Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ca-certificates-mozilla-2.42-lp151.2.9.1 RPM for noarch

From OpenSuSE Leap 15.1 updates for noarch

Name: ca-certificates-mozilla Distribution: openSUSE Leap 15.1
Version: 2.42 Vendor: openSUSE
Release: lp151.2.9.1 Build date: Thu Aug 20 18:02:40 2020
Group: Productivity/Networking/Security Build host: lamb01
Size: 281473 Source RPM: ca-certificates-mozilla-2.42-lp151.2.9.1.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.mozilla.org
Summary: CA certificates for OpenSSL
This package contains some CA root certificates for OpenSSL extracted
from MozillaFirefox

Provides

Requires

License

MPL-2.0

Changelog

* Wed Jul 29 2020 Marcus Meissner <meissner@suse.com>
  - update to 2.42 state of the Mozilla NSS Certificate store (bsc#1174673)
    Removed CAs:
    - AddTrust External CA Root
    - AddTrust Class 1 CA Root
    - LuxTrust Global Root 2
    - Staat der Nederlanden Root CA - G2
    - Symantec Class 1 Public Primary Certification Authority - G4
    - Symantec Class 2 Public Primary Certification Authority - G4
    - VeriSign Class 3 Public Primary Certification Authority - G3
    Added CAs:
    - certSIGN Root CA G2
    - e-Szigno Root CA 2017
    - Microsoft ECC Root Certificate Authority 2017
    - Microsoft RSA Root Certificate Authority 2017
  - Reverted p11-kit changes for (boo#1154871), this is fragile on
    fresh installs with "too old" p11-kit.
* Thu Mar 26 2020 Marcus Meissner <meissner@suse.com>
  - also run update-ca-certificates in %posttrans
* Tue Jan 14 2020 Marcus Meissner <meissner@suse.com>
  - update to 2.40 state of the Mozilla NSS Certificate store (bsc#1160160)
  - removed:
    - Certplus Class 2 Primary CA
    - Deutsche Telekom Root CA 2
    - CN=Swisscom Root CA 2
    - UTN-USERFirst-Client Authentication and Email
  - added:
    - Entrust Root Certification Authority - G4
* Wed Dec 18 2019 Ludwig Nussel <lnussel@suse.de>
  - make sure p11-kit with patches is installed on SLE (boo#1154871)
* Tue Nov 12 2019 Ludwig Nussel <lnussel@suse.de>
  - export correct p11kit trust attributes so Firefox detects built in
    certificates (boo#1154871). Courtesy of Fedora.
* Sun Aug 04 2019 Andreas Stieger <andreas.stieger@gmx.de>
  - update to 2.34 state of the Mozilla NSS Certificate store (bsc#1144169)
  - Removed CAs:
    - Certinomis - Root CA
  - includes added root CAs from the 2.32 version:
    - emSign ECC Root CA - C3 (email and server auth)
    - emSign ECC Root CA - G3 (email and server auth)
    - emSign Root CA - C1 (email and server auth)
    - emSign Root CA - G1 (email and server auth)
    - Hongkong Post Root CA 3 (server auth)
* Thu Jan 17 2019 meissner@suse.com
  - updated to 2.30 state of the Mozilla NSS Certificate store. (bsc#1121446)
  - Removed CAs:
    - AC Raiz Certicamara S.A.
