Merge ^/head r352764 through r353315.
This commit is contained in:
commit
8b3bc70a2b
3
Makefile
3
Makefile
@ -34,6 +34,7 @@
|
||||
# targets - Print a list of supported TARGET/TARGET_ARCH pairs
|
||||
# for world and kernel targets.
|
||||
# toolchains - Build a toolchain for all world and kernel targets.
|
||||
# makeman - Regenerate src.conf(5)
|
||||
# sysent - (Re)build syscall entries from syscalls.master.
|
||||
# xdev - xdev-build + xdev-install for the architecture
|
||||
# specified with TARGET and TARGET_ARCH.
|
||||
@ -132,7 +133,7 @@ TGTS= all all-man buildenv buildenvvars buildkernel buildworld \
|
||||
reinstallkernel reinstallkernel.debug \
|
||||
installworld kernel-toolchain libraries maninstall \
|
||||
obj objlink showconfig tags toolchain update \
|
||||
sysent \
|
||||
makeman sysent \
|
||||
_worldtmp _legacy _bootstrap-tools _cleanobj _obj \
|
||||
_build-tools _build-metadata _cross-tools _includes _libraries \
|
||||
build32 distribute32 install32 buildsoft distributesoft installsoft \
|
||||
|
@ -678,6 +678,10 @@ CROSSENV+= BUILD_TOOLS_META=.NOMETA
|
||||
.if defined(TARGET_CFLAGS)
|
||||
CROSSENV+= ${TARGET_CFLAGS}
|
||||
.endif
|
||||
.if (${TARGET} != ${MACHINE} && !defined(WITH_LOCAL_MODULES)) || \
|
||||
defined(WITHOUT_LOCAL_MODULES)
|
||||
CROSSENV+= LOCAL_MODULES=
|
||||
.endif
|
||||
|
||||
BOOTSTRAPPING_OSRELDATE?=${OSRELDATE}
|
||||
|
||||
@ -1461,8 +1465,14 @@ packageworld: .PHONY
|
||||
. endif
|
||||
.endfor
|
||||
|
||||
makeman: .PHONY
|
||||
${_+_}cd ${.CURDIR}/tools/build/options; sh makeman > \
|
||||
${.CURDIR}/share/man/man5/src.conf.5
|
||||
|
||||
_sysent_dirs= sys/kern
|
||||
_sysent_dirs+= sys/compat/freebsd32
|
||||
_sysent_dirs+= sys/compat/cloudabi32 \
|
||||
sys/compat/cloudabi64
|
||||
_sysent_dirs+= sys/amd64/linux \
|
||||
sys/amd64/linux32 \
|
||||
sys/arm64/linux \
|
||||
|
@ -199,6 +199,10 @@ OLD_FILES+=usr/include/c++/v1/experimental/system_error
|
||||
OLD_FILES+=usr/include/c++/v1/experimental/tuple
|
||||
OLD_FILES+=usr/lib/libc++fs.a
|
||||
OLD_FILES+=usr/lib32/libc++fs.a
|
||||
# 20191003: Remove useless ZFS tests
|
||||
OLD_FILES+=usr/tests/sys/cddl/zfs/tests/cli_root/zpool_create/zpool_create_013_neg.ksh
|
||||
OLD_FILES+=usr/tests/sys/cddl/zfs/tests/cli_root/zpool_create/zpool_create_014_neg.ksh
|
||||
OLD_FILES+=usr/tests/sys/cddl/zfs/tests/cli_root/zpool_create/zpool_create_016_pos.ksh
|
||||
# 20190910: mklocale(1) and colldef(1) removed
|
||||
OLD_FILES+=usr/bin/mklocale
|
||||
OLD_FILES+=usr/share/man/man1/mklocale.1.gz
|
||||
|
6
UPDATING
6
UPDATING
@ -26,6 +26,12 @@ NOTE TO PEOPLE WHO THINK THAT FreeBSD 13.x IS SLOW:
|
||||
disable the most expensive debugging functionality run
|
||||
"ln -s 'abort:false,junk:false' /etc/malloc.conf".)
|
||||
|
||||
20191003:
|
||||
The hpt27xx, hptmv, hptnr, and hptrr drivers have been removed from
|
||||
GENERIC. They are available as modules and can be loaded by adding
|
||||
to /boot/loader.conf hpt27xx_load="YES", hptmv_load="YES",
|
||||
hptnr_load="YES", or hptrr_load="YES", respectively.
|
||||
|
||||
20190913:
|
||||
ntpd no longer by default locks its pages in memory, allowing them
|
||||
to be paged out by the kernel. Use rlimit memlock to restore
|
||||
|
@ -41,7 +41,7 @@ static char sccsid[] = "@(#)args.c 8.3 (Berkeley) 4/2/94";
|
||||
#include <sys/cdefs.h>
|
||||
__FBSDID("$FreeBSD$");
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <sys/param.h>
|
||||
|
||||
#include <ctype.h>
|
||||
#include <err.h>
|
||||
@ -57,6 +57,8 @@ __FBSDID("$FreeBSD$");
|
||||
|
||||
static int c_arg(const void *, const void *);
|
||||
static int c_conv(const void *, const void *);
|
||||
static int c_iflag(const void *, const void *);
|
||||
static int c_oflag(const void *, const void *);
|
||||
static void f_bs(char *);
|
||||
static void f_cbs(char *);
|
||||
static void f_conv(char *);
|
||||
@ -65,8 +67,10 @@ static void f_files(char *);
|
||||
static void f_fillchar(char *);
|
||||
static void f_ibs(char *);
|
||||
static void f_if(char *);
|
||||
static void f_iflag(char *);
|
||||
static void f_obs(char *);
|
||||
static void f_of(char *);
|
||||
static void f_oflag(char *);
|
||||
static void f_seek(char *);
|
||||
static void f_skip(char *);
|
||||
static void f_speed(char *);
|
||||
@ -77,7 +81,7 @@ static off_t get_off_t(const char *);
|
||||
static const struct arg {
|
||||
const char *name;
|
||||
void (*f)(char *);
|
||||
u_int set, noset;
|
||||
uint64_t set, noset;
|
||||
} args[] = {
|
||||
{ "bs", f_bs, C_BS, C_BS|C_IBS|C_OBS|C_OSYNC },
|
||||
{ "cbs", f_cbs, C_CBS, C_CBS },
|
||||
@ -87,9 +91,11 @@ static const struct arg {
|
||||
{ "fillchar", f_fillchar, C_FILL, C_FILL },
|
||||
{ "ibs", f_ibs, C_IBS, C_BS|C_IBS },
|
||||
{ "if", f_if, C_IF, C_IF },
|
||||
{ "iflag", f_iflag, 0, 0 },
|
||||
{ "iseek", f_skip, C_SKIP, C_SKIP },
|
||||
{ "obs", f_obs, C_OBS, C_BS|C_OBS },
|
||||
{ "of", f_of, C_OF, C_OF },
|
||||
{ "oflag", f_oflag, 0, 0 },
|
||||
{ "oseek", f_seek, C_SEEK, C_SEEK },
|
||||
{ "seek", f_seek, C_SEEK, C_SEEK },
|
||||
{ "skip", f_skip, C_SKIP, C_SKIP },
|
||||
@ -256,6 +262,38 @@ f_if(char *arg)
|
||||
in.name = arg;
|
||||
}
|
||||
|
||||
static const struct iflag {
|
||||
const char *name;
|
||||
uint64_t set, noset;
|
||||
} ilist[] = {
|
||||
{ "fullblock", C_IFULLBLOCK, C_SYNC },
|
||||
};
|
||||
|
||||
static void
|
||||
f_iflag(char *arg)
|
||||
{
|
||||
struct iflag *ip, tmp;
|
||||
|
||||
while (arg != NULL) {
|
||||
tmp.name = strsep(&arg, ",");
|
||||
ip = bsearch(&tmp, ilist, nitems(ilist), sizeof(struct iflag),
|
||||
c_iflag);
|
||||
if (ip == NULL)
|
||||
errx(1, "unknown iflag %s", tmp.name);
|
||||
if (ddflags & ip->noset)
|
||||
errx(1, "%s: illegal conversion combination", tmp.name);
|
||||
ddflags |= ip->set;
|
||||
}
|
||||
}
|
||||
|
||||
static int
|
||||
c_iflag(const void *a, const void *b)
|
||||
{
|
||||
|
||||
return (strcmp(((const struct iflag *)a)->name,
|
||||
((const struct iflag *)b)->name));
|
||||
}
|
||||
|
||||
static void
|
||||
f_obs(char *arg)
|
||||
{
|
||||
@ -314,12 +352,13 @@ f_status(char *arg)
|
||||
|
||||
static const struct conv {
|
||||
const char *name;
|
||||
u_int set, noset;
|
||||
uint64_t set, noset;
|
||||
const u_char *ctab;
|
||||
} clist[] = {
|
||||
{ "ascii", C_ASCII, C_EBCDIC, e2a_POSIX },
|
||||
{ "block", C_BLOCK, C_UNBLOCK, NULL },
|
||||
{ "ebcdic", C_EBCDIC, C_ASCII, a2e_POSIX },
|
||||
{ "fdatasync", C_FDATASYNC, 0, NULL },
|
||||
{ "fsync", C_FSYNC, 0, NULL },
|
||||
{ "ibm", C_EBCDIC, C_ASCII, a2ibm_POSIX },
|
||||
{ "lcase", C_LCASE, C_UCASE, NULL },
|
||||
@ -335,7 +374,7 @@ static const struct conv {
|
||||
{ "parset", C_PARSET, C_PARODD|C_PAREVEN|C_PARNONE, NULL},
|
||||
{ "sparse", C_SPARSE, 0, NULL },
|
||||
{ "swab", C_SWAB, 0, NULL },
|
||||
{ "sync", C_SYNC, 0, NULL },
|
||||
{ "sync", C_SYNC, C_IFULLBLOCK, NULL },
|
||||
{ "ucase", C_UCASE, C_LCASE, NULL },
|
||||
{ "unblock", C_UNBLOCK, C_BLOCK, NULL },
|
||||
};
|
||||
@ -347,8 +386,8 @@ f_conv(char *arg)
|
||||
|
||||
while (arg != NULL) {
|
||||
tmp.name = strsep(&arg, ",");
|
||||
cp = bsearch(&tmp, clist, sizeof(clist) / sizeof(struct conv),
|
||||
sizeof(struct conv), c_conv);
|
||||
cp = bsearch(&tmp, clist, nitems(clist), sizeof(struct conv),
|
||||
c_conv);
|
||||
if (cp == NULL)
|
||||
errx(1, "unknown conversion %s", tmp.name);
|
||||
if (ddflags & cp->noset)
|
||||
@ -367,6 +406,37 @@ c_conv(const void *a, const void *b)
|
||||
((const struct conv *)b)->name));
|
||||
}
|
||||
|
||||
static const struct oflag {
|
||||
const char *name;
|
||||
uint64_t set;
|
||||
} olist[] = {
|
||||
{ "fsync", C_OFSYNC },
|
||||
{ "sync", C_OFSYNC },
|
||||
};
|
||||
|
||||
static void
|
||||
f_oflag(char *arg)
|
||||
{
|
||||
struct oflag *op, tmp;
|
||||
|
||||
while (arg != NULL) {
|
||||
tmp.name = strsep(&arg, ",");
|
||||
op = bsearch(&tmp, olist, nitems(olist), sizeof(struct oflag),
|
||||
c_oflag);
|
||||
if (op == NULL)
|
||||
errx(1, "unknown open flag %s", tmp.name);
|
||||
ddflags |= op->set;
|
||||
}
|
||||
}
|
||||
|
||||
static int
|
||||
c_oflag(const void *a, const void *b)
|
||||
{
|
||||
|
||||
return (strcmp(((const struct oflag *)a)->name,
|
||||
((const struct oflag *)b)->name));
|
||||
}
|
||||
|
||||
static intmax_t
|
||||
postfix_to_mult(const char expr)
|
||||
{
|
||||
|
33
bin/dd/dd.1
33
bin/dd/dd.1
@ -102,6 +102,22 @@ bytes instead of the default 512.
|
||||
Read input from
|
||||
.Ar file
|
||||
instead of the standard input.
|
||||
.It Cm iflag Ns = Ns Ar value Ns Op , Ns Ar value ...
|
||||
Where
|
||||
.Cm value
|
||||
is one of the symbols from the following list.
|
||||
.Bl -tag -width "fullblock"
|
||||
.It Cm fullblock
|
||||
Reading from the input file may not obtain a full block.
|
||||
When a read returns short, continue reading to fill the block.
|
||||
Without this flag,
|
||||
.Cm count
|
||||
limits the number of times
|
||||
.Xr read 2
|
||||
is called on the input rather than the number of blocks copied in full.
|
||||
May not be combined with
|
||||
.Cm conv=sync .
|
||||
.El
|
||||
.It Cm iseek Ns = Ns Ar n
|
||||
Seek on the input file
|
||||
.Ar n
|
||||
@ -123,6 +139,19 @@ If an initial portion of the output file is seeked past (see the
|
||||
.Cm oseek
|
||||
operand),
|
||||
the output file is truncated at that point.
|
||||
.It Cm oflag Ns = Ns Ar value Ns Op , Ns Ar value ...
|
||||
Where
|
||||
.Cm value
|
||||
is one of the symbols from the following list.
|
||||
.Bl -tag -width "fsync"
|
||||
.It Cm fsync
|
||||
Set the O_FSYNC flag on the output file to make writes synchronous.
|
||||
.It Cm sync
|
||||
Set the O_SYNC flag on the output file to make writes synchronous.
|
||||
This is synonymous with the
|
||||
.Cm fsync
|
||||
value.
|
||||
.El
|
||||
.It Cm oseek Ns = Ns Ar n
|
||||
Seek on the output file
|
||||
.Ar n
|
||||
@ -252,6 +281,10 @@ are maps used in historic
|
||||
and
|
||||
.No pre- Ns Bx 4.3 reno
|
||||
systems.
|
||||
.It Cm fdatasync
|
||||
Perform an
|
||||
.Xr fdatasync 2
|
||||
on the output file before closing it.
|
||||
.It Cm fsync
|
||||
Perform an
|
||||
.Xr fsync 2
|
||||
|
79
bin/dd/dd.c
79
bin/dd/dd.c
@ -83,7 +83,7 @@ STAT st; /* statistics */
|
||||
void (*cfunc)(void); /* conversion function */
|
||||
uintmax_t cpy_cnt; /* # of blocks to copy */
|
||||
static off_t pending = 0; /* pending seek if sparse */
|
||||
u_int ddflags = 0; /* conversion options */
|
||||
uint64_t ddflags = 0; /* conversion options */
|
||||
size_t cbsz; /* conversion block size */
|
||||
uintmax_t files_cnt = 1; /* # of files to copy */
|
||||
const u_char *ctab; /* conversion table */
|
||||
@ -124,7 +124,8 @@ main(int argc __unused, char *argv[])
|
||||
* descriptor explicitly so that the summary handler (called
|
||||
* from an atexit() hook) includes this work.
|
||||
*/
|
||||
close(out.fd);
|
||||
if (close(out.fd) == -1 && errno != EINTR)
|
||||
err(1, "close");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
@ -142,6 +143,7 @@ static void
|
||||
setup(void)
|
||||
{
|
||||
u_int cnt;
|
||||
int oflags;
|
||||
cap_rights_t rights;
|
||||
unsigned long cmds[] = { FIODTYPE, MTIOCTOP };
|
||||
|
||||
@ -164,23 +166,34 @@ setup(void)
|
||||
errx(1, "files is not supported for non-tape devices");
|
||||
|
||||
cap_rights_set(&rights, CAP_FTRUNCATE, CAP_IOCTL, CAP_WRITE);
|
||||
if (ddflags & C_FSYNC)
|
||||
if (ddflags & (C_FDATASYNC | C_FSYNC))
|
||||
cap_rights_set(&rights, CAP_FSYNC);
|
||||
if (out.name == NULL) {
|
||||
/* No way to check for read access here. */
|
||||
out.fd = STDOUT_FILENO;
|
||||
out.name = "stdout";
|
||||
if (ddflags & C_OFSYNC) {
|
||||
oflags = fcntl(out.fd, F_GETFL);
|
||||
if (oflags == -1)
|
||||
err(1, "unable to get fd flags for stdout");
|
||||
oflags |= O_FSYNC;
|
||||
if (fcntl(out.fd, F_SETFL, oflags) == -1)
|
||||
err(1, "unable to set fd flags for stdout");
|
||||
}
|
||||
} else {
|
||||
#define OFLAGS \
|
||||
(O_CREAT | (ddflags & (C_SEEK | C_NOTRUNC) ? 0 : O_TRUNC))
|
||||
out.fd = open(out.name, O_RDWR | OFLAGS, DEFFILEMODE);
|
||||
oflags = O_CREAT;
|
||||
if (!(ddflags & (C_SEEK | C_NOTRUNC)))
|
||||
oflags |= O_TRUNC;
|
||||
if (ddflags & C_OFSYNC)
|
||||
oflags |= O_FSYNC;
|
||||
out.fd = open(out.name, O_RDWR | oflags, DEFFILEMODE);
|
||||
/*
|
||||
* May not have read access, so try again with write only.
|
||||
* Without read we may have a problem if output also does
|
||||
* not support seeks.
|
||||
*/
|
||||
if (out.fd == -1) {
|
||||
out.fd = open(out.name, O_WRONLY | OFLAGS, DEFFILEMODE);
|
||||
out.fd = open(out.name, O_WRONLY | oflags, DEFFILEMODE);
|
||||
out.flags |= NOREAD;
|
||||
cap_rights_clear(&rights, CAP_READ);
|
||||
}
|
||||
@ -395,13 +408,15 @@ dd_in(void)
|
||||
memset(in.dbp, 0, in.dbsz);
|
||||
}
|
||||
|
||||
n = read(in.fd, in.dbp, in.dbsz);
|
||||
if (n == 0) {
|
||||
in.dbrcnt = 0;
|
||||
return;
|
||||
}
|
||||
fill:
|
||||
n = read(in.fd, in.dbp + in.dbrcnt, in.dbsz - in.dbrcnt);
|
||||
|
||||
/* Read error. */
|
||||
/* EOF */
|
||||
if (n == 0 && in.dbrcnt == 0)
|
||||
return;
|
||||
|
||||
/* Read error */
|
||||
if (n == -1) {
|
||||
/*
|
||||
* If noerror not specified, die. POSIX requires that
|
||||
@ -425,26 +440,26 @@ dd_in(void)
|
||||
/* If sync not specified, omit block and continue. */
|
||||
if (!(ddflags & C_SYNC))
|
||||
continue;
|
||||
|
||||
/* Read errors count as full blocks. */
|
||||
in.dbcnt += in.dbrcnt = in.dbsz;
|
||||
++st.in_full;
|
||||
|
||||
/* Handle full input blocks. */
|
||||
} else if ((size_t)n == (size_t)in.dbsz) {
|
||||
in.dbcnt += in.dbrcnt = n;
|
||||
++st.in_full;
|
||||
|
||||
/* Handle partial input blocks. */
|
||||
} else {
|
||||
/* If sync, use the entire block. */
|
||||
if (ddflags & C_SYNC)
|
||||
in.dbcnt += in.dbrcnt = in.dbsz;
|
||||
else
|
||||
in.dbcnt += in.dbrcnt = n;
|
||||
++st.in_part;
|
||||
}
|
||||
|
||||
/* If conv=sync, use the entire block. */
|
||||
if (ddflags & C_SYNC)
|
||||
n = in.dbsz;
|
||||
|
||||
/* Count the bytes read for this block. */
|
||||
in.dbrcnt += n;
|
||||
|
||||
/* Count the number of full and partial blocks. */
|
||||
if (in.dbrcnt == in.dbsz)
|
||||
++st.in_full;
|
||||
else if (ddflags & C_IFULLBLOCK && n != 0)
|
||||
goto fill; /* these don't count */
|
||||
else
|
||||
++st.in_part;
|
||||
|
||||
/* Count the total bytes read for this file. */
|
||||
in.dbcnt += in.dbrcnt;
|
||||
|
||||
/*
|
||||
* POSIX states that if bs is set and no other conversions
|
||||
* than noerror, notrunc or sync are specified, the block
|
||||
@ -465,6 +480,7 @@ dd_in(void)
|
||||
swapbytes(in.dbp, (size_t)n);
|
||||
}
|
||||
|
||||
/* Advance to the next block. */
|
||||
in.dbp += in.dbrcnt;
|
||||
(*cfunc)();
|
||||
if (need_summary)
|
||||
@ -511,6 +527,9 @@ dd_close(void)
|
||||
if (ddflags & C_FSYNC) {
|
||||
if (fsync(out.fd) == -1)
|
||||
err(1, "fsyncing %s", out.name);
|
||||
} else if (ddflags & C_FDATASYNC) {
|
||||
if (fdatasync(out.fd) == -1)
|
||||
err(1, "fdatasyncing %s", out.name);
|
||||
}
|
||||
}
|
||||
|
||||
|
67
bin/dd/dd.h
67
bin/dd/dd.h
@ -70,38 +70,41 @@ typedef struct {
|
||||
} STAT;
|
||||
|
||||
/* Flags (in ddflags). */
|
||||
#define C_ASCII 0x00000001
|
||||
#define C_BLOCK 0x00000002
|
||||
#define C_BS 0x00000004
|
||||
#define C_CBS 0x00000008
|
||||
#define C_COUNT 0x00000010
|
||||
#define C_EBCDIC 0x00000020
|
||||
#define C_FILES 0x00000040
|
||||
#define C_IBS 0x00000080
|
||||
#define C_IF 0x00000100
|
||||
#define C_LCASE 0x00000200
|
||||
#define C_NOERROR 0x00000400
|
||||
#define C_NOTRUNC 0x00000800
|
||||
#define C_OBS 0x00001000
|
||||
#define C_OF 0x00002000
|
||||
#define C_OSYNC 0x00004000
|
||||
#define C_PAREVEN 0x00008000
|
||||
#define C_PARNONE 0x00010000
|
||||
#define C_PARODD 0x00020000
|
||||
#define C_PARSET 0x00040000
|
||||
#define C_SEEK 0x00080000
|
||||
#define C_SKIP 0x00100000
|
||||
#define C_SPARSE 0x00200000
|
||||
#define C_SWAB 0x00400000
|
||||
#define C_SYNC 0x00800000
|
||||
#define C_UCASE 0x01000000
|
||||
#define C_UNBLOCK 0x02000000
|
||||
#define C_FILL 0x04000000
|
||||
#define C_STATUS 0x08000000
|
||||
#define C_NOXFER 0x10000000
|
||||
#define C_NOINFO 0x20000000
|
||||
#define C_PROGRESS 0x40000000
|
||||
#define C_FSYNC 0x80000000
|
||||
#define C_ASCII 0x0000000000000001ULL
|
||||
#define C_BLOCK 0x0000000000000002ULL
|
||||
#define C_BS 0x0000000000000004ULL
|
||||
#define C_CBS 0x0000000000000008ULL
|
||||
#define C_COUNT 0x0000000000000010ULL
|
||||
#define C_EBCDIC 0x0000000000000020ULL
|
||||
#define C_FILES 0x0000000000000040ULL
|
||||
#define C_IBS 0x0000000000000080ULL
|
||||
#define C_IF 0x0000000000000100ULL
|
||||
#define C_LCASE 0x0000000000000200ULL
|
||||
#define C_NOERROR 0x0000000000000400ULL
|
||||
#define C_NOTRUNC 0x0000000000000800ULL
|
||||
#define C_OBS 0x0000000000001000ULL
|
||||
#define C_OF 0x0000000000002000ULL
|
||||
#define C_OSYNC 0x0000000000004000ULL
|
||||
#define C_PAREVEN 0x0000000000008000ULL
|
||||
#define C_PARNONE 0x0000000000010000ULL
|
||||
#define C_PARODD 0x0000000000020000ULL
|
||||
#define C_PARSET 0x0000000000040000ULL
|
||||
#define C_SEEK 0x0000000000080000ULL
|
||||
#define C_SKIP 0x0000000000100000ULL
|
||||
#define C_SPARSE 0x0000000000200000ULL
|
||||
#define C_SWAB 0x0000000000400000ULL
|
||||
#define C_SYNC 0x0000000000800000ULL
|
||||
#define C_UCASE 0x0000000001000000ULL
|
||||
#define C_UNBLOCK 0x0000000002000000ULL
|
||||
#define C_FILL 0x0000000004000000ULL
|
||||
#define C_STATUS 0x0000000008000000ULL
|
||||
#define C_NOXFER 0x0000000010000000ULL
|
||||
#define C_NOINFO 0x0000000020000000ULL
|
||||
#define C_PROGRESS 0x0000000040000000ULL
|
||||
#define C_FSYNC 0x0000000080000000ULL
|
||||
#define C_FDATASYNC 0x0000000100000000ULL
|
||||
#define C_OFSYNC 0x0000000200000000ULL
|
||||
#define C_IFULLBLOCK 0x0000000400000000ULL
|
||||
|
||||
#define C_PARITY (C_PAREVEN | C_PARODD | C_PARNONE | C_PARSET)
|
||||
|
||||
|
@ -58,7 +58,7 @@ extern STAT st;
|
||||
extern void (*cfunc)(void);
|
||||
extern uintmax_t cpy_cnt;
|
||||
extern size_t cbsz;
|
||||
extern u_int ddflags;
|
||||
extern uint64_t ddflags;
|
||||
extern size_t speed;
|
||||
extern uintmax_t files_cnt;
|
||||
extern const u_char *ctab;
|
||||
|
@ -2134,7 +2134,8 @@ static object_viewer_t *object_viewer[DMU_OT_NUMTYPES + 1] = {
|
||||
};
|
||||
|
||||
static void
|
||||
dump_object(objset_t *os, uint64_t object, int verbosity, int *print_header)
|
||||
dump_object(objset_t *os, uint64_t object, int verbosity, int *print_header,
|
||||
uint64_t *dnode_slots_used)
|
||||
{
|
||||
dmu_buf_t *db = NULL;
|
||||
dmu_object_info_t doi;
|
||||
@ -2173,6 +2174,9 @@ dump_object(objset_t *os, uint64_t object, int verbosity, int *print_header)
|
||||
}
|
||||
dmu_object_info_from_dnode(dn, &doi);
|
||||
|
||||
if (dnode_slots_used != NULL)
|
||||
*dnode_slots_used = doi.doi_dnodesize / DNODE_MIN_SIZE;
|
||||
|
||||
zdb_nicenum(doi.doi_metadata_block_size, iblk, sizeof (iblk));
|
||||
zdb_nicenum(doi.doi_data_block_size, dblk, sizeof (dblk));
|
||||
zdb_nicenum(doi.doi_max_offset, lsize, sizeof (lsize));
|
||||
@ -2195,8 +2199,9 @@ dump_object(objset_t *os, uint64_t object, int verbosity, int *print_header)
|
||||
ZDB_COMPRESS_NAME(doi.doi_compress));
|
||||
}
|
||||
|
||||
(void) printf("%10lld %3u %5s %5s %5s %6s %5s %6s %s%s\n",
|
||||
(u_longlong_t)object, doi.doi_indirection, iblk, dblk,
|
||||
(void) printf("%10" PRIu64
|
||||
" %3u %5s %5s %5s %5s %5s %6s %s%s\n",
|
||||
object, doi.doi_indirection, iblk, dblk,
|
||||
asize, dnsize, lsize, fill, ZDB_OT_NAME(doi.doi_type), aux);
|
||||
|
||||
if (doi.doi_bonus_type != DMU_OT_NONE && verbosity > 3) {
|
||||
@ -2305,6 +2310,9 @@ dump_dir(objset_t *os)
|
||||
int print_header = 1;
|
||||
unsigned i;
|
||||
int error;
|
||||
uint64_t total_slots_used = 0;
|
||||
uint64_t max_slot_used = 0;
|
||||
uint64_t dnode_slots;
|
||||
|
||||
/* make sure nicenum has enough space */
|
||||
CTASSERT(sizeof (numbuf) >= NN_NUMBUF_SZ);
|
||||
@ -2349,7 +2357,7 @@ dump_dir(objset_t *os)
|
||||
if (zopt_objects != 0) {
|
||||
for (i = 0; i < zopt_objects; i++)
|
||||
dump_object(os, zopt_object[i], verbosity,
|
||||
&print_header);
|
||||
&print_header, NULL);
|
||||
(void) printf("\n");
|
||||
return;
|
||||
}
|
||||
@ -2374,22 +2382,37 @@ dump_dir(objset_t *os)
|
||||
if (BP_IS_HOLE(os->os_rootbp))
|
||||
return;
|
||||
|
||||
dump_object(os, 0, verbosity, &print_header);
|
||||
dump_object(os, 0, verbosity, &print_header, NULL);
|
||||
object_count = 0;
|
||||
if (DMU_USERUSED_DNODE(os) != NULL &&
|
||||
DMU_USERUSED_DNODE(os)->dn_type != 0) {
|
||||
dump_object(os, DMU_USERUSED_OBJECT, verbosity, &print_header);
|
||||
dump_object(os, DMU_GROUPUSED_OBJECT, verbosity, &print_header);
|
||||
dump_object(os, DMU_USERUSED_OBJECT, verbosity, &print_header,
|
||||
NULL);
|
||||
dump_object(os, DMU_GROUPUSED_OBJECT, verbosity, &print_header,
|
||||
NULL);
|
||||
}
|
||||
|
||||
object = 0;
|
||||
while ((error = dmu_object_next(os, &object, B_FALSE, 0)) == 0) {
|
||||
dump_object(os, object, verbosity, &print_header);
|
||||
dump_object(os, object, verbosity, &print_header, &dnode_slots);
|
||||
object_count++;
|
||||
total_slots_used += dnode_slots;
|
||||
max_slot_used = object + dnode_slots - 1;
|
||||
}
|
||||
|
||||
(void) printf("\n");
|
||||
|
||||
(void) printf(" Dnode slots:\n");
|
||||
(void) printf("\tTotal used: %10llu\n",
|
||||
(u_longlong_t)total_slots_used);
|
||||
(void) printf("\tMax used: %10llu\n",
|
||||
(u_longlong_t)max_slot_used);
|
||||
(void) printf("\tPercent empty: %10lf\n",
|
||||
(double)(max_slot_used - total_slots_used)*100 /
|
||||
(double)max_slot_used);
|
||||
|
||||
(void) printf("\n");
|
||||
|
||||
if (error != ESRCH) {
|
||||
(void) fprintf(stderr, "dmu_object_next() = %d\n", error);
|
||||
abort();
|
||||
@ -2581,7 +2604,7 @@ dump_path_impl(objset_t *os, uint64_t obj, char *name)
|
||||
return (dump_path_impl(os, child_obj, s + 1));
|
||||
/*FALLTHROUGH*/
|
||||
case DMU_OT_PLAIN_FILE_CONTENTS:
|
||||
dump_object(os, child_obj, dump_opt['v'], &header);
|
||||
dump_object(os, child_obj, dump_opt['v'], &header, NULL);
|
||||
return (0);
|
||||
default:
|
||||
(void) fprintf(stderr, "object %llu has non-file/directory "
|
||||
|
@ -84,15 +84,15 @@ zil_prt_rec_create(zilog_t *zilog, int txtype, void *arg)
|
||||
}
|
||||
|
||||
(void) printf("%s%s", tab_prefix, ctime(&crtime));
|
||||
(void) printf("%sdoid %llu, foid %llu, slots %llu, mode %llo\n", tab_prefix,
|
||||
(u_longlong_t)lr->lr_doid,
|
||||
(u_longlong_t)LR_FOID_GET_OBJ(lr->lr_foid),
|
||||
(u_longlong_t)LR_FOID_GET_SLOTS(lr->lr_foid),
|
||||
(longlong_t)lr->lr_mode);
|
||||
(void) printf("%suid %llu, gid %llu, gen %llu, rdev 0x%llx\n",
|
||||
tab_prefix,
|
||||
(u_longlong_t)lr->lr_uid, (u_longlong_t)lr->lr_gid,
|
||||
(u_longlong_t)lr->lr_gen, (u_longlong_t)lr->lr_rdev);
|
||||
(void) printf("%sdoid %" PRIu64 ", foid %" PRIu64 ", slots %" PRIu64
|
||||
", mode %" PRIo64 "\n",
|
||||
tab_prefix, lr->lr_doid,
|
||||
(uint64_t)LR_FOID_GET_OBJ(lr->lr_foid),
|
||||
(uint64_t)LR_FOID_GET_SLOTS(lr->lr_foid),
|
||||
lr->lr_mode);
|
||||
(void) printf("%suid %" PRIu64 ", gid %" PRIu64 ", gen %" PRIu64
|
||||
", rdev %#" PRIx64 "\n",
|
||||
tab_prefix, lr->lr_uid, lr->lr_gid, lr->lr_gen, lr->lr_rdev);
|
||||
}
|
||||
|
||||
/* ARGSUSED */
|
||||
|
@ -105,6 +105,9 @@
|
||||
.Ar snapshot snapshot
|
||||
.Nm
|
||||
.Cm rename
|
||||
.Ar bookmark bookmark
|
||||
.Nm
|
||||
.Cm rename
|
||||
.Fl u
|
||||
.Op Fl p
|
||||
.Ar filesystem filesystem
|
||||
@ -2094,6 +2097,16 @@ Recursively rename the snapshots of all descendent datasets. Snapshots are the
|
||||
only dataset that can be renamed recursively.
|
||||
.It Xo
|
||||
.Nm
|
||||
.Cm rename
|
||||
.Ar bookmark bookmark
|
||||
.Xc
|
||||
.Pp
|
||||
Renames the given bookmark.
|
||||
Bookmarks can only be renamed within the parent file system or volume.
|
||||
When renaming a bookmark, the parent file system or volume of the bookmark
|
||||
does not need to be specified as part of the second argument.
|
||||
.It Xo
|
||||
.Nm
|
||||
.Cm list
|
||||
.Op Fl r Ns | Ns Fl d Ar depth
|
||||
.Op Fl Hp
|
||||
|
@ -284,6 +284,7 @@ get_usage(zfs_help_t idx)
|
||||
"<filesystem|volume|snapshot>\n"
|
||||
"\trename [-f] -p <filesystem|volume> <filesystem|volume>\n"
|
||||
"\trename -r <snapshot> <snapshot>\n"
|
||||
"\trename <bookmark> <bookmark>\n"
|
||||
"\trename -u [-p] <filesystem> <filesystem>"));
|
||||
case HELP_ROLLBACK:
|
||||
return (gettext("\trollback [-rRf] <snapshot>\n"));
|
||||
@ -3254,6 +3255,7 @@ zfs_do_list(int argc, char **argv)
|
||||
* zfs rename [-f] <fs | snap | vol> <fs | snap | vol>
|
||||
* zfs rename [-f] -p <fs | vol> <fs | vol>
|
||||
* zfs rename -r <snap> <snap>
|
||||
* zfs rename <bmark> <bmark>
|
||||
* zfs rename -u [-p] <fs> <fs>
|
||||
*
|
||||
* Renames the given dataset to another of the same type.
|
||||
@ -3270,6 +3272,7 @@ zfs_do_rename(int argc, char **argv)
|
||||
int ret = 0;
|
||||
int types;
|
||||
boolean_t parents = B_FALSE;
|
||||
boolean_t bookmarks = B_FALSE;
|
||||
char *snapshot = NULL;
|
||||
|
||||
/* check options */
|
||||
@ -3320,7 +3323,7 @@ zfs_do_rename(int argc, char **argv)
|
||||
usage(B_FALSE);
|
||||
}
|
||||
|
||||
if (flags.recurse && strchr(argv[0], '@') == 0) {
|
||||
if (flags.recurse && strchr(argv[0], '@') == NULL) {
|
||||
(void) fprintf(stderr, gettext("source dataset for recursive "
|
||||
"rename must be a snapshot\n"));
|
||||
usage(B_FALSE);
|
||||
@ -3332,10 +3335,22 @@ zfs_do_rename(int argc, char **argv)
|
||||
usage(B_FALSE);
|
||||
}
|
||||
|
||||
if (strchr(argv[0], '#') != NULL)
|
||||
bookmarks = B_TRUE;
|
||||
|
||||
if (bookmarks && (flags.nounmount || flags.recurse ||
|
||||
flags.forceunmount || parents)) {
|
||||
(void) fprintf(stderr, gettext("options are not supported "
|
||||
"for renaming bookmarks\n"));
|
||||
usage(B_FALSE);
|
||||
}
|
||||
|
||||
if (flags.nounmount)
|
||||
types = ZFS_TYPE_FILESYSTEM;
|
||||
else if (parents)
|
||||
types = ZFS_TYPE_FILESYSTEM | ZFS_TYPE_VOLUME;
|
||||
else if (bookmarks)
|
||||
types = ZFS_TYPE_BOOKMARK;
|
||||
else
|
||||
types = ZFS_TYPE_DATASET;
|
||||
|
||||
|
@ -416,13 +416,15 @@ main(int argc, char *argv[])
|
||||
drro->drr_toguid = BSWAP_64(drro->drr_toguid);
|
||||
}
|
||||
if (verbose) {
|
||||
(void) printf("OBJECT object = %llu type = %u "
|
||||
"bonustype = %u blksz = %u bonuslen = %u\n",
|
||||
(u_longlong_t)drro->drr_object,
|
||||
(void) printf("OBJECT object = %" PRIu64
|
||||
" type = %u bonustype = %u blksz = %u"
|
||||
" bonuslen = %u dn_slots = %u\n",
|
||||
drro->drr_object,
|
||||
drro->drr_type,
|
||||
drro->drr_bonustype,
|
||||
drro->drr_blksz,
|
||||
drro->drr_bonuslen);
|
||||
drro->drr_bonuslen,
|
||||
drro->drr_dn_slots);
|
||||
}
|
||||
if (drro->drr_bonuslen > 0) {
|
||||
(void) ssread(buf,
|
||||
|
@ -196,6 +196,7 @@ extern uint64_t zfs_deadman_synctime_ms;
|
||||
extern int metaslab_preload_limit;
|
||||
extern boolean_t zfs_compressed_arc_enabled;
|
||||
extern boolean_t zfs_abd_scatter_enabled;
|
||||
extern int dmu_object_alloc_chunk_shift;
|
||||
extern boolean_t zfs_force_some_double_word_sm_entries;
|
||||
|
||||
static ztest_shared_opts_t *ztest_shared_opts;
|
||||
@ -322,6 +323,7 @@ static ztest_shared_callstate_t *ztest_shared_callstate;
|
||||
ztest_func_t ztest_dmu_read_write;
|
||||
ztest_func_t ztest_dmu_write_parallel;
|
||||
ztest_func_t ztest_dmu_object_alloc_free;
|
||||
ztest_func_t ztest_dmu_object_next_chunk;
|
||||
ztest_func_t ztest_dmu_commit_callbacks;
|
||||
ztest_func_t ztest_zap;
|
||||
ztest_func_t ztest_zap_parallel;
|
||||
@ -363,6 +365,7 @@ ztest_info_t ztest_info[] = {
|
||||
{ ztest_dmu_read_write, 1, &zopt_always },
|
||||
{ ztest_dmu_write_parallel, 10, &zopt_always },
|
||||
{ ztest_dmu_object_alloc_free, 1, &zopt_always },
|
||||
{ ztest_dmu_object_next_chunk, 1, &zopt_sometimes },
|
||||
{ ztest_dmu_commit_callbacks, 1, &zopt_always },
|
||||
{ ztest_zap, 30, &zopt_always },
|
||||
{ ztest_zap_parallel, 100, &zopt_always },
|
||||
@ -1895,6 +1898,7 @@ ztest_replay_setattr(void *arg1, void *arg2, boolean_t byteswap)
|
||||
ztest_bt_generate(bbt, os, lr->lr_foid, dnodesize, -1ULL, lr->lr_mode,
|
||||
txg, crtxg);
|
||||
ztest_fill_unused_bonus(db, bbt, lr->lr_foid, os, bbt->bt_gen);
|
||||
|
||||
dmu_buf_rele(db, FTAG);
|
||||
|
||||
(void) ztest_log_setattr(zd, tx, lr);
|
||||
@ -3815,8 +3819,10 @@ ztest_dmu_object_alloc_free(ztest_ds_t *zd, uint64_t id)
|
||||
ztest_od_t od[4];
|
||||
int batchsize = sizeof (od) / sizeof (od[0]);
|
||||
|
||||
for (int b = 0; b < batchsize; b++)
|
||||
ztest_od_init(&od[b], id, FTAG, b, DMU_OT_UINT64_OTHER, 0, 0, 0);
|
||||
for (int b = 0; b < batchsize; b++) {
|
||||
ztest_od_init(&od[b], id, FTAG, b, DMU_OT_UINT64_OTHER,
|
||||
0, 0, 0);
|
||||
}
|
||||
|
||||
/*
|
||||
* Destroy the previous batch of objects, create a new batch,
|
||||
@ -3830,6 +3836,26 @@ ztest_dmu_object_alloc_free(ztest_ds_t *zd, uint64_t id)
|
||||
ztest_random(ZTEST_RANGE_LOCKS) << SPA_MAXBLOCKSHIFT);
|
||||
}
|
||||
|
||||
/*
|
||||
* Rewind the global allocator to verify object allocation backfilling.
|
||||
*/
|
||||
void
|
||||
ztest_dmu_object_next_chunk(ztest_ds_t *zd, uint64_t id)
|
||||
{
|
||||
objset_t *os = zd->zd_os;
|
||||
int dnodes_per_chunk = 1 << dmu_object_alloc_chunk_shift;
|
||||
uint64_t object;
|
||||
|
||||
/*
|
||||
* Rewind the global allocator randomly back to a lower object number
|
||||
* to force backfilling and reclamation of recently freed dnodes.
|
||||
*/
|
||||
mutex_enter(&os->os_obj_lock);
|
||||
object = ztest_random(os->os_obj_next_chunk);
|
||||
os->os_obj_next_chunk = P2ALIGN(object, dnodes_per_chunk);
|
||||
mutex_exit(&os->os_obj_lock);
|
||||
}
|
||||
|
||||
/*
|
||||
* Verify that dmu_{read,write} work as expected.
|
||||
*/
|
||||
@ -3876,8 +3902,10 @@ ztest_dmu_read_write(ztest_ds_t *zd, uint64_t id)
|
||||
/*
|
||||
* Read the directory info. If it's the first time, set things up.
|
||||
*/
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, 0, 0, chunksize);
|
||||
ztest_od_init(&od[1], id, FTAG, 1, DMU_OT_UINT64_OTHER, 0, 0, chunksize);
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, 0, 0,
|
||||
chunksize);
|
||||
ztest_od_init(&od[1], id, FTAG, 1, DMU_OT_UINT64_OTHER, 0, 0,
|
||||
chunksize);
|
||||
|
||||
if (ztest_object_init(zd, od, sizeof (od), B_FALSE) != 0)
|
||||
return;
|
||||
@ -4146,8 +4174,10 @@ ztest_dmu_read_write_zcopy(ztest_ds_t *zd, uint64_t id)
|
||||
/*
|
||||
* Read the directory info. If it's the first time, set things up.
|
||||
*/
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, blocksize, 0, 0);
|
||||
ztest_od_init(&od[1], id, FTAG, 1, DMU_OT_UINT64_OTHER, 0, 0, chunksize);
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, blocksize,
|
||||
0, 0);
|
||||
ztest_od_init(&od[1], id, FTAG, 1, DMU_OT_UINT64_OTHER, 0, 0,
|
||||
chunksize);
|
||||
|
||||
if (ztest_object_init(zd, od, sizeof (od), B_FALSE) != 0)
|
||||
return;
|
||||
@ -4347,7 +4377,8 @@ ztest_dmu_write_parallel(ztest_ds_t *zd, uint64_t id)
|
||||
* to verify that parallel writes to an object -- even to the
|
||||
* same blocks within the object -- doesn't cause any trouble.
|
||||
*/
|
||||
ztest_od_init(&od[0], ID_PARALLEL, FTAG, 0, DMU_OT_UINT64_OTHER, 0, 0, 0);
|
||||
ztest_od_init(&od[0], ID_PARALLEL, FTAG, 0, DMU_OT_UINT64_OTHER,
|
||||
0, 0, 0);
|
||||
|
||||
if (ztest_object_init(zd, od, sizeof (od), B_FALSE) != 0)
|
||||
return;
|
||||
@ -4366,7 +4397,8 @@ ztest_dmu_prealloc(ztest_ds_t *zd, uint64_t id)
|
||||
uint64_t blocksize = ztest_random_blocksize();
|
||||
void *data;
|
||||
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, blocksize, 0, 0);
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, blocksize,
|
||||
0, 0);
|
||||
|
||||
if (ztest_object_init(zd, od, sizeof (od), !ztest_random(2)) != 0)
|
||||
return;
|
||||
@ -4590,7 +4622,8 @@ ztest_zap_parallel(ztest_ds_t *zd, uint64_t id)
|
||||
char name[20], string_value[20];
|
||||
void *data;
|
||||
|
||||
ztest_od_init(&od[0], ID_PARALLEL, FTAG, micro, DMU_OT_ZAP_OTHER, 0, 0, 0);
|
||||
ztest_od_init(&od[0], ID_PARALLEL, FTAG, micro, DMU_OT_ZAP_OTHER,
|
||||
0, 0, 0);
|
||||
|
||||
if (ztest_object_init(zd, od, sizeof (od), B_FALSE) != 0)
|
||||
return;
|
||||
@ -5411,7 +5444,8 @@ ztest_ddt_repair(ztest_ds_t *zd, uint64_t id)
|
||||
blocksize = ztest_random_blocksize();
|
||||
blocksize = MIN(blocksize, 2048); /* because we write so many */
|
||||
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, blocksize, 0, 0);
|
||||
ztest_od_init(&od[0], id, FTAG, 0, DMU_OT_UINT64_OTHER, blocksize,
|
||||
0, 0);
|
||||
|
||||
if (ztest_object_init(zd, od, sizeof (od), B_FALSE) != 0)
|
||||
return;
|
||||
|
@ -4291,17 +4291,18 @@ zfs_rename(zfs_handle_t *zhp, const char *source, const char *target,
|
||||
/*
|
||||
* Make sure the target name is valid
|
||||
*/
|
||||
if (zhp->zfs_type == ZFS_TYPE_SNAPSHOT) {
|
||||
if ((strchr(target, '@') == NULL) ||
|
||||
*target == '@') {
|
||||
if (zhp->zfs_type == ZFS_TYPE_SNAPSHOT ||
|
||||
zhp->zfs_type == ZFS_TYPE_BOOKMARK) {
|
||||
const char sep = zhp->zfs_type == ZFS_TYPE_SNAPSHOT ? '@' : '#';
|
||||
|
||||
if ((strchr(target, sep) == NULL) || *target == sep) {
|
||||
/*
|
||||
* Snapshot target name is abbreviated,
|
||||
* reconstruct full dataset name
|
||||
*/
|
||||
(void) strlcpy(parent, zhp->zfs_name,
|
||||
sizeof (parent));
|
||||
delim = strchr(parent, '@');
|
||||
if (strchr(target, '@') == NULL)
|
||||
(void) strlcpy(parent, zhp->zfs_name, sizeof (parent));
|
||||
delim = strchr(parent, sep);
|
||||
if (strchr(target, sep) == NULL)
|
||||
*(++delim) = '\0';
|
||||
else
|
||||
*delim = '\0';
|
||||
@ -4311,12 +4312,13 @@ zfs_rename(zfs_handle_t *zhp, const char *source, const char *target,
|
||||
/*
|
||||
* Make sure we're renaming within the same dataset.
|
||||
*/
|
||||
delim = strchr(target, '@');
|
||||
delim = strchr(target, sep);
|
||||
if (strncmp(zhp->zfs_name, target, delim - target)
|
||||
!= 0 || zhp->zfs_name[delim - target] != '@') {
|
||||
!= 0 || zhp->zfs_name[delim - target] != sep) {
|
||||
zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
|
||||
"snapshots must be part of same "
|
||||
"dataset"));
|
||||
"%s must be part of same dataset"),
|
||||
zhp->zfs_type == ZFS_TYPE_SNAPSHOT ?
|
||||
"snapshots" : "bookmarks");
|
||||
return (zfs_error(hdl, EZFS_CROSSTARGET,
|
||||
errbuf));
|
||||
}
|
||||
@ -4379,7 +4381,6 @@ zfs_rename(zfs_handle_t *zhp, const char *source, const char *target,
|
||||
flags.nounmount = B_TRUE;
|
||||
}
|
||||
if (flags.recurse) {
|
||||
|
||||
parentname = zfs_strdup(zhp->zfs_hdl, zhp->zfs_name);
|
||||
if (parentname == NULL) {
|
||||
ret = -1;
|
||||
@ -4392,7 +4393,8 @@ zfs_rename(zfs_handle_t *zhp, const char *source, const char *target,
|
||||
ret = -1;
|
||||
goto error;
|
||||
}
|
||||
} else if (zhp->zfs_type != ZFS_TYPE_SNAPSHOT) {
|
||||
} else if (zhp->zfs_type != ZFS_TYPE_SNAPSHOT &&
|
||||
zhp->zfs_type != ZFS_TYPE_BOOKMARK) {
|
||||
if ((cl = changelist_gather(zhp, ZFS_PROP_NAME,
|
||||
flags.nounmount ? CL_GATHER_DONT_UNMOUNT : 0,
|
||||
flags.forceunmount ? MS_FORCE : 0)) == NULL) {
|
||||
@ -4437,6 +4439,8 @@ zfs_rename(zfs_handle_t *zhp, const char *source, const char *target,
|
||||
"a child dataset already has a snapshot "
|
||||
"with the new name"));
|
||||
(void) zfs_error(hdl, EZFS_EXISTS, errbuf);
|
||||
} else if (errno == EINVAL) {
|
||||
(void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf);
|
||||
} else {
|
||||
(void) zfs_standard_error(zhp->zfs_hdl, errno, errbuf);
|
||||
}
|
||||
|
@ -78,10 +78,9 @@ namespace __sanitizer {
|
||||
#elif defined(__powerpc64__)
|
||||
const unsigned struct_kernel_stat_sz = 144;
|
||||
const unsigned struct_kernel_stat64_sz = 104;
|
||||
#elif defined(__riscv)
|
||||
/* RISCVTODO: check that these values are correct */
|
||||
#elif defined(__riscv) && __riscv_xlen == 64
|
||||
const unsigned struct_kernel_stat_sz = 128;
|
||||
const unsigned struct_kernel_stat64_sz = 128;
|
||||
const unsigned struct_kernel_stat64_sz = 104;
|
||||
#elif defined(__mips__)
|
||||
const unsigned struct_kernel_stat_sz =
|
||||
SANITIZER_ANDROID ? FIRST_32_SECOND_64(104, 128) :
|
||||
|
@ -25,6 +25,8 @@
|
||||
*/
|
||||
|
||||
#include <sys/param.h>
|
||||
|
||||
#include <capsicum_helpers.h>
|
||||
#include <ctype.h>
|
||||
#include <err.h>
|
||||
#include <getopt.h>
|
||||
@ -165,6 +167,11 @@ main(int argc, char **argv)
|
||||
argv += optind;
|
||||
argc -= optind;
|
||||
|
||||
if (caph_limit_stdio() < 0)
|
||||
err(EXIT_FAILURE, "failed to limit stdio rights");
|
||||
if (caph_enter() < 0)
|
||||
err(EXIT_FAILURE, "failed to enter capability mode");
|
||||
|
||||
if (*argv != NULL) {
|
||||
for (n = 0; n < argc; n++) {
|
||||
if ((dem = demangle(argv[n])) == NULL)
|
||||
|
@ -49,22 +49,24 @@ create_binary(int ifd, int ofd)
|
||||
Elf *e;
|
||||
Elf_Scn *scn;
|
||||
Elf_Data *d;
|
||||
Elf64_Addr baseaddr;
|
||||
GElf_Shdr sh;
|
||||
off_t base, off;
|
||||
off_t baseoff, off;
|
||||
int elferr;
|
||||
|
||||
if ((e = elf_begin(ifd, ELF_C_READ, NULL)) == NULL)
|
||||
errx(EXIT_FAILURE, "elf_begin() failed: %s",
|
||||
elf_errmsg(-1));
|
||||
|
||||
base = 0;
|
||||
if (lseek(ofd, base, SEEK_SET) < 0)
|
||||
baseaddr = 0;
|
||||
baseoff = 0;
|
||||
if (lseek(ofd, baseoff, SEEK_SET) < 0)
|
||||
err(EXIT_FAILURE, "lseek failed");
|
||||
|
||||
/*
|
||||
* Find base offset in the first iteration.
