hi Alon,
Sorry that I make you be confused. 

On Nov 10, 2011, at 1:20 PM, Alon Bar-Lev wrote:

> On Thu, Nov 10, 2011 at 2:08 PM, weizhong qiang <weizhongqi...@gmail.com> 
> wrote:
>>> OpenSSL is fully compatible with this approach, having RSA object that
>>> can be used for crypto operation without actually having the private
>>> key. This is done via the concept of "engine" which delegate the
>>> crypto calls to the hardware device.
>> 
>> Should I installed the "engine_pkcs11" to get the nss softoken work?
>> 
> 
> Hmmm..... What EXACTLY are you trying to do?

I need to use the credential in smart card to generate a proxy credential 
(which will not be inside the softoken) for the use case of Grid computing.  
(see RFC 3820 for the definition of proxy certificate)
The current solution in Grid use case is that: the EEC credential is located as 
two files (e.g., usercert.pem, userkey.pem). We need to replace it because the 
smart card storage provide more security.

Now we choose nss softoken rather than hardware smart card, because of two 
reasons:
1, in the development stage, we would choose nss softoken, because it provide 
the same interface as hardware device.
2, in the applications other than Grid, such as web applications, nss softoken 
is more general to be used. So we would like users switch from existing web 
applications to Grid, without the need to manage the two files: usercert.pem 
and userkey.pem


> Why do you use the NSS soft token and access it via OpenSSL?

Our current code (such as the proxy credential generation, TLS communication, 
etc.) is based on OpenSSL. So for the purpose of minimizing the development 
effort, we still need to use OpenSSL.
The reason why I asked how to retrieve private key out, is because with the 
X509 and private key out, I can reuse the current code to generating proxy 
certificate. 

> Either stick with NSS or use OpenSSL.
> Where is the hardware device?

There is no hardware currently. But I thought if my code can contact with nss 
softoken, it can also contact with hardware device, because of the pkcs11 
standard.


> Which component's PKCS#11 are you trying to access?

Currently only nss softoken. 

Thanks 
Weizhong Qiang

> 
>>> Try to perform private key operation using the RSA object and see that it 
>>> works.
>> 
>> Do you mean that I should use RSA_sign instead of X509_sign?
>> 
> 
> Again,
> I am totally confused from the partial information you present.
> So I cannot know what is best for you, and even why you are using
> pkcs11-helper, as if I understand correctly you do not have hardware
> device at all.
> 
> Alon.

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to