Re: multiple pkcs 12 files vs. firefox software pkcs 11 module...
[EMAIL PROTECTED] wrote, On 2008-10-28 13:29: From what I have read, the internal pkcs 11 data store is protected by 1 master password. Is there a way to store my keys in the firefox pkcs 11 data store with their own password [...]? No, at the present time, there is not. ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto
when was TLS introduced into NSS?
I'm unable to determine when some specific features where added to NSS. Will you assist me with the following? Which production version of NSS first introduced TLS v1? As well, has NSS allways supported: the cipher suite DES-CBC3-SHA? Thank you, Gordon ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto
Re: multiple pkcs 12 files vs. firefox software pkcs 11 module...
On Oct 28, 5:10 pm, Nelson B Bolyard [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote, On 2008-10-28 13:29: From what I have read, the internal pkcs 11 data store is protected by 1 master password. Is there a way to store my keys in the firefox pkcs 11 data store with their own password [...]? No, at the present time, there is not. Could I get around this problem by creating a new pkcs 11 data store for my extension? (with code reuse from certutil.c) Or will calling NSS_Initialize from within the extension cause problems with the rest of Firefox... Dan ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto
Re: when was TLS introduced into NSS?
On Tue, Oct 28, 2008 at 4:09 PM, Gordon.Young [EMAIL PROTECTED] wrote: I'm unable to determine when some specific features where added to NSS. Will you assist me with the following? Which production version of NSS first introduced TLS v1? All open-source versions of NSS (NSS 3.2 or later) support TLS 1.0. As well, has NSS allways supported: the cipher suite DES-CBC3-SHA? Yes. In NSS, that cipher suite is called SSL_RSA_WITH_3DES_EDE_CBC_SHA, which is the standard name of the cipher suite. Wan-Teh ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto
Re: multiple pkcs 12 files vs. firefox software pkcs 11 module...
[EMAIL PROTECTED] wrote: On Oct 28, 5:10 pm, Nelson B Bolyard [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote, On 2008-10-28 13:29: From what I have read, the internal pkcs 11 data store is protected by 1 master password. Is there a way to store my keys in the firefox pkcs 11 data store with their own password [...]? No, at the present time, there is not. Could I get around this problem by creating a new pkcs 11 data store for my extension? (with code reuse from certutil.c) Or will calling NSS_Initialize from within the extension cause problems with the rest of Firefox... NSS_Initialize will not add a new database, but there is a call that will.: https://developer.mozilla.org/en/NSS_PKCS11_Functions#SECMOD_OpenUserDB Some caveats: While the database is open, those keys and certs are accessible to mozilla. It will look like a new token to NSS (just as if you inserted a smart card). If Mozilla desides to use one of the certs, it may ask the user to log into your token (if you aren't already logged in). That token can have a different password that the firefox built-in store. When you are through you can get rid of close the database with: https://developer.mozilla.org/en/NSS_PKCS11_Functions#SECMOD_CloseUserDB Closing the database will act just as if it were a smart card that was suddenly removed. bob Dan ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto smime.p7s Description: S/MIME Cryptographic Signature ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto