diff options
-rw-r--r-- | openpgp/src/autocrypt.rs | 2 | ||||
-rw-r--r-- | openpgp/src/cert/mod.rs | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/openpgp/src/autocrypt.rs b/openpgp/src/autocrypt.rs index 4993d028..20c91524 100644 --- a/openpgp/src/autocrypt.rs +++ b/openpgp/src/autocrypt.rs @@ -952,7 +952,7 @@ In the light of the Efail vulnerability I am asking myself if it's let cert = ac.headers[0].key.as_ref() .expect("Failed to parse key material."); - assert_eq!(cert.primary_key().fingerprint(), + assert_eq!(cert.fingerprint(), Fingerprint::from_hex( &"4F9F89F5505AC1D1A260631CDB1187B9DD5F693B"[..]).unwrap()); assert_eq!(cert.userids().next().unwrap().value(), diff --git a/openpgp/src/cert/mod.rs b/openpgp/src/cert/mod.rs index 0af68787..3f702e0f 100644 --- a/openpgp/src/cert/mod.rs +++ b/openpgp/src/cert/mod.rs @@ -1118,7 +1118,7 @@ impl Cert { if self.bad.len() > 0 { t!("{}: ignoring {} bad self-signatures", - self.primary_key().keyid(), self.bad.len()); + self.keyid(), self.bad.len()); } // Only keep user ids / user attributes / subkeys with at @@ -2050,7 +2050,7 @@ mod test { .build(&mut keypair, &cert, None) .unwrap(); assert_eq!(sig.typ(), SignatureType::KeyRevocation); - assert_eq!(sig.issuer(), Some(&cert.primary_key().keyid())); + assert_eq!(sig.issuer(), Some(&cert.keyid())); assert_eq!(sig.issuer_fingerprint(), Some(&cert.fingerprint())); |