├── .gitattributes ├── .github ├── FUNDING.yml ├── ISSUE_TEMPLATE │ ├── bug_report.yml │ ├── config.yml │ └── feature_request.yml ├── dependabot.yml └── workflows │ ├── build.yml │ ├── comment_on_issues.yml │ ├── custom_build.yml │ ├── shellcheck.yml │ ├── update.yml │ └── workflow.yml ├── DLL ├── README.md ├── WsaPatch.dll └── icu.dll ├── LICENSE ├── bin ├── EROFS │ ├── fuse.erofs │ └── mkfs.erofs ├── arm64 │ └── lspinit └── x64 │ └── lspinit ├── cacerts ├── 01ee3bf3.0 ├── 024c10e0.0 ├── 0888e817.0 ├── 0b4055f7.0 ├── 281f8e47.0 ├── 2ef957f0.0 ├── 39698488.0 ├── 3f66ddee.0 ├── 42afec87.0 ├── 482e0622.0 ├── 4a3b190e.0 ├── 4eba579e.0 ├── 6207c6f5.0 ├── 66bbb532.0 ├── 820d5f23.0 ├── 85c0c4be.0 ├── a4f6f3c0.0 ├── b0396035.0 ├── ea335731.0 ├── f9b4d31c.0 └── fbb5e364.0 ├── common └── system │ └── priv-app │ └── VpnDialogs │ └── VpnDialogs.apk ├── docs ├── Fixes │ ├── Fix Error 0x80073CF0.md │ ├── Fix Error 0x80073CF6.md │ ├── Fix Error 0x80073CF9.md │ ├── Fix Error 0x80073CFB.md │ ├── Fix Error 0x80073CFD.md │ ├── Fix Error 0x80073D10.md │ ├── FixInstallps1.md │ ├── FixInternet.md │ ├── FixPathTooLong.md │ ├── FixVirtError.md │ ├── Google Play Issues.md │ ├── InstallPs1FailedToUpdate.md │ ├── InternetSecuritySettingsBlock.md │ ├── Keyboard Is Not Working.md │ ├── MissingIcons.md │ ├── TargetMachineActivelyRefusedConnection.md │ ├── WSA Does Not Load After Install + No Splashscreen.md │ ├── WSA Settings App Crashes + Android Apps Do Not Load After Installation.md │ └── WSA Stopped Working.md ├── Guides │ ├── ADB-Sideloading.md │ ├── BusyBox.md │ ├── ChangingGPU.md │ ├── Checksum.md │ ├── KernelSU.md │ ├── LocalHostLoopback.md │ ├── MoveToExtDrive.md │ ├── Sideloading.md │ ├── WSA-Sideloader.md │ ├── WSAFiles.md │ └── WSAPacman.md ├── Issues.html ├── README.md └── index.html ├── installer ├── Run.bat ├── arm64 │ ├── Install.ps1 │ └── MakePri.ps1 └── x64 │ ├── Install.ps1 │ └── MakePri.ps1 ├── linker ├── libc.so ├── libdl.so ├── libm.so └── linker64 ├── scripts ├── WSAUpdateChecker.py ├── build_with_lspinit.sh ├── build_with_mount.sh ├── extractMagisk.py ├── extractWSA.py ├── fixGappsProp.py ├── generateAddonsLink.py ├── generateGappsLink.py ├── generateKernelSULink.py ├── generateMagiskLink.py ├── generateWSALinks.py ├── init.lsp.magisk.rc ├── post-fs-data.sh └── requirements.txt └── xml ├── FE3FileUrl.xml ├── GetCookie.xml ├── WUIDRequest.xml └── priconfig.xml /.gitattributes: -------------------------------------------------------------------------------- 1 | * text eol=lf merge=theirs 2 | 3 | *.bat text eol=crlf 4 | *.ps1 text eol=crlf 5 | 6 | *.exe binary 7 | *.dll binary 8 | *.erofs binary 9 | linker64 binary 10 | *.so binary 11 | -------------------------------------------------------------------------------- /.github/FUNDING.yml: -------------------------------------------------------------------------------- 1 | github: [YT-Advanced, s1204IT] 2 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/bug_report.yml: -------------------------------------------------------------------------------- 1 | name: Bug report Bug 2 | description: Report errors or unexpected behavior. 3 | labels: [bug] 4 | title: "[Bug] Short description." 5 | body: 6 | - type: markdown 7 | attributes: 8 | value: | 9 | Thanks for reporting issues of WSA-Script! 10 | 11 | To make it easier for us to help you please enter detailed information below. 12 | - type: textarea 13 | attributes: 14 | label: Steps to reproduce 15 | value: | 16 | 1. 17 | 2. 18 | 3. 19 | validations: 20 | required: true 21 | - type: textarea 22 | attributes: 23 | label: Expected behaviour 24 | placeholder: Tell us what should happen 25 | validations: 26 | required: true 27 | - type: textarea 28 | attributes: 29 | label: Actual behaviour 30 | placeholder: Tell us what happens instead 31 | validations: 32 | required: true 33 | - type: input 34 | attributes: 35 | label: Windows version 36 | description: Win key + R -> "winver" 37 | placeholder: 10.0.22000.978 38 | validations: 39 | required: true 40 | - type: input 41 | attributes: 42 | label: Build Issue number 43 | description: | 44 | Specify the issue number used for the build 45 | This is NOT place to descript the WSA version!! 46 | placeholder: '#13' 47 | - type: checkboxes 48 | id: latest 49 | attributes: 50 | label: Version requirement 51 | options: 52 | - label: I am using latest commit of WSA-Script commit 53 | required: true 54 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/config.yml: -------------------------------------------------------------------------------- 1 | blank_issues_enabled: true 2 | contact_links: 3 | - name: Build Your Custom Build 4 | url: https://yt-advanced.github.io/WSA-Script 5 | about: A website that can help you build Custom WSA 6 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/feature_request.yml: -------------------------------------------------------------------------------- 1 | --- 2 | name: Feature request 3 | description: Suggest an idea. 4 | labels: [enhancement] 5 | title: "[Feature Request] Short description." 6 | body: 7 | - type: textarea 8 | attributes: 9 | label: Is your feature request related to a problem? 10 | placeholder: A clear and concise description of what the problem is. 11 | validations: 12 | required: true 13 | - type: textarea 14 | attributes: 15 | label: Describe the solution you'd like 16 | placeholder: A clear and concise description of what you want to happen. 17 | validations: 18 | required: true 19 | - type: textarea 20 | attributes: 21 | label: Additional context 22 | placeholder: Add any other context or screenshots about the feature request here. 23 | validations: 24 | required: false 25 | -------------------------------------------------------------------------------- /.github/dependabot.yml: -------------------------------------------------------------------------------- 1 | version: 2 2 | updates: 3 | - package-ecosystem: "github-actions" 4 | directory: "/" 5 | schedule: 6 | interval: "daily" 7 | -------------------------------------------------------------------------------- /.github/workflows/build.yml: -------------------------------------------------------------------------------- 1 | name: Auto Build function (Use for call only) 2 | on: 3 | workflow_call: 4 | inputs: 5 | arch: 6 | type: string 7 | gapps: 8 | type: string 9 | root: 10 | type: string 11 | release_type: 12 | type: string 13 | jobs: 14 | build: 15 | name: Build WSA 16 | runs-on: ubuntu-latest 17 | steps: 18 | - name: Checkout ♻️ 19 | uses: actions/checkout@v4 20 | 21 | - name: Setup Python 🏭 22 | uses: actions/setup-python@v5 23 | with: 24 | check-latest: true 25 | python-version: '3.10' 26 | cache: 'pip' 27 | cache-dependency-path: scripts/ 28 | 29 | - name: Setup Python3 Virtual Enviroment 🐍 30 | working-directory: scripts 31 | run: | 32 | sudo apt-get update 33 | PYTHON_VENV_DIR="$(dirname "$PWD")/python3-env" 34 | python3 -m venv "$PYTHON_VENV_DIR" || abort "Failed to create python3 virtual env" 35 | # shellcheck disable=SC1091 36 | source "$PYTHON_VENV_DIR/bin/activate" || abort "Failed to activate python3 virtual env" 37 | python3 -c "import pkg_resources; pkg_resources.require(open('requirements.txt',mode='r'))" &>/dev/null || { 38 | echo "Installing Python3 dependencies" 39 | python3 -m pip install --upgrade -r requirements.txt || abort "Failed to install python3 dependencies" 40 | } 41 | deactivate 42 | 43 | - name: Install Ubuntu Dependencies 🧑‍🏭 44 | uses: awalsh128/cache-apt-pkgs-action@v1 45 | with: 46 | packages: e2fsprogs attr unzip qemu-utils python3-venv 47 | version: 1.0 48 | 49 | - name: Build WSA ${{ inputs.arch }} with GApps ${{ inputs.root }} 🏗️ 50 | id: wsa 51 | run: | 52 | if [[ "${{ inputs.release_type }}" == "WIF" ]]; then 53 | RLS_TYPE="latest" 54 | else 55 | RLS_TYPE="retail" 56 | fi 57 | 58 | if [[ "${{ inputs.gapps }}" == "MindTheGapps" ]]; then 59 | WITH_GAPPS="--install-gapps" 60 | else 61 | WITH_GAPPS="" 62 | fi 63 | 64 | mkdir -p download 65 | 66 | if [[ "${{ inputs.root }}" == *magisk* ]]; then 67 | ./scripts/build_with_lspinit.sh --arch ${{ inputs.arch }} --release-type $RLS_TYPE --magisk-branch topjohnwu --magisk-ver stable $WITH_GAPPS --root-sol ${{ inputs.root }} --remove-amazon --compress-format 7z 68 | else 69 | ./scripts/build_with_mount.sh --arch ${{ inputs.arch }} --release-type $RLS_TYPE --magisk-branch topjohnwu --magisk-ver stable $WITH_GAPPS --root-sol ${{ inputs.root }} --remove-amazon --compress-format 7z 70 | fi 71 | 72 | - name: Pass to Windows 💸 73 | uses: actions/upload-artifact@v4 74 | with: 75 | name: ${{ steps.wsa.outputs.artifact }}-${{ steps.wsa.outputs.built }} 76 | path: output 77 | 78 | - name: Prepare release tag 🏷️ 79 | id: date 80 | run: | 81 | if [[ "${{ inputs.release_type }}" == "WIF" ]]; then 82 | echo "date=WSA-Insider-Version" >> $GITHUB_OUTPUT 83 | else 84 | echo "date=$(date +'v%Y-%m-%d')" >> $GITHUB_OUTPUT 85 | fi 86 | 87 | outputs: 88 | zipname: ${{ steps.wsa.outputs.artifact }} 89 | date: ${{ steps.date.outputs.date }} 90 | built: ${{ steps.wsa.outputs.built }} 91 | 92 | make-pri: 93 | name: Merge PRI resources 94 | runs-on: windows-latest 95 | needs: build 96 | steps: 97 | - name: Checkout ♻️ 98 | uses: actions/checkout@v4 99 | 100 | - name: Download built artifact ⌛ 101 | uses: actions/download-artifact@v4 102 | with: 103 | path: output 104 | name: ${{ needs.build.outputs.zipname }}-${{ needs.build.outputs.built }} 105 | 106 | - name: Remove unused artifact ❌ 107 | uses: geekyeggo/delete-artifact@v5 108 | with: 109 | name: ${{ needs.build.outputs.zipname }}-${{ needs.build.outputs.built }} 110 | 111 | - name: Merge language and density resources 🧙🏻‍♂️ 112 | run: | 113 | if ("${{ inputs.arch }}" -eq "x64") { 114 | (Start-Process pwsh.exe -NoNewWindow -PassThru -Args "-ExecutionPolicy Bypass -File MakePri.ps1" -WorkingDirectory "${{ github.workspace }}\output\${{ needs.build.outputs.zipname }}").WaitForExit() 115 | } else { 116 | Copy-Item -Force "C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\arm64\makepri.exe" "${{ github.workspace }}\output\${{ needs.build.outputs.zipname }}" 117 | } 118 | - name: Compact Images 💿 119 | run: | 120 | foreach ($Partition in 'system','product','system_ext','vendor') { 121 | Write-Output "Optimizing of $Partition..." 122 | Write-Output "SELECT VDISK FILE=`"${{ github.workspace }}\output\${{ needs.build.outputs.zipname }}\$Partition.vhdx`"` 123 | ATTACH VDISK READONLY` 124 | COMPACT VDISK` 125 | DETACH VDISK" | Set-Content -Path "$Partition.txt" -Encoding Ascii 126 | Start-Process -NoNewWindow -Wait "diskpart.exe" -Args "/s $Partition.txt" -RedirectStandardOutput NUL 127 | } 128 | 129 | - name: Compress artifact 📦 130 | run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -sdel -- "${{ needs.build.outputs.zipname }}.7z" ".\output\${{ needs.build.outputs.zipname }}\*" 131 | 132 | - name: File Checksum ✔️ 133 | id: run 134 | run: ("hash=" + $(Get-FileHash -Path "${{ needs.build.outputs.zipname }}.7z" -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append 135 | 136 | - name: Update build to release 🤌 137 | uses: softprops/action-gh-release@v2.2.2 138 | with: 139 | files: ${{ needs.build.outputs.zipname }}.7z 140 | fail_on_unmatched_files: true 141 | append_body: true 142 | tag_name: ${{ needs.build.outputs.date }} 143 | body: ${{ steps.run.outputs.hash }} ${{ needs.build.outputs.zipname }}.7z 144 | -------------------------------------------------------------------------------- /.github/workflows/shellcheck.yml: -------------------------------------------------------------------------------- 1 | name: Shell checker 2 | 3 | on: 4 | push: 5 | paths: 6 | - '**.sh' 7 | - '.github/workflows/shellcheck.yml' 8 | pull_request: 9 | paths: 10 | - '**.sh' 11 | - '.github/workflows/shellcheck.yml' 12 | workflow_dispatch: 13 | 14 | jobs: 15 | shellcheck: 16 | runs-on: ubuntu-latest 17 | steps: 18 | - name: Checkout 19 | uses: actions/checkout@v4 20 | 21 | - name: Run ShellCheck 22 | id: check 23 | uses: ludeeus/action-shellcheck@master 24 | with: 25 | scandir: './scripts' 26 | -------------------------------------------------------------------------------- /.github/workflows/update.yml: -------------------------------------------------------------------------------- 1 | name: Check update 2 | on: 3 | schedule: 4 | - cron: "0 0 * * *" 5 | workflow_dispatch: 6 | 7 | jobs: 8 | check: 9 | name: Check update 10 | if: github.repository == 'YT-Advanced/WSA-Script' 11 | runs-on: ubuntu-latest 12 | steps: 13 | - name: Checkout ♻️ 14 | uses: actions/checkout@v4 15 | 16 | - name: Install Dependencies 🧑‍🏭 17 | run: | 18 | pip3 install requests 19 | 20 | - name: Get app version ✅ 21 | working-directory: scripts 22 | run: python3 WSAUpdateChecker.py 23 | env: 24 | API_KEY: ${{ secrets.API_KEY }} 25 | 26 | - name: Update App version 🔗 27 | uses: stefanzweifel/git-auto-commit-action@v5 28 | if: env.SHOULD_BUILD == 'yes' 29 | with: 30 | branch: update 31 | push_options: '--force' 32 | file_pattern: '*.appversion' 33 | commit_message: ${{ env.MSG }} 34 | create_branch: true 35 | 36 | - name: Prepare release tag 🏷️ 37 | if: env.SHOULD_BUILD == 'yes' 38 | id: date 39 | shell: bash 40 | run: | 41 | if [[ "${{ env.RELEASE_TYPE }}" == "WIF" ]]; then 42 | echo "tag=WSA-Insider-Version" >> $GITHUB_OUTPUT 43 | echo "prerls=true" >> $GITHUB_OUTPUT 44 | else 45 | echo "tag=$(date +'v%Y-%m-%d')" >> $GITHUB_OUTPUT 46 | echo "prerls=false" >> $GITHUB_OUTPUT 47 | fi 48 | 49 | - name: Delete Tag (if exist) ❌ 50 | if: steps.date.outputs.tag == 'WSA-Insider-Version' 51 | uses: dev-drprasad/delete-tag-and-release@v1.1 52 | with: 53 | tag_name: ${{ steps.date.outputs.tag }} 54 | github_token: ${{ secrets.GITHUB_TOKEN }} 55 | 56 | - name: Add text format to release 📝 57 | if: env.SHOULD_BUILD == 'yes' 58 | uses: softprops/action-gh-release@v2.2.2 59 | with: 60 | tag_name: ${{ steps.date.outputs.tag }} 61 | body: "# Changelog\n## ${{ env.MSG }}\n### SHA256 Checksum\n```" 62 | prerelease: ${{ steps.date.outputs.prerls }} 63 | draft: false 64 | 65 | - name: Delete old workflow run ❌ 66 | uses: Mattraks/delete-workflow-runs@v2 67 | with: 68 | token: ${{ github.token }} 69 | repository: ${{ github.repository }} 70 | retain_days: 0 71 | keep_minimum_runs: 0 72 | delete_workflow_pattern: "Check update" 73 | 74 | outputs: 75 | SHOULD_BUILD: ${{ env.SHOULD_BUILD }} 76 | RELEASE_TYPE: ${{ env.RELEASE_TYPE }} 77 | 78 | build: 79 | name: ${{ matrix.arch }}-${{ matrix.root }}-${{ matrix.gapps }} 80 | strategy: 81 | matrix: 82 | arch: [x64, arm64] 83 | root: [magisk, kernelsu, none] 84 | gapps: [MindTheGapps, none] 85 | permissions: write-all 86 | needs: check 87 | uses: ./.github/workflows/build.yml 88 | if: needs.check.outputs.SHOULD_BUILD == 'yes' 89 | with: 90 | arch: ${{ matrix.arch }} 91 | gapps: ${{ matrix.gapps }} 92 | root: ${{ matrix.root }} 93 | release_type: ${{ needs.check.outputs.RELEASE_TYPE }} 94 | secrets: inherit 95 | -------------------------------------------------------------------------------- /.github/workflows/workflow.yml: -------------------------------------------------------------------------------- 1 | name: Delete old workflow runs 2 | on: 3 | workflow_dispatch: 4 | inputs: 5 | days: 6 | description: 'Number of days.' 7 | required: true 8 | default: 3 9 | minimum_runs: 10 | description: 'The minimum runs to keep for each workflow.' 11 | required: true 12 | default: 3 13 | delete_workflow_pattern: 14 | description: 'The name or filename of the workflow. if not set then it will target all workflows.' 15 | required: false 16 | delete_workflow_by_state_pattern: 17 | description: 'Remove workflow by state: active, deleted, disabled_fork, disabled_inactivity, disabled_manually' 18 | required: true 19 | default: "All" 20 | type: choice 21 | options: 22 | - "All" 23 | - active 24 | - deleted 25 | - disabled_inactivity 26 | - disabled_manually 27 | delete_run_by_conclusion_pattern: 28 | description: 'Remove workflow by conclusion: action_required, cancelled, failure, skipped, success' 29 | required: true 30 | default: "All" 31 | type: choice 32 | options: 33 | - "All" 34 | - action_required 35 | - cancelled 36 | - failure 37 | - skipped 38 | - success 39 | dry_run: 40 | description: 'Only log actions, do not perform any delete operations.' 41 | required: false 42 | 43 | jobs: 44 | del_runs: 45 | runs-on: ubuntu-latest 46 | steps: 47 | - name: Delete workflow runs 48 | uses: Mattraks/delete-workflow-runs@v2 49 | with: 50 | token: ${{ github.token }} 51 | repository: ${{ github.repository }} 52 | retain_days: ${{ github.event.inputs.days }} 53 | keep_minimum_runs: ${{ github.event.inputs.minimum_runs }} 54 | delete_workflow_pattern: ${{ github.event.inputs.delete_workflow_pattern }} 55 | delete_workflow_by_state_pattern: ${{ github.event.inputs.delete_workflow_by_state_pattern }} 56 | delete_run_by_conclusion_pattern: ${{ github.event.inputs.delete_run_by_conclusion_pattern }} 57 | dry_run: ${{ github.event.inputs.dry_run }} 58 | -------------------------------------------------------------------------------- /DLL/README.md: -------------------------------------------------------------------------------- 1 | # WSAPatch 2 | 3 | 4 | -------------------------------------------------------------------------------- /DLL/WsaPatch.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/DLL/WsaPatch.dll -------------------------------------------------------------------------------- /DLL/icu.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/DLL/icu.dll -------------------------------------------------------------------------------- /bin/EROFS/fuse.erofs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/bin/EROFS/fuse.erofs -------------------------------------------------------------------------------- /bin/EROFS/mkfs.erofs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/bin/EROFS/mkfs.erofs -------------------------------------------------------------------------------- /bin/arm64/lspinit: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/bin/arm64/lspinit -------------------------------------------------------------------------------- /bin/x64/lspinit: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/bin/x64/lspinit -------------------------------------------------------------------------------- /cacerts/01ee3bf3.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIDzzCCAregAwIBAgIJAPJgZpghday9MA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNV 3 | BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G 4 | A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMSEwHwYDVQQDDBhO 5 | ZXRGcmVlIFNpZ24gLCBIYWRyYW5WcG4wHhcNMTcwMzMwMDEwNDAwWhcNMjcwMjA2 6 | MDEwNDAwWjB+MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQH 7 | DAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUu 8 | bGluazEhMB8GA1UEAwwYTmV0RnJlZSBTaWduICwgSGFkcmFuVnBuMIIBIjANBgkq 9 | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApRXoigVenMeP9PGM9zt/TDo60AwOrjAS 10 | a2zSgR21Hy9IoJGdR57eZKMKvGirzsgTrzjZl/G92FPppx1hKyZjP1IHES0kzG74 11 | yK4JtRGC1T4GYutAHM1ZDv7ZoUnGxsEo5or6CFhR+D/zJ5fiiACFypIICb6qUynk 12 | aaSamw1JTKLNUCrs6eArJnThBJP+Czi45uM/mdrB5jnajLvRnFgeqcPp6913zKUy 13 | 4FsHPm5U26kincnRV/04UB4Xx/f3LHv9L9Ao1aViDbZlHverU0ETCEALHWqnfjX/ 14 | uSk/zRXZRzDRPCGIdVXuxiYINjCzA4+ZRrdc+qhlpuzn9ct7phi3ewIDAQABo1Aw 15 | TjAdBgNVHQ4EFgQU3C1v4yi0aNBn4CzFWEnQl2Lcl94wHwYDVR0jBBgwFoAU3C1v 16 | 4yi0aNBn4CzFWEnQl2Lcl94wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC 17 | AQEAeHISptZ4rtfTGej48OV5o5q/Z5XmU8G4qnkWX4AfqIl3SOfPc6UzHBE+gYyw 18 | zhBfvhW+MMHJaBh0LfswRfbuP3nkOQNvzVSIRyvmYqklZTTSQ1J5AsgB39C1LYWB 19 | c79cyYZH3EUU+bdXgBlIxTixpOm+eqoxQlIoAMjmOjQMvOKFsZJcj0XUdULfxC2C 20 | PbMkCJ6JB5Dr19NZxsQyEE+GhLiPJDtGcjzfHMZwUDMe1qWKAnPR5P9xZegm50HI 21 | ogmnZGL6nfpts5yqeHaQunCKQarUbvY7Sp89wI1J+ntVHVnO9VxubHqWj+1nwlna 22 | SBAWwK8ruKyu6mDloyilV6c4+g== 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | f2:60:66:98:21:75:ac:bd 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , HadranVpn" 31 | Validity 32 | Not Before: Mar 30 01:04:00 2017 GMT 33 | Not After : Feb 6 01:04:00 2027 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , HadranVpn" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:a5:15:e8:8a:05:5e:9c:c7:8f:f4:f1:8c:f7:3b: 40 | 7f:4c:3a:3a:d0:0c:0e:ae:30:12:6b:6c:d2:81:1d: 41 | b5:1f:2f:48:a0:91:9d:47:9e:de:64:a3:0a:bc:68: 42 | ab:ce:c8:13:af:38:d9:97:f1:bd:d8:53:e9:a7:1d: 43 | 61:2b:26:63:3f:52:07:11:2d:24:cc:6e:f8:c8:ae: 44 | 09:b5:11:82:d5:3e:06:62:eb:40:1c:cd:59:0e:fe: 45 | d9:a1:49:c6:c6:c1:28:e6:8a:fa:08:58:51:f8:3f: 46 | f3:27:97:e2:88:00:85:ca:92:08:09:be:aa:53:29: 47 | e4:69:a4:9a:9b:0d:49:4c:a2:cd:50:2a:ec:e9:e0: 48 | 2b:26:74:e1:04:93:fe:0b:38:b8:e6:e3:3f:99:da: 49 | c1:e6:39:da:8c:bb:d1:9c:58:1e:a9:c3:e9:eb:dd: 50 | 77:cc:a5:32:e0:5b:07:3e:6e:54:db:a9:22:9d:c9: 51 | d1:57:fd:38:50:1e:17:c7:f7:f7:2c:7b:fd:2f:d0: 52 | 28:d5:a5:62:0d:b6:65:1e:f7:ab:53:41:13:08:40: 53 | 0b:1d:6a:a7:7e:35:ff:b9:29:3f:cd:15:d9:47:30: 54 | d1:3c:21:88:75:55:ee:c6:26:08:36:30:b3:03:8f: 55 | 99:46:b7:5c:fa:a8:65:a6:ec:e7:f5:cb:7b:a6:18: 56 | b7:7b 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | DC:2D:6F:E3:28:B4:68:D0:67:E0:2C:C5:58:49:D0:97:62:DC:97:DE 61 | X509v3 Authority Key Identifier: 62 | keyid:DC:2D:6F:E3:28:B4:68:D0:67:E0:2C:C5:58:49:D0:97:62:DC:97:DE 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 78:72:12:a6:d6:78:ae:d7:d3:19:e8:f8:f0:e5:79:a3:9a:bf: 68 | 67:95:e6:53:c1:b8:aa:79:16:5f:80:1f:a8:89:77:48:e7:cf: 69 | 73:a5:33:1c:11:3e:81:8c:b0:ce:10:5f:be:15:be:30:c1:c9: 70 | 68:18:74:2d:fb:30:45:f6:ee:3f:79:e4:39:03:6f:cd:54:88: 71 | 47:2b:e6:62:a9:25:65:34:d2:43:52:79:02:c8:01:df:d0:b5: 72 | 2d:85:81:73:bf:5c:c9:86:47:dc:45:14:f9:b7:57:80:19:48: 73 | c5:38:b1:a4:e9:be:7a:aa:31:42:52:28:00:c8:e6:3a:34:0c: 74 | bc:e2:85:b1:92:5c:8f:45:d4:75:42:df:c4:2d:82:3d:b3:24: 75 | 08:9e:89:07:90:eb:d7:d3:59:c6:c4:32:10:4f:86:84:b8:8f: 76 | 24:3b:46:72:3c:df:1c:c6:70:50:33:1e:d6:a5:8a:02:73:d1: 77 | e4:ff:71:65:e8:26:e7:41:c8:a2:09:a7:64:62:fa:9d:fa:6d: 78 | b3:9c:aa:78:76:90:ba:70:8a:41:aa:d4:6e:f6:3b:4a:9f:3d: 79 | c0:8d:49:fa:7b:55:1d:59:ce:f5:5c:6e:6c:7a:96:8f:ed:67: 80 | c2:59:da:48:10:16:c0:af:2b:b8:ac:ae:ea:60:e5:a3:28:a5: 81 | 57:a7:38:fa 82 | -------------------------------------------------------------------------------- /cacerts/024c10e0.