[Pki-devel] [pki-devel][PATCH]

2016-11-15 Thread John Magne
Ticket: TPS throws "err=6" when attempting to format and e : https://fedorahosted.org/pki/ticket/2544 Fix tested on standard card, it does what it is supposed to do. It checks first to make sure the lifecycle state needs to be changed before attempting to do so. This will prevent any cards th

[Pki-devel] [pki-devel][PATCH]

2017-04-26 Thread John Magne
CA in the certificate profiles the startTime parameter is not working as expected. This simple fix addresses an overflow in the "startTime" paramenter in 4 places in the code. I felt that honing in only on the startTime value was the best way to go. In some of the files other than Vali

Re: [Pki-devel] [pki-devel][PATCH]

2016-11-16 Thread Christina Fu
I compared this patch with the original C patch. There was a check in C that does not exist in your Java patch: 1019 if(data.size() != 3){ 1020 lifecycle = 0xf0; 1021 RA::Error(LL_PER_PDU, "RA_Processor::GetLifecycle", "apdu response is the wrong size, the

Re: [Pki-devel] [pki-devel][PATCH]

2016-11-22 Thread John Magne
shing. Closed ticket # 2544 - Original Message - > From: "Christina Fu" > To: pki-devel@redhat.com > Sent: Wednesday, November 16, 2016 6:25:49 PM > Subject: Re: [Pki-devel] [pki-devel][PATCH] > > > > I compared this patch with the original C patch.

Re: [Pki-devel] [pki-devel][PATCH]

2017-04-28 Thread Matthew Harmsen
On 04/26/2017 04:29 PM, John Magne wrote: CA in the certificate profiles the startTime parameter is not working as expected. This simple fix addresses an overflow in the "startTime" paramenter in 4 places in the code. I felt that honing in only on the startTime value was the best way

[Pki-devel] [pki-devel][PATCH] 0094-Tkstool-FIPS-Mode-fix.patch

2017-05-22 Thread John Magne
#2540 Creating symmetric key (sharedSecret) using tkstool is failing when operating system is in FIPS mode. From 820b3f16d1cb3f0532a464aee399512725c2a858 Mon Sep 17 00:00:00 2001 From: Jack Magne Date: Mon, 10 Apr 2017 11:27:12 -0700 Subject: [PATCH] Tkstool, FIPS Mode fix. Now the program c

[Pki-devel] [pki-devel][PATCH] 0066-TPS-auth-special-characters-fix.patch

2016-04-27 Thread John Magne
TPS auth special characters fix. Ticket #1636. Smartcard token enroll/format fails when the ldap user has special characters in userid or password Tested with both esc and tpsclient. The problem was when using a real card because the client uri encodes the authentication

[Pki-devel] [pki-devel][PATCH] 0070-Fix-coverity-warnings-for-tkstool.patch

2016-06-06 Thread John Magne
Fix attached.From 3a1ef233ec8e63e5ec34cd0746cd5e94e327c65f Mon Sep 17 00:00:00 2001 From: Jack Magne Date: Mon, 6 Jun 2016 16:36:16 -0700 Subject: [PATCH] Fix coverity warnings for 'tkstool' Issues listed in the ticket addressed by this patch. Ticket #1199 : Fix coverity warnings for 'tkstool'.

[Pki-devel] [pki-devel][PATCH] 0072-Revocation-failure-causes-AUDIT_PRIVATE_KEY_ARCHIVE_.patch

2016-06-14 Thread John Magne
Revocation failure causes AUDIT_PRIVATE_KEY_ARCHIVE_REQUEST The fix here is to make sure no archive related audits get issued for doing things other than key archivals. Other operations such as revoking and unrevoking cert in the code path laready have audit logs issued s

[Pki-devel] [pki-devel][PATCH] 0077-Make-starting-CRL-Number-configurable.patch

2016-07-27 Thread John Magne
Make starting CRL Number configurable. Ticket #2406 Make starting CRL Number configurable This simple patch provides a pkispawn config param that passes some starting crl number value to the config process. Here is a sample: [CA] pki_ca_starting_crl_numbe

[Pki-devel] [pki-devel][PATCH] Non server keygen issue in SCP03.

2017-05-05 Thread John Magne
[PATCH] Non server keygen issue in SCP03. Ticket 1663 Add SCP03 support: https://pagure.io/dogtagpki/issue/1663 We discovered a minor issue when trying to log values that don't exist when performing the non server side keygen case. For instance , we don't need to generate a kek session key in t

Re: [Pki-devel] [pki-devel][PATCH] 0094-Tkstool-FIPS-Mode-fix.patch

2017-05-23 Thread Matthew Harmsen
On 05/22/2017 07:27 PM, John Magne wrote: #2540 Creating symmetric key (sharedSecret) using tkstool is failing when operating system is in FIPS mode. ___ Pki-devel mailing list Pki-devel@redhat.com https://www.redhat.com/mailman/listinfo/pki-deve

Re: [Pki-devel] [pki-devel][PATCH] 0094-Tkstool-FIPS-Mode-fix.patch

2017-05-24 Thread John Magne
is failing when operating system is in FIPS mode. - Original Message - > From: "Matthew Harmsen" > To: "John Magne" , "pki-devel" > Sent: Tuesday, May 23, 2017 4:44:42 PM > Subject: Re: [Pki-devel] [pki-devel][PATCH] 0094-Tkstool-FIPS-Mode-f

[Pki-devel] [pki-devel][PATCH] 0095-Resolve-1663-Add-SCP03-support.patch

2017-06-02 Thread John Magne
Ticket: Resolve #1663 Add SCP03 support . This particular fix resolves a simple issue when formatting a token in FIPS mode for SCP03. From de74c600391473759bec495dc4ccafda787959bd Mon Sep 17 00:00:00 2001 From: Jack Magne Date: Fri, 2 Jun 2017 15:40:52 -0700 Subject: [PATCH] Res

[Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-to-Java-classes.patch

2016-04-15 Thread John Magne
Subject: [PATCH] Port symkey JNI to Java classes. Ticket #801 : Merge pki-symkey into jss What is supported: 1. Everything that is needed to support Secure Channel Protocol 01. 2. Supports the nist sp800 kdf and the original kdf. 3. Supports key unwrapping used by TPS which was formerly in the s

Re: [Pki-devel] [pki-devel][PATCH] 0066-TPS-auth-special-characters-fix.patch

2016-05-03 Thread Christina Fu
ACK On 04/27/2016 01:59 PM, John Magne wrote: TPS auth special characters fix. Ticket #1636. Smartcard token enroll/format fails when the ldap user has special characters in userid or password Tested with both esc and tpsclient. The problem was when using a real card

Re: [Pki-devel] [pki-devel][PATCH] 0066-TPS-auth-special-characters-fix.patch

2016-05-12 Thread John Magne
ACKED by cfu, pushed to master. - Original Message - From: "Christina Fu" To: pki-devel@redhat.com Sent: Tuesday, May 3, 2016 11:27:59 AM Subject: Re: [Pki-devel] [pki-devel][PATCH] 0066-TPS-auth-special-characters-fix.patch ACK On 04/27/2016 01:59 PM, John Magne wrote:

Re: [Pki-devel] [pki-devel][PATCH] 0070-Fix-coverity-warnings-for-tkstool.patch

2016-06-14 Thread Matthew Harmsen
On 06/06/2016 05:39 PM, John Magne wrote: Fix attached. ___ Pki-devel mailing list Pki-devel@redhat.com https://www.redhat.com/mailman/listinfo/pki-devel ACK Personally, I always prefer the use of enclosing braces "{ . . . }" after a conditional ev

Re: [Pki-devel] [pki-devel][PATCH] 0072-Revocation-failure-causes-AUDIT_PRIVATE_KEY_ARCHIVE_.patch

2016-06-17 Thread John Magne
ACK'd by cfu: Pushed to master, closing ticket #2340 - Original Message - From: "John Magne" To: "pki-devel" Sent: Tuesday, June 14, 2016 4:07:49 PM Subject: [pki-devel][PATCH] 0072-Revocation-failure-causes-AUDIT_PRIVATE_KEY_ARCHIVE_.patch Revocation failure causes AUDIT_PRIVATE_

