switch(cert_policy[i].type) {
case BLOB_ATTR_BINARY:
- fprintf(stdout, "signature:\n---\n%s---\n", (char *) blob_data(v));
+ printf("signature:\n---\n%s---\n", (char *) blob_data(v));
break;
case BLOB_ATTR_NESTED:
json = blobmsg_format_json_indent(blob_data(v), false, 0);
DPRINTF("cannot parse payload\n");
continue;
}
- fprintf(stdout, "payload:\n---\n%s\n---\n", json);
+ printf("payload:\n---\n%s\n---\n", json);
free(json);
break;
}
}
list_for_each_entry(cobj, &certchain, list) {
- fprintf(stdout, "=== CHAIN ELEMENT %02u ===\n", ++count);
+ printf("=== CHAIN ELEMENT %02u ===\n", ++count);
cert_dump_blob(cobj->cert);
}
if (usign_f_sig(fingerprint, sigfile)) {
if (!quiet)
- fprintf(stdout, "cannot get signing key fingerprint\n");
+ fprintf(stderr, "cannot get signing key fingerprint\n");
return 1;
}
if (pubkeydir && _usign_key_is_revoked(fingerprint, pubkeydir)) {
if (!quiet)
- fprintf(stdout, "key %s has been revoked!\n", fingerprint);
+ fprintf(stderr, "key %s has been revoked!\n", fingerprint);
return 1;
}
usign_argv[usign_argc++] = USIGN_EXEC;