From 6ed4369647ec5533c6833e746671900047ec05f0 Mon Sep 17 00:00:00 2001 From: Sergio Chouhy Date: Tue, 29 Jul 2025 15:24:17 -0300 Subject: [PATCH] clippy --- accounts/src/account_core/mod.rs | 2 -- accounts/src/key_management/mod.rs | 9 ++------- 2 files changed, 2 insertions(+), 9 deletions(-) diff --git a/accounts/src/account_core/mod.rs b/accounts/src/account_core/mod.rs index 76aaee7..1926649 100644 --- a/accounts/src/account_core/mod.rs +++ b/accounts/src/account_core/mod.rs @@ -223,8 +223,6 @@ impl Default for Account { #[cfg(test)] mod tests { - use common::transaction::SignaturePrivateKey; - use super::*; fn generate_dummy_utxo(address: TreeHashType, amount: u128) -> UTXO { diff --git a/accounts/src/key_management/mod.rs b/accounts/src/key_management/mod.rs index 4d51b2b..69a39f7 100644 --- a/accounts/src/key_management/mod.rs +++ b/accounts/src/key_management/mod.rs @@ -1,5 +1,4 @@ use aes_gcm::{aead::Aead, Aes256Gcm, KeyInit}; -use common::{merkle_tree_public::TreeHashType, transaction::SignaturePublicKey}; use constants_types::{CipherText, Nonce}; use elliptic_curve::point::AffineCoordinates; use k256::{ecdsa::SigningKey, AffinePoint, FieldBytes}; @@ -7,7 +6,6 @@ use log::info; use rand::{rngs::OsRng, RngCore}; use secret_holders::{SeedHolder, TopSecretKeyHolder, UTXOSecretKeyHolder}; use serde::{Deserialize, Serialize}; -use tiny_keccak::{Hasher, Keccak}; use crate::account_core::PublicKey; pub type PublicAccountSigningKey = [u8; 32]; @@ -124,7 +122,7 @@ mod tests { use elliptic_curve::point::AffineCoordinates; use k256::{AffinePoint, ProjectivePoint, Scalar}; - use crate::key_management::ephemeral_key_holder::EphemeralKeyHolder; + use crate::{account_core::address, key_management::ephemeral_key_holder::EphemeralKeyHolder}; use super::*; @@ -351,10 +349,7 @@ mod tests { let verifying_key = signing_key.verifying_key(); - let mut address = [0; 32]; - let mut keccak_hasher = Keccak::v256(); - keccak_hasher.update(&verifying_key.to_sec1_bytes()); - keccak_hasher.finalize(&mut address); + let address = address::from_public_key(verifying_key); println!("======Prerequisites======"); println!();