[nss-softokn/f17] Update to NSS_3_13_4_RTM
Elio Maldonado
emaldonado at fedoraproject.org
Fri Apr 6 21:51:19 UTC 2012
commit 77ae58a7e5baf231d706c495f62d4be37a6ffecb
Author: Elio Maldonado <emaldona at redhat.com>
Date: Fri Apr 6 14:46:26 2012 -0700
Update to NSS_3_13_4_RTM
- Improve the steps for splitting off softokn from the full nss
- Strip off non-free code directly on the upstream tar ball and split off
- nss-util from the resultant tar ball showing the provenance of the sources
.gitignore | 2 +-
mozilla-crypto-strip.sh | 128 +++++++++++++++++++
nss-softokn.spec | 41 ++++---
softoken-minimal-test-dependencies.patch | 200 +++++++++++++----------------
sources | 2 +-
5 files changed, 246 insertions(+), 127 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 40e7163..8443d70 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1 +1 @@
-nss-softokn-3.13.3-stripped.tar.bz2
+/nss-softokn-3.13.4-stripped.tar.bz2
diff --git a/mozilla-crypto-strip.sh b/mozilla-crypto-strip.sh
new file mode 100755
index 0000000..4edcbf0
--- /dev/null
+++ b/mozilla-crypto-strip.sh
@@ -0,0 +1,128 @@
+#!/bin/sh
+set -e
+
+if test -z $1
+then
+ echo "usage: $0 <input-tarball>"
+ exit
+fi
+
+ORIGDIR=`pwd`
+WORKDIR=nss_ecc_strip_working_dir
+EXTENSION=`echo $1 | sed -r 's#^(.*)(.tar.bz2|.tbz2|.tar.gz|.tgz)$#\2#'`
+BASE=`echo $1 | sed -r 's#^(.*)(.tar.bz2|.tbz2|.tar.gz|.tgz)$#\1#'`
+COMPRESS=""
+
+if test "x$EXTENSION" = "x.tar.bz2" || test "x$EXTENSION" = "x.tbz2"
+then
+ COMPRESS="j"
+fi
+
+if test "x$EXTENSION" = "x.tar.gz" || test "x$EXTENSION" = "x.tgz"
+then
+ COMPRESS="z"
+fi
+
+if test "x$COMPRESS" = "x"
+then
+ echo "unable to process, input file $1 has unsupported extension"
+ exit
+fi
+
+echo "== extension is $EXTENSION - ok"
+echo "== new extension will be $JEXTENSION"
+echo "== cleaning old workdir $WORKDIR"
+
+rm -rf $WORKDIR
+mkdir $WORKDIR
+
+echo "== extracting input archive $1"
+tar -x -$COMPRESS -C $WORKDIR -f $1
+
+echo "changing into $WORKDIR"
+pushd $WORKDIR
+
+DIRCOUNT=`ls -1 | wc -l`
+if test $DIRCOUNT -ne 1
+then
+ echo "unable to process, $1 contains more than one toplevel directory"
+ exit
+fi
+
+TOPDIR=`ls -1`
+if test "x$TOPDIR" != "xmozilla"
+then
+ # try to deal with a single additional subdirectory above "mozilla"
+ echo "== skipping toplevel directory $TOPDIR"
+ cd $TOPDIR
+fi
+
+DIRCOUNT=`ls -1 | wc -l`
+if test $DIRCOUNT -ne 1
+then
+ echo "unable to process, $1 contains more than one second level directory"
+ exit
+fi
+
+SINGLEDIR=`ls -1`
+if test "x$SINGLEDIR" != "xmozilla"
+then
+ echo "unable to process, first or second level directory is not mozilla"
+ exit
+fi
+
+echo "== input archive accepted, now processing"
+
+REALFREEBLDIR=mozilla/security/nss/lib/freebl
+FREEBLDIR=./$REALFREEBLDIR
+
+rm -rf ./mozilla/security/nss/cmd/ecperf
+
+mv ${FREEBLDIR}/ecl/ecl-exp.h ${FREEBLDIR}/save
+rm -rf ${FREEBLDIR}/ecl/tests
+rm -rf ${FREEBLDIR}/ecl/CVS
+for i in ${FREEBLDIR}/ecl/* ; do
+echo clobbering $i
+ > $i
+done
+mv ${FREEBLDIR}/save ${FREEBLDIR}/ecl/ecl-exp.h
+
+for j in ${FREEBLDIR}/ec.*; do
+ echo unifdef $j
+ cat $j | \
+ awk 'BEGIN {ech=1; prt=0;} \
+ /^#[ \t]*ifdef.*NSS_ENABLE_ECC/ {ech--; next;} \
+ /^#[ \t]*if/ {if(ech < 1) ech--;} \
+ {if(ech>0) {;print $0};} \
+ /^#[ \t]*endif/ {if(ech < 1) ech++;} \
+ {if (prt && (ech<=0)) {;print $0}; } \
+ {if (ech>0) {prt=0;} } \
+ /^#[ \t]*else/ {if (ech == 0) prt=1;}' > $j.hobbled && \
+ mv $j.hobbled $j
+done
+
+echo "== returning to original directory"
+popd
+
+JCOMPRESS=j
+JEXTENSION=.tar.bz2
+NEWARCHIVE=$BASE-stripped$JEXTENSION
+echo "== finally producing new archive $NEWARCHIVE"
+tar -c -$JCOMPRESS -C $WORKDIR -f $NEWARCHIVE $TOPDIR
+
+echo "== all done, listing of old and new archive:"
+ls -l $1
+ls -l $NEWARCHIVE
+
+LISTING_DIR=""
+if test "x$TOPDIR" != "xmozilla"
+then
+ LISTING_DIR="$TOPDIR/$REALFREEBLDIR/ecl"
+else
+ LISTING_DIR="$REALFREEBLDIR/ecl"
+fi
+
+echo "== FYI, producing listing of stripped dir in new archive"
+tar -t -v -$JCOMPRESS -C $WORKDIR -f $NEWARCHIVE $LISTING_DIR
+
+
diff --git a/nss-softokn.spec b/nss-softokn.spec
index b6837b9..51cdee9 100644
--- a/nss-softokn.spec
+++ b/nss-softokn.spec
@@ -1,6 +1,6 @@
%global nspr_version 4.9
%global nss_name nss
-%global nss_util_version 3.13.3
+%global nss_util_version 3.13.4
%global unsupported_tools_directory %{_libdir}/nss/unsupported-tools
%global saved_files_dir %{_libdir}/nss/saved
@@ -16,8 +16,8 @@
Summary: Network Security Services Softoken Module
Name: nss-softokn
-Version: 3.13.3
-Release: 3%{?dist}
+Version: 3.13.4
+Release: 1%{?dist}
License: MPLv1.1 or GPLv2+ or LGPLv2+
URL: http://www.mozilla.org/projects/security/pki/nss/
Group: System Environment/Libraries
@@ -35,19 +35,27 @@ BuildRequires: psmisc
BuildRequires: perl
Source0: %{name}-%{version}-stripped.tar.bz2
-# The nss-softokn tar ball is a subset of nss-{version}-stripped.tar.bz2,
-# Therefore we use the nss-split-softokn.sh script to keep only what we need.
-# Download the nss tarball via git from the nss project and follow these
-# steps to make the tarball for nss-util out of the one for nss:
-# fedpkg clone nss
+# The nss-softokn tar ball is a subset of nss-{version}-stripped.tar.bz2.
+# We use the nss-split-softokn.sh script to keep only what we need.
+# We first produce the full source archive from from the upstream,
+# nss-{version}-stripped.tar.gz, by running mozilla-crypto-strip.sh
+# to remove any non-free sources and then split off nss-softokn from nss
+# via nss-split-util.sh ${version}
+# Detailed Steps:
# fedpkg clone nss-softokn
# cd nss-softokn
-# cp ../../nss/devel/${version}-stripped.tar.bz2 .
+# Download the nss-{version}-stripped.tar.gz tarball from upstream
+# Strip-off unwanted sources with
+# ./mozilla-crypto-srip.sh nss-{version}-stripped.tar.gz
+# which produces nss-{version}-stripped.tar.bz2
+# Make the source tarball for nss-softokn out of the nss stripped one:
# sh ./nss-split-softokn.sh ${version}
# A file named {name}-{version}-stripped.tar.bz2 should appear
-Source1: nss-split-softokn.sh
-Source2: nss-softokn.pc.in
-Source3: nss-softokn-config.in
+# which is ready for uploading to the lookaside cache.
+Source1: mozilla-crypto-strip.sh
+Source2: nss-split-softokn.sh
+Source3: nss-softokn.pc.in
+Source4: nss-softokn-config.in
Patch1: add-relro-linker-option.patch
# Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=562116
@@ -109,7 +117,7 @@ BuildRequires: nss-util-devel >= %{nss_util_version}
BuildRequires: nss-devel >= 3.12.2.99.3-11
%description devel
-Header and Library files for doing development with Network Security Services.
+Header and library files for doing development with Network Security Services.
%prep
@@ -189,7 +197,7 @@ export USE_64
# The nspr_version and nss_util_version globals used here
# must match the ones nss-softokn has for its Requires.
%{__mkdir_p} ./mozilla/dist/pkgconfig
-%{__cat} %{SOURCE2} | sed -e "s,%%libdir%%,%{_libdir},g" \
+%{__cat} %{SOURCE3} | sed -e "s,%%libdir%%,%{_libdir},g" \
-e "s,%%prefix%%,%{_prefix},g" \
-e "s,%%exec_prefix%%,%{_prefix},g" \
-e "s,%%includedir%%,%{_includedir}/nss3,g" \
@@ -206,7 +214,7 @@ export SOFTOKEN_VMAJOR
export SOFTOKEN_VMINOR
export SOFTOKEN_VPATCH
-%{__cat} %{SOURCE3} | sed -e "s, at libdir@,%{_libdir},g" \
+%{__cat} %{SOURCE4} | sed -e "s, at libdir@,%{_libdir},g" \
-e "s, at prefix@,%{_prefix},g" \
-e "s, at exec_prefix@,%{_prefix},g" \
-e "s, at includedir@,%{_includedir}/nss3,g" \
@@ -381,6 +389,9 @@ done
%{_includedir}/nss3/shsign.h
%changelog
+* Fri Apr 06 2012 Elio Maldonado <emaldona at redhat.com> - 3.13.4-1
+- Update to NSS_3_13_4
+
* Mon Apr 02 2012 Elio Maldonado <emaldona at redhat.com> - 3.13.3-3
- Bump the release tag to ensure n-v-r is higher that in f16
diff --git a/softoken-minimal-test-dependencies.patch b/softoken-minimal-test-dependencies.patch
index 01c439b..52abbff 100644
--- a/softoken-minimal-test-dependencies.patch
+++ b/softoken-minimal-test-dependencies.patch
@@ -1,6 +1,6 @@
diff -up ./mozilla/security/nss/cmd/lib/manifest.mn.crypto ./mozilla/security/nss/cmd/lib/manifest.mn
--- ./mozilla/security/nss/cmd/lib/manifest.mn.crypto 2011-09-16 12:16:50.000000000 -0700
