Commit Graph

2829 Commits

Author SHA1 Message Date
wtc%netscape.com
4520771cc7 Fix from Ian to address Bugzilla bug 202179.
The fix restores some old code that was removed as part of our
performance work (Bugzilla bug 145322).  Thus, there may be a
slight performance hit, but obviously, we need to have correct
code first.

This is a part of the code I really don't like.  To summarize,
there was a hack put in a long time ago to make sure that the
PKCS#11 session in which the SSL keys are generated was never
closed until the last key was deleted.  This only worked by chance,
and if any part of the code was changed (as was the case here), this
unstable equilibrium would be lost.  As with all hacks, it wasn't
really documented, so the problem escaped our notice.  As a result of
putting the hack back in, we're going back to the horribly wasteful
operation of opening 4 sessions and immediately closing them.  I intend
to have a proper solution in a later release.
2003-08-12 18:21:55 +00:00
wtc%netscape.com
5d4cb72997 Deleted useless local variable 'arena' in cert_ImportCAChain. 2003-08-08 23:15:50 +00:00
wtc%netscape.com
f4184b8ca1 Bugzilla bug 214695: fixed incorrect use of PR_AtomicDecrement on reference
counts.  The reference count should not be read "naked".  Instead, we
should simply use the return value of PR_AtomicDecrement for the result of
the decrement.
Modified Files: dev/devmod.c dev/devslot.c dev/devtoken.c pki/certificate.c
pki/pkibase.c
2003-08-01 02:02:47 +00:00
nelsonb%netscape.com
e7297b0a76 Fix bug 213084. Detect when cert in signature cannot be imported.
Detect NULL pointer, don't crash.
2003-07-31 00:16:27 +00:00
bishakhabanerjee%netscape.com
670906f939 Bug 213903: removing unused variables 'delold', 'save', 'entry' 2003-07-28 22:55:16 +00:00
bishakhabanerjee%netscape.com
0a15715c3b Bug 213902 : removing unused variable "next" in "cert_DecodeNameConstraintSubTree" 2003-07-28 21:53:16 +00:00
jpierre%netscape.com
ca7885b3d5 Allow freebl to build correctly under MS VC++ .net 2003 . sr=nelsonb 2003-07-22 02:04:57 +00:00
wtc%netscape.com
c5f5509f3f Bugzilla bug 213158: fixed the misspelling of "attach". The patch is
contributed by Pierre Chanial <chanial@noos.fr>.
Modified Files: pk11slot.c secmodt.h
2003-07-19 20:49:35 +00:00
wtc%netscape.com
40490b50de Backed out Bob Relyea's workaround for the deadlock in rev. 1.15. The
correct fix is in rev. 1.36 of tdcache.c (see Bugzilla bug 212112).
2003-07-11 21:52:04 +00:00
nelsonb%netscape.com
20f4c61bd1 Restore sslreq.txt to text form, where it will have different line
endings on unix, than on windows or on Mac.
2003-07-11 04:14:24 +00:00
nelsonb%netscape.com
f23e6eb763 Test with the new file sslreq.dat rather than the old file sslreq.txt. 2003-07-11 04:05:12 +00:00
nelsonb%netscape.com
886c06287a This is sslreq.txt with a different file name, to clearly show that
this file is to be treated as a binary file, not as text.
2003-07-11 03:55:55 +00:00
wtc%netscape.com
788ad0837b Bug 212112: we don't need to lock td->cache->lock while calling
STAN_ForceCERTCertificateUpdate.  This fixed a recursive deadlock.
r=mcgreer.
2003-07-10 01:24:17 +00:00
nelsonb%netscape.com
0545cae9b8 Change cert_GetCertificateEmailAddresses to return NULL rather than
a pointer to an empty string when a cert has no email addresses.
Partial fix for bug 211540.  Modified certdb/alg1485.c
2003-07-09 04:14:23 +00:00
wtc%netscape.com
04e80d83ca Bug 212004: in CERT_IsUserCert we should test for a null cert->trust and
treat it as no trust.  r=nelsonb.
