Jeff Johnson
|
43d66bd67e
Round 1 of fixes and integrration of backports.
|
3 years ago |
Jeff Johnson
|
af5defb95a
Backport 19af04e2231155d513e24fdc81fbec2217ae36a6
|
3 years ago |
Jeff Johnson
|
4745c0fbd8
Initial porting of IBM and Red Hat modifications.
|
3 years ago |
djm@openbsd.org
|
4c60724405
upstream: fix compilation on !HAVE_DLOPEN platforms; stub function
|
4 years ago |
djm@openbsd.org
|
1d89232a4a
upstream: improve error messages for some common PKCS#11 C_Login
|
4 years ago |
markus@openbsd.org
|
31c860a021
upstream: pkcs11_register_provider: return < 0 on error; ok djm
|
4 years ago |
djm@openbsd.org
|
89a8d4525e
upstream: expose PKCS#11 key labels/X.509 subjects as comments
|
4 years ago |
djm@openbsd.org
|
084682786d
upstream: revert unconditional forced login implemented in r1.41 of
|
5 years ago |
djm@openbsd.org
|
7d6034bd02
upstream: if a PKCS#11 token returns no keys then try to login and
|
5 years ago |
djm@openbsd.org
|
b52c0c2e64
upstream: downgrade PKCS#11 "provider returned no slots" warning
|
5 years ago |
Darren Tucker
|
9634ffbf29
Add headers to prevent warnings w/out OpenSSL.
|
5 years ago |
Darren Tucker
|
97370f6c2c
Fix building w/out ECC.
|
5 years ago |
Darren Tucker
|
5590f53f99
Whitespace resync w/OpenBSD.
|
5 years ago |
markus@openbsd.org
|
2aee9a49f6
upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
|
5 years ago |
djm@openbsd.org
|
7a7fdca78d
upstream: fix NULL-deref crash in PKCS#11 code when attempting
|
5 years ago |
djm@openbsd.org
|
41923ce06a
upstream: Correct some bugs in PKCS#11 token PIN handling at
|
6 years ago |
djm@openbsd.org
|
2162171ad5
upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
|
6 years ago |
Damien Miller
|
23490a6c97
fix previous test
|
6 years ago |
Darren Tucker
|
b6dd3277f2
Wrap ECC static globals in EC_KEY_METHOD_NEW too.
|
6 years ago |
djm@openbsd.org
|
662be40c62
upstream: always print the caller's error message in ossl_error(),
|
6 years ago |
djm@openbsd.org
|
ce46c3a077
upstream: get the ex_data (pkcs11_key object) back from the keys at
|
6 years ago |
Damien Miller
|
2efcf812b4
Fix -Wunused when compiling PKCS#11 without ECDSA
|
6 years ago |
djm@openbsd.org
|
632976418d
upstream: use ECDSA_SIG_set0() instead of poking signature values into
|
6 years ago |
Damien Miller
|
5de6ac2bad
remove HAVE_DLOPEN that snuck in
|
6 years ago |
Damien Miller
|
e2cb445d78
conditionalise ECDSA PKCS#11 support
|
6 years ago |
djm@openbsd.org
|
fcb1b09371
upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
|
6 years ago |
djm@openbsd.org
|
6529409e85
upstream: KNF previous; from markus@
|
6 years ago |
djm@openbsd.org
|
58622a8c82
upstream: use OpenSSL's RSA reference counting hooks to
|
6 years ago |
djm@openbsd.org
|
f118542fc8
upstream: make the PKCS#11 RSA code more like the new PKCS#11
|
6 years ago |
djm@openbsd.org
|
445cfce49d
upstream: fix leak of ECDSA pkcs11_key objects
|
6 years ago |