To verify the integrity of the UNAB RPM package run in a root shell on the target box where you have the RPM copied to (replace the rpm file name with what exactly you have)
# rpm -Kv uxauth-128-1.0.2865.x86_64.rpm uxauth-128-1.0.2865.x86_64.rpm: Header V3 RSA/SHA1 Signature, key ID 5caebc96: NOKEY Header SHA1 digest: OK (b9f2c37b174d2bd8a43a7abde844e5eb6fd03c20) V3 RSA/SHA1 Signature, key ID 5caebc96: NOKEY MD5 digest: OK (0ec3c4f22aa2bd89842df3ad0f9f8de2)
Note the NOKEYoutput here indicating that the RSA keys could not be verified due to the missing Public key for CA Technologies UNAB RPM package in the RPM keying
To import the Public key for CA Technologies UNAB RPM package first create a plain text file on the target box containing the key
# vi /tmp/RPM-GPG-KEY-CA -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.14 (GNU/Linux)
mQ########################################################################################################### =zxky -----END PGP PUBLIC KEY BLOCK-----
(note to copy and paste the contents of the file exactly as shown above without adding any extra characters, etc. also confirm that you load this web page using https to ensure integrity of this text)
After saving the key file submit this command to actually import the key in the rpm keyring
# rpm --import /tmp/RPM-GPG-KEY-CA
Now once again run this command to verify the integrity of the UNAB RPM package
# rpm -Kv uxauth-128-1.0.2865.x86_64.rpm uxauth-128-1.0.2865.x86_64.rpm: Header V3 RSA/SHA1 Signature, key ID 5caebc96: OK Header SHA1 digest: OK (b9f2c37b174d2bd8a43a7abde844e5eb6fd03c20) V3 RSA/SHA1 Signature, key ID 5caebc96: OK MD5 digest: OK (0ec3c4f22aa2bd89842df3ad0f9f8de2)
Note that now all signatures and hash sums show OK indicating integrity of the package