Package: libnss3-tools
Version: 2:3.106-1
Severity: minor
Tags: upstream

   * What led up to the situation?

     Checking for defects with a new version

test-[g|n]roff -mandoc -t -K utf8 -rF0 -rHY=0 -rCHECKSTYLE=10 -ww -z < "man 
page"

  [Use "groff -e ' $' <file>" to find trailing spaces.]

  ["test-groff" is a script in the repository for "groff"; is not shipped]
(local copy and "troff" slightly changed by me).

  [The fate of "test-nroff" was decided in groff bug #55941.]

   * What was the outcome of this action?


troff:<stdin>:464: warning: trailing space in the line
troff:<stdin>:465: warning: trailing space in the line
troff:<stdin>:466: warning: trailing space in the line
troff:<stdin>:488: warning: trailing space in the line
troff:<stdin>:489: warning: trailing space in the line
troff:<stdin>:513: warning: trailing space in the line
troff:<stdin>:550: warning: trailing space in the line

   * What outcome did you expect instead?

     No output (no warnings).

-.-

  General remarks and further material, if a diff-file exist, are in the
attachments.


-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.12.6-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=is_IS.iso88591, LC_CTYPE=is_IS.iso88591 (charmap=ISO-8859-1), 
LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages libnss3-tools depends on:
ii  libc6     2.40-4
ii  libnspr4  2:4.36-1
ii  libnss3   2:3.106-1
ii  zlib1g    1:1.3.dfsg+really1.3.1-1+b1

libnss3-tools recommends no packages.

libnss3-tools suggests no packages.

-- no debconf information
Input file is pk12util.1

  Any program (person), that produces man pages, should check the output
for defects by using (both groff and nroff)

[gn]roff -mandoc -t -ww -b -z -K utf8  <man page>

  The same goes for man pages that are used as an input.

  For a style guide use

  mandoc -T lint

-.-

  So any 'generator' should check its products with the above mentioned
'groff', 'mandoc',  and additionally with 'nroff ...'.

  This is just a simple quality control measure.

  The 'generator' may have to be corrected to get a better man page,
the source file may, and any additional file may.

  Common defects:

  Input text line longer than 80 bytes.

  Not removing trailing spaces (in in- and output).
  The reason for these trailing spaces should be found and eliminated.

  Not beginning each input sentence on a new line.
Lines should thus be shorter.

  See man-pages(7), item 'semantic newline'.

-.-

The difference between the formatted output of the original and patched file
can be seen with:

  nroff -mandoc <file1> > <out1>
  nroff -mandoc <file2> > <out2>
  diff -u <out1> <out2>

and for groff, using

"printf '%s\n%s\n' '.kern 0' '.ss 12 0' | groff -mandoc -Z - "

instead of 'nroff -mandoc'

  Add the option '-t', if the file contains a table.

  Read the output of 'diff -u' with 'less -R' or similar.

-.-.

  If 'man' (man-db) is used to check the manual for warnings,
the following must be set:

  The option "-warnings=w"

  The environmental variable:

export MAN_KEEP_STDERR=yes (or any non-empty value)

  or

  (produce only warnings):

export MANROFFOPT="-ww -b -z"

export MAN_KEEP_STDERR=yes (or any non-empty value)


-.-.

Output from "mandoc -T lint  pk12util.1": (shortened list)

     36 input text line longer than 80 bytes
     13 skipping paragraph macro

-.-.

Output from "test-groff -mandoc -t -ww -z pk12util.1": (shortened list)

      7 trailing space in the line

-.-.

Remove space characters (whitespace) at the end of lines.
Use "git apply ... --whitespace=fix" to fix extra space issues, or use
global configuration "core.whitespace".

Number of lines affected is

9

-.-.

Strings longer than 3/4 of a standard line length (80)
Use "\:" to split the string at the end of an output line, for example a
long URLs (web address)

122 The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
854 \m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. 
The NSS site relates directly to NSS code changes and releases\&.

-.-.

Wrong distance between sentences in the input file.

  Separate the sentences and subordinate clauses; each begins on a new
line.  See man-pages(7) ("Conventions for source file layout") and
"info groff" ("Input Conventions").

