RUN: /bin/echo ['echo', 'Forking build subprocess...'] Forking build subprocess... RUN: /usr/share/launchpad-buildd/slavebin/unpack-chroot ['unpack-chroot', '224234b86051aa8a59829ee3bea44606ea3355db', '/home/buildd/filecache-default/dc88c2cf2ca9f70d7c62593299c4478688bb67d2'] Uncompressing the tarball... Synching the system clock with the buildd NTP service... 18 Aug 16:00:59 ntpdate[16545]: adjust time server 10.122.37.1 offset -0.000206 sec Unpacking chroot for build 224234b86051aa8a59829ee3bea44606ea3355db RUN: /usr/share/launchpad-buildd/slavebin/mount-chroot ['mount-chroot', '224234b86051aa8a59829ee3bea44606ea3355db'] Mounting chroot for build 224234b86051aa8a59829ee3bea44606ea3355db RUN: /usr/share/launchpad-buildd/slavebin/override-sources-list ['override-sources-list', '224234b86051aa8a59829ee3bea44606ea3355db', 'deb http://private-ppa.buildd/ubuntu-security/ppa/ubuntu hardy main', 'deb http://ftpmaster.internal/ubuntu hardy main universe', 'deb http://ftpmaster.internal/ubuntu hardy-security main universe'] Overriding sources.list in build-224234b86051aa8a59829ee3bea44606ea3355db RUN: /usr/share/launchpad-buildd/slavebin/update-debian-chroot ['update-debian-chroot', '224234b86051aa8a59829ee3bea44606ea3355db'] Updating debian chroot for build 224234b86051aa8a59829ee3bea44606ea3355db Get:1 http://ftpmaster.internal hardy Release.gpg [189B] Get:2 http://private-ppa.buildd hardy Release.gpg [307B] Get:3 http://ftpmaster.internal hardy-security Release.gpg [189B] Get:4 http://private-ppa.buildd hardy Release [65.9kB] Get:5 http://ftpmaster.internal hardy Release [65.9kB] Ign http://private-ppa.buildd hardy Release Ign http://ftpmaster.internal hardy Release Get:6 http://private-ppa.buildd hardy/main Packages [464B] Get:7 http://ftpmaster.internal hardy-security Release [58.5kB] Ign http://ftpmaster.internal hardy-security Release Get:8 http://ftpmaster.internal hardy/main Packages [1178kB] Get:9 http://ftpmaster.internal hardy/universe Packages [4293kB] Get:10 http://ftpmaster.internal hardy-security/main Packages [280kB] Get:11 http://ftpmaster.internal hardy-security/universe Packages [132kB] Fetched 6075kB in 4s (1264kB/s) Reading package lists... W: GPG error: http://private-ppa.buildd hardy Release: Could not execute '/usr/bin/gpgv' to verify signature (is gnupg installed?) W: GPG error: http://ftpmaster.internal hardy Release: Could not execute '/usr/bin/gpgv' to verify signature (is gnupg installed?) W: GPG error: http://ftpmaster.internal hardy-security Release: Could not execute '/usr/bin/gpgv' to verify signature (is gnupg installed?) W: You may want to run apt-get update to correct these problems Reading package lists... Building dependency tree... Reading state information... The following packages will be upgraded: apt apt-transport-https cpp-4.2 dash dpkg dpkg-dev g++-4.2 gcc-4.2 gcc-4.2-base gzip libc6 libc6-dev libcurl3-gnutls libgcc1 libgnutls13 libgomp1 libkrb53 libldap-2.4-2 libsasl2-2 libsasl2-modules libssl0.9.8 libstdc++6 libstdc++6-4.2-dev linux-libc-dev login passwd perl perl-base perl-modules python2.5-minimal 30 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 33.3MB of archives. After this operation, 102kB disk space will be freed. WARNING: The following packages cannot be authenticated! dash dpkg gzip login perl-modules linux-libc-dev libc6-dev libstdc++6-4.2-dev g++-4.2 gcc-4.2 cpp-4.2 libgomp1 gcc-4.2-base libgcc1 libstdc++6 libc6 perl perl-base apt passwd python2.5-minimal libgnutls13 libssl0.9.8 libsasl2-2 libsasl2-modules libkrb53 libldap-2.4-2 libcurl3-gnutls apt-transport-https dpkg-dev Authentication warning overridden. Get:1 http://ftpmaster.internal hardy-security/main dash 0.5.4-8ubuntu1.1 [88.0kB] Get:2 http://ftpmaster.internal hardy-security/main dpkg 1.14.16.6ubuntu4.1 [2296kB] Get:3 http://ftpmaster.internal hardy-security/main gzip 1.3.12-3.2ubuntu0.1 [101kB] Get:4 http://ftpmaster.internal hardy-security/main login 1:4.0.18.2-1ubuntu2.2 [255kB] Get:5 http://ftpmaster.internal hardy-security/main perl-modules 5.8.8-12ubuntu0.4 [2300kB] Get:6 http://ftpmaster.internal hardy-security/main linux-libc-dev 2.6.24-28.73 [710kB] Get:7 http://ftpmaster.internal hardy-security/main libc6-dev 2.7-10ubuntu6 [3346kB] Get:8 http://ftpmaster.internal hardy-security/main libstdc++6-4.2-dev 4.2.4-1ubuntu3 [1187kB] Get:9 http://ftpmaster.internal hardy-security/main g++-4.2 4.2.4-1ubuntu3 [2784kB] Get:10 http://ftpmaster.internal hardy-security/main gcc-4.2 4.2.4-1ubuntu3 [596kB] Get:11 http://ftpmaster.internal hardy-security/main cpp-4.2 4.2.4-1ubuntu3 [2486kB] Get:12 http://ftpmaster.internal hardy-security/main libgomp1 4.2.4-1ubuntu3 [12.0kB] Get:13 http://ftpmaster.internal hardy-security/main gcc-4.2-base 4.2.4-1ubuntu3 [100kB] Get:14 http://ftpmaster.internal hardy-security/main libgcc1 1:4.2.4-1ubuntu3 [23.3kB] Get:15 http://ftpmaster.internal hardy-security/main libstdc++6 4.2.4-1ubuntu3 [332kB] Get:16 http://ftpmaster.internal hardy-security/main libc6 2.7-10ubuntu6 [4308kB] Get:17 http://ftpmaster.internal hardy-security/main perl 5.8.8-12ubuntu0.4 [3379kB] Get:18 http://ftpmaster.internal hardy-security/main perl-base 5.8.8-12ubuntu0.4 [779kB] Get:19 http://ftpmaster.internal hardy-security/main apt 0.7.9ubuntu17.2 [1651kB] Get:20 http://ftpmaster.internal hardy-security/main passwd 1:4.0.18.2-1ubuntu2.2 [566kB] Get:21 http://ftpmaster.internal hardy-security/main python2.5-minimal 2.5.2-2ubuntu6.1 [1176kB] Get:22 http://ftpmaster.internal hardy-security/main libgnutls13 2.0.4-1ubuntu2.6 [308kB] Get:23 http://ftpmaster.internal hardy-security/main libssl0.9.8 0.9.8g-4ubuntu3.9 [2831kB] Get:24 http://ftpmaster.internal hardy-security/main libsasl2-2 2.1.22.dfsg1-18ubuntu2.1 [105kB] Get:25 http://ftpmaster.internal hardy-security/main libsasl2-modules 2.1.22.dfsg1-18ubuntu2.1 [150kB] Get:26 http://ftpmaster.internal hardy-security/main libkrb53 1.6.dfsg.3~beta1-2ubuntu1.5 [461kB] Get:27 http://ftpmaster.internal hardy-security/main libldap-2.4-2 2.4.9-0ubuntu0.8.04.4 [183kB] Get:28 http://ftpmaster.internal hardy-security/main libcurl3-gnutls 7.18.0-1ubuntu2.2 [199kB] Get:29 http://ftpmaster.internal hardy-security/main apt-transport-https 0.7.9ubuntu17.2 [60.6kB] Get:30 http://ftpmaster.internal hardy-security/main dpkg-dev 1.14.16.6ubuntu4.1 [559kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 33.3MB in 1s (16.8MB/s) (Reading database ... 9516 files and directories currently installed.) Preparing to replace dash 0.5.4-8ubuntu1 (using .../dash_0.5.4-8ubuntu1.1_i386.deb) ... Unpacking replacement dash ... Setting up dash (0.5.4-8ubuntu1.1) ... (Reading database ... 9516 files and directories currently installed.) Preparing to replace dpkg 1.14.16.6ubuntu3 (using .../dpkg_1.14.16.6ubuntu4.1_i386.deb) ... Unpacking replacement dpkg ... Setting up dpkg (1.14.16.6ubuntu4.1) ... (Reading database ... 9516 files and directories currently installed.) Preparing to replace gzip 1.3.12-3.2 (using .../gzip_1.3.12-3.2ubuntu0.1_i386.deb) ... Unpacking replacement gzip ... Setting up gzip (1.3.12-3.2ubuntu0.1) ... (Reading database ... 9516 files and directories currently installed.) Preparing to replace login 1:4.0.18.2-1ubuntu2 (using .../login_1%3a4.0.18.2-1ubuntu2.2_i386.deb) ... Unpacking replacement login ... Setting up login (1:4.0.18.2-1ubuntu2.2) ... (Reading database ... 9516 files and directories currently installed.) Preparing to replace perl-modules 5.8.8-12 (using .../perl-modules_5.8.8-12ubuntu0.4_all.deb) ... Unpacking replacement perl-modules ... Preparing to replace linux-libc-dev 2.6.24-16.30 (using .../linux-libc-dev_2.6.24-28.73_i386.deb) ... Unpacking replacement linux-libc-dev ... Preparing to replace libc6-dev 2.7-10ubuntu3 (using .../libc6-dev_2.7-10ubuntu6_i386.deb) ... Unpacking replacement libc6-dev ... Preparing to replace libstdc++6-4.2-dev 4.2.3-2ubuntu7 (using .../libstdc++6-4.2-dev_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement libstdc++6-4.2-dev ... Preparing to replace g++-4.2 4.2.3-2ubuntu7 (using .../g++-4.2_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement g++-4.2 ... Preparing to replace gcc-4.2 4.2.3-2ubuntu7 (using .../gcc-4.2_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement gcc-4.2 ... Preparing to replace cpp-4.2 4.2.3-2ubuntu7 (using .../cpp-4.2_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement cpp-4.2 ... Preparing to replace libgomp1 4.2.3-2ubuntu7 (using .../libgomp1_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement libgomp1 ... Preparing to replace gcc-4.2-base 4.2.3-2ubuntu7 (using .../gcc-4.2-base_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement gcc-4.2-base ... Setting up gcc-4.2-base (4.2.4-1ubuntu3) ... (Reading database ... 9515 files and directories currently installed.) Preparing to replace libgcc1 1:4.2.3-2ubuntu7 (using .../libgcc1_1%3a4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement libgcc1 ... Setting up libgcc1 (1:4.2.4-1ubuntu3) ... Processing triggers for libc6 ... ldconfig deferred processing now taking place (Reading database ... 9515 files and directories currently installed.) Preparing to replace libstdc++6 4.2.3-2ubuntu7 (using .../libstdc++6_4.2.4-1ubuntu3_i386.deb) ... Unpacking replacement libstdc++6 ... Setting up libstdc++6 (4.2.4-1ubuntu3) ... Processing triggers for libc6 ... ldconfig deferred processing now taking place (Reading database ... 9515 files and directories currently installed.) Preparing to replace libc6 2.7-10ubuntu3 (using .../libc6_2.7-10ubuntu6_i386.deb) ... Unpacking replacement libc6 ... Setting up libc6 (2.7-10ubuntu6) ... Processing triggers for libc6 ... ldconfig deferred processing now taking place (Reading database ... 9515 files and directories currently installed.) Preparing to replace perl 5.8.8-12 (using .../perl_5.8.8-12ubuntu0.4_i386.deb) ... Unpacking replacement perl ... Preparing to replace perl-base 5.8.8-12 (using .../perl-base_5.8.8-12ubuntu0.4_i386.deb) ... Unpacking replacement perl-base ... Setting up perl-base (5.8.8-12ubuntu0.4) ... (Reading database ... 9495 files and directories currently installed.) Preparing to replace apt 0.7.9ubuntu17 (using .../apt_0.7.9ubuntu17.2_i386.deb) ... Unpacking replacement apt ... Setting up apt (0.7.9ubuntu17.2) ... Installing new version of config file /etc/cron.daily/apt ... Processing triggers for libc6 ... ldconfig deferred processing now taking place (Reading database ... 9495 files and directories currently installed.) Preparing to replace passwd 1:4.0.18.2-1ubuntu2 (using .../passwd_1%3a4.0.18.2-1ubuntu2.2_i386.deb) ... Unpacking replacement passwd ... Setting up passwd (1:4.0.18.2-1ubuntu2.2) ... (Reading database ... 9495 files and directories currently installed.) Preparing to replace python2.5-minimal 2.5.2-2ubuntu4 (using .../python2.5-minimal_2.5.2-2ubuntu6.1_i386.deb) ... Unpacking replacement python2.5-minimal ... Setting up python2.5-minimal (2.5.2-2ubuntu6.1) ... (Reading database ... 