summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--examples/guide-exploring-openpgp.rs4
-rw-r--r--openpgp/src/autocrypt.rs4
-rw-r--r--openpgp/src/crypto/hash.rs6
-rw-r--r--openpgp/src/serialize/tpk.rs44
-rw-r--r--openpgp/src/tpk/builder.rs2
-rw-r--r--openpgp/src/tpk/mod.rs74
-rw-r--r--openpgp/src/tpk/parser/low_level/grammar.lalrpop10
-rw-r--r--openpgp/src/tpk/parser/mod.rs6
8 files changed, 75 insertions, 75 deletions
diff --git a/examples/guide-exploring-openpgp.rs b/examples/guide-exploring-openpgp.rs
index bb7f4572..cff65378 100644
--- a/examples/guide-exploring-openpgp.rs
+++ b/examples/guide-exploring-openpgp.rs
@@ -55,7 +55,7 @@ fn main() {
for (i, u) in tpk.userids().enumerate() {
println!("{}: UID: {}, {} self-signature(s), {} certification(s)",
i, u.userid(),
- u.selfsigs().len(),
+ u.self_signatures().len(),
u.certifications().len());
}
@@ -63,7 +63,7 @@ fn main() {
for (i, s) in tpk.subkeys().enumerate() {
println!("{}: Fingerprint: {}, {} self-signature(s), {} certification(s)",
i, s.key().fingerprint(),
- s.selfsigs().len(),
+ s.self_signatures().len(),
s.certifications().len());
}
}
diff --git a/openpgp/src/autocrypt.rs b/openpgp/src/autocrypt.rs
index 6c1186ec..d849244c 100644
--- a/openpgp/src/autocrypt.rs
+++ b/openpgp/src/autocrypt.rs
@@ -121,7 +121,7 @@ impl AutocryptHeader {
let k : key::PublicSubkey = skb.key().clone();
acc.push(k.into());
- skb.selfsigs().iter().take(1)
+ skb.self_signatures().iter().take(1)
.for_each(|s| acc.push(s.clone().into()));
}
@@ -131,7 +131,7 @@ impl AutocryptHeader {
if let Ok(Some(a)) = uidb.userid().address() {
if &a == addr {
acc.push(uidb.userid().clone().into());
- uidb.selfsigs().iter().take(1)
+ uidb.self_signatures().iter().take(1)
.for_each(|s| acc.push(s.clone().into()));
} else {
// Address is not matching.
diff --git a/openpgp/src/crypto/hash.rs b/openpgp/src/crypto/hash.rs
index b7c19c9b..ba2e0545 100644
--- a/openpgp/src/crypto/hash.rs
+++ b/openpgp/src/crypto/hash.rs
@@ -460,7 +460,7 @@ mod test {
fn check(tpk: TPK) -> (usize, usize, usize) {
let mut userid_sigs = 0;
for (i, binding) in tpk.userids().enumerate() {
- for selfsig in binding.selfsigs() {
+ for selfsig in binding.self_signatures() {
let h = Signature::userid_binding_hash(
selfsig,
tpk.primary(),
@@ -476,7 +476,7 @@ mod test {
}
let mut ua_sigs = 0;
for (i, binding) in tpk.user_attributes().enumerate() {
- for selfsig in binding.selfsigs() {
+ for selfsig in binding.self_signatures() {
let h = Signature::user_attribute_binding_hash(
selfsig,
tpk.primary(),
@@ -492,7 +492,7 @@ mod test {
}
let mut subkey_sigs = 0;
for (i, binding) in tpk.subkeys().enumerate() {
- for selfsig in binding.selfsigs() {
+ for selfsig in binding.self_signatures() {
let h = Signature::subkey_binding_hash(
selfsig,
tpk.primary(),
diff --git a/openpgp/src/serialize/tpk.rs b/openpgp/src/serialize/tpk.rs
index 82b87c23..dd306031f 100644
--- a/openpgp/src/serialize/tpk.rs
+++ b/openpgp/src/serialize/tpk.rs
@@ -55,7 +55,7 @@ impl TPK {
}
for u in self.userids() {
- if export && ! u.selfsigs().iter().chain(u.self_revocations()).any(
+ if export && ! u.self_signatures().iter().chain(u.self_revocations()).any(
|s| s.exportable_certification().unwrap_or(true))
{
// No exportable selfsig on this component, skip it.
