Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.188.119.67
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
rpm-4.11.3 /
[ HOME SHELL ]
Name
Size
Permission
Action
COPYING
43.16
KB
-rw-r--r--
CREDITS
639
B
-rw-r--r--
ChangeLog.bz2
708.76
KB
-rw-r--r--
GROUPS
656
B
-rw-r--r--
builddependencies
6.34
KB
-rw-r--r--
buildroot
3.67
KB
-rw-r--r--
conditionalbuilds
3.96
KB
-rw-r--r--
dependencies
13.34
KB
-rw-r--r--
format
10.18
KB
-rw-r--r--
hregions
2.9
KB
-rw-r--r--
macros
8.7
KB
-rw-r--r--
multiplebuilds
1.82
KB
-rw-r--r--
queryformat
6.12
KB
-rw-r--r--
relocatable
1.98
KB
-rw-r--r--
signatures
2.57
KB
-rw-r--r--
spec
7.71
KB
-rw-r--r--
triggers
5.54
KB
-rw-r--r--
tsort
5.33
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : signatures
/*! \page signatures Signature header The 2.1 release of RPM had a few improvements in the area of digital package signatures. The usage of PGP has been cleaned up and extended, the signature section in the RPM file format has been made easily extensible with new signature types, and packages can have multiple signatures. \section signatures_pgp PGP Legacy usage of PGP in rpm-2.0 was cumbersome, and only supported 1024 bit keys. Both of these problems have been corrected in rpm-2.1. Whereas previously you needed many rpmrc entries to clue in RPM about keyring locations and such, RPM now behaves as PGP users would expect. The PGPPATH environment variable can be used to specify keyring locations. You can also use a "%_pgpbin" line in your macros file to specify a different value for RPM to use for PGPPATH. If neither of these are used PGP uses its default ($HOME/.pgp). If you just want to verify packages, you need to supply values for the macros \verbatim %_pgpbin the path to the pgp executable %_signature the type of signature to use \endverbatim In order to be able to sign packages, you may also have to supply values for \verbatim %_pgp_name the pgp signature to use for signing %_pgp_path the path to the key ring \endverbatim \section signatures_signing Signing Packages Signature creation is the same as previous releases: just add a --sign to your build command line. You can sign a package after the package is built with: \verbatim rpm --resign <package> \endverbatim Using --resign removes any previous signature in the package. To *add* a signature to a package, leaving all existing signatures use: \verbatim rpm --addsign <package> \endverbatim RPM always creates MD5 and SIZE signatures when it build packages, which means that packages built without --sign can be "verified" to some extent. The MD5 signature should catch problems like corrupt packages, faulty downloads, etc. \section signatures_verifying Verifying Package Signatures Package signature verification is the same as previous releases: \verbatim rpm -K <package> \endverbatim RPM will verify every signature in the package, which may include more than one PGP signature. The output indicates what types of signatures are being checked. If any checks fail you'll see a "NOT OK" message, and you should be worried. If you have a package with PGP signatures, but don't have PGP installed, but still want to verify it as much as possible, you can do: \verbatim rpm -K --nopgp <package> \endverbatim That will cause RPM to skip any PGP signatures, but still check any others (currently only MD5 and SIZE). */
Close