So I'm getting ready to push some of the bug fixes we made in RHEL after
the nss-3.101 rebase and I've found that we have test failures. After
debugging I found that we have issues with the tools test. One of the
fixed
https://hg.mozilla.org/projects/nss/rev/26d04d787d02e68c7f0752c16a113b7157ac
I don't know if it broke this morning or on May 1. Who do we ping to fix it?
It's clearly broken on nss-try, I suspect it's also broken for NSS, but
the last checking was April 30 when it was still working.
bob
--
You received this message because you are subscribed to the Google Groups
"dev
I think I sent this to the wrong list since I only got a response from
Kai...
I still have 3 patches that I need to get into ESR that have been under
review for a while (one of them 11 months). Any chance we can mark these
to get priority. I just rebased the 11 month old one a month ago, but
On 10/12/23 4:52 AM, Falko Strenzke wrote:
Hi Robert, thanks for your feedback. See my answers below.
Robert Relyea schrieb am Montag, 25. September 2023 um 19:23:04 UTC+2:
On 8/21/23 11:52 PM, Falko Strenzke wrote:
Hi John,
that is great to hear. Our two interests are PQC
On 8/21/23 11:52 PM, Falko Strenzke wrote:
Hi John,
that is great to hear. Our two interests are PQC algorithms for TLS in
Firefox and S/MIME in Thunderbird. As I understand it you are working
on the former. Hash-based signatures are also interesting for us,
mainly stateless ones. Are you goi
On 9/22/23 7:42 AM, Kai Engert wrote:
Hi Falko,
On 22.08.23 08:52, Falko Strenzke wrote:
Our two interests are PQC algorithms for TLS in Firefox and S/MIME in
Thunderbird. As I understand it you are working on the former.
does the experimental code in bug 1775046, which John mentioned, help
On 5/25/23 8:02 AM, Brian Reichert wrote:
On Thu, May 25, 2023 at 02:14:46PM +0100, Dennis Jackson wrote:
Are you sure that your
environment is configured to use the correct gcc version? It might be you
have gcc 9 installed but not selected.
I think you're on to something; I did already install
On 5/15/23 4:14 AM, Dennis Jackson wrote:
Dear wordlesswind,
Kernel TLS isn't something we currently have on our roadmap as it
doesn't provide much benefit for the types of client applications we
typically consider (e.g. Firefox, Thunderbird and similar). I don't
know if it's the kind of feat
sek Krenzelok
<mailto:fkren...@redhat.com>Hubert Kario <mailto:hka...@redhat.com>John
Schanck <mailto:jscha...@mozilla.com>Simo Sorce
<mailto:s...@redhat.com>Robert Relyea <mailto:rrel...@redhat.com>
Potential Agenda Items:
*
Overview of major projects, e.g.
sn't work, that might be worth flagging to us.
We also accept patches and would be happy to look at a patch that
updates our copy of sqlite if that works better for you.
On Thu, Mar 16, 2023 at 10:08 AM Robert Relyea
wrote:
On 3/15/23 8:39 AM, Usha Nayak wrote:
On 3/15/23 8:39 AM, Usha Nayak wrote:
Hello,
We are building NSS and are packing it in our product. For our
application we use IAIK PKCS#11 wrapper to connect to NSS.
Following properties file contains information that's used by iaik to
connect to NSS :
image.png
We use following commands
On 12/8/22 9:31 AM, John Schanck wrote:
Hi Bob, 3.86 is being released today. So that patch will have to go in 3.87.
glad Ii asked. I'll wait for the branch to check in. Thanks.
bob
John
On Thu, Dec 8, 2022 at 8:10 AM Robert Relyea wrote:
https://phabricator.services.mozill
https://phabricator.services.mozilla.com/D163498
--
You received this message because you are subscribed to the Google Groups
"dev-tech-crypto@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to dev-tech-crypto+unsubscr...@mozilla.org.
To view
On 6/30/22 12:06 PM, Andrew Cagney wrote:
Hi,
I'm reading this code:
NSSLOWKEYSubjectPublicKeyInfo spki;
NSSLOWKEYPublicKey pubk;
SECItem *publicKeyInfo;
if (SEC_ASN1EncodeItem(arena, &spki.subjectPublicKey,
&pubk, nsslowkey_R
On 5/31/22 8:24 AM, Dennis Jackson wrote:
Hi Wolfgang, ajs124,
Thank you both for writing to let us know. We will keep the schedule
as-is to avoid any breakage then.
Best wishes,
Dennis
For us (red hat). It's particularly true for ESR, so please don't try to
Jam 3.80 into Firefox ESR. I'v
r if we can ask the treeherder owners to look into
what may be causing our intermittent issues?
bob
On Wed, Mar 30, 2022 at 9:55 AM Robert Relyea wrote:
It looks like we are getting persistent Win 2012 failures in Ninja
from
the following patch:
https://hg.mozilla.org/p
It looks like we are getting persistent Win 2012 failures in Ninja from
the following patch:
https://hg.mozilla.org/projects/nss/rev/b83ad33acd678c78c91b836ad42310e75cac3361
A quick look looks like it's a problem in an MPI test program which gets
RNG_RNGInit() added to it even though RNG is pa
On 10/14/21 12:25 PM, AZ19AGENT Minecraft wrote:
I have a mozilla NSSDB PKCS11, it includes one of three things.
Certificates, keys, and SecretKeyEntry. I would like to know the
content of a SecretKeyEntry with the alias "StoreXKey". Firstly, is
extracting the plaintext of a SecretKeyEntry po
On 10/7/21 9:45 AM, Marcin Cieslak wrote:
Hello,
It seems that no-one is currently maintaining python-nss project.
I have prepared some early patches to make it build again and
to fix some PKCS#12 issues[1] and I would like to know if there
is a away to commit them to the python-nss Mercurial re
issue because we don't ship that code in our NSS
release since it's never been integrated into the NSS builds;). Our
Firefox team must have their own copy.
At some point we should make it a issue I'd really love to loose
libpkix;).
bob
On Tue, Aug 24, 2021 at 1:4
On 8/23/21 3:04 AM, Kai Engert wrote:
Bob,
FYI, the usual deadline for the NSS version of ESR is 4 weeks prior to
the release of a new ESR, which is the time ESR goes into beta.
The agreement we've had is that is 2 release prior. The biggest issue is
a major change like this was not announce
was
to pick up NSPR 4.32 into Firefox and that triggered the more expansive
picking up on NSS 3.68. (I'm hoping that's the case).
bob
B.
On Aug 20, 2021, at 7:36 PM, Robert Relyea wrote:
On 8/20/21 1:44 AM, Kai Engert wrote:
Hello Bob,
you didn't say which ESR versi
er actually announced NSS 3.68 on this list
(which makes it even more problematic that we make it a requirement for
ESR 91.
bob
https://kuix.de/mozilla/versions/
Kai
On 18.08.21 19:29, Robert Relyea wrote:
On 8/8/21 10:12 PM, Martin Thomson wrote:
Network Security Services (NSS) 3.6
On 8/8/21 10:12 PM, Martin Thomson wrote:
Network Security Services (NSS) 3.69 was released on 5 August 2021.
The HG tag is NSS_3_69_RTM. NSS 3.69 requires NSPR 4.32 or newer.
Hey, was there a bump in the version requirements on NSS for ESR? This
is a serious problem for us. It takes us a mo
bob
On Fri, Apr 16, 2021 at 03:25:07PM -0700, Robert Relyea wrote:
NSS hides the symbols with shared libraries that only export a curated set
of public symbols. Each nss shared library has it's own symbol list found in
{sharedlibname}.def so lib/nss/nss.def lib/util/nssutil.def lib/ssl/ss
On 4/16/21 11:12 AM, Thomas Klausner wrote:
Hi Ryan!
Thanks for the reply.
Bob's reply was quite helpful already with his hint that nothing
should link against softokn3 or freebl. This was a bug in pkgsrc
previously, but I fixed it after his message. Nothing in pkgsrc now
links against either o
On 4/7/21 5:18 AM, Thomas Klausner wrote:
Hi!
TL;DR: nss has some of the same symbols as openssl, which leads to
core dumps when both are linked in the same binary
Long version:
Recently I tried packaging Sigil for pkgsrc. It links against nss via
qtwebengine. It also links against openssl via
27 matches
Mail list logo