Skip to content
This repository has been archived by the owner on Oct 31, 2024. It is now read-only.

Fix clippy with latest nightly #32

Merged
merged 2 commits into from
Feb 27, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions src/ciphersuite.rs
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
//! The ciphersuite module to parameterize ICE-FROST sessions.

use core::fmt::Debug;
#[cfg(not(feature = "std"))]
use core::marker::{Send, Sync};

use aead::{Aead, KeyInit};
Expand Down
4 changes: 0 additions & 4 deletions src/dkg/key_generation.rs
Original file line number Diff line number Diff line change
Expand Up @@ -1185,15 +1185,11 @@ impl<C: CipherSuite> DistributedKeyGeneration<RoundTwo, C> {

#[cfg(test)]
mod test {
use core::ops::Mul;

use super::*;
use crate::dkg::{ComplaintProof, NizkPokOfSecretKey};
use crate::keys::IndividualVerifyingKey;
use crate::testing::Secp256k1Sha256;
use crate::{FromBytes, ToBytes};

use ark_ec::Group;
use ark_ff::UniformRand;
use ark_secp256k1::{Fr, Projective};

Expand Down
1 change: 0 additions & 1 deletion src/dkg/nizkpok.rs
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,6 @@ mod test {
use super::*;
use crate::testing::Secp256k1Sha256;

use ark_ec::Group;
use ark_secp256k1::{Fr, Projective};
use core::ops::Mul;
use rand::{rngs::OsRng, RngCore};
Expand Down
2 changes: 1 addition & 1 deletion src/dkg/secret_share.rs
Original file line number Diff line number Diff line change
Expand Up @@ -370,7 +370,7 @@ mod test {

use ark_ff::UniformRand;
use ark_secp256k1::Fr;
use rand::{rngs::OsRng, RngCore};
use rand::rngs::OsRng;

#[test]
fn test_serialization() {
Expand Down
2 changes: 1 addition & 1 deletion src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -1588,7 +1588,7 @@
//! let verified = threshold_signature.verify(alice_group_key, &message_hash)?;
//! ```

#![cfg_attr(not(feature = "std"), no_std)]
#![no_std]
#![cfg_attr(docsrs, feature(doc_cfg))]
#![deny(rustdoc::broken_intra_doc_links)]
#![deny(missing_debug_implementations)]
Expand Down
3 changes: 0 additions & 3 deletions src/sign/precomputation.rs
Original file line number Diff line number Diff line change
Expand Up @@ -232,13 +232,10 @@ mod test {
use super::*;
use crate::testing::Secp256k1Sha256;

use ark_ec::{CurveGroup, Group};
use ark_ff::UniformRand;
use ark_secp256k1::{Fr, Projective};
use rand::rngs::OsRng;

use core::ops::Mul;

#[test]
fn secret_pair() {
let secret_key = IndividualSigningKey::<Secp256k1Sha256> {
Expand Down
2 changes: 1 addition & 1 deletion src/sign/signature.rs
Original file line number Diff line number Diff line change
Expand Up @@ -715,7 +715,7 @@ mod test {

use ark_secp256k1::{Fr, Projective};

use ark_ff::{UniformRand, Zero};
use ark_ff::UniformRand;
use rand::rngs::OsRng;

fn do_keygen(
Expand Down
Loading