@@ -121,7 +121,7 @@ ks_cert_change_cb(sr_session_ctx_t *UNUSED(session), const char *UNUSED(module_n
121
121
}
122
122
123
123
static int
124
- ks_privkey_get_cb (const char * xpath , sr_val_t * * values , size_t * values_cnt , void * UNUSED (private_ctx ))
124
+ ks_privkey_get_cb (const char * xpath , sr_val_t * * values , size_t * values_cnt , uint64_t UNUSED ( request_id ), void * UNUSED (private_ctx ))
125
125
{
126
126
int ret ;
127
127
const char * name ;
@@ -137,7 +137,7 @@ ks_privkey_get_cb(const char *xpath, sr_val_t **values, size_t *values_cnt, void
137
137
}
138
138
name += 18 ;
139
139
140
- if (asprintf (& path , "%s/%.*s.pub. pem" , KEYSTORED_KEYS_DIR , (int )(strchr (name , '\'' ) - name ), name ) == -1 ) {
140
+ if (asprintf (& path , "%s/%.*s.pem.pub " , KEYSTORED_KEYS_DIR , (int )(strchr (name , '\'' ) - name ), name ) == -1 ) {
141
141
SRP_LOG_ERR ("Memory allocation failed (%s:%d)." , __FILE__ , __LINE__ );
142
142
return SR_ERR_NOMEM ;
143
143
}
@@ -337,7 +337,7 @@ ks_privkey_gen_cb(const char *UNUSED(xpath), const sr_node_t *input, const size_
337
337
goto cleanup ;
338
338
}
339
339
sprintf (priv_path , "%s/%s.pem" , KEYSTORED_KEYS_DIR , input [0 ].data .string_val );
340
- sprintf (pub_path , "%s/%s.pub. pem" , KEYSTORED_KEYS_DIR , input [0 ].data .string_val );
340
+ sprintf (pub_path , "%s/%s.pem.pub " , KEYSTORED_KEYS_DIR , input [0 ].data .string_val );
341
341
342
342
if (!(pid = fork ())) {
343
343
/* child */
@@ -451,7 +451,7 @@ ks_privkey_load_cb(const char *UNUSED(xpath), const sr_node_t *input, const size
451
451
goto cleanup ;
452
452
}
453
453
sprintf (priv_path , "%s/%s.pem" , KEYSTORED_KEYS_DIR , input [0 ].data .string_val );
454
- sprintf (pub_path , "%s/%s.pub. pem" , KEYSTORED_KEYS_DIR , input [0 ].data .string_val );
454
+ sprintf (pub_path , "%s/%s.pem.pub " , KEYSTORED_KEYS_DIR , input [0 ].data .string_val );
455
455
456
456
fd = open (priv_path , O_CREAT | O_TRUNC | O_WRONLY , 00600 );
457
457
if (fd == -1 ) {
0 commit comments