Граф коммитов

55 Коммитов

Автор SHA1 Сообщение Дата
Benjamin Smedberg 381f8d9c63 Import NSS_3_12_RC4 2008-06-06 08:40:11 -04:00
hg@mozilla.com 05e5d33a57 Free the (distributed) Lizard! Automatic merge from CVS: Module mozilla: tag HG_REPO_INITIAL_IMPORT at 22 Mar 2007 10:30 PDT, 2007-03-22 10:30:00 -07:00
relyea%netscape.com c4abacd281 Bug 305697 Softoken needs to give on the fly access to additional databases. Part 2, User interface
r=julien
2005-09-28 17:17:49 +00:00
relyea%netscape.com aa8a2c0490 Only call C_WaitForSlotEvent if the module is PKCS #11 v2.01 or later.
bug 196811 r=wtc sr=julien
2005-09-20 20:56:07 +00:00
nelsonb%netscape.com 6edae5d3b6 Eliminate numerous potential causes of sending invalid (zero) session
handles down to a PKCS11 module.  Bug 292049. r=relyea.
Modified Files: pk11akey.c pk11auth.c pk11obj.c pk11skey.c pk11slot.c
 	pk11util.c
2005-08-03 01:22:07 +00:00
julien.pierre.bugs%sun.com bdc5219738 Fix for bug 292809 . Add flags to NSS_Initialize to better cooperate with the Java SunPKCS11 provider. r=relyea, wtchang 2005-07-08 04:41:32 +00:00
julien.pierre.bugs%sun.com e38dfe9691 Fix for bug 288726. error in SECMOD_CancelWait 2005-04-02 06:02:53 +00:00
wtchang%redhat.com bbd584b694 Bugzilla Bug 286439: Removed PKCS11_USE_THREADS and PK11_USE_THREADS.
r=relyea,nelsonb.
Modified Files:
	pk11wrap/pk11list.c pk11wrap/pk11pars.c pk11wrap/pk11skey.c
	pk11wrap/pk11slot.c pk11wrap/pk11util.c pk11wrap/secmod.h
	pk11wrap/secmodi.h pk11wrap/secmodt.h pk11wrap/secmodti.h
	softoken/pkcs11.c softoken/pkcs11i.h softoken/pkcs11u.c
2005-03-28 20:45:37 +00:00
wtchang%redhat.com 11ee6948b1 Bugzilla Bug 284839: checked in Bob Relyea's patch to improve the
responsiveness of SECMOD_WaitForAnyTokenEvent. r=wtc,nelsonb.
Modified Files: lib/dev/dev.h lib/dev/devslot.c lib/pk11wrap/pk11util.c
2005-03-07 21:20:38 +00:00
julien.pierre.bugs%sun.com 464720d125 Fix for bug 265707 - SECMOD_FindSlot always returns NULL. r=relyea 2004-10-24 18:25:04 +00:00
julien.pierre.bugs%sun.com 0571dde1e9 Fix for 265708. - count should be CK_ULONG 2004-10-23 20:23:50 +00:00
relyea%netscape.com e715f98c50 Bugzilla Bug 252702
NSS needs to handle better token insertion and removal.

Applied from patch to NSS 3.9
2004-07-29 23:38:14 +00:00
relyea%netscape.com d0af60d089 refactor pk11util, splitting large single files down to a managable size.
bug 246130. The new factor is:

pk11akey.c - asymetric keys constructed from pk11cert.c and pk11skey.c
pk11auth.c - authentication/password management factored from pk11slot.c
pk11cert.c - cert code with private key, crls and trust factored out.
pk11ctx.c -- pkcs11 context code, factored out of pk11skey.c
new pk11func.h -- for backward compatibility.
pk11mech.c - mechanism mapping code, factored mostly from pk11slot.c
pk11nobj.c - netscape objects (crls and trust), factored mostly from pk11cert.c
pk11obj.c - generic object support, factored from pk11skey.c pk11slot.c and
pk11cert.c
pk11priv.h -- private functions factored from pk11func.h
pk11pub.h -- public functions factored from pk11func.h
pk11skey.c - now only symetric key ops; private, public key ops, generic ops
and crypto contexs have been factored out.
pk11slot.c - still slot operations. Authentication, generic object ops,
mechanism mapping has been factored out.

