@@ -30,12 +30,12 @@ fn get_attrs(alg: &Mac, key_type: Type) -> Attributes {
30
30
let mut usage = UsageFlags :: default ( ) ;
31
31
let _ = usage. set_sign_hash ( ) . set_verify_hash ( ) ;
32
32
Attributes {
33
- key_type : key_type . clone ( ) ,
33
+ key_type,
34
34
bits : 256 ,
35
35
lifetime : Lifetime :: Volatile ,
36
36
policy : Policy {
37
37
usage_flags : usage,
38
- permitted_algorithms : Algorithm :: Mac ( alg. clone ( ) ) ,
38
+ permitted_algorithms : Algorithm :: Mac ( * alg) ,
39
39
} ,
40
40
}
41
41
}
@@ -47,7 +47,7 @@ fn test_mac_compute(mac_alg: Mac, key_type: Type, expected: &[u8]) -> Result<()>
47
47
let my_key = import ( attributes, None , & KEY ) ?;
48
48
let buffer_size = attributes. mac_length ( mac_alg) ?;
49
49
let mut mac = vec ! [ 0 ; buffer_size] ;
50
- let _size = compute_mac ( my_key, mac_alg, & MESSAGE , & mut mac) ?;
50
+ compute_mac ( my_key, mac_alg, & MESSAGE , & mut mac) ?;
51
51
assert_eq ! ( expected, mac) ;
52
52
Ok ( ( ) )
53
53
}
@@ -57,7 +57,7 @@ fn test_mac_verify(mac_alg: Mac, key_type: Type, expected: &[u8]) -> Result<()>
57
57
let attributes = get_attrs ( & mac_alg, key_type) ;
58
58
psa_crypto:: init ( ) ?;
59
59
let my_key = import ( attributes, None , & KEY ) ?;
60
- let _size = verify_mac ( my_key, mac_alg, & MESSAGE , & expected) ?;
60
+ verify_mac ( my_key, mac_alg, & MESSAGE , expected) ?;
61
61
Ok ( ( ) )
62
62
}
63
63
0 commit comments