9495 files and directories currently installed.) Preparing to replace libgnutls13 2.0.4-1ubuntu2 (using .../libgnutls13_2.0.4-1ubuntu2.6_i386.deb) ... Unpacking replacement libgnutls13 ... Preparing to replace libssl0.9.8 0.9.8g-4ubuntu3 (using .../libssl0.9.8_0.9.8g-4ubuntu3.9_i386.deb) ... Unpacking replacement libssl0.9.8 ... Preparing to replace libsasl2-2 2.1.22.dfsg1-18ubuntu2 (using .../libsasl2-2_2.1.22.dfsg1-18ubuntu2.1_i386.deb) ... Unpacking replacement libsasl2-2 ... Preparing to replace libsasl2-modules 2.1.22.dfsg1-18ubuntu2 (using .../libsasl2-modules_2.1.22.dfsg1-18ubuntu2.1_i386.deb) ... Unpacking replacement libsasl2-modules ... Preparing to replace libkrb53 1.6.dfsg.3~beta1-2ubuntu1 (using .../libkrb53_1.6.dfsg.3~beta1-2ubuntu1.5_i386.deb) ... Unpacking replacement libkrb53 ... Preparing to replace libldap-2.4-2 2.4.7-6ubuntu3 (using .../libldap-2.4-2_2.4.9-0ubuntu0.8.04.4_i386.deb) ... Unpacking replacement libldap-2.4-2 ... Preparing to replace libcurl3-gnutls 7.18.0-1ubuntu2 (using .../libcurl3-gnutls_7.18.0-1ubuntu2.2_i386.deb) ... Unpacking replacement libcurl3-gnutls ... Preparing to replace apt-transport-https 0.7.9ubuntu17 (using .../apt-transport-https_0.7.9ubuntu17.2_i386.deb) ... Unpacking replacement apt-transport-https ... Preparing to replace dpkg-dev 1.14.16.6ubuntu3 (using .../dpkg-dev_1.14.16.6ubuntu4.1_all.deb) ... Unpacking replacement dpkg-dev ... Setting up linux-libc-dev (2.6.24-28.73) ... Setting up libc6-dev (2.7-10ubuntu6) ... Setting up cpp-4.2 (4.2.4-1ubuntu3) ... Setting up libgomp1 (4.2.4-1ubuntu3) ... Setting up gcc-4.2 (4.2.4-1ubuntu3) ... Setting up libgnutls13 (2.0.4-1ubuntu2.6) ... Setting up libssl0.9.8 (0.9.8g-4ubuntu3.9) ... Setting up libkrb53 (1.6.dfsg.3~beta1-2ubuntu1.5) ... Setting up perl-modules (5.8.8-12ubuntu0.4) ... Setting up libstdc++6-4.2-dev (4.2.4-1ubuntu3) ... Setting up libsasl2-modules (2.1.22.dfsg1-18ubuntu2.1) ... Setting up libsasl2-2 (2.1.22.dfsg1-18ubuntu2.1) ... Setting up libldap-2.4-2 (2.4.9-0ubuntu0.8.04.4) ... Setting up libcurl3-gnutls (7.18.0-1ubuntu2.2) ... Setting up apt-transport-https (0.7.9ubuntu17.2) ... Setting up perl (5.8.8-12ubuntu0.4) ... Setting up g++-4.2 (4.2.4-1ubuntu3) ... Setting up dpkg-dev (1.14.16.6ubuntu4.1) ... Processing triggers for libc6 ... ldconfig deferred processing now taking place RUN: /usr/share/launchpad-buildd/slavebin/sbuild-package ['sbuild-package', '224234b86051aa8a59829ee3bea44606ea3355db', 'hardy', '--nolog', '--batch', '--archive=ubuntu', '--dist=hardy', '-A', '--purpose=PRIMARY', '--comp=universe', 'ca-certificates-java_20100406ubuntu1~hardy1.dsc'] Initiating build 224234b86051aa8a59829ee3bea44606ea3355db with 2 processor cores. Automatic build of ca-certificates-java_20100406ubuntu1~hardy1 on palmer by sbuild/i386 1.170.5 Build started at 20100818-1601 ****************************************************************************** ca-certificates-java_20100406ubuntu1~hardy1.dsc exists in cwd sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) ** Using build dependencies supplied by package: Build-Depends: ca-certificates (>= 20070303), debhelper (>= 6), openjdk-6-jre-headless (>= 6b16-1.6.1-2) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) sh: gcc: not found dpkg-architecture: warning: Couldn't determine gcc system type, falling back to default (native compilation) Checking for already installed source dependencies... ca-certificates: missing debhelper: missing openjdk-6-jre-headless: missing Checking for source dependency conflicts... /usr/bin/sudo /usr/bin/apt-get --purge $CHROOT_OPTIONS -q -y install ca-certificates debhelper openjdk-6-jre-headless Reading package lists... Building dependency tree... Reading state information... The following extra packages will be installed: ca-certificates-java file gettext gettext-base html2text intltool-debian java-common libcupsys2 libfreetype6 libjpeg62 liblcms1 libmagic1 libnspr4-0d libnss3-1d libsqlite3-0 openjdk-6-jre-lib openssl po-debconf tzdata-java Suggested packages: dh-make cvs gettext-doc equivs cupsys-common libfreetype6-dev liblcms-utils libnss-mdns sun-java6-fonts ttf-baekmuk ttf-unfonts ttf-unfonts-core ttf-bengali-fonts ttf-dejavu-core ttf-indic-fonts-core ttf-kannada-fonts ttf-oriya-fonts ttf-sazanami-gothic ttf-kochi-gothic ttf-sazanami-mincho ttf-kochi-mincho ttf-telugu-fonts ttf-wqy-microhei ttf-wqy-zenhei openssl-doc Recommended packages: curl wget lynx libmail-sendmail-perl libcompress-zlib-perl libmail-box-perl The following NEW packages will be installed: ca-certificates ca-certificates-java debhelper file gettext gettext-base html2text intltool-debian java-common libcupsys2 libfreetype6 libjpeg62 liblcms1 libmagic1 libnspr4-0d libnss3-1d libsqlite3-0 openjdk-6-jre-headless openjdk-6-jre-lib openssl po-debconf tzdata-java 0 upgraded, 22 newly installed, 0 to remove and 0 not upgraded. Need to get 39.2MB of archives. After this operation, 112MB of additional disk space will be used. WARNING: The following packages cannot be authenticated! gettext-base libsqlite3-0 libmagic1 file openssl ca-certificates ca-certificates-java html2text gettext intltool-debian po-debconf debhelper java-common libcupsys2 libfreetype6 libjpeg62 liblcms1 libnspr4-0d libnss3-1d openjdk-6-jre-lib tzdata-java openjdk-6-jre-headless Authentication warning overridden. Get:1 http://private-ppa.buildd hardy/main ca-certificates-java 20100406ubuntu1~hardy0 [3358B] Get:2 http://ftpmaster.internal hardy/main gettext-base 0.17-2ubuntu1 [72.8kB] Get:3 http://ftpmaster.internal hardy/main libsqlite3-0 3.4.2-2 [212kB] Get:4 http://ftpmaster.internal hardy/main libmagic1 4.21-3 [333kB] Get:5 http://ftpmaster.internal hardy/main file 4.21-3 [39.8kB] Get:6 http://ftpmaster.internal hardy-security/main openssl 0.9.8g-4ubuntu3.9 [385kB] Get:7 http://ftpmaster.internal hardy/main ca-certificates 20070303-0ubuntu3 [98.4kB] Get:8 http://ftpmaster.internal hardy/main html2text 1.3.2a-3build2 [87.6kB] Get:9 http://ftpmaster.internal hardy/main gettext 0.17-2ubuntu1 [1978kB] Get:10 http://ftpmaster.internal hardy/main intltool-debian 0.35.0+20060710.1 [31.6kB] Get:11 http://ftpmaster.internal hardy/main po-debconf 1.0.10 [232kB] Get:12 http://ftpmaster.internal hardy/main debhelper 6.0.4ubuntu1 [516kB] Get:13 http://ftpmaster.internal hardy/main java-common 0.28ubuntu3 [78.2kB] Get:14 http://ftpmaster.internal hardy-security/main libcupsys2 1.3.7-1ubuntu3.11 [176kB] Get:15 http://ftpmaster.internal hardy-security/main libfreetype6 2.3.5-1ubuntu4.8.04.4 [347kB] Get:16 http://ftpmaster.internal hardy/main libjpeg62 6b-14 [86.5kB] Get:17 http://ftpmaster.internal hardy-security/main liblcms1 1.16-7ubuntu1.2 [96.2kB] Get:18 http://ftpmaster.internal hardy-security/main libnspr4-0d 4.8-0ubuntu0.8.04.1 [120kB] Get:19 http://ftpmaster.internal hardy-security/main libnss3-1d 3.12.6-0ubuntu0.8.04.1 [1073kB] Get:20 http://ftpmaster.internal hardy-security/universe openjdk-6-jre-lib 6b18-1.8.1-0ubuntu1~8.04.2 [5791kB] Get:21 http://ftpmaster.internal hardy/universe tzdata-java 2008b-1ubuntu1 [140kB] Get:22 http://ftpmaster.internal hardy-security/universe openjdk-6-jre-headless 6b18-1.8.1-0ubuntu1~8.04.2 [27.3MB] debconf: delaying package configuration, since apt-utils is not installed Fetched 39.2MB in 2s (18.4MB/s) Selecting previously deselected package gettext-base. (Reading database ... 9495 files and directories currently installed.) Unpacking gettext-base (from .../gettext-base_0.17-2ubuntu1_i386.deb) ... Selecting previously deselected package libsqlite3-0. Unpacking libsqlite3-0 (from .../libsqlite3-0_3.4.2-2_i386.deb) ... Selecting previously deselected package libmagic1. Unpacking libmagic1 (from .../libmagic1_4.21-3_i386.deb) ... Selecting previously deselected package file. Unpacking file (from .../archives/file_4.21-3_i386.deb) ... Selecting previously deselected package openssl. Unpacking openssl (from .../openssl_0.9.8g-4ubuntu3.9_i386.deb) ... Selecting previously deselected package ca-certificates. Unpacking ca-certificates (from .../ca-certificates_20070303-0ubuntu3_all.deb) ... Selecting previously deselected package ca-certificates-java. Unpacking ca-certificates-java (from .../ca-certificates-java_20100406ubuntu1~hardy0_all.deb) ... Selecting previously deselected package html2text. Unpacking html2text (from .../html2text_1.3.2a-3build2_i386.deb) ... Selecting previously deselected package gettext. Unpacking gettext (from .../gettext_0.17-2ubuntu1_i386.deb) ... Selecting previously deselected package intltool-debian. Unpacking intltool-debian (from .../intltool-debian_0.35.0+20060710.1_all.deb) ... Selecting previously deselected package po-debconf. Unpacking po-debconf (from .../po-debconf_1.0.10_all.deb) ... Selecting previously deselected package debhelper. Unpacking debhelper (from .../debhelper_6.0.4ubuntu1_all.deb) ... Selecting previously deselected package java-common. Unpacking java-common (from .../java-common_0.28ubuntu3_all.deb) ... Selecting previously deselected package libcupsys2. Unpacking libcupsys2 (from .../libcupsys2_1.3.7-1ubuntu3.11_i386.deb) ... Selecting previously deselected package libfreetype6. Unpacking libfreetype6 (from .../libfreetype6_2.3.5-1ubuntu4.8.04.4_i386.deb) ... Selecting previously deselected package libjpeg62. Unpacking libjpeg62 (from .../libjpeg62_6b-14_i386.deb) ... Selecting previously deselected package liblcms1. Unpacking liblcms1 (from .../liblcms1_1.16-7ubuntu1.2_i386.deb) ... Selecting previously deselected package libnspr4-0d. Unpacking libnspr4-0d (from .../libnspr4-0d_4.8-0ubuntu0.8.04.1_i386.deb) ... Selecting previously deselected package libnss3-1d. Unpacking libnss3-1d (from .../libnss3-1d_3.12.6-0ubuntu0.8.04.1_i386.deb) ... Selecting previously deselected package openjdk-6-jre-lib. Unpacking openjdk-6-jre-lib (from .../openjdk-6-jre-lib_6b18-1.8.1-0ubuntu1~8.04.2_all.deb) ... Selecting previously deselected package tzdata-java. Unpacking tzdata-java (from .../tzdata-java_2008b-1ubuntu1_all.deb) ... Selecting previously deselected package openjdk-6-jre-headless. Unpacking openjdk-6-jre-headless (from .../openjdk-6-jre-headless_6b18-1.8.1-0ubuntu1~8.04.2_i386.deb) ... Setting up gettext-base (0.17-2ubuntu1) ... Setting up libsqlite3-0 (3.4.2-2) ... Setting up libmagic1 (4.21-3) ... Setting up file (4.21-3) ... Setting up openssl (0.9.8g-4ubuntu3.9) ... Setting up ca-certificates (20070303-0ubuntu3) ... Updating certificates in /etc/ssl/certs....done. Setting up ca-certificates-java (20100406ubuntu1~hardy0) ... Setting up html2text (1.3.2a-3build2) ... Setting up gettext (0.17-2ubuntu1) ... Setting up intltool-debian (0.35.0+20060710.1) ... Setting up po-debconf (1.0.10) ... Setting up debhelper (6.0.4ubuntu1) ... Setting up java-common (0.28ubuntu3) ... Setting up libcupsys2 (1.3.7-1ubuntu3.11) ... Setting up libfreetype6 (2.3.5-1ubuntu4.8.04.4) ... Setting up libjpeg62 (6b-14) ... Setting up liblcms1 (1.16-7ubuntu1.2) ... Setting up libnspr4-0d (4.8-0ubuntu0.8.04.1) ... Setting up libnss3-1d (3.12.6-0ubuntu0.8.04.1) ... Setting up tzdata-java (2008b-1ubuntu1) ... Setting up openjdk-6-jre-lib (6b18-1.8.1-0ubuntu1~8.04.2) ... Setting up openjdk-6-jre-headless (6b18-1.8.1-0ubuntu1~8.04.2) ... Processing triggers for libc6 ... ldconfig deferred processing now taking place Checking correctness of source dependencies... Toolchain package versions: libc6-dev_2.7-10ubuntu6 make_3.81-3build1 dpkg-dev_1.14.16.6ubuntu4.1 gcc-4.2_4.2.4-1ubuntu3 g++-4.2_4.2.4-1ubuntu3 binutils_2.18.1~cvs20080103-0ubuntu1 libstdc++6_4.2.4-1ubuntu3 libstdc++6-4.2-dev_4.2.4-1ubuntu3 ------------------------------------------------------------------------------ dpkg-source: warning: could not verify signature on ./ca-certificates-java_20100406ubuntu1~hardy1.dsc since gpg isn't installed dpkg-source: extracting ca-certificates-java in ca-certificates-java-20100406ubuntu1~hardy1 dpkg-source: unpacking ca-certificates-java_20100406ubuntu1~hardy1.tar.gz dpkg-buildpackage: set CPPFLAGS to default value: dpkg-buildpackage: set CFLAGS to default value: -g -O2 dpkg-buildpackage: set CXXFLAGS to default value: -g -O2 dpkg-buildpackage: set FFLAGS to default value: -g -O2 dpkg-buildpackage: set LDFLAGS to default value: -Wl,-Bsymbolic-functions dpkg-buildpackage: source package ca-certificates-java dpkg-buildpackage: source version 20100406ubuntu1~hardy1 dpkg-buildpackage: host architecture i386 /usr/bin/fakeroot debian/rules clean dh_testdir dh_testroot rm -f build-stamp rm -rf build rm -f keytool.log dh_clean debian/rules build dh_testdir rm -rf build mkdir -p build set -e; \ yes | \ for crt in $(find /usr/share/ca-certificates -name '*.crt' -printf '%P '); do \ alias=$(basename $crt .crt | tr A-Z a-z | tr -cs a-z0-9 _); \ alias=${alias%*_}; \ echo "IMPORT: $crt, alias=$alias"; \ if keytool -importcert -trustcacerts -keystore build/cacerts \ -storepass 'changeit' \ -alias "$alias" -file "/usr/share/ca-certificates/$crt" > keytool.log 2>&1; \ then \ cat keytool.log; \ elif keytool -importcert -trustcacerts -keystore build/cacerts \ -providerClass sun.security.pkcs11.SunPKCS11 \ -providerArg '${java.home}/lib/security/nss.cfg' \ -storepass 'changeit' \ -alias "$alias" -file "/usr/share/ca-certificates/$crt" > keytool.log 2>&1; \ then \ cat keytool.log; \ elif grep -q 'Signature not available' keytool.log; then \ echo "IGNORED IMPORT: $crt, alias=$alias"; \ cat keytool.log; \ else \ cat keytool.log; \ false; \ fi; \ done IMPORT: brasil.gov.br/brasil.gov.br.crt, alias=brasil_gov_br Owner: CN=Autoridade Certificadora Raiz Brasileira, ST=DF, L=Brasilia, OU=Instituto Nacional de Tecnologia da Informacao - ITI, O=ICP-Brasil, C=BR Issuer: CN=Autoridade Certificadora Raiz Brasileira, ST=DF, L=Brasilia, OU=Instituto Nacional de Tecnologia da Informacao - ITI, O=ICP-Brasil, C=BR Serial number: 4 Valid from: Fri Nov 30 12:58:00 UTC 2001 until: Wed Nov 30 23:59:00 UTC 2011 Certificate fingerprints: MD5: 96:89:7D:61:D1:55:2B:27:E2:5A:39:B4:2A:6C:44:6F SHA1: 8E:FD:CA:BC:93:E6:1E:92:5D:4D:1D:ED:18:1A:43:20:A4:67:A1:39 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 8A FA F1 57 84 11 13 35 90 42 FA 57 49 54 69 0D ...W...5.B.WITi. 0010: A4 C4 F0 37 ...7 ] ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://acraiz.icpbrasil.gov.br/LCRacraiz.crl] ]] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.76.1.1.0] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2C 68 74 74 70 3A 2F 2F 61 63 72 61 69 7A 2E .,http://acraiz. 0010: 69 63 70 62 72 61 73 69 6C 2E 67 6F 76 2E 62 72 icpbrasil.gov.br 0020: 2F 44 50 43 61 63 72 61 69 7A 2E 70 64 66 /DPCacraiz.pdf ]] ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: spi-inc.org/SPI_CA_2006-cacert.crt, alias=spi_ca_2006_cacert Owner: EMAILADDRESS=hostmaster@spi-inc.org, CN=Certificate Authority, OU=Hostmaster, O=Software in the Public Interest, L=Indianapolis, ST=Indiana, C=US Issuer: EMAILADDRESS=hostmaster@spi-inc.org, CN=Certification Authority, OU=hostmaster, O=Software in the Public Interest, L=Indianapolis, ST=Indiana, C=US Serial number: 10 Valid from: Wed Aug 16 20:46:52 UTC 2006 until: Sat Aug 13 20:46:52 UTC 2016 Certificate fingerprints: MD5: 3B:30:4A:04:E8:8D:AC:48:B4:5F:EF:D5:A8:07:9E:91 SHA1: D4:CB:C2:DE:8A:CE:1C:4E:4C:96:17:AA:DC:BD:9E:BA:FB:66:2C:94 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: CE 37 E6 EE A9 FA 0C 5E 45 9D B6 F3 9B 51 2D 75 .7.....^E....Q-u 0010: B6 76 3B EC .v;. ] ] #4: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA ] #5: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 07 AD E8 41 1D 7F BD D6 BF 1B 81 7A 3F 8C 4B 88 ...A.......z?.K. 0010: DE 04 D2 FA .... ] [EMAILADDRESS=hostmaster@spi-inc.org, CN=Certification Authority, OU=hostmaster, O=Software in the Public Interest, L=Indianapolis, ST=Indiana, C=US] SerialNumber: [ 00] ] #6: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ ] #7: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #8: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: hostmaster@spi-inc.org ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: spi-inc.org/spi-ca.crt, alias=spi_ca Owner: EMAILADDRESS=hostmaster@spi-inc.org, CN=Certification Authority, OU=hostmaster, O=Software in the Public Interest, L=Indianapolis, ST=Indiana, C=US Issuer: EMAILADDRESS=hostmaster@spi-inc.org, CN=Certification Authority, OU=hostmaster, O=Software in the Public Interest, L=Indianapolis, ST=Indiana, C=US Serial number: 0 Valid from: Wed Jan 15 16:29:17 UTC 2003 until: Sun Jan 14 16:29:17 UTC 2007 Certificate fingerprints: MD5: ED:85:3A:FD:32:43:13:73:91:4D:94:06:C4:10:EB:E5 SHA1: DC:80:EE:C2:9E:5D:0D:FB:14:24:32:D0:F6:4A:DB:5B:B0:66:83:57 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 07 AD E8 41 1D 7F BD D6 BF 1B 81 7A 3F 8C 4B 88 ...A.......z?.K. 0010: DE 04 D2 FA .... ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 07 AD E8 41 1D 7F BD D6 BF 1B 81 7A 3F 8C 4B 88 ...A.......z?.K. 0010: DE 04 D2 FA .... ] [EMAILADDRESS=hostmaster@spi-inc.org, CN=Certification Authority, OU=hostmaster, O=Software in the Public Interest, L=Indianapolis, ST=Indiana, C=US] SerialNumber: [ 00] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: debconf.org/ca.crt, alias=ca Owner: EMAILADDRESS=joerg@debian.org, CN=Debconf CA, O=Debconf, L=Fulda, ST=Hessen, C=DE Issuer: EMAILADDRESS=joerg@debian.org, CN=Debconf CA, O=Debconf, L=Fulda, ST=Hessen, C=DE Serial number: 98a05131045d1429 Valid from: Sat Nov 05 17:55:14 UTC 2005 until: Tue Nov 03 17:55:14 UTC 2015 Certificate fingerprints: MD5: D6:FB:7A:ED:C5:96:33:BB:B0:D6:17:2A:68:24:48:F8 SHA1: 3F:63:0A:F2:17:12:C4:68:96:0C:01:35:99:5B:20:F1:A8:C2:C7:8D Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: CB 95 74 53 5B E2 60 96 50 56 DC 3F 92 CE B7 11 ..tS[.`.PV.?.... 0010: 4B AC 45 53 K.ES ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: CB 95 74 53 5B E2 60 96 50 56 DC 3F 92 CE B7 11 ..tS[.`.PV.?.... 0010: 4B AC 45 53 K.ES ] [EMAILADDRESS=joerg@debian.org, CN=Debconf CA, O=Debconf, L=Fulda, ST=Hessen, C=DE] SerialNumber: [ 98a05131 045d1429] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, alias=aol_time_warner_root_certification_authority_1 Owner: CN=AOL Time Warner Root Certification Authority 1, OU=America Online Inc., O=AOL Time Warner Inc., C=US Issuer: CN=AOL Time Warner Root Certification Authority 1, OU=America Online Inc., O=AOL Time Warner Inc., C=US Serial number: 1 Valid from: Wed May 29 06:00:00 UTC 2002 until: Fri Nov 20 15:03:00 UTC 2037 Certificate fingerprints: MD5: E7:7A:DC:B1:1F:6E:06:1F:74:6C:59:16:27:C3:4B:C0 SHA1: 74:54:53:5C:24:A3:A7:58:20:7E:3E:3E:D3:24:F8:16:FB:21:16:49 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: A1 36 30 16 CB 86 90 00 45 80 53 B1 8F C8 D8 3D .60.....E.S....= 0010: 7C BE 5F 12 .._. ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: A1 36 30 16 CB 86 90 00 45 80 53 B1 8F C8 D8 3D .60.....E.S....= 0010: 7C BE 5F 12 .._. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, alias=abaecom_sub_am_bankers_assn_root_ca Owner: EMAILADDRESS=admin@digsigtrust.com, CN=ABA.ECOM Root CA, O="ABA.ECOM, INC.", L=Washington, ST=DC, C=US Issuer: EMAILADDRESS=admin@digsigtrust.com, CN=ABA.ECOM Root CA, O="ABA.ECOM, INC.", L=Washington, ST=DC, C=US Serial number: d01e4090000046520000000100000004 Valid from: Mon Jul 12 17:33:53 UTC 1999 until: Thu Jul 09 17:33:53 UTC 2009 Certificate fingerprints: MD5: 41:B8:07:F7:A8:D1:09:EE:B4:9A:8E:70:4D:FC:1B:78 SHA1: 7A:74:41:0F:B0:CD:5C:97:2A:36:4B:71:BF:03:1D:88:A6:51:0E:9E Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:8 ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Comodo_AAA_Services_root.crt, alias=comodo_aaa_services_root Owner: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Serial number: 1 Valid from: Thu Jan 01 00:00:00 UTC 2004 until: Sun Dec 31 23:59:59 UTC 2028 Certificate fingerprints: MD5: 49:79:04:B0:EB:87:19:AC:47:B0:BC:11:51:9B:74:D0 SHA1: D1:EB:23:A4:6D:17:D6:8F:D9:25:64:C2:F1:F1:60:17:64:D8:E3:49 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: A0 11 0A 23 3E 96 F1 07 EC E2 AF 29 EF 82 A5 7F ...#>......).... 0010: D0 30 A4 B4 .0.. ] ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/AAACertificateServices.crl] , DistributionPoint: [URIName: http://crl.comodo.net/AAACertificateServices.crl] ]] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Certum_Root_CA.crt, alias=certum_root_ca Owner: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Serial number: 10020 Valid from: Tue Jun 11 10:46:39 UTC 2002 until: Fri Jun 11 10:46:39 UTC 2027 Certificate fingerprints: MD5: 2C:8F:9F:66:1D:18:90:B1:47:26:9D:8E:86:82:8C:A9 SHA1: 62:52:DC:40:F7:11:43:A2:2F:DE:9E:F7:34:8E:06:42:51:B1:81:18 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, alias=aol_time_warner_root_certification_authority_2 Owner: CN=AOL Time Warner Root Certification Authority 2, OU=America Online Inc., O=AOL Time Warner Inc., C=US Issuer: CN=AOL Time Warner Root Certification Authority 2, OU=America Online Inc., O=AOL Time Warner Inc., C=US Serial number: 1 Valid from: Wed May 29 06:00:00 UTC 2002 until: Mon Sep 28 23:43:00 UTC 2037 Certificate fingerprints: MD5: 01:5A:99:C3:D6:4F:A9:4B:3C:3B:B1:A3:AB:27:4C:BF SHA1: FC:21:9A:76:11:2F:76:C1:C5:08:83:3C:9A:2F:A2:BA:84:AC:08:7A Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 4F 69 6D 03 7E 9D 9F 07 18 43 BC B7 10 4E D5 BF Oim......C...N.. 0010: A9 C4 20 28 .. ( ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 4F 69 6D 03 7E 9D 9F 07 18 43 BC B7 10 4E D5 BF Oim......C...N.. 0010: A9 C4 20 28 .. ( ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/AddTrust_External_Root.crt, alias=addtrust_external_root Owner: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Serial number: 1 Valid from: Tue May 30 10:48:38 UTC 2000 until: Sat May 30 10:48:38 UTC 2020 Certificate fingerprints: MD5: 1D:35:54:04:85:78:B0:3F:42:42:4D:BF:20:73:0A:3F SHA1: 02:FA:F3:E2:91:43:54:68:60:78:57:69:4D:F5:E4:5B:68:85:18:68 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T.... 0010: 24 CB 54 1A $.T. ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T.... 0010: 24 CB 54 1A $.T. ] [CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE] SerialNumber: [ 01] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/AddTrust_Low-Value_Services_Root.crt, alias=addtrust_low_value_services_root Owner: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Serial number: 1 Valid from: Tue May 30 10:38:31 UTC 2000 until: Sat May 30 10:38:31 UTC 2020 Certificate fingerprints: MD5: 1E:42:95:02:33:92:6B:B9:5F:C0:7F:DA:D6:B2:4B:FC SHA1: CC:AB:0E:A0:4C:23:01:D6:69:7B:DD:37:9F:CD:12:EB:24:E3:94:9D Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 95 B1 B4 F0 94 B6 BD C7 DA D1 11 09 21 BE C1 AF ............!... 0010: 49 FD 10 7B I... ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 95 B1 B4 F0 94 B6 BD C7 DA D1 11 09 21 BE C1 AF ............!... 0010: 49 FD 10 7B I... ] [CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE] SerialNumber: [ 01] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/AddTrust_Public_Services_Root.crt, alias=addtrust_public_services_root Owner: CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Serial number: 1 Valid from: Tue May 30 10:41:50 UTC 2000 until: Sat May 30 10:41:50 UTC 2020 Certificate fingerprints: MD5: C1:62:3E:23:C5:82:73:9C:03:59:4B:2B:E9:77:49:7F SHA1: 2A:B6:28:48:5E:78:FB:F3:AD:9E:79:10:DD:6B:DF:99:72:2C:96:E5 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 81 3E 37 D8 92 B0 1F 77 9F 5C B4 AB 73 AA E7 F6 .>7....w.\..s... 0010: 34 60 2F FA 4`/. ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 81 3E 37 D8 92 B0 1F 77 9F 5C B4 AB 73 AA E7 F6 .>7....w.\..s... 0010: 34 60 2F FA 4`/. ] [CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE] SerialNumber: [ 01] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/AddTrust_Qualified_Certificates_Root.crt, alias=addtrust_qualified_certificates_root Owner: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Serial number: 1 Valid from: Tue May 30 10:44:50 UTC 2000 until: Sat May 30 10:44:50 UTC 2020 Certificate fingerprints: MD5: 27:EC:39:47:CD:DA:5A:AF:E2:9A:01:65:21:A9:4C:BB SHA1: 4D:23:78:EC:91:95:39:B5:00:7F:75:8F:03:3B:21:1E:C5:4D:8B:CF Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 39 95 8B 62 8B 5C C9 D4 80 BA 58 0F 97 3F 15 08 9..b.\....X..?.. 0010: 43 CC 98 A7 C... ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 39 95 8B 62 8B 5C C9 D4 80 BA 58 0F 97 3F 15 08 9..b.\....X..?.. 0010: 43 CC 98 A7 C... ] [CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE] SerialNumber: [ 01] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/America_Online_Root_Certification_Authority_1.crt, alias=america_online_root_certification_authority_1 Owner: CN=America Online Root Certification Authority 1, O=America Online Inc., C=US Issuer: CN=America Online Root Certification Authority 1, O=America Online Inc., C=US Serial number: 1 Valid from: Tue May 28 06:00:00 UTC 2002 until: Thu Nov 19 20:43:00 UTC 2037 Certificate fingerprints: MD5: 14:F1:08:AD:9D:FA:64:E2:89:E7:1C:CF:A8:AD:7D:5E SHA1: 39:21:C1:15:C1:5D:0E:CA:5C:CB:5B:C4:F0:7D:21:D8:05:0B:56:6A Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 00 AD D9 A3 F6 79 F6 6E 74 A9 7F 33 3D 81 17 D7 .....y.nt..3=... 0010: 4C CF 33 DE L.3. ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 00 AD D9 A3 F6 79 F6 6E 74 A9 7F 33 3D 81 17 D7 .....y.nt..3=... 0010: 4C CF 33 DE L.3. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/America_Online_Root_Certification_Authority_2.crt, alias=america_online_root_certification_authority_2 Owner: CN=America Online Root Certification Authority 2, O=America Online Inc., C=US Issuer: CN=America Online Root Certification Authority 2, O=America Online Inc., C=US Serial number: 1 Valid from: Tue May 28 06:00:00 UTC 2002 until: Tue Sep 29 14:08:00 UTC 2037 Certificate fingerprints: MD5: D6:ED:3C:CA:E2:66:0F:AF:10:43:0D:77:9B:04:09:BF SHA1: 85:B5:FF:67:9B:0C:79:96:1F:C8:6E:44:22:00:46:13:DB:17:92:84 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 4D 45 C1 68 38 BB 73 A9 69 A1 20 E7 ED F5 22 A1 ME.h8.s.i. ...". 0010: 23 14 D7 9E #... ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 4D 45 C1 68 38 BB 73 A9 69 A1 20 E7 ED F5 22 A1 ME.h8.s.i. ...". 0010: 23 14 D7 9E #... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Baltimore_CyberTrust_Root.crt, alias=baltimore_cybertrust_root Owner: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE Serial number: 20000b9 Valid from: Fri May 12 18:46:00 UTC 2000 until: Mon May 12 23:59:00 UTC 2025 Certificate fingerprints: MD5: AC:B6:94:A5:9C:17:E0:D7:91:52:9B:B1:97:06:A6:E4 SHA1: D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:3 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: E5 9D 59 30 82 47 58 CC AC FA 08 54 36 86 7B 3A ..Y0.GX....T6..: 0010: B5 04 4D F0 ..M. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Comodo_Trusted_Services_root.crt, alias=comodo_trusted_services_root Owner: CN=Trusted Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=Trusted Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Serial number: 1 Valid from: Thu Jan 01 00:00:00 UTC 2004 until: Sun Dec 31 23:59:59 UTC 2028 Certificate fingerprints: MD5: 91:1B:3F:6E:CD:9E:AB:EE:07:FE:1F:71:D2:B3:61:27 SHA1: E1:9F:E3:0E:8B:84:60:9E:80:9B:17:0D:72:A8:C5:BA:6E:14:09:BD Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C5 7B 58 BD ED DA 25 69 D2 F7 59 16 A8 B3 32 C0 ..X...%i..Y...2. 0010: 7B 27 5B F4 .'[. ] ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/TrustedCertificateServices.crl] , DistributionPoint: [URIName: http://crl.comodo.net/TrustedCertificateServices.crl] ]] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Comodo_Secure_Services_root.crt, alias=comodo_secure_services_root Owner: CN=Secure Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=Secure Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Serial number: 1 Valid from: Thu Jan 01 00:00:00 UTC 2004 until: Sun Dec 31 23:59:59 UTC 2028 Certificate fingerprints: MD5: D3:D9:BD:AE:9F:AC:67:24:B3:C8:1B:52:E1:B9:A9:BD SHA1: 4A:65:D5:F4:1D:EF:39:B8:B8:90:4A:4A:D3:64:81:33:CF:C7:A1:D1 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 3C D8 93 88 C2 C0 82 09 CC 01 99 06 93 20 E9 9E <............ .. 0010: 70 09 63 4F p.cO ] ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/SecureCertificateServices.crl] , DistributionPoint: [URIName: http://crl.comodo.net/SecureCertificateServices.crl] ]] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, alias=entrust_net_premium_2048_secure_server_ca Owner: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net Serial number: 3863b966 Valid from: Fri Dec 24 17:50:51 UTC 1999 until: Tue Dec 24 18:20:51 UTC 2019 Certificate fingerprints: MD5: BA:21:EA:20:D6:DD:DB:8F:C1:57:8B:40:AD:A1:FC:FC SHA1: 80:1D:62:D0:7B:44:9D:5C:5C:03:5C:98:EA:61:FA:44:3C:2A:58:FE Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 55 E4 81 D1 11 80 BE D8 89 B9 08 A3 31 F9 A1 24 U...........1..$ 0010: 09 16 B9 70 ...p ] ] #2: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #3: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 55 E4 81 D1 11 80 BE D8 89 B9 08 A3 31 F9 A1 24 U...........1..$ 0010: 09 16 B9 70 ...p ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, alias=digital_signature_trust_co_global_ca_1 Owner: OU=DSTCA E1, O=Digital Signature Trust Co., C=US Issuer: OU=DSTCA E1, O=Digital Signature Trust Co., C=US Serial number: 36701596 Valid from: Thu Dec 10 18:10:23 UTC 1998 until: Mon Dec 10 18:40:23 UTC 2018 Certificate fingerprints: MD5: 25:7A:BA:83:2E:B6:A2:0B:DA:FE:F5:02:0F:08:D7:AD SHA1: 81:96:8B:3A:EF:1C:DC:70:F5:FA:32:69:C2:92:A3:63:5B:D1:23:D3 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Thu Dec 10 18:10:23 UTC 1998, To: Mon Dec 10 18:10:23 UTC 2018] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 6A 79 7E 91 69 46 18 13 0A 02 77 A5 59 5B 60 98 jy..iF....w.Y[`. 0010: 25 0E A2 F8 %... ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, OU=DSTCA E1, O=Digital Signature Trust Co., C=US] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 6A 79 7E 91 69 46 18 13 0A 02 77 A5 59 5B 60 98 jy..iF....w.Y[`. 0010: 25 0E A2 F8 %... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, alias=digital_signature_trust_co_global_ca_2 Owner: EMAILADDRESS=ca@digsigtrust.com, CN=DST RootCA X1, OU=DSTCA X1, O=Digital Signature Trust Co., L=Salt Lake City, ST=Utah, C=us Issuer: EMAILADDRESS=ca@digsigtrust.com, CN=DST RootCA X1, OU=DSTCA X1, O=Digital Signature Trust Co., L=Salt Lake City, ST=Utah, C=us Serial number: d01e408b0000027c0000000200000001 Valid from: Tue Dec 01 18:18:55 UTC 1998 until: Fri Nov 28 18:18:55 UTC 2008 Certificate fingerprints: MD5: 6C:C9:A7:6E:47:F1:0C:E3:53:3B:78:4C:4D:C2:6A:C5 SHA1: B7:2F:FF:92:D2:CE:43:DE:0A:8D:4C:54:8C:50:37:26:A8:1E:2B:93 Signature algorithm name: SHA1withRSA Version: 1 Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, alias=digital_signature_trust_co_global_ca_3 Owner: OU=DSTCA E2, O=Digital Signature Trust Co., C=US Issuer: OU=DSTCA E2, O=Digital Signature Trust Co., C=US Serial number: 366ed3ce Valid from: Wed Dec 09 19:17:26 UTC 1998 until: Sun Dec 09 19:47:26 UTC 2018 Certificate fingerprints: MD5: 93:C2:8E:11:7B:D4:F3:03:19:BD:28:75:13:4A:45:4A SHA1: AB:48:F3:33:DB:04:AB:B9:C0:72:DA:5B:0C:C1:D0:57:F0:36:9B:46 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Wed Dec 09 19:17:26 UTC 1998, To: Sun Dec 09 19:17:26 UTC 2018] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1E 82 4D 28 65 80 3C C9 41 6E AC 35 2E 5A CB DE ..M(e.<.An.5.Z.. 0010: EE F8 39 5B ..9[ ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, OU=DSTCA E2, O=Digital Signature Trust Co., C=US] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1E 82 4D 28 65 80 3C C9 41 6E AC 35 2E 5A CB DE ..M(e.<.An.5.Z.. 0010: EE F8 39 5B ..9[ ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, alias=digital_signature_trust_co_global_ca_4 Owner: EMAILADDRESS=ca@digsigtrust.com, CN=DST RootCA X2, OU=DSTCA X2, O=Digital Signature Trust Co., L=Salt Lake City, ST=Utah, C=us Issuer: EMAILADDRESS=ca@digsigtrust.com, CN=DST RootCA X2, OU=DSTCA X2, O=Digital Signature Trust Co., L=Salt Lake City, ST=Utah, C=us Serial number: d01e408b0000776d0000000100000004 Valid from: Mon Nov 30 22:46:16 UTC 1998 until: Thu Nov 27 22:46:16 UTC 2008 Certificate fingerprints: MD5: CD:3B:3D:62:5B:09:B8:09:36:87:9E:12:2F:71:64:BA SHA1: 67:EB:33:7B:68:4C:EB:0E:C2:B0:76:0A:B4:88:27:8C:DD:95:97:DD Signature algorithm name: SHA1withRSA Version: 1 Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Entrust.net_Global_Secure_Personal_CA.crt, alias=entrust_net_global_secure_personal_ca Owner: CN=Entrust.net Client Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.), O=Entrust.net Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.), O=Entrust.net Serial number: 389ef6e4 Valid from: Mon Feb 07 16:16:40 UTC 2000 until: Fri Feb 07 16:46:40 UTC 2020 Certificate fingerprints: MD5: 9A:77:19:18:ED:96:CF:DF:1B:B7:0E:F5:8D:B9:88:2E SHA1: CF:74:BF:FF:9B:86:81:5B:08:33:54:40:36:3E:87:B6:B6:F0:BF:73 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Mon Feb 07 16:16:40 UTC 2000, To: Fri Feb 07 16:46:40 UTC 2020] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 84 8B 74 FD C5 8D C0 FF 27 6D 20 37 45 7C FE 2D ..t.....'m 7E..- 0010: CE BA D3 7D .... ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, CN=Entrust.net Client Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.), O=Entrust.net] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 84 8B 74 FD C5 8D C0 FF 27 6D 20 37 45 7C FE 2D ..t.....'m 7E..- 0010: CE BA D3 7D .... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Entrust.net_Global_Secure_Server_CA.crt, alias=entrust_net_global_secure_server_ca Owner: CN=Entrust.net Secure Server Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.), O=Entrust.net Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.), O=Entrust.net Serial number: 389b113c Valid from: Fri Feb 04 17:20:00 UTC 2000 until: Tue Feb 04 17:50:00 UTC 2020 Certificate fingerprints: MD5: 9D:66:6A:CC:FF:D5:F5:43:B4:BF:8C:16:D1:2B:A8:99 SHA1: 89:39:57:6E:17:8D:F7:05:78:0F:CC:5E:C8:4F:84:F6:25:3A:48:93 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Fri Feb 04 17:20:00 UTC 2000, To: Tue Feb 04 17:50:00 UTC 2020] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: CB 6C C0 6B E3 BB 3E CB FC 22 9C FE FB 8B 92 9C .l.k..>.."...... 0010: B0 F2 6E 22 ..n" ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, CN=Entrust.net Secure Server Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.), O=Entrust.net] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: CB 6C C0 6B E3 BB 3E CB FC 22 9C FE FB 8B 92 9C .l.k..>.."...... 0010: B0 F2 6E 22 ..n" ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Equifax_Secure_Global_eBusiness_CA.crt, alias=equifax_secure_global_ebusiness_ca Owner: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US Serial number: 1 Valid from: Mon Jun 21 04:00:00 UTC 1999 until: Sun Jun 21 04:00:00 UTC 2020 Certificate fingerprints: MD5: 8F:5D:77:06:27:C4:98:3C:5B:93:78:E7:D7:7D:9B:CC SHA1: 7E:78:4A:10:1C:82:65:CC:2D:E1:F1:6D:47:B4:40:CA:D9:0A:19:45 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: BE A8 A0 74 72 50 6B 44 B7 C9 23 D8 FB A8 FF B3 ...trPkD..#..... 0010: 57 6B 68 6C Wkhl ] ] #3: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: BE A8 A0 74 72 50 6B 44 B7 C9 23 D8 FB A8 FF B3 ...trPkD..#..... 0010: 57 6B 68 6C Wkhl ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Entrust.net_Secure_Personal_CA.crt, alias=entrust_net_secure_personal_ca Owner: CN=Entrust.net Client Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab., O=Entrust.net, C=US Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab., O=Entrust.net, C=US Serial number: 380391ee Valid from: Tue Oct 12 19:24:30 UTC 1999 until: Sat Oct 12 19:54:30 UTC 2019 Certificate fingerprints: MD5: 0C:41:2F:13:5B:A0:54:F5:96:66:2D:7E:CD:0E:03:F4 SHA1: DA:79:C1:71:11:50:C2:34:39:AA:2B:0B:0C:62:FD:55:B2:F9:F5:80 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Tue Oct 12 19:24:30 UTC 1999, To: Sat Oct 12 19:24:30 UTC 2019] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C4 FB 9C 29 7B 97 CD 4C 96 FC EE 5B B3 CA 99 74 ...)...L...[...t 0010: 8B 95 EA 4C ...L ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, CN=Entrust.net Client Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab., O=Entrust.net, C=US] , DistributionPoint: [URIName: http://www.entrust.net/CRL/Client1.crl] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C4 FB 9C 29 7B 97 CD 4C 96 FC EE 5B B3 CA 99 74 ...)...L...