Commit Graph

498 Commits

Author SHA1 Message Date
julien.pierre.bugs%sun.com
7ceb91038f Fix for bug 311164 . Initialize stan cert store object early to fix a race condition. r=nelson 2006-04-07 05:49:04 +00:00
rrelyea%redhat.com
c152a5f5fa Bug 332381 pk12util fails to import key/cert onto LunaSA HSM
r=nelson
2006-03-31 21:35:37 +00:00
rrelyea%redhat.com
14c38aa668 Bug 329072 client sometimes fails to authenticate despite having cert
r= nelson
2006-03-17 20:44:23 +00:00
wtchang%redhat.com
b69eb504ce Bugzilla Bug 320589: fixed PK11_SignatureLen to return the exact length of
ECDSA signatures.  Backed out a temporary workaround in
ECDSA_SignDigestWithSeed.  Made other changes related to signature lengths.
r=relyea,nelson.bolyard.
Modified Files:
	cryptohi/keyhi.h cryptohi/seckey.c cryptohi/secsign.c
	freebl/ec.c pk11wrap/pk11obj.c pk11wrap/pk11pub.h
	ssl/ssl3con.c
2006-03-02 00:07:08 +00:00
nelson%bolyard.com
4b1a1b7cb3 Bug 326690. Enable modutil to configure default slots for the
AES, SHA256 or SHA512 mechanisms.  r=rrelyea,julien.pierre
2006-02-28 05:16:00 +00:00
rrelyea%redhat.com
3ebd845ca9 Bug 319619 "large" ECC private keys cannot be exported through PKCS #11
1) Change the export encrypted private key function to ask the token the wrap
size rather than trying to figure it out ourselves.

2) Fix the soften to correctly return the size.


r=wtc, nelsonb
2006-02-01 16:43:47 +00:00
relyea%netscape.com
77cb1d9d48 Bug 316925
Key export does not work on tokens with non-sensitive keys that can't wrap.
r=kaie
2005-11-24 00:40:14 +00:00
relyea%netscape.com
4b7f9f6804 Bug 129303 NSS needs to expose interfaces to deal with multiple token sources of certs
r=kaie
2005-11-23 23:54:15 +00:00
julien.pierre.bugs%sun.com
4f35393d59 Fix for bug 286685. rename SFTK symbols to SECMOD. r=rrelyea, nelson 2005-11-12 00:14:25 +00:00
relyea%netscape.com
b0d1e52691 Back out non-reviewed strictly white space change in pk11sdr.c 2005-10-04 01:11:01 +00:00
wtchang%redhat.com
058312eaa6 Bugzilla bug 310518: map CKR_PIN_INVALID and CKR_PIN_LEN_RANGE to
SEC_ERROR_INVALID_PASSWORD instead of SEC_ERROR_BAD_PASSWORD. r=relyea.
2005-10-03 22:41:45 +00:00
relyea%netscape.com
0223a07982 This change was not part of bug 272484 and has not been reviewed.
Back it out.
2005-10-03 21:58:24 +00:00
relyea%netscape.com
53f4189369 Bug 272484 Certificate manager crashes [@ _PR_MD_ATOMIC_DECREMENT - PK11_FreeSymKey]
The problem only happens if we try to import a key into a token which then fails
to import. The basic issue was a hack in the pkcs 7 code to support PKCS 12, A
special structure was used to replace the SymKey structure, and the code 'knew'
the special structure existed before it dealt with the symkey. The fix addes a
new capability to symkeys, where applications can attach application specific
data to the key structure. PKCS 12 uses this to attache the PBE information
for CMS. (part 1 of 3)

This patch also improves the key's reuse of sessions, so sessions are not thrashed
when SSL is used with them.

