On Thu, 21 Jan 2016, Robert Relyea wrote:
The call PK11_IsFIPS() returns true if softoken is in FIPS mode.
Oh, I did not know about this one. I guess once we (the application)
detect the system is in FIPS mode, we could verify that NSS is as well.
Finally, is there any example code out ther
On 01/21/2016 07:33 AM, jonetsu wrote:
Hello,
Please let me know if this is not the right place to ask about the
following...
This is the right place.
I am new to NSS and would like to use it in FIPS mode. I do know
about OpenSSL and GnuTLS, both of them having explicit calls to
enabled FIPS
Hello,
Please let me know if this is not the right place to ask about the
following...
I am new to NSS and would like to use it in FIPS mode. I do know
about OpenSSL and GnuTLS, both of them having explicit calls to
enabled FIPS mode. With NSS, so far I have seen that the modutil
non-programmat
On Tue, January 19, 2016 2:56 pm, s...@gmx.ch wrote:
> Hi
>
> We're already having some discussions about SHA-1, but I'll split this
> up into a new thread.
>
> The initial goal of bug 942515 was to mark certs as insecure, that are
> valid 'notBefore >= 2016-01-01' (means issued to use in 2016
Hubert Kario redhat.com> writes:
>
> Yes, I can confirm the bug. Will you file a bug in mozilla bugzilla
> against the NSS component?
>
Today I filed the Bug 1241446
https://bugzilla.mozilla.org/show_bug.cgi?id=1241446
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
htt
5 matches
Mail list logo