relyea%netscape.com
3b55947b03
Make sure we aren't confusing secret keys with private and public keys
2002-04-04 18:08:30 +00:00
wtc%netscape.com
9318a2b270
Bugzilla bug 131427: add "for Clients" to the version id strings in the
...
softoken shared library if MOZ_CLIENT is defined. r=relyea.
2002-03-20 21:17:30 +00:00
wtc%netscape.com
c1adf4b062
Bugzilla bug 131430: changed "softoken" to "softokn" to match the file
...
name. r=relyea.
2002-03-20 04:43:41 +00:00
wtc%netscape.com
64cc8d0455
Bugzilla bug 131427: added sccs and rcs version id strings to the softoken
...
shared library. r=relyea.
Modified files: manifest.mn pkcs11.c
Added file: softkver.c
2002-03-20 04:38:09 +00:00
wtc%netscape.com
8db34d758e
Bugzilla bug 130158: fixed a crash in NSC_CopyObject if pk11_CopyObject
...
fails.
2002-03-14 03:34:11 +00:00
wtc%netscape.com
1ced872252
Bugzilla bug 129408: final adjustments of the NSS 3.4 *.def files. List
...
the symbols in alphabetical order. In softokn.def, changed "Sofoken 3.4
release" to "NSS 3.4 release, which is what we use in other *.def files.
Added seven new PKCS7 exports to smime.def. r=relyea
Modified files: nss.def smime.def softokn.def ssl.def
2002-03-07 21:18:49 +00:00
wtc%netscape.com
1d74ff3063
Bugzilla bug 128599: link libnss3.so with -R $ORIGIN on Solaris to help it
...
find libsoftokn3.so. Fixed an outdated comment in softoken/config.mk.
2002-03-03 02:34:32 +00:00
relyea%netscape.com
0a88feb486
Implement PKCS #11 2.11 DSA PQG Parameter generation.
2002-03-02 00:52:05 +00:00
relyea%netscape.com
089b31a446
Fix PSM name problem.
...
Fix crash when trying to access/delete an non-existant object.
2002-02-28 21:30:13 +00:00
relyea%netscape.com
cebd4b1a6f
The KRL reserved handled should be different from the primordial CRL handle
...
so that CRL matching code will work correctly.
2002-02-27 16:57:45 +00:00
relyea%netscape.com
bd56c1e043
When using global params, noCertDB implies noKeyDB as well bug 127312
2002-02-26 02:28:21 +00:00
relyea%netscape.com
82ac932cf2
Bug 125728 truncate utf8 correctly in the pkcs11 string.
2002-02-26 00:33:42 +00:00
ian.mcgreer%sun.com
bc5808a5ed
bug 125359, by default the ASN.1 en/decoder should treat all numbers as signed. But many source/target items desire unsigned integers (specifically, bignums in the crypto stuff), so implement an siUnsignedInteger type which notifies the en/decoder to handle the conversion.
...
r=nelsonb
2002-02-21 22:41:44 +00:00
wtc%netscape.com
4f99429abb
Fixed misspelling.
2002-02-21 00:06:14 +00:00
wtc%netscape.com
667ed9e4c8
Bugzilla bug 125149: prevent the session ID count component of the session
...
ID from overflowing and corrupting the slot index component. Do a lookup
in the session hash table to make sure the session id is not in use before
adding it to the table. r=relyea.
Modified files: pkcs11.c pkcs11i.h
2002-02-20 23:59:35 +00:00
wtc%netscape.com
ba5d3c7107
nscSlotHashTable is not protected by a lock, so we need to use
...
PL_HashTableLookupConst to do the lookups. r=mcgreer. This bug is
discussed in bug 125149 but is not the main topic of that bug.
2002-02-20 23:53:45 +00:00
kirk.erickson%sun.com
0e2122791d
Added tokenIDCount, and tokenHashTable to comments about objectLock.
2002-02-20 18:05:52 +00:00
nelsonb%netscape.com
e023b4422a
Change most coreconf and NSS makefiles to use OS_TARGET (which can
...
be overridden via an environment variable) rather than OS_ARCH.
This is a precursor to more flexibility in cross-platform builds.
Bug 104541.
2002-02-15 22:54:08 +00:00
relyea%netscape.com
87e1407f2c
Fix UMR in the session info structure.
2002-02-14 01:12:51 +00:00
kirk.erickson%sun.com
abbde77e08
Commented SlotStr with information what what locks protect what.
2002-02-11 20:14:05 +00:00
nelsonb%netscape.com
42fdae57e1
Make NSS 3.4 build as part of mozilla on OS/2. Bug 114748.
...
Patch supplied by Javier Pedemonte.
2002-02-11 05:48:37 +00:00
wtc%netscape.com
7d12a23186
Bugzilla bug 121523: checked in Kirk Erickson's session lock fix.
...
Modified Files:
lib/pk11wrap/pk11slot.c lib/softoken/pkcs11.c
lib/softoken/pkcs11i.h lib/softoken/pkcs11u.c
2002-02-05 23:41:36 +00:00
relyea%netscape.com
622f360f9e
Fix searching code so it can find CRL's
2002-01-31 00:16:29 +00:00
ian.mcgreer%sun.com
abec66154f
changes related to bug 115660
...
* fipstoken will only force authentication for object-related functions when the object is a private or secret key
* certutil does not authenticate to token when in FIPS and only doing cert-related operations
* QA does not provide password to certutil when doing cert-related operations in FIPS tests
2002-01-29 17:30:22 +00:00
relyea%netscape.com
6b96fe3f81
(sigh) not only do we need to find the objects, we need to be able to read
...
them as well.
