tag is https://hg.mozilla.org/projects/jss/rev/17d1d7b740ca
<https://hg.mozilla.org/projects/jss/rev/17d1d7b740ca>
Adding some of the JSS team members to the thread.
Elio
> If you need the .jar file, which had apparently been distributed for previous
> releases, it looks like you'd ha
that test and how it is invoked will help you.
Elio
On Thu, May 25, 2017 at 12:55 PM, Ernie Kovak wrote:
> Try this:
>
> /** Convert an NSS certificate to a Java X509Certificate */
> protected X509Certificate convertNssCertificate(org.
> mozilla.jss.crypto.X509C
Firefox 27 will support TLS 1.2, see
https://bugzilla.mozilla.org/show_bug.cgi?id=861266
On Fri, Nov 29, 2013 at 10:32 AM, Kurt Roeckx wrote:
> On Fri, Nov 29, 2013 at 01:43:11PM +0100, Kurt Roeckx wrote:
> > As far as I know, NSS does not have any ciphers with SHA-2 other
> > than GCM, and so
https://developer.mozilla.org/en-US/docs/NSS_reference and
https://developer.mozilla.org/en-US/docs/NSS#Background_Information
and https://developer.mozilla.org/en-US/docs/NSS/NSS_API_GUIDELINES has a
layering diagram
-Elio
On Sat, Aug 24, 2013 at 6:02 PM, Kyle Hamilton wrote:
> Hi,
>
> I'm
f
us could do it on your behalf.
Thanks,
Elio
On Thu, Aug 29, 2013 at 2:12 AM, Milan Bartos wrote:
> Hi,
> currently there is no usable NSS documentation that would cover all NSS
> functions, macros, structures...
> I've made some documentation preview, cu
contributor by the
official contact. Who is that official contact?
Thank you,
Elio
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
les for nss. See
https://bugzilla.mozilla.org/show_bug.cgi?id=490238
The samples go in progression from simple tasks to more complex ones.
The AES sample 4 is medium complexity.
You may find it worth looking at.
The project has been dormant for a while, volunteers are always
welcome.
Elio
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Added comments to https://bugzilla.mozilla.org/show_bug.cgi?id=490238
proposing simplifications to sample 3.
-Elio
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
nction that would do it under that covers for you (you
will pass the messag and the sent mac) but the PK11_ functions aren't
that way.
Elio
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
//lists.mozilla.org/listinfo/dev-tech-crypto
You may want to see examples of API usage in the context of specific
tasks.
The NSS technical notes at
http://www.mozilla.org/projects/security/pki/nss/tech-notes/
and five other samples covering typical tasks
http://www.mozilla.org/projects/sec
nly import/export private key in PKCS#8
>> format with "PKCS12 V2 PBE With SHA1 And 3KEY Triple DES-cbc"
>> encryption algorithm.
>> I would like to support other encryption algorithms supported by
>> OpenSSL.
>>
> Are you using NSS 3.11 or 3.12. We added
ULL) PORT_Free(derEPKI);
if (arenaForEPKI) PORT_FreeArena(arenaForEPKI, PR_FALSE);
return rv;
}
----
Hope this helps some.
Elio
On Sep 30, 10:18 am, Robert Relyea <[EMAIL PROTECTED]> wrote:
> Subrata Mazumdar wrote:
> > Bob,
> > I implemented t
On Aug 10, 6:43 am, Yevgeniy Gubenko <[EMAIL PROTECTED]>
wrote:
> Thanks Nelson for your reply.
> Yes, I was producing cert8.db.
> I used your link to recreate the certificates,
> but still got the same exception as before when fips mode was enabled in the
> stage of importing CA certificate file
13 matches
Mail list logo