relyea%netscape.com
696026ef88
When checking NeedInit status, go back and check the token in case the token
...
has been initialized offline.
2002-06-11 23:33:25 +00:00
relyea%netscape.com
a37f083171
Refresh token cache after login on tokens that need to log in before they
...
could read their certs.
2002-05-22 23:13:05 +00:00
wtc%netscape.com
0daca2313b
Bugzilla bug 135818: fixed internal slot reference leaks in
...
PK11_VerifySlotMechanisms and PK11_InitToken. r=relyea.
2002-05-09 23:18:15 +00:00
wtc%netscape.com
787be44323
Needed a (char *) cast for slotInfo.manufacturerID because it is an array
...
of "unsigned" chars. Mac's compiler complains about that.
2002-04-26 23:05:40 +00:00
relyea%netscape.com
2cd6213ca5
Detect Active Card presents and disable PROTECTED_PIN_PATH login when found.
2002-04-25 21:24:47 +00:00
relyea%netscape.com
1abdbba5a8
Don't let activeCards set the Protect_Auth bit because they weren't intending to
...
to begin with.
2002-04-25 20:57:06 +00:00
ian.mcgreer%sun.com
5dbec9a12d
landing new smart card cache, bug 135429
2002-04-18 17:30:05 +00:00
relyea%netscape.com
7aa8e229f4
Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
...
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
ian.mcgreer%sun.com
f6f58a33ec
bug 130747, update trust after login to catch user certs when token doesn't return public key (ncipher)
2002-03-15 19:23:14 +00:00
wtc%netscape.com
62b88996d5
Bugzilla bug 130703: fixed several issues in the NSS 3.4 exported headers.
...
1) Preseve the position of NSS 3.3 elements in the data structures. Some
new fields replace some old deprecated fields where possible to preserve
the total size of the structure.
2) Stan headers are removed from public exports.
3) Some exported functions didn't have prototypes in the public headers.
4) One bug fix: dev3hack.c did not pass the second argument to
nssToken_DestroyCertList.
5) Include the necessary headers to fix undeclared function warnings.
2002-03-14 04:12:25 +00:00
nicolson%netscape.com
c89247a09f
Fix 129756: PK11_SetObjectNickname is broken.
...
r=relyea.
2002-03-12 01:50:57 +00:00
relyea%netscape.com
578a4b59ae
bug 125808 :
...
Reset the token name on token removal.
Check for token presence to reset the session handle.
Consolidate the NSS3 style TokenInit with the stan init so everything is in sync.
r=ddrinan
2002-03-06 01:44:50 +00:00
relyea%netscape.com
cab04c2fb6
Fix token/cert interactions:
...
1) don't have certs disappear because we have empty tokens.
2) Make sure the NSSToken structure has up-to-date nicknames.
2002-03-04 22:39:28 +00:00
ian.mcgreer%sun.com
ffa4c947ec
modify last patch to only take effect if the slot certs are not publicly readable, and to not update the token cert list more than once
2002-03-01 21:43:57 +00:00
ian.mcgreer%sun.com
213696bc04
another fix for bug 125808, force update of cache after login/logout
2002-03-01 16:28:53 +00:00
relyea%netscape.com
ae01fe45e4
Changes to allow protected pin path to work in applications that code for it.
2002-02-26 00:28:50 +00:00
wtc%netscape.com
7d12a23186
Bugzilla bug 121523: checked in Kirk Erickson's session lock fix.
...
Modified Files:
lib/pk11wrap/pk11slot.c lib/softoken/pkcs11.c
lib/softoken/pkcs11i.h lib/softoken/pkcs11u.c
2002-02-05 23:41:36 +00:00
relyea%netscape.com
31218c1ff3
Bug 117978: accessor functions to all JCE keystore API to be implemented.
2002-02-03 03:37:26 +00:00
relyea%netscape.com
6aadda5c42
Fix PBE_Context failure by making sure CKM_PBA is it's own keygen type.
2002-01-26 01:20:50 +00:00
relyea%netscape.com
72e3dce42d
Function to return if any builtins have been loaded yet.
2002-01-23 04:41:25 +00:00
jpierre%netscape.com
472a0c1c53
Fix for 98068 - PR_CALLBACK OS/2 issues
2002-01-11 19:53:00 +00:00
relyea%netscape.com
8e7e1c2654
Set the trust order for a newly installed built-ins to 100
2002-01-10 01:01:09 +00:00
ian.mcgreer%sun.com
8b98f0af90
memory leak fixes
2002-01-08 15:37:42 +00:00
relyea%netscape.com
e27189dd1d
Land BOB_WORK_BRANCH unto the tip.
...
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
relyea%netscape.com
77fd99946d
1) fix warnings on AIX, HP, Linux, and Solaris.
...
2) Move private functions into private headers.
3) Sharpen the layer separation between NSS components, especially pkcs #12
and soft token.
4) Remove dead code.
2001-09-20 21:23:51 +00:00
nelsonb%netscape.com
2c971ab625
Detect Null pointer. Assert if null, else don't crash here. Bug 97887.
2001-09-06 00:49:39 +00:00
relyea%netscape.com
b551f36ebb
1) Add the necessary code so that AddModule functions again.
...
2) Add code to create secmod.db on the fly again.
3) Fix uninitialized structures so that we can switch to the fips token.
The results of this checkin should allow the fips tests to pass again.
2001-08-31 00:20:47 +00:00
mcgreer%netscape.com
9d98643622
fix for #92940 , PKCS#12 broken in FIPS mode. Force keygen to occur on token, added new PKCS#11 mechanisms to handle PKCS#12 integrity key generation.
2001-08-03 18:50:54 +00:00
relyea%netscape.com
ebc2ea6aae
Allow Ask always to work with tokens.
2001-07-06 19:00:12 +00:00
nelsonb%netscape.com
7108ab8829
Merge NSS 3.2.1 changes.
2001-04-11 22:45:40 +00:00
nelsonb%netscape.com
f8e2a2a948
Implementation of 5 DHE ciphersuites, client side only.
...
Contributed by Dr Stephen Henson <stephen.henson@gemplus.com>
2001-04-11 00:29:18 +00:00
relyea%netscape.com
bc28489209
Fix bug 69471 and bug 69472 : Memory leak in PK11_VerifyMechanisms and incorrectly
...
calling EnterSlotMonitor rather than ExitSlotMonitor on an error condition.
bob
2001-02-21 22:22:33 +00:00
relyea%netscape.com
6e2d9268f5
Add wrapper bindings for AES so S/MIME and SSL may implement their AES suites.
2001-02-21 19:52:12 +00:00
relyea%netscape.com
f1ffa04d9e
Bug 67068. Fix Crash in SECMOD_Shutdown. reviewed by wtc.
2001-02-06 00:11:24 +00:00
relyea%netscape.com
2c9a42201b
Add code to shutdown the PKCS #11 subsystem so NSS can be called to switch profiles.
2001-02-01 19:09:23 +00:00
larryh%netscape.com
351f30a205
Bugzilla: 64132. NSS lock instrumentation
2001-01-03 19:51:22 +00:00
wtc%netscape.com
8627427998
Bugzilla bug #55267 : checked in a workaround for a tight spin in
...
PK11_GetSlotList on 64-bit HP-UX.
2000-10-05 04:24:04 +00:00
relyea%netscape.com
448fea8c67
Add function for determining if we have root cert modules.
...
fix bug in internal root cert modules.
2000-09-28 17:40:48 +00:00
relyea%netscape.com
eebbb60194
Add code to allow Trusted root certs to come from an externally loaded
...
pkcs #11 module.
2000-09-06 22:05:57 +00:00
relyea%netscape.com
d43393b11b
reuse old key structures on a given token rather than building it up and
...
tearing it down every time.
2000-06-13 21:37:28 +00:00
relyea%netscape.com
d6dd1b2540
Return to using the thread safe version. The non-thread safe version can double free memory
2000-05-31 22:37:17 +00:00
relyea%netscape.com
0430e9e67e
Add SSL and TLS to the slotlist search functions
2000-05-16 17:37:10 +00:00
relyea%netscape.com
8c4b7edd1d
Initial NSS Open Source Checkin
2000-03-31 19:16:26 +00:00