@@ -66,7 +66,7 @@ impl TPK {
for s in u.self_revocations() {
serialize_sig(o, s)?;
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
serialize_sig(o, s)?;
}
for s in u.other_revocations() {
@@ -78,7 +78,7 @@ impl TPK {
}
for u in self.user_attributes() {
- if export && ! u.selfsigs().iter().chain(u.self_revocations()).any(
+ if export && ! u.self_signatures().iter().chain(u.self_revocations()).any(
|s| s.exportable_certification().unwrap_or(true))
{
// No exportable selfsig on this component, skip it.
@@ -89,7 +89,7 @@ impl TPK {
for s in u.self_revocations() {
serialize_sig(o, s)?;
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
serialize_sig(o, s)?;
}
for s in u.other_revocations() {
@@ -101,7 +101,7 @@ impl TPK {
}
for k in self.subkeys() {
- if export && ! k.selfsigs().iter().chain(k.self_revocations()).any(
+ if export && ! k.self_signatures().iter().chain(k.self_revocations()).any(
|s| s.exportable_certification().unwrap_or(true))
{
// No exportable selfsig on this component, skip it.
@@ -112,7 +112,7 @@ impl TPK {
for s in k.self_revocations() {
serialize_sig(o, s)?;
}
- for s in k.selfsigs() {
+ for s in k.self_signatures() {
serialize_sig(o, s)?;
}
for s in k.other_revocations() {
@@ -136,7 +136,7 @@ impl TPK {
for s in u.self_revocations() {
serialize_sig(o, s)?;
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
serialize_sig(o, s)?;
}
for s in u.other_revocations() {
@@ -179,7 +179,7 @@ impl SerializeInto for TPK {
for s in u.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in u.other_revocations() {
@@ -196,7 +196,7 @@ impl SerializeInto for TPK {
for s in u.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in u.other_revocations() {
@@ -213,7 +213,7 @@ impl SerializeInto for TPK {
for s in k.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in k.selfsigs() {
+ for s in k.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in k.other_revocations() {
@@ -230,7 +230,7 @@ impl SerializeInto for TPK {
for s in u.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in u.other_revocations() {
@@ -400,7 +400,7 @@ impl<'a> TSK<'a> {
}
for u in self.tpk.userids() {
- if export && ! u.selfsigs().iter().chain(u.self_revocations()).any(
+ if export && ! u.self_signatures().iter().chain(u.self_revocations()).any(
|s| s.exportable_certification().unwrap_or(true))
{
// No exportable selfsig on this component, skip it.
@@ -411,7 +411,7 @@ impl<'a> TSK<'a> {
for s in u.self_revocations() {
serialize_sig(o, s)?;
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
serialize_sig(o, s)?;
}
for s in u.other_revocations() {
@@ -423,7 +423,7 @@ impl<'a> TSK<'a> {
}
for u in self.tpk.user_attributes() {
- if export && ! u.selfsigs().iter().chain(u.self_revocations()).any(
+ if export && ! u.self_signatures().iter().chain(u.self_revocations()).any(
|s| s.exportable_certification().unwrap_or(true))
{
// No exportable selfsig on this component, skip it.
@@ -434,7 +434,7 @@ impl<'a> TSK<'a> {
for s in u.self_revocations() {
serialize_sig(o, s)?;
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
serialize_sig(o, s)?;
}
for s in u.other_revocations() {
@@ -446,7 +446,7 @@ impl<'a> TSK<'a> {
}
for k in self.tpk.subkeys() {
- if export && ! k.selfsigs().iter().chain(k.self_revocations()).any(
+ if export && ! k.self_signatures().iter().chain(k.self_revocations()).any(
|s| s.exportable_certification().unwrap_or(true))
{
// No exportable selfsig on this component, skip it.
