@ -110,7 +110,7 @@
|
||||
*/
|
||||
#define XBPS_PKGFILES "files.plist"
|
||||
|
||||
/**
|
||||
/**
|
||||
* @def XBPS_REPOIDX
|
||||
* Filename for the repository index property list.
|
||||
*/
|
||||
@ -1894,22 +1894,6 @@ int xbps_file_hash_check(const char *file, const char *sha256);
|
||||
bool xbps_verify_signature(struct xbps_repo *repo, const char *sigfile,
|
||||
unsigned char *digest);
|
||||
|
||||
/**
|
||||
* Verifies the RSA signature \sig_buf of bytes with hash \a digest
|
||||
* with the RSA public-key associated in \a repo.
|
||||
*
|
||||
* @param[in] repo Repository to use with the RSA public key associated.
|
||||
* @param[in] idxmeta Meta dictionary related to \a repo, containing
|
||||
* public-key field.
|
||||
* @param[in] sig_buf The signature of file content that has hash \digest.
|
||||
* @param[in] sigfilelen The length of signature.
|
||||
* @param[in] digest The digest of file content to verify.
|
||||
*
|
||||
* @return True if the signature is valid, false otherwise.
|
||||
*/
|
||||
bool xbps_verify_digest_signature(struct xbps_repo *repo, xbps_dictionary_t idxmeta,
|
||||
unsigned char *sig_buf, size_t sigfilelen, unsigned char *digest);
|
||||
|
||||
/**
|
||||
* Verifies the RSA signature of \a fname with the RSA public-key associated
|
||||
* in \a repo.
|
||||
|
@ -149,8 +149,7 @@ int HIDDEN xbps_register_pkg(struct xbps_handle *, xbps_dictionary_t);
|
||||
void HIDDEN xbps_transaction_conflicts(struct xbps_handle *, xbps_array_t);
|
||||
char HIDDEN *xbps_archive_get_file(struct archive *, struct archive_entry *);
|
||||
xbps_dictionary_t HIDDEN xbps_archive_get_dictionary(struct archive *,
|
||||
struct archive_entry *, char **bytes);
|
||||
xbps_dictionary_t HIDDEN get_safe_idxmeta(xbps_dictionary_t full);
|
||||
struct archive_entry *);
|
||||
const char HIDDEN *vpkg_user_conf(struct xbps_handle *, const char *, bool);
|
||||
xbps_array_t HIDDEN xbps_get_pkg_fulldeptree(struct xbps_handle *,
|
||||
const char *, bool);
|
||||
|
Reference in New Issue
Block a user