20040809 (patches unapplied)

Imported using git-ubuntu import.
This commit is contained in:
Fumitoshi UKAI 2004-08-09 03:23:20 +09:00 committed by git-ubuntu importer
parent 89c05f74ff
commit b12e6d171a
Notes: git-ubuntu importer 2020-07-14 23:22:48 +00:00
  * previous version was not fixed Bug#255933 correctly.
    update-ca-certificates now remove symlinks of deselected entries 
    in ca-certificates.conf
    closes: Bug#255933
  * run update-ca-certificates by /bin/sh -e
    closes: Bug#247581
  * update-ca-certificates remove symlinks of deselected entries 
    in ca-certificates.conf
    closes: Bug#255933
  * change default of trust_new_crts from 'ask' to 'yes'
    closes: Bug#218838, Bug#221527, Bug#236675, Bug#247509
  * refer libssl0.9.7 instead of libssl0.9.6 in Enhances:
    closes: Bug#251158
  * add brasil.gov.br certs
    closes: Bug#224612
  * add Signet CA Roots certs
    closes: Bug#233206
  * add QuoVadis CA Roots certs
    closes: Bug#250847
  * update pt_BR.po
    closes: Bug#218812
  * add da.po
    closes: Bug#235322
  * add ca.po
    closes: Bug#237124
  * add nl.po
    closes: Bug#23840
  * add de.po
    closes: Bug#250785
  * fix quote characters in template
    closes: Bug#255738
  * remove debian.org, because certs used in db.debian.org has been
    revoked due to debian.org crack incidents.
    db.debian.org uses certificates using spi-inc.org Root CA.
  * NMU
  * Add brasil.gov.br/brasil.gov.br.crt, created from
    http://www.icpbrasil.gov.br/certificadoACRaiz.crt
  * Add debian/po/pt_BR.po: closes: Bug#224612
37 changed files with 2628 additions and 114 deletions

View file

@ -3,7 +3,8 @@
#
CERTSDIR = /usr/share/ca-certificates
SUBDIRS = spi-inc.org debian.org mozilla
SUBDIRS = spi-inc.org mozilla \
brasil.gov.br signet.pl quovadis.bm
all:
for dir in $(SUBDIRS); do \

16
brasil.gov.br/README Normal file
View file

@ -0,0 +1,16 @@
--------------------------------
Brazilian Government Certificate
--------------------------------
This certificate has been fetched from the following website:
http://www.icpbrasil.gov.br/certificadoACRaiz.crt
It was converted to the distribution format with the following
command:
openssl x509 -inform DER -in certificadoACRaiz.crt > brasil.gov.br.crt
Thanks to Wichert Akkerman for helping out with this inclusion.
-- Gustavo Noronha Silva <kov@debian.org> Sat, 20 Dec 2003 13:53:04 -0200

View file

@ -0,0 +1,28 @@
-----BEGIN CERTIFICATE-----
MIIEuDCCA6CgAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBtDELMAkGA1UEBhMCQlIx
EzARBgNVBAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25h
bCBkZSBUZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxETAPBgNVBAcTCEJy
YXNpbGlhMQswCQYDVQQIEwJERjExMC8GA1UEAxMoQXV0b3JpZGFkZSBDZXJ0aWZp
Y2Fkb3JhIFJhaXogQnJhc2lsZWlyYTAeFw0wMTExMzAxMjU4MDBaFw0xMTExMzAy
MzU5MDBaMIG0MQswCQYDVQQGEwJCUjETMBEGA1UEChMKSUNQLUJyYXNpbDE9MDsG
A1UECxM0SW5zdGl0dXRvIE5hY2lvbmFsIGRlIFRlY25vbG9naWEgZGEgSW5mb3Jt
YWNhbyAtIElUSTERMA8GA1UEBxMIQnJhc2lsaWExCzAJBgNVBAgTAkRGMTEwLwYD
VQQDEyhBdXRvcmlkYWRlIENlcnRpZmljYWRvcmEgUmFpeiBCcmFzaWxlaXJhMIIB
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwPMudwX/hvm+Uh2b/lQAcHVA
isamaLkWdkwP9/S/tOKIgRrL6Oy+ZIGlOUdd6uYtk9Ma/3pUpgcfNAj0vYm5gsyj
Qo9emsc+x6m4VWwk9iqMZSCK5EQkAq/Ut4n7KuLE1+gdftwdIgxfUsPt4CyNrY50
QV57KM2UT8x5rrmzEjr7TICGpSUAl2gVqe6xaii+bmYR1QrmWaBSAG59LrkrjrYt
bRhFboUDe1DK+6T8s5L6k8c8okpbHpa9veMztDVC9sPJ60MWXh6anVKo1UcLcbUR
yEeNvZneVRKAAU6ouwdjDvwlsaKydFKwed0ToQ47bmUKgcm+wV3eTRk36UOnTwID
AQABo4HSMIHPME4GA1UdIARHMEUwQwYFYEwBAQAwOjA4BggrBgEFBQcCARYsaHR0
cDovL2FjcmFpei5pY3BicmFzaWwuZ292LmJyL0RQQ2FjcmFpei5wZGYwPQYDVR0f
BDYwNDAyoDCgLoYsaHR0cDovL2FjcmFpei5pY3BicmFzaWwuZ292LmJyL0xDUmFj
cmFpei5jcmwwHQYDVR0OBBYEFIr68VeEERM1kEL6V0lUaQ2kxPA3MA8GA1UdEwEB
/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQAZA5c1
U/hgIh6OcgLAfiJgFWpvmDZWqlV30/bHFpj8iBobJSm5uDpt7TirYh1Uxe3fQaGl
YjJe+9zd+izPRbBqXPVQA34EXcwk4qpWuf1hHriWfdrx8AcqSqr6CuQFwSr75Fos
SzlwDADa70mT7wZjAmQhnZx2xJ6wfWlT9VQfS//JYeIc7Fue2JNLd00UOSMMaiK/
t79enKNHEA2fupH3vEigf5Eh4bVAN5VohrTm6MY53x7XQZZr1ME7a55lFEnSeT0u
mlOAjR2mAbvSM5X5oSZNrmetdzyTj2flCM8CC7MLab0kkdngRIlUBGHF1/S5nmPb
K+9A46sd33oqK8n8
-----END CERTIFICATE-----

View file

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIDnjCCAwegAwIBAgIBADANBgkqhkiG9w0BAQQFADCBlzELMAkGA1UEBhMCVVMx
EDAOBgNVBAgTB0dlb3JnaWExEDAOBgNVBAcTB0F0bGFudGExDzANBgNVBAoTBkRl
YmlhbjENMAsGA1UECxMETERBUDEWMBQGA1UEAxMNZGIuZGViaWFuLm9yZzEsMCoG
CSqGSIb3DQEJARYdZGViaWFuLWFkbWluQGxpc3RzLmRlYmlhbi5vcmcwHhcNMDAw
NzI5MjE1OTA5WhcNMTAwNzI3MjE1OTA5WjCBlzELMAkGA1UEBhMCVVMxEDAOBgNV
BAgTB0dlb3JnaWExEDAOBgNVBAcTB0F0bGFudGExDzANBgNVBAoTBkRlYmlhbjEN
MAsGA1UECxMETERBUDEWMBQGA1UEAxMNZGIuZGViaWFuLm9yZzEsMCoGCSqGSIb3
DQEJARYdZGViaWFuLWFkbWluQGxpc3RzLmRlYmlhbi5vcmcwgZ8wDQYJKoZIhvcN
AQEBBQADgY0AMIGJAoGBAMRYwJxVehwk2pts6q1LlfslAftUw0IsRESlou4SED5j
8iSTpCCbtefe9AzX69yRmUHz8Zkj58F21PKCmpvnIbgaL+BwSOY+3jU4r05NK8I6
qNXQNZelpp2dInUJT1A+dXz8ZR5H6gBWtx8lcch6+ioSn//BhwpOhpxt3O7S61KH
AgMBAAGjgfcwgfQwHQYDVR0OBBYEFJZPV/IDMjUmd4w6UKDK6dsShWruMIHEBgNV
HSMEgbwwgbmAFJZPV/IDMjUmd4w6UKDK6dsShWruoYGdpIGaMIGXMQswCQYDVQQG
EwJVUzEQMA4GA1UECBMHR2VvcmdpYTEQMA4GA1UEBxMHQXRsYW50YTEPMA0GA1UE
ChMGRGViaWFuMQ0wCwYDVQQLEwRMREFQMRYwFAYDVQQDEw1kYi5kZWJpYW4ub3Jn
MSwwKgYJKoZIhvcNAQkBFh1kZWJpYW4tYWRtaW5AbGlzdHMuZGViaWFuLm9yZ4IB
ADAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBAUAA4GBAKCBNj8/f1/nhGPPE6GA
2xQkFRp30qJ/dLoo5OxmYaASoAEM+xVrARSjuzEEtwKwvEyU7flswgPhtuwJ7gqi
XpJ0A41WvI2gzRVhuet9SrIjIBBfyEtrYd/JtKokHqwor/IJTt7PPsFlXbIPv3Dt
mKijtW1tpsdiaOu8EMSEpzvk
-----END CERTIFICATE-----

11
debian/NEWS vendored Normal file
View file

@ -0,0 +1,11 @@
ca-certificates (20040808) unstable; urgency=low
* New CA certificates:
- brasil.gov.gr: Autoridade Certificadora Raiz Brasileira
- signet.pl: Certification Center Signet (CC Signet)
- quovadis.bm: QuoVadis CA certificates
* Remove CA certificates:
- debian.org: revoked due to crack incident.
-- Fumitoshi UKAI <ukai@debian.or.jp> Sun, 8 Aug 2004 22:43:36 +0900

View file

@ -7,6 +7,7 @@ It includes the following certificates:
- spi-inc.org certificate
- db.debian.org certificate
- Mozilla builtin CA certificates
- brasil.gov.br certificate
configuration file:
/etc/ca-certificates.conf

