aboutsummaryrefslogtreecommitdiffstats
path: root/tkd (follow)
Commit message (Collapse)AuthorAgeFilesLines
* tkd: Support READCERT command.gniibe/t6364NIIBE Yutaka2023-03-223-36/+91
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Fix PKSIGN.NIIBE Yutaka2023-03-201-6/+2
| | | | | | Clean up confusion of hashing. Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Add RESTART command.NIIBE Yutaka2023-03-201-0/+20
| | | | | | | | | It will be useful, when TKDaemon will maintain a context for a connection. -- Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Fix RSA PKSIGN.NIIBE Yutaka2023-03-171-0/+5
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Fix PKSIGN to get data by EXTRA.NIIBE Yutaka2023-03-172-1/+21
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Implement READKEY, returning canon SEXP.NIIBE Yutaka2023-03-171-0/+11
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: sorted out entities and initialize PKCS#11 on demand.NIIBE Yutaka2023-03-173-89/+135
| | | | | | | | | | | | | tkd: host side process which manages KEYs on TOKENs It's a KEYGRIP which identifies a KEY. it's TKD which administrates: where is a KEY on which TOKEN. cryptoki (ck): access object of PKCS#11 API. CRYPTOKI has slots. token: abstraction of a device. Each slots has slot_id. Slot_id corresponds a TOKEN. 1:1 map between slot_id and TOKEN. KEY: TOKEN may have multiple KEYs. Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Fix for rescanning the slot list.NIIBE Yutaka2023-03-163-78/+169
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Check CKF_TOKEN_PRESENT, too.NIIBE Yutaka2023-03-151-0/+1
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* tkd: Implement finalizer.NIIBE Yutaka2023-03-153-8/+113
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* agent: Add oTkdaemonProgram.NIIBE Yutaka2023-03-131-2/+1
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Implement READKEY command.NIIBE Yutaka2023-03-083-148/+60
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Add login feature.NIIBE Yutaka2023-03-061-5/+27
| | | | | | Tested with YKCS#11 ECDSA and SoftHSM2 RSA. Signed-off-by: NIIBE Yutaka <[email protected]>
* Use two-phase sign to match PKCS#11 API.NIIBE Yutaka2023-03-061-37/+73
| | | | | | Tested Scute for RSA and ECDSA. Signed-off-by: NIIBE Yutaka <[email protected]>
* Fix the length of ECDSA.NIIBE Yutaka2023-03-061-1/+14
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Fix keygrip computation.NIIBE Yutaka2023-03-031-1/+1
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Fix listing keys.NIIBE Yutaka2023-03-032-55/+89
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Implement token_keyinfo.NIIBE Yutaka2023-03-033-8/+114
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Add key->flags member.NIIBE Yutaka2023-03-031-14/+43
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Fix assuan context things.NIIBE Yutaka2023-03-034-135/+28
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Implement token_sign.NIIBE Yutaka2023-03-021-49/+86
| | | | | | Still assuan_context_t should be fixed. Signed-off-by: NIIBE Yutaka <[email protected]>
* Move functions.NIIBE Yutaka2023-03-023-45/+179
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Define routines for pkcs11.c in the header.NIIBE Yutaka2023-02-274-30/+23
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Start tkdaemon to offer PKCS#11 module access.NIIBE Yutaka2023-02-275-27/+2121
| | | | | | Currently, it's a mock-up. Signed-off-by: NIIBE Yutaka <[email protected]>
* Some implementations don't offer the information of key mechanisms.NIIBE Yutaka2023-02-241-12/+52
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Logout after use (when login).NIIBE Yutaka2023-02-241-5/+13
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Yubikey PIV now somehow works.NIIBE Yutaka2023-02-241-29/+31
| | | | Signed-off-by: NIIBE Yutaka <[email protected]>
* Testing pksign.c for access to PKCS#11 module.NIIBE Yutaka2023-02-222-125/+316
| | | | | | Scute and SoftHSMV2: RSA key works Signed-off-by: NIIBE Yutaka <[email protected]>
* Add test code to handle PKCS#11 module.NIIBE Yutaka2023-02-212-0/+2091
Signed-off-by: NIIBE Yutaka <[email protected]>