Skip to content

Commit 670c6a7

Browse files
committed
Cleanup
1 parent 8722077 commit 670c6a7

File tree

5 files changed

+13
-17
lines changed

5 files changed

+13
-17
lines changed

crates/bitwarden-crypto/examples/signature.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ fn main() {
3838
.expect("Failed to sign message");
3939

4040
// Alice sends the signed object to Bob
41-
mock_server.upload("signature", signature.to_cose().as_ref().to_vec());
41+
mock_server.upload("signature", signature.to_cose().to_vec());
4242
mock_server.upload("serialized_message", serialized_message.as_bytes().to_vec());
4343

4444
// Bob retrieves the signed object from the server
@@ -78,7 +78,7 @@ fn main() {
7878
)
7979
.expect("Failed to counter sign message");
8080
// Bob sends the counter signature to Charlie
81-
mock_server.upload("bobs_signature", bobs_signature.to_cose().as_ref().to_vec());
81+
mock_server.upload("bobs_signature", bobs_signature.to_cose().to_vec());
8282

8383
// Charlie retrieves the signatures, and the message
8484
let retrieved_serialized_message = bitwarden_crypto::SerializedMessage::from_bytes(

crates/bitwarden-crypto/examples/signed_object.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ fn main() {
3636
.expect("Failed to sign message");
3737

3838
// Alice sends the signed object to Bob
39-
mock_server.upload("signed_object", signed_object.to_cose().as_ref().to_vec());
39+
mock_server.upload("signed_object", signed_object.to_cose().to_vec());
4040

4141
// Bob retrieves the signed object from the server
4242
let retrieved_signed_object = SignedObject::from_cose(&Bytes::<CoseSign1ContentFormat>::from(

crates/bitwarden-crypto/src/keys/asymmetric_crypto_key.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,8 @@ DnqOsltgPomWZ7xVfMkm9niL2OA=
211211
assert_eq!(pem_key.to_der().unwrap(), der_key.to_der().unwrap());
212212

213213
// Check that the keys can be converted back to DER
214-
assert_eq!(der_key.to_der().unwrap().as_ref().to_vec(), der_key_vec);
215-
assert_eq!(pem_key.to_der().unwrap().as_ref().to_vec(), der_key_vec);
214+
assert_eq!(der_key.to_der().unwrap().to_vec(), der_key_vec);
215+
assert_eq!(pem_key.to_der().unwrap().to_vec(), der_key_vec);
216216
}
217217

218218
#[test]

crates/bitwarden-crypto/src/keys/signed_public_key.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ pub struct SignedPublicKey(pub(crate) SignedObject);
8282

8383
impl From<SignedPublicKey> for Vec<u8> {
8484
fn from(val: SignedPublicKey) -> Self {
85-
val.0.to_cose().as_ref().to_vec()
85+
val.0.to_cose().to_vec()
8686
}
8787
}
8888

crates/bitwarden-wasm-internal/src/pure_crypto.rs

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ impl PureCrypto {
302302
let bytes = Self::symmetric_decrypt_bytes(signing_key, wrapping_key)?;
303303
let signing_key = SigningKey::from_cose(&Bytes::<CoseKeyContentFormat>::from(bytes))?;
304304
let verifying_key = signing_key.to_verifying_key();
305-
Ok(verifying_key.to_cose().as_ref().to_vec())
305+
Ok(verifying_key.to_cose().to_vec())
306306
}
307307

308308
/// Returns the algorithm used for the given verifying key.
@@ -329,7 +329,7 @@ impl PureCrypto {
329329
signed_public_key
330330
.verify_and_unwrap(&verifying_key)
331331
.map(|public_key| public_key.to_der())?
332-
.map(|pk| pk.as_ref().to_vec())
332+
.map(|pk| pk.to_vec())
333333
}
334334
}
335335

@@ -575,16 +575,13 @@ DnqOsltgPomWZ7xVfMkm9niL2OA=
575575
let decapsulation_key = AsymmetricCryptoKey::from_pem(PEM_KEY).unwrap();
576576
let wrapping_key = PureCrypto::make_user_key_aes256_cbc_hmac();
577577
let wrapped_key = PureCrypto::wrap_decapsulation_key(
578-
decapsulation_key.to_der().unwrap().as_ref().to_vec(),
578+
decapsulation_key.to_der().unwrap().to_vec(),
579579
wrapping_key.clone(),
580580
)
581581
.unwrap();
582582
let unwrapped_key =
583583
PureCrypto::unwrap_decapsulation_key(wrapped_key, wrapping_key).unwrap();
584-
assert_eq!(
585-
decapsulation_key.to_der().unwrap().as_ref().to_vec(),
586-
unwrapped_key
587-
);
584+
assert_eq!(decapsulation_key.to_der().unwrap().to_vec(), unwrapped_key);
588585
}
589586

590587
#[test]
@@ -594,12 +591,12 @@ DnqOsltgPomWZ7xVfMkm9niL2OA=
594591
let encapsulation_key = decapsulation_key.to_public_key().to_der().unwrap();
595592
let encapsulated_key = PureCrypto::encapsulate_key_unsigned(
596593
shared_key.clone(),
597-
encapsulation_key.clone().as_ref().to_vec(),
594+
encapsulation_key.clone().to_vec(),
598595
)
599596
.unwrap();
600597
let unwrapped_key = PureCrypto::decapsulate_key_unsigned(
601598
encapsulated_key,
602-
decapsulation_key.to_der().unwrap().as_ref().to_vec(),
599+
decapsulation_key.to_der().unwrap().to_vec(),
603600
)
604601
.unwrap();
605602
assert_eq!(shared_key, unwrapped_key);
@@ -611,8 +608,7 @@ DnqOsltgPomWZ7xVfMkm9niL2OA=
611608
VerifyingKey::from_cose(&Bytes::<CoseKeyContentFormat>::from(VERIFYING_KEY.to_vec()))
612609
.unwrap();
613610
let algorithm =
614-
PureCrypto::key_algorithm_for_verifying_key(verifying_key.to_cose().as_ref().to_vec())
615-
.unwrap();
611+
PureCrypto::key_algorithm_for_verifying_key(verifying_key.to_cose().to_vec()).unwrap();
616612
assert_eq!(algorithm, SignatureAlgorithm::Ed25519);
617613
}
618614

0 commit comments

Comments
 (0)