This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "opencryptoki".

The annotated tag, v3.2 has been created
        at  2b3ea4441b760f64078deadf95e718497fe72866 (tag)
   tagging  2b051ea4eb2d0c6f2e21f4f8707be8a04a9f58cc (commit)
  replaces  v3.1
 tagged by  Joy Latten
        on  Tue Sep 9 23:07:34 2014 -0500

- Log -----------------------------------------------------------------
Version 3.2

Claudio Carvalho (1):
      Add support for CKM_RSA_PKCS_PSS to soft token.

Harald Freudenberger (11):
      print_mechanism() ignored bad returncodes from the called function
      Fix failure when confname is not given, use default ep11tok.conf instead.
      Configure was checking for the ep11 lib and the m_init() function.
      The asm/zcrypt.h header file uses some std int types and so
      Small reworks:
      The 31 bit build on s390 showed an build error at initialization
      ep11 is not building because not setting with_zcrypt correctly.
      The performance measurement application 'speed' in testcases/misc_tests
      Minor cleanup and rework:
      Some small fixes and improvements on the digest testcase:
      A little cleanup on the aes testcase:

Ingo Tuchscherer (9):
      ep11: Fixed Makefile to complement common code dependencies
      ep11: switched to official m_init() function based on library change
      EP11: some README updates about usage and restrictions.
      EP11: corrected some typos in ep11 README
      OCK version numbers adjusted to 3.1
      Fix for AES_ECB/AES_CBC wrap/unwrap:
      -skip AES_ECB/CBC wrap/unwrap test-case for asymmetric keys.
      EP11 token: fixed config_dir and conf_name handling
      The EP11 token has restrictions regarding the modulus size

Joy Latten (52):
      Scenario: processA creates private token key object and before he can
      ep11's h_opaque_2_blob needs to catch the return code from
      : add new token_specific_shaX calls to the header files.
      : Remove ckm_* calls and make one call into the hash functions.
      : Replace calls to ckm_* with their new counterparts.
      : Add token-specific single-part shaX to ica token.
      : Add single-part sha2 to cca token.
      : Add support for SHA384 and SHA512 to cca token.
      : Add single-part sha to ep11 token.
      : Only icsf token supports multi-part hmac. But icsf is only
      : Additional published test vectors for SHA256, 384 and 512.
      : ep11 sha hmacs require certain keys lengths.
      In ep11, only set context if m_VerifyInit was successful.
      Check that out_data is not NULL and has been allocated in cca sha.
      ica token failed to update digests because length was not being computed
      Since ica_stdll/Makefile.am is removed, do not include it in the
      Change compute_sha to compute_sha1.
      For sha1, support a purely software version and a token specific version.
      Add compute_sha() to support computing any specified sha using either
      Add mgf1 function to support rsa mechanisms.
      Modulus size should be checked against hashsize for both encrypt
      RSA_OAEP generated test vectors and testcase for encryption and 
decryption.
      Add support for SHA algs to the soft token.
      Add rsa oaep support to soft token.
      Format soft token mechanism list.
      Format mech list for cca, tpm, and icsf tokens.
      Support key wrapping for rsa oaep.
      Add emsa-pss-encode and emsa-pss_verify to support rsa-pss encoding 
scheme.
      Add rsa_pss_sign support.
      Add rsa_pss_verify to opencryptoki.
      Add support for CKM_RSA_PKCS_PSS mechanism to opencryptoki.
      Add support for CKM_RSA_PKCS_PSS to ica token.
      Add generated test vectors and testcases for rsa-pss.
      Add various rsa_hash_pss_sign and rsa_hash_pss_verify functions to
      Add CKM_SHA*_RSA_PKCS_PSS mechanisms to sign_mgr and verify_mgr.
      Add hashed pss mechanism testcases to rsa.
      Add CKM_SHA*_RSA_PKCS_PSS mechanisms to soft token.
      Add testcases to test C_SignUpdate, C_SignFinal, C_VerifyUpdate
      Make it an error if the slot is not specified when running testcases.
      pkcsslotd attempts to transfer ~400000 bytes of slot info via a socket to
      pkcs#11v2.20 states that aes-cbc, aes-ecb, cdmf-ecb and des-ecb only wrap
      Slot_Info_t structure was modified to reduce size of fields
      Remove reference to a correlator since it is not used.
      ica-stdll is obsoleted, so remove files under ica_stdll.
      Remove references to obsoleted pk_config_data and pkcs11_startup
      Man page corrections.
      The SHAs in ICA token were not always computing correct digests when sent
      Add a pkcscca tool to help migrate cca private token objects from 
v2(encrypted
      Add documentation (pkcscca manpage and README.cca_stdll) to assist in
      Correctly declare OAEP parameter to prevent a possible scope issue.
      Check attributes to determine which testcases to run run for ep11 and tpm
      Bump up version to 3.2 and add info to ChangeLog and elsewhere.

Petr Lautrbach (2):
      pkcsconf: remove 'M' from the optstring and the help message
      fix several issues found by coverity scan - wrong usage of

Vicky (6):
      Add new rsa mechanisms to common/tok_spec_struct.h and tok_specific.h
      Remove obsoleted tokens from opencryptoki.
      Implement single-part CKM_RSA_PKCS_OAEP into ock infrastructure.
      Implement CKM_RSA_PKCS_OAEP into ica token.
      Implement EME-OAEP encoding schemes.
      Implement CKM_RSA_PKCS_OAEP (decryption) into ica token.

-----------------------------------------------------------------------


hooks/post-receive
-- 
opencryptoki

------------------------------------------------------------------------------
Want excitement?
Manually upgrade your production database.
When you want reliability, choose Perforce
Perforce version control. Predictably reliable.
http://pubads.g.doubleclick.net/gampad/clk?id=157508191&iu=/4140/ostg.clktrk
_______________________________________________
Opencryptoki-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/opencryptoki-tech

Reply via email to