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIID1zCCAr+gAwIBAgIJAIdzf+9gLmi5MA0GCSqGSIb3DQEBCwUAMIGBMQswCQYD 3 | VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO 4 | BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEkMCIGA1UEAwwb 5 | TmV0RnJlZSBTaWduLCBLb3NoZXJTSU0gSVRDMB4XDTE4MDQyMjE2MzMxMloXDTI4 6 | MDIyOTE2MzMxMlowgYExCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQ 7 | BgNVBAcMCUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0 8 | ZnJlZS5saW5rMSQwIgYDVQQDDBtOZXRGcmVlIFNpZ24sIEtvc2hlclNJTSBJVEMw 9 | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP4S4XapIOvQv5wWbfBzg2 10 | 2fY1pWs030zMEOCVvnxMr9Fp1tgs/AVMY+UzkmawwbVDxZQL3goR7RqHPKkvsWXo 11 | TEM1DOBajU9l3JRd8djnIMMG0u8wDXzFcVmno/Mh5fCXvhAr9Dd11KokYQKcn5wT 12 | uDhJEhyEqB8Ho8BNvTyRts/HrkdJiSFEaSpr2J9BM/v9dIzINfBg/hxy7Em9B0pd 13 | wgnKr6Bz0esC10hCYphjzaKpd/23jvfZHZKq4oFSaFzhzC5pbg4cSPCxRUN7kzxs 14 | ezRhSoHhzMBXn4ay+VKhBKlKUOxT3STyxPFMYx6s40qlhlmaZ1tN4hLQrwD1jLw7 15 | AgMBAAGjUDBOMB0GA1UdDgQWBBSPs38ZeH74K6wWVOIaW6P5ePY71zAfBgNVHSME 16 | GDAWgBSPs38ZeH74K6wWVOIaW6P5ePY71zAMBgNVHRMEBTADAQH/MA0GCSqGSIb3 17 | DQEBCwUAA4IBAQAcreRYyYYW+7gfAyxfv+AXV2NDlHMuQ6/gS13JgsObnoDcxhT1 18 | cSbnAwbhvWXq7uAlD8Kbxp5uNZIt8N5ykqi4qjUXXuBMAZS75Rc9XDmmryBTfC+i 19 | fql/2G6Itcj0VaoQK9gbnMumHqdK4wiIJHy4Wx2+b+3CeznwwWz5TWxBJmAqVPCN 20 | hiu72Bh+W9wA2xuP65/FcKLpOpROQqUUT0vJd8UT46HMy7X2CXjB/ZWskGYn1V8Z 21 | 0aEvSW9FQDJllAXnTOLbXqHmY8/bdLraAL7Z7bJYLUxBcVOUe8+B+QN919kJOfk+ 22 | AYoB1o77qk3kH7jKxxPAH5G7SP2aYtylqb45 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | 87:73:7f:ef:60:2e:68:b9 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KosherSIM ITC" 31 | Validity 32 | Not Before: Apr 22 16:33:12 2018 GMT 33 | Not After : Feb 29 16:33:12 2028 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KosherSIM ITC" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:cf:e1:2e:17:6a:92:0e:bd:0b:f9:c1:66:df:07: 40 | 38:36:d9:f6:35:a5:6b:34:df:4c:cc:10:e0:95:be: 41 | 7c:4c:af:d1:69:d6:d8:2c:fc:05:4c:63:e5:33:92: 42 | 66:b0:c1:b5:43:c5:94:0b:de:0a:11:ed:1a:87:3c: 43 | a9:2f:b1:65:e8:4c:43:35:0c:e0:5a:8d:4f:65:dc: 44 | 94:5d:f1:d8:e7:20:c3:06:d2:ef:30:0d:7c:c5:71: 45 | 59:a7:a3:f3:21:e5:f0:97:be:10:2b:f4:37:75:d4: 46 | aa:24:61:02:9c:9f:9c:13:b8:38:49:12:1c:84:a8: 47 | 1f:07:a3:c0:4d:bd:3c:91:b6:cf:c7:ae:47:49:89: 48 | 21:44:69:2a:6b:d8:9f:41:33:fb:fd:74:8c:c8:35: 49 | f0:60:fe:1c:72:ec:49:bd:07:4a:5d:c2:09:ca:af: 50 | a0:73:d1:eb:02:d7:48:42:62:98:63:cd:a2:a9:77: 51 | fd:b7:8e:f7:d9:1d:92:aa:e2:81:52:68:5c:e1:cc: 52 | 2e:69:6e:0e:1c:48:f0:b1:45:43:7b:93:3c:6c:7b: 53 | 34:61:4a:81:e1:cc:c0:57:9f:86:b2:f9:52:a1:04: 54 | a9:4a:50:ec:53:dd:24:f2:c4:f1:4c:63:1e:ac:e3: 55 | 4a:a5:86:59:9a:67:5b:4d:e2:12:d0:af:00:f5:8c: 56 | bc:3b 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 8F:B3:7F:19:78:7E:F8:2B:AC:16:54:E2:1A:5B:A3:F9:78:F6:3B:D7 61 | X509v3 Authority Key Identifier: 62 | keyid:8F:B3:7F:19:78:7E:F8:2B:AC:16:54:E2:1A:5B:A3:F9:78:F6:3B:D7 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 1c:ad:e4:58:c9:86:16:fb:b8:1f:03:2c:5f:bf:e0:17:57:63: 68 | 43:94:73:2e:43:af:e0:4b:5d:c9:82:c3:9b:9e:80:dc:c6:14: 69 | f5:71:26:e7:03:06:e1:bd:65:ea:ee:e0:25:0f:c2:9b:c6:9e: 70 | 6e:35:92:2d:f0:de:72:92:a8:b8:aa:35:17:5e:e0:4c:01:94: 71 | bb:e5:17:3d:5c:39:a6:af:20:53:7c:2f:a2:7e:a9:7f:d8:6e: 72 | 88:b5:c8:f4:55:aa:10:2b:d8:1b:9c:cb:a6:1e:a7:4a:e3:08: 73 | 88:24:7c:b8:5b:1d:be:6f:ed:c2:7b:39:f0:c1:6c:f9:4d:6c: 74 | 41:26:60:2a:54:f0:8d:86:2b:bb:d8:18:7e:5b:dc:00:db:1b: 75 | 8f:eb:9f:c5:70:a2:e9:3a:94:4e:42:a5:14:4f:4b:c9:77:c5: 76 | 13:e3:a1:cc:cb:b5:f6:09:78:c1:fd:95:ac:90:66:27:d5:5f: 77 | 19:d1:a1:2f:49:6f:45:40:32:65:94:05:e7:4c:e2:db:5e:a1: 78 | e6:63:cf:db:74:ba:da:00:be:d9:ed:b2:58:2d:4c:41:71:53: 79 | 94:7b:cf:81:f9:03:7d:d7:d9:09:39:f9:3e:01:8a:01:d6:8e: 80 | fb:aa:4d:e4:1f:b8:ca:c7:13:c0:1f:91:bb:48:fd:9a:62:dc: 81 | a5:a9:be:39 82 | -------------------------------------------------------------------------------- /cacerts/0888e817.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIF0zCCA7ugAwIBAgIUC+b3kBsjJ33F8+V3PFpQU+h6H0EwDQYJKoZIhvcNAQEL 3 | BQAweTELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy 4 | dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx 5 | HDAaBgNVBAMME05ldEZyZWUgU2lnbiAsWW9zc2kwHhcNMTkwODEyMTkwNDE5WhcN 6 | MjkwNjIwMTkwNDE5WjB5MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIw 7 | EAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5l 8 | dGZyZWUubGluazEcMBoGA1UEAwwTTmV0RnJlZSBTaWduICxZb3NzaTCCAiIwDQYJ 9 | KoZIhvcNAQEBBQADggIPADCCAgoCggIBAN93Sx7QkE3PZVE1NylelP86p1oA2zv9 10 | LQBQUiwKkT4Q4gWX8TkyJL/t9AXMxdyxBF31RdNY8DF32ujfowWQdjARB7UhY8Wq 11 | A0YlSbD1RwknRrgt+g5Jq6LpeesKQ2PTp9qGDWVqLIZF8/xBlcJKD/pnNesUdGQ+ 12 | zLx6sro/Tme6LvaFNw4vHmfLGPnsBveqA27Vkz6j2Aay3STMWS7DMb/+aYBGUKvy 13 | rZGd4WOXuCY8GkB1apguEFIBRKwWl40bKXgmKqbQSbrfP1Ze5i8kibPUW6cnGkQZ 14 | d5o0GJ+1Vjis6rVULNZTFaoPiWTtZDf3atXtTsVI2MkiUPVJ7yh59OiIFENhPM5Q 15 | zSjaix4cScMMhCagKMIcU4XfqcimZY4EnMqTq+FCPvmBPdUwbZnbkJOFe8lcueiP 16 | k9Wc3xrvskbDILtfq8e0+AGDPa1ZNv+BkXeQG0bEYsvZTSolBXgXwgXJmtlrM0jR 17 | 3VzBAJTpzXmYel9o2HWpJcpBwPRjtNPXPrj9bXD6hlFdzMIdt8gx1KRZDXQB0ZJM 18 | LHlIEg89BgByriuhLMZ6/nUKcK5Adjo7hyI+WvQrSsD8dM9bt3jqXTjjhNspnB14 19 | LvpQeJF9AYhXo1YXYnQ3ipveiUt/ib9Y7BbD2zETOnWZZc7+EhUWBN4Q2Ajv5ddn 20 | 03zJE08oSiPHAgMBAAGjUzBRMB0GA1UdDgQWBBSZDKHvARiHteEbzaAccd8ZpZUL 21 | mDAfBgNVHSMEGDAWgBSZDKHvARiHteEbzaAccd8ZpZULmDAPBgNVHRMBAf8EBTAD 22 | AQH/MA0GCSqGSIb3DQEBCwUAA4ICAQBiSiaEOJQRzEm8Sa9ig5k8UEuicZRIt0jR 23 | h/rlREa9En559XyxwXGXloFbmiUdlXV26BUtbWYn6J178xZ7B0x9istJq20ZeiZF 24 | ABvv9DjuATbOLao65mowPL68C8R6ynRplVV7HE+zB3CUt4fyGEs/ud9n8DaqQysc 25 | /im40yPqTobBKWJ1RWOrAddyHpQEqdXVxH2EkHTlyvcr9StTN4/pF5iVYeaniXnZ 26 | PXqaEnYoqT9c2q8VAWc2a00dSrmHqw2TGKYJ2cSV8olkcdS6nknBsroQMd6Z8eZs 27 | lGnwC1L4Nu1WJg8ZIy+Umcf0xAwSU3Zs7AhWIph+sO1Tc8iNFSLLotOKEO0xjBrZ 28 | 9ierDYZLAVx6XCIiArzgIM0XOwzPKTkwRZ7ip5n4mWx7GxmFJREAvwjRXuWNLZtj 29 | s+IfCshjUfBUymYXn544mhou6uv9TeFQcxJ2RUzNr3xrxCuuriaUOGGBAaqrPpec 30 | r2wWl/hlpjcw606NHbDlLzRUDO4Rwy1wZ5F6Pr7VXBqZy43tbB9VNbQErXdth0kH 31 | UkjRGtv8zTO3MfG8FO1yv+QsWkHAAx73j8jGeSlLrma/KJAaJPpy0b1ud/12yCY4 32 | GkFFhltXuc5f9tx+YvBUprWmZ9pd/tcFC+s/7XtpFU3STdfjlhZ6mzcC0IkxuNO9 33 | HamDmBP6+A== 34 | -----END CERTIFICATE----- 35 | Certificate: 36 | Data: 37 | Version: 3 (0x2) 38 | Serial Number: 39 | 0b:e6:f7:90:1b:23:27:7d:c5:f3:e5:77:3c:5a:50:53:e8:7a:1f:41 40 | Signature Algorithm: sha256WithRSAEncryption 41 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,Yossi" 42 | Validity 43 | Not Before: Aug 12 19:04:19 2019 GMT 44 | Not After : Jun 20 19:04:19 2029 GMT 45 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,Yossi" 46 | Subject Public Key Info: 47 | Public Key Algorithm: rsaEncryption 48 | RSA Public-Key: (4096 bit) 49 | Modulus: 50 | 00:df:77:4b:1e:d0:90:4d:cf:65:51:35:37:29:5e: 51 | 94:ff:3a:a7:5a:00:db:3b:fd:2d:00:50:52:2c:0a: 52 | 91:3e:10:e2:05:97:f1:39:32:24:bf:ed:f4:05:cc: 53 | c5:dc:b1:04:5d:f5:45:d3:58:f0:31:77:da:e8:df: 54 | a3:05:90:76:30:11:07:b5:21:63:c5:aa:03:46:25: 55 | 49:b0:f5:47:09:27:46:b8:2d:fa:0e:49:ab:a2:e9: 56 | 79:eb:0a:43:63:d3:a7:da:86:0d:65:6a:2c:86:45: 57 | f3:fc:41:95:c2:4a:0f:fa:67:35:eb:14:74:64:3e: 58 | cc:bc:7a:b2:ba:3f:4e:67:ba:2e:f6:85:37:0e:2f: 59 | 1e:67:cb:18:f9:ec:06:f7:aa:03:6e:d5:93:3e:a3: 60 | d8:06:b2:dd:24:cc:59:2e:c3:31:bf:fe:69:80:46: 61 | 50:ab:f2:ad:91:9d:e1:63:97:b8:26:3c:1a:40:75: 62 | 6a:98:2e:10:52:01:44:ac:16:97:8d:1b:29:78:26: 63 | 2a:a6:d0:49:ba:df:3f:56:5e:e6:2f:24:89:b3:d4: 64 | 5b:a7:27:1a:44:19:77:9a:34:18:9f:b5:56:38:ac: 65 | ea:b5:54:2c:d6:53:15:aa:0f:89:64:ed:64:37:f7: 66 | 6a:d5:ed:4e:c5:48:d8:c9:22:50:f5:49:ef:28:79: 67 | f4:e8:88:14:43:61:3c:ce:50:cd:28:da:8b:1e:1c: 68 | 49:c3:0c:84:26:a0:28:c2:1c:53:85:df:a9:c8:a6: 69 | 65:8e:04:9c:ca:93:ab:e1:42:3e:f9:81:3d:d5:30: 70 | 6d:99:db:90:93:85:7b:c9:5c:b9:e8:8f:93:d5:9c: 71 | df:1a:ef:b2:46:c3:20:bb:5f:ab:c7:b4:f8:01:83: 72 | 3d:ad:59:36:ff:81:91:77:90:1b:46:c4:62:cb:d9: 73 | 4d:2a:25:05:78:17:c2:05:c9:9a:d9:6b:33:48:d1: 74 | dd:5c:c1:00:94:e9:cd:79:98:7a:5f:68:d8:75:a9: 75 | 25:ca:41:c0:f4:63:b4:d3:d7:3e:b8:fd:6d:70:fa: 76 | 86:51:5d:cc:c2:1d:b7:c8:31:d4:a4:59:0d:74:01: 77 | d1:92:4c:2c:79:48:12:0f:3d:06:00:72:ae:2b:a1: 78 | 2c:c6:7a:fe:75:0a:70:ae:40:76:3a:3b:87:22:3e: 79 | 5a:f4:2b:4a:c0:fc:74:cf:5b:b7:78:ea:5d:38:e3: 80 | 84:db:29:9c:1d:78:2e:fa:50:78:91:7d:01:88:57: 81 | a3:56:17:62:74:37:8a:9b:de:89:4b:7f:89:bf:58: 82 | ec:16:c3:db:31:13:3a:75:99:65:ce:fe:12:15:16: 83 | 04:de:10:d8:08:ef:e5:d7:67:d3:7c:c9:13:4f:28: 84 | 4a:23:c7 85 | Exponent: 65537 (0x10001) 86 | X509v3 extensions: 87 | X509v3 Subject Key Identifier: 88 | 99:0C:A1:EF:01:18:87:B5:E1:1B:CD:A0:1C:71:DF:19:A5:95:0B:98 89 | X509v3 Authority Key Identifier: 90 | keyid:99:0C:A1:EF:01:18:87:B5:E1:1B:CD:A0:1C:71:DF:19:A5:95:0B:98 91 | 92 | X509v3 Basic Constraints: critical 93 | CA:TRUE 94 | Signature Algorithm: sha256WithRSAEncryption 95 | 62:4a:26:84:38:94:11:cc:49:bc:49:af:62:83:99:3c:50:4b: 96 | a2:71:94:48:b7:48:d1:87:fa:e5:44:46:bd:12:7e:79:f5:7c: 97 | b1:c1:71:97:96:81:5b:9a:25:1d:95:75:76:e8:15:2d:6d:66: 98 | 27:e8:9d:7b:f3:16:7b:07:4c:7d:8a:cb:49:ab:6d:19:7a:26: 99 | 45:00:1b:ef:f4:38:ee:01:36:ce:2d:aa:3a:e6:6a:30:3c:be: 100 | bc:0b:c4:7a:ca:74:69:95:55:7b:1c:4f:b3:07:70:94:b7:87: 101 | f2:18:4b:3f:b9:df:67:f0:36:aa:43:2b:1c:fe:29:b8:d3:23: 102 | ea:4e:86:c1:29:62:75:45:63:ab:01:d7:72:1e:94:04:a9:d5: 103 | d5:c4:7d:84:90:74:e5:ca:f7:2b:f5:2b:53:37:8f:e9:17:98: 104 | 95:61:e6:a7:89:79:d9:3d:7a:9a:12:76:28:a9:3f:5c:da:af: 105 | 15:01:67:36:6b:4d:1d:4a:b9:87:ab:0d:93:18:a6:09:d9:c4: 106 | 95:f2:89:64:71:d4:ba:9e:49:c1:b2:ba:10:31:de:99:f1:e6: 107 | 6c:94:69:f0:0b:52:f8:36:ed:56:26:0f:19:23:2f:94:99:c7: 108 | f4:c4:0c:12:53:76:6c:ec:08:56:22:98:7e:b0:ed:53:73:c8: 109 | 8d:15:22:cb:a2:d3:8a:10:ed:31:8c:1a:d9:f6:27:ab:0d:86: 110 | 4b:01:5c:7a:5c:22:22:02:bc:e0:20:cd:17:3b:0c:cf:29:39: 111 | 30:45:9e:e2:a7:99:f8:99:6c:7b:1b:19:85:25:11:00:bf:08: 112 | d1:5e:e5:8d:2d:9b:63:b3:e2:1f:0a:c8:63:51:f0:54:ca:66: 113 | 17:9f:9e:38:9a:1a:2e:ea:eb:fd:4d:e1:50:73:12:76:45:4c: 114 | cd:af:7c:6b:c4:2b:ae:ae:26:94:38:61:81:01:aa:ab:3e:97: 115 | 9c:af:6c:16:97:f8:65:a6:37:30:eb:4e:8d:1d:b0:e5:2f:34: 116 | 54:0c:ee:11:c3:2d:70:67:91:7a:3e:be:d5:5c:1a:99:cb:8d: 117 | ed:6c:1f:55:35:b4:04:ad:77:6d:87:49:07:52:48:d1:1a:db: 118 | fc:cd:33:b7:31:f1:bc:14:ed:72:bf:e4:2c:5a:41:c0:03:1e: 119 | f7:8f:c8:c6:79:29:4b:ae:66:bf:28:90:1a:24:fa:72:d1:bd: 120 | 6e:77:fd:76:c8:26:38:1a:41:45:86:5b:57:b9:ce:5f:f6:dc: 121 | 7e:62:f0:54:a6:b5:a6:67:da:5d:fe:d7:05:0b:eb:3f:ed:7b: 122 | 69:15:4d:d2:4d:d7:e3:96:16:7a:9b:37:02:d0:89:31:b8:d3: 123 | bd:1d:a9:83:98:13:fa:f8 124 | -------------------------------------------------------------------------------- /cacerts/0b4055f7.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIID5TCCAs2gAwIBAgIJALnD1+pTBr26MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD 3 | VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO 4 | BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazErMCkGA1UEAwwi 5 | TmV0RnJlZSBTaWduICwgU2ltS2FzaGVyIC0gVHJpcGxlQzAeFw0xNzA2MjYxNzUx 6 | MDlaFw0yNzA1MDUxNzUxMDlaMIGIMQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNy 7 | YWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNV 8 | BAsMDG5ldGZyZWUubGluazErMCkGA1UEAwwiTmV0RnJlZSBTaWduICwgU2ltS2Fz 9 | aGVyIC0gVHJpcGxlQzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMM5 10 | FtnDwNn6ErV5rZhc9VV1ujRRSDfK6n9TjK0zaHKhwrTgzj6YxzopfspqwoZM6QqS 11 | ivNtDLKfQyVFUYGAFQiQgShQNYS8GheXqTI/U7SdWgKFUkdcOPmzNusYwa+G0cLz 12 | NiRkKS+yRm+sGf+QLu18KACoc5FbL1+rM8OR0aCG2md/K8Z6xnYm371BGEiZjjhX 13 | 4tGL7SonHPs35Ga4LI6pJfUUItcliWBW6HnwcRk7Ilq/9q5gUjR5sbIvt0+9hdhj 14 | 1UQjE4gcsPzN5Fc+RvwDXBqozIk8cPVSNycwY2VZ4FofEAjtanS9R5LrshKK6Oi2 15 | n61xzE/vHMVUJKYXqcUCAwEAAaNQME4wHQYDVR0OBBYEFFr8sgox5u0dhxiDDE7A 16 | n11wTtBNMB8GA1UdIwQYMBaAFFr8sgox5u0dhxiDDE7An11wTtBNMAwGA1UdEwQF 17 | MAMBAf8wDQYJKoZIhvcNAQELBQADggEBAJSPrJ3a3M0m+dHuGevOMKOjP5NexEiT 18 | hWUX86/b7u0rKfphqGsl4y+wXRCiMydOwZCMg7MQjYvmT8XoN0rlVu73BxpcxYJg 19 | I6Il4erTBSitCiXF39RQ3XW/akAqgAsaPSD4TdSImCVHW3UgJxHtRcM4SodIo+Zh 20 | 7WuNXCC5ET/C4y2EeMOtkWIcuncjPrL7pJwwiHPYjhK+SiievAzDGhrXbJxAmgy2 21 | wsV6qU03j0I3fH1jC23SJRA8GudrZqUoTcfQmERPnyTiTp1Hn271crZ8ai9MPZQm 22 | c+wKYHlblPbaj0EA06Dh6uCexhyTxa0wRtTODIfCxoHJMWWWPKb9H3k= 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | b9:c3:d7:ea:53:06:bd:ba 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , SimKasher - TripleC" 31 | Validity 32 | Not Before: Jun 26 17:51:09 2017 GMT 33 | Not After : May 5 17:51:09 2027 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , SimKasher - TripleC" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:c3:39:16:d9:c3:c0:d9:fa:12:b5:79:ad:98:5c: 40 | f5:55:75:ba:34:51:48:37:ca:ea:7f:53:8c:ad:33: 41 | 68:72:a1:c2:b4:e0:ce:3e:98:c7:3a:29:7e:ca:6a: 42 | c2:86:4c:e9:0a:92:8a:f3:6d:0c:b2:9f:43:25:45: 43 | 51:81:80:15:08:90:81:28:50:35:84:bc:1a:17:97: 44 | a9:32:3f:53:b4:9d:5a:02:85:52:47:5c:38:f9:b3: 45 | 36:eb:18:c1:af:86:d1:c2:f3:36:24:64:29:2f:b2: 46 | 46:6f:ac:19:ff:90:2e:ed:7c:28:00:a8:73:91:5b: 47 | 2f:5f:ab:33:c3:91:d1:a0:86:da:67:7f:2b:c6:7a: 48 | c6:76:26:df:bd:41:18:48:99:8e:38:57:e2:d1:8b: 49 | ed:2a:27:1c:fb:37:e4:66:b8:2c:8e:a9:25:f5:14: 50 | 22:d7:25:89:60:56:e8:79:f0:71:19:3b:22:5a:bf: 51 | f6:ae:60:52:34:79:b1:b2:2f:b7:4f:bd:85:d8:63: 52 | d5:44:23:13:88:1c:b0:fc:cd:e4:57:3e:46:fc:03: 53 | 5c:1a:a8:cc:89:3c:70:f5:52:37:27:30:63:65:59: 54 | e0:5a:1f:10:08:ed:6a:74:bd:47:92:eb:b2:12:8a: 55 | e8:e8:b6:9f:ad:71:cc:4f:ef:1c:c5:54:24:a6:17: 56 | a9:c5 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 5A:FC:B2:0A:31:E6:ED:1D:87:18:83:0C:4E:C0:9F:5D:70:4E:D0:4D 61 | X509v3 Authority Key Identifier: 62 | keyid:5A:FC:B2:0A:31:E6:ED:1D:87:18:83:0C:4E:C0:9F:5D:70:4E:D0:4D 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 94:8f:ac:9d:da:dc:cd:26:f9:d1:ee:19:eb:ce:30:a3:a3:3f: 68 | 93:5e:c4:48:93:85:65:17:f3:af:db:ee:ed:2b:29:fa:61:a8: 69 | 6b:25:e3:2f:b0:5d:10:a2:33:27:4e:c1:90:8c:83:b3:10:8d: 70 | 8b:e6:4f:c5:e8:37:4a:e5:56:ee:f7:07:1a:5c:c5:82:60:23: 71 | a2:25:e1:ea:d3:05:28:ad:0a:25:c5:df:d4:50:dd:75:bf:6a: 72 | 40:2a:80:0b:1a:3d:20:f8:4d:d4:88:98:25:47:5b:75:20:27: 73 | 11:ed:45:c3:38:4a:87:48:a3:e6:61:ed:6b:8d:5c:20:b9:11: 74 | 3f:c2:e3:2d:84:78:c3:ad:91:62:1c:ba:77:23:3e:b2:fb:a4: 75 | 9c:30:88:73:d8:8e:12:be:4a:28:9e:bc:0c:c3:1a:1a:d7:6c: 76 | 9c:40:9a:0c:b6:c2:c5:7a:a9:4d:37:8f:42:37:7c:7d:63:0b: 77 | 6d:d2:25:10:3c:1a:e7:6b:66:a5:28:4d:c7:d0:98:44:4f:9f: 78 | 24:e2:4e:9d:47:9f:6e:f5:72:b6:7c:6a:2f:4c:3d:94:26:73: 79 | ec:0a:60:79:5b:94:f6:da:8f:41:00:d3:a0:e1:ea:e0:9e:c6: 80 | 1c:93:c5:ad:30:46:d4:ce:0c:87:c2:c6:81:c9:31:65:96:3c: 81 | a6:fd:1f:79 82 | -------------------------------------------------------------------------------- /cacerts/39698488.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIID2TCCAsGgAwIBAgIJANyOw2Zo67cgMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD 3 | VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO 4 | BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazElMCMGA1UEAwwc 5 | TmV0RnJlZSBTaWduLCBLU0lNIC0gUGFydG5lcjAeFw0xODA0MjYwODIwNTlaFw0y 6 | ODAzMDQwODIwNTlaMIGCMQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIw 7 | EAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5l 8 | dGZyZWUubGluazElMCMGA1UEAwwcTmV0RnJlZSBTaWduLCBLU0lNIC0gUGFydG5l 9 | cjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPHMntK9YDmWRrtYegwY 10 | K4wXPFegP0yyh+ULK2E2aDQkm3Qf8esdYLB032f6BtjSP9OkBALCYa2hgBhxLN/B 11 | ozQeSSaZrol8Jw9eB/D8H0j4uGxvqQWCo1jqczIzWcIMOYz7DVbtWcf9Bnh6nAm4 12 | fumR6rkR9lgJb6PRcEzgcAp7T/dMm5C70X8jmS42Q1LNBtah2LDx4tPP/PLNDJMA 13 | usTJMvub9ttTdSUViHFtryoPpi9Xf8v0UXnHCLN1SouWQfuzwARwcMxMtKlewOiB 14 | rHTlFGEDtgMk4iXs3gw47J5HYI0s7GrKA0OQ8i3/kozFdvdl1Fb5pqA+GOGHw0JH 15 | x7UCAwEAAaNQME4wHQYDVR0OBBYEFEWCRa1+fLj2mN6Z1YDbIscBUIWrMB8GA1Ud 16 | IwQYMBaAFEWCRa1+fLj2mN6Z1YDbIscBUIWrMAwGA1UdEwQFMAMBAf8wDQYJKoZI 17 | hvcNAQELBQADggEBALLit1Nn8DsZhzVvp3LaWkM6B/cwj/J4PRieAnlXOieblANa 18 | Zk2IHgICyVhau6m9OJVPzja83EthGUkB2Mu0hPYQSbL29n8vMYpz5UmoqYpn78Cb 19 | lH0RLGSNTcMiz/5vDyRllbFZQM1FIikO9Pyjp4WjAGeHzgpZqNY1YDjBlQnGcJiC 20 | pdMCO/KJCXNHDSpZMI0oFNpanURQdNIB30QmWwOdCodAiXK8NBZ6HXrvxo8VkOKg 21 | 7P9T6IHq3vpRZ9wpDXYCqDvfdQRurfeTSFl/7U3NB8IxkcTCncQvV+Ry8PY23rZ9 22 | wpypjLV/3V23/aanygRRmeyGVHbSh9eSfiMBIHc= 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | dc:8e:c3:66:68:eb:b7:20 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KSIM - Partner" 31 | Validity 32 | Not Before: Apr 26 08:20:59 2018 GMT 33 | Not After : Mar 4 08:20:59 2028 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KSIM - Partner" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:f1:cc:9e:d2:bd:60:39:96:46:bb:58:7a:0c:18: 40 | 2b:8c:17:3c:57:a0:3f:4c:b2:87:e5:0b:2b:61:36: 41 | 68:34:24:9b:74:1f:f1:eb:1d:60:b0:74:df:67:fa: 42 | 06:d8:d2:3f:d3:a4:04:02:c2:61:ad:a1:80:18:71: 43 | 2c:df:c1:a3:34:1e:49:26:99:ae:89:7c:27:0f:5e: 44 | 07:f0:fc:1f:48:f8:b8:6c:6f:a9:05:82:a3:58:ea: 45 | 73:32:33:59:c2:0c:39:8c:fb:0d:56:ed:59:c7:fd: 46 | 06:78:7a:9c:09:b8:7e:e9:91:ea:b9:11:f6:58:09: 47 | 6f:a3:d1:70:4c:e0:70:0a:7b:4f:f7:4c:9b:90:bb: 48 | d1:7f:23:99:2e:36:43:52:cd:06:d6:a1:d8:b0:f1: 49 | e2:d3:cf:fc:f2:cd:0c:93:00:ba:c4:c9:32:fb:9b: 50 | f6:db:53:75:25:15:88:71:6d:af:2a:0f:a6:2f:57: 51 | 7f:cb:f4:51:79:c7:08:b3:75:4a:8b:96:41:fb:b3: 52 | c0:04:70:70:cc:4c:b4:a9:5e:c0:e8:81:ac:74:e5: 53 | 14:61:03:b6:03:24:e2:25:ec:de:0c:38:ec:9e:47: 54 | 60:8d:2c:ec:6a:ca:03:43:90:f2:2d:ff:92:8c:c5: 55 | 76:f7:65:d4:56:f9:a6:a0:3e:18:e1:87:c3:42:47: 56 | c7:b5 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 45:82:45:AD:7E:7C:B8:F6:98:DE:99:D5:80:DB:22:C7:01:50:85:AB 61 | X509v3 Authority Key Identifier: 62 | keyid:45:82:45:AD:7E:7C:B8:F6:98:DE:99:D5:80:DB:22:C7:01:50:85:AB 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | b2:e2:b7:53:67:f0:3b:19:87:35:6f:a7:72:da:5a:43:3a:07: 68 | f7:30:8f:f2:78:3d:18:9e:02:79:57:3a:27:9b:94:03:5a:66: 69 | 4d:88:1e:02:02:c9:58:5a:bb:a9:bd:38:95:4f:ce:36:bc:dc: 70 | 4b:61:19:49:01:d8:cb:b4:84:f6:10:49:b2:f6:f6:7f:2f:31: 71 | 8a:73:e5:49:a8:a9:8a:67:ef:c0:9b:94:7d:11:2c:64:8d:4d: 72 | c3:22:cf:fe:6f:0f:24:65:95:b1:59:40:cd:45:22:29:0e:f4: 73 | fc:a3:a7:85:a3:00:67:87:ce:0a:59:a8:d6:35:60:38:c1:95: 74 | 09:c6:70:98:82:a5:d3:02:3b:f2:89:09:73:47:0d:2a:59:30: 75 | 8d:28:14:da:5a:9d:44:50:74:d2:01:df:44:26:5b:03:9d:0a: 76 | 87:40:89:72:bc:34:16:7a:1d:7a:ef:c6:8f:15:90:e2:a0:ec: 77 | ff:53:e8:81:ea:de:fa:51:67:dc:29:0d:76:02:a8:3b:df:75: 78 | 04:6e:ad:f7:93:48:59:7f:ed:4d:cd:07:c2:31:91:c4:c2:9d: 79 | c4:2f:57:e4:72:f0:f6:36:de:b6:7d:c2:9c:a9:8c:b5:7f:dd: 80 | 5d:b7:fd:a6:a7:ca:04:51:99:ec:86:54:76:d2:87:d7:92:7e: 81 | 23:01:20:77 82 | -------------------------------------------------------------------------------- /cacerts/3f66ddee.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIFzzCCA7egAwIBAgIUEwVOrPcQ9DVIGMi4qkZrs70iQnowDQYJKoZIhvcNAQEL 3 | BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy 4 | dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx 5 | GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSVRDMB4XDTIxMDQxNDE3NTE1M1oXDTMx 6 | MDQxMjE3NTE1M1owdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG 7 | A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm 8 | cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSVRDMIICIjANBgkqhkiG 9 | 9w0BAQEFAAOCAg8AMIICCgKCAgEAwncsxkaH7L3LnDC3P6gVbqwWc5ieLHnKtgk8 10 | AHsHQVuzFbKJikfA5FFdZQoCslPBR83pwzTi2wrnFKzApDdLBrB8NgbAzhimQ0gd 11 | miRe4GdC8/W5WDu97+JnI+AGFGrbJxCzBfxc7hYC/0gTp9y8jWO9241OxuhYjlUf 12 | 7fXHqIlXKlz+h/0PPhop82yv5AeMolyGaQ5LnyuDCGZsS1VG+KiMhxQO9rB5pUAr 13 | qHwAJ3UzGqXoMphSyoBYpvNG4R6MGOTvDgSVOZ8CJRbI4Y4/2XRpmXKC4EsKObR5 14 | OVqm+iCSxX23DCWg/RBEClB6CAadkEFWXtOATtiCP/pPEGywOxFU82ENV/2MEm/w 15 | /HMTLoBiKA8lnq8z1KcPzZ1w8oZk/N+Y/wibuPz+qQJPIW5OiXvNcq2QiVck843v 16 | nZjEEd5GEx5FHAiPe71QBKq55Teb4G2/PeO5v26tUc9z1Nl7AQS7equ/XW3Xe5IT 17 | +HP+VIq/x0hN9fpAbOwL7vnIZO4oMWR5wVXqo8B2vCd+XtHQXeYldzaggTtc026Q 18 | cm/YHaIrexShAWKmfU5MfrGTOrfEgi11aJQTNDZzlR3eodMCkRJmV1wm8LjuJSyz 19 | CVas2kLCAQ0LoT4c1Vp8SC2/5FGZNQ9SHhiqzDESNt9efqr4CF7/1MgTGXASunoH 20 | UBp3KccCAwEAAaNTMFEwHQYDVR0OBBYEFN7AZUcFTTIew+Sve7rVPacztLA/MB8G 21 | A1UdIwQYMBaAFN7AZUcFTTIew+Sve7rVPacztLA/MA8GA1UdEwEB/wQFMAMBAf8w 22 | DQYJKoZIhvcNAQELBQADggIBAKf+3/4Adi0mslhs8N/JONbRaord4GBpqRtQ9OXV 23 | pgyF7f7S/rBFnTcBbyqCSu0EitrDIAZ81rmJ8Cx0ae827v0fkRKwmtIl/G0QgUzd 24 | 4uVPe3UuALBjqedhVrfnNGZQvb1jbeTJ9R1u7V95au32fZk+1gHc69eA2NZgQ2kk 25 | sazKnC8Urca3CgmVuuE8EeYcChRCWQ8qiCVKicm9g0tfwdLGIJMsQJPi7lXBmdlI 26 | Gex5ADiNk3G5dIKVt3BqG9KYXBN9mw6RK7LIMGPJR20ydRy5vxPazKQXHaVWnvfU 27 | 4Gg7xgjNygMFYuflt6kPfek3HdIo5CASLwzz86dhwqdp0Wun8KMx3wfXu9IArL2p 28 | AkT7z1d3zZWiaaXZ+JSUNcmC8560PVUE3Ygdkpi5AKBkLizmKt7ZuSU4LZvlcl7x 29 | kvu2ZoAFyXh6LOL+UduLCzXVpCKh9rz1cnRkcqbkfdk3pSs+Z6HXT4aZriRqRNR4 30 | 0zaIjLLR93s7rlohRmXUu7uxG0wk6K88H4f8n6IHgZHZCeizY2s7rW6ZMsjuHM4T 31 | 8PrEdYR68VKJ4kSpBRyTxlUT4CZzfRaaViEhN52JSSxXUcfpOphO1tDavyeUAR8r 32 | 1+Prire6Y6/A0U5mr9gssB2HtBw69FUC6O//foeoc9JLO08dCuDznHs+UtH06hws 33 | NA54 34 | -----END CERTIFICATE----- 35 | Certificate: 36 | Data: 37 | Version: 3 (0x2) 38 | Serial Number: 39 | 13:05:4e:ac:f7:10:f4:35:48:18:c8:b8:aa:46:6b:b3:bd:22:42:7a 40 | Signature Algorithm: sha256WithRSAEncryption 41 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, ITC" 42 | Validity 43 | Not Before: Apr 14 17:51:53 2021 GMT 44 | Not After : Apr 12 17:51:53 2031 GMT 45 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, ITC" 46 | Subject Public Key Info: 47 | Public Key Algorithm: rsaEncryption 48 | RSA Public-Key: (4096 bit) 49 | Modulus: 50 | 00:c2:77:2c:c6:46:87:ec:bd:cb:9c:30:b7:3f:a8: 51 | 15:6e:ac:16:73:98:9e:2c:79:ca:b6:09:3c:00:7b: 52 | 07:41:5b:b3:15:b2:89:8a:47:c0:e4:51:5d:65:0a: 53 | 02:b2:53:c1:47:cd:e9:c3:34:e2:db:0a:e7:14:ac: 54 | c0:a4:37:4b:06:b0:7c:36:06:c0:ce:18:a6:43:48: 55 | 1d:9a:24:5e:e0:67:42:f3:f5:b9:58:3b:bd:ef:e2: 56 | 67:23:e0:06:14:6a:db:27:10:b3:05:fc:5c:ee:16: 57 | 02:ff:48:13:a7:dc:bc:8d:63:bd:db:8d:4e:c6:e8: 58 | 58:8e:55:1f:ed:f5:c7:a8:89:57:2a:5c:fe:87:fd: 59 | 0f:3e:1a:29:f3:6c:af:e4:07:8c:a2:5c:86:69:0e: 60 | 4b:9f:2b:83:08:66:6c:4b:55:46:f8:a8:8c:87:14: 61 | 0e:f6:b0:79:a5:40:2b:a8:7c:00:27:75:33:1a:a5: 62 | e8:32:98:52:ca:80:58:a6:f3:46:e1:1e:8c:18:e4: 63 | ef:0e:04:95:39:9f:02:25:16:c8:e1:8e:3f:d9:74: 64 | 69:99:72:82:e0:4b:0a:39:b4:79:39:5a:a6:fa:20: 65 | 92:c5:7d:b7:0c:25:a0:fd:10:44:0a:50:7a:08:06: 66 | 9d:90:41:56:5e:d3:80:4e:d8:82:3f:fa:4f:10:6c: 67 | b0:3b:11:54:f3:61:0d:57:fd:8c:12:6f:f0:fc:73: 68 | 13:2e:80:62:28:0f:25:9e:af:33:d4:a7:0f:cd:9d: 69 | 70:f2:86:64:fc:df:98:ff:08:9b:b8:fc:fe:a9:02: 70 | 4f:21:6e:4e:89:7b:cd:72:ad:90:89:57:24:f3:8d: 71 | ef:9d:98:c4:11:de:46:13:1e:45:1c:08:8f:7b:bd: 72 | 50:04:aa:b9:e5:37:9b:e0:6d:bf:3d:e3:b9:bf:6e: 73 | ad:51:cf:73:d4:d9:7b:01:04:bb:7a:ab:bf:5d:6d: 74 | d7:7b:92:13:f8:73:fe:54:8a:bf:c7:48:4d:f5:fa: 75 | 40:6c:ec:0b:ee:f9:c8:64:ee:28:31:64:79:c1:55: 76 | ea:a3:c0:76:bc:27:7e:5e:d1:d0:5d:e6:25:77:36: 77 | a0:81:3b:5c:d3:6e:90:72:6f:d8:1d:a2:2b:7b:14: 78 | a1:01:62:a6:7d:4e:4c:7e:b1:93:3a:b7:c4:82:2d: 79 | 75:68:94:13:34:36:73:95:1d:de:a1:d3:02:91:12: 80 | 66:57:5c:26:f0:b8:ee:25:2c:b3:09:56:ac:da:42: 81 | c2:01:0d:0b:a1:3e:1c:d5:5a:7c:48:2d:bf:e4:51: 82 | 99:35:0f:52:1e:18:aa:cc:31:12:36:df:5e:7e:aa: 83 | f8:08:5e:ff:d4:c8:13:19:70:12:ba:7a:07:50:1a: 84 | 77:29:c7 85 | Exponent: 65537 (0x10001) 86 | X509v3 extensions: 87 | X509v3 Subject Key Identifier: 88 | DE:C0:65:47:05:4D:32:1E:C3:E4:AF:7B:BA:D5:3D:A7:33:B4:B0:3F 89 | X509v3 Authority Key Identifier: 90 | keyid:DE:C0:65:47:05:4D:32:1E:C3:E4:AF:7B:BA:D5:3D:A7:33:B4:B0:3F 91 | 92 | X509v3 Basic Constraints: critical 93 | CA:TRUE 94 | Signature Algorithm: sha256WithRSAEncryption 95 | a7:fe:df:fe:00:76:2d:26:b2:58:6c:f0:df:c9:38:d6:d1:6a: 96 | 8a:dd:e0:60:69:a9:1b:50:f4:e5:d5:a6:0c:85:ed:fe:d2:fe: 97 | b0:45:9d:37:01:6f:2a:82:4a:ed:04:8a:da:c3:20:06:7c:d6: 98 | b9:89:f0:2c:74:69:ef:36:ee:fd:1f:91:12:b0:9a:d2:25:fc: 99 | 6d:10:81:4c:dd:e2:e5:4f:7b:75:2e:00:b0:63:a9:e7:61:56: 100 | b7:e7:34:66:50:bd:bd:63:6d:e4:c9:f5:1d:6e:ed:5f:79:6a: 101 | ed:f6:7d:99:3e:d6:01:dc:eb:d7:80:d8:d6:60:43:69:24:b1: 102 | ac:ca:9c:2f:14:ad:c6:b7:0a:09:95:ba:e1:3c:11:e6:1c:0a: 103 | 14:42:59:0f:2a:88:25:4a:89:c9:bd:83:4b:5f:c1:d2:c6:20: 104 | 93:2c:40:93:e2:ee:55:c1:99:d9:48:19:ec:79:00:38:8d:93: 105 | 71:b9:74:82:95:b7:70:6a:1b:d2:98:5c:13:7d:9b:0e:91:2b: 106 | b2:c8:30:63:c9:47:6d:32:75:1c:b9:bf:13:da:cc:a4:17:1d: 107 | a5:56:9e:f7:d4:e0:68:3b:c6:08:cd:ca:03:05:62:e7:e5:b7: 108 | a9:0f:7d:e9:37:1d:d2:28:e4:20:12:2f:0c:f3:f3:a7:61:c2: 109 | a7:69:d1:6b:a7:f0:a3:31:df:07:d7:bb:d2:00:ac:bd:a9:02: 110 | 44:fb:cf:57:77:cd:95:a2:69:a5:d9:f8:94:94:35:c9:82:f3: 111 | 9e:b4:3d:55:04:dd:88:1d:92:98:b9:00:a0:64:2e:2c:e6:2a: 112 | de:d9:b9:25:38:2d:9b:e5:72:5e:f1:92:fb:b6:66:80:05:c9: 113 | 78:7a:2c:e2:fe:51:db:8b:0b:35:d5:a4:22:a1:f6:bc:f5:72: 114 | 74:64:72:a6:e4:7d:d9:37:a5:2b:3e:67:a1:d7:4f:86:99:ae: 115 | 24:6a:44:d4:78:d3:36:88:8c:b2:d1:f7:7b:3b:ae:5a:21:46: 116 | 65:d4:bb:bb:b1:1b:4c:24:e8:af:3c:1f:87:fc:9f:a2:07:81: 117 | 91:d9:09:e8:b3:63:6b:3b:ad:6e:99:32:c8:ee:1c:ce:13:f0: 118 | fa:c4:75:84:7a:f1:52:89:e2:44:a9:05:1c:93:c6:55:13:e0: 119 | 26:73:7d:16:9a:56:21:21:37:9d:89:49:2c:57:51:c7:e9:3a: 120 | 98:4e:d6:d0:da:bf:27:94:01:1f:2b:d7:e3:eb:8a:b7:ba:63: 121 | af:c0:d1:4e:66:af:d8:2c:b0:1d:87:b4:1c:3a:f4:55:02:e8: 122 | ef:ff:7e:87:a8:73:d2:4b:3b:4f:1d:0a:e0:f3:9c:7b:3e:52: 123 | d1:f4:ea:1c:2c:34:0e:78 124 | -------------------------------------------------------------------------------- /cacerts/42afec87.