From 361d43cccbdf8f523ccf6ac8e5267c88a9f02af5 Mon Sep 17 00:00:00 2001 From: Denis Kolegov Date: Fri, 5 Apr 2024 13:46:18 +0200 Subject: [PATCH] fix fmt --- node/libs/crypto/src/bls12_381/mod.rs | 2 +- node/libs/crypto/src/bls12_381/tests.rs | 1 - node/libs/crypto/src/bn254/tests.rs | 7 ++++--- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/node/libs/crypto/src/bls12_381/mod.rs b/node/libs/crypto/src/bls12_381/mod.rs index 02ad6729..53e6ecda 100644 --- a/node/libs/crypto/src/bls12_381/mod.rs +++ b/node/libs/crypto/src/bls12_381/mod.rs @@ -230,5 +230,5 @@ pub enum Error { SignatureAggregation(BLST_ERROR), /// Infinity public key. #[error("Error infinity public key")] - InvalidInfinityPublicKey + InvalidInfinityPublicKey, } diff --git a/node/libs/crypto/src/bls12_381/tests.rs b/node/libs/crypto/src/bls12_381/tests.rs index 303a9145..5dec71ec 100644 --- a/node/libs/crypto/src/bls12_381/tests.rs +++ b/node/libs/crypto/src/bls12_381/tests.rs @@ -1,7 +1,6 @@ use super::*; use rand::{rngs::StdRng, Rng, SeedableRng}; use std::iter::repeat_with; -use assert_matches::assert_matches; // Test signing and verifying a random message #[test] diff --git a/node/libs/crypto/src/bn254/tests.rs b/node/libs/crypto/src/bn254/tests.rs index 944e1698..d4cd333e 100644 --- a/node/libs/crypto/src/bn254/tests.rs +++ b/node/libs/crypto/src/bn254/tests.rs @@ -25,18 +25,19 @@ fn signature_smoke() { #[test] fn test_decode_zero_secret_key_failure() { let mut bytes: [u8; 1000] = [0; 1000]; - bytes[0]=1; bytes[800]=1; + bytes[0] = 1; + bytes[800] = 1; SecretKey::decode(&bytes).expect_err("Oversized secret key decoded"); let mut bytes: [u8; 33] = [0; 33]; - bytes[0]=1; bytes[32]=1; + bytes[0] = 1; + bytes[32] = 1; SecretKey::decode(&bytes).expect_err("Oversized 33 bytes secret key decoded"); let bytes: [u8; 31] = [0; 31]; SecretKey::decode(&bytes).expect_err("Undersized secret key decoded"); } - #[test] fn signature_failure_smoke() { let mut rng = StdRng::seed_from_u64(29483920);