diff options
Diffstat (limited to 'g10/mainproc.c')
-rw-r--r-- | g10/mainproc.c | 60 |
1 files changed, 30 insertions, 30 deletions
diff --git a/g10/mainproc.c b/g10/mainproc.c index 6facd822b..f2637340c 100644 --- a/g10/mainproc.c +++ b/g10/mainproc.c @@ -160,11 +160,11 @@ add_signature( CTX c, PACKET *pkt ) if( pkt->pkttype == PKT_SIGNATURE && !c->list ) { /* This is the first signature for the following datafile. - * G10 does not write such packets; instead it always uses + * gpg does not write such packets; instead it always uses * onepass-sig packets. The drawback of PGP's method * of prepending the signature to the data is * that it is not possible to make a signature from data read - * from stdin. (G10 is able to read PGP stuff anyway.) */ + * from stdin. (gpg is able to read PGP stuff anyway.) */ node = new_kbnode( pkt ); c->list = node; return 1; @@ -231,10 +231,10 @@ proc_pubkey_enc( CTX c, PACKET *pkt ) } } else - result = G10ERR_NO_SECKEY; + result = GPGERR_NO_SECKEY; } else - result = G10ERR_PUBKEY_ALGO; + result = GPGERR_PUBKEY_ALGO; if( result == -1 ) ; @@ -286,7 +286,7 @@ print_failed_pkenc( struct kidlist_item *list ) } free_public_key( pk ); - if( list->reason == G10ERR_NO_SECKEY ) { + if( list->reason == GPGERR_NO_SECKEY ) { log_info(_("no secret key for decryption available\n")); if( is_status_enabled() ) { char buf[20]; @@ -297,7 +297,7 @@ print_failed_pkenc( struct kidlist_item *list ) } else log_error(_("public key decryption failed: %s\n"), - g10_errstr(list->reason)); + gpg_errstr(list->reason)); } } @@ -319,7 +319,7 @@ proc_encrypted( CTX c, PACKET *pkt ) : DEFAULT_CIPHER_ALGO, NULL, 0 ); } else if( !c->dek ) - result = G10ERR_NO_SECKEY; + result = GPGERR_NO_SECKEY; if( !result ) result = decrypt_data( c, pkt->pkt.encrypted, c->dek ); gcry_free(c->dek); c->dek = NULL; @@ -332,13 +332,13 @@ proc_encrypted( CTX c, PACKET *pkt ) if( pkt->pkt.encrypted->mdc_method ) write_status( STATUS_GOODMDC ); } - else if( result == G10ERR_BAD_SIGN ) { + else if( result == GPGERR_BAD_SIGN ) { log_error(_("WARNING: encrypted message has been manipulated!\n")); write_status( STATUS_BADMDC ); } else { write_status( STATUS_DECRYPTION_FAILED ); - log_error(_("decryption failed: %s\n"), g10_errstr(result)); + log_error(_("decryption failed: %s\n"), gpg_errstr(result)); /* Hmmm: does this work when we have encrypted using a multiple * ways to specify the session key (symmmetric and PK)*/ } @@ -417,13 +417,13 @@ proc_plaintext( CTX c, PACKET *pkt ) md_start_debug( c->mfx.md, "verify" ); #endif rc = handle_plaintext( pt, &c->mfx, c->sigs_only, clearsig ); - if( rc == G10ERR_CREATE_FILE && !c->sigs_only) { + if( rc == GPGERR_CREATE_FILE && !c->sigs_only) { /* can't write output but we hash it anyway to * check the signature */ rc = handle_plaintext( pt, &c->mfx, 1, clearsig ); } if( rc ) - log_error( "handle plaintext failed: %s\n", g10_errstr(rc)); + log_error( "handle plaintext failed: %s\n", gpg_errstr(rc)); free_packet(pkt); c->last_was_session_key = 0; } @@ -456,7 +456,7 @@ proc_compressed( CTX c, PACKET *pkt ) else rc = handle_compressed( c, zd, NULL, NULL ); if( rc ) - log_error("uncompressing failed: %s\n", g10_errstr(rc)); + log_error("uncompressing failed: %s\n", gpg_errstr(rc)); free_packet(pkt); c->last_was_session_key = 0; } @@ -516,13 +516,13 @@ do_check_sig( CTX c, KBNODE node, int *is_selfsig ) else { log_error("invalid root packet for sigclass %02x\n", sig->sig_class); - return G10ERR_SIG_CLASS; + return GPGERR_SIG_CLASS; } } else - return