summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* close NSS_MULTIACCESS_M8_TMPNSS_MULTIACCESS_M8_TMPFranziskus Kiefer2017-09-290-0/+0
|
* Don't accept non-user certs when looking for a recipient.relyea%netscape.com2002-08-301-0/+10
|
* crl crash fix without NSS tip stuff.relyea%netscape.com2002-08-271-2/+1
|
* fixup commit for branch 'NSS_MULTIACCESS_M8_TMP'cvs2hg2002-08-211581-621354/+0
|
* 1) fix crl memory.relyea%netscape.com2002-08-214-59/+33
| | | | 2) remove several memory copies in the crl.
* Bug 142172relyea%netscape.com2002-08-191-5/+35
| | | | | | | 1) look up the private key much earlier in the process so we know what slot it is on. 2) if a slot isn't specified, you the private key's slot. 3) if the specified slot and the private key slot don't match & the private key slot can do the PBE, then use the private key slot to do the PBE so we don't have to move the key. 4) if we have generated the PBE key in a different slot from the private key,
* use error code in secutil.relyea%netscape.com2002-08-164-29/+156
| | | | | Clean up the output. Print out cert chain parsing issues more completely.
* Quick and dirty utility to pink SSL servers to see if they are configuredrelyea%netscape.com2002-08-166-0/+1468
| | | | | | | | | | | | | | correctly. NOTES: This program is a (very slightly) modified version of the SSLSample/client.c program. As such it used the sample program support, which is a duplication of much of secutil. Future enhancements would be 1) link with secutil.lib. 2) When handling BadCert requests, run the Full VerifyCert and dump the results. Make connections to the servers testing SSL2, SSL3 and TLS. Changes were basically 1) Set the program to run without a security database (this means no token support, or client auth). 2) Explicitly load the builtins module so that we can test against the standard trust.
* Correctly count the number of items in a SEQUENCE OF or SET OF in quickder ↵jpierre%netscape.com2002-08-161-3/+7
| | | | decoder. Bug found by one of Terry's tests.
* Fix 162761: PK11_GetKeyGen should work if you pass in a keygen alg.nicolson%netscape.com2002-08-141-0/+20
| | | | Make PK11_GetKeyGen an identity function for keygen algs.
* bug 161552: Make the recipient list traversal functions call the internalrelyea%netscape.com2002-08-143-145/+160
| | | | | nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed Searching code.
* Mozilla bug 145228. Clear out buffer to protect agains lazy PKCS #11 modules.relyea%netscape.com2002-08-131-0/+40
|
* Removing old nmake build makefiles. Bug #158528 r=pavlovseawood%netscape.com2002-08-101-38/+0
|
* Test the TLS_RSA_WITH_NULL_SHA cipher suite. Bug 161529. Also, ordernelsonb%netscape.com2002-08-092-13/+13
| | | | tests so all SSL3 tests are done before all TLS tests.
