Nelson B Bolyard wrote:
On 2009-07-19 13:43 PDT, Anders Rundgren wrote:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp815.pdf
I hope this document describes this correctly. If so, it verifies my guess
that NSS does use any operating-system tricks to protect soft keys.
NSS
list dev-tech-crypto@lists.mozilla.org
Sent: Thursday, July 16, 2009 09:28
Subject: Clarification of NSS's soft token key protection scheme
Would it be possible to get a description of this?
Cheers,
Anders
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org
On 2009-07-19 13:43 PDT, Anders Rundgren wrote:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp815.pdf
I hope this document describes this correctly. If so, it verifies my guess
that NSS does use any operating-system tricks to protect soft keys.
NSS does NOT use any
Would it be possible to get a description of this?
Cheers,
Anders
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
4 matches
Mail list logo