From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on sa.int.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-1.5 required=5.0 tests=AWL,BAYES_00, DNS_FROM_OPENWHOIS, RCVD_IN_DNSWL_LOW, SPF_PASS autolearn=no version=3.2.5 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:to:content-type:content-transfer-encoding; bh=XX+BXItI86pdAHtmqfJTiBzUS2QzMMJ4JjZbQMkVvE0=; b=NkebAn0vGgAWqUzNIP9QEIMNYBLs0cuKtE61eJdMrsIOldJEsnGuK14+o++UflX0Rk xdQqK01IG948uyeLp1zeWwk/PFKa7TfL96sFx0O4TeZD5j0kVYITJIqU2EQl42Z2Vg8y 9JGSHL7PfyNRWcIAGv+GlQF7Lcz0blDiuCKqQ= MIME-Version: 1.0 Sender: nick.grechukh@gmail.com Date: Wed, 12 Oct 2011 19:28:24 +0300 X-Google-Sender-Auth: eM2nexme20JRpvMkpYvA42Xmdqg Message-ID: From: "Mykola S. Grechukh" To: ALT Linux Team development discussions Content-Type: text/plain; charset=KOI8-R Content-Transfer-Encoding: quoted-printable Subject: [devel] system-wide store of well-known CA X-BeenThere: devel@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux Team development discussions List-Id: ALT Linux Team development discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Oct 2011 16:28:31 -0000 Archived-At: List-Archive: List-Post: =FA=C4=D2=C1=D7=D3=D4=D7=D5=CA=D4=C5, =C1 =D5 =CE=C1=D3 =D0=D2=C5=C4=D5=D3=CD=CF=D4=D2=C5=CE=CF =DE=D4=CF-=CE=C9= =C2=D5=C4=D8 =C4=CC=D1 =D3=C1=C2=D6=C1? =E1 =D4=CF =D7=CF=D4 libpurple =D4=C1=D3=CB=C1=C5=D4 =D3 =D3=CF=C2=CF=CA, = =CB=C1=CB =D7=D9=D1=D3=CE=C9=CC=CF=D3=D8: /usr/share/purple/ca-certs/AOL_Member_CA.pem /usr/share/purple/ca-certs/AddTrust_External_Root.pem /usr/share/purple/ca-certs/America_Online_Root_Certification_Authority_1.pe= m /usr/share/purple/ca-certs/CAcert_Class3.pem /usr/share/purple/ca-certs/CAcert_Root.pem /usr/share/purple/ca-certs/Deutsche_Telekom_Root_CA_2.pem /usr/share/purple/ca-certs/DigiCertHighAssuranceCA-3.pem /usr/share/purple/ca-certs/Entrust.net_Secure_Server_CA.pem /usr/share/purple/ca-certs/Equifax_Secure_CA.pem /usr/share/purple/ca-certs/Equifax_Secure_Global_eBusiness_CA-1.pem /usr/share/purple/ca-certs/GTE_CyberTrust_Global_Root.pem /usr/share/purple/ca-certs/Go_Daddy_Class_2_CA.pem /usr/share/purple/ca-certs/Microsoft_Internet_Authority.pem /usr/share/purple/ca-certs/Microsoft_Internet_Authority_2010.pem /usr/share/purple/ca-certs/Microsoft_Secure_Server_Authority.pem /usr/share/purple/ca-certs/Microsoft_Secure_Server_Authority_2010.pem /usr/share/purple/ca-certs/StartCom_Certification_Authority.pem /usr/share/purple/ca-certs/StartCom_Free_SSL_CA.pem /usr/share/purple/ca-certs/Thawte_Premium_Server_CA.pem /usr/share/purple/ca-certs/Thawte_Primary_Root_CA.pem /usr/share/purple/ca-certs/ValiCert_Class_2_VA.pem /usr/share/purple/ca-certs/VeriSign_Class3_Extended_Validation_CA.pem /usr/share/purple/ca-certs/VeriSign_Class_3_Public_Primary_Certification_Au= thority_-_G2.pem /usr/share/purple/ca-certs/VeriSign_Class_3_Public_Primary_Certification_Au= thority_-_G5.pem /usr/share/purple/ca-certs/VeriSign_Class_3_Public_Primary_Certification_Au= thority_-_G5_2.pem /usr/share/purple/ca-certs/VeriSign_International_Server_Class_3_CA.pem /usr/share/purple/ca-certs/Verisign_Class3_Primary_CA.pem /usr/share/purple/ca-certs/Verisign_RSA_Secure_Server_CA.pem --=20 Mykola Grechukh CTO, Satelliz-Ukraine