On Thu, Sep 6, 2012 at 12:32 AM, Taylor, Tim wrote:
> Is the opensc minidriver not able to detect and use the pinpad?
At the moment, no.
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/op
On 9/5/2012 4:32 PM, Taylor, Tim wrote:
> I have installed the drivers from HID Global for this reader.
>
> The same reader device driver will be used regardless of whether the
> PKCS#11 module, or the minidriver is used to interact with the Smart
> Card, right?
>
> And as I mentioned when I use
I have installed the drivers from HID Global for this reader.
The same reader device driver will be used regardless of whether the
PKCS#11 module, or the minidriver is used to interact with the Smart
Card, right?
And as I mentioned when I use the PCKS#11 driver, I'm prompted to enter
my pin on th
On 9/5/2012 12:48 PM, Scott Michel wrote:
> I am trying to debug an issue with the SCM 311 reader and Oberthur ID One
> card in order to better support Macs and smart card-enabled sites. I've been
> using pkcs15-tool to list certificates on the card. The result is that on the
> first run with
I am trying to debug an issue with the SCM 311 reader and Oberthur ID One card
in order to better support Macs and smart card-enabled sites. I've been using
pkcs15-tool to list certificates on the card. The result is that on the first
run with the card inserted for the first time, certificates a
Hello
On Tue, Sep 4, 2012 at 3:19 PM, Martin Čmelík wrote:
> Hi Peter,
>
> oh, really?
> I was playing with that 5 hours. Seems that I maybe somehow ruined
> official SafeNet libraries (but auth client works fine...).
> One more note: I'm using it on Mac OS
> Can you send me please your openssl a
Hello,
On Mon, Aug 13, 2012 at 1:41 AM, Douglas E. Engert wrote:
> I don't anything in this, other then it looks like it never called
> OpenSC.
>
> OpenSC is compiled with OpenSSL, and it could be conflicts
> with two different versions of OpenSSL.
>
> ldd /usr/lib/engines/engine_pkcs11.so
> woul
I'm using it on Linux, but all I had to do was:
pkcs11-tool --module libeToken.so.8 -l -O
I don't know what the equivalent is on Mac OS X.
Thanks,
Peter
On Tue, Sep 4, 2012 at 5:19 AM, Martin Čmelík wrote:
> Hi Peter,
>
> oh, really?
> I was playing with that 5 hours. Seems that I maybe someho
Hello,
On Tue, Aug 21, 2012 at 2:03 PM, Peter Åstrand wrote:
>
> Hi! It would be nice if OpenSC could support cards from the Swedish bank
> "Handelsbanken" (SHB). This is a BankID type of cards. I've tried multiple
> versions of OpenSC and they all fail to communicate with the card, with one
> exc
Il 05/09/2012 13:29, helpcrypto helpcrypto ha scritto:
> The most advanced i have seen here so far is 2048 :P
I bought (but haven't yet had time to experiment with) Cryptomate64:
http://www.acs.com.hk/index.php?pid=product&prod_sections=0&id=CRYPTOMATE64
See my message dated 2012/05/23.
Doesn't
> Do you want my Humble or Honest opinion ? :)
None. Hacker one :P
> It shall depend on the use case. I doubt that there will ever be a
> "single, universal keychain", but many. VPN authentication with device
> based (TMP etc) keys which get auto-provisioned and a "movable"
> identity in the form
On Wed, Sep 5, 2012 at 2:29 PM, helpcrypto helpcrypto
wrote:
>> And IMHO device-attached containers (TPM, Intel etc) are totally
>> different from transportable key-containers (like smart cards or USB
>> tokens)
>
> So, IYHO, whats the better option?
Do you want my Humble or Honest opinion ? :)
On 2012-09-05 13:29, helpcrypto helpcrypto wrote:
>> Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits
>> (smart cards doing 3k and 4k are also slowly emerging) and elliptic
>> curves are already becoming a viable option (in commodity software) as
>> well..
>
> The most advance
-Original Message-
From: opensc-devel-boun...@lists.opensc-project.org
[mailto:opensc-devel-boun...@lists.opensc-project.org] On Behalf Of helpcrypto
helpcrypto
Sent: Wednesday, September 05, 2012 1:29 PM
To: opensc-devel@lists.opensc-project.org
Subject: Re: [opensc-devel] Secure Crede
> Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits
> (smart cards doing 3k and 4k are also slowly emerging) and elliptic
> curves are already becoming a viable option (in commodity software) as
> well..
The most advanced i have seen here so far is 2048 :P
> There's also a bun
On Wed, Sep 5, 2012 at 12:57 PM, helpcrypto helpcrypto
wrote:
> Also, considering how governments are involved in technology, probably
> many countries will adopt them, like eID, DNIe, and so in the next
> years.
> In 1024bit mode, of course.
Huh, I'd guess (hope) nobody would be deploying *RSA*
Just to sum up:
-TPM (fail?)
-Intel IPT (seem to be a draft and only for intel?)
-SC (Welcome 1970)
-Virtual/Cloud wallets (obscure?)
-A mobile device to replace sc (standard?)
IMHO, SC are old enough/well known to continue existing for quite
long, until someone brings a new/better/big idea.
Also
17 matches
Mail list logo