diff options
author | Werner Koch <[email protected]> | 2005-06-18 11:49:50 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2005-06-18 11:49:50 +0000 |
commit | 059d1596575d78e836f72d17e2493ce4ddfb5f33 (patch) | |
tree | ce4c7a83ab62fba491a99dbe495ff0e0a7f96512 /g10/parse-packet.c | |
parent | * keygen.c (save_unprotected_key_to_card): Fix gcc4 warning. (diff) | |
download | gnupg-059d1596575d78e836f72d17e2493ce4ddfb5f33.tar.gz gnupg-059d1596575d78e836f72d17e2493ce4ddfb5f33.zip |
(parse_signature): Use log_info for messages
about missing timestamp or keyid. In case we don't use that key
there won't be no further error and thus gpg does not need to
return with an error.
Diffstat (limited to '')
-rw-r--r-- | g10/parse-packet.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/g10/parse-packet.c b/g10/parse-packet.c index 8cc979e77..aa349a220 100644 --- a/g10/parse-packet.c +++ b/g10/parse-packet.c @@ -1337,7 +1337,7 @@ parse_signature( IOBUF inp, int pkttype, unsigned long pktlen, if(p) sig->timestamp = buffer_to_u32(p); else if(!(sig->pubkey_algo>=100 && sig->pubkey_algo<=110)) - log_error("signature packet without timestamp\n"); + log_info ("signature packet without timestamp\n"); p = parse_sig_subpkt2( sig, SIGSUBPKT_ISSUER, NULL ); if(p) @@ -1346,7 +1346,7 @@ parse_signature( IOBUF inp, int pkttype, unsigned long pktlen, sig->keyid[1] = buffer_to_u32(p+4); } else if(!(sig->pubkey_algo>=100 && sig->pubkey_algo<=110)) - log_error("signature packet without keyid\n"); + log_info ("signature packet without keyid\n"); p=parse_sig_subpkt(sig->hashed,SIGSUBPKT_SIG_EXPIRE,NULL); if(p) |