diff --git a/.gitignore b/.gitignore index 43c0bc2..73aa652 100644 --- a/.gitignore +++ b/.gitignore @@ -76,3 +76,4 @@ TestUser51.cert /nss-3.83.tar.gz /nspr-4.35.tar.gz /nss-3.85.tar.gz +/nss-3.87.tar.gz diff --git a/nss-3.53.1-revert_rhel8_unsafe_policy_change.patch b/nss-3.53.1-revert_rhel8_unsafe_policy_change.patch deleted file mode 100644 index 9e39df7..0000000 --- a/nss-3.53.1-revert_rhel8_unsafe_policy_change.patch +++ /dev/null @@ -1,39 +0,0 @@ -diff -up ./lib/pk11wrap/pk11pars.c.policy_revert ./lib/pk11wrap/pk11pars.c ---- ./lib/pk11wrap/pk11pars.c.policy_revert 2020-11-04 10:26:59.085300799 -0800 -+++ ./lib/pk11wrap/pk11pars.c 2020-11-04 10:29:52.774239468 -0800 -@@ -391,12 +391,6 @@ static const oidValDef signOptList[] = { - /* Signatures */ - { CIPHER_NAME("DSA"), SEC_OID_ANSIX9_DSA_SIGNATURE, - NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, -- { CIPHER_NAME("RSA-PKCS"), SEC_OID_PKCS1_RSA_ENCRYPTION, -- NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, -- { CIPHER_NAME("RSA-PSS"), SEC_OID_PKCS1_RSA_PSS_SIGNATURE, -- NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, -- { CIPHER_NAME("ECDSA"), SEC_OID_ANSIX962_EC_PUBLIC_KEY, -- NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, - }; - - typedef struct { -@@ -412,7 +406,7 @@ static const algListsDef algOptLists[] = - { macOptList, PR_ARRAY_SIZE(macOptList), "MAC", PR_FALSE }, - { cipherOptList, PR_ARRAY_SIZE(cipherOptList), "CIPHER", PR_FALSE }, - { kxOptList, PR_ARRAY_SIZE(kxOptList), "OTHER-KX", PR_FALSE }, -- { signOptList, PR_ARRAY_SIZE(signOptList), "OTHER-SIGN", PR_FALSE }, -+ { signOptList, PR_ARRAY_SIZE(signOptList), "OTHER-SIGN", PR_TRUE }, - }; - - static const optionFreeDef sslOptList[] = { -diff -up ./tests/ssl/sslpolicy.txt.policy_revert ./tests/ssl/sslpolicy.txt ---- ./tests/ssl/sslpolicy.txt.policy_revert 2020-11-04 10:31:20.837715397 -0800 -+++ ./tests/ssl/sslpolicy.txt 2020-11-04 10:33:19.598357223 -0800 -@@ -193,7 +193,9 @@ - 1 noECC SSL3 d disallow=all_allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Implicitly Narrow - 1 noECC SSL3 d disallow=all_allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Implicitly - 0 noECC SSL3 d disallow=dsa Disallow DSA Signatures Explicitly -- 1 noECC SSL3 d disallow=rsa-pkcs Disallow RSA PKCS 1 Signatures Explicitly -+# rsa-pkcs, rsa-pss, and ecdsa policy checking reverted in rhel8 for binary -+# compatibility reasons -+# 1 noECC SSL3 d disallow=rsa-pkcs Disallow RSA PKCS 1 Signatures Explicitly - # test default settings - # NOTE: tstclient will attempt to overide the defaults, so we detect we - # were successful by locking in our settings diff --git a/nss-3.65-disable-hw-ppc.patch b/nss-3.65-disable-hw-ppc.patch deleted file mode 100644 index e435bcf..0000000 --- a/nss-3.65-disable-hw-ppc.patch +++ /dev/null @@ -1,19 +0,0 @@ -diff -up ./lib/freebl/blinit.c.disable_hw_ppc ./lib/freebl/blinit.c ---- ./lib/freebl/blinit.c.disable_hw_ppc 2021-05-27 18:04:59.754657701 -0700 -+++ ./lib/freebl/blinit.c 2021-05-27 18:07:02.756397733 -0700 -@@ -502,6 +502,7 @@ CheckPPCSupport() - char *disable_hw_crypto = PR_GetEnvSecure("NSS_DISABLE_PPC_GHASH"); - - unsigned long hwcaps = 0; -+#ifdef notdef - #if defined(__linux__) - #if __has_include() - hwcaps = getauxval(AT_HWCAP2); -@@ -516,6 +517,7 @@ CheckPPCSupport() - sysctlbyname("hw.cpu_features2", &hwcaps, &len, NULL, 0); - #endif - #endif -+#endif - - ppc_crypto_support_ = hwcaps & PPC_FEATURE2_VEC_CRYPTO && disable_hw_crypto == NULL; - } diff --git a/nss-3.79-fix-client-cert-crash.patch b/nss-3.79-fix-client-cert-crash.patch deleted file mode 100644 index 5f80fdc..0000000 --- a/nss-3.79-fix-client-cert-crash.patch +++ /dev/null @@ -1,23 +0,0 @@ -diff --git a/lib/ssl/authcert.c b/lib/ssl/authcert.c ---- a/lib/ssl/authcert.c -+++ b/lib/ssl/authcert.c -@@ -212,17 +212,17 @@ NSS_GetClientAuthData(void *arg, - pw_arg); - } else { - int nnames = 0; - char **names = ssl_DistNamesToStrings(caNames, &nnames); - rv = CERT_FilterCertListByCANames(certList, nnames, names, - certUsageSSLClient); - ssl_FreeDistNamesStrings(names, nnames); - } -- if ((rv != SECSuccess) || CERT_LIST_EMPTY(certList)) { -+ if ((rv != SECSuccess) || (certList && CERT_LIST_EMPTY(certList))) { - CERT_DestroyCertList(certList); - certList = NULL; - } - } - if (certList == NULL) { - /* no user certs meeting the nickname/usage requirements found */ - return SECFailure; - } - diff --git a/nss-539183.patch b/nss-539183.patch deleted file mode 100644 index 267e71e..0000000 --- a/nss-539183.patch +++ /dev/null @@ -1,62 +0,0 @@ ---- nss/cmd/httpserv/httpserv.c.539183 2016-05-21 18:31:39.879585420 -0700 -+++ nss/cmd/httpserv/httpserv.c 2016-05-21 18:37:22.374464057 -0700 -@@ -953,23 +953,23 @@ - getBoundListenSocket(unsigned short port) - { - PRFileDesc *listen_sock; - int listenQueueDepth = 5 + (2 * maxThreads); - PRStatus prStatus; - PRNetAddr addr; - PRSocketOptionData opt; - -- addr.inet.family = PR_AF_INET; -- addr.inet.ip = PR_INADDR_ANY; -- addr.inet.port = PR_htons(port); -+ if (PR_SetNetAddr(PR_IpAddrAny, PR_AF_INET6, port, &addr) != PR_SUCCESS) { -+ errExit("PR_SetNetAddr"); -+ } - -- listen_sock = PR_NewTCPSocket(); -+ listen_sock = PR_OpenTCPSocket(PR_AF_INET6); - if (listen_sock == NULL) { -- errExit("PR_NewTCPSocket"); -+ errExit("PR_OpenTCPSockett"); - } - - opt.option = PR_SockOpt_Nonblocking; - opt.value.non_blocking = PR_FALSE; - prStatus = PR_SetSocketOption(listen_sock, &opt); - if (prStatus < 0) { - PR_Close(listen_sock); - errExit("PR_SetSocketOption(PR_SockOpt_Nonblocking)"); ---- nss/cmd/selfserv/selfserv.c.539183 2016-05-21 18:31:39.882585367 -0700 -+++ nss/cmd/selfserv/selfserv.c 2016-05-21 18:41:43.092801174 -0700 -@@ -1711,23 +1711,23 @@ - getBoundListenSocket(unsigned short port) - { - PRFileDesc *listen_sock; - int listenQueueDepth = 5 + (2 * maxThreads); - PRStatus prStatus; - PRNetAddr addr; - PRSocketOptionData opt; - -- addr.inet.family = PR_AF_INET; -- addr.inet.ip = PR_INADDR_ANY; -- addr.inet.port = PR_htons(port); -+ if (PR_SetNetAddr(PR_IpAddrAny, PR_AF_INET6, port, &addr) != PR_SUCCESS) { -+ errExit("PR_SetNetAddr"); -+ } - -- listen_sock = PR_NewTCPSocket(); -+ listen_sock = PR_OpenTCPSocket(PR_AF_INET6); - if (listen_sock == NULL) { -- errExit("PR_NewTCPSocket"); -+ errExit("PR_OpenTCPSocket error"); - } - - opt.option = PR_SockOpt_Nonblocking; - opt.value.non_blocking = PR_FALSE; - prStatus = PR_SetSocketOption(listen_sock, &opt); - if (prStatus < 0) { - PR_Close(listen_sock); - errExit("PR_SetSocketOption(PR_SockOpt_Nonblocking)"); diff --git a/nss-fedora-btrf-sql-hack.patch b/nss-fedora-btrf-sql-hack.patch deleted file mode 100644 index db60cc2..0000000 --- a/nss-fedora-btrf-sql-hack.patch +++ /dev/null @@ -1,18 +0,0 @@ -diff -up ./lib/softoken/sdb.c.orig ./lib/softoken/sdb.c ---- ./lib/softoken/sdb.c.orig 2020-12-11 22:49:26.961726193 -0500 -+++ ./lib/softoken/sdb.c 2020-12-11 23:01:30.739122494 -0500 -@@ -690,8 +690,14 @@ sdb_openDB(const char *name, sqlite3 **s - openFlags = SQLITE_OPEN_READONLY; - } else { - openFlags = SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE; -+ /* btrfs and sqlite seem to incorrectly open readwrite. -+ * when the file is readonly explicitly reject that issue here */ -+ if ((_NSSUTIL_Access(name, PR_ACCESS_EXISTS) == PR_SUCCESS) && (_NSSUTIL_Access(name, PR_ACCESS_WRITE_OK) != PR_SUCCESS)) { -+ return SQLITE_READONLY; -+ } - } - -+ - /* Requires SQLite 3.5.0 or newer. */ - sqlerr = sqlite3_open_v2(name, sqlDB, openFlags, NULL); - if (sqlerr != SQLITE_OK) { diff --git a/nss-fix-PayPal-upstream.patch b/nss-fix-PayPal-upstream.patch deleted file mode 100644 index 71e78cb..0000000 --- a/nss-fix-PayPal-upstream.patch +++ /dev/null @@ -1,42 +0,0 @@ -diff --git a/tests/chains/chains.sh b/tests/chains/chains.sh ---- a/tests/chains/chains.sh -+++ b/tests/chains/chains.sh -@@ -917,7 +917,7 @@ - done - - VFY_OPTS_TNAME="${DB_OPT} ${ENGINE} ${TRUST_AND_DB_OPT} ${REV_OPTS} ${FETCH_OPT} ${USAGE_OPT} ${POLICY_OPT} ${TRUST_OPT}" -- VFY_OPTS_ALL="${DB_OPT} ${ENGINE} -vv ${TRUST_AND_DB_OPT} ${REV_OPTS} ${FETCH_OPT} ${USAGE_OPT} ${POLICY_OPT} ${VFY_CERTS} ${TRUST_OPT}" -+ VFY_OPTS_ALL="${DB_OPT} ${ENGINE} -vv ${VFY_TIME_OPT} ${TRUST_AND_DB_OPT} ${REV_OPTS} ${FETCH_OPT} ${USAGE_OPT} ${POLICY_OPT} ${VFY_CERTS} ${TRUST_OPT}" - - TESTNAME="Verifying certificate(s) ${VFY_LIST} with flags ${VFY_OPTS_TNAME}" - echo "${SCRIPTNAME}: ${TESTNAME}" -@@ -1118,6 +1118,7 @@ - ;; - "verify") - VERIFY="${VALUE}" -+ VFY_TIME_OPT= - TRUST= - TRUST_AND_DB= - POLICY= -@@ -1126,6 +1127,9 @@ - REV_OPTS= - USAGE_OPT= - ;; -+ "at_time") -+ VFY_TIME_OPT="-b ${VALUE}" -+ ;; - "cert") - VERIFY="${VERIFY} ${VALUE}" - ;; -diff --git a/tests/chains/scenarios/realcerts.cfg b/tests/chains/scenarios/realcerts.cfg ---- a/tests/chains/scenarios/realcerts.cfg -+++ b/tests/chains/scenarios/realcerts.cfg -@@ -22,6 +22,7 @@ - - verify PayPalEE:x - policy OID.2.16.840.1.114412.2.1 -+ at_time 2201010000Z - result pass - - verify BrAirWaysBadSig:x - diff --git a/nss-sql-man-page.patch b/nss-sql-man-page.patch deleted file mode 100644 index 1084856..0000000 --- a/nss-sql-man-page.patch +++ /dev/null @@ -1,749 +0,0 @@ -# HG changeset patch -# User Robert Relyea -# Date 1621548343 25200 -# Thu May 20 15:05:43 2021 -0700 -# Node ID 230ce820b8fd9bc542940a324388f6b2b55ecca8 -# Parent 207465bda46a4d6eb07ddef2a3a8232643ff027e -Bug 1712184 NSS tools manpages need to be updated to reflect that sqlite is the default database. - -update certutil.xml pk12util.xml modutil.xml and signver.xml to reflect the fact -the the sql database is default. Many of these also has examples of specifying -sql:dirname which is now the default. I did not replace them with dbm:dirname since -we don't want to encourage regressing back. The one exception is in the paragraph -explaining how to get to the old database format. - - -Differential Revision: https://phabricator.services.mozilla.com/D115658 - -diff --git a/doc/certutil.xml b/doc/certutil.xml ---- a/doc/certutil.xml -+++ b/doc/certutil.xml -@@ -203,17 +203,17 @@ If this option is not used, the validity - - Specify the database directory containing the certificate and key database files. - certutil supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and new SQLite databases (cert9.db, key4.db, and pkcs11.txt). - NSS recognizes the following prefixes: - - sql: requests the newer database - dbm: requests the legacy database - -- If no prefix is specified the default type is retrieved from NSS_DEFAULT_DB_TYPE. If NSS_DEFAULT_DB_TYPE is not set then dbm: is the default. -+ If no prefix is specified the default type is retrieved from NSS_DEFAULT_DB_TYPE. If NSS_DEFAULT_DB_TYPE is not set then sql: is the default. - - - - - --dump-ext-val OID - For single cert, print binary DER encoding of extension OID. - - -@@ -843,23 +843,23 @@ Comma separated list of one or more of t - - secmod.db or pkcs11.txt - - - - - These databases must be created before certificates or keys can be generated. - --certutil -N -d [sql:]directory -+certutil -N -d directory - - Creating a Certificate Request - - A certificate request contains most or all of the information that is used to generate the final certificate. This request is submitted separately to a certificate authority and is then approved by some mechanism (automatically or by human review). Once the request is approved, then the certificate is generated. - --$ certutil -R -k key-type-or-id [-q pqgfile|curve-name] -g key-size -s subject [-h tokenname] -d [sql:]directory [-p phone] [-o output-file] [-a] -+$ certutil -R -k key-type-or-id [-q pqgfile|curve-name] -g key-size -s subject [-h tokenname] -d directory [-p phone] [-o output-file] [-a] - - The command options requires four arguments: - - - - - to specify either the key type to generate or, when renewing a certificate, the existing key pair to use - -@@ -881,27 +881,27 @@ Comma separated list of one or more of t - - - - The new certificate request can be output in ASCII format () or can be written to a specified file (). - - - For example: - --$ certutil -R -k rsa -g 1024 -s "CN=John Smith,O=Example Corp,L=Mountain View,ST=California,C=US" -d sql:$HOME/nssdb -p 650-555-0123 -a -o cert.cer -+$ certutil -R -k rsa -g 1024 -s "CN=John Smith,O=Example Corp,L=Mountain View,ST=California,C=US" -d $HOME/nssdb -p 650-555-0123 -a -o cert.cer - - Generating key. This may take a few moments... - - - - Creating a Certificate - - A valid certificate must be issued by a trusted CA. This can be done by specifying a CA certificate () that is stored in the certificate database. If a CA key pair is not available, you can create a self-signed certificate using the argument with the command option. - --$ certutil -S -k rsa|dsa|ec -n certname -s subject [-c issuer |-x] -t trustargs -d [sql:]directory [-m serial-number] [-v valid-months] [-w offset-months] [-p phone] [-1] [-2] [-3] [-4] [-5 keyword] [-6 keyword] [-7 emailAddress] [-8 dns-names] [--extAIA] [--extSIA] [--extCP] [--extPM] [--extPC] [--extIA] [--extSKID] -+$ certutil -S -k rsa|dsa|ec -n certname -s subject [-c issuer |-x] -t trustargs -d directory [-m serial-number] [-v valid-months] [-w offset-months] [-p phone] [-1] [-2] [-3] [-4] [-5 keyword] [-6 keyword] [-7 emailAddress] [-8 dns-names] [--extAIA] [--extSIA] [--extCP] [--extPM] [--extPC] [--extIA] [--extSKID] - - The series of numbers and options set certificate extensions that can be added to the certificate when it is generated by the CA. Interactive prompts will result. - - - For example, this creates a self-signed certificate: - - $ certutil -S -s "CN=Example CA" -n my-ca-cert -x -t "C,C,C" -1 -2 -5 -m 3650 - -@@ -911,55 +911,55 @@ The interative prompts for key usage and - From there, new certificates can reference the self-signed certificate: - - $ certutil -S -s "CN=My Server Cert" -n my-server-cert -c "my-ca-cert" -t ",," -1 -5 -6 -8 -m 730 - - Generating a Certificate from a Certificate Request - - When a certificate request is created, a certificate can be generated by using the request and then referencing a certificate authority signing certificate (the issuer specified in the argument). The issuing certificate must be in the certificate database in the specified directory. - --certutil -C -c issuer -i cert-request-file -o output-file [-m serial-number] [-v valid-months] [-w offset-months] -d [sql:]directory [-1] [-2] [-3] [-4] [-5 keyword] [-6 keyword] [-7 emailAddress] [-8 dns-names] -+certutil -C -c issuer -i cert-request-file -o output-file [-m serial-number] [-v valid-months] [-w offset-months] -d directory [-1] [-2] [-3] [-4] [-5 keyword] [-6 keyword] [-7 emailAddress] [-8 dns-names] - - For example: - --$ certutil -C -c "my-ca-cert" -i /home/certs/cert.req -o cert.cer -m 010 -v 12 -w 1 -d sql:$HOME/nssdb -1 nonRepudiation,dataEncipherment -5 sslClient -6 clientAuth -7 jsmith@example.com -+$ certutil -C -c "my-ca-cert" -i /home/certs/cert.req -o cert.cer -m 010 -v 12 -w 1 -d $HOME/nssdb -1 nonRepudiation,dataEncipherment -5 sslClient -6 clientAuth -7 jsmith@example.com - - Listing Certificates - - The command option lists all of the certificates listed in the certificate database. The path to the directory () is required. - --$ certutil -L -d sql:/home/my/sharednssdb -+$ certutil -L -d /home/my/sharednssdb - - Certificate Nickname Trust Attributes - SSL,S/MIME,JAR/XPI - - CA Administrator of Instance pki-ca1's Example Domain ID u,u,u - TPS Administrator's Example Domain ID u,u,u - Google Internet Authority ,, - Certificate Authority - Example Domain CT,C,C - - Using additional arguments with can return and print the information for a single, specific certificate. For example, the argument passes the certificate name, while the argument prints the certificate in ASCII format: - - --$ certutil -L -d sql:$HOME/nssdb -a -n my-ca-cert -+$ certutil -L -d $HOME/nssdb -a -n my-ca-cert - -----BEGIN CERTIFICATE----- - MIIB1DCCAT2gAwIBAgICDkIwDQYJKoZIhvcNAQEFBQAwFTETMBEGA1UEAxMKRXhh - bXBsZSBDQTAeFw0xMzAzMTMxOTEwMjlaFw0xMzA2MTMxOTEwMjlaMBUxEzARBgNV - BAMTCkV4YW1wbGUgQ0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ4Kzqvz - JyBVgFqDXRYSyTBNw1DrxUU/3GvWA/ngjAwHEv0Cul/6sO/gsCvnABHiH6unns6x - XRzPORlC2WY3gkk7vmlsLvYpyecNazAi/NAwVnU/66HOsaoVFWE+gBQo99UrN2yk - 0BiK/GMFlLm5dXQROgA9ZKKyFdI0LIXtf6SbAgMBAAGjMzAxMBEGCWCGSAGG+EIB - AQQEAwIHADAMBgNVHRMEBTADAQH/MA4GA1UdDwEB/wQEAwICBDANBgkqhkiG9w0B - AQUFAAOBgQA6chkzkACN281d1jKMrc+RHG2UMaQyxiteaLVZO+Ro1nnRUvseDf09 - XKYFwPMJjWCihVku6bw/ihZfuMHhxK22Nue6inNQ6eDu7WmrqL8z3iUrQwxs+WiF - ob2rb8XRVVJkzXdXxlk4uo3UtNvw8sAz7sWD71qxKaIHU5q49zijfg== - -----END CERTIFICATE----- - - For a human-readable display --$ certutil -L -d sql:$HOME/nssdb -n my-ca-cert -+$ certutil -L -d $HOME/nssdb -n my-ca-cert - Certificate: - Data: - Version: 3 (0x2) - Serial Number: 3650 (0xe42) - Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption - Issuer: "CN=Example CA" - Validity: - Not Before: Wed Mar 13 19:10:29 2013 -@@ -1022,17 +1022,17 @@ Certificate: - - Listing Keys - - Keys are the original material used to encrypt certificate data. The keys generated for certificates are stored separately, in the key database. - - - To list all keys in the database, use the command option and the (required) argument to give the path to the directory. - --$ certutil -K -d sql:$HOME/nssdb -+$ certutil -K -d $HOME/nssdb - certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services " - < 0> rsa 455a6673bde9375c2887ec8bf8016b3f9f35861d Thawte Freemail Member's Thawte Consulting (Pty) Ltd. ID - < 1> rsa 40defeeb522ade11090eacebaaf1196a172127df Example Domain Administrator Cert - < 2> rsa 1d0b06f44f6c03842f7d4f4a1dc78b3bcd1b85a5 John Smith user cert - - There are ways to narrow the keys listed in the search results: - - -@@ -1052,111 +1052,111 @@ certutil: Checking token "NSS Certificat - - - - - Listing Security Modules - - The devices that can be used to store certificates -- both internal databases and external devices like smart cards -- are recognized and used by loading security modules. The command option lists all of the security modules listed in the secmod.db database. The path to the directory () is required. - --$ certutil -U -d sql:/home/my/sharednssdb -+$ certutil -U -d /home/my/sharednssdb - - slot: NSS User Private Key and Certificate Services - token: NSS Certificate DB - uri: pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 - - slot: NSS Internal Cryptographic Services - token: NSS Generic Crypto Services - uri: pkcs11:token=NSS%20Generic%20Crypto%20Services;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 - - Adding Certificates to the Database - - Existing certificates or certificate requests can be added manually to the certificate database, even if they were generated elsewhere. This uses the command option. - --certutil -A -n certname -t trustargs -d [sql:]directory [-a] [-i input-file] -+certutil -A -n certname -t trustargs -d directory [-a] [-i input-file] - - For example: - --$ certutil -A -n "CN=My SSL Certificate" -t ",," -d sql:/home/my/sharednssdb -i /home/example-certs/cert.cer -+$ certutil -A -n "CN=My SSL Certificate" -t ",," -d /home/my/sharednssdb -i /home/example-certs/cert.cer - - A related command option, , is used specifically to add email certificates to the certificate database. The command has the same arguments as the command. The trust arguments for certificates have the format SSL,S/MIME,Code-signing, so the middle trust settings relate most to email certificates (though the others can be set). For example: - --$ certutil -E -n "CN=John Smith Email Cert" -t ",P," -d sql:/home/my/sharednssdb -i /home/example-certs/email.cer -+$ certutil -E -n "CN=John Smith Email Cert" -t ",P," -d /home/my/sharednssdb -i /home/example-certs/email.cer - - Deleting Certificates to the Database - - Certificates can be deleted from a database using the option. The only required options are to give the security database directory and to identify the certificate nickname. - --certutil -D -d [sql:]directory -n "nickname" -+certutil -D -d directory -n "nickname" - - For example: - --$ certutil -D -d sql:/home/my/sharednssdb -n "my-ssl-cert" -+$ certutil -D -d /home/my/sharednssdb -n "my-ssl-cert" - - Validating Certificates - - A certificate contains an expiration date in itself, and expired certificates are easily rejected. However, certificates can also be revoked before they hit their expiration date. Checking whether a certificate has been revoked requires validating the certificate. Validation can also be used to ensure that the certificate is only used for the purposes it was initially issued for. Validation is carried out by the command option. - --certutil -V -n certificate-name [-b time] [-e] [-u cert-usage] -d [sql:]directory -+certutil -V -n certificate-name [-b time] [-e] [-u cert-usage] -d directory - - For example, to validate an email certificate: - --$ certutil -V -n "John Smith's Email Cert" -e -u S,R -d sql:/home/my/sharednssdb -+$ certutil -V -n "John Smith's Email Cert" -e -u S,R -d /home/my/sharednssdb - - Modifying Certificate Trust Settings - - The trust settings (which relate to the operations that a certificate is allowed to be used for) can be changed after a certificate is created or added to the database. This is especially useful for CA certificates, but it can be performed for any type of certificate. - --certutil -M -n certificate-name -t trust-args -d [sql:]directory -+certutil -M -n certificate-name -t trust-args -d directory - - For example: - --$ certutil -M -n "My CA Certificate" -d sql:/home/my/sharednssdb -t "CT,CT,CT" -+$ certutil -M -n "My CA Certificate" -d /home/my/sharednssdb -t "CT,CT,CT" - - Printing the Certificate Chain - - Certificates can be issued in chains because every certificate authority itself has a certificate; when a CA issues a certificate, it essentially stamps that certificate with its own fingerprint. The prints the full chain of a certificate, going from the initial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain: - --$ certutil -d sql:/home/my/sharednssdb -O -n "jsmith@example.com" -+$ certutil -d /home/my/sharednssdb -O -n "jsmith@example.com" - "Builtin Object Token:Thawte Personal Freemail CA" [E=personal-freemail@thawte.com,CN=Thawte Personal Freemail CA,OU=Certification Services Division,O=Thawte Consulting,L=Cape Town,ST=Western Cape,C=ZA] - - "Thawte Personal Freemail Issuing CA - Thawte Consulting" [CN=Thawte Personal Freemail Issuing CA,O=Thawte Consulting (Pty) Ltd.,C=ZA] - - "(null)" [E=jsmith@example.com,CN=Thawte Freemail Member] - - Resetting a Token - - The device which stores certificates -- both external hardware devices and internal software databases -- can be blanked and reused. This operation is performed on the device which stores the data, not directly on the security databases, so the location must be referenced through the token name () as well as any directory path. If there is no external token used, the default value is internal. - --certutil -T -d [sql:]directory -h token-name -0 security-officer-password -+certutil -T -d directory -h token-name -0 security-officer-password - - Many networks have dedicated personnel who handle changes to security tokens (the security officer). This person must supply the password to access the specified token. For example: - --$ certutil -T -d sql:/home/my/sharednssdb -h nethsm -0 secret -+$ certutil -T -d /home/my/sharednssdb -h nethsm -0 secret - - Upgrading or Merging the Security Databases - - Many networks or applications may be using older BerkeleyDB versions of the certificate database (cert8.db). Databases can be upgraded to the new SQLite version of the database (cert9.db) using the command option or existing databases can be merged with the new cert9.db databases using the command. - - - The command must give information about the original database and then use the standard arguments (like ) to give the information about the new databases. The command also requires information that the tool uses for the process to upgrade and write over the original database. - --certutil --upgrade-merge -d [sql:]directory [-P dbprefix] --source-dir directory --source-prefix dbprefix --upgrade-id id --upgrade-token-name name [-@ password-file] -+certutil --upgrade-merge -d directory [-P dbprefix] --source-dir directory --source-prefix dbprefix --upgrade-id id --upgrade-token-name name [-@ password-file] - - For example: - --$ certutil --upgrade-merge -d sql:/home/my/sharednssdb --source-dir /opt/my-app/alias/ --source-prefix serverapp- --upgrade-id 1 --upgrade-token-name internal -+$ certutil --upgrade-merge -d /home/my/sharednssdb --source-dir /opt/my-app/alias/ --source-prefix serverapp- --upgrade-id 1 --upgrade-token-name internal - - The command only requires information about the location of the original database; since it doesn't change the format of the database, it can write over information without performing interim step. - --certutil --merge -d [sql:]directory [-P dbprefix] --source-dir directory --source-prefix dbprefix [-@ password-file] -+certutil --merge -d directory [-P dbprefix] --source-dir directory --source-prefix dbprefix [-@ password-file] - - For example: - --$ certutil --merge -d sql:/home/my/sharednssdb --source-dir /opt/my-app/alias/ --source-prefix serverapp- -+$ certutil --merge -d /home/my/sharednssdb --source-dir /opt/my-app/alias/ --source-prefix serverapp- - - Running certutil Commands from a Batch File - - A series of commands can be run sequentially from a text file with the command option. The only argument for this specifies the input file. - - $ certutil -B -i /path/to/batch-file - - -@@ -1202,27 +1202,26 @@ BerkeleyDB. These new databases provide - - pkcs11.txt, a listing of all of the PKCS #11 modules, contained in a new subdirectory in the security databases directory - - - - - Because the SQLite databases are designed to be shared, these are the shared database type. The shared database type is preferred; the legacy format is included for backward compatibility. - --By default, the tools (certutil, pk12util, modutil) assume that the given security databases follow the more common legacy type. --Using the SQLite databases must be manually specified by using the sql: prefix with the given security directory. For example: -+By default, the tools (certutil, pk12util, modutil) assume that the given security databases use the SQLite type. -+Using the legacy databases must be manually specified by using the dbm: prefix with the given security directory. For example: - --$ certutil -L -d sql:/home/my/sharednssdb -+$ certutil -L -d dbm:/home/my/sharednssdb - --To set the shared database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to sql: --export NSS_DEFAULT_DB_TYPE="sql" -+To set the legacy database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to dbm: -+export NSS_DEFAULT_DB_TYPE="dbm" - - This line can be set added to the ~/.bashrc file to make the change permanent. - --Most applications do not use the shared database by default, but they can be configured to use them. For example, this how-to article covers how to configure Firefox and Thunderbird to use the new shared NSS databases: - - - - https://wiki.mozilla.org/NSS_Shared_DB_Howto - - - For an engineering draft on the changes in the shared NSS databases, see the NSS project wiki: - -diff --git a/doc/modutil.xml b/doc/modutil.xml ---- a/doc/modutil.xml -+++ b/doc/modutil.xml -@@ -144,24 +144,24 @@ - - - - -ciphers cipher-enable-list - Enable specific ciphers in a module that is being added to the database. The cipher-enable-list is a colon-delimited list of cipher names. Enclose this list in quotation marks if it contains spaces. - - - -- -dbdir [sql:]directory -+ -dbdir directory - Specify the database directory in which to access or create security module database files. -- modutil supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and new SQLite databases (cert9.db, key4.db, and pkcs11.txt). If the prefix sql: is not used, then the tool assumes that the given databases are in the old format. -+ modutil supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and SQLite databases (cert9.db, key4.db, and pkcs11.txt). If the prefix dbm: is not used, then the tool assumes that the given databases are in SQLite format. - - - - --dbprefix prefix -- Specify the prefix used on the database files, such as my_ for my_cert8.db. This option is provided as a special case. Changing the names of the certificate and key databases is not recommended. -+ Specify the prefix used on the database files, such as my_ for my_cert9.db. This option is provided as a special case. Changing the names of the certificate and key databases is not recommended. - - - - -installdir root-installation-directory - Specify the root installation directory relative to which files will be installed by the option. This directory should be one below which it is appropriate to store dynamic library files, such as a server's root directory. - - - -@@ -224,23 +224,23 @@ - - - - - Usage and Examples - - Creating Database Files - Before any operations can be performed, there must be a set of security databases available. modutil can be used to create these files. The only required argument is the database that where the databases will be located. --modutil -create -dbdir [sql:]directory -+modutil -create -dbdir directory - - Adding a Cryptographic Module - Adding a PKCS #11 module means submitting a supporting library file, enabling its ciphers, and setting default provider status for various security mechanisms. This can be done by supplying all of the information through modutil directly or by running a JAR file and install script. For the most basic case, simply upload the library: - modutil -add modulename -libfile library-file [-ciphers cipher-enable-list] [-mechanisms mechanism-list] - For example: --modutil -dbdir sql:/home/my/sharednssdb -add "Example PKCS #11 Module" -libfile "/tmp/crypto.so" -mechanisms RSA:DSA:RC2:RANDOM -+modutil -dbdir /home/my/sharednssdb -add "Example PKCS #11 Module" -libfile "/tmp/crypto.so" -mechanisms RSA:DSA:RC2:RANDOM - - Using database directory ... - Module "Example PKCS #11 Module" added to database. - - - - Installing a Cryptographic Module from a JAR File - PKCS #11 modules can also be loaded using a JAR file, which contains all of the required libraries and an installation script that describes how to install the module. The JAR install script is described in more detail in . -@@ -262,17 +262,17 @@ Module "Example PKCS #11 Module" added t - } - } - Linux:6.0.0:x86 { - EquivalentPlatform { Linux:5.4.08:x86 } - } - } - Both the install script and the required libraries must be bundled in a JAR file, which is specified with the argument. - --modutil -dbdir sql:/home/mt"jar-install-filey/sharednssdb -jar install.jar -installdir sql:/home/my/sharednssdb -+modutil -dbdir /home/mt"jar-install-filey/sharednssdb -jar install.jar -installdir /home/my/sharednssdb - - This installation JAR file was signed by: - ---------------------------------------------- - - **SUBJECT NAME** - - C=US, ST=California, L=Mountain View, CN=Cryptorific Inc., OU=Digital ID - Class 3 - Netscape Object Signing, OU="www.verisign.com/repository/CPS -@@ -299,42 +299,42 @@ Installation completed successfully Adding Module Spec - Each module has information stored in the security database about its configuration and parameters. These can be added or edited using the command. For the current settings or to see the format of the module spec in the database, use the option. - modutil -rawadd modulespec - - - Deleting a Module - A specific PKCS #11 module can be deleted from the secmod.db database: --modutil -delete modulename -dbdir [sql:]directory -+modutil -delete modulename -dbdir directory - - Displaying Module Information - The secmod.db database contains information about the PKCS #11 modules that are available to an application or server to use. The list of all modules, information about specific modules, and database configuration specs for modules can all be viewed. - To simply get a list of modules in the database, use the command. --modutil -list [modulename] -dbdir [sql:]directory -+modutil -list [modulename] -dbdir directory - Listing the modules shows the module name, their status, and other associated security databases for certificates and keys. For example: - --modutil -list -dbdir sql:/home/my/sharednssdb -+modutil -list -dbdir /home/my/sharednssdb - - Listing of PKCS #11 Modules - ----------------------------------------------------------- - 1. NSS Internal PKCS #11 Module - slots: 2 slots attached - status: loaded - - slot: NSS Internal Cryptographic Services - token: NSS Generic Crypto Services - uri: pkcs11:token=NSS%20Generic%20Crypto%20Services;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 - - slot: NSS User Private Key and Certificate Services - token: NSS Certificate DB - uri: pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 - ----------------------------------------------------------- - Passing a specific module name with the returns details information about the module itself, like supported cipher mechanisms, version numbers, serial numbers, and other information about the module and the token it is loaded on. For example: -- modutil -list "NSS Internal PKCS #11 Module" -dbdir sql:/home/my/sharednssdb -+ modutil -list "NSS Internal PKCS #11 Module" -dbdir /home/my/sharednssdb - - ----------------------------------------------------------- - Name: NSS Internal PKCS #11 Module - Library file: **Internal ONLY module** - Manufacturer: Mozilla Foundation - Description: NSS Internal Crypto Services - PKCS #11 Version 2.20 - Library Version: 3.11 -@@ -370,17 +370,17 @@ Default Mechanism Flags: RSA:RC2:RC4:DES - Token Model: NSS 3 - Token Serial Number: 0000000000000000 - Token Version: 8.3 - Token Firmware Version: 0.0 - Access: NOT Write Protected - Login Type: Login required - User Pin: Initialized - A related command, returns information about the database configuration for the modules. (This information can be edited by loading new specs using the command.) -- modutil -rawlist -dbdir sql:/home/my/sharednssdb -+ modutil -rawlist -dbdir /home/my/sharednssdb - name="NSS Internal PKCS #11 Module" parameters="configdir=. certPrefix= keyPrefix= secmod=secmod.db flags=readOnly " NSS="trustOrder=75 cipherOrder=100 slotParams={0x00000001=[slotFlags=RSA,RC4,RC2,DES,DH,SHA1,MD5,MD2,SSL,TLS,AES,RANDOM askpw=any timeout=30 ] } Flags=internal,critical" - - Setting a Default Provider for Security Mechanisms - Multiple security modules may provide support for the same security mechanisms. It is possible to set a specific security module as the default provider for a specific security mechanism (or, conversely, to prohibit a provider from supplying those mechanisms). - modutil -default modulename -mechanisms mechanism-list - To set a module as the default provider for mechanisms, use the command with a colon-separated list of mechanisms. The available mechanisms depend on the module; NSS supplies almost all common mechanisms. For example: - modutil -default "NSS Internal PKCS #11 Module" -dbdir -mechanisms RSA:DSA:RC2 - -@@ -398,29 +398,29 @@ Successfully changed defaults.For example: - modutil -enable "NSS Internal PKCS #11 Module" -slot "NSS Internal Cryptographic Services " -dbdir . - - Slot "NSS Internal Cryptographic Services " enabled. - Be sure that the appropriate amount of trailing whitespace is after the slot name. Some slot names have a significant amount of whitespace that must be included, or the operation will fail. - - Enabling and Verifying FIPS Compliance - The NSS modules can have FIPS 140-2 compliance enabled or disabled using modutil with the option. For example: --modutil -fips true -dbdir sql:/home/my/sharednssdb/ -+modutil -fips true -dbdir /home/my/sharednssdb/ - - FIPS mode enabled. - To verify that status of FIPS mode, run the command with either a true or false flag (it doesn't matter which). The tool returns the current FIPS setting. --modutil -chkfips false -dbdir sql:/home/my/sharednssdb/ -+modutil -chkfips false -dbdir /home/my/sharednssdb/ - - FIPS mode enabled. - - Changing the Password on a Token - - Initializing or changing a token's password: - modutil -changepw tokenname [-pwfile old-password-file] [-newpwfile new-password-file] --modutil -dbdir sql:/home/my/sharednssdb -changepw "NSS Certificate DB" -+modutil -dbdir /home/my/sharednssdb -changepw "NSS Certificate DB" - - Enter old password: - Incorrect password, try again... - Enter old password: - Enter new password: - Re-enter new password: - Token "Communicator Certificate DB" password changed successfully. - -@@ -684,27 +684,26 @@ BerkleyDB. These new databases provide m - - pkcs11.txt, which is listing of all of the PKCS #11 modules contained in a new subdirectory in the security databases directory - - - - - Because the SQLite databases are designed to be shared, these are the shared database type. The shared database type is preferred; the legacy format is included for backward compatibility. - --By default, the tools (certutil, pk12util, modutil) assume that the given security databases follow the more common legacy type. --Using the SQLite databases must be manually specified by using the sql: prefix with