Have you tried exporting with PK11_ExportDERPrivateKeyInfo? That's what
WebCrypto uses to export keys in PKCSD#8 format:
http://dxr.mozilla.org/mozilla-central/source/dom/crypto/CryptoKey.cpp?#333
On Jul 13, 2014, at 10:48 PM, Chuck Lee chu...@mozilla.com wrote:
Hi all,
I am now
Is having it in by default useful enough to outweigh the risk?
When the Dual_EC_DRBG news stories were blowing it, it was revealed
that you could switch to it by just changing the Windows Registry.
It's a Windows-supported backdoor - no malicious code needs to stay
running on your system - just
On Tue, July 15, 2014 1:11 pm, Tom Ritter wrote:
Is having it in by default useful enough to outweigh the risk?
When the Dual_EC_DRBG news stories were blowing it, it was revealed
that you could switch to it by just changing the Windows Registry.
It's a Windows-supported backdoor - no
On Tue, July 15, 2014 1:11 pm, Tom Ritter wrote:
Is having it in by default useful enough to outweigh the risk?
When the Dual_EC_DRBG news stories were blowing it, it was revealed
that you could switch to it by just changing the Windows Registry.
It's a Windows-supported backdoor - no
Yes, but it doesn't work because it also calls PK11_ExportPrivKeyInfo()
to get the RSA private key info.
Now I am trying to decrypt key exported by
PK11_ExportEncryptedPrivKeyInfo() with method
SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4 directly, which seems to
be the most simple
5 matches
Mail list logo