  The best procedure is to always start a new sentence on a new line,
at least, if you are typing on a computer.

Remember coding: Only one command ("sentence") on each (logical) line.

E-mail: Easier to quote exactly the relevant lines.

Generally: Easier to edit the sentence.

Patches: Less unaffected text.

Search for two adjacent words is easier, when they belong to the same line,
and the same phrase.

  The amount of space between sentences in the output can then be
controlled with the ".ss" request.

Mark a final abbreviation point as such by suffixing it with "\&".

N.B.

  The number of lines affected can be too large to be in a patch.

37:This documentation is still work in progress\&. Please contribute to the 
initial review in
42:\fBpk12util\fR, enables sharing certificates among any server that supports 
PKCS #12\&. The tool can import certificates and keys from PKCS #12 files into 
security databases, export certificates, and list certificates and keys\&.
83:pkcs11\&.txt)\&. If the prefix
110:Specify the hash algorithm used in the pkcs #12 mac\&. This algorithm also 
specifies the HMAC used in the prf when using pkcs #5 v2\&.
122:The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
127:Specify the prefix used on the certificate and key databases\&. This option 
is provided as a special case\&. Changing the names of the certificate and key 
databases is not recommended\&.
132:Dumps all of the data in raw (binary) form\&. This must be saved as a DER 
file\&. The default is to return information in a pretty\-print ASCII format, 
which displays the information about the certificates and public keys in the 
p12 file\&.
477:command to export certificates and keys requires both the name of the 
certificate to extract from the database (\fB\-n\fR) and the PKCS 
#12\-formatted output file to write to\&. There are optional parameters that 
can be used to encrypt the file to protect the certificate material\&.
499:file are not human\-readable\&. The certificates and keys in the file can 
be printed (listed) in a human\-readable pretty\-print format that shows 
information for every certificate and any public keys in the
515:    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting (Pty) 
Ltd\&. ID
538:prints the certificates and then exports them into separate DER binary 
files\&. This allows the certificates to be fed to another application that 
supports
540:files\&. Each certificate is written to a sequentially\-number file, 
beginning with
552:    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting (Pty) 
Ltd\&. ID
561:Certificate    Friendly Name: Thawte Freemail Member\*(Aqs Thawte 
Consulting (Pty) Ltd\&. ID
569:PKCS #12 provides for not only the protection of the private keys but also 
the certificate and meta\-data associated with the keys\&. Password\-based 
encryption is used to protect private keys on export to a PKCS #12 file and, 
optionally, the associated certificates\&. If no algorithm is specified, the 
tool defaults to using PKCS #12 SHA\-1 and 3\-key triple DES for private key 
encryption\&. When not in FIPS mode, PKCS #12 SHA\-1 and 40\-bit RC4 is used 
for certificate encryption\&. When in FIPS mode, there is no certificate 
encryption\&. If certificate encryption is not wanted, specify
661:With PKCS #12, the crypto provider may be the soft token module or an 
external hardware module\&. If the cryptographic module does not support the 
requested algorithm, then the next best fit will be selected (usually the 
default)\&. If no suitable replacement for the desired algorithm can be found, 
the tool returns the error
665:NSS originally used BerkeleyDB databases to store security information\&. 
The last versions of these
702:BerkeleyDB has performance limitations, though, which prevent it from being 
easily used by multiple applications simultaneously\&. NSS has some flexibility 
that allows applications to use their own, independent database engine while 
keeping a shared database and working around the access issues\&. Still, NSS 
requires more flexibility to provide a truly shared security database\&.
704:In 2009, NSS introduced a new set of databases that are SQLite databases 
rather than BerkleyDB\&. These new databases provide more accessibility and 
performance:
741:database type\&. The shared database type is preferred; the legacy format 
is included for backward compatibility\&.
747:prefix with the given security directory\&. For example:
821:accepts password\-based encryption schemes not listed in this document\&. 
However, those schemes are not officially supported and may have issues in 
interoperability with other tools\&.
854:\m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. 
The NSS site relates directly to NSS code changes and releases\&.
866:Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the 
MPL was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.

