summaryrefslogtreecommitdiffstats
path: root/openpgp/src/parse.rs
diff options
context:
space:
mode:
authorNora Widdecke <nora@sequoia-pgp.org>2021-11-22 16:18:48 +0100
committerNora Widdecke <nora@sequoia-pgp.org>2021-11-29 11:53:55 +0100
commit8b272c162ce443e26c89afbda6fe4e06dd366118 (patch)
treef9f49ae3f222f8b307861a67056154ffd55fff55 /openpgp/src/parse.rs
parent0b7bff7337dd94422faf0a3172180ec8c28b1545 (diff)
Remove unnecessary slicing.
- Found by clippy::redundant_slicing.
Diffstat (limited to 'openpgp/src/parse.rs')
-rw-r--r--openpgp/src/parse.rs10
1 files changed, 5 insertions, 5 deletions
diff --git a/openpgp/src/parse.rs b/openpgp/src/parse.rs
index 0fb5ccae..ede6d182 100644
--- a/openpgp/src/parse.rs
+++ b/openpgp/src/parse.rs
@@ -2512,7 +2512,7 @@ fn literal_parser_test () {
let expected = crate::tests::manifesto();
- assert_eq!(&content[..], &expected[..]);
+ assert_eq!(&content[..], expected);
} else {
panic!("Wrong packet!");
}
@@ -2762,7 +2762,7 @@ fn skesk_parser_test() {
match skesk.decrypt(&test.password) {
Ok((_sym_algo, key)) => {
let key = crate::fmt::to_hex(&key[..], false);
- assert_eq!(&key[..], &test.key_hex[..]);
+ assert_eq!(&key[..], test.key_hex);
}
Err(e) => {
panic!("No session key, got: {:?}", e);
@@ -5862,7 +5862,7 @@ mod test {
// that we don't try to recover.
let mut msg2 = Vec::new();
msg2.push(0);
- msg2.extend_from_slice(&msg[..]);
+ msg2.extend_from_slice(msg);
let ppr = PacketParserBuilder::from_bytes(&msg2[..]).unwrap()
.dearmor(packet_parser_builder::Dearmor::Disabled)
@@ -5873,8 +5873,8 @@ mod test {
/// Issue #141.
#[test]
fn truncated_packet() {
- for msg in &[&crate::tests::message("literal-mode-b.gpg")[..],
- &crate::tests::message("literal-mode-t-partial-body.gpg")[..],
+ for msg in &[crate::tests::message("literal-mode-b.gpg"),
+ crate::tests::message("literal-mode-t-partial-body.gpg"),
] {
// Make sure we can read the first packet.
let ppr = PacketParserBuilder::from_bytes(msg).unwrap()