This commit is contained in:
commit
1c91b6e634
23
.gitattributes
vendored
Normal file
23
.gitattributes
vendored
Normal file
@ -0,0 +1,23 @@
|
||||
## Default LFS
|
||||
*.7z filter=lfs diff=lfs merge=lfs -text
|
||||
*.bsp filter=lfs diff=lfs merge=lfs -text
|
||||
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.gem filter=lfs diff=lfs merge=lfs -text
|
||||
*.gz filter=lfs diff=lfs merge=lfs -text
|
||||
*.jar filter=lfs diff=lfs merge=lfs -text
|
||||
*.lz filter=lfs diff=lfs merge=lfs -text
|
||||
*.lzma filter=lfs diff=lfs merge=lfs -text
|
||||
*.obscpio filter=lfs diff=lfs merge=lfs -text
|
||||
*.oxt filter=lfs diff=lfs merge=lfs -text
|
||||
*.pdf filter=lfs diff=lfs merge=lfs -text
|
||||
*.png filter=lfs diff=lfs merge=lfs -text
|
||||
*.rpm filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.tgz filter=lfs diff=lfs merge=lfs -text
|
||||
*.ttf filter=lfs diff=lfs merge=lfs -text
|
||||
*.txz filter=lfs diff=lfs merge=lfs -text
|
||||
*.whl filter=lfs diff=lfs merge=lfs -text
|
||||
*.xz filter=lfs diff=lfs merge=lfs -text
|
||||
*.zip filter=lfs diff=lfs merge=lfs -text
|
||||
*.zst filter=lfs diff=lfs merge=lfs -text
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
||||
.osc
|
493
addon-certs.txt
Normal file
493
addon-certs.txt
Normal file
@ -0,0 +1,493 @@
|
||||
|
||||
#
|
||||
# Certificate "DFN PCA"
|
||||
#
|
||||
CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
|
||||
CKA_TOKEN CK_BBOOL CK_TRUE
|
||||
CKA_PRIVATE CK_BBOOL CK_FALSE
|
||||
CKA_MODIFIABLE CK_BBOOL CK_FALSE
|
||||
CKA_LABEL UTF8 "DFN PCA"
|
||||
CKA_CERTIFICATE_TYPE CK_CERTIFICATE_TYPE CKC_X_509
|
||||
CKA_SUBJECT MULTILINE_OCTAL
|
||||
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
|
||||
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
|
||||
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
|
||||
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
|
||||
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
|
||||
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
|
||||
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
|
||||
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
|
||||
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
|
||||
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
|
||||
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
|
||||
END
|
||||
CKA_ID UTF8 "0"
|
||||
CKA_ISSUER MULTILINE_OCTAL
|
||||
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
|
||||
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
|
||||
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
|
||||
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
|
||||
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
|
||||
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
|
||||
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
|
||||
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
|
||||
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
|
||||
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
|
||||
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
|
||||
END
|
||||
CKA_SERIAL_NUMBER MULTILINE_OCTAL
|
||||
\002\003\025\317\375
|
||||
END
|
||||
CKA_VALUE MULTILINE_OCTAL
|
||||
\060\202\006\332\060\202\005\302\240\003\002\001\002\002\003\025
|
||||
\317\375\060\015\006\011\052\206\110\206\367\015\001\001\005\005
|
||||
\000\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104
|
||||
\105\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164
|
||||
\163\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163
|
||||
\156\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104
|
||||
\106\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016
|
||||
\006\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055
|
||||
\060\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160
|
||||
\154\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164
|
||||
\151\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060
|
||||
\037\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145
|
||||
\162\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
|
||||
\060\036\027\015\060\061\061\062\060\061\061\062\061\061\061\066
|
||||
\132\027\015\061\060\060\061\063\061\061\062\061\061\061\066\132
|
||||
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
|
||||
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
|
||||
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
|
||||
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
|
||||
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
|
||||
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
|
||||
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
|
||||
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
|
||||
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
|
||||
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
|
||||
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145\060
|
||||
\202\001\042\060\015\006\011\052\206\110\206\367\015\001\001\001
|
||||
\005\000\003\202\001\017\000\060\202\001\012\002\202\001\001\000
|
||||
\301\171\256\023\055\353\071\241\304\256\150\130\374\023\330\121
|
||||
\273\122\236\323\344\072\057\035\040\377\140\243\310\107\033\057
|
||||
\015\151\202\341\324\363\007\042\001\056\163\246\021\371\144\373
|
||||
\222\200\250\006\032\243\247\230\326\241\164\205\036\026\211\056
|
||||
\003\214\053\047\356\135\363\066\217\370\213\147\205\340\111\206
|
||||
\022\113\001\312\006\370\265\031\123\116\027\016\356\027\205\137
|
||||
\340\356\346\241\150\222\317\216\066\246\273\321\031\160\072\275
|
||||
\245\347\162\225\302\063\027\004\053\102\054\124\212\104\265\156
|
||||
\305\350\171\371\051\244\233\341\156\072\154\004\272\011\335\063
|
||||
\151\373\340\070\343\311\377\103\010\346\207\031\232\307\301\120
|
||||
\341\371\132\162\344\334\270\154\240\222\156\213\243\107\027\171
|
||||
\067\033\022\265\113\041\015\126\323\171\055\301\361\073\263\000
|
||||
\226\362\301\205\204\023\267\253\243\037\273\131\067\320\257\310
|
||||
\257\110\040\141\254\322\167\351\124\143\001\277\041\211\137\110
|
||||
\273\055\223\230\226\050\332\203\362\013\306\267\170\315\361\217
|
||||
\322\256\330\205\267\265\055\263\245\370\210\316\337\161\274\123
|
||||
\002\003\001\000\001\243\202\003\001\060\202\002\375\060\017\006
|
||||
\003\125\035\023\001\001\377\004\005\060\003\001\001\377\060\035
|
||||
\006\003\125\035\016\004\026\004\024\006\013\372\265\370\110\170
|
||||
\243\040\261\013\076\317\240\320\304\321\177\175\320\060\201\333
|
||||
\006\003\125\035\043\004\201\323\060\201\320\200\024\006\013\372
|
||||
\265\370\110\170\243\040\261\013\076\317\240\320\304\321\177\175
|
||||
\320\241\201\262\244\201\257\060\201\254\061\013\060\011\006\003
|
||||
\125\004\006\023\002\104\105\061\041\060\037\006\003\125\004\012
|
||||
\023\030\104\145\165\164\163\143\150\145\163\040\106\157\162\163
|
||||
\143\150\165\156\147\163\156\145\164\172\061\026\060\024\006\003
|
||||
\125\004\013\023\015\104\106\116\055\103\105\122\124\040\107\155