-.-.

Split lines longer than 80 characters into two or more lines.
Appropriate break points are the end of a sentence and a subordinate
clause; after punctuation marks.

N.B.

  The number of lines affected can be too large to be in a patch.


Line 31, length 98

pk12util \- Export and import keys and certificate to or from a PKCS #12 file 
and the NSS database

Line 34, length 343

\fBpk12util\fR [\-i\ p12File|\-l\ p12File|\-o\ p12File] [\-c\ keyCipher] [\-C\ 
certCipher] [\-d\ directory] [\-h\ tokenname] [\-m\ |\ \-\-key\-len\ keyLength] 
[\-M\ hashAlg] [\-n\ certname] [\-P\ dbprefix] [\-r] [\-v] [\-\-cert\-key\-len\ 
certKeyLength] [\-k\ slotPasswordFile|\-K\ slotPassword] [\-w\ 
p12filePasswordFile|\-W\ p12filePassword]

Line 37, length 90

This documentation is still work in progress\&. Please contribute to the 
initial review in

Line 42, length 229

\fBpk12util\fR, enables sharing certificates among any server that supports 
PKCS #12\&. The tool can import certificates and keys from PKCS #12 files into 
security databases, export certificates, and list certificates and keys\&.

Line 76, length 94

Specify the database directory into which to import to or export from 
certificates and keys\&.

Line 85, length 87

is not used, then the tool assumes that the given databases are in the SQLite 
format\&.

Line 105, length 88

Specify the desired length of the symmetric key to be used to encrypt the 
private key\&.

Line 110, length 134

Specify the hash algorithm used in the pkcs #12 mac\&. This algorithm also 
specifies the HMAC used in the prf when using pkcs #5 v2\&.

Line 115, length 110

Specify the desired length of the symmetric key to be used to encrypt the 
certificates and other meta\-data\&.

Line 122, length 289

The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.

Line 127, length 186

Specify the prefix used on the certificate and key databases\&. This option is 
provided as a special case\&. Changing the names of the certificate and key 
databases is not recommended\&.

Line 132, length 240

Dumps all of the data in raw (binary) form\&. This must be saved as a DER 
file\&. The default is to return information in a pretty\-print ASCII format, 
which displays the information about the certificates and public keys in the 
p12 file\&.

Line 442, length 142

for importing a certificate or key is the PKCS #12 input file (\fB\-i\fR) and 
some way to specify the security database being accessed (either

Line 448, length 159

pk12util \-i p12File [\-h tokenname] [\-v] [\-d directory] [\-P dbprefix] [\-k 
slotPasswordFile|\-K slotPassword] [\-w p12filePasswordFile|\-W p12filePassword]

Line 477, length 283

command to export certificates and keys requires both the name of the 
certificate to extract from the database (\fB\-n\fR) and the PKCS 
#12\-formatted output file to write to\&. There are optional parameters that 
can be used to encrypt the file to protect the certificate material\&.

Line 479, length 242

pk12util \-o p12File \-n certname [\-c keyCipher] [\-C certCipher] 
[\-m|\-\-key_len keyLen] [\-n|\-\-cert_key_len certKeyLen] [\-d directory] [\-P 
dbprefix] [\-k slotPasswordFile|\-K slotPassword] [\-w p12filePasswordFile|\-W 
p12filePassword]

Line 499, length 207

file are not human\-readable\&. The certificates and keys in the file can be 
printed (listed) in a human\-readable pretty\-print format that shows 
information for every certificate and any public keys in the

Line 503, length 159

pk12util \-l p12File [\-h tokenname] [\-r] [\-d directory] [\-P dbprefix] [\-k 
slotPasswordFile|\-K slotPassword] [\-w p12filePasswordFile|\-W p12filePassword]

Line 515, length 81

    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting (Pty) Ltd\&. 
ID

Line 538, length 155

prints the certificates and then exports them into separate DER binary files\&. 
This allows the certificates to be fed to another application that supports

Line 540, length 83

files\&. Each certificate is written to a sequentially\-number file, beginning 
with

Line 552, length 81

    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting (Pty) Ltd\&. 
ID

Line 559, length 86

Certificate    Friendly Name: Thawte Personal Freemail Issuing CA \- Thawte 
Consulting

Line 561, length 92

Certificate    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting 
(Pty) Ltd\&. ID

Line 569, length 593

PKCS #12 provides for not only the protection of the private keys but also the 
certificate and meta\-data associated with the keys\&. Password\-based 
encryption is used to protect private keys on export to a PKCS #12 file and, 
optionally, the associated certificates\&. If no algorithm is specified, the 
tool defaults to using PKCS #12 SHA\-1 and 3\-key triple DES for private key 
encryption\&. When not in FIPS mode, PKCS #12 SHA\-1 and 40\-bit RC4 is used 
for certificate encryption\&. When in FIPS mode, there is no certificate 
encryption\&. If certificate encryption is not wanted, specify

Line 620, length 138

SHA\-1 and 40\-bit RC4 (\fB"PKCS #12 V2 PBE With SHA\-1 And 40 Bit RC4"\fR) 
(used by default for certificate encryption in non\-FIPS mode)

Line 631, length 91

SHA\-1 and 3\-key triple\-DES (\fB"PKCS #12 V2 PBE With SHA\-1 And 3KEY Triple 
DES\-CBC"\fR

Line 661, length 326

With PKCS #12, the crypto provider may be the soft token module or an external 
hardware module\&. If the cryptographic module does not support the requested 
algorithm, then the next best fit will be selected (usually the default)\&. If 
no suitable replacement for the desired algorithm can be found, the tool 
returns the error

Line 665, length 100

NSS originally used BerkeleyDB databases to store security information\&. The 
last versions of these

Line 702, length 382

BerkeleyDB has performance limitations, though, which prevent it from being 
easily used by multiple applications simultaneously\&. NSS has some flexibility 
that allows applications to use their own, independent database engine while 
keeping a shared database and working around the access issues\&. Still, NSS 
requires more flexibility to provide a truly shared security database\&.

Line 704, length 161

In 2009, NSS introduced a new set of databases that are SQLite databases rather 
than BerkleyDB\&. These new databases provide more accessibility and 
performance:

Line 736, length 129

pkcs11\&.txt, which is listing of all of the PKCS #11 modules contained in a 
new subdirectory in the security databases directory

Line 741, length 115

database type\&. The shared database type is preferred; the legacy format is 
included for backward compatibility\&.

Line 745, length 142

\fBmodutil\fR) assume that the given security databases use the SQLite type 
Using the legacy databases must be manually specified by using the

Line 789, length 94

For an engineering draft on the changes in the shared NSS databases, see the 
NSS project wiki:

Line 805, length 102

has changed over time, while importing files exported with older versions of 
NSS is still supported\&.

Line 809, length 212

used the UTF\-16 encoding for the PKCS #5 password\-based encryption schemes, 
while the recommendation is to encode passwords in UTF\-8 if the used 
encryption scheme is defined outside of the PKCS #12 standard\&.

Line 821, length 185

accepts password\-based encryption schemes not listed in this document\&. 
However, those schemes are not officially supported and may have issues in 
interoperability with other tools\&.

Line 828, length 102

The NSS wiki has information on the new database design and how to configure 
applications to use it\&.

Line 853, length 102

For information about NSS and other tools related to NSS (like JSS), check out 
the NSS project wiki at

Line 854, length 140

\m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. The 
NSS site relates directly to NSS code changes and releases\&.

Line 861, length 115

The NSS tools were written and maintained by developers with Netscape, Red Hat, 
Sun, Oracle, Mozilla, and Google\&.

Line 863, length 86

Authors: Elio Maldonado <emaldona@redhat\&.com>, Deon Lackey 
<dlackey@redhat\&.com>\&.

Line 866, length 170

Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the MPL 
was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.


-.-.


Show if docman-to-man created this

4:.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>

-.-.

