FFFTPのソースコードです。
Revisão | db2418c8cefdbafceae2d29484cf68df07db4834 (tree) |
---|---|
Hora | 2014-01-22 00:06:22 |
Autor | s_kawamoto <s_kawamoto@user...> |
Commiter | s_kawamoto |
Update OpenSSL to 1.0.1f.
Update PEM file.
@@ -2,9 +2,31 @@ | ||
2 | 2 | OpenSSL CHANGES |
3 | 3 | _______________ |
4 | 4 | |
5 | + Changes between 1.0.1e and 1.0.1f [6 Jan 2014] | |
6 | + | |
7 | + *) Fix for TLS record tampering bug. A carefully crafted invalid | |
8 | + handshake could crash OpenSSL with a NULL pointer exception. | |
9 | + Thanks to Anton Johansson for reporting this issues. | |
10 | + (CVE-2013-4353) | |
11 | + | |
12 | + *) Keep original DTLS digest and encryption contexts in retransmission | |
13 | + structures so we can use the previous session parameters if they need | |
14 | + to be resent. (CVE-2013-6450) | |
15 | + [Steve Henson] | |
16 | + | |
17 | + *) Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which | |
18 | + avoids preferring ECDHE-ECDSA ciphers when the client appears to be | |
19 | + Safari on OS X. Safari on OS X 10.8..10.8.3 advertises support for | |
20 | + several ECDHE-ECDSA ciphers, but fails to negotiate them. The bug | |
21 | + is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing | |
22 | + 10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer. | |
23 | + [Rob Stradling, Adam Langley] | |
24 | + | |
5 | 25 | Changes between 1.0.1d and 1.0.1e [11 Feb 2013] |
6 | 26 | |
7 | - *) | |
27 | + *) Correct fix for CVE-2013-0169. The original didn't work on AES-NI | |
28 | + supporting platforms or when small records were transferred. | |
29 | + [Andy Polyakov, Steve Henson] | |
8 | 30 | |
9 | 31 | Changes between 1.0.1c and 1.0.1d [5 Feb 2013] |
10 | 32 |
@@ -404,6 +426,63 @@ | ||
404 | 426 | Add command line options to s_client/s_server. |
405 | 427 | [Steve Henson] |
406 | 428 | |
429 | + Changes between 1.0.0j and 1.0.0k [5 Feb 2013] | |
430 | + | |
431 | + *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time. | |
432 | + | |
433 | + This addresses the flaw in CBC record processing discovered by | |
434 | + Nadhem Alfardan and Kenny Paterson. Details of this attack can be found | |
435 | + at: http://www.isg.rhul.ac.uk/tls/ | |
436 | + | |
437 | + Thanks go to Nadhem Alfardan and Kenny Paterson of the Information | |
438 | + Security Group at Royal Holloway, University of London | |
439 | + (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and | |
440 | + Emilia K舖per for the initial patch. | |
441 | + (CVE-2013-0169) | |
442 | + [Emilia K舖per, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson] | |
443 | + | |
444 | + *) Return an error when checking OCSP signatures when key is NULL. | |
445 | + This fixes a DoS attack. (CVE-2013-0166) | |
446 | + [Steve Henson] | |
447 | + | |
448 | + *) Call OCSP Stapling callback after ciphersuite has been chosen, so | |
449 | + the right response is stapled. Also change SSL_get_certificate() | |
450 | + so it returns the certificate actually sent. | |
451 | + See http://rt.openssl.org/Ticket/Display.html?id=2836. | |
452 | + (This is a backport) | |
453 | + [Rob Stradling <rob.stradling@comodo.com>] | |
454 | + | |
455 | + *) Fix possible deadlock when decoding public keys. | |
456 | + [Steve Henson] | |
457 | + | |
458 | + Changes between 1.0.0i and 1.0.0j [10 May 2012] | |
459 | + | |
460 | + [NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after | |
461 | + OpenSSL 1.0.1.] | |
462 | + | |
463 | + *) Sanity check record length before skipping explicit IV in DTLS | |
464 | + to fix DoS attack. | |
465 | + | |
466 | + Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic | |
467 | + fuzzing as a service testing platform. | |
468 | + (CVE-2012-2333) | |
469 | + [Steve Henson] | |
470 | + | |
471 | + *) Initialise tkeylen properly when encrypting CMS messages. | |
472 | + Thanks to Solar Designer of Openwall for reporting this issue. | |
473 | + [Steve Henson] | |
474 | + | |
475 | + Changes between 1.0.0h and 1.0.0i [19 Apr 2012] | |
476 | + | |
477 | + *) Check for potentially exploitable overflows in asn1_d2i_read_bio | |
478 | + BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer | |
479 | + in CRYPTO_realloc_clean. | |
480 | + | |
481 | + Thanks to Tavis Ormandy, Google Security Team, for discovering this | |
482 | + issue and to Adam Langley <agl@chromium.org> for fixing it. | |
483 | + (CVE-2012-2110) | |
484 | + [Adam Langley (Google), Tavis Ormandy, Google Security Team] | |
485 | + | |
407 | 486 | Changes between 1.0.0g and 1.0.0h [12 Mar 2012] |
408 | 487 | |
409 | 488 | *) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness |
@@ -1394,6 +1473,86 @@ | ||
1394 | 1473 | *) Change 'Configure' script to enable Camellia by default. |
1395 | 1474 | [NTT] |
1396 | 1475 | |
1476 | + Changes between 0.9.8x and 0.9.8y [5 Feb 2013] | |
1477 | + | |
1478 | + *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time. | |
1479 | + | |
1480 | + This addresses the flaw in CBC record processing discovered by | |
1481 | + Nadhem Alfardan and Kenny Paterson. Details of this attack can be found | |
1482 | + at: http://www.isg.rhul.ac.uk/tls/ | |
1483 | + | |
1484 | + Thanks go to Nadhem Alfardan and Kenny Paterson of the Information | |
1485 | + Security Group at Royal Holloway, University of London | |
1486 | + (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and | |
1487 | + Emilia K舖per for the initial patch. | |
1488 | + (CVE-2013-0169) | |
1489 | + [Emilia K舖per, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson] | |
1490 | + | |
1491 | + *) Return an error when checking OCSP signatures when key is NULL. | |
1492 | + This fixes a DoS attack. (CVE-2013-0166) | |
1493 | + [Steve Henson] | |
1494 | + | |
1495 | + *) Call OCSP Stapling callback after ciphersuite has been chosen, so | |
1496 | + the right response is stapled. Also change SSL_get_certificate() | |
1497 | + so it returns the certificate actually sent. | |
1498 | + See http://rt.openssl.org/Ticket/Display.html?id=2836. | |
1499 | + (This is a backport) | |
1500 | + [Rob Stradling <rob.stradling@comodo.com>] | |
1501 | + | |
1502 | + *) Fix possible deadlock when decoding public keys. | |
1503 | + [Steve Henson] | |
1504 | + | |
1505 | + Changes between 0.9.8w and 0.9.8x [10 May 2012] | |
1506 | + | |
1507 | + *) Sanity check record length before skipping explicit IV in DTLS | |
1508 | + to fix DoS attack. | |
1509 | + | |
1510 | + Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic | |
1511 | + fuzzing as a service testing platform. | |
1512 | + (CVE-2012-2333) | |
1513 | + [Steve Henson] | |
1514 | + | |
1515 | + *) Initialise tkeylen properly when encrypting CMS messages. | |
1516 | + Thanks to Solar Designer of Openwall for reporting this issue. | |
1517 | + [Steve Henson] | |
1518 | + | |
1519 | + Changes between 0.9.8v and 0.9.8w [23 Apr 2012] | |
1520 | + | |
1521 | + *) The fix for CVE-2012-2110 did not take into account that the | |
1522 | + 'len' argument to BUF_MEM_grow and BUF_MEM_grow_clean is an | |
1523 | + int in OpenSSL 0.9.8, making it still vulnerable. Fix by | |
1524 | + rejecting negative len parameter. (CVE-2012-2131) | |
1525 | + [Tomas Hoger <thoger@redhat.com>] | |
1526 | + | |
1527 | + Changes between 0.9.8u and 0.9.8v [19 Apr 2012] | |
1528 | + | |
1529 | + *) Check for potentially exploitable overflows in asn1_d2i_read_bio | |
1530 | + BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer | |
1531 | + in CRYPTO_realloc_clean. | |
1532 | + | |
1533 | + Thanks to Tavis Ormandy, Google Security Team, for discovering this | |
1534 | + issue and to Adam Langley <agl@chromium.org> for fixing it. | |
1535 | + (CVE-2012-2110) | |
1536 | + [Adam Langley (Google), Tavis Ormandy, Google Security Team] | |
1537 | + | |
1538 | + Changes between 0.9.8t and 0.9.8u [12 Mar 2012] | |
1539 | + | |
1540 | + *) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness | |
1541 | + in CMS and PKCS7 code. When RSA decryption fails use a random key for | |
1542 | + content decryption and always return the same error. Note: this attack | |
1543 | + needs on average 2^20 messages so it only affects automated senders. The | |
1544 | + old behaviour can be reenabled in the CMS code by setting the | |
1545 | + CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where | |
1546 | + an MMA defence is not necessary. | |
1547 | + Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering | |
1548 | + this issue. (CVE-2012-0884) | |
1549 | + [Steve Henson] | |
1550 | + | |
1551 | + *) Fix CVE-2011-4619: make sure we really are receiving a | |
1552 | + client hello before rejecting multiple SGC restarts. Thanks to | |
1553 | + Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this bug. | |
1554 | + [Steve Henson] | |
1555 | + | |
1397 | 1556 | Changes between 0.9.8s and 0.9.8t [18 Jan 2012] |
1398 | 1557 | |
1399 | 1558 | *) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109. |
@@ -1401,7 +1560,7 @@ | ||
1401 | 1560 | Development, Cisco Systems, Inc. for discovering this bug and |
1402 | 1561 | preparing a fix. (CVE-2012-0050) |
1403 | 1562 | [Antonio Martin] |
1404 | - | |
1563 | + | |
1405 | 1564 | Changes between 0.9.8r and 0.9.8s [4 Jan 2012] |
1406 | 1565 | |
1407 | 1566 | *) Nadhem Alfardan and Kenny Paterson have discovered an extension |
@@ -88,7 +88,7 @@ int BUF_MEM_grow_clean(BUF_MEM *str, size_t len); | ||
88 | 88 | char * BUF_strdup(const char *str); |
89 | 89 | char * BUF_strndup(const char *str, size_t siz); |
90 | 90 | void * BUF_memdup(const void *data, size_t siz); |
91 | -void BUF_reverse(unsigned char *out, unsigned char *in, size_t siz); | |
91 | +void BUF_reverse(unsigned char *out, const unsigned char *in, size_t siz); | |
92 | 92 | |
93 | 93 | /* safe string functions */ |
94 | 94 | size_t BUF_strlcpy(char *dst,const char *src,size_t siz); |
@@ -25,11 +25,11 @@ | ||
25 | 25 | * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for |
26 | 26 | * major minor fix final patch/beta) |
27 | 27 | */ |
28 | -#define OPENSSL_VERSION_NUMBER 0x1000105fL | |
28 | +#define OPENSSL_VERSION_NUMBER 0x1000106fL | |
29 | 29 | #ifdef OPENSSL_FIPS |
30 | -#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1e-fips 11 Feb 2013" | |
30 | +#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1f-fips 6 Jan 2014" | |
31 | 31 | #else |
32 | -#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1e 11 Feb 2013" | |
32 | +#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1f 6 Jan 2014" | |
33 | 33 | #endif |
34 | 34 | #define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT |
35 | 35 |
@@ -138,6 +138,7 @@ void ERR_load_RAND_strings(void); | ||
138 | 138 | #define RAND_F_SSLEAY_RAND_BYTES 100 |
139 | 139 | |
140 | 140 | /* Reason codes. */ |
141 | +#define RAND_R_DUAL_EC_DRBG_DISABLED 104 | |
141 | 142 | #define RAND_R_ERROR_INITIALISING_DRBG 102 |
142 | 143 | #define RAND_R_ERROR_INSTANTIATING_DRBG 103 |
143 | 144 | #define RAND_R_NO_FIPS_RANDOM_METHOD_SET 101 |
@@ -555,11 +555,14 @@ struct ssl_session_st | ||
555 | 555 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L |
556 | 556 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L |
557 | 557 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L |
558 | -#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x00000040L /* no effect since 0.9.7h and 0.9.8b */ | |
558 | +#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L | |
559 | 559 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L |
560 | 560 | #define SSL_OP_TLS_D5_BUG 0x00000100L |
561 | 561 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L |
562 | 562 | |
563 | +/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */ | |
564 | +#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | |
565 | + | |
563 | 566 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added |
564 | 567 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) |
565 | 568 | * the workaround is not needed. Unfortunately some broken SSL/TLS |
@@ -641,6 +644,12 @@ struct ssl_session_st | ||
641 | 644 | * TLS only.) "Released" buffers are put onto a free-list in the context |
642 | 645 | * or just freed (depending on the context's setting for freelist_max_len). */ |
643 | 646 | #define SSL_MODE_RELEASE_BUFFERS 0x00000010L |
647 | +/* Send the current time in the Random fields of the ClientHello and | |
648 | + * ServerHello records for compatibility with hypothetical implementations | |
649 | + * that require it. | |
650 | + */ | |
651 | +#define SSL_MODE_SEND_CLIENTHELLO_TIME 0x00000020L | |
652 | +#define SSL_MODE_SEND_SERVERHELLO_TIME 0x00000040L | |
644 | 653 | |
645 | 654 | /* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value, |
646 | 655 | * they cannot be used to clear bits. */ |
@@ -539,6 +539,15 @@ typedef struct ssl3_state_st | ||
539 | 539 | /* Set if we saw the Next Protocol Negotiation extension from our peer. */ |
540 | 540 | int next_proto_neg_seen; |
541 | 541 | #endif |
542 | + | |
543 | +#ifndef OPENSSL_NO_TLSEXT | |
