igtf-policy-installation-bundle-1.135/0000755001343500074740000000000015004136237017212 5ustar davidgdavidgigtf-policy-installation-bundle-1.135/src/0000755001343500074740000000000015004136221017772 5ustar davidgdavidgigtf-policy-installation-bundle-1.135/src/accredited/0000755001343500074740000000000015004136236022067 5ustar davidgdavidgigtf-policy-installation-bundle-1.135/src/accredited/ANSPGridCA2.pem0000644001343500074740000000365015004136147024434 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFejCCA2KgAwIBAgIJAOdHr5SOjnckMA0GCSqGSIb3DQEBCwUAMEoxCzAJBgNV BAYTAkJSMQ0wCwYDVQQKEwRBTlNQMRQwEgYDVQQLEwtBTlNQR3JpZCBDQTEWMBQG A1UEAxMNQU5TUEdyaWQgQ0EgMjAeFw0yNTAyMjAyMTAxNDhaFw0zNTAyMTgyMTAx NDhaMEoxCzAJBgNVBAYTAkJSMQ0wCwYDVQQKEwRBTlNQMRQwEgYDVQQLEwtBTlNQ R3JpZCBDQTEWMBQGA1UEAxMNQU5TUEdyaWQgQ0EgMjCCAiIwDQYJKoZIhvcNAQEB BQADggIPADCCAgoCggIBAKM2fLjGcZSIksgAYVL5g3b6qlhxnP5o4+bwXCebY+W1 wl8iFGNVpFrvh1h55/JzhIJV5osbGFG7b0YEmRw9zU/Myk2IpHTJzyjxnoBCPvDQ fxxClrRzzPAVRYzcFVHsyLVNdyt2W6Dhwu5AAqhIdd/kzjUMQAKsG5Sj10HFPvt/ x1I0cMDRac4CmvCVgZYtLu5skLnoD3tI3ojX2HGJQ9aXdZt/3c8x6oDZdjCTmp5A 1w0KJ4si11ir83DUzeJeQkXq4ZI1Wkq8PPHVswiU8plPjxQYvmkA9EoOsSwmwURh bCBQkxMybEZ2kjsdohssrT6Vew521DS0t/SsEnrKv2jDC4XOaL7wlgLbAAX3CH20 K9bNtsYNsXp6i1ISpAi4H4sHHdnfLzBxbievLot+awJ4X5e9LcYszlD277BZgIbE gsHkvIJws5CQDy9WdW5I5J3hqIxcM0HWj0tA9uXFYg1BKZI3IZfPnPbnF5CAQoCw MAfLFvj1TqESES+XEuolrpiUzFE+sA+p9GKQKMQA3yi/QPXOFhzE4crZTSA3fTly sXuKw3vRQB1cNDNwJ+slta4lMIjaYqujUObMR/Dl4SDS1S/P3sHme7ALh+Feh7MG b6rnBlIAihvxeW2DfPl1DRHmb5FclzSpIHJRDdIunfDxND+o7JWxU0jRqOq00j8z AgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1Ud DgQWBBQVzcda9e4cRVzbvVEYaqG9L7dfdTAfBgNVHSMEGDAWgBQVzcda9e4cRVzb vVEYaqG9L7dfdTANBgkqhkiG9w0BAQsFAAOCAgEAOiK87/CIswHUXoWJhRJPsFKh 5ywi6rcVKvj7ukKE/NQ+qf0Qgjn1Yx/CMTd38BylX+HfCoAG3uaFXDdcYgy22Mi+ U8mLulKr4qWIEt5+cveEInhvx8kM7X7/jwRh9p4Xdm7JRJUr0zrTscKdjgCiyg3N a3x4MGaGCFg90cSXdX3SmVkt9y5eO0ef+J00Htdci/pU3v1ayBg/niWhLt+TM21l DutDdznWO1fBxzvcuQTzbMBDfSqsKLD0GRl2JKm2tj8aia+/bSD8DM8NdNj9DS0h wNGvMTwatY4TKn9l4YShSaYfWSn2UyOr2Auf0PL/vfWUl6on8EuYi1Q8aef6pfYy +0wFwZZ3Jn8MfNv7dLTdAf4UEGsTysslYJeRgvLh9si52wq6vj2kvZHOzPExB7Fm ZJUXdSwvXMc+svufF5HZXOQ2MfU7VlUcqnxC7LiIae7q7igUcHsLgcYHzAMXp6P2 w2df8HsyiMpkGyww5sozB9E6GpgUM/R0Ua/V+Z/GTXWB9sE6AzPezdHV00OK3Y4H HbfZlhMjHJwBGsJjvh4xTG35qVjbnCNOnGU0i7oguZRoXa1yAjRybCZM9ZbmeQN5 ZlxLa46e30DJTP82g1llBn/CXnNQD7vGJgcBPUeLxnkeAuc3evxZCeGLEGDJM5kN 8ud8nDBaxFT/F10rg4s= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/ANSPGridCA2.crl_url0000644001343500074740000000005315004136147025307 0ustar davidgdavidghttp://gridca.ansp.br/media/ca/anspca2.crl igtf-policy-installation-bundle-1.135/src/accredited/ANSPGridCA2.signing_policy0000644001343500074740000000040315004136147026661 0ustar davidgdavidg# @(#)ANSPGridCA2 EACL 20250224 access_id_CA X509 '/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2' pos_rights globus CA:sign cond_subjects globus '"/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2" "/C=BR/O=ANSP/OU=ANSPGrid CA/*"' igtf-policy-installation-bundle-1.135/src/accredited/ANSPGridCA2.namespaces0000644001343500074740000000073215004136147025770 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)ANSPGridCA2.signing_policy.namespaces # CA alias : ANSPGridCA2 # subord_of: # subjectDN: /C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2 # hash : ANSPGridCA2.signing_policy # (generated automatically from ANSPGridCA2.signing_policy) # TO Issuer "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2" \ PERMIT Subject "/C=BR/O=ANSP/OU=ANSPGrid CA/.*" igtf-policy-installation-bundle-1.135/src/accredited/ANSPGridCA2.info0000644001343500074740000000053615004136147024606 0ustar davidgdavidgalias = ANSPGridCA2 ca_url = http://gridca.ansp.br/media/ca/anspca2.pem crl_url = http://gridca.ansp.br/media/ca/anspca2.crl email = gridca@ansp.br status = accredited:classic url = http://gridca.ansp.br version = 1.135 sha1fp.0 = 7F:76:23:F4:80:7E:85:DD:76:8F:A3:BF:5B:88:1F:38:37:55:41:66 subjectdn = "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2" igtf-policy-installation-bundle-1.135/src/accredited/ASGCCA-2007.pem0000644001343500074740000000320315004136150024072 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEoTCCA4mgAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJUVzEL MAkGA1UEChMCQVMxRzBFBgNVBAMTPkFjYWRlbWlhIFNpbmljYSBHcmlkIENvbXB1 dGluZyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSBNZXJjdXJ5MB4XDTA5MDEyMzA4 NTE0N1oXDTI3MTAwNDA4NTE0N1owYzELMAkGA1UEBhMCVFcxCzAJBgNVBAoTAkFT MUcwRQYDVQQDEz5BY2FkZW1pYSBTaW5pY2EgR3JpZCBDb21wdXRpbmcgQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkgTWVyY3VyeTCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBAMAkxeG2p3ccJjM7LO/nX0NUh1CRB5l0kW5sZ+yGVgY+jDyGjkxQ e3LQH42Rb/Okb6Xzsf7mDYCJacNY3HzyLi9D7dYFWTBcdb0Ey9sGWpZEa+a2qAm3 DDjsMMTnojleNbWzqWEWqQXOtPkFsH6a37E2bnGjnfkdkK4d8Y4YZXeA5B7unH27 XQpQE72vKkrrYfDaVjkbpQ/eDi1/NkYUqaVRr9fweYpgPeCheMQuN6Asaq0HFo/P b3gM4WFhWS1oWukyUh+a4wb0t2Rm3Q2MHxsp0XZWjnj0QFyKuJfNso08YLp06Ycf war6X6f46Ks3ohEroW5+iQZ7sGpnxMQyiCcCAwEAAaOCAV4wggFaMA8GA1UdEwEB /wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR/TZcVl7SNX8DXd6sx dtBfa+JbMDCBjQYDVR0jBIGFMIGCgBR/TZcVl7SNX8DXd6sxdtBfa+JbMKFnpGUw YzELMAkGA1UEBhMCVFcxCzAJBgNVBAoTAkFTMUcwRQYDVQQDEz5BY2FkZW1pYSBT aW5pY2EgR3JpZCBDb21wdXRpbmcgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgTWVy Y3VyeYIBADBDBgNVHREEPDA6gRlhc2djY2FAZ3JpZC5zaW5pY2EuZWR1LnR3hh1o dHRwOi8vY2EuZ3JpZC5zaW5pY2EuZWR1LnR3LzBDBgNVHRIEPDA6gRlhc2djY2FA Z3JpZC5zaW5pY2EuZWR1LnR3hh1odHRwOi8vY2EuZ3JpZC5zaW5pY2EuZWR1LnR3 LzANBgkqhkiG9w0BAQUFAAOCAQEAXGzupdvaXTo1RbMEvX5Lx8/+JTU+bvYQQSIm nPJKrjcBNG2sBKBi8sBlzIqKyOBlNkfr0REkkA9vlcXcKCRJwxmYLGxemOhuqp48 tOo38qCBO7f+Hyzf1Jb/+TfyizBQ/22g06XAYoTiZwnXw+L6AKJ+oyiblLPPo2CT RoDQpJV0RPD9kvVgt2DHGX6wOdHKRZJtKu/zkK3JDopqrUdzx5gw+TNFCNbqxIgA okMhKsEUcUyLu25fOLmh/i92KQ99+g4wBXKKxnkDBaiU2igFZ2y3yEnYYLhkKFp4 O2/dPYVE+41CcQJNYHQKS9Qossw70Xta0SZByAHJTMxXKHqesg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/ASGCCA-2007.crl_url0000644001343500074740000000007415004136150024756 0ustar davidgdavidghttp://ca.grid.sinica.edu.tw/publication/CRL/ASGCCA-crl.pem igtf-policy-installation-bundle-1.135/src/accredited/ASGCCA-2007.signing_policy0000644001343500074740000000036515004136150026334 0ustar davidgdavidg# ASGCCA-2007 signing policy # Date: 31 May 2007 access_id_CA X509 '/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury' pos_rights globus CA:sign cond_subjects globus '"/C=TW/*"' igtf-policy-installation-bundle-1.135/src/accredited/ASGCCA-2007.namespaces0000644001343500074740000000055715004136150025441 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id$ # CA alias : ASGCCA-2007 # subord_of: # subjectDN: /C=TW/O=AS/CN=Academia Sinica Grid Computing Certificate Authority # TO Issuer "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury" \ PERMIT Subject "/C=TW/.*" igtf-policy-installation-bundle-1.135/src/accredited/ASGCCA-2007.info0000644001343500074740000000056015004136150024247 0ustar davidgdavidgalias = ASGCCA-2007 crl_url = http://ca.grid.sinica.edu.tw/publication/CRL/ASGCCA-crl.pem email = ca@lists.grid.sinica.edu.tw status = accredited:classic url = http://ca.grid.sinica.edu.tw/ version = 1.135 sha1fp.0 = 0E:9E:58:74:61:4C:12:16:20:AC:34:07:CD:AD:E9:81:3C:08:61:95 subjectdn = "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury" igtf-policy-installation-bundle-1.135/src/accredited/ArmeSFo.pem0000644001343500074740000000226415004136150024065 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDTDCCAjSgAwIBAgIHZyglcSFmcTANBgkqhkiG9w0BAQUFADA0MQswCQYDVQQG EwJBTTEQMA4GA1UEChMHQXJtZVNGbzETMBEGA1UEAxMKQXJtZVNGbyBDQTAeFw0w MzEyMDEyMzI5MjFaFw0zMDEyMDEyMzI5MjFaMDQxCzAJBgNVBAYTAkFNMRAwDgYD VQQKEwdBcm1lU0ZvMRMwEQYDVQQDEwpBcm1lU0ZvIENBMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAtSzCNZqZokRtnR0nzki6INFx5dbTAyh4JPGgfNB0 iDRKWHekm5vkdnEQeclGsGRb13+3U0OyGoypiD1x07d8TedU1HojmfgR4/xp6ibE j6KfdvDf6wWsu3o7tLXoPHYWadu8NsU/5h715Ox2A7bWP/gl6Spxxc0xaKBCXI8T 5ns7KCSEPpA/Gc27vjrQJ5LgsCv7MjTE1JpL5ZSE9v248vcVLWTCi+H2YKuSDGfe AMn81GSt1ehHLB0547kdqdhVpcmeqporN4+uISRycqS+Vypu63LzYEky+xb0/Ld5 auTEgxTMa+FZB9NlgHkAdYPXRm5DiHfvJsZ1a6Dx/wfrkQIDAQABo2MwYTAPBgNV HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU8ZcKnrnf9cfc lU9YZLg/T17sblcwHwYDVR0jBBgwFoAU8ZcKnrnf9cfclU9YZLg/T17sblcwDQYJ KoZIhvcNAQEFBQADggEBAGnUL4DBYqUdXxTs2KkiqVzqZ8wgnUI68e4HWLlvQsdw Tgk1BoisRBqYXuN80DlBx1V4UUMPYtR3Bvqzs9jSM4amGliEFZO3VOLShd2WtP8v 9tFQxHeqVKjpTavn3K+pN0g6rP/pBYrRYQgXFedLDYlassVNai0ElPIdALt5nvmC MTgZX/A7yIrq6qYN1qpHZf5x+k/JX5nROROb0QsS+eOLlwIuZ6PgPnvGz0GXlQx2 30XYwW9bAcT5wSxpSnHIAprqr6i65K5xn/1BixpFXi1yuOxkoYO3q3/GTLHDv1Ie u8kRergGobhtpZIQ6CL3hfVV9N1eOr91fuS3chZCho4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/ArmeSFo.crl_url0000644001343500074740000000010115004136150024732 0ustar davidgdavidghttp://file.escience.am/crl.pem https://escience.am/file/crl.pem igtf-policy-installation-bundle-1.135/src/accredited/ArmeSFo.signing_policy0000644001343500074740000000021715004136150026315 0ustar davidgdavidg# EACL ArmeSFo CA access_id_CA X509 '/C=AM/O=ArmeSFo/CN=ArmeSFo CA' pos_rights globus CA:sign cond_subjects globus '"/C=AM/O=ArmeSFo/*"' igtf-policy-installation-bundle-1.135/src/accredited/ArmeSFo.namespaces0000644001343500074740000000061715004136150025423 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)d0c2a341.namespaces # CA alias : ArmeSFo # subord_of: # subjectDN: /C=AM/O=ArmeSFo/CN=ArmeSFo CA # hash : d0c2a341 # (generated automatically from ./ArmeSFo/d0c2a341.signing_policy) # TO Issuer "/C=AM/O=ArmeSFo/CN=ArmeSFo CA" \ PERMIT Subject "/C=AM/O=ArmeSFo/.*" igtf-policy-installation-bundle-1.135/src/accredited/ArmeSFo.info0000644001343500074740000000066515004136150024242 0ustar davidgdavidg# # @(#)$Id: d0c2a341.info,v 1.9 2023/10/13 10:24:26 pmacvsdg Exp $ # Information for CA ArmeSFo # obtained from d0c2a341 in ArmeSFo/ alias = ArmeSFo email = escience@aanl.am crl_url = http://file.escience.am/crl.pem;https://escience.am/file/crl.pem url = http://escience.am/ status = accredited:classic version = 1.135 sha1fp.0 = 35:F7:6C:1F:35:1D:8C:38:59:E9:BF:ED:9D:A6:72:C6:5A:51:97:80 subjectdn = "/C=AM/O=ArmeSFo/CN=ArmeSFo CA" igtf-policy-installation-bundle-1.135/src/accredited/BG-ACAD-CA.pem0000644001343500074740000000277115004136151024034 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEPTCCAyWgAwIBAgIJAIOOxzG2rK3KMA0GCSqGSIb3DQEBCwUAMD8xEjAQBgoJ kiaJk/IsZAEZFgJiZzEUMBIGCgmSJomT8ixkARkWBGFjYWQxEzARBgNVBAMTCkJH LkFDQUQgQ0EwHhcNMDcwMjEyMTkwMDAwWhcNMjcwMjExMTkwMDAwWjA/MRIwEAYK CZImiZPyLGQBGRYCYmcxFDASBgoJkiaJk/IsZAEZFgRhY2FkMRMwEQYDVQQDEwpC Ry5BQ0FEIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt0/OaCi/ 0Z1ua/mq2EE+0JJs1LGOP0j+b9xcV/uG04r5KyUFNFRQroJ0kWLRE7NiWOqxXAny FVJJ9GAdhPBpI0tivnMxU74/xM+r1leb9rk7YcavaUodyZXADPrrysCZuKBAPFxf Wi1C5btzDk062/3l3k/Q7FV8IwqWFM0CJsk9Hv7mWFdDPOiFKYEq1fDINshevNC3 VP0e2LMCUtNZRErGMev7KNWfxWmnUHIBiJUdAB3RN+46PqL35QdMPlENfdRUBom3 IHN+WgyhvYPt7urqUnYJpYxbtK4ra1lwyMYnvYjST/DtlsM3QCSIAOYxNLVySlry /stmtAUprgcCbQIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAQYwHQYDVR0OBBYEFNF9YzjHaexWLM7u1W1Od8ej/TRsMB8GA1UdIwQY MBaAFNF9YzjHaexWLM7u1W1Od8ej/TRsMC0GCCsGAQUFBwEBBCEwHzAdBggrBgEF BQcwAoYRaHR0cDovL2NhLmFjYWQuYmcwaQYDVR0fBGIwYDAuoCygKoYoaHR0cDov L2NhLmFjYWQuYmcvY3JsL2JnX2FjYWRfY2EtY3JsLnBlbTAuoCygKoYoaHR0cDov L2NhLmFjYWQuYmcvY3JsL2JnX2FjYWRfY2EtY3JsLmRlcjAXBgNVHSAEEDAOMAwG CiqGSIb3TAUCAgEwIAYDVR0SBBkwF4EVb3BlcmF0aW9uc0BjYS5hY2FkLmJnMA0G CSqGSIb3DQEBCwUAA4IBAQAU+FlvJ5o9uYaIIk8VJP1fk+YTXs2+D/nlqo5GY/QM Ipl9yiF9AM1nbfUph7K+4XT/J7mOJmkT0/ajm1deLQyB3l+2EjZFuEam0gSnFlRn gGJ4ihGom5eaVLFOFoB4dvaxkWxWeMnPnU55UqHIknJRRiNOjkr6VSRECbTc2tO3 HzNQNQFizXlgdm5FkutWSiw/v4IB9RI46KNQgpuHvLGOIITzHB12khEHIWVt+hEQ si7epqj28APdK+3sbcYp853AaGJK7rtchbDVLJkiJb9fnEqAUdoY/Pcna5RH5I9K bwXvTCGXaGzDQOeU9W8UiKd2ux/ruWr+0ayLdvE8PFIp -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/BG-ACAD-CA.crl_url0000644001343500074740000000005515004136151024706 0ustar davidgdavidghttp://www.ca.acad.bg/crl/bg_acad_ca-crl.pem igtf-policy-installation-bundle-1.135/src/accredited/BG-ACAD-CA.signing_policy0000644001343500074740000000035515004136151026264 0ustar davidgdavidg# @(#)$Id$ access_id_CA X509 '/DC=bg/DC=acad/CN=BG.ACAD CA' pos_rights globus CA:sign cond_subjects globus '"/DC=bg/DC=acad/CN=BG.ACAD CA" "/DC=bg/DC=acad/O=people/*" "/DC=bg/DC=acad/O=hosts/*" "/DC=bg/DC=acad/O=services/*"' igtf-policy-installation-bundle-1.135/src/accredited/BG-ACAD-CA.namespaces0000644001343500074740000000110315004136151025356 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)2418a3f3.namespaces # CA alias : BG-ACAD-CA # subord_of: # subjectDN: /DC=bg/DC=acad/CN=BG.ACAD CA # hash : 2418a3f3 # (generated automatically from 2418a3f3.signing_policy) # TO Issuer "/DC=bg/DC=acad/CN=BG.ACAD CA" \ PERMIT Subject "/DC=bg/DC=acad/O=people/.*" TO Issuer "/DC=bg/DC=acad/CN=BG.ACAD CA" \ PERMIT Subject "/DC=bg/DC=acad/O=hosts/.*" TO Issuer "/DC=bg/DC=acad/CN=BG.ACAD CA" \ PERMIT Subject "/DC=bg/DC=acad/O=services/.*" igtf-policy-installation-bundle-1.135/src/accredited/BG-ACAD-CA.info0000644001343500074740000000064215004136151024201 0ustar davidgdavidg# @(#)$Id: 2418a3f3.info,v 1.1 2007/03/07 09:19:23 pmacvsdg Exp $ alias = BG-ACAD-CA url = http://www.ca.acad.bg/ ca_url = http://www.ca.acad.bg/ca_cert/bg_acad_ca-cacert.pem crl_url = http://www.ca.acad.bg/crl/bg_acad_ca-crl.pem email = operations@ca.acad.bg status = accredited:classic version = 1.135 sha1fp.0 = 6E:CF:1B:7B:D4:5B:3A:00:A4:A1:07:9B:21:B2:97:D5:28:8B:8B:3A subjectdn = "/DC=bg/DC=acad/CN=BG.ACAD CA" igtf-policy-installation-bundle-1.135/src/accredited/CERN-GridCA.pem0000644001343500074740000000650215004136151024407 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIJnDCCB4SgAwIBAgIKYQQltAAAAAAACzANBgkqhkiG9w0BAQ0FADBKMQswCQYD VQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UEAxMjQ0VSTiBSb290IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IDIwHhcNMjIwMzI5MDgyNDIyWhcNMzIwMzI5MDgz NDIyWjBWMRIwEAYKCZImiZPyLGQBGRYCY2gxFDASBgoJkiaJk/IsZAEZFgRjZXJu MSowKAYDVQQDEyFDRVJOIEdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIi MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDS9Ypy1csm0aZA4/QnWe2oaiQI LqfeekV8kSSvOhW2peo5cLNIKbXATOo1l2iwIbCWV8SRU2TLKxHIL8fAOJud5n9K mEKBew7nzubl1wG93B4dY0KREdb3/QB/7OkG8ZZvLqrvQZVGT1CgJ+NFFUiJ315D FWkKctZv27LjQamzCxpX+gZSsmwZmSReY67cnm6P7z+/3xVNhwb+4Z+1Ww4vHhMc dh1Dsrkv9vXU01UN752QtQ6l56uQLYEB2+vaHB6IpyC9zAQ/33GulCq8Gbj7ykPd 9AcRVBeJAErSK+oMHThtdLD7mhTkZivakaNe4O1EhPFH0rWwV45IFN7ipELA5qDx djdzo6JtLJQMaSV/TV+amEf2CaKlD0giqGhjfSNiOX5HCmpqV14kbl+7Qho6ykZy b1DGpf70yILnX+AUtdpd8lulTu1yg1Bg5cFQskUIk5+s4nsC1VpmeNxYaeFEcYZj Ph2mdD7zLo889MtF7kZv7+6J6p4NBL3fQ9Os8/h8XVlfDatzbpVH4jYKKAd4nwJb knJaKPE0LzLzVfJBwnDxqe8hb64gI8Frludp+jaOYzvMqlzAe9z4a9971iXIWaaG unbAoEkXj69y7MsvCjWXB7o9HdBaS9FL+ZtXTKCyXl+XLFseYQoQburKr+eTcRed KLJNj4tRF1799PO69wIDAQABo4IEdjCCBHIwEAYJKwYBBAGCNxUBBAMCAQEwIwYJ KwYBBAGCNxUCBBYEFGPCgXhtlBTXUVYziSFk8YWmsNHgMB0GA1UdDgQWBBSloP1m WP253Xrhsp2fo9HlUBiU5zCCAS4GA1UdIASCASUwggEhMIIBHQYKKwYBBAFgCgQB ATCCAQ0wgb4GCCsGAQUFBwICMIGxHoGuAEMARQBSAE4AIABHAHIAaQBkACAAQwBl AHIAdABpAGYAaQBjAGEAdABpAG8AbgAgAEEAdQB0AGgAbwByAGkAdAB5ACAAQwBl AHIAdABpAGYAaQBjAGEAdABlACAAUABvAGwAaQBjAHkAIABhAG4AZAAgAEMAZQBy AHQAaQBmAGkAYwBhAHQAZQAgAFAAcgBhAGMAdABpAGMAZQAgAFMAdABhAHQAZQBt AGUAbgB0MEoGCCsGAQUFBwIBFj5odHRwOi8vY2FmaWxlcy5jZXJuLmNoL2NhZmls ZXMvY3AtY3BzL2Nlcm4tZ3JpZC1jYS1jcC1jcHMucGRmADAZBgkrBgEEAYI3FAIE DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV HSMEGDAWgBT6e/vemw2j8lK3bO1bDwuipqb4BDCCAUQGA1UdHwSCATswggE3MIIB M6CCAS+gggErhlJodHRwOi8vY2FmaWxlcy5jZXJuLmNoL2NhZmlsZXMvY3JsL0NF Uk4lMjBSb290JTIwQ2VydGlmaWNhdGlvbiUyMEF1dGhvcml0eSUyMDIuY3JshoHU bGRhcDovLy9DTj1DRVJOJTIwUm9vdCUyMENlcnRpZmljYXRpb24lMjBBdXRob3Jp dHklMjAyLENOPUNFUk5QS0lST09UMDIsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUy MFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9Y2VybixE Qz1jaD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0P2Jhc2U/b2JqZWN0Q2xhc3M9 Y1JMRGlzdHJpYnV0aW9uUG9pbnQwggFEBggrBgEFBQcBAQSCATYwggEyMGcGCCsG AQUFBzAChltodHRwOi8vY2FmaWxlcy5jZXJuLmNoL2NhZmlsZXMvY2VydGlmaWNh dGVzL0NFUk4lMjBSb290JTIwQ2VydGlmaWNhdGlvbiUyMEF1dGhvcml0eSUyMDIu Y3J0MIHGBggrBgEFBQcwAoaBuWxkYXA6Ly8vQ049Q0VSTiUyMFJvb3QlMjBDZXJ0 aWZpY2F0aW9uJTIwQXV0aG9yaXR5JTIwMixDTj1BSUEsQ049UHVibGljJTIwS2V5 JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1jZXJu LERDPWNoP2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0 aW9uQXV0aG9yaXR5MA0GCSqGSIb3DQEBDQUAA4ICAQAv56iMPo0VUkrHxPYLjfyW IL/TmYxxYldO8kCTKXyaRO4ZmwD6JjLaclTgSHz7gOKFL35ZF0Rv4nWk/ZJBl+dU 1udgBjF/uKK0v0m+7iEIOG0HORCCQCDgayuiLomI5eQp8KTgHrswHWL+ESxa3Hdv vr7GBG/7EhrYwstm/tOJ8cKaeiooSxHw5Lgsqq229SxfO8fSyS8DAa5eUdWT/dVU RDR8lGQShx4R9JOHSDg0y6rE7V0cw/BO3NQuaxMunFXkQprtWneJfR4uugMOKk/v tMhQGCDB7o3CVhLGSb+76Tny+eSa2g+Zv17PGVfhnF9oynkCII+shX9TmOUsDEnS 7MWES58YwnpBZrxdeJVPEzVVuYEZP4QsLrIL1ynFqBwFAnPU48Hs6s+kOI/9BFJz v+Fp/iw8BZSOclpJzA5rkW6yQ7LVfjFBV1CgyhO8GH5jhYBd5ZLvG8eLNm8Gpt+H n30awoaDoMuHcGS5B6NOZLfwE+suTxMw8pjHhKXx7RkSoeZy72PinlbWn1tWLiPa UMdkrb/WHOdMKaadQTDO/VyibBL49iJ8BAlERgIl9QaRDLjAIdD45rLdBe95HxSl zpZqsxuI09eJ8+iLFJhTDH2BODoEuqbn6PB/5z2d5zuG5sr85Vzn81ddapuUT9Ra /dB5eJQeFZ0WjtUOO3gS/A== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/CERN-GridCA.crl_url0000644001343500074740000000011715004136151025264 0ustar davidgdavidghttp://cafiles.cern.ch/cafiles/crl/CERN%20Grid%20Certification%20Authority.crl igtf-policy-installation-bundle-1.135/src/accredited/CERN-GridCA.signing_policy0000644001343500074740000000031415004136151026636 0ustar davidgdavidg# @(#)$Id$ # CERN GridCA access_id_CA X509 '/DC=ch/DC=cern/CN=CERN Grid Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/DC=ch/DC=cern/*"' igtf-policy-installation-bundle-1.135/src/accredited/CERN-GridCA.info0000644001343500074740000000113015004136151024551 0ustar davidgdavidg# @(#)$Id: 4339b4bc.info,v 1.2 2015/03/17 01:26:26 pmacvsdg Exp $ # subject= /DC=ch/DC=cern/CN=CERN Grid Certification Authority alias = CERN-GridCA crl_url = http://cafiles.cern.ch/cafiles/crl/CERN%20Grid%20Certification%20Authority.crl ca_url = http://cafiles.cern.ch/cafiles/certificates/CERN%20Grid%20Certification%20Authority.crt url = http://www.cern.ch/ca email = cern-ca-managers@cern.ch requires = CERN-Root-2 status = accredited:classic version = 1.135 sha1fp.0 = 71:A1:FC:1A:77:68:17:B9:5C:84:89:3A:28:2D:66:70:DC:93:83:CD subjectdn = "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" igtf-policy-installation-bundle-1.135/src/accredited/CERN-Root-2.pem0000644001343500074740000000450215004136152024377 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGqTCCBJGgAwIBAgIQAojDcLlcbrhBX0qrEka4mzANBgkqhkiG9w0BAQ0FADBK MQswCQYDVQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UEAxMjQ0VSTiBSb290 IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDIwHhcNMTMwMzE5MTI1NTM2WhcNMzMw MzE5MTMwNTM0WjBKMQswCQYDVQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UE AxMjQ0VSTiBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDIwggIiMA0GCSqG SIb3DQEBAQUAA4ICDwAwggIKAoICAQDxqYPFW2qVVi3Rw1NKlEf7x70xF+6a8uE/ Tu4ZVQF/K2RXI95QLkYfKItZvy9Az3ib/VlUho5f8fBaqy4n70uwC7+qd3Aq1/xQ ysykPCbBBAsOSQQpTlhrMD2V5Ya9zrirphOhutddiqV96zBCyMM+Gz5uYv9u+cm4 tg1EOmAMGh2UNxfTFNVmXKkk7eFTSC1+zgb28H6nd3xzV27sn9bfOfGh//ZPy5gm Qx0Oh/tc6WMreWzRZBQm5SJiK0QOzPv09p5WmdY2WxZoqNTFBDACQO7ysFOktc74 fPVFX/lmt4jFNSZRIOvvaACI/qlEaAJTR4FHIY9uSMsV8DrtzhI1Ucyv3kqlQpbF jDouq44IryA/np4s/124bW+x8+n/v+at/AxPjvHBLiGhB+J38Z6KcJogoDnGzIXR S+YUr/vGz34jOmkRuDN5STuuAXzyCKFXaoAm0AwjTziIv3E0jxC1taw6FpKevnd1 CLsTLAEUiEjzStFkDhd/Hpipc57zmMFY8VYet2wVqSFjnt2REWOVbZlbCiMHmSeD u5EuZLiU8xlkiaCfn4A5XZ6X0qprbgDviGJtwxzNvTg7Hn0ziW5/ELryfQXCwZJ+ FVne8Zu8sbgy/sDkX+pyFuyB4XgiM0eMNkoexIXJaRdlMWDIL5ysiIXQKjhynAv5 KLHbRjciVwIDAQABo4IBiTCCAYUwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB Af8wHQYDVR0OBBYEFPp7+96bDaPyUrds7VsPC6KmpvgEMBAGCSsGAQQBgjcVAQQD AgEAMIIBMgYDVR0gBIIBKTCCASUwggEhBgorBgEEAWAKBAEBMIIBETCBwgYIKwYB BQUHAgIwgbUegbIAQwBFAFIATgAgAFIAbwBvAHQAIABDAGUAcgB0AGkAZgBpAGMA YQB0AGkAbwBuACAAQQB1AHQAaABvAHIAaQB0AHkAIAAyACAAQwBlAHIAdABpAGYA aQBjAGEAdABlACAAUABvAGwAaQBjAHkAIABhAG4AZAAgAEMAZQByAHQAaQBmAGkA YwBhAHQAZQAgAFAAcgBhAGMAdABpAGMAZQAgAFMAdABhAHQAZQBtAGUAbgB0MEoG CCsGAQUFBwIBFj5odHRwOi8vY2FmaWxlcy5jZXJuLmNoL2NhZmlsZXMvY3AtY3Bz L2Nlcm4tcm9vdC1jYTItY3AtY3BzLnBkZjANBgkqhkiG9w0BAQ0FAAOCAgEAo0Px l4CZ6C6bDH+b6jV5uUO0NIHtvLuVgQLMdKVHtQ2UaxeIrWwD+Kz1FyJCHTRXrCvE OFOca9SEYK2XrbqZGvRKdDRsq+XYts6aCampXj5ahh6r4oQJ8U7aLVfziKTK13Gy dYFoAUeUrlNklICt3v2wWBaa1tg2oSlU2g4iCg9kYpRnIW3VKSrVsdVk2lUa4EXs nTEJ30OS7rqX3SdqZp8G+awtBEReh2XPhRgJ6w3xiScP/UdWYUam2LflCGX3RibB /DZhgGHRRoE4/D0kQMP2XTz6cClbNklECTlp0qZIbiaf350HbcDEFzYRSSIi0emv kRGcMgsi8yTTU87q8Cr4hETxAF3ZbSVNC0ZaTZ8RBbM9BXguhYzKkVBgG/cMpUjs B6tY2HMZbAZ3TKQRb/bRyUigM9DniKWeXkeL/0Nsno+XbcpAqLjtVIRwCg6jTLUi 1NRsl3BP6C824dVaoI8Ry7m+o6O+mtocw4BMhHfTcoWCO8CWjT0ME67JzaAYa5eM +OqoWtgbgweBlfO0/3GMnVGMAmI4FlhH2oWKWQgWdgr0Wgh9K05VcxSpJ87/zjhb MQn/bEojWmp6eUppPaqNFcELvud41qoe6hLsOYQVUQ1sHi7n6ouhg4BAbwS2iyD2 uiA6FHTCeLreFGUzs5osPKiz3GE5D6V9she9xIQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/CERN-Root-2.crl_url0000644001343500074740000000012315004136152025253 0ustar davidgdavidghttp://cafiles.cern.ch/cafiles/crl/CERN%20Root%20Certification%20Authority%202.crl igtf-policy-installation-bundle-1.135/src/accredited/CERN-Root-2.signing_policy0000644001343500074740000000055215004136152026634 0ustar davidgdavidg# @(#)$Id: b4278411.signing_policy,v 1.1 2013/05/21 20:34:25 pmacvsdg Exp $ # CERN Root 2 access_id_CA X509 '/C=ch/O=CERN/CN=CERN Root Certification Authority 2' pos_rights globus CA:sign cond_subjects globus '"/DC=ch/DC=cern/CN=CERN Grid Certification Authority" "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority"' igtf-policy-installation-bundle-1.135/src/accredited/CERN-Root-2.namespaces0000644001343500074740000000140615004136152025735 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id: b4278411.namespaces,v 1.1 2013/05/21 20:34:25 pmacvsdg Exp $ # CA alias : CERN-Root-2 # subjectDN: /C=ch/O=CERN/CN=CERN Root Certification Authority 2 # TO Issuer "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" \ PERMIT Subject "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" TO Issuer "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" \ PERMIT Subject "/DC=ch/DC=cern/.*" TO Issuer "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" \ PERMIT Subject "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" TO Issuer "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" \ PERMIT Subject "/DC=ch/DC=cern/DC=sts/.*" igtf-policy-installation-bundle-1.135/src/accredited/CERN-Root-2.info0000644001343500074740000000111115004136152024542 0ustar davidgdavidg# @(#)$Id: b4278411.info,v 1.1 2013/05/21 20:34:25 pmacvsdg Exp $ # subject= /C=ch/O=CERN/CN=CERN Root Certification Authority 2 alias = CERN-Root-2 crl_url = http://cafiles.cern.ch/cafiles/crl/CERN%20Root%20Certification%20Authority%202.crl ca_url = http://cafiles.cern.ch/cafiles/certificates/CERN%20Root%20Certification%20Authority%202.crt url = http://www.cern.ch/ca email = cern-ca-managers@cern.ch status = accredited:classic version = 1.135 sha1fp.0 = 57:6E:90:75:DD:66:92:8B:F2:5B:D9:52:D6:37:EA:AD:80:84:CC:9F subjectdn = "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-4.pem0000644001343500074740000000354315004136153024200 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFRjCCBC6gAwIBAgIHAPTqVoKaNjANBgkqhkiG9w0BAQsFADBcMRIwEAYKCZIm iZPyLGQBGRYCY3oxGTAXBgoJkiaJk/IsZAEZFgljZXNuZXQtY2ExEjAQBgNVBAoT CUNFU05FVCBDQTEXMBUGA1UEAxMOQ0VTTkVUIENBIFJvb3QwHhcNMTgwNTIwMDc1 NTE1WhcNMjgwNTIyMDc1NTE1WjBZMRIwEAYKCZImiZPyLGQBGRYCY3oxGTAXBgoJ kiaJk/IsZAEZFgljZXNuZXQtY2ExEjAQBgNVBAoMCUNFU05FVCBDQTEUMBIGA1UE AwwLQ0VTTkVUIENBIDQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCH rjWzpA/H7EUpitlDdhTmNCCLHtHUIgGqWcZRKeBiRB6B/8Cjj8r944IExE4/mBON y9O6bXfxdVyYZ8f6+XM5SUp7hoTJoDPASfsZxUIjq6MzApGqLFc/E33TZpe3aUr6 rhUMj5x1DsowHyAwTpER5l02Txq9oJ37IL+KwWJsuM+pCicLRa9fwsQj/5E347tn YSt2Mbdl8lX3yofkXIf3xdtxd071zrCYX93Ss5oNZE48DIoGN8EIKSnMl0IIHzHr 9Zy8w5ze8sof2xi1mE+lj3DbeYG0XKeGf6R2f81+uRnJZoWzJ5Hm4Vz+j/828gLh sXKlLI4SZyJ/cREOmqQHyRQR9MsruRlzn/Vrz2+clppzJZPWfj5pGPXTBx686/eW UvKcxW5TKmD7E+gBdwvBt6js88ZVM/lx607MbOQRLrMc5soh/Yw7QAvm4cP83v7k ErN9xr+ilb41p9YVfXN2ca0I05pPKoRLpgbagFqR6m+ZMABJboTELANtzyZfDk6e q/YK3PT9nQ+9dBccnMS3Eka1kLbGgDUJ6jCr+JT8lYKnoFAG0EVjWwUizNiMAnZe WwiyuzcNG0VslY160GNLqBsyoVne7RQVDQ8obDh06XYxTXKV2kEgxSmumbDE+mEe hGw/fIi3Zdf5CMEvH5ppElOrRRRGl7Q30yN2OkxZFwIDAQABo4IBDjCCAQowDwYD VR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFCeI0UEtDST1m+cx ETfQdu+AVPV4MB8GA1UdIwQYMBaAFJ5BMOPD1U6Mg46jPMl/o20TXYQlMG0GCCsG AQUFBwEBBGEwXzAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AuY2VzbmV0LWNhLmN6 LzA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5jZXNuZXQtY2EuY3ovQ0VTTkVUX0NB X1Jvb3QuY3J0MDsGA1UdHwQ0MDIwMKAuoCyGKmh0dHA6Ly9jcmwuY2VzbmV0LWNh LmN6L0NFU05FVF9DQV9Sb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAvPL4lo8j pfRDiuz+x6mI8hOFHONrbWbowmg1oFs5G9dcUWeu5VnYQk0uVLtUp5koLAAq20kH zMFGrXww7KhOZTxfhTx5RTqflVB4MX++KdnrfpXJ/7ASeKpzY2ltse7o+rcAMcON KygRr4cth9hdv2h02Pga10lr/ewv+mWBl312R+Yv3OdjNEjCQMt93aqGjSmlbZHO 65rn6x9rU9Ua36GKAC8gy3zitOmKOKr1MLrcRNCeCHtkhpL/dUsOUKbKYMxfpg7+ OgjA1WY/3yh07x/YtaOeQEw1ra0GVB0xdpCtrEico85SdD4bFf9+ZqDiPyE1xfo2 G/vfPaHz6dXNuA== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-4.crl_url0000644001343500074740000000005015004136153025047 0ustar davidgdavidghttp://crl.cesnet-ca.cz/CESNET_CA_4.crl igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-4.signing_policy0000644001343500074740000000026315004136153026430 0ustar davidgdavidg# EACL CESNET CA 3 dated 2010.02.12 access_id_CA X509 '/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4' pos_rights globus CA:sign cond_subjects globus '"/DC=cz/DC=cesnet-ca/*"' # igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-4.namespaces0000644001343500074740000000074415004136153025536 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)CESNET-CA-4.signing_policy.namespaces # CA alias : CESNET-CA-4 # subord_of: CESNET-CA-Root # subjectDN: /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4 # hash : CESNET-CA-4.signing_policy # (generated automatically from CESNET-CA-4.signing_policy) # TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-4.info0000644001343500074740000000075615004136153024355 0ustar davidgdavidg# # @($)$Id$ # CN=CESNET CA 4,O=CESNET CA,DC=cesnet-ca,DC=cz # alias = CESNET-CA-4 url = http://www.cesnet.cz/pki/ ca_url = http://crt.cesnet-ca.cz/CESNET_CA_4.crt crl_url = http://crl.cesnet-ca.cz/CESNET_CA_4.crl policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html requires = CESNET-CA-Root email = ca@cesnet.cz status = accredited:classic version = 1.135 sha1fp.0 = 7B:2F:BA:0C:D9:3F:EE:D2:B0:69:1F:53:E7:EB:AD:05:A7:23:FC:74 subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-Root.pem0000644001343500074740000000267015004136153024760 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEDTCCAvWgAwIBAgIJAIf3+gBzaRRPMA0GCSqGSIb3DQEBBQUAMFwxEjAQBgoJ kiaJk/IsZAEZFgJjejEZMBcGCgmSJomT8ixkARkWCWNlc25ldC1jYTESMBAGA1UE ChMJQ0VTTkVUIENBMRcwFQYDVQQDEw5DRVNORVQgQ0EgUm9vdDAeFw0wOTAyMjQx MzE2MDJaFw0yOTAyMjQxMzE2MDJaMFwxEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcG CgmSJomT8ixkARkWCWNlc25ldC1jYTESMBAGA1UEChMJQ0VTTkVUIENBMRcwFQYD VQQDEw5DRVNORVQgQ0EgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAPeL9R8QFCBHw/PlWt2wBnx0cCSiNAhlI7HInrzGmtHK/9MJQJpmcoToq91R Y+hdo7sVddNqbz3F+oeiKavz3wpdCZJtaPI8Sv44OlCtnxeuw0LkSAAfG3maue7X I4jFqCU7/NxcoursXHDMCRLqeKHkast0b4i7d1KOdoc6hMNVaVc1UY/wyimM+Pbh XRW4+iwnmJXlIqCumWaVKF0b1F0WK2LV5TRonsoFNPdVHBU795ObAXRsXWfiKwNK CX85l3AO37UN1wbQ7UvCzE88jYOanRxL1AKezCa1ca8AohqbqoVVtrRPUTMrlXG3 JOBfRaG0+LPXxHwQ9zCjvV/9kFcCAwEAAaOB0TCBzjAdBgNVHQ4EFgQUnkEw48PV ToyDjqM8yX+jbRNdhCUwgY4GA1UdIwSBhjCBg4AUnkEw48PVToyDjqM8yX+jbRNd hCWhYKReMFwxEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcGCgmSJomT8ixkARkWCWNl c25ldC1jYTESMBAGA1UEChMJQ0VTTkVUIENBMRcwFQYDVQQDEw5DRVNORVQgQ0Eg Um9vdIIJAIf3+gBzaRRPMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMA0G CSqGSIb3DQEBBQUAA4IBAQB+vy9hAwzjgjYTnTwfxK03Ze/07GnmulUxUIPOagHJ vGQojnjN3BGnMoXNhQrhhCy1BfKt88sweN/ELkeOsgthbQ24lX7YdgPEPSwY2iIB E0NWxG87+z5hmfo+M69Q9WS8b5aSd4v5pSzT4+s6UW2lsddbdpnI4OwEEVdmj4e1 w0trIAfPsFSKx5jMvC0KzoO04fSAjxTj2bn4orRVWlVGUYmQm/Gq0w//f84zox/g /XjE+kQ+eFOpNeeJC2Tpl04BByskoOw4LybIZ6iSdrUjoLgrK3R1geXo86Sx8QWE VVWM2+1UCVV3AMhYwQUbgasrEPkZ79od6exSUb+ZTpWc -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-Root.crl_url0000644001343500074740000000005315004136153025632 0ustar davidgdavidghttp://crl.cesnet-ca.cz/CESNET_CA_Root.crl igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-Root.signing_policy0000644001343500074740000000046315004136153027212 0ustar davidgdavidg# EACL CESNET CA 3 dated 2010.02.12 access_id_CA X509 '/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root' pos_rights globus CA:sign cond_subjects globus '"/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3" "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4"' # igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-Root.namespaces0000644001343500074740000000134715004136153026316 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)edca0fc0.namespaces # CA alias : CESNET-CA-Root # subord_of: # subjectDN: /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root # hash : edca0fc0 # TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3" TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" igtf-policy-installation-bundle-1.135/src/accredited/CESNET-CA-Root.info0000644001343500074740000000103215004136153025121 0ustar davidgdavidg# # @($)$Id: edca0fc0.info,v 1.2 2010/02/12 21:00:01 pmacvsdg Exp $ # /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root # alias = CESNET-CA-Root url = http://www.cesnet.cz/pki/ ca_url = http://crt.cesnet-ca.cz/CESNET_CA_Root.crt crl_url = http://crl.cesnet-ca.cz/CESNET_CA_Root.crl policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html email = ca@cesnet.cz status = accredited:classic version = 1.135 sha1fp.0 = E7:84:74:90:F7:11:43:FC:CE:F6:F6:5A:30:DA:1F:23:9E:0F:D7:BA subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" igtf-policy-installation-bundle-1.135/src/accredited/DCAROOT-G1.pem0000644001343500074740000000400515004136154024130 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFvzCCA6egAwIBAgIRAIzTbcjoPStBY2+MzzpR5FMwDQYJKoZIhvcNAQELBQAw bDESMBAGCgmSJomT8ixkARkWAm5sMRkwFwYKCZImiZPyLGQBGRYJZHV0Y2hncmlk MSIwIAYDVQQKExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRcwFQYDVQQDEw5E Q0EgUm9vdCBHMSBDQTAeFw0xNjAyMDEwMDAwMDBaFw0zNjAxMzEyMzU5NTlaMGwx EjAQBgoJkiaJk/IsZAEZFgJubDEZMBcGCgmSJomT8ixkARkWCWR1dGNoZ3JpZDEi MCAGA1UEChMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEXMBUGA1UEAxMORENB IFJvb3QgRzEgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCWi+9Z 4gmPVpqobI8o30nIlbL02SXl4hAmjHhL/g6k6Z3/+sD2/GFZuVaHJE5hXx5lmUpk QIS7mtI+ZPEsqNvXH9ksIbli399iyuBoxWt17PBXm9X/PK3ghemmAJ5n3Rs7FlGl Nhsg5Z63E4mqgq1ZPq9ULkE/TUCNE3PAjXiJfwepWxZTVi1OEjxE6joWbqtDtBvA HxtUZ8I8kl52JkGRKwCBSbkKY/VnNGSn/F6+e13GpM4x1RrD1QZ+F1CQlzNvwanJ szD/CcN1cufakpFLjsnwyfmqtfFSQzywZIOFRPCR0KX1qbA6/EZ8FQm24zbAMgZm ZkXjp29qt4QsCvJntDrVDemGocEQsbVg2Z2l1QXmBKlzBVKF0CP4owhVI+uDYWZ9 v1VSiSQVcbyogPkOa1nclJkNwyZ2tX7BxkQh9S3/Bs68lodCJ0JnBWW6k13u0uP7 APA5t90gOooJJpc2LK+bYJWMBdHShB6StB8VCnibMyNTkrLK6qgWS4nExSXBmDVs HPJ+hnXGnpqkfXDoE3yM2iGtE9ArA3FUNgcHfpI3GsX6iaC52fhB33M6DQ6u0U3Z nAdcwR9ZITHcKN3sH6DBMsYsUc0M5U+XUhxtr8B0LWmz0aUIvYKoRk7yNU4fsTwu bn9cx3dNlsIhF6d9Rw/Qa3t13gVCkiYd6xI7nwIDAQABo1wwWjAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUUnwvsoJZSabwCB3vaAWh NTKKKCcwGAYDVR0gBBEwDzANBgsrBgEEAdFCBAIHATANBgkqhkiG9w0BAQsFAAOC AgEAlhWjlk3sFNC4mPXnr+g0j4ILetnPRfFq3a+bhRI4YFpU908Jx8EOkTuyTyt8 SoKkckPAvQil5gx81aEfA1LiINgT9qSf17MWDsf8kKVbEriN+wTR+wL7CM8DYAln d6yrnjSyak1GnTw83ZVzTOKovGCmp0zphM8EJ694blCgBXMxDof24U9j0OCGKgd6 PfBxs0rKsxNAAG11qPTKvJLDPi2ibOWTVp31OeeLL8eSMO1JKsVaGYlQtSdjCjCK Jh60wKPc7rlfqWKG/fIe8Hd+akmh7ugvUNKfn6XUYdar+rLfDswDPoPrOPWlDcwb K5hL1pRlUc41sBmCrm7sKcL/mahjM4+JyhP/rJ9c6PYknSVUT7yRt5PZ1wGn+Vss P/AH1KjIWp9LvFzwbKnh9tSod+gkWvKICRlgNA8iJxbPt6GJGMOv3LBuz0LJexh7 +iDUqgCHhc1TBV8cVF17a7OtedoSggyxglF8i28K+D8JhJLsqdbWQqg1/gc27cdO hHctcUIti+dPE4oVprbGU6GDMk9H0mnafRN9l5i/Lm8bXKjutOXIVk6eOfxiRPUj BxTVYE9VaWhZFeE/UPsQrbwGFHSXO49j54u9nGfNKuXoJwgaB8PCp3h68ytaUqHR F4xPYaquhMQ7oYW7HcQKNXUmij/b4DZ9UunpmZKu13ut80U= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DCAROOT-G1.crl_url0000644001343500074740000000005615004136154025013 0ustar davidgdavidghttp://ca.dutchgrid.nl/dcaroot/g1/crl/crl.crl igtf-policy-installation-bundle-1.135/src/accredited/DCAROOT-G1.signing_policy0000644001343500074740000000065515004136154026373 0ustar davidgdavidg# EACL DutchGrid DCA Root G1 CA access_id_CA X509 '/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA' pos_rights globus CA:sign cond_subjects globus '"/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth"' igtf-policy-installation-bundle-1.135/src/accredited/DCAROOT-G1.namespaces0000644001343500074740000000220415004136154025465 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)dca-root-g1.namespaces # CA alias : DCA Root G1 CA # subord_of: # subjectDN: /DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA # TO Issuer "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" \ PERMIT Subject "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" TO Issuer "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" \ PERMIT Subject "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=users/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=hosts/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=robots/.*" TO Issuer "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" \ PERMIT Subject "/DC=eu/DC=rcauth/DC=rcauth-clients/.*" igtf-policy-installation-bundle-1.135/src/accredited/DCAROOT-G1.info0000644001343500074740000000107015004136154024301 0ustar davidgdavidg# # @(#)$Id: DCAROOT-G1.info,v 1.1 2016/03/16 03:15:13 pmacvsdg Exp $ # Information for DCAROOT-G1, operated by Nikhef # alias = DCAROOT-G1 ca_url = https://ca.dutchgrid.nl/dcaroot/g1/ca/cacert.pem crl_url = http://ca.dutchgrid.nl/dcaroot/g1/crl/crl.crl policy_url = https://ca.dutchgrid.nl/dcaroot/policy/ email = ca@dutchgrid.nl status = accredited:classic url = https://ca.dutchgrid.nl/dcaroot/ version = 1.135 sha1fp.0 = 3C:40:ED:01:2A:05:BB:81:25:CA:05:09:A4:90:08:B3:5D:AC:78:8F subjectdn = "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" igtf-policy-installation-bundle-1.135/src/accredited/DFN-GridGermany-Root.pem0000644001343500074740000000241615004136154026332 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIBAjANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJERTET MBEGA1UEChMKREZOLVZlcmVpbjEQMA4GA1UECxMHREZOLVBLSTEiMCAGA1UEAxMZ REZOLVZlcmVpbiBQQ0EgR3JpZCAtIEcwMTAeFw0xMTAzMzAwMDAwMDBaFw0zMTAz MzAwMDAwMDBaMFgxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAw DgYDVQQLEwdERk4tUEtJMSIwIAYDVQQDExlERk4tVmVyZWluIFBDQSBHcmlkIC0g RzAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzPlF0BAKoXmKNC3G 5cMOeAbSxCqKFONHrWi4fubi7dGHJfr6EJeP+6nEvc+6dM9fnsDYEYt4m4MzXaLb J+9vUdgSOXeoC/2BpluiU36co1QJ6PZIRO3zI2x/4EBa6XueAYpNnO777X5COeRi dBdSSVwUb3TcsHxrZvWXLiFpsittt1Yqr+S5fjIcJiv7umwi9jAIhtSnartLHmK1 50VAgsXfpen3Zex4M/UGVUScAYf75dWZN4qe4J6UNUq87EyiFvR+HQVmoxdJfz7M rAw4AXhoter8dgzk6wQHjAezXAaarTzRKoMmyvAHwkt3oaH63KteBNao29ONpReM V67n0wIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd BgNVHQ4EFgQUluzcrZrD/lCjPCLlPcLF/8rZIsYwHwYDVR0jBBgwFoAUluzcrZrD /lCjPCLlPcLF/8rZIsYwDQYJKoZIhvcNAQEFBQADggEBAHVcWgFfu5xhDuiXokDC /ms/z2K3Eq2r6zvl4FFLVixMKTgLRG7fDf+RwoCpZLdgc3ZobMDyWPj0e4jlzzIG gDE65o2dH4KuvxXBgd2RyV2k8SfRi2kQJScijWDjCbtId/GluNrNUJkVVZH8ciT/ 6wMAw/dnLMIcRxnt3UAgipTyyLbEMwo3rISolY6q5bX1M2ZOZCjnVy/KjuWDPPbj uKRnsHcaO5rrXCiUZOdMXJ8QZ6QWDO9yueNzNMl8An9mZ+SlzoriSt8ct3B4jkjC EJ9E0OSUf6r9lH+5CKTmUOTZV44HNGhOSUOvzT/YA2f675ydssqyynkrwDJ/B+u5 vQU= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DFN-GridGermany-Root.crl_url0000644001343500074740000000006615004136154027212 0ustar davidgdavidghttp://cdp1.pca.dfn.de/grid-root-ca/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.135/src/accredited/DFN-GridGermany-Root.signing_policy0000644001343500074740000000101215004136154030555 0ustar davidgdavidg# EACL DFN-GridGermany-Root # $Id: 1149214e.signing_policy,v 1.1 2005/07/08 14:58:27 pmacvsdg Exp $ # The DFN-GridGermany-Root CA only signs the User and Server sub-CAs # access_id_CA X509 '/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01' pos_rights globus CA:sign cond_subjects globus '"/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein Server CA Grid - G01" "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein User CA Grid - G01" "/C=DE/O=GridGermany/*"' igtf-policy-installation-bundle-1.135/src/accredited/DFN-GridGermany-Root.namespaces0000644001343500074740000000141715004136154027670 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1149214e.namespaces # CA alias : DFN-GridGermany-Root # subord_of: # subjectDN: /C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01 # hash : 1149214e # (generated automatically from ./DFN/1149214e.signing_policy) # TO Issuer "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" \ PERMIT Subject "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein Server CA Grid - G01" TO Issuer "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" \ PERMIT Subject "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein User CA Grid - G01" TO Issuer "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" \ PERMIT Subject "/C=DE/O=GridGermany/.*" igtf-policy-installation-bundle-1.135/src/accredited/DFN-GridGermany-Root.info0000644001343500074740000000105315004136154026500 0ustar davidgdavidg# # @(#)$Id: 1149214e.info,v 1.6 2013/06/06 13:34:51 pmacvsdg Exp $ # Information for CA DFN-GridGermany-Root # obtained from 1149214e in DFN/ alias = DFN-GridGermany-Root ca_url = http://cdp1.pca.dfn.de/grid-root-ca/pub/cacert/cacert.crt crl_url = http://cdp1.pca.dfn.de/grid-root-ca/pub/crl/cacrl.crl email = dfnpca@dfn-cert.de status = accredited:classic url = https://www.pki.dfn.de/grid/ version = 1.135 sha1fp.0 = 30:AB:8B:7C:DA:20:93:E5:59:CE:74:0D:B1:2A:82:38:C8:55:0B:D4 subjectdn = "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" igtf-policy-installation-bundle-1.135/src/accredited/DZeScience.pem0000644001343500074740000000741115004136155024551 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIK7DCCBtSgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMRIwEAYKCZImiZPyLGQB GRYCRFoxEzARBgoJkiaJk/IsZAEZFgNBUk4xGjAYBgNVBAoMEURaIGUtU2NpZW5j ZSBHUklEMRgwFgYDVQQDDA9EWiBlLVNjaWVuY2UgQ0EwHhcNMTEwNjIwMTA0MjI5 WhcNMjYwNjE2MTA0MjI5WjBfMRIwEAYKCZImiZPyLGQBGRYCRFoxEzARBgoJkiaJ k/IsZAEZFgNBUk4xGjAYBgNVBAoMEURaIGUtU2NpZW5jZSBHUklEMRgwFgYDVQQD DA9EWiBlLVNjaWVuY2UgQ0EwggQiMA0GCSqGSIb3DQEBAQUAA4IEDwAwggQKAoIE AQC9zAWjzYAGpoXpGzhY518T4oq72yggzec0v/KU8HKFinf6XnQOHZlIdEPxtopD D8EE4XBRv2YPEIEtybx32ytilpDszb+ddjEvFzzX4rXGepEg5GaBj/wV87hwxuj/ U1T7OtN5uV4S2qhymjOnUVOVgey88Bf6K3FDe0slCTmoCgfc9HRw9JMGPDrv4s/b 3kYjaY9Dx/dF0S0z6qrq7mwx3HuMzgs2pILE/9fJt8d/xSqGa/LRucB5d5OorfAY qdn9gzc0tGaWsIyLWUVTfajAODHTE9/n7eHSS9O+O9z4ZeVC8wuNsxq2HpilaIT8 C1yK0Sjv05y5xCLDBTa/5FMBt5r62CTJ6RneketO5hPZgedL3vBWGhMPVEfypqRC UM7xRD0uaf/giBWwzSurKH7fP8oRX5DkVpjeNayZflc0WnaaM/fU833NqNBjk/Ig ytxeAzxWN9K3ihMm8goCRa3eVxcNC6BVc7f77fcv9piIzqzXbQDLhl+imxPwS0qM 9RAq5djDamRSvRoBnKkI14e8ZCt2xUavoRijx1+958dmWdXvEznZ99KBGR/McArh 0sN+12LyvdyBeHRYSTsbNHttpaeFCTvx3bYn5rUCT1Z/ZN3FQZ06gvmQlcCOuafs fdm3RYDW5yeyakjsBfvAHWSIZtf89m+Sqd2H3s/jkpy8xqLfJ5/gZAXMIwamSUmT 3lr1bmmJMlZ1+8fe3alQ4mJfLMrRMzDLvuCgq+RAodV/SjAbG9jR9MRYl/maBy6G Tl9QwJefy58/ZpHUZ7dBF08aSoftHnwxkTGaws0A1LUhQICv5/0gmF4fUyiUB/Ep oF0k/ydD6d40X175IEmaf5VYYf5QMtnuyW/NNFKl6i6o97BKmm+YPrTrPIxYgRaW hMZG7iYLH0GgH7WxZHzZR3t+jhxy80RHBoLmboIeq70O5OjUV1GesVfJswe1SdSo BqCmXs8wLt+fY/yLaKtF2M8FM4+b8a1qXI5GtlSwkuMyA7cKf5/8YOfYCzGqPIT/ FarDTlj0TpeM0Q9jsOQSsr2cQPXdWSMynm5NNvPJD4RRk7pZoaO1DZFvy+XaRLjn 3YfmeKWJVDDeuW0KnAWRddCLPicKA969WQWCZf9FxphZPWGP1tHgUc0jSkkrBMRy ARSJlJr46OznEkkNIU/b3v3KVdCELS+QWHoq1CnHRM4a8KqKqCAyLH11g76eyWWq MPyEEq6HB/VqeR+ai04YCYjS4lAsFlylTZikOjw7fetEdM4NeDRGsToN2zLoe/mS +fZkI6a4BTZ9VDgUUbp+ZoKy0TTsiAYMWpTAwY1sNIPix98mw9gHG7vYTN3Da2Y/ 2ZhYFpLiUCE4TB3hrMSZ3Is1AgMBAAGjggGxMIIBrTAPBgNVHRMBAf8EBTADAQH/ MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUQem6j+LwKyhUHPQ2cUFBGQNzibww gYgGA1UdIwSBgDB+gBRB6bqP4vArKFQc9DZxQUEZA3OJvKFjpGEwXzESMBAGCgmS JomT8ixkARkWAkRaMRMwEQYKCZImiZPyLGQBGRYDQVJOMRowGAYDVQQKDBFEWiBl LVNjaWVuY2UgR1JJRDEYMBYGA1UEAwwPRFogZS1TY2llbmNlIENBggEBMIGhBggr BgEFBQcBAQSBlDCBkTA8BggrBgEFBQcwAoYwaHR0cHM6Ly9jYS5ncmlkLmFybi5k ei9wa2kvcHViL2NhY2VydC9jYWNlcnQuY3J0MCgGCCsGAQUFBzABhhxodHRwczov L2NhLmdyaWQuYXJuLmR6OjI1NjAvMCcGCCsGAQUFBzAMhhtodHRwczovL2NhLmdy aWQuYXJuLmR6OjgzMC8wPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NhLmdyaWQu YXJuLmR6L3BraS9wdWIvY3JsL2NhY3JsLmNybDANBgkqhkiG9w0BAQUFAAOCBAEA trYv6LD68cG/6ieif9pFTsAW1aI03nP38S66O7KGcapc4/QSlBG2OyFM9d1KTAf8 XOSSyq2Nt9n9T/yTCjAQFNISmLvjxCuiVYXRbg14o5KTbfiNofihDPo1GvNWaZPz kDnmCzdNEsV6Pfo2MD+mrAuuuL3h/YDf/vj6L2CFJX8d4gxNv5M1LZra8hke67LZ w3RDpmfTAxSv8bCo4mPDXagZgZbCvmkO4ZUAnGMBaVrDqh6FXkBFlWxsxYdO8Io8 DV2stLS3qWgzSzeaSScyieQ6EDGPNBB7arGI6WgHTGRwb6PR078VJ2OtTTQxmK2f lOx9+pf2v5pgIupeTNSTbRZldQa+DJnFknOFHq1UeZ3BVva3PLH/Q0pTU1Ly6gCB p5+WjhYRwa9rfa7SivX9kO+E3H24006cbgJmJK8pXS7lytjBhF61Sdf8pbr/5p6E KJxwD4tFiQpgiBaXqmOzrPTx/RmyqRaTOdkB99k9ZcPQ4fuyhEaBybJ2zpBvM3YY G1i9qlueT/LbXbK4Xt6v4DvB1Bu6f6wJg7v2IPjoNXd6R30Yg7iwO/jeR22F9NrH aTVbr5vAiUkmqbrFc2LoyyvUyKAl0+hbYGDqMh7IcGHzxD8txIQa+7zy/pcTSSwX XGCN1y3100/BH0uLXIdVYjlp1mBo6nb0imJRiVzdXAN9KA7uTPUdRkqidH8FYnri 0N6KzOjmLo/8LZ3cFvBCwptR2OukTz4gisaz4cVVcMRInF1lXy6C2dvgZDloUUSm 2lleYGFi83j1+/sVA8fAzW6MAovZy9zTysBepD1HfxND8EpFZQiMri++TKb+vil5 dsuqSU5MnX8R5EOho+IPfKxCUDD6lrMUYhmWgtP9qTj2Y5nX+R1qUZ83u5W0rdDC lx2SfmpYTMmo+zenJtBRmypUT22MRqcW5iPSrQ7lqhXAfeMcbEI6xS7RXKe8nTNe PBLoxPAiqJfiz8Opu1hdpr0SVkVKOrvsbVHA2V+DBXfsiUNhX9Y7/cr7DqduUUep fMcJtmWRbNM6qZiBCiLbQT5PUEYG8rs9d9ltOlSIUJ77aLCt9y2r+kdozy9wKJfR EPhHya6HN37smL8vTPtL0je/ZbIjddb/UPv8AJURoPCvSTiCpZ/2YbniBWTEQRpk WBrrSiG9NYpW9RX/J5zMGYsXfAnB7eEf9gw5ep7Rng2TME6E46gmYU/MBAfzVOLj 3/Vk8YURewNZhmQ4YiaA/chLSM4M4bwtIdJ5lvw6h7CAtsple2H6omEaw6rmClie PPX7cazFsMFPo/WGM+AR7VUYXU5f7dP1xz7rMEKqycvWcYthiIOFHOW/NUkM6/sO D/O1SoLNANuhtlsSix0BuQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DZeScience.crl_url0000644001343500074740000000005415004136155025426 0ustar davidgdavidghttp://ca.grid.arn.dz/pki/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.135/src/accredited/DZeScience.signing_policy0000644001343500074740000000036515004136155027006 0ustar davidgdavidg# EACL - DZ e-Science CA # @(#)$Id$ # access_id_CA X509 '/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA' pos_rights globus CA:sign cond_subjects globus '"/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" "/DC=DZ/DC=ARN/*"' igtf-policy-installation-bundle-1.135/src/accredited/DZeScience.namespaces0000644001343500074740000000065215004136155026107 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)0a49430a.namespaces # CA alias : # subord_of: # subjectDN: /DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA # hash : 0a49430a # (generated automatically from 0a49430a.signing_policy) # TO Issuer "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" \ PERMIT Subject "/DC=DZ/DC=ARN/.*" igtf-policy-installation-bundle-1.135/src/accredited/DZeScience.info0000644001343500074740000000102415004136155024715 0ustar davidgdavidg# # @(#)$Id: 0a49430a.info,v 1.2 2011/09/18 13:30:29 pmacvsdg Exp $ # Information for CA DZ e-Science # alias = DZeScience ca_url = https://ca.grid.arn.dz/pki/pub/cacert/cacert.pem crl_url = http://ca.grid.arn.dz/pki/pub/crl/cacrl.crl policy_url = https://ca.grid.arn.dz/pki/pub/home/cp_cps.htm email = ca@grid.arn.dz status = accredited:classic url = http://www.grid.arn.dz version = 1.135 sha1fp.0 = D8:EF:90:DB:6A:9B:63:47:4C:1D:6E:89:E2:A2:4D:5D:86:FC:2B:2C subjectdn = "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.pemigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-0000644001343500074740000000343215004136156031370 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFEjCCA/qgAwIBAgIQBCaDJ32C1TF3dtfldbGHfDANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMjIwNDEyMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBoMQswCQYDVQQG EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xQDA+BgNVBAMTN0RpZ2lDZXJ0 IEFzc3VyZWQgSUQgR3JpZCBDbGllbnQgUlNBMjA0OCBTSEEyNTYgMjAyMiBDQTEw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSA2t781e6XRlkYWazEuKo Yz3xTp0svtrra6+yZUMBi+VukIbubZIS2i5A8rKNhKokH2n+KkcPW8lGsUzVo6GE A+XUEWxhiQzoEQiAY9vIacKntpPwqaWC9sR/4xha5vllUMZOp6GWlytk0JwuDHzm oIEv0auyauNaACGC/lj6YZhaxKc38ys3ycI5ctZYZ1oXKKAtEva3uJ9nB02jaOWv b263Bifs/yRFQIsFTMmnMD0cN0NM1TFlun62o0XOYWuA6ZGPbBBdk52r66KYW4mo aLMca5V+Ko1Sut8M5N/f6PIruc/HAKAVBEBBh464Sw3w/fpxhCtrXXVgko0zfOhr AgMBAAGjggG5MIIBtTASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQx1t61 SRQ144SCqV4ITNIXyJRVkjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I DzAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwME MHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNl cnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20v RGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0 dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5j cmwwbgYDVR0gBGcwZTAMBgoqhkiG90wFAgIBMA0GCyqGSIb3TAUCAwECMA0GCyqG SIb3TAUCAwMBMA0GCyqGSIb3TAUCAwMDMAwGCmCGSAGG/WwEHwEwDAYKYIZIAYb9 bAQBATAMBgpghkgBhv1sBAECMA0GCSqGSIb3DQEBCwUAA4IBAQBnh1y9wTRC8OyT lN+OpNsyXi9FyNl/4TTbRJzzcg+22mD9kYD+MOBtlOt3Z3EfrhGwcfdMoy41XAhC z5KU43LMn7f2SkpDAnVxkcrQPsfnlvTHDD6vj8z6rJjDzme9iuAUK/RW+QjNINZP Uq5TEZG5MdrHcFO9TnCDPta3GP/IDBu3BLC+W5OJYBOFO0FT9/lFa/sPMjZfD8F1 W5NoFC4jaDjmyhwCWp/Cok9tm/VJEk77WUPnz2oTSJyXrp8gg4UWY1LZsRoZD9H3 JHbAgHkZFNrzGENg5Ep8NGlBjw+4xJSBtL3bWDzmqQ9kEj8pTAbMcMF/USo5+5cV Q6SYr7Uu -----END CERTIFICATE----- ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.crl_urligtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-0000644001343500074740000000011515004136156031363 0ustar davidgdavidghttp://crl4.digicert.com/DigiCertAssuredIDGridClientRSA2048SHA2562022CA1.crl ././@LongLink0000644000000000000000000000017400000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-0000644001343500074740000000060715004136156031371 0ustar davidgdavidg# DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1 Signing Policy access_id_CA X509 '/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" "/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.namespacesigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-0000644001343500074740000000144415004136156031371 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1daf2f3a.namespaces # CA alias : DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1-Classic-2022 # subord_of: DigiCertGridRootCA-Root # subjectDN: /C=US/O=DigiCert, Inc. /CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1 # hash : 1daf2f3a TO Issuer "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.infoigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-0000644001343500074740000000123615004136156031370 0ustar davidgdavidg# # Information for /C=US/O=DigiCert, Inc. /CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1 # alias = DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 ca_url = https://www.digicert-grid.com/DigiCertAssuredIDGridClientRSA2048SHA2562022CA1.pem crl_url = http://crl4.digicert.com/DigiCertAssuredIDGridClientRSA2048SHA2562022CA1.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertAssuredIDRootCA-Root version = 1.135 sha1fp.0 = 95:78:D8:36:3F:CF:2A:BC:58:57:D4:B4:4B:9E:C4:16:0D:95:03:C0 subjectdn = "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.pemigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2020000644001343500074740000000341515004136156031041 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFCTCCA/GgAwIBAgIQDSymB8jXu3DkCklBYX23NTANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMjIwMzEwMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBlMQswCQYDVQQG EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xPTA7BgNVBAMTNERpZ2lDZXJ0 IEFzc3VyZWQgSUQgR3JpZCBUTFMgUlNBMjA0OCBTSEEyNTYgMjAyMiBDQTEwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCxW40b8b0M/383gLp+liJFfopm bEMHGpStfFal+PCDm9wUoBA2Qu3ndHVSZrxi8Stc3ylHIssCkNpFBnYerSay//ps So9eKvt+VGnUCHl7Jfj0S0giS6xP2ff5SiLcyFSw3MjRvDy2g1J+E807rZ5JnsBv r48OisB8ta/3+37AOWZiU4kIPfMeHcNq++j9SjDjjg8KQlafAxxXD+e77tEgvCOT IibLtRQs4g1X6yEMSyY7LYPuouTBcSFN1pCTVfP6s1KZniEjuxykDxkM4D6pYahd Nes/4yJBRlgq/nODwFtLvTuvhsJBChs/htGKB8Nii9Pwe6t1gBcKKM25yOtJAgMB AAGjggGzMIIBrzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQ/ubeMI24T hc3GiCfUeLQGLhKAxDAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAO BgNVHQ8BAf8EBAMCAYYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMHkG CCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQu Y29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGln aUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6 Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmww aAYDVR0gBGEwXzALBglghkgBhv1sAgEwBwYFZ4EMAQEwCAYGZ4EMAQIBMAgGBmeB DAECAjAIBgZngQwBAgMwDAYKKoZIhvdMBQICATANBgsqhkiG90wFAgMDAjAMBgpg hkgBhv1sAR8BMA0GCSqGSIb3DQEBCwUAA4IBAQBRgQaUPAaSOcYB6p2cUfRQOiYr GJL5YcKs3iR6FbyL6niieh9bj8O95Qx7rkZnA3nrFJqagPsgeVnubrpUbn+6qEBT p8bcmtkj4+YY0vF2PZlAqKmT+XzUY51mRLLJCBI4LTuKPwdTsdWJjg7Qt3WufVkM rIKjFSjkjudJYcQ40wMruJQ0B1wLqcrfE6MziD5IcbVitxzYN/DPwHRRjNeeBWaB t4/bnIShpWbZRKi7g8PGd/kqWFOJ7Yf89cGW1I9AQ8E4URgPls0th8azBiGuOXzk rPLOQR+y2ZPpokVyqOkHmKs+HZrDJ9uAxWsG8cj0qFI4oc8O5lPhAjGzrs9j -----END CERTIFICATE----- ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.crl_urligtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2020000644001343500074740000000011215004136156031030 0ustar davidgdavidghttp://crl4.digicert.com/DigiCertAssuredIDGridTLSRSA2048SHA2562022CA1.crl ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2020000644001343500074740000000060115004136156031033 0ustar davidgdavidg# DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1 Signing Policy access_id_CA X509 '/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" "/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.namespacesigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2020000644001343500074740000000143315004136156031037 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)cea3f3be.namespaces # CA alias : DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1-Classic-2022 # subord_of: DigiCertGridRootCA-Root # subjectDN: /C=US/O=DigiCert, Inc. /CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1 # hash : cea3f3be TO Issuer "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.infoigtf-policy-installation-bundle-1.135/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2020000644001343500074740000000122215004136156031033 0ustar davidgdavidg# # Information for /C=US/O=DigiCert, Inc. /CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1 # alias = DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 ca_url = https://www.digicert-grid.com/DigiCertAssuredIDGridTLSRSA2048SHA2562022CA1.pem crl_url = http://crl4.digicert.com/DigiCertAssuredIDGridTLSRSA2048SHA2562022CA1.