summaryrefslogtreecommitdiffstats
path: root/lib/libalpm
diff options
context:
space:
mode:
authorAllan McRae <allan@archlinux.org>2010-11-23 14:51:44 +1000
committerDan McGee <dan@archlinux.org>2011-03-23 03:36:48 -0500
commit2f060dec6ad9aa77b0d8bff1b2e83e056cd59827 (patch)
treefaad2106f56f2b3bbf2d1fe778bae1b2fb798fae /lib/libalpm
parentf9505063f804b9e1c736299b2387e1ddfbdc4f97 (diff)
downloadpacman-2f060dec6ad9aa77b0d8bff1b2e83e056cd59827.tar.xz
Report output from signature checking to debug log
Move the (possibly still temporary) output generated during signature checking into the --debug output. Signed-off-by: Allan McRae <allan@archlinux.org> Signed-off-by: Dan McGee <dan@archlinux.org>
Diffstat (limited to 'lib/libalpm')
-rw-r--r--lib/libalpm/signing.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/lib/libalpm/signing.c b/lib/libalpm/signing.c
index 08e9b297..684cacf2 100644
--- a/lib/libalpm/signing.c
+++ b/lib/libalpm/signing.c
@@ -154,17 +154,17 @@ int _alpm_gpgme_checksig(const char *pkgpath, const pmpgpsig_t *sig)
ret = -1;
goto error;
}
- fprintf(stdout, "\nsummary=%x\n", gpgsig->summary);
- fprintf(stdout, "fpr=%s\n", gpgsig->fpr);
- fprintf(stdout, "status=%d\n", gpgsig->status);
- fprintf(stdout, "timestamp=%lu\n", gpgsig->timestamp);
- fprintf(stdout, "wrong_key_usage=%u\n", gpgsig->wrong_key_usage);
- fprintf(stdout, "pka_trust=%u\n", gpgsig->pka_trust);
- fprintf(stdout, "chain_model=%u\n", gpgsig->chain_model);
- fprintf(stdout, "validity=%d\n", gpgsig->validity);
- fprintf(stdout, "validity_reason=%d\n", gpgsig->validity_reason);
- fprintf(stdout, "key=%d\n", gpgsig->pubkey_algo);
- fprintf(stdout, "hash=%d\n", gpgsig->hash_algo);
+ _alpm_log(PM_LOG_DEBUG, "summary=%x\n", gpgsig->summary);
+ _alpm_log(PM_LOG_DEBUG, "fpr=%s\n", gpgsig->fpr);
+ _alpm_log(PM_LOG_DEBUG, "status=%d\n", gpgsig->status);
+ _alpm_log(PM_LOG_DEBUG, "timestamp=%lu\n", gpgsig->timestamp);
+ _alpm_log(PM_LOG_DEBUG, "wrong_key_usage=%u\n", gpgsig->wrong_key_usage);
+ _alpm_log(PM_LOG_DEBUG, "pka_trust=%u\n", gpgsig->pka_trust);
+ _alpm_log(PM_LOG_DEBUG, "chain_model=%u\n", gpgsig->chain_model);
+ _alpm_log(PM_LOG_DEBUG, "validity=%d\n", gpgsig->validity);
+ _alpm_log(PM_LOG_DEBUG, "validity_reason=%d\n", gpgsig->validity_reason);
+ _alpm_log(PM_LOG_DEBUG, "key=%d\n", gpgsig->pubkey_algo);
+ _alpm_log(PM_LOG_DEBUG, "hash=%d\n", gpgsig->hash_algo);
if(gpgsig->summary & GPGME_SIGSUM_VALID) {
/* good signature, continue */