summaryrefslogtreecommitdiffstats
path: root/guide
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2019-11-19 15:50:23 +0100
committerJustus Winter <justus@sequoia-pgp.org>2019-11-19 15:50:23 +0100
commit1ddc1dd61b45b41801c1d1c364cd6789314cb8f3 (patch)
treeb34baf591fce5f778cd2f132ead705d39abbff47 /guide
parentcf9b92f5f9238b8322d09833b92c886dda219924 (diff)
openpgp: Use the builder pattern for stream::Signer.
- See #375.
Diffstat (limited to 'guide')
-rw-r--r--guide/src/chapter_01.md16
1 files changed, 8 insertions, 8 deletions
diff --git a/guide/src/chapter_01.md b/guide/src/chapter_01.md
index fad70067..fcce2101 100644
--- a/guide/src/chapter_01.md
+++ b/guide/src/chapter_01.md
@@ -52,13 +52,13 @@ fn main() {
# // Get the keypair to do the signing from the TPK.
# let key : key::UnspecifiedSecret
# = tsk.keys_valid().signing_capable().nth(0).unwrap().2.clone().into();
-# let mut keypair = key.into_keypair()?;
+# let keypair = key.into_keypair()?;
#
# // Start streaming an OpenPGP message.
# let message = Message::new(sink);
#
# // We want to sign a literal data packet.
-# let signer = Signer::new(message, vec![&mut keypair], None)?;
+# let signer = Signer::new(message, keypair).build()?;
#
# // Emit a literal data packet.
# let mut literal_writer = LiteralWriter::new(signer, None, None, None)?;
@@ -197,13 +197,13 @@ fn generate() -> openpgp::Result<openpgp::TPK> {
# // Get the keypair to do the signing from the TPK.
# let key : key::UnspecifiedSecret
# = tsk.keys_valid().signing_capable().nth(0).unwrap().2.clone().into();
-# let mut keypair = key.into_keypair()?;
+# let keypair = key.into_keypair()?;
#
# // Start streaming an OpenPGP message.
# let message = Message::new(sink);
#
# // We want to sign a literal data packet.
-# let signer = Signer::new(message, vec![&mut keypair], None)?;
+# let signer = Signer::new(message, keypair).build()?;
#
# // Emit a literal data packet.
# let mut literal_writer = LiteralWriter::new(signer, None, None, None)?;
@@ -342,13 +342,13 @@ fn sign(sink: &mut Write, plaintext: &str, tsk: &openpgp::TPK)
// Get the keypair to do the signing from the TPK.
let key : key::UnspecifiedSecret
= tsk.keys_valid().signing_capable().nth(0).unwrap().2.clone().into();
- let mut keypair = key.into_keypair()?;
+ let keypair = key.into_keypair()?;
// Start streaming an OpenPGP message.
let message = Message::new(sink);
// We want to sign a literal data packet.
- let signer = Signer::new(message, vec![&mut keypair], None)?;
+ let signer = Signer::new(message, keypair).build()?;
// Emit a literal data packet.
let mut literal_writer = LiteralWriter::new(signer, None, None, None)?;
@@ -498,13 +498,13 @@ Verified data can be read from this using [`io::Read`].
# // Get the keypair to do the signing from the TPK.
# let key : key::UnspecifiedSecret
# = tsk.keys_valid().signing_capable().nth(0).unwrap().2.clone().into();
-# let mut keypair = key.into_keypair()?;
+# let keypair = key.into_keypair()?;
#
# // Start streaming an OpenPGP message.
# let message = Message::new(sink);
#
# // We want to sign a literal data packet.
-# let signer = Signer::new(message, vec![&mut keypair], None)?;
+# let signer = Signer::new(message, keypair).build()?;
#
# // Emit a literal data packet.
# let mut literal_writer = LiteralWriter::new(signer, None, None, None)?;