igtf-policy-installation-bundle-1.104/0000775001343500074740000000000013614364142017213 5ustar davidgdavidgigtf-policy-installation-bundle-1.104/src/0000775001343500074740000000000013614364140020000 5ustar davidgdavidgigtf-policy-installation-bundle-1.104/src/accredited/0000775001343500074740000000000013614364142022071 5ustar davidgdavidgigtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR.pem0000664001343500074740000000330013614364101024076 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEzjCCAzagAwIBAgISESHcZGpjVbhv3LcwHBxmFWKhMA0GCSqGSIb3DQEBCwUA MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw MDgwMDAwWjBFMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL DAdHUklELUZSMRMwEQYDVQQDDApBQyBHUklELUZSMIIBojANBgkqhkiG9w0BAQEF AAOCAY8AMIIBigKCAYEAywcrhCkF87S7e/Sfc0S+QGS4ED9EuYvoQj8KiWlyz9UF nccNtjaxnlJbaGU6myNreeEEbt+QdydQ/vkPQd2gEhoxirz6VDJgRg2i56Zw/JL9 FVcmDgKG6t7Ap9/NB3MobXWPd7yQu7SIfnd3BnLW87tOdILpiODZNOWeh6Qg1Fgn aFHRjVPN6ugU1qbW44sPDv0yFhNRfnsDomVOewRg46fxv8tah+lIYsVulGYVhmkI AgNs9YMTclukxPL5YOFgeY+3A+G/1NwKmteFqBIQRcaF1UbHrSsn6H5cIdsEJ1NT IBPYuDGD/SkH5dFpOeyZ+RLxCaoI4W+dVyYhVealdrtmI2XQL7lLWLTHJzZqRBcA gc60J2bjZl3HwxFE/QKW5f67zLkupFPO61OWeAl+pwIIE4Xo6z0ubNrLg5MqiO7G 7YOPocSlkBMIv+OzhrzMxsZpjSaLm32/nGyj0T+XQwUN4gK87VkHa0lz+qU6TTG0 bggGOK72rcXdGZWlzGfzAgMBAAGjgbcwgbQwDgYDVR0PAQH/BAQDAgEGMA8GA1Ud EwEB/wQFMAMBAf8wUQYDVR0gBEowSDBGBgRVHSAAMD4wPAYIKwYBBQUHAgEWMGh0 dHA6Ly9ncmlkLWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvcGMtZ3JpZC1mcjAd BgNVHQ4EFgQUqgzWvPnZZT1wilEwII9M/s1gueMwHwYDVR0jBBgwFoAUqgzWvPnZ ZT1wilEwII9M/s1gueMwDQYJKoZIhvcNAQELBQADggGBAIGprfsrGbphQnPMyshh SOB+Q/hLV3vSyT52kSuifHMHkoLA61cJT/Lrp5Vb2yKi7SWzbWrCD4dNsbTAt838 7WZUVeSkvvqJmDeMI/Jj4LVMVSnLsxFHwrphw1KiEen2kZL8BmbTRW1x3UnuF7Dx Evr/Um7O+gZFg0SHCVCeCpYYROLZOFre98lvvYRn2vixKPSXxDkfaeW4B91SD3is qMW8ATtq3Wp5ZOGRlMzCEEt2OmLnSYldkjb/I1Noi3A9Uzwuxxm9vDfG291uI6ks wMpYrwVXjoUZWZ1FSf766SBtAzLPYjcpmJwRvTIxNyMWedZCMbkKhRL9z1ZhEMbR chLvh3mnrDdFbUoCCQ4ZqmcgYIgw3+JzIf3vRszPpJirJ0ZoZKrBs4QRDdlFZtON kBA7U1h+lAzYSExpZPoF8m7meKtL9oanlJ66XLGv0yg6N7oL1mvPkR/QiLSrOeRI +yS8kr+zh4fpr9gRJUQkxA+xGSiGUk9DZwK0TA/3WICj7w== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR.crl_url0000664001343500074740000000007113614364101024761 0ustar davidgdavidghttp://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr.crl igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR.signing_policy0000664001343500074740000000061313614364101026336 0ustar davidgdavidg# @(#)$Id: AC-GRID-FR.signing_policy,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ # Root access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services"' igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR.namespaces0000664001343500074740000000176613614364101025452 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)AC-GRID-FR.signing_policy.namespaces # CA alias : AC-GRID-FR # subord_of: # subjectDN: /C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR # hash : AC-GRID-FR.signing_policy # (generated automatically from AC-GRID-FR.signing_policy) # TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" \ PERMIT Subject "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" \ PERMIT Subject "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" \ PERMIT Subject "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" \ PERMIT Subject "/O=GRID-FR/.*" TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" \ PERMIT Subject "/O=GRID-FR/.*" TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" \ PERMIT Subject "/O=GRID-FR/.*" igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR.info0000664001343500074740000000070313614364101024254 0ustar davidgdavidg# # @(#)$Id: AC-GRID-FR.info,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ alias = AC-GRID-FR url = http://grid-fr.renater.fr/ email = grid-fr@renater.fr ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr.cer crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr.crl status = accredited:classic version = 1.104 sha1fp.0 = 38:9D:99:0D:6A:6E:6C:68:AC:B5:9F:F6:03:5D:38:1C:A7:40:29:60 subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Personnels.pem0000664001343500074740000000401113614364101026224 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFwjCCBCqgAwIBAgISESEbWlKSHT/Bwe1tXK8w0TWHMA0GCSqGSIb3DQEBCwUA MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw MDgwMDAwWjBQMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL DAdHUklELUZSMR4wHAYDVQQDDBVBQyBHUklELUZSIFBlcnNvbm5lbHMwggGiMA0G CSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDWvrNF8vQ5jpSvmXPzEhBp958C43rp DMTcQWWd0A78t1aKizc+gNAso2KQivjt1Yu/KiMSjpi85LEOKOB3OESUY6c+slfV L5psH5bwif6zu5guiLFtd/XmRGC4wFHh1Zo8NTply0NlzaN9/bY+BQnlstexbiGe Mm3W7AfzNmmszykgIegoOmAlk1P2Snxbk5kCO/uQlezQzNLUFB5OYE/DL4gOpONE Xa470fCCToSUrJ2HlteU0il/8tSgBws2xENUzA/r/ZmwG6IeVHYxukK4SzOn8fFU sLoNE0srlDz8Xgdr9XZyEFdQXJ4IsWGgGLyKsnN/jwPsZ7qkhvaDbKdml7i1S5F9 PZf1hSgwRgx2C4NP4JZacWiG+UNTk1XM0ZiIUTjhMN+isqOHiUKRBXyg9gLw01RP mOrA8xjzt2VjkobSdgA/9R7p+sdYTWCMsgAaPd2P5ZO1XrvRCkfUk5jKSw5zPcdz OAj84VwO4p1cGAguc5vvH3+0b62NpUlbNCECAwEAAaOCAZ8wggGbMA4GA1UdDwEB /wQEAwIBBjBRBgNVHSAESjBIMEYGBFUdIAAwPjA8BggrBgEFBQcCARYwaHR0cDov L2dyaWQtZnIucG5jbi5lZHVjYXRpb24uZ291di5mci9wYy1ncmlkLWZyMBIGA1Ud EwEB/wQIMAYBAf8CAQAwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5ncmlk LWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvYWMtZ3JpZC1mci5jcmwwgZYGCCsG AQUFBwEBBIGJMIGGMEQGCCsGAQUFBzAChjhodHRwOi8vY2VyLmdyaWQtZnIucG5j bi5lZHVjYXRpb24uZ291di5mci9hYy1ncmlkLWZyLmNlcjA+BggrBgEFBQcwAYYy aHR0cDovL29jc3AuZ3JpZC1mci5wbmNuLmVkdWNhdGlvbi5nb3V2LmZyL2dyaWQt ZnIwHQYDVR0OBBYEFN49xvEGIjeZn88iCJUA5wHioLwQMB8GA1UdIwQYMBaAFKoM 1rz52WU9cIpRMCCPTP7NYLnjMA0GCSqGSIb3DQEBCwUAA4IBgQBxa53DK6bHVXcv 5Uo+QIgpi43ybbXlSY/7a2fFiMZLRiJ/gpm9qicZUAfNbXIG8eY7i6SCIIFa/on4 0CnZjPeFy7Hi4HZwFpT4Mdu6G5yAV94k70sWqi5Vfdcv0PO37GI0QyxqtzTCB07n JhhE/uyYuwLryXXOUq/r4z2O1N4OZyeALiA/ojO0oQxzuULoveFyasd05tmmPD+r TEePaoly889oH61GbOvYx7syO2AoViVGa2kZX5qUqfVhiYa3vd1uhU8UGqs8iHWW f8BaCawV7GpJ8yx4+rlLHT5nzLcrg8+c8tGHuoFLgPdS3WuJXNrQjtwfd95u/Rx0 mQUm5QDZgIdYSJmYYt6fVyqxRrszSOcS/6qsVeethyqP0ni5jsQjxiWz1jb2cfiT Er1nrK8Z3F4wm+pLovR5em7ck1BayNUmcXonsfHcUZVb/skfLxxVu7znPI8epMz+ 5EgHvw2trURiay3DlgXy6uj5tp/PbG6V+UtgH5Iso9WzByLXcuk= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Personnels.crl_url0000664001343500074740000000010413614364101027104 0ustar davidgdavidghttp://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-personnels.crl igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Personnels.signing_policy0000664001343500074740000000044213614364101030464 0ustar davidgdavidg# @(#)$Id: AC-GRID-FR-Personnels.signing_policy,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ # Root access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" "/O=GRID-FR/*"' igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Personnels.info0000664001343500074740000000077213614364101026410 0ustar davidgdavidg# # @(#)$Id: AC-GRID-FR-Personnels.info,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ alias = AC-GRID-FR-Personnels url = http://grid-fr.renater.fr/ email = grid-fr@renater.fr ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr-personnels.cer crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-personnels.crl status = accredited:classic version = 1.104 sha1fp.0 = CA:F3:29:BD:77:67:9E:06:05:DB:1D:41:DF:7A:77:76:F1:78:2A:A9 subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Robots.pem0000664001343500074740000000400513614364101025347 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFvjCCBCagAwIBAgISESFAl7trMdJXz5ZYSEYjPuxtMA0GCSqGSIb3DQEBCwUA MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw MDgwMDAwWjBMMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL DAdHUklELUZSMRowGAYDVQQDDBFBQyBHUklELUZSIFJvYm90czCCAaIwDQYJKoZI hvcNAQEBBQADggGPADCCAYoCggGBAL/+wRKB3L7pCr2BZX0phbCRLZLw3nCLwd11 mZf1X+NLOQFdvENc0fHpesvBBidtjk+aBzUTkjqIX2MV0UnQMn82mww1HcdGFEOt Gwa4w9GRDYHdkzoqMs41S7IQ055OWbJlJKKKf0DIGU8qYCkeru7C6X9+29TvAkOv 8d3o6OyJhBaUOHoi1jOzI63uAPsMVihMBiAClLVj+lpZdE+ugdGkRlgjEmdLuvmP JSE8xgv8F+JwiY89VSzcIoV1hSlV9o8bWrgRBat7EHafF69Y+DyQ6FA7w/enqLMI xsx1ZqTuabN+DHc8/yq8rsGiu9RMSJmhPhyagbu0BgGA0kpd6okBnvLrZGmi3+M7 UsAUycr2t8Gf+RddcE4amfz8q8GewhkGsHRiH7aghW2hajLWBkKlvNZcKN57/I/N wfNAa3KS7qECgjQ4uFhvFamkqJz39NY/TR5F8HxWR2Ul37HGOmoRPYnUlIKQNUiH y9UXwiNCZ9dHjGLD8ReII3n3UoT+XwIDAQABo4IBnzCCAZswDgYDVR0PAQH/BAQD AgEGMFEGA1UdIARKMEgwRgYEVR0gADA+MDwGCCsGAQUFBwIBFjBodHRwOi8vZ3Jp ZC1mci5wbmNuLmVkdWNhdGlvbi5nb3V2LmZyL3BjLWdyaWQtZnIwEgYDVR0TAQH/ BAgwBgEB/wIBADBJBgNVHR8EQjBAMD6gPKA6hjhodHRwOi8vY3JsLmdyaWQtZnIu cG5jbi5lZHVjYXRpb24uZ291di5mci9hYy1ncmlkLWZyLmNybDCBlgYIKwYBBQUH AQEEgYkwgYYwRAYIKwYBBQUHMAKGOGh0dHA6Ly9jZXIuZ3JpZC1mci5wbmNuLmVk dWNhdGlvbi5nb3V2LmZyL2FjLWdyaWQtZnIuY2VyMD4GCCsGAQUFBzABhjJodHRw Oi8vb2NzcC5ncmlkLWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvZ3JpZC1mcjAd BgNVHQ4EFgQU92A8S+yen2ovurd7hApcKJ21uGYwHwYDVR0jBBgwFoAUqgzWvPnZ ZT1wilEwII9M/s1gueMwDQYJKoZIhvcNAQELBQADggGBADXYjAaOvjIP/dbFquB3 NqNKG4iz0gCXJXPco/rLfGww2C01zVFBMqvIWhMqPXRH98mNO/HSoq/NiyDh8EIT hfpKdo1+//rWARcqAolOK8/2u+saKJj/GaYL5SNjKW+apLxF6Cg7TZvPvee+zBw3 txpHtkghmrBs/LPiiDt9fr4fPSeffS/BYrOHoErm1in1LV3Zkv2KWg30XtZ+xc3b CmWCpyXrE4hLjzDp6r7e08Iz5/t0K5kKKiXxVF4QSTTYzPtPZsher7SOBfFsB6yE 83QQNhs83ICJ/Ws96LYc1De/wws5REFQUkXWOOvT4bbSCa8JbS/eztM1wWfTY8y7 dbkmP9B4tDEgfZghXIkNGxZF1/d6LrEoegtN0qCdlTBlEZcdO9Q2hN4T16fGSYzz ans/sAwE7MG58tNljYNipEgltzxYbe2MyUYDBQcBn5eFbxliJAV7qQupZbwdWyXJ h2ZRUAyxdNAh+U34FlMN3mRfoMLHgWFE6WnkCIaVOEcOsg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Robots.crl_url0000664001343500074740000000010013614364101026220 0ustar davidgdavidghttp://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-robots.crl igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Robots.signing_policy0000664001343500074740000000042613614364101027606 0ustar davidgdavidg# @(#)$Id: AC-GRID-FR-Robots.signing_policy,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ # Root access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" "/O=GRID-FR/*"' igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Robots.info0000664001343500074740000000074613614364101025531 0ustar davidgdavidg# # @(#)$Id: AC-GRID-FR-Robots.info,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ alias = AC-GRID-FR-Robots url = http://grid-fr.renater.fr/ email = grid-fr@renater.fr ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr-robots.cer crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-robots.crl status = accredited:classic version = 1.104 sha1fp.0 = 4F:F6:0F:C9:6B:74:29:E5:47:2A:A5:6F:6D:16:0B:08:E1:A9:F3:B5 subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Services.pem0000664001343500074740000000400513614364102025663 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFwDCCBCigAwIBAgISESGxMY3ZpgPWXUE/0bGX9r+ZMA0GCSqGSIb3DQEBCwUA MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw MDgwMDAwWjBOMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL DAdHUklELUZSMRwwGgYDVQQDDBNBQyBHUklELUZSIFNlcnZpY2VzMIIBojANBgkq hkiG9w0BAQEFAAOCAY8AMIIBigKCAYEA7SW/hkgx3e0dZygJyUmm2tzr6r9yLlNZ zVZ4kIga7MI5+uUzBTlqj5V5mrgQJu3+8/K0frrxETl4Vt7kkQEY+7h+2jgY8ED0 zYWvfEfqTgqVnoFv96KDRfhy19W9vzx2mXuwZkPUVwiC4mFTtdmyxQ1IEyO8E3IC 2c0iJm9CCdJBQBt9kvuRbEksjmPCPtmIeS1RUYe2YSewJgzkSmyPTOjfG13/u8xG xBvPOSoyPceE2+V6/GHYXwML5KZ4RVjgm2Iy/d2oWQqPLdwXG4PLjD37WKd6Sfsr RsuJIBC6mMJAQRBy7V1DjgOiq4MkG+BktVrzVE2XZiF/QNyooM2TmHql6P/Pd8nU Y4bJKY/G/JfKG1hmBOLiiUANmbu+0qruyEEQoBTErQw+0e616T6KclSJA03CuuQT YM8JISYwL6pWPtheZFGj3nB6QkTx9Ym+Nq5Q4nvFe76r2NZF6PDNEMkoUxSRMDEk obzYmRMAmElimK7V3towUBMD7fbuGyy/AgMBAAGjggGfMIIBmzAOBgNVHQ8BAf8E BAMCAQYwUQYDVR0gBEowSDBGBgRVHSAAMD4wPAYIKwYBBQUHAgEWMGh0dHA6Ly9n cmlkLWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvcGMtZ3JpZC1mcjASBgNVHRMB Af8ECDAGAQH/AgEAMEkGA1UdHwRCMEAwPqA8oDqGOGh0dHA6Ly9jcmwuZ3JpZC1m ci5wbmNuLmVkdWNhdGlvbi5nb3V2LmZyL2FjLWdyaWQtZnIuY3JsMIGWBggrBgEF BQcBAQSBiTCBhjBEBggrBgEFBQcwAoY4aHR0cDovL2Nlci5ncmlkLWZyLnBuY24u ZWR1Y2F0aW9uLmdvdXYuZnIvYWMtZ3JpZC1mci5jZXIwPgYIKwYBBQUHMAGGMmh0 dHA6Ly9vY3NwLmdyaWQtZnIucG5jbi5lZHVjYXRpb24uZ291di5mci9ncmlkLWZy MB0GA1UdDgQWBBTVeoDzRACxUnt+aN4TNqW0USLf6zAfBgNVHSMEGDAWgBSqDNa8 +dllPXCKUTAgj0z+zWC54zANBgkqhkiG9w0BAQsFAAOCAYEAXY6YlQPTvwXjhM+i tpoy17NrZ7r0RWkT0LeeDI6dBemQeQzeJ6JkxQAd5yxLhTvsc+BdYDvHSFV6NPnP KfuPsh1GdM6MjyvOeBN35uwCTgSG/Z7csiY3DNp3h0rXf/uBopWu1FB2ILpDVdgn d2mxGNkFNs3ZwSGIAv+SJi4MR1/279OUIQCTnjz7wgXbgiq0DyzgQuN4Mn3yQ1o2 CfmsOmHkAalHre5MFRveg2C4Xe0YXO+XNR6tI3XMzmV2awhtqp8yZUpRhthcBQTk QcIrifdWiPGYtLiLzjwYoqcXO1FXbQ29H+Bmpa77beii0cg7GJk9BITJb/oIDZ0k BHjCpFyzkTZ2jHBWyFWgF+2BYD63CW/qrVj4TJEPFw1zruJ6OhN42FVPzwe/44Fn D/iUz34tRkzM1RCklLT9vKeFdbjntYNqSoQYmx/6jkrbsGpFIyk4tQOC42eH3r9O 8AonjVA2EZ2EhUM/tZKiLvbC4muWiIvBWFb7+9MkstgKiePb -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Services.crl_url0000664001343500074740000000010213614364102026536 0ustar davidgdavidghttp://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-services.crl igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Services.signing_policy0000664001343500074740000000043413614364102030121 0ustar davidgdavidg# @(#)$Id: AC-GRID-FR-Services.signing_policy,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ # Root access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" "/O=GRID-FR/*"' igtf-policy-installation-bundle-1.104/src/accredited/AC-GRID-FR-Services.info0000664001343500074740000000076013614364102026041 0ustar davidgdavidg# # @(#)$Id: AC-GRID-FR-Services.info,v 1.1 2018/03/06 07:56:31 pmacvsdg Exp $ alias = AC-GRID-FR-Services url = http://grid-fr.renater.fr/ email = grid-fr@renater.fr ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr-services.cer crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-services.crl status = accredited:classic version = 1.104 sha1fp.0 = 98:7B:6B:9F:E1:64:75:02:F1:DD:5A:DB:29:74:A5:7F:9D:57:94:B5 subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" igtf-policy-installation-bundle-1.104/src/accredited/AEGIS.pem0000664001343500074740000000277513614364102023433 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEPzCCAyegAwIBAgIBADANBgkqhkiG9w0BAQsFADAwMQswCQYDVQQGEwJSUzEO MAwGA1UEChMFQUVHSVMxETAPBgNVBAMTCEFFR0lTLUNBMB4XDTA5MDExOTEzNTE0 NloXDTI3MDExNzEzNTE0NlowMDELMAkGA1UEBhMCUlMxDjAMBgNVBAoTBUFFR0lT MREwDwYDVQQDEwhBRUdJUy1DQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBANk1lsZfPi9AJ50WoMiZCN0D3mjvD07xKBqyDHo3uWzHG2jxapj2yqIHcZPo kc3425oQ9Cq5epf9GM+XDeDlstEtya7bVWh3WULEtlvV1cNMsYGy2G6597PYPewY /07e1uQRvkse1YmDIqNqpmpjTqwyZn9RRchjQfNKdhCOLwpZMsrajCom0ywp1Q/x vGXiUYnYalO+Y3ExnGL3Ege7zIWKWhMqifnckUmo+ZpS33rrcdZX7yKHA7E8iyw5 m4pMOiWpG5uYHmcr7agitDnOagPiVFJSup6gPnQIDmCs5PacxlvBb7OCkIRunzay ZbEFU9FgmC36lIPD/x+A3wDE4bsCAwEAAaOCAWIwggFeMA8GA1UdEwEB/wQFMAMB Af8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzA9BglghkgBhvhC AQ0EMBYuQUVHSVMgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUm9vdCBDZXJ0aWZp Y2F0ZTAdBgNVHQ4EFgQUaxgRe0kLyWHMyLEow1FP3X10MA8wWAYDVR0jBFEwT4AU axgRe0kLyWHMyLEow1FP3X10MA+hNKQyMDAxCzAJBgNVBAYTAlJTMQ4wDAYDVQQK EwVBRUdJUzERMA8GA1UEAxMIQUVHSVMtQ0GCAQAwRAYDVR0fBD0wOzA5oDegNYYz aHR0cDovL2FlZ2lzLWNhLnJjdWIuYmcuYWMucnMvcmVwb3NpdG9yeS9jcmwtdjIu Y3JsMCoGA1UdEgQjMCGBH2FlZ2lzLWNhQGFlZ2lzLWNhLnJjdWIuYmcuYWMucnMw DQYJKoZIhvcNAQELBQADggEBAHLBTms1889aPZh7mXNJtrO4fGgNlp5MHrAqBh4Z oViHzcnij7RX/7oNwXJbe8UW/D171SlzP3N3Rw7nHRwZaDuF+M9Gye61ITi/lS4J T2U3x+LPCEoyD/yzlvDDdn65aL9dGj3MoB2oeWrO8YYtJeglUYrPJ87oTVds4WBA W2VSrB8jr1/VqVs8hH0Bt6kRlqZNH0wmqiBC+HZVBIa43sAQ0Bkotlw+EQdg4v4O Odfhyqp2MeYqFI4NSNSpJ1v/Uq+lswfWW24Ws6yHKEhsO5XRGHu2azWxrzsy3xWS KBVhinUJyObN0dlIBctsI5PKK4VtiyDOlpmI0V/PneMT2WQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/AEGIS.crl_url0000664001343500074740000000006413614364102024301 0ustar davidgdavidghttp://aegis-ca.rcub.bg.ac.rs/repository/crl-v2.crl igtf-policy-installation-bundle-1.104/src/accredited/AEGIS.signing_policy0000664001343500074740000000031113614364102025647 0ustar davidgdavidg# @(#)$Id: 393f7863.signing_policy,v 1.1 2007/03/08 12:36:22 pmacvsdg Exp $ access_id_CA X509 '/C=RS/O=AEGIS/CN=AEGIS-CA' pos_rights globus CA:sign cond_subjects globus '"/C=RS/O=AEGIS/*"' igtf-policy-installation-bundle-1.104/src/accredited/AEGIS.namespaces0000664001343500074740000000057113614364102024761 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)393f7863.namespaces # CA alias : AEGIS # subord_of: # subjectDN: /C=RS/O=AEGIS/CN=AEGIS-CA # hash : 393f7863 # (generated automatically from 393f7863.signing_policy) # TO Issuer "/C=RS/O=AEGIS/CN=AEGIS-CA" \ PERMIT Subject "/C=RS/O=AEGIS/.*" igtf-policy-installation-bundle-1.104/src/accredited/AEGIS.info0000664001343500074740000000064613614364102023600 0ustar davidgdavidg# @(#)$Id: 393f7863.info,v 1.5 2015/06/18 09:44:53 pmacvsdg Exp $ alias = AEGIS url = http://aegis-ca.rcub.bg.ac.rs/ ca_url = http://aegis-ca.rcub.bg.ac.rs/repository/ca.pem crl_url = http://aegis-ca.rcub.bg.ac.rs/repository/crl-v2.crl email = aegis-ca@rcub.bg.ac.rs status = accredited:classic version = 1.104 sha1fp.0 = D5:74:B7:F4:4C:F3:C4:1B:9A:78:3F:C3:4C:C6:8E:EA:4D:AB:AA:8F subjectdn = "/C=RS/O=AEGIS/CN=AEGIS-CA" igtf-policy-installation-bundle-1.104/src/accredited/ANSPGrid.pem0000664001343500074740000000364413614364102024146 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFdjCCA16gAwIBAgIJAJFFAPH7WZq0MA0GCSqGSIb3DQEBBQUAMEgxCzAJBgNV BAYTAkJSMQ0wCwYDVQQKEwRBTlNQMRQwEgYDVQQLEwtBTlNQR3JpZCBDQTEUMBIG A1UEAxMLQU5TUEdyaWQgQ0EwHhcNMTEwODI1MTgxNTEwWhcNMjEwODIyMTgxNTEw WjBIMQswCQYDVQQGEwJCUjENMAsGA1UEChMEQU5TUDEUMBIGA1UECxMLQU5TUEdy aWQgQ0ExFDASBgNVBAMTC0FOU1BHcmlkIENBMIICIjANBgkqhkiG9w0BAQEFAAOC Ag8AMIICCgKCAgEAynEsbldOTIlPCyBSBTwMw2jE+uBvwFBKjyzYR94wefBactKx FsoLqgclOiv17TAUqaIlVQx+diunsEzDcdoeqyILlR3IDRyj6OEuS6wQ2nZb1g6j CAEV2oBbtIdHAkL00DD5RxQBSKsSgEbkObv1rJcRkbBeNZyHdE9nswNAgcO48MwI aBG8JvunmkeATUh4hY+c5t5euj8BYI1ouCNu2bxkJ8kVKYkvrkpI972m/vzMx9Sf sdGobfnmaUah2Wq3L6spdxU/Dojr8aJHVxnPLp8y4atdSqlGCyriPTlnC2hULqxn rahUIDloQXiYoYC2aLb66vxaRTMjV3EmpiqgXyl04AEkb+hAwb//kXq+wMNoruDo z6zhAI7jyQFUve5PMcDiXAyZx5R4oSp1I2iwOjxR2oKnhML0m1iSrIvHC7Vzc16g cHV7uicA9Tu0NW7dxezEY1HQwKZT3qO2BmOgnQ2UHSINJaUgNB//2HD8VyBbVxOD 5J5pkaRro+IMsZuHB3jMwbK4tWG61o9DQmEhmk1DAXwQ0r9mnKAKsSZpS7PQCIBq jQWpnXLpZ3FlKvKjPGF318KRUKuP0exGMNJSSDVkxdP4hD/jT4t2bxIp23brYIKS SuhTM+748YglS3UbERujx0d3LpXNYFO+KIGlbEWxJaJc12ikLaCJ9yhwIMUCAwEA AaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE FBpe6dIaAhb1EcmMPe2Tn8CiuTThMB8GA1UdIwQYMBaAFBpe6dIaAhb1EcmMPe2T n8CiuTThMA0GCSqGSIb3DQEBBQUAA4ICAQCeLsOmK+TK+8AXx4JDbbHE0cHxP+ja q6wAftMDpHTO9oAwhw5ewc+BSCxTSBCMWaKDIWaPCwKPzJ9WE+f32lvb05lEmWIn rpXjeSFs+UrkwLX0lh7iNDcvHuCoDy/MDHsiTCFiC5OPa78U+BPkIzS82Ip1d5wc kMrFZFonowLkWfOGIPMFjWUBSCOioXDnjpDLHCC9X4Dj6dXMYM+T+dXerdrQ7dDT bc4e4O6mSHXZiSSS9kyEnfbPYl2tUYrkNfHqaN+7Kq7bTluBatuAxofnUJJZOV6i boWLnWNLY4FvZ+m1wmj6uhCalt9E3B7vK+ps6bhD5RQuF55uGozlplj07r9JHVmu BU4yDeJ3485A4+EeegQLQVcetdFebQdBUJZriTyfCXrBMt4O5h8yaYMKlyyffpUx 8wBIh+wst2PzNKo0jZVjK/u5s6Vl4fEK6DwcAq3gkmSFn9CSZQM2KPPg0FIImwaS T6Km5w7a3EUW00sYP6gL+SENfasghN0+e7vlhJGGN1g+3K3s36LgT57EvNh9ALzM JI9mLCNHE5TgsOpSOFlhg+ZfR28K8KtztTtcCgjWludi1R6Oa1uH7UGwkDMquYsA /R0y15N3uKd3elFt6enmeRhkX6UC4hvQ0/2KNlVu2DH23z9aQ9UuQbiIE3OLBQKO eCIvI4I56jEB3w== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/ANSPGrid.crl_url0000664001343500074740000000005213614364102025015 0ustar davidgdavidghttp://gridca.ansp.br/media/ca/anspca.crl igtf-policy-installation-bundle-1.104/src/accredited/ANSPGrid.signing_policy0000664001343500074740000000026213614364102026373 0ustar davidgdavidg access_id_CA X509 '/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA' pos_rights globus CA:sign cond_subjects globus '"/C=BR/O=ANSP/OU=ANSPGrid CA/*"' igtf-policy-installation-bundle-1.104/src/accredited/ANSPGrid.namespaces0000664001343500074740000000065713614364102025505 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)126f0acf.namespaces # CA alias : ANSPGrid CA # subord_of: # subjectDN: /C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA # hash : 126f0acf # (generated automatically from 126f0acf.signing_policy) # TO Issuer "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA" \ PERMIT Subject "/C=BR/O=ANSP/OU=ANSPGrid CA/.*" igtf-policy-installation-bundle-1.104/src/accredited/ANSPGrid.info0000664001343500074740000000052713614364102024315 0ustar davidgdavidgalias = ANSPGrid ca_url = http://gridca.ansp.br/media/ca/anspca.pem crl_url = http://gridca.ansp.br/media/ca/anspca.crl email = gridca@ansp.br status = accredited:classic url = http://gridca.ansp.br version = 1.104 sha1fp.0 = 66:BA:64:12:F4:33:A2:ED:EB:27:11:90:38:BC:2B:B7:2A:40:0B:FA subjectdn = "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA" igtf-policy-installation-bundle-1.104/src/accredited/ASGCCA-2007.pem0000664001343500074740000000320313614364103024076 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEoTCCA4mgAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJUVzEL MAkGA1UEChMCQVMxRzBFBgNVBAMTPkFjYWRlbWlhIFNpbmljYSBHcmlkIENvbXB1 dGluZyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSBNZXJjdXJ5MB4XDTA5MDEyMzA4 NTE0N1oXDTI3MTAwNDA4NTE0N1owYzELMAkGA1UEBhMCVFcxCzAJBgNVBAoTAkFT MUcwRQYDVQQDEz5BY2FkZW1pYSBTaW5pY2EgR3JpZCBDb21wdXRpbmcgQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkgTWVyY3VyeTCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBAMAkxeG2p3ccJjM7LO/nX0NUh1CRB5l0kW5sZ+yGVgY+jDyGjkxQ e3LQH42Rb/Okb6Xzsf7mDYCJacNY3HzyLi9D7dYFWTBcdb0Ey9sGWpZEa+a2qAm3 DDjsMMTnojleNbWzqWEWqQXOtPkFsH6a37E2bnGjnfkdkK4d8Y4YZXeA5B7unH27 XQpQE72vKkrrYfDaVjkbpQ/eDi1/NkYUqaVRr9fweYpgPeCheMQuN6Asaq0HFo/P b3gM4WFhWS1oWukyUh+a4wb0t2Rm3Q2MHxsp0XZWjnj0QFyKuJfNso08YLp06Ycf war6X6f46Ks3ohEroW5+iQZ7sGpnxMQyiCcCAwEAAaOCAV4wggFaMA8GA1UdEwEB /wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR/TZcVl7SNX8DXd6sx dtBfa+JbMDCBjQYDVR0jBIGFMIGCgBR/TZcVl7SNX8DXd6sxdtBfa+JbMKFnpGUw YzELMAkGA1UEBhMCVFcxCzAJBgNVBAoTAkFTMUcwRQYDVQQDEz5BY2FkZW1pYSBT aW5pY2EgR3JpZCBDb21wdXRpbmcgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgTWVy Y3VyeYIBADBDBgNVHREEPDA6gRlhc2djY2FAZ3JpZC5zaW5pY2EuZWR1LnR3hh1o dHRwOi8vY2EuZ3JpZC5zaW5pY2EuZWR1LnR3LzBDBgNVHRIEPDA6gRlhc2djY2FA Z3JpZC5zaW5pY2EuZWR1LnR3hh1odHRwOi8vY2EuZ3JpZC5zaW5pY2EuZWR1LnR3 LzANBgkqhkiG9w0BAQUFAAOCAQEAXGzupdvaXTo1RbMEvX5Lx8/+JTU+bvYQQSIm nPJKrjcBNG2sBKBi8sBlzIqKyOBlNkfr0REkkA9vlcXcKCRJwxmYLGxemOhuqp48 tOo38qCBO7f+Hyzf1Jb/+TfyizBQ/22g06XAYoTiZwnXw+L6AKJ+oyiblLPPo2CT RoDQpJV0RPD9kvVgt2DHGX6wOdHKRZJtKu/zkK3JDopqrUdzx5gw+TNFCNbqxIgA okMhKsEUcUyLu25fOLmh/i92KQ99+g4wBXKKxnkDBaiU2igFZ2y3yEnYYLhkKFp4 O2/dPYVE+41CcQJNYHQKS9Qossw70Xta0SZByAHJTMxXKHqesg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/ASGCCA-2007.crl_url0000664001343500074740000000007413614364103024762 0ustar davidgdavidghttp://ca.grid.sinica.edu.tw/publication/CRL/ASGCCA-crl.pem igtf-policy-installation-bundle-1.104/src/accredited/ASGCCA-2007.signing_policy0000664001343500074740000000036513614364103026340 0ustar davidgdavidg# ASGCCA-2007 signing policy # Date: 31 May 2007 access_id_CA X509 '/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury' pos_rights globus CA:sign cond_subjects globus '"/C=TW/*"' igtf-policy-installation-bundle-1.104/src/accredited/ASGCCA-2007.namespaces0000664001343500074740000000065413614364103025443 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id: 9cd75e87.namespaces,v 1.2 2007/07/09 06:04:40 pmacvsdg Exp $ # CA alias : ASGCCA-2007 # subord_of: # subjectDN: /C=TW/O=AS/CN=Academia Sinica Grid Computing Certificate Authority # TO Issuer "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury" \ PERMIT Subject "/C=TW/.*" igtf-policy-installation-bundle-1.104/src/accredited/ASGCCA-2007.info0000664001343500074740000000056013614364103024253 0ustar davidgdavidgalias = ASGCCA-2007 crl_url = http://ca.grid.sinica.edu.tw/publication/CRL/ASGCCA-crl.pem email = ca@lists.grid.sinica.edu.tw status = accredited:classic url = http://ca.grid.sinica.edu.tw/ version = 1.104 sha1fp.0 = 0E:9E:58:74:61:4C:12:16:20:AC:34:07:CD:AD:E9:81:3C:08:61:95 subjectdn = "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury" igtf-policy-installation-bundle-1.104/src/accredited/AddTrust-External-CA-Root.pem0000664001343500074740000000276113614364103027313 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/AddTrust-External-CA-Root.crl_url0000664001343500074740000000006413614364103030166 0ustar davidgdavidghttp://crl.usertrust.com/AddTrustExternalCARoot.crl igtf-policy-installation-bundle-1.104/src/accredited/AddTrust-External-CA-Root.signing_policy0000664001343500074740000000112313614364103031536 0ustar davidgdavidg# EACL for AddTrust External CA Root access_id_CA X509 '/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root' pos_rights globus CA:sign cond_subjects globus '"/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root" "/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware" "/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority" "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority"' igtf-policy-installation-bundle-1.104/src/accredited/AddTrust-External-CA-Root.namespaces0000664001343500074740000000433113614364103030644 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3c58f906.namespaces # CA alias : AddTrust-External-CA-Root # subord_of: # subjectDN: /C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware # hash : 3c58f906 # TO Issuer "/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root" \ PERMIT Subject "/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware" TO Issuer "/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware" \ PERMIT Subject "/C=NL/O=TERENA/CN=TERENA eScience SSL CA" TO Issuer "/C=NL/O=TERENA/CN=TERENA eScience SSL CA" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root" \ PERMIT Subject "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 2" TO Issuer "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 2" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" \ PERMIT Subject "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 2" TO Issuer "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 2" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" TO Issuer "/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root" \ PERMIT Subject "/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority" TO Issuer "/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority" \ PERMIT Subject "/C=US/O=Internet2/OU=InCommon/CN=InCommon IGTF Server CA" TO Issuer "/C=US/O=Internet2/OU=InCommon/CN=InCommon IGTF Server CA" \ PERMIT Subject "/DC=org/DC=incommon/.*" igtf-policy-installation-bundle-1.104/src/accredited/AddTrust-External-CA-Root.info0000664001343500074740000000202513614364103027456 0ustar davidgdavidg# @(#)$Id: 3c58f906.info,v 1.5 2020/01/02 10:08:54 pmacvsdg Exp $ # AddTrust AB External CA Root # # Certificate Name: AddTrust External CA Root # CPS: This root is used for server certificate issuance today and is covered in # the following CPS docs (all from http://www.comodo.com/repository) : # December_2007_CPS_Amendment.pdf # Essential_SSL_addendum_to_the_Certification_Practice_Statement.pdf # PositiveSSL_addendum_to_the_Certification_Practice_Statement.pdf # litessl_cps_addendum.pdf # # 2017-05-16: this root is used no longer for TCS, but only for InCommon SSL # alias = AddTrust-External-CA-Root ca_url = http://crt.usertrust.com/AddTrustExternalCARoot.crt crl_url = http://crl.usertrust.com/AddTrustExternalCARoot.crl url = http://www.comodo.com/ policy_url = http://www.comodo.com/repository email = admin@incommon.org status = accredited:classic version = 1.104 sha1fp.0 = 02:FA:F3:E2:91:43:54:68:60:78:57:69:4D:F5:E4:5B:68:85:18:68 subjectdn = "/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root" igtf-policy-installation-bundle-1.104/src/accredited/ArmeSFo.pem0000664001343500074740000000225413614364103024070 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDRzCCAi+gAwIBAgICAYIwDQYJKoZIhvcNAQEFBQAwNDELMAkGA1UEBhMCQU0x EDAOBgNVBAoTB0FybWVTRm8xEzARBgNVBAMTCkFybWVTRm8gQ0EwHhcNMDMxMjAx MjMyOTIxWhcNMjMxMjAxMjMyOTIxWjA0MQswCQYDVQQGEwJBTTEQMA4GA1UEChMH QXJtZVNGbzETMBEGA1UEAxMKQXJtZVNGbyBDQTCCASIwDQYJKoZIhvcNAQEBBQAD ggEPADCCAQoCggEBALUswjWamaJEbZ0dJ85IuiDRceXW0wMoeCTxoHzQdIg0Slh3 pJub5HZxEHnJRrBkW9d/t1NDshqMqYg9cdO3fE3nVNR6I5n4EeP8aeomxI+in3bw 3+sFrLt6O7S16Dx2FmnbvDbFP+Ye9eTsdgO21j/4JekqccXNMWigQlyPE+Z7Oygk hD6QPxnNu7460CeS4LAr+zI0xNSaS+WUhPb9uPL3FS1kwovh9mCrkgxn3gDJ/NRk rdXoRywdOeO5HanYVaXJnqqaKzePriEkcnKkvlcqbuty82BJMvsW9Py3eWrkxIMU zGvhWQfTZYB5AHWD10ZuQ4h37ybGdWug8f8H65ECAwEAAaNjMGEwDwYDVR0TAQH/ BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPGXCp653/XH3JVPWGS4 P09e7G5XMB8GA1UdIwQYMBaAFPGXCp653/XH3JVPWGS4P09e7G5XMA0GCSqGSIb3 DQEBBQUAA4IBAQBhyKP1uyJ/XHvPWdbajhWrMkpcAidqjpBOVueAOqAdR/A9vE2I il3Slii4mlfsJ2J1dHGBFmNq4WKLUV0cm/C0c2csT5/eXsJ5oAyEiCnoP8dSzh52 XEKeKy73Uo87qxzSzQ9rPHByxsdQY/FZnzHDyF6mZpQI2HyW+5HEvIGODPGWqSYy 8Dmu4Cf/GhVk/tSUS54p07oDHixSmKaAk3DopOayy2Gwko26RxDY6JWRZmQMriEg C6mOMnIutjS10WxNu6SrPAseoYCp9kXJENrZF7hLmnX1SW89UmazPKPUf4yxugx9 RK6RSp4LQ1+HNCy5ieQ7Topbf/mhhQvhl9fQ -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/ArmeSFo.crl_url0000664001343500074740000000005113614364103024742 0ustar davidgdavidghttp://armesfoca-crl.scc.kit.edu/crl.pem igtf-policy-installation-bundle-1.104/src/accredited/ArmeSFo.signing_policy0000664001343500074740000000021713614364103026321 0ustar davidgdavidg# EACL ArmeSFo CA access_id_CA X509 '/C=AM/O=ArmeSFo/CN=ArmeSFo CA' pos_rights globus CA:sign cond_subjects globus '"/C=AM/O=ArmeSFo/*"' igtf-policy-installation-bundle-1.104/src/accredited/ArmeSFo.namespaces0000664001343500074740000000061713614364103025427 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)d0c2a341.namespaces # CA alias : ArmeSFo # subord_of: # subjectDN: /C=AM/O=ArmeSFo/CN=ArmeSFo CA # hash : d0c2a341 # (generated automatically from ./ArmeSFo/d0c2a341.signing_policy) # TO Issuer "/C=AM/O=ArmeSFo/CN=ArmeSFo CA" \ PERMIT Subject "/C=AM/O=ArmeSFo/.*" igtf-policy-installation-bundle-1.104/src/accredited/ArmeSFo.info0000664001343500074740000000064213614364103024241 0ustar davidgdavidg# # @(#)$Id: d0c2a341.info,v 1.8 2015/10/28 09:59:35 pmacvsdg Exp $ # Information for CA ArmeSFo # obtained from d0c2a341 in ArmeSFo/ alias = ArmeSFo email = ca@escience.am crl_url = http://armesfoca-crl.scc.kit.edu/crl.pem url = http://www.escience.am/ca/ status = accredited:classic version = 1.104 sha1fp.0 = 09:21:17:5F:8B:2B:3A:22:C8:AF:6B:8D:E7:4E:6B:71:62:43:A3:25 subjectdn = "/C=AM/O=ArmeSFo/CN=ArmeSFo CA" igtf-policy-installation-bundle-1.104/src/accredited/BG-ACAD-CA.pem0000664001343500074740000000277113614364104024040 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEPTCCAyWgAwIBAgIJAIOOxzG2rK3KMA0GCSqGSIb3DQEBCwUAMD8xEjAQBgoJ kiaJk/IsZAEZFgJiZzEUMBIGCgmSJomT8ixkARkWBGFjYWQxEzARBgNVBAMTCkJH LkFDQUQgQ0EwHhcNMDcwMjEyMTkwMDAwWhcNMjcwMjExMTkwMDAwWjA/MRIwEAYK CZImiZPyLGQBGRYCYmcxFDASBgoJkiaJk/IsZAEZFgRhY2FkMRMwEQYDVQQDEwpC Ry5BQ0FEIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt0/OaCi/ 0Z1ua/mq2EE+0JJs1LGOP0j+b9xcV/uG04r5KyUFNFRQroJ0kWLRE7NiWOqxXAny FVJJ9GAdhPBpI0tivnMxU74/xM+r1leb9rk7YcavaUodyZXADPrrysCZuKBAPFxf Wi1C5btzDk062/3l3k/Q7FV8IwqWFM0CJsk9Hv7mWFdDPOiFKYEq1fDINshevNC3 VP0e2LMCUtNZRErGMev7KNWfxWmnUHIBiJUdAB3RN+46PqL35QdMPlENfdRUBom3 IHN+WgyhvYPt7urqUnYJpYxbtK4ra1lwyMYnvYjST/DtlsM3QCSIAOYxNLVySlry /stmtAUprgcCbQIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAQYwHQYDVR0OBBYEFNF9YzjHaexWLM7u1W1Od8ej/TRsMB8GA1UdIwQY MBaAFNF9YzjHaexWLM7u1W1Od8ej/TRsMC0GCCsGAQUFBwEBBCEwHzAdBggrBgEF BQcwAoYRaHR0cDovL2NhLmFjYWQuYmcwaQYDVR0fBGIwYDAuoCygKoYoaHR0cDov L2NhLmFjYWQuYmcvY3JsL2JnX2FjYWRfY2EtY3JsLnBlbTAuoCygKoYoaHR0cDov L2NhLmFjYWQuYmcvY3JsL2JnX2FjYWRfY2EtY3JsLmRlcjAXBgNVHSAEEDAOMAwG CiqGSIb3TAUCAgEwIAYDVR0SBBkwF4EVb3BlcmF0aW9uc0BjYS5hY2FkLmJnMA0G CSqGSIb3DQEBCwUAA4IBAQAU+FlvJ5o9uYaIIk8VJP1fk+YTXs2+D/nlqo5GY/QM Ipl9yiF9AM1nbfUph7K+4XT/J7mOJmkT0/ajm1deLQyB3l+2EjZFuEam0gSnFlRn gGJ4ihGom5eaVLFOFoB4dvaxkWxWeMnPnU55UqHIknJRRiNOjkr6VSRECbTc2tO3 HzNQNQFizXlgdm5FkutWSiw/v4IB9RI46KNQgpuHvLGOIITzHB12khEHIWVt+hEQ si7epqj28APdK+3sbcYp853AaGJK7rtchbDVLJkiJb9fnEqAUdoY/Pcna5RH5I9K bwXvTCGXaGzDQOeU9W8UiKd2ux/ruWr+0ayLdvE8PFIp -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/BG-ACAD-CA.crl_url0000664001343500074740000000005513614364104024712 0ustar davidgdavidghttp://www.ca.acad.bg/crl/bg_acad_ca-crl.pem igtf-policy-installation-bundle-1.104/src/accredited/BG-ACAD-CA.signing_policy0000664001343500074740000000045613614364104026272 0ustar davidgdavidg# @(#)$Id: 2418a3f3.signing_policy,v 1.1 2007/03/07 09:19:23 pmacvsdg Exp $ access_id_CA X509 '/DC=bg/DC=acad/CN=BG.ACAD CA' pos_rights globus CA:sign cond_subjects globus '"/DC=bg/DC=acad/CN=BG.ACAD CA" "/DC=bg/DC=acad/O=people/*" "/DC=bg/DC=acad/O=hosts/*" "/DC=bg/DC=acad/O=services/*"' igtf-policy-installation-bundle-1.104/src/accredited/BG-ACAD-CA.namespaces0000664001343500074740000000110313614364104025362 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)2418a3f3.namespaces # CA alias : BG-ACAD-CA # subord_of: # subjectDN: /DC=bg/DC=acad/CN=BG.ACAD CA # hash : 2418a3f3 # (generated automatically from 2418a3f3.signing_policy) # TO Issuer "/DC=bg/DC=acad/CN=BG.ACAD CA" \ PERMIT Subject "/DC=bg/DC=acad/O=people/.*" TO Issuer "/DC=bg/DC=acad/CN=BG.ACAD CA" \ PERMIT Subject "/DC=bg/DC=acad/O=hosts/.*" TO Issuer "/DC=bg/DC=acad/CN=BG.ACAD CA" \ PERMIT Subject "/DC=bg/DC=acad/O=services/.*" igtf-policy-installation-bundle-1.104/src/accredited/BG-ACAD-CA.info0000664001343500074740000000064213614364104024205 0ustar davidgdavidg# @(#)$Id: 2418a3f3.info,v 1.2 2015/06/18 09:44:53 pmacvsdg Exp $ alias = BG-ACAD-CA url = http://www.ca.acad.bg/ ca_url = http://www.ca.acad.bg/ca_cert/bg_acad_ca-cacert.pem crl_url = http://www.ca.acad.bg/crl/bg_acad_ca-crl.pem email = operations@ca.acad.bg status = accredited:classic version = 1.104 sha1fp.0 = 6E:CF:1B:7B:D4:5B:3A:00:A4:A1:07:9B:21:B2:97:D5:28:8B:8B:3A subjectdn = "/DC=bg/DC=acad/CN=BG.ACAD CA" igtf-policy-installation-bundle-1.104/src/accredited/BYGCA.pem0000664001343500074740000000254713614364104023427 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID0TCCArmgAwIBAgIISoS33SnI0f0wDQYJKoZIhvcNAQEFBQAwdjESMBAGCgmS JomT8ixkARkWAmJ5MRQwEgYKCZImiZPyLGQBGRYEZ3JpZDEYMBYGA1UEChMPdWlp cC5iYXMtbmV0LmJ5MTAwLgYDVQQDEydCZWxhcnVzaWFuIEdyaWQgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMDgxMDE0MTk1NTQzWhcNMjgxMDE0MTk1NTQzWjB2 MRIwEAYKCZImiZPyLGQBGRYCYnkxFDASBgoJkiaJk/IsZAEZFgRncmlkMRgwFgYD VQQKEw91aWlwLmJhcy1uZXQuYnkxMDAuBgNVBAMTJ0JlbGFydXNpYW4gR3JpZCBD ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBAJ5yZNcyRx3U+DS0wwlHcfqwyQNbOxCr2wPJf3iGelRQzdeZlajfvw4e cvojiMLcRZdj4zfuUInMrpkDycC/NeJwzb3E5h3enLxo/oVs7eGRsF7LfMidMJUl 2BcV4wwswfE+Va2YP7UyBwv5dNqxpNWpx4tEpCYF6AjzOYmP1Lcvw+HQPZB6QlzV /N0/bAsGlkV32DKM0WTOXhkafStbwqfeo070rOm6GDOmtayCXIJGQkUd3RI4wtQ5 CTsBsfsbJ/ou/CsIVu62kac7GXc2//994/H6ggNRTgDpfXVDVTal6qYWC55ePH/1 e18/dNYaQwg3OME8uM0KCJaMH/uNUqkCAwEAAaNjMGEwHQYDVR0OBBYEFC8xLMGF U0dk22GwClcNLawTEP97MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAULzEs wYVTR2TbYbAKVw0trBMQ/3swDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUA A4IBAQAQZUPUVyB65WHyUrq2Eu1tF0Wilyt5DAcxUWCA06P9L3pweHqWh1k3mlOz AgcZU0PkZoAo1gSd7XLpDZuwkJ3ae0rnkYuNCyWvgwk6+qRowq3BUt7gUWKaoxCq kqAS434HZfRP7Szmdscu4khm1Ijf9U0GGchWrcag65pR/LCokTh7VEk0pIk+aVzH t1sy9EeSie0g9FPb9yPmg9+/ZMtW942dmrxP0BrkeYQdMJK7/ukwJD8IInhNdkTm it2A7R/beT9JoYyE9BQmbJBr2n8YyRaELShDq1WMbhDbKG5Eva3MjlxlMukDfkgR ZWN46ObYT+60taE6HzjT0K0NqL0T -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/BYGCA.crl_url0000664001343500074740000000004013614364104024272 0ustar davidgdavidghttp://ca.grid.by/bygca-crl.crl igtf-policy-installation-bundle-1.104/src/accredited/BYGCA.signing_policy0000664001343500074740000000057313614364104025660 0ustar davidgdavidg# EACL - Belarussian Grid CA 709bed08 # @(#)$Id: 709bed08.signing_policy,v 1.1 2009/04/27 18:48:04 pmacvsdg Exp $ # access_id_CA X509 '/DC=by/DC=grid/O=uiip.bas-net.by/CN=Belarusian Grid Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/DC=by/DC=grid/O=uiip.bas-net.by/CN=Belarusian Grid Certification Authority" "/DC=by/DC=grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/BYGCA.namespaces0000664001343500074740000000073613614364104024763 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)709bed08.namespaces # CA alias : BYGCA # subord_of: # subjectDN: /DC=by/DC=grid/O=uiip.bas-net.by/CN=Belarusian Grid Certification Authority # hash : 709bed08 # (generated automatically from 709bed08.signing_policy) # TO Issuer "/DC=by/DC=grid/O=uiip.bas-net.by/CN=Belarusian Grid Certification Authority" \ PERMIT Subject "/DC=by/DC=grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/BYGCA.info0000664001343500074740000000100113614364104023561 0ustar davidgdavidg# BYGCA - Belarusian Grid CA (UIIP NASB) # @(#)$Id: 709bed08.info,v 1.5 2015/06/18 09:44:53 pmacvsdg Exp $ # alias = BYGCA ca_url = http://ca.grid.by/bygca-cacert.pem crl_url = http://ca.grid.by/bygca-crl.crl policy_url = http://ca.grid.by/cpcps.html email = ca@newman.bas-net.by status = accredited:classic url = http://ca.grid.by/ version = 1.104 sha1fp.0 = 33:D6:1F:E9:AF:6F:98:D4:89:27:C1:AA:88:0E:8F:4B:66:0B:A2:72 subjectdn = "/DC=by/DC=grid/O=uiip.bas-net.by/CN=Belarusian Grid Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/CERN-GridCA.pem0000664001343500074740000000641513614364104024416 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIJdjCCB16gAwIBAgIKYZhqPwAAAAAAAzANBgkqhkiG9w0BAQ0FADBKMQswCQYD VQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UEAxMjQ0VSTiBSb290IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IDIwHhcNMTMwNDIyMTExMDE2WhcNMjMwNDIyMTEy MDE2WjBWMRIwEAYKCZImiZPyLGQBGRYCY2gxFDASBgoJkiaJk/IsZAEZFgRjZXJu MSowKAYDVQQDEyFDRVJOIEdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIi MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDS9Ypy1csm0aZA4/QnWe2oaiQI LqfeekV8kSSvOhW2peo5cLNIKbXATOo1l2iwIbCWV8SRU2TLKxHIL8fAOJud5n9K mEKBew7nzubl1wG93B4dY0KREdb3/QB/7OkG8ZZvLqrvQZVGT1CgJ+NFFUiJ315D FWkKctZv27LjQamzCxpX+gZSsmwZmSReY67cnm6P7z+/3xVNhwb+4Z+1Ww4vHhMc dh1Dsrkv9vXU01UN752QtQ6l56uQLYEB2+vaHB6IpyC9zAQ/33GulCq8Gbj7ykPd 9AcRVBeJAErSK+oMHThtdLD7mhTkZivakaNe4O1EhPFH0rWwV45IFN7ipELA5qDx djdzo6JtLJQMaSV/TV+amEf2CaKlD0giqGhjfSNiOX5HCmpqV14kbl+7Qho6ykZy b1DGpf70yILnX+AUtdpd8lulTu1yg1Bg5cFQskUIk5+s4nsC1VpmeNxYaeFEcYZj Ph2mdD7zLo889MtF7kZv7+6J6p4NBL3fQ9Os8/h8XVlfDatzbpVH4jYKKAd4nwJb knJaKPE0LzLzVfJBwnDxqe8hb64gI8Frludp+jaOYzvMqlzAe9z4a9971iXIWaaG unbAoEkXj69y7MsvCjWXB7o9HdBaS9FL+ZtXTKCyXl+XLFseYQoQburKr+eTcRed KLJNj4tRF1799PO69wIDAQABo4IEUDCCBEwwEAYJKwYBBAGCNxUBBAMCAQAwHQYD VR0OBBYEFKWg/WZY/bndeuGynZ+j0eVQGJTnMIIBLQYDVR0gBIIBJDCCASAwggEc BgorBgEEAWAKBAEBMIIBDDCBvgYIKwYBBQUHAgIwgbEega4AQwBFAFIATgAgAEcA cgBpAGQAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGkAbwBuACAAQQB1AHQAaABvAHIA aQB0AHkAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABQAG8AbABpAGMAeQAgAGEA bgBkACAAQwBlAHIAdABpAGYAaQBjAGEAdABlACAAUAByAGEAYwB0AGkAYwBlACAA UwB0AGEAdABlAG0AZQBuAHQwSQYIKwYBBQUHAgEWPWh0dHA6Ly9jYWZpbGVzLmNl cm4uY2gvY2FmaWxlcy9jcC1jcHMvY2Vybi1ncmlkLWNhLWNwLWNwcy5wZGYwGQYJ KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF MAMBAf8wHwYDVR0jBBgwFoAU+nv73psNo/JSt2ztWw8Loqam+AQwggFEBgNVHR8E ggE7MIIBNzCCATOgggEvoIIBK4ZSaHR0cDovL2NhZmlsZXMuY2Vybi5jaC9jYWZp bGVzL2NybC9DRVJOJTIwUm9vdCUyMENlcnRpZmljYXRpb24lMjBBdXRob3JpdHkl MjAyLmNybIaB1GxkYXA6Ly8vQ049Q0VSTiUyMFJvb3QlMjBDZXJ0aWZpY2F0aW9u JTIwQXV0aG9yaXR5JTIwMixDTj1DRVJOUEtJUk9PVDAyLENOPUNEUCxDTj1QdWJs aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u LERDPWNlcm4sREM9Y2g/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29i amVjdENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50MIIBRAYIKwYBBQUHAQEEggE2 MIIBMjBnBggrBgEFBQcwAoZbaHR0cDovL2NhZmlsZXMuY2Vybi5jaC9jYWZpbGVz L2NlcnRpZmljYXRlcy9DRVJOJTIwUm9vdCUyMENlcnRpZmljYXRpb24lMjBBdXRo b3JpdHklMjAyLmNydDCBxgYIKwYBBQUHMAKGgblsZGFwOi8vL0NOPUNFUk4lMjBS b290JTIwQ2VydGlmaWNhdGlvbiUyMEF1dGhvcml0eSUyMDIsQ049QUlBLENOPVB1 YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRp b24sREM9Y2VybixEQz1jaD9jQUNlcnRpZmljYXRlP2Jhc2U/b2JqZWN0Q2xhc3M9 Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0BAQ0FAAOCAgEAQjzXhTV8 d+6HaLqSnp7k9whxK6E75BZQJNR2Q/rslhhwijs6nekBjb+JPgmM6M0a7ra+D1Oi 4wKaWiCvU9yleZZSqfEkRl7WK9trRYXHqkqVSnmwNJNsediqioBBDHn/ZMnyc25Z OLbM+99Z+awvoMbyPy0moUrR7ZqKi3C02N2mkiidO0m3bYnXKwxDUvka5n06oLnI YSZfwFNJ7IEvSSF4mEzdDeQI+A+87+deb5XOTXee8i1ZUyI08Cg6tuZ8W6NdvY7t +5iNxRmZJ6DBVwrvXutz0JSqklBCw267osEpX0AKGSL9fE2yGlWBX8WfDLB43lVE z/HP7kQwYEmsfnfT2yTLzkMJrHSeR0Zymm/oB3amZziKex4kGk+/v7yV1pSYKJce 9QDZE+LYio/ndz01sejMPS87prYJqnII5hDYUjg9F1CoaejhjOlpmCU/10wyEVN0 nhSP9Wc5z0+lhzU5C1A9r1gXQMuqCA2e7Cv5wv+r9dS+12Uly52jwmYf8mm6H0ZY LZQbvMayHebD4WCnB7HNdp2Va4z5JrLvwG3J1EXfTjWiPhqOweevOg0rc6t2yhkM iB9RXMlFoFzbsuE/4Z4Hd0GQcDijcnWJ/VbT15OD2C16yyBiLvu88nXX1gKuOzxL vu4cw9FOuQZo147y9KPelpUT/SO+nrePzVs= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CERN-GridCA.crl_url0000664001343500074740000000011713614364104025270 0ustar davidgdavidghttp://cafiles.cern.ch/cafiles/crl/CERN%20Grid%20Certification%20Authority.crl igtf-policy-installation-bundle-1.104/src/accredited/CERN-GridCA.signing_policy0000664001343500074740000000041513614364104026644 0ustar davidgdavidg# @(#)$Id: 4339b4bc.signing_policy,v 1.1 2013/05/21 20:34:24 pmacvsdg Exp $ # CERN GridCA access_id_CA X509 '/DC=ch/DC=cern/CN=CERN Grid Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/DC=ch/DC=cern/*"' igtf-policy-installation-bundle-1.104/src/accredited/CERN-GridCA.info0000664001343500074740000000113013614364104024555 0ustar davidgdavidg# @(#)$Id: 4339b4bc.info,v 1.3 2015/06/18 09:44:53 pmacvsdg Exp $ # subject= /DC=ch/DC=cern/CN=CERN Grid Certification Authority alias = CERN-GridCA crl_url = http://cafiles.cern.ch/cafiles/crl/CERN%20Grid%20Certification%20Authority.crl ca_url = http://cafiles.cern.ch/cafiles/certificates/CERN%20Grid%20Certification%20Authority.crt url = http://www.cern.ch/ca email = cern-ca-managers@cern.ch requires = CERN-Root-2 status = accredited:classic version = 1.104 sha1fp.0 = 63:C2:81:78:6D:94:14:D7:51:56:33:89:21:64:F1:85:A6:B0:D1:E0 subjectdn = "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/CERN-LCG-IOTA-CA.pem0000664001343500074740000000643513614364105024750 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIJgzCCB2ugAwIBAgIKYQhS+wAAAAAABzANBgkqhkiG9w0BAQ0FADBKMQswCQYD VQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UEAxMjQ0VSTiBSb290IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IDIwHhcNMTYwMTIyMDk1MjEzWhcNMjYwMTIyMTAw MjEzWjBaMRIwEAYKCZImiZPyLGQBGRYCY2gxFDASBgoJkiaJk/IsZAEZFgRjZXJu MS4wLAYDVQQDEyVDRVJOIExDRyBJT1RBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyl6eck5MlYgl9cOxpCfF xwfR7BAS2HhOSHRM8xMX/zTadIF05Uc5L+1ucrFP1trVtMABkyuzbVIx34gFNJvH Jnn5nNvzIhZL9JuBU5iB5+NkC1qpJeaa2HSo0vr4zaKRhdNIkkMzi+S3ve2VI52v D6krQm1NwMu8te/tv7EuI2TuQRhKwz9MutwlcwQmWaq3QrKDxZJzQkAARvmpEX90 gsaDeWwVlQRBJnGTtG/3cBVULt1lPnp35uLdWfFUGaZZPKe+UcEmt8ETD2Qvb74U Nqxs5sHFcl5cLQF6TmlNtI3t5+3WLlP/UbiFMBqCr2RIU3EClEbzp1CBI0BRZkqW cymN+FaNMsD+f78ilI5qTuJXlCsaMRvKeyYDr3SF4selwaU8kbVoMxWH5cSI3l6e yBU6vLQ5fvoDCEmzDolZWq/XCSQjYnizLVBkywu9CmfjuSmAgCsvVxVyjilJSHSp Mjg6lrbO//Pw1EPHzyQdtXfOX+UuRep7R/szN0wGH5u/l+fWwSSUgTDL+qGgtJe4 /Q9aD2qEb3yFNDI8kdEMDVW2XSI3YWsLDlqeoZby1wO1pBiTw3ZpP0nhLlVl5ap6 HpR2FXFTZhaxUIFTzMBWOAkiZKQA4hCf4EEaZ7g73HjsmH4alQawJbEDjUrIyFhX wYG9ucEd5ad7P66SH/0h8dcCAwEAAaOCBFkwggRVMBAGCSsGAQQBgjcVAQQDAgEA MB0GA1UdDgQWBBSqp3Z97kXseEi4s3cC9B7Bdbb3cTCCATYGA1UdIASCAS0wggEp MIIBJQYKKwYBBAFgCgcBATCCARUwgcYGCCsGAQUFBwICMIG5HoG2AEMARQBSAE4A IABMAEMARwAgAEkATwBUAEEAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGkAbwBuACAA QQB1AHQAaABvAHIAaQB0AHkAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABQAG8A bABpAGMAeQAgAGEAbgBkACAAQwBlAHIAdABpAGYAaQBjAGEAdABlACAAUAByAGEA YwB0AGkAYwBlACAAUwB0AGEAdABlAG0AZQBuAHQwSgYIKwYBBQUHAgEWPmh0dHA6 Ly9jYWZpbGVzLmNlcm4uY2gvY2FmaWxlcy9jcC1jcHMvY2Vybi1pb3RhLWNhLWNw LWNwcy5wZGYAMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFPp7+96bDaPyUrds7VsPC6Km pvgEMIIBRAYDVR0fBIIBOzCCATcwggEzoIIBL6CCASuGUmh0dHA6Ly9jYWZpbGVz LmNlcm4uY2gvY2FmaWxlcy9jcmwvQ0VSTiUyMFJvb3QlMjBDZXJ0aWZpY2F0aW9u JTIwQXV0aG9yaXR5JTIwMi5jcmyGgdRsZGFwOi8vL0NOPUNFUk4lMjBSb290JTIw Q2VydGlmaWNhdGlvbiUyMEF1dGhvcml0eSUyMDIsQ049Q0VSTlBLSVJPT1QwMixD Tj1DRFAsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049 Q29uZmlndXJhdGlvbixEQz1jZXJuLERDPWNoP2NlcnRpZmljYXRlUmV2b2NhdGlv bkxpc3Q/YmFzZT9vYmplY3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCCAUQG CCsGAQUFBwEBBIIBNjCCATIwZwYIKwYBBQUHMAKGW2h0dHA6Ly9jYWZpbGVzLmNl cm4uY2gvY2FmaWxlcy9jZXJ0aWZpY2F0ZXMvQ0VSTiUyMFJvb3QlMjBDZXJ0aWZp Y2F0aW9uJTIwQXV0aG9yaXR5JTIwMi5jcnQwgcYGCCsGAQUFBzAChoG5bGRhcDov Ly9DTj1DRVJOJTIwUm9vdCUyMENlcnRpZmljYXRpb24lMjBBdXRob3JpdHklMjAy LENOPUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD Tj1Db25maWd1cmF0aW9uLERDPWNlcm4sREM9Y2g/Y0FDZXJ0aWZpY2F0ZT9iYXNl P29iamVjdENsYXNzPWNlcnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQEN BQADggIBAM5PRVUCkLtX2pZL18jE3lBysz2epHSgSoMCMLLvgnTw30MVtjRdsAZB H0XWzVtHpNrjlUIf/KG6v6E7ZiCYXpo1+zSjVZIblAIlmr9NaIqLHUDqwOYuY/y1 ZzpJA8pKbxLlLEI3wL1ckgO2kcQXGKM7+xLopb7PlaKN8zCXiA65f/hbFcA7hJJS DhzNMy864DH2y/z8u9H1F1v9C8qgCsiC1+/xMip2dd2EIKpapxBAiisMpDHtSIgE ncR5R9GScnc7d/8cPkmPzD1hlXB8SstOgpYsDLVGzNMNF7PnKmSGL+G06k/pUFTz ZCG8sv16zGRNr8XxTb2ngt23U70VAztNW+Kmg4hF3C7tk0pQno+Iuj8rJvgPrxzO IktqKRaqZKTmfn7lbprlbSufU4vkV2V2WuVN8YJHuJCHS94zHl59E9CokhEKHqI8 YNmsWEJgHfynow/BSpXeEBLC8AhlXr6rotyvbZHf/AdgmiRiuZxAG3i2pfI/JWDr sVV+2bR6ItmITkFSPi1Ku6pBpBSLuYF9IzJtn0OM7CEX5Zb55t2NUrIeIlVG0Sab q7zf4rr/y5s295JsO72lyMj43QhyKJn+GI3Rzupqr4t2KYykAL5vas/SxE3EmTvI tmCZr5KiqaHwACQo175HOTEiZPB0h64U18KPD+MhdXf0YJqmdGgi -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CERN-LCG-IOTA-CA.crl_url0000664001343500074740000000012513614364105025617 0ustar davidgdavidghttp://cafiles.cern.ch/cafiles/crl/CERN%20LCG%20IOTA%20Certification%20Authority.crl igtf-policy-installation-bundle-1.104/src/accredited/CERN-LCG-IOTA-CA.signing_policy0000664001343500074740000000060313614364105027173 0ustar davidgdavidg# @(#)$Id: CERN-LCG-IOTA.signing_policy,v 1.1 2016/01/27 17:00:22 pmacvsdg Exp $ # /DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority access_id_CA X509 '/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" "/DC=ch/DC=cern/DC=sts/*"' igtf-policy-installation-bundle-1.104/src/accredited/CERN-LCG-IOTA-CA.info0000664001343500074740000000113513614364105025112 0ustar davidgdavidg# @(#)$Id: CERN-LCG-IOTA.info,v 1.2 2016/03/21 07:39:22 pmacvsdg Exp $ # subject= /DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority alias = CERN-LCG-IOTA-CA crl_url = http://cafiles.cern.ch/cafiles/crl/CERN%20LCG%20IOTA%20Certification%20Authority.crl ca_url = https://cafiles.cern.ch/cafiles/certificates/CERN%20LCG%20IOTA%20Certification%20Authority.crt url = http://www.cern.ch/ca email = cern-ca-managers@cern.ch status = accredited:iota version = 1.104 sha1fp.0 = 6A:10:06:8C:40:B0:2E:54:76:14:44:1B:97:A4:48:79:5D:4C:AC:AA subjectdn = "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/CERN-Root-2.pem0000664001343500074740000000450213614364105024403 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGqTCCBJGgAwIBAgIQAojDcLlcbrhBX0qrEka4mzANBgkqhkiG9w0BAQ0FADBK MQswCQYDVQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UEAxMjQ0VSTiBSb290 IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDIwHhcNMTMwMzE5MTI1NTM2WhcNMzMw MzE5MTMwNTM0WjBKMQswCQYDVQQGEwJjaDENMAsGA1UEChMEQ0VSTjEsMCoGA1UE AxMjQ0VSTiBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDIwggIiMA0GCSqG SIb3DQEBAQUAA4ICDwAwggIKAoICAQDxqYPFW2qVVi3Rw1NKlEf7x70xF+6a8uE/ Tu4ZVQF/K2RXI95QLkYfKItZvy9Az3ib/VlUho5f8fBaqy4n70uwC7+qd3Aq1/xQ ysykPCbBBAsOSQQpTlhrMD2V5Ya9zrirphOhutddiqV96zBCyMM+Gz5uYv9u+cm4 tg1EOmAMGh2UNxfTFNVmXKkk7eFTSC1+zgb28H6nd3xzV27sn9bfOfGh//ZPy5gm Qx0Oh/tc6WMreWzRZBQm5SJiK0QOzPv09p5WmdY2WxZoqNTFBDACQO7ysFOktc74 fPVFX/lmt4jFNSZRIOvvaACI/qlEaAJTR4FHIY9uSMsV8DrtzhI1Ucyv3kqlQpbF jDouq44IryA/np4s/124bW+x8+n/v+at/AxPjvHBLiGhB+J38Z6KcJogoDnGzIXR S+YUr/vGz34jOmkRuDN5STuuAXzyCKFXaoAm0AwjTziIv3E0jxC1taw6FpKevnd1 CLsTLAEUiEjzStFkDhd/Hpipc57zmMFY8VYet2wVqSFjnt2REWOVbZlbCiMHmSeD u5EuZLiU8xlkiaCfn4A5XZ6X0qprbgDviGJtwxzNvTg7Hn0ziW5/ELryfQXCwZJ+ FVne8Zu8sbgy/sDkX+pyFuyB4XgiM0eMNkoexIXJaRdlMWDIL5ysiIXQKjhynAv5 KLHbRjciVwIDAQABo4IBiTCCAYUwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB Af8wHQYDVR0OBBYEFPp7+96bDaPyUrds7VsPC6KmpvgEMBAGCSsGAQQBgjcVAQQD AgEAMIIBMgYDVR0gBIIBKTCCASUwggEhBgorBgEEAWAKBAEBMIIBETCBwgYIKwYB BQUHAgIwgbUegbIAQwBFAFIATgAgAFIAbwBvAHQAIABDAGUAcgB0AGkAZgBpAGMA YQB0AGkAbwBuACAAQQB1AHQAaABvAHIAaQB0AHkAIAAyACAAQwBlAHIAdABpAGYA aQBjAGEAdABlACAAUABvAGwAaQBjAHkAIABhAG4AZAAgAEMAZQByAHQAaQBmAGkA YwBhAHQAZQAgAFAAcgBhAGMAdABpAGMAZQAgAFMAdABhAHQAZQBtAGUAbgB0MEoG CCsGAQUFBwIBFj5odHRwOi8vY2FmaWxlcy5jZXJuLmNoL2NhZmlsZXMvY3AtY3Bz L2Nlcm4tcm9vdC1jYTItY3AtY3BzLnBkZjANBgkqhkiG9w0BAQ0FAAOCAgEAo0Px l4CZ6C6bDH+b6jV5uUO0NIHtvLuVgQLMdKVHtQ2UaxeIrWwD+Kz1FyJCHTRXrCvE OFOca9SEYK2XrbqZGvRKdDRsq+XYts6aCampXj5ahh6r4oQJ8U7aLVfziKTK13Gy dYFoAUeUrlNklICt3v2wWBaa1tg2oSlU2g4iCg9kYpRnIW3VKSrVsdVk2lUa4EXs nTEJ30OS7rqX3SdqZp8G+awtBEReh2XPhRgJ6w3xiScP/UdWYUam2LflCGX3RibB /DZhgGHRRoE4/D0kQMP2XTz6cClbNklECTlp0qZIbiaf350HbcDEFzYRSSIi0emv kRGcMgsi8yTTU87q8Cr4hETxAF3ZbSVNC0ZaTZ8RBbM9BXguhYzKkVBgG/cMpUjs B6tY2HMZbAZ3TKQRb/bRyUigM9DniKWeXkeL/0Nsno+XbcpAqLjtVIRwCg6jTLUi 1NRsl3BP6C824dVaoI8Ry7m+o6O+mtocw4BMhHfTcoWCO8CWjT0ME67JzaAYa5eM +OqoWtgbgweBlfO0/3GMnVGMAmI4FlhH2oWKWQgWdgr0Wgh9K05VcxSpJ87/zjhb MQn/bEojWmp6eUppPaqNFcELvud41qoe6hLsOYQVUQ1sHi7n6ouhg4BAbwS2iyD2 uiA6FHTCeLreFGUzs5osPKiz3GE5D6V9she9xIQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CERN-Root-2.crl_url0000664001343500074740000000012313614364105025257 0ustar davidgdavidghttp://cafiles.cern.ch/cafiles/crl/CERN%20Root%20Certification%20Authority%202.crl igtf-policy-installation-bundle-1.104/src/accredited/CERN-Root-2.signing_policy0000664001343500074740000000055213614364105026640 0ustar davidgdavidg# @(#)$Id: b4278411.signing_policy,v 1.2 2016/01/27 17:00:22 pmacvsdg Exp $ # CERN Root 2 access_id_CA X509 '/C=ch/O=CERN/CN=CERN Root Certification Authority 2' pos_rights globus CA:sign cond_subjects globus '"/DC=ch/DC=cern/CN=CERN Grid Certification Authority" "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority"' igtf-policy-installation-bundle-1.104/src/accredited/CERN-Root-2.namespaces0000664001343500074740000000140613614364105025741 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id: b4278411.namespaces,v 1.2 2016/01/27 17:00:22 pmacvsdg Exp $ # CA alias : CERN-Root-2 # subjectDN: /C=ch/O=CERN/CN=CERN Root Certification Authority 2 # TO Issuer "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" \ PERMIT Subject "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" TO Issuer "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" \ PERMIT Subject "/DC=ch/DC=cern/.*" TO Issuer "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" \ PERMIT Subject "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" TO Issuer "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" \ PERMIT Subject "/DC=ch/DC=cern/DC=sts/.*" igtf-policy-installation-bundle-1.104/src/accredited/CERN-Root-2.info0000664001343500074740000000111113614364105024546 0ustar davidgdavidg# @(#)$Id: b4278411.info,v 1.2 2015/06/18 09:44:53 pmacvsdg Exp $ # subject= /C=ch/O=CERN/CN=CERN Root Certification Authority 2 alias = CERN-Root-2 crl_url = http://cafiles.cern.ch/cafiles/crl/CERN%20Root%20Certification%20Authority%202.crl ca_url = http://cafiles.cern.ch/cafiles/certificates/CERN%20Root%20Certification%20Authority%202.crt url = http://www.cern.ch/ca email = cern-ca-managers@cern.ch status = accredited:classic version = 1.104 sha1fp.0 = 57:6E:90:75:DD:66:92:8B:F2:5B:D9:52:D6:37:EA:AD:80:84:CC:9F subjectdn = "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-4.pem0000664001343500074740000000354313614364105024203 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFRjCCBC6gAwIBAgIHAPTqVoKaNjANBgkqhkiG9w0BAQsFADBcMRIwEAYKCZIm iZPyLGQBGRYCY3oxGTAXBgoJkiaJk/IsZAEZFgljZXNuZXQtY2ExEjAQBgNVBAoT CUNFU05FVCBDQTEXMBUGA1UEAxMOQ0VTTkVUIENBIFJvb3QwHhcNMTgwNTIwMDc1 NTE1WhcNMjgwNTIyMDc1NTE1WjBZMRIwEAYKCZImiZPyLGQBGRYCY3oxGTAXBgoJ kiaJk/IsZAEZFgljZXNuZXQtY2ExEjAQBgNVBAoMCUNFU05FVCBDQTEUMBIGA1UE AwwLQ0VTTkVUIENBIDQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCH rjWzpA/H7EUpitlDdhTmNCCLHtHUIgGqWcZRKeBiRB6B/8Cjj8r944IExE4/mBON y9O6bXfxdVyYZ8f6+XM5SUp7hoTJoDPASfsZxUIjq6MzApGqLFc/E33TZpe3aUr6 rhUMj5x1DsowHyAwTpER5l02Txq9oJ37IL+KwWJsuM+pCicLRa9fwsQj/5E347tn YSt2Mbdl8lX3yofkXIf3xdtxd071zrCYX93Ss5oNZE48DIoGN8EIKSnMl0IIHzHr 9Zy8w5ze8sof2xi1mE+lj3DbeYG0XKeGf6R2f81+uRnJZoWzJ5Hm4Vz+j/828gLh sXKlLI4SZyJ/cREOmqQHyRQR9MsruRlzn/Vrz2+clppzJZPWfj5pGPXTBx686/eW UvKcxW5TKmD7E+gBdwvBt6js88ZVM/lx607MbOQRLrMc5soh/Yw7QAvm4cP83v7k ErN9xr+ilb41p9YVfXN2ca0I05pPKoRLpgbagFqR6m+ZMABJboTELANtzyZfDk6e q/YK3PT9nQ+9dBccnMS3Eka1kLbGgDUJ6jCr+JT8lYKnoFAG0EVjWwUizNiMAnZe WwiyuzcNG0VslY160GNLqBsyoVne7RQVDQ8obDh06XYxTXKV2kEgxSmumbDE+mEe hGw/fIi3Zdf5CMEvH5ppElOrRRRGl7Q30yN2OkxZFwIDAQABo4IBDjCCAQowDwYD VR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFCeI0UEtDST1m+cx ETfQdu+AVPV4MB8GA1UdIwQYMBaAFJ5BMOPD1U6Mg46jPMl/o20TXYQlMG0GCCsG AQUFBwEBBGEwXzAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AuY2VzbmV0LWNhLmN6 LzA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5jZXNuZXQtY2EuY3ovQ0VTTkVUX0NB X1Jvb3QuY3J0MDsGA1UdHwQ0MDIwMKAuoCyGKmh0dHA6Ly9jcmwuY2VzbmV0LWNh LmN6L0NFU05FVF9DQV9Sb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAvPL4lo8j pfRDiuz+x6mI8hOFHONrbWbowmg1oFs5G9dcUWeu5VnYQk0uVLtUp5koLAAq20kH zMFGrXww7KhOZTxfhTx5RTqflVB4MX++KdnrfpXJ/7ASeKpzY2ltse7o+rcAMcON KygRr4cth9hdv2h02Pga10lr/ewv+mWBl312R+Yv3OdjNEjCQMt93aqGjSmlbZHO 65rn6x9rU9Ua36GKAC8gy3zitOmKOKr1MLrcRNCeCHtkhpL/dUsOUKbKYMxfpg7+ OgjA1WY/3yh07x/YtaOeQEw1ra0GVB0xdpCtrEico85SdD4bFf9+ZqDiPyE1xfo2 G/vfPaHz6dXNuA== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-4.crl_url0000664001343500074740000000005013614364105025052 0ustar davidgdavidghttp://crl.cesnet-ca.cz/CESNET_CA_4.crl igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-4.signing_policy0000664001343500074740000000026313614364105026433 0ustar davidgdavidg# EACL CESNET CA 3 dated 2010.02.12 access_id_CA X509 '/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4' pos_rights globus CA:sign cond_subjects globus '"/DC=cz/DC=cesnet-ca/*"' # igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-4.namespaces0000664001343500074740000000074413614364105025541 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)CESNET-CA-4.signing_policy.namespaces # CA alias : CESNET-CA-4 # subord_of: CESNET-CA-Root # subjectDN: /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4 # hash : CESNET-CA-4.signing_policy # (generated automatically from CESNET-CA-4.signing_policy) # TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-4.info0000664001343500074740000000105013614364105024344 0ustar davidgdavidg# # @($)$Id: CESNET-CA-4.info,v 1.1 2019/10/02 08:46:25 pmacvsdg Exp $ # CN=CESNET CA 4,O=CESNET CA,DC=cesnet-ca,DC=cz # alias = CESNET-CA-4 url = http://www.cesnet.cz/pki/ ca_url = http://crt.cesnet-ca.cz/CESNET_CA_4.crt crl_url = http://crl.cesnet-ca.cz/CESNET_CA_4.crl policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html requires = CESNET-CA-Root email = ca@cesnet.cz status = accredited:classic version = 1.104 sha1fp.0 = 7B:2F:BA:0C:D9:3F:EE:D2:B0:69:1F:53:E7:EB:AD:05:A7:23:FC:74 subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-Root.pem0000664001343500074740000000267013614364106024764 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEDTCCAvWgAwIBAgIJAIf3+gBzaRRPMA0GCSqGSIb3DQEBBQUAMFwxEjAQBgoJ kiaJk/IsZAEZFgJjejEZMBcGCgmSJomT8ixkARkWCWNlc25ldC1jYTESMBAGA1UE ChMJQ0VTTkVUIENBMRcwFQYDVQQDEw5DRVNORVQgQ0EgUm9vdDAeFw0wOTAyMjQx MzE2MDJaFw0yOTAyMjQxMzE2MDJaMFwxEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcG CgmSJomT8ixkARkWCWNlc25ldC1jYTESMBAGA1UEChMJQ0VTTkVUIENBMRcwFQYD VQQDEw5DRVNORVQgQ0EgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAPeL9R8QFCBHw/PlWt2wBnx0cCSiNAhlI7HInrzGmtHK/9MJQJpmcoToq91R Y+hdo7sVddNqbz3F+oeiKavz3wpdCZJtaPI8Sv44OlCtnxeuw0LkSAAfG3maue7X I4jFqCU7/NxcoursXHDMCRLqeKHkast0b4i7d1KOdoc6hMNVaVc1UY/wyimM+Pbh XRW4+iwnmJXlIqCumWaVKF0b1F0WK2LV5TRonsoFNPdVHBU795ObAXRsXWfiKwNK CX85l3AO37UN1wbQ7UvCzE88jYOanRxL1AKezCa1ca8AohqbqoVVtrRPUTMrlXG3 JOBfRaG0+LPXxHwQ9zCjvV/9kFcCAwEAAaOB0TCBzjAdBgNVHQ4EFgQUnkEw48PV ToyDjqM8yX+jbRNdhCUwgY4GA1UdIwSBhjCBg4AUnkEw48PVToyDjqM8yX+jbRNd hCWhYKReMFwxEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcGCgmSJomT8ixkARkWCWNl c25ldC1jYTESMBAGA1UEChMJQ0VTTkVUIENBMRcwFQYDVQQDEw5DRVNORVQgQ0Eg Um9vdIIJAIf3+gBzaRRPMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMA0G CSqGSIb3DQEBBQUAA4IBAQB+vy9hAwzjgjYTnTwfxK03Ze/07GnmulUxUIPOagHJ vGQojnjN3BGnMoXNhQrhhCy1BfKt88sweN/ELkeOsgthbQ24lX7YdgPEPSwY2iIB E0NWxG87+z5hmfo+M69Q9WS8b5aSd4v5pSzT4+s6UW2lsddbdpnI4OwEEVdmj4e1 w0trIAfPsFSKx5jMvC0KzoO04fSAjxTj2bn4orRVWlVGUYmQm/Gq0w//f84zox/g /XjE+kQ+eFOpNeeJC2Tpl04BByskoOw4LybIZ6iSdrUjoLgrK3R1geXo86Sx8QWE VVWM2+1UCVV3AMhYwQUbgasrEPkZ79od6exSUb+ZTpWc -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-Root.crl_url0000664001343500074740000000005313614364106025636 0ustar davidgdavidghttp://crl.cesnet-ca.cz/CESNET_CA_Root.crl igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-Root.signing_policy0000664001343500074740000000046313614364106027216 0ustar davidgdavidg# EACL CESNET CA 3 dated 2010.02.12 access_id_CA X509 '/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root' pos_rights globus CA:sign cond_subjects globus '"/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3" "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4"' # igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-Root.namespaces0000664001343500074740000000134713614364106026322 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)edca0fc0.namespaces # CA alias : CESNET-CA-Root # subord_of: # subjectDN: /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root # hash : edca0fc0 # TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3" TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" \ PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" igtf-policy-installation-bundle-1.104/src/accredited/CESNET-CA-Root.info0000664001343500074740000000103213614364106025125 0ustar davidgdavidg# # @($)$Id: edca0fc0.info,v 1.3 2015/06/18 09:44:53 pmacvsdg Exp $ # /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root # alias = CESNET-CA-Root url = http://www.cesnet.cz/pki/ ca_url = http://crt.cesnet-ca.cz/CESNET_CA_Root.crt crl_url = http://crl.cesnet-ca.cz/CESNET_CA_Root.crl policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html email = ca@cesnet.cz status = accredited:classic version = 1.104 sha1fp.0 = E7:84:74:90:F7:11:43:FC:CE:F6:F6:5A:30:DA:1F:23:9E:0F:D7:BA subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" igtf-policy-installation-bundle-1.104/src/accredited/CNIC.pem0000664001343500074740000000340113614364106023306 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFADCCA+igAwIBAgIJANnbZfRU2Kv/MA0GCSqGSIb3DQEBBQUAMFcxEjAQBgoJ kiaJk/IsZAEZFgJDTjEUMBIGCgmSJomT8ixkARkWBEdyaWQxKzApBgNVBAMMIlJv b3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IGF0IENOSUMwHhcNMDYwMjI3MDQ1OTM3 WhcNMjYwMjI3MDQ1OTM3WjBXMRIwEAYKCZImiZPyLGQBGRYCQ04xFDASBgoJkiaJ k/IsZAEZFgRHcmlkMSswKQYDVQQDDCJSb290IENlcnRpZmljYXRlIEF1dGhvcml0 eSBhdCBDTklDMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+pW5NRMG 7HFp8AR1TwiV1xG+bUkBAogRLfucJDKyLVxsIA9tmzTWeyzqeYD/nls1BXZMsV3c /QSq8EVuaccLbBJyvYGWl/dHVJJk12Fgm1V2oRksrcmxokscs9eZ2rk5wPcs6Ix8 TVg0NAutYs3lXy01iqDPaBVa6AcvsUdYe8rsRjZ9kdJlWT6y6BsmRR9AkKMaGrxA 8JiyjG7IIXh/OOTzhMd9pmvp0/lWBtiloWRdghT6JsVLgp/6/5uo0S5HwmpcShta H1rjI8pi+w05rqtXrNIwz6nKNFPC6DtEy+95EHkyYNRLYnf72pfe2lqlbougRAVs p7y2hojQmdm/8wIDAQABo4IBzTCCAckwgckGA1UdIASBwTCBvjCBuwYOKwYBBAHE GAICAgEBAQIwgagwQAYIKwYBBQUHAgEWNGh0dHA6Ly9jYS5ncmlkLmNuL3BvbGlj eS9jbmljLWdyaWQtY2EtY3AtY3BzLTEuMi5wZGYwZAYIKwYBBQUHAgIwWBpWQ2Vy dGlmaWNhdGUgaXNzdWVkIGJ5IHRoZSBDTklDIEdyaWQgQ2VydGlmaWNhdGUgQXV0 aG9yaXR5LCBjb250YWN0IG1haWw6Z3JpZGNhQGNuaWMuY24wDwYDVR0TAQH/BAUw AwEB/zAdBgNVHQ4EFgQUqYOK3/wy1HcPcPPSXkc7NQ/lYkgwgYgGA1UdIwSBgDB+ gBSpg4rf/DLUdw9w89JeRzs1D+ViSKFbpFkwVzESMBAGCgmSJomT8ixkARkWAkNO MRQwEgYKCZImiZPyLGQBGRYER3JpZDErMCkGA1UEAwwiUm9vdCBDZXJ0aWZpY2F0 ZSBBdXRob3JpdHkgYXQgQ05JQ4IJANnbZfRU2Kv/MA4GA1UdDwEB/wQEAwIBBjAw BgNVHR8EKTAnMCWgI6Ahhh9odHRwOi8vY2EuZ3JpZC5jbi9jcmwvY2FjcmwuY3Js MA0GCSqGSIb3DQEBBQUAA4IBAQBih2e19C9ahOSER2dNuczg7Gc1JtKwqtDAIiki AXhiCWnmJ8bnrVYU6HHPkw+ysA7ZPFRSuv48ONdq3laDCXmbpkM4kcK6vN0/2Icm PmfIX5xvLjW9MzivyirTZhV8xpXX7spVbFGtZdowDfXYkYEb1wQn0OEBaMV1No+9 vzc5QPeR31vV7FxFJ9QgAAH2P6cmJDvnk/yj47Fc0HHWAkOJh7n96OhloVeCejUx XXlDDPXXTWdN7NYJ3YgxzvIp35Hj9D1O5cRCFhj7JIBJ8AxRlf6gk/a/9UQfRg/M 4AGqO5d6KszP8Q4tMKLZO6WDueBqi6KrkRkOXOokatkGEv4s -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CNIC.crl_url0000664001343500074740000000004013614364106024163 0ustar davidgdavidghttp://ca.grid.cn/crl/cacrl.pem igtf-policy-installation-bundle-1.104/src/accredited/CNIC.signing_policy0000664001343500074740000000030613614364106025543 0ustar davidgdavidg# EACL CNIC Grid CA 2006/07/28 access_id_CA X509 '/DC=CN/DC=Grid/CN=Root Certificate Authority at CNIC' pos_rights globus CA:sign cond_subjects globus '"/DC=CN/DC=Grid/*"' # end of EACL igtf-policy-installation-bundle-1.104/src/accredited/CNIC.namespaces0000664001343500074740000000071513614364106024651 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)b2771d44.signing_policy.namespaces # CA alias : CNIC # subord_of: # subjectDN: /DC=CN/DC=Grid/CN=Root Certificate Authority at CNIC # hash : b2771d44.signing_policy # (generated automatically from b2771d44.signing_policy) # TO Issuer "/DC=CN/DC=Grid/CN=Root Certificate Authority at CNIC" \ PERMIT Subject "/DC=CN/DC=Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/CNIC.info0000664001343500074740000000044013614364106023460 0ustar davidgdavidgalias = CNIC crl_url = http://ca.grid.cn/crl/cacrl.pem email = gridca@cnic.cn status = accredited:classic url = http://ca.grid.cn/en/ version = 1.104 sha1fp.0 = AB:46:6F:7D:09:38:0F:E4:FD:5C:CA:F6:E1:45:5A:CB:BE:76:1F:78 subjectdn = "/DC=CN/DC=Grid/CN=Root Certificate Authority at CNIC" igtf-policy-installation-bundle-1.104/src/accredited/CNRS2.pem0000664001343500074740000000234113614364107023424 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDbTCCAlWgAwIBAgIBADANBgkqhkiG9w0BAQUFADAsMQswCQYDVQQGEwJGUjEN MAsGA1UEChMEQ05SUzEOMAwGA1UEAxMFQ05SUzIwHhcNMDkwMTIxMDg1MTEzWhcN MjkwMTIxMDg1MTEzWjAsMQswCQYDVQQGEwJGUjENMAsGA1UEChMEQ05SUzEOMAwG A1UEAxMFQ05SUzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC4uner V50SJRkVRIojVdpjDQZtWevBBKAXeRLzJ4JI6o2+PMs2NXgbBNUpA7VpSCn7p6dr xNzSKRDz4k6VpQCtSXXCHOsiOM2ZCH/y8SSq8SpNDGyzoiJ2K/t3tmA8PYhXqeuv FqWQYVGA/8N8ua6DvSVdoD2UuWw2nMhNPWPfJ87EDWS1QiWRNhWck0shGTT2KRNB zg+7ku+WrG9UOvPAKwQZ0f683O7x4U5DjuYT3CfauwByXbN/LjCYaMY9BSwCB0oS Ns3avs8MawpMGgrr2wHy4ZysQsSSXFcmttb11Iq9axwMMxou7aaEhDYmzKTv/iT5 G1+uLVkDUC4PCHH1AgMBAAGjgZkwgZYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E FgQUUJe2DfesMxev8R1GPGs7/wCg5eUwVAYDVR0jBE0wS4AUUJe2DfesMxev8R1G PGs7/wCg5eWhMKQuMCwxCzAJBgNVBAYTAkZSMQ0wCwYDVQQKEwRDTlJTMQ4wDAYD VQQDEwVDTlJTMoIBADAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEB ADQxa0Ahv4f1XnyhpfX/GNIk5lC8Z5iuOwwYx4gIrZPRBgmQav6oFPGQDWtIcNnQ Z3qFlGqf8Gmd1nj/17T86gjtzloIWlMur/Xy3juymTn9fbHrzFR0BRcQZl8azjb1 S+Gfk7H4K4qIETH882qjjR3WCl3q+UzW4kLmPAsu7GJMaQ4sJp6mjec3r19qIQxF 6S/zSbcb9V8hUiAkCjDKYr0BgmZMQfLLQv1ir0R7KWkZFaWBROjD3nyUM2aeE49R g89T+A3nrrxO+oHIHywpZN1rYyOcH8f3dzriMuppIfWdOcJ3+ga00gihkEcMrFFo HCwPfafWoNFV9T6T9KqNGc0= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CNRS2.crl_url0000664001343500074740000000005613614364107024306 0ustar davidgdavidghttp://crls.services.cnrs.fr/CNRS2/getpem.crl igtf-policy-installation-bundle-1.104/src/accredited/CNRS2.signing_policy0000664001343500074740000000030013614364107025651 0ustar davidgdavidg# EACL French CA, project level: CNRS2 access_id_CA X509 '/C=FR/O=CNRS/CN=CNRS2' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=CNRS/CN=CNRS2" "/C=FR/O=CNRS/CN=CNRS2-Projets"' igtf-policy-installation-bundle-1.104/src/accredited/CNRS2.namespaces0000664001343500074740000000063413614364107024765 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)163af95c.signing_policy.namespaces # CA alias : CNRS2 # subord_of: # subjectDN: /C=FR/O=CNRS/CN=CNRS2 # hash : 163af95c.signing_policy # (generated automatically from 163af95c.signing_policy) # TO Issuer "/C=FR/O=CNRS/CN=CNRS2" \ PERMIT Subject "/C=FR/O=CNRS/CN=CNRS2-Projets" igtf-policy-installation-bundle-1.104/src/accredited/CNRS2.info0000664001343500074740000000055013614364107023576 0ustar davidgdavidg# # @(#)$Id: 163af95c.info,v 1.4 2015/06/18 09:44:54 pmacvsdg Exp $ alias = CNRS2 url = http://igc.services.cnrs.fr/GRID2-FR/ email = grid-fr@renater.fr crl_url = http://crls.services.cnrs.fr/CNRS2/getpem.crl status = accredited:classic version = 1.104 sha1fp.0 = CB:DB:7E:C3:1C:97:1A:61:77:03:50:C7:C1:7E:63:52:81:E5:76:7A subjectdn = "/C=FR/O=CNRS/CN=CNRS2" igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Grid-FR.pem0000664001343500074740000000252313614364107024616 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDwDCCAqigAwIBAgIBAzANBgkqhkiG9w0BAQUFADA0MQswCQYDVQQGEwJGUjEN MAsGA1UEChMEQ05SUzEWMBQGA1UEAxMNQ05SUzItUHJvamV0czAeFw0wOTAxMjEw OTEyMTJaFw0yOTAxMTkwOTEyMTJaMC8xCzAJBgNVBAYTAkZSMQ0wCwYDVQQKEwRD TlJTMREwDwYDVQQDEwhHUklEMi1GUjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBANmyE3cgaxZGGoFLFkQbvuRUIjEUQfomsWYeGbuxnqVX41uLkMn9LbXp 2mtC/C34XAOzrWSNctdy+hnfiPVOmr5FIMyl8ZHctQ0HVlO/UZcTFXpjUTGuorxt 4sV+OqAwOXcM0HriLXCvYMCv3MknNzub2zXimpm4nguizkncpJvPm6eOGwPvEthI GXKGaP/5Z3aeTM/6oAN4+T0Cw+VOxCnQGF9xRG1LcUmw3OAlfUje5JKr77KaiXQJ 9qN5UnxauQP3dNHQgrQsqtIch68OdMQlXyoiXoy4U4L5cApc/j/vTmY+USHL/M2u QN3IeRY1m68yuiDdAIIOXio9jL8mte0CAwEAAaOB4TCB3jAPBgNVHRMBAf8EBTAD AQH/MB0GA1UdDgQWBBQnlkgn7iG28q+xLX3699dIJXCVkzBUBgNVHSMETTBLgBRk fJg+0ajuviPcB4/mZ9GPmoFnwKEwpC4wLDELMAkGA1UEBhMCRlIxDTALBgNVBAoT BENOUlMxDjAMBgNVBAMTBUNOUlMyggEBMA4GA1UdDwEB/wQEAwIBBjBGBgNVHR8E PzA9MDugOaA3hjVodHRwOi8vY3Jscy5zZXJ2aWNlcy5jbnJzLmZyL0NOUlMyLVBy b2pldHMvZ2V0ZGVyLmNybDANBgkqhkiG9w0BAQUFAAOCAQEAGm1p08bulVtHjz1j K4Wjeul0AaVJD1XwLtQ8CEKljF4nCbax5wEfbP/PFpA8eP8l2+5uWtprZVwP3h1p hqUERUBsUboVXw2nVGVNZgvG+v1HWjT390h1kP8F5AgkSR8y1sUvOo/U6IGs0MGg odHyrEClQAsIeArI2b06+VoGoQ3eztQU+ZacbfqgSLTLFQFPPIWk10otaSDxv1Z2 kdDc/DXX4PuhUKNRunIo9CHv+l+GcWnxDnFmYOkN6CmJ9SbRhdBcDjjnoBepdnPj QQLApldu4PJ9ubv5sdBJuLQwDoCs5zjg2nhPDir/VONJRr5/kZp35gdRz8Dajplu dRyHYQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Grid-FR.crl_url0000664001343500074740000000006113614364107025472 0ustar davidgdavidghttp://crls.services.cnrs.fr/GRID2-FR/getpem.crl igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Grid-FR.signing_policy0000664001343500074740000000031713614364107027051 0ustar davidgdavidg# EACL French CA, CNRS2 GRID-FR access_id_CA X509 '/C=FR/O=CNRS/CN=GRID2-FR' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=CNRS/CN=GRID2-FR" "/O=GRID-FR/*"' igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Grid-FR.namespaces0000664001343500074740000000064713614364107026161 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)d11f973e.signing_policy.namespaces # CA alias : CNRS2-Grid-FR # subord_of: CNRS2-Projets # subjectDN: /C=FR/O=CNRS/CN=GRID2-FR # hash : d11f973e.signing_policy # (generated automatically from d11f973e.signing_policy) # TO Issuer "/C=FR/O=CNRS/CN=GRID2-FR" \ PERMIT Subject "/O=GRID-FR/.*" igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Grid-FR.info0000664001343500074740000000061713614364107024772 0ustar davidgdavidg# # @(#)$Id: d11f973e.info,v 1.4 2015/06/18 09:44:54 pmacvsdg Exp $ alias = CNRS2-Grid-FR url = http://igc.services.cnrs.fr/GRID2-FR/ email = grid-fr@renater.fr crl_url = http://crls.services.cnrs.fr/GRID2-FR/getpem.crl requires = CNRS2-Projets status = accredited:classic version = 1.104 sha1fp.0 = 4C:2B:53:7C:FB:00:FC:7A:44:B7:CD:80:73:26:8B:52:BD:5B:B3:0C subjectdn = "/C=FR/O=CNRS/CN=GRID2-FR" igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Projets.pem0000664001343500074740000000250213614364107025047 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDtTCCAp2gAwIBAgIBATANBgkqhkiG9w0BAQUFADAsMQswCQYDVQQGEwJGUjEN MAsGA1UEChMEQ05SUzEOMAwGA1UEAxMFQ05SUzIwHhcNMDkwMTIxMDg1NDUxWhcN MjkwMTIwMDg1NDUxWjA0MQswCQYDVQQGEwJGUjENMAsGA1UEChMEQ05SUzEWMBQG A1UEAxMNQ05SUzItUHJvamV0czCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBALwVZbyC6Zng5ptEwPtiqazIstvvnJBS/k1omXkul4ZDDf6OrqbNWEMWpgnT bxAV2yF8NhveloSbZUkK5EeTHFQAZK7GFPTaGpNAtA52pI2un6zN6VXpsHCz+51R Six/5xtYuf4CHpwUHRFoFALBEfkbtjKtoKu5R4z8ofD/dTmIQ6A4k2I6DO76LIy2 rBC01++tp4BbhJfARft5NymabwJdzOZ8D4fNL5TNWPMV6klFb24K+TFGAKahumX9 n9UHFnyglczokqOcGIQJozteNJlu6lZFiL/IcAQxGqlJCiKBNJONFn/tVVjGX5td 0GYdQzZRzQf+a3KTeENdddbtcS0CAwEAAaOB2TCB1jAPBgNVHRMBAf8EBTADAQH/ MB0GA1UdDgQWBBRkfJg+0ajuviPcB4/mZ9GPmoFnwDBUBgNVHSMETTBLgBRQl7YN 96wzF6/xHUY8azv/AKDl5aEwpC4wLDELMAkGA1UEBhMCRlIxDTALBgNVBAoTBENO UlMxDjAMBgNVBAMTBUNOUlMyggEAMA4GA1UdDwEB/wQEAwIBBjA+BgNVHR8ENzA1 MDOgMaAvhi1odHRwOi8vY3Jscy5zZXJ2aWNlcy5jbnJzLmZyL0NOUlMyL2dldGRl ci5jcmwwDQYJKoZIhvcNAQEFBQADggEBACQ4rjnaO/mz/+/sCp2l3H3mR21mWm2y 5SxTdN3rKopi7xsam+AcByH4rfGIwHckY2md2rg08LUM0l6VcOGBTp60W/OFDYAl X2QgaPdhFT64eo4B0s/kRLA5WEgFQrSPvDXUQd8OFHgk/CEi+3CLitgdRC70mLZ8 gOub071L352aY3qWJIQgks2piVg+Jvi3jgnWWHS+Fm6S59GeWMvDEGxtw9kUJoku o6XKi173c1HtoQQQucEt5NFyUH6QyGI2Yn+SrRqwO7ZJtsQaaeTIXPLquR/cyuKA fi7jTQFHjSUtEfP+pCMrkkVtkEGjc2v8WRwAlMxzXhADBb9zDXkqk58= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Projets.crl_url0000664001343500074740000000006613614364107025733 0ustar davidgdavidghttp://crls.services.cnrs.fr/CNRS2-Projets/getpem.crl igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Projets.signing_policy0000664001343500074740000000032313614364107027302 0ustar davidgdavidg# EACL French CA, project level: CNRS2-Projets access_id_CA X509 '/C=FR/O=CNRS/CN=CNRS2-Projets' pos_rights globus CA:sign cond_subjects globus '"/C=FR/O=CNRS/CN=CNRS2-Projets" "/C=FR/O=CNRS/CN=GRID2-FR"' igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Projets.namespaces0000664001343500074740000000066413614364107026414 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)09ff08b7.signing_policy.namespaces # CA alias : CNRS2-Projets # subord_of: CNRS2 # subjectDN: /C=FR/O=CNRS/CN=CNRS2-Projets # hash : 09ff08b7.signing_policy # (generated automatically from 09ff08b7.signing_policy) # TO Issuer "/C=FR/O=CNRS/CN=CNRS2-Projets" \ PERMIT Subject "/C=FR/O=CNRS/CN=GRID2-FR" igtf-policy-installation-bundle-1.104/src/accredited/CNRS2-Projets.info0000664001343500074740000000062113614364107025221 0ustar davidgdavidg# # @(#)$Id: 09ff08b7.info,v 1.4 2015/06/18 09:44:54 pmacvsdg Exp $ alias = CNRS2-Projets url = http://igc.services.cnrs.fr/GRID2-FR/ email = grid-fr@renater.fr crl_url = http://crls.services.cnrs.fr/CNRS2-Projets/getpem.crl requires = CNRS2 status = accredited:classic version = 1.104 sha1fp.0 = 14:29:FD:40:0F:D8:9D:6B:86:4E:6D:A6:3A:52:80:7E:34:A0:5D:35 subjectdn = "/C=FR/O=CNRS/CN=CNRS2-Projets" igtf-policy-installation-bundle-1.104/src/accredited/COMODO-RSA-CA.pem0000664001343500074740000000404613614364110024457 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR 6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC 9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV /erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z +pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB /wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM 4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV 2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl 0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB NVOFBkpdn627G190 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/COMODO-RSA-CA.crl_url0000664001343500074740000000007413614364110025335 0ustar davidgdavidghttp://crl.comodoca.com/COMODORSACertificationAuthority.crl igtf-policy-installation-bundle-1.104/src/accredited/COMODO-RSA-CA.signing_policy0000664001343500074740000000035413614364110026711 0ustar davidgdavidgaccess_id_CA X509 '/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=Internet2/OU=InCommon/CN=InCommon IGTF Server CA"' igtf-policy-installation-bundle-1.104/src/accredited/COMODO-RSA-CA.info0000664001343500074740000000075513614364110024634 0ustar davidgdavidgalias = COMODO-RSA-CA url = http://www.comodo.com/ policy_url = http://www.comodo.com/about/comodo-agreements.php ca_url = http://crt.comodoca.com/COMODORSAAddTrustCA.crt crl_url = http://crl.comodoca.com/COMODORSACertificationAuthority.crl email = admin@incommon.org status = accredited:classic version = 1.104 sha1fp.0 = AF:E5:D2:44:A8:D1:19:42:30:FF:47:9F:E2:F8:97:BB:CD:7A:8C:B4 subjectdn = "/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/DCAROOT-G1.pem0000664001343500074740000000400513614364110024126 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFvzCCA6egAwIBAgIRAIzTbcjoPStBY2+MzzpR5FMwDQYJKoZIhvcNAQELBQAw bDESMBAGCgmSJomT8ixkARkWAm5sMRkwFwYKCZImiZPyLGQBGRYJZHV0Y2hncmlk MSIwIAYDVQQKExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRcwFQYDVQQDEw5E Q0EgUm9vdCBHMSBDQTAeFw0xNjAyMDEwMDAwMDBaFw0zNjAxMzEyMzU5NTlaMGwx EjAQBgoJkiaJk/IsZAEZFgJubDEZMBcGCgmSJomT8ixkARkWCWR1dGNoZ3JpZDEi MCAGA1UEChMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEXMBUGA1UEAxMORENB IFJvb3QgRzEgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCWi+9Z 4gmPVpqobI8o30nIlbL02SXl4hAmjHhL/g6k6Z3/+sD2/GFZuVaHJE5hXx5lmUpk QIS7mtI+ZPEsqNvXH9ksIbli399iyuBoxWt17PBXm9X/PK3ghemmAJ5n3Rs7FlGl Nhsg5Z63E4mqgq1ZPq9ULkE/TUCNE3PAjXiJfwepWxZTVi1OEjxE6joWbqtDtBvA HxtUZ8I8kl52JkGRKwCBSbkKY/VnNGSn/F6+e13GpM4x1RrD1QZ+F1CQlzNvwanJ szD/CcN1cufakpFLjsnwyfmqtfFSQzywZIOFRPCR0KX1qbA6/EZ8FQm24zbAMgZm ZkXjp29qt4QsCvJntDrVDemGocEQsbVg2Z2l1QXmBKlzBVKF0CP4owhVI+uDYWZ9 v1VSiSQVcbyogPkOa1nclJkNwyZ2tX7BxkQh9S3/Bs68lodCJ0JnBWW6k13u0uP7 APA5t90gOooJJpc2LK+bYJWMBdHShB6StB8VCnibMyNTkrLK6qgWS4nExSXBmDVs HPJ+hnXGnpqkfXDoE3yM2iGtE9ArA3FUNgcHfpI3GsX6iaC52fhB33M6DQ6u0U3Z nAdcwR9ZITHcKN3sH6DBMsYsUc0M5U+XUhxtr8B0LWmz0aUIvYKoRk7yNU4fsTwu bn9cx3dNlsIhF6d9Rw/Qa3t13gVCkiYd6xI7nwIDAQABo1wwWjAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUUnwvsoJZSabwCB3vaAWh NTKKKCcwGAYDVR0gBBEwDzANBgsrBgEEAdFCBAIHATANBgkqhkiG9w0BAQsFAAOC AgEAlhWjlk3sFNC4mPXnr+g0j4ILetnPRfFq3a+bhRI4YFpU908Jx8EOkTuyTyt8 SoKkckPAvQil5gx81aEfA1LiINgT9qSf17MWDsf8kKVbEriN+wTR+wL7CM8DYAln d6yrnjSyak1GnTw83ZVzTOKovGCmp0zphM8EJ694blCgBXMxDof24U9j0OCGKgd6 PfBxs0rKsxNAAG11qPTKvJLDPi2ibOWTVp31OeeLL8eSMO1JKsVaGYlQtSdjCjCK Jh60wKPc7rlfqWKG/fIe8Hd+akmh7ugvUNKfn6XUYdar+rLfDswDPoPrOPWlDcwb K5hL1pRlUc41sBmCrm7sKcL/mahjM4+JyhP/rJ9c6PYknSVUT7yRt5PZ1wGn+Vss P/AH1KjIWp9LvFzwbKnh9tSod+gkWvKICRlgNA8iJxbPt6GJGMOv3LBuz0LJexh7 +iDUqgCHhc1TBV8cVF17a7OtedoSggyxglF8i28K+D8JhJLsqdbWQqg1/gc27cdO hHctcUIti+dPE4oVprbGU6GDMk9H0mnafRN9l5i/Lm8bXKjutOXIVk6eOfxiRPUj BxTVYE9VaWhZFeE/UPsQrbwGFHSXO49j54u9nGfNKuXoJwgaB8PCp3h68ytaUqHR F4xPYaquhMQ7oYW7HcQKNXUmij/b4DZ9UunpmZKu13ut80U= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DCAROOT-G1.crl_url0000664001343500074740000000005613614364110025011 0ustar davidgdavidghttp://ca.dutchgrid.nl/dcaroot/g1/crl/crl.crl igtf-policy-installation-bundle-1.104/src/accredited/DCAROOT-G1.signing_policy0000664001343500074740000000065513614364110026371 0ustar davidgdavidg# EACL DutchGrid DCA Root G1 CA access_id_CA X509 '/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA' pos_rights globus CA:sign cond_subjects globus '"/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth"' igtf-policy-installation-bundle-1.104/src/accredited/DCAROOT-G1.namespaces0000664001343500074740000000220413614364110025463 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)dca-root-g1.namespaces # CA alias : DCA Root G1 CA # subord_of: # subjectDN: /DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA # TO Issuer "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" \ PERMIT Subject "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" TO Issuer "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" \ PERMIT Subject "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=users/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=hosts/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=robots/.*" TO Issuer "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" \ PERMIT Subject "/DC=eu/DC=rcauth/DC=rcauth-clients/.*" igtf-policy-installation-bundle-1.104/src/accredited/DCAROOT-G1.info0000664001343500074740000000107013614364110024277 0ustar davidgdavidg# # @(#)$Id: DCAROOT-G1.info,v 1.2 2016/07/19 18:36:40 pmacvsdg Exp $ # Information for DCAROOT-G1, operated by Nikhef # alias = DCAROOT-G1 ca_url = https://ca.dutchgrid.nl/dcaroot/g1/ca/cacert.pem crl_url = http://ca.dutchgrid.nl/dcaroot/g1/crl/crl.crl policy_url = https://ca.dutchgrid.nl/dcaroot/policy/ email = ca@dutchgrid.nl status = accredited:classic url = https://ca.dutchgrid.nl/dcaroot/ version = 1.104 sha1fp.0 = 3C:40:ED:01:2A:05:BB:81:25:CA:05:09:A4:90:08:B3:5D:AC:78:8F subjectdn = "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" igtf-policy-installation-bundle-1.104/src/accredited/DFN-GridGermany-Root.pem0000664001343500074740000000241613614364110026330 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIBAjANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJERTET MBEGA1UEChMKREZOLVZlcmVpbjEQMA4GA1UECxMHREZOLVBLSTEiMCAGA1UEAxMZ REZOLVZlcmVpbiBQQ0EgR3JpZCAtIEcwMTAeFw0xMTAzMzAwMDAwMDBaFw0zMTAz MzAwMDAwMDBaMFgxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAw DgYDVQQLEwdERk4tUEtJMSIwIAYDVQQDExlERk4tVmVyZWluIFBDQSBHcmlkIC0g RzAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzPlF0BAKoXmKNC3G 5cMOeAbSxCqKFONHrWi4fubi7dGHJfr6EJeP+6nEvc+6dM9fnsDYEYt4m4MzXaLb J+9vUdgSOXeoC/2BpluiU36co1QJ6PZIRO3zI2x/4EBa6XueAYpNnO777X5COeRi dBdSSVwUb3TcsHxrZvWXLiFpsittt1Yqr+S5fjIcJiv7umwi9jAIhtSnartLHmK1 50VAgsXfpen3Zex4M/UGVUScAYf75dWZN4qe4J6UNUq87EyiFvR+HQVmoxdJfz7M rAw4AXhoter8dgzk6wQHjAezXAaarTzRKoMmyvAHwkt3oaH63KteBNao29ONpReM V67n0wIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd BgNVHQ4EFgQUluzcrZrD/lCjPCLlPcLF/8rZIsYwHwYDVR0jBBgwFoAUluzcrZrD /lCjPCLlPcLF/8rZIsYwDQYJKoZIhvcNAQEFBQADggEBAHVcWgFfu5xhDuiXokDC /ms/z2K3Eq2r6zvl4FFLVixMKTgLRG7fDf+RwoCpZLdgc3ZobMDyWPj0e4jlzzIG gDE65o2dH4KuvxXBgd2RyV2k8SfRi2kQJScijWDjCbtId/GluNrNUJkVVZH8ciT/ 6wMAw/dnLMIcRxnt3UAgipTyyLbEMwo3rISolY6q5bX1M2ZOZCjnVy/KjuWDPPbj uKRnsHcaO5rrXCiUZOdMXJ8QZ6QWDO9yueNzNMl8An9mZ+SlzoriSt8ct3B4jkjC EJ9E0OSUf6r9lH+5CKTmUOTZV44HNGhOSUOvzT/YA2f675ydssqyynkrwDJ/B+u5 vQU= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DFN-GridGermany-Root.crl_url0000664001343500074740000000006613614364110027210 0ustar davidgdavidghttp://cdp1.pca.dfn.de/grid-root-ca/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/DFN-GridGermany-Root.signing_policy0000664001343500074740000000101213614364110030553 0ustar davidgdavidg# EACL DFN-GridGermany-Root # $Id: 1149214e.signing_policy,v 1.2 2008/03/03 16:05:10 pmacvsdg Exp $ # The DFN-GridGermany-Root CA only signs the User and Server sub-CAs # access_id_CA X509 '/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01' pos_rights globus CA:sign cond_subjects globus '"/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein Server CA Grid - G01" "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein User CA Grid - G01" "/C=DE/O=GridGermany/*"' igtf-policy-installation-bundle-1.104/src/accredited/DFN-GridGermany-Root.namespaces0000664001343500074740000000141713614364110027666 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1149214e.namespaces # CA alias : DFN-GridGermany-Root # subord_of: # subjectDN: /C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01 # hash : 1149214e # (generated automatically from ./DFN/1149214e.signing_policy) # TO Issuer "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" \ PERMIT Subject "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein Server CA Grid - G01" TO Issuer "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" \ PERMIT Subject "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein User CA Grid - G01" TO Issuer "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" \ PERMIT Subject "/C=DE/O=GridGermany/.*" igtf-policy-installation-bundle-1.104/src/accredited/DFN-GridGermany-Root.info0000664001343500074740000000105313614364110026476 0ustar davidgdavidg# # @(#)$Id: 1149214e.info,v 1.7 2015/06/18 09:44:54 pmacvsdg Exp $ # Information for CA DFN-GridGermany-Root # obtained from 1149214e in DFN/ alias = DFN-GridGermany-Root ca_url = http://cdp1.pca.dfn.de/grid-root-ca/pub/cacert/cacert.crt crl_url = http://cdp1.pca.dfn.de/grid-root-ca/pub/crl/cacrl.crl email = dfnpca@dfn-cert.de status = accredited:classic url = https://www.pki.dfn.de/grid/ version = 1.104 sha1fp.0 = 30:AB:8B:7C:DA:20:93:E5:59:CE:74:0D:B1:2A:82:38:C8:55:0B:D4 subjectdn = "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" igtf-policy-installation-bundle-1.104/src/accredited/DZeScience.pem0000664001343500074740000000741113614364111024547 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIK7DCCBtSgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMRIwEAYKCZImiZPyLGQB GRYCRFoxEzARBgoJkiaJk/IsZAEZFgNBUk4xGjAYBgNVBAoMEURaIGUtU2NpZW5j ZSBHUklEMRgwFgYDVQQDDA9EWiBlLVNjaWVuY2UgQ0EwHhcNMTEwNjIwMTA0MjI5 WhcNMjYwNjE2MTA0MjI5WjBfMRIwEAYKCZImiZPyLGQBGRYCRFoxEzARBgoJkiaJ k/IsZAEZFgNBUk4xGjAYBgNVBAoMEURaIGUtU2NpZW5jZSBHUklEMRgwFgYDVQQD DA9EWiBlLVNjaWVuY2UgQ0EwggQiMA0GCSqGSIb3DQEBAQUAA4IEDwAwggQKAoIE AQC9zAWjzYAGpoXpGzhY518T4oq72yggzec0v/KU8HKFinf6XnQOHZlIdEPxtopD D8EE4XBRv2YPEIEtybx32ytilpDszb+ddjEvFzzX4rXGepEg5GaBj/wV87hwxuj/ U1T7OtN5uV4S2qhymjOnUVOVgey88Bf6K3FDe0slCTmoCgfc9HRw9JMGPDrv4s/b 3kYjaY9Dx/dF0S0z6qrq7mwx3HuMzgs2pILE/9fJt8d/xSqGa/LRucB5d5OorfAY qdn9gzc0tGaWsIyLWUVTfajAODHTE9/n7eHSS9O+O9z4ZeVC8wuNsxq2HpilaIT8 C1yK0Sjv05y5xCLDBTa/5FMBt5r62CTJ6RneketO5hPZgedL3vBWGhMPVEfypqRC UM7xRD0uaf/giBWwzSurKH7fP8oRX5DkVpjeNayZflc0WnaaM/fU833NqNBjk/Ig ytxeAzxWN9K3ihMm8goCRa3eVxcNC6BVc7f77fcv9piIzqzXbQDLhl+imxPwS0qM 9RAq5djDamRSvRoBnKkI14e8ZCt2xUavoRijx1+958dmWdXvEznZ99KBGR/McArh 0sN+12LyvdyBeHRYSTsbNHttpaeFCTvx3bYn5rUCT1Z/ZN3FQZ06gvmQlcCOuafs fdm3RYDW5yeyakjsBfvAHWSIZtf89m+Sqd2H3s/jkpy8xqLfJ5/gZAXMIwamSUmT 3lr1bmmJMlZ1+8fe3alQ4mJfLMrRMzDLvuCgq+RAodV/SjAbG9jR9MRYl/maBy6G Tl9QwJefy58/ZpHUZ7dBF08aSoftHnwxkTGaws0A1LUhQICv5/0gmF4fUyiUB/Ep oF0k/ydD6d40X175IEmaf5VYYf5QMtnuyW/NNFKl6i6o97BKmm+YPrTrPIxYgRaW hMZG7iYLH0GgH7WxZHzZR3t+jhxy80RHBoLmboIeq70O5OjUV1GesVfJswe1SdSo BqCmXs8wLt+fY/yLaKtF2M8FM4+b8a1qXI5GtlSwkuMyA7cKf5/8YOfYCzGqPIT/ FarDTlj0TpeM0Q9jsOQSsr2cQPXdWSMynm5NNvPJD4RRk7pZoaO1DZFvy+XaRLjn 3YfmeKWJVDDeuW0KnAWRddCLPicKA969WQWCZf9FxphZPWGP1tHgUc0jSkkrBMRy ARSJlJr46OznEkkNIU/b3v3KVdCELS+QWHoq1CnHRM4a8KqKqCAyLH11g76eyWWq MPyEEq6HB/VqeR+ai04YCYjS4lAsFlylTZikOjw7fetEdM4NeDRGsToN2zLoe/mS +fZkI6a4BTZ9VDgUUbp+ZoKy0TTsiAYMWpTAwY1sNIPix98mw9gHG7vYTN3Da2Y/ 2ZhYFpLiUCE4TB3hrMSZ3Is1AgMBAAGjggGxMIIBrTAPBgNVHRMBAf8EBTADAQH/ MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUQem6j+LwKyhUHPQ2cUFBGQNzibww gYgGA1UdIwSBgDB+gBRB6bqP4vArKFQc9DZxQUEZA3OJvKFjpGEwXzESMBAGCgmS JomT8ixkARkWAkRaMRMwEQYKCZImiZPyLGQBGRYDQVJOMRowGAYDVQQKDBFEWiBl LVNjaWVuY2UgR1JJRDEYMBYGA1UEAwwPRFogZS1TY2llbmNlIENBggEBMIGhBggr BgEFBQcBAQSBlDCBkTA8BggrBgEFBQcwAoYwaHR0cHM6Ly9jYS5ncmlkLmFybi5k ei9wa2kvcHViL2NhY2VydC9jYWNlcnQuY3J0MCgGCCsGAQUFBzABhhxodHRwczov L2NhLmdyaWQuYXJuLmR6OjI1NjAvMCcGCCsGAQUFBzAMhhtodHRwczovL2NhLmdy aWQuYXJuLmR6OjgzMC8wPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NhLmdyaWQu YXJuLmR6L3BraS9wdWIvY3JsL2NhY3JsLmNybDANBgkqhkiG9w0BAQUFAAOCBAEA trYv6LD68cG/6ieif9pFTsAW1aI03nP38S66O7KGcapc4/QSlBG2OyFM9d1KTAf8 XOSSyq2Nt9n9T/yTCjAQFNISmLvjxCuiVYXRbg14o5KTbfiNofihDPo1GvNWaZPz kDnmCzdNEsV6Pfo2MD+mrAuuuL3h/YDf/vj6L2CFJX8d4gxNv5M1LZra8hke67LZ w3RDpmfTAxSv8bCo4mPDXagZgZbCvmkO4ZUAnGMBaVrDqh6FXkBFlWxsxYdO8Io8 DV2stLS3qWgzSzeaSScyieQ6EDGPNBB7arGI6WgHTGRwb6PR078VJ2OtTTQxmK2f lOx9+pf2v5pgIupeTNSTbRZldQa+DJnFknOFHq1UeZ3BVva3PLH/Q0pTU1Ly6gCB p5+WjhYRwa9rfa7SivX9kO+E3H24006cbgJmJK8pXS7lytjBhF61Sdf8pbr/5p6E KJxwD4tFiQpgiBaXqmOzrPTx/RmyqRaTOdkB99k9ZcPQ4fuyhEaBybJ2zpBvM3YY G1i9qlueT/LbXbK4Xt6v4DvB1Bu6f6wJg7v2IPjoNXd6R30Yg7iwO/jeR22F9NrH aTVbr5vAiUkmqbrFc2LoyyvUyKAl0+hbYGDqMh7IcGHzxD8txIQa+7zy/pcTSSwX XGCN1y3100/BH0uLXIdVYjlp1mBo6nb0imJRiVzdXAN9KA7uTPUdRkqidH8FYnri 0N6KzOjmLo/8LZ3cFvBCwptR2OukTz4gisaz4cVVcMRInF1lXy6C2dvgZDloUUSm 2lleYGFi83j1+/sVA8fAzW6MAovZy9zTysBepD1HfxND8EpFZQiMri++TKb+vil5 dsuqSU5MnX8R5EOho+IPfKxCUDD6lrMUYhmWgtP9qTj2Y5nX+R1qUZ83u5W0rdDC lx2SfmpYTMmo+zenJtBRmypUT22MRqcW5iPSrQ7lqhXAfeMcbEI6xS7RXKe8nTNe PBLoxPAiqJfiz8Opu1hdpr0SVkVKOrvsbVHA2V+DBXfsiUNhX9Y7/cr7DqduUUep fMcJtmWRbNM6qZiBCiLbQT5PUEYG8rs9d9ltOlSIUJ77aLCt9y2r+kdozy9wKJfR EPhHya6HN37smL8vTPtL0je/ZbIjddb/UPv8AJURoPCvSTiCpZ/2YbniBWTEQRpk WBrrSiG9NYpW9RX/J5zMGYsXfAnB7eEf9gw5ep7Rng2TME6E46gmYU/MBAfzVOLj 3/Vk8YURewNZhmQ4YiaA/chLSM4M4bwtIdJ5lvw6h7CAtsple2H6omEaw6rmClie PPX7cazFsMFPo/WGM+AR7VUYXU5f7dP1xz7rMEKqycvWcYthiIOFHOW/NUkM6/sO D/O1SoLNANuhtlsSix0BuQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DZeScience.crl_url0000664001343500074740000000005413614364111025424 0ustar davidgdavidghttp://ca.grid.arn.dz/pki/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/HKU-CA-2.pem0000664001343500074740000000401113614364115023637 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFwjCCA6qgAwIBAgIBADANBgkqhkiG9w0BAQsFADBXMRIwEAYKCZImiZPyLGQB GRYCSEsxEzARBgoJkiaJk/IsZAEZFgNIS1UxFDASBgoJkiaJk/IsZAEZFgRHUklE MRYwFAYDVQQDDA1IS1UgR3JpZCBDQSAyMB4XDTE4MDQzMDExNTMyMVoXDTM4MDQy NTExNTMyMVowVzESMBAGCgmSJomT8ixkARkWAkhLMRMwEQYKCZImiZPyLGQBGRYD SEtVMRQwEgYKCZImiZPyLGQBGRYER1JJRDEWMBQGA1UEAwwNSEtVIEdyaWQgQ0Eg MjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANN6V502Ti4DyXMm+6j6 4TLKyVbNc144uT2W10CaPgrsxP/fguLjHaPyPgCvdDXE6P0s0PMnk+SfP7f+4891 msXxMSI/l3cn0N4tV8XvOd0N1buB8pFm+AcvGeW3sTsRVURmISli6jluH1lhHPpN LhreWEhcV9+XaSttxtlNv4lz1PzwPHUwHnFDUCro+A1y4gloaBrRRC8GsdjWhkzh 00dU+g4XFVonUNLmDXUHVDZEpa2rTXLR2TRZ6BfhLBxW09m1wlCikidLoxlk7gwN SROkR4HnXvctei3fwlcSQBb1o43zWttf/c3zAB1T5qnURigfA1YkIkVkJGTU6Vb6 LUtXtghGdRLjCy+tYyPAV2/yExgM7s+SypGO2CPtuLuefqBtz3EENaXRyl8/9SEh opszBoGUx4z1+YDm/qxFf35NzIYJu6CpaJKSGCEkA56sS4evDVnzUwqdzLHuDOpP 4uq26VTNGy2BOuzf+kqaBLyVL7IlqCCwBduf+aVFrLt6jXoWdRCLfI66N3CHywH+ g5EOEe4PQAP1vUJExZFkIrnUvgdnGt68n7Zm5dWn/+/STDPY+goHaeE/3JcIzHKm yRc8w7pyhJHp6XZPM2AkeJ3EW+svY66Zk2HgiH3bFPefGQlpyBn8vOashaHuM+J+ g3GzrOZ+jYnZSM7lMXx/Px0NAgMBAAGjgZgwgZUwDwYDVR0TAQH/BAUwAwEB/zAO BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJmkCnCxv6vfglEmkqlCfZifXwd9MB8G A1UdIwQYMBaAFJmkCnCxv6vfglEmkqlCfZifXwd9MBgGA1UdEQQRMA+BDWdyaWRj YUBoa3UuaGswGAYDVR0SBBEwD4ENZ3JpZGNhQGhrdS5oazANBgkqhkiG9w0BAQsF AAOCAgEAjkH1TFZcQugcyG2RcN5dJLVk4jnmljqf6FVPvvuopxvQ4VcAbPmFImhk KXCU46rF7gW3gcebWEIpO1ADm1VyENLZvrmj8BeEr7XsvKyAyCDdy7evWucKk3Va zBJ+AsKZx+214JT3l4IajM0yUDXAK3BTrQw58UPuqnJtezz11LHCswEoqg0EqOfP SrwebDC6VqdPZ819BDV8aHSx7geh+B4LVavG0MzXGpO0K78zg5ISqbkk6kG+7pit PA/t7n9ZAzMtbEQlgrRMkUpZXDiuNbT8ZWmaddmIui5BOR8s6Gl/BGtdgjsGMi2w +G9TJJvctn/3g4U0oIs9HKzVzJRRHuMrJIlDJqkRieDgIAu6OJUOWs7/x7woRnKc /7JZBDMpbsvlXkbPnA8ysoPtXlDS0ZV/dxNJcr8u0WU/xDXmL47DVtmigsL2Fjx4 Pw0iP7pS1/WmEkxHg8K19O/q/ldgB1IMa5JY2GIQpfNXSfq1Im48Z253Gzqwmxsg FSrFxcM5nvY4pIIvxnH1uqfi17VBvq+YCiYxj24LF5fuWeGJADKPcuBDx/4ypKqZ 6ceS0s8yUiqDH4duTgZFVwt/0OBdEgQUDk/cWfSNkTtSYDhTIW1eizR7sOjkDQ58 YjP0Hz8pI+jF0V+k3l/nEk0w49lXMzYA5K72fgA6m/UbLPh9o+o= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DZeScience.signing_policy0000664001343500074740000000046613614364111027006 0ustar davidgdavidg# EACL - DZ e-Science CA # @(#)$Id: 0a49430a.signing_policy,v 1.1 2011/06/06 17:33:27 pmacvsdg Exp $ # access_id_CA X509 '/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA' pos_rights globus CA:sign cond_subjects globus '"/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" "/DC=DZ/DC=ARN/*"' igtf-policy-installation-bundle-1.104/src/accredited/DZeScience.namespaces0000664001343500074740000000065213614364111026105 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)0a49430a.namespaces # CA alias : # subord_of: # subjectDN: /DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA # hash : 0a49430a # (generated automatically from 0a49430a.signing_policy) # TO Issuer "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" \ PERMIT Subject "/DC=DZ/DC=ARN/.*" igtf-policy-installation-bundle-1.104/src/accredited/DZeScience.info0000664001343500074740000000102413614364111024713 0ustar davidgdavidg# # @(#)$Id: 0a49430a.info,v 1.3 2015/06/18 09:44:54 pmacvsdg Exp $ # Information for CA DZ e-Science # alias = DZeScience ca_url = https://ca.grid.arn.dz/pki/pub/cacert/cacert.pem crl_url = http://ca.grid.arn.dz/pki/pub/crl/cacrl.crl policy_url = https://ca.grid.arn.dz/pki/pub/home/cp_cps.htm email = ca@grid.arn.dz status = accredited:classic url = http://www.grid.arn.dz version = 1.104 sha1fp.0 = D8:EF:90:DB:6A:9B:63:47:4C:1D:6E:89:E2:A2:4D:5D:86:FC:2B:2C subjectdn = "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterAssuredCA.pem0000664001343500074740000000466413614364111026373 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG/TCCBOWgAwIBAgIUBaYifVmclf61WjM6m2tUE0US22MwDQYJKoZIhvcNAQEM BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xNjA0MjkyMjUzMDBaFw0y NDA0MjkyMjUzMDBaMEYxCzAJBgNVBAYTAkFFMRcwFQYDVQQKDA5EYXJrTWF0dGVy IExMQzEeMBwGA1UEAwwVRGFya01hdHRlciBBc3N1cmVkIENBMIICIjANBgkqhkiG 9w0BAQEFAAOCAg8AMIICCgKCAgEAiRT5lHcVaHnAG5VMcsD3QLEByPaQ+B3Uikcj TnxLfnM/4WUW20LEDuzs0JnvJ13zsfxMPrtILOgegZTdpz5m6w9mK4kiYq8d2oKC G4s1NDVGGXMjJ5VncrHmWQJ9ywJ86FGyC75IMQOG7+m//Zm0AC1XLkmwof1nZaeQ 7no6kzPo8/smTIwSTY8L0QTJekco9UidTW1uCwObsSOGyN7oc/xTI75QMwx3N1eJ iDBXdfMDjMz+TL4UOh8a425XFHsSt5bqs4vtiAXVdfL2Ci0r5xREmuoXBPtLsoQQ aF6g48WIF/RPxB3BtsTzUFiBjafVGZrc9h9UCod9GagXaImdQe9fcX9S+xHHuoin Xnkqk5YiQTaNQUtSdrjW1kEyR6qn74EHEtGaC5kGypxezuRfjS2Cqc8NWbcmEa5M yNfiuHDQoUYfHcgXyKH/GqklWRpI3Wlymlng43RLDWOFKm23RQWSbc0wW176DBKW QtH3Ru7Va1y1Pl0v3KzI5LryXNltSQnuurNu7cSGEVkl+JuYg8UhG954lF8ZQBhA fkA6VM85bO+KqoAXtCCKZPWicwz0R2dopO7aCIS9xKROpI/bxK5c1TmIq7kQYR9U VH9pJDJf/VGY+zlEDhbUfnk7qUAA4Ax0yqXp3iJ4g9n5NQRD/SeXjhTjYnx77jMc 4sHAq3MCAwEAAaOCAd8wggHbMBIGA1UdEwEB/wQIMAYBAf8CAQAwUgYDVR0gBEsw STA5BgpghhABAQcjAgICMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vY2EuZGFya21h dHRlci5hZS9pQ1BTMAwGCisGAQQBvlgBgiwwcQYIKwYBBQUHAQEEZTBjMCoGCCsG AQUFBzABhh5odHRwOi8vb2NzcC5xdW92YWRpc2dsb2JhbC5jb20wNQYIKwYBBQUH MAKGKWh0dHA6Ly9jYWNlcnRzLmRhcmttYXR0ZXIuYWUvcXZyY2EzZzMuY3J0MBIG A1UdHgQLMAmgBzAFgQMuYWUwDgYDVR0PAQH/BAQDAgGGMDMGA1UdJQQsMCoGCCsG AQUFBwMCBggrBgEFBQcDCQYIKwYBBQUHAwQGCisGAQQBgjcKAwwwHwYDVR0jBBgw FoAUxhfQvKjqAkPyGwaZXSuQILnXnOQwZQYDVR0fBF4wXDAsoCqgKIYmaHR0cDov L2NybDEuZGFya21hdHRlci5hZS9xdnJjYTNnMy5jcmwwLKAqoCiGJmh0dHA6Ly9j cmwyLmRhcmttYXR0ZXIuYWUvcXZyY2EzZzMuY3JsMB0GA1UdDgQWBBQFYUHGPQ0o vmKfmPOvozPqwP3w6TANBgkqhkiG9w0BAQwFAAOCAgEAX3vpAMzWebcv34imbmrw kwqXl/Zsy+4G8ux3nWM53GgEZOJzhjmAj0dPNqm3NTmv67Hxgle0JP7RtaDdBffd rVzgzP9dbt5RMp8Cd3FU/aIh7RMH+ksFdJGmvxeM/eECqkDv5R7grYhEkyjojFEF D6IchUhEQg5pK1besBS850Z6wVtklBQ3VPf43pB0rFUxNIHzHxED/Syl3/5V1Bvq 7r05NI5czbyIX61n3zyCMKKi/UIo3cLipOxJtCtJ+KcYwRRQkGotwQ0urnoWZyzu fOizWPCsKqAzZX5MLQ0aRdp34hVjlVULQ+5JaP9IZo0qmax+fAhu1GBb+AAVdmr3 /5VHbmUxsQveXM1OrlGucN5Bl7tCjiVLUohKXNFWJdgY8X24WAmv69RVj21HI10e a2LsrN5icW+eWiIKHWmzGImwmt4aOezG4cphfePF1ZF95a05If8hyfurZ2yxSBqg HGCw1o2GQt8tPg3idKNQpwPacl0N/iYzAoxNL2icWDvbGgoZCfHHmpomnoUh2s2h AKat6uuwNhaIzr0ou3OybKJwL2+Ezl5zRAOZ7xWn+83wwFZl71LMjI/RR2ZTMkMT Mnla7urvnc6JESP+CZDaHjusq9yNWQUSTLxegChdFUbVWP2/sbFhGcUtaEmg11u/ 412lsW/V3+N0GaY17t15K2Y= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterAssuredCA.crl_url0000664001343500074740000000012213614364111027235 0ustar davidgdavidghttp://crl1.darkmatter.ae/dmassureca.crl http://crl2.darkmatter.ae/dmassureca.crl igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterAssuredCA.signing_policy0000664001343500074740000000035413614364111030617 0ustar davidgdavidg# DarkMatter Assured CA Signing Policy (Client Public Trust) access_id_CA X509 '/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA' pos_rights globus CA:sign cond_subjects globus '"/C=AE/O=DarkMatterGrid/*" "/DC=com/DC=DarkMatterGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterAssuredCA.namespaces0000664001343500074740000000110113614364111027710 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)ssuredca.namespaces # CA alias : DarkMatterAssuredCA # subord_of: QuoVadis-Root-CA3G3 # subjectDN: /C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA # hash : ssuredca # (generated automatically from dmassuredca.signing_policy) # TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA" \ PERMIT Subject "/C=AE/O=DarkMatterGrid/.*" TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA" \ PERMIT Subject "/DC=com/DC=DarkMatterGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterAssuredCA.info0000664001343500074740000000101513614364111026530 0ustar davidgdavidg# # @(#)$Id: dmassuredca.info,v 1.1 2017/02/01 13:46:26 pmacvsdg Exp $ # alias = DarkMatterAssuredCA url = http://ca.darkmatter.ae/Grid/ ca_url = http://cacerts.darkmatter.ae/dmassureca.crt crl_url = http://crl1.darkmatter.ae/dmassureca.crl;http://crl2.darkmatter.ae/dmassureca.crl email = CA-Admins@darkmatter.ae status = accredited:classic requires = QuoVadis-Root-CA3G3 version = 1.104 sha1fp.0 = 6B:6F:A6:5B:1B:DC:2A:0F:3A:7E:66:B5:90:F9:32:97:B8:EB:56:B9 subjectdn = "/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterIGTFCA.pem0000664001343500074740000000462313614364111025511 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG5jCCBM6gAwIBAgIIAeNWFy49jkYwDQYJKoZIhvcNAQEMBQAwTjELMAkGA1UE BhMCQUUxFzAVBgNVBAoMDkRhcmtNYXR0ZXIgTExDMSYwJAYDVQQDDB1EYXJrTWF0 dGVyIFByaXZhdGUgUm9vdCBDQSBHNDAeFw0xNzA2MDUxMTQ0MzZaFw0yNzA2MDUx MTQ0MzZaMEMxCzAJBgNVBAYTAkFFMRcwFQYDVQQKDA5EYXJrTWF0dGVyIExMQzEb MBkGA1UEAwwSRGFya01hdHRlciBJR1RGIENBMIICIjANBgkqhkiG9w0BAQEFAAOC Ag8AMIICCgKCAgEAruQJ7rzSZHas92E/FxkaM/Ef8EyfV9X4SR6IFCnAQt5uYLZz KjbSaYn+klPYu64MO1JWkGzNZx0sii4P70YJFK2wrd7uXUgNRjTTJA3qyuxUDx08 vlfzHJhWVaeNI49ApXvrpQomLnkV7heN957Jlk2SKpGTElrGhZnDlxr+vChCjK31 UrJrBmAneXfWAfMuxpDhgWctKBOfjAH7WJfFRM5MkrNp8f/t1l6KFWWWNvRwZ3Rl d4P23M2+BNW3t1sFyA75xgSEyq6EOBwbKkC6eGT3zW7c8lwxIVHOeFafB7F/ZnS1 HjKIrAdQXsld4Rt+AnBeq/NmosuF3euJSDJlyvkX7EAzf80NEDUiPHKj/C8GEI+k cswyMLKOmtRBXNGaBcrsQn6SnGMy/cA+AJx4msH13uHInfnsiehr30b7PyNHDE68 6yTEVvfsM2hpW0ymQ5HVbxsrieWuK6N1fXynb7oHD9n71Wxka9auo2mKS3b/dqV3 RvE5Bml/M0d3rwSNQo/m4AZQz8vTf3ukQbMMfSpWoPD4FAy2PPFI14381SNpj7iP Y7OUtHANwa5F+yQXi+qtabsVxrS0g+PoNWT4nt42UQCWBCV+oGpoNfpQCWn2Xl7K s5NAPFWb37+O+SxRwGO0al26RlKrpQJWJk4PAT1tCL/kCgWjMrCmmQMQ/g0CAwEA AaOCAdEwggHNMFcGCCsGAQUFBwEBBEswSTBHBggrBgEFBQcwAoY7aHR0cDovL2Nh LmRhcmttYXR0ZXIuYWUvY2VydHMvRGFya01hdHRlclByaXZhdGVSb290Q0FHNC5j cnQwHQYDVR0OBBYEFNsPb1gYp6+cR46D1hV3ms7eM3dEMBIGA1UdEwEB/wQIMAYB Af8CAQAwHwYDVR0jBBgwFoAU09ld0MepwpJNdf30XeFmRKHqd6YwUQYDVR0gBEow SDA4BgpghhACAigCAgMBMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vY2EuZGFya21h dHRlci5hZS9DUFMwDAYKYIYQAgIoAgIDAjB8BgNVHR8EdTBzMDegNaAzhjFodHRw Ly9jYS5kYXJrbWF0dGVyLmFlL2NybC9EYXJrTWF0dGVyUm9vdENBRzQuY3JsMDig NqA0hjJodHRwLy9wa2kuZGFya21hdHRlci5hZS9jcmwvRGFya01hdHRlclJvb3RD QUc0LmNybDAOBgNVHQ8BAf8EBAMCAYYwPQYDVR0lBDYwNAYIKwYBBQUHAwIGCCsG AQUFBwMEBgorBgEEAYI3CgMMBggrBgEFBQcDCQYIKwYBBQUHAwEwDQYJKoZIhvcN AQEMBQADggIBAF9Q+kJvSje0hdCDiD3T+Sy6QTVJyeTMN2H675SAb8kgB2pgTRMN cIksknAR+ebRI5z+1PZ5NzSMl/umE8+a9SWk9B1mOmNhwSTCLo18a1iiaJMCZ+IY ZQk9PaY3rSsmM0G8CO6GkG0DyALpJHF8R6dbhvUfHDb5n/vniATycrCuNMKcoFaV vJHNyXKiNgJC6AW4Y2zpd2j3VV2P6Nmd8J2rMWiHlm8UKcTqX+5AYCMfyEr8jXVF AcsYuO6pHWszlFqYZb0zVz8tFeBemefV7RJzQ+7boAqfjBNICyRDGFt8XJGe7OQ8 4lr8IHKI/xpVXt/bBnhReOlLfZZ0AKOBg5WqIzudTa71zsB8OyUT/CsqIZz71E1Q psRddfjaURTNemXtLhSp7vjq1FiBovMBMFoawTI6c9fjRQHGUKEEkDq09KxzmYt4 rALGg5eLT7c98FKp8Pa8jmmHSpnmlCb+b9Tbxq+6p6xIale+aVl0Rzl2Oow+FxQG pKsTJ+3pjkKLv194HxE6wk8ZpaDyjB1S3ypOejLWWMNapY+MP6adgrCA5ug6dE6+ 8z8/Nv/cw++fhfqXjao9VVyu4zjSaABhMtXaE1PiJH0Ro+oDLVhCa3fT04TmiBgR Ng8ZUfOYTrP6udc4OItjZ4FX4o24lNm+QVkd6Kq4LhwdaLJ1PkPP9gcp -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterIGTFCA.crl_url0000664001343500074740000000006113614364111026362 0ustar davidgdavidghttp://ca.darkmatter.ae/crl/DarkMatterIGTFCA.crl igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterIGTFCA.signing_policy0000664001343500074740000000036313614364111027742 0ustar davidgdavidg# DarkMatter IGTF CA Signing Policy (Client and Host Private Trust) access_id_CA X509 '/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA' pos_rights globus CA:sign cond_subjects globus '"/C=AE/O=DarkMatterGrid/*" "/DC=com/DC=DarkMatterGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterIGTFCA.namespaces0000664001343500074740000000077313614364111027051 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)9dcd411f.namespaces # CA alias : DarkMatterIGTFCA # subord_of: DarkMatterPrivateRootCAG4 # subjectDN: /C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA # hash : 9dcd411f TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA" \ PERMIT Subject "/C=AE/O=DarkMatterGrid/.*" TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA" \ PERMIT Subject "/DC=com/DC=DarkMatterGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterIGTFCA.info0000664001343500074740000000074413614364111025663 0ustar davidgdavidg# # Information for /C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA # alias = DarkMatterIGTFCA ca_url = http://ca.darkmatter.ae/DarkMatterIGTFCA.crt crl_url = http://ca.darkmatter.ae/crl/DarkMatterIGTFCA.crl email = CA-Admins@darkmatter.ae status = accredited:classic url = http://ca.darkmatter.ae/Grid/ requires = DarkMatterPrivateRootCAG4 version = 1.104 sha1fp.0 = 23:83:4C:E3:AB:8C:65:76:07:05:9B:4B:31:FD:CC:0C:89:11:79:5A subjectdn = "/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterPrivateRootCAG4.pem0000664001343500074740000000360313614364112027427 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIIP1GkWJUgngowDQYJKoZIhvcNAQEMBQAwTjELMAkGA1UE BhMCQUUxFzAVBgNVBAoMDkRhcmtNYXR0ZXIgTExDMSYwJAYDVQQDDB1EYXJrTWF0 dGVyIFByaXZhdGUgUm9vdCBDQSBHNDAeFw0xNzA2MDUxMDM1NTZaFw0zNzA1MzEx MDM1NTZaME4xCzAJBgNVBAYTAkFFMRcwFQYDVQQKDA5EYXJrTWF0dGVyIExMQzEm MCQGA1UEAwwdRGFya01hdHRlciBQcml2YXRlIFJvb3QgQ0EgRzQwggIiMA0GCSqG SIb3DQEBAQUAA4ICDwAwggIKAoICAQCkAF8D5wTP5nq3mBYcLlncPhjw6VCXCNfQ FqYkrBBXpjQ+Z4v+pph22SkLvqZxSQnz+JjVioOBHMvZc/i/pBe+DG7xKdDLnLYH ug20xRVdNYd/pLeTcvRTANW8BdZiZyh8Z8wnnLLCY/P6zoD3E1LiZHIcLhTLKgq6 yopw8jM5t4I/HluB0SHqU8FvTg124GvnGbFv26hqffubF0MRdI8WdCHBcKPBtFJd 7M3a+gE7t9POX6D5ZkRS9nvgBFkRKbQyG/iue3R4sZVGhvm3kWQnSrOjF+VREjE/ 7e/axuzHQwG4v8QN8li4j56MgrOq1nwUbDr8HsKK7V0ygAGAtoN5JjdHgfojt5Cy q4xdEDMUxTmhjFNi/N3UfD2Mj4Br4sMT6OGTvkI+1Lg9ccp73qVxCrNmEqAtkl+W PJfn6ARLapS0xwbpV12rXHmfU2/bL4KcVwebqMzfe7Ho1uo62vEW9zzL4awLyCoH w/6MVy+BAt4QXoJqQYphJ0Kxbbm3tarzo6bO345+6Onh9URcUsf6DXYqTGd1yww8 wKl3WycJP4ErDWHOBijACkZP/SLtstZg6fO6qtblCsV3KVXRdCBp2LHFxHpnvKJX gJZJPiAiYPh7kBZQTF3zrmXWW9Ho0z8kUKw2bHxtuqK5UaFmWU9DO+nKujwgbnqV TVVd0xgRGwIDAQABo0IwQDAdBgNVHQ4EFgQU09ld0MepwpJNdf30XeFmRKHqd6Yw DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQEMBQAD ggIBAHBDNmDOUgKbNzCnyJD//mCTee0hSs2HjxPd4NsUCWMVgHrAHri23dpKt7m2 HCeW/OXXqL3MxfS0PYQJyS32PpaEj5LiMuJmUZCy/wyzLT2UXituHPA2wqySwSEh ktCMkRUxywJt8qJJ6vJpGQtz4/r17A7L8zeLmfUD02KBcyc0hUB0BbUa0VNd3so/ tddfXpXnSO3EHXHaK18dEuGql1ASqB2yLap+HjqNIFK7MU6/H68ETTYB34rkCjqQ AIg49RiqzrekEnU4/jlkD43fF8adFv0bW1wEsawHWtYOJPI2wX27NJauBE7m/gXn xLjsS+NeSHiP2imBMP89O6LmewERp/APnCSI8OT7NP8k2jStH+ACz5VcIfMyr76L ciWzwxOyW2TVpU/0eDC1LpIW1UxC2i9krGJDraz3KxfE/UxQI8Mha1xrKXVsAk4j CocnKfv4s/wfCV67JREXBpK9enF/B2BadfdbrEpuUaac0IDh4ximgGr//20xdGIt 6Sd3ufmRNind+Adj4oiUYb4aVitWosa/Pb6XQCg+TTZ1szNTD7vdWDaPyk42Rrr2 ju81qAeYcIzhkUzpJietL6w4nXFK4ViTb+7QNr5Ju84om5EnrGhvP7eosQkuF0zN CZkPA/bT1JH4pOmfRlIoH1wbkLtBweatCM5FE8VFuzx6Ct0y -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterPrivateRootCAG4.crl_url0000664001343500074740000000007213614364112030305 0ustar davidgdavidghttp://ca.darkmatter.ae/crl/DarkMatterPrivateRootCAG4.crl igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterPrivateRootCAG4.signing_policy0000664001343500074740000000037713614364112031670 0ustar davidgdavidg# DarkMatter Private Root CA G4 Signing Policy (Client and Host Private Trust) access_id_CA X509 '/C=AE/O=DarkMatter LLC/CN=DarkMatter Private Root CA G4' pos_rights globus CA:sign cond_subjects globus '"/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA"' igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterPrivateRootCAG4.namespaces0000664001343500074740000000065213614364112030766 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)13ba85c4.namespaces # CA alias : DarkMatterPrivateRootCAG4 # subord_of: # subjectDN: /C=AE/O=DarkMatter LLC/CN=DarkMatter Private Root CA G4 # hash : 13ba85c4 TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter Private Root CA G4" \ PERMIT Subject "/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterPrivateRootCAG4.info0000664001343500074740000000076613614364112027610 0ustar davidgdavidg# # Information for /C=AE/O=DarkMatter LLC/CN=DarkMatter Private Root CA G4 # alias = DarkMatterPrivateRootCAG4 ca_url = http://ca.darkmatter.ae/certs/DarkMatterPrivateRootCAG4.crt crl_url = http://ca.darkmatter.ae/crl/DarkMatterPrivateRootCAG4.crl email = CA-Admins@darkmatter.ae status = accredited:classic url = http://ca.darkmatter.ae/Grid/ version = 1.104 sha1fp.0 = 91:00:AF:1E:08:3F:82:41:DC:C8:29:B8:18:E4:2B:84:03:2E:FF:FB subjectdn = "/C=AE/O=DarkMatter LLC/CN=DarkMatter Private Root CA G4" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterSecureCA.pem0000664001343500074740000000465413614364112026213 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG9zCCBN+gAwIBAgIUYj9Q2DoRGS8RFsxLEnheErA5ayQwDQYJKoZIhvcNAQEM BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xNjA0MjkyMjQ1MThaFw0y NDA0MjkyMjQ1MThaMEUxCzAJBgNVBAYTAkFFMRcwFQYDVQQKDA5EYXJrTWF0dGVy IExMQzEdMBsGA1UEAwwURGFya01hdHRlciBTZWN1cmUgQ0EwggIiMA0GCSqGSIb3 DQEBAQUAA4ICDwAwggIKAoICAQCTLy5tgrM3U8PXgFO8AatMOs6p2Q5zjufWjCWR CEk/9cg1UaDiHmJ12uNE9fnhIGdU6yCFtb7v9BHLC0sYR1PGZvpg3HQT3JJ+T3PX 7Jn2Qjjpvh+31gDEbo9GDEz4H/XZ57FvEPnx4J1G5QTjoL2lhDLcvolucREpiNMk HVHg6sznS1Bep5L47Zkb8rEoiRlFedssC1s7h1MVdMQCFhN9zUcp/LVKK5P50HqS 9szai+mVZX0dOhU8esq+kErKAI/5NDzU/4ZdS6w+ACfFlOURrUzmlAqDF4l+YQmh VSyHEU/PvBqu8zM9+4+UGUWxwzOQIqkZh1LbqGAzcpLRTnW+48Xoh3Ol6t2RrmMH p+W23zBRYLxm5lARKutlsyQz4Xp9FSBFUN+O/wExsveGo6n/+qo62Orkr4lYV2oi Ryl7aBtFoYnbNKz5qjHXtT9KZHfpxAx1X5KkclQ6RBC86+npiiczEs2PtZ8qFE7U HzZxDeYpYH4DMjn9AwzSaMFbd4TGvqJdH7DCQ46C/P2KJ/JZ3KPLupJZL9NIZS7B 1cJ3B4de2LSkKcXds+/2xcjqNh6U5b0InAQOKx/x335oQcKqBZQN00C0pWZ/s3sk /LKJ4xmDmNOQBo14ENm+c2JeRrsn3fILrNs4sZY1PzPq++sll+9Bs8D5ZJ1iBwJx goiVKQIDAQABo4IB2jCCAdYwEgYDVR0TAQH/BAgwBgEB/wIBADBZBgNVHSAEUjBQ MDoGC2CGEAEBByMCAgECMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vY2EuZGFya21h dHRlci5hZS9pQ1BTMAgGBmeBDAECAjAIBgZngQwBAgMwcQYIKwYBBQUHAQEEZTBj MCoGCCsGAQUFBzABhh5odHRwOi8vb2NzcC5xdW92YWRpc2dsb2JhbC5jb20wNQYI KwYBBQUHMAKGKWh0dHA6Ly9jYWNlcnRzLmRhcmttYXR0ZXIuYWUvcXZyY2EyZzMu Y3J0MBIGA1UdHgQLMAmgBzAFggMuYWUwDgYDVR0PAQH/BAQDAgGGMCcGA1UdJQQg MB4GCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwkwHwYDVR0jBBgwFoAU7edv dlq/YOxJW8ald7tyFnGbxD0wZQYDVR0fBF4wXDAsoCqgKIYmaHR0cDovL2NybDEu ZGFya21hdHRlci5hZS9xdnJjYTJnMy5jcmwwLKAqoCiGJmh0dHA6Ly9jcmwyLmRh cmttYXR0ZXIuYWUvcXZyY2EyZzMuY3JsMB0GA1UdDgQWBBSiUKRwyzu1ymGUJxOW OnR2qp3sNDANBgkqhkiG9w0BAQwFAAOCAgEASEpbVfqGC6QsEbcOga3KrQvwk+Pl /hr5ZaUIz1qKEGsIHIKgZ4rBWmQduIauDwya1Nmpa5wg54lH7vbowgFYPan2wruY Z3ETh/mhBf8gcD9hy92z/EXO8ccw5gTzVbKx0177dKVLqKoqT2oHFKzmo/W5g8gL xZi9kMnW2+FsE5W/rv+jcTsNslnpObrK80DR+2dxr1UFPlVUZZGrpXgBWniVdPC6 YCfAcWU6pIyaVS23w9k4J5RPDXTiCMP6j1fMEVomsOHiv3epBO3C1kFwJziqhr1h jUKidceskjIyj63hl7bqGJetyvnEuuxznk8eQatzGKoSHKRz/PVD88Tuz7gWtklM VvAMnJiavw+iosHxaZ3Gwi9s5LCAmXK/NM8AT+tlk0uhlm9I8qciQOayoTQ72LLw AIQqN/1lGjN5+1OJIbm47YhdEWVcCWsvymovPxNwiEj7oHkb8Yjdkd9Dc+bRKcgs C3cBC+DLRiTpYwaRVBaLY9bd2bawIJx4JLr9zLwmqiCHfJrMpq/m5QsdbZit76Rx vXAC+6MuO7T5jkZHBdlBGom/xAm5x9efuCFDJinIzeg9fNAzr1JA/p2yr/ahXoRT sEY1ogEgn+HThh1sEPtqKAUAgcVpZ8Tksagt0gG9OYFuecXoKPoDiEuy45I+EJ0d XmKvH1f6bFuQNmI= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterSecureCA.crl_url0000664001343500074740000000012213614364112027056 0ustar davidgdavidghttp://crl1.darkmatter.ae/dmsecureca.crl http://crl2.darkmatter.ae/dmsecureca.crl igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterSecureCA.signing_policy0000664001343500074740000000035213614364112030436 0ustar davidgdavidg# DarkMatter Secure CA Signing Policy (TLS Public Trust) access_id_CA X509 '/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA' pos_rights globus CA:sign cond_subjects globus '"/C=AE/O=DarkMatterGrid/*" "/DC=com/DC=DarkMatterGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterSecureCA.namespaces0000664001343500074740000000107413614364112027542 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)secureca.namespaces # CA alias : DarkMatterSecureCA # subord_of: QuoVadis-Root-CA2G3 # subjectDN: /C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA # hash : secureca # (generated automatically from dmsecureca.signing_policy) # TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA" \ PERMIT Subject "/C=AE/O=DarkMatterGrid/.*" TO Issuer "/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA" \ PERMIT Subject "/DC=com/DC=DarkMatterGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DarkMatterSecureCA.info0000664001343500074740000000101213614364112026346 0ustar davidgdavidg# # @(#)$Id: dmsecureca.info,v 1.1 2017/02/01 13:46:26 pmacvsdg Exp $ # alias = DarkMatterSecureCA url = http://ca.darkmatter.ae/Grid/ ca_url = http://cacerts.darkmatter.ae/dmsecureca.crt crl_url = http://crl1.darkmatter.ae/dmsecureca.crl;http://crl2.darkmatter.ae/dmsecureca.crl email = CA-Admins@darkmatter.ae status = accredited:classic requires = QuoVadis-Root-CA2G3 version = 1.104 sha1fp.0 = 6A:2C:69:17:67:C2:F1:99:9B:8C:02:0C:BA:B4:47:56:A9:9A:0C:41 subjectdn = "/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertAssuredIDRootCA-Root.pem0000664001343500074740000000250613614364112030023 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe +o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DigiCertAssuredIDRootCA-Root.crl_url0000664001343500074740000000015213614364112030677 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertAssuredIDRootCA.crl http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl igtf-policy-installation-bundle-1.104/src/accredited/DigiCertAssuredIDRootCA-Root.signing_policy0000664001343500074740000000077313614364112032263 0ustar davidgdavidg# DigiCert Assured ID Root CA Signing Policy (Public Trust Anchor) access_id_CA X509 '/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA" "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3" "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3"' igtf-policy-installation-bundle-1.104/src/accredited/DigiCertAssuredIDRootCA-Root.namespaces0000664001343500074740000000207113614364112031356 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)69105f4f.namespaces # CA alias : DigiCertAssuredIDRootCA-Root # subord_of: # subjectDN: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA # hash : 69105f4f # (generated automatically from 69105f4f.signing_policy) # TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA" TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3" TO Issuer "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" \ PERMIT Subject "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertAssuredIDRootCA-Root.info0000664001343500074740000000112213614364112030166 0ustar davidgdavidg# # Information for:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA # alias = DigiCertAssuredIDRootCA-Root ca_url = http://www.DigiCert-Grid.com/DigiCertAssuredIDRootCA_text.txt crl_url = http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl;http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ version = 1.104 sha1fp.0 = 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43 subjectdn = "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1-Classic.pem0000664001343500074740000000324413614364113027016 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEuTCCA6GgAwIBAgIQAp7/0k8LfSOZNZubH9bz3jANBgkqhkiG9w0BAQUFADBs MRMwEQYKCZImiZPyLGQBGRYDY29tMR0wGwYKCZImiZPyLGQBGRYNRGlnaUNlcnQt R3JpZDEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEeMBwGA1UEAxMVRGlnaUNlcnQg R3JpZCBSb290IENBMB4XDTExMTIwNzEyMDEwMFoXDTI2MTIwNzEyMDEwMFowaTET MBEGCgmSJomT8ixkARkWA2NvbTEdMBsGCgmSJomT8ixkARkWDURpZ2lDZXJ0LUdy aWQxFjAUBgNVBAoTDURpZ2lDZXJ0IEdyaWQxGzAZBgNVBAMTEkRpZ2lDZXJ0IEdy aWQgQ0EtMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALoLTRpS0mNR MRmmpWoAdtLhgpt9IQwTNnzM+lINbQPvSoQm4RQEYLYmDBCZnF1EV6YOKHEivuzf cStmQ/7YI51Phyma5/Siy4glgu0+JiugeaQdakysESZKu7STFtg5dFZywL5vIWH8 B44pdce4TBrC+a6sjoP7+1DdsOM1CAVz3gjpUcbJdbZIOMogYVwCDIedgwTWd2NY d9ZP+QwIXS8D6aa0ehdyIDLJUXEtADIBq/IbD30qz3MC2unkL6npk3yOpW4YWSnS veIqcUhwq8QE+bxQBBbgnKmfH4WenyKzaiil9OtHC0hjDngGIhIamRskfG2TyGT7 aXBDZkqUJnECAwEAAaOCAVgwggFUMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0P AQH/BAQDAgGGMHUGCCsGAQUFBwEBBGkwZzAkBggrBgEFBQcwAYYYaHR0cDovL29j c3AuZGlnaWNlcnQuY29tMD8GCCsGAQUFBzAChjNodHRwOi8vY2FjZXJ0cy5kaWdp Y2VydC5jb20vYWlhRGlnaUNlcnRHcmlkQ0EtMS5wN2MwdwYDVR0fBHAwbjA1oDOg MYYvaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R3JpZFJvb3RDQS5j cmwwNaAzoDGGL2h0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdyaWRS b290Q0EuY3JsMB0GA1UdDgQWBBTvsHWdaDHR5PcqiYJTnTl3aC4gUTAfBgNVHSME GDAWgBQ9yNSzuaF3UJdQEVCoOeUcU2PGcDANBgkqhkiG9w0BAQUFAAOCAQEAZixh Zm0WtmCCR1vnouUSorR+S8WDhZk9c2xpslHsdWaO2pYb65aGpoit8IUQ5VaehH05 GHAvAWI/Jnga1GIHQFbPUSYbG5eJcUh/XKEqdGYG39kjNXsFzS2wncFbdA3HiKAr 78Q8cNvuTjS/HFthRfnwZmYA7am0BaXuF9d5YkzSspxRBUbLGAnvudicXVPOWx2p my6M6/Y/rTIhzdH2JEzFxG5q598FWyR4BY7XhUrprii7kkbAr9EA35fKZ7IWhk/0 viAoT4LnGWrGK71LcJl1UdZD7GuPp4hGmrf0ReXUiqXzLD4Yt88LR95Xecx/K8Wt 2mgPG/cieHl9M/NZ/g== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1-Classic.crl_url0000664001343500074740000000013413614364113027672 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertGridCA-1.crl http://crl4.digicert.com/DigiCertGridCA-1.crl igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1-Classic.signing_policy0000664001343500074740000000037613614364113031255 0ustar davidgdavidg# DigiCert Grid CA-1 Signing Policy access_id_CA X509 '/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1-Classic.namespaces0000664001343500074740000000135613614364113030356 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)c7a717ce.namespaces # CA alias : DigiCertGridCA-1-Classic # subord_of: DigiCertGridRootCA-Root # subjectDN: /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 # hash : c7a717ce # (generated automatically from c7a717ce.signing_policy) # TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1-Classic.info0000664001343500074740000000111213614364113027160 0ustar davidgdavidg# # Information for /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 # alias = DigiCertGridCA-1-Classic ca_url = http://www.digicert-grid.com/DigiCertGridCA-1_text.txt crl_url = http://crl3.digicert.com/DigiCertGridCA-1.crl;http://crl4.digicert.com/DigiCertGridCA-1.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.Digicert-grid.com/ requires = DigiCertGridRootCA-Root version = 1.104 sha1fp.0 = DE:76:E7:2D:E9:C7:3F:42:FA:F9:34:04:13:1B:02:B9:49:6B:D7:11 subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1G2-Classic-2015.pem0000664001343500074740000000325013614364113027571 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEvDCCA6SgAwIBAgIQDDLx0Sp02Aw8WPQjYJtoXTANBgkqhkiG9w0BAQsFADBs MRMwEQYKCZImiZPyLGQBGRYDY29tMR0wGwYKCZImiZPyLGQBGRYNRGlnaUNlcnQt R3JpZDEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEeMBwGA1UEAxMVRGlnaUNlcnQg R3JpZCBSb290IENBMB4XDTE0MDEwODEyMDAwMFoXDTI5MDEwODEyMDAwMFowbDET MBEGCgmSJomT8ixkARkWA2NvbTEdMBsGCgmSJomT8ixkARkWDURpZ2lDZXJ0LUdy aWQxFjAUBgNVBAoTDURpZ2lDZXJ0IEdyaWQxHjAcBgNVBAMTFURpZ2lDZXJ0IEdy aWQgQ0EtMSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALCwFRVh i4CR3PGtTVjHnyrCiBoaW5VUbMxEJDDfdXZLWmb1arm29gCTdd/IVIiur22dID8h iiEvJbLEN6ikKrYJyrQzwmTYNXSwIaKNNfYRWDQS1i2aEHykE1+81IG5qgkUaWPJ dy1mI7n+BHLHucN25M1CLT695R1ulbA7pcboKc51aVI0r6HqYtGWiNpum/Jlw2el QScJak9NoPEuMk+kPQH+c4gMzL+yMRwDqNGn3Xx4Dm9Ju9lwgM2Drw98iA+s4DnG P1FppgxVx7PTNZzYLhmbVxTLMp34AE22O4iY02/zd8PRAlrNHP7UhTopIfCB+GPr +Inkt5fj2KNqHzkCAwEAAaOCAVgwggFUMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYD VR0PAQH/BAQDAgGGMHUGCCsGAQUFBwEBBGkwZzAkBggrBgEFBQcwAYYYaHR0cDov L29jc3AuZGlnaWNlcnQuY29tMD8GCCsGAQUFBzAChjNodHRwOi8vY2FjZXJ0cy5k aWdpY2VydC5jb20vRGlnaUNlcnRHcmlkUm9vdENBLmNydCAwdwYDVR0fBHAwbjA1 oDOgMYYvaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R3JpZFJvb3RD QS5jcmwwNaAzoDGGL2h0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdy aWRSb290Q0EuY3JsMB0GA1UdDgQWBBQ2WczfPDriSZNPJRJCts/pGR8ytDAfBgNV HSMEGDAWgBQ9yNSzuaF3UJdQEVCoOeUcU2PGcDANBgkqhkiG9w0BAQsFAAOCAQEA a2miBJ5shp9VaF8n9IrLxwzxjT2Kg4YzmsQxuP+kicHOBVaa5njakpnjYMpQ9M3k Wd4L1EAsJ6v06SGiwizzbzo7fCGpUqwlqm7clf7MBKmuIktDuBfV9iSDccg4hIcL RCJ4WMibrqKIj57Iia3jCxzvHW9kV/KfP3+/JsIBzhQYN1I8Rbb3XVBil5bhBtYU /Nxw7TA5wqaDhkoGxCAlOhfizB7LHkzbDckmzqoo855g3NJSZvk7OpE9ddoXNFSn deCCG7oIYBiK2NH7O73Vtgf2d+pHfrj8Z3ZnB9JmjSacRcXldZSNzd5T/S1VIz80 GH1fIzyIXztGhqw+eW9OAw== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1G2-Classic-2015.crl_url0000664001343500074740000000014213614364113030447 0ustar davidgdavidghttp://crl4.digicert.com/DigiCertGridCA-1-G2.crl http://crl3.digicert.com/DigiCertGridCA-1-G2.crl igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1G2-Classic-2015.signing_policy0000664001343500074740000000051513614364113032026 0ustar davidgdavidg# DigiCert Grid CA-1 G2 2015 Signing Policy access_id_CA X509 '/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" "/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1G2-Classic-2015.namespaces0000664001343500074740000000130513614364113031126 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)62c4a178.namespaces # CA alias : DigiCertGridCA-1-G2-Classic-2015 # subord_of: DigiCertGridRootCA-Root # subjectDN: /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2 # hash : 62c4a178 TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridCA-1G2-Classic-2015.info0000664001343500074740000000114013614364113027737 0ustar davidgdavidg# # Information for /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2 # alias = DigiCertGridCA-1G2-Classic-2015 ca_url = http://www.digicert-grid.com/DigiCertGridCA-1G2Update.cer crl_url = http://crl4.digicert.com/DigiCertGridCA-1-G2.crl;http://crl3.digicert.com/DigiCertGridCA-1-G2.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertGridRootCA-Root version = 1.104 sha1fp.0 = 62:2C:7B:96:DA:67:46:CD:B5:C9:35:B8:FE:78:3B:77:35:16:FC:E3 subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridRootCA-Root.pem0000664001343500074740000000252713614364114027072 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDxTCCAq2gAwIBAgIQAmE4fDe0OaWE+qFSUtrI6jANBgkqhkiG9w0BAQUFADBs MRMwEQYKCZImiZPyLGQBGRYDY29tMR0wGwYKCZImiZPyLGQBGRYNRGlnaUNlcnQt R3JpZDEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEeMBwGA1UEAxMVRGlnaUNlcnQg R3JpZCBSb290IENBMB4XDTExMTIwNzEyMDAwMFoXDTM2MTIwNzEyMDAwMFowbDET MBEGCgmSJomT8ixkARkWA2NvbTEdMBsGCgmSJomT8ixkARkWDURpZ2lDZXJ0LUdy aWQxFjAUBgNVBAoTDURpZ2lDZXJ0IEdyaWQxHjAcBgNVBAMTFURpZ2lDZXJ0IEdy aWQgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL1Yym5/ MKraEAE4RKX8Suurhv5isaeNW1GoQV+jCo1fN0DEXWG/SBW27OIJ1slHI3pp68+j pzdzpB7jJ7L25vgkIhKyUvf3VYqFRvdnVCouC3OIknilWO1J/spASh6/BS8tD2Z6 PE/n/NrqMkF6lZZuQuSooicEZkcxCmyM2Vp7XQXe+qCzILYsp5rEX4FXclT0SMiX jVSlR+qKNhinecW6IW1mqSluMY9k/3ze5KmdjnhivJ+EKt9cUk1zMxSr//KjV7XA d4IiQn3wi9sTWCdokVoVTrmMmksVYcjeq3Xcod/LiziqyqHo+c6uMSN5c3Hg2X1O xU2UYWPIE1GQ02kCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E BAMCAYYwHQYDVR0OBBYEFD3I1LO5oXdQl1ARUKg55RxTY8ZwMB8GA1UdIwQYMBaA FD3I1LO5oXdQl1ARUKg55RxTY8ZwMA0GCSqGSIb3DQEBBQUAA4IBAQCTaCdkxfOe gOJmMqoklLIqhaqbuH1D5RDzSsXET3iDABtxbcbuFr8LHEROICWOWVZi3VQih+f1 80wXqRaD8BkCpbKFzFMWCuOUmN5307v06gIjUAfKKyJumdI2WDaHcj65GAU17vdO l8bP35sBNaO+O2ksL9XQfHuEdmkyi8UcdlkG9jQvsV89oMVcom8C7ATDUV7vpGEM +teq7zkw8r6+VzJvNrfykPOLavN/gkKJwlAfa0muPi2E7uxK85059jwSc9ucpyaF H/O8BdLIR2z2UmsAbnraQFMWS0SFvFfUH0BccrAEJ5RvLEMlXBy9haeNLTua7May 2amGScIUFi6R -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridRootCA-Root.crl_url0000664001343500074740000000014013614364114027740 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertGridRootCA.crl http://crl4.digicert.com/DigiCertGridRootCA.crl igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridRootCA-Root.signing_policy0000664001343500074740000000057313614364114031325 0ustar davidgdavidg# DigiCert Grid Root CA Signing Policy access_id_CA X509 '/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1" "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" "/DC=DigiCert-Grid/DC=com/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2"' igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridRootCA-Root.namespaces0000664001343500074740000000125713614364114030427 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)2694e4f2.namespaces # CA alias : DigiCertGridRootCA-Root # subord_of: # subjectDN: /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA # hash : 2694e4f2 # (generated automatically from 2694e4f2.signing_policy) # TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1" TO Issuer "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridRootCA-Root.info0000664001343500074740000000106213614364114027235 0ustar davidgdavidg# # Information for:/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA # alias = DigiCertGridRootCA-Root ca_url = http://www.DigiCert-Grid.com/DigiCertGridRootCA_text.txt crl_url = http://crl3.digicert.com/DigiCertGridRootCA.crl;http://crl4.digicert.com/DigiCertGridRootCA.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ version = 1.104 sha1fp.0 = 02:FB:FF:2E:77:A9:CE:9C:FA:A9:3F:F0:83:0E:3E:80:6F:D0:6F:8D subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCA-Classic.pem0000664001343500074740000000441513614364114027724 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGgjCCBWqgAwIBAgIQBxVWH+V/ML4XiYkjwzpEUDANBgkqhkiG9w0BAQUFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMTExMjA3MTIwMDAwWhcNMjYxMjA3MTIwMDAwWjBhMQswCQYDVQQG EwJVUzEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEZMBcGA1UECxMQd3d3LmRpZ2lj ZXJ0LmNvbTEfMB0GA1UEAxMWRGlnaUNlcnQgR3JpZCBUcnVzdCBDQTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAO65BA1JPUZvUOjZf2SNLymSrF3vhYGP XyfUHmsZcgUSZFuwJXhWJMiDkwk1NfQrk0Hy9CyfFAD1z7EiQgOMWWuWQdweBJxw IzK/HQS0nTEwxEqF8O5cAWH478iZbY5sbTn9m5ZmFVRwPp1nh2k0c2mQ50QR078C sAnuzpbzA9nA3uZAX8+txpfBQ9bFsTociALeIYR0FhvHh/RlvLtfHFnxpg6Q/n0r AL9HKEYD+qBaBXtval0ziqRdr0B0yJ/d+inclJVKc/uNxrEjew9nbNMFnaoZ0Nt9 5uzn3qanjLxNmFRwBtvrA6iuJBlZlTjB1RpPu58l3TJ/LniIGPiRGHECAwEAAaOC AzAwggMsMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMHkGCCsG AQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29t MEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNl cnRBc3N1cmVkSURSb290Q0EucDdjMIGBBgNVHR8EejB4MDqgOKA2hjRodHRwOi8v Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMDqg OKA2hjRodHRwOi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS b290Q0EuY3JsMIIBxQYDVR0gBIIBvDCCAbgwggG0BgpghkgBhv1sAAIEMIIBpDA6 BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdpY2VydC5jb20vc3NsLWNwcy1yZXBv c2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1AHMAZQAg AG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8AbgBz AHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAAdABo AGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAAdABo AGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0AZQBu AHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBiAGkAbABpAHQAeQAg AGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0AGUAZAAgAGgAZQBy AGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjAdBgNVHQ4EFgQUYZek mymYAZta/4fmdO8wg8xotMgwHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNt yA8wDQYJKoZIhvcNAQEFBQADggEBAJtEamzsGt7a292/ds4LkJjwyRZ77QcYBns4 yXLuacEmMURsVXABhXcPGLtiy8h3slNSyB7V+mMrpXC1iPRGTSdOlHrkanyqXfDS pjOX1Jn0OtDvLRbHybsI08XIoZCI1SRskt/COlRTfVw7HFOXcsxtN4EvYRtbK/dN Z1zA8uqKPCXGVVhLEzlvoo8OZVVfKGPwqsaWi4SBjZNKWQklB8Pdezh0hOpLwUs8 Mi2YeJSxpfDTiJ5VDAAf9IIMnPouRQcx9KSNQqPAU2/jBt+9k6QpdVqIeC7ZP8Hp 7RdacX/aLOhgTNEwj3Aqgk6RYF8n+xUQe+AOylpgO+zovEWsBWQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCA-Classic.crl_url0000664001343500074740000000014213614364114030576 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertGridTrustCA.crl http://crl4.digicert.com/DigiCertGridTrustCA.crl igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCA-Classic.signing_policy0000664001343500074740000000040713614364114032155 0ustar davidgdavidg# DigiCert Grid Trust CA Signing Policy access_id_CA X509 '/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCA-Classic.namespaces0000664001343500074740000000141213614364114031254 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)38f7145f.namespaces # CA alias : DigiCertGridTrustCA-Classic # subord_of: DigiCertAssuredIDRootCA-Root # subjectDN: /C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA # hash : 38f7145f # (generated automatically from 38f7145f.signing_policy) # TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCA-Classic.info0000664001343500074740000000114413614364114030072 0ustar davidgdavidg# # Information for /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Trust CA # alias = DigiCertGridTrustCA-Classic ca_url = http://www.digicert-grid.com/DigiCertGridTrustCA_text.txt crl_url = http://crl3.digicert.com/DigiCertGridTrustCA.crl;http://crl4.digicert.com/DigiCertGridTrustCA.