File tree Expand file tree Collapse file tree 5 files changed +10
-6
lines changed
connection/platform/generic/meta_migrations Expand file tree Collapse file tree 5 files changed +10
-6
lines changed Original file line number Diff line number Diff line change @@ -111,7 +111,8 @@ pub(crate) async fn generate_history_secret(ciphersuite: Ciphersuite) -> Result<
111111 . await
112112 . map_err ( MlsError :: wrap ( "encapsulating key package" ) ) ?;
113113
114- // we don't need to finish the transaction here--the point of the ephemeral CC was that no mutations would be saved there
114+ // we don't need to finish the transaction here--the point of the ephemeral CC was that no mutations would be saved
115+ // there
115116 let _ = tx. abort ( ) . await ;
116117
117118 Ok ( HistorySecret { client_id, key_package } )
Original file line number Diff line number Diff line change @@ -95,7 +95,8 @@ impl Credential {
9595 ///
9696 /// The result is independent of any client instance and the database; it lives in memory only.
9797 ///
98- /// The earliest validity of this credential is always 0. It will be updated once the credential is added to a session.
98+ /// The earliest validity of this credential is always 0. It will be updated once the credential is added to a
99+ /// session.
99100 pub fn basic ( ciphersuite : Ciphersuite , client_id : ClientId , crypto : impl OpenMlsCrypto ) -> Result < Self > {
100101 let signature_scheme = ciphersuite. signature_algorithm ( ) ;
101102 let ( private_key, public_key) = crypto
Original file line number Diff line number Diff line change @@ -55,7 +55,8 @@ impl Session {
5555 ///
5656 /// As a side effect, stores the keypackages and some related data in the keystore.
5757 ///
58- /// Must not be fully public, only crate-public, because as it mutates the keystore it must only ever happen within a transaction.
58+ /// Must not be fully public, only crate-public, because as it mutates the keystore it must only ever happen within
59+ /// a transaction.
5960 pub ( crate ) async fn generate_keypackage (
6061 & self ,
6162 credential_ref : & CredentialRef ,
Original file line number Diff line number Diff line change @@ -47,7 +47,8 @@ pub(crate) fn meta_migration(conn: &mut rusqlite::Connection) -> CryptoKeystoreR
4747 secret_key : row. get ( "secret_key" ) ?,
4848 } ;
4949
50- // Insert the new credential into temporary mls_credentials_new table, that will be renamed in the next migration
50+ // Insert the new credential into temporary mls_credentials_new table, that will be renamed in the next
51+ // migration
5152 if let Some ( ciphersuite) = ciphersuite_for_signature_scheme ( v6. signature_scheme ) {
5253 tx. execute (
5354 "INSERT INTO mls_credentials_new (
Original file line number Diff line number Diff line change @@ -117,8 +117,8 @@ pub(crate) fn v5_credential_matches_signature_key(
117117/// We need to map a signature scheme to a ciphersuite in our migrations. Most of these mappings are unambiguous.
118118/// However, we still need to consider the possibility that users are using unexpected signature schemes.
119119///
120- /// The strategy here is to perform an analysis of the existing conversations, counting the ciphersuites actually in use.
121- /// For each ambiguous signature scheme, there are these possibilities to consider:
120+ /// The strategy here is to perform an analysis of the existing conversations, counting the ciphersuites actually in
121+ /// use. For each ambiguous signature scheme, there are these possibilities to consider:
122122///
123123/// | Ciphersuite A | Ciphersuite B | Outcome |
124124/// |---------------|---------------|---------|
You can’t perform that action at this time.
0 commit comments