Mozilla NSS does not support any task with EC keys that require signing
with private
keys: create self-signed certificate, generate PKCS#10 CSR, enroll
certificate using
KEYGEN tag etc. The signing with EC keys is explicitly disabled in NSS
modules
of all Mozilla applications. BTW, actual key-g
Hi,
I have been trying to use KEYGEN to create ECDSA keys as in the
example at the bottom of:
https://developer.mozilla.org/En/HTML/HTML_Extensions/KEYGEN_Tag
but I am having no success in my own system of by using the example
above. When using the RSA example I can see the following:
Data Pair
I concur with Martin, but would also like to mention that
two-factor authentication when deployed in phones (unlike in
PCs), combine convenience *and* security.
The problem with phones is that due to the platform diversity
an interoperable solution must be supported by the platform
vendor themselv
On 07/21/2009 03:04 PM, Udo Puetz:
Due to recent developments (US agencies spying on it's citizens,
retention laws in germany and elsewhere, facebook, twitter and such
becoming popular) people in the internet can be devided into two
groups roughly.
Those that give away ANY information about thems
On 21.07.2009, at 15:04, Udo Puetz wrote:
On 20 Jul., 12:04, Ian G wrote:
On 20/7/09 09:18, Udo Puetz wrote:
The fact that hardware doesn't work in the retail / open / end-user
market which Mozilla is most famous for is more than annoying. It
creates a dead weight "opportunity cost". The sol
On 20 Jul., 12:04, Ian G wrote:
> On 20/7/09 09:18, Udo Puetz wrote:
>
> > From a usability point of view I would consider the WHOLE
> > thing to be a nightmare. I intended to write up a howto, gave that up
> > now for the time being.
> > And by the way: ASN1, PKCS#7, PKCS#12. Who was the (pardon
6 matches
Mail list logo