Thank you both for your responses.  Yes, you are correct.  I've compiled NSS
with "NSS_ENABLE_ECC" and I can make EC keys, but am having problems with
CSRs.  Perhaps I'm doing something wrong with this certutil command:

certutil -R -s "CN=ectest, O=ectest, L=ectest, ST=ectest, C=US" -p
"123-456-7890" -o ectest.req -d . -k ec -q nistp256

The result I get is:
certutil: signing of data failed: security library: invalid algorithm

Thanks,
Kai

On Thu, Jan 14, 2010 at 4:49 PM, Wan-Teh Chang <[email protected]> wrote:

> 2010/1/14 Kai Chan <[email protected]>:
> > Hi,
> >
> > NSS has ECDSA with SHA1 enabled in SEC_DERSignData() in secsign.c
> > (
> http://mxr.mozilla.org/security/source/security/nss/lib/cryptohi/secsign.c
> ),
> > but will ECDSA with SHA256 and higher be supported in the future?  Or is
> > this something as simple as adding to the switch statement, since the
> other
> > EC signature OIDs exist in SECOIDTag
> > (http://mxr.mozilla.org/security/source/security/nss/lib/util/secoidt.h
> ):
> >     SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE = 277,
> >     SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE = 278,
> >     SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE = 279,
> >     SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE = 280,
>
> The switch statement determines the default signature algorithm OID
> if the caller doesn't specify it (by passing algID=SEC_OID_UNKNOWN).
>
> You can pass algID=SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE
> to SEC_DERSignData() to generate an ECDSA-with-SHA-256 signature.
>
> We may want to change the default ECDSA OID in that switch
> statement to SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE
> at some point, since Suite B requires at least SHA-256.
>
> Wan-Teh
> --
> dev-tech-crypto mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to