Commit Graph

696 Commits

Author SHA1 Message Date
relyea%netscape.com
6eed667267 Fix Linux warnings. 2001-09-20 22:02:46 +00:00
relyea%netscape.com
f0a6a83eca Fix warnings on Linux, Solaris, AIX, HP. 2001-09-20 21:41:34 +00:00
relyea%netscape.com
41f89b6090 Export the new initialization functions 2001-09-20 21:40:24 +00:00
relyea%netscape.com
daeedfa5ff Make sure the Low level initialization function signature match. Include the
header to get the correct prototypes.
2001-09-20 21:39:58 +00:00
relyea%netscape.com
2385ad137d Fix warnings on Linux, HP, Solaris, and AIX. 2001-09-20 21:38:26 +00:00
relyea%netscape.com
d5a37e21d3 Fix compilier warnings on AIX, Solaris, HP, and Linux. 2001-09-20 21:37:16 +00:00
relyea%netscape.com
41ef51dcd2 Fix compilier warnings on AIX, HP, Linux, and Solaris. 2001-09-20 21:34:42 +00:00
relyea%netscape.com
d58d421bd6 1) fix compilier warnings on AIX, Solaris, HP, and Linux.
2) remove Dependency on low key structures in the soft token.
2001-09-20 21:30:48 +00:00
relyea%netscape.com
d62c65c9a6 Remove dependancy on direct calls inside softoken. 2001-09-20 21:26:40 +00:00
ian.mcgreer%sun.com
11d7dcaa55 add the diagram 2001-09-20 21:24:29 +00:00
relyea%netscape.com
77fd99946d 1) fix warnings on AIX, HP, Linux, and Solaris.
2) Move private functions into private headers.

3) Sharpen the layer separation between NSS components, especially pkcs #12
and soft token.

4) Remove dead code.
2001-09-20 21:23:51 +00:00
ian.mcgreer%sun.com
9ada7bfe84 add a trust domain diagram; suggestion for cert hash 2001-09-20 21:22:08 +00:00
relyea%netscape.com
3a020389f9 1) Fix Solaris, AIX, HP, and Linux warnings. Several were potential real
problems (mostly uninitialized variables in error cases).

2) Start separating softoken from the rest of NSS where appropriate (finish
separating out the key stuff, the cert stuff is coming).