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertAssuredIDRootCA-Root version = 1.135 sha1fp.0 = DD:E0:C4:B0:5A:36:B1:09:F1:44:ED:51:C5:90:B6:BF:67:E3:05:70 subjectdn = "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertAssuredIDRootCA-Root.pem0000644001343500074740000000250615004136157030026 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe +o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DigiCertAssuredIDRootCA-Root.crl_url0000644001343500074740000000015215004136157030702 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertAssuredIDRootCA.crl http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl igtf-policy-installation-bundle-1.135/src/accredited/DigiCertAssuredIDRootCA-Root.signing_policy0000644001343500074740000000070115004136157032255 0ustar davidgdavidg# DigiCert Assured ID Root CA Signing Policy (Public Trust Anchor) access_id_CA X509 '/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1"' igtf-policy-installation-bundle-1.135/src/accredited/DigiCertAssuredIDRootCA-Root.namespaces0000644001343500074740000000153315004136157031363 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)69105f4f.namespaces # CA alias : DigiCertAssuredIDRootCA-Root # subord_of: # subjectDN: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA # hash : 69105f4f # TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertAssuredIDRootCA-Root.info0000644001343500074740000000112215004136157030171 0ustar davidgdavidg# # Information for:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA # alias = DigiCertAssuredIDRootCA-Root ca_url = http://www.DigiCert-Grid.com/DigiCertAssuredIDRootCA_text.txt crl_url = http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl;http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ version = 1.135 sha1fp.0 = 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43 subjectdn = "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridCA-1G2-Classic-2015.pem0000644001343500074740000000325015004136157027573 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEvDCCA6SgAwIBAgIQDDLx0Sp02Aw8WPQjYJtoXTANBgkqhkiG9w0BAQsFADBs MRMwEQYKCZImiZPyLGQBGRYDY29tMR0wGwYKCZImiZPyLGQBGRYNRGlnaUNlcnQt R3JpZDEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEeMBwGA1UEAxMVRGlnaUNlcnQg R3JpZCBSb290IENBMB4XDTE0MDEwODEyMDAwMFoXDTI5MDEwODEyMDAwMFowbDET MBEGCgmSJomT8ixkARkWA2NvbTEdMBsGCgmSJomT8ixkARkWDURpZ2lDZXJ0LUdy aWQxFjAUBgNVBAoTDURpZ2lDZXJ0IEdyaWQxHjAcBgNVBAMTFURpZ2lDZXJ0IEdy aWQgQ0EtMSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALCwFRVh i4CR3PGtTVjHnyrCiBoaW5VUbMxEJDDfdXZLWmb1arm29gCTdd/IVIiur22dID8h iiEvJbLEN6ikKrYJyrQzwmTYNXSwIaKNNfYRWDQS1i2aEHykE1+81IG5qgkUaWPJ dy1mI7n+BHLHucN25M1CLT695R1ulbA7pcboKc51aVI0r6HqYtGWiNpum/Jlw2el QScJak9NoPEuMk+kPQH+c4gMzL+yMRwDqNGn3Xx4Dm9Ju9lwgM2Drw98iA+s4DnG P1FppgxVx7PTNZzYLhmbVxTLMp34AE22O4iY02/zd8PRAlrNHP7UhTopIfCB+GPr +Inkt5fj2KNqHzkCAwEAAaOCAVgwggFUMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYD VR0PAQH/BAQDAgGGMHUGCCsGAQUFBwEBBGkwZzAkBggrBgEFBQcwAYYYaHR0cDov L29jc3AuZGlnaWNlcnQuY29tMD8GCCsGAQUFBzAChjNodHRwOi8vY2FjZXJ0cy5k aWdpY2VydC5jb20vRGlnaUNlcnRHcmlkUm9vdENBLmNydCAwdwYDVR0fBHAwbjA1 oDOgMYYvaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R3JpZFJvb3RD QS5jcmwwNaAzoDGGL2h0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdy aWRSb290Q0EuY3JsMB0GA1UdDgQWBBQ2WczfPDriSZNPJRJCts/pGR8ytDAfBgNV HSMEGDAWgBQ9yNSzuaF3UJdQEVCoOeUcU2PGcDANBgkqhkiG9w0BAQsFAAOCAQEA a2miBJ5shp9VaF8n9IrLxwzxjT2Kg4YzmsQxuP+kicHOBVaa5njakpnjYMpQ9M3k Wd4L1EAsJ6v06SGiwizzbzo7fCGpUqwlqm7clf7MBKmuIktDuBfV9iSDccg4hIcL RCJ4WMibrqKIj57Iia3jCxzvHW9kV/KfP3+/JsIBzhQYN1I8Rbb3XVBil5bhBtYU /Nxw7TA5wqaDhkoGxCAlOhfizB7LHkzbDckmzqoo855g3NJSZvk7OpE9ddoXNFSn deCCG7oIYBiK2NH7O73Vtgf2d+pHfrj8Z3ZnB9JmjSacRcXldZSNzd5T/S1VIz80 GH1fIzyIXztGhqw+eW9OAw== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridCA-1G2-Classic-2015.crl_url0000644001343500074740000000014215004136157030451 0ustar davidgdavidghttp://crl4.digicert.com/DigiCertGridCA-1-G2.crl http://crl3.digicert.com/DigiCertGridCA-1-G2.crl igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridCA-1G2-Classic-2015.signing_policy0000644001343500074740000000051515004136157032030 0ustar davidgdavidg# DigiCert Grid CA-1 G2 2015 Signing Policy access_id_CA X509 '/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" "/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridCA-1G2-Classic-2015.namespaces0000644001343500074740000000130515004136157031130 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)62c4a178.namespaces # CA alias : DigiCertGridCA-1-G2-Classic-2015 # subord_of: DigiCertGridRootCA-Root # subjectDN: /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2 # hash : 62c4a178 TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridCA-1G2-Classic-2015.info0000644001343500074740000000114015004136157027741 0ustar davidgdavidg# # Information for /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2 # alias = DigiCertGridCA-1G2-Classic-2015 ca_url = http://www.digicert-grid.com/DigiCertGridCA-1G2Update.cer crl_url = http://crl4.digicert.com/DigiCertGridCA-1-G2.crl;http://crl3.digicert.com/DigiCertGridCA-1-G2.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertGridRootCA-Root version = 1.135 sha1fp.0 = 62:2C:7B:96:DA:67:46:CD:B5:C9:35:B8:FE:78:3B:77:35:16:FC:E3 subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridRootCA-Root.pem0000644001343500074740000000252715004136160027065 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDxTCCAq2gAwIBAgIQAmE4fDe0OaWE+qFSUtrI6jANBgkqhkiG9w0BAQUFADBs MRMwEQYKCZImiZPyLGQBGRYDY29tMR0wGwYKCZImiZPyLGQBGRYNRGlnaUNlcnQt R3JpZDEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEeMBwGA1UEAxMVRGlnaUNlcnQg R3JpZCBSb290IENBMB4XDTExMTIwNzEyMDAwMFoXDTM2MTIwNzEyMDAwMFowbDET MBEGCgmSJomT8ixkARkWA2NvbTEdMBsGCgmSJomT8ixkARkWDURpZ2lDZXJ0LUdy aWQxFjAUBgNVBAoTDURpZ2lDZXJ0IEdyaWQxHjAcBgNVBAMTFURpZ2lDZXJ0IEdy aWQgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL1Yym5/ MKraEAE4RKX8Suurhv5isaeNW1GoQV+jCo1fN0DEXWG/SBW27OIJ1slHI3pp68+j pzdzpB7jJ7L25vgkIhKyUvf3VYqFRvdnVCouC3OIknilWO1J/spASh6/BS8tD2Z6 PE/n/NrqMkF6lZZuQuSooicEZkcxCmyM2Vp7XQXe+qCzILYsp5rEX4FXclT0SMiX jVSlR+qKNhinecW6IW1mqSluMY9k/3ze5KmdjnhivJ+EKt9cUk1zMxSr//KjV7XA d4IiQn3wi9sTWCdokVoVTrmMmksVYcjeq3Xcod/LiziqyqHo+c6uMSN5c3Hg2X1O xU2UYWPIE1GQ02kCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E BAMCAYYwHQYDVR0OBBYEFD3I1LO5oXdQl1ARUKg55RxTY8ZwMB8GA1UdIwQYMBaA FD3I1LO5oXdQl1ARUKg55RxTY8ZwMA0GCSqGSIb3DQEBBQUAA4IBAQCTaCdkxfOe gOJmMqoklLIqhaqbuH1D5RDzSsXET3iDABtxbcbuFr8LHEROICWOWVZi3VQih+f1 80wXqRaD8BkCpbKFzFMWCuOUmN5307v06gIjUAfKKyJumdI2WDaHcj65GAU17vdO l8bP35sBNaO+O2ksL9XQfHuEdmkyi8UcdlkG9jQvsV89oMVcom8C7ATDUV7vpGEM +teq7zkw8r6+VzJvNrfykPOLavN/gkKJwlAfa0muPi2E7uxK85059jwSc9ucpyaF H/O8BdLIR2z2UmsAbnraQFMWS0SFvFfUH0BccrAEJ5RvLEMlXBy9haeNLTua7May 2amGScIUFi6R -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridRootCA-Root.crl_url0000644001343500074740000000014015004136160027733 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertGridRootCA.crl http://crl4.digicert.com/DigiCertGridRootCA.crl igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridRootCA-Root.signing_policy0000644001343500074740000000036615004136160031320 0ustar davidgdavidg# DigiCert Grid Root CA Signing Policy access_id_CA X509 '/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2"' igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridRootCA-Root.namespaces0000644001343500074740000000101415004136160030411 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)2694e4f2.namespaces # CA alias : DigiCertGridRootCA-Root # subord_of: # subjectDN: /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA # hash : 2694e4f2 # (generated automatically from 2694e4f2.signing_policy) # TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridRootCA-Root.info0000644001343500074740000000106215004136160027230 0ustar davidgdavidg# # Information for:/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA # alias = DigiCertGridRootCA-Root ca_url = http://www.DigiCert-Grid.com/DigiCertGridRootCA_text.txt crl_url = http://crl3.digicert.com/DigiCertGridRootCA.crl;http://crl4.digicert.com/DigiCertGridRootCA.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ version = 1.135 sha1fp.0 = 02:FB:FF:2E:77:A9:CE:9C:FA:A9:3F:F0:83:0E:3E:80:6F:D0:6F:8D subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridTrustCAG2-Classic.pem0000644001343500074740000000340515004136161030107 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFATCCA+mgAwIBAgIQDglHG7EZWmErtKS1sO1WCTANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMTQwMTA4MTIwMDAwWhcNMjkwMTA4MTIwMDAwWjBkMQswCQYDVQQG EwJVUzEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEZMBcGA1UECxMQd3d3LmRpZ2lj ZXJ0LmNvbTEiMCAGA1UEAxMZRGlnaUNlcnQgR3JpZCBUcnVzdCBDQSBHMjCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMsBrEAAXJEFhz/RP7bYE8g8OdVe EOwjrxmg7pXark39WKA7kS10ZPGYaE8W5/mv05ztMgA0J9vym+ZUtfOadVy/JNiH jKZyiauxkh3TCjQhLfb+5fLQ3/XW8YylNzwcTAlQ2/eEaU0KXJmveXYh9+txcrWI m/aIeHo5r8bpgi31jLRWFKeTdmoMQ3JX8sR5Zn9wuaYjokf3tiufCpF6h1lAH27F xTkW5zkZ1RvdcKPnYQPPwquNIT/zIHb3QPNOOB0K0SDc1dPlWjWKeRgm/V7SBFvy TFcj/zxHP8m5mh8D75jsW1AAKh8tnALFZxva5rr9RiHmwmd+mDsEYAt/eVkCAwEA AaOCAawwggGoMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMHkG CCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQu Y29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGln aUNlcnRBc3N1cmVkSURSb290Q0EucDdjMIGBBgNVHR8EejB4MDqgOKA2hjRodHRw Oi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3Js MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVk SURSb290Q0EuY3JsMEMGA1UdIAQ8MDowOAYKYIZIAYb9bAACBDAqMCgGCCsGAQUF BwIBFhxodHRwczovL3d3dy5kaWdpY2VydC5jb20vQ1BTMB0GA1UdDgQWBBThZRoC A5F+15ZtOIiLnhaRaxFsnjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I DzANBgkqhkiG9w0BAQsFAAOCAQEAKHBUklU69o1g8x7KNsso5ujW+S6Fw/AXLCCr 1aqkUTQ32hyJjVB0/AOnTIi1lCDKPYXdUDj2TIL9fxsSuj2GxGFEWTz6kW+gyKae MvDJifY4TXmx22Mja4DwBjKgUggzvO5Vmf1gz3IZjv67D9SU0TLOhjbcYWKYu19/ +IDLmwV637KkjUgM1asqqtkutfT/d1+j4COTDWSD48OEOk8BiB9Rh+c17Af3yvRV f90aa9NEStSVevR2h9i9rDrleeGNiKqCInvDa3szREdsT78+l4nITWH6os/iZnI+ 4int+r0ifHJjNfL1b5NAxey8kIfNCESo/RnqktuXNptd7reo9A== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridTrustCAG2-Classic.crl_url0000644001343500074740000000014615004136161030767 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertGridTrustCAG2.crl http://crl4.digicert.com/DigiCertGridTrustCAG2.crl igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridTrustCAG2-Classic.signing_policy0000644001343500074740000000041515004136161032341 0ustar davidgdavidg# DigiCert Grid Trust CA G2 Signing Policy access_id_CA X509 '/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridTrustCAG2-Classic.namespaces0000644001343500074740000000143015004136161031441 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)5d9ea26d.namespaces # CA alias : DigiCertGridTrustCAG2-Classic # subord_of: DigiCertAssuredIDRootCA-Root # subjectDN: /C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2 # hash : 5d9ea26d # (generated automatically from 5d9ea26d.signing_policy) # TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" igtf-policy-installation-bundle-1.135/src/accredited/DigiCertGridTrustCAG2-Classic.info0000644001343500074740000000116215004136161030257 0ustar davidgdavidg# # Information for /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Trust CA G2 # alias = DigiCertGridTrustCAG2-Classic ca_url = http://www.digicert-grid.com/DigiCertGridTrustCAG2_text.txt crl_url = http://crl3.digicert.com/DigiCertGridTrustCAG2.crl;http://crl4.digicert.com/DigiCertGridTrustCAG2.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.DigiCert-Grid.com/ requires = DigiCertAssuredIDRootCA-Root version = 1.135 sha1fp.0 = 06:01:40:42:57:78:0C:9F:E6:B3:D9:03:72:80:3F:38:EE:3A:60:6A subjectdn = "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA4B.pem0000644001343500074740000000233115004136161027603 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDZzCCAu2gAwIBAgIQBwelYn2OM9jVwpdPC3gqBDAKBggqhkjOPQQDAzBaMSUw IwYDVQQKExxSZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0MTEwLwYDVQQDEyhS ZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0IEVDQyBSb290IENBMB4XDTIzMDgw ODEyMTIwN1oXDTM4MDExNzIzNTk1OVowVTELMAkGA1UEBhMCTkwxGTAXBgNVBAoT EEdFQU5UIFZlcmVuaWdpbmcxKzApBgNVBAMTIkdFQU5UIFRDUyBBdXRoZW50aWNh dGlvbiBFQ0MgQ0EgNEIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQOYFYCRQYfYhoC XeAuuJgoyY+5UA67wT2jS8p1H4rVkDJU89eA87BKDvgpFp9CNOEderF8koIF75BJ kYnslwcocg0ZrjMWF6RJUksMizR4dAi0CjD+wX86zM6IXpFfl2KjggF7MIIBdzAf BgNVHSMEGDAWgBQnrZtQ2o4LuzRB3t36H6fmsnggLzAOBgNVHQ8BAf8EBAMCAYYw EgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEFBQcDBAYIKwYBBQUH AwIwWQYDVR0fBFIwUDBOoEygSoZIaHR0cDovL2NybC5lbnRlcnByaXNlLnNlY3Rp Z28uY29tL1Jlc2VhcmNoYW5kRWR1Y2F0aW9uVHJ1c3RFQ0NSb290Q0EuY3JsMIGW BggrBgEFBQcBAQSBiTCBhjBUBggrBgEFBQcwAoZIaHR0cDovL2NydC5lbnRlcnBy aXNlLnNlY3RpZ28uY29tL1Jlc2VhcmNoYW5kRWR1Y2F0aW9uVHJ1c3RFQ0NSb290 Q0EuY3J0MC4GCCsGAQUFBzABhiJodHRwOi8vb2NzcC5lbnRlcnByaXNlLnNlY3Rp Z28uY29tMB0GA1UdDgQWBBTS+fFZxNSaA4PLSbhr9qGssbY1+TAKBggqhkjOPQQD AwNoADBlAjEA8QgmSCpEqU9rEuLR6Bo/PzI8X3LVSapLwuI1TCGdsa135+4cYdYj koU7bk2u6GNEAjAECdQEFqHXaltwhgzvzv4fEbaY23c+/WztSJFnYITejqYKbfOK 3YTFHizCGhnmFy4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA4B.crl_url0000644001343500074740000000010415004136161030460 0ustar davidgdavidghttp://crl.enterprise.sectigo.com/GEANTTCSAuthenticationECCCA4B.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA4B.signing_policy0000644001343500074740000000047215004136161032043 0ustar davidgdavidg# EACL for the Research and Education root for the RE community by GEANT access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA4B.namespaces0000644001343500074740000000142215004136161031141 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTTCSAuthenticationECCCA4B.signing_policy.namespaces # CA alias : GEANTTCSAuthenticationECCCA4B # subord_of: ResearchandEducationTrustECCRootCA # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B # hash : GEANTTCSAuthenticationECCCA4B.signing_policy # (generated automatically from GEANTTCSAuthenticationECCCA4B.signing_policy) # TO Issuer "/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA4B.info0000644001343500074740000000126415004136161027761 0ustar davidgdavidg# @(#)$Id$ # GEANT TCS Authentication (ECC) CA 4B - private trust for Research and Education by GEANT # alias = GEANTTCSAuthenticationECCCA4B ca_url = http://crt.enterprise.sectigo.com/GEANTTCSAuthenticationECCCA4B.crt crl_url = http://crl.enterprise.sectigo.com/GEANTTCSAuthenticationECCCA4B.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org requires = ResearchandEducationTrustECCRootCA status = accredited:mics version = 1.135 sha1fp.0 = 7F:BE:B5:74:F1:DA:A1:3D:5E:EA:A6:9B:2B:EE:FB:EA:6D:DF:BD:03 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA5.pem0000644001343500074740000000213715004136162027507 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDDDCCApKgAwIBAgIQJ92EYOH3cvIFojjUTeVkcjAKBggqhkjOPQQDAzBdMQsw CQYDVQQGEwJOTDEZMBcGA1UECgwQR0VBTlQgVmVyZW5pZ2luZzEzMDEGA1UEAwwq UmVzZWFyY2ggYW5kIEVkdWNhdGlvbiBUcnVzdCBFQ0MgUm9vdCBDQSA1MB4XDTI1 MDIxMTE2NTc1NVoXDTQwMDIwODE2NTc1NFowVDELMAkGA1UEBhMCTkwxGTAXBgNV BAoMEEdFQU5UIFZlcmVuaWdpbmcxKjAoBgNVBAMMIUdFQU5UIFRDUyBBdXRoZW50 aWNhdGlvbiBFQ0MgQ0EgNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABBsj8dphDTUa vm16N25EyRatpjZz1l8p5ytpm6+c44zQ4m209ce8b0U53SndekAzzNx3+RX5HU3u wCsNca95XQyc2PPDN/bgPIDI0tmDkSfPSl+zl0DurhlLaqfsR3H4RKOCAR4wggEa MBIGA1UdEwEB/wQIMAYBAf8CAQAwHwYDVR0jBBgwFoAUUgwE55G9Dr4FrSjri8qV nbdPbOowOwYIKwYBBQUHAQEELzAtMCsGCCsGAQUFBzABhh9odHRwOi8vb2NzcC5n ZWFudC1wcnYuaGFyaWNhLmdyMBEGA1UdIAQKMAgwBgYEVR0gADAdBgNVHSUEFjAU BggrBgEFBQcDAgYIKwYBBQUHAwQwRQYDVR0fBD4wPDA6oDigNoY0aHR0cDovL2Ny bC5nZWFudC1wcnYuaGFyaWNhLmdyL0dFQU5ULVRDUy1Sb290LUU1LmNybDAdBgNV HQ4EFgQUhimJ/MCb2L8WNz08HEo52F2/qzswDgYDVR0PAQH/BAQDAgGGMAoGCCqG SM49BAMDA2gAMGUCMHNGIZUF+4GkjQLiMUKo09Tbxa/7TXY16m6Aa1x9G+pI4sMi RP8/JIFAxm6u8iKwOwIxAJlKWZFT/5FWDDZ8kniXdFS+I5j/mSNRan27trqx2eHT Pr78tJjufZkVr5t6UWaqyA== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA5.crl_url0000644001343500074740000000007415004136162030366 0ustar davidgdavidghttp://crl.geant-prv.harica.gr/GEANT-TCS-Client-Auth-E5.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA5.signing_policy0000644001343500074740000000051615004136162031742 0ustar davidgdavidg# EACL for the issuing Client Authentication (ECC) CA for the RE community for GEANT by HARICA access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA5.namespaces0000644001343500074740000000071215004136162031042 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTTCSAuthenticationECCCA5.signing_policy.namespaces # CA alias : GEANTTCSAuthenticationECCCA5 # subord_of: GEANTTCSRETrustECCRootCA5 # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5 # TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationECCCA5.info0000644001343500074740000000127715004136162027665 0ustar davidgdavidg# @(#)$Id$ # GEANT TCS Authentication (ECC) CA 5 - private trust for Research and Education for GEANT by HARICA # alias = GEANTTCSAuthenticationECCCA5 ca_url = https://wiki.geant.org/download/attachments/929693773/GEANT-TCS-Client-Auth-E5.pem crl_url = http://crl.geant-prv.harica.gr/GEANT-TCS-Client-Auth-E5.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository+2025 url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org requires = GEANTTCSRETrustECCRootCA5 status = accredited:mics version = 1.135 sha1fp.0 = 95:45:0E:B1:BB:D3:E0:DE:5A:FC:BE:86:01:12:52:08:00:F7:7A:85 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA4B.pem0000644001343500074740000000452215004136163027644 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGtjCCBJ6gAwIBAgIQJoMhh685pw2NHtppA9akzjANBgkqhkiG9w0BAQwFADBa MSUwIwYDVQQKExxSZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0MTEwLwYDVQQD EyhSZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0IFJTQSBSb290IENBMB4XDTIz MDgwMjE3MzAwMFoXDTM4MDExNzIzNTk1OVowVTELMAkGA1UEBhMCTkwxGTAXBgNV BAoTEEdFQU5UIFZlcmVuaWdpbmcxKzApBgNVBAMTIkdFQU5UIFRDUyBBdXRoZW50 aWNhdGlvbiBSU0EgQ0EgNEIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQCVgXUfFGLVG5OqVZxwU2C+h0SWcNXePoDTOhR9J3cAEb/obbWAmoq1mzE69VVn Tq7VFOIgz7CaDVXH0Z36+79b4EgIC4n/nNLRz3dQ+/F1Dfp9slIN1vOU7xhPF7v5 nLW60QRZCMvyNJz+FPrfNTJwo45IYbgdefGkU21XKDk5daOiCBn8TjrZxvjEoup/ fMXjlbNdYSM4z0zuMgzOu6Gr92F3vCcnoI0CTDvc75/PIFjup86D4JZEfnIUMJpq ltaMbpNuLyPLX9Z2gtMybJbWCiDkiuUPb8GBGdlsw20IHyGpDlnya3fx7eSky6uc HhwIvMZsE/6UXZNFg6Usn3HPK9gfmIoSHFVC3yprsfkVWM06YAN6nqfL+GOLmrQV oPehOhTrq835P8i57IY9aih//nB7c9YiTcKiGgYx5NddoE51QM4+rsMdPjjaejp8 Ln5y2QPWqH0oY3MNauwKr2JA1J17nVl5e02wSCnmwYidp9Rrt0pYxAeIjjuOqUmz DiaKL/wjmZneHY1Qb7iVuF2PMXQPw0KV7WwMz4yfcMPKNhKZEbMxLNNUjQeMeHwq C+IsW1YKgxacNxCf3d2e/9VmFWiEgpN8bwD5bROPoTiV8HEdvsyh8S6LklJ0P7CD bPQVNAHmDnhj9+ZSpGLKj1StuIVSNIvQbfUckW/+ZSBWeQIDAQABo4IBezCCAXcw HwYDVR0jBBgwFoAUdQeUMltyhtLirnX38rGvZ+Ym6RUwDgYDVR0PAQH/BAQDAgGG MBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0lBBYwFAYIKwYBBQUHAwQGCCsGAQUF BwMCMFkGA1UdHwRSMFAwTqBMoEqGSGh0dHA6Ly9jcmwuZW50ZXJwcmlzZS5zZWN0 aWdvLmNvbS9SZXNlYXJjaGFuZEVkdWNhdGlvblRydXN0UlNBUm9vdENBLmNybDCB lgYIKwYBBQUHAQEEgYkwgYYwVAYIKwYBBQUHMAKGSGh0dHA6Ly9jcnQuZW50ZXJw cmlzZS5zZWN0aWdvLmNvbS9SZXNlYXJjaGFuZEVkdWNhdGlvblRydXN0UlNBUm9v dENBLmNydDAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AuZW50ZXJwcmlzZS5zZWN0 aWdvLmNvbTAdBgNVHQ4EFgQUEDLqAuL8z+pWJVSHw5j16IPWxSQwDQYJKoZIhvcN AQEMBQADggIBAEmmd3qRi28yF0z6vZuxRBDMbU5jE1P66P8aam1fXCS5N6IA5M3O kmWW0Kb/iAHwN0BrZbvFhcXiOwjY/Mc/Ql40f9nNqHomB70X0O5twsMw8idBhQHM nY+50N1oW0VdeEUs1DQebJUEkG12lhfZiHWoyWGI6W862tj0riiKzPRrmHF0ei+m z+CTPsutZdLzv2d7J+2kzeYl9nlI5NGgYeKCIObgGkFdq0oSZZpWkZadBn6CGLhH jN6Kd2FEHCXSvrJ2LSWC/pGMcOJIh0auhOGd8i6QmDHxHZ/l8F0fWcS6nM5XbBuV CIAuVdN+gbfwYMM3mD5m3Twkst3U415hlJUovOpv3OnwDZmQIXvlfvK8rblyldrO cbiKK4KeYTzFpmDx0otx2TbVz4sSGd8zOisK1SQHypEYLy1p+7pJpKSewBh2cFWx lSmQo9aNqnpYEfCsBzys+z4zcIN7K+bc0mGX4LzX9jtgQ2YpvMnkonWrEmf/yHQO AG3OzCYH6f2LlxXw+y+yIfgejpTlYEvog2XdkPSsyPh/fzj3FRMwh1ZQx545Exr1 8aJvpdO8sQ9qTYbpSbcp0eTi+cE+31joMsBxWiqAZNm9x/UkpzjilrQy6a/D/UYH 3d/eM8AWQ7kRYogcD5ORfbPKTH1yxDWybsa7Hoqc7mjFK+ZBFqcBTmDY -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA4B.crl_url0000644001343500074740000000010415004136163030515 0ustar davidgdavidghttp://crl.enterprise.sectigo.com/GEANTTCSAuthenticationRSACA4B.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA4B.signing_policy0000644001343500074740000000047215004136163032100 0ustar davidgdavidg# EACL for the Research and Education root for the RE community by GEANT access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA4B.namespaces0000644001343500074740000000142215004136163031176 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTTCSAuthenticationRSACA4B.signing_policy.namespaces # CA alias : GEANTTCSAuthenticationRSACA4B # subord_of: ResearchandEducationTrustRSARootCA # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B # hash : GEANTTCSAuthenticationRSACA4B.signing_policy # (generated automatically from GEANTTCSAuthenticationRSACA4B.signing_policy) # TO Issuer "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA4B.info0000644001343500074740000000126415004136163030016 0ustar davidgdavidg# @(#)$Id$ # GEANT TCS Authentication (RSA) CA 4B - private trust for Research and Education by GEANT # alias = GEANTTCSAuthenticationRSACA4B ca_url = http://crt.enterprise.sectigo.com/GEANTTCSAuthenticationRSACA4B.crt crl_url = http://crl.enterprise.sectigo.com/GEANTTCSAuthenticationRSACA4B.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org requires = ResearchandEducationTrustRSARootCA status = accredited:mics version = 1.135 sha1fp.0 = CE:26:13:AF:EB:4A:D8:EC:10:12:8E:85:4B:57:D8:D5:66:FE:86:66 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA5.pem0000644001343500074740000000405215004136163027541 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF2zCCA8OgAwIBAgIQSDsfJzZWHLTcRB/apM7sfDANBgkqhkiG9w0BAQsFADBd MQswCQYDVQQGEwJOTDEZMBcGA1UECgwQR0VBTlQgVmVyZW5pZ2luZzEzMDEGA1UE AwwqUmVzZWFyY2ggYW5kIEVkdWNhdGlvbiBUcnVzdCBSU0EgUm9vdCBDQSA1MB4X DTI1MDIxMTE3MDAxOFoXDTQwMDIwODE3MDAxN1owVDELMAkGA1UEBhMCTkwxGTAX BgNVBAoMEEdFQU5UIFZlcmVuaWdpbmcxKjAoBgNVBAMMIUdFQU5UIFRDUyBBdXRo ZW50aWNhdGlvbiBSU0EgQ0EgNTCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoC ggGBAJnYax50Z/sKjF74aeYKFGt5g7guuSZuLM+gw8xmIXEwn3egZNca0plFrWue NKIucyIiWP0A8j6+8AQu8Jbq3WBnePVw7nJlWqiV4tLdTv0ifxBQNQ/otIkapyTz hw0+XVrrjLWPGoBROUkKiwTOWkDBSklehFlrERIVXEQGGFtvDjSLilIhc/ONEWiZ uq1sOBB0yR0A7a29Unr5DVVV2k5ZvT2qxe3p3zI7sSNmCfGBonf30bfLPQLbkN66 KVRqlRv+3emk4+gPKTrXkxyiM72/0eEL/6AF6gDzvS8ubsiqy/L7RU5khh9wM7OJ V1pfgyounDdN3IVcJSk7TZvFlIA14ZwcHGHwIUUt/DmiEyOXVRg4NbNvJ2iDLzkY AXxtoyL4gwL6QdEa5wveu0BnklkA+BRY/L8KeZUT3+lgEkNGDr9y4bF2ujJvHrm6 d0Gf5LN8fnKnG55RoJ15L8oNOonOFzBHo4yyfyOh6R0SKt/wy+HnJVw6sjlMROXL ynJZSwIDAQABo4IBHjCCARowEgYDVR0TAQH/BAgwBgEB/wIBADAfBgNVHSMEGDAW gBQkF42dAy09Y9qqToSJwgDx+zECITA7BggrBgEFBQcBAQQvMC0wKwYIKwYBBQUH MAGGH2h0dHA6Ly9vY3NwLmdlYW50LXBydi5oYXJpY2EuZ3IwEQYDVR0gBAowCDAG BgRVHSAAMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDBFBgNVHR8EPjA8 MDqgOKA2hjRodHRwOi8vY3JsLmdlYW50LXBydi5oYXJpY2EuZ3IvR0VBTlQtVENT LVJvb3QtUjUuY3JsMB0GA1UdDgQWBBSDrT4rvBOJjYgJHL8g3F+4MVXq8TAOBgNV HQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBAJQusln5k/0Frdo7oEF8dWUo f4Yso+bMP6/BR/Xhw0B6P/4VW7W2Z/WKYoQt9XAmUxjmfvyz4QMmDbXzoTDAAYZx 1bQwCdObc/RjsJrd+Z48nIZs8ejtWmAJ1mgfkNggOVO5uybgeKkdNR1CYY1j2Rx3 2N34GeSIniWFchRx77MUune7ATI5UOAgjfZPjEQ4PCXJtfts6NsY0SXI8j3uKTAH 8n8jc8uAv+h2pbj6q8RpmxR9IqYirdBXtwEx37fOQBcRT4rUFYX0+suZ+FTenFKZ EwsiupH25ghs8a2f/HklBt8CzrqxPYITaVQQPONyJcaccYSQP0fkljFPzCsDkbc0 DlXFhcJgzHAC+BlKwwJduxgQG9MEIs+66045lIw0QEaaE8sHQJaCn06ej6sSnQl1 kyRidiDaN6g9Xxg2VqAhiHGPlxc08uyrg/JnAcY/Jpy+oYTtyrH0hlDGGrcUpd7C 4fEkCqQ72zw3z2eGnet0IdubW7XVIxGH8/0Tn4QYxksSFamCQZ1aqNl3PNI3Tdpj OCqb08V8++8n19EDUVDDu2OPopTSo1jUr5uzUTiSGa5pSQShOyEyFP0+ilAikNOy BBMGrtjUpzf8Irzc0UBKuUsBCX9h2od1XJq59HsyLSOqV/ZtfL8sM9Hpnhu0r4y3 R41NAh9RdrZyqgdOgYTW -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA5.crl_url0000644001343500074740000000007415004136163030422 0ustar davidgdavidghttp://crl.geant-prv.harica.gr/GEANT-TCS-Client-Auth-R5.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA5.signing_policy0000644001343500074740000000051615004136163031776 0ustar davidgdavidg# EACL for the issuing Client Authentication (RSA) CA for the RE community for GEANT by HARICA access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA5.namespaces0000644001343500074740000000071215004136163031076 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTTCSAuthenticationRSACA5.signing_policy.namespaces # CA alias : GEANTTCSAuthenticationRSACA5 # subord_of: GEANTTCSRETrustRSARootCA5 # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5 # TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSAuthenticationRSACA5.info0000644001343500074740000000127715004136163027721 0ustar davidgdavidg# @(#)$Id$ # GEANT TCS Authentication (RSA) CA 5 - private trust for Research and Education for GEANT by HARICA # alias = GEANTTCSAuthenticationRSACA5 ca_url = https://wiki.geant.org/download/attachments/929693773/GEANT-TCS-Client-Auth-R5.pem crl_url = http://crl.geant-prv.harica.gr/GEANT-TCS-Client-Auth-R5.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository+2025 url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org requires = GEANTTCSRETrustRSARootCA5 status = accredited:mics version = 1.135 sha1fp.0 = 3E:5A:BA:94:11:1B:54:A3:86:19:1F:42:69:AD:1A:59:58:ED:0E:3D subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustECCRootCA5.pem0000644001343500074740000000154715004136164026752 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIICVzCCAd6gAwIBAgIQb+gBOigaal15aezxr5HJrTAKBggqhkjOPQQDAzBdMQsw CQYDVQQGEwJOTDEZMBcGA1UECgwQR0VBTlQgVmVyZW5pZ2luZzEzMDEGA1UEAwwq UmVzZWFyY2ggYW5kIEVkdWNhdGlvbiBUcnVzdCBFQ0MgUm9vdCBDQSA1MB4XDTI1 MDIxMTE2NTMxN1oXDTQ5MDIwNTE2NTMxNlowXTELMAkGA1UEBhMCTkwxGTAXBgNV BAoMEEdFQU5UIFZlcmVuaWdpbmcxMzAxBgNVBAMMKlJlc2VhcmNoIGFuZCBFZHVj YXRpb24gVHJ1c3QgRUNDIFJvb3QgQ0EgNTB2MBAGByqGSM49AgEGBSuBBAAiA2IA BD0OP0bilOGRVvvuC/w48xQA0oLXqDdkw8fBgKQyWa666uE4XM04p1vtzhPP8+LZ 6le9J2tGMZC+T8X4ml+mTNKYviECrdzn6V3PvFQ7tZCxGlY+8dx2wDOLINJZWuJs cKNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRSDATnkb0OvgWtKOuL ypWdt09s6jAdBgNVHQ4EFgQUUgwE55G9Dr4FrSjri8qVnbdPbOowDgYDVR0PAQH/ BAQDAgGGMAoGCCqGSM49BAMDA2cAMGQCMDjStEiK9C8Z4VhUF7XCaGFncSapuauH bGDxVd3jZq5yhXLx+aK2rtrAXeSDWGJ2WQIwXoha7ebrATwM/AjjamSfnNPsBoCZ aw4Nt6eCFocTTsayjRyZRVttf/DjZlUG37+k -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustECCRootCA5.crl_url0000644001343500074740000000006515004136164027625 0ustar davidgdavidghttp://crl.geant-prv.harica.gr/GEANT-TCS-Root-E5.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustECCRootCA5.signing_policy0000644001343500074740000000054615004136164031204 0ustar davidgdavidg# EACL for the Research and Education Root for GEANT TCS Gen5 ECC access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5" "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustECCRootCA5.namespaces0000644001343500074740000000134115004136164030300 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTTCSRETrustECCRootCA5.signing_policy.namespaces # CA alias : GEANTTCSRETrustECCRootCA5 # subord_of: # subjectDN: /C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5 # hash : GEANTTCSRETrustECCRootCA5.signing_policy # (generated automatically from GEANTTCSRETrustECCRootCA5.signing_policy) # TO Issuer "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustECCRootCA5.info0000644001343500074740000000117015004136164027114 0ustar davidgdavidg# @(#)$Id$ # CN=Research and Education Trust ECC Root CA 5,O=GEANT Vereniging,C=NL # alias = GEANTTCSRETrustECCRootCA5 ca_url = https://wiki.geant.org/download/attachments/929693773/GEANT-TCS-Root-E5.pem crl_url = http://crl.geant-prv.harica.gr/GEANT-TCS-Root-E5.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository+2025 url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 2D:1F:B8:B8:78:5B:03:2B:C0:E4:0A:43:83:5E:6F:A2:48:AB:75:2B subjectdn = "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustRSARootCA5.pem0000644001343500074740000000374515004136165027010 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFpzCCA4+gAwIBAgIQaoahBWKIaI3sqxJrpf3qLzANBgkqhkiG9w0BAQsFADBd MQswCQYDVQQGEwJOTDEZMBcGA1UECgwQR0VBTlQgVmVyZW5pZ2luZzEzMDEGA1UE AwwqUmVzZWFyY2ggYW5kIEVkdWNhdGlvbiBUcnVzdCBSU0EgUm9vdCBDQSA1MB4X DTI1MDIxMTE2NTUwOFoXDTQ5MDIwNTE2NTUwN1owXTELMAkGA1UEBhMCTkwxGTAX BgNVBAoMEEdFQU5UIFZlcmVuaWdpbmcxMzAxBgNVBAMMKlJlc2VhcmNoIGFuZCBF ZHVjYXRpb24gVHJ1c3QgUlNBIFJvb3QgQ0EgNTCCAiIwDQYJKoZIhvcNAQEBBQAD ggIPADCCAgoCggIBAJWRLvgwDUtPB5OA+s2zi44U5pGgAvPqrM5fQjGGp+qllAr9 3xV+g3jOd1WH+dDWUSqSZhRyNJe0ejtBKtvW4gKAWIZJoD9erUUTPgzB7UusW8Ux TyFi1wAtZMwkmhECHHj1tzxPy0eDYSWPBDjRicidmb5fHovOXz81VVbKkq2FrZrx OO+xV9bscEedblOjD4FoJv0uUZ0dVT18cO03RLizSMpq/WJ40fvHV5L6FBhbV35i r8CzSUYYvPr9lw+bMdS6+0tu3W3Cn/pQwy3BNr3QFtpqxG0H7GP/7Aicvszg/78v Rj45EUEmO+SZXU/PK/yjAJzz5NI8rdRNwvmEHYXPzwIE+Ve3pFX3OL5nnodbFtNG 0AADkFPo3z8U3DwEAJUHtVCT54UqdxYE6xsWIZopJJr7VjOpvgJ6LkraqehTneKX jJcpcM6mXpLzLjausou/xByZxp8XrIHDn7v3Z7k8l3db2CP38uhnkdXopi9lZZQT iqH1tGnY6WrFOhSV5JhgrJ1RLT8eF8SyBXTEUQULN3ybbXmj65CoYvgV48H2+BaF 9VASTACry8F395FWKpVnW3q0pTKMwl1XvH3WbtoQf3dL2XFz9WonnwAjrWSnn5oU JUM/X2mZLIDko6Ev0OYns7tJ0N1JvrFB6EYYEFZVnSgaIRzdzzRlQOW8RqYdAgMB AAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUJBeNnQMtPWPaqk6E icIA8fsxAiEwHQYDVR0OBBYEFCQXjZ0DLT1j2qpOhInCAPH7MQIhMA4GA1UdDwEB /wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAfJgYu55SB/KF5T8HfAUicClyC3lj 3vfYU/dPL6uvlC4HrtaebDrzl2q0NrR6vdRD2c7jWxCfjr8G70Xi4GQNLgQm2nJT /iE9xi7TRHYlrcL9xUIrKwlpfHbPi2kvu0bWHQd65VbCSbbl5O5SpEmsOttaCrI3 iVfEUKdQGrm56iAUDg5sHCDAQSyc2SZHayldwEbR0LKAM8VBxDxKaNMTrZiyfgqw wf4Ewis9UAPfJ4PMXFM+MXrcFvziQY8H83AXsfbAL0Nu73ZDbS5h+ahxKyx/hTuv Dl6YFq9dlkfyqrz5yqE+R4ZHO7ZAAYgQ8j9w8JAbXmDUGPHfvGLFo4Rhj8vwhXmc EP2MHylYaf12+tIwwfAFe/mvj57NiXIHOKQ6Q6ZP3purnpE8llYHwKoTRZobisSs GK/X5UWMHq6zyu/MYWHGztSoB4kF3/OVVvKk81XVll26Ra6oDHtCsDuAmH8zAiBz Qt2J+agHoPZl1aN3x7x0V2oC77tXJC4dj0M+kXFRCaMn0tHuZFlubUvGYq9MCdVr gyAIJW9DiAduhc9v01TTaxxtSxz4t7o3G0jOecTu/G8fsMY9KmkKgg5ynKDYCX5k rLKRPRUnLSG2coAQ6GsWWhgQbrjBiySvSjUs6fMwDjj3bGsnC0nodyK7DdC/gRjN 1w2xq/0/i/K8i8M= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustRSARootCA5.crl_url0000644001343500074740000000006515004136165027661 0ustar davidgdavidghttp://crl.geant-prv.harica.gr/GEANT-TCS-Root-R5.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustRSARootCA5.signing_policy0000644001343500074740000000054615004136165031240 0ustar davidgdavidg# EACL for the Research and Education Root for GEANT TCS Gen5 RSA access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5" "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustRSARootCA5.namespaces0000644001343500074740000000134115004136165030334 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTTCSRETrustRSARootCA5.signing_policy.namespaces # CA alias : GEANTTCSRETrustRSARootCA5 # subord_of: # subjectDN: /C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5 # hash : GEANTTCSRETrustRSARootCA5.signing_policy # (generated automatically from GEANTTCSRETrustRSARootCA5.signing_policy) # TO Issuer "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTTCSRETrustRSARootCA5.info0000644001343500074740000000117015004136165027150 0ustar davidgdavidg# @(#)$Id$ # CN=Research and Education Trust RSA Root CA 5,O=GEANT Vereniging,C=NL # alias = GEANTTCSRETrustRSARootCA5 ca_url = https://wiki.geant.org/download/attachments/929693773/GEANT-TCS-Root-R5.pem crl_url = http://crl.geant-prv.harica.gr/GEANT-TCS-Root-R5.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository+2025 url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 44:9D:FA:FA:B8:F8:40:CC:1F:9D:7A:F9:BE:93:72:35:14:3C:71:0B subjectdn = "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalCA4.pem0000644001343500074740000000464415004136165027074 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG8DCCBNigAwIBAgIRAKoycu7aGxmmN/byVir07vEwDQYJKoZIhvcNAQEMBQAw gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtK ZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYD VQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTIw MDIxODAwMDAwMFoXDTMzMDUwMTIzNTk1OVowTzELMAkGA1UEBhMCTkwxGTAXBgNV BAoTEEdFQU5UIFZlcmVuaWdpbmcxJTAjBgNVBAMTHEdFQU5UIGVTY2llbmNlIFBl cnNvbmFsIENBIDQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCVokk9 uR1UAJRcNg1NTatsuxEwya7FpTRm5wcbSJqSLeUd5gjI2zHzwjaevHwCjN716blp iyvEVr96aGw2y+FrVo/0yr0+/XoK8WdkB64j3KmOdUttTTXERY1T1vXxvkZhchHl JvD/VVDIt/V/xg2iDpAa2N3SW0SNSyuAGqtVaCTM4eOEgVT1Nyg5VtQJVLujMrvv cW6+1W1rLR2O05FxQtINVnrblTKWotAitEv8yMe9qQr1Fz4sdyVj2cBwEk/zQLok JRCSw981Hoh5kwt4AVMSxjfeSRjx0Wt0C6ioRJ8WAfSWGNDZwnUWZ4nJrW2UWtdJ Z59t2VByBR3e8MlVTVE4pirg3R5lCCIzPhNLQm25Rap/a4m3+e9A+Jnjgfi3XzSB fd+gcMh1xBXK+YOOfbnZW4H8T1Ty9I/HKsUp/isLV8TJsFOLZCyuV14qVfi8jmRU 0wYIK4vQRj2M7VxCyH4MPn6lgnyecIieL0b4gFNWhE2waH2gfigvpQWH6bQuSWIh l0PaRDWFavo1SNTFKdAVQDK7w3Iw3XzOhQnjHgU/idvqd5eaqa2G4VN1vV1pNirC LXJccKK49zDSS1IFMX9iQC4YFxc/BbWRndI3smg05dcYn7Di73B0EzFFO6dyg0WD r2N9G/8fgjv89biSARMNzjtg2XR2cLxdT8PAYwIDAQABo4IBizCCAYcwHwYDVR0j BBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYDVR0OBBYEFLYvVVqwyWAZ788J WtHxE51sjMkEMA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMB0G A1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDA4BgNVHSAEMTAvMC0GBFUdIAAw JTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwUAYDVR0fBEkw RzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUNl cnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYGCCsGAQUFBwEBBGowaDA/BggrBgEF BQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUFkZFRy dXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRwOi8vb2NzcC51c2VydHJ1c3QuY29t MA0GCSqGSIb3DQEBDAUAA4ICAQB7IGXk1vGM4J73d8UD3f71UqLxom42Icu/IP0V nrIRzbAmz+C++7Bir4mqkKWt89dd9ZlIK8Ez5Y97tDEEd2eICo6dTvy5JOxiYsWK iubpyqmW/K0xjUqutANMxxGXQOJn13RnI9OHSxNXng5OoM66O5Eq08vXdcQbXF3i qPf95g94OJVoyFwlmYiIMuV6cOCVNShbGKvFPpNB4p+7vr2FJ7ZeHEmiZKMXO8ex 3Uq5j1riVT/4tCemFz7dSpaCkHJ0xj5Ayknj14+t/lwF7IcOdP9/15uDp8HkgNh9 xXkFqF3wtLkidVvmmbvDmOQiLJL6Hj6MxwEwI7Cf4ZN/UH0eIra7tEgMP+mkdNtR K3tB4lQNLquWBr25PbzMiK5LfXPGL+odDAb/7mE1ClQtg28gohf+Ms9hQ4y2rZSG sYUgh+U++Yn+HlYKI26tl7qB6lFcQb6Prc1SELAEFob8yMFkZ3UnXXLRUkLeM50K WV9s5wu4Rn6Rzp722wdTQoBeaSxZ5bjmT3QerGV2GaRmuYjLxdYGZ5Co07DI+qEJ Tj4mbpHx/OiqD7tR9i3rHpPyTjpD6MhJ3U4EjZfd6UMWGMz3Zcw0tvJe1cLpNRX8 yjTdSxF1/H7ni7/IHkK4trIBuc58YPbZXAfYTcPugPwQE6N7RcfQHA4McFX91SZa DskXUg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalCA4.crl_url0000644001343500074740000000007215004136165027744 0ustar davidgdavidghttp://geant.crl.sectigo.com/GEANTeSciencePersonalCA4.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalCA4.signing_policy0000644001343500074740000000042315004136165031317 0ustar davidgdavidg# EACL for TERENA TCS eScience Personal CA 4 access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalCA4.namespaces0000644001343500074740000000110515004136165030417 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTeSciencePersonalCA4.signing_policy.namespaces # CA alias : GEANTeSciencePersonalCA4 # subord_of: USERTrustRSACertificationAuthority # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4 # hash : GEANTeSciencePersonalCA4.signing_policy # (generated automatically from GEANTeSciencePersonalCA4.signing_policy) # TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalCA4.info0000644001343500074740000000115315004136165027236 0ustar davidgdavidg# # @(#)$Id$ # Information for GEANT TCS service G4 (GEANTeSciencePersonalCA4) # alias = GEANTeSciencePersonalCA4 url = https://wiki.geant.org/display/TCSNT/ ca_url = http://geant.crt.sectigo.com/GEANTeSciencePersonalCA4.crt crl_url = http://geant.crl.sectigo.com/GEANTeSciencePersonalCA4.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository requires = USERTrustRSACertificationAuthority email = tcs-pma@lists.geant.org status = accredited:mics version = 1.135 sha1fp.0 = AD:5F:20:A4:13:B8:31:5F:1C:5F:0C:9A:ED:79:C9:83:15:76:33:06 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalECCCA4.pem0000644001343500074740000000240515004136166027401 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDiDCCAw6gAwIBAgIRAPFVZjGnycu/NlCaWpIPalkwCgYIKoZIzj0EAwMwgYgx CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJz ZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQD EyVVU0VSVHJ1c3QgRUNDIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTIwMDIx ODAwMDAwMFoXDTMzMDUwMTIzNTk1OVowUzELMAkGA1UEBhMCTkwxGTAXBgNVBAoT EEdFQU5UIFZlcmVuaWdpbmcxKTAnBgNVBAMTIEdFQU5UIGVTY2llbmNlIFBlcnNv bmFsIEVDQyBDQSA0MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE3Oad56Xl15SY nK3MmKcZUEu17k4jApQvPwTnGUqFxMbgDvAtxJtWqbKk8qvCOcZ/oCyrHkloS6Nf AiTDTV5bZ6OCAYswggGHMB8GA1UdIwQYMBaAFDrhCYbUzxnClnZ0SXbc4DXGY2Oa MB0GA1UdDgQWBBTt5lFk6mex24xLv7WAJ5g/2CMeZTAOBgNVHQ8BAf8EBAMCAYYw EgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH AwQwOAYDVR0gBDEwLzAtBgRVHSAAMCUwIwYIKwYBBQUHAgEWF2h0dHBzOi8vc2Vj dGlnby5jb20vQ1BTMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy dXN0LmNvbS9VU0VSVHJ1c3RFQ0NDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 LmNvbS9VU0VSVHJ1c3RFQ0NBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 cDovL29jc3AudXNlcnRydXN0LmNvbTAKBggqhkjOPQQDAwNoADBlAjA8KoDpeqid slDXmfwHD7kr0XTY8rOdQBWMzT5uU7nPROEYLK00Dc9w/J4M8CGaLX8CMQDoaX4P os4y0yfmvRAPaFZxyJi1ZHaZh+G0dX7ggOEyMHmT0P57T6TjdfcBr1G/J/M= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalECCCA4.crl_url0000644001343500074740000000007515004136166030263 0ustar davidgdavidghttp://geant.crl.sectigo.com/GEANTeSciencePersonalECCCA4.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalECCCA4.signing_policy0000644001343500074740000000043715004136166031640 0ustar davidgdavidg# EACL for TERENA TCS eScience Personal ECC CA 4 access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalECCCA4.namespaces0000644001343500074740000000101215004136166030730 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTeSciencePersonalECCCA4.signing_policy.namespaces # CA alias : GEANTeSciencePersonalECCCA4 # subord_of: USERTrustECCCertificationAuthority # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4 # hash : GEANTeSciencePersonalECCCA4.signing_policy # TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeSciencePersonalECCCA4.info0000644001343500074740000000131115004136166027546 0ustar davidgdavidg# # @(#)$Id: GEANTeSciencePersonalECCCA4.info,v 1.1 2020/04/23 18:46:41 pmacvsdg Exp $ # Information for GEANT TCS service ECC G4 (GEANTeSciencePersonalECCCA4) # alias = GEANTeSciencePersonalECCCA4 url = https://wiki.geant.org/display/TCSNT/ ca_url = http://geant.crt.sectigo.com/GEANTeSciencePersonalECCCA4.crt crl_url = http://geant.crl.sectigo.com/GEANTeSciencePersonalECCCA4.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository requires = USERTrustECCCertificationAuthority email = tcs-pma@lists.geant.org status = accredited:mics version = 1.135 sha1fp.0 = 9A:93:3E:0E:07:65:97:52:DA:AD:19:B0:1C:72:CA:89:E4:D2:F9:DA subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLCA4.pem0000644001343500074740000000463315004136166025751 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG6jCCBNKgAwIBAgIQN9uaOAbXCsc+ONHf725RKjANBgkqhkiG9w0BAQwFADCB iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMjAw MjE4MDAwMDAwWhcNMzMwNTAxMjM1OTU5WjBKMQswCQYDVQQGEwJOTDEZMBcGA1UE ChMQR0VBTlQgVmVyZW5pZ2luZzEgMB4GA1UEAxMXR0VBTlQgZVNjaWVuY2UgU1NM IENBIDQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCUtBhby5HZ4dxN stR0OaxF/QrC0FENJm59Na5LZzPwXqwTdaq1NJUZwMIrHTXavExQpGqzdqwIKNS0 liyLkTT54vTs5VPh5SYRFtVAX9NLkY+fUIu2icOEGfwlPR6VlYp+kiR2Vj4OwYhy aM0tj66uaTCaAj3Rz99dN1s64Z1jw/wjckCLat/MGHL4crKuQErYyPfoK1s39BR/ gXis0E2anvfmuyAZ3YDOsAyGKpPhEj3Dxuiz5+qpqJIePs3Vgylyx/ZIoJEH/jAq v7GbdVTsSfqyMlnyceF0pyGQ6Yzp1DkLw4Dg26zoOSckLYeICtRziSwzrMu3YLYW VB6h1r0Nw/hnuXMYt6WgLYekfxuwapwbntbw5gAJpK63geBp3Hj7bWnrPb8aLjBz eutA2St+Y6YodQ8PjbhUpaWVMGzz+c2YJK/xbxTAjWUPOdd8cNrM7ilaOrvbSaLz e7aPBFWZMpg1kOva5J91qSdOmS45DHyyfT4Xk2X/3HhFRLkKA/cdJaEYE1I/p0P5 A2qFlMdr+QDx7Uar5Zvsbvrm0gn+MER1uq3xugoweC3iegHwQQh4YupAEamo1vPy n04r3WPn86rLjpe0OLFvlM8CQtvTWV6wOXy3HTnIh8gFGxe/0Wu3XYBtPcJXlBMO aV7NDi69LE9ZiYNF+wBZ6iUgVw3ZRQIDAQABo4IBizCCAYcwHwYDVR0jBBgwFoAU U3m/WqorSs9UgOHYm8Cd8rIDZsswHQYDVR0OBBYEFJoriiLWjQzAKqVvZDM/lmBn FR2yMA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdJQQW MBQGCCsGAQUFBwMBBggrBgEFBQcDAjA4BgNVHSAEMTAvMC0GBFUdIAAwJTAjBggr BgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwUAYDVR0fBEkwRzBFoEOg QYY/aHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmlj YXRpb25BdXRob3JpdHkuY3JsMHYGCCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYz aHR0cDovL2NydC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0Eu Y3J0MCUGCCsGAQUFBzABhhlodHRwOi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqG SIb3DQEBDAUAA4ICAQAmpZcT3x9evRVo7pAAsdyTx3mmtbOGWIAQFQRiW4po1Jx9 9szSmymPrzDq0s1Lh7EL+sworQnNKEApLYpcFZ/ZeyjWPt+7D/SKGdjhFE9owf71 hNiwWBWzMHZWE/1lYpISw2gbclDk6Mp1GkDQhRVXQL5O6uXeouxNiKpAXZj8QFx7 Sk1kkuXewca4dFRTs9Oadec8ARnR+YzxhTE0p3m2rBkWL3zpNCtl+7zpPJm58eCc 8Oxt7ib/XwoZKE/tKKZ6rcA+kBL6X6xeim+DwVqToJW24yiqVAI2JYQw1741fqm8 lklFlkAoOTJTprMd3jIK2DKYvAXkZiAeY8eD85AVCJgC+DpD/0Oc3OpsP5kljGzF 2rUYGLutL1a9Uxd2YCGkqnAym2f2LsBo5u2+Znk5YzfD5xPSWBrs9K5UtE2G+5B0 iygvf+yl/+hcv4aN3zetNXbfsSArAR0ecdNkNtehXeVaFE7rIZUXFahzHn2cSOLO n4vjBWKRHJc4lvlqhfz1jaPrcxS0BxaJq0VNrX3skPeajbVSsPAjXXVDh9I5qjdG yMvAe5TUyUf752JKBN56Zi5mvz5ufbvULGcV4Frnwl2c2ySICF7KGIB+KGhGbgbf tN6PKXHwC3gvRw9yzFSq6Rdwh7U+3AkmDel0rhdZnMTx2JryjQF/AeBKwkfrUQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLCA4.crl_url0000644001343500074740000000006515004136166026625 0ustar davidgdavidghttp://geant.crl.sectigo.com/GEANTeScienceSSLCA4.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLCA4.signing_policy0000644001343500074740000000037315004136166030202 0ustar davidgdavidg# EACL for TERENA TCS SSL CA 4 access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLCA4.namespaces0000644001343500074740000000104715004136166027303 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTeScienceSSLCA4.signing_policy.namespaces # CA alias : GEANTeScienceSSLCA4 # subord_of: USERTrustRSACertificationAuthority # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4 # hash : GEANTeScienceSSLCA4.signing_policy # (generated automatically from GEANTeScienceSSLCA4.signing_policy) # TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLCA4.info0000644001343500074740000000112315004136166026112 0ustar davidgdavidg# # @(#)$Id$ # Information for GEANT TCS service G4 (GEANTeScienceSSLCA4) # alias = GEANTeScienceSSLCA4 url = https://wiki.geant.org/display/TCSNT/ ca_url = http://geant.crt.sectigo.com/GEANTeScienceSSLCA4.crt crl_url = http://geant.crl.sectigo.com/GEANTeScienceSSLCA4.crl policy_url = https://www.terena.org/activities/tcs/repository/ requires = USERTrustRSACertificationAuthority email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = E9:3B:5F:C1:89:2B:69:31:61:84:F1:DD:1E:A0:C5:F7:71:6F:85:96 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLECCCA4.pem0000644001343500074740000000237515004136167026266 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDgjCCAwmgAwIBAgIRAKZyxVx1Z7iXm9Gpc3bygYswCgYIKoZIzj0EAwMwgYgx CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJz ZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQD EyVVU0VSVHJ1c3QgRUNDIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTIwMDIx ODAwMDAwMFoXDTMzMDUwMTIzNTk1OVowTjELMAkGA1UEBhMCTkwxGTAXBgNVBAoT EEdFQU5UIFZlcmVuaWdpbmcxJDAiBgNVBAMTG0dFQU5UIGVTY2llbmNlIFNTTCBF Q0MgQ0EgNDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIluIR/57Gi+A/PBU/HJ Du+ib62ojbmgrFplMIet9FpKgUwqGkcPXoLXPsQqLGA7YjUgDDa7DVdchYDP7UPr bCWjggGLMIIBhzAfBgNVHSMEGDAWgBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAdBgNV HQ4EFgQU5uJP1y+hutmLqFhNiCUY45Ku4HEwDgYDVR0PAQH/BAQDAgGGMBIGA1Ud EwEB/wQIMAYBAf8CAQAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDgG A1UdIAQxMC8wLQYEVR0gADAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3RpZ28u Y29tL0NQUzBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j b20vVVNFUlRydXN0RUNDQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v VVNFUlRydXN0RUNDQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v Y3NwLnVzZXJ0cnVzdC5jb20wCgYIKoZIzj0EAwMDZwAwZAIwOT7r0xcx8SFLchKn /QsiSWlCYaWoEOsaIK+dNrekDE1IvWGWzgAynhka7g08CiULAjBA518/JC2WTcmC lOsIDSQpVv/vs0CVFDGFdL27Dy9z3uBLs9blu8Du5L6IM6mggG4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLECCCA4.crl_url0000644001343500074740000000007015004136167027135 0ustar davidgdavidghttp://geant.crl.sectigo.com/GEANTeScienceSSLECCCA4.crl igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLECCCA4.signing_policy0000644001343500074740000000040715004136167030514 0ustar davidgdavidg# EACL for TERENA TCS SSL ECC CA 4 access_id_CA X509 '/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLECCCA4.namespaces0000644001343500074740000000076115004136167027621 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GEANTeScienceSSLECCCA4.signing_policy.namespaces # CA alias : GEANTeScienceSSLECCCA4 # subord_of: USERTrustECCCertificationAuthority # subjectDN: /C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4 # hash : GEANTeScienceSSLECCCA4.signing_policy # TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/GEANTeScienceSSLECCCA4.info0000644001343500074740000000125015004136167026427 0ustar davidgdavidg# # @(#)$Id: GEANTeScienceSSLECCCA4.info,v 1.1 2020/04/23 18:46:41 pmacvsdg Exp $ # Information for GEANT TCS service G4 (GEANTeScienceSSLECCCA4) # alias = GEANTeScienceSSLECCCA4 url = https://wiki.geant.org/display/TCSNT/ ca_url = http://geant.crt.sectigo.com/GEANTeScienceSSLECCCA4.crt crl_url = http://geant.crl.sectigo.com/GEANTeScienceSSLECCCA4.crl policy_url = https://www.terena.org/activities/tcs/repository/ requires = USERTrustECCCertificationAuthority email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 81:6A:8A:8C:3D:ED:B3:E8:5C:40:61:B5:A3:85:61:39:10:9D:FE:0A subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" igtf-policy-installation-bundle-1.135/src/accredited/GridCanada.pem0000644001343500074740000000276515004136170024556 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEOTCCAyGgAwIBAgICJQEwDQYJKoZIhvcNAQELBQAwSDELMAkGA1UEBhMCQ0Ex DTALBgNVBAoTBEdyaWQxKjAoBgNVBAMTIUdyaWQgQ2FuYWRhIENlcnRpZmljYXRl IEF1dGhvcml0eTAeFw0wNjAxMTIyMTI5MDdaFw0yNzA3MTIyMTI5MDdaMEgxCzAJ BgNVBAYTAkNBMQ0wCwYDVQQKEwRHcmlkMSowKAYDVQQDEyFHcmlkIENhbmFkYSBD ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC62G4m818bcqI6KJSnor83mod/SddQCn8h7Pm35b/S1BqSIX25kPXwtR2s LajU9steVyPepCu41Vu7IugaVDwLKyrMb8+8q1h3+QuqgmArkUIQ80mm3C6gTte8 f9dZU09QWxCaCkNwUrs4dNnsKgOAojj2WHC9/NsRTQgOU3+BTWgk/sV7g/zMLKNp Fsx/KwDw4LJcCnVOw25h4YqtgP8PrLpxevUZePmfaKO5IXWJTeq52XJvKhvEka6b fYIBzKWPS1TKfzPGs+rH07+6pVpVzLRyNL1FQU2a8k/zcYvuiiXa8N6JtVf9K7fH H9oJsP2om6xPqqu5RSkr6MwElv1LAgMBAAGjggErMIIBJzAPBgNVHRMBAf8EBTAD AQH/MB0GA1UdDgQWBBTorBLxIO7I149MagHRpgK/zq6ZGDBxBgNVHSMEajBogBTo rBLxIO7I149MagHRpgK/zq6ZGKFMpEowSDELMAkGA1UEBhMCQ0ExDTALBgNVBAoT BEdyaWQxKjAoBgNVBAMTIUdyaWQgQ2FuYWRhIENlcnRpZmljYXRlIEF1dGhvcml0 eYICJQEwDgYDVR0PAQH/BAQDAgEGMBsGA1UdEQQUMBKBEGNhQGdyaWRjYW5hZGEu Y2EwGwYDVR0SBBQwEoEQY2FAZ3JpZGNhbmFkYS5jYTA4BgNVHR8EMTAvMC2gK6Ap hidodHRwOi8vd3d3LmdyaWRjYW5hZGEuY2EvY2EvYmZmYmQ3ZDAucjAwDQYJKoZI hvcNAQELBQADggEBAC0cCgk8iIZkOtzWpWTBirOlLG/nxL54Him9igT+h8tJrsnR oILg5D68FcFldh0p2D+m56AlP0C/1E1TdJJmAs3LcTR93H8FAV5434SXD9uByFZ9 pCm1xGdIoRu3v0qhGLavunewg9z49dZcJ91t5raILEHLCRMymEeY7wssYx9gcKEH UDKODQejF2XmG4mx26E+NAJOWbRtcueVSUCk5fK3pW/pfijAYfxEl8KL9jjWLIzu t82lOO14sk4y8ruYR9e+8mviYGoaVfBZ/NGUzLpfSN3p3m6hwF3SwrGFQWYTpmH6 gb50lwXR4aESY49IB52tuRbunKsTakIBc47kJoo= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/GridCanada.crl_url0000644001343500074740000000005015004136170025420 0ustar davidgdavidghttp://www.gridcanada.ca/ca/bffbd7d0.r0 igtf-policy-installation-bundle-1.135/src/accredited/GridCanada.signing_policy0000644001343500074740000000026715004136170027005 0ustar davidgdavidg# $Id$ access_id_CA X509 '/C=CA/O=Grid/CN=Grid Canada Certificate Authority' pos_rights globus CA:sign cond_subjects globus '"/C=CA/O=Grid/*"' igtf-policy-installation-bundle-1.135/src/accredited/GridCanada.namespaces0000644001343500074740000000070715004136170026106 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)bffbd7d0.signing_policy.namespaces # CA alias : Canada # subord_of: # subjectDN: /C=CA/O=Grid/CN=Grid Canada Certificate Authority # hash : bffbd7d0.signing_policy # (generated automatically from bffbd7d0.signing_policy) # TO Issuer "/C=CA/O=Grid/CN=Grid Canada Certificate Authority" \ PERMIT Subject "/C=CA/O=Grid/.*" igtf-policy-installation-bundle-1.135/src/accredited/GridCanada.info0000644001343500074740000000073115004136170024717 0ustar davidgdavidg# # @(#)$Id: bffbd7d0.info,v 1.2 2006/02/13 15:47:46 pmacvsdg Exp $ # Information for CA GridCanada new CA "bffbd7d0" alias = GridCanada ca_url = http://www.gridcanada.ca/ca/bffbd7d0.0 crl_url = http://www.gridcanada.ca/ca/bffbd7d0.r0 url = http://www.gridcanada.ca/ca email = ca@gridcanada.ca status = accredited:classic version = 1.135 sha1fp.0 = EC:7C:F3:83:F3:B5:55:99:48:76:3E:66:AA:02:C6:FC:1D:CC:83:5E subjectdn = "/C=CA/O=Grid/CN=Grid Canada Certificate Authority" igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSECC1.pem0000644001343500074740000000223015004136170025251 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDNzCCArygAwIBAgIQQv3c4SYWB+Gl5pNaQAFh3TAKBggqhkjOPQQDAzBsMQsw CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v dCBDQSAyMDIxMB4XDTI1MDEwMzExMTQyMVoXDTM5MTIzMTExMTQyMFowYDELMAkG A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj aCBJbnN0aXR1dGlvbnMgQ0ExGDAWBgNVBAMMD0dFQU5UIFRMUyBFQ0MgMTB2MBAG ByqGSM49AgEGBSuBBAAiA2IABANPWLwh0Za2UqtbLV7/qNRm78zsttgSuvhn73bU GtxETsVOEZeMUfMjgHw8EwrsSJI9oj0CgZQFFSEY1NJfcxA/NJiOYJUKPsFbpOrY dr0q4g+aBZsXWeh7bMCzx24g/aOCAS0wggEpMBIGA1UdEwEB/wQIMAYBAf8CAQAw HwYDVR0jBBgwFoAUyRtTgRL+BNUW0aq8mm+3oJUZbsowTQYIKwYBBQUHAQEEQTA/ MD0GCCsGAQUFBzAChjFodHRwOi8vY3J0LmhhcmljYS5nci9IQVJJQ0EtVExTLVJv b3QtMjAyMS1FQ0MuY2VyMBEGA1UdIAQKMAgwBgYEVR0gADAdBgNVHSUEFjAUBggr BgEFBQcDAgYIKwYBBQUHAwEwQgYDVR0fBDswOTA3oDWgM4YxaHR0cDovL2NybC5o YXJpY2EuZ3IvSEFSSUNBLVRMUy1Sb290LTIwMjEtRUNDLmNybDAdBgNVHQ4EFgQU 6ZkGjRcfq/uWGlrIW15dXuzanI8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMD A2kAMGYCMQD2M1caaY2OwmthgmANUQg3LBLI0/2LiCdxa2zNq0G59wVzbjEk0cR/ px52OegIwRACMQCk+iTmBlR6Xfv6igiiaFiPYfN2HfbcYLWbot5DZ2H1b4JVJV+V rga7uu50SDG9hf4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSECC1.crl_url0000644001343500074740000000005515004136170026135 0ustar davidgdavidghttp://crl.harica.gr/HARICA-GEANT-TLS-E1.crl igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSECC1.signing_policy0000644001343500074740000000047615004136170027517 0ustar davidgdavidg# EACL for the HARICA OV TLS ECC ICA (GEANT TCS Gen5) access_id_CA X509 '/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSECC1.namespaces0000644001343500074740000000077315004136170026621 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HARICAGEANTTLSECC1.namespaces # CA alias : HARICAGEANTTLSECC1 # subord_of: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021 # subjectDN: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1 # TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSECC1.info0000644001343500074740000000126015004136170025425 0ustar davidgdavidg# @(#)HARICAGEANTTLSECC1 Issuing CA GEANT TCS Gen5 OV dedicated # /C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1 # alias = HARICAGEANTTLSECC1 ca_url = https://repo.harica.gr/certs/HARICA-GEANT-TLS-E1.der crl_url = http://crl.harica.gr/HARICA-GEANT-TLS-E1.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository+2025 url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org requires = HARICATLSECCRootCA2021 status = accredited:classic version = 1.135 sha1fp.0 = CC:73:33:46:67:05:F1:43:BE:7D:76:DD:B8:E7:74:40:7A:3D:91:C8 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSRSA1.pem0000644001343500074740000000414315004136171025312 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGBTCCA+2gAwIBAgIQFNV782kiKCGaVWf6kWUbIjANBgkqhkiG9w0BAQsFADBs MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg Um9vdCBDQSAyMDIxMB4XDTI1MDEwMzExMTUwMFoXDTM5MTIzMTExMTQ1OVowYDEL MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl YXJjaCBJbnN0aXR1dGlvbnMgQ0ExGDAWBgNVBAMMD0dFQU5UIFRMUyBSU0EgMTCC AaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAKEEaZSzEzznAPk8IEa17GSG yJzPTj4cwRY7/vcq2BPT5+IRGxQtaCdgLXIEl2cdPdIkj2eyakFmgMjAtyeju8V8 dRayQCD/bWjJ7thDlowgLljQaXirxnYbT8bzRHAhCZqBakYgi5KWw9dANLyDHGpX UdY259ab0lWEaFE5Uu6IzQSMJOAy4l/Twym8GUiy0qMDEBFSlm31C9BXpdHKKAlh vIjMiKoDeTWl5vZaLB2MMRGY1yW2ftPgIP0/MkX1uFITlvHmmMTngxplH1nybEIJ FiwHg1KiLk1TprcZgeO2gxE5Lz3wTFWrsUlAzrh5xWmscWkjNi/4BpeuiT5+NExF czboLnXOfjuci/7bsnPi1/aZN/iKNbJRnngFoLaKVMmqCS7Xo34f+BITatryQZFE u2oDKExQGlxDBCfYMLgLucX/onpLzUSgeQITNLx6i5tGGbUYH+9Dy3GI66L/5tPj qzlOsydki8ZYGE5SBJeWCZ2IrhUe0WzZ2b6Zhk6JAQIDAQABo4IBLTCCASkwEgYD VR0TAQH/BAgwBgEB/wIBADAfBgNVHSMEGDAWgBQKSCOmYKSSCjPqk1vFV+olTb0S 7jBNBggrBgEFBQcBAQRBMD8wPQYIKwYBBQUHMAKGMWh0dHA6Ly9jcnQuaGFyaWNh LmdyL0hBUklDQS1UTFMtUm9vdC0yMDIxLVJTQS5jZXIwEQYDVR0gBAowCDAGBgRV HSAAMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATBCBgNVHR8EOzA5MDeg NaAzhjFodHRwOi8vY3JsLmhhcmljYS5nci9IQVJJQ0EtVExTLVJvb3QtMjAyMS1S U0EuY3JsMB0GA1UdDgQWBBSGAXI/jKlw4jEGUxbOAV9becg8OzAOBgNVHQ8BAf8E BAMCAYYwDQYJKoZIhvcNAQELBQADggIBABkssjQzYrOo4GMsKegaChP16yNe6Sck cWBymM455R2rMeuQ3zlxUNOEt+KUfgueOA2urp4j6TlPbs/XxpwuN3I1f09Luk5b +ZgRXM7obE6ZLTerVQWKoTShyl34R2XlK8pEy7+67Ht4lcJzt+K6K5gEuoPSGQDP ef+fUfmXrFcgBMcMbtfDb9dubFKNZZxo5nAXiqhFMOIyByag3H+tOTuH8zuId9pH RDsUpAIHJ9/W2WBfLcKav7IKRlNBRD/sPBy903J9WHPKwl8kQSDA+aa7XCYk7bJt Eyf+7GM9F5cZ7+YyknXqnv/rtQEkTKZdQo5Us18VFe9qqj94tXbLdk7PejJYNB4O Zlli44Ld7rtqfFlUych7gIxFOmiyxMQQYrYmUi+74lEZvfoNhuref0CupuKpz6O3 dLv6kO9T10uNdDBoBQTkge3UzHafTIe3R2o3ujXKUGPwyc9m7/FETyKLUCwSU/5O AVOeBCU8QtkKKjM8AmbpKpe3pHWcyq3R7B3LmIALkMPTydyDfxen65IDqREbVq8N xjhkJThUz40JqOlN6uqKqeDISj/IoucYwsqW24AlO7ZzNmohQmMi8ep23H4hBSh0 GBTe2XvkuzaNf92syK8l2HzO+13GLCjzYLTPvXTO9UpK8DGyfGZOuamuwbAnbNpE 3RfjV9IaUQGJ -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSRSA1.crl_url0000644001343500074740000000005515004136171026171 0ustar davidgdavidghttp://crl.harica.gr/HARICA-GEANT-TLS-R1.crl igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSRSA1.signing_policy0000644001343500074740000000047615004136171027553 0ustar davidgdavidg# EACL for the HARICA OV TLS RSA ICA (GEANT TCS Gen5) access_id_CA X509 '/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSRSA1.namespaces0000644001343500074740000000077315004136171026655 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HARICAGEANTTLSRSA1.namespaces # CA alias : HARICAGEANTTLSRSA1 # subord_of: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021 # subjectDN: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1 # TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/HARICAGEANTTLSRSA1.info0000644001343500074740000000126015004136171025461 0ustar davidgdavidg# @(#)HARICAGEANTTLSRSA1 Issuing CA GEANT TCS Gen5 OV dedicated # /C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1 # alias = HARICAGEANTTLSRSA1 ca_url = https://repo.harica.gr/certs/HARICA-GEANT-TLS-R1.der crl_url = http://crl.harica.gr/HARICA-GEANT-TLS-R1.