diff options
| author | Jack Magne <jmagne@dhcp-16-213.sjc.redhat.com> | 2014-04-02 19:10:51 -0700 |
|---|---|---|
| committer | Jack Magne <jmagne@dhcp-16-213.sjc.redhat.com> | 2014-04-14 10:11:14 -0700 |
| commit | 7604304b755bc8d78889322bdf825a7ed907d683 (patch) | |
| tree | 7de8da75d6dfe447ab547db2b88ae3b34fb3ad88 /base/java-tools/src/com/netscape | |
| parent | f0b112fa8d859056aaa729cda0761a1786987088 (diff) | |
| download | pki-7604304b755bc8d78889322bdf825a7ed907d683.tar.gz pki-7604304b755bc8d78889322bdf825a7ed907d683.tar.xz pki-7604304b755bc8d78889322bdf825a7ed907d683.zip | |
Further progress Format operation.
1. Read applet into memory to prepare to write to token.
2. With tpsclient create secure channel by implementing Initialize Update and ExternalAuthenticate messages.
3. Support for MAC and encryption for messages going on after secure channel has been created.
4. Implemented method to remove an aid file or instance from the token.
5. Added some symkey methods to allow TPS to manipulate session keys.
6. Performed some cfu feedback fixes such as changing al the names of APDU classes to have APDU in the name.
Have not tried this with real token as of yet. The tpsclient does verify of the MAC coming from the server and decrypts encrypted messages. Decrypted messages have to be correct for the MAC verification to work.
Next step will be to add the phone home servlet to the TPS and give it a try with a real token and esc.
Diffstat (limited to 'base/java-tools/src/com/netscape')
0 files changed, 0 insertions, 0 deletions