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIFxzCCA6+gAwIBAgIJAMOfeHNsvnuxMA0GCSqGSIb3DQEBCwUAMHoxCzAJBgNV 3 | BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G 4 | A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMR0wGwYDVQQDDBRO 5 | ZXRGcmVlIFNpZ24gLElCLUlUQzAeFw0xOTEwMjYxOTEwMjNaFw0yOTA5MDMxOTEw 6 | MjNaMHoxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUpl 7 | cnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5r 8 | MR0wGwYDVQQDDBROZXRGcmVlIFNpZ24gLElCLUlUQzCCAiIwDQYJKoZIhvcNAQEB 9 | BQADggIPADCCAgoCggIBAPistDj0oOuF1Mtu2VyYOK+O/fhMHQIYg3ZG7HMxIPBp 10 | dSpCeH+3Z6Qi1YSlDkd0sW7C3KqUt1gsJyf2HZLBrCEBBlFtCN/zCdIjo/pelR7q 11 | +qXYr67y980GzZqnlYgGbS3PbthsXfayAQi1LsSR1UXdUg91WgJLFdMgIVsnSq5K 12 | w8re1D+V9KfX1SnmH/WDfzb/ickxryyiieMQV+lNegDhsTqSaHuOowsFNgZkwsoo 13 | c+DAuHfBFn+jWwZMFPDsiWSROsh4rcft172+I4ReR1Cr2JdHzueJQNx8mTcr5COM 14 | e6Hl72K4Kot4G6ohL74GATs6fSP3kcy8UafDSnODAffixZt7S59K9hSqsMVJvTzS 15 | T/pmhrQFS7xACj4TJa/f1t+5LYRe6FdwEcXeHNcfSVVRfPgLdiKFAD5ok3TFBXfO 16 | fsAkpdhdfSSUOBWLuE/l+Ko56enic59JeewwbC322Ihvn+1PaloVINHQTlXJhCFD 17 | CkoizPrm9AFlM2IK+qPN0GSckj2X6Eo/bxFmt6GXsZW8kzoDc4TlclLxoMJB+jJn 18 | H1EH9+h1wWNR9kybBnrnKSGdlapD0OK42H/Ul44uLtNLKN3zpMvYWabSdThYTUqZ 19 | pCg8tXyQj1z/3l12Ka7QIEqkqTHF35MTe0YrDLbKo4N8s1vlkfevcwHeerSI5ts1 20 | AgMBAAGjUDBOMB0GA1UdDgQWBBSnCGbym3/xoGKcYFbwvP2yTjBbADAfBgNVHSME 21 | GDAWgBSnCGbym3/xoGKcYFbwvP2yTjBbADAMBgNVHRMEBTADAQH/MA0GCSqGSIb3 22 | DQEBCwUAA4ICAQCspY/ayI3Mwvp6nAWpBaLSw/YDWChYAG99prvgCSRYVgwRQGw5 23 | oZnhYFSZM+Suh0cHKh3tU1nZDpgn/vvqOmf1IPHCI+ZOEY73YZmPlYD3JE2ZJDzO 24 | QdJPwW/07W7XAjCIoLw27C/xJDRpBRCXpqfAfmw8qTrNEsozhX9pzJkCVr6UtYX5 25 | X5LWY0oX9Y/OY8dGQeGqQNeAMwVyW0pmUs5lmVTzPP4mhWLmqF8MCPf8ULswBfr+ 26 | uWHNGG1u7RAwm8MP4hi1IgT8bVLQJjaLFRV/dUVHDs5dnF0ZnpNnvfoJxCbyMjcR 27 | JWb4yR+31ZNrC+SZobtTcEOnzuaaL5AHGb6gZt0qGOVoykPM4dtlFH3jVrCdvOAA 28 | 0QCzjfu6o8Eb2HzdWKKm4Kxl9mlwznQrOCa3jmj6L9g/Y1tetYAnJwrgzZVvrNMV 29 | 5bLW1beBvb/Y99z3TNhjqgjv5gBeeN0cJ63k8P/ZuikuNuhCub2Lo8diYhaw2C6o 30 | 5hMg+q5U9FML//mXWsD6bHN68XPQEUf43O8BCOeIOyW1fDIX3y9RcwJf2lP4frkH 31 | Eo9RaDUsLWdPVxPvgdVSZUiOxkKJ3CxSJaffrsccNTMcFx/ACzQqn6gxRHPuqK0Y 32 | 0Ka6pV5b03zWCT+G6qzidxHjKnwOhKV5r+5nYFzcvPpZijK/RmnSDjWuTQ== 33 | -----END CERTIFICATE----- 34 | Certificate: 35 | Data: 36 | Version: 3 (0x2) 37 | Serial Number: 38 | c3:9f:78:73:6c:be:7b:b1 39 | Signature Algorithm: sha256WithRSAEncryption 40 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,IB-ITC" 41 | Validity 42 | Not Before: Oct 26 19:10:23 2019 GMT 43 | Not After : Sep 3 19:10:23 2029 GMT 44 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,IB-ITC" 45 | Subject Public Key Info: 46 | Public Key Algorithm: rsaEncryption 47 | RSA Public-Key: (4096 bit) 48 | Modulus: 49 | 00:f8:ac:b4:38:f4:a0:eb:85:d4:cb:6e:d9:5c:98: 50 | 38:af:8e:fd:f8:4c:1d:02:18:83:76:46:ec:73:31: 51 | 20:f0:69:75:2a:42:78:7f:b7:67:a4:22:d5:84:a5: 52 | 0e:47:74:b1:6e:c2:dc:aa:94:b7:58:2c:27:27:f6: 53 | 1d:92:c1:ac:21:01:06:51:6d:08:df:f3:09:d2:23: 54 | a3:fa:5e:95:1e:ea:fa:a5:d8:af:ae:f2:f7:cd:06: 55 | cd:9a:a7:95:88:06:6d:2d:cf:6e:d8:6c:5d:f6:b2: 56 | 01:08:b5:2e:c4:91:d5:45:dd:52:0f:75:5a:02:4b: 57 | 15:d3:20:21:5b:27:4a:ae:4a:c3:ca:de:d4:3f:95: 58 | f4:a7:d7:d5:29:e6:1f:f5:83:7f:36:ff:89:c9:31: 59 | af:2c:a2:89:e3:10:57:e9:4d:7a:00:e1:b1:3a:92: 60 | 68:7b:8e:a3:0b:05:36:06:64:c2:ca:28:73:e0:c0: 61 | b8:77:c1:16:7f:a3:5b:06:4c:14:f0:ec:89:64:91: 62 | 3a:c8:78:ad:c7:ed:d7:bd:be:23:84:5e:47:50:ab: 63 | d8:97:47:ce:e7:89:40:dc:7c:99:37:2b:e4:23:8c: 64 | 7b:a1:e5:ef:62:b8:2a:8b:78:1b:aa:21:2f:be:06: 65 | 01:3b:3a:7d:23:f7:91:cc:bc:51:a7:c3:4a:73:83: 66 | 01:f7:e2:c5:9b:7b:4b:9f:4a:f6:14:aa:b0:c5:49: 67 | bd:3c:d2:4f:fa:66:86:b4:05:4b:bc:40:0a:3e:13: 68 | 25:af:df:d6:df:b9:2d:84:5e:e8:57:70:11:c5:de: 69 | 1c:d7:1f:49:55:51:7c:f8:0b:76:22:85:00:3e:68: 70 | 93:74:c5:05:77:ce:7e:c0:24:a5:d8:5d:7d:24:94: 71 | 38:15:8b:b8:4f:e5:f8:aa:39:e9:e9:e2:73:9f:49: 72 | 79:ec:30:6c:2d:f6:d8:88:6f:9f:ed:4f:6a:5a:15: 73 | 20:d1:d0:4e:55:c9:84:21:43:0a:4a:22:cc:fa:e6: 74 | f4:01:65:33:62:0a:fa:a3:cd:d0:64:9c:92:3d:97: 75 | e8:4a:3f:6f:11:66:b7:a1:97:b1:95:bc:93:3a:03: 76 | 73:84:e5:72:52:f1:a0:c2:41:fa:32:67:1f:51:07: 77 | f7:e8:75:c1:63:51:f6:4c:9b:06:7a:e7:29:21:9d: 78 | 95:aa:43:d0:e2:b8:d8:7f:d4:97:8e:2e:2e:d3:4b: 79 | 28:dd:f3:a4:cb:d8:59:a6:d2:75:38:58:4d:4a:99: 80 | a4:28:3c:b5:7c:90:8f:5c:ff:de:5d:76:29:ae:d0: 81 | 20:4a:a4:a9:31:c5:df:93:13:7b:46:2b:0c:b6:ca: 82 | a3:83:7c:b3:5b:e5:91:f7:af:73:01:de:7a:b4:88: 83 | e6:db:35 84 | Exponent: 65537 (0x10001) 85 | X509v3 extensions: 86 | X509v3 Subject Key Identifier: 87 | A7:08:66:F2:9B:7F:F1:A0:62:9C:60:56:F0:BC:FD:B2:4E:30:5B:00 88 | X509v3 Authority Key Identifier: 89 | keyid:A7:08:66:F2:9B:7F:F1:A0:62:9C:60:56:F0:BC:FD:B2:4E:30:5B:00 90 | 91 | X509v3 Basic Constraints: 92 | CA:TRUE 93 | Signature Algorithm: sha256WithRSAEncryption 94 | ac:a5:8f:da:c8:8d:cc:c2:fa:7a:9c:05:a9:05:a2:d2:c3:f6: 95 | 03:58:28:58:00:6f:7d:a6:bb:e0:09:24:58:56:0c:11:40:6c: 96 | 39:a1:99:e1:60:54:99:33:e4:ae:87:47:07:2a:1d:ed:53:59: 97 | d9:0e:98:27:fe:fb:ea:3a:67:f5:20:f1:c2:23:e6:4e:11:8e: 98 | f7:61:99:8f:95:80:f7:24:4d:99:24:3c:ce:41:d2:4f:c1:6f: 99 | f4:ed:6e:d7:02:30:88:a0:bc:36:ec:2f:f1:24:34:69:05:10: 100 | 97:a6:a7:c0:7e:6c:3c:a9:3a:cd:12:ca:33:85:7f:69:cc:99: 101 | 02:56:be:94:b5:85:f9:5f:92:d6:63:4a:17:f5:8f:ce:63:c7: 102 | 46:41:e1:aa:40:d7:80:33:05:72:5b:4a:66:52:ce:65:99:54: 103 | f3:3c:fe:26:85:62:e6:a8:5f:0c:08:f7:fc:50:bb:30:05:fa: 104 | fe:b9:61:cd:18:6d:6e:ed:10:30:9b:c3:0f:e2:18:b5:22:04: 105 | fc:6d:52:d0:26:36:8b:15:15:7f:75:45:47:0e:ce:5d:9c:5d: 106 | 19:9e:93:67:bd:fa:09:c4:26:f2:32:37:11:25:66:f8:c9:1f: 107 | b7:d5:93:6b:0b:e4:99:a1:bb:53:70:43:a7:ce:e6:9a:2f:90: 108 | 07:19:be:a0:66:dd:2a:18:e5:68:ca:43:cc:e1:db:65:14:7d: 109 | e3:56:b0:9d:bc:e0:00:d1:00:b3:8d:fb:ba:a3:c1:1b:d8:7c: 110 | dd:58:a2:a6:e0:ac:65:f6:69:70:ce:74:2b:38:26:b7:8e:68: 111 | fa:2f:d8:3f:63:5b:5e:b5:80:27:27:0a:e0:cd:95:6f:ac:d3: 112 | 15:e5:b2:d6:d5:b7:81:bd:bf:d8:f7:dc:f7:4c:d8:63:aa:08: 113 | ef:e6:00:5e:78:dd:1c:27:ad:e4:f0:ff:d9:ba:29:2e:36:e8: 114 | 42:b9:bd:8b:a3:c7:62:62:16:b0:d8:2e:a8:e6:13:20:fa:ae: 115 | 54:f4:53:0b:ff:f9:97:5a:c0:fa:6c:73:7a:f1:73:d0:11:47: 116 | f8:dc:ef:01:08:e7:88:3b:25:b5:7c:32:17:df:2f:51:73:02: 117 | 5f:da:53:f8:7e:b9:07:12:8f:51:68:35:2c:2d:67:4f:57:13: 118 | ef:81:d5:52:65:48:8e:c6:42:89:dc:2c:52:25:a7:df:ae:c7: 119 | 1c:35:33:1c:17:1f:c0:0b:34:2a:9f:a8:31:44:73:ee:a8:ad: 120 | 18:d0:a6:ba:a5:5e:5b:d3:7c:d6:09:3f:86:ea:ac:e2:77:11: 121 | e3:2a:7c:0e:84:a5:79:af:ee:67:60:5c:dc:bc:fa:59:8a:32: 122 | bf:46:69:d2:0e:35:ae:4d 123 | -------------------------------------------------------------------------------- /cacerts/482e0622.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIDwzCCAqugAwIBAgIJAJvSq+oh8F6+MA0GCSqGSIb3DQEBCwUAMHgxCzAJBgNV 3 | BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G 4 | A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMRswGQYDVQQDDBJO 5 | ZXRGcmVlIFNpZ24gLCAwMTkwHhcNMTYwNDIxMTAyNzA1WhcNMjYwMjI4MTAyNzA1 6 | WjB4MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1 7 | c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEb 8 | MBkGA1UEAwwSTmV0RnJlZSBTaWduICwgMDE5MIIBIjANBgkqhkiG9w0BAQEFAAOC 9 | AQ8AMIIBCgKCAQEA5Wq8zAqW7KGANXfbg9Ck8rx4nPjSkerlSPS/yNEVa/L8HulD 10 | q/GVMRaPaL+RqI4GQt6LeQAmj1FZS01rQQITNRsg6MhNrPhENhg48rjFNIxuEnMv 11 | IfydKGGU2mFXcMtQ9IoRSe4OYE3CKDG0pYzfXhh+TW0H4KKqjO6mjPmMcNjbstpK 12 | vOPFg6Xu5em6hvtQCKC0V551WKWmNQiHOpwRdVIdbWBv3S5xiO5tZVigGpEJ1gLe 13 | 8W+Zn2ozcpvh+m38QSZ0A1DVP5Te/7q9L3+BPub8kz3C6GnNK547ucM5HBmOzNwN 14 | luZHVUsehCLc0I965Wd4ZRUXXeeo7BibjRI6mQIDAQABo1AwTjAdBgNVHQ4EFgQU 15 | tLpJD3JS6YPg7VQl2gKrPJByEycwHwYDVR0jBBgwFoAUtLpJD3JS6YPg7VQl2gKr 16 | PJByEycwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAThhIvkN/HsFG 17 | 7jaHl8yyH3IyvHX+LrItJyhRaQ4xALzGllGCLWvN15e2SWITdXncd4nMU7VRVG1k 18 | CiX6H55Jh1U/DmZHmUI2HBhf/2liFNKXKDOeHg4u+FIzgzuIc0z+RvwPpw9IVLio 19 | Pe6lbaIc5+80kO/mwJwQZoEaqTyL1Ujn69cosiZpiYF3xtxkfBWEWe7XkLunLqqV 20 | DoMEGMq+MUxO+Jngv0j/7dSi1/1eovNnrV4YeF2Flvq2xY1aCKO/cocv5v7w5wEm 21 | 8fMFQwKcT7QcCx+/nkx3r0tDHxO7og7xr8petCK+ULqwL28ha4U0l+kLF0ZRiG5H 22 | Ni6Hj6Oi9A== 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | 9b:d2:ab:ea:21:f0:5e:be 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , 019" 31 | Validity 32 | Not Before: Apr 21 10:27:05 2016 GMT 33 | Not After : Feb 28 10:27:05 2026 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , 019" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:e5:6a:bc:cc:0a:96:ec:a1:80:35:77:db:83:d0: 40 | a4:f2:bc:78:9c:f8:d2:91:ea:e5:48:f4:bf:c8:d1: 41 | 15:6b:f2:fc:1e:e9:43:ab:f1:95:31:16:8f:68:bf: 42 | 91:a8:8e:06:42:de:8b:79:00:26:8f:51:59:4b:4d: 43 | 6b:41:02:13:35:1b:20:e8:c8:4d:ac:f8:44:36:18: 44 | 38:f2:b8:c5:34:8c:6e:12:73:2f:21:fc:9d:28:61: 45 | 94:da:61:57:70:cb:50:f4:8a:11:49:ee:0e:60:4d: 46 | c2:28:31:b4:a5:8c:df:5e:18:7e:4d:6d:07:e0:a2: 47 | aa:8c:ee:a6:8c:f9:8c:70:d8:db:b2:da:4a:bc:e3: 48 | c5:83:a5:ee:e5:e9:ba:86:fb:50:08:a0:b4:57:9e: 49 | 75:58:a5:a6:35:08:87:3a:9c:11:75:52:1d:6d:60: 50 | 6f:dd:2e:71:88:ee:6d:65:58:a0:1a:91:09:d6:02: 51 | de:f1:6f:99:9f:6a:33:72:9b:e1:fa:6d:fc:41:26: 52 | 74:03:50:d5:3f:94:de:ff:ba:bd:2f:7f:81:3e:e6: 53 | fc:93:3d:c2:e8:69:cd:2b:9e:3b:b9:c3:39:1c:19: 54 | 8e:cc:dc:0d:96:e6:47:55:4b:1e:84:22:dc:d0:8f: 55 | 7a:e5:67:78:65:15:17:5d:e7:a8:ec:18:9b:8d:12: 56 | 3a:99 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | B4:BA:49:0F:72:52:E9:83:E0:ED:54:25:DA:02:AB:3C:90:72:13:27 61 | X509v3 Authority Key Identifier: 62 | keyid:B4:BA:49:0F:72:52:E9:83:E0:ED:54:25:DA:02:AB:3C:90:72:13:27 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 4e:18:48:be:43:7f:1e:c1:46:ee:36:87:97:cc:b2:1f:72:32: 68 | bc:75:fe:2e:b2:2d:27:28:51:69:0e:31:00:bc:c6:96:51:82: 69 | 2d:6b:cd:d7:97:b6:49:62:13:75:79:dc:77:89:cc:53:b5:51: 70 | 54:6d:64:0a:25:fa:1f:9e:49:87:55:3f:0e:66:47:99:42:36: 71 | 1c:18:5f:ff:69:62:14:d2:97:28:33:9e:1e:0e:2e:f8:52:33: 72 | 83:3b:88:73:4c:fe:46:fc:0f:a7:0f:48:54:b8:a8:3d:ee:a5: 73 | 6d:a2:1c:e7:ef:34:90:ef:e6:c0:9c:10:66:81:1a:a9:3c:8b: 74 | d5:48:e7:eb:d7:28:b2:26:69:89:81:77:c6:dc:64:7c:15:84: 75 | 59:ee:d7:90:bb:a7:2e:aa:95:0e:83:04:18:ca:be:31:4c:4e: 76 | f8:99:e0:bf:48:ff:ed:d4:a2:d7:fd:5e:a2:f3:67:ad:5e:18: 77 | 78:5d:85:96:fa:b6:c5:8d:5a:08:a3:bf:72:87:2f:e6:fe:f0: 78 | e7:01:26:f1:f3:05:43:02:9c:4f:b4:1c:0b:1f:bf:9e:4c:77: 79 | af:4b:43:1f:13:bb:a2:0e:f1:af:ca:5e:b4:22:be:50:ba:b0: 80 | 2f:6f:21:6b:85:34:97:e9:0b:17:46:51:88:6e:47:36:2e:87: 81 | 8f:a3:a2:f4 82 | -------------------------------------------------------------------------------- /cacerts/4a3b190e.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIFzzCCA7egAwIBAgIUWVzvad617aEkkFZ5UDDiq93NTVkwDQYJKoZIhvcNAQEL 3 | BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy 4 | dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx 5 | GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDk5MB4XDTIxMDQwNzIyMTQ0NFoXDTMx 6 | MDQwNTIyMTQ0NFowdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG 7 | A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm 8 | cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDk5MIICIjANBgkqhkiG 9 | 9w0BAQEFAAOCAg8AMIICCgKCAgEAsnHF+C8rBiEzeZJ88nKVAZEh6SwSrNwoRNLV 10 | gr69fj9mU7Tpgu8dRP+1q4MaZDTdXw+pqbvo/R9Jzc/YCN1BvrvL5ULCfNOwoCFa 11 | MyLhNQ/zXMwfWiCeWr5qJ0rdpyWrGvXrurYIcbwzgAxpQA5krBUyZI/QJIjWi6PG 12 | FZya7YrvzcvEG3Mbzl+E/G12FDuT5NVuNQIBE+mR9ZOFPrZsEDJb7SoZoIic7p1k 13 | mrHwPMv3w07QIHOwFq9e8t/c7cFMEqOUC2/+Uw73J2MdYLX5vyTDtChAM0h5M00F 14 | 14tO7t46ofZ+GHj8w0kNoFk5Z1eNIXMasbs77fCN6LYHN1seuKvDh0p4ZdDLdObo 15 | Y2XT8n+I7O2tY5PIaNoWDuQpKwUplY0WQFca7iKyy8ajojJPOMt40SaR7NtBvwl3 16 | fYRPHvX57tQB55vpcTq7uVdaeEq3/G19wRVgDLs/MIFaPTV31RyOsrUzIc944aN8 17 | YDBG4Mw6uUyVG3wxq9/QgZliW+wNj77gSMFZsj7aA0FqaDpQ4hdoGoehKP+B6y10 18 | ZVOqe/sgPnZBW/KW+3uwOP/Bq809Q+G/JUQR23bhqCYht7zbi+f5pOmKXijAjnMh 19 | Bs7fnxzc0YMNHYQ3RF9VNiteC8/+8rMgXIjq94cF8vAkm/kHT4qyNIzLVu/oUkrp 20 | UYFd0YMCAwEAAaNTMFEwHQYDVR0OBBYEFHpftzbYdX1vM6czqDzA2ABKkMMzMB8G 21 | A1UdIwQYMBaAFHpftzbYdX1vM6czqDzA2ABKkMMzMA8GA1UdEwEB/wQFMAMBAf8w 22 | DQYJKoZIhvcNAQELBQADggIBACntHyKEjJaGqezp/SYdmvC6Gw0HVEahudZJTlM8 23 | uWDCINdJFSSRMnAHC57qeKU+4AuN2ZO0BnRyVSK1XY0rlS0ZeNidRg2g1PgplJ3I 24 | 4KPKiq0LxllnPtSJiuNp81LazUj5iyqsHCPDE0pZVu1729kTfL2a2Ah3yaB5LxiX 25 | 6xMuZurI3LscOcfrN3oUH0lvlvt4hjmpi90UJ/Wtd+fllyw1sqInQfv87MOkoFzy 26 | u9Rif2ZiBwMw32K9X7q/w7/iw77G1F9u/gbogP7CgDkKCxeyl5rLwkJKgV0g93xg 27 | bonHdOmKlHYLMBuEx1CYdvAZcEwPdeiNuKbj1l8iJ4+PeYD2hRo+NmL/8Kjj3XTr 28 | Xymah0bNsJFYda7W4plL6DzjvrMjwkLq1IeLDZLvL0iNk0wfe3GY7ojvqcY55XEo 29 | TdEHiKqck8uTxzH/U5AGh26nbOxAe6AYNmbgmiJxWZXqYeqEmTx9B6Zk61RdFTem 30 | gml5hqvUjM97JmSi/ORF31uP6+Jv35oQEo4YjeDD6ACDiDBjfyjPVMGVAxf6IRSt 31 | s9O6OoYKZO09gaRuHXLSY9kfXSGsrV5mqbFr0r2C8n+u8kGjkILaCabil7cMBUfz 32 | x95VUUI9AUunwF2ERMuTgfR1CE4gDJcUTU7Wf1o3xEpvCgQ6ffYzBXkHjeOTaZkI 33 | zlA/ 34 | -----END CERTIFICATE----- 35 | Certificate: 36 | Data: 37 | Version: 3 (0x2) 38 | Serial Number: 39 | 59:5c:ef:69:de:b5:ed:a1:24:90:56:79:50:30:e2:ab:dd:cd:4d:59 40 | Signature Algorithm: sha256WithRSAEncryption 41 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 099" 42 | Validity 43 | Not Before: Apr 7 22:14:44 2021 GMT 44 | Not After : Apr 5 22:14:44 2031 GMT 45 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 099" 46 | Subject Public Key Info: 47 | Public Key Algorithm: rsaEncryption 48 | RSA Public-Key: (4096 bit) 49 | Modulus: 50 | 00:b2:71:c5:f8:2f:2b:06:21:33:79:92:7c:f2:72: 51 | 95:01:91:21:e9:2c:12:ac:dc:28:44:d2:d5:82:be: 52 | bd:7e:3f:66:53:b4:e9:82:ef:1d:44:ff:b5:ab:83: 53 | 1a:64:34:dd:5f:0f:a9:a9:bb:e8:fd:1f:49:cd:cf: 54 | d8:08:dd:41:be:bb:cb:e5:42:c2:7c:d3:b0:a0:21: 55 | 5a:33:22:e1:35:0f:f3:5c:cc:1f:5a:20:9e:5a:be: 56 | 6a:27:4a:dd:a7:25:ab:1a:f5:eb:ba:b6:08:71:bc: 57 | 33:80:0c:69:40:0e:64:ac:15:32:64:8f:d0:24:88: 58 | d6:8b:a3:c6:15:9c:9a:ed:8a:ef:cd:cb:c4:1b:73: 59 | 1b:ce:5f:84:fc:6d:76:14:3b:93:e4:d5:6e:35:02: 60 | 01:13:e9:91:f5:93:85:3e:b6:6c:10:32:5b:ed:2a: 61 | 19:a0:88:9c:ee:9d:64:9a:b1:f0:3c:cb:f7:c3:4e: 62 | d0:20:73:b0:16:af:5e:f2:df:dc:ed:c1:4c:12:a3: 63 | 94:0b:6f:fe:53:0e:f7:27:63:1d:60:b5:f9:bf:24: 64 | c3:b4:28:40:33:48:79:33:4d:05:d7:8b:4e:ee:de: 65 | 3a:a1:f6:7e:18:78:fc:c3:49:0d:a0:59:39:67:57: 66 | 8d:21:73:1a:b1:bb:3b:ed:f0:8d:e8:b6:07:37:5b: 67 | 1e:b8:ab:c3:87:4a:78:65:d0:cb:74:e6:e8:63:65: 68 | d3:f2:7f:88:ec:ed:ad:63:93:c8:68:da:16:0e:e4: 69 | 29:2b:05:29:95:8d:16:40:57:1a:ee:22:b2:cb:c6: 70 | a3:a2:32:4f:38:cb:78:d1:26:91:ec:db:41:bf:09: 71 | 77:7d:84:4f:1e:f5:f9:ee:d4:01:e7:9b:e9:71:3a: 72 | bb:b9:57:5a:78:4a:b7:fc:6d:7d:c1:15:60:0c:bb: 73 | 3f:30:81:5a:3d:35:77:d5:1c:8e:b2:b5:33:21:cf: 74 | 78:e1:a3:7c:60:30:46:e0:cc:3a:b9:4c:95:1b:7c: 75 | 31:ab:df:d0:81:99:62:5b:ec:0d:8f:be:e0:48:c1: 76 | 59:b2:3e:da:03:41:6a:68:3a:50:e2:17:68:1a:87: 77 | a1:28:ff:81:eb:2d:74:65:53:aa:7b:fb:20:3e:76: 78 | 41:5b:f2:96:fb:7b:b0:38:ff:c1:ab:cd:3d:43:e1: 79 | bf:25:44:11:db:76:e1:a8:26:21:b7:bc:db:8b:e7: 80 | f9:a4:e9:8a:5e:28:c0:8e:73:21:06:ce:df:9f:1c: 81 | dc:d1:83:0d:1d:84:37:44:5f:55:36:2b:5e:0b:cf: 82 | fe:f2:b3:20:5c:88:ea:f7:87:05:f2:f0:24:9b:f9: 83 | 07:4f:8a:b2:34:8c:cb:56:ef:e8:52:4a:e9:51:81: 84 | 5d:d1:83 85 | Exponent: 65537 (0x10001) 86 | X509v3 extensions: 87 | X509v3 Subject Key Identifier: 88 | 7A:5F:B7:36:D8:75:7D:6F:33:A7:33:A8:3C:C0:D8:00:4A:90:C3:33 89 | X509v3 Authority Key Identifier: 90 | keyid:7A:5F:B7:36:D8:75:7D:6F:33:A7:33:A8:3C:C0:D8:00:4A:90:C3:33 91 | 92 | X509v3 Basic Constraints: critical 93 | CA:TRUE 94 | Signature Algorithm: sha256WithRSAEncryption 95 | 29:ed:1f:22:84:8c:96:86:a9:ec:e9:fd:26:1d:9a:f0:ba:1b: 96 | 0d:07:54:46:a1:b9:d6:49:4e:53:3c:b9:60:c2:20:d7:49:15: 97 | 24:91:32:70:07:0b:9e:ea:78:a5:3e:e0:0b:8d:d9:93:b4:06: 98 | 74:72:55:22:b5:5d:8d:2b:95:2d:19:78:d8:9d:46:0d:a0:d4: 99 | f8:29:94:9d:c8:e0:a3:ca:8a:ad:0b:c6:59:67:3e:d4:89:8a: 100 | e3:69:f3:52:da:cd:48:f9:8b:2a:ac:1c:23:c3:13:4a:59:56: 101 | ed:7b:db:d9:13:7c:bd:9a:d8:08:77:c9:a0:79:2f:18:97:eb: 102 | 13:2e:66:ea:c8:dc:bb:1c:39:c7:eb:37:7a:14:1f:49:6f:96: 103 | fb:78:86:39:a9:8b:dd:14:27:f5:ad:77:e7:e5:97:2c:35:b2: 104 | a2:27:41:fb:fc:ec:c3:a4:a0:5c:f2:bb:d4:62:7f:66:62:07: 105 | 03:30:df:62:bd:5f:ba:bf:c3:bf:e2:c3:be:c6:d4:5f:6e:fe: 106 | 06:e8:80:fe:c2:80:39:0a:0b:17:b2:97:9a:cb:c2:42:4a:81: 107 | 5d:20:f7:7c:60:6e:89:c7:74:e9:8a:94:76:0b:30:1b:84:c7: 108 | 50:98:76:f0:19:70:4c:0f:75:e8:8d:b8:a6:e3:d6:5f:22:27: 109 | 8f:8f:79:80:f6:85:1a:3e:36:62:ff:f0:a8:e3:dd:74:eb:5f: 110 | 29:9a:87:46:cd:b0:91:58:75:ae:d6:e2:99:4b:e8:3c:e3:be: 111 | b3:23:c2:42:ea:d4:87:8b:0d:92:ef:2f:48:8d:93:4c:1f:7b: 112 | 71:98:ee:88:ef:a9:c6:39:e5:71:28:4d:d1:07:88:aa:9c:93: 113 | cb:93:c7:31:ff:53:90:06:87:6e:a7:6c:ec:40:7b:a0:18:36: 114 | 66:e0:9a:22:71:59:95:ea:61:ea:84:99:3c:7d:07:a6:64:eb: 115 | 54:5d:15:37:a6:82:69:79:86:ab:d4:8c:cf:7b:26:64:a2:fc: 116 | e4:45:df:5b:8f:eb:e2:6f:df:9a:10:12:8e:18:8d:e0:c3:e8: 117 | 00:83:88:30:63:7f:28:cf:54:c1:95:03:17:fa:21:14:ad:b3: 118 | d3:ba:3a:86:0a:64:ed:3d:81:a4:6e:1d:72:d2:63:d9:1f:5d: 119 | 21:ac:ad:5e:66:a9:b1:6b:d2:bd:82:f2:7f:ae:f2:41:a3:90: 120 | 82:da:09:a6:e2:97:b7:0c:05:47:f3:c7:de:55:51:42:3d:01: 121 | 4b:a7:c0:5d:84:44:cb:93:81:f4:75:08:4e:20:0c:97:14:4d: 122 | 4e:d6:7f:5a:37:c4:4a:6f:0a:04:3a:7d:f6:33:05:79:07:8d: 123 | e3:93:69:99:08:ce:50:3f 124 | -------------------------------------------------------------------------------- /cacerts/4eba579e.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIFzzCCA7egAwIBAgIUERKcb5NZIK+7kIzZeeqoTynDxo8wDQYJKoZIhvcNAQEL 3 | BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy 4 | dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx 5 | GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSE9UMB4XDTIyMDkxNDE1MjE0MVoXDTMy 6 | MDkxMTE1MjE0MVowdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG 7 | A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm 8 | cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSE9UMIICIjANBgkqhkiG 9 | 9w0BAQEFAAOCAg8AMIICCgKCAgEAtAAmmLun08jzoWMLyC/fzCu9aES7fLWCU2Ur 10 | u3sntuHLDJabIvU0p16hCMC3MVOTKFAKOJ9A+REyOyewQLJ+0Oi0rOPA6jk/+Srj 11 | l69AwzkJYFli7ORClC/N1E2aKWj9evZHHdXeRMs2pklM9eRR+wYQUTQ5bkd0/Lsj 12 | 81QDUSzmgX/qkq3Dc4AiSt0gR+rd+c70y8IjVnBSwmHspyGv8Ve9DdRR3U01H8pM 13 | gYpQVrN8BVfRNVpQgpjlKQZKQM1CcLFqUq++fG/QnhgcVuygGnqWAjNCkfbWi7Hq 14 | IMYK5cyA3oLYiBH8gE0Js4ypf/jtFNBTeE7aiNbF6YgD6kPvlBIQ3nWHcvYz83mc 15 | /yI8kDPHPBmNnCTxa46AYRBt3ungIKchSoIP2pfUDcwPI8C2o79ninvYxtwg2FH6 16 | Mbc/hJqaGrTsFgw9rGitniZ4GHVPftW89O3xBENP9QAHimwbG8BCiwuweDu2xPsR 17 | AJJ+a9bFRucDIaacOzrCjuzbXFJIy3KOgghe8V5mYypLHq8/pcDWczL59iWZit+l 18 | 2gt+wYIU3HxzC2AqzlBFadI10IlLFolaGyH9hJd5U0kYEXVp2IQV/6PGVhvmJI9y 19 | 9n+MqReibwUQVfuEg+l0gblqC2eTGnab5AVoCK/4cK+zxE0+wBpK70X4NtYLf0BO 20 | WItUFK8CAwEAAaNTMFEwHQYDVR0OBBYEFG+/JFFhEinGuN7gWnOZxSMerGmZMB8G 21 | A1UdIwQYMBaAFG+/JFFhEinGuN7gWnOZxSMerGmZMA8GA1UdEwEB/wQFMAMBAf8w 22 | DQYJKoZIhvcNAQELBQADggIBAEVxrI5JmqQi5DhRAVIet41hFWrEIiJwYMbRYhRK 23 | NpW1U4X7OiOm+/8v68oMkh3KHwbpIo48/egUDgv+F7Dzz5NhRgjXQbIW7ixO5+i+ 24 | 7rW+177oJVvKtpD2NAp4o0Nty826AntDzyulSs7KvoE+Ifwq7iUTNwPmeOBpd7N2 25 | WCZzpjOhhbuG4yYE+K76nZ34C8+7w3488iL8e5RwJQeuvXnEy4NiFzZmsoYqPUBd 26 | HaZIQePxXI3jYi1YdckED3GZwo9VBZkarA5GekBvF9B2z/eKoHfnRrHDuQmBSAY3 27 | +GBfqG6WNpDisKSj4YgeNXkTOZjOCyl/a3nwpLUawxAJyPjtgzc2vRDg3eVHUJNN 28 | HIp60XVRQwwCTH6dHJiHsDCb2/6DgZzcUW20a4u8+zgDN+M+V8DYGjeTN/2X18br 29 | kGN67L+n2krGQmVM4vu+42uOx0SJR/x10D8io7Vl9khWG3pB3GBoQSHivenzNPAW 30 | BfJJG4keyG3EAVPHmyHpjP36NXe8rmimOgVVGDujEz+je+w9L4YQgQg5VfVp3+Pu 31 | Wd7BbSsig+Vqgw1EDksMScLh34ZwniR1w2QL86XT5ExYNXQdo18fVYV0/OyzXKZx 32 | 8qnaParnjvguOl0YG4aXh0+72lEeIHXpPMmy6TDDqAOgNlrVbjviBw/J4Nzlty9s 33 | bXLk 34 | -----END CERTIFICATE----- 35 | Certificate: 36 | Data: 37 | Version: 3 (0x2) 38 | Serial Number: 39 | 11:12:9c:6f:93:59:20:af:bb:90:8c:d9:79:ea:a8:4f:29:c3:c6:8f 40 | Signature Algorithm: sha256WithRSAEncryption 41 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HOT" 42 | Validity 43 | Not Before: Sep 14 15:21:41 2022 GMT 44 | Not After : Sep 11 15:21:41 2032 GMT 45 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HOT" 46 | Subject Public Key Info: 47 | Public Key Algorithm: rsaEncryption 48 | RSA Public-Key: (4096 bit) 49 | Modulus: 50 | 00:b4:00:26:98:bb:a7:d3:c8:f3:a1:63:0b:c8:2f: 51 | df:cc:2b:bd:68:44:bb:7c:b5:82:53:65:2b:bb:7b: 52 | 27:b6:e1:cb:0c:96:9b:22:f5:34:a7:5e:a1:08:c0: 53 | b7:31:53:93:28:50:0a:38:9f:40:f9:11:32:3b:27: 54 | b0:40:b2:7e:d0:e8:b4:ac:e3:c0:ea:39:3f:f9:2a: 55 | e3:97:af:40:c3:39:09:60:59:62:ec:e4:42:94:2f: 56 | cd:d4:4d:9a:29:68:fd:7a:f6:47:1d:d5:de:44:cb: 57 | 36:a6:49:4c:f5:e4:51:fb:06:10:51:34:39:6e:47: 58 | 74:fc:bb:23:f3:54:03:51:2c:e6:81:7f:ea:92:ad: 59 | c3:73:80:22:4a:dd:20:47:ea:dd:f9:ce:f4:cb:c2: 60 | 23:56:70:52:c2:61:ec:a7:21:af:f1:57:bd:0d:d4: 61 | 51:dd:4d:35:1f:ca:4c:81:8a:50:56:b3:7c:05:57: 62 | d1:35:5a:50:82:98:e5:29:06:4a:40:cd:42:70:b1: 63 | 6a:52:af:be:7c:6f:d0:9e:18:1c:56:ec:a0:1a:7a: 64 | 96:02:33:42:91:f6:d6:8b:b1:ea:20:c6:0a:e5:cc: 65 | 80:de:82:d8:88:11:fc:80:4d:09:b3:8c:a9:7f:f8: 66 | ed:14:d0:53:78:4e:da:88:d6:c5:e9:88:03:ea:43: 67 | ef:94:12:10:de:75:87:72:f6:33:f3:79:9c:ff:22: 68 | 3c:90:33:c7:3c:19:8d:9c:24:f1:6b:8e:80:61:10: 69 | 6d:de:e9:e0:20:a7:21:4a:82:0f:da:97:d4:0d:cc: 70 | 0f:23:c0:b6:a3:bf:67:8a:7b:d8:c6:dc:20:d8:51: 71 | fa:31:b7:3f:84:9a:9a:1a:b4:ec:16:0c:3d:ac:68: 72 | ad:9e:26:78:18:75:4f:7e:d5:bc:f4:ed:f1:04:43: 73 | 4f:f5:00:07:8a:6c:1b:1b:c0:42:8b:0b:b0:78:3b: 74 | b6:c4:fb:11:00:92:7e:6b:d6:c5:46:e7:03:21:a6: 75 | 9c:3b:3a:c2:8e:ec:db:5c:52:48:cb:72:8e:82:08: 76 | 5e:f1:5e:66:63:2a:4b:1e:af:3f:a5:c0:d6:73:32: 77 | f9:f6:25:99:8a:df:a5:da:0b:7e:c1:82:14:dc:7c: 78 | 73:0b:60:2a:ce:50:45:69:d2:35:d0:89:4b:16:89: 79 | 5a:1b:21:fd:84:97:79:53:49:18:11:75:69:d8:84: 80 | 15:ff:a3:c6:56:1b:e6:24:8f:72:f6:7f:8c:a9:17: 81 | a2:6f:05:10:55:fb:84:83:e9:74:81:b9:6a:0b:67: 82 | 93:1a:76:9b:e4:05:68:08:af:f8:70:af:b3:c4:4d: 83 | 3e:c0:1a:4a:ef:45:f8:36:d6:0b:7f:40:4e:58:8b: 84 | 54:14:af 85 | Exponent: 65537 (0x10001) 86 | X509v3 extensions: 87 | X509v3 Subject Key Identifier: 88 | 6F:BF:24:51:61:12:29:C6:B8:DE:E0:5A:73:99:C5:23:1E:AC:69:99 89 | X509v3 Authority Key Identifier: 90 | keyid:6F:BF:24:51:61:12:29:C6:B8:DE:E0:5A:73:99:C5:23:1E:AC:69:99 91 | 92 | X509v3 Basic Constraints: critical 93 | CA:TRUE 94 | Signature Algorithm: sha256WithRSAEncryption 95 | 45:71:ac:8e:49:9a:a4:22:e4:38:51:01:52:1e:b7:8d:61:15: 96 | 6a:c4:22:22:70:60:c6:d1:62:14:4a:36:95:b5:53:85:fb:3a: 97 | 23:a6:fb:ff:2f:eb:ca:0c:92:1d:ca:1f:06:e9:22:8e:3c:fd: 98 | e8:14:0e:0b:fe:17:b0:f3:cf:93:61:46:08:d7:41:b2:16:ee: 99 | 2c:4e:e7:e8:be:ee:b5:be:d7:be:e8:25:5b:ca:b6:90:f6:34: 100 | 0a:78:a3:43:6d:cb:cd:ba:02:7b:43:cf:2b:a5:4a:ce:ca:be: 101 | 81:3e:21:fc:2a:ee:25:13:37:03:e6:78:e0:69:77:b3:76:58: 102 | 26:73:a6:33:a1:85:bb:86:e3:26:04:f8:ae:fa:9d:9d:f8:0b: 103 | cf:bb:c3:7e:3c:f2:22:fc:7b:94:70:25:07:ae:bd:79:c4:cb: 104 | 83:62:17:36:66:b2:86:2a:3d:40:5d:1d:a6:48:41:e3:f1:5c: 105 | 8d:e3:62:2d:58:75:c9:04:0f:71:99:c2:8f:55:05:99:1a:ac: 106 | 0e:46:7a:40:6f:17:d0:76:cf:f7:8a:a0:77:e7:46:b1:c3:b9: 107 | 09:81:48:06:37:f8:60:5f:a8:6e:96:36:90:e2:b0:a4:a3:e1: 108 | 88:1e:35:79:13:39:98:ce:0b:29:7f:6b:79:f0:a4:b5:1a:c3: 109 | 10:09:c8:f8:ed:83:37:36:bd:10:e0:dd:e5:47:50:93:4d:1c: 110 | 8a:7a:d1:75:51:43:0c:02:4c:7e:9d:1c:98:87:b0:30:9b:db: 111 | fe:83:81:9c:dc:51:6d:b4:6b:8b:bc:fb:38:03:37:e3:3e:57: 112 | c0:d8:1a:37:93:37:fd:97:d7:c6:eb:90:63:7a:ec:bf:a7:da: 113 | 4a:c6:42:65:4c:e2:fb:be:e3:6b:8e:c7:44:89:47:fc:75:d0: 114 | 3f:22:a3:b5:65:f6:48:56:1b:7a:41:dc:60:68:41:21:e2:bd: 115 | e9:f3:34:f0:16:05:f2:49:1b:89:1e:c8:6d:c4:01:53:c7:9b: 116 | 21:e9:8c:fd:fa:35:77:bc:ae:68:a6:3a:05:55:18:3b:a3:13: 117 | 3f:a3:7b:ec:3d:2f:86:10:81:08:39:55:f5:69:df:e3:ee:59: 118 | de:c1:6d:2b:22:83:e5:6a:83:0d:44:0e:4b:0c:49:c2:e1:df: 119 | 86:70:9e:24:75:c3:64:0b:f3:a5:d3:e4:4c:58:35:74:1d:a3: 120 | 5f:1f:55:85:74:fc:ec:b3:5c:a6:71:f2:a9:da:3d:aa:e7:8e: 121 | f8:2e:3a:5d:18:1b:86:97:87:4f:bb:da:51:1e:20:75:e9:3c: 122 | c9:b2:e9:30:c3:a8:03:a0:36:5a:d5:6e:3b:e2:07:0f:c9:e0: 123 | dc:e5:b7:2f:6c:6d:72:e4 124 | -------------------------------------------------------------------------------- /cacerts/6207c6f5.