diff options
author | Neal H. Walfield <[email protected]> | 2015-09-14 19:24:57 +0000 |
---|---|---|
committer | Neal H. Walfield <[email protected]> | 2015-09-16 13:15:25 +0000 |
commit | efbaa8f891812e13ae9e689299aa2cd51781ccb3 (patch) | |
tree | ba63e7d7fe4519d048c545c4c77214282c405a36 | |
parent | g10: Remove unused function get_seckey_byfprint. (diff) | |
download | gnupg-efbaa8f891812e13ae9e689299aa2cd51781ccb3.tar.gz gnupg-efbaa8f891812e13ae9e689299aa2cd51781ccb3.zip |
g10: Remove unused function get_seckeyblock_byfprint.
* g10/keydb.h (get_seckeyblock_byfprint): Remove prototype.
* g10/getkey.c (get_seckeyblock_byfprint): Remove function.
--
Signed-off-by: Neal H. Walfield <[email protected]>.
Diffstat (limited to '')
-rw-r--r-- | g10/getkey.c | 29 | ||||
-rw-r--r-- | g10/keydb.h | 3 |
2 files changed, 0 insertions, 32 deletions
diff --git a/g10/getkey.c b/g10/getkey.c index 2f97000ca..27e2f7a37 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1046,35 +1046,6 @@ get_seckey_default (PKT_public_key *pk) return err; } - - -/* Search for a secret key with the given fingerprint and return the - complete keyblock which may have more than only this key. Return - an error if no corresponding secret key is available. */ -gpg_error_t -get_seckeyblock_byfprint (kbnode_t *ret_keyblock, - const byte *fprint, size_t fprint_len) -{ - gpg_error_t err; - struct getkey_ctx_s ctx; - - if (fprint_len != 20 && fprint_len == 16) - return gpg_error (GPG_ERR_BUG); - - memset (&ctx, 0, sizeof ctx); - ctx.not_allocated = 1; - ctx.kr_handle = keydb_new (); - ctx.nitems = 1; - ctx.items[0].mode = (fprint_len == 16 - ? KEYDB_SEARCH_MODE_FPR16 : KEYDB_SEARCH_MODE_FPR20); - memcpy (ctx.items[0].u.fpr, fprint, fprint_len); - err = lookup (&ctx, ret_keyblock, NULL, 1); - getkey_end (&ctx); - - return err; -} - - /* The new function to return a key. FIXME: Document it. */ diff --git a/g10/keydb.h b/g10/keydb.h index f103607d8..67af5fbeb 100644 --- a/g10/keydb.h +++ b/g10/keydb.h @@ -421,9 +421,6 @@ int have_secret_key_with_kid (u32 *keyid); gpg_error_t get_seckey_default (PKT_public_key *pk); -gpg_error_t get_seckeyblock_byfprint (kbnode_t *ret_keyblock, - const byte *fprint, size_t fprint_len); - gpg_error_t getkey_bynames (getkey_ctx_t *retctx, PKT_public_key *pk, strlist_t names, int want_secret, kbnode_t *ret_keyblock); |