the given security directory. For example: -+By default, the tools (certutil, pk12util, modutil) assume that the given security databases use the SQLite type. -+Using the legacy databases must be manually specified by using the dbm: prefix with the given security directory. For example: - --modutil -create -dbdir sql:/home/my/sharednssdb -+modutil -create -dbdir dbm:/home/my/sharednssdb - --To set the shared database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to sql: --export NSS_DEFAULT_DB_TYPE="sql" -+To set the legacy database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to dbm: -+export NSS_DEFAULT_DB_TYPE="dbm" - - This line can be added to the ~/.bashrc file to make the change permanent for the user. - --Most applications do not use the shared database by default, but they can be configured to use them. For example, this how-to article covers how to configure Firefox and Thunderbird to use the new shared NSS databases: - - - - https://wiki.mozilla.org/NSS_Shared_DB_Howto - - - For an engineering draft on the changes in the shared NSS databases, see the NSS project wiki: - -diff --git a/doc/pk12util.xml b/doc/pk12util.xml ---- a/doc/pk12util.xml -+++ b/doc/pk12util.xml -@@ -25,17 +25,17 @@ - - - - - pk12util - -i p12File|-l p12File|-o p12File - -c keyCipher - -C certCipher -- -d [sql:]directory -+ -d directory - -h tokenname - -m | --key-len keyLength - -M hashAlg - -n certname - -P dbprefix - -r - -v - --cert-key-len certKeyLength -@@ -83,19 +83,19 @@ - - - - -C certCipher - Specify the certiticate encryption algorithm. - - - -- -d [sql:]directory -+ -d directory - Specify the database directory into which to import to or export from certificates and keys. -- pk12util supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and new SQLite databases (cert9.db, key4.db, and pkcs11.txt). If the prefix sql: is not used, then the tool assumes that the given databases are in the old format. -+ pk12util supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and new SQLite databases (cert9.db, key4.db, and pkcs11.txt). If the prefix dbm: is not used, then the tool assumes that the given databases are in the SQLite format. - - - - -h tokenname - Specify the name of the token to import into or export from. - - - -@@ -244,44 +244,44 @@ - - - - Examples - Importing Keys and Certificates - The most basic usage of pk12util for importing a certificate or key is the PKCS #12 input file () and some way to specify the security database being accessed (either for a directory or for a token). - - -- pk12util -i p12File [-h tokenname] [-v] [-d [sql:]directory] [-P dbprefix] [-k slotPasswordFile|-K slotPassword] [-w p12filePasswordFile|-W p12filePassword] -+ pk12util -i p12File [-h tokenname] [-v] [-d directory] [-P dbprefix] [-k slotPasswordFile|-K slotPassword] [-w p12filePasswordFile|-W p12filePassword] - - For example: - -- # pk12util -i /tmp/cert-files/users.p12 -d sql:/home/my/sharednssdb -+ # pk12util -i /tmp/cert-files/users.p12 -d /home/my/sharednssdb - - Enter a password which will be used to encrypt your keys. - The password should be at least 8 characters long, - and should contain at least one non-alphabetic character. - - Enter new password: - Re-enter password: - Enter password for PKCS12 file: - pk12util: PKCS12 IMPORT SUCCESSFUL - - Exporting Keys and Certificates - Using the pk12util command to export certificates and keys requires both the name of the certificate to extract from the database () and the PKCS #12-formatted output file to write to. There are optional parameters that can be used to encrypt the file to protect the certificate material. - -- pk12util -o p12File -n certname [-c keyCipher] [-C certCipher] [-m|--key_len keyLen] [-n|--cert_key_len certKeyLen] [-d [sql:]directory] [-P dbprefix] [-k slotPasswordFile|-K slotPassword] [-w p12filePasswordFile|-W p12filePassword] -+ pk12util -o p12File -n certname [-c keyCipher] [-C certCipher] [-m|--key_len keyLen] [-n|--cert_key_len certKeyLen] [-d directory] [-P dbprefix] [-k slotPasswordFile|-K slotPassword] [-w p12filePasswordFile|-W p12filePassword] - For example: -- # pk12util -o certs.p12 -n Server-Cert -d sql:/home/my/sharednssdb -+ # pk12util -o certs.p12 -n Server-Cert -d /home/my/sharednssdb - Enter password for PKCS12 file: - Re-enter password: - - Listing Keys and Certificates - The information in a .p12 file are not human-readable. The certificates and keys in the file can be printed (listed) in a human-readable pretty-print format that shows information for every certificate and any public keys in the .p12 file. - -- pk12util -l p12File [-h tokenname] [-r] [-d [sql:]directory] [-P dbprefix] [-k slotPasswordFile|-K slotPassword] [-w p12filePasswordFile|-W p12filePassword] -+ pk12util -l p12File [-h tokenname] [-r] [-d directory] [-P dbprefix] [-k slotPasswordFile|-K slotPassword] [-w p12filePasswordFile|-W p12filePassword] - For example, this prints the default ASCII output: - # pk12util -l certs.p12 - - Enter password for PKCS12 file: - Key(shrouded): - Friendly Name: Thawte Freemail Member's Thawte Consulting (Pty) Ltd. ID - - Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC -@@ -389,27 +389,26 @@ BerkleyDB. These new databases provide m - - pkcs11.txt, which is listing of all of the PKCS #11 modules contained in a new subdirectory in the security databases directory - - - - - Because the SQLite databases are designed to be shared, these are the shared database type. The shared database type is preferred; the legacy format is included for backward compatibility. - --By default, the tools (certutil, pk12util, modutil) assume that the given security databases follow the more common legacy type. --Using the SQLite databases must be manually specified by using the sql: prefix with the given security directory. For example: -+By default, the tools (certutil, pk12util, modutil) assume that the given security databases use the SQLite type -+Using the legacy databases must be manually specified by using the dbm: prefix with the given security directory. For example: - --# pk12util -i /tmp/cert-files/users.p12 -d sql:/home/my/sharednssdb -+# pk12util -i /tmp/cert-files/users.p12 -d dbm:/home/my/sharednssdb - --To set the shared