403Webshell
Server IP : 103.119.228.120  /  Your IP : 3.144.92.165
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /usr/local/ssl/share/doc/rpm-4.11.3/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/local/ssl/share/doc/rpm-4.11.3/signatures
/*! \page signatures Signature header

The 2.1 release of RPM had a few improvements in the area of
digital package signatures.  The usage of PGP has been cleaned
up and extended, the signature section in the RPM file format
has been made easily extensible with new signature types, and
packages can have multiple signatures.

\section signatures_pgp PGP

Legacy usage of PGP in rpm-2.0 was cumbersome, and only supported
1024 bit keys.  Both of these problems have been corrected in rpm-2.1.

Whereas previously you needed many rpmrc entries to clue in
RPM about keyring locations and such, RPM now behaves as PGP
users would expect.  The PGPPATH environment variable can be
used to specify keyring locations.  You can also use a
"%_pgpbin" line in your macros file to specify a different value
for RPM to use for PGPPATH.  If neither of these are used PGP
uses its default ($HOME/.pgp).

If you just want to verify packages, you need to supply values
for the macros
\verbatim
	%_pgpbin	the path to the pgp executable
	%_signature	the type of signature to use
\endverbatim

In order to be able to sign packages, you may also have to
supply values for
\verbatim
	%_pgp_name	the pgp signature to use for signing
	%_pgp_path	the path to the key ring
\endverbatim

\section signatures_signing Signing Packages

Signature creation is the same as previous releases: just add
a --sign to your build command line.  You can sign a package
after the package is built with:

\verbatim
	rpm --resign <package>
\endverbatim

Using --resign removes any previous signature in the package.
To *add* a signature to a package, leaving all existing
signatures use:

\verbatim
	rpm --addsign <package>
\endverbatim

RPM always creates MD5 and SIZE signatures when it build
packages, which means that packages built without --sign can
be "verified" to some extent.  The MD5 signature should catch
problems like corrupt packages, faulty downloads, etc.

\section signatures_verifying Verifying Package Signatures

Package signature verification is the same as previous releases:

\verbatim
	rpm -K <package>
\endverbatim

RPM will verify every signature in the package, which may include
more than one PGP signature.  The output indicates what types of
signatures are being checked.  If any checks fail you'll see a
"NOT OK" message, and you should be worried.

If you have a package with PGP signatures, but don't have PGP
installed, but still want to verify it as much as possible, you
can do:

\verbatim
	rpm -K --nopgp <package>
\endverbatim

That will cause RPM to skip any PGP signatures, but still check
any others (currently only MD5 and SIZE).

*/

Youez - 2016 - github.com/yon3zu
LinuXploit