diff --git a/README b/README deleted file mode 100644 --- a/README +++ /dev/null @@ -1 +0,0 @@ -Placeholder README for Solus Operating System packages diff --git a/actions.py b/actions.py deleted file mode 100644 --- a/actions.py +++ /dev/null @@ -1,14 +0,0 @@ - -#!/usr/bin/python - - -from pisi.actionsapi import shelltools, get, autotools, pisitools - -from pisi.actionsapi.shelltools import system - -def build(): - system ("./build_certs.sh") - -def install(): - pisitools.insinto ("/etc/ssl/certs", "certs/*.pem") - pisitools.insinto ("/etc/ssl/certs", "BLFS-ca-bundle*.crt", "ca-certificates.crt") diff --git a/comar/package.py b/comar/package.py deleted file mode 100644 --- a/comar/package.py +++ /dev/null @@ -1,6 +0,0 @@ -#!/usr/bin/env python -import os - -def postInstall(fromVersion, fromRelease, toVersion, toRelease): - os.system ("c_rehash") - diff --git a/component.xml b/component.xml deleted file mode 100644 --- a/component.xml +++ /dev/null @@ -1,3 +0,0 @@ - - system.base - diff --git a/files/build_certs.sh b/files/build_certs.sh deleted file mode 100755 --- a/files/build_certs.sh +++ /dev/null @@ -1,8 +0,0 @@ -#!/bin/bash - -url="http://anduin.linuxfromscratch.org/BLFS/other/certdata.txt" - -curl $url -o certdata.txt && -unset url && -./make-ca.sh && -./remove-expired-certs.sh certs diff --git a/files/make-ca.sh b/files/make-ca.sh deleted file mode 100755 --- a/files/make-ca.sh +++ /dev/null @@ -1,102 +0,0 @@ -#!/bin/sh -# Begin make-ca.sh -# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs -# -# The file certdata.txt must exist in the local directory -# Version number is obtained from the version of the data. -# -# Authors: DJ Lucas -# Bruce Dubbs -# -# Version 20120211 - -# Some data in the certs have UTF-8 characters -export LANG=en_US.utf8 - -certdata="certdata.txt" - -if [ ! -r $certdata ]; then - echo "$certdata must be in the local directory" - exit 1 -fi - -REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$') - -if [ -z "${REVISION}" ]; then - echo "$certfile has no 'Revision' in CVS_ID" - exit 1 -fi - -VERSION=$(echo $REVISION | cut -f2 -d" ") - -TEMPDIR=$(mktemp -d) -TRUSTATTRIBUTES="CKA_TRUST_SERVER_AUTH" -BUNDLE="BLFS-ca-bundle-${VERSION}.crt" -CONVERTSCRIPT="./make-cert.pl" -SSLDIR="/etc/ssl" - -mkdir "${TEMPDIR}/certs" - -# Get a list of starting lines for each cert -CERTBEGINLIST=$(grep -n "^# Certificate" "${certdata}" | cut -d ":" -f1) - -# Get a list of ending lines for each cert -CERTENDLIST=`grep -n "^CKA_TRUST_STEP_UP_APPROVED" "${certdata}" | cut -d ":" -f 1` - -# Start a loop -for certbegin in ${CERTBEGINLIST}; do - for certend in ${CERTENDLIST}; do - if test "${certend}" -gt "${certbegin}"; then - break - fi - done - - # Dump to a temp file with the name of the file as the beginning line number - sed -n "${certbegin},${certend}p" "${certdata}" > "${TEMPDIR}/certs/${certbegin}.tmp" -done - -unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend - -mkdir -p certs -rm -f certs/* # Make sure the directory is clean - -for tempfile in ${TEMPDIR}/certs/*.tmp; do - # Make sure that the cert is trusted... - grep "CKA_TRUST_SERVER_AUTH" "${tempfile}" | \ - egrep "TRUST_UNKNOWN|NOT_TRUSTED" > /dev/null - - if test "${?