nss-3.28.4-12.el7_4$>Gi/jeNþB><?d   0hl k`         \   ,[<<t<(8S9 @S:_S>`@hGpHIX$[Y[\]h^Ubdefltuv@ w8xyCnss3.28.412.el7_4Network Security ServicesNetwork Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.Y@c1bm.rdu2.centos.org#ECentOSMPLv2.0CentOS BuildSystem System Environment/Librarieshttp://www.mozilla.org/projects/security/pki/nss/linuxi686# If we upgrade, and the shared filename is a regular file, then we must # remove it, before we can install the alternatives symbolic link. if [ $1 -gt 1 ] ; then # when upgrading or downgrading if ! test -L /usr/lib/libnssckbi.so; then rm -f /usr/lib/libnssckbi.so fi fi # Install the symbolic link # FYI: Certain other packages use alternatives --set to enforce that the first # installed package is preferred. We don't do that. Highest priority wins. /usr/sbin/update-alternatives --install /usr/lib/libnssckbi.so \ libnssckbi.so /usr/lib/nss/libnssckbi.so 10 /sbin/ldconfigif [ $1 -eq 0 ] ; then # package removal /usr/sbin/update-alternatives --remove libnssckbi.so /usr/lib/nss/libnssckbi.so else # upgrade or downgrade # If the new installed package uses a regular file (not a symblic link), # then cleanup the alternatives link. if ! test -L /usr/lib/libnssckbi.so; then /usr/sbin/update-alternatives --remove libnssckbi.so /usr/lib/nss/libnssckbi.so fi fi /sbin/ldconfiga$@,@!Lj,WU?A큤A큤큤큤Y3Y1?Y3Y1EY1EY1EY1FY1?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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnss-3.28.4-12.el7_4.src.rpmconfig(nss)libnss3.solibnss3.so(NSS_3.10)libnss3.so(NSS_3.10.2)libnss3.so(NSS_3.11)libnss3.so(NSS_3.11.1)libnss3.so(NSS_3.11.2)libnss3.so(NSS_3.11.7)libnss3.so(NSS_3.11.9)libnss3.so(NSS_3.12)libnss3.so(NSS_3.12.1)libnss3.so(NSS_3.12.10)libnss3.so(NSS_3.12.3)libnss3.so(NSS_3.12.4)libnss3.so(NSS_3.12.5)libnss3.so(NSS_3.12.6)libnss3.so(NSS_3.12.7)libnss3.so(NSS_3.12.9)libnss3.so(NSS_3.13)libnss3.so(NSS_3.13.2)libnss3.so(NSS_3.14)libnss3.so(NSS_3.14.1)libnss3.so(NSS_3.14.3)libnss3.so(NSS_3.15)libnss3.so(NSS_3.15.4)libnss3.so(NSS_3.16.1)libnss3.so(NSS_3.16.2)libnss3.so(NSS_3.18)libnss3.so(NSS_3.19)libnss3.so(NSS_3.19.1)libnss3.so(NSS_3.2)libnss3.so(NSS_3.2.1)libnss3.so(NSS_3.21)libnss3.so(NSS_3.22)libnss3.so(NSS_3.3)libnss3.so(NSS_3.3.1)libnss3.so(NSS_3.30)libnss3.so(NSS_3.4)libnss3.so(NSS_3.5)libnss3.so(NSS_3.6)libnss3.so(NSS_3.7)libnss3.so(NSS_3.7.1)libnss3.so(NSS_3.8)libnss3.so(NSS_3.9)libnss3.so(NSS_3.9.2)libnss3.so(NSS_3.9.3)libnssckbi.solibnssckbi.so(NSS_3.1)libsmime3.solibsmime3.so(NSS_3.10)libsmime3.so(NSS_3.12.10)libsmime3.so(NSS_3.12.2)libsmime3.so(NSS_3.13)libsmime3.so(NSS_3.15)libsmime3.so(NSS_3.16)libsmime3.so(NSS_3.18)libsmime3.so(NSS_3.2)libsmime3.so(NSS_3.2.1)libsmime3.so(NSS_3.3)libsmime3.so(NSS_3.4)libsmime3.so(NSS_3.4.1)libsmime3.so(NSS_3.6)libsmime3.so(NSS_3.7)libsmime3.so(NSS_3.7.2)libsmime3.so(NSS_3.8)libsmime3.so(NSS_3.9)libsmime3.so(NSS_3.9.3)libssl3.solibssl3.so(NSS_3.11.4)libssl3.so(NSS_3.11.8)libssl3.so(NSS_3.12.10)libssl3.so(NSS_3.12.6)libssl3.so(NSS_3.13)libssl3.so(NSS_3.13.2)libssl3.so(NSS_3.14)libssl3.so(NSS_3.15)libssl3.so(NSS_3.15.4)libssl3.so(NSS_3.2)libssl3.so(NSS_3.2.1)libssl3.so(NSS_3.20)libssl3.so(NSS_3.21)libssl3.so(NSS_3.22)libssl3.so(NSS_3.23)libssl3.so(NSS_3.24)libssl3.so(NSS_3.27)libssl3.so(NSS_3.28)libssl3.so(NSS_3.30.0.1)libssl3.so(NSS_3.4)libssl3.so(NSS_3.7.4)nssnss(x86-32)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    @ /bin/sh/bin/sh/usr/sbin/update-alternatives/usr/sbin/update-alternativesconfig(nss)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdl.so.2libnspr4.solibnss3.solibnss3.so(NSS_3.10)libnss3.so(NSS_3.11)libnss3.so(NSS_3.11.1)libnss3.so(NSS_3.11.2)libnss3.so(NSS_3.12)libnss3.so(NSS_3.12.6)libnss3.so(NSS_3.14)libnss3.so(NSS_3.14.3)libnss3.so(NSS_3.15)libnss3.so(NSS_3.19.1)libnss3.so(NSS_3.2)libnss3.so(NSS_3.21)libnss3.so(NSS_3.22)libnss3.so(NSS_3.3)libnss3.so(NSS_3.3.1)libnss3.so(NSS_3.4)libnss3.so(NSS_3.6)libnss3.so(NSS_3.7)libnss3.so(NSS_3.8)libnss3.so(NSS_3.9)libnssutil3.solibnssutil3.so(NSSUTIL_3.12)libnssutil3.so(NSSUTIL_3.12.3)libnssutil3.so(NSSUTIL_3.12.5)libnssutil3.so(NSSUTIL_3.13)libnssutil3.so(NSSUTIL_3.14)libnssutil3.so(NSSUTIL_3.15)libnssutil3.so(NSSUTIL_3.17.1)libnssutil3.so(NSSUTIL_3.21)libnssutil3.so(NSSUTIL_3.24)libplc4.solibplds4.solibpthread.so.0libpthread.so.0(GLIBC_2.0)libz.so.1nsprnss-pem(x86-32)nss-softokn(x86-32)nss-system-initnss-utilrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rtld(GNU_HASH)rpmlib(PayloadIsXz)3.28.4-12.el7_44.13.13.28.3-43.28.4-23.0.4-14.6.0-14.0-15.2-14.11.3YaYh@Yg`Y1S@Y i@Y i@Y @Y.Y@YXX~@X•@XO@XO@XBX@XX@XWu WrfWc@Wc@WBWo@Wo@Wo@WW WW@Vn@V@V>@V`VpV'~@U6@U6@UAU@UUUݪ@UUȒ@UU@U'U3@UUx&Ux&Uq@U?v@U8U0U-@U'@U:TTq@TTto@Td@T)IS@S@Sہ@S@SnS@RJ@RRUR۾@R۾@R@R@Rx@RΏ@RkR@R;RiR@Rz/@Rv:Rt@RrF@Ro@Ro@RnQRe@RW@RSR@QQQ@QKQ@QQW@Q'@Qq1QNQ9Q7/Q#@QQ @P!@PՠP @PqP@P@PAPXPd@Pd@PPP@PP5@PPnP;a@P(@P H@O;O;O@OiO@O@O}O~OiOYOX@OOdO&@O!@@OO@O@N>@N>@NNܲ@N`NؽNN@NuN;@Np@Nf @NA!@N*NpM@MWMc@MM@M@MMfH@M^_@MZjMS@MQ0@MQ0@MQ0@MQ0@MK@MGMF@M6@M-MM@Ls@LOLLZ@L6LdL@L*@L@LA@LL@L4Lx@Lx@Li(@Lf@L_L_LT@L0L0L K @KsKsKKCKCKCK]KMKLd@KD{@K<@K5K4@K,@K+nK*@K K@K@K@KJݦ@J - 3.28.4-12Daiki Ueno - 3.28.4-11Daiki Ueno - 3.28.4-10Daiki Ueno - 3.28.4-9Kai Engert - 3.28.4-8Daiki Ueno - 3.28.4-7Daiki Ueno - 3.28.4-6Daiki Ueno - 3.28.4-5Daiki Ueno - 3.28.4-4Daiki Ueno - 3.28.4-3Daiki Ueno - 3.28.4-2Daiki Ueno - 3.28.3-5Daiki Ueno - 3.28.3-4Daiki Ueno - 3.28.3-3Daiki Ueno - 3.28.3-2Daiki Ueno - 3.28.2-3Daiki Ueno - 3.28.2-2Daiki Ueno - 3.28.2-1.1Daiki Ueno - 3.28.2-1.0Daiki Ueno - 3.21.3-1Kai Engert - 3.21.0-17Kai Engert - 3.21.0-16Kai Engert - 3.21.0-15Kai Engert - 3.21.0-14Elio Maldonado - 3.21.0-13Elio Maldonado - 3.21.0-12Elio Maldonado - 3.21.0-11Elio Maldonado - 3.21.0-10Kai Engert - 3.21.0-9Kai Engert - 3.21.0-8Elio Maldonado - 3.21.0-7Kai Engert - 3.21.0-6Kai Engert - 3.21.0-5Elio Maldonado - 3.21.0-2Elio Maldonado - 3.21.0-1Elio Maldonado - 3.19.1-19Kai Engert - 3.19.1-18Elio Maldonado - 3.19.1-17Elio Maldonado - 3.19.1-16Elio Maldonado - 3.19.1-15Elio Maldonado - 3.19.1-14Elio Maldonado - 3.19.1-13Elio Maldonado - 3.19.1-12Elio Maldonado - 3.19.1-11Elio Maldonado - 3.19.1-10Elio Maldonado - 3.19.1-9Elio Maldonado - 3.19.1-8Elio Maldonado - 3.19.1-7Elio Maldonado - 3.19.1-6Kai Engert - 3.19.1-5Elio Maldonado - 3.19.1-4Elio Maldonado - 3.19.1-3Elio Maldonado - 3.19.1-2Elio Maldonado - 3.19.1-1Kai Engert - 3.18.0-6Kai Engert - 3.18.0-5Elio Maldonado - 3.18.0-4Elio Maldonado - 3.18.0-3Elio Maldonado - 3.18.0-2Elio Maldonado - 3.18.0-1Elio Maldonado - 3.16.2.3-5Elio Maldonado - 3.16.2.3-4Elio Maldonado - 3.16.2.3-3Elio Maldonado - 3.16.2.3-2Elio Maldonado - 3.16.2-10Elio Maldonado - 3.16.2-9Elio Maldonado - 3.16.2-4Elio Maldonado 3.16.2-3Elio Maldonado - 3.16.2-2Elio Maldonado - 3.16.2-1Elio Maldonado - 3.15.4-6Elio Maldonado - 3.15.4-5Elio Maldonado - 3.15.4-4Elio