diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2020-11-24 10:45:29 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2020-12-07 15:57:42 +0100 |
commit | 551f29499a3ca9c5b15692ac7877730808dda8cb (patch) | |
tree | e84fb3c3d3bb0390d248a874d1fdd192a64dd0d0 /guide | |
parent | e524ef5fbc97c0c54b8144aed81c383faa099173 (diff) |
openpgp: Make serialize::stream::Message Send + Sync.
- See #615.
Diffstat (limited to 'guide')
-rw-r--r-- | guide/src/chapter_01.md | 16 | ||||
-rw-r--r-- | guide/src/chapter_02.md | 8 |
2 files changed, 12 insertions, 12 deletions
diff --git a/guide/src/chapter_01.md b/guide/src/chapter_01.md index 874b70e6..0a60b1ea 100644 --- a/guide/src/chapter_01.md +++ b/guide/src/chapter_01.md @@ -55,13 +55,13 @@ fn main() -> openpgp::Result<()> { # # /// Signs the given message. # fn sign(policy: &dyn Policy, -# sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert) +# sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert) # -> openpgp::Result<()> # { # // Get the keypair to do the signing from the Cert. # let keypair = tsk # .keys().unencrypted_secret() -# .with_policy(policy, None).supported().alive().revoked(false).for_signing() +# .with_policy(policy, None).alive().revoked(false).for_signing() # .nth(0).unwrap().key().clone().into_keypair()?; # # // Start streaming an OpenPGP message. @@ -206,13 +206,13 @@ fn generate() -> openpgp::Result<openpgp::Cert> { # # /// Signs the given message. # fn sign(policy: &dyn Policy, -# sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert) +# sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert) # -> openpgp::Result<()> # { # // Get the keypair to do the signing from the Cert. # let keypair = tsk # .keys().unencrypted_secret() -# .with_policy(policy, None).supported().alive().revoked(false).for_signing() +# .with_policy(policy, None).alive().revoked(false).for_signing() # .nth(0).unwrap().key().clone().into_keypair()?; # # // Start streaming an OpenPGP message. @@ -357,13 +357,13 @@ implements [`io::Write`], and we simply write the plaintext to it. # /// Signs the given message. fn sign(policy: &dyn Policy, - sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert) + sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert) -> openpgp::Result<()> { // Get the keypair to do the signing from the Cert. let keypair = tsk .keys().unencrypted_secret() - .with_policy(policy, None).supported().alive().revoked(false).for_signing() + .with_policy(policy, None).alive().revoked(false).for_signing() .nth(0).unwrap().key().clone().into_keypair()?; // Start streaming an OpenPGP message. @@ -519,13 +519,13 @@ Verified data can be read from this using [`io::Read`]. # # /// Signs the given message. # fn sign(policy: &dyn Policy, -# sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Cert) +# sink: &mut (dyn Write + Send + Sync), plaintext: &str, tsk: &openpgp::Cert) # -> openpgp::Result<()> # { # // Get the keypair to do the signing from the Cert. # let keypair = tsk # .keys().unencrypted_secret() -# .with_policy(policy, None).supported().alive().revoked(false).for_signing() +# .with_policy(policy, None).alive().revoked(false).for_signing() # .nth(0).unwrap().key().clone().into_keypair()?; # # // Start streaming an OpenPGP message. diff --git a/guide/src/chapter_02.md b/guide/src/chapter_02.md index 7d663701..fc88f653 100644 --- a/guide/src/chapter_02.md +++ b/guide/src/chapter_02.md @@ -55,7 +55,7 @@ fn main() -> openpgp::Result<()> { # # /// Encrypts the given message. # fn encrypt(policy: &dyn Policy, -# sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert) +# sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert) # -> openpgp::Result<()> { # let recipients = # recipient.keys().with_policy(policy, None).supported().alive().revoked(false) @@ -203,7 +203,7 @@ fn generate() -> openpgp::Result<openpgp::Cert> { # # /// Encrypts the given message. # fn encrypt(policy: &dyn Policy, -# sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert) +# sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert) # -> openpgp::Result<()> { # let recipients = # recipient.keys().with_policy(policy, None).supported().alive().revoked(false) @@ -351,7 +351,7 @@ implements [`io::Write`], and we simply write the plaintext to it. # /// Encrypts the given message. fn encrypt(policy: &dyn Policy, - sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert) + sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert) -> openpgp::Result<()> { let recipients = recipient.keys().with_policy(policy, None).supported().alive().revoked(false) @@ -513,7 +513,7 @@ Decrypted data can be read from this using [`io::Read`]. # # /// Encrypts the given message. # fn encrypt(policy: &dyn Policy, -# sink: &mut dyn Write, plaintext: &str, recipient: &openpgp::Cert) +# sink: &mut (dyn Write + Send + Sync), plaintext: &str, recipient: &openpgp::Cert) # -> openpgp::Result<()> { # let recipients = # recipient.keys().with_policy(policy, None).supported().alive().revoked(false) |