Граф коммитов

187 Коммитов

Автор SHA1 Сообщение Дата
ian.mcgreer%sun.com 46d73e79e3 bug 135521, change cert lookups on tokens to be actual finds instead of traversals 2002-04-15 15:22:11 +00:00
kirk.erickson%sun.com c7ef46e0ff Resolves 126087. Backed out of slot->keyCount atomic instructions. 2002-04-14 14:07:12 +00:00
relyea%netscape.com 14e7ed26f6 Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
ian.mcgreer%sun.com 5c2561ce2a testing theory that unmatched atomic increment/decrement is causing occasional tinderbox failures. See bug 126087. 2002-04-12 15:51:11 +00:00
ian.mcgreer%sun.com 0ce9d71907 additional fix for the patch from bug 126087. Must not set symKey->slot to NULL after leaving the freelist lock, or somebody else might pick up the symKey from the freelist, have their slot NULL'ed, and whamo.. 2002-04-11 23:05:38 +00:00
ian.mcgreer%sun.com 043bcf2b16 key should be freed when refcount == 0 after decrement. See bug 126087. 2002-04-11 19:15:31 +00:00
wtc%netscape.com bfc09d5778 Bug 135728: include pki3hack.h for the declaration of
STAN_AddModuleToDefaultTrustDomain, etc. r=mcgreer.
2002-04-05 19:30:38 +00:00
ian.mcgreer%sun.com 5dc26469cd Land Stan changes to tip. Mostly header file / structure / API cleanup. Note
that these changes *do not* affect the current build, except for some minor edits.
2002-04-04 20:00:28 +00:00
kirk.erickson%sun.com d62094b5b6 Addresses bug 126087 (hot locks identified by Ning at Sun).
Using atomic instructions to reduce contention on slot->freeListLock
and symKey->refLock.
2002-04-04 18:30:51 +00:00
relyea%netscape.com dc8555d48c Don't include the public key on a list if it doesn't exist. 2002-04-04 18:07:19 +00:00
wtc%netscape.com 29ce9176f6 Bugzilla bug 132461: changes suggested by Bob Relyea after his code review:
1. Add SECMOD_LoadModule back to nss.def.
2. Back out the SECMOD_AddModule/AddModuleEx changes.
I also updated the comments and made some changes to emulate the
indentation and comment styles of the original code.
Modifies files: nss/nss.def pk11wrap/pk11pars.c pk11wrap/pk11util.c
2002-03-26 00:43:04 +00:00
jpierre%netscape.com af2f840d08 Fix error in SECMOD_UnloadUserModule reportd by Ian for bug 132461 - use Stan remove call rather than add 2002-03-21 18:44:23 +00:00
wtc%netscape.com b84896bc9b Bug 132461: restored the declaration of SECMOD_LoadModule. 2002-03-21 14:48:58 +00:00
jpierre%netscape.com 0b1cba67e5 Fix for 132461 - add better functions to load and remove modules dynamically r=relyea 2002-03-21 03:35:28 +00:00
ian.mcgreer%sun.com 3067097827 bug 130747, update trust after login to catch user certs when token doesn't return public key (ncipher) 2002-03-15 19:23:14 +00:00
wtc%netscape.com bd9858f008 Bugzilla bug 130703: fixed several issues in the NSS 3.4 exported headers.
1) Preseve the position of NSS 3.3 elements in the data structures.  Some
new fields replace some old deprecated fields where possible to preserve
the total size of the structure.
2) Stan headers are removed from public exports.
3) Some exported functions didn't have prototypes in the public headers.
4) One bug fix: dev3hack.c did not pass the second argument to
nssToken_DestroyCertList.
5) Include the necessary headers to fix undeclared function warnings.
2002-03-14 04:12:25 +00:00
nicolson%netscape.com e5cfe0d63d Fix 129756: PK11_SetObjectNickname is broken.
r=relyea.
2002-03-12 01:50:57 +00:00
relyea%netscape.com 6a064be2c0 Cache whether there are no CRL's and Trust objects on removable HW tokens 2002-03-07 23:21:39 +00:00
ian.mcgreer%sun.com d08e06e182 bug 129298, handle different nicknames across tokens
r=relyea/a=wtc
2002-03-07 22:08:00 +00:00
relyea%netscape.com a95766d49d bug 125808 :
Reset the token name on token removal.
Check for token presence to reset the session handle.
Consolidate the NSS3 style TokenInit with the stan init so everything is in sync.
r=ddrinan
2002-03-06 01:44:50 +00:00
relyea%netscape.com 0134bfdc65 Initialize result to SECSuccess before we return. 2002-03-05 22:14:44 +00:00
relyea%netscape.com 20814fd837 Fix token/cert interactions:
1) don't have certs disappear because we have empty tokens.
2) Make sure the NSSToken structure has up-to-date nicknames.
2002-03-04 22:39:28 +00:00
relyea%netscape.com adb4449c4a Implement PQG Generate and Verify. 2002-03-02 00:53:11 +00:00
ian.mcgreer%sun.com 46a17485a1 modify last patch to only take effect if the slot certs are not publicly readable, and to not update the token cert list more than once 2002-03-01 21:43:57 +00:00
ian.mcgreer%sun.com d0ede7618d another fix for bug 125808, force update of cache after login/logout 2002-03-01 16:28:53 +00:00
relyea%netscape.com 60bf61a8b8 Don't go searching for the matching certs if they weren't on the token the
private key lived on.
2002-03-01 02:15:00 +00:00
jpierre%netscape.com 5dbed7866b Fix for 128355 - add SECMOD_AddNewModuleEx to take module parameters 2002-03-01 00:37:42 +00:00
ian.mcgreer%sun.com 40f9ef3670 bug 125808, refresh trust and slot pointers of cert after token removal/insertion 2002-02-28 22:55:30 +00:00
ian.mcgreer%sun.com 250a72b502 bug 125808, smart card cache fixes 2002-02-27 22:41:56 +00:00
relyea%netscape.com 2d070a41ec Don't crash on when adding certs with null url's . 2002-02-27 16:59:33 +00:00
ian.mcgreer%sun.com 68e04b2ebb bug 125796, make sure all CERTCertificates are destroyed as such, and that cache collisions when traversing are handled correctly (by destroying extra reference) 2002-02-26 16:21:48 +00:00
relyea%netscape.com 7ccb67b360 CRL issues: 1) return url when finding and importing CRL's.
2) fix CERT_ImportCRL so it actually works.