|
||||
*/
|
||||
base = -1;
|
||||
baseoff = -1;
|
||||
scn = NULL;
|
||||
while ((scn = elf_nextscn(e, scn)) != NULL) {
|
||||
if (gelf_getshdr(scn, &sh) == NULL) {
|
||||
@ -76,14 +78,16 @@ create_binary(int ifd, int ofd)
|
||||
sh.sh_type == SHT_NOBITS ||
|
||||
sh.sh_size == 0)
|
||||
continue;
|
||||
if (base == -1 || (off_t) sh.sh_offset < base)
|
||||
base = sh.sh_offset;
|
||||
if (baseoff == -1 || (off_t) sh.sh_offset < baseoff) {
|
||||
baseoff = sh.sh_offset;
|
||||
baseaddr = sh.sh_addr;
|
||||
}
|
||||
}
|
||||
elferr = elf_errno();
|
||||
if (elferr != 0)
|
||||
warnx("elf_nextscn failed: %s", elf_errmsg(elferr));
|
||||
|
||||
if (base == -1)
|
||||
if (baseoff == -1)
|
||||
return;
|
||||
|
||||
/*
|
||||
@ -110,8 +114,8 @@ create_binary(int ifd, int ofd)
|
||||
if (d->d_buf == NULL || d->d_size == 0)
|
||||
continue;
|
||||
|
||||
/* lseek to section offset relative to `base'. */
|
||||
off = sh.sh_offset - base;
|
||||
/* lseek to section offset relative to `baseaddr'. */
|
||||
off = sh.sh_addr - baseaddr;
|
||||
if (lseek(ofd, off, SEEK_SET) < 0)
|
||||
err(EXIT_FAILURE, "lseek failed");
|
||||
|
||||
|
@ -29,6 +29,7 @@
|
||||
#include <sys/stat.h>
|
||||
#include <ar.h>
|
||||
#include <assert.h>
|
||||
#include <capsicum_helpers.h>
|
||||
#include <ctype.h>
|
||||
#include <dwarf.h>
|
||||
#include <err.h>
|
||||
@ -46,6 +47,9 @@
|
||||
#include <strings.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include <libcasper.h>
|
||||
#include <casper/cap_fileargs.h>
|
||||
|
||||
#include "_elftc.h"
|
||||
|
||||
ELFTC_VCSID("$Id: nm.c 3504 2016-12-17 15:33:16Z kaiwang27 $");
|
||||
@ -165,6 +169,8 @@ struct nm_prog_options {
|
||||
|
||||
fn_sym_print value_print_fn;
|
||||
fn_sym_print size_print_fn;
|
||||
|
||||
fileargs_t *fileargs;
|
||||
};
|
||||
|
||||
#define CHECK_SYM_PRINT_DATA(p) (p->headp == NULL || p->sh_num == 0 || \
|
||||
@ -177,9 +183,10 @@ static int cmp_name(const void *, const void *);
|
||||
static int cmp_none(const void *, const void *);
|
||||
static int cmp_size(const void *, const void *);
|
||||
static int cmp_value(const void *, const void *);
|
||||
static void enter_cap_mode(int, char **);
|
||||
static void filter_dest(void);
|
||||
static int filter_insert(fn_filter);
|
||||
static void get_opt(int, char **);
|
||||
static void get_opt(int *, char ***);
|
||||
static int get_sym(Elf *, struct sym_head *, int, size_t, size_t,
|
||||
const char *, const char **, int);
|
||||
static const char * get_sym_name(Elf *, const GElf_Sym *, size_t,
|
||||
@ -392,6 +399,36 @@ cmp_value(const void *lp, const void *rp)
|
||||
return (l->sym->st_value - r->sym->st_value);
|
||||
}
|
||||
|
||||
static void
|
||||
enter_cap_mode(int argc, char **argv)
|
||||
{
|
||||
cap_rights_t rights;
|
||||
fileargs_t *fa;
|
||||
char *defaultfn;
|
||||
|
||||
cap_rights_init(&rights, CAP_FSTAT, CAP_MMAP_R);
|
||||
|
||||
if (argc == 0) {
|
||||
defaultfn = strdup(nm_info.def_filename);
|
||||
if (defaultfn == NULL)
|
||||
err(EXIT_FAILURE, "strdup");
|
||||
argc = 1;
|
||||
argv = &defaultfn;
|
||||
}
|
||||
|
||||
fa = fileargs_init(argc, argv, O_RDONLY, 0, &rights, FA_OPEN);
|
||||
if (fa == NULL)
|
||||
err(EXIT_FAILURE, "failed to initialize fileargs");
|
||||
|
||||
caph_cache_catpages();
|
||||
if (caph_limit_stdio() < 0)
|
||||
err(EXIT_FAILURE, "failed to limit stdio rights");
|
||||
if (caph_enter_casper() < 0)
|
||||
err(EXIT_FAILURE, "failed to enter capability mode");
|
||||
|
||||
nm_opts.fileargs = fa;
|
||||
}
|
||||
|
||||
static void
|
||||
filter_dest(void)
|
||||
{
|
||||
@ -441,17 +478,17 @@ parse_demangle_option(const char *opt)
|
||||
}
|
||||
|
||||
static void
|
||||
get_opt(int argc, char **argv)
|
||||
get_opt(int *argc, char ***argv)
|
||||
{
|
||||
int ch;
|
||||
bool is_posix, oflag;
|
||||
|
||||
if (argc <= 0 || argv == NULL)
|
||||
if (*argc <= 0 || *argv == NULL)
|
||||
return;
|
||||
|
||||
oflag = is_posix = false;
|
||||
nm_opts.t = RADIX_HEX;
|
||||
while ((ch = getopt_long(argc, argv, "ABCDF:PSVaefghlnoprst:uvx",
|
||||
while ((ch = getopt_long(*argc, *argv, "ABCDF:PSVaefghlnoprst:uvx",
|
||||
nm_longopts, NULL)) != -1) {
|
||||
switch (ch) {
|
||||
case 'A':
|
||||
@ -573,6 +610,8 @@ get_opt(int argc, char **argv)
|
||||
usage(1);
|
||||
}
|
||||
}
|
||||
*argc -= optind;
|
||||
*argv += optind;
|
||||
|
||||
/*
|
||||
* In POSIX mode, the '-o' option controls the output radix.
|
||||
@ -764,6 +803,7 @@ global_init(void)
|
||||
nm_opts.elem_print_fn = &sym_elem_print_all;
|
||||
nm_opts.value_print_fn = &sym_value_dec_print;
|
||||
nm_opts.size_print_fn = &sym_size_dec_print;
|
||||
nm_opts.fileargs = NULL;
|
||||
SLIST_INIT(&nm_out_filter);
|
||||
}
|
||||
|
||||
@ -1467,7 +1507,7 @@ read_object(const char *filename)
|
||||
|
||||
assert(filename != NULL && "filename is null");
|
||||
|
||||
if ((fd = open(filename, O_RDONLY)) == -1) {
|
||||
if ((fd = fileargs_open(nm_opts.fileargs, filename)) == -1) {
|
||||
warn("'%s'", filename);
|
||||
return (1);
|
||||
}
|
||||
@ -2115,8 +2155,9 @@ main(int argc, char **argv)
|
||||
int rtn;
|
||||
|
||||
global_init();
|
||||
get_opt(argc, argv);
|
||||
rtn = read_files(argc - optind, argv + optind);
|
||||
get_opt(&argc, &argv);
|
||||
enter_cap_mode(argc, argv);
|
||||
rtn = read_files(argc, argv);
|
||||
global_dest();
|
||||
|
||||
exit(rtn);
|
||||
|
@ -9,7 +9,7 @@ ippool \- user interface to the IPFilter pools
|
||||
-a [-dnv] [-m <name>] [-o <role>] [-t <type>] [-T ttl] -i <ipaddr>[/<netmask>]
|
||||
.br
|
||||
.B ippool
|
||||
-A [-dnv] [-m <name>] [-o <role>] [-S <seed>] [-t <type>]
|
||||
-A [-dnv] [-m <name>] [-o <role>] [-S <seed>] -t <type>
|
||||
.br
|
||||
.B ippool
|
||||
-f <file> [-dnuv]
|
||||
@ -96,11 +96,8 @@ retrieving statistical information.
|
||||
.TP
|
||||
.B -o <role>
|
||||
Sets the role with which this pool is to be used. Currently only
|
||||
.B ipf,
|
||||
.B auth
|
||||
and
|
||||
.B count
|
||||
are accepted as arguments to this option.
|
||||
.B ipf
|
||||
(the default) is accepted as arguments to this option.
|
||||
.TP
|
||||
.B -S <seed>
|
||||
Sets the hashing seed to the number specified. Only for use with
|
||||
@ -108,7 +105,7 @@ Sets the hashing seed to the number specified. Only for use with
|
||||
type pools.
|
||||
.TP
|
||||
.B -t <type>
|
||||
Sets the type of pool being defined. Myst be one of
|
||||
Sets the type of pool being defined. Must be one of
|
||||
.B tree,
|
||||
.B hash,
|
||||
.B group-map.
|
||||
|
@ -145,7 +145,7 @@ poolnodecommand(remove, argc, argv)
|
||||
bzero((char *)&pnode, sizeof(pnode));
|
||||
bzero((char *)&hnode, sizeof(hnode));
|
||||
|
||||
while ((c = getopt(argc, argv, "di:m:no:Rt:T:v")) != -1)
|
||||
while ((c = getopt(argc, argv, "di:m:no:t:T:v")) != -1)
|
||||
switch (c)
|
||||
{
|
||||
case 'd' :
|
||||
@ -172,9 +172,6 @@ poolnodecommand(remove, argc, argv)
|
||||
if (role == IPL_LOGNONE)
|
||||
return -1;
|
||||
break;
|
||||
case 'R' :
|
||||
opts |= OPT_NORESOLVE;
|
||||
break;
|
||||
case 't' :
|
||||
if (ipset == 1) {
|
||||
fprintf(stderr,
|
||||
@ -260,7 +257,7 @@ poolcommand(remove, argc, argv)
|
||||
char *argv[];
|
||||
{
|
||||
int type, role, c, err;
|
||||
char *poolname;
|
||||
char *poolname, *typearg = NULL;
|
||||
iphtable_t iph;
|
||||
ip_pool_t pool;
|
||||
|
||||
@ -272,7 +269,7 @@ poolcommand(remove, argc, argv)
|
||||
bzero((char *)&iph, sizeof(iph));
|
||||
bzero((char *)&pool, sizeof(pool));
|
||||
|
||||
while ((c = getopt(argc, argv, "dm:no:RS:v")) != -1)
|
||||
while ((c = getopt(argc, argv, "dm:no:S:vt:")) != -1)
|
||||
switch (c)
|
||||
{
|
||||
case 'd' :
|
||||
@ -292,15 +289,16 @@ poolcommand(remove, argc, argv)
|
||||
return -1;
|
||||
}
|
||||
break;
|
||||
case 'R' :
|
||||
opts |= OPT_NORESOLVE;
|
||||
break;
|
||||
case 'S' :
|
||||
if (remove == 0)
|
||||
iph.iph_seed = atoi(optarg);
|
||||
else
|
||||
usage(argv[0]);
|
||||
break;
|
||||
case 't' :
|
||||
type = gettype(optarg, &iph.iph_type);
|
||||
typearg = optarg;
|
||||
break;
|
||||
case 'v' :
|
||||
opts |= OPT_VERBOSE;
|
||||
break;
|
||||
@ -320,17 +318,22 @@ poolcommand(remove, argc, argv)
|
||||
return -1;
|
||||
}
|
||||
|
||||
type = gettype(argv[optind], &iph.iph_type);
|
||||
if (type == IPLT_NONE) {
|
||||
fprintf(stderr, "unknown type '%s'\n", argv[optind]);
|
||||
if (type == IPLT_NONE && remove == 0) {
|
||||
if (typearg == NULL) {
|
||||
fprintf(stderr, "type must be specified\n");
|
||||
usage(argv[0]);
|
||||
} else {
|
||||
fprintf(stderr, "unknown type '%s'\n", typearg);
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (type == IPLT_HASH) {
|
||||
if (type == IPLT_HASH || (type == IPLT_NONE && remove == 1)) {
|
||||
strncpy(iph.iph_name, poolname, sizeof(iph.iph_name));
|
||||
iph.iph_name[sizeof(iph.iph_name) - 1] = '\0';
|
||||
iph.iph_unit = role;
|
||||
} else if (type == IPLT_POOL) {
|
||||
}
|
||||
if (type == IPLT_POOL || (type == IPLT_NONE && remove == 1)) {
|
||||
strncpy(pool.ipo_name, poolname, sizeof(pool.ipo_name));
|
||||
pool.ipo_name[sizeof(pool.ipo_name) - 1] = '\0';
|
||||
pool.ipo_unit = role;
|
||||
@ -355,6 +358,16 @@ poolcommand(remove, argc, argv)
|
||||
case IPLT_POOL :
|
||||
err = remove_pool(&pool, ioctl);
|
||||
break;
|
||||
case IPLT_NONE :
|
||||
err = 1;
|
||||
{
|
||||
int err_h, err_p;
|
||||
err_h = remove_hash(&iph, ioctl);
|
||||
err_p = remove_pool(&pool, ioctl);
|
||||
if (err_h == 0 || err_p == 0)
|
||||
err = 0;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
return err;
|
||||
@ -368,7 +381,7 @@ loadpoolfile(argc, argv, infile)
|
||||
{
|
||||
int c;
|
||||
|
||||
while ((c = getopt(argc, argv, "dnRuv")) != -1)
|
||||
while ((c = getopt(argc, argv, "dnuv")) != -1)
|
||||
switch (c)
|
||||
{
|
||||
case 'd' :
|
||||
@ -378,9 +391,6 @@ loadpoolfile(argc, argv, infile)
|
||||
case 'n' :
|
||||
opts |= OPT_DONOTHING|OPT_DONTOPEN;
|
||||
break;
|
||||
case 'R' :
|
||||
opts |= OPT_NORESOLVE;
|
||||
break;
|
||||
case 'u' :
|
||||
opts |= OPT_REMOVE;
|
||||
break;
|
||||
|
@ -480,10 +480,6 @@ ATF_TC_BODY(mmap_truncate_signal, tc)
|
||||
int fd, sta;
|
||||
pid_t pid;
|
||||
|
||||
#ifdef __FreeBSD__
|
||||
atf_tc_expect_fail("testcase fails with SIGSEGV on FreeBSD; bug # 211924");
|
||||
#endif
|
||||
|
||||
fd = open(path, O_RDWR | O_CREAT, 0700);
|
||||
|
||||
if (fd < 0)
|
||||
|
@ -200,6 +200,12 @@
|
||||
uk_UA.KOI8-U
|
||||
..
|
||||
..
|
||||
certs
|
||||
blacklisted
|
||||
..
|
||||
trusted
|
||||
..
|
||||
..
|
||||
dict
|
||||
..
|
||||
doc
|
||||
|
@ -152,6 +152,7 @@ SUBDIR.${MK_GSSAPI}+= libgssapi librpcsec_gss
|
||||
SUBDIR.${MK_ICONV}+= libiconv_modules
|
||||
SUBDIR.${MK_KERBEROS_SUPPORT}+= libcom_err
|
||||
SUBDIR.${MK_LDNS}+= libldns
|
||||
SUBDIR.${MK_STATS}+= libstats
|
||||
|
||||
# The libraries under libclang_rt can only be built by clang, and only make
|
||||
# sense to build when clang is enabled at all. Furthermore, they can only be
|
||||
|
@ -5,6 +5,8 @@ SHLIB= h_csu
|
||||
SHLIB_NAME= libh_csu.so
|
||||
SHLIB_MAJOR= 1
|
||||
|
||||
ALLOW_MIPS_SHARED_TEXTREL=
|
||||
|
||||
WITHOUT_STATIC=
|
||||
WITHOUT_PROFILE=
|
||||
WITHOUT_PIC=
|
||||
|
@ -11,6 +11,8 @@ CXXINCLUDEDIR= ${INCLUDEDIR}/c++/v${SHLIB_MAJOR}
|
||||
STATIC_CXXFLAGS+= -mlong-calls
|
||||
.endif
|
||||
|
||||
ALLOW_MIPS_SHARED_TEXTREL=
|
||||
|
||||
.PATH: ${SRCDIR}
|
||||
|
||||
LIB= c++
|
||||
|
@ -37,7 +37,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd September 15, 2014
|
||||
.Dd September 28, 2019
|
||||
.Dt MQ_OPEN 2
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -317,6 +317,13 @@ This implementation places strict requirements on the value of
|
||||
it must begin with a slash
|
||||
.Pq Ql /
|
||||
and contain no other slash characters.
|
||||
.Pp
|
||||
The
|
||||
.Fa mode
|
||||
and
|
||||
.Fa attr
|
||||
arguments are variadic and may result in different calling conventions
|
||||
than might otherwise be expected.
|
||||
.Sh COPYRIGHT
|
||||
Portions of this text are reprinted and reproduced in electronic form
|
||||
from IEEE Std 1003.1, 2004 Edition, Standard for Information Technology --
|
||||
|
@ -28,7 +28,7 @@
|
||||
.\" @(#)open.2 8.2 (Berkeley) 11/16/93
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd September 17, 2019
|
||||
.Dd September 28, 2019
|
||||
.Dt OPEN 2
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -615,3 +615,8 @@ permits searches.
|
||||
The present implementation of the
|
||||
.Fa openat
|
||||
checks the current permissions of directory instead.
|
||||
.Pp
|
||||
The
|
||||
.Fa mode
|
||||
argument is variadic and may result in different calling conventions
|
||||
than might otherwise be expected.
|
||||
|
@ -88,9 +88,6 @@ memfd_create(const char *name, unsigned int flags)
|
||||
if ((flags & ~(MFD_CLOEXEC | MFD_ALLOW_SEALING | MFD_HUGETLB |
|
||||
MFD_HUGE_MASK)) != 0)
|
||||
return (EINVAL);
|
||||
/* HUGETLB set with no size specified. */
|
||||
if ((flags & MFD_HUGETLB) != 0 && (flags & MFD_HUGE_MASK) == 0)
|
||||
return (EINVAL);
|
||||
/* Size specified but no HUGETLB. */
|
||||
if ((flags & MFD_HUGE_MASK) != 0 && (flags & MFD_HUGETLB) == 0)
|
||||
return (EINVAL);
|
||||
|
@ -5,6 +5,7 @@ SRCDIR= ${SRCTOP}/contrib/libcxxrt
|
||||
|
||||
SHLIB_MAJOR= 1
|
||||
SHLIBDIR?= /lib
|
||||
ALLOW_MIPS_SHARED_TEXTREL=
|
||||
|
||||
.PATH: ${SRCDIR}
|
||||
|
||||
|
@ -6,6 +6,8 @@ UNWINDSRCDIR= ${SRCTOP}/contrib/libunwind/src
|
||||
|
||||
STATIC_CFLAGS+=${PICFLAG} -fvisibility=hidden -DVISIBILITY_HIDDEN
|
||||
|
||||
ALLOW_MIPS_SHARED_TEXTREL=
|
||||
|
||||
.PATH: ${COMPILERRTDIR}/lib/builtins
|
||||
.PATH: ${UNWINDSRCDIR}
|
||||
SRCS_EXC+= gcc_personality_v0.c
|
||||
|
@ -5,6 +5,8 @@ LIB= pmc
|
||||
SRCS= libpmc.c pmclog.c libpmc_pmu_util.c libpmc_json.cc
|
||||
INCS= pmc.h pmclog.h pmcformat.h
|
||||
|
||||
ALLOW_MIPS_SHARED_TEXTREL=
|
||||
|
||||
.if ${MACHINE_ARCH} == "amd64" || ${MACHINE_ARCH} == "i386"
|
||||
|
||||
.if ${MACHINE_ARCH} == "aarch64"
|
||||
|
14
lib/libstats/Makefile
Normal file
14
lib/libstats/Makefile
Normal file
@ -0,0 +1,14 @@
|
||||
# $FreeBSD$
|
||||
|
||||
LIB= stats
|
||||
SHLIBDIR?= /lib
|
||||
SHLIB_MAJOR= 0
|
||||
SRCS= subr_stats.c
|
||||
|
||||
# To debug, comment WITHOUT_ASSERT_DEBUG= and uncomment CFLAGS:=
|
||||
WITHOUT_ASSERT_DEBUG=
|
||||
#CFLAGS:=${CFLAGS:C/-O[0-9]/-O0 -g3/} -DDIAGNOSTIC
|
||||
|
||||
.PATH: ${.CURDIR}/../../sys/kern
|
||||
|
||||
.include <bsd.lib.mk>
|
@ -657,8 +657,18 @@ sysdecode_mlockall_flags(FILE *fp, int flags, int *rem)
|
||||
bool
|
||||
sysdecode_mmap_prot(FILE *fp, int prot, int *rem)
|
||||
{
|
||||
int protm;
|
||||
bool printed;
|
||||
|
||||
return (print_mask_int(fp, mmapprot, prot, rem));
|
||||
printed = false;
|
||||
protm = PROT_MAX_EXTRACT(prot);
|
||||
if (protm != 0) {
|
||||
fputs("PROT_MAX(", fp);
|
||||
printed = print_mask_int(fp, mmapprot, protm, rem);
|
||||
fputs(")|", fp);
|
||||
prot = protm;
|
||||
}
|
||||
return (print_mask_int(fp, mmapprot, prot, rem) || printed);
|
||||
}
|
||||
|
||||
bool
|
||||
|
@ -91,7 +91,8 @@ void
|
||||
libusb_set_debug(libusb_context *ctx, int level)
|
||||
{
|
||||
ctx = GET_CONTEXT(ctx);
|
||||
if (ctx)
|
||||
/* debug_fixed is set when the environment overrides libusb_set_debug */
|
||||
if (ctx && ctx->debug_fixed == 0)
|
||||
ctx->debug = level;
|
||||
}
|
||||
|
||||
@ -132,7 +133,7 @@ libusb_init(libusb_context **context)
|
||||
{
|
||||
struct libusb_context *ctx;
|
||||
pthread_condattr_t attr;
|
||||
char *debug;
|
||||
char *debug, *ep;
|
||||
int ret;
|
||||
|
||||
ctx = malloc(sizeof(*ctx));
|
||||
@ -143,9 +144,23 @@ libusb_init(libusb_context **context)
|
||||
|
||||
debug = getenv("LIBUSB_DEBUG");
|
||||
if (debug != NULL) {
|
||||
ctx->debug = atoi(debug);
|
||||
if (ctx->debug != 0)
|
||||
/*
|
||||
* If LIBUSB_DEBUG is set, we'll honor that and use it to
|
||||
* override libusb_set_debug calls.
|
||||
*/
|
||||
errno = 0;
|
||||
ctx->debug = strtol(debug, &ep, 10);
|
||||
if (errno == 0 && *ep == '\0') {
|
||||
ctx->debug_fixed = 1;
|
||||
} else {
|
||||
/*
|
||||
* LIBUSB_DEBUG conversion failed for some reason, but
|
||||
* we don't care about the specifics all that much. We
|
||||
* can't use it either way. Force it to the default,
|
||||
* 0, in case we had a partial number.
|
||||
*/
|
||||
ctx->debug = 0;
|
||||
}
|
||||
}
|
||||
TAILQ_INIT(&ctx->pollfds);
|
||||
TAILQ_INIT(&ctx->tr_done);
|
||||
|
@ -638,8 +638,6 @@ accounting_enable="NO" # Turn on process accounting (or NO).
|
||||
firstboot_sentinel="/firstboot" # Scripts with "firstboot" keyword are run if
|
||||
# this file exists. Should be on a R/W filesystem so
|
||||
# the file can be deleted after the boot completes.
|
||||
|
||||
# Emulation/compatibility services provided by /etc/rc.d/abi
|
||||
sysvipc_enable="NO" # Load System V IPC primitives at startup (or NO).
|
||||
linux_enable="NO" # Linux binary compatibility loaded at startup (or NO).
|
||||
clear_tmp_enable="NO" # Clear /tmp at startup.
|
||||
@ -681,6 +679,10 @@ harvest_mask="511" # Entropy device harvests all but the very invasive sources.
|
||||
dmesg_enable="YES" # Save dmesg(8) to /var/run/dmesg.boot
|
||||
watchdogd_enable="NO" # Start the software watchdog daemon
|
||||
watchdogd_flags="" # Flags to watchdogd (if enabled)
|
||||
watchdogd_timeout="" # watchdogd timeout, overrides -t in watchdogd_flags
|
||||
watchdogd_shutdown_timeout="" # Timeout to use after watchdogd is stopped.
|
||||
# Has effect only for system shutdown.
|
||||
# Overrides -x in watchdogd_flags.
|
||||
devfs_rulesets="/etc/defaults/devfs.rules /etc/devfs.rules" # Files containing
|
||||
# devfs(8) rules.
|
||||
devfs_system_ruleset="" # The name (NOT number) of a ruleset to apply to /dev
|
||||
|
@ -11,7 +11,6 @@ CONFS= DAEMON \
|
||||
LOGIN \
|
||||
NETWORKING \
|
||||
SERVERS \
|
||||
abi \
|
||||
addswap \
|
||||
adjkerntz \
|
||||
archdep \
|
||||
@ -51,6 +50,7 @@ CONFS= DAEMON \
|
||||
kldxref \
|
||||
${_kpasswdd} \
|
||||
ldconfig \
|
||||
linux \
|
||||
local \
|
||||
localpkg \
|
||||
lockd \
|
||||
@ -107,6 +107,7 @@ CONFS= DAEMON \
|
||||
swaplate \
|
||||
sysctl \
|
||||
syslogd \
|
||||
sysvipc \
|
||||
tmp \
|
||||
ugidfw \
|
||||
${_utx} \
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
|
||||
# PROVIDE: SERVERS
|
||||
# REQUIRE: mountcritremote abi ldconfig savecore watchdogd
|
||||
# REQUIRE: mountcritremote sysvipc linux ldconfig savecore watchdogd
|
||||
|
||||
# This is a dummy dependency, for early-start servers relying on
|
||||
# some basic configuration.
|
||||
|
@ -168,7 +168,7 @@ parse_options()
|
||||
if [ -z "${_exec_start}" ]; then
|
||||
_exec_start="/bin/sh /etc/rc"
|
||||
if [ -z "${_exec_stop}" ]; then
|
||||
_exec_stop="/bin/sh /etc/rc.shutdown"
|
||||
_exec_stop="/bin/sh /etc/rc.shutdown jail"
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
@ -3,30 +3,22 @@
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
# PROVIDE: abi
|
||||
# PROVIDE: linux
|
||||
# REQUIRE: archdep
|
||||
# KEYWORD: nojail
|
||||
|
||||
. /etc/rc.subr
|
||||
|
||||
name="abi"
|
||||
desc="Enable foreign ABIs"
|
||||
name="linux"
|
||||
desc="Enable Linux ABI"
|
||||
rcvar="linux_enable"
|
||||
start_cmd="${name}_start"
|
||||
stop_cmd=":"
|
||||
|
||||
sysv_start()
|
||||
{
|
||||
echo -n ' sysvipc'
|
||||
load_kld sysvmsg
|
||||
load_kld sysvsem
|
||||
load_kld sysvshm
|
||||
}
|
||||
|
||||
linux_start()
|
||||
{
|
||||
local _tmpdir
|
||||
|
||||
echo -n ' linux'
|
||||
load_kld -e 'linux(aout|elf)' linux
|
||||
case `sysctl -n hw.machine_arch` in
|
||||
amd64)
|
||||
@ -43,21 +35,5 @@ linux_start()
|
||||
fi
|
||||
}
|
||||
|
||||
abi_start()
|
||||
{
|
||||
local _echostop
|
||||
|
||||
_echostop=
|
||||
if checkyesno sysvipc_enable || checkyesno linux_enable; then
|
||||
echo -n 'Additional ABI support:'
|
||||
_echostop=yes
|
||||
fi
|
||||
|
||||
checkyesno sysvipc_enable && sysv_start
|
||||
checkyesno linux_enable && linux_start
|
||||
|
||||
[ -n "${_echostop}" ] && echo '.'
|
||||
}
|
||||
|
||||
load_rc_config $name
|
||||
run_rc_command "$1"
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
|
||||
# PROVIDE: localpkg
|
||||
# REQUIRE: abi
|
||||
# REQUIRE: sysvipc linux
|
||||
# BEFORE: securelevel
|
||||
# KEYWORD: shutdown
|
||||
|
||||
|
26
libexec/rc/rc.d/sysvipc
Executable file
26
libexec/rc/rc.d/sysvipc
Executable file
@ -0,0 +1,26 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
# PROVIDE: sysvipc
|
||||
# REQUIRE: archdep
|
||||
# KEYWORD: nojail
|
||||
|
||||
. /etc/rc.subr
|
||||
|
||||
name="sysvipc"
|
||||
desc="Load SysV IPC modules"
|
||||
rcvar="sysvipc_enable"
|
||||
start_cmd="${name}_start"
|
||||
stop_cmd=":"
|
||||
|
||||
sysvipc_start()
|
||||
{
|
||||
load_kld sysvmsg
|
||||
load_kld sysvsem
|
||||
load_kld sysvshm
|
||||
}
|
||||
|
||||
load_rc_config $name
|
||||
run_rc_command "$1"
|
@ -38,9 +38,55 @@ desc="Watchdog daemon"
|
||||
rcvar="watchdogd_enable"
|
||||
command="/usr/sbin/${name}"
|
||||
pidfile="/var/run/${name}.pid"
|
||||
start_precmd="watchdogd_prestart"
|
||||
stop_precmd="watchdogd_prestop"
|
||||
stop_postcmd="watchdogd_poststop"
|
||||
watchdog_command="/usr/sbin/watchdog"
|
||||
|
||||
watchdogd_prestart()
|
||||
{
|
||||
if [ -n "${watchdogd_timeout}" ] ; then
|
||||
rc_flags="${rc_flags} -t ${watchdogd_timeout}"
|
||||
fi
|
||||
if [ -n "$watchdogd_shutdown_timeout" ] ; then
|
||||
rc_flags="${rc_flags} -x ${watchdogd_shutdown_timeout}"
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
watchdogd_prestop()
|
||||
{
|
||||
sig_stop="${watchdogd_sig_stop:-TERM}"
|
||||
}
|
||||
|
||||
watchdogd_poststop()
|
||||
{
|
||||
if [ ${watchdogd_shutdown_timeout:-0} -gt 0 ] ; then
|
||||
case "${rc_shutdown}" in
|
||||
"reboot")
|
||||
info "watchdog timer is set to" \
|
||||
${watchdogd_shutdown_timeout} "before shutdown"
|
||||
return 0
|
||||
;;
|
||||
"single")
|
||||
info "watchdog timer is disabled before going to" \
|
||||
"single user mode"
|
||||
${watchdog_command} -t 0
|
||||
;;
|
||||
"")
|
||||
info "watchdog timer is disabled after administrative" \
|
||||
"${name} stop"
|
||||
${watchdog_command} -t 0
|
||||
;;
|
||||
*)
|
||||
warn "unknown shutdown mode '${rc_shutdown}'"
|
||||
warn "watchdog timer is set to ${watchdogd_shutdown_timeout}"
|
||||
return 0
|
||||
;;
|
||||
esac
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
load_rc_config $name
|
||||
|
||||
sig_stop="${watchdogd_sig_stop:-TERM}"
|
||||
|
||||
run_rc_command "$1"
|
||||
|
@ -43,6 +43,8 @@ HOME=/
|
||||
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin
|
||||
export HOME PATH
|
||||
|
||||
rc_shutdown=${1:-"unspecified"}
|
||||
|
||||
. /etc/rc.subr
|
||||
|
||||
load_rc_config
|
||||
|
@ -6,7 +6,7 @@
|
||||
# Packages to install into the image we're creating. This is a deliberately
|
||||
# minimalist set, providing only the packages necessary to bootstrap further
|
||||
# package installation as specified via EC2 user-data.
|
||||
export VM_EXTRA_PACKAGES="ec2-scripts firstboot-freebsd-update firstboot-pkgs dual-dhclient"
|
||||
export VM_EXTRA_PACKAGES="ec2-scripts firstboot-freebsd-update firstboot-pkgs dual-dhclient-daemon"
|
||||
|
||||
# Include the amazon-ssm-agent package in amd64 images, since some users want
|
||||
# to be able to use it on systems which are not connected to the Internet.
|
||||
|
@ -31,7 +31,7 @@
|
||||
.\" @(#)init.8 8.3 (Berkeley) 4/18/94
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd August 15, 2018
|
||||
.Dd August 6, 2019
|
||||
.Dt INIT 8
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -270,6 +270,15 @@ The timeout can be configured via the
|
||||
variable
|
||||
.Va kern.init_shutdown_timeout .
|
||||
.Pp
|
||||
.Nm init
|
||||
passes
|
||||
.Dq Li single
|
||||
as the argument to the shutdown script if return to single-user mode
|
||||
is requested.
|
||||
Otherwise,
|
||||
.Dq Li reboot
|
||||
argument is used.
|
||||
.Pp
|
||||
The role of
|
||||
.Nm
|
||||
is so critical that if it dies, the system will reboot itself
|
||||
|
@ -8,6 +8,8 @@ SUBDIR_PARALLEL=
|
||||
|
||||
SUBDIR.${MK_TESTS}+= tests
|
||||
|
||||
SUBDIR.${MK_CAROOT}+= caroot
|
||||
|
||||
# These are the programs which depend on crypto, but not Kerberos.
|
||||
SPROGS= lib/libfetch lib/libpam lib/libradius lib/libtelnet \
|
||||
bin/ed libexec/telnetd usr.bin/fetch usr.bin/telnet \
|
||||
|
277
secure/caroot/MAca-bundle.pl
Executable file
277
secure/caroot/MAca-bundle.pl
Executable file
@ -0,0 +1,277 @@
|
||||
#!/usr/bin/env perl
|
||||
##
|
||||
## MAca-bundle.pl -- Regenerate ca-root-nss.crt from the Mozilla certdata.txt
|
||||
##
|
||||
## Rewritten in September 2011 by Matthias Andree to heed untrust
|
||||
##
|
||||
|
||||
## Copyright (c) 2011, 2013 Matthias Andree <mandree@FreeBSD.org>
|
||||
## All rights reserved.
|
||||
## Copyright (c) 2018, Allan Jude <allanjude@FreeBSD.org>
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted provided that the following conditions are
|
||||
## met:
|
||||
##
|
||||
## * Redistributions of source code must retain the above copyright
|
||||
## notice, this list of conditions and the following disclaimer.
|
||||
##
|
||||
## * Redistributions in binary form must reproduce the above copyright
|
||||
## notice, this list of conditions and the following disclaimer in the
|
||||
## documentation and/or other materials provided with the distribution.
|
||||
##
|
||||
## THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
## "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
## LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
||||
## FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
||||
## COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
## INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
||||
## BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
## LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
||||
## CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
## LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
||||
## ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||
## POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
use strict;
|
||||
use Carp;
|
||||
use MIME::Base64;
|
||||
use Getopt::Long;
|
||||
|
||||
my $VERSION = '$FreeBSD$';
|
||||
my $generated = '@' . 'generated';
|
||||
my $inputfh = *STDIN;
|
||||
my $debug = 0;
|
||||
my $infile;
|
||||
my $outputdir;
|
||||
my %labels;
|
||||
my %certs;
|
||||
my %trusts;
|
||||
|
||||
$debug++
|
||||
if defined $ENV{'WITH_DEBUG'}
|
||||
and $ENV{'WITH_DEBUG'} !~ m/(?i)^(no|0|false|)$/;
|
||||
|
||||
GetOptions (
|
||||
"debug+" => \$debug,
|
||||
"infile:s" => \$infile,
|
||||
"outputdir:s" => \$outputdir)
|
||||
or die("Error in command line arguments\n$0 [-d] [-i input-file] [-o output-dir]\n");
|
||||
|
||||
if ($infile) {
|
||||
open($inputfh, "<", $infile) or die "Failed to open $infile";
|
||||
}
|
||||
|
||||
sub print_header($$)
|
||||
{
|
||||
my $dstfile = shift;
|
||||
my $label = shift;
|
||||
|
||||
if ($outputdir) {
|
||||
print $dstfile <<EOFH;
|
||||
##
|
||||
## $label
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $VERSION
|
||||
##
|
||||
## $generated
|
||||
##
|
||||
EOFH
|
||||
} else {
|
||||
print $dstfile <<EOH;
|
||||
##
|
||||
## ca-root-nss.crt -- Bundle of CA Root Certificates
|
||||
##
|
||||
## This is a bundle of X.509 certificates of public Certificate
|
||||
## Authorities (CA). These were automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt').
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $VERSION
|
||||
##
|
||||
## $generated
|
||||
##
|
||||
EOH
|
||||
}
|
||||
}
|
||||
|
||||
sub printcert($$$)
|
||||
{
|
||||
my ($fh, $label, $certdata) = @_;
|
||||
return unless $certdata;
|
||||
open(OUT, "|openssl x509 -text -inform DER -fingerprint")
|
||||
or die "could not pipe to openssl x509";
|
||||
print OUT $certdata;
|
||||
close(OUT) or die "openssl x509 failed with exit code $?";
|
||||
}
|
||||
|
||||
sub graboct($)
|
||||
{
|
||||
my $ifh = shift;
|
||||
my $data;
|
||||
|
||||
while (<$ifh>) {
|
||||
last if /^END/;
|
||||
my (undef,@oct) = split /\\/;
|
||||
my @bin = map(chr(oct), @oct);
|
||||
$data .= join('', @bin);
|
||||
}
|
||||
|
||||
return $data;
|
||||
}
|
||||
|
||||
|
||||
sub grabcert($)
|
||||
{
|
||||
my $ifh = shift;
|
||||
my $certdata;
|
||||
my $cka_label;
|
||||
my $serial;
|
||||
|
||||
while (<$ifh>) {
|
||||
chomp;
|
||||
last if ($_ eq '');
|
||||
|
||||
if (/^CKA_LABEL UTF8 "([^"]+)"/) {
|
||||
$cka_label = $1;
|
||||
}
|
||||
|
||||
if (/^CKA_VALUE MULTILINE_OCTAL/) {
|
||||
$certdata = graboct($ifh);
|
||||
}
|
||||
|
||||
if (/^CKA_SERIAL_NUMBER MULTILINE_OCTAL/) {
|
||||
$serial = graboct($ifh);
|
||||
}
|
||||
}
|
||||
return ($serial, $cka_label, $certdata);
|
||||
}
|
||||
|
||||
sub grabtrust($) {
|
||||
my $ifh = shift;
|
||||
my $cka_label;
|
||||
my $serial;
|
||||
my $maytrust = 0;
|
||||
my $distrust = 0;
|
||||
|
||||
while (<$ifh>) {
|
||||
chomp;
|
||||
last if ($_ eq '');
|
||||
|
||||
if (/^CKA_LABEL UTF8 "([^"]+)"/) {
|
||||
$cka_label = $1;
|
||||
}
|
||||
|
||||
if (/^CKA_SERIAL_NUMBER MULTILINE_OCTAL/) {
|
||||
$serial = graboct($ifh);
|
||||
}
|
||||
|
||||
if (/^CKA_TRUST_(SERVER_AUTH|EMAIL_PROTECTION|CODE_SIGNING) CK_TRUST (\S+)$/)
|
||||
{
|
||||
if ($2 eq 'CKT_NSS_NOT_TRUSTED') {
|
||||
$distrust = 1;
|
||||
} elsif ($2 eq 'CKT_NSS_TRUSTED_DELEGATOR') {
|
||||
$maytrust = 1;
|
||||
} elsif ($2 ne 'CKT_NSS_MUST_VERIFY_TRUST') {
|
||||
confess "Unknown trust setting on line $.:\n"
|
||||
. "$_\n"
|
||||
. "Script must be updated:";
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (!$maytrust && !$distrust && $debug) {
|
||||
print STDERR "line $.: no explicit trust/distrust found for $cka_label\n";
|
||||
}
|
||||
|
||||
my $trust = ($maytrust and not $distrust);
|
||||
return ($serial, $cka_label, $trust);
|
||||
}
|
||||
|
||||
if (!$outputdir) {
|
||||
print_header(*STDOUT, "");
|
||||
}
|
||||
|
||||
while (<$inputfh>) {
|
||||
if (/^CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE/) {
|
||||
my ($serial, $label, $certdata) = grabcert($inputfh);
|
||||
if (defined $certs{$label."\0".$serial}) {
|
||||
warn "Certificate $label duplicated!\n";
|
||||
}
|
||||
$certs{$label."\0".$serial} = $certdata;
|
||||
# We store the label in a separate hash because truncating the key
|
||||
# with \0 was causing garbage data after the end of the text.
|
||||
$labels{$label."\0".$serial} = $label;
|
||||
} elsif (/^CKA_CLASS CK_OBJECT_CLASS CKO_NSS_TRUST/) {
|
||||
my ($serial, $label, $trust) = grabtrust($inputfh);
|
||||
if (defined $trusts{$label."\0".$serial}) {
|
||||
warn "Trust for $label duplicated!\n";
|
||||
}
|
||||
$trusts{$label."\0".$serial} = $trust;
|
||||
$labels{$label."\0".$serial} = $label;
|
||||
} elsif (/^CVS_ID.*Revision: ([^ ]*).*/) {
|
||||
print "## Source: \"certdata.txt\" CVS revision $1\n##\n\n";
|
||||
}
|
||||
}
|
||||
|
||||
sub label_to_filename(@) {
|
||||
my @res = @_;
|
||||
map { s/\0.*//; s/[^[:alnum:]\-]/_/g; $_ = "$_.pem"; } @res;
|
||||
return wantarray ? @res : $res[0];
|
||||
}
|
||||
|
||||
# weed out untrusted certificates
|
||||
my $untrusted = 0;
|
||||
foreach my $it (keys %trusts) {
|
||||
if (!$trusts{$it}) {
|
||||
if (!exists($certs{$it})) {
|
||||
warn "Found trust for nonexistent certificate $labels{$it}\n" if $debug;
|
||||
} else {
|
||||
delete $certs{$it};
|
||||
warn "Skipping untrusted $labels{$it}\n" if $debug;
|
||||
$untrusted++;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (!$outputdir) {
|
||||
print "## Untrusted certificates omitted from this bundle: $untrusted\n\n";
|
||||
}
|
||||
print STDERR "## Untrusted certificates omitted from this bundle: $untrusted\n";
|
||||
|
||||
my $certcount = 0;
|
||||
foreach my $it (sort {uc($a) cmp uc($b)} keys %certs) {
|
||||
my $fh = *STDOUT;
|
||||
my $filename;
|
||||
if (!exists($trusts{$it})) {
|
||||
die "Found certificate without trust block,\naborting";
|
||||
}
|
||||
if ($outputdir) {
|
||||
$filename = label_to_filename($labels{$it});
|
||||
open($fh, ">", "$outputdir/$filename") or die "Failed to open certificate $filename";
|
||||
print_header($fh, $labels{$it});
|
||||
}
|
||||
printcert($fh, $labels{$it}, $certs{$it});
|
||||
if ($outputdir) {
|
||||
close($fh) or die "Unable to close: $filename";
|
||||
} else {
|
||||
print $fh "\n\n\n";
|
||||
}
|
||||
$certcount++;
|
||||
print STDERR "Trusting $certcount: $labels{$it}\n" if $debug;
|
||||
}
|
||||
|
||||
if ($certcount < 25) {
|
||||
die "Certificate count of $certcount is implausibly low.\nAbort";
|
||||
}
|
||||
|
||||
if (!$outputdir) {
|
||||
print "## Number of certificates: $certcount\n";
|
||||
print "## End of file.\n";
|
||||
}
|
||||
print STDERR "## Number of certificates: $certcount\n";
|
21
secure/caroot/Makefile
Normal file
21
secure/caroot/Makefile
Normal file
@ -0,0 +1,21 @@
|
||||
# $FreeBSD$
|
||||
|
||||
PACKAGE= caroot
|
||||
|
||||
CLEANFILES+= certdata.txt
|
||||
|
||||
SUBDIR+= trusted
|
||||
SUBDIR+= blacklisted
|
||||
|
||||
.include <bsd.prog.mk>
|
||||
|
||||
# To be used by secteam@ to update the trusted certificates
|
||||
|
||||
fetchcerts: .PHONY
|
||||
fetch --no-sslv3 --no-tlsv1 -o certdata.txt 'https://hg.mozilla.org/projects/nss/raw-file/tip/lib/ckfw/builtins/certdata.txt'
|
||||
|
||||
cleancerts: .PHONY
|
||||
@${MAKE} -C ${.CURDIR}/trusted ${.TARGET}
|
||||
|
||||
updatecerts: .PHONY cleancerts fetchcerts
|
||||
perl ${.CURDIR}/MAca-bundle.pl -i certdata.txt -o ${.CURDIR}/trusted
|
34
secure/caroot/README
Normal file
34
secure/caroot/README
Normal file
@ -0,0 +1,34 @@
|
||||
# $FreeBSD$
|
||||
|
||||
This directory contains the scripts to update the TLS CA Root Certificates
|
||||
that comprise the 'root trust store'.
|
||||
|
||||
The 'updatecerts' make target should be run periodically by secteam@
|
||||
specifically when there is an important change to the list of trusted root
|
||||
certificates included by Mozilla.
|
||||
|
||||
It will:
|
||||
1) Remove the old trusted certificates (cleancerts)
|
||||
2) Download the latest certdata.txt from Mozilla (fetchcerts)
|
||||
3) Split certdata.txt into the individual .pem files (updatecerts)
|
||||
|
||||
Then the results should manually be inspected (svn status)
|
||||
1) Any no-longer-trusted certificates should be moved to the
|
||||
blacklisted directory (svn mv)
|
||||
2) any newly added certificates will need to be added (svn add)
|
||||
|
||||
|
||||
The following make targets exist:
|
||||
|
||||
cleancerts:
|
||||
Delete the old certificates, run as a dependency of updatecerts.
|
||||
|
||||
fetchcerts:
|
||||
Download the latest certdata.txt from the Mozilla NSS hg repo
|
||||
See the changelog here:
|
||||
https://hg.mozilla.org/projects/nss/log/tip/lib/ckfw/builtins/certdata.txt
|
||||
|
||||
updatecerts:
|
||||
Runs a perl script (MAca-bundle.pl) on the downloaded certdata.txt
|
||||
to generate the individual certificate files (.pem) and store them
|
||||
in the trusted/ directory.
