summaryrefslogtreecommitdiffstats
path: root/openpgp-ffi
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2019-11-28 15:27:33 +0100
committerJustus Winter <justus@sequoia-pgp.org>2019-11-28 16:26:43 +0100
commitbbbc6da375d6584c7b2bcc74e838fff943f489d4 (patch)
tree0a965698c96dbc0fc8541c6adc2224935b68bc07 /openpgp-ffi
parentf53c77752ff04c3713c175a76a06723042e681ae (diff)
Call TPKs Certificates, update identifiers, documentation.
- Fixes #387.
Diffstat (limited to 'openpgp-ffi')
-rw-r--r--openpgp-ffi/examples/decrypt-with.c30
-rw-r--r--openpgp-ffi/examples/encrypt-for.c16
-rw-r--r--openpgp-ffi/examples/example.c12
-rw-r--r--openpgp-ffi/examples/generate-key.c14
-rw-r--r--openpgp-ffi/examples/reader.c12
-rw-r--r--openpgp-ffi/include/sequoia/openpgp.h244
-rw-r--r--openpgp-ffi/include/sequoia/openpgp/error.h8
-rw-r--r--openpgp-ffi/include/sequoia/openpgp/serialize.h4
-rw-r--r--openpgp-ffi/include/sequoia/openpgp/types.h44
-rw-r--r--openpgp-ffi/src/cert.rs (renamed from openpgp-ffi/src/tpk.rs)460
-rw-r--r--openpgp-ffi/src/common.rs2
-rw-r--r--openpgp-ffi/src/error.rs20
-rw-r--r--openpgp-ffi/src/lib.rs8
-rw-r--r--openpgp-ffi/src/parse/stream.rs114
-rw-r--r--openpgp-ffi/src/revocation_status.rs2
-rw-r--r--openpgp-ffi/src/serialize.rs6
-rw-r--r--openpgp-ffi/src/tsk.rs8
17 files changed, 502 insertions, 502 deletions
diff --git a/openpgp-ffi/examples/decrypt-with.c b/openpgp-ffi/examples/decrypt-with.c
index ada4dfd7..423106bd 100644
--- a/openpgp-ffi/examples/decrypt-with.c
+++ b/openpgp-ffi/examples/decrypt-with.c
@@ -21,19 +21,19 @@
#include <sequoia/openpgp.h>
struct decrypt_cookie {
- pgp_tpk_t key;
+ pgp_cert_t key;
int decrypt_called;
};
static pgp_status_t
get_public_keys_cb (void *cookie_raw,
pgp_keyid_t *keyids, size_t keyids_len,
- pgp_tpk_t **tpks, size_t *tpk_len,
+ pgp_cert_t **certs, size_t *cert_len,
void (**our_free)(void *))
{
- /* Feed the TPKs to the verifier here. */
- *tpks = NULL;
- *tpk_len = 0;
+ /* Feed the Certs to the verifier here. */
+ *certs = NULL;
+ *cert_len = 0;
*our_free = free;
return PGP_STATUS_SUCCESS;
}
@@ -155,9 +155,9 @@ decrypt_cb (void *cookie_opaque,
pgp_pkesk_t pkesk = pkesks[i];
pgp_keyid_t keyid = pgp_pkesk_recipient (pkesk);
- pgp_tpk_key_iter_t key_iter = pgp_tpk_key_iter_all (cookie->key);
+ pgp_cert_key_iter_t key_iter = pgp_cert_key_iter_all (cookie->key);
pgp_key_t key;
- while ((key = pgp_tpk_key_iter_next (key_iter, NULL, NULL))) {
+ while ((key = pgp_cert_key_iter_next (key_iter, NULL, NULL))) {
pgp_keyid_t this_keyid = pgp_key_keyid (key);
int match = pgp_keyid_equal (this_keyid, keyid);
pgp_keyid_free (this_keyid);
@@ -165,7 +165,7 @@ decrypt_cb (void *cookie_opaque,
break;
pgp_key_free (key);
}
- pgp_tpk_key_iter_free (key_iter);
+ pgp_cert_key_iter_free (key_iter);
pgp_keyid_free (keyid);
if (! key)
continue;
@@ -185,7 +185,7 @@ decrypt_cb (void *cookie_opaque,
rc = decrypt (decrypt_cookie, algo, sk);
pgp_session_key_free (sk);
- *identity_out = pgp_tpk_fingerprint (cookie->key);
