I have NSS-based DKIM signing working in our mail server software, but
run into a problem when trying to do it in FIPS mode.
I've been importing the DKIM private key using either
PK11_ImportPrivateKeyInfoAndReturnKey or
PK11_ImportDERPrivateKeyInfoAndReturnKey, but these APIs don't work in
FI
Is there a mailing list I can subscribe to where notice is posted about
NSS CVEs such as CVE-2017-7805?
This information used to be in NSS release notes, which was helpful to
know when a new release was important to pick up promptly, but it hasn't
been for more recent CVEs like this one and CV
Why not just add -std=gnu99 to the gcc switches so the code can at least use
the 16-year old version of the C standard?
- Chris
On February 3, 2016 at 17:59:14 , Martin Thomson (m...@mozilla.com) wrote:
Yes, the landing of the first patches for TLS 1.3 was a bit messy. We are
w
--On October 20, 2014 16:43:01 -0700 Julien Pierre
wrote:
> Hubert,
>
> On 10/20/2014 05:10, Hubert Kario wrote:
>> So I went over the https://wiki.mozilla.org/Security/Server_Side_TLS
>> article with a bit more attention to detail and I think we should
>> extend it in few places.
>>
>> Especial
--On July 16, 2014 17:32:22 +0200 Kai Engert wrote:
> On Mon, 2014-07-14 at 23:38 +0200, Bernhard Thalmayr wrote:
>> Is there any documentation available for '--extSAN' parameter? Mr.
>> Google did not find any helpful resource.
>
> Look at the help output that certutil produces with the -H com
As a non-Firefox/non-HTTP consumer of NSS, I'd like to see an NSS API flag
indicating a cipher suite is retained for backwards compatibility but
considered inferior by cryptographic community standards at the time the
NSS library was built.
A. is unacceptable because it breaks copy/paste of UR
--On June 17, 2013 10:23:52 -0400 Miloslav Trmač wrote:
me and Milan Bartoš plan to spend some time working on making NSS easier
to develop for - to make sure there is easy to find documentation, the
applications don't need unnecessary boilerplate code, and so on.
The current list of items we'l
NSS component in bugzilla. See
https://bugzilla.mozilla.org/userprefs.cgi?tab=component_watch for how
you can subscribe to a feed of all NSS bug discussions.
Thanks, I subscribed.
Chris Newman wrote:
Will vulnerability fixes can be provided on the NSS 3.13.x patch
train? And if so, is there a date w
--On October 24, 2012 22:19:40 -0700 Julien Pierre
wrote:
2)
- The NSS license has changed to MPL 2.0. Previous releases were
released under a MPL 1.1/GPL 2.0/LGPL 2.1 tri-license. For more
information about MPL 2.0, please see
http://www.mozilla.org/MPL/2.0/FAQ.html. For an additional explanta
9 matches
Mail list logo