On 2009-08-07 02:21 PDT, Michael Ströder wrote:
> Nelson Bolyard wrote:
>> On 2009-08-06 03:47, Michael Ströder wrote:
>>> Eddy Nigg wrote:
>>>>> Quite a while ago, I read a message from someone saying he had devised,
>>>>> or was going to devise, a scheme to extract all of Mozilla's trusted root
>>>>> certs from NSS and make PEM files from them, and use them as trusted
>>>>> certs
>>>>> in some other non-NSS-based product.
>>>>>
>>>>> Does anyone remember that?
>>>>> Can you point me to the person(s) who did that?
>>>>> I'd like to ask them about it, and maybe reuse it.
>>>>>    
>>>> Yes, that was Curl and here the link to the page
>>>> http://curl.netmirror.org/docs/caextract.html and this is the tool:
>>>> http://curl.netmirror.org/docs/parse-certs.txt
>>> It's about trust after all...
>>> So I wonder whether there's a chance to verify the integrity of
>>> http://mxr.mozilla.org/seamonkey/source/security/nss/lib/ckfw/builtins/certdata.txt
>> Compare it to the master copy at
>> http://mxr.mozilla.org/security/source/security/nss/lib/ckfw/builtins/certdata.txt
> 
> Nelson, that's not even a HTTPS URL.
> 
> Ciao, Michael.

OK, so do a cvs checkout over ssh instead.
My point was that you can compare your source file against another.
The means by which you get it is another matter.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to