+ *identity_out = pgp_cert_fingerprint (cookie->key);
return rc;
}
@@ -196,7 +196,7 @@ int
main (int argc, char **argv)
{
pgp_error_t err;
- pgp_tpk_t tpk;
+ pgp_cert_t cert;
pgp_reader_t source;
pgp_reader_t plaintext;
uint8_t buf[1024];
@@ -205,15 +205,15 @@ main (int argc, char **argv)
if (argc != 2)
error (1, 0, "Usage: %s <keyfile> <cipher >plain", argv[0]);
- tpk = pgp_tpk_from_file (&err, argv[1]);
- if (tpk == NULL)
- error (1, 0, "pgp_tpk_from_file: %s", pgp_error_to_string (err));
+ cert = pgp_cert_from_file (&err, argv[1]);
+ if (cert == NULL)
+ error (1, 0, "pgp_cert_from_file: %s", pgp_error_to_string (err));
source = pgp_reader_from_fd (STDIN_FILENO);
assert (source);
struct decrypt_cookie cookie = {
- .key = tpk,
+ .key = cert,
.decrypt_called = 0,
};
plaintext = pgp_decryptor_new (&err, source,
@@ -230,6 +230,6 @@ main (int argc, char **argv)
pgp_reader_free (plaintext);
pgp_reader_free (source);
- pgp_tpk_free (tpk);
+ pgp_cert_free (cert);
return 0;
}
diff --git a/openpgp-ffi/examples/encrypt-for.c b/openpgp-ffi/examples/encrypt-for.c
index 49bf025e..abf9d1a9 100644
--- a/openpgp-ffi/examples/encrypt-for.c
+++ b/openpgp-ffi/examples/encrypt-for.c
@@ -25,20 +25,20 @@ main (int argc, char **argv)
pgp_status_t rc;
pgp_error_t err;
int use_armor = 1;
- pgp_tpk_t tpk;
+ pgp_cert_t cert;
pgp_writer_t sink;
pgp_writer_stack_t writer = NULL;
if (argc != 2)
error (1, 0, "Usage: %s <keyfile> <plain >cipher", argv[0]);
- tpk = pgp_tpk_from_file (&err, argv[1]);
- if (tpk == NULL)
- error (1, 0, "pgp_tpk_from_file: %s", pgp_error_to_string (err));
+ cert = pgp_cert_from_file (&err, argv[1]);
+ if (cert == NULL)
+ error (1, 0, "pgp_cert_from_file: %s", pgp_error_to_string (err));
- pgp_tpk_key_iter_t iter = pgp_tpk_key_iter_valid (tpk);
- pgp_tpk_key_iter_encrypting_capable_at_rest (iter);
- pgp_tpk_key_iter_encrypting_capable_for_transport (iter);
+ pgp_cert_key_iter_t iter = pgp_cert_key_iter_valid (cert);
+ pgp_cert_key_iter_encrypting_capable_at_rest (iter);
+ pgp_cert_key_iter_encrypting_capable_for_transport (iter);
size_t recipients_len;
pgp_recipient_t *recipients =
pgp_recipients_from_key_iter (iter, &recipients_len);
@@ -88,6 +88,6 @@ main (int argc, char **argv)
for (size_t i = 0; i < recipients_len; i++)
pgp_recipient_free (recipients[i]);
free (recipients);
- pgp_tpk_free (tpk);
+ pgp_cert_free (cert);
return 0;
}
diff --git a/openpgp-ffi/examples/example.c b/openpgp-ffi/examples/example.c
index 3c561761..9bc0da97 100644
--- a/openpgp-ffi/examples/example.c
+++ b/openpgp-ffi/examples/example.c
@@ -19,19 +19,19 @@ int
main (int argc, char **argv)
{
pgp_error_t err;
- pgp_tpk_t tpk;
+ pgp_cert_t cert;
if (argc != 2)
error (1, 0, "Usage: %s <file>", argv[0]);
- tpk = pgp_tpk_from_file (&err, argv[1]);
- if (tpk == NULL)
- error (1, 0, "pgp_tpk_from_file: %s", pgp_error_to_string (err));
+ cert = pgp_cert_from_file (&err, argv[1]);
+ if (cert == NULL)
+ error (1, 0, "pgp_cert_from_file: %s", pgp_error_to_string (err));