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIF0zCCA7ugAwIBAgIUaH5U+ogY8MmdlevWZGKqnge9GKQwDQYJKoZIhvcNAQEL 3 | BQAweTELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy 4 | dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx 5 | HDAaBgNVBAMME05ldEZyZWUgU2lnbiwgQmV6ZXEwHhcNMjIwNjAxMTk1NTIxWhcN 6 | MzIwNTI5MTk1NTIxWjB5MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIw 7 | EAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5l 8 | dGZyZWUubGluazEcMBoGA1UEAwwTTmV0RnJlZSBTaWduLCBCZXplcTCCAiIwDQYJ 9 | KoZIhvcNAQEBBQADggIPADCCAgoCggIBANipYPeTK3GJ9BpwEpEGE/hzB8MlD+Rs 10 | hw4tTWWRtZC0ok9kY/jmWJSzRMP4jKbOPtKkiUNNd3l2SvgvrHPuMz/R9B728wK2 11 | ZYS295KTRDSgM51e+gCfziUXR36mCCvjuLmRdVbsXrAJjAtlPN1SD9eFDtMx6Pm8 12 | LfSK6HyVF4Igafq8el6x9lSdfGqWWxWjuBaO6ooNUoIORYOLOQezMHRG1vfabx58 13 | aEKZSN+bvEPmf4m1RXu4ynevE8aEQBHsr/4X7sU7hRXXrxLkS5qJSeqbfS+tp36a 14 | HaVA8APRradFLvZa9ejAli8WAwwdw2r6AATQ3mmuIcaZUeC954HPgUwaz97wE2zo 15 | GMbsX7bE9oEyLRT8sDV+dvN8MEXvt2XWx4icHLuycqxOGzZKkjmP73qMdeZw+mxW 16 | xBk8H7pCWBQsJ5z0xxtir5kBVUqPSdmAOsz3FLhRyW8JB09JurZc3czxaCrVT7oS 17 | MGIj+koFIYlbQqudwBTPF3hUBlgvS3PA339YHD6H8Fncj20tb2MxQ6jb5IDnFvY/ 18 | dc36sSauiUCzwPJM1FHDmaJDQcj7r2EArWDxZrWL1Zt99xf3yQQFUWh8+BMOba9M 19 | x1E6XWfhVGlhS9yks0DwOKktO+rZwO3fVTVprWvnzFOWmpHAzvLxfiS5blseebAM 20 | 3+S4PGQiCHJBAgMBAAGjUzBRMB0GA1UdDgQWBBSFbv9UhQwCMY5hdYElGT2uCS2g 21 | PTAfBgNVHSMEGDAWgBSFbv9UhQwCMY5hdYElGT2uCS2gPTAPBgNVHRMBAf8EBTAD 22 | AQH/MA0GCSqGSIb3DQEBCwUAA4ICAQB5FmjWgu11dysbxacJO5uLYQ/UVipSFAsl 23 | s/x04NRHona1UpOLGt6y70Q4XjkLnabeYc+x5g1UUr6BzDjXb4CG/FLjGhNP4zPE 24 | xL9bUXpVThFHyO1LrsnbSLfIJZZ4CRvPmx0vbK0G9p23PTNCv7RFqDfqfA1P0z/g 25 | X1n8SatOauOefsM94AihODwoOWLFsl14YnYp99V1f7ChrqZ4GKzgb0M+COJLOAIV 26 | Ur6qaa5eqKf8jIw08xbZy19K4jgOEGIDifmoAtYEpCwIzH9VPeDqdcaBGuc+uZUp 27 | 9mxgIbJk0qgaPmu25TM12x66YeZZvPgeOycl2dzMTIwPvw3TfNzrio7tPRk5GEcT 28 | 3KzngfFpvQyros/kYQMKMPYL5hssRae4aDGr9sS1D4LR31hhopQ0+w4y/+kQJDbB 29 | JCkUP87ae6mtNW4sCXaStWaZZzomonEAxNkh4sfBMT5wVsglU236k/yN5n7Ib/mL 30 | yGUBs6lzMdcScG+Ath4cwtxNnC3m2g8w8/MYAf/+wBL/A8r2GAPTqLvfjtEzH621 31 | b1Yw4//rSJg5ZpO1IGBFIVBFImBHOpHrjigPEJECiUS3y0jKUNyymo66QqRHwl1Y 32 | 71gRskGUK6tyfO45ZiLH8r8m7NR1wXBmAAmtOtdzi5H2ahVRNrW/zrfS7ttASJB5 33 | 20p8M55zUw== 34 | -----END CERTIFICATE----- 35 | Certificate: 36 | Data: 37 | Version: 3 (0x2) 38 | Serial Number: 39 | 68:7e:54:fa:88:18:f0:c9:9d:95:eb:d6:64:62:aa:9e:07:bd:18:a4 40 | Signature Algorithm: sha256WithRSAEncryption 41 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, Bezeq" 42 | Validity 43 | Not Before: Jun 1 19:55:21 2022 GMT 44 | Not After : May 29 19:55:21 2032 GMT 45 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, Bezeq" 46 | Subject Public Key Info: 47 | Public Key Algorithm: rsaEncryption 48 | RSA Public-Key: (4096 bit) 49 | Modulus: 50 | 00:d8:a9:60:f7:93:2b:71:89:f4:1a:70:12:91:06: 51 | 13:f8:73:07:c3:25:0f:e4:6c:87:0e:2d:4d:65:91: 52 | b5:90:b4:a2:4f:64:63:f8:e6:58:94:b3:44:c3:f8: 53 | 8c:a6:ce:3e:d2:a4:89:43:4d:77:79:76:4a:f8:2f: 54 | ac:73:ee:33:3f:d1:f4:1e:f6:f3:02:b6:65:84:b6: 55 | f7:92:93:44:34:a0:33:9d:5e:fa:00:9f:ce:25:17: 56 | 47:7e:a6:08:2b:e3:b8:b9:91:75:56:ec:5e:b0:09: 57 | 8c:0b:65:3c:dd:52:0f:d7:85:0e:d3:31:e8:f9:bc: 58 | 2d:f4:8a:e8:7c:95:17:82:20:69:fa:bc:7a:5e:b1: 59 | f6:54:9d:7c:6a:96:5b:15:a3:b8:16:8e:ea:8a:0d: 60 | 52:82:0e:45:83:8b:39:07:b3:30:74:46:d6:f7:da: 61 | 6f:1e:7c:68:42:99:48:df:9b:bc:43:e6:7f:89:b5: 62 | 45:7b:b8:ca:77:af:13:c6:84:40:11:ec:af:fe:17: 63 | ee:c5:3b:85:15:d7:af:12:e4:4b:9a:89:49:ea:9b: 64 | 7d:2f:ad:a7:7e:9a:1d:a5:40:f0:03:d1:ad:a7:45: 65 | 2e:f6:5a:f5:e8:c0:96:2f:16:03:0c:1d:c3:6a:fa: 66 | 00:04:d0:de:69:ae:21:c6:99:51:e0:bd:e7:81:cf: 67 | 81:4c:1a:cf:de:f0:13:6c:e8:18:c6:ec:5f:b6:c4: 68 | f6:81:32:2d:14:fc:b0:35:7e:76:f3:7c:30:45:ef: 69 | b7:65:d6:c7:88:9c:1c:bb:b2:72:ac:4e:1b:36:4a: 70 | 92:39:8f:ef:7a:8c:75:e6:70:fa:6c:56:c4:19:3c: 71 | 1f:ba:42:58:14:2c:27:9c:f4:c7:1b:62:af:99:01: 72 | 55:4a:8f:49:d9:80:3a:cc:f7:14:b8:51:c9:6f:09: 73 | 07:4f:49:ba:b6:5c:dd:cc:f1:68:2a:d5:4f:ba:12: 74 | 30:62:23:fa:4a:05:21:89:5b:42:ab:9d:c0:14:cf: 75 | 17:78:54:06:58:2f:4b:73:c0:df:7f:58:1c:3e:87: 76 | f0:59:dc:8f:6d:2d:6f:63:31:43:a8:db:e4:80:e7: 77 | 16:f6:3f:75:cd:fa:b1:26:ae:89:40:b3:c0:f2:4c: 78 | d4:51:c3:99:a2:43:41:c8:fb:af:61:00:ad:60:f1: 79 | 66:b5:8b:d5:9b:7d:f7:17:f7:c9:04:05:51:68:7c: 80 | f8:13:0e:6d:af:4c:c7:51:3a:5d:67:e1:54:69:61: 81 | 4b:dc:a4:b3:40:f0:38:a9:2d:3b:ea:d9:c0:ed:df: 82 | 55:35:69:ad:6b:e7:cc:53:96:9a:91:c0:ce:f2:f1: 83 | 7e:24:b9:6e:5b:1e:79:b0:0c:df:e4:b8:3c:64:22: 84 | 08:72:41 85 | Exponent: 65537 (0x10001) 86 | X509v3 extensions: 87 | X509v3 Subject Key Identifier: 88 | 85:6E:FF:54:85:0C:02:31:8E:61:75:81:25:19:3D:AE:09:2D:A0:3D 89 | X509v3 Authority Key Identifier: 90 | keyid:85:6E:FF:54:85:0C:02:31:8E:61:75:81:25:19:3D:AE:09:2D:A0:3D 91 | 92 | X509v3 Basic Constraints: critical 93 | CA:TRUE 94 | Signature Algorithm: sha256WithRSAEncryption 95 | 79:16:68:d6:82:ed:75:77:2b:1b:c5:a7:09:3b:9b:8b:61:0f: 96 | d4:56:2a:52:14:0b:25:b3:fc:74:e0:d4:47:a2:76:b5:52:93: 97 | 8b:1a:de:b2:ef:44:38:5e:39:0b:9d:a6:de:61:cf:b1:e6:0d: 98 | 54:52:be:81:cc:38:d7:6f:80:86:fc:52:e3:1a:13:4f:e3:33: 99 | c4:c4:bf:5b:51:7a:55:4e:11:47:c8:ed:4b:ae:c9:db:48:b7: 100 | c8:25:96:78:09:1b:cf:9b:1d:2f:6c:ad:06:f6:9d:b7:3d:33: 101 | 42:bf:b4:45:a8:37:ea:7c:0d:4f:d3:3f:e0:5f:59:fc:49:ab: 102 | 4e:6a:e3:9e:7e:c3:3d:e0:08:a1:38:3c:28:39:62:c5:b2:5d: 103 | 78:62:76:29:f7:d5:75:7f:b0:a1:ae:a6:78:18:ac:e0:6f:43: 104 | 3e:08:e2:4b:38:02:15:52:be:aa:69:ae:5e:a8:a7:fc:8c:8c: 105 | 34:f3:16:d9:cb:5f:4a:e2:38:0e:10:62:03:89:f9:a8:02:d6: 106 | 04:a4:2c:08:cc:7f:55:3d:e0:ea:75:c6:81:1a:e7:3e:b9:95: 107 | 29:f6:6c:60:21:b2:64:d2:a8:1a:3e:6b:b6:e5:33:35:db:1e: 108 | ba:61:e6:59:bc:f8:1e:3b:27:25:d9:dc:cc:4c:8c:0f:bf:0d: 109 | d3:7c:dc:eb:8a:8e:ed:3d:19:39:18:47:13:dc:ac:e7:81:f1: 110 | 69:bd:0c:ab:a2:cf:e4:61:03:0a:30:f6:0b:e6:1b:2c:45:a7: 111 | b8:68:31:ab:f6:c4:b5:0f:82:d1:df:58:61:a2:94:34:fb:0e: 112 | 32:ff:e9:10:24:36:c1:24:29:14:3f:ce:da:7b:a9:ad:35:6e: 113 | 2c:09:76:92:b5:66:99:67:3a:26:a2:71:00:c4:d9:21:e2:c7: 114 | c1:31:3e:70:56:c8:25:53:6d:fa:93:fc:8d:e6:7e:c8:6f:f9: 115 | 8b:c8:65:01:b3:a9:73:31:d7:12:70:6f:80:b6:1e:1c:c2:dc: 116 | 4d:9c:2d:e6:da:0f:30:f3:f3:18:01:ff:fe:c0:12:ff:03:ca: 117 | f6:18:03:d3:a8:bb:df:8e:d1:33:1f:ad:b5:6f:56:30:e3:ff: 118 | eb:48:98:39:66:93:b5:20:60:45:21:50:45:22:60:47:3a:91: 119 | eb:8e:28:0f:10:91:02:89:44:b7:cb:48:ca:50:dc:b2:9a:8e: 120 | ba:42:a4:47:c2:5d:58:ef:58:11:b2:41:94:2b:ab:72:7c:ee: 121 | 39:66:22:c7:f2:bf:26:ec:d4:75:c1:70:66:00:09:ad:3a:d7: 122 | 73:8b:91:f6:6a:15:51:36:b5:bf:ce:b7:d2:ee:db:40:48:90: 123 | 79:db:4a:7c:33:9e:73:53 124 | -------------------------------------------------------------------------------- /cacerts/66bbb532.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIID4TCCAsmgAwIBAgIJAIsaro78xwDlMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD 3 | VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO 4 | BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEpMCcGA1UEAwwg 5 | TmV0RnJlZSBTaWduICwgS29zaGVyU2ltIENlbGxjb20wHhcNMTcwMjA5MTYzNzIz 6 | WhcNMjYxMjE5MTYzNzIzWjCBhjELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFl 7 | bDESMBAGA1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQL 8 | DAxuZXRmcmVlLmxpbmsxKTAnBgNVBAMMIE5ldEZyZWUgU2lnbiAsIEtvc2hlclNp 9 | bSBDZWxsY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsGzn8/an 10 | SokAGXPd8XvBEyNCEby+4MQNa/osraC7ORKNk3C42b0cfPhf8pUpj66L69EcgmhS 11 | veZyrZYlDGnUh7/2faF0EwtxffN1UK5qzEFfd2YICHXl81pVvifbmZgB3/c64KFm 12 | +2CsyWZ2XTGPzD9zIrJdHFGgHdVu/UDDj0oLU2G0v0npse7au/gKNSxx1StzP3N6 13 | uOo6Ih3KB74FCF0hc2aiJpfE9ECinSeHHF39TMzEJNvC4+fuTOb1odYsNP83otp7 14 | KbLjCQsCMomxQlQTy3vfTvCA8f2BSILo4U6j/BHyhZriyjvhnPTlonWBrLHU5bd+ 15 | HNeiIeucPgRz+QIDAQABo1AwTjAdBgNVHQ4EFgQUf3PgrlRBo19oBK4M47swRdXg 16 | pAQwHwYDVR0jBBgwFoAUf3PgrlRBo19oBK4M47swRdXgpAQwDAYDVR0TBAUwAwEB 17 | /zANBgkqhkiG9w0BAQsFAAOCAQEAUIdlD+x9CFJXvKgmW6FAuAV3w6JG8zz4MwQO 18 | 5aXbs3g8ioIJ6KUBmtzcQhM/NLVr/oXIXPZxXWI7tP3f5N3iLVwrh6krKOU+jSna 19 | HXK0BYXPivp8rRJX56gUQqLUlS94l3iAHX8N+qY2D0hSj4H044R5mWsuYxrtdAr2 20 | glaz6luXOo+NMH2uRnWYX/uAAEpbQLPlztVsoV4LsZ2C54dK7neQ+A6qRL/IZwJE 21 | bYeRwWYoK7OY/BNLj/Vx25IzZYlU/lP8qa6UcUWmPeyIPJqPvjdO95zEodX2iuWE 22 | cuc5pUqSu5/xxosDx3vWpFhPaU5gq9WEN5uPgFd96yHoFKWvtg== 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | 8b:1a:ae:8e:fc:c7:00:e5 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , KosherSim Cellcom" 31 | Validity 32 | Not Before: Feb 9 16:37:23 2017 GMT 33 | Not After : Dec 19 16:37:23 2026 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , KosherSim Cellcom" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:b0:6c:e7:f3:f6:a7:4a:89:00:19:73:dd:f1:7b: 40 | c1:13:23:42:11:bc:be:e0:c4:0d:6b:fa:2c:ad:a0: 41 | bb:39:12:8d:93:70:b8:d9:bd:1c:7c:f8:5f:f2:95: 42 | 29:8f:ae:8b:eb:d1:1c:82:68:52:bd:e6:72:ad:96: 43 | 25:0c:69:d4:87:bf:f6:7d:a1:74:13:0b:71:7d:f3: 44 | 75:50:ae:6a:cc:41:5f:77:66:08:08:75:e5:f3:5a: 45 | 55:be:27:db:99:98:01:df:f7:3a:e0:a1:66:fb:60: 46 | ac:c9:66:76:5d:31:8f:cc:3f:73:22:b2:5d:1c:51: 47 | a0:1d:d5:6e:fd:40:c3:8f:4a:0b:53:61:b4:bf:49: 48 | e9:b1:ee:da:bb:f8:0a:35:2c:71:d5:2b:73:3f:73: 49 | 7a:b8:ea:3a:22:1d:ca:07:be:05:08:5d:21:73:66: 50 | a2:26:97:c4:f4:40:a2:9d:27:87:1c:5d:fd:4c:cc: 51 | c4:24:db:c2:e3:e7:ee:4c:e6:f5:a1:d6:2c:34:ff: 52 | 37:a2:da:7b:29:b2:e3:09:0b:02:32:89:b1:42:54: 53 | 13:cb:7b:df:4e:f0:80:f1:fd:81:48:82:e8:e1:4e: 54 | a3:fc:11:f2:85:9a:e2:ca:3b:e1:9c:f4:e5:a2:75: 55 | 81:ac:b1:d4:e5:b7:7e:1c:d7:a2:21:eb:9c:3e:04: 56 | 73:f9 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 7F:73:E0:AE:54:41:A3:5F:68:04:AE:0C:E3:BB:30:45:D5:E0:A4:04 61 | X509v3 Authority Key Identifier: 62 | keyid:7F:73:E0:AE:54:41:A3:5F:68:04:AE:0C:E3:BB:30:45:D5:E0:A4:04 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 50:87:65:0f:ec:7d:08:52:57:bc:a8:26:5b:a1:40:b8:05:77: 68 | c3:a2:46:f3:3c:f8:33:04:0e:e5:a5:db:b3:78:3c:8a:82:09: 69 | e8:a5:01:9a:dc:dc:42:13:3f:34:b5:6b:fe:85:c8:5c:f6:71: 70 | 5d:62:3b:b4:fd:df:e4:dd:e2:2d:5c:2b:87:a9:2b:28:e5:3e: 71 | 8d:29:da:1d:72:b4:05:85:cf:8a:fa:7c:ad:12:57:e7:a8:14: 72 | 42:a2:d4:95:2f:78:97:78:80:1d:7f:0d:fa:a6:36:0f:48:52: 73 | 8f:81:f4:e3:84:79:99:6b:2e:63:1a:ed:74:0a:f6:82:56:b3: 74 | ea:5b:97:3a:8f:8d:30:7d:ae:46:75:98:5f:fb:80:00:4a:5b: 75 | 40:b3:e5:ce:d5:6c:a1:5e:0b:b1:9d:82:e7:87:4a:ee:77:90: 76 | f8:0e:aa:44:bf:c8:67:02:44:6d:87:91:c1:66:28:2b:b3:98: 77 | fc:13:4b:8f:f5:71:db:92:33:65:89:54:fe:53:fc:a9:ae:94: 78 | 71:45:a6:3d:ec:88:3c:9a:8f:be:37:4e:f7:9c:c4:a1:d5:f6: 79 | 8a:e5:84:72:e7:39:a5:4a:92:bb:9f:f1:c6:8b:03:c7:7b:d6: 80 | a4:58:4f:69:4e:60:ab:d5:84:37:9b:8f:80:57:7d:eb:21:e8: 81 | 14:a5:af:b6 82 | -------------------------------------------------------------------------------- /cacerts/820d5f23.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIDzTCCArWgAwIBAgIJAM/zhl8GVAzYMA0GCSqGSIb3DQEBCwUAMH0xCzAJBgNV 3 | BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G 4 | A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMSAwHgYDVQQDDBdO 5 | ZXRGcmVlIFNpZ24sIEhvdE1vYmlsZTAeFw0xNjA3MTMxMTM5MzZaFw0yNjA1MjIx 6 | MTM5MzZaMH0xCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcM 7 | CUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5s 8 | aW5rMSAwHgYDVQQDDBdOZXRGcmVlIFNpZ24sIEhvdE1vYmlsZTCCASIwDQYJKoZI 9 | hvcNAQEBBQADggEPADCCAQoCggEBAK36bGJixwgMX5twmmteI3j+8JfR5XdOSN6N 10 | MLLsQuR7/LUXMbCBB5WNDGoF823rDbiIZwuqoH4JVN3I4BNitl0QzB2wlTLzEkMr 11 | Db9sA6owahQwhh+m1yNovM3luSlt7eJS8yWUMNgp8gPxWV1j3RBGASHRKuzU2btg 12 | I7WZoD5vNX2VrdrN+TxbRsrRHbMZhmv2Q8v4vNf1bwma64VyT+VDALx0V6HSjSnP 13 | XMBvY0qtsqQILt53nTrtbTyat1oJaAcaeF/oSi+ibcRqRD0RQjPokD7ZBEIzx7b4 14 | 5YD4bsdr9WbSMjaa6DMDC0Zr/1MavLJu5DqO9hMljKfxb5HMcB8CAwEAAaNQME4w 15 | HQYDVR0OBBYEFLRpqEWnXat8cUzbZ2r+LdeBMj+mMB8GA1UdIwQYMBaAFLRpqEWn 16 | Xat8cUzbZ2r+LdeBMj+mMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEB 17 | ADXTOVrk1BbXQiCbPUX0eWOskyu+Nq4uJONFhrhBiKwG/leMd+fKjtbj5avVh81B 18 | 1NmHojzlls/kWcI4bjfqkKpv1eXKlrRA334BoLxGj7u4dbzgNfCNhE96lA6qIW+6 19 | m6BkpYESXc06RX41RVWzYyOJX6foSv8aqdo1aICy+LvBtXewKQixDbGFNqSmSLB5 20 | UHcrwjgOK8aWXvaJe2mJAV91HKhfgSFkFsokrVveaP985ej3s59si4htKbI9Qqx0 21 | ZBMJdfklpqI1fDdL4cDNssX6kNus+gnJzP0tQW00DMH6V6OIqYrL/CJRJx4634yT 22 | ddo6lzNM9hZhrtlM/czjLn8= 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | cf:f3:86:5f:06:54:0c:d8 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HotMobile" 31 | Validity 32 | Not Before: Jul 13 11:39:36 2016 GMT 33 | Not After : May 22 11:39:36 2026 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HotMobile" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:ad:fa:6c:62:62:c7:08:0c:5f:9b:70:9a:6b:5e: 40 | 23:78:fe:f0:97:d1:e5:77:4e:48:de:8d:30:b2:ec: 41 | 42:e4:7b:fc:b5:17:31:b0:81:07:95:8d:0c:6a:05: 42 | f3:6d:eb:0d:b8:88:67:0b:aa:a0:7e:09:54:dd:c8: 43 | e0:13:62:b6:5d:10:cc:1d:b0:95:32:f3:12:43:2b: 44 | 0d:bf:6c:03:aa:30:6a:14:30:86:1f:a6:d7:23:68: 45 | bc:cd:e5:b9:29:6d:ed:e2:52:f3:25:94:30:d8:29: 46 | f2:03:f1:59:5d:63:dd:10:46:01:21:d1:2a:ec:d4: 47 | d9:bb:60:23:b5:99:a0:3e:6f:35:7d:95:ad:da:cd: 48 | f9:3c:5b:46:ca:d1:1d:b3:19:86:6b:f6:43:cb:f8: 49 | bc:d7:f5:6f:09:9a:eb:85:72:4f:e5:43:00:bc:74: 50 | 57:a1:d2:8d:29:cf:5c:c0:6f:63:4a:ad:b2:a4:08: 51 | 2e:de:77:9d:3a:ed:6d:3c:9a:b7:5a:09:68:07:1a: 52 | 78:5f:e8:4a:2f:a2:6d:c4:6a:44:3d:11:42:33:e8: 53 | 90:3e:d9:04:42:33:c7:b6:f8:e5:80:f8:6e:c7:6b: 54 | f5:66:d2:32:36:9a:e8:33:03:0b:46:6b:ff:53:1a: 55 | bc:b2:6e:e4:3a:8e:f6:13:25:8c:a7:f1:6f:91:cc: 56 | 70:1f 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | B4:69:A8:45:A7:5D:AB:7C:71:4C:DB:67:6A:FE:2D:D7:81:32:3F:A6 61 | X509v3 Authority Key Identifier: 62 | keyid:B4:69:A8:45:A7:5D:AB:7C:71:4C:DB:67:6A:FE:2D:D7:81:32:3F:A6 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 35:d3:39:5a:e4:d4:16:d7:42:20:9b:3d:45:f4:79:63:ac:93: 68 | 2b:be:36:ae:2e:24:e3:45:86:b8:41:88:ac:06:fe:57:8c:77: 69 | e7:ca:8e:d6:e3:e5:ab:d5:87:cd:41:d4:d9:87:a2:3c:e5:96: 70 | cf:e4:59:c2:38:6e:37:ea:90:aa:6f:d5:e5:ca:96:b4:40:df: 71 | 7e:01:a0:bc:46:8f:bb:b8:75:bc:e0:35:f0:8d:84:4f:7a:94: 72 | 0e:aa:21:6f:ba:9b:a0:64:a5:81:12:5d:cd:3a:45:7e:35:45: 73 | 55:b3:63:23:89:5f:a7:e8:4a:ff:1a:a9:da:35:68:80:b2:f8: 74 | bb:c1:b5:77:b0:29:08:b1:0d:b1:85:36:a4:a6:48:b0:79:50: 75 | 77:2b:c2:38:0e:2b:c6:96:5e:f6:89:7b:69:89:01:5f:75:1c: 76 | a8:5f:81:21:64:16:ca:24:ad:5b:de:68:ff:7c:e5:e8:f7:b3: 77 | 9f:6c:8b:88:6d:29:b2:3d:42:ac:74:64:13:09:75:f9:25:a6: 78 | a2:35:7c:37:4b:e1:c0:cd:b2:c5:fa:90:db:ac:fa:09:c9:cc: 79 | fd:2d:41:6d:34:0c:c1:fa:57:a3:88:a9:8a:cb:fc:22:51:27: 80 | 1e:3a:df:8c:93:75:da:3a:97:33:4c:f6:16:61:ae:d9:4c:fd: 81 | cc:e3:2e:7f 82 | -------------------------------------------------------------------------------- /cacerts/a4f6f3c0.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIFzzCCA7egAwIBAgIUJd8EwuvF4INK2P9FOVcNOxdqsSgwDQYJKoZIhvcNAQEL 3 | BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy 4 | dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx 5 | GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDE4MB4XDTIxMDUwNDIwNTMxMFoXDTMx 6 | MDUwMjIwNTMxMFowdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG 7 | A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm 8 | cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDE4MIICIjANBgkqhkiG 9 | 9w0BAQEFAAOCAg8AMIICCgKCAgEA1kkqmmuy9XZw0PVC6wwg0BJFs0zWn3IgUYmd 10 | 8UXeqfT5Uii/PM4as/Wf3EG7ByRE03njCVTFussYEE3lbHEsjzvcCiDxOkG2HoYf 11 | G69Bt+jxKPPNFIjom3SB3l6S57UyiSHk5TaS/x7NpjUhVeMde/McBqW7FU/eEYgx 12 | PBaqkQNNG0Wqtl6XybwSdsh0vGJ92wzlTwrKhVpAbesu4L9OYVleZtdW7/xtoB1J 13 | aMygZmSEV7v6mW7dMzJdRk8zHCssLJJOgGno/5R/i6/ezGeKu31/FtcpGOw6o8Jc 14 | yBvAOV4oV/S992Y+Uxll33dYNTg7ABYNtYYd864K51T03HJi/pedNd2ALu0Oqb/I 15 | 04dYt8ZRVK1I+K1b7LsYzVIM/5YWRS3uCNAfQMsfy/4ECD/IgbXVGI+Z0kHrElgV 16 | uYrOglYrAuFrtG1kV4hoPaGsFjzxM/wrdXaJii0EvbLASeX6TDWOP+5xTZhBesTs 17 | 6/gAR/DzOQpdqEIn5v/+foKgaCtBHdFPbayFoywg/Dq9rjbq+7pOiS9XzywHgOZU 18 | Ussq+F0TB0nJ7NkN2Jx5DiAaehOZJpZNWADVheoUehfLGQDA3ffhwi+tdANkgOMc 19 | w6igzwbo1PIrZNcoXDpG+3Dpo8J1+X+nXe4HOKh8K5TbdR9xmUAag3sKZZ5wPjyt 20 | bAq/II0CAwEAAaNTMFEwHQYDVR0OBBYEFK0REcJzkVprhzsKvxjI9w+vlYTiMB8G 21 | A1UdIwQYMBaAFK0REcJzkVprhzsKvxjI9w+vlYTiMA8GA1UdEwEB/wQFMAMBAf8w 22 | DQYJKoZIhvcNAQELBQADggIBALe8h93x+yAkpIeVRcOoNpSnpNiDc7/bY2fJxxWy 23 | Yo4TaT9J+dhlbdedvzgbm0NUcWCKKA0vmR+/PsKYwdJcko1e3kdKTmWGwEBPDRJC 24 | kCGn2ZuXeJokRzyAVKceU7DPHAq7n/C5IJ9ivTMEKYc5SS6WxdxBYePf+tXmPGGi 25 | vYrL1hEgZ+oUx1rXRz7Spr8lUFc7PPvjfPLD9uRoO5K6rdkeHiChuY45Sky/A012 26 | FRhyKR7liZZPtl6QzuLiIDVNcAoJL3SYeaQMmNt6kupQmMcey1RnOwzq56UGOxMr 27 | RSUwgiz56PtQwx6q8R6wqpfJgFipoOzRME6+WgoHPyvIZV9AzNnH4Pv+vfVun8TC 28 | AEvbcyjPyJUL89TqJIgpmlyLRmNETurrGWVgOS4/0rJy5q35I4rDMdrbM8S0AJZy 29 | rSfwwRZXfmxoxYSkx+W6pyIJoj9dtidp1PsKcDoT7CrapmhOKqJzxKdCX3yNQBd0 30 | wWoemiLvBRsCJ1dTZePe470aGmpkL8eLSx68neujrbK9lvDC/GIm97Wx103izZw0 31 | TkkSyB/JtXcqERWYVfAnmhaxIPS1Gwvk+ytBs9kYbNx1cHvPR+JUbax8jmmamKHN 32 | k20mVi+ExBJcyBCs+1gCkKXSlMUpvOSc+tG+nS390JD5pyui1dPp1dlogIX95ad0 33 | H5kG 34 | -----END CERTIFICATE----- 35 | Certificate: 36 | Data: 37 | Version: 3 (0x2) 38 | Serial Number: 39 | 25:df:04:c2:eb:c5:e0:83:4a:d8:ff:45:39:57:0d:3b:17:6a:b1:28 40 | Signature Algorithm: sha256WithRSAEncryption 41 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 018" 42 | Validity 43 | Not Before: May 4 20:53:10 2021 GMT 44 | Not After : May 2 20:53:10 2031 GMT 45 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 018" 46 | Subject Public Key Info: 47 | Public Key Algorithm: rsaEncryption 48 | RSA Public-Key: (4096 bit) 49 | Modulus: 50 | 00:d6:49:2a:9a:6b:b2:f5:76:70:d0:f5:42:eb:0c: 51 | 20:d0:12:45:b3:4c:d6:9f:72:20:51:89:9d:f1:45: 52 | de:a9:f4:f9:52:28:bf:3c:ce:1a:b3:f5:9f:dc:41: 53 | bb:07:24:44:d3:79:e3:09:54:c5:ba:cb:18:10:4d: 54 | e5:6c:71:2c:8f:3b:dc:0a:20:f1:3a:41:b6:1e:86: 55 | 1f:1b:af:41:b7:e8:f1:28:f3:cd:14:88:e8:9b:74: 56 | 81:de:5e:92:e7:b5:32:89:21:e4:e5:36:92:ff:1e: 57 | cd:a6:35:21:55:e3:1d:7b:f3:1c:06:a5:bb:15:4f: 58 | de:11:88:31:3c:16:aa:91:03:4d:1b:45:aa:b6:5e: 59 | 97:c9:bc:12:76:c8:74:bc:62:7d:db:0c:e5:4f:0a: 60 | ca:85:5a:40:6d:eb:2e:e0:bf:4e:61:59:5e:66:d7: 61 | 56:ef:fc:6d:a0:1d:49:68:cc:a0:66:64:84:57:bb: 62 | fa:99:6e:dd:33:32:5d:46:4f:33:1c:2b:2c:2c:92: 63 | 4e:80:69:e8:ff:94:7f:8b:af:de:cc:67:8a:bb:7d: 64 | 7f:16:d7:29:18:ec:3a:a3:c2:5c:c8:1b:c0:39:5e: 65 | 28:57:f4:bd:f7:66:3e:53:19:65:df:77:58:35:38: 66 | 3b:00:16:0d:b5:86:1d:f3:ae:0a:e7:54:f4:dc:72: 67 | 62:fe:97:9d:35:dd:80:2e:ed:0e:a9:bf:c8:d3:87: 68 | 58:b7:c6:51:54:ad:48:f8:ad:5b:ec:bb:18:cd:52: 69 | 0c:ff:96:16:45:2d:ee:08:d0:1f:40:cb:1f:cb:fe: 70 | 04:08:3f:c8:81:b5:d5:18:8f:99:d2:41:eb:12:58: 71 | 15:b9:8a:ce:82:56:2b:02:e1:6b:b4:6d:64:57:88: 72 | 68:3d:a1:ac:16:3c:f1:33:fc:2b:75:76:89:8a:2d: 73 | 04:bd:b2:c0:49:e5:fa:4c:35:8e:3f:ee:71:4d:98: 74 | 41:7a:c4:ec:eb:f8:00:47:f0:f3:39:0a:5d:a8:42: 75 | 27:e6:ff:fe:7e:82:a0:68:2b:41:1d:d1:4f:6d:ac: 76 | 85:a3:2c:20:fc:3a:bd:ae:36:ea:fb:ba:4e:89:2f: 77 | 57:cf:2c:07:80:e6:54:52:cb:2a:f8:5d:13:07:49: 78 | c9:ec:d9:0d:d8:9c:79:0e:20:1a:7a:13:99:26:96: 79 | 4d:58:00:d5:85:ea:14:7a:17:cb:19:00:c0:dd:f7: 80 | e1:c2:2f:ad:74:03:64:80:e3:1c:c3:a8:a0:cf:06: 81 | e8:d4:f2:2b:64:d7:28:5c:3a:46:fb:70:e9:a3:c2: 82 | 75:f9:7f:a7:5d:ee:07:38:a8:7c:2b:94:db:75:1f: 83 | 71:99:40:1a:83:7b:0a:65:9e:70:3e:3c:ad:6c:0a: 84 | bf:20:8d 85 | Exponent: 65537 (0x10001) 86 | X509v3 extensions: 87 | X509v3 Subject Key Identifier: 88 | AD:11:11:C2:73:91:5A:6B:87:3B:0A:BF:18:C8:F7:0F:AF:95:84:E2 89 | X509v3 Authority Key Identifier: 90 | keyid:AD:11:11:C2:73:91:5A:6B:87:3B:0A:BF:18:C8:F7:0F:AF:95:84:E2 91 | 92 | X509v3 Basic Constraints: critical 93 | CA:TRUE 94 | Signature Algorithm: sha256WithRSAEncryption 95 | b7:bc:87:dd:f1:fb:20:24:a4:87:95:45:c3:a8:36:94:a7:a4: 96 | d8:83:73:bf:db:63:67:c9:c7:15:b2:62:8e:13:69:3f:49:f9: 97 | d8:65:6d:d7:9d:bf:38:1b:9b:43:54:71:60:8a:28:0d:2f:99: 98 | 1f:bf:3e:c2:98:c1:d2:5c:92:8d:5e:de:47:4a:4e:65:86:c0: 99 | 40:4f:0d:12:42:90:21:a7:d9:9b:97:78:9a:24:47:3c:80:54: 100 | a7:1e:53:b0:cf:1c:0a:bb:9f:f0:b9:20:9f:62:bd:33:04:29: 101 | 87:39:49:2e:96:c5:dc:41:61:e3:df:fa:d5:e6:3c:61:a2:bd: 102 | 8a:cb:d6:11:20:67:ea:14:c7:5a:d7:47:3e:d2:a6:bf:25:50: 103 | 57:3b:3c:fb:e3:7c:f2:c3:f6:e4:68:3b:92:ba:ad:d9:1e:1e: 104 | 20:a1:b9:8e:39:4a:4c:bf:03:4d:76:15:18:72:29:1e:e5:89: 105 | 96:4f:b6:5e:90:ce:e2:e2:20:35:4d:70:0a:09:2f:74:98:79: 106 | a4:0c:98:db:7a:92:ea:50:98:c7:1e:cb:54:67:3b:0c:ea:e7: 107 | a5:06:3b:13:2b:45:25:30:82:2c:f9:e8:fb:50:c3:1e:aa:f1: 108 | 1e:b0:aa:97:c9:80:58:a9:a0:ec:d1:30:4e:be:5a:0a:07:3f: 109 | 2b:c8:65:5f:40:cc:d9:c7:e0:fb:fe:bd:f5:6e:9f:c4:c2:00: 110 | 4b:db:73:28:cf:c8:95:0b:f3:d4:ea:24:88:29:9a:5c:8b:46: 111 | 63:44:4e:ea:eb:19:65:60:39:2e:3f:d2:b2:72:e6:ad:f9:23: 112 | 8a:c3:31:da:db:33:c4:b4:00:96:72:ad:27:f0:c1:16:57:7e: 113 | 6c:68:c5:84:a4:c7:e5:ba:a7:22:09:a2:3f:5d:b6:27:69:d4: 114 | fb:0a:70:3a:13:ec:2a:da:a6:68:4e:2a:a2:73:c4:a7:42:5f: 115 | 7c:8d:40:17:74:c1:6a:1e:9a:22:ef:05:1b:02:27:57:53:65: 116 | e3:de:e3:bd:1a:1a:6a:64:2f:c7:8b:4b:1e:bc:9d:eb:a3:ad: 117 | b2:bd:96:f0:c2:fc:62:26:f7:b5:b1:d7:4d:e2:cd:9c:34:4e: 118 | 49:12:c8:1f:c9:b5:77:2a:11:15:98:55:f0:27:9a:16:b1:20: 119 | f4:b5:1b:0b:e4:fb:2b:41:b3:d9:18:6c:dc:75:70:7b:cf:47: 120 | e2:54:6d:ac:7c:8e:69:9a:98:a1:cd:93:6d:26:56:2f:84:c4: 121 | 12:5c:c8:10:ac:fb:58:02:90:a5:d2:94:c5:29:bc:e4:9c:fa: 122 | d1:be:9d:2d:fd:d0:90:f9:a7:2b:a2:d5:d3:e9:d5:d9:68:80: 123 | 85:fd:e5:a7:74:1f:99:06 124 | -------------------------------------------------------------------------------- /cacerts/b0396035.0: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/cacerts/b0396035.0 -------------------------------------------------------------------------------- /cacerts/ea335731.