robert dugal wrote: > I want to configure Firefox 1.5 to use my own PKCS11 provider as the > default for all algorithms supported by my provider. I cannot appear to > do this from the "Device Manager" dialog as that dialog has no way to > set specify which algorithms should default to my library. The NSS > utility modutil has the ability to install the p11 provider and > configure which algorithms are default. Unfortunately modutil is not > distributed with Firefox. When I got the v1.5 source tarball modutil > source is there but I cannot get it to build. I tried several different > binary releases NSS (3.9, 3.10,3.11) but in all cases modutil only > allows specifying some algorithms as the default mechanisms. AES is not one of these so the internal NSS provider always ends up being the default.

You found a bug! AES wasn't added to modutil when it was added to everything else in NSS. Please file a bug about this in bugzilla.mozilla.org, product NSS, component tools. And CC me in the bug report. (Remove NO and SPAM from my email address to get the real one)

I will enter the modutil bug report today. I tried modifying modutil to set the AES bit and it appears to set the bit in the database but Firefox still doesn't appear to use my provider as default for AES so there is probably some additional coding changes required. I haven't had enough time to debug it yet to see what is going wrong.


> Is there any other way to configure my provider as the default?

Is the -jar installation command still supported with modutil? I have not been able to figure out how to get it to work. I tried using the jar file built in security/nss/lib/fortcrypt but it doesn't appear to install either. Is there any way to use XPInstall to install and configure my provider? A solution not requiring modutil would be preferrable.




Are you sure that's really what you want to do? Does your module implement all the SSL-related PKCS#11 mechanisms? If not, it may be necessary to move keys from one module to another, which is typically quite costly (in terms of performance).

--
Nelson B

My provider does implement almost every algorithm that NSS does. It currently doesn't do the SSL/TLS mechanisms but I will be adding them too. It doesn't support the NSS vendor specific attributes that the NSS softtoken does but I'm hoping they aren't necessary. The provider implements additional algorithms that are not in NSS and I am modifying Firefox to support some new ciphersuites for NSA Suite B cryptography, which will be defined in a soon to be published IETF draft.

Rob


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to