Commit Graph

241 Commits

Author SHA1 Message Date
relyea%netscape.com
2cf20e0041 return certs in sorted order. 2002-07-23 00:34:20 +00:00
jpierre%netscape.com
a82b9f46ba 158005 - add new CRL decode and import functions . Benefits are :
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
wtc%netscape.com
56c3c291e5 Bug 157750: handle the possibility that some certs do not have a label. 2002-07-16 21:13:40 +00:00
relyea%netscape.com
a035ec8c53 Don't crash if a pkcs #11 device gives us an invalid CRL (or even a valid CRL that we don't know how to parse). 2002-07-10 01:31:01 +00:00
relyea%netscape.com
006e3925e9 1) fix return type warning in pk11ListCertsCallback.
2) treat lastTime==0 as always outside the delay time. (removes spurious
prompts in FIPS mode on some platforms.)
2002-07-09 04:39:35 +00:00
relyea%netscape.com
6880c87a8d More performance improvements in listing certs:
1) reduce more short term memory allocate/frees.
	2) remove sha1 hash calculations from critical paths.
	3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
relyea%netscape.com
af924e2843 Initialize type fields to supress purify uninitialized reference warnings. 2002-06-28 03:00:10 +00:00
relyea%netscape.com
43480112f3 Initialize type field to clear off purify warnings. 2002-06-25 23:00:59 +00:00
ian.mcgreer%sun.com
4091f82677 two more places to dump templates 2002-06-25 19:40:16 +00:00
ian.mcgreer%sun.com
bb3bfc1199 fix AIX builds, 64-bit compiler chokes on large switches in debug builds 2002-06-25 16:57:40 +00:00
relyea%netscape.com
7caefab6ed Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs. 2002-06-24 22:36:59 +00:00
ian.mcgreer%sun.com
2a67969b3c fix broken AIX builds 2002-06-24 22:29:12 +00:00
ian.mcgreer%sun.com
b73a1edc81 log more mechanisms and templates 2002-06-24 22:22:57 +00:00
relyea%netscape.com
d7a32bbce6 reduce the calls to get the login state as these calls seem to be pretty expensive
for some tokens.
2002-06-20 18:49:45 +00:00
ian.mcgreer%sun.com
48d6b949c1 bug 98926, PKCS#11 session logging 2002-06-19 18:32:57 +00:00
ian.mcgreer%sun.com
4cf84d39dd missed part of last patch (bug 145322) 2002-06-19 15:26:55 +00:00
ian.mcgreer%sun.com
e30639f9cd bug 145322, second patch, clean up pk11_saveContextHelper 2002-06-19 15:22:54 +00:00
ian.mcgreer%sun.com
607f12501a bug 145322, reduce the number of PKCS#11 sessions used in SSL connections, implement new function PK11_SaveContextAlloc
r=relyea
2002-06-19 15:21:37 +00:00
ian.mcgreer%sun.com
0992642b67 bug 150704, PK11_Finalize can crash because softoken does not implement C_XXXFinal correctly 2002-06-19 14:59:24 +00:00
relyea%netscape.com
3839be90f6 Update cert handle on token insertion/removal. 2002-06-13 21:43:30 +00:00
relyea%netscape.com
696026ef88 When checking NeedInit status, go back and check the token in case the token
has been initialized offline.
2002-06-11 23:33:25 +00:00
nicolson%netscape.com
fa1fbd5d69 Fix 147794: PK11_ImportDERPrivateKeyInfoAndReturnKey frees the private key incorrectly. 2002-06-01 00:43:46 +00:00
wtc%netscape.com
6a49741d7d This is a test. I changed Revision and Date to bogus values and want to
see what actually got checked in.
2002-05-30 02:08:07 +00:00
relyea%netscape.com
a37f083171 Refresh token cache after login on tokens that need to log in before they
could read their certs.
2002-05-22 23:13:05 +00:00
relyea%netscape.com
482a55e955 Back out the change on Module destruction. 2002-05-22 00:25:48 +00:00
relyea%netscape.com
3b707d47e7 Fix spelling error.