}" = "0"; then - # Throw a meaningful error and remove the file - cp "${tempfile}" tempfile.cer - perl ${CONVERTSCRIPT} > tempfile.crt - keyhash=$(openssl x509 -noout -in tempfile.crt -hash) - echo "Certificate ${keyhash} is not trusted! Removing..." - rm -f tempfile.cer tempfile.crt "${tempfile}" - continue - fi - - # If execution made it to here in the loop, the temp cert is trusted - # Find the cert data and generate a cert file for it - - cp "${tempfile}" tempfile.cer - perl ${CONVERTSCRIPT} > tempfile.crt - keyhash=$(openssl x509 -noout -in tempfile.crt -hash) - if [ "$(file -b --mime-encoding tempfile.crt)" = "iso-8859-1" ]; then - iconv -f iso-8859-1 -t ascii//TRANSLIT tempfile.crt -o tempfile.crt - echo "Fix encoding for ${keyhash}" - fi - mv tempfile.crt "certs/${keyhash}.pem" - rm -f tempfile.cer "${tempfile}" - echo "Created ${keyhash}.pem" -done - -# Remove blacklisted files -# MD5 Collision Proof of Concept CA -if test -f certs/8f111d69.pem; then - echo "Certificate 8f111d69 is not trusted! Removing..." - rm -f certs/8f111d69.pem -fi - -# Finally, generate the bundle and clean up. -cat certs/*.pem > ${BUNDLE} -rm -r "${TEMPDIR}" diff --git a/files/make-cert.pl b/files/make-cert.pl deleted file mode 100755 --- a/files/make-cert.pl +++ /dev/null @@ -1,49 +0,0 @@ -#!/usr/bin/perl -w - -# Used to generate PEM encoded files from Mozilla certdata.txt. -# Run as ./make-cert.pl > certificate.crt -# -# Parts of this script courtesy of RedHat (mkcabundle.pl) -# -# This script modified for use with single file data (tempfile.cer) extracted -# from certdata.txt, taken from the latest version in the Mozilla NSS source. -# mozilla/security/nss/lib/ckfw/builtins/certdata.txt -# -# Authors: DJ Lucas -# Bruce Dubbs -# -# Version 20120211 - -my $certdata = './tempfile.cer'; - -open( IN, "cat $certdata|" ) - || die "could not open $certdata"; - -my $incert = 0; - -while ( ) -{ - if ( /^CKA_VALUE MULTILINE_OCTAL/ ) - { - $incert = 1; - open( OUT, "|openssl x509 -text -inform DER -fingerprint" ) - || die "could not pipe to openssl x509"; - } - - elsif ( /^END/ && $incert ) - { - close( OUT ); - $incert = 0; - print "\n\n"; - } - - elsif ($incert) - { - my @bs = split( /\\/ ); - foreach my $b (@bs) - { - chomp $b; - printf( OUT "%c", oct($b) ) unless $b eq ''; - } - } -} diff --git a/files/remove-expired-certs.sh b/files/remove-expired-certs.sh deleted file mode 100755 --- a/files/remove-expired-certs.sh +++ /dev/null @@ -1,53 +0,0 @@ -#!