summaryrefslogtreecommitdiffstats
path: root/openpgp-ffi/src/tpk.rs
diff options
context:
space:
mode:
Diffstat (limited to 'openpgp-ffi/src/tpk.rs')
-rw-r--r--openpgp-ffi/src/tpk.rs202
1 files changed, 101 insertions, 101 deletions
diff --git a/openpgp-ffi/src/tpk.rs b/openpgp-ffi/src/tpk.rs
index 0e506280..58cb90b2 100644
--- a/openpgp-ffi/src/tpk.rs
+++ b/openpgp-ffi/src/tpk.rs
@@ -38,7 +38,7 @@ use ::error::Status;
/// Returns the first TPK encountered in the reader.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_from_reader(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_from_reader(errp: Option<&mut *mut failure::Error>,
reader: *mut Box<Read>)
-> *mut TPK {
ffi_make_fry_from_errp!(errp);
@@ -48,7 +48,7 @@ pub extern "system" fn sq_tpk_from_reader(errp: Option<&mut *mut failure::Error>
/// Returns the first TPK encountered in the file.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_from_file(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_from_file(errp: Option<&mut *mut failure::Error>,
filename: *const c_char)
-> *mut TPK {
ffi_make_fry_from_errp!(errp);
@@ -60,7 +60,7 @@ pub extern "system" fn sq_tpk_from_file(errp: Option<&mut *mut failure::Error>,
///
/// Consumes `m`.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_from_packet_pile(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_from_packet_pile(errp: Option<&mut *mut failure::Error>,
m: *mut PacketPile)
-> *mut TPK {
ffi_make_fry_from_errp!(errp);
@@ -72,7 +72,7 @@ pub extern "system" fn sq_tpk_from_packet_pile(errp: Option<&mut *mut failure::E
///
/// `buf` must be an OpenPGP-encoded TPK.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_from_bytes(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_from_bytes(errp: Option<&mut *mut failure::Error>,
b: *const uint8_t, len: size_t)
-> *mut TPK {
ffi_make_fry_from_errp!(errp);
@@ -88,7 +88,7 @@ pub extern "system" fn sq_tpk_from_bytes(errp: Option<&mut *mut failure::Error>,
///
/// Consumes the packet parser result.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_from_packet_parser(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_from_packet_parser(errp: Option<&mut *mut failure::Error>,
ppr: *mut PacketParserResult)
-> *mut TPK
{
@@ -100,13 +100,13 @@ pub extern "system" fn sq_tpk_from_packet_parser(errp: Option<&mut *mut failure:
/// Frees the TPK.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_free(tpk: Option<&mut TPK>) {
+pub extern "system" fn pgp_tpk_free(tpk: Option<&mut TPK>) {
ffi_free!(tpk)
}
/// Clones the TPK.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_clone(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_clone(tpk: *const TPK)
-> *mut TPK {
let tpk = ffi_param_ref!(tpk);
box_raw!(tpk.clone())
@@ -114,7 +114,7 @@ pub extern "system" fn sq_tpk_clone(tpk: *const TPK)
/// Compares TPKs.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_equal(a: *const TPK,
+pub extern "system" fn pgp_tpk_equal(a: *const TPK,
b: *const TPK)
-> bool {
let a = ffi_param_ref!(a);
@@ -124,7 +124,7 @@ pub extern "system" fn sq_tpk_equal(a: *const TPK,
/// Serializes the TPK.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_serialize(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_serialize(errp: Option<&mut *mut failure::Error>,
tpk: *const TPK,
writer: *mut Box<Write>)
-> Status {
@@ -141,7 +141,7 @@ pub extern "system" fn sq_tpk_serialize(errp: Option<&mut *mut failure::Error>,
///
/// Consumes `tpk` and `other`.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_merge(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_merge(errp: Option<&mut *mut failure::Error>,
tpk: *mut TPK,
other: *mut TPK)
-> *mut TPK {
@@ -159,7 +159,7 @@ pub extern "system" fn sq_tpk_merge(errp: Option<&mut *mut failure::Error>,
