diff options
author | Werner Koch <[email protected]> | 2010-04-20 17:57:50 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2010-04-20 17:57:50 +0000 |
commit | 21b0a955be63dc69625194ece8557e79b6ad60c2 (patch) | |
tree | 97de4727b46f1f2b5dac30142e5a408c898d48fc /g10/packet.h | |
parent | Add missing file. (diff) | |
download | gnupg-21b0a955be63dc69625194ece8557e79b6ad60c2.tar.gz gnupg-21b0a955be63dc69625194ece8557e79b6ad60c2.zip |
Generating an OpenPGP key cia gpg-agent basically works.
Diffstat (limited to 'g10/packet.h')
-rw-r--r-- | g10/packet.h | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/g10/packet.h b/g10/packet.h index 54f8295c1..2a6aea2b1 100644 --- a/g10/packet.h +++ b/g10/packet.h @@ -206,7 +206,7 @@ struct revoke_info /**************** * Note about the pkey/skey elements: We assume that the secret keys - * has the same elemts as the public key at the begin of the array, so + * has the same elements as the public key at the begin of the array, so * that npkey < nskey and it is possible to compare the secret and * public keys by comparing the first npkey elements of pkey againts skey. */ @@ -477,9 +477,7 @@ int signature_check2( PKT_signature *sig, gcry_md_hd_t digest, u32 *r_expiredate int *r_expired, int *r_revoked, PKT_public_key *ret_pk ); /*-- seckey-cert.c --*/ -int is_secret_key_protected( PKT_secret_key *sk ); -int check_secret_key( PKT_secret_key *sk, int retries ); -int protect_secret_key( PKT_secret_key *sk, DEK *dek ); +int is_secret_key_protected (PKT_public_key *pk); /*-- pubkey-enc.c --*/ int get_session_key( PKT_pubkey_enc *k, DEK *dek ); |