summaryrefslogtreecommitdiffstats
path: root/g10/call-agent.h
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2011-03-02 15:35:10 +0100
committerWerner Koch <wk@gnupg.org>2011-03-02 15:35:10 +0100
commit1c09def22d97de3738a2bec4970504bfc155680b (patch)
tree44fbc5d154ca96be68fb8e43c6695c8dba9580d5 /g10/call-agent.h
parentAdd comment to last patch. (diff)
downloadgnupg2-1c09def22d97de3738a2bec4970504bfc155680b.tar.xz
gnupg2-1c09def22d97de3738a2bec4970504bfc155680b.zip
Fix usage of SHA-2 algorithm with OpenPGP cards.
This was a regression in 2.1 introduced due to having the agent do the signing in contrast to the old "SCD PKSIGN" command which accesses the scdaemon directly and passed the hash algorithm. The hash algorithm is used by app-openpgp.c only for a sanity check.
Diffstat (limited to '')
-rw-r--r--g10/call-agent.h10
1 files changed, 0 insertions, 10 deletions
diff --git a/g10/call-agent.h b/g10/call-agent.h
index 337847dab..1e7e15abc 100644
--- a/g10/call-agent.h
+++ b/g10/call-agent.h
@@ -98,16 +98,6 @@ int agent_scd_writekey (int keyno, const char *serialno,
int agent_scd_genkey (struct agent_card_genkey_s *info, int keyno, int force,
const char *serialno, u32 createtime);
-/* Send a PKSIGN command to the SCdaemon. */
-int agent_scd_pksign (const char *keyid, int hashalgo,
- const unsigned char *indata, size_t indatalen,
- unsigned char **r_buf, size_t *r_buflen);
-
-/* Send a PKDECRYPT command to the SCdaemon. */
-int agent_scd_pkdecrypt (const char *serialno,
- const unsigned char *indata, size_t indatalen,
- unsigned char **r_buf, size_t *r_buflen);
-
/* Send a READKEY command to the SCdaemon. */
int agent_scd_readcert (const char *certidstr,
void **r_buf, size_t *r_buflen);