Fix more Clippy warnings.

This commit is contained in:
Guillaume Endignoux
2020-09-24 15:08:12 +02:00
parent b46b103db0
commit 68b0bdc29b
7 changed files with 20 additions and 16 deletions

View File

@@ -23,8 +23,8 @@ fn main() {
let mut buf = [0; BUFFER_SIZE]; let mut buf = [0; BUFFER_SIZE];
loop { loop {
for i in 1..buf.len() { for i in 1..buf.len() {
for j in 0..i { for byte in buf.iter_mut().take(i) {
buf[j] = b'0' + ((i % 10) as u8); *byte = b'0' + ((i % 10) as u8);
} }
buf[i] = b'\n'; buf[i] = b'\n';
Console::write_unbuffered(&mut buf[..(i + 1)]); Console::write_unbuffered(&mut buf[..(i + 1)]);

View File

@@ -151,7 +151,7 @@ fn main() {
fn bench<F>(console: &mut Console, timer: &Timer, title: &str, mut f: F) fn bench<F>(console: &mut Console, timer: &Timer, title: &str, mut f: F)
where where
F: FnMut() -> (), F: FnMut(),
{ {
writeln!(console, "****************************************").unwrap(); writeln!(console, "****************************************").unwrap();
writeln!(console, "Benchmarking: {}", title).unwrap(); writeln!(console, "Benchmarking: {}", title).unwrap();

View File

@@ -1252,7 +1252,7 @@ mod test {
let mut rng = ThreadRng256 {}; let mut rng = ThreadRng256 {};
let sk = crypto::ecdh::SecKey::gensk(&mut rng); let sk = crypto::ecdh::SecKey::gensk(&mut rng);
let pk = sk.genpk(); let pk = sk.genpk();
let cose_key = CoseKey::from(pk.clone()); let cose_key = CoseKey::from(pk);
let cbor_extensions = cbor_map! { let cbor_extensions = cbor_map! {
"hmac-secret" => cbor_map! { "hmac-secret" => cbor_map! {
1 => cbor::Value::Map(cose_key.0.clone()), 1 => cbor::Value::Map(cose_key.0.clone()),

View File

@@ -137,6 +137,7 @@ impl CtapHid {
const TIMEOUT_DURATION: Duration<isize> = Duration::from_ms(100); const TIMEOUT_DURATION: Duration<isize> = Duration::from_ms(100);
const WINK_TIMEOUT_DURATION: Duration<isize> = Duration::from_ms(5000); const WINK_TIMEOUT_DURATION: Duration<isize> = Duration::from_ms(5000);
#[allow(clippy::new_without_default)]
pub fn new() -> CtapHid { pub fn new() -> CtapHid {
CtapHid { CtapHid {
assembler: MessageAssembler::new(), assembler: MessageAssembler::new(),

View File

@@ -49,6 +49,12 @@ pub enum Error {
Timeout, Timeout,
} }
impl Default for MessageAssembler {
fn default() -> Self {
Self::new()
}
}
impl MessageAssembler { impl MessageAssembler {
pub fn new() -> MessageAssembler { pub fn new() -> MessageAssembler {
MessageAssembler { MessageAssembler {

View File

@@ -777,7 +777,7 @@ mod test {
#[test] #[test]
fn test_process_get_pin_retries() { fn test_process_get_pin_retries() {
let mut rng = ThreadRng256 {}; let mut rng = ThreadRng256 {};
let mut persistent_store = PersistentStore::new(&mut rng); let persistent_store = PersistentStore::new(&mut rng);
let pin_protocol_v1 = PinProtocolV1::new(&mut rng); let pin_protocol_v1 = PinProtocolV1::new(&mut rng);
let expected_response = Ok(AuthenticatorClientPinResponse { let expected_response = Ok(AuthenticatorClientPinResponse {
key_agreement: None, key_agreement: None,
@@ -785,7 +785,7 @@ mod test {
retries: Some(persistent_store.pin_retries().unwrap() as u64), retries: Some(persistent_store.pin_retries().unwrap() as u64),
}); });
assert_eq!( assert_eq!(
pin_protocol_v1.process_get_pin_retries(&mut persistent_store), pin_protocol_v1.process_get_pin_retries(&persistent_store),
expected_response expected_response
); );
} }

View File

@@ -265,12 +265,10 @@ impl PersistentStore {
debug_assert_eq!(entry.tag, TAG_CREDENTIAL); debug_assert_eq!(entry.tag, TAG_CREDENTIAL);
let result = deserialize_credential(entry.data); let result = deserialize_credential(entry.data);
debug_assert!(result.is_some()); debug_assert!(result.is_some());
if check_cred_protect let user_verification_required = result.as_ref().map_or(false, |cred| {
&& result.as_ref().map_or(false, |cred| { cred.cred_protect_policy == Some(CredentialProtectionPolicy::UserVerificationRequired)
cred.cred_protect_policy });
== Some(CredentialProtectionPolicy::UserVerificationRequired) if check_cred_protect && user_verification_required {
})
{
Ok(None) Ok(None)
} else { } else {
Ok(result) Ok(result)
@@ -675,7 +673,6 @@ fn _serialize_min_pin_length_rp_ids(rp_ids: Vec<String>) -> Result<Vec<u8>, Ctap
mod test { mod test {
use super::*; use super::*;
use crate::ctap::data_formats::{PublicKeyCredentialSource, PublicKeyCredentialType}; use crate::ctap::data_formats::{PublicKeyCredentialSource, PublicKeyCredentialType};
use crypto;
use crypto::rng256::{Rng256, ThreadRng256}; use crypto::rng256::{Rng256, ThreadRng256};
fn create_credential_source( fn create_credential_source(
@@ -920,7 +917,7 @@ mod test {
assert!(persistent_store.store_credential(credential).is_ok()); assert!(persistent_store.store_credential(credential).is_ok());
let no_credential = persistent_store let no_credential = persistent_store
.find_credential("example.com", &vec![0x00], true) .find_credential("example.com", &[0x00], true)
.unwrap(); .unwrap();
assert_eq!(no_credential, None); assert_eq!(no_credential, None);
} }
@@ -942,8 +939,8 @@ mod test {
let master_hmac_key = master_keys_1.hmac.to_vec(); let master_hmac_key = master_keys_1.hmac.to_vec();
persistent_store.reset(&mut rng).unwrap(); persistent_store.reset(&mut rng).unwrap();
let master_keys_3 = persistent_store.master_keys().unwrap(); let master_keys_3 = persistent_store.master_keys().unwrap();
assert!(master_keys_3.encryption != &master_encryption_key[..]); assert!(master_keys_3.encryption != master_encryption_key.as_slice());
assert!(master_keys_3.hmac != &master_hmac_key[..]); assert!(master_keys_3.hmac != master_hmac_key.as_slice());
} }
#[test] #[test]