On 2009-07-05 16:03 PDT, Ian G wrote:
On 4/7/09 23:19, Nelson B Bolyard wrote:
You provide customer support for Firefox?
Yup. Doesn't everyone who is a techie? I mean, I don't want to, but
because I am a techie, people assume that I know Firefox back to front
and can make it do circus
Anders Rundgren schrieb:
BTW, we still don't have a credible system for *remote* provisioning of
smart cards on any OS, so we shouldn't expect too much progress here
because PKCS #11 can't do that job actually!
Why? What are you missing?
--
dev-tech-crypto mailing list
M.Hunstock wrote:
Anders Rundgren schrieb:
BTW, we still don't have a credible system for *remote* provisioning of
smart cards on any OS, so we shouldn't expect too much progress here
because PKCS #11 can't do that job actually!
Why? What are you missing?
Hello everybody,
I'm new to this topic, so it would be kind if some of you people could
give me some input.
I want to use certificates which according private key is protected
inside a Trusted Platform Module and use these Certificates for client
side authentication towards a web based service
Hi Martin,
Yes, TSS does apparently give you a PKCS#11 interface when layered
with openCryptoki (http://trousers.sourceforge.net/pkcs11.html). I
haven't used this configuration personally (I'm trying to work with
a specific vendors PKCS#11 library and access the TPM using Java
through the
Anders Rundgren wrote:
we see the start of going out of that through the European Citizen Card
(ECC) standard CEN TS 15480
This is something I really hate:
http://www.evs.ee/product/tabid/59/p-165216-cents-15480-22007.aspx
Paying for *open* standards!
In fact, I'm not sure I directed you to
On 2009-07-06 07:41 PDT, Martin Schneider wrote:
I want to use certificates which according private key is protected
inside a Trusted Platform Module and use these Certificates for client
side authentication towards a web based service running on an Apache.
As far as I understand, there
Users are never told that a PIN is a password is a passphrase. So,
they believe that a PIN is not a password, and a password is not
a passphrase. So they think I have to type my password to get
access to this, not the device is asking for my PIN to do what it's
been asked to do.
Users aren't
Martin,
Martin Paljak wrote:
This is because currently tokens are used for low level internet pipe
things in the form of SSL/TSL. It is impossible to bring those network
level events to the UI level, and it would not make much sense either.
NSS allows the password prompting callback to be
9 matches
Mail list logo