@@ -458,7 +458,7 @@ impl<'a> TSK<'a> {
for s in k.self_revocations() {
serialize_sig(o, s)?;
}
- for s in k.selfsigs() {
+ for s in k.self_signatures() {
serialize_sig(o, s)?;
}
for s in k.other_revocations() {
@@ -482,7 +482,7 @@ impl<'a> TSK<'a> {
for s in u.self_revocations() {
serialize_sig(o, s)?;
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
serialize_sig(o, s)?;
}
for s in u.other_revocations() {
@@ -558,7 +558,7 @@ impl<'a> SerializeInto for TSK<'a> {
for s in u.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in u.other_revocations() {
@@ -575,7 +575,7 @@ impl<'a> SerializeInto for TSK<'a> {
for s in u.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in u.other_revocations() {
@@ -593,7 +593,7 @@ impl<'a> SerializeInto for TSK<'a> {
for s in k.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in k.selfsigs() {
+ for s in k.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in k.other_revocations() {
@@ -610,7 +610,7 @@ impl<'a> SerializeInto for TSK<'a> {
for s in u.self_revocations() {
l += PacketRef::Signature(s).serialized_len();
}
- for s in u.selfsigs() {
+ for s in u.self_signatures() {
l += PacketRef::Signature(s).serialized_len();
}
for s in u.other_revocations() {
diff --git a/openpgp/src/tpk/builder.rs b/openpgp/src/tpk/builder.rs
index fff5663b..ceca009e 100644
--- a/openpgp/src/tpk/builder.rs
+++ b/openpgp/src/tpk/builder.rs
@@ -543,7 +543,7 @@ mod tests {
.primary_keyflags(KeyFlags::default())
.add_subkey(KeyFlags::default().set_certify(true))
.generate().unwrap();
- let sig_pkts = tpk1.subkeys().next().unwrap().selfsigs[0].hashed_area();
+ let sig_pkts = tpk1.subkeys().next().unwrap().self_signatures[0].hashed_area();
match sig_pkts.lookup(SubpacketTag::KeyFlags) {
Some(Subpacket{ value: SubpacketValue::KeyFlags(ref ks),.. }) => {
diff --git a/openpgp/src/tpk/mod.rs b/openpgp/src/tpk/mod.rs
index 37fbc51f..714112d9 100644
--- a/openpgp/src/tpk/mod.rs
+++ b/openpgp/src/tpk/mod.rs
@@ -114,7 +114,7 @@ pub struct ComponentBinding<C> {
component: C,
// Self signatures.
- selfsigs: Vec<Signature>,
+ self_signatures: Vec<Signature>,
// Third-party certifications. (In general, this will only be by
// designated revokers.)
@@ -152,7 +152,7 @@ impl<C> ComponentBinding<C> {
let t = t.into().unwrap_or_else(time::now_utc);
let time_zero = time::at_utc(time::Timespec::new(0, 0));
- self.selfsigs.iter().filter(|s| {
+ self.self_signatures.iter().filter(|s| {
s.signature_alive(t)
}).max_by(|a, b| {
a.signature_creation_time().unwrap_or(time_zero).cmp(
@@ -164,8 +164,8 @@ impl<C> ComponentBinding<C> {
///
/// All self-signatures have been validated, and the newest
/// self-signature is last.
- pub fn selfsigs(&self) -> &[Signature] {
- &self.selfsigs
+ pub fn self_signatures(&self) -> &[Signature] {
+ &self.self_signatures
}
/// Any third-party certifications.
@@ -290,7 +290,7 @@ impl<C> ComponentBinding<C> {
{
let p : Packet = self.component.into();
std::iter::once(p)
- .chain(self.selfsigs.into_iter().map(|s| s.into()))
+ .chain(self.self_signatures.into_iter().map(|s| s.into()))
.chain(self.certifications.into_iter().map(|s| s.into()))
.chain(self.self_revocations.into_iter().map(|s| s.into()))
.chain(self.other_revocations.into_iter().map(|s| s.into()))
@@ -308,8 +308,8 @@ impl<C> ComponentBinding<C> {
// kept is undefined.
fn sort_and_dedup(&mut self)
{
- self.selfsigs.sort_by(sig_cmp);
- self.selfsigs.dedup();
+ self.self_signatures.sort_by(sig_cmp);
+ self.self_signatures.dedup();
// There is no need to sort the certifications, but we do
// want to remove dups and sorting is a prerequisite.
@@ -868,7 +868,7 @@ impl<C> ComponentBindings<C>
merge(&mut a.component, &mut b.component);
// Recall: if a and b are equal, a will be dropped.
- b.selfsigs.append(&mut a.selfsigs);
+ b.self_signatures.append(&mut a.self_signatures);
b.certifications.append(&mut a.certifications);
b.self_revocations.append(&mut a.self_revocations);
b.other_revocations.append(&mut a.self_revocations);
@@ -1171,7 +1171,7 @@ impl TPK {
/// All revocations are validated, and they are sorted by their
/// creation time.
pub fn direct_signatures(&self) -> &[Signature] {
- &self.primary.selfsigs
+ &self.primary.self_signatures
}
/// Third-party certifications.
