summaryrefslogtreecommitdiffstats
path: root/guide/src/chapter_02.md
diff options
context:
space:
mode:
Diffstat (limited to 'guide/src/chapter_02.md')
-rw-r--r--guide/src/chapter_02.md76
1 files changed, 38 insertions, 38 deletions
diff --git a/guide/src/chapter_02.md b/guide/src/chapter_02.md
index 7ebf4461..89df3321 100644
--- a/guide/src/chapter_02.md
+++ b/guide/src/chapter_02.md
@@ -35,19 +35,19 @@ fn main() {
}
#
# /// Generates an encryption-capable key.
-# fn generate() -> openpgp::Result<openpgp::TPK> {
-# let (tpk, _revocation) = openpgp::tpk::TPKBuilder::new()
+# fn generate() -> openpgp::Result<openpgp::Cert> {
+# let (cert, _revocation) = openpgp::cert::CertBuilder::new()
# .add_userid("someone@example.org")
# .add_encryption_subkey()
# .generate()?;
#
# // Save the revocation certificate somewhere.
#
-# Ok(tpk)
+# Ok(cert)
# }
#
# /// Encrypts the given message.
-# fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
+# fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# // Build a vector of recipients to hand to Encryptor.
# let mut recipients =
@@ -83,7 +83,7 @@ fn main() {
# }
#
# /// Decrypts the given message.
-# fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::TPK)
+# fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# // Make a helper that that feeds the recipient's secret key to the
# // decryptor.
@@ -91,7 +91,7 @@ fn main() {
# secret: recipient,
# };
#
-# // Now, create a decryptor with a helper using the given TPKs.
+# // Now, create a decryptor with a helper using the given Certs.
# let mut decryptor = Decryptor::from_bytes(ciphertext, helper, None)?;
#
# // Decrypt the data.
@@ -101,12 +101,12 @@ fn main() {
# }
#
# struct Helper<'a> {
-# secret: &'a openpgp::TPK,
+# secret: &'a openpgp::Cert,
# }
#
# impl<'a> VerificationHelper for Helper<'a> {
# fn get_public_keys(&mut self, _ids: &[openpgp::KeyHandle])
-# -> openpgp::Result<Vec<openpgp::TPK>> {
+# -> openpgp::Result<Vec<openpgp::Cert>> {
# // Return public keys for signature verification here.
# Ok(Vec::new())
# }
@@ -138,7 +138,7 @@ fn main() {
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
# .map(|_| None)
# // XXX: In production code, return the Fingerprint of the
-# // recipient's TPK here
+# // recipient's Cert here
# }
# }
```
@@ -146,10 +146,10 @@ fn main() {
# Key generation
First, we need to generate a new key. This key shall have one user
-id, and one encryption-capable subkey. We use the [`TPKBuilder`] to
+id, and one encryption-capable subkey. We use the [`CertBuilder`] to
create it:
-[`TPKBuilder`]: ../../sequoia_openpgp/tpk/struct.TPKBuilder.html
+[`CertBuilder`]: ../../sequoia_openpgp/cert/struct.CertBuilder.html
```rust
# use std::io::{self, Write};
@@ -178,19 +178,19 @@ create it:
# }
#
/// Generates an encryption-capable key.
-fn generate() -> openpgp::Result<openpgp::TPK> {
- let (tpk, _revocation) = openpgp::tpk::TPKBuilder::new()
+fn generate() -> openpgp::Result<openpgp::Cert> {
+ let (cert, _revocation) = openpgp::cert::CertBuilder::new()
.add_userid("someone@example.org")
.add_encryption_subkey()
.generate()?;
// Save the revocation certificate somewhere.
- Ok(tpk)
+ Ok(cert)
}
#
# /// Encrypts the given message.
-# fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
+# fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# // Build a vector of recipients to hand to Encryptor.
# let mut recipients =
@@ -226,7 +226,7 @@ fn generate() -> openpgp::Result<openpgp::TPK> {
# }
#
# /// Decrypts the given message.
-# fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::TPK)
+# fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# // Make a helper that that feeds the recipient's secret key to the
# // decryptor.
@@ -234,7 +234,7 @@ fn generate() -> openpgp::Result<openpgp::TPK> {
# secret: recipient,
# };
#
-# // Now, create a decryptor with a helper using the given TPKs.
+# // Now, create a decryptor with a helper using the given Certs.
# let mut decryptor = Decryptor::from_bytes(ciphertext, helper, None)?;
#
# // Decrypt the data.
@@ -244,12 +244,12 @@ fn generate() -> openpgp::Result<openpgp::TPK> {
# }
#
# struct Helper<'a> {
-# secret: &'a openpgp::TPK,
+# secret: &'a openpgp::Cert,
# }
#
# impl<'a> VerificationHelper for Helper<'a> {
# fn get_public_keys(&mut self, _ids: &[openpgp::KeyHandle])
-# -> openpgp::Result<Vec<openpgp::TPK>> {
+# -> openpgp::Result<Vec<openpgp::Cert>> {
# // Return public keys for signature verification here.
# Ok(Vec::new())
# }
@@ -281,7 +281,7 @@ fn generate() -> openpgp::Result<openpgp::TPK> {
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
# .map(|_| None)
# // XXX: In production code, return the Fingerprint of the
-# // recipient's TPK here
+# // recipient's Cert here
# }
# }
```
@@ -321,19 +321,19 @@ implements [`io::Write`], and we simply write the plaintext to it.
