From b0405c1271b8d801589657a40269e175ba73bca1 Mon Sep 17 00:00:00 2001 From: starlet-dx <15929766099@163.com> Date: Tue, 23 Sep 2025 11:17:05 +0800 Subject: [PATCH] Update to 3.1.3 --- ...3.1.1.tar.bz2 => 389-ds-base-3.1.3.tar.bz2 | 4 +- 389-ds-base.spec | 66 ++++-- CVE-2025-2487.patch | 215 ------------------ CVE-2025-24898.patch | 36 --- Issue-6415-BUG-Incorrect-icu-linking.patch | 33 --- backport-drop-python-setup-tools-dep.patch | 40 ---- ...ixgroup-get_dn-fails-with-search_ext.patch | 12 - ...-subtree-status-fails-with-TypeError.patch | 11 - 8 files changed, 45 insertions(+), 372 deletions(-) rename 389-ds-base-3.1.1.tar.bz2 => 389-ds-base-3.1.3.tar.bz2 (32%) delete mode 100644 CVE-2025-2487.patch delete mode 100644 CVE-2025-24898.patch delete mode 100644 Issue-6415-BUG-Incorrect-icu-linking.patch delete mode 100644 backport-drop-python-setup-tools-dep.patch delete mode 100644 fix-dsidm-posixgroup-get_dn-fails-with-search_ext.patch delete mode 100644 fix-dsidm-role-subtree-status-fails-with-TypeError.patch diff --git a/389-ds-base-3.1.1.tar.bz2 b/389-ds-base-3.1.3.tar.bz2 similarity index 32% rename from 389-ds-base-3.1.1.tar.bz2 rename to 389-ds-base-3.1.3.tar.bz2 index 2469f86..e90bb03 100644 --- a/389-ds-base-3.1.1.tar.bz2 +++ b/389-ds-base-3.1.3.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:e111c4bc3ad2efa5d73a7d7a18d03ff84ee53afa25b631a8a31cd19cb0fe854b -size 25024935 +oid sha256:009d181bb1027e2021c1b735b55390feeee09d00879fcfb647428fe8c9901c83 +size 25726470 diff --git a/389-ds-base.spec b/389-ds-base.spec index df8784f..04a25d4 100644 --- a/389-ds-base.spec +++ b/389-ds-base.spec @@ -5,26 +5,18 @@ ExcludeArch: i686 Name: 389-ds-base Summary: Base 389 Directory Server -Version: 3.1.1 -Release: 9 +Version: 3.1.3 +Release: 1 License: GPL-3.0-or-later URL: https://www.port389.org -Source0: https://releases.pagure.org/389-ds-base/389-ds-base-%{version}.tar.bz2 +Source0: https://github.com/389ds/389-ds-base/releases/download/%{name}-%{version}/%{name}-%{version}.tar.bz2 Source1: 389-ds-base-git.sh Source2: 389-ds-base-devel.README Source4: 389-ds-base.sysusers -# Refer: https://github.com/389ds/389-ds-base/pull/5374 -Patch0: fix-dsidm-posixgroup-get_dn-fails-with-search_ext.patch -Patch1: remove-where-cockpit_present-is-called.patch -Patch2: fix-dsidm-role-subtree-status-fails-with-TypeError.patch -# https://github.com/sfackler/rust-openssl/commit/f014afb230de4d77bc79dea60e7e58c2f47b60f2 -Patch3: CVE-2025-24898.patch -Patch4: CVE-2025-2487.patch -Patch5: backport-drop-python-setup-tools-dep.patch +Patch0: remove-where-cockpit_present-is-called.patch # https://github.com/389ds/389-ds-base/pull/6930 -Patch6: backport-Compilation-failure-with-rust-1.89.patch -Patch7: Issue-6415-BUG-Incorrect-icu-linking.patch +Patch1: backport-Compilation-failure-with-rust-1.89.patch BuildRequires: nspr-devel nss-devel >= 3.34 perl-generators openldap-devel libdb-devel cyrus-sasl-devel icu BuildRequires: libicu-devel pcre-devel cracklib-devel gcc-c++ net-snmp-devel lm_sensors-devel bzip2-devel @@ -41,6 +33,7 @@ BuildRequires: python3dist(distro) BuildRequires: python3dist(cryptography) BuildRequires: python%{python3_pkgversion}-libselinux python%{python3_pkgversion}-policycoreutils BuildRequires: lmdb-devel json-c-devel cargo +BuildRequires: python3-pip python3-wheel python3-psutil Requires: 389-ds-base-libs = %{version}-%{release} Requires: python%{python3_pkgversion}-lib389 = %{version}-%{release} Requires: policycoreutils-python-utils /usr/sbin/semanage libsemanage-python%{python3_pkgversion} @@ -138,9 +131,8 @@ autoreconf -fiv --with-systemdgroupname=dirsrv.target --libexecdir=%{_libexecdir}/dirsrv \ $NSSARGS $ASAN_FLAGS $RUST_FLAGS $PERL_FLAGS $CLANG_FLAGS $LEGACY_FLAGS --enable-cmocka --enable-perl --with-libldap-r=no -make src/lib389/setup.py cd ./src/lib389 -%py3_build +%pyproject_build cd - for f in "dsconf.8" "dsctl.8" "dsidm.8" "dscreate.8"; do sed -i "1s/\"1\"/\"8\"/" %{_builddir}/389-ds-base-%{version}/src/lib389/man/$f @@ -158,7 +150,7 @@ find %{buildroot}%{_datadir}/cockpit/389-console -type f | sed -e "s@%{buildroot cp -r %{_builddir}/389-ds-base-%{version}/man/man3 $RPM_BUILD_ROOT/%{_mandir}/man3 cd src/lib389 -%py3_install +%pyproject_install cd - for t in "log" "lib" "lock"; do @@ -277,22 +269,33 @@ exit 0 %files %doc LICENSE LICENSE.GPLv3+ LICENSE.openssl %{_libdir}/libsvrcore.so.* -%{_libdir}/dirsrv/{libslapd.so.*,libns-dshttpd.so.*,libsds.so.*,libldaputil.so.*,librewriters.so*} +%{_libdir}/dirsrv/libslapd.so.* +%{_libdir}/dirsrv/libns-dshttpd.so.* +%{_libdir}/dirsrv/libldaputil.so.* +%{_libdir}/dirsrv/librewriters.so* %dir %{_sysconfdir}/dirsrv %dir %{_sysconfdir}/dirsrv/schema %config(noreplace)%{_sysconfdir}/dirsrv/schema/*.ldif %dir %{_sysconfdir}/dirsrv/config %dir %{_sysconfdir}/systemd/system/dirsrv.target.wants %{_sysusersdir}/389-ds-base.conf -%config(noreplace)%{_sysconfdir}/dirsrv/config/{slapd-collations.conf,certmap.conf,template-initconfig} +%config(noreplace)%{_sysconfdir}/dirsrv/config/slapd-collations.conf +%config(noreplace)%{_sysconfdir}/dirsrv/config/certmap.conf %{_datadir}/dirsrv %{_datadir}/gdb/auto-load/* %{_unitdir} -%{_bindir}/{dbscan,ds-replcheck,ds-logpipe.py,ldclt,logconv.pl,pwdhash} +%{_bindir}/dbscan +%{_bindir}/ds-replcheck +%{_bindir}/ds-logpipe.py +%{_bindir}/ldclt +%{_bindir}/logconv.pl +%{_bindir}/pwdhash %{_sbindir}/ns-slapd %{_mandir}/man8/ns-slapd.8.gz -%{_sbindir}/openldap_to_ds +%{_bindir}/openldap_to_ds %{_mandir}/man8/openldap_to_ds.8.gz +%{_bindir}/logconv.py +%{_mandir}/man1/logconv.py.1.gz %{_libexecdir}/dirsrv/ds_systemd_ask_password_acl %{_libexecdir}/dirsrv/ds_selinux_restorecon.sh %{_libdir}/dirsrv/python @@ -312,8 +315,11 @@ exit 0 %{_includedir}/svrcore.h %{_includedir}/dirsrv %{_libdir}/libsvrcore.so -%{_libdir}/dirsrv/{libslapd.so,libns-dshttpd.so,libsds.so,libldaputil.so} -%{_libdir}/pkgconfig/{svrcore.pc,dirsrv.pc,libsds.pc} +%{_libdir}/dirsrv/libslapd.so +%{_libdir}/dirsrv/libns-dshttpd.so +%{_libdir}/dirsrv/libldaputil.so +%{_libdir}/pkgconfig/svrcore.pc +%{_libdir}/pkgconfig/dirsrv.pc %files snmp %doc LICENSE LICENSE.GPLv3+ LICENSE.openssl @@ -324,7 +330,10 @@ exit 0 %files -n python%{python3_pkgversion}-lib389 %doc LICENSE LICENSE.GPLv3+ %{python3_sitelib}/lib389* -%{_sbindir}/{dsconf,dscreate,dsctl,dsidm} +%{_bindir}/dsconf +%{_bindir}/dscreate +%{_bindir}/dsctl +%{_bindir}/dsidm %{_libexecdir}/dirsrv/dscontainer %files -n cockpit-389-ds -f cockpit.list @@ -335,6 +344,17 @@ exit 0 %{_mandir}/*/* %changelog +* Tue Sep 23 2025 yaoxin <1024769339@qq.com> - 3.1.3-1 +- Update to 3.1.3: + * Issue 6825 - RootDN Access Control Plugin with wildcards for IP addresses + fails withi an error "Invalid IP address" + * Issue 6819 - Incorrect pwdpolicysubentry returned for an entry with user + password policy + * Issue 6761 - Password modify extended operation should skip password + policy checks when executed by root DN + * Issue 6791 - crash in liblmdb during instance shutdown + * Issue 6641 - modrdn fails when a user is member of multiple groups + * Thu Aug 14 2025 yaoxin <1024769339@qq.com> - 3.1.1-9 - Correct configure.ac to request linking to icu-uc diff --git a/CVE-2025-2487.patch b/CVE-2025-2487.patch deleted file mode 100644 index be502d2..0000000 --- a/CVE-2025-2487.patch +++ /dev/null @@ -1,215 +0,0 @@ -From 7fbd4526c42806826ca1b335c5686b054486e613 Mon Sep 17 00:00:00 2001 -From: Pierre Rogier -Date: Thu, 27 Feb 2025 16:36:48 +0100 -Subject: [PATCH] Security fix for CVE-2025-2487 - -Origin: https://github.com/389ds/389-ds-base/commit/40e752922e6160356399cd07169ec1f76dd7db99 - -Description: -A denial of service vulnerability was found in the 389 Directory Server. -The 389 Directory Server may crash (Null Pointer Exception) after some -failed rename subtree operations (i.e. MODDN) issued by a user having enough -privileges to do so. - -References: -- https://access.redhat.com/security/cve/CVE-2025-2487 -- https://bugzilla.redhat.com/show_bug.cgi?id=2353071 ---- - ldap/servers/slapd/back-ldbm/findentry.c | 36 +++++++++++++++++----- - ldap/servers/slapd/back-ldbm/ldbm_add.c | 2 ++ - ldap/servers/slapd/back-ldbm/ldbm_modify.c | 6 ++++ - ldap/servers/slapd/back-ldbm/ldbm_modrdn.c | 13 ++++++-- - 4 files changed, 48 insertions(+), 9 deletions(-) - -diff --git a/ldap/servers/slapd/back-ldbm/findentry.c b/ldap/servers/slapd/back-ldbm/findentry.c -index 7bb56ef2c4..907b4367a1 100644 ---- a/ldap/servers/slapd/back-ldbm/findentry.c -+++ b/ldap/servers/slapd/back-ldbm/findentry.c -@@ -99,6 +99,7 @@ find_entry_internal_dn( - int isroot = 0; - int op_type; - int reverted_entry = 0; -+ int return_err = LDAP_SUCCESS; - - /* get the managedsait ldap message control */ - slapi_pblock_get(pb, SLAPI_MANAGEDSAIT, &managedsait); -@@ -121,6 +122,7 @@ find_entry_internal_dn( - if (rc) { /* if check_entry_for_referral returns non-zero, result is sent. */ - *rc = FE_RC_SENT_RESULT; - } -+ slapi_set_ldap_result(pb, LDAP_REFERRAL, NULL, NULL, 0, NULL); - return (NULL); - } - } -@@ -153,7 +155,12 @@ find_entry_internal_dn( - slapi_log_err(SLAPI_LOG_ERR, "find_entry_internal_dn", "Retry count exceeded (%s)\n", slapi_sdn_get_dn(sdn)); - } - if (reverted_entry) { -+ CACHE_RETURN(&inst->inst_cache, &e); -+ slapi_set_ldap_result(pb, LDAP_BUSY, NULL, NULL, 0, NULL); - slapi_send_ldap_result(pb, LDAP_BUSY, NULL, "target entry busy because of a canceled operation", 0, NULL); -+ if (rc) { -+ *rc = FE_RC_SENT_RESULT; /* Result is sent */ -+ } - return (NULL); - } - /* -@@ -179,6 +186,7 @@ find_entry_internal_dn( - if (rc) { /* if check_entry_for_referral returns non-zero, result is sent. */ - *rc = FE_RC_SENT_RESULT; - } -+ slapi_set_ldap_result(pb, LDAP_REFERRAL, NULL, NULL, 0, NULL); - return (NULL); - } - /* else fall through to no such object */ -@@ -189,7 +197,7 @@ find_entry_internal_dn( - if (me && !isroot) { - /* If not root, you may not want to reveal it. */ - int acl_type = -1; -- int return_err = LDAP_NO_SUCH_OBJECT; -+ return_err = LDAP_NO_SUCH_OBJECT; - err = LDAP_SUCCESS; - switch (op_type) { - case SLAPI_OPERATION_ADD: -@@ -230,18 +238,22 @@ find_entry_internal_dn( - * do not return the "matched" DN. - * Plus, the bind case returns LDAP_INAPPROPRIATE_AUTH. - */ -+ slapi_set_ldap_result(pb, return_err, NULL, NULL, 0, NULL); - slapi_send_ldap_result(pb, return_err, NULL, NULL, 0, NULL); - } else { -+ slapi_set_ldap_result(pb, LDAP_NO_SUCH_OBJECT, NULL, NULL, 0, NULL); - slapi_send_ldap_result(pb, LDAP_NO_SUCH_OBJECT, - (char *)slapi_sdn_get_dn(&ancestorsdn), NULL, 0, NULL); - } - } else { -+ slapi_set_ldap_result(pb, LDAP_NO_SUCH_OBJECT, NULL, NULL, 0, NULL); - slapi_send_ldap_result(pb, LDAP_NO_SUCH_OBJECT, - (char *)slapi_sdn_get_dn(&ancestorsdn), NULL, 0, NULL); - } - } else { -- slapi_send_ldap_result(pb, (LDAP_INVALID_DN_SYNTAX == err) ? LDAP_INVALID_DN_SYNTAX : LDAP_OPERATIONS_ERROR, -- (char *)slapi_sdn_get_dn(&ancestorsdn), NULL, 0, NULL); -+ return_err = (LDAP_INVALID_DN_SYNTAX == err) ? LDAP_INVALID_DN_SYNTAX : LDAP_OPERATIONS_ERROR; -+ slapi_set_ldap_result(pb, return_err, NULL, NULL, 0, NULL); -+ slapi_send_ldap_result(pb, return_err, (char *)slapi_sdn_get_dn(&ancestorsdn), NULL, 0, NULL); - } - if (rc) { - *rc = FE_RC_SENT_RESULT; -@@ -265,13 +277,15 @@ find_entry_internal_uniqueid( - backend *be, - const char *uniqueid, - int lock, -- back_txn *txn) -+ back_txn *txn, -+ int *rc) - { - ldbm_instance *inst = (ldbm_instance *)be->be_instance_info; - struct backentry *e; - int err; - size_t tries = 0; - int reverted_entry = 0; -+ int return_err = 0; - - while ((tries < LDBM_CACHE_RETRY_COUNT) && - (e = uniqueid2entry(be, uniqueid, txn, &err)) != NULL) { -@@ -307,12 +321,20 @@ find_entry_internal_uniqueid( - } - - if (reverted_entry) { -+ slapi_set_ldap_result(pb, LDAP_BUSY, NULL, NULL, 0, NULL); - slapi_send_ldap_result(pb, LDAP_BUSY, NULL, "target entry busy because of a canceled operation", 0, NULL); -+ if (rc) { -+ *rc = FE_RC_SENT_RESULT; /* Result is sent */ -+ } - return (NULL); - } else { - /* entry not found */ -- slapi_send_ldap_result(pb, (0 == err || DBI_RC_NOTFOUND == err) ? LDAP_NO_SUCH_OBJECT : LDAP_OPERATIONS_ERROR, NULL /* matched */, NULL, -- 0, NULL); -+ return_err = (0 == err || DBI_RC_NOTFOUND == err) ? LDAP_NO_SUCH_OBJECT : LDAP_OPERATIONS_ERROR; -+ slapi_set_ldap_result(pb, return_err, NULL, NULL, 0, NULL); -+ slapi_send_ldap_result(pb, return_err, NULL /* matched */, NULL, 0, NULL); -+ if (rc) { -+ *rc = FE_RC_SENT_RESULT; /* Result is sent */ -+ } - } - slapi_log_err(SLAPI_LOG_TRACE, - "find_entry_internal_uniqueid", "<= not found; uniqueid = (%s)\n", -@@ -334,7 +356,7 @@ find_entry_internal( - if (addr->uniqueid != NULL) { - slapi_log_err(SLAPI_LOG_TRACE, "find_entry_internal", "=> (uniqueid=%s) lock %d\n", - addr->uniqueid, lock); -- return (find_entry_internal_uniqueid(pb, be, addr->uniqueid, lock, txn)); -+ return (find_entry_internal_uniqueid(pb, be, addr->uniqueid, lock, txn, rc)); - } else { - struct backentry *entry = NULL; - -diff --git a/ldap/servers/slapd/back-ldbm/ldbm_add.c b/ldap/servers/slapd/back-ldbm/ldbm_add.c -index 4a5ed025ee..6a41740524 100644 ---- a/ldap/servers/slapd/back-ldbm/ldbm_add.c -+++ b/ldap/servers/slapd/back-ldbm/ldbm_add.c -@@ -435,6 +435,8 @@ ldbm_back_add(Slapi_PBlock *pb) - slapi_log_err(SLAPI_LOG_BACKLDBM, "ldbm_back_add", - "find_entry2modify_only returned NULL parententry pdn: %s, uniqueid: %s\n", - slapi_sdn_get_dn(&parentsdn), addr.uniqueid ? addr.uniqueid : "none"); -+ slapi_pblock_get(pb, SLAPI_RESULT_CODE, &ldap_result_code); -+ goto error_return; - } - modify_init(&parent_modify_c, parententry); - } -diff --git a/ldap/servers/slapd/back-ldbm/ldbm_modify.c b/ldap/servers/slapd/back-ldbm/ldbm_modify.c -index 6c90389f5a..ea49a4c567 100644 ---- a/ldap/servers/slapd/back-ldbm/ldbm_modify.c -+++ b/ldap/servers/slapd/back-ldbm/ldbm_modify.c -@@ -177,6 +177,12 @@ modify_update_all(backend *be, Slapi_PBlock *pb, modify_context *mc, back_txn *t - slapi_pblock_get(pb, SLAPI_OPERATION, &operation); - is_ruv = operation_is_flag_set(operation, OP_FLAG_REPL_RUV); - } -+ if (NULL == mc->new_entry) { -+ /* test entry to avoid crashing in id2entry_add_ext */ -+ slapi_log_err(SLAPI_LOG_BACKLDBM, "modify_update_all", -+ "No entry in modify_context ==> operation is aborted.