X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=doc%2Fintegrity.texi;h=171cdc179be94433453aa27cf072d168379f2f30;hb=0ed43747344437800094782e78313b1c41c2cc1c;hp=a88f1b2744de8abbee0e6e05d330db1563ad29ca;hpb=4e2b8c63eab68ac512e7a3ded08f6551903591a8;p=nncp.git diff --git a/doc/integrity.texi b/doc/integrity.texi index a88f1b2..171cdc1 100644 --- a/doc/integrity.texi +++ b/doc/integrity.texi @@ -4,7 +4,7 @@ You @strong{have to} check downloaded archives integrity and verify their signature to be sure that you have got trusted, untampered software. For integrity and authentication of downloaded binaries -@url{https://www.gnupg.org/, The GNU Privacy Guard} is used. You must +@url{https://www.gnupg.org/, GNU Privacy Guard} is used. You must download signature (@file{.sig}) provided with the tarball. For the very first time you need to import signing public key. It is @@ -19,19 +19,18 @@ uid NNCP releases @itemize @item -@verbatim -% gpg --keyserver hkp://keys.gnupg.net/ --recv-keys 0x2B25868E75A1A953 -% gpg --auto-key-locate dane --locate-keys releases at nncpgo dot org -% gpg --auto-key-locate wkd --locate-keys releases at nncpgo dot org -% gpg --auto-key-locate pka --locate-keys releases at nncpgo dot org -@end verbatim +@example +$ gpg --auto-key-locate dane --locate-keys releases at nncpgo dot org +$ gpg --auto-key-locate wkd --locate-keys releases at nncpgo dot org +@end example @item -@verbatiminclude .well-known/openpgpkey/hu/i4cdqgcarfjdjnba6y4jnf498asg8c6p.asc +@verbatiminclude .well-known/openpgpkey/nncpgo.org/hu/i4cdqgcarfjdjnba6y4jnf498asg8c6p.asc @end itemize Then you could verify tarballs signature: -@verbatim -% gpg --verify nncp-0.1.tar.xz.sig nncp-0.1.tar.xz -@end verbatim + +@example +$ gpg --verify nncp-@value{VERSION}.tar.xz.sig nncp-@value{VERSION}.tar.xz +@end example