OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src                      Date:   25-May-2008 00:00:32
  Branch: HEAD                             Handle: 2008052423002700

  Added files:
    openpkg-src/nss         nss.patch nss.pc nss.sh nss.spec

  Log:
    new package: nss 3.11.9 (Mozilla Network Security Services)

  Summary:
    Revision    Changes     Path
    1.1         +135 -0     openpkg-src/nss/nss.patch
    1.1         +11 -0      openpkg-src/nss/nss.pc
    1.1         +12 -0      openpkg-src/nss/nss.sh
    1.1         +129 -0     openpkg-src/nss/nss.spec
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/nss/nss.patch
  ============================================================================
  $ cvs diff -u -r0 -r1.1 nss.patch
  --- /dev/null 2008-05-25 00:00:29 +0200
  +++ nss.patch 2008-05-25 00:00:29 +0200
  @@ -0,0 +1,135 @@
  +Index: mozilla/security/nss/Makefile
  +--- mozilla/security/nss/Makefile.orig       2006-04-15 00:48:17 +0200
  ++++ mozilla/security/nss/Makefile    2007-03-01 22:31:52 +0100
  +@@ -78,7 +78,7 @@
  + # (7) Execute "local" rules. (OPTIONAL).                              #
  + #######################################################################
  + 
  +-nss_build_all: build_coreconf build_nspr build_dbm all
  ++nss_build_all: build_coreconf build_dbm all
  + 
  + nss_clean_all: clobber_coreconf clobber_nspr clobber_dbm clobber
  + 
  +Index: mozilla/dbm/src/Makefile.in
  +--- mozilla/dbm/src/Makefile.in.orig 2005-09-22 12:38:07 +0200
  ++++ mozilla/dbm/src/Makefile.in      2008-05-24 20:35:58 +0200
  +@@ -59,7 +59,6 @@
  +             hash_buf.c \
  +             hsearch.c \
  +             mktemp.c \
  +-            ndbm.c \
  +             strerror.c \
  +             nsres.c \
  +             $(NULL)
  +Index: mozilla/security/dbm/src/manifest.mn
  +--- mozilla/security/dbm/src/manifest.mn.orig        2006-05-13 02:38:59 
+0200
  ++++ mozilla/security/dbm/src/manifest.mn     2008-05-24 20:37:59 +0200
  +@@ -53,7 +53,6 @@
  +     hash_buf.c \
  +     hsearch.c  \
  +     mktemp.c   \
  +-    ndbm.c     \
  +     dirent.c   \
  +     $(NULL)
  + 
  +Index: mozilla/security/nss/cmd/certutil/keystuff.c
  +--- mozilla/security/nss/cmd/certutil/keystuff.c.orig        2004-06-24 
00:23:00 +0200
  ++++ mozilla/security/nss/cmd/certutil/keystuff.c     2008-05-24 23:21:12 
+0200
  +@@ -70,7 +70,7 @@
  + 
  + #define ERROR_BREAK rv = SECFailure;break;
  + 
  +-const SEC_ASN1Template SECKEY_PQGParamsTemplate[] = {
  ++const SEC_ASN1Template my_SECKEY_PQGParamsTemplate[] = {
  +     { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYPQGParams) },
  +     { SEC_ASN1_INTEGER, offsetof(SECKEYPQGParams,prime) },
  +     { SEC_ASN1_INTEGER, offsetof(SECKEYPQGParams,subPrime) },
  +@@ -230,7 +230,7 @@
  +     if ((buf == NULL) || (len == 0))
  +         goto loser;
  +  
  +-    status = SEC_ASN1Decode(arena, params, SECKEY_PQGParamsTemplate, buf, 
len);
  ++    status = SEC_ASN1Decode(arena, params, my_SECKEY_PQGParamsTemplate, 