|
||||
\142\110\061\020\060\016\006\003\125\004\013\023\007\104\106\116
|
||||
\055\120\103\101\061\055\060\053\006\003\125\004\003\023\044\104
|
||||
\106\116\040\124\157\160\154\145\166\145\154\040\103\145\162\164
|
||||
\151\146\151\143\141\164\151\157\156\040\101\165\164\150\157\162
|
||||
\151\164\171\061\041\060\037\006\011\052\206\110\206\367\015\001
|
||||
\011\001\026\022\143\145\162\164\151\146\171\100\160\143\141\056
|
||||
\144\146\156\056\144\145\202\003\025\317\375\060\013\006\003\125
|
||||
\035\017\004\004\003\002\001\006\060\021\006\011\140\206\110\001
|
||||
\206\370\102\001\001\004\004\003\002\000\007\060\201\245\006\003
|
||||
\125\035\037\004\201\235\060\201\232\060\113\240\111\240\107\206
|
||||
\105\150\164\164\160\072\057\057\167\167\167\056\144\146\156\055
|
||||
\160\143\141\056\144\145\057\143\145\162\164\151\146\151\143\141
|
||||
\164\151\157\156\057\170\065\060\071\057\147\061\057\144\141\164
|
||||
\141\057\143\162\154\163\057\162\157\157\164\055\143\141\055\143
|
||||
\162\154\056\143\162\170\060\113\240\111\240\107\206\105\150\164
|
||||
\164\160\072\057\057\167\167\167\056\144\146\156\055\160\143\141
|
||||
\056\144\145\057\143\145\162\164\151\146\151\143\141\164\151\157
|
||||
\156\057\170\065\060\071\057\147\061\057\144\141\164\141\057\143
|
||||
\162\154\163\057\162\157\157\164\055\143\141\055\143\162\154\056
|
||||
\143\162\154\060\070\006\011\140\206\110\001\206\370\102\001\003
|
||||
\004\053\026\051\150\164\164\160\163\072\057\057\167\167\167\056
|
||||
\144\146\156\055\160\143\141\056\144\145\057\143\147\151\057\143
|
||||
\150\145\143\153\055\162\145\166\056\143\147\151\077\060\113\006
|
||||
\011\140\206\110\001\206\370\102\001\010\004\076\026\074\150\164
|
||||
\164\160\072\057\057\167\167\167\056\144\146\156\055\160\143\141
|
||||
\056\144\145\057\143\145\162\164\151\146\151\143\141\164\151\157
|
||||
\156\057\160\157\154\151\143\151\145\163\057\170\065\060\071\160
|
||||
\157\154\151\143\171\056\150\164\155\154\060\070\006\011\140\206
|
||||
\110\001\206\370\102\001\015\004\053\026\051\124\150\145\040\104
|
||||
\106\116\040\124\157\160\055\114\145\166\145\154\040\103\145\162
|
||||
\164\151\146\151\143\141\164\151\157\156\040\101\165\164\150\157
|
||||
\162\151\164\171\060\144\006\003\125\035\040\004\135\060\133\060
|
||||
\131\006\013\053\006\001\004\001\331\032\202\054\001\001\060\112
|
||||
\060\110\006\010\053\006\001\005\005\007\002\001\026\074\150\164
|
||||
\164\160\072\057\057\167\167\167\056\144\146\156\055\160\143\141
|
||||
\056\144\145\057\143\145\162\164\151\146\151\143\141\164\151\157
|
||||
\156\057\160\157\154\151\143\151\145\163\057\170\065\060\071\160
|
||||
\157\154\151\143\171\056\150\164\155\154\060\015\006\011\052\206
|
||||
\110\206\367\015\001\001\005\005\000\003\202\001\001\000\046\155
|
||||
\250\272\044\313\173\236\113\232\277\053\361\053\062\306\237\116
|
||||
\006\312\335\063\052\272\174\316\141\021\247\210\247\222\333\330
|
||||
\356\237\257\221\252\046\142\355\220\140\056\334\036\255\055\226
|
||||
\263\327\101\010\141\172\330\342\134\146\376\337\246\211\264\160
|
||||
\344\020\015\015\302\262\163\142\161\340\076\313\361\357\075\060
|
||||
\312\301\015\077\214\061\177\336\312\261\045\246\323\264\130\371
|
||||
\376\277\200\204\005\354\227\273\011\155\364\107\072\273\067\244
|
||||
\164\064\300\154\337\151\211\201\331\367\236\332\245\024\334\067
|
||||
\065\273\064\347\101\104\214\363\152\347\204\135\153\011\111\243
|
||||
\316\161\373\017\220\045\336\356\100\316\062\146\061\351\106\033
|
||||
\360\202\327\275\031\355\124\250\045\035\244\313\013\037\067\214
|
||||
\050\235\001\364\150\160\040\212\216\044\043\042\076\002\243\161
|
||||
\100\153\237\247\241\111\176\364\074\353\327\276\070\304\333\341
|
||||
\163\204\361\223\311\071\022\343\276\035\331\100\200\234\277\152
|
||||
\204\372\335\131\174\301\214\353\246\072\070\111\272\324\365\151
|
||||
\347\046\365\351\143\226\310\146\207\127\015\172\175\064
|
||||
END
|
||||
|
||||
# Trust for Certificate "DFN PCA"
|
||||
CKA_CLASS CK_OBJECT_CLASS CKO_NETSCAPE_TRUST
|
||||
CKA_TOKEN CK_BBOOL CK_TRUE
|
||||
CKA_PRIVATE CK_BBOOL CK_FALSE
|
||||
CKA_MODIFIABLE CK_BBOOL CK_FALSE
|
||||
CKA_LABEL UTF8 "DFN PCA"
|
||||
CKA_CERT_SHA1_HASH MULTILINE_OCTAL
|
||||
\216\044\042\306\176\154\206\310\220\335\366\235\365\241\335\021
|
||||
\304\305\352\201
|
||||
END
|
||||
CKA_CERT_MD5_HASH MULTILINE_OCTAL
|
||||
\076\037\236\346\114\156\360\042\010\045\332\221\043\010\005\003
|
||||
END
|
||||
CKA_ISSUER MULTILINE_OCTAL
|
||||
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
|
||||
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
|
||||
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
|
||||
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
|
||||
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
|
||||
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
|
||||
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
|
||||
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
|
||||
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
|
||||
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
|
||||
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
|
||||
END
|
||||
CKA_SERIAL_NUMBER MULTILINE_OCTAL
|
||||
\002\003\025\317\375
|
||||
END
|
||||
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
|
||||
#
|
||||
# Certificate "ICP Brasil"
|
||||
#
|
||||
CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
|
||||
CKA_TOKEN CK_BBOOL CK_TRUE
|
||||
CKA_PRIVATE CK_BBOOL CK_FALSE
|
||||
CKA_MODIFIABLE CK_BBOOL CK_FALSE
|
||||
CKA_LABEL UTF8 "ICP Brasil"
|
||||
CKA_CERTIFICATE_TYPE CK_CERTIFICATE_TYPE CKC_X_509
|
||||
CKA_SUBJECT MULTILINE_OCTAL
|
||||
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
|
||||
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
|
||||
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
|
||||
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
|
||||
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
|
||||
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
|
||||
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
|
||||
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
|
||||
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
|
||||
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
|
||||
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
|
||||
\163\151\154\145\151\162\141
|
||||
END
|
||||
CKA_ID UTF8 "0"
|
||||
CKA_ISSUER MULTILINE_OCTAL
|
||||
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
|
||||
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
|
||||
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
|
||||
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
|
||||
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
|
||||
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
|
||||
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
|
||||
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
|
||||
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
|
||||
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
|
||||
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
|
||||
\163\151\154\145\151\162\141
|
||||
END
|
||||
CKA_SERIAL_NUMBER MULTILINE_OCTAL
|
||||
\002\001\004
|
||||
END
|
||||
CKA_VALUE MULTILINE_OCTAL
|
||||
\060\202\004\270\060\202\003\240\240\003\002\001\002\002\001\004
|
||||
\060\015\006\011\052\206\110\206\367\015\001\001\005\005\000\060
|
||||
\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122\061
|
||||
\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102\162
|
||||
\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064\111
|
||||
\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156\141
|
||||
\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141\040
|
||||
\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055\040
|
||||
\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102\162
|
||||
\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010\023
|
||||
\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101\165
|
||||
\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146\151
|
||||
\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141\163
|
||||
\151\154\145\151\162\141\060\036\027\015\060\061\061\061\063\060
|
||||
\061\062\065\070\060\060\132\027\015\061\061\061\061\063\060\062
|
||||
\063\065\071\060\060\132\060\201\264\061\013\060\011\006\003\125
|
||||
\004\006\023\002\102\122\061\023\060\021\006\003\125\004\012\023
|
||||
\012\111\103\120\055\102\162\141\163\151\154\061\075\060\073\006
|
||||
\003\125\004\013\023\064\111\156\163\164\151\164\165\164\157\040
|
||||
\116\141\143\151\157\156\141\154\040\144\145\040\124\145\143\156
|
||||
\157\154\157\147\151\141\040\144\141\040\111\156\146\157\162\155
|
||||
\141\143\141\157\040\055\040\111\124\111\061\021\060\017\006\003
|
||||
\125\004\007\023\010\102\162\141\163\151\154\151\141\061\013\060
|
||||
\011\006\003\125\004\010\023\002\104\106\061\061\060\057\006\003
|
||||
\125\004\003\023\050\101\165\164\157\162\151\144\141\144\145\040
|
||||
\103\145\162\164\151\146\151\143\141\144\157\162\141\040\122\141
|
||||
\151\172\040\102\162\141\163\151\154\145\151\162\141\060\202\001
|
||||
\042\060\015\006\011\052\206\110\206\367\015\001\001\001\005\000
|
||||
\003\202\001\017\000\060\202\001\012\002\202\001\001\000\300\363
|
||||
\056\167\005\377\206\371\276\122\035\233\376\124\000\160\165\100
|
||||
\212\306\246\150\271\026\166\114\017\367\364\277\264\342\210\201
|
||||
\032\313\350\354\276\144\201\245\071\107\135\352\346\055\223\323
|
||||
\032\377\172\124\246\007\037\064\010\364\275\211\271\202\314\243
|
||||
\102\217\136\232\307\076\307\251\270\125\154\044\366\052\214\145
|
||||
\040\212\344\104\044\002\257\324\267\211\373\052\342\304\327\350
|
||||
\035\176\334\035\042\014\137\122\303\355\340\054\215\255\216\164
|
||||
\101\136\173\050\315\224\117\314\171\256\271\263\022\072\373\114
|
||||
\200\206\245\045\000\227\150\025\251\356\261\152\050\276\156\146
|
||||
\021\325\012\346\131\240\122\000\156\175\056\271\053\216\266\055
|
||||
\155\030\105\156\205\003\173\120\312\373\244\374\263\222\372\223
|
||||
\307\074\242\112\133\036\226\275\275\343\063\264\065\102\366\303
|
||||
\311\353\103\026\136\036\232\235\122\250\325\107\013\161\265\021
|
||||
\310\107\215\275\231\336\125\022\200\001\116\250\273\007\143\016
|
||||
\374\045\261\242\262\164\122\260\171\335\023\241\016\073\156\145
|
||||
\012\201\311\276\301\135\336\115\031\067\351\103\247\117\002\003
|
||||
\001\000\001\243\201\322\060\201\317\060\116\006\003\125\035\040
|
||||
\004\107\060\105\060\103\006\005\140\114\001\001\000\060\072\060
|
||||
\070\006\010\053\006\001\005\005\007\002\001\026\054\150\164\164
|
||||
\160\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162
|
||||
\141\163\151\154\056\147\157\166\056\142\162\057\104\120\103\141
|
||||
\143\162\141\151\172\056\160\144\146\060\075\006\003\125\035\037
|
||||
\004\066\060\064\060\062\240\060\240\056\206\054\150\164\164\160
|
||||
\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162\141
|
||||
\163\151\154\056\147\157\166\056\142\162\057\114\103\122\141\143
|
||||
\162\141\151\172\056\143\162\154\060\035\006\003\125\035\016\004
|
||||
\026\004\024\212\372\361\127\204\021\023\065\220\102\372\127\111
|
||||
\124\151\015\244\304\360\067\060\017\006\003\125\035\023\001\001
|
||||
\377\004\005\060\003\001\001\377\060\016\006\003\125\035\017\001
|
||||
\001\377\004\004\003\002\001\006\060\015\006\011\052\206\110\206
|
||||
\367\015\001\001\005\005\000\003\202\001\001\000\031\003\227\065
|
||||
\123\370\140\042\036\216\162\002\300\176\042\140\025\152\157\230
|
||||
\066\126\252\125\167\323\366\307\026\230\374\210\032\033\045\051
|
||||
\271\270\072\155\355\070\253\142\035\124\305\355\337\101\241\245
|
||||
\142\062\136\373\334\335\372\054\317\105\260\152\134\365\120\003
|
||||
\176\004\135\314\044\342\252\126\271\375\141\036\270\226\175\332
|
||||
\361\360\007\052\112\252\372\012\344\005\301\052\373\344\132\054
|
||||
\113\071\160\014\000\332\357\111\223\357\006\143\002\144\041\235
|
||||
\234\166\304\236\260\175\151\123\365\124\037\113\377\311\141\342
|
||||
\034\354\133\236\330\223\113\167\115\024\071\043\014\152\042\277
|
||||
\267\277\136\234\243\107\020\015\237\272\221\367\274\110\240\177
|
||||
\221\041\341\265\100\067\225\150\206\264\346\350\306\071\337\036
|
||||
\327\101\226\153\324\301\073\153\236\145\024\111\322\171\075\056
|
||||
\232\123\200\215\035\246\001\273\322\063\225\371\241\046\115\256
|
||||
\147\255\167\074\223\217\147\345\010\317\002\013\263\013\151\275
|
||||
\044\221\331\340\104\211\124\004\141\305\327\364\271\236\143\333
|
||||
\053\357\100\343\253\035\337\172\052\053\311\374
|
||||
END
|
||||
|
||||
# Trust for Certificate "ICP Brasil"
|
||||
CKA_CLASS CK_OBJECT_CLASS CKO_NETSCAPE_TRUST
|
||||
CKA_TOKEN CK_BBOOL CK_TRUE
|
||||
CKA_PRIVATE CK_BBOOL CK_FALSE
|
||||
CKA_MODIFIABLE CK_BBOOL CK_FALSE
|
||||
CKA_LABEL UTF8 "ICP Brasil"
|
||||
CKA_CERT_SHA1_HASH MULTILINE_OCTAL
|
||||
\216\375\312\274\223\346\036\222\135\115\035\355\030\032\103\040
|
||||
\244\147\241\071
|
||||
END
|
||||
CKA_CERT_MD5_HASH MULTILINE_OCTAL
|
||||
\226\211\175\141\321\125\053\047\342\132\071\264\052\154\104\157
|
||||
END
|
||||
CKA_ISSUER MULTILINE_OCTAL
|
||||
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
|
||||
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
|
||||
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
|
||||
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
|
||||
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
|
||||
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
|
||||
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
|
||||
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
|
||||
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
|
||||
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
|
||||
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
|
||||
\163\151\154\145\151\162\141
|
||||
END
|
||||
CKA_SERIAL_NUMBER MULTILINE_OCTAL
|
||||
\002\001\004
|
||||
END
|
||||
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
|
||||
#
|
||||
# Certificate "ICP Brasil CA"
|
||||
#
|
||||
CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
|
||||
CKA_TOKEN CK_BBOOL CK_TRUE
|
||||
CKA_PRIVATE CK_BBOOL CK_FALSE
|
||||
CKA_MODIFIABLE CK_BBOOL CK_FALSE
|
||||
CKA_LABEL UTF8 "ICP Brasil CA"
|
||||
CKA_CERTIFICATE_TYPE CK_CERTIFICATE_TYPE CKC_X_509
|
||||
CKA_SUBJECT MULTILINE_OCTAL
|
||||
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
|
||||
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
|
||||
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
|
||||
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
|
||||
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
|
||||
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
|
||||
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
|
||||
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
|
||||
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
|
||||
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
|
||||
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
|
||||
\163\151\154\145\151\162\141
|
||||
END
|
||||
CKA_ID UTF8 "0"
|
||||
CKA_ISSUER MULTILINE_OCTAL
|
||||
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
|
||||
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
|
||||
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
|
||||
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
|
||||
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
|
||||
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
|
||||
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
|
||||
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
|
||||
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
|
||||
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
|
||||
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
|
||||
\163\151\154\145\151\162\141
|
||||
END
|
||||
CKA_SERIAL_NUMBER MULTILINE_OCTAL
|
||||
\002\001\004
|
||||
END
|
||||
CKA_VALUE MULTILINE_OCTAL
|
||||
\060\202\004\270\060\202\003\240\240\003\002\001\002\002\001\004
|
||||
\060\015\006\011\052\206\110\206\367\015\001\001\005\005\000\060
|
||||
\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122\061
|
||||
\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102\162
|
||||
\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064\111
|
||||
\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156\141
|
||||
\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141\040
|
||||
\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055\040
|
||||
\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102\162
|
||||
\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010\023
|
||||
\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101\165
|
||||
\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146\151
|
||||
\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141\163
|
||||
\151\154\145\151\162\141\060\036\027\015\060\061\061\061\063\060
|
||||
\061\062\065\070\060\060\132\027\015\061\061\061\061\063\060\062
|
||||
\063\065\071\060\060\132\060\201\264\061\013\060\011\006\003\125
|
||||
\004\006\023\002\102\122\061\023\060\021\006\003\125\004\012\023
|
||||
\012\111\103\120\055\102\162\141\163\151\154\061\075\060\073\006
|
||||
\003\125\004\013\023\064\111\156\163\164\151\164\165\164\157\040
|
||||
\116\141\143\151\157\156\141\154\040\144\145\040\124\145\143\156
|
||||
\157\154\157\147\151\141\040\144\141\040\111\156\146\157\162\155
|
||||
\141\143\141\157\040\055\040\111\124\111\061\021\060\017\006\003
|
||||
\125\004\007\023\010\102\162\141\163\151\154\151\141\061\013\060
|
||||
\011\006\003\125\004\010\023\002\104\106\061\061\060\057\006\003
|
||||
\125\004\003\023\050\101\165\164\157\162\151\144\141\144\145\040
|
||||
\103\145\162\164\151\146\151\143\141\144\157\162\141\040\122\141
|
||||
\151\172\040\102\162\141\163\151\154\145\151\162\141\060\202\001
|
||||
\042\060\015\006\011\052\206\110\206\367\015\001\001\001\005\000
|
||||
\003\202\001\017\000\060\202\001\012\002\202\001\001\000\300\363
|
||||
\056\167\005\377\206\371\276\122\035\233\376\124\000\160\165\100
|
||||
\212\306\246\150\271\026\166\114\017\367\364\277\264\342\210\201
|
||||
\032\313\350\354\276\144\201\245\071\107\135\352\346\055\223\323
|
||||
\032\377\172\124\246\007\037\064\010\364\275\211\271\202\314\243
|
||||
\102\217\136\232\307\076\307\251\270\125\154\044\366\052\214\145
|
||||
\040\212\344\104\044\002\257\324\267\211\373\052\342\304\327\350
|
||||
\035\176\334\035\042\014\137\122\303\355\340\054\215\255\216\164
|
||||
\101\136\173\050\315\224\117\314\171\256\271\263\022\072\373\114
|
||||
\200\206\245\045\000\227\150\025\251\356\261\152\050\276\156\146
|
||||
\021\325\012\346\131\240\122\000\156\175\056\271\053\216\266\055
|
||||
\155\030\105\156\205\003\173\120\312\373\244\374\263\222\372\223
|
||||
\307\074\242\112\133\036\226\275\275\343\063\264\065\102\366\303
|
||||
\311\353\103\026\136\036\232\235\122\250\325\107\013\161\265\021
|
||||
\310\107\215\275\231\336\125\022\200\001\116\250\273\007\143\016
|
||||
\374\045\261\242\262\164\122\260\171\335\023\241\016\073\156\145
|
||||
\012\201\311\276\301\135\336\115\031\067\351\103\247\117\002\003
|
||||
\001\000\001\243\201\322\060\201\317\060\116\006\003\125\035\040
|
||||
\004\107\060\105\060\103\006\005\140\114\001\001\000\060\072\060
|
||||
\070\006\010\053\006\001\005\005\007\002\001\026\054\150\164\164
|
||||
\160\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162
|
||||
\141\163\151\154\056\147\157\166\056\142\162\057\104\120\103\141
|
||||
\143\162\141\151\172\056\160\144\146\060\075\006\003\125\035\037
|
||||
\004\066\060\064\060\062\240\060\240\056\206\054\150\164\164\160
|
||||
\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162\141
|
||||
\163\151\154\056\147\157\166\056\142\162\057\114\103\122\141\143
|
||||
\162\141\151\172\056\143\162\154\060\035\006\003\125\035\016\004
|
||||
\026\004\024\212\372\361\127\204\021\023\065\220\102\372\127\111
|
||||
\124\151\015\244\304\360\067\060\017\006\003\125\035\023\001\001
|
||||
\377\004\005\060\003\001\001\377\060\016\006\003\125\035\017\001
|
||||
\001\377\004\004\003\002\001\006\060\015\006\011\052\206\110\206
|
||||
\367\015\001\001\005\005\000\003\202\001\001\000\031\003\227\065
|
||||
\123\370\140\042\036\216\162\002\300\176\042\140\025\152\157\230
|
||||
\066\126\252\125\167\323\366\307\026\230\374\210\032\033\045\051
|
||||
\271\270\072\155\355\070\253\142\035\124\305\355\337\101\241\245
|
||||
\142\062\136\373\334\335\372\054\317\105\260\152\134\365\120\003
|
||||
\176\004\135\314\044\342\252\126\271\375\141\036\270\226\175\332
|
||||
\361\360\007\052\112\252\372\012\344\005\301\052\373\344\132\054
|
||||
\113\071\160\014\000\332\357\111\223\357\006\143\002\144\041\235
|
||||
\234\166\304\236\260\175\151\123\365\124\037\113\377\311\141\342
|
||||
\034\354\133\236\330\223\113\167\115\024\071\043\014\152\042\277
|
||||
\267\277\136\234\243\107\020\015\237\272\221\367\274\110\240\177
|
||||
\221\041\341\265\100\067\225\150\206\264\346\350\306\071\337\036
|
||||
\327\101\226\153\324\301\073\153\236\145\024\111\322\171\075\056
|
||||
\232\123\200\215\035\246\001\273\322\063\225\371\241\046\115\256
|
||||
\147\255\167\074\223\217\147\345\010\317\002\013\263\013\151\275
|
||||
\044\221\331\340\104\211\124\004\141\305\327\364\271\236\143\333
|
||||
\053\357\100\343\253\035\337\172\052\053\311\374
|
||||
END
|
||||
|
||||
# Trust for Certificate "ICP Brasil CA"
|
||||
CKA_CLASS CK_OBJECT_CLASS CKO_NETSCAPE_TRUST
|
||||
CKA_TOKEN CK_BBOOL CK_TRUE
|
||||
CKA_PRIVATE CK_BBOOL CK_FALSE
|
||||
CKA_MODIFIABLE CK_BBOOL CK_FALSE
|
||||
CKA_LABEL UTF8 "ICP Brasil CA"
|
||||
CKA_CERT_SHA1_HASH MULTILINE_OCTAL
|
||||
\216\375\312\274\223\346\036\222\135\115\035\355\030\032\103\040
|
||||
\244\147\241\071
|
||||
END
|
||||
CKA_CERT_MD5_HASH MULTILINE_OCTAL
|
||||
\226\211\175\141\321\125\053\047\342\132\071\264\052\154\104\157
|
||||
END
|
||||
CKA_ISSUER MULTILINE_OCTAL
|
||||
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
|
||||
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
|
||||
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
|
||||
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
|
||||
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
|
||||
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
|
||||
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
|
||||
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
|
||||
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
|
||||
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
|
||||
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
|
||||
\163\151\154\145\151\162\141
|
||||
END
|
||||
CKA_SERIAL_NUMBER MULTILINE_OCTAL
|
||||
\002\001\004
|
||||
END
|
||||
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
||||
CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
|
163
mozilla-nss.changes
Normal file
163
mozilla-nss.changes
Normal file
@ -0,0 +1,163 @@
|
||||
-------------------------------------------------------------------
|
||||
Sun Oct 1 23:01:38 CEST 2006 - wr@rosenauer.org
|
||||
|
||||
- update to NSS 3.11.3
|
||||
- requires NSPR 4.6.3 (pkgconfig)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 6 08:23:45 CEST 2006 - stark@suse.de
|
||||
|
||||
- update to NSS_3_11_20060905_TAG to be in sync with
|
||||
Gecko 1.8.1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Aug 7 13:53:55 CEST 2006 - stark@suse.de
|
||||
|
||||
- enabled usage of ECC
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Aug 5 09:50:47 CEST 2006 - stark@suse.de
|
||||
|
||||
- update to NSS_3_11_20060731_TAG to be in sync with
|
||||
Gecko 1.8.1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Jul 28 07:09:44 CEST 2006 - stark@suse.de
|
||||
|
||||
- fixed usage of uninitialized pointers (uninit.patch)
|
||||
- requires NSPR 4.6.2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Jul 1 23:37:52 CEST 2006 - stark@suse.de
|
||||
|
||||
- update to 3.11.2 RTM version
|
||||
* ECC not enabled but defines needed symbols
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jun 8 11:45:14 CEST 2006 - stark@suse.de
|
||||
|
||||
- update to 3.11.2 beta
|
||||
* enabled ECC (needed since MOZILLA_1_8_BRANCH)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon May 15 20:38:37 CEST 2006 - stark@suse.de
|
||||
|
||||
- update to 3.11.1 RTM version
|
||||
including:
|
||||
* TLS server name indication extension support
|
||||
* implement RFC 3546 (TLS v1.0 extensions)
|
||||
* fixed bugs found by Coverity
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jan 30 08:34:45 CET 2006 - stark@suse.de
|
||||
|
||||
- removed additional CA certs
|
||||
- removed zip from BuildRequires
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 25 21:32:31 CET 2006 - mls@suse.de
|
||||
|
||||
- converted neededforbuild to BuildRequires
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 11 16:15:18 CET 2006 - stark@suse.de
|
||||
|
||||
- install nss-config executable
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Dec 16 20:24:05 CET 2005 - stark@suse.de
|
||||
|
||||
- marked libfreebl3.so noexec stack
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Dec 16 09:41:15 CET 2005 - stark@suse.de
|
||||
|
||||
- update to 3.11 RTM version
|
||||
- provide nss-config file
|
||||
- added static libs
|
||||
- moved include files to /usr/include/nss3
|
||||
- only ship a subset of the tools
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Nov 26 14:54:03 CET 2005 - stark@suse.de
|
||||
|
||||
- update to 3.11rc1
|
||||
- fixed PC file for 64bit archs
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 15 07:35:25 CET 2005 - stark@suse.de
|
||||
|
||||
- update to current 3.10.2 snapshot (20051114)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Nov 2 12:17:23 CET 2005 - stark@suse.de
|
||||
|
||||
- added tools subpackage which provides all NSS related
|
||||
tools for managing and debugging NSS stuff
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Oct 11 07:08:38 CEST 2005 - stark@suse.de
|
||||
|
||||
- update to current 3.10.2 snapshot
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 26 21:59:00 CEST 2005 - stark@suse.de
|
||||
|
||||
- prerequire the correct NSPR version
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Sep 22 07:15:30 CEST 2005 - stark@suse.de
|
||||
|
||||
- update to NSS_3_10_2_BETA1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 5 15:33:18 CEST 2005 - stark@suse.de
|
||||
|
||||
- use RPM_OPT_FLAGS
|
||||
- fixed requirements for devel package
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jun 8 09:19:59 CEST 2005 - stark@suse.de
|
||||
|
||||
- added pkgconfig file
|
||||
- fixed permission for include directory
|
||||
- fixed compiler/abuild warning
|
||||
- included correct header files
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon May 9 09:34:30 CEST 2005 - stark@suse.de
|
||||
|
||||
- update to 3.10 RTM version
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Apr 27 07:52:55 CEST 2005 - stark@suse.de
|
||||
|
||||
- don't package static libs
|
||||
- copy NSPR static libs from new location
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Apr 7 09:08:22 CEST 2005 - stark@suse.de
|
||||
|
||||
- update to 3.10beta3
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Apr 1 15:55:58 CEST 2005 - stark@suse.de
|
||||
|
||||
- don't parallelize build
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Mar 31 07:39:45 CEST 2005 - stark@suse.de
|
||||
|
||||
- fixed build on other archs
|
||||
- update to 3.10beta2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Mar 19 13:36:51 CET 2005 - stark@suse.de
|
||||
|
||||
- update to 3.10beta1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Mar 8 09:16:59 CET 2005 - stark@suse.de
|
||||
|
||||
- initial standalone package
|
||||
|
255
mozilla-nss.spec
Normal file
255
mozilla-nss.spec
Normal file
@ -0,0 +1,255 @@
|
||||
#
|
||||
# spec file for package mozilla-nss (Version 3.11.3)
|
||||
#
|
||||
# Copyright (c) 2006 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
||||
# This file and all modifications and additions to the pristine
|
||||
# package are under the same license as the package itself.
|
||||
#
|
||||
# Please submit bugfixes or comments via http://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
# norootforbuild
|
||||
|
||||
Name: mozilla-nss
|
||||
BuildRequires: gcc-c++ mozilla-nspr-devel
|
||||
License: Other License(s), see package
|
||||
Version: 3.11.3
|
||||
Release: 1
|
||||
Summary: Network (Netscape) Security Services
|
||||
URL: http://www.mozilla.org/projects/security/pki/nss/
|
||||
Group: System/Libraries
|
||||
Source: nss-%{version}.tar.bz2
|
||||
Source1: nss.pc.in
|
||||
Source2: addon-certs.txt
|
||||
Source3: nss-config.in
|
||||
Patch1: nss-opt.patch
|
||||
Patch2: uninit.patch
|
||||
Patch3: system-nspr.patch
|
||||
PreReq: mozilla-nspr >= %( echo `rpm -q --queryformat '%{VERSION}' mozilla-nspr`)
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
|
||||
%description
|
||||
Network Security Services (NSS) is a set of libraries designed to
|
||||
support cross-platform development of security-enabled server
|
||||
applications. Applications built with NSS can support SSL v2 and v3,
|
||||
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
|
||||
certificates, and other security standards.
|
||||
|
||||
|
||||
|
||||
Authors:
|
||||
--------
|
||||
Mozilla Foundation <drivers@mozilla.org>
|
||||
|
||||
%package devel
|
||||
Summary: Network (Netscape) Security Services development files
|
||||
Group: Development/Libraries/Other
|
||||
Requires: mozilla-nspr-devel
|
||||
Requires: mozilla-nss = %{version}-%{release}
|
||||
|
||||
%description devel
|
||||
Network Security Services (NSS) is a set of libraries designed to
|
||||
support cross-platform development of security-enabled server
|
||||
applications. Applications built with NSS can support SSL v2 and v3,
|
||||
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
|
||||
certificates, and other security standards.
|
||||
|
||||
|
||||
|
||||
Authors:
|
||||
--------
|
||||
Mozilla Foundation <drivers@mozilla.org>
|
||||
|
||||
%package tools
|
||||
Summary: Tools for developing, debugging, and managing applications that use NSS.
|
||||
Group: System/Management
|
||||
|
||||
%description tools
|
||||
The NSS Security Tools allow developers to test, debug, and manage
|
||||
applications that use NSS.
|
||||
|
||||
|
||||
|
||||
Authors:
|
||||
--------
|
||||
Mozilla Foundation <drivers@mozilla.org>
|
||||
|
||||
%prep
|
||||
# NSS is currently
|
||||
# NSS_3_11_BRANCH
|
||||
%setup -n nss-%{version} -q
|
||||
cd mozilla
|
||||
%patch1
|
||||
%patch2
|
||||
%patch3
|
||||
# additional CA certificates
|
||||
#cd security/nss/lib/ckfw/builtins
|
||||
#cat %{SOURCE2} >> certdata.txt
|
||||
#make generate
|
||||
|
||||
%build
|
||||
cd mozilla/security/nss
|
||||
export CFLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing"
|
||||
export NSPR_INCLUDE_DIR=`nspr-config --includedir`
|
||||
export NSPR_LIB_DIR=`nspr-config --libdir`
|
||||
export BUILD_OPT=1
|
||||
export NSS_ENABLE_ECC=1
|
||||
export LIBDIR=%{_libdir}
|
||||
%ifarch x86_64 s390x ppc64 ia64
|
||||
export USE_64=1
|
||||
%endif
|
||||
make nss_build_all
|
||||
|
||||
%install
|
||||
mkdir -p $RPM_BUILD_ROOT%{_libdir}
|
||||
mkdir -p $RPM_BUILD_ROOT%{_includedir}/nss3
|
||||
mkdir -p $RPM_BUILD_ROOT%{_bindir}
|
||||
pushd mozilla/dist/Linux*
|
||||
# copy headers
|
||||
cp -rL ../public/nss/*.h $RPM_BUILD_ROOT%{_includedir}/nss3
|
||||
# copy dynamic libs
|
||||
cp -L lib/libnss3.so \
|
||||
lib/libnssckbi.so \
|
||||
lib/libsmime3.so \
|
||||
lib/libsoftokn3.so \
|
||||
lib/libsoftokn3.chk \
|
||||
lib/libssl3.so \
|
||||
lib/libfreebl3.so \
|
||||
lib/libfreebl3.chk \
|
||||
$RPM_BUILD_ROOT%{_libdir}
|
||||
# copy static libs
|
||||
cp -L lib/libcrmf.a \
|
||||
lib/libnssb.a \
|
||||
lib/libnssckfw.a \
|
||||
$RPM_BUILD_ROOT%{_libdir}
|
||||
# copy tools
|
||||
cp -L bin/certutil \
|
||||
bin/modutil \
|
||||
bin/pk12util \
|
||||
bin/signtool \
|
||||
bin/ssltap \
|
||||
$RPM_BUILD_ROOT%{_bindir}
|
||||
# prepare pkgconfig file
|
||||
mkdir -p $RPM_BUILD_ROOT%{_libdir}/pkgconfig/
|
||||
sed "s:%%LIBDIR%%:%{_libdir}:g
|
||||
s:%%VERSION%%:%{version}:g" \
|
||||
%{SOURCE1} > $RPM_BUILD_ROOT%{_libdir}/pkgconfig/nss.pc
|
||||
# prepare nss-config file
|
||||
popd
|
||||
NSS_VMAJOR=`cat mozilla/security/nss/lib/nss/nss.h | grep "#define.*NSS_VMAJOR" | awk '{print $3}'`
|
||||
NSS_VMINOR=`cat mozilla/security/nss/lib/nss/nss.h | grep "#define.*NSS_VMINOR" | awk '{print $3}'`
|
||||
NSS_VPATCH=`cat mozilla/security/nss/lib/nss/nss.h | grep "#define.*NSS_VPATCH" | awk '{print $3}'`
|
||||
cat %{SOURCE3} | sed -e "s,@libdir@,%{_libdir},g" \
|
||||
-e "s,@prefix@,%{_prefix},g" \
|
||||
-e "s,@exec_prefix@,%{_prefix},g" \
|
||||
-e "s,@includedir@,%{_includedir}/nss3,g" \
|
||||
-e "s,@MOD_MAJOR_VERSION@,$NSS_VMAJOR,g" \
|
||||
-e "s,@MOD_MINOR_VERSION@,$NSS_VMINOR,g" \
|
||||
-e "s,@MOD_PATCH_VERSION@,$NSS_VPATCH,g" \
