Initial commit.
This commit is contained in:
4
pki/ca-trust/README
Normal file
4
pki/ca-trust/README
Normal file
@@ -0,0 +1,4 @@
|
||||
This directory /etc/pki/ca-trust is used by a system of consolidated
|
||||
CA certificates.
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
24
pki/ca-trust/ca-legacy.conf
Normal file
24
pki/ca-trust/ca-legacy.conf
Normal file
@@ -0,0 +1,24 @@
|
||||
# The upstream Mozilla.org project tests all changes to the root CA
|
||||
# list with the NSS (Network Security Services) library.
|
||||
#
|
||||
# Occassionally, changes might cause compatibility issues with
|
||||
# other cryptographic libraries, such as openssl or gnutls.
|
||||
#
|
||||
# The package maintainers of the CA certificates package might decide
|
||||
# to temporarily keep certain (legacy) root CA certificates trusted,
|
||||
# until incompatibility issues can be resolved.
|
||||
#
|
||||
# Using this configuration file it is possible to opt-out of the
|
||||
# compatibility choices made by the package maintainer.
|
||||
#
|
||||
# legacy=default :
|
||||
# This configuration uses the choices made by the package maintainer.
|
||||
# It may keep root CA certificate as trusted, which the upstream
|
||||
# Mozilla.org project has already marked as no longer trusted.
|
||||
# The set of CA certificates that are being kept enabled may change
|
||||
# between package versions.
|
||||
#
|
||||
# legacy=disable :
|
||||
# Follow all removal decisions made by Mozilla.org
|
||||
#
|
||||
legacy=default
|
||||
12
pki/ca-trust/extracted/README
Normal file
12
pki/ca-trust/extracted/README
Normal file
@@ -0,0 +1,12 @@
|
||||
This directory /etc/pki/ca-trust/extracted/ contains
|
||||
CA certificate bundle files which are automatically created.
|
||||
|
||||
If your application isn't able to load the PKCS#11 module p11-kit-trust.so,
|
||||
then you can use these files in your application to load a list of global
|
||||
root CA certificates.
|
||||
|
||||
Please never manually edit the files stored in this directory,
|
||||
because your changes will be lost and the files automatically overwritten,
|
||||
each time the update-ca-trust command gets executed.
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
13
pki/ca-trust/extracted/edk2/README
Normal file
13
pki/ca-trust/extracted/edk2/README
Normal file
@@ -0,0 +1,13 @@
|
||||
This directory /etc/pki/ca-trust/extracted/edk2/ contains a
|
||||
CA certificate bundle file which is automatically created
|
||||
based on the information found in the
|
||||
/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/
|
||||
directories.
|
||||
|
||||
The file is in the EDK2 (EFI Development Kit II) file format.
|
||||
|
||||
Please never manually edit the files stored in this directory,
|
||||
because your changes will be lost and the files automatically overwritten,
|
||||
each time the update-ca-trust command gets executed.
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
BIN
pki/ca-trust/extracted/edk2/cacerts.bin
Normal file
BIN
pki/ca-trust/extracted/edk2/cacerts.bin
Normal file
Binary file not shown.
17
pki/ca-trust/extracted/java/README
Normal file
17
pki/ca-trust/extracted/java/README
Normal file
@@ -0,0 +1,17 @@
|
||||
This directory /etc/pki/ca-trust/extracted/java/ contains
|
||||
CA certificate bundle files which are automatically created
|
||||
based on the information found in the
|
||||
/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/
|
||||
directories.
|
||||
|
||||
All files are in the java keystore file format.
|
||||
|
||||
If your application isn't able to load the PKCS#11 module p11-kit-trust.so,
|
||||
then you can use these files in your application to load a list of global
|
||||
root CA certificates.
|
||||
|
||||
Please never manually edit the files stored in this directory,
|
||||
because your changes will be lost and the files automatically overwritten,
|
||||
each time the update-ca-trust command gets executed.
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
BIN
pki/ca-trust/extracted/java/cacerts
Normal file
BIN
pki/ca-trust/extracted/java/cacerts
Normal file
Binary file not shown.
18
pki/ca-trust/extracted/openssl/README
Normal file
18
pki/ca-trust/extracted/openssl/README
Normal file
@@ -0,0 +1,18 @@
|
||||
This directory /etc/pki/ca-trust/extracted/openssl/ contains
|
||||
CA certificate bundle files which are automatically created
|
||||
based on the information found in the
|
||||
/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/
|
||||
directories.
|
||||
|
||||
All files are in the BEGIN/END TRUSTED CERTIFICATE file format,
|
||||
as described in the x509(1) manual page.
|
||||
|
||||
If your application isn't able to load the PKCS#11 module p11-kit-trust.so,
|
||||
then you can use these files in your application to load a list of global
|
||||
root CA certificates.
|
||||
|
||||
Please never manually edit the files stored in this directory,
|
||||
because your changes will be lost and the files automatically overwritten,
|
||||
each time the update-ca-trust command gets executed.
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
4274
pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
Normal file
4274
pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
Normal file
File diff suppressed because it is too large
Load Diff
21
pki/ca-trust/extracted/pem/README
Normal file
21
pki/ca-trust/extracted/pem/README
Normal file
@@ -0,0 +1,21 @@
|
||||
This directory /etc/pki/ca-trust/extracted/pem/ contains
|
||||
CA certificate bundle files which are automatically created
|
||||
based on the information found in the
|
||||
/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/
|
||||
directories.
|
||||
|
||||
All files are in the BEGIN/END CERTIFICATE file format,
|
||||
as described in the x509(1) manual page.
|
||||
|
||||
Distrust information cannot be represented in this file format,
|
||||
and distrusted certificates are missing from these files.
|
||||
|
||||
If your application isn't able to load the PKCS#11 module p11-kit-trust.so,
|
||||
then you can use these files in your application to load a list of global
|
||||
root CA certificates.
|
||||
|
||||
Please never manually edit the files stored in this directory,
|
||||
because your changes will be lost and the files automatically overwritten,
|
||||
each time the update-ca-trust command gets executed.
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
2840
pki/ca-trust/extracted/pem/email-ca-bundle.pem
Normal file
2840
pki/ca-trust/extracted/pem/email-ca-bundle.pem
Normal file
File diff suppressed because it is too large
Load Diff
0
pki/ca-trust/extracted/pem/objsign-ca-bundle.pem
Normal file
0
pki/ca-trust/extracted/pem/objsign-ca-bundle.pem
Normal file
3750
pki/ca-trust/extracted/pem/tls-ca-bundle.pem
Normal file
3750
pki/ca-trust/extracted/pem/tls-ca-bundle.pem
Normal file
File diff suppressed because it is too large
Load Diff
20
pki/ca-trust/source/README
Normal file
20
pki/ca-trust/source/README
Normal file
@@ -0,0 +1,20 @@
|
||||
This directory /etc/pki/ca-trust/source/ contains CA certificates and
|
||||
trust settings in the PEM file format. The trust settings found here will be
|
||||
interpreted with a high priority - higher than the ones found in
|
||||
/usr/share/pki/ca-trust-source/.
|
||||
|
||||
=============================================================================
|
||||
QUICK HELP: To add a certificate in the simple PEM or DER file formats to the
|
||||
list of CAs trusted on the system:
|
||||
|
||||
Copy it to the
|
||||
/etc/pki/ca-trust/source/anchors/
|
||||
subdirectory, and run the
|
||||
update-ca-trust
|
||||
command.
|
||||
|
||||
If your certificate is in the extended BEGIN TRUSTED file format,
|
||||
then place it into the main source/ directory instead.
|
||||
=============================================================================
|
||||
|
||||
Please refer to the update-ca-trust(8) manual page for additional information.
|
||||
1
pki/ca-trust/source/ca-bundle.legacy.crt
Symbolic link
1
pki/ca-trust/source/ca-bundle.legacy.crt
Symbolic link
@@ -0,0 +1 @@
|
||||
/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt
|
||||
26
pki/dovecot/certs/dovecot.pem
Normal file
26
pki/dovecot/certs/dovecot.pem
Normal file
@@ -0,0 +1,26 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEUzCCArugAwIBAgIUF9w3LeK+aRaFKOZz2GapvIkWnCowDQYJKoZIhvcNAQEL
|
||||
BQAwWDEUMBIGA1UECwwLSU1BUCBzZXJ2ZXIxGTAXBgNVBAMMEGltYXAuZXhhbXBs
|
||||
ZS5jb20xJTAjBgkqhkiG9w0BCQEWFnBvc3RtYXN0ZXJAZXhhbXBsZS5jb20wHhcN
|
||||
MjAwOTIyMDgyNTEwWhcNMjEwOTIyMDgyNTEwWjBYMRQwEgYDVQQLDAtJTUFQIHNl
|
||||
cnZlcjEZMBcGA1UEAwwQaW1hcC5leGFtcGxlLmNvbTElMCMGCSqGSIb3DQEJARYW
|
||||
cG9zdG1hc3RlckBleGFtcGxlLmNvbTCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCC
|
||||
AYoCggGBALQPY1queR9A7rfcIQzzilEsUZsRLX3oWXVTE6+VUoEgCoyPZqQJ6j9d
|
||||
gQbthPCz3/gOLJXMN0xiOwjHgwCFgAyq9kWTw+CVcFbtqcVov7YeDiwBoSNVQcPp
|
||||
zyQLBuTLYCjwPnEGokRfxacl1YTLLKjvcj6kOJYEMmu5QSlsCH7c2M8KtUpT/5pV
|
||||
vOA2AAihp8kkn0462ARt5EGw1eyEbIVZmK4CIMpYCxmyU54F4L5KTLgSmPsYsyYG
|
||||
1zWO2K+MGwvpcQKz21HNLEuWA3br7LXKkaicGPsyukUCb5JEgTPmSCXflOOY2ZcH
|
||||
zh8n4xGG5IWoet5DHwqJj+iJBUES8THq/yov+HE2DdZRGeTMAg8+TyZE0pLJtyG0
|
||||
oUVJ6XtEce1SKC/RgyZnGWY7FvrXhvadxB/uIpkCkYF6D4XQzOAX7s6LlRZJ6npd
|
||||
EOhH0dGDKcoTfY6Vv1PlzXpZYhXpHTdT+71OCF6728BA3JLmecooe8YskhGfMbrf
|
||||
RxNHJg8/3wIDAQABoxUwEzARBglghkgBhvhCAQEEBAMCBkAwDQYJKoZIhvcNAQEL
|
||||
BQADggGBAB6JzLhvkuPXzekfjsxwF8I/QRv5FjapBnON03gOCl0eTOS5+KScC64G
|
||||
Th6zhbt07nUdsiCkc4s4sjnzO0KpS9b0BexR78TeA4vzGPjhf9B7ZBOhkIt3f1PS
|
||||
VKktRdvaRUDPLXLYskG3ZtLyQEt5lcwmHMrjY1qc7MW7/DCjP2hltsOC4+kKFWjF
|
||||
IQutJIY0seBjJ6Umbn2K8hXzxGikP6b52yvABJkIpEkQcUR9ARjAMKCuLAlu08p5
|
||||
0oM422aEIIczJ6u8W0e/Ewdg9c3T06/OMn++W1eFeWToEfMlrBCUm9a7lN/u3gBn
|
||||
+JFWBEttvVa0AqamrJhHynibAGhKGzeVor2nVxZokycXnwSDuNGHT4iTbc+I0Syl
|
||||
8SVvVNXK2t6z/fF/T9rTsOMxsvGtRXBtDj4Ow3DXvd/6COFI1HLccZxeuB8Nei30
|
||||
9NMqj3Ea7tza+mhcVnDY25Vphdbe7E6Js0ECr/E+Ylig7o3w0vmSOHiOVs5cjI9w
|
||||
hkJF4/qAPg==
|
||||
-----END CERTIFICATE-----
|
||||
31
pki/dovecot/dovecot-openssl.cnf
Normal file
31
pki/dovecot/dovecot-openssl.cnf
Normal file
@@ -0,0 +1,31 @@
|
||||
[ req ]
|
||||
default_bits = 3072
|
||||
encrypt_key = yes
|
||||
distinguished_name = req_dn
|
||||
x509_extensions = cert_type
|
||||
prompt = no
|
||||
|
||||
[ req_dn ]
|
||||
# country (2 letter code)
|
||||
#C=FI
|
||||
|
||||
# State or Province Name (full name)
|
||||
#ST=
|
||||
|
||||
# Locality Name (eg. city)
|
||||
#L=Helsinki
|
||||
|
||||
# Organization (eg. company)
|
||||
#O=Dovecot
|
||||
|
||||
# Organizational Unit Name (eg. section)
|
||||
OU=IMAP server
|
||||
|
||||
# Common Name (*.example.com is also possible)
|
||||
CN=imap.example.com
|
||||
|
||||
# E-mail contact
|
||||
emailAddress=postmaster@example.com
|
||||
|
||||
[ cert_type ]
|
||||
nsCertType = server
|
||||
40
pki/dovecot/private/dovecot.pem
Normal file
40
pki/dovecot/private/dovecot.pem
Normal file
@@ -0,0 +1,40 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIG/wIBADANBgkqhkiG9w0BAQEFAASCBukwggblAgEAAoIBgQC0D2NarnkfQO63
|
||||
3CEM84pRLFGbES196Fl1UxOvlVKBIAqMj2akCeo/XYEG7YTws9/4DiyVzDdMYjsI
|
||||
x4MAhYAMqvZFk8PglXBW7anFaL+2Hg4sAaEjVUHD6c8kCwbky2Ao8D5xBqJEX8Wn
|
||||
JdWEyyyo73I+pDiWBDJruUEpbAh+3NjPCrVKU/+aVbzgNgAIoafJJJ9OOtgEbeRB
|
||||
sNXshGyFWZiuAiDKWAsZslOeBeC+Sky4Epj7GLMmBtc1jtivjBsL6XECs9tRzSxL
|
||||
lgN26+y1ypGonBj7MrpFAm+SRIEz5kgl35TjmNmXB84fJ+MRhuSFqHreQx8KiY/o
|
||||
iQVBEvEx6v8qL/hxNg3WURnkzAIPPk8mRNKSybchtKFFSel7RHHtUigv0YMmZxlm
|
||||
Oxb614b2ncQf7iKZApGBeg+F0MzgF+7Oi5UWSep6XRDoR9HRgynKE32Olb9T5c16
|
||||
WWIV6R03U/u9Tgheu9vAQNyS5nnKKHvGLJIRnzG630cTRyYPP98CAwEAAQKCAYB4
|
||||
KPi9sEdGMxfbfLxVn0TDzNacrAb2yhLA9/LgLr8DSrWffacaez9mj+imDeW0l+Uz
|
||||
7YmVYdXZVIhe4H2s4GpGieSVI/oIqtFwQWQVSET/rOj6NxAouyGLM0G3pOAx2QLP
|
||||
7xtMZAfvpxYI6HeoCcpA5qIP6ZmVizF2sAcrNFwrBQhuio/XDV06ylKkMYUuPWry
|
||||
EU16cExuEEPODsuD7g9ZoiQAo4zsW3r06AtjHjsP4hd2k3qhvqb3DoOZyz0RUWYv
|
||||
xu+SHMPHEBhTg9ctRVcAl1j4SERsQh4OJ4mJ9gta6fYZbAwQT6TThbFeiWFvObdn
|
||||
1lfYYHEzzxbQY6N4I3rpoBW9p1AQY+Dozw7qR/mug5QuEUOTprEc4yJa34ask/Ae
|
||||
pZ7dnHioDDllGfTyalPVZKg7IQSvDJJ9AXooKlkGxEN3EMEWbgNHd2voJCNVXpc7
|
||||
FUHRWTO8f4CGJ40KgbFa8EYVXrChnayswqk7buHqHzoNfJw+ID53U8QdE9WM01kC
|
||||
gcEA6Fbjf/OdaPfAt3fpzqW72/InvjlFQGc6z4yelVztlCHdHniknyqZbNnIthMG
|
||||
Rw3KEoQI8UKIPQzqa4MhNo6HpapI7q71Poh4RBuqQqJO96mdoClswDV3BT8OdJ9Q
|
||||
y34QdYyScLxRyQctRrrMwMun7OQ8FM2I30MEFCByV7VzQCHHnRJq3M2rTAIm8OtU
|
||||
tfhZaoAYuuHxjRQzv7DUpdd/fnjIq5mVBq/aG0xt8DRKMngZksifC8yYrtG24cPX
|
||||
AH61AoHBAMZlkqxWb48x5XkJ4l739UNtdls1qedfG6T7FVRneO1Dz+qesg4N0IJv
|
||||
URySnKs4fsk/dGLIj/zhZeHUBrTYvhCj02/PWEYGJR3js0eU5M1vEEIHaov6r9sQ
|
||||
MMmemvsF6mrR1stWgP9pApksp+EpDJXP58uTPDpvPXu/7Nvx75hVMyffVHS9ND56
|
||||
LMko7EpmQXgvxNrZauD1c+IBOBylr3dMyQfI3gnfWs6kGYOqkwxY3iwd2COzmzWi
|
||||
ad20KG1MwwKBwQDmztJoHMomKeFwIZbKbAhoonJq3Zf3N9XLs2Ui+lMl0lJI4A6h
|
||||
8/7AjMWAYvvcgE1bAYGksrSG+ZqzPWw0N3l30Ods/a+x9H6NInKMiZMrI3vsTNq1
|
||||
Qye+tXqVzmLEFLMjI4eiqOISc6e92PppGKf0hHNPMzOin3+gwu70RNR+RFB5sH8q
|
||||
ZMKj2ot20EGyGEozq5dlp+l/fi8+YduN+Lu2FyU6m3LZVr60WcPpWPjQlFDLabPe
|
||||
U9zl5n3oX9XprvUCgcEAvCP0rNOnJY82wsq5zj+sac3zUFmajtxlddXZi1o4liAZ
|
||||
mq/1wFgfZKI1tDfgtIp1yVkQgOEbkr8ZA8gyt+tWiqchSkXBu132ctrM19P+CkcJ
|
||||
juRDiQ0pGT/IVFrBM82PWM83t0qIOC2YFjP/3Ak2cxdfBHHSysNU9fayon1TLg2V
|
||||
3njuOWp3kcwAjp7tPTytV1FNiBBoR37c7vUjBh+lPygk9+nnjksubQm3XGI04p+f
|
||||
yQxgPLMFPB6R8Hn5YHVLAoHBANkLht5HNxYU1ytxIsBLEkfv9S7EYalLoENa+Mhd
|
||||
5BMFNr7Wac5wpbPLWm7RUaG2i0eK9Q1nge6rOIBX8DdLrtOazGr90E6FaSNIMNGj
|
||||
qdjqTiyUv9Xv8tkXSN/h3bsZLz7qCqFGlUqNIyiSs5RM4fce2VAVpuN1pxRHVAFq
|
||||
YvPGkHTk0cXVUAyqtE1vm8mosO4lT5t02bpl2HaxnncPbqgLofnCgYl6jxNZM4aY
|
||||
K863UY0OqpvV/wCvyrfqLHjJAw==
|
||||
-----END PRIVATE KEY-----
|
||||
BIN
pki/elrepo/SECURE-BOOT-KEY-elrepo.org.der
Normal file
BIN
pki/elrepo/SECURE-BOOT-KEY-elrepo.org.der
Normal file
Binary file not shown.
