summaryrefslogtreecommitdiff
path: root/security/nss/lib/pki/pki3hack.c
Commit message (Collapse)AuthorAgeFilesLines
* Bug 845556, reorganize NSS directory layout, moving files, very large ↵Kai Engert2013-02-281-1435/+0
| | | | changeset! r=wtc
* Bug 813857: Make certificate trust flags thread safe.ryan.sleevi%gmail.com2013-01-071-4/+17
| | | | r=rrelyea
* Bug 820651: Fix confusion of PRStatus and SECStatus in function returnwtc%google.com2012-12-121-1/+1
| | | | | | values. r=emaldona. Modified Files: lib/freebl/drbg.c lib/pki/pki3hack.c
* Bug 479508, bug 482153, bug 764393: add the isTrustedForUsage method to thewtc%google.com2012-07-271-0/+47
| | | | | | | | | nssDecodedCert structure. Change nssCertificateArray_FindBestCertificate to take trust into consideration, always choosing a trusted cert over an untrusted cert when presented with that choice. Based on a patch by Nelson Bolyard. r=rob.stradling,rrelyea. Modified Files: pki3hack.c pkibase.c pkitm.h
* Bug 745548, nssPKIObject_GetNicknameForToken should always return a copy, ↵kaie%kuix.de2012-05-171-0/+4
| | | | r=rrelyea
* Bug 716563 - update license to MPL 2. r=rrelyea.gerv%gerv.net2012-04-251-35/+3
|
* CVSi ----------------------------------------------------------------------rrelyea%redhat.com2012-02-171-0/+16
| | | | | Bug 727204 - Generic blacklisting mechanism is not yet working original patch by wtc. verified by kai reviewed by relyea
* Bug 651523: Remove step-up code, v4, removing EXPORT_VERSION build option, ↵bsmith%mozilla.com2011-11-171-4/+0
| | | | r=rrelyea
* Fix Tinderbox bustage, backout all patches from 2011-11-11kaie%kuix.de2011-11-161-0/+4
|
* Bug 651523 - Remove SSL step-up code from libssl and remove step-up extended ↵bsmith%mozilla.com2011-11-111-4/+0
| | | | key usage support, r=rrelyea
* Bug 642503 - Generic blacklisting mechanism for bogus certsrrelyea%redhat.com2011-04-131-9/+9
| | | | | Patch 1: rename (see comment 20). r=emaldona
* Bug 625675 - trust flags are not being deleted when we delete the associated ↵emaldona%redhat.com2011-03-261-0/+92
| | | | certificate, r=rrelyea
* Bug 564091: change "non-existent" to "nonexistent" in every componentnelson%bolyard.com2010-05-181-1/+1
| | | | Patch contributed by Michael Kohler <michaelkohler@live.com>
* Bug 415565: Use new NSPR atomic macros in NSSnelson%bolyard.com2010-04-031-1/+1
| | | | Patch contributed by Steve Snyder <swsnyder@snydernet.net>, r=wtc
* Bug 505553 - Implement Changes for System NSSrrelyea%redhat.com2009-10-011-0/+10
| | | | r=nelson
* Bug 505559 - Need function to identify the one and only default internal ↵rrelyea%redhat.com2009-07-301-3/+3
| | | | | | private key slot. r=nelson
* Bug 444850 ? NSS misbehaves badly in the presence of a disabled PKCS#11 slotnelson%bolyard.com2008-08-091-3/+6
| | | | r=julien.pierre, rrelyea
* Bug 384459, ignore issuer and serial number components of authority key IDnelson%bolyard.com2008-07-221-28/+15
| | | | | extension when they don't match. Don't report them in certutil either. r=rrelyea, sr=wtc
