Commit Graph

11 Commits

Author SHA1 Message Date
Mark Andrews
234af55779 4129. [port] Address API changes in OpenSSL 1.1.0. [RT #39532]
(cherry picked from commit 8bb630c751)
2015-05-28 14:42:13 +10:00
Francis Dupont
d0b0dbca7e finished print.h stuff 2015-05-23 16:14:16 +02:00
Tinderbox User
3817256ab9 update copyright notice / whitespace 2015-01-20 23:47:01 +00:00
Evan Hunt
1ef4faabd5 [v9_10] clean up gcc -Wshadow warnings
4039.	[cleanup]	Cleaned up warnings from gcc -Wshadow. [RT #37381]
2015-01-20 13:43:35 -08:00
Mark Andrews
4394594398 3898. [bug] To small a buffer in tohexstr() calls in test code.
[RT #36598]

(cherry picked from commit 6a6838f973)
2014-07-22 11:26:50 +10:00
Evan Hunt
acbb301e64 [master] better error output when initializing pkcs11
3786.	[func]		Provide more detailed error codes when using
			native PKCS#11. "pkcs11-tokens" now fails robustly
			rather than asserting when run against an HSM with
			an incomplete PCKS#11 API implementation. [RT #35479]
2014-03-12 20:52:01 -07:00
Evan Hunt
dbb012765c [master] merge libiscpk11 to libisc
3735.	[cleanup]	Merged the libiscpk11 library into libisc
			to simplify dependencies. [RT #35205]
2014-02-11 21:20:28 -08:00
Evan Hunt
d58e33bfab [master] testcrypto.sh in system tests
3714.	[test]		System tests that need to test for cryptography
			support before running can now use a common
			"testcrypto.sh" script to do so. [RT #35213]
2014-01-20 16:08:09 -08:00
Evan Hunt
12bf5d4796 [master] address several issues with native pkcs11 2014-01-18 11:51:07 -08:00
Mark Andrews
e20788e121 update copyrights 2014-01-16 15:19:24 +11:00
Evan Hunt
ba751492fc [master] native PKCS#11 support
3705.	[func]		"configure --enable-native-pkcs11" enables BIND
			to use the PKCS#11 API for all cryptographic
			functions, so that it can drive a hardware service
			module directly without the need to use a modified
			OpenSSL as intermediary (so long as the HSM's vendor
			provides a complete-enough implementation of the
			PKCS#11 interface). This has been tested successfully
			with the Thales nShield HSM and with SoftHSMv2 from
			the OpenDNSSEC project. [RT #29031]
2014-01-14 15:40:56 -08:00