and then pass a pointer to that function to the NSS code, but I
wasn't sure that would be the good way to do this.
Sincerely,
Peter Djalaliev
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto
Hello,
I am trying to write a call back function that is invoked from inside
NSS and prompts the user through a simple dialogue window. I am not
sure how exactly to do it. I can see how it is done in the
PK11PasswordPrompt function of nsNSSCallback.cpp, but I don't
understand what exactly the
Well, I actually used SSL_TRC instead, since this is already in the
code. However, no, I could get NSPR logging to work for me. I am
using Red Hat Linux 8 with the 2.4 kernel.
The problem was that I didn't see any output - neither in the terminal
window, nor in the log file if I specified one.
Nelson,
Thanks for the information, it helps to understand better the internals
of the SSL/TLS implementation and the reasons behind them.
I resolved the problem, one part of it was that I, as you said, wasn't
releasing the XmitBufLock at one place, but I didn't see that code path
previously.
Hello,
There are some external files that I want to compile into NSS, they
contain functions that I call from within the SSL module (during the
establishment of the SSL3/TLS handshake).
I tried creating another folder, called tcpa, in
mozilla/security/nss/lib. I modified the manifest.mn file to
No, I am not aware of such a CA, but I haven't had too much dealing
with CAs either.
For research purposes, I think it might be appropriate to offer one or
a couple anonymous DH cipher suites. For example, if I want to measure
the latency overhead of running something over TLS (or a modification