\n"); -+ return -1; -+ } - /* - * Update the ID to Entry index. - * Note that id2entry_add replaces the entry, so the Entry ID stays the same. -diff --git a/ldap/servers/slapd/back-ldbm/ldbm_modrdn.c b/ldap/servers/slapd/back-ldbm/ldbm_modrdn.c -index 78d01fa4e0..066f53ad67 100644 ---- a/ldap/servers/slapd/back-ldbm/ldbm_modrdn.c -+++ b/ldap/servers/slapd/back-ldbm/ldbm_modrdn.c -@@ -485,8 +485,8 @@ ldbm_back_modrdn(Slapi_PBlock *pb) - slapi_pblock_get(pb, SLAPI_TARGET_ADDRESS, &old_addr); - e = find_entry2modify(pb, be, old_addr, &txn, &result_sent); - if (e == NULL) { -- ldap_result_code = -1; -- goto error_return; /* error result sent by find_entry2modify() */ -+ slapi_pblock_get(pb, SLAPI_RESULT_CODE, &ldap_result_code); -+ goto error_return; /* error result set and sent by find_entry2modify() */ - } - if (slapi_entry_flag_is_set(e->ep_entry, SLAPI_ENTRY_FLAG_TOMBSTONE) && - !is_resurect_operation) { -@@ -518,6 +518,11 @@ ldbm_back_modrdn(Slapi_PBlock *pb) - oldparent_addr.uniqueid = NULL; - } - parententry = find_entry2modify_only(pb, be, &oldparent_addr, &txn, &result_sent); -+ if (parententry == NULL) { -+ slapi_pblock_get(pb, SLAPI_RESULT_CODE, &ldap_result_code); -+ goto error_return; /* error result set and sent by find_entry2modify() */ -+ } -+ - modify_init(&parent_modify_context, parententry); - - /* Fetch and lock the new parent of the entry that is moving */ -@@ -528,6 +533,10 @@ ldbm_back_modrdn(Slapi_PBlock *pb) - } - newparententry = find_entry2modify_only(pb, be, newsuperior_addr, &txn, &result_sent); - slapi_ch_free_string(&newsuperior_addr->uniqueid); -+ if (newparententry == NULL) { -+ slapi_pblock_get(pb, SLAPI_RESULT_CODE, &ldap_result_code); -+ goto error_return; /* error result set and sent by find_entry2modify() */ -+ } - modify_init(&newparent_modify_context, newparententry); - } - diff --git a/CVE-2025-24898.patch b/CVE-2025-24898.patch deleted file mode 100644 index 6841c3e..0000000 --- a/CVE-2025-24898.patch +++ /dev/null @@ -1,36 +0,0 @@ -From 8e6e30bbf7e7627845b801f83a3810d6ffc1f157 Mon Sep 17 00:00:00 2001 -From: Steven Fackler -Date: Sun, 2 Feb 2025 12:19:46 -0500 -Subject: [PATCH] Fix lifetimes in ssl::select_next_proto - -Origin: -https://github.com/sfackler/rust-openssl/commit/f014afb230de4d77bc79dea60e7e58c2f47b60f2 ---- - vendor/openssl/.cargo-checksum.json | 2 +- - vendor/openssl/src/ssl/mod.rs | 2 +- - 2 files changed, 2 insertions(+), 2 deletions(-) - -diff --git a/vendor/openssl/.cargo-checksum.json b/vendor/openssl/.cargo-checksum.json -index 80bade8..19dc38e 100644 ---- a/vendor/openssl/.cargo-checksum.json -+++ b/vendor/openssl/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"CHANGELOG.md":"2e890996f61f7bf0f5eff5b1722c1b11da46315a5eea26fb8d94f21609066560","Cargo.lock":"884becf9d65fb50d031dca2e7ce85f14363f6a06a525e52b2df00eb95b2def86","Cargo.toml":"2a879f9fdfe0600ce7c54bf0c048a9e82a6b538884e3323ced6b321643060c56","LICENSE":"f3d4287b4a21c5176fea2f9bd4ae800696004e2fb8e05cbc818be513f188a941","README.md":"c5ddde25c2756a1115daaa671fb4297cdc83bf23009c8356ba65b5311d0dd30d","build.rs":"04a0d492f539b96444229d03c977386fc6360a03eca34bdb2a064e439ee45b85","examples/mk_certs.rs":"012569fc734c314c5d3c1c9dc8ae64a32db4cfa917e8fbc363c1eef118600d0a","src/aes.rs":"c1ad71fc0a76dd7fbb07864583e47c7da8764f8e6029a4ff8c310bf2fde63e15","src/asn1.rs":"d250233df5913879a6dc205e16f2404bd7512e29a2b8dab2b9ea83c670ee85be","src/base64.rs":"9087b546206c3a824aec3af6cf0e54d890515cc62d859951fd46ef72fbeba3aa","src/bio.rs":"ea03f0d3fbbf9538277e304738e95cbb844c2796057d9abd126b6ebac6140367","src/bn.rs":"42c3a1798f70b9f797de78a238d0b05a706df71c980714611ff53888ec7315eb","src/cipher.rs":"3bf4595773be7c5f292b671c9272979d2b300b0e2961e14d3aa0d1c03a24b83d","src/cipher_ctx.rs":"01ffd0005693695c41e5dd1d86b448bca4808e43d5778c5b9f707c1e867a75bb","src/cms.rs":"0dfa2f1134b84de1c7c9a8ad78ad2b8cd773cea75c9b80cf57bcf181f7ed4573","src/conf.rs":"c374003c606c331fedbe9075abfaf41eba38bfbbbefe9c9f2d2a1d445e4b1606","src/derive.rs":"963694c3cf7b0b70802b5b2b3f93f857ed7b320d5db331b57c2ff11bcb0891ad","src/dh.rs":"e9fc6d5910241a6cba0b7c6ce4139ba8cbd04be7de5c92a479406ddc79a581cd","src/dsa.rs":"10b6aca140fe332cb35c78cb3b0e9f1aa7cf18971059ac93a9a458481de26f85","src/ec.rs":"43142ab898dd4dc25efd7cd5c081be4f1a65c39d48e715fa3a208c7a2c5cb534","src/ecdsa.rs":"895136cad2a938f6a274e56fe2218e0bf066d4df33f5ad77c98d50921a25f50a","src/encrypt.rs":"d1c6de4f5998f06d33de66005a1926eab895f0ecff01396b46dc697dc1593b26","src/envelope.rs":"d842c52a3297620121446514b57b6441e88faf5c48d98ae723f4e05164ea0a2b","src/error.rs":"ede27beebf1594a9165f16aa8732816f28501a8454d3125b6eb5ce98756e0255","src/ex_data.rs":"0a58a3a274a4ef2251dadb64cbcd44b43710d252201b137ecfb91cf14373c04f","src/fips.rs":"761cd7cdfbc16af88fbfefd38e54cb77b4ba8e2f49221607e145bc541f089d7e","src/hash.rs":"f8c18f3095236d7ea9ee5be244032207b6bf5b97ddfbb960ab0800c5f72a6244","src/lib.rs":"a4e1994538c5a18371edf46439a253a488fff0b94692208796b782d6ab0b0030","src/lib_ctx.rs":"ec6431adad53f3a9621b011506678104bd4f62bdea38ef9d1b731334507ab068","src/macros.rs":"fc83887358d36f7edd61f2718e0d7a83161b1c23eccbf782fd2918b34a8f5a12","src/md.rs":"fd241588f1c5860ee43b1abd74952a74e2c0432c045ded4b2950a419bb4597ee","src/md_ctx.rs":"a00fbe465477fd1209fffd7b83