ian.mcgreer%sun.com
b73a1edc81
log more mechanisms and templates
2002-06-24 22:22:57 +00:00
relyea%netscape.com
cbeed1cfd5
Copy the type value as well as the rest.
2002-06-24 21:57:27 +00:00
relyea%netscape.com
7cc9843630
More performance improvements for PK11ListCerts/ CERT_GetUserCertByUsage().
2002-06-24 21:54:41 +00:00
nelsonb%netscape.com
071fe9ae9c
Fix bug 135261. Create symbolic names for the values 2 and 3 for the
...
SSL_REQUIRE_CERTIFICATE option. Value 2 has always been the default.
New Value 3 is appropriate for servers that want to re-request, but
still not require, client-auth from a client with whom an SSL session
is already established.
2002-06-22 01:40:32 +00:00
relyea%netscape.com
3c89da1564
Need to preserve non-modifiable trustbits.
2002-06-21 22:28:03 +00:00
relyea%netscape.com
aa8dddaacb
zero structure before we fill it in, not after
2002-06-21 20:25:49 +00:00
wtc%netscape.com
47b432c0f5
Bug 153380: TLS is enabled by default now.
2002-06-21 18:25:46 +00:00
javi%netscape.com
b81e7cc522
Make the file C++ friendly.
2002-06-20 22:32:38 +00:00
relyea%netscape.com
ffa0ecc514
Reduce the cost of decoding a certificate.
2002-06-20 18:53:16 +00:00
relyea%netscape.com
d7a32bbce6
reduce the calls to get the login state as these calls seem to be pretty expensive
...
for some tokens.
2002-06-20 18:49:45 +00:00
relyea%netscape.com
eb95452896
Patches to reduce the cost of getting attributes on certs or finding certs in lists.
2002-06-20 18:46:47 +00:00
ian.mcgreer%sun.com
48d6b949c1
bug 98926, PKCS#11 session logging
2002-06-19 18:32:57 +00:00
rangansen%netscape.com
bff8c533ce
exporting CERT_VerifyCertChain. r=relyea
2002-06-19 15:58:51 +00:00
ian.mcgreer%sun.com
4cf84d39dd
missed part of last patch (bug 145322)
2002-06-19 15:26:55 +00:00
ian.mcgreer%sun.com
e30639f9cd
bug 145322, second patch, clean up pk11_saveContextHelper
2002-06-19 15:22:54 +00:00
ian.mcgreer%sun.com
607f12501a
bug 145322, reduce the number of PKCS#11 sessions used in SSL connections, implement new function PK11_SaveContextAlloc
...
r=relyea
2002-06-19 15:21:37 +00:00
ian.mcgreer%sun.com
0992642b67
bug 150704, PK11_Finalize can crash because softoken does not implement C_XXXFinal correctly
2002-06-19 14:59:24 +00:00
bishakhabanerjee%netscape.com
19dbdc5df8
correcting init_mcom function to enable "nssqa" to run at Netscape - 150752
2002-06-18 21:45:31 +00:00
relyea%netscape.com
6f356a0f36
1) Map flags both coming and going.
...
2) Finish transaction of the target database not the source database.
2002-06-18 16:41:41 +00:00
wtc%netscape.com
29df488eaa
Bug 151940: SEC_PKCS12DecoderVerify should call SEC_ASN1DecoderFinish first
...
to detect insufficient input data error.
2002-06-18 05:00:39 +00:00
relyea%netscape.com
27153b6afb
Standardize the open flags as 'enums' when using multiaccess databases, no matter
...
if we are using PR_ versions of the flags or O_ versions of the flags.
2002-06-17 18:46:27 +00:00
relyea%netscape.com
e2f5a0ac1f
check version of the existing DB, not the updatedb.
2002-06-14 17:29:56 +00:00
relyea%netscape.com
d31340924d
Add transactions to the database update portion of the code.
2002-06-13 23:25:37 +00:00
relyea%netscape.com
3839be90f6
Update cert handle on token insertion/removal.
2002-06-13 21:43:30 +00:00
relyea%netscape.com
e84f17e0ea
Add series to keep track of object handle value validity.
2002-06-13 21:42:41 +00:00
relyea%netscape.com
b7167f5cba
Reset the cert cache and clobber cert handles on token insertion an removal
2002-06-13 21:40:43 +00:00
jpierre%netscape.com
8739d6f231
Add missing AOL root CA certs
2002-06-13 10:14:50 +00:00
relyea%netscape.com
696026ef88
When checking NeedInit status, go back and check the token in case the token
...
has been initialized offline.
2002-06-11 23:33:25 +00:00
jpierre%netscape.com
b473a8e33d
Update for root certs - bug 139874
2002-06-11 23:16:25 +00:00
kirk.erickson%sun.com
80cae9e038
Fixed indentation caught by Wan-Teh (66606).
2002-06-11 22:41:45 +00:00
kirk.erickson%sun.com
6e3d00368d
Resolves 66606. Added -O (enable OCSP checking).
2002-06-11 16:29:28 +00:00
ddrinan%netscape.com
c87736a06b
Bug 150708. Incorrect keysize when finding bulk alg. r=wtc.
2002-06-10 22:00:32 +00:00
relyea%netscape.com
bb528345ff
Return public and private keys in the order specified by the PKCS #11 spec.
2002-06-10 20:33:31 +00:00
jpierre%netscape.com
165951e036
Fix for 141256 - rewrite OCSP HTTP download code to fix error handling
2002-06-06 01:05:40 +00:00
jpierre%netscape.com
42c9d8d43b
Fix for 139874 - Inject Latest CA Root Certs
2002-06-06 00:12:56 +00:00
thayes%netscape.com
9355438f45
Reserve OID (netscape_name_components 2) - see 605437
2002-06-04 21:46:05 +00:00
bishakhabanerjee%netscape.com
76c8329a07
to build the new NSS tests.. bugzilla bug 144316
2002-06-03 17:16:57 +00:00
wtc%netscape.com
c99a93829c
Backed out the previous checkin, which is not being used and triggers
...
a bug in gmake 3.76.1 with MKS shell on Windows.
2002-06-01 04:31:44 +00:00
wtc%netscape.com
a1598af613
Use $(DLL_SUFFIX) instead of ${DLL_SUFFIX}.
2002-06-01 04:25:38 +00:00
nicolson%netscape.com
fa1fbd5d69
Fix 147794: PK11_ImportDERPrivateKeyInfoAndReturnKey frees the private key incorrectly.
2002-06-01 00:43:46 +00:00
rangansen%netscape.com
b355617820
Fix to ensure change password on db is commited - using rv == SECSuccess would actually abort it.
...
r = wtc
2002-06-01 00:37:00 +00:00
wtc%netscape.com
6a49741d7d
This is a test. I changed Revision and Date to bogus values and want to
...
see what actually got checked in.
2002-05-30 02:08:07 +00:00
wtc%netscape.com
118670f573
Import NSPR 4.2 and DBM 1.61.
2002-05-30 00:36:48 +00:00
ian.mcgreer%sun.com
7ad9c0cc44
bug 136701, certutil should use PK11_ListCerts
2002-05-29 18:19:33 +00:00
kirk.erickson%sun.com
9ef935cd78
Fixed OCSP typo.
2002-05-28 18:26:37 +00:00
wtc%netscape.com
a0715a5bd0
Bug 142575: use the PRIVATE keyword for the /EXPORT linker option.
2002-05-25 16:00:55 +00:00
wtc%netscape.com
278f8fcbfa
Bug 142575: use the /EXPORT linker option on the command line.
...
Modified files: nssinit.c config.mk
2002-05-25 06:52:19 +00:00
wtc%netscape.com
c82e51fc58
Bug 142575: a better fix.
2002-05-25 01:02:39 +00:00
wtc%netscape.com
54db8b9c90
Bug 142575: added function forwarder for 'mktemp' for "bug compatibility".
2002-05-24 21:00:55 +00:00
javi%netscape.com
d19ba0f868
Make pkcs12.h C++ friendly.
2002-05-24 20:11:29 +00:00
wtc%netscape.com
00ab5fdbae
Back out the previous checkin. It broken the cmd/certcgi build.
2002-05-24 14:58:02 +00:00
javi%netscape.com
69088764da
Add macros to make header file C++ friendly.
2002-05-24 00:53:48 +00:00
wtc%netscape.com
b1a997971e
Bug 142575: on Windows added mktemp (which simply calls _mktemp in the C
...
run-time library) to be backward compatible with the bug that mktemp was
accidentally exported from the nss3.dll in NSS 3.2.x and 3.3.x.