NOTE: Calls of SEC_NewCrl() should verify the signature on the CRL before
importing!.
2002-02-26 02:02:53 +00:00
relyea%netscape.com 8201f1de35 Changes to allow protected pin path to work in applications that code for it. 2002-02-26 00:28:50 +00:00
ian.mcgreer%sun.com e5c7125aba bug 125359, by default the ASN.1 en/decoder should treat all numbers as signed. But many source/target items desire unsigned integers (specifically, bignums in the crypto stuff), so implement an siUnsignedInteger type which notifies the en/decoder to handle the conversion.
r=nelsonb
2002-02-21 22:41:44 +00:00
nelsonb%netscape.com 560ceb9fb4 Change most coreconf and NSS makefiles to use OS_TARGET (which can
be overridden via an environment variable) rather than OS_ARCH.
This is a precursor to more flexibility in cross-platform builds.
Bug 104541.
2002-02-15 22:54:08 +00:00
javi%netscape.com 4d23422f7c Fix crash when looking up cert by nickname when the token on which
the cert is located is not plugged in.

Bug 125611
2002-02-15 01:50:28 +00:00
jpierre%netscape.com 82c12e8f71 Fix for 125143 - allow modutil to report PKCS#11 library load failure errors 2002-02-13 01:43:10 +00:00
wtc%netscape.com 9dd0a00e0b Checked in Jamie's patches for
bug 124232: export SECKEY_DestroyPublicKeyLis; and
bug 124233: add new function PK11_GetNextSymKey.
Also fixed two problems in nss.def.
Modified files: nss/nss.def pk11wrap/pk11func.h pk11wrap/pk11skey.c
2002-02-08 19:42:40 +00:00
ian.mcgreer%sun.com f6876300e6 bug 124309, fix various issues with the cache/temp store and thread safety. Is one line different than the patch on the bug, the one line seemed to fix the reported crash. 2002-02-08 02:51:41 +00:00
ian.mcgreer%sun.com b2b1c06032 PK11_VerifyRecover leaks a slot reference, this fixes it.
r=relyea
2002-02-06 19:21:20 +00:00
wtc%netscape.com e0791adbd8 Bugzilla bug 121523: checked in Kirk Erickson's session lock fix.
Modified Files:
	lib/pk11wrap/pk11slot.c lib/softoken/pkcs11.c
	lib/softoken/pkcs11i.h lib/softoken/pkcs11u.c
2002-02-05 23:41:36 +00:00
relyea%netscape.com d47cd2d11a Fix error path, only free arena is one was allocated. 2002-02-05 01:47:01 +00:00
ian.mcgreer%sun.com 8faaba0e2f last part of bug 121628, permanent slots should respond immediately to IsPresent() call 2002-02-04 21:57:07 +00:00
relyea%netscape.com 72ba690a4c Function to read PQG params from the key. 2002-02-04 18:00:14 +00:00
relyea%netscape.com 0ae90e9fb1 Bug 117978: accessor functions to all JCE keystore API to be implemented. 2002-02-03 03:37:26 +00:00
relyea%netscape.com 26815e4981 Add new PK11_ImportSymKeyWithFlags function for JSS 2002-02-02 01:46:05 +00:00
javi%netscape.com 17bbdeab99 Fix Mac bustage. 2002-02-02 01:20:54 +00:00
ian.mcgreer%sun.com 9d0bbe4ab6 bug 121628, persistent cache of hardware token certs 2002-02-01 17:25:15 +00:00
ian.mcgreer%sun.com 73ada3b8ed couple of fixes 2002-01-31 17:28:49 +00:00
relyea%netscape.com 4a065a35a8 Set token flag when saving the CRLs so they actually get put into the database! 2002-01-31 00:18:09 +00:00