Compare commits

...
Sign in to create a new pull request.

5 commits

Author SHA1 Message Date
Kai Engert
adc4248400 Update to CKBI 2.24 from NSS 3.37 2018-05-18 13:16:58 +02:00
Kai Engert
37f20aae04 Update to CKBI 2.22 from NSS 3.35 2018-02-06 14:45:36 +01:00
Kai Engert
a5362b0b0f Update to CKBI 2.20 from NSS 3.34.1 2017-11-27 22:06:17 +01:00
Kai Engert
8321241559 Update to (yet unreleased) CKBI 2.16 which is planned for NSS 3.32. Mozilla removed all trust bits for code signing. 2017-07-19 11:47:51 +02:00
Kai Engert
9506435bd8 Update to CKBI 2.14 from NSS 3.30.2 2017-04-26 15:08:19 +02:00
3 changed files with 1848 additions and 8692 deletions

View file

@ -35,10 +35,10 @@ Name: ca-certificates
# to have increasing version numbers. However, the new scheme will work,
# because all future versions will start with 2013 or larger.)
Version: 2017.2.11
Version: 2018.2.24
# for Rawhide, please always use release >= 2
# for Fedora release branches, please use release < 2 (1.0, 1.1, ...)
Release: 5%{?dist}
Release: 1.0%{?dist}
License: Public Domain
Group: System Environment/Base
@ -352,6 +352,22 @@ fi
%changelog
* Fri May 18 2018 Kai Engert <kaie@redhat.com> - 2018.2.24-1.0
- Update to CKBI 2.24 from NSS 3.37
* Tue Feb 06 2018 Kai Engert <kaie@redhat.com> - 2018.2.22-1.0
- Update to CKBI 2.22 from NSS 3.35
* Mon Nov 27 2017 Kai Engert <kaie@redhat.com> - 2017.2.20-1.0
- Update to CKBI 2.20 from NSS 3.34.1
* Wed Jul 19 2017 Kai Engert <kaie@redhat.com> - 2017.2.16-1.0
- Update to (yet unreleased) CKBI 2.16 which is planned for NSS 3.32.
Mozilla removed all trust bits for code signing.
* Wed Apr 26 2017 Kai Engert <kaie@redhat.com> - 2017.2.14-1.0
- Update to CKBI 2.14 from NSS 3.30.2
* Thu Feb 23 2017 Kai Engert <kaie@redhat.com> - 2017.2.11-5
- For CAs trusted by Mozilla, set attribute nss-mozilla-ca-policy: true
- Set attribute modifiable: false

10481
certdata.txt

File diff suppressed because it is too large Load diff

View file

@ -22,31 +22,32 @@
* to the list of trusted certificates.
*
* The NSS_BUILTINS_LIBRARY_VERSION_MINOR macro needs to be bumped
* for each NSS minor release AND whenever we change the list of
* trusted certificates. 10 minor versions are allocated for each
* NSS 3.x branch as follows, allowing us to change the list of
* trusted certificates up to 9 times on each branch.
* - NSS 3.5 branch: 3-9
* - NSS 3.6 branch: 10-19
* - NSS 3.7 branch: 20-29
* - NSS 3.8 branch: 30-39
* - NSS 3.9 branch: 40-49
* - NSS 3.10 branch: 50-59
* - NSS 3.11 branch: 60-69
* ...
* - NSS 3.12 branch: 70-89
* - NSS 3.13 branch: 90-99
* - NSS 3.14 branch: 100-109
* ...
* - NSS 3.29 branch: 250-255
* whenever we change the list of trusted certificates.
*
* Please use the following rules when increasing the version number:
*
* - starting with version 2.14, NSS_BUILTINS_LIBRARY_VERSION_MINOR
* must always be an EVEN number (e.g. 16, 18, 20 etc.)
*
* - whenever possible, if older branches require a modification to the
* list, these changes should be made on the main line of development (trunk),
* and the older branches should update to the most recent list.
*
* - ODD minor version numbers are reserved to indicate a snapshot that has
* deviated from the main line of development, e.g. if it was necessary
* to modify the list on a stable branch.
* Once the version has been changed to an odd number (e.g. 2.13) on a branch,
* it should remain unchanged on that branch, even if further changes are
* made on that branch.
*
* NSS_BUILTINS_LIBRARY_VERSION_MINOR is a CK_BYTE. It's not clear
* whether we may use its full range (0-255) or only 0-99 because
* of the comment in the CK_VERSION type definition.
* It's recommend to switch back to 0 after having reached version 98/99.
*/
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 11
#define NSS_BUILTINS_LIBRARY_VERSION "2.11"
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 24
#define NSS_BUILTINS_LIBRARY_VERSION "2.24"
/* These version numbers detail the semantic changes to the ckfw engine. */
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1