pkcs11 0.2.2-x86-mingw32 → 0.2.3-x86-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/History.txt +6 -0
- data/Rakefile +1 -0
- data/ext/pk11.c +3 -3
- data/ext/pk11_version.h +1 -1
- data/lib/1.8/pkcs11_ext.so +0 -0
- data/lib/1.9/pkcs11_ext.so +0 -0
- data/lib/pkcs11/library.rb +20 -1
- data/lib/pkcs11/slot.rb +3 -12
- data/test/test_pkcs11.rb +30 -6
- data/test/test_pkcs11_crypt.rb +8 -8
- metadata +19 -19
data/History.txt
CHANGED
@@ -1,3 +1,9 @@
|
|
1
|
+
=== 0.2.3 / 2012-01-25
|
2
|
+
|
3
|
+
* fix C_WaitForSlotEvent to be a Library- instead of a Slot-method
|
4
|
+
* allow :sw/:hsm to ProtectServer::Library#load_library in the same way as #initialize
|
5
|
+
* allow Hash argument to Library#C_Initialize in the same way as #initialize
|
6
|
+
|
1
7
|
=== 0.2.2 / 2011-12-12
|
2
8
|
|
3
9
|
* add ability to change PKCS11 base methods in order to use vendor defined attributes, return codes and mechanisms
|
data/Rakefile
CHANGED
@@ -36,6 +36,7 @@ hoe = Hoe.spec 'pkcs11' do
|
|
36
36
|
spec_extras[:files] = File.read_utf("Manifest.txt").split(/\r?\n\r?/).reject{|f| f=~/^pkcs11_/ }
|
37
37
|
spec_extras[:files] += GENERATED_FILES
|
38
38
|
spec_extras[:has_rdoc] = 'yard'
|
39
|
+
self.rdoc_locations << "larskanis@rack.rubyforge.org:/var/www/gforge-projects/pkcs11/pkcs11/"
|
39
40
|
end
|
40
41
|
|
41
42
|
ENV['RUBY_CC_VERSION'] ||= '1.8.7:1.9.2'
|
data/ext/pk11.c
CHANGED
@@ -244,9 +244,9 @@ pkcs11_initialize(int argc, VALUE *argv, VALUE self)
|
|
244
244
|
|
245
245
|
rb_scan_args(argc, argv, "02", &path, &init_args);
|
246
246
|
if( !NIL_P(path) ){
|
247
|
-
|
248
|
-
|
249
|
-
|
247
|
+
rb_funcall(self, rb_intern("load_library"), 1, path);
|
248
|
+
rb_funcall(self, rb_intern("C_GetFunctionList"), 0);
|
249
|
+
rb_funcall2(self, rb_intern("C_Initialize"), 1, &init_args);
|
250
250
|
}
|
251
251
|
|
252
252
|
return self;
|
data/ext/pk11_version.h
CHANGED
data/lib/1.8/pkcs11_ext.so
CHANGED
Binary file
|
data/lib/1.9/pkcs11_ext.so
CHANGED
Binary file
|
data/lib/pkcs11/library.rb
CHANGED
@@ -35,6 +35,11 @@ module PKCS11
|
|
35
35
|
# pkcs11.C_GetFunctionList
|
36
36
|
# pkcs11.C_Initialize(args)
|
37
37
|
def initialize(so_path=nil, args={})
|
38
|
+
unwrapped_initialize(so_path, args)
|
39
|
+
end
|
40
|
+
|
41
|
+
alias unwrapped_C_Initialize C_Initialize
|
42
|
+
def C_Initialize(args=nil)
|
38
43
|
case args
|
39
44
|
when Hash
|
40
45
|
pargs = CK_C_INITIALIZE_ARGS.new
|
@@ -42,7 +47,7 @@ module PKCS11
|
|
42
47
|
else
|
43
48
|
pargs = args
|
44
49
|
end
|
45
|
-
|
50
|
+
unwrapped_C_Initialize(pargs)
|
46
51
|
end
|
47
52
|
|
48
53
|
alias unwrapped_C_GetInfo C_GetInfo
|
@@ -81,6 +86,20 @@ module PKCS11
|
|
81
86
|
slots(false)