2002-05-23 22:28:50 +00:00
kirk.erickson%sun.com
fa04da4ff4
Resolves bug 90070 (now exiting with PK12UERR_PK11GETSLOT 13).
2002-05-23 22:21:42 +00:00
relyea%netscape.com
a37f083171
Refresh token cache after login on tokens that need to log in before they
...
could read their certs.
2002-05-22 23:13:05 +00:00
relyea%netscape.com
dccf0f20f4
Close our peer database handles because some platforms (Mac) do bad things
...
if you hold two berkelydb handles open to the same database in the same process.
(actually a lot of platforms could cause problems, the Mac version of dbm (1.85)
just does the bad things right away).
2002-05-22 21:47:23 +00:00
relyea%netscape.com
482a55e955
Back out the change on Module destruction.
2002-05-22 00:25:48 +00:00
relyea%netscape.com
dc0b0c243c
Don't crash if url is specified, but the crl is broken
2002-05-21 21:26:52 +00:00
relyea%netscape.com
91abc91169
Missing component when deleting should not be fatal
2002-05-21 21:26:14 +00:00
relyea%netscape.com
3b707d47e7
Fix spelling error.
...
Clear out certs from the cache before the token goes away.
2002-05-21 21:24:35 +00:00
relyea%netscape.com
c936511eb9
Fix spelling error.
2002-05-21 21:23:33 +00:00
relyea%netscape.com
fe96b95117
Clear out certs associated with tokens that have just been taken off the trust domain.
2002-05-21 21:22:55 +00:00
jpierre%netscape.com
d5de75b62b
Fix for bug 137645 - cached certificate does not get its nickname updated after P12 import of matching user certificate
2002-05-20 23:21:39 +00:00
ian.mcgreer%sun.com
dc613b61ee
bug 144309, return value of STAN_GetCERTCertificate not checked
...
r=wtc
2002-05-20 18:05:11 +00:00
ian.mcgreer%sun.com
b60654eafd
fix bustage caused by generated file discrepancies
2002-05-20 16:01:21 +00:00
ian.mcgreer%sun.com
8fca6832bc
need to match ckapi.perl with generated target nssck.api, which was modified
2002-05-20 14:38:48 +00:00
wtc%netscape.com
5b50af192d
Bugzilla bug 145178: added OpenBSD build support. The patch is contributed
...
by Christopher Seawood <seawood@netscape.com>.
Modified Files: coreconf/config.mk sslmutex.c sslmutex.h
Added Files: coreconf/OpenBSD.mk
2002-05-18 03:24:17 +00:00
wtc%netscape.com
a1bc754db7
Bugzilla bug 131171: added HP-UX IPF (ia64) support. Portions of the patch
...
(attachment 84127) were contributed by Jim Dunn <jdunn@netscape.com>.
2002-05-18 00:52:11 +00:00
wtc%netscape.com
c8518d87b7
Bugzilla bug 145128: fixed a typo error in sec_pkcs5_rc4(). Also simplfied
...
two other similar constructs. r=relyea.
2002-05-17 21:29:27 +00:00
ian.mcgreer%sun.com
787847bf44
bug 144448, incorrect use of ## operator in creating CKFW entry points
2002-05-17 18:57:34 +00:00
relyea%netscape.com
f83a0c6851
Fix Linux and Solaris builds
2002-05-17 00:39:26 +00:00
relyea%netscape.com
ff81ec8d87
The tip is now NSS 3.6, make sure new builds properly indicate this
2002-05-16 22:12:37 +00:00
relyea%netscape.com
2491c84161
Add PK11_GetPBEIV to exported symbol list.
2002-05-16 22:12:10 +00:00
relyea%netscape.com
b9c9b409d6
Add function to get the PBEIV.
2002-05-16 22:06:19 +00:00
relyea%netscape.com
9e71058dbf
Add support to turn on or off optimizations based on parameters to NSS_Init functions
2002-05-16 22:05:17 +00:00
relyea%netscape.com
7828ad6ad0
Make a single softoken which works for both servers and clients depending on configuration.
...
Add the _PAD functions to the internal database token.
2002-05-16 22:04:12 +00:00
relyea%netscape.com
81db56051e
Argh. I thought I had compiled this! fixe compile errors.
2002-05-16 20:48:27 +00:00
relyea%netscape.com
ad57ee44a1
Add Transactions (still need to add transactions on database upgrade).
