From 8b272c162ce443e26c89afbda6fe4e06dd366118 Mon Sep 17 00:00:00 2001 From: Nora Widdecke Date: Mon, 22 Nov 2021 16:18:48 +0100 Subject: Remove unnecessary slicing. - Found by clippy::redundant_slicing. --- openpgp/src/cert.rs | 34 +++++++++++++++++----------------- 1 file changed, 17 insertions(+), 17 deletions(-) (limited to 'openpgp/src/cert.rs') diff --git a/openpgp/src/cert.rs b/openpgp/src/cert.rs index 3ab5ce65..d9f7decd 100644 --- a/openpgp/src/cert.rs +++ b/openpgp/src/cert.rs @@ -4097,8 +4097,8 @@ mod test { // Keyring with two good keys let mut combined = vec![]; - combined.extend_from_slice(&dkg[..]); - combined.extend_from_slice(&dkg[..]); + combined.extend_from_slice(dkg); + combined.extend_from_slice(dkg); let certs = CertParser::from_bytes(&combined[..]).unwrap() .map(|certr| certr.is_ok()) .collect::>(); @@ -4106,8 +4106,8 @@ mod test { // Keyring with a good key, and a bad key. let mut combined = vec![]; - combined.extend_from_slice(&dkg[..]); - combined.extend_from_slice(&lutz[..]); + combined.extend_from_slice(dkg); + combined.extend_from_slice(lutz); let certs = CertParser::from_bytes(&combined[..]).unwrap() .map(|certr| certr.is_ok()) .collect::>(); @@ -4115,8 +4115,8 @@ mod test { // Keyring with a bad key, and a good key. let mut combined = vec![]; - combined.extend_from_slice(&lutz[..]); - combined.extend_from_slice(&dkg[..]); + combined.extend_from_slice(lutz); + combined.extend_from_slice(dkg); let certs = CertParser::from_bytes(&combined[..]).unwrap() .map(|certr| certr.is_ok()) .collect::>(); @@ -4124,9 +4124,9 @@ mod test { // Keyring with a good key, a bad key, and a good key. let mut combined = vec![]; - combined.extend_from_slice(&dkg[..]); - combined.extend_from_slice(&lutz[..]); - combined.extend_from_slice(&dkg[..]); + combined.extend_from_slice(dkg); + combined.extend_from_slice(lutz); + combined.extend_from_slice(dkg); let certs = CertParser::from_bytes(&combined[..]).unwrap() .map(|certr| certr.is_ok()) .collect::>(); @@ -4134,9 +4134,9 @@ mod test { // Keyring with a good key, a bad key, and a bad key. let mut combined = vec![]; - combined.extend_from_slice(&dkg[..]); - combined.extend_from_slice(&lutz[..]); - combined.extend_from_slice(&lutz[..]); + combined.extend_from_slice(dkg); + combined.extend_from_slice(lutz); + combined.extend_from_slice(lutz); let certs = CertParser::from_bytes(&combined[..]).unwrap() .map(|certr| certr.is_ok()) .collect::>(); @@ -4144,10 +4144,10 @@ mod test { // Keyring with a good key, a bad key, a bad key, and a good key. let mut combined = vec![]; - combined.extend_from_slice(&dkg[..]); - combined.extend_from_slice(&lutz[..]); - combined.extend_from_slice(&lutz[..]); - combined.extend_from_slice(&dkg[..]); + combined.extend_from_slice(dkg); + combined.extend_from_slice(lutz); + combined.extend_from_slice(lutz); + combined.extend_from_slice(dkg); let certs = CertParser::from_bytes(&combined[..]).unwrap() .map(|certr| certr.is_ok()) .collect::>(); @@ -4208,7 +4208,7 @@ mod test { let cert = Cert::from_bytes(crate::tests::key("already-revoked.pgp")).unwrap(); let rev = crate::tests::key("already-revoked.rev"); - let rev = PacketPile::from_reader(armor::Reader::new(&rev[..], None)) + let rev = PacketPile::from_reader(armor::Reader::new(rev, None)) .unwrap(); let rev : Vec = rev.into_children().collect(); -- cgit v1.2.3