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIDzzCCAregAwIBAgIJANJjV3HuLlVqMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNV 3 | BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCWplcnVzYWxlbTEQMA4G 4 | A1UECgwHTmV0RnJlZTEZMBcGA1UECwwQbmV0ZnJlZS42MTNtLm9yZzEdMBsGA1UE 5 | AwwUTmV0RnJlZSBTaWduICxSTCBJU1AwHhcNMTQxMTE1MjMxNjU0WhcNMjQwOTIz 6 | MjMxNjU0WjB+MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQH 7 | DAlqZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxGTAXBgNVBAsMEG5ldGZyZWUu 8 | NjEzbS5vcmcxHTAbBgNVBAMMFE5ldEZyZWUgU2lnbiAsUkwgSVNQMIIBIjANBgkq 9 | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2gEv5S0YJFYrWSNJJNhtBRN9IfyFhh/l 10 | NCo2K8DKkq3CFCthHADZu1v9gRAa9NxC7wrsmK/wBTwoVwcHKrxrmxt/vs6bwZZ7 11 | 9/TwKDA9Ar3SY6bvsDvij0/53frRoAhUJwdFkwlkIN0DNJWv8n3xAoIRBI3pOxcE 12 | 890Q2RDw+ydc4OIgETIel3vDqe7aTXTjb7BJjqIYTf9Wad3gmTGpRToNhC0kyQuk 13 | MN2XxYHhK/+jjoL/O9vcd3ZLaYlYbQbT/Ud63CfIyvB+ASkqnRGFBIQttkzVrPHP 14 | fRkhM+C6BlRfv0njt9Hl5jJjreWXSryd5iSwVVU6VtHo6TZFtUwA/wIDAQABo1Aw 15 | TjAdBgNVHQ4EFgQUG9R/R+XGIIaXGs74B2+JNqoka7kwHwYDVR0jBBgwFoAUG9R/ 16 | R+XGIIaXGs74B2+JNqoka7kwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC 17 | AQEAQh9Id5A0LvTu4yCqM8rrP1mpEBKv4XjMWihR9gZ6fBY8NkyWBfyQkylc6Jlm 18 | vrtFH4etuQkElN7tL1ZAyXAmOVnXB19asft/swA+UGEpdqmdIJiz+Q9KSP4c64Xw 19 | L9svsOqBouiBYPWpURO0AJVk42lmXVGopGcet8hzMmmBejlCbDWi7mu+RJEMIMkp 20 | g6cITc6m/Hrawt3oRxfyERKdoXUpTtTV5Cu4oHLwgcdMbp7IvHJO1SS5fP8OhObN 21 | 9aVsHN+TzDsXZqkvYn/Tn4fO4YtUdokCSzc39caq9ZiwqUpD0dSOYDotlIIXmzxE 22 | OmymXu+SCGzKmR72vZouU0NuTw== 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | d2:63:57:71:ee:2e:55:6a 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = jerusalem, O = NetFree, OU = netfree.613m.org, CN = "NetFree Sign ,RL ISP" 31 | Validity 32 | Not Before: Nov 15 23:16:54 2014 GMT 33 | Not After : Sep 23 23:16:54 2024 GMT 34 | Subject: C = IL, ST = israel, L = jerusalem, O = NetFree, OU = netfree.613m.org, CN = "NetFree Sign ,RL ISP" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:da:01:2f:e5:2d:18:24:56:2b:59:23:49:24:d8: 40 | 6d:05:13:7d:21:fc:85:86:1f:e5:34:2a:36:2b:c0: 41 | ca:92:ad:c2:14:2b:61:1c:00:d9:bb:5b:fd:81:10: 42 | 1a:f4:dc:42:ef:0a:ec:98:af:f0:05:3c:28:57:07: 43 | 07:2a:bc:6b:9b:1b:7f:be:ce:9b:c1:96:7b:f7:f4: 44 | f0:28:30:3d:02:bd:d2:63:a6:ef:b0:3b:e2:8f:4f: 45 | f9:dd:fa:d1:a0:08:54:27:07:45:93:09:64:20:dd: 46 | 03:34:95:af:f2:7d:f1:02:82:11:04:8d:e9:3b:17: 47 | 04:f3:dd:10:d9:10:f0:fb:27:5c:e0:e2:20:11:32: 48 | 1e:97:7b:c3:a9:ee:da:4d:74:e3:6f:b0:49:8e:a2: 49 | 18:4d:ff:56:69:dd:e0:99:31:a9:45:3a:0d:84:2d: 50 | 24:c9:0b:a4:30:dd:97:c5:81:e1:2b:ff:a3:8e:82: 51 | ff:3b:db:dc:77:76:4b:69:89:58:6d:06:d3:fd:47: 52 | 7a:dc:27:c8:ca:f0:7e:01:29:2a:9d:11:85:04:84: 53 | 2d:b6:4c:d5:ac:f1:cf:7d:19:21:33:e0:ba:06:54: 54 | 5f:bf:49:e3:b7:d1:e5:e6:32:63:ad:e5:97:4a:bc: 55 | 9d:e6:24:b0:55:55:3a:56:d1:e8:e9:36:45:b5:4c: 56 | 00:ff 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 1B:D4:7F:47:E5:C6:20:86:97:1A:CE:F8:07:6F:89:36:AA:24:6B:B9 61 | X509v3 Authority Key Identifier: 62 | keyid:1B:D4:7F:47:E5:C6:20:86:97:1A:CE:F8:07:6F:89:36:AA:24:6B:B9 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 42:1f:48:77:90:34:2e:f4:ee:e3:20:aa:33:ca:eb:3f:59:a9: 68 | 10:12:af:e1:78:cc:5a:28:51:f6:06:7a:7c:16:3c:36:4c:96: 69 | 05:fc:90:93:29:5c:e8:99:66:be:bb:45:1f:87:ad:b9:09:04: 70 | 94:de:ed:2f:56:40:c9:70:26:39:59:d7:07:5f:5a:b1:fb:7f: 71 | b3:00:3e:50:61:29:76:a9:9d:20:98:b3:f9:0f:4a:48:fe:1c: 72 | eb:85:f0:2f:db:2f:b0:ea:81:a2:e8:81:60:f5:a9:51:13:b4: 73 | 00:95:64:e3:69:66:5d:51:a8:a4:67:1e:b7:c8:73:32:69:81: 74 | 7a:39:42:6c:35:a2:ee:6b:be:44:91:0c:20:c9:29:83:a7:08: 75 | 4d:ce:a6:fc:7a:da:c2:dd:e8:47:17:f2:11:12:9d:a1:75:29: 76 | 4e:d4:d5:e4:2b:b8:a0:72:f0:81:c7:4c:6e:9e:c8:bc:72:4e: 77 | d5:24:b9:7c:ff:0e:84:e6:cd:f5:a5:6c:1c:df:93:cc:3b:17: 78 | 66:a9:2f:62:7f:d3:9f:87:ce:e1:8b:54:76:89:02:4b:37:37: 79 | f5:c6:aa:f5:98:b0:a9:4a:43:d1:d4:8e:60:3a:2d:94:82:17: 80 | 9b:3c:44:3a:6c:a6:5e:ef:92:08:6c:ca:99:1e:f6:bd:9a:2e: 81 | 53:43:6e:4f 82 | -------------------------------------------------------------------------------- /cacerts/f9b4d31c.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIID3TCCAsWgAwIBAgIJALT9ZoUCwnlMMA0GCSqGSIb3DQEBCwUAMIGEMQswCQYD 3 | VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO 4 | BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEnMCUGA1UEAwwe 5 | TmV0RnJlZSBTaWduICwgTmV0RnJlZUFueXdoZXJlMB4XDTE2MDQwNTE1MTc0MVoX 6 | DTI2MDIxMjE1MTc0MVowgYQxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwx 7 | EjAQBgNVBAcMCUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwM 8 | bmV0ZnJlZS5saW5rMScwJQYDVQQDDB5OZXRGcmVlIFNpZ24gLCBOZXRGcmVlQW55 9 | d2hlcmUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC19KPegpnTrYAJ 10 | m3ZWQ/vEL3rAXBE89jFcDU7xYmRgeEI+CKD+U5exLTmD7w0pQVM45HghlufWL0uy 11 | pPYBR0YL6PbvFzskTnlaQuZBbwBsqf7hrAh7gA3nWintID50L8xtHKiRiLfK+NnM 12 | //iQ03uwkwLT2xaUMvw7IbZcrHlwTfN6fxvvfhnCIE/Tnjz2p3aQI6ZmrD6rwZLm 13 | oX2TGXQGCteOpM0gpn3gi/q30qzMsgCQ6YfeATzjGFe2rMM6Gy66HjNEzO5w6i7W 14 | mG57upSNCTIgKjjwtGlZMg53jVqlfuMuZbZO7OwyatpcuV3KgtER5H8HuQboaZ4v 15 | IYAA+0IZAgMBAAGjUDBOMB0GA1UdDgQWBBQR8hgc1nsIVVnUyF3uhivwht7AzDAf 16 | BgNVHSMEGDAWgBQR8hgc1nsIVVnUyF3uhivwht7AzDAMBgNVHRMEBTADAQH/MA0G 17 | CSqGSIb3DQEBCwUAA4IBAQCOBLgAhZGzGCKvXLbITDrZIC4Oh4sBD4geGnlcO8Rt 18 | 10JLn9lgW0SnYfMoX2ZOayiwlEltF7PB2dYiGk9+7vDjzpChp5HBDLSTJpCdJ5lc 19 | AWEyTjGw9z7cfUUnGJtCaNDPvaLjcvi4KELyAyn3HejwPMcG+F1wyCjwWKoo0MX7 20 | ac+/qnp50nUcPYGnPS2hKoMp8tVkC56q9h7KU9AfY001b11lnVfeJynDuMKWivgw 21 | 6KOH0YSvWt8/d6DM6MtxMyAxdS5sP7htj8pdBTMcHHfw44663xdsd+9nvlaSXDNR 22 | aq71pK24e7eEg0zZQEJ8L6finDIQAx8jt6kse1uVZW50 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | b4:fd:66:85:02:c2:79:4c 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , NetFreeAnywhere" 31 | Validity 32 | Not Before: Apr 5 15:17:41 2016 GMT 33 | Not After : Feb 12 15:17:41 2026 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , NetFreeAnywhere" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:b5:f4:a3:de:82:99:d3:ad:80:09:9b:76:56:43: 40 | fb:c4:2f:7a:c0:5c:11:3c:f6:31:5c:0d:4e:f1:62: 41 | 64:60:78:42:3e:08:a0:fe:53:97:b1:2d:39:83:ef: 42 | 0d:29:41:53:38:e4:78:21:96:e7:d6:2f:4b:b2:a4: 43 | f6:01:47:46:0b:e8:f6:ef:17:3b:24:4e:79:5a:42: 44 | e6:41:6f:00:6c:a9:fe:e1:ac:08:7b:80:0d:e7:5a: 45 | 29:ed:20:3e:74:2f:cc:6d:1c:a8:91:88:b7:ca:f8: 46 | d9:cc:ff:f8:90:d3:7b:b0:93:02:d3:db:16:94:32: 47 | fc:3b:21:b6:5c:ac:79:70:4d:f3:7a:7f:1b:ef:7e: 48 | 19:c2:20:4f:d3:9e:3c:f6:a7:76:90:23:a6:66:ac: 49 | 3e:ab:c1:92:e6:a1:7d:93:19:74:06:0a:d7:8e:a4: 50 | cd:20:a6:7d:e0:8b:fa:b7:d2:ac:cc:b2:00:90:e9: 51 | 87:de:01:3c:e3:18:57:b6:ac:c3:3a:1b:2e:ba:1e: 52 | 33:44:cc:ee:70:ea:2e:d6:98:6e:7b:ba:94:8d:09: 53 | 32:20:2a:38:f0:b4:69:59:32:0e:77:8d:5a:a5:7e: 54 | e3:2e:65:b6:4e:ec:ec:32:6a:da:5c:b9:5d:ca:82: 55 | d1:11:e4:7f:07:b9:06:e8:69:9e:2f:21:80:00:fb: 56 | 42:19 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 11:F2:18:1C:D6:7B:08:55:59:D4:C8:5D:EE:86:2B:F0:86:DE:C0:CC 61 | X509v3 Authority Key Identifier: 62 | keyid:11:F2:18:1C:D6:7B:08:55:59:D4:C8:5D:EE:86:2B:F0:86:DE:C0:CC 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | 8e:04:b8:00:85:91:b3:18:22:af:5c:b6:c8:4c:3a:d9:20:2e: 68 | 0e:87:8b:01:0f:88:1e:1a:79:5c:3b:c4:6d:d7:42:4b:9f:d9: 69 | 60:5b:44:a7:61:f3:28:5f:66:4e:6b:28:b0:94:49:6d:17:b3: 70 | c1:d9:d6:22:1a:4f:7e:ee:f0:e3:ce:90:a1:a7:91:c1:0c:b4: 71 | 93:26:90:9d:27:99:5c:01:61:32:4e:31:b0:f7:3e:dc:7d:45: 72 | 27:18:9b:42:68:d0:cf:bd:a2:e3:72:f8:b8:28:42:f2:03:29: 73 | f7:1d:e8:f0:3c:c7:06:f8:5d:70:c8:28:f0:58:aa:28:d0:c5: 74 | fb:69:cf:bf:aa:7a:79:d2:75:1c:3d:81:a7:3d:2d:a1:2a:83: 75 | 29:f2:d5:64:0b:9e:aa:f6:1e:ca:53:d0:1f:63:4d:35:6f:5d: 76 | 65:9d:57:de:27:29:c3:b8:c2:96:8a:f8:30:e8:a3:87:d1:84: 77 | af:5a:df:3f:77:a0:cc:e8:cb:71:33:20:31:75:2e:6c:3f:b8: 78 | 6d:8f:ca:5d:05:33:1c:1c:77:f0:e3:8e:ba:df:17:6c:77:ef: 79 | 67:be:56:92:5c:33:51:6a:ae:f5:a4:ad:b8:7b:b7:84:83:4c: 80 | d9:40:42:7c:2f:a7:e2:9c:32:10:03:1f:23:b7:a9:2c:7b:5b: 81 | 95:65:6e:74 82 | -------------------------------------------------------------------------------- /cacerts/fbb5e364.0: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIIDxzCCAq+gAwIBAgIJAI2ViHiNxvW8MA0GCSqGSIb3DQEBCwUAMHoxCzAJBgNV 3 | BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G 4 | A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMR0wGwYDVQQDDBRO 5 | ZXRGcmVlIFNpZ24gLCB4Mm9uZTAeFw0xNjAzMTMxNjM1MjFaFw0yNjAxMjAxNjM1 6 | MjFaMHoxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUpl 7 | cnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5r 8 | MR0wGwYDVQQDDBROZXRGcmVlIFNpZ24gLCB4Mm9uZTCCASIwDQYJKoZIhvcNAQEB 9 | BQADggEPADCCAQoCggEBALCFuiEa8k1KjSdvAUUXywlvxFUKP4hD2BrY0dvWK0xe 10 | WnKO7jHpDK88Dv3+2aa15c09ULKLqw6NDg3zPo1Tzb6hJs2nuI5dXbmoKA8QRQr1 11 | ny6JNi4LxAle6LTNqcAw+jsONmyx62vDXpRAHTNsguBdqbKZZp/8jLm9aNg0uvbn 12 | g/E6gvUrwCylidcL3fQ3GiZsjj2RgzUITtLG2gCtHdAv87c5OJOw1tONv4Yfayxk 13 | uG1n+4Z3eKzsDIbO7wbnWypcI/lod9xGub0st3YWjdxp10N2x5EYLgfwThG03RBk 14 | vdWY1kfrzaL1e1jn0x5yqbdOEwzgZeQQZDmNNpybhlECAwEAAaNQME4wHQYDVR0O 15 | BBYEFCimmwvFnAJ3VrIam6IzW70HpeNHMB8GA1UdIwQYMBaAFCimmwvFnAJ3VrIa 16 | m6IzW70HpeNHMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAKhoWpR6 17 | G4atxcAdzQhA3e9LcyRNBdLvtNeZSSPHBPuxRqXDxRT6QhwdYR/mK9WjcOxdA6mj 18 | m/wwLvOy3sbDFQySUs0Yu+aWn9GsFBBgdJoTwSgnwjY60wQ+/yyWCXIFabVHz7Nw 19 | wepexJVQfz2yfnwfGHo3FCI4526NMwxEzy1Xt17wY4fxFmEusVEKqYKnYsHg2s8K 20 | /4GKabaBpcv7iy3vIsks7mGe5NrgNS4MLACC8+5d3XVoqJeXsbX8usaRFDZrseE4 21 | O3d27X+0kjPAKx8Ztn70VWDbS7Cuic6kKrBXjjEN5OTD60GJ1CCiZp6miyjkTHBq 22 | mRkn51xTIRBX6S0= 23 | -----END CERTIFICATE----- 24 | Certificate: 25 | Data: 26 | Version: 3 (0x2) 27 | Serial Number: 28 | 8d:95:88:78:8d:c6:f5:bc 29 | Signature Algorithm: sha256WithRSAEncryption 30 | Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , x2one" 31 | Validity 32 | Not Before: Mar 13 16:35:21 2016 GMT 33 | Not After : Jan 20 16:35:21 2026 GMT 34 | Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , x2one" 35 | Subject Public Key Info: 36 | Public Key Algorithm: rsaEncryption 37 | RSA Public-Key: (2048 bit) 38 | Modulus: 39 | 00:b0:85:ba:21:1a:f2:4d:4a:8d:27:6f:01:45:17: 40 | cb:09:6f:c4:55:0a:3f:88:43:d8:1a:d8:d1:db:d6: 41 | 2b:4c:5e:5a:72:8e:ee:31:e9:0c:af:3c:0e:fd:fe: 42 | d9:a6:b5:e5:cd:3d:50:b2:8b:ab:0e:8d:0e:0d:f3: 43 | 3e:8d:53:cd:be:a1:26:cd:a7:b8:8e:5d:5d:b9:a8: 44 | 28:0f:10:45:0a:f5:9f:2e:89:36:2e:0b:c4:09:5e: 45 | e8:b4:cd:a9:c0:30:fa:3b:0e:36:6c:b1:eb:6b:c3: 46 | 5e:94:40:1d:33:6c:82:e0:5d:a9:b2:99:66:9f:fc: 47 | 8c:b9:bd:68:d8:34:ba:f6:e7:83:f1:3a:82:f5:2b: 48 | c0:2c:a5:89:d7:0b:dd:f4:37:1a:26:6c:8e:3d:91: 49 | 83:35:08:4e:d2:c6:da:00:ad:1d:d0:2f:f3:b7:39: 50 | 38:93:b0:d6:d3:8d:bf:86:1f:6b:2c:64:b8:6d:67: 51 | fb:86:77:78:ac:ec:0c:86:ce:ef:06:e7:5b:2a:5c: 52 | 23:f9:68:77:dc:46:b9:bd:2c:b7:76:16:8d:dc:69: 53 | d7:43:76:c7:91:18:2e:07:f0:4e:11:b4:dd:10:64: 54 | bd:d5:98:d6:47:eb:cd:a2:f5:7b:58:e7:d3:1e:72: 55 | a9:b7:4e:13:0c:e0:65:e4:10:64:39:8d:36:9c:9b: 56 | 86:51 57 | Exponent: 65537 (0x10001) 58 | X509v3 extensions: 59 | X509v3 Subject Key Identifier: 60 | 28:A6:9B:0B:C5:9C:02:77:56:B2:1A:9B:A2:33:5B:BD:07:A5:E3:47 61 | X509v3 Authority Key Identifier: 62 | keyid:28:A6:9B:0B:C5:9C:02:77:56:B2:1A:9B:A2:33:5B:BD:07:A5:E3:47 63 | 64 | X509v3 Basic Constraints: 65 | CA:TRUE 66 | Signature Algorithm: sha256WithRSAEncryption 67 | a8:68:5a:94:7a:1b:86:ad:c5:c0:1d:cd:08:40:dd:ef:4b:73: 68 | 24:4d:05:d2:ef:b4:d7:99:49:23:c7:04:fb:b1:46:a5:c3:c5: 69 | 14:fa:42:1c:1d:61:1f:e6:2b:d5:a3:70:ec:5d:03:a9:a3:9b: 70 | fc:30:2e:f3:b2:de:c6:c3:15:0c:92:52:cd:18:bb:e6:96:9f: 71 | d1:ac:14:10:60:74:9a:13:c1:28:27:c2:36:3a:d3:04:3e:ff: 72 | 2c:96:09:72:05:69:b5:47:cf:b3:70:c1:ea:5e:c4:95:50:7f: 73 | 3d:b2:7e:7c:1f:18:7a:37:14:22:38:e7:6e:8d:33:0c:44:cf: 74 | 2d:57:b7:5e:f0:63:87:f1:16:61:2e:b1:51:0a:a9:82:a7:62: 75 | c1:e0:da:cf:0a:ff:81:8a:69:b6:81:a5:cb:fb:8b:2d:ef:22: 76 | c9:2c:ee:61:9e:e4:da:e0:35:2e:0c:2c:00:82:f3:ee:5d:dd: 77 | 75:68:a8:97:97:b1:b5:fc:ba:c6:91:14:36:6b:b1:e1:38:3b: 78 | 77:76:ed:7f:b4:92:33:c0:2b:1f:19:b6:7e:f4:55:60:db:4b: 79 | b0:ae:89:ce:a4:2a:b0:57:8e:31:0d:e4:e4:c3:eb:41:89:d4: 80 | 20:a2:66:9e:a6:8b:28:e4:4c:70:6a:99:19:27:e7:5c:53:21: 81 | 10:57:e9:2d 82 | -------------------------------------------------------------------------------- /common/system/priv-app/VpnDialogs/VpnDialogs.apk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/common/system/priv-app/VpnDialogs/VpnDialogs.apk -------------------------------------------------------------------------------- /docs/Fixes/Fix Error 0x80073CF0.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error 0x80073CF0 when "Run.bat" is executed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue can arise due to many factors such as corruption of files when downloading the .zip/.7z files or extracting from the .zip/.7z files. This can be also caused if the folder name is too long (This is the case as MagiskOnWSA tends to generate a long string for the .zip/.7z file and the folder within the archive.) 4 | 5 | ![imageCF0](https://user-images.githubusercontent.com/68516357/232593575-20db5482-a0e3-472d-875c-37d248ccfca2.png) 6 | 7 | 8 | --- 9 | ## Solution 10 | 11 | **1. Ensure the partition/drive you are installing from is NTFS** 12 | 13 |
14 | 15 | **2. Redownload WSA Build .zip/.7z file from the [Releases page](https://github.com/MustardChef/WSABuilds/releases) (sometime the files can be corrupted during download and extraction)** 16 | 17 |
18 | 19 | **3. Rename the .zip/.7z file to a shorter name, which can be anything to your choosing
(For example: WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon ----> WSAArchive2XXX)** 20 | 21 |
22 | 23 | **4. Extract the .zip or .7z archive (depends on the release) using 7-zip or a proper archive tool and not the built in Windows archive extractor** 24 | 25 |
26 | 27 | **5. Rename the extracted folder(s) to a shorter name, which can be anything to your choosing** 28 | 29 | #### For example: 30 | - **Before:** WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 31 | - **After:** WSAExtracted2XXX 32 | 33 |
34 | 35 | **6. Ensure that 'Run.bat' is run as Administrator** 36 | 37 | **Hope this works for you!** 38 | 39 | -------------------------------------------------------------------------------- /docs/Fixes/Fix Error 0x80073CF6.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error 0x80073CF6 when "Run.bat" is executed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue can arise due to many factors that is preventing the app from being registered. Although there is no definite solution, we can try these steps to try to fix the problem 4 | ##### This installation issue may also arise in systems that are using Modified Windows OSes such as ReviOS, Tiny10/11, etc. This is due to the fact that these OSes have been modified to remove certain features that are deemed unnecessary. This may cause issues with the installation of WSA. 5 |
6 | 7 | ```Powershell 8 | Add-AppxPackage : Deployment failed with HRESULT: 0x80073CF6, Package could not be registered 9 | In E:\WSA\Install.ps1:102 Character:1 10 | + Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion 11 | 12 | + CategoryInfo : WriteError: (E:\WSA\AppxManifest.xml:String) [Add-AppxPackage], IOException 13 | + FullyQualifiedErrorId : DeploymentError,Microsoft.Windows.Appx.PackageManager.Commands.AddAppxPackageCommand 14 | ``` 15 | 16 | 17 |
18 | 19 | --- 20 | ## Prequisite Steps: 21 | 22 | **1. Ensure the partition/drive you are installing from is NTFS** 23 | 24 | **2. Redownload WSA Build .zip (sometime the files can be corrupted during download and extraction)** 25 | 26 | **3. If you have installed WSA prior, make sure that it has been uninstalled and delete all folders containing "WindowsSubsystemForAndroid" from the following directories/paths and the subdirectories within:** 27 | 28 | - *C:\ProgramData\Microsoft\Windows\AppRepository* 29 | 30 | - *C:\ProgramData\Microsoft\Windows\WindowsApps* 31 | 32 | - *%localappdata\ProgramData\Packages* 33 | 34 |
35 | 36 | **4. Restart your Computer** 37 | 38 | If the issue has been fixed, then there is no need to follow through the rest of the guide. 39 | However, if you have the same issue, it is vital that you obtain the logs and try to decipher what is causing the error 40 | 41 | To obtain the logs (admin privilege required): 42 | 43 | 1. Open a PowerShell window and change working directory to your Windows Subsystem For Android™ directory. 44 | 45 | 2. Run the command below in PowerShell. This should fail with an ActivityID, which is a UUID required for the next step. 46 | ```Powershell 47 | Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Register .\AppxManifest.xml 48 | ``` 49 | 3. Run the command below in PowerShell. This should print the log of the failed operation. 50 | 51 | ```Powershell 52 | Get-AppPackageLog -ActivityID 53 | ``` 54 | 55 |
56 | 57 | 58 | --- 59 | 60 | ### There are various causes that lead to error 0x80073CF6
Find the fix that matches the error presented in the logs obtained from the instructions above 61 | 62 | --- 63 | ## Issue 1: 0x800706D9 "There are no more endpoints avaliable from endpoint mapper" 64 | 65 | 66 | 67 | ### **Windows Firewall** 68 | 69 | **1. Ensure that Windows Firewall is on and is working with "Recommended Settings" being enabled** 70 | 71 | **2. Ensure that Windows Firewall service is running. If not, enable it.** 72 | 73 | **3. Restart your PC** 74 | 75 | ### Other Firewalls 76 | 77 | **1. Ensure that your Firewall is on and is working with "Recommended Settings" being enabled** 78 | 79 | **2. Ensure that your Firewall is not blocking or preventing new entries** 80 | 81 | **3. Restart your PC** 82 | 83 |
84 | 85 | --- 86 | ## Issue 2: 0x80073B06 "Initial screen image for the current application context cannot be recognized" 87 | 88 | ```powershell 89 | Installing MagiskOnWSA... 90 | Add AppxPackage: Deployment failed due to HRESULT: 0x80073CF6, unable to register the package. 91 | AppxManifest.xml (24,27): Error 0x80073B06: Unable to install or update package MicrosoftCorporateII.WindowsSubsystemForAndroid_ 8wekyb 3d8bbwe because the initial screen image for the current application context cannot be recognized. The application context may include specific language, DPI, contrast, or other special conditions. If you cannot recognize a context specific splash screen image, add a splash screen image to use as the default setting. Note: For additional information, look for [ActivityId] 94c065bb-5a2a-0004-129b-c1942a5ad901 in the event log, or use the command line Get AppPackageLo g - ActivityID 94c065bb-5a2a-0004-129b-c1942a5ad901 in the location D: WSA WSA Install.ps1:106 Character: 1 92 | + Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion ... 93 | + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 94 | + CategoryInfo : WriteError: (D:\WSA\WSA\AppxManifest.xml:String) [Add-AppxPackage], IOException 95 | + FullyQualifiedErrorId : DeploymentError,Microsoft.Windows.Appx.PackageManager.Commands.AddAppxPackageCommand 96 | ``` 97 | ### Solution: 98 | 99 | **1.** If you encounter this problem when installing from a build built using [MagiskOnWSALocal](https://github.com/LSPosed/MagiskOnWSALocal) or [WSA-Script](https://github.com/YT-Advanced/WSA-Script), try deleting the previously built builds and rebuild. Make sure to delete and reclone the git repo if you are building using MagiskOnWSALocal. 100 | 101 | ***Or*** 102 | 103 | **2.** If you encounter this problem when installing using prebuilt builds from [Releases](https://github.com/YT-Advanced/WSA-Script/releases/latest) from this repo, try redownloading the latest build. If the issue persists, report to the [Issues](https://github.com/YT-Advanced/WSA-Script/issues) and I will be happy to assist you 104 | 105 | 106 | --- 107 | 108 | **Hope these fixes work for you!** 109 | -------------------------------------------------------------------------------- /docs/Fixes/Fix Error 0x80073CF9.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error 0x80073CF9 when "Run.bat" is executed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue can arise due to many factors such as corruption of files when downloading the .zip files or extracting from the .zip files. This can be also caused if the folder name is too long (This is the case as MagiskOnWSA tends to generate a long string for the .zip file and the folder within the archive.) 4 | 5 | 6 | 7 | --- 8 | ## Solution 9 | 10 | **1. Ensure the partition/drive you are installing from is NTFS** 11 | 12 | **2. Redownload WSA .zip file on [Release page](https://github.com/YT-Advanced/WSA-Script/releases/latest) (sometime the files can be corrupted during download and extraction)** 13 | 14 | **3. Rename the .zip folder to a shorter name, which can be anything to your choosing
(WSA_2xxx.xxxxx.xx.x_x64_Release-Nightly-with-magisk-xxxxxxx-MindTheGapps-13.0-as-Pixel-5-RemovedAmazon ----> WSAArchive2XXX)** 15 | 16 | **4. Extract the .zip using WinRAR or a proper archive tool and not the built in Windows .zip extractor** 17 | 18 | **5. Rename the extracted folder(s) to a shorter name, which can be anything to your choosing** 19 | 20 | #### For example: 21 | - **Before:** WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 22 | - **After:** WSAExtracted2XXX 23 | 24 | **6. Ensure that 'Run.bat' is run as Administrator** 25 | 26 | **Hope this works for you!** 27 | -------------------------------------------------------------------------------- /docs/Fixes/Fix Error 0x80073CFB.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error 0x80073CFB when "Run.bat" is executed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue can arise due to the fact that "the provided package is already installed, and reinstallation of the package was blocked. Check the AppXDeployment-Server event log for details." 4 | 5 | 6 | ![imageCFB](https://github.com/MustardChef/WSABuilds/assets/68516357/7e78c472-2b61-49d5-a01f-814cf20e1458) 7 | 8 | 9 | --- 10 | ## Solution 11 | 12 | **1. Go to ``%LOCALAPPDATA%/Packages/``, and make sure that the folder ``MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe`` is deleted. (If it does not exist, move on to Step **2**.)** 13 | 14 |
15 | 16 | **2. Open Powershell (as Admin) and run the following command:** 17 | 18 | ```powershell 19 | Get-AppxPackage -Name "MicrosoftCorporationII.WindowsSubsystemForAndroid" -AllUsers | Remove-AppxPackage -AllUsers 20 | ``` 21 |
22 | 23 | **3. Delete all folders related to WSA (expect the .zip files for WSA Builds), which include folders extracted for WSA installation.** 24 | 25 |
26 | 27 | **4. Re-extract and re-run ``Run.bat``** 28 | 29 |
30 | 31 | ***The issue should now be fixed*** 32 | 33 | --- 34 | -------------------------------------------------------------------------------- /docs/Fixes/Fix Error 0x80073CFD.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error 0x80073CFD when "Run.bat" is executed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue is caused by having a Windows 10 Build that is too old to run WSA and hence the installer halts and presents the error, as shown below 4 | 5 |
6 | 7 | ```Powershell 8 | Registering AppxManifest.xml... 9 | Add-AppxPackage : Deployment failed with HRESULT: 0x80073CFD, 10 | Prerequisite for an install could not be satisfied. Windows cannot install package MicrosoftCorporationII.WindowsSubsystemForAndroid_2301.40000.7.0_x64__8wekyb3d8bbwe because this package is not compatible with the device. 11 | The package requires OS version 10.0.19044.2604 or higher on the Windows.Desktop device family. 12 | The device is currently running OS version 10.0.19043.2364. 13 | NOTE: For additional information, look for [ActivityId] 8b8599fb-55c1-0002-338b-868bc155d901 in the Event Log or use the command line 14 | Get-AppPackageLog -ActivityID 8b8599fb-55c1-0002-338b-868bc155d901 15 | ``` 16 | 17 | 18 |
19 | 20 | --- 21 | ## Solution: 22 | 23 | ### The Solution is simple: 24 | 25 | Using the [Microsoft Guide](https://support.microsoft.com/en-gb/windows/update-windows-3c5ae7fc-9fb6-9af1-1984-b5e0412c556a#WindowsVersion=Windows_10), update Windows 10 to the latest version 26 | 27 | ***Or*** 28 | 29 | Using the [Windows 10 Update Assistant](https://support.microsoft.com/en-us/topic/windows-10-update-assistant-3550dfb2-a015-7765-12ea-fba2ac36fb3f), update Windows 10 to the latest version 30 | -------------------------------------------------------------------------------- /docs/Fixes/Fix Error 0x80073D10.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error 0x80073D10 when "Run.bat" is executed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue is caused when your are trying to install the incorrect WSA package for your CPU Archetecture. For example, you are mistakenly trying to install the arm64 package on your x64 system. 4 | 5 | 6 | 7 | --- 8 | 9 | ## Solution 10 | 11 | **1. To ensure that you download the correct package for your CPU archtecture, go to the [Release](https://github.com/YT-Advanced/WSA-Script/releases/latest) of this repository then check again** 12 | 13 | **2. Click on the package matching your Operating System (OS) and CPU Archetecture** 14 | 15 | **3. Download then install the package by follow the [Installation guide](https://github.com/YT-Advanced/WSA-Script#--installation) in README.md file** 16 | -------------------------------------------------------------------------------- /docs/Fixes/FixInstallps1.md: -------------------------------------------------------------------------------- 1 |

