remove _LOG_XX
Change-Id: Iace32ffec68a8561465f49b217200c3a7590c273
diff --git a/src/requester.cpp b/src/requester.cpp
index 4cb4135..16665a3 100644
--- a/src/requester.cpp
+++ b/src/requester.cpp
@@ -38,7 +38,7 @@
namespace ndn {
namespace ndncert {
-_LOG_INIT(ndncert.client);
+NDN_LOG_INIT(ndncert.client);
shared_ptr<Interest>
Requester::genCaProfileDiscoveryInterest(const Name& caName)
@@ -66,7 +66,7 @@
{
auto caItem = INFO::decodeDataContent(reply.getContent());
if (!security::verifySignature(reply, *caItem.m_cert)) {
- _LOG_ERROR("Cannot verify replied Data packet signature.");
+ NDN_LOG_ERROR("Cannot verify replied Data packet signature.");
BOOST_THROW_EXCEPTION(std::runtime_error("Cannot verify replied Data packet signature."));
}
return caItem;
@@ -80,7 +80,7 @@
auto certBlock = caItem.m_cert->wireEncode();
caItem.m_cert = std::make_shared<security::Certificate>(certBlock);
if (caItem.m_cert->getFullName() != caCertFullName) {
- _LOG_ERROR("Ca profile does not match the certificate information offered by the original CA.");
+ NDN_LOG_ERROR("Ca profile does not match the certificate information offered by the original CA.");
BOOST_THROW_EXCEPTION(std::runtime_error("Cannot verify replied Data packet signature."));
}
return onCaProfileResponse(reply);
@@ -103,7 +103,7 @@
std::vector<std::pair<Name, int>>& identityNames, std::vector<Name>& otherCas)
{
if (!security::verifySignature(reply, *ca.m_cert)) {
- _LOG_ERROR("Cannot verify replied Data packet signature.");
+ NDN_LOG_ERROR("Cannot verify replied Data packet signature.");
BOOST_THROW_EXCEPTION(std::runtime_error("Cannot verify replied Data packet signature."));
return;
}
@@ -192,7 +192,7 @@
Requester::onNewRenewRevokeResponse(RequesterState& state, const Data& reply)
{
if (!security::verifySignature(reply, *state.m_caItem.m_cert)) {
- _LOG_ERROR("Cannot verify replied Data packet signature.");
+ NDN_LOG_ERROR("Cannot verify replied Data packet signature.");
BOOST_THROW_EXCEPTION(std::runtime_error("Cannot verify replied Data packet signature."));
}
processIfError(reply);
@@ -254,7 +254,7 @@
Requester::onChallengeResponse(RequesterState& state, const Data& reply)
{
if (!security::verifySignature(reply, *state.m_caItem.m_cert)) {
- _LOG_ERROR("Cannot verify replied Data packet signature.");
+ NDN_LOG_ERROR("Cannot verify replied Data packet signature.");
BOOST_THROW_EXCEPTION(std::runtime_error("Cannot verify replied Data packet signature."));
}
processIfError(reply);
@@ -280,7 +280,7 @@
return std::make_shared<security::Certificate>(reply);
}
catch (const std::exception& e) {
- _LOG_ERROR("Cannot parse replied certificate ");
+ NDN_LOG_ERROR("Cannot parse replied certificate ");
BOOST_THROW_EXCEPTION(std::runtime_error("Cannot parse replied certificate "));
return nullptr;
}
@@ -312,7 +312,7 @@
if (std::get<0>(errorInfo) == ErrorCode::NO_ERROR) {
return;
}
- _LOG_ERROR("Error info replied from the CA with Error code: " +
+ NDN_LOG_ERROR("Error info replied from the CA with Error code: " +
errorCodeToString(std::get<0>(errorInfo)) +
" and Error Info: " + std::get<1>(errorInfo));
BOOST_THROW_EXCEPTION(std::runtime_error("Error info replied from the CA with Error code: " +