Граф коммитов

38 Коммитов

Автор SHA1 Сообщение Дата
ian.mcgreer%sun.com be72ca16c5 bug 180268, reimplement ssl step-up for builtins 2004-05-17 20:08:38 +00:00
gerv%gerv.net 3634d4d94b Bug 236613: change to MPL/LGPL/GPL tri-license. 2004-04-25 15:03:26 +00:00
wtc%netscape.com 3a76d91edd Bugzilla bug 204549: find_objects_by_template was not setting *statusOpt
before one return statement.  r=nelsonb.
2003-09-23 20:34:15 +00:00
wtc%netscape.com f4184b8ca1 Bugzilla bug 214695: fixed incorrect use of PR_AtomicDecrement on reference
counts.  The reference count should not be read "naked".  Instead, we
should simply use the return value of PR_AtomicDecrement for the result of
the decrement.
Modified Files: dev/devmod.c dev/devslot.c dev/devtoken.c pki/certificate.c
pki/pkibase.c
2003-08-01 02:02:47 +00:00
nelsonb%netscape.com 99c2efd227 Change the function definitions in dev so that the ctags program will
produce valid tags from these sources.
2003-07-01 00:32:22 +00:00
wtc%netscape.com 228b3e52ed Bug 190396.
Don't fail the search if the token returned an error that indicates that it
legitimately couldn't find a CRL
2003-01-24 06:37:03 +00:00
ian.mcgreer%sun.com 72edde5172 bug 172247, don't allow import of duplicate issuer/serial certs 2002-11-21 20:43:15 +00:00
relyea%netscape.com 936e0f80f3 Fix optimized build failures 2002-10-10 21:17:39 +00:00
relyea%netscape.com 5fd94ca1a9 Bug 164501. Return a proper error code from PK11_FindCrlByName() so the CRL
code can decide if there is a hw or system failure preventing the reading of a
CRL or if the CRL is just not there.
2002-10-10 20:30:19 +00:00
ian.mcgreer%sun.com cc2b80a48a bug 166793, uninitialized variables
r=wtc
2002-09-30 21:15:07 +00:00
relyea%netscape.com 0fb6e546c6 bug 161552: Make the recipient list traversal functions call the internal
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
relyea%netscape.com cbd308d951 Handle the switch from the static buffer to the realloc buffer. 2002-08-09 18:48:31 +00:00
relyea%netscape.com 6880c87a8d More performance improvements in listing certs:
1) reduce more short term memory allocate/frees.
	2) remove sha1 hash calculations from critical paths.
	3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
relyea%netscape.com 5fc7efb515 Fix solaris compiler error/warning. Fix prototype to return correct value (PRBool not PRStatus). 2002-06-24 23:54:16 +00:00
relyea%netscape.com 7caefab6ed Don't decode or extract trust for certs if we are just getting the nicknames -- particularly for user certs. 2002-06-24 22:36:59 +00:00
jpierre%netscape.com d5de75b62b Fix for bug 137645 - cached certificate does not get its nickname updated after P12 import of matching user certificate 2002-05-20 23:21:39 +00:00
relyea%netscape.com 56f8e3b5e8 Automatically create a NULL email profile for certs with email addresses which
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com cdae9ed5a1 When doing cert traversals, create the certs in full as they are found. This avoids thrashing the softoken's object cache when the database has a large number of certs. 2002-04-26 14:34:05 +00:00
ian.mcgreer%sun.com 44d76f3678 if a cert already exists, use C_SetAttributeValue to change its mutable attributes during import (instead of trying to recreate it) 2002-04-25 20:49:49 +00:00
relyea%netscape.com ac5aeb9932 Look up both DER encoded serial numbers (PKCS #11 spec), and decode serial
numbers (Old NSS) when looking up certs by issuer and SN.
2002-04-24 18:27:17 +00:00
ian.mcgreer%sun.com 9221a5bd63 fix shutdown leaks 2002-04-23 17:22:13 +00:00
relyea%netscape.com ce09346d8c Token and cert processing fixes:
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
   2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
   3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
   4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
   5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com abac680269 fix bugs in cert import with smart card cache 2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com 5377ca2a6c Fixes for smart card cache. Don't do cache searches by email address, since GetAttributeValue does not set that field. Handle removal correctly for item at tail of list. Don't search token after a successful cache search that returned zero hits. 2002-04-19 16:14:13 +00:00
relyea%netscape.com 8964d7d12e Don't crash if we try to get the name of a non-existant token. 2002-04-18 17:54:30 +00:00
ian.mcgreer%sun.com 5dbec9a12d landing new smart card cache, bug 135429 2002-04-18 17:30:05 +00:00
ian.mcgreer%sun.com a7256cf9ec bug 135521, change cert lookups on tokens to be actual finds instead of traversals 2002-04-15 15:22:11 +00:00
ian.mcgreer%sun.com b1ccccd70a Land Stan changes to tip. Mostly header file / structure / API cleanup. Note
that these changes *do not* affect the current build, except for some minor edits.
2002-04-04 20:00:28 +00:00
relyea%netscape.com fd92279500 Cache whether there are no CRL's and Trust objects on removable HW tokens 2002-03-07 23:21:39 +00:00
relyea%netscape.com 578a4b59ae bug 125808 :
Reset the token name on token removal.
Check for token presence to reset the session handle.
Consolidate the NSS3 style TokenInit with the stan init so everything is in sync.
r=ddrinan
2002-03-06 01:44:50 +00:00
relyea%netscape.com cab04c2fb6 Fix token/cert interactions:
1) don't have certs disappear because we have empty tokens.
2) Make sure the NSSToken structure has up-to-date nicknames.
2002-03-04 22:39:28 +00:00
relyea%netscape.com 8f3c87eaa3 Use timers to determine whether or not to do the smart card present checks
or not.

bob
2002-02-16 00:29:37 +00:00
ian.mcgreer%sun.com 7bd72fa102 last part of bug 121628, permanent slots should respond immediately to IsPresent() call 2002-02-04 21:57:07 +00:00
ian.mcgreer%sun.com c124ec770d bug 121628, persistent cache of hardware token certs 2002-02-01 17:25:15 +00:00
relyea%netscape.com 75f3b7599d Clean up compilier warnings on Solaris and Linux, most particularly:
1) Implicit declaration of function.
2) Possibly unitialized variables.

These warnings have indicated some real problems in the code, so many changes
are not just to silence the warnings, but to fix the problems. Others were
inocuous, but the warnings were silenced to reduce the noise.
2001-12-07 01:36:25 +00:00
ian.mcgreer%sun.com 8069de9d9e land changes for handling temporary and cached certs in 3.4
* separate trust object from cert object
* move handling of cryptoki objects into libdev
* implement digest in libdev (for trust object indexing)
* fixes in cache implementation; connect cache to 3.4 certs
* implement CERT_NewTempCertificate via crypto context
2001-11-28 16:23:51 +00:00
ian.mcgreer%sun.com 39ed01d85f changes to get fips working 2001-11-09 00:36:12 +00:00
relyea%netscape.com e27189dd1d Land BOB_WORK_BRANCH unto the tip.
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00