/PackageKit-0.4.2/docs/api/xml/pk-client.xml:134: gboolean pk_client_install_signature ( PkClient *client,
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:218: " repo-signature-required" : Run Last
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1140:
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1141:pk_client_install_signature ()
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1142:pk_client_install_signature gboolean pk_client_install_signature ( PkClient *client,
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1148:Install a signature of the newest and most correct version.
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1162: a signature_id structure such as "gnome-power-manager;0.0.1;i386;fedora"
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1819: The "repo-signature-required" signal
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1820:PkClient::repo-signature-required void user_function ( PkClient *client,
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1831:The ::repo-signature-required signal is emitted when the transaction
/PackageKit-0.4.2/docs/api/xml/pk-client.xml:1832:needs to fail for a signature prompt.
/PackageKit-0.4.2/docs/api/xml/pk-enum.xml:121: PK_ROLE_ENUM_INSTALL_SIGNATURE,
/PackageKit-0.4.2/docs/api/xml/pk-enum.xml:347: PK_ERROR_ENUM_BAD_GPG_SIGNATURE,
/PackageKit-0.4.2/docs/api/xml/pk-enum.xml:348: PK_ERROR_ENUM_MISSING_GPG_SIGNATURE,
/PackageKit-0.4.2/docs/api/xml/pk-enum.xml:481:The signature type type
/PackageKit-0.4.2/docs/api/xml/pk-enum.xml:498:The signature type type
/PackageKit-0.4.2/docs/api/xml/pk-enum.xml:578: PK_LICENSE_ENUM_OPENSSL,
/PackageKit-0.4.2/docs/api/html/introduction-errors.html:268:bad-gpg-signature
/PackageKit-0.4.2/docs/api/html/introduction-errors.html:270: The package is signed with a GPG signature, but that
/PackageKit-0.4.2/docs/api/html/introduction-errors.html:271: signature is not valid in some way.
/PackageKit-0.4.2/docs/api/html/specification.html:77:Transaction example: Package signature install
/PackageKit-0.4.2/docs/api/html/PackageKit-pk-enum.html:208: PK_ROLE_ENUM_INSTALL_SIGNATURE,
/PackageKit-0.4.2/docs/api/html/PackageKit-pk-enum.html:448: PK_ERROR_ENUM_BAD_GPG_SIGNATURE,
/PackageKit-0.4.2/docs/api/html/PackageKit-pk-enum.html:449: PK_ERROR_ENUM_MISSING_GPG_SIGNATURE,
/PackageKit-0.4.2/docs/api/html/PackageKit-pk-enum.html:592:The signature type type
/PackageKit-0.4.2/docs/api/html/PackageKit-pk-enum.html:611:The signature type type
/PackageKit-0.4.2/docs/api/html/PackageKit-pk-enum.html:693: PK_LICENSE_ENUM_OPENSSL,
/PackageKit-0.4.2/docs/api/html/concepts.html:47:Transaction example: Package signature install
/PackageKit-0.4.2/docs/api/html/Transaction.html:820: If the package is trusted, i.e. if it has a pre-trusted security signature.
/PackageKit-0.4.2/docs/api/html/Transaction.html:915:Callers need the org.freedesktop.packagekit.install-signature
/PackageKit-0.4.2/docs/api/html/Transaction.html:1970: signature, such as GPG. If a package cannot be installed
/PackageKit-0.4.2/docs/api/html/Transaction.html:2044: The type of signature used. gpg, for example.
/PackageKit-0.4.2/docs/api/html/introduction-ideas-transactions.html:104: Transaction example: Package signature install
/PackageKit-0.4.2/docs/api/html/introduction-ideas-transactions.html:109: If the package is signed, and a valid GPG signature is available, then we need to ask the
/PackageKit-0.4.2/docs/api/html/PkClient.html:351:>gboolean pk_client_install_signature (PkClient *client,
/PackageKit-0.4.2/docs/api/html/PkClient.html:517: "repo-signature-required " : Run Last
/PackageKit-0.4.2/docs/api/html/PkClient.html:2199:pk_client_install_signature ()
/PackageKit-0.4.2/docs/api/html/PkClient.html:2202:>gboolean pk_client_install_signature (PkClient *client,
/PackageKit-0.4.2/docs/api/html/PkClient.html:2214:Install a signature of the newest and most correct version.
/PackageKit-0.4.2/docs/api/html/PkClient.html:2238: a signature_id structure such as "gnome-power-manager;0.0.1;i386;fedora"
/PackageKit-0.4.2/docs/api/html/PkClient.html:3535:The "repo-signature-required"
signal
/PackageKit-0.4.2/docs/api/html/PkClient.html:3565:The ::repo-signature-required signal is emitted when the transaction
/PackageKit-0.4.2/docs/api/html/PkClient.html:3566:needs to fail for a signature prompt.
/PackageKit-0.4.2/docs/api/html/index.sgml:149:
/PackageKit-0.4.2/docs/api/html/index.sgml:180:
/PackageKit-0.4.2/docs/api/html/PackageKit.devhelp:182:
/PackageKit-0.4.2/docs/api/html/PackageKit.devhelp:212:
/PackageKit-0.4.2/docs/api/html/index.html:70:Transaction example: Package signature install
/PackageKit-0.4.2/docs/api/html/PackageKit.devhelp2:182:
/PackageKit-0.4.2/docs/api/html/PackageKit.devhelp2:212:
/PackageKit-0.4.2/docs/api/PackageKit-sections.txt:136:pk_client_install_signature
/PackageKit-0.4.2/docs/api/dbus/org.freedesktop.PackageKit.Transaction.ref.xml:492: If the package is trusted, i.e. if it has a pre-trusted security signature.
/PackageKit-0.4.2/docs/api/dbus/org.freedesktop.PackageKit.Transaction.ref.xml:543: Callers need the org.freedesktop.packagekit.install-signature IsCallerActive ()IsCallerActive Transaction IsCallerActive (out 'b' is_active)
/PackageKit-0.4.2/docs/api/dbus/org.freedesktop.PackageKit.Transaction.ref.xml:1121: signature, such as GPG. If a package cannot be installed
/PackageKit-0.4.2/docs/api/dbus/org.freedesktop.PackageKit.Transaction.ref.xml:1162: The type of signature used. gpg, for example.
/PackageKit-0.4.2/docs/api/tmpl/pk-client.sgml:191:
/PackageKit-0.4.2/docs/api/tmpl/pk-client.sgml:613:
/PackageKit-0.4.2/docs/api/tmpl/pk-enum.sgml:44:@PK_ROLE_ENUM_INSTALL_SIGNATURE:
/PackageKit-0.4.2/docs/api/tmpl/pk-enum.sgml:222:@PK_ERROR_ENUM_BAD_GPG_SIGNATURE:
/PackageKit-0.4.2/docs/api/tmpl/pk-enum.sgml:223:@PK_ERROR_ENUM_MISSING_GPG_SIGNATURE:
/PackageKit-0.4.2/docs/api/tmpl/pk-enum.sgml:424:@PK_LICENSE_ENUM_OPENSSL:
/PackageKit-0.4.2/src/pk-backend.c:89: gboolean set_signature;
/PackageKit-0.4.2/src/pk-backend.c:125: PK_BACKEND_REPO_SIGNATURE_REQUIRED,
/PackageKit-0.4.2/src/pk-backend.c:1131: * pk_backend_repo_signature_required:
/PackageKit-0.4.2/src/pk-backend.c:1134:pk_backend_repo_signature_required (PkBackend *backend, const gchar *package_id,
/PackageKit-0.4.2/src/pk-backend.c:1150: if (backend->priv->set_signature) {
/PackageKit-0.4.2/src/pk-backend.c:1151: egg_warning ("already asked for a signature, cannot process");
/PackageKit-0.4.2/src/pk-backend.c:1154: backend->priv->set_signature = TRUE;
/PackageKit-0.4.2/src/pk-backend.c:1156: egg_debug ("emit repo-signature-required %s, %s, %s, %s, %s, %s, %s, %i",
/PackageKit-0.4.2/src/pk-backend.c:1159: g_signal_emit (backend, signals [PK_BACKEND_REPO_SIGNATURE_REQUIRED], 0,
/PackageKit-0.4.2/src/pk-backend.c:1187: egg_warning ("already asked for a signature, cannot process");
/PackageKit-0.4.2/src/pk-backend.c:1798: signals [PK_BACKEND_REPO_SIGNATURE_REQUIRED] =
/PackageKit-0.4.2/src/pk-backend.c:1799: g_signal_new ("repo-signature-required",
/PackageKit-0.4.2/src/pk-backend.c:1860: backend->priv->set_signature = FALSE;
/PackageKit-0.4.2/src/pk-backend-dbus.c:259: * pk_backend_dbus_repo_signature_required_cb:
/PackageKit-0.4.2/src/pk-backend-dbus.c:262:pk_backend_dbus_repo_signature_required_cb (DBusGProxy *proxy, const gchar *package_id,
/PackageKit-0.4.2/src/pk-backend-dbus.c:269: pk_backend_repo_signature_required (backend_dbus->priv->backend, package_id, repository_name,
/PackageKit-0.4.2/src/pk-backend-dbus.c:365: G_CALLBACK (pk_backend_dbus_repo_signature_required_cb), backend_dbus);
/PackageKit-0.4.2/src/pk-backend-dbus.c:568: G_CALLBACK (pk_backend_dbus_repo_signature_required_cb), backend_dbus, NULL);
/PackageKit-0.4.2/src/pk-backend-dbus.c:1557: /* Repo Signature Required */
/PackageKit-0.4.2/src/pk-backend-spawn.c:360: } else if (egg_strequal (command, "repo-signature-required")) {
/PackageKit-0.4.2/src/pk-backend-spawn.c:389: ret = pk_backend_repo_signature_required (backend_spawn->priv->backend, sections[1],
/PackageKit-0.4.2/src/pk-post-trans.c:172: * pk_post_trans_get_filename_md5:
/PackageKit-0.4.2/src/pk-post-trans.c:175:pk_post_trans_get_filename_md5 (const gchar *filename)
/PackageKit-0.4.2/src/pk-post-trans.c:177: gchar *md5 = NULL;
/PackageKit-0.4.2/src/pk-post-trans.c:196: /* check md5 is same */
/PackageKit-0.4.2/src/pk-post-trans.c:197: md5 = g_compute_checksum_for_data (G_CHECKSUM_MD5, (const guchar *) data, length);
/PackageKit-0.4.2/src/pk-post-trans.c:200: return md5;
/PackageKit-0.4.2/src/pk-post-trans.c:222:pk_post_trans_sqlite_add_filename_details (PkPostTrans *post, const gchar *filename, const gchar *package, const gchar *md5)
/PackageKit-0.4.2/src/pk-post-trans.c:242: egg_debug ("add filename %s from %s with md5: %s (show: %i)", filename, package, md5, show);
/PackageKit-0.4.2/src/pk-post-trans.c:250: rc = sqlite3_prepare_v2 (post->priv->db, "INSERT INTO cache (filename, package, show, md5) VALUES (?, ?, ?, ?)", -1, &sql_statement, NULL);
/PackageKit-0.4.2/src/pk-post-trans.c:260: sqlite3_bind_text (sql_statement, 4, md5, -1, SQLITE_STATIC);
/PackageKit-0.4.2/src/pk-post-trans.c:279:pk_post_trans_sqlite_add_filename (PkPostTrans *post, const gchar *filename, const gchar *md5_opt)
/PackageKit-0.4.2/src/pk-post-trans.c:281: gchar *md5 = NULL;
/PackageKit-0.4.2/src/pk-post-trans.c:286: if (md5_opt != NULL)
/PackageKit-0.4.2/src/pk-post-trans.c:287: md5 = g_strdup (md5_opt);
/PackageKit-0.4.2/src/pk-post-trans.c:289: md5 = pk_post_trans_get_filename_md5 (filename);
/PackageKit-0.4.2/src/pk-post-trans.c:299: rc = pk_post_trans_sqlite_add_filename_details (post, filename, package, md5);
/PackageKit-0.4.2/src/pk-post-trans.c:301: g_free (md5);
/PackageKit-0.4.2/src/pk-post-trans.c:314: const gchar *md5 = NULL;