Re: [Pki-devel] [pki-devel][PATCH] 0070-Fix-coverity-warnings-for-tkstool.patch

2016-06-17 Thread John Magne
ACK'ed by mharmsen, pushed to master: Closing ticket #1199 - Original Message - From: "John Magne" To: "pki-devel" Sent: Monday, June 6, 2016 4:39:43 PM Subject: [pki-devel][PATCH] 0070-Fix-coverity-warnings-for-tkstool.patch Fix attached. _

Re: [Pki-devel] [pki-devel][PATCH] 0077-Make-starting-CRL-Number-configurable.patch

2016-07-27 Thread John Magne
Verbally acked by edewata thanks! : pushed to master Closing ticket: #2406 - Original Message - > From: "John Magne" > To: "pki-devel" > Sent: Wednesday, July 27, 2016 11:53:34 AM > Subject: [Pki-devel] [pki-devel][PATCH] > 0077-Make-sta

[Pki-devel] [pki-devel][PATCH] 0080-Authentication-Instance-Id-PinDirEnrollment-with-aut.patch

2016-08-16 Thread John Magne
[PATCH] Authentication Instance Id PinDirEnrollment with authType value as SslclientAuth is not working. Ticket #1578 The fixing of this problem required the following: 1. Hook up a java callback that is designed to allow the selection of a candidate client auth cert to be sent to Ldap in the

Re: [Pki-devel] [pki-devel][PATCH] Non server keygen issue in SCP03.

2017-05-05 Thread Matthew Harmsen
On 05/05/2017 02:12 PM, John Magne wrote: [PATCH] Non server keygen issue in SCP03. Ticket 1663 Add SCP03 support: https://pagure.io/dogtagpki/issue/1663 We discovered a minor issue when trying to log values that don't exist when performing the non server side keygen case. For instance , we do

Re: [Pki-devel] [pki-devel][PATCH] 0095-Resolve-1663-Add-SCP03-support.patch

2017-06-02 Thread Matthew Harmsen
On 06/02/2017 04:44 PM, John Magne wrote: Ticket: Resolve #1663 Add SCP03 support . This particular fix resolves a simple issue when formatting a token in FIPS mode for SCP03. ___ Pki-devel mailing list Pki-devel@redhat.com https:/

Re: [Pki-devel] [pki-devel][PATCH] 0095-Resolve-1663-Add-SCP03-support.patch

2017-06-02 Thread John Magne
- From: "Matthew Harmsen" To: "John Magne" , "pki-devel" Sent: Friday, June 2, 2017 4:01:14 PM Subject: Re: [Pki-devel] [pki-devel][PATCH] 0095-Resolve-1663-Add-SCP03-support.patch On 06/02/2017 04:44 PM, John Magne wrote: > > > > Ticket: Resolve #16

Re: [Pki-devel] [pki-devel][PATCH]0061-Enhance-tkstool-for-capabilities-and-security.patch

2016-01-27 Thread Christina Fu
I think I will be more conservative and give conditional ACK to this patch pending on tests on servers running on both LunaSA and nethsm. Although the code in the patch might very well work for both, those two HSM's are known to require different sets of pk11AtrFlags and often one set would wo

[Pki-devel] [pki-devel][PATCH] 0062-Allow-cert-and-key-indexes-9.patch

2016-02-02 Thread John Magne
Subject: [PATCH] Allow cert and key indexes > 9. Ticket: Ticket #1734 : TPS issue with overflowing PKCS#11 cert index numbers This patch contains the following: 1. Fixes in TPS to allow the server to set and read muscle object ID's that are greater than 9. The id is stored as a single ASCII by

Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-to-Java-classes.patch

2016-04-17 Thread Fraser Tweedale
On Fri, Apr 15, 2016 at 10:03:03PM -0400, John Magne wrote: > Subject: [PATCH] Port symkey JNI to Java classes. Ticket #801 : Merge > pki-symkey into jss > > What is supported: > > 1. Everything that is needed to support Secure Channel Protocol 01. > 2. Supports the nist sp800 kdf and the origin

Re: [Pki-devel] [pki-devel][PATCH]0061-Enhance-tkstool-for-capabilities-and-security.patch

