ca-certificates-mozilla-2.74-150200.41.1<>,glp9|왷l5CĶc8*Fp9*)Y7vOnL v7 q1(ZR罍m @o:%t 3Z.$Z_? FT LwT;;OaP~X{qifa]VQq[+U؝Yq)Pl 0Ǥ)!O'9 BN }9#0_^/.Ֆk3  4[>GW?Wd + G 1IOVu    H L\p   (8)9):t)>S@SBSFSGSHSIT XTYTZT([T,\T4]TD^TbTcUdV3eV8fV;lV=uVPvV`zV}VVVVVWCca-certificates-mozilla2.74150200.41.1CA certificates for OpenSSLThis package contains some CA root certificates for OpenSSL extracted from MozillaFirefoxglh01-ch3a>SUSE Linux Enterprise 15SUSE LLC MPL-2.0https://www.suse.com/Productivity/Networking/Securityhttps://www.mozilla.orglinuxnoarchupdate-ca-certificates || trueupdate-ca-certificates || true;g~A큤A큤glgjglgl45788ff1636774b567706f4a42262269912aab7e9017094450c1c3fdb7722a3ecc2ef5eae2cf0a326ace3f03a14263ba8c4009e1f605e4f9070a6fd19b53b213rootrootrootrootrootrootrootrootca-certificates-mozilla-2.74-150200.41.1.src.rpmca-certificates-mozilla     /bin/sh/bin/sh/bin/shca-certificatesca-certificatesrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-1p11-kit-tools0.23.2-4.5.24.14.1ggggg@g@g/@g^fe}@e}@e}@dܺ@d@dS@cFc @boaXIaM`@``"y@__!d^|@^@]]ʞ]F\@n@[ug@[?YZZiY|XAW@V@TZ@T@meissner@suse.commeissner@suse.comeroca@suse.commeissner@suse.comdmueller@suse.comdmueller@suse.comsteven.kowalik@suse.comdmueller@suse.commeissner@suse.commeissner@suse.commeissner@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comdmueller@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.deandreas.stieger@gmx.demeissner@suse.commeissner@suse.commeissner@suse.comkukuk@suse.demeissner@suse.comjmatejek@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.com- revert the distrusted certs for now. originally these only distrust "new issued" certs starting after a certain date, while old certs should still work. (bsc#1240343) - remove-distrusted.patch: removed- explit remove distruted certs, as the distrust does not get exported correctly and the SSL certs are still trusted. (bsc#1240343) - Entrust.net Premium 2048 Secure Server CA - Entrust Root Certification Authority - AffirmTrust Commercial - AffirmTrust Networking - AffirmTrust Premium - AffirmTrust Premium ECC - Entrust Root Certification Authority - G2 - Entrust Root Certification Authority - EC1 - GlobalSign Root E46 - GLOBALTRUST 2020 - remove-distrusted.patch: apply to certdata.txt- Fix awk to compare (missing a =) and give the following output: [#] NSS_BUILTINS_LIBRARY_VERSION "2.74"- pass file argument to awk (bsc#1240009)- update to 2.74 state of Mozilla SSL root CAs: Removed: * SwissSign Silver CA - G2 Added: * D-TRUST BR Root CA 2 2023 * D-TRUST EV Root CA 2 2023- remove extensive signature printing in comments of the cert bundle- Define two macros to break a build cycle with p11-kit.- Updated to 2.72 state of Mozilla SSL root CAs (bsc#1234798) Removed: - SecureSign RootCA11 - Security Communication RootCA3 Added: - TWCA CYBER Root CA - TWCA Global Root CA G2 - SecureSign Root CA12 - SecureSign Root CA14 - SecureSign Root CA15- Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525) - Added: FIRMAPROFESIONAL CA ROOT-A WEB - Distrust: GLOBALTRUST 2020- Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356) Added: - CommScope Public Trust ECC Root-01 - CommScope Public Trust ECC Root-02 - CommScope Public Trust RSA Root-01 - CommScope Public Trust RSA Root-02 - D-Trust SBR Root CA 1 2022 - D-Trust SBR Root CA 2 2022 - Telekom Security SMIME ECC Root 2021 - Telekom Security SMIME RSA