Back to bug 1562572
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla Rules Engine | 2018-04-01 03:25:23 UTC | Keywords | FutureFeature | |
| aalba6675 | 2018-04-01 03:27:31 UTC | Summary | [RFE] Two backports for RHEL 7.5 - better support for CloudHSM in FIPS mode | [RFE] Two backports for RHEL 7.5/Fedora 28 - better support for CloudHSM in FIPS mode |
| aalba6675 | 2018-04-01 03:28:21 UTC | Link ID | Github https://github.com/OpenSC/OpenSC/issues/1285 | |
| Fedora Update System | 2018-04-03 15:59:42 UTC | Status | NEW | ON_QA |
| Jakub Jelen | 2018-04-25 16:22:15 UTC | Status | ON_QA | ASSIGNED |
| Mark Thacker | 2018-04-25 16:22:56 UTC | CC | mthacker | |
| Nikos Mavrogiannopoulos | 2018-04-25 16:24:04 UTC | CC | nmavrogi | |
| Jakub Jelen | 2018-04-25 16:40:45 UTC | Blocks | 1563596 | |
| CC | rc556677 | |||
| Jakub Jelen | 2018-06-19 12:13:46 UTC | Doc Text | Cause: pkcs11-tool was handling EC_POINT values wrongly and there was missing support for arbitrary vendor-specific mechanisms. Consequence: Vendor-specific mechanisms and some ECDSA keys in HSM and smart cards were not usable in pkcs11-tool. Fix: The upstream fix was pushed. Result: The tool accepts arbitrary mechanisms IDs and handles ECDSA keys according to specification. | |
| Doc Type | If docs needed, set a value | Bug Fix | ||
| Jakub Jelen | 2018-06-19 14:14:23 UTC | Status | ASSIGNED | MODIFIED |
| Fixed In Version | opensc-0.16.0-9.20170227git777e2a3.el7 | |||
| errata-xmlrpc | 2018-06-19 14:16:31 UTC | Status | MODIFIED | ON_QA |
| Marc Muehlfeld | 2018-06-20 15:37:41 UTC | Docs Contact | mmuehlfe | |
| Marc Muehlfeld | 2018-07-09 12:25:40 UTC | CC | jjelen | |
| Doc Text | Cause: pkcs11-tool was handling EC_POINT values wrongly and there was missing support for arbitrary vendor-specific mechanisms. Consequence: Vendor-specific mechanisms and some ECDSA keys in HSM and smart cards were not usable in pkcs11-tool. Fix: The upstream fix was pushed. Result: The tool accepts arbitrary mechanisms IDs and handles ECDSA keys according to specification. | The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly Previously, the *pkcs11-tool* utility incorrectly handles *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly. | ||
| Flags | needinfo?(jjelen) | |||
| Jakub Jelen | 2018-07-09 15:30:19 UTC | Flags | needinfo?(jjelen) | |
| Marc Muehlfeld | 2018-07-09 15:44:13 UTC | Doc Text | The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly Previously, the *pkcs11-tool* utility incorrectly handles *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly. | The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly Previously, the *pkcs11-tool* utility incorrectly handled *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly. |
| Marc Muehlfeld | 2018-07-26 12:51:10 UTC | Doc Text | The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly Previously, the *pkcs11-tool* utility incorrectly handled *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. The problem has been fixed. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly. | The *pkcs11-tool* utility now supports mechanism IDs and handles ECDSA keys correctly Previously, the *pkcs11-tool* utility incorrectly handled *EC_POINT* values and support for certain vendor-specific mechanisms was missing. As a consequence, these mechanisms and certain ECDSA keys in hardware security modules (HSM) and smart cards were not supported by *pkcs11-tool*. With this update, the *pkcs11-tool* now handles *EC_POINT* values and vendor-specific mechanisms correctly. As a result, the utility now supports mechanism IDs and handles ECDSA keys correctly. |
| Roshni | 2018-08-17 21:12:40 UTC | Status | ON_QA | VERIFIED |
| CC | rpattath | |||
| errata-xmlrpc | 2018-10-30 01:40:07 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2018-10-30 11:24:51 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2018-10-30 07:24:51 UTC | |||
| errata-xmlrpc | 2018-10-30 11:25:08 UTC | Link ID | Red Hat Product Errata RHBA-2018:3224 |
Back to bug 1562572