summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* close JSS_3_X_BRANCHJSS_3_X_BRANCHFranziskus Kiefer2017-09-290-0/+0
|
* Whitespace changes.JSS_3_7_RTM_HPUX_IPFwtchang%redhat.com2005-11-151-3/+3
| | | | Tag: JSS_3_X_BRANCH
* Bugzilla Bug 312202: checked in HP-UX Itanium changes contributed bywtchang%redhat.com2005-11-142-2/+73
| | | | | | | Grace Lu of HP. r=wtc. Modified Files: HP-UX.mk Added Files: HP-UXB.11.23.mk Tag: JSS_3_X_BRANCH
* Bugzilla bug:314583 We no longer link JVM when building JSS library.JSS_3_7_RTMwtchang%redhat.com2005-11-081-130/+0
| | | | | This modification is reflected in jdk.mk backported to JSS_3_X_BRANCH. sr=Glen.Beasley
* JDK 1.4 on HP-UX doesn't have the "classic" JVM and only has the "server"wtchang%redhat.com2005-10-271-1/+5
| | | | | JVM. Tag: JSS_3_X_BRANCH
* Brought the JSS_3_X_BRANCH of mozilla/security/coreconf up to date withwtchang%redhat.com2005-10-19117-3362/+3782
| | | | | NSS_3_10_2_RTM. Tag: JSS_3_X_BRANCH
* Bugzilla bug 312774: support building with IBM JDK on Linux. Added -Lwtchang%redhat.com2005-10-181-2/+9
| | | | linker flags for
* Brought coreconf on the JSS_3_X_BRANCH up to date with NSS_3_9_3_RTM.JSS_3_6_RTMJSS_3_6_BETA1wtchang%redhat.com2005-03-3021-334/+98
| | | | | | | | | Modified Files: AIX.mk Linux.mk OS2.mk SunOS5.10_i86pc.mk SunOS5.mk WIN32.mk WIN954.0.mk WINCE3.0.mk WINNT3.51.mk WINNT4.0.mk WINNT5.0.mk WINNT5.1.mk config.mk rules.mk nsinstall/Makefile Removed Files: AIX3.2.mk AIX4.1.mk AIX4.2.mk AIX4.3.mk AIX5.1.mk AIX5.2.mk
* fixup commit for branch 'JSS_3_X_BRANCH'cvs2hg2003-12-061397-544053/+0
|
* Add /FIXED:NO argument to linker command line for EXEs. Purifynelsonb%netscape.com2003-12-061-1/+2
| | | | requires this to precisely instrument EXEs. r=wtc
* Add new -k option to NSS QA test program cmsutil. By default, cmsutilnelsonb%netscape.com2003-12-061-9/+30
| | | | | | will no longer add any decoded certs to the cert db file, which is useful for reproducibility of results in QA scripts. Bugscape bug 54293. r=relyea,jpierre,wtc
* Bugzilla bug 227296: fixed the bug that NSS_CMSAttribute_AddValue adds thewchang0222%aol.com2003-12-065-12/+42
| | | | | | | | address of a stack variable to the attr->values array. Added a new function SECITEM_ArenaDupItem. r=nelsonb. Modified Files: nss/nss.def util/secitem.c util/secitem.h smime/cmsarray.c smime/cmsattr.c
* Further simplification and improvement of the parsing of UTCTimenelsonb%netscape.com2003-12-052-24/+44
| | | | and GeneralizedTime to avoid UMRs. Bugscape bug 54198. r=wtc
* NSS_CMSContentInfo_Destroy()nelsonb%netscape.com2003-12-041-0/+5
| | | | | | | - The patch destroys the digest context member of the CMSContentInfo. It calls the previously unused function NSS_CMSDigestContext_Cancel to destroy the digest context. Eliminates an object reference leak. Bugscape bug 54208, r=relyea
* In functions NSS_CMSSignedData_Encode_AfterData andnelsonb%netscape.com2003-12-041-19/+26
| | | | | | | | | | | | | | | | | NSS_CMSSignedData_Decode_AfterData - These functions call NSS_CMSDigestContext_FinishMultiple, which always destroys the digest context, regardless of whether it returns SECSUccess or SECFailure. So, change these functions to always NULL out the context pointer regardless of the returned value. NSS_CMSSignedData_VerifySignerInfo() - Always call NSS_CMSSignerInfo_Verify() to set the verification status in the signerinfo object, even if some of the other arguments are NULL, or other failures have occurred, but avoid NULL pointer dereferences along the way. Notice that this change is dependent on changes to NSS_CMSSignerInfo_Verify() (see below.) NSS_CMSSignedData_SetDigests() - skip over missing digests. Don't fail the function, and don't crash, if digest pointers are NULL. Bugscape bug 54208, r=relyea
* Functions NSS_CMSDigestedData_Encode_AfterData andnelsonb%netscape.com2003-12-041-8/+12
| | | | | | | | | | NSS_CMSDigestedData_Decode_AfterData - Since NSS_CMSDigestContext_FinishSingle always destroys the context, regardless of whether it returns SECSuccess or SECFailure, these functions have been changed to always NULL out the context pointer after calling NSS_CMSDigestContext_FinishSingle, regardless of the outcome. Bugscape bug 54208, r=relyea
* There is a lot of "cleanup" in this file, wrapping source at 80 columns.nelsonb%netscape.com2003-12-041-48/+97
| | | | | | | | | | | | | | | | | | | The relevant fixes for this bug include: NSS_CMSDigestContext_StartMultiple() - make sure that cmsdigcx->digcxs and cmsdigcx->digobjs are initialized. - at the "loser" label, be sure to free the digest context itself. NSS_CMSDigestContext_Cancel() - after destroying all the objects, free the arrays of pointers to the objects, and the digest context itself. Previously these items were leaked by this function. NSS_CMSDigestContext_FinishMultiple() - ensure that this function ALWAYS destroys all the NSS digest objects, and doesn't stop destroying them if it encounters an error. Note that this is a newer revision of an older patch for that problem. - always Free the arrays of pointers used in this object. NSS_CMSDigestContext_FinishSingle() - simplify this code. Bugscape bug 54208, r=relyea
* NSS_CMSSignerInfo_Verify()nelsonb%netscape.com2003-12-041-23/+36
| | | | | | | | | | - This function is changed to explicitly allow some of its input arguments to be NULL. It will set the verification status in the CMSSignerInfo object accordingly. Since this is the ONLY function that ever sets the verification status, it must be able to do so even when problems have occurred. - lots of cleanup of this source code. Bugscape bug 54208, r=relyea
* Add null pointer checks to nss_cms_after_end and ↵nelsonb%netscape.com2003-12-042-69/+90
| | | | | | NSS_CMSEnvelopedData_Decode_AfterData. Bugscape bug 54061. r=wtc,relyea Lots of code "cleanup" (reformatting for 80 columns) in cmsdecode.c
* Avoid UMRs in dertime.c. Bugscape bug 54198. r=wtc.nelsonb%netscape.com2003-12-031-2/+20
|
* Fix for 54061 - null pointer check . r=nelsonbjpierre%netscape.com2003-12-031-0/+6
|
* Bugscape bug 54021: in CERT_FindSubjectKeyIDExtension, if PORT_NewArenawchang0222%aol.com2003-12-035-2/+6
| | | | | | | | | fails we should return SECFailure. Document that the return values of CERT_GetCommonName and NSS_CMSSignerInfo_GetSignerCommonName must be freed with PORT_Free. r=nelsonb. Modified Files: certdb/alg1485.c certdb/cert.h certdb/certv3.c smime/cms.h smime/cmssiginfo.c
* Prevent SMIME crash in the opaque signature test. bugscape 54061. r=nelsonbjpierre%netscape.com2003-12-021-9/+152
|
* Fix for 54088 . Don't try to encode attributes with no value. r=wtcjpierre%netscape.com2003-12-021-3/+6
|
* Bound stan error stack at 16 error codes to limit growth.nelsonb%netscape.com2003-12-021-36/+23
| | | | Bugscape bug 54021. r=wtc.
