Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion aead/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
//! AEAD encryption assures the confidentiality and authenticity of the data. This primitive is CPA
//! secure.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;
use tink_core::registry::register_key_manager;
Expand Down
2 changes: 1 addition & 1 deletion aead/src/subtle/aes_ctr.rs
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
//
////////////////////////////////////////////////////////////////////////////////

//! AES-CTR implementation of [`IndCpaCipher`](super::IndCpaCipher).
//! AES-CTR implementation of [`IndCpaCipher`].

use super::IndCpaCipher;
use aes::cipher::{consts::U16, generic_array::GenericArray, KeyIvInit, StreamCipher};
Expand Down
2 changes: 1 addition & 1 deletion core/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
//! Core crate for Tink.

#![cfg_attr(docsrs, feature(doc_cfg))]
#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

pub mod cryptofmt;
pub mod keyset;
Expand Down
2 changes: 1 addition & 1 deletion daead/src/key_templates.rs
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@

use tink_proto::{prost::Message, KeyTemplate};

/// Return a [`KeyTemplate`](tink_proto::KeyTemplate) that generates a AES-SIV key.
/// Return a [`KeyTemplate`] that generates a AES-SIV key.
pub fn aes_siv_key_template() -> KeyTemplate {
let format = tink_proto::AesSivKeyFormat {
key_size: 64,
Expand Down
2 changes: 1 addition & 1 deletion daead/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
//! Unlike AEAD, implementations of this interface are not semantically secure, because
//! encrypting the same plaintex always yields the same ciphertext.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;

Expand Down
2 changes: 1 addition & 1 deletion hybrid/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@
//! the secrecy or authenticity of `context_info`).

#![cfg_attr(docsrs, feature(doc_cfg))]
#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;
use tink_core::registry::{register_key_manager, register_template_generator};
Expand Down
2 changes: 1 addition & 1 deletion mac/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@
//! message. MAC protects data integrity as well as provides for authenticity
//! of the message.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;

Expand Down
2 changes: 1 addition & 1 deletion prf/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@

//! This crate provides implementations of the [`tink_core::Prf`] primitive.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;
use tink_core::registry::register_key_manager;
Expand Down
4 changes: 2 additions & 2 deletions proto/proto/kms_aead.proto
Original file line number Diff line number Diff line change
Expand Up @@ -26,9 +26,9 @@ message KmsAeadKeyFormat {
// Required.
// The location of a KMS key.
// With Google Cloud KMS, valid values have this format:
// gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
// `gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*`.
// With AWS KMS, valid values have this format:
// aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
// `aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>`
string key_uri = 1;
}

Expand Down
4 changes: 2 additions & 2 deletions proto/proto/kms_envelope.proto
Original file line number Diff line number Diff line change
Expand Up @@ -28,9 +28,9 @@ message KmsEnvelopeAeadKeyFormat {
// Required.
// The location of the KEK in a remote KMS.
// With Google Cloud KMS, valid values have this format:
// gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
// `gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*`.
// With AWS KMS, valid values have this format:
// aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
// `aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>`
string kek_uri = 1;
// Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
// Required.
Expand Down
8 changes: 4 additions & 4 deletions proto/src/codegen/google.crypto.tink.rs
Original file line number Diff line number Diff line change
Expand Up @@ -964,9 +964,9 @@ pub struct KmsAeadKeyFormat {
/// Required.
/// The location of a KMS key.
/// With Google Cloud KMS, valid values have this format:
/// gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
/// `gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*`.
/// With AWS KMS, valid values have this format:
/// aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
/// `aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>`
#[prost(string, tag = "1")]
pub key_uri: ::prost::alloc::string::String,
}
Expand All @@ -984,9 +984,9 @@ pub struct KmsEnvelopeAeadKeyFormat {
/// Required.
/// The location of the KEK in a remote KMS.
/// With Google Cloud KMS, valid values have this format:
/// gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
/// `gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*`.
/// With AWS KMS, valid values have this format:
/// aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
/// `aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>`
#[prost(string, tag = "1")]
pub kek_uri: ::prost::alloc::string::String,
/// Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
Expand Down
8 changes: 4 additions & 4 deletions proto/src/codegen/serde/google.crypto.tink.rs
Original file line number Diff line number Diff line change
Expand Up @@ -983,9 +983,9 @@ pub struct KmsAeadKeyFormat {
/// Required.
/// The location of a KMS key.
/// With Google Cloud KMS, valid values have this format:
/// gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
/// `gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*`.
/// With AWS KMS, valid values have this format:
/// aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
/// `aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>`
#[prost(string, tag = "1")]
pub key_uri: ::prost::alloc::string::String,
}
Expand All @@ -1003,9 +1003,9 @@ pub struct KmsEnvelopeAeadKeyFormat {
/// Required.
/// The location of the KEK in a remote KMS.
/// With Google Cloud KMS, valid values have this format:
/// gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
/// `gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*`.
/// With AWS KMS, valid values have this format:
/// aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
/// `aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>`
#[prost(string, tag = "1")]
pub kek_uri: ::prost::alloc::string::String,
/// Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
Expand Down
2 changes: 1 addition & 1 deletion proto/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
//! the upstream [Tink project](https://github.com/google/tink/tree/master/proto).

#![cfg_attr(docsrs, feature(doc_cfg))]
#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]
#![allow(clippy::derive_partial_eq_without_eq)]
#![allow(clippy::too_long_first_doc_paragraph)]

Expand Down
2 changes: 1 addition & 1 deletion signature/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
//!
//! To sign data using Tink you can use ECDSA or ED25519 key templates.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;
use tink_core::registry::{register_key_manager, register_template_generator};
Expand Down
3 changes: 1 addition & 2 deletions signature/src/proto.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,7 @@
use std::convert::TryFrom;
use tink_proto::{EcdsaParams, EcdsaSignatureEncoding, EllipticCurveType, HashType};

/// Return the enum values of each parameter in
/// the given [`EcdsaParams`](tink_proto::EcdsaParams).
/// Return the enum values of each parameter in the given [`EcdsaParams`].
pub(crate) fn get_ecdsa_param_ids(
params: &EcdsaParams,
) -> (HashType, EllipticCurveType, EcdsaSignatureEncoding) {
Expand Down
2 changes: 1 addition & 1 deletion streaming/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
//! AEAD encryption assures the confidentiality and authenticity of the data.
//! This primitive is CPA secure.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use std::sync::Once;
use tink_core::registry::register_key_manager;
Expand Down
2 changes: 1 addition & 1 deletion streaming/src/subtle/aes_ctr_hmac.rs
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ impl AesCtrHmac {
}

impl tink_core::StreamingAead for AesCtrHmac {
/// Return a wrapper around an underlying [`std::io.Write`], such that
/// Return a wrapper around an underlying [`std::io::Write`], such that
/// any write-operation via the wrapper results in AEAD-encryption of the
/// written data, using `aad` as associated authenticated data. The associated
/// data is not included in the ciphertext and has to be passed in as parameter
Expand Down
2 changes: 1 addition & 1 deletion tests/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@

//! Provides common methods needed in test code.

#![deny(broken_intra_doc_links)]
#![deny(rustdoc::broken_intra_doc_links)]

use generic_array::typenum::Unsigned;
use p256::elliptic_curve;
Expand Down
Loading