Issue:

  Install.ps1 is not recognized/missing

2 | 3 | 4 | 5 | 6 | ## Solution 7 | 8 | If the popup windows disappear without asking administrative permission and Windows Subsystem For Android™ is not installed successfully, you should manually run Install.ps1 as administrator: 9 | 10 |   11 | **1. Redownload the WSA Build and rename the extracted folder to a shorter name, which can be anything to your choosing**
12 | 13 | - For example: 14 | 15 | - **Before:** WSA_2XXX.XXXXXXX_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 16 | 17 | - **After:** WSAArchive2XXX 18 | 19 |
20 | 21 | **2. Copy the path of the folder by right clicking on the folder and select "Show More Options" and click on "Copy as path"** 22 | 23 |
24 | 25 | **3. Press Win + X on your keyboard and select Windows™ Terminal (Admin) or Powershell (Admin) depending on the version of Windows™ you are running** 26 | 27 | ||| 28 | |--------|------| 29 | | | | 30 | |![215262254-7466d964-3956-4d71-8014-e2c5869ca4d4](https://user-images.githubusercontent.com/68516357/215263173-500591dd-c6d5-4c2d-9d38-58bc065fff28.png)|![winx_editor-1](https://user-images.githubusercontent.com/68516357/215263348-022dc031-802f-4e93-8999-05d0aa6744b9.png)| 31 | 32 |   33 | **4. Input the command below and press enter, replacing {X:\path\to\your\extracted\folder} including the {} with the path of the extracted folder** 34 | 35 | ```Powershell 36 | cd "{X:\path\to\your\extracted\folder}" 37 | ``` 38 |   39 | **5. Input the command below and press Enter** 40 | 41 | ```Powershell 42 | PowerShell.exe -ExecutionPolicy Bypass -File .\Install.ps1 43 | ``` 44 |   45 | **6. The script will run and Windows Subsystem For Android™ will be installed** 46 | 47 | 48 | -------------------------------------------------------------------------------- /docs/Fixes/FixInternet.md: -------------------------------------------------------------------------------- 1 | ## Issues: 2 | ### No Internet 3 | 4 | ![image](https://user-images.githubusercontent.com/68516357/215296995-4a8c9184-321e-438f-9483-6983ce65ce47.png) ![IMG-20230627-WA0012 cropped](https://github.com/MustardChef/WSABuilds/assets/68516357/a108b1df-2e03-4a52-9e0a-d0004a9d3585) 5 | 6 | 7 | ## Solution: 8 | These will be split into multiple solutions due to the different causes of the problem of no internet on Windows Subsystem for Android (WSA) and Windows Subsytem for Linux (WSL) 9 | 10 | --- 11 | 12 |
13 |

Fix #1: Uninstalling Hyper-V Network Adapters

14 | 15 | **Some Hyper-V Network Drivers may be interferring with WSA or WSL** 16 | 17 | **⚠️ Carry these instructions out with caution. ⚠️** 18 | 19 | **⚠️ I do not take responsibility for any damage caused ⚠️** 20 | 21 | #### **Step 1: Open Device Manager** 22 | 1. Using Search or Win + X, open Device manager 23 | ![image](https://user-images.githubusercontent.com/68516357/215346473-88649375-6a5b-46b2-80bb-6f6551c23c5f.png) 24 |   25 | #### **Step 2: Show Hidden Device** 26 | 3. Press on "View" 27 | 4. Select "Show hidden devices" 28 | ![image](https://user-images.githubusercontent.com/68516357/215347683-6c84663c-a3cb-4e79-bc63-a2cdf91bb4ef.png) 29 |   30 | #### **Step 3: Uninstalling All Hyper-V Network Adapter** 31 | 5. Select each driver that has "Hyper-V" in its name 32 | 6. Right-Click and select "Uninstall Driver" for each of these drivers 33 | ![image](https://user-images.githubusercontent.com/68516357/215347543-91c71429-26fe-44a2-b818-dd9bfeb6bcaf.png) 34 | #### **Step 4: Restart Windows** 35 | ![](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.4winkey.com%2Fimages%2Farticle%2Fwindows-tips%2Frestart-screen-stuck.jpg&f=1&nofb=1&ipt=2b826a4d045dc39aaa0487ea2338289d905c9f94c365f5f606334100a1ec9cb1&ipo=images) 36 |
37 | 38 | --- 39 |
40 |

Fix #2: Checking Firewall Settings

41 | 42 | Sometimes Windows Firewall and other Firewall tools and software may be the cause of internet issues. It is therefore important that we check them if we are facing issues with internet on WSA. 43 | 44 | 45 |

Users with Windows Firewall

46 | 47 | ****1. Open Windows Firewall by pressing the Windows Key and "R" key, Open Run**** 48 | 49 | ****2. Type WF.msc, and then select OK. See also [Open Windows Firewall](https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring)**** 50 | 51 | ****3. Go to the "Inbound Connection" tab**** 52 | 53 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/c2863479-fc0d-46cc-a211-815026e68dfd) 54 | 55 | ****4. Find the entries in the list that state: "Windows Subsystem for Android™"**** 56 | 57 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/6c16b5fe-6670-4467-b8b4-f8feb9de0210) 58 | 59 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/00b8a9cc-620b-41b7-9135-0796af2ee72e) 60 | 61 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/607a0be4-9898-43dd-b3c9-38b6429a2f30) 62 | 63 | 64 | ****5. Confirm that these entries are Enabled and "Action" is set to "Allow" for both UDP and TCP for all entries (as shown above)**** 65 | 66 | ****6. Now, go to the "Outbound Connection" tab**** 67 | 68 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/051c1f4d-1eaa-4055-81e7-4f7299cd7c56) 69 | 70 | ****7. Find the entries in the list that state: "Windows Subsystem for Android™"**** 71 | 72 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/5db5319c-00cf-47ed-9ded-8610bfff1702) 73 | 74 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/574947cf-68be-4aa4-a002-8edf4dd48527) 75 | 76 | ****5. Confirm that these entries are Enabled and "Action" is set to "Allow" for both UDP and TCP for all entries (as shown above)**** 77 | 78 |
79 | 80 | > 81 | > 82 | > Tip 83 | >
84 | > 85 | > You may not have as many entries for "Windows Subsystem for Android™", as shown in the screenshots provded. These are just for illustration purposes and Firewall entries may look different on your device. 86 | 87 | 88 |

Antivirus Users

89 | 90 | It is a known issue that some antivirus firewall such as those built-in to ESET, Bitdefender, AVG and many others, can prevent the internet for Windows Susbsystem for Android (WSA) from working. 91 | It is highly recommended to disable the firewall provided by these Antivirus/Antimalware tools and fallback to Windows Firewall, to see if the internet starts working. 92 | 93 | Source: From [this](https://community.bitdefender.com/en/discussion/91237/bitdefender-blocking-wsl2-traffic-solution-to-a-thread-that-was-left-unresolved) 94 | 95 | 96 |
97 | 98 | 99 | --- 100 | 101 |
102 |

Fix #3: Changing Android DNS Settings

103 | 104 | ****1. Open Windows Firewall by pressing the Windows Key and "R" key, Open Run**** 105 | 106 | ****2. Type wsa://com.android.settings, and then select OK.**** 107 | 108 | ****3. Wait for Android Settings to load and open.**** 109 | 110 | ****4. In Android Settings, click on the "Network and Internet" Section.**** 111 | 112 | ****5. In the "Network and Internet" Section, select "Private DNS" .**** 113 | 114 | ****6. In the "Select Private DNS mode", click on "Private DNS provider hostname".**** 115 | 116 | ****7. In the entry box below, type "dns.google" and click save.**** 117 | 118 | ****8. Now click on the "Internet" section and click on VirtWifi.**** 119 | 120 | ****9. Click on "Disconnect".**** 121 | 122 | ****10. Then click on "Connect".**** 123 | 124 | Your Internet should now be fixed! 125 | 126 | 127 |
128 | 129 | --- 130 | 131 |
132 |

