Граф коммитов

2175 Коммитов

Автор SHA1 Сообщение Дата
ian.mcgreer%sun.com b73a1edc81 log more mechanisms and templates 2002-06-24 22:22:57 +00:00
relyea%netscape.com cbeed1cfd5 Copy the type value as well as the rest. 2002-06-24 21:57:27 +00:00
relyea%netscape.com 7cc9843630 More performance improvements for PK11ListCerts/ CERT_GetUserCertByUsage(). 2002-06-24 21:54:41 +00:00
nelsonb%netscape.com 071fe9ae9c Fix bug 135261. Create symbolic names for the values 2 and 3 for the
SSL_REQUIRE_CERTIFICATE option.  Value 2 has always been the default.
New Value 3 is appropriate for servers that want to re-request, but
still not require, client-auth from a client with whom an SSL session
is already established.
2002-06-22 01:40:32 +00:00
relyea%netscape.com 3c89da1564 Need to preserve non-modifiable trustbits. 2002-06-21 22:28:03 +00:00
relyea%netscape.com aa8dddaacb zero structure before we fill it in, not after 2002-06-21 20:25:49 +00:00
wtc%netscape.com 47b432c0f5 Bug 153380: TLS is enabled by default now. 2002-06-21 18:25:46 +00:00
javi%netscape.com b81e7cc522 Make the file C++ friendly. 2002-06-20 22:32:38 +00:00
relyea%netscape.com ffa0ecc514 Reduce the cost of decoding a certificate. 2002-06-20 18:53:16 +00:00
relyea%netscape.com d7a32bbce6 reduce the calls to get the login state as these calls seem to be pretty expensive
for some tokens.
2002-06-20 18:49:45 +00:00
relyea%netscape.com eb95452896 Patches to reduce the cost of getting attributes on certs or finding certs in lists. 2002-06-20 18:46:47 +00:00
ian.mcgreer%sun.com 48d6b949c1 bug 98926, PKCS#11 session logging 2002-06-19 18:32:57 +00:00
rangansen%netscape.com bff8c533ce exporting CERT_VerifyCertChain. r=relyea 2002-06-19 15:58:51 +00:00
ian.mcgreer%sun.com 4cf84d39dd missed part of last patch (bug 145322) 2002-06-19 15:26:55 +00:00
ian.mcgreer%sun.com e30639f9cd bug 145322, second patch, clean up pk11_saveContextHelper 2002-06-19 15:22:54 +00:00
ian.mcgreer%sun.com 607f12501a bug 145322, reduce the number of PKCS#11 sessions used in SSL connections, implement new function PK11_SaveContextAlloc
r=relyea
2002-06-19 15:21:37 +00:00
ian.mcgreer%sun.com 0992642b67 bug 150704, PK11_Finalize can crash because softoken does not implement C_XXXFinal correctly 2002-06-19 14:59:24 +00:00
bishakhabanerjee%netscape.com 19dbdc5df8 correcting init_mcom function to enable "nssqa" to run at Netscape - 150752 2002-06-18 21:45:31 +00:00
relyea%netscape.com 6f356a0f36 1) Map flags both coming and going.
2) Finish transaction of the target database not the source database.
2002-06-18 16:41:41 +00:00
wtc%netscape.com 29df488eaa Bug 151940: SEC_PKCS12DecoderVerify should call SEC_ASN1DecoderFinish first
to detect insufficient input data error.
2002-06-18 05:00:39 +00:00
relyea%netscape.com 27153b6afb Standardize the open flags as 'enums' when using multiaccess databases, no matter
if we are using PR_ versions of the flags or O_ versions of the flags.
2002-06-17 18:46:27 +00:00
relyea%netscape.com e2f5a0ac1f check version of the existing DB, not the updatedb. 2002-06-14 17:29:56 +00:00
relyea%netscape.com d31340924d Add transactions to the database update portion of the code. 2002-06-13 23:25:37 +00:00
relyea%netscape.com 3839be90f6 Update cert handle on token insertion/removal. 2002-06-13 21:43:30 +00:00
relyea%netscape.com e84f17e0ea Add series to keep track of object handle value validity. 2002-06-13 21:42:41 +00:00
relyea%netscape.com b7167f5cba Reset the cert cache and clobber cert handles on token insertion an removal 2002-06-13 21:40:43 +00:00
jpierre%netscape.com 8739d6f231 Add missing AOL root CA certs 2002-06-13 10:14:50 +00:00
relyea%netscape.com 696026ef88 When checking NeedInit status, go back and check the token in case the token
has been initialized offline.
2002-06-11 23:33:25 +00:00
jpierre%netscape.com b473a8e33d Update for root certs - bug 139874 2002-06-11 23:16:25 +00:00
kirk.erickson%sun.com 80cae9e038 Fixed indentation caught by Wan-Teh (66606). 2002-06-11 22:41:45 +00:00
kirk.erickson%sun.com 6e3d00368d Resolves 66606. Added -O (enable OCSP checking). 2002-06-11 16:29:28 +00:00
ddrinan%netscape.com c87736a06b Bug 150708. Incorrect keysize when finding bulk alg. r=wtc. 2002-06-10 22:00:32 +00:00
relyea%netscape.com bb528345ff Return public and private keys in the order specified by the PKCS #11 spec. 2002-06-10 20:33:31 +00:00
jpierre%netscape.com 165951e036 Fix for 141256 - rewrite OCSP HTTP download code to fix error handling 2002-06-06 01:05:40 +00:00
jpierre%netscape.com 42c9d8d43b Fix for 139874 - Inject Latest CA Root Certs 2002-06-06 00:12:56 +00:00
thayes%netscape.com 9355438f45 Reserve OID (netscape_name_components 2) - see 605437 2002-06-04 21:46:05 +00:00
bishakhabanerjee%netscape.com 76c8329a07 to build the new NSS tests.. bugzilla bug 144316 2002-06-03 17:16:57 +00:00
wtc%netscape.com c99a93829c Backed out the previous checkin, which is not being used and triggers
a bug in gmake 3.76.1 with MKS shell on Windows.
2002-06-01 04:31:44 +00:00
wtc%netscape.com a1598af613 Use $(DLL_SUFFIX) instead of ${DLL_SUFFIX}. 2002-06-01 04:25:38 +00:00
nicolson%netscape.com fa1fbd5d69 Fix 147794: PK11_ImportDERPrivateKeyInfoAndReturnKey frees the private key incorrectly. 2002-06-01 00:43:46 +00:00
rangansen%netscape.com b355617820 Fix to ensure change password on db is commited - using rv == SECSuccess would actually abort it.
r = wtc
2002-06-01 00:37:00 +00:00
wtc%netscape.com 6a49741d7d This is a test. I changed Revision and Date to bogus values and want to
see what actually got checked in.
2002-05-30 02:08:07 +00:00
wtc%netscape.com 118670f573 Import NSPR 4.2 and DBM 1.61. 2002-05-30 00:36:48 +00:00
ian.mcgreer%sun.com 7ad9c0cc44 bug 136701, certutil should use PK11_ListCerts 2002-05-29 18:19:33 +00:00
kirk.erickson%sun.com 9ef935cd78 Fixed OCSP typo. 2002-05-28 18:26:37 +00:00
wtc%netscape.com a0715a5bd0 Bug 142575: use the PRIVATE keyword for the /EXPORT linker option. 2002-05-25 16:00:55 +00:00
wtc%netscape.com 278f8fcbfa Bug 142575: use the /EXPORT linker option on the command line.
Modified files: nssinit.c config.mk
2002-05-25 06:52:19 +00:00
wtc%netscape.com c82e51fc58 Bug 142575: a better fix. 2002-05-25 01:02:39 +00:00
wtc%netscape.com 54db8b9c90 Bug 142575: added function forwarder for 'mktemp' for "bug compatibility". 2002-05-24 21:00:55 +00:00
javi%netscape.com d19ba0f868 Make pkcs12.h C++ friendly. 2002-05-24 20:11:29 +00:00
wtc%netscape.com 00ab5fdbae Back out the previous checkin. It broken the cmd/certcgi build. 2002-05-24 14:58:02 +00:00
javi%netscape.com 69088764da Add macros to make header file C++ friendly. 2002-05-24 00:53:48 +00:00
wtc%netscape.com b1a997971e Bug 142575: on Windows added mktemp (which simply calls _mktemp in the C
run-time library) to be backward compatible with the bug that mktemp was
accidentally exported from the nss3.dll in NSS 3.2.x and 3.3.x.