r=wtc
2005-10-03 21:55:29 +00:00
relyea%netscape.com
b354997d97 Bug 119500 PKCS#11 CKF_PROTECTED_AUTHENTICATION_PATH token flag not supported
wtc's review r=wtc
2005-09-29 23:44:39 +00:00
relyea%netscape.com
9c9cecb9d7 Bugzilla Bug 119500 PKCS#11 CKF_PROTECTED_AUTHENTICATION_PATH token flag not supported
r=nelson

This is only the NSS portion of this patch. The PSM portion will be checked in once the
NSS portion is mainlined to mozilla.
2005-09-29 21:00:58 +00:00
relyea%netscape.com
c4abacd281 Bug 305697 Softoken needs to give on the fly access to additional databases. Part 2, User interface
r=julien
2005-09-28 17:17:49 +00:00
wtchang%redhat.com
73f597f990 Bug 299197: added the comment for PK11_TokenKeyGen back. r=relyea. 2005-09-21 01:32:11 +00:00
wtchang%redhat.com
ecdf90d92d Bug 299197: fixed comments. r=relyea. 2005-09-21 01:31:37 +00:00
relyea%netscape.com
aa8a2c0490 Only call C_WaitForSlotEvent if the module is PKCS #11 v2.01 or later.
bug 196811 r=wtc sr=julien
2005-09-20 20:56:07 +00:00
nelsonb%netscape.com
1d31068271 Export function PK11_MapSignKeyType for use by libSSL. Bug 305147.
r=relyea.
Modified Files: nss/nss.def pk11wrap/pk11mech.c pk11wrap/pk11obj.c
	pk11wrap/pk11pub.h pk11wrap/secmodi.h
2005-09-09 02:03:57 +00:00
wtchang%redhat.com
4250ad5929 Bugzilla Bug 299197: define two bitflags for every PKCS #11 object
attribute with no exceptions. renamed PK11_ATTR_READONLY as
PK11_ATTR_UNMODIFIABLE.  In pk11_OpFlagsToAttributes, backed out a change
I made before.  Made pk11_AttrFlagsToAttributes table-driven. In
pk11_loadPrivKeyWithFlags, fixed the bug (always loading the public key as
a token object).  Other code cleanups. r=relyea,nelsonb.
Modified files: pk11akey.c pk11obj.c pk11pub.h pk11skey.c secmodt.h
2005-09-07 18:23:35 +00:00
wtchang%redhat.com
db235ef59a Bugzilla Bug 299197: added PK11AttrFlags and PK11_GenerateKeyPairWithFlags.
Modified PK11_TokenKeyGenWithFlags to take a PK11AttrFlags parameter.
PK11AttrFlags controls the values of commonly used PKCS #11 object
attributes that have Boolean values. r=relyea,nelsonb.
Modified Files:
	nss/nss.def pk11wrap/pk11akey.c pk11wrap/pk11obj.c
	pk11wrap/pk11pub.h pk11wrap/pk11skey.c pk11wrap/secmodi.h
	pk11wrap/secmodt.h
2005-09-02 18:25:04 +00:00
wtchang%redhat.com
184d7ab678 Bugzilla Bug 305835: removed NSS_ENABLE_ECC ifdefs under nss/lib except
nss/lib/{freebl,softoken,ssl}. r=nelsonb.
Modified Files:
	cryptohi/keyhi.h cryptohi/manifest.mn cryptohi/seckey.c
	cryptohi/secsign.c freebl/ec.c pk11wrap/manifest.mn
	pk11wrap/pk11akey.c pk11wrap/pk11cert.c pk11wrap/pk11mech.c
	pk11wrap/pk11obj.c pk11wrap/pk11skey.c pkcs12/manifest.mn
	pkcs12/p12d.c pkcs7/config.mk pkcs7/p7decode.c
	pkcs7/p7encode.c smime/cmssiginfo.c smime/cmsutil.c
	smime/config.mk
2005-09-02 01:24:57 +00:00
wtchang%redhat.com
5e25df8763 Bugzilla Bug 298957: removed a comment. The code already does what the
comment asked for. r=relyea.
2005-08-15 21:34:42 +00:00
wtchang%redhat.com
2577eb148c Bugzilla bug 302286: fixed the bug that NSS misinterpreted the
CKA_PRIME_BITS attribute for DSA's p parameter. r=relyea.
Modified files: pk11wrap/pk11pqg.c softoken/pkcs11c.c
2005-08-13 00:09:26 +00:00
julien.pierre.bugs%sun.com
440dae786f Fix for bug 303494 . SEC_LookupCrls passes the address of a stack variable that goes out of scope. r=nelson,wtchang 2005-08-05 21:15:22 +00:00
nelsonb%netscape.com
6ee92f33d0 Implement PK11_CopyTokenPrivKeyToSessionPrivKey, function to copy token
RSA private key to a session key, to eliminate DB lookups and 3DES
unwrapping for every use.  Bug 274538.  r=rrelyea.
Modified Files: nss/nss.def pk11wrap/pk11akey.c pk11wrap/pk11pub.h
2005-08-03 01:57:40 +00:00
nelsonb%netscape.com
6edae5d3b6 Eliminate numerous potential causes of sending invalid (zero) session
handles down to a PKCS11 module.  Bug 292049. r=relyea.
Modified Files: pk11akey.c pk11auth.c pk11obj.c pk11skey.c pk11slot.c
 	pk11util.c
2005-08-03 01:22:07 +00:00
nelsonb%netscape.com
eeb454fae5 remove NSS_CLASSIC code from pk11cert.c and pk11nobj.c.
bug 293847  r=rrelyea
2005-08-02 01:34:38 +00:00
wtchang%redhat.com
035c21bfa6 Bugzilla Bug 298957: improved the comment for PK11_TokenKeyGenWithFlags.
r=relyea.
2005-08-02 01:03:08 +00:00
wtchang%redhat.com
7053ab4abf Bugzilla Bug 302219: added CKM_RSA_X9_31_KEY_PAIR_GEN support. r=relyea. 2005-07-29 23:43:40 +00:00
wtchang%redhat.com
a3ac2d6b1d Bugzilla Bug 302219: added CKM_RSA_X9_31_KEY_PAIR_GEN support to
PK11_GenerateKeyPair. r=relyea.
2005-07-29 23:23:35 +00:00
relyea%netscape.com
03738e2557 Bug 278276 Slot List Elements cannot be freed by applications.
wtchang: review+
julien.pierre.bugs: superreview+
2005-07-28 23:17:43 +00:00
relyea%netscape.com
8be47f79ed bug 278276 Slot List Elements cannot be freed by applications.
Export a free function for slot list elements.

r = wtc & julien.
2005-07-28 23:13:21 +00:00
wtchang%redhat.com
512a35d372 Bugzilla Bug 298514: Moved the FIPS 140-2 pairwise consistency check from
pk11wrap to softoken because the softoken shared library is our new crypto
module boundary. r=relyea,nelsonb.
Modified files: pk11wrap/pk11akey.c softoken/fipstokn.c softoken/pkcs11c.c
2005-07-22 22:11:22 +00:00
wtchang%redhat.com
256eb43b03 Bugzilla Bug 298957: make the new function PK11_TokenKeyGenWithFlags
"legacy free" and move the code that set the CKF_ENCRYPT flag by default
and the Fortezza hack code to PK11_TokenKeyGen. r=relyea.
2005-07-22 00:07:52 +00:00
julien.pierre.bugs%sun.com
bdc5219738 Fix for bug 292809 . Add flags to NSS_Initialize to better cooperate with the Java SunPKCS11 provider. r=relyea, wtchang 2005-07-08 04:41:32 +00:00
relyea%netscape.com
66d0ee6781 Bug 294556 (not all functions exported) reviews wtc nelsonb
Bug 298627 (need to access random number generator on a slot). reviews wtc julien
2005-07-06 18:46:36 +00:00
wtchang%redhat.com
2fa8c48fa5 Bugzilla Bug 298957: pk11_FlagsToAttributes should not add attributes
whose type is 0. r=relyea.