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.DigiCert-Grid.com/ requires = DigiCertAssuredIDRootCA-Root version = 1.104 sha1fp.0 = DD:D7:1E:A5:23:EB:EE:4D:EB:29:41:24:D3:AE:52:D9:CA:19:73:AC subjectdn = "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCAG2-Classic.pem0000664001343500074740000000340513614364114030113 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFATCCA+mgAwIBAgIQDglHG7EZWmErtKS1sO1WCTANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMTQwMTA4MTIwMDAwWhcNMjkwMTA4MTIwMDAwWjBkMQswCQYDVQQG EwJVUzEWMBQGA1UEChMNRGlnaUNlcnQgR3JpZDEZMBcGA1UECxMQd3d3LmRpZ2lj ZXJ0LmNvbTEiMCAGA1UEAxMZRGlnaUNlcnQgR3JpZCBUcnVzdCBDQSBHMjCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMsBrEAAXJEFhz/RP7bYE8g8OdVe EOwjrxmg7pXark39WKA7kS10ZPGYaE8W5/mv05ztMgA0J9vym+ZUtfOadVy/JNiH jKZyiauxkh3TCjQhLfb+5fLQ3/XW8YylNzwcTAlQ2/eEaU0KXJmveXYh9+txcrWI m/aIeHo5r8bpgi31jLRWFKeTdmoMQ3JX8sR5Zn9wuaYjokf3tiufCpF6h1lAH27F xTkW5zkZ1RvdcKPnYQPPwquNIT/zIHb3QPNOOB0K0SDc1dPlWjWKeRgm/V7SBFvy TFcj/zxHP8m5mh8D75jsW1AAKh8tnALFZxva5rr9RiHmwmd+mDsEYAt/eVkCAwEA AaOCAawwggGoMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMHkG CCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQu Y29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGln aUNlcnRBc3N1cmVkSURSb290Q0EucDdjMIGBBgNVHR8EejB4MDqgOKA2hjRodHRw Oi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3Js MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVk SURSb290Q0EuY3JsMEMGA1UdIAQ8MDowOAYKYIZIAYb9bAACBDAqMCgGCCsGAQUF BwIBFhxodHRwczovL3d3dy5kaWdpY2VydC5jb20vQ1BTMB0GA1UdDgQWBBThZRoC A5F+15ZtOIiLnhaRaxFsnjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I DzANBgkqhkiG9w0BAQsFAAOCAQEAKHBUklU69o1g8x7KNsso5ujW+S6Fw/AXLCCr 1aqkUTQ32hyJjVB0/AOnTIi1lCDKPYXdUDj2TIL9fxsSuj2GxGFEWTz6kW+gyKae MvDJifY4TXmx22Mja4DwBjKgUggzvO5Vmf1gz3IZjv67D9SU0TLOhjbcYWKYu19/ +IDLmwV637KkjUgM1asqqtkutfT/d1+j4COTDWSD48OEOk8BiB9Rh+c17Af3yvRV f90aa9NEStSVevR2h9i9rDrleeGNiKqCInvDa3szREdsT78+l4nITWH6os/iZnI+ 4int+r0ifHJjNfL1b5NAxey8kIfNCESo/RnqktuXNptd7reo9A== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCAG2-Classic.crl_url0000664001343500074740000000014613614364114030773 0ustar davidgdavidghttp://crl3.digicert.com/DigiCertGridTrustCAG2.crl http://crl4.digicert.com/DigiCertGridTrustCAG2.crl igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCAG2-Classic.signing_policy0000664001343500074740000000041513614364114032345 0ustar davidgdavidg# DigiCert Grid Trust CA G2 Signing Policy access_id_CA X509 '/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=DigiCert-Grid/*" "/DC=com/DC=DigiCertGrid/*" "/C=US/O=DigiCert Grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCAG2-Classic.namespaces0000664001343500074740000000143013614364114031445 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)5d9ea26d.namespaces # CA alias : DigiCertGridTrustCAG2-Classic # subord_of: DigiCertAssuredIDRootCA-Root # subjectDN: /C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2 # hash : 5d9ea26d # (generated automatically from 5d9ea26d.signing_policy) # TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" \ PERMIT Subject "/DC=com/DC=DigiCert-Grid/.*" TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" \ PERMIT Subject "/DC=com/DC=DigiCertGrid/.*" TO Issuer "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" \ PERMIT Subject "/C=US/O=DigiCert Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/DigiCertGridTrustCAG2-Classic.info0000664001343500074740000000116213614364114030263 0ustar davidgdavidg# # Information for /DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Trust CA G2 # alias = DigiCertGridTrustCAG2-Classic ca_url = http://www.digicert-grid.com/DigiCertGridTrustCAG2_text.txt crl_url = http://crl3.digicert.com/DigiCertGridTrustCAG2.crl;http://crl4.digicert.com/DigiCertGridTrustCAG2.crl email = prodseccompliance@digicert.com status = accredited:classic url = http://www.DigiCert-Grid.com/ requires = DigiCertAssuredIDRootCA-Root version = 1.104 sha1fp.0 = 06:01:40:42:57:78:0C:9F:E6:B3:D9:03:72:80:3F:38:EE:3A:60:6A subjectdn = "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" igtf-policy-installation-bundle-1.104/src/accredited/GermanGrid.pem0000664001343500074740000000257713614364115024626 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID4zCCAsugAwIBAgIBADANBgkqhkiG9w0BAQUFADA2MQswCQYDVQQGEwJERTET MBEGA1UEChMKR2VybWFuR3JpZDESMBAGA1UEAxMJR3JpZEthLUNBMB4XDTAzMDYx MTEzNDU1NFoXDTIzMDYxMTEzNDU1NFowNjELMAkGA1UEBhMCREUxEzARBgNVBAoT Ckdlcm1hbkdyaWQxEjAQBgNVBAMTCUdyaWRLYS1DQTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBAOojp/+Wek2Lpib39QChHatpCp/yXH8xbiIt5V264yvt /nW4QFbBkSoZ0PUVCpQ1u+lIzJ+ZHzfn7Ws0I2+O6ApcyeyjmRL8+F/AeuKBp1xl Eqregld0PiflQnXPeHmdldnx0P/ATRuddaIuGSDJImCbQja/3E8Bk8SSrGKDcL/C nNmzTq36T2fhXB4vy+TBUXB5ff3171EBiqtL2h6O+69QkmiV9k0JC/rz++KrHxkO q4KCpsGGJ4d+692SS4nO1w9a2PXI9rgKPukrb5dYa+eRFdP4w6Wj9cuN+msrIKJd WDEwY/9+1CvcZLYAACEaH6glggxBl9JuwoSGK0kdF1cCAwEAAaOB+zCB+DAPBgNV HRMBAf8EBTADAQH/MB0GA1UdDgQWBBTGdckorNEL/Dz/ubUe0187gGISNDAfBgNV HSMEGDAWgBTGdckorNEL/Dz/ubUe0187gGISNDAOBgNVHQ8BAf8EBAMCAYYwOQYI KwYBBQUHAQEELTArMCkGCCsGAQUFBzAChh1odHRwOi8vZ3JpZGthLWNhLmtpdC5l ZHUvaW5mbzAcBgNVHRIEFTATgRFncmlka2EtY2FAa2l0LmVkdTA8BgNVHR8ENTAz MDGgL6AthitodHRwOi8vZ3JpZGthLWNhLmtpdC5lZHUvY3JsL2dyaWRrYS1jcmwu cGVtMA0GCSqGSIb3DQEBBQUAA4IBAQCySKEzi4UTHL4MbtTsyloiZjHZ/sKy2LuT 2UdqFPz09kpdN7MIPTZ/3Mh0TVZPtTvdam5Y6y+ExajkrFgh/2v6YSDsjJMzqZCu vzn4cw9a4YayG/Rr65KdWekOSEf/h6vG4gVd3Qlwq2UsmkhABlJq5DoOz6EDC1+v 6yvbmpGB+XeEaXPkRQJoFzQ28go/VHkZuJYnYjSxSkWSwydMFlq3GSLuXu2qcLgV PZGgMDPpGojGAIq3/sfnJRV7zUUhC9eysKA4D+RugwI/J65vl+mNL0qnnRYtcrx/ zf6GlU0+CStbz3cTdxAhrUurWjRJgiP6OSaeP7v8oFYmBkUBThsw -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/GermanGrid.crl_url0000664001343500074740000000005413614364115025473 0ustar davidgdavidghttp://gridka-ca.kit.edu/crl/gridka-crl.pem igtf-policy-installation-bundle-1.104/src/accredited/GermanGrid.signing_policy0000664001343500074740000000041313614364115027045 0ustar davidgdavidg# EACL GermanGrid CA operated by KIT # @(#)$Id: dd4b34ea.signing_policy,v 1.3 2011/10/17 16:14:53 pmacvsdg Exp $ # access_id_CA X509 '/C=DE/O=GermanGrid/CN=GridKa-CA' pos_rights globus CA:sign cond_subjects globus '"/C=DE/O=GermanGrid/*" "/O=GermanGrid/OU=*"' igtf-policy-installation-bundle-1.104/src/accredited/GermanGrid.namespaces0000664001343500074740000000076213614364115026156 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)dd4b34ea.namespaces # CA alias : GermanGrid # subord_of: # subjectDN: /C=DE/O=GermanGrid/CN=GridKa-CA # hash : dd4b34ea # (generated automatically from ./GermanGrid/dd4b34ea.signing_policy) # TO Issuer "/C=DE/O=GermanGrid/CN=GridKa-CA" \ PERMIT Subject "/C=DE/O=GermanGrid/.*" TO Issuer "/C=DE/O=GermanGrid/CN=GridKa-CA" \ PERMIT Subject "/O=GermanGrid/OU=.*" igtf-policy-installation-bundle-1.104/src/accredited/GermanGrid.info0000664001343500074740000000070113614364115024763 0ustar davidgdavidg# # @(#)$Id: dd4b34ea.info,v 1.6 2015/06/18 09:44:54 pmacvsdg Exp $ # Information for CA GermanGrid # obtained from dd4b34ea in GermanGrid/ alias = GermanGrid url = http://grid.fzk.de/cgi-bin/welcome_ca.pl crl_url = http://gridka-ca.kit.edu/crl/gridka-crl.pem email = GridKa-CA@kit.edu status = accredited:classic version = 1.104 sha1fp.0 = 82:A7:F9:7C:39:CD:21:18:9E:0E:39:27:51:D6:05:AC:A7:F6:BD:BD subjectdn = "/C=DE/O=GermanGrid/CN=GridKa-CA" igtf-policy-installation-bundle-1.104/src/accredited/GridCanada.pem0000664001343500074740000000276113614364115024557 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIENzCCAx+gAwIBAgIBADANBgkqhkiG9w0BAQUFADBIMQswCQYDVQQGEwJDQTEN MAsGA1UEChMER3JpZDEqMCgGA1UEAxMhR3JpZCBDYW5hZGEgQ2VydGlmaWNhdGUg QXV0aG9yaXR5MB4XDTA2MDExMjIxMjkwN1oXDTI2MDExMjIxMjkwN1owSDELMAkG A1UEBhMCQ0ExDTALBgNVBAoTBEdyaWQxKjAoBgNVBAMTIUdyaWQgQ2FuYWRhIENl cnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBALrYbibzXxtyojoolKeivzeah39J11AKfyHs+bflv9LUGpIhfbmQ9fC1Hawt qNT2y15XI96kK7jVW7si6BpUPAsrKsxvz7yrWHf5C6qCYCuRQhDzSabcLqBO17x/ 11lTT1BbEJoKQ3BSuzh02ewqA4CiOPZYcL382xFNCA5Tf4FNaCT+xXuD/Mwso2kW zH8rAPDgslwKdU7DbmHhiq2A/w+sunF69Rl4+Z9oo7khdYlN6rnZcm8qG8SRrpt9 ggHMpY9LVMp/M8az6sfTv7qlWlXMtHI0vUVBTZryT/Nxi+6KJdrw3om1V/0rt8cf 2gmw/aibrE+qq7lFKSvozASW/UsCAwEAAaOCASowggEmMA8GA1UdEwEB/wQFMAMB Af8wHQYDVR0OBBYEFOisEvEg7sjXj0xqAdGmAr/OrpkYMHAGA1UdIwRpMGeAFOis EvEg7sjXj0xqAdGmAr/OrpkYoUykSjBIMQswCQYDVQQGEwJDQTENMAsGA1UEChME R3JpZDEqMCgGA1UEAxMhR3JpZCBDYW5hZGEgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 ggEAMA4GA1UdDwEB/wQEAwIBBjAbBgNVHREEFDASgRBjYUBncmlkY2FuYWRhLmNh MBsGA1UdEgQUMBKBEGNhQGdyaWRjYW5hZGEuY2EwOAYDVR0fBDEwLzAtoCugKYYn aHR0cDovL3d3dy5ncmlkY2FuYWRhLmNhL2NhL2JmZmJkN2QwLnIwMA0GCSqGSIb3 DQEBBQUAA4IBAQBTyQESsQEQol2CoDnNiHJhV4isqNy7DNuesBM59kfIgkMqQKd7 3InoKh49AaUWrywpy+HtJrpkv6qmwEJFhtnZJJMMwZnpBNY0dlOw/K8lLUK6EB8q zUZJvnH2ue2OvsvLtq0o2wDuqAS6oZJ6Yj9HZhu2Uim7BqBIkKnUx7HPjAyPKkmJ Vq8NxfntXnnI2wlbwB0dhloyl81Uz5qrpaOavdGKVo9cpnRtBnF/JmgfYpplMRyw 0uoGA5pgLLLIcySct07n5+tVXtSBE/0OHIwESCop7M39X+p3yXTkNkUs48RL0KYO 0RaGP2D6KZxR53qNmfogPLHJDaJTzDZvkAdA -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/GridCanada.crl_url0000664001343500074740000000005013614364115025425 0ustar davidgdavidghttp://www.gridcanada.ca/ca/bffbd7d0.r0 igtf-policy-installation-bundle-1.104/src/accredited/GridCanada.signing_policy0000664001343500074740000000037013614364115027005 0ustar davidgdavidg# $Id: bffbd7d0.signing_policy,v 1.1 2006/02/13 15:46:12 pmacvsdg Exp $ access_id_CA X509 '/C=CA/O=Grid/CN=Grid Canada Certificate Authority' pos_rights globus CA:sign cond_subjects globus '"/C=CA/O=Grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/GridCanada.namespaces0000664001343500074740000000070713614364115026113 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)bffbd7d0.signing_policy.namespaces # CA alias : Canada # subord_of: # subjectDN: /C=CA/O=Grid/CN=Grid Canada Certificate Authority # hash : bffbd7d0.signing_policy # (generated automatically from bffbd7d0.signing_policy) # TO Issuer "/C=CA/O=Grid/CN=Grid Canada Certificate Authority" \ PERMIT Subject "/C=CA/O=Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/GridCanada.info0000664001343500074740000000073113614364115024724 0ustar davidgdavidg# # @(#)$Id: bffbd7d0.info,v 1.3 2015/06/18 09:44:54 pmacvsdg Exp $ # Information for CA GridCanada new CA "bffbd7d0" alias = GridCanada ca_url = http://www.gridcanada.ca/ca/bffbd7d0.0 crl_url = http://www.gridcanada.ca/ca/bffbd7d0.r0 url = http://www.gridcanada.ca/ca email = ca@gridcanada.ca status = accredited:classic version = 1.104 sha1fp.0 = 6A:CD:12:D6:98:82:3D:F4:B1:DC:89:AA:49:94:C8:8D:1A:AD:8A:C6 subjectdn = "/C=CA/O=Grid/CN=Grid Canada Certificate Authority" igtf-policy-installation-bundle-1.104/src/accredited/HKU-CA-2.crl_url0000664001343500074740000000004513614364115024523 0ustar davidgdavidghttp://ca.grid.hku.hk/crl/cacrl2.der igtf-policy-installation-bundle-1.104/src/accredited/HKU-CA-2.signing_policy0000664001343500074740000000025713614364115026103 0ustar davidgdavidg# # access_id_CA X509 '/DC=HK/DC=HKU/DC=GRID/CN=HKU Grid CA 2' pos_rights globus CA:sign cond_subjects globus '"/DC=HK/DC=HKU/DC=GRID/*"' igtf-policy-installation-bundle-1.104/src/accredited/HKU-CA-2.namespaces0000664001343500074740000000070213614364115025200 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HKUGridCA2.signing_policy.namespaces # CA alias : HKU-CA-2 # subord_of: # subjectDN: /DC=HK/DC=HKU/DC=GRID/CN=HKU Grid CA 2 # hash : HKUGridCA2.signing_policy # (generated automatically from HKUGridCA2.signing_policy) # TO Issuer "/DC=HK/DC=HKU/DC=GRID/CN=HKU Grid CA 2" \ PERMIT Subject "/DC=HK/DC=HKU/DC=GRID/.*" igtf-policy-installation-bundle-1.104/src/accredited/HKU-CA-2.info0000664001343500074740000000043313614364115024015 0ustar davidgdavidgalias = HKU-CA-2 crl_url = http://ca.grid.hku.hk/crl/cacrl2.der email = gridca@hku.hk status = accredited:classic url = http://ca.grid.hku.hk/ version = 1.104 sha1fp.0 = B2:6C:D3:AA:28:E5:1A:0E:9A:1D:8F:C4:80:5C:4E:0B:6F:6A:19:C7 subjectdn = "/DC=HK/DC=HKU/DC=GRID/CN=HKU Grid CA 2" igtf-policy-installation-bundle-1.104/src/accredited/HPCI.pem0000664001343500074740000000230013614364116023313 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDVjCCAj6gAwIBAgIBATANBgkqhkiG9w0BAQsFADA8MQswCQYDVQQGEwJKUDEM MAoGA1UEChMDTklJMQ0wCwYDVQQLEwRIUENJMRAwDgYDVQQDEwdIUENJIENBMB4X DTEyMDgwOTA2MTIyNFoXDTIyMDgwODAwMDAwMFowPDELMAkGA1UEBhMCSlAxDDAK BgNVBAoTA05JSTENMAsGA1UECxMESFBDSTEQMA4GA1UEAxMHSFBDSSBDQTCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN264tGoH5JdgQ1qF3/8nA6CB86b Rhfa67qlm4RWvAl2BmZ6ws0nuI6cmVcUKfs4HftAJYYN6Ch1p6lGdUwue/5iBliA 4TS8zi/5WZq5ciH/ffG8NF1+TdEMZ1q9LRkrYSWQHPrzo1QY/5IX7QvOakeHyMTA s+Irr1mRz2OwHj6Nu9fCAg1D3d1a36fEuKs3krM5yYSz9cBbinNNMe+HoV7YcjJ9 1lJhBVD7gCHOOjS0DXb2ed/kjjW+I9w7h9XS6Xl14yXik0GRMSeaBKbEK8E9npgg GvZZtItLOTFcJQVz3vkS8ZEOuxPgGgiio32a5gnSKCnDOSVp1FluZwRo7fUCAwEA AaNjMGEwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgw FoAUoD6uD5bj/URTMLH+Tg+eZRLcTZUwHQYDVR0OBBYEFKA+rg+W4/1EUzCx/k4P nmUS3E2VMA0GCSqGSIb3DQEBCwUAA4IBAQBEemrsoVpUS9L5tMEpEUOogXajiPYW ky6eE1V++xATZgbHyTrxAho5M/vOkK1sgFlRuRhksTQHae1LBActyx3I8MxYpnLA /2f7IneUteNMXWvTYGHdl3ME7hiKYGXj1m7KGn//ESXIKHlngCGJshfHbfwaCgkI Nuwm/DVBDqocynTmXeEUcookgF88d/Cgb2+VH0teUdJtW9Gl59ALcAQBIDWyLYPk DotsEyE8nlrQMjDuVNe2Tp3rdxMw01+KSQGfOa/KE7eCaSCeFPAoIs/gkb+bd7lJ THZ2G/sZB+qwDIVV1B4G2w5gnFpFkWrq5VePrSHduneTghWH8Ru2bI51 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/HPCI.crl_url0000664001343500074740000000005013614364116024174 0ustar davidgdavidghttp://www.hpci.nii.ac.jp/ca/hpcica.crl igtf-policy-installation-bundle-1.104/src/accredited/HPCI.signing_policy0000664001343500074740000000237613614364116025564 0ustar davidgdavidg# ca-signing-policy.conf, see ca-signing-policy.doc for more information # # This is the configuration file describing the policy for what CAs are # allowed to sign whoses certificates. # # This file is parsed from start to finish with a given CA and subject # name. # subject names may include the following wildcard characters: # * Matches any number of characters. # ? Matches any single character. # # CA names must be specified (no wildcards). Names containing whitespaces # must be included in single quotes, e.g. 'Certification Authority'. # Names must not contain new line symbols. # The value of condition attribute is represented as a set of regular # expressions. Each regular expression must be included in double quotes. # # This policy file dictates the following policy: # -The Globus CA can sign Globus certificates # # Format: #------------------------------------------------------------------------ # token type | def.authority | value #--------------|---------------|----------------------------------------- # EACL entry #1| access_id_CA X509 '/C=JP/O=NII/OU=HPCI/CN=HPCI CA' pos_rights globus CA:sign cond_subjects globus '"/C=JP/O=NII/OU=HPCI/*"' # end of EACL igtf-policy-installation-bundle-1.104/src/accredited/HPCI.namespaces0000664001343500074740000000060413614364116024656 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)61cd35bd.namespaces # CA alias : # subord_of: # subjectDN: /C=JP/O=NII/OU=HPCI/CN=HPCI CA # hash : 61cd35bd # (generated automatically from 61cd35bd.signing_policy) # TO Issuer "/C=JP/O=NII/OU=HPCI/CN=HPCI CA" \ PERMIT Subject "/C=JP/O=NII/OU=HPCI/.*" igtf-policy-installation-bundle-1.104/src/accredited/HPCI.info0000664001343500074740000000072213614364116023473 0ustar davidgdavidg# # @(#)$Id: 61cd35bd.info,v 1.3 2015/06/18 09:44:53 pmacvsdg Exp $ # alias = HPCI crl_url = http://www.hpci.nii.ac.jp/ca/hpcica.crl ca_url = https://www.hpci.nii.ac.jp/ca/hpcica.pem email = hpci-ca-support@nii.ac.jp status = accredited:mics url = https://www.hpci.nii.ac.jp/ca/ policy_url = https://www.hpci.nii.ac.jp/ca/CP_CPS.html version = 1.104 sha1fp.0 = 6D:75:9E:4D:E2:65:8D:BA:98:BD:3E:89:53:3E:0A:2F:D4:DB:38:34 subjectdn = "/C=JP/O=NII/OU=HPCI/CN=HPCI CA" igtf-policy-installation-bundle-1.104/src/accredited/HellasGrid-CA-2016.pem0000664001343500074740000000417313614364116025467 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGFTCCA/2gAwIBAgIBADANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJHUjET MBEGA1UEChMKSGVsbGFzR3JpZDEiMCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRo b3JpdGllczEbMBkGA1UEAxMSSGVsbGFzR3JpZCBDQSAyMDE2MB4XDTE2MDUxMDE1 MTYwMFoXDTI2MDUxMDE1MTYwMFowYzELMAkGA1UEBhMCR1IxEzARBgNVBAoTCkhl bGxhc0dyaWQxIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxGzAZ BgNVBAMTEkhlbGxhc0dyaWQgQ0EgMjAxNjCCAiIwDQYJKoZIhvcNAQEBBQADggIP ADCCAgoCggIBALXC7i6w7EoGJovpVNaMWcr9C9Ov2KqsOXwMF9x/zDs5nSNBttaF f7SsYJM72QlF472HD5NkOFLyHXAZGUFOkPUiWEoXlk901lG6Z4i6yFNhjrTD4QSQ ur3KOkfmMBXveibhQie4IbkOdvpruGfzAMkd/t6Jf7Egxa1pgSX6JDe2EmHfLn8+ sLsRWcepj2c7xqa7mQjrg43FZgYCW0eQCTI+kIhEiwUnRSYGs7sPa5L+eRRapC/y tzDoVTBLTaUKWtt2PO6vLDQs+BnGeCmljoqD5KLnl5H3TZeVY+vD6XX8rAWSst2w UFySvrhw0lz9bnsqz+Nz0Dn1MRJkomipSHT0xr5E0jOjtFrJiTymw0xgYDuotazR 2t3jrmAEHErj2F6yicEn/QNNkzJR2BVF00uZFDhdBx7UBjg7VQlW9p0vxnP5ldBy GZ+nJxhVUfKEyUgD/ShxWa0A5dQ73vev2bsI/Csthup71uUIrYJt/c7HE9HimCOT 6CFqWOXA8IRqShM5UTTpixUY1gwVLZOQ4BUJTZCvSUF+c5eBUOUWaGSBw+jgRYUh YRh09uRKx4UGcsBdnSRfBQwG2elV6peK/ulU6DWq/AHcf8fmTz3wHs2ofmRgS2wc SBNLifYFKmcM4oe0jw2vFvNWZWkd9xFXr6ugPRmQhO0uRWh9Zi8egIv3AgMBAAGj gdMwgdAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE FOChL+wv2o1/AVo3V6QBU2ldA7SNMIGNBgNVHSMEgYUwgYKAFOChL+wv2o1/AVo3 V6QBU2ldA7SNoWekZTBjMQswCQYDVQQGEwJHUjETMBEGA1UEChMKSGVsbGFzR3Jp ZDEiMCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEbMBkGA1UEAxMS SGVsbGFzR3JpZCBDQSAyMDE2ggEAMA0GCSqGSIb3DQEBCwUAA4ICAQASZtggEmYU pVqD15t67ZkLZrmV1u7aDjajXwDJI1dCbQpksMb2cOI80aQlbzYlp18DbWA3UxdR fyMkDBBuTb0nmmbhk004+rNeoR96CXtgSCdxio6s99l6zEWN0xyrJuqQojRMglgV YieCdBginCSx+RHREsQc+RGWkVHTeMauhDGApi5UJT+FWuBPAx8j3zwJilaXbMOH fFsvLTnj/wmxpbm7swTK4Z65uJQcPkVbMGgfape04UU47l21oxrdBsMYIExTSFi0 X5uGiOawi/oLBa03p9wdi1nBzf1560jUX2MkNrcWq+oveXQnhIZ0mAHwMOAbx6g7 YLWNVyHoHuQo8bg+NRHfkEOyoq1ZBy4aKKjnjM1MR5jEh9XZWBF963opVfK2oule 8VLxl3YSr45KTZFyKBrjHFxtwk8rqfeTwd0cVWjLidQmAtUe4G1KKYnopyHVtP98 vBvQAH0V6/CPr33/l9aWwdvDAxcGsW4JwL/ob762lwWxVZqYYtCX7w6fHAq5ql+d khZlMyh5LXKC+72oFDBFYopJa3zCLdROec3iQyhAZqeXxJHZqlxwh7lyHbUqeJSG 9f81h8k1GgT+5K5TKQM5tud2z3ONXv9IzpCWvVg4mQDV3hAZXDoBW0G8WjOPBDr3 +3w/5A+t4mgDTaSanbflbSudgUTgveME0g== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/HellasGrid-CA-2016.crl_url0000664001343500074740000000007013614364116026340 0ustar davidgdavidghttp://crl.hellasgrid.gr/hellasgrid-ca-2016/f4cf8fb6.r0 igtf-policy-installation-bundle-1.104/src/accredited/HellasGrid-CA-2016.signing_policy0000664001343500074740000000043013614364116027713 0ustar davidgdavidg# EACL HellasGrid CA 2016 # @(#)$Id: HellasGridCA2016.signing_policy,v 1.1 2016/05/10 22:43:43 pmacvsdg Exp $ # access_id_CA X509 '/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016' pos_rights globus CA:sign cond_subjects globus '"/C=GR/O=HellasGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/HellasGrid-CA-2016.namespaces0000664001343500074740000000103113614364116027013 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)HellasGridCA2016.signing_policy.namespaces # CA alias : HellasGrid-CA-2016 # subord_of: # subjectDN: /C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016 # hash : HellasGridCA2016.signing_policy # (generated automatically from HellasGridCA2016.signing_policy) # TO Issuer "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016" \ PERMIT Subject "/C=GR/O=HellasGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/HellasGrid-CA-2016.info0000664001343500074740000000117213614364116025635 0ustar davidgdavidg# # @(#)$Id: HellasGridCA2016.info,v 1.2 2018/09/17 06:32:10 pmacvsdg Exp $ # Information for CA HellasGrid CA 2016 # /C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016 # alias = HellasGrid-CA-2016 url = http://www.grid.auth.gr/ crl_url = http://crl.hellasgrid.gr/hellasgrid-ca-2016/f4cf8fb6.r0 policy_url = https://www.grid.auth.gr/pki/hellasgrid-ca/documents/cps/HellasGrid-CA-CP-CPS.pdf email = ca@hellasgrid.gr status = accredited:classic version = 1.104 sha1fp.0 = 01:D3:A5:3C:4C:DF:9C:D9:10:3B:1B:8B:D4:CB:D1:7D:42:73:2C:5F subjectdn = "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016" igtf-policy-installation-bundle-1.104/src/accredited/IGCA2.pem0000664001343500074740000000404213614364116023362 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF1DCCA7ygAwIBAgIBATANBgkqhkiG9w0BAQsFADBhMRIwEAYKCZImiZPyLGQB GRYCSU4xGzAZBgoJkiaJk/IsZAEZFgtHQVJVREFJTkRJQTEuMCwGA1UEAwwlSW5k aWFuIEdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMjAeFw0xODAzMTMxMTUx MDdaFw0zODAzMDgxMTUxMDdaMGExEjAQBgoJkiaJk/IsZAEZFgJJTjEbMBkGCgmS JomT8ixkARkWC0dBUlVEQUlORElBMS4wLAYDVQQDDCVJbmRpYW4gR3JpZCBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eSAyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAqLrdiKNjnI8pBy1zr2QsgAq1Uw6cXB3V3C4PUA3NNKrOpm2Qr0V6tGKS Bw4KT25kWlvvXbV3PqYa7gxW+sERfWMACf4yTILRkrsX7cKut29qrBv98QAbgTYS eIhS/iUJQ4ABXdwJas93YJyMBUQzxANwbY+A1NyEz6+Md1Nj/ANppLgaIkgr7jxc fpB3pr6dMPMNXydW5dlboQULhWFGAogHvJfJi/Hdjx/WboywBbW8fqenVvuPdc1c I9MZ/q/fEpceoBhvKcu9C4L5jxLFsrW0EGrQA/znjerGdHeotyDo2OWoKpDiLf+8 ZOyWUQYEXDnTjO+qzN8T5SJE/bl0UpD6qJI5IiwvtnumR8yFHDADHHr9u+ZEsueH JjXyY0DVBgyUWCKjgTn/5u9Id6M9rfc1p3G9il+bEl/2VtxRUsY/e63m23deLx3H Sj8MLX3UJjQ1/XEKuxLPEY7VwnOt/qcGo3jRl0XKMvV6DQ6l59qEoVUT/3ZyrwE9 Hvy/Qe8KHSG37Pj6yw1mDv4cLB9eVAdHEE0Y63Q+G9x/yhG1uMB4K4doYwHVmXZv jHouOb0xSSrveCXQ6TE/msR3nKibxwcVcskWzyb0I9PHCXwi+jT29l2RLek2oo4m 5e7Jyl9z/wGigPBi4G9ixq+ZAe+ptI8A2hxFm3O1AbAO6sogvRcCAwEAAaOBljCB kzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU8ihf OMMaTaYHvZPJs9Zq45rRJlkwHwYDVR0jBBgwFoAU8ihfOMMaTaYHvZPJs9Zq45rR JlkwFwYDVR0RBBAwDoEMaWdjYUBjZGFjLmluMBcGA1UdEgQQMA6BDGlnY2FAY2Rh Yy5pbjANBgkqhkiG9w0BAQsFAAOCAgEAkO+s/RjO5DavCcBgsFapidCaV5OPN9ej NXwgX5DJCmpPw3j1wvuqNazpXCMq5BsyxxrrKcx+Lhrq6xgzR3CHJPTB7U3H729G A5oSKloRacKpvWkCv4nKT2kbHenQpHWDgJ4gjNjWeTNHbLIWeEiGi+pT+gZez6nC GeW6va7XCqwaOrbrVXqsKgNZnlp3V8q3pJ4JF9LHVLVW5wLTXvyTTtV2CXNfzM+E gd0iZc54MmXgjpZhkZM29lTrZq5T0moS+29DjQEPf6fYO2DjkzicgsHYKuevFcKy 7eg7pVrlsreKA15DxeYGIkSxiJBnctiMFLHalYDcJ3fkZJum3FGhhGh/iFDGCxzp 2bKskgxa4gjXOSUPPGzvuXWdYm9IP5Hw7jeHuUipKHr6JdrLll9We8+BHtfKaOEb GnAIJVm6sKtv/L2kbngd85DwXedjt6uB989rma+iszRp64lt4q1IXR5BXB1937FE HE3K1BI06La724nFH/TFqTWmWt7oGl4TF/2Las44kO1J1m0OMqpw8C4czO0is2oR JciEZvk7i6NxE/XZVyu+AANpz5K78QxLwBHkUFemaPx2c6pFsJh3RDFKGnCBlDnc wcoJXJaMPYTtHMcdn1sSS9qtw7iB9FcAkc3KG3WaEkPSeG/cE5gw6QJJBKa2ONe1 bbP2aZwo3t4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/IGCA2.crl_url0000664001343500074740000000005713614364116024245 0ustar davidgdavidghttp://ca.garudaindia.in/pki/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/IGCA2.signing_policy0000664001343500074740000000027413614364116025621 0ustar davidgdavidgaccess_id_CA X509 '/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2' pos_rights globus CA:sign cond_subjects globus '"/DC=IN/DC=GARUDAINDIA/*"' igtf-policy-installation-bundle-1.104/src/accredited/IGCA2.namespaces0000664001343500074740000000055113614364116024721 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)GARUDAINDIA2.namespaces # CA alias : IGCA2 # subjectDN: /DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2 # TO Issuer "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2" \ PERMIT Subject "/DC=IN/DC=GARUDAINDIA/.*" igtf-policy-installation-bundle-1.104/src/accredited/IGCA2.info0000664001343500074740000000072413614364116023537 0ustar davidgdavidg# # @(#)$Id: GARUDAINDIA2.info,v 1.1 2018/03/14 06:59:52 pmacvsdg Exp $ # Information DC=IN, DC=GARUDAINDIA, CN=Indian Grid Certification Authority 2 # alias = IGCA2 crl_url = http://ca.garudaindia.in/pki/pub/crl/cacrl.crl email = igca@cdac.in status = accredited:classic url = http://ca.garudaindia.in/ version = 1.104 sha1fp.0 = 54:32:0D:7D:57:6B:7F:B3:05:DF:FF:B5:50:E5:82:F8:46:39:7A:21 subjectdn = "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2" igtf-policy-installation-bundle-1.104/src/accredited/IHEP-2013.pem0000664001343500074740000000243613614364117023713 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDmjCCAoKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBeMQswCQYDVQQGEwJDTjEM MAoGA1UEChMDSEVQMUEwPwYDVQQDEzhJbnN0aXR1dGUgb2YgSGlnaCBFbmVyZ3kg UGh5c2ljcyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMzAyMTkxMzE4MDNa Fw0zMzAyMTkxMzE4MDNaMF4xCzAJBgNVBAYTAkNOMQwwCgYDVQQKEwNIRVAxQTA/ BgNVBAMTOEluc3RpdHV0ZSBvZiBIaWdoIEVuZXJneSBQaHlzaWNzIENlcnRpZmlj YXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA uQQrH54pNm8yx2ddSK1o7hewb/xT1er1hHifOqRWdpbzFUCgk/uNaj//CaWvOpcN 8xRKRMUy3t8iFh4v115tQRlRO8f6R0Gve7+OBXtGLYwZubjAco7jA8Ib28G748cW 9VBrurRx0izPwu5Eo9B2r/Ypzb0NNpc5BcW3aYZ7b8UrB60OSQtrtODhPxTiBcxm AwmjX735ZQXYJs+OioWMFY4lhFJCjNWcpqZkmGK9NAyuKYdApponA0p+5Tn06IOL +KyyEeeClM9BFnoDFL4w5D86GiXdI1Hm60UtPTXT3pwO/F9B6Y3O5+mdXNeZ13JT fCMK2BAFeXLfWE+W7F+SqwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud DgQWBBQlu0zRAtRh6bO+ol+nc0zbax6A8jAfBgNVHSMEGDAWgBQlu0zRAtRh6bO+ ol+nc0zbax6A8jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBADfU 4WttXHkSewfBxjY3LFuNF0BCYSFKnG0uG6gbE7eIfKTHM8kkXpo5xKxJTUNw+aTw 5hpyce5mZGpe6Q/Ch4e10sWPR293gJxI/dovNapwdmRGsn1JqUfJkmVc+M0qvl5a EFdFA10cSm7V6AMydH93jElAaFlRias9/qt41oftKqJHWrFFE+yt0mZoA3ylWTpY NAr9x1RlsRY72JVyVeC/Mth1iSIVFQ9i9N+QcxS/Sxayuyhgchmb319kipZ/p6MH ffE8ycI3GzQxJdmOpB974sIc2eyzBZEqNrC3+uxiRMRDTrpu5k5tSnYH4xwlRHDj Up7pPGrNH0h+ePj401s= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/IHEP-2013.crl_url0000664001343500074740000000004313614364117024564 0ustar davidgdavidghttp://cagrid.ihep.ac.cn/cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/IHEP-2013.signing_policy0000664001343500074740000000035413614364117026144 0ustar davidgdavidg# Signing policy file for IHEP CA 2013 access_id_CA X509 '/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=CN/O=HEP/*"' igtf-policy-installation-bundle-1.104/src/accredited/IHEP-2013.namespaces0000664001343500074740000000062613614364117025250 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)39d30eba.namespaces # CA alias : IHEP # subord_of: # subjectDN: /C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority # hash : 39d30eba # TO Issuer "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority" \ PERMIT Subject "/C=CN/O=HEP/.*" igtf-policy-installation-bundle-1.104/src/accredited/IHEP-2013.info0000664001343500074740000000100613614364117024055 0ustar davidgdavidg# # @(#)$Id: 39d30eba.info,v 1.4 2015/06/18 09:44:52 pmacvsdg Exp $ # Information for new CA IHEP 2013 # obtained from 39d30eba in APGrid/ alias = IHEP-2013 ca_url = http://cagrid.ihep.ac.cn/cacert.pem crl_url = http://cagrid.ihep.ac.cn/cacrl.crl email = ihepca@maillist.ihep.ac.cn status = accredited:classic url = https://cagrid.ihep.ac.cn/ version = 1.104 sha1fp.0 = B3:24:D7:42:95:36:B2:CC:1E:F9:75:5C:C4:D2:47:7F:CE:E0:B8:19 subjectdn = "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/INFN-CA-2015.pem0000664001343500074740000000401113614364117024172 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFwjCCA6qgAwIBAgIJALMmAsZ9SSYnMA0GCSqGSIb3DQEBCwUAMEMxCzAJBgNV BAYTAklUMQ0wCwYDVQQKEwRJTkZOMSUwIwYDVQQDExxJTkZOIENlcnRpZmljYXRp b24gQXV0aG9yaXR5MB4XDTE1MTAwNjEwMjIwNVoXDTMwMTAwNjEwMjIwNVowQzEL MAkGA1UEBhMCSVQxDTALBgNVBAoTBElORk4xJTAjBgNVBAMTHElORk4gQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQDiXdR7kfK7dqc5tQCDZ3YKD89FizGFho2pBxzddUmjVEbEBeOmG//zK4FmBku8 3STid3YmYOcMMf8C0nAVGktdjw2hqYVjP+pw7mnmWFog/mNMkw/Q7/avLeoiY8I+ pJtWKPCbhTZInK59k/KcLs7brauV4+fBBp2vscOpM8j4Y6TH7MAJLsrYddzgxCoE IvjZ5cRXcPHDN7n2WhojN70XtlQfhYNjUlSGIoqdVXOEKVBEG74Olg888AGeoFPx Sc5FaLlM0GeKLgRYYtDUu8tGMdhMdCTgRT515P36v41P7K4wZGMexRb4l7BMHVNf ljlVqjr8L2f2g4Dy21HZDDlFfcoq6VzltcDpF3s8o5/r3eQiGVWTSS1JXJpXLJTc dvj4q6hPQEsdkyH2aqcvS06N2XWWG27np0JzVsipAP9WRYyLAJO+ETtwOOvqtakF 7JrP0Nb6jySRPy/QmfY+jKmwf6hJ3WHq/8/6Gr1VRTq0si+ZC46nY89pYf++QLKk cge7uKvddxepoLV93Hx/GMGc96jAtD/R4XcRfRjO/1+9rwBOXZNLeNVoD5eCj+Ad NDF1ML/Ya8Gv3AOVJNcyAcM145VbFphZwkSTh3M9DRBKTqyQIBVVAF75cpkU13qa dQBQQOhiFAZCSSxLG6Iq0lW5KsfQqHd13XaSorPIV/p80wIDAQABo4G4MIG1MA8G A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRDjE3+7JbK 6e8KpH3BnQLln72WgDBzBgNVHSMEbDBqgBRDjE3+7JbK6e8KpH3BnQLln72WgKFH pEUwQzELMAkGA1UEBhMCSVQxDTALBgNVBAoTBElORk4xJTAjBgNVBAMTHElORk4g Q2VydGlmaWNhdGlvbiBBdXRob3JpdHmCCQCzJgLGfUkmJzANBgkqhkiG9w0BAQsF AAOCAgEAz0nec0stGy30+hNRN52Ni5YYCMFFoX4aD7LdrWt+MT86i4UFzvPRwvOp bPcPC63sjQbP+jePgFXsmEaPkDKuf0x344lNyAgIU+JFWinc4gv4nN5oHfuSXG6J UTfYLHaVuPahKeHUUpBOytyOMDRKG+FlGOxQvhnohhjUwBffbu1FIu993+d0w2GC 9Z4zT+GUKSlviOUYbzctDuG0D8FVWJK7L5SsjFSPSfCJlbWKGmdpDNV2vNzkaHsA dQ13WqxE8b0JTHdpS3vsrvfSehY4IG4Fj2HqsDE/dflH3gcJb5l4ls8kcA53YRG2 NDTjvjdq3tv5AlYJzHKcxq1vhUmVx1vkg1aYNgcV8m8wkPhsnQuTdiQm8EA3ItOO RNYawfuVeS021RXwRL290HFIlfwm6imRmlKepGvJBWbrVdrrLCq4s5UPjcxnQnZE tapQPUtfV1m9V/T69h5jrfVy1nMM4WWA6MVPljlol1k72jArm+oXvoEvDiNfj2qj gfvV03R4GXxP+0EWFXac4tiFFu6YC4Hu7ou38tnnW/nx+xurvnsxIW7ZDaLGKCd+ VJmb+qhU3NJvDPGjDuksXp0idfhbK6R2dFz7UFS1DYdRit7jeZpou5D4LaIL0CQ/ KjUrC7M6W+Zhicc0ihbwb03ppLv9/vbj06MY4+HMivKiK1oxd+Q= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/INFN-CA-2015.crl_url0000664001343500074740000000005713614364117025061 0ustar davidgdavidghttp://security.fi.infn.it/CA/INFN-CA-2015.crl igtf-policy-installation-bundle-1.104/src/accredited/INFN-CA-2015.signing_policy0000664001343500074740000000036713614364117026440 0ustar davidgdavidg# @(#)$Id: bc77a803.signing_policy,v 1.1 2015/10/08 19:39:10 pmacvsdg Exp $ access_id_CA X509 '/C=IT/O=INFN/CN=INFN Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=it/O=INFN/*" "/C=IT/O=INFN/*"' igtf-policy-installation-bundle-1.104/src/accredited/INFN-CA-2015.namespaces0000664001343500074740000000100413614364117025527 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)bc77a803.namespaces # CA alias : INFN-CA-2015 # subord_of: # subjectDN: /C=IT/O=INFN/CN=INFN Certification Authority # hash : bc77a803 # (generated automatically from bc77a803.signing_policy) # TO Issuer "/C=IT/O=INFN/CN=INFN Certification Authority" \ PERMIT Subject "/C=it/O=INFN/.*" TO Issuer "/C=IT/O=INFN/CN=INFN Certification Authority" \ PERMIT Subject "/C=IT/O=INFN/.*" igtf-policy-installation-bundle-1.104/src/accredited/INFN-CA-2015.info0000664001343500074740000000073613614364117024356 0ustar davidgdavidg# @(#)$Id: bc77a803.info,v 1.1 2015/10/08 19:39:10 pmacvsdg Exp $ # Information for CA: INFN-CA-2015 # subject = "/C=IT/O=INFN/CN=INFN Certification Authority" alias = INFN-CA-2015 url = http://security.fi.infn.it/CA/ email = infn-ca@fi.infn.it crl_url = http://security.fi.infn.it/CA/INFN-CA-2015.crl status = accredited:classic version = 1.104 sha1fp.0 = D1:9E:79:DE:77:73:EF:A2:6A:0B:45:23:67:26:5D:57:AE:82:3C:FE subjectdn = "/C=IT/O=INFN/CN=INFN Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/IRAN-GRID-GCG-G2.pem0000664001343500074740000000721313614364117024721 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIKkDCCBnigAwIBAgIBBjANBgkqhkiG9w0BAQsFADBDMQswCQYDVQQGEwJJUjEM MAoGA1UECgwDSVBNMQwwCgYDVQQLDANHQ0cxGDAWBgNVBAMMD0lSQU4tR1JJRC1H MiBDQTAeFw0xNjEwMTcxNDMwMzJaFw0zNjEwMTIxNDMwMzJaMEMxCzAJBgNVBAYT AklSMQwwCgYDVQQKDANJUE0xDDAKBgNVBAsMA0dDRzEYMBYGA1UEAwwPSVJBTi1H UklELUcyIENBMIIEIjANBgkqhkiG9w0BAQEFAAOCBA8AMIIECgKCBAEApY8y1rJJ Wdk65m2W73XSi9FnaiP0dmJxy8r043DRjVM9wZ7YTpSql1k7C3kKL6ez18MZdqAW /BuLzbWekCxvBaccJbVP1yU67H2DQtcUy//LUIPbV0b9TTT22z8KfWiYI4pd1W7d H+1KQqyzod7hgwOl0hk7F/jheUGjZyAbdvl4mY4xxRqPfg0JUtEHWvcRTnYw5OJ4 Wql6cSZbO4+ExfcOCRJNdnQ7i6f/cvVXeUQ2/eX7numlEoqGL0iZddI+aS71zicA v5fSe9itE0h2uYG9qUW2BUhzsf8l4+TvzvuGZ2juabX/zJjWlVM32y/N/zQuErP9 9ggv79CW+Rj+/PluP0b9vCa+f5spSuTP1UGEDU19m9LEjnEeArFJ9HO6ERUiunLc ta4Hd0UYFQpRwjcZBFDTUKf4j3yB9qIp3/3HKd9cilYt1b5fmypTIUgOVjBC/RdO 98JSyhRt2qAl4Cij8jBxcdajrWjLEzvAOaIrNSMV2TDX8FYvEElO6cae1A54xtBY sd+b962IAibaMeH2a5gCL3b+m6pqRnEQcdQM9eO/5KA7ccUH1aWfJWu6MXGUU3Iv hqT/r2ftGzc1coudiMlO4kYJOgexOFoYsyZtMRn3w72ENKuUJzhuQ1IKPml9zYgi nHBvo7kwa/pbqLorxX8n9x4SYy5YFbM/7twIdbDUo+pSk+lvfGRxslUumJu//K9t T9r3E15oAF6HKNxpTg3KzBUFokMOfQE8ttZduXNCAOmUeS8qUULRQMpXkrMZ3ATl cBe16lJZ8NbJ2wsXBbCcZA7S2JUhLbnzrYjx7O4/owyRklAdyGQ5Ge/eqi1g+jb7 hnsuTatSBW01I//DIZ2SMaFAHLToUTY14ZLqB4aQ/NZ5JS3obIkgJzB9hc3J2MOZ tjSCqJelwKwDJI5vuzEzQ4RT0HMXv5OSbACJQR1aE9Bt1z776aKpNEuDHSoFje2a lPLyqsKYmmm01NFM2SrPh7a+l7swEyFKY54NzQ5KtAss76JLMO7B5mAjtK0Gt1ec tb6lL1zRbC+REwTqmQznqT7pGowiVxk3ZdQTnH8r317VU1szGKSXJtOPomwX/afc RdWC/iDWvJEYkWCDmKdzosGwC6paz5hdhwrrwhroKymA4dHXZkrZnXZNE7W11FNu fzniaXW/QgtICpnNTUTzV3rIvI78xmo6sPySQD2E15prla+PDX8UogBPIXFXD0Jj 8Nx5mA2K1AlKIRE5LCH/SmPVCXxrin24xwFg2ruAolvB/3bp8a2R6tcI18sjsjcT THOZOu84xF0QHcZulEe5itNMeiCLmst4emdMMwz5Af39uqQ8BRu/VG04yclHbOfY /t40aiaqhInDKwIDAQABo4IBjTCCAYkwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8E BAMCAQYwHQYDVR0OBBYEFHJfTsl4tZ/SgXSl15TwxLnqy15dMB8GA1UdIwQYMBaA FHJfTsl4tZ/SgXSl15TwxLnqy15dMBwGA1UdEQQVMBOBEWNhLW1hbmFnZXJAaXBt LmlyMBwGA1UdEgQVMBOBEWNhLW1hbmFnZXJAaXBtLmlyMIGqBggrBgEFBQcBAQSB nTCBmjA/BggrBgEFBQcwAoYzaHR0cDovL2lyYW5ncmlkLmlwbS5hYy5pci9wa2kv cHViL2NhY2VydC9jYWNlcnQuY3J0MCsGCCsGAQUFBzABhh9odHRwOi8vaXJhbmdy aWQuaXBtLmFjLmlyOjI1NjAvMCoGCCsGAQUFBzAMhh5odHRwOi8vaXJhbmdyaWQu aXBtLmFjLmlyOjgzMC8wQAYDVR0fBDkwNzA1oDOgMYYvaHR0cDovL2lyYW5ncmlk LmlwbS5hYy5pci9wa2kvcHViL2NybC9jYWNybC5jcmwwDQYJKoZIhvcNAQELBQAD ggQBAFIpTCtg5SLEKByGy0kss874bwn9eZECquSe4jhLrZuX2WjSxUrQnPRUbxBg 5JNo315NwiwlFYv9hPjzhEVtzzVKfMWPjzi3XEx14DlJ2ptQcVjPkgHw16AHR9Wa xCGMq0GdohBVBD0Jadxaj42OkVSyFk/Fn7nJQdAU+dU7HxDD305dLH+A9iyWehFg faJuGv15fmW1kI75+ygUA6cIyRbRV6iHvg8IZMpZlpITFYcpHqYSe9pRrv1BDJEf 4xTlRoM9xwhopFwWWnqwScuMqHaPwXwIaO1wUIkouV6n7jSQx+fjW5/FMDftXzIm kA5wyHbasmy6LCe9d4kAnzt4MVT5Xb3naz6SONW2b+0znWSWzWhe1vWCdZUd9dRw htUm9jKzW6T6jpMNFbWKfsvz+suPs3imb3DwELIciuyjT83/BL8Z9qb1eglRSlts x/5dJD7aTkKlYpQHzJnr4dTwhZ5FzbpZFxxeSQl6yfpOcL2ijlCRBIUQEaqty4cL ClKl5TrEZGjAgx+95cdfLzCnn9ap9Az8rDippRwk9JWtmXmvC5GApNofsFhzqZ6n KrEjHuhbCM5nbEkm2Q0AOzQTHhgZUdt0ZdDIMDWjkq7qA6087h6ZIFEIEEIFmMco BYwVMbERQZbfNNhpQb/49bXTLvxV6I0l895MRk0BMyD8pQkiLQxxGNGjU39wOGIN k2sFSgwHeGS08KL81VX3yV4LDrz3VVVS+xpMwqb5EbuJ2JNXbPnfNd+X5Zlyk6o9 l4gZQM36zy2YlAHpi+6jYsU337gWrL2uXDnbg82g7X4U79alvio2oHIk3qEtckZC 3IH2eCAm7lOHerRH85Ws+S1M81MbweLxr7o8dSTr6B4y/w/AlMwvhsNE8Kv6zeH2 pxH1tsEpvfgl9sYa1BjBmlCbHh+42ko/ra2nU2bowr++dTcZtx8pocYZp+nWFJ6T Q0EpCb4E8sY2d2W+ssmK0HCvOryQeeQTYgL9dZ3FtwAiZ3PiTRA7sHGUeWgUEwib R05U3EUC2q1lms3IiBGScwoypihAg9bnRQvOkWdSXkQT73A5AmOyg4uh89gfFXTU e2er7o2B1rJcOD0HZhu6WxnqFC5uwzwxLqgyJ6WUWM5vb0wS/BbdpiHZXXAYjggy HM6uYoL9BZZH7cvtMKPH2eTpR8G0IzfWhUJAJUyRU7wUlBXPKDrR+kS88irPh6eu EMV4YTndZmvNGXZfhqsTG1TFmkkwfP1GVeAHsdT/O/NQiJ1+Co4ansMj95gsYeIU otAjUtv0+4yjOkG7eJfJdjUit/uW+7Kcg0DY1qeWNY6h6f87hY5s2rorOFY/gteh W/0zkCUuQlS40E5FGV9I6mmPkbo= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/IRAN-GRID-GCG-G2.crl_url0000664001343500074740000000006013614364117025573 0ustar davidgdavidghttp://irangrid.ipm.ac.ir/pki/pub/crl/cacrl.der igtf-policy-installation-bundle-1.104/src/accredited/IRAN-GRID-GCG-G2.signing_policy0000664001343500074740000000033013614364117027146 0ustar davidgdavidg# EACL IRAN-GRID-CGC-G2 2016 access_id_CA X509 '/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA' pos_rights globus CA:sign cond_subjects globus '"/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" "/C=IR/O=IRAN-GRID/*"' igtf-policy-installation-bundle-1.104/src/accredited/IRAN-GRID-GCG-G2.namespaces0000664001343500074740000000072613614364117026261 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)IRAN-GRID-GCG-G2.signing_policy.namespaces # CA alias : IRAN-GRID-GCG-G2 # subord_of: # subjectDN: /C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA # hash : IRAN-GRID-GCG-G2.signing_policy # (generated automatically from IRAN-GRID-GCG-G2.signing_policy) # TO Issuer "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" \ PERMIT Subject "/C=IR/O=IRAN-GRID/.*" igtf-policy-installation-bundle-1.104/src/accredited/KEK.pem0000664001343500074740000000237113614364120023205 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDfzCCAmegAwIBAgIBATANBgkqhkiG9w0BAQUFADBSMQswCQYDVQQGEwJKUDEM MAoGA1UEChMDS0VLMQwwCgYDVQQLEwNDUkMxJzAlBgNVBAMTHktFSyBHUklEIENl cnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNTExMjUwNjIwMDFaFw0yNTExMjUwMDAw MDBaMFIxCzAJBgNVBAYTAkpQMQwwCgYDVQQKEwNLRUsxDDAKBgNVBAsTA0NSQzEn MCUGA1UEAxMeS0VLIEdSSUQgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzwPVQNq4DkabmieAS+mRrMrKomjY2z1d CF7HNHys0smqCBwkMKg6AEsddtJP6NyNO3KaknO756MI4K31xgDdTQpkQWkPqIGT pSlMY8xxH1AVe4KDg9AxB5AkHYSxjah3dT2sm9ZQHjPtXGMFRzjReKSgZWIWteF+ SdWpqhuxo8oYDzot7ZqIJnV2Dr9R3mLTU9Lslv5ZCult/iX5XKSkSC+3oLps5IKw /7ICgealZluaWjye61BDBpREQfjTHwZb+GSYzngGrJzedekOZ7ILq9tECojmNq7A 7FyVeG793UPhOJ69JP4oFsrQrG6+aGcaIui70QCpWaOldThnynzkDQIDAQABo2Aw XjAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAfBgNVHSMEGDAWgBT1lIMe 2Yv88d6Z4cYX4nxg0JummzAdBgNVHQ4EFgQU9ZSDHtmL/PHemeHGF+J8YNCbppsw DQYJKoZIhvcNAQEFBQADggEBADKvGDLXIMPQgtSiqvLLqSOfNgedj9N+5DRxQLlR iNxJxFt8ol2jZ92JgkETDWgR+RYz3oG26/uPpVi6jxx24Wru4h6A5OVLvKmKBd1+ WezShcPY3CFowrA90lsWD4XQmgVl4NyQYViMEbSk+oWx5kRrvzf4I0B2yq/wJSkJ /ysNRHT0o50MwDOBt0pZs5RoJmbYu2pFXUiygdmAaImIAMfEcP7UT3CUJiGX1dwN uKkT7zG8VwAaSMpVtTQuE+2+sH2ZJnzc6fJYZlgX4VjmZYh5bpQsF+sxqd2p+qmk 5Bd+wx7iy8WUmCnV8Yl+u69wcnNH1boP/5qjGvlYtkopa0A= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/IRAN-GRID-GCG-G2.info0000664001343500074740000000076613614364117025101 0ustar davidgdavidg# # @(#)$Id: IRAN-GRID-GCG-G2.info,v 1.1 2016/11/04 11:02:35 pmacvsdg Exp $ # alias = IRAN-GRID-GCG-G2 ca_url = http://irangrid.ipm.ac.ir/pki/pub/cacert/cacert.pem crl_url = http://irangrid.ipm.ac.ir/pki/pub/crl/cacrl.der policy_url = https://irangrid.ipm.ac.ir/policy.htm email = ca-manager@ipm.ir status = accredited:classic url = http://irangrid.ipm.ac.ir/ version = 1.104 sha1fp.0 = 9D:3B:E5:46:9D:2E:E4:AB:57:DD:36:F4:ED:24:D7:70:41:C6:76:69 subjectdn = "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" igtf-policy-installation-bundle-1.104/src/accredited/InCommon-IGTF-Server-CA.pem0000664001343500074740000000407213614364120026566 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF5TCCA82gAwIBAgIRAKJ784Vgmf4VaM2qFHU5jtYwDQYJKoZIhvcNAQENBQAw gYUxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMSswKQYD VQQDEyJDT01PRE8gUlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTE0MDEw MTAwMDAwMFoXDTIzMTIzMTIzNTk1OVowVjELMAkGA1UEBhMCVVMxEjAQBgNVBAoT CUludGVybmV0MjERMA8GA1UECxMISW5Db21tb24xIDAeBgNVBAMTF0luQ29tbW9u IElHVEYgU2VydmVyIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA hc90D6ReKjC10rFRqMRp/+oLUj+/Qqvc71TeoukKtRDKVkzZ31wqimaoLN6phV4y W525nJo7HuE+P23CFOAYfE3JToqwRwwPkOX6b1T2HWZlQoKQgWuVvAN0X66ti3IP 7yKFfJ+6diAx5lnhMpkO9+FKQN7HmlP8nIQkqhjuLYEKjwlCvo6k8ALHtPz2S8w4 16b5BpCY1l5wNSe3mt71Ol4cYyHmJ398wCW3p9N5BBdJKPgBkDVIANDngh5Q30GE tuYqWBmcqxTtMuRCpTC661y80Ib2vh6ypnr0s7LwPoKQkHjKZvIKdcGgkiCSAz5k ljSw6QbfRpb5VoT/0sBHMwIDAQABo4IBfDCCAXgwHwYDVR0jBBgwFoAUu69+Aj36 pvE8hI6t7jiY7NkyMtQwHQYDVR0OBBYEFGHmX8knukD47CgG84kyWlZf4o7RMA4G A1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdJQQWMBQGCCsG AQUFBwMBBggrBgEFBQcDAjAyBgNVHSAEKzApMA8GDSsGAQQBriMBBAMEAQEwDAYK KoZIhvdMBQICATAIBgZngQwBAgIwTAYDVR0fBEUwQzBBoD+gPYY7aHR0cDovL2Ny bC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j cmwwcQYIKwYBBQUHAQEEZTBjMDsGCCsGAQUFBzAChi9odHRwOi8vY3J0LmNvbW9k b2NhLmNvbS9DT01PRE9SU0FBZGRUcnVzdENBLmNydDAkBggrBgEFBQcwAYYYaHR0 cDovL29jc3AuY29tb2RvY2EuY29tMA0GCSqGSIb3DQEBDQUAA4ICAQAQFIPT14MV pGw2cNhWYOmafXfQ2dWfmsxccnBL2+6F3KrZTfK2KKcyp0DsdWaCyJLwRHcxJXL7 Cd1TZFWjqa/agNGsK7B3u8UKZRVwMyvPDtQ8yRzv2qipLNNbSMPvKBZdHpfA5/F6 H15l0tJwdvMAcwt17lW0wzV0VrjSN+t7o5WQdGiF4wL7oX/gc/+9yQf45ijOhAOJ ayIAWZcD1MnADq+Rhon8NkWk2XpHJ6oFwLNE+ePS9oLRiLAN0LO0EQm0VNXCuCEk G6nKAFTwHDNSIFDkwdXyAh5UbMK7db+8Ov/aywUOo+8f1SbKkzQDpFjiZ0g1j/16 duwaJQZG0apR35jodALK2kwdyWls4b41Yipv4smLJURTNf9+3i2+YBt6TSFeGuFU CGe67WEjkPTAGKoTcqDT1YECoGOGHFx6J5rbAtF9u0EDFwuxCkrzT9KV/Pi17CbT 3HqeN2fiBGfqz3m9cwFijTyVyZYMRiC1TTloUXk60fv6TvUJlfQDsX4vZ9IcU7SP nCfxKXJsZWn9CYx/C5CFGR8u29CRn1IwDv+CpvKz0Z9jEFw+ZVvU9EClj2aN8UiN 7ljJniNnuPDPVhx4wkqRyz05fQS5Txkp5Ljyj/zvngO9alW4tMA0iUgYZRFKQbhq JfcTEHuGEWV1/air3h4K3++bIqe9p1DeRQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/InCommon-IGTF-Server-CA.crl_url0000664001343500074740000000006613614364120027446 0ustar davidgdavidghttp://crl.incommon-igtf.org/InCommonIGTFServerCA.crl igtf-policy-installation-bundle-1.104/src/accredited/InCommon-IGTF-Server-CA.signing_policy0000664001343500074740000000024213614364120031015 0ustar davidgdavidgaccess_id_CA X509 '/C=US/O=Internet2/OU=InCommon/CN=InCommon IGTF Server CA' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=incommon/*"' igtf-policy-installation-bundle-1.104/src/accredited/InCommon-IGTF-Server-CA.info0000664001343500074740000000075113614364120026740 0ustar davidgdavidgalias = InCommon-IGTF-Server-CA url = https://www.incommon.org/cert/ policy_url = https://www.incommon.org/cert/repository/ ca_url = http://crt.incommon-igtf.org/InCommonIGTFServerCA.crt crl_url = http://crl.incommon-igtf.org/InCommonIGTFServerCA.crl requires = COMODO-RSA-CA email = admin@incommon.org status = accredited:classic version = 1.104 sha1fp.0 = 46:C7:40:19:92:CF:5E:25:18:F8:CC:8B:F5:05:FF:E9:F6:5E:BC:48 subjectdn = "/C=US/O=Internet2/OU=InCommon/CN=InCommon IGTF Server CA" igtf-policy-installation-bundle-1.104/src/accredited/KEK.crl_url0000664001343500074740000000005413614364120024062 0ustar davidgdavidghttp://gridca.kek.jp/repository/617ff41b.r0 igtf-policy-installation-bundle-1.104/src/accredited/KEK.signing_policy0000664001343500074740000000242313614364120025437 0ustar davidgdavidg# ca-signing-policy.conf, see ca-signing-policy.doc for more information # # This is the configuration file describing the policy for what CAs are # allowed to sign whoses certificates. # # This file is parsed from start to finish with a given CA and subject # name. # subject names may include the following wildcard characters: # * Matches any number of characters. # ? Matches any single character. # # CA names must be specified (no wildcards). Names containing whitespaces # must be included in single quotes, e.g. 'Certification Authority'. # Names must not contain new line symbols. # The value of condition attribute is represented as a set of regular # expressions. Each regular expression must be included in double quotes. # # This policy file dictates the following policy: # -The Globus CA can sign Globus certificates # # Format: #------------------------------------------------------------------------ # token type | def.authority | value #--------------|---------------|----------------------------------------- # EACL entry #1| access_id_CA X509 '/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority' pos_rights globus CA:sign cond_subjects globus '"/C=JP/O=KEK/OU=CRC/*"' # end of EACL igtf-policy-installation-bundle-1.104/src/accredited/KEK.namespaces0000664001343500074740000000072013614364120024537 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)617ff41b.signing_policy.namespaces # CA alias : KEK # subord_of: # subjectDN: /C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority # hash : 617ff41b.signing_policy # (generated automatically from 617ff41b.signing_policy) # TO Issuer "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority" \ PERMIT Subject "/C=JP/O=KEK/OU=CRC/.*" igtf-policy-installation-bundle-1.104/src/accredited/KEK.info0000664001343500074740000000047613614364120023363 0ustar davidgdavidgalias = KEK crl_url = http://gridca.kek.jp/repository/617ff41b.r0 email = kekgridca-contact@ml.post.kek.jp status = accredited:classic url = https://gridca.kek.jp/ version = 1.104 sha1fp.0 = 7F:F3:8B:69:A2:9A:1F:F2:EA:FF:99:7F:EB:40:9B:B7:DD:47:5A:1D subjectdn = "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority" igtf-policy-installation-bundle-1.104/src/accredited/KENETCA-ICA-2015.pem0000664001343500074740000000415713614364121024631 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGDDCCA/SgAwIBAgICEAAwDQYJKoZIhvcNAQELBQAwgYcxEjAQBgoJkiaJk/Is ZAEZFgJrZTEVMBMGCgmSJomT8ixkARkWBWtlbmV0MSYwJAYDVQQKDB1LZW55YSBF ZHVjYXRpb24gTmV0d29yayBUcnVzdDEaMBgGA1UECwwRUmVzZWFyY2ggU2Vydmlj ZXMxFjAUBgNVBAMMDUtFTkVUIFJPT1QgQ0EwHhcNMTUwOTIyMDg0NzM0WhcNMjUw OTE5MDg0NzM0WjCBgjESMBAGCgmSJomT8ixkARkWAmtlMRUwEwYKCZImiZPyLGQB GRYFa2VuZXQxJjAkBgNVBAoMHUtlbnlhIEVkdWNhdGlvbiBOZXR3b3JrIFRydXN0 MRowGAYDVQQLDBFSZXNlYXJjaCBTZXJ2aWNlczERMA8GA1UEAwwIS0VORVQgQ0Ew ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaPs0fV55vwa4dhnUCbXpb bldxvYh1mwZE1p7DLU4JruYjIzCGeWxynxa4e0FgHHL0nN39WxxIGW+71vigktaB TCFtKQsdmzpkV+T5WotuUQqrB/uHBz98DivN0f9Sr+F21DwigE+qwpkh7bEfDkaG a9coJ4eaLoyvmk2s3uxpUrGb2dC5K8R9O3VwOihehRCWjnbvokDzZvCx+vMaBGPl XxeagLABErwVc0Q8VeyhwjlxcPfulgewrtbvKYsRt45sjjRqTzJlAM/XUKbNGG94 DW44omn0sb5tC48S1oCiZhyLmC3YW1nZjUxpv6DpsQVsThEx+l/tz7umcbbY8Q/p AgMBAAGjggGDMIIBfzAdBgNVHQ4EFgQUne1UAIsQv0UuAaO1fqkbrsgATeIwHwYD VR0jBBgwFoAU9VwYE5A4hRPaxM5QBnpvQmrpjs4wEgYDVR0TAQH/BAgwBgEB/wIB ADAOBgNVHQ8BAf8EBAMCAYYwRQYIKwYBBQUHAQEEOTA3MDUGCCsGAQUFBzAChilo dHRwOi8vY3J0LmNhLmtlbmV0Lm9yLmtlL0tFTkVUUk9PVENBLmNydDCB0QYDVR0f BIHJMIHGMIHDoC2gK4YpaHR0cDovL2NybC5jYS5rZW5ldC5vci5rZS9LRU5FVFJP T1RDQS5jcmyBAgVgooGNpIGKMIGHMRIwEAYKCZImiZPyLGQBGRYCa2UxFTATBgoJ kiaJk/IsZAEZFgVrZW5ldDEmMCQGA1UEChMdS2VueWEgRWR1Y2F0aW9uIE5ldHdv cmsgVHJ1c3QxGjAYBgNVBAsTEVJlc2VhcmNoIFNlcnZpY2VzMRYwFAYDVQQDEw1L RU5FVCBST09UIENBMA0GCSqGSIb3DQEBCwUAA4ICAQA95HoAgOW+Fk0O1vDUa3fS n2k+Qg2ZyGoqYvywMQgbkF5kUf49Da+f9k6V85d6tmtfeFxKGUoGu96x0QU372rf C9YxyAaLN0DFQOmXnNfaKxw2Ag+8+RNowRrc33odKtSZdmdqz6OPhySiFY/53cyx DwL4SfmwqYBe5R96UB3NIYrvKUSSwD5iVYsi1hJfK7J5rnT3uP7dayMwmwq2lMKR ZYlolgbMoD7Wz2hIQJKA1uNaEo+YhC/7vjAA0AYUCXBaWzlju61kNKbwZ6NEGaes 86VEyy7Pgw4KKwsYjukF6/g85s8rEG8YSHwzBqXmFAvzmF/D3Qb/btNLWcxj12z+ +UI5M0OnpjgTD0lY+HOxKpFqSH+YbRGoAOD5eBK8JWFbjGLGwfqpq2nBg7JgJpo4 RcOKNaBSWGaLYBLTLN1a2DPswKRne+PbdXlkj2IJkTi+PHm/aKRR3hRI6QgKup1U 9Pqed9daYTuHM3wARx+KI/CoRhOFcjUWUgSbtv/P1ZXYT0aQy2ljuFMTy91C+0RK iZ3d9IWf1AOsaVOItN/ExiLJSSGfzn3k0PF66RW2tAcueNxRtkkPL5/ulbZy5ONe CKjdaLr3iGh2KdYbeJkl2mohnA6C1MpcC5AC84hXFD4erjlBDz8WQ6dagOLhVJE7 Ske4t6xFODqq98SNphEqYw== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/KENETCA-ICA-2015.crl_url0000664001343500074740000000004613614364121025503 0ustar davidgdavidghttp://crl.ca.kenet.or.ke/KENETCA.crl igtf-policy-installation-bundle-1.104/src/accredited/KENETCA-ICA-2015.signing_policy0000664001343500074740000000045113614364121027056 0ustar davidgdavidg# EACL KENET ICA access_id_CA X509 '/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA' pos_rights globus CA:sign cond_subjects globus '"/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA" "/DC=ke/DC=kenet/*"' igtf-policy-installation-bundle-1.104/src/accredited/KENETCA-ICA-2015.info0000664001343500074740000000104713614364121024776 0ustar davidgdavidg# # @(#)$Id: KENETCA.info,v 1.2 2016/01/18 11:41:09 pmacvsdg Exp $ # alias = KENETCA-ICA-2015 requires = KENETROOTCA ca_url = http://crt.ca.kenet.or.ke/KENETCA.crt crl_url = http://crl.ca.kenet.or.ke/KENETCA.crl policy_url = https://ca.kenet.or.ke/media/kenet-draft-cp-cps-v-1.0.1.pdf email = ca@kenet.or.ke status = accredited:classic url = https://ca.kenet.or.ke/ version = 1.104 sha1fp.0 = CF:9E:40:8C:5F:3E:EC:37:05:C4:BE:9B:BB:22:4B:A8:DF:9A:CB:A9 subjectdn = "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA" igtf-policy-installation-bundle-1.104/src/accredited/KENETROOTCA.pem0000664001343500074740000000411613614364121024351 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF9jCCA96gAwIBAgIJAI7xenmttjU1MA0GCSqGSIb3DQEBCwUAMIGHMRIwEAYK CZImiZPyLGQBGRYCa2UxFTATBgoJkiaJk/IsZAEZFgVrZW5ldDEmMCQGA1UECgwd S2VueWEgRWR1Y2F0aW9uIE5ldHdvcmsgVHJ1c3QxGjAYBgNVBAsMEVJlc2VhcmNo IFNlcnZpY2VzMRYwFAYDVQQDDA1LRU5FVCBST09UIENBMB4XDTE1MDkyMjA2NDQy MFoXDTM1MDkxNzA2NDQyMFowgYcxEjAQBgoJkiaJk/IsZAEZFgJrZTEVMBMGCgmS JomT8ixkARkWBWtlbmV0MSYwJAYDVQQKDB1LZW55YSBFZHVjYXRpb24gTmV0d29y ayBUcnVzdDEaMBgGA1UECwwRUmVzZWFyY2ggU2VydmljZXMxFjAUBgNVBAMMDUtF TkVUIFJPT1QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCcD5nC ZhjT2DlEOI3qun9XOTtvcucPIinu0LK9yWGObDmns7MkKI51PT2uALTfVD/7PWNy iy/VGN8RNKOcdiuu4/eUQC6uI+nN+6ng6oViDf/GQD/KfZ/HWe3JDpSZ1w8Yfh1G Ue21mGzW2xoLEeLf2jrLWPhHrb21UfrO7u77tjY8fZATksVS7i+s13xZzlmbXk2z uE/h8MSFbEp3QCUpKdr+hosUARfSVygXQgEFVF8bfqvEUxADxk7ryGR2ttJiSWoR qBMeewGepU8YucBGLQU0eiSXbPeIWzawquBGETky7C1k1JT/Avjn+QBO8as6dbAw cXCoWRsosIovkNjXorrsLovGVR6d+rYuW2OD/CcDvaujA3EtWoTWQsOo4PN/YWXK 4BnfqVHlgJaRt5Oe0PaAIyDs3ad3p+SAhgdaJeaz7SDhFlc8LMHMppCrUs3Go5/W G7bQgj0w8GawdYtAB2RF0+OC1zPmjxKHTcCCndd/NpkDaKqGz/wVhCFS+hPWzX3o J4cqBBrBEhMo7NCX+MTro5A6tLqegzXT4uzk30gr0o+Uu5Kv3wKqaJftSqDjiLp9 wLdCVI8TDKlfbmrg8Y7/b1vD6DsQnjgC0eSoahvyoUJJiAVjiiE0wjDDQyNCvvj/ Xl5cEjiWPeWbw0kD5R9I5pgZhiPYoxW+sxabcwIDAQABo2MwYTAdBgNVHQ4EFgQU 9VwYE5A4hRPaxM5QBnpvQmrpjs4wHwYDVR0jBBgwFoAU9VwYE5A4hRPaxM5QBnpv Qmrpjs4wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcN AQELBQADggIBAGrp7pNOICGloOrkyYU10dOiW6QM7SunCPemSAgjrUXM/mlIE2Uv MGAL9jqPeqkoeL+HWOX8uCCd0F7poa/BqrM6mTqJiWsRYc7lW6Xb7YgXEZUSpT7v MmBSLWeUrDfaeTVJxI7Ba3HDj1Rw9Fvei2lPCHcOimmKnoaSelWpCE3Zgbu4Vxdc 4EDswxWzkFYXg4We45WVL5ffRnBkQWRnzMI2tnHvnQaEbOlZWF+Plt8bGAZHQpu0 15cVb0XVLKRnh8QLZnbUWBF1BDnAp1UUoCTsQi+g+02VkoocvcCNnpH07GUaFAXS FE7X3H2+0byMFJM9K/C9iy21fmMo38V0feTwO2Wp7Ycqcll4lKkfsxbqbb1Xa8kB 0qU4x6Yv2KHJN2D+MQtx18EUu4647PNPoKxe3uOkb3VNztcr1+qzBFMkcqc3deKa X6ajtAmJDX7UcXgtXs7aOcY85Ws7TGdjc/aStJLSUgG+pNLEVOIn/r+y0/Z8Jnnx IJUWPGJcwR6d4tXe/kiQau9b85q1/lvF9ESRwYZBZ0h6jeiCW+jS6hU6YWT/tB1M M1zULX8JYEUdRkBPTzF1m4zjdsaKySqOuH+vR3kTC74V2q9wy+41VVrrJOpSzjWW in9oYZfdReyhXL2/yGZ5nz5HuXh4ox0Dgc/42pdwR6y2o1J7DcaYIiD1 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/KENETROOTCA.crl_url0000664001343500074740000000005213614364121025225 0ustar davidgdavidghttp://crl.ca.kenet.or.ke/KENETROOTCA.crl igtf-policy-installation-bundle-1.104/src/accredited/KENETROOTCA.signing_policy0000664001343500074740000000056613614364121026612 0ustar davidgdavidg# EACL KENET ROOT CA access_id_CA X509 '/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET ROOT CA' pos_rights globus CA:sign cond_subjects globus '"/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET ROOT CA" "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA"' igtf-policy-installation-bundle-1.104/src/accredited/KENETROOTCA.namespaces0000664001343500074740000000115213614364121025704 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)KENETROOTCA.namespaces # CA alias : KENETROOTCA # subord_of: # subjectDN: /DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET ROOT CA # TO Issuer "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET ROOT CA" \ PERMIT Subject "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA" TO Issuer "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA" \ PERMIT Subject "/DC=ke/DC=kenet/.*" igtf-policy-installation-bundle-1.104/src/accredited/KENETROOTCA.info0000664001343500074740000000103413614364121024517 0ustar davidgdavidg# # @(#)$Id: KENETROOTCA.info,v 1.2 2016/01/18 11:41:09 pmacvsdg Exp $ # alias = KENETROOTCA ca_url = http://crt.ca.kenet.or.ke/KENETROOTCA.crt crl_url = http://crl.ca.kenet.or.ke/KENETROOTCA.crl policy_url = https://ca.kenet.or.ke/media/kenet-draft-cp-cps-v-1.0.1.pdf email = ca@kenet.or.ke status = accredited:classic url = https://ca.kenet.or.ke/ version = 1.104 sha1fp.0 = 55:1D:1A:66:8A:9F:0C:0F:7B:AA:B8:F3:F6:D3:E7:11:3D:F9:23:E1 subjectdn = "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET ROOT CA" igtf-policy-installation-bundle-1.104/src/accredited/KISTIv3.pem0000664001343500074740000000406613614364121023733 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF4zCCA8ugAwIBAgIJAPQE/CsWJRugMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV BAYTAktSMQ4wDAYDVQQKEwVLSVNUSTEmMCQGA1UEAxMdS0lTVEkgQ2VydGlmaWNh dGlvbiBBdXRob3JpdHkwHhcNMTcwNDE0MDgwNTA4WhcNMzcwNDA5MDgwNTA4WjBF MQswCQYDVQQGEwJLUjEOMAwGA1UEChMFS0lTVEkxJjAkBgNVBAMTHUtJU1RJIENl cnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAtSAdj4x4SNaS4EIcUsE3jcqy+48nS+RRxKQdxT3oDc8UvgN4PV9dThzo GrU8aySVevBd/ethq+0nInALWShrRpvd5xRDT+m+sqB43nk3vO6zCtPN5FLpoRTV 83mZq0G/9srfYFpk7UxMSueTnOcEW1RPf8G8+2ddruB9mB1Jvuu8/upAk6wo7BXg eG8947lmx91fOszYQgJrsRA8u4zoIfO7qegJbuJRy3hodEgt61TQ7bAjz87aIEvq zZ16EFlst7ZXmGs7ytgq/fRnqdl7M6KBMJCNShVhU2z+GIaZE3+wiJgx23fpMYWi IUE6ees7BC9gle5o7Ljm7bkeU3Q7AdNP8+U8fS13AqpeZBC9JRqvBo2J5uU7A/70 IjJhRoqR11o//O8uciJO1e21/JE//zd425xHkVahjC9BGng2TqtWA2JUcq595jyE +aqGze6KifJe/qkyRFxjHZOHT8r4y7z3N7f3pMUvEwvZjIx1mOCrXG919pOtSXzH oVhkvV/LQi/lKIbdHZnsDEkUbykvqbfEl/ES3PVZB/Q5waGL//zNAIU8a1jopMC7 /7JeRPpMDX2LF8HYmITpwzhSjcM699mWvnCBmlvALpawka3+6wPJbZnE3KH3oXjL T+rW/60NN1C1gZrNEhG80lSsI0eHI/G/JqrNOItKRYwfZhZ2KdcCAwEAAaOB1TCB 0jAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUjil/ 9gnmhh2SK4uI8/8IAYnbRm4wdQYDVR0jBG4wbIAUjil/9gnmhh2SK4uI8/8IAYnb Rm6hSaRHMEUxCzAJBgNVBAYTAktSMQ4wDAYDVQQKEwVLSVNUSTEmMCQGA1UEAxMd S0lTVEkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHmCCQD0BPwrFiUboDAZBgNVHSAE EjAQMA4GDCsGAQQB72EBAgEDADANBgkqhkiG9w0BAQsFAAOCAgEAeSVMjH8Fz8Gp /1P7DPCsCLxV6LEKR8KjBdSU05og9PsXJGW/RnF4tguVwgrvOI2j1s04eZKHHIbC GexEjG1fitz0dVPdh9romfsP1L7i2p9dogln6zUr0cAXQruQh7Cl5NDlYJFMZFCI Bln3+1cNtb+TVxK++5zfNJnOYXbTjY1k5gJWk5epoZg1IQBEeH37LG4vF51GLnrW c0j0e75vBuOa8gVnAfCLYF+MJOrMjP5V+Y6gGYDUBeoxyKOHrfd8gvStgb2PibeF q7Re8aHuS4F3RYjcrKX7X87pKmVbs3ArGUJzxkf6eWj3sn5ktxo89IhcGcj348Jl sBIEcT/wdgoFY137/GHKWAlIauNwMLFPhzep+8/kInyGDennxYn4Yqjl61AzcRKc AXhnkR9f+K5YnmeMtYMCzCndyOoKHNjlC6HUFrz4gN+mNcgtHBxDADTJhHNf7y2z 66oHrmhedrnc+pBLOl6zJa+iHEQxqQlWHhCGe5vqZ2F4rSA/B9vh4VY3EPQEbrA6 wfdg0sBcBU/MAiiDwmGYgpirqW2LNK8IclLqXi/vWBof+oAi/AIFOHNVp6lhVdFs vzcpHqLaXBSKxvOp9C6fFktf94db1dwKLI6YkLyhRy6IjmKMiC//s6n2d19SZLOB BytgkbuYo5Upk7ibRnB4xBpQ2+aE7ag= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/KISTIv3.crl_url0000664001343500074740000000005713614364121024610 0ustar davidgdavidghttp://ca.gridcenter.or.kr/CRL/kisti-ca-v3.crl igtf-policy-installation-bundle-1.104/src/accredited/KISTIv3.signing_policy0000664001343500074740000000043613614364121026164 0ustar davidgdavidg# EACL entry KISTO v3 2017 # @(#)$Id: KISTIv3.signing_policy,v 1.1 2017/05/11 08:13:06 pmacvsdg Exp $ access_id_CA X509 '/C=KR/O=KISTI/CN=KISTI Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=KR/O=KISTI/CN=KISTI Certification Authority" "/C=KR/O=KISTI/*"' igtf-policy-installation-bundle-1.104/src/accredited/KISTIv3.namespaces0000664001343500074740000000070013614364121025260 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)KISTIv3.signing_policy.namespaces # CA alias : KISTIv3 # subord_of: # subjectDN: /C=KR/O=KISTI/CN=KISTI Certification Authority # hash : KISTIv3.signing_policy # (generated automatically from KISTIv3.signing_policy) # TO Issuer "/C=KR/O=KISTI/CN=KISTI Certification Authority" \ PERMIT Subject "/C=KR/O=KISTI/.*" igtf-policy-installation-bundle-1.104/src/accredited/KISTIv3.info0000664001343500074740000000060013614364121024073 0ustar davidgdavidgalias = KISTIv3 crl_url = http://ca.gridcenter.or.kr/CRL/kisti-ca-v3.crl email = kisti-grid-ca@kisti.re.kr status = accredited:classic url = http://ca.gridcenter.or.kr/ policy_url = http://ca.gridcenter.or.kr/cps/KISTI-CA-CPCPS-3.0.pdf version = 1.104 sha1fp.0 = 06:52:34:EE:81:0A:E5:9C:43:68:54:84:8C:8A:D4:DF:0D:75:A7:45 subjectdn = "/C=KR/O=KISTI/CN=KISTI Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/LIPCA.pem0000664001343500074740000000225013614364122023421 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDQzCCAiugAwIBAgIBADANBgkqhkiG9w0BAQUFADBDMQswCQYDVQQGEwJQVDEO MAwGA1UEChMFTElQQ0ExJDAiBgNVBAMTG0xJUCBDZXJ0aWZpY2F0aW9uIEF1dGhv cml0eTAeFw0wNDA2MDMxNjQyNTlaFw0yNDA2MDIxNjQyNTlaMEMxCzAJBgNVBAYT AlBUMQ4wDAYDVQQKEwVMSVBDQTEkMCIGA1UEAxMbTElQIENlcnRpZmljYXRpb24g QXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApjv/8Bi+ WGQBCgDP4LzS/sFXbKCqUrEGhFQaZdikE8B5zt7AZFihi/xh470vCQ1i8mhPYwlD EDEBe/j2yyBp5fdYmkZjMdzOUjHTY+IDlvhIE9iD19yiYHM+x38HgYofzZ1oS92u 1R4RWEHBDBQjUvCzaVwzTf/giguf6/mUKg0M8pxWAXgilHLrUpbff1fmDEKM6LGN p8Ey1G+3k7VdFzSt8VC0W+DZV8EWJcnpYdnZ0z+2J1FfiqoJpLRNM4efirJBIMBE l0GMI94PlbpnH0WBgHpSn1h9tORnVsqDop+dJz4aoPMeouQNirHIwNy4EvDwZ8XS vChDmiq04M00SQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRC rm73hh6e6Gjvz3lTOGJOAPJC7DAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEF BQADggEBAHqUt6tYo+R/Des2nMcsA5pvNKJgP5MlaiPsMK0rDEVclB1LFa6hDXU3 YK0npUf4O+xYd4rrSRtoy+vzsnq8PPvndr3DKlJNYy1mmZJHig2JsipCUu/KCKi9 H6ZXtBBrNPovrl/IdysBcDwvl93dMv0l1CnCLDUI6IvlH52HUCDym1ykYdAQxJTO tTY/jF/jpJXfKLl1fhC1ldxBvNdMFg6OfUv7wZ7Uyd5rWnPNHGsoxLRs4kCqFqC9 2CkR9S4ipmvra9qLzFuGIrYkTRhwNqgk/SWdp5dObUC31Rhap8taN3zWnXH8zV1f ZFnUwPIYwDoXAKYbxEZL1VuzlC3Itr0= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/LIPCA.crl_url0000664001343500074740000000003513614364122024301 0ustar davidgdavidghttp://ca.lip.pt/crl/crl.der igtf-policy-installation-bundle-1.104/src/accredited/LIPCA.signing_policy0000664001343500074740000000030613614364122025655 0ustar davidgdavidg# LIP Certification Authority access_id_CA X509 '/C=PT/O=LIPCA/CN=LIP Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=PT/O=LIPCA/*"' igtf-policy-installation-bundle-1.104/src/accredited/LIPCA.namespaces0000664001343500074740000000064713614364122024767 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)11b4a5a2.namespaces # CA alias : LIPCA # subord_of: # subjectDN: /C=PT/O=LIPCA/CN=LIP Certification Authority # hash : 11b4a5a2 # (generated automatically from ./LIPCA/11b4a5a2.signing_policy) # TO Issuer "/C=PT/O=LIPCA/CN=LIP Certification Authority" \ PERMIT Subject "/C=PT/O=LIPCA/.*" igtf-policy-installation-bundle-1.104/src/accredited/LIPCA.info0000664001343500074740000000062113614364122023573 0ustar davidgdavidg# # @(#)$Id: 11b4a5a2.info,v 1.6 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA LIPCA # obtained from 11b4a5a2 in LIPCA/ alias = LIPCA crl_url = http://ca.lip.pt/crl/crl.der email = ca@lip.pt status = accredited:classic url = http://ca.lip.pt/ version = 1.104 sha1fp.0 = 06:BA:B3:02:A6:8E:3F:55:48:F9:4C:1B:3A:E6:B2:E4:BA:ED:5A:F7 subjectdn = "/C=PT/O=LIPCA/CN=LIP Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/MARGI.pem0000664001343500074740000000242213614364122023431 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDkjCCAnqgAwIBAgIBADANBgkqhkiG9w0BAQUFADAwMQswCQYDVQQGEwJNSzEO MAwGA1UEChMFTUFSR0kxETAPBgNVBAMTCE1BUkdJLUNBMB4XDTA4MDEyNTE1Mjcx NVoXDTI4MDEyMDE1MjcxNVowMDELMAkGA1UEBhMCTUsxDjAMBgNVBAoTBU1BUkdJ MREwDwYDVQQDEwhNQVJHSS1DQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAKrkupZTcmlsSlxo4B12VAW+LYn2GakcxBvFdJx3bMtJX6fnfvSidZPrBcJ8 BPAb4LdQwFj9FIP9+XnYLpP0V5mkvHoMc+JdtgqpTUfrargPS4R1Ud3iMwSirFRy +w3QQt/wAnPrRd5nSIEYueMg8wIOD4gPGaF0CEva82TVCF993Fgh81aeMOcExOzv LxPzvo6EA+cZGqpcM7EAKEqFWuxOQBsgClUIDI+omE+KLao2xluSOcyBO/LdMXAe 6G5X/sCVVbOtEeM5PH1nax3k4z/jM64P+vCg09fuq0gd0kWz5gNE3oUdtGhy/Doq pGbcLZTRsNePL6Ptn2mVthKY/5cCAwEAAaOBtjCBszAPBgNVHRMBAf8EBTADAQH/ MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU2Nzk2ZMcQ1GLmDBSA9xD0OC2c8gw HwYDVR0jBBgwFoAU2Nzk2ZMcQ1GLmDBSA9xD0OC2c8gwJwYDVR0RBCAwHoEcbWFy Z2ktY2FAbWFyZ2kubWFybmV0Lm5ldC5tazAnBgNVHRIEIDAegRxtYXJnaS1jYUBt YXJnaS5tYXJuZXQubmV0Lm1rMA0GCSqGSIb3DQEBBQUAA4IBAQA9d2frbLY4MCEN 9laBxwwq9v6hzeQNX8Krx7uxhA4QxM9EqbOpU1XaJxwWjrkzee4LIjTHBKf7AHGn bwcZuuGFFECu2wOozFA1+8eYLsp55Yi55dRfygmMXBWQZUsHsTi0wKU14yNKSKWh hds4TYJT+Xk9BFpfw0PKj+J6LxMpbdp1d2RZC0nL/iQyXOsctyvjsZ5i55/CKDNa O3qBL0bAawatQxrEfr5T7/nPcSuRX92mpGp+CfNSYMTR5GQGPA0gtHOJ55NaKSLx TDb3zd6SzzM9fe6xWEwbAWl+H+MvLzd+hJaryVqSBjayzY+Oep0/MI6QgfKO4HzY eUvIhZYy -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/MARGI.crl_url0000664001343500074740000000005713614364122024314 0ustar davidgdavidghttp://www.margi.marnet.net.mk/CA/margi-v2.crl igtf-policy-installation-bundle-1.104/src/accredited/MARGI.signing_policy0000664001343500074740000000036413614364122025670 0ustar davidgdavidg# EACL MARGI CA # @(#)$Id: 7d0d064a.signing_policy,v 1.1 2008/03/14 08:34:26 pmacvsdg Exp $ # access_id_CA X509 '/C=MK/O=MARGI/CN=MARGI-CA' pos_rights globus CA:sign cond_subjects globus '"/C=MK/O=MARGI/CN=MARGI-CA" "/C=MK/O=MARGI/*"' igtf-policy-installation-bundle-1.104/src/accredited/MARGI.namespaces0000664001343500074740000000064713614364122024776 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id: 7d0d064a.namespaces,v 1.1 2008/03/14 08:34:26 pmacvsdg Exp $ # CA alias : MARGI # subord_of: # subjectDN: /C=MK/O=MARGI/CN=MARGI-CA # hash : 7d0d064a # (generated automatically from 7d0d064a.signing_policy) # TO Issuer "/C=MK/O=MARGI/CN=MARGI-CA" \ PERMIT Subject "/C=MK/O=MARGI/.