381 |
*data = map_tmpfile (out); |
*data = map_tmpfile (out); |
382 |
CloseHandle (out); |
CloseHandle (out); |
383 |
} |
} |
384 |
|
|
385 |
return err; |
return err; |
386 |
} |
} |
387 |
|
|
481 |
return err; |
return err; |
482 |
} |
} |
483 |
|
|
484 |
|
|
485 |
char* |
char* |
486 |
generate_revoc_input (int code, const char *cmt, const char *pass) |
generate_revoke_input (int code, const char *cmt, const char *pass) |
487 |
{ |
{ |
488 |
const char *fmt; |
const char *fmt; |
489 |
char *p; |
char *p; |
514 |
@r_revcert contains the revocation cert on success. |
@r_revcert contains the revocation cert on success. |
515 |
Return value: 0 on success. */ |
Return value: 0 on success. */ |
516 |
gpgme_error_t |
gpgme_error_t |
517 |
gpg_revoke_key (const char *inp_data, const char *keyid, char **r_revcert) |
gpg_revoke_cert (const char *inp_data, const char *keyid, char **r_revcert) |
518 |
{ |
{ |
519 |
gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR); |
gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR); |
520 |
char *rcrt; |
char *rcrt; |
541 |
else { |
else { |
542 |
rcrt = map_tmpfile (out); |
rcrt = map_tmpfile (out); |
543 |
*r_revcert = rcrt; |
*r_revcert = rcrt; |
544 |
|
if (rcrt && strlen (rcrt) == 0) |
545 |
|
err = gpg_error (GPG_ERR_BAD_PASSPHRASE); |
546 |
} |
} |
547 |
|
|
548 |
free (p); |
free (p); |