summaryrefslogtreecommitdiff
path: root/src/lib/libssl/cert.pem (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Move build machinery for libcrypto from libssl/crypto to libcrypto, as wellmiod2014-04-111-3524/+0
| | | | | | | | | as configuration files; split manpages and .pc files between libcrypto and libssl. No functional change, only there to make engineering easier, and libcrypto sources are still found in libssl/src/crypto at the moment. ok reyk@, also discussed with deraadt@ beck@ and the usual crypto suspects.
* Remove CA certificates which are not listed in Mozilla's certdata.txt.sthen2014-04-091-1823/+0
| | | | | | Notably this removes CAcert who it turns out have strict requirements on redistribution (http://www.cacert.org/policy/RootDistributionLicense.php) which we don't meet.
* Use root CAs that are used by TeleSec (Deutsche Telekom AG):reyk2014-04-091-0/+313
| | | | | | | | | - Baltimore CyberTrust Root - Deutsche Telekom Root CA 2 - T-TeleSec GlobalRoot Class 2 - T-TeleSec GlobalRoot Class 3 ok sthen@
* New CA root certificates, ok beck@.sthen2012-12-031-99/+1705
| | | | | | | | | | | | | | - additional cert's from GlobalSign. - additional cert's from VeriSign and replace existing ones with 'Signature Algorithm: md2WithRSAEncryption' with their currently distributed sha1WithRSAEncryption versions. - new CAs: AddTrust (root for most Comodo certificates also heavily used in academic networks), Comodo (most of their certs are rooted in AddTrust but TERENA use the Comodo AAA Certificate Services root for some things so add that separately), UserTrust Network/UTN (part of Comodo) and Starfield (part of Go Daddy).
* Additional CA root certificates: GeoTrust/Equifax, Go Daddy, StartCom, thawte.sthen2012-12-011-0/+1187
| | | | ok beck@ william@ todd@
* Regenerate the text information for all certificates with recent opensslsthen2012-11-301-439/+465
| | | | | | and include sha1 signatures for all certs (some were missing). No certificate changes, this is just for consistency. ok beck@
* Remove retired Thawte/Verisign certificates.sthen2012-11-301-499/+0
| | | | | | Remove intermediate GoDaddy certificate, this file should just contain roots. ok beck@ phessler@
* - Replace digicert 2nd-level cert with the root which issued it.sthen2011-07-201-114/+247
| | | | | | | | | | | Allows https checkouts from github to work. - Add digicert's other root certs. Fingerprints carefully checked against those in the built-in roots supplied with Mozilla. ok dcoppa@ jcs@
* Add the following certs:dhill2011-06-151-0/+563
| | | | | | | | | | | | DigiCert High Assurance CA-3 Go Daddy Secure Certification Authority/serialNumber=07969287 Equifax Secure Certificate Authority VeriSign Class 3 Public Primary Certification Authority - G5 Entrust Certification Authority - L1C Entrust.net Secure Server Certification Authority ok mikeb@ beck@ fgsch@ constant prodding by marco@
* back out previous commit.beck2011-03-251-665/+0
| | | | | | | | | | | "if you have checked this I am ok with it" does not mean 1) not to pay attention to breaking news after I tell you that and 2) not to get ok's from the others this had been shown to. I am absolutely not ok with thig going in with only *my* ok. There's a reason why we want more than one ok on important commits ok deraadt@ for the backout
* Add the following certs:dhill2011-03-251-0/+665
| | | | | | | | | | | | | | DigiCert High Assurance CA-3 Go Daddy Secure Certification Authority COMODO High-Assurance Secure Server CA Equifax Secure Certificate Authority VeriSign Class 3 Public Primary Certification Authority - G5 Entrust Certification Authority - L1C Entrust.net Secure Server Certification Authority cross checked with mozilla ok beck@
* Remove expired certs.dhill2011-03-031-174/+0
| | | | ok beck@ fgsch@
* new ipsca root.dlg2009-12-311-0/+108
|
* ipsca has expireddlg2009-12-311-51/+0
|
* another cert that makes godaddy.com and launchpad.net (among others) happy.fgsch2009-10-121-0/+51
| | | | | found by Guillaume Protet (guillaume dot protet at mortheres dot info) while testing bzr update. deraadt@ ok
* remove expired certificates and add startcom ltd.fgsch2009-08-081-839/+148
| | | | beck@ ok
* add ipsCA as a valid authority.dlg2009-05-251-0/+51
| | | | ok beck@
* remove two expired certificates, diff from <Christian_Rusch@genua.de>grunk2007-02-171-97/+0
| | | | ok jakob@
* add class 1 and class 3 root certificates from CAcert.org. ok beck@jakob2006-06-121-0/+268
|
* remove expired certificates. ok beck@jakob2006-06-071-541/+0
|
* update a couple of existing CAs that has been changed. ok beck@jakob2006-06-071-105/+87
|
* reformat using 'openssl x509 -text -fingerprint -sha1' and sort byjakob2006-06-071-2551/+2356
| | | | 'openssl x509 -hash'. ok beck@
* back out last patch due to updated committed prematurelyjakob2006-06-071-2356/+2551
|
* reformat using 'openssl x509 -text -fingerprint -sha1' and sort byjakob2006-06-071-2551/+2356
| | | | 'openssl x509 -hash'. ok beck@
* Add a reasonably sane CA bundle to /etc/ssl/cert.pem, the defaultbeck2005-04-011-0/+3307
location for libssl, this makes lynx not bitch when seeing sites with certificates signed by these issuers. We should probably think carefully about adding a few more in here too.