jpierre%netscape.com
39e52ee09a
Add assertion to help debugging CRL crash
2002-09-14 05:41:42 +00:00
wtc%netscape.com
ccb57e7a19
Bug 127886: added the new function PK11_ImportDERCert.
...
Modified files: nss/nss.def pk11wrap/pk11cert.c pk11wrap/pk11func.h
2002-09-07 04:48:57 +00:00
relyea%netscape.com
869f213889
Initialize len before we use it.
2002-09-06 23:15:35 +00:00
relyea%netscape.com
dcf684fc77
Bug 166893: copy the DER cert when importing the certificate
2002-09-06 18:48:37 +00:00
nicolson%netscape.com
e179fe8904
Fix 164126: makefile build error.
...
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
wtc%netscape.com
a897ae16a9
Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.
...
The patch for this checkin is attached to bug 166785.
2002-09-06 00:27:52 +00:00
relyea%netscape.com
724f0590f9
Check the cert validity only if we actually found a cert.
2002-08-30 20:37:58 +00:00
relyea%netscape.com
8c67c1f99d
When looking for a recipient match, reject non-user certs.
2002-08-29 22:19:46 +00:00
relyea%netscape.com
7ec5b51352
Bug 164690. Fix missing break;
2002-08-26 21:16:07 +00:00
relyea%netscape.com
f5603c8844
Add pubwrap with flags
2002-08-22 00:41:41 +00:00
relyea%netscape.com
78007eba43
Bug 142172
...
1) look up the private key much earlier in the process so we know what slot it is on.
2) if a slot isn't specified, you the private key's slot.
3) if the specified slot and the private key slot don't match & the private key slot can do the PBE, then use the private key slot to do the PBE so we don't have to move the key.
4) if we have generated the PBE key in a different slot from the private key,
2002-08-19 18:24:58 +00:00
nicolson%netscape.com
62f1239586
Fix 162761: PK11_GetKeyGen should work if you pass in a keygen alg.
...
Make PK11_GetKeyGen an identity function for keygen algs.
2002-08-14 23:57:45 +00:00
relyea%netscape.com
0fb6e546c6
bug 161552: Make the recipient list traversal functions call the internal
...
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
relyea%netscape.com
721712b0a2
Mozilla bug 145228. Clear out buffer to protect agains lazy PKCS #11 modules.
2002-08-13 00:13:48 +00:00
wtc%netscape.com
fdc41cd064
Bug 161316: make pk11pqg.h C++ safe.
2002-08-06 18:31:35 +00:00
relyea%netscape.com
fee201085d
Don't crash if we try to read a nickname that has an invalid cert with it.
2002-08-01 22:28:11 +00:00
bishakhabanerjee%netscape.com
65f7eca2f9
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 20:57:44 +00:00
bishakhabanerjee%netscape.com
ed1acde055
Checking in riceman+bmo@mail.rit.edu's patch for bug 133702
2002-07-30 20:36:29 +00:00
relyea%netscape.com
2cf20e0041
return certs in sorted order.
2002-07-23 00:34:20 +00:00
jpierre%netscape.com
a82b9f46ba
158005 - add new CRL decode and import functions . Benefits are :
...
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
wtc%netscape.com
56c3c291e5
Bug 157750: handle the possibility that some certs do not have a label.
2002-07-16 21:13:40 +00:00
relyea%netscape.com
a035ec8c53
Don't crash if a pkcs #11 device gives us an invalid CRL (or even a valid CRL that we don't know how to parse).
2002-07-10 01:31:01 +00:00
relyea%netscape.com
006e3925e9
1) fix return type warning in pk11ListCertsCallback.
...
2) treat lastTime==0 as always outside the delay time. (removes spurious
prompts in FIPS mode on some platforms.)
2002-07-09 04:39:35 +00:00
relyea%netscape.com
6880c87a8d
More performance improvements in listing certs:
...
1) reduce more short term memory allocate/frees.