This patch should only have refactoring, no new functions or other changes.
2004-07-19 22:12:38 +00:00
gerv%gerv.net 3634d4d94b Bug 236613: change to MPL/LGPL/GPL tri-license. 2004-04-25 15:03:26 +00:00
relyea%netscape.com e64bfbce5e Bug 203866. Make unloaded modules visible for administrative purposes.
sr=wtc r=nelson
2003-10-10 15:26:23 +00:00
wtc%netscape.com a98f4c0628 Bug 199082: checked in Nelson's patch, which
a) changes selfserv to test the return value from NSS_Shutdown.
b) changes SECMOD_Shutdown to set the error code SEC_ERROR_BUSY before
   returning SECFailure.
c) Adds a new function SSL_ShutdownServerSessionIDCache to ssl.h.
d) Changes selfserv to call SSL_ShutdownServerSessionIDCache before calling
NSS_Shutdown.
Modified Files:
	cmd/selfserv/selfserv.c lib/pk11wrap/pk11util.c
	lib/ssl/ssl.def lib/ssl/ssl.h lib/ssl/ssl3con.c
	lib/ssl/sslimpl.h lib/ssl/sslsnce.c
2003-03-26 00:31:13 +00:00
relyea%netscape.com f419ac9454 Try to load the new module before we've unloaded the old one. This now
works in NSS, and it allows us to back out if the new one didn't load (because
FIPS could not verify the shared module for instance).
2003-02-05 00:35:53 +00:00
relyea%netscape.com 34f3c0635f Bug 167861: PK11_GetModInfo needs to set the error code. 2002-09-27 17:50:59 +00:00
wtc%netscape.com a897ae16a9 Bugs 166734 and 166785: fixed compiler warnings reported by gcc on Linux.
The patch for this checkin is attached to bug 166785.
2002-09-06 00:27:52 +00:00
ian.mcgreer%sun.com 48d6b949c1 bug 98926, PKCS#11 session logging 2002-06-19 18:32:57 +00:00
relyea%netscape.com 482a55e955 Back out the change on Module destruction. 2002-05-22 00:25:48 +00:00
relyea%netscape.com 3b707d47e7 Fix spelling error.
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
relyea%netscape.com 6f20bf6c21 bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs. 2002-05-14 23:16:16 +00:00
relyea%netscape.com 94a587472a Add function to determine if it's safe to delete the internal module. 2002-05-10 18:36:18 +00:00
relyea%netscape.com fdca53cf70 Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it. 2002-05-10 18:13:44 +00:00
wtc%netscape.com 4747c98947 Whitespace change. 2002-04-30 00:11:19 +00:00
relyea%netscape.com 3d3a200209 return error when incomplete shutdown has been detected. 2002-04-26 22:36:07 +00:00
relyea%netscape.com 7aa8e229f4 Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
wtc%netscape.com 6f32aa07b0 Bugzilla bug 132461: changes suggested by Bob Relyea after his code review:
1. Add SECMOD_LoadModule back to nss.def.
2. Back out the SECMOD_AddModule/AddModuleEx changes.
I also updated the comments and made some changes to emulate the
indentation and comment styles of the original code.
Modifies files: nss/nss.def pk11wrap/pk11pars.c pk11wrap/pk11util.c
2002-03-26 00:43:04 +00:00
jpierre%netscape.com 9c777b0bb1 Fix for 132461 - add better functions to load and remove modules dynamically r=relyea 2002-03-21 03:35:28 +00:00
jpierre%netscape.com 3a5e730566 Fix for 128355 - add SECMOD_AddNewModuleEx to take module parameters 2002-03-01 00:37:42 +00:00
jpierre%netscape.com 7716bf30c8 Fix for 125143 - allow modutil to report PKCS#11 library load failure errors 2002-02-13 01:43:10 +00:00
relyea%netscape.com a90e3c83fb Fix crashing problem when trying two switch from fips to non-fips and back.
bug 119214.
2002-01-28 19:18:41 +00:00
ian.mcgreer%sun.com f3392f0b6a fix core when token list is emptied (caused by switch to fips mode) 2002-01-23 17:39:29 +00:00
ian.mcgreer%sun.com 4fc4b9ceba * keep stan in sync with both addition and removal of modules
* clean up compatibilty issues with PKCS#11 serial numbers.  Need to search both encoded and decoded values, while making sure stan code only deals with DER value
2002-01-23 17:00:39 +00:00
relyea%netscape.com 75f3b7599d Clean up compilier warnings on Solaris and Linux, most particularly:
1) Implicit declaration of function.
2) Possibly unitialized variables.

