summaryrefslogtreecommitdiffstats
path: root/guide/src/chapter_02.md
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2019-11-22 14:26:14 +0100
committerJustus Winter <justus@sequoia-pgp.org>2019-11-22 14:26:14 +0100
commitced195eb1a7d9151640f1ffacd890839a55b8680 (patch)
tree53001af1ba91361bfa2ed4b585686781983c6603 /guide/src/chapter_02.md
parent28be944bd9f6548b2eee5fc222ffeb52c9d2f8aa (diff)
openpgp: Make conversions into Key<SecretParts, _> fallible.
- Fixes #380.
Diffstat (limited to 'guide/src/chapter_02.md')
-rw-r--r--guide/src/chapter_02.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/guide/src/chapter_02.md b/guide/src/chapter_02.md
index acc2cb2e..d2d11964 100644
--- a/guide/src/chapter_02.md
+++ b/guide/src/chapter_02.md
@@ -132,7 +132,7 @@ fn main() {
# .unwrap();
#
# // The secret key is not encrypted.
-# let mut pair = key.mark_parts_secret().into_keypair().unwrap();
+# let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
#
# pkesks[0].decrypt(&mut pair)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
@@ -275,7 +275,7 @@ fn generate() -> openpgp::Result<openpgp::TPK> {
# .unwrap();
#
# // The secret key is not encrypted.
-# let mut pair = key.mark_parts_secret().into_keypair().unwrap();
+# let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
#
# pkesks[0].decrypt(&mut pair)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
@@ -418,7 +418,7 @@ fn encrypt(sink: &mut Write, plaintext: &str, recipient: &openpgp::TPK)
# .unwrap();
#
# // The secret key is not encrypted.
-# let mut pair = key.mark_parts_secret().into_keypair().unwrap();
+# let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
#
# pkesks[0].decrypt(&mut pair)
# .and_then(|(algo, session_key)| decrypt(algo, &session_key))
@@ -575,7 +575,7 @@ impl<'a> DecryptionHelper for Helper<'a> {
.unwrap();
// The secret key is not encrypted.
- let mut pair = key.mark_parts_secret().into_keypair().unwrap();
+ let mut pair = key.mark_parts_secret().unwrap().into_keypair().unwrap();
pkesks[0].decrypt(&mut pair)
.and_then(|(algo, session_key)| decrypt(algo, &session_key))