Closed
Bug 343231
Opened 19 years ago
Closed 19 years ago
certutil issues certs for invalid requests
Categories
(NSS :: Tools, defect, P2)
Tracking
(Not tracked)
RESOLVED
FIXED
3.12
People
(Reporter: nelson, Assigned: alvolkov.bgs)
References
Details
Attachments
(1 file)
2.00 KB,
patch
|
nelson
:
review+
|
Details | Diff | Splinter Review |
The fix for bug 174193 didn't go far enough.
The code now checks that the request is signed, and reports a message
if the signature is invalid. However, it then proceeds to issue the cert.
In fact, it ignores any and all errors in parsing the request.
Reporter | ||
Updated•19 years ago
|
Assignee: nelson → alexei.volkov.bugs
Priority: -- → P2
Target Milestone: 3.11.3 → 3.12
Reporter | ||
Comment 2•19 years ago
|
||
Comment on attachment 247023 [details] [diff] [review]
return null if request has an invalid signature.
I have one minor issue with this patch.
>- if (rv) {
>+ if (rv != SECSuccess) {
Everywhere in this function where rv is tested, the test is simply
if (rv)
but here the patch changes it to
if (rv != SECSuccess)
The two are equivalent, but I'd like to see the function remain
self-consistent with respect to this style.
So please change this one line back to be consistent,
then r=nelson
Attachment #247023 -
Flags: review? → review+
Assignee | ||
Comment 3•19 years ago
|
||
/cvsroot/mozilla/security/nss/cmd/certutil/certutil.c,v <-- certutil.c
new revision: 1.106; previous revision: 1.105
Integrated with modification suggested by Nelson
Status: NEW → RESOLVED
Closed: 19 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•