<listitem><para><filename>/etc/ostree/trusted.ed25519.d</filename></para></listitem>
<listitem><para><filename>/etc/ostree/revoked.ed25519.d</filename></para></listitem>
<listitem><para><filename>/usr/share/ostree/trusted.ed25519.d</filename></para></listitem>
- <listitem><para><filename>/usr/share/ostree/rvokeded.ed25519.d</filename></para></listitem>
+ <listitem><para><filename>/usr/share/ostree/revoked.ed25519.d</filename></para></listitem>
</itemizedlist>
</para>
</refsect1>
if (!pkey)
{
EVP_MD_CTX_free (ctx);
- return glnx_throw (error, "openssl: Failed to initialize ed5519 key");
+ return glnx_throw (error, "openssl: Failed to initialize ed25519 key");
}
size_t len;
if (!pkey)
{
EVP_MD_CTX_free (ctx);
- return glnx_throw (error, "openssl: Failed to initialize ed5519 key");
+ return glnx_throw (error, "openssl: Failed to initialize ed25519 key");
}
if (EVP_DigestVerifyInit (ctx, NULL, NULL, NULL, pkey) != 0
&& EVP_DigestVerify (ctx, signature_buf, OSTREE_SIGN_ED25519_SIG_SIZE,
${CMD_PREFIX} ostree --repo=${test_tmpdir}/repo sign --verify --sign-type=ed25519 ${COMMIT} $(gen_ed25519_random_public) $(gen_ed25519_random_public) ${PUBLIC} $(gen_ed25519_random_public) $(gen_ed25519_random_public)
echo "ok ed25519 signature verified"
-# Check if we able to use all available modules to sign the same commit
+# Check if we are able to use all available modules to sign the same commit
echo "Unsigned commit for multi-sign" >> file.txt
${CMD_PREFIX} ostree --repo=${test_tmpdir}/repo commit -b main -s 'Unsigned commit'
COMMIT="$(ostree --repo=${test_tmpdir}/repo rev-parse main)"