Hi,
I take it "Extended ECC" is the additional option of
"NSS_ECC_MORE_THAN_SUITE_B"? I tried NSS 3.12.5 with NSPR 8.2 with only
that option and "NSS_ENABLE_ECC", so it's using softoken. Unfortunately,
still getting the same error. Here's the command again in case I made a
mistake:
certutil -R
Kai,
In NSS builds marked as "Basic ECC", ECC may be
used only for TLS/SSL. So it's possible that certutil cannot
generate CSRs when the "Basic ECC" version of NSS
is used.
In NSS builds marked as "Extended ECC", certutil
should be able to generate CSRs. If not, it's a bug.
You can read this w
George,
Another source of info on cross-compiling NSS is Mozilla's makefile
responsible for compiling NSS:
http://mxr.mozilla.org/mozilla-central/source/security/manager/Makefile.in
Search for "CROSS_COMPILE" in that makefile.
Note that this approach is different from the preferred approach
that
I'm trying to cross compile nss 3.12.5 for armeb-xscale-linux-gnueabi using
ptxdist. I followed your suggestions and also had to patch several things to
get it mostly working. A host copy is built prior to building the target
copy. But now I'm stuck. The host copy of shlibsign is complaining that
Yes, it's pointing to the ECC-enabled NSS. I am able to generate EC keys
using:
certutil -G -d . -k ec -q nistp256
However, no luck with EC certificate requests with and without specifying
the hash.
Thanks,
Kai
On Thu, Jan 14, 2010 at 7:46 PM, Kyle Hamilton wrote:
> Are you certain that certu
Hi,
How can i access the "Issuer" and "Issued to" of the selected
digital certificate in JavaScript in firefox?
For Internet Explorer, CAPICOM provides API to do this but for firefox
i'm not able to. I've tried using window.crypto.
Example Java Script code:
try {
result = window.crypt
6 matches
Mail list logo