1
pki/java/cacerts
Symbolic link
1
pki/java/cacerts
Symbolic link
@@ -0,0 +1 @@
|
||||
/etc/pki/ca-trust/extracted/java/cacerts
|
||||
7
pki/mock/README.txt
Normal file
7
pki/mock/README.txt
Normal file
@@ -0,0 +1,7 @@
|
||||
Any file named
|
||||
RPM-GPG-KEY-*
|
||||
is copied into chroot to directory /etc/pki/mock/.
|
||||
|
||||
You can use it for your personal GPG keys.
|
||||
|
||||
All distribution GPG keys are in package distribution-gpg-keys.
|
||||
BIN
pki/nssdb/cert8.db
Normal file
BIN
pki/nssdb/cert8.db
Normal file
Binary file not shown.
BIN
pki/nssdb/cert9.db
Normal file
BIN
pki/nssdb/cert9.db
Normal file
Binary file not shown.
BIN
pki/nssdb/key3.db
Normal file
BIN
pki/nssdb/key3.db
Normal file
Binary file not shown.
BIN
pki/nssdb/key4.db
Normal file
BIN
pki/nssdb/key4.db
Normal file
Binary file not shown.
5
pki/nssdb/pkcs11.txt
Normal file
5
pki/nssdb/pkcs11.txt
Normal file
@@ -0,0 +1,5 @@
|
||||
library=libnsssysinit.so
|
||||
name=NSS Internal PKCS #11 Module
|
||||
parameters=configdir='sql:/etc/pki/nssdb' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription=''
|
||||
NSS=Flags=internal,moduleDBOnly,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30})
|
||||
|
||||
BIN
pki/nssdb/secmod.db
Normal file
BIN
pki/nssdb/secmod.db
Normal file
Binary file not shown.
BIN
pki/pesign-rh-test/cert8.db
Normal file
BIN
pki/pesign-rh-test/cert8.db
Normal file
Binary file not shown.
BIN
pki/pesign-rh-test/key3.db
Normal file
BIN
pki/pesign-rh-test/key3.db
Normal file
Binary file not shown.
BIN
pki/pesign-rh-test/secmod.db
Normal file
BIN
pki/pesign-rh-test/secmod.db
Normal file
Binary file not shown.
BIN
pki/pesign/cert8.db
Normal file
BIN
pki/pesign/cert8.db
Normal file
Binary file not shown.
BIN
pki/pesign/key3.db
Normal file
BIN
pki/pesign/key3.db
Normal file
Binary file not shown.
BIN
pki/pesign/secmod.db
Normal file
BIN
pki/pesign/secmod.db
Normal file
Binary file not shown.
28
pki/rpm-gpg/RPM-GPG-KEY-EPEL-8
Normal file
28
pki/rpm-gpg/RPM-GPG-KEY-EPEL-8
Normal file
@@ -0,0 +1,28 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQINBFz3zvsBEADJOIIWllGudxnpvJnkxQz2CtoWI7godVnoclrdl83kVjqSQp+2
|
||||
dgxuG5mUiADUfYHaRQzxKw8efuQnwxzU9kZ70ngCxtmbQWGmUmfSThiapOz00018
|
||||
+eo5MFabd2vdiGo1y+51m2sRDpN8qdCaqXko65cyMuLXrojJHIuvRA/x7iqOrRfy
|
||||
a8x3OxC4PEgl5pgDnP8pVK0lLYncDEQCN76D9ubhZQWhISF/zJI+e806V71hzfyL
|
||||
/Mt3mQm/li+lRKU25Usk9dWaf4NH/wZHMIPAkVJ4uD4H/uS49wqWnyiTYGT7hUbi
|
||||
ecF7crhLCmlRzvJR8mkRP6/4T/F3tNDPWZeDNEDVFUkTFHNU6/h2+O398MNY/fOh
|
||||
yKaNK3nnE0g6QJ1dOH31lXHARlpFOtWt3VmZU0JnWLeYdvap4Eff9qTWZJhI7Cq0
|
||||
Wm8DgLUpXgNlkmquvE7P2W5EAr2E5AqKQoDbfw/GiWdRvHWKeNGMRLnGI3QuoX3U
|
||||
pAlXD7v13VdZxNydvpeypbf/AfRyrHRKhkUj3cU1pYkM3DNZE77C5JUe6/0nxbt4
|
||||
ETUZBTgLgYJGP8c7PbkVnO6I/KgL1jw+7MW6Az8Ox+RXZLyGMVmbW/TMc8haJfKL
|
||||
MoUo3TVk8nPiUhoOC0/kI7j9ilFrBxBU5dUtF4ITAWc8xnG6jJs/IsvRpQARAQAB
|
||||
tChGZWRvcmEgRVBFTCAoOCkgPGVwZWxAZmVkb3JhcHJvamVjdC5vcmc+iQI4BBMB
|
||||
AgAiBQJc9877AhsPBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRAh6kWrL4bW
|
||||
oWagD/4xnLWws34GByVDQkjprk0fX7Iyhpm/U7BsIHKspHLL+Y46vAAGY/9vMvdE
|
||||
0fcr9Ek2Zp7zE1RWmSCzzzUgTG6BFoTG1H4Fho/7Z8BXK/jybowXSZfqXnTOfhSF
|
||||
alwDdwlSJvfYNV9MbyvbxN8qZRU1z7PEWZrIzFDDToFRk0R71zHpnPTNIJ5/YXTw
|
||||
NqU9OxII8hMQj4ufF11040AJQZ7br3rzerlyBOB+Jd1zSPVrAPpeMyJppWFHSDAI
|
||||
WK6x+am13VIInXtqB/Cz4GBHLFK5d2/IYspVw47Solj8jiFEtnAq6+1Aq5WH3iB4
|
||||
bE2e6z00DSF93frwOyWN7WmPIoc2QsNRJhgfJC+isGQAwwq8xAbHEBeuyMG8GZjz
|
||||
xohg0H4bOSEujVLTjH1xbAG4DnhWO/1VXLX+LXELycO8ZQTcjj/4AQKuo4wvMPrv
|
||||
9A169oETG+VwQlNd74VBPGCvhnzwGXNbTK/KH1+WRH0YSb+41flB3NKhMSU6dGI0
|
||||
SGtIxDSHhVVNmx2/6XiT9U/znrZsG5Kw8nIbbFz+9MGUUWgJMsd1Zl9R8gz7V9fp
|
||||
n7L7y5LhJ8HOCMsY/Z7/7HUs+t/A1MI4g7Q5g5UuSZdgi0zxukiWuCkLeAiAP4y7
|
||||
zKK4OjJ644NDcWCHa36znwVmkz3ixL8Q0auR15Oqq2BjR/fyog==
|
||||
=84m8
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
30
pki/rpm-gpg/RPM-GPG-KEY-Jetico
Normal file
30
pki/rpm-gpg/RPM-GPG-KEY-Jetico
Normal file
@@ -0,0 +1,30 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQENBFO/0xIBCAC4kR2CgJlM81Kk5Qhg1p2ddY1l6PVwW8CKkLT5c7e/mSsjncAp
|
||||
bZAV1ZXH0qYU9UlYVzP/iodvPeAImYYP5zsABjdqn0vqilkEjA+/IGvly+rBetJE
|
||||
GndIPiXhsYkR+h4PoetjQ5RHbkJl6dLTJCXeONwihWtQ10jLGc+N3a+DzIBNsvY7
|
||||
bK54SXnUxLqUro2KYkuBLmpbYCNvKHvXqRPfmEwUP00iMcNLM5ZCxVRRjCCTVkUu
|
||||
c6eL5zSOA6UNFRmJIwRG85V6fpo9pIg59wxBiqcYS3igsnHI2+m5l8C6XKifxIgU
|
||||
l8ojgfICO4imvb2T1hJr7TVOPOyAgCdWxyRpABEBAAG0SUpldGljbyBQYWNrYWdl
|
||||
ciAoS2V5IGZvciBzaWduaW5nIHNvZnR3YXJlIHBhY2thZ2VzKSA8cGFja2FnZXNA
|
||||
amV0aWNvLmNvbT6JATgEEwECACIFAlO/0xICGwMGCwkIBwMCBhUIAgkKCwQWAgMB
|
||||
Ah4BAheAAAoJEJcg9oZII+hAMu8H+wbbkpBO/xhEOd2XYzSZFeR6HQmHhLBVdZGh
|
||||
nUKUy/uoxODr2sYQhlbes2+1MueCopvpglILltnDRkSLvh5x4JqNQyB5k0ijn65v
|
||||
68s0K2kxXoNuPDP/MaP6g7mMQe1EOJ/eO6M3q5GSrA3dTXs53IKnXz0BtkWQy2HN
|
||||
DhOmYwCKBFp2VgLv/8dnQbEZ4Xz7uSbvsNNwJKllemcXP3mTSZt1fFlVZIKx9nvi
|
||||
wy/2taMjAj3RMkxq8iyBJ5ydjnTpc5SnTLOjMg7gDDV4Z8IJgRtmrxA6oOnU3+xy
|
||||
rWnO8xK0wMoOy3dVvtkfxXxZF0IaVVVdMVMRawyfcz3hd4FgnGm5AQ0EU7/TEgEI
|
||||
ALZl4SiFbbt4Oq/0FCgzvaRgOGTQTdEHjMRJv+pcKsOmehL642H5LIjwAz9Zfm81
|
||||
Y2/Nukitcgb/IxcG04tRvAHIkHTgwgu9gPLMMk1apGGJzZbZgKkz/AYpi2HRPJ4K
|
||||
txiIjRUy47LLOb8o8ZmZS6m/DpvfOpd2Dyc9yOOEfXJ/JMBVut96/MmRyA3UN4e+
|
||||
9UndVmYzdbAwraFkS1IlYuUz49OATB0CDMUHhTNWUlYhm9x+/xNN/KFAW2ymky91
|
||||
LMmthqiQu6KH0caAwy7tCAfXMkTdYKtXeykz6vEd4IpLXth4QkY3jq9Z0J/QUza9
|
||||
ONEwYEKL9rTWQ+FxtCkCbkkAEQEAAYkBHwQYAQIACQUCU7/TEgIbDAAKCRCXIPaG
|
||||
SCPoQLMvB/45Kve9nXToch0rQrNiE85glnlyT0quyFM4XKVH7ek3Xj7l8BHdcKUJ
|
||||
KOYTXHTg/Zgy4HT9jNBeHL2KB0Y5HszMsHAms/H44ue3cp/TVn1FJ5K8mOvdcRvs
|
||||
IvHFSxA71FDeGtf1MjiQo7BYB5IGNKTRPeuu7sBLxFlECuM+q/8Mdu8Sc1QhLL5q
|
||||
Y1Ca97sJma8N0YVNLKSDGXTppyXmcZGxhjtfzrL4RzFKfG56Nr0DuzrnKNct0R3o
|
||||
4UEzaVNlk4xvwp3R/9c2nRAdq3WBjYUu/8tcRK23DLJYg7GxQ6Vu0RMDDOvAaGRP
|
||||
01aT1byOV8MtAA+57j0fwkzM+7TLR3Jz
|
||||
=CLFN
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
30
pki/rpm-gpg/RPM-GPG-KEY-centosofficial
Normal file
30
pki/rpm-gpg/RPM-GPG-KEY-centosofficial
Normal file
@@ -0,0 +1,30 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v2.0.22 (GNU/Linux)
|
||||
|
||||
mQINBFzMWxkBEADHrskpBgN9OphmhRkc7P/YrsAGSvvl7kfu+e9KAaU6f5MeAVyn
|
||||
rIoM43syyGkgFyWgjZM8/rur7EMPY2yt+2q/1ZfLVCRn9856JqTIq0XRpDUe4nKQ
|
||||
8BlA7wDVZoSDxUZkSuTIyExbDf0cpw89Tcf62Mxmi8jh74vRlPy1PgjWL5494b3X
|
||||
5fxDidH4bqPZyxTBqPrUFuo+EfUVEqiGF94Ppq6ZUvrBGOVo1V1+Ifm9CGEK597c
|
||||
aevcGc1RFlgxIgN84UpuDjPR9/zSndwJ7XsXYvZ6HXcKGagRKsfYDWGPkA5cOL/e
|
||||
f+yObOnC43yPUvpggQ4KaNJ6+SMTZOKikM8yciyBwLqwrjo8FlJgkv8Vfag/2UR7
|
||||
JINbyqHHoLUhQ2m6HXSwK4YjtwidF9EUkaBZWrrskYR3IRZLXlWqeOi/+ezYOW0m
|
||||
vufrkcvsh+TKlVVnuwmEPjJ8mwUSpsLdfPJo1DHsd8FS03SCKPaXFdD7ePfEjiYk
|
||||
nHpQaKE01aWVSLUiygn7F7rYemGqV9Vt7tBw5pz0vqSC72a5E3zFzIIuHx6aANry
|
||||
Gat3aqU3qtBXOrA/dPkX9cWE+UR5wo/A2UdKJZLlGhM2WRJ3ltmGT48V9CeS6N9Y
|
||||
m4CKdzvg7EWjlTlFrd/8WJ2KoqOE9leDPeXRPncubJfJ6LLIHyG09h9kKQARAQAB
|
||||
tDpDZW50T1MgKENlbnRPUyBPZmZpY2lhbCBTaWduaW5nIEtleSkgPHNlY3VyaXR5
|
||||
QGNlbnRvcy5vcmc+iQI3BBMBAgAhBQJczFsZAhsDBgsJCAcDAgYVCAIJCgsDFgIB
|
||||
Ah4BAheAAAoJEAW1VbOEg8ZdjOsP/2ygSxH9jqffOU9SKyJDlraL2gIutqZ3B8pl
|
||||
Gy/Qnb9QD1EJVb4ZxOEhcY2W9VJfIpnf3yBuAto7zvKe/G1nxH4Bt6WTJQCkUjcs
|
||||
N3qPWsx1VslsAEz7bXGiHym6Ay4xF28bQ9XYIokIQXd0T2rD3/lNGxNtORZ2bKjD
|
||||
vOzYzvh2idUIY1DgGWJ11gtHFIA9CvHcW+SMPEhkcKZJAO51ayFBqTSSpiorVwTq
|
||||
a0cB+cgmCQOI4/MY+kIvzoexfG7xhkUqe0wxmph9RQQxlTbNQDCdaxSgwbF2T+gw
|
||||
byaDvkS4xtR6Soj7BKjKAmcnf5fn4C5Or0KLUqMzBtDMbfQQihn62iZJN6ZZ/4dg
|
||||
q4HTqyVpyuzMXsFpJ9L/FqH2DJ4exGGpBv00ba/Zauy7GsqOc5PnNBsYaHCply0X
|
||||
407DRx51t9YwYI/ttValuehq9+gRJpOTTKp6AjZn/a5Yt3h6jDgpNfM/EyLFIY9z
|
||||
V6CXqQQ/8JRvaik/JsGCf+eeLZOw4koIjZGEAg04iuyNTjhx0e/QHEVcYAqNLhXG
|
||||
rCTTbCn3NSUO9qxEXC+K/1m1kaXoCGA0UWlVGZ1JSifbbMx0yxq/brpEZPUYm+32
|
||||
o8XfbocBWljFUJ+6aljTvZ3LQLKTSPW7TFO+GXycAOmCGhlXh2tlc6iTc41PACqy
|
||||
yy+mHmSv
|
||||
=kkH7
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
30
pki/rpm-gpg/RPM-GPG-KEY-centostesting
Normal file
30
pki/rpm-gpg/RPM-GPG-KEY-centostesting
Normal file
@@ -0,0 +1,30 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v2.0.22 (GNU/Linux)
|
||||
|
||||
mQINBFzMYBIBEACzbPN6Yso1qkcpVTnpfUxVWUpcWcuMiWpKSsZKkT2k9nOVVc7v
|
||||
aaLUkKY1WoD3+FoE8fDReTgiwbGFyB9EVC2erwjqQsVr6x7ntVjxX5eFniRZ3O1+
|
||||
ez3mBWhTfAXo7QoobZPnGeh8eL+lI2Yli/bf3gFGYB9xmv/WptokwvN379XtjP3F
|
||||
eFfHlCDpBEWL4ISZ4V6BRlIspnWd8A2FbV3byK5DMiKLpU/qnSPcXY4/OfWwn4HK
|
||||
Of/RFqOJZrJgy2HEmf3XDFHbg7OiGr80Fsc2UuSBQo5MkXckpBVAF7QmhGoRC4V0
|
||||
5xgr2Z5Lh2OZhMtLJDYolvrNcdyNvjcfri6QYS55dBpctNbG49OMmw+niy5uJ0KA
|
||||
MTXPNmyQ3Xtz3Smh8T6yj8iPyHkF7g2JC2xUzp6zijwDjRrDtGpnhrCmOPVlQAph
|
||||
Os6prHwDa3N3OFubKhFscftkjAElgHVb97U6gabU9BJsLPcMV+HkW3sm8nx2Q9eh
|
||||
Ew5CfvirSI8RFifOpDid99KSo/Id+wrTqW10Q/wfyFcGkrKo1fVpEkkDGc1nWKQS
|
||||
+K5MMQsyweohFQvy+yKX2LXhYjDBpopd4KKZJNhR+UDncD7shaKM2yIUp11W7Oe1
|
||||
DkeXME7GvGiB48Trcz38osYTzCqxvzXegFQ01PuiYdxjnYZfWlcl3xaUKwARAQAB
|
||||
tD1DZW50T1MgVGVzdGluZyAoQ2VudE9TIFRlc3RpbmcgY29udGVudCkgPHNlY3Vy
|
||||
aXR5QGNlbnRvcy5vcmc+iQI3BBMBAgAhBQJczGASAhsDBgsJCAcDAgYVCAIJCgsD
|
||||
FgIBAh4BAheAAAoJEHYuZYVbpfqNL1gP/jeWOFd7Pcn8FxLQl3IVheHe/5U0z+FO
|
||||
0rkmr1aLTzoO2Os22DXvcXHHMRxFXjE/xDA8SDp8hNtiU5o7t6z0ZDaDrFo2Cap2
|
||||
8MEqhSmDFmezBEV70xaKHtWTkupf4PYZkGzv8flGeOSjVsjN/KaCvWs5n4fq5nTE
|
||||
Vk2HdxUsXNso8+Z80MqAbtoFYQi63LeRW7pT3D3Y4vCLpjihJwWLYHJrhFvt1WHo
|
||||
g7az6JoEeHL5lgcOnTt8OsveZk3ih9cONzmlnaRJaaoo6Y7CdtbPu6dVGhRTySto
|
||||
fZ1MCTrhqZ/Pn8Vgda6kPGq69UcbQ2XvDrHt1q/mLvJsgPY+3E5jgU2buo3YaUfB
|
||||
Yb9b8ExNpeNCNbxz45FXw6JymtC+YvRipThptuigUngAY+Lpp0ibF/U5Qwox8w/7
|
||||
BnTcmT/lh3bGZH3AvWJpflD/WN2qplhXU5KsGIyyFTxGA8bXtbYTnMCwL7XpwXPa
|
||||
GfMdI/anERDd6l4dxOFWGkLcwZ8PmkLCH52EgPWyd403LPSoukVmupJ42D3hSE7e
|
||||
9l7FU2hsX5E00zsKTbE7EBUUsP67Ah9N2w3DaEE8XxMCikLN5ok012OjIIQGOEoK
|
||||
aK0K9fVkSyrpIacOQ0k3wBDuKpYYTsRRi+yS8oTfUO+ExM09SlqElyvnKntar18l
|
||||
H5XnTNztBtX9
|
||||
=p0y+
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
30
pki/rpm-gpg/RPM-GPG-KEY-elrepo.org
Normal file
30
pki/rpm-gpg/RPM-GPG-KEY-elrepo.org
Normal file
@@ -0,0 +1,30 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v1.4.5 (GNU/Linux)
|
||||
|
||||
mQGiBEm+/6QRBAC5mbtqOFSQ0FkTLIMdIoqxtraIeUqwbPp3IBYQ/u/EREjyEf1D
|
||||
qFyBEXII0dD8JDT85vRZ81jhB7nFWa0VbUfY0xfghkbnokiNBVNpiQcvszw3UYDF
|
||||
aLAaOC8Z98vmlsQaBBTQG6704ZXLr7FJyG3GP5WE6egXIQQbrMcdmCoRBwCg/dwC
|
||||
HLWjuemoDc5SX7hKHbB4zZ8D/jP+oMbqz+bDn8OZ2UuaGdxr+mHW8tzTdPjnEU8e
|
||||
hUt1ws8eBqn/gMfKvUBa8xFSILe8Ty99u+VjFbcRsdf0H6dRre9AdDVUz5oxzoPw
|
||||
gamA8mhPQvFh3wt9smtRUh5IoM2LiM1s5pGMLuYuvSnVUPArEnSfW6K5I6v7OarU
|
||||
3WfrBACDEGGcaWKjfdkRtmKIQrzu6AnldVC1ISLVAoqxHnKNFTk1BgO0PSZDpfJI
|
||||
x8fMCnGlusoL6F5+LYEk4K4B0zvlj1ur3JocjxpuBLccl94JTo/+I9ZbS8ptUqLw
|
||||
LBUkgIQJzzIH4G5NZsQ3FpzSWGRFVa7etqTv9BfUMUmJxhEoobQ/ZWxyZXBvLm9y
|
||||
ZyAoUlBNIFNpZ25pbmcgS2V5IGZvciBlbHJlcG8ub3JnKSA8c2VjdXJlQGVscmVw
|
||||
by5vcmc+iGAEExECACAFAkm+/6QCGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAK
|
||||
CRAwm8MFuq2uUlgWAKCGWOpyodbzxS7Xy/0X9m9qVnHq+ACfUHrQzYAtFRpT07Sg
|
||||
giosE+mvAKu5Ag0ESb7/pxAIALgT0q0HhwugE717a7N+gAtCbFu8pCXOZcrAnJpG
|
||||
cMA9VWmsODZStPTxXYM2ggCMSzUnNis8pPZOPIP5C+t2IYtVjLshM4C9UiY7u5ET
|
||||
jErWCxWmF+2QLO50K56E4qxj0wufZt9P+Ih0USUM5L2oyrQG51uj/2v3Qq3igc8Z
|
||||
NTtmEOfis3losusQbAfZtTBmNQ0570kkhMxiyavgAUxLenXHYrkDJFuL7XdBCmna
|
||||
kykTn2dzU81rIDZ+QPxII4V/eZ5xGiRY/EDUIAysEV2m0NNZgWi/twUnZICm7zYp
|
||||
VRviJrBnFTvNEPMhiGRnJgQp/Krv4WIHQ67N8lQg3q5RJX8AAwUH/0UBjBgbsuWR
|
||||
dB+ZYWjKPBy+bJY/6HefPUuLrt3QDNINMW8kY7VzWRMWyGc4IlPJDW0nwOn/vT5H
|
||||
Dgc3YmA3tm7cKj5wpFijzff61Db8eq+CUKGscKxDBGzHq6oirM5U7DQLmipCs5Eb
|
||||
efwHIjE3aOUSnoQmniEnBWI2hm/rftmY9oJSi8xgns4wAokDPiMcucADtbV3fznx
|
||||
ppuowtBi8bcGB1vJZjTySQcSKWv+IVp5ej06uZ9501BEm6HxUZkuAGPecP65kcQu
|
||||
5bg7B7LQeI5AWyujqvfuWgAF34xhl9QU/sDWxM3wUog+bw7y8pyWCqnJhp70yx8o
|
||||
SqzhFygT62eISQQYEQIACQUCSb7/pwIbDAAKCRAwm8MFuq2uUq8PAKC1+E2pSwiS
|
||||
oHXkKYPYDwApsP1mVACfRe1YnggLYQtG9LMeweVQQC77rK8=
|
||||
=qyRr
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
24
pki/rpm-gpg/RPM-GPG-KEY-remi
Normal file
24
pki/rpm-gpg/RPM-GPG-KEY-remi
Normal file
@@ -0,0 +1,24 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v1.4.7 (GNU/Linux)
|
||||
|
||||
mQGiBEJny1wRBACRnbQgZ6qLmJSuGvi/EwrRL6aW610BbdpLQRL3dnwy5wI5t9T3
|
||||
/JEiEJ7GTvAwfiisEHifMfk2sRlWRf2EDQFttHyrrYXfY5L6UAF2IxixK5FL7PWA
|
||||
/2a7tkw1IbCbt4IGG0aZJ6/xgQejrOLi4ewniqWuXCc+tLuWBZrGpE2QfwCggZ+L
|
||||
0e6KPTHMP97T4xV81e3Ba5MD/3NwOQh0pVvZlW66Em8IJnBgM+eQh7pl4xq7nVOh
|
||||
dEMJwVU0wDRKkXqQVghOxALOSAMapj5mDppEDzGLZHZNSRcvGEs2iPwo9vmY+Qhp
|
||||
AyEBzE4blNR8pwPtAwL0W3cBKUx7ZhqmHr2FbNGYNO/hP4tO2ochCn5CxSwAfN1B
|
||||
Qs5pBACOkTZMNC7CLsSUT5P4+64t04x/STlAFczEBcJBLF1T16oItDITJmAsPxbY
|
||||
iee6JRfXmZKqmDP04fRdboWMcRjfDfCciSdIeGqP7vMcO25bDZB6x6++fOcmQpyD
|
||||
1Fag3ZUq2yojgXWqVrgFHs/HB3QE7UQkykNp1fjQGbKK+5mWTrQkUmVtaSBDb2xs
|
||||
ZXQgPFJQTVNARmFtaWxsZUNvbGxldC5jb20+iGAEExECACAFAkZ+MYoCGwMGCwkI
|
||||
BwMCBBUCCAMEFgIDAQIeAQIXgAAKCRAATm9HAPl/Vv/UAJ9EL8ioMTsz/2EPbNuQ
|
||||
MP5Xx/qPLACeK5rk2hb8VFubnEsbVxnxfxatGZ25AQ0EQmfLXRAEANwGvY+mIZzj
|
||||
C1L5Nm2LbSGZNTN3NMbPFoqlMfmym8XFDXbdqjAHutGYEZH/PxRI6GC8YW5YK4E0
|
||||
HoBAH0b0F97JQEkKquahCakj0P5mGuH6Q8gDOfi6pHimnsSAGf+D+6ZwAn8bHnAa
|
||||
o+HVmEITYi6s+Csrs+saYUcjhu9zhyBfAAMFA/9Rmfj9/URdHfD1u0RXuvFCaeOw
|
||||
CYfH2/nvkx+bAcSIcbVm+tShA66ybdZ/gNnkFQKyGD9O8unSXqiELGcP8pcHTHsv
|
||||
JzdD1k8DhdFNhux/WPRwbo/es6QcpIPa2JPjBCzfOTn9GXVdT4pn5tLG2gHayudK
|
||||
8Sj1OI2vqGLMQzhxw4hJBBgRAgAJBQJCZ8tdAhsMAAoJEABOb0cA+X9WcSAAn11i
|
||||
gC5ns/82kSprzBOU0BNwUeXZAJ0cvNmY7rvbyiJydyLsSxh/la6HKw==
|
||||
=6Rbg
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
1
pki/rpm-gpg/RPM-GPG-KEY-remi.el8
Symbolic link
1
pki/rpm-gpg/RPM-GPG-KEY-remi.el8
Symbolic link
@@ -0,0 +1 @@
|
||||
RPM-GPG-KEY-remi2018
|
||||
52
pki/rpm-gpg/RPM-GPG-KEY-remi2017
Normal file
52
pki/rpm-gpg/RPM-GPG-KEY-remi2017
Normal file
@@ -0,0 +1,52 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v2
|
||||
|
||||
mQINBFi9KSgBEAC78T+bQFMuagr4ZSqOjPTIteVA7KzuIR2cFNrfSUvo+zB3J3Fp
|
||||
K4znkCuMitg5ZPA0CRX9maNkIrZ3Qjhb3qhIbvaAdf4ILNJhvuJb+vLTVB5tSkai
|
||||
1tXGFbggj2gEHrZkQW0mRMgy1nq9wdrVV5PzFpT3lpkaL2ySnU9FDMXLuNusm3+X
|
||||
ap6C7i1zn3LUFnGxE2z9hGyVpX32w8laZGUK+CylEHt6H3OTFzzEDj0EHLqkeB7b
|
||||
gnVXHV25aq3YIsEHPWFqLW2tmlBFhfZnxPTPrjM/qw2YT7ZYPXHKk9vA+byXPG7g
|
||||
BgkEDOhffgfeJLl/YIRtkhdtEfBdXRg+9n5c1uMriXXuQ1kbn/GEdyjBYJCQIQJE
|
||||
b2sglzUAiqftaSgj/esiAVFzMUR9AhrBdQxms4dw3c0m7YmyMATDcNa67uxAqZUf
|
||||
Bnq0I6AugP9IKUJgx9Ezb4kh/N1XaXjmYOA73lKOqLWX4Pty+XtbYvqhuatVydcg
|
||||
dRw9aZLmfUkVVs+jmq2DN/pVK28CecWb03bn80Svi5V0jDhEehoy0KHtq9HO6Wok
|
||||
4FkVc7IPV/WFFDj7k/jth3RFy+xz2dqB6vseclxchfwXHkZn4hWAv/WoNJdDHNSF
|
||||
3s62ZNgIODxRY3Eau0tEioYLiDTZs7yQRHJDZa9Avgd+IDlgmEU1hTQslwARAQAB
|
||||
tClSZW1pJ3MgUlBNIHJlcG9zaXRvcnkgPHJlbWlAcmVtaXJlcG8ubmV0PokCNwQT
|
||||
AQgAIQUCWL0pKAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDggPKfA2S5
|
||||
SUbSD/9yElhWidXvrvDMUbjaroO6LcOp0eO49KVxwqmLGUouUADX/AY+/UzJ3VwI
|
||||
