Re[11]: DOMCrypt API developments

2011-06-21 Thread Konstantin Andreev
[combining two cites to save space] On 21.06.11 00:48, Anders Rundgren wrote: We have both come to the conclusion that Firefox et al sucks since just about all serious users need to deploy plugins in order to use their PKIs. On 18.06.11 19:59, Anders Rundgren wrote: [Subject: Update: Brows

Re: Custom asymmetric algorithm for firefox

2011-06-03 Thread Konstantin Andreev
On 01.06.11 10:21, Andrey Melashenko wrote: How can we implement custom (national) asymmetric algorithm for firefox? Do you mean GOST for TLS 1.2 (rfc draft-chudov-cryptopro-cptls) ? -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-

Re[2]: What is the NSS policy for the code refactoring?

2011-05-14 Thread Konstantin Andreev
On 14 May 2011, M.R. wrote: On 13/05/11 12:17, Konstantin Andreev wrote: I see a lot of aspects in the NSS code, which would greatly benefit (readability, maintainability, etc) from a trivial refactoring. Here are a few trivial examples (NSS): -- 123 occurrences of code like | sizeof

What is the NSS policy for the code refactoring?

2011-05-13 Thread Konstantin Andreev
I see a lot of aspects in the NSS code, which would greatly benefit (readability, maintainability, etc) from a trivial refactoring. Here are a few trivial examples (NSS): -- 123 occurrences of code like | sizeof(longUnreadableName)/sizeof(*longUnreadableName) Much more readable:

Re[5]: Public key ciphers in Mozilla

2011-04-18 Thread Konstantin Andreev
Hello, Helge. Any default should be cautiously placed at the appropriate abstraction level. In this particular case, the defaults are the responsibility of the layer, which knows it is working with JavaCard 2.2.2/3.0.1. Looks like NSS is not that one. Let assume NSS applies the defaults below

Re[2]: Extracting PrivateKey from PKCS8EncodedKeySpec with EC

2011-04-13 Thread Konstantin Andreev
Peder, what you encountered is a [bug 327773] http://bugzilla.mozilla.org/show_bug.cgi?id=327773 NSS pk11wrap layer has two functions to create private keys in a token: PK11_ImportEncryptedPrivateKeyInfo and PK11_ImportAndReturnPrivateKey. But only 1st of them supports EC keys. You may try res

Re[2]: How do NSS_3_12 and NSS_3_13 branches get merged ?

2011-04-13 Thread Konstantin Andreev
4.11 22:36, Robert Relyea wrote: On 04/12/2011 04:26 AM, Konstantin Andreev wrote: AFAIK, NSS HEAD is a future 3.13 branch, but most of development is currently focused on NSS_3_12_BRANCH. Could anybody advice, how particular issues/bugs of these two branches are merged ? They are unlikely to

How do NSS_3_12 and NSS_3_13 branches get merged ?

2011-04-12 Thread Konstantin Andreev
AFAIK, NSS HEAD is a future 3.13 branch, but most of development is currently focused on NSS_3_12_BRANCH. Could anybody advice, how particular issues/bugs of these two branches are merged ? That is, - if particular patch occurs in the 3.12, when will it migrate into 3.13 ? Conversely, may par

Re[2]: Public key ciphers in Mozilla

2011-04-12 Thread Konstantin Andreev
On 11.04.11 19:30, Helge Bragstad wrote: Could anybody provide, or point to some info regarding the support for ECDSA in TLS client authentication in Firefox as well as for S/MIME in Thunderbird? (Curves and hash functions being used etc.) Vanilla NSS builds with ECC support turned on (NSS_E

Re[3]: Link error on CERT_AddExtensionByOID

2011-04-10 Thread Konstantin Andreev
Thanks, guess I have to implement a similar function in my code then? Bit of a shame it is not being exported for public consumption. I imagine its usage would be quite common, no? Konstantin Andreev wrote: This is an ancient [bug 294538], six years (sic!) old. CERT_AddExtensionByOID, as many

