On Thu, Nov 16, 2006 at 01:32:43PM +0100, Jesus Luna wrote:
> This HSM in particular (RealSec's CryptoSec at
> http://www.realsec.com/esp/servicios/cifrado.html) does not store
> private keys, it's only a crypto-accelerator.

I don't speak spanish but from the datasheet it looks to me like a
tamper-resistant generic computing platform. ARM7TDMI with RSA and
DES co-processors and 128Kb memory that is erased on intrusion.

A PKCS#11 token contains the key, as previously stated. This product
could certainly be a very powerful PKCS#11 token but it depends on
what software the ARM7 is running. I assume whoever buys the
Cryptosec can decide for themselves what it should run and possibly
also develop their own code for it.


> I've begun analyzing the pkcs11_engine's code and so far I see that
> in file p11_ops.c (from underlying libp11 project) does not
> implement the PKCS11_private_encrypt function. Even though it
> implements a PKCS11_sign function, my belief is that OpenSSL's RSA
> signature callout directly invokes the hash/encrypt methods, so the
> error code when executing the signed OCSP Request. Note that the
> same may be happening when executing OpenSSL's 'rsautl' which is
> the ticket still open at OpenSC project.

You are probably right.

Although it seems that PKCS#11 is a poor fit for your application we
would of course gladly accept a patch fixing the problem in libp11.
:)

Perhaps the best solution is to write an OpenSSL engine that uses the
Cryptosec for RSA? In that case engine_pkcs11 could be useful for
reference.


//Peter
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to