Key | Value |
---|---|
FileName | ./usr/share/pki/kra/webapps/kra/500.html |
FileSize | 6195 |
MD5 | 4BAB03BA9431E0BCCC6D1916AA46D7C8 |
SHA-1 | 06E8FC2DFFAF5FB8F5CEF4527C778CF8360D5A48 |
SHA-256 | 7EB71C406FBF97013F1B88D74F3B93EA6152129BFB82C7A6D2D5ABD8E8328E45 |
SSDEEP | 96:59Gymilfwhqzw3zyEY2yWESTXRJzs+u5mxm5nGfqQ+A:59jfwhq0Dyl/WdzznfCA |
TLSH | T1E6D120137F229335065521DCF8A3D6D4EBB8C032E563E786FA8F44C927E8A9C6D1890D |
hashlookup:parent-total | 23 |
hashlookup:trust | 100 |
The searched file hash is included in 23 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileSize | 183072 |
MD5 | 36DA275D8603592FF84753A0C2A3408A |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 10.10.2-3build1 |
SHA-1 | 1926E4A56D7410AA1BBDDB08510D0AA19B90CF64 |
SHA-256 | 7ADF077285996572C3978E0049B232D37F4E07230F409873151E1EAED2AB4ED2 |
Key | Value |
---|---|
FileSize | 192084 |
MD5 | 6B672BEAF607831E7DBB928D3908F0FC |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Debian FreeIPA Team <pkg-freeipa-devel@alioth-lists.debian.net> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 10.10.6-1 |
SHA-1 | 1D53C585BAAE0346C29588BAA9DACA75C810F946 |
SHA-256 | F668346574145E12CCD75E80D2C611137423087B7135E65EB3835CCCAE17A863 |
Key | Value |
---|---|
MD5 | C72BD98BC5F31B22D2FB0EAB31802CAC |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | CentOS Buildsys <bugs@centos.org> |
PackageName | pki-kra |
PackageRelease | 2.module_el8.5.0+945+a81e57da |
PackageVersion | 10.11.2 |
SHA-1 | 3DA48A68A947B316339A88C7555691979DA0F646 |
SHA-256 | B48DA03EE2576FCA941DB89E6F1EF6C7D39E128A0E95BE6444CC3734A814C2BB |
Key | Value |
---|---|
FileSize | 190924 |
MD5 | 2285333F339D280B598BA1066E156BDD |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Debian FreeIPA Team <pkg-freeipa-devel@alioth-lists.debian.net> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 10.10.2-3 |
SHA-1 | 47FFBEC126F7632D2CBD52C3DF218D42ED69FD8E |
SHA-256 | 8DEE054822C6949C3116D0DB699355622090D02C98BC72F08ACCDFC6A835E795 |
Key | Value |
---|---|
MD5 | CF7E9FE8650659D0B1FC784158DA7514 |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | CentOS Buildsys <bugs@centos.org> |
PackageName | pki-kra |
PackageRelease | 1.module_el8.5.0+876+d4bb8aa6 |
PackageVersion | 10.11.0 |
SHA-1 | 4F59AECEAAB249EC31D3B5B16F2353CDA5E328EC |
SHA-256 | ECD800A415DFDD1CC759DC3E0CE5F16F7C0E38EC5BDA7E464E66235BA3874E4F |
Key | Value |
---|---|
MD5 | E1D592DA7F6884695B07304802BFFDBA |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | AlmaLinux Packaging Team <packager@almalinux.org> |
PackageName | pki-kra |
PackageRelease | 4.module_el8.5.0+2616+5b1d191d |
PackageVersion | 10.11.2 |
SHA-1 | 534EA7C85A07416FCF83A334C069EC09874964D6 |
SHA-256 | 34481E6AD0DE2D548A72FB1FCCBD135105F83A2EB82DF6F12C7D011E881ED6C8 |
Key | Value |
---|---|
FileSize | 285764 |
MD5 | D31C7C02E4955869551B01ADB280673A |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Debian FreeIPA Team <pkg-freeipa-devel@alioth-lists.debian.net> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 11.0.0-1 |
SHA-1 | 5B6E7658FD7B7BD56727295FCB039A4986097F3A |
SHA-256 | 728857E57A63A45C5AD9856957F06499D66C7D08A64B2B096D8374411345CAC8 |
Key | Value |
---|---|
MD5 | A07E66D4B06CF9BEBB0AD535474B3AB9 |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Fedora Project |
PackageName | pki-kra |
PackageRelease | 6.fc34 |
PackageVersion | 10.10.5 |
SHA-1 | 6078E80425ED5262EAA51C0BE1F39480738682B1 |
SHA-256 | 12ED36E050C2BD6DA84CD0FFE94294B489E23AB974E6226A48531C592623B214 |
Key | Value |
---|---|
MD5 | C0FAD294827F0C1B7F90F5141E51D2DE |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | CentOS Buildsys <bugs@centos.org> |
PackageName | pki-kra |
PackageRelease | 0.1.module_el8.6.0+1038+e795ee4b |
PackageVersion | 10.12.0 |
SHA-1 | 6477717F01C40484D931198B40A11119CC18B019 |
SHA-256 | D59FF5DB91C4AA60317B1C190E2C0A69F45AA94F81D07F2896F035EC14CEB08B |
Key | Value |
---|---|
MD5 | 1844B5B409094C2E206392E3A1A554F7 |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | CentOS Buildsys <bugs@centos.org> |
PackageName | pki-kra |
PackageRelease | 3.module_el8.4.0+816+beb6e9a3 |
PackageVersion | 10.10.5 |
SHA-1 | 8373480DE50A9EAFDC782ADF6C3B483B21AC3912 |
SHA-256 | E0AE10C3D8CB57ACC3600F0B67D369DE482521ED038F892198464C1D2B5AB4E6 |