Andreas Jellinghaus wrote:
> unsigned int is a 64 bit number on 64bit architectures?
>
unsigned int is 32-bits on 64-bit archs (at least x86_64 as compiled w/
GCC and VC++ [in fact w/ VC++ is LLP meaning to get a 64-bit number, you
need to use "long long"..])
unsigned long is 64-bit in GCC..
__
}, and Code::Blocks Studio.
It's pretty fast and lightweight... http://premake.sf.net
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
http://www.trustbearer.com/
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
t; P.S. The compression works well. Last week working with a
> different federal agency, got OpenSC to use a 2048 bit key
> with a compressed cert on a demo card to authenticate to
> a Heimdal Kerberos KDC from a Mac using 0.11.2 with
> temporary patch to use the 2048 bit key.
>
Great
osh Keychain would only see certificates from the first card
> ever inserted for a given user)
Note: Using CPLC will not work on all PIV cards... Multos offers a PIV
card and since they are not a JavaCard... no CPLC exists.
--
Thomas Harning Jr.
Authentication Engineer @ Identit
Alliance case):
>
> /*
> * Copyright (C) 2006 Identity Alliance
> * Written by Thomas Harning <[EMAIL PROTECTED]> for Identity Alliance
> */
Sorry it wasn't more clear. The copyright for those patches would
belong to Identity Alliance. Feel free to modify the h
h.
Not exporting it could work just as well, in which case any external
plugins would just have duplicate code.
I do agree w/ the fact that if compression.h is to be exported, then
functions/constants should probably be changed.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
http://www.trustbearer.com/
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel
Here's some really minimal docs on the APDUs that PIV cards use.
There's also 2 example apdu sequences:
1) Read certificate
2) Sign piece of data
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
http://www.trustbearer.com/
For PIN commands: replace p2's 80 with 81
ought could be placed on apdu.c as well. Putting it in ISO,
however makes things a little more customizable.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
http://www.trustbearer.com/
Index: src/libopensc/apdu.c
=
On Tue, 2007-01-02 at 20:22 +0100, JP Szikora wrote:
> Thomas Harning Jr. wrote:
> > Has anyone compiled SCA on a MacIntel?
> > I know that the recent builds of SCA are Universals, but I need a
> > version w/ the new PIV support patch applied ( ticket #128 on OpenSC ).
>
&
mpile SCA on a MacIntel w/ OSX 10.4.8,
that'd be even better.
Thanks and Happy New Year.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
http://www.trustbearer.com/
___
opensc-devel mailing list
opensc-devel@lists.opensc-projec
password/etc. Apps using PAM are supposed to register
functions for 'conversation' for retrieving information from the user.
So for the case of PIN reader, you just don't have your PAM plugin ask
for the PIN.
However... many app writers assume that a password is needed and
hard-w
d it cause confusion to
> the old trac installation? also is intertrac part of trac or an extra
> plugin?
>
InterTrac is part of the Trac versions 0.10.0 and up.
Adding the configuration shouldn't confuse Trac, however... it just
wouldn't be doing anything.
--
Thomas Harning
On Wed, 2006-12-06 at 10:13 -0500, Thomas Harning Jr. wrote:
> I recommend an update to the latest available Trac for OpenSC,
> especially for the fact that InterTrac is now working/mature. This will
> allow for simpler linking between the different OpenSC projects... as
> well as all
config section [intertrac] but that
should be simple. I'll post our stripped InterTrac section for an
example...
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel
N, you could reset the card or use unblock and it'd
be ok.
Yeah... using that as a transport key would make sense.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel
n the certificate list (even trying pkcs15-tool -D
outside that in case of some strange caching issue...)
Does anybody have an idea?
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
___
opensc-devel mailing list
opensc-devel@lists.o
out shorts for permissions/lengths/etc... and since those are
right before it's sent/received to/from the card, there's no issue with
those values getting re-swapped upstream.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
__
:
* Clear
* Init
* Load Cert
* Load Key
* Read cert
* Read OpenSSH Key
* On-Card key generation
* PKCS11 Crypto ops/test
No PKCS11 perso tested.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
/* Support patch for MuscleCard Applet from musclecard.com
V card, since it requires a PIN
entry right before signatures using the SIG key.
Thunderbird and Firefox work fine re: security status problems... they
ask for the PIN on this error.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel
irefox might need to change... I see that it
should be honoring any PKCS11 attributes that exist for the user-consent
policy.. but I am not sure if there exists any such attribute.
--
Thomas Harning Jr.
Authentication Engineer @ Identity Alliance
oping OpenSC plugins? I
don't think there are.. but its worth a stab.
If there's any further information needed from me, please let me know.
Thanks
--
Thomas Harning Jr. <[EMAIL PROTECTED]>
Identity Alliance
___
opensc-devel mail
22 matches
Mail list logo