From 58a5b6f2c67a385b32aa2c25dcbfa8d864cb9a6f Mon Sep 17 00:00:00 2001 From: Brian Smith Date: Thu, 6 Dec 2018 10:30:32 -1000 Subject: [PATCH] Clean up some more `use`s. --- src/aead/aes_gcm.rs | 9 ++++----- src/ec/suite_b/mod.rs | 3 +-- src/ec/suite_b/ops/mod.rs | 3 +-- src/ec/suite_b/public_key.rs | 3 +-- src/rsa/bigint.rs | 2 +- src/rsa/signing.rs | 2 +- 6 files changed, 9 insertions(+), 13 deletions(-) diff --git a/src/aead/aes_gcm.rs b/src/aead/aes_gcm.rs index 2d686c155..1e34d9447 100644 --- a/src/aead/aes_gcm.rs +++ b/src/aead/aes_gcm.rs @@ -136,9 +136,8 @@ extern "C" { #[cfg(test)] mod tests { - use super::AES_MAX_ROUNDS; - use bits::BitLength; - use crate::{c, test}; + use super::*; + use crate::{bits::BitLength, c, test}; #[test] pub fn test_aes() { @@ -206,11 +205,11 @@ mod tests { const NIST_SP800_38D_MAX_BITS: u64 = (1u64 << 39) - 256; assert_eq!(NIST_SP800_38D_MAX_BITS, 549_755_813_632u64); assert_eq!( - super::AES_128_GCM.max_input_len * 8, + AES_128_GCM.max_input_len * 8, NIST_SP800_38D_MAX_BITS ); assert_eq!( - super::AES_256_GCM.max_input_len * 8, + AES_256_GCM.max_input_len * 8, NIST_SP800_38D_MAX_BITS ); } diff --git a/src/ec/suite_b/mod.rs b/src/ec/suite_b/mod.rs index 25a867d30..9317ce831 100644 --- a/src/ec/suite_b/mod.rs +++ b/src/ec/suite_b/mod.rs @@ -15,8 +15,7 @@ //! Elliptic curve operations on P-256 & P-384. use self::ops::*; -use arithmetic::montgomery::*; -use crate::{der, ec, error, pkcs8}; +use crate::{arithmetic::montgomery::*, der, ec, error, pkcs8}; use untrusted; // NIST SP 800-56A Step 3: "If q is an odd prime p, verify that diff --git a/src/ec/suite_b/ops/mod.rs b/src/ec/suite_b/ops/mod.rs index e677b60ff..15b2f81ca 100644 --- a/src/ec/suite_b/ops/mod.rs +++ b/src/ec/suite_b/ops/mod.rs @@ -12,9 +12,8 @@ // OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. -use arithmetic::montgomery::*; use core::marker::PhantomData; -use crate::{c, error, limb::*}; +use crate::{arithmetic::montgomery::*, c, error, limb::*}; use untrusted; pub use self::elem::*; diff --git a/src/ec/suite_b/public_key.rs b/src/ec/suite_b/public_key.rs index e04793b58..fd655ddc7 100644 --- a/src/ec/suite_b/public_key.rs +++ b/src/ec/suite_b/public_key.rs @@ -16,8 +16,7 @@ //! ECDH agreement). use super::{ops::*, verify_affine_point_is_on_the_curve}; -use arithmetic::montgomery::*; -use crate::error; +use crate::{arithmetic::montgomery::*, error}; use untrusted; /// Parses a public key encoded in uncompressed form. The key is validated diff --git a/src/rsa/bigint.rs b/src/rsa/bigint.rs index f09ea8973..ddf453e8d 100644 --- a/src/rsa/bigint.rs +++ b/src/rsa/bigint.rs @@ -40,13 +40,13 @@ #![allow(box_pointers)] -use arithmetic::montgomery::*; use core::{ self, marker::PhantomData, ops::{Deref, DerefMut}, }; use crate::{ + arithmetic::montgomery::*, bits, c, error, limb::{self, Limb, LimbMask, LIMB_BITS, LIMB_BYTES}, untrusted, diff --git a/src/rsa/signing.rs b/src/rsa/signing.rs index 82e0faa0f..20444254d 100644 --- a/src/rsa/signing.rs +++ b/src/rsa/signing.rs @@ -16,9 +16,9 @@ use super::{ bigint::{self, Prime}, verification, N, }; -use arithmetic::montgomery::R; /// RSA PKCS#1 1.5 signatures. use crate::{ + arithmetic::montgomery::R, bits, der, digest, error::{self, KeyRejected}, pkcs8, rand,