* Support the TLS_RSA_WITH_NULL_SHA cipher suite. Bug 161529. Fix Usage.nelsonb%netscape.com2002-08-091-7/+9
|
* Add support for SSL_RSA_WITH_NULL_SHA. Bug 161529. Fix usage message.nelsonb%netscape.com2002-08-091-2/+4
|
* Support the TLS_RSA_WITH_NULL_SHA cipher suite. Bug 161529.nelsonb%netscape.com2002-08-095-1/+5
|
* Handle the switch from the static buffer to the realloc buffer.relyea%netscape.com2002-08-091-4/+9
|
* remove unreferenced Variable.relyea%netscape.com2002-08-091-2/+0
|
* Add comment about partial CRLsjpierre%netscape.com2002-08-092-0/+9
|
* Bug 148220: removed the unused field 'isFIPS'.wtc%netscape.com2002-08-081-2/+0
|
* Bug 607834. save the correct name on so we can reset the database.relyea%netscape.com2002-08-081-1/+1
|
* Stop referencing deleted quickder.h headerjpierre%netscape.com2002-08-081-1/+0
|
* Updates to quick DER decoder, bug # 161215jpierre%netscape.com2002-08-084-227/+55
| | | | | | | | | Fixes from Terry's review : - remove quick allocator - always allocate entry array even if there is 0 entry - rename DecodeConstructed to DecodeExplicit and use a better test for that case - other misc small fixes Also move SEC_QuickDERDecodeItem to secasn1.h
* Bug 148220: implements FIPS 198 conformance. r=relyea.wtc%netscape.com2002-08-074-18/+43
|\ | | | | | | Modified Files: alghmac.c alghmac.h lowpbe.c pkcs11c.c
| * fixup commit for tag 'JSS_3_2_RTM'JSS_3_2_RTMcvs2hg2002-08-071460-615178/+0
|/
* Don't link to libhpi.so.nicolson%netscape.com2002-08-071-1/+0
|
* Fix bug 160207 by changing the error alerts we send for failed decryption.nelsonb%netscape.com2002-08-071-5/+4
|
* Fix for 157649 - allow crlutil to do partial decoding so it can be used as a ↵jpierre%netscape.com2002-08-071-13/+32
| | | | test program
* Additional error reportingjpierre%netscape.com2002-08-071-0/+3
|
* Implement partial CRL decoding. Fix for 149816. r=wtc . Uses new quick DER ↵jpierre%netscape.com2002-08-075-4/+165
| | | | decoder
* Reorder functions to avoid forward declaration of DecodePointerjpierre%netscape.com2002-08-071-23/+19
|
* Be consistent in memory allocations - use QuickZAllocjpierre%netscape.com2002-08-071-1/+1
|
* Add new quick DER decoder. r=wtcjpierre%netscape.com2002-08-076-1/+1081
|
* Bug 161316: make pk11pqg.h C++ safe.wtc%netscape.com2002-08-06188-1283/+25519
|\
* \ fixup commit for tag 'ROGC_20020830'ROGC_20020830cvs2hg2002-08-04187-25515/+1283
|\ \ | |/ |/|
| * fixup commit for tag 'NSS_OTIS_INT_RELEASE'NSS_OTIS_INT_RELEASEcvs2hg2002-08-04596-183430/+0
| |\ | |/ |/|
| * fixup commit for tag 'NSS_MULTIACCESS_DB_TAG_20020818_1'NSS_MULTIACCESS_DB_TAG_20020818_1cvs2hg2002-08-0476-14117/+1297
|/
* Fix for 158141 - add 5 minute slop time for OCSPjpierre%netscape.com2002-08-041-2/+12
|
* Turn on reset functionality for multiaccessdb clients.relyea%netscape.com2002-08-022-4/+11
|
* 1) factor out fortezzav1 from the chain processing code to make the code easierrelyea%netscape.com2002-08-023-112/+283
| | | | | | | to read. 2) only extract keys if we are using fortezzav1 cert (should speed up cert verify a bit). 3) Add function to verify a specific CA cert to verify a userCert Usage.
* Merge back 3.5 changes to the tiprelyea%netscape.com2002-08-021-10/+18
|
* Fix compiler warnings on NTjpierre%netscape.com2002-08-021-3/+3
|
* Fix incorrect macro usagejpierre%netscape.com2002-08-021-1/+1
|
* Correct the test of IP addresses in Subject Alternative Name extensions.nelsonb%netscape.com2002-08-011-33/+77
| | | | bug 103752.
* Don't crash if we try to read a nickname that has an invalid cert with it.relyea%netscape.com2002-08-011-1/+3
|
* this was obviously backwardsian.mcgreer%sun.com2002-08-011-1/+1
|
* Bug 157730: minor tweak suggested by brendan.wtc%netscape.com2002-08-011-6/+3
|
* 1) collections have size values that need to be updated.relyea%netscape.com2002-08-012-1/+14
| | | | | 2) handle the case where we can't get the encoding from the cert. 3) Check the cert validity when we first extract it.
* Arg.. version 1.63 was a misapplied patch, (supposed to be checked into therelyea%netscape.com2002-07-311-11/+20
| | | | | 3.5 branch). The result is 1.63 backs out 1.62, which is not the intent. restore 1.62.