[opensc-devel] smartcard key id too long

2010-04-16 Thread Dimitrios Siganos
Hi, I am using a feitian epass 3000 usb smartcard and I have a problem with the length of the key id of the RSA private key on the smartcard. This is what pkcs15-tool reports: $ pkcs15-tool -k Using reader with a card: CCID Compatible Private RSA Key [Private Key] Com. Flags : 3

Re: [opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Dimitrios Siganos
Andreas Jellinghaus wrote: > great. good to see it works for you, so I think the problem in the > other bug reports was a mistake by the users (often called layer 8 :) ). > In order to get it to work I had to do the following: 1) built opensc from svn, I used revision 4216 (the latest stable re

Re: [opensc-devel] Middleware-free USB PKI Tokens?

2010-04-16 Thread Douglas E. Engert
Anders Rundgren wrote: > > your third question I did not understand. > > ATRs identify the card's type, right? Sort of, it has characteristics of the card. Google for: parsing an ATR. So if you don't want > to write a card profile but have full freedom on the token side > the token would n

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Jan Just Keijser
Hi Aleksey, Aleksey Samsonov wrote: > Hello, > > Andreas Jellinghaus wrote: > >> Am Freitag 16 April 2010 08:51:31 schrieb Aleksey Samsonov: >> >>> Hello, >>> >>> Jan Just Keijser wrote: >>> in opensc-0.11.13/src/pkcs11/openssl.c there's section 106 void 107 sc_p

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Aleksey Samsonov
Hello, Andreas Jellinghaus wrote: > Am Freitag 16 April 2010 08:51:31 schrieb Aleksey Samsonov: >> Hello, >> >> Jan Just Keijser wrote: >>> in opensc-0.11.13/src/pkcs11/openssl.c there's section >>> >>> 106 void >>> 107 sc_pkcs11_register_openssl_mechanisms(struct sc_pkcs11_card *card) >>> 108 { >

Re: [opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Jan Just Keijser
Hi *, Jean-Michel Pouré - GOOZE wrote: > On Fri, 2010-04-16 at 18:31 +0200, Andreas Jellinghaus wrote: > >> if not we need >> to debug this in detail and/or talk to the openssl developers >> to track down and fix this issue. >> > > Do not hesitate to propose them Free PKI developer card a

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Andreas Jellinghaus
Am Freitag 16 April 2010 08:51:31 schrieb Aleksey Samsonov: > Hello, > > Jan Just Keijser wrote: > > in opensc-0.11.13/src/pkcs11/openssl.c there's section > > > > 106 void > > 107 sc_pkcs11_register_openssl_mechanisms(struct sc_pkcs11_card *card) > > 108 { > > 109 #if OPENSSL_VERSION_NUMBER >= 0x

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Andreas Jellinghaus
Am Freitag 16 April 2010 01:16:47 schrieb Jan Just Keijser: > hi list, > > I hate to answer my own question but I think I found it: > > in opensc-0.11.13/src/pkcs11/openssl.c there's section > > 106 void > 107 sc_pkcs11_register_openssl_mechanisms(struct sc_pkcs11_card *card) > 108 { > 109 #if O

Re: [opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Jean-Michel Pouré - GOOZE
On Fri, 2010-04-16 at 18:31 +0200, Andreas Jellinghaus wrote: > if not we need > to debug this in detail and/or talk to the openssl developers > to track down and fix this issue. Do not hesitate to propose them Free PKI developer card at this address: http://www.gooze.eu/feitian-pki-free-software

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Andreas Jellinghaus
maybe an strace (strace -o strace.log -f -s -tt openssl ... ) will show what is wrong. if possible put the file on a web page, as it could be huge, too big for this list. if that isn't possible, compress it and send it to me only (but no idea when I will be able to look at it). what you trie

Re: [opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Andreas Jellinghaus
Am Freitag 16 April 2010 17:07:49 schrieb Dimitrios Siganos: > Hi, > > I have use openssl-1.0.0 and engine_pkcs11 for storing an rsa private > key in a smartcard (feitian epass 3000). I got openssl to access the rsa > private key and used it to create a self-signed certificate like this: ah, fine