/// Consumes `tpk` and the packets in `packets`. The buffer, however,
/// must be managed by the caller.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_merge_packets(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_merge_packets(errp: Option<&mut *mut failure::Error>,
tpk: *mut TPK,
packets: *mut *mut Packet,
packets_len: size_t)
@@ -178,14 +178,14 @@ pub extern "system" fn sq_tpk_merge_packets(errp: Option<&mut *mut failure::Erro
///
/// XXX Remove this.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_dump(tpk: *const TPK) {
+pub extern "system" fn pgp_tpk_dump(tpk: *const TPK) {
let tpk = ffi_param_ref!(tpk);
println!("{:?}", *tpk);
}
/// Returns the fingerprint.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_fingerprint(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_fingerprint(tpk: *const TPK)
-> *mut Fingerprint {
let tpk = ffi_param_ref!(tpk);
box_raw!(tpk.fingerprint())
@@ -194,7 +194,7 @@ pub extern "system" fn sq_tpk_fingerprint(tpk: *const TPK)
/// Cast the public key into a secret key that allows using the secret
/// parts of the containing keys.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_into_tsk(tpk: *mut TPK)
+pub extern "system" fn pgp_tpk_into_tsk(tpk: *mut TPK)
-> *mut TSK {
let tpk = ffi_param_move!(tpk);
box_raw!(tpk.into_tsk())
@@ -205,7 +205,7 @@ pub extern "system" fn sq_tpk_into_tsk(tpk: *mut TPK)
/// The tpk still owns the key. The caller should neither modify nor
/// free the key.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_primary(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_primary(tpk: *const TPK)
-> *const packet::Key {
let tpk = ffi_param_ref!(tpk);
tpk.primary()
@@ -217,7 +217,7 @@ pub extern "system" fn sq_tpk_primary(tpk: *const TPK)
/// not reflect whether an individual user id, user attribute or
/// subkey has been revoked.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_revocation_status(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_revocation_status(tpk: *const TPK)
-> *mut RevocationStatus<'static> {
let tpk = ffi_param_ref!(tpk);
box_raw!(tpk.revoked(None))
@@ -246,44 +246,44 @@ fn int_to_reason_for_revocation(code: c_int) -> ReasonForRevocation {
/// #include <assert.h>
/// #include <sequoia/openpgp.h>
///
-/// sq_tpk_builder_t builder;
-/// sq_tpk_t tpk;
-/// sq_signature_t revocation;
-/// sq_p_key_t primary_key;
-/// sq_key_pair_t primary_keypair;
-/// sq_signer_t primary_signer;
+/// pgp_tpk_builder_t builder;
+/// pgp_tpk_t tpk;
+/// pgp_signature_t revocation;
+/// pgp_p_key_t primary_key;
+/// pgp_key_pair_t primary_keypair;
+/// pgp_signer_t primary_signer;
///
-/// builder = sq_tpk_builder_default ();
-/// sq_tpk_builder_set_cipher_suite (&builder, SQ_TPK_CIPHER_SUITE_CV25519);
-/// sq_tpk_builder_generate (NULL, builder, &tpk, &revocation);
+/// builder = pgp_tpk_builder_default ();
+/// pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519);
+/// pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation);
/// assert (tpk);
/// assert (revocation);
-/// sq_signature_free (revocation); /* Free the generated one. */
+/// pgp_signature_free (revocation); /* Free the generated one. */
///
-/// primary_key = sq_p_key_clone (sq_tpk_primary (tpk));
+/// primary_key = pgp_p_key_clone (pgp_tpk_primary (tpk));
/// assert (primary_key);
-/// primary_keypair = sq_p_key_into_key_pair (NULL, primary_key);
+/// primary_keypair = pgp_p_key_into_key_pair (NULL, primary_key);
/// assert (primary_keypair);
-/// primary_signer = sq_key_pair_as_signer (primary_keypair);
-/// revocation = sq_tpk_revoke (NULL, tpk, primary_signer,
-/// SQ_REASON_FOR_REVOCATION_KEY_COMPROMISED,
+/// primary_signer = pgp_key_pair_as_signer (primary_keypair);