Fix #4: Enabling and Disabling Advanced Networking from WSA Settings

133 | 134 | 1. Go to the Start Menu and search for Windows Subsystem for Android™ 135 | 2. Depending on your WSA version, the Advanced Networking setting is located in different places witin the WSA Settings app 136 | 137 | - For 2305 and newer builds, you must go to "Advanced settings" and then to "Experimental features" 138 | - For 2304 and older builds, this setting is located in the "System" tab/ main screen when you open the Settings app 139 | 140 | 3. Make sure that if Advanced Networking is enabled, you disable it as this may be causing issues with the internet 141 | 142 | This should fix the internet if Advanced Networking was on and the internet was not working due to this 143 | 144 |
145 | -------------------------------------------------------------------------------- /docs/Fixes/FixPathTooLong.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error stating that "Path is too long" when extracting files from .zip archive, needed to install Windows Subystem for Android (WSA) 2 | ### Preface: 3 | ##### This issue is caused if the folder name is too long. This is the typically the case as MagiskOnWSALocal script tends to generate a long string for the .zip file and the folder within the archive. 4 | 5 | 6 | 7 | --- 8 | ## Solution 9 | 10 | The solution is simple, all you have to do is: 11 | 12 | **1. Rename the .zip/.7z file to a shorter name, which can be anything to your choosing**
13 | 14 | - For example: 15 | 16 | - **Before:** WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 17 | 18 | - **After:** WSAArchive2XXX 19 | 20 | **2. Rename the extracted folder to a shorter name, which can be anything to your choosing**
21 | 22 | - For example: 23 | 24 | - **Before:** WSA_2XXX.XXXXXXX_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 25 | 26 | - **After:** WSAArchive2XXX 27 | -------------------------------------------------------------------------------- /docs/Fixes/FixVirtError.md: -------------------------------------------------------------------------------- 1 | ## Issues: 2 | 3 | 4 | 5 | ## Solution: 6 | 7 | You may encounter this problem, even if Virtualization is enabled on your PC (in the BIOS) and shows up as enabled in Task Manager (as seen below) and Virtual Machine Platform + Windows Hypervisor Platform is Enabled. The solution is: 8 | 9 | 1. ***Remove WSA***: Right clicking on "Windows Subsystem for Android™ Settings" and pressing uninstall + Deleting the extracted WSA (MagiskOnWSA/WSABuilds) folder that you extracted and installed from. 10 | 11 | 2. ***Go to "Turn Windows features on and off" and if any of these features below are enabled, DISABLE THEM.*** 12 | 13 | - Hyper-V 14 | - Virtual Machine Platform 15 | - Windows Hypervisor Platform 16 | - Windows Subsystem for Linux 17 | 18 | 3. ***Restart your PC*** 19 | 20 | 4. ***Boot into your BIOS, and DISABLE Virtualization.*** 21 | 22 | - ***[Click here for a guide for Windows 11](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-11-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 23 | - ***[Click here for a guide for Windows 10](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-10-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 24 | 25 | 5. ***Ensure that you have Control Flow Guard enabled in Windows Security > Apps & browser control > Exploit protection.*** This is a known issue that can prevent WSA from starting 26 | 27 | 6. ***In registry editor (regedit), go to “\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FsDepends"*** 28 | 29 | Change the value of “Start” from “3” to “0” 30 | 31 | > **Note** 32 | > You can change it back to 3, if it makes no difference 33 | 34 | 7. ***Then in CMD (Run as Adminstrator), paste:*** 35 | 36 | ```cmd 37 | bcdedit /set hypervisorlaunchtype auto 38 | ``` 39 | 40 | 8. ***ENABLE the features that you disabled in ``Step 2`` and restart a second time.*** 41 | 42 | 9. ***Boot into your BIOS, and ENABLE Virtualization.*** 43 | 44 | - ***[Click here for a guide for Windows 11](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-11-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 45 | - ***[Click here for a guide for Windows 10](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-10-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 46 | 47 | 10. ***Restart the Computer*** 48 | 49 | 11. ***Reinstall WSA by running `Run.bat`*** 50 | 51 | **Hope this works for you!** 52 | -------------------------------------------------------------------------------- /docs/Fixes/Google Play Issues.md: -------------------------------------------------------------------------------- 1 | 2 | ## Issue 1: After signing in to your Google Account from the Play Store App, Play Store keeps crashing 3 | 4 | ### Preface: 5 | ##### This issue will prevent you from opening Play Store and effectively prevent the function of MindTheGapps/OpenGapps. This issue may usually occur after signing in. Known cases indicate that this issue is pretty common on newer hardware (12th or 13th Gen Intel Processors, for example) 6 | 7 | --- 8 | 9 | ## Solution: 10 | 11 | ###### Step 1. 12 | 13 | **Open Android Settings by pressing the Windows Key and "R" key, Open Run** 14 | 15 | ###### Step 2. 16 | 17 | **Type wsa://com.android.settings, and then select OK.** 18 | 19 | ###### Step 3. 20 | 21 | **Wait for Android Settings to load and open.** 22 | 23 | ###### Step 4. 24 | 25 | **In Android Settings, click on the "Apps" Section and then click on "All Apps".** 26 | 27 | ###### Step 5. 28 | 29 | **In the "All Apps" Section, find the "Google Play Services" app .** 30 | 31 | ###### Step 6. 32 | 33 | **Click on the "Google Play Services" app, which should open a page with various different options for the app ("Permissions", "Notification", "Storage and Cache" etc.)** 34 | 35 | ###### Step 7. 36 | 37 | **Click on "Storage and Cache"** 38 | 39 | ###### Step 8. 40 | 41 | **Find the "Manage Space" button and click on it, which should popup a window reading "Google Play services storage"** 42 | 43 | ###### Step 9. 44 | 45 | **Click on "Clear All Data" and done** 46 | 47 |
48 | 49 | ## Issue 2: Could not sign-in. There was a problem connecting to play.google.com 50 | 51 | ### Preface: 52 | ##### This issue will prevent you from signing into Play Store and effectively prevent the function of MindTheGapps/OpenGapps. This issue may usually occur after updating. Known cases have occured after updating from a non Google Apps WSA build to a Google Apps build 53 | 54 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/6491854b-9ad2-4e64-94ea-45e7b444cafe) 55 | 56 | --- 57 | 58 | ## Solution: If you are using VPN, please disconnect it because VPN may make WSA fail to connect to VirtWifi. 59 | -------------------------------------------------------------------------------- /docs/Fixes/InstallPs1FailedToUpdate.md: -------------------------------------------------------------------------------- 1 | ## Issues: Install.ps1 Failed To Update 2 | 3 |   4 | 5 | 6 | 7 | ## Solution: 8 | 9 | 1. Run Powershell with this command: 10 | ```powershell 11 | PowerShell.exe -ExecutionPolicy Bypass -File .\Install.ps1 12 | ``` 13 |   14 | -------------------------------------------------------------------------------- /docs/Fixes/InternetSecuritySettingsBlock.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error stating that "Your Internet security settings prevented one or more files from opening" when trying to run `Install.ps1` or `Run.bat` to install Windows Subystem for Android (WSA) 2 | 3 | ### Preface: 4 | ##### This issue is caused if the folder name is too long. This is the typically the case as MagiskOnWSALocal script tends to generate a long string for the .zip file and the folder within the archive. 5 | 6 | 7 | 8 | --- 9 | ## Solution 10 | 11 | The solution is simple, all you have to do is: 12 | 13 | **1. Rename the .zip/.7z file to a shorter name, which can be anything to your choosing**
14 | 15 | - For example: 16 | 17 | - **Before:** WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 18 | 19 | - **After:** WSAArchive2XXX 20 | 21 | **2. Rename the extracted folder to a shorter name, which can be anything to your choosing**
22 | 23 | - For example: 24 | 25 | - **Before:** WSA_2XXX.XXXXXXX_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 26 | 27 | - **After:** WSAArchive2XXX 28 | 29 | --- 30 | -------------------------------------------------------------------------------- /docs/Fixes/Keyboard Is Not Working.md: -------------------------------------------------------------------------------- 1 | ## Issue: Keyboard Does Not Work 2 | 3 | ### Preface: 4 | ##### This issue will prevent you from using your keyboard on WSA 5 | 6 | 7 | ## Solution: 8 | 9 | #### 1. ***Open Run by pressing the Windows Key and R*** 10 | 11 |
12 | 13 | #### 2. ***Type in services.msc in the box and then select OK*** 14 | 15 |
16 | 17 | #### 3. ***Search for Touch Keyboard and Handwriting Panel*** 18 | 19 |
20 | 21 | #### 4. ***Enable it by switching startup type to automatic*** 22 | 23 |
24 | 25 | #### 5. ***Click apply*** 26 | 27 |
28 | 29 | #### 6. ***Restart your computer.*** 30 | 31 | -------------------------------------------------------------------------------- /docs/Fixes/MissingIcons.md: -------------------------------------------------------------------------------- 1 | ## Issue: Icons have disappeared or have turned white after updating WSA or after restarting your computer 2 | 3 | ### Preface: 4 | ##### This looks like a bug in the WSA itself and the icons can be restored by the following steps. 5 | 6 | ## Solution 7 | 8 | **1.** Backup `userdata.vhdx` from `%LOCALAPPDATA%\Packages\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe\LocalCache\userdata.vhdx` 9 | 10 | **2.** Uninstall WSA by [Following this guide](https://github.com/YT-Advanced/WSA-Script#--uninstallation) 11 | 12 | **3.** Remove the two lines in `Install.ps1` that automatically launches Magisk and Play Store after the installation is finished 13 | 14 | ```powershell 15 | function Finish { 16 | Clear-Host 17 | Start-Process "wsa://com.topjohnwu.magisk" 18 | Start-Process "wsa://com.android.vending" 19 | } 20 | ``` 21 | 22 | **4.** Install WSA 23 | 24 | **5.** Restore `userdata.vhdx` to `%LOCALAPPDATA%\Packages\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe\LocalCache\userdata.vhdx` 25 | 26 | **6.** Start WSA 27 | 28 |
29 | 30 | > **Warning** 31 | >**Do not start WSA before restoring user data.** 32 | 33 |
34 | -------------------------------------------------------------------------------- /docs/Fixes/TargetMachineActivelyRefusedConnection.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Error: No connection could be made because the target machine actively refused it (10061) 2 | ### Preface: 3 | ##### This issue occurs when you are either using a sideloading application such as [WSA-Sideloader](https://github.com/infinitepower18/WSA-Sideloader) or [WSAPacman](https://github.com/alesimula/wsa_pacman), or when you try to connect to a device using ``adb.exe`` via [Android SDK Platform Tools](https://developer.android.com/tools/releases/platform-tools). This issue arises due to an issue with the inability of Hyper V to reserve port 58526 causing the issue, as seen below. 4 | 5 | ![image](https://user-images.githubusercontent.com/68516357/230793765-6c72a7d7-796f-4cb9-8a45-3d40b4f1d38f.png) 6 | 7 | ``` 8 | cannot connect to ||127.0.0.1:58526:|| No connection could be made because the target machine actively refused it. (10061) 9 | ``` 10 | --- 11 | 12 | ## Solution 13 | 14 | This is a [bug](https://github.com/microsoft/WSA/issues/136) with the subsystem itself, restarting the PC will usually fix it. But, if you still get this error, try these steps: 15 | 16 | - ##### _**1. Make sure WSA is turned off and disable WSA autostart in Task Manager ---> Startup Apps before proceeding**_ 17 | 18 | - ##### _**2. Disable Hyper-V (if it is enabled) using the command**_ 19 | 20 | ```powershell 21 | dism.exe /Online /Disable-Feature:Microsoft-Hyper-V 22 | ``` 23 | 24 | - ##### **3. Reboot your PC** 25 | 26 | - ##### _**4. Reserve port 58526 so Hyper-V doesn't reserve it back using the command**_ 27 | ```cmd 28 | netsh int ipv4 add excludedportrange protocol=tcp startport=58526 numberofports=1 29 | ``` 30 | 31 | - ##### _**5. Re-enable Hyper-V (if it was previously enabled) using the command `dism.exe /Online /Enable-Feature:Microsoft-Hyper-V /All` and reboot your PC**_ 32 | 33 | **Hope this works for you!** 34 | -------------------------------------------------------------------------------- /docs/Fixes/WSA Does Not Load After Install + No Splashscreen.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Windows Subystem for Android (WSA) is unable to run any apps and there is no splashscreen (when opening the Files app from the settings) and no icons for Android apps. 2 | ### Preface: 3 | ##### Why this occurs is unknown. However, after multiple attempts trying to fix this issue, a solution was found. 4 | 5 | 6 | https://github.com/MustardChef/WSABuilds/assets/68516357/a9690842-5159-470a-b472-5990faabeac8 7 | 8 | 9 | --- 10 | ## Solution 11 | 12 | **Rename the extracted folder to a shorter name, which can be anything to your choosing.** 13 | 14 | - **Before:** WSA_2XXX.XXXXXXX_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 15 | 16 | - **After:** WSAArchive2XXX 17 | 18 | https://github.com/MustardChef/WSABuilds/assets/68516357/626ec699-6f74-40ff-94fb-26fbe1c4f182 19 | 20 | **Hope this works for you!** 21 | --- 22 | -------------------------------------------------------------------------------- /docs/Fixes/WSA Settings App Crashes + Android Apps Do Not Load After Installation.md: -------------------------------------------------------------------------------- 1 | ## Issue:
Windows Subystem for Android (WSA) Settings app crashes after installation, when opened, and you are unable to run any apps. 2 | ### Preface: 3 | ##### Why this occurs is unknown. However, after multiple attempts trying to fix this issue, a solution was found. 4 | 5 | https://github.com/MustardChef/WSABuilds/assets/68516357/7333e8b4-7c09-4032-b816-47fc0d83767b 6 | 7 | 8 | --- 9 | ## Solution 10 | 11 | **Rename the extracted folder to a shorter name, which can be anything to your choosing.** 12 | 13 | - **Before:** WSA_2XXX.XXXXXXX_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon 14 | 15 | - **After:** WSAArchive2XXX 16 | 17 | https://github.com/MustardChef/WSABuilds/assets/68516357/7a33df5b-e68b-43b1-9365-9c4d7ff5c2db 18 | 19 | 20 | **Hope this works for you!** 21 | --- 22 | -------------------------------------------------------------------------------- /docs/Fixes/WSA Stopped Working.md: -------------------------------------------------------------------------------- 1 | ## Issues: WSA Stopped Working! 2 | 3 | 4 | ![1091802599323336722(1)](https://github.com/MustardChef/WSABuilds/assets/68516357/fea3404d-cac6-4bd8-8ef4-2431d7aa34c4) 5 | 6 | ##### ***You may encounter this problem. WSA has been working fine for you, but all of a sudden, it breaks/ stops working. You are distraught. What do you do, when WSA beloved had been borked.*** 7 | 8 | ## Solution: 9 | 10 | 1. ***Go to "Turn Windows features on and off" and if any of these features below are enabled, DISABLE THEM.*** 11 | 12 | - Hyper-V 13 | - Virtual Machine Platform 14 | - Windows Hypervisor Platform 15 | - Windows Subsystem for Linux 16 | 17 | 2. ***Restart your PC*** 18 | 19 | 3. ***Boot into your BIOS, and DISABLE Virtualization.*** 20 | 21 | - ***[Click here for a guide for Windows 11](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-11-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 22 | - ***[Click here for a guide for Windows 10](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-10-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 23 | 24 | 4. ***Ensure that you have Control Flow Guard enabled in Windows Security > Apps & browser control > Exploit protection.*** This is a known issue that can prevent WSA from starting 25 | 26 | 5. ***In registry editor (regedit), go to “\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FsDepends"*** 27 | 28 | Change the value of “Start” from “3” to “0” 29 | 30 | > **Note** 31 | > You can change it back to 3, if it makes no difference 32 | 33 | 34 | 6. ***Then in CMD (Run as Adminstrator), paste:*** 35 | 36 | ```cmd 37 | bcdedit /set hypervisorlaunchtype auto 38 | ``` 39 | 40 | 7. ***ENABLE the features that you disabled in ``Step 1`` and restart a second time.*** 41 | 42 | 8. ***Boot into your BIOS, and ENABLE Virtualization.*** 43 | 44 | - ***[Click here for a guide for Windows 11](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-11-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 45 | - ***[Click here for a guide for Windows 10](https://support.microsoft.com/en-us/windows/enable-virtualization-on-windows-10-pcs-c5578302-6e43-4b4b-a449-8ced115f58e1)*** 46 | 47 | 9. ***Restart the Computer*** 48 | 49 | 10. ***Try re-running WSA by running `Run.bat` or via the Windows Subsystem for Android Settings app*** 50 | 51 | **Hope this works for you!** 52 | -------------------------------------------------------------------------------- /docs/Guides/ADB-Sideloading.md: -------------------------------------------------------------------------------- 1 | # Sideloading APKs in to Windows Subsystem for Android 2 | ------------- 3 | 4 | ## Setting up ADB to work with WSA 5 | - Launch **Windows Subsystem for Android**. 6 | - Here, click on **Advanced Settings** and then enable **Developer mode** by clicking on the toggle button. 7 | - Take note of **IP address and port** shown in the Developer mode section. 8 | - Launch Windows Terminal and make sure ADB is installed ([install ADB](https://www.xda-developers.com/install-adb-windows-macos-linux/#adbsetupwindows)). 9 | - Use command ``adb pair 127.0.0.1:58526`` to pair ADB with WSA. 10 | - In Wireless debugging window, see **Device name** and under it **IP address and port**. 11 | - Use command ``adb connect 127.0.0.1:58526`` to connect WSA with ADB. 12 | 13 | Once this is done, use command ``adb devices`` to make sure that WSA is connected. 14 | 15 | 16 | ## Installing APKs using ADB 17 | Now you can install any app you want, but I personally suggest installing a web browser and a file manager first. 18 | - Download the APK. 19 | - Open File Explorer, right click on downloaded APK and tap on Copy as path. 20 | - Launch Windows Terminal. 21 | - Use ``adb install `` to install the APK. 22 | [**P.S.** You can right click to paste in Terminal] 23 | 24 | ## After installation using ADB 25 | You can now open the web browser you installed in Android, and download and install Aurora Store like you do on any Android device - normally sideloading APK without using ADB. 26 | *** 27 |   28 | 29 | ### A list of suggested apps to install on WSA: 30 | - [microG](https://microg.org/): A free-as-in-freedom re-implementation of Google’s proprietary Android user space apps and libraries. 31 | - [Aurora Store](https://files.auroraoss.com/AuroraStore/Stable/): an app store that lets you download apps from Google Play without a Google account. 32 | - [MiX](https://forum.xda-developers.com/t/app-2-2-mixplorer-v6-x-released-fully-featured-file-manager.1523691/): MiXplorer mix of explorers (SD, FTP, Lan, Cloud and other storage explorers) is a fast, smooth, beautiful, reliable and full-featured file manager with a simple and intuitive user interface. 33 | - [Bromite](https://github.com/bromite/bromite): A Chromium fork with support for ad blocking and enhanced privacy. 34 | -------------------------------------------------------------------------------- /docs/Guides/BusyBox.md: -------------------------------------------------------------------------------- 1 | ## Guide: How to install BusyBox 2 | 3 | ### Preface: 4 | ##### Since Magisk has BusyBox built-in already, this proceedure is very simple 5 | 6 | ## Process 7 | 8 | ### Step 1: 9 | Using an Android browser downloaded though the Play Store/sideloaded into WSA, download the following [Magisk Module](https://github.com/Magisk-Modules-Alt-Repo/BuiltIn-BusyBox) to install and symlink BusyBox with its applets to the Magisk built-in busybox binary. No need to do it manually or to get a Custom Build. 10 | 11 | ### Step 2: 12 | Through Magisk Manager, install the Magisk module .zip file 13 | 14 | ### Step 3 (Optional): 15 | You can then test if BusyBox is working by either using a Root Checker: 16 | ![image](https://user-images.githubusercontent.com/68516357/219951996-cd72359c-cfa7-4b99-8965-8249b0c917e1.png) 17 | 18 | or by using ADB Shell and: 19 | 20 | `` adb shell `` 21 | ``su`` 22 | ``busybox | head -1`` 23 | 24 | ![image](https://user-images.githubusercontent.com/68516357/219952139-7037c81a-a3d6-4e34-9cb7-84601f5cd990.png) 25 | -------------------------------------------------------------------------------- /docs/Guides/ChangingGPU.md: -------------------------------------------------------------------------------- 1 | ### Guide: Changing the GPU used by Windows Subsystem For Android™ 2 | 3 | 1. Open up Windows Subsystem For Android™ Settings --> Either by going to the Start Menu and searching for it or by using the Search feature 4 | 5 | ![image](https://user-images.githubusercontent.com/68516357/213872047-eced6893-ea32-4de9-8ebb-ca35fc568f12.png) 6 | 7 | 2. Make sure to turn off Windows Subsystem For Android™ by pressing ``Turn off`` in the ``Turn off Windows Subsystem For Android™`` tab 8 | 9 | ![image](https://user-images.githubusercontent.com/68516357/213872914-1eae7f97-9571-4ffc-b280-86075dd3431b.png) 10 | 11 | 12 | 3. In Windows Subsystem For Android™ Settings select the ``Graphics and Performance`` Tab 13 | 14 | ![image](https://user-images.githubusercontent.com/68516357/213872285-93e7de54-9e5f-430c-a7fd-4c6d304cea64.png) 15 | 16 | 4. Click on the selection for ``GPU used for apps for Android™`` and select the GPU that you would like Windows Subsystem For Android™ to use. 17 | 18 | ![image](https://user-images.githubusercontent.com/68516357/213872473-e70814dd-6fc2-4afd-bcd2-fcb421518eba.png) 19 | 20 | 21 | -------------------------------------------------------------------------------- /docs/Guides/Checksum.md: -------------------------------------------------------------------------------- 1 | # Check integrity of downloaded file 2 | 3 | 4 | ### **1. Press Win + X on your keyboard and select Windows™ Terminal (Admin) or Powershell (Admin) depending on the version of Windows™ you are running** 5 | 6 | ||| 7 | |--------|------| 8 | | | | 9 | |![215262254-7466d964-3956-4d71-8014-e2c5869ca4d4](https://user-images.githubusercontent.com/68516357/215263173-500591dd-c6d5-4c2d-9d38-58bc065fff28.png)|![winx_editor-1](https://user-images.githubusercontent.com/68516357/215263348-022dc031-802f-4e93-8999-05d0aa6744b9.png)| 10 | 11 |   12 | ### **2. Input the command below and press enter, replacing {X:\path\to\your\downloaded\archive\package} including the {} with the path of the downloaded archive package** 13 | 14 | ```Powershell 15 | cd "{X:\path\to\your\downloaded\archive\package}" 16 | ``` 17 |   18 | ### **3. Input the command below and press enter, replacing WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon with the name of the archive package** 19 | 20 | ```Powershell 21 | certutil -hashfile "WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon" SHA256 22 | ``` 23 | For PowerShell: 24 | ```PowerShell 25 | (Get-FileHash -Path "WSA_2XXX.XXXXX.X.X_XXXX_Release-Nightly-with-magisk-XXXXXXX-XXXXXX-MindTheGapps-XX.X-RemovedAmazon" -Algorithm SHA256).Hash 26 | ``` 27 |   28 | 29 | ### **4. Compare the SHA256 output with ones at [Release](https://github.com/YT-Advanced/WSA-Script/releases/latest) or in the `sha256-checksum.txt` (if you download artifact from the Custom Build task).** 30 | - If package don't have the same SHA-256 Hash, please download then check again. 31 | - If package have the same SHA-256, install it by [Following this guide](https://github.com/YT-Advanced/WSA-Script#--installation) 32 | -------------------------------------------------------------------------------- /docs/Guides/KernelSU.md: -------------------------------------------------------------------------------- 1 | # Install KernelSU Manager 2 | 3 | ## Text Guide 4 | 5 | 1. Go to [KernelSU Github](https://github.com/tiann/KernelSU/releases/latest/) 6 | 3. Download the file with name `KernelSU_v1.x.x.xxxxx.apk` 7 | 2. Follow the [sideloading guide](https://github.com/YT-Advanced/WSA-Script/blob/main/docs/Guides/Sideloading.md) to install KernelSU Manager 8 | 9 | After the installation, find and open KernelSU Manager from WSA app list. 10 | 11 | 14 | -------------------------------------------------------------------------------- /docs/Guides/LocalHostLoopback.md: -------------------------------------------------------------------------------- 1 | ## Guide: LocalHost Loopback 2 | #### Preface: You want to connect WSA to the localhost (Windows 11 hosting machine) or to a development server I run on Windows 11 or any such scenario where you would want to connect to the Windows 11 localhost, but are unable to 3 | 4 | ### Note: Localhost Loopback has now been officially added to the update 2308 of WSA, and so this guide is probably outdated now. 5 | 6 | --- 7 | 8 | ## Process: 9 | 10 | **1.** Run PowerShell as administrator 11 | 12 | **2.** Execute 13 | ```powershell 14 | Set-NetFirewallHyperVVMSetting -VMCreatorId '{9E288F02-CE00-4D9E-BE2B-14CE463B0298}' -LoopbackEnabled True 15 | ``` 16 | 17 | 3.Execute 18 | ```powershell 19 | New-NetFirewallHyperVRule -DisplayName LoopbackAllow -VMCreatorId '{9E288F02-CE00-4D9E-BE2B-14CE463B0298}' -Direction Inbound -Action Allow -LocalPorts [PORT] 20 | ``` 21 | (replacing [PORT] with the port you're trying to expose) 22 | -------------------------------------------------------------------------------- /docs/Guides/MoveToExtDrive.md: -------------------------------------------------------------------------------- 1 | ## Guide: Moving/Installing Windows Subsystem For Android™ (WSA) to another partition or disk 2 | 3 | ### Preface: 4 | ##### WSA can take up a lot of storage space, hence you want to move it to another partition or disk with more space.
This guide goes through a method by which you can install WSA from another disk and to store the data in that drive (instead of `%LOCALAPPDATA%\Packages\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe`). 5 | 6 | ### Prerequisites: 7 | - The partition/ disk that you want to move/install Windows Subsystem For Android™ to, ****MUST**** be **NTFS** 8 | - Recommended that both disks, C:/ and the disk/partition that you want to install (move) WSA on (to), are SSDs 9 | - HDDs may work, but performance issues may arise 10 | - Basic knowledge on Command Prompt (CMD) usage 11 | - There must be enough space on the disk/partiton that you are installing/moving WSA to (recommended 20GB, as the VHDX can become very large in size) 12 | 13 | > **Note** 14 | > 15 | > If you want to preseve your data, make a backup of the `%LOCALAPPDATA%\Packages\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe\LocalCache\userdata.vhdx` file. After uninstalling, copy the VHDX file back to the `%LOCALAPPDATA%\Packages\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe\LocalCache` folder. 16 | 17 | 18 | ## Process: 19 | 20 | 21 | - ### Step 1: Remove all previous installations from WSABuilds or official WSA Releases 22 | - To remove WSA installed through WSABuild: 23 | 24 | - **1.)** Make sure that Windows Subsystem For Android™ is not running 25 | - **2.)** Search for ``Windows Subsystem For Android™ Settings`` using the built-in Windows Search, or through Add and Remove Programs and press uninstall 26 | - **3.)** Delete the WSA folder that you extracted and Run.bat was run from to install WSA (MagiskOnWSA folder) 27 | - **4.)** Go to ``%LOCALAPPDATA%/Packages/`` and delete the folder named ``MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe`` 28 | 29 | - If you get an error that states that the file(s) could not be deleted, make sure that WSA is turned off 30 | 31 | - To remove WSA installed from the Microsoft Store: 32 | 33 | - **1.)** Search for ``Windows Subsystem For Android™ Settings`` using the built-in Windows Search, or through Add and Remove Programs and press uninstall 34 | 35 | 36 | - ### Step 2: Install WSA from the desired partition 37 | - **1.)** Download the latest WSA Build according to Windows Version and CPU Archtecture from [Release](https://github.com/YT-Advanced/WSA-Script/releases/latest). 38 | - **2.)** Extract to the desired partition or drive 39 | - Using the same process as detailed in [Installation](https://github.com/YT-Advanced/WSA-Script#--installation) 40 | - **3.)** Open the extracted folder and run ``Run.bat`` 41 | 42 | 43 | - ### Step 3: Moving the AppData (VHDX + data) from your Windows drive (C:\) to the desired partition/drive 44 | - **1.)** Go to ``%LOCALAPPDATA%\Packages\`` and copy the folder named ``MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe`` to the desired drive/partition, making sure to delete the folder from ``%LOCALAPPDATA%\Packages\`` after copying 45 | 46 | - **2.)** Open Command Prompt (Admin) through Windows Terminal (Admin) or directly and run the command: 47 | ```shell 48 | mklink /J "%LOCALAPPDATA%\Packages\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe" "Location_Of_Folder_In_Other_Drive" 49 | ``` 50 | Replacing Location_Of_Folder_In_Other_Drive with the location of the folder named ``MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe``, copied to the desired to the drive/partition in 1st point of Step 3 51 | 52 | - ### Step 4: Testing if everything is working 53 | - Run Windows Subsystem For Android™ Settings 54 | - If it crashes, you have made a mistake whilst following the guide. Try following it again. 55 | -------------------------------------------------------------------------------- /docs/Guides/Sideloading.md: -------------------------------------------------------------------------------- 1 | ## Guide: Sideloading APKs 2 | 3 | ### This guide covers the four different methods of sideloading and installing APKs (from Windows) into Windows Subsystem For Android™ 4 | 5 | |Application| 6 | |-----------| 7 | |[](WSAFiles.md)| 8 | |[](WSA-Sideloader.md)| 9 | |[](WSAPacman.md)| 10 | |[](ADB-Sideloading.md)| 11 | |[](https://github.com/Paving-Base/APK-Installer/blob/main/README.en-US.md#how-to-install-the-apk-installer)| 12 | -------------------------------------------------------------------------------- /docs/Guides/WSA-Sideloader.md: -------------------------------------------------------------------------------- 1 | # WSA Sideloader Usage Guide 2 | #### With WSA Sideloader, you can install any APK file onto WSA, as well as XAPK, APKM and APKS files. 3 | #### This guide will show you how to use it. 4 | 5 |
6 | 7 |
8 | 9 | ## How to Download and Install WSA-Sideloader 10 | 11 | #### You can download WSA Sideloader in 3 different ways: 12 | Operating System|Downloads 13 | |---------|---------| 14 | |
|[](https://winstall.app/apps/infinitepower18.WSASideloader)| 15 | |
|[](https://github.com/infinitepower18/WSA-Sideloader/releases/latest)| 16 | ||[](https://apps.microsoft.com/store/detail/9NMFSJB25QJR?launch=true&cid=wsabuilds&mode=mini)| 17 | 18 | ## Setup 19 | 20 | ***Step 1. Once installed, you should see this screen:*** 21 | 22 | image 23 | 24 | >**Note** : 25 | > If you get a message that says WSA is not installed, check that you have downloaded and installed WSA correctly as per the WSABuilds instructions. 26 | 27 |
28 | 29 | ***Step 2. Next, open WSA Settings from the start menu or by typing wsa-settings:// in your browser's address bar, select Developer and enable Developer mode.*** 30 | 31 | ![image](https://user-images.githubusercontent.com/44692189/226059697-9d54c122-8674-46f4-871a-4937805498ef.png) 32 | 33 |
34 | 35 | ***Step 3. Now, you can click the Browse button to select your APK file. You can also double click a file in File Explorer to automatically open WSA Sideloader with the APK file already selected.*** 36 | 37 | image 38 | 39 |
40 | 41 | ***Step 4. The first time you install an APK, it will ask to allow ADB debugging. Allow it and attempt the installation again. Check the always allow box if you don't want to manually accept the permission every time you install an app.*** 42 | 43 | image 44 | 45 |
46 | 47 | ***Step 5. It should take a few seconds to install the APK. Once it says `The application has been successfully installed`, you can click Open app. Bundle files may take longer depending on the file size.*** 48 | 49 | >**Note** : 50 | > If WSA is off, WSA Sideloader will start it for you. After 30 seconds, the installation will automatically continue. 51 | 52 | image 53 | 54 |
55 | 56 | ***You can find all your installed WSA apps on the start menu, as well as via the "Installed apps" button in WSA Sideloader:*** 57 | 58 | image 59 | 60 | ## Updating WSA Sideloader 61 | From time to time, there may be updates that improve the reliability of the app, as well as ensuring it works properly with future releases of WSA. 62 | 63 | Therefore, it's highly recommended you keep it up to date. 64 | 65 | - If you installed WSA Sideloader using MS Store, you can update the app via the store. 66 | - If you installed through other methods, the sideloader will notify you of an update the next time you launch it. 67 | 68 | ## Troubleshooting 69 | If you get an error like the one below, check that you have allowed the ADB authorization and enabled Developer Mode. Also try disabling and enabling USB debugging under manage developer settings as that can sometimes fix issues with the ADB connection. 70 | 71 | image 72 | 73 | If you get a message saying `No connection could be made because the target machine actively refused it`, follow [this guide](https://github.com/YT-Advanced/WSA-Script/blob/main/docs/Fixes/TargetMachineActivelyRefusedConnection.md) 74 | -------------------------------------------------------------------------------- /docs/Guides/WSAFiles.md: -------------------------------------------------------------------------------- 1 | # Sideloading using the Files app 2 | 3 | #### Starting with WSA version 2305, you can sideload APK files using the Files app. This guide will show you how. 4 | 5 | > **NOTE:** 6 | > This guide is only applicable for WSA versions 2305 and above. If you're using an older version, you will need to use [ADB](ADB-Sideloading.md) or one of the [listed APK installers](Sideloading.md). 7 | 8 | ## Setup 9 | 10 | ***1. Open the Windows Subsystem for Android app, go to Advanced Settings and enable share user folders found under experimental features. Then select the folder that you would like to share by clicking on "Change folder".*** 11 | 12 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/9644d1c3-ec12-462e-89bc-50bd4ff0f2df) 13 | 14 |
15 | 16 | ***2. Go to the "System" section and open the Files app.*** 17 | 18 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/65e459bf-24f8-40e0-8bf1-aa7ea72873a6) 19 | 20 |
21 | 22 | ***3. Click on Subsystem for Android, followed by Windows to browse through your Windows files.*** 23 | 24 | ![image](https://github.com/MustardChef/WSABuilds/assets/68516357/5300c7be-a517-4ccd-a951-d51f703a4a5d) 25 | 26 |
27 | 28 | image 29 | 30 |
31 |
32 | 33 | ***4. Click the APK you want to install and choose package installer if it asks. Agree to the warnings and then click install.*** 34 | 35 |
36 | 37 | image 38 | 39 |
40 | 41 | > **NOTE:** 42 | > If you're facing problems, try disabling `Block installation of malicious apps` in the WSA app. 43 | 44 |
45 | 46 | ## After installation 47 | 48 | #### Once installed, you can launch the sideloaded app from the Start Menu. 49 | 50 | 51 | 52 | #### If you want to install bundle files, such as .apkm or .xapk, you can install [SAI](https://apkpure.com/split-apks-installer-sai/com.aefyr.sai) and use that to install bundle files, as well as regular APKs. 53 | -------------------------------------------------------------------------------- /docs/Guides/WSAPacman.md: -------------------------------------------------------------------------------- 1 | # WSAPacman 2 | 3 | **Step 1:**   Download and install [**WSA Pacman**](https://github.com/alesimula/wsa_pacman/releases) 4 | 5 | **Step 2:**   Go to `Windows Subsystem for Android` → `Developer` and turn on **Developer mode**. 6 | 7 | > **Warning**: 8 | > #### You have to give WSAPacman, ADB Debugging permission. 9 | > 10 | > ![](https://media.discordapp.net/attachments/1015131233824538624/1062611905249820733/allow.png) 11 | 12 |   13 |   14 | 15 | ## Issues and Solutions 16 | 17 | #### If the "Install" button is greyed out while installing apk 18 | 19 | ![image](https://user-images.githubusercontent.com/68516357/215341077-162f64c0-bea5-4f39-9f48-a8d5acaa5cf3.png) 20 | 21 | #### Solution: Open WSAPacman and turn on WSA from there. 22 | >![](https://media.discordapp.net/attachments/1015131233824538624/1062610433506287708/WSA-pacman_x7UaiviLSW.png) 23 | 24 |
25 | 26 | #### If WSAPacman states that the "Installation timed out": 27 | 28 | 29 | 30 | #### Solution: Wait for a few minutes, and see if the app is installed and shows in the Start Menu. If not retry the installation
In the case that nothing works, report this to the [WSAPacman Github](https://github.com/alesimula/wsa_pacman) 31 | -------------------------------------------------------------------------------- /docs/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | -------------------------------------------------------------------------------- /installer/Run.bat: -------------------------------------------------------------------------------- 1 | @echo off 2 | cd "%~dp0" 3 | if not exist Install.ps1 ( 4 | echo "Install.ps1" is not found. 5 | echo Press any key to exit 6 | pause>nul 7 | exit 1 8 | ) 9 | start powershell.exe -ExecutionPolicy Bypass -File .\Install.ps1 10 | exit 11 | -------------------------------------------------------------------------------- /installer/arm64/MakePri.ps1: -------------------------------------------------------------------------------- 1 | # This file is part of MagiskOnWSALocal. 2 | # 3 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 4 | # it under the terms of the GNU Affero General Public License as 5 | # published by the Free Software Foundation, either version 3 of the 6 | # License, or (at your option) any later version. 7 | # 8 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 11 | # GNU Affero General Public License for more details. 12 | # 13 | # You should have received a copy of the GNU Affero General Public License 14 | # along with MagiskOnWSALocal. If not, see . 15 | # 16 | # Copyright (C) 2023 LSPosed Contributors 17 | # 18 | 19 | $Host.UI.RawUI.WindowTitle = "Merging resources...." 20 | if (((Test-Path -Path $(Get-Content -Path .\filelist-pri.txt)) -eq $false).Count) { 21 | Write-Error "Some files are missing in the folder. Please try to build again. Press any key to exit" 22 | $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') 23 | exit 1 24 | } else { 25 | New-Item -Path "." -Name "priinfo" -ItemType "directory" | Out-Null 26 | Copy-Item .\resources.pri -Destination ".\pri\resources.pri" | Out-Null 27 | Clear-Host 28 | $AppxManifestFile = ".\AppxManifest.xml" 29 | $PriItem = Get-Item ".\pri\*" -Include "*.pri" 30 | Write-Output "Dumping resources...." 31 | $i = 0 32 | $Processes = foreach ($Item in $PriItem) { 33 | Start-Process -PassThru -WindowStyle Hidden makepri.exe -Args "dump /if $($Item | Resolve-Path -Relative) /o /es .\pri\resources.pri /of .\priinfo\$($Item.Name).xml /dt detailed" 34 | ++$i 35 | $Completed = ($i / $PriItem.count) * 100 36 | Write-Progress -Activity "Dumping resources" -Status "Dumping $($Item.Name):" -PercentComplete $Completed 37 | } 38 | $Processes | Wait-Process 39 | Write-Progress -Activity "Dumping resources" -Status "Ready" -Completed 40 | Clear-Host 41 | Write-Output "Creating pri from dumps...." 42 | $ProcNewFromDump = Start-Process -PassThru -NoNewWindow makepri.exe -Args "new /pr .\priinfo /cf .\xml\priconfig.xml /of .\resources.pri /mn $AppxManifestFile /o" 43 | $null = $ProcNewFromDump.Handle 44 | $ProcNewFromDump.WaitForExit() 45 | Remove-Item 'priinfo' -Recurse 46 | if ($ProcNewFromDump.ExitCode -Ne 0) { 47 | Write-Error "Failed to create resources from priinfos" 48 | exit 1 49 | } 50 | 51 | $ProjectXml = [xml](Get-Content $AppxManifestFile) 52 | $ProjectResources = $ProjectXml.Package.Resources; 53 | $(Get-Item .\xml\* -Exclude "priconfig.xml" -Include "*.xml") | ForEach-Object { 54 | $($([xml](Get-Content $_)).Package.Resources.Resource) | ForEach-Object { 55 | $ProjectResources.AppendChild($($ProjectXml.ImportNode($_, $true))) 56 | } 57 | } 58 | $ProjectXml.Save($AppxManifestFile) 59 | Remove-Item 'pri' -Recurse -Force 60 | Remove-Item 'xml' -Recurse -Force 61 | Remove-Item 'makepri.exe' -Force 62 | Remove-Item 'filelist-pri.txt' -Force 63 | Remove-Item $PSCommandPath -Force 64 | exit 0 65 | } 66 | -------------------------------------------------------------------------------- /installer/x64/MakePri.ps1: -------------------------------------------------------------------------------- 1 | # This file is part of MagiskOnWSALocal. 2 | # 3 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 4 | # it under the terms of the GNU Affero General Public License as 5 | # published by the Free Software Foundation, either version 3 of the 6 | # License, or (at your option) any later version. 7 | # 8 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 11 | # GNU Affero General Public License for more details. 12 | # 13 | # You should have received a copy of the GNU Affero General Public License 14 | # along with MagiskOnWSALocal. If not, see . 15 | # 16 | # Copyright (C) 2023 LSPosed Contributors 17 | # 18 | 19 | $MakePri = "C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64\makepri.exe" 20 | 21 | New-Item -Path "." -Name "priinfo" -ItemType "directory" | Out-Null 22 | Copy-Item .\resources.pri -Destination ".\pri\resources.pri" | Out-Null 23 | $AppxManifestFile = ".\AppxManifest.xml" 24 | $PriItem = Get-Item ".\pri\*" -Include "*.pri" 25 | Write-Output "Dumping resources..." 26 | foreach ($Item in $PriItem) { 27 | Start-Process -PassThru $MakePri -Args "dump /if $($Item | Resolve-Path -Relative) /o /es .\pri\resources.pri /of .\priinfo\$($Item.Name).xml /dt detailed" 28 | } 29 | 30 | Write-Output "Creating pri from dumps...." 31 | $ProcNewFromDump = Start-Process -PassThru $MakePri -Args "new /pr .\priinfo /cf .\xml\priconfig.xml /of .\resources.pri /mn $AppxManifestFile /o" 32 | $null = $ProcNewFromDump.Handle 33 | $ProcNewFromDump.WaitForExit() 34 | Remove-Item 'priinfo' -Recurse -Force 35 | if ($ProcNewFromDump.ExitCode -ne 0) { 36 | Write-Error "Failed to create resources from priinfos" 37 | exit 1 38 | } 39 | 40 | $ProjectXml = [xml](Get-Content $AppxManifestFile) 41 | $ProjectResources = $ProjectXml.Package.Resources; 42 | $(Get-Item .\xml\* -Exclude "priconfig.xml" -Include "*.xml") | ForEach-Object { 43 | $($([xml](Get-Content $_)).Package.Resources.Resource) | ForEach-Object { 44 | $ProjectResources.AppendChild($($ProjectXml.ImportNode($_, $true))) 45 | } 46 | } 47 | $ProjectXml.Save($AppxManifestFile) 48 | 49 | Remove-Item 'pri' -Recurse -Force 50 | Remove-Item 'xml' -Recurse -Force 51 | Remove-Item 'filelist-pri.txt' -Force 52 | Remove-Item $PSCommandPath -Force 53 | exit 0 54 | -------------------------------------------------------------------------------- /linker/libc.so: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/linker/libc.so -------------------------------------------------------------------------------- /linker/libdl.so: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/linker/libdl.so -------------------------------------------------------------------------------- /linker/libm.so: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/linker/libm.so -------------------------------------------------------------------------------- /linker/linker64: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/YT-Advanced/WSA-Script/8620f99070d012af7be0d18351a592b81df618d5/linker/linker64 -------------------------------------------------------------------------------- /scripts/extractMagisk.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2024 LSPosed Contributors 19 | # 20 | 21 | import sys 22 | import zipfile 23 | from pathlib import Path 24 | import platform 25 | import os 26 | from typing import Any, OrderedDict 27 | 28 | 29 | class Prop(OrderedDict): 30 | def __init__(self, props: str = ...) -> None: 31 | super().__init__() 32 | for i, line in enumerate(props.splitlines(False)): 33 | if '=' in line: 34 | k, v = line.split('=', 1) 35 | self[k] = v 36 | else: 37 | self[f".{i}"] = line 38 | 39 | def __setattr__(self, __name: str, __value: Any) -> None: 40 | self[__name] = __value 41 | 42 | def __repr__(self): 43 | return '\n'.join(f'{item}={self[item]}' for item in self) 44 | 45 | 46 | is_x86_64 = platform.machine() in ("AMD64", "x86_64") 47 | host_abi = "x64" if is_x86_64 else "arm64" 48 | arch = sys.argv[1] 49 | magisk_zip = sys.argv[2] 50 | workdir = Path(sys.argv[3]) 51 | workdir.mkdir(parents=True, exist_ok=True) 52 | 53 | abi_map = {"x64": ["x86_64", "x86"], "arm64": ["arm64-v8a", "armeabi-v7a"]} 54 | 55 | def extract_as(zip, name, as_name, dir): 56 | info = zip.getinfo(name) 57 | info.filename = as_name 58 | zip.extract(info, workdir / dir) 59 | 60 | 61 | with zipfile.ZipFile(magisk_zip) as zip: 62 | props = Prop(zip.comment.decode().replace('\000', '\n')) 63 | namelist = zip.namelist() 64 | versionName = props.get("version") 65 | versionCode = props.get("versionCode") 66 | print(f"Magisk version: {versionName} ({versionCode})", flush=True) 67 | if 'WSA_WORK_ENV' in os.environ and Path(os.environ['WSA_WORK_ENV']).is_file(): 68 | with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: 69 | env = Prop(environ_file.read()) 70 | env.MAGISK_VERSION_NAME = versionName 71 | env.MAGISK_VERSION_CODE = versionCode 72 | with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: 73 | environ_file.write(str(env)) 74 | if f"lib/{ abi_map[arch][0] }/libmagisk64.so" in namelist: 75 | extract_as(zip, f"lib/{ abi_map[arch][0] }/libmagisk64.so", "magisk64", "magisk") 76 | extract_as(zip, f"lib/{ abi_map[arch][1] }/libmagisk32.so", "magisk32", "magisk") 77 | else: 78 | extract_as(zip, f"lib/{ abi_map[arch][0] }/libmagisk.so", "magisk", "magisk") 79 | if f"lib/{ abi_map[arch][0] }/libinit-ld.so" in namelist: 80 | extract_as(zip, f"lib/{ abi_map[arch][0] }/libinit-ld.so", "init-ld", "magisk") 81 | extract_as(zip, f"lib/{ abi_map[arch][0] }/libmagiskinit.so", "magiskinit", "magisk") 82 | extract_as(zip, f"lib/{ abi_map[host_abi][0] }/libmagiskboot.so", "magiskboot", "magisk") 83 | 84 | if f"lib/{ abi_map[arch][0] }/libmagiskpolicy.so" in namelist: 85 | extract_as(zip, f"lib/{ abi_map[host_abi][0] }/libmagiskpolicy.so", "magiskpolicy", "magisk") 86 | else: 87 | extract_as(zip, f"lib/{ abi_map[host_abi][0] }/libmagiskinit.so", "magiskpolicy", "magisk") 88 | -------------------------------------------------------------------------------- /scripts/extractWSA.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2023 LSPosed Contributors 19 | # 20 | 21 | import os 22 | import sys 23 | from typing import Any, OrderedDict 24 | 25 | import zipfile 26 | from pathlib import Path 27 | import re 28 | import shutil 29 | 30 | 31 | class Prop(OrderedDict): 32 | def __init__(self, props: str = ...) -> None: 33 | super().__init__() 34 | for i, line in enumerate(props.splitlines(False)): 35 | if '=' in line: 36 | k, v = line.split('=', 1) 37 | self[k] = v 38 | else: 39 | self[f".{i}"] = line 40 | 41 | def __setattr__(self, __name: str, __value: Any) -> None: 42 | self[__name] = __value 43 | 44 | def __repr__(self): 45 | return '\n'.join(f'{item}={self[item]}' for item in self) 46 | 47 | 48 | arch = sys.argv[1] 49 | 50 | zip_name = "" 51 | wsa_zip_path = Path(sys.argv[2]) 52 | rootdir = Path(sys.argv[3]) 53 | env_file = Path(sys.argv[4]) 54 | 55 | workdir = rootdir / "wsa" 56 | archdir = Path(workdir / arch) 57 | pridir = workdir / archdir / 'pri' 58 | xmldir = workdir / archdir / 'xml' 59 | if not Path(rootdir).is_dir(): 60 | rootdir.mkdir() 61 | 62 | if Path(workdir).is_dir(): 63 | shutil.rmtree(workdir) 64 | else: 65 | workdir.unlink(missing_ok=True) 66 | 67 | if not Path(workdir).is_dir(): 68 | workdir.mkdir() 69 | 70 | if not Path(archdir).is_dir(): 71 | archdir.mkdir() 72 | uid = os.getuid() 73 | workdir_rw = os.access(workdir, os.W_OK) 74 | 75 | with zipfile.ZipFile(wsa_zip_path) as zip: 76 | for f in zip.filelist: 77 | filename_lower = f.filename.lower() 78 | if arch in filename_lower: 79 | zip_name = f.filename 80 | if not Path(workdir / zip_name).is_file(): 81 | print(f"unzipping {zip_name} to {workdir}", flush=True) 82 | zip_path = zip.extract(f, workdir) 83 | with zipfile.ZipFile(zip_path) as wsa_zip: 84 | stat = Path(zip_path).stat() 85 | print(f"unzipping from {zip_path}", flush=True) 86 | wsa_zip.extractall(archdir) 87 | ver_no = zip_name.split("_") 88 | long_ver = ver_no[1] 89 | ver = long_ver.split(".") 90 | major_ver = ver[0] 91 | rel = ver_no[3].split(".") 92 | rel_long = str(rel[0]) 93 | with open(env_file, 'r') as environ_file: 94 | env = Prop(environ_file.read()) 95 | env.WSA_VER = long_ver 96 | env.WSA_MAJOR_VER = major_ver 97 | env.WSA_REL = rel_long 98 | with open(env_file, 'w') as environ_file: 99 | environ_file.write(str(env)) 100 | if 'language' in filename_lower or 'scale' in filename_lower: 101 | name = f.filename.split("_")[2].split(".")[0] 102 | zip.extract(f, workdir) 103 | with zipfile.ZipFile(workdir / f.filename) as l: 104 | for g in l.filelist: 105 | if g.filename == 'resources.pri': 106 | g.filename = f'resources.{name}.pri' 107 | l.extract(g, pridir) 108 | elif g.filename == 'AppxManifest.xml': 109 | g.filename = f'resources.{name}.xml' 110 | l.extract(g, xmldir) 111 | elif re.search(u'Images/.+\.png', g.filename): 112 | l.extract(g, archdir) 113 | -------------------------------------------------------------------------------- /scripts/fixGappsProp.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2023 LSPosed Contributors 19 | # 20 | 21 | from __future__ import annotations 22 | from io import TextIOWrapper 23 | from typing import OrderedDict 24 | from pathlib import Path 25 | import sys 26 | class Prop(OrderedDict): 27 | def __init__(self, file: TextIOWrapper) -> None: 28 | super().__init__() 29 | for i, line in enumerate(file.read().splitlines(False)): 30 | if '=' in line: 31 | k, v = line.split('=', 1) 32 | self[k] = v 33 | else: 34 | self[f".{i}"] = line 35 | 36 | def __str__(self) -> str: 37 | return '\n'.join([v if k.startswith('.') else f"{k}={v}" for k, v in self.items()]) 38 | 39 | def __iadd__(self, other: str) -> Prop: 40 | self[f".{len(self)}"] = other 41 | return self 42 | 43 | 44 | new_props = { 45 | ("product", "brand"): "google", 46 | ("product", "manufacturer"): "Google", 47 | ("build", "product"): "redfin", 48 | ("product", "name"): "redfin", 49 | ("product", "device"): "redfin", 50 | ("product", "model"): "Pixel 5", 51 | ("build", "flavor"): "redfin-user" 52 | } 53 | 54 | 55 | def description(sec: str, p: Prop) -> str: 56 | return f"{p[f'ro.{sec}.build.flavor']} {p[f'ro.{sec}.build.version.release_or_codename']} {p[f'ro.{sec}.build.id']} {p[f'ro.{sec}.build.version.incremental']} {p[f'ro.{sec}.build.tags']}" 57 | 58 | 59 | def fingerprint(sec: str, p: Prop) -> str: 60 | return f"""{p[f"ro.product.{sec}.brand"]}/{p[f"ro.product.{sec}.name"]}/{p[f"ro.product.{sec}.device"]}:{p[f"ro.{sec}.build.version.release"]}/{p[f"ro.{sec}.build.id"]}/{p[f"ro.{sec}.build.version.incremental"]}:{p[f"ro.{sec}.build.type"]}/{p[f"ro.{sec}.build.tags"]}""" 61 | 62 | 63 | def fix_prop(sec, prop): 64 | if not Path(prop).is_file(): 65 | return 66 | 67 | print(f"fixing {prop}", flush=True) 68 | with open(prop, 'r') as f: 69 | p = Prop(f) 70 | 71 | p += "# extra prop added by MagiskOnWSA" 72 | 73 | for k, v in new_props.items(): 74 | p[f"ro.{k[0]}.{k[1]}"] = v 75 | 76 | if k[0] == "build": 77 | p[f"ro.{sec}.{k[0]}.{k[1]}"] = v 78 | elif k[0] == "product": 79 | p[f"ro.{k[0]}.{sec}.{k[1]}"] = v 80 | 81 | p["ro.build.description"] = description(sec, p) 82 | p[f"ro.build.fingerprint"] = fingerprint(sec, p) 83 | p[f"ro.{sec}.build.description"] = description(sec, p) 84 | p[f"ro.{sec}.build.fingerprint"] = fingerprint(sec, p) 85 | p[f"ro.bootimage.build.fingerprint"] = fingerprint(sec, p) 86 | 87 | with open(prop, 'w') as f: 88 | f.write(str(p)) 89 | 90 | 91 | sys_path = sys.argv[1] 92 | for sec, prop in {"system": sys_path+"/system/build.prop", "product": sys_path+"/product/build.prop", "system_ext": sys_path+"/system_ext/build.prop", "vendor": sys_path+"/vendor/build.prop", "odm": sys_path+"/vendor/odm/etc/build.prop"}.items(): 93 | fix_prop(sec, prop) 94 | -------------------------------------------------------------------------------- /scripts/generateAddonsLink.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2024 LSPosed Contributors 19 | # 20 | 21 | from datetime import datetime 22 | import sys 23 | 24 | import requests 25 | import json 26 | import re 27 | from pathlib import Path 28 | 29 | 30 | class BearerAuth(requests.auth.AuthBase): 31 | def __init__(self, token): 32 | self.token = token 33 | 34 | def __call__(self, r): 35 | r.headers["authorization"] = "Bearer " + self.token 36 | return r 37 | 38 | 39 | github_auth = None 40 | if Path.cwd().joinpath('token').exists(): 41 | with open(Path.cwd().joinpath('token'), 'r') as token_file: 42 | github_auth = BearerAuth(token_file.read()) 43 | print("Using token file for authentication", flush=True) 44 | arch = sys.argv[1] 45 | arg2 = sys.argv[2] 46 | download_dir = Path.cwd().parent / "download" if arg2 == "" else Path(arg2) 47 | tempScript = sys.argv[3] 48 | android_api = sys.argv[4] 49 | file_name = sys.argv[5] 50 | print(f"Generating GApps download link: arch={arch}", flush=True) 51 | abi_map = {"x64": "x86_64", "arm64": "arm64"} 52 | android_api_map = {"33": "13.0", "34": "14.0"} 53 | release = android_api_map[android_api] 54 | res = requests.get(f"https://api.github.com/repos/LSPosed/WSA-Addon/releases/latest", auth=github_auth) 55 | json_data = json.loads(res.content) 56 | headers = res.headers 57 | x_ratelimit_remaining = headers["x-ratelimit-remaining"] 58 | if res.status_code == 200: 59 | download_files = {} 60 | assets = json_data["assets"] 61 | for asset in assets: 62 | if re.match(f'gapps.*{release}.*\.rc$', asset["name"]): 63 | download_files[asset["name"]] = asset["browser_download_url"] 64 | elif re.match(f'gapps.*{release}.*{abi_map[arch]}.*\.img$', asset["name"]): 65 | download_files[asset["name"]] = asset["browser_download_url"] 66 | with open(download_dir/tempScript, 'a') as f: 67 | for key, value in download_files.items(): 68 | print(f"download link: {value}\npath: {download_dir / key}\n", flush=True) 69 | f.writelines(value + '\n') 70 | f.writelines(f' dir={download_dir}\n') 71 | f.writelines(f' out={key}\n') 72 | elif res.status_code == 403 and x_ratelimit_remaining == '0': 73 | message = json_data["message"] 74 | print(f"Github API Error: {message}", flush=True) 75 | ratelimit_reset = headers["x-ratelimit-reset"] 76 | ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) 77 | print( 78 | f"The current rate limit window resets in {ratelimit_reset}", flush=True) 79 | exit(1) 80 | -------------------------------------------------------------------------------- /scripts/generateGappsLink.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2024 LSPosed Contributors 19 | # 20 | 21 | from datetime import datetime 22 | import sys 23 | 24 | import requests 25 | import json 26 | import re 27 | from pathlib import Path 28 | 29 | arch = sys.argv[1] 30 | arg4 = sys.argv[2] 31 | download_dir = Path.cwd().parent / "download" if arg4 == "" else Path(arg4) 32 | tempScript = sys.argv[3] 33 | file_name = sys.argv[4] 34 | print(f"Generating MindTheGapps download link: arch={arch}", flush=True) 35 | abi_map = {"x64": "x86_64", "arm64": "arm64"} 36 | res = requests.get(f"https://api.github.com/repos/YT-Advanced/MindTheGappsBuilder/releases/latest") 37 | json_data = json.loads(res.content) 38 | headers = res.headers 39 | x_ratelimit_remaining = headers["x-ratelimit-remaining"] 40 | if res.status_code == 200: 41 | assets = json_data["assets"] 42 | for asset in assets: 43 | if re.match(f'.*13\\.0\\.0.{abi_map[arch]}.*.zip$', asset["name"]): 44 | link = asset["browser_download_url"] 45 | break 46 | elif res.status_code == 403 and x_ratelimit_remaining == '0': 47 | message = json_data["message"] 48 | print(f"Github API Error: {message}", flush=True) 49 | ratelimit_reset = headers["x-ratelimit-reset"] 50 | ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) 51 | print(f"The current rate limit window resets in {ratelimit_reset}", flush=True) 52 | exit(1) 53 | 54 | print(f"download link: {link}", flush=True) 55 | 56 | with open(download_dir/tempScript, 'a') as f: 57 | f.writelines(f'{link}\n') 58 | f.writelines(f' dir={download_dir}\n') 59 | f.writelines(f' out={file_name}\n') 60 | -------------------------------------------------------------------------------- /scripts/generateKernelSULink.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2024 LSPosed Contributors 19 | # 20 | 21 | from datetime import datetime 22 | import sys 23 | import os 24 | from typing import Any, OrderedDict 25 | 26 | import requests 27 | import json 28 | import re 29 | from pathlib import Path 30 | from packaging import version 31 | 32 | 33 | class Prop(OrderedDict): 34 | def __init__(self, props: str = ...) -> None: 35 | super().__init__() 36 | for i, line in enumerate(props.splitlines(False)): 37 | if '=' in line: 38 | k, v = line.split('=', 1) 39 | self[k] = v 40 | else: 41 | self[f".{i}"] = line 42 | 43 | def __setattr__(self, __name: str, __value: Any) -> None: 44 | self[__name] = __value 45 | 46 | def __repr__(self): 47 | return '\n'.join(f'{item}={self[item]}' for item in self) 48 | 49 | 50 | arch = sys.argv[1] 51 | arg2 = sys.argv[2] 52 | download_dir = Path.cwd().parent / "download" if arg2 == "" else Path(arg2) 53 | tempScript = sys.argv[3] 54 | kernelVersion = sys.argv[4] 55 | file_name = sys.argv[5] 56 | abi_map = {"x64": "x86_64", "arm64": "arm64"} 57 | print( 58 | f"Generating KernelSU download link: arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) 59 | res = requests.get( 60 | f"https://api.github.com/repos/tiann/KernelSU/releases/latest") 61 | json_data = json.loads(res.content) 62 | headers = res.headers 63 | x_ratelimit_remaining = headers["x-ratelimit-remaining"] 64 | kernel_ver = 0 65 | if res.status_code == 200: 66 | link = "" 67 | assets = json_data["assets"] 68 | for asset in assets: 69 | asset_name = asset["name"] 70 | if re.match(f'kernel-WSA-{abi_map[arch]}-{kernelVersion}.*\.zip$', asset_name) and asset["content_type"] == "application/zip": 71 | tmp_kernel_ver = re.search( 72 | u'\d{1}.\d{1,}.\d{1,}.\d{1,}', asset_name.split("-")[3]).group() 73 | if (kernel_ver == 0): 74 | kernel_ver = tmp_kernel_ver 75 | elif version.parse(kernel_ver) < version.parse(tmp_kernel_ver): 76 | kernel_ver = tmp_kernel_ver 77 | print(f"Kernel version: {kernel_ver}", flush=True) 78 | for asset in assets: 79 | if re.match(f'kernel-WSA-{abi_map[arch]}-{kernel_ver}.*\.zip$', asset["name"]) and asset["content_type"] == "application/zip": 80 | link = asset["browser_download_url"] 81 | break 82 | if link == "": 83 | print( 84 | f"Error: No KernelSU release found for arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) 85 | exit(1) 86 | release_name = json_data["name"] 87 | with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: 88 | env = Prop(environ_file.read()) 89 | env.KERNELSU_VER = release_name 90 | with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: 91 | environ_file.write(str(env)) 92 | elif res.status_code == 403 and x_ratelimit_remaining == '0': 93 | message = json_data["message"] 94 | print(f"Github API Error: {message}", flush=True) 95 | ratelimit_reset = headers["x-ratelimit-reset"] 96 | ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) 97 | print( 98 | f"The current rate limit window resets in {ratelimit_reset}", flush=True) 99 | exit(1) 100 | 101 | print(f"download link: {link}", flush=True) 102 | 103 | with open(download_dir/tempScript, 'a') as f: 104 | f.writelines(f'{link}\n') 105 | f.writelines(f' dir={download_dir}\n') 106 | f.writelines(f' out={file_name}\n') 107 | # f.writelines(f'{apk}\n') 108 | # f.writelines(f' dir={download_dir}\n') 109 | # f.writelines(f' out=KernelSU.apk\n') 110 | -------------------------------------------------------------------------------- /scripts/generateMagiskLink.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # 3 | # This file is part of MagiskOnWSALocal. 4 | # 5 | # MagiskOnWSALocal is free software: you can redistribute it and/or modify 6 | # it under the terms of the GNU Affero General Public License as 7 | # published by the Free Software Foundation, either version 3 of the 8 | # License, or (at your option) any later version. 9 | # 10 | # MagiskOnWSALocal is distributed in the hope that it will be useful, 11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | # GNU Affero General Public License for more details. 14 | # 15 | # You should have received a copy of the GNU Affero General Public License 16 | # along with MagiskOnWSALocal. If not, see . 17 | # 18 | # Copyright (C) 2023 LSPosed Contributors 19 | # 20 | 21 | from datetime import datetime 22 | import re 23 | import sys 24 | 25 | import json 26 | import requests 27 | from pathlib import Path 28 | 29 | #Android header 30 | headers = { 31 | 'User-Agent': 'Mozilla/5.0 (Linux; Android 13; Pixel 5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.163 Mobile Safari/537.36', 32 | } 33 | 34 | class BearerAuth(requests.auth.AuthBase): 35 | def __init__(self, token): 36 | self.token = token 37 | 38 | def __call__(self, r): 39 | r.headers["authorization"] = "Bearer " + self.token 40 | return r 41 | 42 | 43 | github_auth = None 44 | if Path.cwd().joinpath('token').exists(): 45 | with open(Path.cwd().joinpath('token'), 'r') as token_file: 46 | github_auth = BearerAuth(token_file.read()) 47 | print("Using token file for authentication", flush=True) 48 | 49 | magisk_branch = sys.argv[1] 50 | magisk_ver = sys.argv[2] 51 | download_dir = Path.cwd().parent / \ 52 | "download" if sys.argv[3] == "" else Path(sys.argv[3]) 53 | tempScript = sys.argv[4] 54 | download_files = {} 55 | print( 56 | f"Generating Magisk download link: release type={magisk_ver}", flush=True) 57 | if not magisk_ver: 58 | magisk_ver = "stable" 59 | 60 | if magisk_branch == "vvb2060": 61 | try: 62 | magisk_link = json.loads(requests.get( 63 | f"https://install.appcenter.ms/api/v0.1/apps/vvb2060/magisk/distribution_groups/public/releases/latest?is_install_page=true", headers=headers).content)['download_url'] 64 | download_files[f"magisk-{magisk_ver}.zip"] = magisk_link 65 | except Exception: 66 | print("Failed to fetch from AppCenter API...") 67 | else: 68 | try: 69 | magisk_link = json.loads(requests.get( 70 | f"https://raw.githubusercontent.com/{magisk_branch}/magisk-files/master/{magisk_ver}.json").content)['magisk']['link'] 71 | download_files[f"magisk-{magisk_ver}.zip"] = magisk_link 72 | except Exception: 73 | print("Failed to fetch from GitHub API, fallbacking to jsdelivr...") 74 | magisk_link = json.loads(requests.get( 75 | f"https://fastly.jsdelivr.net/gh/{magisk_branch}/magisk-files@master/{magisk_ver}.json").content)['magisk']['link'] 76 | download_files[f"magisk-{magisk_ver}.zip"] = magisk_link 77 | res = requests.get( 78 | f"https://api.github.com/repos/LSPosed/WSA-Addon/releases/latest", auth=github_auth) 79 | json_data = json.loads(res.content) 80 | headers = res.headers 81 | x_ratelimit_remaining = headers["x-ratelimit-remaining"] 82 | if res.status_code == 200: 83 | assets = json_data["assets"] 84 | for asset in assets: 85 | if re.match(f'cust.img$', asset["name"]): 86 | download_files[asset["name"]] = asset["browser_download_url"] 87 | break 88 | 89 | elif res.status_code == 403 and x_ratelimit_remaining == '0': 90 | message = json_data["message"] 91 | print(f"Github API Error: {message}", flush=True) 92 | ratelimit_reset = headers["x-ratelimit-reset"] 93 | ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) 94 | print( 95 | f"The current rate limit window resets in {ratelimit_reset}", flush=True) 96 | exit(1) 97 | with open(download_dir/tempScript, 'a') as f: 98 | for key, value in download_files.items(): 99 | print( 100 | f"download link: {value}\npath: {download_dir / key}\n", flush=True) 101 | f.writelines(value + '\n') 102 | f.writelines(f' dir={download_dir}\n') 103 | f.writelines(f' out={key}\n') 104 | -------------------------------------------------------------------------------- /scripts/init.lsp.magisk.rc: -------------------------------------------------------------------------------- 1 | on post-fs-data 2 | exec u:r:magisk:s0 0 0 -- /system/bin/sh ${MAGISKTMP}/post-fs-data.sh 3 | -------------------------------------------------------------------------------- /scripts/post-fs-data.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | MAGISKTMP=/sbin 3 | [ -d /sbin ] || MAGISKTMP=/debug_ramdisk 4 | MAGISKBIN=/data/adb/magisk 5 | if [ ! -d /data/adb ]; then 6 | mkdir -m 700 /data/adb 7 | chcon u:object_r:adb_data_file:s0 /data/adb 8 | fi 9 | if [ ! -d $MAGISKBIN ]; then 10 | # shellcheck disable=SC2174 11 | mkdir -p -m 755 $MAGISKBIN 12 | chcon u:object_r:system_file:s0 $MAGISKBIN 13 | fi 14 | ABI=$(getprop ro.product.cpu.abi) 15 | for file in busybox magiskpolicy magiskboot magiskinit; do 16 | [ -x "$MAGISKBIN/$file" ] || { 17 | unzip -d $MAGISKBIN -oj $MAGISKTMP/stub.apk "lib/$ABI/lib$file.so" 18 | mv $MAGISKBIN/lib$file.so $MAGISKBIN/$file 19 | chmod 755 "$MAGISKBIN/$file" 20 | } 21 | done 22 | for file in util_functions.sh boot_patch.sh; do 23 | [ -x "$MAGISKBIN/$file" ] || { 24 | unzip -d $MAGISKBIN -oj $MAGISKTMP/stub.apk "assets/$file" 25 | chmod 755 "$MAGISKBIN/$file" 26 | } 27 | done 28 | for file in "$MAGISKTMP"/*; do 29 | if echo "$file" | grep -Eq "lsp_.+\.img"; then 30 | foldername=$(basename "$file" .img) 31 | mkdir -p "$MAGISKTMP/$foldername" 32 | mount -t auto -o ro,loop "$file" "$MAGISKTMP/$foldername" 33 | "$MAGISKTMP/$foldername/post-fs-data.sh" & 34 | fi 35 | done 36 | wait 37 | for file in "$MAGISKTMP"/*; do 38 | if echo "$file" | grep -Eq "lsp_.+\.img"; then 39 | foldername=$(basename "$file" .img) 40 | umount "$MAGISKTMP/$foldername" 41 | rm -rf "${MAGISKTMP:?}/${foldername:?}" 42 | rm -f "$file" 43 | fi 44 | done 45 | -------------------------------------------------------------------------------- /scripts/requirements.txt: -------------------------------------------------------------------------------- 1 | requests 2 | packaging 3 | -------------------------------------------------------------------------------- /xml/FE3FileUrl.xml: -------------------------------------------------------------------------------- 1 | 3 | 4 | http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetExtendedUpdateInfo2 5 | urn:uuid:2cc99c2e-3b3e-4fb1-9e31-0cd30e6f43a0 6 | https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx/secured 7 | 9 | 10 | 2017-08-01T00:29:01.868Z 11 | 2017-08-01T00:34:01.868Z 12 | 13 | 16 | 17 | {} 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | {} 27 | {} 28 | 29 | 30 | 31 | FileUrl 32 | FileDecryption 33 | 34 | BranchReadinessLevel=CB;CurrentBranch=rs_prerelease;OEMModel=Virtual Machine;FlightRing={};AttrDataVer=21;SystemManufacturer=Microsoft Corporation;InstallLanguage=en-US;OSUILocale=en-US;InstallationType=Client;FlightingBranchName=external;FirmwareVersion=Hyper-V UEFI Release v2.5;SystemProductName=Virtual Machine;OSSkuId=48;FlightContent=Branch;App=WU;OEMName_Uncleaned=Microsoft Corporation;AppVer=10.0.22621.900;OSArchitecture=AMD64;SystemSKU=None;UpdateManagementGroup=2;IsFlightingEnabled=1;IsDeviceRetailDemo=0;TelemetryLevel=3;OSVersion=10.0.22621.900;DeviceFamily=Windows.Desktop; 35 | 36 | 37 | 38 | -------------------------------------------------------------------------------- /xml/GetCookie.xml: -------------------------------------------------------------------------------- 1 | 4 |
5 | http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie 8 | urn:uuid:b9b43757-2247-4d7b-ae8f-a71ba8a22386 9 | https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx 12 | 15 | 16 | 2017-12-02T00:16:15.210Z 17 | 2017-12-29T06:25:43.943Z 18 | 19 | 22 | 23 | {} 24 | 25 | 26 | 27 |
28 | 29 | 30 | 31 | 32 | 2015-10-21T17:01:07.1472913Z 33 | 2017-12-02T00:16:15.217Z 34 | 1.40 35 | 36 | 37 |
-------------------------------------------------------------------------------- /xml/priconfig.xml: -------------------------------------------------------------------------------- 1 | 2 | 19 | 20 | 21 | 22 | 23 | 24 | 26 | 27 | 28 | 29 | 30 | --------------------------------------------------------------------------------