Changeset a61cf51
- Timestamp:
- 09/06/2012 11:18:54 PM (12 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 12.2, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gimp3, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/for-12.3, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/spidermonkey128, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 79b6251f
- Parents:
- 88a39b92
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
general/prog/dejagnu.xml
r88a39b92 ra61cf51 37 37 permanently.</para> 38 38 39 &lfs7 1_checked;39 &lfs72_checked; 40 40 41 41 <bridgehead renderas="sect3">Package Information</bridgehead> -
postlfs/security/mitkrb.xml
r88a39b92 ra61cf51 113 113 After unpacking the distribution tarball and if you have 114 114 <xref linkend="gnupg"/> installed, you can 115 authenticate the package with the following command: 116 </para> 117 118 <screen><userinput>gpg - -verify krb5-&mitkrb-version;.tar.gz.asc</userinput></screen> 115 authenticate the package. First, check the contents of the file 116 <filename>krb5-1.10.3.tar.gz.asc</filename>. 117 </para> 118 119 <screen><userinput>gpg --verify krb5-&mitkrb-version;.tar.gz.asc krb5-&mitkrb-version;.tar.gz</userinput></screen> 120 121 <para>You will probably see output similar to:</para> 122 123 <screen>gpg: Signature made Wed Aug 8 22:29:58 2012 GMT using RSA key ID F376813D 124 gpg: Can't check signature: public key not found</screen> 125 126 <para>You can import the public key with:</para> 127 128 <screen><userinput>gpg gpg --keyserver pgp.mit.edu --recv-keys 0xF376813D</userinput></screen> 129 130 <para>Now re-verify the package with the first command above. You should 131 get a indication of a good signature, but the key will still not be certified 132 with a trusted signature. Trusting the downloaded key is a separate operation 133 but it is up to you to determine the level of trust.</para> 119 134 120 135 <para> … … 144 159 <screen role="root"><userinput>make install && 145 160 146 for LIBRARY in gssapi_krb5 gssrpc k5crypto kadm5clnt_mit \ 147 kadm5clnt kadm5srv_mit kadm5srv kdb5 krb5 \ 148 krb5support verto-k5ev verto ; do 161 for LIBRARY in gssapi_krb5 gssrpc k5crypto kadm5clnt_mit kadm5srv_mit 162 kdb5 krb5 krb5support verto-k5ev verto ; do 149 163 chmod -v 755 /usr/lib/lib$LIBRARY.so.*.* 150 164 done &&
Note:
See TracChangeset
for help on using the changeset viewer.