Hey,
Both commands work perfectly fine, and I get my keys as well the
cert.
[EMAIL PROTECTED] bin]# ./certutil -L -d ~/.mozilla/firefox/
3y9snp1l.totallynew/
CA Cert Signing Authority - Root CA CT,C,C
CAcert WoT User's Root CA ID u,u,u
[EM
duryodhan wrote:
> signver: function failed: An I/O error occurred during security
> authorization
I *think* a lot of those errors point to it having problems with the
security db for one reason or another (password or location...)
Try doing "certutil -L -d " and see if it lists anything.
If it
Hey,
I did :
[EMAIL PROTECTED] bin]# ./signver -s ./signature -d ~/.mozilla/firefox/
3y9snp1l.totallynew/ -i ./data -v -V
signver: function failed: An I/O error occurred during security
authorization
Now I am totally in the dark as to the reason for this error . I
wouldn't mind a signature veri
dev wrote:
> Thats the thing I got the private cert from cacert.org , I don't
> know where the security db is or where it should be etc. I can only
> just export my private cert as a pkcs12 file , not the cert db.
> Any ideas how I can get the cert db? or what I should do ?
If you used Fire
Hey,
>
> It needs to know where your security database is (secmod.db, key3.db,
> cert8.db) with the -d option. All mozilla tools assume it's in
> ~/.netscape or something similar by default. Since almost no one stores
> their credentials there get used to using the -d (or -dbdir for modutil)
> op
dev wrote:
> Hey,
> Lets say I have signed "foobar" using crypto.signText("foobar");
> How do I verify that signature?
>
> I used signVer from the NSS tools :
> #./signver -s ./signature
./signver
Usage: signver options
Options:
-a signature file is ASCII
-d certdi
Hey,
Lets say I have signed "foobar" using crypto.signText("foobar");
How do I verify that signature?
I used signVer from the NSS tools :
#./signver -s ./signature
(where signature is a file containing the signature outputted by the
crypto.signText function)
but it gives error
signver: functi
7 matches
Mail list logo