certutil -K -d .
Enter Password or Pin for NSS FIPS 140-2 Certificate DB:
0 cn=foo-Signature
1 cn=foo-Encryption
2 cn=foo-Identity
certutil -L -d .
cn=foo-Identity u,u,u
cn=foo-Identity u,u,u
cn=foo-Identity u,u,u
certutil
David Stutzman wrote, On 2008-11-28 09:51 PST:
certutil -K -d .
Enter Password or Pin for NSS FIPS 140-2 Certificate DB:
0 cn=foo-Signature
1 cn=foo-Encryption
2 cn=foo-Identity
certutil -L -d .
cn=foo-Identity u,u,u
cn=foo-Identity u,u,u
Eddy Nigg wrote:
Frank: I think the critical issues what Mozilla concerns have been
addressed!
I agree, and am going to proceed with approval of this request.
We need to make sure that naming constraints work as expected.
I read through the thread on that, and will read it again to confirm
Frank Hecker wrote:
Per the CA schedule, the next CA on the list for public comment is
WISeKey, which has applied to add its (one) root CA certificate to the
Mozilla root store, as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=371362
and in the pending
Frank Hecker wrote:
Frank Hecker wrote:
Per the CA schedule, the next CA on the list for public comment is
WISeKey, which has applied to add its (one) root CA certificate to the
Mozilla root store, as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=371362
and
Michael Ströder wrote, On 2008-11-27 06:02:
Anders Rundgren wrote:
So what is then real problem?
1. The European Smart Card industry who do not want to become suppliers
of commodities.
???
Each time I talked to smartcard vendors they were keen on selling their
stuff. The more the
6 matches
Mail list logo