- copy the tar.gz and tar.bz2 file on ftp.videolan.org in
/opt/ftp/pub/videolan/testing/vlc-X.X.X/
- generate md5 hashes and gpg signature of these files
+ (use gpg --sign --detach --armor --force-v3-sigs)
* Contribs
- Put a copy of the libraries or svn snapshot in vlc-X.X.X/contrib
Build in the "buildbeos" chroot on altair.
# add the .zip files to /opt/ftp/pub/videolan/testing/vlc-X.X.X/beos/
generate md5 hashes and gpg signature of these files
+ (use gpg --sign --detach --armor --force-v3-sigs)
* Win32 Packages
make the packages using the nightly builds configure/options/... , don't forget --enable-update-check
kind of suxxs)
add the .zip and .exe files to /opt/ftp/pub/videolan/testing/vlc-X.X.X/win32/
generate md5 hashes and gpg signature of these files
+ (use gpg --sign --detach --armor --force-v3-sigs)
* OS X packages
configure with --enable-update-check
generate md5 hashes and gpg signature of these files
+ (use gpg --sign --detach --armor --force-v3-sigs)
* Commit changes ... it never works the first time
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA.
*****************************************************************************/
-
+/*
+ * XXX: should use v4 signatures for binary files (already used for public key)
+ */
/**
* \file
* This file contains functions related to VLC update management
int i_bytes = pgp_unarmor( p_buf, i_size, (uint8_t*)p_sig, 65 );
free( p_buf );
- if( i_bytes > 65 )
+ if( i_bytes == 0 )
+ {
+ msg_Dbg( p_this, "Unarmoring failed" );
+ return VLC_EGENERIC;
+ }
+ else if( i_bytes > 65 )
{
msg_Dbg( p_this, "Signature is too big: %d bytes", i_bytes );
return VLC_EGENERIC;
int i_r_len = mpi_len( p_sig->r );
if( i_r_len > 20 )
{
- msg_Dbg( p_this, "Signature invalid" );
+ msg_Dbg( p_this, "Invalid signature, r number too big: %d bytes",
+ i_r_len );
return VLC_EGENERIC;
}
else if( i_r_len < 20 )
fclose( f );
gcry_md_final( hd );
- uint8_t *p_hash = (uint8_t*) gcry_md_read( hd, GCRY_MD_SHA1);
- p_hash = strdup( p_hash );
+ uint8_t *p_tmp = (uint8_t*) gcry_md_read( hd, GCRY_MD_SHA1);
+ uint8_t *p_hash = malloc( 20 );
+ if( p_hash )
+ memcpy( p_hash, p_tmp, 20 );
gcry_md_close( hd );
return p_hash;
}
gcry_md_final( hd );
- uint8_t *p_hash = gcry_md_read( hd, GCRY_MD_SHA1);
+ uint8_t *p_tmp = gcry_md_read( hd, GCRY_MD_SHA1);
- if( p_hash[0] != p_pkey->sig.hash_verification[0] ||
- p_hash[1] != p_pkey->sig.hash_verification[1] )
+ if( !p_tmp ||
+ p_tmp[0] != p_pkey->sig.hash_verification[0] ||
+ p_tmp[1] != p_pkey->sig.hash_verification[1] )
{
gcry_md_close( hd );
return NULL;
}
- p_hash = strdup( p_hash );
+ uint8_t *p_hash = malloc( 20 );
+ if( p_hash )
+ memcpy( p_hash, p_tmp, 20 );
gcry_md_close( hd );
return p_hash;
}