[...t 0010: 8B 95 EA 4C ...L ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Entrust.net_Secure_Server_CA.crt, alias=entrust_net_secure_server_ca Owner: CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), O=Entrust.net, C=US Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), O=Entrust.net, C=US Serial number: 374ad243 Valid from: Tue May 25 16:09:40 UTC 1999 until: Sat May 25 16:39:40 UTC 2019 Certificate fingerprints: MD5: DF:F2:80:73:CC:F1:E6:61:73:FC:F5:42:E9:C5:7C:EE SHA1: 99:A6:9B:E6:1A:FE:88:6B:4D:2B:82:00:7C:B8:54:FC:31:7E:15:39 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Tue May 25 16:09:40 UTC 1999, To: Sat May 25 16:09:40 UTC 2019] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: F0 17 62 13 55 3D B3 FF 0A 00 6B FB 50 84 97 F3 ..b.U=....k.P... 0010: ED 62 D0 1A .b.. ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), O=Entrust.net, C=US] , DistributionPoint: [URIName: http://www.entrust.net/CRL/net1.crl] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: F0 17 62 13 55 3D B3 FF 0A 00 6B FB 50 84 97 F3 ..b.U=....k.P... 0010: ED 62 D0 1A .b.. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Equifax_Secure_CA.crt, alias=equifax_secure_ca Owner: OU=Equifax Secure Certificate Authority, O=Equifax, C=US Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US Serial number: 35def4cf Valid from: Sat Aug 22 16:41:51 UTC 1998 until: Wed Aug 22 16:41:51 UTC 2018 Certificate fingerprints: MD5: 67:CB:9D:C0:13:24:8A:82:9B:B2:17:1E:D1:1B:EC:D4 SHA1: D2:32:09:AD:23:D3:14:23:21:74:E4:0D:7F:9D:62:13:97:86:63:3A Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ To: Wed Aug 22 16:41:51 UTC 2018] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 48 E6 68 F9 2B D2 B2 95 D7 47 D8 23 20 10 4F 33 H.h.+....G.# .O3 0010: 98 90 9F D4 .... ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, OU=Equifax Secure Certificate Authority, O=Equifax, C=US] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 48 E6 68 F9 2B D2 B2 95 D7 47 D8 23 20 10 4F 33 H.h.+....G.# .O3 0010: 98 90 9F D4 .... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, alias=tc_trustcenter_germany_class_2_ca Owner: EMAILADDRESS=certificate@trustcenter.de, OU=TC TrustCenter Class 2 CA, O=TC TrustCenter for Security in Data Networks GmbH, L=Hamburg, ST=Hamburg, C=DE Issuer: EMAILADDRESS=certificate@trustcenter.de, OU=TC TrustCenter Class 2 CA, O=TC TrustCenter for Security in Data Networks GmbH, L=Hamburg, ST=Hamburg, C=DE Serial number: 3ea Valid from: Mon Mar 09 11:59:59 UTC 1998 until: Sat Jan 01 11:59:59 UTC 2011 Certificate fingerprints: MD5: B8:16:33:4C:4C:4C:F2:D8:D3:4D:06:B4:A6:5B:40:03 SHA1: 83:8E:30:F7:7F:DD:14:AA:38:5E:D1:45:00:9C:0E:22:36:49:4F:AA Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #4: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Equifax_Secure_eBusiness_CA_1.crt, alias=equifax_secure_ebusiness_ca_1 Owner: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US Serial number: 4 Valid from: Mon Jun 21 04:00:00 UTC 1999 until: Sun Jun 21 04:00:00 UTC 2020 Certificate fingerprints: MD5: 64:9C:EF:2E:44:FC:C6:8F:52:07:D0:51:73:8F:CB:3D SHA1: DA:40:18:8B:91:89:A3:ED:EE:AE:DA:97:FE:2F:9D:F5:B7:D1:8A:41 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 4A 78 32 52 11 DB 59 16 36 5E DF C1 14 36 40 6A Jx2R..Y.6^...6@j 0010: 47 7C 4C A1 G.L. ] ] #3: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 4A 78 32 52 11 DB 59 16 36 5E DF C1 14 36 40 6A Jx2R..Y.6^...6@j 0010: 47 7C 4C A1 G.L. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Equifax_Secure_eBusiness_CA_2.crt, alias=equifax_secure_ebusiness_ca_2 Owner: OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US Issuer: OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US Serial number: 3770cfb5 Valid from: Wed Jun 23 12:14:45 UTC 1999 until: Sun Jun 23 12:14:45 UTC 2019 Certificate fingerprints: MD5: AA:BF:BF:64:97:DA:98:1D:6F:C6:08:3A:95:70:33:CA SHA1: 39:4F:F6:85:0B:06:BE:52:E5:18:56:CC:10:E1:80:E8:82:B3:85:CC Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ To: Sun Jun 23 12:14:45 UTC 2019] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 9E 0B EA AF 5E B9 20 48 A6 50 6A CB FD D8 20 P....^. H.Pj... 0010: 7A A7 82 76 z..v ] ] #4: ObjectId: 1.2.840.113533.7.65.0 Criticality=false #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US] ]] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #7: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 9E 0B EA AF 5E B9 20 48 A6 50 6A CB FD D8 20 P....^. H.Pj... 0010: 7A A7 82 76 z..v ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/GTE_CyberTrust_Global_Root.crt, alias=gte_cybertrust_global_root Owner: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Serial number: 1a5 Valid from: Thu Aug 13 00:29:00 UTC 1998 until: Mon Aug 13 23:59:00 UTC 2018 Certificate fingerprints: MD5: CA:3D:D3:68:F1:03:5C:D0:32:FA:B8:2B:59:E8:5A:DB SHA1: 97:81:79:50:D8:1C:96:70:CC:34:D8:09:CF:79:44:31:36:7E:F4:74 Signature algorithm name: MD5withRSA Version: 1 Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/GTE_CyberTrust_Root_CA.crt, alias=gte_cybertrust_root_ca Owner: CN=GTE CyberTrust Root, O=GTE Corporation, C=US Issuer: CN=GTE CyberTrust Root, O=GTE Corporation, C=US Serial number: 1a3 Valid from: Fri Feb 23 23:01:00 UTC 1996 until: Thu Feb 23 23:59:00 UTC 2006 Certificate fingerprints: MD5: C4:D7:F0:B2:A3:C5:7D:61:67:F0:04:CD:43:D3:BA:58 SHA1: 90:DE:DE:9E:4C:4E:9F:6F:D8:86:17:57:9D:D3:91:BC:65:A6:89:64 Signature algorithm name: MD5withRSA Version: 1 Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/GeoTrust_Global_CA.crt, alias=geotrust_global_ca Owner: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US Serial number: 23456 Valid from: Tue May 21 04:00:00 UTC 2002 until: Sat May 21 04:00:00 UTC 2022 Certificate fingerprints: MD5: F7:75:AB:29:FB:51:4E:B7:77:5E:FF:05:3C:99:8E:F5 SHA1: DE:28:F4:A4:FF:E5:B9:2F:A3:C5:03:D1:A3:49:A7:F9:96:2A:82:12 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C0 7A 98 68 8D 89 FB AB 05 64 0C 11 7D AA 7D 65 .z.h.....d.....e 0010: B8 CA CC 4E ...N ] ] #3: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 7A 98 68 8D 89 FB AB 05 64 0C 11 7D AA 7D 65 .z.h.....d.....e 0010: B8 CA CC 4E ...N ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/GlobalSign_Root_CA.crt, alias=globalsign_root_ca Owner: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE Serial number: 20000000000d678b79405 Valid from: Tue Sep 01 12:00:00 UTC 1998 until: Tue Jan 28 12:00:00 UTC 2014 Certificate fingerprints: MD5: AB:BF:EA:E3:6B:29:A6:CC:A6:78:35:99:EF:AD:2B:80 SHA1: 2F:17:3F:7D:E9:96:67:AF:A5:7A:F8:0A:A2:D1:B1:2F:AC:83:03:38 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 60 7B 66 1A 45 0D 97 CA 89 50 2F 7D 04 CD 34 A8 `.f.E....P/...4. 0010: FF FC FD 4B ...K ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_CLASE1_root.crt, alias=ips_clase1_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASE1 Certification Authority, OU=IPS CA CLASE1 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASE1 Certification Authority, OU=IPS CA CLASE1 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Serial number: 0 Valid from: Sat Dec 29 00:59:38 UTC 2001 until: Sat Dec 27 00:59:38 UTC 2025 Certificate fingerprints: MD5: 84:90:1D:95:30:49:56:FC:41:81:F0:45:D7:76:C4:6B SHA1: 43:9E:52:5F:5A:6A:47:C3:2C:EB:C4:5C:63:ED:39:31:7C:E5:F4:DF Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign Encipher_Only Decipher_Only ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: EB B3 19 79 F3 C1 A5 1C AC DC BA 1F 66 A2 B2 9B ...y........f... 0010: 69 D0 78 08 i.x. ] ] #3: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.ips.es/] ] #4: ObjectId: 2.16.840.1.113730.1.4 Criticality=false #5: ObjectId: 2.16.840.1.113730.1.2 Criticality=false #6: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.ips.es/ips2002/ips2002CLASE1.crl] , DistributionPoint: [URIName: http://wwwback.ips.es/ips2002/ips2002CLASE1.crl] ]] #7: ObjectId: 2.16.840.1.113730.1.3 Criticality=false #8: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth codeSigning emailProtection timeStamping 1.3.6.1.4.1.311.2.1.21 1.3.6.1.4.1.311.2.1.22 1.3.6.1.4.1.311.10.3.1 1.3.6.1.4.1.311.10.3.4 ] #9: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #10: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #11: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: EB B3 19 79 F3 C1 A5 1C AC DC BA 1F 66 A2 B2 9B ...y........f... 0010: 69 D0 78 08 i.x. ] [EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASE1 Certification Authority, OU=IPS CA CLASE1 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES] SerialNumber: [ 00] ] #12: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #13: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ RFC822Name: ips@mail.ips.es ] #14: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: ips@mail.ips.es ] #15: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #16: ObjectId: 2.16.840.1.113730.1.7 Criticality=false Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_CLASE3_root.crt, alias=ips_clase3_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASE3 Certification Authority, OU=IPS CA CLASE3 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASE3 Certification Authority, OU=IPS CA CLASE3 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Serial number: 0 Valid from: Sat Dec 29 01:01:44 UTC 2001 until: Sat Dec 27 01:01:44 UTC 2025 Certificate fingerprints: MD5: 42:76:97:68:CF:A6:B4:38:24:AA:A1:1B:F2:67:DE:CA SHA1: 41:78:AB:4C:BF:CE:7B:41:02:AC:DA:C4:93:3E:6F:F5:0D:CF:71:5C Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign Encipher_Only Decipher_Only ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: B8 93 FF 2E CB DC 2C 8E A2 E7 7A FE 36 51 21 A3 ......,...z.6Q!. 0010: 98 5B 0C 34 .[.4 ] ] #3: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.ips.es/] ] #4: ObjectId: 2.16.840.1.113730.1.4 Criticality=false #5: ObjectId: 2.16.840.1.113730.1.2 Criticality=false #6: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.ips.es/ips2002/ips2002CLASE3.crl] , DistributionPoint: [URIName: http://wwwback.ips.es/ips2002/ips2002CLASE3.crl] ]] #7: ObjectId: 2.16.840.1.113730.1.3 Criticality=false #8: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth codeSigning emailProtection timeStamping 1.3.6.1.4.1.311.2.1.21 1.3.6.1.4.1.311.2.1.22 1.3.6.1.4.1.311.10.3.1 1.3.6.1.4.1.311.10.3.4 ] #9: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #10: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #11: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B8 93 FF 2E CB DC 2C 8E A2 E7 7A FE 36 51 21 A3 ......,...z.6Q!. 0010: 98 5B 0C 34 .[.4 ] [EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASE3 Certification Authority, OU=IPS CA CLASE3 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES] SerialNumber: [ 00] ] #12: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #13: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ RFC822Name: ips@mail.ips.es ] #14: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: ips@mail.ips.es ] #15: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #16: ObjectId: 2.16.840.1.113730.1.7 Criticality=false Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_CLASEA1_root.crt, alias=ips_clasea1_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASEA1 Certification Authority, OU=IPS CA CLASEA1 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASEA1 Certification Authority, OU=IPS CA CLASEA1 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Serial number: 0 Valid from: Sat Dec 29 01:05:32 UTC 2001 until: Sat Dec 27 01:05:32 UTC 2025 Certificate fingerprints: MD5: 0C:F8:9E:17:FC:D4:03:BD:E6:8D:9B:3C:05:87:FE:84 SHA1: 33:A3:35:C2:3C:E8:03:4B:04:E1:3D:E5:C4:8E:79:1A:EB:8C:32:04 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign Encipher_Only Decipher_Only ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 67 26 96 E7 A1 BF D8 B5 03 9D FE 3B DC FE F2 8A g&.........;.... 