mirror of
https://github.com/str4d/rage.git
synced 2025-04-04 03:17:42 +03:00
clippy: Remove needless borrows
This commit is contained in:
parent
4df2fac3e1
commit
538ac500da
9 changed files with 30 additions and 32 deletions
|
@ -134,9 +134,9 @@ impl Error {
|
|||
|
||||
fn message(&self) -> &str {
|
||||
match self {
|
||||
Error::Identity { message, .. } => &message,
|
||||
Error::Internal { message } => &message,
|
||||
Error::Stanza { message, .. } => &message,
|
||||
Error::Identity { message, .. } => message,
|
||||
Error::Internal { message } => message,
|
||||
Error::Stanza { message, .. } => message,
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -152,8 +152,8 @@ impl Error {
|
|||
};
|
||||
|
||||
let metadata = match &index {
|
||||
Some((file_index, Some(stanza_index))) => vec![self.kind(), &file_index, &stanza_index],
|
||||
Some((index, None)) => vec![self.kind(), &index],
|
||||
Some((file_index, Some(stanza_index))) => vec![self.kind(), file_index, stanza_index],
|
||||
Some((index, None)) => vec![self.kind(), index],
|
||||
None => vec![self.kind()],
|
||||
};
|
||||
|
||||
|
|
|
@ -128,9 +128,9 @@ impl Error {
|
|||
|
||||
fn message(&self) -> &str {
|
||||
match self {
|
||||
Error::Recipient { message, .. } => &message,
|
||||
Error::Identity { message, .. } => &message,
|
||||
Error::Internal { message } => &message,
|
||||
Error::Recipient { message, .. } => message,
|
||||
Error::Identity { message, .. } => message,
|
||||
Error::Internal { message } => message,
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -143,7 +143,7 @@ impl Error {
|
|||
};
|
||||
|
||||
let metadata = match &index {
|
||||
Some(index) => vec![self.kind(), &index],
|
||||
Some(index) => vec![self.kind(), index],
|
||||
None => vec![self.kind()],
|
||||
};
|
||||
|
||||
|
@ -230,7 +230,7 @@ pub(crate) fn run_v1<P: RecipientPluginV1>(mut plugin: P) -> io::Result<()> {
|
|||
.as_ref()
|
||||
.and_then(|(hrp, data, variant)| match (plugin_name(hrp), variant) {
|
||||
(Some(plugin_name), &bech32::Variant::Bech32) => {
|
||||
Vec::from_base32(&data).ok().map(|data| (plugin_name, data))
|
||||
Vec::from_base32(data).ok().map(|data| (plugin_name, data))
|
||||
}
|
||||
_ => None,
|
||||
})
|
||||
|
@ -254,7 +254,7 @@ pub(crate) fn run_v1<P: RecipientPluginV1>(mut plugin: P) -> io::Result<()> {
|
|||
index,
|
||||
message: "Invalid recipient encoding".to_owned(),
|
||||
},
|
||||
|index, plugin_name, bytes| plugin.add_recipient(index, &plugin_name, &bytes),
|
||||
|index, plugin_name, bytes| plugin.add_recipient(index, plugin_name, &bytes),
|
||||
);
|
||||
let identities = parse_and_add(
|
||||
identities,
|
||||
|
@ -269,7 +269,7 @@ pub(crate) fn run_v1<P: RecipientPluginV1>(mut plugin: P) -> io::Result<()> {
|
|||
index,
|
||||
message: "Invalid identity encoding".to_owned(),
|
||||
},
|
||||
|index, plugin_name, bytes| plugin.add_identity(index, &plugin_name, &bytes),
|
||||
|index, plugin_name, bytes| plugin.add_identity(index, plugin_name, &bytes),
|
||||
);
|
||||
|
||||
// Phase 2: wrap the file keys or return errors
|
||||
|
|
|
@ -210,7 +210,7 @@ impl<W: AsyncWrite> AsyncWrite for LineEndingWriter<W> {
|
|||
// line must be written in poll_close().
|
||||
if !buf.is_empty() {
|
||||
*this.line_with_ending = Some(EncodedLine {
|
||||
bytes: [&line, LINE_ENDING.as_bytes()].concat(),
|
||||
bytes: [line, LINE_ENDING.as_bytes()].concat(),
|
||||
offset: 0,
|
||||
});
|
||||
line.clear();
|
||||
|
@ -240,7 +240,7 @@ impl<W: AsyncWrite> AsyncWrite for LineEndingWriter<W> {
|
|||
// marker.