database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to sql: --export NSS_DEFAULT_DB_TYPE="sql" -+To set the legacy database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to dbm: -+export NSS_DEFAULT_DB_TYPE="dbm" - - This line can be set added to the ~/.bashrc file to make the change permanent. - --Most applications do not use the shared database by default, but they can be configured to use them. For example, this how-to article covers how to configure Firefox and Thunderbird to use the new shared NSS databases: - - - - https://wiki.mozilla.org/NSS_Shared_DB_Howto - - - For an engineering draft on the changes in the shared NSS databases, see the NSS project wiki: - -diff --git a/doc/signver.xml b/doc/signver.xml ---- a/doc/signver.xml -+++ b/doc/signver.xml -@@ -59,19 +59,19 @@ - -A - Displays all of the information in the PKCS#7 signature. - - - -V - Verifies the digital signature. - - -- -d [sql:]directory -+ -d directory - Specify the database directory which contains the certificates and keys. -- signver supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and new SQLite databases (cert9.db, key4.db, and pkcs11.txt). If the prefix sql: is not used, then the tool assumes that the given databases are in the old format. -+ signver supports two types of databases: the legacy security databases (cert8.db, key3.db, and secmod.db) and new SQLite databases (cert9.db, key4.db, and pkcs11.txt). If the prefix dbm: is not used, then the tool assumes that the given databases are in the SQLite format. - - - -a - Sets that the given signature file is in ASCII format. - - - -i input_file - Gives the input file for the object with signed data. -@@ -90,17 +90,17 @@ - - - - - - Extended Examples - Verifying a Signature - The option verifies that the signature in a given signature file is valid when used to sign the given object (from the input file). --signver -V -s signature_file -i signed_file -d sql:/home/my/sharednssdb -+signver -V -s signature_file -i signed_file -d /home/my/sharednssdb - - signatureValid=yes - - - Printing Signature Data - - The option prints all of the information contained in a signature file. Using the option prints the signature file information to the given output file rather than stdout. - -@@ -150,27 +150,26 @@ BerkleyDB. These new databases provide m - - pkcs11.txt, which is listing of all of the PKCS #11 modules contained in a new subdirectory in the security databases directory - - - - - Because the SQLite databases are designed to be shared, these are the shared database type. The shared database type is preferred; the legacy format is included for backward compatibility. - --By default, the tools (certutil, pk12util, modutil) assume that the given security databases follow the more common legacy type. --Using the SQLite databases must be manually specified by using the sql: prefix with the given security directory. For example: -+By default, the tools (certutil, pk12util, modutil) assume that the given security databases use the SQLite type -+Using the legacy databases must be manually specified by using the dbm: prefix with the given security directory. For example: - --# signver -A -s signature -d sql:/home/my/sharednssdb -+# signver -A -s signature -d dbm:/home/my/sharednssdb - --To set the shared database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to sql: --export NSS_DEFAULT_DB_TYPE="sql" -+To set the legacy database type as the default type for the tools, set the NSS_DEFAULT_DB_TYPE environment variable to dbm: -+export NSS_DEFAULT_DB_TYPE="dbm" - - This line can be added to the ~/.bashrc file to make the change permanent for the user. - --Most applications do not use the shared database by default, but they can be configured to use them. For example, this how-to article covers how to configure Firefox and Thunderbird to use the new shared NSS databases: - - - - https://wiki.mozilla.org/NSS_Shared_DB_Howto - - - For an engineering draft on the changes in the shared NSS databases, see the NSS project wiki: - diff --git a/nss.spec b/nss.spec index ec5b3a0..23cd642 100644 --- a/nss.spec +++ b/nss.spec @@ -1,5 +1,5 @@ %global nspr_version 4.35.0 -%global nss_version 3.85.0 +%global nss_version 3.87.0 # NOTE: To avoid NVR clashes of nspr* packages: # - reset %%{nspr_release} to 1, when updating %%{nspr_version} # - increment %%{nspr_version}, when updating the NSS part only @@ -7,7 +7,7 @@ %global nss_release %baserelease # use "%%global nspr_release %%[%%baserelease+n]" to handle offsets when # release number between nss and nspr are different. -%global nspr_release %[%baserelease+1] +%global nspr_release %[%baserelease+2] # only need to update this as we added new # algorithms under nss policy control %global crypto_policies_version 20210118 @@ -131,8 +131,6 @@ Patch12: nss-signtool-format.patch # fedora disabled dbm by default Patch40: nss-no-dbm-man-page.patch -# upstream bug https://bugzilla.mozilla.org/show_bug.cgi?id=1774654 -Patch50: nss-3.79-fix-client-cert-crash.patch # https://bugzilla.mozilla.org/show_bug.cgi?id=1774659 Patch51: nss-3.79-dbtool.patch @@ -1093,6 +1091,9 @@ update-crypto-policies &> /dev/null || : %changelog +* Tue Jan 10 2023 Frantisek Krenzelok - 3.87.0-1 +- Update NSS to 3.87 & remove unused patches + * Thu Nov 17 2022 Bob Relyea - 3.85.0-1 - update to NSS 3.83 diff --git a/sources b/sources index c9d91e9..48fb43b 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ SHA512 (blank-cert9.db) = 2f8eab4c0612210ee47db8a3a80c1b58a0b43849551af78c7da403fda3e3d4e7757838061ae56ccf5aac335cb54f254f0a9e6e9c0dd5920b4155a39264525b06 SHA512 (blank-key4.db) = 8fedae93af7163da23fe9492ea8e785a44c291604fa98e58438448efb69c85d3253fc22b926d5c3209c62e58a86038fd4d78a1c4c068bc00600a7f3e5382ebe7 -SHA512 (nss-3.85.tar.gz) = 97cfffa2beed1dba5d31e0c6e450553e5a8c78b427521640adb00c05d9d63cd64dc08388f0dbf96c93efb79f5daf4ba8db8d026b0b43d2e5c865a9b833fc77a1 SHA512 (nspr-4.35.tar.gz) = 502815833116e25f79ddf71d1526484908aa92fbc55f8a892729cb404a4daafcc0470a89854cd080d2d20299fdb7d9662507c5362c7ae661cbacf308ac56ef7f +SHA512 (nss-3.87.tar.gz) = 4ec7b94e537df109638b821f3a7e3b7bf31d89c3739a6e4c85cad4fab876390ae482971d6f66198818400f467661e86f39dc1d2a4a88077fd81e3a0b7ed64110