Bc8fPoZ1ZUPICejobM7gNmxsaEZN4mce8psk5HFUPbtdDexn7exWqHoXYIl0DSjZ
|
||||
+htx6R40UfIif1RmztxbmLRpjp+Ey87MyvVFhsaqhzCPA4bCHgccqOWTNzOdME2M
|
||||
QavABAhzv0AXuQRL4lYZ/VetHI0H57eYrUYYDn6i4vlxMbsjhmM63rtMhclXiz4G
|
||||
NUioLQZp3+Vp9wwoqKoRjAxxr9BMAigSxZ96ui3JbfTqdYLwMvx79lfTjCPgteCI
|
||||
H2kg6rKd3A0jmHCMFy8IchlCgkwhtAO4cQrDxDN0LnhsdeqqrZC4iScu3lHjzy6+
|
||||
2Y+X46WDCdnMbCsuirPfyUPJek5Jdu529w+VcWA5+n9DovszQe/Tvqk4Qhxp5on8
|
||||
gQccfYxRSyCfCm6iK92YhARDL/1pD4oqvNNlw4+oZtjtruOzxq3Wwlyno34ch87S
|
||||
CfToCgDKVXJ8DQZBXhCW5vAxNNgzQkVIydq6XQFwvVXwGyRuSRxmnRDVe/4PsETY
|
||||
tP2TsBtbR7kiRpB/mixJ1KE+sLbixMjKkTifxYlA8wEpex/9yug1bbFj55ELO/ZQ
|
||||
MwpR+NfDTRZ6GhS3sTehAQ30jbtFv5/rDgBHIQfyR7/fUB7E3LkCDQRYvSkoARAA
|
||||
wrdIGx+f/2v8Hk2gFebLws8d/7yg9wRFKJE6OItZhKpukW/ONHHN/vCel7wbQgJ4
|
||||
vwWB2J/0EIKwlBfGMGfKP8h4nBn8r77oyfKeR5oH1D8IDOK+nB2gUSvPmQAW2T4d
|
||||
0koGQmGf01NoKWTb3Z17ejyGbzIFvI8ybVThp47YM7jzZuXJRS2Ik46GdHpEtZ2T
|
||||
Ytb8QUziazwcY7AB0pB+zPZp+NPH3aOp+Q7BE6K8ef3D9pBBzKW+XdKUYDeWVbag
|
||||
mEGKvQtkCb6duBxNrtDp1rO2+pCMbWImi1X7w81gmo7OMeWxUF0BaQqePCiC08uV
|
||||
bYHd1eQLVs0TGYU5Xv5FOymuEX93m6P3/LwxhpuujHFDaFtslIFCM4GGNzxZKC0l
|
||||
RpMIB4xahESf3KOaNpaQVj5zebZVSyqOKZxNzPvIMlBc+6zZVFr7HwbgEWnyLBkz
|
||||
Q9EzTv+gX5LU5EN890AtZXTZC0F0cxWiLTL0Ikl/yGT8KiUdMdPT88sla/LPiM7l
|
||||
WibRKu/wk/Mq1c6OzycxOtjSa91SikNn4oBOK+2zerqXmMPSfsRa9yOnRHCxe5Nc
|
||||
OxJSnidyuyb215lXrWaYYO0jrJL9kzrTu6YXAf8Hr7S2p213o5w0J7c9V8pMmZa2
|
||||
VwWbJFb+OvV0CY2jmdtLO2oTjaqj9KSpUVoUoBy9QpcAEQEAAYkCHwQYAQgACQUC
|
||||
WL0pKAIbDAAKCRDggPKfA2S5SS51EACB03TzG+YH8szFS+Yfc3YqtpvrPJK8jAuq
|
||||
rDWO+djbJ5v+ZGQ691YJnMijrYwFOWngzNjiquyU8+aQGp8vVvdxhyVTghfPExpF
|
||||
W8Xs+zAOKofSWMYi+v/7xo/WSV1wc7d326ntgwVfaxgdZXq2TmRzqzBfvA9bd5Xv
|
||||
7xI4kBNqwrzc/pCb7NSLPSgCtDOKN6vfYdctDVQcDs4VVTf9U1RoCwgKXKzMtG+V
|
||||
JaXBoJr5V/sSGC++R6p0kSBt0dFyieQK22c/1wD8Cw+t+dcPMJ6LNtL87WfOFOap
|
||||
j64l+t6hhzH9DCVQ1svS+Ilf2ty1hA4eHiCF8vxXRZaPwGfGv1YLaDt81iS0mXwl
|
||||
jgSkJTfOubAbEEp6qyDBElL+ExDohbG9KAYx1zvPu6BszyADklGJ2mYqOcP5oH5J
|
||||
V9M4kKl7uj5pEet1aOviJRo4m2pfRPm0lY7BP5kNMFWz2hBbhlztyAWAHY+KFEIr
|
||||
Yn2w13LVb/2oZSPM1HaV+9jCXmPt0csN+644qNjWsODGVrmZm9qNUKLzqTBaoWOc
|
||||
XyzBH9jLty953b+y4Ueirg35ub8BX/vSY039pMfHYGJIy3GARGQpWs9O2bJxWrzH
|
||||
UAjQGJxpsu/A53cY+NSqvQ9kQf3u5cGr8HWD0es9ClcRYoxb4MlVuvVNbb1aKQIr
|
||||
gPljfPk2Ew==
|
||||
=1YLF
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
52
pki/rpm-gpg/RPM-GPG-KEY-remi2018
Normal file
52
pki/rpm-gpg/RPM-GPG-KEY-remi2018
Normal file
@@ -0,0 +1,52 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQINBFpYvNcBEAC2zo9//ebrNepP/TKSCSwRb2V1VGRLL8SS1RrthG26xr/VTxDC
|
||||
p7ZSxYdEcFl/f0ppjrjTp9LPrPqKL+Hjjw1eDJjRWNOXgSNW/uD5TO5vrbTiIzmb
|
||||
QIWdMoZ7RUc1pJNHn5DtCjp/6Cm7ntijqxcNYOYd4TEAvv9DPHrj5mYCgLQJ++BT
|
||||
oONap0cLCRTcEH8q+GqLfwgnLEJ2g7HJYtmlte6YsuKK23GjpvQaNoAzA72aCr47
|
||||
JKVhH1k1Fzaw1M8tTURe5WWZvxGT/lD+pl0Cf39X7bbatR1r9RiijGROhMfndyO/
|
||||
wqTKLk6gY6Lm5pj6RTKFg+6AUixcUOn0t2zWY7V4VFNnsxACLcQx04zp9T0lRofc
|
||||
FCN0HQAMBzo52stezMvLJlncuMYgHuzbkCf7Avan15MwzOO8rrq5v2tokm6tB0Mf
|
||||
SRK7HT04gBVxJT9Y9IiACr7iCcIJcgysbHsR7LbJay+15xWDA6ywdeXt50MKxUpl
|
||||
MWeqMnCCdQSNMFRp9hdoKZuo/7PUI+4Wc6ShiFH+WqZ33E6EZbVowC/NHvhrftTP
|
||||
yo+t6h/ok6l5j+gLYA+Y9VNtt9kfC7rhl1c+3oh01zkO/WVEFy7RDLOm8ah75oMF
|
||||
2hKP4FSfX3cX7n9baPhKcFHx2namblICnoNBAIDvG9H6/6EYVhTMzDOI2QARAQAB
|
||||
tClSZW1pJ3MgUlBNIHJlcG9zaXRvcnkgPHJlbWlAcmVtaXJlcG8ubmV0PokCTgQT
|
||||
AQgAOBYhBGs4/qcjH4f1K5yp2FVQl1lfEXNaBQJaWLzXAhsDBQsJCAcCBhUICQoL
|
||||
AgQWAgMBAh4BAheAAAoJEFVQl1lfEXNaM5gP/0k2snbeOKSS93DXz8gnItcU8isw
|
||||
jfy+DA8Oum0vItugVtAnykLgB1h0KyVokuT9QII1KfourxVS4UZo+1QsEAxT/JS0
|
||||
DT1kWC69kdZzx2j6N5fatBQ/xq8btIHpPl/guaaxgz4db3Hnzly+Gjako1zRUK28
|
||||
F87i41fAjgky5qbjozqodBfmRCFRqUzX23MtP/b3+GYz4WL4KSPg/OmiPwosYH41
|
||||
faVH34eFTrXFehOMyjTuAR5MZty+nQUO1gUJrmPYaKiRHnymz0aRPOF8YVpFxVV/
|
||||
wQBRUGzNpK/UkQPja5w0Ec3EuOoDd3Vn0P1QCSOmicrCkGd6bEcPqL6tIlT0NQ1H
|
||||
uKv6HJWAlorivFVhfIku+nyBmv5A9j28A80ut8tlRoHIm7RJiPc8INBd7hguNreh
|
||||
M+iHzGWIrfg255AYt8T+h2LQkMcrIap93U/UYq8d9VKDkJ1uQ+sMtET8wk2RkHhu
|
||||
GJwJmEFzLUNQ7e156yr3N1BS7caa5grguW1UxOeV2NoFX2e3Wm2VygZymNwa6mZO
|
||||
7gQPyIY3iWw4WHj5oFKSAYqHcjWOgBQm2V1mGgDJB5j9noI0hJNH533QKK1C/D/g
|
||||
n9TUOF0G7XthASeYxBHut3y8JalOXWKj+cmXf6+Nw37Q0X6bu+CcEiQN2L8sKwE0
|
||||
AYmegXGCr9nQi4AkuQINBFpYvNcBEADHD25KtshnEgQLXgexLk5K3WBjCDR/d/vg
|
||||
no5Tl/6lWRQqpwFAo6N1fCAKoUhlFhdsxR40dNAA8QPYT/EK9c7j/PbknGzp0+dY
|
||||
vSa7HNQ71JeoEjv/y+UFnZA6ZvDspkNCkj35hc8tDXpJtf3Vbv3gaA7gZ6fpw9OT
|
||||
/xA6P1leMB1JQm9QEgeiHeNH0rLLpHmfMjMippl3JxL5S4N7FzXmJtnYxpgEn9k/
|
||||
MMGg4zLisCZeJoT/VU8usjFuV3PPXNnVir3iBv2TwJM9qjcZ48YWfy4ZkFXf+SH0
|
||||
1fkVkBmmuRs316rIftjnjBWXNaA/StpM2OCCx7ktnj+rIX9Pxnvlz9izDKhqHcUB
|
||||
cUS3gVkMH7NBTuoP/vIFbenpbOPqRdCVS7u1fpk180T5zyyEEcyzEgWaqCz5soR1
|
||||
EG7zRTnPb6u9FTsOX9XU6zhOrYd4SZRWFlvkMtcPpW0o126RVAQ8uys0pH2fR3e1
|
||||
rRWngKs2dAOrKbbITLtXqrXZjlZOWMJS5pDbu8RsMwJDc7yHAJ1O0pYE2SC8vgqg
|
||||
ZjHZeJ8mrobVcvMXnLCzyri8ZcuIDKGscmiOznN666t2yaYYIf2EmkrzjKxh09M8
|
||||
NdpNG/LxyIn3kAG4vObjmKZ0r2BHlsdyJ33wN1qSWtFKeZrc8JnQJbT3eHE0VMP7
|
||||
/UjxADwqZQARAQABiQI2BBgBCAAgFiEEazj+pyMfh/UrnKnYVVCXWV8Rc1oFAlpY
|
||||
vNcCGwwACgkQVVCXWV8Rc1qyQw//W4DqpkzQMjcnTrjwPq5daxJSQnPKhatVQj2o
|
||||
bdb0yRo+Qd8YoTFlldQJY1+zzRiiQ7qO40DZWU/mejgMajmOX2tjFozCa3ENbb6r
|
||||
w49BlSbrMyI2kAOtwSTehrzprgzblQhcQy0mM4oxRePQcRZynN4nYA8afb5ROjzN
|
||||
Cb4+UAlnTKGukzakmRiPKUInepdTUnA/4UZFQEHj2nb8iP/RxeI1bCMOQoxQMhYh
|
||||
dpsCoCOKcmvNYZPVjz3/tmdjet+5WLtzy4xcYqOJQ6aNF4ggjBfuMYRuiFjpMazm
|
||||
FS1kDcYtcEAOV6tZ+dlsHYJdoJh52ghUs/kxPJlZM+VzFv/10ToWpCNVwqC+BDXC
|
||||
gXUZYxo5XIwUzIbUlHuhVcGsCxEgndaf5qzu0UWGoLdmLgo56yg4ivUATGRnm92T
|
||||
WXgjHzSuJhsVEmriswqxd1h4R9EF1TWNhwc4RhrvomzDTuXIy3kAaORqVxCZgbxj
|
||||
sSY0+jqkX/AEU0cR4aiD4fEvMPeHJwoo0vnS1nETi2KZrhEnGa6JhJxe91V0vAxR
|
||||
9tBx2KLkl4uYHJELoH9JOcv4WMFMgdoA2MjcIzhH5Cc4t+vQC2cK8lLT7IiGfI57
|
||||
vhFCsz+GEqHusDfQgLAp0onI9wwCUwtiFZh4jMOJvk6HMGaGVSP30zh1bGqIPjFS
|
||||
qk7agVI=
|
||||
=sJgk
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
52
pki/rpm-gpg/RPM-GPG-KEY-remi2019
Normal file
52
pki/rpm-gpg/RPM-GPG-KEY-remi2019
Normal file
@@ -0,0 +1,52 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQINBFx5BlEBEADlXJsj2r6OSoKjRUeLcZSatblRHpNlaQZmsUWzIzksyl+t2AU5
|
||||
VdJWFu5avGgL+UnlpY0MDjRT38IOkpGXCTInsosirCRv9A94FU4rx4H//uwdhfrW
|
||||
Jvh+Ap99gl/dhxAVnR7hBdNjfNVaNo3B1kZp4buseVzB8oLAVI5DY1Fu0SIleoLw
|
||||
lcaYG/Zvoov7t21krU7z464DRbuB1xhxGk9PpLtDC9KEqQ6FX+MH4AED6MIGiYPO
|
||||
HFbwxDxVpw6VEXFd3K8oStWErAXzi7CCDQ4PLFOxRTVNU1yIL7VET6f5g8f2x2sQ
|
||||
xIZO9ndLXUkz+o0GxL39fL9aQhPHlwzxTRPInnW8pRUs2L9ZWTsZXl8VAZtK68Fw
|
||||
4QhaPTxChGh9IBZv2EHcnQ2jDOlVKFF7Jton2iEtGJ+fAlKt1wH1AUhwKz/7DyEU
|
||||
qhx780qFdvrdeDK/dl6g4JH/Y6PkeJ9Qckmo2+RkfOhhxJpwk4+DMF29vxNlIZyd
|
||||
PaIu+tFZkFFrhuBSXwqB5ffDxi6Pru1ZL6rw73Q51SFjCKm87T6dQB+IURazodSA
|
||||
3LERHr5plvBwVM3HUeOf2aG7/R4OZWSxk0EuqPZ8Aac6pzOvMAQoi3U4FBbqGdVM
|
||||
4uMo3n6+JcVQsWYItMcDWbK1vpeokGafH/QG4cMfiOLCkjrQvftT6kyRkQARAQAB
|
||||
tEZSZW1pJ3MgUlBNIHJlcG9zaXRvcnkgKGh0dHBzOi8vcnBtcy5yZW1pcmVwby5u
|
||||
ZXQvKSA8cmVtaUByZW1pcmVwby5uZXQ+iQJOBBMBCAA4FiEEXxNhRb8QNpt2hdje
|
||||
UDZmzLuubxsFAlx5BlECGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQUDZm
|
||||
zLuubxs/PhAAuUHQdOGEEs0/XVVhWq1ngMPF03tXkjCcSqSflse8cT9x+rMO2yw/
|
||||
RTb5dUTafeWaQYnV1nRJmq3JUDdIMvLY6NCi5gbOFjM3Aef9QBSpTR8jw5a4ITIV
|
||||
SE2jpkKpzZ2Zp/NUKcVmuJ1XfIBXABl3gZVHkupB3KgxcxyYuk9vF57x8wauXHul
|
||||
6aUu7kQX4PxyVPbwZ6BrC4CGlygeg+kx9c96edcEW78Gb9pYEYwjvjy4WVJgXIT3
|
||||
jDCXYwXpMn+Q/aEQzV16s0vnxvKhvg0EWk/337L90SmCa6JuofguYQibhwrMEOLD
|
||||
lLOlN4CF5EAfTYvFsW2aiWV7bIJeRpWuF7yBd1xL6oHG4JW4lYD6O8dzcprEUB/r
|
||||
3al3VrI9nHovt44UIk5H9C9yhx9dvom22XTi1mh0YqFbwgyLw7ya3Vek1W0/r9AG
|
||||
vyWV9Dn20TGQAlLPhDt0/Uqx/U3WTk1LTkBRcAJA7wax5sCMwfXr5kWtg7D+gHrZ
|
||||
eyoNNenbXYmqb6hMcfCI5rgcXjEnoi6A/k/Aoz7EWnv4tzSBRyoK59ZW/8ExpxC7
|
||||
eQwtO2UqfThE4z+WWlKRxn7vdfrcya9dPmD+5TmoMYFsk0l2Ad1PxLXQrWsbUbX3
|
||||
lFgYsWz342jDSGz1pQbEEcy1kdl1fRQFvo9du66t4FkutTRqc94Q0Oq5Ag0EXHkG
|
||||
UQEQALmFepBCugDyEa0XgN6cm+wsV1Sc+Y9H6O0gDV51UHfOpI8fr2OILOOMbEFE
|
||||
gH8C1iStKPiCYdfG4/DTgNS9NEBFHTTiJMyNDBuKE4o6ukhZ1bOJWgMb7L6fV2Sv
|
||||
2kNpAx5AF0fTpViuOQMUtC90twtnc1ZRfBJFvQ20UFCga4g3/cbXqZHHaJyJjady
|
||||
Xqn7t6qUN3gYvmJgmvmNiP2G4M4muCDL7HNbwpLw4oAp14cJc5YVbS+Tn4Tf8IdL
|
||||
VuDC9sVPPK3sbmnApSOIumtd+6NskYo0kkw6D3YMPUKdG7Upuyi+FTTycPuc5+RO
|
||||
SNxlxBg8UtNFT42ZTDXUebw67fazLNVSRBtjepClwYBb0Tu5YJpfoxqOFJRa+y/A
|
||||
8uDQwj+aQvEEcjR3ErG+2BZyPA78tStKPX/JWS+BFRVxGvYXdYEjLXbHXpKLnb56
|
||||
EpoDmvknsfdtJmojdUBEbDP22G4suIzWPg86ivlQ9PbVaqH4jBDHuRXZZ3RYjg+O
|
||||
I4iyKDmyX9ZcbnoZtrXP9p2Dc5Ot89UIDXLU1GCYlheTyJ95jUW/PbWO1XddLMvx
|
||||
h2kOls7CBzv3uPYEMUgeMS5rjfF+r1HnBQtHjZw3b9rR1pItwYfDAr7fwGylCwIR
|
||||
SztTmSkHl/AhwdEjMmVOMXrn9g4xypa6M8IjEvXXqsXfWtnfABEBAAGJAjYEGAEI
|
||||
ACAWIQRfE2FFvxA2m3aF2N5QNmbMu65vGwUCXHkGUQIbDAAKCRBQNmbMu65vG4Wa
|
||||
EACi0biw4xcA8lo2X5pyJ7gV0Mj51KSJL07zTTgtdRi26nrt4jfLo2GqaasJ/gnR
|
||||
SHOP9FldyC4rZirOOfP7b67kcqav2dScU/z5YbPa708LvfKgLHnLbXmSJqpFpWDn
|
||||
idureW5X47xV+VHotTQ4XkYg5KDxCgE6lomwOw8Uz4+Y0POoBPBQSlPa5Vpg2tYN
|
||||
uc7+f9et8tc/xIb7BkSWPyUxGFHkOdGHCP5hOcPogHdQMg0vgw4HEBUyalrTj534
|
||||
q5HY4wY1AvmZzvDrcNUb3bDsSrWptKmKMQmsvxKJ1f2Cb5QuGocFUUGQv2nUk29h
|
||||
yeNB/Wm191zrdL8rQwCBQwzg97cREvb+NDxj2J6a917YoK1HkkXjqJQXM50golG6
|
||||
p9nk2CxyBOh9+krMQTuUVkn3SAEvNJ1goey+xg0R2MB0p8obQtbhsMma4TRtNo9y
|
||||
sRmKqU+EYQtZKIycWZmGtf+OiKu8N8NIJRt9TabrV/8Li8lHzKZZPt6KirvKk/KG
|
||||
ukDzoaeFEsATsKp9FmeLRfeVvH8G5e96YwOnC16BQx1I6bW0DAO5vAffdWBmojeM
|
||||
1sjsVKfqg+mU+5h00j+luYuqcooZPeDemK293+cLvDyv66Bq+/V3C1rUwfcgxu3T
|
||||
yu+Gme03tVX5mE+ts5qEuhyWkna9vIqglNLBkGDMw3wCuQ==
|
||||
=CStU
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
52
pki/rpm-gpg/RPM-GPG-KEY-remi2020
Normal file
52
pki/rpm-gpg/RPM-GPG-KEY-remi2020
Normal file
@@ -0,0 +1,52 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQINBF5KmkEBEAC0XN9Q3tf1ItwsfHx1idnU2YI/P5FcLTEWAr+oqg1x7HmEg3H2
|
||||
Dj9bIRGnMkq4kHjITEbDMeRcPRjLdgolzkd5IiDCMdRTzryWSk5G8sk8l4lrCmo/
|
||||
0GPseXa2K4VbqEPFFPREwMZeoxoNulbuQZ8YYFCSsGoMcxKksUeCY/GWkloqiAdZ
|
||||
0gyDC6d3AYe9Cvynl59cOuuR+h846OrgPrv3wD+WTBGusbMAKeVb01FS1zBUzEmz
|
||||
5/drQfpsncJENytjySg/mYogdvLEYk78uftLTExWQ+dGQ7fpp/y1DrWpICGBM/hX
|
||||
V7j/8P+5IAO6iAONHeFTEAARHOXs24daX3aONRWrbmuFOT9X/+5uT+IRjzjVs4u7
|
||||
wVu5+I2e0to6Abqm4g2W1PGJD7P90s0o5obfcO6OPLBGNezFREdvG1FjTTDS9YnO
|
||||
+h6HNGnssihT60naV+a6W55x20hMNUb2MJD0twBv4bOB8BI+okAD77moIKYhnN2e
|
||||
mhjZsD3VSeOLzJ1B4mD4T5rjvmM7+mmHPSGmugOFQCAlNC0xkxuUQREUb2ZDYtMO
|
||||
kyrmIU2K7jG39Ai2314gyX+IEGsfgn21kQT3qLH2Q1iJx7pUFBJPSaija8Qe4myA
|
||||
qfLaty2xJyW9MZ5KBy13auGAw74VhWraalKivp1tUlvjx/2i5HJCKpdEvwARAQAB
|
||||
tEZSZW1pJ3MgUlBNIHJlcG9zaXRvcnkgKGh0dHBzOi8vcnBtcy5yZW1pcmVwby5u
|
||||
ZXQvKSA8cmVtaUByZW1pcmVwby5uZXQ+iQJOBBMBCAA4FiEENMEL28xvGyUuULoa
|
||||
BxSRnkwhqAgFAl5KmkECGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQBxSR
|
||||
nkwhqAhcNg/+KQTnfmJv4WoRY4PBE6eGdNyICAK3qFgiQoEgYjDs+63n5ruPWGvt
|
||||
v3P1MUkUsVJ6Dqel8LUjbqlxBe15tTzVo49rrCDEWhtF25HVFOaZG8ABVOeN08B4
|
||||
gPL9EG8HhT78Wae+I5sl77UwuUQ9T2pShjXk/uoQVjKzxTLfLobY8dzMgC6QI0zr
|
||||
MiY5nnQ9lM1wY6H5gFbL4wAkq9hHUDXURnvw9rJqM2Il9848AdIgxZK8pRQXFbWm
|
||||
INIYlYGrj1/lV9lXCn3tfFQJHMBUTZ/TbdxmDTqsOcOB3+RgbR3VAksbqG1LYMgu
|
||||
BBBorUzCziZ8TUdbMevHWLim8O+2BTk4KjcmjKY3xuy2y7tzCsBzlSteFP/BcMa7
|
||||
gLN7yFtvGjHj6pi9RmOSK7T31lnCXTiWVMcQ1mEW8+bZE5Ac/TKLxtkCgk22t7RU
|
||||
ORE3VqKf5FUFJwLFyi/03qK+t3SGJJQ3WM5zFg7gTQzTZ7lTUqXK6r8GYTITNbCv
|
||||
nYhIR440mOz+12E3FruCoH2eqOkl3H6zyQKmP0xb1cHwNgZ3W7M4UQdgDq8uaycU
|
||||
rD9/TphEdxPm3AaZDjHES0oRyA2umBW6KbDwyr8duqZ/OIwrZuWHccNWwrsZM80R
|
||||
4QCBxZrUhAXqdthkm9AiGpYdIQ46p0nSx0QX3Ypnl74PoR70bWcGtVe5Ag0EXkqa
|
||||
QQEQALE07opKX/N3y1/pJm19Sl7YrqyWVeGYJk4zmAuQAY+JoHtMVnM9JJMOzQNv
|
||||
TziHGE3ei/kNK/E8/+6L4VMhVd02Sz8xG9OgXudL/wHHlkNIMHthnyLFv1LuFGSJ
|
||||
U8xjpIAWNoG9UhEtqFgUSsMQUuTy1ECbwbnXFFL/6/1pRuLSPpCtBtXVrDIhT8lu
|
||||
Bsp8hP6/5ix+86O4SglGe4Mdoy6f4xxVXDh9nG4PU6BmdZePHvNQA+i5uJfSimBR
|
||||
ZiiQTrfoi4H1JH8WoVLHIMAqgwPpkEfHVgBW/I/bp5iNUSHvrFaGLzjfH/N1hzCU
|
||||
C36bieuhgSBFeSUS0wxjv3BYuwcSkzlowgpnZHlrHo31ZXNKG0GNnvFtvR2k+ANf
|
||||
68VE1uIM6cDBP7N38RXHatLenoS70XsC9QwXfvvmTHPwOro5OqVVUNh90/+LFwhZ
|
||||
Czs0OVQoNoAeiul2cZ3lEQY9NijAUQGLD5MTm51AvJvrUodJ5xPoaQV09QiFmsVX
|
||||
GFULpKkLYwJM8Qw9uTAyyXoMDl2gINQaFJXsvQ5r6EQXCVrvzzwDpH0OPOCawkia
|
||||
730vfJCcOSrAWrJGYua1lPtSUJvsaXUFmpWlXpjAfZi7JZkdUFi8uV5yrrhjaK5v
|
||||
XvY69YaMO1kTOazHqOhXTIYhejqZLIvt6cPzePjedsfvE/UPABEBAAGJAjYEGAEI
|
||||
ACAWIQQ0wQvbzG8bJS5QuhoHFJGeTCGoCAUCXkqaQQIbDAAKCRAHFJGeTCGoCKFe
|
||||
D/955Sl86Ns6ariSrvJu0+6zLrkcCNJBIcdR2vyEcxhchJT/6dS7LyjXVrhiDyR3
|
||||
Xb1PSVocdb5Ccrcqch9r4TmTPXuOdmFllUxEEcqU+vSJTj7e/KMPVbW5VBEJb6k1
|
||||
Iv0ZUIxvNvFI6+lcn0RmFbInyhkaZQzf3yA27ZhReQpc/NosSdKbiU+T0/nXA7LI
|
||||
zsVRFcTx9a+zzb7Av7kPhqsJivs8yFRSskiKEEXiZlA6rBl+jAtF+H7T8Itq1d/s
|
||||
/4h5zmRTFRzrB2epRkZ7Bgt+RHUQ8Z4iAfOUrK1djOmotp47o+cClDvsfaGLXbCq
|
||||
DcOo2QdTEAbdq0Qd6QYiBwTAE+JjnjEt6rxAUw9KHu6ZOz1f8wLnKRFXFmTCM9tR
|
||||
+HOVdSn+azOu5N5HKDvybrXjJNuJPD2xUHN9QGW6NCu/KqWUFT+RlYh4WepJB/Ip
|
||||
5zKQNGAaLLLhO7r06PHnsLfCYX+oG1i0bpf0rxgCzikTF5bYzrSKa3BIcPqEWtWN
|
||||
Q+gqaviGR07Nhms4TL4Y16d8jICTU4TheMeQ7l04TUtoKjIG3vZbPUtjjhmsOLa6
|
||||
YJejQnq8pFF/xgWWLP22G6J7vA19KXeSUoQW06WFmXdrtJZQs5BH8GE1uge3j+nl
|
||||
2PMufS9qcG/IngOM0E3AqlJ3SlQN+Ke/ZU7LX4sRT5UY9g==
|
||||
=4jSn
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
52
pki/rpm-gpg/RPM-GPG-KEY-remi2021
Normal file
52
pki/rpm-gpg/RPM-GPG-KEY-remi2021
Normal file
@@ -0,0 +1,52 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
|
||||
mQINBF/zKcUBEADvJpDrH7Lf8JSyAQxSO7v+q9CWf++NPVL8zBUp99cFAS5+AK8E
|
||||
qbfYTohcNFExuu8fJTzZWubc2HJVqnuvxwpCtb/pvrnIIg935AAjatDqa+5Aib1q
|
||||
bGIQhAy7Rb92JtGfIC7pNqcRPzpurCtIp7SwpEwGI/ScJdmVCMFXrUJnaCYgkvfm
|
||||
+Z6jEp3GCr3Yzw8ewNUeXk/vb0XzlZipDdTSpVcYUjPWn7BxVFUUmscd1WFL+dgD
|
||||
XHJkmtjwU/AV3JcngENMAAxzrZQljL2dveptpI/cmPmBRwMBsneG8RBSiFtSoHy9
|
||||
K/p4letvgAonP5+5rIOPSBglw7heiUfMk+iSuCignTZawgQDxAt6sRY5bDwwtpBB
|
||||
5rpPLVVm3BRysQ5aiQvZdm7xKfZmb8IoOaEi0EdKp7Txg16KsX9BGo9X4Nj9BK7Y
|
||||
lrOFWIl6V3P8lajbkWictlGw69SiIF4aWyc4F7BiQd12tqCwNOi8AMmhSVhmsJbV
|
||||
PVmN1xTUytD1E85lehF6XCzb2GEojbWF/l2nmNUEf4Fs9pMuoeUbTGN1GOjpQkbd
|
||||
cU+FIAgOv8U7qqEqczRsHf47WlDm8gjV59+/QHPScGZH0/G8+gLmDF7sG65K5gmn
|
||||
VTXQy5VOR4zK/r3o/WFlxa+fWz3guCzzG752FYHWI69fYYhdo0pkFeyJXQARAQAB
|
||||
tEZSZW1pJ3MgUlBNIHJlcG9zaXRvcnkgKGh0dHBzOi8vcnBtcy5yZW1pcmVwby5u
|
||||
ZXQvKSA8cmVtaUByZW1pcmVwby5uZXQ+iQJOBBMBCAA4FiEEsav3HhTJ10iX4Zio
|
||||
sZUn8UePiUcFAl/zKcUCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQsZUn
|
||||
8UePiUeSXhAAmfIKurragDpYw07jZJEeEKjMkFrt7KKZ7Ll5CuRUy0Hzawj+ug0F
|
||||
0cKCm+NxRJSQ5Gt4HfPfbcEXPC1+VNsoMCi1/nvHJ+HDXKvf7P8qe09R4gPBesRa
|
||||
Ob3CLPi0nTQIjcCRI/5NiQS9Ia5nOd47+H4dWElhJlP48UIXYZLE4Av4683m7TBM
|
||||
AOQ6m9sSIsl21ktdpTTAxXYdB0+uLWbLssEAwhkFl2NOgi/Eri436eWDEsJeId1v
|
||||
SCWZHVj52ROVm9yy1Me11ELndNKkos4KYR+0PjGBxsCW5Wp56lPtAY4aDQ7KTnjH
|
||||
mEctsvvfPP0agbYC4YAy5wZ4P4MJS2N3TiP64sodAWmuHEf6TvkK6ObFn3QfyQ03
|
||||
pCOIRvE+57U/MUz2qc2/xDIWVwSY9bzKUnfdDidEyaUfM9f6gLbsY2QWJ2uhHul5