Root 2023 - Telekom Security TLS ECC Root 2020 - Telekom Security TLS RSA Root 2023 - TrustAsia Global Root CA G3 - TrustAsia Global Root CA G4 Removed: - Autoridad de Certificacion Firmaprofesional CIF A62634068 - Chambers of Commerce Root - 2008 - Global Chambersign Root - 2008 - Security Communication Root CA - Symantec Class 1 Public Primary Certification Authority - G6 - Symantec Class 2 Public Primary Certification Authority - G6 - TrustCor ECA-1 - TrustCor RootCert CA-1 - TrustCor RootCert CA-2 - VeriSign Class 1 Public Primary Certification Authority - G3 - VeriSign Class 2 Public Primary Certification Authority - G3 - remove-trustcor.patch: removed, now upstream - do a versioned obsoletes of "openssl-certs".- use rpm 4.20 compatible patch syntax- Use %patch -P N instead of deprecated %patchN.- readd _multibuild- Updated to 2.62 state of Mozilla SSL root CAs (bsc#1214248) Added: - Atos TrustedRoot Root CA ECC G2 2020 - Atos TrustedRoot Root CA ECC TLS 2021 - Atos TrustedRoot Root CA RSA G2 2020 - Atos TrustedRoot Root CA RSA TLS 2021 - BJCA Global Root CA1 - BJCA Global Root CA2 - LAWtrust Root CA2 (4096) - Sectigo Public Email Protection Root E46 - Sectigo Public Email Protection Root R46 - Sectigo Public Server Authentication Root E46 - Sectigo Public Server Authentication Root R46 - SSL.com Client ECC Root CA 2022 - SSL.com Client RSA Root CA 2022 - SSL.com TLS ECC Root CA 2022 - SSL.com TLS RSA Root CA 2022 Removed CAs: - Chambers of Commerce Root - E-Tugra Certification Authority - E-Tugra Global Root CA ECC v3 - E-Tugra Global Root CA RSA v3 - Hongkong Post Root CA 1- Add _multibuild to define 2nd spec file as additional flavor. Eliminates the need for source package links in OBS.- Updated to 2.60 state of Mozilla SSL root CAs (bsc#1206622) Removed CAs: - Global Chambersign Root - EC-ACC - Network Solutions Certificate Authority - Staat der Nederlanden EV Root CA - SwissSign Platinum CA - G2 Added CAs: - DIGITALSIGN GLOBAL ROOT ECDSA CA - DIGITALSIGN GLOBAL ROOT RSA CA - Security Communication ECC RootCA1 - Security Communication RootCA3 Changed trust: - TrustCor certificates only trusted up to Nov 30 (bsc#1206212) - Removed CAs (bsc#1206212) as most code does not handle "valid before nov 30 2022" and it is not clear how many certs were issued for SSL middleware by TrustCor: - TrustCor RootCert CA-1 - TrustCor RootCert CA-2 - TrustCor ECA-1 Patch: remove-trustcor.patch- Updated to 2.56 state of Mozilla SSL root CAs (bsc#1202868) Added: - Certainly Root E1 - Certainly Root R1 - DigiCert SMIME ECC P384 Root G5 - DigiCert SMIME RSA4096 Root G5 - DigiCert TLS ECC P384 Root G5 - DigiCert TLS RSA4096 Root G5 - E-Tugra Global Root CA ECC v3 - E-Tugra Global Root CA RSA v3 Removed: - Hellenic Academic and Research Institutions RootCA 2011- Updated to 2.54 state of Mozilla SSL root CAs (bsc#1199079) Added: - Autoridad de Certificacion Firmaprofesional CIF A62634068 - D-TRUST BR Root CA 1 2020 - D-TRUST EV Root CA 1 2020 - GlobalSign ECC Root CA R4 - GTS Root R1 - GTS Root R2 - GTS Root R3 - GTS Root R4 - HiPKI Root CA - G1 - ISRG Root X2 - Telia Root CA v2 - vTrus ECC Root CA - vTrus Root CA Removed: - Cybertrust Global Root - DST Root CA X3 - DigiNotar PKIoverheid CA Organisatie - G2 - GlobalSign ECC Root CA R4 - GlobalSign Root CA R2 - GTS Root R1 - GTS Root R2 - GTS Root R3 - GTS Root R4- updated to 2.50 state of the Mozilla NSS Certificate store (bsc#1188006) - Added CAs: + HARICA Client ECC Root CA 2021 + HARICA Client RSA Root CA 2021 + HARICA TLS ECC Root CA 2021 + HARICA TLS RSA Root CA 2021 + TunTrust Root CA- remove the DST_Root_CA_X3.pem trust, as it expires september 30th 2021. (bsc#1190858)- updated to 2.50 state of the Mozilla NSS Certificate store (bsc#1188006) Added CAs: * AC RAIZ FNMT-RCM SERVIDORES SEGUROS * ANF Secure Server Root CA * Certum EC-384 CA * Certum Trusted Root CA * GlobalSign Root E46 * GlobalSign Root R46 * GlobalSign Secure Mail Root E45 * GlobalSign Secure Mail Root R45 * GLOBALTRUST 2020 Removed CAs: * GeoTrust Primary Certification Authority - G2 * QuoVadis Root Certification Authority * Sonera Class2 CA * Trustis FPS Root CA * VeriSign Universal Root Certification Authority- fix mozila typo in installed files- Updated to 2.46 state of the Mozilla NSS Certificate store (bsc#1181994) - Added new root CAs: - NAVER Global Root Certification Authority - Removed old root CA: - GeoTrust Global CA - GeoTrust Primary Certification Authority - GeoTrust Primary Certification Authority - G3 - GeoTrust Universal CA - GeoTrust Universal CA 2 - thawte Primary Root CA - thawte Primary Root CA - G2 - thawte Primary Root CA - G3 - VeriSign Class 3 Public Primary Certification Authority - G4 - VeriSign Class 3 Public Primary Certification Authority - G5- Updated to 2.44 state of the Mozilla NSS Certificate store (bsc#1177864) - Removed CAs: - EE Certification Centre Root CA - Taiwan GRCA - Added CAs: - Trustwave Global Certification Authority - Trustwave Global ECC P256 Certification Authority - Trustwave Global ECC P384 Certification Authority- update to 2.42 state of the Mozilla NSS Certificate store (bsc#1174673) Removed CAs: - AddTrust External CA Root - AddTrust Class 1 CA Root - LuxTrust Global Root 2 - Staat der Nederlanden Root CA - G2 - Symantec Class 1 Public Primary Certification Authority - G4 - Symantec Class 2 Public Primary Certification Authority - G4 - VeriSign Class 3 Public Primary Certification Authority - G3 Added CAs: - certSIGN Root CA G2 - e-Szigno Root CA 2017 - Microsoft ECC Root Certificate Authority 2017 - Microsoft RSA Root Certificate Authority 2017- also run update-ca-certificates in %posttrans- update to 2.40 state of the Mozilla NSS Certificate store (bsc#1160160) - removed: - Certplus Class 2 Primary CA - Deutsche Telekom Root CA 2 - CN=Swisscom Root CA 2 - UTN-USERFirst-Client Authentication and Email - added: - Entrust Root Certification Authority - G4- make sure p11-kit with patches is installed on SLE (boo#1154871)- export correct p11kit trust attributes so Firefox detects built in certificates (boo#1154871). Courtesy of Fedora.- update to 2.34 state of the Mozilla NSS Certificate store (bsc#1144169) - Removed CAs: - Certinomis - Root CA - includes added root CAs from the 2.32 version: - emSign ECC Root CA - C3 (email and server auth) - emSign ECC Root CA - G3 (email and server auth) - emSign Root CA - C1 (email and server auth) - emSign Root CA - G1 (email and server auth) - Hongkong Post Root CA 3 (server auth)- updated to 2.30 state of the Mozilla NSS Certificate store. (bsc#1121446) - Removed CAs: - AC Raiz Certicamara S.A. - Certplus Root CA G1 - Certplus Root CA G2 - OpenTrust Root CA G1 - OpenTrust Root CA G2 - OpenTrust Root CA G3 - Visa eCommerce Root - Added Root CAs: - Certigna Root CA (email and server auth) - GTS Root R1 (server auth) - GTS Root R2 (server auth) - GTS Root R3 (server auth) - GTS Root R4 (server auth) - OISTE WISeKey Global Root GC CA (email and server auth) - UCA Extended Validation Root (server auth) - UCA Global G2 Root (email and server auth)- updated to 2.26 state of the Mozilla NSS Certificate store. (bsc#1104780) - removed server auth - Certplus Root CA G1 - Certplus Root CA G2 - OpenTrust Root CA G1 - OpenTrust Root CA G2 - OpenTrust Root CA G3 - remove CA - ComSign CA - added new CA - GlobalSign- Updated to 2.24 state of the Mozilla NSS Certificate store. (bsc#1100415) - Removed CAs: * S-TRUST_Universal_Root_CA:2.16.96.86.197.75.35.64.91.100.212.237.37.218.217.214.30.30.crt * TC_TrustCenter_Class_3_CA_II:2.14.74.71.0.1.0.2.229.160.93.214.63.0.81.191.crt * TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5:2.7.0.142.23.254.36.32.129.crt- Use %license instead of %doc [bsc#1082318]- Updated to 2.22 state of the Mozilla NSS Certificate store (bsc#1071152, bsc#1071390, bsc#1010996) - Removed CAs: * ACEDICOM Root * AddTrust Public CA Root * AddTrust Qualified CA Root * ApplicationCA - Japanese Government * CA Disig Root R1 * CA WoSign ECC Root * Certification Authority of WoSign G2 * Certinomis - Autorité Racine * China Internet Network Information Center EV Certificates Root * CNNIC ROOT * Comodo Secure Certificate Services * Comodo Trusted Certificate Services * ComSign Secured CA * DST ACES CA X6 * GeoTrust Global CA 2 * StartCom Certification Authority * StartCom Certification Authority * StartCom Certification Authority G2 * Swisscom Root CA 1 * TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3 * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6 * UTN USERFirst Hardware Root CA * UTN USERFirst Object Root CA * VeriSign Class 3 Secure Server CA - G2 * WellsSecure Public Root Certificate Authority * Certification Authority of WoSign * WoSign China - Added CAs: * D-TRUST Root CA 3 2013 * GDCA TrustAUTH R5 ROOT * SSL.com EV Root Certification Authority ECC * SSL.com EV Root Certification Authority RSA R2 * SSL.com Root Certification Authority ECC * SSL.com Root Certification Authority RSA * TrustCor RootCert CA-1 * TrustCor RootCert CA-2 * TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1- convert processing script to Python 3 - ensure a stable conversion of UTF8 hex-encoded certificate names - ensure a stable ordering of trust/distrust bits in headers- updated to 2.11 state of the Mozilla NSS Certificate store. - removed CAs: - Buypass_Class_2_CA_1:2.1.1.crt serverAuth - EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı:2.8.76.175.115.66.28.142.116.2.crt codeSigning emailProtection serverAuth - Equifax_Secure_CA:2.4.53.222.244.207.crt emailProtection - Equifax_Secure_eBusiness_CA_1:2.1.4.crt emailProtection - Equifax_Secure_Global_eBusiness_CA:2.1.1.crt emailProtection - IGC_A:2.5.57.17.69.16.148.crt codeSigning emailProtection serverAuth - Juur-SK:2.4.59.142.75.252.crt codeSigning serverAuth - Root_CA_Generalitat_Valenciana:2.4.59.69.229.104.crt codeSigning emailProtection serverAuth - RSA_Security_2048_v3:2.16.10.1.1.1.0.0.2.124.0.0.0.10.0.0.0.2.crt codeSigning emailProtection serverAuth - Sonera_Class_1_Root_CA:2.1.36.crt emailProtection - S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN:2.16.55.25.24.230.83.84.124.26.181.184.203.89.90.219.53.183.crt