aboutsummaryrefslogtreecommitdiffstats
path: root/g10/mainproc.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2025-02-20 13:50:20 +0000
committerWerner Koch <[email protected]>2025-02-20 13:50:20 +0000
commit5e87e452e4e8c4a653180eafc119be51a990da5c (patch)
treed3af5ce43bb7c9dca61ed112729e2bf676b8ffd2 /g10/mainproc.c
parentdoc: Declare --disable-http as legacy. (diff)
downloadgnupg-5e87e452e4e8c4a653180eafc119be51a990da5c.tar.gz
gnupg-5e87e452e4e8c4a653180eafc119be51a990da5c.zip
gpg: Remove a signature check function wrapper.
* g10/sig-check.c (check_signature2): Rename to (check_signature): this and remove the old wrapper. Adjust all callers.
Diffstat (limited to 'g10/mainproc.c')
-rw-r--r--g10/mainproc.c13
1 files changed, 5 insertions, 8 deletions
diff --git a/g10/mainproc.c b/g10/mainproc.c
index 039db9ccd..6494f60ed 100644
--- a/g10/mainproc.c
+++ b/g10/mainproc.c
@@ -1263,19 +1263,17 @@ do_check_sig (CTX c, kbnode_t node, const void *extrahash, size_t extrahashlen,
/* We only get here if we are checking the signature of a binary
(0x00) or text document (0x01). */
- rc = check_signature2 (c->ctrl, sig, md, extrahash, extrahashlen,
- forced_pk,
- NULL, is_expkey, is_revkey, r_pk);
+ rc = check_signature (c->ctrl, sig, md, extrahash, extrahashlen,
+ forced_pk, NULL, is_expkey, is_revkey, r_pk);
if (! rc)
md_good = md;
else if (gpg_err_code (rc) == GPG_ERR_BAD_SIGNATURE && md2)
{
PKT_public_key *pk2;
- rc = check_signature2 (c->ctrl, sig, md2, extrahash, extrahashlen,
- forced_pk,
- NULL, is_expkey, is_revkey,
- r_pk? &pk2 : NULL);
+ rc = check_signature (c->ctrl, sig, md2, extrahash, extrahashlen,
+ forced_pk, NULL, is_expkey, is_revkey,
+ r_pk? &pk2 : NULL);
if (!rc)
{
md_good = md2;
@@ -1897,7 +1895,6 @@ issuer_fpr_string (PKT_signature *sig)
return p? bin2hex (p, n, NULL) : NULL;
}
-
static void
print_good_bad_signature (int statno, const char *keyid_str, kbnode_t un,
PKT_signature *sig, int rc)