CBL-Mariner/SPECS/ca-certificates
CBL-Mariner-Bot 971e0e8a4d
[AUTOUPGRADE-CORE] Upgrade ca-certificates Msft cert change (#7499)
2024-01-26 16:02:47 -08:00
..
LICENSE
README.edk2
README.etc
README.extr
README.java
README.openssl
README.pem
README.src
README.usr
bundle2pem.sh
ca-certificates.signatures.json [AUTOUPGRADE-CORE] Upgrade ca-certificates Msft cert change (#7499) 2024-01-26 16:02:47 -08:00
ca-certificates.spec [AUTOUPGRADE-CORE] Upgrade ca-certificates Msft cert change (#7499) 2024-01-26 16:02:47 -08:00
cert2certdata.sh [AUTO-CHERRYPICK] Updated `ca-certificates-base`. - branch main (#6931) 2023-12-07 08:12:51 -08:00
certdata.base.txt [AUTO-CHERRYPICK] Updated `ca-certificates-base`. - branch main (#6931) 2023-12-07 08:12:51 -08:00
certdata.microsoft.txt [AUTOUPGRADE-CORE] Upgrade ca-certificates Msft cert change (#7499) 2024-01-26 16:02:47 -08:00
certdata2pem.py
check_certs.sh
fetch.sh
nssckbi.h
pem2bundle.sh
sort-blocks.py
sources
trust-fixes
update-ca-trust
update-ca-trust.8.txt

README.usr

This directory /usr/share/pki/ca-trust-source/ contains CA certificates and 
trust settings in the PEM file format. The trust settings found here will be
interpreted with a low priority - lower than the ones found in 
/etc/pki/ca-trust/source/ .

=============================================================================
QUICK HELP: To add a certificate in the simple PEM or DER file formats to the
            list of CAs trusted on the system:

            Copy it to the
                    /usr/share/pki/ca-trust-source/anchors/
            subdirectory, and run the
                    update-ca-trust
            command.

            If your certificate is in the extended BEGIN TRUSTED file format,
            then place it into the main source/ directory instead.
=============================================================================

Please refer to the update-ca-trust(8) manual page for additional information.