summaryrefslogtreecommitdiffstats
path: root/guide
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2020-11-24 10:45:29 +0100
committerJustus Winter <justus@sequoia-pgp.org>2020-12-07 15:57:42 +0100
commit551f29499a3ca9c5b15692ac7877730808dda8cb (patch)
treee84fb3c3d3bb0390d248a874d1fdd192a64dd0d0 /guide
parente524ef5fbc97c0c54b8144aed81c383faa099173 (diff)
openpgp: Make serialize::stream::Message Send + Sync.
- See #615.
Diffstat (limited to 'guide')
-rw-r--r--guide/src/chapter_01.md16
-rw-r--r--guide/src/chapter_02.md8
2 files changed, 12 insertions, 12 deletions
diff --git a/guide/src/chapter_01.md b/guide/src/chapter_01.md
index 874b70e6..0a60b1ea 100644
--- a/guide/src/chapter_01.md
+++ b/guide/src/chapter_01.md
@@ -55,13 +55,13 @@ fn main() -> openpgp::Result<()> {
#
# /// Signs the given message.
# fn sign(policy: &dyn Policy,
-# sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert)
+# sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert)
# -> openpgp::Result<()>
# {
# // Get the keypair to do the signing from the Cert.
# let keypair = tsk
# .keys().unencrypted_secret()
-# .with_policy(policy, None).supported().alive().revoked(false).for_signing()
+# .with_policy(policy, None).alive().revoked(false).for_signing()
# .nth(0).unwrap().key().clone().into_keypair()?;
#
# // Start streaming an OpenPGP message.
@@ -206,13 +206,13 @@ fn generate() -> openpgp::Result<openpgp::Cert> {
#
# /// Signs the given message.
# fn sign(policy: &dyn Policy,
-# sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert)
+# sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert)
# -> openpgp::Result<()>
# {
# // Get the keypair to do the signing from the Cert.
# let keypair = tsk
# .keys().unencrypted_secret()
-# .with_policy(policy, None).supported().alive().revoked(false).for_signing()
+# .with_policy(policy, None).alive().revoked(false).for_signing()
# .nth(0).unwrap().key().clone().into_keypair()?;
#
# // Start streaming an OpenPGP message.
@@ -357,13 +357,13 @@ implements [`io::Write`], and we simply write the plaintext to it.
#
/// Signs the given message.
fn sign(policy: &dyn Policy,
- sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert)
+ sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert)
-> openpgp::Result<()>
{
// Get the keypair to do the signing from the Cert.
let keypair = tsk
.keys().unencrypted_secret()
- .with_policy(policy, None).supported().alive().revoked(false).for_signing()
+ .with_policy(policy, None).alive().revoked(false).for_signing()
.nth(0).unwrap().key().clone().into_keypair()?;
// Start streaming an OpenPGP message.
@@ -519,13 +519,13 @@ Verified data can be read from this using [`io::Read`].
#
# /// Signs the given message.
# fn sign(policy: &dyn Policy,
-# sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert)
+# sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert)
# -> openpgp::Result<()>
# {
# // Get the keypair to do the signing from the Cert.
# let keypair = tsk
# .keys().unencrypted_secret()
-# .with_policy(policy, None).supported().alive().revoked(false).for_signing()
+# .with_policy(policy, None).alive().revoked(false).for_signing()
# .nth(0).unwrap().key().clone().into_keypair()?;
#
# // Start streaming an OpenPGP message.
diff --git a/guide/src/chapter_02.md b/guide/src/chapter_02.md
index 7d663701..fc88f653 100644
--- a/guide/src/chapter_02.md
+++ b/guide/src/chapter_02.md
@@ -55,7 +55,7 @@ fn main() -> openpgp::Result<()> {
#
# /// Encrypts the given message.
# fn encrypt(policy: &dyn Policy,
-# sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert)
+# sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# let recipients =
# recipient.keys().with_policy(policy, None).supported().alive().revoked(false)
@@ -203,7 +203,7 @@ fn generate() -> openpgp::Result<openpgp::Cert> {
#
# /// Encrypts the given message.
# fn encrypt(policy: &dyn Policy,
-# sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert)
+# sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# let recipients =
# recipient.keys().with_policy(policy, None).supported().alive().revoked(false)
@@ -351,7 +351,7 @@ implements [`io::Write`], and we simply write the plaintext to it.
#
/// Encrypts the given message.
fn encrypt(policy: &dyn Policy,
- sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert)
+ sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert)
-> openpgp::Result<()> {
let recipients =
recipient.keys().with_policy(policy, None).supported().alive().revoked(false)
@@ -513,7 +513,7 @@ Decrypted data can be read from this using [`io::Read`].
#
# /// Encrypts the given message.
# fn encrypt(policy: &dyn Policy,
-# sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert)
+# sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# let recipients =
# recipient.keys().with_policy(policy, None).supported().alive().revoked(false)