aboutsummaryrefslogtreecommitdiff
path: root/ssh-pkcs11.c
AgeCommit message (Expand)Author
2023-07-28upstream: don't incorrectly truncate logged strings retrieved fromdjm@openbsd.org
2023-07-20upstream: Ensure FIDO/PKCS11 libraries contain expected symbolsdjm@openbsd.org
2023-07-20upstream: terminate process if requested to load a PKCS#11 providerdjm@openbsd.org
2023-03-08upstream: ssh-pkcs11: synchronize error messages with errorstb@openbsd.org
2021-11-19upstream: avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (wedjm@openbsd.org
2021-10-01make OPENSSL_HAS_ECC checks more thoroughDamien Miller
2021-08-11upstream: remove a bunch of %p in format strings; leftovers ofdjm@openbsd.org
2021-06-25upstream: fix decoding of X.509 subject name; from Leif Thuressondjm@openbsd.org
2020-11-27upstream: when loading PKCS#11 keys, include the key fingerprintsdjm@openbsd.org
2020-10-18upstream: use the new variant log macros instead of prependingdjm@openbsd.org
2020-05-29upstream: fix compilation on !HAVE_DLOPEN platforms; stub functiondjm@openbsd.org
2020-03-14upstream: improve error messages for some common PKCS#11 C_Logindjm@openbsd.org
2020-03-13upstream: pkcs11_register_provider: return < 0 on error; ok djmmarkus@openbsd.org
2020-01-25upstream: expose PKCS#11 key labels/X.509 subjects as commentsdjm@openbsd.org
2019-10-01upstream: revert unconditional forced login implemented in r1.41 ofdjm@openbsd.org
2019-09-05upstream: if a PKCS#11 token returns no keys then try to login anddjm@openbsd.org
2019-09-02upstream: downgrade PKCS#11 "provider returned no slots" warningdjm@openbsd.org
2019-07-23Add headers to prevent warnings w/out OpenSSL.Darren Tucker
2019-05-17Fix building w/out ECC.Darren Tucker
2019-04-26Whitespace resync w/OpenBSD.Darren Tucker
2019-03-26upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFLmarkus@openbsd.org
2019-02-05upstream: fix NULL-deref crash in PKCS#11 code when attemptingdjm@openbsd.org
2019-01-22upstream: Correct some bugs in PKCS#11 token PIN handling atdjm@openbsd.org
2019-01-22upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE bydjm@openbsd.org
2019-01-21fix previous testDamien Miller
2019-01-21Wrap ECC static globals in EC_KEY_METHOD_NEW too.Darren Tucker
2019-01-21upstream: always print the caller's error message in ossl_error(),djm@openbsd.org
2019-01-21upstream: get the ex_data (pkcs11_key object) back from the keys atdjm@openbsd.org
2019-01-21Fix -Wunused when compiling PKCS#11 without ECDSADamien Miller
2019-01-21upstream: use ECDSA_SIG_set0() instead of poking signature values intodjm@openbsd.org
2019-01-21remove HAVE_DLOPEN that snuck inDamien Miller
2019-01-21conditionalise ECDSA PKCS#11 supportDamien Miller
2019-01-21upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHODdjm@openbsd.org
2019-01-21upstream: KNF previous; from markus@djm@openbsd.org
2019-01-21upstream: use OpenSSL's RSA reference counting hooks todjm@openbsd.org
2019-01-21upstream: make the PKCS#11 RSA code more like the new PKCS#11djm@openbsd.org
2019-01-21upstream: fix leak of ECDSA pkcs11_key objectsdjm@openbsd.org
2019-01-21upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access ofdjm@openbsd.org
2019-01-21upstream: cleanup PKCS#11 ECDSA pubkey loading: the returneddjm@openbsd.org
2019-01-21upstream: cleanup unnecessary code in ECDSA pkcs#11 signaturedjm@openbsd.org
2019-01-21upstream: add support for ECDSA keys in PKCS#11 tokensdjm@openbsd.org
2018-09-13adapt -portable to OpenSSL 1.1x APIDamien Miller
2018-09-13upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org
2018-02-08upstream commitjsing@openbsd.org
2017-06-01upstream commitderaadt@openbsd.org
2017-05-31upstream commitmarkus@openbsd.org
2016-11-06upstream commitdjm@openbsd.org
2016-02-12upstream commitdjm@openbsd.org
2015-07-20upstream commitdjm@openbsd.org
2015-07-20upstream commitdjm@openbsd.org