eebb1e86af2bfd3acf2c1ca691f19da1a5b35f","src/memcmp.rs":"f48e0e29f372db2d0eb2239290abec8819300eb3e01e3bb1030783d6f6a8b2c9","src/nid.rs":"8ed819d454abb0e531d5dd359bc6ca8c16c7c48ec8cf07dd52e59a7bebd1d77a","src/ocsp.rs":"bfb378fa87945eee583521e350f427406888bbb8a804a90aeb06bdbf1b656ddf","src/pkcs12.rs":"b4171fa4423eaf8e1b060cf68f9b85fe0bc84d6c5fe23dabf3ddb0fed9a8cb23","src/pkcs5.rs":"5afbbb784714cde2fb39b34c867db7a600c0cd0f1173d1971ec645f9c3376caf","src/pkcs7.rs":"24431303749047c08aad278f53ea47d6e47130318d368dd5213194e27bd58620","src/pkey.rs":"c500536756324354aa698509ca03f488cf180e3eba9c3b1ba198e68b991eb22f","src/pkey_ctx.rs":"0da4de8cc6cd814133a96a941ace5dbc76ea8b19f145ae71a150f32e2397aa8a","src/provider.rs":"5ab0b25e8866ecea327ad764d44594912f1dc09eb73c3ed5db134714e9f4b73e","src/rand.rs":"4007c6e88a8e875fb8eb475895ba5579e2e789634536303ea8e99ec1866b71a3","src/rsa.rs":"b972ab6ee3c3ad70314959eb5cda6a2251f514bf12d88551ce7746b4e9024294","src/sha.rs":"c34f2f9df5fb52b578022568e195e011d0967f9f5ff57b559d7d2a235951a5b9","src/sign.rs":"9af5544b9c5d81c494ba055c247c8d152e5853a26efa60ff7c1788b569225fd9","src/srtp.rs":"3defe1815cfc790e2407ff935f8ca7b0e8d504242886e8841715279e0d85f721","src/ssl/bio.rs":"4677c018ebc35a1c31fc92a3fd180e03b00fdc031aa7464d4ee53d0e4d5c78d3","src/ssl/callbacks.rs":"3b5530c06709705b1a216913f2f5a900ea6d9baa9d497d7c8bd5f2fefa53c8d5","src/ssl/connector.rs":"32afe0925584b349b3595aaabd0dadbf6ab383b5879c49c68ad2d0fddf0b0e4a","src/ssl/error.rs":"f39ac3e1037a35ae5cccbf5cf5976044614a6368c9ffe3f1b96bead63c0c4231","src/ssl/mod.rs":"ede8850d07edf6033d0b3b34ef001ff5b621eb6f9c5ed1d02eadc75f5297b4e7","src/ssl/test/mod.rs":"0bf87ab47287ce40f1317016beeb54602a9a5836d00e0424072e67bedafa9c35","src/ssl/test/server.rs":"4276ba970a0fac5c9cae21d7df7af36389c377472f3546ce597678ffc6ad5b38","src/stack.rs":"ce68f06b3fa7135798d9af3489a2412823cfcd39984931b39d68be387f8fb5ac","src/string.rs":"8276d719b35cd74ee0efbecce9e58e754d50d8cc96111f2febd3c0d8849847a8","src/symm.rs":"87abe78720dc89710369a4fe8c74faa52c4226a118add635bc6458cb7db03c66","src/util.rs":"e6794bf0643d0c29e96325653f2bb4a00221de55bb5b3c6c96d5dbae3debe238","src/version.rs":"e3acbb0db2095ab616870055c7c7a902fb7b1439520574fd20b7c1164b1178b7","src/x509/extension.rs":"26a265248eb0e54c3b106708f8fce7d5fb5b91b7195f17a97e1b8b1d3b6fa119","src/x509/mod.rs":"1de4893a55ca91296216a052d14d1319fe180cd7b792fa3593de3fa7cc4f1dee","src/x509/store.rs":"e42823f931ce2b6e4bac5f7314f3790c70dd12002398da03a2ebecd96f248c98","src/x509/tests.rs":"efd1573171de75b70416a8d2f708e457601fc64c472fdb5507e32f74f4968fd0","src/x509/verify.rs":"9db665ffccecfd8a29874f8f4b0b3c09d195899daaa927dffdf57d6e9d32403e","test/aia_test_cert.pem":"9eaf52b5d0023f3be7911938d937ed16fc75d43d14dbe41557a800b0a82f4b1b","test/alt_name_cert.pem":"f3cc0a1d21657164918dffab0dac8f1c499fc1cf5717805420a0134b3aee128c","test/authority_key_identifier.pem":"4644b83bbcd36a6e1917d1f7bd3b8ff913bf86cc74917c07dd78b6731b4d5bec","test/ca.crt":"70bcf52acc79191409801e72371db3a0cd8a27c0fc24eacb3fb8f8ab3e558f67","test/cert.pem":"53c8b338be254490c71a6b13da90dc5a59ba596587c548be5673657e04824afb","test/certs.pem":"106d5d22c86e26c3db619b9525567f22333d22de82e4d2850ed379150c638008","test/certv3.pem":"c230b76b6efb973816d0e3096ae95cdcf4941ec928c01c31b6537d01743fcd8a","test/certv3_extfile":"610fdc10edac2da398a582895e53d288d3e47a9d4f3868c2c7f7662c212b60bd","test/cms.p12":"d33fc5edd6b9caa672e7570b869135235bb2583580a273f6e88c6a6c68fd5a8a","test/cms_pubkey.der":"03682a732e1fd861f5fa687915a8e6f5c935d10273b0f6f73f3db52a8d71fc6d","test/crl-ca.crt":"911360ccdf700fd7d6091bd78c4138da0e9f027ca211f7ed80b394e570eb897c","test/csr.pem":"24423008144c43cf33f56ebcc245931b2d61bcd4eee17b476d7adb6f7416e24d","test/dhparams.pem":"14d9461949d9ae8ca50a393b008ee2168254f14342b0e17b56c0a62d2905b963","test/dsa.pem":"826d513234205fd3dee0bbbf844f0b6fea501145bdf05ea3b14e14df98cbe090","test/dsa.pem.pub":"721677bebf9ab28b8650f98a0cd27658de0c1acd867a4b6e985fe1df95a8bd37","test/dsaparam.pem":"94a1284bdd7d7566151cfde0c7f245e84f7b99ba840f202e3f27ea0160f82988","test/entry_extensions.crl":"bee73d33a326bde92d3c38f275b3f94943e46cf778d7043e1176e84413dc22e9","test/identity.p12":"aceeb3e5516471bd5af9a44bbeffc9559c4f228f67c677d29f36a4b368e2779f","test/intermediate-ca.key":"a5f3d331af87c1305843e235841e494a0669a95d3824a6c766d09371f62c3bab","test/intermediate-ca.pem":"5ff8055325d0cbb60586f4e20bd2df7718e4d94f5261f2ee05ba52a8fb9223f0","test/key.der":"e8842cd6674b5c77a83e0283cd876a91de404561dfc86d79ce525f6e55b28197","test/key.der.pub":"e559d56bb6ec57ad743dbf972bbcaf263a9fa7d320433baa71b04f849d987060","test/key.pem":"12d9105a92bf39b615ccb4820c5c1e38c61905483cd30be13f9ab99b98af64ed","test/key.pem.pub":"f5d030df843ddbaba5bf316ae18f1434de5a63a955be66442429dd4f16f161ef","test/keystore-empty-chain.p12":"bbea280f6fe10556d7470df7072ef0e4ee3997e2c0b3666197f423430c0e6b61","test/leaf.pem":"4f2c3fd02f73b