*" igtf-policy-installation-bundle-1.104/src/accredited/MARGI.info0000664001343500074740000000064013614364122023603 0ustar davidgdavidg# # @(#)$Id: 7d0d064a.info,v 1.2 2015/06/18 09:44:55 pmacvsdg Exp $ # CA: MARGI (mk) # alias = MARGI url = www.margi.marnet.net.mk ca_url = www.margi-ca.marnet.net.mk crl_url = http://www.margi.marnet.net.mk/CA/margi-v2.crl email = margi-ca@margi.marnet.net.mk status = accredited:classic version = 1.104 sha1fp.0 = 8F:F9:FF:6C:59:A8:FE:0F:85:B6:54:E7:90:A4:41:EC:02:92:C2:76 subjectdn = "/C=MK/O=MARGI/CN=MARGI-CA" igtf-policy-installation-bundle-1.104/src/accredited/MD-Grid-CA-T.pem0000664001343500074740000000464013614364122024443 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIG7jCCBNagAwIBAgIJAKj5b09ahBsYMA0GCSqGSIb3DQEBCwUAMHYxEjAQBgoJ kiaJk/IsZAEZFgJNRDEXMBUGCgmSJomT8ixkARkWB01ELUdyaWQxDjAMBgNVBAoT BVJFTkFNMSAwHgYDVQQLExdDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEVMBMGA1UE AxMMTUQtR3JpZC1DQS1UMB4XDTE5MDEyNDIxMzUwMFoXDTQwMDExOTIxMzUwMFow djESMBAGCgmSJomT8ixkARkWAk1EMRcwFQYKCZImiZPyLGQBGRYHTUQtR3JpZDEO MAwGA1UEChMFUkVOQU0xIDAeBgNVBAsTF0NlcnRpZmljYXRpb24gQXV0aG9yaXR5 MRUwEwYDVQQDEwxNRC1HcmlkLUNBLVQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQDQTqsHOzSlZ9AeZINJKuD/+ibnZApBfu2hiSqunNCCTUq3mYf/l4N9 q71EHrgjtDd2F3I4BXRoqVxO0fa91kaq/OAqbaoNeosg9jt7eh89IFhedR3Cw8RF 2mIXk1ECcyGVeipAJ/2APwqlK3HdHk+TWvY4jSsjm1C8H7gbEx4A+ty14yBZfSl7 ebcZOC+zztltxRsn5tz1ywwjNwvP8597xql1ngqfd6Bfun4IdznUIMhxQj9VkCl7 uUDmSfrAL1aCjgB9pV1CrGBy6Njwx6WB7ep3cOjr2Tw2du05fUvwNLmOS16ubhZB EvR09su4yQYm5Cl5RRE3q/F3REmC7BdXmgTyLTNCWEl7V0+8c+gJ+p2L//Ak+2qj /v7U3zgvH8QV/iaIi+4Frejj1UkRj7v9RlfI8rOEKhTfKZKKmsXlqTV16nKLsYpF qCDewMW2oifND1GlXdaGAVb0NGqS2krUOaFZ4OUSh1rszdvja9ojG1XmZz75qPMV M9SyQ3u4mQuKxcKwD5fPGcp1qf5jO8zMIHMCMsUfVSSRTG0M1exeI4NY9pQv9BaC +vaE96pfTykgQvMBA+oKUSZpsWvF/Ga5niP6uE+DE87eHfWljY3/p37n1awSj+EU fVReLkfKowt1FJaucFalP5qyDAg/F/vGwEGs3FKtT5QjTOYO+N7Q8QIDAQABo4IB fTCCAXkwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwEQYJYIZIAYb4 QgEBBAQDAgAHMB0GA1UdDgQWBBSH62UnUf7lXT++vU8IyRks/fDkFDAfBgNVHSME GDAWgBSH62UnUf7lXT++vU8IyRks/fDkFDA8BggrBgEFBQcBAQQwMC4wLAYIKwYB BQUHMAKGIGh0dHA6Ly9jYS5ncmlkLm1kL2ZpbGVzL1QvY2EuY3J0MDUGA1UdHwQu MCwwKqAooCaGJGh0dHA6Ly9jYS5ncmlkLm1kL2ZpbGVzL1QvY3JsLXYyLmNybDAp BgNVHRIEIjAggQtjYUByZW5hbS5tZIYRaHR0cDovL2NhLmdyaWQubWQwYwYDVR0g BFwwWjAOBgwrBgEEAYHzWgoBAQUwSAYKKoZIhvdMBQICATA6MDgGCCsGAQUFBwIB FixodHRwOi8vY2EuZ3JpZC5tZC9maWxlcy9UL01ELUdyaWQtQ1AtQ1BTLnBkZjAN BgkqhkiG9w0BAQsFAAOCAgEAX0HJkIT/jZB0/SJlbzhIvbfhd3wSs1Bp3sor9p/F IFjsuBe6MHCcuDvrYyi154BvCZykZfNK7tGcSB6p4jAUC99jx8kR8v39Gd7j6F0j yG/xBsju4s3GG5XNbMQ/bg388nN5lEM/lNOaO6RiEEA+G9XOUWria3uWBScrpi9u YjZKjiO8cp+mPoouQej1PnMGQp+uprLolABRvLL0RoX0GBn5T+fID13M20hHpt/E xsRvNr4gEOiExq+ayWkKa2kyiVxD4fk4lBT0xmokUiVeQxuAV/d4IH5F9wJSmvl9 KXtTBbQoH/qIjtfqk+tsMbX73j+Tni0fY64WrZGs3VTUAwqifp4Y5DKt8PIf9tFu DdmHYwB+4BNb4TN7jsxmC/wdWycGv6aQ4WqFWB30Ci5goS2RdquZC4VZjQ3CXunI wWsoh6O67Xpy2ADCK/BP9j9tgPz3Tm1Igh5f9exIS5mAVCdKD908mMCq/w7USEvM hR5uIbkp9/UmhkJQHb84W9pmALaIXtTijY1Tdh7uPvA529lWPE9p+J926t65D97E lNMjJYXnSA2pGJymMdsl/a+Ml0lT8d05bIdPUWprFKxHwNb1lZi2CS0E8kCkuoiO 1kTopme+BbeUiDITIXtomGuLXACvBTQ4VkJqpI3JU0ttWaPX83fl5yvrk5wGe1ir 234= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/MD-Grid-CA-T.crl_url0000664001343500074740000000004513614364122025317 0ustar davidgdavidghttp://ca.grid.md/files/T/crl-v2.crl igtf-policy-installation-bundle-1.104/src/accredited/MD-Grid-CA-T.signing_policy0000664001343500074740000000037713614364122026702 0ustar davidgdavidg# EACL MD-Grid CA access_id_CA X509 '/DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid-CA-T' pos_rights globus CA:sign cond_subjects globus '"/DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid-CA-T" "/DC=MD/DC=MD-Grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/MD-Grid-CA-T.namespaces0000664001343500074740000000100413614364122025770 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)MD-Grid-CA-T.signing_policy.namespaces # CA alias : MD-Grid-CA-T # subord_of: # subjectDN: /DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid-CA-T # hash : MD-Grid-CA-T.signing_policy # (generated automatically from MD-Grid-CA-T.signing_policy) # TO Issuer "/DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid-CA-T" \ PERMIT Subject "/DC=MD/DC=MD-Grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/MD-Grid-CA-T.info0000664001343500074740000000073413614364122024615 0ustar davidgdavidg# # @(#)$Id: MD-Grid-CA-T.info,v 1.1 2019/01/25 15:41:47 pmacvsdg Exp $ # Information for MD-Grid CA T (edition 2019) # alias = MD-Grid-CA-T ca_url = http://ca.grid.md/files/T/ca.crt crl_url = http://ca.grid.md/files/T/crl-v2.crl email = ca@renam.md status = accredited:classic url = http://ca.grid.md/ version = 1.104 sha1fp.0 = 18:6B:37:52:8C:49:A7:E7:E6:35:9F:6C:EF:5D:F6:72:B4:95:90:3D subjectdn = "/DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid-CA-T" igtf-policy-installation-bundle-1.104/src/accredited/MREN-CA.pem0000664001343500074740000000250213614364123023614 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDtDCCApygAwIBAgIBAzANBgkqhkiG9w0BAQsFADBQMRIwEAYKCZImiZPyLGQB GRMCbWUxEjAQBgoJkiaJk/IsZAEZEwJhYzEUMBIGCgmSJomT8ixkARkTBE1SRU4x EDAOBgNVBAMTB01SRU4tQ0EwHhcNMDgwNjA0MDgwMjUzWhcNMjgwNjA0MDgwMjUz WjBQMRIwEAYKCZImiZPyLGQBGRMCbWUxEjAQBgoJkiaJk/IsZAEZEwJhYzEUMBIG CgmSJomT8ixkARkTBE1SRU4xEDAOBgNVBAMTB01SRU4tQ0EwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQCwHUwK1z2l35JSDwOmB1pYUq4hBoZ3dkZJk9Ix J+zxmpVGe1H29Db+ykClw30mYbwr9IBHyfUL77QwO3PAj51a57PkJSQkbzDSAPOj nevxfhQk21iIhTJ9U3tRLke4sSWoRiUojYSpgbS4iAy0YbQ9cNu/roOjDu/bipjF vlAk+zpWJfOFlde3NoO0R00+SkN3G1lCiN1E9W/Wulz09XQZ0PCEa6bps0IfKLOR h2YyKcueC33s7FGQIR6wzlOrmTdb1sM7uaNV3YpRS3wUpVKDg/lUyHClCtiFeWY8 7BdBbhGjSXZ704B7sSEQeoTIFHu4A6HY22F1JdluGRRhO6p9AgMBAAGjgZgwgZUw DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFGvkwLJj +8E6ASOhFOjV9pU+yLhMMB8GA1UdIwQYMBaAFGvkwLJj+8E6ASOhFOjV9pU+yLhM MBgGA1UdEQQRMA+BDW1yZW4tY2FAYWMubWUwGAYDVR0SBBEwD4ENbXJlbi1jYUBh Yy5tZTANBgkqhkiG9w0BAQsFAAOCAQEAmHlxwFZk6SExEdBMjQxb2m0qsoox3+iQ PFZtPKmcWai1rolOEd1dq28p8G3040GOCGq2ImU45SCYr9ME9JjMubhvETMJ2fb7 2UoHg/TkoTB0baTwhjL9eRYt7GwkzIIJgQrUR33A2tQ/3MVo7l+SKd0UeLdZ/97r /oimQHPLfrFkxHrUdHXP1XSOXkMQpecCfzWg9oWbehlLI6cCN0o7w/ZDOaIm/5kF jxa+DebsF3FAp7XBCa7UFYX9EbUT61ONw3gKh6aAi8KJfj+srFnNwY9pOc0mMYkR YhBb45iBwW/bNnuRV5DFY0n5hgFjTOzjeBYR1hV+KMh4NeTYuQbqQQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/MREN-CA.crl_url0000664001343500074740000000004713614364123024477 0ustar davidgdavidghttp://www.mren-ca.ac.me/ca/crl-v2.crl igtf-policy-installation-bundle-1.104/src/accredited/MREN-CA.signing_policy0000664001343500074740000000022013614364123026043 0ustar davidgdavidg# EACL MREN access_id_CA X509 '/DC=me/DC=ac/DC=MREN/CN=MREN-CA' pos_rights globus CA:sign cond_subjects globus '"/DC=me/DC=ac/DC=MREN/*"' igtf-policy-installation-bundle-1.104/src/accredited/MREN-CA.namespaces0000664001343500074740000000063613614364123025160 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3232b9bc.signing_policy.namespaces # CA alias : MREN-CA # subord_of: # subjectDN: /DC=me/DC=ac/DC=MREN/CN=MREN-CA # hash : 3232b9bc # (generated automatically from 3232b9bc.signing_policy) # TO Issuer "/DC=me/DC=ac/DC=MREN/CN=MREN-CA" \ PERMIT Subject "/DC=me/DC=ac/DC=MREN/.*" igtf-policy-installation-bundle-1.104/src/accredited/MREN-CA.info0000664001343500074740000000060213614364123023765 0ustar davidgdavidg# @(#)$Id: 3232b9bc.info,v 1.4 2015/06/18 09:44:55 pmacvsdg Exp $ alias = MREN-CA url = http://mren-ca.ac.me/ ca_url = http://www.mren-ca.ac.me/ca/ca.crt crl_url = http://www.mren-ca.ac.me/ca/crl-v2.crl email = mren-ca@ac.me status = accredited:classic version = 1.104 sha1fp.0 = B5:3C:77:51:15:8F:BD:D4:B5:74:C0:02:E2:8C:EC:8E:02:33:99:6A subjectdn = "/DC=me/DC=ac/DC=MREN/CN=MREN-CA" igtf-policy-installation-bundle-1.104/src/accredited/MYIFAM.pem0000664001343500074740000000354313614364123023562 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFSDCCBDCgAwIBAgIJAKUok3cRrSlSMA0GCSqGSIb3DQEBBQUAMIGdMRIwEAYK CZImiZPyLGQBGRYCTVkxEzARBgoJkiaJk/IsZAEZFgNVUE0xFjAUBgoJkiaJk/Is ZAEZFgZNWUlGQU0xCzAJBgNVBAYTAk1ZMQ8wDQYDVQQKEwZNWUlGQU0xPDA6BgNV BAMTM01hbGF5c2lhbiBJZGVudGl0eSBGZWRlcmF0aW9uIGFuZCBBY2Nlc3MgTWFu YWdlbWVudDAeFw0xMTEwMDYxMDA1MjJaFw0zMTEwMDExMDA1MjJaMIGdMRIwEAYK CZImiZPyLGQBGRYCTVkxEzARBgoJkiaJk/IsZAEZFgNVUE0xFjAUBgoJkiaJk/Is ZAEZFgZNWUlGQU0xCzAJBgNVBAYTAk1ZMQ8wDQYDVQQKEwZNWUlGQU0xPDA6BgNV BAMTM01hbGF5c2lhbiBJZGVudGl0eSBGZWRlcmF0aW9uIGFuZCBBY2Nlc3MgTWFu YWdlbWVudDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKcx8//rm3sH VJCfMnp9QBL0w1rjngAQhUFTIveoJn3UN1lrWo7mIEeYZsENPUIoKO7o5W8xTTj+ W5DrEqth96Cy8tBsU51VVskEN2qk8FPYolJPZmlnAehe6FhxqoELHprk+zyM1uWN g49ZXyWFdof/4B2Pm65zpJ+NxWKiLhkUq2zKThAfVRJsIW/U02xYMz/ROwk+pFS9 4tqTzS4TX5NDccpNDc48+JjWXu5952ip0adLy/nUEwLyNmUbvEjq5DuQIsWnuL7d 6vTAsntYkUjhe33mGiEyOb5cIwT8n5J6LjXjCmEAutYqHky1eCR0N+TWZ908P1tw YijsQX1uy/kCAwEAAaOCAYcwggGDMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ BAQDAgEGMB0GA1UdDgQWBBSKkqEU62fayQPPDlS/SXiN8RVcwTCB0gYDVR0jBIHK MIHHgBSKkqEU62fayQPPDlS/SXiN8RVcwaGBo6SBoDCBnTESMBAGCgmSJomT8ixk ARkWAk1ZMRMwEQYKCZImiZPyLGQBGRYDVVBNMRYwFAYKCZImiZPyLGQBGRYGTVlJ RkFNMQswCQYDVQQGEwJNWTEPMA0GA1UEChMGTVlJRkFNMTwwOgYDVQQDEzNNYWxh eXNpYW4gSWRlbnRpdHkgRmVkZXJhdGlvbiBhbmQgQWNjZXNzIE1hbmFnZW1lbnSC CQClKJN3Ea0pUjA1BgNVHREELjAsgRRteWlmYW1AYmlydW5pLnVwbS5teYYUaHR0 cDovL215aWZhbS51cG0ubXkwNQYDVR0SBC4wLIEUbXlpZmFtQGJpcnVuaS51cG0u bXmGFGh0dHA6Ly9teWlmYW0udXBtLm15MA0GCSqGSIb3DQEBBQUAA4IBAQBwIQJW +5cB84LM0ckuQfek5X5Ajvzza89pwv7KO242FphHpdyVKupG/yeifnTuFyFpT8Gt FP8etn+LZqpqo5zkxGnxJP7jfVvJ8ev8RungPC9OEPqFLs8sZPnLrMhxk6Q6ChDn weYJSXa5l/aRE+k5r0Wl9eYT6yydtq/Us4J7o3C4377wsYL1Rf9dhZUlLhC1CRYH WIQWXJ1VSzTV2JYuzrIwJQEpqE6j4fhJ9EEYNGCrhnFVvILanWRfW9rbnvPnlPm0 21VcQfMnu4Rn6o3WAte6g5kR04W99m5PGP5rXdE42Q3iXaO4ds4JM68RWrjrhd7/ OGe+RecFv0XxVZa9 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/MYIFAM.crl_url0000664001343500074740000000005013614364123024431 0ustar davidgdavidghttp://myifam.upm.my/pub/MYIFAM-crl.pem igtf-policy-installation-bundle-1.104/src/accredited/MYIFAM.signing_policy0000664001343500074740000000043413614364123026012 0ustar davidgdavidg# MYIFAM-2010 signing policy # Date: 14 Jul 2011 access_id_CA X509 '/DC=MY/DC=UPM/DC=MYIFAM/C=MY/O=MYIFAM/CN=Malaysian Identity Federation and Access Management' pos_rights globus CA:sign cond_subjects globus '"/DC=MY/DC=UPM/DC=MYIFAM/C=MY/*"' igtf-policy-installation-bundle-1.104/src/accredited/MYIFAM.namespaces0000664001343500074740000000073613614364123025121 0ustar davidgdavidg############################################################################# #NAMESPACES-VERSION: 1.0 # # CA alias : MYIFAM # subjectDN: /DC=MY/DC=UPM/DC=MYIFAM/C=MY/O=MYIFAM/CN=Malaysian Identity Federation and Access Management ############################################################################# TO Issuer "/DC=MY/DC=UPM/DC=MYIFAM/C=MY/O=MYIFAM/CN=Malaysian Identity Federation and Access Management" \ PERMIT Subject "/DC=MY/DC=UPM/DC=MYIFAM/C=MY/.*" igtf-policy-installation-bundle-1.104/src/accredited/MYIFAM.info0000664001343500074740000000071113614364123023726 0ustar davidgdavidg# #@(#)$Id: d33760ec.info,v 1.2 2015/06/18 09:44:53 pmacvsdg Exp $ # alias = MYIFAM crl_url = http://myifam.upm.my/pub/MYIFAM-crl.pem ca_url = http://myifam.upm.my/pub/MYIFAM.pem email = myifam@biruni.upm.my status = accredited:classic url = http://myifam.upm.my version = 1.104 sha1fp.0 = DC:E1:EF:BF:F4:11:E8:93:66:61:F3:1F:47:3A:5D:0A:18:EB:DD:2C subjectdn = "/DC=MY/DC=UPM/DC=MYIFAM/C=MY/O=MYIFAM/CN=Malaysian Identity Federation and Access Management" igtf-policy-installation-bundle-1.104/src/accredited/MaGrid.pem0000664001343500074740000000312313614364123023735 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEfzCCA2egAwIBAgIJAPWxWB9dm2WKMA0GCSqGSIb3DQEBCwUAMDIxCzAJBgNV BAYTAk1BMQ8wDQYDVQQKEwZNYUdyaWQxEjAQBgNVBAMTCU1hR3JpZCBDQTAeFw0w NzExMDkxODM3MzdaFw0yNzExMDkxODM3MzdaMDIxCzAJBgNVBAYTAk1BMQ8wDQYD VQQKEwZNYUdyaWQxEjAQBgNVBAMTCU1hR3JpZCBDQTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBALVHBJ0TI8DZI7hgWfDyNngVHhGg6ay2VRrbNBtOBZVZ VzI85ANWPa1UU2lqeCCzNb6gw1xduTb+Ar8Ep3r42nBFtMTWCrmmES2GjcFVWaGW IbyfKSwhR9uTDgb8mW5B9iQuwn2fczYSEN8ncd8NBH1Cyxj5zh7CTdqYvXfH7t07 ICBR4MF1rdlnxELdLVv9GnHStLHUvpeGLnvKiNivgafXek0xGs1p3atfwH49UWAs cpDxT89i8mjawtYDJiXezO47X5TSxoxTZD15Wiu+r218usC+1AEnflWqHSUuZFPr tTPuz+c16hCAFO3SIto2j/7yUjDUkgyXTuTH+i85Lg0CAwEAAaOCAZYwggGSMA8G A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFInLSWxUJm7jcLzxm1kTw1VrGBJbMGIG A1UdIwRbMFmAFInLSWxUJm7jcLzxm1kTw1VrGBJboTakNDAyMQswCQYDVQQGEwJN QTEPMA0GA1UEChMGTWFHcmlkMRIwEAYDVQQDEwlNYUdyaWQgQ0GCCQD1sVgfXZtl ijAOBgNVHQ8BAf8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAHMD4GCWCGSAGG+EIB DQQxFi9NYUdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUm9vdCBDZXJ0aWZp Y2F0ZTAyBglghkgBhvhCAQQEJRYjaHR0cDovL3JhLm1hZ3JpZC5tYS9wdWIvY3Js L2NybC5jcmwwLQYJYIZIAYb4QgEIBCAWHmh0dHA6Ly9yYS5tYWdyaWQubWEvcHVi L3BvbGljeTA2BgNVHR8ELzAtMCugKaAnhiVodHRwOi8vcmEubWFncmlkLm1hL3B1 Yi9jcmwvY2FjcmwuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQBLpbeqzOem/QUX9uB0 HZb0E93ar7thWxDtawdqaoEwbJ8mamyzm0TQlRjdU1za8OVVG27Ej+MzhNfBiR15 w/ooQUVox5iLw/m4NAiKh+MbY5Tkidi1BaEwCGIz6WiiPcsIptqD8CpfgpKIkoa3 smBNg/ZIcGl/Kbp2xqhmjjKjMeywGYm0BBab+gNAs9ahJDA9ZyainAT8opsqgD9/ i94/W1NcDNPOIlHwkIzHgmS5i1po2Ek2uRLt1RLkWutm9O9IkJQ7U5f6hstL9Cui PgaAAXfBa531reGwQhcGJKb5/nlRJasByMkXnOhJaIdkNNpr91jk5Pe6//1figze yHxb -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/MaGrid.crl_url0000664001343500074740000000004613614364123024617 0ustar davidgdavidghttp://ra.magrid.ma/pub/crl/cacrl.pem igtf-policy-installation-bundle-1.104/src/accredited/MaGrid.signing_policy0000664001343500074740000000037113614364123026173 0ustar davidgdavidg# @(#)$Id: 7b54708e.signing_policy,v 1.1 2007/11/13 15:36:50 pmacvsdg Exp $ access_id_CA X509 '/C=MA/O=MaGrid/CN=MaGrid CA' pos_rights globus CA:sign cond_subjects globus '"/C=MA/O=MaGrid/CN=MaGrid CA" "/C=MA/O=MaGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/MaGrid.namespaces0000664001343500074740000000061613614364123025277 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)7b54708e.namespaces # CA alias : MaGrid # subord_of: # subjectDN: /C=MA/O=MaGrid/CN=MaGrid CA # hash : 7b54708e.signing_policy # (generated automatically from 7b54708e.signing_policy) # TO Issuer "/C=MA/O=MaGrid/CN=MaGrid CA" \ PERMIT Subject "/C=MA/O=MaGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/MaGrid.info0000664001343500074740000000060713614364123024113 0ustar davidgdavidg# @(#)$Id: 7b54708e.info,v 1.2 2015/06/18 09:44:55 pmacvsdg Exp $ alias = MaGrid url = http://www.magrid.ma/ca crl_url = http://ra.magrid.ma/pub/crl/cacrl.pem ca_url = http://ra.magrid.ma/pub/cacert/cacert.pem email = magrid@cnrst.ma status = accredited:classic version = 1.104 sha1fp.0 = 65:AD:EF:26:0B:4A:5C:05:72:3F:B6:92:99:0B:96:CA:7B:99:6E:F4 subjectdn = "/C=MA/O=MaGrid/CN=MaGrid CA" igtf-policy-installation-bundle-1.104/src/accredited/NCSA-slcs-2013.pem0000664001343500074740000000260313614364124024646 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID5jCCAs6gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx ODA2BgNVBAoTL05hdGlvbmFsIENlbnRlciBmb3IgU3VwZXJjb21wdXRpbmcgQXBw bGljYXRpb25zMSAwHgYDVQQLExdDZXJ0aWZpY2F0ZSBBdXRob3JpdGllczEYMBYG A1UEAxMPTXlQcm94eSBDQSAyMDEzMB4XDTEzMTAwMTEyMDAwMFoXDTMzMTAwMTEy MDAwMFowgYMxCzAJBgNVBAYTAlVTMTgwNgYDVQQKEy9OYXRpb25hbCBDZW50ZXIg Zm9yIFN1cGVyY29tcHV0aW5nIEFwcGxpY2F0aW9uczEgMB4GA1UECxMXQ2VydGlm aWNhdGUgQXV0aG9yaXRpZXMxGDAWBgNVBAMTD015UHJveHkgQ0EgMjAxMzCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALMXxVIXjNUleDa13MZ7oBIvIi0I 17bt156tTixGnd3WjtYdNJBEw4iCnAoB0fhxGTXqrU2BjEa/b19P+pgCViCXRvK+ thE3lp32D2i2B/L5kao/qpStnbhQFviw4wpZuhtrho98EARNXbXKDTLuj1QSPwDk gaLv3tImiWQFMroE0XuTuKLvnDVOGLyuieKtjntdCLDNKZ0RLhj+CA8gozspGyp/ fz9zxb/wR4dBmDbgxZnVY+mqa5zf+0aHsswL62+CtGLlS1uVwaJJFknk56q2QSVJ jrzwOqjurq3sSBM0zMB7ws4V4RcEmzKl4JtDoK3EULWb56R1WlPN6EXVpnkCAwEA AaNjMGEwHQYDVR0OBBYEFB8vWYRvh04Y2sMBhRWyjEK6/KeyMB8GA1UdIwQYMBaA FB8vWYRvh04Y2sMBhRWyjEK6/KeyMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4IBAQBhqwBAg3QYtIt241mOnWd65NbzigNS OGf5wSlvVetPrt5BN6tLsFPgDDMxrpclzzuHNz68hdHoNlPJraD5M6AhT6rrAjvQ 6+8yJuRXtnfe5C2kTbKzKbRxruL7ZsczRUpDkLc2ZoixWHy143kDsaXA6PUz/NZ5 93kRkKNS0nDWAUI4I4wtbecRLytezlClUbLkfoo6SnEfi3M68jVsjkl+NtMMJWh+ wMeW5ONpkdt/1ANVDQ1APwtOg+NhGyfPRqnNkzgbHFj4AB6aZgLX1GO3Nentfvm4 jVTV2ujRKxWf8wsdl+QD9BC2eCGoAwFDVHRTdgHlw4BnQFSoAB2Umwsj -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/NCSA-slcs-2013.crl_url0000664001343500074740000000013713614364124025527 0ustar davidgdavidghttp://crl-ncsa.ncsa-security.net/myproxy2013.crl http://crl.ncsa.illinois.edu/myproxy2013.crl igtf-policy-installation-bundle-1.104/src/accredited/NCSA-slcs-2013.signing_policy0000664001343500074740000000036613614364124027106 0ustar davidgdavidgaccess_id_CA X509 '/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=MyProxy CA 2013' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=National Center for Supercomputing Applications/CN=*"' igtf-policy-installation-bundle-1.104/src/accredited/NCSA-slcs-2013.namespaces0000664001343500074740000000105113614364124026200 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)7aa2b7bd.signing_policy.namespaces # CA alias : NCSA-slcs-2013 # subord_of: # subjectDN: /C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=MyProxy CA 2013 # hash : 7aa2b7bd.signing_policy # TO Issuer "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=MyProxy CA 2013" \ PERMIT Subject "/C=US/O=National Center for Supercomputing Applications/CN=.*" igtf-policy-installation-bundle-1.104/src/accredited/NCSA-slcs-2013.info0000664001343500074740000000074713614364124025027 0ustar davidgdavidgalias = NCSA-slcs-2013 url = https://security.ncsa.uiuc.edu/CA/ ca_url = https://security.ncsa.illinois.edu/CA/7aa2b7bd.0 crl_url = http://crl-ncsa.ncsa-security.net/myproxy2013.crl;http://crl.ncsa.illinois.edu/myproxy2013.crl email = security@ncsa.uiuc.edu status = accredited:slcs sha1fp.0 = 5E:48:9B:42:D3:63:5E:9A:8E:37:DF:D3:5E:73:62:4E:1C:C1:FA:F2 version = 1.104 subjectdn = "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=MyProxy CA 2013" igtf-policy-installation-bundle-1.104/src/accredited/NCSA-tfca-2013.pem0000664001343500074740000000261313614364124024620 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID7DCCAtSgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBhjELMAkGA1UEBhMCVVMx ODA2BgNVBAoTL05hdGlvbmFsIENlbnRlciBmb3IgU3VwZXJjb21wdXRpbmcgQXBw bGljYXRpb25zMSAwHgYDVQQLExdDZXJ0aWZpY2F0ZSBBdXRob3JpdGllczEbMBkG A1UEAxMSVHdvIEZhY3RvciBDQSAyMDEzMB4XDTEzMTAwMTEyMDAwMFoXDTMzMTAw MTEyMDAwMFowgYYxCzAJBgNVBAYTAlVTMTgwNgYDVQQKEy9OYXRpb25hbCBDZW50 ZXIgZm9yIFN1cGVyY29tcHV0aW5nIEFwcGxpY2F0aW9uczEgMB4GA1UECxMXQ2Vy dGlmaWNhdGUgQXV0aG9yaXRpZXMxGzAZBgNVBAMTElR3byBGYWN0b3IgQ0EgMjAx MzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALiJ+u/sGQjir6E9gjwC QojgY8dZcD4FOpPA3+OU20MRhqwMNEC3bLi1diEh35FIs+yZI5Qt/32bl+1+qxjq 1KmOQBSMJ8bQWH6nHer21FyXEtz1DJ1IR3J92SM41wkvP8EBD5OQAUjBtcktsWOn 7CUfCvWAJRpFBOXpclTIs37MikX3fVmqmxp7yYPWIhFkoX5sIWpRJemgWZLXBLhx ULIzyWjF6HSbKrw0d4MnheXwD5CgzPnIxfQW4EAo3hZC1MNFYHrzwR4n7bNd3B1b S10CL7lGFjVH8PE07NWe8IC1eK3yChlBkcaEM9eoPAAC0lgSl66k5A3aIpHj0E8t 8O0CAwEAAaNjMGEwHQYDVR0OBBYEFJuzODkcK+B9v73JOFL8GvhYN5LYMB8GA1Ud IwQYMBaAFJuzODkcK+B9v73JOFL8GvhYN5LYMA8GA1UdEwEB/wQFMAMBAf8wDgYD VR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4IBAQBWV4raVnzlENKa7jd5kd/3 ZMWI6Brs5oAW5r9nnlyKZ0Xvhm8IfSllrg9zt/p/9chuaWgbRThWverXWcehqM+y ZzUaHGiBrxsuX0bPrqLjgb2xDXGjG74X/j4PVCfXsNaJHXKJfbaNN4X5rKshldLZ fwn3RXwPIEFqD6FB7dNN9wC1G/5gHpwJzcaj9kt9BTX2eHGNT4l9la1nSiPxmUY4 BYDCRWVXi6JbLOZH3Qe1Sf/AVNiQP8XXwv07B5Sl4jAz8webrY5EPx8/QcojB/sC CWBAcwJOgPzVgqFNYeiF+tzJ7IG7RPmrSM27ajyQ4XvDSqC+xvGhM0BCza8u+oXq -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/NCSA-tfca-2013.crl_url0000664001343500074740000000013113614364124025472 0ustar davidgdavidghttp://crl-ncsa.ncsa-security.net/tfca2013.crl http://crl.ncsa.illinois.edu/tfca2013.crl igtf-policy-installation-bundle-1.104/src/accredited/NCSA-tfca-2013.signing_policy0000664001343500074740000000037113614364124027053 0ustar davidgdavidgaccess_id_CA X509 '/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=Two Factor CA 2013' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=National Center for Supercomputing Applications/CN=*"' igtf-policy-installation-bundle-1.104/src/accredited/NCSA-tfca-2013.namespaces0000664001343500074740000000102113614364124026146 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)48c8f10a.namespaces # CA alias : NCSA-tfca-2013 # subord_of: # subjectDN: /C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=Two Factor CA 2013 # hash : 48c8f10a # TO Issuer "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=Two Factor CA 2013" \ PERMIT Subject "/C=US/O=National Center for Supercomputing Applications/CN=.*" igtf-policy-installation-bundle-1.104/src/accredited/NCSA-tfca-2013.info0000664001343500074740000000075413614364124024776 0ustar davidgdavidgalias = NCSA-tfca-2013 url = https://security.ncsa.illinois.edu/CA/ ca_url = https://security.ncsa.illinois.edu/CA/48c8f10a.0 crl_url = http://crl-ncsa.ncsa-security.net/tfca2013.crl;http://crl.ncsa.illinois.edu/tfca2013.crl email = security@ncsa.illinois.edu status = accredited:slcs version = 1.104 sha1fp.0 = 33:1A:3B:E7:4C:D7:58:62:E8:A8:19:4E:5D:BD:6F:D2:C7:6F:EA:0A subjectdn = "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=Two Factor CA 2013" igtf-policy-installation-bundle-1.104/src/accredited/NERSC-SLCS.pem0000664001343500074740000000254313614364125024215 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDzDCCArSgAwIBAgIJAPMczdjweWMmMA0GCSqGSIb3DQEBBQUAMGUxEzARBgoJ kiaJk/IsZAEZFgNuZXQxEjAQBgoJkiaJk/IsZAEZFgJFUzEgMB4GA1UECxMXQ2Vy dGlmaWNhdGUgQXV0aG9yaXRpZXMxGDAWBgNVBAMTD05FUlNDIE9ubGluZSBDQTAe Fw0xMzA1MDgxNjQ4MDVaFw0yODA1MDQxNjQ4MDVaMGUxEzARBgoJkiaJk/IsZAEZ FgNuZXQxEjAQBgoJkiaJk/IsZAEZFgJFUzEgMB4GA1UECxMXQ2VydGlmaWNhdGUg QXV0aG9yaXRpZXMxGDAWBgNVBAMTD05FUlNDIE9ubGluZSBDQTCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAL+hGwhrOnE0BibkKSEl7+7XDmS9mOWxCFbl r2Q1cu0RpMCxpyY22XgTRSV3bKf49RWUV6diWR5gLPk3nK4Cm/AYKucRxmtmVrwX TEcAitzT15ichnIF0R9GRrG7uLbx8Ton5QU5I/dvd6AfrB6+GsIynvN4I4LbAkok c812FzE1ELCh8RNJRxVI0BJgIzmujm/KEJKksTVqhtc19DIMVnb41YzquYz27UrX N1qxu9XqrL8Z5a+NpSKu0gMNkRZVkNNwS/H3vRVbm+Xsr0SFiyIqJzhw4zXDA5Pk gMd5NeF9Jx8IbM4ita9asu2plBrjBuTiWkbtOThf5+hW+qd6upUCAwEAAaN/MH0w DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFKX4xhqk BMvr0yMtlwAIe6tb+SzlMB8GA1UdIwQYMBaAFKX4xhqkBMvr0yMtlwAIe6tb+Szl MBoGA1UdEQQTMBGBD2NlcnRzQG5lcnNjLmdvdjANBgkqhkiG9w0BAQUFAAOCAQEA Q8P+Gg/2xDyvrk4+RJ6E8u/u/T/WDZsVWtjj7SsBqoWzcUGsX3AJ+VJxqD/TSC/a 4LMVrxv70rIhCa5YN8hnZEbtSD2pkYDNJcPiaIetjaR/LQt0rYj65O1hhyfLmcCN 8JyuJls4hVjgXevpmky4f/Kbm+eO+4DHSXuEyUOeVvWumUyAKY18It2c6UQO2VLY LLXuqPqUv7oMR+bm7CT+7XPeyAnLwdRZxNzSAPWzCpsxEcdWeZp5nqfY28w088YV lkVJxzERv3wrmHcigJwILo/pirIEAqHzc3/YDC47KRfZRSxRq9mF+sOnAh3oMDOZ JHbP+BrAaA7pJNa+NNSXUQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/NERSC-SLCS.crl_url0000664001343500074740000000006013614364125025066 0ustar davidgdavidghttp://certs.nersc.gov/certificates/b93d6240.r0 igtf-policy-installation-bundle-1.104/src/accredited/NERSC-SLCS.signing_policy0000664001343500074740000000272713614364125026455 0ustar davidgdavidg# $Id: b93d6240.signing_policy,v 1.1 2009/01/10 01:15:56 pmacvsmh Exp $ # Based-on-Id: 1c3f2ca8.signing_policy,v 1.2 2003/05/27 16:29:35 helm Exp $ # ca-signing-policy.conf, see ca-signing-policy.doc for more information # # This is the configuration file describing the policy for what CAs are # allowed to sign whoses certificates. # # This file is parsed from start to finish with a given CA and subject # name. # subject names may include the following wildcard characters: # * Matches any number of characters. # ? Matches any single character. # # CA names must be specified (no wildcards). Names containing whitespaces # must be included in single quotes, e.g. 'Certification Authority'. # Names must not contain new line symbols. # The value of condition attribute is represented as a set of regular # expressions. Each regular expression must be included in double quotes. # # This policy file dictates the following policy: # # The NERSC Online SLCS CA signs certificates in the NERSC domain # # Format: #------------------------------------------------------------------------ # token type | def.authority | value #--------------|---------------|----------------------------------------- # EACL entry #1| access_id_CA X509 '/DC=net/DC=ES/OU=Certificate Authorities/CN=NERSC Online CA' pos_rights globus CA:sign cond_subjects globus '"/DC=gov/DC=nersc/*"' # # End NERSC Online CA Policy igtf-policy-installation-bundle-1.104/src/accredited/NERSC-SLCS.namespaces0000664001343500074740000000074313614364125025553 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)b93d6240.signing_policy.namespaces # CA alias : NERSC-SLCS # subord_of: # subjectDN: /DC=net/DC=ES/OU=Certificate Authorities/CN=NERSC Online CA # hash : b93d6240.signing_policy # (generated automatically from b93d6240.signing_policy) # TO Issuer "/DC=net/DC=ES/OU=Certificate Authorities/CN=NERSC Online CA" \ PERMIT Subject "/DC=gov/DC=nersc/.*" igtf-policy-installation-bundle-1.104/src/accredited/NERSC-SLCS.info0000664001343500074740000000071613614364125024367 0ustar davidgdavidg# @(#)$Id: b93d6240.info,v 1.4 2015/06/18 09:44:56 pmacvsdg Exp $ # NERSC Online SLCS CA alias = NERSC-SLCS url = http://certs.nersc.gov/ ca_url = http://certs.nersc.gov/certificates/b93d6240.0 crl_url = http://certs.nersc.gov/certificates/b93d6240.r0 email = certs@nersc.gov status = accredited:slcs version = 1.104 sha1fp.0 = FC:19:5C:91:F7:4E:5F:72:8C:DF:B9:A3:4A:13:71:77:E9:7D:BC:C4 subjectdn = "/DC=net/DC=ES/OU=Certificate Authorities/CN=NERSC Online CA" igtf-policy-installation-bundle-1.104/src/accredited/NIIF-Root-CA-2.pem0000664001343500074740000000241113614364125024661 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDjDCCAnSgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBXMQswCQYDVQQGEwJIVTEN MAsGA1UECgwETklJRjEgMB4GA1UECwwXQ2VydGlmaWNhdGUgQXV0aG9yaXRpZXMx FzAVBgNVBAMMDk5JSUYgUm9vdCBDQSAyMB4XDTE1MDEyMzEzMDEwOFoXDTM1MDEy MzEzMDEwOFowVzELMAkGA1UEBhMCSFUxDTALBgNVBAoMBE5JSUYxIDAeBgNVBAsM F0NlcnRpZmljYXRlIEF1dGhvcml0aWVzMRcwFQYDVQQDDA5OSUlGIFJvb3QgQ0Eg MjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOV9CCo+qymXzS+66W5U W5JZq90AWKrxv437xOEjC/0FCRhDL0OhOdH0XN9ti65f4bbfv0I7MVpaQY99sShh GaNIgHPRMKml+2emudsYOKp6hMpnG27WwtMGF1SQGie71dKyaCTP78r3WVXkvY68 Gl79y6b1OObOWM700lx6Aou9wf6qEx6G6s8zudcHx6U2+4ttrHKJ4sxBkl3ziyZI y7cxCt28EomKrHD3pz+K7ywS8inG4P6Tnyas08468o/4PK4ZKxSkZjlyCZ8JfxVa fTs2Bsf/ikUThMZnGEYP8xP74oFtCgwQF8e1LufOdm7le5lkxq20IOoNyELLjvrA KhMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFAXHoMXsslJiya0qrwmq0eYuXwQxMB8GA1UdIwQYMBaAFAXHoMXsslJi ya0qrwmq0eYuXwQxMA0GCSqGSIb3DQEBCwUAA4IBAQCTksvjX9Kvmn6ngGPnEHOh Uf+/CekJpYzKQp3utyjM0J0lHpsxSd02XZ3D7WmA8LBufxCWp+fntzUAPoXpriRB huSxNGEOwCzwIXyTwyZFXd1VTp6mx8D1MUv4HpDaAxat5wUglVQSkaieJDQHoiRA 8ZWx+qCUPGdJfsuN/aqwEHidnxGekEDyV8M+N2Xh57QrjIZAa2/JIr96Ek6tnIwF RO+gbxH3e+2EqBlG22/4YoxD77NHy5ElfQPn/O/ADt52BCGGGMIMhzXMIkW7Q2s7 XM47cGAGw+ccMokID946cVYmmlAjNdIx5pFO0rCnRSIZOsw1Z3gVWYIulOEe31iS -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/NIIF-Root-CA-2.crl_url0000664001343500074740000000004113614364125025537 0ustar davidgdavidghttp://crl2.ca.niif.hu/cacrl.der igtf-policy-installation-bundle-1.104/src/accredited/NIIF-Root-CA-2.signing_policy0000664001343500074740000000060313614364125027116 0ustar davidgdavidg# EACL - NIIF Root CA 2 (2015) # @(#)$Id: 58435df6.signing_policy,v 1.1 2015/02/10 14:38:18 pmacvsdg Exp $ # access_id_CA X509 '/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2' pos_rights globus CA:sign cond_subjects globus '"/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2" "/C=HU/O=NIIF CA/OU=GRID/*" "/C=HU/O=NIIF CA/OU=NIIF/OU=GRID/*"' igtf-policy-installation-bundle-1.104/src/accredited/NIIF-Root-CA-2.namespaces0000664001343500074740000000111313614364125026215 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)58435df6.namespaces # CA alias : NIIF-Root-CA-2 # subord_of: # subjectDN: /C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2 # hash : 58435df6 # (generated automatically from 58435df6.signing_policy) # TO Issuer "/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2" \ PERMIT Subject "/C=HU/O=NIIF CA/OU=GRID/.*" TO Issuer "/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2" \ PERMIT Subject "/C=HU/O=NIIF CA/OU=NIIF/OU=GRID/.*" igtf-policy-installation-bundle-1.104/src/accredited/NIIF-Root-CA-2.info0000664001343500074740000000067513614364125025045 0ustar davidgdavidg# # @(#)$Id: 58435df6.info,v 1.2 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA NIIF 2 alias = NIIF-Root-CA-2 ca_url = http://crt.ca.niif.hu/niif-ca-root.crt crl_url = http://crl2.ca.niif.hu/cacrl.der email = ca@niif.hu status = accredited:classic url = http://www.ca.niif.hu/ version = 1.104 sha1fp.0 = 16:06:17:A7:79:5B:55:12:11:48:0B:28:22:09:8B:AA:AC:05:25:30 subjectdn = "/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2" igtf-policy-installation-bundle-1.104/src/accredited/NIKHEF.pem0000664001343500074740000000325013614364125023541 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEvDCCA6SgAwIBAgIBADANBgkqhkiG9w0BAQUFADBSMQswCQYDVQQGEwJOTDEP MA0GA1UEChMGTklLSEVGMTIwMAYDVQQDEylOSUtIRUYgbWVkaXVtLXNlY3VyaXR5 IGNlcnRpZmljYXRpb24gYXV0aDAeFw0wMTA5MjEwMDAwMDBaFw0yMTAyMDkwMDAw MDBaMFIxCzAJBgNVBAYTAk5MMQ8wDQYDVQQKEwZOSUtIRUYxMjAwBgNVBAMTKU5J S0hFRiBtZWRpdW0tc2VjdXJpdHkgY2VydGlmaWNhdGlvbiBhdXRoMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo9zA5ZEydcswKgBd4ZwPea5DRDC+5H3U 6nZt+5vd4aG2H3tdNS11+9v065QLdCmO17+Wi5M+2iRPXLMvvKPvNMXZ/05R6pe8 xGo/6zDWyZZYH+W85eyR5HT76t/YMQsVUtTbLC/qZFs1iTXeEs0gfKYcSS0KnrHn ipNPzCWjCVlaHsGyJdrUycGPocllMM6as3mUyMvIgroDl27TQ6YQQuqg8yoBWANg KlIesRBVqzjVk9H6niqfIEdC4+vQiSNZuzMISGLTX2h4zXPe6C7MbQqLw3BJ9DDU DXzl0GXmhsVN5i8nMs1I4XHOMO7CmAqe1Q8SCpqd5AOLuj5lInMi9QIDAQABo4IB mzCCAZcwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwGgYDVR0RBBMw EYEPY2FAZHV0Y2hncmlkLm5sMB0GA1UdDgQWBBRbBTqZxtUivf2UgPwRqNDxcdZL pDA4BgNVHR8EMTAvMC2gK6AphidodHRwOi8vY2EuZHV0Y2hncmlkLm5sL21lZGl1 bS9jYWNybC5wZW0wEQYJYIZIAYb4QgEBBAQDAgAHMDYGCWCGSAGG+EIBBAQpFido dHRwOi8vY2EuZHV0Y2hncmlkLm5sL21lZGl1bS9jYWNybC5wZW0wNAYJYIZIAYb4 QgEIBCcWJWh0dHA6Ly9jYS5kdXRjaGdyaWQubmwvbWVkaXVtL3BvbGljeS8wfgYJ YIZIAYb4QgENBHEWb0R1dGNoR3JpZCBhbmQgTklLSEVGIG1lZGl1bS1zZWN1cml0 eSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTsgcG9saWNpZXMgYXQgaHR0cDovL2Nh LmR1dGNoZ3JpZC5ubC9tZWRpdW0vcG9saWN5LzANBgkqhkiG9w0BAQUFAAOCAQEA fT4RR/O6b9g5mClM+y/vXo0wZ20/ogtPeha1tTaoYe+sDEEy3u4qLB1TLtiBCiK6 rHLZLGfdcO210RUGKj6KAWGdW1u3p+Pf3V++2DYnQRS5lQe+ppj9RbR4l4ZK8RAq 5LWIqYTT4IXPgIb1QvAXQA1BWCuKDWB/UOovTf/jWdO7q8KfmSwKUbdlWthe4/G6 WWL5xDxUNsRoSgBIbZFYTRvzTKNu2typNtwGNNx5xcu0iAuus2s8BhNszjBBQhZX nv5J34YyqWMlM8eEOUUNccKgKGYdNQmFKy+yN7YvdDI5VQX2ZzMCKzpxt+2yGZeB Smk3tHQNETv7xFS7Ebua/A== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/NIKHEF.crl_url0000664001343500074740000000005013614364125024415 0ustar davidgdavidghttp://ca.dutchgrid.nl/medium/cacrl.pem igtf-policy-installation-bundle-1.104/src/accredited/NIKHEF.signing_policy0000664001343500074740000000052613614364125026000 0ustar davidgdavidg# EACL - NIKHEF medium-security X.509 authority access_id_CA X509 '/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth' pos_rights globus CA:sign cond_subjects globus '"/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" "/O=dutchgrid/O=users/*" "/O=dutchgrid/O=hosts/*" "/O=dutchgrid/O=robots/*"' igtf-policy-installation-bundle-1.104/src/accredited/NIKHEF.namespaces0000664001343500074740000000116613614364125025103 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)16da7552.namespaces # CA alias : NIKHEF # subord_of: # subjectDN: /C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth # hash : 16da7552 # TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=users/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=hosts/.*" TO Issuer "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" \ PERMIT Subject "/O=dutchgrid/O=robots/.*" igtf-policy-installation-bundle-1.104/src/accredited/NIKHEF.info0000664001343500074740000000100513614364125023707 0ustar davidgdavidg# # @(#)$Id: 16da7552.info,v 1.5 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA NIKHEF # alias = NIKHEF ca_url = http://ca.dutchgrid.nl/medium/cacert.pem crl_url = http://ca.dutchgrid.nl/medium/cacrl.pem policy_url = http://ca.dutchgrid.nl/medium/policy/ email = ca@dutchgrid.nl status = accredited:classic url = http://ca.dutchgrid.nl/medium/ version = 1.104 sha1fp.0 = E5:FA:C3:3B:44:8F:26:1B:3D:D1:DE:BA:5F:EC:ED:35:A9:3F:23:21 subjectdn = "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" igtf-policy-installation-bundle-1.104/src/accredited/NorduGrid-2015.pem0000664001343500074740000000433513614364126025065 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGXjCCBEagAwIBAgIBADANBgkqhkiG9w0BAQsFADBUMQ0wCwYDVQQKDARHcmlk MRIwEAYDVQQKDAlOb3JkdUdyaWQxLzAtBgNVBAMMJk5vcmR1R3JpZCBDZXJ0aWZp Y2F0aW9uIEF1dGhvcml0eSAyMDE1MB4XDTE1MTEyNDE1MTExNloXDTM1MTExOTE1 MTExNlowVDENMAsGA1UECgwER3JpZDESMBAGA1UECgwJTm9yZHVHcmlkMS8wLQYD VQQDDCZOb3JkdUdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMjAxNTCCAiIw DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALW/ewLoogqRmdxDZxFXQcgvx48N BX494mJUK95K6cHrZJ1U4Z9IhuHhmMknog0h/jYMgRaR14HVjXKn/QKKdilFWCzp ASsb/lRxqHKIZAYLk8HUkYeNjvcMSEqZI4gPKNSl/poyWlpHVXuJuqJD3/quNSgb vzt1cI6VdCKVbSZ1KDM76QNvnjpUj4birh14bkpCeahjDI/zelAQhUubyKDYwAkH x1tVN/RPtpux5RIl/P7dOvH4QcE44GWm3AkGw/0gxrfhAkRQBfZ0njne97Oq8K+K zSMHgMVi/JvZDU80ArzWi66v/HmGJLO13Tgz/SN/MTmtAoakgv5aMLA8L34SYZih smKm30RZUhEB99i1/IejFsgNUNIs01HdmPTULZL6xozSH5n0LE2NbYxq/ahDgQ8B ilKUQVJTQBXB0hJ2NtzyLvV/GcJ7MJsDQePAyrGVl5tfwIDcBmzh++QjqFxlHRF0 Hf/NkHU4rRlPjYdoollE7VAKNLiNNZ9Jcwe6UgiRNvAP4jmmYddpSedcJZo1tEPS /CFDvHZ+s6AKhxAuyMAMTgheDLYjtxHcSUw13kZDYJ9iRhdzcGO20ux3IGE1wOFM 2uUuWT67nP/cXRN/QgqpUhI5UY5pX2rfGv1drtpD6W3q21CyexLs4GYhDBIqZ9Vv 3mn7fBT2t/zvlVoZAgMBAAGjggE5MIIBNTAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud DwEB/wQEAwIBhjAdBgNVHQ4EFgQUhxfCjzhHZGovRhWHWjTO8VkZllwwfAYDVR0j BHUwc4AUhxfCjzhHZGovRhWHWjTO8VkZllyhWKRWMFQxDTALBgNVBAoMBEdyaWQx EjAQBgNVBAoMCU5vcmR1R3JpZDEvMC0GA1UEAwwmTm9yZHVHcmlkIENlcnRpZmlj YXRpb24gQXV0aG9yaXR5IDIwMTWCAQAwGwYDVR0RBBQwEoEQY2FAbm9yZHVncmlk Lm9yZzAbBgNVHRIEFDASgRBjYUBub3JkdWdyaWQub3JnMDsGA1UdHwQ0MDIwMKAu oCyGKmh0dHA6Ly9jYS5ub3JkdWdyaWQub3JnL05vcmR1R3JpZC0yMDE1LmNybDAN BgkqhkiG9w0BAQsFAAOCAgEAiVW/c7/soiCVdj35mIihVdid7jfBXniSaBkDyQuv BX77S2nhWPNBJZd/JXzRQu+kZ6c8N6T0FLJ9IELGJkrB9n8Gy1Q4dPcqfRWqIYZ8 aQZigRRnc7vrkFuB01bGYnsFOAIFf+qcaxhFmzE1AquWAH2J6/Ql8emTCbR2bOTL xvbPPNwV+Ye2PZUU5x3jrKxHqFpN/R5YiC3tvxKKU2KXPq4yopvfFy7NfyLK9SyN YaR196IdUJfg5JwxD1b/Ee4jFaTdfMaoF2jdPfcl3MVZuMJVG8Q9YhRW6U54F8D7 FqR7GCkY88iDXk+VaRbyltF99PyPL6tyj2bHvjeqRau7o9qB8q60sUq3dJnzkLML DIAqpPCNWKDHM0QkN1fF7ucyVJWJzMXt7oFPKKUqB1Anse5x6kRzqMAT4F1H6PIc zrarbDYowyt6SoKPTDX+Abwu8NuljfH7VBUNSBBx9oXVOMwehJzaRB8/HRBvdtt7 Kiz1hJ7edfb+H3/YpnE5VWxQrKfn42bxVw5RpG1o0YMryBZL0QUoBnY/8hbmSSl8 nrGQeNSkL5SxrMbiR5lHR6M5s49tC1SuVpQH0JeP3R4f+G4xylF2SB3O7Jmlm1PG Kh6/qmXeYOjhU/xjEwnJ1912wDIDsIeLu1P6hm+swWa5Auf6lmWBOATv13MmcpZU gZA= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/NorduGrid-2015.crl_url0000664001343500074740000000005313614364126025737 0ustar davidgdavidghttp://ca.nordugrid.org/NorduGrid-2015.crl igtf-policy-installation-bundle-1.104/src/accredited/NorduGrid-2015.signing_policy0000664001343500074740000000027213614364126027315 0ustar davidgdavidg# EACL NorduGrid 2015 CA access_id_CA X509 '/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015' pos_rights globus CA:sign cond_subjects globus '"/O=Grid/O=NorduGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/NorduGrid-2015.namespaces0000664001343500074740000000075613614364126026426 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)NorduGrid2015.namespaces # CA alias : NorduGrid-2015 # subord_of: # subjectDN: /O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015 # hash : NorduGrid2015.signing_policy # (generated automatically from NorduGrid2015.signing_policy) # TO Issuer "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015" \ PERMIT Subject "/O=Grid/O=NorduGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/NorduGrid-2015.info0000664001343500074740000000063413614364126025235 0ustar davidgdavidg# Information for CA: NorduGrid-2015 alias = NorduGrid-2015 ca_url = http://ca.nordugrid.org/NorduGrid-2015.crt url = http://ca.nordugrid.org/ email = ca@nordugrid.org crl_url = http://ca.nordugrid.org/NorduGrid-2015.crl status = accredited:classic version = 1.104 sha1fp.0 = 7D:4E:B2:72:27:1D:CB:FF:04:67:59:F0:60:27:22:2B:B8:02:98:EF subjectdn = "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015" igtf-policy-installation-bundle-1.104/src/accredited/PK-Grid-2007.pem0000664001343500074740000000360713614364126024367 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFYTCCA0mgAwIBAgIFcaAWAgAwDQYJKoZIhvcNAQELBQAwMDELMAkGA1UEBhMC UEsxDDAKBgNVBAoTA05DUDETMBEGA1UEAxMKUEstR1JJRC1DQTAeFw0wNzEyMTIx MTEzMjBaFw0yNzEyMTExMTEzMjBaMDAxCzAJBgNVBAYTAlBLMQwwCgYDVQQKEwNO Q1AxEzARBgNVBAMTClBLLUdSSUQtQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw ggIKAoICAQC2Bw8/6zB1+ELE8QOadL5oORDmTYZ7WAFJWk8CHYAptGCuMuWxPDrB knhjd4MmdRqnWx+YLtdGwFF3AZZbylPyL0BIriXWF3hxES5kWmb3qZddpS7jVZqt hb5B7zxVl2k3XWx7XZxiO2zbaefLwGpS2alByMC/DfYOl5MvCgTNAPa7zJoqfXYS KLOj/6MLQBDZRxepkR9SgEKpi2294o+T3D0DpDUKwJ4NfHBFsQpWk/ciZLAYtbMp w9rQ3FlhDPRR2moY5WrR3gTN9q07XnTzpi61j0RG8iNIAk0XLaFvltxJMYmoszIa F23lbv6zPSyQLkYyWJ5Zsp7bRJuA5V4HAl0WhCjCg8T8OtK/uR5LCEa5btVsY1rP ETSewndAI5FK8p5rdOZTH9IUQ9jRH4cT7W+DbVtuPw4mvBOFg+bn+r6qOvLF375p gXzsa7ZaxJqtPw6RTFhgoO3/y+QyauQYXG6tqDhYsO67w6VMtSigQiELCe8H4bT0 cCF9YHDGUqZxIfXJvdU2LHvbd+HBJgGG74ixodYGyMk8HBkZPIcl45ykSKSJTeyv byuz2IoouIduLnCWXyzMr7ML9aFh9knKxlUY3eXFZXDecGvcpinLwRJGilGTLlux fmlvNyluKM7fKTaHD4rJT3mw9lT4a5Pbeci6i8+SKrtMxNXxflrtMwIDAQABo4GB MH8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwQgYDVR0fBDswOTA3 oDWgM4YxaHR0cDovL3d3dy5uY3AuZWR1LnBrL3BrLWdyaWQtY2EvMjAwNy9DUkwv bmNwLmNybDAYBgNVHREEETAPgQ1jYUBuY3AuZWR1LnBrMA0GCSqGSIb3DQEBCwUA A4ICAQBoGRnN0Cf+HqNJB5eCDP7fsOeckeQ7077fxKs5xAi7x3vuxU6M35UfgXQ6 1kqi2D9i+ZAseBubxxlagRGKdTyExQw1RoZvOHev7oJ+l11fjyVzSw1LQ51s7EOH LxEJBNlKnYm/S3WAgfcNAzffK4sisubFjEcv+CFuN0U7GunJT3w9SyHRVOLd9M8t ROLoRuFARdK+SimWDZqG4vGoJpLNsJ6AVjBRMOXMC+h13emHOAiP1G3w7XLmnTMV U/BSz5gIT+KRw7uk+TYFaHJQ6PU6bU44ILeA4ftJR+SQpt/EUkgUb2wK59Vjvmc/ p7BvrNXBfUeRO8ivToNIpy++uLzR+l5NSotI65FRhCa+qb9jllldMqXGXp7+N8bo HISfonhr6pNvpMvusnnQvkH5pEBtnJQh96pxI0WemAvV64Da3szW6BtlVhv5/4uq 6yoe/ZAZf8wxCa+V2hMzwX7J1RhWf6QISS0CEXKd1vfzEDvmOH6Jy+Y97EvFfvkR +yzlWOks+6QrTumMMHci7fWCnieFFogD6zUYekWAbVz1E6fn38zabavgGA+9QvlP n+U7xWoIjtB4tr0V8VPu8O4m+qK/rHva00kil1m6f8o5r6MeRlgQMHWv8hrwY762 2OGs7OEBrOv4WFPJ0a1sKmIA1cDcAYWZNISXJLXaDwsHZw3v+A== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/PK-Grid-2007.crl_url0000664001343500074740000000006213614364126025240 0ustar davidgdavidghttp://www.ncp.edu.pk/pk-grid-ca/2007/CRL/ncp.crl igtf-policy-installation-bundle-1.104/src/accredited/PK-Grid-2007.signing_policy0000664001343500074740000000036713614364126026623 0ustar davidgdavidg# ca-signing-policy.conf # @(#)$Id: f5ead794.signing_policy,v 1.1 2008/01/12 19:00:50 pmacvsdg Exp $ access_id_CA X509 '/C=PK/O=NCP/CN=PK-GRID-CA' pos_rights globus CA:sign cond_subjects globus '"/C=PK/*"' igtf-policy-installation-bundle-1.104/src/accredited/PK-Grid-2007.namespaces0000664001343500074740000000057013614364126025721 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)f5ead794.namespaces # CA alias : PK-Grid-2007 # subord_of: # subjectDN: /C=PK/O=NCP/CN=PK-GRID-CA # hash : f5ead794 # (generated automatically from f5ead794.signing_policy) # TO Issuer "/C=PK/O=NCP/CN=PK-GRID-CA" \ PERMIT Subject "/C=PK/.*" igtf-policy-installation-bundle-1.104/src/accredited/PK-Grid-2007.info0000664001343500074740000000065513614364126024541 0ustar davidgdavidg# # @(#)$Id: f5ead794.info,v 1.3 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA PK-Grid-2007 (supersedes d2a353a5) alias = PK-Grid-2007 crl_url = http://www.ncp.edu.pk/pk-grid-ca/2007/CRL/ncp.crl url = http://www.ncp.edu.pk/pk-grid-ca/ email = pkgrid-ca@ncp.edu.pk status = accredited:classic version = 1.104 sha1fp.0 = A9:39:DC:47:B9:AC:C9:22:88:59:DC:25:C7:62:AE:24:CC:89:37:45 subjectdn = "/C=PK/O=NCP/CN=PK-GRID-CA" igtf-policy-installation-bundle-1.104/src/accredited/PKIUNAMgrid.pem0000664001343500074740000000435113614364126024553 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGZzCCBE+gAwIBAgIIFIqHks3e8BEwDQYJKoZIhvcNAQELBQAwRTELMAkGA1UE BhMCTVgxDTALBgNVBAoMBFVOQU0xETAPBgNVBAsMCFVOQU1ncmlkMRQwEgYDVQQD DAtQS0lVTkFNZ3JpZDAeFw0xNzExMTAxNzUxMTFaFw0yNzExMTAxNzUxMTFaMEUx CzAJBgNVBAYTAk1YMQ0wCwYDVQQKDARVTkFNMREwDwYDVQQLDAhVTkFNZ3JpZDEU MBIGA1UEAwwLUEtJVU5BTWdyaWQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQDD4w99tPCEUAiTx9zxQFleb8Hh7zZ1+riB/5+h7nQ+S3U0watf+Dry75+b Cq+iwJCtdal+e3W+QgvSNxICL9CsbcKShSLEomduW7C4OvV5cH1tyzZnN+/D46pm ibj6/JmnUZP0/pbqwhhisiPvI7fVY9z4Re9DoTXcJMaukKcxSHRwU8c6xLMHteIi A62bZBDnVCGMR4rnxcS6Qsl8PRBYaZkLmPLq6imYP72eNtOvq2WdIxWLaGcFjcHU psuIEP6o0gk/FC6bvQjaHp/cVC91CLU7tge4uVQ/RyGqtvWk1xdo93AvzXGMqkkC yTayZR6NhZEMcY9cf0W+K4BCSXVuYTiERGBKDEi5NDg+TpITtPXvvCBCc3obC+dA 8PPzD0gSYZM2rjJhDq8+4bvU07ROCPavV0deYPr9jXO6hcZ9whDgNGtA4EAAcLDY CcqhhyoNjY2vGh9W92EyqlfmHiUL+aaSj4n2NCFqYSdhIko1Eba4V2dUjIQ8VIzl hmEcpkXVGaYkCZgHTNOHp3FB2CIwRXtHEVRZ4G4IO80gf91ng1Olh7//sALARo9o GppbvkoKI6VaDq+5wEMIkxctWfprEaNvaOOD57/R52QebNcinQRbiAxY8dF0UIj8 t0q+n4imNklqjuqwyUZvCa3UgEKNPsP+nj0VbpvKMcdscHtB/QIDAQABo4IBWTCC AVUwUgYIKwYBBQUHAQEERjBEMEIGCCsGAQUFBzABhjZodHRwOi8vY2EudW5hbWdy aWQudW5hbS5teC9lamJjYS9wdWJsaWN3ZWIvc3RhdHVzL29jc3AwHQYDVR0OBBYE FBZpd5IKlwEEES6+IV7PxHx4uXkuMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgw FoAUFml3kgqXAQQRLr4hXs/EfHi5eS4wWAYDVR0gBFEwTzBNBglghkgBhvhCAQgw QDA+BggrBgEFBQcCARYyaHR0cDovL2NhLnVuYW1ncmlkLnVuYW0ubXgvZWpiY2Ev Z3JpZDIvQ1BfQ1BTLmh0bWwwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2NhLnVu YW1ncmlkLnVuYW0ubXgvcHViL2NybC91bmFtZ3JpZC1jcmwuY3JsMA4GA1UdDwEB /wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAqGT3fFvgVTMhmivBYJCKF1Tlryn5 maTa+nOmKfWZwDKFS6R79Soe50dNKnbvmt3dw9k1xvvUvpfEk2bAwJBsKsoil2Un b24UwQQh7t2xyvuNQbY0TZMQIGcLQhWz3uZ1uQDiC5zGLVIuf/LMMwJb53zNDdqJ C0gA5letRsnlxEIS9DVonS2RTFlBKWPSRIhHGMPD7xBTlmfTfWJd94a/ylxerAzF X05vKtPK22gkRrRFmkcQqMOVrTSJaCJQ9yDC4CySc5oSC55nChCiaLxifCl1Of7G kJMViCxM/CSbvz1jQwwaJ4n1gDGeXtT5E9niZ8E0Lw+hUNcJT6/+al+IajxHhmCa 97JlbvgQex9h/DP/Zfu/wyLbD/6uuWtHgSmZh+E2J4wml1wumC92Wu0Lzg7SjPFK /sk07BwhH3iJ13sb0MmJfzWkakXVu4cWGN1UEBGIhJX2npnmozZF9IdHGWOOgXQV dW32eNWNEClZJ1/hfQCANGtOuW4PU0jVFvRc2/37sym88gxsA7vuuoODG9dCOzmU FoGtDtQsCByu8sRq5h7feDXleHc4601BunD4DRfkewcJSLSrjQhlprdUpR0ltgV7 aenvcb8TnMn8NSLNGRJAJRmvMBrpDbbqKjKNBLUA41LZ6wLMN0lyqZwlG51mC2YX sPtFxVT/AvO00Ww= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/PKIUNAMgrid.crl_url0000664001343500074740000000006413614364126025431 0ustar davidgdavidghttp://ca.unamgrid.unam.mx/pub/crl/unamgrid-crl.crl igtf-policy-installation-bundle-1.104/src/accredited/PKIUNAMgrid.signing_policy0000664001343500074740000000041013614364126026777 0ustar davidgdavidg# @(#)$Id: PKIUNAMgrid.signing_policy,v 1.1 2017/11/10 13:04:58 pmacvsdg Exp $ # access_id_CA X509 '/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid' pos_rights globus CA:sign cond_subjects globus '"/C=MX/O=UNAMgrid/*" "/C=MX/O=UNAM/OU=UNAMgrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/PKIUNAMgrid.namespaces0000664001343500074740000000104013614364126026101 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)PKIUNAMgrid.signing_policy.namespaces # CA alias : # subord_of: # subjectDN: /C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid # hash : PKIUNAMgrid.signing_policy # (generated automatically from PKIUNAMgrid.signing_policy) # TO Issuer "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" \ PERMIT Subject "/C=MX/O=UNAMgrid/.*" TO Issuer "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" \ PERMIT Subject "/C=MX/O=UNAM/OU=UNAMgrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/PKIUNAMgrid.info0000664001343500074740000000107013614364126024720 0ustar davidgdavidg# # @(#)$Id: PKIUNAMgrid.info,v 1.2 2018/01/11 20:00:06 pmacvsdg Exp $ # Information for 2017 UNAMgrid CA # alias = PKIUNAMgrid url = http://ca.unamgrid.unam.mx/ ca_url = https://ca.unamgrid.unam.mx/ejbca/publicweb/webdist/certdist?cmd=cacert&issuer=CN%3dPKIUNAMgrid%2cOU%3dUNAMgrid%2cO%3dUNAM%2cC%3dMX&level=0 crl_url = http://ca.unamgrid.unam.mx/pub/crl/unamgrid-crl.crl email = camanager@unam.mx status = accredited:classic sha1fp.0 = 1D:05:8F:6A:75:5A:A8:36:12:88:22:D2:8A:3A:31:EA:6C:2B:5A:B8 version = 1.104 subjectdn = "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" igtf-policy-installation-bundle-1.104/src/accredited/PSC-Myproxy-CA.pem0000664001343500074740000000265413614364127025201 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEBDCCAuygAwIBAgICAIwwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVVMx KTAnBgNVBAoTIFBpdHRzYnVyZ2ggU3VwZXJjb21wdXRpbmcgQ2VudGVyMRcwFQYD VQQDEw5QU0MgTXlQcm94eSBDQTAcFw0xNjAyMTcyMDUwMzZaFwsyNjAyMTkwNTAw WjBRMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgUGl0dHNidXJnaCBTdXBlcmNvbXB1 dGluZyBDZW50ZXIxFzAVBgNVBAMTDlBTQyBNeVByb3h5IENBMIIBIjANBgkqhkiG 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr1dSJmCj6kXR9K0bQoU72IuPC6bD1DwoA3b5 DJcDpBNxxKrgCy9KW3CXk42Bc/Sh4Hg6Y2ktCaq7W+zwoRMwB1lmJdGW4E1Mzqod 8f0dpxBwxpIh1Mk9QrbrpqdfPHmzgHg4n7orMG43/EvgcYuXENngeYd1x4KcB9qh WiWVV6EcjMhNWeye+aKbEw/5fGfXjT+tPoioTZUkf/QochCBLCC2Z1niv1i2iVaa XCJpaYJU8ddHeR5Qgk/oTtlnFPY/1HDeTNGVcmgtg+ZsiINIV0+/vqEBSvzXcqWj YJDiLYf0IgH9BTzB0uuyrnm+S4TuPdYVEo2TZujkT1D9tHzkJwIDAQABo4HnMIHk MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQjktjn eWw1Ul9QEhcJuSCb8pdjCDAfBgNVHSMEGDAWgBQjktjneWw1Ul9QEhcJuSCb8pdj CDAbBgNVHREEFDASgRBjYS1hZG1pbkBwc2MuZWR1MGQGA1UdHwRdMFswLKAqoCiG Jmh0dHA6Ly93d3cucHNjLmVkdS9jYS9jcmwvNGIyNzgzYWMuY3JsMCugKaAnhiVo dHRwOi8vd3d3LnBzYy5lZHUvY2EvY3JsLzRiMjc4M2FjLnIwMA0GCSqGSIb3DQEB CwUAA4IBAQClj/F2BGiabKsA5+ddWduFWKxb7J4ER9OtAEvNbvb7IJBL0cnw/rnN frLLzHiI0uEY5MIW3V+OprGFzF55GeOkzMh59zlHIcP6EmUonvqksy9gslEU44Cz 6I8U2BmuYT5Q4ZxuaVQvIDsQ/XUiPCltTgdwFovDuwNxBc/gkxhsVwwKsOMPif+W 218rPM5kQys9AphY5OvtY9/009tI2Pq/tgEb3NWa6vTsPNFlJMh1mfHRYBv8tJLq 1x+U2gBwU0tm5VPwh6Z9soYY3bW/AuDT9BJ6MAO8Nl4bFp2ctvfFmNLBBw87mvlI Kg8Pe1aup62NIK1lQ6JlwsBDl+K/vbHi -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/PSC-Myproxy-CA.crl_url0000664001343500074740000000004713614364127026054 0ustar davidgdavidghttp://www.psc.edu/ca/crl/4b2783ac.crl igtf-policy-installation-bundle-1.104/src/accredited/PSC-Myproxy-CA.signing_policy0000664001343500074740000000032213614364127027423 0ustar davidgdavidg access_id_CA X509 '/C=US/O=Pittsburgh Supercomputing Center/CN=PSC MyProxy CA' pos_rights globus CA:sign cond_subjects globus '"/C=US/O=Pittsburgh Supercomputing Center/CN=*"' igtf-policy-installation-bundle-1.104/src/accredited/PSC-Myproxy-CA.namespaces0000664001343500074740000000070413614364127026531 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)4b2783ac.signing_policy.namespaces # CA alias : PSC-MyProxy-CA # subord_of: # subjectDN: /C=US/O=Pittsburgh Supercomputing Center/CN=PSC MyProxy CA # hash : 4b2783ac.signing_policy # TO Issuer "/C=US/O=Pittsburgh Supercomputing Center/CN=PSC MyProxy CA" \ PERMIT Subject "/C=US/O=Pittsburgh Supercomputing Center/CN=.*" igtf-policy-installation-bundle-1.104/src/accredited/PSC-Myproxy-CA.info0000664001343500074740000000072313614364127025346 0ustar davidgdavidg# Information for /C=US/O=Pittsburgh Supercomputing Center/CN=PSC MyProxy CA # 2010-04-22 ca-admin@psc.edu # alias = PSC-Myproxy-CA url = http://www.psc.edu/ca/ ca_url = http://www.psc.edu/ca/cert/4b2783ac.0 crl_url = http://www.psc.edu/ca/crl/4b2783ac.crl email = ca-admin@psc.edu sha1fp.0 = B5:08:EF:3D:1F:A6:24:B6:6D:B1:F4:1E:D9:32:55:D7:0B:AF:66:D6 status = accredited:slcs version = 1.104 subjectdn = "/C=US/O=Pittsburgh Supercomputing Center/CN=PSC MyProxy CA" igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid.pem0000664001343500074740000000267413614364127024654 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEEDCCAvigAwIBAgIBADANBgkqhkiG9w0BAQUFADA1MQswCQYDVQQGEwJQTDEN MAsGA1UEChMER1JJRDEXMBUGA1UEAxMOUG9saXNoIEdyaWQgQ0EwHhcNMDIwODI5 MTAwMzExWhcNMjAwODI4MTAwMzExWjA1MQswCQYDVQQGEwJQTDENMAsGA1UEChME R1JJRDEXMBUGA1UEAxMOUG9saXNoIEdyaWQgQ0EwggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDFhrzGcmZ/GU5OoG0NhRmZZ8zfhFXoJQuLUnpmdn+rmzYJ ukKYu6DNiemwDLYSPaZJFGKSw36vavzkDZB2pnwQNQTwkWhsyN1Wd4nBOx2fvgYf dnaFhbAr5Zvm0oZ9C0IWyyI6dL/1DUmvGQ0/mcCm9qziEa7tT8YtL7PirBffVfcl Rl4KCGPj3KEdlX7cSfyBGMeQPBXO7ELOeQokDsfeS1R+nlRnQ/7UxgiMNLxsXLDK 49JkRtrmqBD6ZJ6ioBVy7czhWTbjx30JqsymtrsKq31qUGmZrud9qd7Jvr2QdBbI mMSY+grniXBs7NPaVsAxOZ+ms65NiHGsLC1LXLIvAgMBAAGjggEpMIIBJTAdBgNV HQ4EFgQUPCqhhEVub5T2R2JIAcG3g4/NED0wXQYDVR0jBFYwVIAUPCqhhEVub5T2 R2JIAcG3g4/NED2hOaQ3MDUxCzAJBgNVBAYTAlBMMQ0wCwYDVQQKEwRHUklEMRcw FQYDVQQDEw5Qb2xpc2ggR3JpZCBDQYIBADAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud DwEB/wQEAwIBBjBHBgNVHREEQDA+gRdwbGdyaWQtY2FAbWFuLnBvem5hbi5wbIYj aHR0cDovL3d3dy5tYW4ucG96bmFuLnBsL3BsZ3JpZC1jYS8wOwYDVR0fBDQwMjAw oC6gLIYqaHR0cDovL3d3dy5tYW4ucG96bmFuLnBsL3BsZ3JpZC1jYS9jcmwuZGVy MA0GCSqGSIb3DQEBBQUAA4IBAQA7lsD2m8lXToOzy4+JiALkAyXtd8EXuaq+DP1q FoIp8dTUSTraMfuNbKqbHVkZDlRmnCdhi70mvT1A55LWKkeT2FpY5yJIZGRpNyxv iCPQstJD1RntCT1QgwcmyjFbgLow7HCigAZtu2o5k/D/AALsH/s9uf2aHVefn3wy vsUuKlZXnRtoF+wOJde4TZqyG6lAvjWP/hHKH5Oo3fzUtCCwkeWQN6s8WG3u04HF P2RabT/kZF5Ihf327G7j+VMkH/WOO8vaZTLZKouXF6+6E5ippI4KvJBVcYl6xGpc c4NGf8wllkC7RmTFpy54xLx2QAuDU9N9UPbRYaUZcCny4q1K -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid.crl_url0000664001343500074740000000005313614364127025522 0ustar davidgdavidghttp://www.man.poznan.pl/plgrid-ca/crl.pem igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid.signing_policy0000664001343500074740000000022113614364127027072 0ustar davidgdavidg# EACL Polish Grid CA access_id_CA X509 '/C=PL/O=GRID/CN=Polish Grid CA' pos_rights globus CA:sign cond_subjects globus '"/C=PL/O=GRID/*"' igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid.namespaces0000664001343500074740000000062413614364127026203 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)8a661490.namespaces # CA alias : PolishGrid # subord_of: # subjectDN: /C=PL/O=GRID/CN=Polish Grid CA # hash : 8a661490 # (generated automatically from ./PolishGrid/8a661490.signing_policy) # TO Issuer "/C=PL/O=GRID/CN=Polish Grid CA" \ PERMIT Subject "/C=PL/O=GRID/.*" igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid.info0000664001343500074740000000067713614364127025027 0ustar davidgdavidg# # @(#)$Id: 8a661490.info,v 1.5 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA PolishGrid # obtained from 8a661490 in PolishGrid/ alias = PolishGrid url = http://www.man.poznan.pl/plgrid-ca email = plgrid-ca@man.poznan.pl crl_url = http://www.man.poznan.pl/plgrid-ca/crl.pem status = accredited:classic version = 1.104 sha1fp.0 = 4F:FF:BE:0C:24:3F:99:59:A5:73:21:3C:23:13:2E:A3:C9:EE:06:11 subjectdn = "/C=PL/O=GRID/CN=Polish Grid CA" igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid-2019.pem0000664001343500074740000000356313614364127025243 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFUjCCAzqgAwIBAgIBADANBgkqhkiG9w0BAQsFADA6MQswCQYDVQQGEwJQTDEN MAsGA1UECgwER1JJRDEcMBoGA1UEAwwTUG9saXNoIEdyaWQgQ0EgMjAxOTAeFw0x OTA2MDEwMDAwMDBaFw0zOTA2MDEwMDAwMDBaMDoxCzAJBgNVBAYTAlBMMQ0wCwYD VQQKDARHUklEMRwwGgYDVQQDDBNQb2xpc2ggR3JpZCBDQSAyMDE5MIICIjANBgkq hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsPLrKweIHR8+YU0QO1iRASPecXnTSM+L fT71RpBnpunrWl7LAbmRk0CUlTfXbpSU7V/kjlAmfhN40lhZhAI6XDgT/upwo+k/ XdqV/59jJokH4IlwiC0G6bw8l+XNs5PpogWdgzFWOkq/OAQfV+NqpKd8Gs7/HQDz 3OWqeg2DmEuoBEiEVNlDFXnbwA+dlfsHPHLZ+YNiSJE/Zyct6QG5PY32NQXqfHUl 9vuzVHKTiqza7kTXFMC79MPYvgWgXVy55KH5ar2LEMqHRxy+7bEaT/s1W975aToS W0Dxpg4/dd7Kp7rtOSaBu2s0XDgoFDiOucOF0N1IGZyfSxuzFdQyFmhfC9Q6GkHx bfIjkZZr3noOrhJZ2CpFNAfFeCvwSbTwl4t5b5huHISzv5Jlp5XRaDw1EHnL+yWT CPp4mLDLKUVf0E7X6zEDfHXTZWuZ0uGZ2AQMYiI25QlzM5STOv9yh0q/Nb+5gaoP iGFNP3eVyqrHVHF/7gIuKPzw3vI44aPvaozDYqpZhSDQir2t5bcFmmcqyqOFxw2K 6QZpkpit1MN9j/ShqqjTyiNtqbFIAnMohCXmaTakMHpG8DeBwT5DmGBoG/hntmvI 72pvEXq+SiILxEZb6dt3C9+t2O4duBslMMcO4iHLHs0vv/zPm2kL7DzZUNYoGlQw zlrvq84v6EUCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC AQYwHQYDVR0OBBYEFHEO1+YMKIOjSoLgyMWXz6gJizBaMB8GA1UdIwQYMBaAFHEO 1+YMKIOjSoLgyMWXz6gJizBaMA0GCSqGSIb3DQEBCwUAA4ICAQCYxEx8DXZ6p0rx f0hqifbjaGfEkUUhnKhE83F9Xpd9EtCvm+i/4OH6QFimwtHm3AZer7ihyarbxC/u G3PkXAK9aHth51IBZFbfmvZAPkHJurHdIyJ3XnrfxlE/0kVtoYkxy0hQPAE5vmQW p9J3LZq6knXKaCqgDyaJjMgDZbRDOnak6GgC34Xs1/qtamufFJp+H/HH8IRinRPi 6V3b6U2D0oWC5uTa3XwnKQvVY/QwKCp33WDTmovKqMTUdoFjzmDKAa3NeQSYe3d+ QsS1ostnGV+ZKo7oU6ND+tu/LGqfti7U8usip3/6Bitt4+geBbmF1QIG/mqf6o/N zgZFIkxjlViKb/LxnAibMitk7hFoYVD43X14dWl/FZpjTlPMntA+PIMtOBuVtBef 0T+saCv8nV1gk17/ZMI7nF5nhFdTpNl7DFLdzEdJ6ZgYbc4Q4+DZDXB+7hxcIzfO erjBf1ST0Luy8w+juEgokTQ/uQuFBlzABR0t5flNJPKmz0QfX81E0+hjyQg+4lUu fvm+wPF6L4YaU/WtCEqLW+bzCxF4YCVwVGleHzp0SkXeO5Nk9KBF+JpuQXrh+2yQ 1C/rCzGEmp+OIwtNf745BteFtRS/7hzduhuIlFtJhjDp8ykQ06cjImqoi3Owt+tN 8qsUwmdaMN1V5bPznV1m0e5tj8AugQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid-2019.crl_url0000664001343500074740000000006013614364127026111 0ustar davidgdavidghttp://www.man.poznan.pl/plgrid-ca/2019/crl.crl igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid-2019.signing_policy0000664001343500074740000000022613614364127027470 0ustar davidgdavidg# EACL Polish Grid CA access_id_CA X509 '/C=PL/O=GRID/CN=Polish Grid CA 2019' pos_rights globus CA:sign cond_subjects globus '"/C=PL/O=GRID/*"' igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid-2019.namespaces0000664001343500074740000000071113614364127026571 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)PolishGrid-2019.signing_policy.namespaces # CA alias : PolishGrid-2019 # subord_of: # subjectDN: /C=PL/O=GRID/CN=Polish Grid CA 2019 # hash : PolishGrid-2019.signing_policy # (generated automatically from PolishGrid-2019.signing_policy) # TO Issuer "/C=PL/O=GRID/CN=Polish Grid CA 2019" \ PERMIT Subject "/C=PL/O=GRID/.*" igtf-policy-installation-bundle-1.104/src/accredited/PolishGrid-2019.info0000664001343500074740000000071713614364127025413 0ustar davidgdavidg# # @(#)$Id: PolishGrid-2019.info,v 1.1 2019/06/13 09:08:18 pmacvsdg Exp $ # alias = PolishGrid-2019 url = http://www.man.poznan.pl/plgrid-ca email = plgrid-ca@man.poznan.pl crl_url = http://www.man.poznan.pl/plgrid-ca/2019/crl.crl ca_url = http://www.man.poznan.pl/plgrid-ca/PolishGridCA-2019.pem status = accredited:classic version = 1.104 sha1fp.0 = DD:D9:1C:6A:B8:BE:B5:B3:98:F0:81:F1:F2:35:56:4E:07:07:15:09 subjectdn = "/C=PL/O=GRID/CN=Polish Grid CA 2019" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Grid-ICA-G2.pem0000664001343500074740000000427413614364130026056 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGRjCCBC6gAwIBAgIUELYvNFph62GEp7EGyAV+lFPiB9UwDQYJKoZIhvcNAQEL BQAwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZ BgNVBAMTElF1b1ZhZGlzIFJvb3QgQ0EgMjAeFw0xNjA1MjMxNTI3MDJaFw0yNjA1 MjMxNTI3MDJaMEcxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p dGVkMR0wGwYDVQQDExRRdW9WYWRpcyBHcmlkIElDQSBHMjCCAiIwDQYJKoZIhvcN AQEBBQADggIPADCCAgoCggIBANg3D8Nowe7J1akat//nm17yKAxum/gkmx4MI0/G eFhxAh9hgQoaOyVfr5B+oCefTXWVmqgocA9wJoXbaLCvnpt+AKZpK1YXq7AK1sUW UgFKHiSb5FBoLMUVBQrppaXctxosBu1XCMwIYVpzFCihQ9sDKTcTqs0I+9C5Z8Gi D8aGvF12xR2Xfh125ZLnP6WYR1+721gHnI7sxyNy71PPNECy4h7dTK3i4V7px7gj 772eFLz0UnGSkwVkkuFLv7shoUuJxNxy8qsxzZ1RXgW344avJqRttOZM0LN+CoVO OiNvbZg4mxYqhLrF3ZjnwpuyA8pUxAq/DqDlMUatzQ91z7XC2OoAxuEbmiTPQFwS xkWi9k2QsKwZU/KkupoP96y2i86aFZGY1C/i1l5C2kDim0VTDbl6E4cRW8Dy8F4w 07OkyUzpMn98jQTAslDVzG0P3NiO0QaRJED5cww9F3mXXIEBFtBQsqz3ymt4mkeW w5cVQi6GcHuenyHKyQPzZJLVioTg8kD2tfBaWt8Mi+MEXz3aSolxIiYmNC2zsnQE C42jHLBN8yK+ArpRMGLm6LkwaELcEcSVkqvHE1WYzqnvtGolRYTbuA7fPQCrcQUW 1K4tJHk0q7uVyZO8Ss0Tot6kC6e9ip9lbw6QLCp2cw8KCjxrL+CfygTLiZ1Dmlk0 iQ9pAgMBAAGjggEqMIIBJjASBgNVHRMBAf8ECDAGAQH/AgEAMBEGA1UdIAQKMAgw BgYEVR0gADByBggrBgEFBQcBAQRmMGQwKgYIKwYBBQUHMAGGHmh0dHA6Ly9vY3Nw LnF1b3ZhZGlzZ2xvYmFsLmNvbTA2BggrBgEFBQcwAoYqaHR0cDovL3RydXN0LnF1 b3ZhZGlzZ2xvYmFsLmNvbS9xdnJjYTIuY3J0MA4GA1UdDwEB/wQEAwIBBjAfBgNV HSMEGDAWgBQahGK8SEwzJQTU7tD2A8QZRtGUazA5BgNVHR8EMjAwMC6gLKAqhiho dHRwOi8vY3JsLnF1b3ZhZGlzZ2xvYmFsLmNvbS9xdnJjYTIuY3JsMB0GA1UdDgQW BBS3XXWClyyy+27+HBlQ4Ctv5N+6MDANBgkqhkiG9w0BAQsFAAOCAgEAEnFTIgkx oewr1EHC1Ute2Uyu4S3voNYTSbsXNNtnnhezGCBtFrcQjPzXknsAYIfKJbBkmt2t 6TH4MvGcJgqGOqDt8r7thDs266MEB0+B1U4deTTyZvsmklqF74KkwdW8Sy8Isimw i5hFY8jvzQtUnrqLZmoj54LcYFgcnasuI6zx/J3cN8acUB7ccCBNKrftH4E0mtZd B0ktA1pQ2h7gXgERM5JdPqMhblY7XpkvUP/NQphY/uAcslyMgkmdz3f+aarAyEPm GSiuCJACQWM+cd28SLumKtHHRRq+hFw6J395NuQ9/kDHRkV4QmegTfMHWZZcKTTS GBy+VbZkb4qtnssurBAD42KqHc7PdyZwen+9wOc8tpibE7wgGHmOuF0V7mkWGrF3 iGPGKnp3xK9Iv2ZulzyQW7CjzvbVJSg2v60iTDSX/+bTI5GkZtZaf2kTxMYfSEKc EW3YXmozyKHtcdVdYW+XpGO836SzDb3yQggzeZ0v8q9AuxUndqFJakWATm/hIlCu i7zrUAWYEr2jsUudaS7r/MlADvwp7U8rZ+wiwfUw2a3Mw0aZKzAQ0mVAQplIfqOr nH7pgSFHnuDK9FyTAlhc+M25qzoqCxvQW6dgHti2MVblu8vJ/dtKXhH+mZVC5I/7 h0Bbt/pSbEl5Uwa557vb8mzb9VjpZ5FWK5I= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Grid-ICA-G2.crl_url0000664001343500074740000000005313614364130026726 0ustar davidgdavidghttp://crl.quovadisglobal.com/qvgridg2.crl igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Grid-ICA-G2.signing_policy0000664001343500074740000000040013614364130030275 0ustar davidgdavidg# @(#)$Id: qvgridg2.signing_policy,v 1.1 2016/09/21 14:25:26 pmacvsdg Exp $ access_id_CA X509 '/C=BM/O=QuoVadis Limited/CN=QuoVadis Grid ICA G2' pos_rights globus CA:sign cond_subjects globus '"/DC=com/DC=quovadisglobal/DC=grid/*"' igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Grid-ICA-G2.info0000664001343500074740000000072213614364130026222 0ustar davidgdavidg# # @(#)$Id: qvgridg2.info,v 1.1 2016/09/21 14:25:26 pmacvsdg Exp $ # alias = QuoVadis-Grid-ICA-G2 url = https://www.quovadisglobal.bm/ ca_url = http://trust.quovadisglobal.com/pem/qvgridg2.crt crl_url = http://crl.quovadisglobal.com/qvgridg2.crl email = compliance@quovadisglobal.com status = accredited:classic version = 1.104 sha1fp.0 = AE:AF:C5:59:91:45:1C:C0:EC:44:62:CC:A1:BA:E3:C7:DE:78:4E:43 subjectdn = "/C=BM/O=QuoVadis Limited/CN=QuoVadis Grid ICA G2" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA1.pem0000664001343500074740000000403613614364130025612 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJC TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdCBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAzMTkxODMzMzNaFw0yMTAzMTcxODMz MzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUw IwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVR dW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Yp li4kVEAkOPcahdxYTMukJ0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2D rOpm2RgbaIr1VxqYuvXtdj182d6UajtLF8HVj71lODqV0D1VNk7feVcxKh7YWWVJ WCCYfqtffp/p1k3sg3Spx2zY7ilKhSoGFPlU5tPaZQeLYzcS19Dsw3sgQUSj7cug F+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx24ONmy+pdpibu5cxfvWenAScOospU xbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJSvPhEQ+aQuwIDAQABo4ICUjCC Ak4wPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwczovL29jc3AucXVv dmFkaXNvZmZzaG9yZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCARoGA1UdIASCAREw ggENMIIBCQYJKwYBBAG+WAABMIH7MIHUBggrBgEFBQcCAjCBxxqBxFJlbGlhbmNl IG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmljYXRlIGJ5IGFueSBwYXJ0eSBh c3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJsZSBzdGFuZGFy ZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh Y3RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYI KwYBBQUHAgEWFmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3T KbkGGew5Oanwl4Rqy+/fMIGuBgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rq y+/foYGEpIGBMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p dGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYD VQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6tlCL MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAitQUtf70mpKnGdSk fnIYj9lofFIk3WdvOXrEql494liwTXCYhGHoG+NpGA7O+0dQoE7/8CQfvbLO9Sf8 7C9TqnN7Az10buYWnuulLsS/VidQK2K6vkscPFVcQR0kvoIgR13VRH56FmjffU1R cHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2xgI4JVrmcGmD+XcHXetwReNDWXcG31a0y mQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi5upZIof4l/UO/erMkqQW xFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi5nrQNiOK SnQ2+Q== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA1.crl_url0000664001343500074740000000005013614364130026463 0ustar davidgdavidghttp://crl.quovadisglobal.com/qvrca.crl igtf-policy-installation-bundle-1.104/src/accredited/RDIG.pem0000664001343500074740000000375513614364132023332 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFrjCCBJagAwIBAgIBADANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJSVTEN MAsGA1UEChMEUkRJRzEnMCUGA1UEAxMeUnVzc2lhbiBEYXRhLUludGVuc2l2ZSBH cmlkIENBMB4XDTA1MDgwODIwMDA0OFoXDTI1MDgwMzIwMDA0OFowRTELMAkGA1UE BhMCUlUxDTALBgNVBAoTBFJESUcxJzAlBgNVBAMTHlJ1c3NpYW4gRGF0YS1JbnRl bnNpdmUgR3JpZCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMcK xI/r0U8LpUWzdz8idKvRtPLzaa6kTFsPX9m3xXcic84kBEoHGCofAl5dsMwYa/iM 0oCyetIKAPaBK07ZHCUEXznbVMSZZ29ecqu4issS8PAR6f3neO1fBGDA3PRyqR4Q 5japLTxmLCdyL4D71aT1G3qtgeIYtCbT6auJBxB/O1ExSEEjmNXtgVDZ6JoLrxhQ 9NxyksJ8oHjvk5B6E7iuvcVwW+JnJD2VrmuMnpaoHvl8yxB+6R0PPpCxNGe/XTJa XYbKcFk37LIrcUQVEPME/3FdCO344XRSm2MBM37fD5XJH9td+FBk5DaTxuCzyj63 Y/ROoyIQxLZw6Jh1xR0CAwEAAaOCAqcwggKjMA8GA1UdEwEB/wQFMAMBAf8wDgYD VR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzAdBgNVHQ4EFgQUtxr5ff7S HmGpqYwhaIt+YIy5cFkwbQYDVR0jBGYwZIAUtxr5ff7SHmGpqYwhaIt+YIy5cFmh SaRHMEUxCzAJBgNVBAYTAlJVMQ0wCwYDVQQKEwRSRElHMScwJQYDVQQDEx5SdXNz aWFuIERhdGEtSW50ZW5zaXZlIEdyaWQgQ0GCAQAwPQYDVR0SBDYwNIEUcmRpZy1j YUBncmlkLmtpYWUucnWGHGh0dHA6Ly9jYS5ncmlkLmtpYWUucnUvUkRJRy8wPwYI KwYBBQUHAQEEMzAxMC8GCCsGAQUFBzAChiNodHRwOi8vY2EuZ3JpZC5raWFlLnJ1 L1JESUcvY2EuaHRtbDA2BgNVHR8ELzAtMCugKaAnhiVodHRwOi8vY2EuZ3JpZC5r aWFlLnJ1L1JESUcvY2FjcmwucGVtMEsGA1UdIAREMEIwQAYLKwYBBAGBrHsBAQEw MTAvBggrBgEFBQcCARYjaHR0cDovL2NhLmdyaWQua2lhZS5ydS9SRElHL3BvbGlj eS8wKwYJYIZIAYb4QgECBB4WHGh0dHA6Ly9jYS5ncmlkLmtpYWUucnUvUkRJRy8w FgYJYIZIAYb4QgEIBAkWB3BvbGljeS8wHQYJYIZIAYb4QgEEBBAWDmNnaS1iaW4v Z2V0Y3JsMCAGCWCGSAGG+EIBAwQTFhFjZ2ktYmluL2NoZWNrcmV2PzBUBglghkgB hvhCAQ0ERxZFSXNzdWllZCBieSBSRElHIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 LCBodHRwOi8vY2EuZ3JpZC5raWFlLnJ1L1JESUcvMA0GCSqGSIb3DQEBBQUAA4IB AQB5XlkIBjEEhoJNtFTNUExtQc/jy8XOIGg7pgk/W15+i/XquBwaTw7hKbzrvwmI cCzhkk52At18EI03xT0Zp3r3RfxelrFVJ/MBgwPDTZXXWrEy8wAjx2WzXOD+Fph9 wzzikXQyxNuzYdP/XK/7gdGfDv0u/YrmjE/WmTUTteT0OKyVeiOSz1UgcdmxXXvj Y9q9WFplLxJYsUn5pLoPERyFcfDn9H5HcvPRmfcziRJTQVr8K50V+w9xdcHINfSe Pje9tNSSR2rR+7cTr24L1OFvoTyB9wispM9Nx54QzRRLcDywRdJR0B/AzUnnuIKS Tv3e9SSWW6fCU/J7ajc9sdoW -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA1.signing_policy0000664001343500074740000000070213614364130030042 0ustar davidgdavidg# @(#)$Id: 5cf9d536.signing_policy,v 1.1 2009/05/20 12:54:14 pmacvsdg Exp $ access_id_CA X509 '/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority" "/C=BM/O=QuoVadis Limited/OU=Issuing Certification Authority/CN=QuoVadis Grid ICA"' igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA1.namespaces0000664001343500074740000000107113614364130027144 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)5cf9d536.namespaces # CA Hierarchy anchored at QuoVadis Root CA 1 through GridICA (SWITCH) # TO Issuer "/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority" \ PERMIT Subject "/C=BM/O=QuoVadis Limited/OU=Issuing Certification Authority/CN=QuoVadis Grid ICA" TO Issuer "/C=BM/O=QuoVadis Limited/OU=Issuing Certification Authority/CN=QuoVadis Grid ICA" \ PERMIT Subject "/DC=com/DC=quovadisglobal/DC=grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA1.info0000664001343500074740000000077213614364130025767 0ustar davidgdavidg# # @(#)$Id: 5cf9d536.info,v 1.6 2015/06/18 09:44:55 pmacvsdg Exp $ # alias = QuoVadis-Root-CA1 url = https://www.quovadisglobal.bm/ ca_url = http://trust.quovadisglobal.com/pem/qvrca.crt crl_url = http://crl.quovadisglobal.com/qvrca.crl email = compliance@quovadisglobal.com status = accredited:classic version = 1.104 sha1fp.0 = DE:3F:40:BD:50:93:D3:9B:6C:60:F6:DA:BC:07:62:01:00:89:76:C9 subjectdn = "/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2.pem0000664001343500074740000000377113614364130025620 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp +ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og /zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y 4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza 8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2.crl_url0000664001343500074740000000005113614364130026465 0ustar davidgdavidghttp://crl.quovadisglobal.com/qvrca2.crl igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2.signing_policy0000664001343500074740000000047213614364130030047 0ustar davidgdavidg# @(#)$Id: qvrca2.signing_policy,v 1.1 2016/09/21 14:25:26 pmacvsdg Exp $ access_id_CA X509 '/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2' pos_rights globus CA:sign cond_subjects globus '"/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2" "/C=BM/O=QuoVadis Limited/CN=QuoVadis Grid ICA G2"' igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2.namespaces0000664001343500074740000000067413614364130027155 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)qvrca2.namespaces # CA Hierarchy anchored at QuoVadis Root CA 2 through GridICA2 # TO Issuer "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2" \ PERMIT Subject "/C=BM/O=QuoVadis Limited/CN=QuoVadis Grid ICA G2" TO Issuer "/C=BM/O=QuoVadis Limited/CN=QuoVadis Grid ICA G2" \ PERMIT Subject "/DC=com/DC=quovadisglobal/DC=grid/.*" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2.info0000664001343500074740000000070713614364130025766 0ustar davidgdavidg# # @(#)$Id: qvrca2.info,v 1.1 2016/09/21 14:25:26 pmacvsdg Exp $ # alias = QuoVadis-Root-CA2 url = https://www.quovadisglobal.bm/ ca_url = http://trust.quovadisglobal.com/pem/qvrca2.crt crl_url = http://crl.quovadisglobal.com/qvrca2.crl email = compliance@quovadisglobal.com status = accredited:classic version = 1.104 sha1fp.0 = CA:3A:FB:CF:12:40:36:4B:44:B2:16:20:88:80:48:39:19:93:7C:F7 subjectdn = "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2G3.pem0000664001343500074740000000360313614364131026005 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz 8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l 7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE +V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+M -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2G3.crl_url0000664001343500074740000000005313614364131026662 0ustar davidgdavidghttp://crl.quovadisglobal.com/qvrca2g3.crl igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2G3.signing_policy0000664001343500074740000000034313614364131030237 0ustar davidgdavidg# QuoVadis Root CA 2 G3 Signing Policy (TLS Public Trust) access_id_CA X509 '/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3' pos_rights globus CA:sign cond_subjects globus '"/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA"' igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2G3.namespaces0000664001343500074740000000072513614364131027345 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)qvrca2g3.namespaces # CA alias : QuoVadis-Root-CA2G3 # subord_of: # subjectDN: /C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3 # hash : qvrca2g3 # (generated automatically from qvrca2g3.signing_policy) # TO Issuer "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3" \ PERMIT Subject "/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA2G3.info0000664001343500074740000000072213614364131026156 0ustar davidgdavidg# # @(#)$Id: qvrca2g3.info,v 1.1 2017/02/01 13:46:26 pmacvsdg Exp $ # alias = QuoVadis-Root-CA2G3 url = https://www.quovadisglobal.bm/ ca_url = http://trust.quovadisglobal.com/pem/qvrca2g3.crt crl_url = http://crl.quovadisglobal.com/qvrca2g3.crl email = compliance@quovadisglobal.com status = accredited:classic version = 1.104 sha1fp.0 = 09:3C:61:F3:8B:8B:DC:7D:55:DF:75:38:02:05:00:E1:25:F5:C8:36 subjectdn = "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA3G3.pem0000664001343500074740000000360313614364131026006 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR /xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP 0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf 3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl 8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA3G3.crl_url0000664001343500074740000000005313614364131026663 0ustar davidgdavidghttp://crl.quovadisglobal.com/qvrca3g3.crl igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA3G3.signing_policy0000664001343500074740000000034713614364131030244 0ustar davidgdavidg# QuoVadis Root CA 3 G3 Signing Policy (Client Public Trust) access_id_CA X509 '/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3' pos_rights globus CA:sign cond_subjects globus '"/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA"' igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA3G3.namespaces0000664001343500074740000000072613614364131027347 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)qvrca3g3.namespaces # CA alias : QuoVadis-Root-CA3G3 # subord_of: # subjectDN: /C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3 # hash : qvrca3g3 # (generated automatically from qvrca3g3.signing_policy) # TO Issuer "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3" \ PERMIT Subject "/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA" igtf-policy-installation-bundle-1.104/src/accredited/QuoVadis-Root-CA3G3.info0000664001343500074740000000072213614364131026157 0ustar davidgdavidg# # @(#)$Id: qvrca3g3.info,v 1.1 2017/02/01 13:46:26 pmacvsdg Exp $ # alias = QuoVadis-Root-CA3G3 url = https://www.quovadisglobal.bm/ ca_url = http://trust.quovadisglobal.com/pem/qvrca3g3.crt crl_url = http://crl.quovadisglobal.com/qvrca3g3.crl email = compliance@quovadisglobal.com status = accredited:classic version = 1.104 sha1fp.0 = 48:12:BD:92:3C:A8:C4:39:06:E7:30:6D:27:96:E6:A4:CF:22:2E:7D subjectdn = "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3" igtf-policy-installation-bundle-1.104/src/accredited/RCauth-Pilot-ICA-G1.pem0000664001343500074740000000354313614364131025711 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFSDCCAzCgAwIBAgIQCfXXVo6J6IfYFlP+q8eE4jANBgkqhkiG9w0BAQsFADBs MRIwEAYKCZImiZPyLGQBGRYCbmwxGTAXBgoJkiaJk/IsZAEZFglkdXRjaGdyaWQx IjAgBgNVBAoTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxFzAVBgNVBAMTDkRD QSBSb290IEcxIENBMB4XDTE2MDIwMTAwMDAwMFoXDTI2MDEzMTIzNTk1OVowgZAx EjAQBgoJkiaJk/IsZAEZFgJldTEWMBQGCgmSJomT8ixkARkWBnJjYXV0aDEiMCAG A1UEChMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczE+MDwGA1UEAxM1UmVzZWFy Y2ggYW5kIENvbGxhYm9yYXRpb24gQXV0aGVudGljYXRpb24gUGlsb3QgRzEgQ0Ew ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3o5HL4yoZxfePD6DiRJiJ L3MV/pkwNjbFzC72OnX8vUr0hjSoCoiGIQZ/Yqlr1mqhlzVXUIkmYTfzTn09paSW HTJwvYCzS4ov4z2lMwzUIpBJ8BZlwEAF6H2uF50yZucMpumHAt3wmxgLJs7EMCU6 eTsLz3XvlCKvJfQYa6ScWZU75BNLS/nXwsHjQYIP9NDgofRc5cyrkotAAsoiBnqK UnW3PUbRSF5ImN2+VGy0s8upVkuODGicjSeRO+SVN0DbROnmKHzotvepANWnefZy C13rr+QxGg2iAj/mt3ONxCmMyzUcAi6Q0WWvz0D+cA5qorXqxW+TOaw7DUHrD7pf AgMBAAGjgcAwgb0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFB+9RNPNxNmQF+n3NJhgo0RbfQZHMB8GA1UdIwQYMBaAFFJ8L7KCWUmm 8Agd72gFoTUyiignMBkGA1UdIAQSMBAwDgYMKwYBBAHRQgQCBwEBMD8GA1UdHwQ4 MDYwNKAyoDCGLmh0dHA6Ly9jcmwuZHV0Y2hncmlkLm5sL2RjYXJvb3QvZzEvY3Js L2NybC5jcmwwDQYJKoZIhvcNAQELBQADggIBACbJqxl4B08Hlt8BTZq8F9Fa2KHn UutH5H8Nt0KmILgLNvPjr2YGv8dDurHoREXcH/9ZcH+YFZ6u+Xtoz1CEKgZDVqjQ m356cAdG7RKSa1317itABNteQ2U8QPbnIcdoX3owDDUIaJe4di51QpabPeX3etHh jGSktJ2Ee1AAhP6CIIGE+tRJMeBepo/2gVZbCHn39bx5He+7ue862F67dLpWJ+UP G3eUvsTjL/pWBgcuNNdD6EXlWa0a5WECdtBZwTWM4GJUa1d0w53qA/pwbUxjGIFx fYDE2EneQmkujT7HgGpYXOSuhhnz1dfzAO3XOc0M9AuLW8/zsEEg6Yds5CQmOPRD ABiyhjKVZUtls8PFyQNQcIrW18zmqZ3eiFOruSjvnY3i4pthrmrIuFZJKMFTP9jK 14OLqCZ3QrUBTh4WyCb9KURbVINiKkNSAVJII6ANfciOxAblmTkNdjZE/+ioKpxV E4jf2XiFr4djlXoEhIjM/oC2R8sl1fa0tX/CwPp7PKx/TSInSeLw0LBOlFB/ntTE JvdZnbPIlFGlSQd9vIbdz3k3Fh9HmDtsEkx5pIFc/Cq1ZJY7FtPVGzFroewC+Aoq gpmByW/hJ0Fn0/wZuC8DFU02QHIW3ES7AsChzyzxxxj5ZflXhFPGUIzhvl23jz/L k1pn+KgTlIxaOMqO -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/RCauth-Pilot-ICA-G1.crl_url0000664001343500074740000000005213614364131026562 0ustar davidgdavidghttp://www.rcauth.eu/pilot/g1/crl/crl.crl igtf-policy-installation-bundle-1.104/src/accredited/RCauth-Pilot-ICA-G1.signing_policy0000664001343500074740000000056113614364131030142 0ustar davidgdavidg# EACL RCauth Pilot ICA G1 access_id_CA X509 '/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA' pos_rights globus CA:sign cond_subjects globus '"/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" "/DC=eu/DC=rcauth/DC=rcauth-clients/*"' igtf-policy-installation-bundle-1.104/src/accredited/RCauth-Pilot-ICA-G1.namespaces0000664001343500074740000000107113614364131027241 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)rcauth-pilot-ica-g1.namespaces # CA alias : rcauth-pilot-ica-g1 # subord_of: dca-root-g1 # subjectDN: /DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA # # This RPNDC is optional if the superior root RPDNC is used as-is # TO Issuer "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" \ PERMIT Subject "/DC=eu/DC=rcauth/DC=rcauth-clients/.*" igtf-policy-installation-bundle-1.104/src/accredited/RCauth-Pilot-ICA-G1.info0000664001343500074740000000112613614364131026056 0ustar davidgdavidg# # @(#)$Id: RCauth-Pilot-ICA-G1.info,v 1.3 2016/07/19 18:36:40 pmacvsdg Exp $ # Information for RCauth-Pilot-ICA-G1 # alias = RCauth-Pilot-ICA-G1 requires = DCAROOT-G1 ca_url = https://www.rcauth.eu/pilot/g1/ca/cacert.pem crl_url = http://www.rcauth.eu/pilot/g1/crl/crl.crl policy_url = http://www.rcauth.eu/policy/ email = ca@rcauth.eu status = accredited:iota url = https://www.rcauth.eu/ version = 1.104 sha1fp.0 = 8B:F3:1F:7D:46:57:B4:19:F5:D7:CB:A8:17:4E:E6:F9:C9:18:29:4D subjectdn = "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" igtf-policy-installation-bundle-1.104/src/accredited/RDIG.crl_url0000664001343500074740000000005213614364132024176 0ustar davidgdavidghttp://ice.grid.kiae.ru/ca/RDIG/cacrl.pem igtf-policy-installation-bundle-1.104/src/accredited/RDIG.signing_policy0000664001343500074740000000052213614364132025553 0ustar davidgdavidg# # @(#)$Id: 55994d72.signing_policy,v 1.1 2005/07/12 08:34:36 pmacvsdg Exp $ # EACL Russian Data Intensive Grid CA # access_id_CA X509 '/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA' pos_rights globus CA:sign cond_subjects globus '"/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" "/C=RU/O=RDIG/*"' igtf-policy-installation-bundle-1.104/src/accredited/RDIG.namespaces0000664001343500074740000000065213614364132024661 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)55994d72.namespaces # CA alias : RDIG # subord_of: # subjectDN: /C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA # hash : 55994d72 # (generated automatically from ./Russia/55994d72.signing_policy) # TO Issuer "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" \ PERMIT Subject "/C=RU/O=RDIG/.*" igtf-policy-installation-bundle-1.104/src/accredited/RDIG.info0000664001343500074740000000075413614364132023500 0ustar davidgdavidg# # @(#)$Id: 55994d72.info,v 1.5 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA RDIG # obtained from 55994d72 in Russia/ alias = RDIG ca_url = http://ca.grid.kiae.ru/RDIG/cacrt.pem crl_url = http://ice.grid.kiae.ru/ca/RDIG/cacrl.pem email = rdig-ca-support@grid.kiae.ru status = accredited:classic url = http://ca.grid.kiae.ru/RDIG/ version = 1.104 sha1fp.0 = 69:E3:8A:00:77:1B:03:E7:E8:FD:CF:A5:F5:E9:4E:8D:E9:78:C4:A6 subjectdn = "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" igtf-policy-installation-bundle-1.104/src/accredited/REUNA-ca.pem0000664001343500074740000000323013614364132024024 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEsjCCA5qgAwIBAgICAh0wDQYJKoZIhvcNAQELBQAwRzELMAkGA1UEBhMCQ0wx EDAOBgNVBAoTB1JFVU5BQ0ExJjAkBgNVBAMTHVJFVU5BIENlcnRpZmljYXRpb24g QXV0aG9yaXR5MB4XDTA3MDUxNDEwMzUyMVoXDTI3MDUxNDEwMzUyMVowRzELMAkG A1UEBhMCQ0wxEDAOBgNVBAoTB1JFVU5BQ0ExJjAkBgNVBAMTHVJFVU5BIENlcnRp ZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEArSnYK4nTIDGLVE00tEy4wILAxKhpY9H7DQqyKcwSC605StNv2jeON17YPHJH KlaAlRlmE0ujVhbi1kmIV7RNNj1ckzczhaft/CS+xvlD3cL9Xp7Pk5tDBKTQj+TV AicN0C8/VR9obV0Cxzc91DSGCSZ3wYNlgeqpJhCtZmACAH2C043Hx15nh5eoxNXG ZC/XLVZHBEMv+xRaVl8aG45IYMe7aRB5LkkfldPu133qEPzzjsRQlVFDxnwLuaYV s2xlUQ++4JAE0kakpzS8ZZMuUarPKuuYuWYjMpJ8PhXv8s8seip+NC4l72Z+ycNQ u+Uts9MSLmb4VvDet9pT8FQILwIDAQABo4IBpjCCAaIwDwYDVR0TAQH/BAUwAwEB /zAdBgNVHQ4EFgQUo65IjrnBjrGSql4M0NydSwUuLFcwHwYDVR0jBBgwFoAUo65I jrnBjrGSql4M0NydSwUuLFcwDgYDVR0PAQH/BAQDAgHGMBEGCWCGSAGG+EIBAQQE AwIABzA1BgNVHR8ELjAsMCqgKKAmhiRodHRwOi8vcmV1bmEtY2EucmV1bmEuY2wv Y3JsL2NybC5wZW0wNQYJYIZIAYb4QgEDBCgWJmh0dHA6Ly9yZXVuYS1jYS5yZXVu YS5jbC9jcmwvY2FjcmwucGVtMC8GCWCGSAGG+EIBCAQiFiBodHRwOi8vcmV1bmEt Y2EucmV1bmEuY2wvcG9saWN5LzBLBgNVHSAERDBCMEAGDiqGSIb3TAUEAgIBAQEB MC4wLAYIKwYBBQUHAgEWIGh0dHA6Ly9yZXVuYS1jYS5yZXVuYS5jbC9wb2xpY3kv MEAGCWCGSAGG+EIBDQQzFjFSRVVOQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSwg Q1AvQ1BTIHZlcnNpb24gMS4xMA0GCSqGSIb3DQEBCwUAA4IBAQAJw+/g3I3Jx4xD s4QT1G5QN52+FmdUcOOwBcoO8crOTltKRRvc28H4Xq7ylROOaHmCiNV7qPHc9M0M Br2hAIDc6PNXHjc+h8FIfOIsK8YGJYYK4z1Yq8Kk4NdH1q1k2wG9dZo++kqqDhkU 202UIhLup9JCpeWPjmI/aChFtqRslHDbgzSuQM91bKTOX8JZeexQ71gWBVYmCri5 XD96u3FDOz9bM8SaA+btC5BAtoYF14dKaKWDIGRAqpFiBKj57xNYKVh9uk5bycQt LVdpzwR8rfXw4Pg7kD5ufkqFBGa4grqvJRLnHfj1HsEDPH70gEtbHAe0bB3PpXC4 9qkJIOOz -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/REUNA-ca.crl_url0000664001343500074740000000004513614364132024706 0ustar davidgdavidghttp://reuna-ca.reuna.cl/crl/crl.der igtf-policy-installation-bundle-1.104/src/accredited/REUNA-ca.signing_policy0000664001343500074740000000037313614364132026265 0ustar davidgdavidg# Date: 22 Mayo 2007 # @(#)$Id: 295adc19.signing_policy,v 1.2 2010/01/26 08:16:52 pmacvsdg Exp $ # access_id_CA X509 '/C=CL/O=REUNACA/CN=REUNA Certification Authority' pos_rights globus CA:sign cond_subjects globus '"/C=CL/O=REUNACA/*"' # end of EACL igtf-policy-installation-bundle-1.104/src/accredited/REUNA-ca.namespaces0000664001343500074740000000067313614364132025372 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)295adc19.namespaces # CA alias : reuna-ca # subord_of: # subjectDN: /C=CL/O=REUNACA/CN=REUNA Certification Authority # hash : 295adc19.signing_policy # (generated automatically from 295adc19.signing_policy) # TO Issuer "/C=CL/O=REUNACA/CN=REUNA Certification Authority" \ PERMIT Subject "/C=CL/O=REUNACA/.*" igtf-policy-installation-bundle-1.104/src/accredited/REUNA-ca.info0000664001343500074740000000064613614364132024206 0ustar davidgdavidg# # @(#)$Id: 295adc19.info,v 1.6 2017/03/13 09:00:31 pmacvsdg Exp $ # alias = REUNA-ca url = http://reuna-ca.reuna.cl/ ca_url = http://reuna-ca.reuna.cl/cacert/cacert.pem crl_url = http://reuna-ca.reuna.cl/crl/crl.der email = reuna-ca@reuna.cl status = accredited:classic sha1fp.0 = 94:CE:21:D2:CB:3E:DF:2A:02:C1:EC:00:3B:2D:C0:18:A0:53:DE:85 version = 1.104 subjectdn = "/C=CL/O=REUNACA/CN=REUNA Certification Authority" igtf-policy-installation-bundle-1.104/src/accredited/RomanianGRID.pem0000664001343500074740000000327013614364132025007 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEyjCCA7KgAwIBAgIJAIwjYuI2tyMvMA0GCSqGSIb3DQEBBQUAMH0xEjAQBgoJ kiaJk/IsZAEZEwJSTzEcMBoGCgmSJomT8ixkARkTDFJvbWFuaWFuR1JJRDENMAsG A1UEChMEUk9TQTEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGDAW BgNVBAMTD1JvbWFuaWFuR1JJRCBDQTAeFw0wNzEwMDMxNjU2MjJaFw0yNzEwMDMx NjU2MjJaMH0xEjAQBgoJkiaJk/IsZAEZEwJSTzEcMBoGCgmSJomT8ixkARkTDFJv bWFuaWFuR1JJRDENMAsGA1UEChMEUk9TQTEgMB4GA1UECxMXQ2VydGlmaWNhdGlv biBBdXRob3JpdHkxGDAWBgNVBAMTD1JvbWFuaWFuR1JJRCBDQTCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAL6HFFO4t+BHs8WVWVtzlzSZFJPXQGsY1a+0 SEX8gIu/1953rPLye3TRss5ficYwG2b232b8yG/0rC+QfxEFoqyh+Qg9pOUdlS75 3JqXmLoJdXo5wFDylSY69f96sduliteOJzBIK3JdfY8cswzZ7Qp75kgTtYtOvMB/ Z6PFOUW/vvo25F5l7AWyAuKibjUxH0kiLdVsie40DBIHfO/IM7j0z+w89HQyKA1t kRMI/opwOAqYhgrT5BNj8BzfE6iHE7XRkKwqYuAy1yflqtVrYghiAiCvbQPqQJ4V LPwMj23zDSSR+S6GIRSFKzhiKU/f3IwfAEgK8xWZ3Fc/AyU/cAsCAwEAAaOCAUsw ggFHMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR/ EM1cbqzKaxIL4KmHiBGVvDAXaDCBsAYDVR0jBIGoMIGlgBR/EM1cbqzKaxIL4KmH iBGVvDAXaKGBgaR/MH0xEjAQBgoJkiaJk/IsZAEZEwJSTzEcMBoGCgmSJomT8ixk ARkTDFJvbWFuaWFuR1JJRDENMAsGA1UEChMEUk9TQTEgMB4GA1UECxMXQ2VydGlm aWNhdGlvbiBBdXRob3JpdHkxGDAWBgNVBAMTD1JvbWFuaWFuR1JJRCBDQYIJAIwj YuI2tyMvMDYGA1UdEgQvMC2BD2dyaWQtY2FAcm9zYS5yb4YaaHR0cDovL3d3dy5y b21hbmlhbmdyaWQucm8wGgYDVR0RBBMwEYEPZ3JpZC1jYUByb3NhLnJvMA0GCSqG SIb3DQEBBQUAA4IBAQCxI9sn1rEkAC9DA15bTRrpBy0EaYVizu+O4GhUWGwc3UvN eljnzgzc+9GFKuibUv0IOUuE6jSoR0iy3YN87JMQ44DQQnJ6TPqxg/hNvdmMKO92 MS/2aH+Ezt3/dv/3ezmSVFu6T/tZmRjBjWm3Ep47qGJ48+KBMqgN+LjEudne98ts cnbFI/LZYg8jzcYi9y5gEYg9Yd1krBM34RW/alx02vsSJgFC79Rls3GJHnopzimR TITkYX7NZ2bpGo2xd43A+UgdN5991dtIjkmgcUcVMK7K2uYY/xraP7uxBsRYjMJi 2B2pH+ZZarAYZudSJbtoUfQWpAbOwuM+vts78jHh -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/RomanianGRID.crl_url0000664001343500074740000000005213614364132025663 0ustar davidgdavidghttp://www.romaniangrid.ro/crl/crl-v2.der igtf-policy-installation-bundle-1.104/src/accredited/RomanianGRID.signing_policy0000664001343500074740000000042013614364132027235 0ustar davidgdavidg# @(#)$Id: 1f3834d0.signing_policy,v 1.1 2007/10/03 13:24:45 pmacvsdg Exp $ access_id_CA X509 '/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA' pos_rights globus CA:sign cond_subjects globus '"/DC=RO/DC=RomanianGRID/*"' igtf-policy-installation-bundle-1.104/src/accredited/RomanianGRID.namespaces0000664001343500074740000000077413614364132026353 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1f3834d0.namespaces # CA alias : RomanianGRID # subord_of: # subjectDN: /DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA # hash : 1f3834d0.signing_policy # (generated automatically from 1f3834d0.signing_policy) # TO Issuer "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA" \ PERMIT Subject "/DC=RO/DC=RomanianGRID/.*" igtf-policy-installation-bundle-1.104/src/accredited/RomanianGRID.info0000664001343500074740000000101413614364132025153 0ustar davidgdavidg# @(#)$Id: 1f3834d0.info,v 1.4 2015/06/18 09:44:55 pmacvsdg Exp $ # alias = RomanianGRID url = http://www.romaniangrid.ro ca_url = http://www.romaniangrid.ro/certs/root.pem crl_url = http://www.romaniangrid.ro/crl/crl-v2.der policy_url = http://www.romaniangrid.ro/docs/RomanianGRID_CA_v1.4.pdf email = grid-ca@rosa.ro status = accredited:classic version = 1.104 sha1fp.0 = 18:1F:F6:66:28:41:94:6E:57:C3:D3:4D:F8:B3:B6:31:4E:FB:26:09 subjectdn = "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA" igtf-policy-installation-bundle-1.104/src/accredited/SDG-G2.pem0000664001343500074740000000275113614364133023464 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEMDCCAxigAwIBAgIBFTANBgkqhkiG9w0BAQsFADBXMRIwEAYKCZImiZPyLGQB GRYCQ04xFDASBgoJkiaJk/IsZAEZFgRHcmlkMSswKQYDVQQDDCJSb290IENlcnRp ZmljYXRlIEF1dGhvcml0eSBhdCBDTklDMB4XDTE1MTIyNTAwMDAwMFoXDTI1MTIy NDAwMDAwMFowZjESMBAGCgmSJomT8ixkARkWAkNOMRQwEgYKCZImiZPyLGQBGRYE R3JpZDETMBEGCgmSJomT8ixkARkWA1NERzElMCMGA1UEAwwcU2NpZW50aWZpYyBE YXRhIEdyaWQgQ0EgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALZAIH4EWcHTQwzhIZZIsofCuLPqkjAPSGsfy8zxu1bFvj242PQpHWJxy7aJPmqd tyINuxuz3U6/QKf/aOgA6ojUkiDDyh2sf3KRrNvquWB4rvUVFOqXvUjyZu4YZuAC cqjAqLpez6po9VxI8HG0lKlRVdCdtktiC8rp2VJvSCEoXis1rwU6G1vjx2WyPNma JVzqvrNgxOIatIJQt577qR24+8Knaen6QM0cAHY+59X87Cs/NB7FibsL46wzdNeB ACtlQ2AfHvz1/Druyl4Vkctnn3UoEnKaldhcxB3zKwvA2obeOD8iNkeyuVptdxYX slInvYbIeQFW3+D7BLOSlqUCAwEAAaOB9zCB9DBfBgNVHSAEWDBWMFQGDisGAQQB xBgCAgIBAQEEMEIwQAYIKwYBBQUHAgEWNGh0dHA6Ly9jYS5ncmlkLmNuL3BvbGlj eS9jbmljLWdyaWQtY2EtY3AtY3BzLTEuNC5wZGYwDwYDVR0TAQH/BAUwAwEB/zAO BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHiYLw3I1bzKG3JCerIgACm7rrJ1MB8G A1UdIwQYMBaAFKmDit/8MtR3D3Dz0l5HOzUP5WJIMDAGA1UdHwQpMCcwJaAjoCGG H2h0dHA6Ly9jYS5ncmlkLmNuL2NybC9jYWNybC5jcmwwDQYJKoZIhvcNAQELBQAD ggEBAAlr1kJ5dJyllEhNBhRo/pjwsx0ELlkOevAPatr3Uzk+DCeogXUPGmo7J4HK Dz6MwQcdncf/1//BrBAQUUHCLBcUu/NZoH9qzwXJJYCX0ETSD612B+djA0ff9SES K1QHb0nt5IppBe8ScAa8ZnGQLUPLRuTrsHquts5ELcKYzunR6DfWhyo9dkPRtSt4 JjM9138V+NWrUlvCcY4ynGdSTHZVWexTyimviDHOtg9TXq5V1Hhjf83H3aZWSWPC AOO48EqCsYMGnIVInJN260gPjR5PuMbpoAmBghvHko49zsLCi4udqpMqmjJPCb0y HFnavRWfIwgeEX+2GyxQMJFGgm4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/SDG-G2.crl_url0000664001343500074740000000004713614364133024341 0ustar davidgdavidghttp://ca.sdg.grid.cn/crl/cacrl-g2.crl igtf-policy-installation-bundle-1.104/src/accredited/SDG-G2.signing_policy0000664001343500074740000000030513614364133025711 0ustar davidgdavidg# EACL SDG CA G2 2015 access_id_CA X509 '/DC=CN/DC=Grid/DC=SDG/CN=Scientific Data Grid CA - G2' pos_rights globus CA:sign cond_subjects globus '"/DC=CN/DC=Grid/DC=SDG/*"' # end of EACL igtf-policy-installation-bundle-1.104/src/accredited/SDG-G2.namespaces0000664001343500074740000000054513614364133025021 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)SDGCA-G2.namespaces # CA alias : SDG-G2 # subord_of: # subjectDN: /DC=CN/DC=Grid/DC=SDG/CN=Scientific Data Grid CA - G2 # TO Issuer "/DC=CN/DC=Grid/DC=SDG/CN=Scientific Data Grid CA - G2" \ PERMIT Subject "/DC=CN/DC=Grid/DC=SDG/.*" igtf-policy-installation-bundle-1.104/src/accredited/SDG-G2.info0000664001343500074740000000045513614364133023635 0ustar davidgdavidgalias = SDG-G2 crl_url = http://ca.sdg.grid.cn/crl/cacrl-g2.crl email = sdgca@cnic.cn status = accredited:classic url = http://ca.sdg.grid.cn/en/ version = 1.104 sha1fp.0 = 1C:C3:7A:71:9D:1A:15:84:2F:F2:BC:CD:15:B7:8C:0F:83:F3:44:A9 subjectdn = "/DC=CN/DC=Grid/DC=SDG/CN=Scientific Data Grid CA - G2" igtf-policy-installation-bundle-1.104/src/accredited/SRCE.pem0000664001343500074740000000231513614364133023331 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIJAINxfMQMGUMOMA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNV BAYTAkhSMQwwCgYDVQQKDANlZHUxDTALBgNVBAsMBHNyY2UxEDAOBgNVBAMMB1NS Q0UgQ0EwHhcNMDYwNjE1MTczOTIwWhcNMjYwNjE1MTczOTIwWjA8MQswCQYDVQQG EwJIUjEMMAoGA1UECgwDZWR1MQ0wCwYDVQQLDARzcmNlMRAwDgYDVQQDDAdTUkNF IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmJERArpSh1whLAQl 96XTSV9o31Dq7oF1cQld4WhArCnXlgBEJIydifSEBF1i0oQZjqOuhAQu27plpZUM /fxAHCcZS44ziiDF3gLQpOHHt/2aND0/SmstCkETzEt5SGgr5dfmMT+mpWIUmRbG q0r7aetQ90N0Z4co+b1Gj5PS9BAE0w/I72YwnIyY/lWHVjHS2PyibT5ULssIAy9T xqXpJcLBxo9TU1nLsGHjRUjQXmcQqkGzjKSnDQz83ea+A1zLoEe/MHfdjHP+umG0 pi0ZPett5xkNf1YiLFEU6fZEP0s188eYDLCBhrLrBeu30aJLuNvV1NQumLWKAscc LK1NjwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQF8jeQRsTG ChQ02l1TOZHn8RpiTzAfBgNVHSMEGDAWgBQF8jeQRsTGChQ02l1TOZHn8RpiTzAO BgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBABAPZvhymPbchFmRxAS4 HtI8mJEXS6yDwvCQQXl4Xy/Jz1Hs9kBEXtwvb6JohpG6vWeB2CDI8x9CQo6ZFJ3i PjAfwdfY+foV4wyu2caNsZ9hm8BLlAbbymcF/hrkR1MusN4pbL5jjucjHf5fDGww R6nOa2YkP/T7IcCnAD7wGP9PYtsDwW3/hsiMNo9gF4TjkSomgORgX8csWY4HCDB3 ctw/QTKPYyqACCl+JZUlSshy6LH+UHhiXKlWuYaiWAB7LgPNK8Qw5JtNJjgODgOo 3EfaEne4vYZWTJDsCPgBQ6Puv8/aOWDUAp9cF/yV5Dh2VObFX6U15E4QH0r6ArEj O7c= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/SRCE.crl_url0000664001343500074740000000003413614364133024206 0ustar davidgdavidghttp://ra.srce.hr/cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/SRCE.signing_policy0000664001343500074740000000023313614364133025562 0ustar davidgdavidgaccess_id_CA X509 '/C=HR/O=edu/OU=srce/CN=SRCE CA' pos_rights globus CA:sign cond_subjects globus '"/C=HR/O=edu/OU=srce/CN=SRCE CA" "/C=HR/O=edu/*"' igtf-policy-installation-bundle-1.104/src/accredited/SRCE.namespaces0000664001343500074740000000063613614364133024673 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)ff94d436.signing_policy.namespaces # CA alias : SRCE # subord_of: # subjectDN: /C=HR/O=edu/OU=srce/CN=SRCE CA # hash : ff94d436.signing_policy # (generated automatically from ff94d436.signing_policy) # TO Issuer "/C=HR/O=edu/OU=srce/CN=SRCE CA" \ PERMIT Subject "/C=HR/O=edu/.*" igtf-policy-installation-bundle-1.104/src/accredited/SRCE.info0000664001343500074740000000045113614364133023502 0ustar davidgdavidgalias = SRCE url = http://ra.srce.hr ca_url = http://ra.srce.hr/cacert.pem crl_url = http://ra.srce.hr/cacrl.crl email = srce-ca@srce.hr status = accredited:classic version = 1.104 sha1fp.0 = 68:20:69:5A:4E:95:F4:48:BB:8F:BE:DE:67:77:84:C0:0D:E5:46:C0 subjectdn = "/C=HR/O=edu/OU=srce/CN=SRCE CA" igtf-policy-installation-bundle-1.104/src/accredited/SiGNET-CA.pem0000664001343500074740000000327013614364133024110 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEyDCCA7CgAwIBAgIBADANBgkqhkiG9w0BAQUFADAyMQswCQYDVQQGEwJTSTEP MA0GA1UEChMGU2lHTkVUMRIwEAYDVQQDEwlTaUdORVQgQ0EwHhcNMDYwODIzMDY1 MjI3WhcNMjYwODIyMDY1MjI3WjAyMQswCQYDVQQGEwJTSTEPMA0GA1UEChMGU2lH TkVUMRIwEAYDVQQDEwlTaUdORVQgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQDMCYLzK77phA5GOkVFtD6q/gRdMl1w46yet6baLjUrjJ8kwN3GrKOc m0SUXbBe0Zw1nBxbmMHhEIubnSoW93xMH/qThByQpzAKm5uAsvoDrTMkZ2ytmUu1 j/FyA0eTBmN3F5HtnMQCAZ02KmPBmmYoIlQuPo+m6DhA9GmBYVFW171DQ0pgETaE 1+TG6tXlUcpVLxRphIqWpVTivK68TD7tCIyA2rdmo9TpjJHXGB1g4QW/Ey5QrwPr 7J3EkftdVsHktiewf4halNmn9JPwG8DuKRPFV5WAwbzlNC9rg90RW2lzrOJ2nGft 9/lRunayfPP0DhBL3Zet99YRnR8dBCXxAgMBAAGjggHnMIIB4zAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBTJxnM8t6cDv3Sqvzy+607vAWXl8TBaBgNVHSMEUzBR gBTJxnM8t6cDv3Sqvzy+607vAWXl8aE2pDQwMjELMAkGA1UEBhMCU0kxDzANBgNV BAoTBlNpR05FVDESMBAGA1UEAxMJU2lHTkVUIENBggEAMAsGA1UdDwQEAwIBBjAb BgNVHREEFDASgRBzaWduZXQtY2FAaWpzLnNpMBsGA1UdEgQUMBKBEHNpZ25ldC1j YUBpanMuc2kwEQYJYIZIAYb4QgEBBAQDAgAHMDkGCWCGSAGG+EIBDQQsFipTaUdO RVQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgQ2VydGlmaWNhdGUwQAYDVR0fBDkw NzA1oDOgMYYvaHR0cDovL3NpZ25ldC1jYS5panMuc2kvcHViL2NybC9zaWduZXQw MmNybC5jcmwwPgYJYIZIAYb4QgEEBDEWL2h0dHA6Ly9zaWduZXQtY2EuaWpzLnNp L3B1Yi9jcmwvc2lnbmV0MDJjcmwuY3JsMD4GCWCGSAGG+EIBAwQxFi9odHRwOi8v c2lnbmV0LWNhLmlqcy5zaS9wdWIvY3JsL3NpZ25ldDAyY3JsLmNybDANBgkqhkiG 9w0BAQUFAAOCAQEAk3oyGLCotKaFtPMCf6de5gyOjQDSjL9CZKf6nKxHwZPcOAiZ XsNVgRYTlhcnACPHiqZ4dXzVZ4RjCzSO1Ud8gwTGPzgNBf/DLrmsP0iV5tYeZnhQ CF4EdLGPqXzIqvMUo6RVAFcF65noHceDDpkFRXQj3u6ta1YUONqcxvfXBMn2V10m rjoCNzKK4rKyuD8MvwznoNFb1sVhwjrfHngebWWaQklM+mW91aXH0JHn+UxS/lcL fxjx26wbOVFro/x7xEc9po3Be9ODaY57GegDJHr5AZf7phKlFVwcPaTk5ijpri1N yBUJiQIh29c4efU7WnyKbGGl4s7e6KRzja2Rlw== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/SiGNET-CA.crl_url0000664001343500074740000000006213614364133024765 0ustar davidgdavidghttp://signet-ca.ijs.si/pub/crl/signet02cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/SiGNET-CA.signing_policy0000664001343500074740000000022113614364133026335 0ustar davidgdavidg# EACL SiGNET CA (new) access_id_CA X509 '/C=SI/O=SiGNET/CN=SiGNET CA' pos_rights globus CA:sign cond_subjects globus '"/C=SI/O=SiGNET/*"' igtf-policy-installation-bundle-1.104/src/accredited/SiGNET-CA.namespaces0000664001343500074740000000064013614364133025444 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3d5be7bc.signing_policy.namespaces # CA alias : SiGNET-CA # subord_of: # subjectDN: /C=SI/O=SiGNET/CN=SiGNET CA # hash : 3d5be7bc.signing_policy # (generated automatically from 3d5be7bc.signing_policy) # TO Issuer "/C=SI/O=SiGNET/CN=SiGNET CA" \ PERMIT Subject "/C=SI/O=SiGNET/.*" igtf-policy-installation-bundle-1.104/src/accredited/SiGNET-CA.info0000664001343500074740000000075413614364133024266 0ustar davidgdavidg# Information for CA SiGNET # Subject: C=SI, O=SiGNET, CN=SiGNET CA # # @(#)$Id: 3d5be7bc.info,v 1.3 2015/06/18 09:44:55 pmacvsdg Exp $ # alias = SiGNET-CA ca_url = http://signet-ca.ijs.si/pub/cacert/signet02cacert.pem crl_url = http://signet-ca.ijs.si/pub/crl/signet02cacrl.crl email = signet-ca@ijs.si status = accredited:classic url = http://signet-ca.ijs.si/ version = 1.104 sha1fp.0 = 15:01:9E:62:9D:F2:5C:C6:5F:A7:13:7E:E3:85:3A:DD:20:BC:54:44 subjectdn = "/C=SI/O=SiGNET/CN=SiGNET CA" igtf-policy-installation-bundle-1.104/src/accredited/SlovakGrid.pem0000664001343500074740000000325013614364134024642 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEvDCCA6SgAwIBAgIBADANBgkqhkiG9w0BAQUFADA6MQswCQYDVQQGEwJTSzET MBEGA1UEChMKU2xvdmFrR3JpZDEWMBQGA1UEAxMNU2xvdmFrR3JpZCBDQTAeFw0w MjEyMTcxMTE4MzVaFw0yMjEyMTIxMTE4MzVaMDoxCzAJBgNVBAYTAlNLMRMwEQYD VQQKEwpTbG92YWtHcmlkMRYwFAYDVQQDEw1TbG92YWtHcmlkIENBMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxxRgRWljmj5p4uIphORnwXI9qrQ3naj9 sW8Ht4jxxB/T4H9LmxHpIkdNnlre0mCsYewZ22RHLJZGCZ9GAlsn956q1n+1F2/G D8rTKSH+OaC9fQCWCXr+AHlwMEV7x+kpLiui4cpWZWojlpTQvHKBFyNWo9ZT3DLg ryhw0TYTMdUL79pgsAWARCrCl6taasKd3ariMgylEKV0aletloxgSM6B/abBwhWk 0QNL8O1/E+fb9rbIDJt3d0Cq13Ph0NdTRFBSXDxa92rK23YZpwwWEQWihOe4t8kl ri8UYSLChW6GFQObc00kC/JfLsTSXU1M+idZvVn8fkd8JeM76ydqMwIDAQABo4IB yzCCAccwHQYDVR0OBBYEFLuHSvkpEZ1/j7mjGMWSYWxG7o3nMGIGA1UdIwRbMFmA FLuHSvkpEZ1/j7mjGMWSYWxG7o3noT6kPDA6MQswCQYDVQQGEwJTSzETMBEGA1UE ChMKU2xvdmFrR3JpZDEWMBQGA1UEAxMNU2xvdmFrR3JpZCBDQYIBADAPBgNVHRMB Af8EBTADAQH/MA4GA1UdDwEB/wQEAwIBxjARBglghkgBhvhCAQEEBAMCAAcwGQYD VR0SBBIwEIEOY2EudWlAc2F2YmEuc2swNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDov L3Vwcy5zYXZiYS5zay9jYS9zbG92YWtncmlkLmNybDA0BglghkgBhvhCAQQEJxYl aHR0cDovL3Vwcy5zYXZiYS5zay9jYS9zbG92YWtncmlkLmNybDA0BglghkgBhvhC AQgEJxYlaHR0cDovL3Vwcy5zYXZiYS5zay9jYS9jYS1wb2xpY3kuaHRtbDAoBglg hkgBhvhCAQ0EGxYZU2xvdmFrR3JpZCBDQSBDZXJ0aWZpY2F0ZTAlBglghkgBhvhC AQIEGBYWaHR0cDovL3Vwcy5zYXZiYS5zay9jYTANBgkqhkiG9w0BAQUFAAOCAQEA qBWqSo8h8dSHWH9dmqCP16L3wT6Wd+WD94sJ0a7Yoo3bzRdOGJ3JKcHilOvCPJEC zkXebkeIdgmrX6Lbxpno0dLK+dLOBTfnSV+8MQKrcZMAHxZFZWwW2NDZavdHkwWF 5XWJSCrnN3LGVetETe4p3Uvjd8K8k3CgQbrXif4662oLoIF3ywRnCg58A442uhNz hrZ7nVa1hYYnCdxftV8qbFaab8sTeEYDFa/NCymVKqXI7dQ/Z5zDAuQXpm19Eu2K aj2qGqnz+3uC8vAFg6030g2XQ7rAvf3sKk44cHHAnVGCM8UPzgOeTanYNcN1dbLs p9b6ut6gvncv4QWan4Zwhg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/SlovakGrid.crl_url0000664001343500074740000000004613614364134025523 0ustar davidgdavidghttp://ups.savba.sk/ca/slovakgrid.crl igtf-policy-installation-bundle-1.104/src/accredited/SlovakGrid.signing_policy0000664001343500074740000000027013614364134027075 0ustar davidgdavidg# EACL Slovak CA access_id_CA X509 '/C=SK/O=SlovakGrid/CN=SlovakGrid CA' pos_rights globus CA:sign cond_subjects globus '"/C=SK/O=SlovakGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/SlovakGrid.namespaces0000664001343500074740000000064413614364134026204 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)e13e0fcf.namespaces # CA alias : SlovakGrid # subord_of: # subjectDN: /C=SK/O=SlovakGrid/CN=SlovakGrid CA # hash : e13e0fcf # (generated automatically from ./SlovakGrid/e13e0fcf.signing_policy) # TO Issuer "/C=SK/O=SlovakGrid/CN=SlovakGrid CA" \ PERMIT Subject "/C=SK/O=SlovakGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/SlovakGrid.info0000664001343500074740000000065013614364134025015 0ustar davidgdavidg# # @(#)$Id: e13e0fcf.info,v 1.6 2015/06/18 09:44:55 pmacvsdg Exp $ # Information for CA SlovakGrid # obtained from e13e0fcf in SlovakGrid/ alias = SlovakGrid url = http://ups.savba.sk/ca email = ca.ui@sav.sk crl_url = http://ups.savba.sk/ca/slovakgrid.crl status = accredited:classic version = 1.104 sha1fp.0 = 2E:75:63:45:22:84:24:09:9F:E7:EC:0D:72:7E:8D:4D:4C:BF:73:6F subjectdn = "/C=SK/O=SlovakGrid/CN=SlovakGrid CA" igtf-policy-installation-bundle-1.104/src/accredited/TERENA-eScience-SSL-CA-3.pem0000664001343500074740000000341113614364134026346 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFBDCCA+ygAwIBAgIQDLagvlAOP6QGtXVwDg/+bDANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMTQxMTE4MTIwMDAwWhcNMjQxMTE4MTIwMDAwWjBtMQswCQYDVQQG EwJOTDEWMBQGA1UECBMNTm9vcmQtSG9sbGFuZDESMBAGA1UEBxMJQW1zdGVyZGFt MQ8wDQYDVQQKEwZURVJFTkExITAfBgNVBAMTGFRFUkVOQSBlU2NpZW5jZSBTU0wg Q0EgMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMpYsx0hE/klfhLT BNrBXBA9fVAFiSjl4alcdS4N7hzZS72EA+/ViQQaN6jU2X/xvjP6DfrUGXbgWBmC 4vFBZkgVxaM3amHQP9rJ0MaQ6NXmRhiPuDFD9TaXTqs4q71wpkVaJwbZuROq9fwy ZTofePEksl9jcg8CdkKLR6nOSmZyPUx0TuUvjEYCwjkRtZ3u0joIeabWO5+7ZOzq pXV7pdzWGv/7V9wm86FweMzMDFvecNeiNtPGh/g3nQLAOwDZJd2oVQINIw5Qohub eiF4//VY+1XpVG0y4etxpj9QNxJtpBQRnjgFy3MForsd2zpTXj7KyX/bKUYNGZFI B7QhJp0CAwEAAaOCAaYwggGiMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/ BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au ZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MIGBBgNVHR8EejB4MDqg OKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS b290Q0EuY3JsMDqgOKA2hjRodHRwOi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNl cnRBc3N1cmVkSURSb290Q0EuY3JsMD0GA1UdIAQ2MDQwMgYEVR0gADAqMCgGCCsG AQUFBwIBFhxodHRwczovL3d3dy5kaWdpY2VydC5jb20vQ1BTMB0GA1UdDgQWBBQp qhtuMPkwZ2OlhyYMrPGBnGl0STAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd 823IDzANBgkqhkiG9w0BAQsFAAOCAQEAp5f8mAuKmxksInIi5q2HM3UvKUzbWXN7 YBOUA2FRm+5bXWRiyJduedZ1mzsiOyzZLVU4P4DTL24xzdCt4aOyB8wi/ivCwUWW 4uAgh3iDd6eG+XWV4uao9dXy3Hz+pkxWLJ/YR13qn6LU2m7Jmri2gsYGIxCWBd98 jF+IEWjmstX4yXlMIEx5/seK9HoNnEnjYY7ycDF2qr+lE+lETt+csHL5xv05hzIZ /yhEX/wN5BkNZJQedhgKCg3OQow6tUTPjgnQLMvcLbGAmTIWoiEpc+00Q0tZWR48 1cUR0MF0J3TDbY0q8pP8jJ/YHKofUNyEFEoS0q/4+eC34bmTWuKoqA== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/TERENA-eScience-SSL-CA-3.crl_url0000664001343500074740000000014413614364134027227 0ustar davidgdavidghttp://crl4.digicert.com/TERENAeScienceSSLCA3.crl http://crl3.digicert.com/TERENAeScienceSSLCA3.crl igtf-policy-installation-bundle-1.104/src/accredited/TERENA-eScience-SSL-CA-3.signing_policy0000664001343500074740000000032313614364134030601 0ustar davidgdavidg# EACL - TERENAeScienceSSLCA3 # access_id_CA X509 '/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.104/src/accredited/TERENA-eScience-SSL-CA-3.namespaces0000664001343500074740000000101713614364134027704 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1db3b27f.namespaces # CA alias : TERENA-eScience-SSL-CA-3 # subord_of: DigiCertAssuredIDRootCA-Root # subjectDN: /C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3 # hash : 1db3b27f # (generated automatically from 1db3b27f.signing_policy) # TO Issuer "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.104/src/accredited/TERENA-eScience-SSL-CA-3.info0000664001343500074740000000135013614364134026520 0ustar davidgdavidg# # @(#)$Id: 1db3b27f.info,v 1.3 2015/06/18 09:44:56 pmacvsdg Exp $ # Information for C=NL, ST=Noord-Holland, L=Amsterdam, O=TERENA, CN=TERENA eScience SSL CA 3 # alias = TERENA-eScience-SSL-CA-3 url = https://www.terena.org/activities/tcs/ ca_url = http://cacerts.digicert.com/TERENAeScienceSSLCA3.crt crl_url = http://crl4.digicert.com/TERENAeScienceSSLCA3.crl;http://crl3.digicert.com/TERENAeScienceSSLCA3.crl policy_url = https://www.terena.org/activities/tcs/repository/ requires = DigiCertAssuredIDRootCA-Root email = tcs-pma@terena.org status = accredited:classic version = 1.104 sha1fp.0 = F3:51:BD:13:1E:DC:6C:06:7B:34:84:EC:08:EB:53:4C:7F:A7:57:25 subjectdn = "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3" igtf-policy-installation-bundle-1.104/src/accredited/TERENAeSciencePersonalCA3.pem0000664001343500074740000000341513614364135027211 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFCTCCA/GgAwIBAgIQArfJ3a3SvQnrWcRckAxgeDANBgkqhkiG9w0BAQsFADBl MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv b3QgQ0EwHhcNMTQxMTE4MTIwMDAwWhcNMjQxMTE4MTIwMDAwWjByMQswCQYDVQQG EwJOTDEWMBQGA1UECBMNTm9vcmQtSG9sbGFuZDESMBAGA1UEBxMJQW1zdGVyZGFt MQ8wDQYDVQQKEwZURVJFTkExJjAkBgNVBAMTHVRFUkVOQSBlU2NpZW5jZSBQZXJz b25hbCBDQSAzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsKfSY+QH o9cT5EtRldy7wXXphZpFEf/50swaHarFN3b9gQkQ99K+ILeaEbGLcqgxhdp5yLcV dUpMFaA8RXkcziB2DWLwUR2ohrwkIxF8z0U6HDklX1qZqv8wC/0DhKqSaIHjPtCA RoiXABDSbIZe1HH42GwZzeakrZO+H+dlVhX/2ohezFSZ7FK96K4kL12Ds7PDfzV8 skMopmrQW7piVQjbMxdV/lxwhnzzb8ZTRVvZLb+2sytG2pop3y3LIermwnSDWXPj aH9pVN/OzQg4IKIdyrGFXGU0roYe6qejI8ROVajmaHdYaV18wzpIyvgwDAue4mV7 LJ3KduHmjdPFZQIDAQABo4IBpjCCAaIwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNV HQ8BAf8EBAMCAYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8v b2NzcC5kaWdpY2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRp Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6 MHgwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3Vy ZWRJRFJvb3RDQS5jcmwwOqA4oDaGNGh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9E aWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCow KAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwHQYDVR0O BBYEFIyfES7m43oEpR5Vi0YIBKbtl3CmMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1R i6enIZ3zbcgPMA0GCSqGSIb3DQEBCwUAA4IBAQCORxFfdTnp/FhxQqCZHrtgL/m/ 5Fk1dqh/2DSNV7G6LtoRyoYeCMjZBTsQP01IritqkJ0OYQEtEyK7PUidSnvg413f 3EwYsO5QmEluYZM4oBVfokor54p6SLWn1qmAUlsSE5dShwUvWAbJIRKjuRi5YgzD 4gII6lAUPx9amTJWTUCLhbtFGhVELmVKSRa+PtM6cz8bAYllNprgKBiLcG2j+eRG LITO/r/yfsepCIQCbeQ54PHzpjr0fRelcNvxNBGeqEPINX3YcDNdNUtTiOidbVIp da+xEv7LzalVlW+2JFBAXD6PKaXx50yP7sbJ9rbJbFnn7DhicTWFFEjAG/RK -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/TERENAeSciencePersonalCA3.crl_url0000664001343500074740000000015613614364135030071 0ustar davidgdavidghttp://crl4.digicert.com/TERENAeSciencePersonalCA3.crl http://crl3.digicert.com/TERENAeSciencePersonalCA3.crl igtf-policy-installation-bundle-1.104/src/accredited/TERENAeSciencePersonalCA3.signing_policy0000664001343500074740000000033513614364135031443 0ustar davidgdavidg# EACL - TERENAeSciencePersonalCA3 # access_id_CA X509 '/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=terena/DC=tcs/*"' igtf-policy-installation-bundle-1.104/src/accredited/TERENAeSciencePersonalCA3.namespaces0000664001343500074740000000103213614364135030540 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)e732ef10.namespaces # CA alias : TERENAeSciencePersonalCA3 # subord_of: DigiCertAssuredIDRootCA-Root # subjectDN: /C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3 # hash : e732ef10 # (generated automatically from e732ef10.signing_policy) # TO Issuer "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3" \ PERMIT Subject "/DC=org/DC=terena/DC=tcs/.*" igtf-policy-installation-bundle-1.104/src/accredited/TERENAeSciencePersonalCA3.info0000664001343500074740000000137713614364135027370 0ustar davidgdavidg# # @(#)$Id: e732ef10.info,v 1.3 2015/06/18 09:44:56 pmacvsdg Exp $ # Information for C=NL, ST=Noord-Holland, L=Amsterdam, O=TERENA, CN=TERENA eScience Personal CA 3 # alias = TERENAeSciencePersonalCA3 url = https://www.terena.org/activities/tcs/ ca_url = http://cacerts.digicert.com/TERENAeSciencePersonalCA3.crt crl_url = http://crl4.digicert.com/TERENAeSciencePersonalCA3.crl;http://crl3.digicert.com/TERENAeSciencePersonalCA3.crl policy_url = https://www.terena.org/activities/tcs/repository/ requires = DigiCertAssuredIDRootCA-Root email = tcs-pma@terena.org status = accredited:mics version = 1.104 sha1fp.0 = B1:3C:DB:C0:6C:11:38:35:C9:54:20:F7:A0:D7:8F:51:34:6D:72:7E subjectdn = "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3" igtf-policy-installation-bundle-1.104/src/accredited/TRGrid.pem0000664001343500074740000000253713614364135023740 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDyjCCArKgAwIBAgIJAKnph0aQlpRvMA0GCSqGSIb3DQEBBQUAMDMxCzAJBgNV BAYTAlRSMQ8wDQYDVQQKEwZUUkdyaWQxEzARBgNVBAMTClRSLUdyaWQgQ0EwHhcN MDUxMDA3MTM0MzMyWhcNMjUxMDA2MTM0MzMyWjAzMQswCQYDVQQGEwJUUjEPMA0G A1UEChMGVFJHcmlkMRMwEQYDVQQDEwpUUi1HcmlkIENBMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAvY9W0tRZ38QiIODvQmQ0iR0C6L4sBfOVAhjB2Cxl uPUfBJ41+eOoHYZQFNcXfmoOqGD0nocsSVRSP+LHwfSb4Zw8LQCIuwl5N/jZ6CbS UDEdxhcDmb+7jgccInoqx4xRWYOpy4OFD91MrW/vl3xKtxxnu/27MkPLQr6oWOE7 O+jY+G+D5zlotN0N92A48qrVXZfMjauvygmz4CQAdMpvO2thHjTJhZmstbdvAdCy 6Xf6i/r3x6VTN1ucC3rrkNEqDFgBq/D6qPDta5XuIZPcmyProXjxF2kCXdwVi9gf Fx1puBw8xXwHsEn/mg9T+6Var6gVFbj+AHNw+W81uZGuxQIDAQABo4HgMIHdMA8G A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQmEQQXACL3 ECnqOiWaPbQ9wi7WVzBjBgNVHSMEXDBagBQmEQQXACL3ECnqOiWaPbQ9wi7WV6E3 pDUwMzELMAkGA1UEBhMCVFIxDzANBgNVBAoTBlRSR3JpZDETMBEGA1UEAxMKVFIt R3JpZCBDQYIJAKnph0aQlpRvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly93d3cu Z3JpZC5vcmcudHIvY2EvY3JsL2NybC5kZXIwDQYJKoZIhvcNAQEFBQADggEBAA8S nIAY2S232ys+sdz92UlkBVBGPTYVLevTY+r42OiIj8M/BSs03SrBncZQrUCm4rP9 igtC3Mhqh0X9bNFNN+o4PglxWPNcxxIFFf0d9LS2iSEPJemlkZHnO6SkTPshd+qA T33u+8HtZllX32YZXyVH2WDf2Kcu4CUAxBcav5C5f7FRY02JwDtOujV6wHU+JYcw VCFVtVuI3OYxALwgE3tZ8B498IWAXOLVgAjIyWCGkQt/UR0XzNZwIVRXW2GFiZlJ U+Tc5lfK5RMxENs5plt9jBEalT3mNcCgoydr+/DrCrpZG/vmhITy/cdW9IT8TApo MFrjzedS1lMftr3HGlQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/TRGrid.crl_url0000664001343500074740000000004613614364135024612 0ustar davidgdavidghttp://www.grid.org.tr/ca/crl/crl.der igtf-policy-installation-bundle-1.104/src/accredited/TRGrid.signing_policy0000664001343500074740000000031113614364135026160 0ustar davidgdavidg# @(#)$Id: 1691b9ba.signing_policy,v 1.1 2005/10/14 16:02:37 pmacvsdg Exp $ # access_id_CA X509 '/C=TR/O=TRGrid/CN=TR-Grid CA' pos_rights globus CA:sign cond_subjects globus '"/C=TR/O=TRGrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/TRGrid.namespaces0000664001343500074740000000062413614364135025271 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)1691b9ba.namespaces # CA alias : TRGrid # subord_of: # subjectDN: /C=TR/O=TRGrid/CN=TR-Grid CA # hash : 1691b9ba # (generated automatically from ./EUGridPMA/TRGrid/1691b9ba.signing_policy) # TO Issuer "/C=TR/O=TRGrid/CN=TR-Grid CA" \ PERMIT Subject "/C=TR/O=TRGrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/TRGrid.info0000664001343500074740000000065113614364135024105 0ustar davidgdavidg# TRGrid CA Information # # @(#)$Id: 1691b9ba.info,v 1.4 2015/06/18 09:44:56 pmacvsdg Exp $ # alias = TRGrid ca_url = http://www.grid.org.tr/ca/ca_cert/1691b9ba.0 crl_url = http://www.grid.org.tr/ca/crl/crl.der email = ca@grid.org.tr status = accredited:classic url = http://www.grid.org.tr/ca version = 1.104 sha1fp.0 = A2:31:9E:C8:90:AF:D9:6D:F4:4A:59:31:F2:E6:D2:D5:39:EC:1D:F0 subjectdn = "/C=TR/O=TRGrid/CN=TR-Grid CA" igtf-policy-installation-bundle-1.104/src/accredited/TSU-GE.pem0000664001343500074740000000401113614364135023536 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFwjCCA6qgAwIBAgIBADANBgkqhkiG9w0BAQsFADA/MRIwEAYKCZImiZPyLGQB GRYCR0UxEzARBgoJkiaJk/IsZAEZFgNUU1UxFDASBgNVBAMTC1RTVSBSb290IENB MB4XDTE0MTExNjIwMjI0MVoXDTI0MTExNjIwMjI0MVowPzESMBAGCgmSJomT8ixk ARkWAkdFMRMwEQYKCZImiZPyLGQBGRYDVFNVMRQwEgYDVQQDEwtUU1UgUm9vdCBD QTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALgZetzvfv/zGmtZqe/q zp6oi8kqegibd/tLuYoySFdqYtFEQI9oGLDCxLphkE5ZvrTWj49jM/OWhhTawbTE 4PSQIwVEWvmRVzCFam3IrHdPABw+Bcf1a/k8auNXarmbyXiIlDbOis0m2s3mbHHy G8ktZhrBDZ6POLJTM6HoXPk+d7kOx2CWVCMmDavIbSU2PevoA3pd94YHzIsytaDb gLXNygMdJdUag9ZnUOE9HO9UKzANZ2rFALnU5w5O/fjrBsiLYAVy+XNQuGLaHG8H ct1ocnJYvkAjnfX4gb17C4T8ykvs751SsbNlEtdEPn649X/ceBfydPIQEwZXEN2d ndJTx/f31zP7qQ0qWe/G8xZQVaZPhcfQ8xMYWsMDwvpPPdeKOthYaJq/lvXFTlFP 4yuANZUQB08CrhXzhMOfmhuTiGj6KtL7dZBVDNQV5BD4vcMGg7+DOAvTrfDk29RU hHq00B+O4R/pOIUH3MWotNwqjRwnWzMhcbvaUVTugm9/CBeZSedbuH+tdb22iKjR vrWPQzUdHOV1fGWpYx8d2/Fr+RByLvddJGoXJ56sukD1aRkDWGaYf7JZxUC6QPIx h0NAlzViL7qOCw8qUwI9CZeqKGfquKTpiysgMUFUjo4bLdfnuz+AwqqynE7j0Ikg oQEHTfi246uoFIOp31J2X27fAgMBAAGjgcgwgcUwHQYDVR0OBBYEFIyrYzTl+Yd+ DDERUDa9Eg1cSwloMB8GA1UdIwQYMBaAFIyrYzTl+Yd+DDERUDa9Eg1cSwloMA8G A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMDAGA1UdEgQpMCeBDmdyaWQt Y2FAdHN1LmdlhhVodHRwOi8vZ3JpZC1jYS50c3UuZ2UwMAYDVR0RBCkwJ4EOZ3Jp ZC1jYUB0c3UuZ2WGFWh0dHA6Ly9ncmlkLWNhLnRzdS5nZTANBgkqhkiG9w0BAQsF AAOCAgEAfFrAZoCxy9HH4L2rEVIukrfjSSHgVZJ5Lq3Dg0qKRfGSf4ubuOS3hfjs IIhsB7F8ZNlBLjwMFPYW5q0AX6VHFr6lWdnohbqssMDRdyvjUNxBUYEamwN4nAeq /CU1tiMgF+sbOpmmei5aIfFaGj5mIVUehLy+Zn4sTFoYOyNCcirR7XAMCVGYew+0 i/GLmLz21KKhVPMNgVMEVEz/QzwoP22+uZm+/FH4a/StB5GMGaXwb3ApLUZGImsA Z6icQ4VVmtiISoFE6qS7AlRV/Bgbcmkv5ozad5kuyWHH2DG3C1xlxZP2Nt180XcI 3jesIv3z8bcrGk2ZPUzyHxMe2nbh8qRxj/Pw9tXRcRnqydCU5Asj1UCPz7hoLi/Y lPHfASSDgpNsL8v0naDnx9j4xqF6v/0i9J5qhoQO4oyDUYgHRwBPDzuQNVyCb25I A5MxUsSH6xscnZzyBNl8/OjK/g81Px7c5RzpxjutY03p2CDOCOBCH1B2rNL1Bjjx KbcL+AwY/TQbGJVZVeCkv33yf8N+cN4Uic4xtZRWPU2ZBdp577DE9iBulDqbNqn2 QiOAGNO7sVb6wNdrjDzWkPu6lJ21j469ctcJ2h25cLNODYLO5KK+6g/++5+Os92W APuSWQAw6O3Vim7UV4aMTmsblF0G2/AteoeYNUknuHWSss7H2sc= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/TSU-GE.crl_url0000664001343500074740000000003613614364135024422 0ustar davidgdavidghttp://grid-ca.tsu.ge/tsu.crl igtf-policy-installation-bundle-1.104/src/accredited/TSU-GE.signing_policy0000664001343500074740000000031613614364135025776 0ustar davidgdavidg# TSU-GE Root CA signing policy access_id_CA X509 '/DC=GE/DC=TSU/CN=TSU Root CA' pos_rights globus CA:sign cond_subjects globus '"/DC=GE/DC=TSU/CN=TSU Root CA" "/DC=GE/DC=TSU/*"' igtf-policy-installation-bundle-1.104/src/accredited/TSU-GE.namespaces0000664001343500074740000000057213614364135025104 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)4b3f5558.namespaces # CA alias : # subord_of: # subjectDN: /DC=GE/DC=TSU/CN=TSU Root CA # hash : 4b3f5558 # (generated automatically from 4b3f5558.signing_policy) # TO Issuer "/DC=GE/DC=TSU/CN=TSU Root CA" \ PERMIT Subject "/DC=GE/DC=TSU/.*" igtf-policy-installation-bundle-1.104/src/accredited/TSU-GE.info0000664001343500074740000000071713614364135023721 0ustar davidgdavidg# @(#)$Id: 4b3f5558.info,v 1.2 2015/06/18 09:44:56 pmacvsdg Exp $ # alias = TSU-GE ca_url = https://grid-ca.tsu.ge/Root_Certificate/cacert.pem crl_url = http://grid-ca.tsu.ge/tsu.crl policy_url = https://grid-ca.tsu.ge/index.php?a=main&pid=3&lang=eng email = grid-ca@tsu.ge status = accredited:classic url = https://grid-ca.tsu.ge/ version = 1.104 sha1fp.0 = 5C:2A:A9:D0:C1:D2:04:50:21:66:9A:57:E9:FB:D6:53:1B:3C:55:B1 subjectdn = "/DC=GE/DC=TSU/CN=TSU Root CA" igtf-policy-installation-bundle-1.104/src/accredited/UGRID-G2.pem0000664001343500074740000000375513614364136023731 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIFrjCCA5agAwIBAgIBATANBgkqhkiG9w0BAQsFADBCMRMwEQYKCZImiZPyLGQB GRYDb3JnMRUwEwYKCZImiZPyLGQBGRYFdWdyaWQxFDASBgNVBAMTC1VHUklEIENB IEcyMB4XDTE3MDEyNjE5MDY1MVoXDTM3MDEyMTE5MDY1MVowQjETMBEGCgmSJomT 8ixkARkWA29yZzEVMBMGCgmSJomT8ixkARkWBXVncmlkMRQwEgYDVQQDEwtVR1JJ RCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALyUjTKuq7Uf cWNGs0JFY6JYqcKMatem6AFv6aI2w0m4dVw7/WZX/317e2RT2Dgu+SEodtB/3B39 0KCSDIoQz6FNXyRKc2FiMc2YeYJNKBwCyWLGxzJ7Li527rHE2I0tbxxCezIuhCcY zUNKG0VpOLrfQgWpW1PnsRRdhWl2covAZKLnV8oTaslGFmLshqxyW+B9MfRO+zKu flxgtNMc1yle4RB+imY2e5txiobVJQtqlN13Vf6/e8OD+0QbTRbsTyDli5BTl8+Q ieJereo2jrKN1DzcGa5GZ+jIcLPXj6VdMp+kpqEfHvtsUGNbbhsW96qqSBNuJBx3 MIEoJ7GM+8W2vo8GuShvv2JXabelL+H3864HLxwhWitu/hQqd8konjN4O6YUs94+ v4N162TcpvXNoQfqFE1fL43M3BV4mXLTeYyCtTTSuefpep2ge0vnWd3Dx/cuUoof Bdm+/njBjC1EhUAntYe4dr0v9aRFxd04MGPTNhCV2m8l/U6D+RulWu0gR+yR1ptU Tgv4E1Ta06KFoc0HB/MqKk9W+Eb7NKORw3drIAUJB0F1iVc/WQYVccjv3B4yZoPJ LoKRBLWacGYHHJI1iJgt7LTxIM+CioSGywftfBchC0w5gGoW2R18GSKHKwtqlQeW 76KbXn1N0boVEnFJQgiEtwCk3uxiv1ZHAgMBAAGjga4wgaswDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAQYwFwYDVR0RBBAwDoEMY2FAdWdyaWQub3JnMB0G A1UdDgQWBBSMdLS3JhYA5QskvSN2f5SL5oGzzzAfBgNVHSMEGDAWgBSMdLS3JhYA 5QskvSN2f5SL5oGzzzAvBgNVHR8EKDAmMCSgIqAghh5odHRwOi8vY2EudWdyaWQu b3JnL2NhMmNybC5kZXIwDQYJKoZIhvcNAQELBQADggIBAF8bXJ1pCYm26hOFFkFZ 9JDmVb1e76xK35AkAYD6QR3erJ6hG9hg2P0mDnLVm/iY6jiBt1wAqr0tRfmreaqq pYdxn1ZFwFJ8oz7hla682jgRtxqrd80PiYykoMyScAqod8ZYmvpA/anarwMRgvut KIDyPQj2YSq7XXf8cnYXitkIohgy4VZKfLJ4e4xBpcROBm3W/tWkBgAZ4lhXnUA3 8HKEB896RAEXDgnTkge2M82cYuCeCi9F0qXUufeqXsOhDb2AY0XbRFLjkEJNkkad rC886PQGfkVtMx5sAalotLsddgxQyL2r8fo1/f3XT/dfewRMvc802IHwsCtswkVv pIgvVilNyKxt/bf83l909P8sb18yjqEUQkjkYNu0iTr2X+cgyd3J8+zQuN2ZzeoO 60/SyeCIcVneMBgFvPbCqUF+rsl1BPCnZ+jHXeT6VZC274qEWC+RZHqqFJeHvpNv xAbmwoURDEvljxxbx3hCpRQodGub0jHAk2BmyFQvavLZMHiFj88NCI7hO1CnK1iS kacMj44tSRhDlPoXYTnMKusXEso+wwFjZ9EhMQY2SLxYuTz6DmXwlP/0ZxxpT4UI yU2wyNGrxuPqVznR5UunOo1pP9qzyvGni268+BVfGBDjwmuwJ/CownleuQypeSN1 feTH8tUeO3dystDJTjOla+11 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/UGRID-G2.crl_url0000664001343500074740000000003713614364136024600 0ustar davidgdavidghttp://ca.ugrid.org/ca2crl.der igtf-policy-installation-bundle-1.104/src/accredited/UGRID-G2.signing_policy0000664001343500074740000000033113614364136026150 0ustar davidgdavidg# EACL # @(#)$Id: UGRID-G2.signing_policy,v 1.1 2017/02/27 20:02:19 pmacvsdg Exp $ access_id_CA X509 '/DC=org/DC=ugrid/CN=UGRID CA G2' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=ugrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/UGRID-G2.namespaces0000664001343500074740000000065113614364136025257 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)UGRID-G2.signing_policy.namespaces # CA alias : UGRID-G2 # subord_of: # subjectDN: /DC=org/DC=ugrid/CN=UGRID CA G2 # hash : UGRID-G2.signing_policy # (generated automatically from UGRID-G2.signing_policy) # TO Issuer "/DC=org/DC=ugrid/CN=UGRID CA G2" \ PERMIT Subject "/DC=org/DC=ugrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/UGRID-G2.info0000664001343500074740000000064613614364136024077 0ustar davidgdavidg# # @(#)$Id: UGRID-G2.info,v 1.1 2017/02/27 20:02:19 pmacvsdg Exp $ # UGRID - The Ukrainian Grid CA G2 # alias = UGRID-G2 ca_url = https://ca.ugrid.org/g2certs/cacert.pem crl_url = http://ca.ugrid.org/ca2crl.der email = ca@ugrid.org status = accredited:classic url = https://ca.ugrid.org/ version = 1.104 sha1fp.0 = 58:86:89:27:79:7F:00:55:A4:C3:26:0E:EB:F1:ED:3D:0C:6A:B6:3A subjectdn = "/DC=org/DC=ugrid/CN=UGRID CA G2" igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceCA-2B.pem0000664001343500074740000000252713614364136025230 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDwzCCAqugAwIBAgICASMwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCVUsx FTATBgNVBAoTDGVTY2llbmNlUm9vdDESMBAGA1UECxMJQXV0aG9yaXR5MRowGAYD VQQDExFVSyBlLVNjaWVuY2UgUm9vdDAeFw0xMTA2MTgxMzAwMDBaFw0yNzEwMzAw OTAwMDBaMFMxCzAJBgNVBAYTAlVLMRMwEQYDVQQKEwplU2NpZW5jZUNBMRIwEAYD VQQLEwlBdXRob3JpdHkxGzAZBgNVBAMTElVLIGUtU2NpZW5jZSBDQSAyQjCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkLgb2eIcly4LZfj0Rf5F7s+HE/ 6Tvpf4jsKkm7qs33y3EEudCbcPwQKjS2MgytPv+8xpEPHqy/hqTseNlZ6oJgc+V8 xlJ+0iws882Ca8a9ZJ/iGQH9UzXU4q35ArN3cbwoWAAvMvzZ6hUV86fAAQ1AueQN 6h7/tnfYfaUMiB4PNxucmouMHDJGmYzl47FtlLeHUr2c4m/oWSG5pADIvGFpWFHj NIw8/x4n97w5/ks0tc/8/5Q6xzUfCX/VfqciQCvKcui2J5MBhUlBDLenzwqvUytB 4XAwX/pRcKmnFEYwoc9OKGExNx9tn9RjQYJAC/KLb44Jqno9l0eRxu3uw4sCAwEA AaOBnzCBnDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E FgQUEqW/kZ9/4q9qXAny4vpZ4Dbh81UwHwYDVR0jBBgwFoAUXvgbSKZ3ayk8LgBT Mytjont+k8AwOQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5jYS5uZ3MuYWMu dWsvY3JsL3Jvb3QtY3JsLmRlcjANBgkqhkiG9w0BAQsFAAOCAQEArd5TFOo9SzGW 0+KrAdzzf60zh4Wy//vZz4tgt7NeDbNpz2TZROBAClSu7oLPiruzgnhNP/Vxeu0s pI41wRQsh0DVxhM+9ZFOskH+OdmHzKagoejvHh6Jt8WNN0eBLzN8Bvsue7ImJPaY cf/Qj1ZTBhaRHcMsLNnqak3un/P+uLPxqSuxVKMtC8es/jqosS4czJ3dgs1hgFy9 nPQiwuIyf3OJ9eifAOGXk9Nlpha9C54zhc+hAkSLnpx/FhPjwLgpwDRgDJud6otH 15x3qZqXNx7xbYfeHaM1R1HMEjfVdzKCTY4zsqNEGPEF/0nUQSFk6KQVz0/ugNmI 9qoDx3FeEg== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceCA-2B.crl_url0000664001343500074740000000005313614364136026101 0ustar davidgdavidghttp://crl.ca.ngs.ac.uk/crl/escience2b.crl igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceCA-2B.signing_policy0000664001343500074740000000035513614364136027461 0ustar davidgdavidg# @(#)$Id: ffc3d59b.signing_policy,v 1.3 2011/09/30 06:19:28 pmacvsdg Exp $ # access_id_CA X509 '/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B' pos_rights globus CA:sign cond_subjects globus '"/C=UK/O=eScience/*"' igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceCA-2B.info0000664001343500074740000000076013614364136025377 0ustar davidgdavidg# # @(#)$Id: ffc3d59b.info,v 1.3 2015/06/18 09:44:56 pmacvsdg Exp $ # Information for 2011 CA UKeScience eScience issuing CA 2B # alias = UKeScienceCA-2B requires = UKeScienceRoot-2007 url = http://www.grid-support.ac.uk/ca/ crl_url = http://crl.ca.ngs.ac.uk/crl/escience2b.crl email = support@grid-support.ac.uk status = accredited:classic version = 1.104 sha1fp.0 = F3:03:90:25:E1:FD:F5:9D:B9:4A:97:F2:73:97:DE:73:91:B7:E9:AB subjectdn = "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceRoot-2007.pem0000664001343500074740000000240113614364137026005 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDhjCCAm6gAwIBAgIBADANBgkqhkiG9w0BAQUFADBUMQswCQYDVQQGEwJVSzEV MBMGA1UEChMMZVNjaWVuY2VSb290MRIwEAYDVQQLEwlBdXRob3JpdHkxGjAYBgNV BAMTEVVLIGUtU2NpZW5jZSBSb290MB4XDTA3MTAzMDA5MDAwMFoXDTI3MTAzMDA5 MDAwMFowVDELMAkGA1UEBhMCVUsxFTATBgNVBAoTDGVTY2llbmNlUm9vdDESMBAG A1UECxMJQXV0aG9yaXR5MRowGAYDVQQDExFVSyBlLVNjaWVuY2UgUm9vdDCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM3ORtmmUHotwDTfAH5/eIlo3+BK oElDeaeN5Sg2lhPu0laPch7pHKSzlqyHmZGsk3fZb8hBmO0lD49+dKnA31zLU6ko Bje1THqdrGZPcjTm0lhc/SjzsBtWm4oC/bpYBACliB9wa3eSuU4Rqq71n7+4J+WO KvaDHvaTdRYE3pyie2Xe5QTI8CXedCMh18+EdFvwlV79dlmNRNY93ZWUu6POL6d+ LapQkUmasXLjyjNzcoPXgDyGauHOqmyqxuPx4tDTsC25nKr+7K5k3T+lplJ/jMkQ l/QHgqnABBXQILzzrt0a8nQdM8ONA+bht+8sy4eN/0zMulNj8kAzrutkhJsCAwEA AaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE FF74G0imd2spPC4AUzMrY6J7fpPAMB8GA1UdIwQYMBaAFF74G0imd2spPC4AUzMr Y6J7fpPAMA0GCSqGSIb3DQEBBQUAA4IBAQCT0a0kcE8oVYzjTGrd5ayvOI+vbdiY MG7/2V2cILKIts7DNdIrEIonlV0Cw96pQShjRRIizSHG5eH1kLJcbK/DpgX6QuPR WhWR5wDJ4vaz0qTmUpwEpsT9mmyehhHbio/EsYM7LesScJrO2piD2Bf6pFUMR1LC scAqN7fTXJSg6Mj6tOhpWpPwM9WSwQn8sDTgL0KkrjVOVaeJwlyNyEfUpJuFIgTl rEnkXqhWQ6ozArDonB4VHlew6eqIGaxWB/yWMNvY5K+b1j5fdcMelzA45bFucOf1 Ag+odBgsGZahpFgOqKvBuvSrk/8+ie8I2CVYwT486pPnb5JFgHgUfZo8 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceRoot-2007.crl_url0000664001343500074740000000005113614364137026665 0ustar davidgdavidghttp://crl.ca.ngs.ac.uk/crl/root-crl.der igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceRoot-2007.signing_policy0000664001343500074740000000112513614364137030243 0ustar davidgdavidg# @(#)$Id: 98ef0ee5.signing_policy,v 1.3 2013/01/21 10:13:18 pmacvsdg Exp $ access_id_CA X509 '/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root' pos_rights globus CA:sign cond_subjects globus '"/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2A" "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B"' # Uncomment the following instead, to enable the SLCS branches: # cond_subjects globus '"/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2A" "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" "/C=UK/O=eScienceSLCSHierarchy/OU=Authority/CN=SLCS Top Level CA"' igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceRoot-2007.namespaces0000664001343500074740000000206313614364137027347 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)$Id: 98ef0ee5.namespaces,v 1.4 2013/01/21 10:13:18 pmacvsdg Exp $ # CA alias : UKeScienceRoot # subjectDN: /C=UK/O=eScienceRoot/OU=Authority/L=Root/CN=CA # TO Issuer "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" \ PERMIT Subject "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2A" TO Issuer "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" \ PERMIT Subject "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" # Uncomment the following to enable the SLCS branches (or override this # file by adding a specific namespaced file for the SLCS branches): # TO Issuer "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" \ # PERMIT Subject "/C=UK/O=eScienceSLCSHierarchy/OU=Authority/CN=SLCS Top Level CA" TO Issuer "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2A" \ PERMIT Subject "/C=UK/O=eScience/.*" TO Issuer "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" \ PERMIT Subject "/C=UK/O=eScience/.*" igtf-policy-installation-bundle-1.104/src/accredited/UKeScienceRoot-2007.info0000664001343500074740000000071713614364137026167 0ustar davidgdavidg# # @(#)$Id: 98ef0ee5.info,v 1.3 2015/06/18 09:44:56 pmacvsdg Exp $ # Information for the 2007 (new) CA UKeScience ROOT CA # alias = UKeScienceRoot-2007 url = http://www.grid-support.ac.uk/ca/ crl_url = http://crl.ca.ngs.ac.uk/crl/root-crl.der email = support@grid-support.ac.uk status = accredited:classic version = 1.104 sha1fp.0 = A1:39:B0:F3:04:6C:0B:F9:F5:0A:1B:33:00:06:4F:83:6B:7D:4F:3E subjectdn = "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" igtf-policy-installation-bundle-1.104/src/accredited/UNAMgrid-ca.pem0000664001343500074740000000306613614364137024574 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEajCCA1KgAwIBAgIJAMJEV/tnoKaaMA0GCSqGSIb3DQEBCwUAMDwxCzAJBgNV BAYTAk1YMREwDwYDVQQKEwhVTkFNZ3JpZDENMAsGA1UECxMEVU5BTTELMAkGA1UE AxMCQ0EwHhcNMTcxMDE4MjMwNDQ3WhcNMjcxMDE2MjMwNDQ3WjA8MQswCQYDVQQG EwJNWDERMA8GA1UEChMIVU5BTWdyaWQxDTALBgNVBAsTBFVOQU0xCzAJBgNVBAMT AkNBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsWzp1Cw4snzPxyIL sArwRVsx6nq/iqWkiqt6Gex+S3TLZCri3Bt2xop/VomJpUhdnZTdYoAsaNgWtzOG X2DyP1as18F/GokgwpP6+ATWHRtHJFIWg9JHwQ3Fdq75RJurMBnUSZTvkHtq/Ch0 CsMcWzDoK7jYv+nm6nEEptm8CG9zYDkD9DrZA6c2xIu5Y22r0vVQQNIANNR/34hv Newe0fKXeeq69jEaVZk+CDejggKEDLqTOnXHlitJu9QOzoSdStVxqarEmBPN8DS2 RJk/nPG/jKxVWSzNVcdbbkrnqVC2TcvN2F24/D6dkMwe63MXUHEHBZ8tExHS/Dx1 O0VWmwIDAQABo4IBbTCCAWkwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUczW3 j3cn8mxO7udcYTUxr/AEr5kwHwYDVR0jBBgwFoAUczW3j3cn8mxO7udcYTUxr/AE r5kwDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzA7BglghkgBhvhC AQ0ELhYsVU5BTWdyaWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgQ2VydGlmaWNh dGUwOgYJYIZIAYb4QgEIBC0WK2h0dHBzOi8vY2EudW5hbWdyaWQudW5hbS5teC9w dWIvcG9saWN5Lmh0bWwwPQYDVR0fBDYwNDAyoDCgLoYsaHR0cDovL2NhLnVuYW1n cmlkLnVuYW0ubXgvcHViL2NybC9jYWNybC5jcmwwOwYJYIZIAYb4QgEDBC4WLGh0 dHA6Ly9jYS51bmFtZ3JpZC51bmFtLm14L3B1Yi9jcmwvY2FjcmwuY3JsMA0GCSqG SIb3DQEBCwUAA4IBAQBJyemcEN29BoIEl1tMroX6D14UPzVDsTTswuo7j9hXh+E1 M1uctNFoNrUK8/PmxasSGlcABDxCUXPqbXXF7ooIK+DsJ1EwijkjFjyxJYhkMlgI RZYYRmf+kk7U8HVrFTNcn/Ah+VuQaYCfBLZhV3iKORhmZ0pkhuKZOzEfvuDdi6uO QEPWFSrL6FlJ1vrrKt1duxlkZwRY8rpISHVXDqvEjxNAsblv//d0lDer/72/qA/0 eAoiXLfY7DpgkkmachOWpnrE/WyM5kgNrFFrLnPof0MAb2toxQ2TzZSGWUPX2YA0 KIWQRqI8Ey2gPwR91ZBZrQGTQ0790tawCOqH5fRS -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/UNAMgrid-ca.crl_url0000664001343500074740000000006713614364137025453 0ustar davidgdavidghttp://ca.unamgrid.unam.mx/pub/crl/unamgrid-ca-crl.crl igtf-policy-installation-bundle-1.104/src/accredited/UNAMgrid-ca.signing_policy0000664001343500074740000000100013614364137027012 0ustar davidgdavidg # Signing policy for UNAMgrid CA # as .signing_policy along with # the CA certificate as . # -- here is the output of # openssl x509 -hash -noout -in # and is the lowest single (decimal) # digit that makes the file unique (in case # you have other CA certificates that hash to # the same value) access_id_CA X509 '/C=MX/O=UNAMgrid/OU=UNAM/CN=CA' pos_rights globus CA:sign cond_subjects globus '"/C=MX/O=UNAMgrid/*"' igtf-policy-installation-bundle-1.104/src/accredited/UNAMgrid-ca.namespaces0000664001343500074740000000065013614364137026126 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)24c3ccde.signing_policy.namespaces # CA alias : UNAMgrid # subord_of: # subjectDN: /C=MX/O=UNAMgrid/OU=UNAM/CN=CA # hash : 24c3ccde.signing_policy # (generated automatically from 24c3ccde.signing_policy) # TO Issuer "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA" \ PERMIT Subject "/C=MX/O=UNAMgrid/.