I finally got around to trying to build an extended ECC version of  NSS but 
have encountered some problems. (I am neither a Linux nor C expert.)  I 
tried to follow the directions but using the newer versions of NSS and NSPR 
that you mentioned in your 6/24 post.
"http://www.mozilla.org/projects/security/pki/nss/nss-3.12/nss-3.12-release-notes.html#docs
http://www.mozilla.org/projects/security/pki/nss/nss-3.11.4/nss-3.11.4-build.html

cvs co -r NSPR_4_7_1_RTM mozilla/nsprpub
cvs co -r NSS_3_12_RTM mozilla/dbm mozilla/security/dbm
cvs co -r NSS_3_12_RTM mozilla/security/coreconf mozilla/security/nss"

 I am working in a Fedora 8 environment. The link to the ecl-curve.h file 
has the directives that cause a compilation error if the cited flags are set 
(the file also lacks pointers defining most of the curves' parameters). I 
found a version of the ecl-curve.h file in another LXR directory that had 
definitions for the curves in the table and used it. I compiled NSS and 
NSPR. When I use the certutil utility in the binary file, it is unable to 
create an ec key. The -H command does not acknowledge the existence of key 
types other than rsa and dsa. I used the certutil command: certutil -d 
. -G -k ec -q nistp256. The error message says the the keytype ec is not 
recognized and that -q is for the DSA q parameter.

Any help or suggestions would be appreciated. Thanks.





"Glen Beasley" <[EMAIL PROTECTED]> wrote in message 
news:[EMAIL PROTECTED]
> mozilla wrote:
>> Thanks.  That helps. The referenced Java program implies that 192 and 224
>> are recognized values for the kpg initialize method. However, the program
>> accepted the parameters to initialize but generated errors when 
>> attempting
>> to generate the keys. (The program worked for generating pairs using 256,
>> 384, and 512.)
>>
>> Does that error make sense? Are there other limitations on the values
>> supported?  Thanks again.
>>
> One can build two versions of NSS. Basic ECC and extended ECC with the 
> flags:
>
> NSS_ENABLE_ECC=1
> NSS_ECC_MORE_THAN_SUITE_B=1
> and the correct version of
> http://mxr.mozilla.org/security/source/security/nss/lib/freebl/ecl/ecl-curve.h
>
> JSS assumes you know which ECC version of NSS you're using.
>
> The basic ECC version of NSS only provides:
>
> NIST_P256, NIST_P384, and NIST_521.
>
> -glen
>> Bill Price
<<snip>> 


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to