|
82
87
|
end
|
83
88
|
|
89
|
+
alias unwrapped_C_WaitForSlotEvent C_WaitForSlotEvent
|
90
|
+
|
91
|
+
# Waits for a slot event, such as token insertion or token removal, to occur.
|
92
|
+
#
|
93
|
+
# @param [Integer] flags determines whether or not the C_WaitForSlotEvent call blocks (i.e., waits
|
94
|
+
# for a slot event to occur);
|
95
|
+
# At present, the only flag defined for use in the flags argument is PKCS11::CKF_DONT_BLOCK
|
96
|
+
# @return [Slot, nil] the slot that the event occurred in; nil if no event occured (CKR_NO_EVENT)
|
97
|
+
def C_WaitForSlotEvent(flags=0)
|
98
|
+
slot = unwrapped_C_WaitForSlotEvent(flags)
|
99
|
+
slot ? Slot.new(self, slot) : nil
|
100
|
+
end
|
101
|
+
alias wait_for_slot_event C_WaitForSlotEvent
|
102
|
+
|
84
103
|
# Finalize and unload the library. If not called explicit, the library is freed by the GC.
|
85
104
|
def close
|
86
105
|
self.C_Finalize
|
data/lib/pkcs11/slot.rb
CHANGED
@@ -29,22 +29,13 @@ module PKCS11
|
|
29
29
|
@pk.C_GetSlotInfo(@slot)
|
30
30
|
end
|
31
31
|
alias info C_GetSlotInfo
|
32
|
-
|
32
|
+
|
33
33
|
# Obtains information about a particular token in the system.
|
34
34
|
# @return [PKCS11::CK_TOKEN_INFO]
|
35
35
|
def C_GetTokenInfo
|
36
36
|
@pk.C_GetTokenInfo(@slot)
|
37
37
|
end
|
38
38
|
alias token_info C_GetTokenInfo
|
39
|
-
|
40
|
-
# Waits for a slot event, such as token insertion or token removal, to
|
41
|
-
# occur.
|
42
|
-
# @param flags determines whether or not the C_WaitForSlotEvent call blocks (i.e., waits
|
43
|
-
# for a slot event to occur);
|
44
|
-
def C_WaitForSlotEvent(flags)
|
45
|
-
@pk.C_WaitForSlotEvent(@slot, flags)
|
46
|
-
end
|
47
|
-
alias wait_for_event C_WaitForSlotEvent
|
48
39
|
|
49
40
|
# C_GetMechanismList is used to obtain a list of mechanism types supported by a token.
|
50
41
|
# @return [Array<PKCS11::CKM_*>]
|
@@ -75,7 +66,7 @@ module PKCS11
|
|
75
66
|
self
|
76
67
|
end
|
77
68
|
alias init_token C_InitToken
|
78
|
-
|
69
|
+
|
79
70
|
# Opens a Session between an application and a token in a particular slot.
|
80
71
|
#
|
81
72
|
# @param [Integer] flags indicates the type of session. Default is read-only,
|
@@ -99,7 +90,7 @@ module PKCS11
|
|
99
90
|
end
|
100
91
|
end
|
101
92
|
alias open C_OpenSession
|
102
|
-
|
93
|
+
|
103
94
|
# Closes all sessions an application has with a token.
|
104
95
|
# @return [PKCS11::Slot]
|
105
96
|
def C_CloseAllSessions
|
data/test/test_pkcs11.rb
CHANGED
@@ -3,31 +3,34 @@ require "pkcs11"
|
|
3
3
|
require "test/helper"
|
4
4
|
|
5
5
|
class TestPkcs11 < Test::Unit::TestCase
|
6
|
-
|
6
|
+
attr_reader :pk
|
7
|
+
|
8
|
+
def open
|
7
9
|
@pk = open_softokn
|
8
10
|
end
|
9
11
|
|
10
|
-
def
|
12
|
+
def close
|
11
13
|
@pk.close
|
12
14
|
@pk = nil
|
13
15
|
GC.start
|
14
16
|
end
|
15
17
|
|
16
|
-
def pk
|
17
|
-
@pk
|
18
|
-
end
|
19
|
-
|
20
18
|
def test_info
|
19
|
+
open
|
21
20
|
info = pk.info
|
22
21
|
assert info.inspect =~ /cryptokiVersion=/, 'There should be a version in the library info'
|
22
|
+
close
|
23
23
|
end
|
24
24
|
|
25
25
|
def test_slots
|
26
|
+
open
|
26
27
|
slots = pk.active_slots
|
27
28
|
assert slots.length>=1, 'Hope there is at least one active slot'
|
29
|
+
close
|
28
30
|
end
|
29
31
|
|
30
32
|
def test_close
|
33
|
+
open
|
31
34
|
pk.close
|
32
35
|
pk.unload_library
|
33
36
|
assert_raise(PKCS11::Error){ pk.info }
|
@@ -43,5 +46,26 @@ class TestPkcs11 < Test::Unit::TestCase
|
|
43
46
|
pk.C_Initialize(pargs)
|
44
47
|
|
45
48
|
pk.info
|
49
|
+
close
|
50
|
+
end
|
51
|
+
|
52
|
+
def test_C_Initialize_with_Hash
|
53
|
+
pk = PKCS11.open
|
54
|
+
pk.load_library(find_softokn)
|
55
|
+
pk.C_GetFunctionList
|
56
|
+
pk.C_Initialize(:flags=>0, :pReserved=>softokn_params_string)
|
57
|
+
pk.info
|
58
|
+
pk.close
|
59
|
+
end
|
60
|
+
|
61
|
+
def test_wait_for_slot_event
|
62
|
+
open
|
63
|
+
# Softokn's C_WaitForSlotEvent() currently raises PKCS11::CKR_FUNCTION_NOT_SUPPORTED.
|
64
|
+
# So just check, that the call goes to softokn at all.
|
65
|
+
begin
|
66
|
+
pk.wait_for_slot_event
|
67
|
+
rescue PKCS11::Error
|
68
|
+
end
|
69
|
+
close
|
46
70
|
end
|
47
71
|
end
|
data/test/test_pkcs11_crypt.rb
CHANGED
@@ -19,7 +19,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
19
19
|
@slot = slots.last
|
20
20
|
@session = slot.open
|
21
21
|
# session.login(:USER, "")
|
22
|
-
|
22
|
+
|
23
23
|
@rsa_pub_key = session.find_objects(:CLASS => CKO_PUBLIC_KEY,
|
24
24
|
:KEY_TYPE => CKK_RSA).first
|
25
25
|
@rsa_priv_key = session.find_objects(:CLASS => CKO_PRIVATE_KEY,
|
@@ -47,7 +47,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
47
47
|
cryptogram = session.encrypt( :RSA_PKCS, rsa_pub_key, plaintext1)
|
48
48
|
assert cryptogram.length>10, 'The cryptogram should contain some data'
|
49
49
|
assert_not_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
|
50
|
-
|
50
|
+
|
51
51
|
plaintext2 = session.decrypt( :RSA_PKCS, rsa_priv_key, cryptogram)
|
52
52
|
assert_equal plaintext1, plaintext2, 'Decrypted plaintext should be the same'
|
