On 2009-09-11 13:12 , Klaus Heinrich Kiwi wrote:

> I don't know what it was, but now I can load opencryptoki as a PKCS#11 
> modules in my systems. I've tried with the software token, TPM token and 
> the ICA token. Loaded the modules with modutil and generated key 
> pairs/certificates/cert requests using certutil. I was also able to load 
> them using Firefox 3.5.2.

Woo Hoo!  Congratulations!

> Note that "some" NSS versions will require the following patch to 
> opencryptoki in order to work:
> http://permalink.gmane.org/gmane.comp.encryption.opencryptoki.tech/2
> (but I was able to use the distro version shipped with Fedora11 without 
> problems - don't know exactly why atm)

I think you can assume that ALL NSS versions will require that opencryptoki
be patched with that patch.

> I'm still looking for a way to test NSS while offloading crypto 
> operations to opencryptoki though.

NSS's PKCS#11 module configuration file "secmod.db" contains information
telling NSS which module to use by default for operations that have no
affinity to any existing token/slot by virtue of location of existing keys
or other objects.  You can set these "default" flags using the "modutil"
program.  I suggest you try that with your RSA public key ops first, and
see what happens.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to