Vidal Pascal wrote, On 2009-02-06 00:05:
> Hi,
>
>> Include all the certificates which chain from the original end-user
>> certificate into the PKCS7 file. Firefox should import them happily.
Maybe.
> I agree with you, that's i've done. In fact, the problem is:
>
> EE certificate contains an A
This could be the release folder...I'll give it a try.
Nelson B Bolyard wrote:
David Tiertant wrote, On 2009-02-05 07:52:
Interestingly enough, when I tried to include -d, signtool refused to do
anything other than spit out its syntax help. The process runs when
removing -d. It ends in an err
Nelson B Bolyard wrote:
Does your software become part of the browser itself, and run in the browser
as a browser extension or plug-in? Or are you merely trying to use the
browser to download a file that will then be installed as a free-standing
Windows application?
It's not part of the brows
Glen Beasley wrote:
you can code the same pretty print functionality but there is no
existing function that
duplicates certutil -l -n.
You can start with
http://mxr.mozilla.org/security/source/security/jss/org/mozilla/jss/tests/ListCerts.java
Which currently outputs:
java -cp ./jss4.jar org
On 02/06/2009 10:05 AM, Vidal Pascal:
If you expect NSS to fetch chained certificates through Internet
download than it is correct that Firefox doesn't do that.
Is there any button or configuration in Firefox to do that?
As far as I know there is no such option. However once NSS works from
Hi,
>Include all the certificates which chain from the original end-user
>certificate into the PKCS7 file. Firefox should import them happily.
I agree with you, that's i've done. In fact, the problem is:
EE certificate contains an AIA extension which indicates a p7c file.
In this p7c file, th
6 matches
Mail list logo