53
53
|
end
|
@@ -57,14 +57,14 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
57
57
|
cryptogram = session.encrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key, plaintext1)
|
58
58
|
assert_equal 16, cryptogram.length, 'The cryptogram should contain some data'
|
59
59
|
assert_not_equal cryptogram, plaintext1, 'The cryptogram should be different to plaintext'
|
60
|
-
|
60
|
+
|
61
61
|
cryptogram2 = ''
|
62
62
|
cryptogram2 << session.encrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key ) do |cipher|
|
63
63
|
cryptogram2 << cipher.update(plaintext1[0, 8])
|
64
64
|
cryptogram2 << cipher.update(plaintext1[8..-1])
|
65
65
|
end
|
66
66
|
assert_equal cryptogram, cryptogram2, "Encrypt with and w/o block should be lead to the same result"
|
67
|
-
|
67
|
+
|
68
68
|
plaintext2 = session.decrypt( {:DES3_CBC_PAD=>"\0"*8}, secret_key, cryptogram)
|
69
69
|
assert_equal plaintext1, plaintext2, 'Decrypted plaintext should be the same'
|
70
70
|
end
|
@@ -82,7 +82,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
82
82
|
|
83
83
|
valid = session.verify( :SHA1_RSA_PKCS, rsa_pub_key, signature, plaintext)
|
84
84
|
assert valid, 'The signature should be correct'
|
85
|
-
|
85
|
+
|
86
86
|
assert_raise(CKR_SIGNATURE_INVALID, 'The signature should be invalid on different text') do
|
87
87
|
session.verify( :SHA1_RSA_PKCS, rsa_pub_key, signature, "modified text")
|
88
88
|
end
|
@@ -150,7 +150,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
150
150
|
{:ENCRYPT=>true, :WRAP=>true, :DECRYPT=>true, :UNWRAP=>true, :TOKEN=>false, :LOCAL=>true})
|
151
151
|
assert_equal true, key[:LOCAL], 'Keys created on the token should be marked as local'
|
152
152
|
assert_equal CKK_DES2, key[:KEY_TYPE], 'Should be a 2 key 3des key'
|
153
|
-
|
153
|
+
|
154
154
|
# other ways to use mechanisms
|
155
155
|
key = session.generate_key(CKM_DES2_KEY_GEN,
|
156
156
|
{:ENCRYPT=>true, :WRAP=>true, :DECRYPT=>true, :UNWRAP=>true, :TOKEN=>false, :LOCAL=>true})
|
@@ -165,7 +165,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
165
165
|
{:ENCRYPT=>true, :VERIFY=>true, :WRAP=>true, :MODULUS_BITS=>768, :PUBLIC_EXPONENT=>[3].pack("N"), :TOKEN=>false},
|
166
166
|
{:PRIVATE=>true, :SUBJECT=>'test', :ID=>[123].pack("n"),
|
167
167
|
:SENSITIVE=>true, :DECRYPT=>true, :SIGN=>true, :UNWRAP=>true, :TOKEN=>false, :LOCAL=>true})
|
168
|
-
|
168
|
+
|
169
169
|
assert_equal true, priv_key[:LOCAL], 'Private keys created on the token should be marked as local'
|
170
170
|
assert_equal priv_key[:CLASS], CKO_PRIVATE_KEY
|
171
171
|
assert_equal pub_key[:CLASS], CKO_PUBLIC_KEY
|
@@ -183,7 +183,7 @@ class TestPkcs11Crypt < Test::Unit::TestCase
|
|
183
183
|
|
184
184
|
# Derive secret DES key for side 1 with OpenSSL
|
185
185
|
new_key1 = key1.compute_key(OpenSSL::BN.new pub_key2[:VALUE], 2)
|
186
|
-
|
186
|
+
|
187
187
|
# Derive secret DES key for side 2 with softokn3
|
188
188
|
new_key2 = session.derive_key( {:DH_PKCS_DERIVE=>key1.pub_key.to_s(2)}, priv_key2,
|
189
189
|
:CLASS=>CKO_SECRET_KEY, :KEY_TYPE=>CKK_AES, :VALUE_LEN=>16, :ENCRYPT=>true, :DECRYPT=>true, :SENSITIVE=>false )
|
metadata
CHANGED
@@ -1,13 +1,13 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: pkcs11
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
hash:
|
4
|
+
hash: 17
|
5
5
|
prerelease:
|
6
6
|
segments:
|
7
7
|
- 0
|
8
8
|
- 2
|
9
|
-
-
|
10
|
-
version: 0.2.
