clippy: Remove needless borrows

This commit is contained in:
Jack Grigg 2022-03-16 03:52:04 +00:00
parent 4df2fac3e1
commit 538ac500da
9 changed files with 30 additions and 32 deletions

View file

@ -134,9 +134,9 @@ impl Error {
fn message(&self) -> &str {
match self {
Error::Identity { message, .. } => &message,
Error::Internal { message } => &message,
Error::Stanza { message, .. } => &message,
Error::Identity { message, .. } => message,
Error::Internal { message } => message,
Error::Stanza { message, .. } => message,
}
}
@ -152,8 +152,8 @@ impl Error {
};
let metadata = match &index {
Some((file_index, Some(stanza_index))) => vec![self.kind(), &file_index, &stanza_index],
Some((index, None)) => vec![self.kind(), &index],
Some((file_index, Some(stanza_index))) => vec![self.kind(), file_index, stanza_index],
Some((index, None)) => vec![self.kind(), index],
None => vec![self.kind()],
};

View file

@ -128,9 +128,9 @@ impl Error {
fn message(&self) -> &str {
match self {
Error::Recipient { message, .. } => &message,
Error::Identity { message, .. } => &message,
Error::Internal { message } => &message,
Error::Recipient { message, .. } => message,
Error::Identity { message, .. } => message,
Error::Internal { message } => message,
}
}
@ -143,7 +143,7 @@ impl Error {
};
let metadata = match &index {
Some(index) => vec![self.kind(), &index],
Some(index) => vec![self.kind(), index],
None => vec![self.kind()],
};
@ -230,7 +230,7 @@ pub(crate) fn run_v1<P: RecipientPluginV1>(mut plugin: P) -> io::Result<()> {
.as_ref()
.and_then(|(hrp, data, variant)| match (plugin_name(hrp), variant) {
(Some(plugin_name), &bech32::Variant::Bech32) => {
Vec::from_base32(&data).ok().map(|data| (plugin_name, data))
Vec::from_base32(data).ok().map(|data| (plugin_name, data))
}
_ => None,
})
@ -254,7 +254,7 @@ pub(crate) fn run_v1<P: RecipientPluginV1>(mut plugin: P) -> io::Result<()> {
index,
message: "Invalid recipient encoding".to_owned(),
},
|index, plugin_name, bytes| plugin.add_recipient(index, &plugin_name, &bytes),
|index, plugin_name, bytes| plugin.add_recipient(index, plugin_name, &bytes),
);
let identities = parse_and_add(
identities,
@ -269,7 +269,7 @@ pub(crate) fn run_v1<P: RecipientPluginV1>(mut plugin: P) -> io::Result<()> {
index,
message: "Invalid identity encoding".to_owned(),
},
|index, plugin_name, bytes| plugin.add_identity(index, &plugin_name, &bytes),
|index, plugin_name, bytes| plugin.add_identity(index, plugin_name, &bytes),
);
// Phase 2: wrap the file keys or return errors

View file

@ -210,7 +210,7 @@ impl<W: AsyncWrite> AsyncWrite for LineEndingWriter<W> {
// line must be written in poll_close().
if !buf.is_empty() {
*this.line_with_ending = Some(EncodedLine {
bytes: [&line, LINE_ENDING.as_bytes()].concat(),
bytes: [line, LINE_ENDING.as_bytes()].concat(),
offset: 0,
});
line.clear();
@ -240,7 +240,7 @@ impl<W: AsyncWrite> AsyncWrite for LineEndingWriter<W> {
// marker.
*this.line_with_ending = Some(EncodedLine {
bytes: [
&line,
line,
LINE_ENDING.as_bytes(),
ARMORED_END_MARKER.as_bytes(),
LINE_ENDING.as_bytes(),
@ -1080,7 +1080,7 @@ mod tests {
let mut tmp = &data[..];
loop {
match w.as_mut().poll_write(&mut cx, &tmp) {
match w.as_mut().poll_write(&mut cx, tmp) {
Poll::Ready(Ok(0)) => break,
Poll::Ready(Ok(written)) => tmp = &tmp[written..],
Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e),

View file

@ -324,7 +324,7 @@ impl<W: AsyncWrite> AsyncWrite for StreamWriter<W> {
if !buf.is_empty() {
let this = self.as_mut().project();
*this.encrypted_chunk = Some(EncryptedChunk {
bytes: this.stream.encrypt_chunk(&this.chunk, false)?,
bytes: this.stream.encrypt_chunk(this.chunk, false)?,
offset: 0,
});
this.chunk.clear();
@ -346,7 +346,7 @@ impl<W: AsyncWrite> AsyncWrite for StreamWriter<W> {
// Finish the stream.
let this = self.as_mut().project();
*this.encrypted_chunk = Some(EncryptedChunk {
bytes: this.stream.encrypt_chunk(&this.chunk, true)?,
bytes: this.stream.encrypt_chunk(this.chunk, true)?,
offset: 0,
});
}
@ -719,7 +719,7 @@ mod tests {
let mut encrypted = vec![];
{
let mut w = Stream::encrypt(PayloadKey([7; 32].into()), &mut encrypted);
w.write_all(&data).unwrap();
w.write_all(data).unwrap();
w.finish().unwrap();
};
@ -759,7 +759,7 @@ mod tests {
let mut tmp = data;
loop {
match w.as_mut().poll_write(&mut cx, &tmp) {
match w.as_mut().poll_write(&mut cx, tmp) {
Poll::Ready(Ok(0)) => break,
Poll::Ready(Ok(written)) => tmp = &tmp[written..],
Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e),

View file

@ -287,7 +287,7 @@ mod tests {
let mut tmp = &test_msg[..];
loop {
match w.as_mut().poll_write(&mut cx, &tmp) {
match w.as_mut().poll_write(&mut cx, tmp) {
Poll::Ready(Ok(0)) => break,
Poll::Ready(Ok(written)) => tmp = &tmp[written..],
Poll::Ready(Err(e)) => panic!("Unexpected error: {}", e),

View file

@ -80,7 +80,7 @@ impl OpenSshKdf {
match self {
OpenSshKdf::Bcrypt { salt, rounds } => {
let mut output = vec![0; out_len];
bcrypt_pbkdf(passphrase.expose_secret(), &salt, *rounds, &mut output)
bcrypt_pbkdf(passphrase.expose_secret(), salt, *rounds, &mut output)
.expect("parameters are valid");
output
}
@ -132,7 +132,7 @@ mod decrypt {
let cipher = C::new_from_slices(key, iv).expect("key and IV are correct length");
cipher
.decrypt_padded_vec_mut::<NoPadding>(&ciphertext)
.decrypt_padded_vec_mut::<NoPadding>(ciphertext)
.map_err(|_| DecryptError::KeyDecryptionFailed)
}
@ -416,7 +416,7 @@ mod read_ssh {
map_opt(tuple((string, string)), |(pubkey_bytes, privkey_bytes)| {
if privkey_bytes.len() == 64 && pubkey_bytes == &privkey_bytes[32..64] {
let mut privkey = [0; 64];
privkey.copy_from_slice(&privkey_bytes);
privkey.copy_from_slice(privkey_bytes);
Some(Secret::new(privkey))
} else {
None

View file

@ -48,7 +48,7 @@ impl UnencryptedKey {
match (self, stanza.tag.as_str()) {
(UnencryptedKey::SshRsa(ssh_key, sk), SSH_RSA_RECIPIENT_TAG) => {
let tag = base64_arg(stanza.args.get(0)?, [0; TAG_LEN_BYTES])?;
if ssh_tag(&ssh_key) != tag {
if ssh_tag(ssh_key) != tag {
return None;
}
@ -73,7 +73,7 @@ impl UnencryptedKey {
}
(UnencryptedKey::SshEd25519(ssh_key, privkey), SSH_ED25519_RECIPIENT_TAG) => {
let tag = base64_arg(stanza.args.get(0)?, [0; TAG_LEN_BYTES])?;
if ssh_tag(&ssh_key) != tag {
if ssh_tag(ssh_key) != tag {
return None;
}
if stanza.body.len() != crate::x25519::ENCRYPTED_FILE_KEY_BYTES {
@ -92,7 +92,7 @@ impl UnencryptedKey {
let pk = X25519PublicKey::from(&sk);
let tweak: StaticSecret =
hkdf(&ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
hkdf(ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
let shared_secret = tweak
.diffie_hellman(&X25519PublicKey::from(*sk.diffie_hellman(&epk).as_bytes()));

View file

@ -109,8 +109,7 @@ impl crate::Recipient for Recipient {
)
.expect("pubkey is valid and file key is not too long");
let encoded_tag =
base64::encode_config(&ssh_tag(&ssh_key), base64::STANDARD_NO_PAD);
let encoded_tag = base64::encode_config(&ssh_tag(ssh_key), base64::STANDARD_NO_PAD);
Ok(vec![Stanza {
tag: SSH_RSA_RECIPIENT_TAG.to_owned(),
@ -126,7 +125,7 @@ impl crate::Recipient for Recipient {
let epk: X25519PublicKey = (&esk).into();
let tweak: StaticSecret =
hkdf(&ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
hkdf(ssh_key, SSH_ED25519_RECIPIENT_KEY_LABEL, &[]).into();
let shared_secret =
tweak.diffie_hellman(&(*esk.diffie_hellman(&pk).as_bytes()).into());
@ -141,8 +140,7 @@ impl crate::Recipient for Recipient {
);
let encrypted_file_key = aead_encrypt(&enc_key, file_key.expose_secret());
let encoded_tag =
base64::encode_config(&ssh_tag(&ssh_key), base64::STANDARD_NO_PAD);
let encoded_tag = base64::encode_config(&ssh_tag(ssh_key), base64::STANDARD_NO_PAD);
let encoded_epk = base64::encode_config(epk.as_bytes(), base64::STANDARD_NO_PAD);
Ok(vec![Stanza {

View file

@ -164,7 +164,7 @@ fn mount_fs<T: FilesystemMT + Send + Sync + 'static, F>(
where
F: FnOnce() -> io::Result<T>,
{
let fuse_args: Vec<&OsStr> = vec![&OsStr::new("-o"), &OsStr::new("ro,auto_unmount")];
let fuse_args: Vec<&OsStr> = vec![OsStr::new("-o"), OsStr::new("ro,auto_unmount")];
let fs = open().map(|fs| fuse_mt::FuseMT::new(fs, 1))?;
info!("{}", fl!("info-mounting-as-fuse"));