2005-07-06 18:36:05 +00:00
wtchang%redhat.com
f8218a271b Bugzilla Bug 298957: code cleanup -- the array size can be MAX_TEMPL_ATTRS.
r=relyea.
2005-07-06 18:34:39 +00:00
wtchang%redhat.com
1639879aa6 Bugzilla Bug 298957: added new function PK11_TokenKeyGenWithFlags.
r=relyea,nelsonb.
Modified files: nss/nss.def pk11wrap/pk11pub.h pk11wrap/pk11skey.c
2005-06-30 17:50:41 +00:00
wtchang%redhat.com
3e92cbf95d Bugzilla Bug 288095: removed unnecessary #include "alghmac.h". alghmac.h
and pkcs11i.h don't need to be exported to the outside of lib/softoken.
r=relyea,nelsonb.
Modified Files:
	pk11wrap/pk11pbe.c pkcs12/p12d.c pkcs12/p12e.c
	pkcs12/p12local.c softoken/manifest.mn
2005-04-15 16:38:46 +00:00
julien.pierre.bugs%sun.com
e38dfe9691 Fix for bug 288726. error in SECMOD_CancelWait 2005-04-02 06:02:53 +00:00
julien.pierre.bugs%sun.com
85f13422bc Remove unused variable 2005-04-02 05:17:27 +00:00
nelsonb%netscape.com
aed5390a2d Rename functions that are shared by pk11wrap and softoken from sftk_ to
secmod_.  Bug 286685. r=relyea.
2005-04-02 00:46:13 +00:00
wtchang%redhat.com
1ddbee0247 Bugzilla bug 288657: fixed the bug that pk11_AnyUnwrapKey returns a
partially constructed symKey object if C_UnwrapKey fails with
CKR_DEVICE_ERROR.  r=relyea.
2005-04-01 22:27:44 +00:00
nelsonb%netscape.com
c03b9d33fe Rename all internal private softoken functions types and symbols from
PK11 or pk11 prefixes to SFTK or sftk prefixes.  Bug 286685.
r=relyea,wtchang  Modified Files:
 cmd/bltest/blapitest.c lib/pk11wrap/pk11pars.c lib/softoken/dbinit.c
 lib/softoken/dbmshim.c lib/softoken/fipstest.c lib/softoken/fipstokn.c
 lib/softoken/pcertdb.c lib/softoken/pk11db.c lib/softoken/pk11pars.h
 lib/softoken/pkcs11.c lib/softoken/pkcs11c.c lib/softoken/pkcs11i.h
 lib/softoken/pkcs11u.c lib/softoken/softoken.h lib/softoken/tlsprf.c
2005-03-29 18:21:18 +00:00
wtchang%redhat.com
bbd584b694 Bugzilla Bug 286439: Removed PKCS11_USE_THREADS and PK11_USE_THREADS.
r=relyea,nelsonb.
Modified Files:
	pk11wrap/pk11list.c pk11wrap/pk11pars.c pk11wrap/pk11skey.c
	pk11wrap/pk11slot.c pk11wrap/pk11util.c pk11wrap/secmod.h
	pk11wrap/secmodi.h pk11wrap/secmodt.h pk11wrap/secmodti.h
	softoken/pkcs11.c softoken/pkcs11i.h softoken/pkcs11u.c
2005-03-28 20:45:37 +00:00
wtchang%redhat.com
ef701de98b Removed an extraneous ^M character at the end of a line. 2005-03-28 19:37:28 +00:00
wtchang%redhat.com
cb2efbad98 Got rid of extraneous ^M characters at some line endings. 2005-03-17 21:28:40 +00:00
wtchang%redhat.com
ddab8fa00e Bugzilla Bug 286302: made PK11_CreateSymKey static and renamed it
pk11_CreateSymKey.  r=nelsonb.
Modified Files: pk11priv.h pk11skey.c
2005-03-16 22:40:35 +00:00
wtchang%redhat.com
4dc846b1fe Bugzilla Bug 286313: code cleanup: use PORT_New and PORT_ZNew to allocate
structures. r=nelsonb.
