diff --git a/Cargo.toml b/Cargo.toml index 2dd3139b..58c928d0 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -17,18 +17,15 @@ name = "cosmian_cover_crypt" # The cdylib is only interesting if the `--features ffi` flag is set on build # This does not seem to be actionable conditionally https://github.com/rust-lang/cargo/issues/4881 -[[bench]] -name = "benches" -harness = false +# [[bench]] +# name = "benches" +# harness = false [features] -serialization = [] -test_utils = ["base64"] -full_bench = ["serialization"] +full_bench = [] hybridized_bench = [] [dependencies] -base64 = { version = "0.21.0", optional = true } cosmian_crypto_core = { version = "9.2.0", default-features = false, features = ["ser", "sha3", "aes", "curve25519"] } pqc_kyber = { version = "0.4", features = ["std", "hazmat"] } serde = { version = "1.0", features = ["derive"] } diff --git a/src/core/api.rs b/src/core/api.rs index 43d1402a..d5b211ff 100644 --- a/src/core/api.rs +++ b/src/core/api.rs @@ -80,7 +80,7 @@ impl Covercrypt { /// /// All user keys need to be refreshed. /// - /// - `access_policy` : describe the keys to renew + /// - `ap` : describe the keys to renew /// - `policy` : global policy /// - `msk` : master secret key /// - `mpk` : master public key diff --git a/src/core/mod.rs b/src/core/mod.rs index 5db43f16..e9996349 100644 --- a/src/core/mod.rs +++ b/src/core/mod.rs @@ -21,8 +21,6 @@ pub mod macros; pub mod api; pub mod primitives; - -#[cfg(feature = "serialization")] pub mod serialization; /// The symmetric key is 32 bytes long to provide 128 bits of post-quantum diff --git a/src/test_utils/mod.rs b/src/test_utils/mod.rs index 0676696e..fc5251c5 100644 --- a/src/test_utils/mod.rs +++ b/src/test_utils/mod.rs @@ -3,7 +3,6 @@ use crate::{ Error, }; -#[cfg(feature = "serialization")] pub mod non_regression; pub fn policy() -> Result { @@ -41,9 +40,11 @@ mod tests { use super::*; use crate::{ abe_policy::{AccessPolicy, Attribute, LegacyPolicy, Partition}, - Covercrypt, EncryptedHeader, UserSecretKey, + Covercrypt, EncryptedHeader, }; + use crate::UserSecretKey; + #[test] fn write_policy() { let _policy = policy().unwrap();