3f49a1e05cf0622669ed014ba019876d89d3f21c788457c1e01","test/nid_test_cert.pem":"7047e8d317e284c6b698eee4a0f1a629d50cd4615ad7da85fe90a2ffb6c21611","test/nid_uid_test_cert.pem":"a735211f3b40edbde7084337138fb0aea06aea6c78369c52015253e4b7a17d83","test/pkcs1.pem.pub":"4d446864b63c4178ec2c7dc8df9b7121d9271851c1f4701231fccb8b07c94918","test/pkcs8-nocrypt.der":"5590d03cc0d037c6c27d78fafc937f48defb226e9a52cde84d54df68086d0575","test/pkcs8.der":"8719fc002d59313fb97e46e068ae40db4d9acc0e2debd308ac9eb46329bea487","test/root-ca.key":"b37cf88614980c38e43c4329cdf7162bae48cc8af1fafd54db2fe0d17e458e1d","test/root-ca.pem":"59b9200c35e818bf21be4aaa97ba87bb6a18fd780527a9f9c51cc74212c631a0","test/rsa-encrypted.pem":"ea41b0f1816056672de6abbab43d0e8089da047c329ceed14aace5a5bde713f1","test/rsa.pem":"f866a5506ea9a37ed2f73f62f503e1aff32f7e4145be62b023535f4da1c24416","test/rsa.pem.pub":"2c5eeea39708e90396f9f09d920f2af8b7e9f84ace963c1319072224dd3d302b","test/subca.crt":"70bcf52acc79191409801e72371db3a0cd8a27c0fc24eacb3fb8f8ab3e558f67","test/test.crl":"ac8443257214f9e82543871c3df48694ea39f2b16bd6c4ef5998a161edbb8fba"},"package":"9529f4786b70a3e8c61e11179af17ab6188ad8d0ded78c5529441ed39d4bd9c1"} -\ No newline at end of file -+{"files":{"CHANGELOG.md":"2e890996f61f7bf0f5eff5b1722c1b11da46315a5eea26fb8d94f21609066560","Cargo.lock":"884becf9d65fb50d031dca2e7ce85f14363f6a06a525e52b2df00eb95b2def86","Cargo.toml":"2a879f9fdfe0600ce7c54bf0c048a9e82a6b538884e3323ced6b321643060c56","LICENSE":"f3d4287b4a21c5176fea2f9bd4ae800696004e2fb8e05cbc818be513f188a941","README.md":"c5ddde25c2756a1115daaa671fb4297cdc83bf23009c8356ba65b5311d0dd30d","build.rs":"04a0d492f539b96444229d03c977386fc6360a03eca34bdb2a064e439ee45b85","examples/mk_certs.rs":"012569fc734c314c5d3c1c9dc8ae64a32db4cfa917e8fbc363c1eef118600d0a","src/aes.rs":"c1ad71fc0a76dd7fbb07864583e47c7da8764f8e6029a4ff8c310bf2fde63e15","src/asn1.rs":"d250233df5913879a6dc205e16f2404bd7512e29a2b8dab2b9ea83c670ee85be","src/base64.rs":"9087b546206c3a824aec3af6cf0e54d890515cc62d859951fd46ef72fbeba3aa","src/bio.rs":"ea03f0d3fbbf9538277e304738e95cbb844c2796057d9abd126b6ebac6140367","src/bn.rs":"42c3a1798f70b9f797de78a238d0b05a706df71c980714611ff53888ec7315eb","src/cipher.rs":"3bf4595773be7c5f292b671c9272979d2b300b0e2961e14d3aa0d1c03a24b83d","src/cipher_ctx.rs":"01ffd0005693695c41e5dd1d86b448bca4808e43d5778c5b9f707c1e867a75bb","src/cms.rs":"0dfa2f1134b84de1c7c9a8ad78ad2b8cd773cea75c9b80cf57bcf181f7ed4573","src/conf.rs":"c374003c606c331fedbe9075abfaf41eba38bfbbbefe9c9f2d2a1d445e4b1606","src/derive.rs":"963694c3cf7b0b70802b5b2b3f93f857ed7b320d5db331b57c2ff11bcb0891ad","src/dh.rs":"e9fc6d5910241a6cba0b7c6ce4139ba8cbd04be7de5c92a479406ddc79a581cd","src/dsa.rs":"10b6aca140fe332cb35c78cb3b0e9f1aa7cf18971059ac93a9a458481de26f85","src/ec.rs":"43142ab898dd4dc25efd7cd5c081be4f1a65c39d48e715fa3a208c7a2c5cb534","src/ecdsa.rs":"895136cad2a938f6a274e56fe2218e0bf066d4df33f5ad77c98d50921a25f50a","src/encrypt.rs":"d1c6de4f5998f06d33de66005a1926eab895f0ecff01396b46dc697dc1593b26","src/envelope.rs":"d842c52a3297620121446514b57b6441e88faf5c48d98ae723f4e05164ea0a2b","src/error.rs":"ede27beebf1594a9165f16aa8732816f28501a8454d3125b6eb5ce98756e0255","src/ex_data.rs":"0a58a3a274a4ef2251dadb64cbcd44b43710d252201b137ecfb91cf14373c04f","src/fips.rs":"761cd7cdfbc16af88fbfefd38e54cb77b4ba8e2f49221607e145bc541f089d7e","src/hash.rs":"f8c18f3095236d7ea9ee5be244032207b6bf5b97ddfbb960ab0800c5f72a6244","src/lib.rs":"a4e1994538c5a18371edf46439a253a488fff0b94692208796b782d6ab0b0030","src/lib_ctx.rs":"ec6431adad53f3a9621b011506678104bd4f62bdea38ef9d1b731334507ab068","src/macros.rs":"fc83887358d36f7edd61f2718e0d7a83161b1c23eccbf782fd2918b34a8f5a12","src/md.rs":"fd241588f1c5860ee43b1abd74952a74e2c0432c045ded4b2950a419bb4597ee","src/md_ctx.rs":"a00fbe465477fd1209fffd7b83eebb1e86af2bfd3acf2c1ca691f19da1a5b35f","src/memcmp.rs":"f48e0e29f372db2d0eb2239290abec8819300eb3e01e3bb1030783d6f6a8b2c9","src/nid.rs":"8ed819d454abb0e531d5dd359bc6ca8c16c7c48ec8cf07dd52e59a7bebd1d77a","src/ocsp.rs":"bfb378fa87945eee583521e350f427406888bbb8a804a90aeb06bdbf1b656ddf","src/pkcs12.rs":"b4171fa4423eaf8e1b060cf68f9b85fe0bc84d6c5fe23dabf3ddb0fed9a8cb23","src/pkcs5.rs":"5afbbb784714cde2fb39b34c867db7a600c0cd0f1173d1971ec645f9c3376caf","src/pkcs7.rs":"24431303749047c08aad278f53ea47d6e47130318d368dd5213194e27bd58620","src/pkey.rs":"c500536756324354aa698509ca03f488cf180e3eba9c3b1ba198e68b991eb22f","src/pkey_ctx.rs":"0da4de8cc6cd814133a96a941ace5dbc76ea8b19f145ae71a150f32e2397aa8a","src/provider.rs":"5ab0b25e8866ecea327ad764d44594912f1dc09eb73c3ed5db134714e9f4b73e","src/rand.rs":"4007c6e88a8e875fb8eb475895ba5579e2e789634536303ea8e99ec1866b71a3","src/rsa.rs":"b972ab6ee3c3ad70314959eb5cda6a2251f514bf12d88551ce7746b4e9024294","src/sha.rs":"c34f2f9df5fb52b578022568e195e011d0967f9f5ff57b559d7d2a235951a5b9","src/sign.rs":"9af5544b9c5d81c494ba055c247c8d152e5853a26