544 | +#ifndef OPENSSL_NO_EC | |
545 | + /* This is set to true if we believe that this is a version of Safari | |
546 | + * running on OS X 10.6 or newer. We wish to know this because Safari | |
547 | + * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */ | |
548 | + char is_probably_safari; | |
549 | +#endif /* !OPENSSL_NO_EC */ | |
550 | +#endif /* !OPENSSL_NO_TLSEXT */ | |
542 | 551 | } SSL3_STATE; |
543 | 552 | |
544 | 553 | #endif |
@@ -5,11 +5,17 @@ | ||
5 | 5 | This file gives a brief overview of the major changes between each OpenSSL |
6 | 6 | release. For more details please read the CHANGES file. |
7 | 7 | |
8 | - Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e: | |
8 | + Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014] | |
9 | + | |
10 | + o Fix for TLS record tampering bug CVE-2013-4353 | |
11 | + o Fix for TLS version checking bug CVE-2013-6449 | |
12 | + o Fix for DTLS retransmission bug CVE-2013-6450 | |
13 | + | |
14 | + Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013]: | |
9 | 15 | |
10 | 16 | o Corrected fix for CVE-2013-0169 |
11 | 17 | |
12 | - Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d: | |
18 | + Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013]: | |
13 | 19 | |
14 | 20 | o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version. |
15 | 21 | o Include the fips configuration module. |
@@ -17,24 +23,24 @@ | ||
17 | 23 | o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169 |
18 | 24 | o Fix for TLS AESNI record handling flaw CVE-2012-2686 |
19 | 25 | |
20 | - Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c: | |
26 | + Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012]: | |
21 | 27 | |
22 | 28 | o Fix TLS/DTLS record length checking bug CVE-2012-2333 |
23 | 29 | o Don't attempt to use non-FIPS composite ciphers in FIPS mode. |
24 | 30 | |
25 | - Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b: | |
31 | + Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012]: | |
26 | 32 | |
27 | 33 | o Fix compilation error on non-x86 platforms. |
28 | 34 | o Make FIPS capable OpenSSL ciphers work in non-FIPS mode. |
29 | 35 | o Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0 |
30 | 36 | |
31 | - Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a: | |
37 | + Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012]: | |
32 | 38 | |
33 | 39 | o Fix for ASN1 overflow bug CVE-2012-2110 |
34 | 40 | o Workarounds for some servers that hang on long client hellos. |
35 | 41 | o Fix SEGV in AES code. |
36 | 42 | |
37 | - Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1: | |
43 | + Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]: | |
38 | 44 | |
39 | 45 | o TLS/DTLS heartbeat support. |
40 | 46 | o SCTP support. |
@@ -47,17 +53,30 @@ | ||
47 | 53 | o Preliminary FIPS capability for unvalidated 2.0 FIPS module. |
48 | 54 | o SRP support. |
49 | 55 | |
50 | - Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h: | |
56 | + Major changes between OpenSSL 1.0.0j and OpenSSL 1.0.0k [5 Feb 2013]: | |
57 | + | |
58 | + o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169 | |
59 | + o Fix OCSP bad key DoS attack CVE-2013-0166 | |
60 | + | |
61 | + Major changes between OpenSSL 1.0.0i and OpenSSL 1.0.0j [10 May 2012]: | |
62 | + | |
63 | + o Fix DTLS record length checking bug CVE-2012-2333 | |
64 | + | |
65 | + Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.0i [19 Apr 2012]: | |
66 | + | |
67 | + o Fix for ASN1 overflow bug CVE-2012-2110 | |
68 | + | |
69 | + Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012]: | |
51 | 70 | |
52 | 71 | o Fix for CMS/PKCS#7 MMA CVE-2012-0884 |
53 | 72 | o Corrected fix for CVE-2011-4619 |
54 | 73 | o Various DTLS fixes. |
55 | 74 | |
56 | - Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g: | |
75 | + Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g [18 Jan 2012]: | |
57 | 76 | |
58 | 77 | o Fix for DTLS DoS issue CVE-2012-0050 |
59 | 78 | |
60 | - Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f: | |
79 | + Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f [4 Jan 2012]: | |
61 | 80 | |
62 | 81 | o Fix for DTLS plaintext recovery attack CVE-2011-4108 |
63 | 82 | o Clear block padding bytes of SSL 3.0 records CVE-2011-4576 |
@@ -65,7 +84,7 @@ | ||
65 | 84 | o Check parameters are not NULL in GOST ENGINE CVE-2012-0027 |
66 | 85 | o Check for malformed RFC3779 data CVE-2011-4577 |
67 | 86 | |
68 | - Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e: | |
87 | + Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e [6 Sep 2011]: | |
69 | 88 | |
70 | 89 | o Fix for CRL vulnerability issue CVE-2011-3207 |
71 | 90 | o Fix for ECDH crashes CVE-2011-3210 |
@@ -73,11 +92,11 @@ | ||
73 | 92 | o Support ECDH ciphersuites for certificates using SHA2 algorithms. |
74 | 93 | o Various DTLS fixes. |
75 | 94 | |
76 | - Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d: | |
95 | + Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d [8 Feb 2011]: | |
77 | 96 | |
78 | 97 | o Fix for security issue CVE-2011-0014 |
79 | 98 | |
80 | - Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c: | |
99 | + Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c [2 Dec 2010]: | |
81 | 100 | |
82 | 101 | o Fix for security issue CVE-2010-4180 |
83 | 102 | o Fix for CVE-2010-4252 |
@@ -85,18 +104,18 @@ | ||
85 | 104 | o Fix various platform compilation issues. |
86 | 105 | o Corrected fix for security issue CVE-2010-3864. |
87 | 106 | |
88 | - Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b: | |
107 | + Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b [16 Nov 2010]: | |
89 | 108 | |
90 | 109 | o Fix for security issue CVE-2010-3864. |
91 | 110 | o Fix for CVE-2010-2939 |
92 | 111 | o Fix WIN32 build system for GOST ENGINE. |
93 | 112 | |
94 | - Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a: | |
113 | + Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a [1 Jun 2010]: | |
95 | 114 | |
96 | 115 | o Fix for security issue CVE-2010-1633. |
97 | 116 | o GOST MAC and CFB fixes. |
98 | 117 | |
99 | - Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0: | |
118 | + Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0 [29 Mar 2010]: | |
100 | 119 | |
101 | 120 | o RFC3280 path validation: sufficient to process PKITS tests. |
102 | 121 | o Integrated support for PVK files and keyblobs. |
@@ -119,20 +138,55 @@ | ||
119 | 138 | o Opaque PRF Input TLS extension support. |
120 | 139 | o Updated time routines to avoid OS limitations. |
121 | 140 | |
122 | - Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r: | |
141 | + Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y [5 Feb 2013]: | |
142 | + | |
143 | + o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169 | |
144 | + o Fix OCSP bad key DoS attack CVE-2013-0166 | |
145 | + | |
146 | + Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x [10 May 2012]: | |
147 | + | |
148 | + o Fix DTLS record length checking bug CVE-2012-2333 | |
149 | + | |
150 | + Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w [23 Apr 2012]: | |
151 | + | |
152 | + o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110) | |
153 | + | |
154 | + Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v [19 Apr 2012]: | |
155 | + | |
156 | + o Fix for ASN1 overflow bug CVE-2012-2110 | |
157 | + | |
158 | + Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u [12 Mar 2012]: | |
159 | + | |
160 | + o Fix for CMS/PKCS#7 MMA CVE-2012-0884 | |
161 | + o Corrected fix for CVE-2011-4619 | |
162 | + o Various DTLS fixes. | |
163 | + | |
164 | + Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t [18 Jan 2012]: | |
165 | + | |
166 | + o Fix for DTLS DoS issue CVE-2012-0050 | |
167 | + | |
168 | + Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s [4 Jan 2012]: | |
169 | + | |
170 | + o Fix for DTLS plaintext recovery attack CVE-2011-4108 | |
171 | + o Fix policy check double free error CVE-2011-4109 | |
172 | + o Clear block padding bytes of SSL 3.0 records CVE-2011-4576 | |
173 | + o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619 | |
174 | + o Check for malformed RFC3779 data CVE-2011-4577 | |
175 | + | |
176 | + Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r [8 Feb 2011]: | |
123 | 177 | |
124 | 178 | o Fix for security issue CVE-2011-0014 |
125 | 179 | |
126 | - Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q: | |
180 | + Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q [2 Dec 2010]: | |
127 | 181 | |
128 | 182 | o Fix for security issue CVE-2010-4180 |
129 | 183 | o Fix for CVE-2010-4252 |
130 | 184 | |
131 | - Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p: | |
185 | + Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p [16 Nov 2010]: | |
132 | 186 | |
133 | 187 | o Fix for security issue CVE-2010-3864. |
134 | 188 | |
135 | - Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o: | |
189 | + Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o [1 Jun 2010]: | |
136 | 190 | |
137 | 191 | o Fix for security issue CVE-2010-0742. |
138 | 192 | o Various DTLS fixes. |
@@ -140,12 +194,12 @@ | ||
140 | 194 | o Fix for no-rc4 compilation. |
141 | 195 | o Chil ENGINE unload workaround. |
142 | 196 | |
143 | - Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n: | |
197 | + Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]: | |
144 | 198 | |
145 | 199 | o CFB cipher definition fixes. |
146 | 200 | o Fix security issues CVE-2010-0740 and CVE-2010-0433. |
147 | 201 | |
148 | - Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m: | |
202 | + Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010]: | |
149 | 203 | |
150 | 204 | o Cipher definition fixes. |
151 | 205 | o Workaround for slow RAND_poll() on some WIN32 versions. |
@@ -157,33 +211,33 @@ | ||
157 | 211 | o Ticket and SNI coexistence fixes. |
158 | 212 | o Many fixes to DTLS handling. |
159 | 213 | |
160 | - Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l: | |
214 | + Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009]: | |
161 | 215 | |
162 | 216 | o Temporary work around for CVE-2009-3555: disable renegotiation. |
163 | 217 | |
164 | - Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k: | |
218 | + Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009]: | |
165 | 219 | |
166 | 220 | o Fix various build issues. |
167 | 221 | o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789) |
168 | 222 | |
169 | - Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j: | |
223 | + Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009]: | |
170 | 224 | |
171 | 225 | o Fix security issue (CVE-2008-5077) |
172 | 226 | o Merge FIPS 140-2 branch code. |
173 | 227 | |
174 | - Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h: | |
228 | + Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008]: | |
175 | 229 | |
176 | 230 | o CryptoAPI ENGINE support. |
177 | 231 | o Various precautionary measures. |
178 | 232 | o Fix for bugs affecting certificate request creation. |
179 | 233 | o Support for local machine keyset attribute in PKCS#12 files. |
180 | 234 | |
181 | - Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g: | |
235 | + Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007]: | |
182 | 236 | |
183 | 237 | o Backport of CMS functionality to 0.9.8. |
184 | 238 | o Fixes for bugs introduced with 0.9.8f. |
185 | 239 | |
186 | - Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f: | |
240 | + Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007]: | |
187 | 241 | |
188 | 242 | o Add gcc 4.2 support. |
189 | 243 | o Add support for AES and SSE2 assembly lanugauge optimization |
@@ -194,23 +248,23 @@ | ||
194 | 248 | o RFC4507bis support. |
195 | 249 | o TLS Extensions support. |
196 | 250 | |
197 | - Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e: | |
251 | + Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007]: | |
198 | 252 | |
199 | 253 | o Various ciphersuite selection fixes. |
200 | 254 | o RFC3779 support. |
201 | 255 | |
202 | - Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d: | |
256 | + Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006]: | |
203 | 257 | |
204 | 258 | o Introduce limits to prevent malicious key DoS (CVE-2006-2940) |
205 | 259 | o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343) |
206 | 260 | o Changes to ciphersuite selection algorithm |
207 | 261 | |
208 | - Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c: | |
262 | + Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006]: | |
209 | 263 | |
210 | 264 | o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339 |
211 | 265 | o New cipher Camellia |
212 | 266 | |
213 | - Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b: | |
267 | + Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006]: | |
214 | 268 | |
215 | 269 | o Cipher string fixes. |
216 | 270 | o Fixes for VC++ 2005. |
@@ -220,12 +274,12 @@ | ||
220 | 274 | o Built in dynamic engine compilation support on Win32. |
221 | 275 | o Fixes auto dynamic engine loading in Win32. |
222 | 276 | |
