diff options
author | Werner Koch <[email protected]> | 2001-11-24 17:43:43 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2001-11-24 17:43:43 +0000 |
commit | bab7fa0b297b8e99f5e222bbceda0716b62f7215 (patch) | |
tree | b3fe5f7ec7e1c1bed0bdd98f036c27d605106d15 /sm/certpath.c | |
parent | Signing does now work. There is no secret key management yet, so you (diff) | |
download | gnupg-bab7fa0b297b8e99f5e222bbceda0716b62f7215.tar.gz gnupg-bab7fa0b297b8e99f5e222bbceda0716b62f7215.zip |
Added new directory common to enable sharing of some code and error
numbers between gpg, gpgsm and gpg-agent. Move some files and code to
there.
Diffstat (limited to '')
-rw-r--r-- | sm/certpath.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/sm/certpath.c b/sm/certpath.c index 518acfe3a..9b98ce894 100644 --- a/sm/certpath.c +++ b/sm/certpath.c @@ -46,7 +46,7 @@ gpgsm_validate_path (KsbaCert cert) if (!kh) { log_error (_("failed to allocated keyDB handle\n")); - rc = GPGSM_General_Error; + rc = GNUPG_General_Error; goto leave; } @@ -65,7 +65,7 @@ gpgsm_validate_path (KsbaCert cert) { if (DBG_X509) log_debug ("ERROR: issuer missing\n"); - rc = GPGSM_Bad_Certificate; + rc = GNUPG_Bad_Certificate; goto leave; } @@ -74,7 +74,7 @@ gpgsm_validate_path (KsbaCert cert) if (gpgsm_check_cert_sig (subject_cert, subject_cert) ) { log_debug ("selfsigned certificate has a BAD signatures\n"); - rc = depth? GPGSM_Bad_Certificate_Path : GPGSM_Bad_Certificate; + rc = depth? GNUPG_Bad_Certificate_Path : GNUPG_Bad_Certificate; goto leave; } log_debug ("selfsigned certificate is good\n"); @@ -90,7 +90,7 @@ gpgsm_validate_path (KsbaCert cert) if (rc) { log_debug ("failed to find issuer's certificate: rc=%d\n", rc); - rc = GPGSM_Missing_Certificate; + rc = GNUPG_Missing_Certificate; goto leave; } @@ -99,7 +99,7 @@ gpgsm_validate_path (KsbaCert cert) if (rc) { log_debug ("failed to get cert: rc=%d\n", rc); - rc = GPGSM_General_Error; + rc = GNUPG_General_Error; goto leave; } @@ -109,7 +109,7 @@ gpgsm_validate_path (KsbaCert cert) if (gpgsm_check_cert_sig (issuer_cert, subject_cert) ) { log_debug ("certificate has a BAD signatures\n"); - rc = GPGSM_Bad_Certificate_Path; + rc = GNUPG_Bad_Certificate_Path; goto leave; } log_debug ("certificate is good\n"); |