index : pacman | |
Archlinux32 fork of pacman | gitolite user |
summaryrefslogtreecommitdiff |
author | Allan McRae <allan@archlinux.org> | 2010-11-23 14:51:44 +1000 |
---|---|---|
committer | Dan McGee <dan@archlinux.org> | 2011-03-23 03:36:48 -0500 |
commit | 2f060dec6ad9aa77b0d8bff1b2e83e056cd59827 (patch) | |
tree | faad2106f56f2b3bbf2d1fe778bae1b2fb798fae /lib/libalpm/signing.c | |
parent | f9505063f804b9e1c736299b2387e1ddfbdc4f97 (diff) |
-rw-r--r-- | lib/libalpm/signing.c | 22 |
diff --git a/lib/libalpm/signing.c b/lib/libalpm/signing.c index 08e9b297..684cacf2 100644 --- a/lib/libalpm/signing.c +++ b/lib/libalpm/signing.c @@ -154,17 +154,17 @@ int _alpm_gpgme_checksig(const char *pkgpath, const pmpgpsig_t *sig) ret = -1; goto error; } - fprintf(stdout, "\nsummary=%x\n", gpgsig->summary); - fprintf(stdout, "fpr=%s\n", gpgsig->fpr); - fprintf(stdout, "status=%d\n", gpgsig->status); - fprintf(stdout, "timestamp=%lu\n", gpgsig->timestamp); - fprintf(stdout, "wrong_key_usage=%u\n", gpgsig->wrong_key_usage); - fprintf(stdout, "pka_trust=%u\n", gpgsig->pka_trust); - fprintf(stdout, "chain_model=%u\n", gpgsig->chain_model); - fprintf(stdout, "validity=%d\n", gpgsig->validity); - fprintf(stdout, "validity_reason=%d\n", gpgsig->validity_reason); - fprintf(stdout, "key=%d\n", gpgsig->pubkey_algo); - fprintf(stdout, "hash=%d\n", gpgsig->hash_algo); + _alpm_log(PM_LOG_DEBUG, "summary=%x\n", gpgsig->summary); + _alpm_log(PM_LOG_DEBUG, "fpr=%s\n", gpgsig->fpr); + _alpm_log(PM_LOG_DEBUG, "status=%d\n", gpgsig->status); + _alpm_log(PM_LOG_DEBUG, "timestamp=%lu\n", gpgsig->timestamp); + _alpm_log(PM_LOG_DEBUG, "wrong_key_usage=%u\n", gpgsig->wrong_key_usage); + _alpm_log(PM_LOG_DEBUG, "pka_trust=%u\n", gpgsig->pka_trust); + _alpm_log(PM_LOG_DEBUG, "chain_model=%u\n", gpgsig->chain_model); + _alpm_log(PM_LOG_DEBUG, "validity=%d\n", gpgsig->validity); + _alpm_log(PM_LOG_DEBUG, "validity_reason=%d\n", gpgsig->validity_reason); + _alpm_log(PM_LOG_DEBUG, "key=%d\n", gpgsig->pubkey_algo); + _alpm_log(PM_LOG_DEBUG, "hash=%d\n", gpgsig->hash_algo); if(gpgsig->summary & GPGME_SIGSUM_VALID) { /* good signature, continue */ |