    - Certplus Root CA G1
    - Certplus Root CA G2
    - OpenTrust Root CA G1
    - OpenTrust Root CA G2
    - OpenTrust Root CA G3
    - Visa eCommerce Root
  - Added Root CAs:
    - Certigna Root CA (email and server auth)
    - GTS Root R1 (server auth)
    - GTS Root R2 (server auth)
    - GTS Root R3 (server auth)
    - GTS Root R4 (server auth)
    - OISTE WISeKey Global Root GC CA (email and server auth)
    - UCA Extended Validation Root (server auth)
    - UCA Global G2 Root (email and server auth)
* Thu Aug 16 2018 meissner@suse.com
  - updated to 2.26 state of the Mozilla NSS Certificate store. (bsc#1104780)
    - removed server auth
    - Certplus Root CA G1
    - Certplus Root CA G2
    - OpenTrust Root CA G1
    - OpenTrust Root CA G2
    - OpenTrust Root CA G3
    - remove CA
    - ComSign CA
    - added new CA
    - GlobalSign
* Fri Jul 06 2018 meissner@suse.com
  - Updated to 2.24 state of the Mozilla NSS Certificate store. (bsc#1100415)
  - Removed CAs:
    * S-TRUST_Universal_Root_CA:2.16.96.86.197.75.35.64.91.100.212.237.37.218.217.214.30.30.crt
    * TC_TrustCenter_Class_3_CA_II:2.14.74.71.0.1.0.2.229.160.93.214.63.0.81.191.crt
    * TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5:2.7.0.142.23.254.36.32.129.crt
* Tue Mar 20 2018 kukuk@suse.de
  -  Use %license instead of %doc [bsc#1082318]
* Thu Jan 25 2018 meissner@suse.com
  - Updated to 2.22 state of the Mozilla NSS Certificate store (bsc#1071152,
    bsc#1071390, bsc#1010996)
  - Removed CAs:
    * ACEDICOM Root
    * AddTrust Public CA Root
    * AddTrust Qualified CA Root
    * ApplicationCA - Japanese Government
    * CA Disig Root R1
    * CA WoSign ECC Root
    * Certification Authority of WoSign G2
    * Certinomis - Autorité Racine
    * China Internet Network Information Center EV Certificates Root
    * CNNIC ROOT
    * Comodo Secure Certificate Services
    * Comodo Trusted Certificate Services
    * ComSign Secured CA
    * DST ACES CA X6
    * GeoTrust Global CA 2
    * StartCom Certification Authority
    * StartCom Certification Authority
    * StartCom Certification Authority G2
    * Swisscom Root CA 1
    * TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3
    * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
    * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
    * UTN USERFirst Hardware Root CA
    * UTN USERFirst Object Root CA
    * VeriSign Class 3 Secure Server CA - G2
    * WellsSecure Public Root Certificate Authority
    * Certification Authority of WoSign
    * WoSign China
  - Added CAs:
    * D-TRUST Root CA 3 2013
    * GDCA TrustAUTH R5 ROOT
    * SSL.com EV Root Certification Authority ECC
    * SSL.com EV Root Certification Authority RSA R2
    * SSL.com Root Certification Authority ECC
    * SSL.com Root Certification Authority RSA
    * TrustCor RootCert CA-1
    * TrustCor RootCert CA-2
    * TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
* Wed Oct 25 2017 jmatejek@suse.com
  - convert processing script to Python 3
  - ensure a stable conversion of UTF8 hex-encoded certificate names
  - ensure a stable ordering of trust/distrust bits in headers
* Tue Jan 24 2017 meissner@suse.com
  - updated to 2.11 state of the Mozilla NSS Certificate store.
  - removed CAs:
    - Buypass_Class_2_CA_1:2.1.1.crt
      serverAuth
    - EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı:2.8.76.175.115.66.28.142.116.2.crt
      codeSigning emailProtection serverAuth
    - Equifax_Secure_CA:2.4.53.222.244.207.crt
      emailProtection
    - Equifax_Secure_eBusiness_CA_1:2.1.4.crt
      emailProtection
    - Equifax_Secure_Global_eBusiness_CA:2.1.1.crt
      emailProtection
    - IGC_A:2.5.57.17.69.16.148.crt
      codeSigning emailProtection serverAuth
    - Juur-SK:2.4.59.142.75.252.crt
