Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ca-certificates-2021.2.50-3.fc35 RPM for noarch

From Fedora Rawhide for aarch64 / c

Name: ca-certificates Distribution: Fedora Project
Version: 2021.2.50 Vendor: Fedora Project
Release: 3.fc35 Build date: Wed Jul 21 21:13:52 2021
Group: Unspecified Build host: buildvm-a64-32.iad2.fedoraproject.org
Size: 939948 Source RPM: ca-certificates-2021.2.50-3.fc35.src.rpm
Packager: Fedora Project
Url: https://fedoraproject.org/wiki/CA-Certificates
Summary: The Mozilla CA root certificate bundle
This package contains the set of CA certificates chosen by the
Mozilla Foundation for use with the Internet PKI.

Provides

Requires

License

Public Domain

Changelog

* Wed Jul 21 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2021.2.50-3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Wed Jun 16 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.50-2
  - Update to CKBI 2.50 from NSS 3.67
  -    Removing:
  -     # Certificate "Trustis FPS Root CA"
  -     # Certificate "GlobalSign Code Signing Root R45"
  -     # Certificate "GlobalSign Code Signing Root E45"
  -     # Certificate "Halcom Root Certificate Authority"
  -     # Certificate "Symantec Class 3 Public Primary Certification Authority - G6"
  -     # Certificate "GLOBALTRUST"
  -     # Certificate "MULTICERT Root Certification Authority 01"
  -     # Certificate "Verizon Global Root CA"
  -     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
  -     # Certificate "CAEDICOM Root"
  -     # Certificate "COMODO Certification Authority"
  -     # Certificate "Security Communication ECC RootCA1"
  -     # Certificate "Security Communication RootCA3"
  -     # Certificate "AC RAIZ DNIE"
  -     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G3"
  -     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
  -     # Certificate "VeriSign Universal Root Certification Authority"
  -     # Certificate "GeoTrust Global CA"
  -     # Certificate "GeoTrust Primary Certification Authority"
  -     # Certificate "thawte Primary Root CA"
  -     # Certificate "thawte Primary Root CA - G2"
  -     # Certificate "thawte Primary Root CA - G3"
  -     # Certificate "GeoTrust Primary Certification Authority - G3"
  -     # Certificate "GeoTrust Primary Certification Authority - G2"
  -     # Certificate "GeoTrust Universal CA"
  -     # Certificate "NetLock Platina (Class Platinum) Főtanúsítvány"
  -     # Certificate "GLOBALTRUST 2015"
  -     # Certificate "emSign Root CA - G2"
  -     # Certificate "emSign Root CA - C2"
  -    Adding:
  -     # Certificate "GLOBALTRUST 2020"
  -     # Certificate "ANF Secure Server Root CA"
* Tue May 25 2021 Bob Relyea <rrelyea@redhat.com> - 2021.2.48-2
  - Update to CKBI 2.48 from NSS 3.64
  -    Removing:
  -     # Certificate "Verisign Class 3 Public Primary Certification Authority - G3"
  -     # Certificate "GeoTrust Universal CA 2"
  -     # Certificate "QuoVadis Root CA"
  -     # Certificate "Sonera Class 2 Root CA"
  -     # Certificate "Taiwan GRCA"
  -     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
  -     # Certificate "EE Certification Centre Root CA"
  -     # Certificate "LuxTrust Global Root 2"
  -     # Certificate "Symantec Class 1 Public Primary Certification Authority - G4"
  -     # Certificate "Symantec Class 2 Public Primary Certification Authority - G4"
  -    Adding:
  -     # Certificate "Microsoft ECC Root Certificate Authority 2017"
  -     # Certificate "Microsoft RSA Root Certificate Authority 2017"
  -     # Certificate "e-Szigno Root CA 2017"
  -     # Certificate "certSIGN Root CA G2"
  -     # Certificate "Trustwave Global Certification Authority"
  -     # Certificate "Trustwave Global ECC P256 Certification Authority"
  -     # Certificate "Trustwave Global ECC P384 Certification Authority"
  -     # Certificate "NAVER Global Root Certification Authority"
  -     # Certificate "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
  -     # Certificate "GlobalSign Secure Mail Root R45"
  -     # Certificate "GlobalSign Secure Mail Root E45"
  -     # Certificate "GlobalSign Root R46"
  -     # Certificate "GlobalSign Root E46"
  -     # Certificate "Certum EC-384 CA"
  -     # Certificate "Certum Trusted Root CA"
  -     # Certificate "GlobalSign Code Signing Root R45"
  -     # Certificate "GlobalSign Code Signing Root E45"
  -     # Certificate "Halcom Root Certificate Authority"
  -     # Certificate "Symantec Class 3 Public Primary Certification Authority - G6"
  -     # Certificate "GLOBALTRUST"
  -     # Certificate "MULTICERT Root Certification Authority 01"
  -     # Certificate "Verizon Global Root CA"
  -     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
  -     # Certificate "CAEDICOM Root"
  -     # Certificate "COMODO Certification Authority"
  -     # Certificate "Security Communication ECC RootCA1"
  -     # Certificate "Security Communication RootCA3"
  -     # Certificate "AC RAIZ DNIE"
  -     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G3"
  -     # Certificate "NetLock Platina (Class Platinum) Főtanúsítvány"
  -     # Certificate "GLOBALTRUST 2015"
  -     # Certificate "emSign Root CA - G2"
  -     # Certificate "emSign Root CA - C2"
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-7
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Wed Jan 13 2021 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-6
  - remove unnecessarily divisive terms, take 1.
  -   in ca-certificates there are 3 cases:
  -   1) master refering to the fedora master branch in the fetch.sh script.
  -      This can only be changed once fedora changes the master branch name.
  -   2) a reference to the 'master bundle' in this file: this has been changed
  -      to 'primary bundle'.
  -   3) a couple of blacklist directories owned by this package, but used to
  -      p11-kit. New 'blocklist' directories have been created, but p11-kit
  -      needs to be updated before the old blacklist directories can be removed
  -      and the man pages corrected.
* Mon Nov 09 2020 Christian Heimes <cheimes@redhat.com> - 2020.2.41-5
  - Add cross-distro compatibility symlinks to /etc/ssl (rhbz#1895619)
* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 2020.2.41-4
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Tue Jun 16 2020 Adam Williamson <awilliam@redhat.com> - 2020.2.41-3
  - Fix up broken %post and %postinstall scriptlet changes from -2
* Wed Jun 10 2020 Bob Relyea <rrelyea@redhat.com> - 2020.2.41-2
  - Update to CKBI 2.41 from NSS 3.53.0
  -    Removing:
  -     # Certificate "AddTrust Low-Value Services Root"
  -     # Certificate "AddTrust External Root"
  -     # Certificate "Staat der Nederlanden Root CA - G2"
* Tue Jan 28 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-3
  - Update versioned dependency on p11-kit
* Wed Jan 22 2020 Daiki Ueno <dueno@redhat.com> - 2020.2.40-2
  - Update to CKBI 2.40 from NSS 3.48
  -    Removing:
  -     # Certificate "UTN USERFirst Email Root CA"
  -     # Certificate "Certplus Class 2 Primary CA"
  -     # Certificate "Deutsche Telekom Root CA 2"
  -     # Certificate "Swisscom Root CA 2"
  -     # Certificate "Certinomis - Root CA"
  -    Adding:
  -     # Certificate "Entrust Root Certification Authority - G4"
  - certdata2pem.py: emit flags for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER
* Wed Jul 24 2019 Fedora Release Engineering <releng@fedoraproject.org> - 2019.2.32-3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild

Files

/etc/pki/ca-trust
/etc/pki/ca-trust/README
/etc/pki/ca-trust/ca-legacy.conf
/etc/pki/ca-trust/extracted
/etc/pki/ca-trust/extracted/README
/etc/pki/ca-trust/extracted/edk2/README
/etc/pki/ca-trust/extracted/edk2/cacerts.bin
/etc/pki/ca-trust/extracted/java
/etc/pki/ca-trust/extracted/java/README
/etc/pki/ca-trust/extracted/java/cacerts
/etc/pki/ca-trust/extracted/openssl
/etc/pki/ca-trust/extracted/openssl/README
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
/etc/pki/ca-trust/extracted/pem
/etc/pki/ca-trust/extracted/pem/README
/etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem
/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
/etc/pki/ca-trust/source
/etc/pki/ca-trust/source/README
/etc/pki/ca-trust/source/anchors
/etc/pki/ca-trust/source/blacklist
/etc/pki/ca-trust/source/blocklist
/etc/pki/ca-trust/source/ca-bundle.legacy.crt
/etc/pki/java
/etc/pki/java/cacerts
/etc/pki/tls
/etc/pki/tls/cert.pem
/etc/pki/tls/certs
/etc/pki/tls/certs/ca-bundle.crt
/etc/pki/tls/certs/ca-bundle.trust.crt
/etc/ssl
/etc/ssl/cert.pem
/etc/ssl/certs
/etc/ssl/ct_log_list.cnf
/etc/ssl/openssl.cnf
/usr/bin/ca-legacy
/usr/bin/update-ca-trust
/usr/share/man/man8/ca-legacy.8.gz
/usr/share/man/man8/update-ca-trust.8.gz
/usr/share/pki
/usr/share/pki/ca-trust-legacy
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt
/usr/share/pki/ca-trust-source
/usr/share/pki/ca-trust-source/README
/usr/share/pki/ca-trust-source/anchors
/usr/share/pki/ca-trust-source/blacklist
/usr/share/pki/ca-trust-source/blocklist
/usr/share/pki/ca-trust-source/ca-bundle.trust.p11-kit


Generated by rpm2html 1.8.1

Fabrice Bellet, Wed Oct 27 00:11:42 2021