2) remove sha1 hash calculations from critical paths.
3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
relyea%netscape.com
af924e2843
Initialize type fields to supress purify uninitialized reference warnings.
2002-06-28 03:00:10 +00:00
relyea%netscape.com
43480112f3
Initialize type field to clear off purify warnings.
2002-06-25 23:00:59 +00:00
ian.mcgreer%sun.com
4091f82677
two more places to dump templates
2002-06-25 19:40:16 +00:00
ian.mcgreer%sun.com
bb3bfc1199
fix AIX builds, 64-bit compiler chokes on large switches in debug builds
2002-06-25 16:57:40 +00:00
relyea%netscape.com
7caefab6ed
Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs.
2002-06-24 22:36:59 +00:00
ian.mcgreer%sun.com
2a67969b3c
fix broken AIX builds
2002-06-24 22:29:12 +00:00
ian.mcgreer%sun.com
b73a1edc81
log more mechanisms and templates
2002-06-24 22:22:57 +00:00
relyea%netscape.com
d7a32bbce6
reduce the calls to get the login state as these calls seem to be pretty expensive
...
for some tokens.
2002-06-20 18:49:45 +00:00
ian.mcgreer%sun.com
48d6b949c1
bug 98926, PKCS#11 session logging
2002-06-19 18:32:57 +00:00
ian.mcgreer%sun.com
4cf84d39dd
missed part of last patch (bug 145322)
2002-06-19 15:26:55 +00:00
ian.mcgreer%sun.com
e30639f9cd
bug 145322, second patch, clean up pk11_saveContextHelper
2002-06-19 15:22:54 +00:00
ian.mcgreer%sun.com
607f12501a
bug 145322, reduce the number of PKCS#11 sessions used in SSL connections, implement new function PK11_SaveContextAlloc
...
r=relyea
2002-06-19 15:21:37 +00:00
ian.mcgreer%sun.com
0992642b67
bug 150704, PK11_Finalize can crash because softoken does not implement C_XXXFinal correctly
2002-06-19 14:59:24 +00:00
relyea%netscape.com
3839be90f6
Update cert handle on token insertion/removal.
2002-06-13 21:43:30 +00:00
relyea%netscape.com
696026ef88
When checking NeedInit status, go back and check the token in case the token
...
has been initialized offline.
2002-06-11 23:33:25 +00:00
nicolson%netscape.com
fa1fbd5d69
Fix 147794: PK11_ImportDERPrivateKeyInfoAndReturnKey frees the private key incorrectly.
2002-06-01 00:43:46 +00:00
wtc%netscape.com
6a49741d7d
This is a test. I changed Revision and Date to bogus values and want to
...
see what actually got checked in.
2002-05-30 02:08:07 +00:00
relyea%netscape.com
a37f083171
Refresh token cache after login on tokens that need to log in before they
...
could read their certs.
2002-05-22 23:13:05 +00:00
relyea%netscape.com
482a55e955
Back out the change on Module destruction.
2002-05-22 00:25:48 +00:00
relyea%netscape.com
3b707d47e7
Fix spelling error.
...
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
ian.mcgreer%sun.com
dc613b61ee
bug 144309, return value of STAN_GetCERTCertificate not checked
...
r=wtc
2002-05-20 18:05:11 +00:00
relyea%netscape.com
b9c9b409d6
Add function to get the PBEIV.
2002-05-16 22:06:19 +00:00
relyea%netscape.com
6f20bf6c21
bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs.
2002-05-14 23:16:16 +00:00
relyea%netscape.com
94a587472a
Add function to determine if it's safe to delete the internal module.
2002-05-10 18:36:18 +00:00
relyea%netscape.com
fdca53cf70
Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it.
2002-05-10 18:13:44 +00:00
wtc%netscape.com
a8cdaf3aca
Bugzilla bug 135821: fixed the internal slot reference leak in
...
PK11_WrapPrivKey. r=relyea.
2002-05-09 23:34:24 +00:00