Re: Link error on CERT_AddExtensionByOID

2011-04-10 Thread Konstantin Andreev
This is an ancient [bug 294538], six years (sic!) old. CERT_AddExtensionByOID, as many other functions, is declared in the public header (here: cert.h), but is not exported by the library. Keep well, Konstantin james07 wrote: I wish to call CERT_AddExtensionByOID() in my application. However

Re: javascript crypto.signText makes Iceweasel crash

2011-04-04 Thread Konstantin Andreev
On 29.03.11 18:10, Marion Vogt wrote: I tried to launch Iceweasel in the debug mode and printed backtrace of all stack frames : #2 0xb7d85b82 in abort () from /lib/i686/cmov/libc.so.6 #3 0xb24a2e7a in SECITEM_CopyItem_stub (arena=0x0, to=0xabd2a5c8, from=0xabd42028) at stubs.c:474 Normal

Re[4]: Hashing function in NSS

2011-03-24 Thread Konstantin Andreev
On 23.03.11 23:32, Crypto User wrote: On Mar 23, 12:05 pm, Honza Bambas wrote: On 3/22/2011 10:29 PM, Crypto User wrote:> Hi , I am trying to create APIS which will provide Hashing functionality to end user. I am using NSS to provide this on Linux. I was trying to find the correct APIs in NS

Re[9]: S/MIME Encryption Certificate without email address

2011-03-23 Thread Konstantin Andreev
On 22.03.11 12:23, Sergei Evdokimov wrote: I think, being able to support encryption or having an option that enables or disables verification of email addresses in certificates would make sense. Here is a hint for you. At the lowest level, NSS doesn't track [email]->[certificate] relations,

Re[8]: S/MIME Encryption Certificate without email address

2011-03-23 Thread Konstantin Andreev
On 22.03.11 21:00, Robert Relyea wrote: On 03/22/2011 02:23 AM, silent...@gmail.com wrote: <...> the requirement is to allow having more than one <...> email provider AFTER the card was issued. <...> Unless there is an authoritative way to bind the cert to a given email address, there is no w

Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync

2010-11-02 Thread Konstantin Andreev
9 cert, signed by bank CA Regards, -- Konstantin Andreev. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re[2]: NSS, P#11 and beyond...

2010-09-13 Thread Konstantin Andreev
whom we have to be in touch as to NSS features coupled with GOST' mechanisms, token switching etc and to be on course for patch upstream of NSS? Frankly speaking this Q is from colleagues of mine from CryptoPRO. I know Konstantin Andreev has been working on this. If you not part of

Re[6]: Using a 'secret' SSL client certificate from Mozilla

2010-09-07 Thread Konstantin Andreev
On 08/28/10 02:36, Michael Smith wrote: Rather than the normal case of a client certificate belonging to the user, and just added to the certificate store, we want to have a certificate that nominally belongs to the application, and is secret from the user (strange, but that's what I'm stuck w

Re[8]: Proposal to remove SSL 2.0 support from NSS trunk (NSS 3.13)

2010-09-07 Thread Konstantin Andreev
On 08/31/10 05:01, Nelson B Bolyard wrote: On 2010/08/30 17:32 PDT, Wan-Teh Chang wrote: I propose that we remove SSL 2.0 support from the NSS trunk (NSS 3.13). [... skip ...] It's something I wanted to do for YEARS, but for as long as I was employed to work on NSS, I was told that continued

Re[6]: PKCS#11 module: C_GetAttributeValue problems

2010-08-13 Thread Konstantin Andreev
On 08/13/10 04:44, Robert Relyea wrote: On Wed, Aug 11, 2010 at 1:18 PM, Matej Kurpel wrote: [ ... skip ... ] Later, thunderbird asks for its attributes CKA_TOKEN and CKA_LABEL but gives zero-sized buffers for both values. ... According to the specification (if I understood correctly), I sho

Re[5]: PKCS#11 module: C_GetAttributeValue problems

2010-08-12 Thread Konstantin Andreev
On 08/12/10 14:26, Matej Kurpel wrote: Dňa 12. 8. 2010 11:03, Konstantin Andreev wrote / napísal(a): On 08/12/10 00:18, Matej Kurpel wrote: [ ... skip ...] Later, thunderbird asks for its attributes CKA_TOKEN and CKA_LABEL but gives zero-sized buffers for both values. This is where my

Re[2]: PKCS#11 module: C_GetAttributeValue problems

2010-08-12 Thread Konstantin Andreev
On 08/12/10 00:18, Matej Kurpel wrote: [ ... skip ...] Later, thunderbird asks for its attributes CKA_TOKEN and CKA_LABEL but gives zero-sized buffers for both values. This is where my problem lies - I don't know what to return and if I have to fill the values in the template or not. Accordin

Re[5]: PKCS#11 header files: license and updating to the newest version

2010-08-06 Thread Konstantin Andreev
On 08/03/10 19:13, Brian Smith wrote: Martin Paljak wrote: At the same time, isn't GCM only present in the latest 2.30 draft? Yes. And, actually, I think I found a problem with the GCM interface that seems to make it impossible to use the PKCS#11 interface in a FIPS-140-compliant manner. In

Re[2]: Should BLAPI maintain binary backward compatibility ?

2010-07-27 Thread Konstantin Andreev
Robert, thank you for detailed answer. I decided how to implement parametrization of hash context creation in freebl`hasht.h`SECHashObject. I chose to add another constructor at the end of SECHashObject. This decision keeps backward compatibility, binary and source-level. -- Konstantin On 07

Should BLAPI maintain binary backward compatibility ?

2010-07-24 Thread Konstantin Andreev
other clients except NSS could use freebl. In this case backward compatibility is a must. Could you, please, advice, either is true ? Is BLAPI/freebl assumed to be used outside of NSS ? -- Konstantin Andreev. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org

Re[5]: Passing random numbers between tokens - what FIPS thinks ?

2010-07-22 Thread Konstantin Andreev
ompliance would be if softoken was FIPS certified together with that hardware RNG. That hardware RNG would be considered inside of the softoken's perimeter. Hmm... but why together ? May certification state: Plugging in any FIPS-certified hardware RNG keeps softoken+RNG FIPS-compliant ? Rega

Re[2]: Passing random numbers between tokens - what FIPS thinks ?

2010-07-19 Thread Konstantin Andreev
ggregate device ? Application --(sign_req)--> Mozilla softoken --(C_GenerateRandom)--> hardware RNG Best regards, -- Konstantin Andreev. On 07/18/10 03:13, Nelson B Bolyard wrote: On 2010-07-12 02:18 PDT, Konstantin Andreev wrote: Hello. I am asking in this newsgroup, because I b

Passing random numbers between tokens - what FIPS thinks ?

2010-07-12 Thread Konstantin Andreev
n own random to ECC signature mechanism. -- Konstantin Andreev -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

C_EncryptUpdate( inlen != N * blksize ) for CBC, ECB cipher modes.

2010-06-22 Thread Konstantin Andreev
return CKR_DATA_LEN_RANGE when CBC/ECB ciphers are updated with odd length. I wonder, are any chances for this aspect of NSS softoken to be more PKCS#11 compliant in the near future ? Best regards, -- Konstantin Andreev. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://

Re[2]: NSS - signing with MAC

2010-06-01 Thread Konstantin Andreev
Not a policy issue I suppose... Some days ago I have found that: No one block cipher MAC'ing mechanism is working in either current release or trunc NSS, in either mode. I've already investigated the issue and about to file a bug this or next day. -- Konstantin Andreev. On 06/0