* 390381 - libpkix rejects cert chain when root CA cert has no basic constraints.alexei.volkov.bugs%sun.com2008-03-151-0/+9
| | | | Main patch(by Nelson). r=rrelyea
* Bug 251594 ? Certificate from PKCS#12 file with colon in friendlyName notnelson%bolyard.com2007-07-141-2/+5
| | | | selectable for signing/encryption. r=neil.williams
* 353742: klocwork null ptr dereferences in pki3hack.c. r=nelsonalexei.volkov.bugs%sun.com2006-10-091-0/+12
|
* Bug 354313. Fix leak in STAN_GetCERTCertificateName. r=julien,rrelyeanelson%bolyard.com2006-10-011-1/+6
|
* 337013: OOM crash [@ nssArena_Destroy - ↵alexei.volkov.bugs%sun.com2006-08-301-0/+6
| | | | nssTrustDomain_TraverseCertificatesBySubject][@ nssArena_Destroy - nssTrustDomain_TraverseCertificatesByNickname] Dereferencing possibly NULL "tmpArena". r=nelson, sr=julien
* Fix for bug 225525 . Resolve race assigning NSSCertificate fields which ↵julien.pierre.bugs%sun.com2006-08-221-38/+61
| | | | leaked memory and slot reference. r=nelson
* [Bug 337008] OOM crash [@ nssList_Add - STAN_InitTokenForSlotInfo - ↵alexei.volkov.bugs%sun.com2006-06-131-7/+14
| | | | STAN_LoadDefaultNSS3TrustDomain][@ nssList_Clone - nssList_CreateIterator - STAN_LoadDefaultNSS3TrustDomain] Dereferencing possibly NULL "(td)->tokenList". r=nelson, sr=wtc
* [Bug 337008] OOM crash [@ nssList_Add - STAN_InitTokenForSlotInfo - ↵alexei.volkov.bugs%sun.com2006-05-181-0/+6
| | | | STAN_LoadDefaultNSS3TrustDomain][@ nssList_Clone - nssList_CreateIterator - STAN_LoadDefaultNSS3TrustDomain] Dereferencing possibly NULL "(td)->tokenList". r=nelson, sr=wtc
* Fix for 283765. Fix for UMR in NSSUsage. r=julienjulien.pierre.bugs%sun.com2005-03-041-19/+19
|
* Bugzilla Bug 267158: removed the $Name$ RCS keyword from our source files.wtchang%redhat.com2005-01-201-1/+1
| | | | | This keyword adds noise to the output of "ident libnss3.so | grep NSS" on our debug build, and appears to cause spurious CVS conflicts. r=nelsonb.
* Include nssrwlk.h for NSSRWLock_ funtionsjulien.pierre.bugs%sun.com2004-10-071-0/+1
|
* Bugzilla Bug 252702relyea%netscape.com2004-07-291-12/+51
| | | | | | NSS needs to handle better token insertion and removal. Applied from patch to NSS 3.9
* Bug 250687relyea%netscape.com2004-07-211-0/+17
| | | | | | NSS Crashes or leaks Cert references if bad certs are passed up by PKCS #11 modules. r=nelson sr=ian
* bug 180268, reimplement ssl step-up for builtinsian.mcgreer%sun.com2004-05-171-2/+10
|
* Bug 236613: change to MPL/LGPL/GPL tri-license.gerv%gerv.net2004-04-251-30/+33
|
* Detect empty emailAddr strings in CERTCertificates. Bugzilla bug 211540.nelsonb%netscape.com2003-11-151-2/+3
| | | | | | | Modified Files: cmd/dbck/dbck.c cmd/signtool/util.c lib/certdb/certdb.c lib/certdb/stanpcertdb.c lib/pkcs7/p7decode.c lib/pki/certificate.c lib/pki/pki3hack.c lib/smime/cmssiginfo.c lib/softoken/pkcs11u.c
* Workaround race. Reduce leaks. Not a real fix. Bugzilla bug 225525.nelsonb%netscape.com2003-11-131-3/+21
|
* Eliminate some leaks in Stan cert code.nelsonb%netscape.com2003-11-111-33/+52
| | | | Partial fix to bugscape bug 53573.
