Raul Metsma
5123531e62
Fix EstEID 3.4 signing
...
opensc master requires now SC_ALGORITHM_RSA_HASH_NONE
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-05-02 10:06:19 +02:00
Frank Morgner
7449b00768
pkcs11: avoid double initialization of notify
2019-04-26 23:51:37 +02:00
Frank Morgner
c671083ee3
fixed missing file
2019-04-25 16:46:07 +02:00
Frank Morgner
7df789ec5d
fixed 337490 Unchecked return value
2019-04-25 15:44:11 +02:00
Frank Morgner
8382f243b2
fixed 337891 Out-of-bounds write
2019-04-25 15:44:11 +02:00
Frank Morgner
1a656f2abe
use OpenPACE 1.1.0
2019-04-25 15:44:11 +02:00
Raul Metsma
bbec50bfdb
Remove unused SC_PKCS15EMU_FLAGS_NO_CHECK flag
...
Fixes #1634
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-04-25 14:53:25 +02:00
Timo Teräs
3688dfe238
MyEID: simplify key component loading
...
Encode the component ID to be key type and component ID. This allows
each combination to be unique and direct mapping to card component
ID type in the code by just taking the low byte. This simplifies
the code, and reduces confusion as there is now only one #define
for each component.
Signed-off-by: Timo Teräs <timo.teras@iki.fi>
2019-04-25 14:53:10 +02:00
Timo Teräs
3f832ca6da
MyEID: implement support for 4K RSA keys (MyEID 4.5+)
...
MyEID starting version 4.5 supports 4K RSA keys. The card also
now supports proper APDU chainging (for sending large APDUs) and
receiving large responses via GET_RESPONSE splitting.
This updates the following:
* detection code properly announces 3K and 4K RSA support
when available
* APDU chaining is used when possible
* use ISO GET_RESPONSE handling for large responses
* max_recv_size is set to 256 which it always was supposed to be
as the old cards respond with that large responses too
* use the 2K signing kludge only on cards that need it
* unwrap and decipher code paths unified to the extent possible
Signed-off-by: Timo Teräs <timo.teras@iki.fi>
2019-04-25 14:53:10 +02:00
Timo Teräs
0e25c1d2a6
MyEID: detect card from ATR historical data instead of full ATR
...
This will simplify the matching code, and match prototype cards.
Signed-off-by: Timo Teräs <timo.teras@iki.fi>
2019-04-25 14:53:10 +02:00
Raul Metsma
3d22d04113
No need link to libssl
...
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-04-25 14:52:43 +02:00
Ludovic Rousseau
ffaaf1c0d3
pkcs11-spy: parse CKM_AES_GCM for C_EncryptInit()
2019-04-25 14:52:20 +02:00
Ludovic Rousseau
69727c79ad
pkcs11.h: add CK_GCM_PARAMS structure
2019-04-25 14:52:20 +02:00
Ludovic Rousseau
98ec27e768
pkcs11-spy: log pParameter buffer for C_EncryptInit & C_DecryptInit
2019-04-25 14:52:20 +02:00
Frank Morgner
bfa94dc90d
Merge pull request #1600 from AlexandreGonzalo/trustonic_pkcs11
2019-04-25 14:51:54 +02:00
Frank Morgner
b06398c1af
macOS: install man, doc, completion to /usr/local
2019-04-25 14:49:40 +02:00
alegon01
e21cb5712c
Fix in encrypt_decrypt(), initialize the mgf
2019-04-24 14:03:35 +02:00
Jakub Jelen
13429baed0
cac: Avoid signed/unsigned casting reported by coverity
...
src/libopensc/card-cac.c:1707: negative_returns: "val_len" is passed to a parameter that cannot be negative.