Re: List/remove cached S/MIME capabilities

2010-02-18 Thread Konstantin Andreev
y compromise. * we shouldn't confuse user. "Securing mail" should just work w/o exposing these gory details. You can find relevant discussions in other newsgroups, not this one. Best regards, -- Konstantin Andreev. On 18.02.10 14:06, Michael Ströder wrote: I'm using Seamonkey 2

Re[2]: NSS Tools Library

2010-01-21 Thread Konstantin Andreev
o invest a resources into the design and development of such kind of library. Best regards, -- Konstantin Andreev -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: ECC DER Signing

2010-01-19 Thread Konstantin Andreev
my 5 cents. Recently I made a proposal: let "Basic ECC" pose a restriction on "softoken" only, but not on NSS as a whole. Best regards, -- Konstantin Andreev -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: ECC DER Signing

2010-01-19 Thread Konstantin Andreev
on 1.2.28.2, tag NSS_3_11_1_RTM in mozilla CVS. Attached. -- Konstantin Andreev. /* * * BEGIN LICENSE BLOCK * * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this f

Re[2]: S/MIME in Thunderbird

2009-12-25 Thread Konstantin Andreev
for Dogtag. I CC'ed you on the NSS RFE. https://bugzilla.mozilla.org/show_bug.cgi?id=502139 This enhancement will be useless until Mozilla/"MailNews Core" attends these capabilities. Given that TB security enhancements are stalled for years, I wouldn't rely on this. Best regard

Re[2]: Looks like ECC sign/verify has a bug.

2009-12-18 Thread Konstantin Andreev
if no one else does. On 2009-Dec-18, at 10:51 PM, Konstantin Andreev wrote: I have noticed, the following method is used in the ECC sign/verify routines to derive 'e' integer from a digest: ( begin cite ) /* In the definition of EC signing, digests are truncated * t

Looks like ECC sign/verify has a bug.

2009-12-18 Thread Konstantin Andreev
. For most curves they are the identical, not not for all. This looks like a bug for me. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re[4]: Should I use SECITEM_AllocItem or PORT_Arena{,Z}Alloc memory allocation ?

2009-12-18 Thread Konstantin Andreev
Hello, Nelson. Thank you again for detailed description. This is a valuable piece of information. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC On Fri, 18 Dec 2009, Nelson B Bolyard wrote: On 2009-12-17 13:39 PST, Konstantin Andreev wrote: On Tue, 17 Dec 2009, Nelson B

Re[2]: Should I use SECITEM_AllocItem or PORT_Arena{, Z}Alloc memory allocation ?

2009-12-17 Thread Konstantin Andreev
Hello, Nelson. Thank you for your response. On Tue, 17 Dec 2009, Nelson B Bolyard wrote: On 2009-12-16 03:01 PST, Konstantin Andreev wrote: I see NSS code uses SECITEM_AllocItem() and PORT_Arena{,Z}Alloc() memory allocation routines almost interchangeably. Yes, almost. I see that

Should I use SECITEM_AllocItem or PORT_Arena{, Z}Alloc memory allocation ?

2009-12-16 Thread Konstantin Andreev
outine (SECITEM_AllocItem or PORT_Arena{,Z}Alloc) should I use for my particular code ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Does softoken/(NS)C_Sign conform PKCS#11?

2009-12-14 Thread Konstantin Andreev
ty/nss/lib/pk11wrap/pk11obj.c&rev=1.21&mark=536-538#510]. Are there strong reasons for this incompatibility, and should this be changed to conformant behavior ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.or

Re[2]: how is it possible to choose a cipher for SMIME ?

2009-12-11 Thread Konstantin Andreev
capabilities lists included in messages received from the recipient, as well as out-of-band information such as private agreements, user preferences, legal restrictions, and so on. It could be a great enhancement if Thunderbird could allow to user-override the automated cipher selection. Best re

Re: Question about NSS initialization for using SHA_256 in my library

2009-12-10 Thread Konstantin Andreev
need only crypto-primitives (like digesting, encryption, signing/verification), you ought better use NSS PKCS#11 module (softoken), without loading the whole NSS stack. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto

Where to compile ECC support conditionally (NSS_ENABLE_ECC) ?