*" igtf-policy-installation-bundle-1.104/src/accredited/UNAMgrid-ca.info0000664001343500074740000000071713614364137024746 0ustar davidgdavidg# # @(#)$Id: 24c3ccde.info,v 1.6 2018/01/11 20:15:48 pmacvsdg Exp $ # Information for UNAMgird CA # alias = UNAMgrid-ca url = http://ca.unamgrid.unam.mx/ ca_url = http://ca.unamgrid.unam.mx/pub/cacert/cacert.pem crl_url = http://ca.unamgrid.unam.mx/pub/crl/unamgrid-ca-crl.crl email = camanager@unam.mx status = accredited:classic sha1fp.0 = 98:93:D3:0C:24:94:61:F4:59:74:1C:DD:A9:1F:AC:A5:7A:21:43:B7 version = 1.104 subjectdn = "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA" igtf-policy-installation-bundle-1.104/src/accredited/UNLPGrid.pem0000664001343500074740000000313313614364137024164 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEhDCCA2ygAwIBAgIKHBM+8JCThykNrTANBgkqhkiG9w0BAQsFADBSMQswCQYD VQQGEwJBUjESMBAGA1UECgwJZS1DaWVuY2lhMQ0wCwYDVQQLDARVTkxQMQ4wDAYD VQQHDAVDZVNQSTEQMA4GA1UEAwwHUEtJR3JpZDAeFw0xNjEwMTExNzI2MjdaFw0y NjEwMDkxNzI2MjdaMFIxCzAJBgNVBAYTAkFSMRIwEAYDVQQKDAllLUNpZW5jaWEx DTALBgNVBAsMBFVOTFAxDjAMBgNVBAcMBUNlU1BJMRAwDgYDVQQDDAdQS0lHcmlk MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+aL1WsU9hTe2SGmRWohi in3e9kyNLuWWrHMI9MoId6890n6Q0VPCgVnJL0VClhuinUDgw3mEw36EsyLOXBsd mtyS23YywXaoUvGQajhQ7qapsEvXyE5s/2mKLGV+ag3ij69Q11ZELsojCpRwhI9V jtfgI5zzI6yto92RUay4/Efn7UUZbV8y3CbSdYL6gNdePx3PhXWm28cGiPjI0WPo r4h5aMTjv9BN1SOOGmUU1QKru+gTr6yo+oYBjRmFaQJKGASmP1rgDPtG32KET5gv WEpjnN5gysAZbm9xCuv95lolNffPL8BuBi588ozjZFfZqq/jJuB+o//UfP+/3OR7 ZwIDAQABo4IBWjCCAVYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUsXBRTXkM HVuoZd1L7XySjws+yUIwHwYDVR0jBBgwFoAUsXBRTXkMHVuoZd1L7XySjws+yUIw DgYDVR0PAQH/BAQDAgEGMD8GCWCGSAGG+EIBDQQyFjBQS0lHcmlkIFVOTFAgQ2Vy dGlmaWNhdGlvbiBBdXRob3JpdHkgQ2VydGlmaWNhdGUwQQYDVR0fBDowODA2oDSg MoYwaHR0cDovL3d3dy5wa2lncmlkLnVubHAuZWR1LmFyL3B1Yi9jcmwvY2Fjcmwu Y3JsMD8GCWCGSAGG+EIBAwQyFjBodHRwOi8vd3d3LnBraWdyaWQudW5scC5lZHUu YXIvcHViL2NybC9jYWNybC5jcmwwLgYJYIZIAYb4QgEIBCEWH2h0dHA6Ly93d3cu cGtpZ3JpZC51bmxwLmVkdS5hci8wDQYJKoZIhvcNAQELBQADggEBAGLr4fmUge8m EjoNRWyQ2U3Eycl37rgNEIOLXHbkHEo0X1bKcZTWDR8zDWJoUu3FvnTTpY0DKrYX u+wZT6SHYgA4N3OfN6LmeNMIAGbd6LKvTtvupTeP5nKlBVzJ3Gg57sEQgICUqiQ/ Ofvt6m0i4vEFkJmeXIHTYoa03ysMhknGGZnGUa3c8vPuDXppW2ilmuA3+Gw3dFnU Jc0OF0GcBGisB/nvfv3k4EO0lJ8z042/x4xBDdBZn1QyoraLLoE9cxUN/GAkKyrv Ed0uuf3Yv3RBxNtNS/vigN3IctSEXHhsawaOL388mvrHOdJV8uki6BAfga1s6HOy GbNUlFSh+x4= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/UNLPGrid.crl_url0000664001343500074740000000006113614364137025042 0ustar davidgdavidghttp://www.pkigrid.unlp.edu.ar/pub/crl/cacrl.crl igtf-policy-installation-bundle-1.104/src/accredited/UNLPGrid.signing_policy0000664001343500074740000000033313614364137026417 0ustar davidgdavidg# # @(#)$Id: UNLP.signing_policy, 2007/11/01 22:07:12 # access_id_CA X509 '/C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/CN=PKIGrid' pos_rights globus CA:sign cond_subjects globus '"/C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/*"' igtf-policy-installation-bundle-1.104/src/accredited/UNLPGrid.namespaces0000664001343500074740000000070413614364137025523 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)b7bcb7b2.namespaces # CA alias : PKIGrid # subord_of: # subjectDN: /C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/CN=PKIGrid # hash : b7bcb7b2.signing_policy # (generated automatically from b7bcb7b2.signing_policy) # TO Issuer "/C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/CN=PKIGrid" \ PERMIT Subject "/C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/.*" igtf-policy-installation-bundle-1.104/src/accredited/UNLPGrid.info0000664001343500074740000000067013614364137024341 0ustar davidgdavidg# # @(#)$Id: UNLP.signing_policy, 2007/11/01 22:07:12 # alias = UNLPGrid url = https://www.pkigrid.unlp.edu.ar/ ca_url = https://www.pkigrid.unlp.edu.ar/pub/cacert/cacert.txt crl_url = http://www.pkigrid.unlp.edu.ar/pub/crl/cacrl.crl email = ca@pkigrid.unlp.edu.ar status = accredited:classic version = 1.104 sha1fp.0 = C1:A7:E5:30:09:B8:42:56:DC:3D:F0:67:43:36:58:2C:45:0E:C6:3A subjectdn = "/C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/CN=PKIGrid" igtf-policy-installation-bundle-1.104/src/accredited/cilogon-basic.pem0000664001343500074740000000255713614364140025314 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID1TCCAr2gAwIBAgIJAPcXvRd9El6DMA0GCSqGSIb3DQEBBQUAMGoxEzARBgoJ kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEbMBkGA1UEAxMSQ0lMb2dvbiBCYXNpYyBD QSAxMB4XDTEwMDYwNDIwMTkwOFoXDTMwMDYwNDIwMTkwOFowajETMBEGCgmSJomT 8ixkARkWA29yZzEXMBUGCgmSJomT8ixkARkWB2NpbG9nb24xCzAJBgNVBAYTAlVT MRAwDgYDVQQKEwdDSUxvZ29uMRswGQYDVQQDExJDSUxvZ29uIEJhc2ljIENBIDEw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/ESK+Ve88+tU5atBtCBSp tJR9MIPXz36/M2vbKupkizGLHlGO8p1tMNrUR8jQM5bPokp7JUqYfzx3BHldFj7T Y78wUlgCqBT6KJCf1skWlSaF/7Lx5bnNT/pF6VkyEMvepp5FyttaYrXHmBpaPhnk JZ9OjRf8Q79Acy0cnro5V2Oz7LgJ/W78zRhXOuSUQlDuZ/L7VvF7q4PnmFS+ZwSm jJWvCUTY9D3U+ef2RluGrcYEYf14dd5UIeCmMaApqi5dhopXQXbQ0OWp9QRdjB5z nA+7ZK0leMKMmId5kfWPcDf1iWHYII9IQoPEsiqDVLuAA/7yy2j5A+Unk0TtCYoB AgMBAAGjfjB8MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1Ud DgQWBBSaMcA1v2rOmCeEryQ9yZy3SNLWOzAfBgNVHSMEGDAWgBSaMcA1v2rOmCeE ryQ9yZy3SNLWOzAZBgNVHREEEjAQgQ5jYUBjaWxvZ29uLm9yZzANBgkqhkiG9w0B AQUFAAOCAQEAkMXkhScWI1eDFwsvisNZ63M4rDiue6X9rZOhsXaUkvVXDRz5h+L1 BQMlvQheFBcbXN7l+YqWlg5I6eXBwpYIAyIAjrNbktEWtci/IRtxSzi+oDi5AluQ kgSA3D10ZE2y6M18L8himvliJefnMHBtzV5jA0K9PLiisjtvijXwv7FuUoIdGzXz Jy8NKxb6IIGdow9MoSN6yRt/Fj045ImSrcYntE4hlTkTZYlOY4AfSz1vABfN0H4t eg97lWUXaG6bWiO+uMp90WDIlsK592CSiHmoUq2QwKNmHjN3QX2RbLE/P054DZTG Z6Vku+8ShpB71Qv2uMkAz0NWapBjsS9vUQ== -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/cilogon-basic.crl_url0000664001343500074740000000014013614364140026157 0ustar davidgdavidghttp://crl-cilogon.ncsa-security.net/cilogon-basic.crl http://crl.cilogon.org/cilogon-basic.crl igtf-policy-installation-bundle-1.104/src/accredited/cilogon-basic.signing_policy0000664001343500074740000000024013614364140027533 0ustar davidgdavidgaccess_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/*"' igtf-policy-installation-bundle-1.104/src/accredited/cilogon-basic.namespaces0000664001343500074740000000060613614364140026643 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)28776852.namespaces # CA alias : cilogon-basic # subord_of: # subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1 # hash : 28776852 # TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" \ PERMIT Subject "/DC=org/DC=cilogon/.*" igtf-policy-installation-bundle-1.104/src/accredited/cilogon-basic.info0000664001343500074740000000063113614364140025455 0ustar davidgdavidgalias = cilogon-basic url = http://ca.cilogon.org/ ca_url = https://cilogon.org/cilogon-basic.pem crl_url = http://crl-cilogon.ncsa-security.net/cilogon-basic.crl;http://crl.cilogon.org/cilogon-basic.crl email = ca@cilogon.org status = accredited:iota version = 1.104 sha1fp.0 = 21:D6:E3:AE:1E:D0:A7:02:77:67:B3:6B:A9:6D:69:70:60:07:F9:B1 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" igtf-policy-installation-bundle-1.104/src/accredited/cilogon-silver.pem0000664001343500074740000000255713614364140025537 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID1zCCAr+gAwIBAgIJAPQNWzafMUPRMA0GCSqGSIb3DQEBBQUAMGsxEzARBgoJ kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBTaWx2ZXIg Q0EgMTAeFw0xMDA2MDQyMDIwMTRaFw0zMDA2MDQyMDIwMTRaMGsxEzARBgoJkiaJ k/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQGEwJV UzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBTaWx2ZXIgQ0Eg MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANpIdBE+VFt91/2o3vtG mFq0DbwBeon0/0E2dmMUpb/D/lm3y4Nnhnq1Vegey6UAdh0FfzrxKaeSkhS93Avm mgbEdD7yE1RuStn9NbIIWSIO34Fi8UAxJ4CS852UIMRptoYk9IW+qincpEgwOQRH FzWeUz3GyTXuPY74aQb3YC0RrceVIqcPdEEyczi4hlOlNKzfOF4uidoqprUc7Pc9 kMakldvdH1NXZDFDd7tMGr4FD2Kl0PLnFq2v4OCdH9Db03IfehRSQPA7gnZDjyLX EphMaGtXzMfjfA77ull/DyrZ/z212x4y9A6Fy/rmgjhoET5wQVfhJ4PdITXooECo ZKsCAwEAAaN+MHwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFEENPrWb8wHaeL2DHsLFVulpdjpYMB8GA1UdIwQYMBaAFEENPrWb8wHa eL2DHsLFVulpdjpYMBkGA1UdEQQSMBCBDmNhQGNpbG9nb24ub3JnMA0GCSqGSIb3 DQEBBQUAA4IBAQAzq5kJgNrSJ4FMO20HeQUsDYdxYe/8s1fTFIE3+jSaEzVqjxPF nyLmqPFNfE4FxU5oVqNCG1Nvnk2WiQcnvUEmag4a3frWLstdEDTMC99l/H9XKkP4 sZjkbw7Qz7TiIG0v5WlsiCD4AthDGJVsV1WEH77ptMN3Le1Z/iea7r+YjcpjkZOQ Bt6+u+ddRw7HMYHjwNR9KiSTlUeJyJ/n+5qO1T0+d9+PFH118iJE59YugQ25/7oP 9Cn5Ts+GhoLZc8yd37bP6knlyUgzVn7Mmvxe0NYEUfbBiYuQjUkEyQNoSiCbnusK lidsNYoxh8mcRMFDIVf3uipWUkMeezLxal6D -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/cilogon-silver.crl_url0000664001343500074740000000014213614364140026404 0ustar davidgdavidghttp://crl-cilogon.ncsa-security.net/cilogon-silver.crl http://crl.cilogon.org/cilogon-silver.crl igtf-policy-installation-bundle-1.104/src/accredited/cilogon-silver.signing_policy0000664001343500074740000000024113614364140027757 0ustar davidgdavidgaccess_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/*"' igtf-policy-installation-bundle-1.104/src/accredited/cilogon-silver.namespaces0000664001343500074740000000061113614364140027062 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)10718cba.namespaces # CA alias : cilogon-silver # subord_of: # subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1 # hash : 10718cba # TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1" \ PERMIT Subject "/DC=org/DC=cilogon/.*" igtf-policy-installation-bundle-1.104/src/accredited/cilogon-silver.info0000664001343500074740000000063613614364140025705 0ustar davidgdavidgalias = cilogon-silver url = http://ca.cilogon.org/ ca_url = https://cilogon.org/cilogon-silver.pem crl_url = http://crl-cilogon.ncsa-security.net/cilogon-silver.crl;http://crl.cilogon.org/cilogon-silver.crl email = ca@cilogon.org status = accredited:mics version = 1.104 sha1fp.0 = 39:1C:E0:48:9A:BB:B1:0A:DA:DF:DD:A6:7C:C2:96:87:1A:83:6F:92 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1" igtf-policy-installation-bundle-1.104/src/accredited/seegrid-ca-2013.pem0000664001343500074740000000253313614364142025165 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDxzCCAq+gAwIBAgIBADANBgkqhkiG9w0BAQUFADBKMRMwEQYKCZImiZPyLGQB GRYDT1JHMRgwFgYKCZImiZPyLGQBGRYIU0VFLUdSSUQxGTAXBgNVBAMTEFNFRS1H UklEIENBIDIwMTMwHhcNMTMxMTE0MTQ0MjE3WhcNMzMxMTE0MTQ0MjE3WjBKMRMw EQYKCZImiZPyLGQBGRYDT1JHMRgwFgYKCZImiZPyLGQBGRYIU0VFLUdSSUQxGTAX BgNVBAMTEFNFRS1HUklEIENBIDIwMTMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQDvzBEGy/G8ByFv/dk0+wl+YD4O3hnMKdIOWwbShJgV5uxT5CamByCF tt2XMIec4eIfV19CP/St+xCi/YBUZUxTQPsvzuBpIkLz1UhZgTIV8KocZAnitCQh U0Eyet/3jhr0rhOz1OPTdvEdZ4urNqnWPNNLg+dxs+Z88Wc7ILFtRwNf48l6oh3T nmwBNBFpV372iYGd3urs4L0CWRxS9KliXVHv+qDig6ruresEdY1G49WnaAAkgU7N W+725dZziSWlflRyYIjgzmwUwXB8ESaEtyCH8MXEcem+1ulrrFk2LWcuUvVi8Do+ pVdXfrBx4RCq/dYV1d0SeFhimVG08SyLAgMBAAGjgbcwgbQwDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLTbgExuumOjXH7fknD2mC0a HHCAMHIGA1UdIwRrMGmAFLTbgExuumOjXH7fknD2mC0aHHCAoU6kTDBKMRMwEQYK CZImiZPyLGQBGRYDT1JHMRgwFgYKCZImiZPyLGQBGRYIU0VFLUdSSUQxGTAXBgNV BAMTEFNFRS1HUklEIENBIDIwMTOCAQAwDQYJKoZIhvcNAQEFBQADggEBAO7roIhF RcOJeecENMmOFT77Z8DfPhjay6qfjyeG7RzbeHe32EhBSartgK0qGGYK5RMiN1+0 gaXm4L1wMlgeFT8OVvP+7Qx48i6UVx3OE1kZCvE3VjECRvvo6qQpwzLNK3QL82RP pclX+LlsMawhq+g3UE+6QALqzBdi3UtD78NfZ6iUmAWlfh315stP1iBFvIp4E8o7 FQbXZY9XqT3OL2XsG//dnjeeXlgPBqPMz01GkOebsGJb8ijwfEFZLCH8MbUJM7Ub bs0XrWC4z4OX7QXlOqiDD/4lKlVrSNFrxdIbm2LGDsmC7LXlzFKXKfLwfh1Z9ow9 h2uhyD420XAeLvQ= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/accredited/seegrid-ca-2013.crl_url0000664001343500074740000000006413614364142026043 0ustar davidgdavidghttp://crl.hellasgrid.gr/seegrid-ca-2013/crl-v2.pem igtf-policy-installation-bundle-1.104/src/accredited/seegrid-ca-2013.signing_policy0000664001343500074740000000026713614364142027423 0ustar davidgdavidg# EACL SEEGRID-CA-2013 CA access_id_CA X509 '/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013' pos_rights globus CA:sign cond_subjects globus '"/DC=ORG/DC=SEE-GRID/*" "/DC=EU/DC=EGI/*"' igtf-policy-installation-bundle-1.104/src/accredited/seegrid-ca-2013.namespaces0000664001343500074740000000100013614364142026507 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)772dbd1c.namespaces # CA alias : seegrid-ca-2013 # subord_of: # subjectDN: /DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013 # hash : 772dbd1c # (generated automatically from 772dbd1c.signing_policy) # TO Issuer "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" \ PERMIT Subject "/DC=ORG/DC=SEE-GRID/.*" TO Issuer "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" \ PERMIT Subject "/DC=EU/DC=EGI/.*" igtf-policy-installation-bundle-1.104/src/accredited/seegrid-ca-2013.info0000664001343500074740000000073513614364142025341 0ustar davidgdavidg# # @(#)$Id: 772dbd1c.info,v 1.2 2015/06/18 09:44:55 pmacvsdg Exp $ # # SEEGRID-CA-2013 # alias = seegrid-ca-2013 url = http://see-grid-ca.hellasgrid.gr ca_url = http://crl.hellasgrid.gr/seegrid-ca-2013/cert.pem crl_url = http://crl.hellasgrid.gr/seegrid-ca-2013/crl-v2.pem email = see-grid-ca@hellasgrid.gr status = accredited:classic version = 1.104 sha1fp.0 = DD:8C:D9:6E:18:AB:53:92:40:15:BF:DA:EB:F9:6F:31:EB:4F:69:66 subjectdn = "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" igtf-policy-installation-bundle-1.104/src/unaccredited/0000775001343500074740000000000013614364141022433 5ustar davidgdavidgigtf-policy-installation-bundle-1.104/src/unaccredited/InCommon-Server-CA.pem0000664001343500074740000000326013614364120026400 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIEwzCCA6ugAwIBAgIQf3HB06ImsNKxE/PmgWdkPjANBgkqhkiG9w0BAQUFADBv MQswCQYDVQQGEwJTRTEUMBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFk ZFRydXN0IEV4dGVybmFsIFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBF eHRlcm5hbCBDQSBSb290MB4XDTEwMTIwNzAwMDAwMFoXDTIwMDUzMDEwNDgzOFow UTELMAkGA1UEBhMCVVMxEjAQBgNVBAoTCUludGVybmV0MjERMA8GA1UECxMISW5D b21tb24xGzAZBgNVBAMTEkluQ29tbW9uIFNlcnZlciBDQTCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAJd8x8j+s+kgaqOkT46ONFYGs3psqhCbSGErNpBp 4zQKR6e7e96qavvrgpWPyh1/r3WmqEzaIGdhGg2GwcrBh6+sTuTeYhsvnbGYr8YB +xdw26wUWexvPzN/ppgL5OI4r/V/hW0OdASd9ieGx5uP53EqCPQDAkBjJH1AV49U 4FR+thNIYfHezg69tvpNmLLZDY15puCqzQyRmqXfq3O7yhR4XEcpocrFup/H2mD3 /+d/8tnaoS0PSRan0wCSz4pH2U341ZVm03T5gGMAT0yEFh+z9SQfoU7e6JXWsgsJ iyxrx1wvjGPJmctSsWJ7cwFif2Ns2Gig7mqojR8p89AYrK0CAwEAAaOCAXcwggFz MB8GA1UdIwQYMBaAFK29mHo0tCb3+sQmVO8DveAky1QaMB0GA1UdDgQWBBRIT1r6 L0qaXuBQ82t7VaXe9b40XTAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB /wIBADARBgNVHSAECjAIMAYGBFUdIAAwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDov L2NybC51c2VydHJ1c3QuY29tL0FkZFRydXN0RXh0ZXJuYWxDQVJvb3QuY3JsMIGz BggrBgEFBQcBAQSBpjCBozA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1 c3QuY29tL0FkZFRydXN0RXh0ZXJuYWxDQVJvb3QucDdjMDkGCCsGAQUFBzAChi1o dHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20vQWRkVHJ1c3RVVE5TR0NDQS5jcnQwJQYI KwYBBQUHMAGGGWh0dHA6Ly9vY3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEF BQADggEBAJNmIYB0RYVLwqvOMrAp/t3f1iRbvwNqb1A+DhuzDYijW+7EpBI7Vu8G f89/IZVWO0Ex/uGqk9KV85UNPEerylwmrT7x+Yw0bhG+9GfjAkn5pnx7ZCXdF0by UOPjCiE6SSTNxoRlaGdosEUtR5nNnKuGKRFy3NacNkN089SXnlag/l9AWNLV1358 xY4asgRckmYOha0uBs7Io9jrFCeR3s8XMIFTtmYSrTfk9e+WXCAONumsYn0ZgYr1 kGGmSavOPN/mymTugmU5RZUWukEGAJi6DFZh5MbGhgHPZqkiKQLWPc/EKo2Z3vsJ FJ4O0dXG14HdrSSrrAcF4h1ow3BmX9M= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/unaccredited/InCommon-Server-CA.crl_url0000664001343500074740000000005513614364120027260 0ustar davidgdavidghttp://crl.incommon.org/InCommonServerCA.crl igtf-policy-installation-bundle-1.104/src/unaccredited/InCommon-Server-CA.signing_policy0000664001343500074740000000031713614364120030634 0ustar davidgdavidg# EACL for /C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA access_id_CA X509 '/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA' pos_rights globus CA:sign cond_subjects globus '/C=US/*' igtf-policy-installation-bundle-1.104/src/unaccredited/InCommon-Server-CA.namespaces0000664001343500074740000000052213614364120027734 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # Note: this file overrides the RPDNC as defined by the IGTF for the # AddTrust-External-CA, and is authoritative for this branch # TO Issuer "/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA" \ PERMIT Subject "/C=US/.*" igtf-policy-installation-bundle-1.104/src/unaccredited/InCommon-Server-CA.info0000664001343500074740000000101513614364120026546 0ustar davidgdavidgalias = InCommon-Server-CA requires = AddTrust-External-CA-Root ca_url = https://www.incommon.org/cert/repository/InCommonServerCA.pem crl_url = http://crl.incommon.org/InCommonServerCA.crl policy_url = https://www.incommon.org/cert/repository/cps_ssl.pdf url = https://www.incommon.org/cert/repository/ email = incommon-admin@incommonfederation.org status = unaccredited version = 1.104 sha1fp.0 = 06:C9:CF:ED:A6:99:76:D1:B9:C2:B5:23:49:0D:A4:76:D9:DC:3A:5A subjectdn = "/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA" igtf-policy-installation-bundle-1.104/src/unaccredited/UKPathfinder1.pem0000664001343500074740000000250613614364136025552 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDuDCCAqCgAwIBAgIEEAAAADANBgkqhkiG9w0BAQsFADBKMQswCQYDVQQGEwJV SzERMA8GA1UECgwIZVNjaWVuY2UxEjAQBgNVBAsMCUF1dGhvcml0eTEUMBIGA1UE AwwLUGF0aGZpbmRlcjEwHhcNMTEwNjE4MTMwMDAwWhcNMjcxMTMwMDkwMDAwWjBK MQswCQYDVQQGEwJVSzERMA8GA1UECgwIZVNjaWVuY2UxEjAQBgNVBAsMCUF1dGhv cml0eTEUMBIGA1UEAwwLUGF0aGZpbmRlcjEwggEiMA0GCSqGSIb3DQEBAQUAA4IB DwAwggEKAoIBAQDTpDkaIKoNca7ihFbDNKPvHZjB1bsRLWeshjyLC51fnvtAfMoR qdeaD1xM8blUJ/Su5wlYombDDwLFpko+Od9v8aip20dMYkPYuhf4xC0oqsrrvPWN nzkVDarBJC5rW7smCmkljUwBEB9kWHUr3ARlMmxYgo1H73K+jUV+cNudVaumciDA y7nZDeD0lxXcEKdkbTveOO8//vXRw+d0oLZ13BmQLaxEWYXDf078aWexTRIl4y9Q f8y5bpIcJ5jFBnsGRG0uVMZCAnfDhFoiW1CFiQafP+mkurbawH34vlFE+I0iNZXn fG/akrPALTsQ0uLah0vINfDA+IAnzloOhEJtAgMBAAGjgaUwgaIwDwYDVR0TAQH/ BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwPwYDVR0fBDgwNjA0oDKgMIYuaHR0cDov L2NybC5jYS5uZ3MuYWMudWsvY3JsL3BhdGhmaW5kZXIuY3JsLmRlcjAfBgNVHSME GDAWgBTbhmUBWTpABknH2phQun4/gzTuMDAdBgNVHQ4EFgQU24ZlAVk6QAZJx9qY ULp+P4M07jAwDQYJKoZIhvcNAQELBQADggEBAD2+slbgaLO3e+Mln+U2Ewe/In3A a1+tj61RG0iXOjjlvIua0XW+t/enSd906k6Lzm4YK+eO0BTRSsPgaf2PNgx7B2HA kYWA85Qzkqx5MMSahgtzBmCXP7s1y+L1sUVIt67MVNBKtYWaBy9fcjpqQmPqcGyt gtwHzB0Os2ioXtB81/qhefrtkznRBAiO4Ik0cL4cG8255zQas5T0zhY2mt+qPDRn BpjJNJfPx3f1XX0dmE6GQxlDEjG+2OR1YiPbm+rweEDN4AQYO0mR1gv6SvydQriz nspRsK4g2J1hcJkddiHgZPPuXWVKJkjeqeVR+XIjn/VJfTYSuor6+Yui0tI= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/unaccredited/UKPathfinder1.crl_url0000664001343500074740000000005713614364136026432 0ustar davidgdavidghttp://crl.ca.ngs.ac.uk/crl/pathfinder.crl.der igtf-policy-installation-bundle-1.104/src/unaccredited/UKPathfinder1.signing_policy0000664001343500074740000000051313614364136030002 0ustar davidgdavidg# EACL UK Pathfinder AAAI CA 1 # @(#)$Id: Pathfinder1.signing_policy,v 1.1 2017/06/20 10:33:57 pmacvsdg Exp $ # access_id_CA X509 '/C=UK/O=eScience/OU=Authority/CN=Pathfinder1' pos_rights globus CA:sign cond_subjects globus '"/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" "/DC=uk/DC=ac/DC=pathfinder/*"' igtf-policy-installation-bundle-1.104/src/unaccredited/UKPathfinder1.namespaces0000664001343500074740000000065713614364136027115 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)hfinder1.namespaces # CA alias : UKPathfinder1 # subord_of: # subjectDN: /C=UK/O=eScience/OU=Authority/CN=Pathfinder1 # hash : # (generated automatically from Pathfinder1.signing_policy) # TO Issuer "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" \ PERMIT Subject "/DC=uk/DC=ac/DC=pathfinder/.*" igtf-policy-installation-bundle-1.104/src/unaccredited/UKPathfinder1.info0000664001343500074740000000070713614364136025725 0ustar davidgdavidg# # @(#)$Id: Pathfinder1.info,v 1.1 2017/06/20 10:33:57 pmacvsdg Exp $ # Information for Pathfinder AAAI Project CA 1 # alias = UKPathfinder1 #requires = url = http://www.grid-support.ac.uk/ca/ crl_url = http://crl.ca.ngs.ac.uk/crl/pathfinder.crl.der email = support@grid-support.ac.uk status = unaccredited version = 1.104 sha1fp.0 = EA:03:D7:90:9A:82:6D:01:56:AA:C0:82:1C:7C:4C:1E:DA:89:FD:4A subjectdn = "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" igtf-policy-installation-bundle-1.104/src/unaccredited/egee-ne-benelux-tutorial.pem0000664001343500074740000000224413614364141027746 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIDQDCCAqmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBhjETMBEGCgmSJomT8ixk ARkTA29yZzEXMBUGCgmSJomT8ixkARkTB2VnZWUtbmUxGjAYBgNVBAsTEVRyYWlu aW5nIFNlcnZpY2VzMTowOAYDVQQDEzFXb3J0aGxlc3MgRUdFRSBOb3J0aGVybiBh bmQgQmVuZWx1eCBUdXRvcmlhbCBDQSAxMB4XDTA3MDgwMTE2MDU0NloXDTI3MDgw MTE2MDU0NlowgYYxEzARBgoJkiaJk/IsZAEZEwNvcmcxFzAVBgoJkiaJk/IsZAEZ EwdlZ2VlLW5lMRowGAYDVQQLExFUcmFpbmluZyBTZXJ2aWNlczE6MDgGA1UEAxMx V29ydGhsZXNzIEVHRUUgTm9ydGhlcm4gYW5kIEJlbmVsdXggVHV0b3JpYWwgQ0Eg MTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAy6IYOiXh+vA8qJ+dGt73n19z kn6Ib0Adg9CGnt2p5l69IItk4u4Ke4aqJT8TpbMdzkqmZS1IsDb9PynzHbbYoBol 7Hd+3DOMh3Vs+DgZNww2ptepmWqOSTfB6kpE8lWquJOSxnUyte8UqUE+ayFoS8Fz r2nlgsdcpKEsP2XQC3ECAwEAAaOBuzCBuDAPBgNVHRMBAf8EBTADAQH/MBoGA1Ud EQQTMBGBD2NhQGR1dGNoZ3JpZC5ubDAOBgNVHQ8BAf8EBAMCAQYwGQYDVR0gBBIw EDAOBgwrBgEEAdFCBAIFAQAwHQYDVR0OBBYEFHt8OOGUbHiUM5r1IMjzBJ2AR0tJ MD8GCWCGSAGG+EIBDQQyFjBXb3J0aGxlc3MgRUdFRS1ORSBUdXRvcmlhbCBDQSAo ZXh0ZW5kZWQgZWRpdGlvbikwDQYJKoZIhvcNAQEFBQADgYEAVp9YAloz5fzlFMW2 jHrHH3ot/wWKasVboaZiRWfANUo6cvnkEpNUB3iR8okHXO7MJ+qOXJMb32z43v/W M/YarCZk72p3KaV5mgVazBNbJyvTDskFy+2RWMlUo6TtChadOyQD3ZKFSYsOyTZ4 hV3LUBCciAeYYB/SdWuj1yuP+z0= -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/unaccredited/egee-ne-benelux-tutorial.crl_url0000664001343500074740000000005113614364141030621 0ustar davidgdavidghttp://ca.dutchgrid.nl/egee-ne/cacrl.pem igtf-policy-installation-bundle-1.104/src/unaccredited/egee-ne-benelux-tutorial.signing_policy0000664001343500074740000000105513614364141032201 0ustar davidgdavidg# $Id: 8c13c962.signing_policy,v 1.2 2011/02/17 07:26:00 pmacvsdg Exp $ # EACL Worthless EGEE Northern and Benelux Tutorial CA 1 # hash: 8c13c962 access_id_CA X509 '/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" "/DC=org/DC=egee-ne/O=Training Services/OU=users/*" "/DC=org/DC=dutchgrid/O=Training Services/OU=users/*"' igtf-policy-installation-bundle-1.104/src/unaccredited/egee-ne-benelux-tutorial.namespaces0000664001343500074740000000136713614364141031311 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)8c13c962.namespaces # CA alias : egee-ne-benelux-tutorial # subord_of: # subjectDN: /DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1 # hash : 8c13c962.signing_policy # (generated automatically from 8c13c962.signing_policy) # TO Issuer "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" \ PERMIT Subject "/DC=org/DC=egee-ne/O=Training Services/OU=users/.*" TO Issuer "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" \ PERMIT Subject "/DC=org/DC=dutchgrid/O=Training Services/OU=users/.*" igtf-policy-installation-bundle-1.104/src/unaccredited/egee-ne-benelux-tutorial.info0000664001343500074740000000102113614364141030110 0ustar davidgdavidg# # @(#)$Id: 8c13c962.info,v 1.3 2015/06/18 09:44:58 pmacvsdg Exp $ # Information for the Worthless EGEE Northern and Benelux Tutorial CA 1 alias = egee-ne-benelux-tutorial crl_url = http://ca.dutchgrid.nl/egee-ne/cacrl.pem url = http://ca.dutchgrid.nl/egee-ne/ ca_url = http://ca.dutchgrid.nl/egee-ne/cacert.pem status = unaccredited version = 1.104 sha1fp.0 = 20:BC:72:7B:46:28:F2:6C:6E:54:D2:98:E2:2E:83:AC:1B:14:4C:A0 subjectdn = "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" igtf-policy-installation-bundle-1.104/src/unaccredited/nl-e-infra-zero.pem0000664001343500074740000000430413614364141026044 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIIGTTCCBDWgAwIBAgIJANYl1hyYVHOTMA0GCSqGSIb3DQEBBQUAMIGDMRIwEAYK CZImiZPyLGQBGRYCbmwxFzAVBgoJkiaJk/IsZAEZFgdlLWluZnJhMSIwIAYDVQQL ExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMTAwLgYDVQQDEydXb3J0aGxlc3Mg TkwgZS1JbmZyYSBaZXJvIFR1dG9yaWFsIENBIDEwHhcNMTMxMTAzMTc1NzU0WhcN NDMxMDI3MTc1NzU0WjCBgzESMBAGCgmSJomT8ixkARkWAm5sMRcwFQYKCZImiZPy LGQBGRYHZS1pbmZyYTEiMCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGll czEwMC4GA1UEAxMnV29ydGhsZXNzIE5MIGUtSW5mcmEgWmVybyBUdXRvcmlhbCBD QSAxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwy9JmhZnLvSe0mo1 KWgkaBkGRY0nVtVmvpdt8DAtdr6zZJ+FCImdI38f9viuFqRPRxOtLfvxPnMz0v79 TSRO2QeGdbSIiuMTB2jLBw5yxw9dUuaiUCnlTdMR+VitAk87eUCzeZm7OJQ+mPg1 RB3LSSa5/LQGQtWAfkFw9gUtblUc2jZMnqojNMkmy6w4U7U7ebj7JpD/jiy4mbj4 A9xVqTp1KujzL1ZuTFc7ad3tMKvjfkgQA/wt+iZ4EN0TELzz0PXjqB+AxcFhSsHr X17dGi2mOV8SETnfJLDXGor8nVtSxzsbk09KSduKHS7fTE/7q3EumwCN+J7ZnQij Co5tx0b+k5zUPcJ9Jpu5fvKLU196MQKHzsr7DTZPxeQz4N8WRbsaLa3WHBoLlzM/ aA8s1FFkH2dGkHKW3JuEdIp7l0wS4T3hdUP6FJdf0Zx0R7VYYv5DYIgUwVd6ykca QRO8SDhDZx7ZELYYwOh68R9HnlzMftKDPV48epQykuusn8pstMZHp+aajUg8VOug tK8N1pGJvA4J6+hu3xIpqFmb1VN5L18S07PueHE0+fGdLSB2VcgMhigsjJZsvz/w FyEDLrFr6Uf2eARYhQGWQoIJcF20nOhv06v1AysVkbbgfJmjck93MNB8SEmUba5L hbLx9FWPGZe7xeMqHuDrIhkck9ECAwEAAaOBwTCBvjAPBgNVHRMBAf8EBTADAQH/ MA4GA1UdDwEB/wQEAwIBBjAZBgNVHSAEEjAQMA4GDCsGAQQB0UIEAgYBADAdBgNV HQ4EFgQUjhg/d+FqFoNyXxJ1LHppxFKAvUQwRQYJYIZIAYb4QgENBDgWNldvcnRo bGVzcyBOTCBlLUluZnJhIFplcm8gVHV0b3JpYWwgQ0EgMSAoMjAxMyBlZGl0aW9u KTAaBgNVHREEEzARgQ9jYUBkdXRjaGdyaWQubmwwDQYJKoZIhvcNAQEFBQADggIB AAJTajR3KoDWUMrqrCLgIGYw/vRuqo/PrT419bDz8IcTBNTFog9wFZX8Yz4x/A0Q rQZk/HI3YCfcS9f4Wv/vhoNFWzNoH4ae6B5Z+nJ6vNLgOAEB37q0Wm/bpBzho5Xk Jdpf+cjyg7Z7AqpwoZkuM+TQqxJtYIB/wsUgqOm70ifjwRse4UR5nqm15xQOEyI1 Y//Pi7IjpaBFOyckm0KQ9U4P+QsThFr9w5y/bqEz9wrqW0MA611sCCQ/hkj1ytCk Z0Jn0fntHR7YRUEbQSV+sLUaDKOxgDriS3u7sW1ByWjacRORXzsYhbOYsnaOd8wN ZVBdpOl1xndLarykc9R6cHqBMGQz6GBU6m0gHyZr8Trqp6d8kuKtv0BcB7e/4tdQ 9Q4pnz04LF+pPHD2aI5/WkRjmXtFmlmJ4KUpEcjfvNmiXZe6DnPZ+o42VNsnLc81 /hEeKDiNf2KEjzdvmady2JNkxCnCAyB/tpVlM8WAH5evXwHCH2ABQBeIyOCNbTAZ qTr7vyW7WP3Ori8ofGwwqlxUfmNOQWFcNkICp8jjTLoA07StTISRsV7riCldTL7B P610d5H6a1dEyhRp7zch9+xaBLYNlnAdB2Nzg7iOG9ARe8sv6ReEbDa0t3GIXyg9 FBVYE+xqrbWu/GVHuy7/L23VTOoxmaNKO3iPrsDIzdpZ -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/unaccredited/nl-e-infra-zero.crl_url0000664001343500074740000000006113614364141026721 0ustar davidgdavidghttp://ca.dutchgrid.nl/nl-e-infra-zero/cacrl.pem igtf-policy-installation-bundle-1.104/src/unaccredited/nl-e-infra-zero.signing_policy0000664001343500074740000000063013614364141030276 0ustar davidgdavidg# EACL Worthless NL e-Infra Zero Tutorial CA 1 2013 edition # hash: 338a3561.singning_policy access_id_CA X509 '/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" "/DC=nl/DC=e-infra/O=Training Services/OU=users/*"' igtf-policy-installation-bundle-1.104/src/unaccredited/nl-e-infra-zero.namespaces0000664001343500074740000000104413614364141027400 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)338a3561.namespaces # CA alias : nl-e-infra-zero # subord_of: # subjectDN: /DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1 # hash : 338a3561 # (generated automatically from 338a3561.signing_policy) # TO Issuer "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" \ PERMIT Subject "/DC=nl/DC=e-infra/O=Training Services/OU=users/.*" igtf-policy-installation-bundle-1.104/src/unaccredited/nl-e-infra-zero.info0000664001343500074740000000073413614364141026221 0ustar davidgdavidg# # @(#)$Id# # Information for the Worthless NL e-Infra Zero Tutorial CA 1 alias = nl-e-infra-zero crl_url = http://ca.dutchgrid.nl/nl-e-infra-zero/cacrl.pem url = http://ca.dutchgrid.nl/nl-e-infra-zero/ ca_url = http://ca.dutchgrid.nl/nl-e-infra-zero/cacert.pem status = unaccredited version = 1.104 sha1fp.0 = 43:20:7D:DF:E9:DD:F0:71:86:CA:AB:DC:97:44:F8:96:25:ED:6C:66 subjectdn = "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" igtf-policy-installation-bundle-1.104/src/experimental/0000775001343500074740000000000013614364140022475 5ustar davidgdavidgigtf-policy-installation-bundle-1.104/src/experimental/cilogon-openid.pem0000664001343500074740000000255713614364140026117 0ustar davidgdavidg-----BEGIN CERTIFICATE----- MIID1zCCAr+gAwIBAgIJAI2WeiBsyhA6MA0GCSqGSIb3DQEBBQUAMGsxEzARBgoJ kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBPcGVuSUQg Q0EgMTAeFw0xMDA2MDQyMDIwNDRaFw0zMDA2MDQyMDIwNDRaMGsxEzARBgoJkiaJ k/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQGEwJV UzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBPcGVuSUQgQ0Eg MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKaWHxXKkfgmJG31u0/I b9uzHuwt9Ed+vdH4jtmgHj5nOgdJ14VF46B26u4wNJ7XhRjxb1xSXhhC3u3okfje pas49RNVdEel4P2sWuQ9Rc6x+Tuo0/IFSTh5GDEizW7z9GYLcjMtadSPHngv0Pai xFnjadxTg+Qr3vAoM52xPJEQjsGIcUb5ZBtYMpHWJTA9HCSsLM0i96/jzkMdxinx lUD+qWWTdLppT/6neWfZC16cqRK5fhgx2drO/2oDcjQuBVszh92uRpLLvxTzF2Yg mqsgd2ufkQB8BJ6ggs61KUm1myL2j+ZnLKdcUi/mYTV6/3gva35qF9mf2iUn12eV chcCAwEAAaN+MHwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFDXHbBFKB030gz1Uvu2/BDuuX8OsMB8GA1UdIwQYMBaAFDXHbBFKB030 gz1Uvu2/BDuuX8OsMBkGA1UdEQQSMBCBDmNhQGNpbG9nb24ub3JnMA0GCSqGSIb3 DQEBBQUAA4IBAQBwkdd3ffJzGuYAXBLoRfVA1sMkJD1sSfGlEbloNW+2n7XtB42L /I7tJgKt2ag76/is3HDtxtrTEURrFF1lp9iC92tndz+mz3Yw2fd3w0xDX/13f74l u/IqObcS0ZQ1ZDg2aeQOzJNzLYUvqSIduTBVAGy7sTui5JATa48JhOU3JxEWZRM6 /0snNtHEwnL/MuJ+OeQN1lOR6hlVoKfZ062eFpiqpPwiVgJLq06Unk3Z2x3MoVGJ maX6AJG/sg6I+F1BSLAQVKrLaOZVeo1GDt5RR7pvlcg+GbVmeHBzQTQu1rtf+6+l C+VGSDiXJyWMgjNZFQrO6m3Zfv7pnd1m9FX1 -----END CERTIFICATE----- igtf-policy-installation-bundle-1.104/src/experimental/cilogon-openid.crl_url0000664001343500074740000000014213614364140026764 0ustar davidgdavidghttp://crl-cilogon.ncsa-security.net/cilogon-openid.crl http://crl.cilogon.org/cilogon-openid.crl igtf-policy-installation-bundle-1.104/src/experimental/cilogon-openid.signing_policy0000664001343500074740000000024613614364140030344 0ustar davidgdavidgaccess_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/C=US/*"' igtf-policy-installation-bundle-1.104/src/experimental/cilogon-openid.namespaces0000664001343500074740000000061613614364140027447 0ustar davidgdavidg############################################################################## #NAMESPACES-VERSION: 1.0 # # @(#)3d863bc5.namespaces # CA alias : cilogon-openid # subord_of: # subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1 # hash : 3d863bc5 # TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" \ PERMIT Subject "/DC=org/DC=cilogon/C=US/.*" igtf-policy-installation-bundle-1.104/src/experimental/cilogon-openid.info0000664001343500074740000000063313614364140026262 0ustar davidgdavidgalias = cilogon-openid url = http://ca.cilogon.org/ ca_url = https://cilogon.org/cilogon-openid.pem crl_url = http://crl-cilogon.ncsa-security.net/cilogon-openid.crl;http://crl.cilogon.org/cilogon-openid.crl email = ca@cilogon.org status = experimental version = 1.104 sha1fp.0 = 3C:D3:32:8E:A9:02:D8:FD:E8:BA:44:5C:40:46:4C:09:03:26:F5:4C subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" igtf-policy-installation-bundle-1.104/policy-igtf-classic.info0000664001343500074740000002175013614364142023742 0ustar davidgdavidg# @(#)policy-igtf-classic.info - IGTF classic authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-classic version = 1.104 requires = CNRS2-Grid-FR = 1.104, \ seegrid-ca-2013 = 1.104, \ RDIG = 1.104, \ CESNET-CA-Root = 1.104, \ UKeScienceCA-2B = 1.104, \ SRCE = 1.104, \ PK-Grid-2007 = 1.104, \ ANSPGrid = 1.104, \ HKU-CA-2 = 1.104, \ PKIUNAMgrid = 1.104, \ MYIFAM = 1.104, \ CNRS2-Projets = 1.104, \ MaGrid = 1.104, \ SDG-G2 = 1.104, \ SiGNET-CA = 1.104, \ UGRID-G2 = 1.104, \ CNRS2 = 1.104, \ COMODO-RSA-CA = 1.104, \ NorduGrid-2015 = 1.104, \ CNIC = 1.104, \ DarkMatterSecureCA = 1.104, \ InCommon-IGTF-Server-CA = 1.104, \ DigiCertGridCA-1G2-Classic-2015 = 1.104, \ NIIF-Root-CA-2 = 1.104, \ MARGI = 1.104, \ CERN-GridCA = 1.104, \ QuoVadis-Root-CA1 = 1.104, \ KENETCA-ICA-2015 = 1.104, \ KENETROOTCA = 1.104, \ CESNET-CA-4 = 1.104, \ HellasGrid-CA-2016 = 1.104, \ NIKHEF = 1.104, \ DCAROOT-G1 = 1.104, \ UNLPGrid = 1.104, \ IRAN-GRID-GCG-G2 = 1.104, \ AC-GRID-FR-Personnels = 1.104, \ INFN-CA-2015 = 1.104, \ RomanianGRID = 1.104, \ TRGrid = 1.104, \ DarkMatterAssuredCA = 1.104, \ SlovakGrid = 1.104, \ BG-ACAD-CA = 1.104, \ DFN-GridGermany-Root = 1.104, \ REUNA-ca = 1.104, \ UNAMgrid-ca = 1.104, \ ASGCCA-2007 = 1.104, \ AC-GRID-FR-Robots = 1.104, \ QuoVadis-Root-CA3G3 = 1.104, \ DigiCertGridTrustCAG2-Classic = 1.104, \ LIPCA = 1.104, \ AC-GRID-FR = 1.104, \ ArmeSFo = 1.104, \ QuoVadis-Root-CA2 = 1.104, \ IHEP-2013 = 1.104, \ TERENA-eScience-SSL-CA-3 = 1.104, \ MREN-CA = 1.104, \ AC-GRID-FR-Services = 1.104, \ DigiCertGridCA-1-Classic = 1.104, \ TSU-GE = 1.104, \ IGCA2 = 1.104, \ BYGCA = 1.104, \ DZeScience = 1.104, \ KEK = 1.104, \ DarkMatterPrivateRootCAG4 = 1.104, \ PolishGrid-2019 = 1.104, \ KISTIv3 = 1.104, \ QuoVadis-Grid-ICA-G2 = 1.104, \ DigiCertAssuredIDRootCA-Root = 1.104, \ AddTrust-External-CA-Root = 1.104, \ GermanGrid = 1.104, \ DigiCertGridTrustCA-Classic = 1.104, \ AEGIS = 1.104, \ MD-Grid-CA-T = 1.104, \ QuoVadis-Root-CA2G3 = 1.104, \ GridCanada = 1.104, \ PolishGrid = 1.104, \ UKeScienceRoot-2007 = 1.104, \ DigiCertGridRootCA-Root = 1.104, \ CERN-Root-2 = 1.104, \ DarkMatterIGTFCA = 1.104 subjectdn = "/C=FR/O=CNRS/CN=GRID2-FR", \ "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013", \ "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA", \ "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root", \ "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B", \ "/C=HR/O=edu/OU=srce/CN=SRCE CA", \ "/C=PK/O=NCP/CN=PK-GRID-CA", \ "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA", \ "/DC=HK/DC=HKU/DC=GRID/CN=HKU Grid CA 2", \ "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid", \ "/DC=MY/DC=UPM/DC=MYIFAM/C=MY/O=MYIFAM/CN=Malaysian Identity Federation and Access Management", \ "/C=FR/O=CNRS/CN=CNRS2-Projets", \ "/C=MA/O=MaGrid/CN=MaGrid CA", \ "/DC=CN/DC=Grid/DC=SDG/CN=Scientific Data Grid CA - G2", \ "/C=SI/O=SiGNET/CN=SiGNET CA", \ "/DC=org/DC=ugrid/CN=UGRID CA G2", \ "/C=FR/O=CNRS/CN=CNRS2", \ "/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority", \ "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015", \ "/DC=CN/DC=Grid/CN=Root Certificate Authority at CNIC", \ "/C=AE/O=DarkMatter LLC/CN=DarkMatter Secure CA", \ "/C=US/O=Internet2/OU=InCommon/CN=InCommon IGTF Server CA", \ "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2", \ "/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA 2", \ "/C=MK/O=MARGI/CN=MARGI-CA", \ "/DC=ch/DC=cern/CN=CERN Grid Certification Authority", \ "/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority", \ "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET CA", \ "/DC=ke/DC=kenet/O=Kenya Education Network Trust/OU=Research Services/CN=KENET ROOT CA", \ "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4", \ "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016", \ "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth", \ "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA", \ "/C=AR/O=e-Ciencia/OU=UNLP/L=CeSPI/CN=PKIGrid", \ "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA", \ "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels", \ "/C=IT/O=INFN/CN=INFN Certification Authority", \ "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA", \ "/C=TR/O=TRGrid/CN=TR-Grid CA", \ "/C=AE/O=DarkMatter LLC/CN=DarkMatter Assured CA", \ "/C=SK/O=SlovakGrid/CN=SlovakGrid CA", \ "/DC=bg/DC=acad/CN=BG.ACAD CA", \ "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01", \ "/C=CL/O=REUNACA/CN=REUNA Certification Authority", \ "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA", \ "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury", \ "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots", \ "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3", \ "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2", \ "/C=PT/O=LIPCA/CN=LIP Certification Authority", \ "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR", \ "/C=AM/O=ArmeSFo/CN=ArmeSFo CA", \ "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2", \ "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority", \ "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 3", \ "/DC=me/DC=ac/DC=MREN/CN=MREN-CA", \ "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services", \ "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1", \ "/DC=GE/DC=TSU/CN=TSU Root CA", \ "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2", \ "/DC=by/DC=grid/O=uiip.bas-net.by/CN=Belarusian Grid Certification Authority", \ "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA", \ "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority", \ "/C=AE/O=DarkMatter LLC/CN=DarkMatter Private Root CA G4", \ "/C=PL/O=GRID/CN=Polish Grid CA 2019", \ "/C=KR/O=KISTI/CN=KISTI Certification Authority", \ "/C=BM/O=QuoVadis Limited/CN=QuoVadis Grid ICA G2", \ "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA", \ "/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root", \ "/C=DE/O=GermanGrid/CN=GridKa-CA", \ "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA", \ "/C=RS/O=AEGIS/CN=AEGIS-CA", \ "/DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid-CA-T", \ "/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3", \ "/C=CA/O=Grid/CN=Grid Canada Certificate Authority", \ "/C=PL/O=GRID/CN=Polish Grid CA", \ "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root", \ "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA", \ "/C=ch/O=CERN/CN=CERN Root Certification Authority 2", \ "/C=AE/O=DarkMatter LLC/CN=DarkMatter IGTF CA" obsoletes = CyGrid-old, \ CNRS-DataGrid, \ CESNET-old, \ SwissSign-Silver-Root, \ SWITCH-Personal2, \ SWITCH-CA2, \ SWITCH-Server2, \ KISTI, \ Russia, \ SWITCH-Server, \ SWITCH-Personal, \ LIP, \ GridCanada-old, \ UKeScience, \ HellasGrid, \ INFN, \ Spain, \ SiGNET, \ CERN, \ SWITCH-Personal-2006, \ SWITCH-Server-2006, \ ASGCCA, \ UKeScienceRoot, \ UKeScienceCA, \ PK-Grid, \ EstonianGrid, \ DFN-GridGermany-User, \ DFN-GridGermany-Server, \ BEGrid, \ SWITCH-Personal-2007, \ SwissSign-Root, \ SWITCH, \ SwissSign-Bronze, \ SwissSign-Silver, \ SWITCH-Server-2007, \ RMKI, \ CNRS, \ CNRS-Projets, \ CNRS-Grid-FR, \ NGO-Netrust, \ CESNET, \ Grid-Ireland, \ UKeScienceCA-2007, \ TACC-Classic, \ TACC-Root, \ IUCC, \ AIST, \ JUnet-CA, \ SWITCHgrid-Root, \ APAC, \ DOEGrids, \ ESnet, \ IHEP, \ SEE-GRID, \ PRAGMA-UCSD, \ SWITCH-QuoVadis-Grid-ICA, \ ULAGrid-CA-2008, \ HIAST, \ NCHC, \ NIIF, \ CERN-Root, \ CERN-TCA, \ NAREGI, \ IRAN-GRID-G2, \ CALG, \ BalticGrid, \ DigiCertGridCA-1G2-Classic, \ SDG, \ NorduGrid, \ BrGrid, \ HellasGrid-Root, \ HellasGrid-CA-2006, \ UniandesCA, \ INFN-CA-2006, \ NECTEC, \ BEGrid2008, \ UKeScienceCA-2A, \ UTN-USERFirst-Hardware, \ TERENA-eScience-SSL-CA, \ AAACertificateServices, \ UTNAAAClient, \ TERENAeSciencePersonalCA, \ UTN-USERTrust-RSA-CA, \ TERENA-eScience-SSL-CA-2, \ TERENAeSciencePersonalCA2, \ KISTI-2007, \ LACGridCA, \ pkIRISGrid, \ UGRID, \ IGCA, \ QuoVadis-Grid-ICA, \ MD-Grid, \ EG-GRID, \ IRAN-GRID, \ HKU, \ CyGrid, \ cilogon-osg, \ AustrianGrid, \ CESNET-CA-3 igtf-policy-installation-bundle-1.104/policy-igtf-discontinued.info0000664001343500074740000002551113614364142025010 0ustar davidgdavidg# @(#)policy-igtf-discontinued.info - IGTF discontinued authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-discontinued version = 1.104 requires = ncsa-gridshib-ca = 1.104, \ DFN-GridGermany-Server = 1.104, \ DOEGrids = 1.104, \ IRAN-GRID = 1.104, \ QuoVadis-Grid-ICA = 1.104, \ SWITCHgrid-Root = 1.104, \ SwissSign-Bronze = 1.104, \ NECTEC = 1.104, \ SWITCH-Personal-2007 = 1.104, \ SWITCH-Server-2006 = 1.104, \ UKeScienceCA-2007 = 1.104, \ TACC-Classic = 1.104, \ CyGrid-old = 1.104, \ DFN-SLCS = 1.104, \ UKeScience = 1.104, \ AAACertificateServices = 1.104, \ KISTI-2007 = 1.104, \ cilogon-osg = 1.104, \ HellasGrid-Root = 1.104, \ UTN-USERTrust-RSA-CA = 1.104, \ Thawte-freemail-issuing = 1.104, \ IRAN-GRID-G2 = 1.104, \ pkIRISGrid = 1.104, \ SWITCHslcs2011 = 1.104, \ CALG = 1.104, \ BEGrid = 1.104, \ CNRS-DataGrid = 1.104, \ ULAGrid-CA-2008 = 1.104, \ Thawte-freemail-root = 1.104, \ TERENA-SSL-CA = 1.104, \ UKeScienceRoot = 1.104, \ UniandesCA = 1.104, \ NGO-Netrust = 1.104, \ NAREGI = 1.104, \ LACGridCA = 1.104, \ FNAL = 1.104, \ BEGrid2008 = 1.104, \ APAC = 1.104, \ HellasGrid = 1.104, \ DFN-GridGermany-User = 1.104, \ PRAGMA-UCSD = 1.104, \ FNAL_KCA = 1.104, \ FNAL-SLCS = 1.104, \ INFN = 1.104, \ CyGrid = 1.104, \ ESnet = 1.104, \ SiGNET = 1.104, \ SWITCHslcs = 1.104, \ UGRID = 1.104, \ TACC-MICS = 1.104, \ GridCanada-old = 1.104, \ HIAST = 1.104, \ TERENAeSciencePersonalCA = 1.104, \ CNRS-Projets = 1.104, \ TERENAeSciencePersonalCA2 = 1.104, \ SwissSign-Silver = 1.104, \ BalticGrid = 1.104, \ CESNET-old = 1.104, \ HKU = 1.104, \ MD-Grid = 1.104, \ BrGrid = 1.104, \ TERENA-eScience-SSL-CA = 1.104, \ SWITCH-Personal-2006 = 1.104, \ CERN = 1.104, \ RMKI = 1.104, \ GILDA-CA-2011 = 1.104, \ UKeScienceCA = 1.104, \ CNRS = 1.104, \ LIP = 1.104, \ UKeScienceCA-2A = 1.104, \ SDG = 1.104, \ SWITCH-Server-2007 = 1.104, \ NIIF = 1.104, \ EG-GRID = 1.104, \ GILDA-CA = 1.104, \ NICS-MyProxy = 1.104, \ UTNAAAClient = 1.104, \ CERN-TCA = 1.104, \ IUCC = 1.104, \ INFN-CA-2006 = 1.104, \ GTE-CyberTrust-Global-Root = 1.104, \ TERENA-eScience-SSL-CA-2 = 1.104, \ IHEP = 1.104, \ CNRS-Grid-FR = 1.104, \ HellasGrid-CA-2006 = 1.104, \ CESNET-CA-3 = 1.104, \ JUnet-CA = 1.104, \ Spain = 1.104, \ NCSA-slcs = 1.104, \ TERENA-SCS = 1.104, \ AustrianGrid = 1.104, \ DOESG-Root = 1.104, \ BELNET-Root = 1.104, \ Russia = 1.104, \ SWITCH = 1.104, \ NorduGrid = 1.104, \ EstonianGrid = 1.104, \ UTN-USERFirst-Hardware = 1.104, \ CESNET = 1.104, \ PK-Grid = 1.104, \ NCHC = 1.104, \ DutchDemo = 1.104, \ ASGCCA = 1.104, \ EDG-Tutorial = 1.104, \ TACC-Root = 1.104, \ IGCA = 1.104, \ Grid-Ireland = 1.104, \ CERN-Root = 1.104, \ Globus-CA-service = 1.104, \ DigiCertGridCA-1G2-Classic = 1.104, \ SEE-GRID = 1.104, \ NCSA-mics = 1.104, \ SwissSign-Root = 1.104, \ NCSA-tfca = 1.104 subjectdn = "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=GridShib CA", \ "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein Server CA Grid - G01", \ "/DC=org/DC=DOEGrids/OU=Certificate Authorities/CN=DOEGrids CA 1", \ "/C=IR/O=IPM/O=IRAN-GRID/CN=IRAN-GRID CA", \ "/C=BM/O=QuoVadis Limited/OU=Issuing Certification Authority/CN=QuoVadis Grid ICA", \ "/C=CH/O=Switch - Teleinformatikdienste fuer Lehre und Forschung/CN=SWITCHgrid Root CA", \ "/CN=SwissSign Bronze CA/emailAddress=bronze@swisssign.com/O=SwissSign/C=CH", \ "/C=TH/O=NECTEC/OU=GOC/CN=NECTEC GOC CA", \ "/C=CH/O=Switch - Teleinformatikdienste fuer Lehre und Forschung/CN=SWITCH Personal CA", \ "/C=CH/O=SWITCH - Teleinformatikdienste fuer Lehre und Forschung/CN=SWITCH Server CA/emailAddress=switch.server.ca@switch.ch", \ "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA", \ "/DC=EDU/DC=UTEXAS/DC=TACC/O=UT-AUSTIN/CN=TACC Classic CA", \ "/C=CY/O=CyGrid/CN=CyGrid CA", \ "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN SLCS-CA", \ "/C=UK/O=eScience/OU=Authority/CN=CA/emailAddress=ca-operator@grid-support.ac.uk", \ "/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services", \ "/C=KR/O=KISTI/O=GRID/CN=KISTI Grid Certificate Authority", \ "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1", \ "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid Root CA 2006", \ "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority", \ "/C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte Personal Freemail Issuing CA", \ "/C=IR/O=IPM/O=IRAN-GRID/CN=IRAN-GRID CA G2", \ "/DC=es/DC=irisgrid/CN=IRISGridCA", \ "/C=CH/O=SWITCH/CN=SWITCHslcs CA", \ "/DC=LV/DC=latgrid/CN=Certification Authority for Latvian Grid", \ "/C=BE/O=BELNET/OU=BEGrid/CN=BEGrid CA/emailAddress=gridca@belnet.be", \ "/C=FR/O=CNRS/CN=Datagrid-fr", \ "/C=VE/O=Grid/O=Universidad de Los Andes/OU=CeCalCULA/CN=ULAGrid Certification Authority", \ "/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting/OU=Certification Services Division/CN=Thawte Personal Freemail CA/emailAddress=personal-freemail@thawte.com", \ "/C=NL/O=TERENA/CN=TERENA SSL CA", \ "/C=UK/O=eScienceRoot/OU=Authority/L=Root/CN=CA", \ "/C=CO/O=Uniandes CA/O=UNIANDES/OU=DTI/CN=Uniandes CA", \ "/C=SG/O=Netrust Certificate Authority 1/OU=Netrust CA1", \ "/C=JP/O=National Research Grid Initiative/OU=CGRD/CN=NAREGI CA", \ "/DC=BR/DC=UFF/DC=IC/O=UFF LACGrid CA/CN=UFF Latin American and Caribbean Catch-all Grid CA", \ "/DC=gov/DC=fnal/O=Fermilab/OU=Certificate Authorities/CN=Top-Level CA", \ "/C=BE/OU=BEGRID/O=BELNET/CN=BEgrid CA", \ "/C=AU/O=APACGrid/OU=CA/CN=APACGrid/emailAddress=camanager@vpac.org", \ "/C=GR/O=HellasGrid/CN=HellasGrid CA", \ "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein User CA Grid - G01", \ "/DC=NET/DC=PRAGMA-GRID/CN=PRAGMA-UCSD CA", \ "/DC=gov/DC=fnal/O=Fermilab/OU=Certificate Authorities/CN=Kerberized CA", \ "/DC=gov/DC=fnal/O=Fermilab/OU=Certificate Authorities/CN=Kerberized CA HSM", \ "/C=CY/O=CyGrid/O=HPCL/CN=CyGridCA", \ "/DC=net/DC=ES/O=ESnet/OU=Certificate Authorities/CN=ESnet Root CA 1", \ "/C=SI/O=SiGNET/CN=SiGNET CA/emailAddress=signet-ca@ijs.si", \ "/C=CH/O=Switch - Teleinformatikdienste fuer Lehre und Forschung/CN=SWITCHslcs CA", \ "/DC=org/DC=ugrid/CN=UGRID CA", \ "/DC=EDU/DC=UTEXAS/DC=TACC/O=UT-AUSTIN/CN=TACC MICS CA", \ "/C=CA/O=Grid/CN=Grid Canada CA", \ "/C=SY/O=HIAST/CN=HIAST GRID CA", \ "/C=NL/O=TERENA/CN=TERENA eScience Personal CA", \ "/C=FR/O=CNRS/CN=CNRS-Projets", \ "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 2", \ "/CN=SwissSign Silver CA/emailAddress=silver@swisssign.com/O=SwissSign/C=CH", \ "/DC=org/DC=balticgrid/CN=Baltic Grid Certification Authority", \ "/C=CZ/O=CESNET/CN=CESNET CA", \ "/DC=HK/DC=HKU/DC=GRID/CN=HKU Grid CA", \ "/DC=MD/DC=MD-Grid/O=RENAM/OU=Certification Authority/CN=MD-Grid CA", \ "/C=BR/O=ICPEDU/O=UFF BrGrid CA/CN=UFF Brazilian Grid Certification Authority", \ "/C=NL/O=TERENA/CN=TERENA eScience SSL CA", \ "/C=CH/O=SWITCH - Teleinformatikdienste fuer Lehre und Forschung/CN=SWITCH Personal CA/emailAddress=switch.personal.ca@switch.ch", \ "/C=CH/O=CERN/OU=GRID/CN=CERN CA", \ "/C=HU/O=KFKI RMKI CA/CN=KFKI RMKI CA", \ "/C=IT/O=GILDA/CN=GILDA CA 2011", \ "/C=UK/O=eScienceCA/OU=Authority/CN=CA", \ "/C=FR/O=CNRS/CN=CNRS", \ "/C=PT/O=LIP/OU=LISCC/CN=LIP Certification Authority", \ "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2A", \ "/DC=CN/DC=Grid/DC=SDG/CN=Scientific Data Grid CA", \ "/C=CH/O=Switch - Teleinformatikdienste fuer Lehre und Forschung/CN=SWITCH Server CA", \ "/C=HU/O=NIIF/OU=Certificate Authorities/CN=NIIF Root CA", \ "/C=EG/O=EG-GRID/CN=EG-GRID Certification Authority", \ "/C=IT/O=GILDA/CN=GILDA CA", \ "/DC=EDU/DC=TENNESSEE/DC=NICS/O=National Institute for Computational Sciences/CN=MyProxy", \ "/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Client Authentication and Email", \ "/DC=ch/DC=cern/CN=CERN Trusted Certification Authority", \ "/C=IL/O=IUCC/CN=IUCC/emailAddress=ca@mail.iucc.ac.il", \ "/C=IT/O=INFN/CN=INFN CA", \ "/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root", \ "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience SSL CA 2", \ "/C=CN/O=HEP/CN=gridca-cn/emailAddress=gridca@ihep.ac.cn", \ "/C=FR/O=CNRS/CN=GRID-FR", \ "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2006", \ "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 3", \ "/C=JO/O=JUNet/CN=JUNet CA", \ "/C=ES/O=DATAGRID-ES/CN=DATAGRID-ES CA", \ "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=MyProxy", \ "/C=BE/O=Cybertrust/OU=Educational CA/CN=Cybertrust Educational CA", \ "/C=AT/O=AustrianGrid/OU=Certification Authority/CN=Certificate Issuer", \ "/O=DOE Science Grid/OU=Certificate Authorities/CN=Certificate Manager", \ "/C=BE/O=BELNET/CN=BELNET Root CA", \ "/C=RU/O=DataGrid/CN=Russian DataGrid CA", \ "/CN=SWITCH CA/emailAddress=switch.ca@switch.ch/O=Switch - Teleinformatikdienste fuer Lehre und Forschung/C=CH", \ "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority", \ "/C=EE/O=Grid/CN=Estonian Grid Certification Authority", \ "/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware", \ "/DC=cz/DC=cesnet-ca/CN=CESNET CA", \ "/C=PK/O=NCP/CN=ncp.edu.pk", \ "/DC=TW/DC=ORG/DC=NCHC/CN=NCHC CA", \ "/O=DutchGrid/OU=Certificate Authorities/CN=DutchDemo worthless CA", \ "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority", \ "/O=dutchgrid/OU=Certificate Authorities/CN=EDG Tutorial Worthless Certification Authority", \ "/DC=EDU/DC=UTEXAS/DC=TACC/O=UT-AUSTIN/CN=TACC Root CA", \ "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority", \ "/C=IE/O=Grid-Ireland/CN=Grid-Ireland Certification Authority", \ "/DC=ch/DC=cern/CN=CERN Root CA", \ "/C=US/O=Globus Alliance/CN=Globus Certificate Service", \ "/DC=DigiCert-Grid/DC=com/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2", \ "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA", \ "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=CACL", \ "/C=CH/O=SwissSign/CN=SwissSign CA (RSA IK May 6 1999 18:00:58)/emailAddress=ca@SwissSign.com", \ "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=Two Factor CA" igtf-policy-installation-bundle-1.104/policy-igtf-experimental.info0000664001343500074740000000040213614364142025005 0ustar davidgdavidg# @(#)policy-igtf-experimental.info - IGTF experimental authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-experimental version = 1.104 requires = cilogon-openid = 1.104 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" igtf-policy-installation-bundle-1.104/policy-igtf-iota.info0000664001343500074740000000073313614364142023253 0ustar davidgdavidg# @(#)policy-igtf-iota.info - IGTF iota authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-iota version = 1.104 requires = RCauth-Pilot-ICA-G1 = 1.104, \ cilogon-basic = 1.104, \ CERN-LCG-IOTA-CA = 1.104 subjectdn = "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA", \ "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1", \ "/DC=ch/DC=cern/CN=CERN LCG IOTA Certification Authority" igtf-policy-installation-bundle-1.104/policy-igtf-mics.info0000664001343500074740000000071413614364142023251 0ustar davidgdavidg# @(#)policy-igtf-mics.info - IGTF mics authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-mics version = 1.104 requires = cilogon-silver = 1.104, \ TERENAeSciencePersonalCA3 = 1.104, \ HPCI = 1.104 subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1", \ "/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA eScience Personal CA 3", \ "/C=JP/O=NII/OU=HPCI/CN=HPCI CA" obsoletes = TACC-MICS, \ NCSA-mics igtf-policy-installation-bundle-1.104/policy-igtf-slcs.info0000664001343500074740000000140413614364142023257 0ustar davidgdavidg# @(#)policy-igtf-slcs.info - IGTF slcs authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-slcs version = 1.104 requires = NCSA-slcs-2013 = 1.104, \ PSC-Myproxy-CA = 1.104, \ NCSA-tfca-2013 = 1.104, \ NERSC-SLCS = 1.104 subjectdn = "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=MyProxy CA 2013", \ "/C=US/O=Pittsburgh Supercomputing Center/CN=PSC MyProxy CA", \ "/C=US/O=National Center for Supercomputing Applications/OU=Certificate Authorities/CN=Two Factor CA 2013", \ "/DC=net/DC=ES/OU=Certificate Authorities/CN=NERSC Online CA" obsoletes = SWITCHslcs, \ ncsa-gridshib-ca, \ SWITCHslcs2011, \ NCSA-tfca, \ NICS-MyProxy, \ NCSA-slcs, \ FNAL-SLCS, \ DFN-SLCS igtf-policy-installation-bundle-1.104/policy-igtf-unaccredited.info0000664001343500074740000000114413614364142024746 0ustar davidgdavidg# @(#)policy-igtf-unaccredited.info - IGTF unaccredited authorities # Generated Wednesday, 29 Jan, 2020 alias = policy-igtf-unaccredited version = 1.104 requires = egee-ne-benelux-tutorial = 1.104, \ InCommon-Server-CA = 1.104, \ nl-e-infra-zero = 1.104, \ UKPathfinder1 = 1.104 subjectdn = "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1", \ "/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA", \ "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1", \ "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" igtf-policy-installation-bundle-1.104/policy-igtf.info0000664001343500074740000001130313614364142022314 0ustar davidgdavidg# @(#)policy-igtf.info - all IGTF accredited authorities # Generated Wednesday, 29 Jan, 2020 version = 1.104 requires = CNRS2-Grid-FR = 1.104, \ seegrid-ca-2013 = 1.104, \ RDIG = 1.104, \ CESNET-CA-Root = 1.104, \ UKeScienceCA-2B = 1.104, \ SRCE = 1.104, \ PK-Grid-2007 = 1.104, \ ANSPGrid = 1.104, \ HKU-CA-2 = 1.104, \ PKIUNAMgrid = 1.104, \ MYIFAM = 1.104, \ CNRS2-Projets = 1.104, \ MaGrid = 1.104, \ SDG-G2 = 1.104, \ SiGNET-CA = 1.104, \ UGRID-G2 = 1.104, \ CNRS2 = 1.104, \ COMODO-RSA-CA = 1.104, \ NorduGrid-2015 = 1.104, \ CNIC = 1.104, \ DarkMatterSecureCA = 1.104, \ InCommon-IGTF-Server-CA = 1.104, \ DigiCertGridCA-1G2-Classic-2015 = 1.104, \ NIIF-Root-CA-2 = 1.104, \ MARGI = 1.104, \ CERN-GridCA = 1.104, \ QuoVadis-Root-CA1 = 1.104, \ KENETCA-ICA-2015 = 1.104, \ KENETROOTCA = 1.104, \ CESNET-CA-4 = 1.104, \ HellasGrid-CA-2016 = 1.104, \ NIKHEF = 1.104, \ DCAROOT-G1 = 1.104, \ UNLPGrid = 1.104, \ IRAN-GRID-GCG-G2 = 1.104, \ AC-GRID-FR-Personnels = 1.104, \ INFN-CA-2015 = 1.104, \ RomanianGRID = 1.104, \ TRGrid = 1.104, \ DarkMatterAssuredCA = 1.104, \ SlovakGrid = 1.104, \ BG-ACAD-CA = 1.104, \ DFN-GridGermany-Root = 1.104, \ REUNA-ca = 1.104, \ UNAMgrid-ca = 1.104, \ ASGCCA-2007 = 1.104, \ AC-GRID-FR-Robots = 1.104, \ QuoVadis-Root-CA3G3 = 1.104, \ DigiCertGridTrustCAG2-Classic = 1.104, \ LIPCA = 1.104, \ AC-GRID-FR = 1.104, \ ArmeSFo = 1.104, \ QuoVadis-Root-CA2 = 1.104, \ IHEP-2013 = 1.104, \ TERENA-eScience-SSL-CA-3 = 1.104, \ MREN-CA = 1.104, \ AC-GRID-FR-Services = 1.104, \ DigiCertGridCA-1-Classic = 1.104, \ TSU-GE = 1.104, \ IGCA2 = 1.104, \ BYGCA = 1.104, \ DZeScience = 1.104, \ KEK = 1.104, \ DarkMatterPrivateRootCAG4 = 1.104, \ PolishGrid-2019 = 1.104, \ KISTIv3 = 1.104, \ QuoVadis-Grid-ICA-G2 = 1.104, \ DigiCertAssuredIDRootCA-Root = 1.104, \ AddTrust-External-CA-Root = 1.104, \ GermanGrid = 1.104, \ DigiCertGridTrustCA-Classic = 1.104, \ AEGIS = 1.104, \ MD-Grid-CA-T = 1.104, \ QuoVadis-Root-CA2G3 = 1.104, \ GridCanada = 1.104, \ PolishGrid = 1.104, \ UKeScienceRoot-2007 = 1.104, \ DigiCertGridRootCA-Root = 1.104, \ CERN-Root-2 = 1.104, \ DarkMatterIGTFCA = 1.104NCSA-slcs-2013 = 1.104, \ PSC-Myproxy-CA = 1.104, \ NCSA-tfca-2013 = 1.104, \ NERSC-SLCS = 1.104cilogon-silver = 1.104, \ TERENAeSciencePersonalCA3 = 1.104, \ HPCI = 1.104RCauth-Pilot-ICA-G1 = 1.104, \ cilogon-basic = 1.104, \ CERN-LCG-IOTA-CA = 1.104 obsoletes = CyGrid-old, \ CNRS-DataGrid, \ CESNET-old, \ SwissSign-Silver-Root, \ SWITCH-Personal2, \ SWITCH-CA2, \ SWITCH-Server2, \ KISTI, \ Russia, \ SWITCH-Server, \ SWITCH-Personal, \ LIP, \ GridCanada-old, \ UKeScience, \ HellasGrid, \ INFN, \ Spain, \ SiGNET, \ CERN, \ SWITCH-Personal-2006, \ SWITCH-Server-2006, \ ASGCCA, \ UKeScienceRoot, \ UKeScienceCA, \ PK-Grid, \ EstonianGrid, \ DFN-GridGermany-User, \ DFN-GridGermany-Server, \ BEGrid, \ SWITCH-Personal-2007, \ SwissSign-Root, \ SWITCH, \ SwissSign-Bronze, \ SwissSign-Silver, \ SWITCH-Server-2007, \ RMKI, \ CNRS, \ CNRS-Projets, \ CNRS-Grid-FR, \ NGO-Netrust, \ CESNET, \ Grid-Ireland, \ UKeScienceCA-2007, \ TACC-Classic, \ TACC-Root, \ IUCC, \ AIST, \ JUnet-CA, \ SWITCHgrid-Root, \ APAC, \ DOEGrids, \ ESnet, \ IHEP, \ SEE-GRID, \ PRAGMA-UCSD, \ SWITCH-QuoVadis-Grid-ICA, \ ULAGrid-CA-2008, \ HIAST, \ NCHC, \ NIIF, \ CERN-Root, \ CERN-TCA, \ NAREGI, \ IRAN-GRID-G2, \ CALG, \ BalticGrid, \ DigiCertGridCA-1G2-Classic, \ SDG, \ NorduGrid, \ BrGrid, \ HellasGrid-Root, \ HellasGrid-CA-2006, \ UniandesCA, \ INFN-CA-2006, \ NECTEC, \ BEGrid2008, \ UKeScienceCA-2A, \ UTN-USERFirst-Hardware, \ TERENA-eScience-SSL-CA, \ AAACertificateServices, \ UTNAAAClient, \ TERENAeSciencePersonalCA, \ UTN-USERTrust-RSA-CA, \ TERENA-eScience-SSL-CA-2, \ TERENAeSciencePersonalCA2, \ KISTI-2007, \ LACGridCA, \ pkIRISGrid, \ UGRID, \ IGCA, \ QuoVadis-Grid-ICA, \ MD-Grid, \ EG-GRID, \ IRAN-GRID, \ HKU, \ CyGrid, \ cilogon-osg, \ AustrianGrid, \ CESNET-CA-3, \ SWITCHslcs, \ ncsa-gridshib-ca, \ SWITCHslcs2011, \ NCSA-tfca, \ NICS-MyProxy, \ NCSA-slcs, \ FNAL-SLCS, \ DFN-SLCS, \ TACC-MICS, \ NCSA-micsigtf-policy-installation-bundle-1.104/Makefile.tpl0000664001343500074740000023767313614364142021473 0ustar davidgdavidg# # @(#)$Id: Makefile.tpl.cin,v 1.2 2010/01/05 21:38:02 pmacvsdg Exp $ # # This makefile is auto-generated and mofified by ./configure # prefix=@PREFIX@ install=@INSTALL@ mkdir=@MKDIR@ ln=@LN@ prep: $(prefix) $(prefix):; @echo Creating target directory $(prefix) $(mkdir) -p $(prefix) install: @INSTALLTARGETS@ # # parts autogenerated by the PMA build script follow # # Created: Wed Jan 29 20:17:38 2020 GMT # install-classic: AC-GRID-FR AC-GRID-FR-Personnels AC-GRID-FR-Robots AC-GRID-FR-Services AEGIS ANSPGrid ASGCCA-2007 AddTrust-External-CA-Root ArmeSFo BG-ACAD-CA BYGCA CERN-GridCA CERN-Root-2 CESNET-CA-4 CESNET-CA-Root CNIC CNRS2 CNRS2-Grid-FR CNRS2-Projets COMODO-RSA-CA DCAROOT-G1 DFN-GridGermany-Root DZeScience DarkMatterAssuredCA DarkMatterIGTFCA DarkMatterPrivateRootCAG4 DarkMatterSecureCA DigiCertAssuredIDRootCA-Root DigiCertGridCA-1-Classic DigiCertGridCA-1G2-Classic-2015 DigiCertGridRootCA-Root DigiCertGridTrustCA-Classic DigiCertGridTrustCAG2-Classic GermanGrid GridCanada HKU-CA-2 HellasGrid-CA-2016 IGCA2 IHEP-2013 INFN-CA-2015 IRAN-GRID-GCG-G2 InCommon-IGTF-Server-CA KEK KENETCA-ICA-2015 KENETROOTCA KISTIv3 LIPCA MARGI MD-Grid-CA-T MREN-CA MYIFAM MaGrid NIIF-Root-CA-2 NIKHEF NorduGrid-2015 PK-Grid-2007 PKIUNAMgrid PolishGrid PolishGrid-2019 QuoVadis-Grid-ICA-G2 QuoVadis-Root-CA1 QuoVadis-Root-CA2 QuoVadis-Root-CA2G3 QuoVadis-Root-CA3G3 RDIG REUNA-ca RomanianGRID SDG-G2 SRCE SiGNET-CA SlovakGrid TERENA-eScience-SSL-CA-3 TRGrid TSU-GE UGRID-G2 UKeScienceCA-2B UKeScienceRoot-2007 UNAMgrid-ca UNLPGrid seegrid-ca-2013 @echo Installing CAs for profile accredited:classic $(install) policy-igtf-classic.info $(prefix)/ install-slcs: NCSA-slcs-2013 NCSA-tfca-2013 NERSC-SLCS PSC-Myproxy-CA @echo Installing CAs for profile accredited:slcs $(install) policy-igtf-slcs.info $(prefix)/ install-mics: HPCI TERENAeSciencePersonalCA3 cilogon-silver @echo Installing CAs for profile accredited:mics $(install) policy-igtf-mics.info $(prefix)/ install-iota: CERN-LCG-IOTA-CA RCauth-Pilot-ICA-G1 cilogon-basic @echo Installing CAs for profile accredited:iota $(install) policy-igtf-iota.info $(prefix)/ install-discontinued: AAACertificateServices APAC ASGCCA AustrianGrid BEGrid BEGrid2008 BELNET-Root BalticGrid BrGrid CALG CERN CERN-Root CERN-TCA CESNET CESNET-CA-3 CESNET-old CNRS CNRS-DataGrid CNRS-Grid-FR CNRS-Projets CyGrid CyGrid-old DFN-GridGermany-Server DFN-GridGermany-User DFN-SLCS DOEGrids DOESG-Root DigiCertGridCA-1G2-Classic DutchDemo EDG-Tutorial EG-GRID ESnet EstonianGrid FNAL FNAL-SLCS FNAL_KCA GILDA-CA GILDA-CA-2011 GTE-CyberTrust-Global-Root Globus-CA-service Grid-Ireland GridCanada-old HIAST HKU HellasGrid HellasGrid-CA-2006 HellasGrid-Root IGCA IHEP INFN INFN-CA-2006 IRAN-GRID IRAN-GRID-G2 IUCC JUnet-CA KISTI-2007 LACGridCA LIP MD-Grid NAREGI NCHC NCSA-mics NCSA-slcs NCSA-tfca NECTEC NGO-Netrust NICS-MyProxy NIIF NorduGrid PK-Grid PRAGMA-UCSD QuoVadis-Grid-ICA RMKI Russia SDG SEE-GRID SWITCH SWITCH-Personal-2006 SWITCH-Personal-2007 SWITCH-Server-2006 SWITCH-Server-2007 SWITCHgrid-Root SWITCHslcs SWITCHslcs2011 SiGNET Spain SwissSign-Bronze SwissSign-Root SwissSign-Silver TACC-Classic TACC-MICS TACC-Root TERENA-SCS TERENA-SSL-CA TERENA-eScience-SSL-CA TERENA-eScience-SSL-CA-2 TERENAeSciencePersonalCA TERENAeSciencePersonalCA2 Thawte-freemail-issuing Thawte-freemail-root UGRID UKeScience UKeScienceCA UKeScienceCA-2007 UKeScienceCA-2A UKeScienceRoot ULAGrid-CA-2008 UTN-USERFirst-Hardware UTN-USERTrust-RSA-CA UTNAAAClient UniandesCA cilogon-osg ncsa-gridshib-ca pkIRISGrid @echo Installing CAs for profile discontinued $(install) policy-igtf-discontinued.info $(prefix)/ install-experimental: cilogon-openid @echo Installing CAs for profile experimental $(install) policy-igtf-experimental.info $(prefix)/ install-unaccredited: InCommon-Server-CA UKPathfinder1 egee-ne-benelux-tutorial nl-e-infra-zero @echo Installing CAs for profile unaccredited $(install) policy-igtf-unaccredited.info $(prefix)/ install-all-accredited: install-classic install-slcs install-mics install-iota @echo Installing all IGTF accredited CAs under ANY profile $(install) policy-igtf.info $(prefix)/ # # single CA installations # AAACertificateServices: prep $(ln) -s AAACertificateServices.pem $(prefix)/75680d2e.0 $(ln) -s AAACertificateServices.pem $(prefix)/ee64a828.0 AC-GRID-FR: prep $(install) src/accredited/AC-GRID-FR.crl_url $(prefix)/ $(install) src/accredited/AC-GRID-FR.info $(prefix)/ $(install) src/accredited/AC-GRID-FR.namespaces $(prefix)/ $(install) src/accredited/AC-GRID-FR.pem $(prefix)/ $(install) src/accredited/AC-GRID-FR.signing_policy $(prefix)/ $(ln) -s AC-GRID-FR.pem $(prefix)/7ca9677b.0 $(ln) -s AC-GRID-FR.pem $(prefix)/16054abd.0 $(ln) -s AC-GRID-FR.signing_policy $(prefix)/7ca9677b.signing_policy $(ln) -s AC-GRID-FR.signing_policy $(prefix)/16054abd.signing_policy $(ln) -s AC-GRID-FR.namespaces $(prefix)/7ca9677b.namespaces $(ln) -s AC-GRID-FR.namespaces $(prefix)/16054abd.namespaces AC-GRID-FR-Personnels: prep $(install) src/accredited/AC-GRID-FR-Personnels.crl_url $(prefix)/ $(install) src/accredited/AC-GRID-FR-Personnels.info $(prefix)/ $(install) src/accredited/AC-GRID-FR-Personnels.pem $(prefix)/ $(install) src/accredited/AC-GRID-FR-Personnels.signing_policy $(prefix)/ $(ln) -s AC-GRID-FR-Personnels.pem $(prefix)/80df9b28.0 $(ln) -s AC-GRID-FR-Personnels.pem $(prefix)/72aa436d.0 $(ln) -s AC-GRID-FR-Personnels.signing_policy $(prefix)/80df9b28.signing_policy $(ln) -s AC-GRID-FR-Personnels.signing_policy $(prefix)/72aa436d.signing_policy AC-GRID-FR-Robots: prep $(install) src/accredited/AC-GRID-FR-Robots.crl_url $(prefix)/ $(install) src/accredited/AC-GRID-FR-Robots.info $(prefix)/ $(install) src/accredited/AC-GRID-FR-Robots.pem $(prefix)/ $(install) src/accredited/AC-GRID-FR-Robots.signing_policy $(prefix)/ $(ln) -s AC-GRID-FR-Robots.pem $(prefix)/3f638905.0 $(ln) -s AC-GRID-FR-Robots.pem $(prefix)/37a553c6.0 $(ln) -s AC-GRID-FR-Robots.signing_policy $(prefix)/3f638905.signing_policy $(ln) -s AC-GRID-FR-Robots.signing_policy $(prefix)/37a553c6.signing_policy AC-GRID-FR-Services: prep $(install) src/accredited/AC-GRID-FR-Services.crl_url $(prefix)/ $(install) src/accredited/AC-GRID-FR-Services.info $(prefix)/ $(install) src/accredited/AC-GRID-FR-Services.pem $(prefix)/ $(install) src/accredited/AC-GRID-FR-Services.signing_policy $(prefix)/ $(ln) -s AC-GRID-FR-Services.pem $(prefix)/14e86c33.0 $(ln) -s AC-GRID-FR-Services.pem $(prefix)/5e02f50a.0 $(ln) -s AC-GRID-FR-Services.signing_policy $(prefix)/14e86c33.signing_policy $(ln) -s AC-GRID-FR-Services.signing_policy $(prefix)/5e02f50a.signing_policy AEGIS: prep $(install) src/accredited/AEGIS.crl_url $(prefix)/ $(install) src/accredited/AEGIS.info $(prefix)/ $(install) src/accredited/AEGIS.namespaces $(prefix)/ $(install) src/accredited/AEGIS.pem $(prefix)/ $(install) src/accredited/AEGIS.signing_policy $(prefix)/ $(ln) -s AEGIS.pem $(prefix)/393f7863.0 $(ln) -s AEGIS.pem $(prefix)/cc5645bd.0 $(ln) -s AEGIS.signing_policy $(prefix)/393f7863.signing_policy $(ln) -s AEGIS.signing_policy $(prefix)/cc5645bd.signing_policy $(ln) -s AEGIS.namespaces $(prefix)/393f7863.namespaces $(ln) -s AEGIS.namespaces $(prefix)/cc5645bd.namespaces ANSPGrid: prep $(install) src/accredited/ANSPGrid.crl_url $(prefix)/ $(install) src/accredited/ANSPGrid.info $(prefix)/ $(install) src/accredited/ANSPGrid.namespaces $(prefix)/ $(install) src/accredited/ANSPGrid.pem $(prefix)/ $(install) src/accredited/ANSPGrid.signing_policy $(prefix)/ $(ln) -s ANSPGrid.pem $(prefix)/126f0acf.0 $(ln) -s ANSPGrid.pem $(prefix)/036b3363.0 $(ln) -s ANSPGrid.signing_policy $(prefix)/126f0acf.signing_policy $(ln) -s ANSPGrid.signing_policy $(prefix)/036b3363.signing_policy $(ln) -s ANSPGrid.namespaces $(prefix)/126f0acf.namespaces $(ln) -s ANSPGrid.namespaces $(prefix)/036b3363.namespaces APAC: prep $(ln) -s APAC.pem $(prefix)/1e12d831.0 $(ln) -s APAC.pem $(prefix)/7cef5492.0 ASGCCA: prep $(ln) -s ASGCCA.pem $(prefix)/a692434d.0 $(ln) -s ASGCCA.pem $(prefix)/ec4c0bc1.0 ASGCCA-2007: prep $(install) src/accredited/ASGCCA-2007.crl_url $(prefix)/ $(install) src/accredited/ASGCCA-2007.info $(prefix)/ $(install) src/accredited/ASGCCA-2007.namespaces $(prefix)/ $(install) src/accredited/ASGCCA-2007.pem $(prefix)/ $(install) src/accredited/ASGCCA-2007.signing_policy $(prefix)/ $(ln) -s ASGCCA-2007.pem $(prefix)/9cd75e87.0 $(ln) -s ASGCCA-2007.pem $(prefix)/b459ca48.0 $(ln) -s ASGCCA-2007.signing_policy $(prefix)/9cd75e87.signing_policy $(ln) -s ASGCCA-2007.signing_policy $(prefix)/b459ca48.signing_policy $(ln) -s ASGCCA-2007.namespaces $(prefix)/9cd75e87.namespaces $(ln) -s ASGCCA-2007.namespaces $(prefix)/b459ca48.namespaces AddTrust-External-CA-Root: prep $(install) src/accredited/AddTrust-External-CA-Root.crl_url $(prefix)/ $(install) src/accredited/AddTrust-External-CA-Root.info $(prefix)/ $(install) src/accredited/AddTrust-External-CA-Root.namespaces $(prefix)/ $(install) src/accredited/AddTrust-External-CA-Root.pem $(prefix)/ $(install) src/accredited/AddTrust-External-CA-Root.signing_policy $(prefix)/ $(ln) -s AddTrust-External-CA-Root.pem $(prefix)/3c58f906.0 $(ln) -s AddTrust-External-CA-Root.pem $(prefix)/157753a5.0 $(ln) -s AddTrust-External-CA-Root.signing_policy $(prefix)/3c58f906.signing_policy $(ln) -s AddTrust-External-CA-Root.signing_policy $(prefix)/157753a5.signing_policy $(ln) -s AddTrust-External-CA-Root.namespaces $(prefix)/3c58f906.namespaces $(ln) -s AddTrust-External-CA-Root.namespaces $(prefix)/157753a5.namespaces ArmeSFo: prep $(install) src/accredited/ArmeSFo.crl_url $(prefix)/ $(install) src/accredited/ArmeSFo.info $(prefix)/ $(install) src/accredited/ArmeSFo.namespaces $(prefix)/ $(install) src/accredited/ArmeSFo.pem $(prefix)/ $(install) src/accredited/ArmeSFo.signing_policy $(prefix)/ $(ln) -s ArmeSFo.pem $(prefix)/d0c2a341.0 $(ln) -s ArmeSFo.pem $(prefix)/3fb4d8a6.0 $(ln) -s ArmeSFo.signing_policy $(prefix)/d0c2a341.signing_policy $(ln) -s ArmeSFo.signing_policy $(prefix)/3fb4d8a6.signing_policy $(ln) -s ArmeSFo.namespaces $(prefix)/d0c2a341.namespaces $(ln) -s ArmeSFo.namespaces $(prefix)/3fb4d8a6.namespaces AustrianGrid: prep $(ln) -s AustrianGrid.pem $(prefix)/6e3b436b.0 $(ln) -s AustrianGrid.pem $(prefix)/3de400d0.0 BEGrid: prep $(ln) -s BEGrid.pem $(prefix)/03aa0ecb.0 $(ln) -s BEGrid.pem $(prefix)/87218157.0 BEGrid2008: prep $(ln) -s BEGrid2008.pem $(prefix)/e8d818e6.0 $(ln) -s BEGrid2008.pem $(prefix)/30feecdf.0 BELNET-Root: prep $(ln) -s BELNET-Root.pem $(prefix)/fd30a60e.0 $(ln) -s BELNET-Root.pem $(prefix)/ddb85ae8.0 BG-ACAD-CA: prep $(install) src/accredited/BG-ACAD-CA.crl_url $(prefix)/ $(install) src/accredited/BG-ACAD-CA.info $(prefix)/ $(install) src/accredited/BG-ACAD-CA.namespaces $(prefix)/ $(install) src/accredited/BG-ACAD-CA.pem $(prefix)/ $(install) src/accredited/BG-ACAD-CA.signing_policy $(prefix)/ $(ln) -s BG-ACAD-CA.pem $(prefix)/2418a3f3.0 $(ln) -s BG-ACAD-CA.pem $(prefix)/13ba0088.0 $(ln) -s BG-ACAD-CA.signing_policy $(prefix)/2418a3f3.signing_policy $(ln) -s BG-ACAD-CA.signing_policy $(prefix)/13ba0088.signing_policy $(ln) -s BG-ACAD-CA.namespaces $(prefix)/2418a3f3.namespaces $(ln) -s BG-ACAD-CA.namespaces $(prefix)/13ba0088.namespaces BYGCA: prep $(install) src/accredited/BYGCA.crl_url $(prefix)/ $(install) src/accredited/BYGCA.info $(prefix)/ $(install) src/accredited/BYGCA.namespaces $(prefix)/ $(install) src/accredited/BYGCA.pem $(prefix)/ $(install) src/accredited/BYGCA.signing_policy $(prefix)/ $(ln) -s BYGCA.pem $(prefix)/709bed08.0 $(ln) -s BYGCA.pem $(prefix)/b1ac0d46.0 $(ln) -s BYGCA.signing_policy $(prefix)/709bed08.signing_policy $(ln) -s BYGCA.signing_policy $(prefix)/b1ac0d46.signing_policy $(ln) -s BYGCA.namespaces $(prefix)/709bed08.namespaces $(ln) -s BYGCA.namespaces $(prefix)/b1ac0d46.namespaces BalticGrid: prep $(ln) -s BalticGrid.pem $(prefix)/2a237f16.0 $(ln) -s BalticGrid.pem $(prefix)/bca425d1.0 BrGrid: prep $(ln) -s BrGrid.pem $(prefix)/0a2bac92.0 $(ln) -s BrGrid.pem $(prefix)/33eb0f86.0 CALG: prep $(ln) -s CALG.pem $(prefix)/742edd45.0 $(ln) -s CALG.pem $(prefix)/86b6fa2c.0 CERN: prep $(ln) -s CERN.pem $(prefix)/fa3af1d7.0 $(ln) -s CERN.pem $(prefix)/f649e3a7.0 CERN-GridCA: prep $(install) src/accredited/CERN-GridCA.crl_url $(prefix)/ $(install) src/accredited/CERN-GridCA.info $(prefix)/ $(install) src/accredited/CERN-GridCA.pem $(prefix)/ $(install) src/accredited/CERN-GridCA.signing_policy $(prefix)/ $(ln) -s CERN-GridCA.pem $(prefix)/4339b4bc.0 $(ln) -s CERN-GridCA.pem $(prefix)/5168735f.0 $(ln) -s CERN-GridCA.signing_policy $(prefix)/4339b4bc.signing_policy $(ln) -s CERN-GridCA.signing_policy $(prefix)/5168735f.signing_policy CERN-LCG-IOTA-CA: prep $(install) src/accredited/CERN-LCG-IOTA-CA.crl_url $(prefix)/ $(install) src/accredited/CERN-LCG-IOTA-CA.info $(prefix)/ $(install) src/accredited/CERN-LCG-IOTA-CA.pem $(prefix)/ $(install) src/accredited/CERN-LCG-IOTA-CA.signing_policy $(prefix)/ $(ln) -s CERN-LCG-IOTA-CA.pem $(prefix)/16d09bf5.0 $(ln) -s CERN-LCG-IOTA-CA.pem $(prefix)/c7cad089.0 $(ln) -s CERN-LCG-IOTA-CA.signing_policy $(prefix)/16d09bf5.signing_policy $(ln) -s CERN-LCG-IOTA-CA.signing_policy $(prefix)/c7cad089.signing_policy CERN-Root: prep $(ln) -s CERN-Root.pem $(prefix)/d254cc30.0 $(ln) -s CERN-Root.pem $(prefix)/2eb756e6.0 CERN-Root-2: prep $(install) src/accredited/CERN-Root-2.crl_url $(prefix)/ $(install) src/accredited/CERN-Root-2.info $(prefix)/ $(install) src/accredited/CERN-Root-2.namespaces $(prefix)/ $(install) src/accredited/CERN-Root-2.pem $(prefix)/ $(install) src/accredited/CERN-Root-2.signing_policy $(prefix)/ $(ln) -s CERN-Root-2.pem $(prefix)/b4278411.0 $(ln) -s CERN-Root-2.pem $(prefix)/c2a48ab6.0 $(ln) -s CERN-Root-2.signing_policy $(prefix)/b4278411.signing_policy $(ln) -s CERN-Root-2.signing_policy $(prefix)/c2a48ab6.signing_policy $(ln) -s CERN-Root-2.namespaces $(prefix)/b4278411.namespaces $(ln) -s CERN-Root-2.namespaces $(prefix)/c2a48ab6.namespaces CERN-TCA: prep $(ln) -s CERN-TCA.pem $(prefix)/1d879c6c.0 $(ln) -s CERN-TCA.pem $(prefix)/b2a87ac7.0 CESNET: prep $(ln) -s CESNET.pem $(prefix)/9b59ecad.0 $(ln) -s CESNET.pem $(prefix)/9d78dd37.0 CESNET-CA-3: prep $(ln) -s CESNET-CA-3.pem $(prefix)/712ae4cc.0 $(ln) -s CESNET-CA-3.pem $(prefix)/4d12be1d.0 CESNET-CA-4: prep $(install) src/accredited/CESNET-CA-4.crl_url $(prefix)/ $(install) src/accredited/CESNET-CA-4.info $(prefix)/ $(install) src/accredited/CESNET-CA-4.namespaces $(prefix)/ $(install) src/accredited/CESNET-CA-4.pem $(prefix)/ $(install) src/accredited/CESNET-CA-4.signing_policy $(prefix)/ $(ln) -s CESNET-CA-4.pem $(prefix)/9c979c2b.0 $(ln) -s CESNET-CA-4.pem $(prefix)/84c78b97.0 $(ln) -s CESNET-CA-4.signing_policy $(prefix)/9c979c2b.signing_policy $(ln) -s CESNET-CA-4.signing_policy $(prefix)/84c78b97.signing_policy $(ln) -s CESNET-CA-4.namespaces $(prefix)/9c979c2b.namespaces $(ln) -s CESNET-CA-4.namespaces $(prefix)/84c78b97.namespaces CESNET-CA-Root: prep $(install) src/accredited/CESNET-CA-Root.crl_url $(prefix)/ $(install) src/accredited/CESNET-CA-Root.info $(prefix)/ $(install) src/accredited/CESNET-CA-Root.namespaces $(prefix)/ $(install) src/accredited/CESNET-CA-Root.pem $(prefix)/ $(install) src/accredited/CESNET-CA-Root.signing_policy $(prefix)/ $(ln) -s CESNET-CA-Root.pem $(prefix)/edca0fc0.0 $(ln) -s CESNET-CA-Root.pem $(prefix)/f4401b90.0 $(ln) -s CESNET-CA-Root.signing_policy $(prefix)/edca0fc0.signing_policy $(ln) -s CESNET-CA-Root.signing_policy $(prefix)/f4401b90.signing_policy $(ln) -s CESNET-CA-Root.namespaces $(prefix)/edca0fc0.namespaces $(ln) -s CESNET-CA-Root.namespaces $(prefix)/f4401b90.namespaces CESNET-old: prep $(ln) -s CESNET-old.pem $(prefix)/ed99a497.0 $(ln) -s CESNET-old.pem $(prefix)/cf7cdd96.0 CNIC: prep $(install) src/accredited/CNIC.crl_url $(prefix)/ $(install) src/accredited/CNIC.info $(prefix)/ $(install) src/accredited/CNIC.namespaces $(prefix)/ $(install) src/accredited/CNIC.pem $(prefix)/ $(install) src/accredited/CNIC.signing_policy $(prefix)/ $(ln) -s CNIC.pem $(prefix)/b2771d44.0 $(ln) -s CNIC.pem $(prefix)/e2023333.0 $(ln) -s CNIC.signing_policy $(prefix)/b2771d44.signing_policy $(ln) -s CNIC.signing_policy $(prefix)/e2023333.signing_policy $(ln) -s CNIC.namespaces $(prefix)/b2771d44.namespaces $(ln) -s CNIC.namespaces $(prefix)/e2023333.namespaces CNRS: prep $(ln) -s CNRS.pem $(prefix)/cf4ba8c8.0 $(ln) -s CNRS.pem $(prefix)/36f306d5.0 CNRS-DataGrid: prep $(ln) -s CNRS-DataGrid.pem $(prefix)/6b4ddd18.0 $(ln) -s CNRS-DataGrid.pem $(prefix)/53217fb6.0 CNRS-Grid-FR: prep $(ln) -s CNRS-Grid-FR.pem $(prefix)/12a1d8c2.0 $(ln) -s CNRS-Grid-FR.pem $(prefix)/57cf85ed.0 CNRS-Projets: prep $(ln) -s CNRS-Projets.pem $(prefix)/34a509c3.0 $(ln) -s CNRS-Projets.pem $(prefix)/513cf6ff.0 CNRS2: prep $(install) src/accredited/CNRS2.crl_url $(prefix)/ $(install) src/accredited/CNRS2.info $(prefix)/ $(install) src/accredited/CNRS2.namespaces $(prefix)/ $(install) src/accredited/CNRS2.pem $(prefix)/ $(install) src/accredited/CNRS2.signing_policy $(prefix)/ $(ln) -s CNRS2.pem $(prefix)/163af95c.0 $(ln) -s CNRS2.pem $(prefix)/727146a8.0 $(ln) -s CNRS2.signing_policy $(prefix)/163af95c.signing_policy $(ln) -s CNRS2.signing_policy $(prefix)/727146a8.signing_policy $(ln) -s CNRS2.namespaces $(prefix)/163af95c.namespaces $(ln) -s CNRS2.namespaces $(prefix)/727146a8.namespaces CNRS2-Grid-FR: prep $(install) src/accredited/CNRS2-Grid-FR.crl_url $(prefix)/ $(install) src/accredited/CNRS2-Grid-FR.info $(prefix)/ $(install) src/accredited/CNRS2-Grid-FR.namespaces $(prefix)/ $(install) src/accredited/CNRS2-Grid-FR.pem $(prefix)/ $(install) src/accredited/CNRS2-Grid-FR.signing_policy $(prefix)/ $(ln) -s CNRS2-Grid-FR.pem $(prefix)/d11f973e.0 $(ln) -s CNRS2-Grid-FR.pem $(prefix)/585d9326.0 $(ln) -s CNRS2-Grid-FR.signing_policy $(prefix)/d11f973e.signing_policy $(ln) -s CNRS2-Grid-FR.signing_policy $(prefix)/585d9326.signing_policy $(ln) -s CNRS2-Grid-FR.namespaces $(prefix)/d11f973e.namespaces $(ln) -s CNRS2-Grid-FR.namespaces $(prefix)/585d9326.namespaces CNRS2-Projets: prep $(install) src/accredited/CNRS2-Projets.crl_url $(prefix)/ $(install) src/accredited/CNRS2-Projets.info $(prefix)/ $(install) src/accredited/CNRS2-Projets.namespaces $(prefix)/ $(install) src/accredited/CNRS2-Projets.pem $(prefix)/ $(install) src/accredited/CNRS2-Projets.signing_policy $(prefix)/ $(ln) -s CNRS2-Projets.pem $(prefix)/09ff08b7.0 $(ln) -s CNRS2-Projets.pem $(prefix)/7022e3c4.0 $(ln) -s CNRS2-Projets.signing_policy $(prefix)/09ff08b7.signing_policy $(ln) -s CNRS2-Projets.signing_policy $(prefix)/7022e3c4.signing_policy $(ln) -s CNRS2-Projets.namespaces $(prefix)/09ff08b7.namespaces $(ln) -s CNRS2-Projets.namespaces $(prefix)/7022e3c4.namespaces COMODO-RSA-CA: prep $(install) src/accredited/COMODO-RSA-CA.crl_url $(prefix)/ $(install) src/accredited/COMODO-RSA-CA.info $(prefix)/ $(install) src/accredited/COMODO-RSA-CA.pem $(prefix)/ $(install) src/accredited/COMODO-RSA-CA.signing_policy $(prefix)/ $(ln) -s COMODO-RSA-CA.pem $(prefix)/d4c339cb.0 $(ln) -s COMODO-RSA-CA.pem $(prefix)/d6325660.0 $(ln) -s COMODO-RSA-CA.signing_policy $(prefix)/d4c339cb.signing_policy $(ln) -s COMODO-RSA-CA.signing_policy $(prefix)/d6325660.signing_policy CyGrid: prep $(ln) -s CyGrid.pem $(prefix)/afe55e66.0 $(ln) -s CyGrid.pem $(prefix)/83676c6b.0 CyGrid-old: prep $(ln) -s CyGrid-old.pem $(prefix)/84c1f123.0 $(ln) -s CyGrid-old.pem $(prefix)/f9030edd.0 DCAROOT-G1: prep $(install) src/accredited/DCAROOT-G1.crl_url $(prefix)/ $(install) src/accredited/DCAROOT-G1.info $(prefix)/ $(install) src/accredited/DCAROOT-G1.namespaces $(prefix)/ $(install) src/accredited/DCAROOT-G1.pem $(prefix)/ $(install) src/accredited/DCAROOT-G1.signing_policy $(prefix)/ $(ln) -s DCAROOT-G1.pem $(prefix)/728fa56d.0 $(ln) -s DCAROOT-G1.pem $(prefix)/87250dfa.0 $(ln) -s DCAROOT-G1.signing_policy $(prefix)/728fa56d.signing_policy $(ln) -s DCAROOT-G1.signing_policy $(prefix)/87250dfa.signing_policy $(ln) -s DCAROOT-G1.namespaces $(prefix)/728fa56d.namespaces $(ln) -s DCAROOT-G1.namespaces $(prefix)/87250dfa.namespaces DFN-GridGermany-Root: prep $(install) src/accredited/DFN-GridGermany-Root.crl_url $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.info $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.namespaces $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.pem $(prefix)/ $(install) src/accredited/DFN-GridGermany-Root.signing_policy $(prefix)/ $(ln) -s DFN-GridGermany-Root.pem $(prefix)/1149214e.0 $(ln) -s DFN-GridGermany-Root.pem $(prefix)/30ffc224.0 $(ln) -s DFN-GridGermany-Root.signing_policy $(prefix)/1149214e.signing_policy $(ln) -s DFN-GridGermany-Root.signing_policy $(prefix)/30ffc224.signing_policy $(ln) -s DFN-GridGermany-Root.namespaces $(prefix)/1149214e.namespaces $(ln) -s DFN-GridGermany-Root.namespaces $(prefix)/30ffc224.namespaces DFN-GridGermany-Server: prep $(ln) -s DFN-GridGermany-Server.pem $(prefix)/fe102e03.0 $(ln) -s DFN-GridGermany-Server.pem $(prefix)/26a9d0c4.0 DFN-GridGermany-User: prep $(ln) -s DFN-GridGermany-User.pem $(prefix)/34f8e29c.0 $(ln) -s DFN-GridGermany-User.pem $(prefix)/62fde260.0 DFN-SLCS: prep $(ln) -s DFN-SLCS.pem $(prefix)/a02131f7.0 $(ln) -s DFN-SLCS.pem $(prefix)/02a45931.0 DOEGrids: prep $(ln) -s DOEGrids.pem $(prefix)/1c3f2ca8.0 $(ln) -s DOEGrids.pem $(prefix)/12d0da68.0 DOESG-Root: prep $(ln) -s DOESG-Root.pem $(prefix)/6349a761.0 $(ln) -s DOESG-Root.pem $(prefix)/4a19b5af.0 DZeScience: prep $(install) src/accredited/DZeScience.crl_url $(prefix)/ $(install) src/accredited/DZeScience.info $(prefix)/ $(install) src/accredited/DZeScience.namespaces $(prefix)/ $(install) src/accredited/DZeScience.pem $(prefix)/ $(install) src/accredited/DZeScience.signing_policy $(prefix)/ $(ln) -s DZeScience.pem $(prefix)/0a49430a.0 $(ln) -s DZeScience.pem $(prefix)/fdf90b95.0 $(ln) -s DZeScience.signing_policy $(prefix)/0a49430a.signing_policy $(ln) -s DZeScience.signing_policy $(prefix)/fdf90b95.signing_policy $(ln) -s DZeScience.namespaces $(prefix)/0a49430a.namespaces $(ln) -s DZeScience.namespaces $(prefix)/fdf90b95.namespaces DarkMatterAssuredCA: prep $(install) src/accredited/DarkMatterAssuredCA.crl_url $(prefix)/ $(install) src/accredited/DarkMatterAssuredCA.info $(prefix)/ $(install) src/accredited/DarkMatterAssuredCA.namespaces $(prefix)/ $(install) src/accredited/DarkMatterAssuredCA.pem $(prefix)/ $(install) src/accredited/DarkMatterAssuredCA.signing_policy $(prefix)/ $(ln) -s DarkMatterAssuredCA.pem $(prefix)/f7f85117.0 $(ln) -s DarkMatterAssuredCA.pem $(prefix)/afcee918.0 $(ln) -s DarkMatterAssuredCA.signing_policy $(prefix)/f7f85117.signing_policy $(ln) -s DarkMatterAssuredCA.signing_policy $(prefix)/afcee918.signing_policy $(ln) -s DarkMatterAssuredCA.namespaces $(prefix)/f7f85117.namespaces $(ln) -s DarkMatterAssuredCA.namespaces $(prefix)/afcee918.namespaces DarkMatterIGTFCA: prep $(install) src/accredited/DarkMatterIGTFCA.crl_url $(prefix)/ $(install) src/accredited/DarkMatterIGTFCA.info $(prefix)/ $(install) src/accredited/DarkMatterIGTFCA.namespaces $(prefix)/ $(install) src/accredited/DarkMatterIGTFCA.pem $(prefix)/ $(install) src/accredited/DarkMatterIGTFCA.signing_policy $(prefix)/ $(ln) -s DarkMatterIGTFCA.pem $(prefix)/9dcd411f.0 $(ln) -s DarkMatterIGTFCA.pem $(prefix)/79007507.0 $(ln) -s DarkMatterIGTFCA.signing_policy $(prefix)/9dcd411f.signing_policy $(ln) -s DarkMatterIGTFCA.signing_policy $(prefix)/79007507.signing_policy $(ln) -s DarkMatterIGTFCA.namespaces $(prefix)/9dcd411f.namespaces $(ln) -s DarkMatterIGTFCA.namespaces $(prefix)/79007507.namespaces DarkMatterPrivateRootCAG4: prep $(install) src/accredited/DarkMatterPrivateRootCAG4.crl_url $(prefix)/ $(install) src/accredited/DarkMatterPrivateRootCAG4.info $(prefix)/ $(install) src/accredited/DarkMatterPrivateRootCAG4.namespaces $(prefix)/ $(install) src/accredited/DarkMatterPrivateRootCAG4.pem $(prefix)/ $(install) src/accredited/DarkMatterPrivateRootCAG4.signing_policy $(prefix)/ $(ln) -s DarkMatterPrivateRootCAG4.pem $(prefix)/13ba85c4.0 $(ln) -s DarkMatterPrivateRootCAG4.pem $(prefix)/e5b7222b.0 $(ln) -s DarkMatterPrivateRootCAG4.signing_policy $(prefix)/13ba85c4.signing_policy $(ln) -s DarkMatterPrivateRootCAG4.signing_policy $(prefix)/e5b7222b.signing_policy $(ln) -s DarkMatterPrivateRootCAG4.namespaces $(prefix)/13ba85c4.namespaces $(ln) -s DarkMatterPrivateRootCAG4.namespaces $(prefix)/e5b7222b.namespaces DarkMatterSecureCA: prep $(install) src/accredited/DarkMatterSecureCA.crl_url $(prefix)/ $(install) src/accredited/DarkMatterSecureCA.info $(prefix)/ $(install) src/accredited/DarkMatterSecureCA.namespaces $(prefix)/ $(install) src/accredited/DarkMatterSecureCA.pem $(prefix)/ $(install) src/accredited/DarkMatterSecureCA.signing_policy $(prefix)/ $(ln) -s DarkMatterSecureCA.pem $(prefix)/a69c3a14.0 $(ln) -s DarkMatterSecureCA.pem $(prefix)/ce7ecb5d.0 $(ln) -s DarkMatterSecureCA.signing_policy $(prefix)/a69c3a14.signing_policy $(ln) -s DarkMatterSecureCA.signing_policy $(prefix)/ce7ecb5d.signing_policy $(ln) -s DarkMatterSecureCA.namespaces $(prefix)/a69c3a14.namespaces $(ln) -s DarkMatterSecureCA.namespaces $(prefix)/ce7ecb5d.namespaces DigiCertAssuredIDRootCA-Root: prep $(install) src/accredited/DigiCertAssuredIDRootCA-Root.crl_url $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.info $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.namespaces $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.pem $(prefix)/ $(install) src/accredited/DigiCertAssuredIDRootCA-Root.signing_policy $(prefix)/ $(ln) -s DigiCertAssuredIDRootCA-Root.pem $(prefix)/69105f4f.0 $(ln) -s DigiCertAssuredIDRootCA-Root.pem $(prefix)/b1159c4c.0 $(ln) -s DigiCertAssuredIDRootCA-Root.signing_policy $(prefix)/69105f4f.signing_policy $(ln) -s DigiCertAssuredIDRootCA-Root.signing_policy $(prefix)/b1159c4c.signing_policy $(ln) -s DigiCertAssuredIDRootCA-Root.namespaces $(prefix)/69105f4f.namespaces $(ln) -s DigiCertAssuredIDRootCA-Root.namespaces $(prefix)/b1159c4c.namespaces DigiCertGridCA-1-Classic: prep $(install) src/accredited/DigiCertGridCA-1-Classic.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridCA-1-Classic.info $(prefix)/ $(install) src/accredited/DigiCertGridCA-1-Classic.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridCA-1-Classic.pem $(prefix)/ $(install) src/accredited/DigiCertGridCA-1-Classic.signing_policy $(prefix)/ $(ln) -s DigiCertGridCA-1-Classic.pem $(prefix)/c7a717ce.0 $(ln) -s DigiCertGridCA-1-Classic.pem $(prefix)/82c2b224.0 $(ln) -s DigiCertGridCA-1-Classic.signing_policy $(prefix)/c7a717ce.signing_policy $(ln) -s DigiCertGridCA-1-Classic.signing_policy $(prefix)/82c2b224.signing_policy $(ln) -s DigiCertGridCA-1-Classic.namespaces $(prefix)/c7a717ce.namespaces $(ln) -s DigiCertGridCA-1-Classic.namespaces $(prefix)/82c2b224.namespaces DigiCertGridCA-1G2-Classic: prep $(ln) -s DigiCertGridCA-1G2-Classic.pem $(prefix)/1cdf1cd9.0 $(ln) -s DigiCertGridCA-1G2-Classic.pem $(prefix)/6043c124.0 DigiCertGridCA-1G2-Classic-2015: prep $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.info $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.pem $(prefix)/ $(install) src/accredited/DigiCertGridCA-1G2-Classic-2015.signing_policy $(prefix)/ $(ln) -s DigiCertGridCA-1G2-Classic-2015.pem $(prefix)/8dd53007.0 $(ln) -s DigiCertGridCA-1G2-Classic-2015.pem $(prefix)/62c4a178.0 $(ln) -s DigiCertGridCA-1G2-Classic-2015.signing_policy $(prefix)/8dd53007.signing_policy $(ln) -s DigiCertGridCA-1G2-Classic-2015.signing_policy $(prefix)/62c4a178.signing_policy $(ln) -s DigiCertGridCA-1G2-Classic-2015.namespaces $(prefix)/8dd53007.namespaces $(ln) -s DigiCertGridCA-1G2-Classic-2015.namespaces $(prefix)/62c4a178.namespaces DigiCertGridRootCA-Root: prep $(install) src/accredited/DigiCertGridRootCA-Root.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.info $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.pem $(prefix)/ $(install) src/accredited/DigiCertGridRootCA-Root.signing_policy $(prefix)/ $(ln) -s DigiCertGridRootCA-Root.pem $(prefix)/2694e4f2.0 $(ln) -s DigiCertGridRootCA-Root.pem $(prefix)/74a04bb6.0 $(ln) -s DigiCertGridRootCA-Root.signing_policy $(prefix)/2694e4f2.signing_policy $(ln) -s DigiCertGridRootCA-Root.signing_policy $(prefix)/74a04bb6.signing_policy $(ln) -s DigiCertGridRootCA-Root.namespaces $(prefix)/2694e4f2.namespaces $(ln) -s DigiCertGridRootCA-Root.namespaces $(prefix)/74a04bb6.namespaces DigiCertGridTrustCA-Classic: prep $(install) src/accredited/DigiCertGridTrustCA-Classic.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridTrustCA-Classic.info $(prefix)/ $(install) src/accredited/DigiCertGridTrustCA-Classic.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridTrustCA-Classic.pem $(prefix)/ $(install) src/accredited/DigiCertGridTrustCA-Classic.signing_policy $(prefix)/ $(ln) -s DigiCertGridTrustCA-Classic.pem $(prefix)/38f7145f.0 $(ln) -s DigiCertGridTrustCA-Classic.pem $(prefix)/67707166.0 $(ln) -s DigiCertGridTrustCA-Classic.signing_policy $(prefix)/38f7145f.signing_policy $(ln) -s DigiCertGridTrustCA-Classic.signing_policy $(prefix)/67707166.signing_policy $(ln) -s DigiCertGridTrustCA-Classic.namespaces $(prefix)/38f7145f.namespaces $(ln) -s DigiCertGridTrustCA-Classic.namespaces $(prefix)/67707166.namespaces DigiCertGridTrustCAG2-Classic: prep $(install) src/accredited/DigiCertGridTrustCAG2-Classic.crl_url $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.info $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.pem $(prefix)/ $(install) src/accredited/DigiCertGridTrustCAG2-Classic.signing_policy $(prefix)/ $(ln) -s DigiCertGridTrustCAG2-Classic.pem $(prefix)/5d9ea26d.0 $(ln) -s DigiCertGridTrustCAG2-Classic.pem $(prefix)/bd43b60c.0 $(ln) -s DigiCertGridTrustCAG2-Classic.signing_policy $(prefix)/5d9ea26d.signing_policy $(ln) -s DigiCertGridTrustCAG2-Classic.signing_policy $(prefix)/bd43b60c.signing_policy $(ln) -s DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/5d9ea26d.namespaces $(ln) -s DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/bd43b60c.namespaces DutchDemo: prep $(ln) -s DutchDemo.pem $(prefix)/75304a28.0 $(ln) -s DutchDemo.pem $(prefix)/c38eda9c.0 EDG-Tutorial: prep $(ln) -s EDG-Tutorial.pem $(prefix)/225860ae.0 $(ln) -s EDG-Tutorial.pem $(prefix)/aa047366.0 EG-GRID: prep $(ln) -s EG-GRID.pem $(prefix)/4a96b1ea.0 $(ln) -s EG-GRID.pem $(prefix)/1b2e5552.0 ESnet: prep $(ln) -s ESnet.pem $(prefix)/d1b603c3.0 $(ln) -s ESnet.pem $(prefix)/0119347c.0 EstonianGrid: prep $(ln) -s EstonianGrid.pem $(prefix)/566bf40f.0 $(ln) -s EstonianGrid.pem $(prefix)/312a26c4.0 FNAL: prep $(ln) -s FNAL.pem $(prefix)/29021213.0 $(ln) -s FNAL.pem $(prefix)/db6306e9.0 FNAL-SLCS: prep $(ln) -s FNAL-SLCS.pem $(prefix)/99f9f5a3.0 $(ln) -s FNAL-SLCS.pem $(prefix)/f57f9e36.0 FNAL_KCA: prep $(ln) -s FNAL_KCA.pem $(prefix)/e1fce4e9.0 $(ln) -s FNAL_KCA.pem $(prefix)/c0f27cfa.0 GILDA-CA: prep $(ln) -s GILDA-CA.pem $(prefix)/90064a82.0 $(ln) -s GILDA-CA.pem $(prefix)/a47867ef.0 GILDA-CA-2011: prep $(ln) -s GILDA-CA-2011.pem $(prefix)/885cc27c.0 $(ln) -s GILDA-CA-2011.pem $(prefix)/6a13d748.0 GTE-CyberTrust-Global-Root: prep $(ln) -s GTE-CyberTrust-Global-Root.pem $(prefix)/4d654d1d.0 $(ln) -s GTE-CyberTrust-Global-Root.pem $(prefix)/c692a373.0 GermanGrid: prep $(install) src/accredited/GermanGrid.crl_url $(prefix)/ $(install) src/accredited/GermanGrid.info $(prefix)/ $(install) src/accredited/GermanGrid.namespaces $(prefix)/ $(install) src/accredited/GermanGrid.pem $(prefix)/ $(install) src/accredited/GermanGrid.signing_policy $(prefix)/ $(ln) -s GermanGrid.pem $(prefix)/dd4b34ea.0 $(ln) -s GermanGrid.pem $(prefix)/7ecb2657.0 $(ln) -s GermanGrid.signing_policy $(prefix)/dd4b34ea.signing_policy $(ln) -s GermanGrid.signing_policy $(prefix)/7ecb2657.signing_policy $(ln) -s GermanGrid.namespaces $(prefix)/dd4b34ea.namespaces $(ln) -s GermanGrid.namespaces $(prefix)/7ecb2657.namespaces Globus-CA-service: prep $(ln) -s Globus-CA-service.pem $(prefix)/b38b4d8c.0 $(ln) -s Globus-CA-service.pem $(prefix)/5dda73d8.0 Grid-Ireland: prep $(ln) -s Grid-Ireland.pem $(prefix)/1e43b9cc.0 $(ln) -s Grid-Ireland.pem $(prefix)/86dacba7.0 GridCanada: prep $(install) src/accredited/GridCanada.crl_url $(prefix)/ $(install) src/accredited/GridCanada.info $(prefix)/ $(install) src/accredited/GridCanada.namespaces $(prefix)/ $(install) src/accredited/GridCanada.pem $(prefix)/ $(install) src/accredited/GridCanada.signing_policy $(prefix)/ $(ln) -s GridCanada.pem $(prefix)/bffbd7d0.0 $(ln) -s GridCanada.pem $(prefix)/5d674a88.0 $(ln) -s GridCanada.signing_policy $(prefix)/bffbd7d0.signing_policy $(ln) -s GridCanada.signing_policy $(prefix)/5d674a88.signing_policy $(ln) -s GridCanada.namespaces $(prefix)/bffbd7d0.namespaces $(ln) -s GridCanada.namespaces $(prefix)/5d674a88.namespaces GridCanada-old: prep $(ln) -s GridCanada-old.pem $(prefix)/5f54f417.0 $(ln) -s GridCanada-old.pem $(prefix)/bb0d7db9.0 HIAST: prep $(ln) -s HIAST.pem $(prefix)/74c6eaeb.0 $(ln) -s HIAST.pem $(prefix)/bb01cea1.0 HKU: prep $(ln) -s HKU.pem $(prefix)/4798da47.0 $(ln) -s HKU.pem $(prefix)/03a1fa38.0 HKU-CA-2: prep $(install) src/accredited/HKU-CA-2.crl_url $(prefix)/ $(install) src/accredited/HKU-CA-2.info $(prefix)/ $(install) src/accredited/HKU-CA-2.namespaces $(prefix)/ $(install) src/accredited/HKU-CA-2.pem $(prefix)/ $(install) src/accredited/HKU-CA-2.signing_policy $(prefix)/ $(ln) -s HKU-CA-2.pem $(prefix)/a7b21b05.0 $(ln) -s HKU-CA-2.pem $(prefix)/368bc755.0 $(ln) -s HKU-CA-2.signing_policy $(prefix)/a7b21b05.signing_policy $(ln) -s HKU-CA-2.signing_policy $(prefix)/368bc755.signing_policy $(ln) -s HKU-CA-2.namespaces $(prefix)/a7b21b05.namespaces $(ln) -s HKU-CA-2.namespaces $(prefix)/368bc755.namespaces HPCI: prep $(install) src/accredited/HPCI.crl_url $(prefix)/ $(install) src/accredited/HPCI.info $(prefix)/ $(install) src/accredited/HPCI.namespaces $(prefix)/ $(install) src/accredited/HPCI.pem $(prefix)/ $(install) src/accredited/HPCI.signing_policy $(prefix)/ $(ln) -s HPCI.pem $(prefix)/30351739.0 $(ln) -s HPCI.pem $(prefix)/61cd35bd.0 $(ln) -s HPCI.signing_policy $(prefix)/30351739.signing_policy $(ln) -s HPCI.signing_policy $(prefix)/61cd35bd.signing_policy $(ln) -s HPCI.namespaces $(prefix)/30351739.namespaces $(ln) -s HPCI.namespaces $(prefix)/61cd35bd.namespaces HellasGrid: prep $(ln) -s HellasGrid.pem $(prefix)/ede78092.0 $(ln) -s HellasGrid.pem $(prefix)/f5f4639a.0 HellasGrid-CA-2006: prep $(ln) -s HellasGrid-CA-2006.pem $(prefix)/82b36fca.0 $(ln) -s HellasGrid-CA-2006.pem $(prefix)/c7a3bf7e.0 HellasGrid-CA-2016: prep $(install) src/accredited/HellasGrid-CA-2016.crl_url $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.info $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.namespaces $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.pem $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.signing_policy $(prefix)/ $(ln) -s HellasGrid-CA-2016.pem $(prefix)/f4cf8fb6.0 $(ln) -s HellasGrid-CA-2016.pem $(prefix)/7c27c6a1.0 $(ln) -s HellasGrid-CA-2016.signing_policy $(prefix)/f4cf8fb6.signing_policy $(ln) -s HellasGrid-CA-2016.signing_policy $(prefix)/7c27c6a1.signing_policy $(ln) -s HellasGrid-CA-2016.namespaces $(prefix)/f4cf8fb6.namespaces $(ln) -s HellasGrid-CA-2016.namespaces $(prefix)/7c27c6a1.namespaces HellasGrid-Root: prep $(ln) -s HellasGrid-Root.pem $(prefix)/28a58577.0 $(ln) -s HellasGrid-Root.pem $(prefix)/524cae41.0 IGCA: prep $(ln) -s IGCA.pem $(prefix)/da75f6a8.0 $(ln) -s IGCA.pem $(prefix)/60ef89df.0 IGCA2: prep $(install) src/accredited/IGCA2.crl_url $(prefix)/ $(install) src/accredited/IGCA2.info $(prefix)/ $(install) src/accredited/IGCA2.namespaces $(prefix)/ $(install) src/accredited/IGCA2.pem $(prefix)/ $(install) src/accredited/IGCA2.signing_policy $(prefix)/ $(ln) -s IGCA2.pem $(prefix)/2fc6b233.0 $(ln) -s IGCA2.pem $(prefix)/8fa17d52.0 $(ln) -s IGCA2.signing_policy $(prefix)/2fc6b233.signing_policy $(ln) -s IGCA2.signing_policy $(prefix)/8fa17d52.signing_policy $(ln) -s IGCA2.namespaces $(prefix)/2fc6b233.namespaces $(ln) -s IGCA2.namespaces $(prefix)/8fa17d52.namespaces IHEP: prep $(ln) -s IHEP.pem $(prefix)/ba2f39ca.0 $(ln) -s IHEP.pem $(prefix)/d3619baa.0 IHEP-2013: prep $(install) src/accredited/IHEP-2013.crl_url $(prefix)/ $(install) src/accredited/IHEP-2013.info $(prefix)/ $(install) src/accredited/IHEP-2013.namespaces $(prefix)/ $(install) src/accredited/IHEP-2013.pem $(prefix)/ $(install) src/accredited/IHEP-2013.signing_policy $(prefix)/ $(ln) -s IHEP-2013.pem $(prefix)/39d30eba.0 $(ln) -s IHEP-2013.pem $(prefix)/e7734335.0 $(ln) -s IHEP-2013.signing_policy $(prefix)/39d30eba.signing_policy $(ln) -s IHEP-2013.signing_policy $(prefix)/e7734335.signing_policy $(ln) -s IHEP-2013.namespaces $(prefix)/39d30eba.namespaces $(ln) -s IHEP-2013.namespaces $(prefix)/e7734335.namespaces INFN: prep $(ln) -s INFN.pem $(prefix)/49f18420.1 $(ln) -s INFN.pem $(prefix)/bc77a803.1 INFN-CA-2006: prep $(ln) -s INFN-CA-2006.pem $(prefix)/2f3fadf6.0 $(ln) -s INFN-CA-2006.pem $(prefix)/e580c4f9.0 INFN-CA-2015: prep $(install) src/accredited/INFN-CA-2015.crl_url $(prefix)/ $(install) src/accredited/INFN-CA-2015.info $(prefix)/ $(install) src/accredited/INFN-CA-2015.namespaces $(prefix)/ $(install) src/accredited/INFN-CA-2015.pem $(prefix)/ $(install) src/accredited/INFN-CA-2015.signing_policy $(prefix)/ $(ln) -s INFN-CA-2015.pem $(prefix)/49f18420.0 $(ln) -s INFN-CA-2015.pem $(prefix)/bc77a803.0 $(ln) -s INFN-CA-2015.signing_policy $(prefix)/49f18420.signing_policy $(ln) -s INFN-CA-2015.signing_policy $(prefix)/bc77a803.signing_policy $(ln) -s INFN-CA-2015.namespaces $(prefix)/49f18420.namespaces $(ln) -s INFN-CA-2015.namespaces $(prefix)/bc77a803.namespaces IRAN-GRID: prep $(ln) -s IRAN-GRID.pem $(prefix)/ce33db76.0 $(ln) -s IRAN-GRID.pem $(prefix)/d072977b.0 IRAN-GRID-G2: prep $(ln) -s IRAN-GRID-G2.pem $(prefix)/ee4dd5a3.0 $(ln) -s IRAN-GRID-G2.pem $(prefix)/41d9a8bd.0 IRAN-GRID-GCG-G2: prep $(install) src/accredited/IRAN-GRID-GCG-G2.crl_url $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.info $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.namespaces $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.pem $(prefix)/ $(install) src/accredited/IRAN-GRID-GCG-G2.signing_policy $(prefix)/ $(ln) -s IRAN-GRID-GCG-G2.pem $(prefix)/f8598272.0 $(ln) -s IRAN-GRID-GCG-G2.pem $(prefix)/63699217.0 $(ln) -s IRAN-GRID-GCG-G2.signing_policy $(prefix)/f8598272.signing_policy $(ln) -s IRAN-GRID-GCG-G2.signing_policy $(prefix)/63699217.signing_policy $(ln) -s IRAN-GRID-GCG-G2.namespaces $(prefix)/f8598272.namespaces $(ln) -s IRAN-GRID-GCG-G2.namespaces $(prefix)/63699217.namespaces IUCC: prep $(ln) -s IUCC.pem $(prefix)/6fee79b0.0 $(ln) -s IUCC.pem $(prefix)/bfafd1bd.0 InCommon-IGTF-Server-CA: prep $(install) src/accredited/InCommon-IGTF-Server-CA.crl_url $(prefix)/ $(install) src/accredited/InCommon-IGTF-Server-CA.info $(prefix)/ $(install) src/accredited/InCommon-IGTF-Server-CA.pem $(prefix)/ $(install) src/accredited/InCommon-IGTF-Server-CA.signing_policy $(prefix)/ $(ln) -s InCommon-IGTF-Server-CA.pem $(prefix)/f5f0dfc2.0 $(ln) -s InCommon-IGTF-Server-CA.pem $(prefix)/ba240aa8.0 $(ln) -s InCommon-IGTF-Server-CA.signing_policy $(prefix)/f5f0dfc2.signing_policy $(ln) -s InCommon-IGTF-Server-CA.signing_policy $(prefix)/ba240aa8.signing_policy InCommon-Server-CA: prep $(install) src/unaccredited/InCommon-Server-CA.crl_url $(prefix)/ $(install) src/unaccredited/InCommon-Server-CA.info $(prefix)/ $(install) src/unaccredited/InCommon-Server-CA.namespaces $(prefix)/ $(install) src/unaccredited/InCommon-Server-CA.pem $(prefix)/ $(install) src/unaccredited/InCommon-Server-CA.signing_policy $(prefix)/ $(ln) -s InCommon-Server-CA.pem $(prefix)/84df5188.0 $(ln) -s InCommon-Server-CA.pem $(prefix)/9ef5f911.0 $(ln) -s InCommon-Server-CA.signing_policy $(prefix)/84df5188.signing_policy $(ln) -s InCommon-Server-CA.signing_policy $(prefix)/9ef5f911.signing_policy $(ln) -s InCommon-Server-CA.namespaces $(prefix)/84df5188.namespaces $(ln) -s InCommon-Server-CA.namespaces $(prefix)/9ef5f911.namespaces JUnet-CA: prep $(ln) -s JUnet-CA.pem $(prefix)/b3222f9e.0 $(ln) -s JUnet-CA.pem $(prefix)/3154fd00.0 KEK: prep $(install) src/accredited/KEK.crl_url $(prefix)/ $(install) src/accredited/KEK.info $(prefix)/ $(install) src/accredited/KEK.namespaces $(prefix)/ $(install) src/accredited/KEK.pem $(prefix)/ $(install) src/accredited/KEK.signing_policy $(prefix)/ $(ln) -s KEK.pem $(prefix)/617ff41b.0 $(ln) -s KEK.pem $(prefix)/2f2f573f.0 $(ln) -s KEK.signing_policy $(prefix)/617ff41b.signing_policy $(ln) -s KEK.signing_policy $(prefix)/2f2f573f.signing_policy $(ln) -s KEK.namespaces $(prefix)/617ff41b.namespaces $(ln) -s KEK.namespaces $(prefix)/2f2f573f.namespaces KENETCA-ICA-2015: prep $(install) src/accredited/KENETCA-ICA-2015.crl_url $(prefix)/ $(install) src/accredited/KENETCA-ICA-2015.info $(prefix)/ $(install) src/accredited/KENETCA-ICA-2015.pem $(prefix)/ $(install) src/accredited/KENETCA-ICA-2015.signing_policy $(prefix)/ $(ln) -s KENETCA-ICA-2015.pem $(prefix)/3cc00941.0 $(ln) -s KENETCA-ICA-2015.pem $(prefix)/68aa9d51.0 $(ln) -s KENETCA-ICA-2015.signing_policy $(prefix)/3cc00941.signing_policy $(ln) -s KENETCA-ICA-2015.signing_policy $(prefix)/68aa9d51.signing_policy KENETROOTCA: prep $(install) src/accredited/KENETROOTCA.crl_url $(prefix)/ $(install) src/accredited/KENETROOTCA.info $(prefix)/ $(install) src/accredited/KENETROOTCA.namespaces $(prefix)/ $(install) src/accredited/KENETROOTCA.pem $(prefix)/ $(install) src/accredited/KENETROOTCA.signing_policy $(prefix)/ $(ln) -s KENETROOTCA.pem $(prefix)/78351451.0 $(ln) -s KENETROOTCA.pem $(prefix)/23c77840.0 $(ln) -s KENETROOTCA.signing_policy $(prefix)/78351451.signing_policy $(ln) -s KENETROOTCA.signing_policy $(prefix)/23c77840.signing_policy $(ln) -s KENETROOTCA.namespaces $(prefix)/78351451.namespaces $(ln) -s KENETROOTCA.namespaces $(prefix)/23c77840.namespaces KISTI-2007: prep $(ln) -s KISTI-2007.pem $(prefix)/722e5071.0 $(ln) -s KISTI-2007.pem $(prefix)/9036db5e.0 KISTIv3: prep $(install) src/accredited/KISTIv3.crl_url $(prefix)/ $(install) src/accredited/KISTIv3.info $(prefix)/ $(install) src/accredited/KISTIv3.namespaces $(prefix)/ $(install) src/accredited/KISTIv3.pem $(prefix)/ $(install) src/accredited/KISTIv3.signing_policy $(prefix)/ $(ln) -s KISTIv3.pem $(prefix)/06769ccd.0 $(ln) -s KISTIv3.pem $(prefix)/ead666c8.0 $(ln) -s KISTIv3.signing_policy $(prefix)/06769ccd.signing_policy $(ln) -s KISTIv3.signing_policy $(prefix)/ead666c8.signing_policy $(ln) -s KISTIv3.namespaces $(prefix)/06769ccd.namespaces $(ln) -s KISTIv3.namespaces $(prefix)/ead666c8.namespaces LACGridCA: prep $(ln) -s LACGridCA.pem $(prefix)/a9082267.0 $(ln) -s LACGridCA.pem $(prefix)/719a853d.0 LIP: prep $(ln) -s LIP.pem $(prefix)/41380387.0 $(ln) -s LIP.pem $(prefix)/301f6daa.0 LIPCA: prep $(install) src/accredited/LIPCA.crl_url $(prefix)/ $(install) src/accredited/LIPCA.info $(prefix)/ $(install) src/accredited/LIPCA.namespaces $(prefix)/ $(install) src/accredited/LIPCA.pem $(prefix)/ $(install) src/accredited/LIPCA.signing_policy $(prefix)/ $(ln) -s LIPCA.pem $(prefix)/11b4a5a2.0 $(ln) -s LIPCA.pem $(prefix)/be87b272.0 $(ln) -s LIPCA.signing_policy $(prefix)/11b4a5a2.signing_policy $(ln) -s LIPCA.signing_policy $(prefix)/be87b272.signing_policy $(ln) -s LIPCA.namespaces $(prefix)/11b4a5a2.namespaces $(ln) -s LIPCA.namespaces $(prefix)/be87b272.namespaces MARGI: prep $(install) src/accredited/MARGI.crl_url $(prefix)/ $(install) src/accredited/MARGI.info $(prefix)/ $(install) src/accredited/MARGI.namespaces $(prefix)/ $(install) src/accredited/MARGI.pem $(prefix)/ $(install) src/accredited/MARGI.signing_policy $(prefix)/ $(ln) -s MARGI.pem $(prefix)/7d0d064a.0 $(ln) -s MARGI.pem $(prefix)/1e4f9475.0 $(ln) -s MARGI.signing_policy $(prefix)/7d0d064a.signing_policy $(ln) -s MARGI.signing_policy $(prefix)/1e4f9475.signing_policy $(ln) -s MARGI.namespaces $(prefix)/7d0d064a.namespaces $(ln) -s MARGI.namespaces $(prefix)/1e4f9475.namespaces MD-Grid: prep $(ln) -s MD-Grid.pem $(prefix)/9ff26ea4.0 $(ln) -s MD-Grid.pem $(prefix)/07397040.0 MD-Grid-CA-T: prep $(install) src/accredited/MD-Grid-CA-T.crl_url $(prefix)/ $(install) src/accredited/MD-Grid-CA-T.info $(prefix)/ $(install) src/accredited/MD-Grid-CA-T.namespaces $(prefix)/ $(install) src/accredited/MD-Grid-CA-T.pem $(prefix)/ $(install) src/accredited/MD-Grid-CA-T.signing_policy $(prefix)/ $(ln) -s MD-Grid-CA-T.pem $(prefix)/a2dbd20c.0 $(ln) -s MD-Grid-CA-T.pem $(prefix)/4c3ad332.0 $(ln) -s MD-Grid-CA-T.signing_policy $(prefix)/a2dbd20c.signing_policy $(ln) -s MD-Grid-CA-T.signing_policy $(prefix)/4c3ad332.signing_policy $(ln) -s MD-Grid-CA-T.namespaces $(prefix)/a2dbd20c.namespaces $(ln) -s MD-Grid-CA-T.namespaces $(prefix)/4c3ad332.namespaces MREN-CA: prep $(install) src/accredited/MREN-CA.crl_url $(prefix)/ $(install) src/accredited/MREN-CA.info $(prefix)/ $(install) src/accredited/MREN-CA.namespaces $(prefix)/ $(install) src/accredited/MREN-CA.pem $(prefix)/ $(install) src/accredited/MREN-CA.signing_policy $(prefix)/ $(ln) -s MREN-CA.pem $(prefix)/3232b9bc.0 $(ln) -s MREN-CA.pem $(prefix)/56084620.0 $(ln) -s MREN-CA.signing_policy $(prefix)/3232b9bc.signing_policy $(ln) -s MREN-CA.signing_policy $(prefix)/56084620.signing_policy $(ln) -s MREN-CA.namespaces $(prefix)/3232b9bc.namespaces $(ln) -s MREN-CA.namespaces $(prefix)/56084620.namespaces MYIFAM: prep $(install) src/accredited/MYIFAM.crl_url $(prefix)/ $(install) src/accredited/MYIFAM.info $(prefix)/ $(install) src/accredited/MYIFAM.namespaces $(prefix)/ $(install) src/accredited/MYIFAM.pem $(prefix)/ $(install) src/accredited/MYIFAM.signing_policy $(prefix)/ $(ln) -s MYIFAM.pem $(prefix)/d33760ec.0 $(ln) -s MYIFAM.pem $(prefix)/58b08cb5.0 $(ln) -s MYIFAM.signing_policy $(prefix)/d33760ec.signing_policy $(ln) -s MYIFAM.signing_policy $(prefix)/58b08cb5.signing_policy $(ln) -s MYIFAM.namespaces $(prefix)/d33760ec.namespaces $(ln) -s MYIFAM.namespaces $(prefix)/58b08cb5.namespaces MaGrid: prep $(install) src/accredited/MaGrid.crl_url $(prefix)/ $(install) src/accredited/MaGrid.info $(prefix)/ $(install) src/accredited/MaGrid.namespaces $(prefix)/ $(install) src/accredited/MaGrid.pem $(prefix)/ $(install) src/accredited/MaGrid.signing_policy $(prefix)/ $(ln) -s MaGrid.pem $(prefix)/7b54708e.0 $(ln) -s MaGrid.pem $(prefix)/4ce1cf99.0 $(ln) -s MaGrid.signing_policy $(prefix)/7b54708e.signing_policy $(ln) -s MaGrid.signing_policy $(prefix)/4ce1cf99.signing_policy $(ln) -s MaGrid.namespaces $(prefix)/7b54708e.namespaces $(ln) -s MaGrid.namespaces $(prefix)/4ce1cf99.namespaces NAREGI: prep $(ln) -s NAREGI.pem $(prefix)/a87d9192.0 $(ln) -s NAREGI.pem $(prefix)/5a68802a.0 NCHC: prep $(ln) -s NCHC.pem $(prefix)/71a89a47.0 $(ln) -s NCHC.pem $(prefix)/2c0df5ae.0 NCSA-mics: prep $(ln) -s NCSA-mics.pem $(prefix)/9b95bbf2.0 $(ln) -s NCSA-mics.pem $(prefix)/5bb7d63e.0 NCSA-slcs: prep $(ln) -s NCSA-slcs.pem $(prefix)/f2e89fe3.0 $(ln) -s NCSA-slcs.pem $(prefix)/d492aff2.0 NCSA-slcs-2013: prep $(install) src/accredited/NCSA-slcs-2013.crl_url $(prefix)/ $(install) src/accredited/NCSA-slcs-2013.info $(prefix)/ $(install) src/accredited/NCSA-slcs-2013.namespaces $(prefix)/ $(install) src/accredited/NCSA-slcs-2013.pem $(prefix)/ $(install) src/accredited/NCSA-slcs-2013.signing_policy $(prefix)/ $(ln) -s NCSA-slcs-2013.pem $(prefix)/c36f6349.0 $(ln) -s NCSA-slcs-2013.pem $(prefix)/7aa2b7bd.0 $(ln) -s NCSA-slcs-2013.signing_policy $(prefix)/c36f6349.signing_policy $(ln) -s NCSA-slcs-2013.signing_policy $(prefix)/7aa2b7bd.signing_policy $(ln) -s NCSA-slcs-2013.namespaces $(prefix)/c36f6349.namespaces $(ln) -s NCSA-slcs-2013.namespaces $(prefix)/7aa2b7bd.namespaces NCSA-tfca: prep $(ln) -s NCSA-tfca.pem $(prefix)/679cff61.0 $(ln) -s NCSA-tfca.pem $(prefix)/9c3efee6.0 NCSA-tfca-2013: prep $(install) src/accredited/NCSA-tfca-2013.crl_url $(prefix)/ $(install) src/accredited/NCSA-tfca-2013.info $(prefix)/ $(install) src/accredited/NCSA-tfca-2013.namespaces $(prefix)/ $(install) src/accredited/NCSA-tfca-2013.pem $(prefix)/ $(install) src/accredited/NCSA-tfca-2013.signing_policy $(prefix)/ $(ln) -s NCSA-tfca-2013.pem $(prefix)/ca157cee.0 $(ln) -s NCSA-tfca-2013.pem $(prefix)/48c8f10a.0 $(ln) -s NCSA-tfca-2013.signing_policy $(prefix)/ca157cee.signing_policy $(ln) -s NCSA-tfca-2013.signing_policy $(prefix)/48c8f10a.signing_policy $(ln) -s NCSA-tfca-2013.namespaces $(prefix)/ca157cee.namespaces $(ln) -s NCSA-tfca-2013.namespaces $(prefix)/48c8f10a.namespaces NECTEC: prep $(ln) -s NECTEC.pem $(prefix)/8a047de1.0 $(ln) -s NECTEC.pem $(prefix)/3839294d.0 NERSC-SLCS: prep $(install) src/accredited/NERSC-SLCS.crl_url $(prefix)/ $(install) src/accredited/NERSC-SLCS.info $(prefix)/ $(install) src/accredited/NERSC-SLCS.namespaces $(prefix)/ $(install) src/accredited/NERSC-SLCS.pem $(prefix)/ $(install) src/accredited/NERSC-SLCS.signing_policy $(prefix)/ $(ln) -s NERSC-SLCS.pem $(prefix)/b93d6240.0 $(ln) -s NERSC-SLCS.pem $(prefix)/20b7db76.0 $(ln) -s NERSC-SLCS.signing_policy $(prefix)/b93d6240.signing_policy $(ln) -s NERSC-SLCS.signing_policy $(prefix)/20b7db76.signing_policy $(ln) -s NERSC-SLCS.namespaces $(prefix)/b93d6240.namespaces $(ln) -s NERSC-SLCS.namespaces $(prefix)/20b7db76.namespaces NGO-Netrust: prep $(ln) -s NGO-Netrust.pem $(prefix)/d1737728.0 $(ln) -s NGO-Netrust.pem $(prefix)/290da661.0 NICS-MyProxy: prep $(ln) -s NICS-MyProxy.pem $(prefix)/dc75341f.0 $(ln) -s NICS-MyProxy.pem $(prefix)/dfcb9731.0 NIIF: prep $(ln) -s NIIF.pem $(prefix)/cc800af0.0 $(ln) -s NIIF.pem $(prefix)/1e3261e6.0 NIIF-Root-CA-2: prep $(install) src/accredited/NIIF-Root-CA-2.crl_url $(prefix)/ $(install) src/accredited/NIIF-Root-CA-2.info $(prefix)/ $(install) src/accredited/NIIF-Root-CA-2.namespaces $(prefix)/ $(install) src/accredited/NIIF-Root-CA-2.pem $(prefix)/ $(install) src/accredited/NIIF-Root-CA-2.signing_policy $(prefix)/ $(ln) -s NIIF-Root-CA-2.pem $(prefix)/58435df6.0 $(ln) -s NIIF-Root-CA-2.pem $(prefix)/072977ca.0 $(ln) -s NIIF-Root-CA-2.signing_policy $(prefix)/58435df6.signing_policy $(ln) -s NIIF-Root-CA-2.signing_policy $(prefix)/072977ca.signing_policy $(ln) -s NIIF-Root-CA-2.namespaces $(prefix)/58435df6.namespaces $(ln) -s NIIF-Root-CA-2.namespaces $(prefix)/072977ca.namespaces NIKHEF: prep $(install) src/accredited/NIKHEF.crl_url $(prefix)/ $(install) src/accredited/NIKHEF.info $(prefix)/ $(install) src/accredited/NIKHEF.namespaces $(prefix)/ $(install) src/accredited/NIKHEF.pem $(prefix)/ $(install) src/accredited/NIKHEF.signing_policy $(prefix)/ $(ln) -s NIKHEF.pem $(prefix)/16da7552.0 $(ln) -s NIKHEF.pem $(prefix)/dfb080e4.0 $(ln) -s NIKHEF.signing_policy $(prefix)/16da7552.signing_policy $(ln) -s NIKHEF.signing_policy $(prefix)/dfb080e4.signing_policy $(ln) -s NIKHEF.namespaces $(prefix)/16da7552.namespaces $(ln) -s NIKHEF.namespaces $(prefix)/dfb080e4.namespaces NorduGrid: prep $(ln) -s NorduGrid.pem $(prefix)/1f0e8352.0 $(ln) -s NorduGrid.pem $(prefix)/d0cd0b27.0 NorduGrid-2015: prep $(install) src/accredited/NorduGrid-2015.crl_url $(prefix)/ $(install) src/accredited/NorduGrid-2015.info $(prefix)/ $(install) src/accredited/NorduGrid-2015.namespaces $(prefix)/ $(install) src/accredited/NorduGrid-2015.pem $(prefix)/ $(install) src/accredited/NorduGrid-2015.signing_policy $(prefix)/ $(ln) -s NorduGrid-2015.pem $(prefix)/2f2e0e6e.0 $(ln) -s NorduGrid-2015.pem $(prefix)/a3e2dbca.0 $(ln) -s NorduGrid-2015.signing_policy $(prefix)/2f2e0e6e.signing_policy $(ln) -s NorduGrid-2015.signing_policy $(prefix)/a3e2dbca.signing_policy $(ln) -s NorduGrid-2015.namespaces $(prefix)/2f2e0e6e.namespaces $(ln) -s NorduGrid-2015.namespaces $(prefix)/a3e2dbca.namespaces PK-Grid: prep $(ln) -s PK-Grid.pem $(prefix)/d2a353a5.0 $(ln) -s PK-Grid.pem $(prefix)/442cb97d.0 PK-Grid-2007: prep $(install) src/accredited/PK-Grid-2007.crl_url $(prefix)/ $(install) src/accredited/PK-Grid-2007.info $(prefix)/ $(install) src/accredited/PK-Grid-2007.namespaces $(prefix)/ $(install) src/accredited/PK-Grid-2007.pem $(prefix)/ $(install) src/accredited/PK-Grid-2007.signing_policy $(prefix)/ $(ln) -s PK-Grid-2007.pem $(prefix)/f5ead794.0 $(ln) -s PK-Grid-2007.pem $(prefix)/18700496.0 $(ln) -s PK-Grid-2007.signing_policy $(prefix)/f5ead794.signing_policy $(ln) -s PK-Grid-2007.signing_policy $(prefix)/18700496.signing_policy $(ln) -s PK-Grid-2007.namespaces $(prefix)/f5ead794.namespaces $(ln) -s PK-Grid-2007.namespaces $(prefix)/18700496.namespaces PKIUNAMgrid: prep $(install) src/accredited/PKIUNAMgrid.crl_url $(prefix)/ $(install) src/accredited/PKIUNAMgrid.info $(prefix)/ $(install) src/accredited/PKIUNAMgrid.namespaces $(prefix)/ $(install) src/accredited/PKIUNAMgrid.pem $(prefix)/ $(install) src/accredited/PKIUNAMgrid.signing_policy $(prefix)/ $(ln) -s PKIUNAMgrid.pem $(prefix)/8f016f43.0 $(ln) -s PKIUNAMgrid.pem $(prefix)/d0a33f8e.0 $(ln) -s PKIUNAMgrid.signing_policy $(prefix)/8f016f43.signing_policy $(ln) -s PKIUNAMgrid.signing_policy $(prefix)/d0a33f8e.signing_policy $(ln) -s PKIUNAMgrid.namespaces $(prefix)/8f016f43.namespaces $(ln) -s PKIUNAMgrid.namespaces $(prefix)/d0a33f8e.namespaces PRAGMA-UCSD: prep $(ln) -s PRAGMA-UCSD.pem $(prefix)/7721d4d3.0 $(ln) -s PRAGMA-UCSD.pem $(prefix)/2376bd8e.0 PSC-Myproxy-CA: prep $(install) src/accredited/PSC-Myproxy-CA.crl_url $(prefix)/ $(install) src/accredited/PSC-Myproxy-CA.info $(prefix)/ $(install) src/accredited/PSC-Myproxy-CA.namespaces $(prefix)/ $(install) src/accredited/PSC-Myproxy-CA.pem $(prefix)/ $(install) src/accredited/PSC-Myproxy-CA.signing_policy $(prefix)/ $(ln) -s PSC-Myproxy-CA.pem $(prefix)/4b2783ac.0 $(ln) -s PSC-Myproxy-CA.pem $(prefix)/7f4db168.0 $(ln) -s PSC-Myproxy-CA.signing_policy $(prefix)/4b2783ac.signing_policy $(ln) -s PSC-Myproxy-CA.signing_policy $(prefix)/7f4db168.signing_policy $(ln) -s PSC-Myproxy-CA.namespaces $(prefix)/4b2783ac.namespaces $(ln) -s PSC-Myproxy-CA.namespaces $(prefix)/7f4db168.namespaces PolishGrid: prep $(install) src/accredited/PolishGrid.crl_url $(prefix)/ $(install) src/accredited/PolishGrid.info $(prefix)/ $(install) src/accredited/PolishGrid.namespaces $(prefix)/ $(install) src/accredited/PolishGrid.pem $(prefix)/ $(install) src/accredited/PolishGrid.signing_policy $(prefix)/ $(ln) -s PolishGrid.pem $(prefix)/8a661490.0 $(ln) -s PolishGrid.pem $(prefix)/03b260e0.0 $(ln) -s PolishGrid.signing_policy $(prefix)/8a661490.signing_policy $(ln) -s PolishGrid.signing_policy $(prefix)/03b260e0.signing_policy $(ln) -s PolishGrid.namespaces $(prefix)/8a661490.namespaces $(ln) -s PolishGrid.namespaces $(prefix)/03b260e0.namespaces PolishGrid-2019: prep $(install) src/accredited/PolishGrid-2019.crl_url $(prefix)/ $(install) src/accredited/PolishGrid-2019.info $(prefix)/ $(install) src/accredited/PolishGrid-2019.namespaces $(prefix)/ $(install) src/accredited/PolishGrid-2019.pem $(prefix)/ $(install) src/accredited/PolishGrid-2019.signing_policy $(prefix)/ $(ln) -s PolishGrid-2019.pem $(prefix)/8c74f281.0 $(ln) -s PolishGrid-2019.pem $(prefix)/4ba9a797.0 $(ln) -s PolishGrid-2019.signing_policy $(prefix)/8c74f281.signing_policy $(ln) -s PolishGrid-2019.signing_policy $(prefix)/4ba9a797.signing_policy $(ln) -s PolishGrid-2019.namespaces $(prefix)/8c74f281.namespaces $(ln) -s PolishGrid-2019.namespaces $(prefix)/4ba9a797.namespaces QuoVadis-Grid-ICA: prep $(ln) -s QuoVadis-Grid-ICA.pem $(prefix)/e72045ce.0 $(ln) -s QuoVadis-Grid-ICA.pem $(prefix)/d800b164.0 QuoVadis-Grid-ICA-G2: prep $(install) src/accredited/QuoVadis-Grid-ICA-G2.crl_url $(prefix)/ $(install) src/accredited/QuoVadis-Grid-ICA-G2.info $(prefix)/ $(install) src/accredited/QuoVadis-Grid-ICA-G2.pem $(prefix)/ $(install) src/accredited/QuoVadis-Grid-ICA-G2.signing_policy $(prefix)/ $(ln) -s QuoVadis-Grid-ICA-G2.pem $(prefix)/633dc6a4.0 $(ln) -s QuoVadis-Grid-ICA-G2.pem $(prefix)/e91bd360.0 $(ln) -s QuoVadis-Grid-ICA-G2.signing_policy $(prefix)/633dc6a4.signing_policy $(ln) -s QuoVadis-Grid-ICA-G2.signing_policy $(prefix)/e91bd360.signing_policy QuoVadis-Root-CA1: prep $(install) src/accredited/QuoVadis-Root-CA1.crl_url $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA1.info $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA1.namespaces $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA1.pem $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA1.signing_policy $(prefix)/ $(ln) -s QuoVadis-Root-CA1.pem $(prefix)/5cf9d536.0 $(ln) -s QuoVadis-Root-CA1.pem $(prefix)/080911ac.0 $(ln) -s QuoVadis-Root-CA1.signing_policy $(prefix)/5cf9d536.signing_policy $(ln) -s QuoVadis-Root-CA1.signing_policy $(prefix)/080911ac.signing_policy $(ln) -s QuoVadis-Root-CA1.namespaces $(prefix)/5cf9d536.namespaces $(ln) -s QuoVadis-Root-CA1.namespaces $(prefix)/080911ac.namespaces QuoVadis-Root-CA2: prep $(install) src/accredited/QuoVadis-Root-CA2.crl_url $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2.info $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2.namespaces $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2.pem $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2.signing_policy $(prefix)/ $(ln) -s QuoVadis-Root-CA2.pem $(prefix)/7a819ef2.0 $(ln) -s QuoVadis-Root-CA2.pem $(prefix)/d7e8dc79.0 $(ln) -s QuoVadis-Root-CA2.signing_policy $(prefix)/7a819ef2.signing_policy $(ln) -s QuoVadis-Root-CA2.signing_policy $(prefix)/d7e8dc79.signing_policy $(ln) -s QuoVadis-Root-CA2.namespaces $(prefix)/7a819ef2.namespaces $(ln) -s QuoVadis-Root-CA2.namespaces $(prefix)/d7e8dc79.namespaces QuoVadis-Root-CA2G3: prep $(install) src/accredited/QuoVadis-Root-CA2G3.crl_url $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2G3.info $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2G3.namespaces $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2G3.pem $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA2G3.signing_policy $(prefix)/ $(ln) -s QuoVadis-Root-CA2G3.pem $(prefix)/1f58a078.0 $(ln) -s QuoVadis-Root-CA2G3.pem $(prefix)/064e0aa9.0 $(ln) -s QuoVadis-Root-CA2G3.signing_policy $(prefix)/1f58a078.signing_policy $(ln) -s QuoVadis-Root-CA2G3.signing_policy $(prefix)/064e0aa9.signing_policy $(ln) -s QuoVadis-Root-CA2G3.namespaces $(prefix)/1f58a078.namespaces $(ln) -s QuoVadis-Root-CA2G3.namespaces $(prefix)/064e0aa9.namespaces QuoVadis-Root-CA3G3: prep $(install) src/accredited/QuoVadis-Root-CA3G3.crl_url $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA3G3.info $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA3G3.namespaces $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA3G3.pem $(prefix)/ $(install) src/accredited/QuoVadis-Root-CA3G3.signing_policy $(prefix)/ $(ln) -s QuoVadis-Root-CA3G3.pem $(prefix)/e442e424.0 $(ln) -s QuoVadis-Root-CA3G3.pem $(prefix)/e18bfb83.0 $(ln) -s QuoVadis-Root-CA3G3.signing_policy $(prefix)/e442e424.signing_policy $(ln) -s QuoVadis-Root-CA3G3.signing_policy $(prefix)/e18bfb83.signing_policy $(ln) -s QuoVadis-Root-CA3G3.namespaces $(prefix)/e442e424.namespaces $(ln) -s QuoVadis-Root-CA3G3.namespaces $(prefix)/e18bfb83.namespaces RCauth-Pilot-ICA-G1: prep $(install) src/accredited/RCauth-Pilot-ICA-G1.crl_url $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.info $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.namespaces $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.pem $(prefix)/ $(install) src/accredited/RCauth-Pilot-ICA-G1.signing_policy $(prefix)/ $(ln) -s RCauth-Pilot-ICA-G1.pem $(prefix)/ab2371fe.0 $(ln) -s RCauth-Pilot-ICA-G1.pem $(prefix)/5f40742a.0 $(ln) -s RCauth-Pilot-ICA-G1.signing_policy $(prefix)/ab2371fe.signing_policy $(ln) -s RCauth-Pilot-ICA-G1.signing_policy $(prefix)/5f40742a.signing_policy $(ln) -s RCauth-Pilot-ICA-G1.namespaces $(prefix)/ab2371fe.namespaces $(ln) -s RCauth-Pilot-ICA-G1.namespaces $(prefix)/5f40742a.namespaces RDIG: prep $(install) src/accredited/RDIG.crl_url $(prefix)/ $(install) src/accredited/RDIG.info $(prefix)/ $(install) src/accredited/RDIG.namespaces $(prefix)/ $(install) src/accredited/RDIG.pem $(prefix)/ $(install) src/accredited/RDIG.signing_policy $(prefix)/ $(ln) -s RDIG.pem $(prefix)/55994d72.0 $(ln) -s RDIG.pem $(prefix)/94b468c6.0 $(ln) -s RDIG.signing_policy $(prefix)/55994d72.signing_policy $(ln) -s RDIG.signing_policy $(prefix)/94b468c6.signing_policy $(ln) -s RDIG.namespaces $(prefix)/55994d72.namespaces $(ln) -s RDIG.namespaces $(prefix)/94b468c6.namespaces REUNA-ca: prep $(install) src/accredited/REUNA-ca.crl_url $(prefix)/ $(install) src/accredited/REUNA-ca.info $(prefix)/ $(install) src/accredited/REUNA-ca.namespaces $(prefix)/ $(install) src/accredited/REUNA-ca.pem $(prefix)/ $(install) src/accredited/REUNA-ca.signing_policy $(prefix)/ $(ln) -s REUNA-ca.pem $(prefix)/295adc19.0 $(ln) -s REUNA-ca.pem $(prefix)/089450c2.0 $(ln) -s REUNA-ca.signing_policy $(prefix)/295adc19.signing_policy $(ln) -s REUNA-ca.signing_policy $(prefix)/089450c2.signing_policy $(ln) -s REUNA-ca.namespaces $(prefix)/295adc19.namespaces $(ln) -s REUNA-ca.namespaces $(prefix)/089450c2.namespaces RMKI: prep $(ln) -s RMKI.pem $(prefix)/5e5501f3.0 $(ln) -s RMKI.pem $(prefix)/c378699c.0 RomanianGRID: prep $(install) src/accredited/RomanianGRID.crl_url $(prefix)/ $(install) src/accredited/RomanianGRID.info $(prefix)/ $(install) src/accredited/RomanianGRID.namespaces $(prefix)/ $(install) src/accredited/RomanianGRID.pem $(prefix)/ $(install) src/accredited/RomanianGRID.signing_policy $(prefix)/ $(ln) -s RomanianGRID.pem $(prefix)/1f3834d0.0 $(ln) -s RomanianGRID.pem $(prefix)/18bc5b05.0 $(ln) -s RomanianGRID.signing_policy $(prefix)/1f3834d0.signing_policy $(ln) -s RomanianGRID.signing_policy $(prefix)/18bc5b05.signing_policy $(ln) -s RomanianGRID.namespaces $(prefix)/1f3834d0.namespaces $(ln) -s RomanianGRID.namespaces $(prefix)/18bc5b05.namespaces Russia: prep $(ln) -s Russia.pem $(prefix)/d64ccb53.0 $(ln) -s Russia.pem $(prefix)/d701b1d0.0 SDG: prep $(ln) -s SDG.pem $(prefix)/c48c63f3.0 $(ln) -s SDG.pem $(prefix)/25694cc4.0 SDG-G2: prep $(install) src/accredited/SDG-G2.crl_url $(prefix)/ $(install) src/accredited/SDG-G2.info $(prefix)/ $(install) src/accredited/SDG-G2.namespaces $(prefix)/ $(install) src/accredited/SDG-G2.pem $(prefix)/ $(install) src/accredited/SDG-G2.signing_policy $(prefix)/ $(ln) -s SDG-G2.pem $(prefix)/c1e29225.0 $(ln) -s SDG-G2.pem $(prefix)/77637f58.0 $(ln) -s SDG-G2.signing_policy $(prefix)/c1e29225.signing_policy $(ln) -s SDG-G2.signing_policy $(prefix)/77637f58.signing_policy $(ln) -s SDG-G2.namespaces $(prefix)/c1e29225.namespaces $(ln) -s SDG-G2.namespaces $(prefix)/77637f58.namespaces SEE-GRID: prep $(ln) -s SEE-GRID.pem $(prefix)/468d15b3.0 $(ln) -s SEE-GRID.pem $(prefix)/dd51b42a.0 SRCE: prep $(install) src/accredited/SRCE.crl_url $(prefix)/ $(install) src/accredited/SRCE.info $(prefix)/ $(install) src/accredited/SRCE.namespaces $(prefix)/ $(install) src/accredited/SRCE.pem $(prefix)/ $(install) src/accredited/SRCE.signing_policy $(prefix)/ $(ln) -s SRCE.pem $(prefix)/ff94d436.0 $(ln) -s SRCE.pem $(prefix)/0e635db3.0 $(ln) -s SRCE.signing_policy $(prefix)/ff94d436.signing_policy $(ln) -s SRCE.signing_policy $(prefix)/0e635db3.signing_policy $(ln) -s SRCE.namespaces $(prefix)/ff94d436.namespaces $(ln) -s SRCE.namespaces $(prefix)/0e635db3.namespaces SWITCH: prep $(ln) -s SWITCH.pem $(prefix)/c4435d12.0 $(ln) -s SWITCH.pem $(prefix)/e75d82f5.0 SWITCH-Personal-2006: prep $(ln) -s SWITCH-Personal-2006.pem $(prefix)/4aa5ef7d.0 $(ln) -s SWITCH-Personal-2006.pem $(prefix)/de34e0d6.0 SWITCH-Personal-2007: prep $(ln) -s SWITCH-Personal-2007.pem $(prefix)/47d3d1a0.0 $(ln) -s SWITCH-Personal-2007.pem $(prefix)/b117eacf.0 SWITCH-Server-2006: prep $(ln) -s SWITCH-Server-2006.pem $(prefix)/072fe468.0 $(ln) -s SWITCH-Server-2006.pem $(prefix)/a3a50474.0 SWITCH-Server-2007: prep $(ln) -s SWITCH-Server-2007.pem $(prefix)/eebc7717.0 $(ln) -s SWITCH-Server-2007.pem $(prefix)/b0056b67.0 SWITCHgrid-Root: prep $(ln) -s SWITCHgrid-Root.pem $(prefix)/d0b701c0.0 $(ln) -s SWITCHgrid-Root.pem $(prefix)/ff430c7f.0 SWITCHslcs: prep $(ln) -s SWITCHslcs.pem $(prefix)/304cf809.0 $(ln) -s SWITCHslcs.pem $(prefix)/461eaf46.0 SWITCHslcs2011: prep $(ln) -s SWITCHslcs2011.pem $(prefix)/5e15f3bd.0 $(ln) -s SWITCHslcs2011.pem $(prefix)/578010ce.0 SiGNET: prep $(ln) -s SiGNET.pem $(prefix)/747183a5.0 $(ln) -s SiGNET.pem $(prefix)/c3deeef7.0 SiGNET-CA: prep $(install) src/accredited/SiGNET-CA.crl_url $(prefix)/ $(install) src/accredited/SiGNET-CA.info $(prefix)/ $(install) src/accredited/SiGNET-CA.namespaces $(prefix)/ $(install) src/accredited/SiGNET-CA.pem $(prefix)/ $(install) src/accredited/SiGNET-CA.signing_policy $(prefix)/ $(ln) -s SiGNET-CA.pem $(prefix)/3d5be7bc.0 $(ln) -s SiGNET-CA.pem $(prefix)/156a0f0f.0 $(ln) -s SiGNET-CA.signing_policy $(prefix)/3d5be7bc.signing_policy $(ln) -s SiGNET-CA.signing_policy $(prefix)/156a0f0f.signing_policy $(ln) -s SiGNET-CA.namespaces $(prefix)/3d5be7bc.namespaces $(ln) -s SiGNET-CA.namespaces $(prefix)/156a0f0f.namespaces SlovakGrid: prep $(install) src/accredited/SlovakGrid.crl_url $(prefix)/ $(install) src/accredited/SlovakGrid.info $(prefix)/ $(install) src/accredited/SlovakGrid.namespaces $(prefix)/ $(install) src/accredited/SlovakGrid.pem $(prefix)/ $(install) src/accredited/SlovakGrid.signing_policy $(prefix)/ $(ln) -s SlovakGrid.pem $(prefix)/e13e0fcf.0 $(ln) -s SlovakGrid.pem $(prefix)/e21dc0c0.0 $(ln) -s SlovakGrid.signing_policy $(prefix)/e13e0fcf.signing_policy $(ln) -s SlovakGrid.signing_policy $(prefix)/e21dc0c0.signing_policy $(ln) -s SlovakGrid.namespaces $(prefix)/e13e0fcf.namespaces $(ln) -s SlovakGrid.namespaces $(prefix)/e21dc0c0.namespaces Spain: prep $(ln) -s Spain.pem $(prefix)/13eab55e.0 $(ln) -s Spain.pem $(prefix)/d67e5c59.0 SwissSign-Bronze: prep $(ln) -s SwissSign-Bronze.pem $(prefix)/e36e7a72.0 $(ln) -s SwissSign-Bronze.pem $(prefix)/761d9c35.0 SwissSign-Root: prep $(ln) -s SwissSign-Root.pem $(prefix)/7b2d086c.0 $(ln) -s SwissSign-Root.pem $(prefix)/410304ad.0 SwissSign-Silver: prep $(ln) -s SwissSign-Silver.pem $(prefix)/e9d08b40.0 $(ln) -s SwissSign-Silver.pem $(prefix)/d86764c4.0 TACC-Classic: prep $(ln) -s TACC-Classic.pem $(prefix)/e5cc84c2.0 $(ln) -s TACC-Classic.pem $(prefix)/4220f3a5.0 TACC-MICS: prep $(ln) -s TACC-MICS.pem $(prefix)/2ac09305.0 $(ln) -s TACC-MICS.pem $(prefix)/bdf45114.0 TACC-Root: prep $(ln) -s TACC-Root.pem $(prefix)/684261aa.0 $(ln) -s TACC-Root.pem $(prefix)/ef300431.0 TERENA-SCS: prep $(ln) -s TERENA-SCS.pem $(prefix)/7ffb3ace.0 $(ln) -s TERENA-SCS.pem $(prefix)/14bc435d.0 TERENA-SSL-CA: prep $(ln) -s TERENA-SSL-CA.pem $(prefix)/9df51c42.0 $(ln) -s TERENA-SSL-CA.pem $(prefix)/d9be2151.0 TERENA-eScience-SSL-CA: prep $(ln) -s TERENA-eScience-SSL-CA.pem $(prefix)/20ce830e.0 $(ln) -s TERENA-eScience-SSL-CA.pem $(prefix)/9d772be7.0 TERENA-eScience-SSL-CA-2: prep $(ln) -s TERENA-eScience-SSL-CA-2.pem $(prefix)/29a95392.0 $(ln) -s TERENA-eScience-SSL-CA-2.pem $(prefix)/b66e4b1f.0 TERENA-eScience-SSL-CA-3: prep $(install) src/accredited/TERENA-eScience-SSL-CA-3.crl_url $(prefix)/ $(install) src/accredited/TERENA-eScience-SSL-CA-3.info $(prefix)/ $(install) src/accredited/TERENA-eScience-SSL-CA-3.namespaces $(prefix)/ $(install) src/accredited/TERENA-eScience-SSL-CA-3.pem $(prefix)/ $(install) src/accredited/TERENA-eScience-SSL-CA-3.signing_policy $(prefix)/ $(ln) -s TERENA-eScience-SSL-CA-3.pem $(prefix)/1db3b27f.0 $(ln) -s TERENA-eScience-SSL-CA-3.pem $(prefix)/e523eeaa.0 $(ln) -s TERENA-eScience-SSL-CA-3.signing_policy $(prefix)/1db3b27f.signing_policy $(ln) -s TERENA-eScience-SSL-CA-3.signing_policy $(prefix)/e523eeaa.signing_policy $(ln) -s TERENA-eScience-SSL-CA-3.namespaces $(prefix)/1db3b27f.namespaces $(ln) -s TERENA-eScience-SSL-CA-3.namespaces $(prefix)/e523eeaa.namespaces TERENAeSciencePersonalCA: prep $(ln) -s TERENAeSciencePersonalCA.pem $(prefix)/169d7f9c.0 $(ln) -s TERENAeSciencePersonalCA.pem $(prefix)/82a0ca89.0 TERENAeSciencePersonalCA2: prep $(ln) -s TERENAeSciencePersonalCA2.pem $(prefix)/ac2d1719.0 $(ln) -s TERENAeSciencePersonalCA2.pem $(prefix)/873734ff.0 TERENAeSciencePersonalCA3: prep $(install) src/accredited/TERENAeSciencePersonalCA3.crl_url $(prefix)/ $(install) src/accredited/TERENAeSciencePersonalCA3.info $(prefix)/ $(install) src/accredited/TERENAeSciencePersonalCA3.namespaces $(prefix)/ $(install) src/accredited/TERENAeSciencePersonalCA3.pem $(prefix)/ $(install) src/accredited/TERENAeSciencePersonalCA3.signing_policy $(prefix)/ $(ln) -s TERENAeSciencePersonalCA3.pem $(prefix)/e732ef10.0 $(ln) -s TERENAeSciencePersonalCA3.pem $(prefix)/dbf09133.0 $(ln) -s TERENAeSciencePersonalCA3.signing_policy $(prefix)/e732ef10.signing_policy $(ln) -s TERENAeSciencePersonalCA3.signing_policy $(prefix)/dbf09133.signing_policy $(ln) -s TERENAeSciencePersonalCA3.namespaces $(prefix)/e732ef10.namespaces $(ln) -s TERENAeSciencePersonalCA3.namespaces $(prefix)/dbf09133.namespaces TRGrid: prep $(install) src/accredited/TRGrid.crl_url $(prefix)/ $(install) src/accredited/TRGrid.info $(prefix)/ $(install) src/accredited/TRGrid.namespaces $(prefix)/ $(install) src/accredited/TRGrid.pem $(prefix)/ $(install) src/accredited/TRGrid.signing_policy $(prefix)/ $(ln) -s TRGrid.pem $(prefix)/1691b9ba.0 $(ln) -s TRGrid.pem $(prefix)/87429ba3.0 $(ln) -s TRGrid.signing_policy $(prefix)/1691b9ba.signing_policy $(ln) -s TRGrid.signing_policy $(prefix)/87429ba3.signing_policy $(ln) -s TRGrid.namespaces $(prefix)/1691b9ba.namespaces $(ln) -s TRGrid.namespaces $(prefix)/87429ba3.namespaces TSU-GE: prep $(install) src/accredited/TSU-GE.crl_url $(prefix)/ $(install) src/accredited/TSU-GE.info $(prefix)/ $(install) src/accredited/TSU-GE.namespaces $(prefix)/ $(install) src/accredited/TSU-GE.pem $(prefix)/ $(install) src/accredited/TSU-GE.signing_policy $(prefix)/ $(ln) -s TSU-GE.pem $(prefix)/4b3f5558.0 $(ln) -s TSU-GE.pem $(prefix)/6f071272.0 $(ln) -s TSU-GE.signing_policy $(prefix)/4b3f5558.signing_policy $(ln) -s TSU-GE.signing_policy $(prefix)/6f071272.signing_policy $(ln) -s TSU-GE.namespaces $(prefix)/4b3f5558.namespaces $(ln) -s TSU-GE.namespaces $(prefix)/6f071272.namespaces Thawte-freemail-issuing: prep $(ln) -s Thawte-freemail-issuing.pem $(prefix)/8e6538d2.0 $(ln) -s Thawte-freemail-issuing.pem $(prefix)/dd9d2a1a.0 Thawte-freemail-root: prep $(ln) -s Thawte-freemail-root.pem $(prefix)/709afd2b.0 $(ln) -s Thawte-freemail-root.pem $(prefix)/64d1f6f4.0 UGRID: prep $(ln) -s UGRID.pem $(prefix)/0a12b607.0 $(ln) -s UGRID.pem $(prefix)/b874affe.0 UGRID-G2: prep $(install) src/accredited/UGRID-G2.crl_url $(prefix)/ $(install) src/accredited/UGRID-G2.info $(prefix)/ $(install) src/accredited/UGRID-G2.namespaces $(prefix)/ $(install) src/accredited/UGRID-G2.pem $(prefix)/ $(install) src/accredited/UGRID-G2.signing_policy $(prefix)/ $(ln) -s UGRID-G2.pem $(prefix)/c53e160f.0 $(ln) -s UGRID-G2.pem $(prefix)/6999cae3.0 $(ln) -s UGRID-G2.signing_policy $(prefix)/c53e160f.signing_policy $(ln) -s UGRID-G2.signing_policy $(prefix)/6999cae3.signing_policy $(ln) -s UGRID-G2.namespaces $(prefix)/c53e160f.namespaces $(ln) -s UGRID-G2.namespaces $(prefix)/6999cae3.namespaces UKPathfinder1: prep $(install) src/unaccredited/UKPathfinder1.crl_url $(prefix)/ $(install) src/unaccredited/UKPathfinder1.info $(prefix)/ $(install) src/unaccredited/UKPathfinder1.namespaces $(prefix)/ $(install) src/unaccredited/UKPathfinder1.pem $(prefix)/ $(install) src/unaccredited/UKPathfinder1.signing_policy $(prefix)/ $(ln) -s UKPathfinder1.pem $(prefix)/6956a8c5.0 $(ln) -s UKPathfinder1.pem $(prefix)/85118d31.0 $(ln) -s UKPathfinder1.signing_policy $(prefix)/6956a8c5.signing_policy $(ln) -s UKPathfinder1.signing_policy $(prefix)/85118d31.signing_policy $(ln) -s UKPathfinder1.namespaces $(prefix)/6956a8c5.namespaces $(ln) -s UKPathfinder1.namespaces $(prefix)/85118d31.namespaces UKeScience: prep $(ln) -s UKeScience.pem $(prefix)/01621954.0 $(ln) -s UKeScience.pem $(prefix)/2bf9495b.0 UKeScienceCA: prep $(ln) -s UKeScienceCA.pem $(prefix)/adcbc9ef.0 $(ln) -s UKeScienceCA.pem $(prefix)/7bb4c3c4.0 UKeScienceCA-2007: prep $(ln) -s UKeScienceCA-2007.pem $(prefix)/367b75c3.0 $(ln) -s UKeScienceCA-2007.pem $(prefix)/53729190.0 UKeScienceCA-2A: prep $(ln) -s UKeScienceCA-2A.pem $(prefix)/1b6f5ede.0 $(ln) -s UKeScienceCA-2A.pem $(prefix)/877af676.0 UKeScienceCA-2B: prep $(install) src/accredited/UKeScienceCA-2B.crl_url $(prefix)/ $(install) src/accredited/UKeScienceCA-2B.info $(prefix)/ $(install) src/accredited/UKeScienceCA-2B.pem $(prefix)/ $(install) src/accredited/UKeScienceCA-2B.signing_policy $(prefix)/ $(ln) -s UKeScienceCA-2B.pem $(prefix)/ffc3d59b.0 $(ln) -s UKeScienceCA-2B.pem $(prefix)/530f7122.0 $(ln) -s UKeScienceCA-2B.signing_policy $(prefix)/ffc3d59b.signing_policy $(ln) -s UKeScienceCA-2B.signing_policy $(prefix)/530f7122.signing_policy UKeScienceRoot: prep $(ln) -s UKeScienceRoot.pem $(prefix)/8175c1cd.0 $(ln) -s UKeScienceRoot.pem $(prefix)/f92e7377.0 UKeScienceRoot-2007: prep $(install) src/accredited/UKeScienceRoot-2007.crl_url $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.info $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.namespaces $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.pem $(prefix)/ $(install) src/accredited/UKeScienceRoot-2007.signing_policy $(prefix)/ $(ln) -s UKeScienceRoot-2007.pem $(prefix)/98ef0ee5.0 $(ln) -s UKeScienceRoot-2007.pem $(prefix)/7ed47087.0 $(ln) -s UKeScienceRoot-2007.signing_policy $(prefix)/98ef0ee5.signing_policy $(ln) -s UKeScienceRoot-2007.signing_policy $(prefix)/7ed47087.signing_policy $(ln) -s UKeScienceRoot-2007.namespaces $(prefix)/98ef0ee5.namespaces $(ln) -s UKeScienceRoot-2007.namespaces $(prefix)/7ed47087.namespaces ULAGrid-CA-2008: prep $(ln) -s ULAGrid-CA-2008.pem $(prefix)/3f0f4285.0 $(ln) -s ULAGrid-CA-2008.pem $(prefix)/d38446c5.0 UNAMgrid-ca: prep $(install) src/accredited/UNAMgrid-ca.crl_url $(prefix)/ $(install) src/accredited/UNAMgrid-ca.info $(prefix)/ $(install) src/accredited/UNAMgrid-ca.namespaces $(prefix)/ $(install) src/accredited/UNAMgrid-ca.pem $(prefix)/ $(install) src/accredited/UNAMgrid-ca.signing_policy $(prefix)/ $(ln) -s UNAMgrid-ca.pem $(prefix)/24c3ccde.0 $(ln) -s UNAMgrid-ca.pem $(prefix)/d71343e8.0 $(ln) -s UNAMgrid-ca.signing_policy $(prefix)/24c3ccde.signing_policy $(ln) -s UNAMgrid-ca.signing_policy $(prefix)/d71343e8.signing_policy $(ln) -s UNAMgrid-ca.namespaces $(prefix)/24c3ccde.namespaces $(ln) -s UNAMgrid-ca.namespaces $(prefix)/d71343e8.namespaces UNLPGrid: prep $(install) src/accredited/UNLPGrid.crl_url $(prefix)/ $(install) src/accredited/UNLPGrid.info $(prefix)/ $(install) src/accredited/UNLPGrid.namespaces $(prefix)/ $(install) src/accredited/UNLPGrid.pem $(prefix)/ $(install) src/accredited/UNLPGrid.signing_policy $(prefix)/ $(ln) -s UNLPGrid.pem $(prefix)/95b96af1.0 $(ln) -s UNLPGrid.pem $(prefix)/522b8537.0 $(ln) -s UNLPGrid.signing_policy $(prefix)/95b96af1.signing_policy $(ln) -s UNLPGrid.signing_policy $(prefix)/522b8537.signing_policy $(ln) -s UNLPGrid.namespaces $(prefix)/95b96af1.namespaces $(ln) -s UNLPGrid.namespaces $(prefix)/522b8537.namespaces UTN-USERFirst-Hardware: prep $(ln) -s UTN-USERFirst-Hardware.pem $(prefix)/ff783690.0 $(ln) -s UTN-USERFirst-Hardware.pem $(prefix)/b13cc6df.0 UTN-USERTrust-RSA-CA: prep $(ln) -s UTN-USERTrust-RSA-CA.pem $(prefix)/35105088.0 $(ln) -s UTN-USERTrust-RSA-CA.pem $(prefix)/fc5a8f99.0 UTNAAAClient: prep $(ln) -s UTNAAAClient.pem $(prefix)/9ec3a561.0 $(ln) -s UTNAAAClient.pem $(prefix)/c5e082db.0 UniandesCA: prep $(ln) -s UniandesCA.pem $(prefix)/fc1898ec.0 $(ln) -s UniandesCA.pem $(prefix)/6cad3d39.0 cilogon-basic: prep $(install) src/accredited/cilogon-basic.crl_url $(prefix)/ $(install) src/accredited/cilogon-basic.info $(prefix)/ $(install) src/accredited/cilogon-basic.namespaces $(prefix)/ $(install) src/accredited/cilogon-basic.pem $(prefix)/ $(install) src/accredited/cilogon-basic.signing_policy $(prefix)/ $(ln) -s cilogon-basic.pem $(prefix)/28776852.0 $(ln) -s cilogon-basic.pem $(prefix)/c2868627.0 $(ln) -s cilogon-basic.signing_policy $(prefix)/28776852.signing_policy $(ln) -s cilogon-basic.signing_policy $(prefix)/c2868627.signing_policy $(ln) -s cilogon-basic.namespaces $(prefix)/28776852.namespaces $(ln) -s cilogon-basic.namespaces $(prefix)/c2868627.namespaces cilogon-openid: prep $(install) src/experimental/cilogon-openid.crl_url $(prefix)/ $(install) src/experimental/cilogon-openid.info $(prefix)/ $(install) src/experimental/cilogon-openid.namespaces $(prefix)/ $(install) src/experimental/cilogon-openid.pem $(prefix)/ $(install) src/experimental/cilogon-openid.signing_policy $(prefix)/ $(ln) -s cilogon-openid.pem $(prefix)/3d863bc5.0 $(ln) -s cilogon-openid.pem $(prefix)/9629661e.0 $(ln) -s cilogon-openid.signing_policy $(prefix)/3d863bc5.signing_policy $(ln) -s cilogon-openid.signing_policy $(prefix)/9629661e.signing_policy $(ln) -s cilogon-openid.namespaces $(prefix)/3d863bc5.namespaces $(ln) -s cilogon-openid.namespaces $(prefix)/9629661e.namespaces cilogon-osg: prep $(ln) -s cilogon-osg.pem $(prefix)/d690e530.0 $(ln) -s cilogon-osg.pem $(prefix)/70d35895.0 cilogon-silver: prep $(install) src/accredited/cilogon-silver.crl_url $(prefix)/ $(install) src/accredited/cilogon-silver.info $(prefix)/ $(install) src/accredited/cilogon-silver.namespaces $(prefix)/ $(install) src/accredited/cilogon-silver.pem $(prefix)/ $(install) src/accredited/cilogon-silver.signing_policy $(prefix)/ $(ln) -s cilogon-silver.pem $(prefix)/10718cba.0 $(ln) -s cilogon-silver.pem $(prefix)/01b5d333.0 $(ln) -s cilogon-silver.signing_policy $(prefix)/10718cba.signing_policy $(ln) -s cilogon-silver.signing_policy $(prefix)/01b5d333.signing_policy $(ln) -s cilogon-silver.namespaces $(prefix)/10718cba.namespaces $(ln) -s cilogon-silver.namespaces $(prefix)/01b5d333.namespaces egee-ne-benelux-tutorial: prep $(install) src/unaccredited/egee-ne-benelux-tutorial.crl_url $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.info $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.namespaces $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.pem $(prefix)/ $(install) src/unaccredited/egee-ne-benelux-tutorial.signing_policy $(prefix)/ $(ln) -s egee-ne-benelux-tutorial.pem $(prefix)/8c13c962.0 $(ln) -s egee-ne-benelux-tutorial.pem $(prefix)/3ccc03a5.0 $(ln) -s egee-ne-benelux-tutorial.signing_policy $(prefix)/8c13c962.signing_policy $(ln) -s egee-ne-benelux-tutorial.signing_policy $(prefix)/3ccc03a5.signing_policy $(ln) -s egee-ne-benelux-tutorial.namespaces $(prefix)/8c13c962.namespaces $(ln) -s egee-ne-benelux-tutorial.namespaces $(prefix)/3ccc03a5.namespaces ncsa-gridshib-ca: prep $(ln) -s ncsa-gridshib-ca.pem $(prefix)/e8ac4b61.0 $(ln) -s ncsa-gridshib-ca.pem $(prefix)/d87163a8.0 nl-e-infra-zero: prep $(install) src/unaccredited/nl-e-infra-zero.crl_url $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.info $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.namespaces $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.pem $(prefix)/ $(install) src/unaccredited/nl-e-infra-zero.signing_policy $(prefix)/ $(ln) -s nl-e-infra-zero.pem $(prefix)/338a3561.0 $(ln) -s nl-e-infra-zero.pem $(prefix)/79863311.0 $(ln) -s nl-e-infra-zero.signing_policy $(prefix)/338a3561.signing_policy $(ln) -s nl-e-infra-zero.signing_policy $(prefix)/79863311.signing_policy $(ln) -s nl-e-infra-zero.namespaces $(prefix)/338a3561.namespaces $(ln) -s nl-e-infra-zero.namespaces $(prefix)/79863311.namespaces pkIRISGrid: prep $(ln) -s pkIRISGrid.pem $(prefix)/9dd23746.0 $(ln) -s pkIRISGrid.pem $(prefix)/cd536adc.0 seegrid-ca-2013: prep $(install) src/accredited/seegrid-ca-2013.crl_url $(prefix)/ $(install) src/accredited/seegrid-ca-2013.info $(prefix)/ $(install) src/accredited/seegrid-ca-2013.namespaces $(prefix)/ $(install) src/accredited/seegrid-ca-2013.pem $(prefix)/ $(install) src/accredited/seegrid-ca-2013.signing_policy $(prefix)/ $(ln) -s seegrid-ca-2013.pem $(prefix)/da213f5b.0 $(ln) -s seegrid-ca-2013.pem $(prefix)/ad9d1b74.0 $(ln) -s seegrid-ca-2013.signing_policy $(prefix)/da213f5b.signing_policy $(ln) -s seegrid-ca-2013.signing_policy $(prefix)/ad9d1b74.signing_policy $(ln) -s seegrid-ca-2013.namespaces $(prefix)/da213f5b.namespaces $(ln) -s seegrid-ca-2013.namespaces $(prefix)/ad9d1b74.namespaces igtf-policy-installation-bundle-1.104/README.txt0000664001343500074740000001245513614364142020720 0ustar davidgdavidgIGTF Authority Trust Anchor Installation Bundle version 1.104 ----------------------------------------------------------------- (release 1, issued on Wednesday, 29 Jan, 2020) This installation bundle contains the trust anchor sources for all IGTF distributed authorities. It must be configured before use, as explained below. Use "make install" to actually copy a configured source repository to the specified location. The structure of this installation tar-ball is as follows: / README configure Makefile src/ accredited/ unaccredited/ experimental/ where the source trust anchors (all of them) are located in their appropriate subdirectories under "src/". Note that of these trust anchors, ONLY THE ONES UNDER "src/accredited/" ARE PART OF THE IGTF TRUST FABRIC. The others you install antirely at your OWN RISK. This bundle is primarily intended for re-packagers. Relying parties that use the pre-built and signed (policy) RPMs directly need not configure or install this bundle package. The RPM distribution is self-consistent and complete. Note that specific individual CAs can also be installed directly from their individual tar-balls in the "accredited/tgz/" directory. This tar-ball can be obtained from the PMA repositories, e.g. from http://dist.eugridpma.info/distribution/igtf/current/ Configuration of your distribution ---------------------------------- Use the "./configure" script to select the profiles and authorities you want to be installed in your trust anchor repository. After the initial configuration step, you will also need to "install" the trust achors in the target area using the "make install" command. Configure --------- The "./configure" script takes some of the arguments usually encountered in the GNU autoconf context, such as "--prefix". Ther are two arguments specific to the IGTF distribution: "--with-profile=" The "profiles" correspond to *all* Authorities accredited by any of the IGTF member PMAs under a specific profile: classic -- Traditional X.509 Authorities with Secured Infrastructure slcs -- Short-Lived Credential generation Services mics -- Member Integrated Credential generation Services iota -- Identifier-Only Trust Assurance Services - PLEASE read profile first at https://www.eugridpma.org/guidelines/IOTA/ Notes: * there is no collective installation for experimental or unaccredited CAs, as there are no assertions made by the PMAs regarding such experimental or unaccredited authority trust anchors. * You can repeat the "--with-profile=" stanza to select multiple profiles Example: ./configure --with-profile=classic --with-profile=slcs && make install "--with-authority=" Add specific named authorities to the trust configuration. The names of these authorities can be found in the ".info" file associated with the trust anchor sources. You can repeat the "--with-authority=" stanza to add multiple authorities. Specific authorities are added *in addition* to those selected with the "--with-profile=" option. Example: ./configure --with-profile=classic --with-authority=FNAL_KCA "--prefix" The location where the root certificates and the information files will be stored. Full syntax: [--prefix=path] Installation path default: /etc/grid-security/certificates [--with-mkdir=path] name of mkdir program supporting -p default: mkdir [--with-install=path] name of the BSD install programme default: install [--with-profile=profile] selected CA accreditation profile default: (none) (multiple profiles can be selected) [--with-authority=ca] selected a specific (additional) CA default: (none) (multiple CAs can be selected) Installing your distribution ---------------------------- After configuration, you will have a "Makefile" in the current directory. You should "make install" these to copy the files to the specified trust anchor directory. This directory is by default set to "/etc/grid-security/certificates/", but may be directed to other locations. In this directory, you will now find for each Authority: .0 -- the PEM-formatted certificate of this authority .info -- Authority meta-data, suh as the common alias, the web site URL, and an email address for concerns .crl_url -- location (http) of the current CRL issued by this authority .signing_policy -- the EACL formatted list of namespace constraints, specifying with subject names are subject to the IGTF managed namespace. The assertions of the IGTF only extend to subject names within this namespace .namespaces -- alternate format of the same namespace constraints. See http://www.eugridpma.org/documentation/ for a full description of this format. Uninstall --------- Automatic un-install of the bundle is not supported. Please look carefully at the CHANGES file provided with each release to determine which CAs have been obsoleted or withdrawn. igtf-policy-installation-bundle-1.104/LICENSE0000664001343500074740000000400213614364142020214 0ustar davidgdavidgLicensing The International Grid Trust Federation (IGTF) distributes or re- distributes information and data related to the trust fabric. This distribution contains information generated collectively, as well as contributions by members and third parties. Trust Anchors are owned by the respective authorities or their contractors, and are made available by their owners under the Creative Common Attribution 3.0 "CC-BY-3.0" (unported) license (http://creativecommons.org/licenses/by/3.0). The following trust anchor meta-data: 'info' meta-data file, crl-url file, signing policy files, namespaces files, and the distribution documentation (including change log and release notes) are owned jointly and individually by the members of the Policy Management Authorities participating in the International Grid Trust Federation. These data are made available under the Creative Common Attribution 3.0 "CC-BY-3.0" (unported) license (http://creativecommons.org/licenses/by/3.0). Selected trust anchors from third parties have been obtained from web browser distributions by Mozilla and have been verified for correctness with respect to their original versions. These portions are reproduced without modification as part of this larger work, as per the Mozilla Public License 1.1, section 2.1 sub a "MPL 1.1" (http://www.mozilla.org/MPL/MPL-1.1.html). Unless specifically stated otherwise, these licenses extend solely to the trust anchors and the directly associated meta-data listed above and does not extend to the Certificate Policy (CP) document, the Certificate Practice Statements (CPS), or any other documentation, software, or services made available by the member authorities or others. CP, CPS, and any other information provided is owned by the respective members and subject to the license conditions stated therein. Anyone using the Distribution is specifically reminded of sections 5 and 6 of the CC-BY-3.0 license, as well as sections 7 and 9 of the MPL 1.1. igtf-policy-installation-bundle-1.104/CHANGES0000664001343500074740000011743413614364142020220 0ustar davidgdavidgCHANGES ------- This file lists changes made to the IGTF Trust Anchor distribution. Please refer to the README.txt file for additional information on installing the Distribution and to be informed about important information on distribuion lay-out. Changes from 1.103 to 1.104 --------------------------- (29 January 2020) * Reinstated AddTrust External CA Root in parallel to Comodo RSA CA to ease transitionary period (US) Changes from 1.102 to 1.103 --------------------------- (27 January 2020) * Updated contact addresses for DigiCert (US) * Regrafted InCommon IGTF Server CA onto self-signed Comodo RSA CA (US) * Discontinued superfluous AddTrust External CA Root (US) * Discontinued AustrianGrid CA (AT) Changes from 1.101 to 1.102 --------------------------- (14 October 2019) * Added CESNET-CA-4 ICA accredited classic CA for issuer roll-over (CZ) Changes from 1.99 to 1.101 -------------------------- (24 June 2019, note: 1.100 was not issued) * added new trust anchor for PolishGrid (2019) for key roll-over (PL) * withdrawn discontinued CILogon OSG CA (US) Changes from 1.98 to 1.99 ------------------------- (27 May 2019) * withdrawn superseded HKU CA (HK) * withdrawn discontinued CyGrid CA following migration to TCS (CY) Changes from 1.97 to 1.98 ------------------------- (29 Apr 2019) * withdrawn superseded IRAN-GRID authority (IR) Changes from 1.96 to 1.97 ------------------------- (25 Mar 2019) * temporarily withdrawn EG-GRID 4a96b1ea for network availability reasons (EG) Changes from 1.95 to 1.96 ------------------------- (25 Feb 2019) * withdrawn superseded QuoVadis-Grid-ICA (1st gen) CA (BM) * added new trust anchor MD-Grid-CA-T for rollover of existing CA (MD) * discontinued expiring 2009 series MD-Grid-CA (MD) Changes from 1.94 to 1.95 ------------------------- (26 Nov 2018) * Updated namespaces and signing_policy files for CILogon Silver CA to permit DNs without "/C=US" (US) Changes from 1.93 to 1.94 ------------------------- (29 Oct 2018) * extended validity period for the ArmeSFo CA (AM) * withdrawn expiring DFN-SLCS CA (DE) Changes from 1.92 to 1.93 ------------------------- (24 Sep 2018) * Updated contact information for HellasGrid-CA (GR) * Removed superseded IGCA CA (IN) Changes from 1.91 to 1.92 ------------------------- (25 Jun 2018) * Added HKU CA 2 trust anchor during transitioning period (HK) Changes from 1.90 to 1.91 ------------------------- (14 May 2018) * Updated MREN CA with extended validity period (ME) Changes from 1.89 to 1.90 ------------------------- (26 March 2018) * Added new Grid-FR hierarchy for Renater (AC-GRID-FR series) (FR) * Added new GARUDAINDIA2 root for key roll-over IGCA (IN) * Updated contact metadata for UNAM trust anchors (MX) Changes from 1.88 to 1.89 ------------------------- (8 January 2018) * Discontinued expiring UGRID (2008) root CA (UA) Changes from 1.87 to 1.88 ------------------------- (27 November 2017) * updated UKeScience 2B ICA based on a SHA-2 family digest (UK) * added new PKIUNAMgrid (2017) trust anchor for roll-over (MX) Changes from 1.86 to 1.87 ------------------------- (30 October 2017) * added new accredited classic DarkMatter Private Root G4 and ICA (AE) * updated PK-Grid-2007 trust anchor with extended validity period (PK) * extended validity period for UNAMgrid-ca trust anchor (MX) Changes from 1.85 to 1.86 ------------------------- (9 October 2017) * updated MaGrid CA with extended validity period (MA) * removed discontinued pkIRISGrid CA (ES) * discontinued depricated yum v2 and rpm-apt package management support (only affects yum installs on RHEL/CentOS2+3, Fedora Core 1-3, and bespoke support for installing RPM packages using APT for pre-2006 RedHat systems) Changes from 1.84 to 1.85 ------------------------- (31 July 2017) * Updated URL domain information for CyGrid (CY) Changes from 1.83 to 1.84 ------------------------- (26 June 2017) * Updated ROSA root certificate with extended 20yr valitity (RO) * Updated contact details for CyGrid CA following transition to CYNET (CY) * Removed obsoleted KISTI-2007 trust anchor - replaced by KISTIv3 (KR) * Removed expiring LACGrid trust anchor a9082267 (BR) * Added UK Pathfinder AAAI CA 1 to unaccredited (misc) area (UK) Changes from 1.82 to 1.83 ------------------------- (29 May 2017) * Added new trust anchor for accredited KISTI CA v3 (KR) * Removed obsolete GEANT TCS G1 and G2 (old Comodo-backed) trust anchors: UTN-USERFirst-Hardware TERENA-eScience-SSL-CA AAACertificateServices UTNAAAClient TERENAeSciencePersonalCA UTN-USERTrust-RSA-CA TERENA-eScience-SSL-CA-2 TERENAeSciencePersonalCA2 (EU) Changes from 1.81 to 1.82 ------------------------- (27 March 2017) * Added new G2 UGrid trust anchor (UA) * Extended validity for AEGIS CA (RS) * Withdrawn discontinued FNAL KCA (US) * Extended valitity for REUNA CA (CL) Changes from 1.80 to 1.81 ------------------------- (28 February 2017) * Added accredited DarkMatter classic QV-intermediate ICAs (AE) including QuoVadis Root CA 2 G3 and Root CA 3 G3 higher level CAs (BM) * Updated contact information for EUN EG-GRID CA (EG) * Withdrawn classic UKeScienceCA-2A in advance of repurposing (UK) Changes from 1.79 to 1.80 ------------------------- (30 January 2017) * Discontinued BEGrid2008 (BELNET) classic authority (BE) Changes from 1.78 to 1.79 ------------------------- (28 November 2016) * Updated UNLPGrid CA with extended validity period (AR) * Fix regular expressions in CILogon and NCSA CA namespaces files (US) * Included rollover CA IRAN-GRID-CGC-G2 (IR) * Corrected an incorrect line in selected info files for DigiCert (US) * Discontinued expiring NECTEC CA (TH) Changes from 1.77 to 1.78 ------------------------- (5 October 2016) * Removed superseded INFN-CA-2006 CA (IT) * Updated Debian packaging to support APT security improvements Changes from 1.76 to 1.77 ------------------------- (26 September 2016) * Updated namespaces and signing_policy files for CILogon Basic CA to permit DNs without "/C=US" (US) * Added G2 series (sha-2) QuoVadis Root 2 and Grid ICA G2 (BM) * Removed discontinued UniandesCA (CO) Changes from 1.75 to 1.76 ------------------------- (25 July 2016) * Added accredited RCauth.eu IOTA CA and associated root (EU) * Added DutchGrid Root G1 (NL) Changes from 1.74 to 1.75 ------------------------- (27 June 2016) * Discontinued expired UFF BrGrid CA (BR) * Discontinued expired HellasGrid-2006 and associated Root (GR) Changes from 1.73 to 1.74 ------------------------- (16 May 2016) * Removed superseded NorduGrid (2006) CA (DK) * Added HellasGrid 2016 CA (GR) Changes from 1.72 to 1.73 ------------------------- (28 March 2016) * Updated key pair for SDG CA G2 (CN) * Revised URL to point to http endpoint for CERN IOTA ICA CRL (CERN) * Added date field to Debain Release file to work around APT bug 809329 * Added an InRelease file for changing Debian packaging * Added experimental DCA Root G1 and RCauth.eu Pilot ICA G1 (NL, EU) Changes from 1.71 to 1.72 ------------------------- (29 February 2016) * Added roll-over subordinate for the SDG CA G2 (CN) * Added CERN LCG IOTA CA (CERN) * Updated PSC MyProxy CA with extended validity (US) Changes from 1.70 to 1.71 ------------------------- (25 January 2016) * Added accredited classic KENET ICA and associated Root (KE) * Removed expiring SDG CA (CN) * Updated CyGrid Root CA with extended validity period (CY) * Updated BG-ACAD-CA with extended validity period (BG) Changes from 1.69 to 1.70 ------------------------- (30 November 2015) * Updated CRL URL hosted by KIT for ArmeSFO (AM) * Added NorduGrid 2015 trust anchor (DK,NO,SE,FI,IS) * Discontinued superseded DigiCertGridCA-1G2-Classic (US) Changes from 1.68 to 1.69 ------------------------- (26 October 2015) * Added new INFN "2015" CA as roll-over of the 2006 instance (IT) * Added new CILogon OSG CA (US) * Discontinued BalticGrid CA (EE) Changes from 1.67 to 1.68 ------------------------- (5 October 2015) * Discontinued CALG CA (LV) * Added experimental KENET CAs (KE) Changes from 1.65 to 1.67 ------------------------- (31 August 2015 - release jump, skipping 1.66) * Discontinued NCSA-mics CA (US) * Withdrawn G2 root for IPM CA (IR) Changes from 1.64 to 1.65 ------------------------- (29 June 2015) * Discontinued NAREGI CA (JP) * Added addition G2 root for IPM CA (IR) * Added new subjectdn attribute to the trust anchor and profile meta-data files to aid monitoring and authentication-profile based access control mechanism use cases. See http://wiki.eugridpma.org/Main/IGTFInfoFile (ALL) Changes from 1.63 to 1.64 ------------------------- (1 June 2015) * Extended validity period of the BalticGrid CA (EE,LT,LV) * Removed obsolete NICS-MyProxy CA (US) * Added revised DigiCertGridCA-1G2-Classic-2015 Classic CA (US) * Updated CRL URL information for TCS G3 by preferring secondary URI (EU) * Updated RDIG CA with extended validity self-signed root (RU) * Removed obsolete NCSA-slcs CA, replaced by NCSA-slcs-2013 (US) Changes from 1.62 to 1.63 ------------------------- (30 March 2015) * Removed obsoleted and replaced NIIF CA (HU) * Extended validity period of the KEK CA (JP) * Removed obsoleted d254cc30/CERN-Root 1d879c6c/CERN-TCA anchors (CERN) * Updated RPDNC namespaces to permit DigiCert Grid Trust G2 ICAs for DigiCert Assured ID Root CA (US) * Updated RPDNC namespaces and signing_policy files for G2 series DigiCert Grid CAs pending ICA reissuance for reverse RDN issue (US) * Nomalised cond_subject syntax for multiple signing policy files cilogon-basic cilogon-silver InCommon-IGTF-Server-CA NCSA-slcs-2013 NCSA-tfca-2013 Comodo-RSA-CA Changes from 1.61 to 1.62 ------------------------- (23 February 2015) * Added Root CA 2 for NIIF (HU) * Extended validity period for pkIRISgrid CA (ES) * Updated DigiCert root CA meta-data in preparation for TCS (US) * Included GEANT TCS CA G3 trust anchors (EU) * Temporarily suspended HIAST/74c6eaeb for operational reasons (SY) * Discontinued ULAGrid-CA-2008 CA (VE) * Discontinued NCHC CA (TW) Changes from 1.60 to 1.61 ------------------------- (1 December 2014) * Added new IPv6-capable crl_url entries for NCSA and CILogon CAs (US) * Added accredited TSU (Georgia) CA (GE) * Extended life time and updated digest function of AustrianGrid CA (AT) Changes from 1.59 to 1.60 ------------------------- (27 October 2014) * Added new SHA-2 hierarchies for TERENA Certificate Service (ed. 2009) (EU) Changes from 1.58 to 1.59 ------------------------- (29 September 2014) * Added accredited mics HPCI CA (JP) * Updated crl_url for NCSA-slcs-2013 and NCSA-tfca-2013 (US) * Renamed QuoVadis classic grid issuing CA to QuoVadis-Grid-ICA (CH, BM) Changes from 1.57 to 1.58 ------------------------- (30 June 2014) * Added accredited classic InCommon Server IGTF SSL CA and intermediate Comodo RSA CA (SHA-2) (US) * Extended permitted namespaces for AddTrust-External-CA-Root (EU, US) * Updated CILogon Basic CA from experimental to accredited:iota (US) * Updated certificate URL for IHEP-CA-2013 39d30eba (CN) * Discontinued expiring SEE-GRID '2004' CA - since replaced by new SEEGRID-CA-2013 (GR) * Discontinued retired PRAGMA-UCSD CA (US) Changes from 1.56 to 1.57 ------------------------- (2 June 2014) * Discontinued obsoleted IHEP (2009) CA ba2f39ca (CN) * Removed discontinued NCSA Two Factor CA following migration to NCSA Two Factor CA 2013 (US) Changes from 1.55 to 1.56 ------------------------- (31 March 2014) * Removed discontinued SWITCHslcs2011 and associated Root (CH) * Removed discontinued APAC CA (AU) * Removed discontinued DoEGrids CA and ESnet root (US) * Add reference to CA website for AustrianGrid CA (AT) * Add new subordinates for DigiCert: 1cdf1cd9/DigiCertGridCA-1G2-Classic and 5d9ea26d/DigiCertGridTrustCAG2-Classic (US) * Add meta-package for the IOTA-accredited CAs. Please note that there are no IOTA accredited CAs as this point in time. For specifications see https://www.eugridpma.org/guidelines/IOTA/ * Debian packaging dependencies in meta-packages now correctly use all- lower-case package names throughout Changes from 1.54 to 1.55 ------------------------- (25 November 2013) THIS RELEASE IS THE LAST ONE ALSO TO BE DISTRIBUTED IN SINGLE HASH FORMAT * New root certificate with extended life time for NorduGrid CA 1f0e8352 (DK) * Updated contact metadata for all RENATER Grid-FR related CAs (FR) * Updated CRL URL and metadata for IHEP 2013 CA 39d30eba (CN) * New root certificates for NCSA CA re-key: MyProxy CA 2013 c36f6349/7aa2b7bd and Two Factor CA 2013 ca157cee/48c8f10a (US) * New root certificate for EGI catch-all CA "SEEGRID-CA-2013" 772dbd1c (GR) * Removed AIST Grid CA (JP) * Discontinued IUCC CA (6fee79b0) following migration to TCS (IL) * Suspended JUnet-CA (b3222f9e) (JO) * Removed expired unaccredited CAs (misc) * Added unaccredited worthless NL e-Infra Zero tutorial CA 338a3561 (NL) Changes from 1.53 to 1.54 ------------------------- (24 June 2013) * Extended life time of Grid-KA CA (dd4b34ea) (DE) * Added new CERN hierarchy for CERN IT/IS CA (SHA2 migration) (CH) * Updated metadata for GridGermany DFN-CERT CAs (DE) * Updated contact metadata for KEK (JP) * Updated contact metadata for HKU (HK) * Updated contact metadata for AIST (JP) Changes from 1.52 to 1.53 ------------------------- (27 May 2013) * Added new root cert for IHEP CA (2013) (CN) * Removed retired NCSA GridShib CA (e8ac4b61) (US) * Removed backup crl_url locations for CILogon CAs due to future crl.doegrids.org shutdown. (US) * Removed retired TACC CAs (2ac09305, 684261aa, e5cc84c2) (US) * Updated NERSC CA (b93d6240) to extend validity and change to self-signed rather than subordinate to ESnet (US) Changes from 1.51 to 1.52 ------------------------- (26 January 2013) * Extended validity of ArmeSFo Root CA (d0c2a341) (AM) * Obsoleted UKeScienceCA-2007 and updated Root CRL URL and metadata (UK) * removed expiring and unaccredited 'convenience' CAs from the distribution (Thawte, ZA, TERENA SCS, BE) Changes from 1.50 to 1.51 ------------------------- (26 November 2012) * Due to the unfortunate closure of Grid-Ireland, the Grid-Ireland CA (1e43b9cc) has been discontinued (IE) * extended expiry date for CyGrid CA (afe55e66) (CY) Changes from 1.49 to 1.50 ------------------------- (24 September 2012) * Added accredited classic EG-GRID CA (EG) * Extended life time of UKeScience (2007) issuing CA (UK) Changes from 1.48 to 1.49 ------------------------- (30 July 2012) * Added ANSPGrid (126f0acf) classic CA (BR) * Extended root cert validity for CA ce33db76 to 20yr (IR) Changes from 1.47 to 1.48 ------------------------- (29 May 2012) * Extended life time of DFN GridGermany Root (1149214e) and CDPs (DE) Changes from 1.46 to 1.47 ------------------------- (30 April 2012) * Updates CA URL metadata and CRL for pkIRISGrid CA (ES) * Added accredited classic MYIFAM CA (MY) Changes from 1.45 to 1.46 ------------------------- (29 March 2012) * Removed discontinued CESNET (9b59ecad) CA (CZ) Changes from 1.44 to 1.45 ------------------------- (26 March 2012) * Added accredited NCSA 2-factor SLCS CA (US) Changes from 1.43 to 1.44 ------------------------- (30 January 2012) * Added accredited classic DigiCert CA chains (US) * Extended life time of UGRID root cert (UA) Changes from 1.42 to 1.43 ------------------------- (28 November 2011) * Added new SWITCHslcs 2011 CA, replacing SWITCHslcs 2009 (CH) * Updated contact information for SWITCH CAs (CH) * Added new accredited classic JUnet CA (JO) * Added additional CRL URL for DOEGrids CA in certificate and meta data (US) * Added additional CRL URL for ESnet Root CA in meta data (US) * Updated institute information for KIT in signing_policy file (DE) * Updated enrolment URLs for Grid-FR CA (FR) Changes from 1.41 to 1.42 ------------------------- (30 September 2011) * Corrected signing_policy file for UKeScience CA 2B (UK) Changes from 1.40 to 1.41 ------------------------- (26 September 2011) * Added accredited PSC MyProxy SLCS CA (US) * Updated CRL URL for LIPCA (PT) * Extended life time of SlovakGrid CA root (SK) * Added accredited DZ-eScience CA (DZ) * Added accredited NICS SLCS MyProxy CA (US) * Added new UK eScience issuing CAs 2A and 2B to allowed namespaces and removed superfluous signing policy entries (UK) * Normalised the certificate files (.0) for selected CAs in the 'old' format distribution. This does not affect the 'new' OpenSSL v1+ compatible release. Affected CAs are CESNET, NIKHEF, NIIF, DFN-GridGermany-Root, PSC-Myproxy-CA, and NERSC-SLCS. Old and new format files are now identical. * The "worthless" area, containing some files that are distributed merely for convenience for selected specific purposes, has been re-named to "unaccredited". Files contained in this directory must be treated with utmost care, and their inclusion in the distribution does not constitute any form of endorsement by the IGTF of these files or their content. * Added unaccredited InCommon Server CA to convenience directory (US) Changes from 1.39 to 1.40 ------------------------- (28 June 2011) * Corrected fingerprint meta-data for UniAndes CA (CO) Changes from 1.38 to 1.39 ------------------------- (27 June 2011) * Change of contact address for NAREGI CA (JP) * Change of contact address for GermanGrid CA (DE) * Added accredited classic HIAST CA (SY) * Added accredited classic Uni Andes CA (CO) * Extended life time of root certificate for SiGNET-CA (SI) * Extended life time of root certificate for Grid-Ireland (IE) * New issuing certificates (2A, 2B) for UKeScience (GB) * Updated extensions for DOEGrids-CA-1 issuing CA (US) Changes to unaccredited information: * Added experimental DZeScience CA (DZ) * Extended life time for unaccredited Benelux and NE tutorial CA cert and re-rooted namespace to new domain name (NL,BE) * Added worthless replacement gilda 2011 CA (IT) * Removed expired DutchDemo CA (NL) Changes from 1.37 to 1.38 ------------------------- (7 February 2011) * Updated meta-data info file for SRCE (HR) * Updated KEK CA root (617ff41b) with extended life time (JP) * Updated contact email address for ArmeSFo (AM) * Extended allowed namespace and new URL for SEE-GRID CA as EGI catch-all (EU) * Extended allowed namespace for NAREGI CA (JP) * Added accredited CILogin MICS CA (US) * Extended life time for NCSA CACL (MICS) CA (US) * Extended life time for NCSA MyProxy (SLCS) CA (US) * Extended life time for NorduGrid CA (DK,NO,SE,FI,SI) * Corrected namespaces file for TCS eScience Personal (EU) Changes from 1.36 to 1.37 ------------------------- (27 September 2010) * Added accredited classic TERENA eScience SSL CA and hierarchy (EU) * Discontinued NGO-Netrust CA (SG) * The OpenSSL1 compliant format no longer adds symlinks for info metadata (such references would result in multiple downloads of the same CRL data when used with FetchCRL3) * Corrected typo errors in namespaces file for AAACertificateServices (EU) * Added CILogon CAs in experimental area (US) Changes from 1.35 to 1.36 ------------------------- (25 June 2010) * Updated root certificate for PLGrid with corrected SAN extension (PL) Changes from 1.34 to 1.35 ------------------------- (11 June 2010) * Updated root certificate for SRCE with new extensions and life time (HR) * Updated root certificate for ROSA with new AKI extension and serial (RO) * Removed obsoleted CAs from experimental area (US) Changes from 1.33 to 1.34 ------------------------- (18 February 2010) * Corrected malformed EACL syntax in signing_policy for CESNET-Root-CA (CZ) Changes from 1.32 to 1.33 ------------------------- (15 February 2010) * Added accredited MICS TCS eScience Personal CA and hierarchy (EU) * Updated AustrianGrid root cert with extended life time (AT) * Updated PolishGrid CA with new contact and extended root CA life time (PL) * Removed expired CNRS-Grid-FR CA (has been superseded by CNRS2-Grid-FR) (FR) * Removed obsolete CNRS, CNRS-Projets CA (superceded by CNRS2 hierarchy) (FR) * Corrected namespaces file for BEGrid2008 (BE) * Added comment line to REUNA CA signing_policy file (CL) * Added new classic CESNET hierarchy "CESNET-CA-Root" and "CESNET-CA-3" (CZ) * Updated (re-rooted) selected UNaccredited CAs in the "worthless" area Changes from 1.31 to 1.32 ------------------------- (26 October 2009) * Updated country TLD in URLs and email for AEGIS CA (RS) * Updated contact information for CALC CA (LV) * Extended life time and updated profile or TR-Grid CA cert and CRL URL (TR) * Updated and added references to CP and CPS documents for the following authorities: HellasGrid (GR), ROSA (RO), DutchGrid (NL), IRAN-GRID (IR), and BYGCA (BY) * Withdrawn obsolete CAs SWITCH-Personal-2007, SwissSign-Root, SWITCH, SwissSign-Bronze, SwissSign-Silver, SWITCH-Server-2007 (CH) * Withdrawn expired and discontinued CA RMKI (HU) * Added persistently-named links to pre-installed accredited bundles * Added selected UNaccredited CAs to the "worthless" area Changes from 1.30 to 1.31 ------------------------- (28 July 2009) * Removed expired root certificate for BEGrid (03aa0ecb) (BE) * Removed expired and discontinued User and Server issuing CAs for DFN (fe102e03 and 34f8e29c) (DE) Changes from 1.29 to 1.30 ------------------------- (2 June 2009) * Updated contact meta-data for BYGCA, hash 709bed08 (BY) * Updated URLs for DFN Grid PKI public web pages (DE) * Added accredited NCSA GridShib SLCS CA (US) * Added accredited DFN SLCS CA (DE) * Added accredited TACC MICS CA (US) * Added accredited SWITCH (QuoVadis anchored) CAs (CH) * Added accredited FNAL-SLCS CA (US) Changes from 1.28 to 1.29 ------------------------- (4 May 2009) * Restored NGO-Netrust CA (SG) * Updated AIST Grid (CRL) URL metadata (JP) * Added accredited MD-Grid CA with hash 9ff26ea4 (MD) * Added accredited HKU Grid CA with hash 4798da47 (HK) * Updated signing policy file of APAC Grid CA (AU) * Added accredited classic BYGCA (Belarus) with hash 709bed08 (BY) * Updated namespace for the APAC CA (AU, NZ) Changes from 1.27 to 1.28 ------------------------- (10 March 2009) * Added accredited classic ULAGrid CA (VE) * Added accredited TACC Root and TACC Classic CAs (US) * Updated NERSC CRL URL download location (US) * Updated DOEGrids CRL URL download location (US) * Extended life time of NorduGrid CA (1f0e8352) (DK,SE,NO,FI,IS) * Added SigmaNet CALG CA (LV) * Updated AEGIS CA root certificate to reflect TLD name change (RS) * Added CRL for SWITCH-SLCS issuing CA and updated CA cert (304cf809) (CH) Other updates to miscellaneous CAs: * Worthless CA for EGEE "GILDA" testbed added to 'worthless' section (EU) Changes from 1.26 to 1.27 ------------------------- (30 January 2008) * Corrected signing namespace for BEGrid2008 CA (BE) * Added NERSC SLCS CA (US) * ASGCCA-2007 changed signature algorithm from MD5 to SHA1 (TW) * Added new CNRS2 hierarchy: CNRS2 -> CNRS2-Projets -> CNRS2-Grid-FR (FR) * Updated IUCC root certificate (IL) * Obsoleted EstonianGrid CA (EE) Changes from 1.25 to 1.26 ------------------------- (15 December 2008) * Added accredited classic Indian Grid CA (IGCA) (hash da75f6a8) (IN) * Updated IUCC root certificate with extended life time (IL) * Updated BEGrid (web, CRL) and UCSD-PRAGMA (web) URL metadata (BE, AP/US) * New BEGrid2008 root certificate (transitional) (BE) * Extended life time of the SEE-GRID CA (SEE) * Included CRL for NCSA SLCS CA (US) * Temporally removed NGO-Netrust CA (SG) * Withdrawn expired old PK-Grid CA (d2a353a5, superseded by f5ead794) (PK) * Experimentally added Texas Advanced Computer Center TACC Root, Classic, and MICS CAs to the experimental area (US) Changes from 1.24 to 1.25 ------------------------- (29 September 2008) * Added accredited classic NCHC CA (TW) * Updated metadata for AIST GRID CA (JP) * Updated AIST GRID CA (extended life time) based on same key pair (JP) * Updated metadata for APAC Grid CA (AU) * Updated metadata (CRL URL) for NGO-Netrust CA (SG) * updates to CA contact data in info files (EU, multiple) * updated certificates in the experimental or worthless areas (misc) Changes from 1.23 to 1.24 ------------------------- (29 July 2008) * Withdrawn NCHC (hash 71a89a47) for urgent operational reasons (TW) Changes from 1.22 to 1.23 ------------------------- (28 July 2008) * Updated metadata for CyGrid (CY), SlovakGrid (SK), Grid-FR (FR) and NCSA-SLCS and MICS (US) * Removed old UKeScienceRoot (8175c1cd) and UKeScience (adcbc9ef) that were replaced in 2006 by updated root and issuing CAs (UK) * Updated LIPCA certificate, based on same key pair (PT) * Added accredited classic MREN CA (ME) * Added NGO-Netrust (SG), PRAGMA-UCSD (PRAGMA), and NCHC (TW) Changes from 1.21 to 1.22 ------------------------- (09 June 2008) * updated extensions in PK-Grid-2007 root certificate (same keypair) (PK) * added accredited classic CA Iran-Grid (hash ce33db76) (IR) * withdrawn expired ASGCCA (hash a692434d) (TW) Changes from 1.20 to 1.21 ------------------------- (16 May 2008) * IMPORTANT update of the UKeScience Root and Issuing CAs (UK) Changes from 1.19 to 1.20 ------------------------- (17 March 2008) * Added accredited classic MARGI CA (MK) * Withdrawn expired SWITCH-Server-2006 and SWITCH-Personal-2006 CAs (CH) * Corrected namespace syntax for SWITCHaai CA (CH) * Updated namespace definitions in DFN GridGermany hierarchy (DE) * Added dependency of TERENA-SCS on GTE-CyberTrust-Global-Root. Note that neither the TERENA-SCS nor the GTE-CyberTrust-Global-Root are accredited. Changes from 1.18 to 1.19 ------------------------- (31 January 2008) * Added PK-Grid-2007 Root CA certificate (will supersede d2a353a5) (PK) * New contact email address for all PK-Grid CAs (PK) * Updated and extended lifetime of ArmeSFo root cert with same keypair (AM) * New CA certificate download locations for SwissSign CAs (CH) * New classic CA UGRID (hash 0a12b607) for the Ukraine (UA) * New classic CA UNAM-grid (hash 24c3ccde) for Mexico (MX) Changes from 1.17 to 1.18 ------------------------- (16 November 2007) * ASGCCCA-2007 added to Accredited Classic set again (TW) * Withdrawn expired CA "Spain" (hash 13eab55e) (ES) * Withdrawn expired CA "SiGNET" (hash 747183a5) (SI) * Withdrawn discontinued CA "CERN" (hash fa3af1d7) (INT) * Updated SWITCH (classic) signing namespace policies (CH) * Added UNLPGrid CA (classic, hash b7bcb7b2) (AR) * Added MaGrid CA (classic, hash 7b54708e) (MA) * New contact email address for the SlovakGrid CA (SK) * New UK e-Science CA hierarchy "-2007" added (98ef0ee5 and 367b75c3) Note: during the transition period, two hierarchies (both old and "2007") will be distributed. See accompanying newsletter for details (UK) * (selected updates to repositories containing un-accredited CAs) Changes from 1.16 to 1.17 ------------------------- (8 October 2007) * Added new RomanianGRID CA classic authority (RO) * Corrected several small typographic inconsistencies (DutchDemo, apt/README.txt) * Updates list of SWITCH eligible organisations (CH) * New contact email addresses for the AustrianGrid CA (AT), CNRS (FR) and IUCC (IL) * BEGrid CA provides an http URL for CRL download (BE) * Expired INFN (49f18420) CA withdrawn (IT) * Updated ASGCCCA-2007 certificate extensions (TW) Changes from 1.15 to 1.16 ------------------------- (8 August 2007) * A new profile for Member-Integrated Credential Services (MICS), has been defined by the IGTF. A policy nstallation bundle for authorities accredited under the MICS profile has been added to the distribution. Please refer to the IGTF web site at http://www.gridpma.org/ for a description of the MICS profile. * Corrected namespaces for for APAC CA (AU) * Added REUNA CA as a classic CA (CL) * Added NCSA-MICS and NCSA-SLCS CAs (US) * Added Ecole polytechnique federale de Lausanne to SWITCH namespace (CH) * Added new KISTI (2007) classic CA (KR) * Added Latin American and Caribbean Catch-all Grid CA (TAGPMA) * Obsoleted expired UKeScience (01621954) Root CA (GB) * Obsoleted expired HellasGrid-old (efe78092) Root CA (GR) * some new roots added to the worthless area (these are not accredited CAs!) Changes from 1.14 to 1.15 ------------------------- (9 July 2007) * Temporarily removed ASGCC CA 2007 root certificate (TW) Changes from 1.13 to 1.14 ------------------------- (1 June 2007) * Discontinued the expired GridCanada-old CA with hash 5f54f417 (CA) * APAC CA signing policy now als covers BeSTGRID in New Zealand (AU) * AEGIS (Serbia) CA added (RS) * New organisations added for SWITCH Classic CA (CH) * DutchGrid robot certificates added to signing namespace (NL) * Added CA with new keypair for ASGCC CA during roll-over "ASGCC-2007" (TW) Changes from 1.12 to 1.13 ------------------------- (11 March 2007) * Added BG.ACAD CA accredited under the classic profile (BG) * Added SWITCHaai SLCS and (classic) Root CA (CH) NOTE: the SWITCHaai SLCS CA is included in the ca_policy_igtf-slcs bundle * Extended lifetime of CyGrid CA to 2013 based on same key pair (CY) * Updated ArmeSFO CA root certificate following TACAR (AM) * Discontinued old (pre-2004) LIP CA (PT) * Extended lifetime of NorduGrid CA for 2 years (DK) * Added TERENA SCS CA hierarchy to the "worthless" area. Please note that the SCS CA has not been accredited yet (EU) Changes from 1.11 to 1.12 ------------------------- (09 February 2007) * Extended life time of root certificate for SlovakGrid (SK) * Obsoleted Russian DataGrid CA also in RPM updates (RU) * Fixed SHA-1 finger print for new SiGNET CA (SI) * Add NECTEC GOC CA (TH) * Added SWITCH Personal and Server 2007 CAs, removed 2005 CAs (CH) * Extended life time of root certificate for PolishGrid (PL) * Changed CRL URL of the NAREGI CA from https to http (JP) Changes from 1.10 to 1.11 ------------------------- (10 January 2007) * updated signing policy files for SWITCH CA (CH) * change crl_url from https to http for KEK (JP) * change crl_url from https to http for AIST (JP) * extended lifetime of ESnet (+10y) and DoEGrids (+5y) CA certs (US/DoE) * withdrawn Russian DataGrid CA (has been superseded by RDIG) (RU) Changes from 1.9 to 1.10 ------------------------ (17 October 2006) * New public web page for the BEGrid CA in metadata info file (BE) * New contact email addresses for: HellasGrid and SEE-GRID (GR, SEE), INFN CA (IT), Grid-Ireland (IE), DOEGrids CA (US/DOE), ASGCCA (TW), APAC (AU) * New CERN CA added (root and on-line CA), managed by CERN IT/IS (CERN) * New INFN CA issue 2006 to replace current one (expiring 2007) (IT) * Retired SWITCH-SSSR hierarchy pending replacement of the tree (CH) * Added new organisations to the SWITCH namespace (CH) * Removed KISTI CA (KR) Changes from 1.8 to 1.9 ----------------------- (11 September 2006) * New SiGNET CA (with 2048-bit key length) and new Subject DN (SI) * New HellasGrid CA (both Root and EE) issue 2006 added (GR) * Modified CINC Root and CINC SDC CA certificate extensions: removed SubjectAltName and IssuerAltName. (CN) * Updated extendedKeyUsage and nsCertType extension in AustrianGrid CA (AT) Changes from 1.7 to 1.8 ----------------------- (07 August 2006) * added O=Universitaet St. Gallen to the list of SWITCH Organisations (CH) * added newly accredited CINC Root CA and CINC SDC Grid CA (CN) * added new root certificate for the NAREGI CA (JP) Changes from 1.6 to 1.7 ----------------------- (24 July 2006) * removed CESNET-old from accredited list and obsoleted in RPM distribution * Added new accredited SRCE (Croatia) classic CA * Added new accredited BrGrid (Brazil) classic CA * New root and online CA certificates for updated UKeScience CA Changes from 1.5 to 1.6 ----------------------- (20 June 2006) * Removed NAREGI CA with too-short root certificate key length Changes from 1.4 to 1.5 ----------------------- (19 June 2006) * new CRL download URL for the RDIG CA * extended lifetime of root trust anchor for the GermanGrid CA (GridKa CA) old expiration date: Jun 10 13:45:54 2007 GMT new expiration date: Jun 10 13:45:54 2014 GMT * extended lifetime of root trust anchor for the Grid-Ireland CA (TCD) old expiration date: Jul 27 17:10:40 2007 GMT new expiration date: Jul 27 17:10:40 2012 GMT * ASGCC CA no longer authoritative for "/C=CN/O=IHEP/OU=CC/*" * AIST CA updated with new X.509v3 extensions (same keypair) * change in list of supported organisations for SWITCH CA (Switserland) Changes from 1.2 to 1.4 ----------------------- (15 May 2006) * increased version number of the distribution by two to accomodate RPM version inconsistencies in the release system of the LCG project * Extended life time for the CA root certificate of the NorduGrid CA Changes from 1.1 to 1.2 ----------------------- (13 Apr 2006) * new contact email address for KISTI CA * consistent quote formatting for pkIRISgrid signing_policy file * updated DutchDemo CA root certificate (in the worthless area) * suspended SWITCH Silver-root based hierarchy, since CRLs are not ready * added new organisation to the SWITCH namespace * changed ArmeSFO CRL download location to new server * new pkIRISGrid root certificate (same keypair) from TACAR added * added extra double quotes to the UK eScience signing policy file Changes from 1.1 R1 to 1.1 R2 ----------------------------- (22 Feb 2006) NOTE: THERE ARE NO CHANGES TO THE CONTENT IN THIS SUB-RELEASE * Corrected typo in the obsoletion of the old ca_CNRS-DataGrid * Improved understandability of the igtf-policy-installation-bundle Changes from 1.0 to 1.1 ----------------------- (20 Feb 2006) * Corrected malformed signing_policy file for CESNET-old * New (generic) email address for the LIP and LIPCA CAs * Expired Cygrid-old and CNRS-Datagrid CAs. The IGTF-classic meta-RPM package implicitly obsoletes there two discontinued CAs * Added alternative syntax for namespace constraints in .namespaces files. See http://www.eugridpma.org/documentation/ for details * Added pkIRISGrid CA as an accredited:classic CA * Corrected SWITCH CA hierarchy, adding the SWITCH Server and Personal CAs inbetween the SWITCH CA and the end-entities * New 2006+ SWITCH Personal and Server CAs in the SwissSign Root-originating hierarchy * New SwissSign Silver-Root and hierarchy added * New authorities from the APGridPMA: APAC GRID, KEK GRID, and NAREGI CA * New GridCanada CA root, renamed the "5f54f417" CA to GridCanada-old * New root cert (with same keypair) for the worthless DutchDemo CA * Pre-installed CA tarballs added for the classic and SLCS profiles Changes from 0.32 to 1.0 ------------------------- (25 October 2005) * IGTF policy metapackages replace EUGridPMA-only ones. The legacy "ca_policy_eugridpma" RPMs now depend on their IGTF counterparts. The EUGridPMA specific files will be withdrawn in a future release. * New directory structure moves all data regarding accredited authorities to the singe "accredited/" directory (including the policy meta-RPM) * Tar-ball installation now supports multiple profiles and targets * Meta-data (".info") for each CA added, and installed in trusted directory * The "experimental" profile supercedes the "others/" area in the distribution (note: this affects the FNAL_KCA, which will shortly be added as an accredited authority under the new Short-Lived Credential Services profile) * Discontinued authorities are no longer distributed * Only accredited authority RPM packages are signed by the PMA's GPG key * APGridPMA accreditations added: KISTI and AIST * New EUGridPMA accreditations: TR-Grid and BalticGrid * CRL URL for SiGNET changed to http instead of https * Added compatibility namespace for NIIF "/C=HU/O=NIIF CA/OU=NIIF/OU=GRID/*" Changes from 0.31 to 0.32 ------------------------- (23 August 2005) * Corrected namespace for the new CESNET CA * New RDIG root certificate with a 2048 bit key length for increased compatibility with existing software suites. Changes from 0.30 to 0.31 ------------------------- (15 July 2005) * Corrected packaging problem which left RDIG out of accredited CA group * renamed the "unknown/" directory to "discontinued/" * Added explanatory text to the distribution regarding the "other/", "worthless/" and "discontinued/" directories Changes from 0.29 to 0.30 ------------------------- (12 July 2005) * Added IHEP CA for China * Added DFN GridGermany CA (Root, User and Server CAs) * Added RDIG CA (will replace the Russian DataGrid CA) * New namespace allocation for the IUCC CA: "/C=IL/O=IUCC/*" * Added updated CESNET Root cert and renamed the old one to "CESNET-old" for legacy compatibility. The new CESNET CA started operating on June 17th * FNAL root CA service has been discontinued and thus removed from the accredited list * RPMs are now signed (experimentally) with PGP keyID 3CDBBC71. This key, the "EUGridPMA Distribution Signing Key 3" can be obtained from the popular PGP key servers, where it has been signed by the current PMA Chair, David Groep. It can also be downloaded from the web distribution site: GPG-KEY-EUGridPMA-RPM-3 Changes from 0.28 to 0.29 ------------------------- (27 April 2005) * New root certificate for the NIIF/Hungarnet CA, following the TACAR update * Preliminary inclusion of the SWITCH CA certificates. Note that the ordering of the components in the end-entity DN will currently prevent the end-entity certs to be validated (this is being addressed by SwissSign) * Modified layout of the tar distribution, in preparation for support of multiple authentication profiles Changes from 0.27 to 0.28 ------------------------- (6 April 2005) * Added the root certs for the newly accredited CAs "AustrianGrid" and "NIIF/Hungarnet" * updated signing policy file of SiGNET CA to handle new emailAddress DN component name * added "BalticGrid CA" in the "worthless" section, for experimentation by AndersW * UKeScience CA changed to SHA1 digest for the root certificate * new CRL and CA URLs for both CyGrid CAs Changes from 0.26 to 0.27 ------------------------- (22 February 2005) * added additional entry to UKeScience signing policy file to accomodate openssl 0.9.7c rendering of emailAddress component in the subject DN * updated DutchGrid CA cert from web site: extended lifetime to 2021 and changed digest algorithm from MD5 to SHA1 * added a tar-ball distribution with a configure scrfipt for convenience * Removed DOESG-Root from the accredited CA list, as per request of of the CA on January 28, 2005. There are no certs left issued by this CA. * Added Grid-FR CA by CNRS, and extended the signing_policy file of the associated CNRS-Projets CA. * A new root certificate for the CyGrid CA (with a new subject name). The old CyGrid CA has been moved to "-old". Both are in the accredited list. The new CRL location has been added. Changes from 0.25 to 0.26 ------------------------- * Added KFKI-RMKI-CA for Hungary * removed Spain-old Changes from 0.24 to 0.25 ------------------------- * Added the new Spain CA with hash 13eab55e and alias: Spain * Rename the Spain CA to Spain-old (expires on 2004-11-12) Changes from 0.23 to 0.24 ------------------------- * Added the Slovenian SiGNET CA with hash 747183a and alias: SiGNET * Added the SEE-GRID CA with hash 468d15b3 and alias: SEE-GRID * Added the Estonian Grid CA, with hash 566bf40f and alias: EstonianGrid * Added the updated LIP CA (called "LIPCA") with hash 11b4a5a2, which will supercede the old one with hash 41380387. The "LIP" one will remain in the repository will the end of 2005. * Added RPM requirements that reflects CA chaining: CNRS-Projects requires CNRS CNRS-DataGrid requires CNRS-Projects DOEGrids requires ESnet Changes from 0.22 to 0.23 ------------------------- * Added the root certificate for the PK-Grid CA, with MD5 fingerprint 24:A0:A7:DD:46:1B:EB:AE:7F:33:CA:5F:FA:D7:37:F8 Changes from 0.21 to 0.22 ------------------------- * A new root certificate for "Russia" (Russian DataGrid CA) has replaced the one that was valid till July 18th, 2004. The old MD5 fingerprint was AE:3D:F5:F2:DD:CF:B0:10:99:7A:6D:74:3C:FB:4A:22, the new one, valid till July 19th, 2009 is: A4:56:E2:01:E6:DB:86:F6:FC:5B:E5:6C:9D:A5:E1:06. The new root cert was received in an S/MIME signed message by Lev Shamardin, signed with a personal cert issued by the old root. The old root cert has been withdrawn from the package entirely. * The BEGrid signing_policy is not resistant against the OpenSSL 0.9.6 to 0.9.7 namechange in the emailAddress DN component. Changes from 0.20 to 0.21 ------------------------- * Added the IUCC and BEGrid root certs igtf-policy-installation-bundle-1.104/configure0000755001343500074740000000405713614364142021126 0ustar davidgdavidg#! /bin/sh # # INSTALL=install PREFIX=/etc/grid-security/certificates MKDIR=mkdir LN=ln SED=sed PROFILE=ANY PROFILES="" while : do case "$1" in --prefix=* ) PREFIX=`echo $1 | sed -e 's/--prefix=//'` shift ;; --with-mkdir=* ) MKDIR=`echo $1 | sed -e 's/--with-mkdir=//'` shift ;; --with-ln=* ) LN=`echo $1 | sed -e 's/--with-ln=//'` shift ;; --with-install=* ) INSTALL=`echo $1 | sed -e 's/--with-install=//'` shift ;; --with-profile=* ) PROFILE=`echo $1 | sed -e 's/--with-profile=//'` PROFILES="install-$PROFILE $PROFILES" shift ;; --with-authority=* ) AUTH=`echo $1 | sed -e 's/--with-authority=//'` AUTHS="$AUTH $AUTHS" shift ;; -- ) shift ; break ;; -* ) echo "Unknown argument to $0" ; exit 1 ;; * ) break ;; esac done case "$#" in 0 ) ;; * ) cat < Makefile echo "Configuration of the IGTF bundle complete" echo "use \"make install\" to install the selected authorities in" echo "$PREFIX."