diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2021-01-12 10:28:25 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2021-01-12 10:28:25 +0100 |
commit | fa63210fc1bb58a3a874fd0110ca7585eb2c0483 (patch) | |
tree | 7c3e099e97edfa4ebff4570c3c9eb7afa8f0e4da | |
parent | 7949364d690e6c93f7f6c23555e5ee395187d10e (diff) |
openpgp: Simplify certificate serialization.
-rw-r--r-- | openpgp/src/serialize/cert.rs | 220 |
1 files changed, 20 insertions, 200 deletions
diff --git a/openpgp/src/serialize/cert.rs b/openpgp/src/serialize/cert.rs index 73d9a07f..ab57457d 100644 --- a/openpgp/src/serialize/cert.rs +++ b/openpgp/src/serialize/cert.rs @@ -49,16 +49,7 @@ impl Cert { Ok(()) }; - for s in primary.self_revocations() { - serialize_sig(o, s)?; - } - for s in primary.self_signatures() { - serialize_sig(o, s)?; - } - for s in primary.certifications() { - serialize_sig(o, s)?; - } - for s in primary.other_revocations() { + for s in primary.signatures() { serialize_sig(o, s)?; } @@ -71,16 +62,7 @@ impl Cert { } PacketRef::UserID(u.userid()).serialize(o)?; - for s in u.self_revocations() { - serialize_sig(o, s)?; - } - for s in u.self_signatures() { - serialize_sig(o, s)?; - } - for s in u.certifications() { - serialize_sig(o, s)?; - } - for s in u.other_revocations() { + for s in u.signatures() { serialize_sig(o, s)?; } } @@ -94,16 +76,7 @@ impl Cert { } PacketRef::UserAttribute(u.user_attribute()).serialize(o)?; - for s in u.self_revocations() { - serialize_sig(o, s)?; - } - for s in u.self_signatures() { - serialize_sig(o, s)?; - } - for s in u.certifications() { - serialize_sig(o, s)?; - } - for s in u.other_revocations() { + for s in u.signatures() { serialize_sig(o, s)?; } } @@ -117,16 +90,7 @@ impl Cert { } PacketRef::PublicSubkey(k.key()).serialize(o)?; - for s in k.self_revocations() { - serialize_sig(o, s)?; - } - for s in k.self_signatures() { - serialize_sig(o, s)?; - } - for s in k.certifications() { - serialize_sig(o, s)?; - } - for s in k.other_revocations() { + for s in k.signatures() { serialize_sig(o, s)?; } } @@ -141,16 +105,7 @@ impl Cert { PacketRef::Unknown(u.unknown()).serialize(o)?; - for s in u.self_revocations() { - serialize_sig(o, s)?; - } - for s in u.self_signatures() { - serialize_sig(o, s)?; - } - for s in u.certifications() { - serialize_sig(o, s)?; - } - for s in u.other_revocations() { + for s in u.signatures() { serialize_sig(o, s)?; } } @@ -184,32 +139,14 @@ impl MarshalInto for Cert { let primary = self.primary_key(); l += PacketRef::PublicKey(primary.key()).serialized_len(); - for s in primary.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in primary.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in primary.certifications() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in primary.other_revocations() { + for s in primary.signatures() { l += PacketRef::Signature(s).serialized_len(); } for u in self.userids() { l += PacketRef::UserID(u.userid()).serialized_len(); - for s in u.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.certifications() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.other_revocations() { + for s in u.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -217,16 +154,7 @@ impl MarshalInto for Cert { for u in self.user_attributes() { l += PacketRef::UserAttribute(u.user_attribute()).serialized_len(); - for s in u.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.certifications() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.other_revocations() { + for s in u.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -234,16 +162,7 @@ impl MarshalInto for Cert { for k in self.subkeys() { l += PacketRef::PublicSubkey(k.key()).serialized_len(); - for s in k.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in k.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in k.certifications() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in k.other_revocations() { + for s in k.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -251,16 +170,7 @@ impl MarshalInto for Cert { for u in self.unknowns() { l += PacketRef::Unknown(u.unknown()).serialized_len(); - for s in u.