      codeSigning serverAuth
    - Root_CA_Generalitat_Valenciana:2.4.59.69.229.104.crt
      codeSigning emailProtection serverAuth
    - RSA_Security_2048_v3:2.16.10.1.1.1.0.0.2.124.0.0.0.10.0.0.0.2.crt
      codeSigning emailProtection serverAuth
    - Sonera_Class_1_Root_CA:2.1.36.crt
      emailProtection
    - S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN:2.16.55.25.24.230.83.84.124.26.181.184.203.89.90.219.53.183.crt
      emailProtection
    - Verisign_Class_1_Public_Primary_Certification_Authority:2.16.63.105.30.129.156.240.154.74.243.115.255.185.72.162.228.221.crt
      emailProtection
    - Verisign_Class_2_Public_Primary_Certification_Authority_-_G2:2.17.0.185.47.96.204.136.159.161.122.70.9.184.91.112.108.138.175.crt
      emailProtection
    - Verisign_Class_3_Public_Primary_Certification_Authority:2.16.112.186.228.29.16.217.41.52.182.56.202.123.3.204.186.191.crt
      emailProtection
  - added CAs:
    + AC_RAIZ_FNMT-RCM:2.15.93.147.141.48.103.54.200.6.29.26.199.84.132.105.7.crt
      serverAuth
    + Amazon_Root_CA_1:2.19.6.108.159.207.153.191.140.10.57.226.240.120.138.67.230.150.54.91.202.crt
      emailProtection serverAuth
    + Amazon_Root_CA_2:2.19.6.108.159.210.150.53.134.159.10.15.229.134.120.248.91.38.187.138.55.crt
      emailProtection serverAuth
    + Amazon_Root_CA_3:2.19.6.108.159.213.116.151.54.102.63.59.11.154.217.232.158.118.3.242.74.crt
      emailProtection serverAuth
    + Amazon_Root_CA_4:2.19.6.108.159.215.193.187.16.76.41.67.229.113.123.123.44.200.26.193.14.crt
      emailProtection serverAuth
    + Certplus_Root_CA_G1:2.18.17.32.85.131.228.45.62.84.86.133.45.131.55.183.44.220.70.17.crt
      emailProtection serverAuth
    + Certplus_Root_CA_G2:2.18.17.32.217.145.206.174.163.232.197.231.255.233.2.175.207.115.188.85.crt
      emailProtection serverAuth
    + Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015:2.1.0.crt
      emailProtection serverAuth
    + Hellenic_Academic_and_Research_Institutions_RootCA_2015:2.1.0.crt
      emailProtection serverAuth
    + ISRG_Root_X1:2.17.0.130.16.207.176.210.64.227.89.68.99.224.187.99.130.139.0.crt (bsc#1010996)
      serverAuth
    + LuxTrust_Global_Root_2:2.20.10.126.166.223.75.68.158.218.106.36.133.158.230.184.21.211.22.127.187.177.crt
      serverAuth
    + OpenTrust_Root_CA_G1:2.18.17.32.179.144.85.57.125.127.54.109.100.194.167.159.107.99.142.103.crt
      emailProtection serverAuth
    + OpenTrust_Root_CA_G2:2.18.17.32.161.105.27.191.189.185.189.82.150.143.35.232.72.191.38.17.crt
      emailProtection serverAuth
    + OpenTrust_Root_CA_G3:2.18.17.32.230.248.76.252.36.176.190.5.64.172.218.131.27.52.96.63.crt
      emailProtection serverAuth
    + Symantec_Class_1_Public_Primary_Certification_Authority_-_G4:2.16.33.110.51.165.203.211.136.164.111.41.7.180.39.60.196.216.crt
      emailProtection
    + Symantec_Class_1_Public_Primary_Certification_Authority_-_G6:2.16.36.50.117.242.29.47.210.9.51.247.180.106.202.208.243.152.crt
      emailProtection
    + Symantec_Class_2_Public_Primary_Certification_Authority_-_G4:2.16.52.23.101.18.64.59.183.86.128.45.128.203.121.85.166.30.crt
      emailProtection
    + Symantec_Class_2_Public_Primary_Certification_Authority_-_G6:2.16.100.130.158.252.55.30.116.93.252.151.255.151.200.177.255.65.crt
      emailProtection
  - diff-from-upstream-2.7.patch: removed as we should be able to do
    intermediate root chains now with openssl 1.0.2 and also gnutls 3.5
    is able to do so.
* Wed Apr 06 2016 meissner@suse.com
  - diff-from-upstream-2.7.patch: restore some important legacy
    CAs, otherwise Pidgin fails to talk to Google Talk for instance.
* Thu Mar 31 2016 meissner@suse.com
  - Updated to 2.7 (bsc#973042).
  - diff-from-upstream-2.2.patch: removed as openssl 1.0.2 can do
    immediate root CAs.
  - Removed server trust from:
    AC Raíz Certicámara S.A.
    ComSign Secured CA
    NetLock Uzleti (Class B) Tanusitvanykiado
    NetLock Business (Class B) Root
    NetLock Expressz (Class C) Tanusitvanykiado
    TC TrustCenter Class 3 CA II
    TURKTRUST Certificate Services Provider Root 1
    TURKTRUST Certificate Services Provider Root 2
    Equifax Secure Global eBusiness CA-1
    Verisign Class 4 Public Primary Certification Authority G3
  - enable server trust
    Actalis Authentication Root CA
  - Deleted CAs:
    A Trust nQual 03
    Buypass Class 3 CA 1
    CA Disig
    Digital Signature Trust Co Global CA 1
    Digital Signature Trust Co Global CA 3
    E Guven Kok Elektronik Sertifika Hizmet Saglayicisi
    NetLock Expressz (Class C) Tanusitvanykiado
    NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    NetLock Uzleti (Class B) Tanusitvanykiado
    SG TRUST SERVICES RACINE
    Staat der Nederlanden Root CA
    TC TrustCenter Class 2 CA II
    TC TrustCenter Universal CA I
    TDC Internet Root CA
    UTN DATACorp SGC Root CA
    Verisign Class 1 Public Primary Certification Authority - G2
    Verisign Class 3 Public Primary Certification Authority
    Verisign Class 3 Public Primary Certification Authority - G2
  - New added CAs:
    CA WoSign ECC Root
    Certification Authority of WoSign
    Certification Authority of WoSign G2
    Certinomis - Root CA
    Certum Trusted Network CA 2
    CFCA EV ROOT
    COMODO RSA Certification Authority
    DigiCert Assured ID Root G2
    DigiCert Assured ID Root G3
    DigiCert Global Root G2
    DigiCert Global Root G3
    DigiCert Trusted Root G4
    Entrust Root Certification Authority - EC1
    Entrust Root Certification Authority - G2
    GlobalSign
    GlobalSign
    IdenTrust Commercial Root CA 1
    IdenTrust Public Sector Root CA 1
    OISTE WISeKey Global Root GB CA
    QuoVadis Root CA 1 G3
    QuoVadis Root CA 2 G3
    QuoVadis Root CA 3 G3
    Staat der Nederlanden EV Root CA
    Staat der Nederlanden Root CA - G3
    S-TRUST Universal Root CA
    SZAFIR ROOT CA2
    TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5
    TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
    USERTrust ECC Certification Authority
    USERTrust RSA Certification Authority
    沃通根证书
* Wed Jan 14 2015 meissner@suse.com
  - diff-from-upstream-2.2.patch:
    Temporary reenable some root ca trusts, as openssl/gnutls
    have trouble using intermediates as root CA.
    - GTE CyberTrust Global Root
    - Thawte Server CA
    - Thawte Premium Server CA
    - ValiCert Class 1 VA
    - ValiCert Class 2 VA
    - RSA Root Certificate 1
    - Entrust.net Secure Server CA
    - America Online Root Certification Authority 1
    - America Online Root Certification Authority 2
* Mon Jan 12 2015 meissner@suse.com
  - Updated to 2.2 (bnc#888534)
    - The following CAs were removed:
      + America_Online_Root_Certification_Authority_1
      + America_Online_Root_Certification_Authority_2
      + GTE_CyberTrust_Global_Root
      + Thawte_Premium_Server_CA
      + Thawte_Server_CA
    - The following CAs were added:
      + COMODO_RSA_Certification_Authority
      codeSigning emailProtection serverAuth
      + GlobalSign_ECC_Root_CA_-_R4
      codeSigning emailProtection serverAuth
      + GlobalSign_ECC_Root_CA_-_R5
      codeSigning emailProtection serverAuth
      + USERTrust_ECC_Certification_Authority
      codeSigning emailProtection serverAuth
      + USERTrust_RSA_Certification_Authority
      codeSigning emailProtection serverAuth
      + VeriSign-C3SSA-G2-temporary-intermediate-after-1024bit-removal
    - The following CAs were changed:
      + Equifax_Secure_eBusiness_CA_1
      remote code signing and https trust, leave email trust
      + Verisign_Class_3_Public_Primary_Certification_Authority_-_G2
      only trust emailProtection

Files

/usr/share/licenses/ca-certificates-mozilla
/usr/share/licenses/ca-certificates-mozilla/COPYING
/usr/share/pki/trust
/usr/share/pki/trust/ACCVRAIZ1.pem
/usr/share/pki/trust/AC_RAIZ_FNMT-RCM.pem
/usr/share/pki/trust/Actalis_Authentication_Root_CA.pem
/usr/share/pki/trust/AffirmTrust_Commercial.pem
/usr/share/pki/trust/AffirmTrust_Networking.pem
/usr/share/pki/trust/AffirmTrust_Premium.pem
/usr/share/pki/trust/AffirmTrust_Premium_ECC.pem
/usr/share/pki/trust/Amazon_Root_CA_1.pem
/usr/share/pki/trust/Amazon_Root_CA_2.pem
/usr/share/pki/trust/Amazon_Root_CA_3.pem
/usr/share/pki/trust/Amazon_Root_CA_4.pem
/usr/share/pki/trust/Atos_TrustedRoot_2011.pem
/usr/share/pki/trust/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
/usr/share/pki/trust/Baltimore_CyberTrust_Root.pem
/usr/share/pki/trust/Buypass_Class_2_Root_CA.pem
/usr/share/pki/trust/Buypass_Class_3_Root_CA.pem
/usr/share/pki/trust/CA_Disig_Root_R2.pem
/usr/share/pki/trust/CFCA_EV_ROOT.pem
/usr/share/pki/trust/COMODO_Certification_Authority.pem
/usr/share/pki/trust/COMODO_ECC_Certification_Authority.pem
/usr/share/pki/trust/COMODO_RSA_Certification_Authority.pem
/usr/share/pki/trust/Camerfirma_Chambers_of_Commerce_Root.pem
/usr/share/pki/trust/Camerfirma_Global_Chambersign_Root.pem
/usr/share/pki/trust/Certigna.pem
/usr/share/pki/trust/Certigna_Root_CA.pem
/usr/share/pki/trust/Certum_Root_CA.pem
/usr/share/pki/trust/Certum_Trusted_Network_CA.pem
/usr/share/pki/trust/Certum_Trusted_Network_CA_2.pem
/usr/share/pki/trust/Chambers_of_Commerce_Root_-_2008.pem
/usr/share/pki/trust/Comodo_AAA_Services_root.pem
/usr/share/pki/trust/Cybertrust_Global_Root.pem
/usr/share/pki/trust/D-TRUST_Root_CA_3_2013.pem
/usr/share/pki/trust/D-TRUST_Root_Class_3_CA_2_2009.pem
/usr/share/pki/trust/D-TRUST_Root_Class_3_CA_2_EV_2009.pem
/usr/share/pki/trust/DST_Root_CA_X3.pem
/usr/share/pki/trust/DigiCert_Assured_ID_Root_CA.pem
/usr/share/pki/trust/DigiCert_Assured_ID_Root_G2.pem
/usr/share/pki/trust/DigiCert_Assured_ID_Root_G3.pem
/usr/share/pki/trust/DigiCert_Global_Root_CA.pem
/usr/share/pki/trust/DigiCert_Global_Root_G2.pem
/usr/share/pki/trust/DigiCert_Global_Root_G3.pem
/usr/share/pki/trust/DigiCert_High_Assurance_EV_Root_CA.pem
/usr/share/pki/trust/DigiCert_Trusted_Root_G4.pem
/usr/share/pki/trust/E-Tugra_Certification_Authority.pem
/usr/share/pki/trust/EC-ACC.pem
/usr/share/pki/trust/EE_Certification_Centre_Root_CA.pem
/usr/share/pki/trust/Entrust.net_Premium_2048_Secure_Server_CA.pem
/usr/share/pki/trust/Entrust_Root_Certification_Authority.pem
/usr/share/pki/trust/Entrust_Root_Certification_Authority_-_EC1.pem
/usr/share/pki/trust/Entrust_Root_Certification_Authority_-_G2.pem
/usr/share/pki/trust/Entrust_Root_Certification_Authority_-_G4.pem
/usr/share/pki/trust/Explicitly_Distrust_DigiNotar_Root_CA.pem
/usr/share/pki/trust/Explicitly_Distrusted_DigiNotar_PKIoverheid_G2.pem
/usr/share/pki/trust/GDCA_TrustAUTH_R5_ROOT.pem
/usr/share/pki/trust/GTS_Root_R1.pem
/usr/share/pki/trust/GTS_Root_R2.pem
/usr/share/pki/trust/GTS_Root_R3.pem
/usr/share/pki/trust/GTS_Root_R4.pem
/usr/share/pki/trust/GeoTrust_Global_CA.pem
/usr/share/pki/trust/GeoTrust_Primary_Certification_Authority.pem
/usr/share/pki/trust/GeoTrust_Primary_Certification_Authority_-_G2.pem
/usr/share/pki/trust/GeoTrust_Primary_Certification_Authority_-_G3.pem
/usr/share/pki/trust/GeoTrust_Universal_CA.pem
/usr/share/pki/trust/GeoTrust_Universal_CA_2.pem
/usr/share/pki/trust/GlobalSign_ECC_Root_CA_-_R4.pem
/usr/share/pki/trust/GlobalSign_ECC_Root_CA_-_R5.pem
/usr/share/pki/trust/GlobalSign_Root_CA.pem
/usr/share/pki/trust/GlobalSign_Root_CA_-_R2.pem
/usr/share/pki/trust/GlobalSign_Root_CA_-_R3.pem
/usr/share/pki/trust/GlobalSign_Root_CA_-_R6.pem
/usr/share/pki/trust/Global_Chambersign_Root_-_2008.pem
/usr/share/pki/trust/Go_Daddy_Class_2_CA.pem
/usr/share/pki/trust/Go_Daddy_Root_Certificate_Authority_-_G2.pem
/usr/share/pki/trust/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem
/usr/share/pki/trust/Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
/usr/share/pki/trust/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem
/usr/share/pki/trust/Hongkong_Post_Root_CA_1.pem
/usr/share/pki/trust/Hongkong_Post_Root_CA_3.pem
/usr/share/pki/trust/ISRG_Root_X1.pem
/usr/share/pki/trust/IdenTrust_Commercial_Root_CA_1.pem
/usr/share/pki/trust/IdenTrust_Public_Sector_Root_CA_1.pem
/usr/share/pki/trust/Izenpe.com.pem
/usr/share/pki/trust/MITM_subCA_1_issued_by_Trustwave:2.4.107.73.210.5.p11-kit
/usr/share/pki/trust/MITM_subCA_2_issued_by_Trustwave:2.4.107.73.210.6.p11-kit
/usr/share/pki/trust/Microsec_e-Szigno_Root_CA_2009.pem
/usr/share/pki/trust/Microsoft_ECC_Root_Certificate_Authority_2017.pem
/usr/share/pki/trust/Microsoft_RSA_Root_Certificate_Authority_2017.pem
/usr/share/pki/trust/NetLock_Arany_=Class_Gold=_Főtanúsítvány.pem
/usr/share/pki/trust/Network_Solutions_Certificate_Authority.pem
/usr/share/pki/trust/OISTE_WISeKey_Global_Root_GA_CA.pem
/usr/share/pki/trust/OISTE_WISeKey_Global_Root_GB_CA.pem
/usr/share/pki/trust/OISTE_WISeKey_Global_Root_GC_CA.pem
/usr/share/pki/trust/QuoVadis_Root_CA.pem
/usr/share/pki/trust/QuoVadis_Root_CA_1_G3.pem
/usr/share/pki/trust/QuoVadis_Root_CA_2.pem
/usr/share/pki/trust/QuoVadis_Root_CA_2_G3.pem
/usr/share/pki/trust/QuoVadis_Root_CA_3.pem
/usr/share/pki/trust/QuoVadis_Root_CA_3_G3.pem
/usr/share/pki/trust/SSL.com_EV_Root_Certification_Authority_ECC.pem
/usr/share/pki/trust/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem
/usr/share/pki/trust/SSL.com_Root_Certification_Authority_ECC.pem
/usr/share/pki/trust/SSL.com_Root_Certification_Authority_RSA.pem
/usr/share/pki/trust/SZAFIR_ROOT_CA2.pem
/usr/share/pki/trust/SecureSign_RootCA11.pem
/usr/share/pki/trust/SecureTrust_CA.pem
/usr/share/pki/trust/Secure_Global_CA.pem
/usr/share/pki/trust/Security_Communication_RootCA2.pem
/usr/share/pki/trust/Security_Communication_Root_CA.pem
/usr/share/pki/trust/Sonera_Class_2_Root_CA.pem
/usr/share/pki/trust/Staat_der_Nederlanden_EV_Root_CA.pem
/usr/share/pki/trust/Staat_der_Nederlanden_Root_CA_-_G3.pem
/usr/share/pki/trust/Starfield_Class_2_CA.pem
/usr/share/pki/trust/Starfield_Root_Certificate_Authority_-_G2.pem
/usr/share/pki/trust/Starfield_Services_Root_Certificate_Authority_-_G2.pem
/usr/share/pki/trust/SwissSign_Gold_CA_-_G2.pem
/usr/share/pki/trust/SwissSign_Platinum_CA_-_G2.pem
/usr/share/pki/trust/SwissSign_Silver_CA_-_G2.pem
/usr/share/pki/trust/Symantec_Class_1_Public_Primary_Certification_Authority_-_G6.pem
/usr/share/pki/trust/Symantec_Class_2_Public_Primary_Certification_Authority_-_G6.pem
/usr/share/pki/trust/T-TeleSec_GlobalRoot_Class_2.pem
/usr/share/pki/trust/T-TeleSec_GlobalRoot_Class_3.pem
/usr/share/pki/trust/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem
/usr/share/pki/trust/TURKTRUST_Mis-issued_Intermediate_CA_1:2.2.8.39.p11-kit
/usr/share/pki/trust/TURKTRUST_Mis-issued_Intermediate_CA_2:2.2.8.100.p11-kit
/usr/share/pki/trust/TWCA_Global_Root_CA.pem
/usr/share/pki/trust/TWCA_Root_Certification_Authority.pem
/usr/share/pki/trust/Taiwan_GRCA.pem
/usr/share/pki/trust/TeliaSonera_Root_CA_v1.pem
/usr/share/pki/trust/TrustCor_ECA-1.pem
/usr/share/pki/trust/TrustCor_RootCert_CA-1.pem
/usr/share/pki/trust/TrustCor_RootCert_CA-2.pem
/usr/share/pki/trust/Trustis_FPS_Root_CA.pem
/usr/share/pki/trust/UCA_Extended_Validation_Root.pem
/usr/share/pki/trust/UCA_Global_G2_Root.pem
/usr/share/pki/trust/USERTrust_ECC_Certification_Authority.pem
/usr/share/pki/trust/USERTrust_RSA_Certification_Authority.pem
/usr/share/pki/trust/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem
/usr/share/pki/trust/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem
/usr/share/pki/trust/VeriSign_Universal_Root_Certification_Authority.pem
/usr/share/pki/trust/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.pem
/usr/share/pki/trust/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.pem
/usr/share/pki/trust/XRamp_Global_CA_Root.pem
/usr/share/pki/trust/anchors
/usr/share/pki/trust/certSIGN_ROOT_CA.pem
/usr/share/pki/trust/certSIGN_Root_CA_G2.pem
/usr/share/pki/trust/e-Szigno_Root_CA_2017.pem
/usr/share/pki/trust/ePKI_Root_Certification_Authority.pem
/usr/share/pki/trust/emSign_ECC_Root_CA_-_C3.pem
/usr/share/pki/trust/emSign_ECC_Root_CA_-_G3.pem
/usr/share/pki/trust/emSign_Root_CA_-_C1.pem
/usr/share/pki/trust/emSign_Root_CA_-_G1.pem
/usr/share/pki/trust/thawte_Primary_Root_CA.pem
/usr/share/pki/trust/thawte_Primary_Root_CA_-_G2.pem
/usr/share/pki/trust/thawte_Primary_Root_CA_-_G3.pem


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Oct 9 11:59:50 2021