These warnings have indicated some real problems in the code, so many changes
are not just to silence the warnings, but to fix the problems. Others were
inocuous, but the warnings were silenced to reduce the noise.
2001-12-07 01:36:25 +00:00
relyea%netscape.com 4bf178bdc6 fix Bug 93989 Memory leak when adding a module. 2001-11-30 23:22:53 +00:00
relyea%netscape.com e27189dd1d Land BOB_WORK_BRANCH unto the tip.
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
ian.mcgreer%sun.com add44b6731 begin process of converting pk11cert to use Stan cert code; Stan tokens integrated with SECMOD 2001-10-11 16:32:34 +00:00
relyea%netscape.com 77fd99946d 1) fix warnings on AIX, HP, Linux, and Solaris.
2) Move private functions into private headers.

3) Sharpen the layer separation between NSS components, especially pkcs #12
and soft token.

4) Remove dead code.
2001-09-20 21:23:51 +00:00
relyea%netscape.com 2dbe064580 1) fix bug in module deletion.
2) Add new function in modutil to desplay the raw PKCS #11 module strings
2001-09-06 21:06:39 +00:00
relyea%netscape.com b551f36ebb 1) Add the necessary code so that AddModule functions again.
2) Add code to create secmod.db on the fly again.
3) Fix uninitialized structures so that we can switch to the fips token.

The results of this checkin should allow the fips tests to pass again.
2001-08-31 00:20:47 +00:00
relyea%netscape.com 54d37d98e0 Land new PKCS #11 initialization code. 2001-08-24 21:16:48 +00:00
wtc%netscape.com 8972494b1b Bugzilla bug 82259: added the XP_OS2 case. 2001-08-17 20:58:05 +00:00
nicolson%netscape.com 8cf0a564db Build a dummy module list. This allows JSS to work when NSS has been
initialized with NSS_NoDB_Init.
2001-07-03 21:27:17 +00:00
larryh%netscape.com f0278a97d7 Bugzilla: 82259. #error not #pragma 2001-05-24 00:22:55 +00:00
larryh%netscape.com 1e759a722e Bugzilla: 82259. improve rootcert load 2001-05-24 00:17:10 +00:00
wtc%netscape.com 8b2bc6b9d6 Bugzilla bug #78467: fixed a memory leak in SECMOD_AddNewModule(). Thanks
to Patrick Beard <beard@netscape.com> for the bug report.
2001-05-02 18:50:07 +00:00
relyea%netscape.com f1ffa04d9e Bug 67068. Fix Crash in SECMOD_Shutdown. reviewed by wtc. 2001-02-06 00:11:24 +00:00
relyea%netscape.com 2c9a42201b Add code to shutdown the PKCS #11 subsystem so NSS can be called to switch profiles. 2001-02-01 19:09:23 +00:00