summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* close DOUGT_CHANNEL_CHANGES_02112001_BRANCHDOUGT_CHANNEL_CHANGES_02112001_BRANCHFranziskus Kiefer2017-09-290-0/+0
|
* fixup commit for branch 'DOUGT_CHANNEL_CHANGES_02112001_BRANCH'cvs2hg2000-07-101152-403856/+0
|
* Tinderbox break - change OS/2 only code - third time is a charmmkaply%us.ibm.com2000-07-101-1/+1
|
* Tinderbox break - remove OS/2 only codemkaply%us.ibm.com2000-07-101-1/+0
|
* OS/2 only tinderbox break - we will probably still break on a link, but at ↵mkaply%us.ibm.com2000-07-101-3/+3
| | | | least we will compile
* Tinderbox break - remove OS/2 includesmkaply%us.ibm.com2000-07-101-2/+2
|
* Added -d optionchrisk%netscape.com2000-07-071-5/+16
| | | | -p option now also works for decoding
* Fix memory leak when using hardware acceleraters.relyea%netscape.com2000-06-291-1/+5
|
* merge changes from NSS 3.0 branch to allow NT automated tests to work.relyea%netscape.com2000-06-294-18/+36
|
* merge 3.0_Branch changes to get NT to run back unto the tip.relyea%netscape.com2000-06-294-14/+69
|
* add a > wordsize test for RC4mcgreer%netscape.com2000-06-294-1/+4
|
* Add tests for Secret Decoder Ring (SDR)thayes%netscape.com2000-06-242-1/+72
|
* Add SDR test commandthayes%netscape.com2000-06-234-0/+421
|
* Added and corrected some commentschrisk%netscape.com2000-06-231-58/+54
| | | | | Added $layercounter Clarified $boundary generation (a boundary has leading AND trailing CRLFs!)
* Preliminary checkin at a state where smime can parse messages generatedchrisk%netscape.com2000-06-232-24/+274
| | | | by itself.
* Added some comments and assertschrisk%netscape.com2000-06-211-7/+14
|
* Oops - fixed the fix. The prototype now correctly unpacks into achrisk%netscape.com2000-06-211-6/+4
| | | | DHPublicKey structure.
* Fix OID for DC AVAs - the root OID in RFC2247 is not different fromchrisk%netscape.com2000-06-201-2/+2
| | | | | the root OID in RFC1274 - so the one we had was WRONG. I don't know where it came from.
* Add code for generation of SMIMEProfile and SMIMEKeyEncryptionPreferencechrisk%netscape.com2000-06-209-31/+279
|
* First feeble attempt at fixing the problem that our definition ofchrisk%netscape.com2000-06-202-3/+8
| | | | | | | | | | | | | Diffie-Hellman key parameters does not encompass all the optional fields defined in RFC2459, section 7.3.2 (namely j and validationParams). I added comments reminding us of the fact that PQGParams need to be extended to hold these, and fixed the ASN1 prototype from its previous totally broken status to one that decodes prime, subPrime and base correctly, and skips the rest. This avoids failure in public key extraction (which is part of verification) with DH certs.
* Fix problem where DH certs were always rejected when verifying themchrisk%netscape.com2000-06-201-1/+2
| | | | | | for EMail encryption. A Diffie-Hellman key needs to be tested for KU_KEY_AGREEMENT, not KU_KEY_ENCIPHERMENT.
* Fixed bug in sequence printing code: array counter was overshooting by onechrisk%netscape.com2000-06-201-1/+1
|
* Fix bug in decoder:chrisk%netscape.com2000-06-201-3/+11
| | | | | | | | | | | | When encoding indefinitely & encountering an optional field at the end of a sequence, right after an IMPLICIT or POINTER template, the decoder was not propagating the optionalness and the end-of-contents condition correctly as it hits the end-of-contents octets instead of the optional field. This is because IMPLICIT and POINTER push TWO states to look for the next tag, not just one. (The first state is "afterImplicit" or "afterPointer", the second one starts with "beforeIdentifier" as usual). This finally makes decoding envelopedData messages in cmsutil work.
* Fix double free of item value that is in an arena.thayes%netscape.com2000-06-161-1/+1
|
* attempt to add token support for listing certs & keysmcgreer%netscape.com2000-06-161-41/+93
|
* more cleanup on cert listingmcgreer%netscape.com2000-06-162-42/+24
|
* Add generation of SMIMECapabilitieschrisk%netscape.com2000-06-146-155/+110
|
* canonicalization step adds CRs to LFs only of there are no CRs present.chrisk%netscape.com2000-06-141-1/+1
|
* Make example 5.7 of ietf-smime-examples draft decode correctlychrisk%netscape.com2000-06-141-2/+2
| | | | (we still cannot look up certs by SubjectKeyID, so it won't verify)
* (not part of build) added mozilla/security/nss/lib/smime to access paths.beard%netscape.com2000-06-141-0/+0
|
* Merge smimetk_branch to tip...chrisk%netscape.com2000-06-1343-31/+13100
|
* reuse old key structures on a given token rather than building it up andrelyea%netscape.com2000-06-134-11/+106
| | | | tearing it down every time.
* Reuse old Object structures rather than build and free them every time.relyea%netscape.com2000-06-132-2/+39
|
* Fix DSA / BLAPI interface by creating stub functions that have thechrisk%netscape.com2000-06-122-9/+41
| | | | correct signature for being called via context->update or context->verify.
* added roots.mcgreer%netscape.com2000-06-121-1/+1
|
* Sorted output for certutil -Lchrisk%netscape.com2000-06-122-33/+105
|
* Fix cleanup code in Decrypt to check for NULL pointersthayes%netscape.com2000-06-121-5/+5
|
* Add permanent (token) key for supporting Secret Decoder Ring (SDR)thayes%netscape.com2000-06-104-58/+397
|\ | | | | | | Bug 26085
| * fixup commit for tag 'smimetk_branch_point'smimetk_branch_pointcvs2hg2000-06-06109-8281/+0
|/
* Carry forward fix from NSS 2.8 for servers that don't do ssl2.nelsonb%netscape.com2000-06-061-5/+9
|
* iterate context creation for all ciphers when doing performance tests.mcgreer%netscape.com2000-06-021-8/+52
|
* fork content version between ns-branded builds and mozilla builds.mcgreer%netscape.com2000-06-022-0/+5
|
* Allow for building with internal roots.mcgreer%netscape.com2000-06-021-0/+1
|
* Allow for building with internal root certs.mcgreer%netscape.com2000-06-022-1/+8
|
* more performance testingmcgreer%netscape.com2000-06-021-12/+57
| | | | | * timing of context creation for ciphers * provide system information
* Use PK11 fixed key lookup to locate the key value. Fix ENCRYPT/DECRYPT bug inthayes%netscape.com2000-05-311-27/+14
| | | | SDR_Decrypt.
* Return to using the thread safe version. The non-thread safe version can ↵relyea%netscape.com2000-05-311-2/+2
| | | | double free memory
* Fix bug which would have bypassed mac checking in TLSrelyea%netscape.com2000-05-311-1/+1
|
* Set up code that allows you to run only some of the SSL tests in a single run.relyea%netscape.com2000-05-311-2/+14
|
* Fix Environment variable overrides.relyea%netscape.com2000-05-311-6/+7
|