Le mercredi 27 avril 2011 à 16:19 +0200, NdK a écrit :
> In my tests, OpenSSH used public keys from pukdf, not from certs (I
> tested only with keys generated with -G , not with keys in certs).
> Then it leaves the card locked, but that's another story.
Very interesting to know!
--
Le 27/04/2011 09:15, jons...@terra.es a écrit :
>
> Yeap!. you're right: with "--verify-pin" now works fine. Attached comes a
> patch for pkcs15-tool.xml documentation :-)
Commited in r5407, thank you.
___
opensc-devel mailing list
opensc-devel@lists.o
Le 24/04/2011 21:48, NdK a écrit :
> On 24/04/2011 13:17, Viktor TARASOV wrote:
>
>> The using of SC_PKCS15INIT_MAX_OPTIONS is not appropriate in this context.
>> SC_PKCS15INIT_MAX_OPTIONS is the number of profile options that can be
>> defined as an argument for the pkcs15init operations .
> So I
On 27/04/2011 09:15, jons...@terra.es wrote:
> BTW: I'm not sure of OpenSSH pkcs11 way to retrieve keys: afaik extract
> it from certificates, but not sure if also handles
> keys found in pukdf ¿anyone knows?
In my tests, OpenSSH used public keys from pukdf, not from certs (I
tested only with key
> Mensaje original
> De: mar...@martinpaljak.net
> Fecha: 27/04/2011 7:21
> Para: "Juan Antonio Martinez"
> CC:
> Asunto: Re: [opensc-devel] pkcs15-tool --read-public-keys
[]
> > Ok, I finally did it. pkcs15-tool -D no longer shows "public keys"
> > on my DNIe card
> >
> > pkcs15-