Firefox 3.5.8 fixes some security issues. Bugs fixed are listed at:
http://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.8

Any comments?


Index: Makefile
===================================================================
RCS file: /usr/cvs/ports/www/firefox35/Makefile,v
retrieving revision 1.34
diff -u -r1.34 Makefile
--- Makefile    5 Jan 2010 21:26:40 -0000       1.34
+++ Makefile    18 Feb 2010 20:20:26 -0000
@@ -5,7 +5,7 @@
 
 COMMENT=       redesign of Mozilla's browser component
 
-VER=           3.5.7
+VER=           3.5.8
 DISTNAME=      mozilla-1.9.1
 PKGNAME=       firefox35-${VER}
 SO_VERSION=    22.0
Index: distinfo
===================================================================
RCS file: /usr/cvs/ports/www/firefox35/distinfo,v
retrieving revision 1.8
diff -u -r1.8 distinfo
--- distinfo    5 Jan 2010 21:26:40 -0000       1.8
+++ distinfo    18 Feb 2010 20:23:27 -0000
@@ -1,5 +1,5 @@
-MD5 (firefox-3.5.7.source.tar.bz2) = gub1aN3qrlLoWqCJJ39dFA==
-RMD160 (firefox-3.5.7.source.tar.bz2) = LpCCddTtft53sosdvZ15BNvgViI=
-SHA1 (firefox-3.5.7.source.tar.bz2) = dgXYmz0+RY23TepNIn3YbQ0Suhs=
-SHA256 (firefox-3.5.7.source.tar.bz2) = 
oIdolsZsvwbYu5KWhySKwouZOIBo5LW9KfFjZsOOAYU=
-SIZE (firefox-3.5.7.source.tar.bz2) = 46919155
+MD5 (firefox-3.5.8.source.tar.bz2) = 8g/a32EU6ERWd1zU8POUkg==
+RMD160 (firefox-3.5.8.source.tar.bz2) = l6Q5TYlfwNjnvjTAkOvnVUAQipA=
+SHA1 (firefox-3.5.8.source.tar.bz2) = S/uaJ0ET+57lkMANpp2ZXcUA1Mw=
+SHA256 (firefox-3.5.8.source.tar.bz2) = 
m5ubD254P9QYSi8IJko0cN5MvxxBz5z4h6g3PSILtNs=
+SIZE (firefox-3.5.8.source.tar.bz2) = 46954234
Index: patches/patch-configure_in
===================================================================
RCS file: /usr/cvs/ports/www/firefox35/patches/patch-configure_in,v
retrieving revision 1.4
diff -u -r1.4 patch-configure_in
--- patches/patch-configure_in  27 Nov 2009 21:18:52 -0000      1.4
+++ patches/patch-configure_in  18 Feb 2010 20:34:13 -0000
@@ -1,7 +1,7 @@
 $OpenBSD: patch-configure_in,v 1.4 2009/11/27 21:18:52 naddy Exp $
---- configure.in.orig  Mon Nov  2 22:42:44 2009
-+++ configure.in       Fri Nov 27 03:01:08 2009
-@@ -1000,7 +1000,7 @@ MOZ_PNG_LIBS='$(call EXPAND_LIBNAME_PATH,mozpng,$(DEPT
+--- configure.in.orig  Tue Feb  2 18:25:10 2010
++++ configure.in       Thu Feb 18 15:26:24 2010
+@@ -998,7 +998,7 @@ MOZ_PNG_LIBS='$(call EXPAND_LIBNAME_PATH,mozpng,$(DEPT
  
  MOZ_JS_LIBS='-L$(LIBXUL_DIST)/bin -lmozjs'
  DYNAMIC_XPCOM_LIBS='-L$(LIBXUL_DIST)/bin -lxpcom -lxpcom_core'
@@ -10,7 +10,7 @@
  XPCOM_FROZEN_LDOPTS='-L$(LIBXUL_DIST)/bin -lxpcom'
  LIBXUL_LIBS='$(XPCOM_FROZEN_LDOPTS) -lxul'
  XPCOM_GLUE_LDOPTS='$(LIBXUL_DIST)/lib/$(LIB_PREFIX)xpcomglue_s.$(LIB_SUFFIX) 
$(XPCOM_FROZEN_LDOPTS)'
-@@ -2342,7 +2342,7 @@ case "$target" in
+@@ -2340,7 +2340,7 @@ case "$target" in
        ;;
  
