diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2021-03-02 11:08:04 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2021-03-02 11:19:31 +0100 |
commit | f82d3e9a4d2e324405a1c115b3666d977567d377 (patch) | |
tree | 5135c874adefb9ce47d6989b8c026c903ac4a2ce /guide | |
parent | 79917186967a0c784d4fa8515aed99e3360ec7bf (diff) |
openpgp, autocrypt, guide: Make tests more robust.
- Use a more stable formatting when comparing fingerprints.
Diffstat (limited to 'guide')
-rw-r--r-- | guide/src/chapter_03.md | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/guide/src/chapter_03.md b/guide/src/chapter_03.md index fac026b8..e73e90fd 100644 --- a/guide/src/chapter_03.md +++ b/guide/src/chapter_03.md @@ -43,8 +43,8 @@ const KEY: &str = fn main() -> openpgp::Result<()> { let cert = openpgp::Cert::from_bytes(KEY.as_bytes())?; - assert_eq!(cert.fingerprint().to_string(), - "C087 4478 A65C 540A 1F73 72B4 A22E AD61 4D11 744A"); + assert_eq!(cert.fingerprint().to_hex(), + "C0874478A65C540A1F7372B4A22EAD614D11744A"); // Iterate over UserIDs. assert_eq!(cert.userids().count(), 1); @@ -52,10 +52,10 @@ fn main() -> openpgp::Result<()> { // Iterate over subkeys. assert_eq!(cert.keys().subkeys().count(), 2); - assert_eq!(cert.keys().subkeys().nth(0).unwrap().key().fingerprint().to_string(), - "67A4 8753 A380 A6B3 B7DF 7DC5 E6C6 897A 4CEF 8924"); - assert_eq!(cert.keys().subkeys().nth(1).unwrap().key().fingerprint().to_string(), - "185C DAA1 2723 0423 19E4 7F67 108F 2CAF 9034 356D"); + assert_eq!(cert.keys().subkeys().nth(0).unwrap().key().fingerprint().to_hex(), + "67A48753A380A6B3B7DF7DC5E6C6897A4CEF8924"); + assert_eq!(cert.keys().subkeys().nth(1).unwrap().key().fingerprint().to_hex(), + "185CDAA12723042319E47F67108F2CAF9034356D"); Ok(()) } @@ -132,7 +132,7 @@ fn main() -> openpgp::Result<()> { // First, we expect an one pass signature packet. if let openpgp::Packet::OnePassSig(ref ops) = packets[0] { - assert_eq!(ops.issuer().to_string(), "E6C6 897A 4CEF 8924"); + assert_eq!(ops.issuer().to_hex(), "E6C6897A4CEF8924"); } else { panic!("expected one pass signature packet"); } @@ -146,8 +146,8 @@ fn main() -> openpgp::Result<()> { // Finally, we expect the signature itself. if let openpgp::Packet::Signature(ref signature) = packets[2] { - assert_eq!(signature.issuer_fingerprints().nth(0).unwrap().to_string(), - "67A4 8753 A380 A6B3 B7DF 7DC5 E6C6 897A 4CEF 8924"); + assert_eq!(signature.issuer_fingerprints().nth(0).unwrap().to_hex(), + "67A48753A380A6B3B7DF7DC5E6C6897A4CEF8924"); } else { panic!("expected signature packet"); } |