OBS User unknown 2007-01-15 23:25:44 +00:00 committed by Git OBS Bridge
commit 1c91b6e634
12 changed files with 1164 additions and 0 deletions

23
.gitattributes vendored Normal file
View File

@ -0,0 +1,23 @@
## Default LFS
*.7z filter=lfs diff=lfs merge=lfs -text
*.bsp filter=lfs diff=lfs merge=lfs -text
*.bz2 filter=lfs diff=lfs merge=lfs -text
*.gem filter=lfs diff=lfs merge=lfs -text
*.gz filter=lfs diff=lfs merge=lfs -text
*.jar filter=lfs diff=lfs merge=lfs -text
*.lz filter=lfs diff=lfs merge=lfs -text
*.lzma filter=lfs diff=lfs merge=lfs -text
*.obscpio filter=lfs diff=lfs merge=lfs -text
*.oxt filter=lfs diff=lfs merge=lfs -text
*.pdf filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text
*.rpm filter=lfs diff=lfs merge=lfs -text
*.tbz filter=lfs diff=lfs merge=lfs -text
*.tbz2 filter=lfs diff=lfs merge=lfs -text
*.tgz filter=lfs diff=lfs merge=lfs -text
*.ttf filter=lfs diff=lfs merge=lfs -text
*.txz filter=lfs diff=lfs merge=lfs -text
*.whl filter=lfs diff=lfs merge=lfs -text
*.xz filter=lfs diff=lfs merge=lfs -text
*.zip filter=lfs diff=lfs merge=lfs -text
*.zst filter=lfs diff=lfs merge=lfs -text

1
.gitignore vendored Normal file
View File

@ -0,0 +1 @@
.osc

493
addon-certs.txt Normal file
View File

@ -0,0 +1,493 @@
#
# Certificate "DFN PCA"
#
CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
CKA_TOKEN CK_BBOOL CK_TRUE
CKA_PRIVATE CK_BBOOL CK_FALSE
CKA_MODIFIABLE CK_BBOOL CK_FALSE
CKA_LABEL UTF8 "DFN PCA"
CKA_CERTIFICATE_TYPE CK_CERTIFICATE_TYPE CKC_X_509
CKA_SUBJECT MULTILINE_OCTAL
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
END
CKA_ID UTF8 "0"
CKA_ISSUER MULTILINE_OCTAL
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
END
CKA_SERIAL_NUMBER MULTILINE_OCTAL
\002\003\025\317\375
END
CKA_VALUE MULTILINE_OCTAL
\060\202\006\332\060\202\005\302\240\003\002\001\002\002\003\025
\317\375\060\015\006\011\052\206\110\206\367\015\001\001\005\005
\000\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104
\105\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164
\163\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163
\156\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104
\106\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016
\006\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055
\060\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160
\154\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164
\151\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060
\037\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145
\162\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
\060\036\027\015\060\061\061\062\060\061\061\062\061\061\061\066
\132\027\015\061\060\060\061\063\061\061\062\061\061\061\066\132
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145\060
\202\001\042\060\015\006\011\052\206\110\206\367\015\001\001\001
\005\000\003\202\001\017\000\060\202\001\012\002\202\001\001\000
\301\171\256\023\055\353\071\241\304\256\150\130\374\023\330\121
\273\122\236\323\344\072\057\035\040\377\140\243\310\107\033\057
\015\151\202\341\324\363\007\042\001\056\163\246\021\371\144\373
\222\200\250\006\032\243\247\230\326\241\164\205\036\026\211\056
\003\214\053\047\356\135\363\066\217\370\213\147\205\340\111\206
\022\113\001\312\006\370\265\031\123\116\027\016\356\027\205\137
\340\356\346\241\150\222\317\216\066\246\273\321\031\160\072\275
\245\347\162\225\302\063\027\004\053\102\054\124\212\104\265\156
\305\350\171\371\051\244\233\341\156\072\154\004\272\011\335\063
\151\373\340\070\343\311\377\103\010\346\207\031\232\307\301\120
\341\371\132\162\344\334\270\154\240\222\156\213\243\107\027\171
\067\033\022\265\113\041\015\126\323\171\055\301\361\073\263\000
\226\362\301\205\204\023\267\253\243\037\273\131\067\320\257\310
\257\110\040\141\254\322\167\351\124\143\001\277\041\211\137\110
\273\055\223\230\226\050\332\203\362\013\306\267\170\315\361\217
\322\256\330\205\267\265\055\263\245\370\210\316\337\161\274\123
\002\003\001\000\001\243\202\003\001\060\202\002\375\060\017\006
\003\125\035\023\001\001\377\004\005\060\003\001\001\377\060\035
\006\003\125\035\016\004\026\004\024\006\013\372\265\370\110\170
\243\040\261\013\076\317\240\320\304\321\177\175\320\060\201\333
\006\003\125\035\043\004\201\323\060\201\320\200\024\006\013\372
\265\370\110\170\243\040\261\013\076\317\240\320\304\321\177\175
\320\241\201\262\244\201\257\060\201\254\061\013\060\011\006\003
\125\004\006\023\002\104\105\061\041\060\037\006\003\125\004\012
\023\030\104\145\165\164\163\143\150\145\163\040\106\157\162\163
\143\150\165\156\147\163\156\145\164\172\061\026\060\024\006\003
\125\004\013\023\015\104\106\116\055\103\105\122\124\040\107\155
\142\110\061\020\060\016\006\003\125\004\013\023\007\104\106\116
\055\120\103\101\061\055\060\053\006\003\125\004\003\023\044\104
\106\116\040\124\157\160\154\145\166\145\154\040\103\145\162\164
\151\146\151\143\141\164\151\157\156\040\101\165\164\150\157\162
\151\164\171\061\041\060\037\006\011\052\206\110\206\367\015\001
\011\001\026\022\143\145\162\164\151\146\171\100\160\143\141\056
\144\146\156\056\144\145\202\003\025\317\375\060\013\006\003\125
\035\017\004\004\003\002\001\006\060\021\006\011\140\206\110\001
\206\370\102\001\001\004\004\003\002\000\007\060\201\245\006\003
\125\035\037\004\201\235\060\201\232\060\113\240\111\240\107\206
\105\150\164\164\160\072\057\057\167\167\167\056\144\146\156\055
\160\143\141\056\144\145\057\143\145\162\164\151\146\151\143\141
\164\151\157\156\057\170\065\060\071\057\147\061\057\144\141\164
\141\057\143\162\154\163\057\162\157\157\164\055\143\141\055\143
\162\154\056\143\162\170\060\113\240\111\240\107\206\105\150\164
\164\160\072\057\057\167\167\167\056\144\146\156\055\160\143\141
\056\144\145\057\143\145\162\164\151\146\151\143\141\164\151\157
\156\057\170\065\060\071\057\147\061\057\144\141\164\141\057\143
\162\154\163\057\162\157\157\164\055\143\141\055\143\162\154\056
\143\162\154\060\070\006\011\140\206\110\001\206\370\102\001\003
\004\053\026\051\150\164\164\160\163\072\057\057\167\167\167\056
\144\146\156\055\160\143\141\056\144\145\057\143\147\151\057\143
\150\145\143\153\055\162\145\166\056\143\147\151\077\060\113\006
\011\140\206\110\001\206\370\102\001\010\004\076\026\074\150\164
\164\160\072\057\057\167\167\167\056\144\146\156\055\160\143\141
\056\144\145\057\143\145\162\164\151\146\151\143\141\164\151\157
\156\057\160\157\154\151\143\151\145\163\057\170\065\060\071\160
