Subrata Mazumdar wrote:
Thanks Wan-Teh for the suggestion.
No, requiring custom version of Firefox to use ECC key based certificate enrollment is not realistic. It just does not seem right to disable access to all licensed ECC implementation just because Mozilla wants to disable the ECC implementation in the NSS soft-token. But, I am not go to question developer's decision because they have to live with the consequences.
--
Subrata

Wan-Teh Chang wrote:
If it is an option for you to use custom-built NSS libraries
with Firefox, you can follow the instructions at
http://pki.fedoraproject.org/wiki/ECC_Capable_NSS
to build a version of NSS that doesn't have a built-in ECC
implementation but can be configured to use a third-party
ECC implementation with no crippled functionality.  That
wiki page is intended for exactly your scenario.

Technically, he's only suggesting you build a custom set of NSS libraries. You don't really need to do a full custom Firefox.

I can attest that the linked wiki directions do work as I've used them myself to enable (ready for a laugh?) a Certicom ECC capable PKCS#11 module.

Dave
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to