diff --git a/node/libs/crypto/src/bls12_381/mod.rs b/node/libs/crypto/src/bls12_381/mod.rs index 02ad6729..53e6ecda 100644 --- a/node/libs/crypto/src/bls12_381/mod.rs +++ b/node/libs/crypto/src/bls12_381/mod.rs @@ -230,5 +230,5 @@ pub enum Error { SignatureAggregation(BLST_ERROR), /// Infinity public key. #[error("Error infinity public key")] - InvalidInfinityPublicKey + InvalidInfinityPublicKey, } diff --git a/node/libs/crypto/src/bls12_381/tests.rs b/node/libs/crypto/src/bls12_381/tests.rs index 303a9145..5dec71ec 100644 --- a/node/libs/crypto/src/bls12_381/tests.rs +++ b/node/libs/crypto/src/bls12_381/tests.rs @@ -1,7 +1,6 @@ use super::*; use rand::{rngs::StdRng, Rng, SeedableRng}; use std::iter::repeat_with; -use assert_matches::assert_matches; // Test signing and verifying a random message #[test] diff --git a/node/libs/crypto/src/bn254/tests.rs b/node/libs/crypto/src/bn254/tests.rs index 944e1698..d4cd333e 100644 --- a/node/libs/crypto/src/bn254/tests.rs +++ b/node/libs/crypto/src/bn254/tests.rs @@ -25,18 +25,19 @@ fn signature_smoke() { #[test] fn test_decode_zero_secret_key_failure() { let mut bytes: [u8; 1000] = [0; 1000]; - bytes[0]=1; bytes[800]=1; + bytes[0] = 1; + bytes[800] = 1; SecretKey::decode(&bytes).expect_err("Oversized secret key decoded"); let mut bytes: [u8; 33] = [0; 33]; - bytes[0]=1; bytes[32]=1; + bytes[0] = 1; + bytes[32] = 1; SecretKey::decode(&bytes).expect_err("Oversized 33 bytes secret key decoded"); let bytes: [u8; 31] = [0; 31]; SecretKey::decode(&bytes).expect_err("Undersized secret key decoded"); } - #[test] fn signature_failure_smoke() { let mut rng = StdRng::seed_from_u64(29483920);