The Mozilla CA root certificate bundle
6d164aedd7
https://www.ccadb.org/resources Our normal root certs come from mozilla, but mozilla does not evaluate code signing. Currently code signing is only used my Microsoft .net, so we need to get code signing certs from Microsoft's code signing list. The certs in this list will only show up in the code signing lists or in the general list with only code signing set. |
||
---|---|---|
tests | ||
.gitignore | ||
ca-certificates.spec | ||
ca-legacy | ||
ca-legacy.8.txt | ||
ca-legacy.conf | ||
certdata2pem.py | ||
certdata.txt | ||
check_certs.sh | ||
fetch_objsign.sh | ||
fetch.sh | ||
mergepem2certdata.py | ||
nssckbi.h | ||
README.edk2 | ||
README.etc | ||
README.extr | ||
README.java | ||
README.openssl | ||
README.pem | ||
README.src | ||
README.usr | ||
sort-blocks.py | ||
sources | ||
trust-fixes | ||
update-ca-trust | ||
update-ca-trust.8.txt |
This directory /usr/share/pki/ca-trust-source/ contains CA certificates and trust settings in the PEM file format. The trust settings found here will be interpreted with a low priority - lower than the ones found in /etc/pki/ca-trust/source/ . ============================================================================= QUICK HELP: To add a certificate in the simple PEM or DER file formats to the list of CAs trusted on the system: Copy it to the /usr/share/pki/ca-trust-source/anchors/ subdirectory, and run the update-ca-trust command. If your certificate is in the extended BEGIN TRUSTED file format, then place it into the main source/ directory instead. ============================================================================= Please refer to the update-ca-trust(8) manual page for additional information.