- char *debug = pgp_tpk_debug (tpk);
+ char *debug = pgp_cert_debug (cert);
printf ("%s", debug);
free (debug);
- pgp_tpk_free (tpk);
+ pgp_cert_free (cert);
return 0;
}
diff --git a/openpgp-ffi/examples/generate-key.c b/openpgp-ffi/examples/generate-key.c
index fed2852c..b66c7a30 100644
--- a/openpgp-ffi/examples/generate-key.c
+++ b/openpgp-ffi/examples/generate-key.c
@@ -9,13 +9,13 @@ main () {
pgp_status_t rc;
/* First, generate the key. */
- pgp_tpk_builder_t builder = pgp_tpk_builder_new ();
- pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519);
+ pgp_cert_builder_t builder = pgp_cert_builder_new ();
+ pgp_cert_builder_set_cipher_suite (&builder, PGP_CERT_CIPHER_SUITE_CV25519);
- pgp_tpk_t tpk;
+ pgp_cert_t cert;
pgp_signature_t revocation;
- pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation);
- assert (tpk);
+ pgp_cert_builder_generate (NULL, builder, &cert, &revocation);
+ assert (cert);
assert (revocation);
pgp_signature_free (revocation); /* Free the generated revocation. */
@@ -27,12 +27,12 @@ main () {
assert (armor);
/* Finally, derive a TSK object, and serialize it. */
- pgp_tsk_t tsk = pgp_tpk_as_tsk (tpk);
+ pgp_tsk_t tsk = pgp_cert_as_tsk (cert);
rc = pgp_tsk_serialize (NULL, tsk, armor);
assert (rc == PGP_STATUS_SUCCESS);
pgp_tsk_free (tsk);
pgp_writer_free (armor);
pgp_writer_free (sink);
- pgp_tpk_free (tpk);
+ pgp_cert_free (cert);
}
diff --git a/openpgp-ffi/examples/reader.c b/openpgp-ffi/examples/reader.c
index 13c47f69..ee72dcd9 100644
--- a/openpgp-ffi/examples/reader.c
+++ b/openpgp-ffi/examples/reader.c
@@ -20,21 +20,21 @@ main (int argc, char **argv)
{
pgp_error_t err;
pgp_reader_t reader;
- pgp_tpk_t tpk;
+ pgp_cert_t cert;
if (argc != 2)
error (1, 0, "Usage: %s <file>", argv[0]);
reader = pgp_reader_from_file (&err, argv[1]);
- tpk = pgp_tpk_from_reader (&err, reader);
- if (tpk == NULL)
- error (1, 0, "pgp_tpk_from_reader: %s", pgp_error_to_string (err));
+ cert = pgp_cert_from_reader (&err, reader);
+ if (cert == NULL)
+ error (1, 0, "pgp_cert_from_reader: %s", pgp_error_to_string (err));
- char *debug = pgp_tpk_debug (tpk);
+ char *debug = pgp_cert_debug (cert);
printf ("%s", debug);
free (debug);
- pgp_tpk_free (tpk);
+ pgp_cert_free (cert);
pgp_reader_free (reader);
return 0;
}
diff --git a/openpgp-ffi/include/sequoia/openpgp.h b/openpgp-ffi/include/sequoia/openpgp.h
index 6f7be6d1..b169f78f 100644
--- a/openpgp-ffi/include/sequoia/openpgp.h
+++ b/openpgp-ffi/include/sequoia/openpgp.h
@@ -585,7 +585,7 @@ pgp_packet_t pgp_literal_into_packet (pgp_literal_t literal);
/*/
void pgp_literal_free (pgp_literal_t literal);
-/* openpgp::tpk::UserIDBinding. */
+/* openpgp::cert::UserIDBinding. */
/*/
/// Returns the user id.
@@ -603,7 +603,7 @@ char *pgp_user_id_binding_user_id (pgp_user_id_binding_t binding);
/*/
pgp_signature_t pgp_user_id_binding_selfsig(pgp_user_id_binding_t binding);
-/* openpgp::tpk::UserIDBindingIter. */
+/* openpgp::cert::UserIDBindingIter. */
/*/
/// Returns the next element in the iterator.
