relyea%netscape.com
6eed667267
Fix Linux warnings.
2001-09-20 22:02:46 +00:00
relyea%netscape.com
f0a6a83eca
Fix warnings on Linux, Solaris, AIX, HP.
2001-09-20 21:41:34 +00:00
relyea%netscape.com
41f89b6090
Export the new initialization functions
2001-09-20 21:40:24 +00:00
relyea%netscape.com
daeedfa5ff
Make sure the Low level initialization function signature match. Include the
...
header to get the correct prototypes.
2001-09-20 21:39:58 +00:00
relyea%netscape.com
2385ad137d
Fix warnings on Linux, HP, Solaris, and AIX.
2001-09-20 21:38:26 +00:00
relyea%netscape.com
d5a37e21d3
Fix compilier warnings on AIX, Solaris, HP, and Linux.
2001-09-20 21:37:16 +00:00
relyea%netscape.com
41ef51dcd2
Fix compilier warnings on AIX, HP, Linux, and Solaris.
2001-09-20 21:34:42 +00:00
relyea%netscape.com
d58d421bd6
1) fix compilier warnings on AIX, Solaris, HP, and Linux.
...
2) remove Dependency on low key structures in the soft token.
2001-09-20 21:30:48 +00:00
relyea%netscape.com
d62c65c9a6
Remove dependancy on direct calls inside softoken.
2001-09-20 21:26:40 +00:00
ian.mcgreer%sun.com
11d7dcaa55
add the diagram
2001-09-20 21:24:29 +00:00
relyea%netscape.com
77fd99946d
1) fix warnings on AIX, HP, Linux, and Solaris.
...
2) Move private functions into private headers.
3) Sharpen the layer separation between NSS components, especially pkcs #12
and soft token.
4) Remove dead code.
2001-09-20 21:23:51 +00:00
ian.mcgreer%sun.com
9ada7bfe84
add a trust domain diagram; suggestion for cert hash
2001-09-20 21:22:08 +00:00
relyea%netscape.com
3a020389f9
1) Fix Solaris, AIX, HP, and Linux warnings. Several were potential real
...
problems (mostly uninitialized variables in error cases).
2) Start separating softoken from the rest of NSS where appropriate (finish
separating out the key stuff, the cert stuff is coming).
3) Make the prototypes between the new functions consistant.
2001-09-20 21:05:53 +00:00
ian.mcgreer%sun.com
8c5a7363ec
some cleanup; use list for modules
2001-09-20 20:40:03 +00:00
ian.mcgreer%sun.com
e4a4516574
some cleanup; collect token certs in a list
2001-09-20 20:38:08 +00:00
ian.mcgreer%sun.com
3ed98dab32
some cleanup in the list code
2001-09-20 20:33:27 +00:00
ian.mcgreer%sun.com
5081fc7e70
disable AES for blocksizes > 128 until it is fixed.
2001-09-20 17:11:08 +00:00
nelsonb%netscape.com
3870ce15b8
Generate larger block of key material correctly for SSL3 as well as TLS.
...
Add assert to detect if key material is ever too small again.
2001-09-20 04:36:14 +00:00
nelsonb%netscape.com
a73d7da074
Increase the amount of key material derived from the master secret to that
...
it will be enough for AES with 256-bit keys.
2001-09-20 03:55:16 +00:00
nelsonb%netscape.com
636f968efc
Fix pk11_DecryptInit for AES. It was telling AES to encrypt, not decrypt.
2001-09-20 02:56:18 +00:00
ian.mcgreer%sun.com
db9c9284c2
checkin of threadsafe hashtable; copied from ckfw/hash.c but using NSS types
2001-09-20 00:28:36 +00:00
mcgreer%netscape.com
fa7cefbe6c
match changes in dev, implement lookup by nickname for testing
2001-09-19 21:49:52 +00:00
mcgreer%netscape.com
4575248245
the device API is not public, so move:
...
NSSModule_ ==> nssModule_
NSSSlot_ ==> nssSlot_
NSSToken_ ==> nssToken
Functions which should be public can be changed individually.
2001-09-19 21:47:23 +00:00
mcgreer%netscape.com
d87d13f7f6
use the list to collect certs
2001-09-19 21:37:21 +00:00
mcgreer%netscape.com
f5a1bf1076
initial checkin of threadsafe list
2001-09-19 20:20:06 +00:00
mcgreer%netscape.com
ea3ad5a5bd
first cut at password handling. todo: implement transaction-based passwords (at a higher level?)
