Skip to content

Commit a48de3a

Browse files
committed
Clippy
1 parent acf17ea commit a48de3a

File tree

14 files changed

+28
-29
lines changed

14 files changed

+28
-29
lines changed

boring-sys/build/main.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -715,7 +715,7 @@ fn ensure_err_lib_enum_is_named(source_code: &mut Vec<u8>) {
715715
let src = String::from_utf8_lossy(source_code);
716716
let enum_type = src
717717
.split_once("ERR_LIB_SSL:")
718-
.and_then(|(_, def)| Some(def.split_once("=")?.0))
718+
.and_then(|(_, def)| Some(def.split_once('=')?.0))
719719
.unwrap_or("_bindgen_ty_1");
720720

721721
source_code.extend_from_slice(

boring/src/dsa.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,7 @@ mod test {
300300
let mut ctx = BigNumContext::new().unwrap();
301301
let mut calc = BigNum::new().unwrap();
302302
calc.mod_exp(g, priv_key, p, &mut ctx).unwrap();
303-
assert_eq!(&calc, pub_key)
303+
assert_eq!(&calc, pub_key);
304304
}
305305

306306
#[test]

boring/src/ssl/error.rs

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,7 @@ impl ErrorCode {
7979
}
8080

8181
#[corresponds(SSL_error_description)]
82+
#[must_use]
8283
pub fn description(self) -> Option<&'static str> {
8384
unsafe {
8485
let msg = ffi::SSL_error_description(self.0);

boring/src/ssl/mod.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1688,7 +1688,7 @@ impl SslContextBuilder {
16881688
C: CertificateCompressor,
16891689
{
16901690
const {
1691-
assert!(C::CAN_COMPRESS || C::CAN_DECOMPRESS, "Either compression or decompression must be supported for algorithm to be registered")
1691+
assert!(C::CAN_COMPRESS || C::CAN_DECOMPRESS, "Either compression or decompression must be supported for algorithm to be registered");
16921692
};
16931693
let success = unsafe {
16941694
ffi::SSL_CTX_add_cert_compression_alg(
@@ -1735,7 +1735,7 @@ impl SslContextBuilder {
17351735
decrypt: Some(callbacks::raw_decrypt::<M>),
17361736
complete: Some(callbacks::raw_complete::<M>),
17371737
},
1738-
)
1738+
);
17391739
}
17401740
}
17411741

boring/src/ssl/test/ech.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ fn ech() {
4040
let (_server, client) = bootstrap_ech(ECH_CONFIG, ECH_KEY, ECH_CONFIG_LIST);
4141

4242
let ssl_stream = client.connect();
43-
assert!(ssl_stream.ssl().ech_accepted())
43+
assert!(ssl_stream.ssl().ech_accepted());
4444
}
4545

4646
#[test]
@@ -57,7 +57,7 @@ fn ech_rejection() {
5757
Some(b"ech.com".to_vec().as_ref())
5858
);
5959
assert!(failed_ssl_stream.ssl().get_ech_retry_configs().is_some());
60-
assert!(!failed_ssl_stream.ssl().ech_accepted())
60+
assert!(!failed_ssl_stream.ssl().ech_accepted());
6161
}
6262

6363
#[test]
@@ -69,5 +69,5 @@ fn ech_grease() {
6969
client.ssl().set_enable_ech_grease(true);
7070

7171
let ssl_stream = client.connect();
72-
assert!(!ssl_stream.ssl().ech_accepted())
72+
assert!(!ssl_stream.ssl().ech_accepted());
7373
}

boring/src/ssl/test/mod.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1010,7 +1010,7 @@ fn test_set_compliance() {
10101010
assert_eq!(ciphers.len(), FIPS_CIPHERS.len());
10111011

10121012
for cipher in ciphers.into_iter().zip(FIPS_CIPHERS) {
1013-
assert_eq!(cipher.0.name(), cipher.1)
1013+
assert_eq!(cipher.0.name(), cipher.1);
10141014
}
10151015

10161016
let mut ctx = SslContext::builder(SslMethod::tls()).unwrap();
@@ -1029,7 +1029,7 @@ fn test_set_compliance() {
10291029
assert_eq!(ciphers.len(), WPA3_192_CIPHERS.len());
10301030

10311031
for cipher in ciphers.into_iter().zip(WPA3_192_CIPHERS) {
1032-
assert_eq!(cipher.0.name(), cipher.1)
1032+
assert_eq!(cipher.0.name(), cipher.1);
10331033
}
10341034

10351035
ctx.set_compliance_policy(CompliancePolicy::NONE)
@@ -1092,7 +1092,7 @@ fn test_ssl_set_compliance() {
10921092
assert_eq!(ciphers.len(), FIPS_CIPHERS.len());
10931093

10941094
for cipher in ciphers.into_iter().zip(FIPS_CIPHERS) {
1095-
assert_eq!(cipher.0.name(), cipher.1)
1095+
assert_eq!(cipher.0.name(), cipher.1);
10961096
}
10971097

10981098
let ctx = SslContext::builder(SslMethod::tls()).unwrap().build();
@@ -1112,7 +1112,7 @@ fn test_ssl_set_compliance() {
11121112
assert_eq!(ciphers.len(), WPA3_192_CIPHERS.len());
11131113

11141114
for cipher in ciphers.into_iter().zip(WPA3_192_CIPHERS) {
1115-
assert_eq!(cipher.0.name(), cipher.1)
1115+
assert_eq!(cipher.0.name(), cipher.1);
11161116
}
11171117

11181118
ssl.set_compliance_policy(CompliancePolicy::NONE)

boring/src/ssl/test/session.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ fn new_get_session_callback() {
4949
.ctx()
5050
.set_session_cache_mode(SslSessionCacheMode::SERVER | SslSessionCacheMode::NO_INTERNAL);
5151
server.ctx().set_new_session_callback(|_, session| {
52-
SERVER_SESSION_DER.set(session.to_der().unwrap()).unwrap()
52+
SERVER_SESSION_DER.set(session.to_der().unwrap()).unwrap();
5353
});
5454
unsafe {
5555
server.ctx().set_get_session_callback(|_, id| {
@@ -76,7 +76,7 @@ fn new_get_session_callback() {
7676
.ctx()
7777
.set_session_cache_mode(SslSessionCacheMode::CLIENT);
7878
client.ctx().set_new_session_callback(|_, session| {
79-
CLIENT_SESSION_DER.set(session.to_der().unwrap()).unwrap()
79+
CLIENT_SESSION_DER.set(session.to_der().unwrap()).unwrap();
8080
});
8181

8282
let client = client.build();

boring/src/ssl/test/session_resumption.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ fn custom_callback_success() {
6161
unsafe {
6262
server
6363
.ctx()
64-
.set_ticket_key_callback(test_success_tickey_key_callback)
64+
.set_ticket_key_callback(test_success_tickey_key_callback);
6565
};
6666
let server = server.build();
6767

@@ -106,7 +106,7 @@ fn custom_callback_unrecognized_decryption_ticket() {
106106
unsafe {
107107
server
108108
.ctx()
109-
.set_ticket_key_callback(test_noop_tickey_key_callback)
109+
.set_ticket_key_callback(test_noop_tickey_key_callback);
110110
};
111111
let server = server.build();
112112

boring/src/x509/tests/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ fn test_subject_read_cn() {
7373
let cert = X509::from_pem(cert).unwrap();
7474
let subject = cert.subject_name();
7575
let cn = subject.entries_by_nid(Nid::COMMONNAME).next().unwrap();
76-
assert_eq!(cn.data().as_slice(), b"foobar.com")
76+
assert_eq!(cn.data().as_slice(), b"foobar.com");
7777
}
7878

7979
#[test]

boring/src/x509/tests/trusted_first.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ fn test_verify_cert() {
6060
assert_eq!(
6161
Ok(()),
6262
verify(&leaf, &[&root1], &[&intermediate, &root1_cross], |param| {
63-
param.clear_flags(X509Flags::TRUSTED_FIRST)
63+
param.clear_flags(X509Flags::TRUSTED_FIRST);
6464
})
6565
);
6666
}

0 commit comments

Comments
 (0)