Martin Paljak wrote: > Hello, > > On Sep 15, 2010, at 11:08 AM, Viktor TARASOV wrote: > >> Andreas Jellinghaus wrote: >> >>> I got very bad results with OpenSSL 1.0.0 (and 1.0.0a) on Windows in Server >>> Environment: stability issues that couldn't be tracked down. The same code >>> works well with 0.9.8o. >>> >>> So maybe you too want to go back to the last 0.9.8* release, until OpenSSL >>> releases a stable 1.0.* version? >>> >>> (I saw the changes for the build project using openssl 1.0.0a now...) >>> >>> >> Not quite related to the topic. >> >> Afaiu, in OpenSSL 1.0.0 it's possible to generate the RSA key with an >> engine using the command line tools, >> there is no such possibility in the 0.9.x versions. >> > OpenSSL 1.0.0 had some ASM optimization problems [1] (which, of course, is > enabled by all distro packages). For seldom-happening single operations > (verification, decryption, digest calculation) I think the instability > problem is not that apparent. Also, the heavyweight operation is always > happening on a quite slow smart card, we don't need to enable any ASM > optimizations (need to check how OpenSSL is built with mingw) > > > >> From your point of view, is it worth to implement the 'key_gen' >> facility in OpenSC engine_pkcs11 & libp11 ? >> > Why not. > > At the same time I don't think OpenSSL is used that much for generic key > management (Yet Another OpenSSL CA script-fu does not count) and enrollment, > or if it is best tool for this. > Key generation, even if generated for short periods and re-generated often, > is a quite special use case. Key generation, CSR generation and certificate > generation in a single application in one go is IMHO not a good idea nor a > often used feature. > > > >> The same about implementing the engine's 'store_meth'. >> Afaiu, in this case OpenSSL can be used to list/store/delete >> certificates, data, ... on the card, and probably more. >> (For a moment I do not see how to access the engine's 'store' with the >> OpenSSL tools.) >> > Last time I checked (about a year ago?) the store interface was not complete. > But it would be a nice thing to have and change the current engine control to > the generic store interface. > >> I have in mind the unique family of tools to perform all card enrollment >> operations. >> (Actually, when doing decentralized enrollment: >> key is generated with OpenSC, P10 is signed with OpenSSL, certificate is >> imported with OpenSC.) >> > > I think OpenSSL support is important to the level that OpenSSL based > applications can access keys (and certificates) on the card (or in any other > PKCS#11 hardware) and most importantly, can use the keys for SSL/TLS, what > should be the main purpose of OpenSSL. > > It would not hurt to have engine_pkcs11 as full-featured as possible, but I > would not promote OpenSSL [2] as "the API" for smart card personalization or > hardware key generation. > > [1] http://www.opensc-project.org/opensc/browser/trunk/src/libopensc/sc.c#L696 > [2] http://www.peereboom.us/assl/assl/html/openssl.html >
Thanks, I see. This question was because of suddenly discovered evidence: without intermediary of NSS the tools from different families are needed to perform card enrollment. -- Viktor Tarasov <viktor.tara...@opentrust.com> _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel