index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
ssh-pkcs11.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: Convert RSA and ECDSA key to the libcrypto EVP_PKEY API.
djm@openbsd.org
2024-08-15
1
-13
/
+29
*
upstream: Oops, incorrect hex conversion spotted by claudio.
deraadt@openbsd.org
2024-04-30
1
-5
/
+4
*
upstream: Remove unused ptr[3] char array in pkcs11_decode_hex.
claudio@openbsd.org
2024-04-30
1
-3
/
+1
*
upstream: Replace non-idiomatic strtoul(, 16) to parse a region
deraadt@openbsd.org
2024-04-30
1
-5
/
+21
*
upstream: don't incorrectly truncate logged strings retrieved from
djm@openbsd.org
2023-07-28
1
-20
/
+19
*
upstream: Ensure FIDO/PKCS11 libraries contain expected symbols
djm@openbsd.org
2023-07-19
1
-1
/
+5
*
upstream: terminate process if requested to load a PKCS#11 provider
djm@openbsd.org
2023-07-19
1
-5
/
+3
*
upstream: ssh-pkcs11: synchronize error messages with errors
tb@openbsd.org
2023-03-08
1
-4
/
+4
*
upstream: avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (we
djm@openbsd.org
2021-11-18
1
-4
/
+5
*
make OPENSSL_HAS_ECC checks more thorough
Damien Miller
2021-10-01
1
-13
/
+13
*
upstream: remove a bunch of %p in format strings; leftovers of
djm@openbsd.org
2021-08-11
1
-9
/
+9
*
upstream: fix decoding of X.509 subject name; from Leif Thuresson
djm@openbsd.org
2021-06-25
1
-2
/
+2
*
upstream: when loading PKCS#11 keys, include the key fingerprints
djm@openbsd.org
2020-11-27
1
-3
/
+22
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-42
/
+35
*
upstream: fix compilation on !HAVE_DLOPEN platforms; stub function
djm@openbsd.org
2020-05-29
1
-2
/
+3
*
upstream: improve error messages for some common PKCS#11 C_Login
djm@openbsd.org
2020-03-14
1
-4
/
+19
*
upstream: pkcs11_register_provider: return < 0 on error; ok djm
markus@openbsd.org
2020-03-13
1
-1
/
+3
*
upstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org
2020-01-25
1
-53
/
+89
*
upstream: revert unconditional forced login implemented in r1.41 of
djm@openbsd.org
2019-10-01
1
-26
/
+5
*
upstream: if a PKCS#11 token returns no keys then try to login and
djm@openbsd.org
2019-09-05
1
-11
/
+33
*
upstream: downgrade PKCS#11 "provider returned no slots" warning
djm@openbsd.org
2019-09-02
1
-2
/
+2
*
Add headers to prevent warnings w/out OpenSSL.
Darren Tucker
2019-07-23
1
-0
/
+8
*
Fix building w/out ECC.
Darren Tucker
2019-05-17
1
-0
/
+4
*
Whitespace resync w/OpenBSD.
Darren Tucker
2019-04-26
1
-9
/
+9
*
upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
markus@openbsd.org
2019-03-26
1
-1
/
+3
*
upstream: fix NULL-deref crash in PKCS#11 code when attempting
djm@openbsd.org
2019-02-05
1
-2
/
+17
*
upstream: Correct some bugs in PKCS#11 token PIN handling at
djm@openbsd.org
2019-01-22
1
-12
/
+22
*
upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
djm@openbsd.org
2019-01-22
1
-26
/
+95
*
fix previous test
Damien Miller
2019-01-21
1
-1
/
+1
*
Wrap ECC static globals in EC_KEY_METHOD_NEW too.
Darren Tucker
2019-01-21
1
-0
/
+2
*
upstream: always print the caller's error message in ossl_error(),
djm@openbsd.org
2019-01-21
1
-2
/
+3
*
upstream: get the ex_data (pkcs11_key object) back from the keys at
djm@openbsd.org
2019-01-21
1
-9
/
+8
*
Fix -Wunused when compiling PKCS#11 without ECDSA
Damien Miller
2019-01-21
1
-0
/
+2
*
upstream: use ECDSA_SIG_set0() instead of poking signature values into
djm@openbsd.org
2019-01-21
1
-3
/
+14
*
remove HAVE_DLOPEN that snuck in
Damien Miller
2019-01-21
1
-4
/
+2
*
conditionalise ECDSA PKCS#11 support
Damien Miller
2019-01-21
1
-0
/
+10
*
upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
djm@openbsd.org
2019-01-21
1
-7
/
+3
*
upstream: KNF previous; from markus@
djm@openbsd.org
2019-01-21
1
-6
/
+6
*
upstream: use OpenSSL's RSA reference counting hooks to
djm@openbsd.org
2019-01-21
1
-35
/
+21
*
upstream: make the PKCS#11 RSA code more like the new PKCS#11
djm@openbsd.org
2019-01-21
1
-16
/
+29
*
upstream: fix leak of ECDSA pkcs11_key objects
djm@openbsd.org
2019-01-21
1
-2
/
+21
*
upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access of
djm@openbsd.org
2019-01-21
1
-4
/
+3
*
upstream: cleanup PKCS#11 ECDSA pubkey loading: the returned
djm@openbsd.org
2019-01-21
1
-10
/
+14
*
upstream: cleanup unnecessary code in ECDSA pkcs#11 signature
djm@openbsd.org
2019-01-21
1
-25
/
+16
*
upstream: add support for ECDSA keys in PKCS#11 tokens
djm@openbsd.org
2019-01-21
1
-213
/
+1161
*
adapt -portable to OpenSSL 1.1x API
Damien Miller
2018-09-13
1
-0
/
+1
*
upstream: hold our collective noses and use the openssl-1.1.x API in
djm@openbsd.org
2018-09-13
1
-15
/
+40
*
upstream commit
jsing@openbsd.org
2018-02-07
1
-3
/
+2
*
upstream commit
deraadt@openbsd.org
2017-06-01
1
-3
/
+3
*
upstream commit
markus@openbsd.org
2017-05-31
1
-2
/
+3
[next]