Look at the the SCA 6000 user's guide - configuring apache is documented.

http://docs.sun.com/app/docs/prod/accel.600.brd?l=en&a=view

-gary

On 08/19/09 09:16, Gary.Morton at Sun.COM wrote:
> It looks like you are configured to use softtoken so the rsa private 
> requests are handled there rather than the sca6000
> 
> -gary
> 
> 
> 
> On 08/19/09 07:34, Rishi Renjith wrote:
>> Hello, I tried creating a NSS database, linking it with crypto card 
>> and connecting using apache mod_nss. Everything works fine, except 
>> that the *rsaprivate *jobs are not getting increased in the kstat of 
>> the card.
>> This is what I did.
>> *bash-3.00# cd ../nssdb* *bash-3.00# rm ** *bash-3.00# certutil -N -d 
>> .* Enter a password which will be used to encrypt your keys. The 
>> password should be at least 8 characters long, and should contain at 
>> least one non-alphabetic character.
>> Enter new password: Re-enter password: * *
>> *bash-3.00# ls* cert8.db   key3.db    secmod.db *bash-3.00# chmod 777 
>> ** *bash-3.00# modutil -dbdir . -nocertdb -force -add "Sun Crypto 
>> Accelerator" -libfile /usr/lib/libpkcs11.so -mechanisms 
>> RSA:DSA:RC4:DES* Module "Sun Crypto Accelerator" added to database. 
>> *bash-3.00# modutil -list -dbdir . * Listing of PKCS #11 Modules 
>> -----------------------------------------------------------   1. NSS 
>> Internal PKCS #11 Module          slots: 2 slots attached         
>> status: loaded
>>          slot: NSS Internal Cryptographic Services         token: NSS 
>> Generic Crypto Services
>>          slot: NSS User Private Key and Certificate Services         
>> token: NSS Certificate DB
>>   2. Sun Crypto Accelerator         library name: 
>> /usr/lib/libpkcs11.so          slots: 2 slots attached         status: 
>> loaded
>>          slot: Sun Metaslot         token: Sun Metaslot
>>          slot: Sun Crypto Softtoken         token: Sun Software 
>> PKCS#11 softtoken 
>> ----------------------------------------------------------- 
>> *bash-3.00# certutil -S -x -n "cert309" -t "u,u,u" -k rsa -g 1024 -v 
>> 120 -s "cn=nobody,ou=Org,o=Sun,L=Santa Clara,ST=California,C=US" -d . 
>> -h "Sun Metaslot"* *Enter Password or Pin for "Sun Metaslot":*
>> A random seed must be generated that will be used in the creation of 
>> your key.  One of the easiest ways to create a random seed is to use 
>> the timing of keystrokes on a keyboard.
>> To begin, type keys on the keyboard until this progress meter is 
>> full.  DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD!
>> Continue typing until the progress meter is full:
>> |************************************************************|
>> Finished.  Press enter to continue:
>> Generating key.  This may take a few moments...
>> Enter Password or Pin for "Sun Software PKCS#11 softtoken":
>> *bash-3.00# certutil -K -d .* certutil: Checking token "NSS 
>> Certificate DB" in slot "NSS User Private Key and Certificate 
>> Services" Enter Password or Pin for "NSS Certificate DB": certutil: no 
>> keys found *bash-3.00# certutil -K -d . -h "Sun Software PKCS#11 
>> softtoken"* certutil: Checking token "Sun Software PKCS#11 softtoken" 
>> in slot "Sun Crypto Softtoken" Enter Password or Pin for "Sun Software 
>> PKCS#11 softtoken": certutil: no keys found *bash-3.00# certutil -K -d 
>> . -h "Sun Metaslot"* certutil: Checking token "Sun Metaslot" in slot 
>> "Sun Metaslot" Enter Password or Pin for "Sun Metaslot": < 0> rsa      
>> 204a23dbb2e82d7d8c1495e3374dcd4462423e4c   Sun Metaslot:cert309 < 1> 
>> rsa      54ea6d93df1cfef13064aedc6f6c7f0dce34e7b6   Sun 
>> Metaslot:cert147 < 2> rsa      
>> 34d4a4974cf325e735dd23bb3a6b4680249f3550   (orphan) < 3> rsa      
>> 2018eecb4c05eb25cd30be4de6f13ccaeadcb43d   Sun Metaslot:cert1151 < 4> 
>> rsa      61932a2d796fd8f6e82949059176e980cde5c55a   sanCert < 5> 
>> rsa      4e752a9b4a76c1462d9aec76de1617e08d07ff42   Sun 
>> Metaslot:ismc_cert
>> *bash-3.00# certutil -L -d .*
>> Certificate Nickname                                         Trust 
>> Attributes
>> SSL,S/MIME,JAR/XPI
>> *bash-3.00# certutil -L -d . -h "Sun Software PKCS#11 softtoken"*
>> Certificate Nickname                                         Trust 
>> Attributes
>> SSL,S/MIME,JAR/XPI
>> Enter Password or Pin for "Sun Software PKCS#11 softtoken": 
>> *bash-3.00# certutil -L -d . -h "Sun Metaslot"*
>> Certificate Nickname                                         Trust 
>> Attributes
>> SSL,S/MIME,JAR/XPI
>> Enter Password or Pin for "Sun Metaslot": Sun 
>> Metaslot:cert309                                         u,u,u Sun 
>> Metaslot:cert147                                         u,u,u Sun 
>> Metaslot:cert1151                                        u,u,u Sun 
>> Metaslot:sanCert                                         u,u,u Sun 
>> Metaslot:CACERT CA                                       ,, Sun 
>> Metaslot:ismc_cert                                       u,u,u
>> * modutil -disable "NSS Internal PKCS #11 Module"  -dbdir .*
>> WARNING: Performing this operation while the browser is running could 
>> cause corruption of your security databases. If the browser is 
>> currently running, you should exit browser before continuing this 
>> operation. Type 'q <enter>' to abort, or <enter> to continue:
>> Slot "NSS Internal Cryptographic Services" disabled. Slot "NSS User 
>> Private Key and Certificate Services" disabled.
>> *bash-3.00# modutil -enable "Sun Crypto Accelerator"  -dbdir .*
>> WARNING: Performing this operation while the browser is running could 
>> cause corruption of your security databases. If the browser is 
>> currently running, you should exit browser before continuing this 
>> operation. Type 'q <enter>' to abort, or <enter> to continue:
>> Slot "Sun Metaslot" enabled. Slot "Sun Crypto Softtoken" enabled.
>> --------------------------------------------------------------------------- 
>> -----------------------------------------------------------------------
>> Now when I check the kstat for each connection, the rsaprivate is not 
>> getting increased, only aesjobs are increased.  also tried this test. 
>> *cryptoadm disable provider=mca/0 mechanism=all*
>> In this case, the handshake fails.
>> But..., if i disable only RSA in the card, cryptoadm disable 
>> provider=mca/0 mechanism=<all RSA mechanisms> *it works, which means 
>> that the card is currently used for AES jobs and RSA joba are done at 
>> the software level. *
>>
>>
>> The cyrptoadm output is as below, which indicates the card is 
>> configured properly.
>> bash-3.00# cryptoadm list
>> User-level providers: Provider: 
>> /usr/lib/security/$ISA/pkcs11_kernel.so Provider: 
>> /usr/lib/security/$ISA/pkcs11_softtoken_extra.so
>> Kernel software providers:         des         aes256         
>> arcfour2048         blowfish448         sha1         sha2         md5 
>>         swrand
>> Kernel hardware providers:         mca/0
>>
>>
>> Please suggest.
>>
>>
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> crypto-discuss mailing list
>> crypto-discuss at opensolaris.org
>> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss
> 
> _______________________________________________
> crypto-discuss mailing list
> crypto-discuss at opensolaris.org
> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss


Reply via email to