Commit Graph

259 Commits

Author SHA1 Message Date
jpierre%netscape.com
39e52ee09a Add assertion to help debugging CRL crash 2002-09-14 05:41:42 +00:00
wtc%netscape.com
ccb57e7a19 Bug 127886: added the new function PK11_ImportDERCert.
Modified files: nss/nss.def pk11wrap/pk11cert.c pk11wrap/pk11func.h
2002-09-07 04:48:57 +00:00
relyea%netscape.com
869f213889 Initialize len before we use it. 2002-09-06 23:15:35 +00:00
relyea%netscape.com
dcf684fc77 Bug 166893: copy the DER cert when importing the certificate 2002-09-06 18:48:37 +00:00
nicolson%netscape.com
e179fe8904 Fix 164126: makefile build error.
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
wtc%netscape.com
a897ae16a9 Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.
The patch for this checkin is attached to bug 166785.
2002-09-06 00:27:52 +00:00
relyea%netscape.com
724f0590f9 Check the cert validity only if we actually found a cert. 2002-08-30 20:37:58 +00:00
relyea%netscape.com
8c67c1f99d When looking for a recipient match, reject non-user certs. 2002-08-29 22:19:46 +00:00
relyea%netscape.com
7ec5b51352 Bug 164690. Fix missing break; 2002-08-26 21:16:07 +00:00
relyea%netscape.com
f5603c8844 Add pubwrap with flags 2002-08-22 00:41:41 +00:00
relyea%netscape.com
78007eba43 Bug 142172
1) look up the private key much earlier in the process so we know what slot it is on.
2) if a slot isn't specified, you the private key's slot.
3) if the specified slot and the private key slot don't match & the private key slot can do the PBE, then use the private key slot to do the PBE so we don't have to move the key.
4) if we have generated the PBE key in a different slot from the private key,
2002-08-19 18:24:58 +00:00
nicolson%netscape.com
62f1239586 Fix 162761: PK11_GetKeyGen should work if you pass in a keygen alg.
Make PK11_GetKeyGen an identity function for keygen algs.
2002-08-14 23:57:45 +00:00
relyea%netscape.com
0fb6e546c6 bug 161552: Make the recipient list traversal functions call the internal
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
relyea%netscape.com
721712b0a2 Mozilla bug 145228. Clear out buffer to protect agains lazy PKCS #11 modules. 2002-08-13 00:13:48 +00:00
wtc%netscape.com
fdc41cd064 Bug 161316: make pk11pqg.h C++ safe. 2002-08-06 18:31:35 +00:00
relyea%netscape.com
fee201085d Don't crash if we try to read a nickname that has an invalid cert with it. 2002-08-01 22:28:11 +00:00
bishakhabanerjee%netscape.com
65f7eca2f9 Checking in riceman+bmo@mail.rit.edu's patch for bug 133702 2002-07-30 20:57:44 +00:00
bishakhabanerjee%netscape.com
ed1acde055 Checking in riceman+bmo@mail.rit.edu's patch for bug 133702 2002-07-30 20:36:29 +00:00
relyea%netscape.com
2cf20e0041 return certs in sorted order. 2002-07-23 00:34:20 +00:00
jpierre%netscape.com
a82b9f46ba 158005 - add new CRL decode and import functions . Benefits are :
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
wtc%netscape.com
56c3c291e5 Bug 157750: handle the possibility that some certs do not have a label. 2002-07-16 21:13:40 +00:00
relyea%netscape.com
a035ec8c53 Don't crash if a pkcs #11 device gives us an invalid CRL (or even a valid CRL that we don't know how to parse). 2002-07-10 01:31:01 +00:00
relyea%netscape.com
006e3925e9 1) fix return type warning in pk11ListCertsCallback.
2) treat lastTime==0 as always outside the delay time. (removes spurious
prompts in FIPS mode on some platforms.)
2002-07-09 04:39:35 +00:00
relyea%netscape.com
6880c87a8d More performance improvements in listing certs:
1) reduce more short term memory allocate/frees.
	2) remove sha1 hash calculations from critical paths.
	3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
relyea%netscape.com
af924e2843 Initialize type fields to supress purify uninitialized reference warnings. 2002-06-28 03:00:10 +00:00
relyea%netscape.com
43480112f3 Initialize type field to clear off purify warnings. 2002-06-25 23:00:59 +00:00
ian.mcgreer%sun.com
4091f82677 two more places to dump templates 2002-06-25 19:40:16 +00:00
ian.mcgreer%sun.com
bb3bfc1199 fix AIX builds, 64-bit compiler chokes on large switches in debug builds 2002-06-25 16:57:40 +00:00
relyea%netscape.com
7caefab6ed Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs. 2002-06-24 22:36:59 +00:00
ian.mcgreer%sun.com
2a67969b3c fix broken AIX builds 2002-06-24 22:29:12 +00:00
ian.mcgreer%sun.com
b73a1edc81 log more mechanisms and templates 2002-06-24 22:22:57 +00:00
relyea%netscape.com
d7a32bbce6 reduce the calls to get the login state as these calls seem to be pretty expensive
for some tokens.
2002-06-20 18:49:45 +00:00
ian.mcgreer%sun.com
48d6b949c1 bug 98926, PKCS#11 session logging 2002-06-19 18:32:57 +00:00
ian.mcgreer%sun.com
4cf84d39dd missed part of last patch (bug 145322) 2002-06-19 15:26:55 +00:00
ian.mcgreer%sun.com
e30639f9cd bug 145322, second patch, clean up pk11_saveContextHelper 2002-06-19 15:22:54 +00:00
ian.mcgreer%sun.com
607f12501a bug 145322, reduce the number of PKCS#11 sessions used in SSL connections, implement new function PK11_SaveContextAlloc
r=relyea
2002-06-19 15:21:37 +00:00
ian.mcgreer%sun.com
0992642b67 bug 150704, PK11_Finalize can crash because softoken does not implement C_XXXFinal correctly 2002-06-19 14:59:24 +00:00
relyea%netscape.com
3839be90f6 Update cert handle on token insertion/removal. 2002-06-13 21:43:30 +00:00
relyea%netscape.com
696026ef88 When checking NeedInit status, go back and check the token in case the token
has been initialized offline.
2002-06-11 23:33:25 +00:00
nicolson%netscape.com
fa1fbd5d69 Fix 147794: PK11_ImportDERPrivateKeyInfoAndReturnKey frees the private key incorrectly. 2002-06-01 00:43:46 +00:00
wtc%netscape.com
6a49741d7d This is a test. I changed Revision and Date to bogus values and want to
see what actually got checked in.
2002-05-30 02:08:07 +00:00
relyea%netscape.com
a37f083171 Refresh token cache after login on tokens that need to log in before they
could read their certs.
2002-05-22 23:13:05 +00:00
relyea%netscape.com
482a55e955 Back out the change on Module destruction. 2002-05-22 00:25:48 +00:00
relyea%netscape.com
3b707d47e7 Fix spelling error.
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
ian.mcgreer%sun.com
dc613b61ee bug 144309, return value of STAN_GetCERTCertificate not checked
r=wtc
2002-05-20 18:05:11 +00:00
relyea%netscape.com
b9c9b409d6 Add function to get the PBEIV. 2002-05-16 22:06:19 +00:00
relyea%netscape.com
6f20bf6c21 bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs. 2002-05-14 23:16:16 +00:00
relyea%netscape.com
94a587472a Add function to determine if it's safe to delete the internal module. 2002-05-10 18:36:18 +00:00
relyea%netscape.com
fdca53cf70 Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it. 2002-05-10 18:13:44 +00:00
wtc%netscape.com
a8cdaf3aca Bugzilla bug 135821: fixed the internal slot reference leak in
PK11_WrapPrivKey.  r=relyea.
2002-05-09 23:34:24 +00:00