Diff
Not logged in

Differences From Artifact [6f37b8a208]:

To Artifact [35cc36d7dc]:


750
751
752
753
754
755
756
757



758




759
760
761
762
763
764
765
766
767
  if {[certificate export $certificate $certificateFile] \
          ne "ExportedOk"} then {
    emitError [appendArgs \
        "failed to export signature for " $fileType " \"" $fileName \"]
  }

  #
  # NOTE: Add the standard XML comment to the file.



  #




  if {[certificate warning -type Script $certificateFile] \
          ne "WarningOk"} then {
    emitError [appendArgs \
        "failed to add warning for " $fileType " \"" $fileName \"]
  }

  #
  # HACK: Reformat some of the spacing in the certificate file to make
  #       it easier to read.







|
>
>
>

>
>
>
>
|
|







750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
  if {[certificate export $certificate $certificateFile] \
          ne "ExportedOk"} then {
    emitError [appendArgs \
        "failed to export signature for " $fileType " \"" $fileName \"]
  }

  #
  # NOTE: Add the standard XML comment to the file, including a hash of
  #       the script file being signed.  For ease of use with existing
  #       Eagle repositories, the SHA1 hash algorithm is used here, if
  #       one has not been explicitly set already.
  #
  if {![info exists hashAlgorithmName]} then {
    set hashAlgorithmName SHA1
  }

  if {[certificate warning -type Script -hashalgorithm \
      $hashAlgorithmName -- $certificateFile] ne "WarningOk"} then {
    emitError [appendArgs \
        "failed to add warning for " $fileType " \"" $fileName \"]
  }

  #
  # HACK: Reformat some of the spacing in the certificate file to make
  #       it easier to read.
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
  # NOTE: Play nice and cleanup all the variables we created during the
  #       whole the signing process.
  #
  unset -nocomplain fileName vendor embed duration entityType encoding \
      privateKeyFile publicKeyFile importFirst quantity id timeStamp \
      configFileName embedSpacing embedPrefix embedSuffix publicKey \
      privateKey shouldEmbed harpyIsSpecial fileType certificateFile \
      certificate data lines line

  if {[info exists path_set]} then {
    unset -nocomplain path path_set
  }

  if {[info exists quiet_set]} then {
    unset -nocomplain quiet quiet_set
  }
} else {
  usage ""
}







|











851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
  # NOTE: Play nice and cleanup all the variables we created during the
  #       whole the signing process.
  #
  unset -nocomplain fileName vendor embed duration entityType encoding \
      privateKeyFile publicKeyFile importFirst quantity id timeStamp \
      configFileName embedSpacing embedPrefix embedSuffix publicKey \
      privateKey shouldEmbed harpyIsSpecial fileType certificateFile \
      certificate hashAlgorithmName data lines line

  if {[info exists path_set]} then {
    unset -nocomplain path path_set
  }

  if {[info exists quiet_set]} then {
    unset -nocomplain quiet quiet_set
  }
} else {
  usage ""
}