gerv%gerv.net
3634d4d94b
Bug 236613: change to MPL/LGPL/GPL tri-license.
2004-04-25 15:03:26 +00:00
wchang0222%aol.com
9d027a18fc
Bugzilla bug 229293: fixed compiler warning "unary minus operator applied
...
to unsigned type". r=relyea,jpierre.
2004-02-11 19:37:18 +00:00
nelsonb%netscape.com
02198fd686
Bound stan error stack at 16 error codes to limit growth.
...
Bugscape bug 54021. r=wtc.
2003-12-02 02:05:47 +00:00
wtc%netscape.com
cd80470fa2
Bug 186586: If at NSS shutdown there are still certs in the cert caches,
...
cause NSS shutdown and the next NSS initialization to fail but do not
destroy the cert caches (and the crypto context and trust domain containing
them) to avoid a crash if the NSS client destroys the certs later. New
error codes needed to be added to indicate the failure of NSS shutdown and
NSS initialization due to this cause.
Modified Files:
base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h
pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c
util/secerr.h
2003-01-08 21:48:47 +00:00
ian.mcgreer%sun.com
72edde5172
bug 172247, don't allow import of duplicate issuer/serial certs
2002-11-21 20:43:15 +00:00
relyea%netscape.com
5fd94ca1a9
Bug 164501. Return a proper error code from PK11_FindCrlByName() so the CRL
...
code can decide if there is a hw or system failure preventing the reading of a
CRL or if the CRL is just not there.
2002-10-10 20:30:19 +00:00
jpierre%netscape.com
e2b8be5319
Fix compiler warnings
2002-09-07 01:24:27 +00:00
nicolson%netscape.com
e179fe8904
Fix 164126: makefile build error.
...
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
ian.mcgreer%sun.com
caad76ef9c
avoid use of iterator
2002-04-22 20:44:07 +00:00
ian.mcgreer%sun.com
03f9222af7
define nss_ZREALLOCARRAY, fix bugs in nss_ZRealloc
2002-04-04 16:14:26 +00:00
wtc%netscape.com
7f18de5feb
Fixed a memory leak on memory allocation error. r=mcgreer. (bug 129709)
2002-03-15 22:09:45 +00:00
wtc%netscape.com
608314e686
Bugzilla bug 131078: fixed compiler warnings. r=mcgreer.
2002-03-15 06:07:41 +00:00
relyea%netscape.com
39c2b9d38b
When we free the clists, clear out our head pointer (don't keep pointing to
...
freed memory);
2002-03-01 02:13:42 +00:00
ian.mcgreer%sun.com
bec85f00b2
misdeclared function signature
2002-02-28 01:32:32 +00:00
ian.mcgreer%sun.com
061674f14c
fix aix bustage
2002-02-27 23:17:12 +00:00
relyea%netscape.com
2453c05e6e
Bug 120651: Memory leaks in PK11_GetCertList.
...
1) Fix leaks in error paths (bfind.c -- found by inspection).
2) Don't allocate hash table data out of the arena. PL_Hash grows and shrinks
the hash buckets as necessary. In arenas they will just grow.
3) Don't allocate temparary locks out of the global instance arena pool.
2002-02-13 02:26:47 +00:00
relyea%netscape.com
89fbd30151
Fix memory leak in hash table keys. Hash tables stay around forever.
...
keys go into and out of the table. the old code allocated the keys from
the hash table's arena, so they would grow without bounds. Now the keys
are allocated from the heap, and get freed when they are expunged from the
table.
2002-02-06 02:42:08 +00:00
ian.mcgreer%sun.com
2f6edd19c3
some of the output in bug 123081 shows potential leaks around iterators, since the iterator is explicitly freed allocate it in its own block to avoid this
2002-02-05 22:08:12 +00:00
ian.mcgreer%sun.com
274e685871
cleanup suggested by review by Nelson
2002-02-05 03:53:50 +00:00
relyea%netscape.com
82e1be6d15
Fix thread local storage leak.
2002-01-31 19:18:55 +00:00
ian.mcgreer%sun.com
f3392f0b6a
fix core when token list is emptied (caused by switch to fips mode)
2002-01-23 17:39:29 +00:00
ian.mcgreer%sun.com
8b98f0af90
memory leak fixes
2002-01-08 15:37:42 +00:00
ian.mcgreer%sun.com
f3fa11027c
detect hash collisions so that the caller can handle it
2001-12-12 20:23:07 +00:00
ian.mcgreer%sun.com
a84712911e
original intent for concurrent list iteration, fixes bug 114727. a better long-term solution is needing for traversing the high-level token lists.
2001-12-12 00:07:25 +00:00
ian.mcgreer%sun.com
f82bfe09a1
check in error const
2001-12-10 19:14:32 +00:00
jpierre%netscape.com
a2a9cdc5c9
Patch for 107323 - fix compiler warnings
2001-12-06 21:25:32 +00:00
ian.mcgreer%sun.com
054d08b4cd
fix memory leaks
2001-11-29 19:34:08 +00:00
ian.mcgreer%sun.com
8069de9d9e
land changes for handling temporary and cached certs in 3.4
...
* separate trust object from cert object
* move handling of cryptoki objects into libdev
* implement digest in libdev (for trust object indexing)
* fixes in cache implementation; connect cache to 3.4 certs
* implement CERT_NewTempCertificate via crypto context
2001-11-28 16:23:51 +00:00
ian.mcgreer%sun.com
33b08a7c54
fix unneeded lock release in list iteration
2001-11-16 19:36:43 +00:00
relyea%netscape.com
e27189dd1d
Land BOB_WORK_BRANCH unto the tip.
...
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
ian.mcgreer%sun.com
593d3fefdd
add ability to notify user that chain is incomplete
2001-10-17 15:48:09 +00:00
ian.mcgreer%sun.com
1a8c4a3d15
fix iteration for empty list
2001-10-17 14:37:48 +00:00
ian.mcgreer%sun.com
2e90a85e8a
put the sort function in the header
2001-10-15 17:13:31 +00:00
ian.mcgreer%sun.com
48015bc83f
add ordering capability to the list
2001-10-15 16:50:01 +00:00
ian.mcgreer%sun.com
1bfaccd4de
implement hash keyed by NSSItem; change list method names to be like hash method names; fix 99214, arena mark lists broken
2001-10-08 19:26:02 +00:00
ian.mcgreer%sun.com
bd9d39178b
fix build error
2001-10-03 14:07:29 +00:00
ian.mcgreer%sun.com
9999c42179
check in the nssItem_ interface
2001-09-25 20:48:51 +00:00
relyea%netscape.com
6eed667267
Fix Linux warnings.
2001-09-20 22:02:46 +00:00
ian.mcgreer%sun.com
3ed98dab32
some cleanup in the list code
2001-09-20 20:33:27 +00:00
ian.mcgreer%sun.com
db9c9284c2
checkin of threadsafe hashtable; copied from ckfw/hash.c but using NSS types
2001-09-20 00:28:36 +00:00
mcgreer%netscape.com
f5a1bf1076
initial checkin of threadsafe list
2001-09-19 20:20:06 +00:00
mcgreer%netscape.com
ea3ad5a5bd
first cut at password handling. todo: implement transaction-based passwords (at a higher level?)
2001-09-19 19:08:32 +00:00
wtc%netscape.com
a83eb31b00
Bugzilla bug #63768 : removed references to the obsolete PURE_LIBRARY,
...
HAVE_PURIFY etc. make variables in NSS files. Reviewed by nelson Bolyard.
Modified Files:
cmd/platrules.mk cmd/crmf-cgi/config.mk cmd/crmftest/config.mk
cmd/lib/config.mk cmd/zlib/config.mk lib/base/config.mk
lib/certdb/config.mk lib/certhigh/config.mk lib/ckfw/config.mk
lib/crmf/config.mk lib/cryptohi/config.mk
lib/fortcrypt/swfort/config.mk lib/freebl/config.mk
lib/jar/config.mk lib/nss/config.mk lib/pk11wrap/config.mk
lib/pkcs12/config.mk lib/pkcs7/config.mk lib/smime/config.mk
lib/softoken/config.mk lib/ssl/config.mk lib/util/config.mk
2001-02-02 01:49:57 +00:00
wtc%netscape.com
586b10f4c5
Bugzilla bug #67122 : put PR_CALLBACK after the return type in function
...
declarations. This is the order required by OS/2 compilers. Thanks to
Javier Pedemonte <pedemont@us.ibm.com> for the patch.
Modified files: hashops.c, tracker.c, certt.h, oid.c.
2001-01-31 18:01:53 +00:00
larryh%netscape.com
351f30a205
Bugzilla: 64132. NSS lock instrumentation
2001-01-03 19:51:22 +00:00
relyea%netscape.com
e4f381443a
Changes to make base code compile in the current nss environment. This is so
...
the pkcs framework can use it.
2000-09-06 22:11:57 +00:00
roeber%netscape.com
4c7240ff19
Detect at runtime when we're running with NSPR 1 and switch the thread-private-data calls accordingly. This lets our pkcs#11 modules be loaded into Communicator.
2000-05-17 20:19:24 +00:00
dougt%netscape.com
7dc028cf1e
Minor changes to fix mac build bustages.
2000-05-12 18:43:28 +00:00
roeber%netscape.com
c71276e88d
I missed a couple usages of nssUTF8_Size when its signature changed.
...
Also made a pedantic check #ifdef PEDANTIC.
2000-04-19 21:24:57 +00:00
roeber%netscape.com
c7ce07669f
Free from the beginning of the real block pointer, not the user's pointer.
2000-04-19 21:23:13 +00:00