From: Jakub J. <no...@gi...> - 2023-10-08 17:10:50
|
Branch: refs/heads/master Home: https://github.com/OpenSC/OpenSC Commit: 14cde761555045dcdfeb6f9e40a70ec837aa56b6 https://github.com/OpenSC/OpenSC/commit/14cde761555045dcdfeb6f9e40a70ec837aa56b6 Author: Jakub Jelen <jj...@re...> Date: 2023-10-08 (Sun, 08 Oct 2023) Changed paths: A src/tests/p11test/epass2003_ref.json Log Message: ----------- p11test: Add epass2003 reference file Commit: c3b1af03f76cb7a311dbbe85afc06af2df6d6381 https://github.com/OpenSC/OpenSC/commit/c3b1af03f76cb7a311dbbe85afc06af2df6d6381 Author: Jakub Jelen <jj...@re...> Date: 2023-10-08 (Sun, 08 Oct 2023) Changed paths: M src/libopensc/card-epass2003.c Log Message: ----------- ePass: Remove trainling whitespace Commit: 384460281117b444193f82a9d4ae35b6967d7af7 https://github.com/OpenSC/OpenSC/commit/384460281117b444193f82a9d4ae35b6967d7af7 Author: Jakub Jelen <jj...@re...> Date: 2023-10-08 (Sun, 08 Oct 2023) Changed paths: M src/libopensc/card-epass2003.c Log Message: ----------- ePass: Do not return positive exit code when the digest is not supported The code paths for the ECDSA signatures provide SHA1 and SHA256 padding. Any other padding should return an error as unsopported operation, but given that the variable r was reused for some temporary calculation it returned positive value, which was handled by the calling code as a success. Moreover, the calling code in use_key() function skipped the key operation with this return value causing returning the uninitialized memory to the calling process. Commit: 67a38748f55a01ca1d4adf88aad76be1e8c794eb https://github.com/OpenSC/OpenSC/commit/67a38748f55a01ca1d4adf88aad76be1e8c794eb Author: Jakub Jelen <jj...@re...> Date: 2023-10-08 (Sun, 08 Oct 2023) Changed paths: M src/libopensc/card-epass2003.c Log Message: ----------- epass: Pass real data length for RAW ECDSA signatures Compare: https://github.com/OpenSC/OpenSC/compare/3491771370a0...67a38748f55a |