return r;
}
-int pakfire_key_sign(struct pakfire_key* key,
+int pakfire_key_sign_string(struct pakfire_key* key,
FILE* f, const void* data, const size_t length, const char* comment) {
struct pakfire_key_signature signature = { 0 };
- char* s = NULL;
+ char* buffer = NULL;
int r;
// Create a signature
}
// Encode the signature to base64
- r = pakfire_b64encode(key->ctx, &s, &signature, sizeof(signature));
+ r = pakfire_b64encode(key->ctx, &buffer, &signature, sizeof(signature));
if (r < 0)
goto ERROR;
// Write the signature
- r = fprintf(f, "%s\n", s);
+ r = fprintf(f, "%s\n", buffer);
if (r < 0) {
ERROR(key->ctx, "Could not write the signature: %m\n");
r = -errno;
r = 0;
ERROR:
- if (s)
- free(s);
+ if (buffer)
+ free(buffer);
return r;
}
-int pakfire_key_signf(struct pakfire_key* key, FILE* s, FILE* f, const char* comment) {
+int pakfire_key_sign(struct pakfire_key* key, FILE* s, FILE* f, const char* comment) {
char* buffer = NULL;
size_t length = 0;
int r;
goto ERROR;
// Sign!
- r = pakfire_key_sign(key, s, buffer, length, comment);
+ r = pakfire_key_sign_string(key, s, buffer, length, comment);
ERROR:
if (buffer)
char* pakfire_key_dump(struct pakfire_key* key, size_t* length);
// Sign
-int pakfire_key_sign(struct pakfire_key* key,
- FILE* f, const void* data, const size_t length, const char* comment);
+int pakfire_key_sign(struct pakfire_key* key, FILE* s, FILE* f, const char* comment);
+int pakfire_key_sign_string(struct pakfire_key* key,
+ FILE* s, const void* data, const size_t length, const char* comment);
int pakfire_key_verify(struct pakfire_key* key,
FILE* f, const void* data, const size_t length);
int pakfire_key_import_from_string(struct pakfire_key** key,
struct pakfire_ctx* ctx, const char* data, const size_t length);
-int pakfire_key_signf(struct pakfire_key* key, FILE* s, FILE* f, const char* comment);
-
#endif /* PAKFIRE_KEY_H */
}
// Create the signature
- r = pakfire_key_signf(key, s, f, "Database Signature");
+ r = pakfire_key_sign(key, s, f, "Database Signature");
if (r) {
ERROR(repo->ctx, "Could not sign the database: %m\n");
goto ERROR;
}
// Create the signature
- r = pakfire_key_sign(self->key, f, data, data_length, comment);
+ r = pakfire_key_sign_string(self->key, f, data, data_length, comment);
if (r) {
PyErr_SetFromErrno(PyExc_OSError);
goto ERROR;
ASSERT_SUCCESS(pakfire_key_export(key, stdout, PAKFIRE_KEY_EXPORT_MODE_PRIVATE));
// Sign!
- ASSERT_SUCCESS(pakfire_key_sign(key, f, DATA, DATA_LENGTH, "UNTRUSTED COMMENT"));
+ ASSERT_SUCCESS(pakfire_key_sign_string(key, f, DATA, DATA_LENGTH, "UNTRUSTED COMMENT"));
// Rewind the file
rewind(f);