/bin/sh -# Begin /usr/sbin/remove-expired-certs.sh -# -# Version 20120211 - -# Make sure the date is parsed correctly on all systems -mydate() -{ - local y=$( echo $1 | cut -d" " -f4 ) - local M=$( echo $1 | cut -d" " -f1 ) - local d=$( echo $1 | cut -d" " -f2 ) - local m - - if [ ${d} -lt 10 ]; then d="0${d}"; fi - - case $M in - Jan) m="01";; - Feb) m="02";; - Mar) m="03";; - Apr) m="04";; - May) m="05";; - Jun) m="06";; - Jul) m="07";; - Aug) m="08";; - Sep) m="09";; - Oct) m="10";; - Nov) m="11";; - Dec) m="12";; - esac - - certdate="${y}${m}${d}" -} - -OPENSSL=/usr/bin/openssl -DIR=/etc/ssl/certs - -if [ $# -gt 0 ]; then - DIR="$1" -fi - -certs=$( find ${DIR} -type f -name "*.pem" -o -name "*.crt" ) -today=$( date +%Y%m%d ) - -for cert in $certs; do - notafter=$( $OPENSSL x509 -enddate -in "${cert}" -noout ) - date=$( echo ${notafter} | sed 's/^notAfter=//' ) - mydate "$date" - - if [ ${certdate} -lt ${today} ]; then - echo "${cert} expired on ${certdate}! Removing..." - rm -f "${cert}" - fi -done diff --git a/package.yml b/package.yml new file mode 100644 --- /dev/null +++ b/package.yml @@ -0,0 +1,24 @@ +name : ca-certs +version : 20190903 +release : 38 +source : + - https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt : fffa309937c3be940649293f749b8207fabc6eb224e50e4bb3f2c5e44e0d6a6b + - https://raw.githubusercontent.com/agl/extract-nss-root-certs/492d8c9/convert_mozilla_certdata.go : 30afd0ca1df9b7788b830485645c4a2f72b07c1c9eb5c66941ae3d0b87e9e623 +license : + - Apache-2.0 # Conversion script (does it have to be listed?) + - MPL-2.0 # Actual cert file +component : system.base +summary : Certificate Authority Files +description: | + The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA). +extract : no +builddeps : + - golang +setup : | + ln -s $sources/* $workdir +build : | + go run convert_mozilla_certdata.go --to-files +install : | + install -Dm00644 *.pem -t $installdir/etc/ssl/certs + # Create symlinks with hashes + c_rehash $installdir/etc/ssl/certs diff --git a/pspec.xml b/pspec.xml deleted file mode 100644 --- a/pspec.xml +++ /dev/null @@ -1,340 +0,0 @@ - - - - - ca-certs - - Ikey Doherty - ikey.doherty@gmail.com - - Certificate Authority Files - The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA) - MPL-1.0 - https://getsol.us/sources/README - - - build_certs.sh - make-ca.sh - make-cert.pl - remove-expired-certs.sh - - - - curl - openssl - - - - - ca-certs - - /etc/ssl - - - System.Package - - - curl - openssl - - - - - - 10-07-2019 - 20190710 - Package bump - Pierre-Yves - pyu@riseup.net - - - - 18-02-2019 - 20190218 - Package bump - Pierre-Yves - pyu@riseup.net - - - - 10-20-2018 - 20181020 - Package bump - Pierre-Yves - pyu@riseup.net - - - - 05-22-2018 - 20180516 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 05-04-2018 - 20180422 - Update system certificates to 20180422 - Ikey Doherty - ikey@solus-project.com - - - - 04-12-2018 - 20180326 - Update system certificates to 20180326 - Ikey Doherty - ikey@solus-project.com - - - - 01-13-2018 - 20180110 - Update system certificates to 20180110 - Ikey Doherty - ikey@solus-project.com - - - - 12-26-2017 - 20171221 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 11-30-2017 - 20171129 - Update system certificates to 20171129 - Ikey Doherty - ikey@solus-project.com - - - - 11-24-2017 - 20171115 - Update system certificates to 20171115 - Ikey Doherty - ikey@solus-project.com - - - - 11-14-2017 - 20171112 - Update system certificates to version 20171112 - Ikey Doherty - ikey@solus-project.com - - - - 11-08-2017 - 20171106 - Update system certificates to version 20171106 - Ikey Doherty - ikey@solus-project.com - - - - 10-04-2017 - 20170928 - Update system certificates to version 20170928 - Ikey Doherty - ikey@solus-project.com - - - - 08-08-2017 - 20170803 - Update certificates to version 20170803 - Ikey Doherty - ikey@solus-project.com - - - - 05-04-2017 - 20170427 - Update to version 20170427 - Ikey Doherty - ikey@solus-project.com - - - - 04-13-2017 - 20170411 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 02-24-2017 - 20170217 - Update to 20170217 snapshot - Ikey Doherty - ikey@solus-project.com - - - - 01-28-2017 - 20170125 - Update to 20170125 snapshot - Ikey Doherty - ikey@solus-project.com - - - - 12-08-2016 - 20161124 - Update to 20161124 snapshot - Ikey Doherty - ikey@solus-project.com - - - - 10-20-2016 - 20161018 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 10-16-2016 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 04-07-2016 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 03-08-2016 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 03-05-2016 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 12-17-2015 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 12-02-2015 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 11-09-2015 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 10-27-2015 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 06-17-2015 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 05-01-2015 - 1.87 - Package bump - Ikey Doherty - ikey@solus-project.com - - - - 04-21-2015 - 1.87 - Udate for security - Ikey Doherty - ikey@solus-project.com - - - - 09-04-2014 - 1.87 - Routine update for security - Ikey Doherty - ikey.doherty@gmail.com - - - - 03-22-2013 - 1.87 - Update URI for new bootstrap - Ikey Doherty - ikey.doherty@gmail.com - - - - 05-25-2013 - 1.87 - Use more standard naming for ca-certificates - Ikey Doherty - ikey@solusos.com - - - - 05-23-2013 - 1.87 - Move ca-certs into system.base - Ikey Doherty - ikey@solusos.com - - - - 04-13-2013 - 1.87 - Add dependencies, and a postInstall to run c_rehash - Ikey Doherty - ikey@solusos.com - - - - 04-13-2013 - 1.87 - Add ca-certs to repositories - Ikey Doherty - ikey@solusos.com - - - - diff --git a/pspec_x86_64.xml b/pspec_x86_64.xml new file mode 100644 --- /dev/null +++ b/pspec_x86_64.xml @@ -0,0 +1,312 @@ + + + ca-certs + + Fabio Forni + livingsilver94.solus@redaril.me + + Apache-2.0 + MPL-2.0 + system.base + Certificate Authority Files + The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA). + + https://getsol.us/sources/README.Solus + + + ca-certs + Certificate Authority Files + The Public Key Inrastructure is used for many security issues in a Linux system. In order for a certificate to be trusted, it must be signed by a trusted agent called a Certificate Authority (CA). + + system.base + + /etc/ssl/certs/02265526.0 + /etc/ssl/certs/03179a64.0 + /etc/ssl/certs/062cdee6.0 + /etc/ssl/certs/064e0aa9.0 + /etc/ssl/certs/06dc52d5.0 + /etc/ssl/certs/080911ac.0 + /etc/ssl/certs/09789157.0 + /etc/ssl/certs/0a775a30.0 + /etc/ssl/certs/0b1b94ef.0 + /etc/ssl/certs/0bf05006.0 + /etc/ssl/certs/0c4c9b6c.0 + /etc/ssl/certs/0f5dc4f3.0 + /etc/ssl/certs/0f6fa695.0 + /etc/ssl/certs/1001acf7.0 + /etc/ssl/certs/106f3e4d.0 + /etc/ssl/certs/116bf586.0 + /etc/ssl/certs/128805a3.0 + /etc/ssl/certs/14bc7599.0 + /etc/ssl/certs/157753a5.0 + /etc/ssl/certs/1636090b.0 + /etc/ssl/certs/18856ac4.0 + /etc/ssl/certs/1d3472b9.0 + /etc/ssl/certs/1e08bfd1.0 + /etc/ssl/certs/1e09d511.0 + /etc/ssl/certs/244b5494.0 + /etc/ssl/certs/2923b3f9.0 + /etc/ssl/certs/2ae6433e.0 + /etc/ssl/certs/2b349938.0 + /etc/ssl/certs/2c543cd1.0 + /etc/ssl/certs/2e4eed3c.0 + /etc/ssl/certs/2e5ac55d.0 + /etc/ssl/certs/32888f65.0 + /etc/ssl/certs/349f2832.0 + /etc/ssl/certs/3513523f.0 + /etc/ssl/certs/3bde41ac.0 + /etc/ssl/certs/3e44d2f7.0 + /etc/ssl/certs/3e45d192.0 + /etc/ssl/certs/40193066.0 + /etc/ssl/certs/4042bcee.0 + /etc/ssl/certs/40547a79.0 + /etc/ssl/certs/406c9bb1.0 + /etc/ssl/certs/4304c5e5.0 + /etc/ssl/certs/480720ec.0 + /etc/ssl/certs/48bec511.0 + /etc/ssl/certs/4a6481c9.0 + /etc/ssl/certs/4b718d9b.0 + /etc/ssl/certs/4bfab552.0 + /etc/ssl/certs/4f316efb.0 + /etc/ssl/certs/5273a94c.0 + /etc/ssl/certs/5443e9e3.0 + /etc/ssl/certs/54657681.0 + /etc/ssl/certs/57bcb2da.0 + /etc/ssl/certs/5a4d6896.0 + /etc/ssl/certs/5ad8a5d6.0 + /etc/ssl/certs/5c44d531.0 + /etc/ssl/certs/5cd81ad7.0 + /etc/ssl/certs/5d3033c5.0 + /etc/ssl/certs/5f15c80c.0 + /etc/ssl/certs/607986c7.0 + /etc/ssl/certs/626dceaf.0 + /etc/ssl/certs/6410666e.0 + /etc/ssl/certs/653b494a.0 + /etc/ssl/certs/68dd7389.0 + /etc/ssl/certs/6b99d060.0 + /etc/ssl/certs/6d41d539.0 + /etc/ssl/certs/6fa5da56.0 + /etc/ssl/certs/706f604c.0 + /etc/ssl/certs/749e9e03.0 + /etc/ssl/certs/75d1b2ed.0 + /etc/ssl/certs/76cb8f92.0 + /etc/ssl/certs/76faf6c0.0 + /etc/ssl/certs/7719f463.0 + /etc/ssl/certs/773e07ad.0 + /etc/ssl/certs/7aaf71c0.0 + /etc/ssl/certs/7d0b38bd.0 + /etc/ssl/certs/7f3d5d1d.0 + /etc/ssl/certs/812e17de.0 + /etc/ssl/certs/8160b96c.0 + /etc/ssl/certs/8867006a.0 + /etc/ssl/certs/8cb5ee0f.0 + /etc/ssl/certs/8d86cdd1.0 + /etc/ssl/certs/930ac5d2.0 + /etc/ssl/certs/93bc0acc.0 + /etc/ssl/certs/988a38cb.0 + /etc/ssl/certs/9c2e7d30.0 + /etc/ssl/certs/9c8dfbd4.0 + /etc/ssl/certs/9d04f354.0 + /etc/ssl/certs/ACCVRAIZ1.pem + /etc/ssl/certs/AC_RAIZ_FNMT-RCM.pem + /etc/ssl/certs/Actalis_Authentication_Root_CA.pem + /etc/ssl/certs/AddTrust_External_Root.pem + /etc/ssl/certs/AffirmTrust_Commercial.pem + /etc/ssl/certs/AffirmTrust_Networking.pem + /etc/ssl/certs/AffirmTrust_Premium.pem + /etc/ssl/certs/AffirmTrust_Premium_ECC.pem + /etc/ssl/certs/Amazon_Root_CA_1.pem + /etc/ssl/certs/Amazon_Root_CA_2.pem + /etc/ssl/certs/Amazon_Root_CA_3.pem + /etc/ssl/certs/Amazon_Root_CA_4.pem + /etc/ssl/certs/Atos_TrustedRoot_2011.pem + /etc/ssl/certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem + /etc/ssl/certs/Baltimore_CyberTrust_Root.pem + /etc/ssl/certs/Buypass_Class_2_Root_CA.pem + /etc/ssl/certs/Buypass_Class_3_Root_CA.pem + /etc/ssl/certs/CA_Disig_Root_R2.pem + /etc/ssl/certs/CFCA_EV_ROOT.pem + /etc/ssl/certs/COMODO_Certification_Authority.pem + /etc/ssl/certs/COMODO_ECC_Certification_Authority.pem + /etc/ssl/certs/COMODO_RSA_Certification_Authority.pem + /etc/ssl/certs/Certigna.pem + /etc/ssl/certs/Certigna_Root_CA.pem + /etc/ssl/certs/Certplus_Class_2_Primary_CA.pem + /etc/ssl/certs/Certum_Trusted_Network_CA.pem + /etc/ssl/certs/Certum_Trusted_Network_CA_2.pem + /etc/ssl/certs/Chambers_of_Commerce_Root_-_2008.pem + /etc/ssl/certs/Comodo_AAA_Services_root.pem + /etc/ssl/certs/Cybertrust_Global_Root.pem + /etc/ssl/certs/D-TRUST_Root_Class_3_CA_2_2009.pem + /etc/ssl/certs/D-TRUST_Root_Class_3_CA_2_EV_2009.pem + /etc/ssl/certs/DST_Root_CA_X3.pem + /etc/ssl/certs/Deutsche_Telekom_Root_CA_2.pem + /etc/ssl/certs/DigiCert_Assured_ID_Root_CA.pem + /etc/ssl/certs/DigiCert_Assured_ID_Root_G2.pem + /etc/ssl/certs/DigiCert_Assured_ID_Root_G3.pem + /etc/ssl/certs/DigiCert_Global_Root_CA.pem + /etc/ssl/certs/DigiCert_Global_Root_G2.pem + /etc/ssl/certs/DigiCert_Global_Root_G3.pem + /etc/ssl/certs/DigiCert_High_Assurance_EV_Root_CA.pem + /etc/ssl/certs/DigiCert_Trusted_Root_G4.pem + /etc/ssl/certs/E-Tugra_Certification_Authority.pem + /etc/ssl/certs/EC-ACC.pem + /etc/ssl/certs/EE_Certification_Centre_Root_CA.pem + /etc/ssl/certs/Entrust.net_Premium_2048_Secure_Server_CA.pem + /etc/ssl/certs/Entrust_Root_Certification_Authority.pem + /etc/ssl/certs/Entrust_Root_Certification_Authority_-_EC1.pem + /etc/ssl/certs/Entrust_Root_Certification_Authority_-_G2.pem + /etc/ssl/certs/GDCA_TrustAUTH_R5_ROOT.pem + /etc/ssl/certs/GTS_Root_R1.pem + /etc/ssl/certs/GTS_Root_R2.pem + /etc/ssl/certs/GTS_Root_R3.pem + /etc/ssl/certs/GTS_Root_R4.pem + /etc/ssl/certs/GeoTrust_Global_CA.pem + /etc/ssl/certs/GeoTrust_Primary_Certification_Authority.pem + /etc/ssl/certs/GeoTrust_Primary_Certification_Authority_-_G2.pem + /etc/ssl/certs/GeoTrust_Primary_Certification_Authority_-_G3.pem + /etc/ssl/certs/GeoTrust_Universal_CA.pem + /etc/ssl/certs/GeoTrust_Universal_CA_2.pem + /etc/ssl/certs/GlobalSign_ECC_Root_CA_-_R4.pem + /etc/ssl/certs/GlobalSign_ECC_Root_CA_-_R5.pem + /etc/ssl/certs/GlobalSign_Root_CA.pem + /etc/ssl/certs/GlobalSign_Root_CA_-_R2.pem + /etc/ssl/certs/GlobalSign_Root_CA_-_R3.pem + /etc/ssl/certs/GlobalSign_Root_CA_-_R6.pem + /etc/ssl/certs/Global_Chambersign_Root_-_2008.pem + /etc/ssl/certs/Go_Daddy_Class_2_CA.pem + /etc/ssl/certs/Go_Daddy_Root_Certificate_Authority_-_G2.pem + /etc/ssl/certs/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem + /etc/ssl/certs/Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem + /etc/ssl/certs/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem + /etc/ssl/certs/Hongkong_Post_Root_CA_1.pem + /etc/ssl/certs/Hongkong_Post_Root_CA_3.pem + /etc/ssl/certs/ISRG_Root_X1.pem + /etc/ssl/certs/IdenTrust_Commercial_Root_CA_1.pem + /etc/ssl/certs/IdenTrust_Public_Sector_Root_CA_1.pem + /etc/ssl/certs/Izenpe.com.pem + /etc/ssl/certs/LuxTrust_Global_Root_2.pem + /etc/ssl/certs/Microsec_e-Szigno_Root_CA_2009.pem + /etc/ssl/certs/NetLock_Arany_(Class_Gold)_Főtanúsítvány.pem + /etc/ssl/certs/Network_Solutions_Certificate_Authority.pem + /etc/ssl/certs/OISTE_WISeKey_Global_Root_GA_CA.pem + /etc/ssl/certs/OISTE_WISeKey_Global_Root_GB_CA.pem + /etc/ssl/certs/OISTE_WISeKey_Global_Root_GC_CA.pem + /etc/ssl/certs/QuoVadis_Root_CA.pem + /etc/ssl/certs/QuoVadis_Root_CA_1_G3.pem + /etc/ssl/certs/QuoVadis_Root_CA_2.pem + /etc/ssl/certs/QuoVadis_Root_CA_2_G3.pem + /etc/ssl/certs/QuoVadis_Root_CA_3.pem + /etc/ssl/certs/QuoVadis_Root_CA_3_G3.pem + /etc/ssl/certs/SSL.com_EV_Root_Certification_Authority_ECC.pem + /etc/ssl/certs/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem + /etc/ssl/certs/SSL.com_Root_Certification_Authority_ECC.pem + /etc/ssl/certs/SSL.com_Root_Certification_Authority_RSA.pem + /etc/ssl/certs/SZAFIR_ROOT_CA2.pem + /etc/ssl/certs/SecureSign_RootCA11.pem + /etc/ssl/certs/SecureTrust_CA.pem + /etc/ssl/certs/Secure_Global_CA.pem + /etc/ssl/certs/Security_Communication_RootCA2.pem + /etc/ssl/certs/Security_Communication_Root_CA.pem + /etc/ssl/certs/Sonera_Class_2_Root_CA.pem + /etc/ssl/certs/Staat_der_Nederlanden_EV_Root_CA.pem + /etc/ssl/certs/Staat_der_Nederlanden_Root_CA_-_G2.pem + /etc/ssl/certs/Staat_der_Nederlanden_Root_CA_-_G3.pem + /etc/ssl/certs/Starfield_Class_2_CA.pem + /etc/ssl/certs/Starfield_Root_Certificate_Authority_-_G2.pem + /etc/ssl/certs/Starfield_Services_Root_Certificate_Authority_-_G2.pem + /etc/ssl/certs/SwissSign_Gold_CA_-_G2.pem + /etc/ssl/certs/SwissSign_Silver_CA_-_G2.pem + /etc/ssl/certs/T-TeleSec_GlobalRoot_Class_2.pem + /etc/ssl/certs/T-TeleSec_GlobalRoot_Class_3.pem + /etc/ssl/certs/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem + /etc/ssl/certs/TWCA_Global_Root_CA.pem + /etc/ssl/certs/TWCA_Root_Certification_Authority.pem + /etc/ssl/certs/Taiwan_GRCA.pem + /etc/ssl/certs/TeliaSonera_Root_CA_v1.pem + /etc/ssl/certs/TrustCor_ECA-1.pem + /etc/ssl/certs/TrustCor_RootCert_CA-1.pem + /etc/ssl/certs/TrustCor_RootCert_CA-2.pem + /etc/ssl/certs/Trustis_FPS_Root_CA.pem + /etc/ssl/certs/UCA_Extended_Validation_Root.pem + /etc/ssl/certs/UCA_Global_G2_Root.pem + /etc/ssl/certs/USERTrust_ECC_Certification_Authority.pem + /etc/ssl/certs/USERTrust_RSA_Certification_Authority.pem + /etc/ssl/certs/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem + /etc/ssl/certs/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem + /etc/ssl/certs/VeriSign_Universal_Root_Certification_Authority.pem + /etc/ssl/certs/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.pem + /etc/ssl/certs/XRamp_Global_CA_Root.pem + /etc/ssl/certs/a3418fda.0 + /etc/ssl/certs/a94d09e5.0 + /etc/ssl/certs/ad088e1d.0 + /etc/ssl/certs/aee5f10d.0 + /etc/ssl/certs/b0e59380.0 + /etc/ssl/certs/b1159c4c.0 + /etc/ssl/certs/b1b8a7f3.0 + /etc/ssl/certs/b204d74a.0 + /etc/ssl/certs/b66938e9.0 + /etc/ssl/certs/b727005e.0 + /etc/ssl/certs/b7a5b843.0 + /etc/ssl/certs/ba89ed3b.0 + /etc/ssl/certs/c01cdfa2.0 + /etc/ssl/certs/c01eb047.0 + /etc/ssl/certs/c089bbbd.0 + /etc/ssl/certs/c0ff1f52.0 + /etc/ssl/certs/c28a8a30.0 + /etc/ssl/certs/c47d9980.0 + /etc/ssl/certs/ca6e4ad9.0 + /etc/ssl/certs/cbf06781.0 + /etc/ssl/certs/cc450945.0 + /etc/ssl/certs/cd58d51e.0 + /etc/ssl/certs/cd8c0d63.0 + /etc/ssl/certs/ce5e74ef.0 + /etc/ssl/certs/certSIGN_ROOT_CA.pem + /etc/ssl/certs/d4dae3dd.0 + /etc/ssl/certs/d6325660.0 + /etc/ssl/certs/d7e8dc79.0 + /etc/ssl/certs/d853d49e.0 + /etc/ssl/certs/dc4d6a89.0 + /etc/ssl/certs/dd8e9d41.0 + /etc/ssl/certs/de6d66f3.0 + /etc/ssl/certs/def36a68.0 + /etc/ssl/certs/e113c810.0 + /etc/ssl/certs/e18bfb83.0 + /etc/ssl/certs/e2799e36.0 + /etc/ssl/certs/e36a6752.0 + /etc/ssl/certs/e73d606e.0 + /etc/ssl/certs/e8de2f56.0 + /etc/ssl/certs/ePKI_Root_Certification_Authority.pem + /etc/ssl/certs/ee64a828.0 + /etc/ssl/certs/eed8c118.0 + /etc/ssl/certs/ef954a4e.0 + /etc/ssl/certs/emSign_ECC_Root_CA_-_C3.pem + /etc/ssl/certs/emSign_ECC_Root_CA_-_G3.pem + /etc/ssl/certs/emSign_Root_CA_-_C1.pem + /etc/ssl/certs/emSign_Root_CA_-_G1.pem + /etc/ssl/certs/f060240e.0 + /etc/ssl/certs/f081611a.0 + /etc/ssl/certs/f0c70a8d.0 + /etc/ssl/certs/f30dd6ad.0 + /etc/ssl/certs/f3377b1b.0 + /etc/ssl/certs/f387163d.0 + /etc/ssl/certs/f39fc864.0 + /etc/ssl/certs/f51bb24c.0 + /etc/ssl/certs/fc5a8f99.0 + /etc/ssl/certs/fe8a2cd8.0 + /etc/ssl/certs/ff34af3f.0 + /etc/ssl/certs/thawte_Primary_Root_CA.pem + /etc/ssl/certs/thawte_Primary_Root_CA_-_G2.pem + /etc/ssl/certs/thawte_Primary_Root_CA_-_G3.pem + + + + + 2019-09-06 + 20190903 + Packaging update + Fabio Forni + livingsilver94.solus@redaril.me + + + \ No newline at end of file