2016-05-12 Thread John Magne
ginal Message - From: "Christina Fu" To: pki-devel@redhat.com Sent: Wednesday, January 27, 2016 10:24:26 AM Subject: Re: [Pki-devel] [pki-devel][PATCH]0061-Enhance-tkstool-for-capabilities-and-security.patch I think I will be more conservative and give conditional ACK to this patch p

Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-to-Java-classes.patch

2016-05-13 Thread Christina Fu
Hi, First of all, I have to say that Jack did a wonderful job on such daunting task. The sheer amount of code and complexity does make the review more challenging, but I dug through them with my teeth and claws regardless ;-). We discussed and think we should postpone the checkin to next rel

Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-to-Java-classes.patch

2016-05-18 Thread Christina Fu
vised patches: Thanks to cfu for careful review. Also enclosed responses to comments ,for convenience. - Original Message - From: "Christina Fu" To: pki-devel@redhat.com Sent: Friday, May 13, 2016 11:34:17 AM Subject: Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-

Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-to-Java-classes.patch

2016-05-23 Thread Christina Fu
revised patches: Thanks to cfu for careful review. Also enclosed responses to comments ,for convenience. - Original Message - From: "Christina Fu" To: pki-devel@redhat.com Sent: Friday, May 13, 2016 11:34:17 AM Subject: Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey

Re: [Pki-devel] [pki-devel][PATCH] 0064-Port-symkey-JNI-to-Java-classes.patch

2016-05-23 Thread John Magne
. SCP03 support can be added later. New ticket created for future refinements: https://fedorahosted.org/pki/ticket/2337 Closing #801 - Original Message - From: "Christina Fu" To: pki-devel@redhat.com Sent: Monday, May 23, 2016 8:56:40 AM Subject: Re: [Pki-devel] [pki-devel][PA

[Pki-devel] [pki-devel][PATCH] 0069-Show-KeyOwner-info-when-viewing-recovery-requests.patch

2016-06-01 Thread John Magne
Show KeyOwner info when viewing recovery requests. This simple fix will grab the subject info out of the cert associated with either pending or complete recovery requests being viewed in the KRA UI. For example: KeyOwner: UID=jmagne, O=Token Key User Wil

[Pki-devel] [pki-devel][PATCH] 0071-UdnPwdDirAuth-authentication-plugin-instance-is-not-.patch

2016-06-08 Thread John Magne
UdnPwdDirAuth authentication plugin instance is not working. Ticket #1579 : UdnPwdDirAuth authentication plugin instance is not working. Since this class no longer works, we felt it best to just remove it from the server. This patch removes the references and files

[Pki-devel] [pki-devel][PATCH] 0076-MAN-Apply-generateCRMFRequest-removed-from-Firefox-w.patch

2016-07-14 Thread John Magne
[MAN] Apply 'generateCRMFRequest() removed from Firefox' workarounds to appropriate 'pki' man page Ticket #1285 This fix will involve the following changes to the source tree. 1. Fixes to the CS.cfg to add two new cert profiles. 2. Make the caDualCert.cfg profile invisible since it has little

Re: [Pki-devel] [pki-devel][PATCH] 0080-Authentication-Instance-Id-PinDirEnrollment-with-aut.patch

2016-08-19 Thread John Magne
Verbal cond ACK from CFU: Minor issue taken care of: commit e5ef4374eae5219a8b5e9a216c1c2ed77fb3e709 Author: Jack Magne Date: Tue Aug 16 16:58:49 2016 -0700 Authentication Instance Id PinDirEnrollment with authType value as SslclientAuth is not working. Pushed to master, closing ticket

[Pki-devel] [pki-devel][PATCH] 0084-TPS-token-enrollment-fails-to-setupSecureChannel-whe.patch

2016-10-20 Thread John Magne
TPS token enrollment fails to setupSecureChannel when TPS and TKS security db is on fips mode. Ticket #2513. Simple fix allows the TPS and TKS the ability to obtain the proper internal token, even in FiPS mode. From 00bba5092fa32b956d646b4711411b8c57bd8f75 Mon Sep 17 00:00:00 2

[Pki-devel] [pki-devel][PATCH] 0091-SCP03 support for g&d 7 card.patch

2017-03-29 Thread John Magne
[PATCH] SCP03 support for g&d sc 7 card. Ticket: https://pagure.io/dogtagpki/issue/1663 Add SCP03 support This allows the use of the g&d 7 card. This will require the following: 1. An out of band method is needed to generate an AES based master key. We do not as of yet have support with tkstoo

Re: [Pki-devel] [pki-devel][PATCH] 0062-Allow-cert-and-key-indexes-9.patch

2016-02-05 Thread Christina Fu
the code looks good. I applied the patch and upgraded my libcoolkey and played with it. I was able to enroll for 2 certs and "recover" 5 (makes a total of 7), and then continued to run externalReg enrollment again to delete one cert and recover another. ACK, Christina On 02/02/2016 06:46 PM,

Re: [Pki-devel] [pki-devel][PATCH] 0062-Allow-cert-and-key-indexes-9.patch

2016-02-05 Thread John Magne
February 5, 2016 4:22:40 PM Subject: Re: [Pki-devel] [pki-devel][PATCH] 0062-Allow-cert-and-key-indexes-9.patch the code looks good. I applied the patch and upgraded my libcoolkey and played with it. I was able to enroll for 2 certs and "recover" 5 (makes a total of 7), and then continued

Re: [Pki-devel] [pki-devel][PATCH] 0069-Show-KeyOwner-info-when-viewing-recovery-requests.patch

2016-06-03 Thread Christina Fu
while the patch works, I think the original code logic is somehow flawed in a way that it uses the "profile" attribute to determine whether the request was non-TMS archival requests, and if null it treats it as TMS. It would make better sense if we add a separate case instead of lumping the ha

Re: [Pki-devel] [pki-devel][PATCH] 0069-Show-KeyOwner-info-when-viewing-recovery-requests.patch

2016-06-03 Thread John Magne
gt; From: "Christina Fu" > To: pki-devel@redhat.com > Sent: Friday, June 3, 2016 2:46:28 PM > Subject: Re: [Pki-devel] [pki-devel][PATCH] > 0069-Show-KeyOwner-info-when-viewing-recovery-requests.patch > > while the patch works, I think the original code logic is someho

Re: [Pki-devel] [pki-devel][PATCH] 0071-UdnPwdDirAuth-authentication-plugin-instance-is-not-.patch

2016-06-16 Thread Christina Fu
Looks good. If compiles, installs, and runs, ACK. Christina On 06/08/2016 10:58 AM, John Magne wrote: UdnPwdDirAuth authentication plugin instance is not working. Ticket #1579 : UdnPwdDirAuth authentication plugin instance is not working. Since this class no longer w

[Pki-devel] [pki-devel][PATCH] 0073-Separated-TPS-does-not-automatically-receive-shared-.patch

2016-06-23 Thread John Magne
[PATCH] Separated TPS does not automatically receive shared secret from remote TKS. Support to allow the TPS to do the following: 1. Request that the TKS creates a shared secret with the proper ID, pointing to the TPS. 2. Have the TKS securely return the shared secret back to the TPS during t

[Pki-devel] [pki-devel][PATCH] 0075-Generting-Symmetric-key-fails-with-key-generate-when.patch

2016-06-24 Thread John Magne
Generting Symmetric key fails with key-generate when --usages verify is passed Ticket #1114 Minor adjustment to the man page for the key management commands to say which usages are appropriate for sym keys and those appropriate for asym keys. From a211222ee4b30ad390228ad

Re: [Pki-devel] [pki-devel][PATCH] 0076-MAN-Apply-generateCRMFRequest-removed-from-Firefox-w.patch

2016-07-14 Thread John Magne
Conditionally ACKED by cfu. She wanted me to test the new ECC signing cert only profile I added: Test was a success. Pushed to master Closing ticket #1285 Also release note bug on how to use the new profiles here: https://bugzilla.redhat.com/show_bug.cgi?id=1355849 - Original Message -

[Pki-devel] [pki-devel][PATCH] 0083-PIN_RESET-policy-is-not-giving-expected-results-when.patch

2016-10-18 Thread John Magne
PIN_RESET policy is not giving expected results when set on a token. Simple fix to actually honor the PIN_RESET=or policy for a given token. Minor logging improvements added as well for this error condition. Ticket #2510. From 09dba122f01881b93d32a03a51d0be37c247cb30 Mon Sep 17

Re: [Pki-devel] [pki-devel][PATCH] 0084-TPS-token-enrollment-fails-to-setupSecureChannel-whe.patch

2016-10-21 Thread Christina Fu
Just a minor suggestion. Endi added in CryptalUtil.java lately to fix similar FIPS related issue: isInternalToken(). You might want to take advantage of that instead as it does ignore case. It's up to you. ACK. Christina On 10/20/2016 03:24 PM, John Magne wrote: TPS token enrollment fail

Re: [Pki-devel] [pki-devel][PATCH] 0091-SCP03 support for g&d 7 card.patch

2017-04-10 Thread Christina Fu
looks fine. ack. Christina On 03/29/2017 11:22 AM, John Magne wrote: [PATCH] SCP03 support for g&d sc 7 card. Ticket: https://pagure.io/dogtagpki/issue/1663 Add SCP03 support This allows the use of the g&d 7 card. This will require the following: 1. An out of band method is needed to gen

[Pki-devel] [pki-devel][PATCH] 0098-SCP03-support-fix-Key-Changeover-with-HSM-RHCS.patch

2017-06-29 Thread John Magne
[PATCH] SCP03 support: fix Key Changeover with HSM (RHCS) Ticket #2764. This relatively simple fix involves making sure the correct crypto token is being used to search for the master key int the case of symmetric key changover where the master key resides on an HSM. From e992fcdfbb6805e5f9310f

[Pki-devel] [pki-devel][PATCH 0003] Added condition for checking instance id in kra commands

2016-06-30 Thread Abhijeet Kasurde
Hi All, Please review this patch. Partially fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1351295 -- Thanks, Abhijeet Kasurde IRC: akasurde http://akasurde.github.io From ebda787c714e950e682ef42177a18927b8398c1f Mon Sep 17 00:00:00 2001 From: Abhijeet Kasurde Date: Thu, 30 Jun 2016 15:1

Re: [Pki-devel] [pki-devel][PATCH] 0075-Generting-Symmetric-key-fails-with-key-generate-when.patch

2016-06-30 Thread Matthew Harmsen
On 06/24/2016 06:23 PM, John Magne wrote: Generting Symmetric key fails with key-generate when --usages verify is passed Ticket #1114 Minor adjustment to the man page for the key management commands to say which usages are appropriate for sym keys and those appropriate

Re: [Pki-devel] [pki-devel][PATCH] 0075-Generting-Symmetric-key-fails-with-key-generate-when.patch

2016-07-01 Thread John Magne
the man page for the key management commands to say which usages are appropriate for sym keys and those appropriate for asym keys. - Original Message - From: "Matthew Harmsen" To: "John Magne" , "pki-devel" Sent: Thursday, June 30, 2016 2:54:29 PM

Re: [Pki-devel] [pki-devel][PATCH] 0073-Separated-TPS-does-not-automatically-receive-shared-.patch

2016-07-01 Thread John Magne
ACKED verbally by cfu, with some very minor changes. Pushed to master: commit 0f056221d096a30307834265ecd1c527087bb0f7 Author: Jack Magne Date: Mon Jun 13 11:27:59 2016 -0700 Separated TPS does not automatically receive shared secret from remote TKS. Closing ticket # 2349

[Pki-devel] [pki-devel][PATCH] 0082-Cert-Key-recovery-is-successful-when-the-cert-serial.patch

2016-10-18 Thread John Magne
Cert/Key recovery is successful when the cert serial number and key id on the ldap user mismatches Fixes this bug #1381375. The portion this patch fixes involves URL encoding glitch we encountered when recovering keys using the "by cert" method. Also this bug addresses:

Re: [Pki-devel] [pki-devel][PATCH] 0083-PIN_RESET-policy-is-not-giving-expected-results-when.patch

2016-10-19 Thread Christina Fu
code looks fine. If tested to work, ACK. Christina On 10/18/2016 07:02 PM, John Magne wrote: PIN_RESET policy is not giving expected results when set on a token. Simple fix to actually honor the PIN_RESET=or policy for a given token. Minor logging improvements added as well for th