@@ -615,7 +615,7 @@ pgp_user_id_binding_t pgp_user_id_binding_iter_next (pgp_user_id_binding_iter_t
/*/
void pgp_user_id_binding_iter_free (pgp_user_id_binding_iter_t iter);
-/* openpgp::tpk::KeyIter. */
+/* openpgp::cert::KeyIter. */
/*/
/// Changes the iterator to only return keys that are certification
@@ -628,7 +628,7 @@ void pgp_user_id_binding_iter_free (pgp_user_id_binding_iter_t iter);
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_certification_capable (pgp_tpk_key_iter_t iter);
+void pgp_cert_key_iter_certification_capable (pgp_cert_key_iter_t iter);
/*/
/// Changes the iterator to only return keys that are certification
@@ -641,7 +641,7 @@ void pgp_tpk_key_iter_certification_capable (pgp_tpk_key_iter_t iter);
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_signing_capable (pgp_tpk_key_iter_t iter);
+void pgp_cert_key_iter_signing_capable (pgp_cert_key_iter_t iter);
/*/
/// Changes the iterator to only return keys that are capable of
@@ -654,7 +654,7 @@ void pgp_tpk_key_iter_signing_capable (pgp_tpk_key_iter_t iter);
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_encrypting_capable_at_rest (pgp_tpk_key_iter_t);
+void pgp_cert_key_iter_encrypting_capable_at_rest (pgp_cert_key_iter_t);
/*/
/// Changes the iterator to only return keys that are capable of
@@ -667,28 +667,28 @@ void pgp_tpk_key_iter_encrypting_capable_at_rest (pgp_tpk_key_iter_t);
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_encrypting_capable_for_transport (pgp_tpk_key_iter_t);
+void pgp_cert_key_iter_encrypting_capable_for_transport (pgp_cert_key_iter_t);
/*/
/// Changes the iterator to only return keys that are alive.
///
-/// If you call this function (or `pgp_tpk_key_iter_alive_at`), only
+/// If you call this function (or `pgp_cert_key_iter_alive_at`), only
/// the last value is used.
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_alive (pgp_tpk_key_iter_t iter);
+void pgp_cert_key_iter_alive (pgp_cert_key_iter_t iter);
/*/
/// Changes the iterator to only return keys that are alive at the
/// specified time.
///
-/// If you call this function (or `pgp_tpk_key_iter_alive`), only the
+/// If you call this function (or `pgp_cert_key_iter_alive`), only the
/// last value is used.
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_alive_at (pgp_tpk_key_iter_t iter, time_t when);
+void pgp_cert_key_iter_alive_at (pgp_cert_key_iter_t iter, time_t when);
/*/
/// Changes the iterator to only return keys whose revocation status
@@ -696,14 +696,14 @@ void pgp_tpk_key_iter_alive_at (pgp_tpk_key_iter_t iter, time_t when);
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_revoked (pgp_tpk_key_iter_t iter, bool revoked);
+void pgp_cert_key_iter_revoked (pgp_cert_key_iter_t iter, bool revoked);
/*/
/// Changes the iterator to only return keys that have secret keys.
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_secret (pgp_tpk_key_iter_t iter);
+void pgp_cert_key_iter_secret (pgp_cert_key_iter_t iter);
/*/
/// Changes the iterator to only return keys that have unencrypted
@@ -711,7 +711,7 @@ void pgp_tpk_key_iter_secret (pgp_tpk_key_iter_t iter);
///
/// Note: you may not call this function after starting to iterate.
/*/
-void pgp_tpk_key_iter_unencrypted_secret (pgp_tpk_key_iter_t iter);
+void pgp_cert_key_iter_unencrypted_secret (pgp_cert_key_iter_t iter);
/*/
/// Returns a reference to the next key. Returns NULL if there are no
@@ -725,117 +725,117 @@ void pgp_tpk_key_iter_unencrypted_secret (pgp_tpk_key_iter_t iter);
/// If rev is not NULL, this stores the key's revocation status in
/// *rev.
/*/
-pgp_key_t pgp_tpk_key_iter_next (pgp_tpk_key_iter_t iter,
+pgp_key_t pgp_cert_key_iter_next (pgp_cert_key_iter_t iter,
pgp_signature_t *signature,
pgp_revocation_status_t *rev);
/*/
-/// Frees an pgp_tpk_key_iter_t.