2009-12-02 Thread Konstantin Andreev
ithm is also ECC-dependent, and I must decide, which parts of GOST-specific code should be compiled conditionally, and which shouldn't. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re[4]: Default {cert8, key3} db internals: lg_GetPublicKey()->nsslowkey_ConvertToPublicKey()

2009-11-13 Thread Konstantin Andreev
d attentive until stock FF and TB will migrate to sqlite NSS backend. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re[2]: Details of saving pkcs#11 attribs to the default {cert8, key3} database.

2009-10-28 Thread Konstantin Andreev
Hello, Robert. On Wed, 28 Oct 2009, Robert Relyea wrote: On 10/28/2009 02:25 AM, Konstantin Andreev wrote: It looks somewhat strange how default (so-called legacydb) database allows upper layer (softoken) to manipulate key's attributes. Yes, the mapping between what the database could

Re[2]: Default {cert8, key3} db internals: lg_GetPublicKey()->nsslowkey_ConvertToPublicKey()

2009-10-28 Thread Konstantin Andreev
age format for GOST keys, incompatible with PKCS#8 PrivateKeyInfo. This is much more patching of legacydb code. Could you advice, please ? Unfortunately the latter <...> Based on investigation above, I suppose, I can just use public key from RecordKey (available at LGObjectCache.dbKey)

Details of saving pkcs#11 attribs to the default {cert8, key3} database.

2009-10-28 Thread Konstantin Andreev
es of DSA, ECC, DH, etc. keys. Could you, please, advice, how this code was designed, and how legacydb *should* grant access to key's attributes ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.m

Default {cert8, key3} db internals: lg_GetPublicKey()->nsslowkey_ConvertToPublicKey()

2009-10-26 Thread Konstantin Andreev
priv.key lookup from lg_GetPublicKey() -- invent my own storage format for GOST keys, incompatible with PKCS#8 PrivateKeyInfo. This is much more patching of legacydb code. Could you advice, please ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-c

Re[4]: How should I handle CKA_NETSCAPE_DB for GOST private keys ?

2009-10-07 Thread Konstantin Andreev
On Tue, 07 Oct 2009, Robert Relyea wrote: On 10/06/2009 01:14 AM, Konstantin Andreev wrote: On Mon, 05 Oct 2009, Robert Relyea wrote: On 10/05/2009 09:27 AM, Konstantin Andreev wrote: Could you, please, advice, how should I handle CKA_NETSCAPE_DB for GOST private keys ? GOST private key

Re[4]: Decoding DER: can I save tag-length prefixes in decoded items?

2009-10-07 Thread Konstantin Andreev
On Wed, 07 Oct 2009, Wan-Teh Chang wrote: On Wed, Oct 7, 2009 at 4:09 AM, Konstantin Andreev wrote: I've checked this. SEC_ASN1_ANY saves tag-length prefix, but ignores tag number, thus matches anything. If SEC_ASN1_ANY doesn't work for you, the only solution I have is to re-e

Re[2]: Decoding DER: can I save tag-length prefixes in decoded items?

2009-10-07 Thread Konstantin Andreev
On Tue, 06 Oct 2009, Wan-Teh Chang wrote: On Tue, Oct 6, 2009 at 3:04 AM, Konstantin Andreev wrote: One more question about decoding DER structures. Some PKCS#11 mechanisms (namely, CKM_GOSTR3410 ) accept DER-encoded parameters, which include DER tag-length prefix. I dissect these

Decoding DER: can I save tag-length prefixes in decoded items?

2009-10-06 Thread Konstantin Andreev
I save DER tag-length in item safely ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re[2]: Which way to decode DER ASN1 CHOICE ?

2009-10-06 Thread Konstantin Andreev
Hello, Nelson. On Mon, 10 Oct 2009, Nelson B Bolyard wrote: On 2009-10-05 02:20 PDT, Konstantin Andreev wrote: I need to decode some DER-encoded ASN1 CHOICE, but I can't manage this in a reasonable way. FYI, the documentation on NSS's ASN.1 encoder and its two decoders i

Re[2]: How should I handle CKA_NETSCAPE_DB for GOST private keys ?

2009-10-06 Thread Konstantin Andreev
Hello, Robert. On Mon, 10 Oct 2009, Robert Relyea wrote: On 10/05/2009 09:27 AM, Konstantin Andreev wrote: In the source code of the "softoken" library I see various conditional manipulations with CKA_NETSCAPE_DB attribute of private keys. Since I am adding a new (GOST) type of p

How should I handle CKA_NETSCAPE_DB for GOST private keys ?

2009-10-05 Thread Konstantin Andreev
;t found enough information about the intended use of CKA_NETSCAPE_DB in neither MDC nor bugzilla. Could you, please, advice, how should I handle CKA_NETSCAPE_DB for GOST private keys ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list

Which way to decode DER ASN1 CHOICE ?

2009-10-05 Thread Konstantin Andreev
ld you, please, advice, how can I decode CHOICE more reasonable than shown above ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re[2]: security/nss/lib/nss/utilwrap.c and USE_UTIL_DIRECTLY

2009-10-02 Thread Konstantin Andreev
Thank you for explanation. Best regards, Konstantin Andreev Wan-Teh Chang wrote: On Thu, Oct 1, 2009 at 8:49 AM, Konstantin Andreev wrote: I have a couple of related questions. 1) If I am adding a function into the "util" library, should I care about placing a wrapper in the &

security/nss/lib/nss/utilwrap.c and USE_UTIL_DIRECTLY

2009-10-01 Thread Konstantin Andreev
"softokn" is using *_Util. Turning USE_UTIL_DIRECTLY off will cause dependency of "softokn" from "nss" lib. I have read bug 286642 discussion, but it doesn't make things clearer. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech

Re[3]: Mere curiosity: what BL in free(bl), (bl)api{,t}.h means ?

2009-09-29 Thread Konstantin Andreev
g/projects/security/pki/nss/nss-guidelines.html. Thank you, Kaspar. That is what I was looking for. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Mere curiosity: what BL in free(bl), (bl)api{,t}.h means ?

2009-09-29 Thread Konstantin Andreev
This acronym (BL) provokes my curiosity. After some reading of the NSS sources I still have no idea what it means. I believe this is something inherited from netscape. Can anybody bate my curiosity ? Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing

Re[2]: How to share code between softoken and nss libs?

2009-09-29 Thread Konstantin Andreev
Hello. On Mon, Sep 28, Wan-Teh Chang wrote: On Mon, Sep 28, 2009 at 3:26 AM, Konstantin Andreev wrote: I need to share some potion of code between softoken and nss libraries (to be exact, I need to parse GOST-specific der-encoded data). What is the best way to manage this ? I suppose I need

How to share code between softoken and nss libs?

2009-09-28 Thread Konstantin Andreev
source tree is best to store such shared source ? Please, direct me. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

ECC signing code.

2009-09-28 Thread Konstantin Andreev
wrong in disabling ECC signing only at softoken level ? This will allow using of stock NSS builds with 3rd party ECC-enabled PKCS#11 tokens. Best regards, -- Konstantin Andreev, software engineer. Swemel JSC. Here are some relevant discussions: * Only require NSS_ENABLE_ECC to allow signing data

Re[5]: Complete chaos in the FreeBL *hash*_End() semantics.

2009-09-17 Thread Konstantin Andreev
Thank you for explanation, Robert. Things get clear. Best regards, -- Konstantin Andreev. Robert Relyea wrote: [ ... SKIP ... ] The function signature *hash*_End( , , unsigned *digestLen, unsigned maxDigestLen ) [ ... SKIP ... ] My point is you can implement this API is you want. it will