  *-openbsd*)
@@ -19,7 +19,7 @@
      DSO_CFLAGS=''
      DSO_PIC_CFLAGS='-fPIC'
      DSO_LDOPTS='-shared -fPIC'
-@@ -4009,9 +4009,9 @@ AC_CACHE_CHECK(for __thread keyword for TLS variables,
+@@ -4007,9 +4007,9 @@ AC_CACHE_CHECK(for __thread keyword for TLS variables,
                              [return tlsIsMainThread;],
                              ac_cv_thread_keyword=yes,
                              ac_cv_thread_keyword=no)])
Index: patches/patch-extensions_auth_nsAuthGSSAPI_cpp
===================================================================
RCS file: 
/usr/cvs/ports/www/firefox35/patches/patch-extensions_auth_nsAuthGSSAPI_cpp,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 patch-extensions_auth_nsAuthGSSAPI_cpp
--- patches/patch-extensions_auth_nsAuthGSSAPI_cpp      21 Jun 2009 01:31:24 
-0000      1.1.1.1
+++ patches/patch-extensions_auth_nsAuthGSSAPI_cpp      18 Feb 2010 20:34:11 
-0000
@@ -1,7 +1,7 @@
 $OpenBSD: patch-extensions_auth_nsAuthGSSAPI_cpp,v 1.1.1.1 2009/06/21 01:31:24 
martynas Exp $
---- extensions/auth/nsAuthGSSAPI.cpp.orig      Thu Mar  5 23:31:50 2009
-+++ extensions/auth/nsAuthGSSAPI.cpp   Fri Mar 13 17:46:14 2009
-@@ -155,9 +155,8 @@ gssInit()
+--- extensions/auth/nsAuthGSSAPI.cpp.orig      Tue Feb  2 18:25:15 2010
++++ extensions/auth/nsAuthGSSAPI.cpp   Thu Feb 18 15:26:24 2010
+@@ -159,9 +159,8 @@ gssInit()
          };
          
          const char *const verLibNames[] = {
Index: patches/patch-js_src_configure_in
===================================================================
RCS file: /usr/cvs/ports/www/firefox35/patches/patch-js_src_configure_in,v
retrieving revision 1.4
diff -u -r1.4 patch-js_src_configure_in
--- patches/patch-js_src_configure_in   21 Jul 2009 19:53:17 -0000      1.4
+++ patches/patch-js_src_configure_in   18 Feb 2010 20:34:12 -0000
@@ -1,7 +1,7 @@
 $OpenBSD: patch-js_src_configure_in,v 1.4 2009/07/21 19:53:17 martynas Exp $
---- js/src/configure.in.orig   Wed Jul 15 18:34:51 2009
-+++ js/src/configure.in        Tue Jul 21 22:47:41 2009
-@@ -906,7 +906,7 @@ HOST_AR='$(AR)'
+--- js/src/configure.in.orig   Tue Feb  2 18:25:17 2010
++++ js/src/configure.in        Thu Feb 18 15:26:24 2010
+@@ -904,7 +904,7 @@ HOST_AR='$(AR)'
  HOST_AR_FLAGS='$(AR_FLAGS)'
  
  MOZ_JS_LIBS='-L$(libdir) -lmozjs'
@@ -10,7 +10,7 @@
  
  MOZ_COMPONENT_NSPR_LIBS='-L$(LIBXUL_DIST)/bin $(NSPR_LIBS)'
  MOZ_XPCOM_OBSOLETE_LIBS='-L$(LIBXUL_DIST)/lib -lxpcom_compat'
-@@ -2135,7 +2135,7 @@ case "$target" in
+@@ -2133,7 +2133,7 @@ case "$target" in
        ;;
  
