Yes, sure.

By parsing EF(PukDF) and EF(PrivkDF) on Ceres and DNIe cards, 
I've found that they uses to same EF to store public and private keys
( by storeing together modulus, public, and private exponent), 
so direct retrieval of public keys (as "pkcs15-tool --read-public-key
ID" does) fails with an obvious "Not Allowed" error.... 
The only way to extract public keys is by mean of reading certificates

I have a simple patch for pkcs15-tool, that looks for certificates
when "Not allowed" is received, but not sure if this is the best
way to solve this... apart of this solves pkcs15-tool app, but no
others ( ie: "ssh -I pkcs11-module" ). I can send you if interested,
but seems so dirty...

Is this "feature" common to other cards?
If true, what the correct way to make "pkcs15-tool --read-public-keys"
and similar apps get working?

Juan Antonio

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to