index
:
openssh
master
Debian dgit repo for package openssh
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
ssh-pkcs11.c
Commit message (
Expand
)
Author
Age
*
upstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org
2020-01-25
*
upstream: revert unconditional forced login implemented in r1.41 of
djm@openbsd.org
2019-10-01
*
upstream: if a PKCS#11 token returns no keys then try to login and
djm@openbsd.org
2019-09-05
*
upstream: downgrade PKCS#11 "provider returned no slots" warning
djm@openbsd.org
2019-09-02
*
Add headers to prevent warnings w/out OpenSSL.
Darren Tucker
2019-07-23
*
Fix building w/out ECC.
Darren Tucker
2019-05-17
*
Whitespace resync w/OpenBSD.
Darren Tucker
2019-04-26
*
upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
markus@openbsd.org
2019-03-26
*
upstream: fix NULL-deref crash in PKCS#11 code when attempting
djm@openbsd.org
2019-02-05
*
upstream: Correct some bugs in PKCS#11 token PIN handling at
djm@openbsd.org
2019-01-22
*
upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
djm@openbsd.org
2019-01-22
*
fix previous test
Damien Miller
2019-01-21
*
Wrap ECC static globals in EC_KEY_METHOD_NEW too.
Darren Tucker
2019-01-21
*
upstream: always print the caller's error message in ossl_error(),
djm@openbsd.org
2019-01-21
*
upstream: get the ex_data (pkcs11_key object) back from the keys at
djm@openbsd.org
2019-01-21
*
Fix -Wunused when compiling PKCS#11 without ECDSA
Damien Miller
2019-01-21
*
upstream: use ECDSA_SIG_set0() instead of poking signature values into
djm@openbsd.org
2019-01-21
*
remove HAVE_DLOPEN that snuck in
Damien Miller
2019-01-21
*
conditionalise ECDSA PKCS#11 support
Damien Miller
2019-01-21
*
upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
djm@openbsd.org
2019-01-21
*
upstream: KNF previous; from markus@
djm@openbsd.org
2019-01-21
*
upstream: use OpenSSL's RSA reference counting hooks to
djm@openbsd.org
2019-01-21
*
upstream: make the PKCS#11 RSA code more like the new PKCS#11
djm@openbsd.org
2019-01-21
*
upstream: fix leak of ECDSA pkcs11_key objects
djm@openbsd.org
2019-01-21
*
upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access of
djm@openbsd.org
2019-01-21
*
upstream: cleanup PKCS#11 ECDSA pubkey loading: the returned
djm@openbsd.org
2019-01-21
*
upstream: cleanup unnecessary code in ECDSA pkcs#11 signature
djm@openbsd.org
2019-01-21
*
upstream: add support for ECDSA keys in PKCS#11 tokens
djm@openbsd.org
2019-01-21
*
adapt -portable to OpenSSL 1.1x API
Damien Miller
2018-09-13
*
upstream: hold our collective noses and use the openssl-1.1.x API in
djm@openbsd.org
2018-09-13
*
upstream commit
jsing@openbsd.org
2018-02-08
*
upstream commit
deraadt@openbsd.org
2017-06-01
*
upstream commit
markus@openbsd.org
2017-05-31
*
upstream commit
djm@openbsd.org
2016-11-06
*
upstream commit
djm@openbsd.org
2016-02-12
*
upstream commit
djm@openbsd.org
2015-07-20
*
upstream commit
djm@openbsd.org
2015-07-20
*
upstream commit
djm@openbsd.org
2015-05-27
*
upstream commit
deraadt@openbsd.org
2015-04-29
*
upstream commit
deraadt@openbsd.org
2015-02-05
*
upstream commit
djm@openbsd.org
2015-02-03
*
upstream commit
djm@openbsd.org
2015-01-15
*
- djm@cvs.openbsd.org 2014/06/24 01:13:21
Damien Miller
2014-07-02
*
- djm@cvs.openbsd.org 2014/05/02 03:27:54
Damien Miller
2014-05-15
*
- djm@cvs.openbsd.org 2014/03/26 04:55:35
Damien Miller
2014-04-20
*
- markus@cvs.openbsd.org 2013/11/13 13:48:20
Damien Miller
2013-11-21
*
- djm@cvs.openbsd.org 2013/11/06 23:05:59
Damien Miller
2013-11-07
*
- (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5)
Damien Miller
2013-11-07
*
- markus@cvs.openbsd.org 2013/11/02 20:03:54
Damien Miller
2013-11-04
*
- djm@cvs.openbsd.org 2013/07/12 00:20:00
Damien Miller
2013-07-18
[next]