-int
-opkg_verify_file (opkg_conf_t *conf, char *text_file, char *sig_file)
-{
-#if defined HAVE_GPGME
- if (conf->check_signature == 0 )
- return 0;
- int status = -1;
- gpgme_ctx_t ctx;
- gpgme_data_t sig, text, key;
- gpgme_error_t err = -1;
- gpgme_verify_result_t result;
- gpgme_signature_t s;
- char *trusted_path = NULL;
-
- err = gpgme_new (&ctx);
-
- if (err)
- return -1;
-
- sprintf_alloc(&trusted_path, "%s/%s", conf->offline_root, "/etc/opkg/trusted.gpg");
- err = gpgme_data_new_from_file (&key, trusted_path, 1);
- free (trusted_path);
- if (err)
- {
- return -1;
- }
- err = gpgme_op_import (ctx, key);
- if (err)
- {
- gpgme_data_release (key);
- return -1;
- }
- gpgme_data_release (key);
-
- err = gpgme_data_new_from_file (&sig, sig_file, 1);
- if (err)
- {
- gpgme_release (ctx);
- return -1;
- }
-
- err = gpgme_data_new_from_file (&text, text_file, 1);
- if (err)
- {
- gpgme_data_release (sig);
- gpgme_release (ctx);
- return -1;
- }
-
- err = gpgme_op_verify (ctx, sig, text, NULL);
-
- result = gpgme_op_verify_result (ctx);
- if (!result)
- return -1;
-
- /* see if any of the signitures matched */
- s = result->signatures;
- while (s)
- {
- status = gpg_err_code (s->status);
- if (status == GPG_ERR_NO_ERROR)
- break;
- s = s->next;
- }
-
-
- gpgme_data_release (sig);
- gpgme_data_release (text);
- gpgme_release (ctx);
-
- return status;
-#elif defined HAVE_OPENSSL
- X509_STORE *store = NULL;
- PKCS7 *p7 = NULL;
- BIO *in = NULL, *indata = NULL;
-
- // Sig check failed by default !
- int status = -1;
-
- openssl_init();
-
- // Set-up the key store
- if(!(store = setup_verify(conf, conf->signature_ca_file, conf->signature_ca_path))){
- opkg_message(conf, OPKG_ERROR,
- "Can't open CA certificates\n");
- goto verify_file_end;
- }
-
- // Open a BIO to read the sig file
- if (!(in = BIO_new_file(sig_file, "rb"))){
- opkg_message(conf, OPKG_ERROR,
- "Can't open signature file %s\n", sig_file);
- goto verify_file_end;
- }
-
- // Read the PKCS7 block contained in the sig file
- p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
- if(!p7){
- opkg_message(conf, OPKG_ERROR,
- "Can't read signature file (Corrupted ?)\n");
- goto verify_file_end;
- }
-#if defined(HAVE_PATHFINDER)
- if(conf->check_x509_path){
- if(!pkcs7_pathfinder_verify_signers(p7)){
- opkg_message(conf, OPKG_ERROR, "pkcs7_pathfinder_verify_signers: "
- "Path verification failed\n");
- goto verify_file_end;