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository+2025 url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org requires = HARICATLSRSARootCA2021 status = accredited:classic version = 1.135 sha1fp.0 = BE:7F:0B:36:F8:8A:22:DD:DE:D3:62:DB:9A:F7:9C:8E:65:82:B9:19 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1" igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSECC.pem0000644001343500074740000000235115004136171024663 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDcjCCAvigAwIBAgIQbIPKxKaS8zQphK9yBQyPDDAKBggqhkjOPQQDAzBsMQsw CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v dCBDQSAyMDIxMB4XDTIxMDMxOTA5MzM1MloXDTM2MDMxNTA5MzM1MVowYjELMAkG A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj aCBJbnN0aXR1dGlvbnMgQ0ExGjAYBgNVBAMMEUhBUklDQSBPViBUTFMgRUNDMHYw EAYHKoZIzj0CAQYFK4EEACIDYgAECLBRkImpVT10VjeoeRvNhOsxxQe+XVQO37r8 PPKVlSWR/+78tD+FMEUTLGGjVUd4+KFCM2Yc2V3fZyoQIaxUzbhUYwIavuaF0V9l t0cfPISZ1rcQEHn3yAr1ON1eoT3jo4IBZzCCAWMwEgYDVR0TAQH/BAgwBgEB/wIB ADAfBgNVHSMEGDAWgBTJG1OBEv4E1RbRqryab7eglRluyjBUBggrBgEFBQcBAQRI MEYwRAYIKwYBBQUHMAKGOGh0dHA6Ly9yZXBvLmhhcmljYS5nci9jZXJ0cy9IQVJJ Q0EtVExTLVJvb3QtMjAyMS1FQ0MuY2VyMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8G CCsGAQUFBwIBFiNodHRwOi8vcmVwby5oYXJpY2EuZ3IvZG9jdW1lbnRzL0NQUzAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwQgYDVR0fBDswOTA3oDWgM4Yx aHR0cDovL2NybC5oYXJpY2EuZ3IvSEFSSUNBLVRMUy1Sb290LTIwMjEtRUNDLmNy bDAdBgNVHQ4EFgQUvrSdrMbKJ79Ox9kcg/5aTh6XB58wDgYDVR0PAQH/BAQDAgGG MAoGCCqGSM49BAMDA2gAMGUCMQCBJIThQHLwid4SHT+YoWXd7tEFwKf6OsIX+M4U fh2/UAp8bCiB7D/lcAvFj9YPajcCME5DsmcLbYE7D44HlLoqVcr7RDdh84nG6Dsp 8+YS3BnKAIONAWeGq4jawr3lD667Mw== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSECC.crl_url0000644001343500074740000000005615004136171025544 0ustar davidgdavidghttp://crl.harica.gr/HARICA-OV-TLS-Sub-E1.crl igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSECC.signing_policy0000644001343500074740000000050215004136171027113 0ustar davidgdavidg# EACL for the HARICA OV TLS ECC ICA (GEANT TCS Gen5) access_id_CA X509 '/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSECC.namespaces0000644001343500074740000000076715004136171026232 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HARICAOVTLSECC.namespaces # CA alias : HARICAOVTLSECC # subord_of: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021 # subjectDN: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC # TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSECC.info0000644001343500074740000000104215004136171025031 0ustar davidgdavidg# @(#)HARICAOVTLSECC Issuing CA GEANT TCS Gen5 OV Base # alias = HARICAOVTLSECC ca_url = https://repo.harica.gr/certs/HARICA-OV-TLS-Sub-E1.der crl_url = http://crl.harica.gr/HARICA-OV-TLS-Sub-E1.crl policy_url = https://repo.harica.gr/procedures url = https://www.harica.gr/ email = tcs-pma@lists.geant.org requires = HARICATLSECCRootCA2021 status = accredited:classic version = 1.135 sha1fp.0 = 15:5C:A9:53:5D:FE:9B:16:3E:20:1E:71:7F:C9:B0:DE:1E:49:FD:2C subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSRSA.pem0000644001343500074740000000454315004136172024724 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGwTCCBKmgAwIBAgIQHEYUQ2gTTV1QnQ3HytsfuDANBgkqhkiG9w0BAQsFADBs MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg Um9vdCBDQSAyMDIxMB4XDTIxMDMxOTA5MzQxN1oXDTM2MDMxNTA5MzQxNlowYjEL MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl YXJjaCBJbnN0aXR1dGlvbnMgQ0ExGjAYBgNVBAMMEUhBUklDQSBPViBUTFMgUlNB MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBjrEt4NmTflA4DbZjPC HIHeSKt4GSvZrb8Wr9K/xCe/US+tRc7lMvp0SJSxtfEbb9tNo5I99YYegbgT2JOo 8E/d7fblR/x25dHORtfe2xAO8liK8aswTmb69QXIP81zNnC7juFWgnfDZg8Loz7m O8qcKeYS7pejngD4YeiVTf3j2jyJ5BI4Y24IWwcO9Er1hW282He04eQTa9z3Ta9K 00jG7foADE9q9ZOgPAiNV3tDzsaGC5HftgdmJurC/t+SD7wTLNSOGeCBf0g3jIhE QW8FAZYp4OpytgVk8yEtos0izSIXqJn9AMG/HH21EO2tb6S09+8NZEFGh/+GoGuD vDW2Nhw6FZm/yctI6nvJI4t2du39gyXql15w6ENucbM8nAyn3rcx6sHAjjgGZw98 PRnaXXj3lMWvRSpWbBBrV0cj7eJaVFhDR+OG/2jPi8xqXaFaFGvInGW43HpQDAE5 ATZ+8uywd1S8jA484TmyKr2XUx3OIwvpRxZDy0GvHWiqq03liS/d83vFVvZRq34H AMKSeLpLt6XpucnwNWJyv5RvmzsTzKfL/XrwJ9tkXWWp+sqGuScZNZApKMUhS+7w NKv84eX/YBKmtuQch6Xgbw0D8JjBk4my35qLw4wGhX8AM1gVErcotCrMwswiSTLy XJxm/VX2p8xRWCgrS49G2eMCAwEAAaOCAWcwggFjMBIGA1UdEwEB/wQIMAYBAf8C AQAwHwYDVR0jBBgwFoAUCkgjpmCkkgoz6pNbxVfqJU29Eu4wVAYIKwYBBQUHAQEE SDBGMEQGCCsGAQUFBzAChjhodHRwOi8vcmVwby5oYXJpY2EuZ3IvY2VydHMvSEFS SUNBLVRMUy1Sb290LTIwMjEtUlNBLmNlcjBEBgNVHSAEPTA7MDkGBFUdIAAwMTAv BggrBgEFBQcCARYjaHR0cDovL3JlcG8uaGFyaWNhLmdyL2RvY3VtZW50cy9DUFMw HQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMEIGA1UdHwQ7MDkwN6A1oDOG MWh0dHA6Ly9jcmwuaGFyaWNhLmdyL0hBUklDQS1UTFMtUm9vdC0yMDIxLVJTQS5j cmwwHQYDVR0OBBYEFOCbPX01Y8XsnQdzqKeJIPRPhPujMA4GA1UdDwEB/wQEAwIB hjANBgkqhkiG9w0BAQsFAAOCAgEAbd2n5s7VSvUO8NUXH11Ml5Pdh+W+AaWEJdwG 8qtnSX+/WL33OsJx1YN5jNjSoEWK4kswoEvrrMP7rg8w920kL5lzgoByQbP3jrJL Pj4LnvuqIFj6lz9eMA1kgYqy5BvnepQB/smx58K/CNadvXhtxSU+PuIgoaoKexHM 9AWAMIIKFkE/SbYd8lR2mzp5rgeSD+rYExOxvpG/f713fDFRTH+SyqMREw34d2rD dtSBK5GerrV1F7C//KGM016EWCz59kutui8qyZJNq7dw1BChbEo1ho9ekN5nQ8t/ ckF7lJkrMoYRyZobJbQs45BfDMXyRFT4u4N1Z+2GyEvgryqlIQfQ3SUamELnQ6Ta 3oia4pLt/SYrRJOJ3I1EhlMgmi9dS/vCiXcDoMqConepk3/gDFtf8NatbQk2+vBW mkTcSxlAktWFFu3iAN+0hOPQWDtXofUecFVLwNzAFMhVFw8yd9h8AuM3ThZPNSW1 0IFer8+cEkvBy2VBbg2MtXn3Duu3NGJk9xf1e752048foDAfrRcuPTZdijtvRFJ+ G1d/8t9mQqer39S8HONbR+1Zx6KjlFbTkq+Jaivcg6X1JapDjDG8PMiaPX8WE5Tt jmZ8mSoDuXjqXaQ03VFrr+IweD985Ryq/eDM79dQc8SawzNwzLdNkmczMhLfE9ut wIHJbMg= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSRSA.crl_url0000644001343500074740000000005615004136172025600 0ustar davidgdavidghttp://crl.harica.gr/HARICA-OV-TLS-Sub-R1.crl igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSRSA.signing_policy0000644001343500074740000000050215004136172027147 0ustar davidgdavidg# EACL for the HARICA OV TLS RSA ICA (GEANT TCS Gen5) access_id_CA X509 '/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" "/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSRSA.namespaces0000644001343500074740000000076715004136172026266 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HARICAOVTLSRSA.namespaces # CA alias : HARICAOVTLSRSA # subord_of: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021 # subjectDN: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA # TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/HARICAOVTLSRSA.info0000644001343500074740000000104215004136172025065 0ustar davidgdavidg# @(#)HARICAOVTLSRSA Issuing CA GEANT TCS Gen5 OV Base # alias = HARICAOVTLSRSA ca_url = https://repo.harica.gr/certs/HARICA-OV-TLS-Sub-R1.der crl_url = http://crl.harica.gr/HARICA-OV-TLS-Sub-R1.crl policy_url = https://repo.harica.gr/procedures url = https://www.harica.gr/ email = tcs-pma@lists.geant.org requires = HARICATLSRSARootCA2021 status = accredited:classic version = 1.135 sha1fp.0 = 0E:B2:CA:9D:D9:89:CF:6E:A0:89:EF:48:10:05:80:E7:5F:E4:52:90 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSECCRootCA2021.pem0000644001343500074740000000154315004136173025777 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIICVDCCAdugAwIBAgIQZ3SdjXfYO2rbIvT/WeK/zjAKBggqhkjOPQQDAzBsMQsw CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v dCBDQSAyMDIxMB4XDTIxMDIxOTExMDExMFoXDTQ1MDIxMzExMDEwOVowbDELMAkG A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj aCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgRUNDIFJvb3Qg Q0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABDgI/rGgltJ6rK9JOtDA4MM7 KKrxcm1lAEeIhPyaJmuqS7psBAqIXhfyVYf8MLA04jRYVxqEU+kw2anylnTDUR9Y STHMmE5gEYd103KUkE+bECUqqHgtvpBBWJAVcqeht6NCMEAwDwYDVR0TAQH/BAUw AwEB/zAdBgNVHQ4EFgQUyRtTgRL+BNUW0aq8mm+3oJUZbsowDgYDVR0PAQH/BAQD AgGGMAoGCCqGSM49BAMDA2cAMGQCMBHervjcToiwqfAircJRQO9gcS3ujwLEXQNw SaSS6sUUiHCm0w2wqsosQJz76YJumgIwK0eaB8bRwoF8yguWGEEbo/QwCZ61IygN nxS2PFOiTAZpffpskcYqSUXm7LcT4Tps -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSECCRootCA2021.crl_url0000644001343500074740000000006215004136173026653 0ustar davidgdavidghttp://crl.harica.gr/HARICA-TLS-Root-2021-ECC.crl igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSECCRootCA2021.signing_policy0000644001343500074740000000071015004136173030226 0ustar davidgdavidg# EACL for the HARICA TLS ECC Root CA 2021 access_id_CA X509 '/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021" "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1"' igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSECCRootCA2021.namespaces0000644001343500074740000000167115004136173027337 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HARICATLSECCRootCA2021.namespaces # CA alias : HARICATLSECCRootCA2021 # subjectDN: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021 # TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021" \ PERMIT Subject "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021" \ PERMIT Subject "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSECCRootCA2021.info0000644001343500074740000000112215004136173026142 0ustar davidgdavidg# @(#)HARICATLSECCRootCA2021 self-signed root # alias = HARICATLSECCRootCA2021 ca_url = https://repo.harica.gr/certs/HARICA-TLS-Root-2021-ECC.der crl_url = http://crl.harica.gr/HARICA-TLS-Root-2021-ECC.crl policy_url = https://repo.harica.gr/procedures url = https://www.harica.gr/ email = tcs-pma@lists.geant.org requires = HellenicAcademicandResearchInstitutionsECCRootCA2015 status = accredited:classic version = 1.135 sha1fp.0 = BC:B0:C1:9D:E9:98:92:70:19:38:57:E9:8D:A7:B4:5D:6E:EE:01:48 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021" igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSRSARootCA2021.pem0000644001343500074740000000374115004136173026034 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFpDCCA4ygAwIBAgIQOcqTHO9D88aOk8f0ZIk4fjANBgkqhkiG9w0BAQsFADBs MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTUzOFoXDTQ1MDIxMzEwNTUzN1owbDEL MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgUlNBIFJv b3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvC569l mwVnlskNJLnQDmT8zuIkGCyEf3dRywQRNrhe7Wlxp57kJQmXZ8FHws+RFjZiPTgE 4VGC/6zStGndLuwRo0Xua2s7TL+MjaQenRG56Tj5eg4MmOIjHdFOY9TnuEFE+2uv a9of08WRiFukiZLRgeaMOVig1mlDqa2YUlhu2wr7a89o+uOkXjpFc5gH6l8Cct4M pbOfrqkdtx2z/IpZ525yZa31MJQjB/OCFks1mJxTuy/K5FrZx40d/JiZ+yykgmvw Kh+OC19xXFyuQnspiYHLA6OZyoieC0AJQTPb5lh6/a6ZcMBaD9YThnEvdmn8kN3b LW7R8pv1GmuebxWMevBLKKAiOIAkbDakO/IwkfN4E8/BPzWr8R0RI7VDIp4BkrcY AuUR0YLbFQDMYTfBKnya4dC6s1BG7oKsnTH4+yPiAwBIcKMJJnkVU2DzOFytOOqB AGMUuTNe3QvboEUHGjMJ+E20pwKmafTCWQWIZYVWrkvL4N48fS0ayOn7H6NhStYq E613TBoYm5EPWNgGVMWX+Ko/IIqmhaZ39qb8HOLubpQzKoNQhArlT4b4UEV4AIHr W2jjJo3Me1xR9BQsQL4aYB16cmEdH2MtiKrOokWQCPxrvrNQKlr9qEgYRtaQQJKQ CoReaDH46+0N0x3GfZkYVVYnZS6NRcUk7M7jAgMBAAGjQjBAMA8GA1UdEwEB/wQF MAMBAf8wHQYDVR0OBBYEFApII6ZgpJIKM+qTW8VX6iVNvRLuMA4GA1UdDwEB/wQE AwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAPpBIqm5iFSVmewzVjIuJndftTgfvnNAU X15QvWiWkKQUEapobQk1OUAJ2vQJLDSle1mESSmXdMgHHkdt8s4cUCbjnj1AUz/3 f5Z2EMVGpdAgS1D0NTsY9FVqQRtHBmg8uwkIYtlfVUKqrFOFrJVWNlar5AWMxaja H6NpvVMPxP/cyuN+8kyIhkdGGvMA9YCRotxDQpSbIPDRzbLrLFPCU3hKTwSUQZqP JzLB5UkZv/HywouoCjkxKLR9YjYsTewfM7Z+d21+UPCfDtcRj88YxeMn/ibvBZ3P zzfF0HvaO7AWhAw6k9a+F9sPPg4ZeAnHqQJyIkv3N3a6dcSFA1pj1bF1BcK5vZSt jBWZp5N99sXzqnTPBIWUmAD04vnKJGW/4GKvyMX6ssmeVkjaef2WdhW+o45WxLM0 /L5H9MG0qPzVMIho7suuyWPEdr6sOBjhXlzPrjoiUevRi7PzKzMHVIf6tLITe7pT BGIBnfHAT+7hOtSLIBD6Alfm78ELt5BGnBkpjNxvoEppaZS3JGWg/6w/zgH7IS79 aPib8qXPMThcFarmlwDB31qlpzmq6YR/PFGoOtmUW4y/Twhx5duoXNTSpv4Ao8YW xw/ogM4cKGR0GQjTQuPOAF1/sdwTsOEFy9EgqoZ0njnnkf3/W9b3raYvAwtt41dU 63ZTGI0RmLo= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSRSARootCA2021.crl_url0000644001343500074740000000006215004136173026706 0ustar davidgdavidghttp://crl.harica.gr/HARICA-TLS-Root-2021-RSA.crl igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSRSARootCA2021.signing_policy0000644001343500074740000000071015004136173030261 0ustar davidgdavidg# EACL for the HARICA TLS RSA Root CA 2021 access_id_CA X509 '/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021" "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1"' igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSRSARootCA2021.namespaces0000644001343500074740000000167115004136173027372 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HARICATLSRSARootCA2021.namespaces # CA alias : HARICATLSRSARootCA2021 # subjectDN: /C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021 # TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021" \ PERMIT Subject "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021" \ PERMIT Subject "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1" TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.135/src/accredited/HARICATLSRSARootCA2021.info0000644001343500074740000000111715004136173026201 0ustar davidgdavidg# @(#)HARICATLSRSARootCA2021 self-signed root # alias = HARICATLSRSARootCA2021 ca_url = https://repo.harica.gr/certs/HARICA-TLS-Root-2021-RSA.der crl_url = http://crl.harica.gr/HARICA-TLS-Root-2021-RSA.crl policy_url = https://repo.harica.gr/procedures url = https://www.harica.gr/ email = tcs-pma@lists.geant.org requires = HellenicAcademicandResearchInstitutionsRootCA2015 status = accredited:classic version = 1.135 sha1fp.0 = 02:2D:05:82:FA:88:CE:14:0C:06:79:DE:7F:14:10:E9:45:D7:A5:6D subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021" igtf-policy-installation-bundle-1.135/src/accredited/HellasGrid-CA-2016.pem0000644001343500074740000000417315004136174025465 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGFTCCA/2gAwIBAgIBADANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJHUjET MBEGA1UEChMKSGVsbGFzR3JpZDEiMCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRo b3JpdGllczEbMBkGA1UEAxMSSGVsbGFzR3JpZCBDQSAyMDE2MB4XDTE2MDUxMDE1 MTYwMFoXDTI2MDUxMDE1MTYwMFowYzELMAkGA1UEBhMCR1IxEzARBgNVBAoTCkhl bGxhc0dyaWQxIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxGzAZ BgNVBAMTEkhlbGxhc0dyaWQgQ0EgMjAxNjCCAiIwDQYJKoZIhvcNAQEBBQADggIP ADCCAgoCggIBALXC7i6w7EoGJovpVNaMWcr9C9Ov2KqsOXwMF9x/zDs5nSNBttaF f7SsYJM72QlF472HD5NkOFLyHXAZGUFOkPUiWEoXlk901lG6Z4i6yFNhjrTD4QSQ ur3KOkfmMBXveibhQie4IbkOdvpruGfzAMkd/t6Jf7Egxa1pgSX6JDe2EmHfLn8+ sLsRWcepj2c7xqa7mQjrg43FZgYCW0eQCTI+kIhEiwUnRSYGs7sPa5L+eRRapC/y tzDoVTBLTaUKWtt2PO6vLDQs+BnGeCmljoqD5KLnl5H3TZeVY+vD6XX8rAWSst2w UFySvrhw0lz9bnsqz+Nz0Dn1MRJkomipSHT0xr5E0jOjtFrJiTymw0xgYDuotazR 2t3jrmAEHErj2F6yicEn/QNNkzJR2BVF00uZFDhdBx7UBjg7VQlW9p0vxnP5ldBy GZ+nJxhVUfKEyUgD/ShxWa0A5dQ73vev2bsI/Csthup71uUIrYJt/c7HE9HimCOT 6CFqWOXA8IRqShM5UTTpixUY1gwVLZOQ4BUJTZCvSUF+c5eBUOUWaGSBw+jgRYUh YRh09uRKx4UGcsBdnSRfBQwG2elV6peK/ulU6DWq/AHcf8fmTz3wHs2ofmRgS2wc SBNLifYFKmcM4oe0jw2vFvNWZWkd9xFXr6ugPRmQhO0uRWh9Zi8egIv3AgMBAAGj gdMwgdAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE FOChL+wv2o1/AVo3V6QBU2ldA7SNMIGNBgNVHSMEgYUwgYKAFOChL+wv2o1/AVo3 V6QBU2ldA7SNoWekZTBjMQswCQYDVQQGEwJHUjETMBEGA1UEChMKSGVsbGFzR3Jp ZDEiMCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEbMBkGA1UEAxMS SGVsbGFzR3JpZCBDQSAyMDE2ggEAMA0GCSqGSIb3DQEBCwUAA4ICAQASZtggEmYU pVqD15t67ZkLZrmV1u7aDjajXwDJI1dCbQpksMb2cOI80aQlbzYlp18DbWA3UxdR fyMkDBBuTb0nmmbhk004+rNeoR96CXtgSCdxio6s99l6zEWN0xyrJuqQojRMglgV YieCdBginCSx+RHREsQc+RGWkVHTeMauhDGApi5UJT+FWuBPAx8j3zwJilaXbMOH fFsvLTnj/wmxpbm7swTK4Z65uJQcPkVbMGgfape04UU47l21oxrdBsMYIExTSFi0 X5uGiOawi/oLBa03p9wdi1nBzf1560jUX2MkNrcWq+oveXQnhIZ0mAHwMOAbx6g7 YLWNVyHoHuQo8bg+NRHfkEOyoq1ZBy4aKKjnjM1MR5jEh9XZWBF963opVfK2oule 8VLxl3YSr45KTZFyKBrjHFxtwk8rqfeTwd0cVWjLidQmAtUe4G1KKYnopyHVtP98 vBvQAH0V6/CPr33/l9aWwdvDAxcGsW4JwL/ob762lwWxVZqYYtCX7w6fHAq5ql+d khZlMyh5LXKC+72oFDBFYopJa3zCLdROec3iQyhAZqeXxJHZqlxwh7lyHbUqeJSG 9f81h8k1GgT+5K5TKQM5tud2z3ONXv9IzpCWvVg4mQDV3hAZXDoBW0G8WjOPBDr3 +3w/5A+t4mgDTaSanbflbSudgUTgveME0g== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/HellasGrid-CA-2016.crl_url0000644001343500074740000000007015004136174026336 0ustar davidgdavidghttp://crl.hellasgrid.gr/hellasgrid-ca-2016/f4cf8fb6.r0 igtf-policy-installation-bundle-1.135/src/accredited/HellasGrid-CA-2016.signing_policy0000644001343500074740000000031715004136174027715 0ustar davidgdavidg# EACL HellasGrid CA 2016 # @(#)$Id$ # access_id_CA X509 '/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=HellasGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/HellasGrid-CA-2016.namespaces0000644001343500074740000000103115004136174027011 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HellasGridCA2016.signing_policy.namespaces # CA alias : HellasGrid-CA-2016 # subord_of: # subjectDN: /C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016 # hash : HellasGridCA2016.signing_policy # (generated automatically from HellasGridCA2016.signing_policy) # TO Issuer "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016" \ PERMIT Subject "/C=GR/O=HellasGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/HellasGrid-CA-2016.info0000644001343500074740000000117215004136174025633 0ustar davidgdavidg# # @(#)$Id: HellasGridCA2016.info,v 1.1 2016/05/10 22:43:42 pmacvsdg Exp $ # Information for CA HellasGrid CA 2016 # /C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016 # alias = HellasGrid-CA-2016 url = http://www.grid.auth.gr/ crl_url = http://crl.hellasgrid.gr/hellasgrid-ca-2016/f4cf8fb6.r0 policy_url = https://www.grid.auth.gr/pki/hellasgrid-ca/documents/cps/HellasGrid-CA-CP-CPS.pdf email = ca@hellasgrid.gr status = accredited:classic version = 1.135 sha1fp.0 = 01:D3:A5:3C:4C:DF:9C:D9:10:3B:1B:8B:D4:CB:D1:7D:42:73:2C:5F subjectdn = "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.pemigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootC0000644001343500074740000000177115004136175033233 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR -----END CERTIFICATE----- ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.crl_urligtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootC0000644001343500074740000000005515004136175033225 0ustar davidgdavidghttp://crl.harica.gr/HaricaECCRootCA2015.crl ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootC0000644001343500074740000000111415004136175033222 0ustar davidgdavidg# EACL for the older root Hellenic Academic and Research Institutions ECC Root CA 2015 that may be present in client-supplied chains access_id_CA X509 '/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015' pos_rights globus CA:sign cond_subjects globus '"/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015" "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021"' ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.namespacesigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootC0000644001343500074740000000156315004136175033232 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policy.namespaces # CA alias : HellenicAcademicandResearchInstitutionsECCRootCA2015 # subord_of: # subjectDN: /C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015 # hash : HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policy # (generated automatically from HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policy) # TO Issuer "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015" \ PERMIT Subject "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.infoigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsECCRootC0000644001343500074740000000115715004136175033231 0ustar davidgdavidg# @(#)Hellenic Academic and Research Institutions ECC RootCA 2016 # alias = HellenicAcademicandResearchInstitutionsECCRootCA2015 ca_url = https://repo.harica.gr/certs/HaricaECCRootCA2015.der crl_url = http://crl.harica.gr/HaricaECCRootCA2015.crl policy_url = https://repo.harica.gr/procedures url = https://www.harica.gr/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 9F:F1:71:8D:92:D5:9A:F3:7D:74:97:B4:BC:6F:84:68:0B:BA:B6:66 subjectdn = "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.pemigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA200000644001343500074740000000415315004136176033161 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA 4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV 9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot 9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 vm9qp/UsQu0yrbYhnr68 -----END CERTIFICATE----- ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.crl_urligtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA200000644001343500074740000000005215004136176033153 0ustar davidgdavidghttp://crl.harica.gr/HaricaRootCA2015.crl ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA200000644001343500074740000000110015004136176033146 0ustar davidgdavidg# EACL for the older root Hellenic Academic and Research Institutions Root CA 2015 that may be present in client-supplied chains access_id_CA X509 '/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015' pos_rights globus CA:sign cond_subjects globus '"/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015" "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021"' ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.namespacesigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA200000644001343500074740000000153715004136176033164 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HellenicAcademicandResearchInstitutionsRootCA2015.signing_policy.namespaces # CA alias : HellenicAcademicandResearchInstitutionsRootCA2015 # subord_of: # subjectDN: /C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015 # hash : HellenicAcademicandResearchInstitutionsRootCA2015.signing_policy # (generated automatically from HellenicAcademicandResearchInstitutionsRootCA2015.signing_policy) # TO Issuer "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015" \ PERMIT Subject "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.infoigtf-policy-installation-bundle-1.135/src/accredited/HellenicAcademicandResearchInstitutionsRootCA200000644001343500074740000000115115004136176033154 0ustar davidgdavidg# @(#)HellenicAcademicandResearchInstitutionsRootCA2015 self-signed root # alias = HellenicAcademicandResearchInstitutionsRootCA2015 ca_url = https://repo.harica.gr/certs/HaricaRootCA2015.der crl_url = http://crl.harica.gr/HaricaRootCA2015.crl policy_url = https://repo.harica.gr/procedures url = https://www.harica.gr/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 01:0C:06:95:A6:98:19:14:FF:BF:5F:C6:B0:B6:95:EA:29:E9:12:A6 subjectdn = "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015" igtf-policy-installation-bundle-1.135/src/accredited/IGCA2.pem0000644001343500074740000000404215004136176023362 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF1DCCA7ygAwIBAgIBATANBgkqhkiG9w0BAQsFADBhMRIwEAYKCZImiZPyLGQB GRYCSU4xGzAZBgoJkiaJk/IsZAEZFgtHQVJVREFJTkRJQTEuMCwGA1UEAwwlSW5k aWFuIEdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMjAeFw0xODAzMTMxMTUx MDdaFw0zODAzMDgxMTUxMDdaMGExEjAQBgoJkiaJk/IsZAEZFgJJTjEbMBkGCgmS JomT8ixkARkWC0dBUlVEQUlORElBMS4wLAYDVQQDDCVJbmRpYW4gR3JpZCBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eSAyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAqLrdiKNjnI8pBy1zr2QsgAq1Uw6cXB3V3C4PUA3NNKrOpm2Qr0V6tGKS Bw4KT25kWlvvXbV3PqYa7gxW+sERfWMACf4yTILRkrsX7cKut29qrBv98QAbgTYS eIhS/iUJQ4ABXdwJas93YJyMBUQzxANwbY+A1NyEz6+Md1Nj/ANppLgaIkgr7jxc fpB3pr6dMPMNXydW5dlboQULhWFGAogHvJfJi/Hdjx/WboywBbW8fqenVvuPdc1c I9MZ/q/fEpceoBhvKcu9C4L5jxLFsrW0EGrQA/znjerGdHeotyDo2OWoKpDiLf+8 ZOyWUQYEXDnTjO+qzN8T5SJE/bl0UpD6qJI5IiwvtnumR8yFHDADHHr9u+ZEsueH JjXyY0DVBgyUWCKjgTn/5u9Id6M9rfc1p3G9il+bEl/2VtxRUsY/e63m23deLx3H Sj8MLX3UJjQ1/XEKuxLPEY7VwnOt/qcGo3jRl0XKMvV6DQ6l59qEoVUT/3ZyrwE9 Hvy/Qe8KHSG37Pj6yw1mDv4cLB9eVAdHEE0Y63Q+G9x/yhG1uMB4K4doYwHVmXZv jHouOb0xSSrveCXQ6TE/msR3nKibxwcVcskWzyb0I9PHCXwi+jT29l2RLek2oo4m 5e7Jyl9z/wGigPBi4G9ixq+ZAe+ptI8A2hxFm3O1AbAO6sogvRcCAwEAAaOBljCB kzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU8ihf OMMaTaYHvZPJs9Zq45rRJlkwHwYDVR0jBBgwFoAU8ihfOMMaTaYHvZPJs9Zq45rR JlkwFwYDVR0RBBAwDoEMaWdjYUBjZGFjLmluMBcGA1UdEgQQMA6BDGlnY2FAY2Rh Yy5pbjANBgkqhkiG9w0BAQsFAAOCAgEAkO+s/RjO5DavCcBgsFapidCaV5OPN9ej NXwgX5DJCmpPw3j1wvuqNazpXCMq5BsyxxrrKcx+Lhrq6xgzR3CHJPTB7U3H729G A5oSKloRacKpvWkCv4nKT2kbHenQpHWDgJ4gjNjWeTNHbLIWeEiGi+pT+gZez6nC GeW6va7XCqwaOrbrVXqsKgNZnlp3V8q3pJ4JF9LHVLVW5wLTXvyTTtV2CXNfzM+E gd0iZc54MmXgjpZhkZM29lTrZq5T0moS+29DjQEPf6fYO2DjkzicgsHYKuevFcKy 7eg7pVrlsreKA15DxeYGIkSxiJBnctiMFLHalYDcJ3fkZJum3FGhhGh/iFDGCxzp 2bKskgxa4gjXOSUPPGzvuXWdYm9IP5Hw7jeHuUipKHr6JdrLll9We8+BHtfKaOEb GnAIJVm6sKtv/L2kbngd85DwXedjt6uB989rma+iszRp64lt4q1IXR5BXB1937FE HE3K1BI06La724nFH/TFqTWmWt7oGl4TF/2Las44kO1J1m0OMqpw8C4czO0is2oR JciEZvk7i6NxE/XZVyu+AANpz5K78QxLwBHkUFemaPx2c6pFsJh3RDFKGnCBlDnc wcoJXJaMPYTtHMcdn1sSS9qtw7iB9FcAkc3KG3WaEkPSeG/cE5gw6QJJBKa2ONe1 bbP2aZwo3t4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/IGCA2.crl_url0000644001343500074740000000005715004136176024245 0ustar davidgdavidghttp://ca.garudaindia.in/pki/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.135/src/accredited/IGCA2.signing_policy0000644001343500074740000000027415004136176025621 0ustar davidgdavidgaccess_id_CA X509 '/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2' pos_rights globus CA:sign cond_subjects globus '"/DC=IN/DC=GARUDAINDIA/*"' igtf-policy-installation-bundle-1.135/src/accredited/IGCA2.namespaces0000644001343500074740000000055115004136176024721 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GARUDAINDIA2.namespaces # CA alias : IGCA2 # subjectDN: /DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2 # TO Issuer "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2" \ PERMIT Subject "/DC=IN/DC=GARUDAINDIA/.*" igtf-policy-installation-bundle-1.135/src/accredited/IGCA2.info0000644001343500074740000000063115004136176023534 0ustar davidgdavidg# # @(#)$Id$ # Information DC=IN, DC=GARUDAINDIA, CN=Indian Grid Certification Authority 2 # alias = IGCA2 crl_url = http://ca.garudaindia.in/pki/pub/crl/cacrl.crl email = igca@cdac.in status = accredited:classic url = http://ca.garudaindia.in/ version = 1.135 sha1fp.0 = 54:32:0D:7D:57:6B:7F:B3:05:DF:FF:B5:50:E5:82:F8:46:39:7A:21 subjectdn = "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2" igtf-policy-installation-bundle-1.135/src/accredited/IHEP-2013.pem0000644001343500074740000000243615004136177023713 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDmjCCAoKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJDTjEM MAoGA1UEChMDSEVQMUEwPwYDVQQDEzhJbnN0aXR1dGUgb2YgSGlnaCBFbmVyZ3kg UGh5c2ljcyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMzAyMTkxMzE4MDNa Fw0zMzAyMTkxMzE4MDNaMF4xCzAJBgNVBAYTAkNOMQwwCgYDVQQKEwNIRVAxQTA/ BgNVBAMTOEluc3RpdHV0ZSBvZiBIaWdoIEVuZXJneSBQaHlzaWNzIENlcnRpZmlj YXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA uQQrH54pNm8yx2ddSK1o7hewb/xT1er1hHifOqRWdpbzFUCgk/uNaj//CaWvOpcN 8xRKRMUy3t8iFh4v115tQRlRO8f6R0Gve7+OBXtGLYwZubjAco7jA8Ib28G748cW 9VBrurRx0izPwu5Eo9B2r/Ypzb0NNpc5BcW3aYZ7b8UrB60OSQtrtODhPxTiBcxm AwmjX735ZQXYJs+OioWMFY4lhFJCjNWcpqZkmGK9NAyuKYdApponA0p+5Tn06IOL +KyyEeeClM9BFnoDFL4w5D86GiXdI1Hm60UtPTXT3pwO/F9B6Y3O5+mdXNeZ13JT fCMK2BAFeXLfWE+W7F+SqwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud DgQWBBQlu0zRAtRh6bO+ol+nc0zbax6A8jAfBgNVHSMEGDAWgBQlu0zRAtRh6bO+ ol+nc0zbax6A8jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBADfU 4WttXHkSewfBxjY3LFuNF0BCYSFKnG0uG6gbE7eIfKTHM8kkXpo5xKxJTUNw+aTw 5hpyce5mZGpe6Q/Ch4e10sWPR293gJxI/dovNapwdmRGsn1JqUfJkmVc+M0qvl5a EFdFA10cSm7V6AMydH93jElAaFlRias9/qt41oftKqJHWrFFE+yt0mZoA3ylWTpY NAr9x1RlsRY72JVyVeC/Mth1iSIVFQ9i9N+QcxS/Sxayuyhgchmb319kipZ/p6MH ffE8ycI3GzQxJdmOpB974sIc2eyzBZEqNrC3+uxiRMRDTrpu5k5tSnYH4xwlRHDj Up7pPGrNH0h+ePj401s= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/IHEP-2013.crl_url0000644001343500074740000000004315004136177024564 0ustar davidgdavidghttp://cagrid.ihep.ac.cn/cacrl.crl igtf-policy-installation-bundle-1.135/src/accredited/IHEP-2013.signing_policy0000644001343500074740000000035415004136177026144 0ustar davidgdavidg# Signing policy file for IHEP CA 2013 access_id_CA X509 '/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=CN/O=HEP/*"' igtf-policy-installation-bundle-1.135/src/accredited/IHEP-2013.namespaces0000644001343500074740000000062615004136177025250 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)39d30eba.namespaces # CA alias : IHEP # subord_of: # subjectDN: /C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority # hash : 39d30eba # TO Issuer "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority" \ PERMIT Subject "/C=CN/O=HEP/.*" igtf-policy-installation-bundle-1.135/src/accredited/IHEP-2013.info0000644001343500074740000000100615004136177024055 0ustar davidgdavidg# # @(#)$Id: 39d30eba.info,v 1.3 2014/06/20 08:33:27 pmacvsdg Exp $ # Information for new CA IHEP 2013 # obtained from 39d30eba in APGrid/ alias = IHEP-2013 ca_url = http://cagrid.ihep.ac.cn/cacert.pem crl_url = http://cagrid.ihep.ac.cn/cacrl.crl email = ihepca@maillist.ihep.ac.cn status = accredited:classic url = https://cagrid.ihep.ac.cn/ version = 1.135 sha1fp.0 = B3:24:D7:42:95:36:B2:CC:1E:F9:75:5C:C4:D2:47:7F:CE:E0:B8:19 subjectdn = "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority" igtf-policy-installation-bundle-1.135/src/accredited/IRAN-GRID-GCG-G2.pem0000644001343500074740000000721315004136200024704 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIKkDCCBnigAwIBAgIBBjANBgkqhkiG9w0BAQsFADBDMQswCQYDVQQGEwJJUjEM MAoGA1UECgwDSVBNMQwwCgYDVQQLDANHQ0cxGDAWBgNVBAMMD0lSQU4tR1JJRC1H MiBDQTAeFw0xNjEwMTcxNDMwMzJaFw0zNjEwMTIxNDMwMzJaMEMxCzAJBgNVBAYT AklSMQwwCgYDVQQKDANJUE0xDDAKBgNVBAsMA0dDRzEYMBYGA1UEAwwPSVJBTi1H UklELUcyIENBMIIEIjANBgkqhkiG9w0BAQEFAAOCBA8AMIIECgKCBAEApY8y1rJJ Wdk65m2W73XSi9FnaiP0dmJxy8r043DRjVM9wZ7YTpSql1k7C3kKL6ez18MZdqAW /BuLzbWekCxvBaccJbVP1yU67H2DQtcUy//LUIPbV0b9TTT22z8KfWiYI4pd1W7d H+1KQqyzod7hgwOl0hk7F/jheUGjZyAbdvl4mY4xxRqPfg0JUtEHWvcRTnYw5OJ4 Wql6cSZbO4+ExfcOCRJNdnQ7i6f/cvVXeUQ2/eX7numlEoqGL0iZddI+aS71zicA v5fSe9itE0h2uYG9qUW2BUhzsf8l4+TvzvuGZ2juabX/zJjWlVM32y/N/zQuErP9 9ggv79CW+Rj+/PluP0b9vCa+f5spSuTP1UGEDU19m9LEjnEeArFJ9HO6ERUiunLc ta4Hd0UYFQpRwjcZBFDTUKf4j3yB9qIp3/3HKd9cilYt1b5fmypTIUgOVjBC/RdO 98JSyhRt2qAl4Cij8jBxcdajrWjLEzvAOaIrNSMV2TDX8FYvEElO6cae1A54xtBY sd+b962IAibaMeH2a5gCL3b+m6pqRnEQcdQM9eO/5KA7ccUH1aWfJWu6MXGUU3Iv hqT/r2ftGzc1coudiMlO4kYJOgexOFoYsyZtMRn3w72ENKuUJzhuQ1IKPml9zYgi nHBvo7kwa/pbqLorxX8n9x4SYy5YFbM/7twIdbDUo+pSk+lvfGRxslUumJu//K9t T9r3E15oAF6HKNxpTg3KzBUFokMOfQE8ttZduXNCAOmUeS8qUULRQMpXkrMZ3ATl cBe16lJZ8NbJ2wsXBbCcZA7S2JUhLbnzrYjx7O4/owyRklAdyGQ5Ge/eqi1g+jb7 hnsuTatSBW01I//DIZ2SMaFAHLToUTY14ZLqB4aQ/NZ5JS3obIkgJzB9hc3J2MOZ tjSCqJelwKwDJI5vuzEzQ4RT0HMXv5OSbACJQR1aE9Bt1z776aKpNEuDHSoFje2a lPLyqsKYmmm01NFM2SrPh7a+l7swEyFKY54NzQ5KtAss76JLMO7B5mAjtK0Gt1ec tb6lL1zRbC+REwTqmQznqT7pGowiVxk3ZdQTnH8r317VU1szGKSXJtOPomwX/afc RdWC/iDWvJEYkWCDmKdzosGwC6paz5hdhwrrwhroKymA4dHXZkrZnXZNE7W11FNu fzniaXW/QgtICpnNTUTzV3rIvI78xmo6sPySQD2E15prla+PDX8UogBPIXFXD0Jj 8Nx5mA2K1AlKIRE5LCH/SmPVCXxrin24xwFg2ruAolvB/3bp8a2R6tcI18sjsjcT THOZOu84xF0QHcZulEe5itNMeiCLmst4emdMMwz5Af39uqQ8BRu/VG04yclHbOfY /t40aiaqhInDKwIDAQABo4IBjTCCAYkwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8E BAMCAQYwHQYDVR0OBBYEFHJfTsl4tZ/SgXSl15TwxLnqy15dMB8GA1UdIwQYMBaA FHJfTsl4tZ/SgXSl15TwxLnqy15dMBwGA1UdEQQVMBOBEWNhLW1hbmFnZXJAaXBt LmlyMBwGA1UdEgQVMBOBEWNhLW1hbmFnZXJAaXBtLmlyMIGqBggrBgEFBQcBAQSB nTCBmjA/BggrBgEFBQcwAoYzaHR0cDovL2lyYW5ncmlkLmlwbS5hYy5pci9wa2kv cHViL2NhY2VydC9jYWNlcnQuY3J0MCsGCCsGAQUFBzABhh9odHRwOi8vaXJhbmdy aWQuaXBtLmFjLmlyOjI1NjAvMCoGCCsGAQUFBzAMhh5odHRwOi8vaXJhbmdyaWQu aXBtLmFjLmlyOjgzMC8wQAYDVR0fBDkwNzA1oDOgMYYvaHR0cDovL2lyYW5ncmlk LmlwbS5hYy5pci9wa2kvcHViL2NybC9jYWNybC5jcmwwDQYJKoZIhvcNAQELBQAD ggQBAFIpTCtg5SLEKByGy0kss874bwn9eZECquSe4jhLrZuX2WjSxUrQnPRUbxBg 5JNo315NwiwlFYv9hPjzhEVtzzVKfMWPjzi3XEx14DlJ2ptQcVjPkgHw16AHR9Wa xCGMq0GdohBVBD0Jadxaj42OkVSyFk/Fn7nJQdAU+dU7HxDD305dLH+A9iyWehFg faJuGv15fmW1kI75+ygUA6cIyRbRV6iHvg8IZMpZlpITFYcpHqYSe9pRrv1BDJEf 4xTlRoM9xwhopFwWWnqwScuMqHaPwXwIaO1wUIkouV6n7jSQx+fjW5/FMDftXzIm kA5wyHbasmy6LCe9d4kAnzt4MVT5Xb3naz6SONW2b+0znWSWzWhe1vWCdZUd9dRw htUm9jKzW6T6jpMNFbWKfsvz+suPs3imb3DwELIciuyjT83/BL8Z9qb1eglRSlts x/5dJD7aTkKlYpQHzJnr4dTwhZ5FzbpZFxxeSQl6yfpOcL2ijlCRBIUQEaqty4cL ClKl5TrEZGjAgx+95cdfLzCnn9ap9Az8rDippRwk9JWtmXmvC5GApNofsFhzqZ6n KrEjHuhbCM5nbEkm2Q0AOzQTHhgZUdt0ZdDIMDWjkq7qA6087h6ZIFEIEEIFmMco BYwVMbERQZbfNNhpQb/49bXTLvxV6I0l895MRk0BMyD8pQkiLQxxGNGjU39wOGIN k2sFSgwHeGS08KL81VX3yV4LDrz3VVVS+xpMwqb5EbuJ2JNXbPnfNd+X5Zlyk6o9 l4gZQM36zy2YlAHpi+6jYsU337gWrL2uXDnbg82g7X4U79alvio2oHIk3qEtckZC 3IH2eCAm7lOHerRH85Ws+S1M81MbweLxr7o8dSTr6B4y/w/AlMwvhsNE8Kv6zeH2 pxH1tsEpvfgl9sYa1BjBmlCbHh+42ko/ra2nU2bowr++dTcZtx8pocYZp+nWFJ6T Q0EpCb4E8sY2d2W+ssmK0HCvOryQeeQTYgL9dZ3FtwAiZ3PiTRA7sHGUeWgUEwib R05U3EUC2q1lms3IiBGScwoypihAg9bnRQvOkWdSXkQT73A5AmOyg4uh89gfFXTU e2er7o2B1rJcOD0HZhu6WxnqFC5uwzwxLqgyJ6WUWM5vb0wS/BbdpiHZXXAYjggy HM6uYoL9BZZH7cvtMKPH2eTpR8G0IzfWhUJAJUyRU7wUlBXPKDrR+kS88irPh6eu EMV4YTndZmvNGXZfhqsTG1TFmkkwfP1GVeAHsdT/O/NQiJ1+Co4ansMj95gsYeIU otAjUtv0+4yjOkG7eJfJdjUit/uW+7Kcg0DY1qeWNY6h6f87hY5s2rorOFY/gteh W/0zkCUuQlS40E5FGV9I6mmPkbo= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/IRAN-GRID-GCG-G2.crl_url0000644001343500074740000000006015004136200025556 0ustar davidgdavidghttp://irangrid.ipm.ac.ir/pki/pub/crl/cacrl.der igtf-policy-installation-bundle-1.135/src/accredited/IRAN-GRID-GCG-G2.signing_policy0000644001343500074740000000033015004136200027131 0ustar davidgdavidg# EACL IRAN-GRID-CGC-G2 2016 access_id_CA X509 '/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA' pos_rights globus CA:sign cond_subjects globus '"/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" "/C=IR/O=IRAN-GRID/*"' igtf-policy-installation-bundle-1.135/src/accredited/IRAN-GRID-GCG-G2.namespaces0000644001343500074740000000072615004136200026244 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)IRAN-GRID-GCG-G2.signing_policy.namespaces # CA alias : IRAN-GRID-GCG-G2 # subord_of: # subjectDN: /C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA # hash : IRAN-GRID-GCG-G2.signing_policy # (generated automatically from IRAN-GRID-GCG-G2.signing_policy) # TO Issuer "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" \ PERMIT Subject "/C=IR/O=IRAN-GRID/.*" igtf-policy-installation-bundle-1.135/src/accredited/IRAN-GRID-GCG-G2.info0000644001343500074740000000066715004136200025064 0ustar davidgdavidg# # @(#)$Id$ # alias = IRAN-GRID-GCG-G2 ca_url = http://irangrid.ipm.ac.ir/pki/pub/cacert/cacert.pem crl_url = http://irangrid.ipm.ac.ir/pki/pub/crl/cacrl.der policy_url = https://irangrid.ipm.ac.ir/policy.htm email = ca-manager@ipm.ir status = accredited:classic url = http://irangrid.ipm.ac.ir/ version = 1.135 sha1fp.0 = 9D:3B:E5:46:9D:2E:E4:AB:57:DD:36:F4:ED:24:D7:70:41:C6:76:69 subjectdn = "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" igtf-policy-installation-bundle-1.135/src/accredited/InCommon-RSA-IGTF-Server-CA-3.pem0000644001343500074740000000433515004136201027345 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGXTCCBEWgAwIBAgIQSN5GfzRaAZziIwBIT7dO5TANBgkqhkiG9w0BAQwFADCB iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMjMw NTIwMDAwMDAwWhcNMzMwNTE5MjM1OTU5WjBJMQswCQYDVQQGEwJVUzESMBAGA1UE ChMJSW50ZXJuZXQyMSYwJAYDVQQDEx1JbkNvbW1vbiBSU0EgSUdURiBTZXJ2ZXIg Q0EgMzCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAK2Wcv7dcIpOm0zW IOFmZXDjs74KzzK4GhaSjHhuiO1UrVXaeSJWcEn+mdy4VcLvCt7fqWlb0Dbu+OBV drI8Rw9SRgYrk6VKA9AAoULqzzju4maAlNnicxbanVYg9wi+WFIaGsgZt7xA1phL fjRcQfbujz6qtwMqS8+vBcOqBGCcknSrDZDqrbojSDwTNJfWYJBCgaBf1oJNLtmI 98qZLMTn5s6/SEenvC4nEfRRJcqottUwzsq9PZBs9mwWR3PW9gHtPmAK7yXDZ0kQ iHm0td9CK8z6IKX23aVVC3a54shtybPIirU6ZQnh+uj6yYCkepTlw3dcyZSqPG6d 1OJvhhRB2h1jfoVAlJ+9GJr6TqK9peP61BgH0JRUjUIyj2dR3mcBalxEKvCiGeLT b4RdOZN9ahwykGCIDNchhPSXtZgtPrA35mzZwtfEyTh3fL4OtIRsqNPCAOdZsJ+C jph1iIwHApYvPf9G1x/yeVV/Jyk0hZecLpubor4it3AzBmWadQIDAQABo4IBfzCC AXswHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYDVR0OBBYEFBY2 peMxe79n9rK35+pU71cwvsflMA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAG AQH/AgEAMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAxBgNVHSAEKjAo MA4GDCsGAQQBriMBBAMEAjAMBgoqhkiG90wFAgIBMAgGBmeBDAECAjBQBgNVHR8E STBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5jb20vVVNFUlRydXN0UlNB Q2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwcQYIKwYBBQUHAQEEZTBjMDoGCCsG AQUFBzAChi5odHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20vVVNFUlRydXN0UlNBQUFB Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRwOi8vb2NzcC51c2VydHJ1c3QuY29tMA0G CSqGSIb3DQEBDAUAA4ICAQBWO9yThret5cssTu2BGe1kyG8RM62C8q3QpGp4/Frn mOoL46Rl6nzsmPEKQmaqHDiaNi2vZIb6bRLo/cX9/cJ8TXWY8yZO1JyGsK4jU6NE tT67gUKritKlKPyGa4U5xMeqBPoBzTpQ6LdLNTsZgwYqWWi2fOh8weWxR2AmN+/F qBrqOl+7tIJKhTzNvpZZMViXN7SQfzdLkckpwbZYq1kHly6uQuV303DrKvk7EF1t zHzNQ0Wv6DkuRfOLZi31Xj43w4DpV0jiN+v06lNuspq1qq4TeDp72yUyQL7veqU8 W9DOfZF1fmblNxEg1kVBGRMKZAr5IrqCGyVCM/Ad6Yo6bvJ2P0PLGZ4Ww57ZiVyj VCf0jCO2iGavyp1TGzxQpCXaps2+zFyAAOkVcBR0ZdNDoiu07wXZ7KGrIeGdTJPN cAdpPx5w4Zmi07Mg+TChy1iHiRwoXStVUg2vqwFOPFJp/ihfs81K9VAv5CEhdvXJ kxMhU5bq6TXQMOMwZ3JM8/sVm2rdTaNGYbwt1nT/alKKC+gwc+hlQkDfg2MWiU9I eVl//WhqBcCKdteq2zJxW32LfszpyYoSPQTnqetPU+IKxFSHfc3i580MNfE6wpfe 6hzz08jjXWo6VQ+RGfEEWm5mqv6YYfKynNV5FaGLFuyZSqLCD6LSfQjQvN5jrRHi PQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/InCommon-RSA-IGTF-Server-CA-3.crl_url0000644001343500074740000000006615004136201030223 0ustar davidgdavidghttp://crl.usertrust.com/InCommonRSAIGTFServerCA3.crl igtf-policy-installation-bundle-1.135/src/accredited/InCommon-RSA-IGTF-Server-CA-3.signing_policy0000644001343500074740000000023415004136201031573 0ustar davidgdavidgaccess_id_CA X509 '/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=incommon/*"' igtf-policy-installation-bundle-1.135/src/accredited/InCommon-RSA-IGTF-Server-CA-3.info0000644001343500074740000000077615004136201027524 0ustar davidgdavidgalias = InCommon-RSA-IGTF-Server-CA-3 url = https://www.incommon.org/cert/ policy_url = https://www.incommon.org/cert/repository/ ca_url = http://crt.usertrust.com/InCommonRSAIGTFServerCA3.crt crl_url = http://crl.usertrust.com/InCommonRSAIGTFServerCA3.crl requires = USERTrustRSACertificationAuthority email = admin@incommon.org status = accredited:classic version = 1.135 sha1fp.0 = 6A:F9:A4:7F:00:4F:34:14:35:0D:A7:76:BF:9C:D3:A2:17:D1:D0:16 subjectdn = "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3" igtf-policy-installation-bundle-1.135/src/accredited/KEK.pem0000644001343500074740000000237115004136202023200 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDfzCCAmegAwIBAgIBATANBgkqhkiG9w0BAQUFADBSMQswCQYDVQQGEwJKUDEM MAoGA1UEChMDS0VLMQwwCgYDVQQLEwNDUkMxJzAlBgNVBAMTHktFSyBHUklEIENl cnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNTExMjUwNjIwMDFaFw0yNTExMjUwMDAw MDBaMFIxCzAJBgNVBAYTAkpQMQwwCgYDVQQKEwNLRUsxDDAKBgNVBAsTA0NSQzEn MCUGA1UEAxMeS0VLIEdSSUQgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzwPVQNq4DkabmieAS+mRrMrKomjY2z1d CF7HNHys0smqCBwkMKg6AEsddtJP6NyNO3KaknO756MI4K31xgDdTQpkQWkPqIGT pSlMY8xxH1AVe4KDg9AxB5AkHYSxjah3dT2sm9ZQHjPtXGMFRzjReKSgZWIWteF+ SdWpqhuxo8oYDzot7ZqIJnV2Dr9R3mLTU9Lslv5ZCult/iX5XKSkSC+3oLps5IKw /7ICgealZluaWjye61BDBpREQfjTHwZb+GSYzngGrJzedekOZ7ILq9tECojmNq7A 7FyVeG793UPhOJ69JP4oFsrQrG6+aGcaIui70QCpWaOldThnynzkDQIDAQABo2Aw XjAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAfBgNVHSMEGDAWgBT1lIMe 2Yv88d6Z4cYX4nxg0JummzAdBgNVHQ4EFgQU9ZSDHtmL/PHemeHGF+J8YNCbppsw DQYJKoZIhvcNAQEFBQADggEBADKvGDLXIMPQgtSiqvLLqSOfNgedj9N+5DRxQLlR iNxJxFt8ol2jZ92JgkETDWgR+RYz3oG26/uPpVi6jxx24Wru4h6A5OVLvKmKBd1+ WezShcPY3CFowrA90lsWD4XQmgVl4NyQYViMEbSk+oWx5kRrvzf4I0B2yq/wJSkJ /ysNRHT0o50MwDOBt0pZs5RoJmbYu2pFXUiygdmAaImIAMfEcP7UT3CUJiGX1dwN uKkT7zG8VwAaSMpVtTQuE+2+sH2ZJnzc6fJYZlgX4VjmZYh5bpQsF+sxqd2p+qmk 5Bd+wx7iy8WUmCnV8Yl+u69wcnNH1boP/5qjGvlYtkopa0A= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/KEK.crl_url0000644001343500074740000000005415004136202024055 0ustar davidgdavidghttp://gridca.kek.jp/repository/617ff41b.r0 igtf-policy-installation-bundle-1.135/src/accredited/KEK.signing_policy0000644001343500074740000000242315004136202025432 0ustar davidgdavidg# ca-signing-policy.conf, see ca-signing-policy.doc for more information # # This is the configuration file describing the policy for what CAs are # allowed to sign whoses certificates. # # This file is parsed from start to finish with a given CA and subject # name. # subject names may include the following wildcard characters: # * Matches any number of characters. # ? Matches any single character. # # CA names must be specified (no wildcards). Names containing whitespaces # must be included in single quotes, e.g. 'Certification Authority'. # Names must not contain new line symbols. # The value of condition attribute is represented as a set of regular # expressions. Each regular expression must be included in double quotes. # # This policy file dictates the following policy: # -The Globus CA can sign Globus certificates # # Format: #------------------------------------------------------------------------ # token type | def.authority | value #--------------|---------------|----------------------------------------- # EACL entry #1| access_id_CA X509 '/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority' pos_rights globus CA:sign cond_subjects globus '"/C=JP/O=KEK/OU=CRC/*"' # end of EACL igtf-policy-installation-bundle-1.135/src/accredited/KEK.namespaces0000644001343500074740000000072015004136202024532 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)617ff41b.signing_policy.namespaces # CA alias : KEK # subord_of: # subjectDN: /C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority # hash : 617ff41b.signing_policy # (generated automatically from 617ff41b.signing_policy) # TO Issuer "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority" \ PERMIT Subject "/C=JP/O=KEK/OU=CRC/.*" igtf-policy-installation-bundle-1.135/src/accredited/KEK.info0000644001343500074740000000047615004136202023356 0ustar davidgdavidgalias = KEK crl_url = http://gridca.kek.jp/repository/617ff41b.r0 email = kekgridca-contact@ml.post.kek.jp status = accredited:classic url = https://gridca.kek.jp/ version = 1.135 sha1fp.0 = 7F:F3:8B:69:A2:9A:1F:F2:EA:FF:99:7F:EB:40:9B:B7:DD:47:5A:1D subjectdn = "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority" igtf-policy-installation-bundle-1.135/src/accredited/KISTIv3.pem0000644001343500074740000000406615004136203023726 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF4zCCA8ugAwIBAgIJAPQE/CsWJRugMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV BAYTAktSMQ4wDAYDVQQKEwVLSVNUSTEmMCQGA1UEAxMdS0lTVEkgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMTcwNDE0MDgwNTA4WhcNMzcwNDA5MDgwNTA4WjBF MQswCQYDVQQGEwJLUjEOMAwGA1UEChMFS0lTVEkxJjAkBgNVBAMTHUtJU1RJIENl cnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAtSAdj4x4SNaS4EIcUsE3jcqy+48nS+RRxKQdxT3oDc8UvgN4PV9dThzo GrU8aySVevBd/ethq+0nInALWShrRpvd5xRDT+m+sqB43nk3vO6zCtPN5FLpoRTV 83mZq0G/9srfYFpk7UxMSueTnOcEW1RPf8G8+2ddruB9mB1Jvuu8/upAk6wo7BXg eG8947lmx91fOszYQgJrsRA8u4zoIfO7qegJbuJRy3hodEgt61TQ7bAjz87aIEvq zZ16EFlst7ZXmGs7ytgq/fRnqdl7M6KBMJCNShVhU2z+GIaZE3+wiJgx23fpMYWi IUE6ees7BC9gle5o7Ljm7bkeU3Q7AdNP8+U8fS13AqpeZBC9JRqvBo2J5uU7A/70 IjJhRoqR11o//O8uciJO1e21/JE//zd425xHkVahjC9BGng2TqtWA2JUcq595jyE +aqGze6KifJe/qkyRFxjHZOHT8r4y7z3N7f3pMUvEwvZjIx1mOCrXG919pOtSXzH oVhkvV/LQi/lKIbdHZnsDEkUbykvqbfEl/ES3PVZB/Q5waGL//zNAIU8a1jopMC7 /7JeRPpMDX2LF8HYmITpwzhSjcM699mWvnCBmlvALpawka3+6wPJbZnE3KH3oXjL T+rW/60NN1C1gZrNEhG80lSsI0eHI/G/JqrNOItKRYwfZhZ2KdcCAwEAAaOB1TCB 0jAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUjil/ 9gnmhh2SK4uI8/8IAYnbRm4wdQYDVR0jBG4wbIAUjil/9gnmhh2SK4uI8/8IAYnb Rm6hSaRHMEUxCzAJBgNVBAYTAktSMQ4wDAYDVQQKEwVLSVNUSTEmMCQGA1UEAxMd S0lTVEkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHmCCQD0BPwrFiUboDAZBgNVHSAE EjAQMA4GDCsGAQQB72EBAgEDADANBgkqhkiG9w0BAQsFAAOCAgEAeSVMjH8Fz8Gp /1P7DPCsCLxV6LEKR8KjBdSU05og9PsXJGW/RnF4tguVwgrvOI2j1s04eZKHHIbC GexEjG1fitz0dVPdh9romfsP1L7i2p9dogln6zUr0cAXQruQh7Cl5NDlYJFMZFCI Bln3+1cNtb+TVxK++5zfNJnOYXbTjY1k5gJWk5epoZg1IQBEeH37LG4vF51GLnrW c0j0e75vBuOa8gVnAfCLYF+MJOrMjP5V+Y6gGYDUBeoxyKOHrfd8gvStgb2PibeF q7Re8aHuS4F3RYjcrKX7X87pKmVbs3ArGUJzxkf6eWj3sn5ktxo89IhcGcj348Jl sBIEcT/wdgoFY137/GHKWAlIauNwMLFPhzep+8/kInyGDennxYn4Yqjl61AzcRKc AXhnkR9f+K5YnmeMtYMCzCndyOoKHNjlC6HUFrz4gN+mNcgtHBxDADTJhHNf7y2z 66oHrmhedrnc+pBLOl6zJa+iHEQxqQlWHhCGe5vqZ2F4rSA/B9vh4VY3EPQEbrA6 wfdg0sBcBU/MAiiDwmGYgpirqW2LNK8IclLqXi/vWBof+oAi/AIFOHNVp6lhVdFs vzcpHqLaXBSKxvOp9C6fFktf94db1dwKLI6YkLyhRy6IjmKMiC//s6n2d19SZLOB BytgkbuYo5Upk7ibRnB4xBpQ2+aE7ag= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/KISTIv3.crl_url0000644001343500074740000000005715004136203024603 0ustar davidgdavidghttp://ca.gridcenter.or.kr/CRL/kisti-ca-v3.crl igtf-policy-installation-bundle-1.135/src/accredited/KISTIv3.signing_policy0000644001343500074740000000033615004136203026156 0ustar davidgdavidg# EACL entry KISTO v3 2017 # @(#)$Id$ access_id_CA X509 '/C=KR/O=KISTI/CN=KISTI Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=KR/O=KISTI/CN=KISTI Certification Authority" "/C=KR/O=KISTI/*"' igtf-policy-installation-bundle-1.135/src/accredited/KISTIv3.namespaces0000644001343500074740000000070015004136203025253 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)KISTIv3.signing_policy.namespaces # CA alias : KISTIv3 # subord_of: # subjectDN: /C=KR/O=KISTI/CN=KISTI Certification Authority # hash : KISTIv3.signing_policy # (generated automatically from KISTIv3.signing_policy) # TO Issuer "/C=KR/O=KISTI/CN=KISTI Certification Authority" \ PERMIT Subject "/C=KR/O=KISTI/.*" igtf-policy-installation-bundle-1.135/src/accredited/KISTIv3.info0000644001343500074740000000060015004136203024066 0ustar davidgdavidgalias = KISTIv3 crl_url = http://ca.gridcenter.or.kr/CRL/kisti-ca-v3.crl email = kisti-grid-ca@kisti.re.kr status = accredited:classic url = http://ca.gridcenter.or.kr/ policy_url = http://ca.gridcenter.or.kr/cps/KISTI-CA-CPCPS-3.0.pdf version = 1.135 sha1fp.0 = 06:52:34:EE:81:0A:E5:9C:43:68:54:84:8C:8A:D4:DF:0D:75:A7:45 subjectdn = "/C=KR/O=KISTI/CN=KISTI Certification Authority" igtf-policy-installation-bundle-1.135/src/accredited/MREN-CA.pem0000644001343500074740000000250215004136203023605 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDtDCCApygAwIBAgIBAzANBgkqhkiG9w0BAQsFADBQMRIwEAYKCZImiZPyLGQB GRMCbWUxEjAQBgoJkiaJk/IsZAEZEwJhYzEUMBIGCgmSJomT8ixkARkTBE1SRU4x EDAOBgNVBAMTB01SRU4tQ0EwHhcNMDgwNjA0MDgwMjUzWhcNMjgwNjA0MDgwMjUz WjBQMRIwEAYKCZImiZPyLGQBGRMCbWUxEjAQBgoJkiaJk/IsZAEZEwJhYzEUMBIG CgmSJomT8ixkARkTBE1SRU4xEDAOBgNVBAMTB01SRU4tQ0EwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQCwHUwK1z2l35JSDwOmB1pYUq4hBoZ3dkZJk9Ix J+zxmpVGe1H29Db+ykClw30mYbwr9IBHyfUL77QwO3PAj51a57PkJSQkbzDSAPOj nevxfhQk21iIhTJ9U3tRLke4sSWoRiUojYSpgbS4iAy0YbQ9cNu/roOjDu/bipjF vlAk+zpWJfOFlde3NoO0R00+SkN3G1lCiN1E9W/Wulz09XQZ0PCEa6bps0IfKLOR h2YyKcueC33s7FGQIR6wzlOrmTdb1sM7uaNV3YpRS3wUpVKDg/lUyHClCtiFeWY8 7BdBbhGjSXZ704B7sSEQeoTIFHu4A6HY22F1JdluGRRhO6p9AgMBAAGjgZgwgZUw DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFGvkwLJj +8E6ASOhFOjV9pU+yLhMMB8GA1UdIwQYMBaAFGvkwLJj+8E6ASOhFOjV9pU+yLhM MBgGA1UdEQQRMA+BDW1yZW4tY2FAYWMubWUwGAYDVR0SBBEwD4ENbXJlbi1jYUBh Yy5tZTANBgkqhkiG9w0BAQsFAAOCAQEAmHlxwFZk6SExEdBMjQxb2m0qsoox3+iQ PFZtPKmcWai1rolOEd1dq28p8G3040GOCGq2ImU45SCYr9ME9JjMubhvETMJ2fb7 2UoHg/TkoTB0baTwhjL9eRYt7GwkzIIJgQrUR33A2tQ/3MVo7l+SKd0UeLdZ/97r /oimQHPLfrFkxHrUdHXP1XSOXkMQpecCfzWg9oWbehlLI6cCN0o7w/ZDOaIm/5kF jxa+DebsF3FAp7XBCa7UFYX9EbUT61ONw3gKh6aAi8KJfj+srFnNwY9pOc0mMYkR YhBb45iBwW/bNnuRV5DFY0n5hgFjTOzjeBYR1hV+KMh4NeTYuQbqQQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/MREN-CA.crl_url0000644001343500074740000000004715004136203024470 0ustar davidgdavidghttp://mren-ca.ucg.ac.me/ca/crl-v2.crl igtf-policy-installation-bundle-1.135/src/accredited/MREN-CA.signing_policy0000644001343500074740000000022015004136203026034 0ustar davidgdavidg# EACL MREN access_id_CA X509 '/DC=me/DC=ac/DC=MREN/CN=MREN-CA' pos_rights globus CA:sign cond_subjects globus '"/DC=me/DC=ac/DC=MREN/*"' igtf-policy-installation-bundle-1.135/src/accredited/MREN-CA.namespaces0000644001343500074740000000063615004136203025151 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3232b9bc.signing_policy.namespaces # CA alias : MREN-CA # subord_of: # subjectDN: /DC=me/DC=ac/DC=MREN/CN=MREN-CA # hash : 3232b9bc # (generated automatically from 3232b9bc.signing_policy) # TO Issuer "/DC=me/DC=ac/DC=MREN/CN=MREN-CA" \ PERMIT Subject "/DC=me/DC=ac/DC=MREN/.*" igtf-policy-installation-bundle-1.135/src/accredited/MREN-CA.info0000644001343500074740000000051615004136203023762 0ustar davidgdavidg# @(#)MREN CA alias = MREN-CA url = http://mren-ca.ac.me/ ca_url = http://www.mren-ca.ac.me/ca/ca.crt crl_url = http://mren-ca.ucg.ac.me/ca/crl-v2.crl email = mren-ca@ac.me status = accredited:classic version = 1.135 sha1fp.0 = B5:3C:77:51:15:8F:BD:D4:B5:74:C0:02:E2:8C:EC:8E:02:33:99:6A subjectdn = "/DC=me/DC=ac/DC=MREN/CN=MREN-CA" igtf-policy-installation-bundle-1.135/src/accredited/MaGrid.pem0000644001343500074740000000312315004136204023727 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEfzCCA2egAwIBAgIJAPWxWB9dm2WKMA0GCSqGSIb3DQEBCwUAMDIxCzAJBgNV BAYTAk1BMQ8wDQYDVQQKEwZNYUdyaWQxEjAQBgNVBAMTCU1hR3JpZCBDQTAeFw0w NzExMDkxODM3MzdaFw0yNzExMDkxODM3MzdaMDIxCzAJBgNVBAYTAk1BMQ8wDQYD VQQKEwZNYUdyaWQxEjAQBgNVBAMTCU1hR3JpZCBDQTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBALVHBJ0TI8DZI7hgWfDyNngVHhGg6ay2VRrbNBtOBZVZ VzI85ANWPa1UU2lqeCCzNb6gw1xduTb+Ar8Ep3r42nBFtMTWCrmmES2GjcFVWaGW IbyfKSwhR9uTDgb8mW5B9iQuwn2fczYSEN8ncd8NBH1Cyxj5zh7CTdqYvXfH7t07 ICBR4MF1rdlnxELdLVv9GnHStLHUvpeGLnvKiNivgafXek0xGs1p3atfwH49UWAs cpDxT89i8mjawtYDJiXezO47X5TSxoxTZD15Wiu+r218usC+1AEnflWqHSUuZFPr tTPuz+c16hCAFO3SIto2j/7yUjDUkgyXTuTH+i85Lg0CAwEAAaOCAZYwggGSMA8G A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFInLSWxUJm7jcLzxm1kTw1VrGBJbMGIG A1UdIwRbMFmAFInLSWxUJm7jcLzxm1kTw1VrGBJboTakNDAyMQswCQYDVQQGEwJN QTEPMA0GA1UEChMGTWFHcmlkMRIwEAYDVQQDEwlNYUdyaWQgQ0GCCQD1sVgfXZtl ijAOBgNVHQ8BAf8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAHMD4GCWCGSAGG+EIB DQQxFi9NYUdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUm9vdCBDZXJ0aWZp Y2F0ZTAyBglghkgBhvhCAQQEJRYjaHR0cDovL3JhLm1hZ3JpZC5tYS9wdWIvY3Js L2NybC5jcmwwLQYJYIZIAYb4QgEIBCAWHmh0dHA6Ly9yYS5tYWdyaWQubWEvcHVi L3BvbGljeTA2BgNVHR8ELzAtMCugKaAnhiVodHRwOi8vcmEubWFncmlkLm1hL3B1 Yi9jcmwvY2FjcmwuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQBLpbeqzOem/QUX9uB0 HZb0E93ar7thWxDtawdqaoEwbJ8mamyzm0TQlRjdU1za8OVVG27Ej+MzhNfBiR15 w/ooQUVox5iLw/m4NAiKh+MbY5Tkidi1BaEwCGIz6WiiPcsIptqD8CpfgpKIkoa3 smBNg/ZIcGl/Kbp2xqhmjjKjMeywGYm0BBab+gNAs9ahJDA9ZyainAT8opsqgD9/ i94/W1NcDNPOIlHwkIzHgmS5i1po2Ek2uRLt1RLkWutm9O9IkJQ7U5f6hstL9Cui PgaAAXfBa531reGwQhcGJKb5/nlRJasByMkXnOhJaIdkNNpr91jk5Pe6//1figze yHxb -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/MaGrid.crl_url0000644001343500074740000000004615004136204024611 0ustar davidgdavidghttp://ra.magrid.ma/pub/crl/cacrl.pem igtf-policy-installation-bundle-1.135/src/accredited/MaGrid.signing_policy0000644001343500074740000000027015004136204026163 0ustar davidgdavidg# @(#)$Id$ access_id_CA X509 '/C=MA/O=MaGrid/CN=MaGrid CA' pos_rights globus CA:sign cond_subjects globus '"/C=MA/O=MaGrid/CN=MaGrid CA" "/C=MA/O=MaGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/MaGrid.namespaces0000644001343500074740000000061615004136204025271 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)7b54708e.namespaces # CA alias : MaGrid # subord_of: # subjectDN: /C=MA/O=MaGrid/CN=MaGrid CA # hash : 7b54708e.signing_policy # (generated automatically from 7b54708e.signing_policy) # TO Issuer "/C=MA/O=MaGrid/CN=MaGrid CA" \ PERMIT Subject "/C=MA/O=MaGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/MaGrid.info0000644001343500074740000000060715004136204024105 0ustar davidgdavidg# @(#)$Id: 7b54708e.info,v 1.1 2007/11/13 15:36:50 pmacvsdg Exp $ alias = MaGrid url = http://www.magrid.ma/ca crl_url = http://ra.magrid.ma/pub/crl/cacrl.pem ca_url = http://ra.magrid.ma/pub/cacert/cacert.pem email = magrid@cnrst.ma status = accredited:classic version = 1.135 sha1fp.0 = 65:AD:EF:26:0B:4A:5C:05:72:3F:B6:92:99:0B:96:CA:7B:99:6E:F4 subjectdn = "/C=MA/O=MaGrid/CN=MaGrid CA" igtf-policy-installation-bundle-1.135/src/accredited/NIKHEF.pem0000644001343500074740000000241615004136205023535 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDjTCCAnWgAwIBAgIRI4VSMDgWJ1MHIDIXMyNDdogwDQYJKoZIhvcNAQELBQAw UjELMAkGA1UEBhMCTkwxDzANBgNVBAoTBk5JS0hFRjEyMDAGA1UEAxMpTklLSEVG IG1lZGl1bS1zZWN1cml0eSBjZXJ0aWZpY2F0aW9uIGF1dGgwHhcNMDEwOTIxMDAw MDAwWhcNMzEwOTIwMjM1OTU5WjBSMQswCQYDVQQGEwJOTDEPMA0GA1UEChMGTklL SEVGMTIwMAYDVQQDEylOSUtIRUYgbWVkaXVtLXNlY3VyaXR5IGNlcnRpZmljYXRp b24gYXV0aDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKPcwOWRMnXL MCoAXeGcD3muQ0QwvuR91Op2bfub3eGhth97XTUtdfvb9OuUC3Qpjte/louTPtok T1yzL7yj7zTF2f9OUeqXvMRqP+sw1smWWB/lvOXskeR0++rf2DELFVLU2ywv6mRb NYk13hLNIHymHEktCp6x54qTT8wlowlZWh7BsiXa1MnBj6HJZTDOmrN5lMjLyIK6 A5du00OmEELqoPMqAVgDYCpSHrEQVas41ZPR+p4qnyBHQuPr0IkjWbszCEhi019o eM1z3uguzG0Ki8NwSfQw1A185dBl5obFTeYvJzLNSOFxzjDuwpgKntUPEgqaneQD i7o+ZSJzIvUCAwEAAaNeMFwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AYYwGgYDVR0RBBMwEYEPY2FAZHV0Y2hncmlkLm5sMB0GA1UdDgQWBBRbBTqZxtUi vf2UgPwRqNDxcdZLpDANBgkqhkiG9w0BAQsFAAOCAQEAgcaL0BSF3dQYC1IYZhYZ yEXL6EaBgjU7tay1atgF5cFsLwVVifDGa9LC1FPnnuUCpK7eRbuZ0Q6r7dmXbv2Z ZKXgKLw8+yIPEaBchtBkWXiLWhP+Fl16nMdbXAfxzJ76chAopIMeLm/JDL+LQ2bb 0pnobCPdRcXVLrhUQ9Qizoa8CKRgUogOe+daiVhUV33KtCQjSm5zYrKkBELRril6 XaEsCdbhiBBk+x8bvLXwnVFEArtRqRDfPFGZJA9mWWngeXa79ZKN+WTQ/7jzW7VW rHofS3mno9sjwlbGLvPoj2SjGJbqLB8qCK3376zHuHTzcQv9YJSNa6rjmeZf+gj+ nQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/NIKHEF.crl_url0000644001343500074740000000005015004136205024406 0ustar davidgdavidghttp://ca.dutchgrid.nl/medium/cacrl.pem igtf-policy-installation-bundle-1.135/src/accredited/NIKHEF.signing_policy0000644001343500074740000000052615004136205025771 0ustar davidgdavidg# EACL - NIKHEF medium-security X.509 authority access_id_CA X509 '/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" "/O=dutchgrid/O=users/*" "/O=dutchgrid/O=hosts/*" "/O=dutchgrid/O=robots/*"' igtf-policy-installation-bundle-1.135/src/accredited/NIKHEF.namespaces0000644001343500074740000000116615004136205025074 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)16da7552.namespaces # CA alias : NIKHEF # subord_of: # subjectDN: /C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth # hash : 16da7552 # TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=users/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=hosts/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=robots/.*" igtf-policy-installation-bundle-1.135/src/accredited/NIKHEF.info0000644001343500074740000000100515004136205023700 0ustar davidgdavidg# # @(#)$Id: 16da7552.info,v 1.4 2009/10/07 07:10:50 pmacvsdg Exp $ # Information for CA NIKHEF # alias = NIKHEF ca_url = http://ca.dutchgrid.nl/medium/cacert.pem crl_url = http://ca.dutchgrid.nl/medium/cacrl.pem policy_url = http://ca.dutchgrid.nl/medium/policy/ email = ca@dutchgrid.nl status = accredited:classic url = http://ca.dutchgrid.nl/medium/ version = 1.135 sha1fp.0 = F8:4D:ED:9B:42:34:58:F4:3B:AF:BF:0A:6E:1A:84:5C:18:34:5A:A3 subjectdn = "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" igtf-policy-installation-bundle-1.135/src/accredited/NorduGrid-2015.pem0000644001343500074740000000433515004136206025056 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGXjCCBEagAwIBAgIBADANBgkqhkiG9w0BAQsFADBUMQ0wCwYDVQQKDARHcmlk MRIwEAYDVQQKDAlOb3JkdUdyaWQxLzAtBgNVBAMMJk5vcmR1R3JpZCBDZXJ0aWZp Y2F0aW9uIEF1dGhvcml0eSAyMDE1MB4XDTE1MTEyNDE1MTExNloXDTM1MTExOTE1 MTExNlowVDENMAsGA1UECgwER3JpZDESMBAGA1UECgwJTm9yZHVHcmlkMS8wLQYD VQQDDCZOb3JkdUdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMjAxNTCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALW/ewLoogqRmdxDZxFXQcgvx48N BX494mJUK95K6cHrZJ1U4Z9IhuHhmMknog0h/jYMgRaR14HVjXKn/QKKdilFWCzp ASsb/lRxqHKIZAYLk8HUkYeNjvcMSEqZI4gPKNSl/poyWlpHVXuJuqJD3/quNSgb vzt1cI6VdCKVbSZ1KDM76QNvnjpUj4birh14bkpCeahjDI/zelAQhUubyKDYwAkH x1tVN/RPtpux5RIl/P7dOvH4QcE44GWm3AkGw/0gxrfhAkRQBfZ0njne97Oq8K+K zSMHgMVi/JvZDU80ArzWi66v/HmGJLO13Tgz/SN/MTmtAoakgv5aMLA8L34SYZih smKm30RZUhEB99i1/IejFsgNUNIs01HdmPTULZL6xozSH5n0LE2NbYxq/ahDgQ8B ilKUQVJTQBXB0hJ2NtzyLvV/GcJ7MJsDQePAyrGVl5tfwIDcBmzh++QjqFxlHRF0 Hf/NkHU4rRlPjYdoollE7VAKNLiNNZ9Jcwe6UgiRNvAP4jmmYddpSedcJZo1tEPS /CFDvHZ+s6AKhxAuyMAMTgheDLYjtxHcSUw13kZDYJ9iRhdzcGO20ux3IGE1wOFM 2uUuWT67nP/cXRN/QgqpUhI5UY5pX2rfGv1drtpD6W3q21CyexLs4GYhDBIqZ9Vv 3mn7fBT2t/zvlVoZAgMBAAGjggE5MIIBNTAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud DwEB/wQEAwIBhjAdBgNVHQ4EFgQUhxfCjzhHZGovRhWHWjTO8VkZllwwfAYDVR0j BHUwc4AUhxfCjzhHZGovRhWHWjTO8VkZllyhWKRWMFQxDTALBgNVBAoMBEdyaWQx EjAQBgNVBAoMCU5vcmR1R3JpZDEvMC0GA1UEAwwmTm9yZHVHcmlkIENlcnRpZmlj YXRpb24gQXV0aG9yaXR5IDIwMTWCAQAwGwYDVR0RBBQwEoEQY2FAbm9yZHVncmlk Lm9yZzAbBgNVHRIEFDASgRBjYUBub3JkdWdyaWQub3JnMDsGA1UdHwQ0MDIwMKAu oCyGKmh0dHA6Ly9jYS5ub3JkdWdyaWQub3JnL05vcmR1R3JpZC0yMDE1LmNybDAN BgkqhkiG9w0BAQsFAAOCAgEAiVW/c7/soiCVdj35mIihVdid7jfBXniSaBkDyQuv BX77S2nhWPNBJZd/JXzRQu+kZ6c8N6T0FLJ9IELGJkrB9n8Gy1Q4dPcqfRWqIYZ8 aQZigRRnc7vrkFuB01bGYnsFOAIFf+qcaxhFmzE1AquWAH2J6/Ql8emTCbR2bOTL xvbPPNwV+Ye2PZUU5x3jrKxHqFpN/R5YiC3tvxKKU2KXPq4yopvfFy7NfyLK9SyN YaR196IdUJfg5JwxD1b/Ee4jFaTdfMaoF2jdPfcl3MVZuMJVG8Q9YhRW6U54F8D7 FqR7GCkY88iDXk+VaRbyltF99PyPL6tyj2bHvjeqRau7o9qB8q60sUq3dJnzkLML DIAqpPCNWKDHM0QkN1fF7ucyVJWJzMXt7oFPKKUqB1Anse5x6kRzqMAT4F1H6PIc zrarbDYowyt6SoKPTDX+Abwu8NuljfH7VBUNSBBx9oXVOMwehJzaRB8/HRBvdtt7 Kiz1hJ7edfb+H3/YpnE5VWxQrKfn42bxVw5RpG1o0YMryBZL0QUoBnY/8hbmSSl8 nrGQeNSkL5SxrMbiR5lHR6M5s49tC1SuVpQH0JeP3R4f+G4xylF2SB3O7Jmlm1PG Kh6/qmXeYOjhU/xjEwnJ1912wDIDsIeLu1P6hm+swWa5Auf6lmWBOATv13MmcpZU gZA= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/NorduGrid-2015.crl_url0000644001343500074740000000005315004136206025730 0ustar davidgdavidghttp://ca.nordugrid.org/NorduGrid-2015.crl igtf-policy-installation-bundle-1.135/src/accredited/NorduGrid-2015.signing_policy0000644001343500074740000000027215004136206027306 0ustar davidgdavidg# EACL NorduGrid 2015 CA access_id_CA X509 '/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015' pos_rights globus CA:sign cond_subjects globus '"/O=Grid/O=NorduGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/NorduGrid-2015.namespaces0000644001343500074740000000075615004136206026417 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)NorduGrid2015.namespaces # CA alias : NorduGrid-2015 # subord_of: # subjectDN: /O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015 # hash : NorduGrid2015.signing_policy # (generated automatically from NorduGrid2015.signing_policy) # TO Issuer "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015" \ PERMIT Subject "/O=Grid/O=NorduGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/NorduGrid-2015.info0000644001343500074740000000063415004136206025226 0ustar davidgdavidg# Information for CA: NorduGrid-2015 alias = NorduGrid-2015 ca_url = http://ca.nordugrid.org/NorduGrid-2015.crt url = http://ca.nordugrid.org/ email = ca@nordugrid.org crl_url = http://ca.nordugrid.org/NorduGrid-2015.crl status = accredited:classic version = 1.135 sha1fp.0 = 7D:4E:B2:72:27:1D:CB:FF:04:67:59:F0:60:27:22:2B:B8:02:98:EF subjectdn = "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015" igtf-policy-installation-bundle-1.135/src/accredited/PK-Grid-2007.pem0000644001343500074740000000360715004136206024360 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFYTCCA0mgAwIBAgIFcaAWAgAwDQYJKoZIhvcNAQELBQAwMDELMAkGA1UEBhMC UEsxDDAKBgNVBAoTA05DUDETMBEGA1UEAxMKUEstR1JJRC1DQTAeFw0wNzEyMTIx MTEzMjBaFw0yNzEyMTExMTEzMjBaMDAxCzAJBgNVBAYTAlBLMQwwCgYDVQQKEwNO Q1AxEzARBgNVBAMTClBLLUdSSUQtQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQC2Bw8/6zB1+ELE8QOadL5oORDmTYZ7WAFJWk8CHYAptGCuMuWxPDrB knhjd4MmdRqnWx+YLtdGwFF3AZZbylPyL0BIriXWF3hxES5kWmb3qZddpS7jVZqt hb5B7zxVl2k3XWx7XZxiO2zbaefLwGpS2alByMC/DfYOl5MvCgTNAPa7zJoqfXYS KLOj/6MLQBDZRxepkR9SgEKpi2294o+T3D0DpDUKwJ4NfHBFsQpWk/ciZLAYtbMp w9rQ3FlhDPRR2moY5WrR3gTN9q07XnTzpi61j0RG8iNIAk0XLaFvltxJMYmoszIa F23lbv6zPSyQLkYyWJ5Zsp7bRJuA5V4HAl0WhCjCg8T8OtK/uR5LCEa5btVsY1rP ETSewndAI5FK8p5rdOZTH9IUQ9jRH4cT7W+DbVtuPw4mvBOFg+bn+r6qOvLF375p gXzsa7ZaxJqtPw6RTFhgoO3/y+QyauQYXG6tqDhYsO67w6VMtSigQiELCe8H4bT0 cCF9YHDGUqZxIfXJvdU2LHvbd+HBJgGG74ixodYGyMk8HBkZPIcl45ykSKSJTeyv byuz2IoouIduLnCWXyzMr7ML9aFh9knKxlUY3eXFZXDecGvcpinLwRJGilGTLlux fmlvNyluKM7fKTaHD4rJT3mw9lT4a5Pbeci6i8+SKrtMxNXxflrtMwIDAQABo4GB MH8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwQgYDVR0fBDswOTA3 oDWgM4YxaHR0cDovL3d3dy5uY3AuZWR1LnBrL3BrLWdyaWQtY2EvMjAwNy9DUkwv bmNwLmNybDAYBgNVHREEETAPgQ1jYUBuY3AuZWR1LnBrMA0GCSqGSIb3DQEBCwUA A4ICAQBoGRnN0Cf+HqNJB5eCDP7fsOeckeQ7077fxKs5xAi7x3vuxU6M35UfgXQ6 1kqi2D9i+ZAseBubxxlagRGKdTyExQw1RoZvOHev7oJ+l11fjyVzSw1LQ51s7EOH LxEJBNlKnYm/S3WAgfcNAzffK4sisubFjEcv+CFuN0U7GunJT3w9SyHRVOLd9M8t ROLoRuFARdK+SimWDZqG4vGoJpLNsJ6AVjBRMOXMC+h13emHOAiP1G3w7XLmnTMV U/BSz5gIT+KRw7uk+TYFaHJQ6PU6bU44ILeA4ftJR+SQpt/EUkgUb2wK59Vjvmc/ p7BvrNXBfUeRO8ivToNIpy++uLzR+l5NSotI65FRhCa+qb9jllldMqXGXp7+N8bo HISfonhr6pNvpMvusnnQvkH5pEBtnJQh96pxI0WemAvV64Da3szW6BtlVhv5/4uq 6yoe/ZAZf8wxCa+V2hMzwX7J1RhWf6QISS0CEXKd1vfzEDvmOH6Jy+Y97EvFfvkR +yzlWOks+6QrTumMMHci7fWCnieFFogD6zUYekWAbVz1E6fn38zabavgGA+9QvlP n+U7xWoIjtB4tr0V8VPu8O4m+qK/rHva00kil1m6f8o5r6MeRlgQMHWv8hrwY762 2OGs7OEBrOv4WFPJ0a1sKmIA1cDcAYWZNISXJLXaDwsHZw3v+A== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/PK-Grid-2007.crl_url0000644001343500074740000000006215004136206025231 0ustar davidgdavidghttp://www.ncp.edu.pk/pk-grid-ca/2007/CRL/ncp.crl igtf-policy-installation-bundle-1.135/src/accredited/PK-Grid-2007.signing_policy0000644001343500074740000000026615004136206026612 0ustar davidgdavidg# ca-signing-policy.conf # @(#)$Id$ access_id_CA X509 '/C=PK/O=NCP/CN=PK-GRID-CA' pos_rights globus CA:sign cond_subjects globus '"/C=PK/*"' igtf-policy-installation-bundle-1.135/src/accredited/PK-Grid-2007.namespaces0000644001343500074740000000057015004136206025712 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)f5ead794.namespaces # CA alias : PK-Grid-2007 # subord_of: # subjectDN: /C=PK/O=NCP/CN=PK-GRID-CA # hash : f5ead794 # (generated automatically from f5ead794.signing_policy) # TO Issuer "/C=PK/O=NCP/CN=PK-GRID-CA" \ PERMIT Subject "/C=PK/.*" igtf-policy-installation-bundle-1.135/src/accredited/PK-Grid-2007.info0000644001343500074740000000065515004136206024532 0ustar davidgdavidg# # @(#)$Id: f5ead794.info,v 1.2 2008/01/13 11:18:19 pmacvsdg Exp $ # Information for CA PK-Grid-2007 (supersedes d2a353a5) alias = PK-Grid-2007 crl_url = http://www.ncp.edu.pk/pk-grid-ca/2007/CRL/ncp.crl url = http://www.ncp.edu.pk/pk-grid-ca/ email = pkgrid-ca@ncp.edu.pk status = accredited:classic version = 1.135 sha1fp.0 = A9:39:DC:47:B9:AC:C9:22:88:59:DC:25:C7:62:AE:24:CC:89:37:45 subjectdn = "/C=PK/O=NCP/CN=PK-GRID-CA" igtf-policy-installation-bundle-1.135/src/accredited/PKIUNAMgrid.pem0000644001343500074740000000435115004136207024545 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGZzCCBE+gAwIBAgIIFIqHks3e8BEwDQYJKoZIhvcNAQELBQAwRTELMAkGA1UE BhMCTVgxDTALBgNVBAoMBFVOQU0xETAPBgNVBAsMCFVOQU1ncmlkMRQwEgYDVQQD DAtQS0lVTkFNZ3JpZDAeFw0xNzExMTAxNzUxMTFaFw0yNzExMTAxNzUxMTFaMEUx CzAJBgNVBAYTAk1YMQ0wCwYDVQQKDARVTkFNMREwDwYDVQQLDAhVTkFNZ3JpZDEU MBIGA1UEAwwLUEtJVU5BTWdyaWQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQDD4w99tPCEUAiTx9zxQFleb8Hh7zZ1+riB/5+h7nQ+S3U0watf+Dry75+b Cq+iwJCtdal+e3W+QgvSNxICL9CsbcKShSLEomduW7C4OvV5cH1tyzZnN+/D46pm ibj6/JmnUZP0/pbqwhhisiPvI7fVY9z4Re9DoTXcJMaukKcxSHRwU8c6xLMHteIi A62bZBDnVCGMR4rnxcS6Qsl8PRBYaZkLmPLq6imYP72eNtOvq2WdIxWLaGcFjcHU psuIEP6o0gk/FC6bvQjaHp/cVC91CLU7tge4uVQ/RyGqtvWk1xdo93AvzXGMqkkC yTayZR6NhZEMcY9cf0W+K4BCSXVuYTiERGBKDEi5NDg+TpITtPXvvCBCc3obC+dA 8PPzD0gSYZM2rjJhDq8+4bvU07ROCPavV0deYPr9jXO6hcZ9whDgNGtA4EAAcLDY CcqhhyoNjY2vGh9W92EyqlfmHiUL+aaSj4n2NCFqYSdhIko1Eba4V2dUjIQ8VIzl hmEcpkXVGaYkCZgHTNOHp3FB2CIwRXtHEVRZ4G4IO80gf91ng1Olh7//sALARo9o GppbvkoKI6VaDq+5wEMIkxctWfprEaNvaOOD57/R52QebNcinQRbiAxY8dF0UIj8 t0q+n4imNklqjuqwyUZvCa3UgEKNPsP+nj0VbpvKMcdscHtB/QIDAQABo4IBWTCC AVUwUgYIKwYBBQUHAQEERjBEMEIGCCsGAQUFBzABhjZodHRwOi8vY2EudW5hbWdy aWQudW5hbS5teC9lamJjYS9wdWJsaWN3ZWIvc3RhdHVzL29jc3AwHQYDVR0OBBYE FBZpd5IKlwEEES6+IV7PxHx4uXkuMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgw FoAUFml3kgqXAQQRLr4hXs/EfHi5eS4wWAYDVR0gBFEwTzBNBglghkgBhvhCAQgw QDA+BggrBgEFBQcCARYyaHR0cDovL2NhLnVuYW1ncmlkLnVuYW0ubXgvZWpiY2Ev Z3JpZDIvQ1BfQ1BTLmh0bWwwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2NhLnVu YW1ncmlkLnVuYW0ubXgvcHViL2NybC91bmFtZ3JpZC1jcmwuY3JsMA4GA1UdDwEB /wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAqGT3fFvgVTMhmivBYJCKF1Tlryn5 maTa+nOmKfWZwDKFS6R79Soe50dNKnbvmt3dw9k1xvvUvpfEk2bAwJBsKsoil2Un b24UwQQh7t2xyvuNQbY0TZMQIGcLQhWz3uZ1uQDiC5zGLVIuf/LMMwJb53zNDdqJ C0gA5letRsnlxEIS9DVonS2RTFlBKWPSRIhHGMPD7xBTlmfTfWJd94a/ylxerAzF X05vKtPK22gkRrRFmkcQqMOVrTSJaCJQ9yDC4CySc5oSC55nChCiaLxifCl1Of7G kJMViCxM/CSbvz1jQwwaJ4n1gDGeXtT5E9niZ8E0Lw+hUNcJT6/+al+IajxHhmCa 97JlbvgQex9h/DP/Zfu/wyLbD/6uuWtHgSmZh+E2J4wml1wumC92Wu0Lzg7SjPFK /sk07BwhH3iJ13sb0MmJfzWkakXVu4cWGN1UEBGIhJX2npnmozZF9IdHGWOOgXQV dW32eNWNEClZJ1/hfQCANGtOuW4PU0jVFvRc2/37sym88gxsA7vuuoODG9dCOzmU FoGtDtQsCByu8sRq5h7feDXleHc4601BunD4DRfkewcJSLSrjQhlprdUpR0ltgV7 aenvcb8TnMn8NSLNGRJAJRmvMBrpDbbqKjKNBLUA41LZ6wLMN0lyqZwlG51mC2YX sPtFxVT/AvO00Ww= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/PKIUNAMgrid.crl_url0000644001343500074740000000006415004136207025423 0ustar davidgdavidghttp://ca.unamgrid.unam.mx/pub/crl/unamgrid-crl.crl igtf-policy-installation-bundle-1.135/src/accredited/PKIUNAMgrid.signing_policy0000644001343500074740000000030415004136207026773 0ustar davidgdavidg# @(#)$Id$ # access_id_CA X509 '/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid' pos_rights globus CA:sign cond_subjects globus '"/C=MX/O=UNAMgrid/*" "/C=MX/O=UNAM/OU=UNAMgrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/PKIUNAMgrid.namespaces0000644001343500074740000000104015004136207026073 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)PKIUNAMgrid.signing_policy.namespaces # CA alias : # subord_of: # subjectDN: /C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid # hash : PKIUNAMgrid.signing_policy # (generated automatically from PKIUNAMgrid.signing_policy) # TO Issuer "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" \ PERMIT Subject "/C=MX/O=UNAMgrid/.*" TO Issuer "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" \ PERMIT Subject "/C=MX/O=UNAM/OU=UNAMgrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/PKIUNAMgrid.info0000644001343500074740000000107015004136207024712 0ustar davidgdavidg# # @(#)$Id: PKIUNAMgrid.info,v 1.1 2017/11/10 13:04:58 pmacvsdg Exp $ # Information for 2017 UNAMgrid CA # alias = PKIUNAMgrid url = http://ca.unamgrid.unam.mx/ ca_url = https://ca.unamgrid.unam.mx/ejbca/publicweb/webdist/certdist?cmd=cacert&issuer=CN%3dPKIUNAMgrid%2cOU%3dUNAMgrid%2cO%3dUNAM%2cC%3dMX&level=0 crl_url = http://ca.unamgrid.unam.mx/pub/crl/unamgrid-crl.crl email = camanager@unam.mx status = accredited:classic sha1fp.0 = 1D:05:8F:6A:75:5A:A8:36:12:88:22:D2:8A:3A:31:EA:6C:2B:5A:B8 version = 1.135 subjectdn = "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" igtf-policy-installation-bundle-1.135/src/accredited/PolishGrid-2019.pem0000644001343500074740000000356315004136210025226 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFUjCCAzqgAwIBAgIBADANBgkqhkiG9w0BAQsFADA6MQswCQYDVQQGEwJQTDEN MAsGA1UECgwER1JJRDEcMBoGA1UEAwwTUG9saXNoIEdyaWQgQ0EgMjAxOTAeFw0x OTA2MDEwMDAwMDBaFw0zOTA2MDEwMDAwMDBaMDoxCzAJBgNVBAYTAlBMMQ0wCwYD VQQKDARHUklEMRwwGgYDVQQDDBNQb2xpc2ggR3JpZCBDQSAyMDE5MIICIjANBgkq hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsPLrKweIHR8+YU0QO1iRASPecXnTSM+L fT71RpBnpunrWl7LAbmRk0CUlTfXbpSU7V/kjlAmfhN40lhZhAI6XDgT/upwo+k/ XdqV/59jJokH4IlwiC0G6bw8l+XNs5PpogWdgzFWOkq/OAQfV+NqpKd8Gs7/HQDz 3OWqeg2DmEuoBEiEVNlDFXnbwA+dlfsHPHLZ+YNiSJE/Zyct6QG5PY32NQXqfHUl 9vuzVHKTiqza7kTXFMC79MPYvgWgXVy55KH5ar2LEMqHRxy+7bEaT/s1W975aToS W0Dxpg4/dd7Kp7rtOSaBu2s0XDgoFDiOucOF0N1IGZyfSxuzFdQyFmhfC9Q6GkHx bfIjkZZr3noOrhJZ2CpFNAfFeCvwSbTwl4t5b5huHISzv5Jlp5XRaDw1EHnL+yWT CPp4mLDLKUVf0E7X6zEDfHXTZWuZ0uGZ2AQMYiI25QlzM5STOv9yh0q/Nb+5gaoP iGFNP3eVyqrHVHF/7gIuKPzw3vI44aPvaozDYqpZhSDQir2t5bcFmmcqyqOFxw2K 6QZpkpit1MN9j/ShqqjTyiNtqbFIAnMohCXmaTakMHpG8DeBwT5DmGBoG/hntmvI 72pvEXq+SiILxEZb6dt3C9+t2O4duBslMMcO4iHLHs0vv/zPm2kL7DzZUNYoGlQw zlrvq84v6EUCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwHQYDVR0OBBYEFHEO1+YMKIOjSoLgyMWXz6gJizBaMB8GA1UdIwQYMBaAFHEO 1+YMKIOjSoLgyMWXz6gJizBaMA0GCSqGSIb3DQEBCwUAA4ICAQCYxEx8DXZ6p0rx f0hqifbjaGfEkUUhnKhE83F9Xpd9EtCvm+i/4OH6QFimwtHm3AZer7ihyarbxC/u G3PkXAK9aHth51IBZFbfmvZAPkHJurHdIyJ3XnrfxlE/0kVtoYkxy0hQPAE5vmQW p9J3LZq6knXKaCqgDyaJjMgDZbRDOnak6GgC34Xs1/qtamufFJp+H/HH8IRinRPi 6V3b6U2D0oWC5uTa3XwnKQvVY/QwKCp33WDTmovKqMTUdoFjzmDKAa3NeQSYe3d+ QsS1ostnGV+ZKo7oU6ND+tu/LGqfti7U8usip3/6Bitt4+geBbmF1QIG/mqf6o/N zgZFIkxjlViKb/LxnAibMitk7hFoYVD43X14dWl/FZpjTlPMntA+PIMtOBuVtBef 0T+saCv8nV1gk17/ZMI7nF5nhFdTpNl7DFLdzEdJ6ZgYbc4Q4+DZDXB+7hxcIzfO erjBf1ST0Luy8w+juEgokTQ/uQuFBlzABR0t5flNJPKmz0QfX81E0+hjyQg+4lUu fvm+wPF6L4YaU/WtCEqLW+bzCxF4YCVwVGleHzp0SkXeO5Nk9KBF+JpuQXrh+2yQ 1C/rCzGEmp+OIwtNf745BteFtRS/7hzduhuIlFtJhjDp8ykQ06cjImqoi3Owt+tN 8qsUwmdaMN1V5bPznV1m0e5tj8AugQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/PolishGrid-2019.crl_url0000644001343500074740000000006015004136210026074 0ustar davidgdavidghttp://www.man.poznan.pl/plgrid-ca/2019/crl.crl igtf-policy-installation-bundle-1.135/src/accredited/PolishGrid-2019.signing_policy0000644001343500074740000000022615004136210027453 0ustar davidgdavidg# EACL Polish Grid CA access_id_CA X509 '/C=PL/O=GRID/CN=Polish Grid CA 2019' pos_rights globus CA:sign cond_subjects globus '"/C=PL/O=GRID/*"' igtf-policy-installation-bundle-1.135/src/accredited/PolishGrid-2019.namespaces0000644001343500074740000000071115004136210026554 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)PolishGrid-2019.signing_policy.namespaces # CA alias : PolishGrid-2019 # subord_of: # subjectDN: /C=PL/O=GRID/CN=Polish Grid CA 2019 # hash : PolishGrid-2019.signing_policy # (generated automatically from PolishGrid-2019.signing_policy) # TO Issuer "/C=PL/O=GRID/CN=Polish Grid CA 2019" \ PERMIT Subject "/C=PL/O=GRID/.*" igtf-policy-installation-bundle-1.135/src/accredited/PolishGrid-2019.info0000644001343500074740000000062115004136210025370 0ustar davidgdavidg# # @(#)$Id$ # alias = PolishGrid-2019 url = http://www.man.poznan.pl/plgrid-ca email = plgrid-ca@man.poznan.pl crl_url = http://www.man.poznan.pl/plgrid-ca/2019/crl.crl ca_url = http://www.man.poznan.pl/plgrid-ca/PolishGridCA-2019.pem status = accredited:classic version = 1.135 sha1fp.0 = DD:D9:1C:6A:B8:BE:B5:B3:98:F0:81:F1:F2:35:56:4E:07:07:15:09 subjectdn = "/C=PL/O=GRID/CN=Polish Grid CA 2019" igtf-policy-installation-bundle-1.135/src/accredited/RCauth-Pilot-ICA-G1.pem0000644001343500074740000000354315004136210025701 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFSDCCAzCgAwIBAgIQCfXXVo6J6IfYFlP+q8eE4jANBgkqhkiG9w0BAQsFADBs MRIwEAYKCZImiZPyLGQBGRYCbmwxGTAXBgoJkiaJk/IsZAEZFglkdXRjaGdyaWQx IjAgBgNVBAoTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxFzAVBgNVBAMTDkRD QSBSb290IEcxIENBMB4XDTE2MDIwMTAwMDAwMFoXDTI2MDEzMTIzNTk1OVowgZAx EjAQBgoJkiaJk/IsZAEZFgJldTEWMBQGCgmSJomT8ixkARkWBnJjYXV0aDEiMCAG A1UEChMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczE+MDwGA1UEAxM1UmVzZWFy Y2ggYW5kIENvbGxhYm9yYXRpb24gQXV0aGVudGljYXRpb24gUGlsb3QgRzEgQ0Ew ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3o5HL4yoZxfePD6DiRJiJ L3MV/pkwNjbFzC72OnX8vUr0hjSoCoiGIQZ/Yqlr1mqhlzVXUIkmYTfzTn09paSW HTJwvYCzS4ov4z2lMwzUIpBJ8BZlwEAF6H2uF50yZucMpumHAt3wmxgLJs7EMCU6 eTsLz3XvlCKvJfQYa6ScWZU75BNLS/nXwsHjQYIP9NDgofRc5cyrkotAAsoiBnqK UnW3PUbRSF5ImN2+VGy0s8upVkuODGicjSeRO+SVN0DbROnmKHzotvepANWnefZy C13rr+QxGg2iAj/mt3ONxCmMyzUcAi6Q0WWvz0D+cA5qorXqxW+TOaw7DUHrD7pf AgMBAAGjgcAwgb0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFB+9RNPNxNmQF+n3NJhgo0RbfQZHMB8GA1UdIwQYMBaAFFJ8L7KCWUmm 8Agd72gFoTUyiignMBkGA1UdIAQSMBAwDgYMKwYBBAHRQgQCBwEBMD8GA1UdHwQ4 MDYwNKAyoDCGLmh0dHA6Ly9jcmwuZHV0Y2hncmlkLm5sL2RjYXJvb3QvZzEvY3Js L2NybC5jcmwwDQYJKoZIhvcNAQELBQADggIBACbJqxl4B08Hlt8BTZq8F9Fa2KHn UutH5H8Nt0KmILgLNvPjr2YGv8dDurHoREXcH/9ZcH+YFZ6u+Xtoz1CEKgZDVqjQ m356cAdG7RKSa1317itABNteQ2U8QPbnIcdoX3owDDUIaJe4di51QpabPeX3etHh jGSktJ2Ee1AAhP6CIIGE+tRJMeBepo/2gVZbCHn39bx5He+7ue862F67dLpWJ+UP G3eUvsTjL/pWBgcuNNdD6EXlWa0a5WECdtBZwTWM4GJUa1d0w53qA/pwbUxjGIFx fYDE2EneQmkujT7HgGpYXOSuhhnz1dfzAO3XOc0M9AuLW8/zsEEg6Yds5CQmOPRD ABiyhjKVZUtls8PFyQNQcIrW18zmqZ3eiFOruSjvnY3i4pthrmrIuFZJKMFTP9jK 14OLqCZ3QrUBTh4WyCb9KURbVINiKkNSAVJII6ANfciOxAblmTkNdjZE/+ioKpxV E4jf2XiFr4djlXoEhIjM/oC2R8sl1fa0tX/CwPp7PKx/TSInSeLw0LBOlFB/ntTE JvdZnbPIlFGlSQd9vIbdz3k3Fh9HmDtsEkx5pIFc/Cq1ZJY7FtPVGzFroewC+Aoq gpmByW/hJ0Fn0/wZuC8DFU02QHIW3ES7AsChzyzxxxj5ZflXhFPGUIzhvl23jz/L k1pn+KgTlIxaOMqO -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/RCauth-Pilot-ICA-G1.crl_url0000644001343500074740000000005215004136210026552 0ustar davidgdavidghttp://www.rcauth.eu/pilot/g1/crl/crl.crl igtf-policy-installation-bundle-1.135/src/accredited/RCauth-Pilot-ICA-G1.signing_policy0000644001343500074740000000056115004136210030132 0ustar davidgdavidg# EACL RCauth Pilot ICA G1 access_id_CA X509 '/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA' pos_rights globus CA:sign cond_subjects globus '"/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" "/DC=eu/DC=rcauth/DC=rcauth-clients/*"' igtf-policy-installation-bundle-1.135/src/accredited/RCauth-Pilot-ICA-G1.namespaces0000644001343500074740000000107115004136210027231 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)rcauth-pilot-ica-g1.namespaces # CA alias : rcauth-pilot-ica-g1 # subord_of: dca-root-g1 # subjectDN: /DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA # # This RPNDC is optional if the superior root RPDNC is used as-is # TO Issuer "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" \ PERMIT Subject "/DC=eu/DC=rcauth/DC=rcauth-clients/.*" igtf-policy-installation-bundle-1.135/src/accredited/RCauth-Pilot-ICA-G1.info0000644001343500074740000000112615004136210026046 0ustar davidgdavidg# # @(#)$Id: RCauth-Pilot-ICA-G1.info,v 1.2 2016/05/11 16:18:02 pmacvsdg Exp $ # Information for RCauth-Pilot-ICA-G1 # alias = RCauth-Pilot-ICA-G1 requires = DCAROOT-G1 ca_url = https://www.rcauth.eu/pilot/g1/ca/cacert.pem crl_url = http://www.rcauth.eu/pilot/g1/crl/crl.crl policy_url = http://www.rcauth.eu/policy/ email = ca@rcauth.eu status = accredited:iota url = https://www.rcauth.eu/ version = 1.135 sha1fp.0 = 8B:F3:1F:7D:46:57:B4:19:F5:D7:CB:A8:17:4E:E6:F9:C9:18:29:4D subjectdn = "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" igtf-policy-installation-bundle-1.135/src/accredited/RDIG.pem0000644001343500074740000000361715004136211023317 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFaTCCBFGgAwIBAgIKIFMDmVEzeQInBzANBgkqhkiG9w0BAQsFADBFMQswCQYD VQQGEwJSVTENMAsGA1UEChMEUkRJRzEnMCUGA1UEAxMeUnVzc2lhbiBEYXRhLUlu dGVuc2l2ZSBHcmlkIENBMB4XDTA1MDgwODIwMDA0OFoXDTMwMDgwODIwMDA0OFow RTELMAkGA1UEBhMCUlUxDTALBgNVBAoTBFJESUcxJzAlBgNVBAMTHlJ1c3NpYW4g RGF0YS1JbnRlbnNpdmUgR3JpZCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBAMcKxI/r0U8LpUWzdz8idKvRtPLzaa6kTFsPX9m3xXcic84kBEoHGCof Al5dsMwYa/iM0oCyetIKAPaBK07ZHCUEXznbVMSZZ29ecqu4issS8PAR6f3neO1f BGDA3PRyqR4Q5japLTxmLCdyL4D71aT1G3qtgeIYtCbT6auJBxB/O1ExSEEjmNXt gVDZ6JoLrxhQ9NxyksJ8oHjvk5B6E7iuvcVwW+JnJD2VrmuMnpaoHvl8yxB+6R0P PpCxNGe/XTJaXYbKcFk37LIrcUQVEPME/3FdCO344XRSm2MBM37fD5XJH9td+FBk 5DaTxuCzyj63Y/ROoyIQxLZw6Jh1xR0CAwEAAaOCAlkwggJVMA8GA1UdEwEB/wQF MAMBAf8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzAdBgNVHQ4E FgQUtxr5ff7SHmGpqYwhaIt+YIy5cFkwHwYDVR0jBBgwFoAUtxr5ff7SHmGpqYwh aIt+YIy5cFkwPQYDVR0SBDYwNIEUcmRpZy1jYUBncmlkLmtpYWUucnWGHGh0dHA6 Ly9jYS5ncmlkLmtpYWUucnUvUkRJRy8wPwYIKwYBBQUHAQEEMzAxMC8GCCsGAQUF BzAChiNodHRwOi8vY2EuZ3JpZC5raWFlLnJ1L1JESUcvY2EuaHRtbDA2BgNVHR8E LzAtMCugKaAnhiVodHRwOi8vY2EuZ3JpZC5raWFlLnJ1L1JESUcvY2FjcmwuZGVy MEsGA1UdIAREMEIwQAYLKwYBBAGBrHsBAQEwMTAvBggrBgEFBQcCARYjaHR0cDov L2NhLmdyaWQua2lhZS5ydS9SRElHL3BvbGljeS8wKwYJYIZIAYb4QgECBB4WHGh0 dHA6Ly9jYS5ncmlkLmtpYWUucnUvUkRJRy8wFgYJYIZIAYb4QgEIBAkWB3BvbGlj eS8wHQYJYIZIAYb4QgEEBBAWDmNnaS1iaW4vZ2V0Y3JsMCAGCWCGSAGG+EIBAwQT FhFjZ2ktYmluL2NoZWNrcmV2PzBUBglghkgBhvhCAQ0ERxZFSXNzdWllZCBieSBS RElHIENlcnRpZmljYXRpb24gQXV0aG9yaXR5LCBodHRwOi8vY2EuZ3JpZC5raWFl LnJ1L1JESUcvMA0GCSqGSIb3DQEBCwUAA4IBAQCILJozFgjdRL8T/TAq7nzR22cR OdgUn0A3XzAJtByckuaBkMnDfmaLkhSQwPzBUpb6shv6o/RJsCuNU22iQc7YUbns 3NvPDa/Gli7lRplYZEMQHERnO0DchmXp1/eh883aA4ZiHu65n+L7mzpSYfJIDATA FctkFmvQfj/rxIUcQfVjOSb4QWhncEhBvsizd5uetP0MGjZR0ybBeVq1+LQc9/iU e5jEJENfFjxXlpDnYM+FUzhA+RZdxf8J+s5PHjqep+jPSm9/dj3/YfG8bipvCtVr L17V/VtswQfupLHmLTrD8csqeMce0PaKHIuVdeW3OLZgzkfAhvoh2dDipH1I -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/RDIG.crl_url0000644001343500074740000000005215004136211024166 0ustar davidgdavidghttp://ice.grid.kiae.ru/ca/RDIG/cacrl.pem igtf-policy-installation-bundle-1.135/src/accredited/RDIG.signing_policy0000644001343500074740000000042115004136211025541 0ustar davidgdavidg# # @(#)$Id$ # EACL Russian Data Intensive Grid CA # access_id_CA X509 '/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA' pos_rights globus CA:sign cond_subjects globus '"/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" "/C=RU/O=RDIG/*"' igtf-policy-installation-bundle-1.135/src/accredited/RDIG.namespaces0000644001343500074740000000065215004136211024651 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)55994d72.namespaces # CA alias : RDIG # subord_of: # subjectDN: /C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA # hash : 55994d72 # (generated automatically from ./Russia/55994d72.signing_policy) # TO Issuer "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" \ PERMIT Subject "/C=RU/O=RDIG/.*" igtf-policy-installation-bundle-1.135/src/accredited/RDIG.info0000644001343500074740000000075415004136211023470 0ustar davidgdavidg# # @(#)$Id: 55994d72.info,v 1.4 2006/05/16 11:15:06 pmacvsdg Exp $ # Information for CA RDIG # obtained from 55994d72 in Russia/ alias = RDIG ca_url = http://ca.grid.kiae.ru/RDIG/cacrt.pem crl_url = http://ice.grid.kiae.ru/ca/RDIG/cacrl.pem email = rdig-ca-support@grid.kiae.ru status = accredited:classic url = http://ca.grid.kiae.ru/RDIG/ version = 1.135 sha1fp.0 = 69:94:15:0F:7D:8A:81:B2:4B:67:94:B6:B5:EF:F9:2E:63:A8:B4:21 subjectdn = "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" igtf-policy-installation-bundle-1.135/src/accredited/REUNA-ca.pem0000644001343500074740000000323015004136212024015 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEsjCCA5qgAwIBAgICAh0wDQYJKoZIhvcNAQELBQAwRzELMAkGA1UEBhMCQ0wx EDAOBgNVBAoTB1JFVU5BQ0ExJjAkBgNVBAMTHVJFVU5BIENlcnRpZmljYXRpb24g QXV0aG9yaXR5MB4XDTA3MDUxNDEwMzUyMVoXDTI3MDUxNDEwMzUyMVowRzELMAkG A1UEBhMCQ0wxEDAOBgNVBAoTB1JFVU5BQ0ExJjAkBgNVBAMTHVJFVU5BIENlcnRp ZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEArSnYK4nTIDGLVE00tEy4wILAxKhpY9H7DQqyKcwSC605StNv2jeON17YPHJH KlaAlRlmE0ujVhbi1kmIV7RNNj1ckzczhaft/CS+xvlD3cL9Xp7Pk5tDBKTQj+TV AicN0C8/VR9obV0Cxzc91DSGCSZ3wYNlgeqpJhCtZmACAH2C043Hx15nh5eoxNXG ZC/XLVZHBEMv+xRaVl8aG45IYMe7aRB5LkkfldPu133qEPzzjsRQlVFDxnwLuaYV s2xlUQ++4JAE0kakpzS8ZZMuUarPKuuYuWYjMpJ8PhXv8s8seip+NC4l72Z+ycNQ u+Uts9MSLmb4VvDet9pT8FQILwIDAQABo4IBpjCCAaIwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUo65IjrnBjrGSql4M0NydSwUuLFcwHwYDVR0jBBgwFoAUo65I jrnBjrGSql4M0NydSwUuLFcwDgYDVR0PAQH/BAQDAgHGMBEGCWCGSAGG+EIBAQQE AwIABzA1BgNVHR8ELjAsMCqgKKAmhiRodHRwOi8vcmV1bmEtY2EucmV1bmEuY2wv Y3JsL2NybC5wZW0wNQYJYIZIAYb4QgEDBCgWJmh0dHA6Ly9yZXVuYS1jYS5yZXVu YS5jbC9jcmwvY2FjcmwucGVtMC8GCWCGSAGG+EIBCAQiFiBodHRwOi8vcmV1bmEt Y2EucmV1bmEuY2wvcG9saWN5LzBLBgNVHSAERDBCMEAGDiqGSIb3TAUEAgIBAQEB MC4wLAYIKwYBBQUHAgEWIGh0dHA6Ly9yZXVuYS1jYS5yZXVuYS5jbC9wb2xpY3kv MEAGCWCGSAGG+EIBDQQzFjFSRVVOQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSwg Q1AvQ1BTIHZlcnNpb24gMS4xMA0GCSqGSIb3DQEBCwUAA4IBAQAJw+/g3I3Jx4xD s4QT1G5QN52+FmdUcOOwBcoO8crOTltKRRvc28H4Xq7ylROOaHmCiNV7qPHc9M0M Br2hAIDc6PNXHjc+h8FIfOIsK8YGJYYK4z1Yq8Kk4NdH1q1k2wG9dZo++kqqDhkU 202UIhLup9JCpeWPjmI/aChFtqRslHDbgzSuQM91bKTOX8JZeexQ71gWBVYmCri5 XD96u3FDOz9bM8SaA+btC5BAtoYF14dKaKWDIGRAqpFiBKj57xNYKVh9uk5bycQt LVdpzwR8rfXw4Pg7kD5ufkqFBGa4grqvJRLnHfj1HsEDPH70gEtbHAe0bB3PpXC4 9qkJIOOz -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/REUNA-ca.crl_url0000644001343500074740000000004515004136212024677 0ustar davidgdavidghttp://reuna-ca.reuna.cl/crl/crl.der igtf-policy-installation-bundle-1.135/src/accredited/REUNA-ca.signing_policy0000644001343500074740000000037315004136212026256 0ustar davidgdavidg# Date: 22 Mayo 2007 # @(#)$Id: 295adc19.signing_policy,v 1.1 2007/07/18 18:18:11 pmacvsdg Exp $ # access_id_CA X509 '/C=CL/O=REUNACA/CN=REUNA Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=CL/O=REUNACA/*"' # end of EACL igtf-policy-installation-bundle-1.135/src/accredited/REUNA-ca.namespaces0000644001343500074740000000067315004136212025363 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)295adc19.namespaces # CA alias : reuna-ca # subord_of: # subjectDN: /C=CL/O=REUNACA/CN=REUNA Certification Authority # hash : 295adc19.signing_policy # (generated automatically from 295adc19.signing_policy) # TO Issuer "/C=CL/O=REUNACA/CN=REUNA Certification Authority" \ PERMIT Subject "/C=CL/O=REUNACA/.*" igtf-policy-installation-bundle-1.135/src/accredited/REUNA-ca.info0000644001343500074740000000064615004136212024177 0ustar davidgdavidg# # @(#)$Id: 295adc19.info,v 1.5 2015/06/18 09:44:56 pmacvsdg Exp $ # alias = REUNA-ca url = http://reuna-ca.reuna.cl/ ca_url = http://reuna-ca.reuna.cl/cacert/cacert.pem crl_url = http://reuna-ca.reuna.cl/crl/crl.der email = reuna-ca@reuna.cl status = accredited:classic sha1fp.0 = 94:CE:21:D2:CB:3E:DF:2A:02:C1:EC:00:3B:2D:C0:18:A0:53:DE:85 version = 1.135 subjectdn = "/C=CL/O=REUNACA/CN=REUNA Certification Authority" igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustECCRootCA.pem0000644001343500074740000000146615004136213031274 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIICMjCCAbegAwIBAgIQCKHCUVLpcxlbd5hZVbs8tTAKBggqhkjOPQQDAzBaMSUw IwYDVQQKExxSZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0MTEwLwYDVQQDEyhS ZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0IEVDQyBSb290IENBMB4XDTIzMDgw ODEyMTE1OFoXDTM4MDExNzIzNTk1OVowWjElMCMGA1UEChMcUmVzZWFyY2ggYW5k IEVkdWNhdGlvbiBUcnVzdDExMC8GA1UEAxMoUmVzZWFyY2ggYW5kIEVkdWNhdGlv biBUcnVzdCBFQ0MgUm9vdCBDQTB2MBAGByqGSM49AgEGBSuBBAAiA2IABEvnhDXl GO40w4CI8nOAYr/l3dUbxV2mFYcvMHcgMC0F/r9OhbY3wOiEyRW3j6b70DKv56nA 7LHFC1/TVBdlJ12lLcm9Ot3Bv6R+YU+6YAlmQvPMkHzDkXJ+0bj3b9QmoKNCMEAw DgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFCetm1Da jgu7NEHe3fofp+ayeCAvMAoGCCqGSM49BAMDA2kAMGYCMQDUZcfAokjfwulL4Wjq /xY8KfzLKzf+x+tjVAvPvFB3w2BOtVPm3cv72L5IK3vAbOACMQDsGO9PMcG/nA/h wXW2PSnx1ZTQ1bWt02EdX59hEYwkU/MXKgXF9vFfz11IgQsyYH8= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustECCRootCA.crl_url0000644001343500074740000000011115004136213032137 0ustar davidgdavidghttp://crl.enterprise.sectigo.com/ResearchandEducationTrustECCRootCA.crl ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustECCRootCA.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustECCRootCA.signing_poli0000644001343500074740000000057015004136213033167 0ustar davidgdavidg# EACL for the Research and Education root for the RE community by GEANT access_id_CA X509 '/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA' pos_rights globus CA:sign cond_subjects globus '"/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA" "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B"' igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustECCRootCA.namespaces0000644001343500074740000000122415004136213032622 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)ResearchandEducationTrustECCRootCA.signing_policy.namespaces # CA alias : ResearchandEducationTrustECCRootCA # subord_of: # subjectDN: /O=Research and Education Trust/CN=Research and Education Trust ECC Root CA # hash : ResearchandEducationTrustECCRootCA.signing_policy # (generated automatically from ResearchandEducationTrustECCRootCA.signing_policy) # TO Issuer "/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B" igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustECCRootCA.info0000644001343500074740000000123515004136213031440 0ustar davidgdavidg# @(#)$Id$ # self-signed R&E Root GEANT and collaborators, ResearchandEducationTrustECCRootCA # alias = ResearchandEducationTrustECCRootCA ca_url = http://crt.enterprise.sectigo.com/ResearchandEducationTrustECCRootCA.crt crl_url = http://crl.enterprise.sectigo.com/ResearchandEducationTrustECCRootCA.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 2E:60:72:13:C0:06:73:23:38:CA:83:D6:87:56:09:3F:F2:1E:E2:96 subjectdn = "/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA" igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustRSARootCA.pem0000644001343500074740000000366015004136213031325 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFgDCCA2igAwIBAgIQBwXxpWAb56swM7C8CLvbKjANBgkqhkiG9w0BAQwFADBa MSUwIwYDVQQKExxSZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0MTEwLwYDVQQD EyhSZXNlYXJjaCBhbmQgRWR1Y2F0aW9uIFRydXN0IFJTQSBSb290IENBMB4XDTIz MDgwMjE3Mjk1MloXDTM4MDExNzIzNTk1OVowWjElMCMGA1UEChMcUmVzZWFyY2gg YW5kIEVkdWNhdGlvbiBUcnVzdDExMC8GA1UEAxMoUmVzZWFyY2ggYW5kIEVkdWNh dGlvbiBUcnVzdCBSU0EgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC AgoCggIBAKg1ccQXMqaJ5GHHnegVmR0LgxOA6mItt9ImgdaQ9wN8k2LUYgahonSB ZBNZCDCxNKzvPyaAbjBTimN9Vv973IlaPSIB2lXCtSxAaDgav0r0YiTPuZJfNcZU qLhJb8oGpRgfITHoTW2WQ/8Y3wxyIQNojAlSlaCzTfRAueIbk0u0Nn9YiaZQN8+G tmr2l74VopNFuA+/AQF6D2oWXIVTH1tisc3scb/+ucNSog+V6fqly/c5RgIFrYFe 6xjWdOY9tjVKALZBxlYwRpb+9USG/MIsTrI4KL5C2ULxqSr4GShhy2DgpKlR34mh uuCNmYE3vq2Hu5BYQcXUPs2XX0kVLGKhzAhqtPZpgj2Yh5gIpw0Ww8AhILh2yneR kZmpNIRayF3h1XFNDGxXlsjmWACf4ENLC8IxDUscIha+44SDvrmC8rYsEtlB2RHL QOMBzlRwvCuXOML40WHVSmY+3dq9AXjSja+c5+GTOsxLivKiKmr3c8bYr/C8Hy5i S077Tbnevef5TZrQ7pSxtwRV4oq8CKvxeh/WR2AsUq++Gjyn5xIkgmOY6dV0O+nz bRNpep1IqD9GMF+NVj7BC4MkKtFDydnyNaG8i3heFOPiwU7bT+RAbca6VTvDHEht AcV66E+KazQ42zlvtbiJhGbBMTg09hSBuaQs96CO44ZNKVF+axirAgMBAAGjQjBA MA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR1B5Qy W3KG0uKudffysa9n5ibpFTANBgkqhkiG9w0BAQwFAAOCAgEAfwIdFp9J71xg9Fi/ Lnrdn2qoQgrFcY1/3kIgfhD5T90o1qSFnBOE4w/sx3B/kVlAS/qFiR5FT0Iq02Ue /7Mpb4kzEkOJpAzI0Fhm6Ute7erKKvZ4qiUK2p1oxa6EwoT9Qg5MQaRP3H35yjJ3 CJ/vg3VU2tOOmPVZ4+lyWQaqp81fm8pSljg7uuVbPoImyOFP6AhiLrkchNNNFGd9 VdlbZU169eZtqxtV91Lxq0Dl+P6CoxKHT94HTWgOux9aD2+5dokmdJrtHcFOMl3y xYIEQPaz3Tx2vVZX4BCvYvFuFt9IlAxxKVU7Q75Z3p87emMMdQPR5ydfLdvakheA HXSRBEzWc7y60QBwmuCBdRPJJgowVJrnHMe68AyvEG60mG5nmRFFRepaPQ3SgCQE lnqKcmer2dz5TlakM7fYqODD4fbhGKBLDEUBklxATXgnX8c2+AKLbO3ejyntzucy N9RfT3FWPaLliI8qHr+FzJtP15pYcumwCmCyD0Ur12RMqiMf1OMqE1c/rdwlkMW9 9t0kfUSUd0IRKG208ZJJr6VV5XAFvSUbXA+6lGfBFX84+XikGahDXYdKxw5fAmh+ QTZipI/qaPmAxBE4EMCD5B5u4qLCrEoCRL/8JAn3FHLM7KBm4s7TubQydZBTONd5 U/pQZfL7nncf0vqasUhAaH9+VnM= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustRSARootCA.crl_url0000644001343500074740000000011115004136213032172 0ustar davidgdavidghttp://crl.enterprise.sectigo.com/ResearchandEducationTrustRSARootCA.crl ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustRSARootCA.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustRSARootCA.signing_poli0000644001343500074740000000057015004136213033222 0ustar davidgdavidg# EACL for the Research and Education root for the RE community by GEANT access_id_CA X509 '/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA' pos_rights globus CA:sign cond_subjects globus '"/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA" "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B"' igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustRSARootCA.namespaces0000644001343500074740000000122415004136213032655 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)ResearchandEducationTrustRSARootCA.signing_policy.namespaces # CA alias : ResearchandEducationTrustRSARootCA # subord_of: # subjectDN: /O=Research and Education Trust/CN=Research and Education Trust RSA Root CA # hash : ResearchandEducationTrustRSARootCA.signing_policy # (generated automatically from ResearchandEducationTrustRSARootCA.signing_policy) # TO Issuer "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" igtf-policy-installation-bundle-1.135/src/accredited/ResearchandEducationTrustRSARootCA.info0000644001343500074740000000123515004136213031473 0ustar davidgdavidg# @(#)$Id$ # self-signed R&E Root GEANT and collaborators, ResearchandEducationTrustRSARootCA # alias = ResearchandEducationTrustRSARootCA ca_url = http://crt.enterprise.sectigo.com/ResearchandEducationTrustRSARootCA.crt crl_url = http://crl.enterprise.sectigo.com/ResearchandEducationTrustRSARootCA.crl policy_url = https://wiki.geant.org/display/TCSNT/TCS+Repository url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 82:B6:21:AA:3E:55:62:54:38:3C:17:EB:43:0A:10:1F:B5:4A:37:F6 subjectdn = "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA" igtf-policy-installation-bundle-1.135/src/accredited/RomanianGRID.pem0000644001343500074740000000327015004136214025002 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEyjCCA7KgAwIBAgIJAIwjYuI2tyMvMA0GCSqGSIb3DQEBBQUAMH0xEjAQBgoJ kiaJk/IsZAEZEwJSTzEcMBoGCgmSJomT8ixkARkTDFJvbWFuaWFuR1JJRDENMAsG A1UEChMEUk9TQTEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGDAW BgNVBAMTD1JvbWFuaWFuR1JJRCBDQTAeFw0wNzEwMDMxNjU2MjJaFw0yNzEwMDMx NjU2MjJaMH0xEjAQBgoJkiaJk/IsZAEZEwJSTzEcMBoGCgmSJomT8ixkARkTDFJv bWFuaWFuR1JJRDENMAsGA1UEChMEUk9TQTEgMB4GA1UECxMXQ2VydGlmaWNhdGlv biBBdXRob3JpdHkxGDAWBgNVBAMTD1JvbWFuaWFuR1JJRCBDQTCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAL6HFFO4t+BHs8WVWVtzlzSZFJPXQGsY1a+0 SEX8gIu/1953rPLye3TRss5ficYwG2b232b8yG/0rC+QfxEFoqyh+Qg9pOUdlS75 3JqXmLoJdXo5wFDylSY69f96sduliteOJzBIK3JdfY8cswzZ7Qp75kgTtYtOvMB/ Z6PFOUW/vvo25F5l7AWyAuKibjUxH0kiLdVsie40DBIHfO/IM7j0z+w89HQyKA1t kRMI/opwOAqYhgrT5BNj8BzfE6iHE7XRkKwqYuAy1yflqtVrYghiAiCvbQPqQJ4V LPwMj23zDSSR+S6GIRSFKzhiKU/f3IwfAEgK8xWZ3Fc/AyU/cAsCAwEAAaOCAUsw ggFHMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR/ EM1cbqzKaxIL4KmHiBGVvDAXaDCBsAYDVR0jBIGoMIGlgBR/EM1cbqzKaxIL4KmH iBGVvDAXaKGBgaR/MH0xEjAQBgoJkiaJk/IsZAEZEwJSTzEcMBoGCgmSJomT8ixk ARkTDFJvbWFuaWFuR1JJRDENMAsGA1UEChMEUk9TQTEgMB4GA1UECxMXQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkxGDAWBgNVBAMTD1JvbWFuaWFuR1JJRCBDQYIJAIwj YuI2tyMvMDYGA1UdEgQvMC2BD2dyaWQtY2FAcm9zYS5yb4YaaHR0cDovL3d3dy5y b21hbmlhbmdyaWQucm8wGgYDVR0RBBMwEYEPZ3JpZC1jYUByb3NhLnJvMA0GCSqG SIb3DQEBBQUAA4IBAQCxI9sn1rEkAC9DA15bTRrpBy0EaYVizu+O4GhUWGwc3UvN eljnzgzc+9GFKuibUv0IOUuE6jSoR0iy3YN87JMQ44DQQnJ6TPqxg/hNvdmMKO92 MS/2aH+Ezt3/dv/3ezmSVFu6T/tZmRjBjWm3Ep47qGJ48+KBMqgN+LjEudne98ts cnbFI/LZYg8jzcYi9y5gEYg9Yd1krBM34RW/alx02vsSJgFC79Rls3GJHnopzimR TITkYX7NZ2bpGo2xd43A+UgdN5991dtIjkmgcUcVMK7K2uYY/xraP7uxBsRYjMJi 2B2pH+ZZarAYZudSJbtoUfQWpAbOwuM+vts78jHh -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/RomanianGRID.crl_url0000644001343500074740000000005215004136214025656 0ustar davidgdavidghttp://www.romaniangrid.ro/crl/crl-v2.der igtf-policy-installation-bundle-1.135/src/accredited/RomanianGRID.signing_policy0000644001343500074740000000031715004136214027235 0ustar davidgdavidg# @(#)$Id$ access_id_CA X509 '/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA' pos_rights globus CA:sign cond_subjects globus '"/DC=RO/DC=RomanianGRID/*"' igtf-policy-installation-bundle-1.135/src/accredited/SRCE.pem0000644001343500074740000000231515004136215023324 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIJAINxfMQMGUMOMA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNV BAYTAkhSMQwwCgYDVQQKDANlZHUxDTALBgNVBAsMBHNyY2UxEDAOBgNVBAMMB1NS Q0UgQ0EwHhcNMDYwNjE1MTczOTIwWhcNMjYwNjE1MTczOTIwWjA8MQswCQYDVQQG EwJIUjEMMAoGA1UECgwDZWR1MQ0wCwYDVQQLDARzcmNlMRAwDgYDVQQDDAdTUkNF IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmJERArpSh1whLAQl 96XTSV9o31Dq7oF1cQld4WhArCnXlgBEJIydifSEBF1i0oQZjqOuhAQu27plpZUM /fxAHCcZS44ziiDF3gLQpOHHt/2aND0/SmstCkETzEt5SGgr5dfmMT+mpWIUmRbG q0r7aetQ90N0Z4co+b1Gj5PS9BAE0w/I72YwnIyY/lWHVjHS2PyibT5ULssIAy9T xqXpJcLBxo9TU1nLsGHjRUjQXmcQqkGzjKSnDQz83ea+A1zLoEe/MHfdjHP+umG0 pi0ZPett5xkNf1YiLFEU6fZEP0s188eYDLCBhrLrBeu30aJLuNvV1NQumLWKAscc LK1NjwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQF8jeQRsTG ChQ02l1TOZHn8RpiTzAfBgNVHSMEGDAWgBQF8jeQRsTGChQ02l1TOZHn8RpiTzAO BgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBABAPZvhymPbchFmRxAS4 HtI8mJEXS6yDwvCQQXl4Xy/Jz1Hs9kBEXtwvb6JohpG6vWeB2CDI8x9CQo6ZFJ3i PjAfwdfY+foV4wyu2caNsZ9hm8BLlAbbymcF/hrkR1MusN4pbL5jjucjHf5fDGww R6nOa2YkP/T7IcCnAD7wGP9PYtsDwW3/hsiMNo9gF4TjkSomgORgX8csWY4HCDB3 ctw/QTKPYyqACCl+JZUlSshy6LH+UHhiXKlWuYaiWAB7LgPNK8Qw5JtNJjgODgOo 3EfaEne4vYZWTJDsCPgBQ6Puv8/aOWDUAp9cF/yV5Dh2VObFX6U15E4QH0r6ArEj O7c= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/RomanianGRID.namespaces0000644001343500074740000000077415004136214026346 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1f3834d0.namespaces # CA alias : RomanianGRID # subord_of: # subjectDN: /DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA # hash : 1f3834d0.signing_policy # (generated automatically from 1f3834d0.signing_policy) # TO Issuer "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA" \ PERMIT Subject "/DC=RO/DC=RomanianGRID/.*" igtf-policy-installation-bundle-1.135/src/accredited/RomanianGRID.info0000644001343500074740000000101415004136214025146 0ustar davidgdavidg# @(#)$Id: 1f3834d0.info,v 1.3 2010/05/17 07:18:55 pmacvsdg Exp $ # alias = RomanianGRID url = http://www.romaniangrid.ro ca_url = http://www.romaniangrid.ro/certs/root.pem crl_url = http://www.romaniangrid.ro/crl/crl-v2.der policy_url = http://www.romaniangrid.ro/docs/RomanianGRID_CA_v1.4.pdf email = grid-ca@rosa.ro status = accredited:classic version = 1.135 sha1fp.0 = 18:1F:F6:66:28:41:94:6E:57:C3:D3:4D:F8:B3:B6:31:4E:FB:26:09 subjectdn = "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA" igtf-policy-installation-bundle-1.135/src/accredited/SRCE.crl_url0000644001343500074740000000003415004136215024201 0ustar davidgdavidghttp://ra.srce.hr/cacrl.crl igtf-policy-installation-bundle-1.135/src/accredited/SRCE.signing_policy0000644001343500074740000000023315004136215025555 0ustar davidgdavidgaccess_id_CA X509 '/C=HR/O=edu/OU=srce/CN=SRCE CA' pos_rights globus CA:sign cond_subjects globus '"/C=HR/O=edu/OU=srce/CN=SRCE CA" "/C=HR/O=edu/*"' igtf-policy-installation-bundle-1.135/src/accredited/SRCE.namespaces0000644001343500074740000000063615004136215024666 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)ff94d436.signing_policy.namespaces # CA alias : SRCE # subord_of: # subjectDN: /C=HR/O=edu/OU=srce/CN=SRCE CA # hash : ff94d436.signing_policy # (generated automatically from ff94d436.signing_policy) # TO Issuer "/C=HR/O=edu/OU=srce/CN=SRCE CA" \ PERMIT Subject "/C=HR/O=edu/.*" igtf-policy-installation-bundle-1.135/src/accredited/SRCE.info0000644001343500074740000000045115004136215023475 0ustar davidgdavidgalias = SRCE url = http://ra.srce.hr ca_url = http://ra.srce.hr/cacert.pem crl_url = http://ra.srce.hr/cacrl.crl email = srce-ca@srce.hr status = accredited:classic version = 1.135 sha1fp.0 = 68:20:69:5A:4E:95:F4:48:BB:8F:BE:DE:67:77:84:C0:0D:E5:46:C0 subjectdn = "/C=HR/O=edu/OU=srce/CN=SRCE CA" igtf-policy-installation-bundle-1.135/src/accredited/SiGNET-CA.pem0000644001343500074740000000327015004136215024103 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEyDCCA7CgAwIBAgIBADANBgkqhkiG9w0BAQUFADAyMQswCQYDVQQGEwJTSTEP MA0GA1UEChMGU2lHTkVUMRIwEAYDVQQDEwlTaUdORVQgQ0EwHhcNMDYwODIzMDY1 MjI3WhcNMjYwODIyMDY1MjI3WjAyMQswCQYDVQQGEwJTSTEPMA0GA1UEChMGU2lH TkVUMRIwEAYDVQQDEwlTaUdORVQgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQDMCYLzK77phA5GOkVFtD6q/gRdMl1w46yet6baLjUrjJ8kwN3GrKOc m0SUXbBe0Zw1nBxbmMHhEIubnSoW93xMH/qThByQpzAKm5uAsvoDrTMkZ2ytmUu1 j/FyA0eTBmN3F5HtnMQCAZ02KmPBmmYoIlQuPo+m6DhA9GmBYVFW171DQ0pgETaE 1+TG6tXlUcpVLxRphIqWpVTivK68TD7tCIyA2rdmo9TpjJHXGB1g4QW/Ey5QrwPr 7J3EkftdVsHktiewf4halNmn9JPwG8DuKRPFV5WAwbzlNC9rg90RW2lzrOJ2nGft 9/lRunayfPP0DhBL3Zet99YRnR8dBCXxAgMBAAGjggHnMIIB4zAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBTJxnM8t6cDv3Sqvzy+607vAWXl8TBaBgNVHSMEUzBR gBTJxnM8t6cDv3Sqvzy+607vAWXl8aE2pDQwMjELMAkGA1UEBhMCU0kxDzANBgNV BAoTBlNpR05FVDESMBAGA1UEAxMJU2lHTkVUIENBggEAMAsGA1UdDwQEAwIBBjAb BgNVHREEFDASgRBzaWduZXQtY2FAaWpzLnNpMBsGA1UdEgQUMBKBEHNpZ25ldC1j YUBpanMuc2kwEQYJYIZIAYb4QgEBBAQDAgAHMDkGCWCGSAGG+EIBDQQsFipTaUdO RVQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgQ2VydGlmaWNhdGUwQAYDVR0fBDkw NzA1oDOgMYYvaHR0cDovL3NpZ25ldC1jYS5panMuc2kvcHViL2NybC9zaWduZXQw MmNybC5jcmwwPgYJYIZIAYb4QgEEBDEWL2h0dHA6Ly9zaWduZXQtY2EuaWpzLnNp L3B1Yi9jcmwvc2lnbmV0MDJjcmwuY3JsMD4GCWCGSAGG+EIBAwQxFi9odHRwOi8v c2lnbmV0LWNhLmlqcy5zaS9wdWIvY3JsL3NpZ25ldDAyY3JsLmNybDANBgkqhkiG 9w0BAQUFAAOCAQEAk3oyGLCotKaFtPMCf6de5gyOjQDSjL9CZKf6nKxHwZPcOAiZ XsNVgRYTlhcnACPHiqZ4dXzVZ4RjCzSO1Ud8gwTGPzgNBf/DLrmsP0iV5tYeZnhQ CF4EdLGPqXzIqvMUo6RVAFcF65noHceDDpkFRXQj3u6ta1YUONqcxvfXBMn2V10m rjoCNzKK4rKyuD8MvwznoNFb1sVhwjrfHngebWWaQklM+mW91aXH0JHn+UxS/lcL fxjx26wbOVFro/x7xEc9po3Be9ODaY57GegDJHr5AZf7phKlFVwcPaTk5ijpri1N yBUJiQIh29c4efU7WnyKbGGl4s7e6KRzja2Rlw== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/SiGNET-CA.crl_url0000644001343500074740000000006215004136215024760 0ustar davidgdavidghttp://signet-ca.ijs.si/pub/crl/signet02cacrl.crl igtf-policy-installation-bundle-1.135/src/accredited/SiGNET-CA.signing_policy0000644001343500074740000000022115004136215026330 0ustar davidgdavidg# EACL SiGNET CA (new) access_id_CA X509 '/C=SI/O=SiGNET/CN=SiGNET CA' pos_rights globus CA:sign cond_subjects globus '"/C=SI/O=SiGNET/*"' igtf-policy-installation-bundle-1.135/src/accredited/SiGNET-CA.namespaces0000644001343500074740000000064015004136215025437 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3d5be7bc.signing_policy.namespaces # CA alias : SiGNET-CA # subord_of: # subjectDN: /C=SI/O=SiGNET/CN=SiGNET CA # hash : 3d5be7bc.signing_policy # (generated automatically from 3d5be7bc.signing_policy) # TO Issuer "/C=SI/O=SiGNET/CN=SiGNET CA" \ PERMIT Subject "/C=SI/O=SiGNET/.*" igtf-policy-installation-bundle-1.135/src/accredited/SiGNET-CA.info0000644001343500074740000000075415004136215024261 0ustar davidgdavidg# Information for CA SiGNET # Subject: C=SI, O=SiGNET, CN=SiGNET CA # # @(#)$Id: 3d5be7bc.info,v 1.2 2007/01/27 22:37:44 pmacvsdg Exp $ # alias = SiGNET-CA ca_url = http://signet-ca.ijs.si/pub/cacert/signet02cacert.pem crl_url = http://signet-ca.ijs.si/pub/crl/signet02cacrl.crl email = signet-ca@ijs.si status = accredited:classic url = http://signet-ca.ijs.si/ version = 1.135 sha1fp.0 = 15:01:9E:62:9D:F2:5C:C6:5F:A7:13:7E:E3:85:3A:DD:20:BC:54:44 subjectdn = "/C=SI/O=SiGNET/CN=SiGNET CA" igtf-policy-installation-bundle-1.135/src/accredited/SlovakGrid.pem0000644001343500074740000000246215004136216024641 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDqDCCApCgAwIBAgICB9gwDQYJKoZIhvcNAQELBQAwOjELMAkGA1UEBhMCU0sx EzARBgNVBAoTClNsb3Zha0dyaWQxFjAUBgNVBAMTDVNsb3Zha0dyaWQgQ0EwHhcN MDIxMjE3MTExODM1WhcNMzIxMjEyMTExODM1WjA6MQswCQYDVQQGEwJTSzETMBEG A1UEChMKU2xvdmFrR3JpZDEWMBQGA1UEAxMNU2xvdmFrR3JpZCBDQTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMcUYEVpY5o+aeLiKYTkZ8FyPaq0N52o /bFvB7eI8cQf0+B/S5sR6SJHTZ5a3tJgrGHsGdtkRyyWRgmfRgJbJ/eeqtZ/tRdv xg/K0ykh/jmgvX0Algl6/gB5cDBFe8fpKS4rouHKVmVqI5aU0LxygRcjVqPWU9wy 4K8ocNE2EzHVC+/aYLAFgEQqwperWmrCnd2q4jIMpRCldGpXrZaMYEjOgf2mwcIV pNEDS/DtfxPn2/a2yAybd3dAqtdz4dDXU0RQUlw8Wvdqytt2GacMFhEFooTnuLfJ Ja4vFGEiwoVuhhUDm3NNJAvyXy7E0l1NTPonWb1Z/H5HfCXjO+snajMCAwEAAaOB tzCBtDAdBgNVHQ4EFgQUu4dK+SkRnX+PuaMYxZJhbEbujecwHwYDVR0jBBgwFoAU u4dK+SkRnX+PuaMYxZJhbEbujecwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E BAMCAcYwGQYDVR0SBBIwEIEOY2EudWlAc2F2YmEuc2swNgYDVR0fBC8wLTAroCmg J4YlaHR0cDovL3Vwcy5zYXZiYS5zay9jYS9zbG92YWtncmlkLmNybDANBgkqhkiG 9w0BAQsFAAOCAQEANN0TCtakl7tnZBwX83s8BhkTVLs9p3A6Q9i7uOS+6DOc1ntq eSo76YbgiM7nYTXEnkHMME78OtUfBtvn1kiu/aZa6r3I5EqzDeOXDVeu5nKsX3tb gNT/c6X6mRtoVs6SJBUwWCAaEnvAHYEIvuUUpLdjlT0CbXEVNoD8jtm/SDCCAHHu T5CE1dvRIfmHrSBC3ON2X1PmX+3YYAW4WUVjJ5v2BHnApF++cQE8qboT7c//bLvI FHRACiJ110weXWJOuHp73WFNpb1sX7IzTlqvquFvQicixF5ktRfPGeRzQApBS79G 3PcprhntriQcmWFES4O6UPl+8bh8EL5Q1qodOg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/SlovakGrid.crl_url0000644001343500074740000000004615004136216025516 0ustar davidgdavidghttp://ups.savba.sk/ca/slovakgrid.crl igtf-policy-installation-bundle-1.135/src/accredited/SlovakGrid.signing_policy0000644001343500074740000000027015004136216027070 0ustar davidgdavidg# EACL Slovak CA access_id_CA X509 '/C=SK/O=SlovakGrid/CN=SlovakGrid CA' pos_rights globus CA:sign cond_subjects globus '"/C=SK/O=SlovakGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/SlovakGrid.namespaces0000644001343500074740000000064415004136216026177 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)e13e0fcf.namespaces # CA alias : SlovakGrid # subord_of: # subjectDN: /C=SK/O=SlovakGrid/CN=SlovakGrid CA # hash : e13e0fcf # (generated automatically from ./SlovakGrid/e13e0fcf.signing_policy) # TO Issuer "/C=SK/O=SlovakGrid/CN=SlovakGrid CA" \ PERMIT Subject "/C=SK/O=SlovakGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/SlovakGrid.info0000644001343500074740000000065015004136216025010 0ustar davidgdavidg# # @(#)$Id: e13e0fcf.info,v 1.5 2008/07/11 09:19:29 pmacvsdg Exp $ # Information for CA SlovakGrid # obtained from e13e0fcf in SlovakGrid/ alias = SlovakGrid url = http://ups.savba.sk/ca email = ca.ui@sav.sk crl_url = http://ups.savba.sk/ca/slovakgrid.crl status = accredited:classic version = 1.135 sha1fp.0 = 4A:48:FD:4A:C9:42:AA:CF:F7:61:44:69:1C:13:D7:E5:04:40:97:55 subjectdn = "/C=SK/O=SlovakGrid/CN=SlovakGrid CA" igtf-policy-installation-bundle-1.135/src/accredited/TRGrid.pem0000644001343500074740000000253715004136217023733 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDyjCCArKgAwIBAgIJAKnph0aQlpRvMA0GCSqGSIb3DQEBBQUAMDMxCzAJBgNV BAYTAlRSMQ8wDQYDVQQKEwZUUkdyaWQxEzARBgNVBAMTClRSLUdyaWQgQ0EwHhcN MDUxMDA3MTM0MzMyWhcNMjUxMDA2MTM0MzMyWjAzMQswCQYDVQQGEwJUUjEPMA0G A1UEChMGVFJHcmlkMRMwEQYDVQQDEwpUUi1HcmlkIENBMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAvY9W0tRZ38QiIODvQmQ0iR0C6L4sBfOVAhjB2Cxl uPUfBJ41+eOoHYZQFNcXfmoOqGD0nocsSVRSP+LHwfSb4Zw8LQCIuwl5N/jZ6CbS UDEdxhcDmb+7jgccInoqx4xRWYOpy4OFD91MrW/vl3xKtxxnu/27MkPLQr6oWOE7 O+jY+G+D5zlotN0N92A48qrVXZfMjauvygmz4CQAdMpvO2thHjTJhZmstbdvAdCy 6Xf6i/r3x6VTN1ucC3rrkNEqDFgBq/D6qPDta5XuIZPcmyProXjxF2kCXdwVi9gf Fx1puBw8xXwHsEn/mg9T+6Var6gVFbj+AHNw+W81uZGuxQIDAQABo4HgMIHdMA8G A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQmEQQXACL3 ECnqOiWaPbQ9wi7WVzBjBgNVHSMEXDBagBQmEQQXACL3ECnqOiWaPbQ9wi7WV6E3 pDUwMzELMAkGA1UEBhMCVFIxDzANBgNVBAoTBlRSR3JpZDETMBEGA1UEAxMKVFIt R3JpZCBDQYIJAKnph0aQlpRvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly93d3cu Z3JpZC5vcmcudHIvY2EvY3JsL2NybC5kZXIwDQYJKoZIhvcNAQEFBQADggEBAA8S nIAY2S232ys+sdz92UlkBVBGPTYVLevTY+r42OiIj8M/BSs03SrBncZQrUCm4rP9 igtC3Mhqh0X9bNFNN+o4PglxWPNcxxIFFf0d9LS2iSEPJemlkZHnO6SkTPshd+qA T33u+8HtZllX32YZXyVH2WDf2Kcu4CUAxBcav5C5f7FRY02JwDtOujV6wHU+JYcw VCFVtVuI3OYxALwgE3tZ8B498IWAXOLVgAjIyWCGkQt/UR0XzNZwIVRXW2GFiZlJ U+Tc5lfK5RMxENs5plt9jBEalT3mNcCgoydr+/DrCrpZG/vmhITy/cdW9IT8TApo MFrjzedS1lMftr3HGlQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/TRGrid.crl_url0000644001343500074740000000004615004136217024605 0ustar davidgdavidghttp://www.grid.org.tr/ca/crl/crl.der igtf-policy-installation-bundle-1.135/src/accredited/TRGrid.signing_policy0000644001343500074740000000021015004136217026151 0ustar davidgdavidg# @(#)$Id$ # access_id_CA X509 '/C=TR/O=TRGrid/CN=TR-Grid CA' pos_rights globus CA:sign cond_subjects globus '"/C=TR/O=TRGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/TRGrid.namespaces0000644001343500074740000000062415004136217025264 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1691b9ba.namespaces # CA alias : TRGrid # subord_of: # subjectDN: /C=TR/O=TRGrid/CN=TR-Grid CA # hash : 1691b9ba # (generated automatically from ./EUGridPMA/TRGrid/1691b9ba.signing_policy) # TO Issuer "/C=TR/O=TRGrid/CN=TR-Grid CA" \ PERMIT Subject "/C=TR/O=TRGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/TRGrid.info0000644001343500074740000000065115004136217024100 0ustar davidgdavidg# TRGrid CA Information # # @(#)$Id: 1691b9ba.info,v 1.3 2009/09/23 12:41:55 pmacvsdg Exp $ # alias = TRGrid ca_url = http://www.grid.org.tr/ca/ca_cert/1691b9ba.0 crl_url = http://www.grid.org.tr/ca/crl/crl.der email = ca@grid.org.tr status = accredited:classic url = http://www.grid.org.tr/ca version = 1.135 sha1fp.0 = A2:31:9E:C8:90:AF:D9:6D:F4:4A:59:31:F2:E6:D2:D5:39:EC:1D:F0 subjectdn = "/C=TR/O=TRGrid/CN=TR-Grid CA" igtf-policy-installation-bundle-1.135/src/accredited/TRGrid2024.pem0000644001343500074740000000406215004136217024236 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF4DCCA8igAwIBAgIJAIJj04s3byJmMA0GCSqGSIb3DQEBDQUAMDgxCzAJBgNV BAYTAlRSMQ8wDQYDVQQKEwZUUkdyaWQxGDAWBgNVBAMTD1RSLUdyaWQgQ0EgMjAy NDAeFw0yNDEyMDQwOTU5MDhaFw00NDExMjkwOTU5MDhaMDgxCzAJBgNVBAYTAlRS MQ8wDQYDVQQKEwZUUkdyaWQxGDAWBgNVBAMTD1RSLUdyaWQgQ0EgMjAyNDCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANefpqPWGgNKufNnbIxIm5KyYeb1 1ZjP98FZ43MrXVTXYOw2RY4C3P4YLENeNEnaYPcoWuZbmR0L6DF834Syd+MoSQQn hvg+YaFHY5ZDpMOw/dpn9R3EaYCXnWxEGPNma8hS9KotrMGby496lOpq6f2BWFqx oSnOxTu/uiQ882o2MUPH8pRU6qK53FPgCtEtsE9G/0vr35oE5vlLWFFEf8iKH9kC TQ2sjWEB+2YkiTRi/s/OKukqCsLny26qJNZER6jBX+V9AudS2m9AzMjkLBBSdPP9 opSUsdja2VRDgZ/YOR8kCiPbzo2N7KB0vGKMGQa3ZjRlMa0u3SmX7vfpRqC7bX/Y 4noKltwPyf8ZChb82EGZRd9JFDf1SfZjxAMUH/OoORGcdY6sKJy0ZaXn4KTJxywM oIxMxIhPvT1zwpWWPf5kWz+34uMSa8hTlI3pF3euXGG6samqNhzDm7V71K86gDtE YczkLfao+qf+zbt4BY1uLmhmBrJRlOGpt1rDTjPfP+ctHWEJ2+MRYJBxa83kdem6 KyekW3yaxJPq6LZRIiJ91J/ofKukv0YtdcOSsKAL1NDZMFZ6x863JCvl6Kr5mE00 EeI+N4aXXjdKjNTUXuAm1jDRe5IkkGVWS0n21xVQ/5fV7ZFByKlZy/WpHbuUHWqS IVCZf8vVzTUKsFmDAgMBAAGjgewwgekwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAQYwHQYDVR0OBBYEFOsHYdTvg0ol17RF3NO6iJPagTFcMGgGA1UdIwRh MF+AFOsHYdTvg0ol17RF3NO6iJPagTFcoTykOjA4MQswCQYDVQQGEwJUUjEPMA0G A1UEChMGVFJHcmlkMRgwFgYDVQQDEw9UUi1HcmlkIENBIDIwMjSCCQCCY9OLN28i ZjA9BgNVHR8ENjA0MDKgMKAuhixodHRwOi8vd3d3LnRydWJhLmdvdi50ci90cmdy aWRjYS9jcmwvY3JsLmRlcjANBgkqhkiG9w0BAQ0FAAOCAgEAvFYxG412P91jiVii A+0nVf+W45q/88WImghH8xKzfv9liqnq2Xv+eqVCo4pd5qfhuXCBrmWMblqB7+L+ BetPTtnUPqkw9hDGESsbO0jepHWNlZrcFzkDgPg91O4nmoB2A0yN8d44KGIxHRYS GIQ47B/lX5YUDqd18QY9LPGYwPKNpNcAhx+QX2nhN2jnykpO4yS6VZxqcxgwMscy lN9SD0ouSmV9vcIyU/JX0Nwxf/G0fy/H6JsDzx2oTeHFBtHIm2OvSugjqFGETScm K58RGPunvknkE6SOHYPzdxKHfXXA8KhsbsyvnO3rKpSe7EUO3tFQErzi0k4CfEHd 8j0O/EyjhPHCXIOqHuofbpYgSNsQfh0vk8kXlDHsmKqcHARQ+skCcO2ImTzAoMwe S4ynT2Qc6Y4ph4JHMuv8oOII/XhGY+my4N5i7sp0DAD57rnm1fo7HHSXuM2CChFx P34PFGYeYqHC971NOUJnBUHzPxtdYNaK5yiUvqc0gnJkaIaG+usL0vfsLxSI7psy Roh7lyp/iNJBw9abl+m1xz7boe1XGgThqBYR7TYB3gJfYA3pULrkaYuf4QaOFeJz 5NJqzJDPoBhM5GZyBqNR89N2p6nWlcnvaxG4i1+pTDoB0AOawpUBIKYfrU4xpz/2 kgh+8XLkSDUohXo7Q2mqIRwn/rg= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/TRGrid2024.crl_url0000644001343500074740000000005515004136217025115 0ustar davidgdavidghttp://www.truba.gov.tr/trgridca/crl/crl.der igtf-policy-installation-bundle-1.135/src/accredited/TRGrid2024.signing_policy0000644001343500074740000000021515004136217026466 0ustar davidgdavidg# @(#)$Id$ # access_id_CA X509 '/C=TR/O=TRGrid/CN=TR-Grid CA 2024' pos_rights globus CA:sign cond_subjects globus '"/C=TR/O=TRGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/TRGrid2024.namespaces0000644001343500074740000000066315004136217025577 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)TRGRID2024.signing_policy.namespaces # CA alias : TRGrid2024 # subord_of: # subjectDN: /C=TR/O=TRGrid/CN=TR-Grid CA 2024 # hash : TRGRID2024.signing_policy # (generated automatically from TRGRID2024.signing_policy) # TO Issuer "/C=TR/O=TRGrid/CN=TR-Grid CA 2024" \ PERMIT Subject "/C=TR/O=TRGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/TRGrid2024.info0000644001343500074740000000066215004136217024412 0ustar davidgdavidg# TRGrid 2024 CA Information # # @(#)$Id$ # alias = TRGrid2024 ca_url = http://www.truba.gov.tr/trgridca/cacert/3ca6d4a0.0 crl_url = http://www.truba.gov.tr/trgridca/crl/crl.der email = ca@truba.gov.tr status = accredited:classic url = http://www.truba.gov.tr/index.php/en/certification-authority/ version = 1.135 sha1fp.0 = A9:A8:50:91:98:4A:AE:F3:71:BE:AF:95:20:39:C3:5C:07:B9:28:7E subjectdn = "/C=TR/O=TRGrid/CN=TR-Grid CA 2024" igtf-policy-installation-bundle-1.135/src/accredited/UGRID-G2.pem0000644001343500074740000000375515004136220023715 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFrjCCA5agAwIBAgIBATANBgkqhkiG9w0BAQsFADBCMRMwEQYKCZImiZPyLGQB GRYDb3JnMRUwEwYKCZImiZPyLGQBGRYFdWdyaWQxFDASBgNVBAMTC1VHUklEIENB IEcyMB4XDTE3MDEyNjE5MDY1MVoXDTM3MDEyMTE5MDY1MVowQjETMBEGCgmSJomT 8ixkARkWA29yZzEVMBMGCgmSJomT8ixkARkWBXVncmlkMRQwEgYDVQQDEwtVR1JJ RCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALyUjTKuq7Uf cWNGs0JFY6JYqcKMatem6AFv6aI2w0m4dVw7/WZX/317e2RT2Dgu+SEodtB/3B39 0KCSDIoQz6FNXyRKc2FiMc2YeYJNKBwCyWLGxzJ7Li527rHE2I0tbxxCezIuhCcY zUNKG0VpOLrfQgWpW1PnsRRdhWl2covAZKLnV8oTaslGFmLshqxyW+B9MfRO+zKu flxgtNMc1yle4RB+imY2e5txiobVJQtqlN13Vf6/e8OD+0QbTRbsTyDli5BTl8+Q ieJereo2jrKN1DzcGa5GZ+jIcLPXj6VdMp+kpqEfHvtsUGNbbhsW96qqSBNuJBx3 MIEoJ7GM+8W2vo8GuShvv2JXabelL+H3864HLxwhWitu/hQqd8konjN4O6YUs94+ v4N162TcpvXNoQfqFE1fL43M3BV4mXLTeYyCtTTSuefpep2ge0vnWd3Dx/cuUoof Bdm+/njBjC1EhUAntYe4dr0v9aRFxd04MGPTNhCV2m8l/U6D+RulWu0gR+yR1ptU Tgv4E1Ta06KFoc0HB/MqKk9W+Eb7NKORw3drIAUJB0F1iVc/WQYVccjv3B4yZoPJ LoKRBLWacGYHHJI1iJgt7LTxIM+CioSGywftfBchC0w5gGoW2R18GSKHKwtqlQeW 76KbXn1N0boVEnFJQgiEtwCk3uxiv1ZHAgMBAAGjga4wgaswDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAQYwFwYDVR0RBBAwDoEMY2FAdWdyaWQub3JnMB0G A1UdDgQWBBSMdLS3JhYA5QskvSN2f5SL5oGzzzAfBgNVHSMEGDAWgBSMdLS3JhYA 5QskvSN2f5SL5oGzzzAvBgNVHR8EKDAmMCSgIqAghh5odHRwOi8vY2EudWdyaWQu b3JnL2NhMmNybC5kZXIwDQYJKoZIhvcNAQELBQADggIBAF8bXJ1pCYm26hOFFkFZ 9JDmVb1e76xK35AkAYD6QR3erJ6hG9hg2P0mDnLVm/iY6jiBt1wAqr0tRfmreaqq pYdxn1ZFwFJ8oz7hla682jgRtxqrd80PiYykoMyScAqod8ZYmvpA/anarwMRgvut KIDyPQj2YSq7XXf8cnYXitkIohgy4VZKfLJ4e4xBpcROBm3W/tWkBgAZ4lhXnUA3 8HKEB896RAEXDgnTkge2M82cYuCeCi9F0qXUufeqXsOhDb2AY0XbRFLjkEJNkkad rC886PQGfkVtMx5sAalotLsddgxQyL2r8fo1/f3XT/dfewRMvc802IHwsCtswkVv pIgvVilNyKxt/bf83l909P8sb18yjqEUQkjkYNu0iTr2X+cgyd3J8+zQuN2ZzeoO 60/SyeCIcVneMBgFvPbCqUF+rsl1BPCnZ+jHXeT6VZC274qEWC+RZHqqFJeHvpNv xAbmwoURDEvljxxbx3hCpRQodGub0jHAk2BmyFQvavLZMHiFj88NCI7hO1CnK1iS kacMj44tSRhDlPoXYTnMKusXEso+wwFjZ9EhMQY2SLxYuTz6DmXwlP/0ZxxpT4UI yU2wyNGrxuPqVznR5UunOo1pP9qzyvGni268+BVfGBDjwmuwJ/CownleuQypeSN1 feTH8tUeO3dystDJTjOla+11 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/UGRID-G2.crl_url0000644001343500074740000000012315004136220024560 0ustar davidgdavidghttp://ca.ugrid.org/ca2crl.der http://ugrid.org.mirror.eugridpma.org/g2crl/crl.der igtf-policy-installation-bundle-1.135/src/accredited/UGRID-G2.signing_policy0000644001343500074740000000023015004136220026132 0ustar davidgdavidg# EACL # @(#)$Id$ access_id_CA X509 '/DC=org/DC=ugrid/CN=UGRID CA G2' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=ugrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/UGRID-G2.namespaces0000644001343500074740000000065115004136220025243 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)UGRID-G2.signing_policy.namespaces # CA alias : UGRID-G2 # subord_of: # subjectDN: /DC=org/DC=ugrid/CN=UGRID CA G2 # hash : UGRID-G2.signing_policy # (generated automatically from UGRID-G2.signing_policy) # TO Issuer "/DC=org/DC=ugrid/CN=UGRID CA G2" \ PERMIT Subject "/DC=org/DC=ugrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/UGRID-G2.info0000644001343500074740000000073215004136220024057 0ustar davidgdavidg# # @(#)$Id: UGRID-G2.info,v 1.1 2017/02/27 20:02:19 pmacvsdg Exp $ # UGRID - The Ukrainian Grid CA G2 # alias = UGRID-G2 ca_url = https://ca.ugrid.org/g2certs/cacert.pem crl_url = http://ca.ugrid.org/ca2crl.der;http://ugrid.org.mirror.eugridpma.org/g2crl/crl.der email = ca@ugrid.org status = accredited:classic url = https://ca.ugrid.org/ version = 1.135 sha1fp.0 = 58:86:89:27:79:7F:00:55:A4:C3:26:0E:EB:F1:ED:3D:0C:6A:B6:3A subjectdn = "/DC=org/DC=ugrid/CN=UGRID CA G2" igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceCA-2B.pem0000644001343500074740000000252715004136222025216 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDwzCCAqugAwIBAgICASMwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCVUsx FTATBgNVBAoTDGVTY2llbmNlUm9vdDESMBAGA1UECxMJQXV0aG9yaXR5MRowGAYD VQQDExFVSyBlLVNjaWVuY2UgUm9vdDAeFw0xMTA2MTgxMzAwMDBaFw0yNzEwMzAw OTAwMDBaMFMxCzAJBgNVBAYTAlVLMRMwEQYDVQQKEwplU2NpZW5jZUNBMRIwEAYD VQQLEwlBdXRob3JpdHkxGzAZBgNVBAMTElVLIGUtU2NpZW5jZSBDQSAyQjCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkLgb2eIcly4LZfj0Rf5F7s+HE/ 6Tvpf4jsKkm7qs33y3EEudCbcPwQKjS2MgytPv+8xpEPHqy/hqTseNlZ6oJgc+V8 xlJ+0iws882Ca8a9ZJ/iGQH9UzXU4q35ArN3cbwoWAAvMvzZ6hUV86fAAQ1AueQN 6h7/tnfYfaUMiB4PNxucmouMHDJGmYzl47FtlLeHUr2c4m/oWSG5pADIvGFpWFHj NIw8/x4n97w5/ks0tc/8/5Q6xzUfCX/VfqciQCvKcui2J5MBhUlBDLenzwqvUytB 4XAwX/pRcKmnFEYwoc9OKGExNx9tn9RjQYJAC/KLb44Jqno9l0eRxu3uw4sCAwEA AaOBnzCBnDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E FgQUEqW/kZ9/4q9qXAny4vpZ4Dbh81UwHwYDVR0jBBgwFoAUXvgbSKZ3ayk8LgBT Mytjont+k8AwOQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5jYS5uZ3MuYWMu dWsvY3JsL3Jvb3QtY3JsLmRlcjANBgkqhkiG9w0BAQsFAAOCAQEArd5TFOo9SzGW 0+KrAdzzf60zh4Wy//vZz4tgt7NeDbNpz2TZROBAClSu7oLPiruzgnhNP/Vxeu0s pI41wRQsh0DVxhM+9ZFOskH+OdmHzKagoejvHh6Jt8WNN0eBLzN8Bvsue7ImJPaY cf/Qj1ZTBhaRHcMsLNnqak3un/P+uLPxqSuxVKMtC8es/jqosS4czJ3dgs1hgFy9 nPQiwuIyf3OJ9eifAOGXk9Nlpha9C54zhc+hAkSLnpx/FhPjwLgpwDRgDJud6otH 15x3qZqXNx7xbYfeHaM1R1HMEjfVdzKCTY4zsqNEGPEF/0nUQSFk6KQVz0/ugNmI 9qoDx3FeEg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceCA-2B.crl_url0000644001343500074740000000005315004136222026067 0ustar davidgdavidghttp://crl.ca.ngs.ac.uk/crl/escience2b.crl igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceCA-2B.signing_policy0000644001343500074740000000035515004136222027447 0ustar davidgdavidg# @(#)$Id: ffc3d59b.signing_policy,v 1.2 2011/09/06 14:25:00 pmacvsdg Exp $ # access_id_CA X509 '/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B' pos_rights globus CA:sign cond_subjects globus '"/C=UK/O=eScience/*"' igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceCA-2B.info0000644001343500074740000000076015004136222025365 0ustar davidgdavidg# # @(#)$Id: ffc3d59b.info,v 1.2 2011/06/27 09:43:40 pmacvsdg Exp $ # Information for 2011 CA UKeScience eScience issuing CA 2B # alias = UKeScienceCA-2B requires = UKeScienceRoot-2007 url = http://www.grid-support.ac.uk/ca/ crl_url = http://crl.ca.ngs.ac.uk/crl/escience2b.crl email = support@grid-support.ac.uk status = accredited:classic version = 1.135 sha1fp.0 = F3:03:90:25:E1:FD:F5:9D:B9:4A:97:F2:73:97:DE:73:91:B7:E9:AB subjectdn = "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceRoot-2007.pem0000644001343500074740000000240515004136222025776 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDiDCCAnCgAwIBAgIDAQAAMA0GCSqGSIb3DQEBCwUAMFQxCzAJBgNVBAYTAlVL MRUwEwYDVQQKEwxlU2NpZW5jZVJvb3QxEjAQBgNVBAsTCUF1dGhvcml0eTEaMBgG A1UEAxMRVUsgZS1TY2llbmNlIFJvb3QwHhcNMDcxMDMwMDkwMDAwWhcNMjcxMDMw MDkwMDAwWjBUMQswCQYDVQQGEwJVSzEVMBMGA1UEChMMZVNjaWVuY2VSb290MRIw EAYDVQQLEwlBdXRob3JpdHkxGjAYBgNVBAMTEVVLIGUtU2NpZW5jZSBSb290MIIB IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzc5G2aZQei3ANN8Afn94iWjf 4EqgSUN5p43lKDaWE+7SVo9yHukcpLOWrIeZkayTd9lvyEGY7SUPj350qcDfXMtT qSgGN7VMep2sZk9yNObSWFz9KPOwG1abigL9ulgEAKWIH3Brd5K5ThGqrvWfv7gn 5Y4q9oMe9pN1FgTenKJ7Zd7lBMjwJd50IyHXz4R0W/CVXv12WY1E1j3dlZS7o84v p34tqlCRSZqxcuPKM3Nyg9eAPIZq4c6qbKrG4/Hi0NOwLbmcqv7srmTdP6WmUn+M yRCX9AeCqcAEFdAgvPOu3RrydB0zw40D5uG37yzLh43/TMy6U2PyQDOu62SEmwID AQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E FgQUXvgbSKZ3ayk8LgBTMytjont+k8AwHwYDVR0jBBgwFoAUXvgbSKZ3ayk8LgBT Mytjont+k8AwDQYJKoZIhvcNAQELBQADggEBAAYaJ/u66lGwzRoZM24QZ3FvHIVi LHyizT5L+GhGIPXQPvoQ0EaiMOQ1xUzMy96DMKfA7ltGOTyBlUm5KbxE2uj5azB/ NujdFkGXP+dom3gX7khYV38OBMVu8a/O6aqXmaI8I5mQzl0TwQ3cCVWJO1kzx96e I7TRHZpGtng5rw4fuwdoOgoC/jXo0UOGki3YHMIFg+K9/d9yamdAfYmvbk3tfapT slZumdeFaZpRZqnxTI+jqhJkt3bsfLO27JQgCz5glxoDdjnBsFbcDgKVZcw8hps8 9HduUIgoQHKnvVyuJoZiDXEFUH3Sonnf8LcnwvYPeaOHoriz0S4Q1RKug40= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceRoot-2007.crl_url0000644001343500074740000000005115004136222026652 0ustar davidgdavidghttp://crl.ca.ngs.ac.uk/crl/root-crl.der igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceRoot-2007.signing_policy0000644001343500074740000000042015004136222030225 0ustar davidgdavidg# @(#)$Id: 98ef0ee5.signing_policy,v 1.3 2013/01/21 10:13:18 pmacvsdg Exp $ access_id_CA X509 '/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root' pos_rights globus CA:sign cond_subjects globus '"/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B"' igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceRoot-2007.namespaces0000644001343500074740000000101515004136222027330 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id: 98ef0ee5.namespaces,v 1.4 2013/01/21 10:13:18 pmacvsdg Exp $ # CA alias : UKeScienceRoot # subjectDN: /C=UK/O=eScienceRoot/OU=Authority/L=Root/CN=CA # TO Issuer "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" \ PERMIT Subject "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" TO Issuer "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" \ PERMIT Subject "/C=UK/O=eScience/.*" igtf-policy-installation-bundle-1.135/src/accredited/UKeScienceRoot-2007.info0000644001343500074740000000071715004136222026154 0ustar davidgdavidg# # @(#)$Id: 98ef0ee5.info,v 1.2 2013/01/21 10:13:18 pmacvsdg Exp $ # Information for the 2007 (new) CA UKeScience ROOT CA # alias = UKeScienceRoot-2007 url = http://www.grid-support.ac.uk/ca/ crl_url = http://crl.ca.ngs.ac.uk/crl/root-crl.der email = support@grid-support.ac.uk status = accredited:classic version = 1.135 sha1fp.0 = 59:7C:1A:AA:EC:65:7E:4A:F5:6A:00:1F:E2:16:44:48:96:35:DB:B1 subjectdn = "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" igtf-policy-installation-bundle-1.135/src/accredited/UNAMgrid-ca.pem0000644001343500074740000000306615004136223024562 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEajCCA1KgAwIBAgIJAMJEV/tnoKaaMA0GCSqGSIb3DQEBCwUAMDwxCzAJBgNV BAYTAk1YMREwDwYDVQQKEwhVTkFNZ3JpZDENMAsGA1UECxMEVU5BTTELMAkGA1UE AxMCQ0EwHhcNMTcxMDE4MjMwNDQ3WhcNMjcxMDE2MjMwNDQ3WjA8MQswCQYDVQQG EwJNWDERMA8GA1UEChMIVU5BTWdyaWQxDTALBgNVBAsTBFVOQU0xCzAJBgNVBAMT AkNBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsWzp1Cw4snzPxyIL sArwRVsx6nq/iqWkiqt6Gex+S3TLZCri3Bt2xop/VomJpUhdnZTdYoAsaNgWtzOG X2DyP1as18F/GokgwpP6+ATWHRtHJFIWg9JHwQ3Fdq75RJurMBnUSZTvkHtq/Ch0 CsMcWzDoK7jYv+nm6nEEptm8CG9zYDkD9DrZA6c2xIu5Y22r0vVQQNIANNR/34hv Newe0fKXeeq69jEaVZk+CDejggKEDLqTOnXHlitJu9QOzoSdStVxqarEmBPN8DS2 RJk/nPG/jKxVWSzNVcdbbkrnqVC2TcvN2F24/D6dkMwe63MXUHEHBZ8tExHS/Dx1 O0VWmwIDAQABo4IBbTCCAWkwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUczW3 j3cn8mxO7udcYTUxr/AEr5kwHwYDVR0jBBgwFoAUczW3j3cn8mxO7udcYTUxr/AE r5kwDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzA7BglghkgBhvhC AQ0ELhYsVU5BTWdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgQ2VydGlmaWNh dGUwOgYJYIZIAYb4QgEIBC0WK2h0dHBzOi8vY2EudW5hbWdyaWQudW5hbS5teC9w dWIvcG9saWN5Lmh0bWwwPQYDVR0fBDYwNDAyoDCgLoYsaHR0cDovL2NhLnVuYW1n cmlkLnVuYW0ubXgvcHViL2NybC9jYWNybC5jcmwwOwYJYIZIAYb4QgEDBC4WLGh0 dHA6Ly9jYS51bmFtZ3JpZC51bmFtLm14L3B1Yi9jcmwvY2FjcmwuY3JsMA0GCSqG SIb3DQEBCwUAA4IBAQBJyemcEN29BoIEl1tMroX6D14UPzVDsTTswuo7j9hXh+E1 M1uctNFoNrUK8/PmxasSGlcABDxCUXPqbXXF7ooIK+DsJ1EwijkjFjyxJYhkMlgI RZYYRmf+kk7U8HVrFTNcn/Ah+VuQaYCfBLZhV3iKORhmZ0pkhuKZOzEfvuDdi6uO QEPWFSrL6FlJ1vrrKt1duxlkZwRY8rpISHVXDqvEjxNAsblv//d0lDer/72/qA/0 eAoiXLfY7DpgkkmachOWpnrE/WyM5kgNrFFrLnPof0MAb2toxQ2TzZSGWUPX2YA0 KIWQRqI8Ey2gPwR91ZBZrQGTQ0790tawCOqH5fRS -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/UNAMgrid-ca.crl_url0000644001343500074740000000006715004136223025441 0ustar davidgdavidghttp://ca.unamgrid.unam.mx/pub/crl/unamgrid-ca-crl.crl igtf-policy-installation-bundle-1.135/src/accredited/UNAMgrid-ca.signing_policy0000644001343500074740000000100015004136223027000 0ustar davidgdavidg # Signing policy for UNAMgrid CA # as .signing_policy along with # the CA certificate as . # -- here is the output of # openssl x509 -hash -noout -in # and is the lowest single (decimal) # digit that makes the file unique (in case # you have other CA certificates that hash to # the same value) access_id_CA X509 '/C=MX/O=UNAMgrid/OU=UNAM/CN=CA' pos_rights globus CA:sign cond_subjects globus '"/C=MX/O=UNAMgrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/UNAMgrid-ca.namespaces0000644001343500074740000000065015004136223026114 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)24c3ccde.signing_policy.namespaces # CA alias : UNAMgrid # subord_of: # subjectDN: /C=MX/O=UNAMgrid/OU=UNAM/CN=CA # hash : 24c3ccde.signing_policy # (generated automatically from 24c3ccde.signing_policy) # TO Issuer "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA" \ PERMIT Subject "/C=MX/O=UNAMgrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/UNAMgrid-ca.info0000644001343500074740000000071715004136223024734 0ustar davidgdavidg# # @(#)$Id: 24c3ccde.info,v 1.5 2017/10/25 10:13:58 pmacvsdg Exp $ # Information for UNAMgird CA # alias = UNAMgrid-ca url = http://ca.unamgrid.unam.mx/ ca_url = http://ca.unamgrid.unam.mx/pub/cacert/cacert.pem crl_url = http://ca.unamgrid.unam.mx/pub/crl/unamgrid-ca-crl.crl email = camanager@unam.mx status = accredited:classic sha1fp.0 = 98:93:D3:0C:24:94:61:F4:59:74:1C:DD:A9:1F:AC:A5:7A:21:43:B7 version = 1.135 subjectdn = "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA" igtf-policy-installation-bundle-1.135/src/accredited/USERTrustECCCertificationAuthority.pem0000644001343500074740000000166415004136224031346 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/USERTrustECCCertificationAuthority.crl_url0000644001343500074740000000010015004136224032207 0ustar davidgdavidghttp://crl.usertrust.com/USERTrustECCCertificationAuthority.crl ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/USERTrustECCCertificationAuthority.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/USERTrustECCCertificationAuthority.signing_poli0000644001343500074740000000116015004136224033235 0ustar davidgdavidg# EACL for GEANT TCS eScience SSL and Personal CA 4 ECC access_id_CA X509 '/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Assured CA G3 [Run by the Issuer]" "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Secure CA G3 [Run by the Issuer]"' igtf-policy-installation-bundle-1.135/src/accredited/USERTrustECCCertificationAuthority.namespaces0000644001343500074740000000255615004136224032705 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)uthority.namespaces # CA alias : USERTrustECCCertificationAuthority # subord_of: # subjectDN: /C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority # hash : uthority # TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" \ PERMIT Subject "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Assured CA G3 [Run by the Issuer]" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" \ PERMIT Subject "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Secure CA G3 [Run by the Issuer]" igtf-policy-installation-bundle-1.135/src/accredited/USERTrustECCCertificationAuthority.info0000644001343500074740000000142515004136224031513 0ustar davidgdavidg# @(#)$Id: USERTrustECCCertificationAuthority.info,v 1.1 2020/04/23 18:46:41 pmacvsdg Exp $ # self-signed root version of USERTrustECCCertificationAuthority for TCSG4 # C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority # alias = USERTrustECCCertificationAuthority ca_url = http://crt.usertrust.com/USERTrustECCCertificationAuthority.crt crl_url = http://crl.usertrust.com/USERTrustECCCertificationAuthority.crl policy_url = https://sectigo.com/legal url = https://sectigo.com/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = D1:CB:CA:5D:B2:D5:2A:7F:69:3B:67:4D:E5:F0:5A:1D:0C:95:7D:F0 subjectdn = "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" igtf-policy-installation-bundle-1.135/src/accredited/USERTrustRSACertificationAuthority.pem0000644001343500074740000000405615004136224031377 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B 3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT 79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs 8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG jjxDah2nGN59PRbxYvnKkKj9 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/USERTrustRSACertificationAuthority.crl_url0000644001343500074740000000010015004136224032242 0ustar davidgdavidghttp://crl.usertrust.com/USERTrustRSACertificationAuthority.crl ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootrootigtf-policy-installation-bundle-1.135/src/accredited/USERTrustRSACertificationAuthority.signing_policyigtf-policy-installation-bundle-1.135/src/accredited/USERTrustRSACertificationAuthority.signing_poli0000644001343500074740000000134115004136224033271 0ustar davidgdavidg# EACL for TERENA TCS SSL CA 4 (G2 is obsolete and no longer included) access_id_CA X509 '/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Assured CA G4 [Run by the Issuer]" "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Secure CA G4 [Run by the Issuer]" "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2" "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3"' igtf-policy-installation-bundle-1.135/src/accredited/USERTrustRSACertificationAuthority.namespaces0000644001343500074740000000347415004136224032740 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)USERTrustRSACertificationAuthority.namespaces # CA alias : USERTrustRSACertificationAuthority # subord_of: # subjectDN: /C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority # TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Assured CA G4 [Run by the Issuer]" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=AE/O=Digital Trust L.L.C./CN=DigitalTrust Secure CA G4 [Run by the Issuer]" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3" TO Issuer "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3" \ PERMIT Subject "/DC=org/DC=incommon/.*" igtf-policy-installation-bundle-1.135/src/accredited/USERTrustRSACertificationAuthority.info0000644001343500074740000000134115004136224031543 0ustar davidgdavidg# @(#)$Id$ # self-signed root version of USERTrustRSACertificationAuthority for TCSG4 (not subordinate to AddTrust) # C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority # alias = USERTrustRSACertificationAuthority ca_url = http://crt.comodoca.com/USERTrustRSACertificationAuthority.crt crl_url = http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl policy_url = https://sectigo.com/legal url = https://sectigo.com/ email = tcs-pma@lists.geant.org status = accredited:classic version = 1.135 sha1fp.0 = 2B:8F:1B:57:33:0D:BB:A2:D0:7A:6C:51:F7:0E:E9:0D:DA:B9:AD:8E subjectdn = "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" igtf-policy-installation-bundle-1.135/src/accredited/cilogon-basic.pem0000644001343500074740000000255715004136225025312 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID1TCCAr2gAwIBAgIJALlUNEZsE7Q5MA0GCSqGSIb3DQEBCwUAMGoxEzARBgoJ kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEbMBkGA1UEAxMSQ0lMb2dvbiBCYXNpYyBD QSAxMB4XDTEwMDYwNDIwMTkwOFoXDTMwMDYwNDIwMTkwOFowajETMBEGCgmSJomT 8ixkARkWA29yZzEXMBUGCgmSJomT8ixkARkWB2NpbG9nb24xCzAJBgNVBAYTAlVT MRAwDgYDVQQKEwdDSUxvZ29uMRswGQYDVQQDExJDSUxvZ29uIEJhc2ljIENBIDEw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/ESK+Ve88+tU5atBtCBSp tJR9MIPXz36/M2vbKupkizGLHlGO8p1tMNrUR8jQM5bPokp7JUqYfzx3BHldFj7T Y78wUlgCqBT6KJCf1skWlSaF/7Lx5bnNT/pF6VkyEMvepp5FyttaYrXHmBpaPhnk JZ9OjRf8Q79Acy0cnro5V2Oz7LgJ/W78zRhXOuSUQlDuZ/L7VvF7q4PnmFS+ZwSm jJWvCUTY9D3U+ef2RluGrcYEYf14dd5UIeCmMaApqi5dhopXQXbQ0OWp9QRdjB5z nA+7ZK0leMKMmId5kfWPcDf1iWHYII9IQoPEsiqDVLuAA/7yy2j5A+Unk0TtCYoB AgMBAAGjfjB8MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1Ud DgQWBBSaMcA1v2rOmCeEryQ9yZy3SNLWOzAfBgNVHSMEGDAWgBSaMcA1v2rOmCeE ryQ9yZy3SNLWOzAZBgNVHREEEjAQgQ5jYUBjaWxvZ29uLm9yZzANBgkqhkiG9w0B AQsFAAOCAQEAmPQtJ0o6r664pmFxLv1nKNL/uS9J+37OaD9ZQnX5KRNuJvlumwsg ldjAwDgupC5kop6O0Aj/C1N6yz161DPy9x/Dr/FFoACuysSc/DlgAT5KFyOTHTWM jo3TDdDDComCxkWvNTNNCGOR4MXN291DXn7MJwVTbuqtRu6cwY6pg+US1+gn9OEy Ru+KiDF/LECIW8wSboCB4rOJAU9oNIYScMx0Yv5x7/D3/OprznRAdOowxLV5eZGj WnTqOOFI51hueHVeP7mvqfhFZj+jqIF8bmEcWruj6UBaaBMBiMt1tPnF28Pivlsd QKRPqSYmz22wTRfUg7bF3U+ILxLJd+fQkA== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/cilogon-basic.crl_url0000644001343500074740000000014015004136225026155 0ustar davidgdavidghttp://crl-cilogon.ncsa-security.net/cilogon-basic.crl http://crl.cilogon.org/cilogon-basic.crl igtf-policy-installation-bundle-1.135/src/accredited/cilogon-basic.signing_policy0000644001343500074740000000024015004136225027531 0ustar davidgdavidgaccess_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/*"' igtf-policy-installation-bundle-1.135/src/accredited/cilogon-basic.namespaces0000644001343500074740000000060615004136225026641 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)28776852.namespaces # CA alias : cilogon-basic # subord_of: # subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1 # hash : 28776852 # TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" \ PERMIT Subject "/DC=org/DC=cilogon/.*" igtf-policy-installation-bundle-1.135/src/accredited/cilogon-basic.info0000644001343500074740000000063115004136225025453 0ustar davidgdavidgalias = cilogon-basic url = http://ca.cilogon.org/ ca_url = https://cilogon.org/cilogon-basic.pem crl_url = http://crl-cilogon.ncsa-security.net/cilogon-basic.crl;http://crl.cilogon.org/cilogon-basic.crl email = ca@cilogon.org status = accredited:iota version = 1.135 sha1fp.0 = 96:D8:FB:A6:F8:03:DA:A8:E7:70:DB:BA:5C:6A:2F:58:93:D8:60:28 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" igtf-policy-installation-bundle-1.135/src/accredited/cilogon-silver.pem0000644001343500074740000000255715004136226025536 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID1zCCAr+gAwIBAgIJAPzABNJ2U9LQMA0GCSqGSIb3DQEBCwUAMGsxEzARBgoJ kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBTaWx2ZXIg Q0EgMTAeFw0xMDA2MDQyMDIwMTRaFw0zMDA2MDQyMDIwMTRaMGsxEzARBgoJkiaJ k/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQGEwJV UzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBTaWx2ZXIgQ0Eg MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANpIdBE+VFt91/2o3vtG mFq0DbwBeon0/0E2dmMUpb/D/lm3y4Nnhnq1Vegey6UAdh0FfzrxKaeSkhS93Avm mgbEdD7yE1RuStn9NbIIWSIO34Fi8UAxJ4CS852UIMRptoYk9IW+qincpEgwOQRH FzWeUz3GyTXuPY74aQb3YC0RrceVIqcPdEEyczi4hlOlNKzfOF4uidoqprUc7Pc9 kMakldvdH1NXZDFDd7tMGr4FD2Kl0PLnFq2v4OCdH9Db03IfehRSQPA7gnZDjyLX EphMaGtXzMfjfA77ull/DyrZ/z212x4y9A6Fy/rmgjhoET5wQVfhJ4PdITXooECo ZKsCAwEAAaN+MHwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFEENPrWb8wHaeL2DHsLFVulpdjpYMB8GA1UdIwQYMBaAFEENPrWb8wHa eL2DHsLFVulpdjpYMBkGA1UdEQQSMBCBDmNhQGNpbG9nb24ub3JnMA0GCSqGSIb3 DQEBCwUAA4IBAQDLfUB1sv85RK5JRL6Lku9+9v2Jlgcd+uJOODjF/BzLm4gXt6Cq gLdFkeURJvwXyIRSQ7ok11pjjz0VA/wFkvO/89A0PxB9tuQQy2276cIxeeyWQkQT doucVgrE7+ZGF/9R1ssXUCNpWkZZeC8a0HgZLnXstzQmsbxNsE1bP+hW3Ji9QAPP JtkYjjUDAGJa7UCeJ3izPON1gsU2uLoqdWvzqAa1xrZqAjktZR0dXYNm88b5mAL5 w1gVY7JKlyJjCIK9rCAqEcncvyaz5huqcJ3O6DENku4jzOppEKaNSffAJg9Fo4wh jAe7J7wB4AeNpDqaOdxsoQX8c6eHHyJ+b+P7 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/cilogon-silver.crl_url0000644001343500074740000000014215004136226026403 0ustar davidgdavidghttp://crl-cilogon.ncsa-security.net/cilogon-silver.crl http://crl.cilogon.org/cilogon-silver.crl igtf-policy-installation-bundle-1.135/src/accredited/cilogon-silver.signing_policy0000644001343500074740000000024115004136226027756 0ustar davidgdavidgaccess_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/*"' igtf-policy-installation-bundle-1.135/src/accredited/cilogon-silver.namespaces0000644001343500074740000000061115004136226027061 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)10718cba.namespaces # CA alias : cilogon-silver # subord_of: # subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1 # hash : 10718cba # TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1" \ PERMIT Subject "/DC=org/DC=cilogon/.*" igtf-policy-installation-bundle-1.135/src/accredited/cilogon-silver.info0000644001343500074740000000063615004136226025704 0ustar davidgdavidgalias = cilogon-silver url = http://ca.cilogon.org/ ca_url = https://cilogon.org/cilogon-silver.pem crl_url = http://crl-cilogon.ncsa-security.net/cilogon-silver.crl;http://crl.cilogon.org/cilogon-silver.crl email = ca@cilogon.org status = accredited:mics version = 1.135 sha1fp.0 = 4A:54:1C:24:BE:2F:8C:B1:F3:21:E9:3E:2D:7D:A8:87:5F:AB:13:D6 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1" igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC4.pem0000644001343500074740000000237515004136227027055 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDgjCCAmqgAwIBAgIKee1hM3MCy9tqUjANBgkqhkiG9w0BAQsFADBeMQswCQYD VQQGEwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJ bmMxJDAiBgNVBAMTG2VtU2lnbiBUcnVzdGVkIFJvb3QgQ0EgLSBDNDAeFw0yMDA4 MTIxODMwMDBaFw00NTA4MTIxODMwMDBaMF4xCzAJBgNVBAYTAlVTMRMwEQYDVQQL EwplbVNpZ24gUEtJMRQwEgYDVQQKEwtlTXVkaHJhIEluYzEkMCIGA1UEAxMbZW1T aWduIFRydXN0ZWQgUm9vdCBDQSAtIEM0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEA0SispTc+Suskt9L2EGaKvM5QtA/CC5ib15Ad8i+2TuIfNNzOTPyF 993vvwA/qsLHvQrN88vk/TaRt83g/LhVAGvnV9O2RG7zIPZ7YsIZGrS1zGnl3zem oxoqFrH+4i3wG5HWVRZu2YrgRkaJ3ssP+XEQHXMCthOFWz4XoQKOBQOOfj4KHf9e ByCQ5S+P25CkbEu15u6hajxlJfHKlYRKVQ5v8J7zMm/1HDmaZA9aGx1X9CP5L7l0 Hw6JwDKH6WbVDJLqBcznf/YxqOH4vCeHnMhx2jRsZ3FLQWMuVSqJTt9IsdJSAJu1 v5jhM8aBK55iGgb03VarT3K8bxoinLQGtQIDAQABo0IwQDAdBgNVHQ4EFgQUlz7I CQspSd1n0Xrzp/+s4AnAt6kwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB Af8wDQYJKoZIhvcNAQELBQADggEBAFbGKUlWO7ZMBpbZQJ4lLvK33/qkvzjvKTwv C/Uy6lEgSohVqkCvONtGNt4rq89olFmnNQz/v6wme/vdTc76XGDtb2eO6PWTWdiv eRIzRWSWTa9DlqO68sP/VHCUMME7JkFPAwYUNnrjAuUA8sitNVFMqYdVPnBLULhA tCPe8S+Tj2we3SdEDf/lu6ebr8dloTs67/96hSjkLy2XAoHiUk9CaMQcrMu6E8sv PKQhumMFgUEQgcB/bcymJ0I8IXaXxwHAdRoiqVM3w9usQAUK5XPPBUkYSG6/MwLI 6cYtrx2Xv5h3lECU6H566Zc7olU8VhJ3LzOMPWGxN5XipfMYcHM= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC4.crl_url0000644001343500074740000000005315004136227027725 0ustar davidgdavidghttp://crl.emsign.com/?TrustedRootCAC4.crl igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC4.signing_policy0000644001343500074740000000047315004136227031306 0ustar davidgdavidg# EACL for eMudhra emSign CA TrustedRootCAC4 access_id_CA X509 '/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4' pos_rights globus CA:sign cond_subjects globus '"/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4"' igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC4.namespaces0000644001343500074740000000104715004136227030406 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)TrustedRootCAC4.signing_policy.namespaces # CA alias : TrustedRootCAC4 # subord_of: # subjectDN: /C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4 # hash : TrustedRootCAC4.signing_policy # (generated automatically from TrustedRootCAC4.signing_policy) # TO Issuer "/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4" \ PERMIT Subject "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC4.info0000644001343500074740000000114715004136227027223 0ustar davidgdavidg# # @(#)$Id: TrustedRootCAC4.info,v 1.2 2023/07/29 12:57:50 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor TrustedRootCAC4 # alias = eMudhra-TrustedRootCAC4 ca_url = https://repository.emsign.com/certs/TrustedRootCAC4.crt crl_url = http://crl.emsign.com/?TrustedRootCAC4.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com status = accredited:classic version = 1.135 sha1fp.0 = 3B:6F:67:1F:CD:FC:17:01:64:1C:8D:07:15:18:37:79:01:54:6A:66 subjectdn = "/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4" igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC5.pem0000644001343500074740000000357315004136230027051 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFWTCCA0GgAwIBAgIJAPkhQOMyJNw4MA0GCSqGSIb3DQEBDAUAMEoxCzAJBgNV BAYTAlVTMRUwEwYDVQQKDAxlTXVkaHJhIEluYy4xJDAiBgNVBAMMG2VtU2lnbiBU cnVzdGVkIFJvb3QgQ0EgLSBDNTAeFw0yMzA3MTIwNjI5NDFaFw00ODA3MTIwNjI5 NDFaMEoxCzAJBgNVBAYTAlVTMRUwEwYDVQQKDAxlTXVkaHJhIEluYy4xJDAiBgNV BAMMG2VtU2lnbiBUcnVzdGVkIFJvb3QgQ0EgLSBDNTCCAiIwDQYJKoZIhvcNAQEB BQADggIPADCCAgoCggIBAJWpcv0LLJNx3UUhq0N3VohhnNEsC70h3aeA9Tnn+4tw nOi0KFCMvNkdvrvG6khHNsXp8iQsFIjsi+Dc2/M5n5ynzt3sHuDOK5L8BiyqCoIX wFMrMZvQ3BJWEQb6H1QL9j3K/6OWklocaoWBWV6a5fuqhL/yf5DoBEE+pqGbNq5N bOtzZY2FAa47n6A1XiW+knllPhq/kuawBAoXebnUcz+cjwn/BnlrnrcEnUIvdNmg 1jERTnV4bRaU+/fOo3q1d2hf2vXdLX4d2bVK7BGhK7tFsawldzmhvIl0YgAt+d56 p03FRliMDAGEg/ahQOX9Gkpt9A4wcJzGAvBRtIC2a27fxgx+qDMxrzo9xZwMODGc /vYkJfjudmLzoUeErGHpLqx/XrQGXJYy4SLqBPWyhJqC06GjlcenOED1jCzDqfdp Foy4OF4MGLkJIfk5/qrYeAHG70X6QF2RJ8OKVM2bpGuGPtu/ND56kR6/E2KA914a 8qouFvaJUaRQ22SuZH0rTbJMoHaSYwwqDQm8qmYJNeCkCTZ4oq5qgwVuBEyKlBA4 Dli+BKgwuksmwvAI/YQQfdNqFTZ8Yjq/H9Co1g83g2Cx2eYTPeICi97OSW+Gq7yB hvn/WH4Tiby4m+fkdEnIKYE0m5YcDOxjtMX7XM7nXt1sXMxxBg0x6UepkYg3gBKH AgMBAAGjQjBAMB0GA1UdDgQWBBSornLCSjAQzpIbWYgIqtJa+FyR0TAOBgNVHQ8B Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQwFAAOCAgEAAfg3 yxdzAKSkpHgk/p+i2mb9d+1qsX3FSTQ6wt3ei8yexgaYgcOZQq8yybNoyANtWbc/ YaDx8DSQo+FIcmOyCno03J+yMg43lnKHu7h8RH7X9DCs1bFDbjCWE1yx/boPbnpt eorxRLXvaKYJ1Ll3IyHt4v6P/lADAZiI6+P0UZmqreGJcrgzg86QsdbNyjLIFkRw 7dJ6utgJdcKvQO0MX8EZKoTua/VlL3hpFgcwwxnHJJ6jBgT90xsuxL6esLw/M14M IfwuvhLO4qiizc0wsopp9U6JfuzYjkDib4vA5O/IcpplJ/nX0p3udrZZSTGX7RU6 FuP6awyJ45jXkbg5RrNt51Y9lsLhnmdn+ymG9VqaCoSkpV/h7RdOkBNNugZHBIpB PTYUK23UTrywLYy9ZjZguY0CVFR9zDegq+M9D3/O7krfnDAe+odhgthObElg7xnc 2IFcW+Y3oJotKlgI+OrkiiSA26Dt8bOUQpM2irhnR3ypqgKtqMUwfD4PVQtFcIfX 5WYhI5v71Ut4K1zpa4txlKKRmgIriTTxRNfKW8yWipQeX7pNSHRvi2Q4KBYNm3N2 8nNb7TRY3kWXMwrGwYZ3fGlVXnwKyVfw3oCcHZAvGHOGkZ+hG/b8gNhcLfIa/xRd tnQJhIzd9LzXirs8UgCl6BYwo17PPB3tg310bso= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC5.crl_url0000644001343500074740000000005315004136230027720 0ustar davidgdavidghttp://crl.emsign.com/?TrustedRootCAC5.crl igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC5.signing_policy0000644001343500074740000000053315004136230031276 0ustar davidgdavidg# EACL for eMudhra emSign CA TrustedRootCAC5 access_id_CA X509 '/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1"' igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC5.namespaces0000644001343500074740000000123315004136230030376 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)TrustedRootCAC5.signing_policy.namespaces # CA alias : TrustedRootCAC5 # subord_of: # subjectDN: /C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5 # hash : TrustedRootCAC5.signing_policy # (generated automatically from TrustedRootCAC5.signing_policy) # TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" \ PERMIT Subject "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" \ PERMIT Subject "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" igtf-policy-installation-bundle-1.135/src/accredited/eMudhra-TrustedRootCAC5.info0000644001343500074740000000113215004136230027210 0ustar davidgdavidg# # @(#)$Id: TrustedRootCAC5.info,v 1.2 2023/07/29 12:57:50 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor TrustedRootCAC5 # alias = eMudhra-TrustedRootCAC5 ca_url = https://repository.emsign.com/certs/TrustedRootCAC5.crt crl_url = http://crl.emsign.com/?TrustedRootCAC5.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com status = accredited:classic version = 1.135 sha1fp.0 = 72:F2:9E:E7:F8:EE:B6:DE:9D:EF:CC:02:47:2A:1C:D1:16:1D:AF:1A subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" igtf-policy-installation-bundle-1.135/src/accredited/emSignClass1CAG1.pem0000644001343500074740000000306615004136231025457 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEaDCCA1CgAwIBAgILANWbfJs2otRJIuowDQYJKoZIhvcNAQELBQAwZzELMAkG A1UEBhMCSU4xEzARBgNVBAsTCmVtU2lnbiBQS0kxJTAjBgNVBAoTHGVNdWRocmEg VGVjaG5vbG9naWVzIExpbWl0ZWQxHDAaBgNVBAMTE2VtU2lnbiBSb290IENBIC0g RzEwHhcNMTgwMjE4MTgzMDAwWhcNMzMwMjE4MTgzMDAwWjBqMQswCQYDVQQGEwJJ TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s b2dpZXMgTGltaXRlZDEfMB0GA1UEAxMWZW1TaWduIENsYXNzIDEgQ0EgLSBHMTCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKxsGEyj1Ff+Jf3rXeVJfQQL xWijpNKSYaKfLwClLWuVgDMdL1vBVpMy3MCrcYKlLvGsET/6CFzYdqdamP7P5N6C D7BXQkYGVvzJimPtO/eaj46YdDSx91/FAxRkJQNVargAqbCQiYZVZrZe13x9FtIs Wc+wiAAIvyaDnfl5Uc7srAYRPpxbwUBvsKL0P5sX1vNKaCz/wxRARMRfg13OzuOw +jrVkF/y/7bfhxie6K2/d0A/em3rmmfsrDzFUwge9rI4QohUnJngVST9zUMTGKbj +QKSijdenYiJu/LFNm8bEg4Vn6tM19rgbb3LH8wwF9wS2IcDzX0Xz/KRJROXogUC AwEAAaOCARAwggEMMB8GA1UdIwQYMBaAFPvvDYaesOPdqbnxIRd/PvzwdysaMB0G A1UdDgQWBBTcYI8K3rGZhJuEQAPjdQMyA4AAkDAOBgNVHQ8BAf8EBAMCAQYwPQYD VR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0dHA6Ly9yZXBvc2l0b3J5 LmVtc2lnbi5jb20wEgYDVR0TAQH/BAgwBgEB/wIBADAyBggrBgEFBQcBAQQmMCQw IgYIKwYBBQUHMAGGFmh0dHA6Ly9vY3NwLmVtc2lnbi5jb20wMwYDVR0fBCwwKjAo oCagJIYiaHR0cDovL2NybC5lbXNpZ24uY29tP1Jvb3RDQUcxLmNybDANBgkqhkiG 9w0BAQsFAAOCAQEAMFYsJUg/auGHNrj+JJi+xv7f5etIB/NXArZLnBsi68WBx3hv 3Vxng658w6WCEc8GeJesEZrP9pbClWMLSikhb7VHc0lVROdOE4VlZvgSiHzRvM6h m8RTiN9rRLTt06zC/PYAOgi5KavCRaWptPh95EUp+lcvlK040obb6BGimoYsX2gl hzOQcCgRBgApCNYwUbR2QLK5qGbt0Nyidwe5Iut7mwDat2ElFOeUQ3HWr20+vHfp PT+X7+DwPmIzRS9fuq1er42SwiJd+0BdUCjlecevaZG4wbVMTFxycLw72e7gcDss OagPoy4AoaUbnMY4VKvDSpVjRSZ23SRY8ZQOxg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/emSignClass1CAG1.crl_url0000644001343500074740000000005415004136231026332 0ustar davidgdavidghttp://crl.emsign.com/?emSignClass1CAG1.crl igtf-policy-installation-bundle-1.135/src/accredited/emSignClass1CAG1.signing_policy0000644001343500074740000000055115004136231027707 0ustar davidgdavidg# EACL for eMudhra emSign CA emSignClass1CAG1 access_id_CA X509 '/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1' pos_rights globus CA:sign cond_subjects globus '"/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/emSignClass1CAG1.namespaces0000644001343500074740000000146515004136231027016 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)emSignClass1CAG1.signing_policy.namespaces # CA alias : emSignClass1CAG1 # subord_of: # subjectDN: /C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1 # hash : emSignClass1CAG1.signing_policy # (generated automatically from emSignClass1CAG1.signing_policy) # TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" \ PERMIT Subject "/C=US/O=emSignGrid/.*" TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" \ PERMIT Subject "/DC=com/DC=emSignGrid/.*" TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" \ PERMIT Subject "/DC=org/DC=emSignGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/emSignClass1CAG1.info0000644001343500074740000000121215004136231025620 0ustar davidgdavidg# # @(#)$Id: emSignClass1CAG1.info,v 1.2 2023/07/29 12:57:50 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor emSignClass1CAG1 # alias = emSignClass1CAG1 ca_url = https://repository.emsign.com/certs/emSignClass1CAG1.crt crl_url = http://crl.emsign.com/?emSignClass1CAG1.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com requires = emSignRootCAG1 status = accredited:classic version = 1.135 sha1fp.0 = 35:C3:88:FE:BC:BF:72:EE:67:B9:5B:5E:E4:D4:5E:AD:1A:41:9D:B4 subjectdn = "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" igtf-policy-installation-bundle-1.135/src/accredited/emSignRootCAG1.pem0000644001343500074740000000242615004136232025254 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO 8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH 6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx iN66zB+Afko= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/emSignRootCAG1.crl_url0000644001343500074740000000004415004136232026127 0ustar davidgdavidghttp://crl.emsign.com/?RootCAG1.crl igtf-policy-installation-bundle-1.135/src/accredited/emSignRootCAG1.signing_policy0000644001343500074740000000054415004136232027507 0ustar davidgdavidg# EACL for eMudhra emSign CA emSignRootCAG1 access_id_CA X509 '/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1' pos_rights globus CA:sign cond_subjects globus '"/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1"' igtf-policy-installation-bundle-1.135/src/accredited/emSignRootCAG1.namespaces0000644001343500074740000000140315004136232026604 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)emSignRootCAG1.signing_policy.namespaces # CA alias : emSignRootCAG1 # subord_of: # subjectDN: /C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1 # hash : emSignRootCAG1.signing_policy # (generated automatically from emSignRootCAG1.signing_policy) # TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1" \ PERMIT Subject "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1" \ PERMIT Subject "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" igtf-policy-installation-bundle-1.135/src/accredited/emSignRootCAG1.info0000644001343500074740000000113515004136232025422 0ustar davidgdavidg# # @(#)$Id: emSignRootCAG1.info,v 1.2 2023/07/29 12:57:50 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor emSignRootCAG1 # alias = emSignRootCAG1 ca_url = https://repository.emsign.com/certs/emSignRootCAG1.crt crl_url = http://crl.emsign.com/?RootCAG1.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com status = accredited:classic version = 1.135 sha1fp.0 = 8A:C7:AD:8F:73:AC:4E:C1:B5:75:4D:A5:40:F4:FC:CF:7C:B5:8E:8C subjectdn = "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1" igtf-policy-installation-bundle-1.135/src/accredited/emSignSSLCAG1.pem0000644001343500074740000000312715004136232024771 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEgjCCA2qgAwIBAgIKIXrVixxxPAAgkTANBgkqhkiG9w0BAQsFADBnMQswCQYD VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH MTAeFw0xODAyMTgxODMwMDBaFw0zMzAyMTgxODMwMDBaMGYxCzAJBgNVBAYTAklO MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv Z2llcyBMaW1pdGVkMRswGQYDVQQDExJlbVNpZ24gU1NMIENBIC0gRzEwggEiMA0G CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCU1fhvfUV6OJOhMHAzBZDvxxpa5bvT S1x6S4rVQmP/+125Wj2gpxvtII2RyqXQFlZd3qAKMLgqgHGzeJcyjw6CXbzJHmri liVGWmuLn/NUKjKJgP9zd6eGOHe6mT1WjB9ZZEFLsDYoXBthTwcHdLWK2quJrHgS 3hZiJnpkX+hmaY7DX89oUMI1uvCQaPljgTvtiR9vtmeg/GgyePX8K5EUMozX8ElR DMWkzdFUYv0DVcSQcbN1R/IDhWW1vPHzU8kexAMO4B/E5sj6FGrAeMM36/uZ3AmF 4mt/0Ia2BKPsW/K2T3hkaNSTr2BKlUm6bRccONcNAyzyN258xcUcX+RJAgMBAAGj ggEvMIIBKzAfBgNVHSMEGDAWgBT77w2GnrDj3am58SEXfz788HcrGjAdBgNVHQ4E FgQUNNH3OTJFQEqZK32JaldprZWv4zcwDgYDVR0PAQH/BAQDAgEGMB0GA1UdJQQW MBQGCCsGAQUFBwMBBggrBgEFBQcDAjA9BgNVHSAENjA0MDIGBFUdIAAwKjAoBggr BgEFBQcCARYcaHR0cDovL3JlcG9zaXRvcnkuZW1zaWduLmNvbTASBgNVHRMBAf8E CDAGAQH/AgEAMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYWaHR0cDovL29j c3AuZW1zaWduLmNvbTAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3JsLmVtc2ln bi5jb20/Um9vdENBRzEuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAaBDZfBK+cP9Zk lI7QN3mkpgD+mYfp/03P51cUNlfAFoYd1G/4lU468rg7JLTwqFXcDzcmrWt8lmdi AMflxwLGeNObNS9RkpdiMDCdRItCHq00IMbbzj5rz+HSzAn6WsbLn9efn9WhO1MO 72d1SsEbVOTw/Z3sfPpWS8DSp91TRZuRKReVmD967QnsQGYNKUG6esTV73dOigHC ndwglIXCUkaxTroFn7wT6Sqt9pklaqxBkEx/yzp0HxpZtC8uK6aOFx624S9yF8nk 6U7rbscn4kJYOF+0U9JshFkQ4+cx5kKd3cGNtmaTzemoZSGn+Aty6H6/oDPteLpE cUPckzSa -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/emSignSSLCAG1.crl_url0000644001343500074740000000005115004136232025643 0ustar davidgdavidghttp://crl.emsign.com/?emSignSSLCAG1.crl igtf-policy-installation-bundle-1.135/src/accredited/emSignSSLCAG1.signing_policy0000644001343500074740000000053615004136232027226 0ustar davidgdavidg# EACL for eMudhra emSign CA emSignSSLCAG1 access_id_CA X509 '/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1' pos_rights globus CA:sign cond_subjects globus '"/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/emSignSSLCAG1.namespaces0000644001343500074740000000143115004136232026323 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)emSignSSLCAG1.signing_policy.namespaces # CA alias : emSignSSLCAG1 # subord_of: # subjectDN: /C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1 # hash : emSignSSLCAG1.signing_policy # (generated automatically from emSignSSLCAG1.signing_policy) # TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" \ PERMIT Subject "/C=US/O=emSignGrid/.*" TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" \ PERMIT Subject "/DC=com/DC=emSignGrid/.*" TO Issuer "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" \ PERMIT Subject "/DC=org/DC=emSignGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/emSignSSLCAG1.info0000644001343500074740000000116715004136232025145 0ustar davidgdavidg# # @(#)$Id: emSignSSLCAG1.info,v 1.2 2023/07/29 12:57:50 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor emSignSSLCAG1 # alias = emSignSSLCAG1 ca_url = https://repository.emsign.com/certs/emSignSSLCAG1.crt crl_url = http://crl.emsign.com/?emSignSSLCAG1.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com requires = emSignRootCAG1 status = accredited:classic version = 1.135 sha1fp.0 = 47:64:AF:D6:A8:29:92:D9:31:47:25:B9:B8:77:05:AF:F4:E8:4B:E8 subjectdn = "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" igtf-policy-installation-bundle-1.135/src/accredited/emigtfc4.pem0000644001343500074740000000336515004136233024300 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIE9TCCA92gAwIBAgIJAJV1wIbEAYwBMA0GCSqGSIb3DQEBCwUAMF4xCzAJBgNV BAYTAlVTMRMwEQYDVQQLEwplbVNpZ24gUEtJMRQwEgYDVQQKEwtlTXVkaHJhIElu YzEkMCIGA1UEAxMbZW1TaWduIFRydXN0ZWQgUm9vdCBDQSAtIEM0MB4XDTIzMDcw NzA5MTg1N1oXDTM4MDcwNjA5MTg1N1owSjELMAkGA1UEBhMCVVMxFTATBgNVBAoT DGVNdWRocmEgSW5jLjEkMCIGA1UEAwwbZW1TaWduIElzc3VpbmcgQ0EgSUdURiAt IEM0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyVjEoKjmS8Np8kZL IDUCOAaNmiaQwkY83RGYEuwrPvvm8aOKrxgfB3N8PSXsEE/LEmzqqMYhh0bIgfkV RpamUOUFirkgvLPTWe2kdrQzA6WRa91+ZBNHK/IrFuAD71n9GyV4Jjpo24lMlp20 M7Wl/RBMfCQm7C6BpjKtVAQpjPGqAGLPfiuaVGsZiaK+5orC1CIWvtT10FjP2EGe pBTlQIoSwDy6vIRWWzMwSCQ0vnTGOnpk2viQDWrSLeVK8U9/wYuMbKiDtfEGyeA2 h16KNHw7vhJsFM5ZqpkNwH5wz8tqxv3E5Vyz2sLx1DhoRYBxc6m1oLaAaUcf4tCD BoRF6wIDAQABo4IByDCCAcQwdgYIKwYBBQUHAQEEajBoMCIGCCsGAQUFBzABhhZo dHRwOi8vb2NzcC5lbXNpZ24uY29tMEIGCCsGAQUFBzAChjZodHRwOi8vcmVwb3Np dG9yeS5lbXNpZ24uY29tL2NlcnRzL1RydXN0ZWRSb290Q0FDNC5jcnQwHQYDVR0O BBYEFAvCa+AN7IwRlQ6expeb+azE5u2yMB8GA1UdIwQYMBaAFJc+yAkLKUndZ9F6 86f/rOAJwLepMHUGA1UdIARuMGwwOgYMKwYBBAGDjiEBAAMBMCowKAYIKwYBBQUH AgEWHGh0dHA6Ly9yZXBvc2l0b3J5LmVtc2lnbi5jb20wDgYMKwYBBAGDjiEBAwIB MA4GDCsGAQQBg44hAQMCAjAOBgwrBgEEAYOOIQEDAgMwOgYDVR0fBDMwMTAvoC2g K4YpaHR0cDovL2NybC5lbXNpZ24uY29tP1RydXN0ZWRSb290Q0FDNC5jcmwwMwYD VR0lBCwwKgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDBAYKKwYBBAGCNwoD DDASBgNVHRMBAf8ECDAGAQH/AgEAMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0B AQsFAAOCAQEAe5t501sGnHfYAojqdfKDGh3QLyv4pfgYwyFRwKzEfJkB8HJsSiUS n9IWXo6hJGZc/XtvIakupUtuEugdsfB1Ct+qOuQn0lp5ezmnaN2jV/m/qlBdYwap 3UCxX5a6tq6IJbCdTMs6hwiwFe3L2TiIUJjWQFumAhhoItA3I6lKSyFO9J8BxHYu X4H1lUEhFmAikK+KUM0RTtyezbQ9KDWYBGRc8BS3HImPlV/j3+VY+cV80Nl7cv/W VrZtQdisOVy4wsLWcdgBQJszh1xjhtMgQKrFQG3CmmcYWD1ZXx0sqmC6XbIDjz8F oCbijhl2rAZIoTQp0mQsenb0YNzI7kZdHA== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/emigtfc4.crl_url0000644001343500074740000000004415004136233025150 0ustar davidgdavidghttp://crl.emsign.com/?emigtfc4.crl igtf-policy-installation-bundle-1.135/src/accredited/emigtfc4.signing_policy0000644001343500074740000000045715004136233026533 0ustar davidgdavidg# EACL for eMudhra emSign CA emigtfc4 access_id_CA X509 '/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/emigtfc4.namespaces0000644001343500074740000000122315004136233025625 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)emigtfc4.namespaces # CA alias : emigtfc4 # subord_of: # subjectDN: /C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4 # hash : emigtfc4 # (generated automatically from emigtfc4.signing_policy) # TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" \ PERMIT Subject "/C=US/O=emSignGrid/.*" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" \ PERMIT Subject "/DC=com/DC=emSignGrid/.*" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" \ PERMIT Subject "/DC=org/DC=emSignGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/emigtfc4.info0000644001343500074740000000112215004136233024437 0ustar davidgdavidg# # @(#)$Id: emigtfc4.info,v 1.3 2023/08/02 18:18:44 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor emigtfc4 # alias = emigtfc4 ca_url = https://repository.emsign.com/certs/emigtfc4.crt crl_url = http://crl.emsign.com/?emigtfc4.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com requires = eMudhra-TrustedRootCAC4 status = accredited:classic version = 1.135 sha1fp.0 = 47:59:35:24:86:12:3C:6F:46:DC:69:09:BD:C6:A7:C2:46:B6:39:B1 subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5.pem0000644001343500074740000000461715004136234024303 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG4jCCBMqgAwIBAgIJALxQ77eSkVh7MA0GCSqGSIb3DQEBDAUAMEoxCzAJBgNV BAYTAlVTMRUwEwYDVQQKDAxlTXVkaHJhIEluYy4xJDAiBgNVBAMMG2VtU2lnbiBU cnVzdGVkIFJvb3QgQ0EgLSBDNTAeFw0yMzA3MTIwNjQxNTZaFw0zODA3MTIwNjQx NTZaMEoxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxlTXVkaHJhIEluYy4xJDAiBgNV BAMMG2VtU2lnbiBJc3N1aW5nIENBIElHVEYgLSBDNTCCAiIwDQYJKoZIhvcNAQEB BQADggIPADCCAgoCggIBALZ1KJngvan3pX6JxgUY9ClxQLhuoqSe/GMzeRXFr/OV +8BpStAD+kARcv0lkIcBhchCRWKpcoTLZVhWCet9QqWHTTQ4zNod/ZmCn3HWbUZn /XkLgGwEWkO8oWE/78qprwPalqYCghiXQ6LlX/M9WJVNgK9noxVSugUPhYM1TcVI EhHu9z35Q573QeF1TueaZVMvci8B+45rGl7AnarwixWkyDa2kx3trTFwYFec5ppD r8M2dsBQDa4lRchw9l6+pE/v/O/nrx8Jf4XMX/uEjqhk3I0PxKDbFdnLrEtFosbC rNCu3919mAGyZa20N7vHQTRmMTS6nNjqhtuot4RoH8AcBW9j3bELE6g7B6syntMh 9bdsM4bK1mFlShM+kPswY3GytOV+rE3tYDXIRirZg4GTqT8FzFWfUWF4muxZmYxd eHVh7/m7gTZu6ssQFt2ozBwiBDWlpX3OYxThVWJq8hYVIzomfjKGIGiRsuuvvcCW Zouu/2Za47ub2RF/rEczfkUvSZoOmOZJ9jl7JaEoBLiyslGcoarUT77m3VxNIqv6 v+C8kQwR9Z6A2iEIKTs9JZuK1PlTJVxEsBNzD8YcW9Owf2KWYTUQPI7RmFWvJUHe gSIh6OC8Nadn6sVn5PE+j0VvqKSCfoB9kiBV7cXt2scKYt8uHNTehsU7bJe6+N0J AgMBAAGjggHJMIIBxTB2BggrBgEFBQcBAQRqMGgwIgYIKwYBBQUHMAGGFmh0dHA6 Ly9vY3NwLmVtc2lnbi5jb20wQgYIKwYBBQUHMAKGNmh0dHA6Ly9yZXBvc2l0b3J5 LmVtc2lnbi5jb20vY2VydHMvVHJ1c3RlZFJvb3RDQUM1LmNydDAdBgNVHQ4EFgQU fsppBFhlAGtjKsASpg/qkEjnCD4wHwYDVR0jBBgwFoAUqK5ywkowEM6SG1mICKrS WvhckdEwdQYDVR0gBG4wbDA6BgwrBgEEAYOOIQEAAwEwKjAoBggrBgEFBQcCARYc aHR0cDovL3JlcG9zaXRvcnkuZW1zaWduLmNvbTAOBgwrBgEEAYOOIQEDAgEwDgYM KwYBBAGDjiEBAwICMA4GDCsGAQQBg44hAQMCAzA7BgNVHR8ENDAyMDCgLqAshipo dHRwOi8vY3JsLmVtc2lnbi5jb20vP1RydXN0ZWRSb290Q0FDNS5jcmwwMwYDVR0l BCwwKgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDBAYKKwYBBAGCNwoDDDAS BgNVHRMBAf8ECDAGAQH/AgEAMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQwF AAOCAgEAgx7HyuQZ4AdR5EDArtxkV36EiCn9dsBaKN31yRyJJ0qYvzVADlelu9uY pOMgyM0Z0kB/L+VJrLR3XnxDtFdYByLWd60ZI7EUIfGPJ0W5UhnptktrmnL7PYxM YG/nf0lAKYM3rTHNXqE3cGYnU8UcSJm99o1XHgH8AZn38h9dF0teSijdPFDA3F94 wiB8zwQzvRakJ0WlUXAth9M5WifTI1mEg8wInookeYiNlhTJkNV5xZR8DyoqsRMQ of6ce2NmRmXCR5nUiKmGqXUtruW+ca7Dy/YqYKextJSptDNoF5AUmUfEo3BiLnhK Yq84CAupdWM2CVhw5dxZ+Yh0c5jA2n9D23fpvv1XhX3dLiWa7yvyXObSMX9ns9/y R6DM+49rfU3jOeQ0T0yOh5V5CidJKM3oIWpIoGMP9OUfegr7z+KKvK+T22mEVDL2 qeG6H0VRYGfSggvwygDXM46Dfa7ByJWLD+HRcatgThqk6HeAN9Nka8TxQYNYBf2K t0v1nN07lpW8x7AK2stgTS4Hn27uzKOtI4arE9lkNS4Xw1LmxdPD+o3hbbHGTFIN j4I4/achwjCs7ekOYcAShCAr9UURdURbsu+hQBZFpgfsUDfmwbV2KzAZhFoJwHaM OBfbsWDUybZIACep3QdDkQZ1RtSJDftVTXtX7M9QG7iJYs1QHGA= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5.crl_url0000644001343500074740000000004415004136234025152 0ustar davidgdavidghttp://crl.emsign.com/?emigtfc5.crl igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5.signing_policy0000644001343500074740000000045715004136234026535 0ustar davidgdavidg# EACL for eMudhra emSign CA emigtfc5 access_id_CA X509 '/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5.namespaces0000644001343500074740000000122315004136234025627 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)emigtfc5.namespaces # CA alias : emigtfc5 # subord_of: # subjectDN: /C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 # hash : emigtfc5 # (generated automatically from emigtfc5.signing_policy) # TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" \ PERMIT Subject "/C=US/O=emSignGrid/.*" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" \ PERMIT Subject "/DC=com/DC=emSignGrid/.*" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" \ PERMIT Subject "/DC=org/DC=emSignGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5.info0000644001343500074740000000112215004136234024441 0ustar davidgdavidg# # @(#)$Id: emigtfc5.info,v 1.3 2023/08/02 18:18:44 pmacvsdg Exp $ # eMuhdra emSign Certifying Authority trust anchor emigtfc5 # alias = emigtfc5 ca_url = https://repository.emsign.com/certs/emigtfc5.crt crl_url = http://crl.emsign.com/?emigtfc5.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com requires = eMudhra-TrustedRootCAC5 status = accredited:classic version = 1.135 sha1fp.0 = 5D:4F:21:2A:10:FC:A2:E1:27:50:F1:63:C3:6E:69:EF:C2:74:33:36 subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5r1.pem0000644001343500074740000000462715004136234024547 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG6DCCBNCgAwIBAgIUeLDE/tb66iosMSCecSkBjV4RnnMwDQYJKoZIhvcNAQEL BQAwSjELMAkGA1UEBhMCVVMxFTATBgNVBAoMDGVNdWRocmEgSW5jLjEkMCIGA1UE AwwbZW1TaWduIFRydXN0ZWQgUm9vdCBDQSAtIEM1MB4XDTI0MDEzMTA1NTAyOVoX DTM5MDEyOTA1NTAyOVowTjELMAkGA1UEBhMCVVMxFTATBgNVBAoMDGVNdWRocmEg SW5jLjEoMCYGA1UEAwwfZW1TaWduIElzc3VpbmcgQ0EgSUdURiAtIEM1IC0gMTCC AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALZ1KJngvan3pX6JxgUY9Clx QLhuoqSe/GMzeRXFr/OV+8BpStAD+kARcv0lkIcBhchCRWKpcoTLZVhWCet9QqWH TTQ4zNod/ZmCn3HWbUZn/XkLgGwEWkO8oWE/78qprwPalqYCghiXQ6LlX/M9WJVN gK9noxVSugUPhYM1TcVIEhHu9z35Q573QeF1TueaZVMvci8B+45rGl7AnarwixWk yDa2kx3trTFwYFec5ppDr8M2dsBQDa4lRchw9l6+pE/v/O/nrx8Jf4XMX/uEjqhk 3I0PxKDbFdnLrEtFosbCrNCu3919mAGyZa20N7vHQTRmMTS6nNjqhtuot4RoH8Ac BW9j3bELE6g7B6syntMh9bdsM4bK1mFlShM+kPswY3GytOV+rE3tYDXIRirZg4GT qT8FzFWfUWF4muxZmYxdeHVh7/m7gTZu6ssQFt2ozBwiBDWlpX3OYxThVWJq8hYV IzomfjKGIGiRsuuvvcCWZouu/2Za47ub2RF/rEczfkUvSZoOmOZJ9jl7JaEoBLiy slGcoarUT77m3VxNIqv6v+C8kQwR9Z6A2iEIKTs9JZuK1PlTJVxEsBNzD8YcW9Ow f2KWYTUQPI7RmFWvJUHegSIh6OC8Nadn6sVn5PE+j0VvqKSCfoB9kiBV7cXt2scK Yt8uHNTehsU7bJe6+N0JAgMBAAGjggHAMIIBvDASBgNVHRMBAf8ECDAGAQH/AgEA MA4GA1UdDwEB/wQEAwIBBjByBggrBgEFBQcBAQRmMGQwKgYIKwYBBQUHMAGGHmh0 dHA6Ly9vY3NwLnByaXZhdGUuZW1zaWduLmNvbTA2BggrBgEFBQcwAoYqaHR0cDov L3JlcG9zaXRvcnkuZW1zaWduLmNvbS9jZXJ0cy80UjUuY3J0MDYGA1UdHwQvMC0w K6ApoCeGJWh0dHA6Ly9jcmwucHJpdmF0ZS5lbXNpZ24uY29tPzRSNS5jcmwwdQYD VR0gBG4wbDA6BgwrBgEEAYOOIQEAAwEwKjAoBggrBgEFBQcCARYcaHR0cDovL3Jl cG9zaXRvcnkuZW1zaWduLmNvbTAOBgwrBgEEAYOOIQEDAgEwDgYMKwYBBAGDjiEB AwICMA4GDCsGAQQBg44hAQMCAzAfBgNVHSMEGDAWgBSornLCSjAQzpIbWYgIqtJa +FyR0TAdBgNVHQ4EFgQUfsppBFhlAGtjKsASpg/qkEjnCD4wMwYDVR0lBCwwKgYI KwYBBQUHAwEGCCsGAQUFBwMCBgorBgEEAYI3CgMMBggrBgEFBQcDBDANBgkqhkiG 9w0BAQsFAAOCAgEAMq0+TuE6XlwUrD9aYGi+bw8dRe4G2jApx1wdzqbNa6Nmx2BZ whNE4dvAyTqbtJLrMMCUZVlYXKFp3J620TREClUvRjkDsZNGF82LZjOmRWkKA7RM 79Kw8sTiz6tYulN/JQMTMPJhaAh8eogM5lkQNaP0HZZ367jw31KJRuWHwABEXla8 SRH7+mSqeVXhy8i7Rua+N0pmPswZsn1uhigzFm+LjBfE5ZjugoBGEZSJ4i36JHSf OdhP4HsLGzRqAEUknTL6bgt24RfjgRkAEciFKNqm+VCn38JQyjiA2PplflNblHQF AjSHrFUl8sI2I+zfjrBnflfBR/5cPCTo3VpnH4AzH4sHSRoqIg5zRWVpz+vrwViY 5CD4rE9Omsaxzmg2eqN4MaitcCl7bEm4KtflefuEs6INtz90SgYD/L6RpBndOmS/ QWVhSBZdrPFqdfxOq91TiuexUOZnAAwaz8oL4OHrYMrPNsM89QvcQyf+InQBfPfa Ml4X9AmUHGTsYjZJKrYS2jYAD8BOEgEZYwxG9sfuwqGIBl5q23tOF8pkNPDnJNOR Yx4JBdkbV23R/VfIO91IDLgrFuSfNCNcy0lO88OmxsVzrROXC5+GPUlVHh/m+JPV V3mkoLZEv7F+8TPmsFO1Pro6uiBztLtPjuuqpBy2lqbWY/8/ioe6g617i3g= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5r1.crl_url0000644001343500074740000000004715004136234025420 0ustar davidgdavidghttp://crl.private.emsign.com/?4C7.crl igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5r1.signing_policy0000644001343500074740000000047115004136234026774 0ustar davidgdavidg# EACL for eMudhra emSign CA emigtfc5r1 access_id_CA X509 '/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5r1.namespaces0000644001343500074740000000124515004136234026076 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)emigtfc5r1.namespaces # CA alias : emigtfc5 # subord_of: # subjectDN: /C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1 # hash : emigtfc5 # (generated automatically from emigtfc5.signing_policy) # TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" \ PERMIT Subject "/C=US/O=emSignGrid/.*" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" \ PERMIT Subject "/DC=com/DC=emSignGrid/.*" TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" \ PERMIT Subject "/DC=org/DC=emSignGrid/.*" igtf-policy-installation-bundle-1.135/src/accredited/emigtfc5r1.info0000644001343500074740000000105415004136234024710 0ustar davidgdavidg# # @(#)emigtfc5r1.info # eMuhdra emSign Certifying Authority trust anchor emigtfc5r1 # alias = emigtfc5r1 ca_url = https://repository.emsign.com/certs/4C7.crt crl_url = http://crl.private.emsign.com/?4C7.crl policy_url = https://repository.emsign.com/ url = https://emudhra.com/products/digital-certificates email = support@emsign.com requires = eMudhra-TrustedRootCAC5 status = accredited:classic version = 1.135 sha1fp.0 = 60:F6:D4:6D:D5:9B:8A:F9:6D:2D:BA:C2:EF:44:6A:FA:62:60:E0:B5 subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" igtf-policy-installation-bundle-1.135/src/accredited/seegrid-ca-2013.pem0000644001343500074740000000253315004136236025163 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDxzCCAq+gAwIBAgIBADANBgkqhkiG9w0BAQUFADBKMRMwEQYKCZImiZPyLGQB GRYDT1JHMRgwFgYKCZImiZPyLGQBGRYIU0VFLUdSSUQxGTAXBgNVBAMTEFNFRS1H UklEIENBIDIwMTMwHhcNMTMxMTE0MTQ0MjE3WhcNMzMxMTE0MTQ0MjE3WjBKMRMw EQYKCZImiZPyLGQBGRYDT1JHMRgwFgYKCZImiZPyLGQBGRYIU0VFLUdSSUQxGTAX BgNVBAMTEFNFRS1HUklEIENBIDIwMTMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQDvzBEGy/G8ByFv/dk0+wl+YD4O3hnMKdIOWwbShJgV5uxT5CamByCF tt2XMIec4eIfV19CP/St+xCi/YBUZUxTQPsvzuBpIkLz1UhZgTIV8KocZAnitCQh U0Eyet/3jhr0rhOz1OPTdvEdZ4urNqnWPNNLg+dxs+Z88Wc7ILFtRwNf48l6oh3T nmwBNBFpV372iYGd3urs4L0CWRxS9KliXVHv+qDig6ruresEdY1G49WnaAAkgU7N W+725dZziSWlflRyYIjgzmwUwXB8ESaEtyCH8MXEcem+1ulrrFk2LWcuUvVi8Do+ pVdXfrBx4RCq/dYV1d0SeFhimVG08SyLAgMBAAGjgbcwgbQwDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLTbgExuumOjXH7fknD2mC0a HHCAMHIGA1UdIwRrMGmAFLTbgExuumOjXH7fknD2mC0aHHCAoU6kTDBKMRMwEQYK CZImiZPyLGQBGRYDT1JHMRgwFgYKCZImiZPyLGQBGRYIU0VFLUdSSUQxGTAXBgNV BAMTEFNFRS1HUklEIENBIDIwMTOCAQAwDQYJKoZIhvcNAQEFBQADggEBAO7roIhF RcOJeecENMmOFT77Z8DfPhjay6qfjyeG7RzbeHe32EhBSartgK0qGGYK5RMiN1+0 gaXm4L1wMlgeFT8OVvP+7Qx48i6UVx3OE1kZCvE3VjECRvvo6qQpwzLNK3QL82RP pclX+LlsMawhq+g3UE+6QALqzBdi3UtD78NfZ6iUmAWlfh315stP1iBFvIp4E8o7 FQbXZY9XqT3OL2XsG//dnjeeXlgPBqPMz01GkOebsGJb8ijwfEFZLCH8MbUJM7Ub bs0XrWC4z4OX7QXlOqiDD/4lKlVrSNFrxdIbm2LGDsmC7LXlzFKXKfLwfh1Z9ow9 h2uhyD420XAeLvQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/accredited/seegrid-ca-2013.crl_url0000644001343500074740000000006415004136236026041 0ustar davidgdavidghttp://crl.hellasgrid.gr/seegrid-ca-2013/crl-v2.pem igtf-policy-installation-bundle-1.135/src/accredited/seegrid-ca-2013.signing_policy0000644001343500074740000000026715004136236027421 0ustar davidgdavidg# EACL SEEGRID-CA-2013 CA access_id_CA X509 '/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013' pos_rights globus CA:sign cond_subjects globus '"/DC=ORG/DC=SEE-GRID/*" "/DC=EU/DC=EGI/*"' igtf-policy-installation-bundle-1.135/src/accredited/seegrid-ca-2013.namespaces0000644001343500074740000000100015004136236026505 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)772dbd1c.namespaces # CA alias : seegrid-ca-2013 # subord_of: # subjectDN: /DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013 # hash : 772dbd1c # (generated automatically from 772dbd1c.signing_policy) # TO Issuer "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" \ PERMIT Subject "/DC=ORG/DC=SEE-GRID/.*" TO Issuer "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" \ PERMIT Subject "/DC=EU/DC=EGI/.*" igtf-policy-installation-bundle-1.135/src/accredited/seegrid-ca-2013.info0000644001343500074740000000073515004136236025337 0ustar davidgdavidg# # @(#)$Id: 772dbd1c.info,v 1.1 2013/11/14 14:03:24 pmacvsdg Exp $ # # SEEGRID-CA-2013 # alias = seegrid-ca-2013 url = http://see-grid-ca.hellasgrid.gr ca_url = http://crl.hellasgrid.gr/seegrid-ca-2013/cert.pem crl_url = http://crl.hellasgrid.gr/seegrid-ca-2013/crl-v2.pem email = see-grid-ca@hellasgrid.gr status = accredited:classic version = 1.135 sha1fp.0 = DD:8C:D9:6E:18:AB:53:92:40:15:BF:DA:EB:F9:6F:31:EB:4F:69:66 subjectdn = "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" igtf-policy-installation-bundle-1.135/src/experimental/0000755001343500074740000000000015004136226022474 5ustar davidgdavidgigtf-policy-installation-bundle-1.135/src/experimental/InCommon-RSA-IGTF-Server-CA-2.pem0000644001343500074740000000433015004136201027745 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGXDCCBESgAwIBAgIQAmP0alwn0BsPcPUF+n2YDzANBgkqhkiG9w0BAQwFADCB iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMjIx MTE2MDAwMDAwWhcNMzIxMTE1MjM1OTU5WjBJMQswCQYDVQQGEwJVUzESMBAGA1UE ChMJSW50ZXJuZXQyMSYwJAYDVQQDEx1JbkNvbW1vbiBSU0EgSUdURiBTZXJ2ZXIg Q0EgMjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAJ+MrpOQspEBOcXV uiS3Zq+g3tsfMWgmdQ9Yz/PvbmozYuwcFsNbTOZY3ItdoPgPcrjTlmTcGiiVnokE pPV11dnw2ERebF+z00ElVtOcOLwEaH4XeCcpaL7ZIo10GbuXLIZROJlHkicxgRIS Cg0QKPzEscSlbG6QZ+G8vxGDiETPWl6Y/+P3KQxA36QkKpAmmMmE9k+HOfXn1U97 suRVD8o7JAIezPeWsIlzWmtPnwEv3/mi/klksluvTbtDS6Oa0wgU4Ma1t9Cq9Kvt Y0uPwGn+TfwPD3mAQgO2X8DQKpqcWVkqxQFzYGLswyDZBH2/QfK1GDM3Y5vJZdE4 0SA1wS/xR7+6w831R5304c5TaS2Et0FgR/du0CVUQpL5F3YcFaZ+4aCLLpyMDRPY WDnw+Z51Fy6e/j3/ZqcrAlwF2j56/pdyAfFtpMVSC+lppWv8XYtebXR078j/c0Kn MAZKqLnwHjpe7CK8Ty+aUJwomX4zhsi1etaSaUgDlhjH9lAB5wIDAQABo4IBfjCC AXowHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYDVR0OBBYEFOVR aEudc5n9+nRxQDeuLLVfKIq5MA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAG AQH/AgEAMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAwBgNVHSAEKTAn MA0GCysGAQQBsjEBAgJnMAwGCiqGSIb3TAUCAgEwCAYGZ4EMAQICMFAGA1UdHwRJ MEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FD ZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBxBggrBgEFBQcBAQRlMGMwOgYIKwYB BQUHMAKGLmh0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBQUFD QS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9vY3NwLnVzZXJ0cnVzdC5jb20wDQYJ KoZIhvcNAQEMBQADggIBAGNlt0JR15UCbP2Mgvsg83k2qkHLI+B88E2voi1QOmp0 VgkHlaIeYemzaC/7e9AUdI4S8IRUA35llHhqOWaF1XsFGMXIq0wqPiAjzI3rn4uS Dsk3ESpeabuyc6tHWDpDsh8DAeHjlirYgyNL9eNhj/yYXzz+5ikkhH3ww7m+5mS5 7s8GClsLIyUAy7AAEp7YJcc2iBhn8Zpl/jpgRTbMW+a0EClFpFiAJaaCEOxQpTju AC9FlsOsx4cWZWym7lS6eTfIcgHwbfOtWRFQRUQjQpJf5uL0sDpz2Tp8wiATh8At KM+gU1TkS/NS6+91MshhTVgSbLew9Qw2hiMrlrffh29soA2wAfFvJK0cKA1uKxxT ar1My5eY585YyhJF8ERziAK8qFasH832kLbtrSWb/d+Gac22bFLMkQTifz0BrCCb HQNnV63K77ROiS1548PG4cVC8TIyIPnweSXDsN8deUi//knnVXqztrYqx2gjN7T5 HbZIFvIu8uFkCmrFRgtcnFge0fvIVZJNaEoSk/w9emL57P8wrvQusXJXfV+QlLyA 6OuFSAHp5uZrcrrC6MRIjhkP1Sju1fITcOOrvO6o0Qhn2zFP3c7hKa/mb2xqZqdG Tz6M+8yrA7Zg1aECMYMWeW2DqNTuv+5VmP2NyupLSkF27lrIeqDF82xrTZWW1iTP -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/experimental/InCommon-RSA-IGTF-Server-CA-2.crl_url0000644001343500074740000000006615004136201030630 0ustar davidgdavidghttp://crl.usertrust.com/InCommonRSAIGTFServerCA2.crl igtf-policy-installation-bundle-1.135/src/experimental/InCommon-RSA-IGTF-Server-CA-2.signing_policy0000644001343500074740000000023415004136201032200 0ustar davidgdavidgaccess_id_CA X509 '/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=incommon/*"' igtf-policy-installation-bundle-1.135/src/experimental/InCommon-RSA-IGTF-Server-CA-2.info0000644001343500074740000000077015004136201030123 0ustar davidgdavidgalias = InCommon-RSA-IGTF-Server-CA-2 url = https://www.incommon.org/cert/ policy_url = https://www.incommon.org/cert/repository/ ca_url = http://crt.usertrust.com/InCommonRSAIGTFServerCA2.crt crl_url = http://crl.usertrust.com/InCommonRSAIGTFServerCA2.crl requires = USERTrustRSACertificationAuthority email = admin@incommon.org status = experimental version = 1.135 sha1fp.0 = BC:74:A1:A0:E1:2D:6B:48:3A:FB:E0:B4:E7:DC:F1:60:04:22:C0:FA subjectdn = "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2" igtf-policy-installation-bundle-1.135/src/experimental/cilogon-openid.pem0000644001343500074740000000255715004136226026116 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID1zCCAr+gAwIBAgIJAPOQiThGpSOaMA0GCSqGSIb3DQEBCwUAMGsxEzARBgoJ kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBPcGVuSUQg Q0EgMTAeFw0xMDA2MDQyMDIwNDRaFw0zMDA2MDQyMDIwNDRaMGsxEzARBgoJkiaJ k/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQGEwJV UzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBPcGVuSUQgQ0Eg MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKaWHxXKkfgmJG31u0/I b9uzHuwt9Ed+vdH4jtmgHj5nOgdJ14VF46B26u4wNJ7XhRjxb1xSXhhC3u3okfje pas49RNVdEel4P2sWuQ9Rc6x+Tuo0/IFSTh5GDEizW7z9GYLcjMtadSPHngv0Pai xFnjadxTg+Qr3vAoM52xPJEQjsGIcUb5ZBtYMpHWJTA9HCSsLM0i96/jzkMdxinx lUD+qWWTdLppT/6neWfZC16cqRK5fhgx2drO/2oDcjQuBVszh92uRpLLvxTzF2Yg mqsgd2ufkQB8BJ6ggs61KUm1myL2j+ZnLKdcUi/mYTV6/3gva35qF9mf2iUn12eV chcCAwEAAaN+MHwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFDXHbBFKB030gz1Uvu2/BDuuX8OsMB8GA1UdIwQYMBaAFDXHbBFKB030 gz1Uvu2/BDuuX8OsMBkGA1UdEQQSMBCBDmNhQGNpbG9nb24ub3JnMA0GCSqGSIb3 DQEBCwUAA4IBAQAmCfwcuxUMqxiB/OR1eiSrNNceDcV/RolpzdZlsMSl5A2S6RTq uRv8u6TyltuikiMoLcvoq+msEh/lqBazdiJ3saR3A78VcOq04xv8Je1T9C9ArDOx 3fzQMxtDjU3egFqFhnLlFsHF68o8U8IMla4OjJti0Er7WtbSiXad5a7v4vx4s0R/ LekmAg7TADxmIi8mBNo3xYvVj/QnVTNNfqZndbpCGjJcG3ncn08mr9dMNDgFXGZH c4xJzYtqr6xwet2QUdGBuvZfZbet/JckJpE07F/voor3U4Q5O+8Kw/2nNLnL2nAF vKVxWgw8sBb+32mycVB1tLIG3r4UsVkxQIvu -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/experimental/cilogon-openid.crl_url0000644001343500074740000000014215004136226026763 0ustar davidgdavidghttp://crl-cilogon.ncsa-security.net/cilogon-openid.crl http://crl.cilogon.org/cilogon-openid.crl igtf-policy-installation-bundle-1.135/src/experimental/cilogon-openid.signing_policy0000644001343500074740000000024615004136226030343 0ustar davidgdavidgaccess_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/C=US/*"' igtf-policy-installation-bundle-1.135/src/experimental/cilogon-openid.namespaces0000644001343500074740000000061615004136226027446 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3d863bc5.namespaces # CA alias : cilogon-openid # subord_of: # subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1 # hash : 3d863bc5 # TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" \ PERMIT Subject "/DC=org/DC=cilogon/C=US/.*" igtf-policy-installation-bundle-1.135/src/experimental/cilogon-openid.info0000644001343500074740000000063315004136226026261 0ustar davidgdavidgalias = cilogon-openid url = http://ca.cilogon.org/ ca_url = https://cilogon.org/cilogon-openid.pem crl_url = http://crl-cilogon.ncsa-security.net/cilogon-openid.crl;http://crl.cilogon.org/cilogon-openid.crl email = ca@cilogon.org status = experimental version = 1.135 sha1fp.0 = 3F:31:DC:10:B9:AB:BB:C0:BD:68:63:F2:74:44:7D:FB:60:72:73:86 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" igtf-policy-installation-bundle-1.135/src/unaccredited/0000755001343500074740000000000015004136235022431 5ustar davidgdavidgigtf-policy-installation-bundle-1.135/src/unaccredited/UKPathfinder1.pem0000644001343500074740000000250615004136221025537 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDuDCCAqCgAwIBAgIEEAAAADANBgkqhkiG9w0BAQsFADBKMQswCQYDVQQGEwJV SzERMA8GA1UECgwIZVNjaWVuY2UxEjAQBgNVBAsMCUF1dGhvcml0eTEUMBIGA1UE AwwLUGF0aGZpbmRlcjEwHhcNMTEwNjE4MTMwMDAwWhcNMjcxMTMwMDkwMDAwWjBK MQswCQYDVQQGEwJVSzERMA8GA1UECgwIZVNjaWVuY2UxEjAQBgNVBAsMCUF1dGhv cml0eTEUMBIGA1UEAwwLUGF0aGZpbmRlcjEwggEiMA0GCSqGSIb3DQEBAQUAA4IB DwAwggEKAoIBAQDTpDkaIKoNca7ihFbDNKPvHZjB1bsRLWeshjyLC51fnvtAfMoR qdeaD1xM8blUJ/Su5wlYombDDwLFpko+Od9v8aip20dMYkPYuhf4xC0oqsrrvPWN nzkVDarBJC5rW7smCmkljUwBEB9kWHUr3ARlMmxYgo1H73K+jUV+cNudVaumciDA y7nZDeD0lxXcEKdkbTveOO8//vXRw+d0oLZ13BmQLaxEWYXDf078aWexTRIl4y9Q f8y5bpIcJ5jFBnsGRG0uVMZCAnfDhFoiW1CFiQafP+mkurbawH34vlFE+I0iNZXn fG/akrPALTsQ0uLah0vINfDA+IAnzloOhEJtAgMBAAGjgaUwgaIwDwYDVR0TAQH/ BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwPwYDVR0fBDgwNjA0oDKgMIYuaHR0cDov L2NybC5jYS5uZ3MuYWMudWsvY3JsL3BhdGhmaW5kZXIuY3JsLmRlcjAfBgNVHSME GDAWgBTbhmUBWTpABknH2phQun4/gzTuMDAdBgNVHQ4EFgQU24ZlAVk6QAZJx9qY ULp+P4M07jAwDQYJKoZIhvcNAQELBQADggEBAD2+slbgaLO3e+Mln+U2Ewe/In3A a1+tj61RG0iXOjjlvIua0XW+t/enSd906k6Lzm4YK+eO0BTRSsPgaf2PNgx7B2HA kYWA85Qzkqx5MMSahgtzBmCXP7s1y+L1sUVIt67MVNBKtYWaBy9fcjpqQmPqcGyt gtwHzB0Os2ioXtB81/qhefrtkznRBAiO4Ik0cL4cG8255zQas5T0zhY2mt+qPDRn BpjJNJfPx3f1XX0dmE6GQxlDEjG+2OR1YiPbm+rweEDN4AQYO0mR1gv6SvydQriz nspRsK4g2J1hcJkddiHgZPPuXWVKJkjeqeVR+XIjn/VJfTYSuor6+Yui0tI= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/unaccredited/UKPathfinder1.crl_url0000644001343500074740000000005715004136221026417 0ustar davidgdavidghttp://crl.ca.ngs.ac.uk/crl/pathfinder.crl.der igtf-policy-installation-bundle-1.135/src/unaccredited/UKPathfinder1.signing_policy0000644001343500074740000000040715004136221027771 0ustar davidgdavidg# EACL UK Pathfinder AAAI CA 1 # @(#)$Id$ # access_id_CA X509 '/C=UK/O=eScience/OU=Authority/CN=Pathfinder1' pos_rights globus CA:sign cond_subjects globus '"/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" "/DC=uk/DC=ac/DC=pathfinder/*"' igtf-policy-installation-bundle-1.135/src/unaccredited/UKPathfinder1.namespaces0000644001343500074740000000065715004136221027102 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)hfinder1.namespaces # CA alias : UKPathfinder1 # subord_of: # subjectDN: /C=UK/O=eScience/OU=Authority/CN=Pathfinder1 # hash : # (generated automatically from Pathfinder1.signing_policy) # TO Issuer "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" \ PERMIT Subject "/DC=uk/DC=ac/DC=pathfinder/.*" igtf-policy-installation-bundle-1.135/src/unaccredited/UKPathfinder1.info0000644001343500074740000000061515004136221025710 0ustar davidgdavidg# # @(#)$Id$ # Information for Pathfinder AAAI Project CA 1 # alias = UKPathfinder1 #requires = url = http://www.grid-support.ac.uk/ca/ crl_url = http://crl.ca.ngs.ac.uk/crl/pathfinder.crl.der email = support@grid-support.ac.uk status = unaccredited version = 1.135 sha1fp.0 = EA:03:D7:90:9A:82:6D:01:56:AA:C0:82:1C:7C:4C:1E:DA:89:FD:4A subjectdn = "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" igtf-policy-installation-bundle-1.135/src/unaccredited/egee-ne-benelux-tutorial.pem0000644001343500074740000000224415004136230027737 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDQDCCAqmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBhjETMBEGCgmSJomT8ixk ARkTA29yZzEXMBUGCgmSJomT8ixkARkTB2VnZWUtbmUxGjAYBgNVBAsTEVRyYWlu aW5nIFNlcnZpY2VzMTowOAYDVQQDEzFXb3J0aGxlc3MgRUdFRSBOb3J0aGVybiBh bmQgQmVuZWx1eCBUdXRvcmlhbCBDQSAxMB4XDTA3MDgwMTE2MDU0NloXDTI3MDgw MTE2MDU0NlowgYYxEzARBgoJkiaJk/IsZAEZEwNvcmcxFzAVBgoJkiaJk/IsZAEZ EwdlZ2VlLW5lMRowGAYDVQQLExFUcmFpbmluZyBTZXJ2aWNlczE6MDgGA1UEAxMx V29ydGhsZXNzIEVHRUUgTm9ydGhlcm4gYW5kIEJlbmVsdXggVHV0b3JpYWwgQ0Eg MTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAy6IYOiXh+vA8qJ+dGt73n19z kn6Ib0Adg9CGnt2p5l69IItk4u4Ke4aqJT8TpbMdzkqmZS1IsDb9PynzHbbYoBol 7Hd+3DOMh3Vs+DgZNww2ptepmWqOSTfB6kpE8lWquJOSxnUyte8UqUE+ayFoS8Fz r2nlgsdcpKEsP2XQC3ECAwEAAaOBuzCBuDAPBgNVHRMBAf8EBTADAQH/MBoGA1Ud EQQTMBGBD2NhQGR1dGNoZ3JpZC5ubDAOBgNVHQ8BAf8EBAMCAQYwGQYDVR0gBBIw EDAOBgwrBgEEAdFCBAIFAQAwHQYDVR0OBBYEFHt8OOGUbHiUM5r1IMjzBJ2AR0tJ MD8GCWCGSAGG+EIBDQQyFjBXb3J0aGxlc3MgRUdFRS1ORSBUdXRvcmlhbCBDQSAo ZXh0ZW5kZWQgZWRpdGlvbikwDQYJKoZIhvcNAQEFBQADgYEAVp9YAloz5fzlFMW2 jHrHH3ot/wWKasVboaZiRWfANUo6cvnkEpNUB3iR8okHXO7MJ+qOXJMb32z43v/W M/YarCZk72p3KaV5mgVazBNbJyvTDskFy+2RWMlUo6TtChadOyQD3ZKFSYsOyTZ4 hV3LUBCciAeYYB/SdWuj1yuP+z0= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/unaccredited/egee-ne-benelux-tutorial.crl_url0000644001343500074740000000005115004136230030612 0ustar davidgdavidghttp://ca.dutchgrid.nl/egee-ne/cacrl.pem igtf-policy-installation-bundle-1.135/src/unaccredited/egee-ne-benelux-tutorial.signing_policy0000644001343500074740000000105515004136230032172 0ustar davidgdavidg# $Id: 8c13c962.signing_policy,v 1.1 2007/08/02 14:30:31 pmacvsdg Exp $ # EACL Worthless EGEE Northern and Benelux Tutorial CA 1 # hash: 8c13c962 access_id_CA X509 '/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" "/DC=org/DC=egee-ne/O=Training Services/OU=users/*" "/DC=org/DC=dutchgrid/O=Training Services/OU=users/*"' igtf-policy-installation-bundle-1.135/src/unaccredited/egee-ne-benelux-tutorial.namespaces0000644001343500074740000000136715004136230031302 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)8c13c962.namespaces # CA alias : egee-ne-benelux-tutorial # subord_of: # subjectDN: /DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1 # hash : 8c13c962.signing_policy # (generated automatically from 8c13c962.signing_policy) # TO Issuer "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" \ PERMIT Subject "/DC=org/DC=egee-ne/O=Training Services/OU=users/.*" TO Issuer "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" \ PERMIT Subject "/DC=org/DC=dutchgrid/O=Training Services/OU=users/.*" igtf-policy-installation-bundle-1.135/src/unaccredited/egee-ne-benelux-tutorial.info0000644001343500074740000000102115004136230030101 0ustar davidgdavidg# # @(#)$Id: 8c13c962.info,v 1.2 2011/09/18 13:19:54 pmacvsdg Exp $ # Information for the Worthless EGEE Northern and Benelux Tutorial CA 1 alias = egee-ne-benelux-tutorial crl_url = http://ca.dutchgrid.nl/egee-ne/cacrl.pem url = http://ca.dutchgrid.nl/egee-ne/ ca_url = http://ca.dutchgrid.nl/egee-ne/cacert.pem status = unaccredited version = 1.135 sha1fp.0 = 20:BC:72:7B:46:28:F2:6C:6E:54:D2:98:E2:2E:83:AC:1B:14:4C:A0 subjectdn = "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" igtf-policy-installation-bundle-1.135/src/unaccredited/nl-e-infra-zero.pem0000644001343500074740000000430415004136235026042 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGTTCCBDWgAwIBAgIJANYl1hyYVHOTMA0GCSqGSIb3DQEBBQUAMIGDMRIwEAYK CZImiZPyLGQBGRYCbmwxFzAVBgoJkiaJk/IsZAEZFgdlLWluZnJhMSIwIAYDVQQL ExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMTAwLgYDVQQDEydXb3J0aGxlc3Mg TkwgZS1JbmZyYSBaZXJvIFR1dG9yaWFsIENBIDEwHhcNMTMxMTAzMTc1NzU0WhcN NDMxMDI3MTc1NzU0WjCBgzESMBAGCgmSJomT8ixkARkWAm5sMRcwFQYKCZImiZPy LGQBGRYHZS1pbmZyYTEiMCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGll czEwMC4GA1UEAxMnV29ydGhsZXNzIE5MIGUtSW5mcmEgWmVybyBUdXRvcmlhbCBD QSAxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwy9JmhZnLvSe0mo1 KWgkaBkGRY0nVtVmvpdt8DAtdr6zZJ+FCImdI38f9viuFqRPRxOtLfvxPnMz0v79 TSRO2QeGdbSIiuMTB2jLBw5yxw9dUuaiUCnlTdMR+VitAk87eUCzeZm7OJQ+mPg1 RB3LSSa5/LQGQtWAfkFw9gUtblUc2jZMnqojNMkmy6w4U7U7ebj7JpD/jiy4mbj4 A9xVqTp1KujzL1ZuTFc7ad3tMKvjfkgQA/wt+iZ4EN0TELzz0PXjqB+AxcFhSsHr X17dGi2mOV8SETnfJLDXGor8nVtSxzsbk09KSduKHS7fTE/7q3EumwCN+J7ZnQij Co5tx0b+k5zUPcJ9Jpu5fvKLU196MQKHzsr7DTZPxeQz4N8WRbsaLa3WHBoLlzM/ aA8s1FFkH2dGkHKW3JuEdIp7l0wS4T3hdUP6FJdf0Zx0R7VYYv5DYIgUwVd6ykca QRO8SDhDZx7ZELYYwOh68R9HnlzMftKDPV48epQykuusn8pstMZHp+aajUg8VOug tK8N1pGJvA4J6+hu3xIpqFmb1VN5L18S07PueHE0+fGdLSB2VcgMhigsjJZsvz/w FyEDLrFr6Uf2eARYhQGWQoIJcF20nOhv06v1AysVkbbgfJmjck93MNB8SEmUba5L hbLx9FWPGZe7xeMqHuDrIhkck9ECAwEAAaOBwTCBvjAPBgNVHRMBAf8EBTADAQH/ MA4GA1UdDwEB/wQEAwIBBjAZBgNVHSAEEjAQMA4GDCsGAQQB0UIEAgYBADAdBgNV HQ4EFgQUjhg/d+FqFoNyXxJ1LHppxFKAvUQwRQYJYIZIAYb4QgENBDgWNldvcnRo bGVzcyBOTCBlLUluZnJhIFplcm8gVHV0b3JpYWwgQ0EgMSAoMjAxMyBlZGl0aW9u KTAaBgNVHREEEzARgQ9jYUBkdXRjaGdyaWQubmwwDQYJKoZIhvcNAQEFBQADggIB AAJTajR3KoDWUMrqrCLgIGYw/vRuqo/PrT419bDz8IcTBNTFog9wFZX8Yz4x/A0Q rQZk/HI3YCfcS9f4Wv/vhoNFWzNoH4ae6B5Z+nJ6vNLgOAEB37q0Wm/bpBzho5Xk Jdpf+cjyg7Z7AqpwoZkuM+TQqxJtYIB/wsUgqOm70ifjwRse4UR5nqm15xQOEyI1 Y//Pi7IjpaBFOyckm0KQ9U4P+QsThFr9w5y/bqEz9wrqW0MA611sCCQ/hkj1ytCk Z0Jn0fntHR7YRUEbQSV+sLUaDKOxgDriS3u7sW1ByWjacRORXzsYhbOYsnaOd8wN ZVBdpOl1xndLarykc9R6cHqBMGQz6GBU6m0gHyZr8Trqp6d8kuKtv0BcB7e/4tdQ 9Q4pnz04LF+pPHD2aI5/WkRjmXtFmlmJ4KUpEcjfvNmiXZe6DnPZ+o42VNsnLc81 /hEeKDiNf2KEjzdvmady2JNkxCnCAyB/tpVlM8WAH5evXwHCH2ABQBeIyOCNbTAZ qTr7vyW7WP3Ori8ofGwwqlxUfmNOQWFcNkICp8jjTLoA07StTISRsV7riCldTL7B P610d5H6a1dEyhRp7zch9+xaBLYNlnAdB2Nzg7iOG9ARe8sv6ReEbDa0t3GIXyg9 FBVYE+xqrbWu/GVHuy7/L23VTOoxmaNKO3iPrsDIzdpZ -----END CERTIFICATE----- igtf-policy-installation-bundle-1.135/src/unaccredited/nl-e-infra-zero.crl_url0000644001343500074740000000006115004136235026717 0ustar davidgdavidghttp://ca.dutchgrid.nl/nl-e-infra-zero/cacrl.pem igtf-policy-installation-bundle-1.135/src/unaccredited/nl-e-infra-zero.signing_policy0000644001343500074740000000063015004136235030274 0ustar davidgdavidg# EACL Worthless NL e-Infra Zero Tutorial CA 1 2013 edition # hash: 338a3561.singning_policy access_id_CA X509 '/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" "/DC=nl/DC=e-infra/O=Training Services/OU=users/*"' igtf-policy-installation-bundle-1.135/src/unaccredited/nl-e-infra-zero.namespaces0000644001343500074740000000104415004136235027376 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)338a3561.namespaces # CA alias : nl-e-infra-zero # subord_of: # subjectDN: /DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1 # hash : 338a3561 # (generated automatically from 338a3561.signing_policy) # TO Issuer "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" \ PERMIT Subject "/DC=nl/DC=e-infra/O=Training Services/OU=users/.*" igtf-policy-installation-bundle-1.135/src/unaccredited/nl-e-infra-zero.info0000644001343500074740000000073415004136235026217 0ustar davidgdavidg# # @(#)$Id# # Information for the Worthless NL e-Infra Zero Tutorial CA 1 alias = nl-e-infra-zero crl_url = http://ca.dutchgrid.nl/nl-e-infra-zero/cacrl.pem url = http://ca.dutchgrid.nl/nl-e-infra-zero/ ca_url = http://ca.dutchgrid.nl/nl-e-infra-zero/cacert.pem status = unaccredited version = 1.135 sha1fp.0 = 43:20:7D:DF:E9:DD:F0:71:86:CA:AB:DC:97:44:F8:96:25:ED:6C:66 subjectdn = "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" igtf-policy-installation-bundle-1.135/policy-igtf-classic.info0000644001343500074740000002373315004136236023743 0ustar davidgdavidg# @(#)policy-igtf-classic.info - IGTF classic authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-classic version = 1.135 requires = ResearchandEducationTrustECCRootCA = 1.135, \ BG-ACAD-CA = 1.135, \ CERN-Root-2 = 1.135, \ GEANTeScienceSSLECCCA4 = 1.135, \ HARICAGEANTTLSRSA1 = 1.135, \ KEK = 1.135, \ PolishGrid-2019 = 1.135, \ DigiCertGridCA-1G2-Classic-2015 = 1.135, \ UNAMgrid-ca = 1.135, \ GEANTeScienceSSLCA4 = 1.135, \ NorduGrid-2015 = 1.135, \ IRAN-GRID-GCG-G2 = 1.135, \ SiGNET-CA = 1.135, \ HARICAOVTLSECC = 1.135, \ DigiCertAssuredIDRootCA-Root = 1.135, \ TRGrid2024 = 1.135, \ DigiCertGridTrustCAG2-Classic = 1.135, \ CESNET-CA-Root = 1.135, \ ANSPGridCA2 = 1.135, \ seegrid-ca-2013 = 1.135, \ HARICATLSECCRootCA2021 = 1.135, \ DCAROOT-G1 = 1.135, \ ResearchandEducationTrustRSARootCA = 1.135, \ IHEP-2013 = 1.135, \ DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 = 1.135, \ emigtfc5 = 1.135, \ RomanianGRID = 1.135, \ KISTIv3 = 1.135, \ GEANTTCSRETrustRSARootCA5 = 1.135, \ UKeScienceRoot-2007 = 1.135, \ emSignSSLCAG1 = 1.135, \ HellasGrid-CA-2016 = 1.135, \ DFN-GridGermany-Root = 1.135, \ CERN-GridCA = 1.135, \ emigtfc4 = 1.135, \ RDIG = 1.135, \ REUNA-ca = 1.135, \ emSignRootCAG1 = 1.135, \ HellenicAcademicandResearchInstitutionsECCRootCA2015 = 1.135, \ HellenicAcademicandResearchInstitutionsRootCA2015 = 1.135, \ HARICATLSRSARootCA2021 = 1.135, \ InCommon-RSA-IGTF-Server-CA-3 = 1.135, \ PKIUNAMgrid = 1.135, \ emigtfc5r1 = 1.135, \ ASGCCA-2007 = 1.135, \ eMudhra-TrustedRootCAC4 = 1.135, \ ArmeSFo = 1.135, \ DZeScience = 1.135, \ USERTrustRSACertificationAuthority = 1.135, \ MaGrid = 1.135, \ NIKHEF = 1.135, \ emSignClass1CAG1 = 1.135, \ PK-Grid-2007 = 1.135, \ HARICAOVTLSRSA = 1.135, \ MREN-CA = 1.135, \ USERTrustECCCertificationAuthority = 1.135, \ HARICAGEANTTLSECC1 = 1.135, \ DigiCertGridRootCA-Root = 1.135, \ TRGrid = 1.135, \ GEANTTCSRETrustECCRootCA5 = 1.135, \ SRCE = 1.135, \ IGCA2 = 1.135, \ eMudhra-TrustedRootCAC5 = 1.135, \ DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 = 1.135, \ CESNET-CA-4 = 1.135, \ GridCanada = 1.135, \ SlovakGrid = 1.135, \ UGRID-G2 = 1.135, \ UKeScienceCA-2B = 1.135 subjectdn = "/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA", \ "/DC=bg/DC=acad/CN=BG.ACAD CA", \ "/C=ch/O=CERN/CN=CERN Root Certification Authority 2", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1", \ "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority", \ "/C=PL/O=GRID/CN=Polish Grid CA 2019", \ "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2", \ "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4", \ "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015", \ "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA", \ "/C=SI/O=SiGNET/CN=SiGNET CA", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC", \ "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA", \ "/C=TR/O=TRGrid/CN=TR-Grid CA 2024", \ "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2", \ "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root", \ "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2", \ "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021", \ "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA", \ "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA", \ "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority", \ "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1", \ "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5", \ "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA", \ "/C=KR/O=KISTI/CN=KISTI Certification Authority", \ "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5", \ "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root", \ "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1", \ "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016", \ "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01", \ "/DC=ch/DC=cern/CN=CERN Grid Certification Authority", \ "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4", \ "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA", \ "/C=CL/O=REUNACA/CN=REUNA Certification Authority", \ "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1", \ "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015", \ "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021", \ "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3", \ "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid", \ "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1", \ "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury", \ "/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4", \ "/C=AM/O=ArmeSFo/CN=ArmeSFo CA", \ "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA", \ "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority", \ "/C=MA/O=MaGrid/CN=MaGrid CA", \ "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth", \ "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1", \ "/C=PK/O=NCP/CN=PK-GRID-CA", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA", \ "/DC=me/DC=ac/DC=MREN/CN=MREN-CA", \ "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1", \ "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA", \ "/C=TR/O=TRGrid/CN=TR-Grid CA", \ "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5", \ "/C=HR/O=edu/OU=srce/CN=SRCE CA", \ "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2", \ "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5", \ "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1", \ "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4", \ "/C=CA/O=Grid/CN=Grid Canada Certificate Authority", \ "/C=SK/O=SlovakGrid/CN=SlovakGrid CA", \ "/DC=org/DC=ugrid/CN=UGRID CA G2", \ "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" obsoletes = CyGrid-old, \ CNRS-DataGrid, \ CESNET-old, \ SwissSign-Silver-Root, \ SWITCH-Personal2, \ SWITCH-CA2, \ SWITCH-Server2, \ KISTI, \ Russia, \ SWITCH-Server, \ SWITCH-Personal, \ LIP, \ GridCanada-old, \ UKeScience, \ HellasGrid, \ INFN, \ Spain, \ SiGNET, \ CERN, \ SWITCH-Personal-2006, \ SWITCH-Server-2006, \ ASGCCA, \ UKeScienceRoot, \ UKeScienceCA, \ PK-Grid, \ EstonianGrid, \ DFN-GridGermany-User, \ DFN-GridGermany-Server, \ BEGrid, \ SWITCH-Personal-2007, \ SwissSign-Root, \ SWITCH, \ SwissSign-Bronze, \ SwissSign-Silver, \ SWITCH-Server-2007, \ RMKI, \ CNRS, \ CNRS-Projets, \ CNRS-Grid-FR, \ NGO-Netrust, \ CESNET, \ Grid-Ireland, \ UKeScienceCA-2007, \ TACC-Classic, \ TACC-Root, \ IUCC, \ AIST, \ JUnet-CA, \ SWITCHgrid-Root, \ APAC, \ DOEGrids, \ ESnet, \ IHEP, \ SEE-GRID, \ PRAGMA-UCSD, \ SWITCH-QuoVadis-Grid-ICA, \ ULAGrid-CA-2008, \ HIAST, \ NCHC, \ NIIF, \ CERN-Root, \ CERN-TCA, \ NAREGI, \ IRAN-GRID-G2, \ CALG, \ BalticGrid, \ DigiCertGridCA-1G2-Classic, \ SDG, \ NorduGrid, \ BrGrid, \ HellasGrid-Root, \ HellasGrid-CA-2006, \ UniandesCA, \ INFN-CA-2006, \ NECTEC, \ BEGrid2008, \ UKeScienceCA-2A, \ UTN-USERFirst-Hardware, \ TERENA-eScience-SSL-CA, \ AAACertificateServices, \ UTNAAAClient, \ TERENAeSciencePersonalCA, \ UTN-USERTrust-RSA-CA, \ TERENA-eScience-SSL-CA-2, \ TERENAeSciencePersonalCA2, \ KISTI-2007, \ LACGridCA, \ pkIRISGrid, \ UGRID, \ IGCA, \ QuoVadis-Grid-ICA, \ MD-Grid, \ EG-GRID, \ IRAN-GRID, \ HKU, \ CyGrid, \ cilogon-osg, \ AustrianGrid, \ CESNET-CA-3, \ AddTrust-External-CA-Root, \ DarkMatterAssuredCA, \ DarkMatterSecureCA, \ PolishGrid, \ DarkMatterPrivateRootCAG4, \ DarkMatterIGTFCA, \ QuoVadis-Root-CA1, \ INFN-CA-2015, \ MYIFAM, \ MD-Grid-CA-T, \ CNRS2, \ CNRS2-Projets, \ CNRS2-Grid-FR, \ DigiCertGridTrustCA-Classic, \ DigiCertGridCA-1-Classic, \ NIIF-Root-CA-2, \ GermanGrid, \ AEGIS, \ KENETCA-ICA-2015, \ KENETROOTCA, \ SDG-G2, \ CNIC, \ DigitalTrustAssuredCAG3-runbytheissuer, \ DigitalTrustAssuredCAG4-runbytheissuer, \ DigitalTrustSecureCAG3-runbytheissuer, \ DigitalTrustSecureCAG4-runbytheissuer, \ UNLPGrid, \ COMODO-RSA-CA, \ InCommon-IGTF-Server-CA, \ QuoVadis-Grid-ICA-G2, \ QuoVadis-Root-CA2G3, \ QuoVadis-Root-CA2, \ QuoVadis-Root-CA3G3, \ DigitalTrustPrivateRootCAG4, \ DigitalTrustIGTFCA, \ LIPCA, \ BYGCA, \ TSU-GE, \ HKU-CA-2, \ TERENA-eScience-SSL-CA-3, \ MARGI, \ ANSPGrid, \ AC-GRID-FR, \ AC-GRID-FR-Personnels, \ AC-GRID-FR-Robots, \ AC-GRID-FR-Services igtf-policy-installation-bundle-1.135/policy-igtf-discontinued.info0000644001343500074740000000026015004136236025000 0ustar davidgdavidg# @(#)policy-igtf-discontinued.info - IGTF discontinued authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-discontinued version = 1.135 requires = subjectdn = igtf-policy-installation-bundle-1.135/policy-igtf-experimental.info0000644001343500074740000000055115004136236025010 0ustar davidgdavidg# @(#)policy-igtf-experimental.info - IGTF experimental authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-experimental version = 1.135 requires = cilogon-openid = 1.135, \ InCommon-RSA-IGTF-Server-CA-2 = 1.135 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1", \ "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2" igtf-policy-installation-bundle-1.135/policy-igtf-iota.info0000644001343500074740000000062515004136236023251 0ustar davidgdavidg# @(#)policy-igtf-iota.info - IGTF iota authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-iota version = 1.135 requires = cilogon-basic = 1.135, \ RCauth-Pilot-ICA-G1 = 1.135 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1", \ "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" obsoletes = CERN-LCG-IOTA-CA igtf-policy-installation-bundle-1.135/policy-igtf-mics.info0000644001343500074740000000174715004136236023256 0ustar davidgdavidg# @(#)policy-igtf-mics.info - IGTF mics authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-mics version = 1.135 requires = GEANTTCSAuthenticationRSACA4B = 1.135, \ GEANTeSciencePersonalCA4 = 1.135, \ GEANTeSciencePersonalECCCA4 = 1.135, \ GEANTTCSAuthenticationRSACA5 = 1.135, \ GEANTTCSAuthenticationECCCA4B = 1.135, \ cilogon-silver = 1.135, \ GEANTTCSAuthenticationECCCA5 = 1.135 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4", \ "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5", \ "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B", \ "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1", \ "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" obsoletes = TACC-MICS, \ NCSA-mics, \ TERENAeSciencePersonalCA3, \ HPCI igtf-policy-installation-bundle-1.135/policy-igtf-slcs.info0000644001343500074740000000061015004136236023253 0ustar davidgdavidg# @(#)policy-igtf-slcs.info - IGTF slcs authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-slcs version = 1.135 requires = subjectdn = obsoletes = SWITCHslcs, \ ncsa-gridshib-ca, \ SWITCHslcs2011, \ NCSA-tfca, \ NICS-MyProxy, \ NCSA-slcs, \ FNAL-SLCS, \ DFN-SLCS, \ NCSA-tfca-2013, \ NERSC-SLCS, \ NCSA-slcs-2013, \ PSC-Myproxy-CA igtf-policy-installation-bundle-1.135/policy-igtf-unaccredited.info0000644001343500074740000000100315004136236024736 0ustar davidgdavidg# @(#)policy-igtf-unaccredited.info - IGTF unaccredited authorities # Generated Tuesday, 29 Apr, 2025 alias = policy-igtf-unaccredited version = 1.135 requires = UKPathfinder1 = 1.135, \ egee-ne-benelux-tutorial = 1.135, \ nl-e-infra-zero = 1.135 subjectdn = "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1", \ "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1", \ "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" igtf-policy-installation-bundle-1.135/policy-igtf.info0000644001343500074740000001373515004136236022325 0ustar davidgdavidg# @(#)policy-igtf.info - all IGTF accredited authorities # Generated Tuesday, 29 Apr, 2025 version = 1.135 requires = ResearchandEducationTrustECCRootCA = 1.135, \ BG-ACAD-CA = 1.135, \ CERN-Root-2 = 1.135, \ GEANTeScienceSSLECCCA4 = 1.135, \ HARICAGEANTTLSRSA1 = 1.135, \ KEK = 1.135, \ PolishGrid-2019 = 1.135, \ DigiCertGridCA-1G2-Classic-2015 = 1.135, \ UNAMgrid-ca = 1.135, \ GEANTeScienceSSLCA4 = 1.135, \ NorduGrid-2015 = 1.135, \ IRAN-GRID-GCG-G2 = 1.135, \ SiGNET-CA = 1.135, \ HARICAOVTLSECC = 1.135, \ DigiCertAssuredIDRootCA-Root = 1.135, \ TRGrid2024 = 1.135, \ DigiCertGridTrustCAG2-Classic = 1.135, \ CESNET-CA-Root = 1.135, \ ANSPGridCA2 = 1.135, \ seegrid-ca-2013 = 1.135, \ HARICATLSECCRootCA2021 = 1.135, \ DCAROOT-G1 = 1.135, \ ResearchandEducationTrustRSARootCA = 1.135, \ IHEP-2013 = 1.135, \ DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 = 1.135, \ emigtfc5 = 1.135, \ RomanianGRID = 1.135, \ KISTIv3 = 1.135, \ GEANTTCSRETrustRSARootCA5 = 1.135, \ UKeScienceRoot-2007 = 1.135, \ emSignSSLCAG1 = 1.135, \ HellasGrid-CA-2016 = 1.135, \ DFN-GridGermany-Root = 1.135, \ CERN-GridCA = 1.135, \ emigtfc4 = 1.135, \ RDIG = 1.135, \ REUNA-ca = 1.135, \ emSignRootCAG1 = 1.135, \ HellenicAcademicandResearchInstitutionsECCRootCA2015 = 1.135, \ HellenicAcademicandResearchInstitutionsRootCA2015 = 1.135, \ HARICATLSRSARootCA2021 = 1.135, \ InCommon-RSA-IGTF-Server-CA-3 = 1.135, \ PKIUNAMgrid = 1.135, \ emigtfc5r1 = 1.135, \ ASGCCA-2007 = 1.135, \ eMudhra-TrustedRootCAC4 = 1.135, \ ArmeSFo = 1.135, \ DZeScience = 1.135, \ USERTrustRSACertificationAuthority = 1.135, \ MaGrid = 1.135, \ NIKHEF = 1.135, \ emSignClass1CAG1 = 1.135, \ PK-Grid-2007 = 1.135, \ HARICAOVTLSRSA = 1.135, \ MREN-CA = 1.135, \ USERTrustECCCertificationAuthority = 1.135, \ HARICAGEANTTLSECC1 = 1.135, \ DigiCertGridRootCA-Root = 1.135, \ TRGrid = 1.135, \ GEANTTCSRETrustECCRootCA5 = 1.135, \ SRCE = 1.135, \ IGCA2 = 1.135, \ eMudhra-TrustedRootCAC5 = 1.135, \ DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 = 1.135, \ CESNET-CA-4 = 1.135, \ GridCanada = 1.135, \ SlovakGrid = 1.135, \ UGRID-G2 = 1.135, \ UKeScienceCA-2B = 1.135GEANTTCSAuthenticationRSACA4B = 1.135, \ GEANTeSciencePersonalCA4 = 1.135, \ GEANTeSciencePersonalECCCA4 = 1.135, \ GEANTTCSAuthenticationRSACA5 = 1.135, \ GEANTTCSAuthenticationECCCA4B = 1.135, \ cilogon-silver = 1.135, \ GEANTTCSAuthenticationECCCA5 = 1.135cilogon-basic = 1.135, \ RCauth-Pilot-ICA-G1 = 1.135 obsoletes = CyGrid-old, \ CNRS-DataGrid, \ CESNET-old, \ SwissSign-Silver-Root, \ SWITCH-Personal2, \ SWITCH-CA2, \ SWITCH-Server2, \ KISTI, \ Russia, \ SWITCH-Server, \ SWITCH-Personal, \ LIP, \ GridCanada-old, \ UKeScience, \ HellasGrid, \ INFN, \ Spain, \ SiGNET, \ CERN, \ SWITCH-Personal-2006, \ SWITCH-Server-2006, \ ASGCCA, \ UKeScienceRoot, \ UKeScienceCA, \ PK-Grid, \ EstonianGrid, \ DFN-GridGermany-User, \ DFN-GridGermany-Server, \ BEGrid, \ SWITCH-Personal-2007, \ SwissSign-Root, \ SWITCH, \ SwissSign-Bronze, \ SwissSign-Silver, \ SWITCH-Server-2007, \ RMKI, \ CNRS, \ CNRS-Projets, \ CNRS-Grid-FR, \ NGO-Netrust, \ CESNET, \ Grid-Ireland, \ UKeScienceCA-2007, \ TACC-Classic, \ TACC-Root, \ IUCC, \ AIST, \ JUnet-CA, \ SWITCHgrid-Root, \ APAC, \ DOEGrids, \ ESnet, \ IHEP, \ SEE-GRID, \ PRAGMA-UCSD, \ SWITCH-QuoVadis-Grid-ICA, \ ULAGrid-CA-2008, \ HIAST, \ NCHC, \ NIIF, \ CERN-Root, \ CERN-TCA, \ NAREGI, \ IRAN-GRID-G2, \ CALG, \ BalticGrid, \ DigiCertGridCA-1G2-Classic, \ SDG, \ NorduGrid, \ BrGrid, \ HellasGrid-Root, \ HellasGrid-CA-2006, \ UniandesCA, \ INFN-CA-2006, \ NECTEC, \ BEGrid2008, \ UKeScienceCA-2A, \ UTN-USERFirst-Hardware, \ TERENA-eScience-SSL-CA, \ AAACertificateServices, \ UTNAAAClient, \ TERENAeSciencePersonalCA, \ UTN-USERTrust-RSA-CA, \ TERENA-eScience-SSL-CA-2, \ TERENAeSciencePersonalCA2, \ KISTI-2007, \ LACGridCA, \ pkIRISGrid, \ UGRID, \ IGCA, \ QuoVadis-Grid-ICA, \ MD-Grid, \ EG-GRID, \ IRAN-GRID, \ HKU, \ CyGrid, \ cilogon-osg, \ AustrianGrid, \ CESNET-CA-3, \ AddTrust-External-CA-Root, \ DarkMatterAssuredCA, \ DarkMatterSecureCA, \ PolishGrid, \ DarkMatterPrivateRootCAG4, \ DarkMatterIGTFCA, \ QuoVadis-Root-CA1, \ INFN-CA-2015, \ MYIFAM, \ MD-Grid-CA-T, \ CNRS2, \ CNRS2-Projets, \ CNRS2-Grid-FR, \ DigiCertGridTrustCA-Classic, \ DigiCertGridCA-1-Classic, \ NIIF-Root-CA-2, \ GermanGrid, \ AEGIS, \ KENETCA-ICA-2015, \ KENETROOTCA, \ SDG-G2, \ CNIC, \ DigitalTrustAssuredCAG3-runbytheissuer, \ DigitalTrustAssuredCAG4-runbytheissuer, \ DigitalTrustSecureCAG3-runbytheissuer, \ DigitalTrustSecureCAG4-runbytheissuer, \ UNLPGrid, \ COMODO-RSA-CA, \ InCommon-IGTF-Server-CA, \ QuoVadis-Grid-ICA-G2, \ QuoVadis-Root-CA2G3, \ QuoVadis-Root-CA2, \ QuoVadis-Root-CA3G3, \ DigitalTrustPrivateRootCAG4, \ DigitalTrustIGTFCA, \ LIPCA, \ BYGCA, \ TSU-GE, \ HKU-CA-2, \ TERENA-eScience-SSL-CA-3, \ MARGI, \ ANSPGrid, \ AC-GRID-FR, \ AC-GRID-FR-Personnels, \ AC-GRID-FR-Robots, \ AC-GRID-FR-Services, \ SWITCHslcs, \ ncsa-gridshib-ca, \ SWITCHslcs2011, \ NCSA-tfca, \ NICS-MyProxy, \ NCSA-slcs, \ FNAL-SLCS, \ DFN-SLCS, \ NCSA-tfca-2013, \ NERSC-SLCS, \ NCSA-slcs-2013, \ PSC-Myproxy-CA, \ TACC-MICS, \ NCSA-mics, \ TERENAeSciencePersonalCA3, \ HPCI, \ CERN-LCG-IOTA-CAigtf-policy-installation-bundle-1.135/Makefile.tpl0000644001343500074740000017725415004136237021470 0ustar davidgdavidg# # @(#)$Id: Makefile.tpl.cin,v 1.1 2005/10/08 18:34:20 pmacvsdg Exp $ # # This makefile is auto-generated and mofified by ./configure # prefix=@PREFIX@ install=@INSTALL@ mkdir=@MKDIR@ ln=@LN@ prep: $(prefix) $(prefix):; @echo Creating target directory $(prefix) $(mkdir) -p $(prefix) install: @INSTALLTARGETS@ # # parts autogenerated by the PMA build script follow # # Created: Tue Apr 29 11:48:47 2025 GMT # install-classic: ANSPGridCA2 ASGCCA-2007 ArmeSFo BG-ACAD-CA CERN-GridCA CERN-Root-2 CESNET-CA-4 CESNET-CA-Root DCAROOT-G1 DFN-GridGermany-Root DZeScience DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 DigiCertAssuredIDRootCA-Root DigiCertGridCA-1G2-Classic-2015 DigiCertGridRootCA-Root DigiCertGridTrustCAG2-Classic GEANTTCSRETrustECCRootCA5 GEANTTCSRETrustRSARootCA5 GEANTeScienceSSLCA4 GEANTeScienceSSLECCCA4 GridCanada HARICAGEANTTLSECC1 HARICAGEANTTLSRSA1 HARICAOVTLSECC HARICAOVTLSRSA HARICATLSECCRootCA2021 HARICATLSRSARootCA2021 HellasGrid-CA-2016 HellenicAcademicandResearchInstitutionsECCRootCA2015 HellenicAcademicandResearchInstitutionsRootCA2015 IGCA2 IHEP-2013 IRAN-GRID-GCG-G2 InCommon-RSA-IGTF-Server-CA-3 KEK KISTIv3 MREN-CA MaGrid NIKHEF NorduGrid-2015 PK-Grid-2007 PKIUNAMgrid PolishGrid-2019 RDIG REUNA-ca ResearchandEducationTrustECCRootCA ResearchandEducationTrustRSARootCA RomanianGRID SRCE SiGNET-CA SlovakGrid TRGrid TRGrid2024 UGRID-G2 UKeScienceCA-2B UKeScienceRoot-2007 UNAMgrid-ca USERTrustECCCertificationAuthority USERTrustRSACertificationAuthority eMudhra-TrustedRootCAC4 eMudhra-TrustedRootCAC5 emSignClass1CAG1 emSignRootCAG1 emSignSSLCAG1 emigtfc4 emigtfc5 emigtfc5r1 seegrid-ca-2013 @echo Installing CAs for profile accredited:classic $(install) policy-igtf-classic.info $(prefix)/ install-slcs: @echo Installing CAs for profile accredited:slcs $(install) policy-igtf-slcs.info $(prefix)/ install-mics: GEANTTCSAuthenticationECCCA4B GEANTTCSAuthenticationECCCA5 GEANTTCSAuthenticationRSACA4B GEANTTCSAuthenticationRSACA5 GEANTeSciencePersonalCA4 GEANTeSciencePersonalECCCA4 cilogon-silver @echo Installing CAs for profile accredited:mics $(install) policy-igtf-mics.info $(prefix)/ install-iota: RCauth-Pilot-ICA-G1 cilogon-basic @echo Installing CAs for profile accredited:iota $(install) policy-igtf-iota.info $(prefix)/ install-discontinued: @echo Installing CAs for profile discontinued $(install) policy-igtf-discontinued.info $(prefix)/ install-experimental: InCommon-RSA-IGTF-Server-CA-2 cilogon-openid @echo Installing CAs for profile experimental $(install) policy-igtf-experimental.info $(prefix)/ install-unaccredited: UKPathfinder1 egee-ne-benelux-tutorial nl-e-infra-zero @echo Installing CAs for profile unaccredited $(install) policy-igtf-unaccredited.info $(prefix)/ install-all-accredited: install-classic install-slcs install-mics install-iota @echo Installing all IGTF accredited CAs under ANY profile $(install) policy-igtf.info $(prefix)/ # # single CA installations # ANSPGridCA2: prep $(install) src/accredited/ANSPGridCA2.crl_url $(prefix)/ $(install) src/accredited/ANSPGridCA2.info $(prefix)/ $(install) src/accredited/ANSPGridCA2.namespaces $(prefix)/ $(install) src/accredited/ANSPGridCA2.pem $(prefix)/ $(install) src/accredited/ANSPGridCA2.signing_policy $(prefix)/ $(ln) -s ANSPGridCA2.pem $(prefix)/3d40580f.0 $(ln) -s ANSPGridCA2.pem $(prefix)/dcaa370f.0 $(ln) -s ANSPGridCA2.signing_policy $(prefix)/3d40580f.signing_policy $(ln) -s ANSPGridCA2.signing_policy $(prefix)/dcaa370f.signing_policy $(ln) -s ANSPGridCA2.namespaces $(prefix)/3d40580f.namespaces $(ln) -s ANSPGridCA2.namespaces $(prefix)/dcaa370f.namespaces ASGCCA-2007: prep $(install) src/accredited/ASGCCA-2007.crl_url $(prefix)/ $(install) src/accredited/ASGCCA-2007.info $(prefix)/ $(install) src/accredited/ASGCCA-2007.namespaces $(prefix)/ $(install) src/accredited/ASGCCA-2007.pem $(prefix)/ $(install) src/accredited/ASGCCA-2007.signing_policy $(prefix)/ $(ln) -s ASGCCA-2007.pem $(prefix)/9cd75e87.0 $(ln) -s ASGCCA-2007.pem $(prefix)/b459ca48.0 $(ln) -s ASGCCA-2007.signing_policy $(prefix)/9cd75e87.signing_policy $(ln) -s ASGCCA-2007.signing_policy $(prefix)/b459ca48.signing_policy $(ln) -s ASGCCA-2007.namespaces $(prefix)/9cd75e87.namespaces $(ln) -s ASGCCA-2007.namespaces $(prefix)/b459ca48.namespaces ArmeSFo: prep $(install) src/accredited/ArmeSFo.crl_url $(prefix)/ $(install) src/accredited/ArmeSFo.info $(prefix)/ $(install) src/accredited/ArmeSFo.namespaces $(prefix)/ $(install) src/accredited/ArmeSFo.pem $(prefix)/ $(install) src/accredited/ArmeSFo.signing_policy $(prefix)/ $(ln) -s ArmeSFo.pem $(prefix)/d0c2a341.0 $(ln) -s ArmeSFo.pem $(prefix)/3fb4d8a6.0 $(ln) -s ArmeSFo.signing_policy $(prefix)/d0c2a341.signing_policy $(ln) -s ArmeSFo.signing_policy $(prefix)/3fb4d8a6.signing_policy $(ln) -s ArmeSFo.namespaces $(prefix)/d0c2a341.namespaces $(ln) -s ArmeSFo.namespaces $(prefix)/3fb4d8a6.namespaces BG-ACAD-CA: prep $(install) src/accredited/BG-ACAD-CA.crl_url $(prefix)/ $(install) src/accredited/BG-ACAD-CA.info $(prefix)/ $(install) src/accredited/BG-ACAD-CA.namespaces $(prefix)/ $(install) src/accredited/BG-ACAD-CA.pem $(prefix)/ $(install) src/accredited/BG-ACAD-CA.signing_policy $(prefix)/ $(ln) -s BG-ACAD-CA.pem $(prefix)/2418a3f3.0 $(ln) -s BG-ACAD-CA.pem $(prefix)/13ba0088.0 $(ln) -s BG-ACAD-CA.signing_policy $(prefix)/2418a3f3.signing_policy $(ln) -s BG-ACAD-CA.signing_policy $(prefix)/13ba0088.signing_policy $(ln) -s BG-ACAD-CA.namespaces $(prefix)/2418a3f3.namespaces $(ln) -s BG-ACAD-CA.namespaces $(prefix)/13ba0088.namespaces CERN-GridCA: prep $(install) src/accredited/CERN-GridCA.crl_url $(prefix)/ $(install) src/accredited/CERN-GridCA.info $(prefix)/ $(install) src/accredited/CERN-GridCA.pem $(prefix)/ $(install) src/accredited/CERN-GridCA.signing_policy $(prefix)/ $(ln) -s CERN-GridCA.pem $(prefix)/4339b4bc.0 $(ln) -s CERN-GridCA.pem $(prefix)/5168735f.0 $(ln) -s CERN-GridCA.signing_policy $(prefix)/4339b4bc.signing_policy $(ln) -s CERN-GridCA.signing_policy $(prefix)/5168735f.signing_policy CERN-Root-2: prep $(install) src/accredited/CERN-Root-2.crl_url $(prefix)/ $(install) src/accredited/CERN-Root-2.info $(prefix)/ $(install) src/accredited/CERN-Root-2.namespaces $(prefix)/ $(install) src/accredited/CERN-Root-2.pem $(prefix)/ $(install) src/accredited/CERN-Root-2.signing_policy $(prefix)/ $(ln) -s CERN-Root-2.pem $(prefix)/b4278411.0 $(ln) -s CERN-Root-2.pem $(prefix)/c2a48ab6.0 $(ln) -s CERN-Root-2.signing_policy $(prefix)/b4278411.signing_policy $(ln) -s CERN-Root-2.signing_policy $(prefix)/c2a48ab6.signing_policy $(ln) -s CERN-Root-2.namespaces $(prefix)/b4278411.namespaces $(ln) -s CERN-Root-2.namespaces $(prefix)/c2a48ab6.namespaces CESNET-CA-4: prep $(install) src/accredited/CESNET-CA-4.crl_url $(prefix)/ $(install) src/accredited/CESNET-CA-4.info $(prefix)/ $(install) src/accredited/CESNET-CA-4.namespaces $(prefix)/ $(install) src/accredited/CESNET-CA-4.pem $(prefix)/ $(install) src/accredited/CESNET-CA-4.signing_policy $(prefix)/ $(ln) -s CESNET-CA-4.pem $(prefix)/9c979c2b.0 $(ln) -s CESNET-CA-4.pem $(prefix)/84c78b97.0 $(ln) -s CESNET-CA-4.signing_policy $(prefix)/9c979c2b.signing_policy $(ln) -s CESNET-CA-4.signing_policy $(prefix)/84c78b97.signing_policy $(ln) -s CESNET-CA-4.namespaces $(prefix)/9c979c2b.namespaces $(ln) -s CESNET-CA-4.namespaces $(prefix)/84c78b97.namespaces CESNET-CA-Root: prep $(install) src/accredited/CESNET-CA-Root.crl_url $(prefix)/ $(install) src/accredited/CESNET-CA-Root.info $(prefix)/ $(install) src/accredited/CESNET-CA-Root.namespaces $(prefix)/ $(install) src/accredited/CESNET-CA-Root.pem $(prefix)/ $(install) src/accredited/CESNET-CA-Root.signing_policy $(prefix)/ $(ln) -s CESNET-CA-Root.pem $(prefix)/edca0fc0.0 $(ln) -s CESNET-CA-Root.pem $(prefix)/f4401b90.0 $(ln) -s CESNET-CA-Root.signing_policy $(prefix)/edca0fc0.signing_policy $(ln) -s CESNET-CA-Root.signing_policy $(prefix)/f4401b90.signing_policy $(ln) -s CESNET-CA-Root.namespaces $(prefix)/edca0fc0.namespaces $(ln) -s CESNET-CA-Root.namespaces $(prefix)/f4401b90.namespaces DCAROOT-G1: prep $(install) src/accredited/DCAROOT-G1.crl_url $(prefix)/ $(install) src/accredited/DCAROOT-G1.info $(prefix)/ $(install) src/accredited/DCAROOT-G1.namespaces $(prefix)/ $(install) src/accredited/DCAROOT-G1.pem $(prefix)/ $(install) src/accredited/DCAROOT-G1.signing_policy $(prefix)/ $(ln) -s DCAROOT-G1.pem $(prefix)/728fa56d.0 $(ln) -s DCAROOT-G1.pem $(prefix)/87250dfa.0 $(ln) -s DCAROOT-G1.signing_policy $(prefix)/728fa56d.signing_policy $(ln) -s DCAROOT-G1.signing_policy $(prefix)/87250dfa.signing_policy $(ln) -s DCAROOT-G1.namespaces $(prefix)/728fa56d.namespaces $(ln) -s DCAROOT-G1.namespaces $(prefix)/87250dfa.namespaces DFN-GridGermany-Root: prep $(install) src/accredited/DFN-GridGermany-Root.crl_url $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.info $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.namespaces $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.pem $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.signing_policy $(prefix)/ $(ln) -s DFN-GridGermany-Root.pem $(prefix)/1149214e.0 $(ln) -s DFN-GridGermany-Root.pem $(prefix)/30ffc224.0 $(ln) -s DFN-GridGermany-Root.signing_policy $(prefix)/1149214e.signing_policy $(ln) -s DFN-GridGermany-Root.signing_policy $(prefix)/30ffc224.signing_policy $(ln) -s DFN-GridGermany-Root.namespaces $(prefix)/1149214e.namespaces $(ln) -s DFN-GridGermany-Root.namespaces $(prefix)/30ffc224.namespaces DZeScience: prep $(install) src/accredited/DZeScience.crl_url $(prefix)/ $(install) src/accredited/DZeScience.info $(prefix)/ $(install) src/accredited/DZeScience.namespaces $(prefix)/ $(install) src/accredited/DZeScience.pem $(prefix)/ $(install) src/accredited/DZeScience.signing_policy $(prefix)/ $(ln) -s DZeScience.pem $(prefix)/0a49430a.0 $(ln) -s DZeScience.pem $(prefix)/fdf90b95.0 $(ln) -s DZeScience.signing_policy $(prefix)/0a49430a.signing_policy $(ln) -s DZeScience.signing_policy $(prefix)/fdf90b95.signing_policy $(ln) -s DZeScience.namespaces $(prefix)/0a49430a.namespaces $(ln) -s DZeScience.namespaces $(prefix)/fdf90b95.namespaces DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1: prep $(install) src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.crl_url $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.info $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.namespaces $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.pem $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.signing_policy $(prefix)/ $(ln) -s DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.pem $(prefix)/9f434240.0 $(ln) -s DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.pem $(prefix)/1daf2f3a.0 $(ln) -s DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.signing_policy $(prefix)/9f434240.signing_policy $(ln) -s DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.signing_policy $(prefix)/1daf2f3a.signing_policy $(ln) -s DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.namespaces $(prefix)/9f434240.namespaces $(ln) -s DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.namespaces $(prefix)/1daf2f3a.namespaces DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1: prep $(install) src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.crl_url $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.info $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.namespaces $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.pem $(prefix)/ $(install) src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.signing_policy $(prefix)/ $(ln) -s DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.pem $(prefix)/48fbeed0.0 $(ln) -s DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.pem $(prefix)/cea3f3be.0 $(ln) -s DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.signing_policy $(prefix)/48fbeed0.signing_policy $(ln) -s DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.signing_policy $(prefix)/cea3f3be.signing_policy $(ln) -s DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.namespaces $(prefix)/48fbeed0.namespaces $(ln) -s DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.namespaces $(prefix)/cea3f3be.namespaces DigiCertAssuredIDRootCA-Root: prep $(install) src/accredited/DigiCertAssuredIDRootCA-Root.crl_url $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.info $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.namespaces $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.pem $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.signing_policy $(prefix)/ $(ln) -s DigiCertAssuredIDRootCA-Root.pem $(prefix)/69105f4f.0 $(ln) -s DigiCertAssuredIDRootCA-Root.pem $(prefix)/b1159c4c.0 $(ln) -s DigiCertAssuredIDRootCA-Root.signing_policy $(prefix)/69105f4f.signing_policy $(ln) -s DigiCertAssuredIDRootCA-Root.signing_policy $(prefix)/b1159c4c.signing_policy $(ln) -s DigiCertAssuredIDRootCA-Root.namespaces $(prefix)/69105f4f.namespaces $(ln) -s DigiCertAssuredIDRootCA-Root.namespaces $(prefix)/b1159c4c.namespaces DigiCertGridCA-1G2-Classic-2015: prep $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.info $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.pem $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.signing_policy $(prefix)/ $(ln) -s DigiCertGridCA-1G2-Classic-2015.pem $(prefix)/8dd53007.0 $(ln) -s DigiCertGridCA-1G2-Classic-2015.pem $(prefix)/62c4a178.0 $(ln) -s DigiCertGridCA-1G2-Classic-2015.signing_policy $(prefix)/8dd53007.signing_policy $(ln) -s DigiCertGridCA-1G2-Classic-2015.signing_policy $(prefix)/62c4a178.signing_policy $(ln) -s DigiCertGridCA-1G2-Classic-2015.namespaces $(prefix)/8dd53007.namespaces $(ln) -s DigiCertGridCA-1G2-Classic-2015.namespaces $(prefix)/62c4a178.namespaces DigiCertGridRootCA-Root: prep $(install) src/accredited/DigiCertGridRootCA-Root.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.info $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.pem $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.signing_policy $(prefix)/ $(ln) -s DigiCertGridRootCA-Root.pem $(prefix)/2694e4f2.0 $(ln) -s DigiCertGridRootCA-Root.pem $(prefix)/74a04bb6.0 $(ln) -s DigiCertGridRootCA-Root.signing_policy $(prefix)/2694e4f2.signing_policy $(ln) -s DigiCertGridRootCA-Root.signing_policy $(prefix)/74a04bb6.signing_policy $(ln) -s DigiCertGridRootCA-Root.namespaces $(prefix)/2694e4f2.namespaces $(ln) -s DigiCertGridRootCA-Root.namespaces $(prefix)/74a04bb6.namespaces DigiCertGridTrustCAG2-Classic: prep $(install) src/accredited/DigiCertGridTrustCAG2-Classic.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.info $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.pem $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.signing_policy $(prefix)/ $(ln) -s DigiCertGridTrustCAG2-Classic.pem $(prefix)/5d9ea26d.0 $(ln) -s DigiCertGridTrustCAG2-Classic.pem $(prefix)/bd43b60c.0 $(ln) -s DigiCertGridTrustCAG2-Classic.signing_policy $(prefix)/5d9ea26d.signing_policy $(ln) -s DigiCertGridTrustCAG2-Classic.signing_policy $(prefix)/bd43b60c.signing_policy $(ln) -s DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/5d9ea26d.namespaces $(ln) -s DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/bd43b60c.namespaces GEANTTCSAuthenticationECCCA4B: prep $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.info $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.namespaces $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.pem $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.signing_policy $(prefix)/ $(ln) -s GEANTTCSAuthenticationECCCA4B.pem $(prefix)/9efe4e6a.0 $(ln) -s GEANTTCSAuthenticationECCCA4B.pem $(prefix)/1e92f7a7.0 $(ln) -s GEANTTCSAuthenticationECCCA4B.signing_policy $(prefix)/9efe4e6a.signing_policy $(ln) -s GEANTTCSAuthenticationECCCA4B.signing_policy $(prefix)/1e92f7a7.signing_policy $(ln) -s GEANTTCSAuthenticationECCCA4B.namespaces $(prefix)/9efe4e6a.namespaces $(ln) -s GEANTTCSAuthenticationECCCA4B.namespaces $(prefix)/1e92f7a7.namespaces GEANTTCSAuthenticationECCCA5: prep $(install) src/accredited/GEANTTCSAuthenticationECCCA5.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA5.info $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA5.namespaces $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA5.pem $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA5.signing_policy $(prefix)/ $(ln) -s GEANTTCSAuthenticationECCCA5.pem $(prefix)/ce17c2b8.0 $(ln) -s GEANTTCSAuthenticationECCCA5.pem $(prefix)/f2a0ad17.0 $(ln) -s GEANTTCSAuthenticationECCCA5.signing_policy $(prefix)/ce17c2b8.signing_policy $(ln) -s GEANTTCSAuthenticationECCCA5.signing_policy $(prefix)/f2a0ad17.signing_policy $(ln) -s GEANTTCSAuthenticationECCCA5.namespaces $(prefix)/ce17c2b8.namespaces $(ln) -s GEANTTCSAuthenticationECCCA5.namespaces $(prefix)/f2a0ad17.namespaces GEANTTCSAuthenticationRSACA4B: prep $(install) src/accredited/GEANTTCSAuthenticationRSACA4B.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA4B.info $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA4B.namespaces $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA4B.pem $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA4B.signing_policy $(prefix)/ $(ln) -s GEANTTCSAuthenticationRSACA4B.pem $(prefix)/4c274970.0 $(ln) -s GEANTTCSAuthenticationRSACA4B.pem $(prefix)/da18317a.0 $(ln) -s GEANTTCSAuthenticationRSACA4B.signing_policy $(prefix)/4c274970.signing_policy $(ln) -s GEANTTCSAuthenticationRSACA4B.signing_policy $(prefix)/da18317a.signing_policy $(ln) -s GEANTTCSAuthenticationRSACA4B.namespaces $(prefix)/4c274970.namespaces $(ln) -s GEANTTCSAuthenticationRSACA4B.namespaces $(prefix)/da18317a.namespaces GEANTTCSAuthenticationRSACA5: prep $(install) src/accredited/GEANTTCSAuthenticationRSACA5.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA5.info $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA5.namespaces $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA5.pem $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationRSACA5.signing_policy $(prefix)/ $(ln) -s GEANTTCSAuthenticationRSACA5.pem $(prefix)/b44617aa.0 $(ln) -s GEANTTCSAuthenticationRSACA5.pem $(prefix)/6a1a4bad.0 $(ln) -s GEANTTCSAuthenticationRSACA5.signing_policy $(prefix)/b44617aa.signing_policy $(ln) -s GEANTTCSAuthenticationRSACA5.signing_policy $(prefix)/6a1a4bad.signing_policy $(ln) -s GEANTTCSAuthenticationRSACA5.namespaces $(prefix)/b44617aa.namespaces $(ln) -s GEANTTCSAuthenticationRSACA5.namespaces $(prefix)/6a1a4bad.namespaces GEANTTCSRETrustECCRootCA5: prep $(install) src/accredited/GEANTTCSRETrustECCRootCA5.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSRETrustECCRootCA5.info $(prefix)/ $(install) src/accredited/GEANTTCSRETrustECCRootCA5.namespaces $(prefix)/ $(install) src/accredited/GEANTTCSRETrustECCRootCA5.pem $(prefix)/ $(install) src/accredited/GEANTTCSRETrustECCRootCA5.signing_policy $(prefix)/ $(ln) -s GEANTTCSRETrustECCRootCA5.pem $(prefix)/1135c0fc.0 $(ln) -s GEANTTCSRETrustECCRootCA5.pem $(prefix)/a2088939.0 $(ln) -s GEANTTCSRETrustECCRootCA5.signing_policy $(prefix)/1135c0fc.signing_policy $(ln) -s GEANTTCSRETrustECCRootCA5.signing_policy $(prefix)/a2088939.signing_policy $(ln) -s GEANTTCSRETrustECCRootCA5.namespaces $(prefix)/1135c0fc.namespaces $(ln) -s GEANTTCSRETrustECCRootCA5.namespaces $(prefix)/a2088939.namespaces GEANTTCSRETrustRSARootCA5: prep $(install) src/accredited/GEANTTCSRETrustRSARootCA5.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSRETrustRSARootCA5.info $(prefix)/ $(install) src/accredited/GEANTTCSRETrustRSARootCA5.namespaces $(prefix)/ $(install) src/accredited/GEANTTCSRETrustRSARootCA5.pem $(prefix)/ $(install) src/accredited/GEANTTCSRETrustRSARootCA5.signing_policy $(prefix)/ $(ln) -s GEANTTCSRETrustRSARootCA5.pem $(prefix)/5c96e6d1.0 $(ln) -s GEANTTCSRETrustRSARootCA5.pem $(prefix)/5a9c45fe.0 $(ln) -s GEANTTCSRETrustRSARootCA5.signing_policy $(prefix)/5c96e6d1.signing_policy $(ln) -s GEANTTCSRETrustRSARootCA5.signing_policy $(prefix)/5a9c45fe.signing_policy $(ln) -s GEANTTCSRETrustRSARootCA5.namespaces $(prefix)/5c96e6d1.namespaces $(ln) -s GEANTTCSRETrustRSARootCA5.namespaces $(prefix)/5a9c45fe.namespaces GEANTeSciencePersonalCA4: prep $(install) src/accredited/GEANTeSciencePersonalCA4.crl_url $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalCA4.info $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalCA4.namespaces $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalCA4.pem $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalCA4.signing_policy $(prefix)/ $(ln) -s GEANTeSciencePersonalCA4.pem $(prefix)/b85d64aa.0 $(ln) -s GEANTeSciencePersonalCA4.pem $(prefix)/5e9e302b.0 $(ln) -s GEANTeSciencePersonalCA4.signing_policy $(prefix)/b85d64aa.signing_policy $(ln) -s GEANTeSciencePersonalCA4.signing_policy $(prefix)/5e9e302b.signing_policy $(ln) -s GEANTeSciencePersonalCA4.namespaces $(prefix)/b85d64aa.namespaces $(ln) -s GEANTeSciencePersonalCA4.namespaces $(prefix)/5e9e302b.namespaces GEANTeSciencePersonalECCCA4: prep $(install) src/accredited/GEANTeSciencePersonalECCCA4.crl_url $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalECCCA4.info $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalECCCA4.namespaces $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalECCCA4.pem $(prefix)/ $(install) src/accredited/GEANTeSciencePersonalECCCA4.signing_policy $(prefix)/ $(ln) -s GEANTeSciencePersonalECCCA4.pem $(prefix)/a603ba9c.0 $(ln) -s GEANTeSciencePersonalECCCA4.pem $(prefix)/7b384752.0 $(ln) -s GEANTeSciencePersonalECCCA4.signing_policy $(prefix)/a603ba9c.signing_policy $(ln) -s GEANTeSciencePersonalECCCA4.signing_policy $(prefix)/7b384752.signing_policy $(ln) -s GEANTeSciencePersonalECCCA4.namespaces $(prefix)/a603ba9c.namespaces $(ln) -s GEANTeSciencePersonalECCCA4.namespaces $(prefix)/7b384752.namespaces GEANTeScienceSSLCA4: prep $(install) src/accredited/GEANTeScienceSSLCA4.crl_url $(prefix)/ $(install) src/accredited/GEANTeScienceSSLCA4.info $(prefix)/ $(install) src/accredited/GEANTeScienceSSLCA4.namespaces $(prefix)/ $(install) src/accredited/GEANTeScienceSSLCA4.pem $(prefix)/ $(install) src/accredited/GEANTeScienceSSLCA4.signing_policy $(prefix)/ $(ln) -s GEANTeScienceSSLCA4.pem $(prefix)/8a21c0da.0 $(ln) -s GEANTeScienceSSLCA4.pem $(prefix)/c141eb07.0 $(ln) -s GEANTeScienceSSLCA4.signing_policy $(prefix)/8a21c0da.signing_policy $(ln) -s GEANTeScienceSSLCA4.signing_policy $(prefix)/c141eb07.signing_policy $(ln) -s GEANTeScienceSSLCA4.namespaces $(prefix)/8a21c0da.namespaces $(ln) -s GEANTeScienceSSLCA4.namespaces $(prefix)/c141eb07.namespaces GEANTeScienceSSLECCCA4: prep $(install) src/accredited/GEANTeScienceSSLECCCA4.crl_url $(prefix)/ $(install) src/accredited/GEANTeScienceSSLECCCA4.info $(prefix)/ $(install) src/accredited/GEANTeScienceSSLECCCA4.namespaces $(prefix)/ $(install) src/accredited/GEANTeScienceSSLECCCA4.pem $(prefix)/ $(install) src/accredited/GEANTeScienceSSLECCCA4.signing_policy $(prefix)/ $(ln) -s GEANTeScienceSSLECCCA4.pem $(prefix)/598b583e.0 $(ln) -s GEANTeScienceSSLECCCA4.pem $(prefix)/5249c1ef.0 $(ln) -s GEANTeScienceSSLECCCA4.signing_policy $(prefix)/598b583e.signing_policy $(ln) -s GEANTeScienceSSLECCCA4.signing_policy $(prefix)/5249c1ef.signing_policy $(ln) -s GEANTeScienceSSLECCCA4.namespaces $(prefix)/598b583e.namespaces $(ln) -s GEANTeScienceSSLECCCA4.namespaces $(prefix)/5249c1ef.namespaces GridCanada: prep $(install) src/accredited/GridCanada.crl_url $(prefix)/ $(install) src/accredited/GridCanada.info $(prefix)/ $(install) src/accredited/GridCanada.namespaces $(prefix)/ $(install) src/accredited/GridCanada.pem $(prefix)/ $(install) src/accredited/GridCanada.signing_policy $(prefix)/ $(ln) -s GridCanada.pem $(prefix)/bffbd7d0.0 $(ln) -s GridCanada.pem $(prefix)/5d674a88.0 $(ln) -s GridCanada.signing_policy $(prefix)/bffbd7d0.signing_policy $(ln) -s GridCanada.signing_policy $(prefix)/5d674a88.signing_policy $(ln) -s GridCanada.namespaces $(prefix)/bffbd7d0.namespaces $(ln) -s GridCanada.namespaces $(prefix)/5d674a88.namespaces HARICAGEANTTLSECC1: prep $(install) src/accredited/HARICAGEANTTLSECC1.crl_url $(prefix)/ $(install) src/accredited/HARICAGEANTTLSECC1.info $(prefix)/ $(install) src/accredited/HARICAGEANTTLSECC1.namespaces $(prefix)/ $(install) src/accredited/HARICAGEANTTLSECC1.pem $(prefix)/ $(install) src/accredited/HARICAGEANTTLSECC1.signing_policy $(prefix)/ $(ln) -s HARICAGEANTTLSECC1.pem $(prefix)/1cb741e8.0 $(ln) -s HARICAGEANTTLSECC1.pem $(prefix)/6883ff19.0 $(ln) -s HARICAGEANTTLSECC1.signing_policy $(prefix)/1cb741e8.signing_policy $(ln) -s HARICAGEANTTLSECC1.signing_policy $(prefix)/6883ff19.signing_policy $(ln) -s HARICAGEANTTLSECC1.namespaces $(prefix)/1cb741e8.namespaces $(ln) -s HARICAGEANTTLSECC1.namespaces $(prefix)/6883ff19.namespaces HARICAGEANTTLSRSA1: prep $(install) src/accredited/HARICAGEANTTLSRSA1.crl_url $(prefix)/ $(install) src/accredited/HARICAGEANTTLSRSA1.info $(prefix)/ $(install) src/accredited/HARICAGEANTTLSRSA1.namespaces $(prefix)/ $(install) src/accredited/HARICAGEANTTLSRSA1.pem $(prefix)/ $(install) src/accredited/HARICAGEANTTLSRSA1.signing_policy $(prefix)/ $(ln) -s HARICAGEANTTLSRSA1.pem $(prefix)/5a04724c.0 $(ln) -s HARICAGEANTTLSRSA1.pem $(prefix)/82977a7e.0 $(ln) -s HARICAGEANTTLSRSA1.signing_policy $(prefix)/5a04724c.signing_policy $(ln) -s HARICAGEANTTLSRSA1.signing_policy $(prefix)/82977a7e.signing_policy $(ln) -s HARICAGEANTTLSRSA1.namespaces $(prefix)/5a04724c.namespaces $(ln) -s HARICAGEANTTLSRSA1.namespaces $(prefix)/82977a7e.namespaces HARICAOVTLSECC: prep $(install) src/accredited/HARICAOVTLSECC.crl_url $(prefix)/ $(install) src/accredited/HARICAOVTLSECC.info $(prefix)/ $(install) src/accredited/HARICAOVTLSECC.namespaces $(prefix)/ $(install) src/accredited/HARICAOVTLSECC.pem $(prefix)/ $(install) src/accredited/HARICAOVTLSECC.signing_policy $(prefix)/ $(ln) -s HARICAOVTLSECC.pem $(prefix)/b7c4e308.0 $(ln) -s HARICAOVTLSECC.pem $(prefix)/cf50f592.0 $(ln) -s HARICAOVTLSECC.signing_policy $(prefix)/b7c4e308.signing_policy $(ln) -s HARICAOVTLSECC.signing_policy $(prefix)/cf50f592.signing_policy $(ln) -s HARICAOVTLSECC.namespaces $(prefix)/b7c4e308.namespaces $(ln) -s HARICAOVTLSECC.namespaces $(prefix)/cf50f592.namespaces HARICAOVTLSRSA: prep $(install) src/accredited/HARICAOVTLSRSA.crl_url $(prefix)/ $(install) src/accredited/HARICAOVTLSRSA.info $(prefix)/ $(install) src/accredited/HARICAOVTLSRSA.namespaces $(prefix)/ $(install) src/accredited/HARICAOVTLSRSA.pem $(prefix)/ $(install) src/accredited/HARICAOVTLSRSA.signing_policy $(prefix)/ $(ln) -s HARICAOVTLSRSA.pem $(prefix)/8dd9cc75.0 $(ln) -s HARICAOVTLSRSA.pem $(prefix)/9b22fa41.0 $(ln) -s HARICAOVTLSRSA.signing_policy $(prefix)/8dd9cc75.signing_policy $(ln) -s HARICAOVTLSRSA.signing_policy $(prefix)/9b22fa41.signing_policy $(ln) -s HARICAOVTLSRSA.namespaces $(prefix)/8dd9cc75.namespaces $(ln) -s HARICAOVTLSRSA.namespaces $(prefix)/9b22fa41.namespaces HARICATLSECCRootCA2021: prep $(install) src/accredited/HARICATLSECCRootCA2021.crl_url $(prefix)/ $(install) src/accredited/HARICATLSECCRootCA2021.info $(prefix)/ $(install) src/accredited/HARICATLSECCRootCA2021.namespaces $(prefix)/ $(install) src/accredited/HARICATLSECCRootCA2021.pem $(prefix)/ $(install) src/accredited/HARICATLSECCRootCA2021.signing_policy $(prefix)/ $(ln) -s HARICATLSECCRootCA2021.pem $(prefix)/4c3982f2.0 $(ln) -s HARICATLSECCRootCA2021.pem $(prefix)/ecccd8db.0 $(ln) -s HARICATLSECCRootCA2021.signing_policy $(prefix)/4c3982f2.signing_policy $(ln) -s HARICATLSECCRootCA2021.signing_policy $(prefix)/ecccd8db.signing_policy $(ln) -s HARICATLSECCRootCA2021.namespaces $(prefix)/4c3982f2.namespaces $(ln) -s HARICATLSECCRootCA2021.namespaces $(prefix)/ecccd8db.namespaces HARICATLSRSARootCA2021: prep $(install) src/accredited/HARICATLSRSARootCA2021.crl_url $(prefix)/ $(install) src/accredited/HARICATLSRSARootCA2021.info $(prefix)/ $(install) src/accredited/HARICATLSRSARootCA2021.namespaces $(prefix)/ $(install) src/accredited/HARICATLSRSARootCA2021.pem $(prefix)/ $(install) src/accredited/HARICATLSRSARootCA2021.signing_policy $(prefix)/ $(ln) -s HARICATLSRSARootCA2021.pem $(prefix)/b92fd57f.0 $(ln) -s HARICATLSRSARootCA2021.pem $(prefix)/9f727ac7.0 $(ln) -s HARICATLSRSARootCA2021.signing_policy $(prefix)/b92fd57f.signing_policy $(ln) -s HARICATLSRSARootCA2021.signing_policy $(prefix)/9f727ac7.signing_policy $(ln) -s HARICATLSRSARootCA2021.namespaces $(prefix)/b92fd57f.namespaces $(ln) -s HARICATLSRSARootCA2021.namespaces $(prefix)/9f727ac7.namespaces HellasGrid-CA-2016: prep $(install) src/accredited/HellasGrid-CA-2016.crl_url $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.info $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.namespaces $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.pem $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.signing_policy $(prefix)/ $(ln) -s HellasGrid-CA-2016.pem $(prefix)/f4cf8fb6.0 $(ln) -s HellasGrid-CA-2016.pem $(prefix)/7c27c6a1.0 $(ln) -s HellasGrid-CA-2016.signing_policy $(prefix)/f4cf8fb6.signing_policy $(ln) -s HellasGrid-CA-2016.signing_policy $(prefix)/7c27c6a1.signing_policy $(ln) -s HellasGrid-CA-2016.namespaces $(prefix)/f4cf8fb6.namespaces $(ln) -s HellasGrid-CA-2016.namespaces $(prefix)/7c27c6a1.namespaces HellenicAcademicandResearchInstitutionsECCRootCA2015: prep $(install) src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.crl_url $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.info $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.namespaces $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.pem $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policy $(prefix)/ $(ln) -s HellenicAcademicandResearchInstitutionsECCRootCA2015.pem $(prefix)/9479c8c3.0 $(ln) -s HellenicAcademicandResearchInstitutionsECCRootCA2015.pem $(prefix)/7719f463.0 $(ln) -s HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policy $(prefix)/9479c8c3.signing_policy $(ln) -s HellenicAcademicandResearchInstitutionsECCRootCA2015.signing_policy $(prefix)/7719f463.signing_policy $(ln) -s HellenicAcademicandResearchInstitutionsECCRootCA2015.namespaces $(prefix)/9479c8c3.namespaces $(ln) -s HellenicAcademicandResearchInstitutionsECCRootCA2015.namespaces $(prefix)/7719f463.namespaces HellenicAcademicandResearchInstitutionsRootCA2015: prep $(install) src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.crl_url $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.info $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.namespaces $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.pem $(prefix)/ $(install) src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.signing_policy $(prefix)/ $(ln) -s HellenicAcademicandResearchInstitutionsRootCA2015.pem $(prefix)/dc99f41e.0 $(ln) -s HellenicAcademicandResearchInstitutionsRootCA2015.pem $(prefix)/32888f65.0 $(ln) -s HellenicAcademicandResearchInstitutionsRootCA2015.signing_policy $(prefix)/dc99f41e.signing_policy $(ln) -s HellenicAcademicandResearchInstitutionsRootCA2015.signing_policy $(prefix)/32888f65.signing_policy $(ln) -s HellenicAcademicandResearchInstitutionsRootCA2015.namespaces $(prefix)/dc99f41e.namespaces $(ln) -s HellenicAcademicandResearchInstitutionsRootCA2015.namespaces $(prefix)/32888f65.namespaces IGCA2: prep $(install) src/accredited/IGCA2.crl_url $(prefix)/ $(install) src/accredited/IGCA2.info $(prefix)/ $(install) src/accredited/IGCA2.namespaces $(prefix)/ $(install) src/accredited/IGCA2.pem $(prefix)/ $(install) src/accredited/IGCA2.signing_policy $(prefix)/ $(ln) -s IGCA2.pem $(prefix)/2fc6b233.0 $(ln) -s IGCA2.pem $(prefix)/8fa17d52.0 $(ln) -s IGCA2.signing_policy $(prefix)/2fc6b233.signing_policy $(ln) -s IGCA2.signing_policy $(prefix)/8fa17d52.signing_policy $(ln) -s IGCA2.namespaces $(prefix)/2fc6b233.namespaces $(ln) -s IGCA2.namespaces $(prefix)/8fa17d52.namespaces IHEP-2013: prep $(install) src/accredited/IHEP-2013.crl_url $(prefix)/ $(install) src/accredited/IHEP-2013.info $(prefix)/ $(install) src/accredited/IHEP-2013.namespaces $(prefix)/ $(install) src/accredited/IHEP-2013.pem $(prefix)/ $(install) src/accredited/IHEP-2013.signing_policy $(prefix)/ $(ln) -s IHEP-2013.pem $(prefix)/39d30eba.0 $(ln) -s IHEP-2013.pem $(prefix)/e7734335.0 $(ln) -s IHEP-2013.signing_policy $(prefix)/39d30eba.signing_policy $(ln) -s IHEP-2013.signing_policy $(prefix)/e7734335.signing_policy $(ln) -s IHEP-2013.namespaces $(prefix)/39d30eba.namespaces $(ln) -s IHEP-2013.namespaces $(prefix)/e7734335.namespaces IRAN-GRID-GCG-G2: prep $(install) src/accredited/IRAN-GRID-GCG-G2.crl_url $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.info $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.namespaces $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.pem $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.signing_policy $(prefix)/ $(ln) -s IRAN-GRID-GCG-G2.pem $(prefix)/f8598272.0 $(ln) -s IRAN-GRID-GCG-G2.pem $(prefix)/63699217.0 $(ln) -s IRAN-GRID-GCG-G2.signing_policy $(prefix)/f8598272.signing_policy $(ln) -s IRAN-GRID-GCG-G2.signing_policy $(prefix)/63699217.signing_policy $(ln) -s IRAN-GRID-GCG-G2.namespaces $(prefix)/f8598272.namespaces $(ln) -s IRAN-GRID-GCG-G2.namespaces $(prefix)/63699217.namespaces InCommon-RSA-IGTF-Server-CA-2: prep $(install) src/experimental/InCommon-RSA-IGTF-Server-CA-2.crl_url $(prefix)/ $(install) src/experimental/InCommon-RSA-IGTF-Server-CA-2.info $(prefix)/ $(install) src/experimental/InCommon-RSA-IGTF-Server-CA-2.pem $(prefix)/ $(install) src/experimental/InCommon-RSA-IGTF-Server-CA-2.signing_policy $(prefix)/ $(ln) -s InCommon-RSA-IGTF-Server-CA-2.pem $(prefix)/b8ebdba6.0 $(ln) -s InCommon-RSA-IGTF-Server-CA-2.pem $(prefix)/f10dc0a6.0 $(ln) -s InCommon-RSA-IGTF-Server-CA-2.signing_policy $(prefix)/b8ebdba6.signing_policy $(ln) -s InCommon-RSA-IGTF-Server-CA-2.signing_policy $(prefix)/f10dc0a6.signing_policy InCommon-RSA-IGTF-Server-CA-3: prep $(install) src/accredited/InCommon-RSA-IGTF-Server-CA-3.crl_url $(prefix)/ $(install) src/accredited/InCommon-RSA-IGTF-Server-CA-3.info $(prefix)/ $(install) src/accredited/InCommon-RSA-IGTF-Server-CA-3.pem $(prefix)/ $(install) src/accredited/InCommon-RSA-IGTF-Server-CA-3.signing_policy $(prefix)/ $(ln) -s InCommon-RSA-IGTF-Server-CA-3.pem $(prefix)/3cbc995f.0 $(ln) -s InCommon-RSA-IGTF-Server-CA-3.pem $(prefix)/1e49ade3.0 $(ln) -s InCommon-RSA-IGTF-Server-CA-3.signing_policy $(prefix)/3cbc995f.signing_policy $(ln) -s InCommon-RSA-IGTF-Server-CA-3.signing_policy $(prefix)/1e49ade3.signing_policy KEK: prep $(install) src/accredited/KEK.crl_url $(prefix)/ $(install) src/accredited/KEK.info $(prefix)/ $(install) src/accredited/KEK.namespaces $(prefix)/ $(install) src/accredited/KEK.pem $(prefix)/ $(install) src/accredited/KEK.signing_policy $(prefix)/ $(ln) -s KEK.pem $(prefix)/617ff41b.0 $(ln) -s KEK.pem $(prefix)/2f2f573f.0 $(ln) -s KEK.signing_policy $(prefix)/617ff41b.signing_policy $(ln) -s KEK.signing_policy $(prefix)/2f2f573f.signing_policy $(ln) -s KEK.namespaces $(prefix)/617ff41b.namespaces $(ln) -s KEK.namespaces $(prefix)/2f2f573f.namespaces KISTIv3: prep $(install) src/accredited/KISTIv3.crl_url $(prefix)/ $(install) src/accredited/KISTIv3.info $(prefix)/ $(install) src/accredited/KISTIv3.namespaces $(prefix)/ $(install) src/accredited/KISTIv3.pem $(prefix)/ $(install) src/accredited/KISTIv3.signing_policy $(prefix)/ $(ln) -s KISTIv3.pem $(prefix)/06769ccd.0 $(ln) -s KISTIv3.pem $(prefix)/ead666c8.0 $(ln) -s KISTIv3.signing_policy $(prefix)/06769ccd.signing_policy $(ln) -s KISTIv3.signing_policy $(prefix)/ead666c8.signing_policy $(ln) -s KISTIv3.namespaces $(prefix)/06769ccd.namespaces $(ln) -s KISTIv3.namespaces $(prefix)/ead666c8.namespaces MREN-CA: prep $(install) src/accredited/MREN-CA.crl_url $(prefix)/ $(install) src/accredited/MREN-CA.info $(prefix)/ $(install) src/accredited/MREN-CA.namespaces $(prefix)/ $(install) src/accredited/MREN-CA.pem $(prefix)/ $(install) src/accredited/MREN-CA.signing_policy $(prefix)/ $(ln) -s MREN-CA.pem $(prefix)/3232b9bc.0 $(ln) -s MREN-CA.pem $(prefix)/56084620.0 $(ln) -s MREN-CA.signing_policy $(prefix)/3232b9bc.signing_policy $(ln) -s MREN-CA.signing_policy $(prefix)/56084620.signing_policy $(ln) -s MREN-CA.namespaces $(prefix)/3232b9bc.namespaces $(ln) -s MREN-CA.namespaces $(prefix)/56084620.namespaces MaGrid: prep $(install) src/accredited/MaGrid.crl_url $(prefix)/ $(install) src/accredited/MaGrid.info $(prefix)/ $(install) src/accredited/MaGrid.namespaces $(prefix)/ $(install) src/accredited/MaGrid.pem $(prefix)/ $(install) src/accredited/MaGrid.signing_policy $(prefix)/ $(ln) -s MaGrid.pem $(prefix)/7b54708e.0 $(ln) -s MaGrid.pem $(prefix)/4ce1cf99.0 $(ln) -s MaGrid.signing_policy $(prefix)/7b54708e.signing_policy $(ln) -s MaGrid.signing_policy $(prefix)/4ce1cf99.signing_policy $(ln) -s MaGrid.namespaces $(prefix)/7b54708e.namespaces $(ln) -s MaGrid.namespaces $(prefix)/4ce1cf99.namespaces NIKHEF: prep $(install) src/accredited/NIKHEF.crl_url $(prefix)/ $(install) src/accredited/NIKHEF.info $(prefix)/ $(install) src/accredited/NIKHEF.namespaces $(prefix)/ $(install) src/accredited/NIKHEF.pem $(prefix)/ $(install) src/accredited/NIKHEF.signing_policy $(prefix)/ $(ln) -s NIKHEF.pem $(prefix)/16da7552.0 $(ln) -s NIKHEF.pem $(prefix)/dfb080e4.0 $(ln) -s NIKHEF.signing_policy $(prefix)/16da7552.signing_policy $(ln) -s NIKHEF.signing_policy $(prefix)/dfb080e4.signing_policy $(ln) -s NIKHEF.namespaces $(prefix)/16da7552.namespaces $(ln) -s NIKHEF.namespaces $(prefix)/dfb080e4.namespaces NorduGrid-2015: prep $(install) src/accredited/NorduGrid-2015.crl_url $(prefix)/ $(install) src/accredited/NorduGrid-2015.info $(prefix)/ $(install) src/accredited/NorduGrid-2015.namespaces $(prefix)/ $(install) src/accredited/NorduGrid-2015.pem $(prefix)/ $(install) src/accredited/NorduGrid-2015.signing_policy $(prefix)/ $(ln) -s NorduGrid-2015.pem $(prefix)/2f2e0e6e.0 $(ln) -s NorduGrid-2015.pem $(prefix)/a3e2dbca.0 $(ln) -s NorduGrid-2015.signing_policy $(prefix)/2f2e0e6e.signing_policy $(ln) -s NorduGrid-2015.signing_policy $(prefix)/a3e2dbca.signing_policy $(ln) -s NorduGrid-2015.namespaces $(prefix)/2f2e0e6e.namespaces $(ln) -s NorduGrid-2015.namespaces $(prefix)/a3e2dbca.namespaces PK-Grid-2007: prep $(install) src/accredited/PK-Grid-2007.crl_url $(prefix)/ $(install) src/accredited/PK-Grid-2007.info $(prefix)/ $(install) src/accredited/PK-Grid-2007.namespaces $(prefix)/ $(install) src/accredited/PK-Grid-2007.pem $(prefix)/ $(install) src/accredited/PK-Grid-2007.signing_policy $(prefix)/ $(ln) -s PK-Grid-2007.pem $(prefix)/f5ead794.0 $(ln) -s PK-Grid-2007.pem $(prefix)/18700496.0 $(ln) -s PK-Grid-2007.signing_policy $(prefix)/f5ead794.signing_policy $(ln) -s PK-Grid-2007.signing_policy $(prefix)/18700496.signing_policy $(ln) -s PK-Grid-2007.namespaces $(prefix)/f5ead794.namespaces $(ln) -s PK-Grid-2007.namespaces $(prefix)/18700496.namespaces PKIUNAMgrid: prep $(install) src/accredited/PKIUNAMgrid.crl_url $(prefix)/ $(install) src/accredited/PKIUNAMgrid.info $(prefix)/ $(install) src/accredited/PKIUNAMgrid.namespaces $(prefix)/ $(install) src/accredited/PKIUNAMgrid.pem $(prefix)/ $(install) src/accredited/PKIUNAMgrid.signing_policy $(prefix)/ $(ln) -s PKIUNAMgrid.pem $(prefix)/8f016f43.0 $(ln) -s PKIUNAMgrid.pem $(prefix)/d0a33f8e.0 $(ln) -s PKIUNAMgrid.signing_policy $(prefix)/8f016f43.signing_policy $(ln) -s PKIUNAMgrid.signing_policy $(prefix)/d0a33f8e.signing_policy $(ln) -s PKIUNAMgrid.namespaces $(prefix)/8f016f43.namespaces $(ln) -s PKIUNAMgrid.namespaces $(prefix)/d0a33f8e.namespaces PolishGrid-2019: prep $(install) src/accredited/PolishGrid-2019.crl_url $(prefix)/ $(install) src/accredited/PolishGrid-2019.info $(prefix)/ $(install) src/accredited/PolishGrid-2019.namespaces $(prefix)/ $(install) src/accredited/PolishGrid-2019.pem $(prefix)/ $(install) src/accredited/PolishGrid-2019.signing_policy $(prefix)/ $(ln) -s PolishGrid-2019.pem $(prefix)/8c74f281.0 $(ln) -s PolishGrid-2019.pem $(prefix)/4ba9a797.0 $(ln) -s PolishGrid-2019.signing_policy $(prefix)/8c74f281.signing_policy $(ln) -s PolishGrid-2019.signing_policy $(prefix)/4ba9a797.signing_policy $(ln) -s PolishGrid-2019.namespaces $(prefix)/8c74f281.namespaces $(ln) -s PolishGrid-2019.namespaces $(prefix)/4ba9a797.namespaces RCauth-Pilot-ICA-G1: prep $(install) src/accredited/RCauth-Pilot-ICA-G1.crl_url $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.info $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.namespaces $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.pem $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.signing_policy $(prefix)/ $(ln) -s RCauth-Pilot-ICA-G1.pem $(prefix)/ab2371fe.0 $(ln) -s RCauth-Pilot-ICA-G1.pem $(prefix)/5f40742a.0 $(ln) -s RCauth-Pilot-ICA-G1.signing_policy $(prefix)/ab2371fe.signing_policy $(ln) -s RCauth-Pilot-ICA-G1.signing_policy $(prefix)/5f40742a.signing_policy $(ln) -s RCauth-Pilot-ICA-G1.namespaces $(prefix)/ab2371fe.namespaces $(ln) -s RCauth-Pilot-ICA-G1.namespaces $(prefix)/5f40742a.namespaces RDIG: prep $(install) src/accredited/RDIG.crl_url $(prefix)/ $(install) src/accredited/RDIG.info $(prefix)/ $(install) src/accredited/RDIG.namespaces $(prefix)/ $(install) src/accredited/RDIG.pem $(prefix)/ $(install) src/accredited/RDIG.signing_policy $(prefix)/ $(ln) -s RDIG.pem $(prefix)/55994d72.0 $(ln) -s RDIG.pem $(prefix)/94b468c6.0 $(ln) -s RDIG.signing_policy $(prefix)/55994d72.signing_policy $(ln) -s RDIG.signing_policy $(prefix)/94b468c6.signing_policy $(ln) -s RDIG.namespaces $(prefix)/55994d72.namespaces $(ln) -s RDIG.namespaces $(prefix)/94b468c6.namespaces REUNA-ca: prep $(install) src/accredited/REUNA-ca.crl_url $(prefix)/ $(install) src/accredited/REUNA-ca.info $(prefix)/ $(install) src/accredited/REUNA-ca.namespaces $(prefix)/ $(install) src/accredited/REUNA-ca.pem $(prefix)/ $(install) src/accredited/REUNA-ca.signing_policy $(prefix)/ $(ln) -s REUNA-ca.pem $(prefix)/295adc19.0 $(ln) -s REUNA-ca.pem $(prefix)/089450c2.0 $(ln) -s REUNA-ca.signing_policy $(prefix)/295adc19.signing_policy $(ln) -s REUNA-ca.signing_policy $(prefix)/089450c2.signing_policy $(ln) -s REUNA-ca.namespaces $(prefix)/295adc19.namespaces $(ln) -s REUNA-ca.namespaces $(prefix)/089450c2.namespaces ResearchandEducationTrustECCRootCA: prep $(install) src/accredited/ResearchandEducationTrustECCRootCA.crl_url $(prefix)/ $(install) src/accredited/ResearchandEducationTrustECCRootCA.info $(prefix)/ $(install) src/accredited/ResearchandEducationTrustECCRootCA.namespaces $(prefix)/ $(install) src/accredited/ResearchandEducationTrustECCRootCA.pem $(prefix)/ $(install) src/accredited/ResearchandEducationTrustECCRootCA.signing_policy $(prefix)/ $(ln) -s ResearchandEducationTrustECCRootCA.pem $(prefix)/5a1bc73f.0 $(ln) -s ResearchandEducationTrustECCRootCA.pem $(prefix)/641c6229.0 $(ln) -s ResearchandEducationTrustECCRootCA.signing_policy $(prefix)/5a1bc73f.signing_policy $(ln) -s ResearchandEducationTrustECCRootCA.signing_policy $(prefix)/641c6229.signing_policy $(ln) -s ResearchandEducationTrustECCRootCA.namespaces $(prefix)/5a1bc73f.namespaces $(ln) -s ResearchandEducationTrustECCRootCA.namespaces $(prefix)/641c6229.namespaces ResearchandEducationTrustRSARootCA: prep $(install) src/accredited/ResearchandEducationTrustRSARootCA.crl_url $(prefix)/ $(install) src/accredited/ResearchandEducationTrustRSARootCA.info $(prefix)/ $(install) src/accredited/ResearchandEducationTrustRSARootCA.namespaces $(prefix)/ $(install) src/accredited/ResearchandEducationTrustRSARootCA.pem $(prefix)/ $(install) src/accredited/ResearchandEducationTrustRSARootCA.signing_policy $(prefix)/ $(ln) -s ResearchandEducationTrustRSARootCA.pem $(prefix)/de3a864d.0 $(ln) -s ResearchandEducationTrustRSARootCA.pem $(prefix)/3525ac0e.0 $(ln) -s ResearchandEducationTrustRSARootCA.signing_policy $(prefix)/de3a864d.signing_policy $(ln) -s ResearchandEducationTrustRSARootCA.signing_policy $(prefix)/3525ac0e.signing_policy $(ln) -s ResearchandEducationTrustRSARootCA.namespaces $(prefix)/de3a864d.namespaces $(ln) -s ResearchandEducationTrustRSARootCA.namespaces $(prefix)/3525ac0e.namespaces RomanianGRID: prep $(install) src/accredited/RomanianGRID.crl_url $(prefix)/ $(install) src/accredited/RomanianGRID.info $(prefix)/ $(install) src/accredited/RomanianGRID.namespaces $(prefix)/ $(install) src/accredited/RomanianGRID.pem $(prefix)/ $(install) src/accredited/RomanianGRID.signing_policy $(prefix)/ $(ln) -s RomanianGRID.pem $(prefix)/1f3834d0.0 $(ln) -s RomanianGRID.pem $(prefix)/18bc5b05.0 $(ln) -s RomanianGRID.signing_policy $(prefix)/1f3834d0.signing_policy $(ln) -s RomanianGRID.signing_policy $(prefix)/18bc5b05.signing_policy $(ln) -s RomanianGRID.namespaces $(prefix)/1f3834d0.namespaces $(ln) -s RomanianGRID.namespaces $(prefix)/18bc5b05.namespaces SRCE: prep $(install) src/accredited/SRCE.crl_url $(prefix)/ $(install) src/accredited/SRCE.info $(prefix)/ $(install) src/accredited/SRCE.namespaces $(prefix)/ $(install) src/accredited/SRCE.pem $(prefix)/ $(install) src/accredited/SRCE.signing_policy $(prefix)/ $(ln) -s SRCE.pem $(prefix)/ff94d436.0 $(ln) -s SRCE.pem $(prefix)/0e635db3.0 $(ln) -s SRCE.signing_policy $(prefix)/ff94d436.signing_policy $(ln) -s SRCE.signing_policy $(prefix)/0e635db3.signing_policy $(ln) -s SRCE.namespaces $(prefix)/ff94d436.namespaces $(ln) -s SRCE.namespaces $(prefix)/0e635db3.namespaces SiGNET-CA: prep $(install) src/accredited/SiGNET-CA.crl_url $(prefix)/ $(install) src/accredited/SiGNET-CA.info $(prefix)/ $(install) src/accredited/SiGNET-CA.namespaces $(prefix)/ $(install) src/accredited/SiGNET-CA.pem $(prefix)/ $(install) src/accredited/SiGNET-CA.signing_policy $(prefix)/ $(ln) -s SiGNET-CA.pem $(prefix)/3d5be7bc.0 $(ln) -s SiGNET-CA.pem $(prefix)/156a0f0f.0 $(ln) -s SiGNET-CA.signing_policy $(prefix)/3d5be7bc.signing_policy $(ln) -s SiGNET-CA.signing_policy $(prefix)/156a0f0f.signing_policy $(ln) -s SiGNET-CA.namespaces $(prefix)/3d5be7bc.namespaces $(ln) -s SiGNET-CA.namespaces $(prefix)/156a0f0f.namespaces SlovakGrid: prep $(install) src/accredited/SlovakGrid.crl_url $(prefix)/ $(install) src/accredited/SlovakGrid.info $(prefix)/ $(install) src/accredited/SlovakGrid.namespaces $(prefix)/ $(install) src/accredited/SlovakGrid.pem $(prefix)/ $(install) src/accredited/SlovakGrid.signing_policy $(prefix)/ $(ln) -s SlovakGrid.pem $(prefix)/e13e0fcf.0 $(ln) -s SlovakGrid.pem $(prefix)/e21dc0c0.0 $(ln) -s SlovakGrid.signing_policy $(prefix)/e13e0fcf.signing_policy $(ln) -s SlovakGrid.signing_policy $(prefix)/e21dc0c0.signing_policy $(ln) -s SlovakGrid.namespaces $(prefix)/e13e0fcf.namespaces $(ln) -s SlovakGrid.namespaces $(prefix)/e21dc0c0.namespaces TRGrid: prep $(install) src/accredited/TRGrid.crl_url $(prefix)/ $(install) src/accredited/TRGrid.info $(prefix)/ $(install) src/accredited/TRGrid.namespaces $(prefix)/ $(install) src/accredited/TRGrid.pem $(prefix)/ $(install) src/accredited/TRGrid.signing_policy $(prefix)/ $(ln) -s TRGrid.pem $(prefix)/1691b9ba.0 $(ln) -s TRGrid.pem $(prefix)/87429ba3.0 $(ln) -s TRGrid.signing_policy $(prefix)/1691b9ba.signing_policy $(ln) -s TRGrid.signing_policy $(prefix)/87429ba3.signing_policy $(ln) -s TRGrid.namespaces $(prefix)/1691b9ba.namespaces $(ln) -s TRGrid.namespaces $(prefix)/87429ba3.namespaces TRGrid2024: prep $(install) src/accredited/TRGrid2024.crl_url $(prefix)/ $(install) src/accredited/TRGrid2024.info $(prefix)/ $(install) src/accredited/TRGrid2024.namespaces $(prefix)/ $(install) src/accredited/TRGrid2024.pem $(prefix)/ $(install) src/accredited/TRGrid2024.signing_policy $(prefix)/ $(ln) -s TRGrid2024.pem $(prefix)/23bf59bc.0 $(ln) -s TRGrid2024.pem $(prefix)/3ca6d4a0.0 $(ln) -s TRGrid2024.signing_policy $(prefix)/23bf59bc.signing_policy $(ln) -s TRGrid2024.signing_policy $(prefix)/3ca6d4a0.signing_policy $(ln) -s TRGrid2024.namespaces $(prefix)/23bf59bc.namespaces $(ln) -s TRGrid2024.namespaces $(prefix)/3ca6d4a0.namespaces UGRID-G2: prep $(install) src/accredited/UGRID-G2.crl_url $(prefix)/ $(install) src/accredited/UGRID-G2.info $(prefix)/ $(install) src/accredited/UGRID-G2.namespaces $(prefix)/ $(install) src/accredited/UGRID-G2.pem $(prefix)/ $(install) src/accredited/UGRID-G2.signing_policy $(prefix)/ $(ln) -s UGRID-G2.pem $(prefix)/c53e160f.0 $(ln) -s UGRID-G2.pem $(prefix)/6999cae3.0 $(ln) -s UGRID-G2.signing_policy $(prefix)/c53e160f.signing_policy $(ln) -s UGRID-G2.signing_policy $(prefix)/6999cae3.signing_policy $(ln) -s UGRID-G2.namespaces $(prefix)/c53e160f.namespaces $(ln) -s UGRID-G2.namespaces $(prefix)/6999cae3.namespaces UKPathfinder1: prep $(install) src/unaccredited/UKPathfinder1.crl_url $(prefix)/ $(install) src/unaccredited/UKPathfinder1.info $(prefix)/ $(install) src/unaccredited/UKPathfinder1.namespaces $(prefix)/ $(install) src/unaccredited/UKPathfinder1.pem $(prefix)/ $(install) src/unaccredited/UKPathfinder1.signing_policy $(prefix)/ $(ln) -s UKPathfinder1.pem $(prefix)/6956a8c5.0 $(ln) -s UKPathfinder1.pem $(prefix)/85118d31.0 $(ln) -s UKPathfinder1.signing_policy $(prefix)/6956a8c5.signing_policy $(ln) -s UKPathfinder1.signing_policy $(prefix)/85118d31.signing_policy $(ln) -s UKPathfinder1.namespaces $(prefix)/6956a8c5.namespaces $(ln) -s UKPathfinder1.namespaces $(prefix)/85118d31.namespaces UKeScienceCA-2B: prep $(install) src/accredited/UKeScienceCA-2B.crl_url $(prefix)/ $(install) src/accredited/UKeScienceCA-2B.info $(prefix)/ $(install) src/accredited/UKeScienceCA-2B.pem $(prefix)/ $(install) src/accredited/UKeScienceCA-2B.signing_policy $(prefix)/ $(ln) -s UKeScienceCA-2B.pem $(prefix)/ffc3d59b.0 $(ln) -s UKeScienceCA-2B.pem $(prefix)/530f7122.0 $(ln) -s UKeScienceCA-2B.signing_policy $(prefix)/ffc3d59b.signing_policy $(ln) -s UKeScienceCA-2B.signing_policy $(prefix)/530f7122.signing_policy UKeScienceRoot-2007: prep $(install) src/accredited/UKeScienceRoot-2007.crl_url $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.info $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.namespaces $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.pem $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.signing_policy $(prefix)/ $(ln) -s UKeScienceRoot-2007.pem $(prefix)/98ef0ee5.0 $(ln) -s UKeScienceRoot-2007.pem $(prefix)/7ed47087.0 $(ln) -s UKeScienceRoot-2007.signing_policy $(prefix)/98ef0ee5.signing_policy $(ln) -s UKeScienceRoot-2007.signing_policy $(prefix)/7ed47087.signing_policy $(ln) -s UKeScienceRoot-2007.namespaces $(prefix)/98ef0ee5.namespaces $(ln) -s UKeScienceRoot-2007.namespaces $(prefix)/7ed47087.namespaces UNAMgrid-ca: prep $(install) src/accredited/UNAMgrid-ca.crl_url $(prefix)/ $(install) src/accredited/UNAMgrid-ca.info $(prefix)/ $(install) src/accredited/UNAMgrid-ca.namespaces $(prefix)/ $(install) src/accredited/UNAMgrid-ca.pem $(prefix)/ $(install) src/accredited/UNAMgrid-ca.signing_policy $(prefix)/ $(ln) -s UNAMgrid-ca.pem $(prefix)/24c3ccde.0 $(ln) -s UNAMgrid-ca.pem $(prefix)/d71343e8.0 $(ln) -s UNAMgrid-ca.signing_policy $(prefix)/24c3ccde.signing_policy $(ln) -s UNAMgrid-ca.signing_policy $(prefix)/d71343e8.signing_policy $(ln) -s UNAMgrid-ca.namespaces $(prefix)/24c3ccde.namespaces $(ln) -s UNAMgrid-ca.namespaces $(prefix)/d71343e8.namespaces USERTrustECCCertificationAuthority: prep $(install) src/accredited/USERTrustECCCertificationAuthority.crl_url $(prefix)/ $(install) src/accredited/USERTrustECCCertificationAuthority.info $(prefix)/ $(install) src/accredited/USERTrustECCCertificationAuthority.namespaces $(prefix)/ $(install) src/accredited/USERTrustECCCertificationAuthority.pem $(prefix)/ $(install) src/accredited/USERTrustECCCertificationAuthority.signing_policy $(prefix)/ $(ln) -s USERTrustECCCertificationAuthority.pem $(prefix)/04f60c28.0 $(ln) -s USERTrustECCCertificationAuthority.pem $(prefix)/f30dd6ad.0 $(ln) -s USERTrustECCCertificationAuthority.signing_policy $(prefix)/04f60c28.signing_policy $(ln) -s USERTrustECCCertificationAuthority.signing_policy $(prefix)/f30dd6ad.signing_policy $(ln) -s USERTrustECCCertificationAuthority.namespaces $(prefix)/04f60c28.namespaces $(ln) -s USERTrustECCCertificationAuthority.namespaces $(prefix)/f30dd6ad.namespaces USERTrustRSACertificationAuthority: prep $(install) src/accredited/USERTrustRSACertificationAuthority.crl_url $(prefix)/ $(install) src/accredited/USERTrustRSACertificationAuthority.info $(prefix)/ $(install) src/accredited/USERTrustRSACertificationAuthority.namespaces $(prefix)/ $(install) src/accredited/USERTrustRSACertificationAuthority.pem $(prefix)/ $(install) src/accredited/USERTrustRSACertificationAuthority.signing_policy $(prefix)/ $(ln) -s USERTrustRSACertificationAuthority.pem $(prefix)/35105088.0 $(ln) -s USERTrustRSACertificationAuthority.pem $(prefix)/fc5a8f99.0 $(ln) -s USERTrustRSACertificationAuthority.signing_policy $(prefix)/35105088.signing_policy $(ln) -s USERTrustRSACertificationAuthority.signing_policy $(prefix)/fc5a8f99.signing_policy $(ln) -s USERTrustRSACertificationAuthority.namespaces $(prefix)/35105088.namespaces $(ln) -s USERTrustRSACertificationAuthority.namespaces $(prefix)/fc5a8f99.namespaces cilogon-basic: prep $(install) src/accredited/cilogon-basic.crl_url $(prefix)/ $(install) src/accredited/cilogon-basic.info $(prefix)/ $(install) src/accredited/cilogon-basic.namespaces $(prefix)/ $(install) src/accredited/cilogon-basic.pem $(prefix)/ $(install) src/accredited/cilogon-basic.signing_policy $(prefix)/ $(ln) -s cilogon-basic.pem $(prefix)/28776852.0 $(ln) -s cilogon-basic.pem $(prefix)/c2868627.0 $(ln) -s cilogon-basic.signing_policy $(prefix)/28776852.signing_policy $(ln) -s cilogon-basic.signing_policy $(prefix)/c2868627.signing_policy $(ln) -s cilogon-basic.namespaces $(prefix)/28776852.namespaces $(ln) -s cilogon-basic.namespaces $(prefix)/c2868627.namespaces cilogon-openid: prep $(install) src/experimental/cilogon-openid.crl_url $(prefix)/ $(install) src/experimental/cilogon-openid.info $(prefix)/ $(install) src/experimental/cilogon-openid.namespaces $(prefix)/ $(install) src/experimental/cilogon-openid.pem $(prefix)/ $(install) src/experimental/cilogon-openid.signing_policy $(prefix)/ $(ln) -s cilogon-openid.pem $(prefix)/3d863bc5.0 $(ln) -s cilogon-openid.pem $(prefix)/9629661e.0 $(ln) -s cilogon-openid.signing_policy $(prefix)/3d863bc5.signing_policy $(ln) -s cilogon-openid.signing_policy $(prefix)/9629661e.signing_policy $(ln) -s cilogon-openid.namespaces $(prefix)/3d863bc5.namespaces $(ln) -s cilogon-openid.namespaces $(prefix)/9629661e.namespaces cilogon-silver: prep $(install) src/accredited/cilogon-silver.crl_url $(prefix)/ $(install) src/accredited/cilogon-silver.info $(prefix)/ $(install) src/accredited/cilogon-silver.namespaces $(prefix)/ $(install) src/accredited/cilogon-silver.pem $(prefix)/ $(install) src/accredited/cilogon-silver.signing_policy $(prefix)/ $(ln) -s cilogon-silver.pem $(prefix)/10718cba.0 $(ln) -s cilogon-silver.pem $(prefix)/01b5d333.0 $(ln) -s cilogon-silver.signing_policy $(prefix)/10718cba.signing_policy $(ln) -s cilogon-silver.signing_policy $(prefix)/01b5d333.signing_policy $(ln) -s cilogon-silver.namespaces $(prefix)/10718cba.namespaces $(ln) -s cilogon-silver.namespaces $(prefix)/01b5d333.namespaces eMudhra-TrustedRootCAC4: prep $(install) src/accredited/eMudhra-TrustedRootCAC4.crl_url $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC4.info $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC4.namespaces $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC4.pem $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC4.signing_policy $(prefix)/ $(ln) -s eMudhra-TrustedRootCAC4.pem $(prefix)/ce7c88d6.0 $(ln) -s eMudhra-TrustedRootCAC4.pem $(prefix)/7b8f55da.0 $(ln) -s eMudhra-TrustedRootCAC4.signing_policy $(prefix)/ce7c88d6.signing_policy $(ln) -s eMudhra-TrustedRootCAC4.signing_policy $(prefix)/7b8f55da.signing_policy $(ln) -s eMudhra-TrustedRootCAC4.namespaces $(prefix)/ce7c88d6.namespaces $(ln) -s eMudhra-TrustedRootCAC4.namespaces $(prefix)/7b8f55da.namespaces eMudhra-TrustedRootCAC5: prep $(install) src/accredited/eMudhra-TrustedRootCAC5.crl_url $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC5.info $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC5.namespaces $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC5.pem $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC5.signing_policy $(prefix)/ $(ln) -s eMudhra-TrustedRootCAC5.pem $(prefix)/bb5c243e.0 $(ln) -s eMudhra-TrustedRootCAC5.pem $(prefix)/fd3270d3.0 $(ln) -s eMudhra-TrustedRootCAC5.signing_policy $(prefix)/bb5c243e.signing_policy $(ln) -s eMudhra-TrustedRootCAC5.signing_policy $(prefix)/fd3270d3.signing_policy $(ln) -s eMudhra-TrustedRootCAC5.namespaces $(prefix)/bb5c243e.namespaces $(ln) -s eMudhra-TrustedRootCAC5.namespaces $(prefix)/fd3270d3.namespaces egee-ne-benelux-tutorial: prep $(install) src/unaccredited/egee-ne-benelux-tutorial.crl_url $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.info $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.namespaces $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.pem $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.signing_policy $(prefix)/ $(ln) -s egee-ne-benelux-tutorial.pem $(prefix)/8c13c962.0 $(ln) -s egee-ne-benelux-tutorial.pem $(prefix)/3ccc03a5.0 $(ln) -s egee-ne-benelux-tutorial.signing_policy $(prefix)/8c13c962.signing_policy $(ln) -s egee-ne-benelux-tutorial.signing_policy $(prefix)/3ccc03a5.signing_policy $(ln) -s egee-ne-benelux-tutorial.namespaces $(prefix)/8c13c962.namespaces $(ln) -s egee-ne-benelux-tutorial.namespaces $(prefix)/3ccc03a5.namespaces emSignClass1CAG1: prep $(install) src/accredited/emSignClass1CAG1.crl_url $(prefix)/ $(install) src/accredited/emSignClass1CAG1.info $(prefix)/ $(install) src/accredited/emSignClass1CAG1.namespaces $(prefix)/ $(install) src/accredited/emSignClass1CAG1.pem $(prefix)/ $(install) src/accredited/emSignClass1CAG1.signing_policy $(prefix)/ $(ln) -s emSignClass1CAG1.pem $(prefix)/3f374f31.0 $(ln) -s emSignClass1CAG1.pem $(prefix)/7731131e.0 $(ln) -s emSignClass1CAG1.signing_policy $(prefix)/3f374f31.signing_policy $(ln) -s emSignClass1CAG1.signing_policy $(prefix)/7731131e.signing_policy $(ln) -s emSignClass1CAG1.namespaces $(prefix)/3f374f31.namespaces $(ln) -s emSignClass1CAG1.namespaces $(prefix)/7731131e.namespaces emSignRootCAG1: prep $(install) src/accredited/emSignRootCAG1.crl_url $(prefix)/ $(install) src/accredited/emSignRootCAG1.info $(prefix)/ $(install) src/accredited/emSignRootCAG1.namespaces $(prefix)/ $(install) src/accredited/emSignRootCAG1.pem $(prefix)/ $(install) src/accredited/emSignRootCAG1.signing_policy $(prefix)/ $(ln) -s emSignRootCAG1.pem $(prefix)/f459871d.0 $(ln) -s emSignRootCAG1.pem $(prefix)/2923b3f9.0 $(ln) -s emSignRootCAG1.signing_policy $(prefix)/f459871d.signing_policy $(ln) -s emSignRootCAG1.signing_policy $(prefix)/2923b3f9.signing_policy $(ln) -s emSignRootCAG1.namespaces $(prefix)/f459871d.namespaces $(ln) -s emSignRootCAG1.namespaces $(prefix)/2923b3f9.namespaces emSignSSLCAG1: prep $(install) src/accredited/emSignSSLCAG1.crl_url $(prefix)/ $(install) src/accredited/emSignSSLCAG1.info $(prefix)/ $(install) src/accredited/emSignSSLCAG1.namespaces $(prefix)/ $(install) src/accredited/emSignSSLCAG1.pem $(prefix)/ $(install) src/accredited/emSignSSLCAG1.signing_policy $(prefix)/ $(ln) -s emSignSSLCAG1.pem $(prefix)/3b79d6a7.0 $(ln) -s emSignSSLCAG1.pem $(prefix)/bb6f8a15.0 $(ln) -s emSignSSLCAG1.signing_policy $(prefix)/3b79d6a7.signing_policy $(ln) -s emSignSSLCAG1.signing_policy $(prefix)/bb6f8a15.signing_policy $(ln) -s emSignSSLCAG1.namespaces $(prefix)/3b79d6a7.namespaces $(ln) -s emSignSSLCAG1.namespaces $(prefix)/bb6f8a15.namespaces emigtfc4: prep $(install) src/accredited/emigtfc4.crl_url $(prefix)/ $(install) src/accredited/emigtfc4.info $(prefix)/ $(install) src/accredited/emigtfc4.namespaces $(prefix)/ $(install) src/accredited/emigtfc4.pem $(prefix)/ $(install) src/accredited/emigtfc4.signing_policy $(prefix)/ $(ln) -s emigtfc4.pem $(prefix)/74921d64.0 $(ln) -s emigtfc4.pem $(prefix)/35b92ebb.0 $(ln) -s emigtfc4.signing_policy $(prefix)/74921d64.signing_policy $(ln) -s emigtfc4.signing_policy $(prefix)/35b92ebb.signing_policy $(ln) -s emigtfc4.namespaces $(prefix)/74921d64.namespaces $(ln) -s emigtfc4.namespaces $(prefix)/35b92ebb.namespaces emigtfc5: prep $(install) src/accredited/emigtfc5.crl_url $(prefix)/ $(install) src/accredited/emigtfc5.info $(prefix)/ $(install) src/accredited/emigtfc5.namespaces $(prefix)/ $(install) src/accredited/emigtfc5.pem $(prefix)/ $(install) src/accredited/emigtfc5.signing_policy $(prefix)/ $(ln) -s emigtfc5.pem $(prefix)/e8733aca.0 $(ln) -s emigtfc5.pem $(prefix)/51302da6.0 $(ln) -s emigtfc5.signing_policy $(prefix)/e8733aca.signing_policy $(ln) -s emigtfc5.signing_policy $(prefix)/51302da6.signing_policy $(ln) -s emigtfc5.namespaces $(prefix)/e8733aca.namespaces $(ln) -s emigtfc5.namespaces $(prefix)/51302da6.namespaces emigtfc5r1: prep $(install) src/accredited/emigtfc5r1.crl_url $(prefix)/ $(install) src/accredited/emigtfc5r1.info $(prefix)/ $(install) src/accredited/emigtfc5r1.namespaces $(prefix)/ $(install) src/accredited/emigtfc5r1.pem $(prefix)/ $(install) src/accredited/emigtfc5r1.signing_policy $(prefix)/ $(ln) -s emigtfc5r1.pem $(prefix)/59ce6b19.0 $(ln) -s emigtfc5r1.pem $(prefix)/95ccd7e3.0 $(ln) -s emigtfc5r1.signing_policy $(prefix)/59ce6b19.signing_policy $(ln) -s emigtfc5r1.signing_policy $(prefix)/95ccd7e3.signing_policy $(ln) -s emigtfc5r1.namespaces $(prefix)/59ce6b19.namespaces $(ln) -s emigtfc5r1.namespaces $(prefix)/95ccd7e3.namespaces nl-e-infra-zero: prep $(install) src/unaccredited/nl-e-infra-zero.crl_url $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.info $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.namespaces $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.pem $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.signing_policy $(prefix)/ $(ln) -s nl-e-infra-zero.pem $(prefix)/338a3561.0 $(ln) -s nl-e-infra-zero.pem $(prefix)/79863311.0 $(ln) -s nl-e-infra-zero.signing_policy $(prefix)/338a3561.signing_policy $(ln) -s nl-e-infra-zero.signing_policy $(prefix)/79863311.signing_policy $(ln) -s nl-e-infra-zero.namespaces $(prefix)/338a3561.namespaces $(ln) -s nl-e-infra-zero.namespaces $(prefix)/79863311.namespaces seegrid-ca-2013: prep $(install) src/accredited/seegrid-ca-2013.crl_url $(prefix)/ $(install) src/accredited/seegrid-ca-2013.info $(prefix)/ $(install) src/accredited/seegrid-ca-2013.namespaces $(prefix)/ $(install) src/accredited/seegrid-ca-2013.pem $(prefix)/ $(install) src/accredited/seegrid-ca-2013.signing_policy $(prefix)/ $(ln) -s seegrid-ca-2013.pem $(prefix)/da213f5b.0 $(ln) -s seegrid-ca-2013.pem $(prefix)/ad9d1b74.0 $(ln) -s seegrid-ca-2013.signing_policy $(prefix)/da213f5b.signing_policy $(ln) -s seegrid-ca-2013.signing_policy $(prefix)/ad9d1b74.signing_policy $(ln) -s seegrid-ca-2013.namespaces $(prefix)/da213f5b.namespaces $(ln) -s seegrid-ca-2013.namespaces $(prefix)/ad9d1b74.namespaces igtf-policy-installation-bundle-1.135/README.txt0000644001343500074740000001245315004136237020715 0ustar davidgdavidgIGTF Authority Trust Anchor Installation Bundle version 1.135 ----------------------------------------------------------------- (release 1, issued on Tuesday, 29 Apr, 2025) This installation bundle contains the trust anchor sources for all IGTF distributed authorities. It must be configured before use, as explained below. Use "make install" to actually copy a configured source repository to the specified location. The structure of this installation tar-ball is as follows: / README configure Makefile src/ accredited/ unaccredited/ experimental/ where the source trust anchors (all of them) are located in their appropriate subdirectories under "src/". Note that of these trust anchors, ONLY THE ONES UNDER "src/accredited/" ARE PART OF THE IGTF TRUST FABRIC. The others you install antirely at your OWN RISK. This bundle is primarily intended for re-packagers. Relying parties that use the pre-built and signed (policy) RPMs directly need not configure or install this bundle package. The RPM distribution is self-consistent and complete. Note that specific individual CAs can also be installed directly from their individual tar-balls in the "accredited/tgz/" directory. This tar-ball can be obtained from the PMA repositories, e.g. from http://dist.eugridpma.info/distribution/igtf/current/ Configuration of your distribution ---------------------------------- Use the "./configure" script to select the profiles and authorities you want to be installed in your trust anchor repository. After the initial configuration step, you will also need to "install" the trust achors in the target area using the "make install" command. Configure --------- The "./configure" script takes some of the arguments usually encountered in the GNU autoconf context, such as "--prefix". Ther are two arguments specific to the IGTF distribution: "--with-profile=" The "profiles" correspond to *all* Authorities accredited by any of the IGTF member PMAs under a specific profile: classic -- Traditional X.509 Authorities with Secured Infrastructure slcs -- Short-Lived Credential generation Services mics -- Member Integrated Credential generation Services iota -- Identifier-Only Trust Assurance Services - PLEASE read profile first at https://www.eugridpma.org/guidelines/IOTA/ Notes: * there is no collective installation for experimental or unaccredited CAs, as there are no assertions made by the PMAs regarding such experimental or unaccredited authority trust anchors. * You can repeat the "--with-profile=" stanza to select multiple profiles Example: ./configure --with-profile=classic --with-profile=slcs && make install "--with-authority=" Add specific named authorities to the trust configuration. The names of these authorities can be found in the ".info" file associated with the trust anchor sources. You can repeat the "--with-authority=" stanza to add multiple authorities. Specific authorities are added *in addition* to those selected with the "--with-profile=" option. Example: ./configure --with-profile=classic --with-authority=FNAL_KCA "--prefix" The location where the root certificates and the information files will be stored. Full syntax: [--prefix=path] Installation path default: /etc/grid-security/certificates [--with-mkdir=path] name of mkdir program supporting -p default: mkdir [--with-install=path] name of the BSD install programme default: install [--with-profile=profile] selected CA accreditation profile default: (none) (multiple profiles can be selected) [--with-authority=ca] selected a specific (additional) CA default: (none) (multiple CAs can be selected) Installing your distribution ---------------------------- After configuration, you will have a "Makefile" in