emailProtection - Verisign_Class_1_Public_Primary_Certification_Authority:2.16.63.105.30.129.156.240.154.74.243.115.255.185.72.162.228.221.crt emailProtection - Verisign_Class_2_Public_Primary_Certification_Authority_-_G2:2.17.0.185.47.96.204.136.159.161.122.70.9.184.91.112.108.138.175.crt emailProtection - Verisign_Class_3_Public_Primary_Certification_Authority:2.16.112.186.228.29.16.217.41.52.182.56.202.123.3.204.186.191.crt emailProtection - added CAs: + AC_RAIZ_FNMT-RCM:2.15.93.147.141.48.103.54.200.6.29.26.199.84.132.105.7.crt serverAuth + Amazon_Root_CA_1:2.19.6.108.159.207.153.191.140.10.57.226.240.120.138.67.230.150.54.91.202.crt emailProtection serverAuth + Amazon_Root_CA_2:2.19.6.108.159.210.150.53.134.159.10.15.229.134.120.248.91.38.187.138.55.crt emailProtection serverAuth + Amazon_Root_CA_3:2.19.6.108.159.213.116.151.54.102.63.59.11.154.217.232.158.118.3.242.74.crt emailProtection serverAuth + Amazon_Root_CA_4:2.19.6.108.159.215.193.187.16.76.41.67.229.113.123.123.44.200.26.193.14.crt emailProtection serverAuth + Certplus_Root_CA_G1:2.18.17.32.85.131.228.45.62.84.86.133.45.131.55.183.44.220.70.17.crt emailProtection serverAuth + Certplus_Root_CA_G2:2.18.17.32.217.145.206.174.163.232.197.231.255.233.2.175.207.115.188.85.crt emailProtection serverAuth + Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015:2.1.0.crt emailProtection serverAuth + Hellenic_Academic_and_Research_Institutions_RootCA_2015:2.1.0.crt emailProtection serverAuth + ISRG_Root_X1:2.17.0.130.16.207.176.210.64.227.89.68.99.224.187.99.130.139.0.crt (bsc#1010996) serverAuth + LuxTrust_Global_Root_2:2.20.10.126.166.223.75.68.158.218.106.36.133.158.230.184.21.211.22.127.187.177.crt serverAuth + OpenTrust_Root_CA_G1:2.18.17.32.179.144.85.57.125.127.54.109.100.194.167.159.107.99.142.103.crt emailProtection serverAuth + OpenTrust_Root_CA_G2:2.18.17.32.161.105.27.191.189.185.189.82.150.143.35.232.72.191.38.17.crt emailProtection serverAuth + OpenTrust_Root_CA_G3:2.18.17.32.230.248.76.252.36.176.190.5.64.172.218.131.27.52.96.63.crt emailProtection serverAuth + Symantec_Class_1_Public_Primary_Certification_Authority_-_G4:2.16.33.110.51.165.203.211.136.164.111.41.7.180.39.60.196.216.crt emailProtection + Symantec_Class_1_Public_Primary_Certification_Authority_-_G6:2.16.36.50.117.242.29.47.210.9.51.247.180.106.202.208.243.152.crt emailProtection + Symantec_Class_2_Public_Primary_Certification_Authority_-_G4:2.16.52.23.101.18.64.59.183.86.128.45.128.203.121.85.166.30.crt emailProtection + Symantec_Class_2_Public_Primary_Certification_Authority_-_G6:2.16.100.130.158.252.55.30.116.93.252.151.255.151.200.177.255.65.crt emailProtection - diff-from-upstream-2.7.patch: removed as we should be able to do intermediate root chains now with openssl 1.0.2 and also gnutls 3.5 is able to do so.- diff-from-upstream-2.7.patch: restore some important legacy CAs, otherwise Pidgin fails to talk to Google Talk for instance.