On 16 mar 2010, at 13.50, Tomas Gustavsson wrote:

> 
> If using PKCS#11 I would personally not go down a path that is not 
> commonly used. The common usage of smart cards and hardware security 
> modules always stores both the private (as a sensitive object) and the 
> public key (either as a public key or as an x.509 certificate).
> This works and is well tested and is sure to work across a wide range of 
> smart cards and hardware security modules.
> 
> Why is this not suitable for OpenDNSSEC.

We currently do use both the private and public key object. It is just that we 
have heard different stories. E.g. when I tried to get a similar patch into 
pkcs11-tool one year ago. And from others saying that it is important to save 
the space in the HSM due to licensing or limited space.

And your recommendation from the smarcard industry is to use both the private 
and public key object?

// Rickard
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to