Hi Oscar.
Thanks,
So yes, the failure to find your token is a failure in firefox (psm in
this case) to find a token that can do CKM_RSA_PKCS. Firefox looks for
tokens that are writable that can to the PKCS mechanism since pretty
much all it's operations is done with PKCS.
Oscar So wrote:
Rob Crittenden wrote:
b) do all the work on the first module load. Don't really shut down the
module after the first load (that is, pretend that you shut down).
Then do nothing on the second load, and continue to use the stuff
loaded
the first time.
I don't have the choice with b).
Oscar So wrote:
Hi Nelson,
I have no idea if NSS supports CKM_RSA_PKCS_PSS at all.
Any idea ?
NSS does not support CKM_RSA_PKCS_PSS
To check this use http://lxr.mozilla.org/security/ to look at current
NSS source.
CKM_RSA_PKCS_PSS is defined only in the header pkcs11t.h, but not
used the co
Hi Nelson,
I have no idea if NSS supports CKM_RSA_PKCS_PSS at all.
Any idea ?
Oscar
Nelson Bolyard wrote:
Oscar,
Does NSS ever need/want a module with just those mechanisms?
Does NSS ever want the CKM_RSA_PKCS_PSS or CKM_RSA_X_509 mechanisms
at all?
___
On 8/22/06, David Stutzman <[EMAIL PROTECTED]> wrote:
We are trying to verify a DSA signature that was generated outside of
NSS using NSS methods. It consists solely of the r+s elements put
together. It seems that an NSS signature is ASN.1 encoded so if we pass
the bare signature in we are getti
We are trying to verify a DSA signature that was generated outside of
NSS using NSS methods. It consists solely of the r+s elements put
together. It seems that an NSS signature is ASN.1 encoded so if we pass
the bare signature in we are getting SEC_ERROR_BAD_DER (-8183). I
assume this is beca
Nelson Bolyard schrieb:
Erik Siegemund wrote:
I look for an answer for following problem:
In the mozilla was imported a client certificate.
1.) How is the way to get this certificate inside an applet
for using for encryption? (Assuming java sun plugin
2.) How is the way to use this certif
7 matches
Mail list logo