refactor(e2ee): rename dc_e2ee -> e2ee

This commit is contained in:
dignifiedquire
2019-08-26 22:28:42 +02:00
committed by holger krekel
parent 3944592c09
commit 1a1f0c0a7c
8 changed files with 18 additions and 17 deletions

View File

@@ -2,9 +2,9 @@ use percent_encoding::{utf8_percent_encode, NON_ALPHANUMERIC};
use crate::constants::Event; use crate::constants::Event;
use crate::context::Context; use crate::context::Context;
use crate::dc_e2ee::*;
use crate::dc_loginparam::*; use crate::dc_loginparam::*;
use crate::dc_tools::*; use crate::dc_tools::*;
use crate::e2ee;
use crate::imap::*; use crate::imap::*;
use crate::job::*; use crate::job::*;
use crate::oauth2::*; use crate::oauth2::*;
@@ -589,7 +589,7 @@ pub unsafe fn dc_job_do_DC_JOB_CONFIGURE_IMAP(context: &Context, _job: &Job) {
.ok(); .ok();
if !s.shall_stop_ongoing { if !s.shall_stop_ongoing {
progress!(context, 920); progress!(context, 920);
dc_ensure_secret_key_exists(context); e2ee::ensure_secret_key_exists(context);
success = true; success = true;
info!( info!(
context, context,

View File

@@ -7,9 +7,9 @@ use crate::aheader::EncryptPreference;
use crate::config::Config; use crate::config::Config;
use crate::constants::*; use crate::constants::*;
use crate::context::Context; use crate::context::Context;
use crate::dc_e2ee::*;
use crate::dc_loginparam::*; use crate::dc_loginparam::*;
use crate::dc_tools::*; use crate::dc_tools::*;
use crate::e2ee;
use crate::error::Result; use crate::error::Result;
use crate::key::*; use crate::key::*;
use crate::message::MessageState; use crate::message::MessageState;
@@ -603,7 +603,7 @@ impl<'a> Contact<'a> {
}); });
ret += &p; ret += &p;
if self_key.is_none() { if self_key.is_none() {
dc_ensure_secret_key_exists(context)?; e2ee::ensure_secret_key_exists(context)?;
self_key = Key::from_self_public(context, &loginparam.addr, &context.sql); self_key = Key::from_self_public(context, &loginparam.addr, &context.sql);
} }
let p = context.stock_str(StockMessage::FingerPrints); let p = context.stock_str(StockMessage::FingerPrints);

View File

@@ -11,8 +11,8 @@ use crate::config::Config;
use crate::configure::*; use crate::configure::*;
use crate::constants::*; use crate::constants::*;
use crate::context::Context; use crate::context::Context;
use crate::dc_e2ee::*;
use crate::dc_tools::*; use crate::dc_tools::*;
use crate::e2ee;
use crate::error::*; use crate::error::*;
use crate::job::*; use crate::job::*;
use crate::key::*; use crate::key::*;
@@ -196,7 +196,7 @@ pub fn dc_render_setup_file(context: &Context, passphrase: &str) -> Result<Strin
passphrase.len() >= 2, passphrase.len() >= 2,
"Passphrase must be at least 2 chars long." "Passphrase must be at least 2 chars long."
); );
let self_addr = dc_ensure_secret_key_exists(context)?; let self_addr = e2ee::ensure_secret_key_exists(context)?;
let private_key = Key::from_self_private(context, self_addr, &context.sql) let private_key = Key::from_self_private(context, self_addr, &context.sql)
.ok_or(format_err!("Failed to get private key."))?; .ok_or(format_err!("Failed to get private key."))?;
let ac_headers = match context let ac_headers = match context
@@ -522,7 +522,7 @@ pub unsafe fn dc_job_do_DC_JOB_IMEX_IMAP(context: &Context, job: &Job) {
} else { } else {
if what == 1 || what == 11 { if what == 1 || what == 11 {
/* before we export anything, make sure the private key exists */ /* before we export anything, make sure the private key exists */
if dc_ensure_secret_key_exists(context).is_err() { if e2ee::ensure_secret_key_exists(context).is_err() {
error!( error!(
context, context,
0, 0,

View File

@@ -15,9 +15,9 @@ use crate::chat::{self, Chat};
use crate::constants::*; use crate::constants::*;
use crate::contact::*; use crate::contact::*;
use crate::context::{dc_get_version_str, Context}; use crate::context::{dc_get_version_str, Context};
use crate::dc_e2ee::*;
use crate::dc_strencode::*; use crate::dc_strencode::*;
use crate::dc_tools::*; use crate::dc_tools::*;
use crate::e2ee::*;
use crate::error::Error; use crate::error::Error;
use crate::location; use crate::location;
use crate::message::*; use crate::message::*;

View File

@@ -15,10 +15,10 @@ use mmime::other::*;
use crate::constants::Viewtype; use crate::constants::Viewtype;
use crate::contact::*; use crate::contact::*;
use crate::context::Context; use crate::context::Context;
use crate::dc_e2ee::*;
use crate::dc_simplify::*; use crate::dc_simplify::*;
use crate::dc_strencode::*; use crate::dc_strencode::*;
use crate::dc_tools::*; use crate::dc_tools::*;
use crate::e2ee::*;
use crate::location; use crate::location;
use crate::param::*; use crate::param::*;
use crate::stock::StockMessage; use crate::stock::StockMessage;
@@ -137,7 +137,8 @@ pub unsafe fn dc_mimeparser_parse<'a>(context: &'a Context, body: &[u8]) -> dc_m
mimeparser mimeparser
.e2ee_helper .e2ee_helper
.decrypt(mimeparser.context, mimeparser.mimeroot); .decrypt(mimeparser.context, mimeparser.mimeroot);
dc_mimeparser_parse_mime_recursive(&mut mimeparser, mimeparser.mimeroot); let mimeparser_ref = &mut mimeparser;
dc_mimeparser_parse_mime_recursive(mimeparser_ref, mimeparser_ref.mimeroot);
let field: *mut mailimf_field = dc_mimeparser_lookup_field(&mimeparser, "Subject"); let field: *mut mailimf_field = dc_mimeparser_lookup_field(&mimeparser, "Subject");
if !field.is_null() && (*field).fld_type == MAILIMF_FIELD_SUBJECT as libc::c_int { if !field.is_null() && (*field).fld_type == MAILIMF_FIELD_SUBJECT as libc::c_int {
mimeparser.subject = dc_decode_header_words((*(*field).fld_data.fld_subject).sbj_value) mimeparser.subject = dc_decode_header_words((*(*field).fld_data.fld_subject).sbj_value)

View File

@@ -8,10 +8,10 @@ use crate::configure::*;
use crate::constants::*; use crate::constants::*;
use crate::contact::*; use crate::contact::*;
use crate::context::Context; use crate::context::Context;
use crate::dc_e2ee::*;
use crate::dc_mimeparser::*; use crate::dc_mimeparser::*;
use crate::dc_token::*; use crate::dc_token::*;
use crate::dc_tools::*; use crate::dc_tools::*;
use crate::e2ee::*;
use crate::key::*; use crate::key::*;
use crate::lot::LotState; use crate::lot::LotState;
use crate::message::*; use crate::message::*;
@@ -34,7 +34,7 @@ pub unsafe fn dc_get_securejoin_qr(
let mut fingerprint = ptr::null_mut(); let mut fingerprint = ptr::null_mut();
let mut qr: Option<String> = None; let mut qr: Option<String> = None;
dc_ensure_secret_key_exists(context).ok(); ensure_secret_key_exists(context).ok();
let invitenumber = dc_token_lookup(context, DC_TOKEN_INVITENUMBER, group_chat_id) let invitenumber = dc_token_lookup(context, DC_TOKEN_INVITENUMBER, group_chat_id)
.unwrap_or_else(|| { .unwrap_or_else(|| {
let invitenumber_s = dc_create_id(); let invitenumber_s = dc_create_id();
@@ -142,7 +142,7 @@ pub unsafe fn dc_join_securejoin(context: &Context, qr: *const libc::c_char) ->
let mut join_vg: libc::c_int = 0i32; let mut join_vg: libc::c_int = 0i32;
info!(context, 0, "Requesting secure-join ...",); info!(context, 0, "Requesting secure-join ...",);
dc_ensure_secret_key_exists(context).ok(); ensure_secret_key_exists(context).ok();
ongoing_allocated = dc_alloc_ongoing(context); ongoing_allocated = dc_alloc_ongoing(context);
if !(ongoing_allocated == 0i32) { if !(ongoing_allocated == 0i32) {

View File

@@ -1025,7 +1025,7 @@ unsafe fn contains_report(mime: *mut mailmime) -> bool {
/// ///
/// If this succeeds you are also guaranteed that the /// If this succeeds you are also guaranteed that the
/// [Config::ConfiguredAddr] is configured, this address is returned. /// [Config::ConfiguredAddr] is configured, this address is returned.
pub fn dc_ensure_secret_key_exists(context: &Context) -> Result<String> { pub fn ensure_secret_key_exists(context: &Context) -> Result<String> {
let self_addr = context let self_addr = context
.get_config(Config::ConfiguredAddr) .get_config(Config::ConfiguredAddr)
.ok_or(format_err!(concat!( .ok_or(format_err!(concat!(
@@ -1049,13 +1049,13 @@ mod tests {
fn test_prexisting() { fn test_prexisting() {
let t = dummy_context(); let t = dummy_context();
let test_addr = configure_alice_keypair(&t.ctx); let test_addr = configure_alice_keypair(&t.ctx);
assert_eq!(dc_ensure_secret_key_exists(&t.ctx).unwrap(), test_addr); assert_eq!(ensure_secret_key_exists(&t.ctx).unwrap(), test_addr);
} }
#[test] #[test]
fn test_not_configured() { fn test_not_configured() {
let t = dummy_context(); let t = dummy_context();
assert!(dc_ensure_secret_key_exists(&t.ctx).is_err()); assert!(ensure_secret_key_exists(&t.ctx).is_err());
} }
} }

View File

@@ -30,6 +30,7 @@ pub mod configure;
pub mod constants; pub mod constants;
pub mod contact; pub mod contact;
pub mod context; pub mod context;
mod e2ee;
mod imap; mod imap;
pub mod job; pub mod job;
mod job_thread; mod job_thread;
@@ -51,7 +52,6 @@ pub mod x;
pub mod dc_array; pub mod dc_array;
mod dc_dehtml; mod dc_dehtml;
mod dc_e2ee;
pub mod dc_imex; pub mod dc_imex;
mod dc_loginparam; mod dc_loginparam;
mod dc_mimefactory; mod dc_mimefactory;