Key | Value |
---|---|
FileName | ./usr/share/pki/kra/webapps/kra/WEB-INF/web.xml |
FileSize | 60547 |
MD5 | 273728A3172DFBDC331F16730673BEF6 |
SHA-1 | 1131C6E609A59F8E60B63A76070E73394742BCB4 |
SHA-256 | 42479DBAFEEA27DF07C8F83D8BB1B8EC9FED0638B865F0CF8330389C018EABA2 |
SSDEEP | 768:9sQllC5//oKQKoZ7NOPQ5HqXobe784dSDNVCzgMeVHN:BydoagMeVHN |
TLSH | T18643A42E99E2E222DACA024D4995950DFF5C015FFE450C80B78DEE10DF9DED18B6BD22 |
hashlookup:parent-total | 5 |
hashlookup:trust | 75 |
The searched file hash is included in 5 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | FC4623DD558CCF07185EAD9DC751EDD8 |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Fedora Project |
PackageName | pki-kra |
PackageRelease | 1.fc32 |
PackageVersion | 10.8.3 |
SHA-1 | BD4B1CA939D472E569DA7C468AE01BD08A5796EC |
SHA-256 | 85E065971AF3DE2BB2B87FB6C8F929EF01A90B5007A258E3E5DC3996C9F9C286 |
Key | Value |
---|---|
FileSize | 183436 |
MD5 | D9B3DAF7049A06147415CA7852AC98CC |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 10.9.4-1 |
SHA-1 | A89D8D3C31C6794B36623AD0502D081A0A71BF32 |
SHA-256 | 9F75F6419605C1D66C300917E294E8AE6C07D5B5F6907EE601BB0F50316316ED |
Key | Value |
---|---|
FileSize | 190772 |
MD5 | 212BFB86EF3D39C3A0749BDFA72B7E97 |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Debian FreeIPA Team <pkg-freeipa-devel@alioth-lists.debian.net> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 10.9.4-1 |
SHA-1 | 569220DF5674F2768EAAC854750FE002DF1A43B9 |
SHA-256 | E97851D816694CF099265E724CA12FB70A0D3E796D7FAB91216CDEE72AB73FD9 |
Key | Value |
---|---|
FileSize | 181188 |
MD5 | 69C639B26B727588E52D9F99FC97EB09 |
PackageDescription | Certificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | pki-kra |
PackageSection | java |
PackageVersion | 10.8.3-1ubuntu1 |
SHA-1 | 683AA6EC733BFDA1F111B05D4D5D09790F457203 |
SHA-256 | B4C50810FE8F553B9EF82C7CC35307DD5FB892A695111513EBF4D4EE7172E2B5 |
Key | Value |
---|---|
MD5 | CF318AAA540AFDC9E6B9BE28B6563DAE |
PackageArch | noarch |
PackageDescription | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
PackageMaintainer | Fedora Project |
PackageName | pki-kra |
PackageRelease | 3.fc33 |
PackageVersion | 10.9.4 |
SHA-1 | 0733D0B79BC12513749233C2891283EC4913705C |
SHA-256 | F56147499F09A238BFAE627ED1462E6321C2A0D603790733D1C962CB5263D88A |