nss-3.28.4-4.el6_9$>^,ޖ\2>??d   /hl k @  X  p     ,   8  h     ,[>>> (8( 9 :Q >@G$ HT I X[Y[\ ] ^=bd"e'f*l,tD ut v¤wP xÀ yðCnss3.28.44.el6_9Network Security ServicesNetwork Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.YCc1bl.rdu2.centos.org&CentOSMPLv2.0CentOS BuildSystem System Environment/Librarieshttp://www.mozilla.org/projects/security/pki/nss/linuxi686# If we upgrade, and the shared filename is a regular file, then we must # remove it, before we can install the alternatives symbolic link. if [ $1 -gt 1 ] ; then # when upgrading or downgrading if ! test -L /usr/lib/libnssckbi.so; then rm -f /usr/lib/libnssckbi.so fi fi # Install the symbolic link # FYI: Certain other packages use alternatives --set to enforce that the first # installed package is preferred. We don't do that. Highest priority wins. /usr/sbin/update-alternatives --install /usr/lib/libnssckbi.so \ libnssckbi.so /usr/lib/nss/libnssckbi.so 10 /sbin/ldconfigif [ $1 -eq 0 ] ; then # package removal /usr/sbin/update-alternatives --remove libnssckbi.so /usr/lib/nss/libnssckbi.so else # upgrade or downgrade # If the new installed package uses a regular file (not a symblic link), # then cleanup the alternatives link. if ! test -L /usr/lib/libnssckbi.so; then /usr/sbin/update-alternatives --remove libnssckbi.so /usr/lib/nss/libnssckbi.so fi fi /sbin/ldconfig@@wA큤A큤큤Y4!YQY4 KLKLKLfY4)Y4 Y4(Y4)Y4)Y4(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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnss-3.28.4-4.el6_9.src.rpmconfig(nss)libnss3.solibnss3.so(NSS_3.10)libnss3.so(NSS_3.10.2)libnss3.so(NSS_3.11)libnss3.so(NSS_3.11.1)libnss3.so(NSS_3.11.2)libnss3.so(NSS_3.11.7)libnss3.so(NSS_3.11.9)libnss3.so(NSS_3.12)libnss3.so(NSS_3.12.1)libnss3.so(NSS_3.12.10)libnss3.so(NSS_3.12.3)libnss3.so(NSS_3.12.4)libnss3.so(NSS_3.12.5)libnss3.so(NSS_3.12.6)libnss3.so(NSS_3.12.7)libnss3.so(NSS_3.12.9)libnss3.so(NSS_3.13)libnss3.so(NSS_3.13.2)libnss3.so(NSS_3.14)libnss3.so(NSS_3.14.1)libnss3.so(NSS_3.14.3)libnss3.so(NSS_3.15)libnss3.so(NSS_3.15.4)libnss3.so(NSS_3.16.1)libnss3.so(NSS_3.16.2)libnss3.so(NSS_3.18)libnss3.so(NSS_3.19)libnss3.so(NSS_3.19.1)libnss3.so(NSS_3.2)libnss3.so(NSS_3.2.1)libnss3.so(NSS_3.21)libnss3.so(NSS_3.22)libnss3.so(NSS_3.3)libnss3.so(NSS_3.3.1)libnss3.so(NSS_3.4)libnss3.so(NSS_3.5)libnss3.so(NSS_3.6)libnss3.so(NSS_3.7)libnss3.so(NSS_3.7.1)libnss3.so(NSS_3.8)libnss3.so(NSS_3.9)libnss3.so(NSS_3.9.2)libnss3.so(NSS_3.9.3)libnssckbi.solibnssckbi.so(NSS_3.1)libnsspem.solibnsspem.so(NSS_3.1)libsmime3.solibsmime3.so(NSS_3.10)libsmime3.so(NSS_3.12.10)libsmime3.so(NSS_3.12.2)libsmime3.so(NSS_3.13)libsmime3.so(NSS_3.15)libsmime3.so(NSS_3.16)libsmime3.so(NSS_3.18)libsmime3.so(NSS_3.2)libsmime3.so(NSS_3.2.1)libsmime3.so(NSS_3.3)libsmime3.so(NSS_3.4)libsmime3.so(NSS_3.4.1)libsmime3.so(NSS_3.6)libsmime3.so(NSS_3.7)libsmime3.so(NSS_3.7.2)libsmime3.so(NSS_3.8)libsmime3.so(NSS_3.9)libsmime3.so(NSS_3.9.3)libssl3.solibssl3.so(NSS_3.11.4)libssl3.so(NSS_3.11.8)libssl3.so(NSS_3.12.10)libssl3.so(NSS_3.12.6)libssl3.so(NSS_3.13)libssl3.so(NSS_3.13.2)libssl3.so(NSS_3.14)libssl3.so(NSS_3.15)libssl3.so(NSS_3.15.4)libssl3.so(NSS_3.2)libssl3.so(NSS_3.2.1)libssl3.so(NSS_3.20)libssl3.so(NSS_3.21)libssl3.so(NSS_3.22)libssl3.so(NSS_3.23)libssl3.so(NSS_3.24)libssl3.so(NSS_3.27)libssl3.so(NSS_3.28)libssl3.so(NSS_3.4)libssl3.so(NSS_3.7.4)nssnss(x86-32)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    @ /bin/sh/bin/sh/usr/sbin/update-alternatives/usr/sbin/update-alternativesconfig(nss)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdl.so.2libfreebl3.solibnspr4.solibnss3.solibnss3.so(NSS_3.10)libnss3.so(NSS_3.11)libnss3.so(NSS_3.11.1)libnss3.so(NSS_3.11.2)libnss3.so(NSS_3.12)libnss3.so(NSS_3.12.6)libnss3.so(NSS_3.14)libnss3.so(NSS_3.14.3)libnss3.so(NSS_3.15)libnss3.so(NSS_3.19.1)libnss3.so(NSS_3.2)libnss3.so(NSS_3.21)libnss3.so(NSS_3.22)libnss3.so(NSS_3.3)libnss3.so(NSS_3.3.1)libnss3.so(NSS_3.4)libnss3.so(NSS_3.6)libnss3.so(NSS_3.7)libnss3.so(NSS_3.8)libnss3.so(NSS_3.9)libnssdbm3.solibnssutil3.solibnssutil3.so(NSSUTIL_3.12)libnssutil3.so(NSSUTIL_3.12.3)libnssutil3.so(NSSUTIL_3.12.5)libnssutil3.so(NSSUTIL_3.13)libnssutil3.so(NSSUTIL_3.14)libnssutil3.so(NSSUTIL_3.15)libnssutil3.so(NSSUTIL_3.17.1)libnssutil3.so(NSSUTIL_3.21)libnssutil3.so(NSSUTIL_3.24)libplc4.solibplds4.solibpthread.so.0libpthread.so.0(GLIBC_2.0)libsoftokn3.solibz.so.1nsprnss-softokn(x86-32)nss-system-initnss-utilrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rtld(GNU_HASH)rpmlib(PayloadIsXz)3.28.4-4.el6_94.13.03.14.3-223.28.33.0.4-14.6.0-14.0-15.2-1curl7.19.7-26.el64.8.0YaY@Y i@X@X @X,Xf@Xs{@XOXF@XAb@X,J@X%X#X!@X@X2@X@W%W@V3V@VJVV͛@V@Vk@VVy;@VMVLh@V'~@U@U|@UzUrU@U2G@U+U) U'@U"u@U@TuTd@T"@SS@S@S׌SSQ@S@S-S@S@S@S!@SSU@SFS2@S2@Rb@R߲RƦ@RR$RR;R].@R].@RR@RQPRNREs@R@-@R:@R:@R9R2@R2@R+@R)R)R R@RR@Q@Q@Qzl@QR@QQQNP@P[PqPM@PM@Pd@P@P@PPx@Px@PvO@O O@Ọ@O Oc+@O`@O_6O_6OTOLOLOLOB5O&@O#@O@NU@NNGNN@N@NNw.N`@N`@N`@N^"@N\NGNENNN*N*M@M@MUMMlMfH@M] M:M4/@LL@LwLvW@LvW@LvW@LvW@L @K[KKKO@KK]KUKRKRKMKMKLd@KD{@KD{@KD{@K4@K,@K*@K@KJ@J1@JSJSJ@Jv@J@JG@JG@JJJ@JRJ J@JiJiJ@J@JJJu@Ju@Ju@Ju@Ju@J#J#J@J@JJJJ/@J:J:JzJjJ?r@J?r@J,@J)J)J@J{IzIzIIIԨIԨIIII2HHH+H@H@HoH@H`HCHG@GQG]@G@G@G~G-@G-@G-@G}G@G_@GSG1G FFFޚ@F@F@FvsFkF` @EE(EEl$E D@E D@D@D@D@D@DvCC@CC@C@CZCZCZCZBϼ@Daiki Ueno - 3.28.4-4Daiki Ueno - 3.28.4-3Kai Engert - 3.28.4-2Daiki Ueno - 3.28.4-1Daiki Ueno - 3.28.3-3Daiki Ueno - 3.28.3-2Daiki Ueno - 3.28.3-1Daiki Ueno - 3.27.1-13Daiki Ueno - 3.27.1-12Daiki Ueno - 3.27.1-11Daiki Ueno - 3.27.1-10Daiki Ueno - 3.27.1-9Daiki Ueno - 3.27.1-8Daiki Ueno - 3.27.1-7Kai Engert - 3.27.1-6Kai Engert - 3.27.1-5Kai Engert - 3.27.1-4Kai Engert - 3.27.1-3Daiki Ueno - 3.27.1-2Daiki Ueno - 3.27.1-1Kai Engert - 3.21.0-8Elio Maldonado - 3.21.0-7Elio Maldonado - 3.21.0-6Elio Maldonado - 3.21.0-5Elio Maldonado - 3.21.0-4Elio Maldonado - 3.21.0-3Elio Maldonado - 3.21.0-2Elio Maldonado - 3.21.0-1Elio Maldonado - 3.19.1-9Elio Maldonado - 3.19.1-7Elio Maldonado - 3.19.1-6Elio Maldonado - 3.19.1-5Elio Maldonado - 3.19.1-4Kai Engert - 3.19.1-3Kai Engert - 3.19.1-2Elio Maldonado - 3.19.1-1Kai Engert - 3.18.0-5.3Elio Maldonado - 3.18.0-5Elio Maldonado - 3.18.0-4Elio Maldonado - 3.18.0-3Elio Maldonado - 3.18.0-2Elio Maldonado - 3.18.0-1Elio Maldonado - 3.16.2.3-4Elio Maldonado - 3.16.2.3-3Elio Maldonado - 3.16.2.3-1Elio Maldonado - 3.16.1-14Elio Maldonado - 3.16.1-13Elio Maldonado - 3.16.1-12Elio Maldonado - 3.16.1-11Elio Maldonado - 3.16.1-10Elio Maldonado - 3.16.1-9Elio Maldonado - 3.16.1-8Elio Maldonado - 3.16.1-7Elio Maldonado - 3.16.1-6Elio Maldonado - 3.16.1-5Elio Maldonado - 3.16.1-4Elio Maldonado - 3.16.1-3Elio Maldonado - 3.16.1-2Elio Maldonado - 3.16.1-1Elio Maldonado - 3.15.3-11Elio Maldonado - 3.15.3-10Elio Maldonado - 3.15.3-9Elio Maldonado - 3.15.3-8Elio Maldonado - 3.15.3-7Elio Maldonado - 3.15.3-6Elio Maldonado - 3.15.3-5Elio Maldonado - 3.15.3-4Elio Maldonado - 3.15.3-3Elio Maldonado - 3.15.3-2Elio Maldonado - 3.15.3-1Elio Maldonado - 3.15.1-15Elio Maldonado - 3.15.1-14Elio Maldonado - 3.15.1-13Elio Maldonado - 3.15.1-12Elio Maldonado - 3.15.1-11Elio Maldonado - 3.15.1-10Elio Maldonado - 3.15.1-9Elio Maldonado - 3.15.1-8Kai Engert - 3.15.1-7Elio Maldonado - 3.15.1-6Elio Maldonado - 3.15.1-5Elio Maldonado - 3.15.1-4Elio Maldonado - 3.15.1-3Elio Maldonado - 3.15.1-2Elio Maldonado - 3.15.1-1Elio Maldonado - 3.14.3-37Elio Maldonado - 3.14.3-36Elio Maldonado - 3.14.3-35Elio Maldonado - 3.14.3-34Kai Engert - 3.14.3-33Elio Maldonado - 3.14.3-5Elio Maldonado - 3.14.3-4Elio Maldonado - 3.14.3-3Elio Maldonado - 3.14.3-2Elio Maldonado - 3.14.3-1Elio Maldonado - 3.14.0.0-12Elio Maldonado - 3.14.0.0-11Elio Maldonado - 3.14.0.0-10Elio Maldonado - 3.14.0.0-9Elio Maldonado - 3.14.0.0-8Elio Maldonado - 3.14.0.0-7Elio Maldonado - 3.14.0.0-6Elio Maldonado - 3.14.0.0-5Elio Maldonado - 3.14.0.0-4Kai Engert - 3.14.0.0-3Bob Relyea - 3.14.0.0-2Elio Maldonado - 3.14.0.0-1Elio Maldonado - 3.13.5-3Elio Maldonado - 3.13.5-2Elio Maldonado - 3.13.5-1Elio Maldonado - 3.13.3-7Elio Maldonado - 3.13.3-6Elio Maldonado Batiz - 3.13.3-5Elio Maldonado Batiz - 3.13.3-4Elio Maldonado - 3.13.3-3Elio Maldonado - 3.13.3-2Elio Maldonado - 3.13.3-1Elio Maldonado Batiz - 3.13.1-6Elio Maldonado - 3.13.1-5Elio Maldonado - 3.13.1-4Elio Maldonado - 3.13.1-4Martin Stransky 3.13.1-3Elio Maldonado Batiz - 3.13.1-2Elio Maldonado - 3.13.1-1Elio Maldonado - 3.12.10-17Elio Maldonado - 3.12.10-16Elio Maldonado - 3.12.10-15Elio Maldonado - 3.12.10-14Elio Maldonado - 3.12.10-13Elio Maldonado - 3.12.10-12Elio Maldonado - 3.12.10-11Elio Maldonado - 3.12.10-10Elio Maldonado - 3.12.10-9Elio Maldonado - 3.12.10-8Elio Maldonado - 3.12.10-7Elio Maldonado - 3.12.10-6Elio Maldonado - 3.12.10-5Elio Maldonado - 3.12.10-4Elio Maldonado - 3.12.10-3Elio Maldonado - 3.12.10-2Elio Maldonado - 3.12.10-1Elio Maldonado - 3.12.9-11Elio Maldonado - 3.12.9-10Elio Maldonado Batiz - 3.12.9-9Elio Maldonado - 3.12.9-8Elio Maldonado - 3.12.9-7Elio Maldonado - 3.12.9-6Elio Maldonado - 3.12.9-5Elio Maldonado - 3.12.9-4Elio Maldonado - 3.12.9-3Elio Maldonado - 3.12.9-2Elio Maldonado - 3.12.9-1Elio Maldonado - 3.12.8-2Elio Maldonado - 3.12.8-1Kai Engert - 3.12.7-2Elio Maldonado - 3.12.7-1Elio Maldonado - 3.12.6-6Elio Maldonado - 3.12.6-5Elio Maldonado - 3.12.6-4Elio Maldonado - 3.12.6-3Elio Maldonado - 3.12.6-2Elio Maldonado - 3.12.6-1.2Elio Maldonado - 3.12.6-1.1Elio Maldonado - 3.12.6-1Elio Maldonado - 3.12.5.99-1Elio Maldonado - 3.12.5-8Elio Maldonado - 3.12.5-7.3Elio Maldonado - 3.12.5-7.2Elio Maldonado - 3.12.5-7.1Elio Maldonado - 3.12.5-7Elio Maldonado - 3.12.5-6Elio Maldonado - 3.12.5-2.1Elio Maldonado - 3.12.5-2Elio Maldonado - 3.12.5-1.14Elio Maldonado - 3.12.5-1.12.1Elio Maldonado - 3.12.5-1.11Elio maldonado - 3.12.5-1.10Elio Maldonado - 3.12.5-1.8Elio Maldonado - 3.12.5-2.1Elio Maldonado - 3.12.5-1.2Elio Maldonado - 3.12.4-15Elio Maldonado - 3.12.4-14Elio Maldonado - 3.12.4-12Elio Maldonado - 3.12.4-11Elio Maldonado - 3.12.4-10Elio Maldonado - 3.12.4-8Elio Maldonado - 3.12.4-6Elio Maldonado - 3.12.4-5Elio Maldonado - 3.12.4-4Elio Maldonado - 3.12.4-3Elio Maldonado - 3.12.4-2Elio Maldonado - 3.12.4-1Elio Maldonado - 3.12.3.99.3-30Elio Maldonado - 3.12.3.99.3-29Elio Maldonado - 3.12.3.99.3-28Elio Maldonado - 3.12.3.99.3-27Elio Maldonado - 3.12.3.99.3-26Elio Maldonado - 3.12.3.99.3-25Warren Togami - 3.12.3.99.3-24Elio Maldonado - 3.12.3.99.3-23Elio Maldonado - 3.12.3.99.3-22Elio Maldonado - 3.12.3.99.3-21Elio Maldonado - 3.12.3.99.3-20Elio Maldonado - 3.12.3.99.3-19Elio Maldonado - 3.12.3.99.3-18Elio Maldonado - 3.12.3.99.3-16Dennis Gilmore - 3.12.3.99.3-15Dennis Gilmore - 3.12.3.99.3-14Dennis Gilmore - 3.12.3.99.3-13Dennis Gilmore - 3.12.3.99.3-12Elio Maldonado+emaldona@redhat.com - 3.12.3.99.3-11Elio Maldonado - 3.12.3.99.3-10Dennis Gilmore - 3.12.3.99.3-9Elio Maldonado - 3.12.3.99.3-7.1Fedora Release Engineering - 3.12.3.99.3-7Elio Maldonado - 3.12.3.99.3-6Elio Maldonado - 3.12.3.99.3-5Elio Maldonado - 3.12.3.99.3-4Kai Engert - 3.12.3.99.3-3Kai Engert - 3.12.3.99.3-2Kai Engert - 3.12.3-7Kai Engert - 3.12.3-4Kai Engert - 3.12.3-3Kai Engert - 3.12.3-2Kai Engert - 3.12.2.99.3-7Kai Engert - 3.12.2.99.3-6Kai Engert - 3.12.2.99.3-5Kai Engert - 3.12.2.99.3-4Kai Engert - 3.12.2.99.3-3Kai Engert - 3.12.2.99.3-2Kai Engert - 3.12.2.99.3-1Fedora Release Engineering - 3.12.2.0-4Kai Engert - 3.12.2.0-3Dennis Gilmore - 3.12.1.1-4Kai Engert - 3.12.1.1-3Kai Engert - 3.12.1.1-2Kai Engert - 3.12.1.0-2Kai Engert - 3.12.0.3-7Kai Engert - 3.12.0.3-6Kai Engert - 3.12.0.3-3Kai Engert - 3.12.0.3-2Kai Engert - 3.12.0.1-1Jesse Keating - 3.11.99.5-2Kai Engert - 3.11.99.5-1Kai Engert - 3.11.99.4-1Kai Engert - 3.11.99.3-6Kai Engert - 3.11.99.3-5Kai Engert - 3.11.99.3-4Kai Engert - 3.11.99.3-3Kai Engert - 3.11.99.3-2Kai Engert - 3.11.99.3-1Kai Engert - 3.11.99.2b-3Kai Engert - 3.11.99.2b-2Kai Engert - 3.11.99.2-2Kai Engert - 3.11.99.2-1Kai Engert - 3.11.7-10Rob Crittenden - 3.11.7-9Kai Engert - 3.11.7-8Bob Relyea - 3.11.7-7Kai Engert - 3.11.7-6Kai Engert - 3.11.7-5Kai Engert - 3.11.7-4Kai Engert - 3.11.7-3Kai Engert - 3.11.7-2Kai Engert - 3.11.5-2Kai Engert - 3.11.5-1Bob Relyea - 3.11.4-4Kai Engert - 3.11.4-1Kai Engert - 3.11.3-2Kai Engert - 3.11.3-1Kai Engert - 3.11.2-2Jesse Keating - 3.11.2-1.1Kai Engert - 3.11.2-1Kai Engert - 3.11.1-2Kai Engert - 3.11.1-1Kai Engert - 3.11-4Jesse Keating - 3.11-3.2Jesse Keating - 3.11-3.1Ray Strode 3.11-3Christopher Aillon 3.11-2Christopher Aillon 3.11-1Christopher Aillon 3.11-0.cvs.2Christopher Aillon 3.11-0.cvsKai Engert Rob Crittenden 3.10-1- Backport patch to simplify transcript calculation for CertificateVerify- Fix zero-length record treatment for stream ciphers and SSLv2- Include CKBI 2.14 and updated CA constraints from NSS 3.28.5- Rebase to 3.28.4- Fix crash with tstclnt -W - Adjust gtests to run with our old softoken and downstream patches- Avoid cipher suite ordering change, spotted by Hubert Kario- Rebase to 3.28.3 - Remove upstreamed moz-1282627-rh-1294606.patch, moz-1312141-rh-1387811.patch, moz-1315936.patch, and moz-1318561.patch - Remove no longer necessary nss-duplicate-ciphers.patch - Disable X25519 and exclude tests using it - Catch failed ASN1 decoding of RSA keys, by Kamil Dudka (#1427481)- Update expired PayPalEE.cert- Disable unsupported test cases in ssl_gtests- Adjust the sslstress.txt filename so that it matches with the disableSSL2tests patch ported from RHEL 7 - Exclude SHA384 and CHACHA20_POLY1305 ciphersuites from stress tests - Don't add gtests and ssl_gtests to nss_tests, unless gtests are enabled- Add patch to fix SSL CA name leaks, taken from NSS 3.27.2 release - Add patch to fix bash syntax error in tests/ssl.sh - Add patch to remove duplicate ciphersuites entries in sslinfo.c - Add patch to abort selfserv/strsclnt/tstclnt on non-parsable version range - Build with support for SSLKEYLOGFILE- Update fix_multiple_open patch to fix regression in openldap client - Remove pk11_genobj_leak patch, which caused crash with Firefox - Add comment in the policy file to preserve the last empty line - Disable SHA384 ciphersuites when CKM_TLS12_KEY_AND_MAC_DERIVE is not provided by softoken; this superseds check_hash_impl patch- Fix problem in check_hash_impl patch- Add patch to check if hash algorithms are backed by a token - Add patch to disable TLS_ECDHE_{RSA,ECDSA}_WITH_AES_128_CBC_SHA256, which have never enabled in the past- Add upstream patch to fix a crash. Mozilla #1315936- Disable the use of RSA-PSS with SSL/TLS. #1390161- Use updated upstream patch for RH bug 1387811- Added upstream patches to fix RH bugs 1057388, 1294606, 1387811- Enable gtests when requested- Rebase to NSS 3.27.1 - Remove nss-646045.patch, which is not necessary - Remove p-disable-md5-590364-reversed.patch, which is no-op here, because the patched code is removed later in %setup - Remove disable_hw_gcm.patch, which is no-op here, because the patched code is removed later in %setup. Also remove NSS_DISABLE_HW_GCM setting, which was only required for RHEL 5 - Add Bug-1001841-disable-sslv2-libssl.patch and Bug-1001841-disable-sslv2-tests.patch, which completedly disable EXPORT ciphersuites. Ported from RHEL 7 - Remove disable-export-suites-tests.patch, which is covered by Bug-1001841-disable-sslv2-tests.patch - Remove nss-ca-2.6-enable-legacy.patch, as we decided to not allow 1024 legacy CA certificates - Remove ssl-server-min-key-sizes.patch, as we decided to support DH key size greater than 1023 bits - Remove nss-init-ss-sec-certs-null.patch, which appears to be no-op, as it clears memory area allocated with PORT_ZAlloc() - Remove nss-disable-sslv2-libssl.patch, nss-disable-sslv2-tests.patch, sslauth-no-v2.patch, and nss-sslstress-txt-ssl3-lower-value-in-range.patch as SSLv2 is already disabled in upstream - Remove fix-nss-test-filtering.patch, which is fixed in upstream - Add nss-check-policy-file.patch from Fedora - Install policy config in /etc/pki/nss-legacy/nss-rhel6.config- Ensure all ssl.sh tests are executed- Update sslauth patch to run more tests- Fix syntax errors in patch that disables sslv2 tests - Resolves: Bug 1297888 - Rebase RHEL 6.8 to NSS 3.21 for Firefox 45- Resolves: Bug 1304812 - Disable support for SSLv2 completely.- Add patches for ABI compatibility- Disable extended master-secret due to older version of softoken- Enable two additional ciphers and keep another one disabled - Prevent enabling extended masker key derive- Rebase to NSS-3.21- Prevent TLS 1.2 Transcript Collision attacks against MD5 in key exchange protocol - Resolves: Bug 1289890- Package listsuites as part of the unsupported tools set - Resolves: Bug 1283655- Resolves: Bug 1272504 - Enable TLS 1.2 as the default in nss- Rebuild against updated NSPR- Sync up with the rhel-6.6 branch - Resolves: Bug 1224450- Additional NULL initialization.- Updated the patch to keep old cipher suite order - Resolves: Bug 1224450- Rebase to nss-3.19.1 - Resolves: Bug 1224450- On RHEL 6.x keep the TLS version defaults unchanged. - Require softokn build 22 to ensure runtime compatibility. - Relax the requirement from pkcs11-devel to nss-softokn-freebl-devel to allow same or newer. - Update to CKBI 2.4 from NSS 3.18.1 (the only change in NSS 3.18.1)- Update and reeneable nss-646045.patch on account of the rebase - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]- Fix shell syntax error in nss/tests/all.sh - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]- Restore a patch that had been mistakenly disabled - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]- Replace expired PayPal test certificate that breaks the build - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]- Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6] - Resolves: Bug 1131311 - rhel65 ns-slapd crash, segfault error 4 in libnss3.so in PK11_DoesMechanism at pk11slot.c:1824 - Temporarily disable some tests until expired PayPalEE.cert is renewed- Keep the same cipher suite order as we had in NSS_3_15_3_RTM - Resolves: Bug 1123092 - openldap-2.4.23-34.el6_5.1.i686 fails after updating nss to nss-3.16.1-4.el6_5.i686- Resolves: Bug 1158160 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 - Remove unused indentation pseudo patch - require nss util 3.16.2.3 - Restore patch for certutil man page - supply missing options descriptions to the man page- Resolves: Bug 1158160 - Upgrade to NSS 3.16.2.3 for Firefox 31.3- Resolves: Bug 1145432 - CVE-2014-1568- Fix pem deadlock caused by previous version of a fix for a race condition - Fixes: Bug 1090681- Add references to bugs filed upstream - Related: Bug 1090681, Bug 1104300- Resolves: Bug 1090681 - RHDS 9.1 389-ds-base-1.2.11.15-31 crash in PK11_DoesMechanism- Replace expired PayPal test certificate that breaks the build - Related: Bug 1099619- Fix defects found by coverity - Resolves: Bug 1104300- Backport nss-3.12.6 upstream fix required by Firefox 31 - Resolves: Bug 1099619- Update nspr-version to 4.10.6- Update pem sources to the same ones used on rhel-7 - Remove no longer needed patches on account of this update - Resolves: Bug 1002205- Move removal of directories to the end of the %prep section - Resolves: Bug 689919 - build without any softoken or util sources in the tree- Remove unused patches rendered obsolete- Fix pem module trashing of private keys on failed login - Resolves: Bug 1002205 - PEM module trashes private keys if login fails- Restore use of indentation patch until another bug is resolved - Resolves: Bug 606022 - nss security tools lack man pages- Update to nss-3.16.1 - Resolves: Bug 1099619 - Rebase nss in RHEL 6.6 to NSS 3.16.1- Resolves: Bug 689919 - build without any softoken or util sources in the tree - Add define-uint32.patch to deal with using older version of nss-softokn - Fix suboptimal test failure detection shell code in the %check section- Prevent users from disabling the internal crypto module - Resolves: Bug 1059176 - nss segfaults with opencryptoki module- Improve support for ECDSA algorithm via pluggable ECC - Document the purpose of the iquote.patch - Resolves: Bug 1057224 - Pluggable ECC in NSS not enabled on RHEL 6 and above- Install man pages for the nss security tools - Resolves: Bug 606022 - nss security tools lack man pages- Fix the numbering and naming of the patches - Resolves: Bug 895339 - [PEM] active FTPS with encrypted client key ends up with SSL_ERROR_TOKEN_INSERTION_REMOVAL- make derEncodingsMatch work with encrypted keys - rename a patch, dropped the experimental moniker from it - Resolves: Bug 895339 - [PEM] active FTPS with encrypted client key ends up with SSL_ERROR_TOKEN_INSERTION_REMOVAL- Resolves: Bug 895339 - [PEM] active FTPS with encrypted client key ends up with SSL_ERROR_TOKEN_INSERTION_REMOVAL- Revoke trust in one mis-issued anssi certificate - Resolves: Bug 1042686 - nss: Mis-issued ANSSI/DCSSI certificate (MFSA 2013-117) [rhel-6.6]- Disable hw gcm on rhel-5 based build environments where OS lacks support - Rollback changes to build nss without softokn until Bug 689919 is approved - Cipher suite was run as part of the nss-softokn build- Build nss without softoken, freebl, or util sources in the build source tree - Resolves: Bug 1032472 - CVE-2013-5605 CVE-2013-5606 CVE-2013-1741- Update to NSS_3_15_3_RTM - Resolves: Bug 1032472 - CVE-2013-5605 CVE-2013-5606 CVE-2013-1741 - Resolves: Bug 1031238 - deadlock in trust domain lock and object lock- Using export NSS_DISABLE_HW_GCM=1 to deal with some problemmatic build systems - Resolves: rhbz#1016044 - nss.s390: primary link for libnssckbi.so must be /usr/lib64/libnssckbi.so- Add s390x and ia64 to the %define multilib_arches list used for defining alt_ckbi - Resolves: rhbz#1016044 - nss.s390: primary link for libnssckbi.so must be /usr/lib64/libnssckbi.so- Add zero default value to DISABLETEST check and fix the TEST_FAILURES check and reporting - Resolves: rhbz#990631 - file permissions of pkcs11.txt/secmod.db must be kept when modified by NSS - Related: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Add a zero default value to the DISABLETEST and TEST_FAILURES checks - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Fix the test for zero failures in the %check section - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Restore a mistakenly removed patch - Resolves: rhbz#961659 - SQL backend does not reload certificates- Rebuild for the pem module to link with freel from nss-softokn-3.14.3-6.el6 - Related: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0] - Related: rhbz#1010224 - NSS 3.15 breaks SSL in OpenLDAP clients- Don't require nss-softokn-fips - Resolves: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0]- Additional syntax fixes in nss-versus-softoken-test.patch - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Fix all.sh test for which application was last build by updating nss-versus-softoken-test.path - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Disable the cipher suite already run as part of the nss-softokn build - Resolves: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0]- Require nss-softokn-fips - Resolves: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0]- Require nspr-4.10.0 - Related: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Fix relative path in %check section to prevent undetected test failures - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Rebase to NSS_3.15.1_RTM - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x) - Update patches on account of the shallow tree with the rebase to 3.15.1 - Update the pem module sources nss-pem-20130405.tar.bz2 with latest patches applied - Remove patches rendered obsolete by the nss rebase and the updated nss-pem sources - Enable the iquote.patch to access newly introduced types- Do not hold issuer certificate handles in the crl cache - Resolves: rhbz#961659 - SQL backend does not reload certificates- Resolves: rhbz#977341 - nss-tools certutil -H does not list all options- Resolves: rhbz#702083 - dont require unique file basenames- Fix race condition in cert code related to smart cards - Resolves: rhbz#903017 - Firefox hang when CAC/PIV smart card certificates are viewed in the certificate manager- Configure libnssckbi.so to use the alternatives system in order to prepare for a drop in replacement. Please ensure that older packages that don't use the alternatives system for libnssckbi.so have a smaller n-v-r.- Syncup with uptream changes for aes gcm and ecc suiteb - Enable ecc support for suite b - Apply several upstream AES GCM fixes - Use the pristine nss upstream sources with ecc included - Export NSS_ENABLE_ECC=1 in both the build and the check sections - Make failed requests for unsupoprted ssl pkcs 11 bypass non fatal - Resolves: rhbz#882408 - NSS_NO_PKCS11_BYPASS must preserve ABI - Related: rhbz#918950 - rebase nss to 3.14.3- Revert to accepting MD5 on digital signatures by default - Resolves: rhbz#918136 - nss 3.14 - MD5 hash algorithm disabled- Ensure pem uses system freebl as with this update freebl brings in new API's - Resolves: rhbz#918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue- Install sechash.h and secmodt.h which are now provided by nss-devel - Resolves: rhbz#918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue - Remove unsafe -r option from commands that remove headers already shipped by nss-util and nss-softoken- Update to NSS_3.14.3_RTM - Resolves: rhbz#918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue - Update expired test certificates (fixed in upstream bug 852781) - Sync up pem module's rsawrapr.c with softoken's upstream changes for nss-3.14.3 - Reactivate the aia tests- Recreate the distrust patch by backporting the upstream one - Resolves: rhpbz#890914 - Dis-trust TURKTRUST mis-issued *.google.com certificate- Resolves: rhpbz#890914 - Dis-trust TURKTRUST mis-issued *.google.com certificate- Remove a patch that caused a regression - Resolves: rhbz#883620- Fix locking issue causing curl hangs and authenticate to the correct session - Resolves: rhbz#872838- PEM peminit returns CKR_CANT_LOCK when needed to inform caller module isn't thread safe - Resolves: rhbz#555019 - [PEM] invalid writes in multi-threaded libcurl based application- Add dummy sources file to test for and prevent breaking rhpkg commands - Enable testing for 'rhpk upload' and 'rhpk new-sources' breakage such as hangs - Related: rhbz#837089- Update the license to MPLv2.0 - turn off the aia tests - Resolves: rhbz#837089- Resolves: rhbz#702083 - NSS pem module should not require unique base file names- turn on the aia tests - update nss-589636.patch to apply to httpdserv- turn off aia tests for now- turn off ocsp tests for now- Rebase to nss-3.14.0.0-1 - Resolves: rhbz#837089 - Update ssl-cbc-random-iv patch for new sources - Remove patches rendered obsoleted by rebase to 3.14 - Add a patch to enforce no pkcs11 bypass- Resolves: rhbz#830302 - require nspr 4.9.1- Resolves: rhbz#830302 - revert unwanted changes to nss.pc.in- Resolves: rhbz#830302 - Update RHEL 6.x to NSS 3.13.5 and NSPR 4.9.1 for Mozilla 10.0.6- Resolves: rhbz#827351 invalid read and free on invalid cert load failure- Resolves: #rhbz#805232 PEM module may attempt to free uninitialized pointer- Resolves: rhbz#717913 - [PEM] various flaws detected by Coverity - Require nss-util 3.13.3- Resolves: rhbz#772628 nss_Init leaks memory- Resolves: rhbz#746632 - pem_CreateObject mem leak on non existing file name - Use completed patch per code review- Resolves: rhbz#746632 - pem_CreateObject mem leak on non existing file name - Resolves: rhbz#768669 - PEM unregistered callback causes SIGSEGV- Update to 3.13.3 - Resolves: rhbz#798539 - Distrust MITM subCAs issued by TrustWave - Remove builtins-nssckbi_1_88_rtm.patch which the rebase obsoletes- Resolves: rhbz#746632 - Adjust the patch for new sources- Resolves: rhbz#746632 - pem_CreateObject() leaks memory given a non-existing file name- Resolves: 784674 - Protect NSS_Shutdown from clients that fail to initialize nss- Add two needed patches - Resolves: rhbz#783315 - Need nss workaround for freebl bug that causes openswan to drop connections - Resolves: rhbz#747387 - Unable to contact LDAP Server during winsync- Rebuild- Resolves: Bug 784490 - CVE-2011-3389 - Activate a patch that was left out in previous build- Resolves: Bug 744070 - Update to 3.13.1 - Resolves: Bug 784674 - nss should protect against being called before nss_Init - Resolves: Bug 784490 - CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)- Resolves: Bug 761086 - Fix nss-735047.patch to not revert the nss-bz689031.patch- Update builtins certs to those from NSSCKBI_1_88_RTM- Bug 747387 - Unable to contact LDAP Server during winsync- Add to the spec file the patch for Bug 671266- More coverity related fixes in the pem module- Coverity related fixes- Add relro support for executables and shared libraries- Add partial RELRO support- Fix the name of the last patch file- Retagging to pick up two missing commits- Update builtins certs to those from NSSCKBI_1_87_RTM- Update builtins certs to those from NSSCKBI_1_86_RTM- Update builtins certs to those from NSSCKBI_1_85_RTM- Fix CMS to verify signed data when SignerInfo indicates signer by subjectKeyID- Fix pem logging to deal with files originally created by root- Retagging for updated patch missing from previous tag- Update to 3.12.10- Resolves: rhbz# 703658 - Fix crmf hard-coded maximum size for wrapped private keys- Resolves: rhbz#688423 - Enable NSS support for pluggable ECC- Add "Conflicts: curl < 7.19.7-26.el6" to fix Bug 694663- Construct private key nickname based on the full pathname of the pem file- Update expired PayPayEE.cert test certificate - Conditionalize some database tests on user not being root- Update to NSS_3.12.9_WITH_CKBI_1_82_RTM- Fix memory leaks caused by SECKEY_ImportDERPublicKey- Short-term fix for ssl test suites hangs on ipv6 type connections- Add requires for pkcs11-devel on nss-softokn-freebl devel - Run the test suites in check section per packaging guidelines- Prefer user database ca cert trust settings system's ones - Swap internal key slot on fips mode switches- Update to 3.12.9 - Fix libnsspem to test for and reject directories- Add suppport for pkcs8 formatted keys in the pem module - Add verify(not md5 size mtime) to configuration files attributes - Prevent nss-sysinit disabling on package upgrade - Create pkcs11.txt with correct permissions regardless of current umask - Add option to setup-nsssysinit.sh to report nss-sysinit status - Update test certificate which had expired- Update to 3.12.8- Increase release version number, no code changes- Update to 3.12.7- Rebuilt- Appying the changes in previous log - Changing some BuildRequires to >= as well - Temporarily disabling all tests for faster builds- Change some = to >= in Requires to enable a rebase next- Fix SIGSEGV within CreateObject (#596783) - Update expired test certificate- Fix nss.pc to not require nss-softokn- rebuilt using nss-util 3.2.6- rebuilt using nspr-devel 4.8.4- Update to 3.12.6- Update to NSS_3_12_6_RC1- Fix curl related regression and general patch code clean up- Resolves: #551784 rebuilt after nss-softokn and nss-util builds - this will generate the coorect nss.spec- rebuilt for RHEL-6 candidate, Resolves: #551784- Updated to 3.12.5 from CVS import from Fedora 12 - Moved blank legacy databases to the lookaside cache - Reenabled the full test suite - Retagging for a RHEL-6-test-build- Retagged- retagging- Fix SIGSEGV on call of NSS_Initialize (#553638)- bump release number and rebuild- Fix nsssysinit to allow root to modify the nss system database (#547860)- Temporarily disabling the ssl tests until Bug 539183 is resolved- Fix an error introduced when adapting the patch for 546211- Remove some left over trace statements from nsssysinit patching- Fix nsssysinit to set the default flags on the crypto module (#545779) - Fix nsssysinit to enable apps to use the system cert store, patch contributed by David Woodhouse (#546221) - Fix segmentation fault when listing keys or certs in the database, patch contributed by Kamil Dudka (#540387) - Sysinit requires coreutils for post install scriplet (#547067) - Remove redundant header from the pem module- Remove unneeded patch- Update to 3.12.5 - CVE-2009-3555 TLS: MITM attacks via session renegotiation- Require nss-softoken of same arch as nss (#527867)- Fix bug where user was prompted for a password when listing keys on an empty system database (#527048) - Fix setup-nsssysinit to handle more general flags formats (#527051)- Fix syntax error in setup-nsssysinit.sh- Fix sysinit to be under mozilla/security/nss/lib- Add nss-sysinit activation/deactivation script- Install blank databases and configuration file for system shared database - nsssysinit queries system for fips mode before relying on environment variable- Restoring nssutil and -rpath-link to nss-config for now - 522477- Add the nss-sysinit subpackage- Installing shared libraries to %{_libdir}- Retagging to pick up new sources- Update pem enabling source tar with latest fixes (509705, 51209)- PEM module implements memory management for internal objects - 509705 - PEM module doesn't crash when processing malformed key files - 512019- Remove symbolic links to shared libraries from devel - 521155 - No rpath-link in nss-softokn-config- Update to 3.12.4- Fix FORTIFY_SOURCE buffer overflows in test suite on ppc and ppc64 - bug 519766 - Fixed requires and buildrequires as per recommendations in spec file review- Restoring patches 2 and 7 as we still compile all sources - Applying the nss-nolocalsql.patch solves nss-tools sqlite dependency problems- restore require sqlite- Don't require sqlite for nss- Ensure versions in the requires match those used when creating nss.pc- Remove nss-prelink.conf as signed all shared libraries moved to nss-softokn - Add a temprary hack to nss.pc.in to unblock builds- caolan's nss.pc patch- Bump the release number for a chained build of nss-util, nss-softokn and nss- Fix nss-config not to include nssutil - Add BuildRequires on nss-softokn and nss-util since build also runs the test suite- disabling all tests while we investigate a buffer overflow bug- disabling some tests while we investigate a buffer overflow bug - 519766- remove patches that are now in nss-softokn and - remove spurious exec-permissions for nss.pc per rpmlint - single requires line in nss.pc.in- Fix BuildRequires: nss-softokn-devel release number- fix nss.pc.in to have one single requires line- cleanups for softokn- remove the softokn subpackages- don install the nss-util pkgconfig bits- remove from -devel the 3 headers that ship in nss-util-devel- kill off the nss-util nss-util-devel subpackages- split off nss-softokn and nss-util as subpackages with their own rpms - first phase of splitting nss-softokn and nss-util as their own packages- must install libnssutil3.since nss-util is untagged at the moment - preserve time stamps when installing various files- dont install libnssutil3.so since its now in nss-util- Fix spec file problems uncovered by Fedora_12_Mass_Rebuild- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- removed two patch files which are no longer needed and fixed previous change log number- updated pem module incorporates various patches - fix off-by-one error when computing size to reduce memory leak. (483855) - fix data type to work on x86_64 systems. (429175) - fix various memory leaks and free internal objects on module unload. (501080) - fix to not clone internal objects in collect_objects(). (501118) - fix to not bypass initialization if module arguments are omitted. (501058) - fix numerous gcc warnings. (500815) - fix to support arbitrarily long password while loading a private key. (500180) - fix memory leak in make_key and memory leaks and return values in pem_mdSession_Login (501191)- add patch for bug 502133 upstream bug 496997- rebuild with higher release number for upgrade sanity- updated to NSS_3_12_4_FIPS1_WITH_CKBI_1_75- re-enable test suite - add patch for upstream bug 488646 and add newer paypal certs in order to make the test suite pass- add conflicts info in order to fix bug 499436- ship .chk files instead of running shlibsign at install time - include .chk file in softokn-freebl subpackage - add patch for upstream nss bug 488350- Update to NSS 3.12.3- temporarily disable the test suite because of bug 494266- fix softokn-freebl dependency for multilib (bug 494122)- introduce separate nss-softokn-freebl package- disable execstack when building freebl- add upstream patch to fix bug 483855- build nspr-less freebl library- Update to NSS_3_12_3_BETA4- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- update to NSS_3_12_2_RC1 - use system zlib- add sparc64 to the list of 64 bit arches- bug 456847, move pkgconfig requirement to devel package- Update to NSS_3_12_1_RC2- NSS 3.12.1 RC1- fix bug bug 429175 in libpem module- bug 456847, add Requires: pkgconfig- nss package should own /etc/prelink.conf.d folder, rhbz#452062 - use upstream patch to fix test suite abort- Update to NSS_3_12_RC4- Update to NSS_3_12_RC2- Zapping old Obsoletes/Provides. No longer needed, causes multilib headache.- Update to NSS_3_12_BETA3- NSS 3.12 Beta 2 - Use /usr/lib{64} as devel libdir, create symbolic links.- Apply upstream patch for bug 417664, enable test suite on pcc.- Support concurrent runs of the test suite on a single build host.- disable test suite on ppc- disable test suite on ppc64- Build against gcc 4.3.0, use workaround for bug 432146 - Run the test suite after the build and abort on failures.* NSS 3.12 Beta 1- move .so files to /lib- NSS 3.12 alpha 2b- upstream patches to avoid calling netstat for random data- NSS 3.12 alpha 2- Add /etc/prelink.conf.d/nss-prelink.conf in order to blacklist our signed libraries and protect them from modification.- Fix off-by-one error in the PEM module- fix a C++ mode compilation error- Add 3.12 ckfw and libnsspem- Updated license tag- Ensure the workaround for mozilla bug 51429 really get's built.- Better approach to ship freebl/softokn based on 3.11.5 - Remove link time dependency on softokn- Fix unowned directories, rhbz#233890- Update to 3.11.7, but freebl/softokn remain at 3.11.5. - Use a workaround to avoid mozilla bug 51429.