[Pki-devel] [pki-devel][PATCH] 0086-Resolve-pkispawn-does-not-change-default-ecc-key-siz.patch

2016-12-08 Thread John Magne
Simple patch will provide a fix to this issue.From e7821b4061d22d23013f7d00c066fc6e59d83167 Mon Sep 17 00:00:00 2001 From: Jack Magne Date: Thu, 8 Dec 2016 16:35:20 -0800 Subject: [PATCH] Resolve: pkispawn does not change default ecc key size from nistp256 when nistp384 is specified in spawn con

[Pki-devel] [pki-devel][PATCH] 0086-Ticket-2569-Token-memory-not-wiped-after-key-deletio.patch

2016-12-16 Thread John Magne
Author: Jack Magne Date: Fri Dec 16 16:25:48 2016 -0800 Ticket #2569: Token memory not wiped after key deletion This is the dogtag upstream side of the TPS portion of this ticket. This fix also involves an applet fix, handled in another bug. From 08fa0ff96d7dd6ed6c3b11527251e60

Re: [Pki-devel] [pki-devel][PATCH] 0098-SCP03-support-fix-Key-Changeover-with-HSM-RHCS.patch

2017-06-29 Thread Christina Fu
looks good. ACK. Christina On 06/29/2017 03:43 PM, John Magne wrote: [PATCH] SCP03 support: fix Key Changeover with HSM (RHCS) Ticket #2764. This relatively simple fix involves making sure the correct crypto token is being used to search for the master key int the case of symmetric key chan

[Pki-devel] [pki-devel][PATCH 0001] Added condition to verify instance id in db-schema-upgrade

2016-06-29 Thread Abhijeet Kasurde
Hi All, Please review the patch. -- Thanks, Abhijeet Kasurde IRC: akasurde http://akasurde.github.io From 04cdf13525636add733e8c10525c0b48a4ef3c66 Mon Sep 17 00:00:00 2001 From: Abhijeet Kasurde Date: Wed, 29 Jun 2016 14:44:45 +0530 Subject: [PATCH] Added condition to verify instance id in db

Re: [Pki-devel] [pki-devel][PATCH 0003] Added condition for checking instance id in kra commands

2016-06-30 Thread Endi Sukma Dewata
On 6/30/2016 5:09 AM, Abhijeet Kasurde wrote: Hi All, Please review this patch. Partially fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1351295 -- Thanks, Abhijeet Kasurde Thanks! Pushed to master with some changes: 1. The original code was supposed to normalize the token name, so if

Re: [Pki-devel] [pki-devel][PATCH] 0082-Cert-Key-recovery-is-successful-when-the-cert-serial.patch

2016-10-18 Thread Christina Fu
If tested to work for all cases, ACK. Christina On 10/18/2016 03:22 PM, John Magne wrote: Cert/Key recovery is successful when the cert serial number and key id on the ldap user mismatches Fixes this bug #1381375. The portion this patch fixes involves URL encoding glitch we

Re: [Pki-devel] [pki-devel][PATCH] 0082-Cert-Key-recovery-is-successful-when-the-cert-serial.patch

2016-10-19 Thread John Magne
that makes sure it works. This small fix is in TPSEngine.java where the constant for GenerateNewAndRecoverLast scheme is declared. - Original Message - From: "Christina Fu" To: pki-devel@redhat.com Sent: Tuesday, October 18, 2016 4:24:08 PM Subject: Re: [Pki-devel] [pki

Re: [Pki-devel] [pki-devel][PATCH] 0086-Resolve-pkispawn-does-not-change-default-ecc-key-siz.patch

2016-12-08 Thread Matthew Harmsen
On 12/08/2016 05:42 PM, John Magne wrote: Simple patch will provide a fix to this issue. ___ Pki-devel mailing list Pki-devel@redhat.com https://www.redhat.com/mailman/listinfo/pki-devel Tested original code to confirm incorrect ECC signing curve; t

Re: [Pki-devel] [pki-devel][PATCH] 0086-Resolve-pkispawn-does-not-change-default-ecc-key-siz.patch