\157\154\151\143\171\056\150\164\155\154\060\070\006\011\140\206
\110\001\206\370\102\001\015\004\053\026\051\124\150\145\040\104
\106\116\040\124\157\160\055\114\145\166\145\154\040\103\145\162
\164\151\146\151\143\141\164\151\157\156\040\101\165\164\150\157
\162\151\164\171\060\144\006\003\125\035\040\004\135\060\133\060
\131\006\013\053\006\001\004\001\331\032\202\054\001\001\060\112
\060\110\006\010\053\006\001\005\005\007\002\001\026\074\150\164
\164\160\072\057\057\167\167\167\056\144\146\156\055\160\143\141
\056\144\145\057\143\145\162\164\151\146\151\143\141\164\151\157
\156\057\160\157\154\151\143\151\145\163\057\170\065\060\071\160
\157\154\151\143\171\056\150\164\155\154\060\015\006\011\052\206
\110\206\367\015\001\001\005\005\000\003\202\001\001\000\046\155
\250\272\044\313\173\236\113\232\277\053\361\053\062\306\237\116
\006\312\335\063\052\272\174\316\141\021\247\210\247\222\333\330
\356\237\257\221\252\046\142\355\220\140\056\334\036\255\055\226
\263\327\101\010\141\172\330\342\134\146\376\337\246\211\264\160
\344\020\015\015\302\262\163\142\161\340\076\313\361\357\075\060
\312\301\015\077\214\061\177\336\312\261\045\246\323\264\130\371
\376\277\200\204\005\354\227\273\011\155\364\107\072\273\067\244
\164\064\300\154\337\151\211\201\331\367\236\332\245\024\334\067
\065\273\064\347\101\104\214\363\152\347\204\135\153\011\111\243
\316\161\373\017\220\045\336\356\100\316\062\146\061\351\106\033
\360\202\327\275\031\355\124\250\045\035\244\313\013\037\067\214
\050\235\001\364\150\160\040\212\216\044\043\042\076\002\243\161
\100\153\237\247\241\111\176\364\074\353\327\276\070\304\333\341
\163\204\361\223\311\071\022\343\276\035\331\100\200\234\277\152
\204\372\335\131\174\301\214\353\246\072\070\111\272\324\365\151
\347\046\365\351\143\226\310\146\207\127\015\172\175\064
END
# Trust for Certificate "DFN PCA"
CKA_CLASS CK_OBJECT_CLASS CKO_NETSCAPE_TRUST
CKA_TOKEN CK_BBOOL CK_TRUE
CKA_PRIVATE CK_BBOOL CK_FALSE
CKA_MODIFIABLE CK_BBOOL CK_FALSE
CKA_LABEL UTF8 "DFN PCA"
CKA_CERT_SHA1_HASH MULTILINE_OCTAL
\216\044\042\306\176\154\206\310\220\335\366\235\365\241\335\021
\304\305\352\201
END
CKA_CERT_MD5_HASH MULTILINE_OCTAL
\076\037\236\346\114\156\360\042\010\045\332\221\043\010\005\003
END
CKA_ISSUER MULTILINE_OCTAL
\060\201\254\061\013\060\011\006\003\125\004\006\023\002\104\105
\061\041\060\037\006\003\125\004\012\023\030\104\145\165\164\163
\143\150\145\163\040\106\157\162\163\143\150\165\156\147\163\156
\145\164\172\061\026\060\024\006\003\125\004\013\023\015\104\106
\116\055\103\105\122\124\040\107\155\142\110\061\020\060\016\006
\003\125\004\013\023\007\104\106\116\055\120\103\101\061\055\060
\053\006\003\125\004\003\023\044\104\106\116\040\124\157\160\154
\145\166\145\154\040\103\145\162\164\151\146\151\143\141\164\151
\157\156\040\101\165\164\150\157\162\151\164\171\061\041\060\037
\006\011\052\206\110\206\367\015\001\011\001\026\022\143\145\162
\164\151\146\171\100\160\143\141\056\144\146\156\056\144\145
END
CKA_SERIAL_NUMBER MULTILINE_OCTAL
\002\003\025\317\375
END
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
#
# Certificate "ICP Brasil"
#
CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
CKA_TOKEN CK_BBOOL CK_TRUE
CKA_PRIVATE CK_BBOOL CK_FALSE
CKA_MODIFIABLE CK_BBOOL CK_FALSE
CKA_LABEL UTF8 "ICP Brasil"
CKA_CERTIFICATE_TYPE CK_CERTIFICATE_TYPE CKC_X_509
CKA_SUBJECT MULTILINE_OCTAL
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
\163\151\154\145\151\162\141
END
CKA_ID UTF8 "0"
CKA_ISSUER MULTILINE_OCTAL
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
\163\151\154\145\151\162\141
END
CKA_SERIAL_NUMBER MULTILINE_OCTAL
\002\001\004
END
CKA_VALUE MULTILINE_OCTAL
\060\202\004\270\060\202\003\240\240\003\002\001\002\002\001\004
\060\015\006\011\052\206\110\206\367\015\001\001\005\005\000\060
\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122\061
\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102\162
\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064\111
\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156\141
\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141\040
\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055\040
\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102\162
\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010\023
\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101\165
\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146\151
\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141\163
\151\154\145\151\162\141\060\036\027\015\060\061\061\061\063\060
\061\062\065\070\060\060\132\027\015\061\061\061\061\063\060\062
\063\065\071\060\060\132\060\201\264\061\013\060\011\006\003\125
\004\006\023\002\102\122\061\023\060\021\006\003\125\004\012\023
\012\111\103\120\055\102\162\141\163\151\154\061\075\060\073\006
\003\125\004\013\023\064\111\156\163\164\151\164\165\164\157\040
\116\141\143\151\157\156\141\154\040\144\145\040\124\145\143\156
\157\154\157\147\151\141\040\144\141\040\111\156\146\157\162\155
\141\143\141\157\040\055\040\111\124\111\061\021\060\017\006\003
\125\004\007\023\010\102\162\141\163\151\154\151\141\061\013\060
\011\006\003\125\004\010\023\002\104\106\061\061\060\057\006\003
\125\004\003\023\050\101\165\164\157\162\151\144\141\144\145\040
\103\145\162\164\151\146\151\143\141\144\157\162\141\040\122\141
\151\172\040\102\162\141\163\151\154\145\151\162\141\060\202\001
\042\060\015\006\011\052\206\110\206\367\015\001\001\001\005\000
\003\202\001\017\000\060\202\001\012\002\202\001\001\000\300\363
\056\167\005\377\206\371\276\122\035\233\376\124\000\160\165\100
\212\306\246\150\271\026\166\114\017\367\364\277\264\342\210\201
\032\313\350\354\276\144\201\245\071\107\135\352\346\055\223\323
\032\377\172\124\246\007\037\064\010\364\275\211\271\202\314\243
\102\217\136\232\307\076\307\251\270\125\154\044\366\052\214\145
\040\212\344\104\044\002\257\324\267\211\373\052\342\304\327\350
\035\176\334\035\042\014\137\122\303\355\340\054\215\255\216\164
\101\136\173\050\315\224\117\314\171\256\271\263\022\072\373\114
\200\206\245\045\000\227\150\025\251\356\261\152\050\276\156\146
\021\325\012\346\131\240\122\000\156\175\056\271\053\216\266\055
\155\030\105\156\205\003\173\120\312\373\244\374\263\222\372\223
\307\074\242\112\133\036\226\275\275\343\063\264\065\102\366\303
\311\353\103\026\136\036\232\235\122\250\325\107\013\161\265\021
\310\107\215\275\231\336\125\022\200\001\116\250\273\007\143\016
\374\045\261\242\262\164\122\260\171\335\023\241\016\073\156\145
\012\201\311\276\301\135\336\115\031\067\351\103\247\117\002\003
\001\000\001\243\201\322\060\201\317\060\116\006\003\125\035\040
\004\107\060\105\060\103\006\005\140\114\001\001\000\060\072\060
\070\006\010\053\006\001\005\005\007\002\001\026\054\150\164\164
\160\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162
\141\163\151\154\056\147\157\166\056\142\162\057\104\120\103\141
\143\162\141\151\172\056\160\144\146\060\075\006\003\125\035\037
\004\066\060\064\060\062\240\060\240\056\206\054\150\164\164\160
\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162\141
\163\151\154\056\147\157\166\056\142\162\057\114\103\122\141\143
\162\141\151\172\056\143\162\154\060\035\006\003\125\035\016\004
\026\004\024\212\372\361\127\204\021\023\065\220\102\372\127\111
\124\151\015\244\304\360\067\060\017\006\003\125\035\023\001\001
\377\004\005\060\003\001\001\377\060\016\006\003\125\035\017\001
\001\377\004\004\003\002\001\006\060\015\006\011\052\206\110\206
\367\015\001\001\005\005\000\003\202\001\001\000\031\003\227\065
\123\370\140\042\036\216\162\002\300\176\042\140\025\152\157\230
\066\126\252\125\167\323\366\307\026\230\374\210\032\033\045\051
\271\270\072\155\355\070\253\142\035\124\305\355\337\101\241\245
\142\062\136\373\334\335\372\054\317\105\260\152\134\365\120\003
\176\004\135\314\044\342\252\126\271\375\141\036\270\226\175\332
\361\360\007\052\112\252\372\012\344\005\301\052\373\344\132\054
\113\071\160\014\000\332\357\111\223\357\006\143\002\144\041\235
\234\166\304\236\260\175\151\123\365\124\037\113\377\311\141\342
\034\354\133\236\330\223\113\167\115\024\071\043\014\152\042\277
\267\277\136\234\243\107\020\015\237\272\221\367\274\110\240\177
\221\041\341\265\100\067\225\150\206\264\346\350\306\071\337\036
\327\101\226\153\324\301\073\153\236\145\024\111\322\171\075\056
\232\123\200\215\035\246\001\273\322\063\225\371\241\046\115\256
\147\255\167\074\223\217\147\345\010\317\002\013\263\013\151\275
\044\221\331\340\104\211\124\004\141\305\327\364\271\236\143\333
\053\357\100\343\253\035\337\172\052\053\311\374
END
# Trust for Certificate "ICP Brasil"
CKA_CLASS CK_OBJECT_CLASS CKO_NETSCAPE_TRUST
CKA_TOKEN CK_BBOOL CK_TRUE
CKA_PRIVATE CK_BBOOL CK_FALSE
CKA_MODIFIABLE CK_BBOOL CK_FALSE
CKA_LABEL UTF8 "ICP Brasil"
CKA_CERT_SHA1_HASH MULTILINE_OCTAL
\216\375\312\274\223\346\036\222\135\115\035\355\030\032\103\040
\244\147\241\071
END
CKA_CERT_MD5_HASH MULTILINE_OCTAL
\226\211\175\141\321\125\053\047\342\132\071\264\052\154\104\157
END
CKA_ISSUER MULTILINE_OCTAL
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
\163\151\154\145\151\162\141
END
CKA_SERIAL_NUMBER MULTILINE_OCTAL
\002\001\004
END
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
#
# Certificate "ICP Brasil CA"
#
CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
CKA_TOKEN CK_BBOOL CK_TRUE
CKA_PRIVATE CK_BBOOL CK_FALSE
CKA_MODIFIABLE CK_BBOOL CK_FALSE
CKA_LABEL UTF8 "ICP Brasil CA"
CKA_CERTIFICATE_TYPE CK_CERTIFICATE_TYPE CKC_X_509
CKA_SUBJECT MULTILINE_OCTAL
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
\163\151\154\145\151\162\141
END
CKA_ID UTF8 "0"
CKA_ISSUER MULTILINE_OCTAL
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
\163\151\154\145\151\162\141
END
CKA_SERIAL_NUMBER MULTILINE_OCTAL
\002\001\004
END
CKA_VALUE MULTILINE_OCTAL
\060\202\004\270\060\202\003\240\240\003\002\001\002\002\001\004
\060\015\006\011\052\206\110\206\367\015\001\001\005\005\000\060
\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122\061
\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102\162
\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064\111
\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156\141
\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141\040
\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055\040
\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102\162
\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010\023
\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101\165
\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146\151
\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141\163
\151\154\145\151\162\141\060\036\027\015\060\061\061\061\063\060
