summaryrefslogtreecommitdiffstats
path: root/openpgp/src/cert.rs
diff options
context:
space:
mode:
authorNora Widdecke <nora@sequoia-pgp.org>2021-11-22 16:18:48 +0100
committerNora Widdecke <nora@sequoia-pgp.org>2021-11-29 11:53:55 +0100
commit8b272c162ce443e26c89afbda6fe4e06dd366118 (patch)
treef9f49ae3f222f8b307861a67056154ffd55fff55 /openpgp/src/cert.rs
parent0b7bff7337dd94422faf0a3172180ec8c28b1545 (diff)
Remove unnecessary slicing.
- Found by clippy::redundant_slicing.
Diffstat (limited to 'openpgp/src/cert.rs')
-rw-r--r--openpgp/src/cert.rs34
1 files changed, 17 insertions, 17 deletions
diff --git a/openpgp/src/cert.rs b/openpgp/src/cert.rs
index 3ab5ce65..d9f7decd 100644
--- a/openpgp/src/cert.rs
+++ b/openpgp/src/cert.rs
@@ -4097,8 +4097,8 @@ mod test {
// Keyring with two good keys
let mut combined = vec![];
- combined.extend_from_slice(&dkg[..]);
- combined.extend_from_slice(&dkg[..]);
+ combined.extend_from_slice(dkg);
+ combined.extend_from_slice(dkg);
let certs = CertParser::from_bytes(&combined[..]).unwrap()
.map(|certr| certr.is_ok())
.collect::<Vec<bool>>();
@@ -4106,8 +4106,8 @@ mod test {
// Keyring with a good key, and a bad key.
let mut combined = vec![];
- combined.extend_from_slice(&dkg[..]);
- combined.extend_from_slice(&lutz[..]);
+ combined.extend_from_slice(dkg);
+ combined.extend_from_slice(lutz);
let certs = CertParser::from_bytes(&combined[..]).unwrap()
.map(|certr| certr.is_ok())
.collect::<Vec<bool>>();
@@ -4115,8 +4115,8 @@ mod test {
// Keyring with a bad key, and a good key.
let mut combined = vec![];
- combined.extend_from_slice(&lutz[..]);
- combined.extend_from_slice(&dkg[..]);
+ combined.extend_from_slice(lutz);
+ combined.extend_from_slice(dkg);
let certs = CertParser::from_bytes(&combined[..]).unwrap()
.map(|certr| certr.is_ok())
.collect::<Vec<bool>>();
@@ -4124,9 +4124,9 @@ mod test {
// Keyring with a good key, a bad key, and a good key.
let mut combined = vec![];
- combined.extend_from_slice(&dkg[..]);
- combined.extend_from_slice(&lutz[..]);
- combined.extend_from_slice(&dkg[..]);
+ combined.extend_from_slice(dkg);
+ combined.extend_from_slice(lutz);
+ combined.extend_from_slice(dkg);
let certs = CertParser::from_bytes(&combined[..]).unwrap()
.map(|certr| certr.is_ok())
.collect::<Vec<bool>>();
@@ -4134,9 +4134,9 @@ mod test {
// Keyring with a good key, a bad key, and a bad key.
let mut combined = vec![];
- combined.extend_from_slice(&dkg[..]);
- combined.extend_from_slice(&lutz[..]);
- combined.extend_from_slice(&lutz[..]);
+ combined.extend_from_slice(dkg);
+ combined.extend_from_slice(lutz);
+ combined.extend_from_slice(lutz);
let certs = CertParser::from_bytes(&combined[..]).unwrap()
.map(|certr| certr.is_ok())
.collect::<Vec<bool>>();
@@ -4144,10 +4144,10 @@ mod test {
// Keyring with a good key, a bad key, a bad key, and a good key.
let mut combined = vec![];
- combined.extend_from_slice(&dkg[..]);
- combined.extend_from_slice(&lutz[..]);
- combined.extend_from_slice(&lutz[..]);
- combined.extend_from_slice(&dkg[..]);
+ combined.extend_from_slice(dkg);
+ combined.extend_from_slice(lutz);
+ combined.extend_from_slice(lutz);
+ combined.extend_from_slice(dkg);
let certs = CertParser::from_bytes(&combined[..]).unwrap()
.map(|certr| certr.is_ok())
.collect::<Vec<bool>>();
@@ -4208,7 +4208,7 @@ mod test {
let cert = Cert::from_bytes(crate::tests::key("already-revoked.pgp")).unwrap();
let rev = crate::tests::key("already-revoked.rev");
- let rev = PacketPile::from_reader(armor::Reader::new(&rev[..], None))
+ let rev = PacketPile::from_reader(armor::Reader::new(rev, None))
.unwrap();
let rev : Vec<Packet> = rev.into_children().collect();