Oscar So wrote:
Hi,

If my PKCS#11 module only supports CKM_RSA_PKCS_PSS padding
(not even PKCS#1 padding), in C_GetMechanismList,
should it just return the following CKMs:

CKM_RSA_PKCS_KEY_PAIR_GEN
CKM_RSA_PKCS_PSS
CKM_RSA_X_509
CKM_SHA_1

Since I am only return these CKMs, FireFox does not recognize my
PKCS#11 module at all. Any hints ?
Exactly what do you mean by 'not recognize'? Does the module:

1) not load - (this should be some other issue than your mechanisms).
2) module loads, but certs aren't recognized (also not an issue with mechanisms). 3) can decrypt S/Mime messages or do SSL client auth. That is a problem with the mechanisms...

NSS (and thus Firefox) requires CKM_RSA_PKCS as that is what all the protocols it supports uses (TLS S/MIME). NSS uses CKM_RSA_X509 for ssl2 connections since ssl2 uses part of the PKCS #11 padding to encode rollback attack prevention info.

bob


Thank you very much!

Best,
Oscar
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to