aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/pkcs11/pkcs11_private_key.c
Commit message (Collapse)AuthorAgeFilesLines
* private-key: Add optional parameters argument to sign() methodTobias Brunner2017-11-081-1/+1
|
* pkcs11: Look for the CKA_ID of the cert if it doesn't match the subjectKeyIdRaphael Geissert2016-10-041-4/+152
| | | | | | | | | | | | | | charon-nm fails to find the private key when its CKA_ID doesn't match the subjectKeyIdentifier of the X.509 certificate. In such cases, the private key builder now falls back to enumerating all the certificates, looking for one that matches the supplied subjectKeyIdentifier. It then uses the CKA_ID of that certificate to find the corresponding private key. It effectively means that PKCS#11 tokens where the only identifier to relate the certificate, the public key, and the private key is the CKA_ID are now supported by charon-nm. Fixes #490.
* gmp: Support of SHA-3 RSA signaturesAndreas Steffen2016-09-221-4/+4
|
* pkcs11: Skip zero-padding of r and s when preparing EC signatureTobias Brunner2016-04-051-3/+9
| | | | | | They are zero padded to fill the buffer. Fixes #1377.
* pkcs11: Properly encode RFC 3279 ECDSA signaturesTobias Brunner2015-03-091-2/+19
| | | | Fixes #873.
* Moved debug.[ch] to utils folderTobias Brunner2012-10-241-1/+1
|
* PKCS#11 library search using keyid uses a fallback to look for certificatesMartin Willi2012-10-241-4/+8
|
* If no pkcs11 public key for a private key found, search for a certificateMartin Willi2012-10-241-4/+53
|
* Move pkcs11 public key lookup function declaration to header fileMartin Willi2012-10-241-6/+1
|
* Add a return value to hasher_t.allocate_hash()Martin Willi2012-07-161-3/+5
|
* pkcs11: Make sure a key can be used for a given signature scheme.Tobias Brunner2011-11-021-15/+24
|
* pkcs11: We have to create our own hashes for some signature schemes.Tobias Brunner2011-11-021-8/+55
|
* pkcs11: Lookup the public key of a private key by CKA_ID.Tobias Brunner2011-11-021-0/+9
| | | | | | Currently this only works if a public key object with the same ID is available, if there isn't one we could search for a certificate with the same ID and extract the key from there.
* pkcs11: Search for private keys in a more generic way.Tobias Brunner2011-11-021-20/+19
| | | | | | Also, don't extract the public key directly from the private key. Some tokens actually do not return the public exponent (it's not required). We have to find a different way to get the public key.
* pkcs11: Instead of a mutex use a new session to do multipart operations.Tobias Brunner2011-11-021-21/+39
|
* Register manager of pkcs11 plugin as library objectMartin Willi2011-08-241-2/+2
|
* Fixed public key construction from PKCS#11 private keyMartin Willi2010-12-231-3/+3
|
* Do not query for CKA_ALWAYS_AUTHENTICATE if PKCS#11 Cryptoki version < 2.20Martin Willi2010-11-181-3/+9
|
* Use a seperate section for each nested struct member in INIT macroMartin Willi2010-08-181-13/+15
|
* Implemented public key encryption/private key decryption in PKCS#11Martin Willi2010-08-111-4/+63
|
* Use bits instead of bytes for a private/public keyMartin Willi2010-08-101-2/+2
|
* Added support for different encryption schemes to private/public keysMartin Willi2010-08-101-1/+2
|
* Export scheme_to_mechanism conversion functionMartin Willi2010-08-061-3/+3
|
* Support PKCS#11 keys requiring reauthentication for each operationMartin Willi2010-08-041-11/+64
|
* Do not try to log in if we already have a user sessionMartin Willi2010-08-041-0/+13
|
* Use credential sets to load smartcard keysMartin Willi2010-08-041-12/+21
|
* Implemented a callback based credential set, currently for shared keys onlyMartin Willi2010-08-041-37/+21
|
* Implemented callback PIN invocation for PKCS#11 loginMartin Willi2010-08-041-8/+47
|
* Implemented keyid discovery on all modules/slotsMartin Willi2010-08-041-7/+80
|
* Pass the PKCS11 keyid as chunk, not as stringMartin Willi2010-08-041-8/+6
|
* Reuse generic passphrase build part, not a dedicated PIN partMartin Willi2010-08-041-6/+6
|
* Implemented private key on top of a PKCS#11 tokenMartin Willi2010-08-041-0/+369