You can subscribe to this list here.
2012 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2013 |
Jan
(26) |
Feb
(64) |
Mar
(78) |
Apr
(36) |
May
(51) |
Jun
(40) |
Jul
(43) |
Aug
(102) |
Sep
(50) |
Oct
(71) |
Nov
(42) |
Dec
(29) |
2014 |
Jan
(49) |
Feb
(52) |
Mar
(56) |
Apr
(30) |
May
(31) |
Jun
(52) |
Jul
(76) |
Aug
(19) |
Sep
(82) |
Oct
(95) |
Nov
(58) |
Dec
(76) |
2015 |
Jan
(135) |
Feb
(43) |
Mar
(47) |
Apr
(72) |
May
(59) |
Jun
(20) |
Jul
(17) |
Aug
(14) |
Sep
(34) |
Oct
(62) |
Nov
(48) |
Dec
(23) |
2016 |
Jan
(18) |
Feb
(55) |
Mar
(24) |
Apr
(20) |
May
(33) |
Jun
(29) |
Jul
(18) |
Aug
(15) |
Sep
(8) |
Oct
(21) |
Nov
(5) |
Dec
(23) |
2017 |
Jan
(3) |
Feb
|
Mar
(17) |
Apr
(4) |
May
|
Jun
(5) |
Jul
(1) |
Aug
(20) |
Sep
(17) |
Oct
(21) |
Nov
|
Dec
(3) |
2018 |
Jan
(62) |
Feb
(4) |
Mar
(4) |
Apr
(20) |
May
(16) |
Jun
|
Jul
(1) |
Aug
(9) |
Sep
(3) |
Oct
(11) |
Nov
|
Dec
(9) |
2019 |
Jan
(1) |
Feb
(1) |
Mar
(2) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
(5) |
Nov
|
Dec
(5) |
2020 |
Jan
(11) |
Feb
(14) |
Mar
(7) |
Apr
|
May
|
Jun
(3) |
Jul
(3) |
Aug
(6) |
Sep
(2) |
Oct
(15) |
Nov
(11) |
Dec
(7) |
2021 |
Jan
(14) |
Feb
(21) |
Mar
(3) |
Apr
(1) |
May
(1) |
Jun
|
Jul
(1) |
Aug
(1) |
Sep
(3) |
Oct
|
Nov
|
Dec
|
2022 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
(4) |
Nov
(12) |
Dec
|
2023 |
Jan
(2) |
Feb
(4) |
Mar
|
Apr
(8) |
May
|
Jun
(2) |
Jul
|
Aug
(3) |
Sep
(1) |
Oct
|
Nov
(1) |
Dec
(1) |
2024 |
Jan
|
Feb
(2) |
Mar
(6) |
Apr
(1) |
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
(4) |
Dec
|
2025 |
Jan
(1) |
Feb
|
Mar
|
Apr
(5) |
May
|
Jun
|
Jul
(11) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Johannes B. <Joh...@hr...> - 2013-05-06 07:45:04
|
Am Freitag 03 Mai 2013 schrieb Martin Paljak <ma...@ma...>: > > Keep in mind that CHVXX seems to take *decimal* input, and that cardos > driver actually seems to use max length 8, so: > > verify CHV129 30:34:35:32:39:31:FF:FF > > Should give "OK" (maybe you need to have the necessary folder selected > before as well) Yes, selecting the folder makes a difference, but it seems that the card expects length 10. opensc-explorer now produces: OpenSC [3F00]> cd 5015 OpenSC [3F00/5015]> verify CHV129 30:34:35:32:39:31:FF:FF Incorrect code. OpenSC [3F00/5015]> verify CHV129 30:34:35:32:39:31:FF:FF:FF:FF Unable to verify PIN code: Invalid arguments The PIN is accepted when using Firefox. Johannes |
From: Ludovic R. <lud...@gm...> - 2013-05-05 13:57:53
|
Hi, Please find the latest report on new defect(s) introduced to OpenSC found with Coverity SCAN Defect(s) Reported-by: Coverity Scan Showing 7 of 43 defects ** CID 1019105: Destination buffer too small (STRING_OVERFLOW) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019105 ** CID 1019104: Wrong sizeof argument (SIZEOF_MISMATCH) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019104 ** CID 1019103: Resource leak (RESOURCE_LEAK) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019103 ** CID 1019102: Resource leak (RESOURCE_LEAK) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019102 ** CID 1019101: Printf arg count mismatch (PW.TOO_MANY_PRINTF_ARGS) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019101 ** CID 1019100: Printf arg count mismatch (PW.TOO_MANY_PRINTF_ARGS) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019100 ** CID 1019099: Improper use of negative value (NEGATIVE_RETURNS) http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10104#mergedDefectId=1019099 These bugs are only the NEW bugs since my last submission (a few months ago). Many other bugs should also be fixed. The URL above can't be used if you do not have an account on coverity. I would be happy to open an account for you if: - you are already a developper of OpenSC - you plan to fix bugs detected by coverity Bye ________________________________________________________________________ CID 1019105: Destination buffer too small (STRING_OVERFLOW) /src/tools/util.c: 316 ( string_overflow) 313 sprintf(buf + 3, "#%d", e->key_ref); 314 break; 315 case SC_AC_SCB: >>> You might overrun the 10 byte destination string "buf" by writing 17 bytes from ""Sec.ControlByte "". 316 strcpy(buf, "Sec.ControlByte "); 317 if (e->key_ref != SC_AC_KEY_REF_NONE) 318 sprintf(buf + 3, "Ox%X", e->key_ref); 319 break; 320 case SC_AC_IDA: /src/tools/util.c: 321 ( string_overflow) 318 sprintf(buf + 3, "Ox%X", e->key_ref); 319 break; 320 case SC_AC_IDA: >>> You might overrun the 10 byte destination string "buf" by writing 16 bytes from ""PKCS#15 AuthID "". 321 strcpy(buf, "PKCS#15 AuthID "); 322 if (e->key_ref != SC_AC_KEY_REF_NONE) 323 sprintf(buf + 3, "#%d", e->key_ref); 324 break; 325 default: ________________________________________________________________________ CID 1019104: Wrong sizeof argument (SIZEOF_MISMATCH) /src/tools/sc-hsm-tool.c: 145 ( suspicious_sizeof) 142 int bits = 0; 143 144 // Seed the RNG >>> Passing argument "rngSeed" of type "char *" and argument "8 /* sizeof (rngSeed) */" to function "RAND_seed" is suspicious. 145 RAND_seed(rngSeed, sizeof(rngSeed)); 146 147 // Determine minimum number of bits for prime >= max(2^r, n + 1) 148 bits = BN_num_bits_word(n + 1) > BN_num_bits(s) ? (BN_num_bits_word(n + 1)) : (BN_num_bits(s)); 149 ________________________________________________________________________ CID 1019103: Resource leak (RESOURCE_LEAK) /src/tools/sc-hsm-tool.c: 288 ( alloc_fn) 285 unsigned char j; 286 287 // Array representing the polynomial a(x) = s + a_1 * x + ... + a_n-1 * x^n-1 mod p >>> Calling allocation function "malloc". 288 BIGNUM **bValue = malloc(t * sizeof(BIGNUM *)); 289 BIGNUM **pbValue; 290 BIGNUM numerator; 291 BIGNUM denominator; 292 BIGNUM temp; /src/tools/sc-hsm-tool.c: 288 ( var_assign) 285 unsigned char j; 286 287 // Array representing the polynomial a(x) = s + a_1 * x + ... + a_n-1 * x^n-1 mod p >>> Assigning: "bValue" = storage returned from "malloc(t * 8UL)". 288 BIGNUM **bValue = malloc(t * sizeof(BIGNUM *)); 289 BIGNUM **pbValue; 290 BIGNUM numerator; 291 BIGNUM denominator; 292 BIGNUM temp; /src/tools/sc-hsm-tool.c: 298 ( var_assign) 295 BN_CTX *ctx; 296 297 // Initialize >>> Assigning: "pbValue" = "bValue". 298 pbValue = bValue; 299 for (i = 0; i < t; i++) { 300 *pbValue = BN_new(); 301 BN_init(*pbValue); 302 pbValue++; /src/tools/sc-hsm-tool.c: 313 ( overwrite_var) 310 ctx = BN_CTX_new(); 311 BN_CTX_init(ctx); 312 >>> Overwriting "pbValue" in call "pbValue = bValue" leaks the storage that "pbValue" points to. 313 pbValue = bValue; 314 sp_i = shares; 315 for (i = 0; i < t; i++) { 316 317 BN_one(&numerator); /src/tools/sc-hsm-tool.c: 313 ( var_assign) 310 ctx = BN_CTX_new(); 311 BN_CTX_init(ctx); 312 >>> Assigning: "pbValue" = "bValue". 313 pbValue = bValue; 314 sp_i = shares; 315 for (i = 0; i < t; i++) { 316 317 BN_one(&numerator); /src/tools/sc-hsm-tool.c: 341 ( leaked_storage) 338 * multiplication 339 */ 340 if (BN_mod_inverse(&denominator, &denominator, &prime, ctx) == NULL ) { >>> Variable "bValue" going out of scope leaks the storage it points to. 341 return -1; 342 } 343 344 BN_mod_mul(*pbValue, &numerator, &denominator, &prime, ctx); 345 /src/tools/sc-hsm-tool.c: 341 ( leaked_storage) 338 * multiplication 339 */ 340 if (BN_mod_inverse(&denominator, &denominator, &prime, ctx) == NULL ) { >>> Variable "pbValue" going out of scope leaks the storage it points to. 341 return -1; 342 } 343 344 BN_mod_mul(*pbValue, &numerator, &denominator, &prime, ctx); 345 ________________________________________________________________________ CID 1019102: Resource leak (RESOURCE_LEAK) /src/libopensc/card.c: 70 ( alloc_fn) 67 struct sc_apdu *apdu = NULL; 68 69 assert(copy_from != NULL); >>> Calling allocation function "malloc". 70 apdu = (struct sc_apdu *)malloc(sizeof(struct sc_apdu)); 71 if (!copy_from || !apdu) 72 return apdu; 73 memcpy(apdu, copy_from, sizeof(struct sc_apdu)); 74 apdu->data = apdu->resp = NULL; /src/libopensc/card.c: 70 ( var_assign) 67 struct sc_apdu *apdu = NULL; 68 69 assert(copy_from != NULL); >>> Assigning: "apdu" = storage returned from "malloc(104UL)". 70 apdu = (struct sc_apdu *)malloc(sizeof(struct sc_apdu)); 71 if (!copy_from || !apdu) 72 return apdu; 73 memcpy(apdu, copy_from, sizeof(struct sc_apdu)); 74 apdu->data = apdu->resp = NULL; /src/libopensc/card.c: 73 ( noescape) 70 apdu = (struct sc_apdu *)malloc(sizeof(struct sc_apdu)); 71 if (!copy_from || !apdu) 72 return apdu; >>> Variable "apdu" is not freed or pointed-to in function "memcpy". 73 memcpy(apdu, copy_from, sizeof(struct sc_apdu)); 74 apdu->data = apdu->resp = NULL; 75 apdu->next = NULL; 76 apdu->datalen = apdu->resplen = 0; 77 apdu->allocation_flags = SC_APDU_ALLOCATE_FLAG; /src/libopensc/card.c: 82 ( leaked_storage) 79 if ((flags & SC_APDU_ALLOCATE_FLAG_DATA) && copy_from->data && copy_from->datalen) { 80 apdu->data = malloc(copy_from->datalen); 81 if (!apdu->data) >>> Variable "apdu" going out of scope leaks the storage it points to. 82 return NULL; 83 memcpy(apdu->data, copy_from->data, copy_from->datalen); 84 apdu->datalen = copy_from->datalen; 85 apdu->allocation_flags |= SC_APDU_ALLOCATE_FLAG_DATA; 86 } /src/libopensc/card.c: 91 ( leaked_storage) 88 if ((flags & SC_APDU_ALLOCATE_FLAG_RESP) && copy_from->resp && copy_from->resplen) { 89 apdu->resp = malloc(copy_from->resplen); 90 if (!apdu->resp) >>> Variable "apdu" going out of scope leaks the storage it points to. 91 return NULL; 92 memcpy(apdu->resp, copy_from->resp, copy_from->resplen); 93 apdu->resplen = copy_from->resplen; 94 apdu->allocation_flags |= SC_APDU_ALLOCATE_FLAG_RESP; 95 } ________________________________________________________________________ CID 1019101: Printf arg count mismatch (PW.TOO_MANY_PRINTF_ARGS) /src/tools/sc-hsm-tool.c: 839 ( too_many_printf_args) 836 */ 837 r = sc_get_challenge(card, rngseed, 16); 838 if (r < 0) { >>> the format string ends before this argument 839 printf("Error generating random seed failed with ", sc_strerror(r)); 840 OPENSSL_cleanse(pwd, *pwdlen); 841 free(pwd); 842 return r; 843 } ________________________________________________________________________ CID 1019100: Printf arg count mismatch (PW.TOO_MANY_PRINTF_ARGS) /src/tools/sc-hsm-tool.c: 816 ( too_many_printf_args) 813 814 r = sc_get_challenge(card, *pwd, 8); 815 if (r < 0) { >>> the format string ends before this argument 816 printf("Error generating random key failed with ", sc_strerror(r)); 817 OPENSSL_cleanse(pwd, *pwdlen); 818 free(pwd); 819 return r; 820 } ________________________________________________________________________ CID 1019099: Improper use of negative value (NEGATIVE_RETURNS) /src/tools/sc-hsm-tool.c: 1352 ( var_tested_neg) 1349 int opt_dkek_shares = -1; 1350 int opt_key_reference = -1; 1351 int opt_password_shares_threshold = -1; >>> Assigning: "opt_password_shares_total" = a negative value. 1352 int opt_password_shares_total = -1; 1353 int opt_force = 0; 1354 int opt_iter = 10000000; 1355 sc_context_param_t ctx_param; 1356 /src/tools/sc-hsm-tool.c: 1468 ( negative_returns) 1465 } 1466 1467 if (do_create_dkek_share) { >>> "opt_password_shares_total" is passed to a parameter that cannot be negative. 1468 create_dkek_share(card, opt_filename, opt_iter, opt_password, opt_password_shares_threshold, opt_password_shares_total); 1469 } 1470 1471 if (do_import_dkek_share) { 1472 import_dkek_share(card, opt_filename, opt_iter, opt_password, opt_password_shares_total); ________________________________________________________________________ -- Dr. Ludovic Rousseau |
From: Florent D. <fde...@gm...> - 2013-05-03 15:21:09
|
Hello Martin Whenever anything fails (with USB) under virtualization, *always* try > without it first (on real hardware). > Yes, I did that and it works. However I can't chose my working environment and I have to make it works on a virtual one... > If pcsc/ccid fails, the right place to go would be > > http://pcsclite.alioth.debian.org/ccid.html#support > I did. Ludovic told me the same thing ("try it on a real hardware") :) > but still, virtualization is known to cause strange and hard to debug > problems that can have nothing to do with the software stack in use in > the guest. If it causes troubles, maybe you should try with some other > virtualization platform (vmware) or ask for help on virtualbox list. > Indeed, with vmware it is working, but as said virtualbox is not an option for me ;( I'll try the virtualbox forum and list... Thanks! Cheers |
From: Martin P. <ma...@ma...> - 2013-05-03 13:54:11
|
Hello, On Fri, May 3, 2013 at 1:46 PM, Johannes Becker <Joh...@hr...> wrote: > I have a CardOS V4.3B chipcard that works with Firefox. > But the command > verify CHV81 30:34:35:32:39:31:FF:FF:FF:FF > > fails with > > Unable to verify PIN code: Invalid arguments > > > > The command > > verify CHV81 30:34:35:32:39:31:FF:FF > > fails with > > Unable to verify PIN code: Card command failed Keep in mind that CHVXX seems to take *decimal* input, and that cardos driver actually seems to use max length 8, so: verify CHV129 30:34:35:32:39:31:FF:FF Should give "OK" (maybe you need to have the necessary folder selected before as well) Martin |
From: Martin P. <ma...@ma...> - 2013-05-03 13:16:07
|
On Thu, May 2, 2013 at 7:08 PM, Florent Deybach <fde...@gm...> wrote: > This is my environment: ... > The Linux OS is under virtualBox 4.1.18 with USB 2.0 support. Whenever anything fails (with USB) under virtualization, *always* try without it first (on real hardware). If pcsc/ccid fails, the right place to go would be http://pcsclite.alioth.debian.org/ccid.html#support but still, virtualization is known to cause strange and hard to debug problems that can have nothing to do with the software stack in use in the guest. If it causes troubles, maybe you should try with some other virtualization platform (vmware) or ask for help on virtualbox list. Martin |
From: David L. <dr...@me...> - 2013-05-03 11:09:56
|
Hi, We have a legacy application using engine_pkcs11 on debian sarge (with openssl 0.9.8h). I would like to move to openssl 1.0.0.e, but we require pkcs11 support. I have taken engine_pkcs11 and libp11 from the opensc project repositories. When I try (e.g.): openssl dgst -engine pkcs11 -keyform engine -binary -sha1 -sign 10:a93d76ef41f5bb08f17cff81479a664646f66362 file which used to work, I now get the following errors: 3085010592:error:260C0065:engine routines:ENGINE_get_pkey_meth:unimplemented public key method:tb_pkmeth.c:127: 3085010592:error:0609D09C:digital envelope routines:INT_CTX_NEW:unsupported algorithm:pmeth_lib.c:164: There appears to have been a change in the openssl engine interface, such that engine_pkcs11 needs an update - Am I right in this assumption? regards, David Lamkin -- David Lamkin +44 (0) 1223 566731 (Direct), +44 (0) 1223 566727 (Fax) Metanate Limited. Registered in England No 4046086 at: Lincoln House, Station Court, Great Shelford, Cambridge CB22 5NE, UK www.metanate.com (Consultancy) www.schemus.com (Data synchronisation) This e-mail and all attachments it may contain is confidential and intended solely for the use of the individual to whom it is addressed. Any views or opinions presented are those of the author and do not necessarily represent those of Metanate Ltd. If you are not the intended recipient, be advised that you have received this e-mail in error and that any use, dissemination, printing, forwarding or copying of this e-mail is strictly prohibited. Please contact the sender if you have received this e-mail in error. |
From: Johannes B. <Joh...@hr...> - 2013-05-03 10:47:05
|
Hello, I have a CardOS V4.3B chipcard that works with Firefox. But the command verify CHV81 30:34:35:32:39:31:FF:FF:FF:FF fails with Unable to verify PIN code: Invalid arguments The command verify CHV81 30:34:35:32:39:31:FF:FF fails with Unable to verify PIN code: Card command failed pkcs15-tool says PIN [User Pin] Object Flags : [0x3], private, modifiable Auth ID : 02 ID : 01 Flags : [0x133], case-sensitive, local, initialized, needs-padding, disable_allowed Length : min_len:4, max_len:10, stored_len:10 Pad char : 0xFF Reference : 129 (0x81) Type : ascii-numeric Path : 3f005015 Johannes |
From: Johannes B. <Joh...@hr...> - 2013-05-03 10:24:58
|
Am Freitag 19 April 2013 schrieb "Andreas Schwier (ML)" <and...@ca...>: > Hi Johannes, > > works for me - however uninstall does not unload the PKCS#11 module. > > Can we put the XPI on the OpenSC website ? Yes, of course. I have no idea yet, if it is necessary to add a licence. Johannes > > we have an add-on for Mozilla Firefox that installs opensc-pkcs11.dll > > as a security device: > > > > > > > > http://chipkarte.uni-giessen.de/opensc-pkcs11-install.xpi > > ... |
From: German B. <ger...@gm...> - 2013-05-03 05:57:09
|
Hello, I know this was taken care of by Juan Antonio Martinez but I haven't been able to get any response from him. I have been working on support of DNIe on OpenSC 0.13.0. The current result is in https://github.com/OpenDNIe/OpenSC/tree/opendnie. The code is from the OpenDNIe project, with only a few changes to make it fit in OpenSC without any modification of the OpenSC code that is not required for adding a new card. Could somebody please tell me if this has any chances to be included in the next OpenSC release? Best regards, Germán Blanco. |
From: Anthony F. <ant...@gm...> - 2013-05-02 16:25:25
|
I think I answered at least one of my own questions: On Thu, May 2, 2013 at 10:15 AM, Anthony Foiani <ant...@gm...> wrote: > Is it possible to release the enumeration before returning the private > key? Apparently not. I added a cleanup phase right before returning the private key, but that caused a subsequent signing attempt to fail. > Or does the private key structure rely on information held in > the enumeration? So apparently it does. > If the latter, do we need to somehow provide a way for the key to > release the entire enumeration when the key itself is freed? I'll investigate this next. Certainly still interested if anyone has hints. Many thanks! Best regards, Anthony Foiani |
From: Anthony F. <ant...@gm...> - 2013-05-02 16:15:30
|
Greetings! I believe that I'm seeing memory leaks similar to those reported in this message: http://opensc.1086184.n5.nabble.com/engine-pkcs11-libp11-leaking-memory-td4529.html#a32328925 In particular, doing about 1 sign/minute, I'm leaking about 2MB/hr. Valgrind is noisy, but I believe the culprit is here: ==4912== 36,771 (80 direct, 36,691 indirect) bytes in 1 blocks are definitely lost in loss record 164 of 164 ==4912== at 0x4A0887C: malloc (/builddir/build/BUILD/valgrind-3.8.1/coregrind/m_replacemalloc/vg_replace_malloc.c:270) ==4912== by 0x5FA7F52: default_malloc_ex (/openssl-build/crypto/mem.c:79) ==4912== by 0x5FA85E1: CRYPTO_malloc (/openssl-build/crypto/mem.c:308) ==4912== by 0x5ABF641: pkcs11_malloc (/libp11-0.2.8/src/p11_misc.c:26) ==4912== by 0x5AC0AEE: PKCS11_enumerate_slots (/libp11-0.2.8/src/p11_slot.c:61) ==4912== by 0x89F054F: pkcs11_load_key.isra.2 (/engine_pkcs11-0.1.8/src/engine_pkcs11.c:584) ==4912== by 0x89F1AA3: pkcs11_load_private_key (/engine_pkcs11-0.1.8/src/engine_pkcs11.c:811) ==4912== by 0x603CA15: ENGINE_load_private_key (/openssl-build/crypto/engine/eng_pkey.c:122) ==4912== by 0x53CDBA7: Foo::OpenSSL::TokenEngine::getPrivKey(std::string const&) (/home/tony/FoianiLLC/foo/src/crypto/OpenSSLWrappers.cpp:258) ==4912== by 0x53C4249: Foo::CryptoService::signFileIncremental(std::string const&, unsigned long, unsigned long, std::vector<char, std::allocator<char> >&, std::string const&) (/home/tony/FoianiLLC/foo/src/crypto/CryptoService.cpp:440) ==4912== by 0x53C5617: Foo::CryptoService::signFile(std::string const&, unsigned long, std::string const&) (/home/tony/FoianiLLC/foo/src/crypto/CryptoService.cpp:401) ==4912== by 0x4127C4: boost::detail::function::void_function_obj_invoker0<test_main(int, char**)::{lambda()#1}, void>::invoke(boost::detail::function::function_buffer&) (/home/tony/FoianiLLC/foo/src/crypto/CryptoServiceTest.cpp:97) That is, pkcs11_load_key is doing an enumeration over the slots, and that enumeration is never released. The numbers work out about right -- 60 reps/hr * 36KiB/rep is pretty close to my rough estimate of 2MiB/hr. Is it possible to release the enumeration before returning the private key? Or does the private key structure rely on information held in the enumeration? If the latter, do we need to somehow provide a way for the key to release the entire enumeration when the key itself is freed? Best regards, Anthony Foiani p.s. I know that the answer might be "just get the key once, not each time you need to sign something". But for an embedded device that is designed to go months or years without reboots, a memory leak is bad news, even if it's only each time the token is inserted. |
From: Florent D. <fde...@gm...> - 2013-05-02 16:09:03
|
00000000 debuglog.c:269:DebugLogSetLevel() debug level=debug 00000035 debuglog.c:298:DebugLogSetCategory() Debug options: APDU 00000127 configfile.l:245:DBGetReaderListDir() Parsing conf directory: /etc/reader.conf.d 00000019 configfile.l:298:DBGetReaderList() Parsing conf file: /etc/reader.conf.d/libccidtwin 00000049 configfile.l:257:DBGetReaderListDir() Skipping non regular file: .. 00000004 configfile.l:257:DBGetReaderListDir() Skipping non regular file: . 00000007 pcscdaemon.c:516:main() pcsc-lite 1.8.5 daemon ready. 00000784 hotplug_libudev.c:260:get_driver() Looking for a driver for VID: 0x1D6B, PID: 0x0001, path: /dev/bus/usb/002/001 00000133 hotplug_libudev.c:260:get_driver() Looking for a driver for VID: 0x1D6B, PID: 0x0001, path: /dev/bus/usb/002/001 00000123 hotplug_libudev.c:260:get_driver() Looking for a driver for VID: 0x80EE, PID: 0x0021, path: /dev/bus/usb/002/002 00000150 hotplug_libudev.c:260:get_driver() Looking for a driver for VID: 0x1D6B, PID: 0x0002, path: /dev/bus/usb/001/001 07477459 hotplug_libudev.c:260:get_driver() Looking for a driver for VID: 0x1E0D, PID: 0x002A, path: /dev/bus/usb/002/006 00000054 hotplug_libudev.c:312:HPAddDevice() Adding USB device: Neowave Weneo2 SIM 00000119 readerfactory.c:978:RFInitializeReader() Attempting startup of Neowave Weneo2 SIM [CCID Interface] (7FFFFFFF) 00 00 using /usr/lib/pcsc/drivers/ifd-ccid.bundle 00000193 readerfactory.c:868:RFBindFunctions() Loading IFD Handler 3.0 00000052 ifdhandler.c:1832:init_driver() Driver version: 1.4.7 00000193 ifdhandler.c:1849:init_driver() LogLevel: 0x0003 00000047 ifdhandler.c:1860:init_driver() DriverOptions: 0x0000 00000043 ifdhandler.c:1873:init_driver() LogLevel from LIBCCID_ifdLogLevel: 0x000F 00000025 ifdhandler.c:83:CreateChannelByNameOrChannel() Lun: 0, device: usb:1e0d/002a:libudev:0:/dev/bus/usb/002/006 00000025 ccid_usb.c:180:OpenUSBByName() Reader index: 0, Device: usb:1e0d/002a:libudev:0:/dev/bus/usb/002/006 00000035 ccid_usb.c:212:OpenUSBByName() interface_number: 0 00001960 ccid_usb.c:228:OpenUSBByName() Using: /usr/lib/pcsc/drivers/ifd-ccid.bundle/Contents/Info.plist 00000218 ccid_usb.c:246:OpenUSBByName() ifdManufacturerString: Ludovic Rousseau (lud...@fr...) 00000164 ccid_usb.c:247:OpenUSBByName() ifdProductString: Generic CCID driver 00000038 ccid_usb.c:248:OpenUSBByName() Copyright: This driver is protected by terms of the GNU Lesser General Public License version 2.1, or (at your option) any later 00000804 ccid_usb.c:375:OpenUSBByName() Checking device: 2/6 00001251 ccid_usb.c:430:OpenUSBByName() Trying to open USB bus/device: 2/6 00000802 ccid_usb.c:521:OpenUSBByName() Found Vendor/Product: 1E0D/002A (Neowave Weneo2 SIM) 00000044 ccid_usb.c:523:OpenUSBByName() Using USB bus/device: 2/6 00000023 ccid_usb.c:1041:ControlUSB() request: 0x03 03015304 ccid_usb.c:1054:ControlUSB() control failed (2/6): -7 Success 00000072 ccid_usb.c:985:get_data_rates() IFD does not support GET_DATA_RATES request: -7 02012342 ccid_usb.c:1090:InterruptRead() before (0) 00120244 ccid_usb.c:1132:InterruptRead() after (0) (2) 00000100 -> 000000 65 00 00 00 00 00 00 00 00 00 00023604 <- 000000 81 00 00 00 00 00 00 01 00 01 00000092 ifdhandler.c:353:IFDHGetCapabilities() tag: 0xFB3, usb:1e0d/002a:libudev:0:/dev/bus/usb/002/006 (lun: 0) 00000021 readerfactory.c:332:RFAddReader() Using the reader polling thread 00000018 ifdhandler.c:1695:IFDHICCPresence() usb:1e0d/002a:libudev:0:/dev/bus/usb/002/006 (lun: 0) 00000026 -> 000000 65 00 00 00 00 00 01 00 00 00 05014885 ccid_usb.c:660:WriteUSB() write failed (2/6): -7 Success 00000071 ifdwrapper.c:348:IFDStatusICC() Card not transacted: 612 00000012 eventhandler.c:202:EHSpawnEventHandler() Initial Check Failed on Neowave Weneo2 SIM [CCID Interface] (7FFFFFFF) 00 00 00000011 readerfactory.c:338:RFAddReader() Neowave Weneo2 SIM [CCID Interface] (7FFFFFFF) init failed. 00000071 readerfactory.c:529:RFRemoveReader() UnrefReader() count was: 1 00000016 readerfactory.c:1029:RFUnInitializeReader() Attempting shutdown of Neowave Weneo2 SIM [CCID Interface] (7FFFFFFF) 00 00. 00000015 ifdhandler.c:244:IFDHCloseChannel() usb:1e0d/002a:libudev:0:/dev/bus/usb/002/006 (lun: 0) 00000037 -> 000000 63 00 00 00 00 00 02 00 00 00 00004752 <- 000000 81 00 00 00 00 00 02 01 00 01 00000069 ccid_usb.c:742:CloseUSB() Closing USB device: 2/6 00000012 ccid_usb.c:763:CloseUSB() Last slot closed. Release resources 00000055 readerfactory.c:905:RFUnloadReader() Unloading reader driver. 00000076 hotplug_libudev.c:384:HPAddDevice() Failed adding USB device: Neowave Weneo2 SIM |
From: Crypto S. <cry...@pr...> - 2013-04-29 14:07:37
|
Crypto Stick (an open source USB key containing an OpenPGP Card) has been accepted as a mentor organization for Google Summer of Code (GSOC) 2013. If you are a student interested in working on cool crypto stuff, developing a high security system, latest web security or embedded programming - this is for you. You can apply for a project with us and if accepted our mentors will work with you over the summer and Google will sponsor you USD 5000 during that time. Please check out our ideas page at https://www.assembla.com/spaces/cryptostick/wiki/Ideas or suggest your own idea. And, join our mailinglist to discuss it: https://lists.crypto-stick.org/mailman/listinfo/dev Your applications should be submitted through Google Melange (https://google-melange.com) until 3rd May! You can continue to submit additional information and comments into the system after your initial application submission. In order to participate in the program, you must be a student in an accredited institution or university. Links: * Crypto Stick project: http://crypto-stick.org * Ideas Page: https://www.assembla.com/spaces/cryptostick/wiki/Ideas * GSOC Progam F&Q: https://google-melange.appspot.com/gsoc/document/show/gsoc_program/google/gsoc2013/help_page * Crypto Stick Mailing List: https://lists.crypto-stick.org/mailman/listinfo/dev Regards, Jan |
From: Ludovic R. <lud...@gm...> - 2013-04-23 18:15:17
|
2013/4/23 <J.W...@mi...>: > Hi, Sorry for being too brief... > > Yes, pkcs only. No, not just the PKCS#11 library. > For small-scale (development) environment, I think one often needs tools for: > - changing the card status (if you buy Siemens card at cryptoshop, they are by default still in manufacturing-state). > - initialization of cards (applet) > - personification of cards (connection with CA's like ejbCA, and connection towards company LDAP) > Last couple of years I came across completely empty (java) cards, and cards with only the safe-sign-applet. > I can ask people to buy a couple of hundred cards at MYeid,cryptoshop or gooze, but if there isn't a proper way to maintain them, it's a lost cause.... What you are looking for is a SCMS or CMS: Smart card management system http://en.wikipedia.org/wiki/Smart_card_management_system Bye -- Dr. Ludovic Rousseau |
From: <J.W...@mi...> - 2013-04-23 13:33:07
|
Hi, Sorry for being too brief... Yes, pkcs only. For small-scale (development) environment, I think one often needs tools for: - changing the card status (if you buy Siemens card at cryptoshop, they are by default still in manufacturing-state). - initialization of cards (applet) - personification of cards (connection with CA's like ejbCA, and connection towards company LDAP) Last couple of years I came across completely empty (java) cards, and cards with only the safe-sign-applet. I can ask people to buy a couple of hundred cards at MYeid,cryptoshop or gooze, but if there isn't a proper way to maintain them, it's a lost cause.... Hans -----Original Message----- From: Ludovic Rousseau [mailto:lud...@gm...] Sent: Tuesday, April 23, 2013 1:39 PM To: Witvliet, J, CDC/IV/DCOPS/I&S/HIN Cc: OpenSC-devel; Hans Witvliet Subject: Re: [Opensc-devel] smart card management 2013/4/23 <J.W...@mi...>: > Hi all, Hello, > Working with a couple of smart cards is one thing, > But when numbers are increasing, then what? > > It looks like the only serious option is a full-out closed source package. > Or is there an open source alternative with dual license? Can you, please, be more specific? What software are you talking about? A PKCS#11 library only? More (or less) than that? Bye -- Dr. Ludovic Rousseau ______________________________________________________________________ Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband houdt met risico's verbonden aan het electronisch verzenden van berichten. This message may contain information that is not intended for you. If you are not the addressee or if this message was sent to you by mistake, you are requested to inform the sender and delete the message. The State accepts no liability for damage of any kind resulting from the risks inherent in the electronic transmission of messages. |
From: Ludovic R. <lud...@gm...> - 2013-04-23 11:39:41
|
2013/4/23 <J.W...@mi...>: > Hi all, Hello, > Working with a couple of smart cards is one thing, > But when numbers are increasing, then what? > > It looks like the only serious option is a full-out closed source package. > Or is there an open source alternative with dual license? Can you, please, be more specific? What software are you talking about? A PKCS#11 library only? More (or less) than that? Bye -- Dr. Ludovic Rousseau |
From: <J.W...@mi...> - 2013-04-23 10:39:35
|
Hi all, Working with a couple of smart cards is one thing, But when numbers are increasing, then what? It looks like the only serious option is a full-out closed source package. Or is there an open source alternative with dual license? Hans ______________________________________________________________________ Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband houdt met risico's verbonden aan het electronisch verzenden van berichten. This message may contain information that is not intended for you. If you are not the addressee or if this message was sent to you by mistake, you are requested to inform the sender and delete the message. The State accepts no liability for damage of any kind resulting from the risks inherent in the electronic transmission of messages. |
From: Florent D. <fde...@gm...> - 2013-04-19 15:57:04
|
0xb729c6c0 17:42:16.781 [pkcs15-tool] ctx.c:714:sc_context_create: =================================== 0xb729c6c0 17:42:16.781 [pkcs15-tool] ctx.c:715:sc_context_create: opensc version: 0.13.0rc1 0xb729c6c0 17:42:16.782 [pkcs15-tool] reader-pcsc.c:666:pcsc_init: PC/SC options: connect_exclusive=0 disconnect_action=1 transaction_end_action=0 reconnect_action=0 enable_pinpad=1 enable_pace=1 0xb729c6c0 17:42:16.782 [pkcs15-tool] reader-pcsc.c:948:pcsc_detect_readers: called 0xb729c6c0 17:42:16.782 [pkcs15-tool] reader-pcsc.c:956:pcsc_detect_readers: Probing pcsc readers 0xb729c6c0 17:42:16.782 [pkcs15-tool] reader-pcsc.c:978:pcsc_detect_readers: Establish pcsc context 0xb729c6c0 17:42:16.784 [pkcs15-tool] reader-pcsc.c:1026:pcsc_detect_readers: Found new pcsc reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:16.784 [pkcs15-tool] reader-pcsc.c:283:refresh_attributes: Gemalto USB Shell Token V2 00 00 check 0xb729c6c0 17:42:16.784 [pkcs15-tool] reader-pcsc.c:307:refresh_attributes: current state: 0x00000022 0xb729c6c0 17:42:16.784 [pkcs15-tool] reader-pcsc.c:308:refresh_attributes: previous state: 0x00000000 0xb729c6c0 17:42:16.784 [pkcs15-tool] reader-pcsc.c:362:refresh_attributes: card present, changed 0xb729c6c0 17:42:16.784 [pkcs15-tool] reader-pcsc.c:1057:pcsc_detect_readers: Requesting reader features ... 0xb729c6c0 17:42:17.002 [pkcs15-tool] reader-pcsc.c:1071:pcsc_detect_readers: Gemalto USB Shell Token V2 00 00:SCardConnect(SHARED): 0x00000000 0xb729c6c0 17:42:17.003 [pkcs15-tool] reader-pcsc.c:824:detect_reader_features: called 0xb729c6c0 17:42:17.003 [pkcs15-tool] reader-pcsc.c:845:detect_reader_features: Reader feature 0a found 0xb729c6c0 17:42:17.003 [pkcs15-tool] reader-pcsc.c:845:detect_reader_features: Reader feature 12 found 0xb729c6c0 17:42:17.003 [pkcs15-tool] reader-pcsc.c:919:detect_reader_features: Reader does not have a display. 0xb729c6c0 17:42:17.009 [pkcs15-tool] reader-pcsc.c:1101:pcsc_detect_readers: returning with: 0 (Success) 0xb729c6c0 17:42:17.009 [pkcs15-tool] sc.c:231:sc_detect_card_presence: called 0xb729c6c0 17:42:17.009 [pkcs15-tool] reader-pcsc.c:370:pcsc_detect_card_presence: called 0xb729c6c0 17:42:17.009 [pkcs15-tool] reader-pcsc.c:283:refresh_attributes: Gemalto USB Shell Token V2 00 00 check 0xb729c6c0 17:42:17.009 [pkcs15-tool] reader-pcsc.c:299:refresh_attributes: returning with: 0 (Success) 0xb729c6c0 17:42:17.009 [pkcs15-tool] reader-pcsc.c:375:pcsc_detect_card_presence: returning with: 1 0xb729c6c0 17:42:17.009 [pkcs15-tool] sc.c:236:sc_detect_card_presence: returning with: 1 Using reader with a card: Gemalto USB Shell Token V2 00 00 0xb729c6c0 17:42:17.010 [pkcs15-tool] sc.c:231:sc_detect_card_presence: called 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:370:pcsc_detect_card_presence: called 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:283:refresh_attributes: Gemalto USB Shell Token V2 00 00 check 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:299:refresh_attributes: returning with: 0 (Success) 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:375:pcsc_detect_card_presence: returning with: 1 0xb729c6c0 17:42:17.010 [pkcs15-tool] sc.c:236:sc_detect_card_presence: returning with: 1 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:125:sc_connect_card: called 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:450:pcsc_connect: called 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:283:refresh_attributes: Gemalto USB Shell Token V2 00 00 check 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:299:refresh_attributes: returning with: 0 (Success) 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:479:pcsc_connect: Initial protocol: T=1 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:DD:18:00:81:31:FE:45:80:F9:A0:00:00:00:77:01:00:70:0A:90:00:8B 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:7F:96:00:00:00:31:B9:64:40:70:14:10:73:94:01:80:82:90:00 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:7F:96:00:00:00:31:B8:64:40:70:14:10:73:94:01:80:82:90:00 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:DF:18:FF:81:91:FE:1F:C3:00:31:B8:64:0C:01:EC:C1:73:94:01:80:82:90:00:B3 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:DC:18:FF:81:91:FE:1F:C3:80:73:C8:21:13:66:01:0B:03:52:00:05:38 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:F8:18:00:00:80:31:FE:45:00:73:C8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:146:sc_connect_card: matching configured ATRs 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:155:sc_connect_card: trying driver 'authentic' 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:DD:18:00:81:31:FE:45:80:F9:A0:00:00:00:77:01:00:70:0A:90:00:8B 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:155:sc_connect_card: trying driver 'iasecc' 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:7F:96:00:00:00:31:B9:64:40:70:14:10:73:94:01:80:82:90:00 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:7F:96:00:00:00:31:B8:64:40:70:14:10:73:94:01:80:82:90:00 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:DF:18:FF:81:91:FE:1F:C3:00:31:B8:64:0C:01:EC:C1:73:94:01:80:82:90:00:B3 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:DC:18:FF:81:91:FE:1F:C3:80:73:C8:21:13:66:01:0B:03:52:00:05:38 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:155:sc_connect_card: trying driver 'muscle' 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:F8:18:00:00:80:31:FE:45:00:73:C8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:160:sc_connect_card: matched driver 'MuscleApplet' 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3b:d5:18:00:81:31:3a:7d:80:73:c8:21:10:30 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3b:f8:13:00:00:81:31:fe:45:4a:43:4f:50:76:32:34:31:b7 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3b:88:80:01:4a:43:4f:50:76:32:34:31:5e 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:884:match_atr_table: ignored - wrong length 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:232:sc_connect_card: card info name:'MuscleApplet', type:-1, flags:0x2, max_send/recv_size:0/0 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:1199:sc_card_sm_check: called 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:870:match_atr_table: ATR : 3b:f8:18:00:00:80:31:fe:45:00:73:c8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:881:match_atr_table: ATR try : 3B:F8:18:00:00:80:31:FE:45:00:73:C8:40:13:00:90:00:92 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:1207:sc_card_sm_check: returning with: 0 (Success) 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:243:sc_connect_card: returning with: 0 (Success) 0xb729c6c0 17:42:17.010 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.010 [pkcs15-tool] reader-pcsc.c:517:pcsc_lock: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] pkcs15.c:1134:sc_pkcs15_bind: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] pkcs15.c:1135:sc_pkcs15_bind: application(aid:'empty') 0xb729c6c0 17:42:17.011 [pkcs15-tool] pkcs15.c:1157:sc_pkcs15_bind: PKCS#15 options: use_file_cache=0 use_pin_cache=1 pin_cache_counter=10 pin_cache_ignore_user_consent=0 0xb729c6c0 17:42:17.011 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] pkcs15.c:958:sc_pkcs15_bind_internal: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] dir.c:140:sc_enum_apps: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] card.c:610:sc_select_file: called; type=2, path=3f002f00 0xb729c6c0 17:42:17.011 [pkcs15-tool] apdu.c:687:sc_transmit_apdu: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] apdu.c:654:sc_transmit: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] apdu.c:509:sc_single_transmit: called 0xb729c6c0 17:42:17.011 [pkcs15-tool] apdu.c:514:sc_single_transmit: CLA:B0, INS:58, P1:0, P2:0, data(0) (nil) 0xb729c6c0 17:42:17.011 [pkcs15-tool] reader-pcsc.c:249:pcsc_transmit: reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:17.011 [pkcs15-tool] apdu.c:185:sc_apdu_log: Outgoing APDU data [ 5 bytes] ===================================== B0 58 00 00 0E .X... ====================================================================== 0xb729c6c0 17:42:17.011 [pkcs15-tool] reader-pcsc.c:182:pcsc_internal_transmit: called 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:185:sc_apdu_log: Incoming APDU data [ 2 bytes] ===================================== 9C 12 .. ====================================================================== 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:524:sc_single_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:676:sc_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.041 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:687:sc_transmit_apdu: called 0xb729c6c0 17:42:17.041 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:654:sc_transmit: called 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:509:sc_single_transmit: called 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:514:sc_single_transmit: CLA:B0, INS:58, P1:0, P2:0, data(0) (nil) 0xb729c6c0 17:42:17.041 [pkcs15-tool] reader-pcsc.c:249:pcsc_transmit: reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:17.041 [pkcs15-tool] apdu.c:185:sc_apdu_log: Outgoing APDU data [ 5 bytes] ===================================== B0 58 00 00 0E .X... ====================================================================== 0xb729c6c0 17:42:17.041 [pkcs15-tool] reader-pcsc.c:182:pcsc_internal_transmit: called 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:185:sc_apdu_log: Incoming APDU data [ 2 bytes] ===================================== 9C 12 .. ====================================================================== 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:524:sc_single_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:676:sc_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.056 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.056 [pkcs15-tool] card-muscle.c:371:select_item: returning with: -1201 (File not found) 0xb729c6c0 17:42:17.056 [pkcs15-tool] card-muscle.c:440:muscle_select_file: returning with: -1201 (File not found) 0xb729c6c0 17:42:17.056 [pkcs15-tool] card.c:632:sc_select_file: 'SELECT' error: -1201 (File not found) 0xb729c6c0 17:42:17.056 [pkcs15-tool] dir.c:150:sc_enum_apps: Cannot select EF.DIR file: -1201 (File not found) 0xb729c6c0 17:42:17.056 [pkcs15-tool] pkcs15.c:963:sc_pkcs15_bind_internal: unable to enumerate apps: File not found 0xb729c6c0 17:42:17.056 [pkcs15-tool] pkcs15.c:995:sc_pkcs15_bind_internal: application path '3f005015' 0xb729c6c0 17:42:17.056 [pkcs15-tool] card.c:610:sc_select_file: called; type=2, path=3f005015 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:687:sc_transmit_apdu: called 0xb729c6c0 17:42:17.056 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:654:sc_transmit: called 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:509:sc_single_transmit: called 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:514:sc_single_transmit: CLA:B0, INS:58, P1:0, P2:0, data(0) (nil) 0xb729c6c0 17:42:17.056 [pkcs15-tool] reader-pcsc.c:249:pcsc_transmit: reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:17.056 [pkcs15-tool] apdu.c:185:sc_apdu_log: Outgoing APDU data [ 5 bytes] ===================================== B0 