summaryrefslogtreecommitdiffstats
path: root/sqv
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2018-12-05 14:15:10 +0100
committerJustus Winter <justus@sequoia-pgp.org>2018-12-05 14:15:10 +0100
commitb1abf63f5a4f446b187f80b5f48be1e7f3021386 (patch)
treee3784b4f4c40d336b2d20b59d2e7da916ccf5b29 /sqv
parentf54be56633d0d7bcaacbba0652d0b10e2696fdca (diff)
openpgp: Drop openpgp::Reader.
- Now that the packet parser transparently strips armor, this reader is no longer necessary.
Diffstat (limited to 'sqv')
-rw-r--r--sqv/src/sqv.rs6
1 files changed, 2 insertions, 4 deletions
diff --git a/sqv/src/sqv.rs b/sqv/src/sqv.rs
index 567f6427..963fcf1b 100644
--- a/sqv/src/sqv.rs
+++ b/sqv/src/sqv.rs
@@ -66,8 +66,7 @@ fn real_main() -> Result<(), failure::Error> {
// .unwrap() is safe, because "sig-file" is required.
let sig_file = matches.value_of_os("sig-file").unwrap();
- let mut ppr = PacketParser::from_reader(
- openpgp::Reader::from_file(sig_file)?)?;
+ let mut ppr = PacketParser::from_file(sig_file)?;
let mut sigs_seen = HashSet::new();
let mut sigs : Vec<(Signature, KeyID, Option<TPK>)> = Vec::new();
@@ -161,8 +160,7 @@ fn real_main() -> Result<(), failure::Error> {
.expect("No keyring specified.")
{
// Load the keyring.
- let tpks : Vec<TPK> = TPKParser::from_reader(
- openpgp::Reader::from_file(filename)?)?
+ let tpks : Vec<TPK> = TPKParser::from_file(filename)?
.unvalidated_tpk_filter(|tpk, _| {
for &(_, ref issuer, _) in &sigs {
if tpk_has_key(tpk, issuer) {