Displaying 11 results from an estimated 11 matches for "flens".
Did you mean:
lens
2003 May 27
3
[Bug 577] bug (wrong flag) in sc_private_decrypt (scard-opensc.c)
http://bugzilla.mindrot.org/show_bug.cgi?id=577
Summary: bug (wrong flag) in sc_private_decrypt (scard-opensc.c)
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Smartcard
AssignedTo: openssh-bugs at mindrot.org
2000 Jul 19
2
Why do I *still* need RSA?
OpenSSH Developers,
I'm researching whether or not OpenSSH is a viable commercial
alternative to F-SECURE SSH or SSH.COM's ssh, but I'm not getting the
kind of results that I expected from a "Non patent encumbered ssh
client".
When I attempt to build OpenSSH against an OpenSSL build without rc5,
idea, or rsa it bombs since OpenSSL doesn't place the header files in
the
2015 Mar 17
2
[patch] Updated patch for pkcs#11 smartcard readers that have a protected PIN path
Some smartcard readers have keypad to enter the PIN securely (i.e. such that it cannot be intercepted by a rogue (ssh) binary.
PKCS#11 allows for enforcing this in hardware. Below patch allows for SSH to make use of this; against head/master as of today.
Dw.
commit 7f0250a8ae6c639a19d4e1e24fc112d5e2e1249a
Author: Dirk-Willem van Gulik <dirkx at webweaving.org>
Date: Tue Mar 17
2010 Apr 23
1
Path simple menu integrated progress indicator
This patch modifies the simple menu com32 program to include integrated load progress. It also adds new options to the simple menu configuration
MENU LOADMSG -- allows the user to specify the text to display when loading
MENU LOADMSGROW -- controls where the text is written
Example configuration:
MENU LOADMSG Booting
MENU LOADMSGROW 25
It works with my setup, please let me know if you find
2015 Mar 31
7
Wanted: smartcard with ECDSA support
Hi list,
I have no idea if Damien Miller had the time to work on that.
I have an initial patch to authenticate using PKCS#11 and ECDSA keys.
This requires OpenSSL 1.0.2, prior OpenSSL versions do not expose the
required interfaces to override the signature function pointer for ECDSA.
The only limitation is that the OpenSSL API misses some cleanup function
(finish, for instance), hence I have yet
2009 Jul 14
1
matrix algebra in c
I'd like to use some matrix algebra in my c code that is called from R.
I need matrix multiplication, transposition, and Cholesky decomposition.
I haven't come across any easy way to do this, but from browsing the web
and R-devel a few options come to mind:
1. use F77_CALL() to call matrix multiplication functions from blas.
This should be ok as long as I remember that c and FORTRAN store
2016 Nov 16
3
[PATCH] ssh-pkcs11: allow providing unconditional pin code for PKCS11
Some HSM's such as Safenet Network HSM do not allow searching for keys
unauthenticated. To support such devices provide a mechanism for users
to provide a pin code that is always used to automatically log in to
the HSM when using PKCS11.
The pin code is read from a file specified by the environment variable
SSH_PKCS11_PINFILE if it is set.
Tested against Safenet Network HSM.
---
2020 Jun 04
2
[cfe-dev] Clang/LLVM function ABI lowering (was: Re: [RFC] Refactor Clang: move frontend/driver/diagnostics code to LLVM)
On 4 Jun 2020, at 0:54, James Y Knight via llvm-dev wrote:
> While MLIR may be one part of the solution, I think it's also the case
> that
> the function-ABI interface between Clang and LLVM is just wrong and
> should
> be fixed -- independently of whether Clang might use MLIR in the
> future.
>
> I've mentioned this idea before, I think, but never got around to
2016 Nov 11
10
[Bug 2638] New: Honor PKCS#11 CKA_ALWAYS_AUTHENTICATE attribute of the private objects
https://bugzilla.mindrot.org/show_bug.cgi?id=2638
Bug ID: 2638
Summary: Honor PKCS#11 CKA_ALWAYS_AUTHENTICATE attribute of the
private objects
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Keywords: patch
Severity: enhancement
2016 Nov 16
2
[PATCH] ssh-pkcs11: allow providing unconditional pin code for PKCS11
I find this approach very bad in general.?
PKCS#11 standard says that *private* keys should not be accessible without authentication. *Public* keys and certificates of course can and should be accessible with no authentication.
SoftHSM misinterpreted this originally (older pkcs11 documents were less clear :), but they rectified this mistake. We should not repeat it.?
2014 Aug 18
15
Call for testing: OpenSSH 6.7
Hi,
OpenSSH 6.7 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a big release
containing a number of features, a lot of internal refactoring and some
potentially-incompatible changes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD: