diff options
author | Werner Koch <[email protected]> | 2025-02-20 13:50:20 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2025-02-20 13:50:20 +0000 |
commit | 5e87e452e4e8c4a653180eafc119be51a990da5c (patch) | |
tree | d3af5ce43bb7c9dca61ed112729e2bf676b8ffd2 /g10/mainproc.c | |
parent | doc: Declare --disable-http as legacy. (diff) | |
download | gnupg-5e87e452e4e8c4a653180eafc119be51a990da5c.tar.gz gnupg-5e87e452e4e8c4a653180eafc119be51a990da5c.zip |
gpg: Remove a signature check function wrapper.
* g10/sig-check.c (check_signature2): Rename to
(check_signature): this and remove the old wrapper. Adjust all
callers.
Diffstat (limited to 'g10/mainproc.c')
-rw-r--r-- | g10/mainproc.c | 13 |
1 files changed, 5 insertions, 8 deletions
diff --git a/g10/mainproc.c b/g10/mainproc.c index 039db9ccd..6494f60ed 100644 --- a/g10/mainproc.c +++ b/g10/mainproc.c @@ -1263,19 +1263,17 @@ do_check_sig (CTX c, kbnode_t node, const void *extrahash, size_t extrahashlen, /* We only get here if we are checking the signature of a binary (0x00) or text document (0x01). */ - rc = check_signature2 (c->ctrl, sig, md, extrahash, extrahashlen, - forced_pk, - NULL, is_expkey, is_revkey, r_pk); + rc = check_signature (c->ctrl, sig, md, extrahash, extrahashlen, + forced_pk, NULL, is_expkey, is_revkey, r_pk); if (! rc) md_good = md; else if (gpg_err_code (rc) == GPG_ERR_BAD_SIGNATURE && md2) { PKT_public_key *pk2; - rc = check_signature2 (c->ctrl, sig, md2, extrahash, extrahashlen, - forced_pk, - NULL, is_expkey, is_revkey, - r_pk? &pk2 : NULL); + rc = check_signature (c->ctrl, sig, md2, extrahash, extrahashlen, + forced_pk, NULL, is_expkey, is_revkey, + r_pk? &pk2 : NULL); if (!rc) { md_good = md2; @@ -1897,7 +1895,6 @@ issuer_fpr_string (PKT_signature *sig) return p? bin2hex (p, n, NULL) : NULL; } - static void print_good_bad_signature (int statno, const char *keyid_str, kbnode_t un, PKT_signature *sig, int rc) |