Re: libnssckbi.so problems with ROOt ca ceritifcate Trust flags

2007-07-01 Thread samrat saha
Dear Nelson, Below is the problem in detail.. I am trying to extract the built in Root CA certificate in the nss to a certificate bag file (PEM format dumbed from libnssckbi.so). Using the about certificate bag file i am trying to build a database during intilization which will contain all the bui

Re: libnssckbi.so problems with ROOt ca ceritifcate Trust flags

2007-07-01 Thread samrat saha
Dear Nelson, Below is the problem in detail.. I am trying to extract the built in Root CA certificate in the nss to a certificate bag file (PEM format dumbed from libnssckbi.so). Using the about certificate bag file i am trying to build a database during intilization which will contain all the bui

Re: libnssckbi.so problems with ROOt ca ceritifcate Trust flags

2007-07-01 Thread samrat saha
Dear Nelson, Below is the problem in detail.. I am trying to extract the built in Root CA certificate in the nss to a certificate bag file (PEM format dumbed from libnssckbi.so). Using the about certificate bag file i am trying to build a database during intilization which will contain all the bui

Re: libnssckbi.so problems with ROOt ca ceritifcate Trust flags

2007-07-01 Thread Nelson B
samrat saha wrote: > I was trying to create the CA store using the buildin CA certificates in > libnssckbi library. What problem are you trying to solve. libnssckbi already contains all the stored root CAs. Do you need a different list? A smaller list? What's the problem with the list? Do you

Re: SDR backup

2007-07-01 Thread Nelson B
Wolfgang Rosenauer wrote: > I have an issue with NSS and mozilla's password manager. > The password manager is using the SDR to encrypt its passwords. The > problem is that the application I'm working on has to replace the user's > keystore with every update because there are special keys in that

Re: Link-fingerprints: weak unless link received securely

2007-07-01 Thread Nelson B
Gervase Markham wrote: > Nelson B wrote: >> Unless the page that contains that link is an https page, to substitute a >> trojan, an attacker need only substitute his own URL for the original >> page's URL while the page is in transit. A proxy server is a perfect >> place to perform such an MITM at