2019-04-23 14:49:45 +02:00
Frank Morgner
abc6cfbe68
Added more CI card testing
2019-04-18 02:03:28 +02:00
Frank Morgner
8f2b4c7923
macos: use hierarchical layout for installer
2019-04-18 01:42:58 +02:00
Dmitriy Fortinskiy
8cf1e6f769
pkcs11-tool: List supported GOST mechanisms
2019-04-17 16:42:12 +02:00
Dmitriy Fortinskiy
a5382d32fd
pkcs11-tool: Show GOSTR3410-2012 keys
2019-04-17 16:42:12 +02:00
Dmitriy Fortinskiy
0e12b1dc71
pkcs11-tool: Generate GOSTR3410-2012 keys
2019-04-17 16:42:12 +02:00
Dmitriy Fortinskiy
4614beb87e
pkcs11-tool: Add keys access flags
2019-04-17 16:40:41 +02:00
Dmitriy Fortinskiy
2600f1ae43
win32: Add Rutoken ECP ATRs to the minidriver
2019-04-17 16:38:49 +02:00
Dmitriy Fortinskiy
aff2059ec1
card-rtecp: Fix SELECT FILE
2019-04-17 16:38:49 +02:00
Dmitriy Fortinskiy
fe4dae4d31
card-rtecp: Add Rutoken ECP SC ATR
2019-04-17 16:38:49 +02:00
Raul Metsma
91a1dd9af4
Option to delete object by index
...
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-04-17 14:38:40 +02:00
Raul Metsma
3935d501bf
Implement Secret Key write object
...
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-04-17 14:37:49 +02:00
Frank Morgner
46930fc0c4
added missing outline-choice
2019-04-08 11:16:13 +02:00
Frank Morgner
79306833bf
fixed typo
2019-04-08 11:16:13 +02:00
Frank Morgner
58d201de4b
autostart is a subfeature of OpenSC tools
2019-04-08 11:16:13 +02:00
Frank Morgner
ea8fe5e760
win32 installer: changed wording
2019-04-08 11:16:13 +02:00
Frank Morgner
34b1ebc15d
win32: install opensc.dll only with the tools
...
everything else is statically linked
2019-04-08 11:16:13 +02:00
Frank Morgner
be2df3b66b
WiX: count versions for installer
2019-04-08 11:16:13 +02:00
Frank Morgner
3ef295705f
don't use deprecated WiX option
2019-04-08 11:16:13 +02:00
Frank Morgner
066c30bb4e
opensc-notify: add to autostart
2019-04-08 11:16:13 +02:00
Frank Morgner
9092782f94
CI: only push artifacts on OpenSC/OpenSC
2019-04-08 11:16:13 +02:00
Frank Morgner
159821497c
egk-tool: fixed verbose logging
2019-04-08 11:16:13 +02:00
Frank Morgner
fe95520e3e
explicitly import libpkcs11.h
2019-04-08 11:16:13 +02:00
Frank Morgner
6f9b58af72
added pkcs11-register
2019-04-08 11:16:13 +02:00
Jakub Jelen
83eeafca3c
tests: Check the behavior of CKA_ALLOWED_MECHANISMS
2019-04-08 11:15:19 +02:00
Jakub Jelen
fc4d600634
pkcs11-tool: Allow to set CKA_ALLOWED_MECHANISMS when creating an objects
...
Also list them in the attributes listing
2019-04-08 11:15:19 +02:00
Jakub Jelen
775d120517
tests: Verify the ECDSA signatures work
2019-04-08 11:15:19 +02:00
Jakub Jelen
8c99e5076a
tests: Verify the pkcs11-tool --test works
...
Note, that it does not work now until #1600 will get resolved. Then,
move the test to TESTS in the Makefile.am
2019-04-08 11:15:19 +02:00
alegon01
f631b5f733
Fix in encrypt_decrypt(), check for (in_len <= sizeof orig_data)
2019-04-05 10:39:52 +02:00
alegon01
4913feadb8
Fix in encrypt_decrypt(), check for (in_len <= sizeof orig_data)
2019-04-05 10:38:12 +02:00
Frank Morgner
fd20ffe608
optimize bin/hex low parsing level functions ( #1646 )
...
* optimize sc_hex_to_bin
* optimize sc_bin_to_hex
* added documentation
closes https://github.com/OpenSC/OpenSC/pull/1643
thanks to carblue <ka6613-496@online.de>
2019-04-04 12:52:08 +02:00
Frank Morgner
0abe9d11c7
pkcs11: (de-) initialize notifications on load
...
fixes https://github.com/OpenSC/OpenSC/issues/1507
fixes https://github.com/OpenSC/pkcs11-helper/issues/16
2019-04-04 11:04:50 +02:00
Raul Metsma
9ba8f56037
Change u8 *data to const because sc_apdu unsigned char *data is const
...
Name sc_format_apdu parameters for IDE help hints
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-04-03 22:15:54 +02:00