Author: pierre
Date: Wed Jun 25 13:54:57 2014
New Revision: 2921
Log:
Fix preceding patch
Modified:
trunk/icedtea/icedtea-2.5.0-add_cacerts-1.patch
Modified: trunk/icedtea/icedtea-2.5.0-add_cacerts-1.patch
==============================================================================
--- trunk/icedtea/icedtea-2.5.0-add_cacerts-1.patch Wed Jun 25 12:46:52
2014 (r2920)
+++ trunk/icedtea/icedtea-2.5.0-add_cacerts-1.patch Wed Jun 25 13:54:57
2014 (r2921)
@@ -346,8 +346,8 @@
add-zero-debug: stamps/add-zero-debug.stamp
diff -Naur icedtea-2.5.0/scripts/mkcacerts.sh
icedtea-2.5.0.new/scripts/mkcacerts.sh
--- icedtea-2.5.0/scripts/mkcacerts.sh 1970-01-01 01:00:00.000000000 +0100
-+++ icedtea-2.5.0.new/scripts/mkcacerts.sh 2014-06-25 08:01:16.031893645
+0200
-@@ -0,0 +1,207 @@
++++ icedtea-2.5.0.new/scripts/mkcacerts.sh 2014-06-25 22:26:52.656188615
+0200
+@@ -0,0 +1,208 @@
+#!/bin/sh
+# Simple script to extract x509 certificates and create a JRE cacerts file.
+
@@ -364,35 +364,35 @@
+ check_arg $1 $2
+ CAFILE="${2}"
+ shift 2
-+ ;;
++ ;;
+ -d | --cadir)
+ check_arg $1 $2
+ CADIR="${2}"
+ shift 2
-+ ;;
++ ;;
+ -o | --outfile)
+ check_arg $1 $2
+ OUTFILE="${2}"
+ shift 2
-+ ;;
++ ;;
+ -k | --keytool)
+ check_arg $1 $2
+ KEYTOOL="${2}"
+ shift 2
-+ ;;
++ ;;
+ -s | --openssl)
+ check_arg $1 $2
+ OPENSSL="${2}"
+ shift 2
-+ ;;
++ ;;
+ -h | --help)
-+ showhelp
-+ exit 0
-+ ;;
++ showhelp
++ exit 0
++ ;;
+ *)
-+ showhelp
-+ exit 1
-+ ;;
++ showhelp
++ exit 1
++ ;;
+ esac
+ done
+ }
@@ -436,7 +436,7 @@
+
+function showhelp()
+ {
-+ echo "\`basename ${0}\` creates a valid cacerts file for use with
IcedTea."
++ echo "`basename ${0}` creates a valid cacerts file for use with
IcedTea."
+ echo ""
+ echo " -f --cafile The path to a file containing PEM
formated CA"
+ echo " certificates. May not be used with
-d/--cadir."
@@ -453,7 +453,7 @@
+ echo ""
+ }
+
-+# Initialize empty variables so that the shell does not pollute the script
++# Initialize empty variables so that the shell does not polute the script
+CAFILE=""
+CADIR=""
+OUTFILE=""
@@ -469,35 +469,35 @@
+# Handle common errors
+if test "${CAFILE}x" == "x" -a "${CADIR}x" == "x" ; then
+ echo "ERROR! You must provide an x509 certificate store!"
-+ echo "\\'$(basename ${0}) --help\\' for more info."
++ echo "\'$(basename ${0}) --help\' for more info."
+ echo ""
+ exit 1
+fi
+
+if test "${CAFILE}x" != "x" -a "${CADIR}x" != "x" ; then
+ echo "ERROR! You cannot provide two x509 certificate stores!"
-+ echo "\\'$(basename ${0}) --help\\' for more info."
++ echo "\'$(basename ${0}) --help\' for more info."
+ echo ""
+ exit 1
+fi
+
+if test "${KEYTOOL}x" == "x" ; then
+ echo "ERROR! You must provide a valid keytool program!"
-+ echo "\\'$(basename ${0}) --help\\' for more info."
