ca-certificates-mozilla-2.30-21.1<>,(\HE/=„v{,Ƥ gAD4/Nrss|)a=X8M+2pi}0 +l[A+vvQMۖJ"k~ ^'HX.&,k;#ÑƁ?#66 u![kCWV2bkmB{=!ֳd!V!J0YL5d7@6i^O Mb ފ>@l?\d $ @ %+2Qp <     , #''4)))*q(*8*&9+,&:-&>o@oBoFoGoHr@ItXulYupZu|[u\u]x ^bcdIeNfSlUuhvw<xzLCca-certificates-mozilla2.3021.1CA certificates for OpenSSLThis package contains some CA root certificates for OpenSSL extracted from MozillaFirefox\HEcloud135hxopenSUSE Leap 42.3openSUSEMPL-2.0http://bugs.opensuse.orgProductivity/Networking/Securityhttp://www.mozilla.orglinuxnoarchupdate-ca-certificates || trueupdate-ca-certificates || true;g0 O]]v,b %%aS "y k2 kE/<,S-/+ ~j6S  ta  ny+ *3 9"wV8ub+ b  8W[ KyE  4d. |27 1?8jy^A큤A큤A큤\HC\H>\HC\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HC\HC\HC\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HA\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HC\HC\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HC\HC\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\HB\H@\HC\HC\HC\HC\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-certificates-mozilla-2.30-21.1.src.rpmca-certificates-mozilla   /bin/sh/bin/shca-certificatesca-certificatesrpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2\@n@[ug@[?YZhu@V@TZ@T@SvS@S@S @S?RRRo@RQQQ)@Q@@Q@PrPuc@Os@OO@NtN^"@MF@L@KuK@KKKKP@KhJH@meissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comlnussel@suse.demeissner@suse.commeissner@suse.comlnussel@suse.demeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.deidonmez@suse.commeissner@suse.comlnussel@suse.decfarrell@suse.comcoolo@suse.comjengelh@medozas.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.de- updated to 2.30 state of the Mozilla NSS Certificate store. (bsc#1121446) - Removed CAs: - AC Raiz Certicamara S.A. - Certplus Root CA G1 - Certplus Root CA G2 - OpenTrust Root CA G1 - OpenTrust Root CA G2 - OpenTrust Root CA G3 - Visa eCommerce Root - Added Root CAs: - Certigna Root CA (email and server auth) - GTS Root R1 (server auth) - GTS Root R2 (server auth) - GTS Root R3 (server auth) - GTS Root R4 (server auth) - OISTE WISeKey Global Root GC CA (email and server auth) - UCA Extended Validation Root (server auth) - UCA Global G2 Root (email and server auth)- updated to 2.26 state of the Mozilla NSS Certificate store. (bsc#1104780) - removed server auth - Certplus Root CA G1 - Certplus Root CA G2 - OpenTrust Root CA G1 - OpenTrust Root CA G2 - OpenTrust Root CA G3 - remove CA - ComSign CA - added new CA - GlobalSign- Updated to 2.24 state of the Mozilla NSS Certificate store. - Removed CAs: * S-TRUST_Universal_Root_CA:2.16.96.86.197.75.35.64.91.100.212.237.37.218.217.214.30.30.crt * TC_TrustCenter_Class_3_CA_II:2.14.74.71.0.1.0.2.229.160.93.214.63.0.81.191.crt * TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5:2.7.0.142.23.254.36.32.129.crt- Updated to Mozilla certificate version 2.22 (bsc#1071152 bsc#1071390 bsc#1010996) - diff-from-upstream-2.7.patch: removed the old 1024 bit CAs we temporary left in to allow in-chain root certificates as openssl is now able to handle it. - Removed Code Signing rights from a lot of CAs (not listed here). - Removed Server Auth rights from: * AddTrust Low-Value Services Root * Camerfirma Chambers of Commerce Root * Camerfirma Global Chambersign Root * Swisscom Root CA 2 - Removed fully: * AddTrust Public Services Root * AddTrust Public CA Root * AddTrust