-
Notifications
You must be signed in to change notification settings - Fork 16
0.25.0-rc1: add Nitrokey Start and Pro 2 test results #11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
can be fixed with OpenSC/OpenSC@1b95de4 |
|
Oh, I see, thank you and indeed - case solved then :) |
Do I read that correctly that this commit solves the issue for you? @dengert can you submit this commit as separate PR so it can be merged for the next rc? |
|
I haven't tested it, just relied on debugging @dengert did when working on that commit. I can test if that's desired, though it will likely need to wait until the weekend. |
|
Actually, scratch the last part - turns out I can do a quick test right away. |
|
Yes, that patch fixes it for me too (see below). The Pro 2 still works fine, no change in the test output. [user@dev-alt3r opensc-src]$ /home/user/dev/opensc/install/bin/pkcs11-tool --module=/home/user/dev/opensc/install/lib/opensc-pkcs11.so --test --login
Using slot 0 with a present token (0x0)
Logging in to "OpenPGP card (User PIN)".
Please enter User PIN:
C_SeedRandom() and C_GenerateRandom():
seeding (C_SeedRandom) not supported
seems to be OK
Digests:
all 4 digest functions seem to work
MD5: OK
RIPEMD160: OK
SHA-1: OK
SHA256: OK
Ciphers: not implemented
Signatures (currently only for RSA)
testing key 0 (Encryption key) -- can't be used for signature, skipping
testing key 1 (Authentication key)
all 4 signature functions seem to work
testing signature mechanisms:
RSA-PKCS: OK
SHA1-RSA-PKCS: OK
MD5-RSA-PKCS: OK
RIPEMD160-RSA-PKCS: OK
SHA256-RSA-PKCS: OK
testing key 1 (Authentication key) with 1 mechanism
RSA-PKCS: OK
Verify (currently only for RSA)
testing key 0 (Encryption key) -- can't be used to sign/verify, skipping
testing key 1 (Authentication key) with 1 mechanism
RSA-PKCS: OK
Unwrap: not implemented
Decryption (currently only for RSA)
testing key 0 (Encryption key)
RSA-PKCS: OK
testing key 1 (Authentication key) -- can't be used to decrypt, skipping
No errors |
Sorry for a delay. We had larger bunch of cards tested including the Nitrokey start so please, rebase on top of current changes so we can merge your testing results too. Feel free to add the FW version of your nitrokey start too. |
Signed-off-by: alt3r 3go <[email protected]>
0b42331 to
2d80352
Compare
|
Thank you and done. The line is now longer than the other ones, so being unsure of what's the formatting preference here, I used the approach from one of the earlier updates (just let the line stick out, and no space padding before the closing I also took the liberty of fixing a whitespace error + changing the "NitroKey" to "Nitrokey", as that's what they use as the name all over the NK documentation and marketing materials. |
|
Than you. Looks good. I will leave it up to @xhanulik to merge and update the main repository. |
Thank you, merging. |
|
Thanks everyone! |
As discussed in OpenSC/OpenSC#3017, here are the basic testing results (
pkcs11-tool --login --test) for Nitrokey Start and Pro 2 (full output below for completeness).Start seems to have a problem at the very last step (thus "many tests passed" and not "all"), but this was present before the changes for 0.25.0-rc1 went in (
masteras of at least a month or so ago). I plan to look into this later, after I update the token to the latest FW (RTM.13), which I'm having some troubles with at the moment.