Custom Query (16 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (7 - 9 of 16)

1 2 3 4 5 6
Ticket Resolution Summary Owner Reporter
#18 fixed mod_gnutls: Does not support aarch64 https://id.mayfirst.org/dkg https://id.mayfirst.org/dkg
Description

imported from mantis, e-ndy wrote:

https://bugzilla.redhat.com/show_bug.cgi?id=926157

#22 fixed test suite not VPATH-safe https://id.mayfirst.org/dkg myopenidmail
Description

=========================================

mod_gnutls 0.5.10: ./test-suite.log

=========================================

# TOTAL: 1 # PASS: 0 # SKIP: 0 # XFAIL: 0 # FAIL: 1 # XPASS: 0 # ERROR: 0

.. contents:: :depth: 2

FAIL: run_tests.sh ==================

make: Entering an unknown directory make: * t: No such file or directory. Stop. make: Leaving an unknown directory

#23 fixed enable pkcs11 for server secret key material https://id.mayfirst.org/dkg https://id.mayfirst.org/dkg
Description

Nikos writes on-list with a good suggestion:

I was thinking ways of how a memory leakage in mod_gnutls could have prevented revealing secrets such as the server's private key, and I think that this could be "easily" doable if mod_gnutls would support pkcs11 keys (from a quick glimpse I think it doesn't yet). If it would support it, then one could use a software security module such as lsm-pkcs11 and separate the private key operations from the server process. I put "easily" on quotes because unfortunately lsm-pkcs11 seem to be a dead project and more modern modules like softhsm don't use any isolation between the key operations and the calling process.

Nevertheless, I think it would be a good feature to have.

I also think this would be a useful feature.

1 2 3 4 5 6
Note: See TracQuery for help on using queries.