diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2018-12-05 14:15:10 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2018-12-05 14:15:10 +0100 |
commit | b1abf63f5a4f446b187f80b5f48be1e7f3021386 (patch) | |
tree | e3784b4f4c40d336b2d20b59d2e7da916ccf5b29 /sqv | |
parent | f54be56633d0d7bcaacbba0652d0b10e2696fdca (diff) |
openpgp: Drop openpgp::Reader.
- Now that the packet parser transparently strips armor, this reader
is no longer necessary.
Diffstat (limited to 'sqv')
-rw-r--r-- | sqv/src/sqv.rs | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/sqv/src/sqv.rs b/sqv/src/sqv.rs index 567f6427..963fcf1b 100644 --- a/sqv/src/sqv.rs +++ b/sqv/src/sqv.rs @@ -66,8 +66,7 @@ fn real_main() -> Result<(), failure::Error> { // .unwrap() is safe, because "sig-file" is required. let sig_file = matches.value_of_os("sig-file").unwrap(); - let mut ppr = PacketParser::from_reader( - openpgp::Reader::from_file(sig_file)?)?; + let mut ppr = PacketParser::from_file(sig_file)?; let mut sigs_seen = HashSet::new(); let mut sigs : Vec<(Signature, KeyID, Option<TPK>)> = Vec::new(); @@ -161,8 +160,7 @@ fn real_main() -> Result<(), failure::Error> { .expect("No keyring specified.") { // Load the keyring. - let tpks : Vec<TPK> = TPKParser::from_reader( - openpgp::Reader::from_file(filename)?)? + let tpks : Vec<TPK> = TPKParser::from_file(filename)? .unvalidated_tpk_filter(|tpk, _| { for &(_, ref issuer, _) in &sigs { if tpk_has_key(tpk, issuer) { |