InitCallOnce() and SECMOD_CleanupCallOnce() should be
...
declared and defined with an argument list of "(void)" instead of "()".
Modified Files: pk11cert.c secmodi.h
2002-12-19 07:03:39 +00:00
wtc%netscape.com
b5e025dea3
Bug 183612: renamed some new functions to be consistent with existing
...
function names containing SubjectKey and PublicKey. Moved internal
functions to private headers and use the lowercase cert_ prefix for the
internal functions for subject key ID mapping hash table. r=nelsonb.
2002-12-19 00:26:34 +00:00
relyea%netscape.com
04963b62bb
Bug 186058
2002-12-18 23:55:53 +00:00
wtc%netscape.com
ee51cff828
Bug 183612: fixed the bug that 'extra' may be used uninitialized. r=javi.
2002-12-18 02:06:01 +00:00
wtc%netscape.com
8c5bcf00c1
Set NSS version to 3.8 Beta on the trunk.
2002-12-17 23:04:46 +00:00
wtc%netscape.com
a67a4928f3
Export CERT_DestroyOCSPResponse in 3.7. Moved HASH_GetHashObjectByOidTag,
...
HASH_GetHashTypeByOidTag, and SECITEM_ItemsAreEqual from 3.7 to 3.8.
2002-12-17 23:02:53 +00:00
relyea%netscape.com
2602912c3d
Make sure the session is protected over PKCS #11 calls.
2002-12-17 18:22:38 +00:00
wtc%netscape.com
1c4cebd09f
Need to test for null pointers before destroying the lock and condition
...
variable. If NSS initialization fails, this lock and condition variable
may not get created.
2002-12-17 02:47:46 +00:00
wtc%netscape.com
5a045514c6
I made a mistake in the previous checkin. certdb.h doesn't need to be
...
included because the new function CERT_FindCertBySubjKeyID is declared in
cert.h.
2002-12-17 02:08:51 +00:00
wtc%netscape.com
12860a5501
Bug 183612: added support for looking up a cert by subject key ID and
...
creating a CMS recipient info from a subject key ID. The patch was
contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc.
Modified Files:
certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c
certdb/stanpcertdb.c nss/nss.def nss/nssinit.c
pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h
pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c
smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h
smime/smime.def
2002-12-17 01:39:46 +00:00
relyea%netscape.com
3e6d515d45
Increment the tmpbuf pointer to the correct index point
2002-12-13 19:02:13 +00:00
relyea%netscape.com
88da4209b7
Use correct sense of the timeout value.
2002-12-13 00:25:21 +00:00
nelsonb%netscape.com
a4ffefd8be
Support SHA256, SHA384, and SHA512 hashes in NSS.
2002-12-12 06:05:45 +00:00
relyea%netscape.com
15ce24e7da
Don't break solaris or linux (add the ';')
2002-12-11 17:56:49 +00:00
relyea%netscape.com
986ee61360
Export new command to pull for token change events.
2002-12-11 17:53:20 +00:00
relyea%netscape.com
b3956b6cb3
Add token removal blocking function.
2002-12-11 17:43:24 +00:00
relyea%netscape.com
5a83c35578
Make SubjectAltEncode a public function. Fixes build breakage in Linux
2002-12-10 17:41:16 +00:00
relyea%netscape.com
fa12d2382e
Export the AltSubjectEncode function so our test programs can build certs
...
with multiple email addresses.
2002-12-10 17:15:15 +00:00
relyea%netscape.com
962c8ddfb3
Create profiles for all the email addresses in a certificate.
2002-12-10 17:14:17 +00:00
relyea%netscape.com
603a1de75c
Fix padding value.
2002-12-06 19:11:57 +00:00
nelsonb%netscape.com
62b8516bb9
Don't compile the .c files in lib/pki1 on the trunk. These files are used
...
only in Stan.
2002-12-05 22:15:36 +00:00
wtc%netscape.com
5fa50f792d
Bug 39494: added a check to prevent buffer overflow. r=mcgreer,nelsonb.
2002-12-04 23:41:49 +00:00
wtc%netscape.com
89bb676522
Fixed the build breakage of const unsigned char[] and unsigned char *
...
mismatch on the Mac (compiler warnings on other platforms) by adding
(unsigned char *) typecasts. r=relyea. (Bug 183350)
2002-12-04 00:28:56 +00:00
wtc%netscape.com
0def6ffdbe
Bug 181878: fixed two more bugs in the new code to support multiple email
...
addresses per certificate. r=nelsonb.
2002-11-27 01:28:03 +00:00
relyea%netscape.com
c40360b6a9
More review changes,
...
Fix incorrect return in pcertdb.c
2002-11-26 22:14:56 +00:00
relyea%netscape.com
25a292272c
Incorporate some of Nelson's review changes.
...
Collapse all the profile data into an array for easier processing when printing out.
2002-11-26 21:03:18 +00:00
wtc%netscape.com
fd00621e5c
Bug 180228: moved CERT_CRLCacheRefreshIssuer from the NSS_3.6.1 section to
...
the NSS_3.7 section.
2002-11-26 19:21:55 +00:00
relyea%netscape.com
c296a3a69f
Incorporate Terry's and Nelson's reviews.
2002-11-26 18:27:25 +00:00
nelsonb%netscape.com
4bdff07d6f
Back out my last change.
2002-11-26 07:07:20 +00:00
nelsonb%netscape.com
c4ae2fc1f4
Eliminate bug due to uninitialized variable index. Eliminate leak.
...
Remove lots of warnings about signed/unsigned and assigning int to uchar.
2002-11-26 05:58:51 +00:00
relyea%netscape.com
58543311f7
Bug 181878 allow multiple email addresses to point to a single subject record.
2002-11-26 00:13:54 +00:00
nelsonb%netscape.com
b415060cf8
Put the nss 3.7 section after the nss 3.6.1 section.
2002-11-21 23:22:52 +00:00
ian.mcgreer%sun.com
72edde5172
bug 172247, don't allow import of duplicate issuer/serial certs
2002-11-21 20:43:15 +00:00
nelsonb%netscape.com
924b265d37
Use the 32-bit code on Solaris x86 platforms, too.
2002-11-21 02:54:04 +00:00
nelsonb%netscape.com
c9be494de9
Back out revision 1.2, which was a workaround for a c preprocessor bug
...
in a certain version of the c compiler for Dec/Compaq Alpha OSF1.
The file now requires one of these compilers on that platform:
Compaq C V6.3-132 or Compaq C V6.4-214 (dtk)
2002-11-20 05:25:58 +00:00
nelsonb%netscape.com
6986b980f7
Optimization: change macros to do only 32-bit arithmetic on platforms
...
with only 32-bit registers.
2002-11-20 00:48:09 +00:00
jpierre%netscape.com
e965a244ec
Fix for bug 180894 - don't assert in ShutdownCRLCache()
2002-11-19 21:37:50 +00:00
nelsonb%netscape.com
0391c3a0ab
Change all functions that create contexts for encryption to treat their
...
input buffers as const. Warning reduction.
2002-11-16 06:09:58 +00:00
jpierre%netscape.com
071bcc8ef0
Fix again?
2002-11-16 05:05:17 +00:00
jpierre%netscape.com
2854b0f273
Fix build again !
2002-11-16 04:27:39 +00:00
nelsonb%netscape.com
c69f246d7a
Recognize new SHAxxx OIDs.
2002-11-16 03:34:53 +00:00
jpierre%netscape.com
a46a21ce98
Fix build
2002-11-16 03:32:40 +00:00
nelsonb%netscape.com
d2a0920045
Correct softoken routines to work with new larger SHAxxx hashes.
2002-11-16 03:32:39 +00:00
nelsonb%netscape.com
5556b4b77f
Correct HMAC code to work with new larger SHAxxx hashes.