* Reverted to NSPR 4.3 until Sun has NSPR 4.4.1 binary distributions.wchang0222%aol.com2003-11-281-1/+1
|
* Detect invalid input buffer lengths, and return error instead of UMR>nelsonb%netscape.com2003-11-271-0/+10
| | | | Bugscape bug 54021. r=wchang0222
* Fix leak in CERT_FindSubjectKeyIDExtension, and use the Quick DERnelsonb%netscape.com2003-11-271-9/+16
| | | | decoder. Bugscape bug 54021. r=jpierre
* Upgraded to NSPR 4.4.1.wchang0222%aol.com2003-11-271-1/+1
|
* Clean up some arithmetic used for UCS4. Detect when UCS2 and UCS4nelsonb%netscape.com2003-11-271-8/+12
| | | | buffers have invalid lengths. Bugscape bug 54021. r=whang0222, relyea
* Bugzilla bug 226861: removed NSS_CMSSignedData_GetDigestByAlgTag, which iswchang0222%aol.com2003-11-262-13/+2
| | | | | a duplicate of NSS_CMSSignedData_GetDigestValue. r=nelsonb. Modified Files: cms.h cmssigdata.c
* In NSS_CMSSignedData_VerifySignerInfo(), test all returned pointersnelsonb%netscape.com2003-11-261-3/+16
| | | | | for NULL before attempting to dereference them. Bugscape bug 54057. r=wchang0222
* Performance enhancement. Detect absurdly large modulae in public keys,nelsonb%netscape.com2003-11-261-0/+12
| | | | and don't waste time on them. Bugscape bug 54019. r=relyea.
* Remove an unnecessary and incorrect assert call.nelsonb%netscape.com2003-11-261-3/+3
| | | | Bugscape bug 54018. r=jpierre
* This patch reduces the scope of many variables in cmsutil's decode function. ↵nelsonb%netscape.com2003-11-2518-173/+1341
|\ | | | | | | | | | | It frees the signer's CN string after use. Bugscape bug 54021. r=jpierre
| * Bugzilla bug 226470: removed -qarch=com, which is the default for thewchang0222%aol.com2003-11-241-3/+0
| | | | | | | | compiler. r=pkw@us.ibm.com.
| * Bugzilla bug 226470: use a C compiler rather than a C++ compiler to compilewchang0222%aol.com2003-11-221-2/+2
| |\ | | | | | | | | | C code. The patch is contributed by Philip K. Warren <pkw@us.ibm.com>.
| | * fixup commit for tag 'THUNDERBIRD_M3_BASE'THUNDERBIRD_M3_BASEcvs2hg2003-11-210-0/+0
| | |\
| | * \ fixup commit for tag 'THUNDERBIRD_0_4_BASE'THUNDERBIRD_0_4_BASEcvs2hg2003-11-210-0/+0
| | |\ \ | | | |/
| | * | fixup commit for tag 'MOZILLA_1_6b_RELEASE'MOZILLA_1_6b_RELEASEcvs2hg2003-11-2113-1042/+11
| | |/
| * | Don't invoke PKCS11 with an invalid handle. Bug 226285.nelsonb%netscape.com2003-11-211-0/+6
| | | | | | | | | | | | r=relyea sr=wchang0222
| * | Remove an overreaching constraing on modulus length. Bug 226285.nelsonb%netscape.com2003-11-211-1/+1
| | | | | | | | | | | | r=relyea sr=wchang0222
| * | Implement new "batch mode" (see the -b option). Plug some leaks.nelsonb%netscape.com2003-11-201-38/+161
| | | | | | | | | | | | | | | | | | Facilitates memory leak testing of the SMIME library. This revision combines the patches for Bugzilla bug 225513 and Bugscape bug 53775. r = relyea and wchang0222
| * | Don't accept ASN.1 items whose length is 2GB or more.nelsonb%netscape.com2003-11-201-1/+1
| | | | | | | | | | | | Bugscape bug 53875. r=wchang0222 and r=relyea.
| * | Dont attempt to allocate 2GB or more from an arenapool.nelsonb%netscape.com2003-11-201-0/+5
| | | | | | | | | | | | Bugscape bug 53875. r=relyea.
| * | Remove as assertion that is triggered by bad data input, but does notnelsonb%netscape.com2003-11-201-1/+0
| | | | | | | | | | | | indicate a code flaw. Bugscape bug 53875. r=relyea
| * | Be sure not to ask NSS to use an invalid PKCS11 mechanism.nelsonb%netscape.com2003-11-202-2/+13
| | | | | | | | | | | | Bugscape bug 53875. r=relyea.
| * | Plug a leak that occurs when code asks NSS to use an invalid PKCS11nelsonb%netscape.com2003-11-201-2/+4
| | | | | | | | | | | | mechanism. Bugscape bug 53875. r=relyea
| * | near total rewrite of PK11_ParamFromAlgid to eliminate leaks.nelsonb%netscape.com2003-11-191-113/+89
| |/ | | | | | | Partial fix for Bugscape bug 53875.
* | fixup commit for tag 'THUNDERBIRD_M4_BASE'THUNDERBIRD_M4_BASEcvs2hg2003-11-240-0/+0
|\ \ | |/