1 diff -u -r ../apt-1.1.3/cmdline/apt-key.in ./cmdline/apt-key.in
2 --- ../apt-1.1.3/cmdline/apt-key.in 2015-11-30 03:08:24.000000000 -0500
3 +++ ./cmdline/apt-key.in 2015-12-03 16:55:22.860914040 -0500
5 aptkey_echo() { echo "$@"; }
8 - if [ "$(id -u)" -ne 0 ]; then
9 - echo >&2 "ERROR: This command can only be used by root."
15 get_fingerprints_of_keyring() {
17 if [ -s "$TRUSTEDFILE" ]; then
18 $ACTION "$TRUSTEDFILE" "$@"
20 - local TRUSTEDPARTS="/etc/apt/trusted.gpg.d"
21 + local TRUSTEDPARTS="@TERMUX_PREFIX@/etc/apt/trusted.gpg.d"
22 eval $(apt-config shell TRUSTEDPARTS Dir::Etc::TrustedParts/d)
23 if [ -d "$TRUSTEDPARTS" ]; then
24 # strip / suffix as gpg will double-slash in that case (#665411)
28 # otherwise all known keyrings are merged
29 - local TRUSTEDPARTS="/etc/apt/trusted.gpg.d"
30 + local TRUSTEDPARTS="@TERMUX_PREFIX@/etc/apt/trusted.gpg.d"
31 eval $(apt-config shell TRUSTEDPARTS Dir::Etc::TrustedParts/d)
32 if [ -d "$TRUSTEDPARTS" ]; then
33 # ignore errors mostly for non-existing $TRUSTEDFILE
37 if [ -z "$TRUSTEDFILE" ]; then
38 - TRUSTEDFILE="/etc/apt/trusted.gpg"
39 + TRUSTEDFILE="@TERMUX_PREFIX@/etc/apt/trusted.gpg"
40 eval $(apt-config shell TRUSTEDFILE Apt::GPGV::TrustedKeyring)
41 eval $(apt-config shell TRUSTEDFILE Dir::Etc::Trusted/f)