You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

92 lines
3.2 KiB

##
## svrcore.spec -- OpenPKG RPM Package Specification
## Copyright (c) 2000-2022 OpenPKG Project <http://openpkg.org/>
##
## Permission to use, copy, modify, and distribute this software for
## any purpose with or without fee is hereby granted, provided that
## the above copyright notice and this permission notice appear in all
## copies.
##
## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
## SUCH DAMAGE.
##
# package information
Name: svrcore
Summary: Mozilla NSS PIN Handling Library
URL: http://ftp.mozilla.org/pub/mozilla.org/directory/svrcore/
Vendor: Terry Hayes
Packager: OpenPKG Project
Distribution: OpenPKG Community
Class: EVAL
Group: Networking
License: MPL
Version: 4.0.4
Release: 20120715
# list of sources
Source0: http://ftp.mozilla.org/pub/mozilla.org/directory/svrcore/releases/%{version}/src/svrcore-%{version}.tar.bz2
Patch0: svrcore.patch
# build information
BuildPreReq: OpenPKG, openpkg >= 20160101
PreReq: OpenPKG, openpkg >= 20160101
BuildPreReq: nspr, nss
PreReq: nspr, nss
%description
Mozilla SVRCore is a kind of object-oriented C library for handling
PIN requests from Mozilla NSS. The idea was to provide a standard
way for servers to allow PIN input from a file or from the terminal.
There is also a PIN handler that caches the PIN in memory after
encrypting it with a key on a device (such as a Fortezza card).
This allowed a server to restart without having to reenter the
PIN. However since the PIN is encrypted, a core dump would not
expose it. In addition, removing the device would also make the PIN
inaccessible.
%track
prog svrcore = {
version = %{version}
url = http://ftp.mozilla.org/pub/mozilla.org/directory/svrcore/releases/
regex = (\d+\.\d+\.\d+)/
}
%prep
%setup -q
%patch -p0
%build
CC="%{l_cc}" \
CXX="%{l_cxx}" \
CFLAGS="%{l_cflags -O}" \
CXXFLAGS="%{l_cxxflags -O}" \
CPPFLAGS="%{l_cppflags}" \
LDFLAGS="%{l_ldflags}" \
./configure \
--prefix=%{l_prefix} \
--with-nspr-inc=%{l_prefix}/include/nspr \
--with-nspr-lib=%{l_prefix}/lib/nspr \
--with-nss-inc=%{l_prefix}/include/nss \
--with-nss-lib=%{l_prefix}/lib/nss \
--disable-shared
%{l_make} %{l_mflags -O}
%install
%{l_make} %{l_mflags} install AM_MAKEFLAGS="DESTDIR=$RPM_BUILD_ROOT"
%{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std}
%files -f files
%clean