- Fix rhbz#230545, failure to enable FIPS mode - Fix rhbz#220542, make NSS more tolerant of resets when in the middle of prompting for a user password.- Update to 3.11.5 - This update fixes two security vulnerabilities with SSL 2 - Do not use -rpath link option - Added several unsupported tools to tools package- disable ECC, cleanout dead code- Update to 3.11.4- Revert the attempt to require latest NSPR, as it is not yet available in the build infrastructure.- Update to 3.11.3- Add /etc/pki/nssdb- rebuild- Update to 3.11.2 - Enable executable bit on shared libs, also fixes debug info.- Enable Elliptic Curve Cryptography (ECC)- Update to 3.11.1 - Include upstream patch to limit curves- add --noexecstack when compiling assembler on x86_64- bump again for double-long bug on ppc(64)- rebuilt for new gcc4.1 snapshot and glibc changes- rebuild- Update file list for the devel packages- Update to 3.11- Add patch to allow building on ppc* - Update the pkgconfig file to Require nspr- Initial import into Fedora Core, based on a CVS snapshot of the NSS_3_11_RTM tag - Fix up the pkcs11-devel subpackage to contain the proper headers - Build with RPM_OPT_FLAGS - No need to have rpath of /usr/lib in the pc file- Adressed review comments by Wan-Teh Chang, Bob Relyea, Christopher Aillon.- Initial build/bin/sh/bin/sh 3.28.4-4.el6_93.28.4-4.el6_93.28.4-4.el6_9nss-legacynss-rhel6.confignssdbcert8.dbkey3.dbsecmod.dblibnss3.solibnssckbi.solibnsspem.solibsmime3.solibssl3.solibnssckbi.so/etc/pki//etc/pki/nss-legacy//etc/pki/nssdb//usr/lib//usr/lib/nss/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnuASCII textBerkeley DB 1.85 (Hash, version 2, native byte-order)ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, strippeddirectoryemptyBUB,< PPPPPPPPP P P P P PPPPPPPPPPPPPPPPPPP P!P"P#P$P%P&P'P(P)P*P+P,RRRRR R R R RR%R&R'R(R)R*R,R-R.R/R0R1RP?P@PAPBPCRRRR R RRRRRRRRRRR R!R"R#R%R&R/R0R1R`o8 mLP 'YB"O~Y猪OT!"+(`LYVM(\w:}$9 =&3 3/M2UCOZ]'-P 0J fU? 6/ [7e̫u=jVWRNJ{ x6f7ecJ>00DH5Ytz2+;t>C&k;Y82VB΀}8g}^pZl*UyʫwK勽,gv /UqRZ[r{hݕ7q Y8('JhU&}_R!ji-v9SGezlud',Մeq,WX-^%ڹh@3Vr '_7 : 146kߒvB`V.^ QϢ C洋Mxm,-gdœ`kx بtQr(|xѮt{nni^aUkHsHg̾L u-m: rSȐ74hCZIM)N3惢b:hHʾd0*tXy -@JaSZRS!.ж@cKEm >˴#(UdyKEy;HO{ft?_g % i(M 2# ?Vh9,(s!`.}rT0^I8ߘCc2pMp~,!ݥp1S+GٸƗƔPPw-.âelpy$= ;\(FNpXWupИ8cF5ՍY#mxjr b*s@;)Gq7mBuO\K>C?AWAؔSHȇjMfnRf&*u '=l7{l771:?p4śoIy1I!gǍ' _ Yʁa)RyI~AnFa)v+ 1Shʚw^ ݍÚ\O͡:7S8n1WJ1*AT pIiL½'EP(HtFF"&!弣-a P.<9Ue7Z|L@oz5S ~ǮI&CBp3AL \ VB+eOU#SR^y){6!6 Ča\D.G<2y$_>ȩǩC25[G;aM`7K%*٫P!RCF>yօ)O ܌j?O#:DXr,% uFU7Džne {EA G4pF!vbQ; B,]}a=0ѧKJ %@W+Hрq==Y@`]#쏁nhFvmy`5[{NX,'yayU5^>Q*:0OQcCza&lԸ@@Dy-tqR:KJ1s>1>R=œvRcu.,+D |Rmw~m}B kPpǹDPiR/4Ґ# a@`w涨nKAdC= "=M|*ea׮%Ȯf]wgx|2ʄ!ö,e+uS>;U"hI@.r7 ,"+b ̟cic^o-jϠKli٫J8%6TqFLves潋}Rk 9zF !s&E?^oGqc.Iknbwz,qA)㰘)|57* ?K8gA׊tkyKnȈx7h8p(Ta/Ksu C 1W X#I'NC|bZp!%JO<<藲Q̣jk];*K"]v$ /V[)uۑ剆袷ԔlA;8ʫ\K zݻ ij< l[! 5n-tNH˲t&z'*w~Az0Iz@X'Y2%|pW,Wshϥ 8/kSn^q- jFg?֮tP?vt6^Zc]=r*wz J`v:F VLgԡ)r]"P~,b-(eM$]*_"0Ѥ3bN@2yZh7Jj(n3%auL[ke>:e9Y1'|̢b~(IexGEK֜ :T2ts6>.;2ez;HqSXNCIRjfZٝHQ%EX?BO,`_:pN̠:$5׵&Mu OvDԀ"&U{תzi%geNfaڼpR lԴNFi](ztS/B90cKر;p^^Z%^2(/LĴfu RjCy %akg^$Ttx Ҵ{X1$}VxѶhbkYPo'KwH7F3; 5χAY{˿}u6*:eβfFK2-8P->+AǰW9Ν"&W<7ܻ^W`Zf82ЭI.XmGXI;Ѥao>9JtZq٬Gs%:#!.,1,LOO/\uʧb& >frmVj@QtBԵ*a@rvIψ*:9cLnIVMenR% GYN=G_ ״<~pZFۀB1ieyoұck$QmIgqL@7 dgWg\A?*y /o-JEZ>8˹N Zȷ:3mlOL  G6.˭:l-8B -_--g+p`P#DE(]$P˳[!;g&jk]>Ic_{eriؠ@MW94v}ӱڟ͍Rhzlp,@ifay:(ٳɛMGkQ1j?.O1d8$(xЖ=M ,u$B|we[ SQyun[&@Mx\(LP1qeq9aNM8Wr_٧'] eW5'2tLJwyH_|*vm8 1Xٛxe{$SRT-B^;#1cNOLo^-)*@8vx$JaĻLՊR'.# SB2M\VL@;ۓ3zuBYKz6ap>HJI;Tmw|P̪"z\!,{1,ihD-Bʝk 61Gi~]$U { lCNw6"h{VU/{LCDN(jHЅYHZAY lom@pxQMj>s}AA553>po*o&  $&׋E:Xf%Rr!wh3w^ŧhZI$E f-c?టB ؓ) 6 ,{ 9kڠ,i,Y}(;D ~'8ICٔq) 0*b7Tr9]tסr7w4I@S&ͽǞi΋j` ' [-)4OΥF=fFyBP>*6OWfΙfbT#dxf=4jd^HK8`42(Jʹő?6,¬r(he@._ӨG7 ce"5{`B߄vˣ\y#ei1F-m!/JA*ƔYPy2Mg |F%qM?m; ܩ-4T7Tt)`%pi/~u_7NR 8 GuF+ Kl)5Wu˙p`Exg19;-*k(P&]b:E^=ٛ 5b8KBML ۂG~֩zΆ#aOJuhd^ocWdzz"c>o+{KRH\<)ֈUJػ܊@7X+z>qH"Az+DȐ'&A\(@P0<`?prԢJ'4CeJme*A+WgG JכДm'cL|eכWҸ!uakE0|NxH }F^=5 r51@>bc;%?m,04' ޫH.62Q7a 4ɩW ON ^sť˶ӟ{~y5zgAm0ܢ^UbO?QTi5"IOE6-\/2YbĒpkȶU~GRTXCKOJEl)['|*l0J5ţJ(KA6A@Mpu/83~ch.GZLfa6 8J[kO yYy|MVTz"sSi4uN6b_Tw G/|.4FQWR}A !KoU7̳|_9풳Ǩ$+#{@1˼:Nkzv1zצ4OO_pƣ%GzʝL ܆Gx= *\W IˆyGT}!uM867 /ipb< ]ք~{*t l;㺴LC~.m8_h/5D0VhX6B5)3 [&@Wu%ۧ5 6e8~m D4_V"IQsQ83ʿ~Q H _]fw+E!D,&!C-NxN'Da&u-]pW+*;1 i7[A}C]: "fjv9+ӎ۱}kДMiQ𑺆 9л% xt೬3%Z,V C渓\jˀo=0֛{iJ_jZ`qnYR i>XD#xmK L{Tg6 X<ย8ѳ7#Y_,HN1z"Oz7*+_mD9IG tt&xd_Џ*Ť Uhg+5Tm0|hđb0$4=?J)՜5 }'e1Axh"g=sm=S^[x2"=R^H72[-#ZjjaFaM-1@ ?/bPiw@/(KHG^IVJ~^= LXő|t{WaoR!(1z_ [ˈ_8Rz%|x i0Cg^K{\ݛ)UCDz<91y Q 0?]W#:? ՠXRaRB cji!O2;\hqq- jQ/-! +FcqFXCge.j7 Rb,נTNJ(^fefgh杋N]_A5*FAZ|ќ$H )zZpd'nx2Q|B@]yn{YBH: Ab)ԈQ~7w8Sۧ ttlE 4DKvcQl^fޏS"d7e^*Q c8LxҠ!NP7 |glYap$7ma۟]/!ciaRڦnak=BlGL`t3R2}!,Z)UTLqY9m>  湹?Xgg- Y)K xQ" ~MOHqq22=#¶FcP\pnQk3M`> A@YP@~NAL;^Dk?jg :r9|yr0ጡ l8'"V]ܗ~ےqH?~>n:=ercsp4C_G+MWqA>ЁXۅ=EVGtR{:)3f)S LYVdq56=ߘuZt7hONcD<k\OXH%&K]>3L);b@/#9K?5zE7ͧU銮} spؽ1f=S𼀨o3|mkߤ ٷik%J9=Q{`"b΁[ 'ીZw59}M+pT(y^ ]DqFX/~ͱ[wZPLEz۫B8(^qt@$e&ײE&ǿ㰄A-V20'aqj/ܦkv%VWwxEA{꛵<: w$5ñĖ۪(#*:VCq8P;/_c {&S-;iP9h)D\>60JZqrahl;%IϏmtm;$,;K|} chh]W`оXSf@[DR3<}>א@j:H&.)=軱ĔsyM\G9YCLĈeS!OFè|Bb1wzF%_5 %G4RT!#,m~T(`| okR@.~bYD̄gdp 24 y*X<$eYW~K ^ƒYld+-?~0 zg^CeRa+_!m@E:[G@0æa3 |]ݙY97.#]ɗ^i$:PQnK~ ۷ X ZESW0d{(GO]#V=m%ِDjd=oDkQ<ހBo/Sso]Z٠Ԃ 3*݌tfLZ"xMTkerͻHE )3zc9x2+p;cY&a95E~Pt>mȊȶLb)nhB"0: L ([Q¬e%wOJ]>Srӥs7tH)bN-b>Ucā9Viľ3&^\+z)**S9G a]޼) 2b.5 ,1VX846p OZ: ru:u\*2@[yW7^www[𙿐p`3̍jZI:d_LZ_`2Fի GiIY~Z٪N)Oq&1Cns_NʒEUWGzu h O[k#ՐRYi rEQRy6!7R>S`8$m*n좡X9 ^844R=zɣ7KS˨I&k1'r=NG/%6N~,\4ucDV}̄K/P, f%^TWv?ȕm5ۘ.K0|O`~{+V6*~l]xE6OZl~՜M5b|K>qpf"{X1-~õ/GF`|͠\8rk,'|{3c-NJ 삣zZ#_i)3oO2G 4qh[ FffaG$QqOw #NX.£eb޶%az"O?tT%\I0D XTIo jn2ƅ:]WDp3lAiKɢ]Fc``ȹOY/B.pKGK!߉cEl06G"7ej8:6Gٙ^Y CpLIOK Ybod$='YYl|P˄4i֋ޱ?F'UպW(=չ}WR93 2qC|BR_)+7*>8'0v{yG0LP,4>1ے@nw`dqKwr]O@Wnǔn% \AXnn/9?McV͐m|@c pB$[gD5 ĝI >ޣH_uM)1-g"ꅨ  >  ;C4+PqF-45|aHv iY&{'.b.0M8(y9@euE ञʅ ?QG/G6;OX%6oS r7 ԶmQ*jG!ĬI,+ 4lFWѡ ͓̒|ySY?~(Q#hBLȕ$(e(!p1AJ0`/8hzLb&d)!^`/ɃMYdSڋl6'"ӎ@p&+vdxbaIo:k܃*@#jCSw'v2]rI ň.#_>1XN,b|<l9޲Dr(C#9W;0f&H"E!N{/c3IO)ƽwXB4}2HkX@S@xWxJ|T6`]ON& ʖB0dūUG&j+fSl-)z_-IQmQ_-ۊ\"EGV->$]g[Cʆo:cZ4 X1²wɣ{u2ΓX-_s&h@g aE4ގ*2XeP\&-x80S&sGw@c?A:FbʑD<&N 6j!XU _-й[faݳ:!ެ˸ŝKWmDP8gu'[@fP0NҾK\i)[c60uzG3h&pIK/حHuK\Fd8Zt9Ԏ6O %7)gn4a< L7XE6D7z@xZnx;"q"Vꂒb|?|NِdޢC*ӃkKҀ*XmPs!p] M4pQ6(+),.4 i+c,x$f^: /!0EHb><|7PI56fG>nZaOa,P\<;,}75AU 3~Ifp#k9͎qŶ-cVmɯCgTZ;C8 "͇bM̊.G}!}x3-k?U-1[ٓ*A0r{0A-Zk#| $D\zӍ -"J iI%~I- _0L[;Tq[HO(uA < c+YkTnX9O\Na.쓮_߯jivo% MXF}yj{W`mJa4[.M^( Ϣvd*DnP(KnhC>ع_e_ynT|!A}qL+hz 6 Ed@saJek{tf05.