|
7
secure/caroot/blacklisted/Makefile
Normal file
7
secure/caroot/blacklisted/Makefile
Normal file
@ -0,0 +1,7 @@
|
||||
# $FreeBSD$
|
||||
|
||||
BINDIR= /usr/share/certs/blacklisted
|
||||
|
||||
FILES=
|
||||
|
||||
.include <bsd.prog.mk>
|
164
secure/caroot/trusted/ACCVRAIZ1.pem
Normal file
164
secure/caroot/trusted/ACCVRAIZ1.pem
Normal file
@ -0,0 +1,164 @@
|
||||
##
|
||||
## ACCVRAIZ1
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6828503384748696800 (0x5ec3b7a6437fa4e0)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: CN = ACCVRAIZ1, OU = PKIACCV, O = ACCV, C = ES
|
||||
Validity
|
||||
Not Before: May 5 09:37:37 2011 GMT
|
||||
Not After : Dec 31 09:37:37 2030 GMT
|
||||
Subject: CN = ACCVRAIZ1, OU = PKIACCV, O = ACCV, C = ES
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:9b:a9:ab:bf:61:4a:97:af:2f:97:66:9a:74:5f:
|
||||
d0:d9:96:fd:cf:e2:e4:66:ef:1f:1f:47:33:c2:44:
|
||||
a3:df:9a:de:1f:b5:54:dd:15:7c:69:35:11:6f:bb:
|
||||
c8:0c:8e:6a:18:1e:d8:8f:d9:16:bc:10:48:36:5c:
|
||||
f0:63:b3:90:5a:5c:24:37:d7:a3:d6:cb:09:71:b9:
|
||||
f1:01:72:84:b0:7d:db:4d:80:cd:fc:d3:6f:c9:f8:
|
||||
da:b6:0e:82:d2:45:85:a8:1b:68:a8:3d:e8:f4:44:
|
||||
6c:bd:a1:c2:cb:03:be:8c:3e:13:00:84:df:4a:48:
|
||||
c0:e3:22:0a:e8:e9:37:a7:18:4c:b1:09:0d:23:56:
|
||||
7f:04:4d:d9:17:84:18:a5:c8:da:40:94:73:eb:ce:
|
||||
0e:57:3c:03:81:3a:9d:0a:a1:57:43:69:ac:57:6d:
|
||||
79:90:78:e5:b5:b4:3b:d8:bc:4c:8d:28:a1:a7:a3:
|
||||
a7:ba:02:4e:25:d1:2a:ae:ed:ae:03:22:b8:6b:20:
|
||||
0f:30:28:54:95:7f:e0:ee:ce:0a:66:9d:d1:40:2d:
|
||||
6e:22:af:9d:1a:c1:05:19:d2:6f:c0:f2:9f:f8:7b:
|
||||
b3:02:42:fb:50:a9:1d:2d:93:0f:23:ab:c6:c1:0f:
|
||||
92:ff:d0:a2:15:f5:53:09:71:1c:ff:45:13:84:e6:
|
||||
26:5e:f8:e0:88:1c:0a:fc:16:b6:a8:73:06:b8:f0:
|
||||
63:84:02:a0:c6:5a:ec:e7:74:df:70:ae:a3:83:25:
|
||||
ea:d6:c7:97:87:93:a7:c6:8a:8a:33:97:60:37:10:
|
||||
3e:97:3e:6e:29:15:d6:a1:0f:d1:88:2c:12:9f:6f:
|
||||
aa:a4:c6:42:eb:41:a2:e3:95:43:d3:01:85:6d:8e:
|
||||
bb:3b:f3:23:36:c7:fe:3b:e0:a1:25:07:48:ab:c9:
|
||||
89:74:ff:08:8f:80:bf:c0:96:65:f3:ee:ec:4b:68:
|
||||
bd:9d:88:c3:31:b3:40:f1:e8:cf:f6:38:bb:9c:e4:
|
||||
d1:7f:d4:e5:58:9b:7c:fa:d4:f3:0e:9b:75:91:e4:
|
||||
ba:52:2e:19:7e:d1:f5:cd:5a:19:fc:ba:06:f6:fb:
|
||||
52:a8:4b:99:04:dd:f8:f9:b4:8b:50:a3:4e:62:89:
|
||||
f0:87:24:fa:83:42:c1:87:fa:d5:2d:29:2a:5a:71:
|
||||
7a:64:6a:d7:27:60:63:0d:db:ce:49:f5:8d:1f:90:
|
||||
89:32:17:f8:73:43:b8:d2:5a:93:86:61:d6:e1:75:
|
||||
0a:ea:79:66:76:88:4f:71:eb:04:25:d6:0a:5a:7a:
|
||||
93:e5:b9:4b:17:40:0f:b1:b6:b9:f5:de:4f:dc:e0:
|
||||
b3:ac:3b:11:70:60:84:4a:43:6e:99:20:c0:29:71:
|
||||
0a:c0:65
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt
|
||||
OCSP - URI:http://ocsp.accv.es
|
||||
|
||||
X509v3 Subject Key Identifier:
|
||||
D2:87:B4:E3:DF:37:27:93:55:F6:56:EA:81:E5:36:CC:8C:1E:3F:BD
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:D2:87:B4:E3:DF:37:27:93:55:F6:56:EA:81:E5:36:CC:8C:1E:3F:BD
|
||||
|
||||
X509v3 Certificate Policies:
|
||||
Policy: X509v3 Any Policy
|
||||
User Notice:
|
||||
Explicit Text:
|
||||
CPS: http://www.accv.es/legislacion_c.htm
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
|
||||
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Alternative Name:
|
||||
email:accv@accv.es
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
97:31:02:9f:e7:fd:43:67:48:44:14:e4:29:87:ed:4c:28:66:
|
||||
d0:8f:35:da:4d:61:b7:4a:97:4d:b5:db:90:e0:05:2e:0e:c6:
|
||||
79:d0:f2:97:69:0f:bd:04:47:d9:be:db:b5:29:da:9b:d9:ae:
|
||||
a9:99:d5:d3:3c:30:93:f5:8d:a1:a8:fc:06:8d:44:f4:ca:16:
|
||||
95:7c:33:dc:62:8b:a8:37:f8:27:d8:09:2d:1b:ef:c8:14:27:
|
||||
20:a9:64:44:ff:2e:d6:75:aa:6c:4d:60:40:19:49:43:54:63:
|
||||
da:e2:cc:ba:66:e5:4f:44:7a:5b:d9:6a:81:2b:40:d5:7f:f9:
|
||||
01:27:58:2c:c8:ed:48:91:7c:3f:a6:00:cf:c4:29:73:11:36:
|
||||
de:86:19:3e:9d:ee:19:8a:1b:d5:b0:ed:8e:3d:9c:2a:c0:0d:
|
||||
d8:3d:66:e3:3c:0d:bd:d5:94:5c:e2:e2:a7:35:1b:04:00:f6:
|
||||
3f:5a:8d:ea:43:bd:5f:89:1d:a9:c1:b0:cc:99:e2:4d:00:0a:
|
||||
da:c9:27:5b:e7:13:90:5c:e4:f5:33:a2:55:6d:dc:e0:09:4d:
|
||||
2f:b1:26:5b:27:75:00:09:c4:62:77:29:08:5f:9e:59:ac:b6:
|
||||
7e:ad:9f:54:30:22:03:c1:1e:71:64:fe:f9:38:0a:96:18:dd:
|
||||
02:14:ac:23:cb:06:1c:1e:a4:7d:8d:0d:de:27:41:e8:ad:da:
|
||||
15:b7:b0:23:dd:2b:a8:d3:da:25:87:ed:e8:55:44:4d:88:f4:
|
||||
36:7e:84:9a:78:ac:f7:0e:56:49:0e:d6:33:25:d6:84:50:42:
|
||||
6c:20:12:1d:2a:d5:be:bc:f2:70:81:a4:70:60:be:05:b5:9b:
|
||||
9e:04:44:be:61:23:ac:e9:a5:24:8c:11:80:94:5a:a2:a2:b9:
|
||||
49:d2:c1:dc:d1:a7:ed:31:11:2c:9e:19:a6:ee:e1:55:e1:c0:
|
||||
ea:cf:0d:84:e4:17:b7:a2:7c:a5:de:55:25:06:ee:cc:c0:87:
|
||||
5c:40:da:cc:95:3f:55:e0:35:c7:b8:84:be:b4:5d:cd:7a:83:
|
||||
01:72:ee:87:e6:5f:1d:ae:b5:85:c6:26:df:e6:c1:9a:e9:1e:
|
||||
02:47:9f:2a:a8:6d:a9:5b:cf:ec:45:77:7f:98:27:9a:32:5d:
|
||||
2a:e3:84:ee:c5:98:66:2f:96:20:1d:dd:d8:c3:27:d7:b0:f9:
|
||||
fe:d9:7d:cd:d0:9f:8f:0b:14:58:51:9f:2f:8b:c3:38:2d:de:
|
||||
e8:8f:d6:8d:87:a4:f5:56:43:16:99:2c:f4:a4:56:b4:34:b8:
|
||||
61:37:c9:c2:58:80:1b:a0:97:a1:fc:59:8d:e9:11:f6:d1:0f:
|
||||
4b:55:34:46:2a:8b:86:3b
|
||||
SHA1 Fingerprint=93:05:7A:88:15:C6:4F:CE:88:2F:FA:91:16:52:28:78:BC:53:64:17
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE
|
||||
AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw
|
||||
CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ
|
||||
BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND
|
||||
VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb
|
||||
qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY
|
||||
HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo
|
||||
G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA
|
||||
lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr
|
||||
IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/
|
||||
0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH
|
||||
k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47
|
||||
4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO
|
||||
m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa
|
||||
cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl
|
||||
uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI
|
||||
KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls
|
||||
ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG
|
||||
AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2
|
||||
VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT
|
||||
VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG
|
||||
CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA
|
||||
cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA
|
||||
QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA
|
||||
7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA
|
||||
cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA
|
||||
QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA
|
||||
czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu
|
||||
aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt
|
||||
aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud
|
||||
DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF
|
||||
BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp
|
||||
D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU
|
||||
JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m
|
||||
AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD
|
||||
vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms
|
||||
tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH
|
||||
7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h
|
||||
I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA
|
||||
h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF
|
||||
d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H
|
||||
pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7
|
||||
-----END CERTIFICATE-----
|
137
secure/caroot/trusted/AC_RAIZ_FNMT-RCM.pem
Normal file
137
secure/caroot/trusted/AC_RAIZ_FNMT-RCM.pem
Normal file
@ -0,0 +1,137 @@
|
||||
##
|
||||
## AC RAIZ FNMT-RCM
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
5d:93:8d:30:67:36:c8:06:1d:1a:c7:54:84:69:07
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = ES, O = FNMT-RCM, OU = AC RAIZ FNMT-RCM
|
||||
Validity
|
||||
Not Before: Oct 29 15:59:56 2008 GMT
|
||||
Not After : Jan 1 00:00:00 2030 GMT
|
||||
Subject: C = ES, O = FNMT-RCM, OU = AC RAIZ FNMT-RCM
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:ba:71:80:7a:4c:86:6e:7f:c8:13:6d:c0:c6:7d:
|
||||
1c:00:97:8f:2c:0c:23:bb:10:9a:40:a9:1a:b7:87:
|
||||
88:f8:9b:56:6a:fb:e6:7b:8e:8b:92:8e:a7:25:5d:
|
||||
59:11:db:36:2e:b7:51:17:1f:a9:08:1f:04:17:24:
|
||||
58:aa:37:4a:18:df:e5:39:d4:57:fd:d7:c1:2c:91:
|
||||
01:91:e2:22:d4:03:c0:58:fc:77:47:ec:8f:3e:74:
|
||||
43:ba:ac:34:8d:4d:38:76:67:8e:b0:c8:6f:30:33:
|
||||
58:71:5c:b4:f5:6b:6e:d4:01:50:b8:13:7e:6c:4a:
|
||||
a3:49:d1:20:19:ee:bc:c0:29:18:65:a7:de:fe:ef:
|
||||
dd:0a:90:21:e7:1a:67:92:42:10:98:5f:4f:30:bc:
|
||||
3e:1c:45:b4:10:d7:68:40:14:c0:40:fa:e7:77:17:
|
||||
7a:e6:0b:8f:65:5b:3c:d9:9a:52:db:b5:bd:9e:46:
|
||||
cf:3d:eb:91:05:02:c0:96:b2:76:4c:4d:10:96:3b:
|
||||
92:fa:9c:7f:0f:99:df:be:23:35:45:1e:02:5c:fe:
|
||||
b5:a8:9b:99:25:da:5e:f3:22:c3:39:f5:e4:2a:2e:
|
||||
d3:c6:1f:c4:6c:aa:c5:1c:6a:01:05:4a:2f:d2:c5:
|
||||
c1:a8:34:26:5d:66:a5:d2:02:21:f9:18:b7:06:f5:
|
||||
4e:99:6f:a8:ab:4c:51:e8:cf:50:18:c5:77:c8:39:
|
||||
09:2c:49:92:32:99:a8:bb:17:17:79:b0:5a:c5:e6:
|
||||
a3:c4:59:65:47:35:83:5e:a9:e8:35:0b:99:bb:e4:
|
||||
cd:20:c6:9b:4a:06:39:b5:68:fc:22:ba:ee:55:8c:
|
||||
2b:4e:ea:f3:b1:e3:fc:b6:99:9a:d5:42:fa:71:4d:
|
||||
08:cf:87:1e:6a:71:7d:f9:d3:b4:e9:a5:71:81:7b:
|
||||
c2:4e:47:96:a5:f6:76:85:a3:28:8f:e9:80:6e:81:
|
||||
53:a5:6d:5f:b8:48:f9:c2:f9:36:a6:2e:49:ff:b8:
|
||||
96:c2:8c:07:b3:9b:88:58:fc:eb:1b:1c:de:2d:70:
|
||||
e2:97:92:30:a1:89:e3:bc:55:a8:27:d6:4b:ed:90:
|
||||
ad:8b:fa:63:25:59:2d:a8:35:dd:ca:97:33:bc:e5:
|
||||
cd:c7:9d:d1:ec:ef:5e:0e:4a:90:06:26:63:ad:b9:
|
||||
d9:35:2d:07:ba:76:65:2c:ac:57:8f:7d:f4:07:94:
|
||||
d7:81:02:96:5d:a3:07:49:d5:7a:d0:57:f9:1b:e7:
|
||||
53:46:75:aa:b0:79:42:cb:68:71:08:e9:60:bd:39:
|
||||
69:ce:f4:af:c3:56:40:c7:ad:52:a2:09:e4:6f:86:
|
||||
47:8a:1f:eb:28:27:5d:83:20:af:04:c9:6c:56:9a:
|
||||
8b:46:f5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
F7:7D:C5:FD:C4:E8:9A:1B:77:64:A7:F5:1D:A0:CC:BF:87:60:9A:6D
|
||||
X509v3 Certificate Policies:
|
||||
Policy: X509v3 Any Policy
|
||||
CPS: http://www.cert.fnmt.es/dpcs/
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
07:90:4a:df:f3:23:4e:f0:c3:9c:51:65:9b:9c:22:a2:8a:0c:
|
||||
85:f3:73:29:6b:4d:fe:01:e2:a9:0c:63:01:bf:04:67:a5:9d:
|
||||
98:5f:fd:01:13:fa:ec:9a:62:e9:86:fe:b6:62:d2:6e:4c:94:
|
||||
fb:c0:75:45:7c:65:0c:f8:b2:37:cf:ac:0f:cf:8d:6f:f9:19:
|
||||
f7:8f:ec:1e:f2:70:9e:f0:ca:b8:ef:b7:ff:76:37:76:5b:f6:
|
||||
6e:88:f3:af:62:32:22:93:0d:3a:6a:8e:14:66:0c:2d:53:74:
|
||||
57:65:1e:d5:b2:dd:23:81:3b:a5:66:23:27:67:09:8f:e1:77:
|
||||
aa:43:cd:65:51:08:ed:51:58:fe:e6:39:f9:cb:47:84:a4:15:
|
||||
f1:76:bb:a4:ee:a4:3b:c4:5f:ef:b2:33:96:11:18:b7:c9:65:
|
||||
be:18:e1:a3:a4:dc:fa:18:f9:d3:bc:13:9b:39:7a:34:ba:d3:
|
||||
41:fb:fa:32:8a:2a:b7:2b:86:0b:69:83:38:be:cd:8a:2e:0b:
|
||||
70:ad:8d:26:92:ee:1e:f5:01:2b:0a:d9:d6:97:9b:6e:e0:a8:
|
||||
19:1c:3a:21:8b:0c:1e:40:ad:03:e7:dd:66:7e:f5:b9:20:0d:
|
||||
03:e8:96:f9:82:45:d4:39:e0:a0:00:5d:d7:98:e6:7d:9e:67:
|
||||
73:c3:9a:2a:f7:ab:8b:a1:3a:14:ef:34:bc:52:0e:89:98:9a:
|
||||
04:40:84:1d:7e:45:69:93:57:ce:eb:ce:f8:50:7c:4f:1c:6e:
|
||||
04:43:9b:f9:d6:3b:23:18:e9:ea:8e:d1:4d:46:8d:f1:3b:e4:
|
||||
6a:ca:ba:fb:23:b7:9b:fa:99:01:29:5a:58:5a:2d:e3:f9:d4:
|
||||
6d:0e:26:ad:c1:6e:34:bc:32:f8:0c:05:fa:65:a3:db:3b:37:
|
||||
83:22:e9:d6:dc:72:33:fd:5d:f2:20:bd:76:3c:23:da:28:f7:
|
||||
f9:1b:eb:59:64:d5:dc:5f:72:7e:20:fc:cd:89:b5:90:67:4d:
|
||||
62:7a:3f:4e:ad:1d:c3:39:fe:7a:f4:28:16:df:41:f6:48:80:
|
||||
05:d7:0f:51:79:ac:10:ab:d4:ec:03:66:e6:6a:b0:ba:31:92:
|
||||
42:40:6a:be:3a:d3:72:e1:6a:37:55:bc:ac:1d:95:b7:69:61:
|
||||
f2:43:91:74:e6:a0:d3:0a:24:46:a1:08:af:d6:da:45:19:96:
|
||||
d4:53:1d:5b:84:79:f0:c0:f7:47:ef:8b:8f:c5:06:ae:9d:4c:
|
||||
62:9d:ff:46:04:f8:d3:c9:b6:10:25:40:75:fe:16:aa:c9:4a:
|
||||
60:86:2f:ba:ef:30:77:e4:54:e2:b8:84:99:58:80:aa:13:8b:
|
||||
51:3a:4f:48:f6:8b:b6:b3
|
||||
SHA1 Fingerprint=EC:50:35:07:B2:15:C4:95:62:19:E2:A8:9A:5B:42:99:2C:4C:2C:20
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx
|
||||
CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ
|
||||
WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ
|
||||
BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG
|
||||
Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/
|
||||
yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf
|
||||
BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz
|
||||
WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF
|
||||
tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z
|
||||
374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC
|
||||
IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL
|
||||
mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7
|
||||
wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS
|
||||
MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2
|
||||
ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet
|
||||
UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw
|
||||
AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H
|
||||
YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3
|
||||
LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD
|
||||
nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1
|
||||
RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM
|
||||
LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf
|
||||
77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N
|
||||
JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm
|
||||
fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp
|
||||
6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp
|
||||
1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B
|
||||
9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok
|
||||
RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv
|
||||
uu8wd+RU4riEmViAqhOLUTpPSPaLtrM=
|
||||
-----END CERTIFICATE-----
|
136
secure/caroot/trusted/Actalis_Authentication_Root_CA.pem
Normal file
136
secure/caroot/trusted/Actalis_Authentication_Root_CA.pem
Normal file
@ -0,0 +1,136 @@
|
||||
##
|
||||
## Actalis Authentication Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6271844772424770508 (0x570a119742c4e3cc)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = IT, L = Milan, O = Actalis S.p.A./03358520967, CN = Actalis Authentication Root CA
|
||||
Validity
|
||||
Not Before: Sep 22 11:22:02 2011 GMT
|
||||
Not After : Sep 22 11:22:02 2030 GMT
|
||||
Subject: C = IT, L = Milan, O = Actalis S.p.A./03358520967, CN = Actalis Authentication Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:a7:c6:c4:a5:29:a4:2c:ef:e5:18:c5:b0:50:a3:
|
||||
6f:51:3b:9f:0a:5a:c9:c2:48:38:0a:c2:1c:a0:18:
|
||||
7f:91:b5:87:b9:40:3f:dd:1d:68:1f:08:83:d5:2d:
|
||||
1e:88:a0:f8:8f:56:8f:6d:99:02:92:90:16:d5:5f:
|
||||
08:6c:89:d7:e1:ac:bc:20:c2:b1:e0:83:51:8a:69:
|
||||
4d:00:96:5a:6f:2f:c0:44:7e:a3:0e:e4:91:cd:58:
|
||||
ee:dc:fb:c7:1e:45:47:dd:27:b9:08:01:9f:a6:21:
|
||||
1d:f5:41:2d:2f:4c:fd:28:ad:e0:8a:ad:22:b4:56:
|
||||
65:8e:86:54:8f:93:43:29:de:39:46:78:a3:30:23:
|
||||
ba:cd:f0:7d:13:57:c0:5d:d2:83:6b:48:4c:c4:ab:
|
||||
9f:80:5a:5b:3a:bd:c9:a7:22:3f:80:27:33:5b:0e:
|
||||
b7:8a:0c:5d:07:37:08:cb:6c:d2:7a:47:22:44:35:
|
||||
c5:cc:cc:2e:8e:dd:2a:ed:b7:7d:66:0d:5f:61:51:
|
||||
22:55:1b:e3:46:e3:e3:3d:d0:35:62:9a:db:af:14:
|
||||
c8:5b:a1:cc:89:1b:e1:30:26:fc:a0:9b:1f:81:a7:
|
||||
47:1f:04:eb:a3:39:92:06:9f:99:d3:bf:d3:ea:4f:
|
||||
50:9c:19:fe:96:87:1e:3c:65:f6:a3:18:24:83:86:
|
||||
10:e7:54:3e:a8:3a:76:24:4f:81:21:c5:e3:0f:02:
|
||||
f8:93:94:47:20:bb:fe:d4:0e:d3:68:b9:dd:c4:7a:
|
||||
84:82:e3:53:54:79:dd:db:9c:d2:f2:07:9b:2e:b6:
|
||||
bc:3e:ed:85:6d:ef:25:11:f2:97:1a:42:61:f7:4a:
|
||||
97:e8:8b:b1:10:07:fa:65:81:b2:a2:39:cf:f7:3c:
|
||||
ff:18:fb:c6:f1:5a:8b:59:e2:02:ac:7b:92:d0:4e:
|
||||
14:4f:59:45:f6:0c:5e:28:5f:b0:e8:3f:45:cf:cf:
|
||||
af:9b:6f:fb:84:d3:77:5a:95:6f:ac:94:84:9e:ee:
|
||||
bc:c0:4a:8f:4a:93:f8:44:21:e2:31:45:61:50:4e:
|
||||
10:d8:e3:35:7c:4c:19:b4:de:05:bf:a3:06:9f:c8:
|
||||
b5:cd:e4:1f:d7:17:06:0d:7a:95:74:55:0d:68:1a:
|
||||
fc:10:1b:62:64:9d:6d:e0:95:a0:c3:94:07:57:0d:
|
||||
14:e6:bd:05:fb:b8:9f:e6:df:8b:e2:c6:e7:7e:96:
|
||||
f6:53:c5:80:34:50:28:58:f0:12:50:71:17:30:ba:
|
||||
e6:78:63:bc:f4:b2:ad:9b:2b:b2:fe:e1:39:8c:5e:
|
||||
ba:0b:20:94:de:7b:83:b8:ff:e3:56:8d:b7:11:e9:
|
||||
3b:8c:f2:b1:c1:5d:9d:a4:0b:4c:2b:d9:b2:18:f5:
|
||||
b5:9f:4b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
52:D8:88:3A:C8:9F:78:66:ED:89:F3:7B:38:70:94:C9:02:02:36:D0
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:52:D8:88:3A:C8:9F:78:66:ED:89:F3:7B:38:70:94:C9:02:02:36:D0
|
||||
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
0b:7b:72:87:c0:60:a6:49:4c:88:58:e6:1d:88:f7:14:64:48:
|
||||
a6:d8:58:0a:0e:4f:13:35:df:35:1d:d4:ed:06:31:c8:81:3e:
|
||||
6a:d5:dd:3b:1a:32:ee:90:3d:11:d2:2e:f4:8e:c3:63:2e:23:
|
||||
66:b0:67:be:6f:b6:c0:13:39:60:aa:a2:34:25:93:75:52:de:
|
||||
a7:9d:ad:0e:87:89:52:71:6a:16:3c:19:1d:83:f8:9a:29:65:
|
||||
be:f4:3f:9a:d9:f0:f3:5a:87:21:71:80:4d:cb:e0:38:9b:3f:
|
||||
bb:fa:e0:30:4d:cf:86:d3:65:10:19:18:d1:97:02:b1:2b:72:
|
||||
42:68:ac:a0:bd:4e:5a:da:18:bf:6b:98:81:d0:fd:9a:be:5e:
|
||||
15:48:cd:11:15:b9:c0:29:5c:b4:e8:88:f7:3e:36:ae:b7:62:
|
||||
fd:1e:62:de:70:78:10:1c:48:5b:da:bc:a4:38:ba:67:ed:55:
|
||||
3e:5e:57:df:d4:03:40:4c:81:a4:d2:4f:63:a7:09:42:09:14:
|
||||
fc:00:a9:c2:80:73:4f:2e:c0:40:d9:11:7b:48:ea:7a:02:c0:
|
||||
d3:eb:28:01:26:58:74:c1:c0:73:22:6d:93:95:fd:39:7d:bb:
|
||||
2a:e3:f6:82:e3:2c:97:5f:4e:1f:91:94:fa:fe:2c:a3:d8:76:
|
||||
1a:b8:4d:b2:38:4f:9b:fa:1d:48:60:79:26:e2:f3:fd:a9:d0:
|
||||
9a:e8:70:8f:49:7a:d6:e5:bd:0a:0e:db:2d:f3:8d:bf:eb:e3:
|
||||
a4:7d:cb:c7:95:71:e8:da:a3:7c:c5:c2:f8:74:92:04:1b:86:
|
||||
ac:a4:22:53:40:b6:ac:fe:4c:76:cf:fb:94:32:c0:35:9f:76:
|
||||
3f:6e:e5:90:6e:a0:a6:26:a2:b8:2c:be:d1:2b:85:fd:a7:68:
|
||||
c8:ba:01:2b:b1:6c:74:1d:b8:73:95:e7:ee:b7:c7:25:f0:00:
|
||||
4c:00:b2:7e:b6:0b:8b:1c:f3:c0:50:9e:25:b9:e0:08:de:36:
|
||||
66:ff:37:a5:d1:bb:54:64:2c:c9:27:b5:4b:92:7e:65:ff:d3:
|
||||
2d:e1:b9:4e:bc:7f:a4:41:21:90:41:77:a6:39:1f:ea:9e:e3:
|
||||
9f:d0:66:6f:05:ec:aa:76:7e:bf:6b:16:a0:eb:b5:c7:fc:92:
|
||||
54:2f:2b:11:27:25:37:78:4c:51:6a:b0:f3:cc:58:5d:14:f1:
|
||||
6a:48:15:ff:c2:07:b6:b1:8d:0f:8e:5c:50:46:b3:3d:bf:01:
|
||||
98:4f:b2:59:54:47:3e:34:7b:78:6d:56:93:2e:73:ea:66:28:
|
||||
78:cd:1d:14:bf:a0:8f:2f:2e:b8:2e:8e:f2:14:8a:cc:e9:b5:
|
||||
7c:fb:6c:9d:0c:a5:e1:96
|
||||
SHA1 Fingerprint=F3:73:B3:87:06:5A:28:84:8A:F2:F3:4A:CE:19:2B:DD:C7:8E:9C:AC
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE
|
||||
BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w
|
||||
MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290
|
||||
IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC
|
||||
SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1
|
||||
ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB
|
||||
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv
|
||||
UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX
|
||||
4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9
|
||||
KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/
|
||||
gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb
|
||||
rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ
|
||||
51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F
|
||||
be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe
|
||||
KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F
|
||||
v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn
|
||||
fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7
|
||||
jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz
|
||||
ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt
|
||||
ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL
|
||||
e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70
|
||||
jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz
|
||||
WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V
|
||||
SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j
|
||||
pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX
|
||||
X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok
|
||||
fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R
|
||||
K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU
|
||||
ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU
|
||||
LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT
|
||||
LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg==
|
||||
-----END CERTIFICATE-----
|
99
secure/caroot/trusted/AddTrust_External_Root.pem
Normal file
99
secure/caroot/trusted/AddTrust_External_Root.pem
Normal file
@ -0,0 +1,99 @@
|
||||
##
|
||||
## AddTrust External Root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
|
||||
Validity
|
||||
Not Before: May 30 10:48:38 2000 GMT
|
||||
Not After : May 30 10:48:38 2020 GMT
|
||||
Subject: C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b7:f7:1a:33:e6:f2:00:04:2d:39:e0:4e:5b:ed:
|
||||
1f:bc:6c:0f:cd:b5:fa:23:b6:ce:de:9b:11:33:97:
|
||||
a4:29:4c:7d:93:9f:bd:4a:bc:93:ed:03:1a:e3:8f:
|
||||
cf:e5:6d:50:5a:d6:97:29:94:5a:80:b0:49:7a:db:
|
||||
2e:95:fd:b8:ca:bf:37:38:2d:1e:3e:91:41:ad:70:
|
||||
56:c7:f0:4f:3f:e8:32:9e:74:ca:c8:90:54:e9:c6:
|
||||
5f:0f:78:9d:9a:40:3c:0e:ac:61:aa:5e:14:8f:9e:
|
||||
87:a1:6a:50:dc:d7:9a:4e:af:05:b3:a6:71:94:9c:
|
||||
71:b3:50:60:0a:c7:13:9d:38:07:86:02:a8:e9:a8:
|
||||
69:26:18:90:ab:4c:b0:4f:23:ab:3a:4f:84:d8:df:
|
||||
ce:9f:e1:69:6f:bb:d7:42:d7:6b:44:e4:c7:ad:ee:
|
||||
6d:41:5f:72:5a:71:08:37:b3:79:65:a4:59:a0:94:
|
||||
37:f7:00:2f:0d:c2:92:72:da:d0:38:72:db:14:a8:
|
||||
45:c4:5d:2a:7d:b7:b4:d6:c4:ee:ac:cd:13:44:b7:
|
||||
c9:2b:dd:43:00:25:fa:61:b9:69:6a:58:23:11:b7:
|
||||
a7:33:8f:56:75:59:f5:cd:29:d7:46:b7:0a:2b:65:
|
||||
b6:d3:42:6f:15:b2:b8:7b:fb:ef:e9:5d:53:d5:34:
|
||||
5a:27
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
AD:BD:98:7A:34:B4:26:F7:FA:C4:26:54:EF:03:BD:E0:24:CB:54:1A
|
||||
X509v3 Key Usage:
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:AD:BD:98:7A:34:B4:26:F7:FA:C4:26:54:EF:03:BD:E0:24:CB:54:1A
|
||||
DirName:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
|
||||
serial:01
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
b0:9b:e0:85:25:c2:d6:23:e2:0f:96:06:92:9d:41:98:9c:d9:
|
||||
84:79:81:d9:1e:5b:14:07:23:36:65:8f:b0:d8:77:bb:ac:41:
|
||||
6c:47:60:83:51:b0:f9:32:3d:e7:fc:f6:26:13:c7:80:16:a5:
|
||||
bf:5a:fc:87:cf:78:79:89:21:9a:e2:4c:07:0a:86:35:bc:f2:
|
||||
de:51:c4:d2:96:b7:dc:7e:4e:ee:70:fd:1c:39:eb:0c:02:51:
|
||||
14:2d:8e:bd:16:e0:c1:df:46:75:e7:24:ad:ec:f4:42:b4:85:
|
||||
93:70:10:67:ba:9d:06:35:4a:18:d3:2b:7a:cc:51:42:a1:7a:
|
||||
63:d1:e6:bb:a1:c5:2b:c2:36:be:13:0d:e6:bd:63:7e:79:7b:
|
||||
a7:09:0d:40:ab:6a:dd:8f:8a:c3:f6:f6:8c:1a:42:05:51:d4:
|
||||
45:f5:9f:a7:62:21:68:15:20:43:3c:99:e7:7c:bd:24:d8:a9:
|
||||
91:17:73:88:3f:56:1b:31:38:18:b4:71:0f:9a:cd:c8:0e:9e:
|
||||
8e:2e:1b:e1:8c:98:83:cb:1f:31:f1:44:4c:c6:04:73:49:76:
|
||||
60:0f:c7:f8:bd:17:80:6b:2e:e9:cc:4c:0e:5a:9a:79:0f:20:
|
||||
0a:2e:d5:9e:63:26:1e:55:92:94:d8:82:17:5a:7b:d0:bc:c7:
|
||||
8f:4e:86:04
|
||||
SHA1 Fingerprint=02:FA:F3:E2:91:43:54:68:60:78:57:69:4D:F5:E4:5B:68:85:18:68
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU
|
||||
MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs
|
||||
IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290
|
||||
MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux
|
||||
FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h
|
||||
bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v
|
||||
dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt
|
||||
H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9
|
||||
uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX
|
||||
mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX
|
||||
a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN
|
||||
E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0
|
||||
WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD
|
||||
VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0
|
||||
Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU
|
||||
cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx
|
||||
IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN
|
||||
AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH
|
||||
YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5
|
||||
6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC
|
||||
Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX
|
||||
c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a
|
||||
mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ=
|
||||
-----END CERTIFICATE-----
|
98
secure/caroot/trusted/AddTrust_Low-Value_Services_Root.pem
Normal file
98
secure/caroot/trusted/AddTrust_Low-Value_Services_Root.pem
Normal file
@ -0,0 +1,98 @@
|
||||
##
|
||||
## AddTrust Low-Value Services Root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = SE, O = AddTrust AB, OU = AddTrust TTP Network, CN = AddTrust Class 1 CA Root
|
||||
Validity
|
||||
Not Before: May 30 10:38:31 2000 GMT
|
||||
Not After : May 30 10:38:31 2020 GMT
|
||||
Subject: C = SE, O = AddTrust AB, OU = AddTrust TTP Network, CN = AddTrust Class 1 CA Root
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:96:96:d4:21:49:60:e2:6b:e8:41:07:0c:de:c4:
|
||||
e0:dc:13:23:cd:c1:35:c7:fb:d6:4e:11:0a:67:5e:
|
||||
f5:06:5b:6b:a5:08:3b:5b:29:16:3a:e7:87:b2:34:
|
||||
06:c5:bc:05:a5:03:7c:82:cb:29:10:ae:e1:88:81:
|
||||
bd:d6:9e:d3:fe:2d:56:c1:15:ce:e3:26:9d:15:2e:
|
||||
10:fb:06:8f:30:04:de:a7:b4:63:b4:ff:b1:9c:ae:
|
||||
3c:af:77:b6:56:c5:b5:ab:a2:e9:69:3a:3d:0e:33:
|
||||
79:32:3f:70:82:92:99:61:6d:8d:30:08:8f:71:3f:
|
||||
a6:48:57:19:f8:25:dc:4b:66:5c:a5:74:8f:98:ae:
|
||||
c8:f9:c0:06:22:e7:ac:73:df:a5:2e:fb:52:dc:b1:
|
||||
15:65:20:fa:35:66:69:de:df:2c:f1:6e:bc:30:db:
|
||||
2c:24:12:db:eb:35:35:68:90:cb:00:b0:97:21:3d:
|
||||
74:21:23:65:34:2b:bb:78:59:a3:d6:e1:76:39:9a:
|
||||
a4:49:8e:8c:74:af:6e:a4:9a:a3:d9:9b:d2:38:5c:
|
||||
9b:a2:18:cc:75:23:84:be:eb:e2:4d:33:71:8e:1a:
|
||||
f0:c2:f8:c7:1d:a2:ad:03:97:2c:f8:cf:25:c6:f6:
|
||||
b8:24:31:b1:63:5d:92:7f:63:f0:25:c9:53:2e:1f:
|
||||
bf:4d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
95:B1:B4:F0:94:B6:BD:C7:DA:D1:11:09:21:BE:C1:AF:49:FD:10:7B
|
||||
X509v3 Key Usage:
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:95:B1:B4:F0:94:B6:BD:C7:DA:D1:11:09:21:BE:C1:AF:49:FD:10:7B
|
||||
DirName:/C=SE/O=AddTrust AB/OU=AddTrust TTP Network/CN=AddTrust Class 1 CA Root
|
||||
serial:01
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
2c:6d:64:1b:1f:cd:0d:dd:b9:01:fa:96:63:34:32:48:47:99:
|
||||
ae:97:ed:fd:72:16:a6:73:47:5a:f4:eb:dd:e9:f5:d6:fb:45:
|
||||
cc:29:89:44:5d:bf:46:39:3d:e8:ee:bc:4d:54:86:1e:1d:6c:
|
||||
e3:17:27:43:e1:89:56:2b:a9:6f:72:4e:49:33:e3:72:7c:2a:
|
||||
23:9a:bc:3e:ff:28:2a:ed:a3:ff:1c:23:ba:43:57:09:67:4d:
|
||||
4b:62:06:2d:f8:ff:6c:9d:60:1e:d8:1c:4b:7d:b5:31:2f:d9:
|
||||
d0:7c:5d:f8:de:6b:83:18:78:37:57:2f:e8:33:07:67:df:1e:
|
||||
c7:6b:2a:95:76:ae:8f:57:a3:f0:f4:52:b4:a9:53:08:cf:e0:
|
||||
4f:d3:7a:53:8b:fd:bb:1c:56:36:f2:fe:b2:b6:e5:76:bb:d5:
|
||||
22:65:a7:3f:fe:d1:66:ad:0b:bc:6b:99:86:ef:3f:7d:f3:18:
|
||||
32:ca:7b:c6:e3:ab:64:46:95:f8:26:69:d9:55:83:7b:2c:96:
|
||||
07:ff:59:2c:44:a3:c6:e5:e9:a9:dc:a1:63:80:5a:21:5e:21:
|
||||
cf:53:54:f0:ba:6f:89:db:a8:aa:95:cf:8b:e3:71:cc:1e:1b:
|
||||
20:44:08:c0:7a:b6:40:fd:c4:e4:35:e1:1d:16:1c:d0:bc:2b:
|
||||
8e:d6:71:d9
|
||||
SHA1 Fingerprint=CC:AB:0E:A0:4C:23:01:D6:69:7B:DD:37:9F:CD:12:EB:24:E3:94:9D
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEGDCCAwCgAwIBAgIBATANBgkqhkiG9w0BAQUFADBlMQswCQYDVQQGEwJTRTEU
|
||||
MBIGA1UEChMLQWRkVHJ1c3QgQUIxHTAbBgNVBAsTFEFkZFRydXN0IFRUUCBOZXR3
|
||||
b3JrMSEwHwYDVQQDExhBZGRUcnVzdCBDbGFzcyAxIENBIFJvb3QwHhcNMDAwNTMw
|
||||
MTAzODMxWhcNMjAwNTMwMTAzODMxWjBlMQswCQYDVQQGEwJTRTEUMBIGA1UEChML
|
||||
QWRkVHJ1c3QgQUIxHTAbBgNVBAsTFEFkZFRydXN0IFRUUCBOZXR3b3JrMSEwHwYD
|
||||
VQQDExhBZGRUcnVzdCBDbGFzcyAxIENBIFJvb3QwggEiMA0GCSqGSIb3DQEBAQUA
|
||||
A4IBDwAwggEKAoIBAQCWltQhSWDia+hBBwzexODcEyPNwTXH+9ZOEQpnXvUGW2ul
|
||||
CDtbKRY654eyNAbFvAWlA3yCyykQruGIgb3WntP+LVbBFc7jJp0VLhD7Bo8wBN6n
|
||||
tGO0/7Gcrjyvd7ZWxbWroulpOj0OM3kyP3CCkplhbY0wCI9xP6ZIVxn4JdxLZlyl
|
||||
dI+Yrsj5wAYi56xz36Uu+1LcsRVlIPo1Zmne3yzxbrww2ywkEtvrNTVokMsAsJch
|
||||
PXQhI2U0K7t4WaPW4XY5mqRJjox0r26kmqPZm9I4XJuiGMx1I4S+6+JNM3GOGvDC
|
||||
+Mcdoq0Dlyz4zyXG9rgkMbFjXZJ/Y/AlyVMuH79NAgMBAAGjgdIwgc8wHQYDVR0O
|
||||
BBYEFJWxtPCUtr3H2tERCSG+wa9J/RB7MAsGA1UdDwQEAwIBBjAPBgNVHRMBAf8E
|
||||
BTADAQH/MIGPBgNVHSMEgYcwgYSAFJWxtPCUtr3H2tERCSG+wa9J/RB7oWmkZzBl
|
||||
MQswCQYDVQQGEwJTRTEUMBIGA1UEChMLQWRkVHJ1c3QgQUIxHTAbBgNVBAsTFEFk
|
||||
ZFRydXN0IFRUUCBOZXR3b3JrMSEwHwYDVQQDExhBZGRUcnVzdCBDbGFzcyAxIENB
|
||||
IFJvb3SCAQEwDQYJKoZIhvcNAQEFBQADggEBACxtZBsfzQ3duQH6lmM0MkhHma6X
|
||||
7f1yFqZzR1r0693p9db7RcwpiURdv0Y5PejuvE1Uhh4dbOMXJ0PhiVYrqW9yTkkz
|
||||
43J8KiOavD7/KCrto/8cI7pDVwlnTUtiBi34/2ydYB7YHEt9tTEv2dB8Xfjea4MY
|
||||
eDdXL+gzB2ffHsdrKpV2ro9Xo/D0UrSpUwjP4E/TelOL/bscVjby/rK25Xa71SJl
|
||||
pz/+0WatC7xrmYbvP33zGDLKe8bjq2RGlfgmadlVg3sslgf/WSxEo8bl6ancoWOA
|
||||
WiFeIc9TVPC6b4nbqKqVz4vjccweGyBECMB6tkD9xOQ14R0WHNC8K47Wcdk=
|
||||
-----END CERTIFICATE-----
|
89
secure/caroot/trusted/AffirmTrust_Commercial.pem
Normal file
89
secure/caroot/trusted/AffirmTrust_Commercial.pem
Normal file
@ -0,0 +1,89 @@
|
||||
##
|
||||
## AffirmTrust Commercial
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8608355977964138876 (0x7777062726a9b17c)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, O = AffirmTrust, CN = AffirmTrust Commercial
|
||||
Validity
|
||||
Not Before: Jan 29 14:06:06 2010 GMT
|
||||
Not After : Dec 31 14:06:06 2030 GMT
|
||||
Subject: C = US, O = AffirmTrust, CN = AffirmTrust Commercial
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:f6:1b:4f:67:07:2b:a1:15:f5:06:22:cb:1f:01:
|
||||
b2:e3:73:45:06:44:49:2c:bb:49:25:14:d6:ce:c3:
|
||||
b7:ab:2c:4f:c6:41:32:94:57:fa:12:a7:5b:0e:e2:
|
||||
8f:1f:1e:86:19:a7:aa:b5:2d:b9:5f:0d:8a:c2:af:
|
||||
85:35:79:32:2d:bb:1c:62:37:f2:b1:5b:4a:3d:ca:
|
||||
cd:71:5f:e9:42:be:94:e8:c8:de:f9:22:48:64:c6:
|
||||
e5:ab:c6:2b:6d:ad:05:f0:fa:d5:0b:cf:9a:e5:f0:
|
||||
50:a4:8b:3b:47:a5:23:5b:7a:7a:f8:33:3f:b8:ef:
|
||||
99:97:e3:20:c1:d6:28:89:cf:94:fb:b9:45:ed:e3:
|
||||
40:17:11:d4:74:f0:0b:31:e2:2b:26:6a:9b:4c:57:
|
||||
ae:ac:20:3e:ba:45:7a:05:f3:bd:9b:69:15:ae:7d:
|
||||
4e:20:63:c4:35:76:3a:07:02:c9:37:fd:c7:47:ee:
|
||||
e8:f1:76:1d:73:15:f2:97:a4:b5:c8:7a:79:d9:42:
|
||||
aa:2b:7f:5c:fe:ce:26:4f:a3:66:81:35:af:44:ba:
|
||||
54:1e:1c:30:32:65:9d:e6:3c:93:5e:50:4e:7a:e3:
|
||||
3a:d4:6e:cc:1a:fb:f9:d2:37:ae:24:2a:ab:57:03:
|
||||
22:28:0d:49:75:7f:b7:28:da:75:bf:8e:e3:dc:0e:
|
||||
79:31
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
9D:93:C6:53:8B:5E:CA:AF:3F:9F:1E:0F:E5:99:95:BC:24:F6:94:8F
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
58:ac:f4:04:0e:cd:c0:0d:ff:0a:fd:d4:ba:16:5f:29:bd:7b:
|
||||
68:99:58:49:d2:b4:1d:37:4d:7f:27:7d:46:06:5d:43:c6:86:
|
||||
2e:3e:73:b2:26:7d:4f:93:a9:b6:c4:2a:9a:ab:21:97:14:b1:
|
||||
de:8c:d3:ab:89:15:d8:6b:24:d4:f1:16:ae:d8:a4:5c:d4:7f:
|
||||
51:8e:ed:18:01:b1:93:63:bd:bc:f8:61:80:9a:9e:b1:ce:42:
|
||||
70:e2:a9:7d:06:25:7d:27:a1:fe:6f:ec:b3:1e:24:da:e3:4b:
|
||||
55:1a:00:3b:35:b4:3b:d9:d7:5d:30:fd:81:13:89:f2:c2:06:
|
||||
2b:ed:67:c4:8e:c9:43:b2:5c:6b:15:89:02:bc:62:fc:4e:f2:
|
||||
b5:33:aa:b2:6f:d3:0a:a2:50:e3:f6:3b:e8:2e:44:c2:db:66:
|
||||
38:a9:33:56:48:f1:6d:1b:33:8d:0d:8c:3f:60:37:9d:d3:ca:
|
||||
6d:7e:34:7e:0d:9f:72:76:8b:1b:9f:72:fd:52:35:41:45:02:
|
||||
96:2f:1c:b2:9a:73:49:21:b1:49:47:45:47:b4:ef:6a:34:11:
|
||||
c9:4d:9a:cc:59:b7:d6:02:9e:5a:4e:65:b5:94:ae:1b:df:29:
|
||||
b0:16:f1:bf:00:9e:07:3a:17:64:b5:04:b5:23:21:99:0a:95:
|
||||
3b:97:7c:ef
|
||||
SHA1 Fingerprint=F9:B5:B6:32:45:5F:9C:BE:EC:57:5F:80:DC:E9:6E:2C:C7:B2:78:B7
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE
|
||||
BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz
|
||||
dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL
|
||||
MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp
|
||||
cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
|
||||
AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP
|
||||
Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr
|
||||
ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL
|
||||
MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1
|
||||
yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr
|
||||
VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/
|
||||
nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ
|
||||
KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG
|
||||
XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj
|
||||
vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt
|
||||
Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g
|
||||
N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC
|
||||
nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8=
|
||||
-----END CERTIFICATE-----
|
89
secure/caroot/trusted/AffirmTrust_Networking.pem
Normal file
89
secure/caroot/trusted/AffirmTrust_Networking.pem
Normal file
@ -0,0 +1,89 @@
|
||||
##
|
||||
## AffirmTrust Networking
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8957382827206547757 (0x7c4f04391cd4992d)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = US, O = AffirmTrust, CN = AffirmTrust Networking
|
||||
Validity
|
||||
Not Before: Jan 29 14:08:24 2010 GMT
|
||||
Not After : Dec 31 14:08:24 2030 GMT
|
||||
Subject: C = US, O = AffirmTrust, CN = AffirmTrust Networking
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b4:84:cc:33:17:2e:6b:94:6c:6b:61:52:a0:eb:
|
||||
a3:cf:79:94:4c:e5:94:80:99:cb:55:64:44:65:8f:
|
||||
67:64:e2:06:e3:5c:37:49:f6:2f:9b:84:84:1e:2d:
|
||||
f2:60:9d:30:4e:cc:84:85:e2:2c:cf:1e:9e:fe:36:
|
||||
ab:33:77:35:44:d8:35:96:1a:3d:36:e8:7a:0e:d8:
|
||||
d5:47:a1:6a:69:8b:d9:fc:bb:3a:ae:79:5a:d5:f4:
|
||||
d6:71:bb:9a:90:23:6b:9a:b7:88:74:87:0c:1e:5f:
|
||||
b9:9e:2d:fa:ab:53:2b:dc:bb:76:3e:93:4c:08:08:
|
||||
8c:1e:a2:23:1c:d4:6a:ad:22:ba:99:01:2e:6d:65:
|
||||
cb:be:24:66:55:24:4b:40:44:b1:1b:d7:e1:c2:85:
|
||||
c0:de:10:3f:3d:ed:b8:fc:f1:f1:23:53:dc:bf:65:
|
||||
97:6f:d9:f9:40:71:8d:7d:bd:95:d4:ce:be:a0:5e:
|
||||
27:23:de:fd:a6:d0:26:0e:00:29:eb:3c:46:f0:3d:
|
||||
60:bf:3f:50:d2:dc:26:41:51:9e:14:37:42:04:a3:
|
||||
70:57:a8:1b:87:ed:2d:fa:7b:ee:8c:0a:e3:a9:66:
|
||||
89:19:cb:41:f9:dd:44:36:61:cf:e2:77:46:c8:7d:
|
||||
f6:f4:92:81:36:fd:db:34:f1:72:7e:f3:0c:16:bd:
|
||||
b4:15
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
07:1F:D2:E7:9C:DA:C2:6E:A2:40:B4:B0:7A:50:10:50:74:C4:C8:BD
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
89:57:b2:16:7a:a8:c2:fd:d6:d9:9b:9b:34:c2:9c:b4:32:14:
|
||||
4d:a7:a4:df:ec:be:a7:be:f8:43:db:91:37:ce:b4:32:2e:50:
|
||||
55:1a:35:4e:76:43:71:20:ef:93:77:4e:15:70:2e:87:c3:c1:
|
||||
1d:6d:dc:cb:b5:27:d4:2c:56:d1:52:53:3a:44:d2:73:c8:c4:
|
||||
1b:05:65:5a:62:92:9c:ee:41:8d:31:db:e7:34:ea:59:21:d5:
|
||||
01:7a:d7:64:b8:64:39:cd:c9:ed:af:ed:4b:03:48:a7:a0:99:
|
||||
01:80:dc:65:a3:36:ae:65:59:48:4f:82:4b:c8:65:f1:57:1d:
|
||||
e5:59:2e:0a:3f:6c:d8:d1:f5:e5:09:b4:6c:54:00:0a:e0:15:
|
||||
4d:87:75:6d:b7:58:96:5a:dd:6d:d2:00:a0:f4:9b:48:be:c3:
|
||||
37:a4:ba:36:e0:7c:87:85:97:1a:15:a2:de:2e:a2:5b:bd:af:
|
||||
18:f9:90:50:cd:70:59:f8:27:67:47:cb:c7:a0:07:3a:7d:d1:
|
||||
2c:5d:6c:19:3a:66:b5:7d:fd:91:6f:82:b1:be:08:93:db:14:
|
||||
47:f1:a2:37:c7:45:9e:3c:c7:77:af:64:a8:93:df:f6:69:83:
|
||||
82:60:f2:49:42:34:ed:5a:00:54:85:1c:16:36:92:0c:5c:fa:
|
||||
a6:ad:bf:db
|
||||
SHA1 Fingerprint=29:36:21:02:8B:20:ED:02:F5:66:C5:32:D1:D6:ED:90:9F:45:00:2F
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE
|
||||
BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz
|
||||
dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL
|
||||
MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp
|
||||
cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
|
||||
AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y
|
||||
YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua
|
||||
kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL
|
||||
QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp
|
||||
6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG
|
||||
yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i
|
||||
QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ
|
||||
KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO
|
||||
tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu
|
||||
QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ
|
||||
Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u
|
||||
olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48
|
||||
x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s=
|
||||
-----END CERTIFICATE-----
|
131
secure/caroot/trusted/AffirmTrust_Premium.pem
Normal file
131
secure/caroot/trusted/AffirmTrust_Premium.pem
Normal file
@ -0,0 +1,131 @@
|
||||
##
|
||||
## AffirmTrust Premium
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 7893706540734352110 (0x6d8c1446b1a60aee)
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
Issuer: C = US, O = AffirmTrust, CN = AffirmTrust Premium
|
||||
Validity
|
||||
Not Before: Jan 29 14:10:36 2010 GMT
|
||||
Not After : Dec 31 14:10:36 2040 GMT
|
||||
Subject: C = US, O = AffirmTrust, CN = AffirmTrust Premium
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:c4:12:df:a9:5f:fe:41:dd:dd:f5:9f:8a:e3:f6:
|
||||
ac:e1:3c:78:9a:bc:d8:f0:7f:7a:a0:33:2a:dc:8d:
|
||||
20:5b:ae:2d:6f:e7:93:d9:36:70:6a:68:cf:8e:51:
|
||||
a3:85:5b:67:04:a0:10:24:6f:5d:28:82:c1:97:57:
|
||||
d8:48:29:13:b6:e1:be:91:4d:df:85:0c:53:18:9a:
|
||||
1e:24:a2:4f:8f:f0:a2:85:0b:cb:f4:29:7f:d2:a4:
|
||||
58:ee:26:4d:c9:aa:a8:7b:9a:d9:fa:38:de:44:57:
|
||||
15:e5:f8:8c:c8:d9:48:e2:0d:16:27:1d:1e:c8:83:
|
||||
85:25:b7:ba:aa:55:41:cc:03:22:4b:2d:91:8d:8b:
|
||||
e6:89:af:66:c7:e9:ff:2b:e9:3c:ac:da:d2:b3:c3:
|
||||
e1:68:9c:89:f8:7a:00:56:de:f4:55:95:6c:fb:ba:
|
||||
64:dd:62:8b:df:0b:77:32:eb:62:cc:26:9a:9b:bb:
|
||||
aa:62:83:4c:b4:06:7a:30:c8:29:bf:ed:06:4d:97:
|
||||
b9:1c:c4:31:2b:d5:5f:bc:53:12:17:9c:99:57:29:
|
||||
66:77:61:21:31:07:2e:25:49:9d:18:f2:ee:f3:2b:
|
||||
71:8c:b5:ba:39:07:49:77:fc:ef:2e:92:90:05:8d:
|
||||
2d:2f:77:7b:ef:43:bf:35:bb:9a:d8:f9:73:a7:2c:
|
||||
f2:d0:57:ee:28:4e:26:5f:8f:90:68:09:2f:b8:f8:
|
