diff options
author | Werner Koch <[email protected]> | 2014-03-27 11:59:55 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2014-03-27 11:59:55 +0000 |
commit | 4f50ec98ddd57253cae66e2321f0cc98ee189a09 (patch) | |
tree | feb4dc9662cfd4a2833cfdcb8587d47939b49fd4 /g10/pkclist.c | |
parent | agent: Replace es_mopen by es_fopenmem for ssh. (diff) | |
download | gnupg-4f50ec98ddd57253cae66e2321f0cc98ee189a09.tar.gz gnupg-4f50ec98ddd57253cae66e2321f0cc98ee189a09.zip |
Change some keyedit functions to allow printing to arbitrary streams.
* common/ttyio.c (tty_print_string): Add optional arg FP. Change all
callers.
(tty_print_utf8_string2): Ditto.
* g10/keyedit.c (show_prefs): Ditto.
(show_key_with_all_names_colon): Ditto.
(show_names): Ditto.
* g10/keylist.c (print_revokers): Ditto.
(print_fingerprint): Ditto.
Diffstat (limited to 'g10/pkclist.c')
-rw-r--r-- | g10/pkclist.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/g10/pkclist.c b/g10/pkclist.c index a6d687a0f..49cd30926 100644 --- a/g10/pkclist.c +++ b/g10/pkclist.c @@ -258,7 +258,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode, tty_printf(_(" aka \"%s\"\n"),p); } - print_fingerprint (pk, 2); + print_fingerprint (NULL, pk, 2); tty_printf("\n"); release_kbnode (keyblock); } @@ -470,7 +470,7 @@ do_we_trust_pre( PKT_public_key *pk, unsigned int trustlevel ) if( !opt.batch && !rc ) { print_pubkey_info(NULL,pk); - print_fingerprint (pk, 2); + print_fingerprint (NULL, pk, 2); tty_printf("\n"); tty_printf( @@ -529,7 +529,7 @@ check_signatures_trust( PKT_signature *sig ) if( !opt.quiet ) log_info(_("WARNING: Using untrusted key!\n")); if (opt.with_fingerprint) - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); goto leave; } @@ -617,7 +617,7 @@ check_signatures_trust( PKT_signature *sig ) { case TRUST_EXPIRED: log_info(_("Note: This key has expired!\n")); - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); break; default: @@ -631,7 +631,7 @@ check_signatures_trust( PKT_signature *sig ) " a trusted signature!\n")); log_info(_(" There is no indication that the " "signature belongs to the owner.\n" )); - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); break; case TRUST_NEVER: @@ -640,7 +640,7 @@ check_signatures_trust( PKT_signature *sig ) log_info(_("WARNING: We do NOT trust this key!\n")); log_info(_(" The signature is probably a FORGERY.\n")); if (opt.with_fingerprint) - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); rc = gpg_error (GPG_ERR_BAD_SIGNATURE); break; @@ -650,19 +650,19 @@ check_signatures_trust( PKT_signature *sig ) " sufficiently trusted signatures!\n")); log_info(_(" It is not certain that the" " signature belongs to the owner.\n" )); - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); break; case TRUST_FULLY: write_status( STATUS_TRUST_FULLY ); if (opt.with_fingerprint) - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); break; case TRUST_ULTIMATE: write_status( STATUS_TRUST_ULTIMATE ); if (opt.with_fingerprint) - print_fingerprint (pk, 1); + print_fingerprint (NULL, pk, 1); break; } |