++ echo "\'$(basename ${0}) --help\' for more info."
+ echo ""
+ exit 1
+fi
+
+if test "${OPENSSL}x" == "x" ; then
+ echo "ERROR! You must provide a valid path to openssl!"
-+ echo "\\'$(basename ${0}) --help\\' for more info."
++ echo "\'$(basename ${0}) --help\' for more info."
+ echo ""
+ exit 1
+fi
+
+if test "${OUTFILE}x" == "x" ; then
+ echo "ERROR! You must provide a valid output file!"
-+ echo "\\'$(basename ${0}) --help\\' for more info."
++ echo "\'$(basename ${0}) --help\' for more info."
+ echo ""
+ exit 1
+fi
@@ -506,30 +506,30 @@
+
+# If using a CAFILE, split it into individual files in a temp directory
+if test "${CAFILE}x" != "x" ; then
-+ TEMPDIR=\`mktemp -d\`
++ TEMPDIR=`mktemp -d`
+ CADIR="${TEMPDIR}"
+
+ # Get a list of staring lines for each cert
-+ CERTLIST=\`grep -n "^-----BEGIN" "${CAFILE}" | cut -d ":" -f 1\`
++ CERTLIST=`grep -n "^-----BEGIN" "${CAFILE}" | cut -d ":" -f 1`
+
+ # Get a list of ending lines for each cert
-+ ENDCERTLIST=\`grep -n "^-----END" "${CAFILE}" | cut -d ":" -f 1\`
++ ENDCERTLIST=`grep -n "^-----END" "${CAFILE}" | cut -d ":" -f 1`
+
+ # Start a loop
-+ for certbegin in \`echo "${CERTLIST}"\` ; do
-+ for certend in \`echo "${ENDCERTLIST}"\` ; do
++ for certbegin in `echo "${CERTLIST}"` ; do
++ for certend in `echo "${ENDCERTLIST}"` ; do
+ if test "${certend}" -gt "${certbegin}"; then
+ break
+ fi
+ done
+ sed -n "${certbegin},${certend}p" "${CAFILE}" >
"${CADIR}/${certbegin}.pem"
-+ keyhash=\`${OPENSSL} x509 -noout -in "${CADIR}/${certbegin}.pem"
-hash\`
++ keyhash=`${OPENSSL} x509 -noout -in "${CADIR}/${certbegin}.pem" -hash`
+ echo "Generated PEM file with hash: ${keyhash}."
+ done
+fi
+
+# Write the output file
-+for cert in \`find "${CADIR}" -type f -name "*.pem" -o -name "*.crt"\`
++for cert in `find "${CADIR}" -type f -name "*.pem" -o -name "*.crt"`
+do
+
+ # Make sure the certificate date is valid...
@@ -542,11 +542,11 @@
+ fi
+ unset date certdate
+ ls "${cert}"
-+ tempfile=\`mktemp\`
-+ certbegin=\`grep -n "^-----BEGIN" "${cert}" | cut -d ":" -f 1\`
-+ certend=\`grep -n "^-----END" "${cert}" | cut -d ":" -f 1\`
++ tempfile=`mktemp`
++ certbegin=`grep -n "^-----BEGIN" "${cert}" | cut -d ":" -f 1`
++ certend=`grep -n "^-----END" "${cert}" | cut -d ":" -f 1`
+ sed -n "${certbegin},${certend}p" "${cert}" > "${tempfile}"
-+ echo yes | env LC_ALL=C "${KEYTOOL}" -import -alias \`basename
"${cert}"\` -keystore \\
++ echo yes | env LC_ALL=C "${KEYTOOL}" -import -alias `basename "${cert}"`
-keystore \
+ "${OUTFILE}" -storepass 'changeit' -file "${tempfile}"
+ rm "${tempfile}"
+done
@@ -555,3 +555,4 @@
+ rm -rf "${TEMPDIR}"
+fi
+exit 0
++
--
http://lists.linuxfromscratch.org/listinfo/patches
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page