Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

814 lines
40 KiB

  1. @echo off
  2. rem
  3. rem !!!!!! dont forget that there MUST be a property usage too !!!!!!
  4. rem
  5. set l_SAUTH=1.3.6.1.5.5.7.3.1
  6. set l_CAUTH=1.3.6.1.5.5.7.3.2
  7. set l_CSIGN=1.3.6.1.5.5.7.3.3
  8. set l_EMAIL=1.3.6.1.5.5.7.3.4
  9. set l_IPTUNNEL=1.3.6.1.5.5.7.3.6
  10. set l_IPUSER=1.3.6.1.5.5.7.3.7
  11. set l_TSTMP=1.3.6.1.5.5.7.3.8
  12. set l_OCSP=1.3.6.1.5.5.7.3.9
  13. set l_SVRGT=1.3.6.1.4.1.311.10.3.3
  14. set l_NETSC=2.16.840.1.113730.4.1
  15. set l_IPSEC=1.3.6.1.5.5.8.2.2
  16. set l_EFS=1.3.6.1.4.1.311.10.3.4
  17. set l_DISABLE=1.3.6.1.4.1.311.10.4.1
  18. set l_CMGR=certmgr -add -all -c
  19. set l_CMGRCRL=certmgr -add -all -crl
  20. set l_AUTHROOTSTOREFILE=authroots.sst
  21. set l_UPDROOTSTOREFILE=updroots.sst
  22. set l_DELROOTSTOREFILE=delroots.sst
  23. set l_ROOTSTOREFILE=roots.sst
  24. set l_CASTOREFILE=cas.sst
  25. set l_DISALLOWSTOREFILE=disallow.sst
  26. rem echo .
  27. rem echo . checking out *.sst
  28. rem echo .
  29. rem %out *.sst
  30. if exist %l_AUTHROOTSTOREFILE% del %l_AUTHROOTSTOREFILE%
  31. if exist %l_UPDROOTSTOREFILE% del %l_UPDROOTSTOREFILE%
  32. if exist %l_DELROOTSTOREFILE% del %l_DELROOTSTOREFILE%
  33. if exist %l_ROOTSTOREFILE% del %l_ROOTSTOREFILE%
  34. if exist %l_CASTOREFILE% del %l_CASTOREFILE%
  35. if exist %l_DISALLOWSTOREFILE% del %l_DISALLOWSTOREFILE%
  36. rem --------------------------------------------------------------------------
  37. rem *** Delete Roots (June 2002) ***
  38. rem --------------------------------------------------------------------------
  39. rem *** CertiPoste ***
  40. rem these certs were added 7/7/99 and will expire on 6/24/2018
  41. set l_NAME=Certiposte Classe A Personne
  42. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" certip\certip1.cer %l_DELROOTSTOREFILE%
  43. set l_NAME=Certiposte Serveur
  44. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" certip\sagemroot.crt %l_DELROOTSTOREFILE%
  45. rem *** Viacode ***
  46. rem these certs were added 7/12/99
  47. set l_NAME=ViaCode Certification Authority
  48. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" Viacode\root.crt %l_DELROOTSTOREFILE%
  49. rem *** SwissKey ***
  50. rem these certs were added 7/12/99
  51. set l_NAME=Swisskey Root CA
  52. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SwissKey\root.cer %l_DELROOTSTOREFILE%
  53. rem --------------------------------------------------------------------------
  54. rem *** AUTO ROOT UPDATE (June 2002) ***
  55. rem --------------------------------------------------------------------------
  56. rem
  57. rem Baltimore
  58. rem
  59. set l_NAME=Baltimore CyberTrust Root
  60. %l_CMGR% -eku "%l_SAUTH%" -name "%l_NAME%" baltimore\cybertrust.cer %l_UPDROOTSTOREFILE%
  61. rem
  62. rem eSign Australia
  63. rem
  64. set l_NAME=eSign Australia: Gatekeeper Root CA
  65. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_TSTMP%" -name "%l_NAME%" esign\gatekeeper.cer %l_UPDROOTSTOREFILE%
  66. set l_NAME=eSign Australia: Primary Utility Root CA
  67. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_TSTMP%" -name "%l_NAME%" esign\utility.cer %l_UPDROOTSTOREFILE%
  68. set l_NAME=eSign Australia: eSign Imperito Primary Root CA
  69. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_TSTMP%" -name "%l_NAME%" esign\imperito.cer %l_UPDROOTSTOREFILE%
  70. rem
  71. rem Entrust.net
  72. rem
  73. set l_NAME=Entrust.net Global Client Certification Authority
  74. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" entrust\globalclient.cer %l_UPDROOTSTOREFILE%
  75. set l_NAME=Entrust.net Global Secure Server Certification Authority
  76. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_CSIGN%,%l_EMAIL%" -name "%l_NAME%" entrust\globalserver.cer %l_UPDROOTSTOREFILE%
  77. rem
  78. rem KMD-CA
  79. rem
  80. set l_NAME=KMD-CA Server
  81. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" kmd\server.cer %l_UPDROOTSTOREFILE%
  82. set l_NAME=KMD-CA K Person
  83. %l_CMGR% -eku "%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" kmd\person.cer %l_UPDROOTSTOREFILE%
  84. set l_NAME=KMD-CA Root
  85. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" kmd\root.cer %l_UPDROOTSTOREFILE%
  86. rem --------------------------------------------------------------------------
  87. rem *** AUTO ROOT UPDATE (June 2001) ***
  88. rem --------------------------------------------------------------------------
  89. rem
  90. rem Irish Post Office
  91. rem
  92. set l_NAME=Post.Trust Root CA
  93. %l_CMGR% -eku "%l_CSIGN%,%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_IPSEC%,%l_TSTMP%,%l_OCSP%" -name "%l_NAME%" postie\root_cert.crt %l_UPDROOTSTOREFILE%
  94. rem
  95. rem Entrust
