Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 7e69b7b

Browse files
committedMay 22, 2025··
Run cargo fmt
1 parent 88b96b7 commit 7e69b7b

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed
 

‎crates/bitwarden-crypto/src/store/context.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ use crate::{
1515
/// The context of a crypto operation using [super::KeyStore]
1616
///
1717
/// This will usually be accessed from an implementation of [crate::Decryptable] or
18-
/// [crate::Encryptable], [crate::PrimitiveEncryptableWithContentType], but can also be obtained through
19-
/// [super::KeyStore::context]
18+
/// [crate::Encryptable], [crate::PrimitiveEncryptableWithContentType], but can also be obtained
19+
/// through [super::KeyStore::context]
2020
///
2121
/// This context contains access to the user keys stored in the [super::KeyStore] (sometimes
2222
/// referred to as `global keys`) and it also contains it's own individual secure backend for key

‎crates/bitwarden-crypto/src/store/mod.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -143,11 +143,11 @@ impl<Ids: KeyIds> KeyStore<Ids> {
143143
/// future to also not be [Send].
144144
///
145145
/// Some other possible use cases for this API and alternative recommendations are:
146-
/// - Decrypting or encrypting multiple [Decryptable] or [CompositeEncryptable] items while sharing any
147-
/// local keys. This is not recommended as it can lead to fragile and flaky
146+
/// - Decrypting or encrypting multiple [Decryptable] or [CompositeEncryptable] items while
147+
/// sharing any local keys. This is not recommended as it can lead to fragile and flaky
148148
/// decryption/encryption operations. We recommend any local keys to be used only in the
149-
/// context of a single [CompositeEncryptable] or [Decryptable] implementation. In the future we might
150-
/// enforce this.
149+
/// context of a single [CompositeEncryptable] or [Decryptable] implementation. In the future
150+
/// we might enforce this.
151151
/// - Obtaining the key material directly. We strongly recommend against doing this as it can
152152
/// lead to key material being leaked, but we need to support it for backwards compatibility.
153153
/// If you want to access the key material to encrypt it or derive a new key from it, we
@@ -310,7 +310,7 @@ pub(crate) mod tests {
310310
use crate::{
311311
store::{KeyStore, KeyStoreContext},
312312
traits::tests::{TestIds, TestSymmKey},
313-
EncString, SymmetricCryptoKey, PrimitiveEncryptableWithContentType,
313+
EncString, PrimitiveEncryptableWithContentType, SymmetricCryptoKey,
314314
};
315315

316316
pub struct DataView(pub String, pub TestSymmKey);

0 commit comments

Comments
 (0)
Please sign in to comment.