@@ -1548,14 +1548,14 @@ impl TPK {
}
check!("primary key",
- self.primary, selfsigs, verify_primary_key_binding);
+ self.primary, self_signatures, verify_primary_key_binding);
check!("primary key",
self.primary, self_revocations, verify_primary_key_revocation);
for binding in self.userids.iter_mut() {
check!(format!("userid \"{}\"",
String::from_utf8_lossy(binding.userid().value())),
- binding, selfsigs, verify_userid_binding,
+ binding, self_signatures, verify_userid_binding,
binding.userid());
check!(format!("userid \"{}\"",
String::from_utf8_lossy(binding.userid().value())),
@@ -1565,7 +1565,7 @@ impl TPK {
for binding in self.user_attributes.iter_mut() {
check!("user attribute",
- binding, selfsigs, verify_user_attribute_binding,
+ binding, self_signatures, verify_user_attribute_binding,
binding.user_attribute());
check!("user attribute",
binding, self_revocations, verify_user_attribute_revocation,
@@ -1574,7 +1574,7 @@ impl TPK {
for binding in self.subkeys.iter_mut() {
check!(format!("subkey {}", binding.key().keyid()),
- binding, selfsigs, verify_subkey_binding,
+ binding, self_signatures, verify_subkey_binding,
binding.key());
check!(format!("subkey {}", binding.key().keyid()),
binding, self_revocations, verify_subkey_revocation,
@@ -1612,7 +1612,7 @@ impl TPK {
});
}
- check_one!("primary key", self.primary.selfsigs, sig,
+ check_one!("primary key", self.primary.self_signatures, sig,
verify_primary_key_binding);
check_one!("primary key", self.primary.self_revocations, sig,
verify_primary_key_revocation);
@@ -1621,7 +1621,7 @@ impl TPK {
check_one!(format!("userid \"{}\"",
String::from_utf8_lossy(
binding.userid().value())),
- binding.selfsigs, sig,
+ binding.self_signatures, sig,
verify_userid_binding, binding.userid());
check_one!(format!("userid \"{}\"",
String::from_utf8_lossy(
@@ -1632,7 +1632,7 @@ impl TPK {
for binding in self.user_attributes.iter_mut() {
check_one!("user attribute",
- binding.selfsigs, sig,
+ binding.self_signatures, sig,
verify_user_attribute_binding,
binding.user_attribute());
check_one!("user attribute",
@@ -1643,7 +1643,7 @@ impl TPK {
for binding in self.subkeys.iter_mut() {
check_one!(format!("subkey {}", binding.key().keyid()),
- binding.selfsigs, sig,
+ binding.self_signatures, sig,
verify_subkey_binding, binding.key());
check_one!(format!("subkey {}", binding.key().keyid()),
binding.self_revocations, sig,
@@ -1666,17 +1666,17 @@ impl TPK {
// Only keep user ids / user attributes / subkeys with at
// least one valid self-signature or self-revocation.
