aboutsummaryrefslogtreecommitdiffstats
path: root/sm/verify.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2001-11-24 17:43:43 +0000
committerWerner Koch <[email protected]>2001-11-24 17:43:43 +0000
commitbab7fa0b297b8e99f5e222bbceda0716b62f7215 (patch)
treeb3fe5f7ec7e1c1bed0bdd98f036c27d605106d15 /sm/verify.c
parentSigning does now work. There is no secret key management yet, so you (diff)
downloadgnupg-bab7fa0b297b8e99f5e222bbceda0716b62f7215.tar.gz
gnupg-bab7fa0b297b8e99f5e222bbceda0716b62f7215.zip
Added new directory common to enable sharing of some code and error
numbers between gpg, gpgsm and gpg-agent. Move some files and code to there.
Diffstat (limited to '')
-rw-r--r--sm/verify.c24
1 files changed, 12 insertions, 12 deletions
diff --git a/sm/verify.c b/sm/verify.c
index 26bb8cfcd..b44dd6add 100644
--- a/sm/verify.c
+++ b/sm/verify.c
@@ -109,12 +109,12 @@ store_cert (KsbaCert cert)
}
rc = keydb_locate_writable (kh, 0);
if (rc)
- log_error (_("error finding writable keyDB: %s\n"), gpgsm_strerror (rc));
+ log_error (_("error finding writable keyDB: %s\n"), gnupg_strerror (rc));
rc = keydb_insert_cert (kh, cert);
if (rc)
{
- log_error (_("error storing certificate: %s\n"), gpgsm_strerror (rc));
+ log_error (_("error storing certificate: %s\n"), gnupg_strerror (rc));
}
keydb_release (kh);
}
@@ -190,7 +190,7 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
if (!kh)
{
log_error (_("failed to allocated keyDB handle\n"));
- rc = GPGSM_General_Error;
+ rc = GNUPG_General_Error;
goto leave;
}
@@ -264,7 +264,7 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
if (stopreason == KSBA_SR_BEGIN_DATA)
{
log_error ("error: only detached signatures are supportted\n");
- rc = GPGSM_Not_Implemented;
+ rc = GNUPG_Not_Implemented;
goto leave;
}
@@ -285,7 +285,7 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
if (data_fd == -1)
{
log_error ("detached signature but no data given\n");
- rc = GPGSM_Bad_Signature;
+ rc = GNUPG_Bad_Signature;
goto leave;
}
hash_data (data_fd, data_md);
@@ -297,7 +297,7 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
if (data_fd != -1 && !is_detached)
{
log_error ("data given for a non-detached signature");
- rc = GPGSM_Conflict;
+ rc = GNUPG_Conflict;
goto leave;
}
@@ -357,14 +357,14 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
if (rc)
{
log_debug ("failed to find the certificate: %s\n",
- gpgsm_strerror(rc));
+ gnupg_strerror(rc));
goto next_signer;
}
rc = keydb_get_cert (kh, &cert);
if (rc)
{
- log_debug ("failed to get cert: %s\n", gpgsm_strerror (rc));
+ log_debug ("failed to get cert: %s\n", gnupg_strerror (rc));
goto next_signer;
}
@@ -411,7 +411,7 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
if (rc)
{
- log_error ("invalid signature: %s\n", gpgsm_strerror (rc));
+ log_error ("invalid signature: %s\n", gnupg_strerror (rc));
gpgsm_status (ctrl, STATUS_BADSIG, NULL);
goto next_signer;
}
@@ -433,9 +433,9 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd)
rc = gpgsm_validate_path (cert);
if (rc)
{
- log_error ("invalid certification path: %s\n", gpgsm_strerror (rc));
- if (rc == GPGSM_Bad_Certificate_Path
- || rc == GPGSM_Bad_Certificate)
+ log_error ("invalid certification path: %s\n", gnupg_strerror (rc));
+ if (rc == GNUPG_Bad_Certificate_Path
+ || rc == GNUPG_Bad_Certificate)
gpgsm_status (ctrl, STATUS_TRUST_NEVER, NULL);
else
gpgsm_status (ctrl, STATUS_TRUST_UNDEFINED, NULL);