SEC_ERROR_BAD_SIGNATURE with Firefox 3

2008-02-20 Thread Christophe Thiaux
Hello, I can't connect on an ssl server with Firefox 3: it displays SEC_ERROR_BAD_SIGNATURE But if i'm connecting with Firefox 2 and accept the certificate definately, then the connexion with Firefox 3 works. Any idea of the problem ? Thanks -- Chris

Re: window.crypto functions

2008-02-20 Thread Robert Relyea
Nelson Bolyard wrote: Robert Relyea wrote, On 2008-02-19 14:20: Eddy Nigg (StartCom Ltd.) wrote: Does anybody know if and which parameters might be obtained by the window.crypto functions and smart cards? For reference see this page:

Re: SEC_ERROR_BAD_SIGNATURE with Firefox 3

2008-02-20 Thread Robert Relyea
Christophe Thiaux wrote: Hello, I can't connect on an ssl server with Firefox 3: it displays SEC_ERROR_BAD_SIGNATURE But if i'm connecting with Firefox 2 and accept the certificate definately, then the connexion with Firefox 3 works. Any idea of the problem ? Not from this sparse

Re: window.crypto functions

2008-02-20 Thread Eddy Nigg (StartCom Ltd.)
Robert Relyea wrote: There are lots of APIs to get lots of data about smart cards, but just like there are lots of APIs to do crypto, the aren't all available to web designers through java script. Oh, it works excellent with Javascript in Firefox (and most derivatives I guess). Subrata

Re: window.crypto functions

2008-02-20 Thread Eddy Nigg (StartCom Ltd.)
Hi Bob, Robert Relyea wrote: I think you need to be running a chrome to access this function however;(. I don't think your average website can use it. If Firefox is considered an average and common browser than it's pretty usable. For MSIE we've got activeX (so I'm not the MS guy, don't ask

Re: QuoVadis request for root upgrade to EV

2008-02-20 Thread Frank Hecker
Frank Hecker wrote: QuoVadis has applied to upgrade an existing root CA certificate for EV use, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=403665 snip I have evaluated QuoVadis's request, as per the mozilla.org CA certificate policy:

Step-by-step instructions on creating test email certificates

2008-02-20 Thread Neil
I've been asked to review a patch that enhances the multiple identity UI in Thunderbird/SeaMonkey by allowing email certificates to be selected on a per-identity basis, rather than just for the main identity. It seems that building SeaMonkey will include certutil which looks as if it is more

Re: Step-by-step instructions on creating test email certificates

2008-02-20 Thread Nelson B Bolyard
Neil wrote, On 2008-02-20 16:33: I've been asked to review a patch that enhances the multiple identity UI in Thunderbird/SeaMonkey by allowing email certificates to be selected on a per-identity basis, rather than just for the main identity. It seems that building SeaMonkey will include

Re: Looking for details about PR_Init argument maxPTDs

2008-02-20 Thread Wan-Teh Chang
On Tue, Feb 19, 2008 at 7:02 PM, D3!$ [EMAIL PROTECTED] wrote: In fact, it is no longer necessary to call PR_Init(). NSPR is now implicitly initialized, usually by the first NSPR function the program calls. I believe that the above fact(and those like these..) should be mentioned

Re: Step-by-step instructions on creating test email certificates

2008-02-20 Thread Eddy Nigg (StartCom Ltd.)
Nelson B Bolyard wrote: Neil wrote, On 2008-02-20 16:33: I've been asked to review a patch that enhances the multiple identity UI in Thunderbird/SeaMonkey by allowing email certificates to be selected on a per-identity basis, rather than just for the main identity. It seems that

Re: Step-by-step instructions on creating test email certificates

2008-02-20 Thread Nelson Bolyard
Eddy Nigg (StartCom Ltd.) wrote, On 2008-02-20 18:39: Nelson B Bolyard wrote: Neil wrote, On 2008-02-20 16:33: I've been asked to review a patch that enhances the multiple identity UI in Thunderbird/SeaMonkey by allowing email certificates to be selected on a per-identity basis, rather