+/// revocation = pgp_tpk_revoke (NULL, tpk, primary_signer,
+/// PGP_REASON_FOR_REVOCATION_KEY_COMPROMISED,
/// "It was the maid :/");
/// assert (revocation);
-/// sq_signer_free (primary_signer);
-/// sq_key_pair_free (primary_keypair);
+/// pgp_signer_free (primary_signer);
+/// pgp_key_pair_free (primary_keypair);
///
-/// sq_packet_t packet = sq_signature_to_packet (revocation);
-/// tpk = sq_tpk_merge_packets (NULL, tpk, &packet, 1);
+/// pgp_packet_t packet = pgp_signature_to_packet (revocation);
+/// tpk = pgp_tpk_merge_packets (NULL, tpk, &packet, 1);
/// assert (tpk);
///
-/// sq_revocation_status_t rs = sq_tpk_revocation_status (tpk);
-/// assert (sq_revocation_status_variant (rs) == SQ_REVOCATION_STATUS_REVOKED);
-/// sq_revocation_status_free (rs);
+/// pgp_revocation_status_t rs = pgp_tpk_revocation_status (tpk);
+/// assert (pgp_revocation_status_variant (rs) == PGP_REVOCATION_STATUS_REVOKED);
+/// pgp_revocation_status_free (rs);
///
-/// sq_tpk_free (tpk);
+/// pgp_tpk_free (tpk);
/// ```
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_revoke(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_revoke(errp: Option<&mut *mut failure::Error>,
tpk: *mut TPK,
primary_signer: *mut Box<crypto::Signer>,
code: c_int,
@@ -313,40 +313,40 @@ pub extern "system" fn sq_tpk_revoke(errp: Option<&mut *mut failure::Error>,
/// #include <assert.h>
/// #include <sequoia/openpgp.h>
///
-/// sq_tpk_builder_t builder;
-/// sq_tpk_t tpk;
-/// sq_signature_t revocation;
-/// sq_p_key_t primary_key;
-/// sq_key_pair_t primary_keypair;
-/// sq_signer_t primary_signer;
+/// pgp_tpk_builder_t builder;
+/// pgp_tpk_t tpk;
+/// pgp_signature_t revocation;
+/// pgp_p_key_t primary_key;
+/// pgp_key_pair_t primary_keypair;
+/// pgp_signer_t primary_signer;
///
-/// builder = sq_tpk_builder_default ();
-/// sq_tpk_builder_set_cipher_suite (&builder, SQ_TPK_CIPHER_SUITE_CV25519);
-/// sq_tpk_builder_generate (NULL, builder, &tpk, &revocation);
+/// builder = pgp_tpk_builder_default ();
+/// pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519);
+/// pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation);
/// assert (tpk);
/// assert (revocation);
-/// sq_signature_free (revocation); /* Free the generated one. */
+/// pgp_signature_free (revocation); /* Free the generated one. */
///
-/// primary_key = sq_p_key_clone (sq_tpk_primary (tpk));
+/// primary_key = pgp_p_key_clone (pgp_tpk_primary (tpk));
/// assert (primary_key);
-/// primary_keypair = sq_p_key_into_key_pair (NULL, primary_key);
+/// primary_keypair = pgp_p_key_into_key_pair (NULL, primary_key);
/// assert (primary_keypair);
-/// primary_signer = sq_key_pair_as_signer (primary_keypair);
-/// tpk = sq_tpk_revoke_in_place (NULL, tpk, primary_signer,
-/// SQ_REASON_FOR_REVOCATION_KEY_COMPROMISED,
+/// primary_signer = pgp_key_pair_as_signer (primary_keypair);
+/// tpk = pgp_tpk_revoke_in_place (NULL, tpk, primary_signer,
+/// PGP_REASON_FOR_REVOCATION_KEY_COMPROMISED,
/// "It was the maid :/");
/// assert (tpk);
-/// sq_signer_free (primary_signer);
-/// sq_key_pair_free (primary_keypair);
+/// pgp_signer_free (primary_signer);
+/// pgp_key_pair_free (primary_keypair);
///
-/// sq_revocation_status_t rs = sq_tpk_revocation_status (tpk);
-/// assert (sq_revocation_status_variant (rs) == SQ_REVOCATION_STATUS_REVOKED);
-/// sq_revocation_status_free (rs);
+/// pgp_revocation_status_t rs = pgp_tpk_revocation_status (tpk);
+/// assert (pgp_revocation_status_variant (rs) == PGP_REVOCATION_STATUS_REVOKED);
+/// pgp_revocation_status_free (rs);
///
-/// sq_tpk_free (tpk);
+/// pgp_tpk_free (tpk);
/// ```
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_revoke_in_place(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_revoke_in_place(errp: Option<&mut *mut failure::Error>,