||||
dc:06:e9:2e:9a:3e:51:a7:d1:22:c4:0a:a7:38:48:
|
||||
6c:b3:f9:ff:7d:ab:86:57:e3:ba:d6:85:78:77:ba:
|
||||
43:ea:48:7f:f6:d8:be:23:6d:1e:bf:d1:36:6c:58:
|
||||
5c:f1:ee:a4:19:54:1a:f5:03:d2:76:e6:e1:8c:bd:
|
||||
3c:b3:d3:48:4b:e2:c8:f8:7f:92:a8:76:46:9c:42:
|
||||
65:3e:a4:1e:c1:07:03:5a:46:2d:b8:97:f3:b7:d5:
|
||||
b2:55:21:ef:ba:dc:4c:00:97:fb:14:95:27:33:bf:
|
||||
e8:43:47:46:d2:08:99:16:60:3b:9a:7e:d2:e6:ed:
|
||||
38:ea:ec:01:1e:3c:48:56:49:09:c7:4c:37:00:9e:
|
||||
88:0e:c0:73:e1:6f:66:e9:72:47:30:3e:10:e5:0b:
|
||||
03:c9:9a:42:00:6c:c5:94:7e:61:c4:8a:df:7f:82:
|
||||
1a:0b:59:c4:59:32:77:b3:bc:60:69:56:39:fd:b4:
|
||||
06:7b:2c:d6:64:36:d9:bd:48:ed:84:1f:7e:a5:22:
|
||||
8f:2a:b8:42:f4:82:b7:d4:53:90:78:4e:2d:1a:fd:
|
||||
81:6f:44:d7:3b:01:74:96:42:e0:00:e2:2e:6b:ea:
|
||||
c5:ee:72:ac:bb:bf:fe:ea:aa:a8:f8:dc:f6:b2:79:
|
||||
8a:b6:67
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
9D:C0:67:A6:0C:22:D9:26:F5:45:AB:A6:65:52:11:27:D8:45:AC:63
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
b3:57:4d:10:62:4e:3a:e4:ac:ea:b8:1c:af:32:23:c8:b3:49:
|
||||
5a:51:9c:76:28:8d:79:aa:57:46:17:d5:f5:52:f6:b7:44:e8:
|
||||
08:44:bf:18:84:d2:0b:80:cd:c5:12:fd:00:55:05:61:87:41:
|
||||
dc:b5:24:9e:3c:c4:d8:c8:fb:70:9e:2f:78:96:83:20:36:de:
|
||||
7c:0f:69:13:88:a5:75:36:98:08:a6:c6:df:ac:ce:e3:58:d6:
|
||||
b7:3e:de:ba:f3:eb:34:40:d8:a2:81:f5:78:3f:2f:d5:a5:fc:
|
||||
d9:a2:d4:5e:04:0e:17:ad:fe:41:f0:e5:b2:72:fa:44:82:33:
|
||||
42:e8:2d:58:f7:56:8c:62:3f:ba:42:b0:9c:0c:5c:7e:2e:65:
|
||||
26:5c:53:4f:00:b2:78:7e:a1:0d:99:2d:8d:b8:1d:8e:a2:c4:
|
||||
b0:fd:60:d0:30:a4:8e:c8:04:62:a9:c4:ed:35:de:7a:97:ed:
|
||||
0e:38:5e:92:2f:93:70:a5:a9:9c:6f:a7:7d:13:1d:7e:c6:08:
|
||||
48:b1:5e:67:eb:51:08:25:e9:e6:25:6b:52:29:91:9c:d2:39:
|
||||
73:08:57:de:99:06:b4:5b:9d:10:06:e1:c2:00:a8:b8:1c:4a:
|
||||
02:0a:14:d0:c1:41:ca:fb:8c:35:21:7d:82:38:f2:a9:54:91:
|
||||
19:35:93:94:6d:6a:3a:c5:b2:d0:bb:89:86:93:e8:9b:c9:0f:
|
||||
3a:a7:7a:b8:a1:f0:78:46:fa:fc:37:2f:e5:8a:84:f3:df:fe:
|
||||
04:d9:a1:68:a0:2f:24:e2:09:95:06:d5:95:ca:e1:24:96:eb:
|
||||
7c:f6:93:05:bb:ed:73:e9:2d:d1:75:39:d7:e7:24:db:d8:4e:
|
||||
5f:43:8f:9e:d0:14:39:bf:55:70:48:99:57:31:b4:9c:ee:4a:
|
||||
98:03:96:30:1f:60:06:ee:1b:23:fe:81:60:23:1a:47:62:85:
|
||||
a5:cc:19:34:80:6f:b3:ac:1a:e3:9f:f0:7b:48:ad:d5:01:d9:
|
||||
67:b6:a9:72:93:ea:2d:66:b5:b2:b8:e4:3d:3c:b2:ef:4c:8c:
|
||||
ea:eb:07:bf:ab:35:9a:55:86:bc:18:a6:b5:a8:5e:b4:83:6c:
|
||||
6b:69:40:d3:9f:dc:f1:c3:69:6b:b9:e1:6d:09:f4:f1:aa:50:
|
||||
76:0a:7a:7d:7a:17:a1:55:96:42:99:31:09:dd:60:11:8d:05:
|
||||
30:7e:e6:8e:46:d1:9d:14:da:c7:17:e4:05:96:8c:c4:24:b5:
|
||||
1b:cf:14:07:b2:40:f8:a3:9e:41:86:bc:04:d0:6b:96:c8:2a:
|
||||
80:34:fd:bf:ef:06:a3:dd:58:c5:85:3d:3e:8f:fe:9e:29:e0:
|
||||
b6:b8:09:68:19:1c:18:43
|
||||
SHA1 Fingerprint=D8:A6:33:2C:E0:03:6F:B1:85:F6:63:4F:7D:6A:06:65:26:32:28:27
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE
|
||||
BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz
|
||||
dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG
|
||||
A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U
|
||||
cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf
|
||||
qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ
|
||||
JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ
|
||||
+jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS
|
||||
s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5
|
||||
HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7
|
||||
70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG
|
||||
V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S
|
||||
qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S
|
||||
5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia
|
||||
C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX
|
||||
OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE
|
||||
FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/
|
||||
BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2
|
||||
KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg
|
||||
Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B
|
||||
8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ
|
||||
MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc
|
||||
0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ
|
||||
u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF
|
||||
u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH
|
||||
YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8
|
||||
GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO
|
||||
RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e
|
||||
KeC2uAloGRwYQw==
|
||||
-----END CERTIFICATE-----
|
63
secure/caroot/trusted/AffirmTrust_Premium_ECC.pem
Normal file
63
secure/caroot/trusted/AffirmTrust_Premium_ECC.pem
Normal file
@ -0,0 +1,63 @@
|
||||
##
|
||||
## AffirmTrust Premium ECC
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8401224907861490260 (0x7497258ac73f7a54)
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C = US, O = AffirmTrust, CN = AffirmTrust Premium ECC
|
||||
Validity
|
||||
Not Before: Jan 29 14:20:24 2010 GMT
|
||||
Not After : Dec 31 14:20:24 2040 GMT
|
||||
Subject: C = US, O = AffirmTrust, CN = AffirmTrust Premium ECC
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:0d:30:5e:1b:15:9d:03:d0:a1:79:35:b7:3a:3c:
|
||||
92:7a:ca:15:1c:cd:62:f3:9c:26:5c:07:3d:e5:54:
|
||||
fa:a3:d6:cc:12:ea:f4:14:5f:e8:8e:19:ab:2f:2e:
|
||||
48:e6:ac:18:43:78:ac:d0:37:c3:bd:b2:cd:2c:e6:
|
||||
47:e2:1a:e6:63:b8:3d:2e:2f:78:c4:4f:db:f4:0f:
|
||||
a4:68:4c:55:72:6b:95:1d:4e:18:42:95:78:cc:37:
|
||||
3c:91:e2:9b:65:2b:29
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
9A:AF:29:7A:C0:11:35:35:26:51:30:00:C3:6A:FE:40:D5:AE:D6:3C
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
30:64:02:30:17:09:f3:87:88:50:5a:af:c8:c0:42:bf:47:5f:
|
||||
f5:6c:6a:86:e0:c4:27:74:e4:38:53:d7:05:7f:1b:34:e3:c6:
|
||||
2f:b3:ca:09:3c:37:9d:d7:e7:b8:46:f1:fd:a1:e2:71:02:30:
|
||||
42:59:87:43:d4:51:df:ba:d3:09:32:5a:ce:88:7e:57:3d:9c:
|
||||
5f:42:6b:f5:07:2d:b5:f0:82:93:f9:59:6f:ae:64:fa:58:e5:
|
||||
8b:1e:e3:63:be:b5:81:cd:6f:02:8c:79
|
||||
SHA1 Fingerprint=B8:23:6B:00:2F:1D:16:86:53:01:55:6C:11:A4:37:CA:EB:FF:C3:BB
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC
|
||||
VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ
|
||||
cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ
|
||||
BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt
|
||||
VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D
|
||||
0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9
|
||||
ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G
|
||||
A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G
|
||||
A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs
|
||||
aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I
|
||||
flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ==
|
||||
-----END CERTIFICATE-----
|
90
secure/caroot/trusted/Amazon_Root_CA_1.pem
Normal file
90
secure/caroot/trusted/Amazon_Root_CA_1.pem
Normal file
@ -0,0 +1,90 @@
|
||||
##
|
||||
## Amazon Root CA 1
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
06:6c:9f:cf:99:bf:8c:0a:39:e2:f0:78:8a:43:e6:96:36:5b:ca
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, O = Amazon, CN = Amazon Root CA 1
|
||||
Validity
|
||||
Not Before: May 26 00:00:00 2015 GMT
|
||||
Not After : Jan 17 00:00:00 2038 GMT
|
||||
Subject: C = US, O = Amazon, CN = Amazon Root CA 1
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b2:78:80:71:ca:78:d5:e3:71:af:47:80:50:74:
|
||||
7d:6e:d8:d7:88:76:f4:99:68:f7:58:21:60:f9:74:
|
||||
84:01:2f:ac:02:2d:86:d3:a0:43:7a:4e:b2:a4:d0:
|
||||
36:ba:01:be:8d:db:48:c8:07:17:36:4c:f4:ee:88:
|
||||
23:c7:3e:eb:37:f5:b5:19:f8:49:68:b0:de:d7:b9:
|
||||
76:38:1d:61:9e:a4:fe:82:36:a5:e5:4a:56:e4:45:
|
||||
e1:f9:fd:b4:16:fa:74:da:9c:9b:35:39:2f:fa:b0:
|
||||
20:50:06:6c:7a:d0:80:b2:a6:f9:af:ec:47:19:8f:
|
||||
50:38:07:dc:a2:87:39:58:f8:ba:d5:a9:f9:48:67:
|
||||
30:96:ee:94:78:5e:6f:89:a3:51:c0:30:86:66:a1:
|
||||
45:66:ba:54:eb:a3:c3:91:f9:48:dc:ff:d1:e8:30:
|
||||
2d:7d:2d:74:70:35:d7:88:24:f7:9e:c4:59:6e:bb:
|
||||
73:87:17:f2:32:46:28:b8:43:fa:b7:1d:aa:ca:b4:
|
||||
f2:9f:24:0e:2d:4b:f7:71:5c:5e:69:ff:ea:95:02:
|
||||
cb:38:8a:ae:50:38:6f:db:fb:2d:62:1b:c5:c7:1e:
|
||||
54:e1:77:e0:67:c8:0f:9c:87:23:d6:3f:40:20:7f:
|
||||
20:80:c4:80:4c:3e:3b:24:26:8e:04:ae:6c:9a:c8:
|
||||
aa:0d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
84:18:CC:85:34:EC:BC:0C:94:94:2E:08:59:9C:C7:B2:10:4E:0A:08
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
98:f2:37:5a:41:90:a1:1a:c5:76:51:28:20:36:23:0e:ae:e6:
|
||||
28:bb:aa:f8:94:ae:48:a4:30:7f:1b:fc:24:8d:4b:b4:c8:a1:
|
||||
97:f6:b6:f1:7a:70:c8:53:93:cc:08:28:e3:98:25:cf:23:a4:
|
||||
f9:de:21:d3:7c:85:09:ad:4e:9a:75:3a:c2:0b:6a:89:78:76:
|
||||
44:47:18:65:6c:8d:41:8e:3b:7f:9a:cb:f4:b5:a7:50:d7:05:
|
||||
2c:37:e8:03:4b:ad:e9:61:a0:02:6e:f5:f2:f0:c5:b2:ed:5b:
|
||||
b7:dc:fa:94:5c:77:9e:13:a5:7f:52:ad:95:f2:f8:93:3b:de:
|
||||
8b:5c:5b:ca:5a:52:5b:60:af:14:f7:4b:ef:a3:fb:9f:40:95:
|
||||
6d:31:54:fc:42:d3:c7:46:1f:23:ad:d9:0f:48:70:9a:d9:75:
|
||||
78:71:d1:72:43:34:75:6e:57:59:c2:02:5c:26:60:29:cf:23:
|
||||
19:16:8e:88:43:a5:d4:e4:cb:08:fb:23:11:43:e8:43:29:72:
|
||||
62:a1:a9:5d:5e:08:d4:90:ae:b8:d8:ce:14:c2:d0:55:f2:86:
|
||||
f6:c4:93:43:77:66:61:c0:b9:e8:41:d7:97:78:60:03:6e:4a:
|
||||
72:ae:a5:d1:7d:ba:10:9e:86:6c:1b:8a:b9:59:33:f8:eb:c4:
|
||||
90:be:f1:b9
|
||||
SHA1 Fingerprint=8D:A7:F9:65:EC:5E:FC:37:91:0F:1C:6E:59:FD:C1:CC:6A:6E:DE:16
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
|
||||
ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
|
||||
b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
|
||||
MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
|
||||
b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
|
||||
ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
|
||||
9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
|
||||
IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
|
||||
VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
|
||||
93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
|
||||
jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
|
||||
AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
|
||||
A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
|
||||
U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
|
||||
N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
|
||||
o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
|
||||
5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
|
||||
rqXRfboQnoZsG4q5WTP468SQvvG5
|
||||
-----END CERTIFICATE-----
|
132
secure/caroot/trusted/Amazon_Root_CA_2.pem
Normal file
132
secure/caroot/trusted/Amazon_Root_CA_2.pem
Normal file
@ -0,0 +1,132 @@
|
||||
##
|
||||
## Amazon Root CA 2
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
06:6c:9f:d2:96:35:86:9f:0a:0f:e5:86:78:f8:5b:26:bb:8a:37
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
Issuer: C = US, O = Amazon, CN = Amazon Root CA 2
|
||||
Validity
|
||||
Not Before: May 26 00:00:00 2015 GMT
|
||||
Not After : May 26 00:00:00 2040 GMT
|
||||
Subject: C = US, O = Amazon, CN = Amazon Root CA 2
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:ad:96:9f:2d:9c:4a:4c:4a:81:79:51:99:ec:8a:
|
||||
cb:6b:60:51:13:bc:4d:6d:06:fc:b0:08:8d:dd:19:
|
||||
10:6a:c7:26:0c:35:d8:c0:6f:20:84:e9:94:b1:9b:
|
||||
85:03:c3:5b:db:4a:e8:c8:f8:90:76:d9:5b:4f:e3:
|
||||
4c:e8:06:36:4d:cc:9a:ac:3d:0c:90:2b:92:d4:06:
|
||||
19:60:ac:37:44:79:85:81:82:ad:5a:37:e0:0d:cc:
|
||||
9d:a6:4c:52:76:ea:43:9d:b7:04:d1:50:f6:55:e0:
|
||||
d5:d2:a6:49:85:e9:37:e9:ca:7e:ae:5c:95:4d:48:
|
||||
9a:3f:ae:20:5a:6d:88:95:d9:34:b8:52:1a:43:90:
|
||||
b0:bf:6c:05:b9:b6:78:b7:ea:d0:e4:3a:3c:12:53:
|
||||
62:ff:4a:f2:7b:be:35:05:a9:12:34:e3:f3:64:74:
|
||||
62:2c:3d:00:49:5a:28:fe:32:44:bb:87:dd:65:27:
|
||||
02:71:3b:da:4a:f7:1f:da:cd:f7:21:55:90:4f:0f:
|
||||
ec:ae:82:e1:9f:6b:d9:45:d3:bb:f0:5f:87:ed:3c:
|
||||
2c:39:86:da:3f:de:ec:72:55:eb:79:a3:ad:db:dd:
|
||||
7c:b0:ba:1c:ce:fc:de:4f:35:76:cf:0f:f8:78:1f:
|
||||
6a:36:51:46:27:61:5b:e9:9e:cf:f0:a2:55:7d:7c:
|
||||
25:8a:6f:2f:b4:c5:cf:84:2e:2b:fd:0d:51:10:6c:
|
||||
fb:5f:1b:bc:1b:7e:c5:ae:3b:98:01:31:92:ff:0b:
|
||||
57:f4:9a:b2:b9:57:e9:ab:ef:0d:76:d1:f0:ee:f4:
|
||||
ce:86:a7:e0:6e:e9:b4:69:a1:df:69:f6:33:c6:69:
|
||||
2e:97:13:9e:a5:87:b0:57:10:81:37:c9:53:b3:bb:
|
||||
7f:f6:92:d1:9c:d0:18:f4:92:6e:da:83:4f:a6:63:
|
||||
99:4c:a5:fb:5e:ef:21:64:7a:20:5f:6c:64:85:15:
|
||||
cb:37:e9:62:0c:0b:2a:16:dc:01:2e:32:da:3e:4b:
|
||||
f5:9e:3a:f6:17:40:94:ef:9e:91:08:86:fa:be:63:
|
||||
a8:5a:33:ec:cb:74:43:95:f9:6c:69:52:36:c7:29:
|
||||
6f:fc:55:03:5c:1f:fb:9f:bd:47:eb:e7:49:47:95:
|
||||
0b:4e:89:22:09:49:e0:f5:61:1e:f1:bf:2e:8a:72:
|
||||
6e:80:59:ff:57:3a:f9:75:32:a3:4e:5f:ec:ed:28:
|
||||
62:d9:4d:73:f2:cc:81:17:60:ed:cd:eb:dc:db:a7:
|
||||
ca:c5:7e:02:bd:f2:54:08:54:fd:b4:2d:09:2c:17:
|
||||
54:4a:98:d1:54:e1:51:67:08:d2:ed:6e:7e:6f:3f:
|
||||
d2:2d:81:59:29:66:cb:90:39:95:11:1e:74:27:fe:
|
||||
dd:eb:af
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
B0:0C:F0:4C:30:F4:05:58:02:48:FD:33:E5:52:AF:4B:84:E3:66:52
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
aa:a8:80:8f:0e:78:a3:e0:a2:d4:cd:e6:f5:98:7a:3b:ea:00:
|
||||
03:b0:97:0e:93:bc:5a:a8:f6:2c:8c:72:87:a9:b1:fc:7f:73:
|
||||
fd:63:71:78:a5:87:59:cf:30:e1:0d:10:b2:13:5a:6d:82:f5:
|
||||
6a:e6:80:9f:a0:05:0b:68:e4:47:6b:c7:6a:df:b6:fd:77:32:
|
||||
72:e5:18:fa:09:f4:a0:93:2c:5d:d2:8c:75:85:76:65:90:0c:
|
||||
03:79:b7:31:23:63:ad:78:83:09:86:68:84:ca:ff:f9:cf:26:
|
||||
9a:92:79:e7:cd:4b:c5:e7:61:a7:17:cb:f3:a9:12:93:93:6b:
|
||||
a7:e8:2f:53:92:c4:60:58:b0:cc:02:51:18:5b:85:8d:62:59:
|
||||
63:b6:ad:b4:de:9a:fb:26:f7:00:27:c0:5d:55:37:74:99:c9:
|
||||
50:7f:e3:59:2e:44:e3:2c:25:ee:ec:4c:32:77:b4:9f:1a:e9:
|
||||
4b:5d:20:c5:da:fd:1c:87:16:c6:43:e8:d4:bb:26:9a:45:70:
|
||||
5e:a9:0b:37:53:e2:46:7b:27:fd:e0:46:f2:89:b7:cc:42:b6:
|
||||
cb:28:26:6e:d9:a5:c9:3a:c8:41:13:60:f7:50:8c:15:ae:b2:
|
||||
6d:1a:15:1a:57:78:e6:92:2a:d9:65:90:82:3f:6c:02:af:ae:
|
||||
12:3a:27:96:36:04:d7:1d:a2:80:63:a9:9b:f1:e5:ba:b4:7c:
|
||||
14:b0:4e:c9:b1:1f:74:5f:38:f6:51:ea:9b:fa:2c:a2:11:d4:
|
||||
a9:2d:27:1a:45:b1:af:b2:4e:71:0d:c0:58:46:d6:69:06:cb:
|
||||
53:cb:b3:fe:6b:41:cd:41:7e:7d:4c:0f:7c:72:79:7a:59:cd:
|
||||
5e:4a:0e:ac:9b:a9:98:73:79:7c:b4:f4:cc:b9:b8:07:0c:b2:
|
||||
74:5c:b8:c7:6f:88:a1:90:a7:f4:aa:f9:bf:67:3a:f4:1a:15:
|
||||
62:1e:b7:9f:be:3d:b1:29:af:67:a1:12:f2:58:10:19:53:03:
|
||||
30:1b:b8:1a:89:f6:9c:bd:97:03:8e:a3:09:f3:1d:8b:21:f1:
|
||||
b4:df:e4:1c:d1:9f:65:02:06:ea:5c:d6:13:b3:84:ef:a2:a5:
|
||||
5c:8c:77:29:a7:68:c0:6b:ae:40:d2:a8:b4:ea:cd:f0:8d:4b:
|
||||
38:9c:19:9a:1b:28:54:b8:89:90:ef:ca:75:81:3e:1e:f2:64:
|
||||
24:c7:18:af:4e:ff:47:9e:07:f6:35:65:a4:d3:0a:56:ff:f5:
|
||||
17:64:6c:ef:a8:22:25:49:93:b6:df:00:17:da:58:7e:5d:ee:
|
||||
c5:1b:b0:d1:d1:5f:21:10:c7:f9:f3:ba:02:0a:27:07:c5:f1:
|
||||
d6:c7:d3:e0:fb:09:60:6c
|
||||
SHA1 Fingerprint=5A:8C:EF:45:D7:A6:98:59:76:7A:8C:8B:44:96:B5:78:CF:47:4B:1A
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF
|
||||
ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
|
||||
b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL
|
||||
MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
|
||||
b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK
|
||||
gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ
|
||||
W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg
|
||||
1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K
|
||||
8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r
|
||||
2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me
|
||||
z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR
|
||||
8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj
|
||||
mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz
|
||||
7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6
|
||||
+XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI
|
||||
0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB
|
||||
Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm
|
||||
UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2
|
||||
LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY
|
||||
+gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS
|
||||
k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl
|
||||
7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm
|
||||
btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl
|
||||
urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+
|
||||
fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63
|
||||
n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE
|
||||
76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H
|
||||
9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT
|
||||
4PsJYGw=
|
||||
-----END CERTIFICATE-----
|
59
secure/caroot/trusted/Amazon_Root_CA_3.pem
Normal file
59
secure/caroot/trusted/Amazon_Root_CA_3.pem
Normal file
@ -0,0 +1,59 @@
|
||||
##
|
||||
## Amazon Root CA 3
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
06:6c:9f:d5:74:97:36:66:3f:3b:0b:9a:d9:e8:9e:76:03:f2:4a
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
Issuer: C = US, O = Amazon, CN = Amazon Root CA 3
|
||||
Validity
|
||||
Not Before: May 26 00:00:00 2015 GMT
|
||||
Not After : May 26 00:00:00 2040 GMT
|
||||
Subject: C = US, O = Amazon, CN = Amazon Root CA 3
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (256 bit)
|
||||
pub:
|
||||
04:29:97:a7:c6:41:7f:c0:0d:9b:e8:01:1b:56:c6:
|
||||
f2:52:a5:ba:2d:b2:12:e8:d2:2e:d7:fa:c9:c5:d8:
|
||||
aa:6d:1f:73:81:3b:3b:98:6b:39:7c:33:a5:c5:4e:
|
||||
86:8e:80:17:68:62:45:57:7d:44:58:1d:b3:37:e5:
|
||||
67:08:eb:66:de
|
||||
ASN1 OID: prime256v1
|
||||
NIST CURVE: P-256
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
AB:B6:DB:D7:06:9E:37:AC:30:86:07:91:70:C7:9C:C4:19:B1:78:C0
|
||||
Signature Algorithm: ecdsa-with-SHA256
|
||||
30:46:02:21:00:e0:85:92:a3:17:b7:8d:f9:2b:06:a5:93:ac:
|
||||
1a:98:68:61:72:fa:e1:a1:d0:fb:1c:78:60:a6:43:99:c5:b8:
|
||||
c4:02:21:00:9c:02:ef:f1:94:9c:b3:96:f9:eb:c6:2a:f8:b6:
|
||||
2c:fe:3a:90:14:16:d7:8c:63:24:48:1c:df:30:7d:d5:68:3b
|
||||
SHA1 Fingerprint=0D:44:DD:8C:3C:8C:1A:1A:58:75:64:81:E9:0F:2E:2A:FF:B3:D2:6E
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5
|
||||
MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g
|
||||
Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG
|
||||
A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg
|
||||
Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl
|
||||
ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j
|
||||
QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr
|
||||
ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr
|
||||
BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM
|
||||
YyRIHN8wfdVoOw==
|
||||
-----END CERTIFICATE-----
|
64
secure/caroot/trusted/Amazon_Root_CA_4.pem
Normal file
64
secure/caroot/trusted/Amazon_Root_CA_4.pem
Normal file
@ -0,0 +1,64 @@
|
||||
##
|
||||
## Amazon Root CA 4
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
06:6c:9f:d7:c1:bb:10:4c:29:43:e5:71:7b:7b:2c:c8:1a:c1:0e
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C = US, O = Amazon, CN = Amazon Root CA 4
|
||||
Validity
|
||||
Not Before: May 26 00:00:00 2015 GMT
|
||||
Not After : May 26 00:00:00 2040 GMT
|
||||
Subject: C = US, O = Amazon, CN = Amazon Root CA 4
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:d2:ab:8a:37:4f:a3:53:0d:fe:c1:8a:7b:4b:a8:
|
||||
7b:46:4b:63:b0:62:f6:2d:1b:db:08:71:21:d2:00:
|
||||
e8:63:bd:9a:27:fb:f0:39:6e:5d:ea:3d:a5:c9:81:
|
||||
aa:a3:5b:20:98:45:5d:16:db:fd:e8:10:6d:e3:9c:
|
||||
e0:e3:bd:5f:84:62:f3:70:64:33:a0:cb:24:2f:70:
|
||||
ba:88:a1:2a:a0:75:f8:81:ae:62:06:c4:81:db:39:
|
||||
6e:29:b0:1e:fa:2e:5c
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
D3:EC:C7:3A:65:6E:CC:E1:DA:76:9A:56:FB:9C:F3:86:6D:57:E5:81
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
30:65:02:30:3a:8b:21:f1:bd:7e:11:ad:d0:ef:58:96:2f:d6:
|
||||
eb:9d:7e:90:8d:2b:cf:66:55:c3:2c:e3:28:a9:70:0a:47:0e:
|
||||
f0:37:59:12:ff:2d:99:94:28:4e:2a:4f:35:4d:33:5a:02:31:
|
||||
00:ea:75:00:4e:3b:c4:3a:94:12:91:c9:58:46:9d:21:13:72:
|
||||
a7:88:9c:8a:e4:4c:4a:db:96:d4:ac:8b:6b:6b:49:12:53:33:
|
||||
ad:d7:e4:be:24:fc:b5:0a:76:d4:a5:bc:10
|
||||
SHA1 Fingerprint=F6:10:84:07:D6:F8:BB:67:98:0C:C2:E2:44:C2:EB:AE:1C:EF:63:BE
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5
|
||||
MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g
|
||||
Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG
|
||||
A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg
|
||||
Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi
|
||||
9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk
|
||||
M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB
|
||||
/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB
|
||||
MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw
|
||||
CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW
|
||||
1KyLa2tJElMzrdfkviT8tQp21KW8EA==
|
||||
-----END CERTIFICATE-----
|
96
secure/caroot/trusted/Atos_TrustedRoot_2011.pem
Normal file
96
secure/caroot/trusted/Atos_TrustedRoot_2011.pem
Normal file
@ -0,0 +1,96 @@
|
||||
##
|
||||
## Atos TrustedRoot 2011
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6643877497813316402 (0x5c33cb622c5fb332)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: CN = Atos TrustedRoot 2011, O = Atos, C = DE
|
||||
Validity
|
||||
Not Before: Jul 7 14:58:30 2011 GMT
|
||||
Not After : Dec 31 23:59:59 2030 GMT
|
||||
Subject: CN = Atos TrustedRoot 2011, O = Atos, C = DE
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:95:85:3b:97:6f:2a:3b:2e:3b:cf:a6:f3:29:35:
|
||||
be:cf:18:ac:3e:aa:d9:f8:4d:a0:3e:1a:47:b9:bc:
|
||||
9a:df:f2:fe:cc:3e:47:e8:7a:96:c2:24:8e:35:f4:
|
||||
a9:0c:fc:82:fd:6d:c1:72:62:27:bd:ea:6b:eb:e7:
|
||||
8a:cc:54:3e:90:50:cf:80:d4:95:fb:e8:b5:82:d4:
|
||||
14:c5:b6:a9:55:25:57:db:b1:50:f6:b0:60:64:59:
|
||||
7a:69:cf:03:b7:6f:0d:be:ca:3e:6f:74:72:ea:aa:
|
||||
30:2a:73:62:be:49:91:61:c8:11:fe:0e:03:2a:f7:
|
||||
6a:20:dc:02:15:0d:5e:15:6a:fc:e3:82:c1:b5:c5:
|
||||
9d:64:09:6c:a3:59:98:07:27:c7:1b:96:2b:61:74:
|
||||
71:6c:43:f1:f7:35:89:10:e0:9e:ec:55:a1:37:22:
|
||||
a2:87:04:05:2c:47:7d:b4:1c:b9:62:29:66:28:ca:
|
||||
b7:e1:93:f5:a4:94:03:99:b9:70:85:b5:e6:48:ea:
|
||||
8d:50:fc:d9:de:cc:6f:07:0e:dd:0b:72:9d:80:30:
|
||||
16:07:95:3f:28:0e:fd:c5:75:4f:53:d6:74:9a:b4:
|
||||
24:2e:8e:02:91:cf:76:c5:9b:1e:55:74:9c:78:21:
|
||||
b1:f0:2d:f1:0b:9f:c2:d5:96:18:1f:f0:54:22:7a:
|
||||
8c:07
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
|
||||
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.6189.3.4.1.1
|
||||
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
26:77:34:db:94:48:86:2a:41:9d:2c:3e:06:90:60:c4:8c:ac:
|
||||
0b:54:b8:1f:b9:7b:d3:07:39:e4:fa:3e:7b:b2:3d:4e:ed:9f:
|
||||
23:bd:97:f3:6b:5c:ef:ee:fd:40:a6:df:a1:93:a1:0a:86:ac:
|
||||
ef:20:d0:79:01:bd:78:f7:19:d8:24:31:34:04:01:a6:ba:15:
|
||||
9a:c3:27:dc:d8:4f:0f:cc:18:63:ff:99:0f:0e:91:6b:75:16:
|
||||
e1:21:fc:d8:26:c7:47:b7:a6:cf:58:72:71:7e:ba:e1:4d:95:
|
||||
47:3b:c9:af:6d:a1:b4:c1:ec:89:f6:b4:0f:38:b5:e2:64:dc:
|
||||
25:cf:a6:db:eb:9a:5c:99:a1:c5:08:de:fd:e6:da:d5:d6:5a:
|
||||
45:0c:c4:b7:c2:b5:14:ef:b4:11:ff:0e:15:b5:f5:f5:db:c6:
|
||||
bd:eb:5a:a7:f0:56:22:a9:3c:65:54:c6:15:a8:bd:86:9e:cd:
|
||||
83:96:68:7a:71:81:89:e1:0b:e1:ea:11:1b:68:08:cc:69:9e:
|
||||
ec:9e:41:9e:44:32:26:7a:e2:87:0a:71:3d:eb:e4:5a:a4:d2:
|
||||
db:c5:cd:c6:de:60:7f:b9:f3:4f:44:92:ef:2a:b7:18:3e:a7:
|
||||
19:d9:0b:7d:b1:37:41:42:b0:ba:60:1d:f2:fe:09:11:b0:f0:
|
||||
87:7b:a7:9d
|
||||
SHA1 Fingerprint=2B:B1:F5:3E:55:0C:1D:C5:F1:D4:E6:B7:6A:46:4B:55:06:02:AC:21
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE
|
||||
AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG
|
||||
EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM
|
||||
FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC
|
||||
REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp
|
||||
Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM
|
||||
VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+
|
||||
SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ
|
||||
4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L
|
||||
cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi
|
||||
eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV
|
||||
HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG
|
||||
A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3
|
||||
DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j
|
||||
vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP
|
||||
DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc
|
||||
maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D
|
||||
lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv
|
||||
KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed
|
||||
-----END CERTIFICATE-----
|
@ -0,0 +1,141 @@
|
||||
##
|
||||
## Autoridad de Certificacion Firmaprofesional CIF A62634068
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6047274297262753887 (0x53ec3beefbb2485f)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = ES, CN = Autoridad de Certificacion Firmaprofesional CIF A62634068
|
||||
Validity
|
||||
Not Before: May 20 08:38:15 2009 GMT
|
||||
Not After : Dec 31 08:38:15 2030 GMT
|
||||
Subject: C = ES, CN = Autoridad de Certificacion Firmaprofesional CIF A62634068
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:ca:96:6b:8e:ea:f8:fb:f1:a2:35:e0:7f:4c:da:
|
||||
e0:c3:52:d7:7d:b6:10:c8:02:5e:b3:43:2a:c4:4f:
|
||||
6a:b2:ca:1c:5d:28:9a:78:11:1a:69:59:57:af:b5:
|
||||
20:42:e4:8b:0f:e6:df:5b:a6:03:92:2f:f5:11:e4:
|
||||
62:d7:32:71:38:d9:04:0c:71:ab:3d:51:7e:0f:07:
|
||||
df:63:05:5c:e9:bf:94:6f:c1:29:82:c0:b4:da:51:
|
||||
b0:c1:3c:bb:ad:37:4a:5c:ca:f1:4b:36:0e:24:ab:
|
||||
bf:c3:84:77:fd:a8:50:f4:b1:e7:c6:2f:d2:2d:59:
|
||||
8d:7a:0a:4e:96:69:52:02:aa:36:98:ec:fc:fa:14:
|
||||
83:0c:37:1f:c9:92:37:7f:d7:81:2d:e5:c4:b9:e0:
|
||||
3e:34:fe:67:f4:3e:66:d1:d3:f4:40:cf:5e:62:34:
|
||||
0f:70:06:3e:20:18:5a:ce:f7:72:1b:25:6c:93:74:
|
||||
14:93:a3:73:b1:0e:aa:87:10:23:59:5f:20:05:19:
|
||||
47:ed:68:8e:92:12:ca:5d:fc:d6:2b:b2:92:3c:20:
|
||||
cf:e1:5f:af:20:be:a0:76:7f:76:e5:ec:1a:86:61:
|
||||
33:3e:e7:7b:b4:3f:a0:0f:8e:a2:b9:6a:6f:b9:87:
|
||||
26:6f:41:6c:88:a6:50:fd:6a:63:0b:f5:93:16:1b:
|
||||
19:8f:b2:ed:9b:9b:c9:90:f5:01:0c:df:19:3d:0f:
|
||||
3e:38:23:c9:2f:8f:0c:d1:02:fe:1b:55:d6:4e:d0:
|
||||
8d:3c:af:4f:a4:f3:fe:af:2a:d3:05:9d:79:08:a1:
|
||||
cb:57:31:b4:9c:c8:90:b2:67:f4:18:16:93:3a:fc:
|
||||
47:d8:d1:78:96:31:1f:ba:2b:0c:5f:5d:99:ad:63:
|
||||
89:5a:24:20:76:d8:df:fd:ab:4e:a6:22:aa:9d:5e:
|
||||
e6:27:8a:7d:68:29:a3:e7:8a:b8:da:11:bb:17:2d:
|
||||
99:9d:13:24:46:f7:c5:e2:d8:9f:8e:7f:c7:8f:74:
|
||||
6d:5a:b2:e8:72:f5:ac:ee:24:10:ad:2f:14:da:ff:
|
||||
2d:9a:46:71:47:be:42:df:bb:01:db:f4:7f:d3:28:
|
||||
8f:31:59:5b:d3:c9:02:a6:b4:52:ca:6e:97:fb:43:
|
||||
c5:08:26:6f:8a:f4:bb:fd:9f:28:aa:0d:d5:45:f3:
|
||||
13:3a:1d:d8:c0:78:8f:41:67:3c:1e:94:64:ae:7b:
|
||||
0b:c5:e8:d9:01:88:39:1a:97:86:64:41:d5:3b:87:
|
||||
0c:6e:fa:0f:c6:bd:48:14:bf:39:4d:d4:9e:41:b6:
|
||||
8f:96:1d:63:96:93:d9:95:06:78:31:68:9e:37:06:
|
||||
3b:80:89:45:61:39:23:c7:1b:44:a3:15:e5:1c:f8:
|
||||
92:30:bb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:1
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
65:CD:EB:AB:35:1E:00:3E:7E:D5:74:C0:1C:B4:73:47:0E:1A:64:2F
|
||||
X509v3 Certificate Policies:
|
||||
Policy: X509v3 Any Policy
|
||||
CPS: http://www.firmaprofesional.com/cps
|
||||
User Notice:
|
||||
Explicit Text:
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
17:7d:a0:f9:b4:dd:c5:c5:eb:ad:4b:24:b5:a1:02:ab:dd:a5:
|
||||
88:4a:b2:0f:55:4b:2b:57:8c:3b:e5:31:dd:fe:c4:32:f1:e7:
|
||||
5b:64:96:36:32:18:ec:a5:32:77:d7:e3:44:b6:c0:11:2a:80:
|
||||
b9:3d:6a:6e:7c:9b:d3:ad:fc:c3:d6:a3:e6:64:29:7c:d1:e1:
|
||||
38:1e:82:2b:ff:27:65:af:fb:16:15:c4:2e:71:84:e5:b5:ff:
|
||||
fa:a4:47:bd:64:32:bb:f6:25:84:a2:27:42:f5:20:b0:c2:13:
|
||||
10:11:cd:10:15:ba:42:90:2a:d2:44:e1:96:26:eb:31:48:12:
|
||||
fd:2a:da:c9:06:cf:74:1e:a9:4b:d5:87:28:f9:79:34:92:3e:
|
||||
2e:44:e8:f6:8f:4f:8f:35:3f:25:b3:39:dc:63:2a:90:6b:20:
|
||||
5f:c4:52:12:4e:97:2c:2a:ac:9d:97:de:48:f2:a3:66:db:c2:
|
||||
d2:83:95:a6:66:a7:9e:25:0f:e9:0b:33:91:65:0a:5a:c3:d9:
|
||||
54:12:dd:af:c3:4e:0e:1f:26:5e:0d:dc:b3:8d:ec:d5:81:70:
|
||||
de:d2:4f:24:05:f3:6c:4e:f5:4c:49:66:8d:d1:ff:d2:0b:25:
|
||||
41:48:fe:51:84:c6:42:af:80:04:cf:d0:7e:64:49:e4:f2:df:
|
||||
a2:ec:b1:4c:c0:2a:1d:e7:b4:b1:65:a2:c4:bc:f1:98:f4:aa:
|
||||
70:07:63:b4:b8:da:3b:4c:fa:40:22:30:5b:11:a6:f0:05:0e:
|
||||
c6:02:03:48:ab:86:9b:85:dd:db:dd:ea:a2:76:80:73:7d:f5:
|
||||
9c:04:c4:45:8d:e7:b9:1c:8b:9e:ea:d7:75:d1:72:b1:de:75:
|
||||
44:e7:42:7d:e2:57:6b:7d:dc:99:bc:3d:83:28:ea:80:93:8d:
|
||||
c5:4c:65:c1:70:81:b8:38:fc:43:31:b2:f6:03:34:47:b2:ac:
|
||||
fb:22:06:cb:1e:dd:17:47:1c:5f:66:b9:d3:1a:a2:da:11:b1:
|
||||
a4:bc:23:c9:e4:be:87:ff:b9:94:b6:f8:5d:20:4a:d4:5f:e7:
|
||||
bd:68:7b:65:f2:15:1e:d2:3a:a9:2d:e9:d8:6b:24:ac:97:58:
|
||||
44:47:ad:59:18:f1:21:65:70:de:ce:34:60:a8:40:f1:f3:3c:
|
||||
a4:c3:28:23:8c:fe:27:33:43:40:a0:17:3c:eb:ea:3b:b0:72:
|
||||
a6:a3:b9:4a:4b:5e:16:48:f4:b2:bc:c8:8c:92:c5:9d:9f:ac:
|
||||
72:36:bc:34:80:34:6b:a9:8b:92:c0:b8:17:ed:ec:76:53:f5:
|
||||
24:01:8c:b3:22:e8:4b:7c:55:c6:9d:fa:a3:14:bb:65:85:6e:
|
||||
6e:4f:12:7e:0a:3c:9d:95
|
||||
SHA1 Fingerprint=AE:C5:FB:3F:C8:E1:BF:C4:E5:4F:03:07:5A:9A:E8:00:B7:F7:B6:FA
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIGFDCCA/ygAwIBAgIIU+w77vuySF8wDQYJKoZIhvcNAQEFBQAwUTELMAkGA1UE
|
||||
BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h
|
||||
cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0wOTA1MjAwODM4MTVaFw0zMDEy
|
||||
MzEwODM4MTVaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg
|
||||
Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi
|
||||
MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9
|
||||
thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM
|
||||
cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG
|
||||
L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i
|
||||
NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h
|
||||
X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b
|
||||
m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy
|
||||
Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja
|
||||
EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T
|
||||
KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF
|
||||
6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh
|
||||
OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMBIGA1UdEwEB/wQIMAYBAf8CAQEwDgYD
|
||||
VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRlzeurNR4APn7VdMActHNHDhpkLzCBpgYD
|
||||
VR0gBIGeMIGbMIGYBgRVHSAAMIGPMC8GCCsGAQUFBwIBFiNodHRwOi8vd3d3LmZp
|
||||
cm1hcHJvZmVzaW9uYWwuY29tL2NwczBcBggrBgEFBQcCAjBQHk4AUABhAHMAZQBv
|
||||
ACAAZABlACAAbABhACAAQgBvAG4AYQBuAG8AdgBhACAANAA3ACAAQgBhAHIAYwBl
|
||||
AGwAbwBuAGEAIAAwADgAMAAxADcwDQYJKoZIhvcNAQEFBQADggIBABd9oPm03cXF
|
||||
661LJLWhAqvdpYhKsg9VSytXjDvlMd3+xDLx51tkljYyGOylMnfX40S2wBEqgLk9
|
||||
am58m9Ot/MPWo+ZkKXzR4Tgegiv/J2Wv+xYVxC5xhOW1//qkR71kMrv2JYSiJ0L1
|
||||
ILDCExARzRAVukKQKtJE4ZYm6zFIEv0q2skGz3QeqUvVhyj5eTSSPi5E6PaPT481
|
||||
PyWzOdxjKpBrIF/EUhJOlywqrJ2X3kjyo2bbwtKDlaZmp54lD+kLM5FlClrD2VQS
|
||||
3a/DTg4fJl4N3LON7NWBcN7STyQF82xO9UxJZo3R/9ILJUFI/lGExkKvgATP0H5k
|
||||
SeTy36LssUzAKh3ntLFlosS88Zj0qnAHY7S42jtM+kAiMFsRpvAFDsYCA0irhpuF
|
||||
3dvd6qJ2gHN99ZwExEWN57kci57q13XRcrHedUTnQn3iV2t93Jm8PYMo6oCTjcVM
|
||||
ZcFwgbg4/EMxsvYDNEeyrPsiBsse3RdHHF9mudMaotoRsaS8I8nkvof/uZS2+F0g
|
||||
StRf571oe2XyFR7SOqkt6dhrJKyXWERHrVkY8SFlcN7ONGCoQPHzPKTDKCOM/icz
|
||||
Q0CgFzzr6juwcqajuUpLXhZI9LK8yIySxZ2frHI2vDSANGupi5LAuBft7HZT9SQB
|
||||
jLMi6Et8Vcad+qMUu2WFbm5PEn4KPJ2V
|
||||
-----END CERTIFICATE-----
|
90
secure/caroot/trusted/Baltimore_CyberTrust_Root.pem
Normal file
90
secure/caroot/trusted/Baltimore_CyberTrust_Root.pem
Normal file
@ -0,0 +1,90 @@
|
||||
##
|
||||
## Baltimore CyberTrust Root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 33554617 (0x20000b9)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
|
||||
Validity
|
||||
Not Before: May 12 18:46:00 2000 GMT
|
||||
Not After : May 12 23:59:00 2025 GMT
|
||||
Subject: C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:a3:04:bb:22:ab:98:3d:57:e8:26:72:9a:b5:79:
|
||||
d4:29:e2:e1:e8:95:80:b1:b0:e3:5b:8e:2b:29:9a:
|
||||
64:df:a1:5d:ed:b0:09:05:6d:db:28:2e:ce:62:a2:
|
||||
62:fe:b4:88:da:12:eb:38:eb:21:9d:c0:41:2b:01:
|
||||
52:7b:88:77:d3:1c:8f:c7:ba:b9:88:b5:6a:09:e7:
|
||||
73:e8:11:40:a7:d1:cc:ca:62:8d:2d:e5:8f:0b:a6:
|
||||
50:d2:a8:50:c3:28:ea:f5:ab:25:87:8a:9a:96:1c:
|
||||
a9:67:b8:3f:0c:d5:f7:f9:52:13:2f:c2:1b:d5:70:
|
||||
70:f0:8f:c0:12:ca:06:cb:9a:e1:d9:ca:33:7a:77:
|
||||
d6:f8:ec:b9:f1:68:44:42:48:13:d2:c0:c2:a4:ae:
|
||||
5e:60:fe:b6:a6:05:fc:b4:dd:07:59:02:d4:59:18:
|
||||
98:63:f5:a5:63:e0:90:0c:7d:5d:b2:06:7a:f3:85:
|
||||
ea:eb:d4:03:ae:5e:84:3e:5f:ff:15:ed:69:bc:f9:
|
||||
39:36:72:75:cf:77:52:4d:f3:c9:90:2c:b9:3d:e5:
|
||||
c9:23:53:3f:1f:24:98:21:5c:07:99:29:bd:c6:3a:
|
||||
ec:e7:6e:86:3a:6b:97:74:63:33:bd:68:18:31:f0:
|
||||
78:8d:76:bf:fc:9e:8e:5d:2a:86:a7:4d:90:dc:27:
|
||||
1a:39
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
E5:9D:59:30:82:47:58:CC:AC:FA:08:54:36:86:7B:3A:B5:04:4D:F0
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:3
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
85:0c:5d:8e:e4:6f:51:68:42:05:a0:dd:bb:4f:27:25:84:03:
|
||||
bd:f7:64:fd:2d:d7:30:e3:a4:10:17:eb:da:29:29:b6:79:3f:
|
||||
76:f6:19:13:23:b8:10:0a:f9:58:a4:d4:61:70:bd:04:61:6a:
|
||||
12:8a:17:d5:0a:bd:c5:bc:30:7c:d6:e9:0c:25:8d:86:40:4f:
|
||||
ec:cc:a3:7e:38:c6:37:11:4f:ed:dd:68:31:8e:4c:d2:b3:01:
|
||||
74:ee:be:75:5e:07:48:1a:7f:70:ff:16:5c:84:c0:79:85:b8:
|
||||
05:fd:7f:be:65:11:a3:0f:c0:02:b4:f8:52:37:39:04:d5:a9:
|
||||
31:7a:18:bf:a0:2a:f4:12:99:f7:a3:45:82:e3:3c:5e:f5:9d:
|
||||
9e:b5:c8:9e:7c:2e:c8:a4:9e:4e:08:14:4b:6d:fd:70:6d:6b:
|
||||
1a:63:bd:64:e6:1f:b7:ce:f0:f2:9f:2e:bb:1b:b7:f2:50:88:
|
||||
73:92:c2:e2:e3:16:8d:9a:32:02:ab:8e:18:dd:e9:10:11:ee:
|
||||
7e:35:ab:90:af:3e:30:94:7a:d0:33:3d:a7:65:0f:f5:fc:8e:
|
||||
9e:62:cf:47:44:2c:01:5d:bb:1d:b5:32:d2:47:d2:38:2e:d0:
|
||||
fe:81:dc:32:6a:1e:b5:ee:3c:d5:fc:e7:81:1d:19:c3:24:42:
|
||||
ea:63:39:a9
|
||||
SHA1 Fingerprint=D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ
|
||||
RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD
|
||||
VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX
|
||||
DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y
|
||||
ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy
|
||||
VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr
|
||||
mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr
|
||||
IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK
|
||||
mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu
|
||||
XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy
|
||||
dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye
|
||||
jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1
|
||||
BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3
|
||||
DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92
|
||||
9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx
|
||||
jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0
|
||||
Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz
|
||||
ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS
|
||||
R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp
|
||||
-----END CERTIFICATE-----
|
131
secure/caroot/trusted/Buypass_Class_2_Root_CA.pem
Normal file
131
secure/caroot/trusted/Buypass_Class_2_Root_CA.pem
Normal file
@ -0,0 +1,131 @@
|
||||
##
|
||||
## Buypass Class 2 Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = NO, O = Buypass AS-983163327, CN = Buypass Class 2 Root CA
|
||||
Validity
|
||||
Not Before: Oct 26 08:38:03 2010 GMT
|
||||
Not After : Oct 26 08:38:03 2040 GMT
|
||||
Subject: C = NO, O = Buypass AS-983163327, CN = Buypass Class 2 Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:d7:c7:5e:f7:c1:07:d4:77:fb:43:21:f4:f4:f5:
|
||||
69:e4:ee:32:01:db:a3:86:1f:e4:59:0d:ba:e7:75:
|
||||
83:52:eb:ea:1c:61:15:48:bb:1d:07:ca:8c:ae:b0:
|
||||
dc:96:9d:ea:c3:60:92:86:82:28:73:9c:56:06:ff:
|
||||
4b:64:f0:0c:2a:37:49:b5:e5:cf:0c:7c:ee:f1:4a:
|
||||
bb:73:30:65:f3:d5:2f:83:b6:7e:e3:e7:f5:9e:ab:
|
||||
60:f9:d3:f1:9d:92:74:8a:e4:1c:96:ac:5b:80:e9:
|
||||
b5:f4:31:87:a3:51:fc:c7:7e:a1:6f:8e:53:77:d4:
|
||||
97:c1:55:33:92:3e:18:2f:75:d4:ad:86:49:cb:95:
|
||||
af:54:06:6c:d8:06:13:8d:5b:ff:e1:26:19:59:c0:
|
||||
24:ba:81:71:79:90:44:50:68:24:94:5f:b8:b3:11:
|
||||
f1:29:41:61:a3:41:cb:23:36:d5:c1:f1:32:50:10:
|
||||
4e:7f:f4:86:93:ec:84:d3:8e:bc:4b:bf:5c:01:4e:
|
||||
07:3d:dc:14:8a:94:0a:a4:ea:73:fb:0b:51:e8:13:
|
||||
07:18:fa:0e:f1:2b:d1:54:15:7d:3c:e1:f7:b4:19:
|
||||
42:67:62:5e:77:e0:a2:55:ec:b6:d9:69:17:d5:3a:
|
||||
af:44:ed:4a:c5:9e:e4:7a:27:7c:e5:75:d7:aa:cb:
|
||||
25:e7:df:6b:0a:db:0f:4d:93:4e:a8:a0:cd:7b:2e:
|
||||
f2:59:01:6a:b7:0d:b8:07:81:7e:8b:38:1b:38:e6:
|
||||
0a:57:99:3d:ee:21:e8:a3:f5:0c:16:dd:8b:ec:34:
|
||||
8e:9c:2a:1c:00:15:17:8d:68:83:d2:70:9f:18:08:
|
||||
cd:11:68:d5:c9:6b:52:cd:c4:46:8f:dc:b5:f3:d8:
|
||||
57:73:1e:e9:94:39:04:bf:d3:de:38:de:b4:53:ec:
|
||||
69:1c:a2:7e:c4:8f:e4:1b:70:ad:f2:a2:f9:fb:f7:
|
||||
16:64:66:69:9f:49:51:a2:e2:15:18:67:06:4a:7f:
|
||||
d5:6c:b5:4d:b3:33:e0:61:eb:5d:be:e9:98:0f:32:
|
||||
d7:1d:4b:3c:2e:5a:01:52:91:09:f2:df:ea:8d:d8:
|
||||
06:40:63:aa:11:e4:fe:c3:37:9e:14:52:3f:f4:e2:
|
||||
cc:f2:61:93:d1:fd:67:6b:d7:52:ae:bf:68:ab:40:
|
||||
43:a0:57:35:53:78:f0:53:f8:61:42:07:64:c6:d7:
|
||||
6f:9b:4c:38:0d:63:ac:62:af:36:8b:a2:73:0a:0d:
|
||||
f5:21:bd:74:aa:4d:ea:72:03:49:db:c7:5f:1d:62:
|
||||
63:c7:fd:dd:91:ec:33:ee:f5:6d:b4:6e:30:68:de:
|
||||
c8:d6:26:b0:75:5e:7b:b4:07:20:98:a1:76:32:b8:
|
||||
4d:6c:4f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
C9:80:77:E0:62:92:82:F5:46:9C:F3:BA:F7:4C:C3:DE:B8:A3:AD:39
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
53:5f:21:f5:ba:b0:3a:52:39:2c:92:b0:6c:00:c9:ef:ce:20:
|
||||
ef:06:f2:96:9e:e9:a4:74:7f:7a:16:fc:b7:f5:b6:fb:15:1b:
|
||||
3f:ab:a6:c0:72:5d:10:b1:71:ee:bc:4f:e3:ad:ac:03:6d:2e:
|
||||
71:2e:af:c4:e3:ad:a3:bd:0c:11:a7:b4:ff:4a:b2:7b:10:10:
|
||||
1f:a7:57:41:b2:c0:ae:f4:2c:59:d6:47:10:88:f3:21:51:29:
|
||||
30:ca:60:86:af:46:ab:1d:ed:3a:5b:b0:94:de:44:e3:41:08:
|
||||
a2:c1:ec:1d:d6:fd:4f:b6:d6:47:d0:14:0b:ca:e6:ca:b5:7b:
|
||||
77:7e:41:1f:5e:83:c7:b6:8c:39:96:b0:3f:96:81:41:6f:60:
