Nelson: please trust us. the product has specific design constraints.

the purpose is to allow for mozilla to sit between e.g. MSIE or
Acrobat Reader and a web server, analyze the stream and then do
something based on it.

The only way that this works is for MSIE or whatever to *install* a
certificate from this product and actively mark the I trust this well
known evil certificate box. It's well documented, it's understood,.

And it has nothing to do with the problem.

I appreciate your general work on NSS. But I really hate the NSS
team's attitude toward this certain class of questions. You didn't
answer the question, but went off on a misdirected rant.

Unfortunately umesh didn't explain exactly which path was taken. And
umesh didn't indicate if he used the NSS debug env vars to get extra
logging. Nor did umesh indicate if he had tried using ssltap in
conjunction with this, or using a mozilla as the client with it
configured w/ the NSS debug env vars.

So I really can't get a useful picture.

For most of the purposes of umesh's question, *ignore* the goal and
simply worry about why the async handshake didn't work - I have no
idea what he's talking about here, I haven't seen the code in over a
year.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to