ca-cacert 2019.0411-1 source package in Ubuntu


ca-cacert (2019.0411-1) unstable; urgency=medium

  * New upstream release (Closes: #824019, #917742).
    + upgraded certificates encoding to SHA-256.
      Thanks, Simon Iremonger.
  * Vcs-URLs to Salsa.
  * Standards-Version: 4.3.0.
  * Debhelper & compat to version 12.
  * rules:
    + removed calls to dpkg-parsechangelog.
    + respect "nocheck" in DEB_BUILD_OPTIONS.
  * triggers:
    + activate --> activate-noawait (L: uses-implicit-await-trigger).

 -- Dmitry Smirnov <email address hidden>  Sun, 21 Apr 2019 15:39:35 +1000

Upload details

Uploaded by:
Dmitry Smirnov on 2019-04-21
Uploaded to:
Original maintainer:
Dmitry Smirnov
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Eoan release on 2019-04-21 universe misc


Eoan: [FULLYBUILT] amd64


File Size SHA-256 Checksum
ca-cacert_2019.0411-1.dsc 1.8 KiB e21415299154e050b8e7b34d9dedb9ff2fb69ef54596b82053b57d1ccde078ab
ca-cacert_2019.0411.orig.tar.xz 3.5 KiB 216809c18cd54820d5e0894bc0f3307bb6c62f91b1f1a74b23a70cf762e74c10
ca-cacert_2019.0411-1.debian.tar.xz 5.4 KiB 2791c2248555bd879ee9b7abfb5a22e6de62d97a5c1a2c240c6ba6037044f591

Available diffs

No changes file available.

Binary packages built by this source

ca-cacert: root certificates

 This package provides (sub-)root certificates in PEM format.
 Root certificates allow SSL-based applications to check for the
 authenticity of certificates issued by the CAcert authority.
 . is a community-driven Certificate Authority that issues
 certificates to the public for free.
 CAcert's goal is to promote awareness and education on computer security
 through the use of encryption, specifically by providing cryptographic
 certificates. These certificates can be used to digitally sign and encrypt
 email, authenticate and authorize users connecting to websites and secure
 data transmission over the internet. Any application that supports the
 Secure Socket Layer Protocol (SSL or TLS) can make use of certificates
 signed by CAcert, as can any application that uses X.509 certificates,
 e.g. for encryption or code signing and document signatures.
 Please note that CAcert may not yet comply with RFC 3647 or similar standards.