Skip to content

Commit 89a220c

Browse files
committed
chore: cargo +nightly fmt
1 parent 30fa096 commit 89a220c

File tree

5 files changed

+10
-6
lines changed

5 files changed

+10
-6
lines changed

crypto/src/ephemeral.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,8 @@ pub(crate) async fn generate_history_secret(ciphersuite: Ciphersuite) -> Result<
111111
.await
112112
.map_err(MlsError::wrap("encapsulating key package"))?;
113113

114-
// we don't need to finish the transaction here--the point of the ephemeral CC was that no mutations would be saved there
114+
// we don't need to finish the transaction here--the point of the ephemeral CC was that no mutations would be saved
115+
// there
115116
let _ = tx.abort().await;
116117

117118
Ok(HistorySecret { client_id, key_package })

crypto/src/mls/credential/mod.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,8 @@ impl Credential {
9595
///
9696
/// The result is independent of any client instance and the database; it lives in memory only.
9797
///
98-
/// The earliest validity of this credential is always 0. It will be updated once the credential is added to a session.
98+
/// The earliest validity of this credential is always 0. It will be updated once the credential is added to a
99+
/// session.
99100
pub fn basic(ciphersuite: Ciphersuite, client_id: ClientId, crypto: impl OpenMlsCrypto) -> Result<Self> {
100101
let signature_scheme = ciphersuite.signature_algorithm();
101102
let (private_key, public_key) = crypto

crypto/src/mls/session/key_package.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,8 @@ impl Session {
5555
///
5656
/// As a side effect, stores the keypackages and some related data in the keystore.
5757
///
58-
/// Must not be fully public, only crate-public, because as it mutates the keystore it must only ever happen within a transaction.
58+
/// Must not be fully public, only crate-public, because as it mutates the keystore it must only ever happen within
59+
/// a transaction.
5960
pub(crate) async fn generate_keypackage(
6061
&self,
6162
credential_ref: &CredentialRef,

keystore/src/connection/platform/generic/meta_migrations/v18.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,8 @@ pub(crate) fn meta_migration(conn: &mut rusqlite::Connection) -> CryptoKeystoreR
4747
secret_key: row.get("secret_key")?,
4848
};
4949

50-
// Insert the new credential into temporary mls_credentials_new table, that will be renamed in the next migration
50+
// Insert the new credential into temporary mls_credentials_new table, that will be renamed in the next
51+
// migration
5152
if let Some(ciphersuite) = ciphersuite_for_signature_scheme(v6.signature_scheme) {
5253
tx.execute(
5354
"INSERT INTO mls_credentials_new (

keystore/src/migrations.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,8 @@ pub(crate) fn v5_credential_matches_signature_key(
117117
/// We need to map a signature scheme to a ciphersuite in our migrations. Most of these mappings are unambiguous.
118118
/// However, we still need to consider the possibility that users are using unexpected signature schemes.
119119
///
120-
/// The strategy here is to perform an analysis of the existing conversations, counting the ciphersuites actually in use.
121-
/// For each ambiguous signature scheme, there are these possibilities to consider:
120+
/// The strategy here is to perform an analysis of the existing conversations, counting the ciphersuites actually in
121+
/// use. For each ambiguous signature scheme, there are these possibilities to consider:
122122
///
123123
/// | Ciphersuite A | Ciphersuite B | Outcome |
124124
/// |---------------|---------------|---------|

0 commit comments

Comments
 (0)