Darn - fat fingered the commands at the bottom.
I have run
certutil -N -d .
modutil -fips true -dbdir . -force
--- On Thu, 2/4/10, Anna Gellatly wrote:
From: Anna Gellatly
Subject: Re: Mozilla-JSS in FIPS compliant mode
To: "mozilla's crypto code discussion list"
Date: Thurs
my Secmod directory path I have run these commands only (haven't
filled the databases with certs/keys).
certutil -N -d .
and
modutil -fips = true -dbdif . -force
Anna.
--- On Tue, 2/2/10, David Stutzman wrote:
From: David Stutzman
Subject: Re: Mozilla-JSS in FIPS compliant mode
To:
?
java.security.ProviderException: Crypto provider not installed: SunPKCS11-NSS
Can I use a jks keystore and trustkeystore with NSS?
Any help would be appreciated!
Thanks,
Anna.
--- On Tue, 2/2/10, David Stutzman wrote:
From: David Stutzman
Subject: Re: Mozilla-JSS in FIPS compliant mode
To: dev-tech
On 2/1/2010 1:39 PM, Anna Gellatly wrote:
Thanks for responding David -
If the Mozilla JCA isn't JSS compatible then I'm barking up the wrong tree.
I see you included the pkcs#11 java doc but how do you ensure sun's
PKCS#11 uses nss? I see that you need to set the configuration
directives - but I
ot;set configuration directives"?
Are they talking java vm command line option setting?
Does nss have a document that shows how to set these directives?
Anna.
--- On Wed, 1/27/10, David Stutzman wrote:
From: David Stutzman
Subject: Re: Mozilla-JSS in FIPS compliant mode
To: dev-tech-cryp
Has anyone ever seen this or does anyone have an idea of how I can get
this crypto provider to be “installed” and utilized in a fips compliant
mode per sun java docs?
I *thought* that JSS wasn't a JSSE implementation and you needed to
write JSS specific code to do SSL sockets but I might be wro
6 matches
Mail list logo