summaryrefslogtreecommitdiffstats
path: root/openpgp-ffi/src/packet/signature.rs
diff options
context:
space:
mode:
Diffstat (limited to 'openpgp-ffi/src/packet/signature.rs')
-rw-r--r--openpgp-ffi/src/packet/signature.rs36
1 files changed, 18 insertions, 18 deletions
diff --git a/openpgp-ffi/src/packet/signature.rs b/openpgp-ffi/src/packet/signature.rs
index a019f750..a4aa94d6 100644
--- a/openpgp-ffi/src/packet/signature.rs
+++ b/openpgp-ffi/src/packet/signature.rs
@@ -36,7 +36,7 @@ use RefRaw;
pub struct Signature(openpgp::packet::Signature);
/// Converts the signature to a packet.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_into_packet(s: *mut Signature) -> *mut openpgp::Packet {
box_raw!(s.move_from_raw().into())
}
@@ -46,7 +46,7 @@ fn pgp_signature_into_packet(s: *mut Signature) -> *mut openpgp::Packet {
/// If there is no Issuer subpacket, this returns NULL. Note: if
/// there is no Issuer subpacket, but there is an IssuerFingerprint
/// subpacket, this still returns NULL.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_issuer(sig: *const Signature) -> Maybe<KeyID> {
sig.ref_raw().issuer().move_into_raw()
}
@@ -56,7 +56,7 @@ fn pgp_signature_issuer(sig: *const Signature) -> Maybe<KeyID> {
/// If there is no IssuerFingerprint subpacket, this returns NULL.
/// Note: if there is no IssuerFingerprint subpacket, but there is an
/// Issuer subpacket, this still returns NULL.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_issuer_fingerprint(sig: *const Signature)
-> Maybe<Fingerprint> {
sig.ref_raw().issuer_fingerprint().move_into_raw()
@@ -65,21 +65,21 @@ fn pgp_signature_issuer_fingerprint(sig: *const Signature)
/// Returns whether the KeyFlags indicates that the key can be used to
/// make certifications.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_can_certify(sig: *const Signature) -> bool {
sig.ref_raw().key_flags().can_certify()
}
/// Returns whether the KeyFlags indicates that the key can be used to
/// make signatures.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_can_sign(sig: *const Signature) -> bool {
sig.ref_raw().key_flags().can_sign()
}
/// Returns whether the KeyFlags indicates that the key can be used to
/// encrypt data for transport.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_can_encrypt_for_transport(sig: *const Signature)
-> bool {
sig.ref_raw().key_flags().can_encrypt_for_transport()
@@ -87,28 +87,28 @@ fn pgp_signature_can_encrypt_for_transport(sig: *const Signature)
/// Returns whether the KeyFlags indicates that the key can be used to
/// encrypt data at rest.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_can_encrypt_at_rest(sig: *const Signature) -> bool {
sig.ref_raw().key_flags().can_encrypt_at_rest()
}
/// Returns whether the KeyFlags indicates that the key can be used
/// for authentication.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_can_authenticate(sig: *const Signature) -> bool {
sig.ref_raw().key_flags().can_authenticate()
}
/// Returns whether the KeyFlags indicates that the key is a split
/// key.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_is_split_key(sig: *const Signature) -> bool {
sig.ref_raw().key_flags().is_split_key()
}
/// Returns whether the KeyFlags indicates that the key is a group
/// key.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_is_group_key(sig: *const Signature) -> bool {
sig.ref_raw().key_flags().is_group_key()
}
@@ -118,7 +118,7 @@ fn pgp_signature_is_group_key(sig: *const Signature) -> bool {
///
/// A signature is alive if the creation date is in the past, and the
/// signature has not expired.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_alive(sig: *const Signature) -> bool {
sig.ref_raw().signature_alive()
}
@@ -127,20 +127,20 @@ fn pgp_signature_alive(sig: *const Signature) -> bool {
///
/// A signature is alive if the creation date is in the past, and the
/// signature has not expired at the specified time.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_alive_at(sig: *const Signature, when: time_t) -> bool {
sig.ref_raw()
.signature_alive_at(time::at(time::Timespec::new(when as i64, 0)))
}
/// Returns whether the signature is expired.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_expired(sig: *const Signature) -> bool {
sig.ref_raw().signature_expired()
}
/// Returns whether the signature is expired at the specified time.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_expired_at(sig: *const Signature, when: time_t) -> bool {
sig.ref_raw()
.signature_expired_at(time::at(time::Timespec::new(when as i64, 0)))
@@ -150,7 +150,7 @@ fn pgp_signature_expired_at(sig: *const Signature, when: time_t) -> bool {
///
/// A signature is alive if the creation date is in the past, and the
/// signature has not expired.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_key_alive(sig: *const Signature, key: *const Key)
-> bool {
sig.ref_raw().key_alive(key.ref_raw())
@@ -160,7 +160,7 @@ fn pgp_signature_key_alive(sig: *const Signature, key: *const Key)
///
/// A signature is alive if the creation date is in the past, and the
/// signature has not expired at the specified time.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_key_alive_at(sig: *const Signature, key: *const Key,
when: time_t) -> bool {
sig.ref_raw()
@@ -169,14 +169,14 @@ fn pgp_signature_key_alive_at(sig: *const Signature, key: *const Key,
}
/// Returns whether the signature is expired.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_key_expired(sig: *const Signature, key: *const Key)
-> bool {
sig.ref_raw().key_expired(key.ref_raw())
}
/// Returns whether the signature is expired at the specified time.
-#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "system"
+#[::sequoia_ffi_macros::extern_fn] #[no_mangle] pub extern "C"
fn pgp_signature_key_expired_at(sig: *const Signature, key: *const Key,
when: time_t) -> bool {
sig.ref_raw()