index
:
openssh.git
master
sid
ssh_8.3
v7.9
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
ssh-pkcs11.c
Age
Commit message (
Expand
)
Author
2020-01-25
upstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org
2019-10-01
upstream: revert unconditional forced login implemented in r1.41 of
djm@openbsd.org
2019-09-05
upstream: if a PKCS#11 token returns no keys then try to login and
djm@openbsd.org
2019-09-02
upstream: downgrade PKCS#11 "provider returned no slots" warning
djm@openbsd.org
2019-07-23
Add headers to prevent warnings w/out OpenSSL.
Darren Tucker
2019-05-17
Fix building w/out ECC.
Darren Tucker
2019-04-26
Whitespace resync w/OpenBSD.
Darren Tucker
2019-03-26
upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
markus@openbsd.org
2019-02-05
upstream: fix NULL-deref crash in PKCS#11 code when attempting
djm@openbsd.org
2019-01-22
upstream: Correct some bugs in PKCS#11 token PIN handling at
djm@openbsd.org
2019-01-22
upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
djm@openbsd.org
2019-01-21
fix previous test
Damien Miller
2019-01-21
Wrap ECC static globals in EC_KEY_METHOD_NEW too.
Darren Tucker
2019-01-21
upstream: always print the caller's error message in ossl_error(),
djm@openbsd.org
2019-01-21
upstream: get the ex_data (pkcs11_key object) back from the keys at
djm@openbsd.org
2019-01-21
Fix -Wunused when compiling PKCS#11 without ECDSA
Damien Miller
2019-01-21
upstream: use ECDSA_SIG_set0() instead of poking signature values into
djm@openbsd.org
2019-01-21
remove HAVE_DLOPEN that snuck in
Damien Miller
2019-01-21
conditionalise ECDSA PKCS#11 support
Damien Miller
2019-01-21
upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
djm@openbsd.org
2019-01-21
upstream: KNF previous; from markus@
djm@openbsd.org
2019-01-21
upstream: use OpenSSL's RSA reference counting hooks to
djm@openbsd.org
2019-01-21
upstream: make the PKCS#11 RSA code more like the new PKCS#11
djm@openbsd.org
2019-01-21
upstream: fix leak of ECDSA pkcs11_key objects
djm@openbsd.org
2019-01-21
upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access of
djm@openbsd.org
2019-01-21
upstream: cleanup PKCS#11 ECDSA pubkey loading: the returned
djm@openbsd.org
2019-01-21
upstream: cleanup unnecessary code in ECDSA pkcs#11 signature
djm@openbsd.org
2019-01-21
upstream: add support for ECDSA keys in PKCS#11 tokens
djm@openbsd.org
2018-09-13
adapt -portable to OpenSSL 1.1x API
Damien Miller
2018-09-13
upstream: hold our collective noses and use the openssl-1.1.x API in
djm@openbsd.org
2018-02-08
upstream commit
jsing@openbsd.org
2017-06-01
upstream commit
deraadt@openbsd.org
2017-05-31
upstream commit
markus@openbsd.org
2016-11-06
upstream commit
djm@openbsd.org
2016-02-12
upstream commit
djm@openbsd.org
2015-07-20
upstream commit
djm@openbsd.org
2015-07-20
upstream commit
djm@openbsd.org
2015-05-27
upstream commit
djm@openbsd.org
2015-04-29
upstream commit
deraadt@openbsd.org
2015-02-05
upstream commit
deraadt@openbsd.org
2015-02-03
upstream commit
djm@openbsd.org
2015-01-15
upstream commit
djm@openbsd.org
2014-07-02
- djm@cvs.openbsd.org 2014/06/24 01:13:21
Damien Miller
2014-05-15
- djm@cvs.openbsd.org 2014/05/02 03:27:54
Damien Miller
2014-04-20
- djm@cvs.openbsd.org 2014/03/26 04:55:35
Damien Miller
2013-11-21
- markus@cvs.openbsd.org 2013/11/13 13:48:20
Damien Miller
2013-11-07
- djm@cvs.openbsd.org 2013/11/06 23:05:59
Damien Miller
2013-11-07
- (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5)
Damien Miller
2013-11-04
- markus@cvs.openbsd.org 2013/11/02 20:03:54
Damien Miller
2013-07-18
- djm@cvs.openbsd.org 2013/07/12 00:20:00
Damien Miller
[next]