3) Make the prototypes between the new functions consistant.
2001-09-20 21:05:53 +00:00
ian.mcgreer%sun.com
8c5a7363ec some cleanup; use list for modules 2001-09-20 20:40:03 +00:00
ian.mcgreer%sun.com
e4a4516574 some cleanup; collect token certs in a list 2001-09-20 20:38:08 +00:00
ian.mcgreer%sun.com
3ed98dab32 some cleanup in the list code 2001-09-20 20:33:27 +00:00
ian.mcgreer%sun.com
5081fc7e70 disable AES for blocksizes > 128 until it is fixed. 2001-09-20 17:11:08 +00:00
nelsonb%netscape.com
3870ce15b8 Generate larger block of key material correctly for SSL3 as well as TLS.
Add assert to detect if key material is ever too small again.
2001-09-20 04:36:14 +00:00
nelsonb%netscape.com
a73d7da074 Increase the amount of key material derived from the master secret to that
it will be enough for AES with 256-bit keys.
2001-09-20 03:55:16 +00:00
nelsonb%netscape.com
636f968efc Fix pk11_DecryptInit for AES. It was telling AES to encrypt, not decrypt. 2001-09-20 02:56:18 +00:00
ian.mcgreer%sun.com
db9c9284c2 checkin of threadsafe hashtable; copied from ckfw/hash.c but using NSS types 2001-09-20 00:28:36 +00:00
mcgreer%netscape.com
fa7cefbe6c match changes in dev, implement lookup by nickname for testing 2001-09-19 21:49:52 +00:00
mcgreer%netscape.com
4575248245 the device API is not public, so move:
NSSModule_ ==> nssModule_
NSSSlot_   ==> nssSlot_
NSSToken_  ==> nssToken
Functions which should be public can be changed individually.
2001-09-19 21:47:23 +00:00
mcgreer%netscape.com
d87d13f7f6 use the list to collect certs 2001-09-19 21:37:21 +00:00
mcgreer%netscape.com
f5a1bf1076 initial checkin of threadsafe list 2001-09-19 20:20:06 +00:00
mcgreer%netscape.com
ea3ad5a5bd first cut at password handling. todo: implement transaction-based passwords (at a higher level?) 2001-09-19 19:08:32 +00:00
mcgreer%netscape.com
fe99335bfb cleanup; match changes to dev/; update doc 2001-09-18 20:55:01 +00:00
mcgreer%netscape.com
a3a2ab3e7a cleanup; add nssSession type to allow multiple sessions accessing the token API 2001-09-18 20:54:28 +00:00
nelsonb%netscape.com
0e45538807 Implement new function SSL_GetChannelInfo(). Bugzilla bug 78959. 2001-09-18 01:59:21 +00:00
mcgreer%netscape.com
18ec8e1c10 add suggestion about new NSSSession type; crypto context question 2001-09-17 22:14:55 +00:00
mcgreer%netscape.com
bc2abb1968 work-in-progress document for stan development 2001-09-14 19:01:56 +00:00
mcgreer%netscape.com
9e69f4ae7f make stan buildable using BUILD_STAN variable 2001-09-14 18:07:54 +00:00
mcgreer%netscape.com
6a40376dc3 Use NSS_IMPLEMENT in code files for consistency.
Implement some basic certificate routines.
Define some of the PKI types.
Implement some trust domain routines, but only for testing purposes.
Allow for building as shared library.
2001-09-13 22:16:22 +00:00
mcgreer%netscape.com
27e104ca2d ah, first bug. init the token last when creating a slot. 2001-09-13 22:14:22 +00:00
mcgreer%netscape.com
d110def874 initial checkin of the cryptoki device library code for stan. The current
amount of implemented code does little more than basic initialization of
a module and loading of a module's slots and tokens.
2001-09-13 22:06:10 +00:00
kaie%netscape.com
9b0222970d Mozilla bug 99052, fixing crash.
Adding null and error checks.
r=nelsonb
2001-09-12 21:53:31 +00:00
nicolson%netscape.com
7f28add0af Fix 95666: ImportDERPublicKey assigns CK_KEY_TYPE to pubkey->type. 2001-09-10 22:53:34 +00:00
relyea%netscape.com
159df205d0 Free the Pairs, not the previous values. 2001-09-07 01:34:18 +00:00
relyea%netscape.com
733ce480dc Free the data, in the array, not the array;). 2001-09-07 01:33:22 +00:00
relyea%netscape.com
021f0747b2 Change the keydb reset code from walking down deleting all the key entries to
closing the keydb and reopenning it truncated.
2001-09-06 23:23:42 +00:00
relyea%netscape.com
dceb7d33be For a search reload after the database has been cleared. 2001-09-06 21:20:16 +00:00
relyea%netscape.com
c4c5d7e478 Don't reuse sessions that have already be closed. 2001-09-06 21:19:13 +00:00
relyea%netscape.com
b8eb3fed09 Export functions for Modutil (need to fix the names to be global!) 2001-09-06 21:15:09 +00:00
relyea%netscape.com
38a37c7eb4 Allow modutil to get the raw pkcs #11 strings.
fix NSS_Init_NO_DB().
2001-09-06 21:14:06 +00:00
relyea%netscape.com
8a68d5297c Fix Modutil delete.
add function to modutil to display raw pkcs #11 module strings
2001-09-06 21:08:44 +00:00
relyea%netscape.com
2dbe064580 1) fix bug in module deletion.
2) Add new function in modutil to desplay the raw PKCS #11 module strings
2001-09-06 21:06:39 +00:00
nelsonb%netscape.com
e17976568a Fix a crash. An attempt to move a sensitive key longer than 48 bytes
from one token to another will no longer crash.  Instead, it will fail
with the new error code SEC_ERROR_CANNOT_MOVE_SENSITIVE_KEY.  Bug 97887.
In addition, DHE key pairs are now generated with CKA_SENSITIVE false.
2001-09-06 03:00:39 +00:00
nelsonb%netscape.com
2c971ab625 Detect Null pointer. Assert if null, else don't crash here. Bug 97887. 2001-09-06 00:49:39 +00:00
relyea%netscape.com
6388dbd352 Don't skip certs that are already in the database. We may have to tweak
with the trust bits.
2001-09-04 20:20:48 +00:00
relyea%netscape.com
4a775646dd Allow 'importing' certificates that already exist in the database.
Use the import to change the trust flags on the given certificate.
2001-09-04 20:19:26 +00:00