tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 47c329902d6d63ff0e024acc2503d4331ef43de8
parent 08e575463a44c709600c2135acd8d9a3017a93bd
Author: David Goulet <dgoulet@torproject.org>
Date:   Fri, 25 Aug 2023 16:50:30 +0000

Merge branch 'rust-lint-1.72' into 'main'

fix lint clippy::arc_with_non_send_sync

See merge request tpo/core/tor!747
Diffstat:
Msrc/ext/equix/src/lib.rs | 8++++----
1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/src/ext/equix/src/lib.rs b/src/ext/equix/src/lib.rs @@ -217,7 +217,7 @@ mod tests { use crate::*; use hex_literal::hex; use std::cell::RefCell; - use std::sync::Arc; + use std::rc::Rc; #[test] fn equix_context() { @@ -334,7 +334,7 @@ mod tests { // Use a Rng callback to read the sequence of pseudorandom numbers // without changing them, and spot check the list we get back. let mut ctx = HashX::new(HashXType::HASHX_TRY_COMPILE); - let seq = Arc::new(RefCell::new(Vec::new())); + let seq = Rc::new(RefCell::new(Vec::new())); { let seq = seq.clone(); ctx.rng_callback(Some(Box::new(move |value| { @@ -363,7 +363,7 @@ mod tests { // We have to choose the replacement somewhat carefully since // many stationary replacement values will cause infinite loops. let mut ctx = HashX::new(HashXType::HASHX_TYPE_INTERPRETED); - let counter = Arc::new(RefCell::new(0u32)); + let counter = Rc::new(RefCell::new(0u32)); { let counter = counter.clone(); ctx.rng_callback(Some(Box::new(move |_value| { @@ -970,7 +970,7 @@ mod tests { let mut ctx = HashX::new(hash_type); // Fully replace the Rng stream, which must be exactly the right size - let counter = Arc::new(RefCell::new(0_usize)); + let counter = Rc::new(RefCell::new(0_usize)); { let counter = counter.clone(); ctx.rng_callback(Some(Box::new(move |_value| {