Maldonado - 3.15.4-3Daniel Mach - 3.15.4-2Elio Maldonado - 3.15.3-9Elio Maldonado - 3.15.3-8Elio Maldonado - 3.15.3-7Elio Maldonado - 3.15.3-6Elio Maldonado - 3.15.3-5Elio Maldonado - 3.15.3-4Daniel Mach - 3.15.3-3Elio Maldonado - 3.15.3-2Elio Maldonado - 3.15.3-1Elio Maldonado - 3.15.2-10Elio Maldonado - 3.15.2-9Elio Maldonado - 3.15.2-8Elio Maldonado - 3.15.2-7Elio Maldonado - 3.15.2-6Elio Maldonado - 3.15.2-5Elio Maldonado - 3.15.2-4Elio Maldonado - 3.15.2-3Elio Maldonado - 3.15.2-2Elio Maldonado - 3.15.2-1Elio Maldonado - 3.15.1-4Elio Maldonado - 3.15.1-3Elio Maldonado - 3.15.1-2Elio Maldonado - 3.15.1-2Elio Maldonado - 3.15-6Elio Maldonado - 3.15-5emaldona - 3.15-4emaldona - 3.15-3Elio Maldonado - 3.15-2Elio Maldonado - 3.15-1Elio Maldonado - 3.14.3-13.0Kai Engert - 3.14.3-12.0Kai Engert - 3.14.3-11Kai Engert - 3.14.3-10Kai Engert - 3.14.3-9Elio Maldonado - 3.14.3-1Elio Maldonado - 3.14.2-2Elio Maldonado - 3.14.2-1Kai Engert - 3.14.1-3Elio Maldonado - 3.14.1-2Elio Maldonado - 3.14.1-1Elio Maldonado - 3.14-12Elio Maldonado - 3.14-11Elio Maldonado - 3.14-10Elio Maldonado - 3.14-9Elio Maldonado - 3.14-8Elio Maldonado - 3.14-7Elio Maldonado - 3.14-6Elio Maldonado - 3.14-5Elio Maldonado - 3.14-4Elio Maldonado - 3.14-3Elio Maldonado - 3.14-2Elio Maldonado - 3.14-1Elio Maldonado - 3.14-0.1.rc.1Kai Engert - 3.13.6-1Elio Maldonado - 3.13.5-8Elio Maldonado - 3.13.5-7Fedora Release Engineering - 3.13.5-6Elio Maldonado - 3.13.5-5Elio Maldonado - 3.13.5-4Elio Maldonado - 3.13.5-3Elio Maldonado - 3.13.5-2Elio Maldonado - 3.13.5-1Elio Maldonado - 3.13.4-3Elio Maldonado - 3.13.4-2Elio Maldonado - 3.13.4-1Elio Maldonado - 3.13.3-4Elio Maldonado - 3.13.3-3Elio Maldonado - 3.13.3-2Elio Maldonado - 3.13.3-1Tom Callaway - 3.13.1-13Elio Maldonado - 3.13.1-12Fedora Release Engineering - 3.13.1-11Elio Maldonado - 3.13.1-11Elio Maldonado - 3.13.1-10elio maldonado - 3.13.1-9Elio Maldonado - 3.13.1-8Elio Maldonado - 3.13.1-7Elio Maldonado - 3.13.1-6Elio Maldonado - 3.13.1-5Elio Maldonado Batiz - 3.13.1-4Elio Maldonado - 3.13.1-2Elio Maldonado - 3.13.1-1Elio Maldonado - 3.13-1Elio Maldonado - 3.13-0.1.rc0.1Elio Maldonado - 3.12.11-3Kai Engert - 3.12.11-2Elio Maldonado - 3.12.11-1Elio Maldonado - 3.12.10-6Michael Schwendt - 3.12.10-5Elio Maldonado - 3.12.10-4Dennis Gilmore - 3.12.10-3Elio Maldonado - 3.12.10-2Elio Maldonado - 3.12.10-1Elio Maldonado - 3.12.10-0.1.beta1Elio Maldonado - 3.12.9-15Elio Maldonado - 3.12.9-14Elio Maldonado - 3.12.9-13Elio Maldonado - 3.12.9-12Elio Maldonado - 3.12.9-11Elio Maldonado - 3.12.9-10Elio Maldonado - 3.12.9-9Fedora Release Engineering - 3.12.9-8Elio Maldonado - 3.12.9-7Christopher Aillon - 3.12.9-6Elio Maldonado - 3.12.9-5Elio Maldonado - 3.12.9-4Elio Maldonado - 3.12.9-3Elio Maldonado - 3.12.9-2Elio Maldonado - 3.12.9-1Elio Maldonado - 3.12.9-0.1.beta2Elio Maldonado - 3.12.8.99.2-1Elio Maldonado - 3.12.8.99.1-1Elio Maldonado - 3.12.8-9Elio Maldonado - 3.12.8-8Elio Maldonado - 3.12.8-7Elio Maldonado - 3.12.8-6Elio Maldonado - 3.12.8-5Elio Maldonado - 3.12.8-4Elio Maldonado - 3.12.8-3Elio Maldonado - 3.12.8-2Elio Maldonado - 3.12.8-1Elio Maldonado - 3.12.7.99.4-1Elio Maldonado - 3.12.7.99.3-2Elio Maldonado - 3.12.7.99.3-1Elio Maldonado - 3.12.7-3Elio Maldonado - 3.12.7-2Elio Maldonado - 3.12.7-1Elio Maldonado - 3.12.6-12Elio Maldonado - 3.12.6-11Elio Maldonado - 3.12.6-10Elio Maldonado - 3.12.6-9Dennis Gilmore - 3.12.6-8Elio Maldonado - 3.12.6-7Elio Maldonado - 3.12.6-6Elio Maldonado - 3.12.6-5Elio Maldonado - 3.12.6-4Elio Maldonado - 3.12.6-3Elio Maldonado - 3.12.6-2Elio Maldonado - 3.12.6-1.2Elio Maldonado - 3.12.6-1.1Elio Maldonado - 3.12.6-1Elio Maldonado - 3.12.5-8Elio Maldonado - 3.12.5-5Elio Maldonado - 3.12.5-1.1Elio Maldonado - 3.12.5-1.13.2Elio Maldonado - 3.12.5-1.13.1Elio Maldonado - 3.12.5-1.13Elio Maldonado - 3.12.5-1.11Elio maldonado - 3.12.5-1.9Elio Maldonado - 3.12.5-2.7Elio Maldonado - 3.12.5-1.6Elio Maldonado - 3.12.5-1.5Elio Maldonado - 3.12.5-1.1Elio Maldonado - 3.12.5-1.1Elio Maldonado - 3.12.5-1Elio Maldonado - 3.12.4-14.1Elio Maldonado - 3.12.4-13.1Elio Maldonado - 3.12.4-13Elio Maldonado - 3.12.4-12Elio Maldonado - 3.12.4-11Elio Maldonado - 3.12.4-10Elio Maldonado - 3.12.4-8Elio Maldonado - 3.12.4-6Elio Maldonado - 3.12.4-5Elio Maldonado - 3.12.4-4Elio Maldonado - 3.12.4-3Elio Maldonado - 3.12.4-2Elio Maldonado - 3.12.4-1Elio Maldonado - 3.12.3.99.3-30Elio Maldonado - 3.12.3.99.3-29Elio Maldonado - 3.12.3.99.3-28Elio Maldonado - 3.12.3.99.3-27Elio Maldonado - 3.12.3.99.3-26Elio Maldonado - 3.12.3.99.3-25Warren Togami - 3.12.3.99.3-24Elio Maldonado - 3.12.3.99.3-23Elio Maldonado - 3.12.3.99.3-22Elio Maldonado - 3.12.3.99.3-21Elio Maldonado - 3.12.3.99.3-20Elio Maldonado - 3.12.3.99.3-19Elio Maldonado - 3.12.3.99.3-18Elio Maldonado - 3.12.3.99.3-16Dennis Gilmore - 3.12.3.99.3-15Dennis Gilmore - 3.12.3.99.3-14Dennis Gilmore - 3.12.3.99.3-13Dennis Gilmore - 3.12.3.99.3-12Elio Maldonado+emaldona@redhat.com - 3.12.3.99.3-11Elio Maldonado - 3.12.3.99.3-10Dennis Gilmore - 3.12.3.99.3-9Elio Maldonado - 3.12.3.99.3-7.1Fedora Release Engineering - 3.12.3.99.3-7Elio Maldonado - 3.12.3.99.3-6Elio Maldonado - 3.12.3.99.3-5Elio Maldonado - 3.12.3.99.3-4Kai Engert - 3.12.3.99.3-3Kai Engert - 3.12.3.99.3-2Kai Engert - 3.12.3-7Kai Engert - 3.12.3-4Kai Engert - 3.12.3-3Kai Engert - 3.12.3-2Kai Engert - 3.12.2.99.3-7Kai Engert - 3.12.2.99.3-6Kai Engert - 3.12.2.99.3-5Kai Engert - 3.12.2.99.3-4Kai Engert - 3.12.2.99.3-3Kai Engert - 3.12.2.99.3-2Kai Engert - 3.12.2.99.3-1Fedora Release Engineering - 3.12.2.0-4Kai Engert - 3.12.2.0-3Dennis Gilmore - 3.12.1.1-4Kai Engert - 3.12.1.1-3Kai Engert - 3.12.1.1-2Kai Engert - 3.12.1.0-2Kai Engert - 3.12.0.3-7Kai Engert - 3.12.0.3-6Kai Engert - 3.12.0.3-3Kai Engert - 3.12.0.3-2Kai Engert - 3.12.0.1-1Jesse Keating - 3.11.99.5-2Kai Engert - 3.11.99.5-1Kai Engert - 3.11.99.4-1Kai Engert - 3.11.99.3-6Kai Engert - 3.11.99.3-5Kai Engert - 3.11.99.3-4Kai Engert - 3.11.99.3-3Kai Engert - 3.11.99.3-2Kai Engert - 3.11.99.3-1Kai Engert - 3.11.99.2b-3Kai Engert - 3.11.99.2b-2Kai Engert - 3.11.99.2-2Kai Engert - 3.11.99.2-1Kai Engert - 3.11.7-10Rob Crittenden - 3.11.7-9Kai Engert - 3.11.7-8Bob Relyea - 3.11.7-7Kai Engert - 3.11.7-6Kai Engert - 3.11.7-5Kai Engert - 3.11.7-4Kai Engert - 3.11.7-3Kai Engert - 3.11.7-2Kai Engert - 3.11.5-2Kai Engert - 3.11.5-1Bob Relyea - 3.11.4-4Kai Engert - 3.11.4-1Kai Engert - 3.11.3-2Kai Engert - 3.11.3-1Kai Engert - 3.11.2-2Jesse Keating - 3.11.2-1.1Kai Engert - 3.11.2-1Kai Engert - 3.11.1-2Kai Engert - 3.11.1-1Kai Engert - 3.11-4Jesse Keating - 3.11-3.2Jesse Keating - 3.11-3.1Ray Strode 3.11-3Christopher Aillon 3.11-2Christopher Aillon 3.11-1Christopher Aillon 3.11-0.cvs.2Christopher Aillon 3.11-0.cvsKai Engert Rob Crittenden 3.10-1- Backport patch to simplify transcript calculation for CertificateVerify- Rebuild to get correct release suffix (.el7 -> .el7_4)- Work around yum crash due to new NSPR symbol being used in nss-sysinit, patch by Kai Engert- Fix typo in nss-sni-c-v-fix.patch- Include CKBI 2.14 and updated CA constraints from NSS 3.28.5- Update nss-pk12util.patch to include fix from mozbz#1353724.- Update nss-alert-handler.patch with the upstream fix from mozbz#1360207.- Fix zero-length record treatment for stream ciphers and SSLv2- Correctly set policy file location when building- Reorder ChaCha20-Poly1305 cipher suites, as suggested in: https://bugzilla.redhat.com/show_bug.cgi?id=1373158#c9- Rebase to NSS 3.28.4 - Update nss-pk12util.patch with backport of mozbz#1353325- Switch default hash algorithm used by tools from SHA-1 to SHA-256 - Avoid race condition in nssSlot_IsTokenPresent() - Enable SHA-2 and AES in pk12util - Disable RSA-PSS for now- Utilize CKA_NSS_MOZILLA_CA_POLICY attribute, patch by Kai Engert - Backport changes adding SSL alert callbacks from upstream - Add nss-check-policy-file.patch from Fedora - Install policy config in /etc/pki/nss-legacy/nss-rhel7.config- Make sure 32bit nss-pem always be installed with 32bit nss in multlib environment, patch by Kamil Dudka - Enable new algorithms supported by the new nss-softokn- Rebase to NSS 3.28.3 - Bump required version of nss-softokn- Remove %nss_cycles setting, which was also mistakenly added - Re-enable BUILD_OPT, mistakenly disabled in the previous build - Prevent ABI incompatibilty of SECKEYECPublicKey - Disable TLS_ECDHE_{RSA,ECDSA}_WITH_AES_128_CBC_SHA256 by default - Enable 4 AES_256_GCM_SHA384 ciphersuites, enabled by the downstream patch in the previous release - Fix crash with tstclnt -W - Always enable gtests for supported features - Add patch to fix bash syntax error in tests/ssl.sh - Build with support for SSLKEYLOGFILE - Disable the use of RSA-PSS with SSL/TLS- Decouple nss-pem from the nss package - Resolves: #1316546- Remove mistakenly added R: nss-pem- Rebase to NSS 3.28.2 - Remove NSS_ENABLE_ECC and NSS_ECC_MORE_THAN_SUITE_B setting, which is no-op now - Enable gtests when requested - Remove nss-646045.patch and fix-nss-test-filtering.patch, which are not necessary - Remove sslauth-no-v2.patch and nss-sslstress-txt-ssl3-lower-value-in-range.patch, as SSLv2 is already disabled in upstream - Remove ssl-server-min-key-sizes.patch, as we decided to support DH key size greater than 1023 bits - Remove local patches for SHA384 cipher suites (now supported in upstream): dhe-sha384-dss-support.patch, client_auth_for_sha384_prf_support.patch, nss-fix-client-auth-init-hashes.patch, nss-map-oid-to-hashalg.patch, nss-enable-384-cipher-tests.patch, nss-fix-signature-and-hash.patch, fix-allowed-sig-alg.patch, tests-extra.patch - Remove upstreamed patches: rh1238290.patch, fix-reuse-of-session-cache-entry.patch, flexible-certverify.patch, call-restartmodules-in-nssinit.patch- Rebase to NSS 3.21.3 - Resolves: #1383887- remove additional false duplicates from sha384 downstream patches- enable ssl_gtests (without extended master secret tests), Bug 1298692 - call SECMOD_RestartModules in nss_Init, Bug 1317691- escape all percent characters in all changelog comments- Support TLS 1.2 certificate_verify hashes other than PRF, backported fix from NSS 3.25 (upstream bug 1179338).- Fix reuse of session cache entry - Resolves: Bug 1241172 - Certificate verification fails with multiple https urls- Fix a flaw in %check for nss not building on arm - Resolves: Bug 1200856- Cleanup: Remove unnecessary %posttrans script from nss.spec - Resolves: Bug 1174201- Merge fixes from the rhel-7.2 branch - Fix a bogus %changelog entry - Resolves: Bug 1297941- Rebuild to require the latest nss-util build and nss-softokn build.- Update the minimum nss-softokn build required at runtime.- Delete duplicates from one table- Fix missing support for sha384/dsa in certificate_request- Merge fixes from the rhel-7.2 branch - Fix the SigAlgs sent in certificate_request - Ensure all ssl.sh tests are executed - Update sslauth test patch to run additional tests- Fix sha384 support and testing patches- Rebase to NSS-3.21- Prevent TLS 1.2 Transcript Collision attacks against MD5 in key exchange protocol - Fix a mockbuild reported bad %if condition when using the __isa_bits macro instead of list of 64-bit architectures - Change the test to %if 0%{__isa_bits} == 64 as required for building the srpm which is noarch - Resolves: Bug 1289884- Rebuild against updated NSPR- Change the required_softokn_build_version back to -13 - Ensure we use nss-softokn-3.16.2.3-13.el7_1- Fix check for public key size of DSA certificates - Use size of prime P not the size of dsa.publicValue- Reorder the cipher suites and enable two more by default- Update the required_softokn_build_version to -14 - Add references to bugs filed upstream for new patches - Merge ocsp stapling and sslauth sni tests patches into one- Reorder the cipher suites and enable two more by default - Fix some of the ssauth sni and ocsp stapling tests- Support TLS > 1.0 by support while still allowing to connect to SSL3 only servers - Enable ECDSA cipher suites by default, a subset of the ones requested- Support TLS > 1.0 by support while still allowing to connect to SSL3 only servers- Fix to correctly report integrity mechanism for TLS_RSA_WITH_AES_256_GCM_SHA384- Fix checks to skip ssl2/export cipher suites tests to not skip needed tests - Fix libssl ssl2/export disabling patch to handle NULL cipher cases - Enable additional cipher suites by default- Add links to filed upstream bugs to better track patches in spec file- Package listsuites as part of the unsupported tools- Bump the release tag- Incremental patches to fix SSL/TLS test suite execution, fix the earlier SHA384 patch, and inform clients to use SHA384 with certificate_verify if required by NSS.- Add support for sha384 tls cipher suites - Add support for server-side hde key exchange - Add support for DSS+SHA256 ciphersuites- Reenable a patch that had been mistakenly disabled- Build against nss-softokn-3.16.2.3-9- Rebase to nss-3.19.1 - Resolves: Bug 1228913 - Rebase to nss-3.19.1 for CVE-2015-4000 [RHEL-7.1]- Backport mozbz#1155922 to support SHA512 signatures with TLS 1.2- Update to CKBI 2.4 from NSS 3.18.1 (the only change in NSS 3.18.1)- Update and reeneable nss-646045.patch on account of the rebase - Resolves: Bug 1200898 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]- Fix shell syntax error on nss/tests/all.sh - Resolves: Bug 1200898 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]- Replace expired PayPal test certificate that breaks the build - Resolves: Bug 1200898 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]- Resolves: Bug 1200898 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]- Reverse the sense of a test in patch to fix pk12util segfault - Resolves: Bug 1174527 - Segfault in pk12util when using -l option with certain .p12 files- Fix race condition - Resolves: Bug 1094468 - 389-ds-base server reported crash in stan_GetCERTCertificate - under the replication replay failure condition- Resolves: Bug 1174527 - Segfault in pk12util when using -l option with certain .p12 files- Restore patch for certutil man page - supply missing options descriptions - Resolves: Bug 1158161 - Upgrade to NSS 3.16.2.3 for Firefox 31.3- Resolves: Bug 1158161 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 - Support TLS_FALLBACK_SCSV in tstclnt and ssltap- Resolves: Bug 1145434 - CVE-2014-1568 - Using a release number higher than on rhel-7.0 branch- Fix crash in stan_GetCERTCertificate - Resolves: Bug 1094468- Generic 32/64 bit platform detection (fix ppc64le build) - Resolves: Bug 1125619 - nss fails to build on arch: ppc64le (missing dependencies) - Fix contributed by Peter Robinson - Fix libssl and test patches that disable ssl2 support - Resolves: Bug 1123435 - Replace expired PayPal test certificate with current one- Rebase to nss-3.16.2 - Resolves: Bug 1103252 - Rebase RHEL 7.1 to at least NSS 3.16.1 (FF 31) - Fix test failure detection in the %check section - Move removal of unwanted source directories to the end of the %prep section - Update various patches on account of the rebase - Remove unused patches rendered obsolete by the rebase- Disallow disabling the internal module - Resolves: Bug 1056036 - nss segfaults with opencryptoki module- Pick up a fix from rhel-6 and fix an rpm conflict - Don't hold issuer cert handles in crl cache - Resolves: Bug 1034409 - deadlock in trust domain and object lock - Move nss shared db files to the main package - Resolves: Bug 1050163 - Same files in two packages create rpm conflict- Update pem sources to latest from nss-pem upstream - Pick up pem module fixes verified on RHEL and applied upstream - Remove no loger needed pem patches on acccount on this update - Add comments documenting the iquote.patch - Resolves: Bug 1054457 - CVE-2013-1740- Remove spurious man5 wildcard entry as all manpages are listed by name - Resolves: Bug 1050163 - Same files in two packages create rpm conflict- Mass rebuild 2014-01-24- Rebase to nss-3.15.4 - Resolves: Bug 1054457 - CVE-2013-1740 nss: false start PR_Recv information disclosure security issue - Remove no longer needed patches for manpages that were applied upstream - Remove no longer needed patch to disable ocsp stapling tests - Update iquote.patch on account of upstream changes - Update and rename patch to pem/rsawrapr.c on account of upstream changes - Use the pristine upstream sources for nss without repackaging - Avoid unneeded manual step which may introduce errors- Fix the spec file to apply the nss ecc list patch for bug 752980 - Resolves: Bug 752980 - Support ECDSA algorithm in the nss package via puggable ecc- Move several nss-sysinit manpages tar archives to the %files - Resolves: Bug 1050163 - Same files in two packages create rpm conflict- Fix a coverity scan compile time warning for the pem module - Resolves: Bug 1002271 - NSS pem module should not require unique base file names- Resolves: Bug 1002271 - NSS pem module should not require unique base file names- Improve pluggable ECC support for ECDSA - Resolves: Bug 752980 - [7.0 FEAT] Support ECDSA algorithm in the nss package- Mass rebuild 2013-12-27- Revoke trust in one mis-issued anssi certificate - Resolves: Bug 1040284 - nss: Mis-issued ANSSI/DCSSI certificate (MFSA 2013-117) [rhel-7.0]- Update to NSS_3_15_3_RTM - Resolves: Bug 1031463 - CVE-2013-5605 CVE-2013-5606 CVE-2013-1741- Fix path to script and remove -- from some options in nss-sysinit man page - Resolves: rhbz#982723 - man page of nss-sysinit worong path and other flaws- Fix certutil man page options names to be consistent with help - Resolves: rhbz#948495 - man page scan results for nss - Remove incorrect count argument in status description in nss-sysinit man page - Resolves: rhbz#982723 - man page of nss-sysinit incorrect option descriptions- Fix patch for disabling ssl2 in ssl to correctly set error code - Fix syntax error reported in the build.log even tough it succeeds - Add patch top ignore setpolicy result - Resolves: rhbz#1001841 - Disable SSL2 and the export cipher suites - Resolves: rhbz#1026677 - Attempt to run ipa-client-install fails- Fix bash syntax error in patch for disabling ssl2 tests - Resolves: rhbz#1001841 - Disable SSL2 and the export cipher suites- Fix errors in ssl disabling patches for both library and tests - Add s390x to the multilib_arches definition used for alt_ckbi - Resolves: rhbz#1001841 - Disable SSL2 and the export cipher suites- Fix errors in nss-sysinit manpage options descriptions - Resolves: rhbz#982723- Enable fips when system is in fips mode - Resolves: rhbz#852023 - FIPS mode detection does not work- Remove unused and obsoleted patches - Related: rhbz#1012656- Add description of the certutil's --email option to it's manpage - Resolves: rhbz#Bug 948495 - Man page scan results for nss- Rebase to nss-3.15.2 - Resolves: rhbz#1012656 - pick up NSS 3.15.2 to fix CVE-2013-1739 and disable MD5 in OCSP/CRL- Install symlink to nss-sysinit.sh without the .sh suffix - Resolves: rhbz#982723 - nss-sysinit man page has wrong path for the script- Resolves: rhbz#1001841 - Disable SSL2 and the export cipher suites- Add upstream bug URL for a patch subitted upstream and remove obsolete script- Update to NSS_3_15_1_RTM - Apply various fixes to the man pages and add new ones - Enable the iquote.patch to access newly introduced types - Add man page for pkcs11.txt configuration file and cert and key databases - Add missing option descriptions for {cert|cms|crl}util - Resolves: rhbz#948495 - Man page scan results for nss - Resolves: rhbz#982723 - Fix path to script in man page for nss-sysinit- Use the unstripped source tar ball- Install man pages for nss-tools and the nss-config and setup-nsssysinit scripts - Resolves: rhbz#606020 - nss security tools lack man pages- Build nss without softoken or util sources in the tree - Resolves: rhbz#689918- Update ssl-cbc-random-iv-by-default.patch- Fix generation of NSS_VMAJOR, NSS_VMINOR, and NSS_VPATCH for nss-config- Update to NSS_3_15_RTM- Reactivate nss-ssl-cbc-random-iv-off-by-default.patch- Add upstream patch to fix rhbz#872761- Update expired test certificates (fixed in upstream bug 852781)- Fix incorrect post/postun scripts. Fix broken links in posttrans.- Configure libnssckbi.so to use the alternatives system in order to prepare for a drop in replacement.