jpierre%netscape.com
dc151802c8
Make certutil use the new CERT_VerifyCertificate function when verifying certs
2002-07-16 00:45:50 +00:00
ian.mcgreer%sun.com
7ad9c0cc44
bug 136701, certutil should use PK11_ListCerts
2002-05-29 18:19:33 +00:00
kirk.erickson%sun.com
9ef935cd78
Fixed OCSP typo.
2002-05-28 18:26:37 +00:00
ian.mcgreer%sun.com
6d36e7eddc
fix error statement
2002-04-12 19:17:48 +00:00
relyea%netscape.com
7aa8e229f4
Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
...
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
ian.mcgreer%sun.com
341d4faa3c
bug 136806, don't authenticate to friendly slots when adding certs
2002-04-12 18:07:49 +00:00
relyea%netscape.com
68c7d19edd
return the correct error codes to make all.sh happy.
2002-04-05 03:16:41 +00:00
relyea%netscape.com
24ff51d1d9
Link certutil dynamically.
2002-04-05 00:12:21 +00:00
wtc%netscape.com
fbb98b2514
Bugzilla bug 133545: fixed spelling errors "signning" in certutil memu
...
options. Thanks to Eric Murphy <ericmurphy@jabber.org> for the bug report.
2002-03-26 22:22:07 +00:00
wtc%netscape.com
608314e686
Bugzilla bug 131078: fixed compiler warnings. r=mcgreer.
2002-03-15 06:07:41 +00:00
ian.mcgreer%sun.com
e9ae28e48e
fix looking up a key on a token
2002-02-27 22:12:06 +00:00
ian.mcgreer%sun.com
f10bd5bd8e
make listing of certs finish cleanly under purify
2002-02-14 18:02:30 +00:00
ian.mcgreer%sun.com
8930954284
bug 124268, usage statement for dump chain option
2002-02-08 15:22:54 +00:00
ian.mcgreer%sun.com
c60a4bd7b4
bug 124268, -P is used twice
2002-02-07 22:28:04 +00:00
relyea%netscape.com
f462f5a326
Make the following functions open the databases Readonly:
...
ListCerts PrintHelp ListKeys ListModules CheckCertValidity Version
Add an option (-X) to restore the old behaviour of openning the Databases R/W
2002-02-01 02:26:40 +00:00
ian.mcgreer%sun.com
8939b19afe
have certutil shutdown cleanly so purify is easier to deal with
2002-01-31 19:27:07 +00:00
ian.mcgreer%sun.com
abec66154f
changes related to bug 115660
...
* fipstoken will only force authentication for object-related functions when the object is a private or secret key
* certutil does not authenticate to token when in FIPS and only doing cert-related operations
* QA does not provide password to certutil when doing cert-related operations in FIPS tests
2002-01-29 17:30:22 +00:00
relyea%netscape.com
a7723c632d
Fix bug 115660. Note that fixing the bugs necessitates fixing the test
...
cases as well. The test case was depending on the failure to read certs to
detect the failure to read keys. Now certutil returns a failure if no keys
are found. This also means that the FIPS test after the key and cert
has been deleted should expect a failure to list any keys.
2002-01-25 19:03:17 +00:00
ian.mcgreer%sun.com
ed9266b577
force generated serial #'s to always be positive
2002-01-15 01:53:11 +00:00
ian.mcgreer%sun.com
9ec6b4c253
add command to certutil for dumping the chain of a cert
2002-01-10 04:30:00 +00:00
ian.mcgreer%sun.com
d137b5ea39
this is why apps shouldn't be able to change cert values...
2001-12-18 21:11:41 +00:00
ian.mcgreer%sun.com
643f828e58
fips changes. forces login for cert listing.
2001-11-09 00:37:03 +00:00
relyea%netscape.com
e27189dd1d
Land BOB_WORK_BRANCH unto the tip.
...
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
relyea%netscape.com
bc18839896
Remove dead code.