tpk: *mut TPK,
primary_signer: *mut Box<crypto::Signer>,
code: c_int,
@@ -368,7 +368,7 @@ pub extern "system" fn sq_tpk_revoke_in_place(errp: Option<&mut *mut failure::Er
/// Returns whether the TPK has expired.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_expired(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_expired(tpk: *const TPK)
-> c_int {
let tpk = ffi_param_ref!(tpk);
@@ -377,7 +377,7 @@ pub extern "system" fn sq_tpk_expired(tpk: *const TPK)
/// Returns whether the TPK has expired.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_expired_at(tpk: *const TPK, when: time_t)
+pub extern "system" fn pgp_tpk_expired_at(tpk: *const TPK, when: time_t)
-> c_int {
let tpk = ffi_param_ref!(tpk);
tpk.expired_at(time::at(time::Timespec::new(when as i64, 0))) as c_int
@@ -385,7 +385,7 @@ pub extern "system" fn sq_tpk_expired_at(tpk: *const TPK, when: time_t)
/// Returns whether the TPK is alive.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_alive(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_alive(tpk: *const TPK)
-> c_int {
let tpk = ffi_param_ref!(tpk);
@@ -394,7 +394,7 @@ pub extern "system" fn sq_tpk_alive(tpk: *const TPK)
/// Returns whether the TPK is alive at the specified time.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_alive_at(tpk: *const TPK, when: time_t)
+pub extern "system" fn pgp_tpk_alive_at(tpk: *const TPK, when: time_t)
-> c_int {
let tpk = ffi_param_ref!(tpk);
tpk.alive_at(time::at(time::Timespec::new(when as i64, 0))) as c_int
@@ -407,7 +407,7 @@ pub extern "system" fn sq_tpk_alive_at(tpk: *const TPK, when: time_t)
///
/// This function consumes `tpk` and returns a new `TPK`.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_set_expiry(errp: Option<&mut *mut failure::Error>,
+pub extern "system" fn pgp_tpk_set_expiry(errp: Option<&mut *mut failure::Error>,
tpk: *mut TPK, expiry: u32)
-> *mut TPK {
ffi_make_fry_from_errp!(errp);
@@ -418,7 +418,7 @@ pub extern "system" fn sq_tpk_set_expiry(errp: Option<&mut *mut failure::Error>,
/// Returns whether the TPK includes any secret key material.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_is_tsk(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_is_tsk(tpk: *const TPK)
-> c_int {
let tpk = ffi_param_ref!(tpk);
tpk.is_tsk() as c_int
@@ -426,7 +426,7 @@ pub extern "system" fn sq_tpk_is_tsk(tpk: *const TPK)
/// Returns an iterator over the TPK's user id bindings.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_primary_user_id(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_primary_user_id(tpk: *const TPK)
-> *mut c_char
{
let tpk = ffi_param_ref!(tpk);
@@ -447,7 +447,7 @@ pub extern "system" fn sq_tpk_primary_user_id(tpk: *const TPK)
///
/// The caller must free the returned value.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_user_id_binding_user_id(
+pub extern "system" fn pgp_user_id_binding_user_id(
binding: *const UserIDBinding)
-> *mut c_char
{
@@ -458,7 +458,7 @@ pub extern "system" fn sq_user_id_binding_user_id(
/// Returns a reference to the self-signature, if any.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_user_id_binding_selfsig(
+pub extern "system" fn pgp_user_id_binding_selfsig(
binding: *const UserIDBinding)
-> Option<&'static Signature>
{
@@ -471,16 +471,16 @@ pub extern "system" fn sq_user_id_binding_selfsig(
/// Returns an iterator over the TPK's user id bindings.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_user_id_binding_iter(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_user_id_binding_iter(tpk: *const TPK)
-> *mut UserIDBindingIter<'static>
{
let tpk = ffi_param_ref!(tpk);
box_raw!(tpk.userids())
}
-/// Frees a sq_user_id_binding_iter_t.