- Update to NSS_3_14_3_RTM - sync up pem rsawrapr.c with softoken upstream changes for nss-3.14.3 - Resolves: rhbz#908257 - CVE-2013-1620 nss: TLS CBC padding timing attack - Resolves: rhbz#896651 - PEM module trashes private keys if login fails - Resolves: rhbz#909775 - specfile support for AArch64 - Resolves: rhbz#910584 - certutil -a does not produce ASCII output- Allow building nss against older system sqlite- Update to NSS_3_14_2_RTM- Update to NSS_3_14_1_WITH_CKBI_1_93_RTM- Require nspr >= 4.9.4 - Fix changelog invalid dates- Update to NSS_3_14_1_RTM- Bug 879978 - Install the nssck.api header template where mod_revocator can access it - Install nssck.api in /usr/includes/nss3/templates- Bug 879978 - Install the nssck.api header template in a place where mod_revocator can access it - Install nssck.api in /usr/includes/nss3- Bug 870864 - Add support in NSS for Secure Boot- Disable bypass code at build time and return failure on attempts to enable at runtime - Bug 806588 - Disable SSL PKCS #11 bypass at build time- Fix pk11wrap locking which fixes 'fedpkg new-sources' and 'fedpkg update' hangs - Bug 872124 - nss-3.14 breaks fedpkg new-sources - Fix should be considered preliminary since the patch may change upon upstream approval- Add a dummy source file for testing /preventing fedpkg breakage - Helps test the fedpkg new-sources and upload commands for breakage by nss updates - Related to Bug 872124 - nss 3.14 breaks fedpkg new-sources- Fix a previous unwanted merge from f18 - Update the SS_SSL_CBC_RANDOM_IV patch to match new sources while - Keeping the patch disabled while we are still in rawhide and - State in comment that patch is needed for both stable and beta branches - Update .gitignore to download only the new sources- Fix the spec file so sechash.h gets installed - Resolves: rhbz#871882 - missing header: sechash.h in nss 3.14- Update the license to MPLv2.0- Use only -f when removing unwanted headers- Add secmodt.h to the headers installed by nss-devel - nss-devel must install secmodt.h which moved from softoken to pk11wrap with nss-3.14- Update to NSS_3_14_RTM- Update to NSS_3_14_RC1 - update nss-589636.patch to apply to httpdserv - turn off ocsp tests for now - remove no longer needed patches - remove headers shipped by nss-util- Update to NSS_3_13_6_RTM- Rebase pem sources to fedora-hosted upstream to pick up two fixes from rhel-6.3 - Resolves: rhbz#847460 - Fix invalid read and free on invalid cert load - Resolves: rhbz#847462 - PEM module may attempt to free uninitialized pointer - Remove unneeded fix gcc 4.7 c++ issue in secmodt.h that actually undoes the upstream fix- Fix pluggable ecc support- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Fix checkin comment to prevent unwanted expansions of percents- Resolves: Bug 830410 - Missing Requires %{?_isa} - Use Requires: %{name}%{?_isa} = %{version}-%{release} on tools - Drop zlib requires which rpmlint reports as error E: explicit-lib-dependency zlib - Enable sha224 portion of powerup selftest when running test suites - Require nspr 4.9.1- Resolves: rhbz#833529 - revert unwanted change to nss.pc.in- Resolves: rhbz#833529 - Remove unwanted space from the Libs: line on nss.pc.in- Update to NSS_3_13_5_RTM- Resolves: Bug 812423 - nss_Init leaks memory, fix from RHEL 6.3- Resolves: Bug 805723 - Library needs partial RELRO support added - Patch coreconf/Linux.mk as done on RHEL 6.2- Update to NSS_3_13_4_RTM - Update the nss-pem source archive to the latest version - Remove no longer needed patches - Resolves: Bug 806043 - use pem files interchangeably in a single process - Resolves: Bug 806051 - PEM various flaws detected by Coverity - Resolves: Bug 806058 - PEM pem_CreateObject leaks memory given a non-existing file name- Resolves: Bug 805723 - Library needs partial RELRO support added- Cleanup of the spec file - Add references to the upstream bugs - Fix typo in Summary for sysinit- Pick up fixes from RHEL - Resolves: rhbz#800674 - Unable to contact LDAP Server during winsync - Resolves: rhbz#800682 - Qpid AMQP daemon fails to load after nss update - Resolves: rhbz#800676 - NSS workaround for freebl bug that causes openswan to drop connections- Update to NSS_3_13_3_RTM- fix issue with gcc 4.7 in secmodt.h and C++11 user-defined literals- Resolves: Bug 784672 - nss should protect against being called before nss_Init- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild- Deactivate a patch currently meant for stable branches only- Resolves: Bug 770682 - nss update breaks pidgin-sipe connectivity - NSS_SSL_CBC_RANDOM_IV set to 0 by default and changed to 1 on user request- Revert to using current nss_softokn_version - Patch to deal with lack of sha224 is no longer needed- Resolves: Bug 754771 - [PEM] an unregistered callback causes a SIGSEGV- Resolves: Bug 750376 - nss 3.13 breaks sssd TLS - Fix how pem is built so that nss-3.13.x works with nss-softokn-3.12.y - Only patch blapitest for the lack of sha224 on system freebl - Completed the patch to make pem link against system freebl- Removed unwanted /usr/include/nss3 in front of the normal cflags include path - Removed unnecessary patch dealing with CERTDB_TERMINAL_RECORD, it's visible- Statically link the pem module against system freebl found in buildroot - Disabling sha224-related powerup selftest until we update softokn - Disable sha224 and pss tests which nss-softokn 3.12.x doesn't support- Rebuild with nss-softokn from 3.12 in the buildroot - Allows the pem module to statically link against 3.12.x freebl - Required for using nss-3.13.x with nss-softokn-3.12.y for a merge inrto rhel git repo - Build will be temprarily placed on buildroot override but not pushed in bodhi- Fix broken dependencies by updating the nss-util and nss-softokn versions- Update to NSS_3_13_1_RTM - Update builtin certs to those from NSSCKBI_1_88_RTM- Update to NSS_3_13_RTM- Update to NSS_3_13_RC0- Fix attempt to free initilized pointer (#717338) - Fix leak on pem_CreateObject when given non-existing file name (#734760) - Fix pem_Initialize to return CKR_CANT_LOCK on multi-treaded calls (#736410)- Update builtins certs to those from NSSCKBI_1_87_RTM- Update to NSS_3_12_11_RTM- Indicate the provenance of stripped source tarball (#688015)- Provide virtual -static package to meet guidelines (#609612).- Enable pluggable ecc support (#712556) - Disable the nssdb write-access-on-read-only-dir tests when user is root (#646045)- make the testsuite non fatal on arm arches- Fix crmf hard-coded maximum size for wrapped private keys (#703656)- Update to NSS_3_12_10_RTM- Update to NSS_3_12_10_BETA1- Implement PEM logging using NSPR's own (#695011)- Update to NSS_3.12.9_WITH_CKBI_1_82_RTM- Short-term fix for ssl test suites hangs on ipv6 type connections (#539183)- Add a missing requires for pkcs11-devel (#675196)- Run the test suites in the check section (#677809)- Fix cms headers to not use c++ reserved words (#676036) - Reenabling Bug 499444 patches - Fix to swap internal key slot on fips mode switches- Revert patches for 499444 until all c++ reserved words are found and extirpated- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Fix cms header to not use c++ reserved word (#676036) - Reenable patches for bug 499444- Revert patches for 499444 as they use a C++ reserved word and cause compilation of Firefox to fail- Fix the earlier infinite recursion patch (#499444) - Remove a header that now nss-softokn-freebl-devel ships- Fix infinite recursion when encoding NSS enveloped/digested data (#499444)- Update the cacert trust patch per upstream review requests (#633043)- Fix to honor the user's cert trust preferences (#633043) - Remove obsoleted patch- Update to 3.12.9- Rebuilt according to fedora pre-release package naming guidelines- Update to NSS_3_12_9_BETA2 - Fix libpnsspem crash when cacert dir contains other directories (#642433)- Update to NSS_3_12_9_BETA1- Update pem source tar with fixes for 614532 and 596674 - Remove no longer needed patches- Update PayPalEE.cert test certificate which had expired- Tell rpm not to verify md5, size, and modtime of configurations file- Fix certificates trust order (#643134) - Apply nss-sysinit-userdb-first.patch last- Move triggerpostun -n nss-sysinit script ahead of the other ones (#639248)- Fix invalid %postun scriptlet (#639248)- Replace posttrans sysinit scriptlet with a triggerpostun one (#636787) - Fix and cleanup the setup-nsssysinit.sh script (#636792, #636801)- Add posttrans scriptlet (#636787)- Update to 3.12.8 - Prevent disabling of nss-sysinit on package upgrade (#636787) - Create pkcs11.txt with correct permissions regardless of umask (#636792) - Setup-nsssysinit.sh reports whether nss-sysinit is turned on or off (#636801) - Added provides pkcs11-devel-static to comply with packaging guidelines (#609612)- NSS 3.12.8 RC0- Fix nss-util_version and nss_softokn_version required to be 3.12.7.99.3- NSS 3.12.8 Beta3 - Fix unclosed comment in renegotiate-transitional.patch- Change BuildRequries to available version of nss-util-devel- Define NSS_USE_SYSTEM_SQLITE and remove unneeded patch - Add comments regarding an unversioned provides which triggers rpmlint warning - Build requires nss-softokn-devel >= 3.12.7- Update to 3.12.7- Apply the patches to fix rhbz#614532- Removed pem sourecs as they are in the cache- Add support for PKCS#8 encoded PEM RSA private key files (#614532)- Fix nsssysinit to return userdb ahead of systemdb (#603313)- Require and BuildRequire >= the listed version not =- Require nss-softoken 3.12.6- Fix SIGSEGV within CreateObject (#596674)- Update pem source tar to pick up the following bug fixes: - PEM - Allow collect objects to search through all objects - PEM - Make CopyObject return a new shallow copy - PEM - Fix memory leak in pem_mdCryptoOperationRSAPriv- Update the test cert in the setup phase- Add sed to sysinit requires as setup-nsssysinit.sh requires it (#576071) - Update PayPalEE test cert with unexpired one (#580207)- Fix ns.spec to not require nss-softokn (#575001)- rebuilt with all tests enabled- Using SSL_RENEGOTIATE_TRANSITIONAL as default while on transition period - Disabling ssl tests suites until bug 539183 is resolved- Update to 3.12.6 - Reactivate all tests - Patch tools to validate command line options arguments- Fix curl related regression and general patch code clean up- retagging- Fix SIGSEGV on call of NSS_Initialize (#553638)- New version of patch to allow root to modify ystem database (#547860)- Temporarily disabling the ssl tests- Fix nsssysinit to allow root to modify the nss system database (#547860)- Fix an error introduced when adapting the patch for rhbz #546211- Remove left over trace statements from nsssysinit patching- Fix a misconstructed patch- Fix nsssysinit to enable apps to use system cert store, patch contributed by David Woodhouse (#546221) - Fix spec so sysinit requires coreutils for post install scriplet (#547067) - Fix segmentation fault when listing keys or certs in the database, patch contributed by Kamil Dudka (#540387)- Fix nsssysinit to set the default flags on the crypto module (#545779) - Remove redundant header from the pem module- Remove unneeded patch- Retagging to include missing patch- Update to 3.12.5 - Patch to allow ssl/tls clients to interoperate with servers that require renogiation- Retagging- Require nss-softoken of same architecture as nss (#527867) - Merge setup-nsssysinit.sh improvements from F-12 (#527051)- User no longer prompted for a password when listing keys an empty system db (#527048) - Fix setup-nsssysinit to handle more general formats (#527051)- Fix syntax error in setup-nsssysinit.sh- Fix sysinit to be under mozilla/security/nss/lib- Add nss-sysinit activation/deactivation script- Install blank databases and configuration file for system shared database - nsssysinit queries system for fips mode before relying on environment variable- Restoring nssutil and -rpath-link to nss-config for now - 522477- Add the nss-sysinit subpackage- Installing shared libraries to %{_libdir}- Retagging to pick up new sources- Update pem enabling source tar with latest fixes (509705, 51209)- PEM module implements memory management for internal objects - 509705 - PEM module doesn't crash when processing malformed key files - 512019- Remove symbolic links to shared libraries from devel - 521155 - No rpath-link in nss-softokn-config- Update to 3.12.4- Fix FORTIFY_SOURCE buffer overflows in test suite on ppc and ppc64 - bug 519766 - Fixed requires and buildrequires as per recommendations in spec file review- Restoring patches 2 and 7 as we still compile all sources - Applying the nss-nolocalsql.patch solves nss-tools sqlite dependency problems- restore require sqlite- Don't require sqlite for nss- Ensure versions in the requires match those used when creating nss.pc- Remove nss-prelink.conf as signed all shared libraries moved to nss-softokn - Add a temprary hack to nss.pc.in to unblock builds- caolan's nss.pc patch- Bump the release number for a chained build of nss-util, nss-softokn and nss- Fix nss-config not to include nssutil - Add BuildRequires on nss-softokn and nss-util since build also runs the test suite- disabling all tests while we investigate a buffer overflow bug- disabling some tests while we investigate a buffer overflow bug - 519766- remove patches that are now in nss-softokn and - remove spurious exec-permissions for nss.pc per rpmlint - single requires line in nss.pc.in- Fix BuildRequires: nss-softokn-devel release number- fix nss.pc.in to have one single requires line- cleanups for softokn- remove the softokn subpackages- don install the nss-util pkgconfig bits- remove from -devel the 3 headers that ship in nss-util-devel- kill off the nss-util nss-util-devel subpackages- split off nss-softokn and nss-util as subpackages with their own rpms - first phase of splitting