|
||||
> $RPM_BUILD_ROOT/%{_bindir}/nss-config
|
||||
chmod 755 $RPM_BUILD_ROOT/%{_bindir}/nss-config
|
||||
|
||||
%post -p /sbin/ldconfig
|
||||
|
||||
%postun -p /sbin/ldconfig
|
||||
|
||||
%clean
|
||||
rm -rf $RPM_BUILD_ROOT
|
||||
|
||||
%files
|
||||
%defattr(-, root, root)
|
||||
%{_libdir}/*.so
|
||||
%{_libdir}/*.chk
|
||||
|
||||
%files devel
|
||||
%defattr(644, root, root, 755)
|
||||
%{_includedir}/nss3/
|
||||
%{_libdir}/*.a
|
||||
%{_libdir}/pkgconfig/*
|
||||
%attr(755,root,root) %{_bindir}/nss-config
|
||||
|
||||
%files tools
|
||||
%defattr(-, root, root)
|
||||
%{_bindir}/*
|
||||
%exclude %{_bindir}/nss-config
|
||||
|
||||
%changelog -n mozilla-nss
|
||||
* Sun Oct 01 2006 - wr@rosenauer.org
|
||||
- update to NSS 3.11.3
|
||||
- requires NSPR 4.6.3 (pkgconfig)
|
||||
* Wed Sep 06 2006 - stark@suse.de
|
||||
- update to NSS_3_11_20060905_TAG to be in sync with
|
||||
Gecko 1.8.1
|
||||
* Mon Aug 07 2006 - stark@suse.de
|
||||
- enabled usage of ECC
|
||||
* Sat Aug 05 2006 - stark@suse.de
|
||||
- update to NSS_3_11_20060731_TAG to be in sync with
|
||||
Gecko 1.8.1
|
||||
* Fri Jul 28 2006 - stark@suse.de
|
||||
- fixed usage of uninitialized pointers (uninit.patch)
|
||||
- requires NSPR 4.6.2
|
||||
* Sat Jul 01 2006 - stark@suse.de
|
||||
- update to 3.11.2 RTM version
|
||||
* ECC not enabled but defines needed symbols
|
||||
* Thu Jun 08 2006 - stark@suse.de
|
||||
- update to 3.11.2 beta
|
||||
* enabled ECC (needed since MOZILLA_1_8_BRANCH)
|
||||
* Mon May 15 2006 - stark@suse.de
|
||||
- update to 3.11.1 RTM version
|
||||
including:
|
||||
* TLS server name indication extension support
|
||||
* implement RFC 3546 (TLS v1.0 extensions)
|
||||
* fixed bugs found by Coverity
|
||||
* Mon Jan 30 2006 - stark@suse.de
|
||||
- removed additional CA certs
|
||||
- removed zip from BuildRequires
|
||||
* Wed Jan 25 2006 - mls@suse.de
|
||||
- converted neededforbuild to BuildRequires
|
||||
* Wed Jan 11 2006 - stark@suse.de
|
||||
- install nss-config executable
|
||||
* Fri Dec 16 2005 - stark@suse.de
|
||||
- marked libfreebl3.so noexec stack
|
||||
* Fri Dec 16 2005 - stark@suse.de
|
||||
- update to 3.11 RTM version
|
||||
- provide nss-config file
|
||||
- added static libs
|
||||
- moved include files to /usr/include/nss3
|
||||
- only ship a subset of the tools
|
||||
* Sat Nov 26 2005 - stark@suse.de
|
||||
- update to 3.11rc1
|
||||
- fixed PC file for 64bit archs
|
||||
* Tue Nov 15 2005 - stark@suse.de
|
||||
- update to current 3.10.2 snapshot (20051114)
|
||||
* Wed Nov 02 2005 - stark@suse.de
|
||||
- added tools subpackage which provides all NSS related
|
||||
tools for managing and debugging NSS stuff
|
||||
* Tue Oct 11 2005 - stark@suse.de
|
||||
- update to current 3.10.2 snapshot
|
||||
* Mon Sep 26 2005 - stark@suse.de
|
||||
- prerequire the correct NSPR version
|
||||
* Thu Sep 22 2005 - stark@suse.de
|
||||
- update to NSS_3_10_2_BETA1
|
||||
* Tue Jul 05 2005 - stark@suse.de
|
||||
- use RPM_OPT_FLAGS
|
||||
- fixed requirements for devel package
|
||||
* Wed Jun 08 2005 - stark@suse.de
|
||||
- added pkgconfig file
|
||||
- fixed permission for include directory
|
||||
- fixed compiler/abuild warning
|
||||
- included correct header files
|
||||
* Mon May 09 2005 - stark@suse.de
|
||||
- update to 3.10 RTM version
|
||||
* Wed Apr 27 2005 - stark@suse.de
|
||||
- don't package static libs
|
||||
- copy NSPR static libs from new location
|
||||
* Thu Apr 07 2005 - stark@suse.de
|
||||
- update to 3.10beta3
|
||||
* Fri Apr 01 2005 - stark@suse.de
|
||||
- don't parallelize build
|
||||
* Thu Mar 31 2005 - stark@suse.de
|
||||
- fixed build on other archs
|
||||
- update to 3.10beta2
|
||||
* Sat Mar 19 2005 - stark@suse.de
|
||||
- update to 3.10beta1
|
||||
* Tue Mar 08 2005 - stark@suse.de
|
||||
- initial standalone package
|
3
nss-3.11.3.tar.bz2
Normal file
3
nss-3.11.3.tar.bz2
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:57482a3c011ae56801fb859b8e4c4a55a797e106b15644f5e49ceb2329a3428b
|
||||
size 2891582
|
137
nss-config.in
Normal file
137
nss-config.in
Normal file
@ -0,0 +1,137 @@
|
||||
#!/bin/sh
|
||||
|
||||
prefix=@prefix@
|
||||
|
||||
major_version=@MOD_MAJOR_VERSION@
|
||||
minor_version=@MOD_MINOR_VERSION@
|
||||
patch_version=@MOD_PATCH_VERSION@
|
||||
|
||||
usage()
|
||||
{
|
||||
cat <<EOF
|
||||
Usage: nss-config [OPTIONS] [LIBRARIES]
|
||||
Options:
|
||||
[--prefix[=DIR]]
|
||||
[--exec-prefix[=DIR]]
|
||||
[--includedir[=DIR]]
|
||||
[--libdir[=DIR]]
|
||||
[--version]
|
||||
[--libs]
|
||||
[--cflags]
|
||||
Dynamic Libraries:
|
||||
nss
|
||||
ssl
|
||||
smime
|
||||
EOF
|
||||
exit $1
|
||||
}
|
||||
|
||||
if test $# -eq 0; then
|
||||
usage 1 1>&2
|
||||
fi
|
||||
|
||||
lib_ssl=yes
|
||||
lib_smime=yes
|
||||
lib_nss=yes
|
||||
|
||||
while test $# -gt 0; do
|
||||
case "$1" in
|
||||
-*=*) optarg=`echo "$1" | sed 's/[-_a-zA-Z0-9]*=//'` ;;
|
||||
*) optarg= ;;
|
||||
esac
|
||||
|
||||
case $1 in
|
||||
--prefix=*)
|
||||
prefix=$optarg
|
||||
;;
|
||||
--prefix)
|
||||
echo_prefix=yes
|
||||
;;
|
||||
--exec-prefix=*)
|
||||
exec_prefix=$optarg
|
||||
;;
|
||||
--exec-prefix)
|
||||
echo_exec_prefix=yes
|
||||
;;
|
||||
--includedir=*)
|
||||
includedir=$optarg
|
||||
;;
|
||||
--includedir)
|