|
9
|
+
- 3
|
10
|
+
version: 0.2.3
|
11
11
|
platform: x86-mingw32
|
12
12
|
authors:
|
13
13
|
- Ryosuke Kutsuna
|
@@ -17,7 +17,7 @@ autorequire:
|
|
17
17
|
bindir: bin
|
18
18
|
cert_chain: []
|
19
19
|
|
20
|
-
date:
|
20
|
+
date: 2012-01-25 00:00:00 Z
|
21
21
|
dependencies:
|
22
22
|
- !ruby/object:Gem::Dependency
|
23
23
|
name: yard
|
@@ -50,33 +50,33 @@ dependencies:
|
|
50
50
|
type: :development
|
51
51
|
version_requirements: *id002
|
52
52
|
- !ruby/object:Gem::Dependency
|
53
|
-
name:
|
53
|
+
name: rdoc
|
54
54
|
prerelease: false
|
55
55
|
requirement: &id003 !ruby/object:Gem::Requirement
|
56
56
|
none: false
|
57
57
|
requirements:
|
58
58
|
- - ~>
|
59
59
|
- !ruby/object:Gem::Version
|
60
|
-
hash:
|
60
|
+
hash: 19
|
61
61
|
segments:
|
62
|
-
-
|
63
|
-
-
|
64
|
-
version: "
|
62
|
+
- 3
|
63
|
+
- 10
|
64
|
+
version: "3.10"
|
65
65
|
type: :development
|
66
66
|
version_requirements: *id003
|
67
67
|
- !ruby/object:Gem::Dependency
|
68
|
-
name:
|
68
|
+
name: hoe
|
69
69
|
prerelease: false
|
70
70
|
requirement: &id004 !ruby/object:Gem::Requirement
|
71
71
|
none: false
|
72
72
|
requirements:
|
73
73
|
- - ~>
|
74
74
|
- !ruby/object:Gem::Version
|
75
|
-
hash:
|
75
|
+
hash: 27
|
76
76
|
segments:
|
77
|
-
-
|
78
|
-
-
|
79
|
-
version: "
|
77
|
+
- 2
|
78
|
+
- 12
|
79
|
+
version: "2.12"
|
80
80
|
type: :development
|
81
81
|
version_requirements: *id004
|
82
82
|
description: "This module allows Ruby programs to interface with \"RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki)\"."
|
@@ -177,15 +177,15 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
177
177
|
requirements: []
|
178
178
|
|
179
179
|
rubyforge_project: pkcs11
|
180
|
-
rubygems_version: 1.8.
|
180
|
+
rubygems_version: 1.8.6
|
181
181
|
signing_key:
|
182
182
|
specification_version: 3
|
183
183
|
summary: PKCS#11 binding for Ruby
|
184
184
|
test_files:
|
185
|
+
- test/test_pkcs11_object.rb
|
185
186
|
- test/test_pkcs11_thread.rb
|
186
|
-
- test/test_pkcs11_structs.rb
|
187
|
-
- test/test_pkcs11_session.rb
|
188
|
-
- test/test_pkcs11_slot.rb
|
189
187
|
- test/test_pkcs11.rb
|
188
|
+
- test/test_pkcs11_slot.rb
|
189
|
+
- test/test_pkcs11_session.rb
|
190
|
+
- test/test_pkcs11_structs.rb
|
190
191
|
- test/test_pkcs11_crypt.rb
|
191
|
-
- test/test_pkcs11_object.rb
|