summaryrefslogtreecommitdiffstats
path: root/sqv
diff options
context:
space:
mode:
authorAzul <azul@riseup.net>2020-11-28 10:20:37 +0100
committerAzul <azul@riseup.net>2020-12-01 16:23:26 +0100
commit5c0cd1775fadc46e68a24a5af3d1f06803d69c4b (patch)
tree27c9006288e21b2893258e7d7123894d1b8b8af3 /sqv
parentd40cd05ece363d49fad83f0d37b7f7a01090a585 (diff)
openpgp: take ownership of KeyFlags bitfield
- Make `generate_key` polymorphic over `AsRef<KeyFlags>`. - Since `set_key_flags` requires ownership of the key flags, it should take ownership rather than borrowing and cloning the them. See https://rust-lang.github.io/api-guidelines/flexibility.html#caller-decides-where-to-copy-and-place-data-c-caller-control . - See #616.
Diffstat (limited to 'sqv')
-rw-r--r--sqv/tests/revoked-key.rs8
1 files changed, 4 insertions, 4 deletions
diff --git a/sqv/tests/revoked-key.rs b/sqv/tests/revoked-key.rs
index 404092e1..fcc35f4f 100644
--- a/sqv/tests/revoked-key.rs
+++ b/sqv/tests/revoked-key.rs
@@ -315,7 +315,7 @@ fn create_key() {
// 1st direct key signature valid from t1 on
let mut b = signature::SignatureBuilder::new(SignatureType::DirectKey)
.set_features(&Features::sequoia()).unwrap()
- .set_key_flags(&KeyFlags::empty()
+ .set_key_flags(KeyFlags::empty()
.set_signing().set_certification()).unwrap()
.set_signature_creation_time(t1).unwrap()
.set_preferred_hash_algorithms(vec![HashAlgorithm::SHA512])
@@ -324,7 +324,7 @@ fn create_key() {
// 1st subkey binding signature valid from t_sk_binding on
b = signature::SignatureBuilder::new(SignatureType::SubkeyBinding)
- .set_key_flags(&KeyFlags::empty().set_signing()).unwrap()
+ .set_key_flags(KeyFlags::empty().set_signing()).unwrap()
.set_signature_creation_time(t_sk_binding).unwrap()
.set_embedded_signature(
signature::SignatureBuilder::new(SignatureType::PrimaryKeyBinding)
@@ -336,7 +336,7 @@ fn create_key() {
// 2nd direct key signature valid from t3 on
b = signature::SignatureBuilder::new(SignatureType::DirectKey)
.set_features(&Features::sequoia()).unwrap()
- .set_key_flags(&KeyFlags::empty()
+ .set_key_flags(KeyFlags::empty()
.set_signing().set_certification()).unwrap()
.set_signature_creation_time(t3).unwrap()
.set_preferred_hash_algorithms(vec![HashAlgorithm::SHA512])
@@ -345,7 +345,7 @@ fn create_key() {
// 2nd subkey binding signature valid from t3 on
let mut b = signature::SignatureBuilder::new(SignatureType::SubkeyBinding)
- .set_key_flags(&KeyFlags::empty().set_signing()).unwrap()
+ .set_key_flags(KeyFlags::empty().set_signing()).unwrap()
.set_signature_creation_time(t3).unwrap()
.set_embedded_signature(
signature::SignatureBuilder::new(SignatureType::PrimaryKeyBinding)