Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support PKCS11 3.0 #183

Merged
merged 25 commits into from
Jun 19, 2024
Merged

Support PKCS11 3.0 #183

merged 25 commits into from
Jun 19, 2024

Conversation

qpernil
Copy link
Contributor

@qpernil qpernil commented Jun 18, 2021

PKCS11 3.0 support, and also added ed25519 support, mechanisms for which were added in pkcs11 3.0

@qpernil
Copy link
Contributor Author

qpernil commented Jul 5, 2022

Adresses #270

qpernil and others added 20 commits June 3, 2024 15:47
Having problems signing with EdDSA on YubiHSM2 via PKCS11.
Getting an 
pkcs11:p11prov_Sign:The size of plaintext input data to a cryptographic operation is invalid (Out of range):interface.gen.c:679:Error returned by C_Sign
error

As I understand the PKCS11 v3.0 spec, the 1024 bit limit (note by "adma" in line 2228) applies only to "ECDSA without hashing" (CKM_ECDSA) as it only processes a hash value.

see: https://docs.oasis-open.org/pkcs11/pkcs11-curr/v3.0/os/pkcs11-curr-v3.0-os.html#_Toc30061189

EdDSA does not have this limit, so the size of "op_info->buffer" should be the limiting factor

see: https://docs.oasis-open.org/pkcs11/pkcs11-curr/v3.0/os/pkcs11-curr-v3.0-os.html#_Toc30061191
@qpernil qpernil marked this pull request as ready for review June 19, 2024 13:36
@qpernil qpernil merged commit f17032b into master Jun 19, 2024
81 checks passed
@qpernil qpernil deleted the pkcs11-3_0 branch June 19, 2024 13:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants