summaryrefslogtreecommitdiffstats
path: root/ssh-pkcs11.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: when loading PKCS#11 keys, include the key fingerprintsdjm@openbsd.org2020-11-271-3/+22
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-42/+35
* upstream: fix compilation on !HAVE_DLOPEN platforms; stub functiondjm@openbsd.org2020-05-291-2/+3
* upstream: improve error messages for some common PKCS#11 C_Logindjm@openbsd.org2020-03-141-4/+19
* upstream: pkcs11_register_provider: return < 0 on error; ok djmmarkus@openbsd.org2020-03-131-1/+3
* upstream: expose PKCS#11 key labels/X.509 subjects as commentsdjm@openbsd.org2020-01-251-53/+89
* upstream: revert unconditional forced login implemented in r1.41 ofdjm@openbsd.org2019-10-011-26/+5
* upstream: if a PKCS#11 token returns no keys then try to login anddjm@openbsd.org2019-09-051-11/+33
* upstream: downgrade PKCS#11 "provider returned no slots" warningdjm@openbsd.org2019-09-021-2/+2
* Add headers to prevent warnings w/out OpenSSL.Darren Tucker2019-07-231-0/+8
* Fix building w/out ECC.Darren Tucker2019-05-171-0/+4
* Whitespace resync w/OpenBSD.Darren Tucker2019-04-261-9/+9
* upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFLmarkus@openbsd.org2019-03-261-1/+3
* upstream: fix NULL-deref crash in PKCS#11 code when attemptingdjm@openbsd.org2019-02-051-2/+17
* upstream: Correct some bugs in PKCS#11 token PIN handling atdjm@openbsd.org2019-01-221-12/+22
* upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE bydjm@openbsd.org2019-01-221-26/+95
* fix previous testDamien Miller2019-01-211-1/+1
* Wrap ECC static globals in EC_KEY_METHOD_NEW too.Darren Tucker2019-01-211-0/+2
* upstream: always print the caller's error message in ossl_error(),djm@openbsd.org2019-01-211-2/+3
* upstream: get the ex_data (pkcs11_key object) back from the keys atdjm@openbsd.org2019-01-211-9/+8
* Fix -Wunused when compiling PKCS#11 without ECDSADamien Miller2019-01-211-0/+2
* upstream: use ECDSA_SIG_set0() instead of poking signature values intodjm@openbsd.org2019-01-211-3/+14
* remove HAVE_DLOPEN that snuck inDamien Miller2019-01-211-4/+2
* conditionalise ECDSA PKCS#11 supportDamien Miller2019-01-211-0/+10
* upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHODdjm@openbsd.org2019-01-211-7/+3
* upstream: KNF previous; from markus@djm@openbsd.org2019-01-211-6/+6
* upstream: use OpenSSL's RSA reference counting hooks todjm@openbsd.org2019-01-211-35/+21
* upstream: make the PKCS#11 RSA code more like the new PKCS#11djm@openbsd.org2019-01-211-16/+29
* upstream: fix leak of ECDSA pkcs11_key objectsdjm@openbsd.org2019-01-211-2/+21
* upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access ofdjm@openbsd.org2019-01-211-4/+3
* upstream: cleanup PKCS#11 ECDSA pubkey loading: the returneddjm@openbsd.org2019-01-211-10/+14
* upstream: cleanup unnecessary code in ECDSA pkcs#11 signaturedjm@openbsd.org2019-01-211-25/+16
* upstream: add support for ECDSA keys in PKCS#11 tokensdjm@openbsd.org2019-01-211-213/+1161
* adapt -portable to OpenSSL 1.1x APIDamien Miller2018-09-131-0/+1
* upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org2018-09-131-15/+40
* upstream commitjsing@openbsd.org2018-02-071-3/+2
* upstream commitderaadt@openbsd.org2017-06-011-3/+3
* upstream commitmarkus@openbsd.org2017-05-311-2/+3
* upstream commitdjm@openbsd.org2016-11-061-15/+26
* upstream commitdjm@openbsd.org2016-02-121-3/+5
* upstream commitdjm@openbsd.org2015-07-201-6/+14
* upstream commitdjm@openbsd.org2015-07-201-1/+6
* upstream commitdjm@openbsd.org2015-05-271-12/+20
* upstream commitderaadt@openbsd.org2015-04-291-2/+2
* upstream commitderaadt@openbsd.org2015-02-041-2/+2
* upstream commitdjm@openbsd.org2015-02-031-5/+7
* upstream commitdjm@openbsd.org2015-01-151-12/+12
* - djm@cvs.openbsd.org 2014/06/24 01:13:21Damien Miller2014-07-021-2/+2
* - djm@cvs.openbsd.org 2014/05/02 03:27:54Damien Miller2014-05-151-2/+2
* - djm@cvs.openbsd.org 2014/03/26 04:55:35Damien Miller2014-04-201-2/+2