Ben Lindstrom
|
c2c6cbc527
|
- markus@cvs.openbsd.org 2002/03/24 18:05:29
[scard.c]
we need to figure out AUT0 for sc_private_encrypt, too
|
2002-03-26 02:44:44 +00:00 |
Ben Lindstrom
|
266ec63eb3
|
- rees@cvs.openbsd.org 2002/03/21 21:54:34
[scard.c scard.h ssh-keygen.c]
Add PIN-protection for secret key.
|
2002-03-22 03:47:38 +00:00 |
Ben Lindstrom
|
818659a163
|
- rees@cvs.openbsd.org 2002/03/21 18:08:15
[scard.c]
In sc_put_key(), sc_reader_id should be id.
|
2002-03-22 03:38:35 +00:00 |
Ben Lindstrom
|
70e3ad8231
|
- markus@cvs.openbsd.org 2002/03/21 16:57:15
[scard.c]
remove const
|
2002-03-22 03:33:43 +00:00 |
Ben Lindstrom
|
0b675b1659
|
- markus@cvs.openbsd.org 2002/03/21 16:38:06
[scard.c]
make compile w/ openssl 0.9.7
|
2002-03-22 03:28:11 +00:00 |
Damien Miller
|
da7551677b
|
- markus@cvs.openbsd.org 2001/12/27 18:22:16
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
call fatal() for openssl allocation failures
|
2002-01-22 23:09:22 +11:00 |
Damien Miller
|
9f0f5c64bc
|
- deraadt@cvs.openbsd.org 2001/12/19 07:18:56
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h]
[auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c]
[cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c]
[match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c]
[servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c]
[sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c]
[sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config]
[ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c]
basic KNF done while i was looking for something else
|
2001-12-21 14:45:46 +11:00 |
Damien Miller
|
3ff36d6ce2
|
- (djm) OpenBSD CVS sync:
- djm@cvs.openbsd.org 2001/09/28 09:49:31
[scard.c]
Fix segv when smartcard communication error occurs during key load.
ok markus@
|
2001-09-28 19:51:54 +10:00 |
Ben Lindstrom
|
a2fec90e05
|
- markus@cvs.openbsd.org 2001/09/17 20:22:14
[scard.c]
never keep a connection to the smartcard open.
allows ssh-keygen -D U while the agent is running; report from jakob@
|
2001-09-18 05:45:44 +00:00 |
Damien Miller
|
85de580adc
|
- (djm) Configure support for smartcards
|
2001-09-18 14:01:11 +10:00 |
Ben Lindstrom
|
bcc1808bf2
|
- jakob@cvs.openbsd.org 2001/08/02 16:14:05
[scard.c ssh-agent.c ssh.c ssh-keygen.c]
clean up some /* SMARTCARD */. ok markus@
|
2001-08-06 21:59:25 +00:00 |
Ben Lindstrom
|
a6c8a8d4d5
|
- markus@cvs.openbsd.org 2001/08/01 23:38:45
[scard.c ssh.c]
support finish rsa keys.
free public keys after login -> call finish -> close smartcard.
|
2001-08-06 21:42:00 +00:00 |
Ben Lindstrom
|
f7db3bb64c
|
- markus@cvs.openbsd.org 2001/08/01 22:03:33
[authfd.c authfd.h readconf.c readconf.h scard.c scard.h ssh-add.c
ssh-agent.c ssh.c]
use strings instead of ints for smartcard reader ids
|
2001-08-06 21:35:51 +00:00 |
Ben Lindstrom
|
3ab1dfa2a6
|
- jakob@cvs.openbsd.org 2001/07/31 12:53:34
[scard.c]
close smartcard connection if card is missing
|
2001-08-06 21:33:44 +00:00 |
Ben Lindstrom
|
94baf30d14
|
- jakob@cvs.openbsd.org 2001/07/31 08:41:10
[scard.c]
do not complain about missing smartcards. ok markus@
|
2001-08-06 21:25:38 +00:00 |
Ben Lindstrom
|
30b00be24f
|
- jakob@cvs.openbsd.org 2001/07/30 16:06:07
[scard.c scard.h]
better errorcodes from sc_*; ok markus@
|
2001-08-06 21:22:10 +00:00 |
Ben Lindstrom
|
60df8e4f7d
|
- rees@cvs.openbsd.org 2001/07/26 20:04:27
[scard.c ssh-keygen.c]
Inquire Cyberflex class for 0xf0 cards
change aid to conform to 7816-5
remove gratuitous fid selects
|
2001-08-06 21:10:52 +00:00 |
Ben Lindstrom
|
f9bedf1441
|
- markus@cvs.openbsd.org 2001/07/25 11:59:35
[scard.c]
typo in comment
|
2001-08-06 21:05:05 +00:00 |
Damien Miller
|
694be4b1d5
|
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/07/04 23:13:10
[scard.c scard.h ssh-agent.c]
handle card removal more gracefully, add sc_close() to scard.h
|
2001-07-14 12:13:26 +10:00 |
Ben Lindstrom
|
3133dbbdba
|
- (bal) forget a few new files in sync up.
|
2001-07-04 05:35:00 +00:00 |