Rob,
Please fix the bug in the "old" certificate verification library. Thanks.
Are you going to use the approach outlined by Nelson in bug 479508 and
bug 482153?
Wan-Teh
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Brian,
It has been well over 3 years since the cross-certification looping bug
described in Bug #479508 and Bug #634074 was first filed. It was
decided that the proper fix was to wait for Firefox to migrate to
libpkix by default. We and our customers have been waiting patiently
for this fix
On 06/08/2012 01:06 PM, Denis Cormier wrote:
I plan on using a randomly generated 32-byte key provided by a trusted 3rd
party. I also plan on using a randomly generated 32-byte initialization
vector generated by NSS within Firefox (to use with the AES Chain Block
Cipher scheme).
So you are fetchi
I plan on using a randomly generated 32-byte key provided by a trusted 3rd
party. I also plan on using a randomly generated 32-byte initialization
vector generated by NSS within Firefox (to use with the AES Chain Block
Cipher scheme).
What should I do with the initialization vector? I read that yo
4 matches
Mail list logo