diff --git a/blockchain/chain_sync/src/network_context.rs b/blockchain/chain_sync/src/network_context.rs index ba814bafd0e4..007e9825bd2f 100644 --- a/blockchain/chain_sync/src/network_context.rs +++ b/blockchain/chain_sync/src/network_context.rs @@ -17,7 +17,7 @@ use forest_libp2p::{ use futures::channel::oneshot::channel as oneshot_channel; use ipld_blockstore::BlockStore; use libp2p::core::PeerId; -use log::{trace, warn}; +use log::{debug, trace, warn}; use std::convert::TryFrom; use std::sync::Arc; use std::time::{Duration, SystemTime}; @@ -191,7 +191,7 @@ where break; } Err(e) => { - warn!("Failed chain_exchange response: {}", e); + debug!("Failed chain_exchange response: {}", e); continue; } }, diff --git a/crypto/src/signature.rs b/crypto/src/signature.rs index 10dbccb74ca5..f7b7d1f591ed 100644 --- a/crypto/src/signature.rs +++ b/crypto/src/signature.rs @@ -277,7 +277,7 @@ mod tests { let mut secp_addr = Address::new_secp256k1(&pub_key.serialize()).unwrap(); for network in [Network::Mainnet, Network::Testnet] { let address = secp_addr.set_network(network); - assert!(verify_secp256k1_sig(&signature, &data, &address).is_ok()); + assert!(verify_secp256k1_sig(&signature, &data, address).is_ok()); } } @@ -314,7 +314,7 @@ mod tests { } fn generate_signature(priv_key: &SecretKey, msg: &Message) -> [u8; 65] { - let (sig, recovery_id) = sign(&msg, &priv_key); + let (sig, recovery_id) = sign(msg, priv_key); let mut signature = [0; 65]; signature[..64].copy_from_slice(&sig.serialize()); signature[64] = recovery_id.serialize();