From 538ac500da7dd8fa3034f57ef288c25592f67b8f Mon Sep 17 00:00:00 2001 From: Jack Grigg Date: Wed, 16 Mar 2022 03:52:04 +0000 Subject: [PATCH] clippy: Remove needless borrows --- age-plugin/src/identity.rs | 10 +++++----- age-plugin/src/recipient.rs | 14 +++++++------- age/src/primitives/armor.rs | 6 +++--- age/src/primitives/stream.rs | 8 ++++---- age/src/protocol.rs | 2 +- age/src/ssh.rs | 6 +++--- age/src/ssh/identity.rs | 6 +++--- age/src/ssh/recipient.rs | 8 +++----- rage/src/bin/rage-mount/main.rs | 2 +- 9 files changed, 30 insertions(+), 32 deletions(-) diff --git a/age-plugin/src/identity.rs b/age-plugin/src/identity.rs index ed256b4..b102c0c 100644 --- a/age-plugin/src/identity.rs +++ b/age-plugin/src/identity.rs @@ -134,9 +134,9 @@ impl Error { fn message(&self) -> &str { match self { - Error::Identity { message, .. } => &message, - Error::Internal { message } => &message, - Error::Stanza { message, .. } => &message, + Error::Identity { message, .. } => message, + Error::Internal { message } => message, + Error::Stanza { message, .. } => message, } } @@ -152,8 +152,8 @@ impl Error { }; let metadata = match &index { - Some((file_index, Some(stanza_index))) => vec![self.kind(), &file_index, &stanza_index], - Some((index, None)) => vec![self.kind(), &index], + Some((file_index, Some(stanza_index))) => vec![self.kind(), file_index, stanza_index], + Some((index, None)) => vec![self.kind(), index], None => vec![self.kind()], }; diff --git a/age-plugin/src/recipient.rs b/age-plugin/src/recipient.rs index 5fbdc42..6ac626d 100644 --- a/age-plugin/src/recipient.rs +++ b/age-plugin/src/recipient.rs @@ -128,9 +128,9 @@ impl Error { fn message(&self) -> &str { match self { - Error::Recipient { message, .. } => &message, - Error::Identity { message, .. } => &message, - Error::Internal { message } => &message, + Error::Recipient { message, .. } => message, + Error::Identity { message, .. } => message, + Error::Internal { message } => message, } } @@ -143,7 +143,7 @@ impl Error { }; let metadata = match &index { - Some(index) => vec![self.kind(), &index], + Some(index) => vec![self.kind(), index], None => vec![self.kind()], }; @@ -230,7 +230,7 @@ pub(crate) fn run_v1(mut plugin: P) -> io::Result<()> { .as_ref() .and_then(|(hrp, data, variant)| match (plugin_name(hrp), variant) { (Some(plugin_name), &bech32::Variant::Bech32) => { - Vec::from_base32(&data).ok().map(|data| (plugin_name, data)) + Vec::from_base32(data).ok().map(|data| (plugin_name, data)) } _ => None, }) @@ -254,7 +254,7 @@ pub(crate) fn run_v1(mut plugin: P) -> io::Result<()> { index, message: "Invalid recipient encoding".to_owned(), }, - |index, plugin_name, bytes| plugin.add_recipient(index, &plugin_name, &bytes), + |index, plugin_name, bytes| plugin.add_recipient(index, plugin_name, &bytes), ); let identities = parse_and_add( identities, @@ -269,7 +269,7 @@ pub(crate) fn run_v1(mut plugin: P) -> io::Result<()> { index, message: "Invalid identity encoding".to_owned(), }, - |index, plugin_name, bytes| plugin.add_identity(index, &plugin_name, &bytes), + |index, plugin_name, bytes| plugin.add_identity(index, plugin_name, &bytes), ); // Phase 2: wrap the file keys or return errors diff --git a/age/src/primitives/armor.rs b/age/src/primitives/armor.rs