Put a parenthetical sentence, phrase on a separate line,
if not part of a code.
See man-pages(7), item "semantic newline".
Not considered in a patch, too many lines.


pk12util.1:620:SHA\-1 and 40\-bit RC4 (\fB"PKCS #12 V2 PBE With SHA\-1 And 40 
Bit RC4"\fR) (used by default for certificate encryption in non\-FIPS mode)
pk12util.1:657:SHA\-1 and 40\-bit RC2 (\fB"PKCS #12 V2 PBE With SHA\-1 And 40 
Bit RC2 CBC"\fR)
pk12util.1:661:With PKCS #12, the crypto provider may be the soft token module 
or an external hardware module\&. If the cryptographic module does not support 
the requested algorithm, then the next best fit will be selected (usually the 
default)\&. If no suitable replacement for the desired algorithm can be found, 
the tool returns the error

-.-.

No need for "\&" to be in front of a period (.),
if there is a character in front of it

37:This documentation is still work in progress\&. Please contribute to the 
initial review in
42:\fBpk12util\fR, enables sharing certificates among any server that supports 
PKCS #12\&. The tool can import certificates and keys from PKCS #12 files into 
security databases, export certificates, and list certificates and keys\&.
49:Import keys and certificates from a PKCS #12 file into a security database\&.
54:List the keys and certificates in PKCS #12 file\&.
59:Export keys and certificates from the security database to a PKCS #12 file\&.
66:Specify the key encryption algorithm\&.
71:Specify the certiticate encryption algorithm\&.
76:Specify the database directory into which to import to or export from 
certificates and keys\&.
79:supports two types of databases: the legacy security databases (cert8\&.db,
80:key3\&.db, and
81:secmod\&.db) and new SQLite databases (cert9\&.db,
82:key4\&.db, and
83:pkcs11\&.txt)\&. If the prefix
85:is not used, then the tool assumes that the given databases are in the 
SQLite format\&.
90:Specify the name of the token to import into or export from\&.
95:Specify the text file containing the slot\*(Aqs password\&.
100:Specify the slot\*(Aqs password\&.
105:Specify the desired length of the symmetric key to be used to encrypt the 
private key\&.
110:Specify the hash algorithm used in the pkcs #12 mac\&. This algorithm also 
specifies the HMAC used in the prf when using pkcs #5 v2\&.
115:Specify the desired length of the symmetric key to be used to encrypt the 
certificates and other meta\-data\&.
120:Specify the nickname of the cert and private key to export\&.
122:The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
127:Specify the prefix used on the certificate and key databases\&. This option 
is provided as a special case\&. Changing the names of the certificate and key 
databases is not recommended\&.
132:Dumps all of the data in raw (binary) form\&. This must be saved as a DER 
file\&. The default is to return information in a pretty\-print ASCII format, 
which displays the information about the certificates and public keys in the 
p12 file\&.
137:Enable debug logging when importing\&.
142:Specify the text file containing the pkcs #12 file password\&.
147:Specify the pkcs #12 file password\&.
446:for a token)\&.
458:# pk12util \-i /tmp/cert\-files/users\&.p12 \-d /home/my/sharednssdb
460:Enter a password which will be used to encrypt your keys\&.
462:and should contain at least one non\-alphabetic character\&.
477:command to export certificates and keys requires both the name of the 
certificate to extract from the database (\fB\-n\fR) and the PKCS 
#12\-formatted output file to write to\&. There are optional parameters that 
can be used to encrypt the file to protect the certificate material\&.
487:# pk12util \-o certs\&.p12 \-n Server\-Cert \-d /home/my/sharednssdb
499:file are not human\-readable\&. The certificates and keys in the file can 
be printed (listed) in a human\-readable pretty\-print format that shows 
information for every certificate and any public keys in the
501:file\&.
511:# pk12util \-l certs\&.p12
515:    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting (Pty) 
Ltd\&. ID
527:        Issuer: "E=personal\-freemail@thawte\&.com,CN=Thawte Personal 
Freemail C
538:prints the certificates and then exports them into separate DER binary 
files\&. This allows the certificates to be fed to another application that 
supports
540:files\&. Each certificate is written to a sequentially\-number file, 