...
Make trust objects their own objects to reduce a couple of unnecessary cert decodes.
2002-05-16 20:39:04 +00:00
wtc%netscape.com
ec52ca8b50
Bugzilla bug 138532: use pipes instead of semaphores for NetBSD, which does
...
not have semaphore.h. Thanks to Chris Seawood <seawood@netscape.com> for
the patch. Modified files: sslmutex.h sslmutex.c
2002-05-16 13:36:03 +00:00
wtc%netscape.com
272f7f9153
Fixed build breakage on BeOS -- made the ifdef match the one in sslsnce.c.
2002-05-16 05:32:30 +00:00
jpierre%netscape.com
338f2f561a
Fix for 141256 - correct HTTP parsing for OCSP in NSS
2002-05-15 23:59:40 +00:00
relyea%netscape.com
6f20bf6c21
bug 133397. Move AddPermModule() inside the previously empty if statement where it belongs.
2002-05-14 23:16:16 +00:00
wtc%netscape.com
8e09a8cca3
Bugzilla bug 135069: SEC_PKCS12DestroyExportContext should free the slot
...
reference allocated in SEC_PKCS12CreateExportContext. r=relyea,mcgreer.
2002-05-13 17:22:46 +00:00
wtc%netscape.com
0c57191723
Bugzilla bug 135824: fixed slot reference leaks in signtool and removed
...
a faulty attempt to set user trust. r=relyea,mcgreer.
Modified files: certgen.c util.c
2002-05-13 17:08:20 +00:00
wtc%netscape.com
f6f0339d00
Bugzilla bug 135052: more cleanup in SEC_PKCS12DecoderStart. r=relyea.
2002-05-10 23:10:06 +00:00
jpierre%netscape.com
e1a3c306e8
Fix for bug 142868 - CA certificates are imported with NULL nicknames .
2002-05-10 20:21:38 +00:00
relyea%netscape.com
94a587472a
Add function to determine if it's safe to delete the internal module.
2002-05-10 18:36:18 +00:00
relyea%netscape.com
fdca53cf70
Detect when we have a previously deleted internal module which has not yet been freed, and don't try to switch to it.
2002-05-10 18:13:44 +00:00
relyea%netscape.com
3ee0c3c996
Add new error code for trying to all previously deleted modules which have not yet been freed.
2002-05-10 18:12:39 +00:00
relyea%netscape.com
0d88474fba
Allow both FIPS and non-FIPS tokens to be initialized and active at the same time.
2002-05-10 18:11:37 +00:00
relyea%netscape.com
610b845a52
When we force, we should preserve the NULL nickname semantics.
2002-05-10 18:10:26 +00:00
wtc%netscape.com
a8cdaf3aca
Bugzilla bug 135821: fixed the internal slot reference leak in
...
PK11_WrapPrivKey. r=relyea.
2002-05-09 23:34:24 +00:00
wtc%netscape.com
9c38dd9727
Bugzilla bug 135809: fixed the slot reference leaks in PBE_CreateContext
...
and SEC_PKCS5GetIV. r=relyea.
2002-05-09 23:21:16 +00:00
wtc%netscape.com
0daca2313b
Bugzilla bug 135818: fixed internal slot reference leaks in
...
PK11_VerifySlotMechanisms and PK11_InitToken. r=relyea.
2002-05-09 23:18:15 +00:00
wtc%netscape.com
363fb30239
Bugzilla bug 135826: fixed the slot reference leaks.
2002-05-09 23:01:21 +00:00
ian.mcgreer%sun.com
6804ba674f
bug 135808, STAN_GetDefaultCryptoToken appears to leak a slot reference, but there are no callers of it. Removing function.
...
r=wtc
2002-05-09 22:42:23 +00:00
wtc%netscape.com
894efe87d2
Bugzilla bug 135334: free the internal key slot reference when we are done.
2002-05-09 21:14:36 +00:00
wtc%netscape.com
43f8939e7c
Bugzilla bug 135058: free nickCopy on error returns in
...
PK11_FindCertsFromNickname. r=mcgreer.
2002-05-09 20:01:18 +00:00
wtc%netscape.com
0a6086505a
Bugzilla bug 136279: Return oldpath only if it is different from path.
...
Avoid an unnecessary call to SECMOD_HasRootCerts in nss_FindExternalRoot.