nss-softokn and nss-util as their own packages- must install libnssutil3.since nss-util is untagged at the moment - preserve time stamps when installing various files- dont install libnssutil3.so since its now in nss-util- Fix spec file problems uncovered by Fedora_12_Mass_Rebuild- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- removed two patch files which are no longer needed and fixed previous change log number- updated pem module incorporates various patches - fix off-by-one error when computing size to reduce memory leak. (483855) - fix data type to work on x86_64 systems. (429175) - fix various memory leaks and free internal objects on module unload. (501080) - fix to not clone internal objects in collect_objects(). (501118) - fix to not bypass initialization if module arguments are omitted. (501058) - fix numerous gcc warnings. (500815) - fix to support arbitrarily long password while loading a private key. (500180) - fix memory leak in make_key and memory leaks and return values in pem_mdSession_Login (501191)- add patch for bug 502133 upstream bug 496997- rebuild with higher release number for upgrade sanity- updated to NSS_3_12_4_FIPS1_WITH_CKBI_1_75- re-enable test suite - add patch for upstream bug 488646 and add newer paypal certs in order to make the test suite pass- add conflicts info in order to fix bug 499436- ship .chk files instead of running shlibsign at install time - include .chk file in softokn-freebl subpackage - add patch for upstream nss bug 488350- Update to NSS 3.12.3- temporarily disable the test suite because of bug 494266- fix softokn-freebl dependency for multilib (bug 494122)- introduce separate nss-softokn-freebl package- disable execstack when building freebl- add upstream patch to fix bug 483855- build nspr-less freebl library- Update to NSS_3_12_3_BETA4- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- update to NSS_3_12_2_RC1 - use system zlib- add sparc64 to the list of 64 bit arches- bug 456847, move pkgconfig requirement to devel package- Update to NSS_3_12_1_RC2- NSS 3.12.1 RC1- fix bug bug 429175 in libpem module- bug 456847, add Requires: pkgconfig- nss package should own /etc/prelink.conf.d folder, rhbz#452062 - use upstream patch to fix test suite abort- Update to NSS_3_12_RC4- Update to NSS_3_12_RC2- Zapping old Obsoletes/Provides. No longer needed, causes multilib headache.- Update to NSS_3_12_BETA3- NSS 3.12 Beta 2 - Use /usr/lib{64} as devel libdir, create symbolic links.- Apply upstream patch for bug 417664, enable test suite on pcc.- Support concurrent runs of the test suite on a single build host.- disable test suite on ppc- disable test suite on ppc64- Build against gcc 4.3.0, use workaround for bug 432146 - Run the test suite after the build and abort on failures.* NSS 3.12 Beta 1- move .so files to /lib- NSS 3.12 alpha 2b- upstream patches to avoid calling netstat for random data- NSS 3.12 alpha 2- Add /etc/prelink.conf.d/nss-prelink.conf in order to blacklist our signed libraries and protect them from modification.- Fix off-by-one error in the PEM module- fix a C++ mode compilation error- Add 3.12 ckfw and libnsspem- Updated license tag- Ensure the workaround for mozilla bug 51429 really get's built.- Better approach to ship freebl/softokn based on 3.11.5 - Remove link time dependency on softokn- Fix unowned directories, rhbz#233890- Update to 3.11.7, but freebl/softokn remain at 3.11.5. - Use a workaround to avoid mozilla bug 51429.- Fix rhbz#230545, failure to enable FIPS mode - Fix rhbz#220542, make NSS more tolerant of resets when in the middle of prompting for a user password.- Update to 3.11.5 - This update fixes two security vulnerabilities with SSL 2 - Do not use -rpath link option - Added several unsupported tools to tools package- disable ECC, cleanout dead code- Update to 3.11.4- Revert the attempt to require latest NSPR, as it is not yet available in the build infrastructure.- Update to 3.11.3- Add /etc/pki/nssdb- rebuild- Update to 3.11.2 - Enable executable bit on shared libs, also fixes debug info.- Enable Elliptic Curve Cryptography (ECC)- Update to 3.11.1 - Include upstream patch to limit curves- add --noexecstack when compiling assembler on x86_64- bump again for double-long bug on ppc(64)- rebuilt for new gcc4.1 snapshot and glibc changes- rebuild- Update file list for the devel packages- Update to 3.11- Add patch to allow building on ppc* - Update the pkgconfig file to Require nspr- Initial import into Fedora Core, based on a CVS snapshot of the NSS_3_11_RTM tag - Fix up the pkcs11-devel subpackage to contain the proper headers - Build with RPM_OPT_FLAGS - No need to have rpath of /usr/lib in the pc file- Adressed review comments by Wan-Teh Chang, Bob Relyea, Christopher Aillon.- Initial build/bin/sh/bin/sh 3.28.4-12.el7_43.28.4-12.el7_43.28.4-12.el7_4nss-legacynss-rhel7.confignssdbcert8.dbcert9.dbkey3.dbkey4.dbpkcs11.txtsecmod.dblibnss3.solibnssckbi.solibsmime3.solibssl3.solibnssckbi.socert8.db.5.gzcert9.db.5.gzkey3.db.5.gzkey4.db.5.gzpkcs11.txt.5.gzsecmod.db.5.gz/etc/pki//etc/pki/nss-legacy//etc/pki/nssdb//usr/lib//usr/lib/nss//usr/share/man/man5/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnu directoryASCII textBerkeley DB 1.85 (Hash, version 2, native byte-order)ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=d20fbd9f4e72d754f146a28d8abe895cf688acde, strippedemptyELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=82cbacdbd770cd97977a3e419ce2de287c03a023, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=b4193e168598a68cc723d7c8f1966b7a3a87b76f, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=c55ca2599e41acdfbcbe83be40bfdb791ce815fa, strippedtroff or preprocessor input, ASCII text (gzip compressed data, from Unix, max compression)CoC,= PPP"P#P%P&P'P(P)P*P+P,P-PPPPPPPP P P P PPPPP PPPPPPPPPPPPP P!P$PR R RR RRR&R+R%R'R*R,R(R$R#R-R.R R/R RR:P8P9P:P;PP?P@PAPBP1P3P2P4P5P6P7P0RR RR$RRR RRRR!R"RRRRRR#R-R.R R/R RR:PMPNPWPXPDPEPGPFPHPIPJPKPLPOPPPQPRPSPTPUPVPCR0R&R%R,R)R$RR RR RRRRRRRRR!RRR"RRRRRRRRR#R-R.R R/R RR1R:P/P.RR RR-R.R R/R RR:?@7zXZ !#,;X]"k%YÍv46nj Pfͭlĩ!"}#^B%$ZD\x{* yc8PgP~l(!m "*La_, nyE\L Z{7lva=Tp߰J.:y+ lx{@^Kh4ċx B(o8-1]D\̋+_ hfL)mP`:ʥ!#CB,EoPYK8F!9ŕ́liI.FFd`A@%3> ՞XI~9*HR]]S{][Yl> 0͓ 3BQw5Wcomg=3pK*#@ڿcڤs~Cv!G]p_f ";M.>7_'8oSHiCR`юQNB5C14F\Q]|Nz!I9WTe9i=doE5nײzq&6vVD~-rK3yp o'*9 N˞:E rC=V FT>hrri^msӒ`+'[N)~;j$Dr8X0wdlߐ_[tm!)rDivʉ-Fyńg<^wldK]nU <1fFgJ0o2hzxAIzDe11pv#] (fE  *6<:(i6r@ "/XK%rf-fA|$;UD00M! h--DžVcv&U tx*x`i<ە-_DXu dQ. X ync%Bt!I I54V`);H_3^d#э5<R?7}S,vt,^3=SqM/ɓ(\ !W`oPG:ݩyr=ra`asr%}N (cTd|KV|?cnhFYNLaӤ!<) sH27g)L< AҪ=D^ &"-@KJ( 7;ݤ&k@U&s)ٝ/y)u !.)а$ZF dNh&ب4 AR;D刣z+S|9ؖIppVV ۿ@% 0CչR}>˥FB#y% h!zϊtJQE}ZD-z0OMPYU huAw'4awb.kF=P%5FȁX|QGaEwBCEp-P^n` $M ]6bs.vbvq܀!f H01&)c0s; |íy-gcpyޖ3VeJڤat[QTo$ZhkHQ/mTG\WN_C1 -X72BmX׻Z>QiNSPa#fNw Ɖ|bxH0R6Lw.#-G,x~F+qZt{w Kt8#> z\pҟfZIa w39JE[ /h t(L+Yqf?W7,;葉 jS4\V'Q 6oyقibn" ޮ=d\h#?F'$kzٳ7_DVj(Ż"2 0]vc9{e4`S^^nܡK \Ea o9x=.7áT!JT Zav޺vXnjsT]ؤܤkV]b&03=]я~.;uGo_ii_A -_=u)IBcU~ftBpH9^u#D<29`#VOrqʚk J+h{p&k&bM-Yc,mD 0 °:7@cڗx/2I!AāSO߸vooH, /z*֘g]7s63|*:L DF(R`bٕ b'[,(zX+|}&hPgC:jZ|L.ACb(j v{*M;f>PR]!v,X @D9;T*i*;L%Å V9U_ޯ$.3̾i"r@2PBtSA̫aBRS2+xz"c zXZ7 NXFz>n#}T׆WW&)&xAAǬZ"6]=EQ1B.@myTFMmD&eLEަ'Zg%!d 㰂ܺMF9"zC͈0A~m[mA9HHvSvp௖BtzZ$De3J@>KP?%sQ׆'nP{r1Եxam&l>[-'j‚q ~:>M+`mCfF]Dt9L!̖#[N0mN>aK#ղnNjcqZ[#?:5h痖ÓYoQ##EY#23ޯgO=I 0WŚy$c_㺃clȍ Jj:dŚ@~'CMwoҦЇp(qÒsW'M# <)-M̬]m"ruc| \d@m[??`sN! _[uLѕ_(i,QqK7"TFc>L@KOvR/ZK!ܹά Fg)lu7N%aMA4Rq2[2(_Eh9^ du&Ckg+8X-6 ɇMܚ[=,8m<]f4^t z%r\WJ ZES\/:}V2h74pKBG9ܪBUR< *(ו Ydd&w W::t5|>ԗA7 _?$g-o4A ocyg)!SUr&p~PQEw6WX_+i  yמ!0|=>s_ ch\?7Ũ16Yh\Q0'aSt#$î-4C 2@đηSd Q X-V9[P[Akۉ*+L=khg,Yt.G 5WR%)$›Kz2stYW㈩4WF 'CpDϝ{ftxnL {/;Ѯ *bTqa6φIdtsi6?@3Rc+S9似;# 3˹PQ15xmZ{5kI/װouC`N`FS@!)iH!V(K匿eӈ|?vb2gnK=N0FC RJrl F(4ܹGƄČ/FB;nuhC"rO>\EJ;M'"A.ݕ&!ڛSF YMLOӵwMҋvq| D5yc&<;HfLǢX2Åz!.&K[ ۫. x BuޕP+uڮ[=NS1 3qGڂ2$s%SDN};k{'fk%&Cԏ neL"_1C &8wQ0RU Ξa/+L蜊(Yv:t4u Qmzfv2?OB䫌q4ɢ~Uw;0d ,|0p09!Q-B/mKEE>1;I.Ք`y(!.~\m(d&`dզfsz1:*c(JK?Na%ӓʕ`l2vL rym@[;߹o¼RgoΊݘj*R_Tp}!xJSJĉYA1WR=MrrI}Kmj1hnETOPô9藹m5} t$EeA15_qmP)$uZ_'`W)C߃╪G|r(.VD;&HcEH-,fǏR T("⑾^!=H&YȽn1q(SC[ORaPk>|tsԲbc- 64_rەQGO ?kYe9-SQ# -xpO2Ƥ@zmBk@S=h\WYD(d6HnO8)EvY #!iY{|_Dޙo/!nUN'ף7Tυ]\ /S}xFIVN2b\ &D)9]YY٫ى%(yvP,T-)^ZNީM^s1.i<ˆZutsE,ӚϚ2'-ໃїtg1=n>wC͆ZTFٺ VA;/ aV"Omh\ `vIE#i֤Էg鿻l?[DD߮ }u$14$z0dsFE.IrbpG+ւTÐLnjAQڡ brz9$|R9RVPUT{Voc-8 %BBaѬ]0Gbhh߂w}"*6=l;ɜ`'S2qo$\N=sOZ3MΊ "-ՇnWRa1\ڞމEc ̞G:4YjqA_<"/N梄qe^/&S {yi2^[ bPoyN^~A &2V=ϱk*d=-޼ h4DQ P| InWҹ cYc}M'?i`JjL鞀_<2>Lݸ,2~q*M|Ât<el=%p&% cW E }4bKQ/BIvfθ`fWD&b ,8fћjjHn`a#j mY?l>|К'C Cam_ŋ|(WQ٢UBE6 ᰩ9wx80ϝ@ryPqVDV\Xd6zjЭǴ}I?͈6R+ޭ}>.A͐@6x[؅V-@Q̒&2@TڙF6 #Z㪱x,$\ rhk3Бك_Ex Oh-4\LcCNia?^{nOeG5S-8ɥTX4컟 -ƱWɻNk8@i1E .&^ wY;8[DŽK i7+ =|HMpi18a7Se,ocRqt(moX;5Qp81N9Iar=Ojz!bbirH^lB8#UD@X3.v筝-O$o (ruC,Q;!^ΎwuMq]{_'F܃~*FrZ4!7 ?_"Z\ߏ^*&ϡl$a%D>J1VW3eRA9f(`0w#$檮]ZR]g!-, ;rQbkEl w84@FXHƱq)Ȏf^{`BLd:'gCpQOVu߈A5QO,Gn]CfLy9|w06ח(}Ż5t㷽ߕqPcHÎ=,Ո+8Υr謆-5'NčDX: 9bNzZe+ 8CsG69nEt ِT¢iG[+;-*qωn`'0F q0;M8J~V8*6~dRP3!S<.b!(dV|P \ # cW6ob:V *XA=@+]ߪlEoP䧢?7/(U\l`>"y`| ]sb PnkFyqy4D/l+'+oη|Dz 9 ~9K=Dv9] ņzVV|MlGypd[r0$ɞϻ@ 3:-.OPzDNtՄyZi-Q2u6ΉC`p [{!++2Cѥ#h(é̸S)k+%7a姞WТ+1?Mi[A* = z|`2iȓE S>J9 0ՙŸb{Aslc\~l|xd`teϋhNVp`7{5 eVٴA-5ŨaQĦ8^#Dhv"P5"{aɶ*Vùkw|Xh+7VX/yrw8$&1׭EлȒ\ &B?J}LD/eƃBa:HސԝYCwZFzF_Hs8WE6"`!Ʉ=r,.hkM\%l$;KQ'fwISbV˳Z\\+=VA-l'`d̸KMD͙RIj-p_˛-hZ ##E**m{gRJxyp ѻ%{2sȰ5e?ϥ_HoW1e`СJOSr̿r:ɨ]y`^۪8HayӐxU}= sr8T 3.!KsDis48򰴫u֎_-%S7 Dvv9Ãe5~K`D0NGX\֙¶͌k'갡+fn df8F HU@J ]zCp*OKOS!Zm.ђ93_>gon"է"̩_H'6wZ ao?k +s5.OL  tNnЬP+npD٧ $$_Y\%^悽J%&\ڭ;q^xDײCܚƸBT%l}8=q7SZ CaHhM0E`kO͍Bc͇U#b~O-VL 2|{lonLGbCWo_>c`7:)VL*npȫ"FԞ'Tc3-y$&|izf)GoY%h:Vҙ󽯦}͟#2n0c}\{ŢȂ)N+mcXp$n ͉.:!M:$j}'I/IKFl蜾I*$ѸoyLI$ڂDƥ1wuKg]}z#Tu wM=8-90t B='ۗw^IK:EF~VNd l. ĦM@Hڄs6]|iEPY\GpC^"s y$҂h2K[FEn5i.xm)E3z4<@C7=&Ksx"hfϒ5 Qzt=QH 1r1Y#X;#?z("\1!]dB_kQ?RZ.l5H3>Le <-Nㆥ yX$=3cVglLaq+t#z: \dQd_bkp4b~ FOJ%'Ol3 \k~duybP/~,Ƕ\PY$Cp*NƌʛIbV>"kZ%gmB%|XxA'1mL$aWhn_jakYKKz_%W&$8c>9hVe:!bϛli{ CbI$ $wC@߄绁peE Ҙ"3b?ˆ嗳O5$#eYH0 Nl)rr0SE#[YŭŮE'tM,AƗM]i/nģj^Zyu$pbbU+mT/NBG\#ΨJ KݣΘjI>Q8/[\Kt|Fc&ج9p.^_=OO?"#.q.YįׅYQ|&ހ=fm*DBw2.? dqx(7'1ȄF6XM(QƮS H-l򒈞F?%z<`ݗUHך=XJkX֠Vs=%r'ZH6V{_!ǔY\* B>EHn Krs2s{F<q?^R|NڲQ`PZ n66FTJ}!"3T( |' : X1uKR#h6E3u6;|QqHṉH{ @ޥ #}X !)a ,Ϸ:Q3 f [ @ n|Bp( yRF>w[sqhy1=W2@Mn䑒r S˘{;4 +Tz逤R.:>D4ART7hR'|&To&H4ˣ0qjޞXXJԢ}<{Y ZYpV (wct򼖏i}K_-aH'q2.2猏x?':(=Jl|MQyy5`#5+E͞{eW2ZZ+E9^q5[*RgcՌ_'UTdGa *(OKؗ]\yruFeA9e)P{.mxrjQVYzA4Cˍxȯ]X>:qC<դx^#"nPںdw8.jGYV30ҰD Ļ :!#J m-$!w|蟣$E\o*>24L4d.2 K¡stFO:}֔8 ڑV]!{~2}j )iI 8ˌx&GGTHy;y0goCNy ~[*g@7K]yF`m(̂ꤹ'r|sEv=Qk!6X1s_s ắMhc $ii#5z}k|q)݊>oϟ8R1uǶt1X.Ru_C! OfHYuo<~;͸auc7iq@=퐦hQ_w(b^z^Dr+DG ZZ\HalWnJ=ZK稏TYqȗT M_XpCF;QFOm# o_DZt ) +-Ꙣg~A3)a`~O}i|Dtw,,x[H_|vA9ġyQ}7pŞn8?6DM`wۊ(3u!FU{.U=WShl/r.tI 7ȀY(cC׷T5?ZiokO~p5tėsd^S4z >D:\RՏkGKЈ z~K|u;\oUթWz}(rʼnGj0c6d"zG5}jzl!ŝaHi},3@VQU2xGRp e'(,)#[٫4yg$@#Dj!J~!c W0# nc$ $h@ß?`0"(oدsN◒TpFKC(E2L3krES?1Q]dz7I;yCjX;;%P(AHb _M42Svh?T@k[mtk18[KqdZix[ֽ㾂LWYaW+g < ׆zue >WS),"z|^;!m1NQ1&uڿqGа%`c,5-M%OT^خw L&ɑBA#Y!pFQPսq;&t%; FђG$GJDCySȎŊ#fh=WK'HhkMGjk^8Myu b+*hրp:4kN06'KHkfY{6egἡ-Z樟*bM;~k|0F7_tg*ňa C3 }XR)t!9qBۍ*#_z]?1CA jb%yZʴG0en|3/aJ+ߝ3}l =6iEt*|&﵂%J~Ǝ&=!KG%xtZR]Ցs{e0B@k.p$ fF4Θ,_"NtM #@rYh';:jԈ I1ӡ2ּ%LQ]#W%Q? s R0GlfSoPuL_?A0JM+D9+Dw8HsW1w- ò 2\hP{H6/ۊR9Dȅ 1!ܾ"7<{2w~ēH} 2d~;?h,5?UH]b8!=㔔 s泜8z6oz6mVFޒS,ˢ܍3Y-L7nF>8Fp>X6yA&hm֢/;̤| 1`>T ׼HLHf4;c vl>“eD}l: y.s1XX>}d*PnkbGPFχ2=[aR #̏al-!j;=is7ɴ,!~67ܙTh2]7(+`+JxhԤoH:ASȂ1u(Mljɒ)&w̸'-b>^x$Sd^ضC'/C^mw["t#Ҽx;M ↋ 0[!o4d Rlb(Ņ?NOi%"y}FuaqBѼVtRGoY׾ޮ˿wzee E5X>} _CC ݴNƶ'Ck%7wj&Jznsl u< AzPkIJZ̈́vE4+p>سut%=QhrYi(ACkkj$&$fKT8ݝJ2~dTGΪ]Lʣtw~6E27ikmеzxub%|,d2ǡ'Ehx3ܯV* $ 2>i^w,swu))úZt4E*ͽX$m!~{+W:(ؽ<{r·*o&puP I.{b<$=~QXE4\UY+$ W c  =cZPThL cs?z z˞ةX&!zuBbN;9 UeW89lޡvQ6r;:U "y9WP{3]ni&@ ӺUKmzNk3x3NpD,OxϛK8%4{% +<-jy=k"(QzHCr,g:LcF%ݛmpQC]l2H8 1.ei4IU<Hp@"7)  [/v9R^HKaVcqwJ:wITO +|20,yFR“@mIuX|K6(0>&l#YzAIĴ"n0e^3\ Y/{D4 @lvFBC%&P;;(aٯ,{&C͝jbh.c!{f0/vЅqK1/֗[n5k-*v5O"aE "&JmgB9A\Ƒz|75{ 8@ҾgpR/F=ɚ2|/~}mƚwUE/Q隣b Y&a;" 4 Z4[<D5m"ZP$>uDqei_x>`_4YQ}\'V,  p.5SK0_GA=G!0z^z&س۪cz1XAl\_@z QO;[N.ŗ"b&4ɿ098#36 hF}1- *G\hkR}tpJ]Ư|J.{SJҥ0'LVMjjGTD6]Q\wi#:$[/ ~T4•eqN9qq1[Zί=~v8Qox2j Sxr^P WY" q/ܖf'4u!ԥ1N+oGk~tDY9t9vle\ey9pq`qV:S:&1)8ٲF_GT,~.}ςnG;څqc`' ty9|)ppV==X=v4eW * 3[pcXAN!sJK `fߝ.WX4",4s?Ԇ5zvMod|e࢟w`JWmd-0s;<@.<ގQmcL`iL#iQnWGP |uyMI5s{fb=}z.w;'5;wr_TmiM$d//̾6 6vH<gQt^[F:D5Jch|Hmuo҈ROOd9:*2|o^ZT;d,Cɿ9۴54^b~W=^n[+#,=꽽s?mCN"]h@EFaEYHuN$TS+$4x0x-3 Đ!e%Ě[qMi#es{SjԸi[FuD\M#?(?FY0U2XZNCԳ^ku!fuaw쓑ݜӖoWC\YUXDv@x`9&@1f?,^0fKHXN1B۪oX}~\1{n'؆l/n~!,,7p$R+% `Zڪ1zR>~G]IIOvS>n !N<uGzlZ7!N+l SB)(ɒuOa5﫦 Fٯ:Q#q^a6 =3L 2 UK[ĻS9"nyywQ;!g7AsRhBrƢT.`ÿ#2Iz†xݰd21 .M d4t&B]]SMgǞߛע!WIYrcgWt{]l`4ScZ=3sh$U`] B櫫Eo~JَIaձ!_ұ bFd4V JAbqxI{ .'Hz"%;`(h;8!Spoi}k5"zսKsEn.zss'Z5^tFM1`k{QDRZʰ[!e6X#w|_(ssF@+^jE{Bң^DY5LȽxEdޓ1n2&S5Zl: 4ü=Frev@%lP%q'GZy]ZO"!-*/kǩtG^:4Wk`s4|w1Ѧ/0Н2]}ylht.| ZR<%-`/ /ƸMU"̙hE?\pKg% =*|^852ݽ56.r4 6'^cXD~GG~ M2{dnjm6,OwS%Kp+q<0Z9T-'dN$_f'U} .\ v7(g'3Sx:ue$@C7',eoC'fDwb" Syj1Y}0N6"W,ݛ(\h ؋{YF2^[P^P2nYdR;9433uvb=v.=׭'˥y~R0Eאг;%s.ub 3dO:6VVcZhaNO Me"D1^jchp*tn%<0!}|SYIq) 7O)IShNqÞkVH! ZdL}r4ok <+&e\!Tᚕx ?u -ie:  ZC^bSascHGx[d*_!f4+G-7:n*>i0w[5m&0V,eb O}Q(C-N:j+ҰӼֿV`p%(g+G >YX?O½E/-bP8k K `!zys*ܱ0<Dru-EhH"t/fw-%h욁Ȋޓz踥*D1e:,zPvnPW]F#ez`f{bgZ(ܝ6}\\ ?=njZݪéF[n !1z"+T[ sϪ<*NSgޟ2cZ6U7#H͊?-8~Uj\ZCRb)JY]lN,vrHf(xYSZwS E׃+ n+G-;cƗ&ak惛A?K*%w5Q+7)oz:N'7slNV.R͇k-Гs3*r c!ZHY'ġ"H=hY@i\HaVjr\}=58O )rtUꍵ"߻daky`!EÏH];)w%l'gy!@Y}2p4~t@9B@Q؟|fhPb6O|a.G( vB3vS$I葫08hl*SsPhTl"V\w΂1Lt/e*QZ7F9!7ѿ玸. pdxXE( J|J2%3y![b0X/,+8eeP= M Q'Z)lN&(%`&@96>"sƗ\ Ŋn{@C-8P4a3E7uDw!ZL$$vi@=ʭËNH mIVk5jeQ ;|\tND.kMR翰Y׾鄧&} |8bVR jUOTpFG&V_m یVq;S)NAŸ$Prk{\!7L~q~ٜ""½*.ckzs,,TsՀc :1TlQdRͅ#xIfV=7%Y|?ˢ.6aX"s) ze,EdEJĢǎ'fCԹsˡD(Sqp wrƛ|W^;dWIrcxhqo5~s,gӮn]7s%uREu t.e li 5\`J{ũ@t!qM]`=&|㝺6O{2ϥA/wPѩLT/ҿ]e+0W72ȝʲQ86ۡSPߠgN"̷XE;tgc&^OOWT=eӼA Tvzzd^EҴޠELHb֎ n]| o;dr٢|_TUO;^OO()"B%v>;P! wd۴GA >/n\>9ipd gՇ`,„zhI׷}?u}MҷIC>n=Y1)/!Ra9