summaryrefslogtreecommitdiffstats
path: root/tool/src/commands
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2020-04-16 11:58:32 +0200
committerJustus Winter <justus@sequoia-pgp.org>2020-04-16 11:58:32 +0200
commit350320a32ce569d3e86352ba5a79ee969e9595af (patch)
tree87fe70395f62566d7d7e0cef3e93d62f6288a4e4 /tool/src/commands
parente1ae4a79ada96a97f604d3f3f172b9b02a6da8bb (diff)
Revert "openpgp: Make PacketParserResult a std::result::Result."
Diffstat (limited to 'tool/src/commands')
-rw-r--r--tool/src/commands/decrypt.rs5
-rw-r--r--tool/src/commands/dump.rs6
-rw-r--r--tool/src/commands/inspect.rs6
-rw-r--r--tool/src/commands/mod.rs6
-rw-r--r--tool/src/commands/sign.rs7
5 files changed, 16 insertions, 14 deletions
diff --git a/tool/src/commands/decrypt.rs b/tool/src/commands/decrypt.rs
index 52778cdb..8a1a0f78 100644
--- a/tool/src/commands/decrypt.rs
+++ b/tool/src/commands/decrypt.rs
@@ -15,7 +15,8 @@ use crate::openpgp::packet::prelude::*;
use crate::openpgp::parse::{
Parse,
PacketParser,
- };
+ PacketParserResult,
+};
use crate::openpgp::parse::stream::{
VerificationHelper, DecryptionHelper, Decryptor, MessageStructure,
};
@@ -313,7 +314,7 @@ pub fn decrypt_unwrap(ctx: &Context, policy: &dyn Policy,
let mut pkesks: Vec<packet::PKESK> = Vec::new();
let mut skesks: Vec<packet::SKESK> = Vec::new();
- while let Ok(mut pp) = ppr {
+ while let PacketParserResult::Some(mut pp) = ppr {
let sym_algo_hint = if let Packet::AED(ref aed) = pp.packet {
Some(aed.symmetric_algo())
} else {
diff --git a/tool/src/commands/dump.rs b/tool/src/commands/dump.rs
index 8156f853..53c84fd6 100644
--- a/tool/src/commands/dump.rs
+++ b/tool/src/commands/dump.rs
@@ -10,7 +10,7 @@ use self::openpgp::packet::header::CTB;
use self::openpgp::packet::{Header, header::BodyLength, Signature};
use self::openpgp::packet::signature::subpacket::{Subpacket, SubpacketValue};
use self::openpgp::crypto::{SessionKey, S2K};
-use self::openpgp::parse::{map::Map, Parse};
+use self::openpgp::parse::{map::Map, Parse, PacketParserResult};
#[derive(Debug)]
pub enum Kind {
@@ -65,7 +65,7 @@ pub fn dump<W>(input: &mut dyn io::Read, output: &mut dyn io::Write,
let width = width.into().unwrap_or(80);
let mut dumper = PacketDumper::new(width, mpis);
- while let Ok(mut pp) = ppr {
+ while let PacketParserResult::Some(mut pp) = ppr {
let additional_fields = match pp.packet {
Packet::Literal(_) => {
let mut prefix = vec![0; 40];
@@ -147,7 +147,7 @@ pub fn dump<W>(input: &mut dyn io::Read, output: &mut dyn io::Write,
dumper.flush(output)?;
- if let Err(eof) = ppr {
+ if let PacketParserResult::EOF(eof) = ppr {
if eof.is_message().is_ok() {
Ok(Kind::Message {
encrypted: message_encrypted,
diff --git a/tool/src/commands/inspect.rs b/tool/src/commands/inspect.rs
index ff0b2571..43e3d262 100644
--- a/tool/src/commands/inspect.rs
+++ b/tool/src/commands/inspect.rs
@@ -6,7 +6,7 @@ extern crate sequoia_openpgp as openpgp;
use crate::openpgp::{Packet, Result};
use crate::openpgp::cert::prelude::*;
use openpgp::packet::key::PublicParts;
-use crate::openpgp::parse::Parse;
+use crate::openpgp::parse::{Parse, PacketParserResult};
use crate::openpgp::policy::Policy;
use super::dump::Convert;
@@ -30,7 +30,7 @@ pub fn inspect(m: &clap::ArgMatches, policy: &dyn Policy, output: &mut dyn io::W
let mut ppr =
openpgp::parse::PacketParser::from_reader(crate::open_or_stdin(input)?)?;
- while let Ok(mut pp) = ppr {
+ while let PacketParserResult::Some(mut pp) = ppr {
match pp.packet {
Packet::PublicKey(_) | Packet::SecretKey(_) => {
if pp.possible_cert().is_err()
@@ -73,7 +73,7 @@ pub fn inspect(m: &clap::ArgMatches, policy: &dyn Policy, output: &mut dyn io::W
}
}
- if let Err(eof) = ppr {
+ if let PacketParserResult::EOF(eof) = ppr {
let is_message = eof.is_message();
let is_cert = eof.is_cert();
let is_keyring = eof.is_keyring();
diff --git a/tool/src/commands/mod.rs b/tool/src/commands/mod.rs
index 71f7aa85..fa8ed857 100644
--- a/tool/src/commands/mod.rs
+++ b/tool/src/commands/mod.rs
@@ -426,7 +426,7 @@ pub fn split(input: &mut dyn io::Read, prefix: &str)
// This encodes our position in the tree.
let mut pos = vec![0];
- while let Ok(pp) = ppr {
+ while let PacketParserResult::Some(pp) = ppr {
if let Some(ref map) = pp.map() {
let filename = format!(
"{}{}--{}{:?}", prefix,
@@ -445,7 +445,7 @@ pub fn split(input: &mut dyn io::Read, prefix: &str)
let old_depth = Some(pp.recursion_depth());
ppr = pp.recurse()?.1;
- let new_depth = ppr.as_ref().ok().map(|pp| pp.recursion_depth());
+ let new_depth = ppr.as_ref().map(|pp| pp.recursion_depth());
// Update pos.
match old_depth.cmp(&new_depth) {
@@ -468,7 +468,7 @@ pub fn join(inputs: Option<clap::Values>, output: &mut dyn io::Write)
/// OUTPUT.
fn copy(mut ppr: PacketParserResult, output: &mut dyn io::Write)
-> Result<()> {
- while let Ok(pp) = ppr {
+ while let PacketParserResult::Some(pp) = ppr {
// We (ab)use the mapping feature to create byte-accurate
// copies.
for field in pp.map().expect("must be mapped").iter() {
diff --git a/tool/src/commands/sign.rs b/tool/src/commands/sign.rs
index 3996a3ba..9a8e6819 100644
--- a/tool/src/commands/sign.rs
+++ b/tool/src/commands/sign.rs
@@ -11,6 +11,7 @@ use crate::openpgp::{Packet, Result};
use crate::openpgp::packet::Signature;
use crate::openpgp::parse::{
Parse,
+ PacketParserResult,
};
use crate::openpgp::serialize::Serialize;
use crate::openpgp::serialize::stream::{
@@ -52,7 +53,7 @@ fn sign_data(policy: &dyn Policy,
let mut ppr =
openpgp::parse::PacketParser::from_file(output_path.unwrap())?;
- while let Ok(pp) = ppr {
+ while let PacketParserResult::Some(pp) = ppr {
let (packet, ppr_tmp) = pp.recurse()?;
ppr = ppr_tmp;
@@ -197,7 +198,7 @@ fn sign_message_(policy: &dyn Policy,
State::AfterFirstSigGroup
};
- while let Ok(mut pp) = ppr {
+ while let PacketParserResult::Some(mut pp) = ppr {
if let Err(err) = pp.possible_message() {
return Err(err.context("Malformed OpenPGP message").into());
}
@@ -329,7 +330,7 @@ fn sign_message_(policy: &dyn Policy,
}
}
- if let Err(eof) = ppr {
+ if let PacketParserResult::EOF(eof) = ppr {
if let Err(err) = eof.is_message() {
return Err(err.context("Malformed OpenPGP message").into());
}