7 #include <netinet/in.h>
21 #define alloca_strdup(_s) strcpy(alloca(strlen(_s)+1), (_s))
54 if (sig == NULL || dig == NULL || sigp == NULL)
57 keyid =
pgpGrab(sigp->signid+4, 4);
82 HE_t he = memset(
alloca(
sizeof(*he)), 0,
sizeof(*he));
83 HE_t she = memset(
alloca(
sizeof(*she)), 0,
sizeof(*she));
92 const char * msg = NULL;
95 rpmop opsave = memset(
alloca(
sizeof(*opsave)), 0,
sizeof(*opsave));
98 if (hdrp) *hdrp = NULL;
106 {
const char item[] =
"Lead";
123 {
const char item[] =
"Signature";
129 (msg && *msg ? msg :
_(
"read failed\n")));
144 #define _chk(_mask) (she->tag == 0 && !(vsflags & (_mask)))
184 {
const char item[] =
"Header";
196 if (opx > 0 && op != NULL) {
211 if (she->
p.
ptr == NULL) {
226 if (dig->signature.version != 3 && dig->signature.version != 4) {
228 _(
"skipping package %s with unverifiable V%u signature\n"),
229 fn, dig->signature.version);
236 unsigned char * hmagic = NULL;
250 if (hmagic && nmagic > 0) {
252 dig->nbytes += nmagic;
263 if (dig->signature.version != 3 && dig->signature.version != 4) {
265 _(
"skipping package %s with unverifiable V%u signature\n"),
266 fn, dig->signature.version);
275 unsigned char * hmagic = NULL;
289 if (hmagic && nmagic > 0) {
291 dig->nbytes += nmagic;
304 while ((count =
Fread(buf,
sizeof(buf[0]),
sizeof(buf), fd)) > 0)
305 dig->nbytes += count;
333 rpmlog(lvl,
"%s: %s\n", fn, buf);
345 if (rc !=
RPMRC_FAIL && h != NULL && hdrp != NULL) {