diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2020-02-06 14:49:01 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2020-02-06 15:06:09 +0100 |
commit | d6ed2a3cbb18c50c2da73d5efbdade343e3bad12 (patch) | |
tree | 15cefd9945499ab20065acb30df86d3ccd829cca /ipc | |
parent | 23110e2844a19ffdd1d5c1699cb868f93f734ccc (diff) |
openpgp: Rename methods 'set_policy' to 'with_policy'.
- Fixes #427.
Diffstat (limited to 'ipc')
-rw-r--r-- | ipc/examples/gpg-agent-decrypt.rs | 2 | ||||
-rw-r--r-- | ipc/examples/gpg-agent-sign.rs | 2 | ||||
-rw-r--r-- | ipc/tests/gpg-agent.rs | 6 |
3 files changed, 5 insertions, 5 deletions
diff --git a/ipc/examples/gpg-agent-decrypt.rs b/ipc/examples/gpg-agent-decrypt.rs index 0f0b3beb..853a020c 100644 --- a/ipc/examples/gpg-agent-decrypt.rs +++ b/ipc/examples/gpg-agent-decrypt.rs @@ -80,7 +80,7 @@ impl<'a> Helper<'a> { // Map (sub)KeyIDs to secrets. let mut keys = HashMap::new(); for cert in certs { - for ka in cert.keys().set_policy(policy, None) + for ka in cert.keys().with_policy(policy, None) .for_storage_encryption().for_transport_encryption() { let key = ka.key(); diff --git a/ipc/examples/gpg-agent-sign.rs b/ipc/examples/gpg-agent-sign.rs index 424f2a74..5bad17cd 100644 --- a/ipc/examples/gpg-agent-sign.rs +++ b/ipc/examples/gpg-agent-sign.rs @@ -42,7 +42,7 @@ fn main() { // Construct a KeyPair for every signing-capable (sub)key. let mut signers = certs.iter().flat_map(|cert| { - cert.keys().set_policy(p, None).alive().revoked(false).for_signing() + cert.keys().with_policy(p, None).alive().revoked(false).for_signing() .filter_map(|ka| { KeyPair::new(&ctx, ka.key()).ok() }) diff --git a/ipc/tests/gpg-agent.rs b/ipc/tests/gpg-agent.rs index 909307e1..61fd8ccc 100644 --- a/ipc/tests/gpg-agent.rs +++ b/ipc/tests/gpg-agent.rs @@ -99,7 +99,7 @@ fn sign() { let keypair = KeyPair::new( &ctx, - cert.keys().set_policy(p, None).alive().revoked(false) + cert.keys().with_policy(p, None).alive().revoked(false) .for_signing().take(1).next().unwrap().key()) .unwrap(); @@ -216,7 +216,7 @@ fn decrypt() { let mut message = Vec::new(); { let recipient = - cert.keys().set_policy(p, None).alive().revoked(false) + cert.keys().with_policy(p, None).alive().revoked(false) .for_transport_encryption() .map(|ka| ka.key().into()) .nth(0).unwrap(); @@ -284,7 +284,7 @@ fn decrypt() { { let mut keypair = KeyPair::new( self.ctx, - self.cert.keys().set_policy(self.policy, None) + self.cert.keys().with_policy(self.policy, None) .for_storage_encryption().for_transport_encryption() .take(1).next().unwrap().key()) .unwrap(); |