# }
#
# /// Generates an encryption-capable key.
-# fn generate() -> openpgp::Result<openpgp::TPK> {
-# let (tpk, _revocation) = openpgp::tpk::TPKBuilder::new()
+# fn generate() -> openpgp::Result<openpgp::Cert> {
+# let (cert, _revocation) = openpgp::cert::CertBuilder::new()
# .add_userid("someone@example.org")
# .add_encryption_subkey()
# .generate()?;
#
# // Save the revocation certificate somewhere.
#
-# Ok(tpk)
+# Ok(cert)
# }
#
/// Encrypts the given message.
-fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
+fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::Cert)
-> openpgp::Result<()> {
// Build a vector of recipients to hand to Encryptor.
let mut recipients =
@@ -369,7 +369,7 @@ fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
}
#
# /// Decrypts the given message.
-# fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::TPK)
+# fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# // Make a helper that that feeds the recipient's secret key to the
# // decryptor.
@@ -377,7 +377,7 @@ fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
# secret: recipient,
# };
#
-# // Now, create a decryptor with a helper using the given TPKs.
+# // Now, create a decryptor with a helper using the given Certs.
# let mut decryptor = Decryptor::from_bytes(ciphertext, helper, None)?;
#
# // Decrypt the data.
@@ -387,12 +387,12 @@ fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
# }
#
# struct Helper<'a> {
-# secret: &'a openpgp::TPK,
+# secret: &'a openpgp::Cert,
# }
#
# impl<'a> VerificationHelper for Helper<'a> {
# fn get_public_keys(&mut self, _ids: &[openpgp::KeyHandle])
-# -> openpgp::Result<Vec<openpgp::TPK>> {
+# -> openpgp::Result<Vec<openpgp::Cert>> {
# // Return public keys for signature verification here.
# Ok(Vec::new())
# }
@@ -424,7 +424,7 @@ fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
# .map(|_| None)
# // XXX: In production code, return the Fingerprint of the
-# // recipient's TPK here
+# // recipient's Cert here
# }
# }
```
@@ -478,19 +478,19 @@ Decrypted data can be read from this using [`io::Read`].
# }
#
# /// Generates an encryption-capable key.
-# fn generate() -> openpgp::Result<openpgp::TPK> {
-# let (tpk, _revocation) = openpgp::tpk::TPKBuilder::new()
+# fn generate() -> openpgp::Result<openpgp::Cert> {
+# let (cert, _revocation) = openpgp::cert::CertBuilder::new()
# .add_userid("someone@example.org")
# .add_encryption_subkey()
# .generate()?;
#
# // Save the revocation certificate somewhere.
#
-# Ok(tpk)
+# Ok(cert)
# }
#
# /// Encrypts the given message.
-# fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
+# fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::Cert)
# -> openpgp::Result<()> {
# // Build a vector of recipients to hand to Encryptor.
# let mut recipients =
@@ -526,7 +526,7 @@ Decrypted data can be read from this using [`io::Read`].
# }
#
/// Decrypts the given message.
-fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::TPK)
+fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::Cert)
-> openpgp::Result<()> {
// Make a helper that that feeds the recipient's secret key to the
// decryptor.
@@ -534,7 +534,7 @@ fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::TPK)
secret: recipient,
};
- // Now, create a decryptor with a helper using the given TPKs.
+ // Now, create a decryptor with a helper using the given Certs.
let mut decryptor = Decryptor::from_bytes(ciphertext, helper, None)?;
// Decrypt the data.
@@ -544,12 +544,12 @@ fn decrypt(sink: &mut Write, ciphertext: &[u8], recipient: &openpgp::TPK)
}
struct Helper<'a> {
- secret: &'a openpgp::TPK,
+ secret: &'a openpgp::Cert,
}
impl<'a> VerificationHelper for Helper<'a> {
fn get_public_keys(&mut self, _ids: &[openpgp::KeyHandle])
- -> openpgp::Result<Vec<openpgp::TPK>> {
+ -> openpgp::Result<Vec<openpgp::Cert>> {
// Return public keys for signature verification here.
Ok(Vec::new())
}
@@ -581,7 +581,7 @@ impl<'a> DecryptionHelper for Helper<'a> {
.and_then(|(algo, session_key)| decrypt(algo, &session_key))
.map(|_| None)
// XXX: In production code, return the Fingerprint of the
- // recipient's TPK here
+ // recipient's Cert here
}
}
```