+/// Frees an pgp_cert_key_iter_t.
/*/
-void pgp_tpk_key_iter_free (pgp_tpk_key_iter_t iter);
+void pgp_cert_key_iter_free (pgp_cert_key_iter_t iter);
-/* openpgp::tpk. */
+/* openpgp::cert. */
/*/
-/// Returns the first TPK encountered in the reader.
+/// Returns the first Cert encountered in the reader.
/*/
-pgp_tpk_t pgp_tpk_from_reader (pgp_error_t *errp,
+pgp_cert_t pgp_cert_from_reader (pgp_error_t *errp,
pgp_reader_t reader);
/*/
-/// Returns the first TPK encountered in the file.
+/// Returns the first Cert encountered in the file.
/*/
-pgp_tpk_t pgp_tpk_from_file (pgp_error_t *errp,
+pgp_cert_t pgp_cert_from_file (pgp_error_t *errp,
const char *filename);
/*/
-/// Returns the first TPK found in `m`.
+/// Returns the first Cert found in `m`.
///
/// Consumes `m`.
/*/
-pgp_tpk_t pgp_tpk_from_packet_pile (pgp_error_t *errp,
+pgp_cert_t pgp_cert_from_packet_pile (pgp_error_t *errp,
pgp_packet_pile_t m);
/*/
-/// Returns the first TPK found in `buf`.
+/// Returns the first Cert found in `buf`.
///
-/// `buf` must be an OpenPGP-encoded TPK.
+/// `buf` must be an OpenPGP-encoded Cert.
/*/
-pgp_tpk_t pgp_tpk_from_bytes (pgp_error_t *errp,
+pgp_cert_t pgp_cert_from_bytes (pgp_error_t *errp,
const uint8_t *b, size_t len);
/*/
-/// Returns the first TPK found in the packet parser.
+/// Returns the first Cert found in the packet parser.
///
/// Consumes the packet parser result.
/*/
-pgp_tpk_t pgp_tpk_from_packet_parser (pgp_error_t *errp,
+pgp_cert_t pgp_cert_from_packet_parser (pgp_error_t *errp,
pgp_packet_parser_result_t ppr);
/*/
-/// Frees the TPK.
+/// Frees the Cert.
/*/
-void pgp_tpk_free (pgp_tpk_t tpk);
+void pgp_cert_free (pgp_cert_t cert);
/*/
-/// Clones the TPK.
+/// Clones the Cert.
/*/
-pgp_tpk_t pgp_tpk_clone (pgp_tpk_t tpk);
+pgp_cert_t pgp_cert_clone (pgp_cert_t cert);
/*/
-/// Compares TPKs.
+/// Compares Certs.
/*/
-int pgp_tpk_equal (const pgp_tpk_t a, const pgp_tpk_t b);
+int pgp_cert_equal (const pgp_cert_t a, const pgp_cert_t b);
/*/
/// Returns a human readable description of this object intended for
/// communication with end users.
/*/
-char *pgp_tpk_to_string (const pgp_tpk_t fp);
+char *pgp_cert_to_string (const pgp_cert_t fp);
/*/
/// Returns a human readable description of this object suitable for
/// debugging.
/*/
-char *pgp_tpk_debug (const pgp_tpk_t tpk);
+char *pgp_cert_debug (const pgp_cert_t cert);
/*/
-/// Serializes the TPK.
+/// Serializes the Cert.
/*/
-pgp_status_t pgp_tpk_serialize (pgp_error_t *errp,
- const pgp_tpk_t tpk,
+pgp_status_t pgp_cert_serialize (pgp_error_t *errp,
+ const pgp_cert_t cert,
pgp_writer_t writer);
/*/
-/// Merges `other` into `tpk`.
+/// Merges `other` into `cert`.
///
/// If `other` is a different key, then nothing is merged into
-/// `tpk`, but `tpk` is still canonicalized.
+/// `cert`, but `cert` is still canonicalized.
///
-/// Consumes `tpk` and `other`.
+/// Consumes `cert` and `other`.
/*/
-pgp_tpk_t pgp_tpk_merge (pgp_error_t *errp,
- pgp_tpk_t tpk,
- pgp_tpk_t other);
+pgp_cert_t pgp_cert_merge (pgp_error_t *errp,
+ pgp_cert_t cert,
+ pgp_cert_t other);
/*/
-/// Adds packets to the TPK.