2005-03-16 21:57:47 +00:00
wtchang%redhat.com
7c8a3f8874 Bugzilla Bug 286313: pk11_getKeyFromList can call PORT_Alloc instead of
PORT_ZAlloc.  PK11_CreateSymKey should set the data.type member. r=jpierre
2005-03-16 19:10:49 +00:00
nelsonb%netscape.com
0b4c6bf4e9 Eliminate one cause of double-deletes of PKCS11 keys and sessions.
Bug 283690. Patch contributed by Bob Relyea. r=nelson.
2005-03-15 05:27:31 +00:00
wtchang%redhat.com
1980fc5f8a Bugzilla Bug 276183: added a comment for PK11_HashBuf. 2005-03-14 19:22:06 +00:00
wtchang%redhat.com
11ee6948b1 Bugzilla Bug 284839: checked in Bob Relyea's patch to improve the
responsiveness of SECMOD_WaitForAnyTokenEvent. r=wtc,nelsonb.
Modified Files: lib/dev/dev.h lib/dev/devslot.c lib/pk11wrap/pk11util.c
2005-03-07 21:20:38 +00:00
julien.pierre.bugs%sun.com
afed9f1c17 Fix for 283765. Fix for UMR in NSSUsage. r=julien 2005-03-04 04:32:04 +00:00
nelsonb%netscape.com
d614d9c9ff Report invalid key when key import fails. Do not go on and use invalid
key handle.  Bug 283642.  r=relyea
2005-02-27 15:25:46 +00:00
julien.pierre.bugs%sun.com
09e544676a Fix for 269581 - cache the value of CKA_PRIVATE on private keys to avoid unnecessary C_GetAttributeValue . Also fix i
ncorrect logic in attribute tests. r=rrelyea,wtchang
2005-02-24 00:38:23 +00:00
julien.pierre.bugs%sun.com
1b8fc2a9d7 Fix for 243585 - add the ability to use CRL objects from RAM . r=nelson, neil.williams 2005-02-15 06:26:43 +00:00
wtchang%redhat.com
82b1183c84 Bugzilla Bug 267158: removed the $Name$ RCS keyword from our source files.
This keyword adds noise to the output of "ident libnss3.so | grep NSS"
on our debug build, and appears to cause spurious CVS conflicts. r=nelsonb.
2005-01-20 02:25:51 +00:00
wtchang%redhat.com
467935176b Bugzilla Bug 276180: defend against invalid arguments to PK11_HashBuf
and PK11_DigestOp. r=nelsonb.
2005-01-04 22:00:01 +00:00
wtchang%redhat.com
ddbea8b6fc Bugzilla bug 273624: fixed the regression (from NSS 3.3.x) that
NSS_Initialize didn't report the SEC_ERROR_BAD_DATABASE error if
the NSS databases haven't been created.  r=nelsonb,relyea.
Modified Files: pk11wrap/pk11err.c pk11wrap/pk11load.c
                softoken/dbinit.c softoken/pkcs11n.h
2005-01-04 18:20:00 +00:00
nelsonb%netscape.com
c33c315aee When attempting to find an SMIME profile for a given email address,
firt ensure that the email address is not NULL and not empty.
Bugzilla bug 263596. r=wan-teh.
Modified Files: lib/certdb/stanpcertdb.c lib/pk11wrap/pk11nobj.c
2004-12-02 21:34:15 +00:00
julien.pierre.bugs%sun.com
94b08bc344 Fix bugzilla 268521 - C_CloseSession getting called after C_CloseAllSessions . r=relyea, nelsonb 2004-11-09 23:19:24 +00:00
julien.pierre.bugs%sun.com
464720d125 Fix for bug 265707 - SECMOD_FindSlot always returns NULL. r=relyea 2004-10-24 18:25:04 +00:00
julien.pierre.bugs%sun.com
0571dde1e9 Fix for 265708. - count should be CK_ULONG 2004-10-23 20:23:50 +00:00
wchang0222%aol.com
0e502115b8 Bugzilla bug 265686: the 'name' argument to PK11_FindSlotByName should be
const char *.  The patch is contributed by timeless@bemail.org. r=wtc.