+/// Frees a pgp_user_id_binding_iter_t.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_user_id_binding_iter_free(
+pub extern "system" fn pgp_user_id_binding_iter_free(
iter: Option<&mut UserIDBindingIter>)
{
ffi_free!(iter)
@@ -488,7 +488,7 @@ pub extern "system" fn sq_user_id_binding_iter_free(
/// Returns the next `UserIDBinding`.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_user_id_binding_iter_next<'a>(
+pub extern "system" fn pgp_user_id_binding_iter_next<'a>(
iter: *mut UserIDBindingIter<'a>)
-> Option<&'a UserIDBinding>
{
@@ -508,7 +508,7 @@ pub struct KeyIterWrapper<'a> {
///
/// This iterates over both the primary key and any subkeys.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_key_iter(tpk: *const TPK)
+pub extern "system" fn pgp_tpk_key_iter(tpk: *const TPK)
-> *mut KeyIterWrapper<'static>
{
let tpk = ffi_param_ref!(tpk);
@@ -518,9 +518,9 @@ pub extern "system" fn sq_tpk_key_iter(tpk: *const TPK)
})
}
-/// Frees a sq_tpk_key_iter_t.
+/// Frees a pgp_tpk_key_iter_t.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_key_iter_free(
+pub extern "system" fn pgp_tpk_key_iter_free(
iter: Option<&mut KeyIterWrapper>)
{
ffi_free!(iter)
@@ -536,7 +536,7 @@ pub extern "system" fn sq_tpk_key_iter_free(
/// If rso is not NULL, this stores the key's revocation status in
/// *rso.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_key_iter_next<'a>(
+pub extern "system" fn pgp_tpk_key_iter_next<'a>(
iter_wrapper: *mut KeyIterWrapper<'a>,
sigo: Option<&mut Option<&'a packet::Signature>>,
rso: Option<&mut &'a RevocationStatus<'a>>)
@@ -563,7 +563,7 @@ pub extern "system" fn sq_tpk_key_iter_next<'a>(
/* TPKBuilder */
-/// Creates a default `sq_tpk_builder_t`.
+/// Creates a default `pgp_tpk_builder_t`.
///
/// # Example
///
@@ -571,26 +571,26 @@ pub extern "system" fn sq_tpk_key_iter_next<'a>(
/// #include <assert.h>
/// #include <sequoia/openpgp.h>
///
-/// sq_tpk_builder_t builder;
-/// sq_tpk_t tpk;
-/// sq_signature_t revocation;
+/// pgp_tpk_builder_t builder;
+/// pgp_tpk_t tpk;
+/// pgp_signature_t revocation;
///
-/// builder = sq_tpk_builder_default ();
-/// sq_tpk_builder_set_cipher_suite (&builder, SQ_TPK_CIPHER_SUITE_CV25519);
-/// sq_tpk_builder_add_userid (&builder, "some@example.org");
-/// sq_tpk_builder_add_signing_subkey (&builder);
-/// sq_tpk_builder_add_encryption_subkey (&builder);
-/// sq_tpk_builder_generate (NULL, builder, &tpk, &revocation);
+/// builder = pgp_tpk_builder_default ();
+/// pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519);
+/// pgp_tpk_builder_add_userid (&builder, "some@example.org");
+/// pgp_tpk_builder_add_signing_subkey (&builder);
+/// pgp_tpk_builder_add_encryption_subkey (&builder);
+/// pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation);
/// assert (tpk);
/// assert (revocation);
///
/// /* Use the TPK. */
///
-/// sq_signature_free (revocation);
-/// sq_tpk_free (tpk);
+/// pgp_signature_free (revocation);
+/// pgp_tpk_free (tpk);
/// ```
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_default() -> *mut TPKBuilder {
+pub extern "system" fn pgp_tpk_builder_default() -> *mut TPKBuilder {
box_raw!(TPKBuilder::default())
}
@@ -598,13 +598,13 @@ pub extern "system" fn sq_tpk_builder_default() -> *mut TPKBuilder {
///
/// [Autocrypt Level 1]: https://autocrypt.org/level1.html
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_autocrypt() -> *mut TPKBuilder {
+pub extern "system" fn pgp_tpk_builder_autocrypt() -> *mut TPKBuilder {
box_raw!(TPKBuilder::autocrypt(Autocrypt::V1))
}
-/// Frees an `sq_tpk_builder_t`.
+/// Frees an `pgp_tpk_builder_t`.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_free(tpkb: Option<&mut TPKBuilder>)
+pub extern "system" fn pgp_tpk_builder_free(tpkb: Option<&mut TPKBuilder>)
{
ffi_free!(tpkb)
}
@@ -612,7 +612,7 @@ pub extern "system" fn sq_tpk_builder_free(tpkb: Option<&mut TPKBuilder>)
/// Sets the encryption and signature algorithms for primary and all
/// subkeys.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_set_cipher_suite
+pub extern "system" fn pgp_tpk_builder_set_cipher_suite
(tpkb: *mut *mut TPKBuilder, cs: c_int)
{
use self::CipherSuite::*;
@@ -630,7 +630,7 @@ pub extern "system" fn sq_tpk_builder_set_cipher_suite
/// Adds a new user ID. The first user ID added replaces the default
/// ID that is just the empty string.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_add_userid
+pub extern "system" fn pgp_tpk_builder_add_userid
(tpkb: *mut *mut TPKBuilder, uid: *const c_char)
{
let tpkb = ffi_param_ref_mut!(tpkb);
@@ -642,7 +642,7 @@ pub extern "system" fn sq_tpk_builder_add_userid
/// Adds a signing capable subkey.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_add_signing_subkey
+pub extern "system" fn pgp_tpk_builder_add_signing_subkey
(tpkb: *mut *mut TPKBuilder)
{
let tpkb = ffi_param_ref_mut!(tpkb);
@@ -653,7 +653,7 @@ pub extern "system" fn sq_tpk_builder_add_signing_subkey
/// Adds an encryption capable subkey.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_add_encryption_subkey
+pub extern "system" fn pgp_tpk_builder_add_encryption_subkey
(tpkb: *mut *mut TPKBuilder)
{
let tpkb = ffi_param_ref_mut!(tpkb);
@@ -664,7 +664,7 @@ pub extern "system" fn sq_tpk_builder_add_encryption_subkey
/// Adds an certification capable subkey.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_add_certification_subkey
+pub extern "system" fn pgp_tpk_builder_add_certification_subkey
(tpkb: *mut *mut TPKBuilder)
{
let tpkb = ffi_param_ref_mut!(tpkb);
@@ -677,7 +677,7 @@ pub extern "system" fn sq_tpk_builder_add_certification_subkey
///
/// Consumes `tpkb`.
#[::ffi_catch_abort] #[no_mangle]
-pub extern "system" fn sq_tpk_builder_generate
+pub extern "system" fn pgp_tpk_builder_generate
(errp: Option<&mut *mut failure::Error>, tpkb: *mut TPKBuilder,
tpk_out: *mut *mut TPK,
revocation_out: *mut *mut Signature)