- Updated to 2.7 (bsc#973042). - diff-from-upstream-2.2.patch: removed as openssl 1.0.2 can do immediate root CAs. - Removed server trust from: AC Raíz Certicámara S.A. ComSign Secured CA NetLock Uzleti (Class B) Tanusitvanykiado NetLock Business (Class B) Root NetLock Expressz (Class C) Tanusitvanykiado TC TrustCenter Class 3 CA II TURKTRUST Certificate Services Provider Root 1 TURKTRUST Certificate Services Provider Root 2 Equifax Secure Global eBusiness CA-1 Verisign Class 4 Public Primary Certification Authority G3 - enable server trust Actalis Authentication Root CA - Deleted CAs: A Trust nQual 03 Buypass Class 3 CA 1 CA Disig Digital Signature Trust Co Global CA 1 Digital Signature Trust Co Global CA 3 E Guven Kok Elektronik Sertifika Hizmet Saglayicisi NetLock Expressz (Class C) Tanusitvanykiado NetLock Kozjegyzoi (Class A) Tanusitvanykiado NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado NetLock Uzleti (Class B) Tanusitvanykiado SG TRUST SERVICES RACINE Staat der Nederlanden Root CA TC TrustCenter Class 2 CA II TC TrustCenter Universal CA I TDC Internet Root CA UTN DATACorp SGC Root CA Verisign Class 1 Public Primary Certification Authority - G2 Verisign Class 3 Public Primary Certification Authority Verisign Class 3 Public Primary Certification Authority - G2 - New added CAs: CA WoSign ECC Root Certification Authority of WoSign Certification Authority of WoSign G2 Certinomis - Root CA Certum Trusted Network CA 2 CFCA EV ROOT COMODO RSA Certification Authority DigiCert Assured ID Root G2 DigiCert Assured ID Root G3 DigiCert Global Root G2 DigiCert Global Root G3 DigiCert Trusted Root G4 Entrust Root Certification Authority - EC1 Entrust Root Certification Authority - G2 GlobalSign GlobalSign IdenTrust Commercial Root CA 1 IdenTrust Public Sector Root CA 1 OISTE WISeKey Global Root GB CA QuoVadis Root CA 1 G3 QuoVadis Root CA 2 G3 QuoVadis Root CA 3 G3 Staat der Nederlanden EV Root CA Staat der Nederlanden Root CA - G3 S-TRUST Universal Root CA SZAFIR ROOT CA2 TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5 TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6 USERTrust ECC Certification Authority USERTrust RSA Certification Authority 沃通根证书- diff-from-upstream-2.2.patch: Temporary reenable some root ca trusts, as openssl/gnutls have trouble using intermediates as root CA. - GTE CyberTrust Global Root - Thawte Server CA - Thawte Premium Server CA - ValiCert Class 1 VA - ValiCert Class 2 VA - RSA Root Certificate 1 - Entrust.net Secure Server CA - America Online Root Certification Authority 1 - America Online Root Certification Authority 2- Updated to 2.2 (bnc#888534) - The following CAs were removed: + America_Online_Root_Certification_Authority_1 + America_Online_Root_Certification_Authority_2 + GTE_CyberTrust_Global_Root + Thawte_Premium_Server_CA + Thawte_Server_CA - The following CAs were added: + COMODO_RSA_Certification_Authority codeSigning emailProtection serverAuth + GlobalSign_ECC_Root_CA_-_R4 codeSigning emailProtection serverAuth + GlobalSign_ECC_Root_CA_-_R5 codeSigning emailProtection serverAuth + USERTrust_ECC_Certification_Authority codeSigning emailProtection serverAuth + USERTrust_RSA_Certification_Authority codeSigning emailProtection serverAuth + VeriSign-C3SSA-G2-temporary-intermediate-after-1024bit-removal - The following CAs were changed: + Equifax_Secure_eBusiness_CA_1 remote code signing and https trust, leave email trust + Verisign_Class_3_Public_Primary_Certification_Authority_-_G2 only trust emailProtection/bin/sh/bin/shopenssl-certsh01-ch3a 17441109562.74-150200.41.12.74ca-certificates-mozillaCOPYINGtrustca-certificates-mozilla.trust.p11-kit/usr/share/licenses//usr/share/licenses/ca-certificates-mozilla//usr/share/pki//usr/share/pki/trust/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:38214/SUSE_SLE-15-SP2_Update/252abb678ec508824199c6941871c78b-ca-certificates-mozilla.SUSE_SLE-15-SP2_Updatedrpmxz5noarch-suse-linuxdirectoryUTF-8 Unicode text" l'Eupdate-ca-certificates || true/bin/shutf-83899d1306c4df3e6c486b100da0951fe7feed1044248fc8440f1c5dfb0560eed?7zXZ !t/Q]"k%=v41 GSlUuOl[;UC/ĕZz7:k_G~q|L`#P\r\z} }$דW#:5 Ҭ&Q7'>%j2m\,qzEf̧_Kj5H@lT(@$pVP7"^f"d'y`O1 f0VچDdn?"RN*\}ubƥ 1*w,)bB}SUi{hgBB=; w3dꄘW{ b bcJkx-W|ۀ@:EAx4M֚z]nMus( m2#n]B %W vzF*a `Vx Ue!]