aboutsummaryrefslogtreecommitdiffstats
path: root/sm/certpath.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2001-11-24 17:43:43 +0000
committerWerner Koch <[email protected]>2001-11-24 17:43:43 +0000
commitbab7fa0b297b8e99f5e222bbceda0716b62f7215 (patch)
treeb3fe5f7ec7e1c1bed0bdd98f036c27d605106d15 /sm/certpath.c
parentSigning does now work. There is no secret key management yet, so you (diff)
downloadgnupg-bab7fa0b297b8e99f5e222bbceda0716b62f7215.tar.gz
gnupg-bab7fa0b297b8e99f5e222bbceda0716b62f7215.zip
Added new directory common to enable sharing of some code and error
numbers between gpg, gpgsm and gpg-agent. Move some files and code to there.
Diffstat (limited to '')
-rw-r--r--sm/certpath.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/sm/certpath.c b/sm/certpath.c
index 518acfe3a..9b98ce894 100644
--- a/sm/certpath.c
+++ b/sm/certpath.c
@@ -46,7 +46,7 @@ gpgsm_validate_path (KsbaCert cert)
if (!kh)
{
log_error (_("failed to allocated keyDB handle\n"));
- rc = GPGSM_General_Error;
+ rc = GNUPG_General_Error;
goto leave;
}
@@ -65,7 +65,7 @@ gpgsm_validate_path (KsbaCert cert)
{
if (DBG_X509)
log_debug ("ERROR: issuer missing\n");
- rc = GPGSM_Bad_Certificate;
+ rc = GNUPG_Bad_Certificate;
goto leave;
}
@@ -74,7 +74,7 @@ gpgsm_validate_path (KsbaCert cert)
if (gpgsm_check_cert_sig (subject_cert, subject_cert) )
{
log_debug ("selfsigned certificate has a BAD signatures\n");
- rc = depth? GPGSM_Bad_Certificate_Path : GPGSM_Bad_Certificate;
+ rc = depth? GNUPG_Bad_Certificate_Path : GNUPG_Bad_Certificate;
goto leave;
}
log_debug ("selfsigned certificate is good\n");
@@ -90,7 +90,7 @@ gpgsm_validate_path (KsbaCert cert)
if (rc)
{
log_debug ("failed to find issuer's certificate: rc=%d\n", rc);
- rc = GPGSM_Missing_Certificate;
+ rc = GNUPG_Missing_Certificate;
goto leave;
}
@@ -99,7 +99,7 @@ gpgsm_validate_path (KsbaCert cert)
if (rc)
{
log_debug ("failed to get cert: rc=%d\n", rc);
- rc = GPGSM_General_Error;
+ rc = GNUPG_General_Error;
goto leave;
}
@@ -109,7 +109,7 @@ gpgsm_validate_path (KsbaCert cert)
if (gpgsm_check_cert_sig (issuer_cert, subject_cert) )
{
log_debug ("certificate has a BAD signatures\n");
- rc = GPGSM_Bad_Certificate_Path;
+ rc = GNUPG_Bad_Certificate_Path;
goto leave;
}
log_debug ("certificate is good\n");