./security/opensc, Smart Card drivers and middleware

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 0.26.1, Package name: opensc-0.26.1, Maintainer: pkgsrc-users

OpenSC provides a set of libraries and utilities to access smart cards.
Its main focus is on cards that support cryptographic operations, and
facilitate their use in security applications such as mail encryption,
authentication, and digital signature. OpenSC implements the PKCS#11 API
so applications supporting this API such as Mozilla Firefox and Thunderbird
can use it. OpenSC implements the PKCS#15 standard and aims to be compatible
with every software that does so, too.


Required to run:
[textproc/libxslt] [security/openssl] [security/pcsc-lite]

Required to build:
[textproc/docbook-xsl] [pkgtools/cwrappers]

Package options: pcsc-lite

Master sites:

Filesize: 2360.288 KB

Version history: (Expand)


CVS history: (Expand)


   2025-01-15 13:36:53 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
opensc: updated to 0.26.1

0.26.1

General improvements

Align allocations of sc_mem_secure_alloc
Fix -O3 gcc optimization failure on amd64 and ppc64el

pkcs11-spy

Avoid crash while spying C_GetInterface()

TCOS

Fix reading certificate
   2024-12-28 09:56:21 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
opensc: updated to 0.26.0

New in 0.26.0; 2024-11-13

Security
* CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init
* CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU \ 
response values in libopensc
* CVE-2024-45617: Uninitialized values after incorrect or missing checking \ 
return values of functions in libopensc
* CVE-2024-45618: Uninitialized values after incorrect or missing checking \ 
return values of functions in pkcs15init
* CVE-2024-45619: Incorrect handling length of buffers or files in libopensc
* CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init
* CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key

General improvements
* Fix reselection of DF after error in PKCS#15 layer
* Unify OpenSSL logging throughout code
* Extend the p11test to support kryoptic
* Fix for error in PCSC reconnection
* Fixed various issues reported by OSS-Fuzz and Coverity in drivers, PKCS#11 and \ 
PKCS#15 layer

PKCS#15
* Documentation for PKCS#15 profile files

minidriver
* Support PinCacheAlwaysPrompt usable for PIV cards

pkcs11-tool
* Show URI when listing token information
* Do not limit size of objects to 5000 bytes
* Add support for AES CMAC
* Add support for AES GCM encryption
* Add support for RSA OAEP encryption
* Add support for HKDF
* Implement better support for wrapping and unwrapping
* Add support for EdDSA sign and verify

pkcs15-crypt
* Fix PKCS#1 encoding function to correctly detect padding type

piv-tool
* Fix RSA key generation
* Avoid possible state change when matching unknown card

sc-hsm-tool
* Cleanse buffer with plaintext key share

pkcs11-register
* Fix pkcs11-register defaults on macOS and Windows

IDPrime
* Fix identification of IDPrime 840 cards
* Fix container mapping for IDPrime 940 cards
* Reorder ATRs for matching cards

OpenPGP
* Fix state tracking after erasing card

Belpic
* Disable Applet V1.8

MICARDO
* Deactivate driver

SmartCard-HSM
* Fix signing with secp521r1 signature

eOI
* Set model via `sc_card_ctl` function

Rutoken
* increase the minimum PIN size to support Rutoken ECP BIO

JPKI
* Adjust parameters for public key in PKCS#15 emulator

D-Trust
* Add support for ECDSA signatures and ECDH key agreement for D-Trust Signatures \ 
Cards 4.1/4.4
   2024-11-14 23:22:33 by Thomas Klausner | Files touched by this commit (2429)
Log message:
*: recursive bump for icu 76 shlib major version bump
   2024-11-01 13:55:19 by Thomas Klausner | Files touched by this commit (2426)
Log message:
*: revbump for icu downgrade
   2024-11-01 01:54:33 by Thomas Klausner | Files touched by this commit (2427)
Log message:
*: recursive bump for icu 76.1 shlib bump
   2024-05-29 18:35:19 by Adam Ciarcinski | Files touched by this commit (1929) | Package updated
Log message:
revbump after icu and protobuf updates
   2024-04-05 15:46:22 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
opensc: updated to 0.25.1

OpenSC 0.25.1

General improvements

Add missing file to dist tarball to build documentation

minidriver

Fix RSA decryption with PKCS#1 v1.5 padding
Fix crash when app is not set
   2024-03-07 11:00:27 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
opensc: updated to 0.25.0

New in 0.25.0; 2024-03-06

Security

CVE-2023-5992: Side-channel leaks while stripping encryption PKCS#1.5 padding in \ 
OpenSC
CVE-2024-1454: Potential use-after-free in AuthentIC driver during card \ 
enrollment in pkcs15init

General improvements

Update OpenSSL 1.1.1 to 3.0 in MacOS build
Remove support for old card drivers Akis, GPK, Incrypto34 and Westcos, disable \ 
Cyberflex driver
Fix 64b to 32b conversions
Improvements for the p11test
Fix reader initialization without SCardControl
Make RSA PKCS#1 v1.5 depadding constant-time
Add option for disabling PKCS#1 v1.5 depadding (type 01 and 02) on the card
Enable MSI signing via Signpath CI integration for Windows
Fixed various issues reported by OSS-Fuzz and Coverity in drivers, PKCS#11 and \ 
PKCS#15 layer

minidriver

Fix wrong hash selection

pkcs11-tool

Simplify printing EC keys parameters
Add option to import GENERIC key
Add support for importing Ed25518/448 keys

drust-tool

Add tool for D-Trust cards

IDPrime

Support uncompressed certificates on IDPrime 940
Enhance IDPrime logging
Add SafeNet 5110+ FIPS token support

D-Trust Signature Cards

Add support for RSA D-Trust Signature Card 4.1 and 4.4

EstEID

Remove expired EstEID 3.* card support

ePass2003

Allow SW implementation with more SHA2 hashes and ECDSA
Fix EC key generation

SmartCard-HSM

Fix SELECT APDU command

MyEID

Update for PKCS#15 profile

Rutoken

Support for RSA 4096 key algorithm

OpenPGP

Fix decryption requiting Manage Security Environment for authentication key