diff options
Diffstat (limited to 'openpgp-ffi/src/tpk.rs')
-rw-r--r-- | openpgp-ffi/src/tpk.rs | 202 |
1 files changed, 101 insertions, 101 deletions
diff --git a/openpgp-ffi/src/tpk.rs b/openpgp-ffi/src/tpk.rs index 0e506280..58cb90b2 100644 --- a/openpgp-ffi/src/tpk.rs +++ b/openpgp-ffi/src/tpk.rs @@ -38,7 +38,7 @@ use ::error::Status; /// Returns the first TPK encountered in the reader. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_from_reader(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_from_reader(errp: Option<&mut *mut failure::Error>, reader: *mut Box<Read>) -> *mut TPK { ffi_make_fry_from_errp!(errp); @@ -48,7 +48,7 @@ pub extern "system" fn sq_tpk_from_reader(errp: Option<&mut *mut failure::Error> /// Returns the first TPK encountered in the file. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_from_file(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_from_file(errp: Option<&mut *mut failure::Error>, filename: *const c_char) -> *mut TPK { ffi_make_fry_from_errp!(errp); @@ -60,7 +60,7 @@ pub extern "system" fn sq_tpk_from_file(errp: Option<&mut *mut failure::Error>, /// /// Consumes `m`. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_from_packet_pile(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_from_packet_pile(errp: Option<&mut *mut failure::Error>, m: *mut PacketPile) -> *mut TPK { ffi_make_fry_from_errp!(errp); @@ -72,7 +72,7 @@ pub extern "system" fn sq_tpk_from_packet_pile(errp: Option<&mut *mut failure::E /// /// `buf` must be an OpenPGP-encoded TPK. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_from_bytes(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_from_bytes(errp: Option<&mut *mut failure::Error>, b: *const uint8_t, len: size_t) -> *mut TPK { ffi_make_fry_from_errp!(errp); @@ -88,7 +88,7 @@ pub extern "system" fn sq_tpk_from_bytes(errp: Option<&mut *mut failure::Error>, /// /// Consumes the packet parser result. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_from_packet_parser(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_from_packet_parser(errp: Option<&mut *mut failure::Error>, ppr: *mut PacketParserResult) -> *mut TPK { @@ -100,13 +100,13 @@ pub extern "system" fn sq_tpk_from_packet_parser(errp: Option<&mut *mut failure: /// Frees the TPK. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_free(tpk: Option<&mut TPK>) { +pub extern "system" fn pgp_tpk_free(tpk: Option<&mut TPK>) { ffi_free!(tpk) } /// Clones the TPK. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_clone(tpk: *const TPK) +pub extern "system" fn pgp_tpk_clone(tpk: *const TPK) -> *mut TPK { let tpk = ffi_param_ref!(tpk); box_raw!(tpk.clone()) @@ -114,7 +114,7 @@ pub extern "system" fn sq_tpk_clone(tpk: *const TPK) /// Compares TPKs. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_equal(a: *const TPK, +pub extern "system" fn pgp_tpk_equal(a: *const TPK, b: *const TPK) -> bool { let a = ffi_param_ref!(a); @@ -124,7 +124,7 @@ pub extern "system" fn sq_tpk_equal(a: *const TPK, /// Serializes the TPK. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_serialize(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_serialize(errp: Option<&mut *mut failure::Error>, tpk: *const TPK, writer: *mut Box<Write>) -> Status { @@ -141,7 +141,7 @@ pub extern "system" fn sq_tpk_serialize(errp: Option<&mut *mut failure::Error>, /// /// Consumes `tpk` and `other`. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_merge(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_merge(errp: Option<&mut *mut failure::Error>, tpk: *mut TPK, other: *mut TPK) -> *mut TPK { @@ -159,7 +159,7 @@ pub extern "system" fn sq_tpk_merge(errp: Option<&mut *mut failure::Error>, /// Consumes `tpk` and the packets in `packets`. The buffer, however, /// must be managed by the caller. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_merge_packets(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_merge_packets(errp: Option<&mut *mut failure::Error>, tpk: *mut TPK, packets: *mut *mut Packet, packets_len: size_t) @@ -178,14 +178,14 @@ pub extern "system" fn sq_tpk_merge_packets(errp: Option<&mut *mut failure::Erro /// /// XXX Remove this. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_dump(tpk: *const TPK) { +pub extern "system" fn pgp_tpk_dump(tpk: *const TPK) { let tpk = ffi_param_ref!(tpk); println!("{:?}", *tpk); } /// Returns the fingerprint. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_fingerprint(tpk: *const TPK) +pub extern "system" fn pgp_tpk_fingerprint(tpk: *const TPK) -> *mut Fingerprint { let tpk = ffi_param_ref!(tpk); box_raw!(tpk.fingerprint()) @@ -194,7 +194,7 @@ pub extern "system" fn sq_tpk_fingerprint(tpk: *const TPK) /// Cast the public key into a secret key that allows using the secret /// parts of the containing keys. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_into_tsk(tpk: *mut TPK) +pub extern "system" fn pgp_tpk_into_tsk(tpk: *mut TPK) -> *mut TSK { let tpk = ffi_param_move!(tpk); box_raw!(tpk.into_tsk()) @@ -205,7 +205,7 @@ pub extern "system" fn sq_tpk_into_tsk(tpk: *mut TPK) /// The tpk still owns the key. The caller should neither modify nor /// free the key. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_primary(tpk: *const TPK) +pub extern "system" fn pgp_tpk_primary(tpk: *const TPK) -> *const packet::Key { let tpk = ffi_param_ref!(tpk); tpk.primary() @@ -217,7 +217,7 @@ pub extern "system" fn sq_tpk_primary(tpk: *const TPK) /// not reflect whether an individual user id, user attribute or /// subkey has been revoked. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_revocation_status(tpk: *const TPK) +pub extern "system" fn pgp_tpk_revocation_status(tpk: *const TPK) -> *mut RevocationStatus<'static> { let tpk = ffi_param_ref!(tpk); box_raw!(tpk.revoked(None)) @@ -246,44 +246,44 @@ fn int_to_reason_for_revocation(code: c_int) -> ReasonForRevocation { /// #include <assert.h> /// #include <sequoia/openpgp.h> /// -/// sq_tpk_builder_t builder; -/// sq_tpk_t tpk; -/// sq_signature_t revocation; -/// sq_p_key_t primary_key; -/// sq_key_pair_t primary_keypair; -/// sq_signer_t primary_signer; +/// pgp_tpk_builder_t builder; +/// pgp_tpk_t tpk; +/// pgp_signature_t revocation; +/// pgp_p_key_t primary_key; +/// pgp_key_pair_t primary_keypair; +/// pgp_signer_t primary_signer; /// -/// builder = sq_tpk_builder_default (); -/// sq_tpk_builder_set_cipher_suite (&builder, SQ_TPK_CIPHER_SUITE_CV25519); -/// sq_tpk_builder_generate (NULL, builder, &tpk, &revocation); +/// builder = pgp_tpk_builder_default (); +/// pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519); +/// pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation); /// assert (tpk); /// assert (revocation); -/// sq_signature_free (revocation); /* Free the generated one. */ +/// pgp_signature_free (revocation); /* Free the generated one. */ /// -/// primary_key = sq_p_key_clone (sq_tpk_primary (tpk)); +/// primary_key = pgp_p_key_clone (pgp_tpk_primary (tpk)); /// assert (primary_key); -/// primary_keypair = sq_p_key_into_key_pair (NULL, primary_key); +/// primary_keypair = pgp_p_key_into_key_pair (NULL, primary_key); /// assert (primary_keypair); -/// primary_signer = sq_key_pair_as_signer (primary_keypair); -/// revocation = sq_tpk_revoke (NULL, tpk, primary_signer, -/// SQ_REASON_FOR_REVOCATION_KEY_COMPROMISED, +/// primary_signer = pgp_key_pair_as_signer (primary_keypair); +/// revocation = pgp_tpk_revoke (NULL, tpk, primary_signer, +/// PGP_REASON_FOR_REVOCATION_KEY_COMPROMISED, /// "It was the maid :/"); /// assert (revocation); -/// sq_signer_free (primary_signer); -/// sq_key_pair_free (primary_keypair); +/// pgp_signer_free (primary_signer); +/// pgp_key_pair_free (primary_keypair); /// -/// sq_packet_t packet = sq_signature_to_packet (revocation); -/// tpk = sq_tpk_merge_packets (NULL, tpk, &packet, 1); +/// pgp_packet_t packet = pgp_signature_to_packet (revocation); +/// tpk = pgp_tpk_merge_packets (NULL, tpk, &packet, 1); /// assert (tpk); /// -/// sq_revocation_status_t rs = sq_tpk_revocation_status (tpk); -/// assert (sq_revocation_status_variant (rs) == SQ_REVOCATION_STATUS_REVOKED); -/// sq_revocation_status_free (rs); +/// pgp_revocation_status_t rs = pgp_tpk_revocation_status (tpk); +/// assert (pgp_revocation_status_variant (rs) == PGP_REVOCATION_STATUS_REVOKED); +/// pgp_revocation_status_free (rs); /// -/// sq_tpk_free (tpk); +/// pgp_tpk_free (tpk); /// ``` #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_revoke(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_revoke(errp: Option<&mut *mut failure::Error>, tpk: *mut TPK, primary_signer: *mut Box<crypto::Signer>, code: c_int, @@ -313,40 +313,40 @@ pub extern "system" fn sq_tpk_revoke(errp: Option<&mut *mut failure::Error>, /// #include <assert.h> /// #include <sequoia/openpgp.h> /// -/// sq_tpk_builder_t builder; -/// sq_tpk_t tpk; -/// sq_signature_t revocation; -/// sq_p_key_t primary_key; -/// sq_key_pair_t primary_keypair; -/// sq_signer_t primary_signer; +/// pgp_tpk_builder_t builder; +/// pgp_tpk_t tpk; +/// pgp_signature_t revocation; +/// pgp_p_key_t primary_key; +/// pgp_key_pair_t primary_keypair; +/// pgp_signer_t primary_signer; /// -/// builder = sq_tpk_builder_default (); -/// sq_tpk_builder_set_cipher_suite (&builder, SQ_TPK_CIPHER_SUITE_CV25519); -/// sq_tpk_builder_generate (NULL, builder, &tpk, &revocation); +/// builder = pgp_tpk_builder_default (); +/// pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519); +/// pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation); /// assert (tpk); /// assert (revocation); -/// sq_signature_free (revocation); /* Free the generated one. */ +/// pgp_signature_free (revocation); /* Free the generated one. */ /// -/// primary_key = sq_p_key_clone (sq_tpk_primary (tpk)); +/// primary_key = pgp_p_key_clone (pgp_tpk_primary (tpk)); /// assert (primary_key); -/// primary_keypair = sq_p_key_into_key_pair (NULL, primary_key); +/// primary_keypair = pgp_p_key_into_key_pair (NULL, primary_key); /// assert (primary_keypair); -/// primary_signer = sq_key_pair_as_signer (primary_keypair); -/// tpk = sq_tpk_revoke_in_place (NULL, tpk, primary_signer, -/// SQ_REASON_FOR_REVOCATION_KEY_COMPROMISED, +/// primary_signer = pgp_key_pair_as_signer (primary_keypair); +/// tpk = pgp_tpk_revoke_in_place (NULL, tpk, primary_signer, +/// PGP_REASON_FOR_REVOCATION_KEY_COMPROMISED, /// "It was the maid :/"); /// assert (tpk); -/// sq_signer_free (primary_signer); -/// sq_key_pair_free (primary_keypair); +/// pgp_signer_free (primary_signer); +/// pgp_key_pair_free (primary_keypair); /// -/// sq_revocation_status_t rs = sq_tpk_revocation_status (tpk); -/// assert (sq_revocation_status_variant (rs) == SQ_REVOCATION_STATUS_REVOKED); -/// sq_revocation_status_free (rs); +/// pgp_revocation_status_t rs = pgp_tpk_revocation_status (tpk); +/// assert (pgp_revocation_status_variant (rs) == PGP_REVOCATION_STATUS_REVOKED); +/// pgp_revocation_status_free (rs); /// -/// sq_tpk_free (tpk); +/// pgp_tpk_free (tpk); /// ``` #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_revoke_in_place(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_revoke_in_place(errp: Option<&mut *mut failure::Error>, tpk: *mut TPK, primary_signer: *mut Box<crypto::Signer>, code: c_int, @@ -368,7 +368,7 @@ pub extern "system" fn sq_tpk_revoke_in_place(errp: Option<&mut *mut failure::Er /// Returns whether the TPK has expired. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_expired(tpk: *const TPK) +pub extern "system" fn pgp_tpk_expired(tpk: *const TPK) -> c_int { let tpk = ffi_param_ref!(tpk); @@ -377,7 +377,7 @@ pub extern "system" fn sq_tpk_expired(tpk: *const TPK) /// Returns whether the TPK has expired. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_expired_at(tpk: *const TPK, when: time_t) +pub extern "system" fn pgp_tpk_expired_at(tpk: *const TPK, when: time_t) -> c_int { let tpk = ffi_param_ref!(tpk); tpk.expired_at(time::at(time::Timespec::new(when as i64, 0))) as c_int @@ -385,7 +385,7 @@ pub extern "system" fn sq_tpk_expired_at(tpk: *const TPK, when: time_t) /// Returns whether the TPK is alive. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_alive(tpk: *const TPK) +pub extern "system" fn pgp_tpk_alive(tpk: *const TPK) -> c_int { let tpk = ffi_param_ref!(tpk); @@ -394,7 +394,7 @@ pub extern "system" fn sq_tpk_alive(tpk: *const TPK) /// Returns whether the TPK is alive at the specified time. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_alive_at(tpk: *const TPK, when: time_t) +pub extern "system" fn pgp_tpk_alive_at(tpk: *const TPK, when: time_t) -> c_int { let tpk = ffi_param_ref!(tpk); tpk.alive_at(time::at(time::Timespec::new(when as i64, 0))) as c_int @@ -407,7 +407,7 @@ pub extern "system" fn sq_tpk_alive_at(tpk: *const TPK, when: time_t) /// /// This function consumes `tpk` and returns a new `TPK`. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_set_expiry(errp: Option<&mut *mut failure::Error>, +pub extern "system" fn pgp_tpk_set_expiry(errp: Option<&mut *mut failure::Error>, tpk: *mut TPK, expiry: u32) -> *mut TPK { ffi_make_fry_from_errp!(errp); @@ -418,7 +418,7 @@ pub extern "system" fn sq_tpk_set_expiry(errp: Option<&mut *mut failure::Error>, /// Returns whether the TPK includes any secret key material. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_is_tsk(tpk: *const TPK) +pub extern "system" fn pgp_tpk_is_tsk(tpk: *const TPK) -> c_int { let tpk = ffi_param_ref!(tpk); tpk.is_tsk() as c_int @@ -426,7 +426,7 @@ pub extern "system" fn sq_tpk_is_tsk(tpk: *const TPK) /// Returns an iterator over the TPK's user id bindings. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_primary_user_id(tpk: *const TPK) +pub extern "system" fn pgp_tpk_primary_user_id(tpk: *const TPK) -> *mut c_char { let tpk = ffi_param_ref!(tpk); @@ -447,7 +447,7 @@ pub extern "system" fn sq_tpk_primary_user_id(tpk: *const TPK) /// /// The caller must free the returned value. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_user_id_binding_user_id( +pub extern "system" fn pgp_user_id_binding_user_id( binding: *const UserIDBinding) -> *mut c_char { @@ -458,7 +458,7 @@ pub extern "system" fn sq_user_id_binding_user_id( /// Returns a reference to the self-signature, if any. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_user_id_binding_selfsig( +pub extern "system" fn pgp_user_id_binding_selfsig( binding: *const UserIDBinding) -> Option<&'static Signature> { @@ -471,16 +471,16 @@ pub extern "system" fn sq_user_id_binding_selfsig( /// Returns an iterator over the TPK's user id bindings. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_user_id_binding_iter(tpk: *const TPK) +pub extern "system" fn pgp_tpk_user_id_binding_iter(tpk: *const TPK) -> *mut UserIDBindingIter<'static> { let tpk = ffi_param_ref!(tpk); box_raw!(tpk.userids()) } -/// Frees a sq_user_id_binding_iter_t. +/// Frees a pgp_user_id_binding_iter_t. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_user_id_binding_iter_free( +pub extern "system" fn pgp_user_id_binding_iter_free( iter: Option<&mut UserIDBindingIter>) { ffi_free!(iter) @@ -488,7 +488,7 @@ pub extern "system" fn sq_user_id_binding_iter_free( /// Returns the next `UserIDBinding`. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_user_id_binding_iter_next<'a>( +pub extern "system" fn pgp_user_id_binding_iter_next<'a>( iter: *mut UserIDBindingIter<'a>) -> Option<&'a UserIDBinding> { @@ -508,7 +508,7 @@ pub struct KeyIterWrapper<'a> { /// /// This iterates over both the primary key and any subkeys. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_key_iter(tpk: *const TPK) +pub extern "system" fn pgp_tpk_key_iter(tpk: *const TPK) -> *mut KeyIterWrapper<'static> { let tpk = ffi_param_ref!(tpk); @@ -518,9 +518,9 @@ pub extern "system" fn sq_tpk_key_iter(tpk: *const TPK) }) } -/// Frees a sq_tpk_key_iter_t. +/// Frees a pgp_tpk_key_iter_t. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_key_iter_free( +pub extern "system" fn pgp_tpk_key_iter_free( iter: Option<&mut KeyIterWrapper>) { ffi_free!(iter) @@ -536,7 +536,7 @@ pub extern "system" fn sq_tpk_key_iter_free( /// If rso is not NULL, this stores the key's revocation status in /// *rso. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_key_iter_next<'a>( +pub extern "system" fn pgp_tpk_key_iter_next<'a>( iter_wrapper: *mut KeyIterWrapper<'a>, sigo: Option<&mut Option<&'a packet::Signature>>, rso: Option<&mut &'a RevocationStatus<'a>>) @@ -563,7 +563,7 @@ pub extern "system" fn sq_tpk_key_iter_next<'a>( /* TPKBuilder */ -/// Creates a default `sq_tpk_builder_t`. +/// Creates a default `pgp_tpk_builder_t`. /// /// # Example /// @@ -571,26 +571,26 @@ pub extern "system" fn sq_tpk_key_iter_next<'a>( /// #include <assert.h> /// #include <sequoia/openpgp.h> /// -/// sq_tpk_builder_t builder; -/// sq_tpk_t tpk; -/// sq_signature_t revocation; +/// pgp_tpk_builder_t builder; +/// pgp_tpk_t tpk; +/// pgp_signature_t revocation; /// -/// builder = sq_tpk_builder_default (); -/// sq_tpk_builder_set_cipher_suite (&builder, SQ_TPK_CIPHER_SUITE_CV25519); -/// sq_tpk_builder_add_userid (&builder, "some@example.org"); -/// sq_tpk_builder_add_signing_subkey (&builder); -/// sq_tpk_builder_add_encryption_subkey (&builder); -/// sq_tpk_builder_generate (NULL, builder, &tpk, &revocation); +/// builder = pgp_tpk_builder_default (); +/// pgp_tpk_builder_set_cipher_suite (&builder, PGP_TPK_CIPHER_SUITE_CV25519); +/// pgp_tpk_builder_add_userid (&builder, "some@example.org"); +/// pgp_tpk_builder_add_signing_subkey (&builder); +/// pgp_tpk_builder_add_encryption_subkey (&builder); +/// pgp_tpk_builder_generate (NULL, builder, &tpk, &revocation); /// assert (tpk); /// assert (revocation); /// /// /* Use the TPK. */ /// -/// sq_signature_free (revocation); -/// sq_tpk_free (tpk); +/// pgp_signature_free (revocation); +/// pgp_tpk_free (tpk); /// ``` #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_default() -> *mut TPKBuilder { +pub extern "system" fn pgp_tpk_builder_default() -> *mut TPKBuilder { box_raw!(TPKBuilder::default()) } @@ -598,13 +598,13 @@ pub extern "system" fn sq_tpk_builder_default() -> *mut TPKBuilder { /// /// [Autocrypt Level 1]: https://autocrypt.org/level1.html #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_autocrypt() -> *mut TPKBuilder { +pub extern "system" fn pgp_tpk_builder_autocrypt() -> *mut TPKBuilder { box_raw!(TPKBuilder::autocrypt(Autocrypt::V1)) } -/// Frees an `sq_tpk_builder_t`. +/// Frees an `pgp_tpk_builder_t`. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_free(tpkb: Option<&mut TPKBuilder>) +pub extern "system" fn pgp_tpk_builder_free(tpkb: Option<&mut TPKBuilder>) { ffi_free!(tpkb) } @@ -612,7 +612,7 @@ pub extern "system" fn sq_tpk_builder_free(tpkb: Option<&mut TPKBuilder>) /// Sets the encryption and signature algorithms for primary and all /// subkeys. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_set_cipher_suite +pub extern "system" fn pgp_tpk_builder_set_cipher_suite (tpkb: *mut *mut TPKBuilder, cs: c_int) { use self::CipherSuite::*; @@ -630,7 +630,7 @@ pub extern "system" fn sq_tpk_builder_set_cipher_suite /// Adds a new user ID. The first user ID added replaces the default /// ID that is just the empty string. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_add_userid +pub extern "system" fn pgp_tpk_builder_add_userid (tpkb: *mut *mut TPKBuilder, uid: *const c_char) { let tpkb = ffi_param_ref_mut!(tpkb); @@ -642,7 +642,7 @@ pub extern "system" fn sq_tpk_builder_add_userid /// Adds a signing capable subkey. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_add_signing_subkey +pub extern "system" fn pgp_tpk_builder_add_signing_subkey (tpkb: *mut *mut TPKBuilder) { let tpkb = ffi_param_ref_mut!(tpkb); @@ -653,7 +653,7 @@ pub extern "system" fn sq_tpk_builder_add_signing_subkey /// Adds an encryption capable subkey. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_add_encryption_subkey +pub extern "system" fn pgp_tpk_builder_add_encryption_subkey (tpkb: *mut *mut TPKBuilder) { let tpkb = ffi_param_ref_mut!(tpkb); @@ -664,7 +664,7 @@ pub extern "system" fn sq_tpk_builder_add_encryption_subkey /// Adds an certification capable subkey. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_add_certification_subkey +pub extern "system" fn pgp_tpk_builder_add_certification_subkey (tpkb: *mut *mut TPKBuilder) { let tpkb = ffi_param_ref_mut!(tpkb); @@ -677,7 +677,7 @@ pub extern "system" fn sq_tpk_builder_add_certification_subkey /// /// Consumes `tpkb`. #[::ffi_catch_abort] #[no_mangle] -pub extern "system" fn sq_tpk_builder_generate +pub extern "system" fn pgp_tpk_builder_generate (errp: Option<&mut *mut failure::Error>, tpkb: *mut TPKBuilder, tpk_out: *mut *mut TPK, revocation_out: *mut *mut Signature) |