beginning with
541:file0001\&.der
543:file000N\&.der, incrementing the number for every certificate:
549:pk12util \-l test\&.p12 \-r
552:    Friendly Name: Thawte Freemail Member\*(Aqs Thawte Consulting (Pty) 
Ltd\&. ID
561:Certificate    Friendly Name: Thawte Freemail Member\*(Aqs Thawte 
Consulting (Pty) Ltd\&. ID
569:PKCS #12 provides for not only the protection of the private keys but also 
the certificate and meta\-data associated with the keys\&. Password\-based 
encryption is used to protect private keys on export to a PKCS #12 file and, 
optionally, the associated certificates\&. If no algorithm is specified, the 
tool defaults to using PKCS #12 SHA\-1 and 3\-key triple DES for private key 
encryption\&. When not in FIPS mode, PKCS #12 SHA\-1 and 40\-bit RC4 is used 
for certificate encryption\&. When in FIPS mode, there is no certificate 
encryption\&. If certificate encryption is not wanted, specify
573:option\&.
575:The private key is always protected with strong encryption by default\&.
577:Several types of ciphers are supported\&.
661:With PKCS #12, the crypto provider may be the soft token module or an 
external hardware module\&. If the cryptographic module does not support the 
requested algorithm, then the next best fit will be selected (usually the 
default)\&. If no suitable replacement for the desired algorithm can be found, 
the tool returns the error
662:\fIno security module can perform the requested operation\fR\&.
665:NSS originally used BerkeleyDB databases to store security information\&. 
The last versions of these
677:cert8\&.db for certificates
688:key3\&.db for keys
699:secmod\&.db for PKCS #11 module information
702:BerkeleyDB has performance limitations, though, which prevent it from being 
easily used by multiple applications simultaneously\&. NSS has some flexibility 
that allows applications to use their own, independent database engine while 
keeping a shared database and working around the access issues\&. Still, NSS 
requires more flexibility to provide a truly shared security database\&.
704:In 2009, NSS introduced a new set of databases that are SQLite databases 
rather than BerkleyDB\&. These new databases provide more accessibility and 
performance:
714:cert9\&.db for certificates
725:key4\&.db for keys
736:pkcs11\&.txt, which is listing of all of the PKCS #11 modules contained in 
a new subdirectory in the security databases directory
741:database type\&. The shared database type is preferred; the legacy format 
is included for backward compatibility\&.
747:prefix with the given security directory\&. For example:
753:# pk12util \-i /tmp/cert\-files/users\&.p12 \-d dbm:/home/my/sharednssdb
775:~/\&.bashrc
776:file to make the change permanent\&.
786:https://wiki\&.mozilla\&.org/NSS_Shared_DB_Howto
799:https://wiki\&.mozilla\&.org/NSS_Shared_DB
805:has changed over time, while importing files exported with older versions 
of NSS is still supported\&.
807:Until the 3\&.30 release,
809:used the UTF\-16 encoding for the PKCS #5 password\-based encryption 
schemes, while the recommendation is to encode passwords in UTF\-8 if the used 
encryption scheme is defined outside of the PKCS #12 standard\&.
811:Until the 3\&.31 release, even when
817:always used 256\-bit AES as the underlying encryption scheme\&.
821:accepts password\-based encryption schemes not listed in this document\&. 
However, those schemes are not officially supported and may have issues in 
interoperability with other tools\&.
828:The NSS wiki has information on the new database design and how to 
configure applications to use it\&.
838:https://wiki\&.mozilla\&.org/NSS_Shared_DB_Howto
849:https://wiki\&.mozilla\&.org/NSS_Shared_DB
854:\m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. 
The NSS site relates directly to NSS code changes and releases\&.
856:Mailing lists: https://lists\&.mozilla\&.org/listinfo/dev\-tech\-crypto
861:The NSS tools were written and maintained by developers with Netscape, Red 
Hat, Sun, Oracle, Mozilla, and Google\&.
863:Authors: Elio Maldonado <emaldona@redhat\&.com>, Deon Lackey 
<dlackey@redhat\&.com>\&.
866:Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the 
MPL was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.

-.-.


Put a subordinate sentence (after a comma) on a new line.

