relyea%netscape.com
936e0f80f3
Fix optimized build failures
2002-10-10 21:17:39 +00:00
relyea%netscape.com
5fd94ca1a9
Bug 164501. Return a proper error code from PK11_FindCrlByName() so the CRL
...
code can decide if there is a hw or system failure preventing the reading of a
CRL or if the CRL is just not there.
2002-10-10 20:30:19 +00:00
ian.mcgreer%sun.com
cc2b80a48a
bug 166793, uninitialized variables
...
r=wtc
2002-09-30 21:15:07 +00:00
ian.mcgreer%sun.com
31db0bf1e7
bug 166741, fixing bug in previous patches
...
r=wtc
2002-09-10 20:30:53 +00:00
wtc%netscape.com
7b2b64b1e8
Bug 167532: fixed a regression introduced by the previous checkin.
2002-09-10 05:10:53 +00:00
nicolson%netscape.com
e179fe8904
Fix 164126: makefile build error.
...
Change the NSS module name from "security" to "nss".
2002-09-06 16:38:56 +00:00
wtc%netscape.com
a897ae16a9
Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.
...
The patch for this checkin is attached to bug 166785.
2002-09-06 00:27:52 +00:00
ian.mcgreer%sun.com
019a972928
bug 166741, unitialized variables
...
r=wtc
2002-09-05 22:28:30 +00:00
jpierre%netscape.com
29333f104f
Implement the CRL cache . Bug 149854
2002-08-30 22:57:03 +00:00
relyea%netscape.com
24adc2754c
close hole in trust lookups.
2002-08-27 23:38:29 +00:00
relyea%netscape.com
0fb6e546c6
bug 161552: Make the recipient list traversal functions call the internal
...
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
relyea%netscape.com
cbd308d951
Handle the switch from the static buffer to the realloc buffer.
2002-08-09 18:48:31 +00:00
relyea%netscape.com
c57a14afb4
remove unreferenced Variable.
2002-08-09 18:05:24 +00:00
relyea%netscape.com
73bc75ae28
treat lastTime of 0 as never having checked (not within the interval).
2002-07-09 04:40:35 +00:00
relyea%netscape.com
6880c87a8d
More performance improvements in listing certs:
...
1) reduce more short term memory allocate/frees.
2) remove sha1 hash calculations from critical paths.
3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
relyea%netscape.com
5fc7efb515
Fix solaris compiler error/warning. Fix prototype to return correct value (PRBool not PRStatus).
2002-06-24 23:54:16 +00:00
relyea%netscape.com
7caefab6ed
Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs.
2002-06-24 22:36:59 +00:00
relyea%netscape.com
b7167f5cba
Reset the cert cache and clobber cert handles on token insertion an removal
2002-06-13 21:40:43 +00:00
relyea%netscape.com
c936511eb9
Fix spelling error.
2002-05-21 21:23:33 +00:00
jpierre%netscape.com
d5de75b62b
Fix for bug 137645 - cached certificate does not get its nickname updated after P12 import of matching user certificate
2002-05-20 23:21:39 +00:00
relyea%netscape.com
56f8e3b5e8
Automatically create a NULL email profile for certs with email addresses which
...
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
d250a3e38f
bug 142175, PK11_ListCerts regressions -- handle PKCS#11 incompatibilites with serial numbers, and fix trust collection.
2002-05-07 14:58:12 +00:00
ian.mcgreer%sun.com
cdae9ed5a1
When doing cert traversals, create the certs in full as they are found. This avoids thrashing the softoken's object cache when the database has a large number of certs.
2002-04-26 14:34:05 +00:00
ian.mcgreer%sun.com
74b86448f7
fix broken HPUX builds
2002-04-26 12:59:06 +00:00
ian.mcgreer%sun.com
44d76f3678
if a cert already exists, use C_SetAttributeValue to change its mutable attributes during import (instead of trying to recreate it)
2002-04-25 20:49:49 +00:00
ian.mcgreer%sun.com
2e14215952
reorganize token cache so that cache entries for imported objects are created from the token, not from the user-supplied template
2002-04-25 19:33:47 +00:00
relyea%netscape.com
0008ea5125
Don't set the Token value before fetching CRL attributes. This code is fetching
...
attributes from a known CRL, not looking up new attributes (I'm pretty sure that
CVS apropos would show I checked in the previously wrong code).
bob
2002-04-25 18:33:45 +00:00
relyea%netscape.com
8747bf72ad
Don't crash if our cache entry is not found.
2002-04-25 00:45:42 +00:00
relyea%netscape.com
ac5aeb9932
Look up both DER encoded serial numbers (PKCS #11 spec), and decode serial
...
numbers (Old NSS) when looking up certs by issuer and SN.
2002-04-24 18:27:17 +00:00
ian.mcgreer%sun.com
9221a5bd63
fix shutdown leaks
2002-04-23 17:22:13 +00:00
relyea%netscape.com
ce09346d8c
Token and cert processing fixes:
...
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
9596c39faa
file is no longer part of build (functionality in devtoken.c)
2002-04-22 18:28:30 +00:00
ian.mcgreer%sun.com
a4591dfe82
overwrite old entry during import, so that changing trust works correctly
2002-04-22 15:21:06 +00:00
ian.mcgreer%sun.com
abac680269
fix bugs in cert import with smart card cache
2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7ab27bc63
re-sync the trust domain cache with token insertion/removal
2002-04-19 23:06:44 +00:00
ian.mcgreer%sun.com
36e1d960b7
* make sure the token cache returns failure in overflow case
...
* change internal module trust order again, builtins uses 100, and internal module must come first
2002-04-19 19:30:12 +00:00
ian.mcgreer%sun.com
7c6de6462d
improve synchronization between the token state and token cache operations
2002-04-19 17:32:22 +00:00
ian.mcgreer%sun.com
5377ca2a6c
Fixes for smart card cache. Don't do cache searches by email address, since GetAttributeValue does not set that field. Handle removal correctly for item at tail of list. Don't search token after a successful cache search that returned zero hits.
2002-04-19 16:14:13 +00:00
relyea%netscape.com
8964d7d12e
Don't crash if we try to get the name of a non-existant token.
2002-04-18 17:54:30 +00:00
ian.mcgreer%sun.com
5dbec9a12d
landing new smart card cache, bug 135429
2002-04-18 17:30:05 +00:00
ian.mcgreer%sun.com
b4146d9933
bug 63815, AIX compiler fails to build ckhelper.c in debug mode
2002-04-15 21:04:00 +00:00
ian.mcgreer%sun.com
54e6d33515
fix bbroken solaris x86 build
2002-04-15 16:20:39 +00:00
ian.mcgreer%sun.com
a7256cf9ec
bug 135521, change cert lookups on tokens to be actual finds instead of traversals
2002-04-15 15:22:11 +00:00
relyea%netscape.com
7aa8e229f4
Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
...
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
relyea%netscape.com
8aeb4d9e03
Handle yet another PKCS #11 device which has non-standard behavior, but is well established in the market place.
2002-04-09 17:58:00 +00:00
ian.mcgreer%sun.com
c2e59a5608
fix broken 64-bit platforms
2002-04-05 15:19:37 +00:00
ian.mcgreer%sun.com
b1ccccd70a
Land Stan changes to tip. Mostly header file / structure / API cleanup. Note
...
that these changes *do not* affect the current build, except for some minor edits.
2002-04-04 20:00:28 +00:00
ian.mcgreer%sun.com
067b682a97
merge branch fix for bug 115954 to tip
2002-04-03 19:22:15 +00:00
relyea%netscape.com
c650f7f90e
handle older tokens that do not handle GetAttributes correctly.
2002-03-15 19:51:27 +00:00
wtc%netscape.com
62b88996d5
Bugzilla bug 130703: fixed several issues in the NSS 3.4 exported headers.
...
1) Preseve the position of NSS 3.3 elements in the data structures. Some
new fields replace some old deprecated fields where possible to preserve
the total size of the structure.
2) Stan headers are removed from public exports.
3) Some exported functions didn't have prototypes in the public headers.
4) One bug fix: dev3hack.c did not pass the second argument to
nssToken_DestroyCertList.
5) Include the necessary headers to fix undeclared function warnings.
2002-03-14 04:12:25 +00:00