aboutsummaryrefslogtreecommitdiffstats
path: root/tkd (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-03-22tkd: Support READCERT command.gniibe/t6364NIIBE Yutaka3-36/+91
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-20tkd: Fix PKSIGN.NIIBE Yutaka1-6/+2
Clean up confusion of hashing. Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-20tkd: Add RESTART command.NIIBE Yutaka1-0/+20
It will be useful, when TKDaemon will maintain a context for a connection. -- Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-17tkd: Fix RSA PKSIGN.NIIBE Yutaka1-0/+5
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-17Fix PKSIGN to get data by EXTRA.NIIBE Yutaka2-1/+21
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-17tkd: Implement READKEY, returning canon SEXP.NIIBE Yutaka1-0/+11
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-17tkd: sorted out entities and initialize PKCS#11 on demand.NIIBE Yutaka3-89/+135
tkd: host side process which manages KEYs on TOKENs It's a KEYGRIP which identifies a KEY. it's TKD which administrates: where is a KEY on which TOKEN. cryptoki (ck): access object of PKCS#11 API. CRYPTOKI has slots. token: abstraction of a device. Each slots has slot_id. Slot_id corresponds a TOKEN. 1:1 map between slot_id and TOKEN. KEY: TOKEN may have multiple KEYs. Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-16tkd: Fix for rescanning the slot list.NIIBE Yutaka3-78/+169
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-15tkd: Check CKF_TOKEN_PRESENT, too.NIIBE Yutaka1-0/+1
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-15tkd: Implement finalizer.NIIBE Yutaka3-8/+113
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-13agent: Add oTkdaemonProgram.NIIBE Yutaka1-2/+1
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-08Implement READKEY command.NIIBE Yutaka3-148/+60
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-06Add login feature.NIIBE Yutaka1-5/+27
Tested with YKCS#11 ECDSA and SoftHSM2 RSA. Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-06Use two-phase sign to match PKCS#11 API.NIIBE Yutaka1-37/+73
Tested Scute for RSA and ECDSA. Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-06Fix the length of ECDSA.NIIBE Yutaka1-1/+14
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-03Fix keygrip computation.NIIBE Yutaka1-1/+1
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-03Fix listing keys.NIIBE Yutaka2-55/+89
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-03Implement token_keyinfo.NIIBE Yutaka3-8/+114
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-03Add key->flags member.NIIBE Yutaka1-14/+43
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-03Fix assuan context things.NIIBE Yutaka4-135/+28
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-02Implement token_sign.NIIBE Yutaka1-49/+86
Still assuan_context_t should be fixed. Signed-off-by: NIIBE Yutaka <[email protected]>
2023-03-02Move functions.NIIBE Yutaka3-45/+179
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-27Define routines for pkcs11.c in the header.NIIBE Yutaka4-30/+23
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-27Start tkdaemon to offer PKCS#11 module access.NIIBE Yutaka5-27/+2121
Currently, it's a mock-up. Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-24Some implementations don't offer the information of key mechanisms.NIIBE Yutaka1-12/+52
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-24Logout after use (when login).NIIBE Yutaka1-5/+13
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-24Yubikey PIV now somehow works.NIIBE Yutaka1-29/+31
Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-22Testing pksign.c for access to PKCS#11 module.NIIBE Yutaka2-125/+316
Scute and SoftHSMV2: RSA key works Signed-off-by: NIIBE Yutaka <[email protected]>
2023-02-21Add test code to handle PKCS#11 module.NIIBE Yutaka2-0/+2091
Signed-off-by: NIIBE Yutaka <[email protected]>