This was obsoleted by ticket 913, which I closed as something too old that
we're not going to do. So closing this.
Having said that (twice, actually), a PKCS11 ENGINE would be a cool thing to
have.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
_
update for openssl 0.9.7d
[EMAIL PROTECTED]
Bull TrustWay
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager
update & bug corrections for the pkcs#11 engine (0.9.7c)
please take care to update the openssl contributions page by this new
patch.
regards
__
OpenSSL Project http://www.openssl.org
Development M
update & bug corrections for the pkcs#11 engine (0.9.6k)
please take care to update the openssl contributions page by this new
patch.
regards
__
OpenSSL Project http://www.openssl.org
Development M
And oh, it might be interesting to port this to use the new STORE type
in 0.9.8-dev, which supports key generation...
[levitte - Thu Jun 12 03:27:57 2003]:
> I've added the two latest contributions to
> http://www.openssl.org/contrib/.
--
Richard Levitte
[EMAIL PROTECTED]
I've added the two latest contributions to
http://www.openssl.org/contrib/.
--
Richard Levitte
[EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List
__
> [EMAIL PROTECTED]
> Bull TrustWay R&D, France
> http://www.servers.bull.com/trustway
>
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Hello Richard,
> Richard Levitte via RT wrote:
>
> It's unfortunate that cryptoki.h is GPLd, or I would put it in our
contribution area.
>
> GPL is not compatible with the OpenSSL license. Is it possible to
get a
different cryptoki.h?
I got the original cryptoki.h which is not GPLd from RSA
This is the last patch which implement a PKCS#11 engine in openssl
0.9.7.
It has been tested with openssl commands, secure apache web server
1.3.27 + mod_ssl 2.8.12 and openca 0.9.0 on Linux with a CC2000 Bull
TrustWay cryptographic card offering PKCS#11 interface.
Openssl commands tests have b
The new patch for pkcs#11 engine on openssl 0.9.7 delivered today to
RT/openssl corrects compile problem in windows platform.
Thanks to your advice!
Afchine Madjlessi
[EMAIL PROTECTED]
__
OpenSSL Project
The new patch for pkcs#11 engine on openssl 0.9.7 delivered today to
RT/openssl corrects compile problem in windows platform.
Thanks to your advice!
Afchine Madjlessi
[EMAIL PROTECTED]
__
OpenSSL Project
t; <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, December 16, 2002 9:47 AM
Subject: [openssl.org #11] Fw: trustway pkcs11 engine for openssl
>
> It's so nice that someone provided pkcs11 enginge patch.
>
t; <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, December 16, 2002 9:47 AM
Subject: [openssl.org #11] Fw: trustway pkcs11 engine for openssl
>
> It's so nice that someone provided pkcs11 enginge patch.
>
#x27; : return code '0x2'
Stop.
Could anyone fix this problem? Thanks very much...
[guest - Fri Dec 13 15:23:00 2002]:
> Here you have the patch for pkcs11 engine for openssl 0.9.7 beta5
> This engine has been tested with apache 1.3.27 mod_ssl 2.8.12 and the
> CC2000 Bull Tr
figure VC-WIN32 => OK
2. ms\do_ms
3. nmake -f ms\ntdll.mak
[guest - Fri Dec 13 15:23:00 2002]:
> Here you have the patch for pkcs11 engine for openssl 0.9.7 beta5
> This engine has been tested with apache 1.3.27 mod_ssl 2.8.12 and the
> CC2000 Bull TrustWay hardware. If needed, I
here is the patch for mod_ssl
Afchine Madjlessi
__
[EMAIL PROTECTED]
Bull TrustWay R&D
http://www.servers.bull.com/trustway
__
OpenSSL Project http://www.openssl
Here you have the patch for pkcs11 engine for openssl 0.9.7 beta5
This engine has been tested with apache 1.3.27 mod_ssl 2.8.12 and the
CC2000 Bull TrustWay hardware. If needed, I can provide also the patch
to use with mod_ssl and some tools to create and sign certificate
requests.
In this new
Please find attached the patch file for pkcs11 engine for openssl-
engine-0.9.6h.
I will post the patch for openssl-0.9.7-beta5 in a separate mail.
Afchine Madjlessi
__
[EMAIL PROTECTED]
Bull TrustWay R&D
http://www.servers.bull.com/trus
You can find attached the Bull Trustway PKCS#11 patch for openssl-
engine-0.9.6g.
Afchine Madjlessi
__
[EMAIL PROTECTED]
Bull - Trustway R&D - Networking & Security
http://www.servers.bull.com/trustway
_
I've made some improvements in the Bull trustway pkcs#11 engine to be
more generic.
In this release, PKCS#11 functions are called through the functions
list rather than specific calls directly to PKCS#11 functions. So it
is possible to point it to any PKCS#11 shared library renamed
libpkcs11.
Hi there,
Just a couple of thoughts on this ticket [#11]..
[[EMAIL PROTECTED] - Thu May 30 17:39:08 2002]:
> "Richard Levitte via RT" <[EMAIL PROTECTED]> writes:
>
> > 1. could this engine be considered a general PKCS#11 engine, or are
> > there specific ties to Trustway. I'd prefer to see a
>
> "Richard Levitte via RT" <[EMAIL PROTECTED]> wrote:
> > 2. Those extra functions in the RSA method, are they really needed?
> > I understand that they provide a lot of automagic things, but then
> > it should be added in the ENGINE framework as something that would
> > be potentially available
Zoran,
could you please send me source code of Eracom
PKCS11 engine for openssl?
regards
__[EMAIL PROTECTED]Bull
Technologies -Trustway R&D - Networking & Securityhttp://www.servers.bull.com/trustway
- Original Message -
From:
"Steven Bade" <[EMAIL PROTECTED]> wrote
> We generate all keys within our "tokens" Some tokens such as the
> 4758 keep all the token objects within the secure boundary, and rely on
> the proper PKCS#11 attributes to control selection, keys generated stay
> within the FIPS4 boundary. Others
>> "Steven Bade <[EMAIL PROTECTED]>
>> I'm not sure about the second question, but we found that the eracom
>> engine submission was much more generic. When one of my co-workers
>> tried to get our PKCS#11 libraries (openCryptoki) used by the Trustway
>> module there were many issues, as well as
We generate all keys within our "tokens" Some tokens such as the
4758 keep all the token objects within the secure boundary, and rely on
the proper PKCS#11 attributes to control selection, keys generated stay
within the FIPS4 boundary. Others which are accelerators, still use the
PKCS#11
"Steven Bade" <[EMAIL PROTECTED]> writes:
> I'm not sure about the second question, but we found that the eracom
> engine submission was much more generic. When one of my co-workers
> tried to get our PKCS#11 libraries (openCryptoki) used by the Trustway
> module there were many issues, as wel
"Richard Levitte via RT" <[EMAIL PROTECTED]> writes:
>
> I've just started looking at this, and I've got a couple of
> questions:
>
> 1. could this engine be considered a general PKCS#11 engine, or are
> there specific ties to Trustway. I'd prefer to see a general
> PKCS#11 engine.
>
This engi
"Richard Levitte via RT" <[EMAIL PROTECTED]> writes:
>
> I've just started looking at this, and I've got a couple of
> questions:
>
> 1. could this engine be considered a general PKCS#11 engine, or are
> there specific ties to Trustway. I'd prefer to see a general
> PKCS#11 engine.
>
This engin
In message <[EMAIL PROTECTED]> on Thu, 30 May 2002 08:01:55 -0500,
Steven Bade <[EMAIL PROTECTED]> said:
sbade> I'm not sure about the second question, but we found that the eracom
sbade> engine submission was much more generic. When one of my co-workers
sbade> tried to get our PKCS#11 libra
I'm not sure about the second question, but we found that the eracom
engine submission was much more generic. When one of my co-workers
tried to get our PKCS#11 libraries (openCryptoki) used by the Trustway
module there were many issues, as well as specific calls directly to
PKCs#11 function
I've just started looking at this, and I've got a couple of
questions:
1. could this engine be considered a general PKCS#11 engine, or are
there specific ties to Trustway. I'd prefer to see a general
PKCS#11 engine.
2. Those extra functions in the RSA method, are they really needed?
I und
Based on openssl-engine-0.9.6c, we have developed a new engine which
allowsopenssl applications and Apache-mod_ssl servers to use through a
PKCS#11interface the security functions provided by the Bull trustway cc2000
cryptographiccard, taking advantage of key storage in secure memory and
acc
33 matches
Mail list logo