+/// Adds packets to the Cert.
///
-/// This recanonicalizes the TPK. If the packets are invalid, they
+/// This recanonicalizes the Cert. If the packets are invalid, they
/// are dropped.
///
-/// Consumes `tpk` and the packets in `packets`. The buffer, however,
+/// Consumes `cert` and the packets in `packets`. The buffer, however,
/// must be freed by the caller.
/*/
-pgp_tpk_t pgp_tpk_merge_packets (pgp_error_t *errp,
- pgp_tpk_t tpk,
+pgp_cert_t pgp_cert_merge_packets (pgp_error_t *errp,
+ pgp_cert_t cert,
pgp_packet_t *packets,
size_t packets_len);
/*/
/// Returns the fingerprint.
/*/
-pgp_fingerprint_t pgp_tpk_fingerprint (const pgp_tpk_t tpk);
+pgp_fingerprint_t pgp_cert_fingerprint (const pgp_cert_t cert);
/*/
@@ -843,91 +843,91 @@ pgp_fingerprint_t pgp_tpk_fingerprint (const pgp_tpk_t tpk);
///
/// This object writes out secret keys during serialization.
///
-/// [`TSK`]: tpk/struct.TSK.html
+/// [`TSK`]: cert/struct.TSK.html
/*/
-pgp_tsk_t pgp_tpk_as_tsk (pgp_tpk_t tpk);
+pgp_tsk_t pgp_cert_as_tsk (pgp_cert_t cert);
/*/
-/// Returns a reference to the TPK's primary key.
+/// Returns a reference to the Cert's primary key.
///
-/// The tpk still owns the key. The caller should neither modify nor
+/// The cert still owns the key. The caller should neither modify nor
/// free the key.
/*/
-pgp_key_t pgp_tpk_primary_key (pgp_tpk_t tpk);
+pgp_key_t pgp_cert_primary_key (pgp_cert_t cert);
/*/
-/// Returns the TPK's revocation status at the specified time.
+/// Returns the Cert's revocation status at the specified time.
///
-/// Note: this only returns whether the TPK has been revoked, and does
+/// Note: this only returns whether the Cert has been revoked, and does
/// not reflect whether an individual user id, user attribute or
/// subkey has been revoked.
///
-/// If `when` is 0, then returns the TPK's revocation status as of the
+/// If `when` is 0, then returns the Cert's revocation status as of the
/// time of the call.
/*/
-pgp_revocation_status_t pgp_tpk_revoked (pgp_tpk_t tpk, time_t when);
+pgp_revocation_status_t pgp_cert_revoked (pgp_cert_t cert, time_t when);
/*/
/// Writes a revocation certificate to the writer.
///
-/// This function consumes the writer. It does *not* consume tpk.
+/// This function consumes the writer. It does *not* consume cert.
/*/
-pgp_signature_t pgp_tpk_revoke (pgp_error_t *errp,
- pgp_tpk_t tpk,
+pgp_signature_t pgp_cert_revoke (pgp_error_t *errp,
+ pgp_cert_t cert,
pgp_signer_t primary_signer,
pgp_reason_for_revocation_t code,
const char *reason);
/*/
-/// Adds a revocation certificate to the tpk.
+/// Adds a revocation certificate to the cert.
///
-/// This function consumes the tpk.
+/// This function consumes the cert.
/*/
-pgp_tpk_t pgp_tpk_revoke_in_place (pgp_error_t *errp,
- pgp_tpk_t tpk,
+pgp_cert_t pgp_cert_revoke_in_place (pgp_error_t *errp,
+ pgp_cert_t cert,
pgp_signer_t primary_signer,
pgp_reason_for_revocation_t code,
const char *reason);
/*/
-/// Returns whether the TPK has expired.
+/// Returns whether the Cert has expired.
///
/// If `when` is 0, then the current time is used.
/*/
-int pgp_tpk_expired(pgp_tpk_t tpk, time_t at);
+int pgp_cert_expired(pgp_cert_t cert, time_t at);
/*/
-/// Returns whether the TPK is alive at the specified time.
+/// Returns whether the Cert is alive at the specified time.
///
/// If `when` is 0, then the current time is used.
