index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
ssh-pkcs11.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: when loading PKCS#11 keys, include the key fingerprints
djm@openbsd.org
2020-11-27
1
-3
/
+22
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-42
/
+35
*
upstream: fix compilation on !HAVE_DLOPEN platforms; stub function
djm@openbsd.org
2020-05-29
1
-2
/
+3
*
upstream: improve error messages for some common PKCS#11 C_Login
djm@openbsd.org
2020-03-14
1
-4
/
+19
*
upstream: pkcs11_register_provider: return < 0 on error; ok djm
markus@openbsd.org
2020-03-13
1
-1
/
+3
*
upstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org
2020-01-25
1
-53
/
+89
*
upstream: revert unconditional forced login implemented in r1.41 of
djm@openbsd.org
2019-10-01
1
-26
/
+5
*
upstream: if a PKCS#11 token returns no keys then try to login and
djm@openbsd.org
2019-09-05
1
-11
/
+33
*
upstream: downgrade PKCS#11 "provider returned no slots" warning
djm@openbsd.org
2019-09-02
1
-2
/
+2
*
Add headers to prevent warnings w/out OpenSSL.
Darren Tucker
2019-07-23
1
-0
/
+8
*
Fix building w/out ECC.
Darren Tucker
2019-05-17
1
-0
/
+4
*
Whitespace resync w/OpenBSD.
Darren Tucker
2019-04-26
1
-9
/
+9
*
upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
markus@openbsd.org
2019-03-26
1
-1
/
+3
*
upstream: fix NULL-deref crash in PKCS#11 code when attempting
djm@openbsd.org
2019-02-05
1
-2
/
+17
*
upstream: Correct some bugs in PKCS#11 token PIN handling at
djm@openbsd.org
2019-01-22
1
-12
/
+22
*
upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
djm@openbsd.org
2019-01-22
1
-26
/
+95
*
fix previous test
Damien Miller
2019-01-21
1
-1
/
+1
*
Wrap ECC static globals in EC_KEY_METHOD_NEW too.
Darren Tucker
2019-01-21
1
-0
/
+2
*
upstream: always print the caller's error message in ossl_error(),
djm@openbsd.org
2019-01-21
1
-2
/
+3
*
upstream: get the ex_data (pkcs11_key object) back from the keys at
djm@openbsd.org
2019-01-21
1
-9
/
+8
*
Fix -Wunused when compiling PKCS#11 without ECDSA
Damien Miller
2019-01-21
1
-0
/
+2
*
upstream: use ECDSA_SIG_set0() instead of poking signature values into
djm@openbsd.org
2019-01-21
1
-3
/
+14
*
remove HAVE_DLOPEN that snuck in
Damien Miller
2019-01-21
1
-4
/
+2
*
conditionalise ECDSA PKCS#11 support
Damien Miller
2019-01-21
1
-0
/
+10
*
upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
djm@openbsd.org
2019-01-21
1
-7
/
+3
*
upstream: KNF previous; from markus@
djm@openbsd.org
2019-01-21
1
-6
/
+6
*
upstream: use OpenSSL's RSA reference counting hooks to
djm@openbsd.org
2019-01-21
1
-35
/
+21
*
upstream: make the PKCS#11 RSA code more like the new PKCS#11
djm@openbsd.org
2019-01-21
1
-16
/
+29
*
upstream: fix leak of ECDSA pkcs11_key objects
djm@openbsd.org
2019-01-21
1
-2
/
+21
*
upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access of
djm@openbsd.org
2019-01-21
1
-4
/
+3
*
upstream: cleanup PKCS#11 ECDSA pubkey loading: the returned
djm@openbsd.org
2019-01-21
1
-10
/
+14
*
upstream: cleanup unnecessary code in ECDSA pkcs#11 signature
djm@openbsd.org
2019-01-21
1
-25
/
+16
*
upstream: add support for ECDSA keys in PKCS#11 tokens
djm@openbsd.org
2019-01-21
1
-213
/
+1161
*
adapt -portable to OpenSSL 1.1x API
Damien Miller
2018-09-13
1
-0
/
+1
*
upstream: hold our collective noses and use the openssl-1.1.x API in
djm@openbsd.org
2018-09-13
1
-15
/
+40
*
upstream commit
jsing@openbsd.org
2018-02-07
1
-3
/
+2
*
upstream commit
deraadt@openbsd.org
2017-06-01
1
-3
/
+3
*
upstream commit
markus@openbsd.org
2017-05-31
1
-2
/
+3
*
upstream commit
djm@openbsd.org
2016-11-06
1
-15
/
+26
*
upstream commit
djm@openbsd.org
2016-02-12
1
-3
/
+5
*
upstream commit
djm@openbsd.org
2015-07-20
1
-6
/
+14
*
upstream commit
djm@openbsd.org
2015-07-20
1
-1
/
+6
*
upstream commit
djm@openbsd.org
2015-05-27
1
-12
/
+20
*
upstream commit
deraadt@openbsd.org
2015-04-29
1
-2
/
+2
*
upstream commit
deraadt@openbsd.org
2015-02-04
1
-2
/
+2
*
upstream commit
djm@openbsd.org
2015-02-03
1
-5
/
+7
*
upstream commit
djm@openbsd.org
2015-01-15
1
-12
/
+12
*
- djm@cvs.openbsd.org 2014/06/24 01:13:21
Damien Miller
2014-07-02
1
-2
/
+2
*
- djm@cvs.openbsd.org 2014/05/02 03:27:54
Damien Miller
2014-05-15
1
-2
/
+2
*
- djm@cvs.openbsd.org 2014/03/26 04:55:35
Damien Miller
2014-04-20
1
-2
/
+2
[next]