1
0

Accepting request 569458 from Base:System

- Updated to 2.22 state of the Mozilla NSS Certificate store.
- Removed CAs:
  * ACEDICOM Root
  * AddTrust Public CA Root
  * AddTrust Qualified CA Root
  * ApplicationCA - Japanese Government
  * CA Disig Root R1
  * CA WoSign ECC Root
  * Certification Authority of WoSign G2
  * Certinomis - Autorité Racine
  * China Internet Network Information Center EV Certificates Root
  * CNNIC ROOT
  * Comodo Secure Certificate Services
  * Comodo Trusted Certificate Services
  * ComSign Secured CA
  * DST ACES CA X6
  * GeoTrust Global CA 2
  * StartCom Certification Authority
  * StartCom Certification Authority
  * StartCom Certification Authority G2
  * Swisscom Root CA 1
  * TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3
  * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  * UTN USERFirst Hardware Root CA
  * UTN USERFirst Object Root CA
  * VeriSign Class 3 Secure Server CA - G2
  * WellsSecure Public Root Certificate Authority
  * Certification Authority of WoSign
  * WoSign China

OBS-URL: https://build.opensuse.org/request/show/569458
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/ca-certificates-mozilla?expand=0&rev=38
This commit is contained in:
Dominique Leuenberger 2018-01-26 12:35:48 +00:00 committed by Git OBS Bridge
commit 21f323e881
4 changed files with 1883 additions and 8229 deletions

View File

@ -1,3 +1,50 @@
-------------------------------------------------------------------
Thu Jan 25 09:43:25 UTC 2018 - meissner@suse.com
- Updated to 2.22 state of the Mozilla NSS Certificate store.
- Removed CAs:
* ACEDICOM Root
* AddTrust Public CA Root
* AddTrust Qualified CA Root
* ApplicationCA - Japanese Government
* CA Disig Root R1
* CA WoSign ECC Root
* Certification Authority of WoSign G2
* Certinomis - Autorité Racine
* China Internet Network Information Center EV Certificates Root
* CNNIC ROOT
* Comodo Secure Certificate Services
* Comodo Trusted Certificate Services
* ComSign Secured CA
* DST ACES CA X6
* GeoTrust Global CA 2
* StartCom Certification Authority
* StartCom Certification Authority
* StartCom Certification Authority G2
* Swisscom Root CA 1
* TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3
* TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
* TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
* UTN USERFirst Hardware Root CA
* UTN USERFirst Object Root CA
* VeriSign Class 3 Secure Server CA - G2
* WellsSecure Public Root Certificate Authority
* Certification Authority of WoSign
* WoSign China
- Added CAs:
* D-TRUST Root CA 3 2013
* GDCA TrustAUTH R5 ROOT
* SSL.com EV Root Certification Authority ECC
* SSL.com EV Root Certification Authority RSA R2
* SSL.com Root Certification Authority ECC
* SSL.com Root Certification Authority RSA
* TrustCor RootCert CA-1
* TrustCor RootCert CA-2
* TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
------------------------------------------------------------------- -------------------------------------------------------------------
Wed Oct 25 12:40:36 UTC 2017 - jmatejek@suse.com Wed Oct 25 12:40:36 UTC 2017 - jmatejek@suse.com

View File

@ -1,7 +1,7 @@
# #
# spec file for package ca-certificates-mozilla # spec file for package ca-certificates-mozilla
# #
# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany. # Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
# #
# All modifications and additions to the file contributed by third parties # All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed # remain the property of their copyright owners, unless otherwise agreed
@ -26,7 +26,7 @@ BuildRequires: python3-base
Name: ca-certificates-mozilla Name: ca-certificates-mozilla
# Version number is NSS_BUILTINS_LIBRARY_VERSION in this file: # Version number is NSS_BUILTINS_LIBRARY_VERSION in this file:
# http://hg.mozilla.org/projects/nss/file/default/lib/ckfw/builtins/nssckbi.h # http://hg.mozilla.org/projects/nss/file/default/lib/ckfw/builtins/nssckbi.h
Version: 2.11 Version: 2.22
Release: 0 Release: 0
Summary: CA certificates for OpenSSL Summary: CA certificates for OpenSSL
License: MPL-2.0 License: MPL-2.0

10022
certdata.txt

File diff suppressed because it is too large Load Diff

View File

@ -22,31 +22,32 @@
* to the list of trusted certificates. * to the list of trusted certificates.
* *
* The NSS_BUILTINS_LIBRARY_VERSION_MINOR macro needs to be bumped * The NSS_BUILTINS_LIBRARY_VERSION_MINOR macro needs to be bumped
* for each NSS minor release AND whenever we change the list of * whenever we change the list of trusted certificates.
* trusted certificates. 10 minor versions are allocated for each *
* NSS 3.x branch as follows, allowing us to change the list of * Please use the following rules when increasing the version number:
* trusted certificates up to 9 times on each branch. *
* - NSS 3.5 branch: 3-9 * - starting with version 2.14, NSS_BUILTINS_LIBRARY_VERSION_MINOR
* - NSS 3.6 branch: 10-19 * must always be an EVEN number (e.g. 16, 18, 20 etc.)
* - NSS 3.7 branch: 20-29 *
* - NSS 3.8 branch: 30-39 * - whenever possible, if older branches require a modification to the
* - NSS 3.9 branch: 40-49 * list, these changes should be made on the main line of development (trunk),
* - NSS 3.10 branch: 50-59 * and the older branches should update to the most recent list.
* - NSS 3.11 branch: 60-69 *
* ... * - ODD minor version numbers are reserved to indicate a snapshot that has
* - NSS 3.12 branch: 70-89 * deviated from the main line of development, e.g. if it was necessary
* - NSS 3.13 branch: 90-99 * to modify the list on a stable branch.
* - NSS 3.14 branch: 100-109 * Once the version has been changed to an odd number (e.g. 2.13) on a branch,
* ... * it should remain unchanged on that branch, even if further changes are
* - NSS 3.29 branch: 250-255 * made on that branch.
* *
* NSS_BUILTINS_LIBRARY_VERSION_MINOR is a CK_BYTE. It's not clear * NSS_BUILTINS_LIBRARY_VERSION_MINOR is a CK_BYTE. It's not clear
* whether we may use its full range (0-255) or only 0-99 because * whether we may use its full range (0-255) or only 0-99 because
* of the comment in the CK_VERSION type definition. * of the comment in the CK_VERSION type definition.
* It's recommend to switch back to 0 after having reached version 98/99.
*/ */
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2 #define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 11 #define NSS_BUILTINS_LIBRARY_VERSION_MINOR 22
#define NSS_BUILTINS_LIBRARY_VERSION "2.11" #define NSS_BUILTINS_LIBRARY_VERSION "2.22"
/* These version numbers detail the semantic changes to the ckfw engine. */ /* These version numbers detail the semantic changes to the ckfw engine. */
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1 #define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1