2003-07-09 04:12:16 +00:00
nelsonb%netscape.com
6228d8c075 Export SEC_DupCRL and declare it in certdb.h. Bug 208194.
Modified Files:	nss/nss.def certdb/certdb.h
2003-07-09 04:00:48 +00:00
wtc%netscape.com
485a88c60e Bug 211384: fixed the bug that importing a CRL that already exists in the
DB causes NSS_Shutdown to fail.  Two files were changed.  1. crl.c: we
should not obtain a slot reference because PK11_FindCrlByName already
obtained a slot reference.  2. pk11cert.c: cleaned up code and fixed a slot
reference leak if the SECITEM_AllocItem call fails.  r=nelsonb.
2003-07-08 18:41:28 +00:00
bishakhabanerjee%netscape.com
6a76698c4e patch to correct false failure reporting - bug 167825 2003-07-03 17:50:18 +00:00
nelsonb%netscape.com
c93f000588 Add missing declaration of NSS_Get_SECKEY_EncryptedPrivateKeyInfoTemplate 2003-07-03 07:04:30 +00:00
nelsonb%netscape.com
c636fad8e7 Fix bug 211049. Another issue with empty pointer lists from group
decodings.  Patch by Wan-Teh Chang <wtc@netscape.com>.
2003-07-01 01:16:57 +00:00
nelsonb%netscape.com
99c2efd227 Change the function definitions in dev so that the ctags program will
produce valid tags from these sources.
2003-07-01 00:32:22 +00:00
wtc%netscape.com
083003b9a2 Bug 210660: backed out the main change in the fix for bug 145322 because
the adoption of session is not thread safe.  This eliminates most of the
saving of sessions, but we must be correct first, and then optimize.
r=nicolson,nelsonb.
Modified Files: pk11func.h pk11skey.c
2003-06-27 22:28:50 +00:00
nelsonb%netscape.com
c27a303c8d Fix several bugs reported in bug 210707.
Change loops over RDNs and AVAs to detect NULL pointers.
Change list of attribute type "keywords" to match RFCs and internet
drafts.
Quote attribute values strings that contain adjacent embedded blanks.
Don't quote hex string values.
Always use hex string values when type OID is unrecognized.
2003-06-27 00:33:05 +00:00
nelsonb%netscape.com
7c5e03d5f4 Move the declaration for CERT_CompareNameSpace from cert.h to genname.h
because it is a private function.  Change the interface for this
function so that it returns a SECStatus, unambiguously indicating the
success or failure of the name constraints test.  The function no
longer takes a list of cert subject names, instead, it takes a list
of cert pointers, and optionally outputs one of those pointers when
an error occurs.  This eliminates a cert reference leak.
2003-06-26 01:56:34 +00:00
nelsonb%netscape.com
7665e37260 This patch extracts rfc822 names from a cert's distinguished name at the
time when the list of cert names is being built and builds a GeneralName
out of it, just as if the rfc822 name had come from a subject alt name
extension. This way, no special handling is needed of either directory
names or rfc822 names in the name constraints code.  The special "phase 1"
loop in cert_CompareNameWithConstraints disappears compmletely.  And all
the cases in the (former phase 2) loop can now simply assert that the
name's type matches the constraint's type exactly.

This patch also factors out the code that creates new CERTGeneralNames and
that copies a single CERTGeneralName into new separate functions.  This
eliminates a lot of duplicated code whose correctness required lengthy
inspection.  Now these primitive operations are centralized.