-+++ ./mozilla/security/nss/cmd/lib/manifest.mn 2012-03-01 13:52:51.826116574 -0800
++++ ./mozilla/security/nss/cmd/lib/manifest.mn 2012-04-01 13:15:51.536584250 -0700
@@ -48,11 +48,6 @@ PRIVATE_EXPORTS = secutil.h \
$(NULL)
@@ -14,8 +14,8 @@ diff -up ./mozilla/security/nss/cmd/lib/manifest.mn.crypto ./mozilla/security/ns
$(NULL)
diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/cmd/lib/secutil.c
---- ./mozilla/security/nss/cmd/lib/secutil.c.crypto 2011-11-16 11:12:30.000000000 -0800
-+++ ./mozilla/security/nss/cmd/lib/secutil.c 2012-03-01 13:58:46.550116160 -0800
+--- ./mozilla/security/nss/cmd/lib/secutil.c.crypto 2012-03-10 06:55:34.000000000 -0800
++++ ./mozilla/security/nss/cmd/lib/secutil.c 2012-04-01 13:15:51.538584248 -0700
@@ -48,10 +48,7 @@
#include "prenv.h"
#include "prnetdb.h"
@@ -27,7 +27,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
#include <stdarg.h>
#if !defined(_WIN32_WCE)
#include <sys/stat.h>
-@@ -62,37 +59,16 @@
+@@ -62,29 +59,9 @@
#include <unistd.h>
#endif
@@ -54,11 +54,11 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
-
-#include "nssutil.h"
-#include "ssl.h"
--
+extern long DER_GetInteger(SECItem *src);
- void
- SECU_PrintErrMsg(FILE *out, int level, char *progName, char *msg, ...)
+ static PRBool wrapEnabled = PR_TRUE;
+
+@@ -105,7 +82,7 @@ SECU_PrintErrMsg(FILE *out, int level, c
{
va_list args;
PRErrorCode err = PORT_GetError();
@@ -67,7 +67,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
va_start(args, msg);
-@@ -112,7 +88,7 @@ SECU_PrintError(char *progName, char *ms
+@@ -125,7 +102,7 @@ SECU_PrintError(char *progName, char *ms
{
va_list args;
PRErrorCode err = PORT_GetError();
@@ -76,7 +76,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
va_start(args, msg);
-@@ -142,446 +118,6 @@ SECU_PrintSystemError(char *progName, ch
+@@ -155,446 +132,6 @@ SECU_PrintSystemError(char *progName, ch
va_end(args);
}
@@ -523,7 +523,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
SECStatus
secu_StdinToItem(SECItem *dst)
{
-@@ -703,65 +239,6 @@ loser:
+@@ -716,65 +253,6 @@ loser:
return SECFailure;
}
@@ -589,7 +589,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
#define INDENT_MULT 4
void
SECU_Indent(FILE *out, int level)
-@@ -914,23 +391,6 @@ SECU_PrintBuf(FILE *out, const char *msg
+@@ -932,23 +410,6 @@ SECU_PrintBuf(FILE *out, const char *msg
}
}
@@ -613,11 +613,12 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
/* This expents i->data[0] to be the MSB of the integer.
** if you want to print a DER-encoded integer (with the tag and length)
-@@ -975,2427 +435,100 @@ SECU_PrintInteger(FILE *out, SECItem *i,
+@@ -993,2461 +454,100 @@ SECU_PrintInteger(FILE *out, SECItem *i,
}
static void
--secu_PrintRawString(FILE *out, SECItem *si, const char *m, int level)
+-secu_PrintRawStringQuotesOptional(FILE *out, SECItem *si, const char *m,
+- int level, PRBool quotes)
+secu_PrintRSAPublicKey(FILE *out, SECKEYPublicKey *pk, char *m, int level)
{
- int column;
@@ -631,11 +632,13 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- SECU_Indent(out, level);
- column = level*INDENT_MULT;
- }
-- fprintf(out, "\""); column++;
+- if (quotes) {
+- fprintf(out, "\""); column++;
+- }
-
- for (i = 0; i < si->len; i++) {
- unsigned char val = si->data[i];
-- if (column > 76) {
+- if (wrapEnabled && column > 76) {
- secu_Newline(out);
- SECU_Indent(out, level); column = level*INDENT_MULT;
- }
@@ -643,21 +646,29 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- fprintf(out,"%c", printable[val]); column++;
- }
-
-- fprintf(out, "\""); column++;
-- if (column != level*INDENT_MULT || column > 76) {
+- if (quotes) {
+- fprintf(out, "\""); column++;
+- }
+- if (wrapEnabled &&
+- (column != level*INDENT_MULT || column > 76)) {
- secu_Newline(out);
+ SECU_Indent(out, level); fprintf(out, "%s:\n", m);
+ SECU_PrintInteger(out, &pk->u.rsa.modulus, "Modulus", level+1);
+ SECU_PrintInteger(out, &pk->u.rsa.publicExponent, "Exponent", level+1);
+ if (pk->u.rsa.publicExponent.len == 1 &&
+ pk->u.rsa.publicExponent.data[0] == 1) {
-+ SECU_Indent(out, level +1); fprintf(out, "Error: INVALID RSA KEY!\n");
++ SECU_Indent(out, level +1); fprintf(out, "Error: INVALID RSA KEY!\n");
}
}
+ static void
+-secu_PrintRawString(FILE *out, SECItem *si, const char *m, int level)
+-{
+- secu_PrintRawStringQuotesOptional(out, si, m, level, PR_TRUE);
+-}
+-
-void
-SECU_PrintString(FILE *out, SECItem *si, char *m, int level)
-+static void
+secu_PrintDSAPublicKey(FILE *out, SECKEYPublicKey *pk, char *m, int level)
{
- SECItem my = *si;
@@ -761,15 +772,11 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
{
- int64 time;
- SECStatus rv;
-+ int j;
-+ char *target = a[i].longform;
-
+-
- rv = DER_UTCTimeToTime(&time, t);
- if (rv != SECSuccess)
- return;
-+ if (!target)
-+ return PR_FALSE;
-
+-
- secu_PrintTime(out, time, m, level);
-}
-
@@ -2098,7 +2105,8 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
-}
-
-void
--SECU_PrintName(FILE *out, CERTName *name, const char *msg, int level)
+-SECU_PrintNameQuotesOptional(FILE *out, CERTName *name, const char *msg,
+- int level, PRBool quotes)
-{
- char *nameStr = NULL;
- char *str;
@@ -2119,7 +2127,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- my.data = (unsigned char *)str;
- my.len = PORT_Strlen(str);
-#if 1
-- secu_PrintRawString(out, &my, msg, level);
+- secu_PrintRawStringQuotesOptional(out, &my, msg, level, quotes);
-#else
- SECU_Indent(out, level); fprintf(out, "%s: ", msg);
- fprintf(out, str);
@@ -2129,6 +2137,12 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
-}
-
-void
+-SECU_PrintName(FILE *out, CERTName *name, const char *msg, int level)
+-{
+- SECU_PrintNameQuotesOptional(out, name, msg, level, PR_TRUE);
+-}
+-
+-void
-printflags(char *trusts, unsigned int flags)
-{
- if (flags & CERTDB_VALID_CA)
@@ -2442,8 +2456,15 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- fpItem.data = fingerprint;
- fpItem.len = MD5_LENGTH;
- fpStr = CERT_Hexify(&fpItem, 1);
-- SECU_Indent(out, level); fprintf(out, "%s (MD5):\n", m);
-- SECU_Indent(out, level+1); fprintf(out, "%s\n", fpStr);
+- SECU_Indent(out, level); fprintf(out, "%s (MD5):", m);
+- if (wrapEnabled) {
+- fprintf(out, "\n");
+- SECU_Indent(out, level+1);
+- }
+- else {
+- fprintf(out, " ");
+- }
+- fprintf(out, "%s\n", fpStr);
- PORT_Free(fpStr);
- fpStr = NULL;
- if (rv != SECSuccess && !err)
@@ -2455,10 +2476,18 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- fpItem.data = fingerprint;
- fpItem.len = SHA1_LENGTH;
- fpStr = CERT_Hexify(&fpItem, 1);
-- SECU_Indent(out, level); fprintf(out, "%s (SHA1):\n", m);
-- SECU_Indent(out, level+1); fprintf(out, "%s\n", fpStr);
+- SECU_Indent(out, level); fprintf(out, "%s (SHA1):", m);
+- if (wrapEnabled) {
+- fprintf(out, "\n");
+- SECU_Indent(out, level+1);
+- }
+- else {
+- fprintf(out, " ");
+- }
+- fprintf(out, "%s\n", fpStr);
- PORT_Free(fpStr);
-- fprintf(out, "\n");
+- if (wrapEnabled)
+- fprintf(out, "\n");
-
- if (err)
- PORT_SetError(err);
@@ -2596,7 +2625,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- if (crl->entries != NULL) {
- iv = 0;
- while ((entry = crl->entries[iv++]) != NULL) {
-- sprintf(om, "Entry (%x):\n", iv);
+- sprintf(om, "Entry %d (0x%x):\n", iv, iv);
- SECU_Indent(out, level + 1); fputs(om, out);
- SECU_PrintInteger(out, &(entry->serialNumber), "Serial Number",
- level + 2);
@@ -2774,7 +2803,9 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- return rv;
- }
- }
--
++ int j;
++ char *target = a[i].longform;
+
- /* Parse and list CRL's (if any) */
- if (src->crls != NULL) {
- SECU_Indent(out, level + 1);
@@ -2792,7 +2823,9 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
- level + 3);
- }
- }
--
++ if (!target)
++ return PR_FALSE;
+
- /* Parse and list signatures (if any) */
- if (src->signerInfos != NULL) {
- SECU_Indent(out, level + 1);
@@ -3106,7 +3139,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
#if defined(DEBUG) || defined(FORCE_PR_ASSERT)
/* Returns true iff a[i].flag has a duplicate in a[i+1 : count-1] */
-@@ -3610,145 +743,6 @@ SECU_PrintPRandOSError(char *progName)
+@@ -3662,145 +762,6 @@ SECU_PrintPRandOSError(char *progName)
}
}
@@ -3252,7 +3285,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
SECOidTag
SECU_StringToSignatureAlgTag(const char *alg)
{
-@@ -3776,299 +770,6 @@ SECU_StringToSignatureAlgTag(const char
+@@ -3828,299 +789,6 @@ SECU_StringToSignatureAlgTag(const char
return hashAlgTag;
}
@@ -3552,7 +3585,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
/* Caller ensures that dst is at least item->len*2+1 bytes long */
void
SECU_SECItemToHex(const SECItem * item, char * dst)
-@@ -4131,40 +832,3 @@ SECU_SECItemHexStringToBinary(SECItem* s
+@@ -4183,40 +851,3 @@ SECU_SECItemHexStringToBinary(SECItem* s
srcdest->len /= 2;
return SECSuccess;
}
@@ -3594,8 +3627,8 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.c.crypto ./mozilla/security/nss/
-
-
diff -up ./mozilla/security/nss/cmd/lib/secutil.h.crypto ./mozilla/security/nss/cmd/lib/secutil.h
---- ./mozilla/security/nss/cmd/lib/secutil.h.crypto 2011-11-16 11:12:30.000000000 -0800
-+++ ./mozilla/security/nss/cmd/lib/secutil.h 2012-03-01 13:52:51.842116753 -0800
+--- ./mozilla/security/nss/cmd/lib/secutil.h.crypto 2012-03-10 04:10:45.000000000 -0800
++++ ./mozilla/security/nss/cmd/lib/secutil.h 2012-04-01 13:15:51.539584248 -0700
@@ -38,7 +38,10 @@
#include "seccomon.h"
@@ -3607,7 +3640,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.h.crypto ./mozilla/security/nss/
#include "prerror.h"
#include "base64.h"
#include "key.h"
-@@ -47,226 +50,31 @@
+@@ -47,25 +50,6 @@
#include "secder.h"
#include <stdio.h>
@@ -3628,15 +3661,15 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.h.crypto ./mozilla/security/nss/
-#define NS_CRL_HEADER "-----BEGIN CRL-----"
-#define NS_CRL_TRAILER "-----END CRL-----"
-
- #define SECU_Strerror PORT_ErrorToString
-
--#ifdef SECUTIL_NEW
--typedef int (*SECU_PPFunc)(PRFileDesc *out, SECItem *item,
-- char *msg, int level);
--#else
--typedef int (*SECU_PPFunc)(FILE *out, SECItem *item, char *msg, int level);
--#endif
+-#define SECU_Strerror PORT_ErrorToString
-
+ #ifdef SECUTIL_NEW
+ typedef int (*SECU_PPFunc)(PRFileDesc *out, SECItem *item,
+ char *msg, int level);
+@@ -73,203 +57,29 @@ typedef int (*SECU_PPFunc)(PRFileDesc *o
+ typedef int (*SECU_PPFunc)(FILE *out, SECItem *item, char *msg, int level);
+ #endif
+
-typedef struct {
- enum {
- PW_NONE = 0,
@@ -3732,6 +3765,9 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.h.crypto ./mozilla/security/nss/
- struct CERTCertificateStr **pRetCert,
- struct SECKEYPrivateKeyStr **pRetKey);
-
+-extern PRBool SECU_GetWrapEnabled();
+-extern void SECU_EnableWrap(PRBool enable);
+-
/* print out an error message */
extern void SECU_PrintError(char *progName, char *msg, ...);
@@ -3834,63 +3870,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.h.crypto ./mozilla/security/nss/
/* Dump contents of an RSA public key */
extern int SECU_PrintRSAPublicKey(FILE *out, SECItem *der, char *m, int level);
-@@ -278,55 +86,10 @@ extern int SECU_PrintSubjectPublicKeyInf
- extern int SECU_PrintPrivateKey(FILE *out, SECItem *der, char *m, int level);
- #endif
-
--/* Print the MD5 and SHA1 fingerprints of a cert */
--extern int SECU_PrintFingerprints(FILE *out, SECItem *derCert, char *m,
-- int level);
--
--/* Pretty-print any PKCS7 thing */
--extern int SECU_PrintPKCS7ContentInfo(FILE *out, SECItem *der, char *m,
-- int level);
--
- /* Init PKCS11 stuff */
- extern SECStatus SECU_PKCS11Init(PRBool readOnly);
-
--/* Dump contents of signed data */
--extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m,
-- int level, SECU_PPFunc inner);
--
--/* Print cert data and its trust flags */
--extern SECStatus SEC_PrintCertificateAndTrust(CERTCertificate *cert,
-- const char *label,
-- CERTCertTrust *trust);
--
--extern int SECU_PrintCrl(FILE *out, SECItem *der, char *m, int level);
--
--extern void
--SECU_PrintCRLInfo(FILE *out, CERTCrl *crl, char *m, int level);
--
- extern void SECU_PrintString(FILE *out, SECItem *si, char *m, int level);
--extern void SECU_PrintAny(FILE *out, SECItem *i, char *m, int level);
--
--extern void SECU_PrintPolicy(FILE *out, SECItem *value, char *msg, int level);
--extern void SECU_PrintPrivKeyUsagePeriodExtension(FILE *out, SECItem *value,
-- char *msg, int level);
--
--extern void SECU_PrintExtensions(FILE *out, CERTCertExtension **extensions,
-- char *msg, int level);
--
--extern void SECU_PrintName(FILE *out, CERTName *name, const char *msg,
-- int level);
--extern void SECU_PrintRDN(FILE *out, CERTRDN *rdn, const char *msg, int level);
--
--#ifdef SECU_GetPassword
--/* Convert a High public Key to a Low public Key */
--extern SECKEYLowPublicKey *SECU_ConvHighToLow(SECKEYPublicKey *pubHighKey);
--#endif
--
--extern char *SECU_GetModulePassword(PK11SlotInfo *slot, PRBool retry, void *arg);
--
--extern SECStatus DER_PrettyPrint(FILE *out, SECItem *it, PRBool raw);
--
--extern char *SECU_SECModDBName(void);
-
- extern void SECU_PrintPRandOSError(char *progName);
-
-@@ -335,70 +98,6 @@ extern SECStatus SECU_RegisterDynamicOid
+@@ -341,70 +151,6 @@ extern SECStatus SECU_RegisterDynamicOid
/* Identifies hash algorithm tag by its string representation. */
extern SECOidTag SECU_StringToSignatureAlgTag(const char *alg);
@@ -3963,7 +3943,7 @@ diff -up ./mozilla/security/nss/cmd/lib/secutil.h.crypto ./mozilla/security/nss/
SECU_SECItemToHex(const SECItem * item, char * dst);
diff -up ./mozilla/security/nss/cmd/manifest.mn.crypto ./mozilla/security/nss/cmd/manifest.mn
--- ./mozilla/security/nss/cmd/manifest.mn.crypto 2010-12-06 09:22:48.000000000 -0800
-+++ ./mozilla/security/nss/cmd/manifest.mn 2012-03-01 13:52:51.842116753 -0800
++++ ./mozilla/security/nss/cmd/manifest.mn 2012-04-01 13:15:51.540584249 -0700
@@ -41,46 +41,9 @@ DEPTH = ../..
REQUIRES = nss nspr libdbm
@@ -4013,7 +3993,7 @@ diff -up ./mozilla/security/nss/cmd/manifest.mn.crypto ./mozilla/security/nss/cm
TEMPORARILY_DONT_BUILD = \
diff -up ./mozilla/security/nss/cmd/platlibs.mk.crypto ./mozilla/security/nss/cmd/platlibs.mk
--- ./mozilla/security/nss/cmd/platlibs.mk.crypto 2010-06-11 17:58:33.000000000 -0700
-+++ ./mozilla/security/nss/cmd/platlibs.mk 2012-03-01 13:52:51.846127126 -0800
++++ ./mozilla/security/nss/cmd/platlibs.mk 2012-04-01 13:15:51.540584249 -0700
@@ -92,43 +92,13 @@ DEFINES += -DNSS_USE_STATIC_LIBS
# $(PROGRAM) has explicit dependencies on $(EXTRA_LIBS)
CRYPTOLIB=$(SOFTOKEN_LIB_DIR)/$(LIB_PREFIX)freebl.$(LIB_SUFFIX)
@@ -4108,8 +4088,8 @@ diff -up ./mozilla/security/nss/cmd/platlibs.mk.crypto ./mozilla/security/nss/cm
-L$(NSSUTIL_LIB_DIR) \
-lnssutil3 \
diff -up ./mozilla/security/nss/tests/all.sh.crypto ./mozilla/security/nss/tests/all.sh
---- ./mozilla/security/nss/tests/all.sh.crypto 2010-01-29 11:58:40.000000000 -0800
-+++ ./mozilla/security/nss/tests/all.sh 2012-03-01 13:52:51.849115992 -0800
+--- ./mozilla/security/nss/tests/all.sh.crypto 2012-04-01 13:21:51.519603762 -0700
++++ ./mozilla/security/nss/tests/all.sh 2012-04-01 13:22:41.577606476 -0700
@@ -303,10 +303,10 @@ run_cycles()
############################## main code ###############################
diff --git a/sources b/sources
index 3d79706..a9e4773 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-f2cb15dd1e1119bb718de1730a5b6a0f nss-softokn-3.13.3-stripped.tar.bz2
+3d5704a383dbed469c0864afeac70fd2 nss-softokn-3.13.4-stripped.tar.bz2
More information about the scm-commits
mailing list