42:\fBpk12util\fR, enables sharing certificates among any server that supports 
PKCS #12\&. The tool can import certificates and keys from PKCS #12 files into 
security databases, export certificates, and list certificates and keys\&.
80:key3\&.db, and
82:key4\&.db, and
85:is not used, then the tool assumes that the given databases are in the 
SQLite format\&.
122:The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
132:Dumps all of the data in raw (binary) form\&. This must be saved as a DER 
file\&. The default is to return information in a pretty\-print ASCII format, 
which displays the information about the certificates and public keys in the 
p12 file\&.
505:For example, this prints the default ASCII output:
536:Alternatively, the
540:files\&. Each certificate is written to a sequentially\-number file, 
beginning with
543:file000N\&.der, incrementing the number for every certificate:
569:PKCS #12 provides for not only the protection of the private keys but also 
the certificate and meta\-data associated with the keys\&. Password\-based 
encryption is used to protect private keys on export to a PKCS #12 file and, 
optionally, the associated certificates\&. If no algorithm is specified, the 
tool defaults to using PKCS #12 SHA\-1 and 3\-key triple DES for private key 
encryption\&. When not in FIPS mode, PKCS #12 SHA\-1 and 40\-bit RC4 is used 
for certificate encryption\&. When in FIPS mode, there is no certificate 
encryption\&. If certificate encryption is not wanted, specify
591:\fB"AES\-192\-CBC"\fR, and
661:With PKCS #12, the crypto provider may be the soft token module or an 
external hardware module\&. If the cryptographic module does not support the 
requested algorithm, then the next best fit will be selected (usually the 
default)\&. If no suitable replacement for the desired algorithm can be found, 
the tool returns the error
702:BerkeleyDB has performance limitations, though, which prevent it from being 
easily used by multiple applications simultaneously\&. NSS has some flexibility 
that allows applications to use their own, independent database engine while 
keeping a shared database and working around the access issues\&. Still, NSS 
requires more flexibility to provide a truly shared security database\&.
704:In 2009, NSS introduced a new set of databases that are SQLite databases 
rather than BerkleyDB\&. These new databases provide more accessibility and 
performance:
736:pkcs11\&.txt, which is listing of all of the PKCS #11 modules contained in 
a new subdirectory in the security databases directory
739:Because the SQLite databases are designed to be shared, these are the
743:By default, the tools (\fBcertutil\fR,
759:To set the legacy database type as the default type for the tools, set the
789:For an engineering draft on the changes in the shared NSS databases, see 
the NSS project wiki:
805:has changed over time, while importing files exported with older versions 
of NSS is still supported\&.
809:used the UTF\-16 encoding for the PKCS #5 password\-based encryption 
schemes, while the recommendation is to encode passwords in UTF\-8 if the used 
encryption scheme is defined outside of the PKCS #12 standard\&.
811:Until the 3\&.31 release, even when
821:accepts password\-based encryption schemes not listed in this document\&. 
However, those schemes are not officially supported and may have issues in 
interoperability with other tools\&.
853:For information about NSS and other tools related to NSS (like JSS), check 
out the NSS project wiki at
861:The NSS tools were written and maintained by developers with Netscape, Red 
Hat, Sun, Oracle, Mozilla, and Google\&.
863:Authors: Elio Maldonado <emaldona@redhat\&.com>, Deon Lackey 
<dlackey@redhat\&.com>\&.
866:Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the 
MPL was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.

-.-.

Output from "test-groff  -mandoc -t -K utf8 -rF0 -rHY=0 -rCHECKSTYLE=10 -ww -z 
":

troff:<stdin>:464: warning: trailing space in the line
troff:<stdin>:465: warning: trailing space in the line
troff:<stdin>:466: warning: trailing space in the line
troff:<stdin>:488: warning: trailing space in the line
troff:<stdin>:489: warning: trailing space in the line
troff:<stdin>:513: warning: trailing space in the line
troff:<stdin>:550: warning: trailing space in the line

-.-.

Spelling:

certiticate ==> certificate
itegrity ==> integrity

-.-

  Additionally (general):

  Abbreviations get a '\&' added after their final full stop (.) to mark them
as such and not as an end of a sentence.

  There is no need to add a '\&' before a full stop (.) if it has a character
before it!

Reply via email to