diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2019-11-22 14:26:14 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2019-11-22 14:26:14 +0100 |
commit | ced195eb1a7d9151640f1ffacd890839a55b8680 (patch) | |
tree | 53001af1ba91361bfa2ed4b585686781983c6603 /openpgp/src/serialize/stream.rs | |
parent | 28be944bd9f6548b2eee5fc222ffeb52c9d2f8aa (diff) |
openpgp: Make conversions into Key<SecretParts, _> fallible.
- Fixes #380.
Diffstat (limited to 'openpgp/src/serialize/stream.rs')
-rw-r--r-- | openpgp/src/serialize/stream.rs | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/openpgp/src/serialize/stream.rs b/openpgp/src/serialize/stream.rs index 4b1e0d88..5af424d3 100644 --- a/openpgp/src/serialize/stream.rs +++ b/openpgp/src/serialize/stream.rs @@ -230,7 +230,7 @@ impl<'a> Signer<'a> { /// # "../../tests/data/keys/testy-new-private.pgp")[..]) /// # .unwrap(); /// # let keypair = tsk.keys_valid().signing_capable().nth(0).unwrap().2 - /// # .clone().mark_parts_secret().into_keypair().unwrap(); + /// # .clone().mark_parts_secret().unwrap().into_keypair().unwrap(); /// # f(tsk, keypair).unwrap(); /// # fn f(tpk: TPK, mut signing_keypair: KeyPair<key::UnspecifiedRole>) /// # -> Result<()> { @@ -333,7 +333,7 @@ impl<'a> Signer<'a> { /// # "../../tests/data/keys/testy-new-private.pgp")[..]) /// # .unwrap(); /// # let keypair = tsk.keys_valid().signing_capable().nth(0).unwrap().2 - /// # .clone().mark_parts_secret().into_keypair().unwrap(); + /// # .clone().mark_parts_secret().unwrap().into_keypair().unwrap(); /// # f(tsk, keypair).unwrap(); /// # fn f(tpk: TPK, mut signing_keypair: KeyPair<key::UnspecifiedRole>) /// # -> Result<()> { @@ -1478,7 +1478,7 @@ mod test { let mut o = vec![]; { let mut signers = keys.iter().map(|(_, key)| { - key.clone().mark_parts_secret().into_keypair() + key.clone().mark_parts_secret().unwrap().into_keypair() .expect("expected unencrypted secret key") }).collect::<Vec<KeyPair<_>>>(); @@ -1678,7 +1678,8 @@ mod test { KeyFlags::default() .set_encrypt_for_transport(true)) .map(|(_, _, key)| key).next().unwrap() - .clone().mark_parts_secret().into_keypair().unwrap(); + .clone().mark_parts_secret().unwrap() + .into_keypair().unwrap(); pkesks[0].decrypt(&mut keypair) .and_then(|(algo, session_key)| decrypt(algo, &session_key)) .map(|_| None) |