750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
|
if {[certificate export $certificate $certificateFile] \
ne "ExportedOk"} then {
emitError [appendArgs \
"failed to export signature for " $fileType " \"" $fileName \"]
}
#
# NOTE: Add the standard XML comment to the file.
#
if {[certificate warning -type Script $certificateFile] \
ne "WarningOk"} then {
emitError [appendArgs \
"failed to add warning for " $fileType " \"" $fileName \"]
}
#
# HACK: Reformat some of the spacing in the certificate file to make
# it easier to read.
|
|
>
>
>
>
>
>
>
|
|
|
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
|
if {[certificate export $certificate $certificateFile] \
ne "ExportedOk"} then {
emitError [appendArgs \
"failed to export signature for " $fileType " \"" $fileName \"]
}
#
# NOTE: Add the standard XML comment to the file, including a hash of
# the script file being signed. For ease of use with existing
# Eagle repositories, the SHA1 hash algorithm is used here, if
# one has not been explicitly set already.
#
if {![info exists hashAlgorithmName]} then {
set hashAlgorithmName SHA1
}
if {[certificate warning -type Script -hashalgorithm \
$hashAlgorithmName -- $certificateFile] ne "WarningOk"} then {
emitError [appendArgs \
"failed to add warning for " $fileType " \"" $fileName \"]
}
#
# HACK: Reformat some of the spacing in the certificate file to make
# it easier to read.
|
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
|
# NOTE: Play nice and cleanup all the variables we created during the
# whole the signing process.
#
unset -nocomplain fileName vendor embed duration entityType encoding \
privateKeyFile publicKeyFile importFirst quantity id timeStamp \
configFileName embedSpacing embedPrefix embedSuffix publicKey \
privateKey shouldEmbed harpyIsSpecial fileType certificateFile \
certificate data lines line
if {[info exists path_set]} then {
unset -nocomplain path path_set
}
if {[info exists quiet_set]} then {
unset -nocomplain quiet quiet_set
}
} else {
usage ""
}
|
|
|
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
|
# NOTE: Play nice and cleanup all the variables we created during the
# whole the signing process.
#
unset -nocomplain fileName vendor embed duration entityType encoding \
privateKeyFile publicKeyFile importFirst quantity id timeStamp \
configFileName embedSpacing embedPrefix embedSuffix publicKey \
privateKey shouldEmbed harpyIsSpecial fileType certificateFile \
certificate hashAlgorithmName data lines line
if {[info exists path_set]} then {
unset -nocomplain path path_set
}
if {[info exists quiet_set]} then {
unset -nocomplain quiet quiet_set
}
} else {
usage ""
}
|