> -----Original Message-----
> The requirement to put all cryptographically sensitive 
> information into a
> well defined crypto boundary seems very elegant.  It explains 
> how NSS was
> able to work with so many third party crypto gizmos starting 
> in the late
> 90's, and how it was able to get 4 FIPS 140 certifications.

The above is just one of the reasons I've used NSS/JSS in more than one
application.  It may be a little more work to get started using PKCS#11,
but it pays off big time once an additional module/token is
needed/wanted.  I've added networked HSMs, PCI-based HSMs, purely
software PKCS#11 modules and about 5-6 different smart cards to NSS and
they all work just fine.  It's usually little more than a single modutil
command to add the PKCS#11 shared library to NSS.  Getting 4 FIPS
validations and having none with problems like OpenSSL (that I'm aware
of) is icing on the cake.

Dave
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to