aboutsummaryrefslogtreecommitdiffstats
path: root/sm/keylist.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2003-11-12 15:17:44 +0000
committerWerner Koch <[email protected]>2003-11-12 15:17:44 +0000
commitdba40e5e45e80896dc8864c2ae97f026069e2906 (patch)
tree724a2e0f0f73ef66cf6284adb7e2463785874ffe /sm/keylist.c
parent2003-11-10 Moritz Schulte <[email protected]> (diff)
downloadgnupg-dba40e5e45e80896dc8864c2ae97f026069e2906.tar.gz
gnupg-dba40e5e45e80896dc8864c2ae97f026069e2906.zip
Mainly changes to adjust for the changed KSBA API.
Diffstat (limited to 'sm/keylist.c')
-rw-r--r--sm/keylist.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/sm/keylist.c b/sm/keylist.c
index 548f2a452..7b7402fab 100644
--- a/sm/keylist.c
+++ b/sm/keylist.c
@@ -68,7 +68,7 @@ print_capabilities (KsbaCert cert, FILE *fp)
unsigned int use;
err = ksba_cert_get_key_usage (cert, &use);
- if (err == KSBA_No_Data)
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA)
{
putc ('e', fp);
putc ('s', fp);
@@ -81,7 +81,7 @@ print_capabilities (KsbaCert cert, FILE *fp)
if (err)
{
log_error (_("error getting key usage information: %s\n"),
- ksba_strerror (err));
+ gpg_strerror (err));
return;
}
@@ -328,11 +328,11 @@ list_cert_std (KsbaCert cert, FILE *fp, int have_secret)
putc ('\n', fp);
kerr = ksba_cert_get_key_usage (cert, &kusage);
- if (kerr != KSBA_No_Data)
+ if (gpg_err_code (kerr) != GPG_ERR_NO_DATA)
{
fputs (" key usage:", fp);
if (kerr)
- fprintf (fp, " [error: %s]", ksba_strerror (kerr));
+ fprintf (fp, " [error: %s]", gpg_strerror (kerr));
else
{
if ( (kusage & KSBA_KEYUSAGE_DIGITAL_SIGNATURE))
@@ -358,11 +358,11 @@ list_cert_std (KsbaCert cert, FILE *fp, int have_secret)
}
kerr = ksba_cert_get_cert_policies (cert, &string);
- if (kerr != KSBA_No_Data)
+ if (gpg_err_code (kerr) != GPG_ERR_NO_DATA)
{
fputs (" policies: ", fp);
if (kerr)
- fprintf (fp, "[error: %s]", ksba_strerror (kerr));
+ fprintf (fp, "[error: %s]", gpg_strerror (kerr));
else
{
for (p=string; *p; p++)
@@ -381,7 +381,7 @@ list_cert_std (KsbaCert cert, FILE *fp, int have_secret)
{
fputs (" chain length: ", fp);
if (kerr)
- fprintf (fp, "[error: %s]", ksba_strerror (kerr));
+ fprintf (fp, "[error: %s]", gpg_strerror (kerr));
else if (chainlen == -1)
fputs ("unlimited", fp);
else