53
debian/changelog vendored
View file

@ -1,3 +1,56 @@
ca-certificates (20040809) unstable; urgency=low
* previous version was not fixed Bug#255933 correctly.
update-ca-certificates now remove symlinks of deselected entries
in ca-certificates.conf
closes: Bug#255933
-- Fumitoshi UKAI <ukai@debian.or.jp> Mon, 9 Aug 2004 03:23:20 +0900
ca-certificates (20040808) unstable; urgency=low
* run update-ca-certificates by /bin/sh -e
closes: Bug#247581
* update-ca-certificates remove symlinks of deselected entries
in ca-certificates.conf
closes: Bug#255933
* change default of trust_new_crts from 'ask' to 'yes'
closes: Bug#218838, Bug#221527, Bug#236675, Bug#247509
* refer libssl0.9.7 instead of libssl0.9.6 in Enhances:
closes: Bug#251158
* add brasil.gov.br certs
closes: Bug#224612
* add Signet CA Roots certs
closes: Bug#233206
* add QuoVadis CA Roots certs
closes: Bug#250847
* update pt_BR.po
closes: Bug#218812
* add da.po
closes: Bug#235322
* add ca.po
closes: Bug#237124
* add nl.po
closes: Bug#23840
* add de.po
closes: Bug#250785
* fix quote characters in template
closes: Bug#255738
* remove debian.org, because certs used in db.debian.org has been
revoked due to debian.org crack incidents.
db.debian.org uses certificates using spi-inc.org Root CA.
-- Fumitoshi UKAI <ukai@debian.or.jp> Sun, 8 Aug 2004 10:58:30 +0900
ca-certificates (20031007.1) unstable; urgency=low
* NMU
* Add brasil.gov.br/brasil.gov.br.crt, created from
http://www.icpbrasil.gov.br/certificadoACRaiz.crt
* Add debian/po/pt_BR.po: closes: Bug#224612
-- Otavio Salvador <otavio@debian.org> Thu, 5 Aug 2004 12:16:26 -0300
ca-certificates (20031007) unstable; urgency=low
* add debian/po/ru.po: closes: Bug#214371

77
debian/config vendored
View file

@ -1,9 +1,11 @@
#!/bin/sh
# $1 = action ('configure')
# $1 = action ('configure' or 'reconfigure')
# $2 = current-installed-version
set -e
this_version='20030924'
action="$1"
cur_version="$2"
this_version='20040809'
if test -f /etc/ca-certificates.conf; then
CERTSCONF=/etc/ca-certificates.conf
@ -17,6 +19,7 @@ CERTS_DISABLED=$(sed -ne 's/^!\(.*\)/\1/p' $CERTSCONF)
# CERTS_TRUST: certs that user already trust
CERTS_TRUST=$(sed -e '/^#/d' -e '/^!/d' $CERTSCONF)
# CERTS_AVAILABLE: certs that user can choices
CERTS_AVAILABLE=""
@ -24,11 +27,21 @@ CERTS_AVAILABLE=""
CERTS_ENABLED=""
# CERTS_LIST: certs that will be installed
CERTS_LIST="spi-inc.org/spi-ca.crt, debian.org/db.debian.org.crt, mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, mozilla/AddTrust_External_Root.crt, mozilla/AddTrust_Low-Value_Services_Root.crt, mozilla/AddTrust_Public_Services_Root.crt, mozilla/AddTrust_Qualified_Certificates_Root.crt, mozilla/America_Online_Root_Certification_Authority_1.crt, mozilla/America_Online_Root_Certification_Authority_2.crt, mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, mozilla/Entrust.net_Global_Secure_Personal_CA.crt, mozilla/Entrust.net_Global_Secure_Server_CA.crt, mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, mozilla/Entrust.net_Secure_Personal_CA.crt, mozilla/Entrust.net_Secure_Server_CA.crt, mozilla/Equifax_Secure_CA.crt, mozilla/Equifax_Secure_Global_eBusiness_CA.crt, mozilla/Equifax_Secure_eBusiness_CA_1.crt, mozilla/Equifax_Secure_eBusiness_CA_2.crt, mozilla/GTE_CyberTrust_Global_Root.crt, mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/GeoTrust_Global_CA.crt, mozilla/GlobalSign_Root_CA.crt, mozilla/RSA_Root_Certificate_1.crt, mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt, mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, mozilla/Thawte_Personal_Basic_CA.crt, mozilla/Thawte_Personal_Freemail_CA.crt, mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, mozilla/UTN-USER_First-Network_Applications.crt, mozilla/ValiCert_Class_1_VA.crt, mozilla/ValiCert_Class_2_VA.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_1_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_2_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_3_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_RSA_Secure_Server_CA.crt, mozilla/Verisign_Secure_Server_OCSP_Responder.crt, mozilla/Verisign_Time_Stamping_Authority_CA.crt, mozilla/Visa_International_Global_Root_2.crt, mozilla/Visa_eCommerce_Root.crt, mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt, mozilla/beTRUSTed_Root_CA.crt, mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt"
CERTS_LIST="spi-inc.org/spi-ca.crt, mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, mozilla/AddTrust_External_Root.crt, mozilla/AddTrust_Low-Value_Services_Root.crt, mozilla/AddTrust_Public_Services_Root.crt, mozilla/AddTrust_Qualified_Certificates_Root.crt, mozilla/America_Online_Root_Certification_Authority_1.crt, mozilla/America_Online_Root_Certification_Authority_2.crt, mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, mozilla/Entrust.net_Global_Secure_Personal_CA.crt, mozilla/Entrust.net_Global_Secure_Server_CA.crt, mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, mozilla/Entrust.net_Secure_Personal_CA.crt, mozilla/Entrust.net_Secure_Server_CA.crt, mozilla/Equifax_Secure_CA.crt, mozilla/Equifax_Secure_Global_eBusiness_CA.crt, mozilla/Equifax_Secure_eBusiness_CA_1.crt, mozilla/Equifax_Secure_eBusiness_CA_2.crt, mozilla/GTE_CyberTrust_Global_Root.crt, mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/GeoTrust_Global_CA.crt, mozilla/GlobalSign_Root_CA.crt, mozilla/RSA_Root_Certificate_1.crt, mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt, mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, mozilla/Thawte_Personal_Basic_CA.crt, mozilla/Thawte_Personal_Freemail_CA.crt, mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, mozilla/UTN-USER_First-Network_Applications.crt, mozilla/ValiCert_Class_1_VA.crt, mozilla/ValiCert_Class_2_VA.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_1_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_2_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_3_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_RSA_Secure_Server_CA.crt, mozilla/Verisign_Secure_Server_OCSP_Responder.crt, mozilla/Verisign_Time_Stamping_Authority_CA.crt, mozilla/Visa_International_Global_Root_2.crt, mozilla/Visa_eCommerce_Root.crt, mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt, mozilla/beTRUSTed_Root_CA.crt, mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt, brasil.gov.br/brasil.gov.br.crt, signet.pl/signet_ca1_pem.crt, signet.pl/signet_ca2_pem.crt, signet.pl/signet_ca3_pem.crt, signet.pl/signet_ocspklasa2_pem.crt, signet.pl/signet_ocspklasa3_pem.crt, signet.pl/signet_pca2_pem.crt, signet.pl/signet_pca3_pem.crt, signet.pl/signet_rootca_pem.crt, signet.pl/signet_tsa1_pem.crt, quovadis.bm/QuoVadis_Root_Certification_Authority.crt"
# CERTS_NEW: new certificates that will be installed
CERTS_NEW=""
members()
{
echo "$1" | tr ',' '\n' | sed -e 's/^[[:space:]]*//' | while read ca
do
if echo "$2" | grep -q "$ca" > /dev/null 2>&1; then
echo match
fi
done | grep -q match
}
. /usr/share/debconf/confmodule || exit
db_version 2.0
db_capb multiselect
@ -37,24 +50,36 @@ db_title "ca-certificates configuration"
db_input medium ca-certificates/trust_new_crts || true
db_go
trust_new="ask"
trust_new="yes"
if db_get ca-certificates/trust_new_crts; then
trust_new="$RET"
fi
seen=false
if db_fget ca-certificates/enable_crts seen; then
seen="$RET"
fi
# XXX: in case reconfigure, force to select all available certificates
if test "$action" = "reconfigure" || test "$DEBCONF_RECONFIGURE" = "1"; then
seen=false
trust_new=no
fi
if test -d /usr/share/ca-certificates; then
cd /usr/share/ca-certificates
for crt in $(find . -type f -name '*.crt' -print)
crts=$( (find . -type f -name '*.crt' -print | sed -e 's/^\.\///'; \
echo "$CERTS_LIST" | tr ',' '\n' | sed -e 's/^[[:space:]]*//') | \
sort | uniq)
for crt in $crts
do
crt=$(echo $crt | sed -e 's/^\.\///')
if test "$CERTS_AVAILABLE" = ""; then
CERTS_AVAILABLE="$crt"
else
CERTS_AVAILABLE="$CERTS_AVAILABLE, $crt"
fi
if echo "$CERTS_DISABLED" | fgrep -q -x "$crt" > /dev/null 2>&1; then
if echo "$CERTS_DISABLED" | grep -F -q -x "$crt" > /dev/null 2>&1; then
: # echo "I: ignore $crt"
elif echo "$CERTS_TRUST" | fgrep -q -x "$crt" > /dev/null 2>&1; then
elif echo "$CERTS_TRUST" | grep -F -q -x "$crt" > /dev/null 2>&1; then
# already trusted
if test "$CERTS_ENABLED" = ""; then
CERTS_ENABLED="$crt"
@ -90,25 +115,31 @@ else
CERTS_NEW=""
fi
seen=false
enable_crts=""
if db_get ca-certificates/enable_crts; then
if (echo "$RET"; echo "$CERTS_ENABLED") | tr ',' '\n' | \
sed -e 's/^[[:space:]]*//' | sort | uniq -c | grep -q "^[[:space:]]*1"; then
seen=false
else
seen=true
fi
enable_crts="$RET"
fi
# XXX: in case reconfigure, force to select all available certificates
if dpkg --compare-versions "$2" eq "$this_version"; then
seen=false
trust_new=no
new_seen=false
if dpkg --compare-versions "$cur_version" lt 20040808; then
db_fset ca-certificates/new_crts seen false
fi
if db_fget ca-certificates/new_crts seen; then
new_seen="$RET"
fi
if members "$CERTS_NEW" "$enable_crts"; then
# already selected new_crts?
new_seen=true
fi
db_subst ca-certificates/new_crts new_crts "$CERTS_NEW"
if test "$trust_new" = "ask" && test "$new_seen" = "true"; then
# XXX: run this again in postinst
CERTS_ENABLED="$enable_crts"
fi
if test "$trust_new" = "ask" && test "$CERTS_NEW" != ""; then
if test "$trust_new" = "ask" && test "$CERTS_NEW" != "" && test "$new_seen" = "false"; then
# New certificates added
db_subst ca-certificates/new_crts new_crts "$CERTS_NEW"
db_fset ca-certificates/new_crts seen false
db_title "ca-certificates configuration"
db_input critical ca-certificates/new_crts || true
@ -124,6 +155,8 @@ if test "$trust_new" = "ask" && test "$CERTS_NEW" != ""; then
# XXX: old certificates keep current state?
seen=true
fi
# mark seen true, so that dont ask again while postinst
db_fset ca-certificates/new_crts seen true
db_set ca-certificates/enable_crts "$CERTS_ENABLED"
db_subst ca-certificates/enable_crts enable_crts "$CERTS_AVAILABLE"
@ -131,6 +164,6 @@ if test "$seen" != true; then
db_fset ca-certificates/enable_crts seen false
fi
db_title "ca-certificates configuration"
db_input medium ca-certificates/enable_crts || true
db_input low ca-certificates/enable_crts || true
db_go
exit 0

73
debian/config.in vendored
View file

@ -1,8 +1,10 @@
#!/bin/sh
# $1 = action ('configure')
# $1 = action ('configure' or 'reconfigure')
# $2 = current-installed-version
set -e
action="$1"
cur_version="$2"
this_version='#VERSION#'
if test -f /etc/ca-certificates.conf; then
@ -17,6 +19,7 @@ CERTS_DISABLED=$(sed -ne 's/^!\(.*\)/\1/p' $CERTSCONF)
# CERTS_TRUST: certs that user already trust
CERTS_TRUST=$(sed -e '/^#/d' -e '/^!/d' $CERTSCONF)
# CERTS_AVAILABLE: certs that user can choices
CERTS_AVAILABLE=""
@ -29,6 +32,16 @@ CERTS_LIST="#INITIAL_CERTS#"
# CERTS_NEW: new certificates that will be installed
CERTS_NEW=""
members()
{
echo "$1" | tr ',' '\n' | sed -e 's/^[[:space:]]*//' | while read ca
do
if echo "$2" | grep -q "$ca" > /dev/null 2>&1; then
echo match
fi
done | grep -q match
}
. /usr/share/debconf/confmodule || exit
db_version 2.0
db_capb multiselect
@ -37,24 +50,36 @@ db_title "ca-certificates configuration"
db_input medium ca-certificates/trust_new_crts || true
db_go
trust_new="ask"
trust_new="yes"
if db_get ca-certificates/trust_new_crts; then
trust_new="$RET"
fi
seen=false
if db_fget ca-certificates/enable_crts seen; then
seen="$RET"
fi
# XXX: in case reconfigure, force to select all available certificates
if test "$action" = "reconfigure" || test "$DEBCONF_RECONFIGURE" = "1"; then
seen=false
trust_new=no
fi
if test -d /usr/share/ca-certificates; then
cd /usr/share/ca-certificates
for crt in $(find . -type f -name '*.crt' -print)
crts=$( (find . -type f -name '*.crt' -print | sed -e 's/^\.\///'; \
echo "$CERTS_LIST" | tr ',' '\n' | sed -e 's/^[[:space:]]*//') | \
sort | uniq)
for crt in $crts
do
crt=$(echo $crt | sed -e 's/^\.\///')
if test "$CERTS_AVAILABLE" = ""; then
CERTS_AVAILABLE="$crt"
else
CERTS_AVAILABLE="$CERTS_AVAILABLE, $crt"
fi
if echo "$CERTS_DISABLED" | fgrep -q -x "$crt" > /dev/null 2>&1; then
if echo "$CERTS_DISABLED" | grep -F -q -x "$crt" > /dev/null 2>&1; then
: # echo "I: ignore $crt"
elif echo "$CERTS_TRUST" | fgrep -q -x "$crt" > /dev/null 2>&1; then
elif echo "$CERTS_TRUST" | grep -F -q -x "$crt" > /dev/null 2>&1; then
# already trusted
if test "$CERTS_ENABLED" = ""; then
CERTS_ENABLED="$crt"
@ -90,25 +115,31 @@ else
CERTS_NEW=""
fi
seen=false
enable_crts=""
if db_get ca-certificates/enable_crts; then
if (echo "$RET"; echo "$CERTS_ENABLED") | tr ',' '\n' | \
sed -e 's/^[[:space:]]*//' | sort | uniq -c | grep -q "^[[:space:]]*1"; then
seen=false
else
seen=true
fi
enable_crts="$RET"
fi
# XXX: in case reconfigure, force to select all available certificates
if dpkg --compare-versions "$2" eq "$this_version"; then
seen=false
trust_new=no
new_seen=false
if dpkg --compare-versions "$cur_version" lt 20040808; then
db_fset ca-certificates/new_crts seen false
fi
if db_fget ca-certificates/new_crts seen; then
new_seen="$RET"
fi
if members "$CERTS_NEW" "$enable_crts"; then
# already selected new_crts?
new_seen=true
fi
db_subst ca-certificates/new_crts new_crts "$CERTS_NEW"
if test "$trust_new" = "ask" && test "$new_seen" = "true"; then
# XXX: run this again in postinst
CERTS_ENABLED="$enable_crts"
fi
if test "$trust_new" = "ask" && test "$CERTS_NEW" != ""; then
if test "$trust_new" = "ask" && test "$CERTS_NEW" != "" && test "$new_seen" = "false"; then
# New certificates added
db_subst ca-certificates/new_crts new_crts "$CERTS_NEW"
db_fset ca-certificates/new_crts seen false
db_title "ca-certificates configuration"
db_input critical ca-certificates/new_crts || true
@ -124,6 +155,8 @@ if test "$trust_new" = "ask" && test "$CERTS_NEW" != ""; then
# XXX: old certificates keep current state?
seen=true
fi
# mark seen true, so that dont ask again while postinst
db_fset ca-certificates/new_crts seen true
db_set ca-certificates/enable_crts "$CERTS_ENABLED"
db_subst ca-certificates/enable_crts enable_crts "$CERTS_AVAILABLE"
@ -131,6 +164,6 @@ if test "$seen" != true; then
db_fset ca-certificates/enable_crts seen false
fi
db_title "ca-certificates configuration"
db_input medium ca-certificates/enable_crts || true
db_input low ca-certificates/enable_crts || true
db_go
exit 0

2
debian/control vendored
View file

@ -8,7 +8,7 @@ Standards-Version: 3.5.9
Package: ca-certificates
Architecture: all
Depends: openssl, debconf (>= 0.5.00)
Enhances: libssl0.9.6, openssl
Enhances: libssl0.9.7, openssl
Description: Common CA Certificates PEM files
It includes the followings PEM files of CA certificates
.

102
debian/po/ca.po vendored Normal file
View file

@ -0,0 +1,102 @@
# Catalan translation of ca-certificates debconf template
# Copyright (c) 2004 Software in the Public Interest, Inc.
# This file is distributed under the same license as the ca-certificates package.
# Josep Monés i Teixidor <jmones@puntbarra.com>, 2004.
msgid ""
msgstr ""
"Project-Id-Version: ca-certificates 20031007\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2004-03-05 01:14+0100\n"
"Last-Translator: Josep Monés i Teixidor <jmones@puntbarra.com>\n"
"Language-Team: Catalan <debian-l10n-catalanLL@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "sí, no, demana"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "Voleu confiar en els nous certificats de les CA?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
"This package may install new CA (Certificate Authority) certificates when "
"upgrading. You may want to check such new CA certificates and select only "
"certificates that you trust."
msgstr ""
"Aquest paquet pot instal·lar nous certificats de les CA (Entitats "
"Certificadores) en el moment d'actualitzar-lo. Podeu escollir comprovar "
"aquests nous certificats de les CA i seleccionar-ne només els certificats en "
"els que confieu."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
"- 'sí', es confiarà i s'instal·laran els nous certificats de les CA.\n"
"- 'no', no s'instal·laran els nous certificats de les CA.\n"
"- 'demana', se us demanarà si confieu o no en cada nou certificat de les CA."
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "Seleccioneu quins certificats nous voleu activar:"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
"In this upgrading, these new certificates are added. Do you trust these "
"certificates and want that these certificates are installed into /etc/ssl/"
"certs?"
msgstr ""
"En aquesta actualització s'han afegit aquests certificats nous. Confieu en "
"aquests certificats i voleu que s'instal·lin a /etc/ssl/certs?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "Seleccioneu els certificats que s'activaran:"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
"This package installs common CA (Certificate Authority) certificates in /usr/"
"share/ca-certificates. You can select certs from these available certs to be "
"installed into /etc/ssl/certs. This package will make symlinks and generate "
"a single file of all your selected certs, /etc/ssl/certs/ca-certificates.crt."
msgstr ""
"Aquest paquet instal·la certificats de les CA (Entitats Certificadores) d'ús "
"comú a /usr/share/ca-certificates. D'aquests certificats en podeu "
"seleccionar els que desitgeu instal·lar a /etc/ssl/certs. Aquest paquet farà "
"enllaços simbòlics i generarà un sol fitxer per a tots els certificats que "
"seleccioneu, /etc/ssl/certs/ca-certificates.crt."

110
debian/po/da.po vendored Normal file
View file

@ -0,0 +1,110 @@
# translation of ca-certificates_20031007_templates.po to Danish
#
# Translators, if you are not familiar with the PO format, gettext
# documentation is worth reading, especially sections dedicated to
# this format, e.g. by running:
# info -n '(gettext)PO Files'
# info -n '(gettext)Header Entry'
# Some information specific to po-debconf are available at
# /usr/share/doc/po-debconf/README-trans
# or http://www.debian.org/intl/l10n/po-debconf/README-trans#
# Developers do not need to manually edit POT or PO files.
# Claus Hindsgaul <claus_h@image.dk>, 2004.
#
msgid ""
msgstr ""
"Project-Id-Version: ca-certificates_20031007_templates\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2004-02-28 19:01+0100\n"
"Last-Translator: Claus Hindsgaul <claus_h@image.dk>\n"
"Language-Team: Danish <dansk@klid.dk>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: KBabel 1.0.2\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "ja, nej, spørg"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "Stol på nye CAs-certifikater?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
"This package may install new CA (Certificate Authority) certificates when "
"upgrading. You may want to check such new CA certificates and select only "
"certificates that you trust."
msgstr ""
"Denne pakke kan installere nye CA-certifikater (Certificate Authority), når "
"under opgraderinger. Måske vil du gerne tjekke nye CA-certifikater og kun "
"vælge de certifikater, du stoler på."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
" - 'ja', nye CA-certifikater vil blive installeret og stolet på.\n"
" - 'nej', nye CA-certifikater vil som udgangspunkt ikke blive installeret.\n"
" - 'spørg', spørger om du stoler på hvert enkelt nyt CA-certifikat eller ej"
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "Vælg nyt certifikat at aktivere:"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
"In this upgrading, these new certificates are added. Do you trust these "
"certificates and want that these certificates are installed into /etc/ssl/"
"certs?"
msgstr ""
"Under denne opgradering, bliver disse nye certifikater tilføjet. Stoler du "
"på disse certifikater, og vil du have dem installeret i /etc/ssl/certs?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "Vælg certifikater at aktivere:"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
"This package installs common CA (Certificate Authority) certificates in /usr/"
"share/ca-certificates. You can select certs from these available certs to be "
"installed into /etc/ssl/certs. This package will make symlinks and generate "
"a single file of all your selected certs, /etc/ssl/certs/ca-certificates.crt."
msgstr ""
"Denne pakke installerer CA-certifikater (Certificate Authority) i /usr/share/"
"ca-certificates. Du kan vælge certifikater til installation i /etc/ssl/certs "
"ud fra disse. Denne pakke vil oprette symbolske lænker og generere en enkelt "
"fil med alle dine valgte certifikater i /etc/ssl/certs/ca-certificates.crt."

116
debian/po/de.po vendored Normal file
View file

@ -0,0 +1,116 @@
#
# Translators, if you are not familiar with the PO format, gettext
# documentation is worth reading, especially sections dedicated to
# this format, e.g. by running:
# info -n '(gettext)PO Files'
# info -n '(gettext)Header Entry'
# Some information specific to po-debconf are available at
# /usr/share/doc/po-debconf/README-trans
# or http://www.debian.org/intl/l10n/po-debconf/README-trans#
# Developers do not need to manually edit POT or PO files.
# Erik Schanze <mail@erikschanze.de>, 2004.
#
msgid ""
msgstr ""
"Project-Id-Version: ca-certificates_20031007_templates\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2004-05-24 22:43+0200\n"
"Last-Translator: Erik Schanze <mail@erikschanze.de>\n"
"Language-Team: German <debian-l10n-german@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: KBabel 1.3.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "ja, nein, nachfragen"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "Zertifikaten neuer CAs vertrauen?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
"This package may install new CA (Certificate Authority) certificates when "
"upgrading. You may want to check such new CA certificates and select only "
"certificates that you trust."
msgstr ""
"Dieses Paket kann neue Zertifikate von CAs (Zertifizierungstellen) "
"installieren, wenn es aktualisiert wird. Sie wollen solche neuen CA-"
"Zertifikate vielleicht prüfen und nur Zertifikate auswählen, denen Sie "
"vertrauen."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
" - `ja', Neuen CA-Zertifikaten wird vertraut und sie werden "
"installiert.\n"
" - 'nein', Neue CA-Zertifikate werden standardmäßig nicht "
"installiert.\n"
" - 'nachfragen', Fragt bei jedem neuen CA-Zertifikat, ob Sie ihm vertrauen "
"oder nicht."
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "Neue Zertifikate zum Aktivieren auswählen:"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
"In this upgrading, these new certificates are added. Do you trust these "
"certificates and want that these certificates are installed into /etc/ssl/"
"certs?"
msgstr ""
"Bei dieser Aktualisierung wurden folgende Zertifikate hinzugefügt. Vertrauen "
"Sie diesen Zertifikaten und wollen Sie, dass diese Zertifikate in /etc/ssl/"
"certs installiert werden?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "Zertifikate zum Aktivieren auswählen:"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
"This package installs common CA (Certificate Authority) certificates in /usr/"
"share/ca-certificates. You can select certs from these available certs to be "
"installed into /etc/ssl/certs. This package will make symlinks and generate "
"a single file of all your selected certs, /etc/ssl/certs/ca-certificates.crt."
msgstr ""
"Dieses Paket installiert Zertifikate allgemeiner CAs (Zertifizierungstellen) "
"in /usr/share/ca-certificates. Sie können eine Auswahl dieser verfügbaren "
"Zertifikate nach /etc/ssl/certs installieren.Dieses Paket erstellt "
"symbolische Verweise und erzeugt eine einzelne Datei mit allen ausgewählten "
"Zertifikaten, /etc/ssl/certs/ca-certificates.crt."

18
debian/po/fr.po vendored
View file

@ -15,7 +15,7 @@ msgid ""
msgstr ""
"Project-Id-Version: ca-certificates (20030420)\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2003-09-15 01:12+0900\n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2003-09-15 08:46+0100\n"
"Last-Translator: Christian Perrier <bubulle@debian.org>\n"
"Language-Team: French <debian-l10n-french@lists.debian.org>\n"
@ -23,16 +23,19 @@ msgstr ""
"Content-Type: text/plain; charset=iso-8859-15\n"
"Content-Transfer-Encoding: 8bit\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "Oui, Non, Demander"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "Faut-il agréer les certificats des nouveaux tiers de confiance ?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
@ -44,12 +47,13 @@ msgstr ""
"(« Certificate Authority ») lors de ses mises à jour. Vous pouvez souhaiter "
"vérifier de tels nouveaux certificats et ne choisir que ceux que vous agréez."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - `yes', new CA certificates will be trusted and installed.\n"
" - 'no', new CA certificates will not be installed by default.\n"
" - 'ask', Ask you trust each new CA certificates or not"
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
"- si vous choisissez « Oui », les nouveaux certificats seront\n"
" agréés et installés ;\n"
@ -58,16 +62,19 @@ msgstr ""
"- si vous choisissez « Demander », l'agrément de chacun des\n"
" nouveaux certificats vous sera demandé."
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "Veuillez choisir les nouveaux certificats qui seront agréés"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
@ -79,16 +86,19 @@ msgstr ""
"Agréez-vous ces certificats ? Les certificats agréés seront placés dans /etc/"
"ssl/certs."
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "Veuillez choisir les certificats qui seront agréés."
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""

33
debian/po/ja.po vendored
View file

@ -15,7 +15,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2003-09-15 01:12+0900\n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2003-09-24 21:35+0900\n"
"Last-Translator: Kenshi Muto <kmuto@debian.org>\n"
"Language-Team: Japanese <debian-japanese@lists.debian.org>\n"
@ -23,63 +23,77 @@ msgstr ""
"Content-Type: text/plain; charset=EUC-JP\n"
"Content-Transfer-Encoding: 8bit\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "はい, いいえ, 質問する"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "新しい CA 証明書を信用しますか?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
"This package may install new CA (Certificate Authority) certificates when "
"upgrading. You may want to check such new CA certificates and select only "
"certificates that you trust."
msgstr "このパッケージは、更新時に新しい CA (証明機関) をインストールできます。そのような新しい CA 証明書を確認して、信用する証明書だけを選択できます。"
msgstr ""
"このパッケージは、更新時に新しい CA (証明機関) をインストールできます。そのよ"
"うな新しい CA 証明書を確認して、信用する証明書だけを選択できます。"
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - `yes', new CA certificates will be trusted and installed.\n"
" - 'no', new CA certificates will not be installed by default.\n"
" - 'ask', Ask you trust each new CA certificates or not"
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
" - `はい' は新しい CA 証明書を信用し、インストールします。\n"
" - `いいえ' は新しい CA 証明書をデフォルトではインストールしません。\n"
" - `質問する' は新しい CA 証明書をそれぞれ信用するかどうかを尋ねます。"
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "活性化する新しい証明書を選択してください:"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
"In this upgrading, these new certificates are added. Do you trust these "
"certificates and want that these certificates are installed into /etc/ssl/"
"certs?"
msgstr "この更新では、これらの新しい証明書が追加されています。これらの証明書を信用して、/etc/ssl/certs に証明書をインストールしますか?"
msgstr ""
"この更新では、これらの新しい証明書が追加されています。これらの証明書を信用し"
"て、/etc/ssl/certs に証明書をインストールしますか?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "活性化する証明書を選択してください:"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
@ -87,4 +101,9 @@ msgid ""
"share/ca-certificates. You can select certs from these available certs to be "
"installed into /etc/ssl/certs. This package will make symlinks and generate "
"a single file of all your selected certs, /etc/ssl/certs/ca-certificates.crt."
msgstr "このパッケージは共通の CA (証明機関) 証明書を /usr/share/ca-certificates にインストールします。これらの利用できる証明書から、/etc/ssl/certs にインストールしたい証明書を選択できます。このパッケージはシンボリックリンクを作成し、すべての選択した証明書から成る単一のファイル /etc/ssl/certs/ca-certificates.crt を生成します。"
msgstr ""
"このパッケージは共通の CA (証明機関) 証明書を /usr/share/ca-certificates にイ"
"ンストールします。これらの利用できる証明書から、/etc/ssl/certs にインストール"
"したい証明書を選択できます。このパッケージはシンボリックリンクを作成し、すべ"
"ての選択した証明書から成る単一のファイル /etc/ssl/certs/ca-certificates.crt "
"を生成します。"

