summaryrefslogtreecommitdiffstats
path: root/openpgp/examples
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2020-02-06 14:49:01 +0100
committerJustus Winter <justus@sequoia-pgp.org>2020-02-06 15:06:09 +0100
commitd6ed2a3cbb18c50c2da73d5efbdade343e3bad12 (patch)
tree15cefd9945499ab20065acb30df86d3ccd829cca /openpgp/examples
parent23110e2844a19ffdd1d5c1699cb868f93f734ccc (diff)
openpgp: Rename methods 'set_policy' to 'with_policy'.
- Fixes #427.
Diffstat (limited to 'openpgp/examples')
-rw-r--r--openpgp/examples/decrypt-with.rs2
-rw-r--r--openpgp/examples/encrypt-for.rs2
-rw-r--r--openpgp/examples/generate-encrypt-decrypt.rs4
-rw-r--r--openpgp/examples/generate-sign-verify.rs2
-rw-r--r--openpgp/examples/notarize.rs2
-rw-r--r--openpgp/examples/pad.rs2
-rw-r--r--openpgp/examples/sign-detached.rs2
-rw-r--r--openpgp/examples/sign.rs2
8 files changed, 9 insertions, 9 deletions
diff --git a/openpgp/examples/decrypt-with.rs b/openpgp/examples/decrypt-with.rs
index b52c143c..fdcb3f7e 100644
--- a/openpgp/examples/decrypt-with.rs
+++ b/openpgp/examples/decrypt-with.rs
@@ -62,7 +62,7 @@ impl Helper {
// Map (sub)KeyIDs to secrets.
let mut keys = HashMap::new();
for cert in certs {
- for ka in cert.keys().set_policy(p, None)
+ for ka in cert.keys().with_policy(p, None)
.for_storage_encryption().for_transport_encryption()
{
// This only works for unencrypted secret keys.
diff --git a/openpgp/examples/encrypt-for.rs b/openpgp/examples/encrypt-for.rs
index b64165b7..557e648f 100644
--- a/openpgp/examples/encrypt-for.rs
+++ b/openpgp/examples/encrypt-for.rs
@@ -42,7 +42,7 @@ fn main() {
certs.iter()
.flat_map(|cert| {
cert.keys()
- .set_policy(p, None).alive().revoked(false).key_flags(&mode)
+ .with_policy(p, None).alive().revoked(false).key_flags(&mode)
})
.map(|ka| ka.key().into())
.collect::<Vec<_>>();
diff --git a/openpgp/examples/generate-encrypt-decrypt.rs b/openpgp/examples/generate-encrypt-decrypt.rs
index 089ed8e7..9f3b8d6a 100644
--- a/openpgp/examples/generate-encrypt-decrypt.rs
+++ b/openpgp/examples/generate-encrypt-decrypt.rs
@@ -48,7 +48,7 @@ fn encrypt(p: &dyn Policy, sink: &mut dyn Write, plaintext: &str,
{
// Build a vector of recipients to hand to Encryptor.
let mut recipients =
- recipient.keys().set_policy(p, None).alive().revoked(false)
+ recipient.keys().with_policy(p, None).alive().revoked(false)
.for_transport_encryption()
.map(|ka| ka.key().into())
.collect::<Vec<_>>();
@@ -124,7 +124,7 @@ impl<'a> DecryptionHelper for Helper<'a> {
-> openpgp::Result<Option<openpgp::Fingerprint>>
where D: FnMut(SymmetricAlgorithm, &SessionKey) -> openpgp::Result<()>
{
- let key = self.secret.keys().set_policy(self.policy, None)
+ let key = self.secret.keys().with_policy(self.policy, None)
.for_transport_encryption().nth(0).unwrap().key().clone();
// The secret key is not encrypted.
diff --git a/openpgp/examples/generate-sign-verify.rs b/openpgp/examples/generate-sign-verify.rs
index e3142667..12709609 100644
--- a/openpgp/examples/generate-sign-verify.rs
+++ b/openpgp/examples/generate-sign-verify.rs
@@ -45,7 +45,7 @@ fn sign(p: &dyn Policy, sink: &mut dyn Write, plaintext: &str, tsk: &openpgp::Ce
-> openpgp::Result<()> {
// Get the keypair to do the signing from the Cert.
let keypair = tsk
- .keys().set_policy(p, None).alive().revoked(false).for_signing()
+ .keys().with_policy(p, None).alive().revoked(false).for_signing()
.nth(0).unwrap()
.key().clone().mark_parts_secret().unwrap().into_keypair()?;
diff --git a/openpgp/examples/notarize.rs b/openpgp/examples/notarize.rs
index 62042e60..83e34cee 100644
--- a/openpgp/examples/notarize.rs
+++ b/openpgp/examples/notarize.rs
@@ -31,7 +31,7 @@ fn main() {
let mut n = 0;
for key in tsk.keys()
- .set_policy(p, None).alive().revoked(false).for_signing().secret()
+ .with_policy(p, None).alive().revoked(false).for_signing().secret()
.map(|ka| ka.key())
{
keys.push({
diff --git a/openpgp/examples/pad.rs b/openpgp/examples/pad.rs
index 68efa655..c1c341c8 100644
--- a/openpgp/examples/pad.rs
+++ b/openpgp/examples/pad.rs
@@ -43,7 +43,7 @@ fn main() {
.iter()
.flat_map(|cert| {
cert.keys()
- .set_policy(p, None).alive().revoked(false).key_flags(&mode)
+ .with_policy(p, None).alive().revoked(false).key_flags(&mode)
})
.map(|ka| Recipient::new(KeyID::wildcard(), ka.key()))
.collect::<Vec<_>>();
diff --git a/openpgp/examples/sign-detached.rs b/openpgp/examples/sign-detached.rs
index e93cd0e2..da5cd776 100644
--- a/openpgp/examples/sign-detached.rs
+++ b/openpgp/examples/sign-detached.rs
@@ -27,7 +27,7 @@ fn main() {
let mut n = 0;
for key in tsk
- .keys().set_policy(p, None).alive().revoked(false).for_signing().secret()
+ .keys().with_policy(p, None).alive().revoked(false).for_signing().secret()
.map(|ka| ka.key())
{
keys.push({
diff --git a/openpgp/examples/sign.rs b/openpgp/examples/sign.rs
index 85565b2e..95afee20 100644
--- a/openpgp/examples/sign.rs
+++ b/openpgp/examples/sign.rs
@@ -26,7 +26,7 @@ fn main() {
let mut n = 0;
for key in tsk.keys()
- .set_policy(p, None).alive().revoked(false).for_signing().secret()
+ .with_policy(p, None).alive().revoked(false).for_signing().secret()
.map(|ka| ka.key())
{
keys.push({