ȥԱ*ޯ,B9Ƌ٪8ZYfI|'ҥ}ڦ-3ot5ez}ky81rKL5 pB^g@?ZBy% Ɣ^戧UΟ_/JM1[UI#21@dɤkT̓BBĝ %DzЀB 6F?+uhZo6`(!ԸviMgPEV侭|> Z~@``+U=R +HmZCU%A"Gډ`6Vٜ1Xb넯5,(Ƕb9n Dyqh x>9tAɻj٤h 0&O"yß!贄Z6,Lw @9՜ˮutc{GsUXI4XՐSS29?vdTϦVGV  ]{c!Nvٵ.6oZu-:^WOYqv*!?NNgwq_Nѝ6\?ob{Q36_ymeן~}&JTgWX51@U;@ͧ,uGe=dآ`m73p/ =vtTc@22BL }Y8 ۛmAT\#Z_PƅyLLUS G&~Dg FKˋdu3[2imhm+7wVi)GIdNwUhښ4r3@:@w-(.O+m<{ͺa] @iGJ(Ai-S#,W`Wk*qWTq'JxrUK}H] ~fi#e*'8@m.Pѓyy%gttcMǵ G9k5-Gߧ=/@giϠ0@Z6 _ߡ%$kd1m\^y+a= ٔӰe\r#H2o<_RJZE7O>94I,Ɇ%&;DN >W4p.CfLlT!`ș - dX7nT+Z.`+ߒuI2fj.VA^f? /f̀R [x$it$H a%V5Cq\,oICCS~3}zED=lߤm2j˅8Qa78P쌣If <N[Gp/%1Ki?Mo!嬿SU*d-sBK儨mNbb𓯰;KÔX\!ZP\nׂaD|}W_jQ,q 0 3gE+ `d94ADFٟ83 VȸFX̬j 2Ԩ6P<l/른d戃 mh̳ykil\\r Ei#sns9"Yv1sS.d=={:8둿)69&͂FYWkq_b $̀kCCDRJ}L QeBٚQ{k͌T^yR4W(E~Ebn3ś>W @nyI(qsY &kM$5rv'q][>"'Daڜ1 gJ+rϭz1~ϓ_97QO=`Z=P`$Y>dushE=c" `G3SD2`Ӳn}t}Q-h'=p|0HݨKxWw&9Hİ{o7g;΀`J%Z=W^KL!Bhi_VʍH3T_HkPi<ؕ9DC&7V*W <<}֊$9-'.fg5?Ve1 +‚JDɄ6fDץzYS\yUe.lC䀂Yk* Q!kA(0t8K9]Qn{MNYnA Ϭ<\ZA=|F,B琀kdޒt]+!n4k)6 ,'bI:;+Q$! `zh?1"NdMTsQ|1'x[0Z]ևǾZHhWǎw@MtxZ 45} [w!*̥+i@pHf 4OZ[i"OlOM79G?voѤ=qmЍۯ^n31mIK;N1ap_V#I)!ڗ n<|sAo zn-Q;PqfL%$q!^r pVujzB)вA &ޘGrޕX+9N܊{[Mgc:nNfےEC+п`fPiD#B&Yb5_8!XС$gi ݖes[ō\n!EHǸL^p¹WްG?qE ̖L;wq@A!{vx&iŸ.o/* .\OxZlA㨣@B`~?%$AZ7O &eB2UҲlR74H@8r ޾':ZjE;[.H'RҾ1 ؘ[`I쫴J'pf?:yᴚn쮼bXktOJPm #;|&Oս>r:!31^Mz?*,nQN! o iL黲};dwWHߩOq'K~b['vo6wtu_j"g!L;[d4l# pQD4Ӡ$7ћ)z2{QW':9~1eo7#hN3%lA85:?A W zҭfY]"{!)cNH"<9dN6I1p^CPm_|kKa?zp:]O ǜx?i-&T-c 2^*:A7'T XP.'Q)uݟ _ 4͌*Z5dZgWA#MMn_x|цCl/Ň?k\2)nBMϻ8JMri[`JirDQ2 >_]R.i@5|eu6b8P EͻK#Fq3}$+^y< 5DU0 k4s-o~h})G"ab')yF?dWM~LWc.9fj Zh-Td -`RG0q<[4o؜z4tT,Q S{x! axj`n@QQH;b$r㴝WU["iqwfna㞽D<.nQy0ׇl_5iK 0?.VuRsUбz ! m CIn׵{~VX$@g*T45Ukdm?ӞYjUT]qby'|ɑF, $'ʃq~~ L{G8TWh.i@)2p \ʱy_XkgNH%<-}XpHfqS/{ep踇6>@W($7dkcUf^Zs#R(kqTXc_cilс pb%#ZV;;:RLf٦>(\o(-ԻV`uvȤEc9fU<܀xw5xDh@D'Bhr-41D^e'cѣA7\mqT2_c0gZޭv$#. G0  FrOu2¤1#I+H fL>O2:ecb`$:ʵ.7Z,S,̓tAޕ~Kj@~μrڡ)p#LSHh gsɿeMhӹ^{j#3Q4|.[q}p)%oA'doyݷ)IѤ m;S]su]l_I< 7av:;!&#1u`WeJC3qu??ǎ\%IYp;t~$U~|3IaAN]Q'DC> ʀ^] B;EeHC__Wvj$ӽUX zGoWiyP-1J PprgC2bk:7lkcV UMB]). Td7+Y}(?ZkpU;Ahqy(_MfώX1_}(&T*Jji]Mhg54߁-Rh B) M&U)EZ:'BORBeI.s?H? B{Ō2ܔeIh̗f]_HpiF61yL`[E[`^$eǺM2;3K[F[\n3%WҼfm7,jBr+GӸugZduiV%c7ZN_Bj? # $[K)M@K|8CClAl;gR0" jo*0_HpB'b `'q=mTO Ü\ُa=E1; N-a/rM bzyM,KtϦ-HΩaÏ2s5UZ)@/nd(,N|Ֆ^,onҳ0mE A1PJB/r&#1˙8 */_ H:l*؟ doZ62//]Bam;н?djF~4oAnT'QOTnBN9ÂCU9]`8y2vP5W aAO՞OuSGv8ڻǗ$#bw) \W_%)٭pvn˶w6'%6+u2he\!d#?~d!8',J%J{E kgdZ>`Rb?g ?x G1/Ez(Oٓx.9Ǎmps<6ϝH ZA-G*Gfd_ӱJ6t{7bQe_j%:U0^MS3'o U/fX|cE]YELmz~c7r|Qrqzk3$, ˴xj;<67!p&{mnc˫z=$_Hi,/+ԓ}pXboiԪҲ^F#Rw ~G+#g-j7GR-渲T|,rl86Мݭ&4|nנּN緩~Yb;Ϡ6hwQlk_ZRHW=s#`"|l\_KN_0kMKJp_x[n^Kmź;w Cԣ/v$I+yjX=I”- 5hj{&L L\zw#A;p|^_fFĂA\&#H3MuI#Kg؄;r=9a "`|RNAѾa ޲DZ8˷T$Is== WAfʎ\7tQfhPX {Y Q[M Q>]zcu#-9{(cK_7;)gyvO4r p%TK^.R:a+/{?w%eW˩%7f`HϲTWC*UDL|#s/LwF$J!O|nasT2y=T PW1=.&S+~Ciy܈ +D],×uszC#jߊ&wş#$"^a\;KixZ67PY\ $yXxy< (ҴER@dsd\c$AB& uyW1oΎ kFmbҞ8XNÔ>t Kb,=[ K DހT*!y'42xpؓu:ا*G+hl7G vnܶGEm@sE#ICx-_f^3"Dd1w91(5.