* Bugzilla bug 217247: improved the memory leak fix for the appData nicknameswtc%netscape.com2003-09-121-3/+8
| | | | | | returned by PK11_ListCerts. Instead of allocating them from the heap first and copying to the arena, allocate them from the arena directly. r=jpierre Modified Files: certhigh.c pk11cert.c pki3hack.h pki3hack.c
* Bugzilla bug 72291: have PK11_ListCerts return all the cert instances onwtc%netscape.com2003-08-251-2/+10
| | | | | tokens. The patch is Julien Pierre's, with changes by Wan-Teh Chang. Modified Files: pk11wrap/pk11cert.c pki/pki3hack.c pki/pki3hack.h
* bug 174200, don't attempt to decode cert when destroying it, handle failureian.mcgreer%sun.com2003-02-181-1/+6
| | | | | to decode cert serial number r=nelsonb
* Bug 186586: If at NSS shutdown there are still certs in the cert caches,wtc%netscape.com2003-01-081-3/+20
| | | | | | | | | | | | cause NSS shutdown and the next NSS initialization to fail but do not destroy the cert caches (and the crypto context and trust domain containing them) to avoid a crash if the NSS client destroys the certs later. New error codes needed to be added to indicate the failure of NSS shutdown and NSS initialization due to this cause. Modified Files: base/errorval.c nss/nssinit.c pki/pki3hack.c pki/pki3hack.h pki/pkistore.c pki/pkistore.h pki/tdcache.c pki/trustdomain.c util/secerr.h
* Bug 183612: added support for looking up a cert by subject key ID andwtc%netscape.com2002-12-171-1/+1
| | | | | | | | | | | | creating a CMS recipient info from a subject key ID. The patch was contributed by Javi Delgadillo <javi@netscape.com>. r=relyea, wtc. Modified Files: certdb/cert.h certdb/certdb.c certdb/certdb.h certdb/certv3.c certdb/stanpcertdb.c nss/nss.def nss/nssinit.c pk11wrap/pk11cert.c pk11wrap/pk11func.h pk11wrap/secmod.h pki/pki3hack.c smime/cms.h smime/cmslocal.h smime/cmspubkey.c smime/cmsrecinfo.c smime/cmssiginfo.c smime/cmst.h smime/smime.def
* bug 174634, fix handling of authorityCertIssuer in chain constructionian.mcgreer%sun.com2002-10-221-1/+1
|
* bug 171224, changes to path constructionian.mcgreer%sun.com2002-10-011-38/+59
| | | | r=nelsonb
* Bug 171422: removed unused (and incorrect) code. r=mcgreer.wtc%netscape.com2002-09-301-2/+0
|
* Bug 166894: Handle changing Trust when cert is in the token.relyea%netscape.com2002-09-271-0/+31
|
* Bug 166894: destroy nssTrust before returning from STAN_ChangeCertTrust.wtc%netscape.com2002-09-241-5/+9
|
* Change coding style used in nss/lib/pki to one that works with ctags.nelsonb%netscape.com2002-09-231-18/+9
| | | | | | Bug 169999. Modified Files: asymmkey.c certdecode.c certificate.c cryptocontext.c pki3hack.c pkibase.c pkistore.c symmkey.c tdcache.c trustdomain.c
* Bug 157730: minor tweak suggested by brendan.wtc%netscape.com2002-08-011-6/+3
|
* Arg.. version 1.63 was a misapplied patch, (supposed to be checked into therelyea%netscape.com2002-07-311-11/+20
| | | | | 3.5 branch). The result is 1.63 backs out 1.62, which is not the intent. restore 1.62.
* Bug 157730. Don't crash on bogus input from a PKCS #11 device.relyea%netscape.com2002-07-311-20/+11
| | | | | review = be & wtc. a = asa