ian.mcgreer%sun.com
46d73e79e3
bug 135521, change cert lookups on tokens to be actual finds instead of traversals
2002-04-15 15:22:11 +00:00
kirk.erickson%sun.com
c7ef46e0ff
Resolves 126087. Backed out of slot->keyCount atomic instructions.
2002-04-14 14:07:12 +00:00
relyea%netscape.com
14e7ed26f6
Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
...
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
ian.mcgreer%sun.com
5c2561ce2a
testing theory that unmatched atomic increment/decrement is causing occasional tinderbox failures. See bug 126087.
2002-04-12 15:51:11 +00:00
ian.mcgreer%sun.com
0ce9d71907
additional fix for the patch from bug 126087. Must not set symKey->slot to NULL after leaving the freelist lock, or somebody else might pick up the symKey from the freelist, have their slot NULL'ed, and whamo..
2002-04-11 23:05:38 +00:00
ian.mcgreer%sun.com
043bcf2b16
key should be freed when refcount == 0 after decrement. See bug 126087.
2002-04-11 19:15:31 +00:00
wtc%netscape.com
bfc09d5778
Bug 135728: include pki3hack.h for the declaration of
...
STAN_AddModuleToDefaultTrustDomain, etc. r=mcgreer.
2002-04-05 19:30:38 +00:00
ian.mcgreer%sun.com
5dc26469cd
Land Stan changes to tip. Mostly header file / structure / API cleanup. Note
...
that these changes *do not* affect the current build, except for some minor edits.
2002-04-04 20:00:28 +00:00
kirk.erickson%sun.com
d62094b5b6
Addresses bug 126087 (hot locks identified by Ning at Sun).
...
Using atomic instructions to reduce contention on slot->freeListLock
and symKey->refLock.
2002-04-04 18:30:51 +00:00
relyea%netscape.com
dc8555d48c
Don't include the public key on a list if it doesn't exist.
2002-04-04 18:07:19 +00:00
wtc%netscape.com
29ce9176f6
Bugzilla bug 132461: changes suggested by Bob Relyea after his code review:
...
1. Add SECMOD_LoadModule back to nss.def.
2. Back out the SECMOD_AddModule/AddModuleEx changes.
I also updated the comments and made some changes to emulate the
indentation and comment styles of the original code.
Modifies files: nss/nss.def pk11wrap/pk11pars.c pk11wrap/pk11util.c
2002-03-26 00:43:04 +00:00
jpierre%netscape.com
af2f840d08
Fix error in SECMOD_UnloadUserModule reportd by Ian for bug 132461 - use Stan remove call rather than add
2002-03-21 18:44:23 +00:00
wtc%netscape.com
b84896bc9b
Bug 132461: restored the declaration of SECMOD_LoadModule.
2002-03-21 14:48:58 +00:00
jpierre%netscape.com
0b1cba67e5
Fix for 132461 - add better functions to load and remove modules dynamically r=relyea
2002-03-21 03:35:28 +00:00
ian.mcgreer%sun.com
3067097827
bug 130747, update trust after login to catch user certs when token doesn't return public key (ncipher)
2002-03-15 19:23:14 +00:00
wtc%netscape.com
bd9858f008
Bugzilla bug 130703: fixed several issues in the NSS 3.4 exported headers.
...
1) Preseve the position of NSS 3.3 elements in the data structures. Some
new fields replace some old deprecated fields where possible to preserve
the total size of the structure.
2) Stan headers are removed from public exports.
3) Some exported functions didn't have prototypes in the public headers.
4) One bug fix: dev3hack.c did not pass the second argument to
nssToken_DestroyCertList.
5) Include the necessary headers to fix undeclared function warnings.
2002-03-14 04:12:25 +00:00
nicolson%netscape.com
e5cfe0d63d
Fix 129756: PK11_SetObjectNickname is broken.
...
r=relyea.
2002-03-12 01:50:57 +00:00
relyea%netscape.com
6a064be2c0
Cache whether there are no CRL's and Trust objects on removable HW tokens
2002-03-07 23:21:39 +00:00
ian.mcgreer%sun.com
d08e06e182
bug 129298, handle different nicknames across tokens
...
r=relyea/a=wtc
2002-03-07 22:08:00 +00:00
relyea%netscape.com
a95766d49d
bug 125808 :
...
Reset the token name on token removal.
Check for token presence to reset the session handle.
Consolidate the NSS3 style TokenInit with the stan init so everything is in sync.
r=ddrinan
2002-03-06 01:44:50 +00:00
relyea%netscape.com
0134bfdc65
Initialize result to SECSuccess before we return.
2002-03-05 22:14:44 +00:00
relyea%netscape.com
20814fd837
Fix token/cert interactions:
...
1) don't have certs disappear because we have empty tokens.
2) Make sure the NSSToken structure has up-to-date nicknames.
2002-03-04 22:39:28 +00:00
relyea%netscape.com
adb4449c4a
Implement PQG Generate and Verify.
2002-03-02 00:53:11 +00:00
ian.mcgreer%sun.com
46a17485a1
modify last patch to only take effect if the slot certs are not publicly readable, and to not update the token cert list more than once
2002-03-01 21:43:57 +00:00
ian.mcgreer%sun.com
d0ede7618d
another fix for bug 125808, force update of cache after login/logout
2002-03-01 16:28:53 +00:00
relyea%netscape.com
60bf61a8b8
Don't go searching for the matching certs if they weren't on the token the
...
private key lived on.
2002-03-01 02:15:00 +00:00
jpierre%netscape.com
5dbed7866b
Fix for 128355 - add SECMOD_AddNewModuleEx to take module parameters
2002-03-01 00:37:42 +00:00
ian.mcgreer%sun.com
40f9ef3670
bug 125808, refresh trust and slot pointers of cert after token removal/insertion
2002-02-28 22:55:30 +00:00
ian.mcgreer%sun.com
250a72b502
bug 125808, smart card cache fixes
2002-02-27 22:41:56 +00:00
relyea%netscape.com
2d070a41ec
Don't crash on when adding certs with null url's .
2002-02-27 16:59:33 +00:00
ian.mcgreer%sun.com
68e04b2ebb
bug 125796, make sure all CERTCertificates are destroyed as such, and that cache collisions when traversing are handled correctly (by destroying extra reference)
2002-02-26 16:21:48 +00:00
relyea%netscape.com
7ccb67b360
CRL issues: 1) return url when finding and importing CRL's.
...
2) fix CERT_ImportCRL so it actually works.
NOTE: Calls of SEC_NewCrl() should verify the signature on the CRL before
importing!.
2002-02-26 02:02:53 +00:00
relyea%netscape.com
8201f1de35
Changes to allow protected pin path to work in applications that code for it.
2002-02-26 00:28:50 +00:00
ian.mcgreer%sun.com
e5c7125aba
bug 125359, by default the ASN.1 en/decoder should treat all numbers as signed. But many source/target items desire unsigned integers (specifically, bignums in the crypto stuff), so implement an siUnsignedInteger type which notifies the en/decoder to handle the conversion.
...
r=nelsonb
2002-02-21 22:41:44 +00:00
nelsonb%netscape.com
560ceb9fb4
Change most coreconf and NSS makefiles to use OS_TARGET (which can
...
be overridden via an environment variable) rather than OS_ARCH.
This is a precursor to more flexibility in cross-platform builds.
Bug 104541.
2002-02-15 22:54:08 +00:00
javi%netscape.com
4d23422f7c
Fix crash when looking up cert by nickname when the token on which
...
the cert is located is not plugged in.
Bug 125611
2002-02-15 01:50:28 +00:00
jpierre%netscape.com
82c12e8f71
Fix for 125143 - allow modutil to report PKCS#11 library load failure errors
2002-02-13 01:43:10 +00:00
wtc%netscape.com
9dd0a00e0b
Checked in Jamie's patches for
...
bug 124232: export SECKEY_DestroyPublicKeyLis; and
bug 124233: add new function PK11_GetNextSymKey.
Also fixed two problems in nss.def.
Modified files: nss/nss.def pk11wrap/pk11func.h pk11wrap/pk11skey.c
2002-02-08 19:42:40 +00:00
ian.mcgreer%sun.com
f6876300e6
bug 124309, fix various issues with the cache/temp store and thread safety. Is one line different than the patch on the bug, the one line seemed to fix the reported crash.
2002-02-08 02:51:41 +00:00
ian.mcgreer%sun.com
b2b1c06032
PK11_VerifyRecover leaks a slot reference, this fixes it.
...
r=relyea
2002-02-06 19:21:20 +00:00
wtc%netscape.com
e0791adbd8
Bugzilla bug 121523: checked in Kirk Erickson's session lock fix.
...
Modified Files:
lib/pk11wrap/pk11slot.c lib/softoken/pkcs11.c
lib/softoken/pkcs11i.h lib/softoken/pkcs11u.c
2002-02-05 23:41:36 +00:00
relyea%netscape.com
d47cd2d11a
Fix error path, only free arena is one was allocated.
2002-02-05 01:47:01 +00:00
ian.mcgreer%sun.com
8faaba0e2f
last part of bug 121628, permanent slots should respond immediately to IsPresent() call
2002-02-04 21:57:07 +00:00
relyea%netscape.com
72ba690a4c
Function to read PQG params from the key.
2002-02-04 18:00:14 +00:00
relyea%netscape.com
0ae90e9fb1
Bug 117978: accessor functions to all JCE keystore API to be implemented.
2002-02-03 03:37:26 +00:00
relyea%netscape.com
26815e4981
Add new PK11_ImportSymKeyWithFlags function for JSS
2002-02-02 01:46:05 +00:00
javi%netscape.com
17bbdeab99
Fix Mac bustage.
2002-02-02 01:20:54 +00:00
ian.mcgreer%sun.com
9d0bbe4ab6
bug 121628, persistent cache of hardware token certs
2002-02-01 17:25:15 +00:00
ian.mcgreer%sun.com
73ada3b8ed
couple of fixes
2002-01-31 17:28:49 +00:00
relyea%netscape.com
4a065a35a8
Set token flag when saving the CRLs so they actually get put into the database!
2002-01-31 00:18:09 +00:00