index
:
openssh
master
Debian dgit repo for package openssh
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
ssh-pkcs11.c
Commit message (
Expand
)
Author
Age
*
upstream: avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (we
djm@openbsd.org
2021-11-19
*
make OPENSSL_HAS_ECC checks more thorough
Damien Miller
2021-10-01
*
upstream: remove a bunch of %p in format strings; leftovers of
djm@openbsd.org
2021-08-11
*
upstream: fix decoding of X.509 subject name; from Leif Thuresson
djm@openbsd.org
2021-06-25
*
upstream: when loading PKCS#11 keys, include the key fingerprints
djm@openbsd.org
2020-11-27
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
*
upstream: fix compilation on !HAVE_DLOPEN platforms; stub function
djm@openbsd.org
2020-05-29
*
upstream: improve error messages for some common PKCS#11 C_Login
djm@openbsd.org
2020-03-14
*
upstream: pkcs11_register_provider: return < 0 on error; ok djm
markus@openbsd.org
2020-03-13
*
upstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org
2020-01-25
*
upstream: revert unconditional forced login implemented in r1.41 of
djm@openbsd.org
2019-10-01
*
upstream: if a PKCS#11 token returns no keys then try to login and
djm@openbsd.org
2019-09-05
*
upstream: downgrade PKCS#11 "provider returned no slots" warning
djm@openbsd.org
2019-09-02
*
Add headers to prevent warnings w/out OpenSSL.
Darren Tucker
2019-07-23
*
Fix building w/out ECC.
Darren Tucker
2019-05-17
*
Whitespace resync w/OpenBSD.
Darren Tucker
2019-04-26
*
upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
markus@openbsd.org
2019-03-26
*
upstream: fix NULL-deref crash in PKCS#11 code when attempting
djm@openbsd.org
2019-02-05
*
upstream: Correct some bugs in PKCS#11 token PIN handling at
djm@openbsd.org
2019-01-22
*
upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
djm@openbsd.org
2019-01-22
*
fix previous test
Damien Miller
2019-01-21
*
Wrap ECC static globals in EC_KEY_METHOD_NEW too.
Darren Tucker
2019-01-21
*
upstream: always print the caller's error message in ossl_error(),
djm@openbsd.org
2019-01-21
*
upstream: get the ex_data (pkcs11_key object) back from the keys at
djm@openbsd.org
2019-01-21
*
Fix -Wunused when compiling PKCS#11 without ECDSA
Damien Miller
2019-01-21
*
upstream: use ECDSA_SIG_set0() instead of poking signature values into
djm@openbsd.org
2019-01-21
*
remove HAVE_DLOPEN that snuck in
Damien Miller
2019-01-21
*
conditionalise ECDSA PKCS#11 support
Damien Miller
2019-01-21
*
upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
djm@openbsd.org
2019-01-21
*
upstream: KNF previous; from markus@
djm@openbsd.org
2019-01-21
*
upstream: use OpenSSL's RSA reference counting hooks to
djm@openbsd.org
2019-01-21
*
upstream: make the PKCS#11 RSA code more like the new PKCS#11
djm@openbsd.org
2019-01-21
*
upstream: fix leak of ECDSA pkcs11_key objects
djm@openbsd.org
2019-01-21
*
upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access of
djm@openbsd.org
2019-01-21
*
upstream: cleanup PKCS#11 ECDSA pubkey loading: the returned
djm@openbsd.org
2019-01-21
*
upstream: cleanup unnecessary code in ECDSA pkcs#11 signature
djm@openbsd.org
2019-01-21
*
upstream: add support for ECDSA keys in PKCS#11 tokens
djm@openbsd.org
2019-01-21
*
adapt -portable to OpenSSL 1.1x API
Damien Miller
2018-09-13
*
upstream: hold our collective noses and use the openssl-1.1.x API in
djm@openbsd.org
2018-09-13
*
upstream commit
jsing@openbsd.org
2018-02-08
*
upstream commit
deraadt@openbsd.org
2017-06-01
*
upstream commit
markus@openbsd.org
2017-05-31
*
upstream commit
djm@openbsd.org
2016-11-06
*
upstream commit
djm@openbsd.org
2016-02-12
*
upstream commit
djm@openbsd.org
2015-07-20
*
upstream commit
djm@openbsd.org
2015-07-20
*
upstream commit
djm@openbsd.org
2015-05-27
*
upstream commit
deraadt@openbsd.org
2015-04-29
*
upstream commit
deraadt@openbsd.org
2015-02-05
*
upstream commit
djm@openbsd.org
2015-02-03
[next]