2002-05-07 23:35:22 +00:00
relyea%netscape.com
56f8e3b5e8
Automatically create a NULL email profile for certs with email addresses which
...
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
3a91379d33
bug 141936, crash when NULL nickname entry is stored in temp store
...
r=jpierre
2002-05-07 20:31:59 +00:00
ian.mcgreer%sun.com
d250a3e38f
bug 142175, PK11_ListCerts regressions -- handle PKCS#11 incompatibilites with serial numbers, and fix trust collection.
2002-05-07 14:58:12 +00:00
jpierre%netscape.com
41ba83e283
Fix for 142658 - fix certutil crash with NULL nickname
2002-05-06 23:10:40 +00:00
wtc%netscape.com
300f9cadfe
Bugzilla bug 136279: fixed bugs where 'path' and 'oldpath' were passed
...
to string functions before they were null-terminated. Added a comment
to explain what 'oldpath' is for.
2002-05-03 20:59:50 +00:00
ian.mcgreer%sun.com
f0d29104b1
bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate.
2002-05-02 19:00:13 +00:00
relyea%netscape.com
7143d6f89c
Fix the RSA key check to correctly accept keys with p < q.
2002-05-02 17:39:13 +00:00
jpierre%netscape.com
e7ee105522
Fix for 136279 - initialize NSS in a way compatible with < 3.4 versions of NSS
2002-05-01 01:04:41 +00:00
wtc%netscape.com
e4f5bd3810
Bugzilla bug 127062: use PR_MSG_PEEK instead of MSG_PEEK.
2002-05-01 00:21:50 +00:00
wtc%netscape.com
10bae1a1e3
Bugzilla bug 131057: define PORT_Strdup as a function that calls PORT_Alloc.
...
Modified files:
lib/ckfw/nsprstub.c lib/fortcrypt/swfort/pkcs11/stub.c
lib/nss/nss.def lib/util/secport.c lib/util/secport.h
2002-05-01 00:06:39 +00:00
wtc%netscape.com
4747c98947
Whitespace change.
2002-04-30 00:11:19 +00:00
relyea%netscape.com
cec43732fb
Use NewTempCert and AddTempCert when importing because the cert may already exist
...
in the cache.
2002-04-29 23:54:07 +00:00
wtc%netscape.com
35e9736426
Added pkibase.c to the project.
2002-04-26 23:29:19 +00:00
wtc%netscape.com
787be44323
Needed a (char *) cast for slotInfo.manufacturerID because it is an array
...
of "unsigned" chars. Mac's compiler complains about that.
2002-04-26 23:05:40 +00:00
wtc%netscape.com
4841e2949f
Removed devobject.c from the project. That file was removed.
2002-04-26 22:52:07 +00:00
wtc%netscape.com
2762eaebca
Need to define SHLIB_SUFFIX for lib/softoken/dbinit.c.
2002-04-26 22:42:15 +00:00
relyea%netscape.com
3d3a200209
return error when incomplete shutdown has been detected.
2002-04-26 22:36:07 +00:00
ian.mcgreer%sun.com
cdae9ed5a1
When doing cert traversals, create the certs in full as they are found. This avoids thrashing the softoken's object cache when the database has a large number of certs.
2002-04-26 14:34:05 +00:00
ian.mcgreer%sun.com
74b86448f7
fix broken HPUX builds
2002-04-26 12:59:06 +00:00
relyea%netscape.com
600cb240a3
Add code to update nickname and 'CKA_ID' from set attribute calls. This allows
...
us to add a nickname to a cert after we import it from pkcs #12 .
2002-04-26 01:44:33 +00:00
relyea%netscape.com
fbb0134208
Write the nickname entry as well when adding a nickname to a bug.
2002-04-26 01:09:21 +00:00
relyea%netscape.com
2cd6213ca5
Detect Active Card presents and disable PROTECTED_PIN_PATH login when found.
2002-04-25 21:24:47 +00:00
wtc%netscape.com
d3e14fdce2
Deleted code that was made obsolete by the previous revision.
2002-04-25 21:10:09 +00:00
relyea%netscape.com
1abdbba5a8
Don't let activeCards set the Protect_Auth bit because they weren't intending to
...
to begin with.
