diff options
author | Allan McRae <allan@archlinux.org> | 2010-11-23 05:51:44 +0100 |
---|---|---|
committer | Dan McGee <dan@archlinux.org> | 2011-03-23 09:36:48 +0100 |
commit | 2f060dec6ad9aa77b0d8bff1b2e83e056cd59827 (patch) | |
tree | faad2106f56f2b3bbf2d1fe778bae1b2fb798fae /lib/libalpm | |
parent | f9505063f804b9e1c736299b2387e1ddfbdc4f97 (diff) | |
download | pacman-2f060dec6ad9aa77b0d8bff1b2e83e056cd59827.tar.gz pacman-2f060dec6ad9aa77b0d8bff1b2e83e056cd59827.tar.xz |
Report output from signature checking to debug log
Move the (possibly still temporary) output generated during signature
checking into the --debug output.
Signed-off-by: Allan McRae <allan@archlinux.org>
Signed-off-by: Dan McGee <dan@archlinux.org>
Diffstat (limited to 'lib/libalpm')
-rw-r--r-- | lib/libalpm/signing.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/lib/libalpm/signing.c b/lib/libalpm/signing.c index 08e9b297..684cacf2 100644 --- a/lib/libalpm/signing.c +++ b/lib/libalpm/signing.c @@ -154,17 +154,17 @@ int _alpm_gpgme_checksig(const char *pkgpath, const pmpgpsig_t *sig) ret = -1; goto error; } - fprintf(stdout, "\nsummary=%x\n", gpgsig->summary); - fprintf(stdout, "fpr=%s\n", gpgsig->fpr); - fprintf(stdout, "status=%d\n", gpgsig->status); - fprintf(stdout, "timestamp=%lu\n", gpgsig->timestamp); - fprintf(stdout, "wrong_key_usage=%u\n", gpgsig->wrong_key_usage); - fprintf(stdout, "pka_trust=%u\n", gpgsig->pka_trust); - fprintf(stdout, "chain_model=%u\n", gpgsig->chain_model); - fprintf(stdout, "validity=%d\n", gpgsig->validity); - fprintf(stdout, "validity_reason=%d\n", gpgsig->validity_reason); - fprintf(stdout, "key=%d\n", gpgsig->pubkey_algo); - fprintf(stdout, "hash=%d\n", gpgsig->hash_algo); + _alpm_log(PM_LOG_DEBUG, "summary=%x\n", gpgsig->summary); + _alpm_log(PM_LOG_DEBUG, "fpr=%s\n", gpgsig->fpr); + _alpm_log(PM_LOG_DEBUG, "status=%d\n", gpgsig->status); + _alpm_log(PM_LOG_DEBUG, "timestamp=%lu\n", gpgsig->timestamp); + _alpm_log(PM_LOG_DEBUG, "wrong_key_usage=%u\n", gpgsig->wrong_key_usage); + _alpm_log(PM_LOG_DEBUG, "pka_trust=%u\n", gpgsig->pka_trust); + _alpm_log(PM_LOG_DEBUG, "chain_model=%u\n", gpgsig->chain_model); + _alpm_log(PM_LOG_DEBUG, "validity=%d\n", gpgsig->validity); + _alpm_log(PM_LOG_DEBUG, "validity_reason=%d\n", gpgsig->validity_reason); + _alpm_log(PM_LOG_DEBUG, "key=%d\n", gpgsig->pubkey_algo); + _alpm_log(PM_LOG_DEBUG, "hash=%d\n", gpgsig->hash_algo); if(gpgsig->summary & GPGME_SIGSUM_VALID) { /* good signature, continue */ |