@@ -297,8 +297,7 @@ fn generate_predicate_proof(
297297 template_private_key : TemplatePrivateKey ,
298298 value : u64 ,
299299 rule_set : & mut VerificationRuleSet ,
300- ) -> Result < VerifyRequest , WedprError >
301- {
300+ ) -> Result < VerifyRequest , WedprError > {
302301 user_fill_certificate_attribute ( certificate_attribute_dict, value) ;
303302 let (
304303 sign_certificate_request,
@@ -353,8 +352,7 @@ fn issuer_make_certificate_template(
353352fn user_fill_certificate_attribute (
354353 certificate_attribute_dict : & mut AttributeDict ,
355354 attribute : u64 ,
356- )
357- {
355+ ) {
358356 let mut attribute_kv = StringToStringPair :: new ( ) ;
359357 attribute_kv. set_key ( TARGET_ATTRIBUTE . to_string ( ) ) ;
360358 attribute_kv. set_value ( attribute. to_string ( ) ) ;
@@ -367,8 +365,7 @@ fn user_prove_rule_set(
367365 certificate_template : & CertificateTemplate ,
368366 user_private_key_str : & str ,
369367 rule_set : & mut VerificationRuleSet ,
370- ) -> Result < VerifyRequest , WedprError >
371- {
368+ ) -> Result < VerifyRequest , WedprError > {
372369 // In most cases, this nonce should be provided by the verifier to prevent
373370 // replaying attacks.
374371 let verification_nonce_str = verifier:: get_verification_nonce ( ) . unwrap ( ) ;
@@ -385,7 +382,6 @@ fn user_prove_rule_set(
385382fn verifier_verify_rule_set (
386383 rule_set : & mut VerificationRuleSet ,
387384 request : & VerifyRequest ,
388- ) -> bool
389- {
385+ ) -> bool {
390386 verifier:: verify_selective_disclosure ( & rule_set, & request) . unwrap ( )
391387}
0 commit comments