&'*;1aua,\Z;aޯŔ \Apt'J|r>)ʿT X6f,\%xSB* >)tʬס_6J2Oca6p#EO{4R93xADA՟{h4qR)K]rN+#ROIBF*yj'~лdZP_d8c?T-w &&;8aGġ%$!a ]rM1 k24 @_{p73v*L(/4y8a4ʁL3%YrJvk_k/.KoN_6ލ9~!Y{j+w[I< 1:,U tf^>txZPdu)sFǠ jćcށ˽tCըI@b_Ns I*zBX#8Rn!fwI㞖IV݄#l5C1jڱfh7$\G/`?Co$<Ƨ m> J;|AcG<8wѿ>*jv5G!Ɖ˒b~zN ϫqcCWO/VeCRVUNe3~Dhό;JacoTl?ީqٯn_Yq&ߍJP4<=K ot}uFFfXM4ͬ7As} y-r?3y2`VO`J `~YYz sN҆sRɅFkQɱAM,HeDB@39;xL$NI.}c1z܇g"0,׉\n^L & ZL{#=:IgvMAƒ`(L-Hx# 3o"1Lro._U-m[oK>]&Br{lAs3TsGk1"m_+L#kU.s9ĭI$(vͳu_y~;MQmۥ:)B.Dy %_>}@(~F@F(-q+>E x ~QS+Iof~-7ߗT=z Laf5a6fԐa/]:wYv]\7]J`J8 #.y8nyrB~42;xY4+lJw5QŘ&=(Ib8.ܗ!7~pAfcdEx5ӏ΅dj; 45+NԴNPRI}UDrI&fHD KʛKUCzK8zscYx:~D& .22B7iJӘIT#ȇ4+֛<5- -xg92ВUƺ]]n DmOZI[U84E/} (ز=^[D$Ϳ.O`=,YFyׇͯ׷_glfiBx.ĵ~P\fa\i2w_Z\I'?"UL%JZR*piR*XVH8UڻF} /{Ȭ`xN${N0F G^5#MgO_1FQ?m8}נka:N<3bK[>`@ V*M~@ە+[2) Avz;r1%4*/Yb HZwF~(RTo UF"γpmރ{NAEUDGL⹞2EEDr_>454:|9~Dd`Wہ׳͐4L,,&H @:>I+VAQ(cM̀2!ߌ=>Z{Ɲ;xDy ~,342w!f;Jl%o`qIp'1@{RFlQx5kYs|` &&LqAem+'CYSʕ-%,R˅$qӿ_bmIz }7,j>˗{3*V} 8CC}fmvxp'TVDQzR8`xH*Bzq]ֻ2R_Bvf~Uys)bf!/a8U` -c~9hN?Tr@ee(LSKw}"oPP~7s>p)Jy腷 X/Vi/ϓnڒOWsvH z.Ėl.Sp#O1{+ o8#JU4/N*WR,IрD>jPH96S(bnp)ە^_Y- ~~; pž#//լ{H8Tj+3s+_ŏ+pX4rñr^+miYeO|U e-p5k[E%"VHj/tEe]]dƌ{$ cŨ9N"q^.AO)?oT#stQNK=kvcC ћI|YjßZmo IS0V:XnuRՁtC?S 'eO}~GE?:>`ķ"wr)p;|* ը\.uc[ϾEح.^Z|3˓E{U#MV)çg󯨬Җ? x>d8Q|:2gme4^vG4ڭ)YqSˁy┰Z2mP!'!+*z1wd5JTz!o _ y36+t gT8γF_kF,oJNQ&tzaSªBn۶ABëM]\dxJr]ʢ~Le?V~rSW_>E' N3:Mb1䛗G Օj9'Ƚq(i?=սNd٨(?lN-%(4W;5Q67 Y?߯E |P:Xp0gn F.78VgI-k5Fm-GiN-'Ma/]8f94 ƿiQ +u$@%@FGkςw^Nt_n2o]ct&}nge؀c]+%Mш|=67 |_Ou+&@BoŦaeҹU,/V/|~fOqApH"MhfKGSmh_t*O/ ihuG J' G+oqӑɥ9[A&oJ͙D[LliY6v5_PCn'BlGϬcSIEme rGhMy༻R ]p i-D%!ygƥRh f:x$>aV!e"8#{|7)jP 0D)s]p[n$5Th_k|鸛?l%/7N(ٗ!ח]Mxhy2IeQ?X3pRꉇxy#I3 'fݍHSJ\2čG 9Y?M}SXI,IX|WR7Fb&<k̛}r$DOtJvcG)+]'඀/0tyu fq403I>B ɧڵ5_P:W O;s ѝ' < 6(k4p)҅fVAT:7 ~4 d%JXkavɼO5,ZZH6/7n5Tgcnvv$[aR(vg; i d [N )+Ȋs=Nc*%23G#I~= we,o[lѪf(ʼn7]' !?6wmRbRU&j<nṈR%Z& p$6ޡ0?0!85PTl)WD ]hٚ |{a{f+@ԫiܝl}a91*)ғ7LG6\y‰~uWfzNK9'loFX' oK?lWuEMW#5ȠB7{W+_Y3x-DݼAjJC1b*QѤ1'׍JBQXȭ^hN]BN&S>{|}3#Զa:FEuStL1LTD],,+vm g޸Y1n-Vp &([ IIҤMEB{b /]uMh<"cyj&O+MlY*jЛ t9Mk- 򠴼n,,UMP1ӳ`Əs?Lߥ8U[uH!4ڸM$~@t$[\C c|S>/?UϞ"@{zNN^N8x8p`zd A,Iڙ\&k b-ڎ<2 $ lrYoBI=ÌZ ;i.q4(|(`ao0#:4 T:BxUU/9KMJ=e ?bZvΜ!JhO jfypE.ۦ< 1J8 *n܄QU~PcPfO^@Wп9pt½0Ѯ\ٞ*ټH!/pJL˗osYYhߩM D9mPk鴶} 1?4/8p4^athr2alOC隠cZ60p=Ez!%Z4ܻbxR03a-2V'su{aN]Vρ6}-6ntVFWZ3@/N'?jL6BVcl?MaGEi6Ӊr*fhlu#5)ǁ8 cg>;\0r Ϧׁ4ǖ3NRANKJ= (Gj $Mp9fnyvAHc<3`9-MJNAUw0kiL4mpPp€IAb7?:lR P0 +yŮuH 셛V6Vqw;[&i fsHp 4O,.*I yB㔲 Y{ڰtD hlL3UO*vl @0_5wƗ&/duҚ16+ЭpY|x\ڈiv,9򗬷28c 9@·  ˴ъ94JLl''6TU%Y& sHn(|W 07#[bo3ǡlJM߹m. ,7gc+_&}MaylW%jsfэ̠G Ӻ#]ҵOp=^(Mh  ݳ~bʊl~k@J|ĕnW[=0Ғ8Ydt"7sc)'0wI翰%ׂId"6 ړuE_qN3h&{E;gm690/k 1s _e[3nߔ)Kg?;@06${f xB ߇C-72<4n;@BHb5$҇u 8{Iا^<rog.Vu=`?0 dxJDsX1 nO Gԯ)FmnhQ斧6Xx`n}LݨIFe^ULN@gQ:G¶`SԼNmSx:w r;~9ڻGQ_i`H_DXByрEKn~P≆[AݵnU*'#K3a5r#06cqo+sgbIuJi괏Ӄh>N5֡u kstA}lYcFXxksR[^@Z^C 'a#&g/d1O0<9 > ɴb>0*;w6{V+.מkc3PnGGY&ѸS _]+H4勘Fy>ò x\(6knOgOȋ ":{9wgZ3vXbiB37Rm N[RlXV Y:KtGTS^;>l +#/ 3uO!^K8&7넆;I^@?{./nB^9)XBN2y-7 sޓ>M`3D G JZASo/HP#wә/Y}wc - 5|*?3gj'==AyvE5L!֞(WFp8wy-FQ!{V1FL&oc`pg;UyQ?\kCyPբ'_g"7n"렸M'cutVkdm. 3w@'_"rh?Kw\s}%{O*h݋6jL>ѻ/T*m0,( &0uSLD}`*~_LSxcj&q Hؽ_ͨġ5qwP=yebdMUR0–w2!n[9*U=Wt5^05Ў}4;3pjE˭;MCar`?sf4Vl7ҥO2"t1 Hc.W0cS[--W/lHk'+85#P}'srzFA9N'sc Ey(bF%$^o?( LECk%!&U"j\>=p:G;ZÓ&z&(<0oZTo螝UPɐމ1Em|Eo,Q*q5pFiޠu#K.fg"m9~Hhzέië7Sg,Udm(],ŒR+(֟)jK!0o4jj΃H4CZ.0E| ֳ6-2քZXe)9 Mb -o'͂^*8=nZtm"ͪ] ulXYߜ`4ϩjr˰PiMt'N) qN\OY8@^.*F`0b#|cEBDŽݢs"'"aTZp:N1RS(*벦Lc@#4<śN[٘|!%W{6tL?Dbrn+rjYN҅FH2E29j*kF!Ԑ&a$ㄮkijϘ}26|`˰'t(rh M+5цl0bN:ߣڥbaf YZ