3b886d7ebf824c92dcab1edb8edee8efa183756e: Fix bug 213084. Detect when cert in signature cannot be imported. NSS_3_8_BRANCH
wtc%netscape.com - Thu, 14 Aug 2003 20:12:28 +0000 - rev 4651
Fix bug 213084. Detect when cert in signature cannot be imported. Detect NULL pointer, don't crash. r=kaie. sr=jpierre. a=asa for Mozilla 1.5 beta. Modified Files: certdb/certdb.c cryptohi/seckey.c smime/cmssigdata.c Tag: NSS_3_8_BRANCH
d5dbf8256b66065233155c167a0454f6d18e3132: fixup commit for tag 'MOZILLA_1_4_1_RELEASE' MOZILLA_1_4_BRANCH MOZILLA_1_4_1_RELEASE
cvs2hg - Wed, 13 Aug 2003 02:24:28 +0000 - rev 4650
fixup commit for tag 'MOZILLA_1_4_1_RELEASE'
38dd76c133b7fbf0b0e8184f1d6be68e1f4be811: b=213084 crash when reading signed messages with some certs MOZILLA_1_4_BRANCH
kaie%kuix.de - Wed, 13 Aug 2003 02:24:27 +0000 - rev 4649
b=213084 crash when reading signed messages with some certs r=kaie sr=jpierre a=mkaply
042409b537d4b480876b95a74da2574effa9f78d: Fix from Ian to address Bugzilla bug 202179.
wtc%netscape.com - Tue, 12 Aug 2003 18:21:55 +0000 - rev 4648
Fix from Ian to address Bugzilla bug 202179. The fix restores some old code that was removed as part of our performance work (Bugzilla bug 145322). Thus, there may be a slight performance hit, but obviously, we need to have correct code first. This is a part of the code I really don't like. To summarize, there was a hack put in a long time ago to make sure that the PKCS#11 session in which the SSL keys are generated was never closed until the last key was deleted. This only worked by chance, and if any part of the code was changed (as was the case here), this unstable equilibrium would be lost. As with all hacks, it wasn't really documented, so the problem escaped our notice. As a result of putting the hack back in, we're going back to the horribly wasteful operation of opening 4 sessions and immediately closing them. I intend to have a proper solution in a later release.
ee5c4fa74f66d1ab28944c5635a0e52cb1381269: fixup commit for tag 'SUN_SECURITY_3_3_5_WEBSERVER' SUN_SECURITY_3_3_BRANCH SUN_SECURITY_3_3_5_WEBSERVER
cvs2hg - Mon, 11 Aug 2003 19:11:40 +0000 - rev 4647
fixup commit for tag 'SUN_SECURITY_3_3_5_WEBSERVER'
8b7a5074359e6c8581679c0493eeb08293af4e00: changed for 335 webserver special release SUN_SECURITY_3_3_BRANCH
sonja.mirtitsch%sun.com - Mon, 11 Aug 2003 19:11:39 +0000 - rev 4646
changed for 335 webserver special release
c1b3db011fc0e2dfa5596a777367aca5b457073e: Fix from Ian to address Bug 4900659: SUN_SECURITY_3_3_BRANCH
kirk.erickson%sun.com - Mon, 11 Aug 2003 17:12:12 +0000 - rev 4645
Fix from Ian to address Bug 4900659: SSL messages under load on B08/01/2003 The fix restores some old code that was removed as part of our performance work. Thus, there may be a slight performance hit, but obviously, we need to have correct code first. I plan to open a bugzilla bug for this now that we have located the problem. This is a part of the code I really don't like. To summarize, there was a hack put in a long time ago to make sure that the PKCS#11 session in which the SSL keys are generated was never closed until the last key was deleted. This only worked by chance, and if any part of the code was changed (as was the case here), this unstable equilibrium would be lost. As with all hacks, it wasn't really documented, so the problem escaped our notice. As a result of putting the hack back in, we're going back to the horribly wasteful operation of opening 4 sessions and immediately closing them. I intend to have a proper solution in a later release.
fa40b0acc0fd2f24d04b4ae24fe2823425070d53: Deleted useless local variable 'arena' in cert_ImportCAChain.
wtc%netscape.com - Fri, 08 Aug 2003 23:15:50 +0000 - rev 4644
Deleted useless local variable 'arena' in cert_ImportCAChain.