Qualified CA Root * ApplicationCA - Japanese Government * Buypass Class 2 CA 1 * CA Disig Root R1 * CA WoSign ECC Root * Certification Authority of WoSign G2 * Certinomis - Autorité Racine * Certum Root CA * China Internet Network Information Center EV Certificates Root * CNNIC ROOT * Comodo Secure Services root * Comodo Trusted Services root * ComSign Secured CA * EBG Elektronik Sertifika Hizmet Sağlayıcısı * Equifax Secure CA * Equifax Secure eBusiness CA 1 * Equifax Secure Global eBusiness CA * GeoTrust Global CA 2 * IGC/A * Juur-SK * Microsec e-Szigno Root CA * PSCProcert * Root CA Generalitat Valenciana * RSA Security 2048 v3 * Security Communication EV RootCA1 * Sonera Class 1 Root CA * StartCom Certification Authority * StartCom Certification Authority G2 * S-TRUST Authentication and Encryption Root CA 2005 PN * Swisscom Root CA 1 * Swisscom Root EV CA 2 * TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3 * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6 * UTN USERFirst Hardware Root CA * UTN USERFirst Object Root CA * VeriSign Class 3 Secure Server CA - G2 * Verisign Class 1 Public Primary Certification Authority * Verisign Class 2 Public Primary Certification Authority - G2 * Verisign Class 3 Public Primary Certification Authority * WellsSecure Public Root Certificate Authority * Certification Authority of WoSign * WoSign China - Added: * Amazon Root CA 1: (email protection, server auth) * Amazon Root CA 2: (email protection, server auth) * Amazon Root CA 3: (email protection, server auth) * Amazon Root CA 4: (email protection, server auth) * Certplus Root CA G1: (email protection, server auth) * Certplus Root CA G2: (email protection, server auth) * D-TRUST Root CA 3 2013: (email protection) * GDCA TrustAUTH R5 ROOT: (server auth) * Hellenic Academic and Research Institutions ECC RootCA 2015: (email protection, server auth) * Hellenic Academic and Research Institutions RootCA 2015: (email protection, server auth) * ISRG Root X1: (server auth) * LuxTrust Global Root 2: (server auth) * OpenTrust Root CA G1: (email protection, server auth) * OpenTrust Root CA G2: (email protection, server auth) * OpenTrust Root CA G3: (email protection, server auth) * SSL.com EV Root Certification Authority ECC: (server auth) * SSL.com EV Root Certification Authority RSA R2: (server auth) * SSL.com Root Certification Authority ECC: (email protection, server auth) * SSL.com Root Certification Authority RSA: (email protection, server auth) * Symantec Class 1 Public Primary Certification Authority - G4: (email protection) * Symantec Class 1 Public Primary Certification Authority - G6: (email protection) * Symantec Class 2 Public Primary Certification Authority - G4: (email protection) * Symantec Class 2 Public Primary Certification Authority - G6: (email protection) * TrustCor ECA-1: (email protection, server auth) * TrustCor RootCert CA-1: (email protection, server auth) * TrustCor RootCert CA-2: (email protection, server auth) * TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1: (server auth)- updated to 2.7 (bsc#973042) - renamed: diff-from-upstream-2.2.patch -> diff-from-upstream-2.7.patch - Removed server trust from: AC Raíz Certicámara S.A. ComSign Secured CA NetLock Uzleti (Class B) Tanusitvanykiado NetLock Business (Class B) Root NetLock Expressz (Class C) Tanusitvanykiado TC TrustCenter