G10ERR_SIG_CLASS; + return GPGERR_SIG_CLASS; rc = signature_check( sig, md ); - if( rc == G10ERR_BAD_SIGN && md2 ) + if( rc == GPGERR_BAD_SIGN && md2 ) rc = signature_check( sig, md2 ); gcry_md_close(md); gcry_md_close(md2); @@ -806,8 +806,8 @@ list_node( CTX c, KBNODE node ) fflush(stdout); switch( (rc2=do_check_sig( c, node, &is_selfsig )) ) { case 0: sigrc = '!'; break; - case G10ERR_BAD_SIGN: sigrc = '-'; break; - case G10ERR_NO_PUBKEY: sigrc = '?'; break; + case GPGERR_BAD_SIGN: sigrc = '-'; break; + case GPGERR_NO_PUBKEY: sigrc = '?'; break; default: sigrc = '%'; break; } } @@ -837,7 +837,7 @@ list_node( CTX c, KBNODE node ) printf("%c %08lX %s ", sigrc, (ulong)sig->keyid[1], datestr_from_sig(sig)); if( sigrc == '%' ) - printf("[%s] ", g10_errstr(rc2) ); + printf("[%s] ", gpg_errstr(rc2) ); else if( sigrc == '?' ) ; else if( is_selfsig ) { @@ -917,7 +917,7 @@ do_proc_packets( CTX c, IOBUF a ) any_data = 1; if( rc ) { free_packet(pkt); - if( rc == G10ERR_INVALID_PACKET ) + if( rc == GPGERR_INVALID_PACKET ) break; continue; } @@ -941,7 +941,7 @@ do_proc_packets( CTX c, IOBUF a ) case PKT_PUBKEY_ENC: case PKT_ENCRYPTED: case PKT_ENCRYPTED_MDC: - rc = G10ERR_UNEXPECTED; + rc = GPGERR_UNEXPECTED; goto leave; case PKT_SIGNATURE: newpkt = add_signature( c, pkt ); break; case PKT_PLAINTEXT: proc_plaintext( c, pkt ); break; @@ -955,7 +955,7 @@ do_proc_packets( CTX c, IOBUF a ) case PKT_PUBLIC_KEY: case PKT_SECRET_KEY: case PKT_USER_ID: - rc = G10ERR_UNEXPECTED; + rc = GPGERR_UNEXPECTED; goto leave; case PKT_SIGNATURE: newpkt = add_signature( c, pkt ); break; case PKT_SYMKEY_ENC: proc_symkey_enc( c, pkt ); break; @@ -1005,7 +1005,7 @@ do_proc_packets( CTX c, IOBUF a ) else free_packet(pkt); } - if( rc == G10ERR_INVALID_PACKET ) + if( rc == GPGERR_INVALID_PACKET ) write_status_text( STATUS_NODATA, "3" ); if( any_data ) rc = 0; @@ -1041,11 +1041,11 @@ check_sig_and_print( CTX c, KBNODE node ) (ulong)sig->keyid[1] ); rc = do_check_sig(c, node, NULL ); - if( rc == G10ERR_NO_PUBKEY && opt.keyserver_name ) { + if( rc == GPGERR_NO_PUBKEY && opt.keyserver_name ) { if( !hkp_ask_import( sig->keyid ) ) rc = do_check_sig(c, node, NULL ); } - if( !rc || rc == G10ERR_BAD_SIGN ) { + if( !rc || rc == GPGERR_BAD_SIGN ) { KBNODE un, keyblock; char *us; int count=0; @@ -1106,9 +1106,9 @@ check_sig_and_print( CTX c, KBNODE node ) if( !rc ) rc = check_signatures_trust( sig ); if( rc ) - g10_errors_seen = 1; + gpg_errors_seen = 1; if( opt.batch && rc ) - g10_exit(1); + gpg_exit(1); } else { char buf[50]; @@ -1117,11 +1117,11 @@ check_sig_and_print( CTX c, KBNODE node ) sig->pubkey_algo, sig->digest_algo, sig->sig_class, (ulong)sig->timestamp, rc ); write_status_text( STATUS_ERRSIG, buf ); - if( rc == G10ERR_NO_PUBKEY ) { + if( rc == GPGERR_NO_PUBKEY ) { buf[16] = 0; write_status_text( STATUS_NO_PUBKEY, buf ); } - log_error(_("Can't check signature: %s\n"), g10_errstr(rc) ); + log_error(_("Can't check signature: %s\n"), gpg_errstr(rc) ); } return rc; } @@ -1171,7 +1171,7 @@ proc_tree( CTX c, KBNODE node ) rc = ask_for_detached_datafile( c->mfx.md, c->mfx.md2, iobuf_get_fname(c->iobuf), 0 ); if( rc ) { - log_error("can't hash datafile: %s\n", g10_errstr(rc)); + log_error("can't hash datafile: %s\n", gpg_errstr(rc)); return; } } @@ -1217,7 +1217,7 @@ proc_tree( CTX c, KBNODE node ) iobuf_get_fname(c->iobuf), c->mfx.md2? 0 :(sig->sig_class == 0x01) ); if( rc ) { - log_error("can't hash datafile: %s\n", g10_errstr(rc)); + log_error("can't hash datafile: %s\n", gpg_errstr(rc)); return; } } |