summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* artificial changeset: close fixup head 29ee86cc7421 for tag ↵NSS_3_13_4_BRANCHcvs2hg2013-02-210-0/+0
|\ | | | | | | NSS_3_13_CKBI_1_93_RTM
| * fixup commit for tag 'NSS_3_13_CKBI_1_93_RTM'NSS_3_13_CKBI_1_93_RTMcvs2hg2012-12-292130-890048/+0
|/
* Bug 825022. Patch by bsmith/kaie. r=kaie/kwilson/bsmithNSS_3_13_6_WITH_CKBI_1_93_RTMkaie%kuix.de2012-12-293-314/+126
|
* Bug 795355 - September 2012 batch of root CA changes, r=rrelyeakaie%kuix.de2012-12-293-5/+873
|
* Set version strings to 3.13.6 release.NSS_3_13_6_RTMwtc%google.com2012-08-113-6/+6
| | | | | | Modified Files: Tag: NSS_3_13_4_BRANCH lib/nss/nss.h lib/softoken/softkver.h lib/util/nssutil.h
* Bug 479508, bug 482153, bug 764393: add the isTrustedForUsage method to theNSS_3_13_6_BETA1wtc%google.com2012-07-273-15/+87
| | | | | | | | | | nssDecodedCert structure. Change nssCertificateArray_FindBestCertificate to take trust into consideration, always choosing a trusted cert over an untrusted cert when presented with that choice. Based on a patch by Nelson Bolyard. r=rob.stradling,rrelyea. Modified Files: Tag: NSS_3_13_4_BRANCH pki3hack.c pkibase.c pkitm.h
* Bug 757197 - May 2012 batch of NSS root CA changes, r=rrelyeakaie%kuix.de2012-06-282-14/+1876
|
* Bug 757189, addbuiltin default output for "no explicit trust" should be ↵kaie%kuix.de2012-06-283-171/+170
| | | | consistent with certdata.txt, r=rrelea
* Bug 762351: fix reference leaks of policyOID in cert_PKIXMakeOIDList. Thewtc%google.com2012-06-071-1/+2
| | | | | patch is contributed by Ryan Sleevi <ryan.sleevi@gmail.com>. r=wtc. Tag: NSS_3_13_4_BRANCH
* Bug 762353: PKIX_PL_OID_CreateBySECItem should return an error if thewtc%google.com2012-06-071-3/+4
| | | | | | SECITEM_CopyItem call fails. The patch is contributed by Ryan Sleevi <ryan.sleevi@gmail.com>. r=wtc. Tag: NSS_3_13_4_BRANCH
* Bug 489188, patch approach 2, fix the leak and preserve original error ↵kaie%kuix.de2012-06-071-0/+5
| | | | object, patch by Wan-Teh, r=kaie
* Bug 489188, patch v4, avoid creation of unnecessary NULLARGUMENT error ↵kaie%kuix.de2012-06-061-4/+4
| | | | object, patch by Wan-Teh, r=kaie
* Update branch version to 3.13.6 Betakaie%kuix.de2012-06-013-9/+9
|
* Ok, it was decided that build / version 3.13.5.0 is fine, changing.NSS_3_13_5_RTMkaie%kuix.de2012-05-313-6/+6
|
* Set version to NSS 3.13.5 final release, use build number 3.13.5.1 because ↵kaie%kuix.de2012-05-313-9/+9
| | | | earlier beta snapshots didn't contain "beta" in the version string
* Bug 738454: fix a typo ("an" => "a") in an error message. The typo waswtc%google.com2012-05-241-1/+1
| | | | | reported by Daniel Cater. Tag: NSS_3_13_4_BRANCH
* Bug 745548, nssPKIObject_GetNicknameForToken should always return a copy, ↵NSS_3_13_5_BETA2kaie%kuix.de2012-05-178-5/+22
| | | | r=rrelyea
* Setting version to 3.13.5 betaNSS_3_13_5_BETA1kaie%kuix.de2012-04-243-9/+9
|
* Bug 738454, patch by Wan-Teh Change, error string by Brian Smith, r=kaiekaie%kuix.de2012-04-247-6/+19
|
* Bug 745281 - Revert the previous commit per wtc's adviseemaldona%redhat.com2012-04-206-72/+3
|
* Bug 745281 - Provide the option of disabling SSL PKCS #11 bypass at build ↵emaldona%redhat.com2012-04-196-3/+72
| | | | time, a=emaldona, r=kaie
* Change versions numbers to NSS 3.13.4 finalNSS_3_13_4_RTMkaie%kuix.de2012-04-063-6/+6
|
* Bug 715073: Use an alternative ASN.1 template that allows RSA modulus to beNSS_3_13_4_BETA2wtc%google.com2012-04-053-0/+48
| | | | | | | | | | zero length if a secret key disguised as an RSA key cannot be decoded. This allows us to decode secret keys that have an improperly encoded modulus (a zero-length integer). The patch is partially contributed by Kaspar Brand <mozbugzilla@velox.ch>. r=Kaspar Brand. Modified Files: Tag: NSS_3_13_4_BRANCH keydb.c lowkey.c lowkeyti.h
* Bug 715073: Use temp.data++ instead of temp.data += 1 for consistent style.wtc%google.com2012-04-041-1/+1
| | | | Tag: NSS_3_13_4_BRANCH
* Bug 741481: cert_InitLocks should reset certRefCountLock to NULL afterwtc%google.com2012-04-031-0/+1
| | | | | | calling PZ_DestroyLock(certRefCountLock). The patch is contributed by Ben Chan <benchan@chromium.org>. r=wtc. Tag: NSS_3_13_4_BRANCH
* Bug 734534: Fix nits in the next protocol negotiation (NPN) functions.NSS_3_13_4_BETA1wtc%google.com2012-03-311-5/+4
| | | | | r=agl. Tag: NSS_3_13_4_BRANCH
* fixup commit for branch 'NSS_3_13_4_BRANCH'cvs2hg2012-03-3122-163/+533
|
* Bug 732258: ssl3_FinishHandshake cleanup. Fix the unused variable compilerwtc%google.com2012-03-061-4/+2
| | | | | warning about 'rv' and simplify the conditional expression around the ss->sec.cache call. r=bsmith.
