with the fact that NSS doesn't load the
>system-configured PKCS#11 tokens by default, which is an orthogonal
>issue probably outside the scope of your interest, Jan.
Don't know much about NSS. Wrote some code years ago, was curious how
it worked, but probably forgot even that lit
people making the
>mistake of assuming that the X.509 subject is unique (I've fixed bugs
>in certificate chain validation in both OpenSSL and GnuTLS because of
>that), as well as jumping through hoops to present the full trust
>chain on the wire in the OpenConnect VPN client, because t
2 matches
Mail list logo