|
||||
gzJqkdU5cYNX+Vx3OFna99l9cwLsqQ4AX4zkJl2BQggOfsfFOYn5huXlF0fyjG5r
|
||||
CLPxVqNdDRPfF/daFXt/6RrsZcANzjI9bkLxWYHDi12NJonnpouhcI5XsjgeXKmf
|
||||
g6iw5/+VAGc6ATgQJmZ+7WJbuIKxBYTEE8NHhpouIzAiGP2ZfYnAhFp159IPwOCO
|
||||
0U9Aqp55JU7uJetD8zQ/muir8zYEIneizaCIiPT3GgdgpcHFg0rQbX+5Ag0EX/Mp
|
||||
xQEQANlkm5nSNiuQAPO3/mbxQuPAQoVoGfPR5nv093vjQVPJ+4OAZjoXaVCxfkiI
|
||||
VK1sAPv+4qUJh+SLr7LDEOWFrJo5yXImePUoMZxpx3MqzuX/Dwx62zY84m5ylRkb
|
||||
hVDpnGd+zS0R/QA8l57Xw1amDdRzua18b6ldzHoEdxeQ18LzBJ2oCJ/UYD1XzQAJ
|
||||
7odWJmJMiCYBT2OKEpfEVkxV3layd8g4qGEaxrWn4ZeDyfhGoNmkGsm85DLHLctL
|
||||
lcAowEVK9PKsLlGhEAYybjVj5dnep1AibbPFUQMslm/bj7JvWFc9vZ97vqvOMstm
|
||||
QXpEwl9rQ5W+adEsgvAwY6dCsZJwt6pnqFiWUpGs0M0XC9InXm643zNPXPwDQmCt
|
||||
d2kRSKElZD0u0zCyBtoN3ng1A/o3FDilgMUm0Mabk4+cRsmpSVHcSdKW6xizxMqp
|
||||
YW5Shwc0qXQOhK+mO3CWol7dtUB+d5a/1C3UIH62ZMsWXOLzZkFHiqKuoRgaM4eA
|
||||
rw5B3o/EVU5RBBaE3kM7VYa1PTCbNTQM39bT2h3DUDhWBD+gefiOgeoAhHaURHoI
|
||||
YQqRnmuCxEpEEZvrLN8Le7mNveNAHli+xoxCju7t4GPT7Jfe8B3RNTz2G2zd4PA4
|
||||
q8rVvC3AbkZWrzZ+4bK3ixZN5s5E/xuohDyHTnLFzj6KugHLABEBAAGJAjYEGAEI
|
||||
ACAWIQSxq/ceFMnXSJfhmKixlSfxR4+JRwUCX/MpxQIbDAAKCRCxlSfxR4+JR+pu
|
||||
D/9SNtGC8m7G8xtJcGjm5gX+5qIMCaymJgXjmMQ47Hb9qb+jLCC7/esOqaSq0C4M
|
||||
n3s46wm40LkC2cLKFRPrNAA88tOJA3jkmBP7sGKVBxuBF6rarEOadXcd/6NWD1la
|
||||
LogqrknhGpqxAv0Wf/LW1VFgz1h32dOFhT22K5jA5xpNCTW1gTCf3yOcWdMf6g3D
|
||||
nG/ciSzAdl5ZV+dLsWu0i1aqOuq9GtMp2OiiwU4KeA20+3p3bn7+WfXLK7PWLEle
|
||||
fMVWEBq2LQjpCIOYuW8UVEJP0JR6zVN7MROfXHjXETIE1UEmRO3NGkbpWIh98Qn2
|
||||
vJ5wW9i3yfmE5bDkI4/Bk7yfWGZVeCyJxmg7tZx4d57WujwlZG66G5GjqaXtW3vk
|
||||
ji71d8pib4I8ZlZrj/d8SAxwvsnnCAvrNp4eLYbdW/MpLXwvd64sUoll4UW872qN
|
||||
bfBEhVA4QAa8P98UXs4YuIq7dhNdf3Oqzt8BsxMCRZ7WldhdVKOFBdrYS8JymWDG
|
||||
zp88wcqChyLHRQw6On9jnmeXLOLx/K4mnOwMs+YpICSUWorbOZxBIV0som47MgLC
|
||||
x6oQFn/9pfOD8vOmTk1c0GsMRC1embxO62TqwRtlpRpgQxeyY1VgeJPxRff5chwM
|
||||
CmuPjl1YneigbUiUoEqmvPLpkXRAHY/BZcN2mm1jNWgzjQ==
|
||||
=xAif
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
24
pki/rpm-gpg/RPM-GPG-KEY.art.txt
Normal file
24
pki/rpm-gpg/RPM-GPG-KEY.art.txt
Normal file
@@ -0,0 +1,24 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v1.2.1 (GNU/Linux)
|
||||
|
||||
mQGiBEGP+skRBACyZz7muj2OgWc9FxK+Hj7tWPnrfxEN+0PE+n8MtqH+dxwQpMTd
|
||||
gDpOXxJa45GM5pEwB6CFSFK7Fb/faniF9fDbm1Ga7MpBupIBYLactkoOTZMuTlGB
|
||||
T0O5ha4h26YLqFfQOtlEi7d0+BDDdfHRQw3o67ycgRnLgYSA79DISc3MywCgk2TR
|
||||
yd5sRfZAG23b4EDl+D0+oaMEAK73J7zuxf6F6V5EaxLd/w4JVB2xW0Glcn0fACOe
|
||||
8FV9lzcZuo2xPpdGuyj02f/xlqvEav3XqTfFU2no61mA2pamaRNhlo+CEfGc7qde
|
||||
/1twfSgOYqzeCx7+aybyPo8Th41b80FT19mfkjBf6+5NbUHffRabFFh1FmcPVNBn
|
||||
F3FoA/95nRIzqDMItdTRitaZn02dIGNjdwllBD75bSVEvaR9O5hjBo0VMc25DB7f
|
||||
DM2qEO52wCQbAKw9zFC284ekZVDaK4aHYt7iobHaqJEpKHgsDut5WWuMiSLR+SsF
|
||||
aBHIZ9HvrKWLSUQKHU6A1Hva0P0r3GnoCMc/VCVfrLl721SjPbQzQXRvbWljIFJv
|
||||
Y2tldCBUdXJ0bGUgPGFkbWluQGF0b21pY3JvY2tldHR1cnRsZS5jb20+iFkEExEC
|
||||
ABkFAkGP+skECwcDAgMVAgMDFgIBAh4BAheAAAoJEDKpURRevSdEzcQAn1hSHqTO
|
||||
jwv/z/picpOnR+mgycwHAKCBex2ciyXo5xeaQ9w7OMf7Jsmon7kBDQRBj/rMEAQA
|
||||
6JvRndqE4koK0e49fUkICm1X0ZEzsVg9VmUW+Zft5guCRxmGlYTmtlC7oJCToRP/
|
||||
m/xH5uIevGiJycRKB0Ix+Csl6f9QuTkQ7tSTHcaIKbI3tL1x6CCBoWeTGYaOJlvk
|
||||
ubrmajiMFaBfopLH2firoSToDGoUvv4e7bImIHEgNr8AAwUEAND0YR9DOEZvc+Lq
|
||||
Ta/PQyxkdZ75o+Ty/O64E3OmO1Tuw2ciSQXCcwrbrMSE6EHHetxtGCnOdkjjjtmH
|
||||
AnxsxdONv/EJuQmLcoNcsigZZ4tfRdmtXgcbnOmXBgmy1ea1KvWcsmecNSAMJHwR
|
||||
7vDDKzbj4mSmudzjapHeeOewFF10iEYEGBECAAYFAkGP+swACgkQMqlRFF69J0Sq
|
||||
nQCfa/q9Y/oY4dOTGj6MsdmRIQkKZhYAoIscjinFwTru4FVi2MIEzUUMToDK
|
||||
=NOIx
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
30
pki/rpm-gpg/RPM-GPG-KEY.atomicorp.txt
Normal file
30
pki/rpm-gpg/RPM-GPG-KEY.atomicorp.txt
Normal file
@@ -0,0 +1,30 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v1.4.5 (GNU/Linux)
|
||||
|
||||
mQINBFCrkUwBEADpjFL/PJmBGz36ZZVCGE9nxxrwYdIDYjvrjS9Xoq0qExcJE2qD
|
||||
VitCDI9KLX7/qu61985vF13C5oqpuhl7nqTjwC59VJM+bitblj7o4DtKflyVtUK8
|
||||
ee0PwDnOk0NDHZZVB2KcaLs+cblbZL6LOjtQgWqjE7VH5AreeaqaJldP8kRBl/2R
|
||||
Ug8o8NyUlvhGVKK/s7scIU9GhV4diFnNipnpdSZtRO1wgkGJ/uMhkSVRVrS1Ci0p
|
||||
iADA+gmbmHpyk+H8JrtuiHm5K0OE31MoIM5jLwEpTzX5yQXOCEkQ8Dmfxy5T1qSV
|
||||
1d6WdmoBmcXltfXifbNLkOYdZCTiW1z9uxi+PZ0GAyv04qICElDgCSGJ/5UxOjYG
|
||||
GhDNRs7BmEHSfQHD9kE7VJ98JnQPqcwOO6IBgRuEt4z9Qw/ksPBBeZ11ktitWPDl
|
||||
xP4PBy/JNb1/B2BmvjYvmYk88w9OUbwMXL8pkiQ/xMf3IltXKig6dOnjNOfQhmMf
|
||||
uYztVbPtHct4eCxx12ThfvixygG/TIeq4VHbg0GW+wt39LtSgV+3BUz9QiQKY/wo
|
||||
SIJbK5oaK0ZNdah8DCqco6xyNH67qbahZoXS2K+y0Um2+0ZBFH7wLrswW4eRTVsk
|
||||
RFr79V/a8vh09GqoKN4tzNwpId4n5ivuwoYbca5j1AoW0GR4ne8MdSbAtwARAQAB
|
||||
tEJBdG9taWNvcnAgKEF0b21pY29ycCBPZmZpY2lhbCBTaWduaW5nIEtleSkgPHN1
|
||||
cHBvcnRAYXRvbWljb3JwLmNvbT6JAjYEEwECACAFAlCrkUwCGwMGCwkIBwMCBBUC
|
||||
CAMEFgIDAQIeAQIXgAAKCRD/vV0KRSCvqax4D/9G93N+b8CHcGQRzdpRnjLQ3lRp
|
||||
vSFZlc2dBW7d9PuoO8yw0nJ5QkEfROZvg6fgNesYzDUdYcqSiTb91sDv2XENS3h7
|
||||
D9gx4kutGbb/KZNH8LJfinq429zvA00xdct5zL9c7PKM/qRxE1zdZlyJ03/ewLI5
|
||||
qyvcaHgZ8PQze1+vye0txuC40FVdCkZCXWlgX3Tw+JaCPtKHsC91+fcvKGRUEb5/
|
||||
+3owf3bnuKem3dcqlZlpniJtUIqfgwSTIZUwNfbE4jYsF/0mtM0wruJN0CWf5zCg
|
||||
ICLG3TrcwrDEgSDkci+igcxz9heQ9DXuFuaUDE+DndyoeY7UmHjpGwmHwsJ0HttB
|
||||
V574FB5oFndS4+AAz8ut6UT5ydEaPsMnQYAeSJxU0C5EFyA3UjIOsSe1esVm3sDq
|
||||
VezPn4Q74Ex6YMX5w9OGCVlpl/TLM7b0UD0158RT6rxkW8owXaJwb1JO8wUNSIzN
|
||||
2E2tm6FRVpOdxhR2CdkKMNilOG6glpi+3ZRgrXEr83bAYN6rwyUWHW3ihdfzVX6t
|
||||
ZzIJVvnnEzxQaUISI/ZMzVlmzgyxOYseXHeapFJG92gNwxu2IqFlQ4xWUBkJiQll
|
||||
ZkDBI7nqmV87cSJZsQPQPEzZej6rKA/pvOaUR9+p9jCildt2m9ulozk2pXgJgNVb
|
||||
kt1o05etg6iRaeSaNQ==
|
||||
=DrwN
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
||||
1
pki/tls/cert.pem
Symbolic link
1
pki/tls/cert.pem
Symbolic link
@@ -0,0 +1 @@
|
||||
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
|
||||
1
pki/tls/certs/ca-bundle.crt
Symbolic link
1
pki/tls/certs/ca-bundle.crt
Symbolic link
@@ -0,0 +1 @@
|
||||
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
|
||||
1
pki/tls/certs/ca-bundle.trust.crt
Symbolic link
1
pki/tls/certs/ca-bundle.trust.crt
Symbolic link
@@ -0,0 +1 @@
|
||||
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
|
||||
62
pki/tls/certs/localhost.crt
Normal file
62
pki/tls/certs/localhost.crt
Normal file
@@ -0,0 +1,62 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEwjCCAqqgAwIBAgIIGAnchZHei3IwDQYJKoZIhvcNAQELBQAwezELMAkGA1UE
|
||||
BhMCVVMxFDASBgNVBAoMC1Vuc3BlY2lmaWVkMR8wHQYDVQQLDBZjYS03OTQxNzg5
|
||||
MjgyOTQ4NTMxMjE1MRQwEgYDVQQDDAt6aXJhLjg5OC5ybzEfMB0GCSqGSIb3DQEJ
|
||||
ARYQcm9vdEB6aXJhLjg5OC5ybzAeFw0yMDA5MjIwODI4MDFaFw0yMTA5MjcxMDA4
|
||||
MDFaMFoxCzAJBgNVBAYTAlVTMRQwEgYDVQQKDAtVbnNwZWNpZmllZDEUMBIGA1UE
|
||||
AwwLemlyYS44OTgucm8xHzAdBgkqhkiG9w0BCQEWEHJvb3RAemlyYS44OTgucm8w
|
||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1WL8kPaksrTnDCcj4Ja3B
|
||||
+NGtnuoIuFDViht/DTBfBYmB2E+yXyBX+z/U3cXVoPL2BF8GRvgCxtlahYXj1B54
|
||||
fkCRpsPjzurnZnh37AHRUtoCBIarUfsxeNdNucDUVlDAFedMCQ4Xsy14ugAd/zVd
|
||||
fpHdEegfyTb1tVDu7cv6QqGUDUFbHoPnxOCc2UHSHpsMJ4P5jIXz9J82Umf/SIU+
|
||||
5c+/AP5u9Zvcq2AGxhO//wAm3MMZ9O2S2CU24jAYpYsvciYQS1ItPI1IYzewlySv
|
||||
Q7rSUjTlt19Om9vXOfhNqGcQrICWRW8Ij4YVjBekZmoLTygXJh7JkGLbZVxQU4Rn
|
||||
AgMBAAGjazBpMA4GA1UdDwEB/wQEAwIFoDATBgNVHSUEDDAKBggrBgEFBQcDATAJ
|
||||
BgNVHRMEAjAAMBYGA1UdEQQPMA2CC3ppcmEuODk4LnJvMB8GA1UdIwQYMBaAFI4O
|
||||
45SEa0LcJWPzqxxyvb36qo7hMA0GCSqGSIb3DQEBCwUAA4ICAQAauwjYexszL4+2
|
||||
b5hSVLMU4+eKYjsryyhs0jaXas9+ijTK426wbkBXEhdfFRz0F0U4CmubAKX8wnxY
|
||||
