summaryrefslogtreecommitdiffstats
path: root/ssh-pkcs11.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: remove unneeded semicolons; checked by millert@jsg@openbsd.org2024-09-241-3/+3
* upstream: Convert RSA and ECDSA key to the libcrypto EVP_PKEY API.djm@openbsd.org2024-08-151-13/+29
* upstream: Oops, incorrect hex conversion spotted by claudio.deraadt@openbsd.org2024-04-301-5/+4
* upstream: Remove unused ptr[3] char array in pkcs11_decode_hex.claudio@openbsd.org2024-04-301-3/+1
* upstream: Replace non-idiomatic strtoul(, 16) to parse a regionderaadt@openbsd.org2024-04-301-5/+21
* upstream: don't incorrectly truncate logged strings retrieved fromdjm@openbsd.org2023-07-281-20/+19
* upstream: Ensure FIDO/PKCS11 libraries contain expected symbolsdjm@openbsd.org2023-07-191-1/+5
* upstream: terminate process if requested to load a PKCS#11 providerdjm@openbsd.org2023-07-191-5/+3
* upstream: ssh-pkcs11: synchronize error messages with errorstb@openbsd.org2023-03-081-4/+4
* upstream: avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (wedjm@openbsd.org2021-11-181-4/+5
* make OPENSSL_HAS_ECC checks more thoroughDamien Miller2021-10-011-13/+13
* upstream: remove a bunch of %p in format strings; leftovers ofdjm@openbsd.org2021-08-111-9/+9
* upstream: fix decoding of X.509 subject name; from Leif Thuressondjm@openbsd.org2021-06-251-2/+2
* upstream: when loading PKCS#11 keys, include the key fingerprintsdjm@openbsd.org2020-11-271-3/+22
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-42/+35
* upstream: fix compilation on !HAVE_DLOPEN platforms; stub functiondjm@openbsd.org2020-05-291-2/+3
* upstream: improve error messages for some common PKCS#11 C_Logindjm@openbsd.org2020-03-141-4/+19
* upstream: pkcs11_register_provider: return < 0 on error; ok djmmarkus@openbsd.org2020-03-131-1/+3
* upstream: expose PKCS#11 key labels/X.509 subjects as commentsdjm@openbsd.org2020-01-251-53/+89
* upstream: revert unconditional forced login implemented in r1.41 ofdjm@openbsd.org2019-10-011-26/+5
* upstream: if a PKCS#11 token returns no keys then try to login anddjm@openbsd.org2019-09-051-11/+33
* upstream: downgrade PKCS#11 "provider returned no slots" warningdjm@openbsd.org2019-09-021-2/+2
* Add headers to prevent warnings w/out OpenSSL.Darren Tucker2019-07-231-0/+8
* Fix building w/out ECC.Darren Tucker2019-05-171-0/+4
* Whitespace resync w/OpenBSD.Darren Tucker2019-04-261-9/+9
* upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFLmarkus@openbsd.org2019-03-261-1/+3
* upstream: fix NULL-deref crash in PKCS#11 code when attemptingdjm@openbsd.org2019-02-051-2/+17
* upstream: Correct some bugs in PKCS#11 token PIN handling atdjm@openbsd.org2019-01-221-12/+22
* upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE bydjm@openbsd.org2019-01-221-26/+95
* fix previous testDamien Miller2019-01-211-1/+1
* Wrap ECC static globals in EC_KEY_METHOD_NEW too.Darren Tucker2019-01-211-0/+2
* upstream: always print the caller's error message in ossl_error(),djm@openbsd.org2019-01-211-2/+3
* upstream: get the ex_data (pkcs11_key object) back from the keys atdjm@openbsd.org2019-01-211-9/+8
* Fix -Wunused when compiling PKCS#11 without ECDSADamien Miller2019-01-211-0/+2
* upstream: use ECDSA_SIG_set0() instead of poking signature values intodjm@openbsd.org2019-01-211-3/+14
* remove HAVE_DLOPEN that snuck inDamien Miller2019-01-211-4/+2
* conditionalise ECDSA PKCS#11 supportDamien Miller2019-01-211-0/+10
* upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHODdjm@openbsd.org2019-01-211-7/+3
* upstream: KNF previous; from markus@djm@openbsd.org2019-01-211-6/+6
* upstream: use OpenSSL's RSA reference counting hooks todjm@openbsd.org2019-01-211-35/+21
* upstream: make the PKCS#11 RSA code more like the new PKCS#11djm@openbsd.org2019-01-211-16/+29
* upstream: fix leak of ECDSA pkcs11_key objectsdjm@openbsd.org2019-01-211-2/+21
* upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access ofdjm@openbsd.org2019-01-211-4/+3
* upstream: cleanup PKCS#11 ECDSA pubkey loading: the returneddjm@openbsd.org2019-01-211-10/+14
* upstream: cleanup unnecessary code in ECDSA pkcs#11 signaturedjm@openbsd.org2019-01-211-25/+16
* upstream: add support for ECDSA keys in PKCS#11 tokensdjm@openbsd.org2019-01-211-213/+1161
* adapt -portable to OpenSSL 1.1x APIDamien Miller2018-09-131-0/+1
* upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org2018-09-131-15/+40
* upstream commitjsing@openbsd.org2018-02-071-3/+2
* upstream commitderaadt@openbsd.org2017-06-011-3/+3