Modified files: pk11pub.h pk11slot.c
2004-10-22 22:13:45 +00:00
relyea%netscape.com
e93a53498f [Bug 262274] visibility of PK11_GetCertFromPrivateKey and CERT_DecodeDERCertificate 2004-10-14 22:34:47 +00:00
relyea%netscape.com
5be4b0f4b4 Fix regression where PK11LogoutAll will crash when called when NSS is not initialized. 2004-10-11 22:37:41 +00:00
nelsonb%netscape.com
ebadd0ad21 Fix bug 261333. Use the modulus length for the length of the output
buffer, not the length of the input data.  r=julien.pierre
2004-09-24 21:44:20 +00:00
nelsonb%netscape.com
85d9ad67fc Two new functions: PK11_PubEncryptPKCS1 and PK11_PrivDecryptPKCS1.
Bugzilla bug 258366. Ported from NSS 3.9 branch.
2004-09-08 02:52:15 +00:00
jpierre%netscape.com
d6e93928ed Fix for 254393 - r=nelsonb . PK11_FindKeyByAnyCert returned invalid key objects 2004-08-06 02:24:31 +00:00
relyea%netscape.com
e715f98c50 Bugzilla Bug 252702
NSS needs to handle better token insertion and removal.

Applied from patch to NSS 3.9
2004-07-29 23:38:14 +00:00
relyea%netscape.com
7e82fd4194 Bug 250687
NSS Crashes or leaks Cert references if bad certs are passed up by PKCS #11 modules.
r=nelson
sr=ian
2004-07-21 18:18:05 +00:00
relyea%netscape.com
57260fe853 Backing out pk11cert.c changes (not ready for checkin yet). (revert to 1.133) 2004-07-20 23:04:31 +00:00
relyea%netscape.com
950ffdabc7 Fix optimized builds (make tinderbox go green). 2004-07-20 23:02:04 +00:00
relyea%netscape.com
c5e993c9fd Missed function definition in previous checkin. 2004-07-19 22:37:48 +00:00
relyea%netscape.com
d0af60d089 refactor pk11util, splitting large single files down to a managable size.
bug 246130. The new factor is:

pk11akey.c - asymetric keys constructed from pk11cert.c and pk11skey.c
pk11auth.c - authentication/password management factored from pk11slot.c
pk11cert.c - cert code with private key, crls and trust factored out.
pk11ctx.c -- pkcs11 context code, factored out of pk11skey.c
new pk11func.h -- for backward compatibility.
pk11mech.c - mechanism mapping code, factored mostly from pk11slot.c
pk11nobj.c - netscape objects (crls and trust), factored mostly from pk11cert.c
pk11obj.c - generic object support, factored from pk11skey.c pk11slot.c and
pk11cert.c
pk11priv.h -- private functions factored from pk11func.h
pk11pub.h -- public functions factored from pk11func.h
pk11skey.c - now only symetric key ops; private, public key ops, generic ops
and crypto contexs have been factored out.
pk11slot.c - still slot operations. Authentication, generic object ops,
mechanism mapping has been factored out.

This patch should only have refactoring, no new functions or other changes.
2004-07-19 22:12:38 +00:00
wchang0222%aol.com
409574ee15 Bugzilla bug 248981: PKCS #11 modules that are based on older lib/ckfw (for
example, the nssckbi module) save a pointer to the CK_C_INITIALIZE_ARGS
passed to them. So if we pass a pointer to the stack variable moduleArgs,
the pointer will point to a structure that has gone out of scope. To
prevent crashes in these broken modules, we continue to pass a pointer to
the global secmodLockFunctions whenever we can. r=relyea.
2004-07-08 23:23:50 +00:00
jpierre%netscape.com
4bfc6dca87 Fix for 248981 - make SECMOD_LoadPKCS11Module thread safe. r=relyea 2004-07-01 19:20:51 +00:00
relyea%netscape.com
501db85dbc Bug 244914, 244907 r=nelsonb
Add support for unprotected private keys without requiring authentication.
