diff options
author | Daniel Mueller <deso@posteo.net> | 2019-05-27 09:30:46 -0700 |
---|---|---|
committer | Daniel Mueller <deso@posteo.net> | 2019-05-27 09:30:46 -0700 |
commit | e6d89a69521db96e27d65d8284acfa81f0ff4b2d (patch) | |
tree | 7ee5e07c1ff46781db98cffe0adde603ec02b70c /nitrocli/src/commands.rs | |
parent | a00e3f75349dc5f48abf441fd4e5c369c2e2055a (diff) | |
download | nitrocli-e6d89a69521db96e27d65d8284acfa81f0ff4b2d.tar.gz nitrocli-e6d89a69521db96e27d65d8284acfa81f0ff4b2d.tar.bz2 |
Rename storage command to encrypted
This change is the last step in the process of restructuring the storage
command. In particular, now that functionality pertaining hidden volumes
has been moved out into a dedicated top-level command, it renames said
command to encrypted, because dealing with the encrypted volume is the
only functionality it provides.
Diffstat (limited to 'nitrocli/src/commands.rs')
-rw-r--r-- | nitrocli/src/commands.rs | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/nitrocli/src/commands.rs b/nitrocli/src/commands.rs index 6374611..0d30bca 100644 --- a/nitrocli/src/commands.rs +++ b/nitrocli/src/commands.rs @@ -362,7 +362,7 @@ pub fn reset(ctx: &mut args::ExecCtx<'_>) -> Result<()> { } /// Open the encrypted volume on the nitrokey. -pub fn storage_open(ctx: &mut args::ExecCtx<'_>) -> Result<()> { +pub fn encrypted_open(ctx: &mut args::ExecCtx<'_>) -> Result<()> { let device = get_storage_device(ctx)?; let pin_entry = pinentry::PinEntry::from(pinentry::PinType::User, &device)?; @@ -376,7 +376,7 @@ pub fn storage_open(ctx: &mut args::ExecCtx<'_>) -> Result<()> { } /// Close the previously opened encrypted volume. -pub fn storage_close(ctx: &mut args::ExecCtx<'_>) -> Result<()> { +pub fn encrypted_close(ctx: &mut args::ExecCtx<'_>) -> Result<()> { // Flush all filesystem caches to disk. We are mostly interested in // making sure that the encrypted volume on the nitrokey we are // about to close is not closed while not all data was written to |