Wan-Teh,
Thanks for your response, comments inline.
On 10/25/2012 11:17, Wan-Teh Chang wrote:
Any client apps that care about the exact cipher suites enabled need
to enable and disable each cipher suite explicitly. This Chromium code
in this file can be used as code example:
http://src.chromi
Chris,
On 10/25/2012 16:18, Chris Newman wrote:
Will vulnerability fixes can be provided on the NSS 3.13.x patch
train? And if so, is there a date when vulnerability fixes will no
longer be provided for that version?
- Chris
As I'm no longer a developer on NSS, I will let others a
--On October 24, 2012 22:19:40 -0700 Julien Pierre
wrote:
2)
- The NSS license has changed to MPL 2.0. Previous releases were
released under a MPL 1.1/GPL 2.0/LGPL 2.1 tri-license. For more
information about MPL 2.0, please see
http://www.mozilla.org/MPL/2.0/FAQ.html. For an additional explanta
On Wed, Oct 24, 2012 at 10:19 PM, Julien Pierre
wrote:
>
> The following changes may be problematic :
>
> 1) * New default cipher suites
>
> ( https://bugzilla.mozilla.org/show_bug.cgi?id=792681 )
>
> The default cipher suites in NSS 3.14 have been changed to better
> reflect the current security
On Thu, 2012-10-25 at 15:36 +0200, Wolfgang Rosenauer wrote:
> With that version the testsuite fails:
>
> [ 1202s] chains.sh: #2294: Test that OCSP server is reachable - FAILED
> [ 1202s] chains.sh: #4023: Test that OCSP server is reachable - FAILED
> [ 1202s] chains.sh: #6393: Test that OCSP ser
5 matches
Mail list logo