Skip to content

Commit 7b7f65a

Browse files
committed
chore: address clippy lints within new code
1 parent 9a8fd74 commit 7b7f65a

File tree

2 files changed

+8
-34
lines changed

2 files changed

+8
-34
lines changed

ed25519-dalek/src/verifying.rs

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -216,29 +216,6 @@ impl VerifyingKey {
216216
}
217217
}
218218

219-
#[allow(non_snake_case)]
220-
pub(crate) fn raw_verify_byupdate<CtxDigest, F>(
221-
&self,
222-
msg_update: F,
223-
signature: &ed25519::Signature,
224-
) -> Result<(), SignatureError>
225-
where
226-
CtxDigest: Digest<OutputSize = U64>,
227-
F: FnOnce(&mut CtxDigest) -> Result<(), SignatureError>,
228-
{
229-
let signature = InternalSignature::try_from(signature)?;
230-
231-
let mut c = RCompute::<CtxDigest>::new(self, signature, None);
232-
msg_update(&mut c.h)?;
233-
let expected_R = c.finish();
234-
235-
if expected_R == signature.R {
236-
Ok(())
237-
} else {
238-
Err(InternalError::Verify.into())
239-
}
240-
}
241-
242219
/// The prehashed non-batched Ed25519 verification check, rejecting non-canonical R values.
243220
/// (see [`Self::recompute_R`]). `CtxDigest` is the digest used to calculate the
244221
/// pseudorandomness needed for signing. `MsgDigest` is the digest used to hash the signed

ed25519-dalek/tests/ed25519.rs

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -338,28 +338,25 @@ mod integrations {
338338
#[test]
339339
fn sign_verify_digest_equivalence() {
340340
// TestSignVerify
341-
let keypair: SigningKey;
342-
let good_sig: Signature;
343-
let bad_sig: Signature;
341+
342+
let mut csprng = OsRng {};
344343

345344
let good: &[u8] = "test message".as_bytes();
346345
let bad: &[u8] = "wrong message".as_bytes();
347346

348-
let mut csprng = OsRng {};
349-
350-
keypair = SigningKey::generate(&mut csprng);
351-
good_sig = keypair.sign(&good);
352-
bad_sig = keypair.sign(&bad);
347+
let keypair: SigningKey = SigningKey::generate(&mut csprng);
348+
let good_sig: Signature = keypair.sign(good);
349+
let bad_sig: Signature = keypair.sign(bad);
353350

354351
let mut verifier = keypair.verify_stream(&good_sig).unwrap();
355-
verifier.update(&good);
352+
verifier.update(good);
356353
assert!(
357354
verifier.finalize_and_verify().is_ok(),
358355
"Verification of a valid signature failed!"
359356
);
360357

361358
let mut verifier = keypair.verify_stream(&bad_sig).unwrap();
362-
verifier.update(&good);
359+
verifier.update(good);
363360
assert!(
364361
verifier.finalize_and_verify().is_err(),
365362
"Verification of a signature on a different message passed!"
@@ -374,7 +371,7 @@ mod integrations {
374371
);
375372

376373
let mut verifier = keypair.verify_stream(&good_sig).unwrap();
377-
verifier.update(&bad);
374+
verifier.update(bad);
378375
assert!(
379376
verifier.finalize_and_verify().is_err(),
380377
"Verification of a signature on a different message passed!"

0 commit comments

Comments
 (0)