summaryrefslogtreecommitdiffstats
path: root/openpgp/src/cert/builder.rs
diff options
context:
space:
mode:
Diffstat (limited to 'openpgp/src/cert/builder.rs')
-rw-r--r--openpgp/src/cert/builder.rs52
1 files changed, 26 insertions, 26 deletions
diff --git a/openpgp/src/cert/builder.rs b/openpgp/src/cert/builder.rs
index a17efb02..8cf54d0c 100644
--- a/openpgp/src/cert/builder.rs
+++ b/openpgp/src/cert/builder.rs
@@ -211,7 +211,7 @@ impl CertBuilder {
creation_time: None,
ciphersuite: CipherSuite::default(),
primary: KeyBlueprint{
- flags: KeyFlags::default().set_certification(true),
+ flags: KeyFlags::default().set_certification(),
expiration: None,
ciphersuite: None,
},
@@ -255,8 +255,8 @@ impl CertBuilder {
ciphersuite: ciphersuite.into().unwrap_or(Default::default()),
primary: KeyBlueprint {
flags: KeyFlags::default()
- .set_certification(true)
- .set_signing(true),
+ .set_certification()
+ .set_signing(),
expiration: Some(
time::SystemTime::now()
+ time::Duration::new(3 * 52 * 7 * 24 * 60 * 60, 0)),
@@ -265,8 +265,8 @@ impl CertBuilder {
subkeys: vec![
KeyBlueprint {
flags: KeyFlags::default()
- .set_transport_encryption(true)
- .set_storage_encryption(true),
+ .set_transport_encryption()
+ .set_storage_encryption(),
expiration: None,
ciphersuite: None,
}
@@ -520,12 +520,12 @@ impl CertBuilder {
/// assert_eq!(cert.keys().count(), 2);
/// let ka = cert.with_policy(p, None)?.keys().nth(1).unwrap();
/// assert_eq!(ka.key_flags(),
- /// Some(KeyFlags::empty().set_signing(true)));
+ /// Some(KeyFlags::empty().set_signing()));
/// # Ok(())
/// # }
/// ```
pub fn add_signing_subkey(self) -> Self {
- self.add_subkey(KeyFlags::default().set_signing(true), None, None)
+ self.add_subkey(KeyFlags::default().set_signing(), None, None)
}
/// Adds a subkey suitable for transport encryption.
@@ -558,12 +558,12 @@ impl CertBuilder {
/// assert_eq!(cert.keys().count(), 2);
/// let ka = cert.with_policy(p, None)?.keys().nth(1).unwrap();
/// assert_eq!(ka.key_flags(),
- /// Some(KeyFlags::empty().set_transport_encryption(true)));
+ /// Some(KeyFlags::empty().set_transport_encryption()));
/// # Ok(())
/// # }
/// ```
pub fn add_transport_encryption_subkey(self) -> Self {
- self.add_subkey(KeyFlags::default().set_transport_encryption(true),
+ self.add_subkey(KeyFlags::default().set_transport_encryption(),
None, None)
}
@@ -597,12 +597,12 @@ impl CertBuilder {
/// assert_eq!(cert.keys().count(), 2);
/// let ka = cert.with_policy(p, None)?.keys().nth(1).unwrap();
/// assert_eq!(ka.key_flags(),
- /// Some(KeyFlags::empty().set_storage_encryption(true)));
+ /// Some(KeyFlags::empty().set_storage_encryption()));
/// # Ok(())
/// # }
/// ```
pub fn add_storage_encryption_subkey(self) -> Self {
- self.add_subkey(KeyFlags::default().set_storage_encryption(true),
+ self.add_subkey(KeyFlags::default().set_storage_encryption(),
None, None)
}
@@ -636,12 +636,12 @@ impl CertBuilder {
/// assert_eq!(cert.keys().count(), 2);
/// let ka = cert.with_policy(p, None)?.keys().nth(1).unwrap();
/// assert_eq!(ka.key_flags(),
- /// Some(KeyFlags::empty().set_certification(true)));
+ /// Some(KeyFlags::empty().set_certification()));
/// # Ok(())
/// # }
/// ```
pub fn add_certification_subkey(self) -> Self {
- self.add_subkey(KeyFlags::default().set_certification(true), None, None)
+ self.add_subkey(KeyFlags::default().set_certification(), None, None)
}
/// Adds an authentication-capable subkey.
