maybe chmod 0644 'letsencrypt/csr/3524_csr-certbot.pem'
maybe chmod 0644 'letsencrypt/csr/3525_csr-certbot.pem'
maybe chmod 0644 'letsencrypt/csr/3526_csr-certbot.pem'
+maybe chmod 0644 'letsencrypt/csr/3527_csr-certbot.pem'
maybe chmod 0700 'letsencrypt/keys'
maybe chmod 0600 'letsencrypt/keys/0000_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0001_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/3525_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/3526_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/3527_key-certbot.pem'
+maybe chmod 0600 'letsencrypt/keys/3528_key-certbot.pem'
maybe chmod 0755 'letsencrypt/live'
maybe chmod 0755 'letsencrypt/live/ccu.hoellein.online'
maybe chmod 0644 'letsencrypt/live/ccu.hoellein.online/README'
jceks.key.serialFilter = java.lang.Enum;java.security.KeyRep;\
java.security.KeyRep$Type;javax.crypto.spec.SecretKeySpec;!*
+#
+# PKCS12 KeyStore properties
+#
+# The following properties, if configured, are used by the PKCS12 KeyStore
+# implementation during the creation of a new keystore. Several of the
+# properties may also be used when modifying an existing keystore. The
+# properties can be overridden by a KeyStore API that specifies its own
+# algorithms and parameters.
+#
+# If an existing PKCS12 keystore is loaded and then stored, the algorithm and
+# parameter used to generate the existing Mac will be reused. If the existing
+# keystore does not have a Mac, no Mac will be created while storing. If there
+# is at least one certificate in the existing keystore, the algorithm and
+# parameters used to encrypt the last certificate in the existing keystore will
+# be reused to encrypt all certificates while storing. If the last certificate
+# in the existing keystore is not encrypted, all certificates will be stored
+# unencrypted. If there is no certificate in the existing keystore, any newly
+# added certificate will be encrypted (or stored unencrypted if algorithm
+# value is "NONE") using the "keystore.pkcs12.certProtectionAlgorithm" and
+# "keystore.pkcs12.certPbeIterationCount" values defined here. Existing private
+# and secret key(s) are not changed. Newly set private and secret key(s) will
+# be encrypted using the "keystore.pkcs12.keyProtectionAlgorithm" and
+# "keystore.pkcs12.keyPbeIterationCount" values defined here.
+#
+# In order to apply new algorithms and parameters to all entries in an
+# existing keystore, one can create a new keystore and add entries in the
+# existing keystore into the new keystore. This can be achieved by calling the
+# "keytool -importkeystore" command.
+#
+# If a system property of the same name is also specified, it supersedes the
+# security property value defined here.
+#
+# If the property is set to an illegal value,
+# an iteration count that is not a positive integer, or an unknown algorithm
+# name, an exception will be thrown when the property is used.
+# If the property is not set or empty, a default value will be used.
+#
+# Note: These properties are currently used by the JDK Reference implementation.
+# They are not guaranteed to be examined and used by other implementations.
+
+# The algorithm used to encrypt a certificate. This can be any non-Hmac PBE
+# algorithm defined in the Cipher section of the Java Security Standard
+# Algorithm Names Specification. When set to "NONE", the certificate
+# is not encrypted. The default value is "PBEWithSHA1AndRC2_40".
+#keystore.pkcs12.certProtectionAlgorithm = PBEWithSHA1AndRC2_40
+
+# The iteration count used by the PBE algorithm when encrypting a certificate.
+# This value must be a positive integer. The default value is 50000.
+#keystore.pkcs12.certPbeIterationCount = 50000
+
+# The algorithm used to encrypt a private key or secret key. This can be
+# any non-Hmac PBE algorithm defined in the Cipher section of the Java
+# Security Standard Algorithm Names Specification. The value must not be "NONE".
+# The default value is "PBEWithSHA1AndDESede".
+#keystore.pkcs12.keyProtectionAlgorithm = PBEWithSHA1AndDESede
+
+# The iteration count used by the PBE algorithm when encrypting a private key
+# or a secret key. This value must be a positive integer. The default value
+# is 50000.
+#keystore.pkcs12.keyPbeIterationCount = 50000
+
+# The algorithm used to calculate the optional MacData at the end of a PKCS12
+# file. This can be any HmacPBE algorithm defined in the Mac section of the
+# Java Security Standard Algorithm Names Specification. When set to "NONE",
+# no Mac is generated. The default value is "HmacPBESHA1".
+#keystore.pkcs12.macAlgorithm = HmacPBESHA1
+
+# The iteration count used by the MacData algorithm. This value must be a
+# positive integer. The default value is 100000.
+#keystore.pkcs12.macIterationCount = 100000
+
# The iteration count used for password-based encryption (PBE) in JCEKS
# keystores. Values in the range 10000 to 5000000 are considered valid.
# If the value is out of this range, or is not a number, or is unspecified;
--- /dev/null
+-----BEGIN CERTIFICATE REQUEST-----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+-----END CERTIFICATE REQUEST-----
--- /dev/null
+-----BEGIN PRIVATE KEY-----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+-----END PRIVATE KEY-----