Jean-Marc Desperrier wrote:
>> [...]. That Root is actually signed by the
>> same key and having the same issuer as Sub does not put it in the same level
>> as Sub since Root is selfsigned.
>I think you should rethink about the meaning of *self*-signed.
I don't claim to be the world's biggest exp
Peter Djalaliev wrote:
After everything compiles, you can find in the NSS source tree:
NSS include files: /mozilla/dist/public/nss and
/mozilla/dist/public/dbm
NSPR include files: /mozilla/dist/_.OBJ/include
Don't use the files in /mozilla/dist/public/dbm. dbm is now
an internal c
Richard Levenberg wrote:
> Neither RFC2511 or PKCS10 (Certificate Request specifications) mention
> the use of SPKAC. I'm pretty sure that SPKAC doesn't fit within PKCS10
> but I've only cursorily looked at RFC2511 so I'm not positive that a
> SPKAC couldn't be hammered in there somewhere. I kno
Peter Djalaliev wrote:
> I have a question about what happens when the first SSL handshake on a
> SSL connection tries to gather data from a socket that would block
> (e.g. there is no data tobe read yet).
Peter, Rather than answer your questions about the functions in the code,
one by one, I'm g
Amplifying on my previous reply...
Anders Rundgren wrote:
> Serial number + Issuer MUST indeed be unique within a CA.
That is, the field of the certificate, whose field name is "issuer",
which is the issuer's DN, together with the serial number, must be unique.
> Therefore the following was int
Hello,
I don't know about the release notes (I suspect these are the newest
ones), but here are some build instructions that should work. They
haven't really changed as far as I know:
1) Download the NSS and NSPR source tarballs from their respective
release dirs:
ftp://ftp.mozilla.org/pub/mozil
Hello,
I have a question about what happens when the first SSL handshake on a
SSL connection tries to gather data from a socket that would block
(e.g. there is no data tobe read yet).
I am using the SSL3 implementation on a Linux platform.
So, in Do1stHandshake(), the next handshake function is
[EMAIL PROTECTED] wrote:
NSS 3.11 is the most recent version is it not? Are there updated
release notes / build instructions somewhere?
The most recent version of NSS is NSS 3.11.3. It should be
used with NSPR 4.6.3. The CVS tags are NSS_3_11_3_RTM and
NSPR_4_6_3_RTM.
NSS 3.11.3 has a fix fo
Jean-Marc Desperrier wrote:
Anders Rundgren wrote:
[...]. That Root is actually signed by the
same key and having the same issuer as Sub does not put it in the same
level as Sub since Root is selfsigned.
I think you should rethink about the meaning of *self*-signed.
The issuer of Root *is* R
Anders Rundgren wrote:
[...]. That Root is actually signed by the
same key and having the same issuer as Sub does not put it in the same level
as Sub since Root is selfsigned.
I think you should rethink about the meaning of *self*-signed.
The issuer of Root *is* Root, so Root and Sub *do* shar
NSS 3.11 is the most recent version is it not? Are there updated
release notes / build instructions somewhere?
http://www.mozilla.org/projects/security/pki/nss/ seems a little
outdated.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
h
11 matches
Mail list logo