|
||||
90:e2:e8:f9:fb:22:71:d9:7d:b3:3d:46:bf:b4:84:af:90:1c:
|
||||
0f:8f:12:6a:af:ef:ee:1e:7a:ae:02:4a:8a:17:2b:76:fe:ac:
|
||||
54:89:24:2c:4f:3f:b6:b2:a7:4e:8c:a8:91:97:fb:29:c6:7b:
|
||||
5c:2d:b9:cb:66:b6:b7:a8:5b:12:51:85:b5:09:7e:62:78:70:
|
||||
fe:a9:6a:60:b6:1d:0e:79:0c:fd:ca:ea:24:80:72:c3:97:3f:
|
||||
f2:77:ab:43:22:0a:c7:eb:b6:0c:84:82:2c:80:6b:41:8a:08:
|
||||
c0:eb:a5:6b:df:99:12:cb:8a:d5:5e:80:0c:91:e0:26:08:36:
|
||||
48:c5:fa:38:11:35:ff:25:83:2d:f2:7a:bf:da:fd:8e:fe:a5:
|
||||
cb:45:2c:1f:c4:88:53:ae:77:0e:d9:9a:76:c5:8e:2c:1d:a3:
|
||||
ba:d5:ec:32:ae:c0:aa:ac:f7:d1:7a:4d:eb:d4:07:e2:48:f7:
|
||||
22:8e:b0:a4:9f:6a:ce:8e:b2:b2:60:f4:a3:22:d0:23:eb:94:
|
||||
5a:7a:69:dd:0f:bf:40:57:ac:6b:59:50:d9:a3:99:e1:6e:fe:
|
||||
8d:01:79:27:23:15:de:92:9d:7b:09:4d:5a:e7:4b:48:30:5a:
|
||||
18:e6:0a:6d:e6:8f:e0:d2:bb:e6:df:7c:6e:21:82:c1:68:39:
|
||||
4d:b4:98:58:66:62:cc:4a:90:5e:c3:fa:27:04:b1:79:15:74:
|
||||
99:cc:be:ad:20:de:26:60:1c:eb:56:51:a6:a3:ea:e4:a3:3f:
|
||||
a7:ff:61:dc:f1:5a:4d:6c:32:23:43:ee:ac:a8:ee:ee:4a:12:
|
||||
09:3c:5d:71:c2:be:79:fa:c2:87:68:1d:0b:fd:5c:69:cc:06:
|
||||
d0:9a:7d:54:99:2a:c9:39:1a:19:af:4b:2a:43:f3:63:5d:5a:
|
||||
58:e2:2f:e3:1d:e4:a9:d6:d0:0a:d0:9e:bf:d7:81:09:f1:c9:
|
||||
c7:26:0d:ac:98:16:56:a0
|
||||
SHA1 Fingerprint=49:0A:75:74:DE:87:0A:47:FE:58:EE:F6:C7:6B:EB:C6:0B:12:40:99
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd
|
||||
MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg
|
||||
Q2xhc3MgMiBSb290IENBMB4XDTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1ow
|
||||
TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw
|
||||
HgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB
|
||||
BQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1g1Lr
|
||||
6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPV
|
||||
L4O2fuPn9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC91
|
||||
1K2GScuVr1QGbNgGE41b/+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHx
|
||||
MlAQTn/0hpPshNOOvEu/XAFOBz3cFIqUCqTqc/sLUegTBxj6DvEr0VQVfTzh97QZ
|
||||
QmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeffawrbD02TTqigzXsu8lkB
|
||||
arcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgIzRFo1clr
|
||||
Us3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLi
|
||||
FRhnBkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRS
|
||||
P/TizPJhk9H9Z2vXUq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN
|
||||
9SG9dKpN6nIDSdvHXx1iY8f93ZHsM+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxP
|
||||
AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMmAd+BikoL1Rpzz
|
||||
uvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAU18h
|
||||
9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s
|
||||
A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3t
|
||||
OluwlN5E40EIosHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo
|
||||
+fsicdl9sz1Gv7SEr5AcD48Saq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7
|
||||
KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYdDnkM/crqJIByw5c/8nerQyIKx+u2
|
||||
DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWDLfJ6v9r9jv6ly0Us
|
||||
H8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0oyLQ
|
||||
I+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK7
|
||||
5t98biGCwWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h
|
||||
3PFaTWwyI0PurKju7koSCTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPz
|
||||
Y11aWOIv4x3kqdbQCtCev9eBCfHJxyYNrJgWVqA=
|
||||
-----END CERTIFICATE-----
|
131
secure/caroot/trusted/Buypass_Class_3_Root_CA.pem
Normal file
131
secure/caroot/trusted/Buypass_Class_3_Root_CA.pem
Normal file
@ -0,0 +1,131 @@
|
||||
##
|
||||
## Buypass Class 3 Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = NO, O = Buypass AS-983163327, CN = Buypass Class 3 Root CA
|
||||
Validity
|
||||
Not Before: Oct 26 08:28:58 2010 GMT
|
||||
Not After : Oct 26 08:28:58 2040 GMT
|
||||
Subject: C = NO, O = Buypass AS-983163327, CN = Buypass Class 3 Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:a5:da:0a:95:16:50:e3:95:f2:5e:9d:76:31:06:
|
||||
32:7a:9b:f1:10:76:b8:00:9a:b5:52:36:cd:24:47:
|
||||
b0:9f:18:64:bc:9a:f6:fa:d5:79:d8:90:62:4c:22:
|
||||
2f:de:38:3d:d6:e0:a8:e9:1c:2c:db:78:11:e9:8e:
|
||||
68:51:15:72:c7:f3:33:87:e4:a0:5d:0b:5c:e0:57:
|
||||
07:2a:30:f5:cd:c4:37:77:28:4d:18:91:e6:bf:d5:
|
||||
52:fd:71:2d:70:3e:e7:c6:c4:8a:e3:f0:28:0b:f4:
|
||||
76:98:a1:8b:87:55:b2:3a:13:fc:b7:3e:27:37:8e:
|
||||
22:e3:a8:4f:2a:ef:60:bb:3d:b7:39:c3:0e:01:47:
|
||||
99:5d:12:4f:db:43:fa:57:a1:ed:f9:9d:be:11:47:
|
||||
26:5b:13:98:ab:5d:16:8a:b0:37:1c:57:9d:45:ff:
|
||||
88:96:36:bf:bb:ca:07:7b:6f:87:63:d7:d0:32:6a:
|
||||
d6:5d:6c:0c:f1:b3:6e:39:e2:6b:31:2e:39:00:27:
|
||||
14:de:38:c0:ec:19:66:86:12:e8:9d:72:16:13:64:
|
||||
52:c7:a9:37:1c:fd:82:30:ed:84:18:1d:f4:ae:5c:
|
||||
ff:70:13:00:eb:b1:f5:33:7a:4b:d6:55:f8:05:8d:
|
||||
4b:69:b0:f5:b3:28:36:5c:14:c4:51:73:4d:6b:0b:
|
||||
f1:34:07:db:17:39:d7:dc:28:7b:6b:f5:9f:f3:2e:
|
||||
c1:4f:17:2a:10:f3:cc:ca:e8:eb:fd:6b:ab:2e:9a:
|
||||
9f:2d:82:6e:04:d4:52:01:93:2d:3d:86:fc:7e:fc:
|
||||
df:ef:42:1d:a6:6b:ef:b9:20:c6:f7:bd:a0:a7:95:
|
||||
fd:a7:e6:89:24:d8:cc:8c:34:6c:e2:23:2f:d9:12:
|
||||
1a:21:b9:55:91:6f:0b:91:79:19:0c:ad:40:88:0b:
|
||||
70:e2:7a:d2:0e:d8:68:48:bb:82:13:39:10:58:e9:
|
||||
d8:2a:07:c6:12:db:58:db:d2:3b:55:10:47:05:15:
|
||||
67:62:7e:18:63:a6:46:3f:09:0e:54:32:5e:bf:0d:
|
||||
62:7a:27:ef:80:e8:db:d9:4b:06:5a:37:5a:25:d0:
|
||||
08:12:77:d4:6f:09:50:97:3d:c8:1d:c3:df:8c:45:
|
||||
30:56:c6:d3:64:ab:66:f3:c0:5e:96:9c:c3:c4:ef:
|
||||
c3:7c:6b:8b:3a:79:7f:b3:49:cf:3d:e2:89:9f:a0:
|
||||
30:4b:85:b9:9c:94:24:79:8f:7d:6b:a9:45:68:0f:
|
||||
2b:d0:f1:da:1c:cb:69:b8:ca:49:62:6d:c8:d0:63:
|
||||
62:dd:60:0f:58:aa:8f:a1:bc:05:a5:66:a2:cf:1b:
|
||||
76:b2:84:64:b1:4c:39:52:c0:30:ba:f0:8c:4b:02:
|
||||
b0:b6:b7
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
47:B8:CD:FF:E5:6F:EE:F8:B2:EC:2F:4E:0E:F9:25:B0:8E:3C:6B:C3
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
00:20:23:41:35:04:90:c2:40:62:60:ef:e2:35:4c:d7:3f:ac:
|
||||
e2:34:90:b8:a1:6f:76:fa:16:16:a4:48:37:2c:e9:90:c2:f2:
|
||||
3c:f8:0a:9f:d8:81:e5:bb:5b:da:25:2c:a4:a7:55:71:24:32:
|
||||
f6:c8:0b:f2:bc:6a:f8:93:ac:b2:07:c2:5f:9f:db:cc:c8:8a:
|
||||
aa:be:6a:6f:e1:49:10:cc:31:d7:80:bb:bb:c8:d8:a2:0e:64:
|
||||
57:ea:a2:f5:c2:a9:31:15:d2:20:6a:ec:fc:22:01:28:cf:86:
|
||||
b8:80:1e:a9:cc:11:a5:3c:f2:16:b3:47:9d:fc:d2:80:21:c4:
|
||||
cb:d0:47:70:41:a1:ca:83:19:08:2c:6d:f2:5d:77:9c:8a:14:
|
||||
13:d4:36:1c:92:f0:e5:06:37:dc:a6:e6:90:9b:38:8f:5c:6b:
|
||||
1b:46:86:43:42:5f:3e:01:07:53:54:5d:65:7d:f7:8a:73:a1:
|
||||
9a:54:5a:1f:29:43:14:27:c2:85:0f:b5:88:7b:1a:3b:94:b7:
|
||||
1d:60:a7:b5:9c:e7:29:69:57:5a:9b:93:7a:43:30:1b:03:d7:
|
||||
62:c8:40:a6:aa:fc:64:e4:4a:d7:91:53:01:a8:20:88:6e:9c:
|
||||
5f:44:b9:cb:60:81:34:ec:6f:d3:7d:da:48:5f:eb:b4:90:bc:
|
||||
2d:a9:1c:0b:ac:1c:d5:a2:68:20:80:04:d6:fc:b1:8f:2f:bb:
|
||||
4a:31:0d:4a:86:1c:eb:e2:36:29:26:f5:da:d8:c4:f2:75:61:
|
||||
cf:7e:ae:76:63:4a:7a:40:65:93:87:f8:1e:80:8c:86:e5:86:
|
||||
d6:8f:0e:fc:53:2c:60:e8:16:61:1a:a2:3e:43:7b:cd:39:60:
|
||||
54:6a:f5:f2:89:26:01:68:83:48:a2:33:e8:c9:04:91:b2:11:
|
||||
34:11:3e:ea:d0:43:19:1f:03:93:90:0c:ff:51:3d:57:f4:41:
|
||||
6e:e1:cb:a0:be:eb:c9:63:cd:6d:cc:e4:f8:36:aa:68:9d:ed:
|
||||
bd:5d:97:70:44:0d:b6:0e:35:dc:e1:0c:5d:bb:a0:51:94:cb:
|
||||
7e:16:eb:11:2f:a3:92:45:c8:4c:71:d9:bc:c9:99:52:57:46:
|
||||
2f:50:cf:bd:35:69:f4:3d:15:ce:06:a5:2c:0f:3e:f6:81:ba:
|
||||
94:bb:c3:bb:bf:65:78:d2:86:79:ff:49:3b:1a:83:0c:f0:de:
|
||||
78:ec:c8:f2:4d:4c:1a:de:82:29:f8:c1:5a:da:ed:ee:e6:27:
|
||||
5e:e8:45:d0:9d:1c:51:a8:68:ab:44:e3:d0:8b:6a:e3:f8:3b:
|
||||
bb:dc:4d:d7:64:f2:51:be:e6:aa:ab:5a:e9:31:ee:06:bc:73:
|
||||
bf:13:62:0a:9f:c7:b9:97
|
||||
SHA1 Fingerprint=DA:FA:F7:FA:66:84:EC:06:8F:14:50:BD:C7:C2:81:A5:BC:A9:64:57
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd
|
||||
MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg
|
||||
Q2xhc3MgMyBSb290IENBMB4XDTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFow
|
||||
TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw
|
||||
HgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB
|
||||
BQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRHsJ8Y
|
||||
ZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3E
|
||||
N3coTRiR5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9
|
||||
tznDDgFHmV0ST9tD+leh7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX
|
||||
0DJq1l1sDPGzbjniazEuOQAnFN44wOwZZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c
|
||||
/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH2xc519woe2v1n/MuwU8X
|
||||
KhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV/afmiSTY
|
||||
zIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvS
|
||||
O1UQRwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D
|
||||
34xFMFbG02SrZvPAXpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgP
|
||||
K9Dx2hzLabjKSWJtyNBjYt1gD1iqj6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3
|
||||
AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFEe4zf/lb+74suwv
|
||||
Tg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAACAj
|
||||
QTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV
|
||||
cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXS
|
||||
IGrs/CIBKM+GuIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2
|
||||
HJLw5QY33KbmkJs4j1xrG0aGQ0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsa
|
||||
O5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8ZORK15FTAaggiG6cX0S5y2CBNOxv
|
||||
033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2KSb12tjE8nVhz36u
|
||||
dmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz6MkE
|
||||
kbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg41
|
||||
3OEMXbugUZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvD
|
||||
u79leNKGef9JOxqDDPDeeOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq
|
||||
4/g7u9xN12TyUb7mqqta6THuBrxzvxNiCp/HuZc=
|
||||
-----END CERTIFICATE-----
|
132
secure/caroot/trusted/CA_Disig_Root_R2.pem
Normal file
132
secure/caroot/trusted/CA_Disig_Root_R2.pem
Normal file
@ -0,0 +1,132 @@
|
||||
##
|
||||
## CA Disig Root R2
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
92:b8:88:db:b0:8a:c1:63
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = SK, L = Bratislava, O = Disig a.s., CN = CA Disig Root R2
|
||||
Validity
|
||||
Not Before: Jul 19 09:15:30 2012 GMT
|
||||
Not After : Jul 19 09:15:30 2042 GMT
|
||||
Subject: C = SK, L = Bratislava, O = Disig a.s., CN = CA Disig Root R2
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:a2:a3:c4:00:09:d6:85:5d:2d:6d:14:f6:c2:c3:
|
||||
73:9e:35:c2:71:55:7e:81:fb:ab:46:50:e0:c1:7c:
|
||||
49:78:e6:ab:79:58:3c:da:ff:7c:1c:9f:d8:97:02:
|
||||
78:3e:6b:41:04:e9:41:bd:be:03:2c:45:f6:2f:64:
|
||||
d4:ab:5d:a3:47:3d:64:9b:e9:68:9a:c6:cc:1b:3f:
|
||||
ba:be:b2:8b:34:02:2e:98:55:19:fc:8c:6f:aa:5f:
|
||||
da:4c:ce:4d:03:21:a3:d8:d2:34:93:56:96:cb:4c:
|
||||
0c:00:16:3c:5f:1a:cd:c8:c7:6c:a6:ad:d3:31:a7:
|
||||
bc:e8:e5:e1:66:d6:d2:fb:03:b4:41:65:c9:10:ae:
|
||||
0e:05:63:c6:80:6a:69:30:fd:d2:ee:90:ef:0d:27:
|
||||
df:9f:95:73:f4:e1:25:da:6c:16:de:41:38:34:ea:
|
||||
8b:fc:d1:e8:04:14:61:2d:41:7e:ac:c7:77:4e:cb:
|
||||
51:54:fb:5e:92:18:1b:04:5a:68:c6:c9:c4:fa:b7:
|
||||
13:a0:98:b7:11:2b:b7:d6:57:cc:7c:9e:17:d1:cb:
|
||||
25:fe:86:4e:24:2e:56:0c:78:4d:9e:01:12:a6:2b:
|
||||
a7:01:65:6e:7c:62:1d:84:84:df:ea:c0:6b:b5:a5:
|
||||
2a:95:83:c3:53:11:0c:73:1d:0b:b2:46:90:d1:42:
|
||||
3a:ce:40:6e:95:ad:ff:c6:94:ad:6e:97:84:8e:7d:
|
||||
6f:9e:8a:80:0d:49:6d:73:e2:7b:92:1e:c3:f3:c1:
|
||||
f3:eb:2e:05:6f:d9:1b:cf:37:76:04:c8:b4:5a:e4:
|
||||
17:a7:cb:dd:76:1f:d0:19:76:e8:2c:05:b3:d6:9c:
|
||||
34:d8:96:dc:61:87:91:05:e4:44:08:33:c1:da:b9:
|
||||
08:65:d4:ae:b2:36:0d:eb:ba:38:ba:0c:e5:9b:9e:
|
||||
eb:8d:66:dd:99:cf:d6:89:41:f6:04:92:8a:29:29:
|
||||
6d:6b:3a:1c:e7:75:7d:02:71:0e:f3:c0:e7:bd:cb:
|
||||
19:dd:9d:60:b2:c2:66:60:b6:b1:04:ee:c9:e6:86:
|
||||
b9:9a:66:40:a8:e7:11:ed:81:45:03:8b:f6:67:59:
|
||||
e8:c1:06:11:bd:dd:cf:80:02:4f:65:40:78:5c:47:
|
||||
50:c8:9b:e6:1f:81:7b:e4:44:a8:5b:85:9a:e2:de:
|
||||
5a:d5:c7:f9:3a:44:66:4b:e4:32:54:7c:e4:6c:9c:
|
||||
b3:0e:3d:17:a2:b2:34:12:d6:7e:b2:a8:49:bb:d1:
|
||||
7a:28:40:be:a2:16:1f:df:e4:37:1f:11:73:fb:90:
|
||||
0a:65:43:a2:0d:7c:f8:06:01:55:33:7d:b0:0d:b8:
|
||||
f4:f5:ae:a5:42:57:7c:36:11:8c:7b:5e:c4:03:9d:
|
||||
8c:79:9d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
B5:99:F8:AF:B0:94:F5:E3:20:D6:0A:AD:CE:4E:56:A4:2E:6E:42:ED
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
26:06:5e:70:e7:65:33:c8:82:6e:d9:9c:17:3a:1b:7a:66:b2:
|
||||
01:f6:78:3b:69:5e:2f:ea:ff:4e:f9:28:c3:98:2a:61:4c:b4:
|
||||
24:12:8a:7d:6d:11:14:f7:9c:b5:ca:e6:bc:9e:27:8e:4c:19:
|
||||
c8:a9:bd:7a:c0:d7:36:0e:6d:85:72:6e:a8:c6:a2:6d:f6:fa:
|
||||
73:63:7f:bc:6e:79:08:1c:9d:8a:9f:1a:8a:53:a6:d8:bb:d9:
|
||||
35:55:b1:11:c5:a9:03:b3:56:3b:b9:84:93:22:5e:7e:c1:f6:
|
||||
12:52:8b:ea:2c:67:bc:fe:36:4c:f5:b8:cf:d1:b3:49:92:3b:
|
||||
d3:29:0e:99:1b:96:f7:61:b8:3b:c4:2b:b6:78:6c:b4:23:6f:
|
||||
f0:fd:d3:b2:5e:75:1f:99:95:a8:ac:f6:da:e1:c5:31:7b:fb:
|
||||
d1:46:b3:d2:bc:67:b4:62:54:ba:09:f7:63:b0:93:a2:9a:f9:
|
||||
e9:52:2e:8b:60:12:ab:fc:f5:60:56:ef:10:5c:8b:c4:1a:42:
|
||||
dc:83:5b:64:0e:cb:b5:bc:d6:4f:c1:7c:3c:6e:8d:13:6d:fb:
|
||||
7b:eb:30:d0:dc:4d:af:c5:d5:b6:a5:4c:5b:71:c9:e8:31:be:
|
||||
e8:38:06:48:a1:1a:e2:ea:d2:de:12:39:58:1a:ff:80:0e:82:
|
||||
75:e6:b7:c9:07:6c:0e:ef:ff:38:f1:98:71:c4:b7:7f:0e:15:
|
||||
d0:25:69:bd:22:9d:2b:ed:05:f6:46:47:ac:ed:c0:f0:d4:3b:
|
||||
e2:ec:ee:96:5b:90:13:4e:1e:56:3a:eb:b0:ef:96:bb:96:23:
|
||||
11:ba:f2:43:86:74:64:95:c8:28:75:df:1d:35:ba:d2:37:83:
|
||||
38:53:38:36:3b:cf:6c:e9:f9:6b:0e:d0:fb:04:e8:4f:77:d7:
|
||||
65:01:78:86:0c:7a:3e:21:62:f1:7f:63:71:0c:c9:9f:44:db:
|
||||
a8:27:a2:75:be:6e:81:3e:d7:c0:eb:1b:98:0f:70:5c:34:b2:
|
||||
8a:cc:c0:85:18:eb:6e:7a:b3:f7:5a:a1:07:bf:a9:42:92:f3:
|
||||
60:22:97:e4:14:a1:07:9b:4e:76:c0:8e:7d:fd:a4:25:c7:47:
|
||||
ed:ff:1f:73:ac:cc:c3:a5:e9:6f:0a:8e:9b:65:c2:50:85:b5:
|
||||
a3:a0:53:12:cc:55:87:61:f3:81:ae:10:46:61:bd:44:21:b8:
|
||||
c2:3d:74:cf:7e:24:35:fa:1c:07:0e:9b:3d:22:ca:ef:31:2f:
|
||||
8c:ac:12:bd:ef:40:28:fc:29:67:9f:b2:13:4f:66:24:c4:53:
|
||||
19:e9:1e:29:15:ef:e6:6d:b0:7f:2d:67:fd:f3:6c:1b:75:46:
|
||||
a3:e5:4a:17:e9:a4:d7:0b
|
||||
SHA1 Fingerprint=B5:61:EB:EA:A4:DE:E4:25:4B:69:1A:98:A5:57:47:C2:34:C7:D9:71
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV
|
||||
BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu
|
||||
MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy
|
||||
MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx
|
||||
EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw
|
||||
ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe
|
||||
NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH
|
||||
PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I
|
||||
x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe
|
||||
QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR
|
||||
yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO
|
||||
QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912
|
||||
H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ
|
||||
QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD
|
||||
i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs
|
||||
nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1
|
||||
rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud
|
||||
DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI
|
||||
hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM
|
||||
tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf
|
||||
GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb
|
||||
lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka
|
||||
+elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal
|
||||
TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i
|
||||
nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3
|
||||
gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr
|
||||
G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os
|
||||
zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x
|
||||
L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL
|
||||
-----END CERTIFICATE-----
|
135
secure/caroot/trusted/CFCA_EV_ROOT.pem
Normal file
135
secure/caroot/trusted/CFCA_EV_ROOT.pem
Normal file
@ -0,0 +1,135 @@
|
||||
##
|
||||
## CFCA EV ROOT
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 407555286 (0x184accd6)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = CN, O = China Financial Certification Authority, CN = CFCA EV ROOT
|
||||
Validity
|
||||
Not Before: Aug 8 03:07:01 2012 GMT
|
||||
Not After : Dec 31 03:07:01 2029 GMT
|
||||
Subject: C = CN, O = China Financial Certification Authority, CN = CFCA EV ROOT
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:d7:5d:6b:cd:10:3f:1f:05:59:d5:05:4d:37:b1:
|
||||
0e:ec:98:2b:8e:15:1d:fa:93:4b:17:82:21:71:10:
|
||||
52:d7:51:64:70:16:c2:55:69:4d:8e:15:6d:9f:bf:
|
||||
0c:1b:c2:e0:a3:67:d6:0c:ac:cf:22:ae:af:77:54:
|
||||
2a:4b:4c:8a:53:52:7a:c3:ee:2e:de:b3:71:25:c1:
|
||||
e9:5d:3d:ee:a1:2f:a3:f7:2a:3c:c9:23:1d:6a:ab:
|
||||
1d:a1:a7:f1:f3:ec:a0:d5:44:cf:15:cf:72:2f:1d:
|
||||
63:97:e8:99:f9:fd:93:a4:54:80:4c:52:d4:52:ab:
|
||||
2e:49:df:90:cd:b8:5f:be:3f:de:a1:ca:4d:20:d4:
|
||||
25:e8:84:29:53:b7:b1:88:1f:ff:fa:da:90:9f:0a:
|
||||
a9:2d:41:3f:b1:f1:18:29:ee:16:59:2c:34:49:1a:
|
||||
a8:06:d7:a8:88:d2:03:72:7a:32:e2:ea:68:4d:6e:
|
||||
2c:96:65:7b:ca:59:fa:f2:e2:dd:ee:30:2c:fb:cc:
|
||||
46:ac:c4:63:eb:6f:7f:36:2b:34:73:12:94:7f:df:
|
||||
cc:26:9e:f1:72:5d:50:65:59:8f:69:b3:87:5e:32:
|
||||
6f:c3:18:8a:b5:95:8f:b0:7a:37:de:5a:45:3b:c7:
|
||||
36:e1:ef:67:d1:39:d3:97:5b:73:62:19:48:2d:87:
|
||||
1c:06:fb:74:98:20:49:73:f0:05:d2:1b:b1:a0:a3:
|
||||
b7:1b:70:d3:88:69:b9:5a:d6:38:f4:62:dc:25:8b:
|
||||
78:bf:f8:e8:7e:b8:5c:c9:95:4f:5f:a7:2d:b9:20:
|
||||
6b:cf:6b:dd:f5:0d:f4:82:b7:f4:b2:66:2e:10:28:
|
||||
f6:97:5a:7b:96:16:8f:01:19:2d:6c:6e:7f:39:58:
|
||||
06:64:83:01:83:83:c3:4d:92:dd:32:c6:87:a4:37:
|
||||
e9:16:ce:aa:2d:68:af:0a:81:65:3a:70:c1:9b:ad:
|
||||
4d:6d:54:ca:2a:2d:4b:85:1b:b3:80:e6:70:45:0d:
|
||||
6b:5e:35:f0:7f:3b:b8:9c:e4:04:70:89:12:25:93:
|
||||
da:0a:99:22:60:6a:63:60:4e:76:06:98:4e:bd:83:
|
||||
ad:1d:58:8a:25:85:d2:c7:65:1e:2d:8e:c6:df:b6:
|
||||
c6:e1:7f:8a:04:21:15:29:74:f0:3e:9c:90:9d:0c:
|
||||
2e:f1:8a:3e:5a:aa:0c:09:1e:c7:d5:3c:a3:ed:97:
|
||||
c3:1e:34:fa:38:f9:08:0e:e3:c0:5d:2b:83:d1:56:
|
||||
6a:c9:b6:a8:54:53:2e:78:32:67:3d:82:7f:74:d0:
|
||||
fb:e1:b6:05:60:b9:70:db:8e:0b:f9:13:58:6f:71:
|
||||
60:10:52:10:b9:c1:41:09:ef:72:1f:67:31:78:ff:
|
||||
96:05:8d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E3:FE:2D:FD:28:D0:0B:B5:BA:B6:A2:C4:BF:06:AA:05:8C:93:FB:2F
|
||||
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
E3:FE:2D:FD:28:D0:0B:B5:BA:B6:A2:C4:BF:06:AA:05:8C:93:FB:2F
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
25:c6:ba:6b:eb:87:cb:de:82:39:96:3d:f0:44:a7:6b:84:73:
|
||||
03:de:9d:2b:4f:ba:20:7f:bc:78:b2:cf:97:b0:1b:9c:f3:d7:
|
||||
79:2e:f5:48:b6:d2:fb:17:88:e6:d3:7a:3f:ed:53:13:d0:e2:
|
||||
2f:6a:79:cb:00:23:28:e6:1e:37:57:35:89:84:c2:76:4f:34:
|
||||
36:ad:67:c3:ce:41:06:88:c5:f7:ee:d8:1a:b8:d6:0b:7f:50:
|
||||
ff:93:aa:17:4b:8c:ec:ed:52:60:b2:a4:06:ea:4e:eb:f4:6b:
|
||||
19:fd:eb:f5:1a:e0:25:2a:9a:dc:c7:41:36:f7:c8:74:05:84:
|
||||
39:95:39:d6:0b:3b:a4:27:fa:08:d8:5c:1e:f8:04:60:52:11:
|
||||
28:28:03:ff:ef:53:66:00:a5:4a:34:16:66:7c:fd:09:a4:ae:
|
||||
9e:67:1a:6f:41:0b:6b:06:13:9b:8f:86:71:05:b4:2f:8d:89:
|
||||
66:33:29:76:54:9a:11:f8:27:fa:b2:3f:91:e0:ce:0d:1b:f3:
|
||||
30:1a:ad:bf:22:5d:1b:d3:bf:25:05:4d:e1:92:1a:7f:99:9f:
|
||||
3c:44:93:ca:d4:40:49:6c:80:87:d7:04:3a:c3:32:52:35:0e:
|
||||
56:f8:a5:dd:7d:c4:8b:0d:11:1f:53:cb:1e:b2:17:b6:68:77:
|
||||
5a:e0:d4:cb:c8:07:ae:f5:3a:2e:8e:37:b7:d0:01:4b:43:29:
|
||||
77:8c:39:97:8f:82:5a:f8:51:e5:89:a0:18:e7:68:7f:5d:0a:
|
||||
2e:fb:a3:47:0e:3d:a6:23:7a:c6:01:c7:8f:c8:5e:bf:6d:80:
|
||||
56:be:8a:24:ba:33:ea:9f:e1:32:11:9e:f1:d2:4f:80:f6:1b:
|
||||
40:af:38:9e:11:50:79:73:12:12:cd:e6:6c:9d:2c:88:72:3c:
|
||||
30:81:06:91:22:ea:59:ad:da:19:2e:22:c2:8d:b9:8c:87:e0:
|
||||
66:bc:73:23:5f:21:64:63:80:48:f5:a0:3c:18:3d:94:c8:48:
|
||||
41:1d:40:ba:5e:fe:fe:56:39:a1:c8:cf:5e:9e:19:64:46:10:
|
||||
da:17:91:b7:05:80:ac:8b:99:92:7d:e7:a2:d8:07:0b:36:27:
|
||||
e7:48:79:60:8a:c3:d7:13:5c:f8:72:40:df:4a:cb:cf:99:00:
|
||||
0a:00:0b:11:95:da:56:45:03:88:0a:9f:67:d0:d5:79:b1:a8:
|
||||
8d:40:6d:0d:c2:7a:40:fa:f3:5f:64:47:92:cb:53:b9:bb:59:
|
||||
ce:4f:fd:d0:15:53:01:d8:df:eb:d9:e6:76:ef:d0:23:bb:3b:
|
||||
a9:79:b3:d5:02:29:cd:89:a3:96:0f:4a:35:e7:4e:42:c0:75:
|
||||
cd:07:cf:e6:2c:eb:7b:2e
|
||||
SHA1 Fingerprint=E2:B8:29:4B:55:84:AB:6B:58:C2:90:46:6C:AC:3F:B8:39:8F:84:83
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD
|
||||
TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y
|
||||
aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx
|
||||
MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j
|
||||
aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP
|
||||
T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03
|
||||
sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL
|
||||
TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5
|
||||
/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp
|
||||
7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz
|
||||
EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt
|
||||
hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP
|
||||
a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot
|
||||
aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg
|
||||
TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV
|
||||
PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv
|
||||
cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL
|
||||
tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd
|
||||
BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB
|
||||
ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT
|
||||
ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL
|
||||
jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS
|
||||
ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy
|
||||
P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19
|
||||
xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d
|
||||
Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN
|
||||
5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe
|
||||
/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z
|
||||
AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ
|
||||
5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su
|
||||
-----END CERTIFICATE-----
|
100
secure/caroot/trusted/COMODO_Certification_Authority.pem
Normal file
100
secure/caroot/trusted/COMODO_Certification_Authority.pem
Normal file
@ -0,0 +1,100 @@
|
||||
##
|
||||
## COMODO Certification Authority
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
4e:81:2d:8a:82:65:e0:0b:02:ee:3e:35:02:46:e5:3d
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO Certification Authority
|
||||
Validity
|
||||
Not Before: Dec 1 00:00:00 2006 GMT
|
||||
Not After : Dec 31 23:59:59 2029 GMT
|
||||
Subject: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO Certification Authority
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d0:40:8b:8b:72:e3:91:1b:f7:51:c1:1b:54:04:
|
||||
98:d3:a9:bf:c1:e6:8a:5d:3b:87:fb:bb:88:ce:0d:
|
||||
e3:2f:3f:06:96:f0:a2:29:50:99:ae:db:3b:a1:57:
|
||||
b0:74:51:71:cd:ed:42:91:4d:41:fe:a9:c8:d8:6a:
|
||||
86:77:44:bb:59:66:97:50:5e:b4:d4:2c:70:44:cf:
|
||||
da:37:95:42:69:3c:30:c4:71:b3:52:f0:21:4d:a1:
|
||||
d8:ba:39:7c:1c:9e:a3:24:9d:f2:83:16:98:aa:16:
|
||||
7c:43:9b:15:5b:b7:ae:34:91:fe:d4:62:26:18:46:
|
||||
9a:3f:eb:c1:f9:f1:90:57:eb:ac:7a:0d:8b:db:72:
|
||||
30:6a:66:d5:e0:46:a3:70:dc:68:d9:ff:04:48:89:
|
||||
77:de:b5:e9:fb:67:6d:41:e9:bc:39:bd:32:d9:62:
|
||||
02:f1:b1:a8:3d:6e:37:9c:e2:2f:e2:d3:a2:26:8b:
|
||||
c6:b8:55:43:88:e1:23:3e:a5:d2:24:39:6a:47:ab:
|
||||
00:d4:a1:b3:a9:25:fe:0d:3f:a7:1d:ba:d3:51:c1:
|
||||
0b:a4:da:ac:38:ef:55:50:24:05:65:46:93:34:4f:
|
||||
2d:8d:ad:c6:d4:21:19:d2:8e:ca:05:61:71:07:73:
|
||||
47:e5:8a:19:12:bd:04:4d:ce:4e:9c:a5:48:ac:bb:
|
||||
26:f7
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
0B:58:E5:8B:C6:4C:15:37:A4:40:A9:30:A9:21:BE:47:36:5A:56:FF
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.comodoca.com/COMODOCertificationAuthority.crl
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
3e:98:9e:9b:f6:1b:e9:d7:39:b7:78:ae:1d:72:18:49:d3:87:
|
||||
e4:43:82:eb:3f:c9:aa:f5:a8:b5:ef:55:7c:21:52:65:f9:d5:
|
||||
0d:e1:6c:f4:3e:8c:93:73:91:2e:02:c4:4e:07:71:6f:c0:8f:
|
||||
38:61:08:a8:1e:81:0a:c0:2f:20:2f:41:8b:91:dc:48:45:bc:
|
||||
f1:c6:de:ba:76:6b:33:c8:00:2d:31:46:4c:ed:e7:9d:cf:88:
|
||||
94:ff:33:c0:56:e8:24:86:26:b8:d8:38:38:df:2a:6b:dd:12:
|
||||
cc:c7:3f:47:17:4c:a2:c2:06:96:09:d6:db:fe:3f:3c:46:41:
|
||||
df:58:e2:56:0f:3c:3b:c1:1c:93:35:d9:38:52:ac:ee:c8:ec:
|
||||
2e:30:4e:94:35:b4:24:1f:4b:78:69:da:f2:02:38:cc:95:52:
|
||||
93:f0:70:25:59:9c:20:67:c4:ee:f9:8b:57:61:f4:92:76:7d:
|
||||
3f:84:8d:55:b7:e8:e5:ac:d5:f1:f5:19:56:a6:5a:fb:90:1c:
|
||||
af:93:eb:e5:1c:d4:67:97:5d:04:0e:be:0b:83:a6:17:83:b9:
|
||||
30:12:a0:c5:33:15:05:b9:0d:fb:c7:05:76:e3:d8:4a:8d:fc:
|
||||
34:17:a3:c6:21:28:be:30:45:31:1e:c7:78:be:58:61:38:ac:
|
||||
3b:e2:01:65
|
||||
SHA1 Fingerprint=66:31:BF:9E:F7:4F:9E:B6:C9:D5:A6:0C:BA:6A:BE:D1:F7:BD:EF:7B
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB
|
||||
gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G
|
||||
A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV
|
||||
BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw
|
||||
MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl
|
||||
YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P
|
||||
RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0
|
||||
aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3
|
||||
UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI
|
||||
2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8
|
||||
Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp
|
||||
+2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+
|
||||
DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O
|
||||
nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW
|
||||
/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g
|
||||
PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u
|
||||
QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY
|
||||
SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv
|
||||
IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/
|
||||
RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4
|
||||
zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd
|
||||
BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB
|
||||
ZQ==
|
||||
-----END CERTIFICATE-----
|
67
secure/caroot/trusted/COMODO_ECC_Certification_Authority.pem
Normal file
67
secure/caroot/trusted/COMODO_ECC_Certification_Authority.pem
Normal file
@ -0,0 +1,67 @@
|
||||
##
|
||||
## COMODO ECC Certification Authority
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
1f:47:af:aa:62:00:70:50:54:4c:01:9e:9b:63:99:2a
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Authority
|
||||
Validity
|
||||
Not Before: Mar 6 00:00:00 2008 GMT
|
||||
Not After : Jan 18 23:59:59 2038 GMT
|
||||
Subject: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Authority
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:03:47:7b:2f:75:c9:82:15:85:fb:75:e4:91:16:
|
||||
d4:ab:62:99:f5:3e:52:0b:06:ce:41:00:7f:97:e1:
|
||||
0a:24:3c:1d:01:04:ee:3d:d2:8d:09:97:0c:e0:75:
|
||||
e4:fa:fb:77:8a:2a:f5:03:60:4b:36:8b:16:23:16:
|
||||
ad:09:71:f4:4a:f4:28:50:b4:fe:88:1c:6e:3f:6c:
|
||||
2f:2f:09:59:5b:a5:5b:0b:33:99:e2:c3:3d:89:f9:
|
||||
6a:2c:ef:b2:d3:06:e9
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
75:71:A7:19:48:19:BC:9D:9D:EA:41:47:DF:94:C4:48:77:99:D3:79
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
30:65:02:31:00:ef:03:5b:7a:ac:b7:78:0a:72:b7:88:df:ff:
|
||||
b5:46:14:09:0a:fa:a0:e6:7d:08:c6:1a:87:bd:18:a8:73:bd:
|
||||
26:ca:60:0c:9d:ce:99:9f:cf:5c:0f:30:e1:be:14:31:ea:02:
|
||||
30:14:f4:93:3c:49:a7:33:7a:90:46:47:b3:63:7d:13:9b:4e:
|
||||
b7:6f:18:37:80:53:fe:dd:20:e0:35:9a:36:d1:c7:01:b9:e6:
|
||||
dc:dd:f3:ff:1d:2c:3a:16:57:d9:92:39:d6
|
||||
SHA1 Fingerprint=9F:74:4E:9F:2B:4D:BA:EC:0F:31:2C:50:B6:56:3B:8E:2D:93:C3:11
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL
|
||||
MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE
|
||||
BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT
|
||||
IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw
|
||||
MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy
|
||||
ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N
|
||||
T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv
|
||||
biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR
|
||||
FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J
|
||||
cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW
|
||||
BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/
|
||||
BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm
|
||||
fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv
|
||||
GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY=
|
||||
-----END CERTIFICATE-----
|
135
secure/caroot/trusted/COMODO_RSA_Certification_Authority.pem
Normal file
135
secure/caroot/trusted/COMODO_RSA_Certification_Authority.pem
Normal file
@ -0,0 +1,135 @@
|
||||
##
|
||||
## COMODO RSA Certification Authority
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
4c:aa:f9:ca:db:63:6f:e0:1f:f7:4e:d8:5b:03:86:9d
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
Issuer: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority
|
||||
Validity
|
||||
Not Before: Jan 19 00:00:00 2010 GMT
|
||||
Not After : Jan 18 23:59:59 2038 GMT
|
||||
Subject: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:91:e8:54:92:d2:0a:56:b1:ac:0d:24:dd:c5:cf:
|
||||
44:67:74:99:2b:37:a3:7d:23:70:00:71:bc:53:df:
|
||||
c4:fa:2a:12:8f:4b:7f:10:56:bd:9f:70:72:b7:61:
|
||||
7f:c9:4b:0f:17:a7:3d:e3:b0:04:61:ee:ff:11:97:
|
||||
c7:f4:86:3e:0a:fa:3e:5c:f9:93:e6:34:7a:d9:14:
|
||||
6b:e7:9c:b3:85:a0:82:7a:76:af:71:90:d7:ec:fd:
|
||||
0d:fa:9c:6c:fa:df:b0:82:f4:14:7e:f9:be:c4:a6:
|
||||
2f:4f:7f:99:7f:b5:fc:67:43:72:bd:0c:00:d6:89:
|
||||
eb:6b:2c:d3:ed:8f:98:1c:14:ab:7e:e5:e3:6e:fc:
|
||||
d8:a8:e4:92:24:da:43:6b:62:b8:55:fd:ea:c1:bc:
|
||||
6c:b6:8b:f3:0e:8d:9a:e4:9b:6c:69:99:f8:78:48:
|
||||
30:45:d5:ad:e1:0d:3c:45:60:fc:32:96:51:27:bc:
|
||||
67:c3:ca:2e:b6:6b:ea:46:c7:c7:20:a0:b1:1f:65:
|
||||
de:48:08:ba:a4:4e:a9:f2:83:46:37:84:eb:e8:cc:
|
||||
81:48:43:67:4e:72:2a:9b:5c:bd:4c:1b:28:8a:5c:
|
||||
22:7b:b4:ab:98:d9:ee:e0:51:83:c3:09:46:4e:6d:
|
||||
3e:99:fa:95:17:da:7c:33:57:41:3c:8d:51:ed:0b:
|
||||
b6:5c:af:2c:63:1a:df:57:c8:3f:bc:e9:5d:c4:9b:
|
||||
af:45:99:e2:a3:5a:24:b4:ba:a9:56:3d:cf:6f:aa:
|
||||
ff:49:58:be:f0:a8:ff:f4:b8:ad:e9:37:fb:ba:b8:
|
||||
f4:0b:3a:f9:e8:43:42:1e:89:d8:84:cb:13:f1:d9:
|
||||
bb:e1:89:60:b8:8c:28:56:ac:14:1d:9c:0a:e7:71:
|
||||
eb:cf:0e:dd:3d:a9:96:a1:48:bd:3c:f7:af:b5:0d:
|
||||
22:4c:c0:11:81:ec:56:3b:f6:d3:a2:e2:5b:b7:b2:
|
||||
04:22:52:95:80:93:69:e8:8e:4c:65:f1:91:03:2d:
|
||||
70:74:02:ea:8b:67:15:29:69:52:02:bb:d7:df:50:
|
||||
6a:55:46:bf:a0:a3:28:61:7f:70:d0:c3:a2:aa:2c:
|
||||
21:aa:47:ce:28:9c:06:45:76:bf:82:18:27:b4:d5:
|
||||
ae:b4:cb:50:e6:6b:f4:4c:86:71:30:e9:a6:df:16:
|
||||
86:e0:d8:ff:40:dd:fb:d0:42:88:7f:a3:33:3a:2e:
|
||||
5c:1e:41:11:81:63:ce:18:71:6b:2b:ec:a6:8a:b7:
|
||||
31:5c:3a:6a:47:e0:c3:79:59:d6:20:1a:af:f2:6a:
|
||||
98:aa:72:bc:57:4a:d2:4b:9d:bb:10:fc:b0:4c:41:
|
||||
e5:ed:1d:3d:5e:28:9d:9c:cc:bf:b3:51:da:a7:47:
|
||||
e5:84:53
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
BB:AF:7E:02:3D:FA:A6:F1:3C:84:8E:AD:EE:38:98:EC:D9:32:32:D4
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
0a:f1:d5:46:84:b7:ae:51:bb:6c:b2:4d:41:14:00:93:4c:9c:
|
||||
cb:e5:c0:54:cf:a0:25:8e:02:f9:fd:b0:a2:0d:f5:20:98:3c:
|
||||
13:2d:ac:56:a2:b0:d6:7e:11:92:e9:2e:ba:9e:2e:9a:72:b1:
|
||||
bd:19:44:6c:61:35:a2:9a:b4:16:12:69:5a:8c:e1:d7:3e:a4:
|
||||
1a:e8:2f:03:f4:ae:61:1d:10:1b:2a:a4:8b:7a:c5:fe:05:a6:
|
||||
e1:c0:d6:c8:fe:9e:ae:8f:2b:ba:3d:99:f8:d8:73:09:58:46:
|
||||
6e:a6:9c:f4:d7:27:d3:95:da:37:83:72:1c:d3:73:e0:a2:47:
|
||||
99:03:38:5d:d5:49:79:00:29:1c:c7:ec:9b:20:1c:07:24:69:
|
||||
57:78:b2:39:fc:3a:84:a0:b5:9c:7c:8d:bf:2e:93:62:27:b7:
|
||||
39:da:17:18:ae:bd:3c:09:68:ff:84:9b:3c:d5:d6:0b:03:e3:
|
||||
57:9e:14:f7:d1:eb:4f:c8:bd:87:23:b7:b6:49:43:79:85:5c:
|
||||
ba:eb:92:0b:a1:c6:e8:68:a8:4c:16:b1:1a:99:0a:e8:53:2c:
|
||||
92:bb:a1:09:18:75:0c:65:a8:7b:cb:23:b7:1a:c2:28:85:c3:
|
||||
1b:ff:d0:2b:62:ef:a4:7b:09:91:98:67:8c:14:01:cd:68:06:
|
||||
6a:63:21:75:03:80:88:8a:6e:81:c6:85:f2:a9:a4:2d:e7:f4:
|
||||
a5:24:10:47:83:ca:cd:f4:8d:79:58:b1:06:9b:e7:1a:2a:d9:
|
||||
9d:01:d7:94:7d:ed:03:4a:ca:f0:db:e8:a9:01:3e:f5:56:99:
|
||||
c9:1e:8e:49:3d:bb:e5:09:b9:e0:4f:49:92:3d:16:82:40:cc:
|
||||
cc:59:c6:e6:3a:ed:12:2e:69:3c:6c:95:b1:fd:aa:1d:7b:7f:
|
||||
86:be:1e:0e:32:46:fb:fb:13:8f:75:7f:4c:8b:4b:46:63:fe:
|
||||
00:34:40:70:c1:c3:b9:a1:dd:a6:70:e2:04:b3:41:bc:e9:80:
|
||||
91:ea:64:9c:7a:e1:22:03:a9:9c:6e:6f:0e:65:4f:6c:87:87:
|
||||
5e:f3:6e:a0:f9:75:a5:9b:40:e8:53:b2:27:9d:4a:b9:c0:77:
|
||||
21:8d:ff:87:f2:de:bc:8c:ef:17:df:b7:49:0b:d1:f2:6e:30:
|
||||
0b:1a:0e:4e:76:ed:11:fc:f5:e9:56:b2:7d:bf:c7:6d:0a:93:
|
||||
8c:a5:d0:c0:b6:1d:be:3a:4e:94:a2:d7:6e:6c:0b:c2:8a:7c:
|
||||
fa:20:f3:c4:e4:e5:cd:0d:a8:cb:91:92:b1:7c:85:ec:b5:14:
|
||||
69:66:0e:82:e7:cd:ce:c8:2d:a6:51:7f:21:c1:35:53:85:06:
|
||||
4a:5d:9f:ad:bb:1b:5f:74
|
||||
SHA1 Fingerprint=AF:E5:D2:44:A8:D1:19:42:30:FF:47:9F:E2:F8:97:BB:CD:7A:8C:B4
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB
|
||||
hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G
|
||||
A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV
|
||||
BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5
|
||||
MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
|
||||
EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR
|
||||
Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh
|
||||
dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR
|
||||
6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X
|
||||
pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC
|
||||
9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV
|
||||
/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf
|
||||
Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z
|
||||
+pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w
|
||||
qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah
|
||||
SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC
|
||||
u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf
|
||||
Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq
|
||||
crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E
|
||||
FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB
|
||||
/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl
|
||||
wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM
|
||||
4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV
|
||||
2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna
|
||||
FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ
|
||||
CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK
|
||||
boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke
|
||||
jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL
|
||||
S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb
|
||||
QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl
|
||||
0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB
|
||||
NVOFBkpdn627G190
|
||||
-----END CERTIFICATE-----
|
112
secure/caroot/trusted/Camerfirma_Chambers_of_Commerce_Root.pem
Normal file
112
secure/caroot/trusted/Camerfirma_Chambers_of_Commerce_Root.pem
Normal file
@ -0,0 +1,112 @@
|
||||
##
|
||||
## Camerfirma Chambers of Commerce Root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 0 (0x0)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = EU, O = AC Camerfirma SA CIF A82743287, OU = http://www.chambersign.org, CN = Chambers of Commerce Root
|
||||
Validity
|
||||
Not Before: Sep 30 16:13:43 2003 GMT
|
||||
Not After : Sep 30 16:13:44 2037 GMT
|
||||
Subject: C = EU, O = AC Camerfirma SA CIF A82743287, OU = http://www.chambersign.org, CN = Chambers of Commerce Root
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b7:36:55:e5:a5:5d:18:30:e0:da:89:54:91:fc:
|
||||
c8:c7:52:f8:2f:50:d9:ef:b1:75:73:65:47:7d:1b:
|
||||
5b:ba:75:c5:fc:a1:88:24:fa:2f:ed:ca:08:4a:39:
|
||||
54:c4:51:7a:b5:da:60:ea:38:3c:81:b2:cb:f1:bb:
|
||||
d9:91:23:3f:48:01:70:75:a9:05:2a:ad:1f:71:f3:
|
||||
c9:54:3d:1d:06:6a:40:3e:b3:0c:85:ee:5c:1b:79:
|
||||
c2:62:c4:b8:36:8e:35:5d:01:0c:23:04:47:35:aa:
|
||||
9b:60:4e:a0:66:3d:cb:26:0a:9c:40:a1:f4:5d:98:
|
||||
bf:71:ab:a5:00:68:2a:ed:83:7a:0f:a2:14:b5:d4:
|
||||
22:b3:80:b0:3c:0c:5a:51:69:2d:58:18:8f:ed:99:
|
||||
9e:f1:ae:e2:95:e6:f6:47:a8:d6:0c:0f:b0:58:58:
|
||||
db:c3:66:37:9e:9b:91:54:33:37:d2:94:1c:6a:48:
|
||||
c9:c9:f2:a5:da:a5:0c:23:f7:23:0e:9c:32:55:5e:
|
||||
71:9c:84:05:51:9a:2d:fd:e6:4e:2a:34:5a:de:ca:
|
||||
40:37:67:0c:54:21:55:77:da:0a:0c:cc:97:ae:80:
|
||||
dc:94:36:4a:f4:3e:ce:36:13:1e:53:e4:ac:4e:3a:
|
||||
05:ec:db:ae:72:9c:38:8b:d0:39:3b:89:0a:3e:77:
|
||||
fe:75
|
||||
Exponent: 3 (0x3)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:12
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.chambersign.org/chambersroot.crl
|
||||
|
||||
X509v3 Subject Key Identifier:
|
||||
E3:94:F5:B1:4D:E9:DB:A1:29:5B:57:8B:4D:76:06:76:E1:D1:A2:8A
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Netscape Cert Type:
|
||||
SSL CA, S/MIME CA, Object Signing CA
|
||||
X509v3 Subject Alternative Name:
|
||||
email:chambersroot@chambersign.org
|
||||
X509v3 Issuer Alternative Name:
|
||||
email:chambersroot@chambersign.org
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.17326.10.3.1
|
||||
CPS: http://cps.chambersign.org/cps/chambersroot.html
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
0c:41:97:c2:1a:86:c0:22:7c:9f:fb:90:f3:1a:d1:03:b1:ef:
|
||||
13:f9:21:5f:04:9c:da:c9:a5:8d:27:6c:96:87:91:be:41:90:
|
||||
01:72:93:e7:1e:7d:5f:f6:89:c6:5d:a7:40:09:3d:ac:49:45:
|
||||
45:dc:2e:8d:30:68:b2:09:ba:fb:c3:2f:cc:ba:0b:df:3f:77:
|
||||
7b:46:7d:3a:12:24:8e:96:8f:3c:05:0a:6f:d2:94:28:1d:6d:
|
||||
0c:c0:2e:88:22:d5:d8:cf:1d:13:c7:f0:48:d7:d7:05:a7:cf:
|
||||
c7:47:9e:3b:3c:34:c8:80:4f:d4:14:bb:fc:0d:50:f7:fa:b3:
|
||||
