Back to bug 1562572

Who When What Removed Added
Red Hat Bugzilla Rules Engine 2018-04-01 03:25:23 UTC Keywords FutureFeature
aalba6675 2018-04-01 03:27:31 UTC Summary [RFE] Two backports for RHEL 7.5 - better support for CloudHSM in FIPS mode [RFE] Two backports for RHEL 7.5/Fedora 28 - better support for CloudHSM in FIPS mode
aalba6675 2018-04-01 03:28:21 UTC Link ID Github https://github.com/OpenSC/OpenSC/issues/1285
Fedora Update System 2018-04-03 15:59:42 UTC Status NEW ON_QA
Jakub Jelen 2018-04-25 16:22:15 UTC Status ON_QA ASSIGNED
Mark Thacker 2018-04-25 16:22:56 UTC CC mthacker
Nikos Mavrogiannopoulos 2018-04-25 16:24:04 UTC CC nmavrogi
Jakub Jelen 2018-04-25 16:40:45 UTC Blocks 1563596
CC rc556677
Jakub Jelen 2018-06-19 12:13:46 UTC Doc Text Cause: pkcs11-tool was handling EC_POINT values wrongly and there was missing support for arbitrary vendor-specific mechanisms.

Consequence: Vendor-specific mechanisms and some ECDSA keys in HSM and smart cards were not usable in pkcs11-tool.

Fix: The upstream fix was pushed.

Result: The tool accepts arbitrary mechanisms IDs and handles ECDSA keys according to specification.
Doc Type If docs needed, set a value Bug Fix
Jakub Jelen 2018-06-19 14:14:23 UTC Status ASSIGNED MODIFIED
Fixed In Version opensc-0.16.0-9.20170227git777e2a3.el7
errata-xmlrpc 2018-06-19 14:16:31 UTC Status MODIFIED ON_QA
Marc Muehlfeld 2018-06-20 15:37:41 UTC Docs Contact mmuehlfe
Marc Muehlfeld 2018-07-09 12:25:40 UTC CC jjelen
Doc Text Cause: pkcs11-tool was handling EC_POINT values wrongly and there was missing support for arbitrary vendor-specific mechanisms.

Consequence: Vendor-specific mechanisms and some ECDSA keys in HSM and smart cards were not usable in pkcs11-tool.

Fix: The upstream fix was pushed.

Result: The tool accepts arbitrary mechanisms IDs and handles ECDSA keys according to specification.
The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly

Previously, the *pkcs11-tool* utility incorrectly handles *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly.
Flags needinfo?(jjelen)
Jakub Jelen 2018-07-09 15:30:19 UTC Flags needinfo?(jjelen)
Marc Muehlfeld 2018-07-09 15:44:13 UTC Doc Text The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly

Previously, the *pkcs11-tool* utility incorrectly handles *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly.
The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly

Previously, the *pkcs11-tool* utility incorrectly handled *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly.
Marc Muehlfeld 2018-07-26 12:51:10 UTC Doc Text The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly

Previously, the *pkcs11-tool* utility incorrectly handled *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly.
The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly

Previously, the *pkcs11-tool* utility incorrectly handled *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. With this update, the *pkcs11-tool* now handles *EC_POINT* values and vendor-specific mechanisms correctly. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly.
Roshni 2018-08-17 21:12:40 UTC Status ON_QA VERIFIED
CC rpattath
errata-xmlrpc 2018-10-30 01:40:07 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2018-10-30 11:24:51 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2018-10-30 07:24:51 UTC
errata-xmlrpc 2018-10-30 11:25:08 UTC Link ID Red Hat Product Errata RHBA-2018:3224

Back to bug 1562572