summaryrefslogtreecommitdiffstats
path: root/guide
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2020-02-06 14:49:01 +0100
committerJustus Winter <justus@sequoia-pgp.org>2020-02-06 15:06:09 +0100
commitd6ed2a3cbb18c50c2da73d5efbdade343e3bad12 (patch)
tree15cefd9945499ab20065acb30df86d3ccd829cca /guide
parent23110e2844a19ffdd1d5c1699cb868f93f734ccc (diff)
openpgp: Rename methods 'set_policy' to 'with_policy'.
- Fixes #427.
Diffstat (limited to 'guide')
-rw-r--r--guide/src/chapter_01.md8
-rw-r--r--guide/src/chapter_02.md16
2 files changed, 12 insertions, 12 deletions
diff --git a/guide/src/chapter_01.md b/guide/src/chapter_01.md
index 629515eb..178e8e83 100644
--- a/guide/src/chapter_01.md
+++ b/guide/src/chapter_01.md
@@ -57,7 +57,7 @@ fn main() {
# -> openpgp::Result<()>
# {
# // Get the keypair to do the signing from the Cert.
-# let keypair = tsk.keys().set_policy(policy, None)
+# let keypair = tsk.keys().with_policy(policy, None)
# .alive().revoked(false).for_signing().nth(0).unwrap()
# .key().clone().mark_parts_secret().unwrap().into_keypair()?;
#
@@ -211,7 +211,7 @@ fn generate() -> openpgp::Result<openpgp::Cert> {
# -> openpgp::Result<()>
# {
# // Get the keypair to do the signing from the Cert.
-# let keypair = tsk.keys().set_policy(policy, None)
+# let keypair = tsk.keys().with_policy(policy, None)
# .alive().revoked(false).for_signing().nth(0).unwrap()
# .key().clone().mark_parts_secret().unwrap().into_keypair()?;
#
@@ -365,7 +365,7 @@ fn sign(policy: &dyn Policy,
-> openpgp::Result<()>
{
// Get the keypair to do the signing from the Cert.
- let keypair = tsk.keys().set_policy(policy, None)
+ let keypair = tsk.keys().with_policy(policy, None)
.alive().revoked(false).for_signing().nth(0).unwrap()
.key().clone().mark_parts_secret().unwrap().into_keypair()?;
@@ -530,7 +530,7 @@ Verified data can be read from this using [`io::Read`].
# -> openpgp::Result<()>
# {
# // Get the keypair to do the signing from the Cert.
-# let keypair = tsk.keys().set_policy(policy, None)
+# let keypair = tsk.keys().with_policy(policy, None)
# .alive().revoked(false).for_signing().nth(0).unwrap()
# .key().clone().mark_parts_secret().unwrap().into_keypair()?;
#
diff --git a/guide/src/chapter_02.md b/guide/src/chapter_02.md
index 6f18c59c..ffa0b29b 100644
--- a/guide/src/chapter_02.md
+++ b/guide/src/chapter_02.md
@@ -56,7 +56,7 @@ fn main() {
# -> openpgp::Result<()> {
# // Build a vector of recipients to hand to Encryptor.
# let mut recipients =
-# recipient.keys().set_policy(policy, None).alive().revoked(false)
+# recipient.keys().with_policy(policy, None).alive().revoked(false)
# .for_transport_encryption()
# .map(|ka| ka.key().into())
# .collect::<Vec<_>>();
@@ -133,7 +133,7 @@ fn main() {
# where D: FnMut(SymmetricAlgorithm, &SessionKey) -> openpgp::Result<()>
# {
# // The encryption key is the first and only subkey.
-# let key = self.secret.keys().set_policy(self.policy, None)
+# let key = self.secret.keys().with_policy(self.policy, None)
# .for_transport_encryption().nth(0).unwrap().key().clone();
#
# // The secret key is not encrypted.
@@ -204,7 +204,7 @@ fn generate() -> openpgp::Result<openpgp::Cert> {
# -> openpgp::Result<()> {
# // Build a vector of recipients to hand to Encryptor.
# let mut recipients =
-# recipient.keys().set_policy(policy, None).alive().revoked(false)
+# recipient.keys().with_policy(policy, None).alive().revoked(false)
# .for_transport_encryption()
# .map(|ka| ka.key().into())
# .collect::<Vec<_>>();
@@ -281,7 +281,7 @@ fn generate() -> openpgp::Result<openpgp::Cert> {
# where D: FnMut(SymmetricAlgorithm, &SessionKey) -> openpgp::Result<()>
# {
# // The encryption key is the first and only subkey.
-# let key = self.secret.keys().set_policy(self.policy, None)
+# let key = self.secret.keys().with_policy(self.policy, None)
# .for_transport_encryption().nth(0).unwrap().key().clone();
#
# // The secret key is not encrypted.
@@ -352,7 +352,7 @@ fn encrypt(policy: &dyn Policy,
-> openpgp::Result<()> {
// Build a vector of recipients to hand to Encryptor.
let mut recipients =
- recipient.keys().set_policy(policy, None).alive().revoked(false)
+ recipient.keys().with_policy(policy, None).alive().revoked(false)
.for_transport_encryption()
.map(|ka| ka.key().into())
.collect::<Vec<_>>();
@@ -429,7 +429,7 @@ fn encrypt(policy: &dyn Policy,
# where D: FnMut(SymmetricAlgorithm, &SessionKey) -> openpgp::Result<()>
# {
# // The encryption key is the first and only subkey.
-# let key = self.secret.keys().set_policy(self.policy, None)
+# let key = self.secret.keys().with_policy(self.policy, None)
# .for_transport_encryption().nth(0).unwrap().key().clone();
#
# // The secret key is not encrypted.
@@ -514,7 +514,7 @@ Decrypted data can be read from this using [`io::Read`].
# -> openpgp::Result<()> {
# // Build a vector of recipients to hand to Encryptor.
# let mut recipients =
-# recipient.keys().set_policy(policy, None).alive().revoked(false)
+# recipient.keys().with_policy(policy, None).alive().revoked(false)
# .for_transport_encryption()
# .map(|ka| ka.key().into())
# .collect::<Vec<_>>();
@@ -590,7 +590,7 @@ impl<'a> DecryptionHelper for Helper<'a> {
-> openpgp::Result<Option<openpgp::Fingerprint>>
where D: FnMut(SymmetricAlgorithm, &SessionKey) -> openpgp::Result<()>
{
- let key = self.secret.keys().set_policy(self.policy, None)
+ let key = self.secret.keys().with_policy(self.policy, None)
.for_transport_encryption().nth(0).unwrap().key().clone();
// The secret key is not encrypted.