On 03/12/2010 10:12 PM, Anders Rundgren wrote:
> Why is replacing the 15 year old Netscape hack suddenly a bad idea?
>
> Because you cannot create a secure provisioning system without having
> some kind of [by the issuer recognizably] predefined key in the token.
> With such a key, the token would
On 03/12/2010 09:12 PM, Nelson B Bolyard wrote:
>
> Well, the problem is this vague notion of the "current SSL session".
> You see a page. It may have frames, each of which comes from a different
> https server, and each frame may have multiple images or other components,
> each of which comes fro
On 03/15/2010 10:03 AM, Gregory BELLIER wrote:
>
>
> Robert Relyea a écrit :
>>> In sslsock.c, I print ssl3_CipherPrefSetDefault and I can see that my
>>> cipher is not enabled.
>>>
>>> Do you have any hints/tests which could help me ? Some tests I could
>>> do ?
>>> What am I missing ?
>>>
>>
On 03/11/2010 10:57 AM, Wan-Teh Chang wrote:
> 2010/3/11 Robert Relyea :
>
>> The Microsoft thing is also non-standard. (and also not well documented
>> -- which version of IE did it show up in?).
>>
> I found it documented at
> http://msdn.microsoft.com/en-us/library/ms536979(VS.85).aspx
>
Hi all,
I'm testing some SSL sites in order to check SSL cert chains up to new
root certificate from FNMT-RCM (Spanish Mint).
I've tried to connect several Official sites
(https://www.agenciatributaria.gob.es https://sedemeh.gob.es/) and I got
this response: Error code: sec_error_bad_databas
2010/3/15 Hanno Böck :
>
> So I had the idea implementing RSA-PSS signature validation in NSS as a google
> summer of code project. The only bit of information about nss and pss was this
> old mailing list post:
> http://groups.google.com/group/mozilla.dev.tech.crypto/browse_thread/thread/5d2faba3e
Hi,
I'm a student in computer science and I plan do my study thesis about RSA-PSS.
Part of that could be implementing PSS in an open source project.
A bit of background about PSS:
Implementing RSA in real-world applications needs some kind of padding. Older
methods, like the widespread pkcs #1
Robert Relyea a écrit :
In sslsock.c, I print ssl3_CipherPrefSetDefault and I can see that my
cipher is not enabled.
Do you have any hints/tests which could help me ? Some tests I could do ?
What am I missing ?
OK, this is your overall problem. If NSS does not have a cipher enabled,
it
Nelson B Bolyard wrote:
When the user says "I
want to clear my current session", which of those SSL sessions
does he mean?
The server whose name appear in his URL bar.
> Anyway if PSM does not expose a jave script method for accessing the
> clear cache command, I'm sure kai or myself would be
Hi all,
I'm testing some SSL sites in order to check SSL cert chains up to new
root certificate from FNMT-RCM (Spanish Mint).
I've tried to connect several Official sites
(https://www.agenciatributaria.gob.es https://sedemeh.gob.es/) and I got
this response: Error code: sec_error_bad_databas
Robert Relyea wrote:
this is your overall problem. If NSS does not have a cipher enabled,
it will neither advertise it nor select it, no matter where it is on the
list.
There are two possible reasons for this:
1) New Ciphers are not enabled by default, you need to explicitly turn
on that cip
11 matches
Mail list logo