<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nitrokey-rs, branch v0.3.4</title>
<subtitle>Rust interface to libnitrokey</subtitle>
<id>https://git.ireas.org/nitrokey-rs/atom?h=v0.3.4</id>
<link rel='self' href='https://git.ireas.org/nitrokey-rs/atom?h=v0.3.4'/>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/'/>
<updated>2019-01-20T14:04:29Z</updated>
<entry>
<title>Merge branch 'hotfix-0.3.4'</title>
<updated>2019-01-20T14:04:29Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-20T14:04:29Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=41cdc1f7091a3c442241dbb2379c50dbcc7e9c5f'/>
<id>urn:sha1:41cdc1f7091a3c442241dbb2379c50dbcc7e9c5f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Release v0.3.4</title>
<updated>2019-01-20T14:00:53Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-20T14:00:53Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=b6a941cd9ed30a4f93299132ae7e155922c73701'/>
<id>urn:sha1:b6a941cd9ed30a4f93299132ae7e155922c73701</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Pass temporary password as *const c_char</title>
<updated>2019-01-20T13:58:11Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-20T13:54:20Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=9e97ffad01e1b81c87f2926bd7bab823219b07c7'/>
<id>urn:sha1:9e97ffad01e1b81c87f2926bd7bab823219b07c7</id>
<content type='text'>
The random number generator used for the temporary password produces a
Vec&lt;u8&gt;.  The libnitrokey functions using the temporary password require
a pointer to a c_char.  Previously, we cast the u8 pointer to the
Vec&lt;u8&gt; to a i8 pointer (unsigned to signed).  This leads to a type
mismatch if the char type is not signed.  Therefore we now cast to
c_char instead of i8.
</content>
</entry>
<entry>
<title>Release v0.3.3</title>
<updated>2019-01-16T20:36:49Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T20:36:49Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=7cf747d56ddc0b7eeedc3caf36dcc909907a171c'/>
<id>urn:sha1:7cf747d56ddc0b7eeedc3caf36dcc909907a171c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add build with USE_SYSTEM_LIBNITROKEY=1</title>
<updated>2019-01-16T20:32:11Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T20:32:11Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=ea84e4609421ee5ce3bebbb9f52ef302fe2fba56'/>
<id>urn:sha1:ea84e4609421ee5ce3bebbb9f52ef302fe2fba56</id>
<content type='text'>
The archlinux build compiles libnitrokey from source.  Now we also
verify that we can use the system libnitrokey version.
</content>
</entry>
<entry>
<title>Document and test empty Git versions</title>
<updated>2019-01-16T20:29:38Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T20:28:31Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=679791064169a37ad9d88b910b7553ebf7133c07'/>
<id>urn:sha1:679791064169a37ad9d88b910b7553ebf7133c07</id>
<content type='text'>
If libnitrokey has not been built from a clone of the Git repository,
the Git version string may be empty.
</content>
</entry>
<entry>
<title>Add delay between factory reset and building AES key in tests</title>
<updated>2019-01-16T20:22:48Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T20:20:31Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=d72641832a6c8622cf6468987b5b0aa5bd4c1c39'/>
<id>urn:sha1:d72641832a6c8622cf6468987b5b0aa5bd4c1c39</id>
<content type='text'>
There seems to be a bug in libnitrokey or the Nitrokey Storage firmware
that causes problems when chaining factory reset and build_AES_keys
without delay (upstream issue [0]).

[0] https://github.com/Nitrokey/nitrokey-storage-firmware/issues/80
</content>
</entry>
<entry>
<title>Build AES key after factory reset in tests</title>
<updated>2019-01-16T20:22:41Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T19:43:04Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=3a8669cea4aa4b32fee3336cb9be4ec66d3dc2c2'/>
<id>urn:sha1:3a8669cea4aa4b32fee3336cb9be4ec66d3dc2c2</id>
<content type='text'>
The device::clear_new_sd_card_warning used to perform a factory reset
without building an AES key.  This led to errors in tests that assume
that an AES key is present.
</content>
</entry>
<entry>
<title>Make device::factory_reset test more robust</title>
<updated>2019-01-16T20:22:31Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T19:35:50Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=d3a103bc25e5f37a42a19515ad25e5a8e5995b36'/>
<id>urn:sha1:d3a103bc25e5f37a42a19515ad25e5a8e5995b36</id>
<content type='text'>
The device::factory_reset test used to first change the PINs and then
access the PWS and the OTP data.  If for example the PWS access failed
due to an problem with the AES key, the PINs were not reset.

Now we perform the PWS and OTP access with the old PINs – which is okay
as we do not want to test the PIN change but the factory reset.  If
these preparations fail, the tests is cancelled before the PINs are
changed.
</content>
</entry>
<entry>
<title>pws: Interpret empty strings as unprogrammed slots</title>
<updated>2019-01-16T19:17:16Z</updated>
<author>
<name>Robin Krahl</name>
<email>robin.krahl@ireas.org</email>
</author>
<published>2019-01-16T03:16:01Z</published>
<link rel='alternate' type='text/html' href='https://git.ireas.org/nitrokey-rs/commit/?id=79a3298ab5973a47cb68ef48e554ec88fb7e99a6'/>
<id>urn:sha1:79a3298ab5973a47cb68ef48e554ec88fb7e99a6</id>
<content type='text'>
Until the last commit, all empty strings returned by the library were
interepreted as errors.  As the PWS functions return empty strings for
unprogrammed slots, the methods to access the PWS data returned an error
when querying a slot that is not programmed.  Since the last commit,
they return an empty string instead.

This patch restores the old behavior by returning an error instead of an
empty string.  Yet we change the error variant: SlotNotProgrammed
instead of Undefined.
</content>
</entry>
</feed>
