relyea%netscape.com
2cf20e0041
return certs in sorted order.
2002-07-23 00:34:20 +00:00
jpierre%netscape.com
a82b9f46ba
158005 - add new CRL decode and import functions . Benefits are :
...
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
wtc%netscape.com
56c3c291e5
Bug 157750: handle the possibility that some certs do not have a label.
2002-07-16 21:13:40 +00:00
relyea%netscape.com
a035ec8c53
Don't crash if a pkcs #11 device gives us an invalid CRL (or even a valid CRL that we don't know how to parse).
2002-07-10 01:31:01 +00:00
relyea%netscape.com
006e3925e9
1) fix return type warning in pk11ListCertsCallback.
...
2) treat lastTime==0 as always outside the delay time. (removes spurious
prompts in FIPS mode on some platforms.)
2002-07-09 04:39:35 +00:00
relyea%netscape.com
6880c87a8d
More performance improvements in listing certs:
...
1) reduce more short term memory allocate/frees.
2) remove sha1 hash calculations from critical paths.
3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
relyea%netscape.com
af924e2843
Initialize type fields to supress purify uninitialized reference warnings.
2002-06-28 03:00:10 +00:00
relyea%netscape.com
43480112f3
Initialize type field to clear off purify warnings.
2002-06-25 23:00:59 +00:00
ian.mcgreer%sun.com
4091f82677
two more places to dump templates
2002-06-25 19:40:16 +00:00
ian.mcgreer%sun.com
bb3bfc1199
fix AIX builds, 64-bit compiler chokes on large switches in debug builds
2002-06-25 16:57:40 +00:00
relyea%netscape.com
7caefab6ed
Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs.
2002-06-24 22:36:59 +00:00
ian.mcgreer%sun.com
2a67969b3c
fix broken AIX builds
2002-06-24 22:29:12 +00:00
ian.mcgreer%sun.com
b73a1edc81
log more mechanisms and templates
2002-06-24 22:22:57 +00:00
relyea%netscape.com
d7a32bbce6
reduce the calls to get the login state as these calls seem to be pretty expensive
...
for some tokens.
2002-06-20 18:49:45 +00:00
ian.mcgreer%sun.com
48d6b949c1
bug 98926, PKCS#11 session logging
2002-06-19 18:32:57 +00:00
ian.mcgreer%sun.com
4cf84d39dd
missed part of last patch (bug 145322)
2002-06-19 15:26:55 +00:00
ian.mcgreer%sun.com
e30639f9cd
bug 145322, second patch, clean up pk11_saveContextHelper
2002-06-19 15:22:54 +00:00
ian.mcgreer%sun.com
607f12501a
bug 145322, reduce the number of PKCS#11 sessions used in SSL connections, implement new function PK11_SaveContextAlloc
...
r=relyea
2002-06-19 15:21:37 +00:00
ian.mcgreer%sun.com
0992642b67
bug 150704, PK11_Finalize can crash because softoken does not implement C_XXXFinal correctly
2002-06-19 14:59:24 +00:00
relyea%netscape.com
3839be90f6
Update cert handle on token insertion/removal.
2002-06-13 21:43:30 +00:00
relyea%netscape.com
696026ef88
When checking NeedInit status, go back and check the token in case the token
...
has been initialized offline.
2002-06-11 23:33:25 +00:00
nicolson%netscape.com
fa1fbd5d69
Fix 147794: PK11_ImportDERPrivateKeyInfoAndReturnKey frees the private key incorrectly.
2002-06-01 00:43:46 +00:00
wtc%netscape.com
6a49741d7d
This is a test. I changed Revision and Date to bogus values and want to
...
see what actually got checked in.
2002-05-30 02:08:07 +00:00
relyea%netscape.com
a37f083171
Refresh token cache after login on tokens that need to log in before they
...
could read their certs.
2002-05-22 23:13:05 +00:00
relyea%netscape.com
482a55e955
Back out the change on Module destruction.
2002-05-22 00:25:48 +00:00
relyea%netscape.com
3b707d47e7
Fix spelling error.