Add support to access application specific PKCS #11 objects through NSS.
2004-06-21 23:01:53 +00:00
nelsonb%netscape.com
3b8151e40a Initialize the "type" member in the SECItems returned by
PK11_PQG_ParamGetSeedLen so encoded values will be correct.
Bug 247737. r=relyea.
2004-06-21 19:22:02 +00:00
jpierre%netscape.com
3f739f181e Backout part of the QuickDER changes from 178895 . r=relyea 2004-06-17 23:23:59 +00:00
nelsonb%netscape.com
c89fea6d2e Fold function definition so editor can find it. 2004-06-09 02:22:38 +00:00
jpierre%netscape.com
909489401d Fix for 178895 - QuickDER optimizations. r=relyea 2004-06-05 00:50:32 +00:00
gerv%gerv.net
3634d4d94b Bug 236613: change to MPL/LGPL/GPL tri-license. 2004-04-25 15:03:26 +00:00
relyea%netscape.com
66be1e00e1 Bug 239827: Fix race condition in unwrap private key (if target key is symetric). 2004-04-07 01:18:46 +00:00
jpierre%netscape.com
f1a9128ad1 Fix for 235874 - crash in PK11_DigestKey . r=wtc, nelsonb 2004-03-03 03:18:56 +00:00
jpierre%netscape.com
8c43abd07c Fix for 231051 - crlutil asserts after importing CRL. r=nelsonb, wtc 2004-01-27 00:02:16 +00:00
nelsonb%netscape.com
ce75f8d873 Move an extern function declaration to the header file where it belongs.
Bug 229212. r=relyea.
2004-01-22 02:19:42 +00:00
jpierre%netscape.com
8a6338d551 Rename PK11_PubDeriveExtended to PK11_PubDeriveWithKDF 2004-01-08 01:37:46 +00:00
jpierre%netscape.com
e7036921ca Rename PK11_FindSlotsByAliases to PK11_FindSlotsByNames 2004-01-07 23:12:01 +00:00
wchang0222%aol.com
5bfcd81514 Declare the argument to SECKEY_ECParamsToKeySize as const.
Modified Files: seckey.c pk11skey.c
2003-12-23 02:05:28 +00:00
wchang0222%aol.com
79387320b7 Renamed SECKEY_ECParams2KeySize as SECKEY_ECParamsToKeySize. Do not export
this function from the nss3 shared library.
Modified Files: seckey.c pk11skey.c nss.def
2003-12-22 23:36:40 +00:00
wchang0222%aol.com
9ccb6b87c5 Made wincx the last argument of PK11_PubDeriveExtended. r=relyea.
Modified Files: pk11func.h pk11skey.c ssl3con.c
2003-12-19 23:54:29 +00:00
wchang0222%aol.com
010acd81c1 PK11_MoveKey was renamed PK11_MoveSymKey. r=relyea.
Modified Files: symkeyutil.c nss.def pk11func.h pk11skey.c
2003-12-19 23:29:43 +00:00
wchang0222%aol.com
991ddf2ba6 Bugzilla bug 228624: made PK11_ListCertsInSlot reach into the Stan layer
to obtain the correct nicknames of the cert instances (pk11cert.c).  Fixed
the bug that if a cert we want to add the the cache is already in the
cache, we should merge the instances of the cert before destroying the
duplicate cert (tdcache.c).  r=jpierre,relyea.
2003-12-18 18:23:17 +00:00
nelsonb%netscape.com
20abf0c0aa Don't invoke PKCS11 with an invalid handle. Bug 226285.
r=relyea sr=wchang0222
2003-11-21 22:10:56 +00:00
nelsonb%netscape.com
b79aed8a42 Plug a leak that occurs when code asks NSS to use an invalid PKCS11
mechanism.  Bugscape bug 53875.  r=relyea
2003-11-20 01:59:07 +00:00