785cbcb166
1) For newer pvops kernels we can use kernel.org sign files that are signed with a new (uncompromised, at least not known to be compromised yet) key 2) For older kernel, we need to use hash, as the kernel.org decided not to release update signature with a new key. In any case, use hash-based verification additionally, try to minimize trust put into kernel.org people...
10 lines
353 B
Plaintext
10 lines
353 B
Plaintext
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
Version: GnuPG v1.4.11 (GNU/Linux)
|
|
Comment: A revocation certificate should follow
|
|
|
|
iIkEIBECAEkFAk7lL6xCHQJLZXkgd2FzIHVzZWQgdG8gYXV0b3NpZ25pbmc7IGF1
|
|
dG9zaWduaW5nIHNlcnZlciB3YXMgY29tcHJvbWlzZWQuAAoJEMhroGpRfQ8OS7EA
|
|
nikD5S7mmNM0QRX+H4BDxvdWzXWyAKCTuDGOdLoZs8gnl/G5UKVjX9mVkg==
|
|
=eL49
|
|
-----END PGP PUBLIC KEY BLOCK-----
|