@@ -674,12 +674,12 @@ impl CertBuilder {
/// assert_eq!(cert.keys().count(), 2);
/// let ka = cert.with_policy(p, None)?.keys().nth(1).unwrap();
/// assert_eq!(ka.key_flags(),
- /// Some(KeyFlags::empty().set_authentication(true)));
+ /// Some(KeyFlags::empty().set_authentication()));
/// # Ok(())
/// # }
/// ```
pub fn add_authentication_subkey(self) -> Self {
- self.add_subkey(KeyFlags::default().set_authentication(true), None, None)
+ self.add_subkey(KeyFlags::default().set_authentication(), None, None)
}
/// Adds a custom subkey.
@@ -715,8 +715,8 @@ impl CertBuilder {
/// .set_creation_time(now)
/// .set_expiration_time(now + 2 * y)
/// .add_subkey(KeyFlags::empty()
- /// .set_storage_encryption(true)
- /// .set_transport_encryption(true),
+ /// .set_storage_encryption()
+ /// .set_transport_encryption(),
/// now + y,
/// None)
/// .generate()?;
@@ -728,8 +728,8 @@ impl CertBuilder {
/// let ka = cert.with_policy(p, None)?.keys().nth(1).unwrap();
/// assert_eq!(ka.key_flags(),
/// Some(KeyFlags::empty()
- /// .set_storage_encryption(true)
- /// .set_transport_encryption(true)));
+ /// .set_storage_encryption()
+ /// .set_transport_encryption()));
/// # Ok(()) }
/// ```
pub fn add_subkey<T, C>(mut self, flags: KeyFlags, expiration: T, cs: C)
@@ -767,13 +767,13 @@ impl CertBuilder {
/// let (cert, rev) =
/// CertBuilder::general_purpose(None,
/// Some("Alice Lovelace <alice@example.org>"))
- /// .set_primary_key_flags(KeyFlags::empty().set_signing(true))
+ /// .set_primary_key_flags(KeyFlags::empty().set_signing())
/// .generate()?;
///
/// // Observe that the primary key's certification capability is
/// // set implicitly.
/// assert_eq!(cert.with_policy(p, None)?.primary_key().key_flags(),
- /// Some(KeyFlags::empty().set_signing(true).set_certification(true)));
+ /// Some(KeyFlags::empty().set_signing().set_certification()));
/// # Ok(()) }
/// ```
pub fn set_primary_key_flags(mut self, flags: KeyFlags) -> Self {
@@ -920,7 +920,7 @@ impl CertBuilder {
// make sure the primary key can sign subkeys
if !self.subkeys.is_empty() {
- self.primary.flags = self.primary.flags.set_certification(true);
+ self.primary.flags = self.primary.flags.set_certification();
}
// Generate & self-sign primary key.
@@ -1034,7 +1034,7 @@ impl CertBuilder {
{
let mut key = self.primary.ciphersuite
.unwrap_or(self.ciphersuite)
- .generate_key(&KeyFlags::default().set_certification(true))?;
+ .generate_key(&KeyFlags::default().set_certification())?;
key.set_creation_time(creation_time)?;
let mut sig = signature::SignatureBuilder::new(SignatureType::DirectKey)
// GnuPG wants at least a 512-bit hash for P521 keys.
@@ -1166,7 +1166,7 @@ mod tests {
let (cert1, _) = CertBuilder::new()
.set_cipher_suite(CipherSuite::Cv25519)
.set_primary_key_flags(KeyFlags::default())
- .add_subkey(KeyFlags::default().set_certification(true), None, None)
+ .add_subkey(KeyFlags::default().set_certification(), None, None)
.generate().unwrap();
let sig_pkts = cert1.subkeys().next().unwrap().bundle().self_signatures[0].hashed_area();
@@ -1237,9 +1237,9 @@ mod tests {
let (cert,_) = CertBuilder::new()
.set_creation_time(now)
.set_expiration_time(now + 600 * s)
- .add_subkey(KeyFlags::default().set_signing(true),
+ .add_subkey(KeyFlags::default().set_signing(),
now + 300 * s, None)
- .add_subkey(KeyFlags::default().set_authentication(true),
+ .add_subkey(KeyFlags::default().set_authentication(),
None, None)
.generate().unwrap();