115
debian/po/nl.po vendored Normal file
View file

@ -0,0 +1,115 @@
# translation of ca-certificates_20031007_nl.po to Dutch
#
# Translators, if you are not familiar with the PO format, gettext
# documentation is worth reading, especially sections dedicated to
# this format, e.g. by running:
# info -n '(gettext)PO Files'
# info -n '(gettext)Header Entry'
# Some information specific to po-debconf are available at
# /usr/share/doc/po-debconf/README-trans
# or http://www.debian.org/intl/l10n/po-debconf/README-trans#
# Developers do not need to manually edit POT or PO files.
# Frans Pop <aragorn@tiscali.nl>, 2004.
#
msgid ""
msgstr ""
"Project-Id-Version: ca-certificates_20031007_nl\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2004-03-14 23:39+0100\n"
"Last-Translator: Frans Pop <aragorn@tiscali.nl>\n"
"Language-Team: Dutch <debian-l10n-dutch@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: KBabel 1.3\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "ja, nee, vraag"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "Nieuwe CA certificaten vertrouwen?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
"This package may install new CA (Certificate Authority) certificates when "
"upgrading. You may want to check such new CA certificates and select only "
"certificates that you trust."
msgstr ""
"Het is mogelijk dat dit pakket nieuwe CA (certificaatautoriteit) "
"certificaten installeert tijdens de installatie van een nieuwe versie. "
"Mogelijk wilt u dergelijke nieuwe CA certificaten controleren en alleen "
"certificaten selecteren die u vertrouwt."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
" - `ja', nieuwe CA certificaten vertrouwen en installeren;\n"
" - `nee', nieuwe CA certificaten niet standaard installeren;\n"
" - `vraag', voor elk nieuw CA certificaat wordt u gevraagd of u het "
"vertrouwt."
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "Selecteer de te activeren nieuwe certificaten:"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
"In this upgrading, these new certificates are added. Do you trust these "
"certificates and want that these certificates are installed into /etc/ssl/"
"certs?"
msgstr ""
"Tijdens deze installatie worden onderstaande nieuwe certificaten toegevoegd. "
"Vertrouwt u deze certificaten en wilt u dat deze certificaten worden "
"geïnstalleerd in '/etc/ssl/certs'?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "Selecteer de te activeren certificaten:"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
"This package installs common CA (Certificate Authority) certificates in /usr/"
"share/ca-certificates. You can select certs from these available certs to be "
"installed into /etc/ssl/certs. This package will make symlinks and generate "
"a single file of all your selected certs, /etc/ssl/certs/ca-certificates.crt."
msgstr ""
"Dit pakket installeert algemeen gangbare CA (certificaatautoriteit) "
"certificaten in '/usr/share/ca-certificates'. U kunt hieruit certificaten "
"selecteren die geïnstalleerd moeten worden in '/etc/ssl/certs'. Dit pakket "
"zal symbolische koppelingen leggen en een bestand, '/etc/ssl/certs/ca-"
"certificates.crt', genereren met daarin alle door u geselecteerde "
"certificaten."

113
debian/po/pt_BR.po vendored Normal file
View file

@ -0,0 +1,113 @@
#
# Translators, if you are not familiar with the PO format, gettext
# documentation is worth reading, especially sections dedicated to
# this format, e.g. by running:
# info -n '(gettext)PO Files'
# info -n '(gettext)Header Entry'
#
# Some information specific to po-debconf are available at
# /usr/share/doc/po-debconf/README-trans
# or http://www.debian.org/intl/l10n/po-debconf/README-trans
#
# Developers do not need to manually edit POT or PO files.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: ca-certificates_20031007\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2003-11-02 16:55-0300\n"
"Last-Translator: André Luís Lopes <andrelop@debian.org>\n"
"Language-Team: Debian-BR Project <debian-l10n-portuguese@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=ISO-8859-1\n"
"Content-Transfer-Encoding: 8bit\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "sim, não, perguntar"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "Confiar em novos certificados de CAs ?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
"This package may install new CA (Certificate Authority) certificates when "
"upgrading. You may want to check such new CA certificates and select only "
"certificates that you trust."
msgstr ""
"Este pacote pode instalar novos certificados de CAs (Autoridades "
"Certificadoras) em atualizações futuras. Você pode checar esses novos "
"certificados de CAs e selecionar somente aqueles certificados nos quais "
"você confia."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
" - 'sim', novos certificados de CAs serão confiáveis e serõ instalados.\n"
" - 'não', novos certificados de CAs n]ao serão instalados por padrão.\n"
" - 'perguntar', Pergunta se você confia em cada novo certificados de CA."
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_certs}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "Selecione os novos certificados a serem ativados :"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
"In this upgrading, these new certificates are added. Do you trust these "
"certificates and want that these certificates are installed into /etc/ssl/"
"certs?"
msgstr ""
"Nesta atualização, estes novos certificados foram adicionados. Você "
"confia neles e quer que os mesmos sejam instalados em /etc/ssl/certs ?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_certs}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "Selecione os certificados a serem ativados :"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
"This package installs common CA (Certificate Authority) certificates in /usr/"
"share/ca-certificates. You can select certs from these available certs to be "
"installed into /etc/ssl/certs. This package will make symlinks and generate "
"a single file of all your selected certs, /etc/ssl/certs/ca-certificates.crt."
msgstr ""
"Este pacote instale certificados de CAs (Autoridades Certificadoras) comuns "
"em /usr/share/ca-certificates. Você pode selecionar certificados dentro os "
"certificados disponíveis para que os mesmos sejam instalados em /etc/ssl/"
"certs. Este pacote irá criar ligações simbólicas e gerar um único "
"arquivo com base em todos os seus certificados escolhidos, com o nome de /"
"etc/ssl/certs/ca-certificates.crt."

31
debian/po/ru.po vendored
View file

@ -14,7 +14,7 @@ msgid ""
msgstr ""
"Project-Id-Version: ca-certificates_20030924\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2003-09-15 01:12+0900\n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: 2003-10-04 21:39+0600\n"
"Last-Translator: Ilgiz Kalmetev <translator@ilgiz.pp.ru>\n"
"Language-Team: russian <debian-russian@lists.debian.org>\n"
@ -23,16 +23,19 @@ msgstr ""
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: KBabel 1.0.1\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr "ÄÁ, ÎÅÔ, ÓÐÒÏÓÉÔØ"
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr "äÏ×ÅÒÑÔØ ÎÏ×ÙÍ ÓÅÒÔÉÆÉËÁÔÁÍ CA?"
#. Type: select
#. Description
#: ../templates:5
msgid ""
@ -41,30 +44,34 @@ msgid ""
"certificates that you trust."
msgstr ""
"ðÒÉ ÏÂÎÏ×ÌÅÎÉÉ ÜÔÏÔ ÐÁËÅÔ ÍÏÖÅÔ ÕÓÔÁÎÏ×ÉÔØ ÎÏ×ÙÊ CA (Certificate Authority). "
"Возможно, Вы захотите проверить эти новые сертификаты и выбрать только "
"те сертификаты, которым доверяете."
"÷ÏÚÍÏÖÎÏ, ÷Ù ÚÁÈÏÔÉÔÅ ÐÒÏ×ÅÒÉÔØ ÜÔÉ ÎÏ×ÙÅ ÓÅÒÔÉÆÉËÁÔÙ É ×ÙÂÒÁÔØ ÔÏÌØËÏ ÔÅ "
"ÓÅÒÔÉÆÉËÁÔÙ, ËÏÔÏÒÙÍ ÄÏ×ÅÒÑÅÔÅ."
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - `yes', new CA certificates will be trusted and installed.\n"
" - 'no', new CA certificates will not be installed by default.\n"
" - 'ask', Ask you trust each new CA certificates or not"
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
" - `ÄÁ', ÄÏ×ÅÒÑÔØ É ÕÓÔÁÎÏ×ÉÔØ ÎÏ×ÙÅ ÓÅÒÔÉÆÉËÁÔÙ CA.\n"
" - 'ÎÅÔ', ÐÏ ÕÍÏÌÞÁÎÉÀ ÎÅ ÕÓÔÁÎÁ×ÌÉ×ÁÔØ ÎÏ×ÙÅ ÓÅÒÔÉÆÉËÁÔÙ CA.\n"
" - 'ÓÐÒÏÓÉÔØ', ÓÐÒÁÛÉ×ÁÔØ, ÓÔÏÉÔ ÌÉ ÄÏ×ÅÒÑÔØ ËÁÖÄÏÍÕ ÉÚ ÎÏ×ÙÈ ÓÅÒÔÉÆËÁÔÏ× CA"
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr "${new_crts}"
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr "÷ÙÂÒÁÔØ ÎÏ×ÙÅ ÓÅÒÔÉÆÉËÁÔÙ ÄÌÑ ÁËÔÉ×ÁÃÉÉ:"
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
@ -73,19 +80,22 @@ msgid ""
"certs?"
msgstr ""
"÷Ï ×ÒÅÍÑ ÔÅËÕÝÅÇÏ ÏÂÎÏ×ÌÅÎÉÑ ÂÕÄÕÔ ÄÏÂÁ×ÌÅÎÙ ÜÔÉ ÎÏ×ÙÅ ÓÅÒÔÉÆÉËÁÔÙ. "
"Доверяете ли Вы этим сертификатам и хотите ли, чтобы эти сертификаты "
"были установлены в каталог /etc/ssl/certs?"
"äÏ×ÅÒÑÅÔÅ ÌÉ ÷Ù ÜÔÉÍ ÓÅÒÔÉÆÉËÁÔÁÍ É ÈÏÔÉÔÅ ÌÉ, ÞÔÏÂÙ ÜÔÉ ÓÅÒÔÉÆÉËÁÔÙ ÂÙÌÉ "
"ÕÓÔÁÎÏ×ÌÅÎÙ × ËÁÔÁÌÏÇ /etc/ssl/certs?"
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr "${enable_crts}"
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr "÷ÙÂÒÁÔØ ÓÅÒÔÉÆÉËÁÔÙ ÄÌÑ ÁËÔÉ×ÁÃÉÉ:"
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""
@ -97,6 +107,5 @@ msgstr ""
"üÔÏÔ ÐÁËÅÔ ÕÓÔÁÎÁ×ÌÉ×ÁÅÔ ÏÂÝÉÅ ÓÅÒÔÉÆÉËÁÔÙ CA (Certificate Authority) × "
"ËÁÔÁÌÏÇ /usr/share/ca-certificates. ÷Ù ÍÏÖÅÔÅ ×ÙÂÒÁÔØ ÓÅÒÔÉÆÉËÁÔÙ ÉÈ ÜÔÉÈ "
"ÄÏÓÔÕÐÎÙÈ ÓÅÒÔÉÆÉËÁÔÏ× ÄÌÑ ÕÓÔÁÎÏ×ËÉ × ËÁÔÁÌÏÇ /etc/ssl/certs. üÔÏÔ ÐÁËÅÔ "
"создаст символические ссылки и сгенерирует один файл для всех "
"выбранных Вами сертификатов, /etc/ssl/certs/ca-certificates.crt."
"ÓÏÚÄÁÓÔ ÓÉÍ×ÏÌÉÞÅÓËÉÅ ÓÓÙÌËÉ É ÓÇÅÎÅÒÉÒÕÅÔ ÏÄÉÎ ÆÁÊÌ ÄÌÑ ×ÓÅÈ ×ÙÂÒÁÎÎÙÈ ÷ÁÍÉ "
"ÓÅÒÔÉÆÉËÁÔÏ×, /etc/ssl/certs/ca-certificates.crt."

View file

@ -16,7 +16,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2003-09-15 01:12+0900\n"
"POT-Creation-Date: 2004-08-08 11:28+0900\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@ -24,16 +24,19 @@ msgstr ""
"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#. Type: select
#. Choices
#: ../templates:3
msgid "yes, no, ask"
msgstr ""
#. Type: select
#. Description
#: ../templates:5
msgid "Trust new CAs certificates?"
msgstr ""
#. Type: select
#. Description
#: ../templates:5
msgid ""
@ -42,24 +45,28 @@ msgid ""
"certificates that you trust."
msgstr ""
#. Type: select
#. Description
#: ../templates:5
msgid ""
" - `yes', new CA certificates will be trusted and installed.\n"
" - 'no', new CA certificates will not be installed by default.\n"
" - 'ask', Ask you trust each new CA certificates or not"
" - \"yes\", new CA certificates will be trusted and installed.\n"
" - \"no\", new CA certificates will not be installed by default.\n"
" - \"ask\", Ask you trust each new CA certificates or not"
msgstr ""
#. Type: multiselect
#. Choices
#: ../templates:16
msgid "${new_crts}"
msgstr ""
#. Type: multiselect
#. Description
#: ../templates:17
msgid "Select new certificates to activate:"
msgstr ""
#. Type: multiselect
#. Description
#: ../templates:17
msgid ""
@ -68,16 +75,19 @@ msgid ""
"certs?"
msgstr ""
#. Type: multiselect
#. Choices
#: ../templates:24
msgid "${enable_crts}"
msgstr ""
#. Type: multiselect
#. Description
#: ../templates:25
msgid "Select certificates to activate:"
msgstr ""
#. Type: multiselect
#. Description
#: ../templates:25
msgid ""

36
debian/postinst vendored
View file

@ -1,10 +1,8 @@
#! /bin/sh
#! /bin/sh -e
# postinst script for ca-certificates
#
# see: dh_installdeb(1)
set -e
# summary of how this script can be called:
# * <postinst> `configure' <most-recently-configured-version>
# * <old-postinst> `abort-upgrade' <new version>
@ -22,10 +20,14 @@ set -e
# installation fails and the `postinst' is called with `abort-upgrade',
# `abort-remove' or `abort-deconfigure'.
each_value() {
echo "$l" |tr ',' '\n' | sed -e 's/^[[:space:]]*//'
}
memberp() {
m="$1"
l="$2"
echo "$l" |tr ',' '\n' | sed -e 's/^[[:space:]]*//' | grep -q "^$m\$"
each_value "$1" | grep -q "^$m\$"
}
delca() {
@ -47,8 +49,11 @@ case "$1" in
CERTS_AVAILABLE="$RET"
db_get ca-certificates/enable_crts
CERTS_ENABLED="$RET"
# XXX unmark seen for next configuration
db_fset ca-certificates/new_crts seen false
db_stop || true
if test -f /etc/ca-certificates.conf; then
# XXX: while in subshell?
while read line
do
if echo "$line" | grep -q '^#'; then
@ -60,28 +65,35 @@ case "$1" in
esac
if memberp "$ca" "$CERTS_ENABLED"; then
echo "$ca"
CERTS_ENABLED=$(delca "$ca" "$CERTS_ENABLED")
# CERTS_ENABLED=$(delca "$ca" "$CERTS_ENABLED")
else
echo "!$ca"
fi
CERTS_AVAILABLE=$(delca "$ca" "$CERTS_AVAILABLE")
# CERTS_AVAILABLE=$(delca "$ca" "$CERTS_AVAILABLE")
fi
done < /etc/ca-certificates.conf > /etc/ca-certificates.conf.dpkg-new
if echo "$CERTS_ENABLED" | egrep -q "^([[:space:]]*,)*[[:space:]]*$"; then
:
else
echo "$CERTS_ENABLED" | tr ',' '\n' |\
sed -e 's/^[[:space:]]*//' >> /etc/ca-certificates.conf.dpkg-new
each_value "$CERTS_ENABLED" | while read ca
do
if grep -q "^$ca" /etc/ca-certificates.conf.dpkg-new; then
:
else
echo "$ca" >> /etc/ca-certificates.conf.dpkg-new
fi
done
fi
echo "$CERTS_AVAILABLE" | tr ',' '\n' |\
sed -e 's/^[[:space:]]*//' | while read ca
each_value "$CERTS_AVAILABLE" | while read ca
do
if memberp "$ca" "$CERTS_ENABLED"; then
:
elif grep -q "^!$ca" /etc/ca-certificates.conf.dpkg-new; then
:
else
echo "!$ca"
echo "!$ca" >> /etc/ca-certificates.conf.dpkg-new
fi
done >> /etc/ca-certificates.conf.dpkg-new
done
if cmp -s /etc/ca-certificates.conf /etc/ca-certificates.conf.dpkg-new; then
rm -f /etc/ca-certificates.conf.dpkg-new
else

8
debian/templates vendored
View file

@ -1,15 +1,15 @@
Template: ca-certificates/trust_new_crts
Type: select
_Choices: yes, no, ask
Default: ask
Default: yes
_Description: Trust new CAs certificates?
This package may install new CA (Certificate Authority) certificates when
upgrading. You may want to check such new CA certificates and select only
certificates that you trust.
.
- `yes', new CA certificates will be trusted and installed.
- 'no', new CA certificates will not be installed by default.
- 'ask', Ask you trust each new CA certificates or not
- "yes", new CA certificates will be trusted and installed.
- "no", new CA certificates will not be installed by default.
- "ask", Ask you trust each new CA certificates or not
Template: ca-certificates/new_crts
Type: multiselect

12
quovadis.bm/Makefile Normal file
View file

@ -0,0 +1,12 @@
#
# Makefile
#
all:
clean:
install:
for p in *.crt; do \
install -m 644 $$p $(CERTSDIR)/$$p ; \
done

View file

@ -0,0 +1,35 @@
-----BEGIN CERTIFICATE-----
MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJC
TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdCBDZXJ0
aWZpY2F0aW9uIEF1dGhvcml0eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ0
aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAzMTkxODMzMzNaFw0yMTAzMTcxODMz
MzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUw
IwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVR
dW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Yp
li4kVEAkOPcahdxYTMukJ0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2D
rOpm2RgbaIr1VxqYuvXtdj182d6UajtLF8HVj71lODqV0D1VNk7feVcxKh7YWWVJ
WCCYfqtffp/p1k3sg3Spx2zY7ilKhSoGFPlU5tPaZQeLYzcS19Dsw3sgQUSj7cug
F+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx24ONmy+pdpibu5cxfvWenAScOospU
xbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJSvPhEQ+aQuwIDAQABo4ICUjCC
Ak4wPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwczovL29jc3AucXVv
dmFkaXNvZmZzaG9yZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCARoGA1UdIASCAREw
ggENMIIBCQYJKwYBBAG+WAABMIH7MIHUBggrBgEFBQcCAjCBxxqBxFJlbGlhbmNl
IG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmljYXRlIGJ5IGFueSBwYXJ0eSBh
c3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJsZSBzdGFuZGFy
ZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh
Y3RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYI
KwYBBQUHAgEWFmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3T
KbkGGew5Oanwl4Rqy+/fMIGuBgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rq
y+/foYGEpIGBMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p
dGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYD
VQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6tlCL
MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAitQUtf70mpKnGdSk
fnIYj9lofFIk3WdvOXrEql494liwTXCYhGHoG+NpGA7O+0dQoE7/8CQfvbLO9Sf8
7C9TqnN7Az10buYWnuulLsS/VidQK2K6vkscPFVcQR0kvoIgR13VRH56FmjffU1R
cHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2xgI4JVrmcGmD+XcHXetwReNDWXcG31a0y
mQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi5upZIof4l/UO/erMkqQW
xFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi5nrQNiOK
SnQ2+Q==
-----END CERTIFICATE-----

205
quovadis.bm/bug250847.txt Normal file
View file

@ -0,0 +1,205 @@
From SDavidson@quovadis.bm Tue May 25 05:18:29 2004
Received: (at submit) by bugs.debian.org; 25 May 2004 12:18:29 +0000
Return-path: <SDavidson@quovadis.bm>
Received: from scbm1mx01.securecentre.com [200.1.160.234]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BSat2-0000fn-00; Tue, 25 May 2004 05:18:28 -0700
Received: from mail.quovadis.bm (webmail.qvnetwork.com) by scbm1mx01.securecentre.com
(Content Technologies SMTPRS 4.3.12) with ESMTP id <T69c7dc6727c801a0ea314@scbm1mx01.securecentre.com> for <submit@bugs.debian.org>;
Tue, 25 May 2004 09:17:56 -0300
X-MimeOLE: Produced By Microsoft Exchange V6.5.6944.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----_=_NextPart_001_01C44252.4F71FB64"
Subject: ca-certificates - Add QuoVadis CA Certificates
Date: Tue, 25 May 2004 09:17:56 -0300
Message-ID: <FAC7214EEEE5034DA60F8318C06729091F4364@qvbm2mx01.evcnetwork.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: ca-certificates - Add QuoVadis CA Certificates
Thread-Index: AcRCUk9mQ9YHgyerSUiCfaIpO7JoJg==
From: "Stephen Davidson" <SDavidson@quovadis.bm>
To: <submit@bugs.debian.org>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=1.6 required=4.0 tests=FRONTPAGE,HAS_PACKAGE,
HTML_10_20,HTML_MESSAGE,UPPERCASE_25_50 autolearn=no
version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: *
This is a multi-part message in MIME format.
------_=_NextPart_001_01C44252.4F71FB64
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Package: ca-certificates
Version: 20020323
Severity: Normal
Problem: Please add the QuoVadis CA certificates to Debian.
=20
QuoVadis is a commercial certificate authority located in Bermuda and
serving customers worldwide. QuoVadis is an Authorised Certification
Services Provider (CSP) under Bermuda's Electronic Transactions Act.
The CSP standard synthesizes major requirements from BS 7799, WebTrust
for Certification Authorities, and the European Electronic Signature
Standards Initiative (EESSI). More information may be found at:
http://www.quovadis.bm/bdacsp.asp <http://www.quovadis.bm/bdacsp.asp> .
The QuoVadis CA cert is already distributed in Apple OSX and Microsoft
Windows (for which we completed the WebTrust for CAs procedures with
Ernst & Young).
A summary of our certification policies may be found at:
http://www.quovadis.bm/policies/pki.asp
<http://www.quovadis.bm/policies/pki.asp>=20
QuoVadis currently provides a "root injector" that senses the user's
computer config and inserts the root appropriately. This may be found
at: =20
Following is the QV root CA cert in base 64 format. The CA cert may
also be downloaded from http://www.quovadis.bm/root/
<http://www.quovadis.bm/root/> :
-----BEGIN CERTIFICATE-----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3D=3D
-----END CERTIFICATE-----
Please contact me if you need any additional information.
=20
=20
------_=_NextPart_001_01C44252.4F71FB64
Content-Type: text/html;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Message</TITLE>
<META http-equiv=3DContent-Language content=3Den-us>
<META content=3D"MSHTML 6.00.2800.1400" name=3DGENERATOR>
<META content=3DFrontPage.Editor.Document name=3DProgId>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<STYLE fprolloverstyle>A:hover {color: #0D2677; font-size: 8pt; =
font-family: Verdana; font-weight: bold}=0A=
</STYLE>
</HEAD>
<BODY style=3D"FONT-SIZE: 10pt; COLOR: #003366; FONT-FAMILY: Verdana" =
text=3D#333333=20
vLink=3D#009900 aLink=3D#009900 link=3D#009900 bgColor=3D#ffffff>
<DIV>Package: ca-certificates<BR>Version: 20020323</DIV>
<DIV><SPAN class=3D668590512-25052004></SPAN>S<SPAN=20
class=3D668590512-25052004>everity:&nbsp; Normal</SPAN><BR></DIV>
<DIV><SPAN class=3D668590512-25052004>Problem:&nbsp; Please add the =
QuoVadis CA=20
certificates to Debian.</SPAN></DIV>
<DIV><SPAN class=3D668590512-25052004></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D668590512-25052004>QuoVadis is a commercial =
certificate=20
authority located in Bermuda and serving customers worldwide.&nbsp; =
QuoVadis is=20
an Authorised Certification Services Provider (CSP) under Bermuda's =
Electronic=20
Transactions Act.&nbsp; The CSP standard synthesizes =
major&nbsp;requirements=20
from BS 7799, WebTrust for Certification Authorities, and the European=20
Electronic Signature Standards Initiative (EESSI).&nbsp; More =
information may be=20
found at:&nbsp; <A href=3D"http://www.quovadis.bm/bdacsp.asp"><FONT=20
color=3D#800080>http://www.quovadis.bm/bdacsp.asp</FONT></A>.&nbsp; =
<BR><BR>The=20
QuoVadis CA cert is already distributed in Apple OSX and Microsoft =
Windows (for=20
which we completed the WebTrust for CAs procedures&nbsp;with Ernst &amp; =
Young).<BR><BR>A summary of our certification policies may be found =
at:&nbsp; <A=20
href=3D"http://www.quovadis.bm/policies/pki.asp"><FONT=20
color=3D#800080>http://www.quovadis.bm/policies/pki.asp</FONT></A><BR><BR=
>QuoVadis=20
currently provides a "root injector" that senses the user's computer =
config and=20
inserts the root appropriately.&nbsp; This may be found at:&nbsp;=20
<BR><BR>Following is the QV root CA cert in base 64 format.&nbsp; The CA =
cert=20
may also be downloaded from <A =
href=3D"http://www.quovadis.bm/root/"><FONT=20
color=3D#800080>http://www.quovadis.bm/root/</FONT></A>:<BR><BR>-----BEGI=
N=20
CERTIFICATE-----<BR>MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswC=
QYDVQQGEwJC<BR>TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdC=
BDZXJ0<BR>aWZpY2F0aW9uIEF1dGhvcml0eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ=
0<BR>aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAzMTkxODMzMzNaFw0yMTAzMTcxODMz<BR>=
MzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUw<BR>IwYDV=
QQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVR<BR>dW9WYWRpcy=
BSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG<BR>9w0BAQEFAAOCAQ8=
AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Yp<BR>li4kVEAkOPcahdxYTMuk=
J0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2D<BR>rOpm2RgbaIr1VxqYuvXtdj182=
d6UajtLF8HVj71lODqV0D1VNk7feVcxKh7YWWVJ<BR>WCCYfqtffp/p1k3sg3Spx2zY7ilKhS=
oGFPlU5tPaZQeLYzcS19Dsw3sgQUSj7cug<BR>F+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx=
24ONmy+pdpibu5cxfvWenAScOospU<BR>xbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJS=
vPhEQ+aQuwIDAQABo4ICUjCC<BR>Ak4wPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFod=
HRwczovL29jc3AucXVv<BR>dmFkaXNvZmZzaG9yZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCAR=
oGA1UdIASCAREw<BR>ggENMIIBCQYJKwYBBAG+WAABMIH7MIHUBggrBgEFBQcCAjCBxxqBxFJ=
lbGlhbmNl<BR>IG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmljYXRlIGJ5IGFueSBwYXJ0=
eSBh<BR>c3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJsZSBzdGFuZGFy<=
BR>ZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh<BR>Y3=
RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYI<BR>KwYBBQU=
HAgEWFmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3T<BR>KbkGGew5Oanw=
l4Rqy+/fMIGuBgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rq<BR>y+/foYGEpIGBMH8xC=
zAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p<BR>dGVkMSUwIwYDVQQLExxSb2=
90IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYD<BR>VQQDEyVRdW9WYWRpcyBSb290IEN=
lcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6tlCL<BR>MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG=
9w0BAQUFAAOCAQEAitQUtf70mpKnGdSk<BR>fnIYj9lofFIk3WdvOXrEql494liwTXCYhGHoG=
+NpGA7O+0dQoE7/8CQfvbLO9Sf8<BR>7C9TqnN7Az10buYWnuulLsS/VidQK2K6vkscPFVcQR=
0kvoIgR13VRH56FmjffU1R<BR>cHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2xgI4JVrmcGmD+XcH=
XetwReNDWXcG31a0y<BR>mQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi5upZIof4=
l/UO/erMkqQW<BR>xFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi5=
nrQNiOK<BR>SnQ2+Q=3D=3D<BR>-----END=20
CERTIFICATE-----<BR><BR>Please contact me if you need any additional=20
information.</SPAN></DIV>
<DIV><SPAN class=3D668590512-25052004></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D668590512-25052004></SPAN>&nbsp;</DIV></BODY></HTML>
=00
------_=_NextPart_001_01C44252.4F71FB64--

View file

@ -1,4 +1,4 @@
#!/bin/sh
#!/bin/sh -e
#
# update-ca-certificates
#
@ -46,16 +46,17 @@ fi
echo -n "Updating certificates in /etc/ssl/certs...."
rm -f ca-certificates.crt
sed -ne '/^!/p' $CERTSCONF | while read crt
sed -ne 's/^!//p' $CERTSCONF | while read crt
do
test "$crt" = "" && continue
test -e "$crt" && rm -f "$crt"
if test "$crt" = ""; then continue; fi
pem=$(basename "$crt" .crt).pem
if test -e "$pem"; then rm -f "$pem"; fi
done
sed -e '/^#/d' -e '/^!/d' $CERTSCONF | while read crt
do
test "$crt" = "" && continue
test -f "$CERTSDIR/$crt" || continue
if test "$crt" = ""; then continue; fi
if ! test -f "$CERTSDIR/$crt"; then continue; fi
pem=$(basename "$crt" .crt).pem
ln -sf "$CERTSDIR/$crt" "$pem"
cat "$CERTSDIR/$crt" >> ca-certificates.crt

12
signet.pl/Makefile Normal file
View file

@ -0,0 +1,12 @@
#
# Makefile
#
all:
clean:
install:
for p in *.crt; do \
install -m 644 $$p $(CERTSDIR)/$$p ; \
done

1264
signet.pl/bug233206.txt Normal file

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,22 @@
-----BEGIN CERTIFICATE-----
MIIETzCCAzegAwIBAgIEO63vKTANBgkqhkiG9w0BAQUFADBxMQswCQYDVQQGEwJQTDEfMB0GA1UE
ChMWVFAgSW50ZXJuZXQgU3AuIHogby5vLjEkMCIGA1UECxMbQ2VudHJ1bSBDZXJ0eWZpa2Fjamkg
U2lnbmV0MRswGQYDVQQDExJDQyBTaWduZXQgLSBSb290Q0EwHhcNMDEwOTIzMTQxODE3WhcNMTEw
OTIzMTMxODE3WjB1MQswCQYDVQQGEwJQTDEfMB0GA1UEChMWVFAgSW50ZXJuZXQgU3AuIHogby5v
LjEkMCIGA1UECxMbQ2VudHJ1bSBDZXJ0eWZpa2FjamkgU2lnbmV0MR8wHQYDVQQDExZDQyBTaWdu
ZXQgLSBDQSBLbGFzYSAxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4SRW9Q58g5DY1Hw7h
gCRKBEdPdGn0MFHsfw7rlu/oQm7IChI/uWd9q5wwo77YojtTDjRnpgZsjqBeynX8T90vFILqsY2K
5CF1OESalwvVr3sZiQX79lisuFKat92u6hBFikFIVxfHHB67Af+g7u0dEHdDW7lwy81MwFYxBTRy
9wIDAQABo4IBbTCCAWkwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwggEEBgNVHSAE
gfwwgfkwgfYGDSsGAQQBvj8CAQoBAQAwgeQwgZoGCCsGAQUFBwICMIGNGoGKQ2VydHlmaWthdCB3
eXN0YXdpb255IHpnb2RuaWUgeiBkb2t1bWVudGVtOiAiUG9saXR5a2EgQ2VydHlmaWthY2ppIGRs
YSBSb290Q0EiLiBDZXJ0eWZpa2F0IHd5c3Rhd2lvbnkgcHJ6ZXogUm9vdENBIHcgaGllcmFyY2hp
aSBDQyBTaWduZXQuMEUGCCsGAQUFBwIBFjlodHRwOi8vd3d3LnNpZ25ldC5wbC9yZXBvenl0b3Jp
dW0vZG9rdW1lbnR5L3BjX3Jvb3RjYS50eHQwHwYDVR0jBBgwFoAUwJvFIw0C4aZOSGsfAOnjmhQb
sa8wHQYDVR0OBBYEFMODHtVZd1T7TftXR/nEI1zR54njMA0GCSqGSIb3DQEBBQUAA4IBAQBRIHQB
FIGh8Jpxt87AgSLwIEEk4+oGy769u3NtoaR0R3WNMdmt7fXTi0tyTQ9V4AIszxVjhnUPaKnF1KYy
f8Tl+YTzk9ZfFkZ3kCdSaILZAOIrmqWNLPmjUQ5/JiMGho0e1YmWUcMci84+pIisTsytFzVP32/W
+sz2H4FQAvOIMmxB7EJX9AdbnXn9EXZ+4nCqi0ft5z96ZqOJJiCB3vSaoYg+wdkcvb6souMJzuc2
uptXtR1Xf3ihlHaGW+hmnpcwFA6AoNrom6Vgzk6U1ienx0Cw28BhRSKqzKkyXkuK8gRflZUx84uf
tXncwKJrMiE3lvgOOBITRzcahirLer4c
-----END CERTIFICATE-----

View file

@ -0,0 +1,25 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -0,0 +1,22 @@
-----BEGIN CERTIFICATE-----
MIIEUzCCAzugAwIBAgIEPq+qjzANBgkqhkiG9w0BAQUFADBhMQswCQYDVQQGEwJQTDE3MDUGA1UE
ChMuQ1ppQyBDZW50cmFzdCBTQSB3IGltaWVuaXUgTWluaXN0cmEgR29zcG9kYXJraTEZMBcGA1UE
AxMQQ1ppQyBDZW50cmFzdCBTQTAeFw0wMzA0MzAxMDUwNTVaFw0wODA0MjgxMDUwNTVaMGgxCzAJ
BgNVBAYTAlBMMR8wHQYDVQQKExZUUCBJbnRlcm5ldCBTcC4geiBvLm8uMR8wHQYDVQQDExZDQyBT
aWduZXQgLSBDQSBLbGFzYSAzMRcwFQYDVQQFEw5OdW1lciB3cGlzdTogNDCCASIwDQYJKoZIhvcN
AQEBBQADggEPADCCAQoCggEBALVdeOM62cPH2NERFxbS5FIp/HSv3fgesdVsTUFxZbGtE+/E0RMl
KZQJHH9emx7vRYubsi4EOLCjYsCOTFvgGRIpZzx7R7T5c0Di5XFkRU4gjBl7aHJoKb5SLzGlWdoX
GsekVtl6keEACrizV2EafqjI8cnBWY7OxQ1ooLQp5AeFjXg+5PT0lO6TUZAubqjFbhVbxSWjqvdj
93RGfyYE76MnNn4c2xWySD07n7uno06TC0IJe6+3WSX1h+76VsIFouWBXOoM7cxxiLjoqdBVu24+
P8e81SukE7qEvOwDPmk9ZJFtt1nBNg8a1kaixcljrA/43XwOPz6qnJ+cIj/xywECAwEAAaOCAQow
ggEGMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMDMGA1UdIAEB/wQpMCcwJQYEVR0g
ADAdMBsGCCsGAQUFBwIBFg93d3cuY2VudHJhc3QucGwwgY4GA1UdIwSBhjCBg4AU2a7r85Cp1iJN
W0Ca1LR6VG3996ShZaRjMGExCzAJBgNVBAYTAlBMMTcwNQYDVQQKEy5DWmlDIENlbnRyYXN0IFNB
IHcgaW1pZW5pdSBNaW5pc3RyYSBHb3Nwb2RhcmtpMRkwFwYDVQQDExBDWmlDIENlbnRyYXN0IFNB
ggQ9/0sQMB0GA1UdDgQWBBR7Y8wZkHq0zrY7nn1tFSdQ0PlJuTANBgkqhkiG9w0BAQUFAAOCAQEA
ldt/svO5c1MU08FKgrOXCGEbEPbQxhpM0xcd6Iv3dCo6qugEgjEs9Qm5CwUNKMnFsvR27cJWUvZb
MVcvwlwCwclOdwF6u/QRS8bC2HYErhYo9bp9yuxxzuow2A94c5fPqfVrjXy+vDouchAm6+A5Wjzv
J8wxVFDCs+9iGACmyUWr/JGXCYiQIbQkwlkRKHHlan9ymKf1NvIej/3EpeT8fKr6ywxGuhAfqofW
pg3WJY/RCB4lTzD8vZGNwfMFGkWhJkypad3i9w3lGmDVpsHaWtCgGfd0H7tUtWPkP+t7EjIRCD9J
HYnTR+wbbewc5vOI+UobR15ynGfFIaSIiMTVtQ==
-----END CERTIFICATE-----

View file

@ -0,0 +1,26 @@
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----

View file

@ -0,0 +1,26 @@
-----BEGIN CERTIFICATE-----
MIIEezCCA2OgAwIBAgIEP4vnLzANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJQ
TDEfMB0GA1UEChMWVFAgSW50ZXJuZXQgU3AuIHogby5vLjEfMB0GA1UEAxMWQ0Mg
U2lnbmV0IC0gQ0EgS2xhc2EgMzEXMBUGA1UEBRMOTnVtZXIgd3Bpc3U6IDQwHhcN
MDMxMDE0MTIwODAwWhcNMDgwNDI4MTA1MDU1WjB3MQswCQYDVQQGEwJQTDEfMB0G
A1UEChMWVFAgSW50ZXJuZXQgU3AuIHogby5vLjEkMCIGA1UECxMbQ2VudHJ1bSBD
ZXJ0eWZpa2FjamkgU2lnbmV0MSEwHwYDVQQDExhDQyBTaWduZXQgLSBPQ1NQIEts
YXNhIDMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM/9GwvARNuCVN+PqZmO
4FqH8vTqhenUyqRkmAVT4YhLu0a9AXeLAYVDu+NTkYzsAUMAfu55rIKHNLlm6WbF
KvLiKKz4p4pbUr+ToPcwl/TDotidloUdBAxDg0SL+PmQqACZDe3seJho2IYf2vDL
/G4TLMbKmNB0mlWFuN0f4fJNAgMBAAGjggGgMIIBnDAOBgNVHQ8BAf8EBAMCB4Aw
EwYDVR0lBAwwCgYIKwYBBQUHAwkwTwYDVR0fBEgwRjBEoEKgQIY+aHR0cDovL3d3
dy5zaWduZXQucGwva3dhbGlmaWtvd2FuZS9yZXBvenl0b3JpdW0vY3JsL2tsYXNh
My5jcmwwgdgGA1UdIASB0DCBzTCBygYOKwYBBAG+PwKCLAoCAQAwgbcwbAYIKwYB
BQUHAgIwYBpeQ2VydHlmaWthdCB3eWRhbnkgemdvZG5pZSB6IGRva3VtZW50ZW0g
IlBvbGl0eWthIENlcnR5ZmlrYWNqaSAtIENlcnR5ZmlrYXR5IHJlc3BvbmRlcm93
IE9DU1AiLjBHBggrBgEFBQcCARY7aHR0cDovL3d3dy5zaWduZXQucGwvcmVwb3p5
dG9yaXVtL2Rva3VtZW50eS9wY19vY3NwXzFfMC5wZGYwHwYDVR0jBBgwFoAUe2PM
GZB6tM62O559bRUnUND5SbkwHQYDVR0OBBYEFG4jnCMvBALRQXtmDn9TyXQ/EKP+
MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEFBQADggEBACXrKG5Def5lpRwmZom3UEDq
bl7y4U3qomG4B+ok2FVZGgPZti+ZgvrenPj7PtbYCUBPsCSTNrznKinoT3gD9lQQ
xkEHwdc6VD1GlFp+qI64u0+wS9Epatrdf7aBnizrOIB4LJd4E2TWQ6trspetjMIU
upyWls1BmYUxB91R7QkTiAUSNZ87s3auhZuG4f0V0JLVCcg2rn7AN1rfMkgxCbHk
GxiQbYWFljl6aatxR3odnnzVUe1I8uoY2JXpmmUcOG4dNGuQYziyKG3mtXCQWvug
5qi9Mf3KUh1oSTKx6HfLjjNl1+wMB5Mdb8LF0XyZLdJM9yIZh7SBRsYm9QiXevY=
-----END CERTIFICATE-----

View file

@ -0,0 +1,25 @@
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----

View file

@ -0,0 +1,25 @@
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----

View file

@ -0,0 +1,24 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -0,0 +1,20 @@
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----