Martin Paljak
578cf06910
Fixup: somehow a double "make make" slipped through.
...
Thanks to Pohjalainen Pietu for noticing it.
2013-02-22 15:15:09 +02:00
Viktor Tarasov
8741185a4c
MacOSX: remove obsolete EXTRA_DISTs from Makefile.am
...
build scripts have been changed in 3fc2dbc9
2013-02-21 13:12:06 +01:00
Martin Paljak
3fc2dbc9f1
Upgrade the MacOSX package build script to current state of affairs.
...
- Target only Intel (available since 2006) and OS X 10.6+ (released in 2009)
- Use sources only from https://github.com/OpenSC/
2013-02-20 14:34:08 +02:00
Ondrej Mikle
ee48ea187a
Fix to allow exponents other than 65537 for Feitian ePass 2003
2013-02-16 21:13:17 +01:00
Andreas Schwier
b34d916e60
sc-hsm: Fixed problem deleting CA certificates
...
sc-hsm: Fixed public key format returned when generating ECC keys
2013-02-15 15:02:28 +01:00
Frank Thater
20824e2124
sc-hsm-tool: Added threshold scheme parameters to manpage
2013-02-07 15:07:42 +01:00
Frank Thater
0577f7d4f5
sc-hsm-tool: Added support for DKEK password sharing scheme
2013-02-07 15:07:42 +01:00
Andreas Schwier
99af6cd8ee
sc-hsm: Fixed a bug that prevents a newly generated 2048 key to show up at the PKCS#11 interface
2013-01-27 18:42:33 +01:00
Andreas Schwier
6d51b320f3
sc-hsm-tool: Added better error handling for non-SmartCard-HSM cards
2013-01-27 18:42:33 +01:00
mescheryakov1
f55bb019d9
Update src/tools/pkcs11-tool.c
...
fixed filling key type attr on writing object
pointer refers to local variable from destroyed stack frame
2013-01-27 18:37:45 +01:00
Toni Sjöblom
58679a5df1
Fixed file-id in myeid.profile
2013-01-27 18:34:07 +01:00
Ludovic Rousseau
1d08ac730e
Update wiki URL
...
The wiki migrated from opensc-project.org to github.com
2013-01-06 20:49:14 +01:00
Viktor Tarasov
d30cd83ad4
SM: common SM 'increase-sequence-counter' procedure
2013-01-06 17:34:35 +01:00
Viktor Tarasov
6a4de6d551
libopensc: APDU 'allocate & copy'and 'free' procedures
2013-01-06 17:30:41 +01:00
Viktor Tarasov
8d7c773561
SM: move SM APDU procedures to dedicated source file
...
new SM errors: 'session-already-opened' and 'invalid-checksum'
declare typed data for DH SM session
2013-01-06 16:40:17 +01:00
Viktor Tarasov
4c1c39f3e4
opensc-tool: add 'call-SM-handler' command
...
'open' and 'close' handlers of the card's SM driver can be called
2013-01-06 13:13:08 +01:00
Viktor Tarasov
3f30e14087
sm: move SM common crypto procedures to the dedicated library
...
rename 'sm' source directory
2013-01-04 22:29:59 +01:00
Viktor Tarasov
250364c060
pkcs15init: fix spurious gcc overflow warning,
...
thanks to Milan Broz (mbroz@redhat.com )
As discussed in pull request #115 (https://github.com/OpenSC/OpenSC/pull/115 ),
'if' test of impossible condition is removed in 'cardos' and 'incypto34' card drivers.
2013-01-04 19:03:46 +01:00
Viktor Tarasov
cc5a171ddc
pkcs15: regression in e35febe: compute cert length
...
parse_x509_cert() reviewed.
Now certificate's DER data are allocated and the DER data length is determined in one place.
https://github.com/OpenSC/OpenSC/pull/114
https://github.com/OpenSC/OpenSC/commit/e35febe
2012-12-25 20:05:45 +01:00
Viktor Tarasov
3aaf95c21b
cardOS: compile on Windows
...
few coding style remarks
2012-12-16 11:50:08 +01:00
mtausig
1d75427f55
cardOS: Use information from AlgorithmInfo
...
In set_security_env, the algorithmInfo structure (from the TokenInfo file of
PKCS#15) is parsed to see, what algorithm IDs are supported for signature
operations.
Using the information from AlgorithmInfo set in set_security_env when
computing signatures.
Fixed incorrect order of code blocks. If neither a reference to rsa_sig nor to
rsa_pure_sig is found in AlogirthmInfo, boths methods are enabled before (and
not after) trying pure_sig
2012-12-16 11:23:35 +01:00
blumentopf
d5c2401e19
pkcs15-gemsafeV1.c: Multiple key containers and ATR-specific PIN policies
...
pkcs15-gemsafeV1.c: Change PIN data structure to make MSVC compiler happy
pkcs15-gemsafeV1.c: Turn constants into macros to make MSVC compiler happy
2012-12-16 10:09:44 +01:00
Anthony Foiani
f7c12574ee
pkcs15-tool: initialize 'opt_auth_id' consistently.
...
All the other option values are initialized to NULL, so do the same to
opt_auth_id.
(Although, as they're all static globals, they should be set to 0 at
runtime anyway, I think...)
Signed-Off-By: Anthony Foiani <anthony.foiani@gmail.com>
2012-12-10 00:54:26 -07:00
Jean-Pierre Szikora
f4e80fe9a1
Merge branch 'cardos5' of github.com:szikora/OpenSC into cardos5
2012-12-05 10:05:41 +01:00
Jean-Pierre Szikora
f6b1b0c873
ATR status in GET DATA is 0x80 with a custom ATR
2012-12-05 10:03:52 +01:00
Jean-Pierre Szikora
9ad8cd96ac
CardOS V5.0 is recognized now. Some useful infos are given with cardostool -i,
...
but the card is still not supported by other tools.
2012-12-05 10:03:52 +01:00
Viktor Tarasov
98ca66b1a0
release 0.13.0
2012-12-04 14:58:10 +01:00
Viktor Tarasov
8b07b9c5a7
compile on Windows, minor codding style issues
2012-12-03 15:21:22 +01:00
sjoblomt
457426543d
MyEID ECDSA support
2012-12-03 14:37:13 +01:00
Jean-Pierre Szikora
3106cf7af1
ATR status in GET DATA is 0x80 with a custom ATR
2012-12-03 10:19:53 +01:00
Jean-Pierre Szikora
4ebfd1fad3
CardOS V5.0 is recognized now. Some useful infos are given with cardostool -i,
...
but the card is still not supported by other tools.
2012-12-02 19:21:08 +01:00
Viktor Tarasov
9e9b3d0bd8
tool: in 'do_apdu' increase size of send/receive buffers
2012-11-28 11:09:36 +01:00
Viktor Tarasov
60b7e52e06
pkcs15: mandatory 'publicKeyCoefficients' in encode/decode public key procedures
...
http://www.opensc-project.org/pipermail/opensc-devel/2012-November/018586.html
2012-11-20 22:58:37 +01:00
Ludovic Rousseau
81bbddfc24
card-gemsafeV1: Add a GemSafe V1 ATR
...
Thanks to Lukas Wunner for the patch
2012-11-20 19:11:23 +01:00
Anthony Foiani
27c677188e
pcks11: trivial: fix debug output for CKA_PRIME_1 and CKA_PRIME_2
...
Without this patch, debugging output issues these as unknown
attributes:
... C_CreateObject(): CKA_PRIVATE_EXPONENT = 97F798...
... C_CreateObject(): Attribute 0x124 = EFE5AD...
... C_CreateObject(): Attribute 0x125 = D4D3F6...
... C_CreateObject(): CKA_EXPONENT_1 = 5815FD...
With this patch, we see:
... C_CreateObject(): CKA_PRIVATE_EXPONENT = 97F798...
... C_CreateObject(): CKA_PRIME_1 = EFE5AD...
... C_CreateObject(): CKA_PRIME_2 = D4D3F6...
... C_CreateObject(): CKA_EXPONENT_1 = 5815FD...
Signed-Off-By: Anthony Foiani <anthony.foiani@gmail.com>
2012-11-20 08:46:27 +01:00
Anthony Foiani
f63135afab
tools: check return value after each call.
...
It seems that this suffered some copy and paste damage at some point.
Change so that we check each return value immediately after the API
call.
Signed-Off-By: Anthony Foiani <anthony.foiani@gmail.com>
2012-11-20 08:46:27 +01:00
Andreas Schwier
fb8e0cc3b2
sc-hsm: Improved checking in sc-hsm-tool
2012-11-20 08:46:27 +01:00
Andreas Schwier
0adec1bddd
sc-hsm: Fixed bug with memory released to early
2012-11-20 08:46:27 +01:00
Andreas Schwier
bbbfae4bf0
sc-hsm: Now saving the internal CSR in place of the certificate and decoding the public key at initialization (RSA only)
2012-11-20 08:46:27 +01:00
Viktor Tarasov
6c051f8490
pkcs11: check arguments in get_bignum_bits() procedure
...
t451: segmentation fault when getting public key bits number
2012-11-12 16:46:25 +01:00
Viktor Tarasov
bd86063835
t455: check validity of RSA/DSA public key components
...
Segmentation fault happened when reading SSH key with the non-initilized public key components.
2012-11-12 10:13:57 +01:00
Viktor Tarasov
68ee0e76e0
t447: return value from init() in reader driver not checked
2012-11-11 22:17:17 +01:00
Viktor Tarasov
f7771c9b08
libopensc: check data returned by 'read-public-key'
...
fix error message
2012-11-11 21:47:10 +01:00
Viktor Tarasov
da5934a6ff
libopensc iso7816: retry SELECT with FCI if SELECT without FCI fails
...
t457 (https://www.opensc-project.org/opensc/ticket/457 )
For some cards that currently use the common iso-7816 operations
only SELECT with return of FCI/FCP can be applied.
In iso-7816 'select-file' handle, if 'SELECT without FCI' fails with error code 6A86,
then retry 'SELECT with FCI'. Other error code can be added.
Sorry for the 'coding style' noise.
2012-11-11 20:38:30 +01:00
Viktor Tarasov
a4ac33f32a
build sc-hsm-tool: link with OpenSSL libs
2012-11-11 20:36:57 +01:00
Andreas Schwier
7c714860a2
sc-hsm: Fixed bug decoding CVCs without domain parameter
2012-11-11 12:53:03 +01:00
Andreas Schwier
33da14c459
sc-hsm: Added code to prevent CV certificates being listed as X.509 certificates
2012-11-11 12:53:03 +01:00
Andreas Schwier
ffb20e5916
sc-hsm: Added sc-hsm-tool with DKEK support and key wrap / unwrap
2012-11-11 12:53:03 +01:00
Viktor Tarasov
8d35b2cf58
build MSI: add openpgp.profile
2012-11-11 00:57:09 +01:00
Viktor Tarasov
1d1abe4c21
pkcs15-crypt tool: set HASH_NONE crypto flags when the hash do not asked
...
without this for the cards that have only RAW mechanism
it's not possible to compute signature with PKCS1 padding and without hash.
2012-11-11 00:42:52 +01:00