2002-05-23 22:28:50 +00:00
kirk.erickson%sun.com fa04da4ff4 Resolves bug 90070 (now exiting with PK12UERR_PK11GETSLOT 13). 2002-05-23 22:21:42 +00:00
relyea%netscape.com a37f083171 Refresh token cache after login on tokens that need to log in before they
could read their certs.
2002-05-22 23:13:05 +00:00
relyea%netscape.com dccf0f20f4 Close our peer database handles because some platforms (Mac) do bad things
if you hold two berkelydb handles open to the same database in the same process.
(actually a lot of platforms could cause problems, the Mac version of dbm (1.85)
just does the bad things right away).
2002-05-22 21:47:23 +00:00
relyea%netscape.com 482a55e955 Back out the change on Module destruction. 2002-05-22 00:25:48 +00:00
relyea%netscape.com dc0b0c243c Don't crash if url is specified, but the crl is broken 2002-05-21 21:26:52 +00:00
relyea%netscape.com 91abc91169 Missing component when deleting should not be fatal 2002-05-21 21:26:14 +00:00
relyea%netscape.com 3b707d47e7 Fix spelling error.
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
relyea%netscape.com c936511eb9 Fix spelling error. 2002-05-21 21:23:33 +00:00
relyea%netscape.com fe96b95117 Clear out certs associated with tokens that have just been taken off the trust domain. 2002-05-21 21:22:55 +00:00
jpierre%netscape.com d5de75b62b Fix for bug 137645 - cached certificate does not get its nickname updated after P12 import of matching user certificate 2002-05-20 23:21:39 +00:00
ian.mcgreer%sun.com dc613b61ee bug 144309, return value of STAN_GetCERTCertificate not checked
r=wtc
2002-05-20 18:05:11 +00:00
ian.mcgreer%sun.com b60654eafd fix bustage caused by generated file discrepancies 2002-05-20 16:01:21 +00:00
ian.mcgreer%sun.com 8fca6832bc need to match ckapi.perl with generated target nssck.api, which was modified 2002-05-20 14:38:48 +00:00
wtc%netscape.com 5b50af192d Bugzilla bug 145178: added OpenBSD build support. The patch is contributed
by Christopher Seawood <seawood@netscape.com>.
Modified Files: coreconf/config.mk sslmutex.c sslmutex.h
Added Files: coreconf/OpenBSD.mk
2002-05-18 03:24:17 +00:00
wtc%netscape.com a1bc754db7 Bugzilla bug 131171: added HP-UX IPF (ia64) support. Portions of the patch
(attachment 84127) were contributed by Jim Dunn <jdunn@netscape.com>.
2002-05-18 00:52:11 +00:00
wtc%netscape.com c8518d87b7 Bugzilla bug 145128: fixed a typo error in sec_pkcs5_rc4(). Also simplfied
two other similar constructs.  r=relyea.
2002-05-17 21:29:27 +00:00
ian.mcgreer%sun.com 787847bf44 bug 144448, incorrect use of ## operator in creating CKFW entry points 2002-05-17 18:57:34 +00:00
relyea%netscape.com f83a0c6851 Fix Linux and Solaris builds 2002-05-17 00:39:26 +00:00
relyea%netscape.com ff81ec8d87 The tip is now NSS 3.6, make sure new builds properly indicate this 2002-05-16 22:12:37 +00:00
relyea%netscape.com 2491c84161 Add PK11_GetPBEIV to exported symbol list. 2002-05-16 22:12:10 +00:00
relyea%netscape.com b9c9b409d6 Add function to get the PBEIV. 2002-05-16 22:06:19 +00:00
relyea%netscape.com 9e71058dbf Add support to turn on or off optimizations based on parameters to NSS_Init functions 2002-05-16 22:05:17 +00:00
relyea%netscape.com 7828ad6ad0 Make a single softoken which works for both servers and clients depending on configuration.
Add the _PAD functions to the internal database token.
2002-05-16 22:04:12 +00:00
relyea%netscape.com 81db56051e Argh. I thought I had compiled this! fixe compile errors. 2002-05-16 20:48:27 +00:00
relyea%netscape.com ad57ee44a1 Add Transactions (still need to add transactions on database upgrade).
Make trust objects their own objects to reduce a couple of unnecessary cert decodes.
2002-05-16 20:39:04 +00:00
wtc%netscape.com ec52ca8b50 Bugzilla bug 138532: use pipes instead of semaphores for NetBSD, which does
not have semaphore.h.  Thanks to Chris Seawood <seawood@netscape.com> for
the patch.  Modified files: sslmutex.h sslmutex.c
2002-05-16 13:36:03 +00:00
wtc%netscape.com 272f7f9153 Fixed build breakage on BeOS -- made the ifdef match the one in sslsnce.c. 2002-05-16 05:32:30 +00:00
jpierre%netscape.com 338f2f561a Fix for 141256 - correct HTTP parsing for OCSP in NSS 2002-05-15 23:59:40 +00:00
relyea%netscape.com 6f20bf6c21 bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs. 2002-05-14 23:16:16 +00:00
wtc%netscape.com 8e09a8cca3 Bugzilla bug 135069: SEC_PKCS12DestroyExportContext should free the slot
reference allocated in SEC_PKCS12CreateExportContext. r=relyea,mcgreer.
2002-05-13 17:22:46 +00:00
wtc%netscape.com 0c57191723 Bugzilla bug 135824: fixed slot reference leaks in signtool and removed
a faulty attempt to set user trust.  r=relyea,mcgreer.
Modified files: certgen.c util.c
2002-05-13 17:08:20 +00:00
wtc%netscape.com f6f0339d00 Bugzilla bug 135052: more cleanup in SEC_PKCS12DecoderStart. r=relyea. 2002-05-10 23:10:06 +00:00
jpierre%netscape.com e1a3c306e8 Fix for bug 142868 - CA certificates are imported with NULL nicknames . 2002-05-10 20:21:38 +00:00
relyea%netscape.com 94a587472a Add function to determine if it's safe to delete the internal module. 2002-05-10 18:36:18 +00:00
relyea%netscape.com fdca53cf70 Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it. 2002-05-10 18:13:44 +00:00
relyea%netscape.com 3ee0c3c996 Add new error code for trying to all previously deleted modules which have not yet been freed. 2002-05-10 18:12:39 +00:00
relyea%netscape.com 0d88474fba Allow both FIPS and non-FIPS tokens to be initialized and active at the same time. 2002-05-10 18:11:37 +00:00
relyea%netscape.com 610b845a52 When we force, we should preserve the NULL nickname semantics. 2002-05-10 18:10:26 +00:00
wtc%netscape.com a8cdaf3aca Bugzilla bug 135821: fixed the internal slot reference leak in
PK11_WrapPrivKey.  r=relyea.
2002-05-09 23:34:24 +00:00
wtc%netscape.com 9c38dd9727 Bugzilla bug 135809: fixed the slot reference leaks in PBE_CreateContext
and SEC_PKCS5GetIV.  r=relyea.
2002-05-09 23:21:16 +00:00
wtc%netscape.com 0daca2313b Bugzilla bug 135818: fixed internal slot reference leaks in
PK11_VerifySlotMechanisms and PK11_InitToken.  r=relyea.
2002-05-09 23:18:15 +00:00
wtc%netscape.com 363fb30239 Bugzilla bug 135826: fixed the slot reference leaks. 2002-05-09 23:01:21 +00:00
ian.mcgreer%sun.com 6804ba674f bug 135808, STAN_GetDefaultCryptoToken appears to leak a slot reference, but there are no callers of it. Removing function.
r=wtc
2002-05-09 22:42:23 +00:00
wtc%netscape.com 894efe87d2 Bugzilla bug 135334: free the internal key slot reference when we are done. 2002-05-09 21:14:36 +00:00
wtc%netscape.com 43f8939e7c Bugzilla bug 135058: free nickCopy on error returns in
PK11_FindCertsFromNickname.  r=mcgreer.
2002-05-09 20:01:18 +00:00
wtc%netscape.com 0a6086505a Bugzilla bug 136279: Return oldpath only if it is different from path.
Avoid an unnecessary call to SECMOD_HasRootCerts in nss_FindExternalRoot.
2002-05-07 23:35:22 +00:00
relyea%netscape.com 56f8e3b5e8 Automatically create a NULL email profile for certs with email addresses which
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com 3a91379d33 bug 141936, crash when NULL nickname entry is stored in temp store
r=jpierre
2002-05-07 20:31:59 +00:00
ian.mcgreer%sun.com d250a3e38f bug 142175, PK11_ListCerts regressions -- handle PKCS#11 incompatibilites with serial numbers, and fix trust collection. 2002-05-07 14:58:12 +00:00
jpierre%netscape.com 41ba83e283 Fix for 142658 - fix certutil crash with NULL nickname 2002-05-06 23:10:40 +00:00
wtc%netscape.com 300f9cadfe Bugzilla bug 136279: fixed bugs where 'path' and 'oldpath' were passed
to string functions before they were null-terminated.  Added a comment
to explain what 'oldpath' is for.
2002-05-03 20:59:50 +00:00
ian.mcgreer%sun.com f0d29104b1 bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate. 2002-05-02 19:00:13 +00:00
relyea%netscape.com 7143d6f89c Fix the RSA key check to correctly accept keys with p < q. 2002-05-02 17:39:13 +00:00
jpierre%netscape.com e7ee105522 Fix for 136279 - initialize NSS in a way compatible with < 3.4 versions of NSS 2002-05-01 01:04:41 +00:00
wtc%netscape.com e4f5bd3810 Bugzilla bug 127062: use PR_MSG_PEEK instead of MSG_PEEK. 2002-05-01 00:21:50 +00:00
wtc%netscape.com 10bae1a1e3 Bugzilla bug 131057: define PORT_Strdup as a function that calls PORT_Alloc.
Modified files:
	lib/ckfw/nsprstub.c lib/fortcrypt/swfort/pkcs11/stub.c
	lib/nss/nss.def lib/util/secport.c lib/util/secport.h
2002-05-01 00:06:39 +00:00
wtc%netscape.com 4747c98947 Whitespace change. 2002-04-30 00:11:19 +00:00
relyea%netscape.com cec43732fb Use NewTempCert and AddTempCert when importing because the cert may already exist
in the cache.
2002-04-29 23:54:07 +00:00
wtc%netscape.com 35e9736426 Added pkibase.c to the project. 2002-04-26 23:29:19 +00:00
wtc%netscape.com 787be44323 Needed a (char *) cast for slotInfo.manufacturerID because it is an array
of "unsigned" chars.  Mac's compiler complains about that.
2002-04-26 23:05:40 +00:00
wtc%netscape.com 4841e2949f Removed devobject.c from the project. That file was removed. 2002-04-26 22:52:07 +00:00
wtc%netscape.com 2762eaebca Need to define SHLIB_SUFFIX for lib/softoken/dbinit.c. 2002-04-26 22:42:15 +00:00
relyea%netscape.com 3d3a200209 return error when incomplete shutdown has been detected. 2002-04-26 22:36:07 +00:00
ian.mcgreer%sun.com cdae9ed5a1 When doing cert traversals, create the certs in full as they are found. This avoids thrashing the softoken's object cache when the database has a large number of certs. 2002-04-26 14:34:05 +00:00
ian.mcgreer%sun.com 74b86448f7 fix broken HPUX builds 2002-04-26 12:59:06 +00:00
relyea%netscape.com 600cb240a3 Add code to update nickname and 'CKA_ID' from set attribute calls. This allows
us to add a nickname to a cert after we import it from pkcs #12.
2002-04-26 01:44:33 +00:00
relyea%netscape.com fbb0134208 Write the nickname entry as well when adding a nickname to a bug. 2002-04-26 01:09:21 +00:00
relyea%netscape.com 2cd6213ca5 Detect Active Card presents and disable PROTECTED_PIN_PATH login when found. 2002-04-25 21:24:47 +00:00
wtc%netscape.com d3e14fdce2 Deleted code that was made obsolete by the previous revision. 2002-04-25 21:10:09 +00:00
relyea%netscape.com 1abdbba5a8 Don't let activeCards set the Protect_Auth bit because they weren't intending to
to begin with.
2002-04-25 20:57:06 +00:00
ian.mcgreer%sun.com 44d76f3678 if a cert already exists, use C_SetAttributeValue to change its mutable attributes during import (instead of trying to recreate it) 2002-04-25 20:49:49 +00:00
ian.mcgreer%sun.com 05bc7f4136 bug 138626, remove deleted cert from cache even if references still exist 2002-04-25 19:37:30 +00:00
ian.mcgreer%sun.com 2e14215952 reorganize token cache so that cache entries for imported objects are created from the token, not from the user-supplied template 2002-04-25 19:33:47 +00:00
relyea%netscape.com b02d968215 NSS 3.4 has branch, that makes the tip at least NSS 3.5 2002-04-25 18:51:45 +00:00
relyea%netscape.com 0008ea5125 Don't set the Token value before fetching CRL attributes. This code is fetching
attributes from a known CRL, not looking up new attributes (I'm pretty sure that
CVS apropos would show I checked in the previously wrong code).

bob
2002-04-25 18:33:45 +00:00
sonja.mirtitsch%sun.com adb8e67a58 trying a version that can test tip as default for tinderbox and 341
as default for nightly QA
2002-04-25 01:04:10 +00:00
relyea%netscape.com 8747bf72ad Don't crash if our cache entry is not found. 2002-04-25 00:45:42 +00:00
relyea%netscape.com 35695b7987 Turn off caching for non-hardware tokens for now until we fix some of our
tokens which can be updated out-of-band to use the proper 'removable token'
semantics.
2002-04-25 00:25:58 +00:00
relyea%netscape.com df120eb43d Don't crash if we don't find the profile (and thus don't have a slot to free). 2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com 217231840b This is a real corner case. If a search is done by issuer/serial, and the returned cert was in the cache, need to see if the cert's slot was removed. If so, destroy the cert and retry the search on the present tokens. 2002-04-24 19:39:41 +00:00
relyea%netscape.com 23724ed2c8 Don't crash when getting a single user cert, but old certs are in the database
with the same subject, but no keys.
2002-04-24 18:29:04 +00:00
relyea%netscape.com ac5aeb9932 Look up both DER encoded serial numbers (PKCS #11 spec), and decode serial
numbers (Old NSS) when looking up certs by issuer and SN.
2002-04-24 18:27:17 +00:00
relyea%netscape.com 71e35b07b7 Authenticate to tokens before looking up user certs. 2002-04-24 18:25:48 +00:00
thayes%netscape.com df2c867541 Reserved Netscape extension (NETSCAPE 1 18) 2002-04-23 23:48:20 +00:00
ian.mcgreer%sun.com 9221a5bd63 fix shutdown leaks 2002-04-23 17:22:13 +00:00
ian.mcgreer%sun.com caad76ef9c avoid use of iterator 2002-04-22 20:44:07 +00:00
ian.mcgreer%sun.com f9f60b9735 NewTemp has to be matched with AddTempCertToPerm 2002-04-22 20:27:52 +00:00
relyea%netscape.com ce09346d8c Token and cert processing fixes:
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
   2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
   3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
   4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
   5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com 9596c39faa file is no longer part of build (functionality in devtoken.c) 2002-04-22 18:28:30 +00:00
ian.mcgreer%sun.com a4591dfe82 overwrite old entry during import, so that changing trust works correctly 2002-04-22 15:21:06 +00:00
ian.mcgreer%sun.com abac680269 fix bugs in cert import with smart card cache 2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com a7ab27bc63 re-sync the trust domain cache with token insertion/removal 2002-04-19 23:06:44 +00:00
ian.mcgreer%sun.com 36e1d960b7 * make sure the token cache returns failure in overflow case
* change internal module trust order again, builtins uses 100, and internal module must come first
2002-04-19 19:30:12 +00:00
ian.mcgreer%sun.com 3a62ba7fdd try again, the default is 50 so the internal module must be higher 2002-04-19 19:19:33 +00:00
ian.mcgreer%sun.com 7061750a28 make sure the internal module defaults to trust order > 50 2002-04-19 19:01:45 +00:00
ian.mcgreer%sun.com 7c6de6462d improve synchronization between the token state and token cache operations 2002-04-19 17:32:22 +00:00
ian.mcgreer%sun.com a4d9b8b514 Only fall back to email search if the "nickname" has an @ character. This is because email searches will not go through the cache, so should be avoided if possible. 2002-04-19 16:22:31 +00:00