/PackageKit-0.4.2/src/pk-post-trans.c:315: gchar *md5_calc = NULL;
/PackageKit-0.4.2/src/pk-post-trans.c:322: else if (g_strcmp0 (col_name[i], "md5") == 0 && argv[i] != NULL)
/PackageKit-0.4.2/src/pk-post-trans.c:323: md5 = argv[i];
/PackageKit-0.4.2/src/pk-post-trans.c:327: if (filename == NULL || md5 == NULL) {
/PackageKit-0.4.2/src/pk-post-trans.c:328: egg_warning ("filename %s and md5 %s)", filename, md5);
/PackageKit-0.4.2/src/pk-post-trans.c:332: /* get md5 */
/PackageKit-0.4.2/src/pk-post-trans.c:333: md5_calc = pk_post_trans_get_filename_md5 (filename);
/PackageKit-0.4.2/src/pk-post-trans.c:334: if (md5_calc == NULL) {
/PackageKit-0.4.2/src/pk-post-trans.c:343: /* check md5 is same */
/PackageKit-0.4.2/src/pk-post-trans.c:344: if (g_strcmp0 (md5, md5_calc) != 0) {
/PackageKit-0.4.2/src/pk-post-trans.c:345: egg_debug ("add of %s as md5 invalid (%s vs %s)", filename, md5, md5_calc);
/PackageKit-0.4.2/src/pk-post-trans.c:346: pk_post_trans_sqlite_add_filename (post, filename, md5_calc);
/PackageKit-0.4.2/src/pk-post-trans.c:349: egg_debug ("existing filename %s valid, md5=%s", filename, md5);
/PackageKit-0.4.2/src/pk-post-trans.c:351: g_free (md5_calc);
/PackageKit-0.4.2/src/pk-post-trans.c:390: statement = g_strdup ("SELECT filename, md5 FROM cache");
/PackageKit-0.4.2/src/pk-post-trans.c:661: gchar *md5;
/PackageKit-0.4.2/src/pk-post-trans.c:681: md5 = pk_post_trans_get_filename_md5 (files[i]);
/PackageKit-0.4.2/src/pk-post-trans.c:682: pk_post_trans_sqlite_add_filename_details (post, files[i], package[0], md5);
/PackageKit-0.4.2/src/pk-post-trans.c:683: g_free (md5);
/PackageKit-0.4.2/src/pk-post-trans.c:824: "md5 TEXT);";
/PackageKit-0.4.2/src/pk-transaction.c:86: gboolean emit_signature_required;
/PackageKit-0.4.2/src/pk-transaction.c:140: guint signal_repo_signature_required;
/PackageKit-0.4.2/src/pk-transaction.c:160: PK_TRANSACTION_REPO_SIGNATURE_REQUIRED,
/PackageKit-0.4.2/src/pk-transaction.c:554: g_signal_handler_disconnect (transaction->priv->backend, transaction->priv->signal_repo_signature_required);
/PackageKit-0.4.2/src/pk-transaction.c:650: /* if we did ::repo-signature-required or ::eula-required, change the error code */
/PackageKit-0.4.2/src/pk-transaction.c:651: if (transaction->priv->emit_signature_required)
/PackageKit-0.4.2/src/pk-transaction.c:838: * pk_transaction_repo_signature_required_cb:
/PackageKit-0.4.2/src/pk-transaction.c:841:pk_transaction_repo_signature_required_cb (PkBackend *backend, const gchar *package_id,
/PackageKit-0.4.2/src/pk-transaction.c:854: egg_debug ("emitting repo_signature_required %s, %s, %s, %s, %s, %s, %s, %s",
/PackageKit-0.4.2/src/pk-transaction.c:857: g_signal_emit (transaction, signals [PK_TRANSACTION_REPO_SIGNATURE_REQUIRED], 0,
/PackageKit-0.4.2/src/pk-transaction.c:862: transaction->priv->emit_signature_required = TRUE;
/PackageKit-0.4.2/src/pk-transaction.c:1032: transaction->priv->signal_repo_signature_required =
/PackageKit-0.4.2/src/pk-transaction.c:1033: g_signal_connect (transaction->priv->backend, "repo-signature-required",
/PackageKit-0.4.2/src/pk-transaction.c:1034: G_CALLBACK (pk_transaction_repo_signature_required_cb), transaction);
/PackageKit-0.4.2/src/pk-transaction.c:1120: else if (priv->role == PK_ROLE_ENUM_INSTALL_SIGNATURE)
/PackageKit-0.4.2/src/pk-transaction.c:1121: desc->install_signature (priv->backend, PK_SIGTYPE_ENUM_GPG, priv->cached_key_id, priv->cached_package_id);
/PackageKit-0.4.2/src/pk-transaction.c:2711: * pk_transaction_install_signature:
/PackageKit-0.4.2/src/pk-transaction.c:2714:pk_transaction_install_signature (PkTransaction *transaction, const gchar *sig_type,
/PackageKit-0.4.2/src/pk-transaction.c:2727: if (transaction->priv->backend->desc->install_signature == NULL) {
/PackageKit-0.4.2/src/pk-transaction.c:2764: ret = pk_transaction_action_is_allowed (transaction, FALSE, PK_ROLE_ENUM_INSTALL_SIGNATURE, &error);
/PackageKit-0.4.2/src/pk-transaction.c:2774: pk_transaction_set_role (transaction, PK_ROLE_ENUM_INSTALL_SIGNATURE);
/PackageKit-0.4.2/src/pk-transaction.c:3816: signals [PK_TRANSACTION_REPO_SIGNATURE_REQUIRED] =
/PackageKit-0.4.2/src/pk-transaction.c:3817: g_signal_new ("repo-signature-required",
/PackageKit-0.4.2/src/pk-transaction.c:3872: transaction->priv->emit_signature_required = FALSE;
/PackageKit-0.4.2/src/pk-backend.h:128:gboolean pk_backend_repo_signature_required (PkBackend *backend,
/PackageKit-0.4.2/src/pk-backend.h:241: void (*install_signature) (PkBackend *backend,
/PackageKit-0.4.2/src/pk-backend.h:289: install_signature, refresh_cache, remove_packages, repo_enable, \
/PackageKit-0.4.2/src/pk-backend.h:314: install_signature, \
/PackageKit-0.4.2/src/org.freedesktop.PackageKit.Transaction.xml:623: If the package is trusted, i.e. if it has a pre-trusted security signature.
/PackageKit-0.4.2/src/org.freedesktop.PackageKit.Transaction.xml:689: Callers need the org.freedesktop.packagekit.install-signature
/PackageKit-0.4.2/src/org.freedesktop.PackageKit.Transaction.xml:1750: signature, such as GPG. If a package cannot be installed
/PackageKit-0.4.2/src/org.freedesktop.PackageKit.Transaction.xml:1830: The type of signature used. gpg , for example.
/PackageKit-0.4.2/src/pk-security-polkit.c:163: } else if (role == PK_ROLE_ENUM_INSTALL_SIGNATURE) {
/PackageKit-0.4.2/src/pk-transaction.h:167:void pk_transaction_install_signature (PkTransaction *transaction,
/PackageKit-0.4.2/backends/urpmi/helpers/urpmi_backend/actions.pm:158: bad_signature => sub {
/PackageKit-0.4.2/backends/urpmi/helpers/perl_packagekit/enums.pm:114: PK_ERROR_ENUM_BAD_GPG_SIGNATURE
/PackageKit-0.4.2/backends/urpmi/helpers/perl_packagekit/enums.pm:115: PK_ERROR_ENUM_MISSING_GPG_SIGNATURE
/PackageKit-0.4.2/backends/urpmi/helpers/perl_packagekit/enums.pm:261: PK_ERROR_ENUM_BAD_GPG_SIGNATURE => "bad-gpg-signature",
/PackageKit-0.4.2/backends/urpmi/helpers/perl_packagekit/enums.pm:262: PK_ERROR_ENUM_MISSING_GPG_SIGNATURE => "missing-gpg-signature",
/PackageKit-0.4.2/backends/urpmi/pk-backend-urpmi.c:382: NULL, /* install_signature */
/PackageKit-0.4.2/backends/razor/pk-backend-razor.c:417: NULL, /* install_signature */
/PackageKit-0.4.2/backends/yum/pk-backend-yum.c:309: * backend_install_signature:
/PackageKit-0.4.2/backends/yum/pk-backend-yum.c:312:backend_install_signature (PkBackend *backend, PkSigTypeEnum type,
/PackageKit-0.4.2/backends/yum/pk-backend-yum.c:318: pk_backend_spawn_helper (spawn, "yumBackend.py", "install-signature", type_text, key_id, package_id, NULL);
/PackageKit-0.4.2/backends/yum/pk-backend-yum.c:523: backend_install_signature, /* install_signature */
/PackageKit-0.4.2/backends/yum/yumBackend.py:1534: self.error(ERROR_MISSING_GPG_SIGNATURE, _to_unicode(e))
/PackageKit-0.4.2/backends/yum/yumBackend.py:1718: self.error(ERROR_BAD_GPG_SIGNATURE, _format_msgs(ye.value))
/PackageKit-0.4.2/backends/yum/yumBackend.py:1722: self.error(ERROR_BAD_GPG_SIGNATURE,
/PackageKit-0.4.2/backends/yum/yumBackend.py:1729: self.repo_signature_required(package_id,
/PackageKit-0.4.2/backends/yum/yumBackend.py:2204: def install_signature(self, sigtype, key_id, package):
/PackageKit-0.4.2/backends/yum/yumBackend.py:2210: if package.startswith(';;;'): #This is a repo signature
/PackageKit-0.4.2/backends/yum/yumBackend.py:2218: self.error(ERROR_UNKNOWN, "cannot install signature: %s" % str(e))
/PackageKit-0.4.2/backends/yum/yumBackend.py:2221: else: # This is a package signature
/PackageKit-0.4.2/backends/yum/yumBackend.py:2227: self.error(ERROR_UNKNOWN, "cannot install signature: %s" % str(e))
/PackageKit-0.4.2/backends/yum/yumBackend.py:2534: """ Confirm Repo GPG signature import """
/PackageKit-0.4.2/backends/yum/yumBackend.py:2536: self.backend.error(ERROR_BAD_GPG_SIGNATURE,
/PackageKit-0.4.2/backends/yum/yumBackend.py:2543: self.backend.repo_signature_required(";;;%s" % repo.id,
/PackageKit-0.4.2/backends/yum/yumBackend.py:2554: """ Repo GPG signature importer"""
/PackageKit-0.4.2/backends/conary/pk-backend-conary.c:320: NULL, /* install_signature */
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:460:zypp_signature_required (PkBackend *backend, const zypp::PublicKey &key)
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:471: pk_backend_repo_signature_required (backend,
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:480: pk_backend_error_code (backend, PK_ERROR_ENUM_GPG_FAILURE, "Signature verification for Repository %s failed", _repoName);
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:489:zypp_signature_required (PkBackend *backend, const std::string &file, const std::string &id)
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:500: pk_backend_repo_signature_required (backend,
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:509: pk_backend_error_code (backend, PK_ERROR_ENUM_GPG_FAILURE, "Signature verification for Repository %s failed", _repoName);
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:518:zypp_signature_required (PkBackend *backend, const std::string &file)
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:529: pk_backend_repo_signature_required (backend,
/PackageKit-0.4.2/backends/zypp/zypp-utils.cpp:538: pk_backend_error_code (backend, PK_ERROR_ENUM_GPG_FAILURE, "Signature verification for Repository %s failed", _repoName);
/PackageKit-0.4.2/backends/zypp/zypp-events.h:332: if (zypp_signature_required(_backend, key))
/PackageKit-0.4.2/backends/zypp/zypp-events.h:339: gboolean ok = zypp_signature_required(_backend, file);
/PackageKit-0.4.2/backends/zypp/zypp-events.h:346: gboolean ok = zypp_signature_required(_backend, file, id);
/PackageKit-0.4.2/backends/zypp/zypp-events.h:353: gboolean ok = zypp_signature_required(_backend, key);
/PackageKit-0.4.2/backends/zypp/zypp-events.h:364: gboolean ok = zypp_signature_required(_backend, file.asString ());
/PackageKit-0.4.2/backends/zypp/zypp-events.h:372: gboolean ok = zypp_signature_required(_backend, file.asString ());
/PackageKit-0.4.2/backends/zypp/zypp-events.h:381: gboolean ok = zypp_signature_required(_backend, file.asString ());
/PackageKit-0.4.2/backends/zypp/zypp-utils.h:151:gboolean zypp_signature_required (PkBackend *backend, const zypp::PublicKey &key);
/PackageKit-0.4.2/backends/zypp/zypp-utils.h:156:gboolean zypp_signature_required (PkBackend *backend, const std::string &file);
/PackageKit-0.4.2/backends/zypp/zypp-utils.h:161:gboolean zypp_signature_required (PkBackend *backend, const std::string &file, const std::string &id);
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:101: std::vector *signature = new std::vector ();
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:102: _signatures [backend] = signature;
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:1126:backend_install_signature_thread (PkBackend *backend)
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:1137: * backend_install_signature:
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:1140:backend_install_signature (PkBackend *backend, PkSigTypeEnum type, const gchar *key_id, const gchar *package_id)
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:1142: pk_backend_thread_create (backend, backend_install_signature_thread);
/PackageKit-0.4.2/backends/zypp/pk-backend-zypp.cpp:1876: backend_install_signature, /* install_signature */
/PackageKit-0.4.2/backends/pisi/pk-backend-pisi.c:383: NULL, /* install_signature */
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:42:static gboolean _has_signature = FALSE;
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:382: if (!_has_signature) {
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:383: pk_backend_repo_signature_required (backend, package_ids[0], "updates",
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:433: * backend_install_signature:
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:436:backend_install_signature (PkBackend *backend, PkSigTypeEnum type,
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:443: egg_debug ("installed signature %s for %s", key_id, package_id);
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:444: _has_signature = TRUE;
/PackageKit-0.4.2/backends/dummy/pk-backend-dummy.c:969: backend_install_signature, /* install_signature */
/PackageKit-0.4.2/backends/box/pk-backend-box.c:685: NULL, /* install_signature */
/PackageKit-0.4.2/backends/test/pk-backend-test-succeed.c:143: * backend_install_signature:
/PackageKit-0.4.2/backends/test/pk-backend-test-succeed.c:146:backend_install_signature (PkBackend *backend, PkSigTypeEnum type,
/PackageKit-0.4.2/backends/test/pk-backend-test-succeed.c:332: backend_install_signature, /* install_signature */
/PackageKit-0.4.2/backends/test/pk-backend-test-nop.c:48: NULL, /* install_signature */
/PackageKit-0.4.2/backends/test/pk-backend-test-thread.c:161: NULL, /* install_signature */
/PackageKit-0.4.2/backends/test/pk-backend-test-spawn.c:89: NULL, /* install_signature */
/PackageKit-0.4.2/backends/test/pk-backend-test-fail.c:272: NULL, /* install_signature */
/PackageKit-0.4.2/backends/test/pk-backend-test-dbus.c:99: NULL, /* install_signature */
/PackageKit-0.4.2/backends/smart/pk-backend-smart.c:481: NULL, /* install_signature */
/PackageKit-0.4.2/backends/poldek/pk-backend-poldek.c:408: if (!pm_verify_signature(ts->pmctx, path, PKGVERIFY_MD)) {
/PackageKit-0.4.2/backends/poldek/pk-backend-poldek.c:3050: NULL, /* install_signature */
/PackageKit-0.4.2/backends/opkg/pk-backend-opkg.c:140: case OPKG_MD5_ERROR:
/PackageKit-0.4.2/backends/opkg/pk-backend-opkg.c:739: NULL, /* install_signature */
/PackageKit-0.4.2/backends/apt/pk-backend-apt.c:360: NULL, /* install_signature */
/PackageKit-0.4.2/backends/apt/debfile.py:489: if line.startswith("-----BEGIN PGP SIGNATURE-"):
/PackageKit-0.4.2/backends/alpm/pk-backend-alpm.c:1475: NULL, /* install_signature */
/PackageKit-0.4.2/policy/org.freedesktop.packagekit.policy:118: Authentification requise pour désinstaller des paquets
/PackageKit-0.4.2/policy/org.freedesktop.packagekit.policy:142: Authentification requise pour mettre à jour des paquets
/PackageKit-0.4.2/client/pk-console.c:60:static PkClient *client_signature = NULL;
/PackageKit-0.4.2/client/pk-console.c:467: * pk_console_signature_finished_cb:
/PackageKit-0.4.2/client/pk-console.c:470:pk_console_signature_finished_cb (PkClient *client, PkExitEnum exit_enum, guint runtime, gpointer data)
/PackageKit-0.4.2/client/pk-console.c:1396: error_code == PK_ERROR_ENUM_MISSING_GPG_SIGNATURE && trusted) {
/PackageKit-0.4.2/client/pk-console.c:1473: * pk_console_repo_signature_required_cb:
/PackageKit-0.4.2/client/pk-console.c:1476:pk_console_repo_signature_required_cb (PkClient *client, const gchar *package_id, const gchar *repository_name,
/PackageKit-0.4.2/client/pk-console.c:1488: /* TRANSLATORS: This a request for a GPG key signature from the backend, which the client will prompt for later */
/PackageKit-0.4.2/client/pk-console.c:1489: g_print ("%s\n", _("Repository signature required"));
/PackageKit-0.4.2/client/pk-console.c:1499: import = pk_console_get_prompt (_("Do you accept this signature?"), FALSE);
/PackageKit-0.4.2/client/pk-console.c:1503: g_print ("%s\n", _("The signature was not accepted."));
/PackageKit-0.4.2/client/pk-console.c:1507: /* install signature */
/PackageKit-0.4.2/client/pk-console.c:1508: egg_debug ("install signature %s", key_id);
/PackageKit-0.4.2/client/pk-console.c:1509: ret = pk_client_install_signature (client_signature, PK_SIGTYPE_ENUM_GPG,
/PackageKit-0.4.2/client/pk-console.c:1513: egg_warning ("failed to install signature: %s", error->message);
/PackageKit-0.4.2/client/pk-console.c:1518: /* we imported a signature */
/PackageKit-0.4.2/client/pk-console.c:1554: ret = pk_client_accept_eula (client_signature, eula_id, &error);
/PackageKit-0.4.2/client/pk-console.c:1649: if (pk_bitfield_contain (roles, PK_ROLE_ENUM_INSTALL_SIGNATURE))
/PackageKit-0.4.2/client/pk-console.c:1801: g_signal_connect (client_async, "repo-signature-required",
/PackageKit-0.4.2/client/pk-console.c:1802: G_CALLBACK (pk_console_repo_signature_required_cb), NULL);
/PackageKit-0.4.2/client/pk-console.c:1830: client_signature = pk_client_new ();
/PackageKit-0.4.2/client/pk-console.c:1831: g_signal_connect (client_signature, "finished",
/PackageKit-0.4.2/client/pk-console.c:1832: G_CALLBACK (pk_console_signature_finished_cb), NULL);
/PackageKit-0.4.2/client/pk-console.c:1902: ret = pk_client_install_signature (client_async, PK_SIGTYPE_ENUM_GPG, details, parameter, &error);
/PackageKit-0.4.2/client/pk-console.c:2133: g_object_unref (client_signature);
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:128: PK_CLIENT_REPO_SIGNATURE_REQUIRED,
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:834: * pk_client_repo_signature_required_cb:
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:837:pk_client_repo_signature_required_cb (DBusGProxy *proxy, const gchar *package_id, const gchar *repository_name,
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:844: egg_debug ("emit repo-signature-required %s, %s, %s, %s, %s, %s, %s, %s",
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:848: g_signal_emit (client, signals [PK_CLIENT_REPO_SIGNATURE_REQUIRED], 0,
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2913: * pk_client_install_signature_action:
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2916:pk_client_install_signature_action (PkClient *client, PkSigTypeEnum type, const gchar *key_id,
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2941: * pk_client_install_signature:
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2943: * @package_id: a signature_id structure such as "gnome-power-manager;0.0.1;i386;fedora"
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2946: * Install a signature of the newest and most correct version.
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2951:pk_client_install_signature (PkClient *client, PkSigTypeEnum type, const gchar *key_id,
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2976: client->priv->role = PK_ROLE_ENUM_INSTALL_SIGNATURE;
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2981: ret = pk_client_install_signature_action (client, type, key_id, package_id, &error_local);
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:2996: ret = pk_client_install_signature_action (client, type, key_id, package_id, &error_local);
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:3805: else if (priv->role == PK_ROLE_ENUM_INSTALL_SIGNATURE)
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:3806: ret = pk_client_install_signature (client, PK_SIGTYPE_ENUM_GPG, priv->cached_key_id, priv->cached_package_id, error);
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:3930: G_CALLBACK (pk_client_repo_signature_required_cb), client, NULL);
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4088: * PkClient::repo-signature-required:
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4099: * The ::repo-signature-required signal is emitted when the transaction
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4100: * needs to fail for a signature prompt.
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4102: signals [PK_CLIENT_REPO_SIGNATURE_REQUIRED] =
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4103: g_signal_new ("repo-signature-required",
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4105: G_STRUCT_OFFSET (PkClientClass, repo_signature_required),
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.c:4309: G_CALLBACK (pk_client_repo_signature_required_cb), client);
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.h:115: void (* repo_signature_required) (PkClient *client,
/PackageKit-0.4.2/lib/packagekit-glib/pk-client.h:290:gboolean pk_client_install_signature (PkClient *client,
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.h:64: PK_ROLE_ENUM_INSTALL_SIGNATURE,
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.h:269: PK_ERROR_ENUM_BAD_GPG_SIGNATURE,
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.h:270: PK_ERROR_ENUM_MISSING_GPG_SIGNATURE,
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.h:385: * The signature type type
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.h:395: * The signature type type
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.h:481: PK_LICENSE_ENUM_OPENSSL,
/PackageKit-0.4.2/lib/packagekit-glib/pk-desktop.c:43: * CREATE TABLE cache ( filename TEXT, package TEXT, show INTEGER, md5 TEXT );
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.c:103: {PK_ROLE_ENUM_INSTALL_SIGNATURE, "install-signature"},
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.c:156: {PK_ERROR_ENUM_BAD_GPG_SIGNATURE, "bad-gpg-signature"},
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.c:157: {PK_ERROR_ENUM_MISSING_GPG_SIGNATURE, "missing-gpg-signature"},
/PackageKit-0.4.2/lib/packagekit-glib/pk-enum.c:408: {PK_LICENSE_ENUM_OPENSSL, "OpenSSL"},
/PackageKit-0.4.2/lib/packagekit-qt/src/transaction.h:329: * Emitted when the user has to validate a repository's signature
/PackageKit-0.4.2/lib/packagekit-qt/src/package.h:186: Openssl,
/PackageKit-0.4.2/lib/packagekit-qt/src/client.h:275: * Describes a signature type
/PackageKit-0.4.2/lib/packagekit-qt/src/client.h:283: * Describes a package signature
/PackageKit-0.4.2/lib/packagekit-qt/src/client.h:287: * \li \c type is the signature type
/PackageKit-0.4.2/lib/packagekit-qt/src/client.h:562: * \brief Installs a signature
/PackageKit-0.4.2/lib/python/packagekit/enums.py:6: role = ( "unknown", "cancel", "get-depends", "get-details", "get-files", "get-packages", "get-repo-list", "get-requires", "get-update-detail", "get-updates", "install-files", "install-packages", "install-signature", "refresh-cache", "remove-packages", "repo-enable", "repo-set-data", "resolve", "rollback", "search-details", "search-file", "search-group", "search-name", "update-packages", "update-system", "what-provides", "accept-eula", "download-packages", "get-distro-upgrades", "get-categories", "get-old-transactions", )
/PackageKit-0.4.2/lib/python/packagekit/enums.py:7: error = ( "unknown", "out-of-memory", "no-cache", "no-network", "not-supported", "internal-error", "gpg-failure", "filter-invalid", "package-id-invalid", "transaction-error", "transaction-cancelled", "package-not-installed", "package-not-found", "package-already-installed", "package-download-failed", "group-not-found", "group-list-invalid", "dep-resolution-failed", "create-thread-failed", "repo-not-found", "cannot-remove-system-package", "process-kill", "failed-initialization", "failed-finalise", "failed-config-parsing", "cannot-cancel", "cannot-get-lock", "no-packages-to-update", "cannot-write-repo-config", "local-install-failed", "bad-gpg-signature", "missing-gpg-signature", "cannot-install-source-package", "repo-configuration-error", "no-license-agreement", "file-conflicts", "package-conflicts", "repo-not-available", "invalid-package-file", "package-install-blocked", "package-corrupt", "all-packages-already-installed", "file-not-found", "no-more-mirrors-to-try", "no-distro-upgrade-data", "incompatible-architecture", "no-space-on-device", )
/PackageKit-0.4.2/lib/python/packagekit/enums.py:18: free_licenses = ( "unknown", "Glide", "AFL", "AMPAS BSD", "ADSL", "Adobe", "AGPLv1", "AGPLv3", "ASL 1.0", "ASL 1.1", "ASL 2.0", "APSL 2.0", "Artistic clarified", "Artistic 2.0", "ARL", "BitTorrent", "Boost", "BSD with advertising", "BSD", "CeCILL", "CDDL", "CPL", "Condor", "Copyright only", "Cryptix", "Crystal Stacker", "DOC", "WTFPL", "EPL", "eCos", "EFL 2.0", "EU Datagrid", "FTL", "Giftware", "GPLv2", "GPLv2 with exceptions", "GPLv2+ with exceptions", "GPLv3", "GPLv3 with exceptions", "GPLv3+ with exceptions", "LGPLv2", "LGPLv3", "gnuplot", "IBM", "iMatix", "ImageMagick", "Imlib2", "IJG", "Intel ACPI", "Interbase", "ISC", "Jabber", "JasPer", "LPPL", "libtiff", "LPL", "mecab-ipadic", "MIT", "MIT with advertising", "MPLv1.0", "MPLv1.1", "NCSA", "NGPL", "NOSL", "NetCDF", "Netscape", "Nokia", "OpenLDAP", "OpenPBS", "OSL 1.0", "OSL 1.1", "OSL 2.0", "OSL 3.0", "OpenSSL", "OReilly", "Phorum", "PHP", "Public Domain", "Python", "QPL", "RPSL", "Ruby", "Sendmail", "Sleepycat", "SLIB", "SISSL", "SPL", "TCL", "UCD", "Vim", "VNLSL", "VSL", "W3C", "wxWidgets", "xinetd", "Zend", "ZPLv1.0", "ZPLv2.0", "ZPLv2.1", "zlib", "zlib with acknowledgement", "CDL", "FBSDDL", "GFDL", "IEEE", "OFSFDL", "Open Publication", "CC-BY", "CC-BY-SA", "CC-BY-ND", "DSL", "Free Art", "OFL", "Utopia", "Arphic", "Baekmuk", "Bitstream Vera", "Lucida", "mplus", "STIX", "XANO", "VOSTROM", "Xerox License", "RiceBSD", "Qhull", )
/PackageKit-0.4.2/lib/python/packagekit/enums.py:26:ERROR_BAD_GPG_SIGNATURE = "bad-gpg-signature"
/PackageKit-0.4.2/lib/python/packagekit/enums.py:47:ERROR_MISSING_GPG_SIGNATURE = "missing-gpg-signature"
/PackageKit-0.4.2/lib/python/packagekit/enums.py:239:LICENSE_OPENSSL = "OpenSSL"
/PackageKit-0.4.2/lib/python/packagekit/enums.py:328:ROLE_INSTALL_SIGNATURE = "install-signature"
/PackageKit-0.4.2/lib/python/packagekit/backend.py:242: def repo_signature_required(self, package_id, repo_name, key_url, key_userid, key_id, key_fingerprint, key_timestamp, sig_type):
/PackageKit-0.4.2/lib/python/packagekit/backend.py:244: send 'repo-signature-required' signal:
/PackageKit-0.4.2/lib/python/packagekit/backend.py:245: @param package_id: Id of the package needing a signature
/PackageKit-0.4.2/lib/python/packagekit/backend.py:254: print "repo-signature-required\t%s\t%s\t%s\t%s\t%s\t%s\t%s\t%s" % (
/PackageKit-0.4.2/lib/python/packagekit/backend.py:347: def install_signature(self, sigtype, key_id, package):
/PackageKit-0.4.2/lib/python/packagekit/backend.py:349: Implement the {backend}-install-signature functionality
/PackageKit-0.4.2/lib/python/packagekit/backend.py:432: def repo_signature_install(self, package):
/PackageKit-0.4.2/lib/python/packagekit/backend.py:434: Implement the {backend}-repo-signature-install functionality
/PackageKit-0.4.2/lib/python/packagekit/backend.py:534: elif cmd == 'install-signature':
/PackageKit-0.4.2/lib/python/packagekit/backend.py:538: self.install_signature(sigtype, key_id, package_id)
/PackageKit-0.4.2/lib/python/packagekit/backend.py:584: elif cmd == 'signature-install':
/PackageKit-0.4.2/lib/python/packagekit/backend.py:586: self.repo_signature_install(package)
/PackageKit-0.4.2/lib/python/packagekit/client.py:366: def install_signature(self, sig_type, key_id, package_id,
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:152:# signature of the wrapper function is different. So now each method
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:223: signature='s')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:229: signature='ssb')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:235: signature='b')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:242: signature='sss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:248: signature='ssssst')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:254: signature='ss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:260: signature='s')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:271: signature='u')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:277: signature='u')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:283: signature='ssssssssssss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:289: signature='ss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:300: signature='ss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:311: signature='ss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:322: signature='ssss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:337: signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:346: signature='ssssssss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:349: send 'repo-signature-required' signal:
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:356: signature='sss')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:375: in_signature='', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:395: in_signature='', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:412: in_signature='ss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:429: in_signature='s', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:446: in_signature='', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:464: in_signature='ss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:481: in_signature='ss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:498: in_signature='ss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:515: in_signature='ss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:532: in_signature='ssb', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:549: in_signature='sss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:566: in_signature='ssb', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:583: in_signature='', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:600: in_signature='b', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:617: in_signature='sas', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:634: in_signature='as', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:651: in_signature='bas', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:669: in_signature='as', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:686: in_signature='asbb', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:704: in_signature='s', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:721: in_signature='s', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:738: in_signature='', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:755: in_signature='s', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:772: in_signature='sb', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:789: in_signature='', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:806: in_signature='s', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:823: in_signature='sss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:840: in_signature='ss', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:855: in_signature='s', out_signature='')
/PackageKit-0.4.2/lib/python/packagekit/daemonBackend.py:872: in_signature='s', out_signature='')
/PackageKit-0.4.2/contrib/gtk-module/GLASS.txt:86:Schwäbisch / Swabian: I kå Glas frässa, ond des macht mr nix!
/PackageKit-0.4.2/NEWS:224: - Glib: Add GetDistroUpgrades to requeue as this may be required with a repo signature (Richard Hughes)
/PackageKit-0.4.2/NEWS:312: - zypp: Adapted signature callbacks (Stefan Haas)
/PackageKit-0.4.2/NEWS:313: - zypp: Set status when installing a signature (Stefan Haas)
/PackageKit-0.4.2/NEWS:1201: - EULA and GPG signature callback support
/PackageKit-0.4.2/NEWS:1289: - zypp: add the install_signature backend method, and reorder the methods (Stefan Haas)
/PackageKit-0.4.2/NEWS:1337: - Add the install_signature backend method (Richard Hughes)
/PackageKit-0.4.2/NEWS:1344: - Don't allow org.freedesktop.packagekit.install-signature to be retained (Richard Hughes)
/PackageKit-0.4.2/NEWS:1373: - Don't allow a backend to use pk_backend_repo_signature_required more than once (Richard Hughes)
/PackageKit-0.4.2/NEWS:1425: - yum: Extended repo_signature_required and implemented new signature-install method (Tim Lauridsen)
/PackageKit-0.4.2/NEWS:1536: - Changed signal PK_BACKEND_REPO_SIGNATURE_REQUIRED to avoid a segfault (Stefan Haas)
/PackageKit-0.4.2/NEWS:1672: - yum: fixed ERROR_SIGNATURE_NOT_IMPORTED traceback (Tim Lauridsen)