buf, len);
  +     if (status != SECSuccess)
  +         goto loser;
  +  
  +Index: mozilla/security/nss/cmd/certutil/certutil.c
  +--- mozilla/security/nss/cmd/certutil/certutil.c.orig        2007-07-25 
20:12:57 +0200
  ++++ mozilla/security/nss/cmd/certutil/certutil.c     2008-05-24 23:22:36 
+0200
  +@@ -1577,7 +1577,7 @@
  + 
  + SEC_ASN1_MKSUB(SEC_ObjectIDTemplate)
  + 
  +-const SEC_ASN1Template CERT_OidSeqTemplate[] = {
  ++const SEC_ASN1Template my_CERT_OidSeqTemplate[] = {
  +     { SEC_ASN1_SEQUENCE_OF | SEC_ASN1_XTRN,
  +       offsetof(CERTOidSequence, oids),
  +       SEC_ASN1_SUB(SEC_ObjectIDTemplate) }
  +@@ -1594,7 +1594,7 @@
  +     goto loser;
  +   }
  + 
  +-  if( !SEC_ASN1EncodeItem(os->arena, rv, os, CERT_OidSeqTemplate) ) {
  ++  if( !SEC_ASN1EncodeItem(os->arena, rv, os, my_CERT_OidSeqTemplate) ) {
  +     goto loser;
  +   }
  + 
  +Index: mozilla/security/nss/cmd/crlutil/crlgen.c
  +--- mozilla/security/nss/cmd/crlutil/crlgen.c.orig   2006-05-21 22:56:11 
+0200
  ++++ mozilla/security/nss/cmd/crlutil/crlgen.c        2008-05-24 23:24:52 
+0200
  +@@ -65,7 +65,7 @@
  +  * inclined student.
  +  */
  + PLHashNumber PR_CALLBACK
  +-SECITEM_Hash ( const void *key)
  ++my_SECITEM_Hash ( const void *key)
  + {
  +     const SECItem *item = (const SECItem *)key;
  +     PLHashNumber rv = 0;
  +@@ -89,7 +89,7 @@
  +  * but heck it's only used internally by the hash table anyway.
  +  */
  + PRIntn PR_CALLBACK
  +-SECITEM_HashCompare ( const void *k1, const void *k2)
  ++my_SECITEM_HashCompare ( const void *k1, const void *k2)
  + {
  +     const SECItem *i1 = (const SECItem *)k1;
  +     const SECItem *i2 = (const SECItem *)k2;
  +@@ -1597,7 +1597,7 @@
  +     }
  + 
  +     crlGenData->entryDataHashTable = 
  +-        PL_NewHashTable(0, SECITEM_Hash, SECITEM_HashCompare,
  ++        PL_NewHashTable(0, my_SECITEM_Hash, my_SECITEM_HashCompare,
  +                         PL_CompareValues, NULL, NULL);
  +     if (!crlGenData->entryDataHashTable) {
  +         PORT_Free(crlGenData);
  +Index: mozilla/security/nss/cmd/shlibsign/Makefile
  +--- mozilla/security/nss/cmd/shlibsign/Makefile.orig 2006-12-07 02:59:40 
+0100
  ++++ mozilla/security/nss/cmd/shlibsign/Makefile      2008-05-24 23:30:20 
+0200
  +@@ -60,9 +60,10 @@
  + 
  + # sign any and all shared libraries that contain the word freebl
  + 
  +-CHECKLIBS = $(DIST)/lib/$(DLL_PREFIX)softokn3.$(DLL_SUFFIX)
  +-CHECKLIBS += $(wildcard $(DIST)/lib/$(DLL_PREFIX)freebl*3.$(DLL_SUFFIX))
  +-CHECKLOC = $(CHECKLIBS:.$(DLL_SUFFIX)=.chk)
  ++# CHECKLIBS = $(DIST)/lib/$(DLL_PREFIX)softokn3.$(DLL_SUFFIX)
  ++# CHECKLIBS += $(wildcard $(DIST)/lib/$(DLL_PREFIX)freebl*3.$(DLL_SUFFIX))
  ++# CHECKLOC = $(CHECKLIBS:.$(DLL_SUFFIX)=.chk)
  ++CHECKLOC =
  + 
  + MD_LIB_RELEASE_FILES = $(CHECKLOC)
  + ALL_TRASH += $(CHECKLOC)
  +Index: mozilla/security/nss/cmd/zlib/manifest.mn
  +--- mozilla/security/nss/cmd/zlib/manifest.mn.orig   2004-11-04 17:23:19 
+0100
  ++++ mozilla/security/nss/cmd/zlib/manifest.mn        2008-05-24 23:33:47 
