Skip to content

Commit f3ecba1

Browse files
committed
Fix issues reported from Markdown lint and Codespell
1 parent 5d1948d commit f3ecba1

27 files changed

Lines changed: 66 additions & 57 deletions

.github/codespell_ignore_words.txt

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
1-
Feitian
2-
GOST
1+
feitian
32
signatur
43
lokale
4+
ist
5+
alle
6+
als
7+
theses
8+
widgits
9+
gost

.github/markdownlint-config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,6 @@
33
"MD013": false,
44
"MD041": false,
55
"MD014": false,
6-
"MD024": false
6+
"MD024": false,
7+
"MD010": false
78
}

Aladdin-eToken-PRO.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ If you are only interested in the middleware (and not the proprietary key manage
108108
3. double-click on the following packages in this order so as to install them:
109109

110110
* `etokenframework.pkg`: those are the shared libraries (that will go into `/Library/Frameworks/eToken.framework`) needed by all the other packages;
111-
* `etokendriversleopard.pkg` (for Mac OS 10.5.x) or `etokendriverstiger.pkg` (for Mac OS 10.4.x): this is the middleware, that goes under `/usr/libexec/SmartCardServices/drivers/eTokenIfdh.bundle/` . It consists of an auxillary daemon that will be run by `pcscd` in order to perform the necessary USB I/O.
111+
* `etokendriversleopard.pkg` (for Mac OS 10.5.x) or `etokendriverstiger.pkg` (for Mac OS 10.4.x): this is the middleware, that goes under `/usr/libexec/SmartCardServices/drivers/eTokenIfdh.bundle/` . It consists of an auxiliary daemon that will be run by `pcscd` in order to perform the necessary USB I/O.
112112

113113
To test this setup, plug your token in, then open a terminal and type the following commands:
114114

Aventra-MyEID-PKI-card.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The cards can be personalized both visually and electrically by Aventra accordin
1212

1313
MyEID is certified by Microsoft and supports Smart Card Plug and Play.
1414

15-
> MyEID version 4 has been released, adding support for Elliptic Curve Cryptography and many other new features.
15+
> MyEID version 4 has been released, adding support for Elliptic Curve Cryptography and many other new features.
1616
1717
## Aventra MyEID PKI applet
1818

Card-personalization.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -327,18 +327,24 @@ These libraries can be loaded in OpenSSL so you can do a certificate request wit
327327

328328
* Run `openssl` command
329329
* On the `openssl` command prompt, type
330-
```bash
331-
engine dynamic -pre SO_PATH:engine_pkcs11 -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD
332-
```
330+
331+
```bash
332+
engine dynamic -pre SO_PATH:engine_pkcs11 -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD
333+
```
334+
333335
to use the PKCS #11 engine
336+
334337
* Then type (on the openssl command prompt)
335-
```bash
336-
req -engine pkcs11 -new -key <ID> -keyform engine -out <cert_req>
337-
```
338-
in which ID is the slot+ID in the following format:
339-
```bash
340-
[slot_<slotID>][-][id_<ID>], e.g. id_45 or slot_0-id_45
341-
```
338+
339+
```bash
340+
req -engine pkcs11 -new -key <ID> -keyform engine -out <cert_req>
341+
```
342+
343+
in which ID is the slot+ID in the following format:
344+
345+
```bash
346+
[slot_<slotID>][-][id_<ID>], e.g. id_45 or slot_0-id_45
347+
```
342348

343349
### `pkcs11-tool` and Mozilla/Netscape
344350

Compiling-on-Cygwin.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ If you want to use OpenSC with Cygwin OpenSSH utilities, such as `ssh-agent` or
44
then OpenSC has to be compiled for Cygwin. To do this follow these steps:
55

66
## Prepare for a fresh Cygwin install
7+
78
When building OpenSC we're going to be running the reconfiguration step of the OpenSC build process.
89
One side effect is that this step may try to incorporate additional features that are detected in
910
your current Cygwin installation, which can complicate the package dependencies.
@@ -14,9 +15,9 @@ So these instructions are based on starting from a fresh Cygwin installation. Th
1415
3. Temporarily unset `CYGWIN` environment variable while building and installing.
1516
Currently having `CYGWIN` set causes make install to fail in the `install-exec-hook` stage.
1617

17-
## Install Cygwin base
18+
## Install Cygwin base
1819

19-
1. Go to https://cygwin.com/install.html.
20+
1. Go to <https://cygwin.com/install.html>.
2021
2. Run `setup-x86_64.exe` & save it for running later.
2122
3. Install to `C:\cygwin64`.
2223
4. Select `All Users`.

Creating-applications-with-smart-card-support.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ These tools and libraries help in talking to PKCS#11 modules or integrate PKCS#1
2121
* [gp11](http://live.gnome.org/GnomeKeyring/Architecture) is a GObject based wrapper for PKCS#11, distributed with gnome-keyring.
2222
* [PaKChoiS](http://www.manyfish.co.uk/pakchois/) aims to provide a thin wrapper over the PKCS#11 interface.
2323
* [p11-kit](http://p11-glue.freedesktop.org/p11-kit.html) eases working with multiple PKCS#11 modules and includes support for [PKCS#11 URI scheme](http://tools.ietf.org/html/draft-pechanec-pkcs11uri-13).
24-
* [pkcs11-provider] (https://github.com/latchset/pkcs11-provider) is an Openssl 3.x provider to access Hardware or Software Tokens using the PKCS#11 Cryptographic Token Interface.
24+
* [pkcs11-provider](https://github.com/latchset/pkcs11-provider) is an Openssl 3.x provider to access Hardware or Software Tokens using the PKCS#11 Cryptographic Token Interface.
2525

2626
##### Python
2727

@@ -59,7 +59,7 @@ Mac OS X implements CDSA as the cryptography API for the Mac platform (in theory
5959
[OpenSSL](http://www.openssl.org/) has an easy way to integrate smart card support.
6060

6161
The [libp11](https://github.com/OpenSC/libp11/wiki) has code to make using OpenSC PKCS#11 module with OpenSSL quite easy and includes example code for using SSL with client certificate authentication using a smart card too.
62-
The use of engines in OpenSSL are deprecated fom the version 3.
62+
The use of engines in OpenSSL are deprecated from the version 3.
6363

6464
The engine_pkcs11 project has an OpenSSL engine implementation so you can change any code using OpenSSL to move the crypto operation from your CPU to your smart card with only a few small changes.
6565
It was merged into libp11 project.
@@ -72,36 +72,36 @@ The [pkcs11-provider](https://github.com/latchset/pkcs11-provider) is an Openssl
7272

7373
### QCA
7474

75-
[QCA](http://api.kde.org/kdesupport-api/kdesupport-apidocs/qca/html/) (Qt Cryptographic Architecture) adds cryptography support into Qt applications. QCA has PKCS#11 support since v2.0. See "http://sites.google.com/site/alonbarlev/qca-pkcs11":http://sites.google.com/site/alonbarlev/qca-pkcs11 for more information.
75+
[QCA](http://api.kde.org/kdesupport-api/kdesupport-apidocs/qca/html/) (Qt Cryptographic Architecture) adds cryptography support into Qt applications. QCA has PKCS#11 support since v2.0.
7676

7777
### GnuTLS
7878

79-
"GnuTLS":http://www.gnutls.org includes native PKCS#11 smart card support using the PKCS#11 URI scheme..
80-
See "http://www.gnutls.org/manual":http://www.gnutls.org/manual for more information.
79+
[GnuTLS](http://www.gnutls.org) includes native PKCS#11 smart card support using the PKCS#11 URI scheme..
80+
See <http://www.gnutls.org/manual> for more information.
8181

8282
### cryptlib
8383

84-
"cryptlib":http://www.cs.auckland.ac.nz/~pgut001/cryptlib/ is a library by Peter Gutmann and claims support for SSL and PKCS#11 modules.
84+
[cryptlib](https://www.cs.auckland.ac.nz/~pgut001/cryptlib/) is a library by Peter Gutmann and claims support for SSL and PKCS#11 modules.
8585

8686
## Low level smart card access
8787

8888
OpenSC is for cryptographic smart cards and the preferred method for accessing such cards is via one of the high level cryptographic API-s listed above, which hides the details of actual card reader access via one of the interfaces described below. As a general rule, don't use the low level smart card API-s if the necessary functionality is implemented via a cryptographic API.
8989

9090
### PC/SC
9191

92-
PC/SC is a standard from "PC/SC Workgroup":http://www.pcscworkgroup.com/ but the "reference implementation" is still "Windows winscard.dll":http://msdn.microsoft.com/en-us/library/aa374731(VS.85).aspx#smart_card_functions. Linux uses the open source "pcsc-lite":http://pcsclite.alioth.debian.org/ package. And Mac OS X uses a fork of pcsc-lite included in the "SmartCardServices":http://smartcardservices.macosforge.org/ project.
92+
PC/SC is a standard from [PC/SC Workgroup](https://pcscworkgroup.com/) but the "reference implementation" is still [Windows winscard.dll](http://msdn.microsoft.com/en-us/library/aa374731(VS.85).aspx#smart_card_functions). Linux uses the open source [pcsc-lite](https://pcsclite.apdu.fr/) package. And Mac OS X uses a fork of pcsc-lite included in the [SmartCardServices](http://smartcardservices.macosforge.org/) project.
9393

9494
#### Tools and libraries
9595

9696
* Python
97-
* "pyscard":http://pyscard.sourceforge.net/
97+
* [pyscard](https://pyscard.sourceforge.io/)
9898
* Java
99-
* See [[dedicated Java page|Using-smart-cards-with-Java-SE]] about javax.smartcardio in Java 1.6+
99+
* See [[dedicated Java page|Using-smart-cards-with-Java-SE]] about `javax.smartcardio` in Java 1.6+
100100

101101
### CT-API
102102

103-
"CT-API":https://www.tuvit.de/de/aktuelles/downloads/card-terminal-application-programing-interface-fuer-chipkartenanwendungen/ is an API for accessing smart card readers that is mostly used in Germany. It is not suited for modern multi-user environments, is not portable and not always available. New projects should avoid using CT-API and use PC/SC instead.
103+
CT-API is an API for accessing smart card readers that is mostly used in Germany. It is not suited for modern multi-user environments, is not portable and not always available. New projects should avoid using CT-API and use PC/SC instead.
104104

105105
### OpenCT
106106

107-
"OpenCT":https://github.com/OpenSC/openct, like CT-API, is a Linux only API for accessing USB tokens (and smart card readers). Very few applications beside OpenSC can make use of OpenCT readers. New projects should try to avoid building against OpenCT and use PC/SC instead.
107+
[OpenCT](https://github.com/OpenSC/openct), like CT-API, is a Linux only API for accessing USB tokens (and smart card readers). Very few applications beside OpenSC can make use of OpenCT readers. New projects should try to avoid building against OpenCT and use PC/SC instead.

DNIe-(OpenDNIe).md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ From the public administration point of view the card has been procured by the M
1717

1818
Resources:
1919

20-
* The [official home page](http://www.dnielectronico.es) for the Spanish DNIe
20+
* The [official home page](http://www.dnielectronico.es) for the Spanish DNIe
2121

2222
## Card capabilities
2323

Eutron-CryptoIdentity-ITSEC-I-ITSEC-P.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ interface differs, the rest seems to be the same.
1515
One minor feature of the Siemens CardOS M4 is, that a RSA key cannot be used for both signing
1616
and decryption. OpenSC has implemented a workaround: software key generation and storing that
1717
key twice, once marked as decryption key and once marked as signing key. To enable this workaround
18-
specifiy `--split-key` on the command line, when creating the key.
18+
specify `--split-key` on the command line, when creating the key.
1919

2020
Eutron has their own software for Windows. This software does not implement PKCS#15 and thus is not
2121
compatible with OpenSC. As long as the card has memory, you can initialize the card with both software

Feitian-ePass2003.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ Refer to issue [#1803](https://github.com/OpenSC/OpenSC/issues/1803);
6060

6161
Links to the `Fix_Tool.tar.gz` archives:
6262

63-
* With x86 and x64: "Download fix_tool":http://download.ftsafe.com/files/ePass/Fix_Tool.tar.gz
64-
* With armhf arch: "Download fix_tool":http://download.ftsafe.com/files/reader/SDK/Fix_Tool_20200604.zip
63+
* With x86 and x64: [Download fix_tool](http://download.ftsafe.com/files/ePass/Fix_Tool.tar.gz)
64+
* With armhf arch: [Download fix_tool](http://download.ftsafe.com/files/reader/SDK/Fix_Tool_20200604.zip)
6565

6666
## Thanks
6767

0 commit comments

Comments
 (0)