  *-openbsd*)
@@ -19,7 +19,7 @@
      DSO_CFLAGS=''
      DSO_PIC_CFLAGS='-fPIC'
      DSO_LDOPTS='-shared -fPIC'
-@@ -2467,7 +2467,7 @@ arm*-*)
+@@ -2465,7 +2465,7 @@ arm*-*)
      ENABLE_JIT=1
      NANOJIT_ARCH=ARM
      ;;
@@ -28,7 +28,7 @@
      ENABLE_JIT=1
      NANOJIT_ARCH=Sparc
      ;;
-@@ -2504,7 +2504,7 @@ darwin*)
+@@ -2502,7 +2502,7 @@ darwin*)
  solaris*)
      AC_DEFINE(AVMPLUS_UNIX)
      ;;
Index: patches/patch-nsprpub_config_rules_mk
===================================================================
RCS file: /usr/cvs/ports/www/firefox35/patches/patch-nsprpub_config_rules_mk,v
retrieving revision 1.1
diff -u -r1.1 patch-nsprpub_config_rules_mk
--- patches/patch-nsprpub_config_rules_mk       21 Jun 2009 15:04:16 -0000      
1.1
+++ patches/patch-nsprpub_config_rules_mk       18 Feb 2010 20:34:18 -0000
@@ -1,7 +1,7 @@
 $OpenBSD: patch-nsprpub_config_rules_mk,v 1.1 2009/06/21 15:04:16 martynas Exp 
$
---- nsprpub/config/rules.mk.orig       Wed Jun 17 07:22:05 2009
-+++ nsprpub/config/rules.mk    Sun Jun 21 17:51:31 2009
-@@ -219,7 +219,7 @@ ifdef RELEASE_HEADERS
+--- nsprpub/config/rules.mk.orig       Tue Feb  2 18:25:27 2010
++++ nsprpub/config/rules.mk    Thu Feb 18 15:26:25 2010
+@@ -214,7 +214,7 @@ ifdef RELEASE_HEADERS
        $(NSINSTALL) -t -m 0644 $(RELEASE_HEADERS) 
$(DESTDIR)$(includedir)/$(include_subdir)
  endif
  ifdef RELEASE_LIBS
Index: patches/patch-nsprpub_pr_src_misc_prdtoa_c
===================================================================
RCS file: 
/usr/cvs/ports/www/firefox35/patches/patch-nsprpub_pr_src_misc_prdtoa_c,v
retrieving revision 1.2
diff -u -r1.2 patch-nsprpub_pr_src_misc_prdtoa_c
--- patches/patch-nsprpub_pr_src_misc_prdtoa_c  27 Nov 2009 21:18:52 -0000      
1.2
+++ patches/patch-nsprpub_pr_src_misc_prdtoa_c  18 Feb 2010 20:58:00 -0000
@@ -1,6 +1,6 @@
 $OpenBSD: patch-nsprpub_pr_src_misc_prdtoa_c,v 1.2 2009/11/27 21:18:52 naddy 
Exp $
---- nsprpub/pr/src/misc/prdtoa.c.orig  Wed Nov 25 21:46:23 2009
-+++ nsprpub/pr/src/misc/prdtoa.c       Wed Nov 25 21:47:05 2009
+--- nsprpub/pr/src/misc/prdtoa.c.orig  Tue Feb  2 18:25:28 2010
++++ nsprpub/pr/src/misc/prdtoa.c       Thu Feb 18 15:57:33 2010
 @@ -47,42 +47,14 @@
  
  #include "primpl.h"
@@ -44,7 +44,7 @@
  /****************************************************************
   *
   * The author of this software is David M. Gay.
-@@ -102,3310 +74,82 @@ void _PR_CleanupDtoa(void)
+@@ -102,3312 +74,83 @@ void _PR_CleanupDtoa(void)
   *
   ***************************************************************/
  
@@ -408,7 +408,7 @@
 -#define Flt_Rounds 1
 -#endif
 -#endif /*Flt_Rounds*/
--
+ 
 -#ifdef Honor_FLT_ROUNDS
 -#define Rounding rounding
 -#undef Check_FLT_ROUNDS
@@ -1708,6 +1708,8 @@
 -                      }
 -              }
 - dig_done:
+-      if (nd > 64 * 1024)
+-              goto ret0;
 -      e = 0;
 -      if (c == 'e' || c == 'E') {
 -              if (!nd && !nz && !nz0) {
@@ -3391,7 +3393,7 @@
  
  PR_IMPLEMENT(PRStatus)
  PR_dtoa(PRFloat64 d, PRIntn mode, PRIntn ndigits,
-@@ -3421,7 +165,7 @@ PR_dtoa(PRFloat64 d, PRIntn mode, PRIntn ndigits,
+@@ -3423,7 +166,7 @@ PR_dtoa(PRFloat64 d, PRIntn mode, PRIntn ndigits,
          PR_SetError(PR_INVALID_ARGUMENT_ERROR, 0);
          return rv;
      }
@@ -3400,7 +3402,7 @@
      if (!result) {
          PR_SetError(PR_OUT_OF_MEMORY_ERROR, 0);
          return rv;
-@@ -3436,7 +180,7 @@ PR_dtoa(PRFloat64 d, PRIntn mode, PRIntn ndigits,
+@@ -3438,7 +181,7 @@ PR_dtoa(PRFloat64 d, PRIntn mode, PRIntn ndigits,
          }
          rv = PR_SUCCESS;
      }
@@ -3409,7 +3411,7 @@
      return rv;  
  }
  