0010: E6 15 DD 30 ...0 ] ] #3: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.ips.es/] ] #4: ObjectId: 2.16.840.1.113730.1.4 Criticality=false #5: ObjectId: 2.16.840.1.113730.1.2 Criticality=false #6: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.ips.es/ips2002/ips2002CLASEA1.crl] , DistributionPoint: [URIName: http://wwwback.ips.es/ips2002/ips2002CLASEA1.crl] ]] #7: ObjectId: 2.16.840.1.113730.1.3 Criticality=false #8: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth codeSigning emailProtection timeStamping 1.3.6.1.4.1.311.2.1.21 1.3.6.1.4.1.311.2.1.22 1.3.6.1.4.1.311.10.3.1 1.3.6.1.4.1.311.10.3.4 ] #9: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #10: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #11: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 67 26 96 E7 A1 BF D8 B5 03 9D FE 3B DC FE F2 8A g&.........;.... 0010: E6 15 DD 30 ...0 ] [EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASEA1 Certification Authority, OU=IPS CA CLASEA1 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES] SerialNumber: [ 00] ] #12: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #13: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ RFC822Name: ips@mail.ips.es ] #14: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: ips@mail.ips.es ] #15: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #16: ObjectId: 2.16.840.1.113730.1.7 Criticality=false Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_CLASEA3_root.crt, alias=ips_clasea3_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASEA3 Certification Authority, OU=IPS CA CLASEA3 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASEA3 Certification Authority, OU=IPS CA CLASEA3 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Serial number: 0 Valid from: Sat Dec 29 01:07:50 UTC 2001 until: Sat Dec 27 01:07:50 UTC 2025 Certificate fingerprints: MD5: 06:F9:EB:EC:CC:56:9D:88:BA:90:F5:BA:B0:1A:E0:02 SHA1: 16:D4:24:FE:96:10:E1:75:19:AF:23:2B:B6:87:74:E2:41:44:BE:6E Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign Encipher_Only Decipher_Only ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1E 9F 57 50 47 B6 61 93 39 D3 2C FC DA 5D 3D 05 ..WPG.a.9.,..]=. 0010: 75 B7 99 02 u... ] ] #3: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.ips.es/] ] #4: ObjectId: 2.16.840.1.113730.1.4 Criticality=false #5: ObjectId: 2.16.840.1.113730.1.2 Criticality=false #6: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.ips.es/ips2002/ips2002CLASEA3.crl] , DistributionPoint: [URIName: http://wwwback.ips.es/ips2002/ips2002CLASEA3.crl] ]] #7: ObjectId: 2.16.840.1.113730.1.3 Criticality=false #8: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth codeSigning emailProtection timeStamping 1.3.6.1.4.1.311.2.1.21 1.3.6.1.4.1.311.2.1.22 1.3.6.1.4.1.311.10.3.1 1.3.6.1.4.1.311.10.3.4 ] #9: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #10: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #11: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1E 9F 57 50 47 B6 61 93 39 D3 2C FC DA 5D 3D 05 ..WPG.a.9.,..]=. 0010: 75 B7 99 02 u... ] [EMAILADDRESS=ips@mail.ips.es, CN=IPS CA CLASEA3 Certification Authority, OU=IPS CA CLASEA3 Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES] SerialNumber: [ 00] ] #12: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #13: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ RFC822Name: ips@mail.ips.es ] #14: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: ips@mail.ips.es ] #15: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #16: ObjectId: 2.16.840.1.113730.1.7 Criticality=false Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_Chained_CAs_root.crt, alias=ips_chained_cas_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA Chained CAs Certification Authority, OU=IPS CA Chained CAs Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA Chained CAs Certification Authority, OU=IPS CA Chained CAs Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Serial number: 0 Valid from: Sat Dec 29 00:53:58 UTC 2001 until: Sat Dec 27 00:53:58 UTC 2025 Certificate fingerprints: MD5: 8D:72:51:DB:A0:3A:CF:20:77:DF:F2:65:06:5E:DF:EF SHA1: C8:C2:5F:16:9E:F8:50:74:D5:BE:E8:CD:A2:D4:3C:AE:E7:5F:D2:57 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign Encipher_Only Decipher_Only ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: A1 AD 31 B1 F9 3E E1 17 A6 C8 AB 34 FC 52 87 09 ..1..>.....4.R.. 0010: 1E 62 52 41 .bRA ] ] #3: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.ips.es/] ] #4: ObjectId: 2.16.840.1.113730.1.4 Criticality=false #5: ObjectId: 2.16.840.1.113730.1.2 Criticality=false #6: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.ips.es/ips2002/ips2002CAC.crl] , DistributionPoint: [URIName: http://wwwback.ips.es/ips2002/ips2002CAC.crl] ]] #7: ObjectId: 2.16.840.1.113730.1.3 Criticality=false #8: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth codeSigning emailProtection timeStamping 1.3.6.1.4.1.311.2.1.21 1.3.6.1.4.1.311.2.1.22 1.3.6.1.4.1.311.10.3.1 1.3.6.1.4.1.311.10.3.4 ] #9: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #10: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #11: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: A1 AD 31 B1 F9 3E E1 17 A6 C8 AB 34 FC 52 87 09 ..1..>.....4.R.. 0010: 1E 62 52 41 .bRA ] [EMAILADDRESS=ips@mail.ips.es, CN=IPS CA Chained CAs Certification Authority, OU=IPS CA Chained CAs Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES] SerialNumber: [ 00] ] #12: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #13: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ RFC822Name: ips@mail.ips.es ] #14: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: ips@mail.ips.es ] #15: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #16: ObjectId: 2.16.840.1.113730.1.7 Criticality=false Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_Servidores_root.crt, alias=ips_servidores_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS SERVIDORES, OU=Certificaciones, O=IPS Seguridad CA, L=BARCELONA, ST=BARCELONA, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS SERVIDORES, OU=Certificaciones, O=IPS Seguridad CA, L=BARCELONA, ST=BARCELONA, C=ES Serial number: 0 Valid from: Thu Jan 01 23:21:07 UTC 1998 until: Tue Dec 29 23:21:07 UTC 2009 Certificate fingerprints: MD5: 7B:B5:08:99:9A:8C:18:BF:85:27:7D:0E:AE:DA:B2:AB SHA1: 24:BA:6D:6C:8A:5B:58:37:A4:8D:B5:FA:E9:19:EA:67:5C:94:D2:17 Signature algorithm name: MD5withRSA Version: 1 Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/IPS_Timestamping_root.crt, alias=ips_timestamping_root Owner: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA Timestamping Certification Authority, OU=IPS CA Timestamping Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Issuer: EMAILADDRESS=ips@mail.ips.es, CN=IPS CA Timestamping Certification Authority, OU=IPS CA Timestamping Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES Serial number: 0 Valid from: Sat Dec 29 01:10:18 UTC 2001 until: Sat Dec 27 01:10:18 UTC 2025 Certificate fingerprints: MD5: 2E:03:FD:C5:F5:D7:2B:94:64:C1:BE:89:31:F1:16:9B SHA1: 96:99:5C:77:11:E8:E5:2D:F9:E3:4B:EC:EC:67:D3:CB:F1:B6:C4:D2 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign Encipher_Only Decipher_Only ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 8B D0 10 50 09 81 F2 9D 09 D5 0E 60 78 03 22 A2 ...P.......`x.". 0010: 3F C8 CA 66 ?..f ] ] #3: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.ips.es/] ] #4: ObjectId: 2.16.840.1.113730.1.4 Criticality=false #5: ObjectId: 2.16.840.1.113730.1.2 Criticality=false #6: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.ips.es/ips2002/ips2002Timestamping.crl] , DistributionPoint: [URIName: http://wwwback.ips.es/ips2002/ips2002Timestamping.crl] ]] #7: ObjectId: 2.16.840.1.113730.1.3 Criticality=false #8: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth codeSigning emailProtection timeStamping 1.3.6.1.4.1.311.2.1.21 1.3.6.1.4.1.311.2.1.22 1.3.6.1.4.1.311.10.3.1 1.3.6.1.4.1.311.10.3.4 ] #9: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] #10: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #11: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 8B D0 10 50 09 81 F2 9D 09 D5 0E 60 78 03 22 A2 ...P.......`x.". 0010: 3F C8 CA 66 ?..f ] [EMAILADDRESS=ips@mail.ips.es, CN=IPS CA Timestamping Certification Authority, OU=IPS CA Timestamping Certification Authority, O="ips@mail.ips.es C.I.F. B-60929452", O=IPS Internet publishing Services s.l., L=Barcelona, ST=Barcelona, C=ES] SerialNumber: [ 00] ] #12: ObjectId: 2.16.840.1.113730.1.13 Criticality=false #13: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ RFC822Name: ips@mail.ips.es ] #14: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: ips@mail.ips.es ] #15: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #16: ObjectId: 2.16.840.1.113730.1.7 Criticality=false Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/QuoVadis_Root_CA.crt, alias=quovadis_root_ca Owner: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM Serial number: 3ab6508b Valid from: Mon Mar 19 18:33:33 UTC 2001 until: Wed Mar 17 18:33:33 UTC 2021 Certificate fingerprints: MD5: 27:DE:36:FE:72:B7:00:03:00:9D:F4:F0:1E:6C:04:24 SHA1: DE:3F:40:BD:50:93:D3:9B:6C:60:F6:DA:BC:07:62:01:00:89:76:C9 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 8B 4B 6D ED D3 29 B9 06 19 EC 39 39 A9 F0 97 84 .Km..)....99.... 0010: 6A CB EF DF j... ] ] #4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: https://ocsp.quovadisoffshore.com] ] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.8024.0.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 C7 1A 81 C4 52 65 6C 69 61 6E 63 65 20 6F 0.....Reliance o 0010: 6E 20 74 68 65 20 51 75 6F 56 61 64 69 73 20 52 n the QuoVadis R 0020: 6F 6F 74 20 43 65 72 74 69 66 69 63 61 74 65 20 oot Certificate 0030: 62 79 20 61 6E 79 20 70 61 72 74 79 20 61 73 73 by any party ass 0040: 75 6D 65 73 20 61 63 63 65 70 74 61 6E 63 65 20 umes acceptance 0050: 6F 66 20 74 68 65 20 74 68 65 6E 20 61 70 70 6C of the then appl 0060: 69 63 61 62 6C 65 20 73 74 61 6E 64 61 72 64 20 icable standard 0070: 74 65 72 6D 73 20 61 6E 64 20 63 6F 6E 64 69 74 terms and condit 0080: 69 6F 6E 73 20 6F 66 20 75 73 65 2C 20 63 65 72 ions of use, cer 0090: 74 69 66 69 63 61 74 69 6F 6E 20 70 72 61 63 74 tification pract 00A0: 69 63 65 73 2C 20 61 6E 64 20 74 68 65 20 51 75 ices, and the Qu 00B0: 6F 56 61 64 69 73 20 43 65 72 74 69 66 69 63 61 oVadis Certifica 00C0: 74 65 20 50 6F 6C 69 63 79 2E te Policy. ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 16 68 74 74 70 3A 2F 2F 77 77 77 2E 71 75 6F ..http://www.quo 0010: 76 61 64 69 73 2E 62 6D vadis.bm ]] ] ] #6: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 8B 4B 6D ED D3 29 B9 06 19 EC 39 39 A9 F0 97 84 .Km..)....99.... 0010: 6A CB EF DF j... ] [CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM] SerialNumber: [ 3ab6508b] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/RSA_Root_Certificate_1.crt, alias=rsa_root_certificate_1 Owner: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 3 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network Issuer: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 3 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network Serial number: 1 Valid from: Sat Jun 26 00:22:33 UTC 1999 until: Wed Jun 26 00:22:33 UTC 2019 Certificate fingerprints: MD5: A2:6F:53:B7:EE:40:DB:4A:68:E7:FA:18:D9:10:4B:72 SHA1: 69:BD:8C:F4:9C:D3:00:FB:59:2E:17:93:CA:55:6A:F3:EC:AA:35:FB Signature algorithm name: SHA1withRSA Version: 1 Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/RSA_Security_1024_v3.crt, alias=rsa_security_1024_v3 Owner: OU=RSA Security 1024 V3, O=RSA Security Inc Issuer: OU=RSA Security 1024 V3, O=RSA Security Inc Serial number: a0101010000027c0000000b00000002 Valid from: Thu Feb 22 21:01:49 UTC 2001 until: Sun Feb 22 20:01:49 UTC 2026 Certificate fingerprints: MD5: 3A:E5:50:B0:39:BE:C7:46:36:33:A1:FE:82:3E:8D:94 SHA1: 3C:BB:5D:E0:FC:D6:39:7C:05:88:E5:66:97:BD:46:2A:BD:F9:5C:76 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C4 C0 1C A4 07 94 FD CD 4D 01 D4 54 DA A5 0C 5F ........M..T..._ 0010: DE AE 05 5A ...Z ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C4 C0 1C A4 07 94 FD CD 4D 01 D4 54 DA A5 0C 5F ........M..T..._ 0010: DE AE 05 5A ...Z ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/RSA_Security_2048_v3.crt, alias=rsa_security_2048_v3 Owner: OU=RSA Security 2048 V3, O=RSA Security Inc Issuer: OU=RSA Security 2048 V3, O=RSA Security Inc Serial number: a0101010000027c0000000a00000002 Valid from: Thu Feb 22 20:39:23 UTC 2001 until: Sun Feb 22 20:39:23 UTC 2026 Certificate fingerprints: MD5: 77:0D:19:B1:21:FD:00:42:9C:3E:0C:A5:DD:0B:02:8E SHA1: 25:01:90:19:CF:FB:D9:99:1C:B7:68:25:74:8D:94:5F:30:93:95:42 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 07 C3 51 30 A4 AA E9 45 AE 35 24 FA FF 24 2C 33 ..Q0...E.5$..