*/
static rpmRC
verifyRSASignature(rpmKeyring keyring, rpmtd sigtd, pgpDig dig, char ** msg,
- DIGEST_CTX md5ctx)
+ DIGEST_CTX hashctx)
{
pgpDigParams sigp = dig ? &dig->signature : NULL;
SECOidTag sigalg = SEC_OID_UNKNOWN;
int sigver = 0;
*msg = NULL;
- if (md5ctx == NULL || sigtd->data == NULL || dig == NULL || sigp == NULL) {
+ if (hashctx == NULL || sigtd->data == NULL || dig == NULL || sigp == NULL) {
goto exit;
}
sigver = sigp->version;
/* Retrieve the matching public key and verify. */
res = rpmKeyringLookup(keyring, dig);
if (res == RPMRC_OK) {
- res = verifyPGPSig(sigp, dig->keydata, dig->sigdata, sigalg, md5ctx);
+ res = verifyPGPSig(sigp, dig->keydata, dig->sigdata, sigalg, hashctx);
}
exit:
*/
static rpmRC
verifyDSASignature(rpmKeyring keyring, rpmtd sigtd, pgpDig dig, char ** msg,
- DIGEST_CTX sha1ctx)
+ DIGEST_CTX hashctx)
{
rpmRC res = RPMRC_FAIL; /* assume failure */
pgpDigParams sigp = dig ? &dig->signature : NULL;
int sigver = 0;
*msg = NULL;
- if (sha1ctx == NULL || sigtd->data == NULL || dig == NULL || sigp == NULL) {
+ if (hashctx == NULL || sigtd->data == NULL || dig == NULL || sigp == NULL) {
goto exit;
}
sigver = sigp->version;
if (res == RPMRC_OK) {
/* XXX TODO: handle other algorithm types too */
SECOidTag sigalg = SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST;
- res = verifyPGPSig(sigp, dig->keydata, dig->sigdata, sigalg, sha1ctx);
+ res = verifyPGPSig(sigp, dig->keydata, dig->sigdata, sigalg, hashctx);
}
exit: