Thank you very much Nelson!

Yes, it seems that P11's C_InitPIN only talks about tokens
which apparently is not the same thing as a key.

This is a bit unfortunate, because there are several things in
progress like IETF's KEYPROV and yours truly's KeyGen2
that require a per-key PIN-setting ability. 

Although a bit on the slimy side, do you think that an extension
to the softtoken implementation would be rejected by the
owner(s) of the code?

But of course such an idea goes nowhere unless there is a
way to store PINs as well.  The following shows 3 out of
10 MySQL tables of the PoC keystore I'm currently working with:
http://webpki.org/papers/keygen2/sql-databases-as-universal-keystores.pdf
I would be interested in upgrading the soft token but I can't fund
such a development and it would also be of little interest unless
there are some other features added to the Mozilla core such
as XML security.  Another possibility would be to create a
new P11 provider that through JNI wraps to Java which
has excellent support for just about anything you want. I
guess that FireFox uses very few P11 functions for TLS
client-auth which is really the only existing mechanism
associated with client keys, right?

Anders

----- Original Message ----- 
From: "Nelson B Bolyard" <[EMAIL PROTECTED]>
To: "mozilla's crypto code discussion list" <dev-tech-crypto@lists.mozilla.org>
Sent: Saturday, August 23, 2008 23:02
Subject: Re: Soft token provider capabilities


Anders Rundgren wrote, On 2008-08-23 01:21:
> I have decided to give FF crypto programming a try.
> I have a few initial questions that this list hopefully knows about.
> Pointers to the associated rather difficult-to-find Mozilla docs
> would be much appreciated.
> 
> Q1. Does the built-in soft token provider offer the ability to
> programmatically set an initial PIN-code for a key?

I'm not exactly sure what you're asking for here, but if you're asking
about separate PINs for each (private) key, the answer is: no.

Mozilla's PKCS#11 softoken follows the original PKCS#11 "token" model,
where there is one authentication action that covers the entire contents
of the "token", and once authenticated to the token, one has access to
all the keys in that token.  It does not support separate PINs for each
key.

> Q2. Can you perform crypto operations with the soft-token
> provider using XPCOM and JavaScript?

This is a question about PSM, the FF code that interfaces FF to the NSS
crypto libraries and provides the "scriptable" interfaces that are
accessible from Java.  Unfortunately, this mailing list doesn't get
much participation from the folks who really know PSM.  I'm not a PSM
expert, but I'll try to give you a few pointers.

All of PSM's scriptable interfaces are defined in ".idl" files.
Those files contain comments about the methods they declare.  AFAIK, that
is the only documentation for PSM's interfaces. (I'd be happy to be
proven wrong about that! :)  Most of PSM's .idl files can be found here:

<http://mxr.mozilla.org/security/find?text=&kind=text&string=.idl>

But there are a few more not in that group, such as those seen here:

<http://mxr.mozilla.org/mozilla/search?string=crypt&find=netwerk/base/public/.*idl>

There are probably others, but I don't have a list or a URL for them.

Not all of those interfaces are "public", but presumably the ones in
the "public" directory all are.

I hope this helps some.  Sorry I can't help more with the PSM stuff.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to