$,3 0010: D0 B1 9D 8C .... ] ] #4: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 07 C3 51 30 A4 AA E9 45 AE 35 24 FA FF 24 2C 33 ..Q0...E.5$..$,3 0010: D0 B1 9D 8C .... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Security_Communication_Root_CA.crt, alias=security_communication_root_ca Owner: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP Issuer: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP Serial number: 0 Valid from: Tue Sep 30 04:20:49 UTC 2003 until: Sat Sep 30 04:20:49 UTC 2023 Certificate fingerprints: MD5: F1:BC:63:6A:54:E0:B5:27:F5:CD:E7:1A:E3:4D:6E:4A SHA1: 36:B1:2B:49:F9:81:9E:D7:4C:9E:BC:38:0F:C6:56:8F:5D:AC:B2:F7 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: A0 73 49 99 68 DC 85 5B 65 E3 9B 28 2F 57 9F BD .sI.h..[e..(/W.. 0010: 33 BC 07 48 3..H ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Sonera_Class_1_Root_CA.crt, alias=sonera_class_1_root_ca Owner: CN=Sonera Class1 CA, O=Sonera, C=FI Issuer: CN=Sonera Class1 CA, O=Sonera, C=FI Serial number: 24 Valid from: Fri Apr 06 10:49:13 UTC 2001 until: Tue Apr 06 10:49:13 UTC 2021 Certificate fingerprints: MD5: 33:B7:84:F5:5F:27:D7:68:27:DE:14:DE:12:2A:ED:6F SHA1: 07:47:22:01:99:CE:74:B9:7C:B0:3D:79:B2:64:A2:C8:55:E9:33:FF Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 47 E2 0C 8B F6 53 88 52 G....S.R ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Sonera_Class_2_Root_CA.crt, alias=sonera_class_2_root_ca Owner: CN=Sonera Class2 CA, O=Sonera, C=FI Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI Serial number: 1d Valid from: Fri Apr 06 07:29:40 UTC 2001 until: Tue Apr 06 07:29:40 UTC 2021 Certificate fingerprints: MD5: A3:EC:75:0F:2E:88:DF:FA:48:01:4E:0B:5C:48:6F:FB SHA1: 37:F7:6D:E6:07:7C:90:C5:B1:3E:93:1A:B7:41:10:B4:F2:E4:9A:27 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 4A A0 AA 58 84 D3 5E 3C J..X..^< ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Staat_der_Nederlanden_Root_CA.crt, alias=staat_der_nederlanden_root_ca Owner: CN=Staat der Nederlanden Root CA, O=Staat der Nederlanden, C=NL Issuer: CN=Staat der Nederlanden Root CA, O=Staat der Nederlanden, C=NL Serial number: 98968a Valid from: Tue Dec 17 09:23:49 UTC 2002 until: Wed Dec 16 09:15:38 UTC 2015 Certificate fingerprints: MD5: 60:84:7C:5A:CE:DB:0C:D4:CB:A7:E9:FE:02:C6:A9:C0 SHA1: 10:1D:FA:3F:D5:0B:CB:BB:9B:B5:60:0C:19:55:A4:1A:F4:73:3A:04 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: A8 7D EB BC 63 A4 74 13 74 00 EC 96 E0 D3 34 C1 ....c.t.t.....4. 0010: 2C BF 6C F8 ,.l. ] ] #3: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 ..http://www.pki 0010: 6F 76 65 72 68 65 69 64 2E 6E 6C 2F 70 6F 6C 69 overheid.nl/poli 0020: 63 69 65 73 2F 72 6F 6F 74 2D 70 6F 6C 69 63 79 cies/root-policy ]] ] ] #4: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/Verisign_Secure_Server_OCSP_Responder.crt, alias=verisign_secure_server_ocsp_responder Owner: CN=Secure Server OCSP Responder, OU=Terms of use at https://www.verisign.com/RPA (c)00, OU=VeriSign Trust Network, O="VeriSign, Inc." Issuer: OU=Secure Server Certification Authority, O="RSA Data Security, Inc.", C=US Serial number: ff45d5275d24fbb3c239245357e14fde Valid from: Fri Aug 04 00:00:00 UTC 2000 until: Tue Aug 03 23:59:59 UTC 2004 Certificate fingerprints: MD5: 2C:62:C3:D8:80:01:16:09:EA:59:EA:78:AB:10:43:F6 SHA1: 71:9E:60:61:D7:7D:2C:83:F1:A2:5D:3C:F6:8D:02:BC:94:38:C5:2E Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature ] #2: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false Unparseable AuthorityInfoAccess extension due to java.io.IOException: Invalid encoding of URI 0000: 30 34 30 32 06 08 2B 06 01 05 05 07 30 01 A6 26 0402..+.....0..& 0010: 16 24 68 74 74 70 3A 2F 2F 6F 63 73 70 2E 76 65 .$http://ocsp.ve 0020: 72 69 73 69 67 6E 2E 63 6F 6D 2F 6F 63 73 70 2F risign.com/ocsp/ 0030: 73 74 61 74 75 73 status #3: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.verisign.com/RSASecureServer-p.crl] ]] #4: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.113733.1.7.1.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65 ..https://www.ve 0010: 72 69 73 69 67 6E 2E 63 6F 6D 2F 52 50 41 risign.com/RPA ]] ] ] #5: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ OCSPSigning ] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #7: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ CN=OCSP 1-4 ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, alias=tc_trustcenter_germany_class_3_ca Owner: EMAILADDRESS=certificate@trustcenter.de, OU=TC TrustCenter Class 3 CA, O=TC TrustCenter for Security in Data Networks GmbH, L=Hamburg, ST=Hamburg, C=DE Issuer: EMAILADDRESS=certificate@trustcenter.de, OU=TC TrustCenter Class 3 CA, O=TC TrustCenter for Security in Data Networks GmbH, L=Hamburg, ST=Hamburg, C=DE Serial number: 3eb Valid from: Mon Mar 09 11:59:59 UTC 1998 until: Sat Jan 01 11:59:59 UTC 2011 Certificate fingerprints: MD5: 5F:94:4A:73:22:B8:F7:D1:31:EC:59:39:F7:8E:FE:6E SHA1: 9F:C7:96:E8:F8:52:4F:86:3A:E1:49:6D:38:12:42:10:5F:1B:78:F5 Signature algorithm name: MD5withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.16.840.1.113730.1.8 Criticality=false #4: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] Trust this certificate? [no]: Certificate was added to keystore IMPORT: mozilla/TDC_Internet_Root_CA.crt, alias=tdc_internet_root_ca Owner: OU=TDC Internet Root CA, O=TDC Internet, C=DK Issuer: OU=TDC Internet Root CA, O=TDC Internet, C=DK Serial number: 3acca54c Valid from: Thu Apr 05 16:33:17 UTC 2001 until: Mon Apr 05 17:03:17 UTC 2021 Certificate fingerprints: MD5: 91:F4:03:55:20:A1:F8:63:2C:62:DE:AC:FB:61:1C:8E SHA1: 21:FC:BD:8E:7F:6C:AF:05:1B:D1:B3:43:EC:A8:E7:61:47:F2:0F:8A Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Thu Apr 05 16:33:17 UTC 2001, To: Mon Apr 05 17:03:17 UTC 2021] #2: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 6C 64 01 C7 FD 85 6D AC C8 DA 9E 50 08 85 08 B5 ld....m....P.... 0010: 3C 56 A8 50 http://www.sig 0010: 6E 65 74 2E 70 6C 2F 72 65 70 6F 7A 79 74 6F 72 net.pl/repozytor 0020: 69 75 6D 2F 64 6F 6B 75 6D 65 6E 74 79 2F 6B 6C ium/dokumenty/kl 0030: 61 73 61 32 2F 70 63 5F 70 63 61 32 2E 74 78 74 asa2/pc_pca2.txt ]] ] ] #6: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 6C 46 CA 5D 82 7E 96 07 46 89 C4 F3 60 15 5C .lF.]....F...`.\ 0010: ED 3C 90 C2 .<.. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: signet.pl/signet_ca3_pem.crt, alias=signet_ca3_pem Owner: SERIALNUMBER=Numer wpisu: 4, CN=CC Signet - CA Klasa 3, O=TP Internet Sp. z o.o., C=PL Issuer: CN=CZiC Centrast SA, O=CZiC Centrast SA w imieniu Ministra Gospodarki, C=PL Serial number: 3eafaa8f Valid from: Wed Apr 30 10:50:55 UTC 2003 until: Mon Apr 28 10:50:55 UTC 2008 Certificate fingerprints: MD5: AF:B0:5F:7D:CF:06:61:F6:D2:89:A8:A2:84:27:F8:3B SHA1: B6:39:7E:7B:7E:95:13:77:95:2D:DC:20:05:78:1D:C5:9E:6D:8B:78 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.32 Criticality=true CertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 0F 77 77 77 2E 63 65 6E 74 72 61 73 74 2E 70 ..www.centrast.p 0010: 6C l ]] ] ] #3: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #4: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 7B 63 CC 19 90 7A B4 CE B6 3B 9E 7D 6D 15 27 50 .c...z...;..m.'P 0010: D0 F9 49 B9 ..I. ] ] #5: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: D9 AE EB F3 90 A9 D6 22 4D 5B 40 9A D4 B4 7A 54 ......."M[@...zT 0010: 6D FD F7 A4 m... ] [CN=CZiC Centrast SA, O=CZiC Centrast SA w imieniu Ministra Gospodarki, C=PL] SerialNumber: [ 3dff4b10] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: signet.pl/signet_ocspklasa3_pem.crt, alias=signet_ocspklasa3_pem Owner: CN=CC Signet - OCSP Klasa 3, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Issuer: SERIALNUMBER=Numer wpisu: 4, CN=CC Signet - CA Klasa 3, O=TP Internet Sp. z o.o., C=PL Serial number: 3f8be72f Valid from: Tue Oct 14 12:08:00 UTC 2003 until: Mon Apr 28 10:50:55 UTC 2008 Certificate fingerprints: MD5: 02:6E:27:3B:35:1A:A7:B4:26:DF:29:5C:14:4B:A9:97 SHA1: CD:0F:D2:BA:67:73:BC:4C:44:16:8D:AE:9E:80:AA:2B:86:56:64:61 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature ] #2: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 6E 23 9C 23 2F 04 02 D1 41 7B 66 0E 7F 53 C9 74 n#.#/...A.f..S.t 0010: 3F 10 A3 FE ?... ] ] #3: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.signet.pl/kwalifikowane/repozytorium/crl/klasa3.crl] ]] #4: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.7999.2.300.10.2.1.0] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 60 1A 5E 43 65 72 74 79 66 69 6B 61 74 20 77 0`.^Certyfikat w 0010: 79 64 61 6E 79 20 7A 67 6F 64 6E 69 65 20 7A 20 ydany zgodnie z 0020: 64 6F 6B 75 6D 65 6E 74 65 6D 20 22 50 6F 6C 69 dokumentem "Poli 0030: 74 79 6B 61 20 43 65 72 74 79 66 69 6B 61 63 6A tyka Certyfikacj 0040: 69 20 2D 20 43 65 72 74 79 66 69 6B 61 74 79 20 i - Certyfikaty 0050: 72 65 73 70 6F 6E 64 65 72 6F 77 20 4F 43 53 50 responderow OCSP 0060: 22 2E ". ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 3B 68 74 74 70 3A 2F 2F 77 77 77 2E 73 69 67 .;http://www.sig 0010: 6E 65 74 2E 70 6C 2F 72 65 70 6F 7A 79 74 6F 72 net.pl/repozytor 0020: 69 75 6D 2F 64 6F 6B 75 6D 65 6E 74 79 2F 70 63 ium/dokumenty/pc 0030: 5F 6F 63 73 70 5F 31 5F 30 2E 70 64 66 _ocsp_1_0.pdf ]] ] ] #5: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ OCSPSigning ] #6: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #7: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 7B 63 CC 19 90 7A B4 CE B6 3B 9E 7D 6D 15 27 50 .c...z...;..m.'P 0010: D0 F9 49 B9 ..I. ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: signet.pl/signet_pca2_pem.crt, alias=signet_pca2_pem Owner: CN=CC Signet - PCA Klasa 2, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Issuer: CN=CC Signet - RootCA, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Serial number: 3cbede10 Valid from: Thu Apr 18 14:54:08 UTC 2002 until: Mon Sep 21 15:42:19 UTC 2026 Certificate fingerprints: MD5: 71:44:55:45:92:14:5E:4A:DE:30:4C:02:6A:AD:2F:AD SHA1: 37:AF:D2:93:F6:30:5C:EF:00:A7:77:B9:E5:59:71:D0:CC:43:51:E6 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C0 6C 46 CA 5D 82 7E 96 07 46 89 C4 F3 60 15 5C .lF.]....F...`.\ 0010: ED 3C 90 C2 .<.. ] ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.signet.pl/repozytorium/rootca/rootca.crl] ]] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.7999.2.1.10.1.1.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 8D 1A 81 8A 43 65 72 74 79 66 69 6B 61 74 0.....Certyfikat 0010: 20 77 79 73 74 61 77 69 6F 6E 79 20 7A 67 6F 64 wystawiony zgod 0020: 6E 69 65 20 7A 20 64 6F 6B 75 6D 65 6E 74 65 6D nie z dokumentem 0030: 3A 20 22 50 6F 6C 69 74 79 6B 61 20 43 65 72 74 : "Polityka Cert 0040: 79 66 69 6B 61 63 6A 69 20 64 6C 61 20 52 6F 6F yfikacji dla Roo 0050: 74 43 41 22 2E 20 43 65 72 74 79 66 69 6B 61 74 tCA". Certyfikat 0060: 20 77 79 73 74 61 77 69 6F 6E 79 20 70 72 7A 65 wystawiony prze 0070: 7A 20 52 6F 6F 74 43 41 20 77 20 68 69 65 72 61 z RootCA w hiera 0080: 72 63 68 69 69 20 43 43 20 53 69 67 6E 65 74 2E rchii CC Signet. ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 39 68 74 74 70 3A 2F 2F 77 77 77 2E 73 69 67 .9http://www.sig 0010: 6E 65 74 2E 70 6C 2F 72 65 70 6F 7A 79 74 6F 72 net.pl/repozytor 0020: 69 75 6D 2F 64 6F 6B 75 6D 65 6E 74 79 2F 70 63 ium/dokumenty/pc 0030: 5F 72 6F 6F 74 63 61 2E 74 78 74 _rootca.txt ]] ] ] #6: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 9B C5 23 0D 02 E1 A6 4E 48 6B 1F 00 E9 E3 9A ...#....NHk..... 0010: 14 1B B1 AF .... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: signet.pl/signet_pca3_pem.crt, alias=signet_pca3_pem Owner: CN=CC Signet - PCA Klasa 3, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Issuer: CN=CC Signet - RootCA, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Serial number: 3d5d2d34 Valid from: Fri Aug 16 16:49:56 UTC 2002 until: Mon Sep 21 15:42:19 UTC 2026 Certificate fingerprints: MD5: 42:30:93:B0:D5:81:09:3B:DD:CF:6B:72:DD:17:0F:97 SHA1: 5D:C5:C7:93:75:FE:04:D7:80:42:7E:C0:91:C2:05:01:06:5F:B6:45 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 5E FB 61 70 F1 E5 1F 90 60 1A 19 4C 12 B2 4D 5D ^.ap....`..L..M] 0010: 69 61 96 00 ia.. ] ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.signet.pl/repozytorium/rootca/rootca.crl] ]] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.7999.2.1.10.1.1.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 8D 1A 81 8A 43 65 72 74 79 66 69 6B 61 74 0.....Certyfikat 0010: 20 77 79 73 74 61 77 69 6F 6E 79 20 7A 67 6F 64 wystawiony zgod 0020: 6E 69 65 20 7A 20 64 6F 6B 75 6D 65 6E 74 65 6D nie z dokumentem 0030: 3A 20 22 50 6F 6C 69 74 79 6B 61 20 43 65 72 74 : "Polityka Cert 0040: 79 66 69 6B 61 63 6A 69 20 64 6C 61 20 52 6F 6F yfikacji dla Roo 0050: 74 43 41 22 2E 20 43 65 72 74 79 66 69 6B 61 74 tCA". Certyfikat 0060: 20 77 79 73 74 61 77 69 6F 6E 79 20 70 72 7A 65 wystawiony prze 0070: 7A 20 52 6F 6F 74 43 41 20 77 20 68 69 65 72 61 z RootCA w hiera 0080: 72 63 68 69 69 20 43 43 20 53 69 67 6E 65 74 2E rchii CC Signet. ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 39 68 74 74 70 3A 2F 2F 77 77 77 2E 73 69 67 .9http://www.sig 0010: 6E 65 74 2E 70 6C 2F 72 65 70 6F 7A 79 74 6F 72 net.pl/repozytor 0020: 69 75 6D 2F 64 6F 6B 75 6D 65 6E 74 79 2F 70 63 ium/dokumenty/pc 0030: 5F 72 6F 6F 74 63 61 2E 74 78 74 _rootca.txt ]] ] ] #6: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 9B C5 23 0D 02 E1 A6 4E 48 6B 1F 00 E9 E3 9A ...#....NHk..... 0010: 14 1B B1 AF .... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: signet.pl/signet_rootca_pem.crt, alias=signet_rootca_pem Owner: CN=CC Signet - RootCA, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Issuer: CN=CC Signet - RootCA, OU=Centrum Certyfikacji Signet, O=TP Internet Sp. z o.o., C=PL Serial number: 3baa1c19 Valid from: Thu Sep 20 16:42:19 UTC 2001 until: Mon Sep 21 15:42:19 UTC 2026 Certificate fingerprints: MD5: 27:6E:90:ED:B8:48:0F:64:9F:B3:FD:D9:12:7E:D5:F5 SHA1: 5A:31:76:59:D4:A4:8E:3C:17:8A:D2:A1:3E:88:B7:58:49:EA:E1:0B Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C0 9B C5 23 0D 02 E1 A6 4E 48 6B 1F 00 E9 E3 9A ...#....NHk..... 0010: 14 1B B1 AF .... ] ] #4: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.7999.2.1.10.1.1.0] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 8D 1A 81 8A 43 65 72 74 79 66 69 6B 61 74 0.....Certyfikat 0010: 20 77 79 73 74 61 77 69 6F 6E 79 20 7A 67 6F 64 wystawiony zgod 0020: 6E 69 65 20 7A 20 64 6F 6B 75 6D 65 6E 74 65 6D nie z dokumentem 0030: 3A 20 22 50 6F 6C 69 74 79 6B 61 20 43 65 72 74 : "Polityka Cert 0040: 79 66 69 6B 61 63 6A 69 20 64 6C 61 20 52 6F 6F yfikacji dla Roo 0050: 74 43 41 22 2E 20 43 65 72 74 79 66 69 6B 61 74 tCA". Certyfikat 0060: 20 77 79 73 74 61 77 69 6F 6E 79 20 70 72 7A 65 wystawiony prze 0070: 7A 20 52 6F 6F 74 43 41 20 77 20 68 69 65 72 61 z RootCA w hiera 0080: 72 63 68 69 69 20 43 43 20 53 69 67 6E 65 74 2E rchii CC Signet. ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 39 68 74 74 70 3A 2F 2F 77 77 77 2E 73 69 67 .9http://www.sig 0010: 6E 65 74 2E 70 6C 2F 72 65 70 6F 7A 79 74 6F 72 net.pl/repozytor 0020: 69 75 6D 2F 64 6F 6B 75 6D 65 6E 74 79 2F 70 63 ium/dokumenty/pc 0030: 5F 72 6F 6F 74 63 61 2E 74 78 74 _rootca.txt ]] ] ] #5: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 9B C5 23 0D 02 E1 A6 4E 48 6B 1F 00 E9 E3 9A ...#....NHk..... 0010: 14 1B B1 AF .... ] ] Trust this certificate? [no]: Certificate was added to keystore IMPORT: signet.pl/signet_tsa1_pem.crt, alias=signet_tsa1_pem Certificate was added to keystore IMPORT: quovadis.bm/QuoVadis_Root_Certification_Authority.crt, alias=quovadis_root_certification_authority Certificate already exists in keystore under alias Do you still want to add it? [no]: Certificate was added to keystore touch build-stamp /usr/bin/fakeroot debian/rules binary dh_testdir dh_testroot dh_clean -k dh_installdirs \ usr/share/ca-certificates-java \ etc/default \ etc/ssl/certs/java \ etc/ca-certificates/update.d \ install -m755 debian/jks-keystore.hook \ debian/ca-certificates-java/etc/ca-certificates/update.d/jks-keystore install -m644 build/cacerts \ debian/ca-certificates-java/usr/share/ca-certificates-java/ install -m600 debian/default \ debian/ca-certificates-java/etc/default/cacerts dh_testdir dh_testroot dh_installchangelogs dh_installdocs dh_compress dh_fixperms dh_installdeb dh_gencontrol dpkg-gencontrol: warning: unknown substitution variable ${misc:Depends} dh_md5sums dh_builddeb pkgstriptranslations: processing control file: ./debian/ca-certificates-java/DEBIAN/control, package ca-certificates-java, directory ./debian/ca-certificates-java pkgstriptranslations: ca-certificates-java does not contain translations, skipping pkgstriptranslations: no translation files, not creating tarball pkgmaintainermangler: Maintainer field overridden to "Ubuntu MOTU Developers " warning, `debian/ca-certificates-java/DEBIAN/control' contains user-defined field `Original-Maintainer' dpkg-deb: ignoring 1 warnings about the control file(s) dpkg-deb: building package `ca-certificates-java' in `../ca-certificates-java_20100406ubuntu1~hardy1_all.deb'. dpkg-genchanges -b -mUbuntu/i386 Build Daemon >../ca-certificates-java_20100406ubuntu1~hardy1_i386.changes dpkg-genchanges: binary-only upload - not including any source code dpkg-buildpackage: binary only upload (no source included) ****************************************************************************** Build finished at 20100818-1602 chroot-autobuild/build/buildd/ca-certificates-java_20100406ubuntu1~hardy1_all.deb: new debian package, version 2.0. size 67122 bytes: control archive= 2176 bytes. 64 bytes, 2 lines conffiles 568 bytes, 13 lines control 317 bytes, 4 lines md5sums 3393 bytes, 133 lines * postinst #!/bin/bash 352 bytes, 23 lines * postrm #!/bin/sh Package: ca-certificates-java Version: 20100406ubuntu1~hardy1 Architecture: all Maintainer: Ubuntu MOTU Developers Original-Maintainer: OpenJDK Team Installed-Size: 204 Depends: ca-certificates (>= 20070303), openjdk-6-jre-headless (>= 6b16-1.6.1-2) | java6-runtime-headless Recommends: libnss3-1d Section: java Priority: optional Description: Common CA certificates (JKS keystore) This package uses the hooks of the ca-certificates package to update the cacerts JKS keystore used for many java runtimes. chroot-autobuild/build/buildd/ca-certificates-java_20100406ubuntu1~hardy1_all.deb: drwxr-xr-x root/root 0 2010-08-18 16:02 ./ drwxr-xr-x root/root 0 2010-08-18 16:02 ./usr/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./usr/share/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./usr/share/ca-certificates-java/ -rw-r--r-- root/root 114478 2010-08-18 16:02 ./usr/share/ca-certificates-java/cacerts drwxr-xr-x root/root 0 2010-08-18 16:02 ./usr/share/doc/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./usr/share/doc/ca-certificates-java/ -rw-r--r-- root/root 656 2008-06-03 12:22 ./usr/share/doc/ca-certificates-java/README.Debian -rw-r--r-- root/root 336 2008-06-02 19:09 ./usr/share/doc/ca-certificates-java/copyright -rw-r--r-- root/root 1466 2010-08-18 13:55 ./usr/share/doc/ca-certificates-java/changelog.gz drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/default/ -rw-r--r-- root/root 384 2010-08-18 16:02 ./etc/default/cacerts drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/ssl/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/ssl/certs/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/ssl/certs/java/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/ca-certificates/ drwxr-xr-x root/root 0 2010-08-18 16:02 ./etc/ca-certificates/update.d/ -rwxr-xr-x root/root 2941 2010-08-18 16:02 ./etc/ca-certificates/update.d/jks-keystore ca-certificates-java_20100406ubuntu1~hardy1_i386.changes: Format: 1.7 Date: Wed, 18 Aug 2010 05:55:04 -0700 Source: ca-certificates-java Binary: ca-certificates-java Architecture: all Version: 20100406ubuntu1~hardy1 Distribution: hardy Urgency: low Maintainer: Ubuntu/i386 Build Daemon Changed-By: Kees Cook Description: ca-certificates-java - Common CA certificates (JKS keystore) Changes: ca-certificates-java (20100406ubuntu1~hardy1) hardy-security; urgency=low . * Rebuild for Hardy. Files: a9a46c80d3ec916c5c0b4f6cee1d2027 67122 java optional ca-certificates-java_20100406ubuntu1~hardy1_all.deb ****************************************************************************** Built successfully Purging chroot-autobuild/build/buildd/ca-certificates-java-20100406ubuntu1~hardy1 ------------------------------------------------------------------------------ /usr/bin/sudo dpkg --purge intltool-debian gettext file libnss3-1d libcupsys2 openssl ca-certificates html2text gettext-base debhelper libnspr4-0d po-debconf openjdk-6-jre-lib openjdk-6-jre-headless libmagic1 liblcms1 libsqlite3-0 libfreetype6 libjpeg62 tzdata-java java-common ca-certificates-java (Reading database ... 11559 files and directories currently installed.) Removing debhelper ... Removing po-debconf ... Removing intltool-debian ... Removing gettext ... Removing file ... Purging configuration files for file ... Removing html2text ... Purging configuration files for html2text ... Removing gettext-base ... Removing libmagic1 ... Purging configuration files for libmagic1 ... Removing openjdk-6-jre-headless ... Purging configuration files for openjdk-6-jre-headless ... Removing liblcms1 ... Purging configuration files for liblcms1 ... Removing libfreetype6 ... Purging configuration files for libfreetype6 ... Removing libjpeg62 ... Removing tzdata-java ... Removing java-common ... Purging configuration files for java-common ... Removing ca-certificates-java ... Removing libnss3-1d ... Purging configuration files for libnss3-1d ... Removing libcupsys2 ... Purging configuration files for libcupsys2 ... Removing ca-certificates ... Removing hash symlinks in /etc/ssl/certs ...done. Purging configuration files for ca-certificates ... Removing libnspr4-0d ... Purging configuration files for libnspr4-0d ... Removing openjdk-6-jre-lib ... Removing libsqlite3-0 ... Purging configuration files for libsqlite3-0 ... Removing openssl ... Purging configuration files for openssl ... Processing triggers for libc6 ... ldconfig deferred processing now taking place ****************************************************************************** Finished at 20100818-1603 Build needed 00:00:41, 468k disk space RUN: /usr/share/launchpad-buildd/slavebin/scan-for-processes ['/usr/share/launchpad-buildd/slavebin/scan-for-processes', '224234b86051aa8a59829ee3bea44606ea3355db'] Scanning for processes to kill in build /home/buildd/build-224234b86051aa8a59829ee3bea44606ea3355db/chroot-autobuild... RUN: /usr/share/launchpad-buildd/slavebin/umount-chroot ['umount-chroot', '224234b86051aa8a59829ee3bea44606ea3355db'] Unmounting chroot for build 224234b86051aa8a59829ee3bea44606ea3355db... RUN: /usr/share/launchpad-buildd/slavebin/remove-build ['remove-build', '224234b86051aa8a59829ee3bea44606ea3355db']