summaryrefslogtreecommitdiffstats
path: root/guide
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2020-02-12 12:32:36 +0100
committerJustus Winter <justus@sequoia-pgp.org>2020-02-12 15:12:21 +0100
commitb0648d984bc618686a18d5e0a5173c16b2328549 (patch)
treee09b99d4fd9cceea8eb064f6a2267d5df757e5b8 /guide
parente5d72b7c92d5af171855c8267c57f5e33ff6cc2e (diff)
openpgp: Add optional cipher argument to PKESK3::decrypt.
Diffstat (limited to 'guide')
-rw-r--r--guide/src/chapter_02.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/guide/src/chapter_02.md b/guide/src/chapter_02.md
index ffa0b29b..8eda8284 100644
--- a/guide/src/chapter_02.md
+++ b/guide/src/chapter_02.md
@@ -139,7 +139,7 @@ fn main() {
# // The secret key is not encrypted.
# let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
#
-# pkesks[0].decrypt(&mut pair)
+# pkesks[0].decrypt(&mut pair, None)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
# .map(|_| None)
# // XXX: In production code, return the Fingerprint of the
@@ -287,7 +287,7 @@ fn generate() -> openpgp::Result<openpgp::Cert> {
# // The secret key is not encrypted.
# let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
#
-# pkesks[0].decrypt(&mut pair)
+# pkesks[0].decrypt(&mut pair, None)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
# .map(|_| None)
# // XXX: In production code, return the Fingerprint of the
@@ -435,7 +435,7 @@ fn encrypt(policy: &dyn Policy,
# // The secret key is not encrypted.
# let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
#
-# pkesks[0].decrypt(&mut pair)
+# pkesks[0].decrypt(&mut pair, None)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
# .map(|_| None)
# // XXX: In production code, return the Fingerprint of the
@@ -596,7 +596,7 @@ impl<'a> DecryptionHelper for Helper<'a> {
// The secret key is not encrypted.
let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
- pkesks[0].decrypt(&mut pair)
+ pkesks[0].decrypt(&mut pair, None)
.and_then(|(algo, session_key)| decrypt(algo, &session_key))
.map(|_| None)
// XXX: In production code, return the Fingerprint of the