@@ -177,9 +177,9 @@ impl BackupDecryptionKey {
177177 pub fn to_base58 ( & self ) -> String {
178178 let bytes = Zeroizing :: new (
179179 [
180- Self :: PREFIX . as_ref ( ) ,
181- self . inner . as_ref ( ) ,
182- [ Self :: parity_byte ( self . inner . as_ref ( ) ) ] . as_ref ( ) ,
180+ Self :: PREFIX . as_slice ( ) ,
181+ self . inner . as_slice ( ) ,
182+ [ Self :: parity_byte ( self . inner . as_slice ( ) ) ] . as_slice ( ) ,
183183 ]
184184 . concat ( ) ,
185185 ) ;
@@ -303,7 +303,7 @@ mod tests {
303303
304304 #[ test]
305305 fn base64_decoding ( ) -> Result < ( ) , DecodeError > {
306- let key = BackupDecryptionKey :: new ( ) . expect ( "Can't create a new recovery key" ) ;
306+ let key = BackupDecryptionKey :: new ( ) ;
307307
308308 let base64 = key. to_base64 ( ) ;
309309 let decoded_key = BackupDecryptionKey :: from_base64 ( & base64) ?;
@@ -316,7 +316,7 @@ mod tests {
316316
317317 #[ test]
318318 fn base58_decoding ( ) -> Result < ( ) , DecodeError > {
319- let key = BackupDecryptionKey :: new ( ) . expect ( "Can't create a new recovery key" ) ;
319+ let key = BackupDecryptionKey :: new ( ) ;
320320
321321 let base64 = key. to_base58 ( ) ;
322322 let decoded_key = BackupDecryptionKey :: from_base58 ( & base64) ?;
@@ -394,7 +394,7 @@ mod tests {
394394 async fn test_encryption_cycle ( ) {
395395 let session = InboundGroupSession :: from_export ( & room_key ( ) ) . unwrap ( ) ;
396396
397- let decryption_key = BackupDecryptionKey :: new ( ) . unwrap ( ) ;
397+ let decryption_key = BackupDecryptionKey :: new ( ) ;
398398 let encryption_key = decryption_key. megolm_v1_public_key ( ) ;
399399
400400 let encrypted = encryption_key. encrypt ( session) . await ;
@@ -406,7 +406,7 @@ mod tests {
406406
407407 #[ test]
408408 fn key_matches ( ) {
409- let decryption_key = BackupDecryptionKey :: new ( ) . unwrap ( ) ;
409+ let decryption_key = BackupDecryptionKey :: new ( ) ;
410410
411411 let key_info = decryption_key. to_backup_info ( ) ;
412412
0 commit comments