Граф коммитов

11 Коммитов

Автор SHA1 Сообщение Дата
nelson%bolyard.com 88c4f3a0b3 Remove dead old FORTEZZA KEA code. Coverity bug 337098. r=rrelyea,wtchang 2006-05-18 20:24:23 +00:00
relyea%netscape.com 77cb1d9d48 Bug 316925
Key export does not work on tokens with non-sensitive keys that can't wrap.
r=kaie
2005-11-24 00:40:14 +00:00
relyea%netscape.com d0af60d089 refactor pk11util, splitting large single files down to a managable size.
bug 246130. The new factor is:

pk11akey.c - asymetric keys constructed from pk11cert.c and pk11skey.c
pk11auth.c - authentication/password management factored from pk11slot.c
pk11cert.c - cert code with private key, crls and trust factored out.
pk11ctx.c -- pkcs11 context code, factored out of pk11skey.c
new pk11func.h -- for backward compatibility.
pk11mech.c - mechanism mapping code, factored mostly from pk11slot.c
pk11nobj.c - netscape objects (crls and trust), factored mostly from pk11cert.c
pk11obj.c - generic object support, factored from pk11skey.c pk11slot.c and
pk11cert.c
pk11priv.h -- private functions factored from pk11func.h
pk11pub.h -- public functions factored from pk11func.h
pk11skey.c - now only symetric key ops; private, public key ops, generic ops
and crypto contexs have been factored out.
pk11slot.c - still slot operations. Authentication, generic object ops,
mechanism mapping has been factored out.

This patch should only have refactoring, no new functions or other changes.
2004-07-19 22:12:38 +00:00
gerv%gerv.net 3634d4d94b Bug 236613: change to MPL/LGPL/GPL tri-license. 2004-04-25 15:03:26 +00:00
relyea%netscape.com 12bf9a0f9f Changes for symkey support. 2003-11-14 03:25:52 +00:00
relyea%netscape.com e07da99055 221067 NSS needs to be able to create token symkeys from unwrap and derive. 2003-10-18 00:38:04 +00:00
relyea%netscape.com 31218c1ff3 Bug 117978: accessor functions to all JCE keystore API to be implemented. 2002-02-03 03:37:26 +00:00
relyea%netscape.com e27189dd1d Land BOB_WORK_BRANCH unto the tip.
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
nelsonb%netscape.com e17976568a Fix a crash. An attempt to move a sensitive key longer than 48 bytes
from one token to another will no longer crash.  Instead, it will fail
with the new error code SEC_ERROR_CANNOT_MOVE_SENSITIVE_KEY.  Bug 97887.
In addition, DHE key pairs are now generated with CKA_SENSITIVE false.
2001-09-06 03:00:39 +00:00
larryh%netscape.com 351f30a205 Bugzilla: 64132. NSS lock instrumentation 2001-01-03 19:51:22 +00:00
relyea%netscape.com 8c4b7edd1d Initial NSS Open Source Checkin 2000-03-31 19:16:26 +00:00