- 21 Apr, 2017 1 commit
-
-
Mukund Sivaraman authored
Reject incorrect RSA key lengths during key generation and and sign/verify context creation (#45043)
-
- 05 Jan, 2017 1 commit
-
-
Tinderbox User authored
-
- 04 Jan, 2017 1 commit
-
-
Evan Hunt authored
4547. [port] Add support for --enable-native-pkcs11 on the AEP Keyper HSM. [RT #42463]
-
- 18 Aug, 2016 1 commit
-
-
Mark Andrews authored
the specific PKCS11 providers capabilities. [RT #42458]
-
- 27 Jun, 2016 1 commit
-
-
Mark Andrews authored
-
- 04 May, 2016 1 commit
-
-
Evan Hunt authored
4353. [cleanup] Update PKCS#11 header files. [RT #42175]
-
- 18 Aug, 2015 1 commit
-
-
Evan Hunt authored
4183. [cleanup] Use timing-safe memory comparisons in cryptographic code. Also, the timing-safe comparison functions have been renamed to avoid possible confusion with memcmp(). [RT #40148]
-
- 07 Aug, 2015 1 commit
-
-
Evan Hunt authored
4168. [security] A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys. (CVE-2015-5722) [RT #40212]
-
- 17 Apr, 2015 1 commit
-
-
Francis Dupont authored
-
- 13 Mar, 2014 1 commit
-
-
Evan Hunt authored
3786. [func] Provide more detailed error codes when using native PKCS#11. "pkcs11-tokens" now fails robustly rather than asserting when run against an HSM with an incomplete PCKS#11 API implementation. [RT #35479]
-
- 12 Feb, 2014 1 commit
-
-
Evan Hunt authored
3735. [cleanup] Merged the libiscpk11 library into libisc to simplify dependencies. [RT #35205]
-
- 31 Jan, 2014 1 commit
-
-
Evan Hunt authored
3723. [cleanup] Imported keys are now handled the same way regardless of DNSSEC algorithm. [RT #35215]
-
- 21 Jan, 2014 1 commit
-
-
Evan Hunt authored
-
- 18 Jan, 2014 1 commit
-
-
Evan Hunt authored
-
- 16 Jan, 2014 1 commit
-
-
Mark Andrews authored
-
- 14 Jan, 2014 1 commit
-
-
Evan Hunt authored
3705. [func] "configure --enable-native-pkcs11" enables BIND to use the PKCS#11 API for all cryptographic functions, so that it can drive a hardware service module directly without the need to use a modified OpenSSL as intermediary (so long as the HSM's vendor provides a complete-enough implementation of the PKCS#11 interface). This has been tested successfully with the Thales nShield HSM and with SoftHSMv2 from the OpenDNSSEC project. [RT #29031]
-