223 | - Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a: | |
277 | + Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005]: | |
224 | 278 | |
225 | 279 | o Fix potential SSL 2.0 rollback, CVE-2005-2969 |
226 | 280 | o Extended Windows CE support |
227 | 281 | |
228 | - Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8: | |
282 | + Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005]: | |
229 | 283 | |
230 | 284 | o Major work on the BIGNUM library for higher efficiency and to |
231 | 285 | make operations more streamlined and less contradictory. This |
@@ -299,36 +353,36 @@ | ||
299 | 353 | o Added initial support for Win64. |
300 | 354 | o Added alternate pkg-config files. |
301 | 355 | |
302 | - Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m: | |
356 | + Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007]: | |
303 | 357 | |
304 | 358 | o FIPS 1.1.1 module linking. |
305 | 359 | o Various ciphersuite selection fixes. |
306 | 360 | |
307 | - Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l: | |
361 | + Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006]: | |
308 | 362 | |
309 | 363 | o Introduce limits to prevent malicious key DoS (CVE-2006-2940) |
310 | 364 | o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343) |
311 | 365 | |
312 | - Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k: | |
366 | + Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006]: | |
313 | 367 | |
314 | 368 | o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339 |
315 | 369 | |
316 | - Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j: | |
370 | + Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006]: | |
317 | 371 | |
318 | 372 | o Visual C++ 2005 fixes. |
319 | 373 | o Update Windows build system for FIPS. |
320 | 374 | |
321 | - Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i: | |
375 | + Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005]: | |
322 | 376 | |
323 | 377 | o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build. |
324 | 378 | |
325 | - Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h: | |
379 | + Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005]: | |
326 | 380 | |
327 | 381 | o Fix SSL 2.0 Rollback, CVE-2005-2969 |
328 | 382 | o Allow use of fixed-length exponent on DSA signing |
329 | 383 | o Default fixed-window RSA, DSA, DH private-key operations |
330 | 384 | |
331 | - Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g: | |
385 | + Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005]: | |
332 | 386 | |
333 | 387 | o More compilation issues fixed. |
334 | 388 | o Adaptation to more modern Kerberos API. |
@@ -337,7 +391,7 @@ | ||
337 | 391 | o More constification. |
338 | 392 | o Added processing of proxy certificates (RFC 3820). |
339 | 393 | |
340 | - Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f: | |
394 | + Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005]: | |
341 | 395 | |
342 | 396 | o Several compilation issues fixed. |
343 | 397 | o Many memory allocation failure checks added. |
@@ -345,12 +399,12 @@ | ||
345 | 399 | o Mandatory basic checks on certificates. |
346 | 400 | o Performance improvements. |
347 | 401 | |
348 | - Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e: | |
402 | + Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004]: | |
349 | 403 | |
350 | 404 | o Fix race condition in CRL checking code. |
351 | 405 | o Fixes to PKCS#7 (S/MIME) code. |
352 | 406 | |
353 | - Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d: | |
407 | + Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004]: | |
354 | 408 | |
355 | 409 | o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug |
356 | 410 | o Security: Fix null-pointer assignment in do_change_cipher_spec() |
@@ -358,14 +412,14 @@ | ||
358 | 412 | o Multiple X509 verification fixes |
359 | 413 | o Speed up HMAC and other operations |
360 | 414 | |
361 | - Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c: | |
415 | + Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003]: | |
362 | 416 | |
363 | 417 | o Security: fix various ASN1 parsing bugs. |
364 | 418 | o New -ignore_err option to OCSP utility. |
365 | 419 | o Various interop and bug fixes in S/MIME code. |
366 | 420 | o SSL/TLS protocol fix for unrequested client certificates. |
367 | 421 | |
368 | - Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b: | |
422 | + Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003]: | |
369 | 423 | |
370 | 424 | o Security: counter the Klima-Pokorny-Rosa extension of |
371 | 425 | Bleichbacher's attack |
@@ -376,7 +430,7 @@ | ||
376 | 430 | o ASN.1: treat domainComponent correctly. |
377 | 431 | o Documentation: fixes and additions. |
378 | 432 | |
379 | - Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a: | |
433 | + Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003]: | |
380 | 434 | |
381 | 435 | o Security: Important security related bugfixes. |
382 | 436 | o Enhanced compatibility with MIT Kerberos. |
@@ -387,7 +441,7 @@ | ||
387 | 441 | o SSL/TLS: now handles manual certificate chain building. |
388 | 442 | o SSL/TLS: certain session ID malfunctions corrected. |
389 | 443 | |
390 | - Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7: | |
444 | + Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002]: | |
391 | 445 | |
392 | 446 | o New library section OCSP. |
393 | 447 | o Complete rewrite of ASN1 code. |
@@ -433,23 +487,23 @@ | ||
433 | 487 | o SSL/TLS: add callback to retrieve SSL/TLS messages. |
434 | 488 | o SSL/TLS: support AES cipher suites (RFC3268). |
435 | 489 | |
436 | - Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k: | |
490 | + Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003]: | |
437 | 491 | |
438 | 492 | o Security: fix various ASN1 parsing bugs. |
439 | 493 | o SSL/TLS protocol fix for unrequested client certificates. |
440 | 494 | |
441 | - Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j: | |
495 | + Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003]: | |
442 | 496 | |
443 | 497 | o Security: counter the Klima-Pokorny-Rosa extension of |
444 | 498 | Bleichbacher's attack |
445 | 499 | o Security: make RSA blinding default. |
446 | 500 | o Build: shared library support fixes. |
447 | 501 | |
448 | - Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i: | |
502 | + Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003]: | |
449 | 503 | |
450 | 504 | o Important security related bugfixes. |
451 | 505 | |
452 | - Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h: | |
506 | + Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002]: | |
453 | 507 | |
454 | 508 | o New configuration targets for Tandem OSS and A/UX. |
455 | 509 | o New OIDs for Microsoft attributes. |
@@ -463,25 +517,25 @@ | ||
463 | 517 | o Fixes for smaller building problems. |
464 | 518 | o Updates of manuals, FAQ and other instructive documents. |
465 | 519 | |
466 | - Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g: | |
520 | + Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002]: | |
467 | 521 | |
468 | 522 | o Important building fixes on Unix. |
469 | 523 | |
470 | - Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f: | |
524 | + Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002]: | |
471 | 525 | |
472 | 526 | o Various important bugfixes. |
473 | 527 | |
474 | - Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e: | |
528 | + Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002]: | |
475 | 529 | |
476 | 530 | o Important security related bugfixes. |
477 | 531 | o Various SSL/TLS library bugfixes. |
478 | 532 | |
479 | - Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d: | |
533 | + Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002]: | |
480 | 534 | |
481 | 535 | o Various SSL/TLS library bugfixes. |
482 | 536 | o Fix DH parameter generation for 'non-standard' generators. |
483 | 537 | |
484 | - Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c: | |
538 | + Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001]: | |
485 | 539 | |
486 | 540 | o Various SSL/TLS library bugfixes. |
487 | 541 | o BIGNUM library fixes. |
@@ -494,7 +548,7 @@ | ||
494 | 548 | Broadcom and Cryptographic Appliance's keyserver |
495 | 549 | [in 0.9.6c-engine release]. |
496 | 550 | |
497 | - Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b: | |
551 | + Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001]: | |
498 | 552 | |
499 | 553 | o Security fix: PRNG improvements. |
500 | 554 | o Security fix: RSA OAEP check. |
@@ -511,7 +565,7 @@ | ||
511 | 565 | o Increase default size for BIO buffering filter. |
512 | 566 | o Compatibility fixes in some scripts. |
513 | 567 | |
514 | - Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a: | |
568 | + Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001]: | |
515 | 569 | |
516 | 570 | o Security fix: change behavior of OpenSSL to avoid using |
517 | 571 | environment variables when running as root. |
@@ -536,7 +590,7 @@ | ||
536 | 590 | o New function BN_rand_range(). |
537 | 591 | o Add "-rand" option to openssl s_client and s_server. |
538 | 592 | |
539 | - Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6: | |
593 | + Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000]: | |
540 | 594 | |
541 | 595 | o Some documentation for BIO and SSL libraries. |
542 | 596 | o Enhanced chain verification using key identifiers. |
@@ -551,7 +605,7 @@ | ||
551 | 605 | [1] The support for external crypto devices is currently a separate |
552 | 606 | distribution. See the file README.ENGINE. |
553 | 607 | |
554 | - Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a: | |
608 | + Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000]: | |
555 | 609 | |
556 | 610 | o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8 |
557 | 611 | o Shared library support for HPUX and Solaris-gcc |
@@ -560,7 +614,7 @@ | ||
560 | 614 | o New 'rand' application |
561 | 615 | o New way to check for existence of algorithms from scripts |
562 | 616 | |
563 | - Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5: | |
617 | + Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000]: | |
564 | 618 | |
565 | 619 | o S/MIME support in new 'smime' command |
566 | 620 | o Documentation for the OpenSSL command line application |
@@ -596,7 +650,7 @@ | ||
596 | 650 | o Enhanced support for Alpha Linux |
597 | 651 | o Experimental MacOS support |
598 | 652 | |
599 | - Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4: | |
653 | + Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999]: | |
600 | 654 | |
601 | 655 | o Transparent support for PKCS#8 format private keys: these are used |
602 | 656 | by several software packages and are more secure than the standard |
@@ -607,7 +661,7 @@ | ||
607 | 661 | o New pipe-like BIO that allows using the SSL library when actual I/O |
608 | 662 | must be handled by the application (BIO pair) |
609 | 663 | |
610 | - Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3: | |
664 | + Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999]: | |
611 | 665 | o Lots of enhancements and cleanups to the Configuration mechanism |
612 | 666 | o RSA OEAP related fixes |
613 | 667 | o Added `openssl ca -revoke' option for revoking a certificate |
@@ -621,7 +675,7 @@ | ||
621 | 675 | o Sparc assembler bignum implementation, optimized hash functions |
622 | 676 | o Option to disable selected ciphers |
623 | 677 | |
624 | - Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b: | |
678 | + Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999]: | |
625 | 679 | o Fixed a security hole related to session resumption |
626 | 680 | o Fixed RSA encryption routines for the p < q case |
627 | 681 | o "ALL" in cipher lists now means "everything except NULL ciphers" |
@@ -643,7 +697,7 @@ | ||
643 | 697 | o Lots of memory leak fixes. |
644 | 698 | o Lots of bug fixes. |
645 | 699 | |
646 | - Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c: | |
700 | + Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998]: | |
647 | 701 | o Integration of the popular NO_RSA/NO_DSA patches |
648 | 702 | o Initial support for compression inside the SSL record layer |
649 | 703 | o Added BIO proxy and filtering functionality |
@@ -1,5 +1,5 @@ | ||
1 | 1 | |
2 | - OpenSSL 1.0.1e 11 Feb 2013 | |
2 | + OpenSSL 1.0.1f 6 Jan 2014 | |
3 | 3 | |
4 | 4 | Copyright (c) 1998-2011 The OpenSSL Project |
5 | 5 | Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson |
@@ -1,12 +1,12 @@ | ||
1 | 1 | ## |
2 | 2 | ## ca-bundle.crt -- Bundle of CA Root Certificates |
3 | 3 | ## |
4 | -## Certificate data from Mozilla as of: Sat Dec 29 20:03:40 2012 | |
4 | +## Certificate data from Mozilla as of: Thu Dec 5 09:40:49 2013 | |
5 | 5 | ## |
6 | 6 | ## This is a bundle of X.509 certificates of public Certificate Authorities |
7 | 7 | ## (CA). These were automatically extracted from Mozilla's root certificates |
8 | 8 | ## file (certdata.txt). This file can be found in the mozilla source tree: |
9 | -## http://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt?raw=1 | |
9 | +## http://mxr.mozilla.org/mozilla-release/source/security/nss/lib/ckfw/builtins/certdata.txt?raw=1 | |
10 | 10 | ## |
11 | 11 | ## It contains the certificates in PEM format and therefore |
12 | 12 | ## can be directly used with curl / libcurl / php_curl, or with |
@@ -14,7 +14,6 @@ | ||
14 | 14 | ## Just configure this file as the SSLCACertificateFile. |
15 | 15 | ## |
16 | 16 | |
17 | -# @(#) $RCSfile: certdata.txt,v $ $Revision: 1.87 $ $Date: 2012/12/29 16:32:45 $ | |
18 | 17 | |
19 | 18 | GTE CyberTrust Global Root |
20 | 19 | ========================== |
@@ -91,46 +90,6 @@ BIZCe/zuf6IWUrVnZ9NA2zsmWLIodz2uFHdh1voqZiegDfqnc1zqcPGUIWVEX/r87yloqaKHee95 | ||
91 | 90 | 70+sB3c4 |
92 | 91 | -----END CERTIFICATE----- |
93 | 92 | |
94 | -Digital Signature Trust Co. Global CA 1 | |
95 | -======================================= | |
96 | ------BEGIN CERTIFICATE----- | |
97 | -MIIDKTCCApKgAwIBAgIENnAVljANBgkqhkiG9w0BAQUFADBGMQswCQYDVQQGEwJVUzEkMCIGA1UE | |
98 | -ChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMREwDwYDVQQLEwhEU1RDQSBFMTAeFw05ODEy | |
99 | -MTAxODEwMjNaFw0xODEyMTAxODQwMjNaMEYxCzAJBgNVBAYTAlVTMSQwIgYDVQQKExtEaWdpdGFs | |
100 | -IFNpZ25hdHVyZSBUcnVzdCBDby4xETAPBgNVBAsTCERTVENBIEUxMIGdMA0GCSqGSIb3DQEBAQUA | |
101 | -A4GLADCBhwKBgQCgbIGpzzQeJN3+hijM3oMv+V7UQtLodGBmE5gGHKlREmlvMVW5SXIACH7TpWJE | |
102 | -NySZj9mDSI+ZbZUTu0M7LklOiDfBu1h//uG9+LthzfNHwJmm8fOR6Hh8AMthyUQncWlVSn5JTe2i | |
103 | -o74CTADKAqjuAQIxZA9SLRN0dja1erQtcQIBA6OCASQwggEgMBEGCWCGSAGG+EIBAQQEAwIABzBo | |
104 | -BgNVHR8EYTBfMF2gW6BZpFcwVTELMAkGA1UEBhMCVVMxJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0 | |
105 | -dXJlIFRydXN0IENvLjERMA8GA1UECxMIRFNUQ0EgRTExDTALBgNVBAMTBENSTDEwKwYDVR0QBCQw | |
106 | -IoAPMTk5ODEyMTAxODEwMjNagQ8yMDE4MTIxMDE4MTAyM1owCwYDVR0PBAQDAgEGMB8GA1UdIwQY | |
107 | -MBaAFGp5fpFpRhgTCgJ3pVlbYJglDqL4MB0GA1UdDgQWBBRqeX6RaUYYEwoCd6VZW2CYJQ6i+DAM | |
108 | -BgNVHRMEBTADAQH/MBkGCSqGSIb2fQdBAAQMMAobBFY0LjADAgSQMA0GCSqGSIb3DQEBBQUAA4GB | |
109 | -ACIS2Hod3IEGtgllsofIH160L+nEHvI8wbsEkBFKg05+k7lNQseSJqBcNJo4cvj9axY+IO6CizEq | |
110 | -kzaFI4iKPANo08kJD038bKTaKHKTDomAsH3+gG9lbRgzl4vCa4nuYD3Im+9/KzJic5PLPON74nZ4 | |
111 | -RbyhkwS7hp86W0N6w4pl | |
112 | ------END CERTIFICATE----- | |
113 | - | |
114 | -Digital Signature Trust Co. Global CA 3 | |
115 | -======================================= | |
116 | ------BEGIN CERTIFICATE----- | |
117 | -MIIDKTCCApKgAwIBAgIENm7TzjANBgkqhkiG9w0BAQUFADBGMQswCQYDVQQGEwJVUzEkMCIGA1UE | |
118 | -ChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMREwDwYDVQQLEwhEU1RDQSBFMjAeFw05ODEy | |
119 | -MDkxOTE3MjZaFw0xODEyMDkxOTQ3MjZaMEYxCzAJBgNVBAYTAlVTMSQwIgYDVQQKExtEaWdpdGFs | |
120 | -IFNpZ25hdHVyZSBUcnVzdCBDby4xETAPBgNVBAsTCERTVENBIEUyMIGdMA0GCSqGSIb3DQEBAQUA | |
121 | -A4GLADCBhwKBgQC/k48Xku8zExjrEH9OFr//Bo8qhbxe+SSmJIi2A7fBw18DW9Fvrn5C6mYjuGOD | |
122 | -VvsoLeE4i7TuqAHhzhy2iCoiRoX7n6dwqUcUP87eZfCocfdPJmyMvMa1795JJ/9IKn3oTQPMx7JS | |
123 | -xhcxEzu1TdvIxPbDDyQq2gyd55FbgM2UnQIBA6OCASQwggEgMBEGCWCGSAGG+EIBAQQEAwIABzBo | |
124 | -BgNVHR8EYTBfMF2gW6BZpFcwVTELMAkGA1UEBhMCVVMxJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0 | |
125 | -dXJlIFRydXN0IENvLjERMA8GA1UECxMIRFNUQ0EgRTIxDTALBgNVBAMTBENSTDEwKwYDVR0QBCQw | |
126 | -IoAPMTk5ODEyMDkxOTE3MjZagQ8yMDE4MTIwOTE5MTcyNlowCwYDVR0PBAQDAgEGMB8GA1UdIwQY | |
127 | -MBaAFB6CTShlgDzJQW6sNS5ay97u+DlbMB0GA1UdDgQWBBQegk0oZYA8yUFurDUuWsve7vg5WzAM | |
128 | -BgNVHRMEBTADAQH/MBkGCSqGSIb2fQdBAAQMMAobBFY0LjADAgSQMA0GCSqGSIb3DQEBBQUAA4GB | |
129 | -AEeNg61i8tuwnkUiBbmi1gMOOHLnnvx75pO2mqWilMg0HZHRxdf0CiUPPXiBng+xZ8SQTGPdXqfi | |
130 | -up/1902lMXucKS1M/mQ+7LZT/uqb7YLbdHVLB3luHtgZg3Pe9T7Qtd7nS2h9Qy4qIOF+oHhEngj1 | |
131 | -mPnHfxsb1gYgAlihw6ID | |
132 | ------END CERTIFICATE----- | |
133 | - | |
134 | 93 | Verisign Class 3 Public Primary Certification Authority |
135 | 94 | ======================================================= |
136 | 95 | -----BEGIN CERTIFICATE----- |
@@ -147,44 +106,6 @@ WM1pF+NEHJwZRDmJXNycAA9WjQKZ7aKQRUzkuxCkPfAyAw7xzvjoyVGM5mKf5p/AfbdynMk2Omuf | ||
147 | 106 | Tqj/ZA1k |
148 | 107 | -----END CERTIFICATE----- |
149 | 108 | |
150 | -Verisign Class 1 Public Primary Certification Authority - G2 | |
151 | -============================================================ | |
152 | ------BEGIN CERTIFICATE----- | |
153 | -MIIDAjCCAmsCEEzH6qqYPnHTkxD4PTqJkZIwDQYJKoZIhvcNAQEFBQAwgcExCzAJBgNVBAYTAlVT | |
154 | -MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE8MDoGA1UECxMzQ2xhc3MgMSBQdWJsaWMgUHJpbWFy | |
155 | -eSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEcyMTowOAYDVQQLEzEoYykgMTk5OCBWZXJpU2ln | |
156 | -biwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MR8wHQYDVQQLExZWZXJpU2lnbiBUcnVz | |
157 | -dCBOZXR3b3JrMB4XDTk4MDUxODAwMDAwMFoXDTI4MDgwMTIzNTk1OVowgcExCzAJBgNVBAYTAlVT | |
158 | -MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE8MDoGA1UECxMzQ2xhc3MgMSBQdWJsaWMgUHJpbWFy | |
159 | -eSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEcyMTowOAYDVQQLEzEoYykgMTk5OCBWZXJpU2ln | |
160 | -biwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MR8wHQYDVQQLExZWZXJpU2lnbiBUcnVz | |
161 | -dCBOZXR3b3JrMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCq0Lq+Fi24g9TK0g+8djHKlNgd | |
162 | -k4xWArzZbxpvUjZudVYKVdPfQ4chEWWKfo+9Id5rMj8bhDSVBZ1BNeuS65bdqlk/AVNtmU/t5eIq | |
163 | -WpDBucSmFc/IReumXY6cPvBkJHalzasab7bYe1FhbqZ/h8jit+U03EGI6glAvnOSPWvndQIDAQAB | |
164 | -MA0GCSqGSIb3DQEBBQUAA4GBAKlPww3HZ74sy9mozS11534Vnjty637rXC0Jh9ZrbWB85a7FkCMM | |
165 | -XErQr7Fd88e2CtvgFZMN3QO8x3aKtd1Pw5sTdbgBwObJW2uluIncrKTdcu1OofdPvAbT6shkdHvC | |
166 | -lUGcZXNY8ZCaPGqxmMnEh7zPRW1F4m4iP/68DzFc6PLZ | |
167 | ------END CERTIFICATE----- | |
168 | - | |
169 | -Verisign Class 2 Public Primary Certification Authority - G2 | |
170 | -============================================================ | |
171 | ------BEGIN CERTIFICATE----- | |
172 | -MIIDAzCCAmwCEQC5L2DMiJ+hekYJuFtwbIqvMA0GCSqGSIb3DQEBBQUAMIHBMQswCQYDVQQGEwJV | |
173 | -UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1h | |
174 | -cnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNp | |
175 | -Z24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1 | |
176 | -c3QgTmV0d29yazAeFw05ODA1MTgwMDAwMDBaFw0yODA4MDEyMzU5NTlaMIHBMQswCQYDVQQGEwJV | |
177 | -UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1h | |
178 | -cnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNp | |
179 | -Z24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1 | |
180 | -c3QgTmV0d29yazCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAp4gBIXQs5xoD8JjhlzwPIQjx | |
181 | -nNuX6Zr8wgQGE75fUsjMHiwSViy4AWkszJkfrbCWrnkE8hM5wXuYuggs6MKEEyyqaekJ9MepAqRC | |
182 | -wiNPStjwDqL7MWzJ5m+ZJwf15vRMeJ5t60aG+rmGyVTyssSv1EYcWskVMP8NbPUtDm3Of3cCAwEA | |
183 | -ATANBgkqhkiG9w0BAQUFAAOBgQByLvl/0fFx+8Se9sVeUYpAmLho+Jscg9jinb3/7aHmZuovCfTK | |
184 | -1+qlK5X2JGCGTUQug6XELaDTrnhpb3LabK4I8GOSN+a7xDAXrXfMSTWqz9iP0b63GJZHc2pUIjRk | |
185 | -LbYWm1lbtFFZOrMLFPQS32eg9K0yZF6xRnInjBJ7xUS0rg== | |
186 | ------END CERTIFICATE----- | |
187 | - | |
188 | 109 | Verisign Class 3 Public Primary Certification Authority - G2 |
189 | 110 | ============================================================ |
190 | 111 | -----BEGIN CERTIFICATE----- |
@@ -304,54 +225,6 @@ V9+vqDWzf4mH6eglkrh/hXqu1rweN1gqZ8mRzyqBPu3GOd/APhmcGcwTTYJBtYze4D1gCCAPRX5r | ||
304 | 225 | on+jjBXu |
305 | 226 | -----END CERTIFICATE----- |
306 | 227 | |
307 | -Verisign Class 1 Public Primary Certification Authority - G3 | |
308 | -============================================================ | |
309 | ------BEGIN CERTIFICATE----- | |
310 | -MIIEGjCCAwICEQCLW3VWhFSFCwDPrzhIzrGkMA0GCSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJV | |
311 | -UzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdv | |
312 | -cmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl | |
313 | -IG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNh | |
314 | -dGlvbiBBdXRob3JpdHkgLSBHMzAeFw05OTEwMDEwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMIHKMQsw | |
315 | -CQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRy | |
316 | -dXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhv | |
317 | -cml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkg | |
318 | -Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC | |
319 | -ggEBAN2E1Lm0+afY8wR4nN493GwTFtl63SRRZsDHJlkNrAYIwpTRMx/wgzUfbhvI3qpuFU5UJ+/E | |
320 | -bRrsC+MO8ESlV8dAWB6jRx9x7GD2bZTIGDnt/kIYVt/kTEkQeE4BdjVjEjbdZrwBBDajVWjVojYJ | |
321 | -rKshJlQGrT/KFOCsyq0GHZXi+J3x4GD/wn91K0zM2v6HmSHquv4+VNfSWXjbPG7PoBMAGrgnoeS+ | |
322 | -Z5bKoMWznN3JdZ7rMJpfo83ZrngZPyPpXNspva1VyBtUjGP26KbqxzcSXKMpHgLZ2x87tNcPVkeB | |
323 | -FQRKr4Mn0cVYiMHd9qqnoxjaaKptEVHhv2Vrn5Z20T0CAwEAATANBgkqhkiG9w0BAQUFAAOCAQEA | |
324 | -q2aN17O6x5q25lXQBfGfMY1aqtmqRiYPce2lrVNWYgFHKkTp/j90CxObufRNG7LRX7K20ohcs5/N | |
325 | -y9Sn2WCVhDr4wTcdYcrnsMXlkdpUpqwxga6X3s0IrLjAl4B/bnKk52kTlWUfxJM8/XmPBNQ+T+r3 | |
326 | -ns7NZ3xPZQL/kYVUc8f/NveGLezQXk//EZ9yBta4GvFMDSZl4kSAHsef493oCtrspSCAaWihT37h | |
327 | -a88HQfqDjrw43bAuEbFrskLMmrz5SCJ5ShkPshw+IHTZasO+8ih4E1Z5T21Q6huwtVexN2ZYI/Pc | |
328 | -D98Kh8TvhgXVOBRgmaNL3gaWcSzy27YfpO8/7g== | |
329 | ------END CERTIFICATE----- | |
330 | - | |
331 | -Verisign Class 2 Public Primary Certification Authority - G3 | |
332 | -============================================================ | |
333 | ------BEGIN CERTIFICATE----- | |
334 | -MIIEGTCCAwECEGFwy0mMX5hFKeewptlQW3owDQYJKoZIhvcNAQEFBQAwgcoxCzAJBgNVBAYTAlVT | |
335 | -MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29y | |
336 | -azE6MDgGA1UECxMxKGMpIDE5OTkgVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ug | |
337 | -b25seTFFMEMGA1UEAxM8VmVyaVNpZ24gQ2xhc3MgMiBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0 | |
338 | -aW9uIEF1dGhvcml0eSAtIEczMB4XDTk5MTAwMTAwMDAwMFoXDTM2MDcxNjIzNTk1OVowgcoxCzAJ | |
339 | -BgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1 | |
340 | -c3QgTmV0d29yazE6MDgGA1UECxMxKGMpIDE5OTkgVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9y | |
341 | -aXplZCB1c2Ugb25seTFFMEMGA1UEAxM8VmVyaVNpZ24gQ2xhc3MgMiBQdWJsaWMgUHJpbWFyeSBD | |
342 | -ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEczMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC | |
343 | -AQEArwoNwtUs22e5LeWUJ92lvuCwTY+zYVY81nzD9M0+hsuiiOLh2KRpxbXiv8GmR1BeRjmL1Za6 | |
344 | -tW8UvxDOJxOeBUebMXoT2B/Z0wI3i60sR/COgQanDTAM6/c8DyAd3HJG7qUCyFvDyVZpTMUYwZF7 | |
345 | -C9UTAJu878NIPkZgIIUq1ZC2zYugzDLdt/1AVbJQHFauzI13TccgTacxdu9okoqQHgiBVrKtaaNS | |
346 | -0MscxCM9H5n+TOgWY47GCI72MfbS+uV23bUckqNJzc0BzWjNqWm6o+sdDZykIKbBoMXRRkwXbdKs | |
347 | -Zj+WjOCE1Db/IlnF+RFgqF8EffIa9iVCYQ/ESrg+iQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA0 | |
348 | -JhU8wI1NQ0kdvekhktdmnLfexbjQ5F1fdiLAJvmEOjr5jLX77GDx6M4EsMjdpwOPMPOY36TmpDHf | |
349 | -0xwLRtxyID+u7gU8pDM/CzmscHhzS5kr3zDCVLCoO1Wh/hYozUK9dG6A2ydEp85EXdQbkJgNHkKU | |
350 | -sQAsBNB0owIFImNjzYO1+8FtYmtpdf1dcEG59b98377BMnMiIYtYgXsVkXq642RIsH/7NiXaldDx | |
351 | -JBQX3RiAa0YjOVT1jmIJBB2UkKab5iXiQkWquJCtvgiPqQtCGJTPcjnhsUPgKM+351psE2tJs//j | |
352 | -GHyJizNdrDPXp/naOlXJWBD5qu9ats9LS98q | |
353 | ------END CERTIFICATE----- | |
354 | - | |
355 | 228 | Verisign Class 3 Public Primary Certification Authority - G3 |
356 | 229 | ============================================================ |
357 | 230 | -----BEGIN CERTIFICATE----- |
@@ -430,11 +303,11 @@ n9cd2cNgQ4xYDiKWL2KjLB+6rQXvqzJ4h6BUcxm1XAX5Uj5tLUUL9wqT6u0G+bI= | ||
430 | 303 | Entrust.net Premium 2048 Secure Server CA |
431 | 304 | ========================================= |
432 | 305 | -----BEGIN CERTIFICATE----- |
433 | -MIIEXDCCA0SgAwIBAgIEOGO5ZjANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChMLRW50cnVzdC5u | |
306 | +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChMLRW50cnVzdC5u | |
434 | 307 | ZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4gKGxp |
435 | 308 | bWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNV |
436 | 309 | BAMTKkVudHJ1c3QubmV0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQx |
437 | -NzUwNTFaFw0xOTEyMjQxODIwNTFaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3 | |
310 | +NzUwNTFaFw0yOTA3MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3 | |
438 | 311 | d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTEl |
439 | 312 | MCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u |
440 | 313 | ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A |
@@ -442,14 +315,13 @@ MIIBCgKCAQEArU1LqRKGsuqjIAcVFmQqK0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOL | ||
442 | 315 | Gp18EzoOH1u3Hs/lJBQesYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSr |
443 | 316 | hRSGlVuXMlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVTXTzW |
444 | 317 | nLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/HoZdenoVve8AjhUi |
445 | -VBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH4QIDAQABo3QwcjARBglghkgBhvhC | |
446 | -AQEEBAMCAAcwHwYDVR0jBBgwFoAUVeSB0RGAvtiJuQijMfmhJAkWuXAwHQYDVR0OBBYEFFXkgdER | |
447 | -gL7YibkIozH5oSQJFrlwMB0GCSqGSIb2fQdBAAQQMA4bCFY1LjA6NC4wAwIEkDANBgkqhkiG9w0B | |
448 | -AQUFAAOCAQEAWUesIYSKF8mciVMeuoCFGsY8Tj6xnLZ8xpJdGGQC49MGCBFhfGPjK50xA3B20qMo | |
449 | -oPS7mmNz7W3lKtvtFKkrxjYR0CvrB4ul2p5cGZ1WEvVUKcgF7bISKo30Axv/55IQh7A6tcOdBTcS | |
450 | -o8f0FbnVpDkWm1M6I5HxqIKiaohowXkCIryqptau37AUX7iH0N18f3v/rxzP5tsHrV7bhZ3QKw0z | |
451 | -2wTR5klAEyt2+z7pnIkPFc4YsIV4IU9rTw76NmfNB/L/CNDi3tm/Kq+4h4YhPATKt5Rof8886ZjX | |
452 | -OP/swNlQ8C5LWK5Gb9Auw2DaclVyvUxFnmG6v4SBkgPR0ml8xQ== | |
318 | +VBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH4QIDAQABo0IwQDAOBgNVHQ8BAf8E | |
319 | +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJ | |
320 | +KoZIhvcNAQEFBQADggEBADubj1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPy | |
321 | +T/4xmf3IDExoU8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf | |
322 | +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5bu/8j72gZyxKT | |
323 | +J1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+bYQLCIt+jerXmCHG8+c8eS9e | |
324 | +nNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/ErfF6adulZkMV8gzURZVE= | |
453 | 325 | -----END CERTIFICATE----- |
454 | 326 | |
455 | 327 | Baltimore CyberTrust Root |
@@ -507,26 +379,6 @@ lSE/9dR+WB5Hh1Q+WKG1tfgq73HnvMP2sUlG4tega+VWeponmHxGYhTnyfxuAxJ5gDgdSIKN/Bf+ | ||
507 | 379 | KpYrtWKmpj29f5JZzVoqgrI3eQ== |
508 | 380 | -----END CERTIFICATE----- |
509 | 381 | |
510 | -Equifax Secure eBusiness CA 2 | |
511 | -============================= | |
512 | ------BEGIN CERTIFICATE----- | |
513 | -MIIDIDCCAomgAwIBAgIEN3DPtTANBgkqhkiG9w0BAQUFADBOMQswCQYDVQQGEwJVUzEXMBUGA1UE | |
514 | -ChMORXF1aWZheCBTZWN1cmUxJjAkBgNVBAsTHUVxdWlmYXggU2VjdXJlIGVCdXNpbmVzcyBDQS0y | |
515 | -MB4XDTk5MDYyMzEyMTQ0NVoXDTE5MDYyMzEyMTQ0NVowTjELMAkGA1UEBhMCVVMxFzAVBgNVBAoT | |
516 | -DkVxdWlmYXggU2VjdXJlMSYwJAYDVQQLEx1FcXVpZmF4IFNlY3VyZSBlQnVzaW5lc3MgQ0EtMjCB | |
517 | -nzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5Dk5kx5SBhsoNviyoynF7Y6yEb3+6+e0dMKP/wXn | |
518 | -2Z0GvxLIPw7y1tEkshHe0XMJitSxLJgJDR5QRrKDpkWNYmi7hRsgcDKqQM2mll/EcTc/BPO3QSQ5 | |
519 | -BxoeLmFYoBIL5aXfxavqN3HMHMg3OrmXUqesxWoklE6ce8/AatbfIb0CAwEAAaOCAQkwggEFMHAG | |
520 | -A1UdHwRpMGcwZaBjoGGkXzBdMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORXF1aWZheCBTZWN1cmUx | |
521 | -JjAkBgNVBAsTHUVxdWlmYXggU2VjdXJlIGVCdXNpbmVzcyBDQS0yMQ0wCwYDVQQDEwRDUkwxMBoG | |
522 | -A1UdEAQTMBGBDzIwMTkwNjIzMTIxNDQ1WjALBgNVHQ8EBAMCAQYwHwYDVR0jBBgwFoAUUJ4L6q9e | |
523 | -uSBIplBqy/3YIHqngnYwHQYDVR0OBBYEFFCeC+qvXrkgSKZQasv92CB6p4J2MAwGA1UdEwQFMAMB | |
524 | -Af8wGgYJKoZIhvZ9B0EABA0wCxsFVjMuMGMDAgbAMA0GCSqGSIb3DQEBBQUAA4GBAAyGgq3oThr1 | |
525 | -jokn4jVYPSm0B482UJW/bsGe68SQsoWou7dC4A8HOd/7npCy0cE+U58DRLB+S/Rv5Hwf5+Kx5Lia | |
526 | -78O9zt4LMjTZ3ijtM2vE1Nc9ElirfQkty3D1E4qUoSek1nDFbZS1yX2doNLGCEnZZpum0/QL3MUm | |
527 | -V+GRMOrN | |
528 | ------END CERTIFICATE----- | |
529 | - | |
530 | 382 | AddTrust Low-Value Services Root |
531 | 383 | ================================ |
532 | 384 | -----BEGIN CERTIFICATE----- |
@@ -772,31 +624,6 @@ gn2Z9DH2canPLAEnpQW5qrJITirvn5NSUZU8UnOOVkwXQMAJKOSLakhT2+zNVVXxxvjpoixMptEm | ||
772 | 624 | X36vWkzaH6byHCx+rgIW0lbQL1dTR+iS |
773 | 625 | -----END CERTIFICATE----- |
774 | 626 | |
775 | -UTN-USER First-Network Applications | |
776 | -=================================== | |
777 | ------BEGIN CERTIFICATE----- | |
778 | -MIIEZDCCA0ygAwIBAgIQRL4Mi1AAJLQR0zYwS8AzdzANBgkqhkiG9w0BAQUFADCBozELMAkGA1UE | |
779 | -BhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhl | |
780 | -IFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xKzAp | |
781 | -BgNVBAMTIlVUTi1VU0VSRmlyc3QtTmV0d29yayBBcHBsaWNhdGlvbnMwHhcNOTkwNzA5MTg0ODM5 | |
782 | -WhcNMTkwNzA5MTg1NzQ5WjCBozELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5T | |
783 | -YWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExho | |
784 | -dHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xKzApBgNVBAMTIlVUTi1VU0VSRmlyc3QtTmV0d29yayBB | |
785 | -cHBsaWNhdGlvbnMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCz+5Gh5DZVhawGNFug | |
786 | -mliy+LUPBXeDrjKxdpJo7CNKyXY/45y2N3kDuatpjQclthln5LAbGHNhSuh+zdMvZOOmfAz6F4Cj | |
787 | -DUeJT1FxL+78P/m4FoCHiZMlIJpDgmkkdihZNaEdwH+DBmQWICzTSaSFtMBhf1EI+GgVkYDLpdXu | |
788 | -Ozr0hAReYFmnjDRy7rh4xdE7EkpvfmUnuaRVxblvQ6TFHSyZwFKkeEwVs0CYCGtDxgGwenv1axwi | |
789 | -P8vv/6jQOkt2FZ7S0cYu49tXGzKiuG/ohqY/cKvlcJKrRB5AUPuco2LkbG6gyN7igEL66S/ozjIE | |
790 | -j3yNtxyjNTwV3Z7DrpelAgMBAAGjgZEwgY4wCwYDVR0PBAQDAgHGMA8GA1UdEwEB/wQFMAMBAf8w | |
791 | -HQYDVR0OBBYEFPqGydvguul49Uuo1hXf8NPhahQ8ME8GA1UdHwRIMEYwRKBCoECGPmh0dHA6Ly9j | |
792 | -cmwudXNlcnRydXN0LmNvbS9VVE4tVVNFUkZpcnN0LU5ldHdvcmtBcHBsaWNhdGlvbnMuY3JsMA0G | |
793 | -CSqGSIb3DQEBBQUAA4IBAQCk8yXM0dSRgyLQzDKrm5ZONJFUICU0YV8qAhXhi6r/fWRRzwr/vH3Y | |
794 | -IWp4yy9Rb/hCHTO967V7lMPDqaAt39EpHx3+jz+7qEUqf9FuVSTiuwL7MT++6LzsQCv4AdRWOOTK | |
795 | -RIK1YSAhZ2X28AvnNPilwpyjXEAfhZOVBt5P1CeptqX8Fs1zMT+4ZSfP1FMa8Kxun08FDAOBp4Qp | |
796 | -xFq9ZFdyrTvPNximmMatBrTcCKME1SmklpoSZ0qMYEWd8SOasACcaLWYUNPvji6SZbFIPiG+FTAq | |
797 | -DbUMo2s/rn9X9R+WfN9v3YIwLGUbQErNaLly7HF27FSOH4UMAWr6pjisH8SE | |
798 | ------END CERTIFICATE----- | |
799 | - | |
800 | 627 | America Online Root Certification Authority 1 |
801 | 628 | ============================================= |
802 | 629 | -----BEGIN CERTIFICATE----- |
@@ -1084,26 +911,6 @@ s58+OmJYxUmtYg5xpTKqL8aJdkNAExNnPaJUJRDL8Try2frbSVa7pv6nQTXD4IhhyYjH3zYQIphZ | ||
1084 | 911 | FL39vmwLAw== |
1085 | 912 | -----END CERTIFICATE----- |
1086 | 913 | |
1087 | -Sonera Class 1 Root CA | |
1088 | -====================== | |
1089 | ------BEGIN CERTIFICATE----- | |
1090 | -MIIDIDCCAgigAwIBAgIBJDANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJGSTEPMA0GA1UEChMG | |
1091 | -U29uZXJhMRkwFwYDVQQDExBTb25lcmEgQ2xhc3MxIENBMB4XDTAxMDQwNjEwNDkxM1oXDTIxMDQw | |
1092 | -NjEwNDkxM1owOTELMAkGA1UEBhMCRkkxDzANBgNVBAoTBlNvbmVyYTEZMBcGA1UEAxMQU29uZXJh | |
1093 | -IENsYXNzMSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALWJHytPZwp5/8Ue+H88 | |
1094 | -7dF+2rDNbS82rDTG29lkFwhjMDMiikzujrsPDUJVyZ0upe/3p4zDq7mXy47vPxVnqIJyY1MPQYx9 | |
1095 | -EJUkoVqlBvqSV536pQHydekfvFYmUk54GWVYVQNYwBSujHxVX3BbdyMGNpfzJLWaRpXk3w0LBUXl | |
1096 | -0fIdgrvGE+D+qnr9aTCU89JFhfzyMlsy3uhsXR/LpCJ0sICOXZT3BgBLqdReLjVQCfOAl/QMF645 | |
1097 | -2F/NM8EcyonCIvdFEu1eEpOdY6uCLrnrQkFEy0oaAIINnvmLVz5MxxftLItyM19yejhW1ebZrgUa | |
1098 | -HXVFsculJRwSVzb9IjcCAwEAAaMzMDEwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQIR+IMi/ZT | |
1099 | -iFIwCwYDVR0PBAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQCLGrLJXWG04bkruVPRsoWdd44W7hE9 | |
1100 | -28Jj2VuXZfsSZ9gqXLar5V7DtxYvyOirHYr9qxp81V9jz9yw3Xe5qObSIjiHBxTZ/75Wtf0HDjxV | |
1101 | -yhbMp6Z3N/vbXB9OWQaHowND9Rart4S9Tu+fMTfwRvFAttEMpWT4Y14h21VOTzF2nBBhjrZTOqMR | |
1102 | -vq9tfB69ri3iDGnHhVNoomG6xT60eVR4ngrHAr5i0RGCS2UvkVrCqIexVmiUefkl98HVrhq4uz2P | |
1103 | -qYo4Ffdz0Fpg0YCw8NzVUM1O7pJIae2yIx4wzMiUyLb1O4Z/P6Yun/Y+LLWSlj7fLJOK/4GMDw9Z | |
1104 | -IRlXvVWa | |
1105 | ------END CERTIFICATE----- | |
1106 | - | |
1107 | 914 | Sonera Class 2 Root CA |
1108 | 915 | ====================== |
1109 | 916 | -----BEGIN CERTIFICATE----- |
@@ -1170,34 +977,6 @@ O0ESm70NRyN/PErQr8Cv9u8btRXE64PECV90i9kR+8JWsTz4cMo0jUNAE4z9mQNUecYu6oah9jrU | ||
1170 | 977 | Cbz0vGbMPVjQV0kK7iXiQe4T+Zs4NNEA9X7nlB38aQNiuJkFBT1reBK9sG9l |
1171 | 978 | -----END CERTIFICATE----- |
1172 | 979 | |
1173 | -TDC OCES Root CA | |
1174 | -================ | |
1175 | ------BEGIN CERTIFICATE----- | |
1176 | -MIIFGTCCBAGgAwIBAgIEPki9xDANBgkqhkiG9w0BAQUFADAxMQswCQYDVQQGEwJESzEMMAoGA1UE | |
1177 | -ChMDVERDMRQwEgYDVQQDEwtUREMgT0NFUyBDQTAeFw0wMzAyMTEwODM5MzBaFw0zNzAyMTEwOTA5 | |
1178 | -MzBaMDExCzAJBgNVBAYTAkRLMQwwCgYDVQQKEwNUREMxFDASBgNVBAMTC1REQyBPQ0VTIENBMIIB | |
1179 | -IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArGL2YSCyz8DGhdfjeebM7fI5kqSXLmSjhFuH | |
1180 | -nEz9pPPEXyG9VhDr2y5h7JNp46PMvZnDBfwGuMo2HP6QjklMxFaaL1a8z3sM8W9Hpg1DTeLpHTk0 | |
1181 | -zY0s2RKY+ePhwUp8hjjEqcRhiNJerxomTdXkoCJHhNlktxmW/OwZ5LKXJk5KTMuPJItUGBxIYXvV | |
1182 | -iGjaXbXqzRowwYCDdlCqT9HU3Tjw7xb04QxQBr/q+3pJoSgrHPb8FTKjdGqPqcNiKXEx5TukYBde | |
1183 | -dObaE+3pHx8b0bJoc8YQNHVGEBDjkAB2QMuLt0MJIf+rTpPGWOmlgtt3xDqZsXKVSQTwtyv6e1mO | |
1184 | -3QIDAQABo4ICNzCCAjMwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwgewGA1UdIASB | |
1185 | -5DCB4TCB3gYIKoFQgSkBAQEwgdEwLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuY2VydGlmaWthdC5k | |
1186 | -ay9yZXBvc2l0b3J5MIGdBggrBgEFBQcCAjCBkDAKFgNUREMwAwIBARqBgUNlcnRpZmlrYXRlciBm | |
1187 | -cmEgZGVubmUgQ0EgdWRzdGVkZXMgdW5kZXIgT0lEIDEuMi4yMDguMTY5LjEuMS4xLiBDZXJ0aWZp | |
1188 | -Y2F0ZXMgZnJvbSB0aGlzIENBIGFyZSBpc3N1ZWQgdW5kZXIgT0lEIDEuMi4yMDguMTY5LjEuMS4x | |
1189 | -LjARBglghkgBhvhCAQEEBAMCAAcwgYEGA1UdHwR6MHgwSKBGoESkQjBAMQswCQYDVQQGEwJESzEM | |
1190 | -MAoGA1UEChMDVERDMRQwEgYDVQQDEwtUREMgT0NFUyBDQTENMAsGA1UEAxMEQ1JMMTAsoCqgKIYm | |
1191 | -aHR0cDovL2NybC5vY2VzLmNlcnRpZmlrYXQuZGsvb2Nlcy5jcmwwKwYDVR0QBCQwIoAPMjAwMzAy | |
1192 | -MTEwODM5MzBagQ8yMDM3MDIxMTA5MDkzMFowHwYDVR0jBBgwFoAUYLWF7FZkfhIZJ2cdUBVLc647 | |
1193 | -+RIwHQYDVR0OBBYEFGC1hexWZH4SGSdnHVAVS3OuO/kSMB0GCSqGSIb2fQdBAAQQMA4bCFY2LjA6 | |
1194 | -NC4wAwIEkDANBgkqhkiG9w0BAQUFAAOCAQEACromJkbTc6gJ82sLMJn9iuFXehHTuJTXCRBuo7E4 | |
1195 | -A9G28kNBKWKnctj7fAXmMXAnVBhOinxO5dHKjHiIzxvTkIvmI/gLDjNDfZziChmPyQE+dF10yYsc | |
1196 | -A+UYyAFMP8uXBV2YcaaYb7Z8vTd/vuGTJW1v8AqtFxjhA7wHKcitJuj4YfD9IQl+mo6paH1IYnK9 | |
1197 | -AOoBmbgGglGBTvH1tJFUuSN6AJqfXY3gPGS5GhKSKseCRHI53OI8xthV9RVOyAUO28bQYqbsFbS1 | |
1198 | -AoLbrIyigfCbmTH1ICCoiGEKB5+U/NDXG8wuF/MEJ3Zn61SD/aSQfgY9BKNDLdr8C2LqL19iUw== | |
1199 | ------END CERTIFICATE----- | |
1200 | - | |
1201 | 980 | UTN DATACorp SGC Root CA |
1202 | 981 | ======================== |
1203 | 982 | -----BEGIN CERTIFICATE----- |
@@ -1223,32 +1002,6 @@ EZ4du5A/EkdOjtd+D2JzHVImOBwYSf0wdJrE5SIv2MCN7ZF6TACPcn9d2t0bi0Vr591pl6jFVkwP | ||
1223 | 1002 | DPafepE39peC4N1xaf92P2BNPM/3mfnGV/TJVTl4uix5yaaIK/QI |
1224 | 1003 | -----END CERTIFICATE----- |
1225 | 1004 | |
1226 | -UTN USERFirst Email Root CA | |
1227 | -=========================== | |
1228 | ------BEGIN CERTIFICATE----- | |
1229 | -MIIEojCCA4qgAwIBAgIQRL4Mi1AAJLQR0zYlJWfJiTANBgkqhkiG9w0BAQUFADCBrjELMAkGA1UE | |
1230 | -BhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhl | |
1231 | -IFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0 | |
1232 | -BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBFbWFpbDAeFw05 | |
1233 | -OTA3MDkxNzI4NTBaFw0xOTA3MDkxNzM2NThaMIGuMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQx | |
1234 | -FzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx | |
1235 | -ITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTE2MDQGA1UEAxMtVVROLVVTRVJGaXJz | |
1236 | -dC1DbGllbnQgQXV0aGVudGljYXRpb24gYW5kIEVtYWlsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A | |
1237 | -MIIBCgKCAQEAsjmFpPJ9q0E7YkY3rs3BYHW8OWX5ShpHornMSMxqmNVNNRm5pELlzkniii8efNIx | |
1238 | -B8dOtINknS4p1aJkxIW9hVE1eaROaJB7HHqkkqgX8pgV8pPMyaQylbsMTzC9mKALi+VuG6JG+ni8 | |
1239 | -om+rWV6lL8/K2m2qL+usobNqqrcuZzWLeeEeaYji5kbNoKXqvgvOdjp6Dpvq/NonWz1zHyLmSGHG | |
1240 | -TPNpsaguG7bUMSAsvIKKjqQOpdeJQ/wWWq8dcdcRWdq6hw2v+vPhwvCkxWeM1tZUOt4KpLoDd7Nl | |
1241 | -yP0e03RiqhjKaJMeoYV+9Udly/hNVyh00jT/MLbu9mIwFIws6wIDAQABo4G5MIG2MAsGA1UdDwQE | |
1242 | -AwIBxjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSJgmd9xJ0mcABLtFBIfN49rgRufTBYBgNV | |
1243 | -HR8EUTBPME2gS6BJhkdodHRwOi8vY3JsLnVzZXJ0cnVzdC5jb20vVVROLVVTRVJGaXJzdC1DbGll | |
1244 | -bnRBdXRoZW50aWNhdGlvbmFuZEVtYWlsLmNybDAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH | |
1245 | -AwQwDQYJKoZIhvcNAQEFBQADggEBALFtYV2mGn98q0rkMPxTbyUkxsrt4jFcKw7u7mFVbwQ+zzne | |
1246 | -xRtJlOTrIEy05p5QLnLZjfWqo7NK2lYcYJeA3IKirUq9iiv/Cwm0xtcgBEXkzYABurorbs6q15L+ | |
1247 | -5K/r9CYdFip/bDCVNy8zEqx/3cfREYxRmLLQo5HQrfafnoOTHh1CuEava2bwm3/q4wMC5QJRwarV | |
1248 | -NZ1yQAOJujEdxRBoUp7fooXFXAimeOZTT7Hot9MUnpOmw2TjrH5xzbyf6QMbzPvprDHBr3wVdAKZ | |
1249 | -w7JHpsIyYdfHb0gkUSeh1YdV8nuPmD0Wnu51tvjQjvLzxq4oW6fw8zYX/MMF08oDSlQ= | |
1250 | ------END CERTIFICATE----- | |
1251 | - | |
1252 | 1005 | UTN USERFirst Hardware Root CA |
1253 | 1006 | ============================== |
1254 | 1007 | -----BEGIN CERTIFICATE----- |
@@ -1275,31 +1028,6 @@ iCrVWFCVH/A7HFe7fRQ5YiuayZSSKqMiDP+JJn1fIytH1xUdqWqeUQ0qUZ6B+dQ7XnASfxAynB67 | ||
1275 | 1028 | nfhmqA== |
1276 | 1029 | -----END CERTIFICATE----- |
1277 | 1030 | |
1278 | -UTN USERFirst Object Root CA | |
1279 | -============================ | |
1280 | ------BEGIN CERTIFICATE----- | |
1281 | -MIIEZjCCA06gAwIBAgIQRL4Mi1AAJLQR0zYt4LNfGzANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UE | |
1282 | -BhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhl | |
1283 | -IFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAb | |
1284 | -BgNVBAMTFFVUTi1VU0VSRmlyc3QtT2JqZWN0MB4XDTk5MDcwOTE4MzEyMFoXDTE5MDcwOTE4NDAz | |
1285 | -NlowgZUxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkx | |
1286 | -HjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2Vy | |
1287 | -dHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0LU9iamVjdDCCASIwDQYJKoZIhvcNAQEB | |
1288 | -BQADggEPADCCAQoCggEBAM6qgT+jo2F4qjEAVZURnicPHxzfOpuCaDDASmEd8S8O+r5596Uj71VR | |
1289 | -loTN2+O5bj4x2AogZ8f02b+U60cEPgLOKqJdhwQJ9jCdGIqXsqoc/EHSoTbL+z2RuufZcDX65OeQ | |
1290 | -w5ujm9M89RKZd7G3CeBo5hy485RjiGpq/gt2yb70IuRnuasaXnfBhQfdDWy/7gbHd2pBnqcP1/vu | |
1291 | -lBe3/IW+pKvEHDHd17bR5PDv3xaPslKT16HUiaEHLr/hARJCHhrh2JU022R5KP+6LhHC5ehbkkj7 | |
1292 | -RwvCbNqtMoNB86XlQXD9ZZBt+vpRxPm9lisZBCzTbafc8H9vg2XiaquHhnUCAwEAAaOBrzCBrDAL | |
1293 | -BgNVHQ8EBAMCAcYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU2u1kdBScFDyr3ZmpvVsoTYs8 | |
1294 | -ydgwQgYDVR0fBDswOTA3oDWgM4YxaHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmly | |
1295 | -c3QtT2JqZWN0LmNybDApBgNVHSUEIjAgBggrBgEFBQcDAwYIKwYBBQUHAwgGCisGAQQBgjcKAwQw | |
1296 | -DQYJKoZIhvcNAQEFBQADggEBAAgfUrE3RHjb/c652pWWmKpVZIC1WkDdIaXFwfNfLEzIR1pp6ujw | |
1297 | -NTX00CXzyKakh0q9G7FzCL3Uw8q2NbtZhncxzaeAFK4T7/yxSPlrJSUtUbYsbUXBmMiKVl0+7kNO | |
1298 | -PmsnjtA6S4ULX9Ptaqd1y9Fahy85dRNacrACgZ++8A+EVCBibGnU4U3GDZlDAQ0Slox4nb9QorFE | |
1299 | -qmrPF3rPbw/U+CRVX/A0FklmPlBGyWNxODFiuGK581OtbLUrohKqGU8J2l7nk8aOFAj+8DCAGKCG | |
1300 | -hU3IfdeLA/5u1fedFqySLKAj5ZyRUh+U3xeUc8OzwcFxBSAAeL0TUh2oPs0AH8g= | |
1301 | ------END CERTIFICATE----- | |
1302 | - | |
1303 | 1031 | Camerfirma Chambers of Commerce Root |
1304 | 1032 | ==================================== |
1305 | 1033 | -----BEGIN CERTIFICATE----- |
@@ -1354,42 +1082,6 @@ IBHNfTIzSJRUTN3cecQwn+uOuFW114hcxWokPbLTBQNRxgfvzBRydD1ucs4YKIxKoHflCStFREes | ||
1354 | 1082 | t2d/AYoFWpO+ocH/+OcOZ6RHSXZddZAa9SaP8A== |
1355 | 1083 | -----END CERTIFICATE----- |
1356 | 1084 | |
1357 | -NetLock Qualified (Class QA) Root | |
1358 | -================================= | |
1359 | ------BEGIN CERTIFICATE----- | |
1360 | -MIIG0TCCBbmgAwIBAgIBezANBgkqhkiG9w0BAQUFADCByTELMAkGA1UEBhMCSFUxETAPBgNVBAcT | |
1361 | -CEJ1ZGFwZXN0MScwJQYDVQQKEx5OZXRMb2NrIEhhbG96YXRiaXp0b25zYWdpIEtmdC4xGjAYBgNV | |
1362 | -BAsTEVRhbnVzaXR2YW55a2lhZG9rMUIwQAYDVQQDEzlOZXRMb2NrIE1pbm9zaXRldHQgS296amVn | |
1363 | -eXpvaSAoQ2xhc3MgUUEpIFRhbnVzaXR2YW55a2lhZG8xHjAcBgkqhkiG9w0BCQEWD2luZm9AbmV0 | |
1364 | -bG9jay5odTAeFw0wMzAzMzAwMTQ3MTFaFw0yMjEyMTUwMTQ3MTFaMIHJMQswCQYDVQQGEwJIVTER | |
1365 | -MA8GA1UEBxMIQnVkYXBlc3QxJzAlBgNVBAoTHk5ldExvY2sgSGFsb3phdGJpenRvbnNhZ2kgS2Z0 | |
1366 | -LjEaMBgGA1UECxMRVGFudXNpdHZhbnlraWFkb2sxQjBABgNVBAMTOU5ldExvY2sgTWlub3NpdGV0 | |
1367 | -dCBLb3pqZWd5em9pIChDbGFzcyBRQSkgVGFudXNpdHZhbnlraWFkbzEeMBwGCSqGSIb3DQEJARYP | |
1368 | -aW5mb0BuZXRsb2NrLmh1MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx1Ilstg91IRV | |
1369 | -CacbvWy5FPSKAtt2/GoqeKvld/Bu4IwjZ9ulZJm53QE+b+8tmjwi8F3JV6BVQX/yQ15YglMxZc4e | |
1370 | -8ia6AFQer7C8HORSjKAyr7c3sVNnaHRnUPYtLmTeriZ539+Zhqurf4XsoPuAzPS4DB6TRWO53Lhb | |
1371 | -m+1bOdRfYrCnjnxmOCyqsQhjF2d9zL2z8cM/z1A57dEZgxXbhxInlrfa6uWdvLrqOU+L73Sa58XQ | |
1372 | -0uqGURzk/mQIKAR5BevKxXEOC++r6uwSEaEYBTJp0QwsGj0lmT+1fMptsK6ZmfoIYOcZwvK9UdPM | |
1373 | -0wKswREMgM6r3JSda6M5UzrWhQIDAMV9o4ICwDCCArwwEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNV | |
1374 | -HQ8BAf8EBAMCAQYwggJ1BglghkgBhvhCAQ0EggJmFoICYkZJR1lFTEVNISBFemVuIHRhbnVzaXR2 | |
1375 | -YW55IGEgTmV0TG9jayBLZnQuIE1pbm9zaXRldHQgU3pvbGdhbHRhdGFzaSBTemFiYWx5emF0YWJh | |
1376 | -biBsZWlydCBlbGphcmFzb2sgYWxhcGphbiBrZXN6dWx0LiBBIG1pbm9zaXRldHQgZWxla3Ryb25p | |
1377 | -a3VzIGFsYWlyYXMgam9naGF0YXMgZXJ2ZW55ZXN1bGVzZW5laywgdmFsYW1pbnQgZWxmb2dhZGFz | |
1378 | -YW5hayBmZWx0ZXRlbGUgYSBNaW5vc2l0ZXR0IFN6b2xnYWx0YXRhc2kgU3phYmFseXphdGJhbiwg | |
1379 | -YXogQWx0YWxhbm9zIFN6ZXJ6b2Rlc2kgRmVsdGV0ZWxla2JlbiBlbG9pcnQgZWxsZW5vcnplc2kg | |
1380 | -ZWxqYXJhcyBtZWd0ZXRlbGUuIEEgZG9rdW1lbnR1bW9rIG1lZ3RhbGFsaGF0b2sgYSBodHRwczov | |
1381 | -L3d3dy5uZXRsb2NrLmh1L2RvY3MvIGNpbWVuIHZhZ3kga2VyaGV0b2sgYXogaW5mb0BuZXRsb2Nr | |
1382 | -Lm5ldCBlLW1haWwgY2ltZW4uIFdBUk5JTkchIFRoZSBpc3N1YW5jZSBhbmQgdGhlIHVzZSBvZiB0 | |
1383 | -aGlzIGNlcnRpZmljYXRlIGFyZSBzdWJqZWN0IHRvIHRoZSBOZXRMb2NrIFF1YWxpZmllZCBDUFMg | |
1384 | -YXZhaWxhYmxlIGF0IGh0dHBzOi8vd3d3Lm5ldGxvY2suaHUvZG9jcy8gb3IgYnkgZS1tYWlsIGF0 | |
1385 | -IGluZm9AbmV0bG9jay5uZXQwHQYDVR0OBBYEFAlqYhaSsFq7VQ7LdTI6MuWyIckoMA0GCSqGSIb3 | |
1386 | -DQEBBQUAA4IBAQCRalCc23iBmz+LQuM7/KbD7kPgz/PigDVJRXYC4uMvBcXxKufAQTPGtpvQMznN | |
1387 | -wNuhrWw3AkxYQTvyl5LGSKjN5Yo5iWH5Upfpvfb5lHTocQ68d4bDBsxafEp+NFAwLvt/MpqNPfMg | |
1388 | -W/hqyobzMUwsWYACff44yTB1HLdV47yfuqhthCgFdbOLDcCRVCHnpgu0mfVRQdzNo0ci2ccBgcTc | |
1389 | -R08m6h/t280NmPSjnLRzMkqWmf68f8glWPhY83ZmiVSkpj7EUFy6iRiCdUgh0k8T6GB+B3bbELVR | |
1390 | -5qq5aKrN9p2QdRLqOBrKROi3macqaJVmlaut74nLYKkGEsaUR+ko | |
1391 | ------END CERTIFICATE----- | |
1392 | - | |
1393 | 1085 | NetLock Notary (Class A) Root |
1394 | 1086 | ============================= |
1395 | 1087 | -----BEGIN CERTIFICATE----- |
@@ -1886,37 +1578,6 @@ hGIAF728JRhX8tepb1mIvDS3LoV4nZbcFMMsilKbloxSZj2GFotHuFEJjOp9zYhys2AzsfAKRO8P | ||
1886 | 1578 | UrbnBEI= |
1887 | 1579 | -----END CERTIFICATE----- |
1888 | 1580 | |
1889 | -SwissSign Platinum CA - G2 | |
1890 | -========================== | |
1891 | ------BEGIN CERTIFICATE----- | |
1892 | -MIIFwTCCA6mgAwIBAgIITrIAZwwDXU8wDQYJKoZIhvcNAQEFBQAwSTELMAkGA1UEBhMCQ0gxFTAT | |
1893 | -BgNVBAoTDFN3aXNzU2lnbiBBRzEjMCEGA1UEAxMaU3dpc3NTaWduIFBsYXRpbnVtIENBIC0gRzIw | |
1894 | -HhcNMDYxMDI1MDgzNjAwWhcNMzYxMDI1MDgzNjAwWjBJMQswCQYDVQQGEwJDSDEVMBMGA1UEChMM | |
1895 | -U3dpc3NTaWduIEFHMSMwIQYDVQQDExpTd2lzc1NpZ24gUGxhdGludW0gQ0EgLSBHMjCCAiIwDQYJ | |
1896 | -KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMrfogLi2vj8Bxax3mCq3pZcZB/HL37PZ/pEQtZ2Y5Wu | |
1897 | -669yIIpFR4ZieIbWIDkm9K6j/SPnpZy1IiEZtzeTIsBQnIJ71NUERFzLtMKfkr4k2HtnIuJpX+UF | |
1898 | -eNSH2XFwMyVTtIc7KZAoNppVRDBopIOXfw0enHb/FZ1glwCNioUD7IC+6ixuEFGSzH7VozPY1kne | |
1899 | -WCqv9hbrS3uQMpe5up1Y8fhXSQQeol0GcN1x2/ndi5objM89o03Oy3z2u5yg+gnOI2Ky6Q0f4nIo | |
1900 | -j5+saCB9bzuohTEJfwvH6GXp43gOCWcwizSC+13gzJ2BbWLuCB4ELE6b7P6pT1/9aXjvCR+htL/6 | |
1901 | -8++QHkwFix7qepF6w9fl+zC8bBsQWJj3Gl/QKTIDE0ZNYWqFTFJ0LwYfexHihJfGmfNtf9dng34T | |
1902 | -aNhxKFrYzt3oEBSa/m0jh26OWnA81Y0JAKeqvLAxN23IhBQeW71FYyBrS3SMvds6DsHPWhaPpZjy | |
1903 | -domyExI7C3d3rLvlPClKknLKYRorXkzig3R3+jVIeoVNjZpTxN94ypeRSCtFKwH3HBqi7Ri6Cr2D | |
1904 | -+m+8jVeTO9TUps4e8aCxzqv9KyiaTxvXw3LbpMS/XUz13XuWae5ogObnmLo2t/5u7Su9IPhlGdpV | |
1905 | -CX4l3P5hYnL5fhgC72O00Puv5TtjjGePAgMBAAGjgawwgakwDgYDVR0PAQH/BAQDAgEGMA8GA1Ud | |
1906 | -EwEB/wQFMAMBAf8wHQYDVR0OBBYEFFCvzAeHFUdvOMW0ZdHelarp35zMMB8GA1UdIwQYMBaAFFCv | |
1907 | -zAeHFUdvOMW0ZdHelarp35zMMEYGA1UdIAQ/MD0wOwYJYIV0AVkBAQEBMC4wLAYIKwYBBQUHAgEW | |
1908 | -IGh0dHA6Ly9yZXBvc2l0b3J5LnN3aXNzc2lnbi5jb20vMA0GCSqGSIb3DQEBBQUAA4ICAQAIhab1 | |
1909 | -Fgz8RBrBY+D5VUYI/HAcQiiWjrfFwUF1TglxeeVtlspLpYhg0DB0uMoI3LQwnkAHFmtllXcBrqS3 | |
1910 | -NQuB2nEVqXQXOHtYyvkv+8Bldo1bAbl93oI9ZLi+FHSjClTTLJUYFzX1UWs/j6KWYTl4a0vlpqD4 | |
1911 | -U99REJNi54Av4tHgvI42Rncz7Lj7jposiU0xEQ8mngS7twSNC/K5/FqdOxa3L8iYq/6KUFkuozv8 | |
1912 | -KV2LwUvJ4ooTHbG/u0IdUt1O2BReEMYxB+9xJ/cbOQncguqLs5WGXv312l0xpuAxtpTmREl0xRbl | |
1913 | -9x8DYSjFyMsSoEJL+WuICI20MhjzdZ/EfwBPBZWcoxcCw7NTm6ogOSkrZvqdr16zktK1puEa+S1B | |
1914 | -aYEUtLS17Yk9zvupnTVCRLEcFHOBzyoBNZox1S2PbYTfgE1X4z/FhHXaicYwu+uPyyIIoK6q8QNs | |
1915 | -OktNCaUOcsZWayFCTiMlFGiudgp8DAdwZPmaL/YFOSbGDI8Zf0NebvRbFS/bYV3mZy8/CJT5YLSY | |
1916 | -Mdp08YSTcU1f+2BY0fvEwW2JorsgH51xkcsymxM9Pn2SUjWskpSi0xjCfMfqr3YFFt1nJ8J+HAci | |
1917 | -IfNAChs0B0QTwoRqjt8ZWr9/6x3iGjjRXK9HkmuAtTClyY3YqzGBH9/CZjfTk6mFhnll0g== | |
1918 | ------END CERTIFICATE----- | |
1919 | - | |
1920 | 1581 | SwissSign Gold CA - G2 |
1921 | 1582 | ====================== |
1922 | 1583 | -----BEGIN CERTIFICATE----- |
@@ -2254,32 +1915,6 @@ hNVQA7bihKOmNqoROgHhGEvWRGizPflTdISzRpFGlgC3gCy24eMQ4tui5yiPAZZiFj4A4xylNoEY | ||
2254 | 1915 | okxSdsARo27mHbrjWr42U8U+dY+GaSlYU7Wcu2+fXMUY7N0v4ZjJ/L7fCg0= |
2255 | 1916 | -----END CERTIFICATE----- |
2256 | 1917 | |
2257 | -S-TRUST Authentication and Encryption Root CA 2005 PN | |
2258 | -===================================================== | |
2259 | ------BEGIN CERTIFICATE----- | |
2260 | -MIIEezCCA2OgAwIBAgIQNxkY5lNUfBq1uMtZWts1tzANBgkqhkiG9w0BAQUFADCBrjELMAkGA1UE | |
2261 | -BhMCREUxIDAeBgNVBAgTF0JhZGVuLVd1ZXJ0dGVtYmVyZyAoQlcpMRIwEAYDVQQHEwlTdHV0dGdh | |
2262 | -cnQxKTAnBgNVBAoTIERldXRzY2hlciBTcGFya2Fzc2VuIFZlcmxhZyBHbWJIMT4wPAYDVQQDEzVT | |
2263 | -LVRSVVNUIEF1dGhlbnRpY2F0aW9uIGFuZCBFbmNyeXB0aW9uIFJvb3QgQ0EgMjAwNTpQTjAeFw0w | |
2264 | -NTA2MjIwMDAwMDBaFw0zMDA2MjEyMzU5NTlaMIGuMQswCQYDVQQGEwJERTEgMB4GA1UECBMXQmFk | |
2265 | -ZW4tV3VlcnR0ZW1iZXJnIChCVykxEjAQBgNVBAcTCVN0dXR0Z2FydDEpMCcGA1UEChMgRGV1dHNj | |
2266 | -aGVyIFNwYXJrYXNzZW4gVmVybGFnIEdtYkgxPjA8BgNVBAMTNVMtVFJVU1QgQXV0aGVudGljYXRp | |
2267 | -b24gYW5kIEVuY3J5cHRpb24gUm9vdCBDQSAyMDA1OlBOMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A | |
2268 | -MIIBCgKCAQEA2bVKwdMz6tNGs9HiTNL1toPQb9UY6ZOvJ44TzbUlNlA0EmQpoVXhOmCTnijJ4/Ob | |
2269 | -4QSwI7+Vio5bG0F/WsPoTUzVJBY+h0jUJ67m91MduwwA7z5hca2/OnpYH5Q9XIHV1W/fuJvS9eXL | |
2270 | -g3KSwlOyggLrra1fFi2SU3bxibYs9cEv4KdKb6AwajLrmnQDaHgTncovmwsdvs91DSaXm8f1Xgqf | |
2271 | -eN+zvOyauu9VjxuapgdjKRdZYgkqeQd3peDRF2npW932kKvimAoA0SVtnteFhy+S8dF2g08LOlk3 | |
2272 | -KC8zpxdQ1iALCvQm+Z845y2kuJuJja2tyWp9iRe79n+Ag3rm7QIDAQABo4GSMIGPMBIGA1UdEwEB | |
2273 | -/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgEGMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFTVFJv | |
2274 | -bmxpbmUxLTIwNDgtNTAdBgNVHQ4EFgQUD8oeXHngovMpttKFswtKtWXsa1IwHwYDVR0jBBgwFoAU | |
2275 | -D8oeXHngovMpttKFswtKtWXsa1IwDQYJKoZIhvcNAQEFBQADggEBAK8B8O0ZPCjoTVy7pWMciDMD | |
2276 | -pwCHpB8gq9Yc4wYfl35UvbfRssnV2oDsF9eK9XvCAPbpEW+EoFolMeKJ+aQAPzFoLtU96G7m1R08 | |
2277 | -P7K9n3frndOMusDXtk3sU5wPBG7qNWdX4wple5A64U8+wwCSersFiXOMy6ZNwPv2AtawB6MDwidA | |
2278 | -nwzkhYItr5pCHdDHjfhA7p0GVxzZotiAFP7hYy0yh9WUUpY6RsZxlj33mA6ykaqP2vROJAA5Veit | |
2279 | -F7nTNCtKqUDMFypVZUF0Qn71wK/Ik63yGFs9iQzbRzkk+OBM8h+wPQrKBU6JIRrjKpms/H+h8Q8b | |
2280 | -Hz2eBIPdltkdOpQ= | |
2281 | ------END CERTIFICATE----- | |
2282 | - | |
2283 | 1918 | Microsec e-Szigno Root CA |
2284 | 1919 | ========================= |
2285 | 1920 | -----BEGIN CERTIFICATE----- |
@@ -2475,28 +2110,6 @@ dyd1Lx+4ivn+xbrYNuSD7Odlt79jWvNGr4GUN9RBjNYj1h7P9WgbRGOiWrqnNVmh5XAFmw4jV5mU | ||
2475 | 2110 | Cm26OWMohpLzGITY+9HPBVZkVw== |
2476 | 2111 | -----END CERTIFICATE----- |
2477 | 2112 | |
2478 | -ComSign CA | |
2479 | -========== | |
2480 | ------BEGIN CERTIFICATE----- | |
2481 | -MIIDkzCCAnugAwIBAgIQFBOWgxRVjOp7Y+X8NId3RDANBgkqhkiG9w0BAQUFADA0MRMwEQYDVQQD | |
2482 | -EwpDb21TaWduIENBMRAwDgYDVQQKEwdDb21TaWduMQswCQYDVQQGEwJJTDAeFw0wNDAzMjQxMTMy | |
2483 | -MThaFw0yOTAzMTkxNTAyMThaMDQxEzARBgNVBAMTCkNvbVNpZ24gQ0ExEDAOBgNVBAoTB0NvbVNp | |
2484 | -Z24xCzAJBgNVBAYTAklMMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8ORUaSvTx49q | |
2485 | -ROR+WCf4C9DklBKK8Rs4OC8fMZwG1Cyn3gsqrhqg455qv588x26i+YtkbDqthVVRVKU4VbirgwTy | |
2486 | -P2Q298CNQ0NqZtH3FyrV7zb6MBBC11PN+fozc0yz6YQgitZBJzXkOPqUm7h65HkfM/sb2CEJKHxN | |
2487 | -GGleZIp6GZPKfuzzcuc3B1hZKKxC+cX/zT/npfo4sdAMx9lSGlPWgcxCejVb7Us6eva1jsz/D3zk | |
2488 | -YDaHL63woSV9/9JLEYhwVKZBqGdTUkJe5DSe5L6j7KpiXd3DTKaCQeQzC6zJMw9kglcq/QytNuEM | |
2489 | -rkvF7zuZ2SOzW120V+x0cAwqTwIDAQABo4GgMIGdMAwGA1UdEwQFMAMBAf8wPQYDVR0fBDYwNDAy | |
2490 | -oDCgLoYsaHR0cDovL2ZlZGlyLmNvbXNpZ24uY28uaWwvY3JsL0NvbVNpZ25DQS5jcmwwDgYDVR0P | |
2491 | -AQH/BAQDAgGGMB8GA1UdIwQYMBaAFEsBmz5WGmU2dst7l6qSBe4y5ygxMB0GA1UdDgQWBBRLAZs+ | |
2492 | -VhplNnbLe5eqkgXuMucoMTANBgkqhkiG9w0BAQUFAAOCAQEA0Nmlfv4pYEWdfoPPbrxHbvUanlR2 | |
2493 | -QnG0PFg/LUAlQvaBnPGJEMgOqnhPOAlXsDzACPw1jvFIUY0McXS6hMTXcpuEfDhOZAYnKuGntewI | |
2494 | -mbQKDdSFc8gS4TXt8QUxHXOZDOuWyt3T5oWq8Ir7dcHyCTxlZWTzTNity4hp8+SDtwy9F1qWF8pb | |
2495 | -/627HOkthIDYIb6FUtnUdLlphbpN7Sgy6/lhSuTENh4Z3G+EER+V9YMoGKgzkkMn3V0TBEVPh9VG | |
2496 | -zT2ouvDzuFYkRes3x+F2T3I5GN9+dHLHcy056mDmrRGiVod7w2ia/viMcKjfZTL0pECMocJEAw6U | |
2497 | -AGegcQCCSA== | |
2498 | ------END CERTIFICATE----- | |
2499 | - | |
2500 | 2113 | ComSign Secured CA |
2501 | 2114 | ================== |
2502 | 2115 | -----BEGIN CERTIFICATE----- |
@@ -3045,22 +2658,6 @@ MCwXEGCSn1WHElkQwg9naRHMTh5+Spqtr0CodaxWkHS4oJyleW/c6RrIaQXpuvoDs3zk4E7Czp3o | ||
3045 | 2658 | tkYNbn5XOmeUwssfnHdKZ05phkOTOPu220+DkdRgfks+KzgHVZhepA== |
3046 | 2659 | -----END CERTIFICATE----- |
3047 | 2660 | |
3048 | -Verisign Class 1 Public Primary Certification Authority | |
3049 | -======================================================= | |
3050 | ------BEGIN CERTIFICATE----- | |
3051 | -MIICPDCCAaUCED9pHoGc8JpK83P/uUii5N0wDQYJKoZIhvcNAQEFBQAwXzELMAkGA1UEBhMCVVMx | |
3052 | -FzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTcwNQYDVQQLEy5DbGFzcyAxIFB1YmxpYyBQcmltYXJ5 | |
3053 | -IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk2MDEyOTAwMDAwMFoXDTI4MDgwMjIzNTk1OVow | |
3054 | -XzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTcwNQYDVQQLEy5DbGFzcyAx | |
3055 | -IFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGfMA0GCSqGSIb3DQEBAQUA | |
3056 | -A4GNADCBiQKBgQDlGb9to1ZhLZlIcfZn3rmN67eehoAKkQ76OCWvRoiC5XOooJskXQ0fzGVuDLDQ | |
3057 | -VoQYh5oGmxChc9+0WDlrbsH2FdWoqD+qEgaNMax/sDTXjzRniAnNFBHiTkVWaR94AoDa3EeRKbs2 | |
3058 | -yWNcxeDXLYd7obcysHswuiovMaruo2fa2wIDAQABMA0GCSqGSIb3DQEBBQUAA4GBAFgVKTk8d6Pa | |
3059 | -XCUDfGD67gmZPCcQcMgMCeazh88K4hiWNWLMv5sneYlfycQJ9M61Hd8qveXbhpxoJeUwfLaJFf5n | |
3060 | -0a3hUKw8fGJLj7qE1xIVGx/KXQ/BUpQqEZnae88MNhPVNdwQGVnqlMEAv3WP2fr9dgTbYruQagPZ | |
3061 | -RjXZ+Hxb | |
3062 | ------END CERTIFICATE----- | |
3063 | - | |
3064 | 2661 | Verisign Class 3 Public Primary Certification Authority |
3065 | 2662 | ======================================================= |
3066 | 2663 | -----BEGIN CERTIFICATE----- |
@@ -3144,29 +2741,6 @@ YIvDQVETI53O9zJrlAGomecsMx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7r | ||
3144 | 2741 | kpeDMdmztcpHWD9f |
3145 | 2742 | -----END CERTIFICATE----- |
3146 | 2743 | |
3147 | -TC TrustCenter Universal CA III | |
3148 | -=============================== | |
3149 | ------BEGIN CERTIFICATE----- | |
3150 | -MIID4TCCAsmgAwIBAgIOYyUAAQACFI0zFQLkbPQwDQYJKoZIhvcNAQEFBQAwezELMAkGA1UEBhMC | |
3151 | -REUxHDAaBgNVBAoTE1RDIFRydXN0Q2VudGVyIEdtYkgxJDAiBgNVBAsTG1RDIFRydXN0Q2VudGVy | |
3152 | -IFVuaXZlcnNhbCBDQTEoMCYGA1UEAxMfVEMgVHJ1c3RDZW50ZXIgVW5pdmVyc2FsIENBIElJSTAe | |
3153 | -Fw0wOTA5MDkwODE1MjdaFw0yOTEyMzEyMzU5NTlaMHsxCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNU | |
3154 | -QyBUcnVzdENlbnRlciBHbWJIMSQwIgYDVQQLExtUQyBUcnVzdENlbnRlciBVbml2ZXJzYWwgQ0Ex | |
3155 | -KDAmBgNVBAMTH1RDIFRydXN0Q2VudGVyIFVuaXZlcnNhbCBDQSBJSUkwggEiMA0GCSqGSIb3DQEB | |
3156 | -AQUAA4IBDwAwggEKAoIBAQDC2pxisLlxErALyBpXsq6DFJmzNEubkKLF5+cvAqBNLaT6hdqbJYUt | |
3157 | -QCggbergvbFIgyIpRJ9Og+41URNzdNW88jBmlFPAQDYvDIRlzg9uwliT6CwLOunBjvvya8o84pxO | |
3158 | -juT5fdMnnxvVZ3iHLX8LR7PH6MlIfK8vzArZQe+f/prhsq75U7Xl6UafYOPfjdN/+5Z+s7Vy+Eut | |
3159 | -CHnNaYlAJ/Uqwa1D7KRTyGG299J5KmcYdkhtWyUB0SbFt1dpIxVbYYqt8Bst2a9c8SaQaanVDED1 | |
3160 | -M4BDj5yjdipFtK+/fz6HP3bFzSreIMUWWMv5G/UPyw0RUmS40nZid4PxWJ//AgMBAAGjYzBhMB8G | |
3161 | -A1UdIwQYMBaAFFbn4VslQ4Dg9ozhcbyO5YAvxEjiMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ | |
3162 | -BAQDAgEGMB0GA1UdDgQWBBRW5+FbJUOA4PaM4XG8juWAL8RI4jANBgkqhkiG9w0BAQUFAAOCAQEA | |
3163 | -g8ev6n9NCjw5sWi+e22JLumzCecYV42FmhfzdkJQEw/HkG8zrcVJYCtsSVgZ1OK+t7+rSbyUyKu+ | |
3164 | -KGwWaODIl0YgoGhnYIg5IFHYaAERzqf2EQf27OysGh+yZm5WZ2B6dF7AbZc2rrUNXWZzwCUyRdhK | |
3165 | -BgePxLcHsU0GDeGl6/R1yrqc0L2z0zIkTO5+4nYES0lT2PLpVDP85XEfPRRclkvxOvIAu2y0+pZV | |
3166 | -CIgJwcyRGSmwIC3/yzikQOEXvnlhgP8HA4ZMTnsGnxGGjYnuJ8Tb4rwZjgvDwxPHLQNjO9Po5KIq | |
3167 | -woIIlBZU8O8fJ5AluA0OKBtHd0e9HKgl8ZS0Zg== | |
3168 | ------END CERTIFICATE----- | |
3169 | - | |
3170 | 2744 | Autoridad de Certificacion Firmaprofesional CIF A62634068 |
3171 | 2745 | ========================================================= |
3172 | 2746 | -----BEGIN CERTIFICATE----- |
@@ -3893,3 +3467,272 @@ uSlNDUmJEYcyW+ZLBMjkXOZ0c5RdFpgTlf7727FE5TpwrDdr5rMzcijJs1eg9gIWiAYLtqZLICjU | ||
3893 | 3467 | 3j2LrTcFU3T+bsy8QxdxXvnFzBqpYe73dgzzcvRyrc9yAjYHR8/vGVCJYMzpJJUPwssd8m92kMfM |
3894 | 3468 | dcGWxZ0= |
3895 | 3469 | -----END CERTIFICATE----- |
3470 | + | |
3471 | +TURKTRUST Certificate Services Provider Root 2007 | |
3472 | +================================================= | |
3473 | +-----BEGIN CERTIFICATE----- | |
3474 | +MIIEPTCCAyWgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBvzE/MD0GA1UEAww2VMOcUktUUlVTVCBF | |
3475 | +bGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxMQswCQYDVQQGEwJUUjEP | |
3476 | +MA0GA1UEBwwGQW5rYXJhMV4wXAYDVQQKDFVUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUg | |
3477 | +QmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLiAoYykgQXJhbMSxayAyMDA3MB4X | |
3478 | +DTA3MTIyNTE4MzcxOVoXDTE3MTIyMjE4MzcxOVowgb8xPzA9BgNVBAMMNlTDnFJLVFJVU1QgRWxl | |
3479 | +a3Ryb25payBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsTELMAkGA1UEBhMCVFIxDzAN | |
3480 | +BgNVBAcMBkFua2FyYTFeMFwGA1UECgxVVMOcUktUUlVTVCBCaWxnaSDEsGxldGnFn2ltIHZlIEJp | |
3481 | +bGnFn2ltIEfDvHZlbmxpxJ9pIEhpem1ldGxlcmkgQS7Fni4gKGMpIEFyYWzEsWsgMjAwNzCCASIw | |
3482 | +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKu3PgqMyKVYFeaK7yc9SrToJdPNM8Ig3BnuiD9N | |
3483 | +YvDdE3ePYakqtdTyuTFYKTsvP2qcb3N2Je40IIDu6rfwxArNK4aUyeNgsURSsloptJGXg9i3phQv | |
3484 | +KUmi8wUG+7RP2qFsmmaf8EMJyupyj+sA1zU511YXRxcw9L6/P8JorzZAwan0qafoEGsIiveGHtya | |
3485 | +KhUG9qPw9ODHFNRRf8+0222vR5YXm3dx2KdxnSQM9pQ/hTEST7ruToK4uT6PIzdezKKqdfcYbwnT | |
3486 | +rqdUKDT74eA7YH2gvnmJhsifLfkKS8RQouf9eRbHegsYz85M733WB2+Y8a+xwXrXgTW4qhe04MsC | |
3487 | +AwEAAaNCMEAwHQYDVR0OBBYEFCnFkKslrxHkYb+j/4hhkeYO/pyBMA4GA1UdDwEB/wQEAwIBBjAP | |
3488 | +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBBQUAA4IBAQAQDdr4Ouwo0RSVgrESLFF6QSU2TJ/s | |
3489 | +Px+EnWVUXKgWAkD6bho3hO9ynYYKVZ1WKKxmLNA6VpM0ByWtCLCPyA8JWcqdmBzlVPi5RX9ql2+I | |
3490 | +aE1KBiY3iAIOtsbWcpnOa3faYjGkVh+uX4132l32iPwa2Z61gfAyuOOI0JzzaqC5mxRZNTZPz/OO | |
3491 | +Xl0XrRWV2N2y1RVuAE6zS89mlOTgzbUF2mNXi+WzqtvALhyQRNsaXRik7r4EW5nVcV9VZWRi1aKb | |
3492 | +BFmGyGJ353yCRWo9F7/snXUMrqNvWtMvmDb08PUZqxFdyKbjKlhqQgnDvZImZjINXQhVdP+MmNAK | |
3493 | +poRq0Tl9 | |
3494 | +-----END CERTIFICATE----- | |
3495 | + | |
3496 | +D-TRUST Root Class 3 CA 2 2009 | |
3497 | +============================== | |
3498 | +-----BEGIN CERTIFICATE----- | |
3499 | +MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQK | |
3500 | +DAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTAe | |
3501 | +Fw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NThaME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxE | |
3502 | +LVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIw | |
3503 | +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOAD | |
3504 | +ER03UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42tSHKXzlA | |
3505 | +BF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9RySPocq60vFYJfxLLHLGv | |
3506 | +KZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsMlFqVlNpQmvH/pStmMaTJOKDfHR+4CS7z | |
3507 | +p+hnUquVH+BGPtikw8paxTGA6Eian5Rp/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUC | |
3508 | +AwEAAaOCARowggEWMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ | |
3509 | +4PGEMA4GA1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVjdG9y | |
3510 | +eS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUyMENBJTIwMiUyMDIw | |
3511 | +MDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRlcmV2b2NhdGlvbmxpc3QwQ6BBoD+G | |
3512 | +PWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3JsL2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAw | |
3513 | +OS5jcmwwDQYJKoZIhvcNAQELBQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm | |
3514 | +2H6NMLVwMeniacfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 | |
3515 | +o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4KzCUqNQT4YJEV | |
3516 | +dT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8PIWmawomDeCTmGCufsYkl4ph | |
3517 | +X5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3YJohw1+qRzT65ysCQblrGXnRl11z+o+I= | |
3518 | +-----END CERTIFICATE----- | |
3519 | + | |
3520 | +D-TRUST Root Class 3 CA 2 EV 2009 | |
3521 | +================================= | |
3522 | +-----BEGIN CERTIFICATE----- | |
3523 | +MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQK | |
3524 | +DAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAw | |
3525 | +OTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUwNDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQK | |
3526 | +DAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAw | |
3527 | +OTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfS | |
3528 | +egpnljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM03TP1YtHh | |
3529 | +zRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6ZqQTMFexgaDbtCHu39b+T | |
3530 | +7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lRp75mpoo6Kr3HGrHhFPC+Oh25z1uxav60 | |
3531 | +sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure35 | |
3532 | +11H3a6UCAwEAAaOCASQwggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyv | |
3533 | +cop9NteaHNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFwOi8v | |
3534 | +ZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xhc3MlMjAzJTIwQ0El | |
3535 | +MjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9jZXJ0aWZpY2F0ZXJldm9jYXRp | |
3536 | +b25saXN0MEagRKBChkBodHRwOi8vd3d3LmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xh | |
3537 | +c3NfM19jYV8yX2V2XzIwMDkuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+ | |
3538 | +PPoeUSbrh/Yp3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 | |
3539 | +nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNFCSuGdXzfX2lX | |
3540 | +ANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7naxpeG0ILD5EJt/rDiZE4OJudA | |
3541 | +NCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqXKVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVv | |
3542 | +w9y4AyHqnxbxLFS1 | |
3543 | +-----END CERTIFICATE----- | |
3544 | + | |
3545 | +PSCProcert | |
3546 | +========== | |
3547 | +-----BEGIN CERTIFICATE----- | |
3548 | +MIIJhjCCB26gAwIBAgIBCzANBgkqhkiG9w0BAQsFADCCAR4xPjA8BgNVBAMTNUF1dG9yaWRhZCBk | |
3549 | +ZSBDZXJ0aWZpY2FjaW9uIFJhaXogZGVsIEVzdGFkbyBWZW5lem9sYW5vMQswCQYDVQQGEwJWRTEQ | |
3550 | +MA4GA1UEBxMHQ2FyYWNhczEZMBcGA1UECBMQRGlzdHJpdG8gQ2FwaXRhbDE2MDQGA1UEChMtU2lz | |
3551 | +dGVtYSBOYWNpb25hbCBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMUMwQQYDVQQLEzpTdXBl | |
3552 | +cmludGVuZGVuY2lhIGRlIFNlcnZpY2lvcyBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMSUw | |
3553 | +IwYJKoZIhvcNAQkBFhZhY3JhaXpAc3VzY2VydGUuZ29iLnZlMB4XDTEwMTIyODE2NTEwMFoXDTIw | |
3554 | +MTIyNTIzNTk1OVowgdExJjAkBgkqhkiG9w0BCQEWF2NvbnRhY3RvQHByb2NlcnQubmV0LnZlMQ8w | |
3555 | +DQYDVQQHEwZDaGFjYW8xEDAOBgNVBAgTB01pcmFuZGExKjAoBgNVBAsTIVByb3ZlZWRvciBkZSBD | |
3556 | +ZXJ0aWZpY2Fkb3MgUFJPQ0VSVDE2MDQGA1UEChMtU2lzdGVtYSBOYWNpb25hbCBkZSBDZXJ0aWZp | |
3557 | +Y2FjaW9uIEVsZWN0cm9uaWNhMQswCQYDVQQGEwJWRTETMBEGA1UEAxMKUFNDUHJvY2VydDCCAiIw | |
3558 | +DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANW39KOUM6FGqVVhSQ2oh3NekS1wwQYalNo97BVC | |
3559 | +wfWMrmoX8Yqt/ICV6oNEolt6Vc5Pp6XVurgfoCfAUFM+jbnADrgV3NZs+J74BCXfgI8Qhd19L3uA | |
3560 | +3VcAZCP4bsm+lU/hdezgfl6VzbHvvnpC2Mks0+saGiKLt38GieU89RLAu9MLmV+QfI4tL3czkkoh | |
3561 | +RqipCKzx9hEC2ZUWno0vluYC3XXCFCpa1sl9JcLB/KpnheLsvtF8PPqv1W7/U0HU9TI4seJfxPmO | |
3562 | +EO8GqQKJ/+MMbpfg353bIdD0PghpbNjU5Db4g7ayNo+c7zo3Fn2/omnXO1ty0K+qP1xmk6wKImG2 | |
3563 | +0qCZyFSTXai20b1dCl53lKItwIKOvMoDKjSuc/HUtQy9vmebVOvh+qBa7Dh+PsHMosdEMXXqP+UH | |
3564 | +0quhJZb25uSgXTcYOWEAM11G1ADEtMo88aKjPvM6/2kwLkDd9p+cJsmWN63nOaK/6mnbVSKVUyqU | |
3565 | +td+tFjiBdWbjxywbk5yqjKPK2Ww8F22c3HxT4CAnQzb5EuE8XL1mv6JpIzi4mWCZDlZTOpx+FIyw | |
3566 | +Bm/xhnaQr/2v/pDGj59/i5IjnOcVdo/Vi5QTcmn7K2FjiO/mpF7moxdqWEfLcU8UC17IAggmosvp | |
3567 | +r2uKGcfLFFb14dq12fy/czja+eevbqQ34gcnAgMBAAGjggMXMIIDEzASBgNVHRMBAf8ECDAGAQH/ | |
3568 | +AgEBMDcGA1UdEgQwMC6CD3N1c2NlcnRlLmdvYi52ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAz | |
3569 | +Ni0wMB0GA1UdDgQWBBRBDxk4qpl/Qguk1yeYVKIXTC1RVDCCAVAGA1UdIwSCAUcwggFDgBStuyId | |
3570 | +xuDSAaj9dlBSk+2YwU2u06GCASakggEiMIIBHjE+MDwGA1UEAxM1QXV0b3JpZGFkIGRlIENlcnRp | |
3571 | +ZmljYWNpb24gUmFpeiBkZWwgRXN0YWRvIFZlbmV6b2xhbm8xCzAJBgNVBAYTAlZFMRAwDgYDVQQH | |
3572 | +EwdDYXJhY2FzMRkwFwYDVQQIExBEaXN0cml0byBDYXBpdGFsMTYwNAYDVQQKEy1TaXN0ZW1hIE5h | |
3573 | +Y2lvbmFsIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25pY2ExQzBBBgNVBAsTOlN1cGVyaW50ZW5k | |
3574 | +ZW5jaWEgZGUgU2VydmljaW9zIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25pY2ExJTAjBgkqhkiG | |
3575 | +9w0BCQEWFmFjcmFpekBzdXNjZXJ0ZS5nb2IudmWCAQowDgYDVR0PAQH/BAQDAgEGME0GA1UdEQRG | |
3576 | +MESCDnByb2NlcnQubmV0LnZloBUGBWCGXgIBoAwMClBTQy0wMDAwMDKgGwYFYIZeAgKgEgwQUklG | |
3577 | +LUotMzE2MzUzNzMtNzB2BgNVHR8EbzBtMEagRKBChkBodHRwOi8vd3d3LnN1c2NlcnRlLmdvYi52 | |
3578 | +ZS9sY3IvQ0VSVElGSUNBRE8tUkFJWi1TSEEzODRDUkxERVIuY3JsMCOgIaAfhh1sZGFwOi8vYWNy | |
3579 | +YWl6LnN1c2NlcnRlLmdvYi52ZTA3BggrBgEFBQcBAQQrMCkwJwYIKwYBBQUHMAGGG2h0dHA6Ly9v | |
3580 | +Y3NwLnN1c2NlcnRlLmdvYi52ZTBBBgNVHSAEOjA4MDYGBmCGXgMBAjAsMCoGCCsGAQUFBwIBFh5o | |
3581 | +dHRwOi8vd3d3LnN1c2NlcnRlLmdvYi52ZS9kcGMwDQYJKoZIhvcNAQELBQADggIBACtZ6yKZu4Sq | |
3582 | +T96QxtGGcSOeSwORR3C7wJJg7ODU523G0+1ng3dS1fLld6c2suNUvtm7CpsR72H0xpkzmfWvADmN | |
3583 | +g7+mvTV+LFwxNG9s2/NkAZiqlCxB3RWGymspThbASfzXg0gTB1GEMVKIu4YXx2sviiCtxQuPcD4q | |
3584 | +uxtxj7mkoP3YldmvWb8lK5jpY5MvYB7Eqvh39YtsL+1+LrVPQA3uvFd359m21D+VJzog1eWuq2w1 | |
3585 | +n8GhHVnchIHuTQfiSLaeS5UtQbHh6N5+LwUeaO6/u5BlOsju6rEYNxxik6SgMexxbJHmpHmJWhSn | |
3586 | +FFAFTKQAVzAswbVhltw+HoSvOULP5dAssSS830DD7X9jSr3hTxJkhpXzsOfIt+FTvZLm8wyWuevo | |
3587 | +5pLtp4EJFAv8lXrPj9Y0TzYS3F7RNHXGRoAvlQSMx4bEqCaJqD8Zm4G7UaRKhqsLEQ+xrmNTbSjq | |
3588 | +3TNWOByyrYDT13K9mmyZY+gAu0F2BbdbmRiKw7gSXFbPVgx96OLP7bx0R/vu0xdOIk9W/1DzLuY5 | |
3589 | +poLWccret9W6aAjtmcz9opLLabid+Qqkpj5PkygqYWwHJgD/ll9ohri4zspV4KuxPX+Y1zMOWj3Y | |
3590 | +eMLEYC/HYvBhkdI4sPaeVdtAgAUSM84dkpvRabP/v/GSCmE1P93+hvS84Bpxs2Km | |
3591 | +-----END CERTIFICATE----- | |
3592 | + | |
3593 | +China Internet Network Information Center EV Certificates Root | |
3594 | +============================================================== | |
3595 | +-----BEGIN CERTIFICATE----- | |
3596 | +MIID9zCCAt+gAwIBAgIESJ8AATANBgkqhkiG9w0BAQUFADCBijELMAkGA1UEBhMCQ04xMjAwBgNV | |
3597 | +BAoMKUNoaW5hIEludGVybmV0IE5ldHdvcmsgSW5mb3JtYXRpb24gQ2VudGVyMUcwRQYDVQQDDD5D | |
3598 | +aGluYSBJbnRlcm5ldCBOZXR3b3JrIEluZm9ybWF0aW9uIENlbnRlciBFViBDZXJ0aWZpY2F0ZXMg | |
3599 | +Um9vdDAeFw0xMDA4MzEwNzExMjVaFw0zMDA4MzEwNzExMjVaMIGKMQswCQYDVQQGEwJDTjEyMDAG | |
3600 | +A1UECgwpQ2hpbmEgSW50ZXJuZXQgTmV0d29yayBJbmZvcm1hdGlvbiBDZW50ZXIxRzBFBgNVBAMM | |
3601 | +PkNoaW5hIEludGVybmV0IE5ldHdvcmsgSW5mb3JtYXRpb24gQ2VudGVyIEVWIENlcnRpZmljYXRl | |
3602 | +cyBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm35z7r07eKpkQ0H1UN+U8i6y | |
3603 | +jUqORlTSIRLIOTJCBumD1Z9S7eVnAztUwYyZmczpwA//DdmEEbK40ctb3B75aDFk4Zv6dOtouSCV | |
3604 | +98YPjUesWgbdYavi7NifFy2cyjw1l1VxzUOFsUcW9SxTgHbP0wBkvUCZ3czY28Sf1hNfQYOL+Q2H | |
3605 | +klY0bBoQCxfVWhyXWIQ8hBouXJE0bhlffxdpxWXvayHG1VA6v2G5BY3vbzQ6sm8UY78WO5upKv23 | |
3606 | +KzhmBsUs4qpnHkWnjQRmQvaPK++IIGmPMowUc9orhpFjIpryp9vOiYurXccUwVswah+xt54ugQEC | |
3607 | +7c+WXmPbqOY4twIDAQABo2MwYTAfBgNVHSMEGDAWgBR8cks5x8DbYqVPm6oYNJKiyoOCWTAPBgNV | |
3608 | +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUfHJLOcfA22KlT5uqGDSSosqD | |
3609 | +glkwDQYJKoZIhvcNAQEFBQADggEBACrDx0M3j92tpLIM7twUbY8opJhJywyA6vPtI2Z1fcXTIWd5 | |
3610 | +0XPFtQO3WKwMVC/GVhMPMdoG52U7HW8228gd+f2ABsqjPWYWqJ1MFn3AlUa1UeTiH9fqBk1jjZaM | |
3611 | +7+czV0I664zBechNdn3e9rG3geCg+aF4RhcaVpjwTj2rHO3sOdwHSPdj/gauwqRcalsyiMXHM4Ws | |
3612 | +ZkJHwlgkmeHlPuV1LI5D1l08eB6olYIpUNHRFrrvwb562bTYzB5MRuF3sTGrvSrIzo9uoV1/A3U0 | |
3613 | +5K2JRVRevq4opbs/eHnrc7MKDf2+yfdWrPa37S+bISnHOLaVxATywy39FCqQmbkHzJ8= | |
3614 | +-----END CERTIFICATE----- | |
3615 | + | |
3616 | +Swisscom Root CA 2 | |
3617 | +================== | |
3618 | +-----BEGIN CERTIFICATE----- | |
3619 | +MIIF2TCCA8GgAwIBAgIQHp4o6Ejy5e/DfEoeWhhntjANBgkqhkiG9w0BAQsFADBkMQswCQYDVQQG | |
3620 | +EwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0YWwgQ2VydGlmaWNhdGUgU2Vy | |
3621 | +dmljZXMxGzAZBgNVBAMTElN3aXNzY29tIFJvb3QgQ0EgMjAeFw0xMTA2MjQwODM4MTRaFw0zMTA2 | |
3622 | +MjUwNzM4MTRaMGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGln | |
3623 | +aXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAyMIIC | |
3624 | +IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlUJOhJ1R5tMJ6HJaI2nbeHCOFvErjw0DzpPM | |
3625 | +LgAIe6szjPTpQOYXTKueuEcUMncy3SgM3hhLX3af+Dk7/E6J2HzFZ++r0rk0X2s682Q2zsKwzxNo | |
3626 | +ysjL67XiPS4h3+os1OD5cJZM/2pYmLcX5BtS5X4HAB1f2uY+lQS3aYg5oUFgJWFLlTloYhyxCwWJ | |
3627 | +wDaCFCE/rtuh/bxvHGCGtlOUSbkrRsVPACu/obvLP+DHVxxX6NZp+MEkUp2IVd3Chy50I9AU/SpH | |
3628 | +Wrumnf2U5NGKpV+GY3aFy6//SSj8gO1MedK75MDvAe5QQQg1I3ArqRa0jG6F6bYRzzHdUyYb3y1a | |
3629 | +SgJA/MTAtukxGggo5WDDH8SQjhBiYEQN7Aq+VRhxLKX0srwVYv8c474d2h5Xszx+zYIdkeNL6yxS | |
3630 | +NLCK/RJOlrDrcH+eOfdmQrGrrFLadkBXeyq96G4DsguAhYidDMfCd7Camlf0uPoTXGiTOmekl9Ab | |
3631 | +mbeGMktg2M7v0Ax/lZ9vh0+Hio5fCHyqW/xavqGRn1V9TrALacywlKinh/LTSlDcX3KwFnUey7QY | |
3632 | +Ypqwpzmqm59m2I2mbJYV4+by+PGDYmy7Velhk6M99bFXi08jsJvllGov34zflVEpYKELKeRcVVi3 | |
3633 | +qPyZ7iVNTA6z00yPhOgpD/0QVAKFyPnlw4vP5w8CAwEAAaOBhjCBgzAOBgNVHQ8BAf8EBAMCAYYw | |
3634 | +HQYDVR0hBBYwFDASBgdghXQBUwIBBgdghXQBUwIBMBIGA1UdEwEB/wQIMAYBAf8CAQcwHQYDVR0O | |
3635 | +BBYEFE0mICKJS9PVpAqhb97iEoHF8TwuMB8GA1UdIwQYMBaAFE0mICKJS9PVpAqhb97iEoHF8Twu | |
3636 | +MA0GCSqGSIb3DQEBCwUAA4ICAQAyCrKkG8t9voJXiblqf/P0wS4RfbgZPnm3qKhyN2abGu2sEzsO | |
3637 | +v2LwnN+ee6FTSA5BesogpxcbtnjsQJHzQq0Qw1zv/2BZf82Fo4s9SBwlAjxnffUy6S8w5X2lejjQ | |
3638 | +82YqZh6NM4OKb3xuqFp1mrjX2lhIREeoTPpMSQpKwhI3qEAMw8jh0FcNlzKVxzqfl9NX+Ave5XLz | |
3639 | +o9v/tdhZsnPdTSpxsrpJ9csc1fV5yJmz/MFMdOO0vSk3FQQoHt5FRnDsr7p4DooqzgB53MBfGWcs | |
3640 | +a0vvaGgLQ+OswWIJ76bdZWGgr4RVSJFSHMYlkSrQwSIjYVmvRRGFHQEkNI/Ps/8XciATwoCqISxx | |
3641 | +OQ7Qj1zB09GOInJGTB2Wrk9xseEFKZZZ9LuedT3PDTcNYtsmjGOpI99nBjx8Oto0QuFmtEYE3saW | |
3642 | +mA9LSHokMnWRn6z3aOkquVVlzl1h0ydw2Df+n7mvoC5Wt6NlUe07qxS/TFED6F+KBZvuim6c779o | |
3643 | ++sjaC+NCydAXFJy3SuCvkychVSa1ZC+N8f+mQAWFBVzKBxlcCxMoTFh/wqXvRdpg065lYZ1Tg3TC | |
3644 | +rvJcwhbtkj6EPnNgiLx29CzP0H1907he0ZESEOnN3col49XtmS++dYFLJPlFRpTJKSFTnCZFqhMX | |
3645 | +5OfNeOI5wSsSnqaeG8XmDtkx2Q== | |
3646 | +-----END CERTIFICATE----- | |
3647 | + | |
3648 | +Swisscom Root EV CA 2 | |
3649 | +===================== | |
3650 | +-----BEGIN CERTIFICATE----- | |
3651 | +MIIF4DCCA8igAwIBAgIRAPL6ZOJ0Y9ON/RAdBB92ylgwDQYJKoZIhvcNAQELBQAwZzELMAkGA1UE | |
3652 | +BhMCY2gxETAPBgNVBAoTCFN3aXNzY29tMSUwIwYDVQQLExxEaWdpdGFsIENlcnRpZmljYXRlIFNl | |
3653 | +cnZpY2VzMR4wHAYDVQQDExVTd2lzc2NvbSBSb290IEVWIENBIDIwHhcNMTEwNjI0MDk0NTA4WhcN | |
3654 | +MzEwNjI1MDg0NTA4WjBnMQswCQYDVQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsT | |
3655 | +HERpZ2l0YWwgQ2VydGlmaWNhdGUgU2VydmljZXMxHjAcBgNVBAMTFVN3aXNzY29tIFJvb3QgRVYg | |
3656 | +Q0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMT3HS9X6lds93BdY7BxUglgRCgz | |
3657 | +o3pOCvrY6myLURYaVa5UJsTMRQdBTxB5f3HSek4/OE6zAMaVylvNwSqD1ycfMQ4jFrclyxy0uYAy | |
3658 | +Xhqdk/HoPGAsp15XGVhRXrwsVgu42O+LgrQ8uMIkqBPHoCE2G3pXKSinLr9xJZDzRINpUKTk4Rti | |
3659 | +GZQJo/PDvO/0vezbE53PnUgJUmfANykRHvvSEaeFGHR55E+FFOtSN+KxRdjMDUN/rhPSays/p8Li | |
3660 | +qG12W0OfvrSdsyaGOx9/5fLoZigWJdBLlzin5M8J0TbDC77aO0RYjb7xnglrPvMyxyuHxuxenPaH | |
3661 | +Za0zKcQvidm5y8kDnftslFGXEBuGCxobP/YCfnvUxVFkKJ3106yDgYjTdLRZncHrYTNaRdHLOdAG | |
3662 | +alNgHa/2+2m8atwBz735j9m9W8E6X47aD0upm50qKGsaCnw8qyIL5XctcfaCNYGu+HuB5ur+rPQa | |
3663 | +m3Rc6I8k9l2dRsQs0h4rIWqDJ2dVSqTjyDKXZpBy2uPUZC5f46Fq9mDU5zXNysRojddxyNMkM3Ox | |
3664 | +bPlq4SjbX8Y96L5V5jcb7STZDxmPX2MYWFCBUWVv8p9+agTnNCRxunZLWB4ZvRVgRaoMEkABnRDi | |
3665 | +xzgHcgplwLa7JSnaFp6LNYth7eVxV4O1PHGf40+/fh6Bn0GXAgMBAAGjgYYwgYMwDgYDVR0PAQH/ | |
3666 | +BAQDAgGGMB0GA1UdIQQWMBQwEgYHYIV0AVMCAgYHYIV0AVMCAjASBgNVHRMBAf8ECDAGAQH/AgED | |
3667 | +MB0GA1UdDgQWBBRF2aWBbj2ITY1x0kbBbkUe88SAnTAfBgNVHSMEGDAWgBRF2aWBbj2ITY1x0kbB | |
3668 | +bkUe88SAnTANBgkqhkiG9w0BAQsFAAOCAgEAlDpzBp9SSzBc1P6xXCX5145v9Ydkn+0UjrgEjihL | |
3669 | +j6p7jjm02Vj2e6E1CqGdivdj5eu9OYLU43otb98TPLr+flaYC/NUn81ETm484T4VvwYmneTwkLbU | |
3670 | +wp4wLh/vx3rEUMfqe9pQy3omywC0Wqu1kx+AiYQElY2NfwmTv9SoqORjbdlk5LgpWgi/UOGED1V7 | |
3671 | +XwgiG/W9mR4U9s70WBCCswo9GcG/W6uqmdjyMb3lOGbcWAXH7WMaLgqXfIeTK7KK4/HsGOV1timH | |
3672 | +59yLGn602MnTihdsfSlEvoqq9X46Lmgxk7lq2prg2+kupYTNHAq4Sgj5nPFhJpiTt3tm7JFe3VE/ | |
3673 | +23MPrQRYCd0EApUKPtN236YQHoA96M2kZNEzx5LH4k5E4wnJTsJdhw4Snr8PyQUQ3nqjsTzyP6Wq | |
3674 | +J3mtMX0f/fwZacXduT98zca0wjAefm6S139hdlqP65VNvBFuIXxZN5nQBrz5Bm0yFqXZaajh3DyA | |
3675 | +HmBR3NdUIR7KYndP+tiPsys6DXhyyWhBWkdKwqPrGtcKqzwyVcgKEZzfdNbwQBUdyLmPtTbFr/gi | |
3676 | +uMod89a2GQ+fYWVq6nTIfI/DT11lgh/ZDYnadXL77/FHZxOzyNEZiCcmmpl5fx7kLD977vHeTYuW | |
3677 | +l8PVP3wbI+2ksx0WckNLIOFZfsLorSa/ovc= | |
3678 | +-----END CERTIFICATE----- | |
3679 | + | |
3680 | +CA Disig Root R1 | |
3681 | +================ | |
3682 | +-----BEGIN CERTIFICATE----- | |
3683 | +MIIFaTCCA1GgAwIBAgIJAMMDmu5QkG4oMA0GCSqGSIb3DQEBBQUAMFIxCzAJBgNVBAYTAlNLMRMw | |
3684 | +EQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNp | |
3685 | +ZyBSb290IFIxMB4XDTEyMDcxOTA5MDY1NloXDTQyMDcxOTA5MDY1NlowUjELMAkGA1UEBhMCU0sx | |
3686 | +EzARBgNVBAcTCkJyYXRpc2xhdmExEzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERp | |
3687 | +c2lnIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqw3j33Jijp1pedxiy | |
3688 | +3QRkD2P9m5YJgNXoqqXinCaUOuiZc4yd39ffg/N4T0Dhf9Kn0uXKE5Pn7cZ3Xza1lK/oOI7bm+V8 | |
3689 | +u8yN63Vz4STN5qctGS7Y1oprFOsIYgrY3LMATcMjfF9DCCMyEtztDK3AfQ+lekLZWnDZv6fXARz2 | |
3690 | +m6uOt0qGeKAeVjGu74IKgEH3G8muqzIm1Cxr7X1r5OJeIgpFy4QxTaz+29FHuvlglzmxZcfe+5nk | |
3691 | +CiKxLU3lSCZpq+Kq8/v8kiky6bM+TR8noc2OuRf7JT7JbvN32g0S9l3HuzYQ1VTW8+DiR0jm3hTa | |
3692 | +YVKvJrT1cU/J19IG32PK/yHoWQbgCNWEFVP3Q+V8xaCJmGtzxmjOZd69fwX3se72V6FglcXM6pM6 | |
3693 | +vpmumwKjrckWtc7dXpl4fho5frLABaTAgqWjR56M6ly2vGfb5ipN0gTco65F97yLnByn1tUD3AjL | |
3694 | +LhbKXEAz6GfDLuemROoRRRw1ZS0eRWEkG4IupZ0zXWX4Qfkuy5Q/H6MMMSRE7cderVC6xkGbrPAX | |
3695 | +ZcD4XW9boAo0PO7X6oifmPmvTiT6l7Jkdtqr9O3jw2Dv1fkCyC2fg69naQanMVXVz0tv/wQFx1is | |
3696 | +XxYb5dKj6zHbHzMVTdDypVP1y+E9Tmgt2BLdqvLmTZtJ5cUoobqwWsagtQIDAQABo0IwQDAPBgNV | |
3697 | +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUiQq0OJMa5qvum5EY+fU8PjXQ | |
3698 | +04IwDQYJKoZIhvcNAQEFBQADggIBADKL9p1Kyb4U5YysOMo6CdQbzoaz3evUuii+Eq5FLAR0rBNR | |
3699 | +xVgYZk2C2tXck8An4b58n1KeElb21Zyp9HWc+jcSjxyT7Ff+Bw+r1RL3D65hXlaASfX8MPWbTx9B | |
3700 | +LxyE04nH4toCdu0Jz2zBuByDHBb6lM19oMgY0sidbvW9adRtPTXoHqJPYNcHKfyyo6SdbhWSVhlM | |
3701 | +CrDpfNIZTUJG7L399ldb3Zh+pE3McgODWF3vkzpBemOqfDqo9ayk0d2iLbYq/J8BjuIQscTK5Gfb | |
3702 | +VSUZP/3oNn6z4eGBrxEWi1CXYBmCAMBrTXO40RMHPuq2MU/wQppt4hF05ZSsjYSVPCGvxdpHyN85 | |
3703 | +YmLLW1AL14FABZyb7bq2ix4Eb5YgOe2kfSnbSM6C3NQCjR0EMVrHS/BsYVLXtFHCgWzN4funodKS | |
3704 | +ds+xDzdYpPJScWc/DIh4gInByLUfkmO+p3qKViwaqKactV2zY9ATIKHrkWzQjX2v3wvkF7mGnjix | |
3705 | +lAxYjOBVqjtjbZqJYLhkKpLGN/R+Q0O3c+gB53+XD9fyexn9GtePyfqFa3qdnom2piiZk4hA9z7N | |
3706 | +UaPK6u95RyG1/jLix8NRb76AdPCkwzryT+lf3xkK8jsTQ6wxpLPn6/wY1gGp8yqPNg7rtLG8t0zJ | |
3707 | +a7+h89n07eLw4+1knj0vllJPgFOL | |
3708 | +-----END CERTIFICATE----- | |
3709 | + | |
3710 | +CA Disig Root R2 | |
3711 | +================ | |
3712 | +-----BEGIN CERTIFICATE----- | |
3713 | +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNVBAYTAlNLMRMw | |
3714 | +EQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNp | |
3715 | +ZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQyMDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sx | |
3716 | +EzARBgNVBAcTCkJyYXRpc2xhdmExEzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERp | |
3717 | +c2lnIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbC | |
3718 | +w3OeNcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNHPWSb6Wia | |
3719 | +xswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3Ix2ymrdMxp7zo5eFm1tL7 | |
3720 | +A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbeQTg06ov80egEFGEtQX6sx3dOy1FU+16S | |
3721 | +GBsEWmjGycT6txOgmLcRK7fWV8x8nhfRyyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqV | |
3722 | +g8NTEQxzHQuyRpDRQjrOQG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa | |
3723 | +5Beny912H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJQfYE | |
3724 | +koopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUDi/ZnWejBBhG93c+A | |
3725 | +Ak9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORsnLMOPReisjQS1n6yqEm70XooQL6i | |
3726 | +Fh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNV | |
3727 | +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5u | |
3728 | +Qu0wDQYJKoZIhvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM | |
3729 | +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqfGopTpti72TVV | |
3730 | +sRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkblvdhuDvEK7Z4bLQjb/D907Je | |
3731 | +dR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka+elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W8 | |
3732 | +1k/BfDxujRNt+3vrMNDcTa/F1balTFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjx | |
3733 | +mHHEt38OFdAlab0inSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01 | |
3734 | +utI3gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18DrG5gPcFw0 | |
3735 | +sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3OszMOl6W8KjptlwlCFtaOg | |
3736 | +UxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8xL4ysEr3vQCj8KWefshNPZiTEUxnpHikV | |
3737 | +7+ZtsH8tZ/3zbBt1RqPlShfppNcL | |
3738 | +-----END CERTIFICATE----- |
@@ -3333,7 +3333,7 @@ BOOL LoadSSLRootCAFile() | ||
3333 | 3333 | for(i = 0; i < 5; i++) |
3334 | 3334 | Hash[i] = _byteswap_ulong(Hash[i]); |
3335 | 3335 | // 同梱する"ssl.pem"に合わせてSHA1ハッシュ値を変更すること |
3336 | - if(memcmp(&Hash, &SSLRootCAFileHash, 20) == 0 || memcmp(&Hash, "\xD8\x8A\x7B\x2F\xBF\x23\x57\x16\xDA\x02\x14\x2B\xD4\x2E\x09\x80\xA0\x4C\x72\x62", 20) == 0 | |
3336 | + if(memcmp(&Hash, &SSLRootCAFileHash, 20) == 0 || memcmp(&Hash, "\xCD\xD3\xB3\xB8\x9B\x42\x85\x25\x73\xD8\xD4\xBC\xCB\x0B\xA2\x8A\x20\x38\xF4\x6C", 20) == 0 | |
3337 | 3337 | || DialogBox(GetFtpInst(), MAKEINTRESOURCE(updatesslroot_dlg), GetMainHwnd(), ExeEscDialogProc) == YES) |
3338 | 3338 | { |
3339 | 3339 | memcpy(&SSLRootCAFileHash, &Hash, 20); |
@@ -117,9 +117,9 @@ BOOL LoadOpenSSL() | ||
117 | 117 | #ifdef ENABLE_PROCESS_PROTECTION |
118 | 118 | // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること |
119 | 119 | // ssleay32.dll 1.0.1e |
120 | - RegisterTrustedModuleSHA1Hash("\xE8\x9A\x16\xDF\xCE\xA2\x7E\x55\x28\xC4\x78\x1A\x21\x40\xCB\x57\xDC\x40\xCD\x61"); | |
120 | + RegisterTrustedModuleSHA1Hash("\x16\xFA\xD2\x39\x74\x27\xE4\x07\xCB\xF5\x1A\xF1\xC3\xCD\x1C\xBB\xFC\xD0\xFC\x40"); | |
121 | 121 | // libeay32.dll 1.0.1e |
122 | - RegisterTrustedModuleSHA1Hash("\x38\xC8\x30\xCB\xE0\x5D\x4E\xF7\xA1\x93\xBB\xF7\x54\xA5\x21\xC8\xF7\xA1\x85\xC5"); | |
122 | + RegisterTrustedModuleSHA1Hash("\xA6\x2D\x10\xF8\x2A\xB9\xEF\x95\xC3\xF7\x0B\xE0\xD1\xCB\x1C\x9B\x0A\x99\x42\x1F"); | |
123 | 123 | #endif |
124 | 124 | g_hOpenSSL = LoadLibrary("ssleay32.dll"); |
125 | 125 | // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止 |