ڙGletaIPn1d6 /Bq]T\ )>7w mAQ4"iW(B}2O Hrg? E 4Pԃ{R`/ _GIHD\xᎾyB-zT9q}WK,EA<)a1ԿkRh[3TBacPrB$A݁"L ʮll4H2mj[݅<\1VK_Mњ kJ~3wm LIWI}7{|~跑/W9 ]Z} 7mkW}f0iڜٓU2S[>Xve(MؓҌ[6N(̀8?&nn=+kDO58%pmX72>7hFSܯ̬qм\~CUϡ>!Zy=)SA3`&-뭋WXɵ>`XAS 2Xqq8[;W@|ٝBa 3$\K%rHG5ܘ:Ud}|\|t^#&MAF pM3"w{W05/O{,CüKC罣.w_cwԤରmI{xyFS+Ao),\hi 2;yُ{)|X!IW_[Z}>bxSL%[VyݪyBDm( _iwз9 jT8=u#S|YM}jҐԊ80Yۇ\=cPe8=ghѮot J" ]< Jms+`ԧXDorP$ΪHZ>|9q )G |׃_Xt`u4fH8ʔaC4!]=#krX^@]4ƧuK5S|xSrVj"߾*#?C ]Ƕ_Cw?$I#=9 o A 75$PO1r!Tyϡy3L3_"[Ɉē=j /5#`3Vݝ+{큍;MS^{mڂdqho5|h2_XdRYNor &$ ~7nj85uIEv#Gi +O21@g1ŠroB~=blS02z~q c J@29ͱG޼w8Go&o0R9 43i=o]ǿXY}*1 ؉Q{bK7^kW^9ࢧS<WelXlEeo$0) 'Q*U&ARY]p4(Sz+a|&Ӯ04=+Xpq_J9$a #Y:7k#5Iٸ% jD3]Aw;J5rV"4; OM); 01ixT2R®\ae !c# @p(g:_EdP eY0HyfdK8Q@3`x$,(IM-/s.y e7ˊ m9ʷ\ؽbFcA{ǒxmda3I"=R? $|Dؒ)cYhkna\o|C.}BUϝ*s)[0~bLg s"zQenSHczWn$1B7vj`Vp'pqkSh&U2} VxcuP0CG2|T ~%?~ øhk8|CT;yk#si<WrH޽jSWN lqcNܔJ0tڬ}JLhIMoe{HԶT.9O>pƝp[Z@$DngSDx?-!x xwMېOO쏱IL:umƄKnXֹO8Vãx^ cBD b]M?}V>n >Z^\]R:7-n_b*@L]+?^S)ټTBޡ kmUt(#~7Խʛ!FEvǣ5`l< "t*IP;|g\ RJեD-6"ԁq3)5.Z40<7%#e|KP.zu*)O&9'4xyHȞ[} ]~ayAe~f5w-7[vt6D\t: 8t|WHܤ&C /PGKLV O& !1T_j k ۈ Aa5n;7}5mtB+pܿ4꤆lvOj²;J2Yꕥm;sMITU~ikr`I}ʿD,l/ʭY">˰OONL_xx(@Z4av PrVahUn!lLؠ]!+Ag l H0UdN8Bk3}nːc /FOFhFJ8,0˂ndwX:HYA~pfv zQ|x@3퐦(XBpiEy0?X|"[jflj6"QK)F3`AiW>0ؓqwdKy@Y\fqM Vإ)`9~N+Dz0 ə^/` =]}LGMS9q^q/;p^B!ч=P7]iE^ճڪ 5T9%XN8 $TOA/ aς(Q6qa{NDZoAUU/dǏZm1@?В{<NmnٶDa4=EC⤍Ji Ê,efnKs%ѧPq҈z К9(K۴꺅ޓQATf:RtpT1'|z!Ʃc3^կ!n.2YYGfu+]ªNO'8ǞރY\ rD2*a*<>6H#º$ϩG-w6ujX%!~غb lxk59wfoE9y`~8B49ڤ` ~oMI&"W#G&]͙v񼒰xҥʼn zn/IlЌFFGPQ)ۣ`"(g5N)5*SB6Bl5ܓ݂f ,sSC8qtL!4@t62Jݣ=U*Rp, K\U'aS3ov/@9JwQUůCT6=C둜;71_2ɿ!}םh];+#ON]#o+v" MF]hCQӅ[&9m!U ;h&'MԘobi:+̺X9+IV„fܯ2l%jZ1eB # 3=xu}J1kΈ_ϻ$l; quRBX4EZe"(ĘRD1vH4cTQ$ݰԔzɆim$yDZ-+:%쐶pׁ-2,Q[= VJiYׇ," hSČ rА YYׁ |C_ kBГ׵N(5(<: n3$߰nG؇ɿtOdfײ_jQ(F~hb`qO?RE[)弒3ǰhg/<sϰFM}[̦I*F m'*Zw`c(Oq"#ݷy"R 3D!ǘyA+WW劈ЫFFDw>PM_JRB7)&xτW vS(֒G3BTJawܔ I*%vc aq#UwsNrƃɴQ:u(j2ՙ(}dkW4jvnקPIfr_+,:NJ5g#XpfTdVeŤ'j<6V1%OuV[rC]l}$cmT>$cRc F|6\v1Gs|hxL~jZ$Lkya*][шVaf,Ts"$:SEl@G|9SYNHjY .4fֳOxb2Y!:uc@vj,AD$t#珋24xSs R6rr +^$Z1e,zUiY%TY־fVPrݧzhW,<3z*vރ=9''+JVMVDdt.>TO-BS~(Y- .#{{MPI"ѲxbXᡔՓ/v+TBj]{T|o^mZ~i3!Ss H;hu C"&`{D,<lrM-xl>"kS7yqSnzY ur,+qq0Cw)iۅ9%Oa =ٵ`#fHJ]Jga6`o׎@=|U\ .C_ӏ;8? ;J {wr,hJu{sԴO^a(c6+P |`ˠkQ[e̥<~$oHXTpSrUh8xC@"5ѧgJlW^lfEOMu6ehvZn7:v_nUַp& F f_ LLo3GB{H#CB!sO x/Bǒ9&*s(Oǘ ]AxIz1Wq6oZdp[))o YoCލG>s2ft2_,Dl9pٯLzB@׃BA廤`*5Ke}K!2YoɲVTV>1O#X+; rł(p:YjOE$o+7=1ރfHb{u̼YJx f4e&-Et>- D5ozq..́ykNp}EXw \_s#|m^^#\y,Ģ]L˜؟AYucΕÏqMי9wy1A`WAq !|-৮(1<4c2 KLTvx.`eg}P?/P TTib"7LbQiu~87a_|_[Cqul^j|=w`7jw G$`?Wj%p)'oW9l{: qi~sgVf{ ,e7̑IU$%g]%bO9RIwmtP:hpRt9I׸R_ӶV\T25T6 *zY{UH LMdYШμ=e#3),wK2a'@-φ@'t7-cX- e?.-)-ąus8~2M-eyǠ883n_?ق,6q1GzpݚAӵ:"Z -Im A݁dVN]ĘcGZB:vebc!t ѤiOq $Ŷ,U6u[V0Odn"CEkܼ1ʦ=jg0\EMwCY4n|l4Yp9$v䈵Bc7ء!p kž=,/BP9$aA{˖tN] "`9dW{{Md-*\~!xI8Q'*C%+HbHnO B:S:QƵkesU'F|&JI.2ۊ[-۟79g23gv.# T-J T;G >?.o!:-Gs  =v*߇ &Ƶ4wx9 ~%Yr) dG#KSyپLżd|3]R((V\l|WPBЬ{ΦwG##WA߂?)~fSBr|d`#14'3fhHbL7<-lŁsMb+JAWLNO^ɗ.s]n!w6'm {dY~0;OrkpߔʎAv[hm|)(|Ooe9Vјk/ #Փ܆`yU+J߼-d[?9n'g`h6#{Q\Pp$ H&"yPмj~kvǺDE_XgDAy6ier9m㩑2\9jk)7> X\IC'LVĞ/8G2zN!*+*"y6u]Qܮ[0Wެo<=K=S̲0gd2 lSOCg'̝?ʼbF.Q;ʝTSY?}ٞGg4# "*D0 +o 4#7IM~c!>TUU+gof:ZU=9xC&D^ m?`ItMj^ivnOG=E6 pI5cݖ)_AD cpL9y~@̳S dg2h%s"F@v$ۃL!j[v˒#GAr`'MC7ANm>v8RV(\c5TbշRDI,Y6% m G&9@hZ".j&RE!jyXN,zc&|Y%S_5{y #4Ii3ErO5'Rfq yD=Q 9.> _ ~c&wEY0D?lE ydžYQѹ0ѧOMuf7yŻLh !:y57.Jv}qjB_r)VƁ,& -C=n6O)l7q@aQI1'xrw9{D;w9%mltx=qԛzb u^`/2-b3*-J'K>--x;7{e1>z͂`أ>.4v1lO #LNH գГi5WPMGXހ2Xuy.YG&O uӹsnTx6- nq)ኯ,dFx,ds6M7xӹ t eG5TbB?^l*dg_Wg͟=M S@#"3k֝ȢfԺ|t `60?~OƕRtJd_{8ͲZ WbwoEw h8M m/ PG]_g at2VRq3+bq2}l]uJnCrKp]n6< 7T}z2&!3J4 XN[X*:jx­y1;%[$گrP7uBU`9Meg=r:-Ej畇w9ć:3].r}[=(Hl UQ`z \kCt ~pԈ@OHIY6)ܜ4)_1}D2fC2HJibIYcx ݡg 21 dQ| ͊ ! |2%F/sswnL&MNJgA}HV=6J{JC(ւXqF$3+'#9+\5+ܜö1&\17(맸HōctEДb3ǘ `Cd;~тq7dk P2spd܇a;u:Uh:GJte@p="4A(]l We%9{4|勇Y./1%[\n-d]fI0?[z ;S~=_,bЏNI!vI(o,- G࡟SפmDxOȺ;x&+% Bg^a=mǚp/)Ǒ"HR{ej sk2|tc<̢\Z*1<'e(sMƪ?rz As dcmf^7 DiM&~:ٟ|+%7z"͂ŴNr#i{=dk𰸨@< X!LS6"}GR`íO6\oo\i9AQn#4hK=@&ڻ;mY[Kvriͫ舅vƇQ5@(KyCO}?vu~}WrO<ՌԤOmX(lI|>{J#qCRFݵt.CgBkYspu`nL"^D6N--sg3XJMiyro$Ze=o"KgSeJa5w/H6 OuN1׺ &IɛAH-oDڔak-dI92#z;C1A?ɅZƫǀĮ^Eҩ kNu'6͓_iP8%q?v[[k] G*ީ,Uq`30`tgyxu}YgҋENhqh/~|Ԟ2ϵ@V8j sįy#5G)0E5ӳ蠱E+6: d}6z`]/:*V~0豰*drW&X 6'xM8~H^Qz\l.&Իܚ^>O$LHxyT4&:"4+{:].ąfƗ(tq k4Ǜq9R#ʐ}\a?"+% ,_{`HYanIWpx9BS7[⭯mB؉&40>n?gM0*z5//L$϶m}!":Ѯd_ Gn˓O<43>#FY#30dRbǛ)ϊ<DjW"ZX>1ȕE1 t*$usr=O\Z?x|HpJgƥ^;'p׏גW']-lXk: !%\; /1hW~Gwq(9 c׊I_zYICř7J /mi_#}qPW=&ߞ_.,f/\THw-^Wpؠȋp:T3÷{.@;Kn,NuѪP"@4w"Twk?('ί{JCӖ+N]bFr@Wy<&\0~9j,kš=J0fOZeo6~'[9WwJ d u@.9#]E~] C֙;h(5BJy4n.Cۭ  eA% fRu`v;{L#۟0 JHmO-QnlOyEGrM`ڃhT~k__f_I4 2.фSRF^2Fbx>=:qo<ύſ"%E}j-k>egr?V{>EŔJO'A}QaX?!PP 5>Bl>Tb8i+tdyK7QPT8@8U͞)q [& Iυ=,fC;^qYJ4 b6,Vcm@З) sUbIE31圓GDPa0#\ _*ٻH/K(M-i/}9%i%w_R*@Q={'_^^.J4sU r!nNf=3j~-*6*`"|$]ζe= I1ߝ挤|(3XTog 3Ӛ5M6a;8JXgcrZ\…=Y wq#"og$B8>]6*mRK1 +ǔYF_2VZteO >Tgc*1u8뗺ho1hSMŷк>QZ* +˖'DuJ#Nc>x~Cvc=wING һxVDi &1TxHb, b qx#DB]7@|11F/1}o5EZZrzGLm G$sH#ExWTɆbbk&ori #pQM4*uC7S?3HM*聙upe -8?iY1p@ViIxGn=kQfE=TTf(v) vy& \Ik :jAB/[_.=OJɑa0Ix>+20-Cc mAbj_ ܭ#r ٻ'T  uÌT@hIћ sX;Fs::OmNҰ$lzD /O wGKuB D6/965{A A?wįYi[{^+HeMyfJcUNڠ~O4fZu;KWm noKJ}j\_-"A;u 0oªO@lHDoWIFcF H|!XDȅYkq*'֌`VTZ 涋@{Rz@teM_"/ '\XݞQ툪jB,k~`DmMQ Ht2Ɠp#np\0+s&g #cTy4I|:v?iJ\kS܎ }[A(T'8'ݧL@N@!z6ѦfHZ4X҆[W]SiXiu\2c^V kYi% ɨ 1^0^ӎe^+@MbP"mYfIk 0QRGwyswYIf~T !?/0{b4ovsw@|"Z iDJ&p:81GG  =X̡f} In ZӜ$v$w!J'ȝc_sk(S/5J0POSNpmsZǬME%sihv hv2ZUsV@! 0}I6yh7!VoC*w0M4jw:CW0, ֽey#\.ça^/^@-52Xhz>KLR߂(0Z_L:~F a3찛7~<+8@Y"7QncUb"W <:ƀH&,S Ct7v++\8agF/@ԆbcY.K'e(2r^Dyq\= =S+p}T]DI5cXacb]>zF@4rR3TJi!0O;/EM&#k$sG_Xׇ'rGqf1:ki$ uPy˿gw֑KEת]ftzD*U ;Wa7I&k}Cq`AY&ë`ū{C*kl :S9ԥs"t}ƒeѐ+GN]ںoV]{̊!IM UUvl%F@oO<%cGysR Z^dMf/ᬦ=HsV_7XA2\^?.5zR98qwHaAh@v#3CJnzמz׾]t36ìe!d(L?NSb˄3 H$ S*zpv;qJ͇V3T{e,^tMo+r$;AРrOn4P^;BQ$wBǦx MCw!EelYX("bBz`ñr / fw0#1jJGĒB5WT7n{1A*n7m'+8Єϙw5az 78<0yB [A) &apgQVWq7ik;"9*2 ٨$];H&{34neb,v\l ') STr_ZΫ.xOݍ* ;|G[^?! 8D6 {g |Rϯ8T!H49s`zxx+-c RGp>w,[W?_/+2G{]2aveG)Ό *Q)/`Ok1ppDוIG9Rc.[Fvp(q.-#~3T*Q6Q 6u:V:^EK0+7=`@p+{ )Fx+PcVF'Yg*жUIƅ KV7IiGpx҂05wʼnhrlQX-T2o݅$u@1ڨ|S #!)DI}fÅ[vrjBBGKE2W& mԐAiE`6[^') Qמ?*7 )VcS}k%7(o 9GxrYYMLtSS RcUPӂ Mc!\![X!3"=?ђC;@v-|jHo/@dCukxU v p[;`<5z2YV_#]{ FOBxDc[6wIuFGHWvɹ9eDKd`/M4HC;!QfFHuJ2k[!voa}B3l<,?hmR,Θt#A4V^$ kP=!AwPS LSµr% v$䳭d3zG$ſfs'f7Er[}/!QvGy`wZNo,B)}!~fo($!x ěaivTJl]7o~|6ܟD=}M*aAF\lk';Pl TS`HbO:ϕ\s9L^] ߒ>-Q39p{1DH`>a)kuu(dK"=!W[y5r2 f2ɚ~jB1d| @ê(Yv1^(l8*ާ^hCe)ųwחtHT{8vכHQz`Y ꑰItlOq5gNY,EVa#zv:`uB.V㸗T w_~ sw%;݈'c&KLnK*1,FNW %2) _w}^yS$f=tD.7jgXuFE>QCxI_ nn'ah/F뺁 ))mj^<.~VhZ`:Gy]z»Kk˽пn[۷  YZ