PNG  IHDR;IDATxܻn0K )(pA 7LeG{ §㻢|ذaÆ 6lذaÆ 6lذaÆ 6lom$^yذag5bÆ 6lذaÆ 6lذa{ 6lذaÆ `}HFkm,mӪôô! x|'ܢ˟;E:9&ᶒ}{v]n&6 h_tڠ͵-ҫZ;Z$.Pkž)!o>}leQfJTu іچ\X=8Rن4`Vwl>nG^is"ms$ui?wbs[m6K4O.4%/bC%t Mז -lG6mrz2s%9s@-k9=)kB5\+͂Zsٲ Rn~GRC wIcIn7jJhۛNCS|j08yiHKֶۛkɈ+;SzL/F*\Ԕ#"5m2[S=gnaPeғL lذaÆ 6l^ḵaÆ 6lذaÆ 6lذa; _ذaÆ 6lذaÆ 6lذaÆ RIENDB` The submission protocol is a single XMLRPC. Request to http://server:port/, method = "wait_for_cert". The port, default "51235", is given in the server's certmaster.conf, and both the server and the port number are given in the client's minion.conf. The client does not authenticate. Request parameters are a single argument, PEM-formatted CSR, with the limitation that the header must be for "CERTIFICATE REQUEST" and not "NEW CERTIFICATE REQUEST". (The request as-sent is compared to a rebuilt copy which uses this header to determine if the request matches one which has already been received.) Response is a sequence of (boolean, string, string), either (true, issued-cert, issuer-cert), or (false, '', ''). The issued certificate is returned in PEM format. - Based on certmaster.py from certmaster 0.25.