/GcneW82fZ7wZRc4gHHuiOaMq89MmHdtvHESMSb2Zr+BsybMelai5ZUHZdj452Zx
|
||||
2r4eTdVxDxjbsWH3qain8zYxBsFh7Z4LUnexOIk+GQYepsDOtQY3TubeDf75RUlR
|
||||
Hrxoh1EIY7tk6781q6fMaTqiQjC2zwpVgVSCrtS2iQUXsJZHCY0HCpjOiXT8DPHa
|
||||
hkC+ySY+cO2eKi01i3YM2M3KsLZj7VSLINbnhk+nrHIynMGhTbXoKJYXKq2D8j7l
|
||||
HpeQVbRr2VaFFiJdR6oPOJ5g5u9S5pHP0AoOdSQaw7G84Tj7qN+lhShowYo3APeN
|
||||
cqCmjpNNuAdjWXdC5Jf10EoI1aXeFv+uWTyKW1Dz3m2yFAkDw2/2HbgiZt9Cn1sg
|
||||
R1ml1aJnNpm+33ZPVcuG44uVMC4rK5KOxfUlnDW99ngJOi4Bl3581kl9KuOSNPsQ
|
||||
z1Yd90knFCyE9rnSdSktDEas1zktkfRq5EG2lOzsS3J3LvGoRiK/KX4IVaOM8Ir6
|
||||
Ca7+6ZvA1TRaWyKWtJXORv8XvcM3qSlZmxobCgs3PBebgSlPxBjspQKrEQIuvEiP
|
||||
GqE+KY33rltG5isQ9Xj1bdgwb9i0Sw==
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIF6zCCA9OgAwIBAgIIbjbnRoMmxA8wDQYJKoZIhvcNAQELBQAwezELMAkGA1UE
|
||||
BhMCVVMxFDASBgNVBAoMC1Vuc3BlY2lmaWVkMR8wHQYDVQQLDBZjYS03OTQxNzg5
|
||||
MjgyOTQ4NTMxMjE1MRQwEgYDVQQDDAt6aXJhLjg5OC5ybzEfMB0GCSqGSIb3DQEJ
|
||||
ARYQcm9vdEB6aXJhLjg5OC5ybzAeFw0yMDA5MjIwODI4MDFaFw0yMTA5MjcxMDA4
|
||||
MDFaMHsxCzAJBgNVBAYTAlVTMRQwEgYDVQQKDAtVbnNwZWNpZmllZDEfMB0GA1UE
|
||||
CwwWY2EtNzk0MTc4OTI4Mjk0ODUzMTIxNTEUMBIGA1UEAwwLemlyYS44OTgucm8x
|
||||
HzAdBgkqhkiG9w0BCQEWEHJvb3RAemlyYS44OTgucm8wggIiMA0GCSqGSIb3DQEB
|
||||
AQUAA4ICDwAwggIKAoICAQDMxBjI05dzfL9xf8sFj+RFOZz9kNxzlLI+vRswRHxS
|
||||
GWXA1CEDb/wal1BKUd/qYAhBNSbICe+KYbap8VxVrVLiFxwneYk63TltsdRMf40H
|
||||
mWkC0L0YQ8PzVqZUCbc4RHDypv+x+GvRXHmkGGrcXchRVWsA+L8F2hD1+wQTidS2
|
||||
qqcwfCUzDV4hqK8jF5ZknTF6xryvOWvfpfU38tXnUYKdm31vvIwo2q8d8CoiY6Qp
|
||||
10FkYVgK/6WW5c577BM6/aqjHBbAN8l/ZDJQC0Jfq+pGtT0BE6Tis4Zun8qQyCoX
|
||||
rt7x/gFCZeSgDzU7A7T/ULZcFNL69xtCVhlBqjdGoiVKax+zT/81Et84OHDzBZxO
|
||||
Yrvq3kDJwm/5Sg3ZdvQHK8Kq8l1QS4m1AygYv8yJXAGIVBlrrmeT90WFDknMuI1l
|
||||
O4vjP6SpcJmNj0bKC+aWhtv0fbfA+ghXp+McYY43Z34W/8wlQ7AQa8BKcwX1Lk+d
|
||||
FEpZUz+j8UxsRZE3p2aatV2R2IkIRUaHnsQbtfymcG2fZs1GawBWp2SpDEyPPhf4
|
||||
I6n5uxxC9UAl7VeBeeKexGSSsry7WQ+Vd9oVmv3Y8samQ/s80HrsIIvLe31X3RHH
|
||||
ZmttALwb+9plgKhXdwoHruuPkdsMO7Qm/HNUSci66hnVqJ2u0R2u1GYesg63LXe4
|
||||
CQIDAQABo3MwcTAOBgNVHQ8BAf8EBAMCAqQwDAYDVR0TBAUwAwEB/zAaBgNVHR4E
|
||||
EzARoA8wDYILemlyYS44OTgucm8wFgYDVR0RBA8wDYILemlyYS44OTgucm8wHQYD
|
||||
VR0OBBYEFI4O45SEa0LcJWPzqxxyvb36qo7hMA0GCSqGSIb3DQEBCwUAA4ICAQCh
|
||||
pO0Za0QFj6yYyISXhD+vQBJjoEAY0MC+Ue8RI4T7GK9Ki+7LsMsmUdhXTQC5KQHm
|
||||
AyesT3u50OcMZBWhTt0u5Xkwyl3WyPc670/ZrLBdOoiHQoX3zrZp7vjwJEk3xP/Y
|
||||
6ghnQei8LOoSvW9LXUteoXRdV2ZVUGFfqPleQ6yuqBHIKWI/9/yuEBEk6SOOPN3D
|
||||
kx97QH9DUTABqJ+RX3+uTBnSZUHI0kUTHo3Hv0QmxtIQKsIizIKGXIrcTO+3ZhX0
|
||||
uZNr1DsRXfFYrKwZ8srGkqM81LeEewDvm1GS+Ol3/Df0tFd4Gk5oEEOcfeQat4x0
|
||||
HH0lp1oCKKlF2QGe9y/D6B2i76lLmqBcFR/KPAvm8b6esETkHxd4Aci8+WArwevx
|
||||
Bu8b/GphDOajATrYYCbwszXeE1WggVaaAL2zRsTEpgDaBKJUZL5kwIyEYydJKHfC
|
||||
PTBEZI6CqImpsAmDAiwHZX2H2MQ4FzD3fLHGfrCBZArxd6cjLxLojkEugPDfyBaT
|
||||
wqW99eA9YQbUC8YgbSIbNEPbFlGWQoJdxeEkLwhGLlipVY9K8g93niQR4335ZlQD
|
||||
VJvtrrw36iOuiBirD/ysVp0cVC7534Q50kV0Tul4+G8vi3Yuo+Y5G6ta40Kv7qe2
|
||||
DGCKWlZ1S8vi4AfdnKNazRqppDOzq4ygyfddMAA4YA==
|
||||
-----END CERTIFICATE-----
|
||||
35
pki/tls/certs/postfix.pem
Normal file
35
pki/tls/certs/postfix.pem
Normal file
@@ -0,0 +1,35 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIGHzCCBAegAwIBAgICO5IwDQYJKoZIhvcNAQELBQAwgacxCzAJBgNVBAYTAi0t
|
||||
MRIwEAYDVQQIDAlTb21lU3RhdGUxETAPBgNVBAcMCFNvbWVDaXR5MRkwFwYDVQQK
|
||||
DBBTb21lT3JnYW5pemF0aW9uMR8wHQYDVQQLDBZTb21lT3JnYW5pemF0aW9uYWxV
|
||||
bml0MRQwEgYDVQQDDAt6aXJhLjg5OC5ybzEfMB0GCSqGSIb3DQEJARYQcm9vdEB6
|
||||
aXJhLjg5OC5ybzAeFw0yMDA5MjExNzQ3NTlaFw0yMTA5MjExNzQ3NTlaMIGnMQsw
|
||||
CQYDVQQGEwItLTESMBAGA1UECAwJU29tZVN0YXRlMREwDwYDVQQHDAhTb21lQ2l0
|
||||
eTEZMBcGA1UECgwQU29tZU9yZ2FuaXphdGlvbjEfMB0GA1UECwwWU29tZU9yZ2Fu
|
||||
aXphdGlvbmFsVW5pdDEUMBIGA1UEAwwLemlyYS44OTgucm8xHzAdBgkqhkiG9w0B
|
||||
CQEWEHJvb3RAemlyYS44OTgucm8wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
|
||||
AoICAQDJZ6qe6hnqx+bkqMlPaTjY8AQqis6svbOhMOwF3+kKDqWmHSyDZaSN3001
|
||||
1fExY5gMnYPp3mW4L96lF6YEUk46gcLM4o+jPRBw6pqe9WANF31RhsoumV9/cOvQ
|
||||
9Yizf+StTyyXATH/Ih4Rh3iHlsHzEGOiCgbvYddAbT/qE1w4di+jHMBZ/r3MNqIE
|
||||
vDZlyU+q5KYfp8TLkbdTuLru/XZsRRX43wIDVQFRXRj0H5oSRaBUN2iAuBUeH7uq
|
||||
t3aKPA56zJo12dtq2wzehQMouDu4fZIgsPR99RN/m4pOdVoDVU+9SmF8xlUHqCrj
|
||||
6ajxtKT9goiEXZKgSKH6SQRJBz3GioVUQtp1m46A0Ty9fW/AuQsoRkGycL17GnsV
|
||||
L7qZCx6cvWkQbJ3ksFntYNSqYQ1v2x6XPoaww1HCWZ58P89j11Ba1GtDwS38d4F9
|
||||
EdzY+1OqC6NjCP9ZfqxD4HYUKYo40/xbWOx1g/O8Qq+RK7y2GPOzRPsLtVKj2wYn
|
||||
MtauzvbHgNpy1NTyp5n9PdaSa9UlwpETtwM4MuW+Dmx+PnO/ftldqDMWIsZ2FHSt
|
||||
ACEnnzz7qaWgAzqCEnSdpnUYfXsJPh8YcFACnBpBh23/A508nAVYY4tEWWYMkchR
|
||||
Gba5OloIoiNQNs6xA5oK6U8cFsBDS5+WqF5hkeOyBARTDZ6kCQIDAQABo1MwUTAd
|
||||
BgNVHQ4EFgQUwmxLqf4lHqiJ6C9O0ByjBvphajkwHwYDVR0jBBgwFoAUwmxLqf4l
|
||||
HqiJ6C9O0ByjBvphajkwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC
|
||||
AgEAW4P6bEucZizc1ZcQhnWo6GAtqgVUpv5g9SyRjHpHQDpKyltQ1LcP8lUh37Hs
|
||||
huDSW2KaBTN/8m1VjbTCUi76SbKdtNNXRjWVW6kNAnmaUCWZ+RWDnwvBCfXqlHAt
|
||||
+400q5Ns6f3jMZ3J9fzKnHOdVJWAaNb035+IHlJV5ahBtPyj64tOtp71g1b2qv2E
|
||||
Eks5VPYy1p35k47SxBKLpnqn7kA4tUBRNT9cDKxRchjW/wsDwunzsoliwDwWKXCR
|
||||
7fRBIRDJzAY382fxBgRIP/QoMQ7WDZrHs3vEJhgQF/YoFtR2gABa1G8fa/09PTBj
|
||||
Qsqi5OGQN2uJqxFDnCjvf1DzZEF5CQyrmG3k+KkEJ/uqQMbafkxx3JdpYgaGsTV2
|
||||
kvSTOqz2+k+iwUDk96l2cg/gHQUNqaGFAMyBDi8iQki+o77UM5CEhL09Zff0vIRf
|
||||
2OcnIj6WDZ5b/sVQN9Qbp8Hwh5epDox/m9iTjJViAY3boTmwOftwlQwMOwI5+IgB
|
||||
1kAH+5wsnJEC8bSTsvD+fXPyS7BMoBz+eQg+Ro7XrssSaEgSN9HeFyoENSrH5Pc4
|
||||
cWmPXVXlN0Vgs7rPhw20YP/MdVN7fnfD/jKMvkb/im0Eq7uhOdQe5j2e6/YM3qWw
|
||||
K0VUmNVmpbTexmLHMULYS148jMELqy2q8YyNEl1AaYkHdsw=
|
||||
-----END CERTIFICATE-----
|
||||
9
pki/tls/ct_log_list.cnf
Normal file
9
pki/tls/ct_log_list.cnf
Normal file
@@ -0,0 +1,9 @@
|
||||
# This file specifies the Certificate Transparency logs
|
||||
# that are to be trusted.
|
||||
|
||||
# Google's list of logs can be found here:
|
||||
# www.certificate-transparency.org/known-logs
|
||||
# A Python program to convert the log list to OpenSSL's format can be
|
||||
# found here:
|
||||
# https://github.com/google/certificate-transparency/blob/master/python/utilities/log_list/print_log_list.py
|
||||
# Use the "--openssl_output" flag.
|
||||
368
pki/tls/openssl.cnf
Normal file
368
pki/tls/openssl.cnf
Normal file
@@ -0,0 +1,368 @@
|
||||
#
|
||||
# OpenSSL example configuration file.
|
||||
# This is mostly being used for generation of certificate requests.
|
||||
#
|
||||
|
||||
# Note that you can include other files from the main configuration
|
||||
# file using the .include directive.
|
||||
#.include filename
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
# Load default TLS policy configuration
|
||||
|
||||
openssl_conf = default_modules
|
||||
|
||||
[ default_modules ]
|
||||
|
||||
ssl_conf = ssl_module
|
||||
|
||||
[ ssl_module ]
|
||||
|
||||
system_default = crypto_policy
|
||||
|
||||
[ crypto_policy ]
|
||||
|
||||
.include /etc/crypto-policies/back-ends/opensslcnf.config
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
# Policies used by the TSA examples.
|
||||
tsa_policy1 = 1.2.3.4.1
|
||||
tsa_policy2 = 1.2.3.4.5.6
|
||||
tsa_policy3 = 1.2.3.4.5.7
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = /etc/pki/CA # Where everything is kept
|
||||
certs = $dir/certs # Where the issued certs are kept
|
||||
crl_dir = $dir/crl # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
#unique_subject = no # Set to 'no' to allow creation of
|
||||
# several certs with same subject.
|
||||
new_certs_dir = $dir/newcerts # default place for new certs.
