summaryrefslogtreecommitdiff
path: root/security/nss/lib/certhigh/certhigh.c
Commit message (Collapse)AuthorAgeFilesLines
* fixup commit for branch 'GECKO181_20080827_RELBRANCH'cvs2hg2008-01-311-109/+11
|
* Bugzilla Bug 287057: fixed memory leaks in callers of cert_FindExtension.wtchang%redhat.com2005-06-301-2/+6
| | | | | | | | pass NULL as the SECItem* argument if we only want to know if the extension exists but don't need its value. r=jpierre,nelsonb. Modified Files: certdb/certdb.c certdb/genname.c certhigh/certhigh.c certhigh/certhtml.c certhigh/crlv2.c certhigh/ocsp.c
* Bug 236613: change to MPL/LGPL/GPL tri-license.gerv%gerv.net2004-04-251-30/+33
|
* Enable a chain to validate when a perm cert has been issued by anelsonb%netscape.com2004-02-071-1/+4
| | | | temp cert. Bug 233038. r=ian,relyea
* Bugzilla bug 217247: improved the memory leak fix for the appData nicknameswtc%netscape.com2003-09-121-1/+1
| | | | | | returned by PK11_ListCerts. Instead of allocating them from the heap first and copying to the arena, allocate them from the arena directly. r=jpierre Modified Files: certhigh.c pk11cert.c pki3hack.h pki3hack.c
* Deleted useless local variable 'arena' in cert_ImportCAChain.wtc%netscape.com2003-08-081-12/+0
|
* Fix for 164744 - implement new functions for pk12util . r=wtcjpierre%netscape.com2002-10-031-28/+2
|
* bug 171224, changes to path constructionian.mcgreer%sun.com2002-10-011-1/+7
| | | | r=nelsonb
* Fix 169798: Failed to install ca signing certificate with NS3.6beta.nicolson%netscape.com2002-09-271-6/+11
| | | | r=wtc
* Bug 168384: need to initialize the nss3lookingForCA field of nssUsage.wtc%netscape.com2002-09-131-0/+1
|
* Bug 166933: fixed build breakage on the Mac.wtc%netscape.com2002-09-061-6/+6
| | | | Modified files: certdb/crl.c certhigh/certhigh.c softoken/dbmshim.c
* Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.wtc%netscape.com2002-09-061-0/+2
| | | | The patch for this checkin is attached to bug 166785.
* 158005 - add new CRL decode and import functions . Benefits are :jpierre%netscape.com2002-07-191-59/+6
| | | | | | | | - ability to import to any slot - ability to specify decode options, such as "don't copy DER" - ability to specify import options, such as "don't do CRL checks" This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL to this new function, eliminating the code duplication that existed
* Initialize type fields to supress purify uninitialized reference warnings.relyea%netscape.com2002-06-281-0/+1
|
* Collect the full names of the certs, not just the stan names.relyea%netscape.com2002-06-251-3/+12
|
* Don't decode or extract trust for certs if we are just getting the nicknames ↵relyea%netscape.com2002-06-241-39/+49
| | | | -- particularly for user certs.
* bug 144309, return value of STAN_GetCERTCertificate not checkedian.mcgreer%sun.com2002-05-201-1/+6
| | | | r=wtc
* bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, ↵ian.mcgreer%sun.com2002-05-021-0/+1
| | | | must be replaced with CERT_NewTempCertificate.
* Use NewTempCert and AddTempCert when importing because the cert may already ↵relyea%netscape.com2002-04-291-4/+3
| | | | | | exist in the cache.
* Don't crash when getting a single user cert, but old certs are in the databaserelyea%netscape.com2002-04-241-0/+2
| | | | with the same subject, but no keys.
* Token and cert processing fixes:relyea%netscape.com2002-04-221-0/+27
| | | | | | | | | | | | | | | | | | | | 1) use NewTempCert rather than DERDecode cert in all import cert cases. When DERDecode cert is used, we may wind up with a cert that gets cleared when we try to import it because it already in the cache. NewTempCert will return the version that is in the cache. 2) If we are returning the CAList, only return certs that are CA's (not usercerts). 3) Authenticate to all the tokens if necessary before we try to list certs. (Stan code should eventually get automatic authentication calls in the code itself). 4) When looking up user certs, don't return those certs with the same subject, but do not have any key material associated with them (that is don't crash if we have old certs in our database without nicknames, but match user certs on our smart cards). 5) Save the nickname associated with our subject list in the temp cache so we can correctly remove the entry even if the cert's nickname changes (because of smart card insertions and removals, or because of creation and deletions of our user cert).
* CRL issues: 1) return url when finding and importing CRL's.relyea%netscape.com2002-02-261-7/+11
| | | | | | | 2) fix CERT_ImportCRL so it actually works. NOTE: Calls of SEC_NewCrl() should verify the signature on the CRL before importing!.
* Fix cert leaks when building a chain. There are several client auth bugs ↵ian.mcgreer%sun.com2002-02-021-3/+18
| | | | filed, this may not be for any one in particular, but was found with tstclnt.
* Fix nickname check for filtering cert lists.relyea%netscape.com2002-01-121-1/+41
|
* Changes required to get the trunk of NSS building on the Mac.javi%netscape.com2002-01-091-0/+2
|
* a plethora of changes for handling S/MIME certsian.mcgreer%sun.com2001-11-081-1/+1
|
* Land BOB_WORK_BRANCH unto the tip.relyea%netscape.com2001-11-081-32/+11
| | | | | | | | remove lots of depricated files. move some files to appropriate directories (pcertdb *_rand associated headers to soft token, for instance) rename several stan files which had the same name as other nss files. remove depricated functions.
* add usage to find best parametersian.mcgreer%sun.com2001-10-191-3/+6
|
* add ability to notify user that chain is incompleteian.mcgreer%sun.com2001-10-171-1/+1
|
* implement CERT_CertChainFromCert using Stanian.mcgreer%sun.com2001-10-171-0/+1174
|\
* | fixup commit for tag 'DBM_1_6_BASE'DBM_1_6_BASEcvs2hg2001-10-171-1118/+0
|/
* Add new semantic when importing a cert chain for the case where the cert chainrelyea%netscape.com2001-05-031-35/+53
| | | | may have otherwise invalid CA's, but that the CA's should be implicitly trusted.
* Fix a UMR, one of many where the SECItem type field was uninitialized.nelsonb%netscape.com2000-09-181-0/+2
| | | | | bug 39483. Also, eliminate a warning about calling an undeclared function by including the header file.
* Create a new function, CERT_DupCertList(), and call it instead of callingnelsonb%netscape.com2000-09-091-3/+48
| | | | | | CERT_CertChainFromCert in ssl_DupSocket(). This is MUCH faster. This is the first approximation of the right fix. The next step is to consider doing ref counting instead of actual duplication. Fixes bug 51425 .
* Merge smimetk_branch to tip...chrisk%netscape.com2000-06-131-0/+32
|
* Initial NSS Open Source checkinrelyea%netscape.com2000-03-311-0/+1021