/*/
-int pgp_tpk_alive(pgp_tpk_t tpk, time_t when);
+int pgp_cert_alive(pgp_cert_t cert, time_t when);
/*/
-/// Changes the TPK's expiration.
+/// Changes the Cert's expiration.
///
/// Expiry is when the key should expire in seconds relative to the
/// key's creation (not the current time).
///
-/// This function consumes `tpk` and returns a new `TPK`.
+/// This function consumes `cert` and returns a new `Cert`.
/*/
-pgp_tpk_t pgp_tpk_set_expiry(pgp_error_t *errp,
- pgp_tpk_t tpk,
+pgp_cert_t pgp_cert_set_expiry(pgp_error_t *errp,
+ pgp_cert_t cert,
pgp_signer_t signer,
uint32_t expiry);
/*/
-/// Returns whether the TPK includes any secret key material.
+/// Returns whether the Cert includes any secret key material.
/*/
-int pgp_tpk_is_tsk(pgp_tpk_t tpk);
+int pgp_cert_is_tsk(pgp_cert_t cert);
/*/
/// Returns an iterator over the `UserIDBinding`s.
/*/
-pgp_user_id_binding_iter_t pgp_tpk_user_id_binding_iter (pgp_tpk_t tpk);
+pgp_user_id_binding_iter_t pgp_cert_user_id_binding_iter (pgp_cert_t cert);
/*/
-/// Returns an iterator over all `Key`s in a TPK.
+/// Returns an iterator over all `Key`s in a Cert.
///
/// That is, this returns an iterator over the primary key and any
/// subkeys, along with the corresponding signatures.
@@ -937,71 +937,71 @@ pgp_user_id_binding_iter_t pgp_tpk_user_id_binding_iter (pgp_tpk_t tpk);
/// has no binding signature, the signature carrying the primary key's
/// key flags is returned (either a direct key signature, or the
/// self-signature on the primary User ID). There are corner cases
-/// where no such signature exists (e.g. partial TPKs), therefore this
+/// where no such signature exists (e.g. partial Certs), therefore this
/// iterator may return `None` for the primary key's signature.
///
/// A valid `Key` has at least one good self-signature.
///
-/// Compare with `pgp_tpk_key_iter_valid`, which filters out expired and
+/// Compare with `pgp_cert_key_iter_valid`, which filters out expired and
/// revoked keys.
/*/
-pgp_tpk_key_iter_t pgp_tpk_key_iter_all (pgp_tpk_t tpk);
+pgp_cert_key_iter_t pgp_cert_key_iter_all (pgp_cert_t cert);
/*/
-/// Returns an iterator over the live and unrevoked `Key`s in a TPK.
+/// Returns an iterator over the live and unrevoked `Key`s in a Cert.
///
-/// Compare with `pgp_tpk_key_iter_all`, which doesn't filter out
+/// Compare with `pgp_cert_key_iter_all`, which doesn't filter out
/// expired and revoked keys by default.
/*/
-pgp_tpk_key_iter_t pgp_tpk_key_iter_valid (pgp_tpk_t tpk);
+pgp_cert_key_iter_t pgp_cert_key_iter_valid (pgp_cert_t cert);
/*/
-/// Returns the TPK's primary user id (if any).
+/// Returns the Cert's primary user id (if any).
/*/
-char *pgp_tpk_primary_user_id(pgp_tpk_t tpk);
+char *pgp_cert_primary_user_id(pgp_cert_t cert);
/*/
-/// Returns a TPKParser.
+/// Returns a CertParser.
///
-/// A TPK parser parses a keyring, which is simply zero or more TPKs
+/// A Cert parser parses a keyring, which is simply zero or more Certs
/// concatenated together.
/*/
-pgp_tpk_parser_t pgp_tpk_parser_from_bytes(pgp_error_t *errp,
+pgp_cert_parser_t pgp_cert_parser_from_bytes(pgp_error_t *errp,
char *buf, size_t len);
/*/
-/// Returns a TPKParser.
+/// Returns a CertParser.
///
-/// A TPK parser parses a keyring, which is simply zero or more TPKs
+/// A Cert parser parses a keyring, which is simply zero or more Certs
/// concatenated together.
/*/
-pgp_tpk_parser_t pgp_tpk_parser_from_packet_parser(pgp_packet_parser_result_t ppr);
+pgp_cert_parser_t pgp_cert_parser_from_pac