||||
echo_includedir=yes
|
||||
;;
|
||||
--libdir=*)
|
||||
libdir=$optarg
|
||||
;;
|
||||
--libdir)
|
||||
echo_libdir=yes
|
||||
;;
|
||||
--version)
|
||||
echo ${major_version}.${minor_version}.${patch_version}
|
||||
;;
|
||||
--cflags)
|
||||
echo_cflags=yes
|
||||
;;
|
||||
--libs)
|
||||
echo_libs=yes
|
||||
;;
|
||||
ssl)
|
||||
lib_ssl=yes
|
||||
;;
|
||||
smime)
|
||||
lib_smime=yes
|
||||
;;
|
||||
nss)
|
||||
lib_nss=yes
|
||||
;;
|
||||
*)
|
||||
usage 1 1>&2
|
||||
;;
|
||||
esac
|
||||
shift
|
||||
done
|
||||
|
||||
# Set variables that may be dependent upon other variables
|
||||
if test -z "$exec_prefix"; then
|
||||
exec_prefix=@exec_prefix@
|
||||
fi
|
||||
if test -z "$includedir"; then
|
||||
includedir=@includedir@
|
||||
fi
|
||||
if test -z "$libdir"; then
|
||||
libdir=@libdir@
|
||||
fi
|
||||
|
||||
if test "$echo_prefix" = "yes"; then
|
||||
echo $prefix
|
||||
fi
|
||||
|
||||
if test "$echo_exec_prefix" = "yes"; then
|
||||
echo $exec_prefix
|
||||
fi
|
||||
|
||||
if test "$echo_includedir" = "yes"; then
|
||||
echo $includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libdir" = "yes"; then
|
||||
echo $libdir
|
||||
fi
|
||||
|
||||
if test "$echo_cflags" = "yes"; then
|
||||
echo -I$includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libs" = "yes"; then
|
||||
libdirs="-Wl,-rpath-link,$libdir -L$libdir"
|
||||
if test -n "$lib_ssl"; then
|
||||
libdirs="$libdirs -lssl${major_version}"
|
||||
fi
|
||||
if test -n "$lib_smime"; then
|
||||
libdirs="$libdirs -lsmime${major_version}"
|
||||
fi
|
||||
if test -n "$lib_nss"; then
|
||||
libdirs="$libdirs -lnss${major_version}"
|
||||
fi
|
||||
echo $libdirs
|
||||
fi
|
||||
|
16
nss-opt.patch
Normal file
16
nss-opt.patch
Normal file
@ -0,0 +1,16 @@
|
||||
Index: security/coreconf/Linux.mk
|
||||
===================================================================
|
||||
RCS file: /cvsroot/mozilla/security/coreconf/Linux.mk,v
|
||||
retrieving revision 1.27
|
||||
diff -u -r1.27 Linux.mk
|
||||
--- security/coreconf/Linux.mk 16 Sep 2005 17:09:23 -0000 1.27
|
||||
+++ security/coreconf/Linux.mk 25 Nov 2005 22:08:04 -0000
|
||||
@@ -148,7 +148,7 @@
|
||||
endif
|
||||
|
||||
ifdef BUILD_OPT
|
||||
- OPTIMIZER = -O2
|
||||
+ OPTIMIZER = $(RPM_OPT_FLAGS) -fno-strict-aliasing
|
||||
endif
|
||||
|
||||
ifeq ($(USE_PTHREADS),1)
|
11
nss.pc.in
Normal file
11
nss.pc.in
Normal file
@ -0,0 +1,11 @@
|
||||
prefix=/usr
|
||||
exec_prefix=${prefix}
|
||||
libdir=%LIBDIR%
|
||||
includedir=${prefix}/include/nss3
|
||||
|
||||
Name: NSS
|
||||
Description: Network Security Services
|
||||
Version: %VERSION%
|
||||
Requires: nspr >= 4.6.3
|
||||
Libs: -Wl,-rpath-link,${libdir} -L${libdir} -lssl3 -lsmime3 -lnss3
|
||||
Cflags: -I${includedir}
|
11
system-nspr.patch
Normal file
11
system-nspr.patch
Normal file
@ -0,0 +1,11 @@
|
||||
--- mozilla/security/nss/Makefile
|
||||
+++ security/nss/Makefile
|
||||
@@ -78,7 +78,7 @@
|
||||
# (7) Execute "local" rules. (OPTIONAL). #
|
||||
#######################################################################
|
||||
|
||||
-nss_build_all: build_coreconf build_nspr build_dbm all
|
||||
+nss_build_all: build_coreconf build_dbm all
|
||||
|
||||
build_coreconf:
|
||||
cd $(CORE_DEPTH)/coreconf ; $(MAKE)
|
51
uninit.patch
Normal file
51
uninit.patch
Normal file
@ -0,0 +1,51 @@
|
||||
Index: security/nss/cmd/fipstest/fipstest.c
|
||||
===================================================================
|
||||
RCS file: /cvsroot/mozilla/security/nss/cmd/fipstest/fipstest.c,v
|
||||
retrieving revision 1.3.2.21
|
||||
diff -u -p -r1.3.2.21 fipstest.c
|
||||
--- security/nss/cmd/fipstest/fipstest.c 25 Mar 2006 23:47:58 -0000 1.3.2.21
|
||||
+++ security/nss/cmd/fipstest/fipstest.c 28 Jul 2006 05:09:07 -0000
|
||||
@@ -2916,8 +2916,8 @@ void sha_test(char *reqfn)
|
||||
unsigned char seed[HASH_LENGTH_MAX]; /* max size of seed 64 bytes */
|
||||
unsigned char MD[HASH_LENGTH_MAX]; /* message digest */
|
||||
|
||||
- FILE *req; /* input stream from the REQUEST file */
|
||||
- FILE *resp; /* output stream to the RESPONSE file */
|
||||
+ FILE *req = NULL; /* input stream from the REQUEST file */
|
||||
+ FILE *resp; /* output stream to the RESPONSE file */
|
||||
|
||||
buf = PORT_ZAlloc(bufSize);
|
||||
if (buf == NULL) {
|
||||
@@ -3013,7 +3013,9 @@ void sha_test(char *reqfn)
|
||||
}
|
||||
}
|
||||
loser:
|
||||
- fclose(req);
|
||||
+ if (req) {
|
||||
+ fclose(req);
|
||||
+ }
|
||||
if (buf) {
|
||||
PORT_ZFree(buf, bufSize);
|
||||
}
|
||||
@@ -3088,8 +3090,8 @@ void hmac_test(char *reqfn)
|
||||
unsigned char HMAC[HASH_LENGTH_MAX]; /* computed HMAC */
|
||||
HASH_HashType hash_alg; /* HMAC type */
|
||||
|
||||
- FILE *req; /* input stream from the REQUEST file */
|
||||
- FILE *resp; /* output stream to the RESPONSE file */
|
||||
+ FILE *req = NULL; /* input stream from the REQUEST file */
|
||||
+ FILE *resp; /* output stream to the RESPONSE file */
|
||||
|
||||
buf = PORT_ZAlloc(bufSize);
|
||||
if (buf == NULL) {
|
||||
@@ -3201,7 +3203,9 @@ void hmac_test(char *reqfn)
|
||||
}
|
||||
}
|
||||
loser:
|
||||
- fclose(req);
|
||||
+ if (req) {
|
||||
+ fclose(req);
|
||||
+ }
|
||||
if (buf) {
|
||||
PORT_ZFree(buf, bufSize);
|
||||
}
|
Loading…
Reference in New Issue
Block a user