ec:42:5f:a9:dd:6d:c8:f4:75:cf:7b:c1:72:26:b1:01:1c:5c:
|
||||
2c:fd:7a:4e:b4:01:c5:05:57:b9:e7:3c:aa:05:d9:88:e9:07:
|
||||
46:41:ce:ef:41:81:ae:58:df:83:a2:ae:ca:d7:77:1f:e7:00:
|
||||
3c:9d:6f:8e:e4:32:09:1d:4d:78:34:78:34:3c:94:9b:26:ed:
|
||||
4f:71:c6:19:7a:bd:20:22:48:5a:fe:4b:7d:03:b7:e7:58:be:
|
||||
c6:32:4e:74:1e:68:dd:a8:68:5b:b3:3e:ee:62:7d:d9:80:e8:
|
||||
0a:75:7a:b7:ee:b4:65:9a:21:90:e0:aa:d0:98:bc:38:b5:73:
|
||||
3c:8b:f8:dc
|
||||
SHA1 Fingerprint=6E:3A:55:A4:19:0C:19:5C:93:84:3C:C0:DB:72:2E:31:30:61:F0:B1
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEvTCCA6WgAwIBAgIBADANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJFVTEn
|
||||
MCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQL
|
||||
ExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEiMCAGA1UEAxMZQ2hhbWJlcnMg
|
||||
b2YgQ29tbWVyY2UgUm9vdDAeFw0wMzA5MzAxNjEzNDNaFw0zNzA5MzAxNjEzNDRa
|
||||
MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBB
|
||||
ODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIw
|
||||
IAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290MIIBIDANBgkqhkiG9w0B
|
||||
AQEFAAOCAQ0AMIIBCAKCAQEAtzZV5aVdGDDg2olUkfzIx1L4L1DZ77F1c2VHfRtb
|
||||
unXF/KGIJPov7coISjlUxFF6tdpg6jg8gbLL8bvZkSM/SAFwdakFKq0fcfPJVD0d
|
||||
BmpAPrMMhe5cG3nCYsS4No41XQEMIwRHNaqbYE6gZj3LJgqcQKH0XZi/caulAGgq
|
||||
7YN6D6IUtdQis4CwPAxaUWktWBiP7Zme8a7ileb2R6jWDA+wWFjbw2Y3npuRVDM3
|
||||
0pQcakjJyfKl2qUMI/cjDpwyVV5xnIQFUZot/eZOKjRa3spAN2cMVCFVd9oKDMyX
|
||||
roDclDZK9D7ONhMeU+SsTjoF7Nuucpw4i9A5O4kKPnf+dQIBA6OCAUQwggFAMBIG
|
||||
A1UdEwEB/wQIMAYBAf8CAQwwPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NybC5j
|
||||
aGFtYmVyc2lnbi5vcmcvY2hhbWJlcnNyb290LmNybDAdBgNVHQ4EFgQU45T1sU3p
|
||||
26EpW1eLTXYGduHRooowDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIA
|
||||
BzAnBgNVHREEIDAegRxjaGFtYmVyc3Jvb3RAY2hhbWJlcnNpZ24ub3JnMCcGA1Ud
|
||||
EgQgMB6BHGNoYW1iZXJzcm9vdEBjaGFtYmVyc2lnbi5vcmcwWAYDVR0gBFEwTzBN
|
||||
BgsrBgEEAYGHLgoDATA+MDwGCCsGAQUFBwIBFjBodHRwOi8vY3BzLmNoYW1iZXJz
|
||||
aWduLm9yZy9jcHMvY2hhbWJlcnNyb290Lmh0bWwwDQYJKoZIhvcNAQEFBQADggEB
|
||||
AAxBl8IahsAifJ/7kPMa0QOx7xP5IV8EnNrJpY0nbJaHkb5BkAFyk+cefV/2icZd
|
||||
p0AJPaxJRUXcLo0waLIJuvvDL8y6C98/d3tGfToSJI6WjzwFCm/SlCgdbQzALogi
|
||||
1djPHRPH8EjX1wWnz8dHnjs8NMiAT9QUu/wNUPf6s+xCX6ndbcj0dc97wXImsQEc
|
||||
XCz9ek60AcUFV7nnPKoF2YjpB0ZBzu9Bga5Y34OirsrXdx/nADydb47kMgkdTXg0
|
||||
eDQ8lJsm7U9xxhl6vSAiSFr+S30Dt+dYvsYyTnQeaN2oaFuzPu5ifdmA6Ap1erfu
|
||||
tGWaIZDgqtCYvDi1czyL+Nw=
|
||||
-----END CERTIFICATE-----
|
112
secure/caroot/trusted/Camerfirma_Global_Chambersign_Root.pem
Normal file
112
secure/caroot/trusted/Camerfirma_Global_Chambersign_Root.pem
Normal file
@ -0,0 +1,112 @@
|
||||
##
|
||||
## Camerfirma Global Chambersign Root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 0 (0x0)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = EU, O = AC Camerfirma SA CIF A82743287, OU = http://www.chambersign.org, CN = Global Chambersign Root
|
||||
Validity
|
||||
Not Before: Sep 30 16:14:18 2003 GMT
|
||||
Not After : Sep 30 16:14:18 2037 GMT
|
||||
Subject: C = EU, O = AC Camerfirma SA CIF A82743287, OU = http://www.chambersign.org, CN = Global Chambersign Root
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:a2:70:a2:d0:9f:42:ae:5b:17:c7:d8:7d:cf:14:
|
||||
83:fc:4f:c9:a1:b7:13:af:8a:d7:9e:3e:04:0a:92:
|
||||
8b:60:56:fa:b4:32:2f:88:4d:a1:60:08:f4:b7:09:
|
||||
4e:a0:49:2f:49:d6:d3:df:9d:97:5a:9f:94:04:70:
|
||||
ec:3f:59:d9:b7:cc:66:8b:98:52:28:09:02:df:c5:
|
||||
2f:84:8d:7a:97:77:bf:ec:40:9d:25:72:ab:b5:3f:
|
||||
32:98:fb:b7:b7:fc:72:84:e5:35:87:f9:55:fa:a3:
|
||||
1f:0e:6f:2e:28:dd:69:a0:d9:42:10:c6:f8:b5:44:
|
||||
c2:d0:43:7f:db:bc:e4:a2:3c:6a:55:78:0a:77:a9:
|
||||
d8:ea:19:32:b7:2f:fe:5c:3f:1b:ee:b1:98:ec:ca:
|
||||
ad:7a:69:45:e3:96:0f:55:f6:e6:ed:75:ea:65:e8:
|
||||
32:56:93:46:89:a8:25:8a:65:06:ee:6b:bf:79:07:
|
||||
d0:f1:b7:af:ed:2c:4d:92:bb:c0:a8:5f:a7:67:7d:
|
||||
04:f2:15:08:70:ac:92:d6:7d:04:d2:33:fb:4c:b6:
|
||||
0b:0b:fb:1a:c9:c4:8d:03:a9:7e:5c:f2:50:ab:12:
|
||||
a5:a1:cf:48:50:a5:ef:d2:c8:1a:13:fa:b0:7f:b1:
|
||||
82:1c:77:6a:0f:5f:dc:0b:95:8f:ef:43:7e:e6:45:
|
||||
09:25
|
||||
Exponent: 3 (0x3)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:12
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.chambersign.org/chambersignroot.crl
|
||||
|
||||
X509v3 Subject Key Identifier:
|
||||
43:9C:36:9F:B0:9E:30:4D:C6:CE:5F:AD:10:AB:E5:03:A5:FA:A9:14
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Netscape Cert Type:
|
||||
SSL CA, S/MIME CA, Object Signing CA
|
||||
X509v3 Subject Alternative Name:
|
||||
email:chambersignroot@chambersign.org
|
||||
X509v3 Issuer Alternative Name:
|
||||
email:chambersignroot@chambersign.org
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.17326.10.1.1
|
||||
CPS: http://cps.chambersign.org/cps/chambersignroot.html
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
3c:3b:70:91:f9:04:54:27:91:e1:ed:ed:fe:68:7f:61:5d:e5:
|
||||
41:65:4f:32:f1:18:05:94:6a:1c:de:1f:70:db:3e:7b:32:02:
|
||||
34:b5:0c:6c:a1:8a:7c:a5:f4:8f:ff:d4:d8:ad:17:d5:2d:04:
|
||||
d1:3f:58:80:e2:81:59:88:be:c0:e3:46:93:24:fe:90:bd:26:
|
||||
a2:30:2d:e8:97:26:57:35:89:74:96:18:f6:15:e2:af:24:19:
|
||||
56:02:02:b2:ba:0f:14:ea:c6:8a:66:c1:86:45:55:8b:be:92:
|
||||
be:9c:a4:04:c7:49:3c:9e:e8:29:7a:89:d7:fe:af:ff:68:f5:
|
||||
a5:17:90:bd:ac:99:cc:a5:86:57:09:67:46:db:d6:16:c2:46:
|
||||
f1:e4:a9:50:f5:8f:d1:92:15:d3:5f:3e:c6:00:49:3a:6e:58:
|
||||
b2:d1:d1:27:0d:25:c8:32:f8:20:11:cd:7d:32:33:48:94:54:
|
||||
4c:dd:dc:79:c4:30:9f:eb:8e:b8:55:b5:d7:88:5c:c5:6a:24:
|
||||
3d:b2:d3:05:03:51:c6:07:ef:cc:14:72:74:3d:6e:72:ce:18:
|
||||
28:8c:4a:a0:77:e5:09:2b:45:44:47:ac:b7:67:7f:01:8a:05:
|
||||
5a:93:be:a1:c1:ff:f8:e7:0e:67:a4:47:49:76:5d:75:90:1a:
|
||||
f5:26:8f:f0
|
||||
SHA1 Fingerprint=33:9B:6B:14:50:24:9B:55:7A:01:87:72:84:D9:E0:2F:C3:D2:D8:E9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIExTCCA62gAwIBAgIBADANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJFVTEn
|
||||
MCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQL
|
||||
ExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEgMB4GA1UEAxMXR2xvYmFsIENo
|
||||
YW1iZXJzaWduIFJvb3QwHhcNMDMwOTMwMTYxNDE4WhcNMzcwOTMwMTYxNDE4WjB9
|
||||
MQswCQYDVQQGEwJFVTEnMCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgy
|
||||
NzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEgMB4G
|
||||
A1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwggEgMA0GCSqGSIb3DQEBAQUA
|
||||
A4IBDQAwggEIAoIBAQCicKLQn0KuWxfH2H3PFIP8T8mhtxOviteePgQKkotgVvq0
|
||||
Mi+ITaFgCPS3CU6gSS9J1tPfnZdan5QEcOw/Wdm3zGaLmFIoCQLfxS+EjXqXd7/s
|
||||
QJ0lcqu1PzKY+7e3/HKE5TWH+VX6ox8Oby4o3Wmg2UIQxvi1RMLQQ3/bvOSiPGpV
|
||||
eAp3qdjqGTK3L/5cPxvusZjsyq16aUXjlg9V9ubtdepl6DJWk0aJqCWKZQbua795
|
||||
B9Dxt6/tLE2Su8CoX6dnfQTyFQhwrJLWfQTSM/tMtgsL+xrJxI0DqX5c8lCrEqWh
|
||||
z0hQpe/SyBoT+rB/sYIcd2oPX9wLlY/vQ37mRQklAgEDo4IBUDCCAUwwEgYDVR0T
|
||||
AQH/BAgwBgEB/wIBDDA/BgNVHR8EODA2MDSgMqAwhi5odHRwOi8vY3JsLmNoYW1i
|
||||
ZXJzaWduLm9yZy9jaGFtYmVyc2lnbnJvb3QuY3JsMB0GA1UdDgQWBBRDnDafsJ4w
|
||||
TcbOX60Qq+UDpfqpFDAOBgNVHQ8BAf8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAH
|
||||
MCoGA1UdEQQjMCGBH2NoYW1iZXJzaWducm9vdEBjaGFtYmVyc2lnbi5vcmcwKgYD
|
||||
VR0SBCMwIYEfY2hhbWJlcnNpZ25yb290QGNoYW1iZXJzaWduLm9yZzBbBgNVHSAE
|
||||
VDBSMFAGCysGAQQBgYcuCgEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly9jcHMuY2hh
|
||||
bWJlcnNpZ24ub3JnL2Nwcy9jaGFtYmVyc2lnbnJvb3QuaHRtbDANBgkqhkiG9w0B
|
||||
AQUFAAOCAQEAPDtwkfkEVCeR4e3t/mh/YV3lQWVPMvEYBZRqHN4fcNs+ezICNLUM
|
||||
bKGKfKX0j//U2K0X1S0E0T9YgOKBWYi+wONGkyT+kL0mojAt6JcmVzWJdJYY9hXi
|
||||
ryQZVgICsroPFOrGimbBhkVVi76SvpykBMdJPJ7oKXqJ1/6v/2j1pReQvayZzKWG
|
||||
VwlnRtvWFsJG8eSpUPWP0ZIV018+xgBJOm5YstHRJw0lyDL4IBHNfTIzSJRUTN3c
|
||||
ecQwn+uOuFW114hcxWokPbLTBQNRxgfvzBRydD1ucs4YKIxKoHflCStFREest2d/
|
||||
AYoFWpO+ocH/+OcOZ6RHSXZddZAa9SaP8A==
|
||||
-----END CERTIFICATE-----
|
99
secure/caroot/trusted/Certigna.pem
Normal file
99
secure/caroot/trusted/Certigna.pem
Normal file
@ -0,0 +1,99 @@
|
||||
##
|
||||
## Certigna
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
fe:dc:e3:01:0f:c9:48:ff
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = FR, O = Dhimyotis, CN = Certigna
|
||||
Validity
|
||||
Not Before: Jun 29 15:13:05 2007 GMT
|
||||
Not After : Jun 29 15:13:05 2027 GMT
|
||||
Subject: C = FR, O = Dhimyotis, CN = Certigna
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c8:68:f1:c9:d6:d6:b3:34:75:26:82:1e:ec:b4:
|
||||
be:ea:5c:e1:26:ed:11:47:61:e1:a2:7c:16:78:40:
|
||||
21:e4:60:9e:5a:c8:63:e1:c4:b1:96:92:ff:18:6d:
|
||||
69:23:e1:2b:62:f7:dd:e2:36:2f:91:07:b9:48:cf:
|
||||
0e:ec:79:b6:2c:e7:34:4b:70:08:25:a3:3c:87:1b:
|
||||
19:f2:81:07:0f:38:90:19:d3:11:fe:86:b4:f2:d1:
|
||||
5e:1e:1e:96:cd:80:6c:ce:3b:31:93:b6:f2:a0:d0:
|
||||
a9:95:12:7d:a5:9a:cc:6b:c8:84:56:8a:33:a9:e7:
|
||||
22:15:53:16:f0:cc:17:ec:57:5f:e9:a2:0a:98:09:
|
||||
de:e3:5f:9c:6f:dc:48:e3:85:0b:15:5a:a6:ba:9f:
|
||||
ac:48:e3:09:b2:f7:f4:32:de:5e:34:be:1c:78:5d:
|
||||
42:5b:ce:0e:22:8f:4d:90:d7:7d:32:18:b3:0b:2c:
|
||||
6a:bf:8e:3f:14:11:89:20:0e:77:14:b5:3d:94:08:
|
||||
87:f7:25:1e:d5:b2:60:00:ec:6f:2a:28:25:6e:2a:
|
||||
3e:18:63:17:25:3f:3e:44:20:16:f6:26:c8:25:ae:
|
||||
05:4a:b4:e7:63:2c:f3:8c:16:53:7e:5c:fb:11:1a:
|
||||
08:c1:46:62:9f:22:b8:f1:c2:8d:69:dc:fa:3a:58:
|
||||
06:df
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
1A:ED:FE:41:39:90:B4:24:59:BE:01:F2:52:D5:45:F6:5A:39:DC:11
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:1A:ED:FE:41:39:90:B4:24:59:BE:01:F2:52:D5:45:F6:5A:39:DC:11
|
||||
DirName:/C=FR/O=Dhimyotis/CN=Certigna
|
||||
serial:FE:DC:E3:01:0F:C9:48:FF
|
||||
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Netscape Cert Type:
|
||||
SSL CA, S/MIME CA, Object Signing CA
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
85:03:1e:92:71:f6:42:af:e1:a3:61:9e:eb:f3:c0:0f:f2:a5:
|
||||
d4:da:95:e6:d6:be:68:36:3d:7e:6e:1f:4c:8a:ef:d1:0f:21:
|
||||
6d:5e:a5:52:63:ce:12:f8:ef:2a:da:6f:eb:37:fe:13:02:c7:
|
||||
cb:3b:3e:22:6b:da:61:2e:7f:d4:72:3d:dd:30:e1:1e:4c:40:
|
||||
19:8c:0f:d7:9c:d1:83:30:7b:98:59:dc:7d:c6:b9:0c:29:4c:
|
||||
a1:33:a2:eb:67:3a:65:84:d3:96:e2:ed:76:45:70:8f:b5:2b:
|
||||
de:f9:23:d6:49:6e:3c:14:b5:c6:9f:35:1e:50:d0:c1:8f:6a:
|
||||
70:44:02:62:cb:ae:1d:68:41:a7:aa:57:e8:53:aa:07:d2:06:
|
||||
f6:d5:14:06:0b:91:03:75:2c:6c:72:b5:61:95:9a:0d:8b:b9:
|
||||
0d:e7:f5:df:54:cd:de:e6:d8:d6:09:08:97:63:e5:c1:2e:b0:
|
||||
b7:44:26:c0:26:c0:af:55:30:9e:3b:d5:36:2a:19:04:f4:5c:
|
||||
1e:ff:cf:2c:b7:ff:d0:fd:87:40:11:d5:11:23:bb:48:c0:21:
|
||||
a9:a4:28:2d:fd:15:f8:b0:4e:2b:f4:30:5b:21:fc:11:91:34:
|
||||
be:41:ef:7b:9d:97:75:ff:97:95:c0:96:58:2f:ea:bb:46:d7:
|
||||
bb:e4:d9:2e
|
||||
SHA1 Fingerprint=B1:2E:13:63:45:86:A4:6F:1A:B2:60:68:37:58:2D:C4:AC:FD:94:97
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV
|
||||
BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X
|
||||
DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ
|
||||
BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3
|
||||
DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4
|
||||
QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny
|
||||
gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw
|
||||
zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q
|
||||
130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2
|
||||
JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw
|
||||
DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw
|
||||
ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT
|
||||
AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj
|
||||
AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG
|
||||
9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h
|
||||
bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc
|
||||
fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu
|
||||
HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w
|
||||
t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw
|
||||
WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg==
|
||||
-----END CERTIFICATE-----
|
152
secure/caroot/trusted/Certigna_Root_CA.pem
Normal file
152
secure/caroot/trusted/Certigna_Root_CA.pem
Normal file
@ -0,0 +1,152 @@
|
||||
##
|
||||
## Certigna Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
ca:e9:1b:89:f1:55:03:0d:a3:e6:41:6d:c4:e3:a6:e1
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = FR, O = Dhimyotis, OU = 0002 48146308100036, CN = Certigna Root CA
|
||||
Validity
|
||||
Not Before: Oct 1 08:32:27 2013 GMT
|
||||
Not After : Oct 1 08:32:27 2033 GMT
|
||||
Subject: C = FR, O = Dhimyotis, OU = 0002 48146308100036, CN = Certigna Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:cd:18:39:65:1a:59:b1:ea:64:16:0e:8c:94:24:
|
||||
95:7c:83:d3:c5:39:26:dc:0c:ef:16:57:8d:d7:d8:
|
||||
ac:a3:42:7f:82:ca:ed:cd:5b:db:0e:b7:2d:ed:45:
|
||||
08:17:b2:d9:b3:cb:d6:17:52:72:28:db:8e:4e:9e:
|
||||
8a:b6:0b:f9:9e:84:9a:4d:76:de:22:29:5c:d2:b3:
|
||||
d2:06:3e:30:39:a9:74:a3:92:56:1c:a1:6f:4c:0a:
|
||||
20:6d:9f:23:7a:b4:c6:da:2c:e4:1d:2c:dc:b3:28:
|
||||
d0:13:f2:4c:4e:02:49:a1:54:40:9e:e6:e5:05:a0:
|
||||
2d:84:c8:ff:98:6c:d0:eb:8a:1a:84:08:1e:b7:68:
|
||||
23:ee:23:d5:70:ce:6d:51:69:10:ee:a1:7a:c2:d1:
|
||||
22:31:c2:82:85:d2:f2:55:76:50:7c:25:7a:c9:84:
|
||||
5c:0b:ac:dd:42:4e:2b:e7:82:a2:24:89:cb:90:b2:
|
||||
d0:ee:23:ba:66:4c:bb:62:a4:f9:53:5a:64:7b:7c:
|
||||
98:fa:a3:48:9e:0f:95:ae:a7:18:f4:6a:ec:2e:03:
|
||||
45:af:f0:74:f8:2a:cd:7a:5d:d1:be:44:26:32:29:
|
||||
f1:f1:f5:6c:cc:7e:02:21:0b:9f:6f:a4:3f:be:9d:
|
||||
53:e2:cf:7d:a9:2c:7c:58:1a:97:e1:3d:37:37:18:
|
||||
66:28:d2:40:c5:51:8a:8c:c3:2d:ce:53:88:24:58:
|
||||
64:30:16:c5:aa:e0:d6:0a:a6:40:df:78:f6:f5:04:
|
||||
7c:69:13:84:bc:d1:d1:a7:06:cf:01:f7:68:c0:a8:
|
||||
57:bb:3a:61:ad:04:8c:93:e3:ad:fc:f0:db:44:6d:
|
||||
59:dc:49:59:ae:ac:9a:99:36:30:41:7b:76:33:22:
|
||||
87:a3:c2:92:86:6e:f9:70:ee:ae:87:87:95:1b:c4:
|
||||
7a:bd:31:f3:d4:d2:e5:99:ff:be:48:ec:75:f5:78:
|
||||
16:1d:a6:70:c1:7f:3c:1b:a1:92:fb:cf:c8:3c:d6:
|
||||
c5:93:0a:8f:f5:55:3a:76:95:ce:59:98:8a:09:95:
|
||||
77:32:9a:83:ba:2c:04:3a:97:bd:d4:2f:be:d7:6c:
|
||||
9b:a2:ca:7d:6d:26:c9:55:d5:cf:c3:79:52:08:09:
|
||||
99:07:24:2d:64:25:6b:a6:21:69:9b:6a:dd:74:4d:
|
||||
6b:97:7a:41:bd:ab:17:f9:90:17:48:8f:36:f9:2d:
|
||||
d5:c5:db:ee:aa:85:45:41:fa:cd:3a:45:b1:68:e6:
|
||||
36:4c:9b:90:57:ec:23:b9:87:08:c2:c4:09:f1:97:
|
||||
86:2a:28:4d:e2:74:c0:da:c4:8c:db:df:e2:a1:17:
|
||||
59:ce:24:59:74:31:da:7f:fd:30:6d:d9:dc:e1:6a:
|
||||
e1:fc:5f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
18:87:56:E0:6E:77:EE:24:35:3C:4E:73:9A:1F:D6:E1:E2:79:7E:2B
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:18:87:56:E0:6E:77:EE:24:35:3C:4E:73:9A:1F:D6:E1:E2:79:7E:2B
|
||||
|
||||
X509v3 Certificate Policies:
|
||||
Policy: X509v3 Any Policy
|
||||
CPS: https://wwww.certigna.fr/autorites/
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.certigna.fr/certignarootca.crl
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.dhimyotis.com/certignarootca.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
94:b8:9e:4f:f0:e3:95:08:22:e7:cd:68:41:f7:1c:55:d5:7c:
|
||||
00:e2:2d:3a:89:5d:68:38:2f:51:22:0b:4a:8d:cb:e9:bb:5d:
|
||||
3e:bb:5c:3d:b1:28:fe:e4:53:55:13:cf:a1:90:1b:02:1d:5f:
|
||||
66:46:09:33:28:e1:0d:24:97:70:d3:10:1f:ea:64:57:96:bb:
|
||||
5d:da:e7:c4:8c:4f:4c:64:46:1d:5c:87:e3:59:de:42:d1:9b:
|
||||
a8:7e:a6:89:dd:8f:1c:c9:30:82:ed:3b:9c:cd:c0:e9:19:e0:
|
||||
6a:d8:02:75:37:ab:f7:34:28:28:91:f2:04:0a:4f:35:e3:60:
|
||||
26:01:fa:d0:11:8c:f9:11:6a:ee:af:3d:c3:50:d3:8f:5f:33:
|
||||
79:3c:86:a8:73:45:90:8c:20:b6:72:73:17:23:be:07:65:e5:
|
||||
78:92:0d:ba:01:c0:eb:8c:1c:66:bf:ac:86:77:01:94:0d:9c:
|
||||
e6:e9:39:8d:1f:a6:51:8c:99:0c:39:77:e1:b4:9b:fa:1c:67:
|
||||
57:6f:6a:6a:8e:a9:2b:4c:57:79:7a:57:22:cf:cd:5f:63:46:
|
||||
8d:5c:59:3a:86:f8:32:47:62:a3:67:0d:18:91:dc:fb:a6:6b:
|
||||
f5:48:61:73:23:59:8e:02:a7:bc:44:ea:f4:49:9d:f1:54:58:
|
||||
f9:60:af:da:18:a4:2f:28:45:dc:7a:a0:88:86:5d:f3:3b:e7:
|
||||
ff:29:35:80:fc:64:43:94:e6:e3:1c:6f:be:ad:0e:2a:63:99:
|
||||
2b:c9:7e:85:f6:71:e8:06:03:95:fe:de:8f:48:1c:5a:d4:92:
|
||||
e8:2b:ee:e7:31:db:ba:04:6a:87:98:e7:c5:5f:ef:7d:a7:22:
|
||||
f7:01:d8:4d:f9:89:d0:0e:9a:05:59:a4:9e:98:d9:6f:2b:ca:
|
||||
70:be:64:c2:55:a3:f4:e9:af:c3:92:29:dc:88:16:24:99:3c:
|
||||
8d:26:98:b6:5b:b7:cc:ce:b7:37:07:fd:26:d9:98:85:24:ff:
|
||||
59:23:03:9a:ed:9d:9d:a8:e4:5e:38:ce:d7:52:0d:6f:d2:3f:
|
||||
6d:b1:05:6b:49:ce:8a:91:46:73:f4:f6:2f:f0:a8:73:77:0e:
|
||||
65:ac:a1:8d:66:52:69:7e:4b:68:0c:c7:1e:37:27:83:a5:8c:
|
||||
c7:02:e4:14:cd:49:01:b0:73:b3:fd:c6:90:3a:6f:d2:6c:ed:
|
||||
3b:ee:ec:91:be:a2:43:5d:8b:00:4a:66:25:44:70:de:40:0f:
|
||||
f8:7c:15:f7:a2:ce:3c:d7:5e:13:8c:81:17:18:17:d1:bd:f1:
|
||||
77:10:3a:d4:65:39:c1:27:ac:57:2c:25:54:ff:a2:da:4f:8a:
|
||||
61:39:5e:ae:3d:4a:8c:bd
|
||||
SHA1 Fingerprint=2D:0D:52:14:FF:9E:AD:99:24:01:74:20:47:6E:6C:85:27:27:F5:43
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw
|
||||
WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw
|
||||
MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x
|
||||
MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD
|
||||
VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX
|
||||
BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
|
||||
ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO
|
||||
ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M
|
||||
CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu
|
||||
I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm
|
||||
TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh
|
||||
C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf
|
||||
ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz
|
||||
IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT
|
||||
Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k
|
||||
JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5
|
||||
hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB
|
||||
GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE
|
||||
FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of
|
||||
1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov
|
||||
L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo
|
||||
dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr
|
||||
aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq
|
||||
hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L
|
||||
6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG
|
||||
HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6
|
||||
0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB
|
||||
lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi
|
||||
o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1
|
||||
gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v
|
||||
faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63
|
||||
Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh
|
||||
jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw
|
||||
3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0=
|
||||
-----END CERTIFICATE-----
|
84
secure/caroot/trusted/Certum_Root_CA.pem
Normal file
84
secure/caroot/trusted/Certum_Root_CA.pem
Normal file
@ -0,0 +1,84 @@
|
||||
##
|
||||
## Certum Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 65568 (0x10020)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = PL, O = Unizeto Sp. z o.o., CN = Certum CA
|
||||
Validity
|
||||
Not Before: Jun 11 10:46:39 2002 GMT
|
||||
Not After : Jun 11 10:46:39 2027 GMT
|
||||
Subject: C = PL, O = Unizeto Sp. z o.o., CN = Certum CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ce:b1:c1:2e:d3:4f:7c:cd:25:ce:18:3e:4f:c4:
|
||||
8c:6f:80:6a:73:c8:5b:51:f8:9b:d2:dc:bb:00:5c:
|
||||
b1:a0:fc:75:03:ee:81:f0:88:ee:23:52:e9:e6:15:
|
||||
33:8d:ac:2d:09:c5:76:f9:2b:39:80:89:e4:97:4b:
|
||||
90:a5:a8:78:f8:73:43:7b:a4:61:b0:d8:58:cc:e1:
|
||||
6c:66:7e:9c:f3:09:5e:55:63:84:d5:a8:ef:f3:b1:
|
||||
2e:30:68:b3:c4:3c:d8:ac:6e:8d:99:5a:90:4e:34:
|
||||
dc:36:9a:8f:81:88:50:b7:6d:96:42:09:f3:d7:95:
|
||||
83:0d:41:4b:b0:6a:6b:f8:fc:0f:7e:62:9f:67:c4:
|
||||
ed:26:5f:10:26:0f:08:4f:f0:a4:57:28:ce:8f:b8:
|
||||
ed:45:f6:6e:ee:25:5d:aa:6e:39:be:e4:93:2f:d9:
|
||||
47:a0:72:eb:fa:a6:5b:af:ca:53:3f:e2:0e:c6:96:
|
||||
56:11:6e:f7:e9:66:a9:26:d8:7f:95:53:ed:0a:85:
|
||||
88:ba:4f:29:a5:42:8c:5e:b6:fc:85:20:00:aa:68:
|
||||
0b:a1:1a:85:01:9c:c4:46:63:82:88:b6:22:b1:ee:
|
||||
fe:aa:46:59:7e:cf:35:2c:d5:b6:da:5d:f7:48:33:
|
||||
14:54:b6:eb:d9:6f:ce:cd:88:d6:ab:1b:da:96:3b:
|
||||
1d:59
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
b8:8d:ce:ef:e7:14:ba:cf:ee:b0:44:92:6c:b4:39:3e:a2:84:
|
||||
6e:ad:b8:21:77:d2:d4:77:82:87:e6:20:41:81:ee:e2:f8:11:
|
||||
b7:63:d1:17:37:be:19:76:24:1c:04:1a:4c:eb:3d:aa:67:6f:
|
||||
2d:d4:cd:fe:65:31:70:c5:1b:a6:02:0a:ba:60:7b:6d:58:c2:
|
||||
9a:49:fe:63:32:0b:6b:e3:3a:c0:ac:ab:3b:b0:e8:d3:09:51:
|
||||
8c:10:83:c6:34:e0:c5:2b:e0:1a:b6:60:14:27:6c:32:77:8c:
|
||||
bc:b2:72:98:cf:cd:cc:3f:b9:c8:24:42:14:d6:57:fc:e6:26:
|
||||
43:a9:1d:e5:80:90:ce:03:54:28:3e:f7:3f:d3:f8:4d:ed:6a:
|
||||
0a:3a:93:13:9b:3b:14:23:13:63:9c:3f:d1:87:27:79:e5:4c:
|
||||
51:e3:01:ad:85:5d:1a:3b:b1:d5:73:10:a4:d3:f2:bc:6e:64:
|
||||
f5:5a:56:90:a8:c7:0e:4c:74:0f:2e:71:3b:f7:c8:47:f4:69:
|
||||
6f:15:f2:11:5e:83:1e:9c:7c:52:ae:fd:02:da:12:a8:59:67:
|
||||
18:db:bc:70:dd:9b:b1:69:ed:80:ce:89:40:48:6a:0e:35:ca:
|
||||
29:66:15:21:94:2c:e8:60:2a:9b:85:4a:40:f3:6b:8a:24:ec:
|
||||
06:16:2c:73
|
||||
SHA1 Fingerprint=62:52:DC:40:F7:11:43:A2:2F:DE:9E:F7:34:8E:06:42:51:B1:81:18
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDDDCCAfSgAwIBAgIDAQAgMA0GCSqGSIb3DQEBBQUAMD4xCzAJBgNVBAYTAlBM
|
||||
MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD
|
||||
QTAeFw0wMjA2MTExMDQ2MzlaFw0yNzA2MTExMDQ2MzlaMD4xCzAJBgNVBAYTAlBM
|
||||
MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD
|
||||
QTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6xwS7TT3zNJc4YPk/E
|
||||
jG+AanPIW1H4m9LcuwBcsaD8dQPugfCI7iNS6eYVM42sLQnFdvkrOYCJ5JdLkKWo
|
||||
ePhzQ3ukYbDYWMzhbGZ+nPMJXlVjhNWo7/OxLjBos8Q82KxujZlakE403Daaj4GI
|
||||
ULdtlkIJ89eVgw1BS7Bqa/j8D35in2fE7SZfECYPCE/wpFcozo+47UX2bu4lXapu
|
||||
Ob7kky/ZR6By6/qmW6/KUz/iDsaWVhFu9+lmqSbYf5VT7QqFiLpPKaVCjF62/IUg
|
||||
AKpoC6EahQGcxEZjgoi2IrHu/qpGWX7PNSzVttpd90gzFFS269lvzs2I1qsb2pY7
|
||||
HVkCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEA
|
||||
uI3O7+cUus/usESSbLQ5PqKEbq24IXfS1HeCh+YgQYHu4vgRt2PRFze+GXYkHAQa
|
||||
TOs9qmdvLdTN/mUxcMUbpgIKumB7bVjCmkn+YzILa+M6wKyrO7Do0wlRjBCDxjTg
|
||||
xSvgGrZgFCdsMneMvLJymM/NzD+5yCRCFNZX/OYmQ6kd5YCQzgNUKD73P9P4Te1q
|
||||
CjqTE5s7FCMTY5w/0YcneeVMUeMBrYVdGjux1XMQpNPyvG5k9VpWkKjHDkx0Dy5x
|
||||
O/fIR/RpbxXyEV6DHpx8Uq79AtoSqFlnGNu8cN2bsWntgM6JQEhqDjXKKWYVIZQs
|
||||
6GAqm4VKQPNriiTsBhYscw==
|
||||
-----END CERTIFICATE-----
|
91
secure/caroot/trusted/Certum_Trusted_Network_CA.pem
Normal file
91
secure/caroot/trusted/Certum_Trusted_Network_CA.pem
Normal file
@ -0,0 +1,91 @@
|
||||
##
|
||||
## Certum Trusted Network CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 279744 (0x444c0)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = PL, O = Unizeto Technologies S.A., OU = Certum Certification Authority, CN = Certum Trusted Network CA
|
||||
Validity
|
||||
Not Before: Oct 22 12:07:37 2008 GMT
|
||||
Not After : Dec 31 12:07:37 2029 GMT
|
||||
Subject: C = PL, O = Unizeto Technologies S.A., OU = Certum Certification Authority, CN = Certum Trusted Network CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e3:fb:7d:a3:72:ba:c2:f0:c9:14:87:f5:6b:01:
|
||||
4e:e1:6e:40:07:ba:6d:27:5d:7f:f7:5b:2d:b3:5a:
|
||||
c7:51:5f:ab:a4:32:a6:61:87:b6:6e:0f:86:d2:30:
|
||||
02:97:f8:d7:69:57:a1:18:39:5d:6a:64:79:c6:01:
|
||||
59:ac:3c:31:4a:38:7c:d2:04:d2:4b:28:e8:20:5f:
|
||||
3b:07:a2:cc:4d:73:db:f3:ae:4f:c7:56:d5:5a:a7:
|
||||
96:89:fa:f3:ab:68:d4:23:86:59:27:cf:09:27:bc:
|
||||
ac:6e:72:83:1c:30:72:df:e0:a2:e9:d2:e1:74:75:
|
||||
19:bd:2a:9e:7b:15:54:04:1b:d7:43:39:ad:55:28:
|
||||
c5:e2:1a:bb:f4:c0:e4:ae:38:49:33:cc:76:85:9f:
|
||||
39:45:d2:a4:9e:f2:12:8c:51:f8:7c:e4:2d:7f:f5:
|
||||
ac:5f:eb:16:9f:b1:2d:d1:ba:cc:91:42:77:4c:25:
|
||||
c9:90:38:6f:db:f0:cc:fb:8e:1e:97:59:3e:d5:60:
|
||||
4e:e6:05:28:ed:49:79:13:4b:ba:48:db:2f:f9:72:
|
||||
d3:39:ca:fe:1f:d8:34:72:f5:b4:40:cf:31:01:c3:
|
||||
ec:de:11:2d:17:5d:1f:b8:50:d1:5e:19:a7:69:de:
|
||||
07:33:28:ca:50:95:f9:a7:54:cb:54:86:50:45:a9:
|
||||
f9:49
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
08:76:CD:CB:07:FF:24:F6:C5:CD:ED:BB:90:BC:E2:84:37:46:75:F7
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
a6:a8:ad:22:ce:01:3d:a6:a3:ff:62:d0:48:9d:8b:5e:72:b0:
|
||||
78:44:e3:dc:1c:af:09:fd:23:48:fa:bd:2a:c4:b9:55:04:b5:
|
||||
10:a3:8d:27:de:0b:82:63:d0:ee:de:0c:37:79:41:5b:22:b2:
|
||||
b0:9a:41:5c:a6:70:e0:d4:d0:77:cb:23:d3:00:e0:6c:56:2f:
|
||||
e1:69:0d:0d:d9:aa:bf:21:81:50:d9:06:a5:a8:ff:95:37:d0:
|
||||
aa:fe:e2:b3:f5:99:2d:45:84:8a:e5:42:09:d7:74:02:2f:f7:
|
||||
89:d8:99:e9:bc:27:d4:47:8d:ba:0d:46:1c:77:cf:14:a4:1c:
|
||||
b9:a4:31:c4:9c:28:74:03:34:ff:33:19:26:a5:e9:0d:74:b7:
|
||||
3e:97:c6:76:e8:27:96:a3:66:dd:e1:ae:f2:41:5b:ca:98:56:
|
||||
83:73:70:e4:86:1a:d2:31:41:ba:2f:be:2d:13:5a:76:6f:4e:
|
||||
e8:4e:81:0e:3f:5b:03:22:a0:12:be:66:58:11:4a:cb:03:c4:
|
||||
b4:2a:2a:2d:96:17:e0:39:54:bc:48:d3:76:27:9d:9a:2d:06:
|
||||
a6:c9:ec:39:d2:ab:db:9f:9a:0b:27:02:35:29:b1:40:95:e7:
|
||||
f9:e8:9c:55:88:19:46:d6:b7:34:f5:7e:ce:39:9a:d9:38:f1:
|
||||
51:f7:4f:2c
|
||||
SHA1 Fingerprint=07:E0:32:E0:20:B7:2C:3F:19:2F:06:28:A2:59:3A:19:A7:0F:06:9E
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM
|
||||
MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D
|
||||
ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU
|
||||
cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3
|
||||
WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg
|
||||
Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw
|
||||
IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B
|
||||
AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH
|
||||
UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM
|
||||
TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU
|
||||
BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM
|
||||
kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x
|
||||
AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV
|
||||
HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV
|
||||
HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y
|
||||
sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL
|
||||
I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8
|
||||
J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY
|
||||
VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI
|
||||
03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw=
|
||||
-----END CERTIFICATE-----
|
135
secure/caroot/trusted/Certum_Trusted_Network_CA_2.pem
Normal file
135
secure/caroot/trusted/Certum_Trusted_Network_CA_2.pem
Normal file
@ -0,0 +1,135 @@
|
||||
##
|
||||
## Certum Trusted Network CA 2
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
21:d6:d0:4a:4f:25:0f:c9:32:37:fc:aa:5e:12:8d:e9
|
||||
Signature Algorithm: sha512WithRSAEncryption
|
||||
Issuer: C = PL, O = Unizeto Technologies S.A., OU = Certum Certification Authority, CN = Certum Trusted Network CA 2
|
||||
Validity
|
||||
Not Before: Oct 6 08:39:56 2011 GMT
|
||||
Not After : Oct 6 08:39:56 2046 GMT
|
||||
Subject: C = PL, O = Unizeto Technologies S.A., OU = Certum Certification Authority, CN = Certum Trusted Network CA 2
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:bd:f9:78:f8:e6:d5:80:0c:64:9d:86:1b:96:64:
|
||||
67:3f:22:3a:1e:75:01:7d:ef:fb:5c:67:8c:c9:cc:
|
||||
5c:6b:a9:91:e6:b9:42:e5:20:4b:9b:da:9b:7b:b9:
|
||||
99:5d:d9:9b:80:4b:d7:84:40:2b:27:d3:e8:ba:30:
|
||||
bb:3e:09:1a:a7:49:95:ef:2b:40:24:c2:97:c7:a7:
|
||||
ee:9b:25:ef:a8:0a:00:97:85:5a:aa:9d:dc:29:c9:
|
||||
e2:35:07:eb:70:4d:4a:d6:c1:b3:56:b8:a1:41:38:
|
||||
9b:d1:fb:31:7f:8f:e0:5f:e1:b1:3f:0f:8e:16:49:
|
||||
60:d7:06:8d:18:f9:aa:26:10:ab:2a:d3:d0:d1:67:
|
||||
8d:1b:46:be:47:30:d5:2e:72:d1:c5:63:da:e7:63:
|
||||
79:44:7e:4b:63:24:89:86:2e:34:3f:29:4c:52:8b:
|
||||
2a:a7:c0:e2:91:28:89:b9:c0:5b:f9:1d:d9:e7:27:
|
||||
ad:ff:9a:02:97:c1:c6:50:92:9b:02:2c:bd:a9:b9:
|
||||
34:59:0a:bf:84:4a:ff:df:fe:b3:9f:eb:d9:9e:e0:
|
||||
98:23:ec:a6:6b:77:16:2a:db:cc:ad:3b:1c:a4:87:
|
||||
dc:46:73:5e:19:62:68:45:57:e4:90:82:42:bb:42:
|
||||
d6:f0:61:e0:c1:a3:3d:66:a3:5d:f4:18:ee:88:c9:
|
||||
8d:17:45:29:99:32:75:02:31:ee:29:26:c8:6b:02:
|
||||
e6:b5:62:45:7f:37:15:5a:23:68:89:d4:3e:de:4e:
|
||||
27:b0:f0:40:0c:bc:4d:17:cb:4d:a2:b3:1e:d0:06:
|
||||
5a:dd:f6:93:cf:57:75:99:f5:fa:86:1a:67:78:b3:
|
||||
bf:96:fe:34:dc:bd:e7:52:56:e5:b3:e5:75:7b:d7:
|
||||
41:91:05:dc:5d:69:e3:95:0d:43:b9:fc:83:96:39:
|
||||
95:7b:6c:80:5a:4f:13:72:c6:d7:7d:29:7a:44:ba:
|
||||
52:a4:2a:d5:41:46:09:20:fe:22:a0:b6:5b:30:8d:
|
||||
bc:89:0c:d5:d7:70:f8:87:52:fd:da:ef:ac:51:2e:
|
||||
07:b3:4e:fe:d0:09:da:70:ef:98:fa:56:e6:6d:db:
|
||||
b5:57:4b:dc:e5:2c:25:15:c8:9e:2e:78:4e:f8:da:
|
||||
9c:9e:86:2c:ca:57:f3:1a:e5:c8:92:8b:1a:82:96:
|
||||
7a:c3:bc:50:12:69:d8:0e:5a:46:8b:3a:eb:26:fa:
|
||||
23:c9:b6:b0:81:be:42:00:a4:f8:d6:fe:30:2e:c7:
|
||||
d2:46:f6:e5:8e:75:fd:f2:cc:b9:d0:87:5b:cc:06:
|
||||
10:60:bb:83:35:b7:5e:67:de:47:ec:99:48:f1:a4:
|
||||
a1:15:fe:ad:8c:62:8e:39:55:4f:39:16:b9:b1:63:
|
||||
9d:ff:b7
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
B6:A1:54:39:02:C3:A0:3F:8E:8A:BC:FA:D4:F8:1C:A6:D1:3A:0E:FD
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha512WithRSAEncryption
|
||||
71:a5:0e:ce:e4:e9:bf:3f:38:d5:89:5a:c4:02:61:fb:4c:c5:
|
||||
14:17:2d:8b:4f:53:6b:10:17:fc:65:84:c7:10:49:90:de:db:
|
||||
c7:26:93:88:26:6f:70:d6:02:5e:39:a0:f7:8f:ab:96:b5:a5:
|
||||
13:5c:81:14:6d:0e:81:82:11:1b:8a:4e:c6:4f:a5:dd:62:1e:
|
||||
44:df:09:59:f4:5b:77:0b:37:e9:8b:20:c6:f8:0a:4e:2e:58:
|
||||
1c:eb:33:d0:cf:86:60:c9:da:fb:80:2f:9e:4c:60:84:78:3d:
|
||||
21:64:d6:fb:41:1f:18:0f:e7:c9:75:71:bd:bd:5c:de:34:87:
|
||||
3e:41:b0:0e:f6:b9:d6:3f:09:13:96:14:2f:de:9a:1d:5a:b9:
|
||||
56:ce:35:3a:b0:5f:70:4d:5e:e3:29:f1:23:28:72:59:b6:ab:
|
||||
c2:8c:66:26:1c:77:2c:26:76:35:8b:28:a7:69:a0:f9:3b:f5:
|
||||
23:dd:85:10:74:c9:90:03:56:91:e7:af:ba:47:d4:12:97:11:
|
||||
22:e3:a2:49:94:6c:e7:b7:94:4b:ba:2d:a4:da:33:8b:4c:a6:
|
||||
44:ff:5a:3c:c6:1d:64:d8:b5:31:e4:a6:3c:7a:a8:57:0b:db:
|
||||
ed:61:1a:cb:f1:ce:73:77:63:a4:87:6f:4c:51:38:d6:e4:5f:
|
||||
c7:9f:b6:81:2a:e4:85:48:79:58:5e:3b:f8:db:02:82:67:c1:
|
||||
39:db:c3:74:4b:3d:36:1e:f9:29:93:88:68:5b:a8:44:19:21:
|
||||
f0:a7:e8:81:0d:2c:e8:93:36:b4:37:b2:ca:b0:1b:26:7a:9a:
|
||||
25:1f:9a:9a:80:9e:4b:2a:3f:fb:a3:9a:fe:73:32:71:c2:9e:
|
||||
c6:72:e1:8a:68:27:f1:e4:0f:b4:c4:4c:a5:61:93:f8:97:10:
|
||||
07:2a:30:25:a9:b9:c8:71:b8:ef:68:cc:2d:7e:f5:e0:7e:0f:
|
||||
82:a8:6f:b6:ba:6c:83:43:77:cd:8a:92:17:a1:9e:5b:78:16:
|
||||
3d:45:e2:33:72:dd:e1:66:ca:99:d3:c9:c5:26:fd:0d:68:04:
|
||||
46:ae:b6:d9:9b:8c:be:19:be:b1:c6:f2:19:e3:5c:02:ca:2c:
|
||||
d8:6f:4a:07:d9:c9:35:da:40:75:f2:c4:a7:19:6f:9e:42:10:
|
||||
98:75:e6:95:8b:60:bc:ed:c5:12:d7:8a:ce:d5:98:5c:56:96:
|
||||
03:c5:ee:77:06:35:ff:cf:e4:ee:3f:13:61:ee:db:da:2d:85:
|
||||
f0:cd:ae:9d:b2:18:09:45:c3:92:a1:72:17:fc:47:b6:a0:0b:
|
||||
2c:f1:c4:de:43:68:08:6a:5f:3b:f0:76:63:fb:cc:06:2c:a6:
|
||||
c6:e2:0e:b5:b9:be:24:8f
|
||||
SHA1 Fingerprint=D3:DD:48:3E:2B:BF:4C:05:E8:AF:10:F5:FA:76:26:CF:D3:DC:30:92
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB
|
||||
gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu
|
||||
QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG
|
||||
A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz
|
||||
OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ
|
||||
VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp
|
||||
ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3
|
||||
b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA
|
||||
DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn
|
||||
0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB
|
||||
OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE
|
||||
fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E
|
||||
Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m
|
||||
o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i
|
||||
sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW
|
||||
OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez
|
||||
Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS
|
||||
adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n
|
||||
3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD
|
||||
AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC
|
||||
AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ
|
||||
F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf
|
||||
CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29
|
||||
XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm
|
||||
djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/
|
||||
WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb
|
||||
AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq
|
||||
P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko
|
||||
b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj
|
||||
XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P
|
||||
5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi
|
||||
DrW5viSP
|
||||
-----END CERTIFICATE-----
|
152
secure/caroot/trusted/Chambers_of_Commerce_Root_-_2008.pem
Normal file
152
secure/caroot/trusted/Chambers_of_Commerce_Root_-_2008.pem
Normal file
@ -0,0 +1,152 @@
|
||||
##
|
||||
## Chambers of Commerce Root - 2008
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
a3:da:42:7e:a4:b1:ae:da
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = EU, L = Madrid (see current address at www.camerfirma.com/address), serialNumber = A82743287, O = AC Camerfirma S.A., CN = Chambers of Commerce Root - 2008
|
||||
Validity
|
||||
Not Before: Aug 1 12:29:50 2008 GMT
|
||||
Not After : Jul 31 12:29:50 2038 GMT
|
||||
Subject: C = EU, L = Madrid (see current address at www.camerfirma.com/address), serialNumber = A82743287, O = AC Camerfirma S.A., CN = Chambers of Commerce Root - 2008
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:af:00:cb:70:37:2b:80:5a:4a:3a:6c:78:94:7d:
|
||||
a3:7f:1a:1f:f6:35:d5:bd:db:cb:0d:44:72:3e:26:
|
||||
b2:90:52:ba:63:3b:28:58:6f:a5:b3:6d:94:a6:f3:
|
||||
dd:64:0c:55:f6:f6:e7:f2:22:22:80:5e:e1:62:c6:
|
||||
b6:29:e1:81:6c:f2:bf:e5:7d:32:6a:54:a0:32:19:
|
||||
59:fe:1f:8b:d7:3d:60:86:85:24:6f:e3:11:b3:77:
|
||||
3e:20:96:35:21:6b:b3:08:d9:70:2e:64:f7:84:92:
|
||||
53:d6:0e:b0:90:8a:8a:e3:87:8d:06:d3:bd:90:0e:
|
||||
e2:99:a1:1b:86:0e:da:9a:0a:bb:0b:61:50:06:52:
|
||||
f1:9e:7f:76:ec:cb:0f:d0:1e:0d:cf:99:30:3d:1c:
|
||||
c4:45:10:58:ac:d6:d3:e8:d7:e5:ea:c5:01:07:77:
|
||||
d6:51:e6:03:7f:8a:48:a5:4d:68:75:b9:e9:bc:9e:
|
||||
4e:19:71:f5:32:4b:9c:6d:60:19:0b:fb:cc:9d:75:
|
||||
dc:bf:26:cd:8f:93:78:39:79:73:5e:25:0e:ca:5c:
|
||||
eb:77:12:07:cb:64:41:47:72:93:ab:50:c3:eb:09:
|
||||
76:64:34:d2:39:b7:76:11:09:0d:76:45:c4:a9:ae:
|
||||
3d:6a:af:b5:7d:65:2f:94:58:10:ec:5c:7c:af:7e:
|
||||
e2:b6:18:d9:d0:9b:4e:5a:49:df:a9:66:0b:cc:3c:
|
||||
c6:78:7c:a7:9c:1d:e3:ce:8e:53:be:05:de:60:0f:
|
||||
6b:e5:1a:db:3f:e3:e1:21:c9:29:c1:f1:eb:07:9c:
|
||||
52:1b:01:44:51:3c:7b:25:d7:c4:e5:52:54:5d:25:
|
||||
07:ca:16:20:b8:ad:e4:41:ee:7a:08:fe:99:6f:83:
|
||||
a6:91:02:b0:6c:36:55:6a:e7:7d:f5:96:e6:ca:81:
|
||||
d6:97:f1:94:83:e9:ed:b0:b1:6b:12:69:1e:ac:fb:
|
||||
5d:a9:c5:98:e9:b4:5b:58:7a:be:3d:a2:44:3a:63:
|
||||
59:d4:0b:25:de:1b:4f:bd:e5:01:9e:cd:d2:29:d5:
|
||||
9f:17:19:0a:6f:bf:0c:90:d3:09:5f:d9:e3:8a:35:
|
||||
cc:79:5a:4d:19:37:92:b7:c4:c1:ad:af:f4:79:24:
|
||||
9a:b2:01:0b:b1:af:5c:96:f3:80:32:fb:5c:3d:98:
|
||||
f1:a0:3f:4a:de:be:af:94:2e:d9:55:9a:17:6e:60:
|
||||
9d:63:6c:b8:63:c9:ae:81:5c:18:35:e0:90:bb:be:
|
||||
3c:4f:37:22:b9:7e:eb:cf:9e:77:21:a6:3d:38:81:
|
||||
fb:48:da:31:3d:2b:e3:89:f5:d0:b5:bd:7e:e0:50:
|
||||
c4:12:89:b3:23:9a:10:31:85:db:ae:6f:ef:38:33:
|
||||
18:76:11
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:12
|
||||
X509v3 Subject Key Identifier:
|
||||
F9:24:AC:0F:B2:B5:F8:79:C0:FA:60:88:1B:C4:D9:4D:02:9E:17:19
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:F9:24:AC:0F:B2:B5:F8:79:C0:FA:60:88:1B:C4:D9:4D:02:9E:17:19
|
||||
DirName:/C=EU/L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287/O=AC Camerfirma S.A./CN=Chambers of Commerce Root - 2008
|
||||
serial:A3:DA:42:7E:A4:B1:AE:DA
|
||||
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Certificate Policies:
|
||||
Policy: X509v3 Any Policy
|
||||
CPS: http://policy.camerfirma.com
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
90:12:af:22:35:c2:a3:39:f0:2e:de:e9:b5:e9:78:7c:48:be:
|
||||
3f:7d:45:92:5e:e9:da:b1:19:fc:16:3c:9f:b4:5b:66:9e:6a:
|
||||
e7:c3:b9:5d:88:e8:0f:ad:cf:23:0f:de:25:3a:5e:cc:4f:a5:
|
||||
c1:b5:2d:ac:24:d2:58:07:de:a2:cf:69:84:60:33:e8:10:0d:
|
||||
13:a9:23:d0:85:e5:8e:7b:a6:9e:3d:72:13:72:33:f5:aa:7d:
|
||||
c6:63:1f:08:f4:fe:01:7f:24:cf:2b:2c:54:09:de:e2:2b:6d:
|
||||
92:c6:39:4f:16:ea:3c:7e:7a:46:d4:45:6a:46:a8:eb:75:82:
|
||||
56:a7:ab:a0:7c:68:13:33:f6:9d:30:f0:6f:27:39:24:23:2a:
|
||||
90:fd:90:29:35:f2:93:df:34:a5:c6:f7:f8:ef:8c:0f:62:4a:
|
||||
7c:ae:d3:f5:54:f8:8d:b6:9a:56:87:16:82:3a:33:ab:5a:22:
|
||||
08:f7:82:ba:ea:2e:e0:47:9a:b4:b5:45:a3:05:3b:d9:dc:2e:
|
||||
45:40:3b:ea:dc:7f:e8:3b:eb:d1:ec:26:d8:35:a4:30:c5:3a:
|
||||
ac:57:9e:b3:76:a5:20:7b:f9:1e:4a:05:62:01:a6:28:75:60:
|
||||
97:92:0d:6e:3e:4d:37:43:0d:92:15:9c:18:22:cd:51:99:a0:
|
||||
29:1a:3c:5f:8a:32:33:5b:30:c7:89:2f:47:98:0f:a3:03:c6:
|
||||
f6:f1:ac:df:32:f0:d9:81:1a:e4:9c:bd:f6:80:14:f0:d1:2c:
|
||||
b9:85:f5:d8:a3:b1:c8:a5:21:e5:1c:13:97:ee:0e:bd:df:29:
|
||||
a9:ef:34:53:5b:d3:e4:6a:13:84:06:b6:32:02:c4:52:ae:22:
|
||||
d2:dc:b2:21:42:1a:da:40:f0:29:c9:ec:0a:0c:5c:e2:d0:ba:
|
||||
cc:48:d3:37:0a:cc:12:0a:8a:79:b0:3d:03:7f:69:4b:f4:34:
|
||||
20:7d:b3:34:ea:8e:4b:64:f5:3e:fd:b3:23:67:15:0d:04:b8:
|
||||
f0:2d:c1:09:51:3c:b2:6c:15:f0:a5:23:d7:83:74:e4:e5:2e:
|
||||
c9:fe:98:27:42:c6:ab:c6:9e:b0:d0:5b:38:a5:9b:50:de:7e:
|
||||
18:98:b5:45:3b:f6:79:b4:e8:f7:1a:7b:06:83:fb:d0:8b:da:
|
||||
bb:c7:bd:18:ab:08:6f:3c:80:6b:40:3f:19:19:ba:65:8a:e6:
|
||||
be:d5:5c:d3:36:d7:ef:40:52:24:60:38:67:04:31:ec:8f:f3:
|
||||
82:c6:de:b9:55:f3:3b:31:91:5a:dc:b5:08:15:ad:76:25:0a:
|
||||
0d:7b:2e:87:e2:0c:a6:06:bc:26:10:6d:37:9d:ec:dd:78:8c:
|
||||
7c:80:c5:f0:d9:77:48:d0
|
||||
SHA1 Fingerprint=78:6A:74:AC:76:AB:14:7F:9C:6A:30:50:BA:9E:A8:7E:FE:9A:CE:3C
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIHTzCCBTegAwIBAgIJAKPaQn6ksa7aMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYD
|
||||
VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0
