> In fact, it is no longer necessary to call PR_Init(). NSPR is now implicitly
> initialized, usually by the first NSPR function the program calls.
I believe that the above fact(and those like these..) should be
mentioned separately in the NSPR documentationI have been doing
the initializatio
Subrata Mazumdar wrote:
> Eddy,
> I think that you can do it. Have you looked into nsIPK11Token interface
> (http://lxr.mozilla.org/mozilla1.8.0/source/security/manager/ssl/public/nsIPK11Token.idl)
>
> ?
> The nsIPK11Token interface would allow you to filter tokens based on a
> number of attri
Robert Relyea wrote, On 2008-02-19 14:20:
> Eddy Nigg (StartCom Ltd.) wrote:
>> Does anybody know if and which parameters might be obtained by the
>> window.crypto functions and smart cards? For reference see this page:
>> http://developer.mozilla.org/en/docs/JavaScript_crypto#Handling_Smart_Card
Eddy,
I think that you can do it. Have you looked into nsIPK11Token interface
(http://lxr.mozilla.org/mozilla1.8.0/source/security/manager/ssl/public/nsIPK11Token.idl)
?
The nsIPK11Token interface would allow you to filter tokens based on a
number of attributes and
eventually you can determin
Robert Relyea wrote:
> No, the API does not give you direct information about how many or
> which tokens are installed. Typically that information is gleened by
> doing a 'request/not require' client auth.
I obviously know what client auth is, but what is "'request/not require'
client auth"?
>
Eddy Nigg (StartCom Ltd.) wrote:
Does anybody know if and which parameters might be obtained by the
window.crypto functions and smart cards? For reference see this page:
http://developer.mozilla.org/en/docs/JavaScript_crypto#Handling_Smart_Card_Events
Specifically I'd like to know if there is
On Feb 18, 2008 9:04 PM, D3!$ <[EMAIL PROTECTED]> wrote:
> Hi All,
>
> I want to know what maxPTDs argument of PR_Init is...
> http://www.mozilla.org/projects/nspr/reference/html/prinit.html#15734
>
> The description says:
> maxPTDsThis parameter is ignored.
>
> Then what's its purpose???
On 19 fév, 11:58, Nelson Bolyard <[EMAIL PROTECTED]>
wrote:
> Sidjy wrote, On 2008-02-19 01:23:
>
> > it seems that importing PKCS12 certificates with a friendlyname
> > containing ":" characters has a strange behaviour : certificate is
> > successfully imported, and is visible in the certificate r
I am trying to use JSS for TLS/SSL communciations from inside an application
server; more specifically I am writing a plugin component for an application
that may already use (and initialize) JSS. It is not clear from the Javadoc
how initialization should work in this case.
1) Is it possible t
Hi Nelson,
Nelson Bolyard wrote:
> Eddy Nigg (StartCom Ltd.) wrote, On 2008-02-18 08:09:
>
>> Does anybody know if and which parameters might be obtained by the
>> window.crypto functions and smart cards? For reference see this page:
>> http://developer.mozilla.org/en/docs/JavaScript_crypto#H
Eddy Nigg (StartCom Ltd.) wrote, On 2008-02-18 08:09:
> Does anybody know if and which parameters might be obtained by the
> window.crypto functions and smart cards? For reference see this page:
> http://developer.mozilla.org/en/docs/JavaScript_crypto#Handling_Smart_Card_Events
>
> Specifically
Sidjy wrote, On 2008-02-19 01:23:
> it seems that importing PKCS12 certificates with a friendlyname
> containing ":" characters has a strange behaviour : certificate is
> successfully imported, and is visible in the certificate repository
> (with its friendly name) BUT it is not usable for SSL aut
Nelson Bolyard wrote, On 2008-02-16 21:17:
> [EMAIL PROTECTED] wrote, On 2008-02-11 14:56:
>> In preferences/security I have "select automatically" active, but
>> SeaMonkey still require me to confirm each certificate when visiting sites.
>> Where is the disconnect and how can I edit the configs t
Hi all,
it seems that importing PKCS12 certificates with a friendlyname
containing ":" characters has a strange behaviour : certificate is
successfully imported, and is visible in the certificate repository
(with its friendly name) BUT it is not usable for SSL authentication
(not listed in the cer
14 matches
Mail list logo