The Mozilla CA root certificate bundle
Go to file
Frantisek Krenzelok 9bf988861b update-ca-trust: make a copy of directory-hash symlinks in ../tls/certs
Resolves: RHEL-50293

- update-ca-trust: copy directory-hash symlinks to /etc/pki/tls/certs
- Remove /etc/pki/tls/cert.pem symlink so that it isn't loaded by default
2024-09-03 12:59:30 +02:00
tests Add CI tests using the standard test interface 2017-09-25 11:03:21 +02:00
.gitignore - Update fetch to handle merging microsoft code signing certs. 2023-10-04 14:31:59 -07:00
ca-certificates.spec update-ca-trust: make a copy of directory-hash symlinks in ../tls/certs 2024-09-03 12:59:30 +02:00
ca-legacy Use the force, script! (Which sln did by default). 2018-01-19 13:14:55 +01:00
ca-legacy.8.txt Fixed a typo in the ca-legacy manual page. 2015-05-05 17:27:27 +02:00
ca-legacy.conf rename legacy=enable to legacy=default and related changes; add ca-legacy man page; handle absent configuration in ca-legacy 2015-03-31 23:02:57 +02:00
certdata2pem.py certdata2pem.py: emit flags for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER 2019-12-04 10:53:31 +01:00
certdata.txt Update to CKBI 2.69_v8.0.302 from NSS 3.101 2024-07-11 09:35:04 +02:00
check_certs.sh Resolves: rhbz#1722213 2019-06-19 10:17:16 -07:00
fetch_objsign.sh - Update fetch to handle merging microsoft code signing certs. 2023-10-04 14:31:59 -07:00
fetch.sh fix version pasting 2023-10-04 14:37:44 -07:00
gating.yaml Update gating.yaml 2024-08-22 09:57:06 +02:00
mergepem2certdata.py - Update fetch to handle merging microsoft code signing certs. 2023-10-04 14:31:59 -07:00
nssckbi.h Update to CKBI 2.69_v8.0.302 from NSS 3.101 2024-07-11 09:35:04 +02:00
README.edk2 Extract certificate bundle in EDK2 format 2018-06-11 14:05:57 +02:00
README.etc - added a manual page and related build requirements 2013-07-09 00:59:15 +02:00
README.etcssl Resolves: rhbz#1053883 rhbz#1396811 2021-12-06 15:49:38 -08:00
README.extr - added a manual page and related build requirements 2013-07-09 00:59:15 +02:00
README.java - added a manual page and related build requirements 2013-07-09 00:59:15 +02:00
README.openssl - added a manual page and related build requirements 2013-07-09 00:59:15 +02:00
README.pem Fix typos in a manual page and in a README file. 2016-04-25 18:58:31 +02:00
README.src - added a manual page and related build requirements 2013-07-09 00:59:15 +02:00
README.usr - added a manual page and related build requirements 2013-07-09 00:59:15 +02:00
sort-blocks.py Ported scripts to python3 2018-06-28 22:36:01 +02:00
sources Setup of module ca-certificates 2008-05-30 20:08:46 +00:00
trust-fixes remove the unnecessary entry in trust-fixes, because we no longer ship the old entrust root (it got replaced with one that contains the basic constraints extension) 2014-11-20 17:22:39 +01:00
update-ca-trust update-ca-trust: make a copy of directory-hash symlinks in ../tls/certs 2024-09-03 12:59:30 +02:00
update-ca-trust.8.txt update-ca-trust: make a copy of directory-hash symlinks in ../tls/certs 2024-09-03 12:59:30 +02:00

This directory /usr/share/pki/ca-trust-source/ contains CA certificates and 
trust settings in the PEM file format. The trust settings found here will be
interpreted with a low priority - lower than the ones found in 
/etc/pki/ca-trust/source/ .

=============================================================================
QUICK HELP: To add a certificate in the simple PEM or DER file formats to the
            list of CAs trusted on the system:

            Copy it to the
                    /usr/share/pki/ca-trust-source/anchors/
            subdirectory, and run the
                    update-ca-trust
            command.

            If your certificate is in the extended BEGIN TRUSTED file format,
            then place it into the main source/ directory instead.
=============================================================================

Please refer to the update-ca-trust(8) manual page for additional information.