diff options
author | Marcus Brinkmann <[email protected]> | 2012-02-08 14:26:17 +0000 |
---|---|---|
committer | Marcus Brinkmann <[email protected]> | 2012-02-08 14:26:17 +0000 |
commit | dae3073aaa8b7feb1c844fdaf711f79141b9cc65 (patch) | |
tree | 5e298888803b5e9f6ba2656759bb76a6c27c6d5e /tests/gpgsm | |
parent | Link the thread test to pthread. (diff) | |
download | gpgme-dae3073aaa8b7feb1c844fdaf711f79141b9cc65.tar.gz gpgme-dae3073aaa8b7feb1c844fdaf711f79141b9cc65.zip |
Use gpgme interface for error handling to avoid linking with gpg-error.
* tests/t-data.c, tests/run-export.c, tests/run-keylist.c,
tests/run-support.h, tests/run-verify.c, tests/gpg/t-decrypt-verify.c,
tests/gpg/t-edit.c, tests/gpg/t-eventloop.c, tests/gpg/t-keylist-sig.c,
tests/gpg/t-keylist.c, tests/gpg/t-support.h, tests/gpg/t-trustlist.c,
tests/gpg/t-verify.c, tests/gpg/t-wait.c, tests/gpgsm/cms-decrypt.c,
tests/gpgsm/cms-keylist.c, tests/gpgsm/t-keylist.c,
tests/gpgsm/t-support.h, tests/gpgsm/t-verify.c,
tests/opassuan/t-command.c: Use gpgme interface for gpg-error functions.
Diffstat (limited to 'tests/gpgsm')
-rw-r--r-- | tests/gpgsm/cms-decrypt.c | 4 | ||||
-rw-r--r-- | tests/gpgsm/cms-keylist.c | 2 | ||||
-rw-r--r-- | tests/gpgsm/t-keylist.c | 2 | ||||
-rw-r--r-- | tests/gpgsm/t-support.h | 10 | ||||
-rw-r--r-- | tests/gpgsm/t-verify.c | 6 |
5 files changed, 12 insertions, 12 deletions
diff --git a/tests/gpgsm/cms-decrypt.c b/tests/gpgsm/cms-decrypt.c index 767f87b5..580832d5 100644 --- a/tests/gpgsm/cms-decrypt.c +++ b/tests/gpgsm/cms-decrypt.c @@ -73,7 +73,7 @@ main (int argc, char **argv) err = gpgme_op_decrypt (ctx, in, out); printf ("gpgme_op_decrypt: %s <%s> (%u)\n", - gpg_strerror (err), gpg_strsource (err), err); + gpgme_strerror (err), gpgme_strsource (err), err); result = gpgme_op_decrypt_result (ctx); if (!result) { @@ -88,7 +88,7 @@ main (int argc, char **argv) for (recp = result->recipients; recp; recp = recp->next) { printf ("recipient.status: %s <%s> (%u)\n", - gpg_strerror (recp->status), gpg_strsource (recp->status), + gpgme_strerror (recp->status), gpgme_strsource (recp->status), recp->status); printf ("recipient.pkalgo: %d\n", recp->pubkey_algo); printf ("recipient.keyid : %s\n", nonnull (recp->keyid)); diff --git a/tests/gpgsm/cms-keylist.c b/tests/gpgsm/cms-keylist.c index 698a9d85..7ed3a4e8 100644 --- a/tests/gpgsm/cms-keylist.c +++ b/tests/gpgsm/cms-keylist.c @@ -108,7 +108,7 @@ main (int argc, char **argv) gpgme_key_unref (key); } - if (gpg_err_code (err) != GPG_ERR_EOF) + if (gpgme_err_code (err) != GPG_ERR_EOF) fail_if_err (err); err = gpgme_op_keylist_end (ctx); fail_if_err (err); diff --git a/tests/gpgsm/t-keylist.c b/tests/gpgsm/t-keylist.c index 0f1cf333..bebd9d6a 100644 --- a/tests/gpgsm/t-keylist.c +++ b/tests/gpgsm/t-keylist.c @@ -366,7 +366,7 @@ main (int argc, char **argv) gpgme_key_unref (key); i++; } - if (gpg_err_code (err) != GPG_ERR_EOF) + if (gpgme_err_code (err) != GPG_ERR_EOF) fail_if_err (err); err = gpgme_op_keylist_end (ctx); fail_if_err (err); diff --git a/tests/gpgsm/t-support.h b/tests/gpgsm/t-support.h index 6dc14569..cc1a7db9 100644 --- a/tests/gpgsm/t-support.h +++ b/tests/gpgsm/t-support.h @@ -32,9 +32,9 @@ if (err) \ { \ fprintf (stderr, "%s:%d: %s: %s (%d.%d)\n", \ - __FILE__, __LINE__, gpg_strsource (err), \ - gpg_strerror (err), \ - gpg_err_source (err), gpg_err_code (err)); \ + __FILE__, __LINE__, gpgme_strsource (err), \ + gpgme_strerror (err), \ + gpgme_err_source (err), gpgme_err_code (err)); \ exit (1); \ } \ } \ @@ -50,11 +50,11 @@ print_data (gpgme_data_t dh) ret = gpgme_data_seek (dh, 0, SEEK_SET); if (ret) - fail_if_err (gpg_error_from_errno (errno)); + fail_if_err (gpgme_error_from_errno (errno)); while ((ret = gpgme_data_read (dh, buf, BUF_SIZE)) > 0) fwrite (buf, ret, 1, stdout); if (ret < 0) - fail_if_err (gpg_error_from_errno (errno)); + fail_if_err (gpgme_error_from_errno (errno)); } diff --git a/tests/gpgsm/t-verify.c b/tests/gpgsm/t-verify.c index d39487e5..062c5a15 100644 --- a/tests/gpgsm/t-verify.c +++ b/tests/gpgsm/t-verify.c @@ -77,7 +77,7 @@ check_result (gpgme_verify_result_t result, int summary, char *fpr, __FILE__, __LINE__, sig->fpr); got_errors = 1; } - if (gpg_err_code (sig->status) != status) + if (gpgme_err_code (sig->status) != status) { fprintf (stderr, "%s:%i: Unexpected signature status: %s\n", __FILE__, __LINE__, gpgme_strerror (sig->status)); @@ -101,7 +101,7 @@ check_result (gpgme_verify_result_t result, int summary, char *fpr, __FILE__, __LINE__, sig->validity); got_errors = 1; } - if (gpg_err_code (sig->validity_reason) != GPG_ERR_NO_ERROR) + if (gpgme_err_code (sig->validity_reason) != GPG_ERR_NO_ERROR) { fprintf (stderr, "%s:%i: Unexpected validity reason: %s\n", __FILE__, __LINE__, gpgme_strerror (sig->validity_reason)); @@ -123,7 +123,7 @@ show_auditlog (gpgme_ctx_t ctx) { fprintf (stderr, "%s:%i: Can't get audit log: %s\n", __FILE__, __LINE__, gpgme_strerror (err)); - if (gpg_err_code (err) != GPG_ERR_ASS_UNKNOWN_CMD) + if (gpgme_err_code (err) != GPG_ERR_ASS_UNKNOWN_CMD) got_errors = 1; } print_data (data); |