+0200
  +@@ -57,7 +57,7 @@
  + 
  + LIBRARY_NAME = zlib
  + 
  +-PROGRAMS = example minigzip
  ++PROGRAMS =
  + 
  + # REQUIRES = nss
  + 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/nss/nss.pc
  ============================================================================
  $ cvs diff -u -r0 -r1.1 nss.pc
  --- /dev/null 2008-05-25 00:00:31 +0200
  +++ nss.pc    2008-05-25 00:00:31 +0200
  @@ -0,0 +1,11 @@
  [EMAIL PROTECTED]@
  [EMAIL PROTECTED]@
  [EMAIL PROTECTED]@/lib
  [EMAIL PROTECTED]@/include
  +
  +Name: Mozilla NSS
  +Description: Mozilla Network Security Services (NSS)
  +Version: @version@
  +Requires: nspr
  +Libs: -L${libdir}/nss -lnss -lsmime -lssl
  +Cflags: -I${includedir}/nss -I${includedir}
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/nss/nss.sh
  ============================================================================
  $ cvs diff -u -r0 -r1.1 nss.sh
  --- /dev/null 2008-05-25 00:00:31 +0200
  +++ nss.sh    2008-05-25 00:00:31 +0200
  @@ -0,0 +1,12 @@
  +#!/bin/sh
  +if [ $# -eq 0 ]; then
  +    echo "nss:ERROR: no command given" 1>&2
  +    exit 1
  +fi
  +cmd="$1"
  +shift
  +if [ ! -x @l_prefix@/libexec/nss/$cmd ]; then
  +    echo "nss:ERROR: command \"$cmd\" not known" 1>&2
  +    exit 1
  +fi
  +exec @l_prefix@/libexec/nss/$cmd ${1+"$@"}
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/nss/nss.spec
  ============================================================================
  $ cvs diff -u -r0 -r1.1 nss.spec
  --- /dev/null 2008-05-25 00:00:31 +0200
  +++ nss.spec  2008-05-25 00:00:31 +0200
  @@ -0,0 +1,129 @@
  +##
  +##  nss.spec -- OpenPKG RPM Package Specification
  +##  Copyright (c) 2000-2008 OpenPKG Foundation e.V. <http://openpkg.net/>
  +##
  +##  Permission to use, copy, modify, and distribute this software for
  +##  any purpose with or without fee is hereby granted, provided that
  +##  the above copyright notice and this permission notice appear in all
  +##  copies.
  +##
  +##  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
  +##  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  +##  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  +##  IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
  +##  CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  +##  SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  +##  LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
  +##  USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  +##  ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  +##  OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
  +##  OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  +##  SUCH DAMAGE.
  +##
  +
  +#   package version
  +%define       V_major 3
  +%define       V_minor 11
  +%define       V_micro 9
  +
  +#   package information
  +Name:         nss
  +Summary:      Mozilla Network Security Services
  +URL:          http://www.mozilla.org/projects/security/pki/nss/
  +Vendor:       Mozilla
  +Packager:     OpenPKG Foundation e.V.