Class 3 CA II TURKTRUST Certificate Services Provider Root 1 TURKTRUST Certificate Services Provider Root 2 Equifax Secure Global eBusiness CA-1 Verisign Class 4 Public Primary Certification Authority G3 - enable server trust Actalis Authentication Root CA - Deleted CAs: AOL CA A Trust nQual 03 Buypass Class 3 CA 1 CA Disig Digital Signature Trust Co Global CA 1 Digital Signature Trust Co Global CA 3 E Guven Kok Elektronik Sertifika Hizmet Saglayicisi NetLock Expressz (Class C) Tanusitvanykiado NetLock Kozjegyzoi (Class A) Tanusitvanykiado NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado NetLock Uzleti (Class B) Tanusitvanykiado SG TRUST SERVICES RACINE Staat der Nederlanden Root CA TC TrustCenter Class 2 CA II TC TrustCenter Universal CA I TDC Internet Root CA UTN DATACorp SGC Root CA Verisign Class 1 Public Primary Certification Authority - G2 Verisign Class 3 Public Primary Certification Authority Verisign Class 3 Public Primary Certification Authority - G2 - New added CAs: CA WoSign ECC Root Certification Authority of WoSign Certification Authority of WoSign G2 Certinomis - Root CA Certum Trusted Network CA 2 CFCA EV ROOT COMODO RSA Certification Authority DigiCert Assured ID Root G2 DigiCert Assured ID Root G3 DigiCert Global Root G2 DigiCert Global Root G3 DigiCert Trusted Root G4 Entrust Root Certification Authority - EC1 Entrust Root Certification Authority - G2 GlobalSign GlobalSign IdenTrust Commercial Root CA 1 IdenTrust Public Sector Root CA 1 OISTE WISeKey Global Root GB CA QuoVadis Root CA 1 G3 QuoVadis Root CA 2 G3 QuoVadis Root CA 3 G3 Staat der Nederlanden EV Root CA Staat der Nederlanden Root CA - G3 S-TRUST Universal Root CA SZAFIR ROOT CA2 TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5 TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6 USERTrust ECC Certification Authority USERTrust RSA Certification Authority 沃通根证书- diff-from-upstream-2.2.patch: Temporary reenable some root ca trusts, as openssl/gnutls have trouble using intermediates as root CA. - GTE CyberTrust Global Root - Thawte Server CA - Thawte Premium Server CA - ValiCert Class 1 VA - ValiCert Class 2 VA - RSA Root Certificate 1 - Entrust.net Secure Server CA - America Online Root Certification Authority 1 - America Online Root Certification Authority 2- Updated to 2.2 (bnc#888534) - The following CAs were removed: + America_Online_Root_Certification_Authority_1 + America_Online_Root_Certification_Authority_2 + GTE_CyberTrust_Global_Root + Thawte_Premium_Server_CA + Thawte_Server_CA - The following CAs were added: + COMODO_RSA_Certification_Authority codeSigning emailProtection serverAuth + GlobalSign_ECC_Root_CA_-_R4 codeSigning emailProtection serverAuth + GlobalSign_ECC_Root_CA_-_R5 codeSigning emailProtection serverAuth + USERTrust_ECC_Certification_Authority codeSigning emailProtection serverAuth + USERTrust_RSA_Certification_Authority codeSigning emailProtection serverAuth + VeriSign-C3SSA-G2-temporary-intermediate-after-1024bit-removal - The following CAs were changed: + Equifax_Secure_eBusiness_CA_1 remote code signing and https trust, leave email trust + Verisign_Class_3_Public_Primary_Certification_Authority_-_G2 only trust emailProtection- Updated to 2.1 (bnc#888534) - The following 1024-bit CA certificates were removed - Entrust.net Secure Server Certification Authority - ValiCert Class 1 