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.certifications() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.other_revocations() { + for s in u.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -532,16 +442,7 @@ impl<'a> TSK<'a> { serialize_key(o, primary.key().into(), Tag::PublicKey, Tag::SecretKey)?; - for s in primary.self_signatures() { - serialize_sig(o, s)?; - } - for s in primary.self_revocations() { - serialize_sig(o, s)?; - } - for s in primary.certifications() { - serialize_sig(o, s)?; - } - for s in primary.other_revocations() { + for s in primary.signatures() { serialize_sig(o, s)?; } @@ -554,16 +455,7 @@ impl<'a> TSK<'a> { } PacketRef::UserID(u.userid()).serialize(o)?; - for s in u.self_revocations() { - serialize_sig(o, s)?; - } - for s in u.self_signatures() { - serialize_sig(o, s)?; - } - for s in u.certifications() { - serialize_sig(o, s)?; - } - for s in u.other_revocations() { + for s in u.signatures() { serialize_sig(o, s)?; } } @@ -577,16 +469,7 @@ impl<'a> TSK<'a> { } PacketRef::UserAttribute(u.user_attribute()).serialize(o)?; - for s in u.self_revocations() { - serialize_sig(o, s)?; - } - for s in u.self_signatures() { - serialize_sig(o, s)?; - } - for s in u.certifications() { - serialize_sig(o, s)?; - } - for s in u.other_revocations() { + for s in u.signatures() { serialize_sig(o, s)?; } } @@ -601,16 +484,7 @@ impl<'a> TSK<'a> { serialize_key(o, k.key().into(), Tag::PublicSubkey, Tag::SecretSubkey)?; - for s in k.self_revocations() { - serialize_sig(o, s)?; - } - for s in k.self_signatures() { - serialize_sig(o, s)?; - } - for s in k.certifications() { - serialize_sig(o, s)?; - } - for s in k.other_revocations() { + for s in k.signatures() { serialize_sig(o, s)?; } } @@ -625,16 +499,7 @@ impl<'a> TSK<'a> { PacketRef::Unknown(&u.unknown()).serialize(o)?; - for s in u.self_revocations() { - serialize_sig(o, s)?; - } - for s in u.self_signatures() { - serialize_sig(o, s)?; - } - for s in u.certifications() { - serialize_sig(o, s)?; - } - for s in u.other_revocations() { + for s in u.signatures() { serialize_sig(o, s)?; } } @@ -702,32 +567,14 @@ impl<'a> MarshalInto for TSK<'a> { l += serialized_len_key(primary.key().into(), Tag::PublicKey, Tag::SecretKey); - for s in primary.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in primary.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in primary.other_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in primary.certifications() { + for s in primary.signatures() { l += PacketRef::Signature(s).serialized_len(); } for u in self.cert.userids() { l += PacketRef::UserID(u.userid()).serialized_len(); - for s in u.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.other_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.certifications() { + for s in u.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -735,16 +582,7 @@ impl<'a> MarshalInto for TSK<'a> { for u in self.cert.user_attributes() { l += PacketRef::UserAttribute(u.user_attribute()).serialized_len(); - for s in u.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.other_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.certifications() { + for s in u.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -753,16 +591,7 @@ impl<'a> MarshalInto for TSK<'a> { l += serialized_len_key(k.key().into(), Tag::PublicSubkey, Tag::SecretSubkey); - for s in k.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in k.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in k.other_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in k.certifications() { + for s in k.signatures() { l += PacketRef::Signature(s).serialized_len(); } } @@ -770,16 +599,7 @@ impl<'a> MarshalInto for TSK<'a> { for u in self.cert.unknowns() { l += PacketRef::Unknown(u.unknown()).serialized_len(); - for s in u.self_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.self_signatures() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.other_revocations() { - l += PacketRef::Signature(s).serialized_len(); - } - for s in u.certifications() { + for s in u.signatures() { l += PacketRef::Signature(s).serialized_len(); } } |