2002-04-25 20:57:06 +00:00
ian.mcgreer%sun.com
44d76f3678
if a cert already exists, use C_SetAttributeValue to change its mutable attributes during import (instead of trying to recreate it)
2002-04-25 20:49:49 +00:00
ian.mcgreer%sun.com
05bc7f4136
bug 138626, remove deleted cert from cache even if references still exist
2002-04-25 19:37:30 +00:00
ian.mcgreer%sun.com
2e14215952
reorganize token cache so that cache entries for imported objects are created from the token, not from the user-supplied template
2002-04-25 19:33:47 +00:00
relyea%netscape.com
b02d968215
NSS 3.4 has branch, that makes the tip at least NSS 3.5
2002-04-25 18:51:45 +00:00
relyea%netscape.com
0008ea5125
Don't set the Token value before fetching CRL attributes. This code is fetching
...
attributes from a known CRL, not looking up new attributes (I'm pretty sure that
CVS apropos would show I checked in the previously wrong code).
bob
2002-04-25 18:33:45 +00:00
sonja.mirtitsch%sun.com
adb8e67a58
trying a version that can test tip as default for tinderbox and 341
...
as default for nightly QA
2002-04-25 01:04:10 +00:00
relyea%netscape.com
8747bf72ad
Don't crash if our cache entry is not found.
2002-04-25 00:45:42 +00:00
relyea%netscape.com
35695b7987
Turn off caching for non-hardware tokens for now until we fix some of our
...
tokens which can be updated out-of-band to use the proper 'removable token'
semantics.
2002-04-25 00:25:58 +00:00
relyea%netscape.com
df120eb43d
Don't crash if we don't find the profile (and thus don't have a slot to free).
2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com
217231840b
This is a real corner case. If a search is done by issuer/serial, and the returned cert was in the cache, need to see if the cert's slot was removed. If so, destroy the cert and retry the search on the present tokens.
2002-04-24 19:39:41 +00:00
relyea%netscape.com
23724ed2c8
Don't crash when getting a single user cert, but old certs are in the database
...
with the same subject, but no keys.
2002-04-24 18:29:04 +00:00
relyea%netscape.com
ac5aeb9932
Look up both DER encoded serial numbers (PKCS #11 spec), and decode serial
...
numbers (Old NSS) when looking up certs by issuer and SN.
2002-04-24 18:27:17 +00:00
relyea%netscape.com
71e35b07b7
Authenticate to tokens before looking up user certs.
2002-04-24 18:25:48 +00:00
thayes%netscape.com
df2c867541
Reserved Netscape extension (NETSCAPE 1 18)
2002-04-23 23:48:20 +00:00
ian.mcgreer%sun.com
9221a5bd63
fix shutdown leaks
2002-04-23 17:22:13 +00:00
ian.mcgreer%sun.com
caad76ef9c
avoid use of iterator
2002-04-22 20:44:07 +00:00
ian.mcgreer%sun.com
f9f60b9735
NewTemp has to be matched with AddTempCertToPerm
2002-04-22 20:27:52 +00:00
relyea%netscape.com
ce09346d8c
Token and cert processing fixes:
...
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
9596c39faa
file is no longer part of build (functionality in devtoken.c)
2002-04-22 18:28:30 +00:00
ian.mcgreer%sun.com
a4591dfe82
overwrite old entry during import, so that changing trust works correctly
2002-04-22 15:21:06 +00:00
ian.mcgreer%sun.com
abac680269
fix bugs in cert import with smart card cache
2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
a7ab27bc63
re-sync the trust domain cache with token insertion/removal
2002-04-19 23:06:44 +00:00
ian.mcgreer%sun.com
36e1d960b7
* make sure the token cache returns failure in overflow case
...
* change internal module trust order again, builtins uses 100, and internal module must come first
2002-04-19 19:30:12 +00:00
ian.mcgreer%sun.com
3a62ba7fdd
try again, the default is 50 so the internal module must be higher
2002-04-19 19:19:33 +00:00
ian.mcgreer%sun.com
7061750a28
make sure the internal module defaults to trust order > 50
2002-04-19 19:01:45 +00:00
ian.mcgreer%sun.com
7c6de6462d
improve synchronization between the token state and token cache operations
2002-04-19 17:32:22 +00:00
ian.mcgreer%sun.com
a4d9b8b514
Only fall back to email search if the "nickname" has an @ character. This is because email searches will not go through the cache, so should be avoided if possible.
2002-04-19 16:22:31 +00:00