58 00 00 0E .X... ====================================================================== 0xb729c6c0 17:42:17.056 [pkcs15-tool] reader-pcsc.c:182:pcsc_internal_transmit: called 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:185:sc_apdu_log: Incoming APDU data [ 2 bytes] ===================================== 9C 12 .. ====================================================================== 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:524:sc_single_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:676:sc_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.066 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:687:sc_transmit_apdu: called 0xb729c6c0 17:42:17.066 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:654:sc_transmit: called 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:509:sc_single_transmit: called 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:514:sc_single_transmit: CLA:B0, INS:58, P1:0, P2:0, data(0) (nil) 0xb729c6c0 17:42:17.066 [pkcs15-tool] reader-pcsc.c:249:pcsc_transmit: reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:17.066 [pkcs15-tool] apdu.c:185:sc_apdu_log: Outgoing APDU data [ 5 bytes] ===================================== B0 58 00 00 0E .X... ====================================================================== 0xb729c6c0 17:42:17.066 [pkcs15-tool] reader-pcsc.c:182:pcsc_internal_transmit: called 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:185:sc_apdu_log: Incoming APDU data [ 2 bytes] ===================================== 9C 12 .. ====================================================================== 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:524:sc_single_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:676:sc_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.076 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.076 [pkcs15-tool] card-muscle.c:371:select_item: returning with: -1201 (File not found) 0xb729c6c0 17:42:17.076 [pkcs15-tool] card-muscle.c:440:muscle_select_file: returning with: -1201 (File not found) 0xb729c6c0 17:42:17.076 [pkcs15-tool] card.c:632:sc_select_file: 'SELECT' error: -1201 (File not found) 0xb729c6c0 17:42:17.076 [pkcs15-tool] pkcs15.c:1018:sc_pkcs15_bind_internal: absolute path to EF(ODF) 3f005031 0xb729c6c0 17:42:17.076 [pkcs15-tool] card.c:610:sc_select_file: called; type=2, path=3f005031 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:687:sc_transmit_apdu: called 0xb729c6c0 17:42:17.076 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:654:sc_transmit: called 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:509:sc_single_transmit: called 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:514:sc_single_transmit: CLA:B0, INS:58, P1:0, P2:0, data(0) (nil) 0xb729c6c0 17:42:17.076 [pkcs15-tool] reader-pcsc.c:249:pcsc_transmit: reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:17.076 [pkcs15-tool] apdu.c:185:sc_apdu_log: Outgoing APDU data [ 5 bytes] ===================================== B0 58 00 00 0E .X... ====================================================================== 0xb729c6c0 17:42:17.076 [pkcs15-tool] reader-pcsc.c:182:pcsc_internal_transmit: called 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:185:sc_apdu_log: Incoming APDU data [ 2 bytes] ===================================== 9C 12 .. ====================================================================== 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:524:sc_single_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:676:sc_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.090 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:687:sc_transmit_apdu: called 0xb729c6c0 17:42:17.090 [pkcs15-tool] card.c:315:sc_lock: called 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:654:sc_transmit: called 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:509:sc_single_transmit: called 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:514:sc_single_transmit: CLA:B0, INS:58, P1:0, P2:0, data(0) (nil) 0xb729c6c0 17:42:17.090 [pkcs15-tool] reader-pcsc.c:249:pcsc_transmit: reader 'Gemalto USB Shell Token V2 00 00' 0xb729c6c0 17:42:17.090 [pkcs15-tool] apdu.c:185:sc_apdu_log: Outgoing APDU data [ 5 bytes] ===================================== B0 58 00 00 0E .X... ====================================================================== 0xb729c6c0 17:42:17.090 [pkcs15-tool] reader-pcsc.c:182:pcsc_internal_transmit: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] apdu.c:185:sc_apdu_log: Incoming APDU data [ 2 bytes] ===================================== 9C 12 .. ====================================================================== 0xb729c6c0 17:42:17.106 [pkcs15-tool] apdu.c:524:sc_single_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.106 [pkcs15-tool] apdu.c:676:sc_transmit: returning with: 0 (Success) 0xb729c6c0 17:42:17.106 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] card-muscle.c:371:select_item: returning with: -1201 (File not found) 0xb729c6c0 17:42:17.106 [pkcs15-tool] card-muscle.c:440:muscle_select_file: returning with: -1201 (File not found) 0xb729c6c0 17:42:17.106 [pkcs15-tool] card.c:632:sc_select_file: 'SELECT' error: -1201 (File not found) 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15.c:1029:sc_pkcs15_bind_internal: EF(ODF) not found in '3f005031' 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:130:sc_pkcs15_bind_synthetic: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:171:sc_pkcs15_bind_synthetic: no emulator list in config file, trying all builtin emulators 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying westcos 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-westcos.c:258:sc_pkcs15emu_westcos_init_ex: sc_pkcs15_init_func_ex westcos 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-westcos.c:245:westcos_detect_card: westcos_detect_card (MuscleApplet) 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying openpgp 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying infocamere 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying starcert 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying tcos 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying esteid 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying itacns 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-itacns.c:857:sc_pkcs15emu_itacns_init_ex: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying postecert 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying PIV-II 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-piv.c:1010:sc_pkcs15emu_piv_init_ex: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-piv.c:231:piv_detect_card: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying gemsafeGPK 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-gemsafeGPK.c:513:sc_pkcs15emu_gemsafeGPK_init_ex: Entering sc_pkcs15emu_gemsafeGPK_init_ex 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-gemsafeGPK.c:166:gemsafe_detect_card: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying gemsafeV1 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying actalis 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying atrust-acos 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying tccardos 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying entersafe 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-esinit.c:80:sc_pkcs15emu_entersafe_init_ex: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-esinit.c:36:entersafe_detect_card: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying pteid 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying oberthur 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-oberthur.c:1045:sc_pkcs15emu_oberthur_init_ex: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-oberthur.c:1032:oberthur_detect_card: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-oberthur.c:1034:oberthur_detect_card: returning with: -1413 (Unsupported card) 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-oberthur.c:1055:sc_pkcs15emu_oberthur_init_ex: returning with: -1413 (Unsupported card) 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:173:sc_pkcs15_bind_synthetic: trying sc-hsm 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15-syn.c:182:sc_pkcs15_bind_synthetic: searching for 'emulate foo { ... }' blocks 0xb729c6c0 17:42:17.106 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] pkcs15.c:1198:sc_pkcs15_bind: returning with: -1413 (Unsupported card) PKCS#15 binding failed: Unsupported card 0xb729c6c0 17:42:17.106 [pkcs15-tool] card.c:353:sc_unlock: called 0xb729c6c0 17:42:17.106 [pkcs15-tool] reader-pcsc.c:554:pcsc_unlock: called 0xb729c6c0 17:42:17.119 [pkcs15-tool] card.c:260:sc_disconnect_card: called 0xb729c6c0 17:42:17.119 [pkcs15-tool] reader-pcsc.c:504:pcsc_disconnect: called 0xb729c6c0 17:42:17.184 [pkcs15-tool] card.c:281:sc_disconnect_card: returning with: 0 (Success) 0xb729c6c0 17:42:17.184 [pkcs15-tool] ctx.c:787:sc_release_context: called 0xb729c6c0 17:42:17.184 [pkcs15-tool] reader-pcsc.c:745:pcsc_finish: called |
From: Martin P. <ma...@ma...> - 2013-04-19 12:54:31
|
Does the module use the "Friendly" flag when loading the module? These days NSS can select the right certificate when presenting several, but it still can't handle modules with multiple slots.... Martin |
From: Andreas S. (ML) <and...@ca...> - 2013-04-19 12:43:18
|
Hi Johannes, works for me - however uninstall does not unload the PKCS#11 module. Can we put the XPI on the OpenSC website ? Andreas Am 18.04.2013 10:17, schrieb Johannes Becker: > > Hello, > > > > we have an add-on for Mozilla Firefox that installs opensc-pkcs11.dll > as a security device: > > > > http://chipkarte.uni-giessen.de/opensc-pkcs11-install.xpi > > > > Opensc must be installed before installing the add-on. > > This installation should be a lot easier for end users. > > > > I don't really know how to add the Gnu license, and if there is a > better place for downloading the add-on. > > > > > > By the way, I only could find the "MozillaSteps" mentioned in > > > > https://github.com/OpenSC/OpenSC/wiki/Using-smart-cards-with-applications > > > > using Google: > > > > https://www.opensc-project.org/opensc/wiki/MozillaSteps > > > > This is old enough to talk about "Smart card bundle". I guess, using > Firefox might be too much of a secret at the moment. > > > > For manual installation I have german instructions on a page using > JavaScript to detect the operating system: > > http://chipkarte.uni-giessen.de/opensc-PKCS11Install_DE.shtml > > Regards > > Johannes > > > > > > ------------------------------------------------------------------------------ > Precog is a next-generation analytics platform capable of advanced > analytics on semi-structured data. The platform includes APIs for building > apps and a phenomenal toolset for data science. Developers can use > our toolset for easy data analysis & visualization. Get a free account! > http://www2.precog.com/precogplatform/slashdotnewsletter > > > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel -- --------- CardContact Software & System Consulting |.##> <##.| Andreas Schwier |# #| Schülerweg 38 |# #| 32429 Minden, Germany |'##> <##'| Phone +49 571 56149 --------- http://www.cardcontact.de http://www.tscons.de http://www.openscdp.org -- --------- CardContact Software & System Consulting |.##> <##.| Andreas Schwier |# #| Schülerweg 38 |# #| 32429 Minden, Germany |'##> <##'| Phone +49 571 56149 --------- http://www.cardcontact.de http://www.tscons.de http://www.openscdp.org |
From: Johannes B. <Joh...@hr...> - 2013-04-18 08:41:10
|
Hello, we have an add-on for Mozilla Firefox that installs opensc-pkcs11.dll as a security device: http://chipkarte.uni-giessen.de/opensc-pkcs11-install.xpi Opensc must be installed before installing the add-on. This installation should be a lot easier for end users. I don't really know how to add the Gnu license, and if there is a better place for downloading the add-on. By the way, I only could find the "MozillaSteps" mentioned in https://github.com/OpenSC/OpenSC/wiki/Using-smart-cards-with-applications using Google: https://www.opensc-project.org/opensc/wiki/MozillaSteps This is old enough to talk about "Smart card bundle". I guess, using Firefox might be too much of a secret at the moment. For manual installation I have german instructions on a page using JavaScript to detect the operating system: http://chipkarte.uni-giessen.de/opensc-PKCS11Install_DE.shtml Regards Johannes |
From: German B. <ger...@gm...> - 2013-04-17 16:38:53
|
Hello, is there any activity on adding support for the Spanish DNI (DNIe)? Regards, Germán. |
From: Ludovic R. <lud...@gm...> - 2013-04-17 14:52:39
|
2013/4/17 Murat Baran <bar...@gm...>: > Hello, Hello, > I am not sure if this is the right mailing list > but i could not find any other. It is the right list. Welcome. > I am working in AKIS group in Tubitak. > We want to update our akis driver. > The first version was written by another group. > What is the procedure? The OpenSC source code is hosted at [1]. The procedure to contribute code is at [2]. Tell us if something is missing or not clear. Bye [1] https://github.com/OpenSC/OpenSC [2] https://github.com/OpenSC/OpenSC/wiki/Getting-involved-in-OpenSC-development -- Dr. Ludovic Rousseau |
From: Murat B. <bar...@gm...> - 2013-04-17 14:07:17
|
Hello, I am not sure if this is the right mailing list but i could not find any other. I am working in AKIS group in Tubitak. We want to update our akis driver. The first version was written by another group. What is the procedure? Regards, Murat Baran (mur...@tu...) |
From: NdK <ndk...@gm...> - 2013-04-16 08:14:30
|
Hello. Just noticed something strange in this file (in opensc 0.13). At line 1101, comment says that fake fci starts with 62 (that IIUC should mean FCP template), but the memcpy at line 1070 uses 6f (FCI template). Probably the comment is wrong and no harm is done, but could be worth having a look at it. At least to avoid confusion when reading the code. BYtE, Diego. |