thanks a lot, now that you explain it again that clearly, I can see the difference. Somehow, I had in mind that those "crypting-objects" are wire-hard-coded, that the soft-toks just emulates some hardware, and that you just could forward your requests to that hard-coded logic, and get some answer. I didn't see that those algorithms could also be instances/objects that do something, that you could use like instances in the application code itself. I think I didn't figure that the tokens themselves are oop-things. But that's great.

The tpm I use, as long as I know, as no crypto-instances or almost none. Or calls to them aren't implemented in TrouSerS. That's something I read when I installed opencryptoki and the tpm-kernelmodule.

I'll have to look at SDR again. Since I don't exactly understand how the soft-token in NSS is implemented, I hope SDR doesn't make calls to that token to encrypt, like if it was a crypto-device like you just explained. It's true that I haven't been deep enough to find the DES altorithm itself, in SDR. I hope it's somewhere in a library, not inside a token. Otherwise, if I take the key from another token, but use the soft-tok to encrypt, that's like if I used 2 different tokens and mixed up the key from one with the functions of the other. Would not be a great thing...

thanks!
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to