Re: Developing pkcs11 module for Firefox

2012-01-03 Thread Robert Relyea
On 12/30/2011 06:53 AM, Anders Rundgren wrote: On 2011-12-29 23:08, Brian Smith wrote: Matej Kurpel wrote: On 22. 12. 2011 10:36, Imen Ibn Hotab wrote: I`m developing pkcs#11 module for Firefox. I was developing a PKCS#11 module as well. Just out of curiosity, what do your PKCS#11 modules

Whitespace(?) problem and crypto.signText()

2012-01-03 Thread Alejandro Exojo
Hi. First of all, sorry if this is not the right list for this question, but I'm a little bit desperate with this, and I don't know a better place for now... I'm using crypto.signText() to sign the contents of a textarea, and send that to the server. There I have to use the signature to build

Re: Whitespace(?) problem and crypto.signText()

2012-01-03 Thread Robert Relyea
On 01/03/2012 03:34 PM, Alejandro Exojo wrote: Hi. First of all, sorry if this is not the right list for this question, but I'm a little bit desperate with this, and I don't know a better place for now... I'm using crypto.signText() to sign the contents of a textarea, and send that to

Regarding PSM with external SSL library

2012-01-03 Thread Ashok Subash
Hi All, We are trying to embed Gecko (Firefox 3.6) over a RTOS platform. We are able to currently render web pages successful albeit with few issues which we are confident we can fix ourselves. Currently due to footprint issue we want to remove NSS from the build and integrate a 3rd party ssl

Re: Regarding PSM with external SSL library

2012-01-03 Thread Brian Smith
Ashok Subash wrote: Firefox 3.6 :( Beware that you will not get any more security updates for the Firefox 3.6 codebase from Mozilla soon. (We are still sometimes finding security bugs in Firefox 3.6 that won't ever be fixed in 3.6.x, only in Firefox 12+). Currently due to footprint issue we

What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-03 Thread Brian Smith
1. libpkix can handle cross-signed certificates correctly, without getting stuck in loops. Non-libpkix validation cannot. 2. libpkix can accept parameters that control each individual validation, whereas non-libpkix validation relies on global settings. 2.a. libpkix can control OCSP/CRL/cert

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-03 Thread Ryan Sleevi
Snip Are there any other benefits? IIRC, libpkix is an RFC 3280 and RFC 4158 conforming implementation, while non-libpkix is not. That isn't to say the primitives don't exist - they do, and libpkix uses them - but that the non-libpkix path doesn't use them presently, and some may be non-trivial