2002-01-28 23:28:29 +00:00
relyea%netscape.com
0f9ca80078
Fix 2 memory leaks and a UMR.
...
(keyhand needs to be initialized before we start xor hashing)
Free item and time elements which are transparently allocated for us.
2002-01-26 00:16:03 +00:00
relyea%netscape.com
cfab32ea30
Change Sha1_hash to a simple XOR hash for building key handles for token
...
objects.
2002-01-25 19:09:34 +00:00
relyea%netscape.com
a7723c632d
Fix bug 115660. Note that fixing the bugs necessitates fixing the test
...
cases as well. The test case was depending on the failure to read certs to
detect the failure to read keys. Now certutil returns a failure if no keys
are found. This also means that the FIPS test after the key and cert
has been deleted should expect a failure to list any keys.
2002-01-25 19:03:17 +00:00
relyea%netscape.com
0117ba048e
Too agressive on fixing leaks;). This one isn't a leak.
...
bob
2002-01-24 21:33:51 +00:00
relyea%netscape.com
b482961799
Fix memory leaks.
2002-01-24 00:26:29 +00:00
relyea%netscape.com
c7d82085a1
Fix memory like in readSMimeEntry
2002-01-23 01:44:22 +00:00
relyea%netscape.com
eec61db7e1
Labels don't have NULL's by default.
2002-01-23 00:53:53 +00:00
ian.mcgreer%sun.com
30e782be09
PSM bug 119359, NSS 3.4 also needs to recognize valid CA trust in order for cert download to work correctly
2002-01-23 00:49:23 +00:00
ian.mcgreer%sun.com
775f92f7ff
more backwards compatibility fixes
...
* always send DER of serial number to PKCS#11 queries
* in softoken, construct key for certificate using decoded serial number with (possibly) a leading zero, for compatibility with version 7 db
* in softoken, decode serial number *without* removing leading zero for searches
2002-01-17 00:20:53 +00:00
ian.mcgreer%sun.com
9c7bf8e3b7
fix build bustage
2002-01-16 21:36:33 +00:00
ian.mcgreer%sun.com
4c3e077743
fix for bug 115360, failure in pkcs12 backwards compatibility tests
2002-01-16 21:22:30 +00:00
ian.mcgreer%sun.com
b2373e435c
unfortunately, the SDR key keeps the value of CK_KEY_TYPE in the coefficient field of an RSA key. This means some format is lost through the ASN.1 encoder/decoer. Trying again to account for that without affecting normal key type attributes.
2002-01-16 16:02:51 +00:00
ian.mcgreer%sun.com
a4a2117751
fix up problems in last change
2002-01-16 00:04:16 +00:00
ian.mcgreer%sun.com
37ccf29e2d
revert last change, and move conversion of attribute value to host long up to where the long variable actually appears.
2002-01-15 21:45:38 +00:00
ian.mcgreer%sun.com
2dbd9ade93
fix SDR on big-endian platforms. The leading zeros in the RSA coefficient have been stripped, but PKCS#11 needs them back in order to form a CK_ULONG correctly.
2002-01-15 19:20:34 +00:00
ian.mcgreer%sun.com
02437e979a
Fix for serial numbers which are negative when intrepreted as signed integers. Since the ASN.1 encoder now add/strips leading zeros to INTEGERs, the hand decoder written here will incorrectly decode serial numbers passed to it that have leading zeros.
2002-01-15 15:43:35 +00:00
ian.mcgreer%sun.com
a29542b7fa
fix for bug 115360, ASN.1 encoder/decoder should handle conversion of unsigned integers used in NSS to ASN.1 INTEGERs, and vice versa.
2002-01-14 23:20:43 +00:00
ian.mcgreer%sun.com
aaba769038
*sigh*
...
fixed backward compatibity tests, but broke current version. will have to rework.
2002-01-11 23:37:37 +00:00
ian.mcgreer%sun.com
dd22838792
temporary fix for bug 115360
2002-01-11 22:24:31 +00:00
relyea%netscape.com
cf63c1e6fb
Set up default trust order correctly.
...
Default trustorder is
0 for the internal token
100 for the builtins
50 for everyone else
Default Cipher order is
100 for the internal token
0 for everyone else
2002-01-10 00:59:26 +00:00
ian.mcgreer%sun.com
9a16931339
bug 118612, implement valid peer trust in softoken
2002-01-08 22:01:17 +00:00
ian.mcgreer%sun.com
8b98f0af90
memory leak fixes
2002-01-08 15:37:42 +00:00
relyea%netscape.com
996c78f1b0
Startup problems on new profiles: 1) Windows does not initially open the DB R/W
...
on startup. 2) All platforms do not see the built-ins token if you startup with
a new profile.
Fix: 1) Escape the initialization parameters.
2) Rebuild the Token iterator when new tokens are added to the trust domain.
2002-01-05 03:00:10 +00:00
relyea%netscape.com
7ab6e5488e
Fix Bug 115657.
...
1) advance the pointers in the initialization setup for p12 pbes (at the same
time fix the code to be much easier to read and understand).
2) Copy out the returned IV in pkcs11c.c.
2001-12-19 18:06:29 +00:00
ian.mcgreer%sun.com
5f437eeb8c
needed for traversal of keys
2001-12-17 13:43:34 +00:00