|
||||
IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3
|
||||
MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJz
|
||||
IG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4MB4XDTA4MDgwMTEyMjk1MFoXDTM4MDcz
|
||||
MTEyMjk1MFowga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBj
|
||||
dXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIw
|
||||
EAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVyZmlybWEgUy5BLjEp
|
||||
MCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDgwggIiMA0G
|
||||
CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCvAMtwNyuAWko6bHiUfaN/Gh/2NdW9
|
||||
28sNRHI+JrKQUrpjOyhYb6WzbZSm891kDFX29ufyIiKAXuFixrYp4YFs8r/lfTJq
|
||||
VKAyGVn+H4vXPWCGhSRv4xGzdz4gljUha7MI2XAuZPeEklPWDrCQiorjh40G072Q
|
||||
DuKZoRuGDtqaCrsLYVAGUvGef3bsyw/QHg3PmTA9HMRFEFis1tPo1+XqxQEHd9ZR
|
||||
5gN/ikilTWh1uem8nk4ZcfUyS5xtYBkL+8ydddy/Js2Pk3g5eXNeJQ7KXOt3EgfL
|
||||
ZEFHcpOrUMPrCXZkNNI5t3YRCQ12RcSprj1qr7V9ZS+UWBDsXHyvfuK2GNnQm05a
|
||||
Sd+pZgvMPMZ4fKecHePOjlO+Bd5gD2vlGts/4+EhySnB8esHnFIbAURRPHsl18Tl
|
||||
UlRdJQfKFiC4reRB7noI/plvg6aRArBsNlVq5331lubKgdaX8ZSD6e2wsWsSaR6s
|
||||
+12pxZjptFtYer49okQ6Y1nUCyXeG0+95QGezdIp1Z8XGQpvvwyQ0wlf2eOKNcx5
|
||||
Wk0ZN5K3xMGtr/R5JJqyAQuxr1yW84Ay+1w9mPGgP0revq+ULtlVmhduYJ1jbLhj
|
||||
ya6BXBg14JC7vjxPNyK5fuvPnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAx
|
||||
hduub+84Mxh2EQIDAQABo4IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNV
|
||||
HQ4EFgQU+SSsD7K1+HnA+mCIG8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1
|
||||
+HnA+mCIG8TZTQKeFxmhgbSkgbEwga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpN
|
||||
YWRyaWQgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29t
|
||||
L2FkZHJlc3MpMRIwEAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVy
|
||||
ZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAt
|
||||
IDIwMDiCCQCj2kJ+pLGu2jAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRV
|
||||
HSAAMCowKAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20w
|
||||
DQYJKoZIhvcNAQEFBQADggIBAJASryI1wqM58C7e6bXpeHxIvj99RZJe6dqxGfwW
|
||||
PJ+0W2aeaufDuV2I6A+tzyMP3iU6XsxPpcG1Lawk0lgH3qLPaYRgM+gQDROpI9CF
|
||||
5Y57pp49chNyM/WqfcZjHwj0/gF/JM8rLFQJ3uIrbZLGOU8W6jx+ekbURWpGqOt1
|
||||
glanq6B8aBMz9p0w8G8nOSQjKpD9kCk18pPfNKXG9/jvjA9iSnyu0/VU+I22mlaH
|
||||
FoI6M6taIgj3grrqLuBHmrS1RaMFO9ncLkVAO+rcf+g769HsJtg1pDDFOqxXnrN2
|
||||
pSB7+R5KBWIBpih1YJeSDW4+TTdDDZIVnBgizVGZoCkaPF+KMjNbMMeJL0eYD6MD
|
||||
xvbxrN8y8NmBGuScvfaAFPDRLLmF9dijscilIeUcE5fuDr3fKanvNFNb0+RqE4QG
|
||||
tjICxFKuItLcsiFCGtpA8CnJ7AoMXOLQusxI0zcKzBIKinmwPQN/aUv0NCB9szTq
|
||||
jktk9T79syNnFQ0EuPAtwQlRPLJsFfClI9eDdOTlLsn+mCdCxqvGnrDQWzilm1De
|
||||
fhiYtUU79nm06PcaewaD+9CL2rvHvRirCG88gGtAPxkZumWK5r7VXNM21+9AUiRg
|
||||
OGcEMeyP84LG3rlV8zsxkVrctQgVrXYlCg17LofiDKYGvCYQbTed7N14jHyAxfDZ
|
||||
d0jQ
|
||||
-----END CERTIFICATE-----
|
102
secure/caroot/trusted/Comodo_AAA_Services_root.pem
Normal file
102
secure/caroot/trusted/Comodo_AAA_Services_root.pem
Normal file
@ -0,0 +1,102 @@
|
||||
##
|
||||
## Comodo AAA Services root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = GB, ST = Greater Manchester, L = Salford, O = Comodo CA Limited, CN = AAA Certificate Services
|
||||
Validity
|
||||
Not Before: Jan 1 00:00:00 2004 GMT
|
||||
Not After : Dec 31 23:59:59 2028 GMT
|
||||
Subject: C = GB, ST = Greater Manchester, L = Salford, O = Comodo CA Limited, CN = AAA Certificate Services
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:be:40:9d:f4:6e:e1:ea:76:87:1c:4d:45:44:8e:
|
||||
be:46:c8:83:06:9d:c1:2a:fe:18:1f:8e:e4:02:fa:
|
||||
f3:ab:5d:50:8a:16:31:0b:9a:06:d0:c5:70:22:cd:
|
||||
49:2d:54:63:cc:b6:6e:68:46:0b:53:ea:cb:4c:24:
|
||||
c0:bc:72:4e:ea:f1:15:ae:f4:54:9a:12:0a:c3:7a:
|
||||
b2:33:60:e2:da:89:55:f3:22:58:f3:de:dc:cf:ef:
|
||||
83:86:a2:8c:94:4f:9f:68:f2:98:90:46:84:27:c7:
|
||||
76:bf:e3:cc:35:2c:8b:5e:07:64:65:82:c0:48:b0:
|
||||
a8:91:f9:61:9f:76:20:50:a8:91:c7:66:b5:eb:78:
|
||||
62:03:56:f0:8a:1a:13:ea:31:a3:1e:a0:99:fd:38:
|
||||
f6:f6:27:32:58:6f:07:f5:6b:b8:fb:14:2b:af:b7:
|
||||
aa:cc:d6:63:5f:73:8c:da:05:99:a8:38:a8:cb:17:
|
||||
78:36:51:ac:e9:9e:f4:78:3a:8d:cf:0f:d9:42:e2:
|
||||
98:0c:ab:2f:9f:0e:01:de:ef:9f:99:49:f1:2d:df:
|
||||
ac:74:4d:1b:98:b5:47:c5:e5:29:d1:f9:90:18:c7:
|
||||
62:9c:be:83:c7:26:7b:3e:8a:25:c7:c0:dd:9d:e6:
|
||||
35:68:10:20:9d:8f:d8:de:d2:c3:84:9c:0d:5e:e8:
|
||||
2f:c9
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
A0:11:0A:23:3E:96:F1:07:EC:E2:AF:29:EF:82:A5:7F:D0:30:A4:B4
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.comodoca.com/AAACertificateServices.crl
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.comodo.net/AAACertificateServices.crl
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
08:56:fc:02:f0:9b:e8:ff:a4:fa:d6:7b:c6:44:80:ce:4f:c4:
|
||||
c5:f6:00:58:cc:a6:b6:bc:14:49:68:04:76:e8:e6:ee:5d:ec:
|
||||
02:0f:60:d6:8d:50:18:4f:26:4e:01:e3:e6:b0:a5:ee:bf:bc:
|
||||
74:54:41:bf:fd:fc:12:b8:c7:4f:5a:f4:89:60:05:7f:60:b7:
|
||||
05:4a:f3:f6:f1:c2:bf:c4:b9:74:86:b6:2d:7d:6b:cc:d2:f3:
|
||||
46:dd:2f:c6:e0:6a:c3:c3:34:03:2c:7d:96:dd:5a:c2:0e:a7:
|
||||
0a:99:c1:05:8b:ab:0c:2f:f3:5c:3a:cf:6c:37:55:09:87:de:
|
||||
53:40:6c:58:ef:fc:b6:ab:65:6e:04:f6:1b:dc:3c:e0:5a:15:
|
||||
c6:9e:d9:f1:59:48:30:21:65:03:6c:ec:e9:21:73:ec:9b:03:
|
||||
a1:e0:37:ad:a0:15:18:8f:fa:ba:02:ce:a7:2c:a9:10:13:2c:
|
||||
d4:e5:08:26:ab:22:97:60:f8:90:5e:74:d4:a2:9a:53:bd:f2:
|
||||
a9:68:e0:a2:6e:c2:d7:6c:b1:a3:0f:9e:bf:eb:68:e7:56:f2:
|
||||
ae:f2:e3:2b:38:3a:09:81:b5:6b:85:d7:be:2d:ed:3f:1a:b7:
|
||||
b2:63:e2:f5:62:2c:82:d4:6a:00:41:50:f1:39:83:9f:95:e9:
|
||||
36:96:98:6e
|
||||
SHA1 Fingerprint=D1:EB:23:A4:6D:17:D6:8F:D9:25:64:C2:F1:F1:60:17:64:D8:E3:49
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb
|
||||
MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow
|
||||
GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj
|
||||
YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL
|
||||
MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE
|
||||
BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM
|
||||
GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP
|
||||
ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua
|
||||
BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe
|
||||
3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4
|
||||
YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR
|
||||
rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm
|
||||
ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU
|
||||
oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF
|
||||
MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v
|
||||
QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t
|
||||
b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF
|
||||
AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q
|
||||
GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz
|
||||
Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2
|
||||
G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi
|
||||
l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3
|
||||
smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg==
|
||||
-----END CERTIFICATE-----
|
100
secure/caroot/trusted/Cybertrust_Global_Root.pem
Normal file
100
secure/caroot/trusted/Cybertrust_Global_Root.pem
Normal file
@ -0,0 +1,100 @@
|
||||
##
|
||||
## Cybertrust Global Root
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
04:00:00:00:00:01:0f:85:aa:2d:48
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: O = "Cybertrust, Inc", CN = Cybertrust Global Root
|
||||
Validity
|
||||
Not Before: Dec 15 08:00:00 2006 GMT
|
||||
Not After : Dec 15 08:00:00 2021 GMT
|
||||
Subject: O = "Cybertrust, Inc", CN = Cybertrust Global Root
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:f8:c8:bc:bd:14:50:66:13:ff:f0:d3:79:ec:23:
|
||||
f2:b7:1a:c7:8e:85:f1:12:73:a6:19:aa:10:db:9c:
|
||||
a2:65:74:5a:77:3e:51:7d:56:f6:dc:23:b6:d4:ed:
|
||||
5f:58:b1:37:4d:d5:49:0e:6e:f5:6a:87:d6:d2:8c:
|
||||
d2:27:c6:e2:ff:36:9f:98:65:a0:13:4e:c6:2a:64:
|
||||
9b:d5:90:12:cf:14:06:f4:3b:e3:d4:28:be:e8:0e:
|
||||
f8:ab:4e:48:94:6d:8e:95:31:10:5c:ed:a2:2d:bd:
|
||||
d5:3a:6d:b2:1c:bb:60:c0:46:4b:01:f5:49:ae:7e:
|
||||
46:8a:d0:74:8d:a1:0c:02:ce:ee:fc:e7:8f:b8:6b:
|
||||
66:f3:7f:44:00:bf:66:25:14:2b:dd:10:30:1d:07:
|
||||
96:3f:4d:f6:6b:b8:8f:b7:7b:0c:a5:38:eb:de:47:
|
||||
db:d5:5d:39:fc:88:a7:f3:d7:2a:74:f1:e8:5a:a2:
|
||||
3b:9f:50:ba:a6:8c:45:35:c2:50:65:95:dc:63:82:
|
||||
ef:dd:bf:77:4d:9c:62:c9:63:73:16:d0:29:0f:49:
|
||||
a9:48:f0:b3:aa:b7:6c:c5:a7:30:39:40:5d:ae:c4:
|
||||
e2:5d:26:53:f0:ce:1c:23:08:61:a8:94:19:ba:04:
|
||||
62:40:ec:1f:38:70:77:12:06:71:a7:30:18:5d:25:
|
||||
27:a5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
B6:08:7B:0D:7A:CC:AC:20:4C:86:56:32:5E:CF:AB:6E:85:2D:70:57
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://www2.public-trust.com/crl/ct/ctroot.crl
|
||||
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:B6:08:7B:0D:7A:CC:AC:20:4C:86:56:32:5E:CF:AB:6E:85:2D:70:57
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
56:ef:0a:23:a0:54:4e:95:97:c9:f8:89:da:45:c1:d4:a3:00:
|
||||
25:f4:1f:13:ab:b7:a3:85:58:69:c2:30:ad:d8:15:8a:2d:e3:
|
||||
c9:cd:81:5a:f8:73:23:5a:a7:7c:05:f3:fd:22:3b:0e:d1:06:
|
||||
c4:db:36:4c:73:04:8e:e5:b0:22:e4:c5:f3:2e:a5:d9:23:e3:
|
||||
b8:4e:4a:20:a7:6e:02:24:9f:22:60:67:7b:8b:1d:72:09:c5:
|
||||
31:5c:e9:79:9f:80:47:3d:ad:a1:0b:07:14:3d:47:ff:03:69:
|
||||
1a:0c:0b:44:e7:63:25:a7:7f:b2:c9:b8:76:84:ed:23:f6:7d:
|
||||
07:ab:45:7e:d3:df:b3:bf:e9:8a:b6:cd:a8:a2:67:2b:52:d5:
|
||||
b7:65:f0:39:4c:63:a0:91:79:93:52:0f:54:dd:83:bb:9f:d1:
|
||||
8f:a7:53:73:c3:cb:ff:30:ec:7c:04:b8:d8:44:1f:93:5f:71:
|
||||
09:22:b7:6e:3e:ea:1c:03:4e:9d:1a:20:61:fb:81:37:ec:5e:
|
||||
fc:0a:45:ab:d7:e7:17:55:d0:a0:ea:60:9b:a6:f6:e3:8c:5b:
|
||||
29:c2:06:60:14:9d:2d:97:4c:a9:93:15:9d:61:c4:01:5f:48:
|
||||
d6:58:bd:56:31:12:4e:11:c8:21:e0:b3:11:91:65:db:b4:a6:
|
||||
88:38:ce:55
|
||||
SHA1 Fingerprint=5F:43:E5:B1:BF:F8:78:8C:AC:1C:C7:CA:4A:9A:C6:22:2B:CC:34:C6
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDoTCCAomgAwIBAgILBAAAAAABD4WqLUgwDQYJKoZIhvcNAQEFBQAwOzEYMBYG
|
||||
A1UEChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2Jh
|
||||
bCBSb290MB4XDTA2MTIxNTA4MDAwMFoXDTIxMTIxNTA4MDAwMFowOzEYMBYGA1UE
|
||||
ChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2JhbCBS
|
||||
b290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+Mi8vRRQZhP/8NN5
|
||||
7CPytxrHjoXxEnOmGaoQ25yiZXRadz5RfVb23CO21O1fWLE3TdVJDm71aofW0ozS
|
||||
J8bi/zafmGWgE07GKmSb1ZASzxQG9Dvj1Ci+6A74q05IlG2OlTEQXO2iLb3VOm2y
|
||||
HLtgwEZLAfVJrn5GitB0jaEMAs7u/OePuGtm839EAL9mJRQr3RAwHQeWP032a7iP
|
||||
t3sMpTjr3kfb1V05/Iin89cqdPHoWqI7n1C6poxFNcJQZZXcY4Lv3b93TZxiyWNz
|
||||
FtApD0mpSPCzqrdsxacwOUBdrsTiXSZT8M4cIwhhqJQZugRiQOwfOHB3EgZxpzAY
|
||||
XSUnpQIDAQABo4GlMIGiMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/
|
||||
MB0GA1UdDgQWBBS2CHsNesysIEyGVjJez6tuhS1wVzA/BgNVHR8EODA2MDSgMqAw
|
||||
hi5odHRwOi8vd3d3Mi5wdWJsaWMtdHJ1c3QuY29tL2NybC9jdC9jdHJvb3QuY3Js
|
||||
MB8GA1UdIwQYMBaAFLYIew16zKwgTIZWMl7Pq26FLXBXMA0GCSqGSIb3DQEBBQUA
|
||||
A4IBAQBW7wojoFROlZfJ+InaRcHUowAl9B8Tq7ejhVhpwjCt2BWKLePJzYFa+HMj
|
||||
Wqd8BfP9IjsO0QbE2zZMcwSO5bAi5MXzLqXZI+O4Tkogp24CJJ8iYGd7ix1yCcUx
|
||||
XOl5n4BHPa2hCwcUPUf/A2kaDAtE52Mlp3+yybh2hO0j9n0Hq0V+09+zv+mKts2o
|
||||
omcrUtW3ZfA5TGOgkXmTUg9U3YO7n9GPp1Nzw8v/MOx8BLjYRB+TX3EJIrduPuoc
|
||||
A06dGiBh+4E37F78CkWr1+cXVdCg6mCbpvbjjFspwgZgFJ0tl0ypkxWdYcQBX0jW
|
||||
WL1WMRJOEcgh4LMRkWXbtKaIOM5V
|
||||
-----END CERTIFICATE-----
|
101
secure/caroot/trusted/D-TRUST_Root_CA_3_2013.pem
Normal file
101
secure/caroot/trusted/D-TRUST_Root_CA_3_2013.pem
Normal file
@ -0,0 +1,101 @@
|
||||
##
|
||||
## D-TRUST Root CA 3 2013
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1039788 (0xfddac)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST Root CA 3 2013
|
||||
Validity
|
||||
Not Before: Sep 20 08:25:51 2013 GMT
|
||||
Not After : Sep 20 08:25:51 2028 GMT
|
||||
Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST Root CA 3 2013
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c4:7b:42:92:82:1f:ec:ed:54:98:8e:12:c0:ca:
|
||||
09:df:93:6e:3a:93:5c:1b:e4:10:77:9e:4e:69:88:
|
||||
6c:f6:e1:69:f2:f6:9b:a2:61:b1:bd:07:20:74:98:
|
||||
65:f1:8c:26:08:cd:a8:35:ca:80:36:d1:63:6d:e8:
|
||||
44:7a:82:c3:6c:5e:de:bb:e8:36:d2:c4:68:36:8c:
|
||||
9f:32:bd:84:22:e0:dc:c2:ee:10:46:39:6d:af:93:
|
||||
39:ae:87:e6:c3:bc:09:c9:2c:6b:67:5b:d9:9b:76:
|
||||
75:4c:0b:e0:bb:c5:d7:bc:3e:79:f2:5f:be:d1:90:
|
||||
57:f9:ae:f6:66:5f:31:bf:d3:6d:8f:a7:ba:4a:f3:
|
||||
23:65:bb:b7:ef:a3:25:d7:0a:ea:58:b6:ef:88:fa:
|
||||
fa:79:b2:52:58:d5:f0:ac:8c:a1:51:74:29:95:aa:
|
||||
51:3b:90:32:03:9f:1c:72:74:90:de:3d:ed:61:d2:
|
||||
e5:e3:fd:64:47:e5:b9:b7:4a:a9:f7:1f:ae:96:86:
|
||||
04:ac:2f:e3:a4:81:77:b7:5a:16:ff:d8:0f:3f:f6:
|
||||
b7:78:cc:a4:af:fa:5b:3c:12:5b:a8:52:89:72:ef:
|
||||
88:f3:d5:44:81:86:95:23:9f:7b:dd:bc:d9:34:ef:
|
||||
7c:94:3c:aa:c0:41:c2:e3:9d:50:1a:c0:e4:19:22:
|
||||
fc:b3
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
3F:90:C8:7D:C7:15:6F:F3:24:8F:A9:C3:2F:4B:A2:0F:21:B2:2F:E7
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:ldap://directory.d-trust.net/CN=D-TRUST%20Root%20CA%203%202013,O=D-Trust%20GmbH,C=DE?certificaterevocationlist
|
||||
|
||||
Full Name:
|
||||
URI:http://crl.d-trust.net/crl/d-trust_root_ca_3_2013.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
0e:59:0e:58:e4:74:48:23:44:cf:34:21:b5:9c:14:1a:ad:9a:
|
||||
4b:b7:b3:88:6d:5c:a9:17:70:f0:2a:9f:8d:7b:f9:7b:85:fa:
|
||||
c7:39:e8:10:08:b0:35:2b:5f:cf:02:d2:d3:9c:c8:0b:1e:ee:
|
||||
05:54:ae:37:93:04:09:7d:6c:8f:c2:74:bc:f8:1c:94:be:31:
|
||||
01:40:2d:f3:24:20:b7:84:55:2c:5c:c8:f5:74:4a:10:19:8b:
|
||||
a3:c7:ed:35:d6:09:48:d3:0e:c0:ba:39:a8:b0:46:02:b0:db:
|
||||
c6:88:59:c2:be:fc:7b:b1:2b:cf:7e:62:87:55:96:cc:01:6f:
|
||||
9b:67:21:95:35:8b:f8:10:fc:71:1b:b7:4b:37:69:a6:3b:d6:
|
||||
ec:8b:ee:c1:b0:f3:25:c9:8f:92:7d:a1:ea:c3:ca:44:bf:26:
|
||||
a5:74:92:9c:e3:74:eb:9d:74:d9:cb:4d:87:d8:fc:b4:69:6c:
|
||||
8b:a0:43:07:60:78:97:e9:d9:93:7c:c2:46:bc:9b:37:52:a3:
|
||||
ed:8a:3c:13:a9:7b:53:4b:49:9a:11:05:2c:0b:6e:56:ac:1f:
|
||||
2e:82:6c:e0:69:67:b5:0e:6d:2d:d9:e4:c0:15:f1:3f:fa:18:
|
||||
72:e1:15:6d:27:5b:2d:30:28:2b:9f:48:9a:64:2b:99:ef:f2:
|
||||
75:49:5f:5c
|
||||
SHA1 Fingerprint=6C:7C:CC:E7:D4:AE:51:5F:99:08:CD:3F:F6:E8:C3:78:DF:6F:EF:97
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEDjCCAvagAwIBAgIDD92sMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNVBAYTAkRF
|
||||
MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxHzAdBgNVBAMMFkQtVFJVU1QgUm9vdCBD
|
||||
QSAzIDIwMTMwHhcNMTMwOTIwMDgyNTUxWhcNMjgwOTIwMDgyNTUxWjBFMQswCQYD
|
||||
VQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMR8wHQYDVQQDDBZELVRSVVNU
|
||||
IFJvb3QgQ0EgMyAyMDEzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
||||
xHtCkoIf7O1UmI4SwMoJ35NuOpNcG+QQd55OaYhs9uFp8vabomGxvQcgdJhl8Ywm
|
||||
CM2oNcqANtFjbehEeoLDbF7eu+g20sRoNoyfMr2EIuDcwu4QRjltr5M5rofmw7wJ
|
||||
ySxrZ1vZm3Z1TAvgu8XXvD558l++0ZBX+a72Zl8xv9Ntj6e6SvMjZbu376Ml1wrq
|
||||
WLbviPr6ebJSWNXwrIyhUXQplapRO5AyA58ccnSQ3j3tYdLl4/1kR+W5t0qp9x+u
|
||||
loYErC/jpIF3t1oW/9gPP/a3eMykr/pbPBJbqFKJcu+I89VEgYaVI5973bzZNO98
|
||||
lDyqwEHC451QGsDkGSL8swIDAQABo4IBBTCCAQEwDwYDVR0TAQH/BAUwAwEB/zAd
|
||||
BgNVHQ4EFgQUP5DIfccVb/Mkj6nDL0uiDyGyL+cwDgYDVR0PAQH/BAQDAgEGMIG+
|
||||
BgNVHR8EgbYwgbMwdKByoHCGbmxkYXA6Ly9kaXJlY3RvcnkuZC10cnVzdC5uZXQv
|
||||
Q049RC1UUlVTVCUyMFJvb3QlMjBDQSUyMDMlMjAyMDEzLE89RC1UcnVzdCUyMEdt
|
||||
YkgsQz1ERT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MDugOaA3hjVodHRwOi8v
|
||||
Y3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2FfM18yMDEzLmNybDAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEADlkOWOR0SCNEzzQhtZwUGq2aS7eziG1cqRdw8Cqf
|
||||
jXv5e4X6xznoEAiwNStfzwLS05zICx7uBVSuN5MECX1sj8J0vPgclL4xAUAt8yQg
|
||||
t4RVLFzI9XRKEBmLo8ftNdYJSNMOwLo5qLBGArDbxohZwr78e7Erz35ih1WWzAFv
|
||||
m2chlTWL+BD8cRu3SzdppjvW7IvuwbDzJcmPkn2h6sPKRL8mpXSSnON065102ctN
|
||||
h9j8tGlsi6BDB2B4l+nZk3zCRrybN1Kj7Yo8E6l7U0tJmhEFLAtuVqwfLoJs4Gln
|
||||
tQ5tLdnkwBXxP/oYcuEVbSdbLTAoK59ImmQrme/ydUlfXA==
|
||||
-----END CERTIFICATE-----
|
102
secure/caroot/trusted/D-TRUST_Root_Class_3_CA_2_2009.pem
Normal file
102
secure/caroot/trusted/D-TRUST_Root_Class_3_CA_2_2009.pem
Normal file
@ -0,0 +1,102 @@
|
||||
##
|
||||
## D-TRUST Root Class 3 CA 2 2009
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 623603 (0x983f3)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST Root Class 3 CA 2 2009
|
||||
Validity
|
||||
Not Before: Nov 5 08:35:58 2009 GMT
|
||||
Not After : Nov 5 08:35:58 2029 GMT
|
||||
Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST Root Class 3 CA 2 2009
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d3:b2:4a:cf:7a:47:ef:75:9b:23:fa:3a:2f:d6:
|
||||
50:45:89:35:3a:c6:6b:db:fe:db:00:68:a8:e0:03:
|
||||
11:1d:37:50:08:9f:4d:4a:68:94:35:b3:53:d1:94:
|
||||
63:a7:20:56:af:de:51:78:ec:2a:3d:f3:48:48:50:
|
||||
3e:0a:df:46:55:8b:27:6d:c3:10:4d:0d:91:52:43:
|
||||
d8:87:e0:5d:4e:36:b5:21:ca:5f:39:40:04:5f:5b:
|
||||
7e:cc:a3:c6:2b:a9:40:1e:d9:36:84:d6:48:f3:92:
|
||||
1e:34:46:20:24:c1:a4:51:8e:4a:1a:ef:50:3f:69:
|
||||
5d:19:7f:45:c3:c7:01:8f:51:c9:23:e8:72:ae:b4:
|
||||
bc:56:09:7f:12:cb:1c:b1:af:29:90:0a:c9:55:cc:
|
||||
0f:d3:b4:1a:ed:47:35:5a:4a:ed:9c:73:04:21:d0:
|
||||
aa:bd:0c:13:b5:00:ca:26:6c:c4:6b:0c:94:5a:95:
|
||||
94:da:50:9a:f1:ff:a5:2b:66:31:a4:c9:38:a0:df:
|
||||
1d:1f:b8:09:2e:f3:a7:e8:67:52:ab:95:1f:e0:46:
|
||||
3e:d8:a4:c3:ca:5a:c5:31:80:e8:48:9a:9f:94:69:
|
||||
fe:19:dd:d8:73:7c:81:ca:96:de:8e:ed:b3:32:05:
|
||||
65:84:34:e6:e6:fd:57:10:b5:5f:76:bf:2f:b0:10:
|
||||
0d:c5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
FD:DA:14:C4:9F:30:DE:21:BD:1E:42:39:FC:AB:63:23:49:E0:F1:84
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:ldap://directory.d-trust.net/CN=D-TRUST%20Root%20Class%203%20CA%202%202009,O=D-Trust%20GmbH,C=DE?certificaterevocationlist
|
||||
|
||||
Full Name:
|
||||
URI:http://www.d-trust.net/crl/d-trust_root_class_3_ca_2_2009.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
7f:97:db:30:c8:df:a4:9c:7d:21:7a:80:70:ce:14:12:69:88:
|
||||
14:95:60:44:01:ac:b2:e9:30:4f:9b:50:c2:66:d8:7e:8d:30:
|
||||
b5:70:31:e9:e2:69:c7:f3:70:db:20:15:86:d0:0d:f0:be:ac:
|
||||
01:75:84:ce:7e:9f:4d:bf:b7:60:3b:9c:f3:ca:1d:e2:5e:68:
|
||||
d8:a3:9d:97:e5:40:60:d2:36:21:fe:d0:b4:b8:17:da:74:a3:
|
||||
7f:d4:df:b0:98:02:ac:6f:6b:6b:2c:25:24:72:a1:65:ee:25:
|
||||
5a:e5:e6:32:e7:f2:df:ab:49:fa:f3:90:69:23:db:04:d9:e7:
|
||||
5c:58:fc:65:d4:97:be:cc:fc:2e:0a:cc:25:2a:35:04:f8:60:
|
||||
91:15:75:3d:41:ff:23:1f:19:c8:6c:eb:82:53:04:a6:e4:4c:
|
||||
22:4d:8d:8c:ba:ce:5b:73:ec:64:54:50:6d:d1:9c:55:fb:69:
|
||||
c3:36:c3:8c:bc:3c:85:a6:6b:0a:26:0d:e0:93:98:60:ae:7e:
|
||||
c6:24:97:8a:61:5f:91:8e:66:92:09:87:36:cd:8b:9b:2d:3e:
|
||||
f6:51:d4:50:d4:59:28:bd:83:f2:cc:28:7b:53:86:6d:d8:26:
|
||||
88:70:d7:ea:91:cd:3e:b9:ca:c0:90:6e:5a:c6:5e:74:65:d7:
|
||||
5c:fe:a3:e2
|
||||
SHA1 Fingerprint=58:E8:AB:B0:36:15:33:FB:80:F7:9B:1B:6D:29:D3:FF:8D:5F:00:F0
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF
|
||||
MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD
|
||||
bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha
|
||||
ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM
|
||||
HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB
|
||||
BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03
|
||||
UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42
|
||||
tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R
|
||||
ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM
|
||||
lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp
|
||||
/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G
|
||||
A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G
|
||||
A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj
|
||||
dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy
|
||||
MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl
|
||||
cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js
|
||||
L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL
|
||||
BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni
|
||||
acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0
|
||||
o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K
|
||||
zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8
|
||||
PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y
|
||||
Johw1+qRzT65ysCQblrGXnRl11z+o+I=
|
||||
-----END CERTIFICATE-----
|
102
secure/caroot/trusted/D-TRUST_Root_Class_3_CA_2_EV_2009.pem
Normal file
102
secure/caroot/trusted/D-TRUST_Root_Class_3_CA_2_EV_2009.pem
Normal file
@ -0,0 +1,102 @@
|
||||
##
|
||||
## D-TRUST Root Class 3 CA 2 EV 2009
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 623604 (0x983f4)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST Root Class 3 CA 2 EV 2009
|
||||
Validity
|
||||
Not Before: Nov 5 08:50:46 2009 GMT
|
||||
Not After : Nov 5 08:50:46 2029 GMT
|
||||
Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST Root Class 3 CA 2 EV 2009
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:99:f1:84:34:70:ba:2f:b7:30:a0:8e:bd:7c:04:
|
||||
cf:be:62:bc:99:fd:82:97:d2:7a:0a:67:96:38:09:
|
||||
f6:10:4e:95:22:73:99:8d:da:15:2d:e7:05:fc:19:
|
||||
73:22:b7:8e:98:00:bc:3c:3d:ac:a1:6c:fb:d6:79:
|
||||
25:4b:ad:f0:cc:64:da:88:3e:29:b8:0f:09:d3:34:
|
||||
dd:33:f5:62:d1:e1:cd:19:e9:ee:18:4f:4c:58:ae:
|
||||
e2:1e:d6:0c:5b:15:5a:d8:3a:b8:c4:18:64:1e:e3:
|
||||
33:b2:b5:89:77:4e:0c:bf:d9:94:6b:13:97:6f:12:
|
||||
a3:fe:99:a9:04:cc:15:ec:60:68:36:ed:08:7b:b7:
|
||||
f5:bf:93:ed:66:31:83:8c:c6:71:34:87:4e:17:ea:
|
||||
af:8b:91:8d:1c:56:41:ae:22:37:5e:37:f2:1d:d9:
|
||||
d1:2d:0d:2f:69:51:a7:be:66:a6:8a:3a:2a:bd:c7:
|
||||
1a:b1:e1:14:f0:be:3a:1d:b9:cf:5b:b1:6a:fe:b4:
|
||||
b1:46:20:a2:fb:1e:3b:70:ef:93:98:7d:8c:73:96:
|
||||
f2:c5:ef:85:70:ad:29:26:fc:1e:04:3e:1c:a0:d8:
|
||||
0f:cb:52:83:62:7c:ee:8b:53:95:90:a9:57:a2:ea:
|
||||
61:05:d8:f9:4d:c4:27:fa:6e:ad:ed:f9:d7:51:f7:
|
||||
6b:a5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
D3:94:8A:4C:62:13:2A:19:2E:CC:AF:72:8A:7D:36:D7:9A:1C:DC:67
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:ldap://directory.d-trust.net/CN=D-TRUST%20Root%20Class%203%20CA%202%20EV%202009,O=D-Trust%20GmbH,C=DE?certificaterevocationlist
|
||||
|
||||
Full Name:
|
||||
URI:http://www.d-trust.net/crl/d-trust_root_class_3_ca_2_ev_2009.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
34:ed:7b:5a:3c:a4:94:88:ef:1a:11:75:07:2f:b3:fe:3c:fa:
|
||||
1e:51:26:eb:87:f6:29:de:e0:f1:d4:c6:24:09:e9:c1:cf:55:
|
||||
1b:b4:30:d9:ce:1a:fe:06:51:a6:15:a4:2d:ef:b2:4b:bf:20:
|
||||
28:25:49:d1:a6:36:77:34:e8:64:df:52:b1:11:c7:73:7a:cd:
|
||||
39:9e:c2:ad:8c:71:21:f2:5a:6b:af:df:3c:4e:55:af:b2:84:
|
||||
65:14:89:b9:77:cb:2a:31:be:cf:a3:6d:cf:6f:48:94:32:46:
|
||||
6f:e7:71:8c:a0:a6:84:19:37:07:f2:03:45:09:2b:86:75:7c:
|
||||
df:5f:69:57:00:db:6e:d8:a6:72:22:4b:50:d4:75:98:56:df:
|
||||
b7:18:ff:43:43:50:ae:7a:44:7b:f0:79:51:d7:43:3d:a7:d3:
|
||||
81:d3:f0:c9:4f:b9:da:c6:97:86:d0:82:c3:e4:42:6d:fe:b0:
|
||||
e2:64:4e:0e:26:e7:40:34:26:b5:08:89:d7:08:63:63:38:27:
|
||||
75:1e:33:ea:6e:a8:dd:9f:99:4f:74:4d:81:89:80:4b:dd:9a:
|
||||
97:29:5c:2f:be:81:41:b9:8c:ff:ea:7d:60:06:9e:cd:d7:3d:
|
||||
d3:2e:a3:15:bc:a8:e6:26:e5:6f:c3:dc:b8:03:21:ea:9f:16:
|
||||
f1:2c:54:b5
|
||||
SHA1 Fingerprint=96:C9:1B:0B:95:B4:10:98:42:FA:D0:D8:22:79:FE:60:FA:B9:16:83
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF
|
||||
MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD
|
||||
bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw
|
||||
NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV
|
||||
BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI
|
||||
hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn
|
||||
ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0
|
||||
3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z
|
||||
qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR
|
||||
p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8
|
||||
HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw
|
||||
ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea
|
||||
HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw
|
||||
Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh
|
||||
c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E
|
||||
RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt
|
||||
dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku
|
||||
Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp
|
||||
3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05
|
||||
nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF
|
||||
CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na
|
||||
xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX
|
||||
KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1
|
||||
-----END CERTIFICATE-----
|
90
secure/caroot/trusted/DST_Root_CA_X3.pem
Normal file
90
secure/caroot/trusted/DST_Root_CA_X3.pem
Normal file
@ -0,0 +1,90 @@
|
||||
##
|
||||
## DST Root CA X3
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
44:af:b0:80:d6:a3:27:ba:89:30:39:86:2e:f8:40:6b
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: O = Digital Signature Trust Co., CN = DST Root CA X3
|
||||
Validity
|
||||
Not Before: Sep 30 21:12:19 2000 GMT
|
||||
Not After : Sep 30 14:01:15 2021 GMT
|
||||
Subject: O = Digital Signature Trust Co., CN = DST Root CA X3
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:df:af:e9:97:50:08:83:57:b4:cc:62:65:f6:90:
|
||||
82:ec:c7:d3:2c:6b:30:ca:5b:ec:d9:c3:7d:c7:40:
|
||||
c1:18:14:8b:e0:e8:33:76:49:2a:e3:3f:21:49:93:
|
||||
ac:4e:0e:af:3e:48:cb:65:ee:fc:d3:21:0f:65:d2:
|
||||
2a:d9:32:8f:8c:e5:f7:77:b0:12:7b:b5:95:c0:89:
|
||||
a3:a9:ba:ed:73:2e:7a:0c:06:32:83:a2:7e:8a:14:
|
||||
30:cd:11:a0:e1:2a:38:b9:79:0a:31:fd:50:bd:80:
|
||||
65:df:b7:51:63:83:c8:e2:88:61:ea:4b:61:81:ec:
|
||||
52:6b:b9:a2:e2:4b:1a:28:9f:48:a3:9e:0c:da:09:
|
||||
8e:3e:17:2e:1e:dd:20:df:5b:c6:2a:8a:ab:2e:bd:
|
||||
70:ad:c5:0b:1a:25:90:74:72:c5:7b:6a:ab:34:d6:
|
||||
30:89:ff:e5:68:13:7b:54:0b:c8:d6:ae:ec:5a:9c:
|
||||
92:1e:3d:64:b3:8c:c6:df:bf:c9:41:70:ec:16:72:
|
||||
d5:26:ec:38:55:39:43:d0:fc:fd:18:5c:40:f1:97:
|
||||
eb:d5:9a:9b:8d:1d:ba:da:25:b9:c6:d8:df:c1:15:
|
||||
02:3a:ab:da:6e:f1:3e:2e:f5:5c:08:9c:3c:d6:83:
|
||||
69:e4:10:9b:19:2a:b6:29:57:e3:e5:3d:9b:9f:f0:
|
||||
02:5d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
C4:A7:B1:A4:7B:2C:71:FA:DB:E1:4B:90:75:FF:C4:15:60:85:89:10
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
a3:1a:2c:9b:17:00:5c:a9:1e:ee:28:66:37:3a:bf:83:c7:3f:
|
||||
4b:c3:09:a0:95:20:5d:e3:d9:59:44:d2:3e:0d:3e:bd:8a:4b:
|
||||
a0:74:1f:ce:10:82:9c:74:1a:1d:7e:98:1a:dd:cb:13:4b:b3:
|
||||
20:44:e4:91:e9:cc:fc:7d:a5:db:6a:e5:fe:e6:fd:e0:4e:dd:
|
||||
b7:00:3a:b5:70:49:af:f2:e5:eb:02:f1:d1:02:8b:19:cb:94:
|
||||
3a:5e:48:c4:18:1e:58:19:5f:1e:02:5a:f0:0c:f1:b1:ad:a9:
|
||||
dc:59:86:8b:6e:e9:91:f5:86:ca:fa:b9:66:33:aa:59:5b:ce:
|
||||
e2:a7:16:73:47:cb:2b:cc:99:b0:37:48:cf:e3:56:4b:f5:cf:
|
||||
0f:0c:72:32:87:c6:f0:44:bb:53:72:6d:43:f5:26:48:9a:52:
|
||||
67:b7:58:ab:fe:67:76:71:78:db:0d:a2:56:14:13:39:24:31:
|
||||
85:a2:a8:02:5a:30:47:e1:dd:50:07:bc:02:09:90:00:eb:64:
|
||||
63:60:9b:16:bc:88:c9:12:e6:d2:7d:91:8b:f9:3d:32:8d:65:
|
||||
b4:e9:7c:b1:57:76:ea:c5:b6:28:39:bf:15:65:1c:c8:f6:77:
|
||||
96:6a:0a:8d:77:0b:d8:91:0b:04:8e:07:db:29:b6:0a:ee:9d:
|
||||
82:35:35:10
|
||||
SHA1 Fingerprint=DA:C9:02:4F:54:D8:F6:DF:94:93:5F:B1:73:26:38:CA:6A:D7:7C:13
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/
|
||||
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
|
||||
DkRTVCBSb290IENBIFgzMB4XDTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVow
|
||||
PzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMRcwFQYDVQQD
|
||||
Ew5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
|
||||
AN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmTrE4O
|
||||
rz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEq
|
||||
OLl5CjH9UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9b
|
||||
xiqKqy69cK3FCxolkHRyxXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw
|
||||
7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40dutolucbY38EVAjqr2m7xPi71XAicPNaD
|
||||
aeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV
|
||||
HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQMA0GCSqG
|
||||
SIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69
|
||||
ikugdB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXr
|
||||
AvHRAosZy5Q6XkjEGB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZz
|
||||
R8srzJmwN0jP41ZL9c8PDHIyh8bwRLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5
|
||||
JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubSfZGL+T0yjWW06XyxV3bqxbYo
|
||||
Ob8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ
|
||||
-----END CERTIFICATE-----
|
95
secure/caroot/trusted/DigiCert_Assured_ID_Root_CA.pem
Normal file
95
secure/caroot/trusted/DigiCert_Assured_ID_Root_CA.pem
Normal file
@ -0,0 +1,95 @@
|
||||
##
|
||||
## DigiCert Assured ID Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
0c:e7:e0:e5:17:d8:46:fe:8f:e5:60:fc:1b:f0:30:39
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Root CA
|
||||
Validity
|
||||
Not Before: Nov 10 00:00:00 2006 GMT
|
||||
Not After : Nov 10 00:00:00 2031 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ad:0e:15:ce:e4:43:80:5c:b1:87:f3:b7:60:f9:
|
||||
71:12:a5:ae:dc:26:94:88:aa:f4:ce:f5:20:39:28:
|
||||
58:60:0c:f8:80:da:a9:15:95:32:61:3c:b5:b1:28:
|
||||
84:8a:8a:dc:9f:0a:0c:83:17:7a:8f:90:ac:8a:e7:
|
||||
79:53:5c:31:84:2a:f6:0f:98:32:36:76:cc:de:dd:
|
||||
3c:a8:a2:ef:6a:fb:21:f2:52:61:df:9f:20:d7:1f:
|
||||
e2:b1:d9:fe:18:64:d2:12:5b:5f:f9:58:18:35:bc:
|
||||
47:cd:a1:36:f9:6b:7f:d4:b0:38:3e:c1:1b:c3:8c:
|
||||
33:d9:d8:2f:18:fe:28:0f:b3:a7:83:d6:c3:6e:44:
|
||||
c0:61:35:96:16:fe:59:9c:8b:76:6d:d7:f1:a2:4b:
|
||||
0d:2b:ff:0b:72:da:9e:60:d0:8e:90:35:c6:78:55:
|
||||
87:20:a1:cf:e5:6d:0a:c8:49:7c:31:98:33:6c:22:
|
||||
e9:87:d0:32:5a:a2:ba:13:82:11:ed:39:17:9d:99:
|
||||
3a:72:a1:e6:fa:a4:d9:d5:17:31:75:ae:85:7d:22:
|
||||
ae:3f:01:46:86:f6:28:79:c8:b1:da:e4:57:17:c4:
|
||||
7e:1c:0e:b0:b4:92:a6:56:b3:bd:b2:97:ed:aa:a7:
|
||||
f0:b7:c5:a8:3f:95:16:d0:ff:a1:96:eb:08:5f:18:
|
||||
77:4f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
45:EB:A2:AF:F4:92:CB:82:31:2D:51:8B:A7:A7:21:9D:F3:6D:C8:0F
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:45:EB:A2:AF:F4:92:CB:82:31:2D:51:8B:A7:A7:21:9D:F3:6D:C8:0F
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
a2:0e:bc:df:e2:ed:f0:e3:72:73:7a:64:94:bf:f7:72:66:d8:
|
||||
32:e4:42:75:62:ae:87:eb:f2:d5:d9:de:56:b3:9f:cc:ce:14:
|
||||
28:b9:0d:97:60:5c:12:4c:58:e4:d3:3d:83:49:45:58:97:35:
|
||||
69:1a:a8:47:ea:56:c6:79:ab:12:d8:67:81:84:df:7f:09:3c:
|
||||
94:e6:b8:26:2c:20:bd:3d:b3:28:89:f7:5f:ff:22:e2:97:84:
|
||||
1f:e9:65:ef:87:e0:df:c1:67:49:b3:5d:eb:b2:09:2a:eb:26:
|
||||
ed:78:be:7d:3f:2b:f3:b7:26:35:6d:5f:89:01:b6:49:5b:9f:
|
||||
01:05:9b:ab:3d:25:c1:cc:b6:7f:c2:f1:6f:86:c6:fa:64:68:
|
||||
eb:81:2d:94:eb:42:b7:fa:8c:1e:dd:62:f1:be:50:67:b7:6c:
|
||||
bd:f3:f1:1f:6b:0c:36:07:16:7f:37:7c:a9:5b:6d:7a:f1:12:
|
||||
46:60:83:d7:27:04:be:4b:ce:97:be:c3:67:2a:68:11:df:80:
|
||||
e7:0c:33:66:bf:13:0d:14:6e:f3:7f:1f:63:10:1e:fa:8d:1b:
|
||||
25:6d:6c:8f:a5:b7:61:01:b1:d2:a3:26:a1:10:71:9d:ad:e2:
|
||||
c3:f9:c3:99:51:b7:2b:07:08:ce:2e:e6:50:b2:a7:fa:0a:45:
|
||||
2f:a2:f0:f2
|
||||
SHA1 Fingerprint=05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl
|
||||
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
||||
d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv
|
||||
b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG
|
||||
EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl
|
||||
cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi
|
||||
MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c
|
||||
JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP
|
||||
mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+
|
||||
wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4
|
||||
VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/
|
||||
AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB
|
||||
AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW
|
||||
BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun
|
||||
pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC
|
||||
dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf
|
||||
fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm
|
||||
NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx
|
||||
H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe
|
||||
+o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g==
|
||||
-----END CERTIFICATE-----
|
92
secure/caroot/trusted/DigiCert_Assured_ID_Root_G2.pem
Normal file
92
secure/caroot/trusted/DigiCert_Assured_ID_Root_G2.pem
Normal file
@ -0,0 +1,92 @@
|
||||
##
|
||||
## DigiCert Assured ID Root G2
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
0b:93:1c:3a:d6:39:67:ea:67:23:bf:c3:af:9a:f4:4b
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Root G2
|
||||
Validity
|
||||
Not Before: Aug 1 12:00:00 2013 GMT
|
||||
Not After : Jan 15 12:00:00 2038 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Root G2
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d9:e7:28:2f:52:3f:36:72:49:88:93:34:f3:f8:
|
||||
6a:1e:31:54:80:9f:ad:54:41:b5:47:df:96:a8:d4:
|
||||
af:80:2d:b9:0a:cf:75:fd:89:a5:7d:24:fa:e3:22:
|
||||
0c:2b:bc:95:17:0b:33:bf:19:4d:41:06:90:00:bd:
|
||||
0c:4d:10:fe:07:b5:e7:1c:6e:22:55:31:65:97:bd:
|
||||
d3:17:d2:1e:62:f3:db:ea:6c:50:8c:3f:84:0c:96:
|
||||
cf:b7:cb:03:e0:ca:6d:a1:14:4c:1b:89:dd:ed:00:
|
||||
b0:52:7c:af:91:6c:b1:38:13:d1:e9:12:08:c0:00:
|
||||
b0:1c:2b:11:da:77:70:36:9b:ae:ce:79:87:dc:82:
|
||||
70:e6:09:74:70:55:69:af:a3:68:9f:bf:dd:b6:79:
|
||||
b3:f2:9d:70:29:55:f4:ab:ff:95:61:f3:c9:40:6f:
|
||||
1d:d1:be:93:bb:d3:88:2a:bb:9d:bf:72:5a:56:71:
|
||||
3b:3f:d4:f3:d1:0a:fe:28:ef:a3:ee:d9:99:af:03:
|
||||
d3:8f:60:b7:f2:92:a1:b1:bd:89:89:1f:30:cd:c3:
|
||||
a6:2e:62:33:ae:16:02:77:44:5a:e7:81:0a:3c:a7:
|
||||
44:2e:79:b8:3f:04:bc:5c:a0:87:e1:1b:af:51:8e:
|
||||
cd:ec:2c:fa:f8:fe:6d:f0:3a:7c:aa:8b:e4:67:95:
|
||||
31:8d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
CE:C3:4A:B9:99:55:F2:B8:DB:60:BF:A9:7E:BD:56:B5:97:36:A7:D6
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
ca:a5:55:8c:e3:c8:41:6e:69:27:a7:75:11:ef:3c:86:36:6f:
|
||||
d2:9d:c6:78:38:1d:69:96:a2:92:69:2e:38:6c:9b:7d:04:d4:
|
||||
89:a5:b1:31:37:8a:c9:21:cc:ab:6c:cd:8b:1c:9a:d6:bf:48:
|
||||
d2:32:66:c1:8a:c0:f3:2f:3a:ef:c0:e3:d4:91:86:d1:50:e3:
|
||||
03:db:73:77:6f:4a:39:53:ed:de:26:c7:b5:7d:af:2b:42:d1:
|
||||
75:62:e3:4a:2b:02:c7:50:4b:e0:69:e2:96:6c:0e:44:66:10:
|
||||
44:8f:ad:05:eb:f8:79:ac:a6:1b:e8:37:34:9d:53:c9:61:aa:
|
||||
a2:52:af:4a:70:16:86:c2:3a:c8:b1:13:70:36:d8:cf:ee:f4:
|
||||
0a:34:d5:5b:4c:fd:07:9c:a2:ba:d9:01:72:5c:f3:4d:c1:dd:
|
||||
0e:b1:1c:0d:c4:63:be:ad:f4:14:fb:89:ec:a2:41:0e:4c:cc:
|
||||
c8:57:40:d0:6e:03:aa:cd:0c:8e:89:99:99:6c:f0:3c:30:af:
|
||||
38:df:6f:bc:a3:be:29:20:27:ab:74:ff:13:22:78:de:97:52:
|
||||
55:1e:83:b5:54:20:03:ee:ae:c0:4f:56:de:37:cc:c3:7f:aa:
|
||||
04:27:bb:d3:77:b8:62:db:17:7c:9c:28:22:13:73:6c:cf:26:
|
||||
f5:8a:29:e7
|
||||
SHA1 Fingerprint=A1:4B:48:D9:43:EE:0A:0E:40:90:4F:3C:E0:A4:C0:91:93:51:5D:3F
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl
|
||||
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
||||
d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv
|
||||
b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG
|
||||
EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl
|
||||
cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi
|
||||
MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA
|
||||
n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc
|
||||
biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp
|
||||
EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA
|
||||
bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu
|
||||
YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB
|
||||
AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW
|
||||
BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI
|
||||
QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I
|
||||
0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni
|
||||
lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9
|
||||
B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv
|
||||
ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo
|
||||
IhNzbM8m9Yop5w==
|
||||
-----END CERTIFICATE-----
|
66
secure/caroot/trusted/DigiCert_Assured_ID_Root_G3.pem
Normal file
66
secure/caroot/trusted/DigiCert_Assured_ID_Root_G3.pem
Normal file
@ -0,0 +1,66 @@
|
||||
##
|
||||
## DigiCert Assured ID Root G3
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
0b:a1:5a:fa:1d:df:a0:b5:49:44:af:cd:24:a0:6c:ec
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Root G3
|
||||
Validity
|
||||
Not Before: Aug 1 12:00:00 2013 GMT
|
||||
Not After : Jan 15 12:00:00 2038 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Root G3
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:19:e7:bc:ac:44:65:ed:cd:b8:3f:58:fb:8d:b1:
|
||||
57:a9:44:2d:05:15:f2:ef:0b:ff:10:74:9f:b5:62:
|
||||
52:5f:66:7e:1f:e5:dc:1b:45:79:0b:cc:c6:53:0a:
|
||||
9d:8d:5d:02:d9:a9:59:de:02:5a:f6:95:2a:0e:8d:
|
||||
38:4a:8a:49:c6:bc:c6:03:38:07:5f:55:da:7e:09:
|
||||
6e:e2:7f:5e:d0:45:20:0f:59:76:10:d6:a0:24:f0:
|
||||
2d:de:36:f2:6c:29:39
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
CB:D0:BD:A9:E1:98:05:51:A1:4D:37:A2:83:79:CE:8D:1D:2A:E4:84
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
30:64:02:30:25:a4:81:45:02:6b:12:4b:75:74:4f:c8:23:e3:
|
||||
70:f2:75:72:de:7c:89:f0:cf:91:72:61:9e:5e:10:92:59:56:
|
||||
b9:83:c7:10:e7:38:e9:58:26:36:7d:d5:e4:34:86:39:02:30:
|
||||
7c:36:53:f0:30:e5:62:63:3a:99:e2:b6:a3:3b:9b:34:fa:1e:
|
||||
da:10:92:71:5e:91:13:a7:dd:a4:6e:92:cc:32:d6:f5:21:66:
|
||||
c7:2f:ea:96:63:6a:65:45:92:95:01:b4
|
||||
SHA1 Fingerprint=F5:17:A2:4F:9A:48:C6:C9:F8:A2:00:26:9F:DC:0F:48:2C:AB:30:89
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw
|
||||
CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
|
||||
ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg
|
||||
RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV
|
||||
UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu
|
||||
Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq
|
||||
hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf
|
||||
Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q
|
||||
RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/
