Commit Graph

1992 Commits

Author SHA1 Message Date
wtc%netscape.com
0c57191723 Bugzilla bug 135824: fixed slot reference leaks in signtool and removed
a faulty attempt to set user trust.  r=relyea,mcgreer.
Modified files: certgen.c util.c
2002-05-13 17:08:20 +00:00
wtc%netscape.com
f6f0339d00 Bugzilla bug 135052: more cleanup in SEC_PKCS12DecoderStart. r=relyea. 2002-05-10 23:10:06 +00:00
jpierre%netscape.com
e1a3c306e8 Fix for bug 142868 - CA certificates are imported with NULL nicknames . 2002-05-10 20:21:38 +00:00
relyea%netscape.com
94a587472a Add function to determine if it's safe to delete the internal module. 2002-05-10 18:36:18 +00:00
relyea%netscape.com
fdca53cf70 Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it. 2002-05-10 18:13:44 +00:00
relyea%netscape.com
3ee0c3c996 Add new error code for trying to all previously deleted modules which have not yet been freed. 2002-05-10 18:12:39 +00:00
relyea%netscape.com
0d88474fba Allow both FIPS and non-FIPS tokens to be initialized and active at the same time. 2002-05-10 18:11:37 +00:00
relyea%netscape.com
610b845a52 When we force, we should preserve the NULL nickname semantics. 2002-05-10 18:10:26 +00:00
wtc%netscape.com
a8cdaf3aca Bugzilla bug 135821: fixed the internal slot reference leak in
PK11_WrapPrivKey.  r=relyea.
2002-05-09 23:34:24 +00:00
wtc%netscape.com
9c38dd9727 Bugzilla bug 135809: fixed the slot reference leaks in PBE_CreateContext
and SEC_PKCS5GetIV.  r=relyea.
2002-05-09 23:21:16 +00:00
wtc%netscape.com
0daca2313b Bugzilla bug 135818: fixed internal slot reference leaks in
PK11_VerifySlotMechanisms and PK11_InitToken.  r=relyea.
2002-05-09 23:18:15 +00:00
wtc%netscape.com
363fb30239 Bugzilla bug 135826: fixed the slot reference leaks. 2002-05-09 23:01:21 +00:00
ian.mcgreer%sun.com
6804ba674f bug 135808, STAN_GetDefaultCryptoToken appears to leak a slot reference, but there are no callers of it. Removing function.
r=wtc
2002-05-09 22:42:23 +00:00
wtc%netscape.com
894efe87d2 Bugzilla bug 135334: free the internal key slot reference when we are done. 2002-05-09 21:14:36 +00:00
wtc%netscape.com
43f8939e7c Bugzilla bug 135058: free nickCopy on error returns in
PK11_FindCertsFromNickname.  r=mcgreer.
2002-05-09 20:01:18 +00:00
wtc%netscape.com
0a6086505a Bugzilla bug 136279: Return oldpath only if it is different from path.
Avoid an unnecessary call to SECMOD_HasRootCerts in nss_FindExternalRoot.
2002-05-07 23:35:22 +00:00
relyea%netscape.com
56f8e3b5e8 Automatically create a NULL email profile for certs with email addresses which
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
3a91379d33 bug 141936, crash when NULL nickname entry is stored in temp store
r=jpierre
2002-05-07 20:31:59 +00:00
ian.mcgreer%sun.com
d250a3e38f bug 142175, PK11_ListCerts regressions -- handle PKCS#11 incompatibilites with serial numbers, and fix trust collection. 2002-05-07 14:58:12 +00:00
jpierre%netscape.com
41ba83e283 Fix for 142658 - fix certutil crash with NULL nickname 2002-05-06 23:10:40 +00:00
wtc%netscape.com
300f9cadfe Bugzilla bug 136279: fixed bugs where 'path' and 'oldpath' were passed
to string functions before they were null-terminated.  Added a comment
to explain what 'oldpath' is for.
2002-05-03 20:59:50 +00:00
ian.mcgreer%sun.com
f0d29104b1 bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate. 2002-05-02 19:00:13 +00:00
relyea%netscape.com
7143d6f89c Fix the RSA key check to correctly accept keys with p < q. 2002-05-02 17:39:13 +00:00
jpierre%netscape.com
e7ee105522 Fix for 136279 - initialize NSS in a way compatible with < 3.4 versions of NSS 2002-05-01 01:04:41 +00:00
wtc%netscape.com
e4f5bd3810 Bugzilla bug 127062: use PR_MSG_PEEK instead of MSG_PEEK. 2002-05-01 00:21:50 +00:00
wtc%netscape.com
10bae1a1e3 Bugzilla bug 131057: define PORT_Strdup as a function that calls PORT_Alloc.
Modified files:
	lib/ckfw/nsprstub.c lib/fortcrypt/swfort/pkcs11/stub.c
	lib/nss/nss.def lib/util/secport.c lib/util/secport.h
2002-05-01 00:06:39 +00:00
wtc%netscape.com
4747c98947 Whitespace change. 2002-04-30 00:11:19 +00:00
relyea%netscape.com
cec43732fb Use NewTempCert and AddTempCert when importing because the cert may already exist
in the cache.
2002-04-29 23:54:07 +00:00
wtc%netscape.com
35e9736426 Added pkibase.c to the project. 2002-04-26 23:29:19 +00:00
wtc%netscape.com
787be44323 Needed a (char *) cast for slotInfo.manufacturerID because it is an array
of "unsigned" chars.  Mac's compiler complains about that.
2002-04-26 23:05:40 +00:00
wtc%netscape.com
4841e2949f Removed devobject.c from the project. That file was removed. 2002-04-26 22:52:07 +00:00
wtc%netscape.com
2762eaebca Need to define SHLIB_SUFFIX for lib/softoken/dbinit.c. 2002-04-26 22:42:15 +00:00
relyea%netscape.com
3d3a200209 return error when incomplete shutdown has been detected. 2002-04-26 22:36:07 +00:00
ian.mcgreer%sun.com
cdae9ed5a1 When doing cert traversals, create the certs in full as they are found. This avoids thrashing the softoken's object cache when the database has a large number of certs. 2002-04-26 14:34:05 +00:00
ian.mcgreer%sun.com
74b86448f7 fix broken HPUX builds 2002-04-26 12:59:06 +00:00
relyea%netscape.com
600cb240a3 Add code to update nickname and 'CKA_ID' from set attribute calls. This allows
us to add a nickname to a cert after we import it from pkcs #12.
2002-04-26 01:44:33 +00:00
relyea%netscape.com
fbb0134208 Write the nickname entry as well when adding a nickname to a bug. 2002-04-26 01:09:21 +00:00
relyea%netscape.com
2cd6213ca5 Detect Active Card presents and disable PROTECTED_PIN_PATH login when found. 2002-04-25 21:24:47 +00:00
wtc%netscape.com
d3e14fdce2 Deleted code that was made obsolete by the previous revision. 2002-04-25 21:10:09 +00:00
relyea%netscape.com
1abdbba5a8 Don't let activeCards set the Protect_Auth bit because they weren't intending to
to begin with.
2002-04-25 20:57:06 +00:00
ian.mcgreer%sun.com
44d76f3678 if a cert already exists, use C_SetAttributeValue to change its mutable attributes during import (instead of trying to recreate it) 2002-04-25 20:49:49 +00:00
ian.mcgreer%sun.com
05bc7f4136 bug 138626, remove deleted cert from cache even if references still exist 2002-04-25 19:37:30 +00:00
ian.mcgreer%sun.com
2e14215952 reorganize token cache so that cache entries for imported objects are created from the token, not from the user-supplied template 2002-04-25 19:33:47 +00:00
relyea%netscape.com
b02d968215 NSS 3.4 has branch, that makes the tip at least NSS 3.5 2002-04-25 18:51:45 +00:00
relyea%netscape.com
0008ea5125 Don't set the Token value before fetching CRL attributes. This code is fetching
attributes from a known CRL, not looking up new attributes (I'm pretty sure that
CVS apropos would show I checked in the previously wrong code).

bob
2002-04-25 18:33:45 +00:00
sonja.mirtitsch%sun.com
adb8e67a58 trying a version that can test tip as default for tinderbox and 341
as default for nightly QA
2002-04-25 01:04:10 +00:00
relyea%netscape.com
8747bf72ad Don't crash if our cache entry is not found. 2002-04-25 00:45:42 +00:00
relyea%netscape.com
35695b7987 Turn off caching for non-hardware tokens for now until we fix some of our
tokens which can be updated out-of-band to use the proper 'removable token'
semantics.
2002-04-25 00:25:58 +00:00
relyea%netscape.com
df120eb43d Don't crash if we don't find the profile (and thus don't have a slot to free). 2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com
217231840b This is a real corner case. If a search is done by issuer/serial, and the returned cert was in the cache, need to see if the cert's slot was removed. If so, destroy the cert and retry the search on the present tokens. 2002-04-24 19:39:41 +00:00