* Bug 732630: Prefer SSL_RSA_WITH_RC4_128_SHA over SSL_RSA_WITH_RC4_128_MD5.wtc%google.com2012-03-063-3/+6
| | | | | | | | The change to the suiteInfo table in sslinfo.c is not necessary but is made to keep that table in roughly the same order as the other two tables in ssl3con.c and sslenum.c. r=rrelyea. Modified Files: ssl3con.c sslenum.c sslinfo.c
* Bug 690980, selfserv -n option is broken with TLS SNI (edit), Patch ↵kaie%kuix.de2012-03-011-5/+8
| | | | contributed by Julien Pierre, r=rrelyea
* Bug 727691, SSL_InvalidateSession crashes if session cache was disabled ↵kaie%kuix.de2012-03-011-1/+1
| | | | (edit), Patch contribute by Julien Pierre, r=rrelyea
* Bug 644764, AES256 not recorded in SMIME capabilities, Patch contributed by ↵kaie%kuix.de2012-03-012-1/+9
| | | | Momcilo Majic, r=rrelyea
* Bug 679610, fix contributed by David Volgyes and aceman. r=wtckaie%kuix.de2012-03-011-4/+1
|
* Bug 728919: Fix clang warning about equality comparison with extraneouswtc%google.com2012-03-011-1/+1
| | | | | parentheses. The patch is contributed by Nico Weber <thakis@chromium.org>. r=wtc.
* Bug 647364: support explicitly trusted leaf certificate. Report a nullwtc%google.com2012-02-281-12/+37
| | | | | trust anchor in this case. Also fix comment typos, remove the unused matchingAnchor variable, and fix reference count bugs. r=rrelyea.
* Bug 726134: document that the cert_NSSCertFromPKIXCert function inwtc%google.com2012-02-281-1/+4
| | | | | lib/certhigh/certvfypkix.c depends on nssCert being the first field of struct PKIX_PL_CertStruct. r=rrelyea.
* Bug 726134: Allow CERT_PKIXVerifyCert to return a NULL trust anchor certwtc%google.com2012-02-282-42/+58
| | | | | | | (cert_po_trustAnchor). r=rrelyea. Modified Files: lib/certhigh/certvfypkix.c lib/libpkix/pkix/results/pkix_valresult.c
* Bug 729721: change PKIX_PL_Cert_GetVersion to use v1 (0) as the defaultwtc%google.com2012-02-271-2/+2
| | | | | version of an X509 certificate, and checks nssCert->version.len instead of nssCert->version.data before dereferencing nssCert->version.data. r=rrelyea
* Bug 577747, Memory leak in ECDSA code in secvfy.c, problem analysis by Hanno ↵kaie%kuix.de2012-02-251-3/+5
| | | | Boeck, r=rrelyea
* Backing out last two checkins, because of tinderbox test failureskaie%kuix.de2012-02-252-52/+29
|
* Bug 577747, Memory leak in ECDSA code in secvfy.c, problem analysis by Hanno ↵kaie%kuix.de2012-02-251-3/+5
| | | | Boeck, r=rrelyea
* Bug 715073, fix quickder, patch contributed by Kaspar Brand, r=rrelyeakaie%kuix.de2012-02-241-26/+47
|
* Bug 729380: add an emacs mode line to make mxr.mozilla.org display tabswtc%google.com2012-02-231-6/+7
| | | | | correctly. Fix variable declarations in lib/ssl/ssl3con.c to not start from column 0, which would confuse cvs diff -p. r=kaie.
* Bug 729377: SEC_RegisterDefaultHttpClient andwtc%google.com2012-02-221-3/+3
| | | | | | CERT_RegisterAlternateOCSPAIAInfoCallBack should set the SEC_ERROR_NOT_INITIALIZED error (instead of SEC_ERROR_LIBRARY_FAILURE) if they are called before NSS is initialized. r=kaie.
* Set version strings to 3.13.4.0 Betakaie%kuix.de2012-02-223-9/+9
|
* Set NSS version strings to NSS 3.13.3 release candidate 0NSS_3_13_3_RTMNSS_3_13_3_RC0kaie%kuix.de2012-02-183-6/+6
|
* Related to bug 724929, Make sure the offending trustwave intermediates are ↵kaie%kuix.de2012-02-183-5/+125
| | | | not trusted in mozilla, patch produced and reviewed by rrelyea, wtc, kaie
* Bug 696807: the previous checkin requires including "secerr.h".wtc%google.com2012-02-171-0/+1
| | | | TBR=rrelyea.
* CVSi ----------------------------------------------------------------------rrelyea%redhat.com2012-02-171-0/+16
| | | | | Bug 727204 - Generic blacklisting mechanism is not yet working original patch by wtc. verified by kai reviewed by relyea
* Bug 696807 - sftkdb_DeleteSecmodDB and sftkdb_AddSecmodDB should set errorwtc%google.com2012-02-171-0/+4
| | | | code if dbname is NULL or rw is false. r=rrelyea.