self.userids.retain(|userid| {
- userid.selfsigs.len() > 0 || userid.self_revocations.len() > 0
+ userid.self_signatures.len() > 0 || userid.self_revocations.len() > 0
});
t!("Retained {} userids", self.userids.len());
self.user_attributes.retain(|ua| {
- ua.selfsigs.len() > 0 || ua.self_revocations.len() > 0
+ ua.self_signatures.len() > 0 || ua.self_revocations.len() > 0
});
t!("Retained {} user_attributes", self.user_attributes.len());
self.subkeys.retain(|subkey| {
- subkey.selfsigs.len() > 0 || subkey.self_revocations.len() > 0
+ subkey.self_signatures.len() > 0 || subkey.self_revocations.len() > 0
});
t!("Retained {} subkeys", self.subkeys.len());
@@ -1788,8 +1788,8 @@ impl TPK {
self.primary.key_mut().set_secret(other.primary.key_mut().set_secret(None));
}
- self.primary.selfsigs.append(
- &mut other.primary.selfsigs);
+ self.primary.self_signatures.append(
+ &mut other.primary.self_signatures);
self.primary.certifications.append(
&mut other.primary.certifications);
self.primary.self_revocations.append(
@@ -1870,8 +1870,8 @@ mod test {
assert_eq!(tpk.userids.len(), 1);
assert_eq!(tpk.userids[0].userid().value(),
&b"Testy McTestface <testy@example.org>"[..]);
- assert_eq!(tpk.userids[0].selfsigs.len(), 1);
- assert_eq!(tpk.userids[0].selfsigs[0].hash_prefix(),
+ assert_eq!(tpk.userids[0].self_signatures.len(), 1);
+ assert_eq!(tpk.userids[0].self_signatures[0].hash_prefix(),
&[ 0xc6, 0x8f ]);
assert_eq!(tpk.user_attributes.len(), 0);
assert_eq!(tpk.subkeys.len(), 0);
@@ -1891,8 +1891,8 @@ mod test {
assert_eq!(tpk.userids.len(), 1, "number of userids");
assert_eq!(tpk.userids[0].userid().value(),
&b"Testy McTestface <testy@example.org>"[..]);
- assert_eq!(tpk.userids[0].selfsigs.len(), 1);
- assert_eq!(tpk.userids[0].selfsigs[0].hash_prefix(),
+ assert_eq!(tpk.userids[0].self_signatures.len(), 1);
+ assert_eq!(tpk.userids[0].self_signatures[0].hash_prefix(),
&[ 0xc6, 0x8f ]);
assert_eq!(tpk.user_attributes.len(), 0);
@@ -1900,7 +1900,7 @@ mod test {
assert_eq!(tpk.subkeys.len(), 1, "number of subkeys");
assert_eq!(tpk.subkeys[0].key().creation_time().to_pgp().unwrap(),
1511355130);
- assert_eq!(tpk.subkeys[0].selfsigs[0].hash_prefix(),
+ assert_eq!(tpk.subkeys[0].self_signatures[0].hash_prefix(),
&[ 0xb7, 0xb9 ]);
let tpk = parse_tpk(crate::tests::key("testy-no-subkey.pgp"),
@@ -1914,8 +1914,8 @@ mod test {
assert_eq!(tpk.userids.len(), 1, "number of userids");
assert_eq!(tpk.userids[0].userid().value(),
&b"Testy McTestface <testy@example.org>"[..]);
- assert_eq!(tpk.userids[0].selfsigs.len(), 1);
- assert_eq!(tpk.userids[0].selfsigs[0].hash_prefix(),
+ assert_eq!(tpk.userids[0].self_signatures.len(), 1);
+ assert_eq!(tpk.userids[0].self_signatures[0].hash_prefix(),
&[ 0xc6, 0x8f ]);
assert_eq!(tpk.subkeys.len(), 0, "number of subkeys");
@@ -2054,20 +2054,20 @@ mod test {
.unwrap();
assert!(tpk_donald_signs_base.userids.len() == 1);
- assert!(tpk_donald_signs_base.userids[0].selfsigs.len() == 1);
+ assert!(tpk_donald_signs_base.userids[0].self_signatures.len() == 1);
assert!(tpk_base.userids[0].certifications.len() == 0);
assert!(tpk_donald_signs_base.userids[0].certifications.len() == 1);
let merged = tpk_donald_signs_base.clone()
.merge(tpk_ivanka_signs_base.clone()).unwrap();
assert!(merged.userids.len() == 1);
- assert!(merged.userids[0].selfsigs.len() == 1);
+ assert!(merged.userids[0].self_signatures.len() == 1);
assert!(merged.userids[0].certifications.len() == 2);
let merged = tpk_donald_signs_base.clone()
.merge(tpk_donald_signs_all.clone()).unwrap();
assert!(merged.userids.len() == 3);
- assert!(merged.userids[0].selfsigs.len() == 1);
+ assert!(merged.userids[0].self_signatures.len() == 1);
// There should be two certifications from the Donald on the
// first user id.
assert!(merged.userids[0].certifications.len() == 2);
@@ -2079,7 +2079,7 @@ mod test {
.merge(tpk_ivanka_signs_base.clone()).unwrap()
.merge(tpk_ivanka_signs_all.clone()).unwrap();
assert!(merged.userids.len() == 3);
- assert!(merged.userids[0].selfsigs.len() == 1);
+ assert!(merged.userids[0].self_signatures.len() == 1);
// There should be two certifications from each of the Donald
// and Ivanka on the first user id, and one each on the rest.
assert!(merged.userids[0].certifications.len() == 4);
@@ -2097,7 +2097,7 @@ mod test {
.merge(tpk_donald_signs_all.clone()).unwrap()
.merge(tpk_ivanka_signs_all.clone()).unwrap();
assert!(merged.userids.len() == 3);
- assert!(merged.userids[0].selfsigs.len() == 1);
+ assert!(merged.userids[0].self_signatures.len() == 1);
// There should be two certifications from each of the Donald
// and Ivanka on the first user id, and one each on the rest.
assert!(merged.userids[0].certifications.len() == 4);
@@ -3059,10 +3059,10 @@ Pu1xwz57O4zo1VYf6TqHJzVC3OMvMUM2hhdecMUe5x6GorNaj6g=
let uidb = neal.userids().nth(0).unwrap();
// Signatures are sorted in ascending order wrt the signature
// creation time.
- assert!(uidb.selfsigs()[0].signature_creation_time()
- < uidb.selfsigs()[1].signature_creation_time());
+ assert!(uidb.self_signatures()[0].signature_creation_time()
+ < uidb.self_signatures()[1].signature_creation_time());
// Make sure we return the most recent here.
- assert_eq!(uidb.selfsigs().last().unwrap(),
+ assert_eq!(uidb.self_signatures().last().unwrap(),
uidb.binding_signature(None).unwrap());
}
diff --git a/openpgp/src/tpk/parser/low_level/grammar.lalrpop b/openpgp/src/tpk/parser/low_level/grammar.lalrpop
index 88937b09..1f22ac17 100644
--- a/openpgp/src/tpk/parser/low_level/grammar.lalrpop
+++ b/openpgp/src/tpk/parser/low_level/grammar.lalrpop
@@ -48,7 +48,7 @@ pub TPK: Option<TPK> = {
let mut tpk = TPK {
primary: PrimaryKeyBinding {
component: key,
- selfsigs: vec![],
+ self_signatures: vec![],
certifications: sigs,
self_revocations: vec![],
other_revocations: vec![],
@@ -159,7 +159,7 @@ Component: Option<Component> = {
Some(Component::SubkeyBinding(SubkeyBinding {
component: key,
- selfsigs: vec![],
+ self_signatures: vec![],
certifications: sigs,
self_revocations: vec![],
other_revocations: vec![],
@@ -176,7 +176,7 @@ Component: Option<Component> = {
Some(Component::UserIDBinding(UserIDBinding {
component: u,
- selfsigs: vec![],
+ self_signatures: vec![],
certifications: sigs,
self_revocations: vec![],
other_revocations: vec![],
@@ -193,7 +193,7 @@ Component: Option<Component> = {
Some(Component::UserAttributeBinding(UserAttributeBinding {
component: u,
- selfsigs: vec![],
+ self_signatures: vec![],
certifications: sigs,
self_revocations: vec![],
other_revocations: vec![],
@@ -210,7 +210,7 @@ Component: Option<Component> = {
Some(Component::UnknownBinding(UnknownBinding {
component: u,
- selfsigs: vec![],
+ self_signatures: vec![],
certifications: sigs,
self_revocations: vec![],
other_revocations: vec![],
diff --git a/openpgp/src/tpk/parser/mod.rs b/openpgp/src/tpk/parser/mod.rs
index e953c632..635fd5cf 100644
--- a/openpgp/src/tpk/parser/mod.rs
+++ b/openpgp/src/tpk/parser/mod.rs
@@ -620,7 +620,7 @@ impl<'a, I: Iterator<Item=Packet>> TPKParser<'a, I> {
fn split_sigs<C>(primary: &Fingerprint, primary_keyid: &KeyID,
b: &mut ComponentBinding<C>)
{
- let mut selfsigs = vec![];
+ let mut self_signatures = vec![];
let mut certifications = vec![];
let mut self_revs = vec![];
let mut other_revs = vec![];
@@ -650,7 +650,7 @@ impl<'a, I: Iterator<Item=Packet>> TPKParser<'a, I> {
}
} else {
if is_selfsig {
- selfsigs.push(sig.into());
+ self_signatures.push(sig.into());
} else {
certifications.push(sig.into());
}
@@ -659,7 +659,7 @@ impl<'a, I: Iterator<Item=Packet>> TPKParser<'a, I> {
}
}
- b.selfsigs = selfsigs;
+ b.self_signatures = self_signatures;
b.certifications = certifications;
b.self_revocations = self_revs;
b.other_revocations = other_revs;