2016-12-09 Thread John Magne
rmsen" > To: "John Magne" , "pki-devel" > Sent: Thursday, December 8, 2016 5:36:24 PM > Subject: Re: [Pki-devel] [pki-devel][PATCH] > 0086-Resolve-pkispawn-does-not-change-default-ecc-key-siz.patch > >

Re: [Pki-devel] [pki-devel][PATCH] 0086-Ticket-2569-Token-memory-not-wiped-after-key-deletio.patch

2017-01-05 Thread Christina Fu
Overall, it looks good. Just some minor suggestions, mostly for clarification purposes. * SecureChannel.java : clearAppletKeySlotData - would appreciate comments describing the content and format expected in the input "data" - maybe a positive debug message after the successful cleanup

[Pki-devel] [pki-devel] [PATCH] 0074-Add-ability-to-disallow-TPS-to-enroll-a-single-user-.patch

2016-06-24 Thread John Magne
Add ability to disallow TPS to enroll a single user on multiple tokens. This patch will install a check during the early portion of the enrollment process check a configurable policy whether or not a user should be allowed to have more that one active token. This check wi

[Pki-devel] [pki-devel][PATCH 0002] Added fix for checking ldapmodify return code in db-schema-upgrade

2016-06-29 Thread Abhijeet Kasurde
Hi All, Please review the patch. -- Thanks, Abhijeet Kasurde IRC: akasurde http://akasurde.github.io From cbceb43b39249f4455c232a01aed7aa5c9cc701f Mon Sep 17 00:00:00 2001 From: Abhijeet Kasurde Date: Wed, 29 Jun 2016 18:06:12 +0530 Subject: [PATCH] Added fix for checking ldapmodify return co

Re: [Pki-devel] [pki-devel][PATCH 0001] Added condition to verify instance id in db-schema-upgrade

2016-06-30 Thread Endi Sukma Dewata
On 6/29/2016 4:20 AM, Abhijeet Kasurde wrote: Hi All, Please review the patch. -- Thanks, Abhijeet Kasurde Thanks! Pushed to master. -- Endi S. Dewata ___ Pki-devel mailing list Pki-devel@redhat.com https://www.redhat.com/mailman/listinfo/pki-dev

Re: [Pki-devel] [pki-devel][PATCH] 0060-Make-sure-the-ESC-auth-dialog-displays-the-User-Id-f.patch

2016-01-18 Thread John Magne
dhat.com Sent: Thursday, January 14, 2016 5:25:54 PM Subject: Re: [Pki-devel] [pki-devel][PATCH] 0060-Make-sure-the-ESC-auth-dialog-displays-the-User-Id-f.patch The patch made sure that the UID is displayed first. I tested out the patch to work. ACK. Christina On 01/13/2016 02:32 PM, Joh

Re: [Pki-devel] [pki-devel] [PATCH] 0074-Add-ability-to-disallow-TPS-to-enroll-a-single-user-.patch

2016-06-27 Thread Christina Fu
Just a few minor ones. * configuration parameters referencing token existence in tokendb should use names begin with "tokendb". e.g. tokendb.allowMultiActiveTokensPerUser.externalReg=false tokendb.allowMultiActiveTokensPerUser.nonExternalReg=false * boolean allowMultiCerts -- I think

Re: [Pki-devel] [pki-devel] [PATCH] 0074-Add-ability-to-disallow-TPS-to-enroll-a-single-user-.patch

2016-06-30 Thread John Magne
Addressed cfu's concerns and pushed to master for cond ACK. commit e326cd2f06bd651cdd87646eea94622e18cec28d Closing tiecket #1664 - Original Message - > From: "Christina Fu" > To: pki-devel@redhat.com > Sent: Monday, June 27, 2016 2:25:33 PM > Subject:

Re: [Pki-devel] [pki-devel][PATCH 0002] Added fix for checking ldapmodify return code in db-schema-upgrade

2016-06-30 Thread Endi Sukma Dewata
On 6/29/2016 7:43 AM, Abhijeet Kasurde wrote: Hi All, Please review the patch. -- Thanks, Abhijeet Kasurde Thanks! Pushed to master with some changes to handle all LDAP errors instead of some specific ones. -- Endi S. Dewata ___ Pki-devel mailin