...
Fix compiler warnings.
2001-09-20 21:45:41 +00:00
relyea%netscape.com
951dd94bbe
Add option to reset the cert and key database.
2001-09-06 21:18:13 +00:00
wtc%netscape.com
c4185eef2e
Bugzilla bug 94685: fixed compiler warnings.
2001-08-24 03:52:23 +00:00
wtc%netscape.com
8e29929a28
Bugzilla bug 94685: defining SECUTIL_NEW caused the wrong function
...
declaration (with PRFileDesc* as the first parameter) to be used and
hence a compiler warning.
2001-08-23 00:22:07 +00:00
mcgreer%netscape.com
30ed9204fa
make error return more readable
2001-08-10 16:13:13 +00:00
mcgreer%netscape.com
b5ad2a94e9
duh. Return error % 256 (to get 255 when error is SECFailure).
2001-08-10 16:06:57 +00:00
mcgreer%netscape.com
ca1878cfa5
force certutil to always return 255 on error. Make sure there is only one pointer to password callback arg.
2001-08-09 20:57:58 +00:00
mcgreer%netscape.com
66923155b9
Look for the private key when listing keys.
...
The second part of this patch was checked in, see revision 1.28. Yet, somehow, it never showed up.
2001-08-08 13:37:42 +00:00
mcgreer%netscape.com
070a6e685b
Yet Another Instance Of Needing to Send the Password Down for FIPS
2001-08-07 16:46:52 +00:00
mcgreer%netscape.com
0b46751d74
fix bug in param allocation
2001-08-07 16:35:06 +00:00
mcgreer%netscape.com
6c177391c5
implement key deletion in certutil
2001-08-07 16:04:12 +00:00
mcgreer%netscape.com
be0c0a0e5c
more FIPS fixes. it's possible the old crypto lib alloc'ed the PQG params and copied them over when creating the DSA key, otherwise this code would have never worked. It's also possible this code was never tested as-is. At any rate, the static vars go out of scope and wreak havoc later on, so alloc the memory.
2001-08-06 18:57:16 +00:00
mcgreer%netscape.com
1edee3f9a8
another FIPS workaround
2001-08-06 18:19:12 +00:00
mcgreer%netscape.com
4502e6e9b2
more FIPS changes, keep pw context with key to avoid pw prompt
2001-08-06 16:01:10 +00:00
mcgreer%netscape.com
f78082d28d
fix DSA key gen
2001-08-02 21:06:38 +00:00
mcgreer%netscape.com
9ee2624f53
changes to make FIPS mode work
2001-08-02 21:04:14 +00:00
mcgreer%netscape.com
867a310a99
fix for 90510, listing individual certs from token
2001-07-24 19:26:53 +00:00
nelsonb%netscape.com
b6f929ea59
Fix bug 85465. Detect EOF on stdin when reading it to seed PRNG.
...
Also eliminate some compiler warnings.
2001-06-18 21:31:04 +00:00
kirke%netscape.com
f0fde27571
Bug 69582 endless loop on EOF reading Extensions
2001-03-01 21:45:33 +00:00
relyea%netscape.com
126437e7e3
Make the public interface use a flags variable instead of a billion little
...
Bools.
suggested and reviewed by wtc in bug 66230
2001-02-10 02:03:03 +00:00
relyea%netscape.com
a2d46ed98c
update certutil and modutil to use the new NSS_Initialize signature.
...
modutil can now specify it's nocertdb paramter.
bug 64260 reviewed by wtc
2001-02-09 01:38:04 +00:00
mcgreer%netscape.com
532933e0be
bug 67132. certutil crashes on -C -x combination, deny it for now.
...
certutil -C was not recognizing the -a (ascii) option, implement it.
r=wtc
2001-02-06 18:26:30 +00:00
kirke%netscape.com
b4bed1dcdb
Resolves bug 66244 - Many NSS command do not detect failure of NSS_Init* functions. Introduced SECU_PrintPRandOSError(progName); to print on failure. Each command is responsible for exiting with appropriate status to distinguish failure points.