  96. rem
  97. set l_NAME=Entrust.net Certification Authority (2048)
  98. %l_CMGR% -eku "%l_CSIGN%,%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_IPSEC%,%l_TSTMP%" -name "%l_NAME%" entrust\Entrust_2048CA.cer %l_UPDROOTSTOREFILE%
  99. set l_NAME=Entrust.net Client Certification Authority
  100. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" entrust\Entrust_clientCA.cer %l_UPDROOTSTOREFILE%
  101. rem
  102. rem Verisign
  103. rem
  104. set l_NAME=VeriSign Class 1 Public Primary Certification Authority - G3
  105. %l_CMGR% -eku "%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" verisign\c1pcag3v2.cer %l_UPDROOTSTOREFILE%
  106. set l_NAME=VeriSign Class 2 Public Primary Certification Authority - G3
  107. %l_CMGR% -eku "%l_CSIGN%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" verisign\c2pcag3v2.cer %l_UPDROOTSTOREFILE%
  108. set l_NAME=VeriSign Class 3 Public Primary Certification Authority - G3
  109. %l_CMGR% -eku "%l_CSIGN%,%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" verisign\c3pcag3v2.cer %l_UPDROOTSTOREFILE%
  110. set l_NAME=VeriSign Class 4 Public Primary Certification Authority - G3
  111. %l_CMGR% -eku "%l_CSIGN%,%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" verisign\c4pcag3v2.cer %l_UPDROOTSTOREFILE%
  112. rem --------------------------------------------------------------------------------------------------------------
  113. rem *** DISALLOW ***
  114. rem --------------------------------------------------------------------------------------------------------------
  115. rem Fraudulent Commercial Publisher Certificates issued by VeriSign
  116. set l_NAME=Fraudulent, NOT Microsoft
  117. %l_CMGR% -name "%l_NAME%" disallow\vs_mspub.cer %l_DISALLOWSTOREFILE%
  118. %l_CMGR% -name "%l_NAME%" disallow\vs_mspub2.cer %l_DISALLOWSTOREFILE%
  119. rem --------------------------------------------------------------------------------------------------------------
  120. rem *** VERISIGN ***
  121. rem --------------------------------------------------------------------------------------------------------------
  122. rem VeriSign certs to flush...
  123. rem This is hash 0x4b281266, old RSA Secure Server CA, expires 12/31/99
  124. rem set l_NAME=VeriSign/RSA Secure Server CA
  125. rem %l_CMGR% -eku "%l_SAUTH%" -name "%l_NAME%" rsa\rsa-ssca.crt %l_AUTHROOTSTOREFILE%
  126. rem This is hash 0x0884a5f8, old Class 1 Public PCA, expires 12/31/99
  127. rem set l_NAME=VeriSign Class 1 Primary CA
  128. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%" -name "%l_NAME%" verisign\class1-v0.509 %l_AUTHROOTSTOREFILE%
  129. rem This is hash 0x127046ed, old Class 1 Public PCA, expires 1/7/2004
  130. rem set l_NAME=VeriSign Class 1 Primary CA
  131. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%" -name "%l_NAME%" verisign\class1-v1.509 %l_AUTHROOTSTOREFILE%
  132. rem This is hash , old Class 4 Public PCA, expires 12/31/1999
  133. rem set l_NAME=VeriSign Class 4 Primary CA
  134. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\class4-v1.509 %l_AUTHROOTSTOREFILE%
  135. set l_NAME=VeriSign Commercial Software Publishers CA
  136. %l_CMGR% -eku "%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" verisign\mscom2004.509 %l_AUTHROOTSTOREFILE%
  137. rem This is hash 0x0fae155f, old Commercial softpub cert, expires 12/31/99
  138. rem We have to continue shipping this root because certs issued off
  139. rem of it use AKI: Issuer & serial number
  140. set l_NAME=VeriSign Commercial Software Publishers CA
  141. %l_CMGR% -eku "%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" verisign\mscom1999.509 %l_AUTHROOTSTOREFILE%
  142. rem Certificate Revocation List (CRL) for the above VeriSign CA
  143. %l_CMGRCRL% verisign\verisignpub.crl %l_CASTOREFILE%
  144. set l_NAME=VeriSign Individual Software Publishers CA
  145. %l_CMGR% -eku "%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" verisign\msind2004.509 %l_AUTHROOTSTOREFILE%
  146. rem This is hash 0x438d4e9c, old Individual softpub cert, expires 12/31/99
  147. rem We have to continue shipping this root because certs issued off
  148. rem of it use AKI: Issuer & serial number
  149. set l_NAME=VeriSign Individual Software Publishers CA
  150. %l_CMGR% -eku "%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" verisign\msind1999.509 %l_AUTHROOTSTOREFILE%
  151. set l_NAME=VeriSign Class 1 Primary CA
  152. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%" -name "%l_NAME%" verisign\class1-v2.509 %l_AUTHROOTSTOREFILE%
  153. rem This is the VS Class 2 PCA; class2-v1 and class2-v2 are duplicates,
  154. rem only need one of them. Hash 0xbbfab727
  155. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%" -name "%l_NAME%" verisign\class2-v1.509 %l_AUTHROOTSTOREFILE%
  156. set l_NAME=VeriSign Class 2 Primary CA
  157. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%" -name "%l_NAME%" verisign\class2-v2.509 %l_AUTHROOTSTOREFILE%
  158. rem This is the VS Class 3 PCA; class3-v1 and class3-v2 are duplicates,
  159. rem only need one of them. Hash 0x4d5f2ab4
  160. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\class3-v1.509 %l_AUTHROOTSTOREFILE%
  161. set l_NAME=VeriSign Class 3 Primary CA
  162. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\class3-v2.509 %l_AUTHROOTSTOREFILE%
  163. rem set l_NAME=VeriSign/RSA Commercial CA
  164. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%" -name "%l_NAME%" rsa\rsa-cca.crt %l_AUTHROOTSTOREFILE%
  165. set l_NAME=VeriSign/RSA Secure Server CA
  166. %l_CMGR% -eku "%l_SAUTH%" -name "%l_NAME%" rsa\sscav2.509 %l_AUTHROOTSTOREFILE%
  167. rem New certs as of 5/20/98
  168. set l_NAME=VeriSign Class 1 Primary CA
  169. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%" -name "%l_NAME%" verisign\c1pca_g2.cer %l_AUTHROOTSTOREFILE%
  170. set l_NAME=VeriSign Class 2 Primary CA
  171. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%" -name "%l_NAME%" verisign\c2pca_g2.cer %l_AUTHROOTSTOREFILE%
  172. set l_NAME=VeriSign Class 3 Primary CA
  173. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\c3pca_g2.cer %l_AUTHROOTSTOREFILE%
  174. set l_NAME=VeriSign Class 4 Primary CA
  175. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\c4pca_g2.cer %l_AUTHROOTSTOREFILE%
  176. rem ------ this is the "us" cert -- we don't want to ship this!
  177. rem ------ set l_NAME=VeriSign Online Revocation Status Service
  178. rem ------ %l_CMGR% -name "%l_NAME%" verisign\crlsign-v1.509 %l_AUTHROOTSTOREFILE%
  179. set l_NAME=VeriSign Time Stamping CA
  180. %l_CMGR% -eku "%l_TSTMP%" -name "%l_NAME%" verisign\timeroot.509 %l_ROOTSTOREFILE%
  181. rem This is the VS Class 1 Intermediate
  182. rem %l_CMGR% verisign\class1iv1.509 %l_CASTOREFILE%
  183. rem This is the VS Class 2 Intermediate
  184. rem %l_CMGR% verisign\class2iv1.509 %l_CASTOREFILE%
  185. rem Replacing the VS Class 1 intermediate with one expiring on 2008
  186. %l_CMGR% verisign\c1i_2008.cer %l_CASTOREFILE%
  187. rem This is the VS Class 2 Intermediate
  188. rem Replacing the VS Class 2 intermediate with one expiring on 2004
  189. %l_CMGR% verisign\c2i_2004.cer %l_CASTOREFILE%
  190. rem New VS certs as of 7/7/99
  191. set l_NAME=VeriSign Class 1 Primary CA
  192. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%" -name "%l_NAME%" verisign\C1PCAG2v2.cer %l_AUTHROOTSTOREFILE%
  193. set l_NAME=VeriSign Class 2 Primary CA
  194. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%" -name "%l_NAME%" verisign\C2PCAG2v2.cer %l_AUTHROOTSTOREFILE%
  195. set l_NAME=VeriSign Class 3 Primary CA
  196. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\C3PCAG2v2.cer %l_AUTHROOTSTOREFILE%
  197. set l_NAME=VeriSign Class 4 Primary CA
  198. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\C4PCAG2v2.cer %l_AUTHROOTSTOREFILE%
  199. set l_NAME=VeriSign Class 1 Public Primary CA
  200. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%" -name "%l_NAME%" verisign\PCA1_v4.cer %l_AUTHROOTSTOREFILE%
  201. set l_NAME=VeriSign Class 2 Public Primary CA
  202. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%" -name "%l_NAME%" verisign\PCA2_v4.cer %l_AUTHROOTSTOREFILE%
  203. set l_NAME=VeriSign Class 3 Public Primary CA
  204. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_CSIGN%,%l_SAUTH%" -name "%l_NAME%" verisign\PCA3_v4.cer %l_AUTHROOTSTOREFILE%
  205. rem VS SGC x-cert to fix SP6 SGC problem
  206. %l_CMGR% verisign\c3i_2004.cer %l_CASTOREFILE%
  207. rem --------------------------------------------------------------------------------------------------------------
  208. rem *** MICROSOFT ***
  209. rem --------------------------------------------------------------------------------------------------------------
  210. set l_NAME=Microsoft Authenticode(tm) Root
  211. %l_CMGR% -eku "%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" msft\msroot99.cer %l_ROOTSTOREFILE%
  212. set l_NAME=Microsoft Timestamp Root
  213. %l_CMGR% -eku "%l_TSTMP%" -name "%l_NAME%" msft\hawking.cer %l_ROOTSTOREFILE%
  214. rem SGC root removed (Win2k 387794 & WinSE 3715)
  215. rem This is the MS Root for Server-Gated Crypto (SGC)
  216. rem set l_NAME=Microsoft Root SGC Authority
  217. rem %l_CMGR% -eku "%l_SAUTH%,%l_SVRGT%,%l_NETSC%" -name "%l_NAME%" msft\sgcroot.crt %l_ROOTSTOREFILE%
  218. rem
  219. rem On 12/3/01 removed the SGC CA certs
  220. rem
  221. rem This is the SGC intermediate certificate
  222. rem %l_CMGR% -eku "%l_SAUTH%,%l_SVRGT%,%l_NETSC%" msft\sgc_ca.crt %l_CASTOREFILE%
  223. rem This is the MS Root Authority (calling it the WHQL root is a misnomer).
  224. rem It expires in 2020
  225. set l_NAME=Microsoft Root Authority
  226. %l_CMGR% -name "%l_NAME%" msft\whqlroot.cer %l_ROOTSTOREFILE%
  227. rem This is the MS Root Authority generated in 2001 with a bit length of 4096
  228. rem It expires in 2021
  229. set l_NAME=Microsoft Root Certificate Authority
  230. %l_CMGR% -name "%l_NAME%" msft\msroot01.cer %l_ROOTSTOREFILE%
  231. rem This is the WHQL intermediate cert (chains off the MS Root Authority),
  232. rem used for things like Memphis driver signing, MS publishing, etc.
  233. rem
  234. rem On 9-10-02 replaced whqlint.cer with whqlint_bc.cer
  235. rem whqlint_bc.cer has a basic constraints extension which whqlint.cer doesn't
  236. set l_NAME=Microsoft Windows Hardware Compatibility
  237. %l_CMGR% msft\whqlint_bc.cer %l_CASTOREFILE%
  238. rem %l_CMGR% msft\mstemp.cer %l_CASTOREFILE%
  239. %l_CMGR% test\mstest.cer %l_CASTOREFILE%
  240. rem --------------------------------------------------------------------------------------------------------------
  241. rem *** GTE ***
  242. rem --------------------------------------------------------------------------------------------------------------
  243. rem this is an old GTE root, hash 0x129c55b6, expires 12/31/99
  244. rem we're keeping it this go-round while GTE migrates to a new key.
  245. rem set l_NAME=GTE CyberTrust Root
  246. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%" -name "%l_NAME%" gte\ct_root.cer %l_AUTHROOTSTOREFILE%
  247. rem this is the new GTE root, hash, expires 4/4/2004
  248. set l_NAME=GTE CyberTrust Root
  249. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%" -name "%l_NAME%" gte\ct200404.cer %l_AUTHROOTSTOREFILE%
  250. set l_NAME=GTE CyberTrust Root
  251. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%" -name "%l_NAME%" gte\ct200602.cer %l_AUTHROOTSTOREFILE%
  252. set l_NAME=GTE CyberTrust Global Root
  253. %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" gte\ct201808.cer %l_AUTHROOTSTOREFILE%
  254. rem
  255. rem On 12/3/01 removed the SGC CA certs
  256. rem
  257. rem GTE SGC bridge cert
  258. rem %l_CMGR% gte\gtebridge.cer %l_CASTOREFILE%
  259. rem --------------------------------------------------------------------------------------------------------------
  260. rem *** ATT ***
  261. rem --------------------------------------------------------------------------------------------------------------
  262. rem These certificates (0x7c76ed02 and 0x8dd3f0c5) expire in 1/16/01 and 12/31/99; we're not carrying any AT&T root certs any more (at least, they haven't replaced any for NT5 B2)
  263. rem set l_NAME=ATT Certificate Services
  264. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%" -name "%l_NAME%" att\att.crt %l_AUTHROOTSTOREFILE%
  265. rem set l_NAME=ATT Directory Services
  266. rem %l_CMGR% -eku "%l_EMAIL%,%l_CAUTH%,%l_SAUTH%" -name "%l_NAME%" att\attdir.crt %l_AUTHROOTSTOREFILE%
  267. rem --------------------------------------------------------------------------------------------------------------
  268. rem *** THAWTE ***
  269. rem --------------------------------------------------------------------------------------------------------------
  270. rem this is an old Thawte premium server root, hash 0xd1dc53dc, expires 7/27/98
  271. rem %l_CMGR% -eku "%l_SAUTH%,%l_CSIGN%" thawte\spca1998.crt %l_AUTHROOTSTOREFILE%
  272. rem this is an old Thawte server CA root, hash 0x9008b1f0, expires 7/27/98
  273. rem %l_CMGR% -eku "%l_SAUTH%,%l_CSIGN%" thawte\sca1998.crt %l_AUTHROOTSTOREFILE%
  274. set l_NAME=Thawte Personal Basic CA
  275. %l_CMGR% -eku "%l_CAUTH%,%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" thawte\pbca2020.crt %l_AUTHROOTSTOREFILE%
  276. set l_NAME=Thawte Personal Premium CA
  277. %l_CMGR% -eku "%l_CAUTH%,%l_EMAIL%,%l_CSIGN%" -name "%l_NAME%" thawte\ppca2020.crt %l_AUTHROOTSTOREFILE%
  278. set l_NAME=Thawte Personal Freemail CA
  279. %l_CMGR% -eku "%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" thawte\pfca2020.crt %l_AUTHROOTSTOREFILE%
  280. set l_NAME=Thawte Server CA
  281. %l_CMGR% -eku "%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" thawte\sca2020.crt %l_AUTHROOTSTOREFILE%
  282. set l_NAME=Thawte Premium Server CA
  283. %l_CMGR% -eku "%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" thawte\spca2020.crt %l_AUTHROOTSTOREFILE%
  284. set l_NAME=Thawte Timestamping CA
  285. %l_CMGR% -eku "%l_TSTMP%" -name "%l_NAME%" thawte\ts2020.cer %l_AUTHROOTSTOREFILE%
  286. rem
  287. rem On 12/3/01 removed the SGC CA certs
  288. rem
  289. rem Thawte SGC bridge cert
  290. rem %l_CMGR% thawte\sgc1.cer %l_CASTOREFILE%
  291. rem
  292. rem On 12/3/01 removed the SGC CA certs
  293. rem
  294. rem Thawte SGC premium bridge cert
  295. rem %l_CMGR% thawte\prem_sgc.cer %l_CASTOREFILE%
  296. rem --------------------------------------------------------------------------------------------------------------
  297. rem *** KEYWITNESS ***
  298. rem --------------------------------------------------------------------------------------------------------------
  299. rem Keywitness is out of business. Do not add this CA back into the product in the future.
  300. rem *** KeyWitness removed on 7/7/99 ***
  301. rem this is the old KeyWitness root, hash 0xBDCD5DEA, expires 5/6/99
  302. rem %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" other\kwitness.crt %l_AUTHROOTSTOREFILE%
  303. rem this is the new KeyWitness root, hash 0x06d81263, expires 5/5/2004
  304. rem set l_NAME=KeyWitness Global 2048 Root
  305. rem %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" -name "%l_NAME%" other\kw2004.cer %l_AUTHROOTSTOREFILE%
  306. rem --------------------------------------------------------------------------------------------------------------
  307. rem *** MCI ***
  308. rem --------------------------------------------------------------------------------------------------------------
  309. rem This is an old MCI root cert, hash 0x6357d33d, expires 7/16/98
  310. rem %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%" other\mcimall.crt %l_AUTHROOTSTOREFILE%
  311. rem --------------------------------------------------------------------------------------------------------------
  312. rem *** Correos ***
  313. rem --------------------------------------------------------------------------------------------------------------
  314. rem these certs are added 7/7/99 and will expire on 6/24/2018
  315. set l_NAME=SERVICIOS DE CERTIFICACION - A.N.C.
  316. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" Correos\ca.crt %l_AUTHROOTSTOREFILE%
  317. rem --------------------------------------------------------------------------------------------------------------
  318. rem *** Digital Signature Trust ***
  319. rem --------------------------------------------------------------------------------------------------------------
  320. rem these certs are added 7/7/99
  321. set l_NAME=DST (ANX Network) CA
  322. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\ANX.cer %l_AUTHROOTSTOREFILE%
  323. set l_NAME=DSTCA E1
  324. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\DSTCAE1.cer %l_AUTHROOTSTOREFILE%
  325. set l_NAME=DSTCA E2
  326. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\DSTCAE2.cer %l_AUTHROOTSTOREFILE%
  327. set l_NAME=DST-Entrust GTI CA
  328. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\DSTEntrst.cer %l_AUTHROOTSTOREFILE%
  329. set l_NAME=DST RootCA X1
  330. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\DSTXCA1.cer %l_AUTHROOTSTOREFILE%
  331. set l_NAME=DST RootCA X2
  332. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\DSTXCA2.cer %l_AUTHROOTSTOREFILE%
  333. set l_NAME=Xcert EZ by DST
  334. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\X3CER.cer %l_AUTHROOTSTOREFILE%
  335. set l_NAME=DST (National Retail Federation) RootCA
  336. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\NRF.cer %l_AUTHROOTSTOREFILE%
  337. set l_NAME=DST (United Parcel Service) RootCA
  338. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\UPS.cer %l_AUTHROOTSTOREFILE%
  339. rem these certs are added 7/12/99
  340. set l_NAME=DST (ABA.ECOM) CA
  341. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\ABACER.cer %l_AUTHROOTSTOREFILE%
  342. set l_NAME=DST (Baltimore EZ) CA
  343. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DigSigT\baltimore.cer %l_AUTHROOTSTOREFILE%
  344. rem --------------------------------------------------------------------------------------------------------------
  345. rem *** Equifax ***
  346. rem --------------------------------------------------------------------------------------------------------------
  347. rem these certs are added 7/7/99
  348. set l_NAME=Equifax Secure eBusiness CA-1
  349. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" Equifax\ebus_ca1.cer %l_AUTHROOTSTOREFILE%
  350. set l_NAME=Equifax Secure eBusiness CA-2
  351. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" Equifax\ebus_ca2.cer %l_AUTHROOTSTOREFILE%
  352. set l_NAME=Equifax Secure Global eBusiness CA-1
  353. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" Equifax\gebus_ca1.cer %l_AUTHROOTSTOREFILE%
  354. set l_NAME=Equifax Secure Certificate Authority
  355. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" Equifax\sec_ca.cer %l_AUTHROOTSTOREFILE%
  356. rem --------------------------------------------------------------------------------------------------------------
  357. rem *** First Data Digital Certificates Inc. ***
  358. rem --------------------------------------------------------------------------------------------------------------
  359. rem these certs are added 7/7/99
  360. set l_NAME=First Data Digital Certificates Inc. Certification Authority
  361. %l_CMGR% -name "%l_NAME%" FDC\ca.cer %l_AUTHROOTSTOREFILE%
  362. rem --------------------------------------------------------------------------------------------------------------
  363. rem *** FNMT ***
  364. rem --------------------------------------------------------------------------------------------------------------
  365. rem these certs are added 7/7/99
  366. set l_NAME=Fabrica Nacional de Moneda y Timbre
  367. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" FNMT\fnmt.cer %l_AUTHROOTSTOREFILE%
  368. rem --------------------------------------------------------------------------------------------------------------
  369. rem *** GlobalSign ***
  370. rem --------------------------------------------------------------------------------------------------------------
  371. rem these certs are added 7/7/99
  372. set l_NAME=GlobalSign Root CA
  373. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CSIGN%,%l_TSTMP%" -name "%l_NAME%" GlobalS\root.cer %l_AUTHROOTSTOREFILE%
  374. rem
  375. rem On 12/3/01 removed the SGC CA certs
  376. rem
  377. rem GlobalSign SGC bridge cert
  378. rem %l_CMGR% GlobalS\gbridge.cer %l_CASTOREFILE%
  379. rem --------------------------------------------------------------------------------------------------------------
  380. rem *** Japan Certification Services ***
  381. rem --------------------------------------------------------------------------------------------------------------
  382. rem these certs are added 7/7/99
  383. set l_NAME=Japan Certification Services, Inc. SecureSign RootCA1
  384. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" JCS\jcsca1.der %l_AUTHROOTSTOREFILE%
  385. set l_NAME=Japan Certification Services, Inc. SecureSign RootCA2
  386. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" JCS\jcsca2.der %l_AUTHROOTSTOREFILE%
  387. set l_NAME=Japan Certification Services, Inc. SecureSign RootCA3
  388. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" JCS\jcsca3.der %l_AUTHROOTSTOREFILE%
  389. rem --------------------------------------------------------------------------------------------------------------
  390. rem *** KeyMail ***
  391. rem --------------------------------------------------------------------------------------------------------------
  392. rem these certs are added 7/7/99
  393. set l_NAME=KeyMail PTT Post Root CA
  394. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" KeyMail\PTTCA.CRT %l_AUTHROOTSTOREFILE%
  395. rem --------------------------------------------------------------------------------------------------------------
  396. rem *** National Association of Mexican Notary ***
  397. rem --------------------------------------------------------------------------------------------------------------
  398. rem these certs are added 7/7/99
  399. set l_NAME=Autoridad Certificadora de la Asociacion Nacional del Notariado
  400. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" NAMx\ANNM.cer %l_AUTHROOTSTOREFILE%
  401. set l_NAME=Autoridad Certificadora del Colegio Nacional de Correduria Publica Mexicana, A.C.
  402. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" NAMx\CNCPM.cer %l_AUTHROOTSTOREFILE%
  403. rem --------------------------------------------------------------------------------------------------------------
  404. rem *** Saunalahden Serveri ***
  405. rem --------------------------------------------------------------------------------------------------------------
  406. rem these certs are added 7/7/99
  407. set l_NAME=Saunalahden Serveri CA
  408. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SFS\goldnew.cer %l_AUTHROOTSTOREFILE%
  409. set l_NAME=Saunalahden Serveri CA
  410. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SFS\silvernew.cer %l_AUTHROOTSTOREFILE%
  411. rem --------------------------------------------------------------------------------------------------------------
  412. rem *** Societa Interbancaria per l'Automazione ***
  413. rem --------------------------------------------------------------------------------------------------------------
  414. rem these certs are added 7/7/99
  415. set l_NAME=Societa Interbancaria per l'Automazione SIA Secure Client CA
  416. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SIA\seccli.der %l_AUTHROOTSTOREFILE%
  417. rem this cert is added 7/12/99
  418. set l_NAME=Societa Interbancaria per l'Automazione SIA Secure Server CA
  419. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SIA\secsrv.der %l_AUTHROOTSTOREFILE%
  420. rem --------------------------------------------------------------------------------------------------------------
  421. rem *** Valicert ***
  422. rem --------------------------------------------------------------------------------------------------------------
  423. rem these certs are added 7/7/99
  424. set l_NAME=ValiCert Class 1 Policy Validation Authority
  425. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" ValiCert\class1.cer %l_AUTHROOTSTOREFILE%
  426. set l_NAME=ValiCert Class 2 Policy Validation Authority
  427. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" ValiCert\class2.cer %l_AUTHROOTSTOREFILE%
  428. set l_NAME=ValiCert Class 3 Policy Validation Authority
  429. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" ValiCert\class3.cer %l_AUTHROOTSTOREFILE%
  430. rem --------------------------------------------------------------------------------------------------------------
  431. rem *** Belgacom ***
  432. rem --------------------------------------------------------------------------------------------------------------
  433. rem these certs are added 7/12/99
  434. set l_NAME=Belgacom E-Trust Primary CA
  435. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" Belgacom\primary.crt %l_AUTHROOTSTOREFILE%
  436. rem --------------------------------------------------------------------------------------------------------------
  437. rem *** CertiSign ***
  438. rem --------------------------------------------------------------------------------------------------------------
  439. rem these certs are added 7/12/99
  440. set l_NAME=Certisign Autoridade Certificadora AC1S
  441. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertiSign\AC1S.der %l_AUTHROOTSTOREFILE%
  442. set l_NAME=Certisign Autoridade Certificadora AC2
  443. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertiSign\AC2.der %l_AUTHROOTSTOREFILE%
  444. set l_NAME=Certisign Autoridade Certificadora AC3S
  445. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertiSign\AC3S.der %l_AUTHROOTSTOREFILE%
  446. set l_NAME=Certisign Autoridade Certificadora AC4
  447. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertiSign\AC4.der %l_AUTHROOTSTOREFILE%
  448. rem --------------------------------------------------------------------------------------------------------------
  449. rem *** CertPlus ***
  450. rem --------------------------------------------------------------------------------------------------------------
  451. rem these certs are added 7/12/99
  452. set l_NAME=CertPlus Class 1 Primary CA
  453. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertPlus\class1.cer %l_AUTHROOTSTOREFILE%
  454. set l_NAME=CertPlus Class 2 Primary CA
  455. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertPlus\class2.cer %l_AUTHROOTSTOREFILE%
  456. set l_NAME=CertPlus Class 3 Primary CA
  457. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertPlus\class3.cer %l_AUTHROOTSTOREFILE%
  458. set l_NAME=CertPlus Class 3P Primary CA
  459. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertPlus\class3p.cer %l_AUTHROOTSTOREFILE%
  460. set l_NAME=CertPlus Class 3TS Primary CA
  461. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" CertPlus\class3ts.cer %l_AUTHROOTSTOREFILE%
  462. rem --------------------------------------------------------------------------------------------------------------
  463. rem *** Deutsche Telekom ***
  464. rem --------------------------------------------------------------------------------------------------------------
  465. rem these certs are added 7/12/99
  466. set l_NAME=Deutsche Telekom Root CA 1
  467. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DeutscheT\DTroot1.cer %l_AUTHROOTSTOREFILE%
  468. set l_NAME=Deutsche Telekom Root CA 2
  469. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" DeutscheT\DTroot2.cer %l_AUTHROOTSTOREFILE%
  470. rem --------------------------------------------------------------------------------------------------------------
  471. rem *** Entrust.net ***
  472. rem --------------------------------------------------------------------------------------------------------------
  473. rem these certs are added 7/12/99
  474. set l_NAME=Entrust.net Secure Server Certification Authority
  475. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CAUTH%,%l_CSIGN%" -name "%l_NAME%" Entrust\entrust.cer %l_AUTHROOTSTOREFILE%
  476. rem --------------------------------------------------------------------------------------------------------------
  477. rem *** EUnet ***
  478. rem --------------------------------------------------------------------------------------------------------------
  479. rem these certs are added 7/12/99
  480. set l_NAME=EUnet International Root CA
  481. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" EUNet\rootEUI.crt %l_AUTHROOTSTOREFILE%
  482. rem --------------------------------------------------------------------------------------------------------------
  483. rem *** Feste ***
  484. rem --------------------------------------------------------------------------------------------------------------
  485. rem these certs are added 7/12/99
  486. set l_NAME=FESTE, Verified Certs
  487. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" Feste\cacert1.der %l_AUTHROOTSTOREFILE%
  488. set l_NAME=FESTE, Public Notary Certs
  489. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" Feste\cacert2.der %l_AUTHROOTSTOREFILE%
  490. rem --------------------------------------------------------------------------------------------------------------
  491. rem *** IPS ***
  492. rem --------------------------------------------------------------------------------------------------------------
  493. rem these certs are added 7/12/99
  494. set l_NAME=IPS SERVIDORES
  495. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%,%l_CSIGN%" -name "%l_NAME%" IPS\root.cer %l_AUTHROOTSTOREFILE%
  496. rem --------------------------------------------------------------------------------------------------------------
  497. rem *** SecureNet (Australia) ***
  498. rem --------------------------------------------------------------------------------------------------------------
  499. rem these certs are added 7/12/99
  500. set l_NAME=SecureNet CA Class A
  501. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNet\classAv1.cer %l_AUTHROOTSTOREFILE%
  502. set l_NAME=SecureNet CA Class B
  503. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNet\classBv1.cer %l_AUTHROOTSTOREFILE%
  504. set l_NAME=SecureNet CA Root
  505. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNet\Rootv3.cer %l_AUTHROOTSTOREFILE%
  506. set l_NAME=SecureNet CA SGC Root
  507. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNet\RootSGC.cer %l_AUTHROOTSTOREFILE%
  508. rem
  509. rem On 12/3/01 removed the SGC CA certs
  510. rem
  511. rem Rotek SGC bridge cert
  512. rem %l_CMGR% SecNet\rbridge.cer %l_CASTOREFILE%
  513. rem --------------------------------------------------------------------------------------------------------------
  514. rem *** SecureNet (Hong Kong) ***
  515. rem --------------------------------------------------------------------------------------------------------------
  516. rem these certs are added 7/12/99
  517. set l_NAME=CW HKT SecureNet CA Class A
  518. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNetCW\classA.cer %l_AUTHROOTSTOREFILE%
  519. set l_NAME=CW HKT SecureNet CA Class B
  520. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNetCW\classB.cer %l_AUTHROOTSTOREFILE%
  521. set l_NAME=CW HKT SecureNet CA Root
  522. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNetCW\Root.cer %l_AUTHROOTSTOREFILE%
  523. set l_NAME=CW HKT SecureNet CA SGC Root
  524. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" SecNetCW\RootSGC.cer %l_AUTHROOTSTOREFILE%
  525. rem --------------------------------------------------------------------------------------------------------------
  526. rem *** TC TrustCenter ***
  527. rem --------------------------------------------------------------------------------------------------------------
  528. rem these certs are added 7/12/99
  529. set l_NAME=TC TrustCenter Class 1 CA
  530. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" TCTrust\tc_lot_1.cer %l_AUTHROOTSTOREFILE%
  531. set l_NAME=TC TrustCenter Class 2 CA
  532. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" TCTrust\tc_lot_2.cer %l_AUTHROOTSTOREFILE%
  533. set l_NAME=TC TrustCenter Class 3 CA
  534. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" TCTrust\tc_lot_3.cer %l_AUTHROOTSTOREFILE%
  535. set l_NAME=TC TrustCenter Class 4 CA
  536. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" TCTrust\tc_lot_4.cer %l_AUTHROOTSTOREFILE%
  537. set l_NAME=TC TrustCenter Time Stamping CA
  538. %l_CMGR% -eku "%l_TSTMP%" -name "%l_NAME%" TCTrust\tc_lot_ts.cer %l_AUTHROOTSTOREFILE%
  539. rem --------------------------------------------------------------------------------------------------------------
  540. rem *** UserTrust ***
  541. rem --------------------------------------------------------------------------------------------------------------
  542. rem these certs are added 7/12/99
  543. set l_NAME=UTN - DATACorp SGC
  544. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" UserTrust\rootsgc.cer %l_AUTHROOTSTOREFILE%
  545. set l_NAME=UTN - USERFirst-Client Authentication and Email
  546. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" UserTrust\cli_e.cer %l_AUTHROOTSTOREFILE%
  547. set l_NAME=UTN - USERFirst-Hardware
  548. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" UserTrust\hardware.cer %l_AUTHROOTSTOREFILE%
  549. set l_NAME=UTN - USERFirst-Network Applications
  550. %l_CMGR% -eku "%l_EMAIL%,%l_SAUTH%" -name "%l_NAME%" UserTrust\netapp.cer %l_AUTHROOTSTOREFILE%
  551. set l_NAME=UTN - USERFirst-Object
  552. %l_CMGR% -eku "%l_CSIGN%,%l_TSTMP%" -name "%l_NAME%" UserTrust\object.cer %l_AUTHROOTSTOREFILE%
  553. rem
  554. rem On 12/3/01 removed the SGC CA certs
  555. rem
  556. rem UserTrust SGC bridge cert
  557. rem %l_CMGR% UserTrust\utbridge.cer %l_CASTOREFILE%
  558. rem --------------------------------------------------------------------------------------------------------------
  559. rem *** NetLock ***
  560. rem --------------------------------------------------------------------------------------------------------------
  561. rem these certs are added 7/15/99
  562. set l_NAME=NetLock Kozjegyzoi (Class A) Tanusitvanykiado
  563. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_IPUSER%,%l_IPTUNNEL%,%l_EFS%,%l_TSTMP%" -name "%l_NAME%" NetLock\classa.cer %l_AUTHROOTSTOREFILE%
  564. set l_NAME=NetLock Uzleti (Class B) Tanusitvanykiado
  565. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_IPUSER%,%l_IPTUNNEL%,%l_EFS%,%l_TSTMP%" -name "%l_NAME%" NetLock\classb.cer %l_AUTHROOTSTOREFILE%
  566. set l_NAME=NetLock Expressz (Class C) Tanusitvanykiado
  567. %l_CMGR% -eku "%l_SAUTH%,%l_CAUTH%,%l_EMAIL%,%l_IPUSER%,%l_IPTUNNEL%,%l_EFS%,%l_TSTMP%" -name "%l_NAME%" NetLock\classc.cer %l_AUTHROOTSTOREFILE%
  568. rem --------------------------------------------------------------------------------------------------------------
  569. rem *** .sst file checkin ***
  570. rem --------------------------------------------------------------------------------------------------------------
  571. rem echo .
  572. rem echo . checking in *.sst
  573. rem echo .
  574. rem %in -c"auto create" *.sst
  575. certmgr -v %l_AUTHROOTSTOREFILE% > authroots.txt
  576. certmgr -v %l_ROOTSTOREFILE% > roots.txt
  577. certmgr -v %l_CASTOREFILE% > cas.txt