2001-09-19 19:08:32 +00:00
mcgreer%netscape.com
fe99335bfb
cleanup; match changes to dev/; update doc
2001-09-18 20:55:01 +00:00
mcgreer%netscape.com
a3a2ab3e7a
cleanup; add nssSession type to allow multiple sessions accessing the token API
2001-09-18 20:54:28 +00:00
nelsonb%netscape.com
0e45538807
Implement new function SSL_GetChannelInfo(). Bugzilla bug 78959.
2001-09-18 01:59:21 +00:00
mcgreer%netscape.com
18ec8e1c10
add suggestion about new NSSSession type; crypto context question
2001-09-17 22:14:55 +00:00
mcgreer%netscape.com
bc2abb1968
work-in-progress document for stan development
2001-09-14 19:01:56 +00:00
mcgreer%netscape.com
9e69f4ae7f
make stan buildable using BUILD_STAN variable
2001-09-14 18:07:54 +00:00
mcgreer%netscape.com
6a40376dc3
Use NSS_IMPLEMENT in code files for consistency.
...
Implement some basic certificate routines.
Define some of the PKI types.
Implement some trust domain routines, but only for testing purposes.
Allow for building as shared library.
2001-09-13 22:16:22 +00:00
mcgreer%netscape.com
27e104ca2d
ah, first bug. init the token last when creating a slot.
2001-09-13 22:14:22 +00:00
mcgreer%netscape.com
d110def874
initial checkin of the cryptoki device library code for stan. The current
...
amount of implemented code does little more than basic initialization of
a module and loading of a module's slots and tokens.
2001-09-13 22:06:10 +00:00
kaie%netscape.com
9b0222970d
Mozilla bug 99052, fixing crash.
...
Adding null and error checks.
r=nelsonb
2001-09-12 21:53:31 +00:00
nicolson%netscape.com
7f28add0af
Fix 95666: ImportDERPublicKey assigns CK_KEY_TYPE to pubkey->type.
2001-09-10 22:53:34 +00:00
relyea%netscape.com
159df205d0
Free the Pairs, not the previous values.
2001-09-07 01:34:18 +00:00
relyea%netscape.com
733ce480dc
Free the data, in the array, not the array;).
2001-09-07 01:33:22 +00:00
relyea%netscape.com
021f0747b2
Change the keydb reset code from walking down deleting all the key entries to
...
closing the keydb and reopenning it truncated.
2001-09-06 23:23:42 +00:00
relyea%netscape.com
dceb7d33be
For a search reload after the database has been cleared.
2001-09-06 21:20:16 +00:00
relyea%netscape.com
c4c5d7e478
Don't reuse sessions that have already be closed.
2001-09-06 21:19:13 +00:00
relyea%netscape.com
b8eb3fed09
Export functions for Modutil (need to fix the names to be global!)
2001-09-06 21:15:09 +00:00
relyea%netscape.com
38a37c7eb4
Allow modutil to get the raw pkcs #11 strings.
...
fix NSS_Init_NO_DB().
2001-09-06 21:14:06 +00:00
relyea%netscape.com
8a68d5297c
Fix Modutil delete.
...
add function to modutil to display raw pkcs #11 module strings
2001-09-06 21:08:44 +00:00
relyea%netscape.com
2dbe064580
1) fix bug in module deletion.
...
2) Add new function in modutil to desplay the raw PKCS #11 module strings
2001-09-06 21:06:39 +00:00
nelsonb%netscape.com
e17976568a
Fix a crash. An attempt to move a sensitive key longer than 48 bytes
...
from one token to another will no longer crash. Instead, it will fail
with the new error code SEC_ERROR_CANNOT_MOVE_SENSITIVE_KEY. Bug 97887.
In addition, DHE key pairs are now generated with CKA_SENSITIVE false.
2001-09-06 03:00:39 +00:00
nelsonb%netscape.com
2c971ab625
Detect Null pointer. Assert if null, else don't crash here. Bug 97887.
2001-09-06 00:49:39 +00:00
relyea%netscape.com
6388dbd352
Don't skip certs that are already in the database. We may have to tweak
...
with the trust bits.
2001-09-04 20:20:48 +00:00
relyea%netscape.com
4a775646dd
Allow 'importing' certificates that already exist in the database.
...
Use the import to change the trust flags on the given certificate.
2001-09-04 20:19:26 +00:00