On Mon, Jul 7, 2008 at 6:40 AM, avih <[EMAIL PROTECTED]> wrote:
>
> 2. Use NSS pkcs11 test tools (preferably pre-compiled for win32) for
> testing compliancy of our implementation with Firefox. I know this isn't
> a formal compliancy test, but it would be a good start. I saw several
> threads on this subject, but thus far, none was explicit enough as for
> the procedures one should use to achieve that goal. also, in conjunction
> with my 1st question, can this compliancy test be used with the above
> mentioned soft-token+pkcs11 implementation?

The NSS PKCS #11 compliance test suite
(http://www.mozilla.org/projects/security/pki/pkcs11/netscape/)
is not usable right now for two reasons:
1. It is out of date, and no longer reflects how the Mozilla clients
(Firefox, Thunderbird, etc.) are using PKCS #11 libraries.
2. It is missing two or three test tools.  We never had the time
to clean up the source code of those test tools and open-source
them.

You can modify the pk11mode.c test program I mentioned
in my previous reply to test your PKCS #11 library.  There is
also a pk11util.c test program that you may be able to use:
http://lxr.mozilla.org/security/source/security/nss/cmd/pk11util/

Wan-Teh
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to