|
||||
BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD
|
||||
AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY
|
||||
JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv
|
||||
6pZjamVFkpUBtA==
|
||||
-----END CERTIFICATE-----
|
95
secure/caroot/trusted/DigiCert_Global_Root_CA.pem
Normal file
95
secure/caroot/trusted/DigiCert_Global_Root_CA.pem
Normal file
@ -0,0 +1,95 @@
|
||||
##
|
||||
## DigiCert Global Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
08:3b:e0:56:90:42:46:b1:a1:75:6a:c9:59:91:c7:4a
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
|
||||
Validity
|
||||
Not Before: Nov 10 00:00:00 2006 GMT
|
||||
Not After : Nov 10 00:00:00 2031 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e2:3b:e1:11:72:de:a8:a4:d3:a3:57:aa:50:a2:
|
||||
8f:0b:77:90:c9:a2:a5:ee:12:ce:96:5b:01:09:20:
|
||||
cc:01:93:a7:4e:30:b7:53:f7:43:c4:69:00:57:9d:
|
||||
e2:8d:22:dd:87:06:40:00:81:09:ce:ce:1b:83:bf:
|
||||
df:cd:3b:71:46:e2:d6:66:c7:05:b3:76:27:16:8f:
|
||||
7b:9e:1e:95:7d:ee:b7:48:a3:08:da:d6:af:7a:0c:
|
||||
39:06:65:7f:4a:5d:1f:bc:17:f8:ab:be:ee:28:d7:
|
||||
74:7f:7a:78:99:59:85:68:6e:5c:23:32:4b:bf:4e:
|
||||
c0:e8:5a:6d:e3:70:bf:77:10:bf:fc:01:f6:85:d9:
|
||||
a8:44:10:58:32:a9:75:18:d5:d1:a2:be:47:e2:27:
|
||||
6a:f4:9a:33:f8:49:08:60:8b:d4:5f:b4:3a:84:bf:
|
||||
a1:aa:4a:4c:7d:3e:cf:4f:5f:6c:76:5e:a0:4b:37:
|
||||
91:9e:dc:22:e6:6d:ce:14:1a:8e:6a:cb:fe:cd:b3:
|
||||
14:64:17:c7:5b:29:9e:32:bf:f2:ee:fa:d3:0b:42:
|
||||
d4:ab:b7:41:32:da:0c:d4:ef:f8:81:d5:bb:8d:58:
|
||||
3f:b5:1b:e8:49:28:a2:70:da:31:04:dd:f7:b2:16:
|
||||
f2:4c:0a:4e:07:a8:ed:4a:3d:5e:b5:7f:a3:90:c3:
|
||||
af:27
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
03:DE:50:35:56:D1:4C:BB:66:F0:A3:E2:1B:1B:C3:97:B2:3D:D1:55
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:03:DE:50:35:56:D1:4C:BB:66:F0:A3:E2:1B:1B:C3:97:B2:3D:D1:55
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
cb:9c:37:aa:48:13:12:0a:fa:dd:44:9c:4f:52:b0:f4:df:ae:
|
||||
04:f5:79:79:08:a3:24:18:fc:4b:2b:84:c0:2d:b9:d5:c7:fe:
|
||||
f4:c1:1f:58:cb:b8:6d:9c:7a:74:e7:98:29:ab:11:b5:e3:70:
|
||||
a0:a1:cd:4c:88:99:93:8c:91:70:e2:ab:0f:1c:be:93:a9:ff:
|
||||
63:d5:e4:07:60:d3:a3:bf:9d:5b:09:f1:d5:8e:e3:53:f4:8e:
|
||||
63:fa:3f:a7:db:b4:66:df:62:66:d6:d1:6e:41:8d:f2:2d:b5:
|
||||
ea:77:4a:9f:9d:58:e2:2b:59:c0:40:23:ed:2d:28:82:45:3e:
|
||||
79:54:92:26:98:e0:80:48:a8:37:ef:f0:d6:79:60:16:de:ac:
|
||||
e8:0e:cd:6e:ac:44:17:38:2f:49:da:e1:45:3e:2a:b9:36:53:
|
||||
cf:3a:50:06:f7:2e:e8:c4:57:49:6c:61:21:18:d5:04:ad:78:
|
||||
3c:2c:3a:80:6b:a7:eb:af:15:14:e9:d8:89:c1:b9:38:6c:e2:
|
||||
91:6c:8a:ff:64:b9:77:25:57:30:c0:1b:24:a3:e1:dc:e9:df:
|
||||
47:7c:b5:b4:24:08:05:30:ec:2d:bd:0b:bf:45:bf:50:b9:a9:
|
||||
f3:eb:98:01:12:ad:c8:88:c6:98:34:5f:8d:0a:3c:c6:e9:d5:
|
||||
95:95:6d:de
|
||||
SHA1 Fingerprint=A8:98:5D:3A:65:E5:E5:C4:B2:D7:D6:6D:40:C6:DD:2F:B1:9C:54:36
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh
|
||||
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
||||
d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD
|
||||
QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT
|
||||
MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j
|
||||
b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG
|
||||
9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB
|
||||
CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97
|
||||
nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt
|
||||
43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P
|
||||
T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4
|
||||
gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO
|
||||
BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR
|
||||
TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw
|
||||
DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr
|
||||
hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg
|
||||
06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF
|
||||
PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls
|
||||
YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk
|
||||
CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4=
|
||||
-----END CERTIFICATE-----
|
92
secure/caroot/trusted/DigiCert_Global_Root_G2.pem
Normal file
92
secure/caroot/trusted/DigiCert_Global_Root_G2.pem
Normal file
@ -0,0 +1,92 @@
|
||||
##
|
||||
## DigiCert Global Root G2
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
03:3a:f1:e6:a7:11:a9:a0:bb:28:64:b1:1d:09:fa:e5
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2
|
||||
Validity
|
||||
Not Before: Aug 1 12:00:00 2013 GMT
|
||||
Not After : Jan 15 12:00:00 2038 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:bb:37:cd:34:dc:7b:6b:c9:b2:68:90:ad:4a:75:
|
||||
ff:46:ba:21:0a:08:8d:f5:19:54:c9:fb:88:db:f3:
|
||||
ae:f2:3a:89:91:3c:7a:e6:ab:06:1a:6b:cf:ac:2d:
|
||||
e8:5e:09:24:44:ba:62:9a:7e:d6:a3:a8:7e:e0:54:
|
||||
75:20:05:ac:50:b7:9c:63:1a:6c:30:dc:da:1f:19:
|
||||
b1:d7:1e:de:fd:d7:e0:cb:94:83:37:ae:ec:1f:43:
|
||||
4e:dd:7b:2c:d2:bd:2e:a5:2f:e4:a9:b8:ad:3a:d4:
|
||||
99:a4:b6:25:e9:9b:6b:00:60:92:60:ff:4f:21:49:
|
||||
18:f7:67:90:ab:61:06:9c:8f:f2:ba:e9:b4:e9:92:
|
||||
32:6b:b5:f3:57:e8:5d:1b:cd:8c:1d:ab:95:04:95:
|
||||
49:f3:35:2d:96:e3:49:6d:dd:77:e3:fb:49:4b:b4:
|
||||
ac:55:07:a9:8f:95:b3:b4:23:bb:4c:6d:45:f0:f6:
|
||||
a9:b2:95:30:b4:fd:4c:55:8c:27:4a:57:14:7c:82:
|
||||
9d:cd:73:92:d3:16:4a:06:0c:8c:50:d1:8f:1e:09:
|
||||
be:17:a1:e6:21:ca:fd:83:e5:10:bc:83:a5:0a:c4:
|
||||
67:28:f6:73:14:14:3d:46:76:c3:87:14:89:21:34:
|
||||
4d:af:0f:45:0c:a6:49:a1:ba:bb:9c:c5:b1:33:83:
|
||||
29:85
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
4E:22:54:20:18:95:E6:E3:6E:E6:0F:FA:FA:B9:12:ED:06:17:8F:39
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
60:67:28:94:6f:0e:48:63:eb:31:dd:ea:67:18:d5:89:7d:3c:
|
||||
c5:8b:4a:7f:e9:be:db:2b:17:df:b0:5f:73:77:2a:32:13:39:
|
||||
81:67:42:84:23:f2:45:67:35:ec:88:bf:f8:8f:b0:61:0c:34:
|
||||
a4:ae:20:4c:84:c6:db:f8:35:e1:76:d9:df:a6:42:bb:c7:44:
|
||||
08:86:7f:36:74:24:5a:da:6c:0d:14:59:35:bd:f2:49:dd:b6:
|
||||
1f:c9:b3:0d:47:2a:3d:99:2f:bb:5c:bb:b5:d4:20:e1:99:5f:
|
||||
53:46:15:db:68:9b:f0:f3:30:d5:3e:31:e2:8d:84:9e:e3:8a:
|
||||
da:da:96:3e:35:13:a5:5f:f0:f9:70:50:70:47:41:11:57:19:
|
||||
4e:c0:8f:ae:06:c4:95:13:17:2f:1b:25:9f:75:f2:b1:8e:99:
|
||||
a1:6f:13:b1:41:71:fe:88:2a:c8:4f:10:20:55:d7:f3:14:45:
|
||||
e5:e0:44:f4:ea:87:95:32:93:0e:fe:53:46:fa:2c:9d:ff:8b:
|
||||
22:b9:4b:d9:09:45:a4:de:a4:b8:9a:58:dd:1b:7d:52:9f:8e:
|
||||
59:43:88:81:a4:9e:26:d5:6f:ad:dd:0d:c6:37:7d:ed:03:92:
|
||||
1b:e5:77:5f:76:ee:3c:8d:c4:5d:56:5b:a2:d9:66:6e:b3:35:
|
||||
37:e5:32:b6
|
||||
SHA1 Fingerprint=DF:3C:24:F9:BF:D6:66:76:1B:26:80:73:FE:06:D1:CC:8D:4F:82:A4
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh
|
||||
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
||||
d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH
|
||||
MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT
|
||||
MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j
|
||||
b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG
|
||||
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI
|
||||
2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx
|
||||
1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ
|
||||
q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz
|
||||
tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ
|
||||
vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP
|
||||
BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV
|
||||
5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY
|
||||
1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4
|
||||
NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG
|
||||
Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91
|
||||
8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe
|
||||
pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl
|
||||
MrY=
|
||||
-----END CERTIFICATE-----
|
66
secure/caroot/trusted/DigiCert_Global_Root_G3.pem
Normal file
66
secure/caroot/trusted/DigiCert_Global_Root_G3.pem
Normal file
@ -0,0 +1,66 @@
|
||||
##
|
||||
## DigiCert Global Root G3
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
05:55:56:bc:f2:5e:a4:35:35:c3:a4:0f:d5:ab:45:72
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G3
|
||||
Validity
|
||||
Not Before: Aug 1 12:00:00 2013 GMT
|
||||
Not After : Jan 15 12:00:00 2038 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G3
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:dd:a7:d9:bb:8a:b8:0b:fb:0b:7f:21:d2:f0:be:
|
||||
be:73:f3:33:5d:1a:bc:34:ea:de:c6:9b:bc:d0:95:
|
||||
f6:f0:cc:d0:0b:ba:61:5b:51:46:7e:9e:2d:9f:ee:
|
||||
8e:63:0c:17:ec:07:70:f5:cf:84:2e:40:83:9c:e8:
|
||||
3f:41:6d:3b:ad:d3:a4:14:59:36:78:9d:03:43:ee:
|
||||
10:13:6c:72:de:ae:88:a7:a1:6b:b5:43:ce:67:dc:
|
||||
23:ff:03:1c:a3:e2:3e
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
B3:DB:48:A4:F9:A1:C5:D8:AE:36:41:CC:11:63:69:62:29:BC:4B:C6
|
||||
Signature Algorithm: ecdsa-with-SHA384
|
||||
30:65:02:31:00:ad:bc:f2:6c:3f:12:4a:d1:2d:39:c3:0a:09:
|
||||
97:73:f4:88:36:8c:88:27:bb:e6:88:8d:50:85:a7:63:f9:9e:
|
||||
32:de:66:93:0f:f1:cc:b1:09:8f:dd:6c:ab:fa:6b:7f:a0:02:
|
||||
30:39:66:5b:c2:64:8d:b8:9e:50:dc:a8:d5:49:a2:ed:c7:dc:
|
||||
d1:49:7f:17:01:b8:c8:86:8f:4e:8c:88:2b:a8:9a:a9:8a:c5:
|
||||
d1:00:bd:f8:54:e2:9a:e5:5b:7c:b3:27:17
|
||||
SHA1 Fingerprint=7E:04:DE:89:6A:3E:66:6D:00:E6:87:D3:3F:FA:D9:3B:E8:3D:34:9E
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw
|
||||
CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
|
||||
ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe
|
||||
Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw
|
||||
EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x
|
||||
IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF
|
||||
K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG
|
||||
fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO
|
||||
Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd
|
||||
BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx
|
||||
AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/
|
||||
oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8
|
||||
sycX
|
||||
-----END CERTIFICATE-----
|
96
secure/caroot/trusted/DigiCert_High_Assurance_EV_Root_CA.pem
Normal file
96
secure/caroot/trusted/DigiCert_High_Assurance_EV_Root_CA.pem
Normal file
@ -0,0 +1,96 @@
|
||||
##
|
||||
## DigiCert High Assurance EV Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert High Assurance EV Root CA
|
||||
Validity
|
||||
Not Before: Nov 10 00:00:00 2006 GMT
|
||||
Not After : Nov 10 00:00:00 2031 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert High Assurance EV Root CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:
|
||||
e5:81:3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:
|
||||
a2:0a:1c:b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:
|
||||
a4:a9:41:59:3a:d3:dc:94:d6:3c:db:74:38:a4:4a:
|
||||
cc:4d:25:82:f7:4a:a5:53:12:38:ee:f3:49:6d:71:
|
||||
91:7e:63:b6:ab:a6:5f:c3:a4:84:f8:4f:62:51:be:
|
||||
f8:c5:ec:db:38:92:e3:06:e5:08:91:0c:c4:28:41:
|
||||
55:fb:cb:5a:89:15:7e:71:e8:35:bf:4d:72:09:3d:
|
||||
be:3a:38:50:5b:77:31:1b:8d:b3:c7:24:45:9a:a7:
|
||||
ac:6d:00:14:5a:04:b7:ba:13:eb:51:0a:98:41:41:
|
||||
22:4e:65:61:87:81:41:50:a6:79:5c:89:de:19:4a:
|
||||
57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a:06:16:a4:
|
||||
68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55:db:5e:
|
||||
64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1:79:
|
||||
39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a:
|
||||
a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:
|
||||
87:5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:
|
||||
4b:cb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Subject Key Identifier:
|
||||
B1:3E:C3:69:03:F8:BF:47:01:D4:98:26:1A:08:02:EF:63:64:2B:C3
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:B1:3E:C3:69:03:F8:BF:47:01:D4:98:26:1A:08:02:EF:63:64:2B:C3
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db:21:47:
|
||||
f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3:7a:d9:11:65:
|
||||
8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b:b8:91:e8:43:2c:8e:
|
||||
b3:78:ce:db:e3:53:79:71:d6:e5:21:94:01:da:55:87:9a:24:
|
||||
64:f6:8a:66:cc:de:9c:37:cd:a8:34:b1:69:9b:23:c8:9e:78:
|
||||
22:2b:70:43:e3:55:47:31:61:19:ef:58:c5:85:2f:4e:30:f6:
|
||||
a0:31:16:23:c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:
|
||||
5e:8b:31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1:
|
||||
15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b:0a:c4:
|
||||
97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91:55:f2:48:69:
|
||||
d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4:ba:70:26:5d:90:60:
|
||||
9e:bc:4b:17:09:2f:b4:cb:1e:43:68:c9:07:27:c1:d2:5c:f7:
|
||||
ea:21:b9:68:12:9c:3c:9c:bf:9e:fc:80:5c:9b:63:cd:ec:47:
|
||||
aa:25:27:67:a0:37:f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:
|
||||
77:e8:1f:4a
|
||||
SHA1 Fingerprint=5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs
|
||||
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
||||
d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j
|
||||
ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL
|
||||
MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3
|
||||
LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug
|
||||
RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm
|
||||
+9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW
|
||||
PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM
|
||||
xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB
|
||||
Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3
|
||||
hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg
|
||||
EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF
|
||||
MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA
|
||||
FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec
|
||||
nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z
|
||||
eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF
|
||||
hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2
|
||||
Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe
|
||||
vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep
|
||||
+OkuE6N36B9K
|
||||
-----END CERTIFICATE-----
|
133
secure/caroot/trusted/DigiCert_Trusted_Root_G4.pem
Normal file
133
secure/caroot/trusted/DigiCert_Trusted_Root_G4.pem
Normal file
@ -0,0 +1,133 @@
|
||||
##
|
||||
## DigiCert Trusted Root G4
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
05:9b:1b:57:9e:8e:21:32:e2:39:07:bd:a7:77:75:5c
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Trusted Root G4
|
||||
Validity
|
||||
Not Before: Aug 1 12:00:00 2013 GMT
|
||||
Not After : Jan 15 12:00:00 2038 GMT
|
||||
Subject: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Trusted Root G4
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:bf:e6:90:73:68:de:bb:e4:5d:4a:3c:30:22:30:
|
||||
69:33:ec:c2:a7:25:2e:c9:21:3d:f2:8a:d8:59:c2:
|
||||
e1:29:a7:3d:58:ab:76:9a:cd:ae:7b:1b:84:0d:c4:
|
||||
30:1f:f3:1b:a4:38:16:eb:56:c6:97:6d:1d:ab:b2:
|
||||
79:f2:ca:11:d2:e4:5f:d6:05:3c:52:0f:52:1f:c6:
|
||||
9e:15:a5:7e:be:9f:a9:57:16:59:55:72:af:68:93:
|
||||
70:c2:b2:ba:75:99:6a:73:32:94:d1:10:44:10:2e:
|
||||
df:82:f3:07:84:e6:74:3b:6d:71:e2:2d:0c:1b:ee:
|
||||
20:d5:c9:20:1d:63:29:2d:ce:ec:5e:4e:c8:93:f8:
|
||||
21:61:9b:34:eb:05:c6:5e:ec:5b:1a:bc:eb:c9:cf:
|
||||
cd:ac:34:40:5f:b1:7a:66:ee:77:c8:48:a8:66:57:
|
||||
57:9f:54:58:8e:0c:2b:b7:4f:a7:30:d9:56:ee:ca:
|
||||
7b:5d:e3:ad:c9:4f:5e:e5:35:e7:31:cb:da:93:5e:
|
||||
dc:8e:8f:80:da:b6:91:98:40:90:79:c3:78:c7:b6:
|
||||
b1:c4:b5:6a:18:38:03:10:8d:d8:d4:37:a4:2e:05:
|
||||
7d:88:f5:82:3e:10:91:70:ab:55:82:41:32:d7:db:
|
||||
04:73:2a:6e:91:01:7c:21:4c:d4:bc:ae:1b:03:75:
|
||||
5d:78:66:d9:3a:31:44:9a:33:40:bf:08:d7:5a:49:
|
||||
a4:c2:e6:a9:a0:67:dd:a4:27:bc:a1:4f:39:b5:11:
|
||||
58:17:f7:24:5c:46:8f:64:f7:c1:69:88:76:98:76:
|
||||
3d:59:5d:42:76:87:89:97:69:7a:48:f0:e0:a2:12:
|
||||
1b:66:9a:74:ca:de:4b:1e:e7:0e:63:ae:e6:d4:ef:
|
||||
92:92:3a:9e:3d:dc:00:e4:45:25:89:b6:9a:44:19:
|
||||
2b:7e:c0:94:b4:d2:61:6d:eb:33:d9:c5:df:4b:04:
|
||||
00:cc:7d:1c:95:c3:8f:f7:21:b2:b2:11:b7:bb:7f:
|
||||
f2:d5:8c:70:2c:41:60:aa:b1:63:18:44:95:1a:76:
|
||||
62:7e:f6:80:b0:fb:e8:64:a6:33:d1:89:07:e1:bd:
|
||||
b7:e6:43:a4:18:b8:a6:77:01:e1:0f:94:0c:21:1d:
|
||||
b2:54:29:25:89:6c:e5:0e:52:51:47:74:be:26:ac:
|
||||
b6:41:75:de:7a:ac:5f:8d:3f:c9:bc:d3:41:11:12:
|
||||
5b:e5:10:50:eb:31:c5:ca:72:16:22:09:df:7c:4c:
|
||||
75:3f:63:ec:21:5f:c4:20:51:6b:6f:b1:ab:86:8b:
|
||||
4f:c2:d6:45:5f:9d:20:fc:a1:1e:c5:c0:8f:a2:b1:
|
||||
7e:0a:26:99:f5:e4:69:2f:98:1d:2d:f5:d9:a9:b2:
|
||||
1d:e5:1b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Digital Signature, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
EC:D7:E3:82:D2:71:5D:64:4C:DF:2E:67:3F:E7:BA:98:AE:1C:0F:4F
|
||||
Signature Algorithm: sha384WithRSAEncryption
|
||||
bb:61:d9:7d:a9:6c:be:17:c4:91:1b:c3:a1:a2:00:8d:e3:64:
|
||||
68:0f:56:cf:77:ae:70:f9:fd:9a:4a:99:b9:c9:78:5c:0c:0c:
|
||||
5f:e4:e6:14:29:56:0b:36:49:5d:44:63:e0:ad:9c:96:18:66:
|
||||
1b:23:0d:3d:79:e9:6d:6b:d6:54:f8:d2:3c:c1:43:40:ae:1d:
|
||||
50:f5:52:fc:90:3b:bb:98:99:69:6b:c7:c1:a7:a8:68:a4:27:
|
||||
dc:9d:f9:27:ae:30:85:b9:f6:67:4d:3a:3e:8f:59:39:22:53:
|
||||
44:eb:c8:5d:03:ca:ed:50:7a:7d:62:21:0a:80:c8:73:66:d1:
|
||||
a0:05:60:5f:e8:a5:b4:a7:af:a8:f7:6d:35:9c:7c:5a:8a:d6:
|
||||
a2:38:99:f3:78:8b:f4:4d:d2:20:0b:de:04:ee:8c:9b:47:81:
|
||||
72:0d:c0:14:32:ef:30:59:2e:ae:e0:71:f2:56:e4:6a:97:6f:
|
||||
92:50:6d:96:8d:68:7a:9a:b2:36:14:7a:06:f2:24:b9:09:11:
|
||||
50:d7:08:b1:b8:89:7a:84:23:61:42:29:e5:a3:cd:a2:20:41:
|
||||
d7:d1:9c:64:d9:ea:26:a1:8b:14:d7:4c:19:b2:50:41:71:3d:
|
||||
3f:4d:70:23:86:0c:4a:dc:81:d2:cc:32:94:84:0d:08:09:97:
|
||||
1c:4f:c0:ee:6b:20:74:30:d2:e0:39:34:10:85:21:15:01:08:
|
||||
e8:55:32:de:71:49:d9:28:17:50:4d:e6:be:4d:d1:75:ac:d0:
|
||||
ca:fb:41:b8:43:a5:aa:d3:c3:05:44:4f:2c:36:9b:e2:fa:e2:
|
||||
45:b8:23:53:6c:06:6f:67:55:7f:46:b5:4c:3f:6e:28:5a:79:
|
||||
26:d2:a4:a8:62:97:d2:1e:e2:ed:4a:8b:bc:1b:fd:47:4a:0d:
|
||||
df:67:66:7e:b2:5b:41:d0:3b:e4:f4:3b:f4:04:63:e9:ef:c2:
|
||||
54:00:51:a0:8a:2a:c9:ce:78:cc:d5:ea:87:04:18:b3:ce:af:
|
||||
49:88:af:f3:92:99:b6:b3:e6:61:0f:d2:85:00:e7:50:1a:e4:
|
||||
1b:95:9d:19:a1:b9:9c:b1:9b:b1:00:1e:ef:d0:0f:4f:42:6c:
|
||||
c9:0a:bc:ee:43:fa:3a:71:a5:c8:4d:26:a5:35:fd:89:5d:bc:
|
||||
85:62:1d:32:d2:a0:2b:54:ed:9a:57:c1:db:fa:10:cf:19:b7:
|
||||
8b:4a:1b:8f:01:b6:27:95:53:e8:b6:89:6d:5b:bc:68:d4:23:
|
||||
e8:8b:51:a2:56:f9:f0:a6:80:a0:d6:1e:b3:bc:0f:0f:53:75:
|
||||
29:aa:ea:13:77:e4:de:8c:81:21:ad:07:10:47:11:ad:87:3d:
|
||||
07:d1:75:bc:cf:f3:66:7e
|
||||
SHA1 Fingerprint=DD:FB:16:CD:49:31:C9:73:A2:03:7D:3F:C8:3A:4D:7D:77:5D:05:E4
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi
|
||||
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
||||
d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg
|
||||
RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV
|
||||
UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu
|
||||
Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG
|
||||
SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y
|
||||
ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If
|
||||
xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV
|
||||
ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO
|
||||
DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ
|
||||
jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/
|
||||
CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi
|
||||
EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM
|
||||
fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY
|
||||
uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK
|
||||
chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t
|
||||
9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB
|
||||
hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD
|
||||
ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2
|
||||
SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd
|
||||
+SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc
|
||||
fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa
|
||||
sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N
|
||||
cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N
|
||||
0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie
|
||||
4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI
|
||||
r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1
|
||||
/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm
|
||||
gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+
|
||||
-----END CERTIFICATE-----
|
139
secure/caroot/trusted/E-Tugra_Certification_Authority.pem
Normal file
139
secure/caroot/trusted/E-Tugra_Certification_Authority.pem
Normal file
@ -0,0 +1,139 @@
|
||||
##
|
||||
## E-Tugra Certification Authority
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 7667447206703254355 (0x6a683e9c519bcb53)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C = TR, L = Ankara, O = E-Tu\C4\9Fra EBG Bili\C5\9Fim Teknolojileri ve Hizmetleri A.\C5\9E., OU = E-Tugra Sertifikasyon Merkezi, CN = E-Tugra Certification Authority
|
||||
Validity
|
||||
Not Before: Mar 5 12:09:48 2013 GMT
|
||||
Not After : Mar 3 12:09:48 2023 GMT
|
||||
Subject: C = TR, L = Ankara, O = E-Tu\C4\9Fra EBG Bili\C5\9Fim Teknolojileri ve Hizmetleri A.\C5\9E., OU = E-Tugra Sertifikasyon Merkezi, CN = E-Tugra Certification Authority
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (4096 bit)
|
||||
Modulus:
|
||||
00:e2:f5:3f:93:05:51:1e:85:62:54:5e:7a:0b:f5:
|
||||
18:07:83:ae:7e:af:7c:f7:d4:8a:6b:a5:63:43:39:
|
||||
b9:4b:f7:c3:c6:64:89:3d:94:2e:54:80:52:39:39:
|
||||
07:4b:4b:dd:85:07:76:87:cc:bf:2f:95:4c:cc:7d:
|
||||
a7:3d:bc:47:0f:98:70:f8:8c:85:1e:74:8e:92:6d:
|
||||
1b:40:d1:99:0d:bb:75:6e:c8:a9:6b:9a:c0:84:31:
|
||||
af:ca:43:cb:eb:2b:34:e8:8f:97:6b:01:9b:d5:0e:
|
||||
4a:08:aa:5b:92:74:85:43:d3:80:ae:a1:88:5b:ae:
|
||||
b3:ea:5e:cb:16:9a:77:44:c8:a1:f6:54:68:ce:de:
|
||||
8f:97:2b:ba:5b:40:02:0c:64:17:c0:b5:93:cd:e1:
|
||||
f1:13:66:ce:0c:79:ef:d1:91:28:ab:5f:a0:12:52:
|
||||
30:73:19:8e:8f:e1:8c:07:a2:c3:bb:4a:f0:ea:1f:
|
||||
15:a8:ee:25:cc:a4:46:f8:1b:22:ef:b3:0e:43:ba:
|
||||
2c:24:b8:c5:2c:5c:d4:1c:f8:5d:64:bd:c3:93:5e:
|
||||
28:a7:3f:27:f1:8e:1e:d3:2a:50:05:a3:55:d9:cb:
|
||||
e7:39:53:c0:98:9e:8c:54:62:8b:26:b0:f7:7d:8d:
|
||||
7c:e4:c6:9e:66:42:55:82:47:e7:b2:58:8d:66:f7:
|
||||
07:7c:2e:36:e6:50:1c:3f:db:43:24:c5:bf:86:47:
|
||||
79:b3:79:1c:f7:5a:f4:13:ec:6c:f8:3f:e2:59:1f:
|
||||
95:ee:42:3e:b9:ad:a8:32:85:49:97:46:fe:4b:31:
|
||||
8f:5a:cb:ad:74:47:1f:e9:91:b7:df:28:04:22:a0:
|
||||
d4:0f:5d:e2:79:4f:ea:6c:85:86:bd:a8:a6:ce:e4:
|
||||
fa:c3:e1:b3:ae:de:3c:51:ee:cb:13:7c:01:7f:84:
|
||||
0e:5d:51:94:9e:13:0c:b6:2e:a5:4c:f9:39:70:36:
|
||||
6f:96:ca:2e:0c:44:55:c5:ca:fa:5d:02:a3:df:d6:
|
||||
64:8c:5a:b3:01:0a:a9:b5:0a:47:17:ff:ef:91:40:
|
||||
2a:8e:a1:46:3a:31:98:e5:11:fc:cc:bb:49:56:8a:
|
||||
fc:b9:d0:61:9a:6f:65:6c:e6:c3:cb:3e:75:49:fe:
|
||||
8f:a7:e2:89:c5:67:d7:9d:46:13:4e:31:76:3b:24:
|
||||
b3:9e:11:65:86:ab:7f:ef:1d:d4:f8:bc:e7:ac:5a:
|
||||
5c:b7:5a:47:5c:55:ce:55:b4:22:71:5b:5b:0b:f0:
|
||||
cf:dc:a0:61:64:ea:a9:d7:68:0a:63:a7:e0:0d:3f:
|
||||
a0:af:d3:aa:d2:7e:ef:51:a0:e6:51:2b:55:92:15:
|
||||
17:53:cb:b7:66:0e:66:4c:f8:f9:75:4c:90:e7:12:
|
||||
70:c7:45
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
2E:E3:DB:B2:49:D0:9C:54:79:5C:FA:27:2A:FE:CC:4E:D2:E8:4E:54
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:2E:E3:DB:B2:49:D0:9C:54:79:5C:FA:27:2A:FE:CC:4E:D2:E8:4E:54
|
||||
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
05:37:3a:f4:4d:b7:45:e2:45:75:24:8f:b6:77:52:e8:1c:d8:
|
||||
10:93:65:f3:f2:59:06:a4:3e:1e:29:ec:5d:d1:d0:ab:7c:e0:
|
||||
0a:90:48:78:ed:4e:98:03:99:fe:28:60:91:1d:30:1d:b8:63:
|
||||
7c:a8:e6:35:b5:fa:d3:61:76:e6:d6:07:4b:ca:69:9a:b2:84:
|
||||
7a:77:93:45:17:15:9f:24:d0:98:13:12:ff:bb:a0:2e:fd:4e:
|
||||
4c:87:f8:ce:5c:aa:98:1b:05:e0:00:46:4a:82:80:a5:33:8b:
|
||||
28:dc:ed:38:d3:df:e5:3e:e9:fe:fb:59:dd:61:84:4f:d2:54:
|
||||
96:13:61:13:3e:8f:80:69:be:93:47:b5:35:43:d2:5a:bb:3d:
|
||||
5c:ef:b3:42:47:cd:3b:55:13:06:b0:09:db:fd:63:f6:3a:88:
|
||||
0a:99:6f:7e:e1:ce:1b:53:6a:44:66:23:51:08:7b:bc:5b:52:
|
||||
a2:fd:06:37:38:40:61:8f:4a:96:b8:90:37:f8:66:c7:78:90:
|
||||
00:15:2e:8b:ad:51:35:53:07:a8:6b:68:ae:f9:4e:3c:07:26:
|
||||
cd:08:05:70:cc:39:3f:76:bd:a5:d3:67:26:01:86:a6:53:d2:
|
||||
60:3b:7c:43:7f:55:8a:bc:95:1a:c1:28:39:4c:1f:43:d2:91:
|
||||
f4:72:59:8a:b9:56:fc:3f:b4:9d:da:70:9c:76:5a:8c:43:50:
|
||||
ee:8e:30:72:4d:df:ff:49:f7:c6:a9:67:d9:6d:ac:02:11:e2:
|
||||
3a:16:25:a7:58:08:cb:6f:53:41:9c:48:38:47:68:33:d1:d7:
|
||||
c7:8f:d4:74:21:d4:c3:05:90:7a:ff:ce:96:88:b1:15:29:5d:
|
||||
23:ab:d0:60:a1:12:4f:de:f4:17:cd:32:e5:c9:bf:c8:43:ad:
|
||||
fd:2e:8e:f1:af:e2:f4:98:fa:12:1f:20:d8:c0:a7:0c:85:c5:
|
||||
90:f4:3b:2d:96:26:b1:2c:be:4c:ab:eb:b1:d2:8a:c9:db:78:
|
||||
13:0f:1e:09:9d:6d:8f:00:9f:02:da:c1:fa:1f:7a:7a:09:c4:
|
||||
4a:e6:88:2a:97:9f:89:8b:fd:37:5f:5f:3a:ce:38:59:86:4b:
|
||||
af:71:0b:b4:d8:f2:70:4f:9f:32:13:e3:b0:a7:57:e5:da:da:
|
||||
43:cb:84:34:f2:28:c4:ea:6d:f4:2a:ef:c1:6b:76:da:fb:7e:
|
||||
bb:85:3c:d2:53:c2:4d:be:71:e1:45:d1:fd:23:67:0d:13:75:
|
||||
fb:cf:65:67:22:9d:ae:b0:09:d1:09:ff:1d:34:bf:fe:23:97:
|
||||
37:d2:39:fa:3d:0d:06:0b:b4:db:3b:a3:ab:6f:5c:1d:b6:7e:
|
||||
e8:b3:82:34:ed:06:5c:24
|
||||
SHA1 Fingerprint=51:C6:E7:08:49:06:6E:F3:92:D4:5C:A0:0D:6D:A3:62:8F:C3:52:39
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIGSzCCBDOgAwIBAgIIamg+nFGby1MwDQYJKoZIhvcNAQELBQAwgbIxCzAJBgNV
|
||||
BAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBC
|
||||
aWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhpem1ldGxlcmkgQS7Fni4xJjAkBgNV
|
||||
BAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBNZXJrZXppMSgwJgYDVQQDDB9FLVR1
|
||||
Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDMwNTEyMDk0OFoXDTIz
|
||||
MDMwMzEyMDk0OFowgbIxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+
|
||||
BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhp
|
||||
em1ldGxlcmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBN
|
||||
ZXJrZXppMSgwJgYDVQQDDB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5
|
||||
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA4vU/kwVRHoViVF56C/UY
|
||||
B4Oufq9899SKa6VjQzm5S/fDxmSJPZQuVIBSOTkHS0vdhQd2h8y/L5VMzH2nPbxH
|
||||
D5hw+IyFHnSOkm0bQNGZDbt1bsipa5rAhDGvykPL6ys06I+XawGb1Q5KCKpbknSF
|
||||
Q9OArqGIW66z6l7LFpp3RMih9lRozt6Plyu6W0ACDGQXwLWTzeHxE2bODHnv0ZEo
|
||||
q1+gElIwcxmOj+GMB6LDu0rw6h8VqO4lzKRG+Bsi77MOQ7osJLjFLFzUHPhdZL3D
|
||||
k14opz8n8Y4e0ypQBaNV2cvnOVPAmJ6MVGKLJrD3fY185MaeZkJVgkfnsliNZvcH
|
||||
fC425lAcP9tDJMW/hkd5s3kc91r0E+xs+D/iWR+V7kI+ua2oMoVJl0b+SzGPWsut
|
||||
dEcf6ZG33ygEIqDUD13ieU/qbIWGvaimzuT6w+Gzrt48Ue7LE3wBf4QOXVGUnhMM
|
||||
ti6lTPk5cDZvlsouDERVxcr6XQKj39ZkjFqzAQqptQpHF//vkUAqjqFGOjGY5RH8
|
||||
zLtJVor8udBhmm9lbObDyz51Sf6Pp+KJxWfXnUYTTjF2OySznhFlhqt/7x3U+Lzn
|
||||
rFpct1pHXFXOVbQicVtbC/DP3KBhZOqp12gKY6fgDT+gr9Oq0n7vUaDmUStVkhUX
|
||||
U8u3Zg5mTPj5dUyQ5xJwx0UCAwEAAaNjMGEwHQYDVR0OBBYEFC7j27JJ0JxUeVz6
|
||||
Jyr+zE7S6E5UMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAULuPbsknQnFR5
|
||||
XPonKv7MTtLoTlQwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAF
|
||||
Nzr0TbdF4kV1JI+2d1LoHNgQk2Xz8lkGpD4eKexd0dCrfOAKkEh47U6YA5n+KGCR
|
||||
HTAduGN8qOY1tfrTYXbm1gdLymmasoR6d5NFFxWfJNCYExL/u6Au/U5Mh/jOXKqY
|
||||
GwXgAEZKgoClM4so3O0409/lPun++1ndYYRP0lSWE2ETPo+Aab6TR7U1Q9Jauz1c
|
||||
77NCR807VRMGsAnb/WP2OogKmW9+4c4bU2pEZiNRCHu8W1Ki/QY3OEBhj0qWuJA3
|
||||
+GbHeJAAFS6LrVE1Uweoa2iu+U48BybNCAVwzDk/dr2l02cmAYamU9JgO3xDf1WK
|
||||
vJUawSg5TB9D0pH0clmKuVb8P7Sd2nCcdlqMQ1DujjByTd//SffGqWfZbawCEeI6
|
||||
FiWnWAjLb1NBnEg4R2gz0dfHj9R0IdTDBZB6/86WiLEVKV0jq9BgoRJP3vQXzTLl
|
||||
yb/IQ639Lo7xr+L0mPoSHyDYwKcMhcWQ9DstliaxLL5Mq+ux0orJ23gTDx4JnW2P
|
||||
AJ8C2sH6H3p6CcRK5ogql5+Ji/03X186zjhZhkuvcQu02PJwT58yE+Owp1fl2tpD
|
||||
y4Q08ijE6m30Ku/Ba3ba+367hTzSU8JNvnHhRdH9I2cNE3X7z2VnIp2usAnRCf8d
|
||||
NL/+I5c30jn6PQ0GC7TbO6Orb1wdtn7os4I07QZcJA==
|
||||
-----END CERTIFICATE-----
|
109
secure/caroot/trusted/EC-ACC.pem
Normal file
109
secure/caroot/trusted/EC-ACC.pem
Normal file
@ -0,0 +1,109 @@
|
||||
##
|
||||
## EC-ACC
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
(Negative)11:d4:c2:14:2b:de:21:eb:57:9d:53:fb:0c:22:3b:ff
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = ES, O = Agencia Catalana de Certificacio (NIF Q-0801176-I), OU = Serveis Publics de Certificacio, OU = Vegeu https://www.catcert.net/verarrel (c)03, OU = Jerarquia Entitats de Certificacio Catalanes, CN = EC-ACC
|
||||
Validity
|
||||
Not Before: Jan 7 23:00:00 2003 GMT
|
||||
Not After : Jan 7 22:59:59 2031 GMT
|
||||
Subject: C = ES, O = Agencia Catalana de Certificacio (NIF Q-0801176-I), OU = Serveis Publics de Certificacio, OU = Vegeu https://www.catcert.net/verarrel (c)03, OU = Jerarquia Entitats de Certificacio Catalanes, CN = EC-ACC
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b3:22:c7:4f:e2:97:42:95:88:47:83:40:f6:1d:
|
||||
17:f3:83:73:24:1e:51:f3:98:8a:c3:92:b8:ff:40:
|
||||
90:05:70:87:60:c9:00:a9:b5:94:65:19:22:15:17:
|
||||
c2:43:6c:66:44:9a:0d:04:3e:39:6f:a5:4b:7a:aa:
|
||||
63:b7:8a:44:9d:d9:63:91:84:66:e0:28:0f:ba:42:
|
||||
e3:6e:8e:f7:14:27:93:69:ee:91:0e:a3:5f:0e:b1:
|
||||
eb:66:a2:72:4f:12:13:86:65:7a:3e:db:4f:07:f4:
|
||||
a7:09:60:da:3a:42:99:c7:b2:7f:b3:16:95:1c:c7:
|
||||
f9:34:b5:94:85:d5:99:5e:a0:48:a0:7e:e7:17:65:
|
||||
b8:a2:75:b8:1e:f3:e5:42:7d:af:ed:f3:8a:48:64:
|
||||
5d:82:14:93:d8:c0:e4:ff:b3:50:72:f2:76:f6:b3:
|
||||
5d:42:50:79:d0:94:3e:6b:0c:00:be:d8:6b:0e:4e:
|
||||
2a:ec:3e:d2:cc:82:a2:18:65:33:13:77:9e:9a:5d:
|
||||
1a:13:d8:c3:db:3d:c8:97:7a:ee:70:ed:a7:e6:7c:
|
||||
db:71:cf:2d:94:62:df:6d:d6:f5:38:be:3f:a5:85:
|
||||
0a:19:b8:a8:d8:09:75:42:70:c4:ea:ef:cb:0e:c8:
|
||||
34:a8:12:22:98:0c:b8:13:94:b6:4b:ec:f0:d0:90:
|
||||
e7:27
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
email:ec_acc@catcert.net
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
A0:C3:8B:44:AA:37:A5:45:BF:97:80:5A:D1:F1:78:A2:9B:E9:5D:8D
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.15096.1.3.1.10
|
||||
CPS: https://www.catcert.net/verarrel
|
||||
User Notice:
|
||||
Explicit Text: Vegeu https://www.catcert.net/verarrel
|
||||
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
a0:48:5b:82:01:f6:4d:48:b8:39:55:35:9c:80:7a:53:99:d5:
|
||||
5a:ff:b1:71:3b:cc:39:09:94:5e:d6:da:ef:be:01:5b:5d:d3:
|
||||
1e:d8:fd:7d:4f:cd:a0:41:e0:34:93:bf:cb:e2:86:9c:37:92:
|
||||
90:56:1c:dc:eb:29:05:e5:c4:9e:c7:35:df:8a:0c:cd:c5:21:
|
||||
43:e9:aa:88:e5:35:c0:19:42:63:5a:02:5e:a4:48:18:3a:85:
|
||||
6f:dc:9d:bc:3f:9d:9c:c1:87:b8:7a:61:08:e9:77:0b:7f:70:
|
||||
ab:7a:dd:d9:97:2c:64:1e:85:bf:bc:74:96:a1:c3:7a:12:ec:
|
||||
0c:1a:6e:83:0c:3c:e8:72:46:9f:fb:48:d5:5e:97:e6:b1:a1:
|
||||
f8:e4:ef:46:25:94:9c:89:db:69:38:be:ec:5c:0e:56:c7:65:
|
||||
51:e5:50:88:88:bf:42:d5:2b:3d:e5:f9:ba:9e:2e:b3:ca:f4:
|
||||
73:92:02:0b:be:4c:66:eb:20:fe:b9:cb:b5:99:7f:e6:b6:13:
|
||||
fa:ca:4b:4d:d9:ee:53:46:06:3b:c6:4e:ad:93:5a:81:7e:6c:
|
||||
2a:4b:6a:05:45:8c:f2:21:a4:31:90:87:6c:65:9c:9d:a5:60:
|
||||
95:3a:52:7f:f5:d1:ab:08:6e:f3:ee:5b:f9:88:3d:7e:b8:6f:
|
||||
6e:03:e4:42
|
||||
SHA1 Fingerprint=28:90:3A:63:5B:52:80:FA:E6:77:4C:0B:6D:A7:D6:BA:A6:4A:F2:E8
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFVjCCBD6gAwIBAgIQ7is969Qh3hSoYqwE893EATANBgkqhkiG9w0BAQUFADCB
|
||||
8zELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2Vy
|
||||
dGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMSgwJgYDVQQLEx9TZXJ2ZWlzIFB1
|
||||
YmxpY3MgZGUgQ2VydGlmaWNhY2lvMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3
|
||||
dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAoYykwMzE1MDMGA1UECxMsSmVyYXJxdWlh
|
||||
IEVudGl0YXRzIGRlIENlcnRpZmljYWNpbyBDYXRhbGFuZXMxDzANBgNVBAMTBkVD
|
||||
LUFDQzAeFw0wMzAxMDcyMzAwMDBaFw0zMTAxMDcyMjU5NTlaMIHzMQswCQYDVQQG
|
||||
EwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8g
|
||||
KE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBD
|
||||
ZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQu
|
||||
bmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMg
|
||||
ZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUNDMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyLHT+KXQpWIR4NA9h0X84NzJB5R
|
||||
85iKw5K4/0CQBXCHYMkAqbWUZRkiFRfCQ2xmRJoNBD45b6VLeqpjt4pEndljkYRm
|
||||
4CgPukLjbo73FCeTae6RDqNfDrHrZqJyTxIThmV6PttPB/SnCWDaOkKZx7J/sxaV
|
||||
HMf5NLWUhdWZXqBIoH7nF2W4onW4HvPlQn2v7fOKSGRdghST2MDk/7NQcvJ29rNd
|
||||
QlB50JQ+awwAvthrDk4q7D7SzIKiGGUzE3eeml0aE9jD2z3Il3rucO2n5nzbcc8t
|
||||
lGLfbdb1OL4/pYUKGbio2Al1QnDE6u/LDsg0qBIimAy4E5S2S+zw0JDnJwIDAQAB
|
||||
o4HjMIHgMB0GA1UdEQQWMBSBEmVjX2FjY0BjYXRjZXJ0Lm5ldDAPBgNVHRMBAf8E
|
||||
BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUoMOLRKo3pUW/l4Ba0fF4
|
||||
opvpXY0wfwYDVR0gBHgwdjB0BgsrBgEEAfV4AQMBCjBlMCwGCCsGAQUFBwIBFiBo
|
||||
dHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbDA1BggrBgEFBQcCAjApGidW
|
||||
ZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAwDQYJKoZIhvcN
|
||||
AQEFBQADggEBAKBIW4IB9k1IuDlVNZyAelOZ1Vr/sXE7zDkJlF7W2u++AVtd0x7Y
|
||||
/X1PzaBB4DSTv8vihpw3kpBWHNzrKQXlxJ7HNd+KDM3FIUPpqojlNcAZQmNaAl6k
|
||||
SBg6hW/cnbw/nZzBh7h6YQjpdwt/cKt63dmXLGQehb+8dJahw3oS7AwaboMMPOhy
|
||||
Rp/7SNVel+axofjk70YllJyJ22k4vuxcDlbHZVHlUIiIv0LVKz3l+bqeLrPK9HOS
|
||||
Agu+TGbrIP65y7WZf+a2E/rKS03Z7lNGBjvGTq2TWoF+bCpLagVFjPIhpDGQh2xl
|
||||
nJ2lYJU6Un/10asIbvPuW/mIPX64b24D5EI=
|
||||
-----END CERTIFICATE-----
|
96
secure/caroot/trusted/EE_Certification_Centre_Root_CA.pem
Normal file
96
secure/caroot/trusted/EE_Certification_Centre_Root_CA.pem
Normal file
@ -0,0 +1,96 @@
|
||||
##
|
||||
## EE Certification Centre Root CA
|
||||
##
|
||||
## This is a single X.509 certificate for a public Certificate
|
||||
## Authority (CA). It was automatically extracted from Mozilla's
|
||||
## root CA list (the file `certdata.txt' in security/nss).
|
||||
##
|
||||
## Extracted from nss
|
||||
## with $FreeBSD: head/secure/caroot/MAca-bundle.pl 352951 2019-10-02 01:27:50Z kevans $
|
||||
##
|
||||
## @generated
|
||||
##
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
54:80:f9:a0:73:ed:3f:00:4c:ca:89:d8:e3:71:e6:4a
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C = EE, O = AS Sertifitseerimiskeskus, CN = EE Certification Centre Root CA, emailAddress = pki@sk.ee
|
||||
Validity
|
||||
Not Before: Oct 30 10:10:30 2010 GMT
|
||||
Not After : Dec 17 23:59:59 2030 GMT
|
||||
Subject: C = EE, O = AS Sertifitseerimiskeskus, CN = EE Certification Centre Root CA, emailAddress = pki@sk.ee
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c8:20:c0:ec:e0:c5:4b:ab:07:78:95:f3:44:ee:
|
||||
fb:0b:0c:ff:74:8e:61:bb:b1:62:ea:23:d8:ab:a1:
|
||||
65:32:7a:eb:8e:17:4f:96:d8:0a:7b:91:a2:63:6c:
|
||||
c7:8c:4c:2e:79:bf:a9:05:fc:69:5c:95:8d:62:f9:
|
||||
b9:70:ed:c3:51:7d:d0:93:e6:6c:eb:30:4b:e1:bc:
|
||||
7d:bf:52:9b:ce:6e:7b:65:f2:38:b1:c0:a2:32:ef:
|
||||
62:b2:68:e0:61:53:c1:36:95:ff:ec:94:ba:36:ae:
|
||||
9c:1c:a7:32:0f:e5:7c:b4:c6:6f:74:fd:7b:18:e8:
|
||||
ac:57:ed:06:20:4b:32:30:58:5b:fd:cd:a8:e6:a1:
|
||||
fc:70:bc:8e:92:73:db:97:a7:7c:21:ae:3d:c1:f5:
|
||||
48:87:6c:27:bd:9f:25:74:81:55:b0:f7:75:f6:3d:
|
||||
a4:64:6b:d6:4f:e7:ce:40:ad:0f:dd:32:d3:bc:8a:
|
||||
12:53:98:c9:89:fb:10:1d:4d:7e:cd:7e:1f:56:0d:
|
||||
21:70:85:f6:20:83:1f:f6:ba:1f:04:8f:ea:77:88:
|
||||
35:c4:ff:ea:4e:a1:8b:4d:3f:63:1b:44:c3:44:d4:
|
||||
25:76:ca:b7:8d:d7:1e:4a:66:64:cd:5c:c5:9c:83:
|
||||
e1:c2:08:88:9a:ec:4e:a3:f1:3e:1c:2c:d9:6c:1d:
|
||||
a1:4b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
12:F2:5A:3E:EA:56:1C:BF:CD:06:AC:F1:F1:25:C9:A9:4B:D4:14:99
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication, TLS Web Server Authentication, Code Signing, E-mail Protection, Time Stamping, OCSP Signing
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
7b:f6:e4:c0:0d:aa:19:47:b7:4d:57:a3:fe:ad:bb:b1:6a:d5:
|
||||
0f:9e:db:e4:63:c5:8e:a1:50:56:93:96:b8:38:c0:24:22:66:
|
||||
bc:53:14:61:95:bf:d0:c7:2a:96:39:3f:7d:28:b3:10:40:21:
|
||||
6a:c4:af:b0:52:77:18:e1:96:d8:56:5d:e3:dd:36:5e:1d:a7:
|
||||
50:54:a0:c5:2a:e4:aa:8c:94:8a:4f:9d:35:ff:76:a4:06:13:
|
||||
91:a2:a2:7d:00:44:3f:55:d3:82:3c:1a:d5:5b:bc:56:4c:22:
|
||||
2e:46:43:8a:24:40:2d:f3:12:b8:3b:70:1a:a4:96:b9:1a:af:
|
||||
87:41:1a:6a:18:0d:06:4f:c7:3e:6e:b9:29:4d:0d:49:89:11:
|
||||
87:32:5b:e6:4b:04:c8:e4:5c:e6:74:73:94:5d:16:98:13:95:
|
||||
fe:fb:db:b1:44:e5:3a:70:ac:37:6b:e6:b3:33:72:28:c9:b3:
|
||||
57:a0:f6:02:16:88:06:0b:b6:a6:4b:20:28:d4:de:3d:8b:ad:
|
||||
37:05:53:74:fe:6e:cc:bc:43:17:71:5e:f9:c5:cc:1a:a9:61:
|
||||
ee:f7:76:0c:f3:72:f4:72:ad:cf:72:02:36:07:47:cf:ef:19:
|
||||
50:89:60:cc:e9:24:95:0f:c2:cb:1d:f2:6f:76:90:c7:cc:75:
|
||||
c1:96:c5:9d
|
||||
SHA1 Fingerprint=C9:A8:B9:E7:55:80:5E:58:E3:53:77:A7:25:EB:AF:C3:7B:27:CC:D7
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEAzCCAuugAwIBAgIQVID5oHPtPwBMyonY43HmSjANBgkqhkiG9w0BAQUFADB1
|
||||
MQswCQYDVQQGEwJFRTEiMCAGA1UECgwZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1
|
||||
czEoMCYGA1UEAwwfRUUgQ2VydGlmaWNhdGlvbiBDZW50cmUgUm9vdCBDQTEYMBYG
|
||||
CSqGSIb3DQEJARYJcGtpQHNrLmVlMCIYDzIwMTAxMDMwMTAxMDMwWhgPMjAzMDEy
|
||||
MTcyMzU5NTlaMHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNl
|
||||
ZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBS
|
||||
b290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWUwggEiMA0GCSqGSIb3DQEB
|
||||
AQUAA4IBDwAwggEKAoIBAQDIIMDs4MVLqwd4lfNE7vsLDP90jmG7sWLqI9iroWUy
|
||||
euuOF0+W2Ap7kaJjbMeMTC55v6kF/GlclY1i+blw7cNRfdCT5mzrMEvhvH2/UpvO
|
||||
bntl8jixwKIy72KyaOBhU8E2lf/slLo2rpwcpzIP5Xy0xm90/XsY6KxX7QYgSzIw
|
||||
WFv9zajmofxwvI6Sc9uXp3whrj3B9UiHbCe9nyV0gVWw93X2PaRka9ZP585ArQ/d
|
||||
MtO8ihJTmMmJ+xAdTX7Nfh9WDSFwhfYggx/2uh8Ej+p3iDXE/+pOoYtNP2MbRMNE
|
||||
1CV2yreN1x5KZmTNXMWcg+HCCIia7E6j8T4cLNlsHaFLAgMBAAGjgYowgYcwDwYD
|
||||
VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBLyWj7qVhy/
|
||||
zQas8fElyalL1BSZMEUGA1UdJQQ+MDwGCCsGAQUFBwMCBggrBgEFBQcDAQYIKwYB
|
||||
BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCAYIKwYBBQUHAwkwDQYJKoZIhvcNAQEF
|
||||
BQADggEBAHv25MANqhlHt01Xo/6tu7Fq1Q+e2+RjxY6hUFaTlrg4wCQiZrxTFGGV
|
||||
v9DHKpY5P30osxBAIWrEr7BSdxjhlthWXePdNl4dp1BUoMUq5KqMlIpPnTX/dqQG
|
||||
E5Gion0ARD9V04I8GtVbvFZMIi5GQ4okQC3zErg7cBqklrkar4dBGmoYDQZPxz5u
|
||||
uSlNDUmJEYcyW+ZLBMjkXOZ0c5RdFpgTlf7727FE5TpwrDdr5rMzcijJs1eg9gIW
|
||||
iAYLtqZLICjU3j2LrTcFU3T+bsy8QxdxXvnFzBqpYe73dgzzcvRyrc9yAjYHR8/v
|
||||
GVCJYMzpJJUPwssd8m92kMfMdcGWxZ0=
|
||||
-----END CERTIFICATE-----
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user