index a696502..b0949af 100644 --- a/age/src/primitives/armor.rs +++ b/age/src/primitives/armor.rs @@ -210,7 +210,7 @@ impl AsyncWrite for LineEndingWriter { // line must be written in poll_close(). if !buf.is_empty() { *this.line_with_ending = Some(EncodedLine { - bytes: [&line, LINE_ENDING.as_bytes()].concat(), + bytes: [line, LINE_ENDING.as_bytes()].concat(), offset: 0, }); line.clear(); @@ -240,7 +240,7 @@ impl AsyncWrite for LineEndingWriter { // marker. *this.line_with_ending = Some(EncodedLine { bytes: [ - &line, + line, LINE_ENDING.as_bytes(), ARMORED_END_MARKER.as_bytes(), LINE_ENDING.as_bytes(), @@ -1080,7 +1080,7 @@ mod tests { let mut tmp = &data[..]; loop { - match w.as_mut().poll_write(&mut cx, &tmp) { + match w.as_mut().poll_write(&mut cx, tmp) { Poll::Ready(Ok(0)) => break, Poll::Ready(Ok(written)) => tmp = &tmp[written..], Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e), diff --git a/age/src/primitives/stream.rs b/age/src/primitives/stream.rs index 54cdf98..3da7d02 100644 --- a/age/src/primitives/stream.rs +++ b/age/src/primitives/stream.rs @@ -324,7 +324,7 @@ impl AsyncWrite for StreamWriter { if !buf.is_empty() { let this = self.as_mut().project(); *this.encrypted_chunk = Some(EncryptedChunk { - bytes: this.stream.encrypt_chunk(&this.chunk, false)?, + bytes: this.stream.encrypt_chunk(this.chunk, false)?, offset: 0, }); this.chunk.clear(); @@ -346,7 +346,7 @@ impl AsyncWrite for StreamWriter { // Finish the stream. let this = self.as_mut().project(); *this.encrypted_chunk = Some(EncryptedChunk { - bytes: this.stream.encrypt_chunk(&this.chunk, true)?, + bytes: this.stream.encrypt_chunk(this.chunk, true)?, offset: 0, }); } @@ -719,7 +719,7 @@ mod tests { let mut encrypted = vec![]; { let mut w = Stream::encrypt(PayloadKey([7; 32].into()), &mut encrypted); - w.write_all(&data).unwrap(); + w.write_all(data).unwrap(); w.finish().unwrap(); }; @@ -759,7 +759,7 @@ mod tests { let mut tmp = data; loop { - match w.as_mut().poll_write(&mut cx, &tmp) { + match w.as_mut().poll_write(&mut cx, tmp) { Poll::Ready(Ok(0)) => break, Poll::Ready(Ok(written)) => tmp = &tmp[written..], Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e), diff --git a/age/src/protocol.rs b/age/src/protocol.rs index 3ed37da..042504d 100644 --- a/age/src/protocol.rs +++ b/age/src/protocol.rs @@ -287,7 +287,7 @@ mod tests { let mut tmp = &test_msg[..]; loop { - match w.as_mut().poll_write(&mut cx, &tmp) { + match w.as_mut().poll_write(&mut cx, tmp) { Poll::Ready(Ok(0)) => break, Poll::Ready(Ok(written)) => tmp = &tmp[written..], Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e), diff --git a/age/src/ssh.rs b/age/src/ssh.rs index 791e7e3..308d228 100644 --- a/age/src/ssh.rs +++ b/age/src/ssh.rs @@ -80,7 +80,7 @@ impl OpenSshKdf { match self { OpenSshKdf::Bcrypt { salt, rounds } => { let mut output = vec![0; out_len]; - bcrypt_pbkdf(passphrase.expose_secret(), &salt, *rounds, &mut output) + bcrypt_pbkdf(passphrase.expose_secret(), salt, *rounds, &mut output) .expect("parameters are valid"); output } @@ -132,7 +132,7 @@ mod decrypt { let cipher = C::new_from_slices(key, iv).expect("key and IV are correct length"); cipher - .decrypt_padded_vec_mut::(&ciphertext) + .decrypt_padded_vec_mut::(ciphertext) .map_err(|_| DecryptError::KeyDecryptionFailed) } @@ -416,7 +416,7 @@ mod read_ssh { map_opt(tuple((string, string)), |(pubkey_bytes, privkey_bytes)| { if privkey_bytes.len() == 64 && pubkey_bytes == &privkey_bytes[32..64] { let mut privkey = [0; 64]; - privkey.copy_from_slice(&privkey_bytes); + privkey.copy_from_slice(privkey_bytes); Some(Secret::new(privkey)) } else { None diff --git a/age/src/ssh/identity.rs b/age/src/ssh/identity.rs index 3aef524..3163b05 100644 --- a/age/src/ssh/identity.rs +++ b/age/src/ssh/identity.rs @@ -48,7 +48,7 @@ impl UnencryptedKey { match (self, stanza.tag.as_str()) { (UnencryptedKey::SshRsa(ssh_key, sk), SSH_RSA_RECIPIENT_TAG) => { let tag = base64_arg(stanza.args.get(0)?, [0; TAG_LEN_BYTES])?; - if ssh_tag(&ssh_key) != tag { + if ssh_tag(ssh_key) != tag { return None; } @@ -73,7 +73,7 @@ impl UnencryptedKey { } (UnencryptedKey::SshEd25519(ssh_key, privkey), SSH_ED25519_RECIPIENT_TAG) => { let tag = base64_arg(stanza.args.get(0)?, [0; TAG_LEN_BYTES])?; - if ssh_tag(&ssh_key) != tag { + if ssh_tag(ssh_key) != tag { return None; } if stanza.body.len() != crate::x25519::ENCRYPTED_FILE_KEY_BYTES { @@ -92,7 +92,7 @@ impl UnencryptedKey { let pk = X25519PublicKey::from(&sk); let tweak: StaticSecret = - hkdf(&ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into(); + hkdf(ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into(); let shared_secret = tweak .diffie_hellman(&X25519PublicKey::from(*sk.diffie_hellman(&epk).as_bytes())); diff --git a/age/src/ssh/recipient.rs b/age/src/ssh/recipient.rs index bfa600d..2b84715 100644 --- a/age/src/ssh/recipient.rs +++ b/age/src/ssh/recipient.rs @@ -109,8 +109,7 @@ impl crate::Recipient for Recipient { ) .expect("pubkey is valid and file key is not too long"); - let encoded_tag = - base64::encode_config(&ssh_tag(&ssh_key), base64::STANDARD_NO_PAD); + let encoded_tag = base64::encode_config(&ssh_tag(ssh_key), base64::STANDARD_NO_PAD); Ok(vec![Stanza { tag: SSH_RSA_RECIPIENT_TAG.to_owned(), @@ -126,7 +125,7 @@ impl crate::Recipient for Recipient { let epk: X25519PublicKey = (&esk).into(); let tweak: StaticSecret = - hkdf(&ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into(); + hkdf(ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into(); let shared_secret = tweak.diffie_hellman(&(*esk.diffie_hellman(&pk).as_bytes()).into()); @@ -141,8 +140,7 @@ impl crate::Recipient for Recipient { ); let encrypted_file_key = aead_encrypt(&enc_key, file_key.expose_secret()); - let encoded_tag = - base64::encode_config(&ssh_tag(&ssh_key), base64::STANDARD_NO_PAD); + let encoded_tag = base64::encode_config(&ssh_tag(ssh_key), base64::STANDARD_NO_PAD); let encoded_epk = base64::encode_config(epk.as_bytes(), base64::STANDARD_NO_PAD); Ok(vec![Stanza { diff --git a/rage/src/bin/rage-mount/main.rs b/rage/src/bin/rage-mount/main.rs index 98b6bd1..e25e49a 100644 --- a/rage/src/bin/rage-mount/main.rs +++ b/rage/src/bin/rage-mount/main.rs @@ -164,7 +164,7 @@ fn mount_fs( where F: FnOnce() -> io::Result, { - let fuse_args: Vec<&OsStr> = vec![&OsStr::new("-o"), &OsStr::new("ro,auto_unmount")]; + let fuse_args: Vec<&OsStr> = vec![OsStr::new("-o"), OsStr::new("ro,auto_unmount")]; let fs = open().map(|fs| fuse_mt::FuseMT::new(fs, 1))?; info!("{}", fl!("info-mounting-as-fuse"));