ch from the end of the string.
However, I am not certain if a) this i the proper way to correct this bug, or
b) if there are more places where this assumption is made, and thus I need to
be more thorough.
Thanks
Bill
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
n it I am not familiar enough with all the use
cases. Is this a likely/or even unlikely scenario?
I would prefer not ot have to bake my own nsslib/opensc lib, so any
chance this is something worth trying to fix?
Thanks for you time
Bill
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.m
Although the details are sketchy, it appears that the scheme can be used with
other OS's and PKIs. Intel appears to have provided hooks. There's apparently
an MS CAPI visible provider for the hardware/firmware module. Any plans to
provide an NSS/PKCS 11 interface for Linux, MAC, Windows operat
I'm seeing the crash below after integrating NSS 3.12.5 into tomcat
6.0.29. Anyone have any ideas or suggestions?
#
# An unexpected error has been detected by Java Runtime Environment:
#
# SIGSEGV (0xb) at pc=0x52504bda, pid=10055, tid=1413200784
#
# Java VM: Java HotSpot(TM) Server VM (11.2-b0
of the recognized names (as Strings)?
Thanks.
Bill Price
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
o the
PBEwSHA1-1&DES3-CBC.
Mozilla won't accept the p12 but MS will.
Thanks again.
"David Stutzman" wrote in message
news:[EMAIL PROTECTED]
> Bill Price wrote:
>> Can someone post (or reference) sample code showing how to use JSS to
>> create a PKCS #12 for a
Can someone post (or reference) sample code showing how to use JSS to create
a PKCS #12 for a RSA key and certs held in the internal token? I am having
trouble getting the private key into a keybag, safecontents, and
authenticated safes. I have seen the example of creating a PFX on
lxr.mozilla.
responder
is referencing a CRL for status info, the data will only be as fresh
as the CRL it references.
Personally, I don't agree with such implementations of OCSP...but they
do exist.
Cheers,
Bill
___
dev-tech-crypto mailing list
dev-tech
g to be a MUCH bigger issue which will confuse and upset many
users and website owners. When FF enables OCSP by default the problem
won't get better either.
I challenge anyone reading this thread to enable OCSP checking in FF
and try surfing for a week. It's tougher than I expected!
with
Java Native SSL.
The problem seems to occur with both JSS34 and JSS4.
Has anyone else seen this or have any suggestions? Thanks.
Bill Price
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev
10 matches
Mail list logo