aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNeal H. Walfield <[email protected]>2015-09-14 19:24:57 +0000
committerNeal H. Walfield <[email protected]>2015-09-16 13:15:25 +0000
commitefbaa8f891812e13ae9e689299aa2cd51781ccb3 (patch)
treeba63e7d7fe4519d048c545c4c77214282c405a36
parentg10: Remove unused function get_seckey_byfprint. (diff)
downloadgnupg-efbaa8f891812e13ae9e689299aa2cd51781ccb3.tar.gz
gnupg-efbaa8f891812e13ae9e689299aa2cd51781ccb3.zip
g10: Remove unused function get_seckeyblock_byfprint.
* g10/keydb.h (get_seckeyblock_byfprint): Remove prototype. * g10/getkey.c (get_seckeyblock_byfprint): Remove function. -- Signed-off-by: Neal H. Walfield <[email protected]>.
Diffstat (limited to '')
-rw-r--r--g10/getkey.c29
-rw-r--r--g10/keydb.h3
2 files changed, 0 insertions, 32 deletions
diff --git a/g10/getkey.c b/g10/getkey.c
index 2f97000ca..27e2f7a37 100644
--- a/g10/getkey.c
+++ b/g10/getkey.c
@@ -1046,35 +1046,6 @@ get_seckey_default (PKT_public_key *pk)
return err;
}
-
-
-/* Search for a secret key with the given fingerprint and return the
- complete keyblock which may have more than only this key. Return
- an error if no corresponding secret key is available. */
-gpg_error_t
-get_seckeyblock_byfprint (kbnode_t *ret_keyblock,
- const byte *fprint, size_t fprint_len)
-{
- gpg_error_t err;
- struct getkey_ctx_s ctx;
-
- if (fprint_len != 20 && fprint_len == 16)
- return gpg_error (GPG_ERR_BUG);
-
- memset (&ctx, 0, sizeof ctx);
- ctx.not_allocated = 1;
- ctx.kr_handle = keydb_new ();
- ctx.nitems = 1;
- ctx.items[0].mode = (fprint_len == 16
- ? KEYDB_SEARCH_MODE_FPR16 : KEYDB_SEARCH_MODE_FPR20);
- memcpy (ctx.items[0].u.fpr, fprint, fprint_len);
- err = lookup (&ctx, ret_keyblock, NULL, 1);
- getkey_end (&ctx);
-
- return err;
-}
-
-
/* The new function to return a key.
FIXME: Document it. */
diff --git a/g10/keydb.h b/g10/keydb.h
index f103607d8..67af5fbeb 100644
--- a/g10/keydb.h
+++ b/g10/keydb.h
@@ -421,9 +421,6 @@ int have_secret_key_with_kid (u32 *keyid);
gpg_error_t get_seckey_default (PKT_public_key *pk);
-gpg_error_t get_seckeyblock_byfprint (kbnode_t *ret_keyblock,
- const byte *fprint, size_t fprint_len);
-
gpg_error_t getkey_bynames (getkey_ctx_t *retctx, PKT_public_key *pk,
strlist_t names, int want_secret,
kbnode_t *ret_keyblock);