  +Distribution: OpenPKG Community
  +Class:        EVAL
  +Group:        Cryptography
  +License:      MPL
  +Version:      %{V_major}.%{V_minor}.%{V_micro}
  +Release:      20080524
  +
  +#   list of sources
  +Source0:      
ftp://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_%{V_major}_%{V_minor}_%{V_micro}_RTM/src/nss-%{version}.tar.gz
  +Source1:      nss.pc
  +Source2:      nss.sh
  +Patch0:       nss.patch
  +
  +#   build information
  +Prefix:       %{l_prefix}
  +BuildRoot:    %{l_buildroot}
  +BuildPreReq:  OpenPKG, openpkg >= 20040130, gcc, gcc::with_cxx = yes
  +PreReq:       OpenPKG, openpkg >= 20040130
  +BuildPreReq:  nspr
  +PreReq:       nspr
  +AutoReq:      no
  +AutoReqProv:  no
  +
  +%description
  +    Network Security Services (NSS) is a set of libraries designed
  +    to support cross-platform development of security-enabled server
  +    applications. Applications built with NSS can support SSLv2,
  +    SSLv3, TLSv1, PKCS#5, PKCS#7, PKCS#11, PKCS#12, S/MIME, X.509v3
  +    certificates, and other security standards.
  +
  +%track
  +    prog nss = {
  +        version   = %{V_major}_%{V_minor}_%{V_micro}
  +        url       = 
ftp://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/
  +        regex     = NSS_(__VER__)
  +    }
  +
  +%prep
  +    %setup -q
  +    %patch -p0
  +
  +%build
  +    ( cd mozilla/security/coreconf
  +      %{l_make} %{l_mflags} \
  +          CC="%{l_cc} %{l_cflags} %{l_cppflags nspr}" \
  +          TARGETS='$(LIBRARY) $(PROGRAM)' \
  +          USE_STATIC_LIBS=1 \
  +          BUILD_OPT=1
  +    ) || exit $?
  +    ( cd mozilla/security/dbm
  +      %{l_make} %{l_mflags} \
  +          CC="%{l_cc} %{l_cflags} %{l_cppflags nspr}" \
  +          TARGETS='$(LIBRARY) $(PROGRAM)' \
  +          USE_STATIC_LIBS=1 \
  +          BUILD_OPT=1
  +    ) || exit $?
  +    ( cd mozilla/security/nss
  +      %{l_make} %{l_mflags} \
  +          CC="%{l_cc} %{l_cflags} %{l_cppflags nspr}" \
  +          TARGETS='$(LIBRARY) $(PROGRAM)' \
  +          USE_STATIC_LIBS=1 \
  +          BUILD_OPT=1
  +    ) || exit $?
  +
  +%install
  +    rm -rf $RPM_BUILD_ROOT
  +    %{l_shtool} mkdir -f -p -m 755 \
  +        $RPM_BUILD_ROOT%{l_prefix}/bin \
  +        $RPM_BUILD_ROOT%{l_prefix}/libexec/nss \
  +        $RPM_BUILD_ROOT%{l_prefix}/include/nss \
  +        $RPM_BUILD_ROOT%{l_prefix}/lib/nss \
  +        $RPM_BUILD_ROOT%{l_prefix}/lib/pkgconfig
  +    %{l_shtool} install -c -m 644 \
  +        mozilla/dist/public/nss/* \
  +        $RPM_BUILD_ROOT%{l_prefix}/include/nss/
  +    %{l_shtool} install -c -m 644 \
  +        mozilla/dist/*.OBJ/lib/*.a \
  +        $RPM_BUILD_ROOT%{l_prefix}/lib/nss/
  +    %{l_shtool} install -c -s -m 755 \
  +        mozilla/dist/*.OBJ/bin/* \
  +        $RPM_BUILD_ROOT%{l_prefix}/libexec/nss/
  +    %{l_shtool} install -c -m 644 %{l_value -s -a} \
  +        -e 's;@version@;%{version};g' \
  +        %{SOURCE nss.pc} \
  +        $RPM_BUILD_ROOT%{l_prefix}/lib/pkgconfig/
  +    %{l_shtool} install -c -m 755 %{l_value -s -a} \
  +        %{SOURCE nss.sh} \
  +        $RPM_BUILD_ROOT%{l_prefix}/bin/nss
  +    %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std}
  +
  +%files -f files
  +
  +%clean
  +    rm -rf $RPM_BUILD_ROOT
  +
  @@ .
______________________________________________________________________
OpenPKG                                             http://openpkg.org
CVS Repository Commit List                     [email protected]

Reply via email to