|
||||
|
||||
certificate = $dir/cacert.pem # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crlnumber = $dir/crlnumber # the current crl number
|
||||
# must be commented out to leave a V1 CRL
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/private/cakey.pem# The private key
|
||||
|
||||
x509_extensions = usr_cert # The extensions to add to the cert
|
||||
|
||||
# Comment out the following two lines for the "traditional"
|
||||
# (and highly broken) format.
|
||||
name_opt = ca_default # Subject Name options
|
||||
cert_opt = ca_default # Certificate field options
|
||||
|
||||
# Extension copying option: use with caution.
|
||||
# copy_extensions = copy
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crlnumber must also be commented out to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 365 # how long to certify for
|
||||
default_crl_days= 30 # how long before next CRL
|
||||
default_md = sha256 # use SHA-256 by default
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_match
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = 2048
|
||||
default_md = sha256
|
||||
default_keyfile = privkey.pem
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extensions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||
string_mask = utf8only
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = XX
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
#stateOrProvinceName_default = Default Province
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = Default City
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = Default Company Ltd
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_max = 64
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "OpenSSL Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
# An alternative to produce certificates that aren't
|
||||
# deprecated according to PKIX.
|
||||
# subjectAltName=email:move
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
# This is required for TSA certificates.
|
||||
# extendedKeyUsage = critical,timeStamping
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer
|
||||
|
||||
basicConstraints = critical,CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always
|
||||
|
||||
[ proxy_cert_ext ]
|
||||
# These extensions should be added when creating a proxy certificate
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "OpenSSL Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
# An alternative to produce certificates that aren't
|
||||
# deprecated according to PKIX.
|
||||
# subjectAltName=email:move
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
# This really needs to be in place for it to be a proxy certificate.
|
||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||
|
||||
####################################################################
|
||||
[ tsa ]
|
||||
|
||||
default_tsa = tsa_config1 # the default TSA section
|
||||
|
||||
[ tsa_config1 ]
|
||||
|
||||
# These are used by the TSA reply generation only.
|
||||
dir = /etc/pki/CA # TSA root directory
|
||||
serial = $dir/tsaserial # The current serial number (mandatory)
|
||||
crypto_device = builtin # OpenSSL engine to use for signing
|
||||
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||
# (optional)
|
||||
certs = $dir/cacert.pem # Certificate chain to include in reply
|
||||
# (optional)
|
||||
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||
signer_digest = sha256 # Signing digest to use. (Optional)
|
||||
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||
# (optional)
|
||||
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||
digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
|
||||
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||
ordering = yes # Is ordering defined for timestamps?
|
||||
# (optional, default: no)
|
||||
tsa_name = yes # Must the TSA name be included in the reply?
|
||||
# (optional, default: no)
|
||||
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||
# (optional, default: no)
|
||||
ess_cert_id_alg = sha1 # algorithm to compute certificate
|
||||
# identifier (optional, default: sha1)
|
||||
28
pki/tls/private/localhost.key
Normal file
28
pki/tls/private/localhost.key
Normal file
@@ -0,0 +1,28 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC1WL8kPaksrTnD
|
||||
Ccj4Ja3B+NGtnuoIuFDViht/DTBfBYmB2E+yXyBX+z/U3cXVoPL2BF8GRvgCxtla
|
||||
hYXj1B54fkCRpsPjzurnZnh37AHRUtoCBIarUfsxeNdNucDUVlDAFedMCQ4Xsy14
|
||||
ugAd/zVdfpHdEegfyTb1tVDu7cv6QqGUDUFbHoPnxOCc2UHSHpsMJ4P5jIXz9J82
|
||||
Umf/SIU+5c+/AP5u9Zvcq2AGxhO//wAm3MMZ9O2S2CU24jAYpYsvciYQS1ItPI1I
|
||||
YzewlySvQ7rSUjTlt19Om9vXOfhNqGcQrICWRW8Ij4YVjBekZmoLTygXJh7JkGLb
|
||||
ZVxQU4RnAgMBAAECggEAbgREGalqy9bflwqFqL27F1VrZ2hkVRv0tkfN/Js0wEDs
|
||||
tiBT4UPCrH2ZsPtGPR8ipsvqFjXR2mVmkXs1ygzy22jEpVhFuRvb+Lx6004ToDki
|
||||
V10FkkPvH4lPHTFW4brnzFC9fKx1pz0llftJfOlKJ8lUloh5iWcZ96CjVABh4hWp
|
||||
le+vIuuVeC1+mWLXG7NAHI6i6FKCLaERa+ES7e7Sb9QH+hSXlMnpsYex5FqOfr6U
|
||||
NQJoBPsGyMGemBArzJL7VZDnv36UxxxvcTRwAx/g/Cv6iFOOIg8o32LJQL1nOtOC
|
||||
pQgtdOMZkc2G6DWsp4w33dRIpTaAPfv5egUSmVkPMQKBgQDt877YSRBiT3U8RhBG
|
||||
nuS0oK2iKq9OWpUGEC9CvkaulgLr+lXH1ei8ZSowrA3CoTPzQyWzMANh8K66/B9D
|
||||
3ktbkLdv2id6sYbSOOFSTASxhV4wzZvJuhmmwU4tIcCTZYt0TdXdozmLbH7Q0L9Z
|
||||
w0MYFmWIr8KMqGA8ZTbMrgNZfwKBgQDDGehZQMHwP+TRPnGQpBoz/uMxJatVJvyW
|
||||
rUPbF4Rm6QbLLygGaE/W9vo0sRs8rn5iSjXV2/OlYIxBLyxQVwaQ5NBm6+5INzMi
|
||||
sf27Y5TJU8f+UF4qYr5ACJbXpLJo7fEdy2Pp08UG+NxMVLtnJcAlrUK+0m0v/IYy
|
||||
AAAvVS25GQKBgQCvDVMH4HBqMpRHnC+bFIeiDlbOZ2KCXQcm578s9bgf9gH+QjLb
|
||||
CZXnCvGHzvtshJUoT+yrLxY99gdFTfdeQWnk2cjpQ28pxvItM2Un2v7U7g2GD6yd
|
||||
Mghu8eSmNR9sEBcQn7ZHEC5kUJPW4Mr0qT5xuQBHFy4jtjbeF4PB/f4+1wKBgBqY
|
||||
n4n7P/TmYOT9ZDHZjRDlgEck4XRcOja4K/XkANKelaSBKy2kbq3ZQUaJljLxfp0b
|
||||
jLc4osA6pyQDsEDLfEOoTZiaNQN3MutZ5EL1UkUXvL24av3QNCs6gIWpGAEh3qq3
|
||||
HUm06rkGl9F4A4wOI2F/ewfUW7oc7JZIVb4eGHuRAoGAI4FC/cxs/26Ua6polQ5M
|
||||
/VL2K0r9JUvmI5aDB+oLOp9WeN5+Qh9q8syJsv8vtXVvm/Ix/cktLSl556/JskNO
|
||||
0HLbaP8fw82nVQDx7IrPGOm32G1pNKq3U8WnNw/HYQbgbuEAeMyWlHadh2js13Bi
|
||||
bT5vv+K2UReRJjCJOPT7kAc=
|
||||
-----END PRIVATE KEY-----
|
||||
51
pki/tls/private/postfix.key
Normal file
51
pki/tls/private/postfix.key
Normal file
@@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKgIBAAKCAgEAyWeqnuoZ6sfm5KjJT2k42PAEKorOrL2zoTDsBd/pCg6lph0s
|
||||
g2Wkjd9NNdXxMWOYDJ2D6d5luC/epRemBFJOOoHCzOKPoz0QcOqanvVgDRd9UYbK
|
||||
Lplff3Dr0PWIs3/krU8slwEx/yIeEYd4h5bB8xBjogoG72HXQG0/6hNcOHYvoxzA
|
||||
Wf69zDaiBLw2ZclPquSmH6fEy5G3U7i67v12bEUV+N8CA1UBUV0Y9B+aEkWgVDdo
|
||||
gLgVHh+7qrd2ijwOesyaNdnbatsM3oUDKLg7uH2SILD0ffUTf5uKTnVaA1VPvUph
|
||||
fMZVB6gq4+mo8bSk/YKIhF2SoEih+kkESQc9xoqFVELadZuOgNE8vX1vwLkLKEZB
|
||||
snC9exp7FS+6mQsenL1pEGyd5LBZ7WDUqmENb9selz6GsMNRwlmefD/PY9dQWtRr
|
||||
Q8Et/HeBfRHc2PtTqgujYwj/WX6sQ+B2FCmKONP8W1jsdYPzvEKvkSu8thjzs0T7
|
||||
C7VSo9sGJzLWrs72x4DactTU8qeZ/T3WkmvVJcKRE7cDODLlvg5sfj5zv37ZXagz
|
||||
FiLGdhR0rQAhJ588+6mloAM6ghJ0naZ1GH17CT4fGHBQApwaQYdt/wOdPJwFWGOL
|
||||
RFlmDJHIURm2uTpaCKIjUDbOsQOaCulPHBbAQ0uflqheYZHjsgQEUw2epAkCAwEA
|
||||
AQKCAgEAverial3oOItuP7qlshtPvsl9tDwWLa/ovhwqxFNjJdev/ldOTU1AgYPL
|
||||
A/QNL3xxuZui85qCos+JDHajVznhiKwp7BfMSKrhYQjo6vIJM+8tff4zkwOPmNX7
|
||||
mJyf3lvAYGjjbDV1VtduMStkzb6sfy66NOdtqLfDSX57oZfGA3v26cHH5FUh1nrC
|
||||
BuMQDKVrWYOo3vrNyQRMMkdlBs29qNTwpjBsboXu6zF1wWY3W/mJ+UASbCapyzEz
|
||||
PwUnY6zEHqnm1NbtX/LVTNNyqigoMI1AiVE0C75ZN6CNJ/Ti/3en7KBCE23WapT6
|
||||
dNY2OE4WsvMvFlpCVKCJFUFbKB4K8guT8xidST4HAKa++k/n1j8pt+IkPuvCG8Jf
|
||||
CGfDMlGWEQalu6ZmRmB6MD9AF2JRcsEFNpz2le3Cc3mkvafY2OpRn0MuQoAmV1W2
|
||||
OD2EYY9KU+/DG+H5RIMLUnYzbL6WX35nRpLVUXIHHOcmVXKFJWHhzIB8wecbyw8x
|
||||
VsmUJl9jS3aZzrALXIoFZkk7Q2mHeqz/tQj9uzCDYs5U9zFS6n3Livw2C6T5ERqs
|
||||
EJ2ZINj8iEjGD/eGOCaK8gREaXCCPods4F4TfmcDwW4o6haUPCN02CgikRLquxqj
|
||||
ltbm4BmfpsicKWoWpuWhhQ63neKOFWUWB4npBgVqHoUJKKrvHg0CggEBAO6THgNK
|
||||
ffJ444aGGcqKOcxKCt9hukhlzMK2IoB3oneTDjn+wU5FnAtqZMqRhJC850gsQDJX
|
||||
L+I8btADM3oZxU/jQexlWz+8hjCadRCztV8zHaNDeiIuqA5Lfz3Ig3I1/pdlWL/L
|
||||
hzEKTgSyicVpdoafFznbhhh29cEW79GMXBCa15ozLoVsQfDfm8vRBbIkYS/myOyW
|
||||
wu0wEyIchwoU7sRiSsefBO+pOIAQo5XCpEakdHlQ1grkV6hNEn28aDJgKYLi2tBj
|
||||
VktdGzdGRV+YghVug/pfeZp0LFkxK/qdFdjKzQKNoIOBpB5mf2VrjekNnHJ9aZ/e
|
||||
C1vf8ab92cwyEzcCggEBANgdjCxMYB6hQhWL5bSNjp4MN62WDy5uiod+2JV0p+Qk
|
||||
t7DK9KJaXkxGwAUCdeXzjB9FzcpgqZgUQa/wpZCuAaMAE+UQLb/UT8OnkJdDrfYP
|
||||
efggTLKEGNRS6NNzqYVpb8IaNdX4LA/LGY101r9B2sKyd8VXoDU4GQOgKWMb76ZH
|
||||
xsANhKbKMoD5yK1Ux6go+RStzgiPwmh3dpBEjyx5caB+8xBthrzgi3zuah5X+XOK
|
||||
e+hYoU0UAf1HGkndDnj621Ef3Z+TvaIGlusB256IUsh//WNdTlM1X4A04TMcAwdJ
|
||||
up80LlN9XSzQgy8IKwlIF11yNKfUm24B+o1JSvRzIr8CggEAVpS9h6Q5IQ4ORHvW
|
||||
UFLptuIIIBlvaWbIcMF4s/a2135e4104+hb5EouCGKHG4mAr711fzuUlU41rCcKf
|
||||
o+hGWz+2ZPxDqVXZvTnQ0kblw67hSqbqZA1aoBV2EA385i4CPx9gnfpXDc0Xk0zY
|
||||
AvTLNv/1heHNQIOrnG+eiQXPQ5duN1/rujAXnjsIZ2dsEcJyItg2guYTx9ByoSaJ
|
||||
O3dtT4f8a4WiXPeksZVYSLlitOBqBLz5cOp9hW6zDz6Y8e9EIWQC1S2325HmlqDB
|
||||
/Hd0fiKlcu/DSfJvRc86jrEDhLHUxOBxKEicLwwzn7LwxWtTI5mwA3yp0qXrJRdr
|
||||
O1fQ8QKCAQEAwzwmNpqktucNMTPZxvue3G7DGeEXQ+X+5ZsVBCeHyJXXEDK5P7YN
|
||||
vDCqJZxsb9lOO64u0+XxL/8UvGHU4FgiCGP4lRXBjqu5h1JoUA6HKGQg1qQvRZIK
|
||||
cD2aMfQqL+jpWludSPhSrc3X/q+PlOZkP0FE7BVWGN3d0yWsXemN3RS4myVbMeY2
|
||||
K8f7n4KYf/TL1/+PwrJEeWV6yaf2A8KOgOROpwebEiR0Pt+PJGxrYRK5D1SKG3y4
|
||||
s1u5hwLZoTdWS/pSl2e7h5UWX6WlBpm214Swn0RajtcHuGWNEEP9BGd53XshYrE9
|
||||
LFAOQr3JSzBCU1vp77gk1gOZmmuc+CrPNwKCAQEAokk37mcrsaN/1qy88tWZ0Iro
|
||||
EUdXRsCxf1riS2Hn93l+Gs6B7+UrKn5vPIJi163hqStpX+iciPfimrrBUhOEdyEE
|
||||
Dzmwo4ZjcNFssc4amYVsLXy037JAkuotqhasttxlzkC/OJBjXEfvvmsSRFnqqr9G
|
||||
/3HAXhzWXTYuMEa2VQiOgyfD2nY1FmA/efVsnbi/PWO4WOnS4z+LuAZRmL5ylIkg
|
||||
vnLKmqGwitigwPdz/48YCr0r1aIW5P6IzQIzEQTjSTyZv48CYLiafMkhjWkkWO5Y
|
||||
16umJSrBMEC1KEqcm8Lax07ecdKrpy5lOrcxLL0hhCFwycIeZ/Tei4rnjK8//w==
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Reference in New Issue
Block a user