aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c
diff options
context:
space:
mode:
Diffstat (limited to 'g10/keyedit.c')
-rw-r--r--g10/keyedit.c38
1 files changed, 19 insertions, 19 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c
index 74f97aa95..fdb8bf6ad 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -97,7 +97,7 @@ get_keyblock_byname( KBNODE *keyblock, KBPOS *kbpos, const char *username )
/* read the keyblock */
rc = read_keyblock( kbpos, keyblock );
if( rc )
- log_error("%s: keyblock read problem: %s\n", username, g10_errstr(rc));
+ log_error("%s: keyblock read problem: %s\n", username, gpg_errstr(rc));
else
merge_keys_and_selfsig( *keyblock );
@@ -123,13 +123,13 @@ print_and_check_one_sig( KBNODE keyblock, KBNODE node,
node->flag &= ~(NODFLG_BADSIG|NODFLG_NOKEY|NODFLG_SIGERR);
sigrc = '!';
break;
- case G10ERR_BAD_SIGN:
+ case GPGERR_BAD_SIGN:
node->flag = NODFLG_BADSIG;
sigrc = '-';
if( inv_sigs )
++*inv_sigs;
break;
- case G10ERR_NO_PUBKEY:
+ case GPGERR_NO_PUBKEY:
node->flag = NODFLG_NOKEY;
sigrc = '?';
if( no_key )
@@ -147,7 +147,7 @@ print_and_check_one_sig( KBNODE keyblock, KBNODE node,
is_rev? "rev":"sig",
sigrc, sig->keyid[1], datestr_from_sig(sig));
if( sigrc == '%' )
- tty_printf("[%s] ", g10_errstr(rc) );
+ tty_printf("[%s] ", gpg_errstr(rc) );
else if( sigrc == '?' )
;
else if( *is_selfsig ) {
@@ -367,7 +367,7 @@ sign_uids( KBNODE keyblock, STRLIST locusr, int *ret_modified, int local )
sign_uid_mk_attrib,
&attrib );
if( rc ) {
- log_error(_("signing failed: %s\n"), g10_errstr(rc));
+ log_error(_("signing failed: %s\n"), gpg_errstr(rc));
goto leave;
}
*ret_modified = 1; /* we changed the keyblock */
@@ -417,7 +417,7 @@ change_passphrase( KBNODE keyblock )
switch( is_secret_key_protected( sk ) ) {
case -1:
- rc = G10ERR_PUBKEY_ALGO;
+ rc = GPGERR_PUBKEY_ALGO;
break;
case 0:
tty_printf(_("This key is not protected.\n"));
@@ -440,7 +440,7 @@ change_passphrase( KBNODE keyblock )
}
if( rc )
- tty_printf(_("Can't edit this key: %s\n"), g10_errstr(rc));
+ tty_printf(_("Can't edit this key: %s\n"), gpg_errstr(rc));
else {
DEK *dek = NULL;
STRING2KEY *s2k = gcry_xmalloc_secure( sizeof *s2k );
@@ -477,7 +477,7 @@ change_passphrase( KBNODE keyblock )
}
}
if( rc )
- log_error("protect_secret_key failed: %s\n", g10_errstr(rc) );
+ log_error("protect_secret_key failed: %s\n", gpg_errstr(rc) );
else
changed++;
break;
@@ -629,7 +629,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
rc = read_keyblock( &sec_keyblockpos, &sec_keyblock );
if( rc ) {
log_error("%s: secret keyblock read problem: %s\n",
- username, g10_errstr(rc));
+ username, gpg_errstr(rc));
goto leave;
}
merge_keys_and_selfsig( sec_keyblock );
@@ -784,7 +784,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
rc = update_trust_record( keyblock, 0, NULL );
if( rc ) {
log_error(_("update of trustdb failed: %s\n"),
- g10_errstr(rc) );
+ gpg_errstr(rc) );
rc = 0;
}
}
@@ -943,7 +943,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
if( modified ) {
rc = update_keyblock( &keyblockpos, keyblock );
if( rc ) {
- log_error(_("update failed: %s\n"), g10_errstr(rc) );
+ log_error(_("update failed: %s\n"), gpg_errstr(rc) );
break;
}
}
@@ -951,7 +951,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
rc = update_keyblock( &sec_keyblockpos, sec_keyblock );
if( rc ) {
log_error(_("update secret failed: %s\n"),
- g10_errstr(rc) );
+ gpg_errstr(rc) );
break;
}
}
@@ -966,7 +966,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
rc = update_trust_record( keyblock, 0, NULL );
if( rc )
log_error(_("update of trustdb failed: %s\n"),
- g10_errstr(rc) );
+ gpg_errstr(rc) );
goto leave;
case cmdINVCMD:
@@ -1092,11 +1092,11 @@ show_key_with_all_names( KBNODE keyblock, int only_marked,
if( !rc )
tty_printf( "rev! subkey has been revoked: %s\n",
datestr_from_sig( sig ) );
- else if( rc == G10ERR_BAD_SIGN )
+ else if( rc == GPGERR_BAD_SIGN )
tty_printf( "rev- faked revocation found\n" );
else if( rc )
tty_printf( "rev? problem checking revocation: %s\n",
- g10_errstr(rc) );
+ gpg_errstr(rc) );
}
}
/* the user ids */
@@ -1218,7 +1218,7 @@ menu_adduid( KBNODE pub_keyblock, KBNODE sec_keyblock )
keygen_add_std_prefs, pk );
free_secret_key( sk );
if( rc ) {
- log_error("signing failed: %s\n", g10_errstr(rc) );
+ log_error("signing failed: %s\n", gpg_errstr(rc) );
free_user_id(uid);
return 0;
}
@@ -1516,7 +1516,7 @@ menu_expire( KBNODE pub_keyblock, KBNODE sec_keyblock )
keygen_add_key_expire, sub_pk );
if( rc ) {
log_error("make_keysig_packet failed: %s\n",
- g10_errstr(rc));
+ gpg_errstr(rc));
free_secret_key( sk );
return 0;
}
@@ -1829,7 +1829,7 @@ menu_revsig( KBNODE keyblock )
&attrib );
free_secret_key(sk);
if( rc ) {
- log_error(_("signing failed: %s\n"), g10_errstr(rc));
+ log_error(_("signing failed: %s\n"), gpg_errstr(rc));
return changed;
}
changed = 1; /* we changed the keyblock */
@@ -1878,7 +1878,7 @@ menu_revkey( KBNODE pub_keyblock, KBNODE sec_keyblock )
NULL, NULL );
free_secret_key(sk);
if( rc ) {
- log_error(_("signing failed: %s\n"), g10_errstr(rc));
+ log_error(_("signing failed: %s\n"), gpg_errstr(rc));
return changed;
}
changed = 1; /* we changed the keyblock */