Re: [opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Jan Just Keijser
Dimitrios Siganos wrote: > Hi, > > I have use openssl-1.0.0 and engine_pkcs11 for storing an rsa private > key in a smartcard (feitian epass 3000). I got openssl to access the rsa > private key and used it to create a self-signed certificate like this: > > openssl > > OpenSSL> engine dynamic \ >

Re: [opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Jean-Michel Pouré - GOOZE
On Fri, 2010-04-16 at 16:07 +0100, Dimitrios Siganos wrote: > Can someone shed some light into this? Good question, I would like to know the answer as well. -- Jean-Michel Pouré - Gooze - http://www.gooze.eu ___ opensc-devel mailing l

[opensc-devel] openssl-1.0.0 and engine_pkcs11

2010-04-16 Thread Dimitrios Siganos
Hi, I have use openssl-1.0.0 and engine_pkcs11 for storing an rsa private key in a smartcard (feitian epass 3000). I got openssl to access the rsa private key and used it to create a self-signed certificate like this: openssl OpenSSL> engine dynamic \ > -pre SO_PATH:/home/ds/local/lib/engines

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Jan Just Keijser
Martin Paljak wrote: > On Apr 16, 2010, at 09:51 , Aleksey Samsonov wrote: > >> I commented out the OPENSSL_config(NULL) and now it works ... >> >>> should this added as a patch? the FIXME seems to be to *remove* the >>> explicit call to OPENSSL_config; I can confirm that this works for bo

Re: [opensc-devel] Middleware-free USB PKI Tokens?

2010-04-16 Thread Martin Paljak
2010/4/16 Anders Rundgren : > If you wanted to provide a USB PKI token that would give the user maximum > flexibility it seems that the device should support CCID. > > 1. As I understand,CCID only provides the basic communication and does not >   address higher level issues such as PKI, right? Yes,

Re: [opensc-devel] Middleware-free USB PKI Tokens?

2010-04-16 Thread Anders Rundgren
> your third question I did not understand. ATRs identify the card's type, right? So if you don't want to write a card profile but have full freedom on the token side the token would need to use an ATR that belongs to some other vendor or community. Does all FIPS201 cards share an ATR or need m

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Martin Paljak
On Apr 16, 2010, at 09:51 , Aleksey Samsonov wrote: > I commented out the OPENSSL_config(NULL) and now it works ... >> >> should this added as a patch? the FIXME seems to be to *remove* the >> explicit call to OPENSSL_config; I can confirm that this works for both >> openssl-1.0.0-beta4 and the

Re: [opensc-devel] Middleware-free USB PKI Tokens?

2010-04-16 Thread Jean-Michel Pouré - GOOZE
On Fri, 2010-04-16 at 09:38 +0200, Anders Rundgren wrote: > If you wanted to provide a USB PKI token that would give the user > maximum > flexibility it seems that the device should support CCID. Exactly. Most token are supported by OpenCT, which means no security PIN code. Thus it is recommended

Re: [opensc-devel] opensc 0.11.13 and openssl 1.0 oddity

2010-04-16 Thread Jan Just Keijser
Hi Aleksey, Aleksey Samsonov wrote: > Hello, > > Jan Just Keijser wrote: >> in opensc-0.11.13/src/pkcs11/openssl.c there's section >> >> 106 void >> 107 sc_pkcs11_register_openssl_mechanisms(struct sc_pkcs11_card *card) >> 108 { >> 109 #if OPENSSL_VERSION_NUMBER >= 0x1000L >> 110 /* FIXME:

Re: [opensc-devel] Middleware-free USB PKI Tokens?

2010-04-16 Thread Jan Just Keijser
Hi Anders, Anders Rundgren wrote: > If you wanted to provide a USB PKI token that would give the user maximum > flexibility it seems that the device should support CCID. > > 1. As I understand,CCID only provides the basic communication and does not >address higher level issues such as PKI, rig

[opensc-devel] Middleware-free USB PKI Tokens?

2010-04-16 Thread Anders Rundgren
If you wanted to provide a USB PKI token that would give the user maximum flexibility it seems that the device should support CCID. 1. As I understand,CCID only provides the basic communication and does not address higher level issues such as PKI, right? 2. Would a token that emulates FIPS201