2003-06-26 01:25:10 +00:00
bishakhabanerjee%netscape.com
ef5d950b09 enabling log scraping in header instead 2003-06-25 21:57:21 +00:00
bishakhabanerjee%netscape.com
545f6a1359 enabling log scraping in header instead, where RESULTDIRURL gets created 2003-06-25 21:56:19 +00:00
bishakhabanerjee%netscape.com
6ca298a1d2 removed new variable for Win platform - extra - don't need 2003-06-25 21:39:54 +00:00
bishakhabanerjee%netscape.com
1ee600f7ff fix URL for Windows platform 2003-06-25 20:43:18 +00:00
bishakhabanerjee%netscape.com
1b045cce39 taking out un-needed stuff 2003-06-25 17:39:38 +00:00
wtc%netscape.com
17581e0660 Shorten the clickable text portion of RESULTDIRURL. 2003-06-25 04:23:34 +00:00
bishakhabanerjee%netscape.com
2eb554c104 enabling log scraping 2003-06-25 00:55:13 +00:00
nelsonb%netscape.com
a09e87bce0 Whitespace cleanup. This patch causes numerous lines that were wider
than 80 columns to be folded according to NSS coding conventions.
This patch does not fix any run-time error.
2003-06-23 23:15:33 +00:00
nelsonb%netscape.com
2ab3bc3979 CERT_EncodeGeneralName and CERT_DecodeGeneralName contain large switch
statements that repeat code for every case.  This patch factors out that
common code from the cases, making the switches much smaller and reducing
bloat.
2003-06-21 08:10:07 +00:00
nelsonb%netscape.com
66f40f98bd Cleanup CERT_GetGeneralNameByType so that it detects when it has
encountered a general name of a type that it doesn't recognize, and
so that it properly casts the return value to be of the right type.
2003-06-21 07:07:47 +00:00
nelsonb%netscape.com
9b63114ba0 The general name code uses arenas, which is good, but it never marks
and releases space in the arenas, so the arenas just grow and grow
until the test is completely over.  This patch adds comments showing
where mark and release calls could (and probably should) be added.
It also changes CERT_CopyGeneralName to have only two exit paths,
two return statements, in preparation for the eventual use of mark and
release.
2003-06-21 06:44:43 +00:00
nelsonb%netscape.com
1042ec6f88 a) Add more missing null pointer tests that I discovered. Bug 208649.
b) change all PORT_*Alloc calls that allocate new structs or arrays of
same to use the PORT_*New* macros instead.
c) ifdef out some dead functions that are rife with failure to detect
allocation failures.
2003-06-21 05:23:07 +00:00
relyea%netscape.com
663b108222 Fix deadlock bugscape 46733 2003-06-20 23:34:46 +00:00
bishakhabanerjee%netscape.com
9948f8316d sigh, another time 2003-06-20 23:24:11 +00:00
bishakhabanerjee%netscape.com
4d3b8d3282 one more time, trying to make link clickable 2003-06-20 18:36:57 +00:00
nelsonb%netscape.com
a98e4fc078 Declare src argument to SEC_ASN1DecodeItem to be const. 2003-06-20 01:52:19 +00:00
bishakhabanerjee%netscape.com
bc5d5ce9dc echo out RESULTDIRURL; r=wtc 2003-06-19 23:04:25 +00:00
bishakhabanerjee%netscape.com
3d71f8851a made RESULTDIRURL clickable link; r=wtc 2003-06-19 23:03:59 +00:00
nelsonb%netscape.com
1b06e46683 Carry Wan-Teh's fix for bug 208996 forward to trunk. 2003-06-19 03:48:19 +00:00
nelsonb%netscape.com
a4f1b04288 Fix numerous more potential NULL pointer deref crashes. Bug 208038 2003-06-19 01:08:53 +00:00
bishakhabanerjee%netscape.com
05dc77c485 checking in version 1.60 with additional space 2003-06-18 19:13:11 +00:00
bishakhabanerjee%netscape.com
1f57ddfe70 backing out my recent changes - some platforms showing tests failed 2003-06-18 08:13:07 +00:00
bishakhabanerjee%netscape.com
709b88a2cb had to put in netscape specific unix base dir as well 2003-06-18 07:11:15 +00:00
bishakhabanerjee%netscape.com
06eeeca399 put URL specific stuff inside nscp specific loop 2003-06-18 06:02:28 +00:00
nelsonb%netscape.com
40399ce6d5 Further refinements to the Name Constraints checking logic, to make it
more compliant with RFC 3280.  Bug 208047.
2003-06-18 04:32:44 +00:00