|
||||
*this.line_with_ending = Some(EncodedLine {
|
||||
bytes: [
|
||||
&line,
|
||||
line,
|
||||
LINE_ENDING.as_bytes(),
|
||||
ARMORED_END_MARKER.as_bytes(),
|
||||
LINE_ENDING.as_bytes(),
|
||||
|
@ -1080,7 +1080,7 @@ mod tests {
|
|||
|
||||
let mut tmp = &data[..];
|
||||
loop {
|
||||
match w.as_mut().poll_write(&mut cx, &tmp) {
|
||||
match w.as_mut().poll_write(&mut cx, tmp) {
|
||||
Poll::Ready(Ok(0)) => break,
|
||||
Poll::Ready(Ok(written)) => tmp = &tmp[written..],
|
||||
Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e),
|
||||
|
|
|
@ -324,7 +324,7 @@ impl<W: AsyncWrite> AsyncWrite for StreamWriter<W> {
|
|||
if !buf.is_empty() {
|
||||
let this = self.as_mut().project();
|
||||
*this.encrypted_chunk = Some(EncryptedChunk {
|
||||
bytes: this.stream.encrypt_chunk(&this.chunk, false)?,
|
||||
bytes: this.stream.encrypt_chunk(this.chunk, false)?,
|
||||
offset: 0,
|
||||
});
|
||||
this.chunk.clear();
|
||||
|
@ -346,7 +346,7 @@ impl<W: AsyncWrite> AsyncWrite for StreamWriter<W> {
|
|||
// Finish the stream.
|
||||
let this = self.as_mut().project();
|
||||
*this.encrypted_chunk = Some(EncryptedChunk {
|
||||
bytes: this.stream.encrypt_chunk(&this.chunk, true)?,
|
||||
bytes: this.stream.encrypt_chunk(this.chunk, true)?,
|
||||
offset: 0,
|
||||
});
|
||||
}
|
||||
|
@ -719,7 +719,7 @@ mod tests {
|
|||
let mut encrypted = vec![];
|
||||
{
|
||||
let mut w = Stream::encrypt(PayloadKey([7; 32].into()), &mut encrypted);
|
||||
w.write_all(&data).unwrap();
|
||||
w.write_all(data).unwrap();
|
||||
w.finish().unwrap();
|
||||
};
|
||||
|
||||
|
@ -759,7 +759,7 @@ mod tests {
|
|||
|
||||
let mut tmp = data;
|
||||
loop {
|
||||
match w.as_mut().poll_write(&mut cx, &tmp) {
|
||||
match w.as_mut().poll_write(&mut cx, tmp) {
|
||||
Poll::Ready(Ok(0)) => break,
|
||||
Poll::Ready(Ok(written)) => tmp = &tmp[written..],
|
||||
Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e),
|
||||
|
|
|
@ -287,7 +287,7 @@ mod tests {
|
|||
|
||||
let mut tmp = &test_msg[..];
|
||||
loop {
|
||||
match w.as_mut().poll_write(&mut cx, &tmp) {
|
||||
match w.as_mut().poll_write(&mut cx, tmp) {
|
||||
Poll::Ready(Ok(0)) => break,
|
||||
Poll::Ready(Ok(written)) => tmp = &tmp[written..],
|
||||
Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e),
|
||||
|
|
|
@ -80,7 +80,7 @@ impl OpenSshKdf {
|
|||
match self {
|
||||
OpenSshKdf::Bcrypt { salt, rounds } => {
|
||||
let mut output = vec![0; out_len];
|
||||
bcrypt_pbkdf(passphrase.expose_secret(), &salt, *rounds, &mut output)
|
||||
bcrypt_pbkdf(passphrase.expose_secret(), salt, *rounds, &mut output)
|
||||
.expect("parameters are valid");
|
||||
output
|
||||
}
|
||||
|
@ -132,7 +132,7 @@ mod decrypt {
|
|||
|
||||
let cipher = C::new_from_slices(key, iv).expect("key and IV are correct length");
|
||||
cipher
|
||||
.decrypt_padded_vec_mut::<NoPadding>(&ciphertext)
|
||||
.decrypt_padded_vec_mut::<NoPadding>(ciphertext)
|
||||
.map_err(|_| DecryptError::KeyDecryptionFailed)
|
||||
}
|
||||
|
||||
|
@ -416,7 +416,7 @@ mod read_ssh {
|
|||
map_opt(tuple((string, string)), |(pubkey_bytes, privkey_bytes)| {
|
||||
if privkey_bytes.len() == 64 && pubkey_bytes == &privkey_bytes[32..64] {
|
||||
let mut privkey = [0; 64];
|
||||
privkey.copy_from_slice(&privkey_bytes);
|
||||
privkey.copy_from_slice(privkey_bytes);
|
||||
Some(Secret::new(privkey))
|
||||
} else {
|
||||
None
|
||||
|
|
|
@ -48,7 +48,7 @@ impl UnencryptedKey {
|
|||
match (self, stanza.tag.as_str()) {
|
||||
(UnencryptedKey::SshRsa(ssh_key, sk), SSH_RSA_RECIPIENT_TAG) => {
|
||||
let tag = base64_arg(stanza.args.get(0)?, [0; TAG_LEN_BYTES])?;
|
||||
if ssh_tag(&ssh_key) != tag {
|
||||
if ssh_tag(ssh_key) != tag {
|
||||
return None;
|
||||
}
|
||||
|
||||
|
@ -73,7 +73,7 @@ impl UnencryptedKey {
|
|||
}
|
||||
(UnencryptedKey::SshEd25519(ssh_key, privkey), SSH_ED25519_RECIPIENT_TAG) => {
|
||||
let tag = base64_arg(stanza.args.get(0)?, [0; TAG_LEN_BYTES])?;
|
||||
if ssh_tag(&ssh_key) != tag {
|
||||
if ssh_tag(ssh_key) != tag {
|
||||
return None;
|
||||
}
|
||||
if stanza.body.len() != crate::x25519::ENCRYPTED_FILE_KEY_BYTES {
|
||||
|
@ -92,7 +92,7 @@ impl UnencryptedKey {
|
|||
let pk = X25519PublicKey::from(&sk);
|
||||
|
||||
let tweak: StaticSecret =
|
||||
hkdf(&ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
|
||||
hkdf(ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
|
||||
let shared_secret = tweak
|
||||
.diffie_hellman(&X25519PublicKey::from(*sk.diffie_hellman(&epk).as_bytes()));
|
||||
|
||||
|
|
|
@ -109,8 +109,7 @@ impl crate::Recipient for Recipient {
|
|||
)
|
||||
.expect("pubkey is valid and file key is not too long");
|
||||
|
||||
let encoded_tag =
|
||||
base64::encode_config(&ssh_tag(&ssh_key), base64::STANDARD_NO_PAD);
|
||||
let encoded_tag = base64::encode_config(&ssh_tag(ssh_key), base64::STANDARD_NO_PAD);
|
||||
|
||||
Ok(vec![Stanza {
|
||||
tag: SSH_RSA_RECIPIENT_TAG.to_owned(),
|
||||
|
@ -126,7 +125,7 @@ impl crate::Recipient for Recipient {
|
|||
let epk: X25519PublicKey = (&esk).into();
|
||||
|
||||
let tweak: StaticSecret =
|
||||
hkdf(&ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
|
||||
hkdf(ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
|
||||
let shared_secret =
|
||||
tweak.diffie_hellman(&(*esk.diffie_hellman(&pk).as_bytes()).into());
|
||||
|
||||
|
@ -141,8 +140,7 @@ impl crate::Recipient for Recipient {
|
|||
);
|
||||
let encrypted_file_key = aead_encrypt(&enc_key, file_key.expose_secret());
|
||||
|
||||
let encoded_tag =
|
||||
base64::encode_config(&ssh_tag(&ssh_key), base64::STANDARD_NO_PAD);
|
||||
let encoded_tag = base64::encode_config(&ssh_tag(ssh_key), base64::STANDARD_NO_PAD);
|
||||
let encoded_epk = base64::encode_config(epk.as_bytes(), base64::STANDARD_NO_PAD);
|
||||
|
||||
Ok(vec![Stanza {
|
||||
|
|
|
@ -164,7 +164,7 @@ fn mount_fs<T: FilesystemMT + Send + Sync + 'static, F>(
|
|||
where
|
||||
F: FnOnce() -> io::Result<T>,
|
||||
{
|
||||
let fuse_args: Vec<&OsStr> = vec![&OsStr::new("-o"), &OsStr::new("ro,auto_unmount")];
|
||||
let fuse_args: Vec<&OsStr> = vec![OsStr::new("-o"), OsStr::new("ro,auto_unmount")];
|
||||
|
||||
let fs = open().map(|fs| fuse_mt::FuseMT::new(fs, 1))?;
|
||||
info!("{}", fl!("info-mounting-as-fuse"));
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue