Re: My shy certificate

2006-08-08 Thread Umesh Bywar
Not sure whether this will help, but I think you can write a function like the one given below. Have a look at security/manager/ssl/src/nsPKCS12Blob.cpp. nsresult nsPKCS12Blob::ImportSSLCertsFromFile(nsILocalFile *file) { nsNSSShutDownPreventionLock locker; nsresult rv; SECStatus srv = SECSucce

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Is there a Mozilla utility with which I can attempt to import a certificate *into* my PKCS#11 module? ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: My shy certificate

2006-08-08 Thread Nelson B
Dave Pinn wrote: >> or try wiht the token name >> certutil -L -h "Embedded Security Chip" > > X:\ThunderbirdProfile>certutil -L -h "Embedded Security Chip" -d . > Enter Password or Pin for "Embedded Security Chip": > > X:\ThunderbirdProfile> > > That cannot be good, and Yes, I'm sure that I

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Nelson Bolyard wrote: Try certutil -L -h all to get a list of all certs in all slots. X:\ThunderbirdProfile>certutil -L -h all -d . Enter Password or Pin for "Embedded Security Chip": Gatekeeper Root CA - eSign Australia CT,C,C Gatekeeper Grade 3 Individual CA - eSig

Re: My shy certificate

2006-08-08 Thread Nelson Bolyard
Dave Pinn wrote: > Nelson B Bolyard wrote: > ... >> 1) use modutil to get a listing of all the PKCS#11 modules that have been >> configured into Thunderbird. If your new laptop's PKCS#11 module is not >> among them, that's the first thing to fix. > ... > > I downloaded the NSS 3.11 binary build f

Re: does anyone try nss on FreeBSD platform?

2006-08-08 Thread Wan-Teh Chang
Yes, NSS works on FreeBSD. Mikhail Teterin reported several bugs last year. You can find his email address in https://bugzilla.mozilla.org/show_bug.cgi?id=302602. Wan-Teh ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://list

Re: My shy certificate

2006-08-08 Thread Dave Pinn
I ran certutil -L, which produced the following output (some lines deleted to protect my privacy): Gatekeeper TYPE 3 CA - eSign Australia CT,C,C Gatekeeper Grade 3 Individual CA - eSign Australia CT,C,C Gatekeeper Root CA - eSign Australia

Re: My shy certificate

2006-08-08 Thread Dave Pinn
I created the .netscape directory, and plonked into it the following files from my Thunderbird profile directory: 1. cert8.db 2. key3.db 3. secmod.db I then ran modutil -list, which produced the following output: Listing of PKCS #11 Modules

does anyone try nss on FreeBSD platform?

2006-08-08 Thread Alex
___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Nelson B Bolyard wrote: ... 1) use modutil to get a listing of all the PKCS#11 modules that have been configured into Thunderbird. If your new laptop's PKCS#11 module is not among them, that's the first thing to fix. ... I downloaded the NSS 3.11 binary build for WINNT5.0 - there were no buil

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Nelson B Bolyard wrote: Out of curiosity, what tool(s) did you use to get that data? An Embedded Security Certificate Viewer is part of HP's ProtectTools suite. There's no way to copy the output of the viewer to the clipboard, so I had to transpose it manually. ___

Re: OCSP/CRL handling in Firefox

2006-08-08 Thread Frank Hecker
Nelson B Bolyard wrote: Presently, A user must initiate the first fetch of a CRL from the CA. To clarify, AFAIK all that is required is for a user to click on a link to the CRL, *if* the CRL data is returned with a MIME type of "application/pkix-crl". Firefox then imports the CRL and prompts

Re: OCSP/CRL handling in Firefox

2006-08-08 Thread Kai Engert
Nelson B Bolyard wrote: Presently, A user must initiate the first fetch of a CRL from the CA. CRLs are fetched asynchronously from cert chain validation. CRLs are stored on disk locally, IIRC. After fetching the first one, mozilla clients will fetch subsequent CRLs automatically on a periodic ba

Re: My shy certificate

2006-08-08 Thread Nelson B Bolyard
The NSS test tools are all command line programs. They don't use windows. You run the "DOS prompt" (or other command line window) and run the programs in that window. I'd suggest a sequence of steps something like this: 1) use modutil to get a listing of all the PKCS#11 modules that have been c

Re: PK11_ImportCert bug?

2006-08-08 Thread Nelson B Bolyard
David Stutzman wrote: > PK11_ImportCert has the following signature: > SECStatus PK11_ImportCert(PK11SlotInfo *slot, CERTCertificate *cert, > CK_OBJECT_HANDLE key, char *nickname, PRBool includeTrust) > > Looking at the implementation in > nss-3.11.2/mozilla/security/nss/lib/pk11wrap/pk11ce

Re: My shy certificate

2006-08-08 Thread Nelson B Bolyard
Dave Pinn wrote: > Nelson B wrote: >> Best bet is to get a formatted listing of the certificate itself, >> showing all the extensions and their criticality. > > OK, here goes: > > Non-critical X.509 version 3 extensions: > > * CRL Distribution Points > * Authority Key Identifier > * Subject Key

Re: CERT_VerifyCertificate question

2006-08-08 Thread Nelson B Bolyard
David Stutzman wrote: > Here's some certutil -L output for the cert I am playing with here: > Signed Extensions: > Name: Certificate Key Usage > Critical: True > Usages: Digital Signature > Non-Repudiation > > Name:

Re: My shy certificate

2006-08-08 Thread Nelson B Bolyard
Dave Pinn wrote: > Dave Pinn wrote: > >> Right-oh. I'd love to run pk11util. Do you know of a binary build of >> pk11util for Windows XP? > > Hang on, am I being blonde? is NSS something that I can download and > run, which incorporates pk11util? NSS is a set of shared libraries, and test tool

Re: OCSP/CRL handling in Firefox

2006-08-08 Thread Nelson B Bolyard
Gary Krall wrote: > I'm curious to know what FF does in this regard. Does it fall-back to > CRLs when it cannot connect to our OCSP server? If not are there any > plans to implement something like this in the future? Handling of OCSP and CRLs is rather separate. Presently, A user must initi

Re: Geotrust request to add more roots

2006-08-08 Thread Frank Hecker
Frank Hecker wrote: Frank Hecker wrote: As I noted in an earlier message, Geotrust has applied to have three more root CA certificates added; this is basically to support a multi-year migration away from their current Equifax root certs. See bug 294916 for details: http://bugzilla.mozilla.o

Re: Geotrust request to add more roots

2006-08-08 Thread Frank Hecker
Frank Hecker wrote: As I noted in an earlier message, Geotrust has applied to have three more root CA certificates added; this is basically to support a multi-year migration away from their current Equifax root certs. See bug 294916 for details: http://bugzilla.mozilla.org/show_bug.cgi?id=29

Re: Swisscom root cert inclusion request

2006-08-08 Thread Frank Hecker
Frank Hecker wrote: To echo my comments in bug 342470: My apologies for not following up on this before now. As far as I'm aware all questions relating to Swisscom have been answered, and they appear to be in compliance with our CA policy, I am formally approving their request to have their r

Re: Swisscom root cert inclusion request

2006-08-08 Thread Frank Hecker
Frank Hecker wrote: I'm now soliciting comments on the CA application from Swisscom, bug 342470: https://bugzilla.mozilla.org/show_bug.cgi?id=342470 Swisscom is a public commercial CA based in Switzerland; see the bug report and my CA certificate list page for more information. Swisscom d

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Nelson B wrote: Best bet is to get a formatted listing of the certificate itself, showing all the extensions and their criticality. OK, here goes: Non-critical X.509 version 3 extensions: * CRL Distribution Points * Authority Key Identifier * Subject Key Identifier * Authority Information Acc

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Peter Djalaliev wrote: Hello Dave, In your first posting, you said that you have loaded "the relevant PKCS#11 module". What module are you using? Is it provided with ProtectTools? The module ships with ProtectTools as a DLL: ifxtpmck.dll, to be precise. Otherwise, I read through some of t

Re: CERT_VerifyCertificate question

2006-08-08 Thread David Stutzman
David Stutzman wrote: Julien Pierre wrote: What purpose are you using the digital signatures for in your application ? That may help determine the right usage to check . A blob of data will be signed and sent out over a network to another system running the same application and the signature

Re: My shy certificate

2006-08-08 Thread Peter Djalaliev
Hello Dave, In your first posting, you said that you have loaded "the relevant PKCS#11 module". What module are you using? Is it provided with ProtectTools? Otherwise, I read through some of the HP ProtectTools Embedded Security Manager whitepapers and it seems that the private key and certific

Re: My shy certificate

2006-08-08 Thread Dave Pinn
Dave Pinn wrote: Right-oh. I'd love to run pk11util. Do you know of a binary build of pk11util for Windows XP? Hang on, am I being blonde? is NSS something that I can download and run, which incorporates pk11util? ___ dev-tech-crypto mailing list d