<package type="rpm">
	<name>rootcerts</name>
	<arch>noarch</arch>
	<version epoch="1" ver="20220208.00" rel="1"/>
	<checksum type="sha256" pkgid="YES">5cebeaa7c4c350bd8fc64def9ba05f337f0195b746cf66666c6a78a871db98c6</checksum>
	<summary>Bundle of CA Root Certificates</summary>
	<description>This is a bundle of X.509 certificates of public Certificate
Authorities (CA). These were automatically extracted from Mozilla's
root CA list (the file &quot;certdata.txt&quot;). It contains the certificates
in both plain text and PEM format and therefore can be directly used
with an Apache/mod_ssl webserver for SSL client authentication. Just
configure this file as the SSLCACertificateFile.</description>
	<packager>tpg &lt;tpgxyz@gmail.com&gt;</packager>
	<url>https://openmandriva.org</url>
	<time file="1645640642" build="1645199840"/>
	<size package="582345" installed="2250470" archive="2254648"/>
	<location href="rootcerts-20220208.00-1-omv4003.noarch.rpm"/>
	<format>
		<rpm:license>GPL</rpm:license>
		<rpm:vendor>OpenMandriva</rpm:vendor>
		<rpm:group>System/Servers</rpm:group>
		<rpm:buildhost>ryzen9-1.openmandriva.org</rpm:buildhost>
		<rpm:sourcerpm>rootcerts-20220208.00-1.src.rpm</rpm:sourcerpm>
		<rpm:header-range start="4504" end="11641"/>
		<rpm:provides>
			<rpm:entry name="ca-certificates"/>
			<rpm:entry name="config(rootcerts)" flags="EQ" epoch="1" ver="20220208.00" rel="1"/>
			<rpm:entry name="rootcerts" flags="EQ" epoch="1" ver="20220208.00" rel="1"/>
		</rpm:provides>
		<rpm:requires>
			<rpm:entry name="/bin/sh"/>
			<rpm:entry name="/bin/sh"/>
			<rpm:entry name="/bin/sh"/>
			<rpm:entry name="config(rootcerts)" flags="EQ" epoch="1" ver="20220208.00" rel="1"/>
			<rpm:entry name="coreutils"/>
			<rpm:entry name="p11-kit"/>
			<rpm:entry name="p11-kit-trust"/>
			<rpm:entry name="rpmlib(CompressedFileNames)" flags="LE" ver="3.0.4" rel="1"/>
			<rpm:entry name="rpmlib(FileDigests)" flags="LE" ver="4.6.0" rel="1"/>
			<rpm:entry name="rpmlib(PayloadFilesHavePrefix)" flags="LE" ver="4.0" rel="1"/>
			<rpm:entry name="rpmlib(PayloadIsZstd)" flags="LE" ver="5.4.18" rel="1"/>
		</rpm:requires>
		<file>/etc/pki/ca-trust/ca-legacy.conf</file>
		<file type="dir">/etc/pki/ca-trust/extracted</file>
		<file type="dir">/etc/pki/ca-trust/extracted/edk2</file>
		<file type="ghost">/etc/pki/ca-trust/extracted/edk2/cacerts.bin</file>
		<file type="dir">/etc/pki/ca-trust/extracted/java</file>
		<file type="ghost">/etc/pki/ca-trust/extracted/java/cacerts</file>
		<file type="dir">/etc/pki/ca-trust/extracted/openssl</file>
		<file type="ghost">/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt</file>
		<file type="dir">/etc/pki/ca-trust/extracted/pem</file>
		<file type="ghost">/etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem</file>
		<file type="ghost">/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem</file>
		<file type="ghost">/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem</file>
		<file type="dir">/etc/pki/ca-trust/source</file>
		<file type="dir">/etc/pki/ca-trust/source/anchors</file>
		<file type="dir">/etc/pki/ca-trust/source/blacklist</file>
		<file type="ghost">/etc/pki/ca-trust/source/ca-bundle.legacy.crt</file>
		<file>/etc/pki/tls/cert.pem</file>
		<file type="dir">/etc/pki/tls/certs</file>
		<file>/etc/pki/tls/certs/ca-bundle.crt</file>
		<file>/etc/pki/tls/certs/ca-bundle.trust.crt</file>
		<file>/etc/pki/tls/mozilla/certdata.txt</file>
		<file>/etc/ssl/certs</file>
		<file>/etc/ssl/private</file>
		<file>/usr/bin/ca-legacy</file>
		<file>/usr/bin/update-ca-trust</file>
	</format>
</package>
