> Is that really the verbatim output of signtool -l? Does your self-signed
> cert have "Common Name - Organization" as its name?

That is correct, this is just a test self-signed cert.

> "security library: bad database" is a somewhat generic error you'll
> encounter when signtool fails to find a cert for signing. The first part
> of the error message actually indicates what the problem is: apparently
> you used "-k testcert" to specify the name of the cert, but there is no
> cert with this nickname in your cert database (if the output above is
> really what signtool -l shows, then you'd have to use -k "Common Name -
> Organization").

You are correct, and there was a misunderstanding on my part. When I
created the cert, I got a x509.cacert which I read (http://
web.archive.org/web/20060425194511/www.mozdevgroup.com/docs/pete/
Signing-an-XPI.html) was used to sign objects. I think this is
incorrect, and is the public key, not a private key.

If I got that part right, then when I loaded the x509.cacert into my
XUL application and tried to use signtool to sign an archieve, it was
failing because I was trying to sign with a public key. So the error
it was giving me makes sense (now that you have explained it). But now
I am at a loss for my next step.

I have a CA certificate which is loaded into my XULRunner database, I
now need to sign an object file. I have read somewhere else (I can't
find the resource), that issuing a certificate request should get you
a certificate and private key. I am able to get the certificate (which
I guess I distribute), but not sure how to get the private key to sign
my object file. The CA doesn't do this to the best of my knowledge.

> Be very sure that no mozilla apps are running when you copy the cert
> and/or key DBs, or you will get corrupted results.

Yep, I made sure this wasn't the case.

Cesar

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to