the current directory. You should "make install" these to copy the files to the specified trust anchor directory. This directory is by default set to "/etc/grid-security/certificates/", but may be directed to other locations. In this directory, you will now find for each Authority: .0 -- the PEM-formatted certificate of this authority .info -- Authority meta-data, suh as the common alias, the web site URL, and an email address for concerns .crl_url -- location (http) of the current CRL issued by this authority .signing_policy -- the EACL formatted list of namespace constraints, specifying with subject names are subject to the IGTF managed namespace. The assertions of the IGTF only extend to subject names within this namespace .namespaces -- alternate format of the same namespace constraints. See http://www.eugridpma.org/documentation/ for a full description of this format. Uninstall --------- Automatic un-install of the bundle is not supported. Please look carefully at the CHANGES file provided with each release to determine which CAs have been obsoleted or withdrawn. igtf-policy-installation-bundle-1.135/LICENSE0000644001343500074740000000400215004136237020213 0ustar davidgdavidgLicensing The International Grid Trust Federation (IGTF) distributes or re- distributes information and data related to the trust fabric. This distribution contains information generated collectively, as well as contributions by members and third parties. Trust Anchors are owned by the respective authorities or their contractors, and are made available by their owners under the Creative Common Attribution 3.0 "CC-BY-3.0" (unported) license (http://creativecommons.org/licenses/by/3.0). The following trust anchor meta-data: 'info' meta-data file, crl-url file, signing policy files, namespaces files, and the distribution documentation (including change log and release notes) are owned jointly and individually by the members of the Policy Management Authorities participating in the International Grid Trust Federation. These data are made available under the Creative Common Attribution 3.0 "CC-BY-3.0" (unported) license (http://creativecommons.org/licenses/by/3.0). Selected trust anchors from third parties have been obtained from web browser distributions by Mozilla and have been verified for correctness with respect to their original versions. These portions are reproduced without modification as part of this larger work, as per the Mozilla Public License 1.1, section 2.1 sub a "MPL 1.1" (http://www.mozilla.org/MPL/MPL-1.1.html). Unless specifically stated otherwise, these licenses extend solely to the trust anchors and the directly associated meta-data listed above and does not extend to the Certificate Policy (CP) document, the Certificate Practice Statements (CPS), or any other documentation, software, or services made available by the member authorities or others. CP, CPS, and any other information provided is owned by the respective members and subject to the license conditions stated therein. Anyone using the Distribution is specifically reminded of sections 5 and 6 of the CC-BY-3.0 license, as well as sections 7 and 9 of the MPL 1.1. igtf-policy-installation-bundle-1.135/CHANGES0000644001343500074740000014021615004136237020211 0ustar davidgdavidgCHANGES ------- This file lists changes made to the IGTF Trust Anchor distribution. Please refer to the README.txt file for additional information on installing the Distribution and to be informed about important information on distribution lay-out. Changes from 1.134 to 1.135 --------------------------- (5 May 2025) * Updated SlovakGrid trust anchor with extended validity (SK) * Withdrawn discontinued HPCI CA (JP) NOTE: the _default_ package signing key has changed to the 4th generation for increased security and compatibility. The new key is a 2048 bit RSA with fingerprint 565F4528EAD3F53727B5A2E9B055005676341F1A. The GPG public key file can be retrieved from https://dl.igtf.net/distribution/current/GPG-KEY-EUGridPMA-RPM-4 and imported on rpm-based distributions with 'rpmkeys --import ' or on Debian (apt) based systems set in Signed-By in sources.list or added as a file in /etc/apt/trusted.gpg.d/ This change was first announced in the 1.122 release (August 2023), but a distribution signed with the generation-3 key remains available. A signature of the gen-4 key signed by the gen-3 GPG key is available from https://dl.igtf.net/distribution/current/ for validation. Changes from 1.133 to 1.134 --------------------------- (5 March 2025) * New ANSPGrid CA 2 roll-over for root-issuer key pair (BR) * Withdrawn discontinued AC-GRID-FR series authorities (FR) Changes from 1.132 to 1.133 --------------------------- (21 February 2025) * Updated re-issued GridCanada root with extended validity period (CA) * Added GEANT TCS Generation 5 TLS and Auth ICAs and corresponding HARICA and private trust roots (EU) * updated SHA-256 root CA for RDIG mitigating EL9/FedoraCore deprecation * MARGI put on hold due to domainname resolution issues (MK) Changes from 1.131 to 1.132 --------------------------- (16 December 2024) * added new trust anchor for TRGRID transition (TR) Changes from 1.130 to 1.131 --------------------------- (30 September 2024) * removed discontinued HKU-CA-2 authority (HK) * removed obsolete 3rd generation TCS intermediates (EU) Changes from 1.129 to 1.130 --------------------------- (1 July 2024) * resolve subjnectDN nameformat compatibility issues trust anchor metadata Changes from 1.128 to 1.129 --------------------------- (24 June 2024) * updated CRL URL location for MREN CA (ME) * removed discontinued TSU-GE GRENA CA (GE) * removed suspended BYGCA (BY) * removed discontinued LIP CA (PT) * removed obsolete DT transitional CAs (AE) Changes from 1.127 to 1.128 --------------------------- (11 March 2024) * updated CRL download URL for ArmeSFo (AM) Changes from 1.126 to 1.127 --------------------------- (19 February 2024) * added supplementary issuing CA Issuing CA IGTF - C5 - 1 for eMudhra (IN) * removed discontinued QuoVadis CAs QuoVadis-Grid-ICA-G2 QuoVadis-Root-CA2G3 QuoVadis-Root-CA2 and QuoVadis-Root-CA3G3 (BM) Changes from 1.125 to 1.126 --------------------------- (11 December 2023) * removed replaced InCommon IGTF Server CA and associated Comodo RSA CA (US) * removed discontinued UNLPGrid CA (CL) Changes from 1.124 to 1.125 --------------------------- (29 November 2023) * updated root certificate ArmeSFo CA with extended validity (AM) Changes from 1.123 to 1.124 --------------------------- (30 October 2023) * updated contact meta-data for ArmeSFo authority (AM) * removed discontinued AEGIS authority (RS) * removed suspended KENET Root and issuing CAs (KE) * removed suspended SDG-G2 authority (CN) * removed suspended CNIC authority (CN) * removed all four discontinued DigitalTrust CAs operated by their issuer (AE) Changes from 1.122 to 1.123 --------------------------- (4 September 2023) * Add ECC private trust hierarchy for GEANT (Research and Education) TCS (EU) * Added accrdited private trust eMudhra IGTF root and issuers (IN) Changes from 1.121 to 1.122 --------------------------- (7 August 2023) * Added private trust hierarchy for GEANT (Research and Education) TCS (EU) * Added accredited eMudhra joint public trust root and issuing CAs (IN) * Added private trust eMudhra IGTF root and issuers as experimental (IN, US) NOTICE: in future releases we will move to a new RSA-2048 GPG package signing key. The new public key file, GPG-KEY-EUGridPMA-RPM-4, is distributed with this and subsequent releases. You can retrieve the new public key file from https://dl.igtf.net/distribution/GPG-KEY-EUGridPMA-RPM-4 Changes from 1.120 to 1.121 --------------------------- (15 June 2023) * Added accredited (classic) InCommon RSA IGTF Server CA 3 under the Sectigo USERTrust RSA root, for which namespaces have been updated (US) Changes from 1.119 to 1.120 --------------------------- (30 May 2023) * Added transitional CDP mirror URLs for retiring DigitalTrust CAs (AE) * Removed discontinued NIIF-Root-CA-2 (HU) * Removed expiring GermanGrid (GridKA CrossGrid) CA (DE) Changes from 1.118 to 1.119 --------------------------- (13 March 2023) * Updated UKeScience Root (2007) wih consistent string encodings (UK) * Removed obsolete SHA1 subordinates DigiCertGridTrustCA-Classic and DigiCertGridCA-1-Classic from DigiCert, reflected in RPDNC namespaces * Experimental (non-accredited) new InCommon RSA IGTF Server CA 2 (ICA under Sectigo USERTrust RSA root, for which namespaces have been updated) (US) Changes from 1.117 to 1.118 --------------------------- (27 February 2023) * Updated GridCanada CA with re-issued SHA-2 based root (CA) * Updated CILogon basic, silver, and openid with re-issued SHA-2 certs (US) * Updated UKeScience Root (2007) re-issued with SHA-2, retired 2A ICA (UK) Changes from 1.116 to 1.117 --------------------------- (29 August 2022) * Add new intermediate ICA DigiCert Grid-TLS (US) * Add new intermediate ICA DigiCert Grid-Client-RSA2048-SHA256-2022-CA1 (US) * Removed discontinued NCSA-slcs-2013 following end of XSEDE (US) * Removed discontinued PSC-Myproxy-CA following end of XSEDE (US) * RPM packaging: rpm packages are now signed using a SHA-256 digest, file digests using algo 8 (SHA-256), and the yum/dnf listings are signed with SHA-256 as well. This removes support for yum-based distributions <=EL5 (for which ELS ended in November 2020), but allows installation of packages on EL9 (Rocky9, AlmaLinux9, &c) that require SHA-256. Changes from 1.115 to 1.116 --------------------------- (25 April 2022) * Updated intermediate CERN Grid CA ICA with extended validity (CERN) Changes from 1.114 to 1.115 --------------------------- (28 March 2022) * Removed obsolete CNRS2 CAs, superseded by AC-GRID-FR hierarchy (FR) * Add supplementary BCDR download location for UGRID-G2 CRL (UA) * Extended validity period of HPCI CA (JP) Changes from 1.113 to 1.114 --------------------------- (l7 January 2022) * Extended validity for SlovakGrid issuing CA (SK) Changes from 1.112 to 1.113 --------------------------- (4 October 2021) * Suspended MD-GRID CA due to network resolution issues (MD) Changes from 1.111 to 1.112 --------------------------- (16 August 2021) * Updated ANSPGrid CA with extended validity date (BR) Changes from 1.110 to 1.111 --------------------------- (24 May 2021) * Removed discontinued NERSC-SLCS CA (US) * Removed discontinued MYIFAM CA (MY) Changes from 1.109 to 1.110 --------------------------- (22 March 2021) * Removed INFN-CA-2015 that has disappeared operationally (IT) Changes from 1.108 to 1.109 --------------------------- (18 January 2021) * Removed discontinued DM private IGTF classic CAs (AE) * Removed obsolete QuoVadis-Root-CA1, under which no ICAs are left (BM) * Updated QV Grid ICA G2 intermediary following its re-issuance (BM) Changes from 1.107 to 1.108 --------------------------- (14 December 2020) * Added DigitalTrust classic IGTF specific and public trust IGTF CAs (AE) * Updated PCS MyProxy SLCS CRL URL location (US) Changes from 1.106 to 1.107 --------------------------- (4 August 2020) * retired DarkMatterSecureCA and DarkMatterAssuredCA (AE) * removed superseded PolishGrid CA (PL) * Added TCS G4 ECC trust anchors to accredited set (EU) Changes from 1.105 to 1.106 --------------------------- (4 May 2020) * Removed expiring AddTrust External CA Root (US) * Updated legacy DutchGrid (Nikhef MS) Root CA (NL) * Removed discontinued NCSA-tfca-2013 CA (US) * Added TCS G4 ECC trust anchors to experimental area (EU) Changes from 1.104 to 1.105 --------------------------- (30 March 2020) * Discontinued CERN-LCG-IOTA-CA following decommissioning by authority (CERN) * Added new G4 intermediates for the GEANT TCS service and supporting self-signed USERTrust RSA Root (EU) * Updated AddTrust External CA Root signing policy to support legacy UTN chains for GEANT TCS G4 (EU) Changes from 1.103 to 1.104 --------------------------- (29 January 2020) * Reinstated AddTrust External CA Root in parallel to Comodo RSA CA to ease transitionary period (US) Changes from 1.102 to 1.103 --------------------------- (27 January 2020) * Updated contact addresses for DigiCert (US) * Regrafted InCommon IGTF Server CA onto self-signed Comodo RSA CA (US) * Discontinued superfluous AddTrust External CA Root (US) * Discontinued AustrianGrid CA (AT) Changes from 1.101 to 1.102 --------------------------- (14 October 2019) * Added CESNET-CA-4 ICA accredited classic CA for issuer roll-over (CZ) Changes from 1.99 to 1.101 -------------------------- (24 June 2019, note: 1.100 was not issued) * added new trust anchor for PolishGrid (2019) for key roll-over (PL) * withdrawn discontinued CILogon OSG CA (US) Changes from 1.98 to 1.99 ------------------------- (27 May 2019) * withdrawn superseded HKU CA (HK) * withdrawn discontinued CyGrid CA following migration to TCS (CY) Changes from 1.97 to 1.98 ------------------------- (29 Apr 2019) * withdrawn superseded IRAN-GRID authority (IR) Changes from 1.96 to 1.97 ------------------------- (25 Mar 2019) * temporarily withdrawn EG-GRID 4a96b1ea for network availability reasons (EG) Changes from 1.95 to 1.96 ------------------------- (25 Feb 2019) * withdrawn superseded QuoVadis-Grid-ICA (1st gen) CA (BM) * added new trust anchor MD-Grid-CA-T for rollover of existing CA (MD) * discontinued expiring 2009 series MD-Grid-CA (MD) Changes from 1.94 to 1.95 ------------------------- (26 Nov 2018) * Updated namespaces and signing_policy files for CILogon Silver CA to permit DNs without "/C=US" (US) Changes from 1.93 to 1.94 ------------------------- (29 Oct 2018) * extended validity period for the ArmeSFo CA (AM) * withdrawn expiring DFN-SLCS CA (DE) Changes from 1.92 to 1.93 ------------------------- (24 Sep 2018) * Updated contact information for HellasGrid-CA (GR) * Removed superseded IGCA CA (IN) Changes from 1.91 to 1.92 ------------------------- (25 Jun 2018) * Added HKU CA 2 trust anchor during transitioning period (HK) Changes from 1.90 to 1.91 ------------------------- (14 May 2018) * Updated MREN CA with extended validity period (ME) Changes from 1.89 to 1.90 ------------------------- (26 March 2018) * Added new Grid-FR hierarchy for Renater (AC-GRID-FR series) (FR) * Added new GARUDAINDIA2 root for key roll-over IGCA (IN) * Updated contact metadata for UNAM trust anchors (MX) Changes from 1.88 to 1.89 ------------------------- (8 January 2018) * Discontinued expiring UGRID (2008) root CA (UA) Changes from 1.87 to 1.88 ------------------------- (27 November 2017) * updated UKeScience 2B ICA based on a SHA-2 family digest (UK) * added new PKIUNAMgrid (2017) trust anchor for roll-over (MX) Changes from 1.86 to 1.87 ------------------------- (30 October 2017) * added new accredited classic DarkMatter Private Root G4 and ICA (AE) * updated PK-Grid-2007 trust anchor with extended validity period (PK) * extended validity period for UNAMgrid-ca trust anchor (MX) Changes from 1.85 to 1.86 ------------------------- (9 October 2017) * updated MaGrid CA with extended validity period (MA) * removed discontinued pkIRISGrid CA (ES) * discontinued depricated yum v2 and rpm-apt package management support (only affects yum installs on RHEL/CentOS2+3, Fedora Core 1-3, and bespoke support for installing RPM packages using APT for pre-2006 RedHat systems) Changes from 1.84 to 1.85 ------------------------- (31 July 2017) * Updated URL domain information for CyGrid (CY) Changes from 1.83 to 1.84 ------------------------- (26 June 2017) * Updated ROSA root certificate with extended 20yr valitity (RO) * Updated contact details for CyGrid CA following transition to CYNET (CY) * Removed obsoleted KISTI-2007 trust anchor - replaced by KISTIv3 (KR) * Removed expiring LACGrid trust anchor a9082267 (BR) * Added UK Pathfinder AAAI CA 1 to unaccredited (misc) area (UK) Changes from 1.82 to 1.83 ------------------------- (29 May 2017) * Added new trust anchor for accredited KISTI CA v3 (KR) * Removed obsolete GEANT TCS G1 and G2 (old Comodo-backed) trust anchors: UTN-USERFirst-Hardware TERENA-eScience-SSL-CA AAACertificateServices UTNAAAClient TERENAeSciencePersonalCA UTN-USERTrust-RSA-CA TERENA-eScience-SSL-CA-2 TERENAeSciencePersonalCA2 (EU) Changes from 1.81 to 1.82 ------------------------- (27 March 2017) * Added new G2 UGrid trust anchor (UA) * Extended validity for AEGIS CA (RS) * Withdrawn discontinued FNAL KCA (US) * Extended valitity for REUNA CA (CL) Changes from 1.80 to 1.81 ------------------------- (28 February 2017) * Added accredited DarkMatter classic QV-intermediate ICAs (AE) including QuoVadis Root CA 2 G3 and Root CA 3 G3 higher level CAs (BM) * Updated contact information for EUN EG-GRID CA (EG) * Withdrawn classic UKeScienceCA-2A in advance of repurposing (UK) Changes from 1.79 to 1.80 ------------------------- (30 January 2017) * Discontinued BEGrid2008 (BELNET) classic authority (BE) Changes from 1.78 to 1.79 ------------------------- (28 November 2016) * Updated UNLPGrid CA with extended validity period (AR) * Fix regular expressions in CILogon and NCSA CA namespaces files (US) * Included rollover CA IRAN-GRID-CGC-G2 (IR) * Corrected an incorrect line in selected info files for DigiCert (US) * Discontinued expiring NECTEC CA (TH) Changes from 1.77 to 1.78 ------------------------- (5 October 2016) * Removed superseded INFN-CA-2006 CA (IT) * Updated Debian packaging to support APT security improvements Changes from 1.76 to 1.77 ------------------------- (26 September 2016) * Updated namespaces and signing_policy files for CILogon Basic CA to permit DNs without "/C=US" (US) * Added G2 series (sha-2) QuoVadis Root 2 and Grid ICA G2 (BM) * Removed discontinued UniandesCA (CO) Changes from 1.75 to 1.76 ------------------------- (25 July 2016) * Added accredited RCauth.eu IOTA CA and associated root (EU) * Added DutchGrid Root G1 (NL) Changes from 1.74 to 1.75 ------------------------- (27 June 2016) * Discontinued expired UFF BrGrid CA (BR) * Discontinued expired HellasGrid-2006 and associated Root (GR) Changes from 1.73 to 1.74 ------------------------- (16 May 2016) * Removed superseded NorduGrid (2006) CA (DK) * Added HellasGrid 2016 CA (GR) Changes from 1.72 to 1.73 ------------------------- (28 March 2016) * Updated key pair for SDG CA G2 (CN) * Revised URL to point to http endpoint for CERN IOTA ICA CRL (CERN) * Added date field to Debain Release file to work around APT bug 809329 * Added an InRelease file for changing Debian packaging * Added experimental DCA Root G1 and RCauth.eu Pilot ICA G1 (NL, EU) Changes from 1.71 to 1.72 ------------------------- (29 February 2016) * Added roll-over subordinate for the SDG CA G2 (CN) * Added CERN LCG IOTA CA (CERN) * Updated PSC MyProxy CA with extended validity (US) Changes from 1.70 to 1.71 ------------------------- (25 January 2016) * Added accredited classic KENET ICA and associated Root (KE) * Removed expiring SDG CA (CN) * Updated CyGrid Root CA with extended validity period (CY) * Updated BG-ACAD-CA with extended validity period (BG) Changes from 1.69 to 1.70 ------------------------- (30 November 2015) * Updated CRL URL hosted by KIT for ArmeSFO (AM) * Added NorduGrid 2015 trust anchor (DK,NO,SE,FI,IS) * Discontinued superseded DigiCertGridCA-1G2-Classic (US) Changes from 1.68 to 1.69 ------------------------- (26 October 2015) * Added new INFN "2015" CA as roll-over of the 2006 instance (IT) * Added new CILogon OSG CA (US) * Discontinued BalticGrid CA (EE) Changes from 1.67 to 1.68 ------------------------- (5 October 2015) * Discontinued CALG CA (LV) * Added experimental KENET CAs (KE) Changes from 1.65 to 1.67 ------------------------- (31 August 2015 - release jump, skipping 1.66) * Discontinued NCSA-mics CA (US) * Withdrawn G2 root for IPM CA (IR) Changes from 1.64 to 1.65 ------------------------- (29 June 2015) * Discontinued NAREGI CA (JP) * Added addition G2 root for IPM CA (IR) * Added new subjectdn attribute to the trust anchor and profile meta-data files to aid monitoring and authentication-profile based access control mechanism use cases. See http://wiki.eugridpma.org/Main/IGTFInfoFile (ALL) Changes from 1.63 to 1.64 ------------------------- (1 June 2015) * Extended validity period of the BalticGrid CA (EE,LT,LV) * Removed obsolete NICS-MyProxy CA (US) * Added revised DigiCertGridCA-1G2-Classic-2015 Classic CA (US) * Updated CRL URL information for TCS G3 by preferring secondary URI (EU) * Updated RDIG CA with extended validity self-signed root (RU) * Removed obsolete NCSA-slcs CA, replaced by NCSA-slcs-2013 (US) Changes from 1.62 to 1.63 ------------------------- (30 March 2015) * Removed obsoleted and replaced NIIF CA (HU) * Extended validity period of the KEK CA (JP) * Removed obsoleted d254cc30/CERN-Root 1d879c6c/CERN-TCA anchors (CERN) * Updated RPDNC namespaces to permit DigiCert Grid Trust G2 ICAs for DigiCert Assured ID Root CA (US) * Updated RPDNC namespaces and signing_policy files for G2 series DigiCert Grid CAs pending ICA reissuance for reverse RDN issue (US) * Nomalised cond_subject syntax for multiple signing policy files cilogon-basic cilogon-silver InCommon-IGTF-Server-CA NCSA-slcs-2013 NCSA-tfca-2013 Comodo-RSA-CA Changes from 1.61 to 1.62 ------------------------- (23 February 2015) * Added Root CA 2 for NIIF (HU) * Extended validity period for pkIRISgrid CA (ES) * Updated DigiCert root CA meta-data in preparation for TCS (US) * Included GEANT TCS CA G3 trust anchors (EU) * Temporarily suspended HIAST/74c6eaeb for operational reasons (SY) * Discontinued ULAGrid-CA-2008 CA (VE) * Discontinued NCHC CA (TW) Changes from 1.60 to 1.61 ------------------------- (1 December 2014) * Added new IPv6-capable crl_url entries for NCSA and CILogon CAs (US) * Added accredited TSU (Georgia) CA (GE) * Extended life time and updated digest function of AustrianGrid CA (AT) Changes from 1.59 to 1.60 ------------------------- (27 October 2014) * Added new SHA-2 hierarchies for TERENA Certificate Service (ed. 2009) (EU) Changes from 1.58 to 1.59 ------------------------- (29 September 2014) * Added accredited mics HPCI CA (JP) * Updated crl_url for NCSA-slcs-2013 and NCSA-tfca-2013 (US) * Renamed QuoVadis classic grid issuing CA to QuoVadis-Grid-ICA (CH, BM) Changes from 1.57 to 1.58 ------------------------- (30 June 2014) * Added accredited classic InCommon Server IGTF SSL CA and intermediate Comodo RSA CA (SHA-2) (US) * Extended permitted namespaces for AddTrust-External-CA-Root (EU, US) * Updated CILogon Basic CA from experimental to accredited:iota (US) * Updated certificate URL for IHEP-CA-2013 39d30eba (CN) * Discontinued expiring SEE-GRID '2004' CA - since replaced by new SEEGRID-CA-2013 (GR) * Discontinued retired PRAGMA-UCSD CA (US) Changes from 1.56 to 1.57 ------------------------- (2 June 2014) * Discontinued obsoleted IHEP (2009) CA ba2f39ca (CN) * Removed discontinued NCSA Two Factor CA following migration to NCSA Two Factor CA 2013 (US) Changes from 1.55 to 1.56 ------------------------- (31 March 2014) * Removed discontinued SWITCHslcs2011 and associated Root (CH) * Removed discontinued APAC CA (AU) * Removed discontinued DoEGrids CA and ESnet root (US) * Add reference to CA website for AustrianGrid CA (AT) * Add new subordinates for DigiCert: 1cdf1cd9/DigiCertGridCA-1G2-Classic and 5d9ea26d/DigiCertGridTrustCAG2-Classic (US) * Add meta-package for the IOTA-accredited CAs. Please note that there are no IOTA accredited CAs as this point in time. For specifications see https://www.eugridpma.org/guidelines/IOTA/ * Debian packaging dependencies in meta-packages now correctly use all- lower-case package names throughout Changes from 1.54 to 1.55 ------------------------- (25 November 2013) THIS RELEASE IS THE LAST ONE ALSO TO BE DISTRIBUTED IN SINGLE HASH FORMAT * New root certificate with extended life time for NorduGrid CA 1f0e8352 (DK) * Updated contact metadata for all RENATER Grid-FR related CAs (FR) * Updated CRL URL and metadata for IHEP 2013 CA 39d30eba (CN) * New root certificates for NCSA CA re-key: MyProxy CA 2013 c36f6349/7aa2b7bd and Two Factor CA 2013 ca157cee/48c8f10a (US) * New root certificate for EGI catch-all CA "SEEGRID-CA-2013" 772dbd1c (GR) * Removed AIST Grid CA (JP) * Discontinued IUCC CA (6fee79b0) following migration to TCS (IL) * Suspended JUnet-CA (b3222f9e) (JO) * Removed expired unaccredited CAs (misc) * Added unaccredited worthless NL e-Infra Zero tutorial CA 338a3561 (NL) Changes from 1.53 to 1.54 ------------------------- (24 June 2013) * Extended life time of Grid-KA CA (dd4b34ea) (DE) * Added new CERN hierarchy for CERN IT/IS CA (SHA2 migration) (CH) * Updated metadata for GridGermany DFN-CERT CAs (DE) * Updated contact metadata for KEK (JP) * Updated contact metadata for HKU (HK) * Updated contact metadata for AIST (JP) Changes from 1.52 to 1.53 ------------------------- (27 May 2013) * Added new root cert for IHEP CA (2013) (CN) * Removed retired NCSA GridShib CA (e8ac4b61) (US) * Removed backup crl_url locations for CILogon CAs due to future crl.doegrids.org shutdown. (US) * Removed retired TACC CAs (2ac09305, 684261aa, e5cc84c2) (US) * Updated NERSC CA (b93d6240) to extend validity and change to self-signed rather than subordinate to ESnet (US) Changes from 1.51 to 1.52 ------------------------- (26 January 2013) * Extended validity of ArmeSFo Root CA (d0c2a341) (AM) * Obsoleted UKeScienceCA-2007 and updated Root CRL URL and metadata (UK) * removed expiring and unaccredited 'convenience' CAs from the distribution (Thawte, ZA, TERENA SCS, BE) Changes from 1.50 to 1.51 ------------------------- (26 November 2012) * Due to the unfortunate closure of Grid-Ireland, the Grid-Ireland CA (1e43b9cc) has been discontinued (IE) * extended expiry date for CyGrid CA (afe55e66) (CY) Changes from 1.49 to 1.50 ------------------------- (24 September 2012) * Added accredited classic EG-GRID CA (EG) * Extended life time of UKeScience (2007) issuing CA (UK) Changes from 1.48 to 1.49 ------------------------- (30 July 2012) * Added ANSPGrid (126f0acf) classic CA (BR) * Extended root cert validity for CA ce33db76 to 20yr (IR) Changes from 1.47 to 1.48 ------------------------- (29 May 2012) * Extended life time of DFN GridGermany Root (1149214e) and CDPs (DE) Changes from 1.46 to 1.47 ------------------------- (30 April 2012) * Updates CA URL metadata and CRL for pkIRISGrid CA (ES) * Added accredited classic MYIFAM CA (MY) Changes from 1.45 to 1.46 ------------------------- (29 March 2012) * Removed discontinued CESNET (9b59ecad) CA (CZ) Changes from 1.44 to 1.45 ------------------------- (26 March 2012) * Added accredited NCSA 2-factor SLCS CA (US) Changes from 1.43 to 1.44 ------------------------- (30 January 2012) * Added accredited classic DigiCert CA chains (US) * Extended life time of UGRID root cert (UA) Changes from 1.42 to 1.43 ------------------------- (28 November 2011) * Added new SWITCHslcs 2011 CA, replacing SWITCHslcs 2009 (CH) * Updated contact information for SWITCH CAs (CH) * Added new accredited classic JUnet CA (JO) * Added additional CRL URL for DOEGrids CA in certificate and meta data (US) * Added additional CRL URL for ESnet Root CA in meta data (US) * Updated institute information for KIT in signing_policy file (DE) * Updated enrolment URLs for Grid-FR CA (FR) Changes from 1.41 to 1.42 ------------------------- (30 September 2011) * Corrected signing_policy file for UKeScience CA 2B (UK) Changes from 1.40 to 1.41 ------------------------- (26 September 2011) * Added accredited PSC MyProxy SLCS CA (US) * Updated CRL URL for LIPCA (PT) * Extended life time of SlovakGrid CA root (SK) * Added accredited DZ-eScience CA (DZ) * Added accredited NICS SLCS MyProxy CA (US) * Added new UK eScience issuing CAs 2A and 2B to allowed namespaces and removed superfluous signing policy entries (UK) * Normalised the certificate files (.0) for selected CAs in the 'old' format distribution. This does not affect the 'new' OpenSSL v1+ compatible release. Affected CAs are CESNET, NIKHEF, NIIF, DFN-GridGermany-Root, PSC-Myproxy-CA, and NERSC-SLCS. Old and new format files are now identical. * The "worthless" area, containing some files that are distributed merely for convenience for selected specific purposes, has been re-named to "unaccredited". Files contained in this directory must be treated with utmost care, and their inclusion in the distribution does not constitute any form of endorsement by the IGTF of these files or their content. * Added unaccredited InCommon Server CA to convenience directory (US) Changes from 1.39 to 1.40 ------------------------- (28 June 2011) * Corrected fingerprint meta-data for UniAndes CA (CO) Changes from 1.38 to 1.39 ------------------------- (27 June 2011) * Change of contact address for NAREGI CA (JP) * Change of contact address for GermanGrid CA (DE) * Added accredited classic HIAST CA (SY) * Added accredited classic Uni Andes CA (CO) * Extended life time of root certificate for SiGNET-CA (SI) * Extended life time of root certificate for Grid-Ireland (IE) * New issuing certificates (2A, 2B) for UKeScience (GB) * Updated extensions for DOEGrids-CA-1 issuing CA (US) Changes to unaccredited information: * Added experimental DZeScience CA (DZ) * Extended life time for unaccredited Benelux and NE tutorial CA cert and re-rooted namespace to new domain name (NL,BE) * Added worthless replacement gilda 2011 CA (IT) * Removed expired DutchDemo CA (NL) Changes from 1.37 to 1.38 ------------------------- (7 February 2011) * Updated meta-data info file for SRCE (HR) * Updated KEK CA root (617ff41b) with extended life time (JP) * Updated contact email address for ArmeSFo (AM) * Extended allowed namespace and new URL for SEE-GRID CA as EGI catch-all (EU) * Extended allowed namespace for NAREGI CA (JP) * Added accredited CILogin MICS CA (US) * Extended life time for NCSA CACL (MICS) CA (US) * Extended life time for NCSA MyProxy (SLCS) CA (US) * Extended life time for NorduGrid CA (DK,NO,SE,FI,SI) * Corrected namespaces file for TCS eScience Personal (EU) Changes from 1.36 to 1.37 ------------------------- (27 September 2010) * Added accredited classic TERENA eScience SSL CA and hierarchy (EU) * Discontinued NGO-Netrust CA (SG) * The OpenSSL1 compliant format no longer adds symlinks for info metadata (such references would result in multiple downloads of the same CRL data when used with FetchCRL3) * Corrected typo errors in namespaces file for AAACertificateServices (EU) * Added CILogon CAs in experimental area (US) Changes from 1.35 to 1.36 ------------------------- (25 June 2010) * Updated root certificate for PLGrid with corrected SAN extension (PL) Changes from 1.34 to 1.35 ------------------------- (11 June 2010) * Updated root certificate for SRCE with new extensions and life time (HR) * Updated root certificate for ROSA with new AKI extension and serial (RO) * Removed obsoleted CAs from experimental area (US) Changes from 1.33 to 1.34 ------------------------- (18 February 2010) * Corrected malformed EACL syntax in signing_policy for CESNET-Root-CA (CZ) Changes from 1.32 to 1.33 ------------------------- (15 February 2010) * Added accredited MICS TCS eScience Personal CA and hierarchy (EU) * Updated AustrianGrid root cert with extended life time (AT) * Updated PolishGrid CA with new contact and extended root CA life time (PL) * Removed expired CNRS-Grid-FR CA (has been superseded by CNRS2-Grid-FR) (FR) * Removed obsolete CNRS, CNRS-Projets CA (superceded by CNRS2 hierarchy) (FR) * Corrected namespaces file for BEGrid2008 (BE) * Added comment line to REUNA CA signing_policy file (CL) * Added new classic CESNET hierarchy "CESNET-CA-Root" and "CESNET-CA-3" (CZ) * Updated (re-rooted) selected UNaccredited CAs in the "worthless" area Changes from 1.31 to 1.32 ------------------------- (26 October 2009) * Updated country TLD in URLs and email for AEGIS CA (RS) * Updated contact information for CALC CA (LV) * Extended life time and updated profile or TR-Grid CA cert and CRL URL (TR) * Updated and added references to CP and CPS documents for the following authorities: HellasGrid (GR), ROSA (RO), DutchGrid (NL), IRAN-GRID (IR), and BYGCA (BY) * Withdrawn obsolete CAs SWITCH-Personal-2007, SwissSign-Root, SWITCH, SwissSign-Bronze, SwissSign-Silver, SWITCH-Server-2007 (CH) * Withdrawn expired and discontinued CA RMKI (HU) * Added persistently-named links to pre-installed accredited bundles * Added selected UNaccredited CAs to the "worthless" area Changes from 1.30 to 1.31 ------------------------- (28 July 2009) * Removed expired root certificate for BEGrid (03aa0ecb) (BE) * Removed expired and discontinued User and Server issuing CAs for DFN (fe102e03 and 34f8e29c) (DE) Changes from 1.29 to 1.30 ------------------------- (2 June 2009) * Updated contact meta-data for BYGCA, hash 709bed08 (BY) * Updated URLs for DFN Grid PKI public web pages (DE) * Added accredited NCSA GridShib SLCS CA (US) * Added accredited DFN SLCS CA (DE) * Added accredited TACC MICS CA (US) * Added accredited SWITCH (QuoVadis anchored) CAs (CH) * Added accredited FNAL-SLCS CA (US) Changes from 1.28 to 1.29 ------------------------- (4 May 2009) * Restored NGO-Netrust CA (SG) * Updated AIST Grid (CRL) URL metadata (JP) * Added accredited MD-Grid CA with hash 9ff26ea4 (MD) * Added accredited HKU Grid CA with hash 4798da47 (HK) * Updated signing policy file of APAC Grid CA (AU) * Added accredited classic BYGCA (Belarus) with hash 709bed08 (BY) * Updated namespace for the APAC CA (AU, NZ) Changes from 1.27 to 1.28 ------------------------- (10 March 2009) * Added accredited classic ULAGrid CA (VE) * Added accredited TACC Root and TACC Classic CAs (US) * Updated NERSC CRL URL download location (US) * Updated DOEGrids CRL URL download location (US) * Extended life time of NorduGrid CA (1f0e8352) (DK,SE,NO,FI,IS) * Added SigmaNet CALG CA (LV) * Updated AEGIS CA root certificate to reflect TLD name change (RS) * Added CRL for SWITCH-SLCS issuing CA and updated CA cert (304cf809) (CH) Other updates to miscellaneous CAs: * Worthless CA for EGEE "GILDA" testbed added to 'worthless' section (EU) Changes from 1.26 to 1.27 ------------------------- (30 January 2008) * Corrected signing namespace for BEGrid2008 CA (BE) * Added NERSC SLCS CA (US) * ASGCCA-2007 changed signature algorithm from MD5 to SHA1 (TW) * Added new CNRS2 hierarchy: CNRS2 -> CNRS2-Projets -> CNRS2-Grid-FR (FR) * Updated IUCC root certificate (IL) * Obsoleted EstonianGrid CA (EE) Changes from 1.25 to 1.26 ------------------------- (15 December 2008) * Added accredited classic Indian Grid CA (IGCA) (hash da75f6a8) (IN) * Updated IUCC root certificate with extended life time (IL) * Updated BEGrid (web, CRL) and UCSD-PRAGMA (web) URL metadata (BE, AP/US) * New BEGrid2008 root certificate (transitional) (BE) * Extended life time of the SEE-GRID CA (SEE) * Included CRL for NCSA SLCS CA (US) * Temporally removed NGO-Netrust CA (SG) * Withdrawn expired old PK-Grid CA (d2a353a5, superseded by f5ead794) (PK) * Experimentally added Texas Advanced Computer Center TACC Root, Classic, and MICS CAs to the experimental area (US) Changes from 1.24 to 1.25 ------------------------- (29 September 2008) * Added accredited classic NCHC CA (TW) * Updated metadata for AIST GRID CA (JP) * Updated AIST GRID CA (extended life time) based on same key pair (JP) * Updated metadata for APAC Grid CA (AU) * Updated metadata (CRL URL) for NGO-Netrust CA (SG) * updates to CA contact data in info files (EU, multiple) * updated certificates in the experimental or worthless areas (misc) Changes from 1.23 to 1.24 ------------------------- (29 July 2008) * Withdrawn NCHC (hash 71a89a47) for urgent operational reasons (TW) Changes from 1.22 to 1.23 ------------------------- (28 July 2008) * Updated metadata for CyGrid (CY), SlovakGrid (SK), Grid-FR (FR) and NCSA-SLCS and MICS (US) * Removed old UKeScienceRoot (8175c1cd) and UKeScience (adcbc9ef) that were replaced in 2006 by updated root and issuing CAs (UK) * Updated LIPCA certificate, based on same key pair (PT) * Added accredited classic MREN CA (ME) * Added NGO-Netrust (SG), PRAGMA-UCSD (PRAGMA), and NCHC (TW) Changes from 1.21 to 1.22 ------------------------- (09 June 2008) * updated extensions in PK-Grid-2007 root certificate (same keypair) (PK) * added accredited classic CA Iran-Grid (hash ce33db76) (IR) * withdrawn expired ASGCCA (hash a692434d) (TW) Changes from 1.20 to 1.21 ------------------------- (16 May 2008) * IMPORTANT update of the UKeScience Root and Issuing CAs (UK) Changes from 1.19 to 1.20 ------------------------- (17 March 2008) * Added accredited classic MARGI CA (MK) * Withdrawn expired SWITCH-Server-2006 and SWITCH-Personal-2006 CAs (CH) * Corrected namespace syntax for SWITCHaai CA (CH) * Updated namespace definitions in DFN GridGermany hierarchy (DE) * Added dependency of TERENA-SCS on GTE-CyberTrust-Global-Root. Note that neither the TERENA-SCS nor the GTE-CyberTrust-Global-Root are accredited. Changes from 1.18 to 1.19 ------------------------- (31 January 2008) * Added PK-Grid-2007 Root CA certificate (will supersede d2a353a5) (PK) * New contact email address for all PK-Grid CAs (PK) * Updated and extended lifetime of ArmeSFo root cert with same keypair (AM) * New CA certificate download locations for SwissSign CAs (CH) * New classic CA UGRID (hash 0a12b607) for the Ukraine (UA) * New classic CA UNAM-grid (hash 24c3ccde) for Mexico (MX) Changes from 1.17 to 1.18 ------------------------- (16 November 2007) * ASGCCCA-2007 added to Accredited Classic set again (TW) * Withdrawn expired CA "Spain" (hash 13eab55e) (ES) * Withdrawn expired CA "SiGNET" (hash 747183a5) (SI) * Withdrawn discontinued CA "CERN" (hash fa3af1d7) (INT) * Updated SWITCH (classic) signing namespace policies (CH) * Added UNLPGrid CA (classic, hash b7bcb7b2) (AR) * Added MaGrid CA (classic, hash 7b54708e) (MA) * New contact email address for the SlovakGrid CA (SK) * New UK e-Science CA hierarchy "-2007" added (98ef0ee5 and 367b75c3) Note: during the transition period, two hierarchies (both old and "2007") will be distributed. See accompanying newsletter for details (UK) * (selected updates to repositories containing un-accredited CAs) Changes from 1.16 to 1.17 ------------------------- (8 October 2007) * Added new RomanianGRID CA classic authority (RO) * Corrected several small typographic inconsistencies (DutchDemo, apt/README.txt) * Updates list of SWITCH eligible organisations (CH) * New contact email addresses for the AustrianGrid CA (AT), CNRS (FR) and IUCC (IL) * BEGrid CA provides an http URL for CRL download (BE) * Expired INFN (49f18420) CA withdrawn (IT) * Updated ASGCCCA-2007 certificate extensions (TW) Changes from 1.15 to 1.16 ------------------------- (8 August 2007) * A new profile for Member-Integrated Credential Services (MICS), has been defined by the IGTF. A policy nstallation bundle for authorities accredited under the MICS profile has been added to the distribution. Please refer to the IGTF web site at http://www.gridpma.org/ for a description of the MICS profile. * Corrected namespaces for for APAC CA (AU) * Added REUNA CA as a classic CA (CL) * Added NCSA-MICS and NCSA-SLCS CAs (US) * Added Ecole polytechnique federale de Lausanne to SWITCH namespace (CH) * Added new KISTI (2007) classic CA (KR) * Added Latin American and Caribbean Catch-all Grid CA (TAGPMA) * Obsoleted expired UKeScience (01621954) Root CA (GB) * Obsoleted expired HellasGrid-old (efe78092) Root CA (GR) * some new roots added to the worthless area (these are not accredited CAs!) Changes from 1.14 to 1.15 ------------------------- (9 July 2007) * Temporarily removed ASGCC CA 2007 root certificate (TW) Changes from 1.13 to 1.14 ------------------------- (1 June 2007) * Discontinued the expired GridCanada-old CA with hash 5f54f417 (CA) * APAC CA signing policy now als covers BeSTGRID in New Zealand (AU) * AEGIS (Serbia) CA added (RS) * New organisations added for SWITCH Classic CA (CH) * DutchGrid robot certificates added to signing namespace (NL) * Added CA with new keypair for ASGCC CA during roll-over "ASGCC-2007" (TW) Changes from 1.12 to 1.13 ------------------------- (11 March 2007) * Added BG.ACAD CA accredited under the classic profile (BG) * Added SWITCHaai SLCS and (classic) Root CA (CH) NOTE: the SWITCHaai SLCS CA is included in the ca_policy_igtf-slcs bundle * Extended lifetime of CyGrid CA to 2013 based on same key pair (CY) * Updated ArmeSFO CA root certificate following TACAR (AM) * Discontinued old (pre-2004) LIP CA (PT) * Extended lifetime of NorduGrid CA for 2 years (DK) * Added TERENA SCS CA hierarchy to the "worthless" area. Please note that the SCS CA has not been accredited yet (EU) Changes from 1.11 to 1.12 ------------------------- (09 February 2007) * Extended life time of root certificate for SlovakGrid (SK) * Obsoleted Russian DataGrid CA also in RPM updates (RU) * Fixed SHA-1 finger print for new SiGNET CA (SI) * Add NECTEC GOC CA (TH) * Added SWITCH Personal and Server 2007 CAs, removed 2005 CAs (CH) * Extended life time of root certificate for PolishGrid (PL) * Changed CRL URL of the NAREGI CA from https to http (JP) Changes from 1.10 to 1.11 ------------------------- (10 January 2007) * updated signing policy files for SWITCH CA (CH) * change crl_url from https to http for KEK (JP) * change crl_url from https to http for AIST (JP) * extended lifetime of ESnet (+10y) and DoEGrids (+5y) CA certs (US/DoE) * withdrawn Russian DataGrid CA (has been superseded by RDIG) (RU) Changes from 1.9 to 1.10 ------------------------ (17 October 2006) * New public web page for the BEGrid CA in metadata info file (BE) * New contact email addresses for: HellasGrid and SEE-GRID (GR, SEE), INFN CA (IT), Grid-Ireland (IE), DOEGrids CA (US/DOE), ASGCCA (TW), APAC (AU) * New CERN CA added (root and on-line CA), managed by CERN IT/IS (CERN) * New INFN CA issue 2006 to replace current one (expiring 2007) (IT) * Retired SWITCH-SSSR hierarchy pending replacement of the tree (CH) * Added new organisations to the SWITCH namespace (CH) * Removed KISTI CA (KR) Changes from 1.8 to 1.9 ----------------------- (11 September 2006) * New SiGNET CA (with 2048-bit key length) and new Subject DN (SI) * New HellasGrid CA (both Root and EE) issue 2006 added (GR) * Modified CINC Root and CINC SDC CA certificate extensions: removed SubjectAltName and IssuerAltName. (CN) * Updated extendedKeyUsage and nsCertType extension in AustrianGrid CA (AT) Changes from 1.7 to 1.8 ----------------------- (07 August 2006) * added O=Universitaet St. Gallen to the list of SWITCH Organisations (CH) * added newly accredited CINC Root CA and CINC SDC Grid CA (CN) * added new root certificate for the NAREGI CA (JP) Changes from 1.6 to 1.7 ----------------------- (24 July 2006) * removed CESNET-old from accredited list and obsoleted in RPM distribution * Added new accredited SRCE (Croatia) classic CA * Added new accredited BrGrid (Brazil) classic CA * New root and online CA certificates for updated UKeScience CA Changes from 1.5 to 1.6 ----------------------- (20 June 2006) * Removed NAREGI CA with too-short root certificate key length Changes from 1.4 to 1.5 ----------------------- (19 June 2006) * new CRL download URL for the RDIG CA * extended lifetime of root trust anchor for the GermanGrid CA (GridKa CA) old expiration date: Jun 10 13:45:54 2007 GMT new expiration date: Jun 10 13:45:54 2014 GMT * extended lifetime of root trust anchor for the Grid-Ireland CA (TCD) old expiration date: Jul 27 17:10:40 2007 GMT new expiration date: Jul 27 17:10:40 2012 GMT * ASGCC CA no longer authoritative for "/C=CN/O=IHEP/OU=CC/*" * AIST CA updated with new X.509v3 extensions (same keypair) * change in list of supported organisations for SWITCH CA (Switserland) Changes from 1.2 to 1.4 ----------------------- (15 May 2006) * increased version number of the distribution by two to accomodate RPM version inconsistencies in the release system of the LCG project * Extended life time for the CA root certificate of the NorduGrid CA Changes from 1.1 to 1.2 ----------------------- (13 Apr 2006) * new contact email address for KISTI CA * consistent quote formatting for pkIRISgrid signing_policy file * updated DutchDemo CA root certificate (in the worthless area) * suspended SWITCH Silver-root based hierarchy, since CRLs are not ready * added new organisation to the SWITCH namespace * changed ArmeSFO CRL download location to new server * new pkIRISGrid root certificate (same keypair) from TACAR added * added extra double quotes to the UK eScience signing policy file Changes from 1.1 R1 to 1.1 R2 ----------------------------- (22 Feb 2006) NOTE: THERE ARE NO CHANGES TO THE CONTENT IN THIS SUB-RELEASE * Corrected typo in the obsoletion of the old ca_CNRS-DataGrid * Improved understandability of the igtf-policy-installation-bundle Changes from 1.0 to 1.1 ----------------------- (20 Feb 2006) * Corrected malformed signing_policy file for CESNET-old * New (generic) email address for the LIP and LIPCA CAs * Expired Cygrid-old and CNRS-Datagrid CAs. The IGTF-classic meta-RPM package implicitly obsoletes there two discontinued CAs * Added alternative syntax for namespace constraints in .namespaces files. See http://www.eugridpma.org/documentation/ for details * Added pkIRISGrid CA as an accredited:classic CA * Corrected SWITCH CA hierarchy, adding the SWITCH Server and Personal CAs inbetween the SWITCH CA and the end-entities * New 2006+ SWITCH Personal and Server CAs in the SwissSign Root-originating hierarchy * New SwissSign Silver-Root and hierarchy added * New authorities from the APGridPMA: APAC GRID, KEK GRID, and NAREGI CA * New GridCanada CA root, renamed the "5f54f417" CA to GridCanada-old * New root cert (with same keypair) for the worthless DutchDemo CA * Pre-installed CA tarballs added for the classic and SLCS profiles Changes from 0.32 to 1.0 ------------------------- (25 October 2005) * IGTF policy metapackages replace EUGridPMA-only ones. The legacy "ca_policy_eugridpma" RPMs now depend on their IGTF counterparts. The EUGridPMA specific files will be withdrawn in a future release. * New directory structure moves all data regarding accredited authorities to the singe "accredited/" directory (including the policy meta-RPM) * Tar-ball installation now supports multiple profiles and targets * Meta-data (".info") for each CA added, and installed in trusted directory * The "experimental" profile supercedes the "others/" area in the distribution (note: this affects the FNAL_KCA, which will shortly be added as an accredited authority under the new Short-Lived Credential Services profile) * Discontinued authorities are no longer distributed * Only accredited authority RPM packages are signed by the PMA's GPG key * APGridPMA accreditations added: KISTI and AIST * New EUGridPMA accreditations: TR-Grid and BalticGrid * CRL URL for SiGNET changed to http instead of https * Added compatibility namespace for NIIF "/C=HU/O=NIIF CA/OU=NIIF/OU=GRID/*" Changes from 0.31 to 0.32 ------------------------- (23 August 2005) * Corrected namespace for the new CESNET CA * New RDIG root certificate with a 2048 bit key length for increased compatibility with existing software suites. Changes from 0.30 to 0.31 ------------------------- (15 July 2005) * Corrected packaging problem which left RDIG out of accredited CA group * renamed the "unknown/" directory to "discontinued/" * Added explanatory text to the distribution regarding the "other/", "worthless/" and "discontinued/" directories Changes from 0.29 to 0.30 ------------------------- (12 July 2005) * Added IHEP CA for China * Added DFN GridGermany CA (Root, User and Server CAs) * Added RDIG CA (will replace the Russian DataGrid CA) * New namespace allocation for the IUCC CA: "/C=IL/O=IUCC/*" * Added updated CESNET Root cert and renamed the old one to "CESNET-old" for legacy compatibility. The new CESNET CA started operating on June 17th * FNAL root CA service has been discontinued and thus removed from the accredited list * RPMs are now signed (experimentally) with PGP keyID 3CDBBC71. This key, the "EUGridPMA Distribution Signing Key 3" can be obtained from the popular PGP key servers, where it has been signed by the current PMA Chair, David Groep. It can also be downloaded from the web distribution site: GPG-KEY-EUGridPMA-RPM-3 Changes from 0.28 to 0.29 ------------------------- (27 April 2005) * New root certificate for the NIIF/Hungarnet CA, following the TACAR update * Preliminary inclusion of the SWITCH CA certificates. Note that the ordering of the components in the end-entity DN will currently prevent the end-entity certs to be validated (this is being addressed by SwissSign) * Modified layout of the tar distribution, in preparation for support of multiple authentication profiles Changes from 0.27 to 0.28 ------------------------- (6 April 2005) * Added the root certs for the newly accredited CAs "AustrianGrid" and "NIIF/Hungarnet" * updated signing policy file of SiGNET CA to handle new emailAddress DN component name * added "BalticGrid CA" in the "worthless" section, for experimentation by AndersW * UKeScience CA changed to SHA1 digest for the root certificate * new CRL and CA URLs for both CyGrid CAs Changes from 0.26 to 0.27 ------------------------- (22 February 2005) * added additional entry to UKeScience signing policy file to accomodate openssl 0.9.7c rendering of emailAddress component in the subject DN * updated DutchGrid CA cert from web site: extended lifetime to 2021 and changed digest algorithm from MD5 to SHA1 * added a tar-ball distribution with a configure scrfipt for convenience * Removed DOESG-Root from the accredited CA list, as per request of of the CA on January 28, 2005. There are no certs left issued by this CA. * Added Grid-FR CA by CNRS, and extended the signing_policy file of the associated CNRS-Projets CA. * A new root certificate for the CyGrid CA (with a new subject name). The old CyGrid CA has been moved to "-old". Both are in the accredited list. The new CRL location has been added. Changes from 0.25 to 0.26 ------------------------- * Added KFKI-RMKI-CA for Hungary * removed Spain-old Changes from 0.24 to 0.25 ------------------------- * Added the new Spain CA with hash 13eab55e and alias: Spain * Rename the Spain CA to Spain-old (expires on 2004-11-12) Changes from 0.23 to 0.24 ------------------------- * Added the Slovenian SiGNET CA with hash 747183a and alias: SiGNET * Added the SEE-GRID CA with hash 468d15b3 and alias: SEE-GRID * Added the Estonian Grid CA, with hash 566bf40f and alias: EstonianGrid * Added the updated LIP CA (called "LIPCA") with hash 11b4a5a2, which will supercede the old one with hash 41380387. The "LIP" one will remain in the repository will the end of 2005. * Added RPM requirements that reflects CA chaining: CNRS-Projects requires CNRS CNRS-DataGrid requires CNRS-Projects DOEGrids requires ESnet Changes from 0.22 to 0.23 ------------------------- * Added the root certificate for the PK-Grid CA, with MD5 fingerprint 24:A0:A7:DD:46:1B:EB:AE:7F:33:CA:5F:FA:D7:37:F8 Changes from 0.21 to 0.22 ------------------------- * A new root certificate for "Russia" (Russian DataGrid CA) has replaced the one that was valid till July 18th, 2004. The old MD5 fingerprint was AE:3D:F5:F2:DD:CF:B0:10:99:7A:6D:74:3C:FB:4A:22, the new one, valid till July 19th, 2009 is: A4:56:E2:01:E6:DB:86:F6:FC:5B:E5:6C:9D:A5:E1:06. The new root cert was received in an S/MIME signed message by Lev Shamardin, signed with a personal cert issued by the old root. The old root cert has been withdrawn from the package entirely. * The BEGrid signing_policy is not resistant against the OpenSSL 0.9.6 to 0.9.7 namechange in the emailAddress DN component. Changes from 0.20 to 0.21 ------------------------- * Added the IUCC and BEGrid root certs igtf-policy-installation-bundle-1.135/configure0000755001343500074740000000405715004136237021127 0ustar davidgdavidg#! /bin/sh # # INSTALL=install PREFIX=/etc/grid-security/certificates MKDIR=mkdir LN=ln SED=sed PROFILE=ANY PROFILES="" while : do case "$1" in --prefix=* ) PREFIX=`echo $1 | sed -e 's/--prefix=//'` shift ;; --with-mkdir=* ) MKDIR=`echo $1 | sed -e 's/--with-mkdir=//'` shift ;; --with-ln=* ) LN=`echo $1 | sed -e 's/--with-ln=//'` shift ;; --with-install=* ) INSTALL=`echo $1 | sed -e 's/--with-install=//'` shift ;; --with-profile=* ) PROFILE=`echo $1 | sed -e 's/--with-profile=//'` PROFILES="install-$PROFILE $PROFILES" shift ;; --with-authority=* ) AUTH=`echo $1 | sed -e 's/--with-authority=//'` AUTHS="$AUTH $AUTHS" shift ;; -- ) shift ; break ;; -* ) echo "Unknown argument to $0" ; exit 1 ;; * ) break ;; esac done case "$#" in 0 ) ;; * ) cat < Makefile echo "Configuration of the IGTF bundle complete" echo "use \"make install\" to install the selected authorities in" echo "$PREFIX."