PROTECTED]'
: undefined reference to [EMAIL PROTECTED]'
: undefined reference to `PR_Initialized'
: undefined reference to [EMAIL PROTECTED]'
Thanks
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Kai Engert
Sent: Friday, July 18, 2008 10:14 AM
To: mozilla's
Pawel P wrote:
I want to overwrite default mozilla 1.9 behavior in https flow.
I want to be informed about certificates (especially bad).
I'll show my own certificate dialogs to user and user will decide
if accept certificate or not.
In mozilla 1.8 I used nsIBadCertListener interface to do
Abraham wrote:
I deployed an applet that uses jss in order to get certs (and
associated private keys) on firefox keystore and sign electronic
documents. The applet works well in Firefox 2, but in Firefox 3 the
browser crashes when my implementation of PasswordCallback provides
the token
Eddy Nigg (StartCom Ltd.) wrote:
For the sport I'm following http://wiki.mozilla.org/PSM:EV_Testing and
I'm not sure about the fourth paramenter of the test_ev_roots.txt
file: 4_serial
The page says: One noteworthy detail are the issuer and serial number
fields, those most be
I have one on my local system.
Kai
Eddy Nigg (StartCom Ltd.) wrote:
Has anybody a debug build running somewhere as described at
http://wiki.mozilla.org/PSM:EV_Testing ? I'd like to ask for a small
favor before tinkering with my own build...
___
Boris Zbarsky schrieb:
Kai Engert wrote:
nsIX509Cert expects the underlying CERTCertificate to be complete and
valid, and serializing/restoring it based on the DER representation
will ensure it.
The message I got from Nelson's reply is that the DER representation
doesn't actually
Boris Zbarsky schrieb:
I'm not sure what parts of the CERTCertificate are needed for this; I'm
hoping
someone here will know.
I would propose you always save the full CERTCertificate.
I would prefer that we avoid having to implement special code for an
after-restore scenario where only
[EMAIL PROTECTED] wrote:
On Mar 30, 7:13 pm, Bill Burns [EMAIL PROTECTED] wrote:
Yes -- and we'll have screen shots of example websites that are
throwing OCSP-related errors because some well-known public CAs
cough are not scaled up to fully support OCSP. With Vista, this is
going to be
Bob Relyea wrote:
Matthew Gertner wrote:
We want our extension to have its own certificate database, separate
from the one used by Firefox. Apparently this will be possible with
NSS 3.11, but I was told that there might be an issue with the
internal data structures. If PSM handles global
Nelson B Bolyard wrote:
Presently, A user must initiate the first fetch of a CRL from the CA.
CRLs are fetched asynchronously from cert chain validation.
CRLs are stored on disk locally, IIRC. After fetching the first one,
mozilla clients will fetch subsequent CRLs automatically on a periodic
Kai Engert wrote:
Jean-Marc Desperrier wrote:
I don't know where Bob's message appeared originally. It's not on the
newsserver, on google or my mail (might be the fault of the strong
filtering on alussinan.org).
Bob sent his message to the dev-tech-crypto mailinglist that is
supposed
Nelson B wrote:
Philip Hoyer wrote:
I was wondering if it is possible to get hold of, within a Firefox plug
in code or Javascript, the certificate of the server of the SSL session
(one way) of the page on which the plug in or script resides.
So basically
1) URL typed into browser
, Thunderbird and Semonkey for Linux, Mac OS
X and Win32 available. (All names are trademarks of their respective owners)
http://kuix.de/mozilla/ocspproxy/20060202/
Please feel free to provide feedback by private mail (kengert@), all
comments are highly welcome.
Thanks and Regards,
Kai
Kai Engert
201 - 213 of 213 matches
Mail list logo