\061\062\065\070\060\060\132\027\015\061\061\061\061\063\060\062
\063\065\071\060\060\132\060\201\264\061\013\060\011\006\003\125
\004\006\023\002\102\122\061\023\060\021\006\003\125\004\012\023
\012\111\103\120\055\102\162\141\163\151\154\061\075\060\073\006
\003\125\004\013\023\064\111\156\163\164\151\164\165\164\157\040
\116\141\143\151\157\156\141\154\040\144\145\040\124\145\143\156
\157\154\157\147\151\141\040\144\141\040\111\156\146\157\162\155
\141\143\141\157\040\055\040\111\124\111\061\021\060\017\006\003
\125\004\007\023\010\102\162\141\163\151\154\151\141\061\013\060
\011\006\003\125\004\010\023\002\104\106\061\061\060\057\006\003
\125\004\003\023\050\101\165\164\157\162\151\144\141\144\145\040
\103\145\162\164\151\146\151\143\141\144\157\162\141\040\122\141
\151\172\040\102\162\141\163\151\154\145\151\162\141\060\202\001
\042\060\015\006\011\052\206\110\206\367\015\001\001\001\005\000
\003\202\001\017\000\060\202\001\012\002\202\001\001\000\300\363
\056\167\005\377\206\371\276\122\035\233\376\124\000\160\165\100
\212\306\246\150\271\026\166\114\017\367\364\277\264\342\210\201
\032\313\350\354\276\144\201\245\071\107\135\352\346\055\223\323
\032\377\172\124\246\007\037\064\010\364\275\211\271\202\314\243
\102\217\136\232\307\076\307\251\270\125\154\044\366\052\214\145
\040\212\344\104\044\002\257\324\267\211\373\052\342\304\327\350
\035\176\334\035\042\014\137\122\303\355\340\054\215\255\216\164
\101\136\173\050\315\224\117\314\171\256\271\263\022\072\373\114
\200\206\245\045\000\227\150\025\251\356\261\152\050\276\156\146
\021\325\012\346\131\240\122\000\156\175\056\271\053\216\266\055
\155\030\105\156\205\003\173\120\312\373\244\374\263\222\372\223
\307\074\242\112\133\036\226\275\275\343\063\264\065\102\366\303
\311\353\103\026\136\036\232\235\122\250\325\107\013\161\265\021
\310\107\215\275\231\336\125\022\200\001\116\250\273\007\143\016
\374\045\261\242\262\164\122\260\171\335\023\241\016\073\156\145
\012\201\311\276\301\135\336\115\031\067\351\103\247\117\002\003
\001\000\001\243\201\322\060\201\317\060\116\006\003\125\035\040
\004\107\060\105\060\103\006\005\140\114\001\001\000\060\072\060
\070\006\010\053\006\001\005\005\007\002\001\026\054\150\164\164
\160\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162
\141\163\151\154\056\147\157\166\056\142\162\057\104\120\103\141
\143\162\141\151\172\056\160\144\146\060\075\006\003\125\035\037
\004\066\060\064\060\062\240\060\240\056\206\054\150\164\164\160
\072\057\057\141\143\162\141\151\172\056\151\143\160\142\162\141
\163\151\154\056\147\157\166\056\142\162\057\114\103\122\141\143
\162\141\151\172\056\143\162\154\060\035\006\003\125\035\016\004
\026\004\024\212\372\361\127\204\021\023\065\220\102\372\127\111
\124\151\015\244\304\360\067\060\017\006\003\125\035\023\001\001
\377\004\005\060\003\001\001\377\060\016\006\003\125\035\017\001
\001\377\004\004\003\002\001\006\060\015\006\011\052\206\110\206
\367\015\001\001\005\005\000\003\202\001\001\000\031\003\227\065
\123\370\140\042\036\216\162\002\300\176\042\140\025\152\157\230
\066\126\252\125\167\323\366\307\026\230\374\210\032\033\045\051
\271\270\072\155\355\070\253\142\035\124\305\355\337\101\241\245
\142\062\136\373\334\335\372\054\317\105\260\152\134\365\120\003
\176\004\135\314\044\342\252\126\271\375\141\036\270\226\175\332
\361\360\007\052\112\252\372\012\344\005\301\052\373\344\132\054
\113\071\160\014\000\332\357\111\223\357\006\143\002\144\041\235
\234\166\304\236\260\175\151\123\365\124\037\113\377\311\141\342
\034\354\133\236\330\223\113\167\115\024\071\043\014\152\042\277
\267\277\136\234\243\107\020\015\237\272\221\367\274\110\240\177
\221\041\341\265\100\067\225\150\206\264\346\350\306\071\337\036
\327\101\226\153\324\301\073\153\236\145\024\111\322\171\075\056
\232\123\200\215\035\246\001\273\322\063\225\371\241\046\115\256
\147\255\167\074\223\217\147\345\010\317\002\013\263\013\151\275
\044\221\331\340\104\211\124\004\141\305\327\364\271\236\143\333
\053\357\100\343\253\035\337\172\052\053\311\374
END
# Trust for Certificate "ICP Brasil CA"
CKA_CLASS CK_OBJECT_CLASS CKO_NETSCAPE_TRUST
CKA_TOKEN CK_BBOOL CK_TRUE
CKA_PRIVATE CK_BBOOL CK_FALSE
CKA_MODIFIABLE CK_BBOOL CK_FALSE
CKA_LABEL UTF8 "ICP Brasil CA"
CKA_CERT_SHA1_HASH MULTILINE_OCTAL
\216\375\312\274\223\346\036\222\135\115\035\355\030\032\103\040
\244\147\241\071
END
CKA_CERT_MD5_HASH MULTILINE_OCTAL
\226\211\175\141\321\125\053\047\342\132\071\264\052\154\104\157
END
CKA_ISSUER MULTILINE_OCTAL
\060\201\264\061\013\060\011\006\003\125\004\006\023\002\102\122
\061\023\060\021\006\003\125\004\012\023\012\111\103\120\055\102
\162\141\163\151\154\061\075\060\073\006\003\125\004\013\023\064
\111\156\163\164\151\164\165\164\157\040\116\141\143\151\157\156
\141\154\040\144\145\040\124\145\143\156\157\154\157\147\151\141
\040\144\141\040\111\156\146\157\162\155\141\143\141\157\040\055
\040\111\124\111\061\021\060\017\006\003\125\004\007\023\010\102
\162\141\163\151\154\151\141\061\013\060\011\006\003\125\004\010
\023\002\104\106\061\061\060\057\006\003\125\004\003\023\050\101
\165\164\157\162\151\144\141\144\145\040\103\145\162\164\151\146
\151\143\141\144\157\162\141\040\122\141\151\172\040\102\162\141
\163\151\154\145\151\162\141
END
CKA_SERIAL_NUMBER MULTILINE_OCTAL
\002\001\004
END
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR

163
mozilla-nss.changes Normal file
View File

@ -0,0 +1,163 @@
-------------------------------------------------------------------
Sun Oct 1 23:01:38 CEST 2006 - wr@rosenauer.org
- update to NSS 3.11.3
- requires NSPR 4.6.3 (pkgconfig)
-------------------------------------------------------------------
Wed Sep 6 08:23:45 CEST 2006 - stark@suse.de
- update to NSS_3_11_20060905_TAG to be in sync with
Gecko 1.8.1
-------------------------------------------------------------------
Mon Aug 7 13:53:55 CEST 2006 - stark@suse.de
- enabled usage of ECC
-------------------------------------------------------------------
Sat Aug 5 09:50:47 CEST 2006 - stark@suse.de
- update to NSS_3_11_20060731_TAG to be in sync with
Gecko 1.8.1
-------------------------------------------------------------------
Fri Jul 28 07:09:44 CEST 2006 - stark@suse.de
- fixed usage of uninitialized pointers (uninit.patch)
- requires NSPR 4.6.2
-------------------------------------------------------------------
Sat Jul 1 23:37:52 CEST 2006 - stark@suse.de
- update to 3.11.2 RTM version
* ECC not enabled but defines needed symbols
-------------------------------------------------------------------
Thu Jun 8 11:45:14 CEST 2006 - stark@suse.de
- update to 3.11.2 beta
* enabled ECC (needed since MOZILLA_1_8_BRANCH)
-------------------------------------------------------------------
Mon May 15 20:38:37 CEST 2006 - stark@suse.de
- update to 3.11.1 RTM version
including:
* TLS server name indication extension support
* implement RFC 3546 (TLS v1.0 extensions)
* fixed bugs found by Coverity
-------------------------------------------------------------------
Mon Jan 30 08:34:45 CET 2006 - stark@suse.de
- removed additional CA certs
- removed zip from BuildRequires
-------------------------------------------------------------------
Wed Jan 25 21:32:31 CET 2006 - mls@suse.de
- converted neededforbuild to BuildRequires
-------------------------------------------------------------------
Wed Jan 11 16:15:18 CET 2006 - stark@suse.de
- install nss-config executable
-------------------------------------------------------------------
Fri Dec 16 20:24:05 CET 2005 - stark@suse.de
- marked libfreebl3.so noexec stack
-------------------------------------------------------------------
Fri Dec 16 09:41:15 CET 2005 - stark@suse.de
- update to 3.11 RTM version
- provide nss-config file
- added static libs
- moved include files to /usr/include/nss3
- only ship a subset of the tools
-------------------------------------------------------------------
Sat Nov 26 14:54:03 CET 2005 - stark@suse.de
- update to 3.11rc1
- fixed PC file for 64bit archs
-------------------------------------------------------------------
Tue Nov 15 07:35:25 CET 2005 - stark@suse.de
- update to current 3.10.2 snapshot (20051114)
-------------------------------------------------------------------
Wed Nov 2 12:17:23 CET 2005 - stark@suse.de
- added tools subpackage which provides all NSS related
tools for managing and debugging NSS stuff
-------------------------------------------------------------------
Tue Oct 11 07:08:38 CEST 2005 - stark@suse.de
- update to current 3.10.2 snapshot
-------------------------------------------------------------------
Mon Sep 26 21:59:00 CEST 2005 - stark@suse.de
- prerequire the correct NSPR version
-------------------------------------------------------------------
Thu Sep 22 07:15:30 CEST 2005 - stark@suse.de
- update to NSS_3_10_2_BETA1
-------------------------------------------------------------------
Tue Jul 5 15:33:18 CEST 2005 - stark@suse.de
- use RPM_OPT_FLAGS
- fixed requirements for devel package
-------------------------------------------------------------------
Wed Jun 8 09:19:59 CEST 2005 - stark@suse.de
- added pkgconfig file
- fixed permission for include directory
- fixed compiler/abuild warning
- included correct header files
-------------------------------------------------------------------
Mon May 9 09:34:30 CEST 2005 - stark@suse.de
- update to 3.10 RTM version
-------------------------------------------------------------------
Wed Apr 27 07:52:55 CEST 2005 - stark@suse.de
- don't package static libs
- copy NSPR static libs from new location
-------------------------------------------------------------------
Thu Apr 7 09:08:22 CEST 2005 - stark@suse.de
- update to 3.10beta3
-------------------------------------------------------------------
Fri Apr 1 15:55:58 CEST 2005 - stark@suse.de
- don't parallelize build
-------------------------------------------------------------------
Thu Mar 31 07:39:45 CEST 2005 - stark@suse.de
- fixed build on other archs
- update to 3.10beta2
-------------------------------------------------------------------
Sat Mar 19 13:36:51 CET 2005 - stark@suse.de
- update to 3.10beta1
-------------------------------------------------------------------
Tue Mar 8 09:16:59 CET 2005 - stark@suse.de
- initial standalone package

255
mozilla-nss.spec Normal file
View File

@ -0,0 +1,255 @@
#
# spec file for package mozilla-nss (Version 3.11.3)
#
# Copyright (c) 2006 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
# package are under the same license as the package itself.
#
# Please submit bugfixes or comments via http://bugs.opensuse.org/
#
# norootforbuild
Name: mozilla-nss
BuildRequires: gcc-c++ mozilla-nspr-devel
License: Other License(s), see package
Version: 3.11.3
Release: 1
Summary: Network (Netscape) Security Services
URL: http://www.mozilla.org/projects/security/pki/nss/
Group: System/Libraries
Source: nss-%{version}.tar.bz2
Source1: nss.pc.in
Source2: addon-certs.txt
Source3: nss-config.in
Patch1: nss-opt.patch
Patch2: uninit.patch
Patch3: system-nspr.patch
PreReq: mozilla-nspr >= %( echo `rpm -q --queryformat '%{VERSION}' mozilla-nspr`)
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%description
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v2 and v3,
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.
Authors:
--------
Mozilla Foundation <drivers@mozilla.org>
%package devel
Summary: Network (Netscape) Security Services development files
Group: Development/Libraries/Other
Requires: mozilla-nspr-devel
Requires: mozilla-nss = %{version}-%{release}
%description devel
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v2 and v3,
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.
Authors:
--------
Mozilla Foundation <drivers@mozilla.org>
%package tools
Summary: Tools for developing, debugging, and managing applications that use NSS.
Group: System/Management
%description tools
The NSS Security Tools allow developers to test, debug, and manage
applications that use NSS.
Authors:
--------
Mozilla Foundation <drivers@mozilla.org>
%prep
# NSS is currently
# NSS_3_11_BRANCH
%setup -n nss-%{version} -q
cd mozilla
%patch1
%patch2
%patch3
# additional CA certificates
#cd security/nss/lib/ckfw/builtins
#cat %{SOURCE2} >> certdata.txt
#make generate
%build
cd mozilla/security/nss
export CFLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing"
export NSPR_INCLUDE_DIR=`nspr-config --includedir`
export NSPR_LIB_DIR=`nspr-config --libdir`
export BUILD_OPT=1
export NSS_ENABLE_ECC=1
export LIBDIR=%{_libdir}
%ifarch x86_64 s390x ppc64 ia64
export USE_64=1
%endif
make nss_build_all
%install
mkdir -p $RPM_BUILD_ROOT%{_libdir}
mkdir -p $RPM_BUILD_ROOT%{_includedir}/nss3
mkdir -p $RPM_BUILD_ROOT%{_bindir}
pushd mozilla/dist/Linux*
# copy headers
cp -rL ../public/nss/*.h $RPM_BUILD_ROOT%{_includedir}/nss3
# copy dynamic libs
cp -L lib/libnss3.so \
lib/libnssckbi.so \
lib/libsmime3.so \
lib/libsoftokn3.so \
lib/libsoftokn3.chk \
lib/libssl3.so \
lib/libfreebl3.so \
lib/libfreebl3.chk \
$RPM_BUILD_ROOT%{_libdir}
# copy static libs
cp -L lib/libcrmf.a \
lib/libnssb.a \
lib/libnssckfw.a \
$RPM_BUILD_ROOT%{_libdir}
# copy tools
cp -L bin/certutil \
bin/modutil \
bin/pk12util \
bin/signtool \
bin/ssltap \
$RPM_BUILD_ROOT%{_bindir}
# prepare pkgconfig file
mkdir -p $RPM_BUILD_ROOT%{_libdir}/pkgconfig/
sed "s:%%LIBDIR%%:%{_libdir}:g
s:%%VERSION%%:%{version}:g" \
%{SOURCE1} > $RPM_BUILD_ROOT%{_libdir}/pkgconfig/nss.pc
# prepare nss-config file
popd
NSS_VMAJOR=`cat mozilla/security/nss/lib/nss/nss.h | grep "#define.*NSS_VMAJOR" | awk '{print $3}'`
NSS_VMINOR=`cat mozilla/security/nss/lib/nss/nss.h | grep "#define.*NSS_VMINOR" | awk '{print $3}'`
NSS_VPATCH=`cat mozilla/security/nss/lib/nss/nss.h | grep "#define.*NSS_VPATCH" | awk '{print $3}'`
cat %{SOURCE3} | sed -e "s,@libdir@,%{_libdir},g" \
-e "s,@prefix@,%{_prefix},g" \
-e "s,@exec_prefix@,%{_prefix},g" \
-e "s,@includedir@,%{_includedir}/nss3,g" \
-e "s,@MOD_MAJOR_VERSION@,$NSS_VMAJOR,g" \
-e "s,@MOD_MINOR_VERSION@,$NSS_VMINOR,g" \
-e "s,@MOD_PATCH_VERSION@,$NSS_VPATCH,g" \
> $RPM_BUILD_ROOT/%{_bindir}/nss-config
chmod 755 $RPM_BUILD_ROOT/%{_bindir}/nss-config
%post -p /sbin/ldconfig
%postun -p /sbin/ldconfig
%clean
rm -rf $RPM_BUILD_ROOT
%files
%defattr(-, root, root)
%{_libdir}/*.so
%{_libdir}/*.chk
%files devel
%defattr(644, root, root, 755)
%{_includedir}/nss3/
%{_libdir}/*.a
%{_libdir}/pkgconfig/*
%attr(755,root,root) %{_bindir}/nss-config
%files tools
%defattr(-, root, root)
%{_bindir}/*
%exclude %{_bindir}/nss-config
%changelog -n mozilla-nss
* Sun Oct 01 2006 - wr@rosenauer.org
- update to NSS 3.11.3
- requires NSPR 4.6.3 (pkgconfig)
* Wed Sep 06 2006 - stark@suse.de
- update to NSS_3_11_20060905_TAG to be in sync with
Gecko 1.8.1
* Mon Aug 07 2006 - stark@suse.de
- enabled usage of ECC
* Sat Aug 05 2006 - stark@suse.de
- update to NSS_3_11_20060731_TAG to be in sync with
Gecko 1.8.1
* Fri Jul 28 2006 - stark@suse.de
- fixed usage of uninitialized pointers (uninit.patch)
- requires NSPR 4.6.2
* Sat Jul 01 2006 - stark@suse.de
- update to 3.11.2 RTM version
* ECC not enabled but defines needed symbols
* Thu Jun 08 2006 - stark@suse.de
- update to 3.11.2 beta
* enabled ECC (needed since MOZILLA_1_8_BRANCH)
* Mon May 15 2006 - stark@suse.de
- update to 3.11.1 RTM version
including:
* TLS server name indication extension support
* implement RFC 3546 (TLS v1.0 extensions)
* fixed bugs found by Coverity
* Mon Jan 30 2006 - stark@suse.de
- removed additional CA certs
- removed zip from BuildRequires
* Wed Jan 25 2006 - mls@suse.de
- converted neededforbuild to BuildRequires
* Wed Jan 11 2006 - stark@suse.de
- install nss-config executable
* Fri Dec 16 2005 - stark@suse.de
- marked libfreebl3.so noexec stack
* Fri Dec 16 2005 - stark@suse.de
- update to 3.11 RTM version
- provide nss-config file
- added static libs
- moved include files to /usr/include/nss3
- only ship a subset of the tools
* Sat Nov 26 2005 - stark@suse.de
- update to 3.11rc1
- fixed PC file for 64bit archs
* Tue Nov 15 2005 - stark@suse.de
- update to current 3.10.2 snapshot (20051114)
* Wed Nov 02 2005 - stark@suse.de
- added tools subpackage which provides all NSS related
tools for managing and debugging NSS stuff
* Tue Oct 11 2005 - stark@suse.de
- update to current 3.10.2 snapshot
* Mon Sep 26 2005 - stark@suse.de
- prerequire the correct NSPR version
* Thu Sep 22 2005 - stark@suse.de
- update to NSS_3_10_2_BETA1
* Tue Jul 05 2005 - stark@suse.de
- use RPM_OPT_FLAGS
- fixed requirements for devel package
* Wed Jun 08 2005 - stark@suse.de
- added pkgconfig file
- fixed permission for include directory
- fixed compiler/abuild warning
- included correct header files
* Mon May 09 2005 - stark@suse.de
- update to 3.10 RTM version
* Wed Apr 27 2005 - stark@suse.de
- don't package static libs
- copy NSPR static libs from new location
* Thu Apr 07 2005 - stark@suse.de
- update to 3.10beta3
* Fri Apr 01 2005 - stark@suse.de
- don't parallelize build
* Thu Mar 31 2005 - stark@suse.de
- fixed build on other archs
- update to 3.10beta2
* Sat Mar 19 2005 - stark@suse.de
- update to 3.10beta1
* Tue Mar 08 2005 - stark@suse.de
- initial standalone package

3
nss-3.11.3.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:57482a3c011ae56801fb859b8e4c4a55a797e106b15644f5e49ceb2329a3428b
size 2891582