2001-01-31 23:25:02 +00:00
nelsonb%netscape.com
bbb9df0829
Detect failures of NSS_Init and report them.
...
This fixes bug 66244 for certutil (only).
2001-01-25 04:14:22 +00:00
mcgreer%netscape.com
deab71f885
add option for db prefix
2001-01-22 20:14:05 +00:00
nelsonb%netscape.com
cf51c9006f
Add missing #include "nss.h"
2001-01-07 07:43:28 +00:00
relyea%netscape.com
7922b6463d
Remove depricated functions that's referencing a removed symbol
2001-01-06 23:55:22 +00:00
relyea%netscape.com
5353a5b656
Use NSS_initialization.
...
Remove Low level SECKEY calls (not the private key management is now broken
until PK11 calls are added to replace them).
2001-01-06 21:11:34 +00:00
relyea%netscape.com
ab78f09b9b
Add dynamic Library support to commands. Mark those that commands that still
...
need to be build with static libraries appropriately.
2000-12-22 17:09:07 +00:00
relyea%netscape.com
9e96aea0f1
OpenVMS changes bug 60143
2000-12-07 22:25:18 +00:00
mcgreer%netscape.com
47d9d1ddb3
option for printing content version
2000-11-03 22:28:26 +00:00
wtc%netscape.com
f7cb9d9b93
Print NSPR and OS error codes if PR_Open fails.
2000-10-10 02:38:08 +00:00
nelsonb%netscape.com
96a4822448
Fix a crash caused by using a null PRFileDesc * after PR_Open fails.
2000-10-07 02:16:03 +00:00
relyea%netscape.com
9bd5c43fa0
OS/2 build changes.
2000-09-20 17:07:22 +00:00
mcgreer%netscape.com
4cb280cca7
include support for adding S/MIME certs to the database. this will be needed for S/MIME test code.
2000-09-19 16:22:17 +00:00
relyea%netscape.com
800af76224
Fix merge problems from CVS. This version should now compile and work.
2000-09-15 21:01:53 +00:00
relyea%netscape.com
902093ca00
Propogate the password arg to the sign function.
2000-09-15 15:37:37 +00:00
relyea%netscape.com
d8d0892b85
Fix certutil to read Certs from PKCS #11 modules. Make the 'all' option for
...
modules work for ListCerts and ListKeys. Allow password from file for these
options as well.
2000-09-14 21:12:13 +00:00
mcgreer%netscape.com
e130c0a252
fixes RFE from bug 49316 (will test on NT before verifying)
2000-09-13 06:43:52 +00:00
mcgreer%netscape.com
dffd0ca3c8
moved fingerprint handling to secutil.c, see bug 45303
2000-08-30 01:06:00 +00:00
mcgreer%netscape.com
0bc13d686f
should be able to set negative offset during cert creation
2000-08-15 05:08:13 +00:00
mcgreer%netscape.com
11bcfbe3d6
fingerprint had to handled in certutil for now since SECU_PrintCertificate receives a decoded DER. see #45303
2000-07-12 22:42:57 +00:00
relyea%netscape.com
1d084af74a
merge changes from NSS 3.0 branch to allow NT automated tests to work.
2000-06-29 21:25:41 +00:00
mcgreer%netscape.com
5c4d045072
attempt to add token support for listing certs & keys
2000-06-16 00:38:44 +00:00
chrisk%netscape.com
091d437eca
Sorted output for certutil -L
2000-06-12 22:25:40 +00:00
relyea%netscape.com
cf7b7608db
Update makefiles so NT will build. (and other platforms that don't have symbolic links)
2000-04-03 21:41:33 +00:00
relyea%netscape.com
9fd7059a19
Initial NSS Open Source checkin
2000-03-31 20:13:40 +00:00