Policy Validation Authority - ValiCert Class 2 Policy Validation Authority - ValiCert Class 3 Policy Validation Authority - TDC Internet Root CA - The following CA certificates were added: - Certification Authority of WoSign - CA 沃通根证书 - DigiCert Assured ID Root G2 - DigiCert Assured ID Root G3 - DigiCert Global Root G2 - DigiCert Global Root G3 - DigiCert Trusted Root G4 - QuoVadis Root CA 1 G3 - QuoVadis Root CA 2 G3 - QuoVadis Root CA 3 G3 - The Trust Bits were changed for the following CA certificates - Class 3 Public Primary Certification Authority - Class 3 Public Primary Certification Authority - Class 2 Public Primary Certification Authority - G2 - VeriSign Class 2 Public Primary Certification Authority - G3 - AC Raíz Certicámara S.A. - NetLock Uzleti (Class B) Tanusitvanykiado - NetLock Expressz (Class C) Tanusitvanykiado - certdata-temporary-1024.patch: restore some certificates removed from NSS as these are still used for some major sites. openssl is not as clever as NSS in selecting the new ones in the chain correctly.- do not provide openssl-certs, just obsolete it.- in sle11 we bumped openssl-certs version to match the NSS version, so provide/obsolete the current version.- updated certificates to revision 1.97 (bnc#881241) new: "Atos TrustedRoot 2011" (codeSigning emailProtection serverAuth) new: "Tugra Certification Authority" (codeSigning serverAuth) removed: "Firmaprofesional Root CA" removed: "TDC OCES Root CA" new: "TeliaSonera Root CA v1" (emailProtection serverAuth) new: "T-TeleSec GlobalRoot Class 2" (emailProtection serverAuth)- updated certificates to revision 1.96 (bnc#865080) new: ACCVRAIZ1.pem (Spain) (all trusts) new: SG_TRUST_SERVICES_RACINE.pem (Singapore) (email signing only) new: TWCA_Global_Root_CA.pem (Taiwanese) (all trusts) removed: Wells_Fargo_Root_CA.pem- Updated to 1.95 Distrust a sub-ca that issued google.com certificates. "Distrusted AC DG Tresor SSL" (bnc#854367)- fix handling of certificates with same name (bnc#854163)- Updated to 1.94 * new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt server auth, code signing, email signing * new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt server auth, code signing, email signing * new: China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt server auth * changed: Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt removed code signing and server auth abilities * changed: Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt removed code signing and server auth abilities * new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt server auth * new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt server auth * removed: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.185.102.crt * new: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.crt I think the missing flags were adjusted. * removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt * new: PSCProcert:2.1.11.crt server auth, code signing, email signing * new: Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt server auth, code signing, email signing * new: Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt server auth, code signing * changed: TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt removed all abilities * new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt server auth, code signing * changed: TWCA_Root_Certification_Authority:2.1.1.crt added code signing ability - removed temporary Entrust.net_Premium_2048_Secure_Server_CA.p11-kit override.- update Entrust root attributes to new format used by p11-kit- remove superfluous double quotes from certificate names- add fake basic contraints to Entrust root so p11-kit export the cert (bnc#829471) - add nssckbi.h that matches certdata.txt; make sure package has the correct version number which is currently 1.93. No actual content change in certdata.txt compared to 1.85, it's just that the versioning scheme changed.- use certdata2pem.py from Fedora to extract all certs- use correct 'anchors' subdirectory- new location of CA certificate anchors is /usr/share/ca-certificates/anchors- update certificates to revision 1.87 (bnc#796628) * new "EE Certification Centre Root CA" * new "T-TeleSec GlobalRoot Class 3" * revoke mis-issued intermediate CAs from TURKTRUST- updated certificates to revision 1.85 (bnc#783509) * new "Actalis Authentication Root CA" * new "Trustis FPS Root CA" * new "StartCom Certification Authority" * new "StartCom Certification Authority G2" * new "Buypass Class 2 Root CA" * new "Buypass Class 3 Root CA" * updated: "Sonera Class2 CA": remove code-signing * updated: "thawte Primary Root CA": added code-signing * updated: "Trustis_FPS_Root_CA.pem": added code-signing * updated: VeriSign Class 3 Public Primary Certification Authority - G5": added code-signing, email-protection- update certificates to revision 1.83 (bnc#760503) * new: EC_ACC.pem * new: Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem * new: Security_Communication_RootCA2.pem * removed: TC_TrustCenter_Germany_Class_2_CA.pem * removed: TC_TrustCenter_Germany_Class_3_CA.pem * removed: Verisign_Class_1_Public_Primary_Certification_Authority.1.pem * removed: Verisign_Class_2_Public_Primary_Certification_Authority.pem * removed: Verisign_Class_4_Public_Primary_Certification_Authority_G2.pem - license change to MPL-2.0- license update: MPL-1.1 or GPL-2.0+ or LGPL-2.1+ SPDX format and correct GPL and LGPL tags to include or later- change license to be in spdx.org format- Remove redundant tags/sections from specfile- update certificates to revision 1.76 * new: Go_Daddy_Root_Certificate_Authority_G2.pem * new: Starfield_Root_Certificate_Authority_G2.pem * new: Starfield_Services_Root_Certificate_Authority_G2.pem * new: AffirmTrust_Commercial.pem * new: AffirmTrust_Networking.pem * new: AffirmTrust_Premium.pem * new: AffirmTrust_Premium_ECC.pem * new: Certum_Trusted_Network_CA.pem * new: Certinomis_Autorit_Racine.pem * new: Root_CA_Generalitat_Valenciana.pem * new: A_Trust_nQual_03.pem * new: TWCA_Root_Certification_Authority.pem * removed: DigiNotar_Root_CA.pem (bnc#714931)- update certificates to revision 1.70 * new: AddTrust_Qualified_Certificates_Root.pem * new: Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem * new: Chambers_of_Commerce_Root_2008.pem * new: Global_Chambersign_Root_2008.pem * new: Izenpe_com.pem * new: TC_TrustCenter_Universal_CA_III.pem- update certificates to revision 1.65 * new: E_Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem * new: GlobalSign_Root_CA_R3.pem * new: Microsec_e_Szigno_Root_CA_2009.pem * new: Verisign_Class_1_Public_Primary_Certification_Authority.1.pem * new: Verisign_Class_3_Public_Primary_Certification_Authority.1.pem- update