feat: v1.11.1

This commit is contained in:
2025-03-24 01:14:42 +08:00
parent 4a48e932d4
commit 468701b3ff
3 changed files with 11 additions and 11 deletions

6
Cargo.lock generated
View File

@@ -511,7 +511,7 @@ dependencies = [
[[package]]
name = "card-cli"
version = "1.11.0"
version = "1.11.1"
dependencies = [
"aes-gcm-stream",
"authenticator 0.3.1",
@@ -3689,9 +3689,9 @@ checksum = "6bdef32e8150c2a081110b42772ffe7d7c9032b606bc226c8260fd97e0976601"
[[package]]
name = "swift-secure-enclave-tool-rs"
version = "0.1.0"
version = "0.1.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "1cc8ba06af10bf59b2f47fb46238a0c62c2ac927184253b4fb998b3b3f68950a"
checksum = "1de60ab30b0f344a083df555373a2f419a0682f1a5d76c9f845abe696230caba"
dependencies = [
"base64 0.22.1",
"hex",

View File

@@ -1,6 +1,6 @@
[package]
name = "card-cli"
version = "1.11.0"
version = "1.11.1"
authors = ["Hatter Jiang <jht5945@gmail.com>"]
edition = "2018"
@@ -50,8 +50,8 @@ secrecy = "0.8"
der-parser = "9.0"
sshcerts = "0.13"
regex = "1.4.6"
aes-gcm-stream = "0.2.4"
swift-secure-enclave-tool-rs = "0.1.0"
aes-gcm-stream = "0.2"
swift-secure-enclave-tool-rs = "0.1"
#lazy_static = "1.4.0"
#ssh-key = "0.4.0"
#ctap-hid-fido2 = "2.1.3"

View File

@@ -9,9 +9,9 @@ pub fn is_support_se() -> bool {
pub fn generate_secure_enclave_p256_keypair(sign: bool) -> XResult<(Vec<u8>, Vec<u8>, String)> {
let key_material = if sign {
swift_secure_enclave_tool_rs::generate_ecdsa_keypair(KeyPurpose::Signing, true)?
swift_secure_enclave_tool_rs::generate_keypair(KeyPurpose::Signing, true)?
} else {
swift_secure_enclave_tool_rs::generate_ecdsa_keypair(KeyPurpose::KeyAgreement, true)?
swift_secure_enclave_tool_rs::generate_keypair(KeyPurpose::KeyAgreement, true)?
};
Ok((
key_material.public_key_point,
@@ -26,12 +26,12 @@ pub fn recover_secure_enclave_p256_public_key(
) -> XResult<(Vec<u8>, Vec<u8>, String)> {
let private_key_representation = STANDARD.decode(private_key)?;
let key_material = if sign {
swift_secure_enclave_tool_rs::recover_ecdsa_keypair(
swift_secure_enclave_tool_rs::recover_keypair(
KeyPurpose::Signing,
&private_key_representation,
)
} else {
swift_secure_enclave_tool_rs::recover_ecdsa_keypair(
swift_secure_enclave_tool_rs::recover_keypair(
KeyPurpose::KeyAgreement,
&private_key_representation,
)
@@ -58,6 +58,6 @@ pub fn secure_enclave_p256_dh(
pub fn secure_enclave_p256_sign(private_key: &str, content: &[u8]) -> XResult<Vec<u8>> {
let private_key_representation = STANDARD.decode(private_key)?;
let signature =
swift_secure_enclave_tool_rs::private_key_ecdsa_sign(&private_key_representation, content)?;
swift_secure_enclave_tool_rs::private_key_sign(&private_key_representation, content)?;
Ok(signature)
}