137
nss-config.in Normal file
View File

@ -0,0 +1,137 @@
#!/bin/sh
prefix=@prefix@
major_version=@MOD_MAJOR_VERSION@
minor_version=@MOD_MINOR_VERSION@
patch_version=@MOD_PATCH_VERSION@
usage()
{
cat <<EOF
Usage: nss-config [OPTIONS] [LIBRARIES]
Options:
[--prefix[=DIR]]
[--exec-prefix[=DIR]]
[--includedir[=DIR]]
[--libdir[=DIR]]
[--version]
[--libs]
[--cflags]
Dynamic Libraries:
nss
ssl
smime
EOF
exit $1
}
if test $# -eq 0; then
usage 1 1>&2
fi
lib_ssl=yes
lib_smime=yes
lib_nss=yes
while test $# -gt 0; do
case "$1" in
-*=*) optarg=`echo "$1" | sed 's/[-_a-zA-Z0-9]*=//'` ;;
*) optarg= ;;
esac
case $1 in
--prefix=*)
prefix=$optarg
;;
--prefix)
echo_prefix=yes
;;
--exec-prefix=*)
exec_prefix=$optarg
;;
--exec-prefix)
echo_exec_prefix=yes
;;
--includedir=*)
includedir=$optarg
;;
--includedir)
echo_includedir=yes
;;
--libdir=*)
libdir=$optarg
;;
--libdir)
echo_libdir=yes
;;
--version)
echo ${major_version}.${minor_version}.${patch_version}
;;
--cflags)
echo_cflags=yes
;;
--libs)
echo_libs=yes
;;
ssl)
lib_ssl=yes
;;
smime)
lib_smime=yes
;;
nss)
lib_nss=yes
;;
*)
usage 1 1>&2
;;
esac
shift
done
# Set variables that may be dependent upon other variables
if test -z "$exec_prefix"; then
exec_prefix=@exec_prefix@
fi
if test -z "$includedir"; then
includedir=@includedir@
fi
if test -z "$libdir"; then
libdir=@libdir@
fi
if test "$echo_prefix" = "yes"; then
echo $prefix
fi
if test "$echo_exec_prefix" = "yes"; then
echo $exec_prefix
fi
if test "$echo_includedir" = "yes"; then
echo $includedir
fi
if test "$echo_libdir" = "yes"; then
echo $libdir
fi
if test "$echo_cflags" = "yes"; then
echo -I$includedir
fi
if test "$echo_libs" = "yes"; then
libdirs="-Wl,-rpath-link,$libdir -L$libdir"
if test -n "$lib_ssl"; then
libdirs="$libdirs -lssl${major_version}"
fi
if test -n "$lib_smime"; then
libdirs="$libdirs -lsmime${major_version}"
fi
if test -n "$lib_nss"; then
libdirs="$libdirs -lnss${major_version}"
fi
echo $libdirs
fi

16
nss-opt.patch Normal file
View File

@ -0,0 +1,16 @@
Index: security/coreconf/Linux.mk
===================================================================
RCS file: /cvsroot/mozilla/security/coreconf/Linux.mk,v
retrieving revision 1.27
diff -u -r1.27 Linux.mk
--- security/coreconf/Linux.mk 16 Sep 2005 17:09:23 -0000 1.27
+++ security/coreconf/Linux.mk 25 Nov 2005 22:08:04 -0000
@@ -148,7 +148,7 @@
endif
ifdef BUILD_OPT
- OPTIMIZER = -O2
+ OPTIMIZER = $(RPM_OPT_FLAGS) -fno-strict-aliasing
endif
ifeq ($(USE_PTHREADS),1)

11
nss.pc.in Normal file
View File

@ -0,0 +1,11 @@
prefix=/usr
exec_prefix=${prefix}
libdir=%LIBDIR%
includedir=${prefix}/include/nss3
Name: NSS
Description: Network Security Services
Version: %VERSION%
Requires: nspr >= 4.6.3
Libs: -Wl,-rpath-link,${libdir} -L${libdir} -lssl3 -lsmime3 -lnss3
Cflags: -I${includedir}

0
ready Normal file
View File

11
system-nspr.patch Normal file
View File

@ -0,0 +1,11 @@
--- mozilla/security/nss/Makefile
+++ security/nss/Makefile
@@ -78,7 +78,7 @@
# (7) Execute "local" rules. (OPTIONAL). #
#######################################################################
-nss_build_all: build_coreconf build_nspr build_dbm all
+nss_build_all: build_coreconf build_dbm all
build_coreconf:
cd $(CORE_DEPTH)/coreconf ; $(MAKE)

51
uninit.patch Normal file
View File

@ -0,0 +1,51 @@
Index: security/nss/cmd/fipstest/fipstest.c
===================================================================
RCS file: /cvsroot/mozilla/security/nss/cmd/fipstest/fipstest.c,v
retrieving revision 1.3.2.21
diff -u -p -r1.3.2.21 fipstest.c
--- security/nss/cmd/fipstest/fipstest.c 25 Mar 2006 23:47:58 -0000 1.3.2.21
+++ security/nss/cmd/fipstest/fipstest.c 28 Jul 2006 05:09:07 -0000
@@ -2916,8 +2916,8 @@ void sha_test(char *reqfn)
unsigned char seed[HASH_LENGTH_MAX]; /* max size of seed 64 bytes */
unsigned char MD[HASH_LENGTH_MAX]; /* message digest */
- FILE *req; /* input stream from the REQUEST file */
- FILE *resp; /* output stream to the RESPONSE file */
+ FILE *req = NULL; /* input stream from the REQUEST file */
+ FILE *resp; /* output stream to the RESPONSE file */
buf = PORT_ZAlloc(bufSize);
if (buf == NULL) {
@@ -3013,7 +3013,9 @@ void sha_test(char *reqfn)
}
}
loser:
- fclose(req);
+ if (req) {
+ fclose(req);
+ }
if (buf) {
PORT_ZFree(buf, bufSize);
}
@@ -3088,8 +3090,8 @@ void hmac_test(char *reqfn)
unsigned char HMAC[HASH_LENGTH_MAX]; /* computed HMAC */
HASH_HashType hash_alg; /* HMAC type */
- FILE *req; /* input stream from the REQUEST file */
- FILE *resp; /* output stream to the RESPONSE file */
+ FILE *req = NULL; /* input stream from the REQUEST file */
+ FILE *resp; /* output stream to the RESPONSE file */
buf = PORT_ZAlloc(bufSize);
if (buf == NULL) {
@@ -3201,7 +3203,9 @@ void hmac_test(char *reqfn)
}
}
loser:
- fclose(req);
+ if (req) {
+ fclose(req);
+ }
if (buf) {
PORT_ZFree(buf, bufSize);
}