certificates to revision 1.64 * removed "RSA Security 1024 V3" certificate- require ca-certificates also for postun- don't output trusted certs by default as it's not supported by gnutls yet and pidgin scans /etc/ssl/certs- update certificates to revision 1.62- extract trustbits as comment as Fedora does - convert to trusted certificates in spec file instead- rename to ca-certificates-mozilla - output trusted certificates - use utf8 in file names- update certificates to revision 1.57 - add script to compare with previous certificates- update certifiates to cvs revision 1.56 - exclude certficates that are not trusted for identifying web sites/bin/sh/bin/shopenssl-certscloud135 1548262981  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~2.30-21.1ca-certificates-mozillaCOPYINGtrustACCVRAIZ1.pemAC_RAIZ_FNMT-RCM.pemActalis_Authentication_Root_CA.pemAddTrust_External_Root.pemAddTrust_Low-Value_Services_Root.pemAffirmTrust_Commercial.pemAffirmTrust_Networking.pemAffirmTrust_Premium.pemAffirmTrust_Premium_ECC.pemAmazon_Root_CA_1.pemAmazon_Root_CA_2.pemAmazon_Root_CA_3.pemAmazon_Root_CA_4.pemAtos_TrustedRoot_2011.pemAutoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pemBaltimore_CyberTrust_Root.pemBuypass_Class_2_Root_CA.pemBuypass_Class_3_Root_CA.pemCA_Disig_Root_R2.pemCFCA_EV_ROOT.pemCOMODO_Certification_Authority.pemCOMODO_ECC_Certification_Authority.pemCOMODO_RSA_Certification_Authority.pemCamerfirma_Chambers_of_Commerce_Root.pemCamerfirma_Global_Chambersign_Root.pemCertigna.pemCertigna_Root_CA.pemCertinomis_-_Root_CA.pemCertplus_Class_2_Primary_CA.pemCertum_Root_CA.pemCertum_Trusted_Network_CA.pemCertum_Trusted_Network_CA_2.pemChambers_of_Commerce_Root_-_2008.pemComodo_AAA_Services_root.pemCybertrust_Global_Root.pemD-TRUST_Root_CA_3_2013.pemD-TRUST_Root_Class_3_CA_2_2009.pemD-TRUST_Root_Class_3_CA_2_EV_2009.pemDST_Root_CA_X3.pemDeutsche_Telekom_Root_CA_2.pemDigiCert_Assured_ID_Root_CA.pemDigiCert_Assured_ID_Root_G2.pemDigiCert_Assured_ID_Root_G3.pemDigiCert_Global_Root_CA.pemDigiCert_Global_Root_G2.pemDigiCert_Global_Root_G3.pemDigiCert_High_Assurance_EV_Root_CA.pemDigiCert_Trusted_Root_G4.pemDistrust:_O=Egypt_Trust__OU=VeriSign_Trust_Network_=cert_1_3=:2.16.76.0.54.27.229.8.43.169.170.206.116.10.5.62.251.52.p11-kitDistrust:_O=Egypt_Trust__OU=VeriSign_Trust_Network_=cert_2_3=:2.16.62.12.158.135.105.170.149.92.234.35.216.69.158.212.91.81.p11-kitDistrust:_O=Egypt_Trust__OU=VeriSign_Trust_Network_=cert_3_3=:2.16.18.189.38.162.174.51.192.127.36.123.106.88.105.242.10.118.p11-kitE-Tugra_Certification_Authority.pemEC-ACC.pemEE_Certification_Centre_Root_CA.pemEntrust.net_Premium_2048_Secure_Server_CA.pemEntrust_Root_Certification_Authority.pemEntrust_Root_Certification_Authority_-_EC1.pemEntrust_Root_Certification_Authority_-_G2.pemExplicitly_Distrust_DigiNotar_Root_CA.pemExplicitly_Distrusted_DigiNotar_PKIoverheid_G2.pemGDCA_TrustAUTH_R5_ROOT.pemGTS_Root_R1.pemGTS_Root_R2.pemGTS_Root_R3.pemGTS_Root_R4.pemGeoTrust_Global_CA.pemGeoTrust_Primary_Certification_Authority.pemGeoTrust_Primary_Certification_Authority_-_G2.pemGeoTrust_Primary_Certification_Authority_-_G3.pemGeoTrust_Universal_CA.pemGeoTrust_Universal_CA_2.pemGlobalSign_ECC_Root_CA_-_R4.pemGlobalSign_ECC_Root_CA_-_R5.pemGlobalSign_Root_CA.pemGlobalSign_Root_CA_-_R2.pemGlobalSign_Root_CA_-_R3.pemGlobalSign_Root_CA_-_R6.pemGlobal_Chambersign_Root_-_2008.pemGo_Daddy_Class_2_CA.pemGo_Daddy_Root_Certificate_Authority_-_G2.pemHellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pemHellenic_Academic_and_Research_Institutions_RootCA_2011.pemHellenic_Academic_and_Research_Institutions_RootCA_2015.pemHongkong_Post_Root_CA_1.pemISRG_Root_X1.pemIdenTrust_Commercial_Root_CA_1.pemIdenTrust_Public_Sector_Root_CA_1.pemIzenpe.com.pemLuxTrust_Global_Root_2.pemMITM_subCA_1_issued_by_Trustwave:2.4.107.73.210.5.p11-kitMITM_subCA_2_issued_by_Trustwave:2.4.107.73.210.6.p11-kitMicrosec_e-Szigno_Root_CA_2009.pemNetLock_Arany_=Class_Gold=_Főtanúsítvány.pemNetwork_Solutions_Certificate_Authority.pemOISTE_WISeKey_Global_Root_GA_CA.pemOISTE_WISeKey_Global_Root_GB_CA.pemOISTE_WISeKey_Global_Root_GC_CA.pemQuoVadis_Root_CA.pemQuoVadis_Root_CA_1_G3.pemQuoVadis_Root_CA_2.pemQuoVadis_Root_CA_2_G3.pemQuoVadis_Root_CA_3.pemQuoVadis_Root_CA_3_G3.pemSSL.com_EV_Root_Certification_Authority_ECC.pemSSL.com_EV_Root_Certification_Authority_RSA_R2.pemSSL.com_Root_Certification_Authority_ECC.pemSSL.com_Root_Certification_Authority_RSA.pemSZAFIR_ROOT_CA2.pemSecureSign_RootCA11.pemSecureTrust_CA.pemSecure_Global_CA.pemSecurity_Communication_RootCA2.pemSecurity_Communication_Root_CA.pemSonera_Class_2_Root_CA.pemStaat_der_Nederlanden_EV_Root_CA.pemStaat_der_Nederlanden_Root_CA_-_G2.pemStaat_der_Nederlanden_Root_CA_-_G3.pemStarfield_Class_2_CA.pemStarfield_Root_Certificate_Authority_-_G2.pemStarfield_Services_Root_Certificate_Authority_-_G2.pemSwissSign_Gold_CA_-_G2.pemSwissSign_Platinum_CA_-_G2.pemSwissSign_Silver_CA_-_G2.pemSwisscom_Root_CA_2.pemSymantec_Class_1_Public_Primary_Certification_Authority_-_G4.pemSymantec_Class_1_Public_Primary_Certification_Authority_-_G6.pemSymantec_Class_2_Public_Primary_Certification_Authority_-_G4.pemSymantec_Class_2_Public_Primary_Certification_Authority_-_G6.pemT-TeleSec_GlobalRoot_Class_2.pemT-TeleSec_GlobalRoot_Class_3.pemTUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pemTURKTRUST_Mis-issued_Intermediate_CA_1:2.2.8.39.p11-kitTURKTRUST_Mis-issued_Intermediate_CA_2:2.2.8.100.p11-kitTWCA_Global_Root_CA.pemTWCA_Root_Certification_Authority.pemTaiwan_GRCA.pemTeliaSonera_Root_CA_v1.pemTrustCor_ECA-1.pemTrustCor_RootCert_CA-1.pemTrustCor_RootCert_CA-2.pemTrustis_FPS_Root_CA.pemUCA_Extended_Validation_Root.pemUCA_Global_G2_Root.pemUSERTrust_ECC_Certification_Authority.pemUSERTrust_RSA_Certification_Authority.pemUTN_USERFirst_Email_Root_CA.pemVeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pemVeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pemVeriSign_Universal_Root_Certification_Authority.pemVerisign_Class_1_Public_Primary_Certification_Authority_-_G3.pemVerisign_Class_2_Public_Primary_Certification_Authority_-_G3.pemVerisign_Class_3_Public_Primary_Certification_Authority_-_G3.pemXRamp_Global_CA_Root.pemanchorscertSIGN_ROOT_CA.pemePKI_Root_Certification_Authority.pemthawte_Primary_Root_CA.pemthawte_Primary_Root_CA_-_G2.pemthawte_Primary_Root_CA_-_G3.pem/usr/share/doc/packages//usr/share/doc/packages/ca-certificates-mozilla//usr/share/pki//usr/share/pki/trust/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9513/openSUSE_Leap_42.3_Update/3160a47e6def8aadef2b106a698646cd-ca-certificates-mozilla.openSUSE_Leap_42.3_Updatedrpmlzma5noarch-suse-linuxdirectoryUTF-8 Unicode textASCII textASCII text, with very long lines1ߖhQ.P?]"k%v41 GSlUuOlZIO @D*2m"EC@ܨ)1{Epݏhut[PV_G~Ack&hK& )d/m>,,X/R`ʻ^}po{w(KYe-7 ǡdu$?q^xHVlAgrZ*8aem~;b*c!f9uy=8 pvEVK?fbw>3^kc$r#Hqz96E#"i 3(J`F|n8/"k fú]N'$ϊis_=U IO,Wͧ~4xQZW$ss3ԁ}=a$JK]33יEZs$iMeςY;>A^dKq%cOUO0p#TvO*"01=!(_3PLv.u]O-g+.&kw {ȶS۷5Xn EpxUqv3CZPR'S84b;Iڸ=EHG༤9:zs^ǘ`'p\ r -:0:tJFRSKJ6n 3m'`pI͎%yeLn[<9E!5=mG7_fT(l7G݅,HUIam&$ꟅB8ܡ8dĄ RApH〹!q.[bQ=f3m2yh`Aa>7}B ~ `]@ Gd'o;o &/sj)TF7 d,6wQ)4O44bFb6{?h}ǖ\w:͕#&a}voz3aCe' JndI"$( L~CaD2Qoz(珦r-㇡_mF5){#-T#a y\eykr]%yikwµO%h~ACkP~Zՙ@+I•]򰵖'#Hҭ@JTF1S.p?J4Qx*AՊm3[VaM#1oJey/ka%рm~3G8%0%jFQT¹rnKPkꇶ§z^, 6I!C^8٭Ti6v\If0&Qo!%\2EP[q00W)hG$`ECK@ JF k Xg,K])NYClwO}϶)V[dڵliM&6p)jsF}`|2dmMp?*o :z^XrgjhA+!ct?r}}9Y`dc8hDS 0(@*-&D-鰹H+9Ox l{DT k1#jQ TBj,ZkiUHc+F&$XaZڒx#wz9꣜+Ōaqa5dfM&^O=_Rϧxt$Bٟ JD*KVE^ oZ-09r~ ,6%Q_}w/p j~|f ·#ݛOxԤn'ؘBQ^ݳwJeou6v4|L~hۯYqAJY28cо@2t_#T,y0B8xf"z' Dͨ5`k1 V[A& ܾIt4=lmzz%:c:T?/XmJljW:Z !}_2 =s!zE0ޱȊsmD2מVm;8.mά5ɉxBן9[ Ԭ N~j2Kpiv(O)lDlhKOHʻ͖и`Zlp+~xz`oъe*}Xg8ؿXj㖰fvabr+uѲW~FA~ʮon*gvG3gm!,K0jgc|#WRx_.PK}\zEf^X^aœgTG䵦>[ۄS&43#YPϻͰ9@حzEP>u--ƠֈMNYlBqޑ_jW;Jnb[&ܻ*w̺l:GX (dԜ\mUnVr3xmeó 4ayku?Q=+GQ?pa:stuH8b,{4Qj )(m&C~C<°4v@^KY @3J9hΚ@QГRe0[KَRA?0=`@8 ȝJ\'wZp&|gPu=Ú C~"L-\!}*_\ϨhpnxAIA⑆`wdUw|#\>͟<2ߦ/;cx0O9xL )KBlft:xgdRq"5m/7Ѳ!v&t!6ĬMy-Fbl>w)9tHanՄ`G`1!.6E1b.S6_)5zV9]J/*[O!Ӡ,i Q2HL`1nެ|R_D L I<4'eRO]6ۖ'SZGm/pґhlΖ P7MG9LI{kDD5zu8&G8Ѷ>: Mzm6=$jQ 5|J$ozBVc1 c(F&wN'P34H%1w6;؎0,<2$0-9U_d x-V@cmxS*$omw鼿ASn$eQih4l6'BPry{!Xe:Ƣ!"|n5TڤW Ii,h웜~~鉋ߧA~Cy`ZmR.0錙K~K&F77O&fQ+1͝O \vv:t?hOh$JrqecM-,]`_+zjc"(vi f|LUqۓ nr!m#}7GLxRA5E:\6o4YMŜiG%܎PqM7x8[`#lϛh*v ?k2J.i86y_(3Mz;.@G,s͵ZHסԌ&:+ߦ&0#Nb0(n!ټG z(sy;9ߑ"lPW⪊d @YnvR6KIZ;>fX(fmPYS+XN p*QMi q‚qwp+-izj<, ¢V4h}1+^A +FCN\idv-Ib 2cT֭oVULY2` d_ ѯ׻U Ex5!^7P }\8Áf`e ]pƝϺri4+M&J'>$>9;-.=D*ɕHh`Z%MsXzrkq3lefww3ަM=SfeJ8|E~CMHDMgU65`IH3aO*pQW:W73 o떽[Z?'\sݰtg栖7MIGĤmu֮ +>1R/V1 g$cwsdH<ԟmP%&Q2'[dg8cXE,In"es!5_ L1 ,IvWz:U9R0d(:w""|ؔ8镦J`&R.dZ֭~XJ6\)8 oT˪Xė.M qZ1Q8:L?~RYuTG!Ŵc j< vetyc٠tk^ּ5I["U%ԛ[/?p@$ϋh37lqq|<]&1}ԩWK|V#ښV+;/)y'i_|#yj" y >>N6Gn urt,'f 06OviplKs@3J@Þ~p$x }9@#|?O 3VќpIhe)+K8vE?vG{12w8򛣩M~K4әH%يriI#]He6)hq'4ػ?j9RAkwfΤ8/ ݕq \r}^p믠Dtzw;:%kt)y-nW;}K`c#y%M*6^O ,}"ߦyd  la$+猷tןY:D (2wj]h4n*4;qf[UxGfԸM V濕@uXMAl!fXlѿjbpGSTz-0~_^CW^sX]SuI;gCէSK&nBу OhBGJ RKq%Q CGD֤mLzRXC'u=L=- ^*c{x`r2)l>O 9xdw?ΣiFɵ2/Ju5G s2N+*b7ijlbM}l˃gx:NyM#J ڮOx% e|cQ57!79 kz0Ȳ(c,xH>+0i"f-㕪{w>vvS&ԁ2N-g^Xv a N`?G-IܡU%  H$Z2q~)[lb;)y6Kā  D*)OPl%(zFTۭPL6x6Zh#ݔ{R3n*g5z4mq.M%g6`e/zGˡetpqY]kl#"R8< D w`@!EM{8N?;3Ԝ2fн&qЉ>3>CI=!d9zT9Ί鶴[csQ;rEft [*,G.+xSkfN7SA_Sr٫ }9pŖ򓔢xGˀ–4rT*M]fxKdK&쇿J'QmueTZZx0}WE,O@o&Y? 7-%" Zu^@b C G&ƀ Z  ]3q.>Ua7=NUjŇ-ĺ0\v|} ulȽi]%pf.]k3r^^MgLdn]ʠ>3 wmduCdnʨ9\0[y.OxaxGt&#>560~h5v"[f֯ ?`cɸȭIRnĈ`7CtPTDz,:֩ZW>IR{`ewVi?>Q)տM@ %t:2)?]3n"0(WTq̟Cq*M VKGT ݮއ9`wjҁ!ƫXKjU7xښhNxH9m3kV}BƨH UpofVB j׷& :QS'c? km0N ^*v W DF8ZDe/;06]8m(UF ٝ+dGH+Fij@22{}E9,CZT:i4&>8E6:Lj:(kn,r8GJK4]?PP 1[;݂"R؉϶3sm2~T@̴n,šU5[p.'@(qH* tq ,\>2%P=ch `L,W.mBI" bn g6} uĀ< ,>bz-%8`?1bBD|'rE>AǕc`߳-~DSW L=K!boFmV+s`zY)P&ov\8]i l+xӯb ʄT@;J`!DAĐ,ؒ^JieFӯk腲#FCOv/矋1Ҡn1I3JSUPKy&&"`Z~J7q١)$ٙ>LcK8d%.@r2K߿au$mu!HcOH_G?9 BW: 3Y ħ2q vC(5<$[J% CC_+$wfp}xGbkl{Q{ow _Xq&Λ"lAIqQAcqkq^n)-=JW>8.P{ zR\=T*VU!<& mOce#IWS+P#tރ_d->.A)t5qWYu〓kg^~@; np؅q; 7`өL0樽{b2ğYS#`pwξp9_<lWfkvgMYhMuZT-SvJ#G' ݩ\zA (00bՙ<2%˄gSj+E*+ˇ%0d+{eFb` ?3ZRa>$*mE#bY ".5Rv[sv\D@Ȓrw'j4Tz>2O55sY ;Үϫ*ϫBOϱ5{x_%'3(*m(s=BG~5&R/ytSX2y`.!'E/sMzeYSr+?#Amڮtn)1@ݯfW!Zrl]|bڗUDJ|Y<*N|a8u; <dXshk!ׅqK1,Lh3jo3[XBwР">BEf5$Ujsk ]̥ ¤D5W1K (WaPnMeQ(M^a@=@ɗ<6 ܾ^xRN5R{qTk+qip4'E8i0