-@@ -3458,9 +202,9 @@ PR_cnvtf(char *buf, int bufsz, int prcsn, double dfval
+@@ -3460,9 +203,9 @@ PR_cnvtf(char *buf, int bufsz, int prcsn, double dfval
      char *num, *nump;
      char *bufp = buf;
      char *endnum;
@@ -3421,7 +3423,7 @@
      /* If anything fails, we store an empty string in 'buf' */
      num = (char*)PR_MALLOC(bufsz);
      if (num == NULL) {
-@@ -3468,7 +212,7 @@ PR_cnvtf(char *buf, int bufsz, int prcsn, double dfval
+@@ -3470,7 +213,7 @@ PR_cnvtf(char *buf, int bufsz, int prcsn, double dfval
          return;
      }
      /* XXX Why use mode 1? */
Index: patches/patch-security_nss_lib_ckfw_builtins_certdata_c
===================================================================
RCS file: 
/usr/cvs/ports/www/firefox35/patches/patch-security_nss_lib_ckfw_builtins_certdata_c,v
retrieving revision 1.1
diff -u -r1.1 patch-security_nss_lib_ckfw_builtins_certdata_c
--- patches/patch-security_nss_lib_ckfw_builtins_certdata_c     19 Jul 2009 
18:38:08 -0000      1.1
+++ patches/patch-security_nss_lib_ckfw_builtins_certdata_c     18 Feb 2010 
20:34:09 -0000
@@ -1,30 +1,30 @@
 $OpenBSD: patch-security_nss_lib_ckfw_builtins_certdata_c,v 1.1 2009/07/19 
18:38:08 martynas Exp $
---- security/nss/lib/ckfw/builtins/certdata.c.orig     Thu Jul 16 18:02:46 2009
-+++ security/nss/lib/ckfw/builtins/certdata.c  Thu Jul 16 18:09:58 2009
-@@ -900,6 +900,18 @@ static const CK_ATTRIBUTE_TYPE nss_builtins_types_280 
- static const CK_ATTRIBUTE_TYPE nss_builtins_types_281 [] = {
+--- security/nss/lib/ckfw/builtins/certdata.c.orig     Tue Feb  2 18:25:30 2010
++++ security/nss/lib/ckfw/builtins/certdata.c  Thu Feb 18 15:33:51 2010
+@@ -984,6 +984,18 @@ static const CK_ATTRIBUTE_TYPE nss_builtins_types_308 
+ static const CK_ATTRIBUTE_TYPE nss_builtins_types_309 [] = {
   CKA_CLASS,  CKA_TOKEN,  CKA_PRIVATE,  CKA_MODIFIABLE,  CKA_LABEL,  
CKA_CERT_SHA1_HASH,  CKA_CERT_MD5_HASH,  CKA_ISSUER,  CKA_SERIAL_NUMBER,  
CKA_TRUST_SERVER_AUTH,  CKA_TRUST_EMAIL_PROTECTION,  CKA_TRUST_CODE_SIGNING,  
CKA_TRUST_STEP_UP_APPROVED
  };
-+static const CK_ATTRIBUTE_TYPE nss_builtins_types_282 [] = {
++static const CK_ATTRIBUTE_TYPE nss_builtins_types_310 [] = {
 + CKA_CLASS,  CKA_TOKEN,  CKA_PRIVATE,  CKA_MODIFIABLE,  CKA_LABEL,  
CKA_CERTIFICATE_TYPE,  CKA_SUBJECT,  CKA_ID,  CKA_ISSUER,  CKA_SERIAL_NUMBER,  
CKA_VALUE
 +};
-+static const CK_ATTRIBUTE_TYPE nss_builtins_types_283 [] = {
++static const CK_ATTRIBUTE_TYPE nss_builtins_types_311 [] = {
 + CKA_CLASS,  CKA_TOKEN,  CKA_PRIVATE,  CKA_MODIFIABLE,  CKA_LABEL,  
CKA_CERT_SHA1_HASH,  CKA_CERT_MD5_HASH,  CKA_ISSUER,  CKA_SERIAL_NUMBER,  
CKA_TRUST_SERVER_AUTH,  CKA_TRUST_EMAIL_PROTECTION,  CKA_TRUST_CODE_SIGNING,  
CKA_TRUST_STEP_UP_APPROVED
 +};
-+static const CK_ATTRIBUTE_TYPE nss_builtins_types_284 [] = {
++static const CK_ATTRIBUTE_TYPE nss_builtins_types_312 [] = {
 + CKA_CLASS,  CKA_TOKEN,  CKA_PRIVATE,  CKA_MODIFIABLE,  CKA_LABEL,  
CKA_CERTIFICATE_TYPE,  CKA_SUBJECT,  CKA_ID,  CKA_ISSUER,  CKA_SERIAL_NUMBER,  
CKA_VALUE
 +};
-+static const CK_ATTRIBUTE_TYPE nss_builtins_types_285 [] = {
++static const CK_ATTRIBUTE_TYPE nss_builtins_types_313 [] = {
 + CKA_CLASS,  CKA_TOKEN,  CKA_PRIVATE,  CKA_MODIFIABLE,  CKA_LABEL,  
CKA_CERT_SHA1_HASH,  CKA_CERT_MD5_HASH,  CKA_ISSUER,  CKA_SERIAL_NUMBER,  
CKA_TRUST_SERVER_AUTH,  CKA_TRUST_EMAIL_PROTECTION,  CKA_TRUST_CODE_SIGNING,  
CKA_TRUST_STEP_UP_APPROVED
 +};
  #ifdef DEBUG
  static const NSSItem nss_builtins_items_0 [] = {
    { (void *)&cko_data, (PRUint32)sizeof(CK_OBJECT_CLASS) },
-@@ -18953,6 +18965,332 @@ static const NSSItem nss_builtins_items_281 [] = {
-   { (void *)&ckt_netscape_trust_unknown, (PRUint32)sizeof(CK_TRUST) },
+@@ -20774,6 +20786,332 @@ static const NSSItem nss_builtins_items_309 [] = {
+   { (void *)&ckt_netscape_trusted_delegator, (PRUint32)sizeof(CK_TRUST) },
    { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }
  };
-+static const NSSItem nss_builtins_items_282 [] = {
++static const NSSItem nss_builtins_items_310 [] = {
 +  { (void *)&cko_certificate, (PRUint32)sizeof(CK_OBJECT_CLASS) },
 +  { (void *)&ck_true, (PRUint32)sizeof(CK_BBOOL) },
 +  { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
@@ -171,7 +171,7 @@
 +"\103"
 +, (PRUint32)1857 }
 +};
-+static const NSSItem nss_builtins_items_283 [] = {
++static const NSSItem nss_builtins_items_311 [] = {
 +  { (void *)&cko_netscape_trust, (PRUint32)sizeof(CK_OBJECT_CLASS) },
 +  { (void *)&ck_true, (PRUint32)sizeof(CK_BBOOL) },
 +  { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
@@ -198,7 +198,7 @@
 +  { (void *)&ckt_netscape_trusted_delegator, (PRUint32)sizeof(CK_TRUST) },
 +  { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }
 +};
-+static const NSSItem nss_builtins_items_284 [] = {
++static const NSSItem nss_builtins_items_312 [] = {
 +  { (void *)&cko_certificate, (PRUint32)sizeof(CK_OBJECT_CLASS) },
 +  { (void *)&ck_true, (PRUint32)sizeof(CK_BBOOL) },
 +  { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
@@ -323,7 +323,7 @@
 +"\322\156\245\033\231\047\200\347\013\251\250\000"
 +, (PRUint32)1548 }
 +};
-+static const NSSItem nss_builtins_items_285 [] = {
++static const NSSItem nss_builtins_items_313 [] = {
 +  { (void *)&cko_netscape_trust, (PRUint32)sizeof(CK_OBJECT_CLASS) },
 +  { (void *)&ck_true, (PRUint32)sizeof(CK_BBOOL) },
 +  { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
@@ -353,22 +353,22 @@
  