...
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
ian.mcgreer%sun.com
dc613b61ee
bug 144309, return value of STAN_GetCERTCertificate not checked
...
r=wtc
2002-05-20 18:05:11 +00:00
relyea%netscape.com
b9c9b409d6
Add function to get the PBEIV.
2002-05-16 22:06:19 +00:00
relyea%netscape.com
6f20bf6c21
bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs.
2002-05-14 23:16:16 +00:00
relyea%netscape.com
94a587472a
Add function to determine if it's safe to delete the internal module.
2002-05-10 18:36:18 +00:00
relyea%netscape.com
fdca53cf70
Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it.
2002-05-10 18:13:44 +00:00
wtc%netscape.com
a8cdaf3aca
Bugzilla bug 135821: fixed the internal slot reference leak in
...
PK11_WrapPrivKey. r=relyea.
2002-05-09 23:34:24 +00:00
wtc%netscape.com
9c38dd9727
Bugzilla bug 135809: fixed the slot reference leaks in PBE_CreateContext
...
and SEC_PKCS5GetIV. r=relyea.
2002-05-09 23:21:16 +00:00
wtc%netscape.com
0daca2313b
Bugzilla bug 135818: fixed internal slot reference leaks in
...
PK11_VerifySlotMechanisms and PK11_InitToken. r=relyea.
2002-05-09 23:18:15 +00:00
wtc%netscape.com
43f8939e7c
Bugzilla bug 135058: free nickCopy on error returns in
...
PK11_FindCertsFromNickname. r=mcgreer.
2002-05-09 20:01:18 +00:00
relyea%netscape.com
56f8e3b5e8
Automatically create a NULL email profile for certs with email addresses which
...
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
f0d29104b1
bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate.
2002-05-02 19:00:13 +00:00
wtc%netscape.com
4747c98947
Whitespace change.
2002-04-30 00:11:19 +00:00
wtc%netscape.com
787be44323
Needed a (char *) cast for slotInfo.manufacturerID because it is an array
...
of "unsigned" chars. Mac's compiler complains about that.
2002-04-26 23:05:40 +00:00
relyea%netscape.com
3d3a200209
return error when incomplete shutdown has been detected.
2002-04-26 22:36:07 +00:00
relyea%netscape.com
2cd6213ca5
Detect Active Card presents and disable PROTECTED_PIN_PATH login when found.
2002-04-25 21:24:47 +00:00
relyea%netscape.com
1abdbba5a8
Don't let activeCards set the Protect_Auth bit because they weren't intending to
...
to begin with.
2002-04-25 20:57:06 +00:00
relyea%netscape.com
35695b7987
Turn off caching for non-hardware tokens for now until we fix some of our
...
tokens which can be updated out-of-band to use the proper 'removable token'
semantics.
2002-04-25 00:25:58 +00:00
ian.mcgreer%sun.com
217231840b
This is a real corner case. If a search is done by issuer/serial, and the returned cert was in the cache, need to see if the cert's slot was removed. If so, destroy the cert and retry the search on the present tokens.
2002-04-24 19:39:41 +00:00
relyea%netscape.com
71e35b07b7
Authenticate to tokens before looking up user certs.
2002-04-24 18:25:48 +00:00
relyea%netscape.com
ce09346d8c
Token and cert processing fixes:
...
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
abac680269
fix bugs in cert import with smart card cache
2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7ab27bc63
re-sync the trust domain cache with token insertion/removal
2002-04-19 23:06:44 +00:00
ian.mcgreer%sun.com
a4d9b8b514
Only fall back to email search if the "nickname" has an @ character. This is because email searches will not go through the cache, so should be avoided if possible.
2002-04-19 16:22:31 +00:00
ian.mcgreer%sun.com
5377ca2a6c
Fixes for smart card cache. Don't do cache searches by email address, since GetAttributeValue does not set that field. Handle removal correctly for item at tail of list. Don't search token after a successful cache search that returned zero hits.
2002-04-19 16:14:13 +00:00