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
ian.mcgreer%sun.com
dc613b61ee bug 144309, return value of STAN_GetCERTCertificate not checked
r=wtc
2002-05-20 18:05:11 +00:00
relyea%netscape.com
b9c9b409d6 Add function to get the PBEIV. 2002-05-16 22:06:19 +00:00
relyea%netscape.com
6f20bf6c21 bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs. 2002-05-14 23:16:16 +00:00
relyea%netscape.com
94a587472a Add function to determine if it's safe to delete the internal module. 2002-05-10 18:36:18 +00:00
relyea%netscape.com
fdca53cf70 Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it. 2002-05-10 18:13:44 +00:00
wtc%netscape.com
a8cdaf3aca Bugzilla bug 135821: fixed the internal slot reference leak in
PK11_WrapPrivKey.  r=relyea.
2002-05-09 23:34:24 +00:00
wtc%netscape.com
9c38dd9727 Bugzilla bug 135809: fixed the slot reference leaks in PBE_CreateContext
and SEC_PKCS5GetIV.  r=relyea.
2002-05-09 23:21:16 +00:00
wtc%netscape.com
0daca2313b Bugzilla bug 135818: fixed internal slot reference leaks in
PK11_VerifySlotMechanisms and PK11_InitToken.  r=relyea.
2002-05-09 23:18:15 +00:00
wtc%netscape.com
43f8939e7c Bugzilla bug 135058: free nickCopy on error returns in
PK11_FindCertsFromNickname.  r=mcgreer.
2002-05-09 20:01:18 +00:00
relyea%netscape.com
56f8e3b5e8 Automatically create a NULL email profile for certs with email addresses which
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
f0d29104b1 bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate. 2002-05-02 19:00:13 +00:00
wtc%netscape.com
4747c98947 Whitespace change. 2002-04-30 00:11:19 +00:00
wtc%netscape.com
787be44323 Needed a (char *) cast for slotInfo.manufacturerID because it is an array
of "unsigned" chars.  Mac's compiler complains about that.
2002-04-26 23:05:40 +00:00
relyea%netscape.com
3d3a200209 return error when incomplete shutdown has been detected. 2002-04-26 22:36:07 +00:00
relyea%netscape.com
2cd6213ca5 Detect Active Card presents and disable PROTECTED_PIN_PATH login when found. 2002-04-25 21:24:47 +00:00
relyea%netscape.com
1abdbba5a8 Don't let activeCards set the Protect_Auth bit because they weren't intending to
to begin with.
2002-04-25 20:57:06 +00:00
relyea%netscape.com
35695b7987 Turn off caching for non-hardware tokens for now until we fix some of our
tokens which can be updated out-of-band to use the proper 'removable token'
semantics.
2002-04-25 00:25:58 +00:00
ian.mcgreer%sun.com
217231840b This is a real corner case. If a search is done by issuer/serial, and the returned cert was in the cache, need to see if the cert's slot was removed. If so, destroy the cert and retry the search on the present tokens. 2002-04-24 19:39:41 +00:00
relyea%netscape.com
71e35b07b7 Authenticate to tokens before looking up user certs. 2002-04-24 18:25:48 +00:00
relyea%netscape.com
ce09346d8c Token and cert processing fixes:
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
   2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
   3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
   4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
   5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
abac680269 fix bugs in cert import with smart card cache 2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7ab27bc63 re-sync the trust domain cache with token insertion/removal 2002-04-19 23:06:44 +00:00
ian.mcgreer%sun.com
a4d9b8b514 Only fall back to email search if the "nickname" has an @ character. This is because email searches will not go through the cache, so should be avoided if possible. 2002-04-19 16:22:31 +00:00
ian.mcgreer%sun.com
5377ca2a6c Fixes for smart card cache. Don't do cache searches by email address, since GetAttributeValue does not set that field. Handle removal correctly for item at tail of list. Don't search token after a successful cache search that returned zero hits. 2002-04-19 16:14:13 +00:00