  builtinsInternalObject
  nss_builtins_data[] = {
-@@ -19239,11 +19577,15 @@ nss_builtins_data[] = {
-   { 11, nss_builtins_types_278, nss_builtins_items_278, {NULL} },
-   { 13, nss_builtins_types_279, nss_builtins_items_279, {NULL} },
-   { 11, nss_builtins_types_280, nss_builtins_items_280, {NULL} },
--  { 13, nss_builtins_types_281, nss_builtins_items_281, {NULL} }
-+  { 13, nss_builtins_types_281, nss_builtins_items_281, {NULL} },
-+  { 11, nss_builtins_types_282, nss_builtins_items_282, {NULL} },
-+  { 13, nss_builtins_types_283, nss_builtins_items_283, {NULL} },
-+  { 11, nss_builtins_types_284, nss_builtins_items_284, {NULL} },
-+  { 13, nss_builtins_types_285, nss_builtins_items_285, {NULL} }
+@@ -21088,11 +21426,15 @@ nss_builtins_data[] = {
+   { 11, nss_builtins_types_306, nss_builtins_items_306, {NULL} },
+   { 13, nss_builtins_types_307, nss_builtins_items_307, {NULL} },
+   { 11, nss_builtins_types_308, nss_builtins_items_308, {NULL} },
+-  { 13, nss_builtins_types_309, nss_builtins_items_309, {NULL} }
++  { 13, nss_builtins_types_309, nss_builtins_items_309, {NULL} },
++  { 11, nss_builtins_types_310, nss_builtins_items_310, {NULL} },
++  { 13, nss_builtins_types_311, nss_builtins_items_311, {NULL} },
++  { 11, nss_builtins_types_312, nss_builtins_items_312, {NULL} },
++  { 13, nss_builtins_types_313, nss_builtins_items_313, {NULL} }
  };
  const PRUint32
  #ifdef DEBUG
--  nss_builtins_nObjects = 281+1;
-+  nss_builtins_nObjects = 285+1;
+-  nss_builtins_nObjects = 309+1;
++  nss_builtins_nObjects = 313+1;
  #else
--  nss_builtins_nObjects = 281;
-+  nss_builtins_nObjects = 285;
+-  nss_builtins_nObjects = 309;
++  nss_builtins_nObjects = 313;
  #endif /* DEBUG */
Index: patches/patch-security_nss_lib_ckfw_builtins_certdata_txt
===================================================================
RCS file: 
/usr/cvs/ports/www/firefox35/patches/patch-security_nss_lib_ckfw_builtins_certdata_txt,v
retrieving revision 1.1
diff -u -r1.1 patch-security_nss_lib_ckfw_builtins_certdata_txt
--- patches/patch-security_nss_lib_ckfw_builtins_certdata_txt   19 Jul 2009 
18:38:08 -0000      1.1
+++ patches/patch-security_nss_lib_ckfw_builtins_certdata_txt   18 Feb 2010 
20:34:09 -0000
@@ -1,12 +1,10 @@
 $OpenBSD: patch-security_nss_lib_ckfw_builtins_certdata_txt,v 1.1 2009/07/19 
18:38:08 martynas Exp $
---- security/nss/lib/ckfw/builtins/certdata.txt.orig   Thu Jul 16 18:02:46 2009
-+++ security/nss/lib/ckfw/builtins/certdata.txt        Thu Jul 16 18:07:17 2009
-@@ -19536,3 +19536,349 @@ CKA_TRUST_SERVER_AUTH CK_TRUST 
CKT_NETSCAPE_TRUSTED_DE
- CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUST_UNKNOWN
- CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUST_UNKNOWN
+--- security/nss/lib/ckfw/builtins/certdata.txt.orig   Tue Feb  2 18:25:30 2010
++++ security/nss/lib/ckfw/builtins/certdata.txt        Thu Feb 18 15:26:27 2010
+@@ -19538,6 +19538,352 @@ CKA_TRUST_CODE_SIGNING CK_TRUST 
CKT_NETSCAPE_TRUST_UNK
  CKA_TRUST_STEP_UP_APPROVED CK_BBOOL CK_FALSE
-+
-+#
+ 
+ #
 +# Certificate "CAcert.org Class 1 Certification Authority"
 +#
 +CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE
@@ -351,3 +349,8 @@
 +CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
 +CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NETSCAPE_TRUSTED_DELEGATOR
 +CKA_TRUST_STEP_UP_APPROVED CK_BBOOL CK_FALSE
++
++#
+ # Certificate "ePKI Root Certification Authority"
+ #
+ CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE

Reply via email to