bebf2d738edaa7bdd678a06fd3068e015df2ad41: fixup commit for branch 'SSU_20030812_BRANCH' SSU_20030812_BRANCH SSU_20030812_BASE
cvs2hg - Thu, 07 Aug 2003 01:32:57 +0000 - rev 4643
fixup commit for branch 'SSU_20030812_BRANCH'
f50b74f351ba70b9a453b68820a0ad9f5fc8c42d: Fix for bug 202053 - build with VC++ .net 2003 NSS_3_8_BRANCH
jpierre%netscape.com - Thu, 07 Aug 2003 01:32:56 +0000 - rev 4642
Fix for bug 202053 - build with VC++ .net 2003
2f911a2656034a4977b97b31ea19a1f883216526: Bugzilla bug 214695: fixed incorrect use of PR_AtomicDecrement on reference
wtc%netscape.com - Fri, 01 Aug 2003 02:02:47 +0000 - rev 4641
Bugzilla bug 214695: fixed incorrect use of PR_AtomicDecrement on reference counts. The reference count should not be read "naked". Instead, we should simply use the return value of PR_AtomicDecrement for the result of the decrement. Modified Files: dev/devmod.c dev/devslot.c dev/devtoken.c pki/certificate.c pki/pkibase.c
c47829e4a5a3f29f87914771d368ceb44df9f380: Fix bug 213084. Detect when cert in signature cannot be imported.
nelsonb%netscape.com - Thu, 31 Jul 2003 00:16:27 +0000 - rev 4640
Fix bug 213084. Detect when cert in signature cannot be imported. Detect NULL pointer, don't crash.
a3db73114117e965dd8488325fb12fbc6d90f43e: Bug 213903: removing unused variables 'delold', 'save', 'entry'
bishakhabanerjee%netscape.com - Mon, 28 Jul 2003 22:55:16 +0000 - rev 4639
Bug 213903: removing unused variables 'delold', 'save', 'entry'
9e25945f593a64858854da3f2c6024dd42dbc39c: Bug 213902 : removing unused variable "next" in "cert_DecodeNameConstraintSubTree"
bishakhabanerjee%netscape.com - Mon, 28 Jul 2003 21:53:16 +0000 - rev 4638
Bug 213902 : removing unused variable "next" in "cert_DecodeNameConstraintSubTree"
0765f29670e5d1775271051852de007a9b50dff4: Allow freebl to build correctly under MS VC++ .net 2003 . sr=nelsonb
jpierre%netscape.com - Tue, 22 Jul 2003 02:04:57 +0000 - rev 4637
Allow freebl to build correctly under MS VC++ .net 2003 . sr=nelsonb
e4c2bc82216a820ccde1f2e711bc45936d193f6c: fixup commit for tag 'JSS_3_4_1_RTM' JSS_3_4_1_RTM
cvs2hg - Mon, 21 Jul 2003 23:40:53 +0000 - rev 4636
fixup commit for tag 'JSS_3_4_1_RTM'
0975891ade17befc005c9adc7e9757a0676f91b6: fixup commit for tag 'JSS_3_4_1_BETA1' JSS_3_4_1_BETA1
cvs2hg - Mon, 21 Jul 2003 23:40:52 +0000 - rev 4635
fixup commit for tag 'JSS_3_4_1_BETA1'
7e44be3a8d028a98900b90398294bb0db0ffe5d9: Bugzilla bug 213192: take the first two components of $(OS_RELEASE) the
wtc%netscape.com - Mon, 21 Jul 2003 23:40:51 +0000 - rev 4634
Bugzilla bug 213192: take the first two components of $(OS_RELEASE) the right way. The basename function that we were using only works when $(OS_RELEASE) has exactly three components. The patch is contributed by Ed Catmur <ed@catmur.co.uk>. r=wtc.
a2ed6481a6220535a01c096a913614f31681553b: fixup commit for branch 'MINIMO_6_AUG_2003_BRANCH' MINIMO_6_AUG_2003_BRANCH MINIMO_6_AUG_2003_TAG
cvs2hg - Mon, 21 Jul 2003 23:36:45 +0000 - rev 4633
fixup commit for branch 'MINIMO_6_AUG_2003_BRANCH'
c7b6309dbd2cb33481e59fdf04729a11c71b8a25: Bugzilla bug 213192: take the first two components of $(OS_RELEASE) the NSS_3_8_BRANCH
wtc%netscape.com - Mon, 21 Jul 2003 23:36:44 +0000 - rev 4632
Bugzilla bug 213192: take the first two components of $(OS_RELEASE) the right way. The basename function we were using only works when $(OS_RELEASE) has exactly three components. The patch is contributed by Ed Catmur <ed@catmur.co.uk>. r=wtc. Tag: NSS_3_8_BRANCH
(0) -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 tip