efa60ff7c1788b569225fd9","src/srtp.rs":"3defe1815cfc790e2407ff935f8ca7b0e8d504242886e8841715279e0d85f721","src/ssl/bio.rs":"4677c018ebc35a1c31fc92a3fd180e03b00fdc031aa7464d4ee53d0e4d5c78d3","src/ssl/callbacks.rs":"3b5530c06709705b1a216913f2f5a900ea6d9baa9d497d7c8bd5f2fefa53c8d5","src/ssl/connector.rs":"32afe0925584b349b3595aaabd0dadbf6ab383b5879c49c68ad2d0fddf0b0e4a","src/ssl/error.rs":"f39ac3e1037a35ae5cccbf5cf5976044614a6368c9ffe3f1b96bead63c0c4231","src/ssl/mod.rs":"95028a5af0d3c8e2af79891a62566fc7caa47a655642180593b47ad498780834","src/ssl/test/mod.rs":"0bf87ab47287ce40f1317016beeb54602a9a5836d00e0424072e67bedafa9c35","src/ssl/test/server.rs":"4276ba970a0fac5c9cae21d7df7af36389c377472f3546ce597678ffc6ad5b38","src/stack.rs":"ce68f06b3fa7135798d9af3489a2412823cfcd39984931b39d68be387f8fb5ac","src/string.rs":"8276d719b35cd74ee0efbecce9e58e754d50d8cc96111f2febd3c0d8849847a8","src/symm.rs":"87abe78720dc89710369a4fe8c74faa52c4226a118add635bc6458cb7db03c66","src/util.rs":"e6794bf0643d0c29e96325653f2bb4a00221de55bb5b3c6c96d5dbae3debe238","src/version.rs":"e3acbb0db2095ab616870055c7c7a902fb7b1439520574fd20b7c1164b1178b7","src/x509/extension.rs":"26a265248eb0e54c3b106708f8fce7d5fb5b91b7195f17a97e1b8b1d3b6fa119","src/x509/mod.rs":"1de4893a55ca91296216a052d14d1319fe180cd7b792fa3593de3fa7cc4f1dee","src/x509/store.rs":"e42823f931ce2b6e4bac5f7314f3790c70dd12002398da03a2ebecd96f248c98","src/x509/tests.rs":"efd1573171de75b70416a8d2f708e457601fc64c472fdb5507e32f74f4968fd0","src/x509/verify.rs":"9db665ffccecfd8a29874f8f4b0b3c09d195899daaa927dffdf57d6e9d32403e","test/aia_test_cert.pem":"9eaf52b5d0023f3be7911938d937ed16fc75d43d14dbe41557a800b0a82f4b1b","test/alt_name_cert.pem":"f3cc0a1d21657164918dffab0dac8f1c499fc1cf5717805420a0134b3aee128c","test/authority_key_identifier.pem":"4644b83bbcd36a6e1917d1f7bd3b8ff913bf86cc74917c07dd78b6731b4d5bec","test/ca.crt":"70bcf52acc79191409801e72371db3a0cd8a27c0fc24eacb3fb8f8ab3e558f67","test/cert.pem":"53c8b338be254490c71a6b13da90dc5a59ba596587c548be5673657e04824afb","test/certs.pem":"106d5d22c86e26c3db619b9525567f22333d22de82e4d2850ed379150c638008","test/certv3.pem":"c230b76b6efb973816d0e3096ae95cdcf4941ec928c01c31b6537d01743fcd8a","test/certv3_extfile":"610fdc10edac2da398a582895e53d288d3e47a9d4f3868c2c7f7662c212b60bd","test/cms.p12":"d33fc5edd6b9caa672e7570b869135235bb2583580a273f6e88c6a6c68fd5a8a","test/cms_pubkey.der":"03682a732e1fd861f5fa687915a8e6f5c935d10273b0f6f73f3db52a8d71fc6d","test/crl-ca.crt":"911360ccdf700fd7d6091bd78c4138da0e9f027ca211f7ed80b394e570eb897c","test/csr.pem":"24423008144c43cf33f56ebcc245931b2d61bcd4eee17b476d7adb6f7416e24d","test/dhparams.pem":"14d9461949d9ae8ca50a393b008ee2168254f14342b0e17b56c0a62d2905b963","test/dsa.pem":"826d513234205fd3dee0bbbf844f0b6fea501145bdf05ea3b14e14df98cbe090","test/dsa.pem.pub":"721677bebf9ab28b8650f98a0cd27658de0c1acd867a4b6e985fe1df95a8bd37","test/dsaparam.pem":"94a1284bdd7d7566151cfde0c7f245e84f7b99ba840f202e3f27ea0160f82988","test/entry_extensions.crl":"bee73d33a326bde92d3c38f275b3f94943e46cf778d7043e1176e84413dc22e9","test/identity.p12":"aceeb3e5516471bd5af9a44bbeffc9559c4f228f67c677d29f36a4b368e2779f","test/intermediate-ca.key":"a5f3d331af87c1305843e235841e494a0669a95d3824a6c766d09371f62c3bab","test/intermediate-ca.pem":"5ff8055325d0cbb60586f4e20bd2df7718e4d94f5261f2ee05ba52a8fb9223f0","test/key.der":"e8842cd6674b5c77a83e0283cd876a91de404561dfc86d79ce525f6e55b28197","test/key.der.pub":"e559d56bb6ec57ad743dbf972bbcaf263a9fa7d320433baa71b04f849d987060","test/key.pem":"12d9105a92bf39b615ccb4820c5c1e38c61905483cd30be13f9ab99b98af64ed","test/key.pem.pub":"f5d030df843ddbaba5bf316ae18f1434de5a63a955be66442429dd4f16f161ef","test/keystore-empty-chain.p12":"bbea280f6fe10556d7470df7072ef0e4ee3997e2c0b3666197f423430c0e6b61","test/leaf.pem":"4f2c3fd02f73b3f49a1e05cf0622669ed014ba019876d89d3f21c788457c1e01","test/nid_test_cert.pem":"7047e8d317e284c6b698eee4a0f1a629d50cd4615ad7da85fe90a2ffb6c21611","test/nid_uid_test_cert.pem":"a735211f3b40edbde7084337138fb0aea06aea6c78369c52015253e4b7a17d83","test/pkcs1.pem.pub":"4d446864b63c4178ec2c7dc8df9b7121d9271851c1f4701231fccb8b07c94918","test/pkcs8-nocrypt.der":"5590d03cc0d037c6c27d78fafc937f48defb226e9a52cde84d54df68086d0575","test/pkcs8.der":"8719fc002d59313fb97e46e068ae40db4d9acc0e2debd308ac9eb46329bea487","test/root-ca.key":"b37cf88614980c38e43c4329cdf7162bae48cc8af1fafd54db2fe0d17e458e1d","test/root-ca.pem":"59b9200c35e818bf21be4aaa97ba87bb6a18fd780527a9f9c51cc74212c631a0","test/rsa-encrypted.pem":"ea41b0f1816056672de6abbab43d0e8089da047c329ceed14aace5a5bde713f1","test/rsa.pem":"f866a5506ea9a37ed2f73f62f503e1aff32f7e4145be62b023535f4da1c24416","test/rsa.pem.pub":"2c5eeea39708e90396f9f09d920f2af8b7e9f84ace963c1319072224dd3d302b","test/subca.crt":"70bcf52acc79191409801e72371db3a0cd8a27c0fc24eacb3fb8f8ab3e558f67","test/test.crl":"ac8443257214f9e82543871c3df48694ea39f2b16bd6c4ef5998a161edbb8fba"},"package":"9529f4786b70a3e8c61e11179af17ab6188ad8d0ded78c5529441ed39d4bd9c1"} -diff --git a/vendor/openssl/src/ssl/mod.rs b/vendor/openssl/src/ssl/mod.rs -index a540d41..aa37a16 100644 ---- a/vendor/openssl/src/ssl/mod.rs -+++ b/vendor/openssl/src/ssl/mod.rs -@@ -695,7 +695,7 @@ cfg_if! { - /// - /// [`SslContextBuilder::set_alpn_protos`]: struct.SslContextBuilder.html#method.set_alpn_protos - #[corresponds(SSL_select_next_proto)] --pub fn select_next_proto<'a>(server: &[u8], client: &'a [u8]) -> Option<&'a [u8]> { -+pub fn select_next_proto<'a>(server: &'a [u8], client: &'a [u8]) -> Option<&'a [u8]> { - unsafe { - let mut out = ptr::null_mut(); - let mut outlen = 0; --- -2.48.1 - diff --git a/Issue-6415-BUG-Incorrect-icu-linking.patch b/Issue-6415-BUG-Incorrect-icu-linking.patch deleted file mode 100644 index 81ecd6e..0000000 --- a/Issue-6415-BUG-Incorrect-icu-linking.patch +++ /dev/null @@ -1,33 +0,0 @@ -From 5813c697bd7b3983ffb302faaf61615ac3f72421 Mon Sep 17 00:00:00 2001 -From: Firstyear -Date: Fri, 29 Nov 2024 12:51:17 +1000 -Subject: [PATCH] Issue 6415 - BUG - Incorrect icu linking (#6416) - -Bug Description: ICU has been updated to version 76.x - the .pc file of icu-18n for example no -longer includes -licuuc, which was so far the most common reason for buildfailures (as icu-uc is -not linked automatically, resulting in underlining) - -Fix Description: Correct configure.ac to request linking to icu-uc - -fixes: https://github.com/389ds/389-ds-base/issues/6415 - -Author: William Brown - -Review by: @droideck ---- - configure.ac | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/configure.ac b/configure.ac -index 24deb6fecb..4ab64c7334 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -849,7 +849,7 @@ fi - - PKG_CHECK_MODULES([SASL], [libsasl2]) - --PKG_CHECK_MODULES([ICU], [icu-i18n >= 60.2]) -+PKG_CHECK_MODULES([ICU], [icu-i18n >= 60.2 icu-uc >= 60.2]) - - m4_include(m4/netsnmp.m4) - diff --git a/backport-drop-python-setup-tools-dep.patch b/backport-drop-python-setup-tools-dep.patch deleted file mode 100644 index 2427810..0000000 --- a/backport-drop-python-setup-tools-dep.patch +++ /dev/null @@ -1,40 +0,0 @@ -From d3be668e668a18b6215c14327c54f56e1b5f4cd2 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Miro=20Hron=C4=8Dok?= -Date: Thu, 3 Apr 2025 15:09:27 +0200 -Subject: [PATCH] lib389: Remove unused runtime requirement on setuptools - (#6719) - -Remove unused runtime requirement on setuptools -The dependency was dropped in c0e2f68423ddde9bb91250d3f96dfc8617889514 - -Issue: #5642 - -Reviewed by: @progier389 (Thanks!) ---- - src/lib389/requirements.txt | 1 - - src/lib389/setup.py.in | 1 - - 2 files changed, 2 deletions(-) - -diff --git a/src/lib389/requirements.txt b/src/lib389/requirements.txt -index 0a95185..732c5dc 100644 ---- a/src/lib389/requirements.txt -+++ b/src/lib389/requirements.txt -@@ -4,6 +4,5 @@ python-dateutil - argcomplete - argparse-manpage - python-ldap --setuptools - distro - cryptography -diff --git a/src/lib389/setup.py.in b/src/lib389/setup.py.in -index 2175fe3..b1f1284 100644 ---- a/src/lib389/setup.py.in -+++ b/src/lib389/setup.py.in -@@ -96,7 +96,6 @@ setup( - 'argcomplete', - 'argparse-manpage', - 'python-ldap', -- 'setuptools', - 'distro', - 'cryptography' - ], diff --git a/fix-dsidm-posixgroup-get_dn-fails-with-search_ext.patch b/fix-dsidm-posixgroup-get_dn-fails-with-search_ext.patch deleted file mode 100644 index a7b3314..0000000 --- a/fix-dsidm-posixgroup-get_dn-fails-with-search_ext.patch +++ /dev/null @@ -1,12 +0,0 @@ -diff -Naur a/src/lib389/lib389/cli_idm/posixgroup.py b/src/lib389/lib389/cli_idm/posixgroup.py ---- a/src/lib389/lib389/cli_idm/posixgroup.py 2024-08-01 15:51:12.699551420 +0800 -+++ b/src/lib389/lib389/cli_idm/posixgroup.py 2024-08-01 15:52:34.075551420 +0800 -@@ -38,7 +38,7 @@ - - - def get_dn(inst, basedn, log, args): -- dn = lambda args: _get_arg( args.dn, msg="Enter dn to retrieve") -+ dn = _get_arg( args.dn, msg="Enter dn to retrieve") - _generic_get_dn(inst, basedn, log.getChild('_generic_get_dn'), MANY, dn, args) - - diff --git a/fix-dsidm-role-subtree-status-fails-with-TypeError.patch b/fix-dsidm-role-subtree-status-fails-with-TypeError.patch deleted file mode 100644 index 9e94d9c..0000000 --- a/fix-dsidm-role-subtree-status-fails-with-TypeError.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- 389-ds-base-3.1.1/src/lib389/lib389/cli_idm/role.py 2024-11-26 14:12:42.805280521 +0800 -+++ 389-ds-base-3.1.1/src/lib389/lib389/cli_idm/role.py 2024-11-26 14:13:08.157340335 +0800 -@@ -109,7 +109,7 @@ - filter = "" - scope = ldap.SCOPE_SUBTREE - -- role_list = Roles(inst, basedn).filter(filter, scope) -+ role_list = Roles(inst, basedn).filter(filter, scope=scope) - if not role_list: - raise ValueError(f"No entries were found under {basedn} or the user doesn't have an access") - -- Gitee