2002-11-16 03:30:37 +00:00
nelsonb%netscape.com
dd4c5651b8
Add new SHAxxx hash algorithms to tables of SECHashObjects.
2002-11-16 03:29:32 +00:00
nelsonb%netscape.com
0575c4bc91
Declare new vendor-defined mechanisms for SHA256, SHA384 and SHA512.
2002-11-16 03:25:01 +00:00
nelsonb%netscape.com
eeb4bc7c50
Now that we have hashes larger than SHA1,
...
#define HASH_LENGTH_MAX SHA512_LENGTH
2002-11-16 03:21:53 +00:00
nelsonb%netscape.com
6b4fae5a4a
Don't reject a cert request with an empty list of CA cert names.
...
Don't crash with an empty CA name list.
2002-11-16 03:19:48 +00:00
nelsonb%netscape.com
9ee53c1fde
Add "const" modifier to all fixed arrays used for keys or known text.
2002-11-16 01:00:44 +00:00
jpierre%netscape.com
d654882327
Patch for 180228 - export CRL cache flush API . r=wtc
2002-11-15 05:04:05 +00:00
ian.mcgreer%sun.com
476282ab25
bug 39494, handle non-standard AVAs properly
...
r=nelsonb
2002-11-14 17:04:43 +00:00
relyea%netscape.com
de6635b1b4
Adjust the time values so we have correct and consistant displays.
2002-11-11 22:01:57 +00:00
relyea%netscape.com
c89a0a7444
Multi-access database race condition patches. These changes are already checked
...
into NSS 3.6.1.
2002-11-11 22:00:03 +00:00
jpierre%netscape.com
cc471dc4ee
Assert if the QuickDER decoder does not consume all the input
2002-11-09 01:56:01 +00:00
relyea%netscape.com
df7578f751
Bug 176667: kaie authored the patch, ian/relyea reviewed it.
2002-11-08 19:10:54 +00:00
jpierre%netscape.com
3fe1f54335
Fix for 177798 . Improve handling of initialization / shutdown of the CRL cache using a static status variable
2002-11-07 00:02:31 +00:00
ian.mcgreer%sun.com
9ec0046baa
bug 177366, clean up refcounting
...
r=relyea
2002-11-06 18:53:55 +00:00
nelsonb%netscape.com
e1484b41c3
Workaround a c preprocessor bug on a certain 64-bit platform. Bug 178314.
2002-11-05 01:52:49 +00:00
nelsonb%netscape.com
6710514e32
Fix missing strings that cause crash in SSL_SecurityStatus(). Bug 178342.
2002-11-05 00:25:20 +00:00
relyea%netscape.com
9452f46ac8
db8 code part 1:
...
1) Create new dbs with 32 k buffers.
2) New dbs never store a single entry greater than 30 k (those are stored
using the blob code).
3) NSS can run with either new or old dbs read only.
4) If possible a new db is upgraded from and old db.
2002-11-04 19:31:59 +00:00
nelsonb%netscape.com
c2ff4f68a2
Add some processor and compiler dependent optimizations to SHA1.
2002-11-02 01:53:01 +00:00
nelsonb%netscape.com
2ff4c01664
Add SHA256 SHA512 and SHA384 hashes to freebl.
2002-11-02 01:51:44 +00:00
jpierre%netscape.com
edd979ec33
Fix for bug 177798 - NULL pointers in ShutdownCRLCache to allow shutdown/restart
...
of NSS.
2002-11-02 00:07:48 +00:00
jpierre%netscape.com
9c6ca52dde
Remove call to PL_ArenaFinish . This effectively shut down NSPR arenas and created problems when restarting NSS . r=relyea
2002-10-31 22:02:10 +00:00
jpierre%netscape.com
f3907a7439
Fix for 177208 - unmark arena when DER decoding is successful
2002-10-31 01:54:13 +00:00
jpierre%netscape.com
8083074fbc
Fix for bug 175115 . Remove incorrect check for CA cert expiration. Also fix CRL signature verification and clean up internal functions . r=mcgreer,relyea,nelsonb,wtc
2002-10-30 23:31:38 +00:00
relyea%netscape.com
5d8b5a40ce
Fix build breakage. Some platforms do not like to assign unsigned char * to
...
char * without a cast.
2002-10-30 19:01:21 +00:00
relyea%netscape.com
c301258ee1
Check in new certdata file generated from certdata.txt
2002-10-30 17:20:59 +00:00
relyea%netscape.com
014936248b
Allow the builtin's to accept old style serial numbers as well the the correct
...
PKCS #11 serial numbers.
2002-10-30 17:18:14 +00:00
relyea%netscape.com
a8cddf9408
Make the Serial Numbers DER Wrapped rather than raw serial numbers.
...
This is required by PKCS #11 and was causing some bugs in NSS 3.6.
2002-10-30 17:09:28 +00:00
wtc%netscape.com
182f81490a
Bug 177201: declare NSS_CMSEncoder_Cancel.
2002-10-30 01:31:01 +00:00
jpierre%netscape.com
c4e2aa9127
Fix for bug 95311 - copy the DER input key to the arena, and free the arena upon decoding failure.
2002-10-29 23:47:31 +00:00
jpierre%netscape.com
31ce9957ca
Use QuickDER to decode DER public key. Bug #95311
2002-10-29 22:52:31 +00:00
nelsonb%netscape.com
b1090ac99f
Plug cert leak in NSS_SMIMESignerInfo_SaveSMIMEProfile. Bug 176799.
...
Patch contributed by Kai Engert.
2002-10-25 22:46:48 +00:00
nelsonb%netscape.com
4554b52c1c
Add new function CERT_VerifySignedDataWithPublicKey containing common code
...
factored from existing functions CERT_VerifySignedDataWithPubKeyInfo and
CERT_VerifySignedData. Bug 174193.
2002-10-25 03:21:24 +00:00
jpierre%netscape.com
f759ddb2eb
Fix for 169038 - bump builtins library version to 1.20 on the tip
2002-10-25 00:17:37 +00:00
jpierre%netscape.com
85f14ab5f0
Fix comment formatting style
2002-10-23 23:41:02 +00:00
jpierre%netscape.com
55df3cd350
Fix for bug 95311 - replace assertion with comments
2002-10-23 23:18:17 +00:00
relyea%netscape.com
940043e883
Make sure the array is big enough to handle all the cases.
2002-10-23 22:51:10 +00:00
nelsonb%netscape.com
25d4b3dd39
Include certi.h to resolve invocation of undeclared function.
2002-10-23 22:00:48 +00:00
nelsonb%netscape.com
b0c5f20ec4
Add 2 new functions to NSS, so an application can get a list of all
...
email addresses in a cert. Bug 152986.
Modified Files: lib/nss/nss.def lib/certdb/alg1485.c lib/certdb/cert.h
lib/certdb/certdb.c lib/certdb/certi.h
2002-10-23 20:50:51 +00:00
wtc%netscape.com
1521c67903
The version of the builtin root certs module is now specified in nssckbi.h.
2002-10-23 19:04:22 +00:00
jpierre%netscape.com
50bc3486f0
Up library number for TC roots - bug #169038
2002-10-23 01:38:57 +00:00
ian.mcgreer%sun.com
b9d29eefdc
bug 174634, fix handling of authorityCertIssuer in chain construction
2002-10-22 14:43:08 +00:00
jpierre%netscape.com
8797b2c565
Fix for bug 175167 - SEC_QuickDERDecodeItem should fre memory upon failure. r=wtc
2002-10-18 22:32:34 +00:00
nelsonb%netscape.com
dc79671232
Verify the self-signed signature on PKCS 10 cert requests before honoring
...
them. Bug 174193.
2002-10-18 21:58:24 +00:00
nelsonb%netscape.com
f1d2ae9c89
Fix DER_GetInteger. Bug 174644.
2002-10-16 01:36:10 +00:00