On 2009-08-19 06:30 PDT, Rishi wrote:
> OK , we have made some progress, we could disable the softtoken by
> commenting the line softtoken_extra.so in mca.conf in /kernel/drv/.
> Now we got an SSL handshake error "bad MAC". This we thought would be
> because the crypto card does not support hashing
On 2009-08-19 11:30 PDT, Justin wells wrote:
> Hi all,
>
> When I visit an HTTPS link I can see what strength of encryption is
> used to encrypt the content (e.g., 256 bit AES) and if I dig a little
> I can even see the strength of the certificate used for authentication
> (e.g., 1024 bit RSA). Wh
On 2009-08-19 15:12 PDT, David Keeler wrote:
> Wan-Teh Chang wrote:
>> I think "rsa encryption" is a public key algorithm, where as
>> "sha1 with rsa encryption" is a signature algorithm.
>
> Thank you for the quick response. This isn't quite what I was getting
> at, though. I guess my question
Typically, that means MD5 with RSA Encryption.
On Wed, Aug 19, 2009 at 3:12 PM, David Keeler wrote:
> Wan-Teh Chang wrote:
>>
>> I think "rsa encryption" is a public key algorithm, where as
>> "sha1 with rsa encryption" is a signature algorithm.
>
> Thank you for the quick response. This isn't qu
Wan-Teh Chang wrote:
I think "rsa encryption" is a public key algorithm, where as
"sha1 with rsa encryption" is a signature algorithm.
Thank you for the quick response. This isn't quite what I was getting
at, though. I guess my question really should be: I have a certificate
that says its "
Marc Kaeser wrote:
Hello Martin,
have you been able to find out why FF crashed? I've got the same problem
here, everything worked fine except for the module-import in FF. My
build crashes too.
I'm working on Ubuntu too, but I got my sourcecode from mozilla and
built it myself. I'd like to kno
Hi all,
When I visit an HTTPS link I can see what strength of encryption is
used to encrypt the content (e.g., 256 bit AES) and if I dig a little
I can even see the strength of the certificate used for authentication
(e.g., 1024 bit RSA). What I can't seem to find anywhere is any
information about
On Wed, Aug 19, 2009 at 10:39 AM, David Keeler wrote:
> Hello,
> I have a question that should be pretty simple to answer, but I haven't been
> able to do so on my own.
> Is there a (or rather, what is the) difference between having an x509 (ssl)
> certificate with a signature algorithm of "rsa enc
Hello,
I have a question that should be pretty simple to answer, but I haven't
been able to do so on my own.
Is there a (or rather, what is the) difference between having an x509
(ssl) certificate with a signature algorithm of "rsa encryption" versus
"sha1 with rsa encryption"? (Is it that the
On 08/19/2009 12:55 AM, Marc Kaeser wrote:
Thanks, that's a super answer!
But what do you think, instead of implementing another module, if I
encrypted the whole softoken-database with a binding or sealing key,
wouldn't it have the same effect?
That would require mucking with softoken, which is
Hello Martin,
have you been able to find out why FF crashed? I've got the same problem
here, everything worked fine except for the module-import in FF. My build
crashes too.
I'm working on Ubuntu too, but I got my sourcecode from mozilla and built it
myself. I'd like to know if you found the p
On Aug 13, 6:54 pm, Rishi wrote:
> On Aug 13, 1:32 pm, Rishi wrote:
>
>
>
>
>
> > On Aug 13, 6:13 am, Nelson B Bolyard wrote:
>
> > > On 2009-08-12 03:43 PDT, Rishi Renjith wrote:
>
> > > > Hello,
> > > > I tried creating a NSS database, linking it with crypto card and
> > > > connecting using a
Robert I'm sorry, I misunderstood your answer. Thanks I'll also look at
pk11sdr.c to see if I can get the answers.
But I wonder if the db-binding solution wouldn't be simpler. Unfortunately
I'm no NSS champ. I found helpful docs on mozilla.org, but it's still no
simple task for me to understand
Thanks, that's a super answer!
But what do you think, instead of implementing another module, if I
encrypted the whole softoken-database with a binding or sealing key,
wouldn't it have the same effect? Instead of storing the tokens in the TPM
itself, they'd be on disk, but protected by a tpm ke
14 matches
Mail list logo