On 01/15/2015 02:35 PM, Robert Daniels wrote:
> Ok, I tested this on the latest 0.16 and it works.
>
> Thanks again for the help.
Fabulous, thanks for the feedback.
--
John
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
On Thursday, January 15, 2015 at 8:46:04 AM UTC-5, John Dennis wrote:
> On 01/15/2015 07:50 AM, Robert Daniels wrote:
> > We are using python-nss 0.12. I will pull the newest and see if that
> > fixes the problem.
>
> Current version is 0.16.0.
>
> Not sure where you're pulling it from, the Mozil
On 01/15/2015 07:50 AM, Robert Daniels wrote:
> We are using python-nss 0.12. I will pull the newest and see if that
> fixes the problem.
Current version is 0.16.0.
Not sure where you're pulling it from, the Mozilla site
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Python_bindin
We are using python-nss 0.12. I will pull the newest and see if that fixes the
problem.
Also on the password callback, just a theory but it could be since it cannot
find the cert, it does not get to the point where it needs the password.
I'll chime back after testing with a newer version of p
On 01/14/2015 02:59 PM, Robert Daniels wrote:
> John,
>
> Some additional observations.
>
> If I debug with a breakpoint over the password callback, it's never
> called when invoking pkcs12_export, however it is invoked when
> calling find_key_by_any_cert.
Hmmm ... that seems odd. It's NSS that
John,
Some additional observations.
If I debug with a breakpoint over the password callback, it's never called when
invoking pkcs12_export, however it is invoked when calling
find_key_by_any_cert.
I also notice 2 flavors of the callbacks for password, one taking 2 parameters
and the other 3,
On Wednesday, January 14, 2015 at 2:36:45 PM UTC-5, Robert Daniels wrote:
> On Wednesday, January 14, 2015 at 11:27:50 AM UTC-5, John Dennis wrote:
> > On 01/14/2015 09:58 AM, Robert Daniels wrote:
> > > Trying as you suggested today, but ran into some other thing which is
> > > puzzling.
> > >
>
On Wednesday, January 14, 2015 at 11:27:50 AM UTC-5, John Dennis wrote:
> On 01/14/2015 09:58 AM, Robert Daniels wrote:
> > Trying as you suggested today, but ran into some other thing which is
> > puzzling.
> >
> > When I call cert = find_cert_from_nickname(nn, pwd) I successfully pull the
> >
On 01/14/2015 09:58 AM, Robert Daniels wrote:
> Trying as you suggested today, but ran into some other thing which is
> puzzling.
>
> When I call cert = find_cert_from_nickname(nn, pwd) I successfully pull the
> server cert.
> I then call find_key_by_any_cert(cert, certpassword) I get an object
Trying as you suggested today, but ran into some other thing which is puzzling.
When I call cert = find_cert_from_nickname(nn, pwd) I successfully pull the
server cert.
I then call find_key_by_any_cert(cert, certpassword) I get an object back
(nss.nss.PrivateKey).
So, presumably the PK exists f
On Tue, 2015-01-13 at 12:25 -0500, John Dennis wrote:
> On 01/13/2015 09:58 AM, Robert Daniels wrote:
> > I also need to serialize private keys in the same fashion. Any hints
> greatly appreciated.
>
> By design NSS prohibits access to private keys therefore you cannot
> serialize private keys.
On 01/13/2015 09:58 AM, Robert Daniels wrote:
> I also need to serialize private keys in the same fashion. Any hints greatly
> appreciated.
By design NSS prohibits access to private keys therefore you cannot
serialize private keys.
However, you can export a cert/key pair in PKCS12 format. See
n
Basically what I'm doing is pulling from the nss store, the private key, server
cert, and the complete CA cert chain and converting to in-memory PEM.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
I also need to serialize private keys in the same fashion. Any hints greatly
appreciated.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
On Monday, January 12, 2015 at 12:49:36 PM UTC-5, John Dennis wrote:
> On 01/12/2015 08:50 AM, robertdaniels2...@gmail.com wrote:
> > I'm loading certs via python-nss, and need to serialize the format as
> > x509 PEM output. I'm using a mix of python-nss and openssl.
> >
> > crypto.dump_certificat
On 01/12/2015 08:50 AM, robertdaniels2...@gmail.com wrote:
> I'm loading certs via python-nss, and need to serialize the format as
> x509 PEM output. I'm using a mix of python-nss and openssl.
>
> crypto.dump_certificate does not take a nss.Certificate parameter, so
> looking for what is the "best
16 matches
Mail list logo