summaryrefslogtreecommitdiff
path: root/src/include
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2021-11-05 22:48:11 +0100
committerChristian Grothoff <christian@grothoff.org>2021-11-05 22:48:11 +0100
commiteaf9d728f54681be4e9ed3467ff9d10e71ad2b04 (patch)
tree3fc06dfc4a1dca958f3b810b740f915215503d1d /src/include
parentba627bf84c89ea93a117bce8563b30a3d460e633 (diff)
downloadexchange-eaf9d728f54681be4e9ed3467ff9d10e71ad2b04.tar.gz
exchange-eaf9d728f54681be4e9ed3467ff9d10e71ad2b04.tar.bz2
exchange-eaf9d728f54681be4e9ed3467ff9d10e71ad2b04.zip
more crypto refactoring
Diffstat (limited to 'src/include')
-rw-r--r--src/include/taler_crypto_lib.h15
1 files changed, 0 insertions, 15 deletions
diff --git a/src/include/taler_crypto_lib.h b/src/include/taler_crypto_lib.h
index 961c36695..0a0be0cb7 100644
--- a/src/include/taler_crypto_lib.h
+++ b/src/include/taler_crypto_lib.h
@@ -2165,19 +2165,4 @@ TALER_rsa_blind (const struct TALER_CoinPubHash *hash,
size_t *buf_size);
-/**
- * Unblind a blind-signed signature. The signature should have been generated
- * with GNUNET_CRYPTO_rsa_sign() using a hash that was blinded with
- * GNUNET_CRYPTO_rsa_blind().
- *
- * @param sig the signature made on the blinded signature purpose
- * @param bks the blinding key secret used to blind the signature purpose
- * @param pkey the public key of the signer
- * @return unblinded signature on success, NULL if RSA key is bad or malicious.
- */
-struct GNUNET_CRYPTO_RsaSignature *
-TALER_rsa_unblind (const struct GNUNET_CRYPTO_RsaSignature *sig,
- const struct GNUNET_CRYPTO_RsaBlindingKeySecret *bks,
- struct GNUNET_CRYPTO_RsaPublicKey *pkey);
-
#endif