Loading src/crypto/hash.rs +1 −0 Original line number Diff line number Diff line Loading @@ -129,6 +129,7 @@ mod tests { expected_output: String } #[allow(non_snake_case)] fn HashTest(input: &str, output: &str) -> HashTest { HashTest { input: input.from_hex().unwrap(), expected_output: output.to_string() } Loading src/crypto/hmac.rs +1 −1 Original line number Diff line number Diff line Loading @@ -46,7 +46,7 @@ pub struct HMAC { len: uint, } #[allow(non_snake_case_functions)] #[allow(non_snake_case)] pub fn HMAC(ht: hash::HashType, key: &[u8]) -> HMAC { unsafe { let (evp, mdlen) = hash::evpmd(ht); Loading src/ssl/mod.rs +1 −1 Original line number Diff line number Diff line Loading @@ -156,7 +156,7 @@ impl SslContext { } } #[allow(non_snake_case_functions)] #[allow(non_snake_case)] /// Specifies the file that contains trusted CA certificates. pub fn set_CA_file(&mut self, file: &str) -> Option<SslError> { let ret = file.with_c_str(|file| { Loading Loading
src/crypto/hash.rs +1 −0 Original line number Diff line number Diff line Loading @@ -129,6 +129,7 @@ mod tests { expected_output: String } #[allow(non_snake_case)] fn HashTest(input: &str, output: &str) -> HashTest { HashTest { input: input.from_hex().unwrap(), expected_output: output.to_string() } Loading
src/crypto/hmac.rs +1 −1 Original line number Diff line number Diff line Loading @@ -46,7 +46,7 @@ pub struct HMAC { len: uint, } #[allow(non_snake_case_functions)] #[allow(non_snake_case)] pub fn HMAC(ht: hash::HashType, key: &[u8]) -> HMAC { unsafe { let (evp, mdlen) = hash::evpmd(ht); Loading
src/ssl/mod.rs +1 −1 Original line number Diff line number Diff line Loading @@ -156,7 +156,7 @@ impl SslContext { } } #[allow(non_snake_case_functions)] #[allow(non_snake_case)] /// Specifies the file that contains trusted CA certificates. pub fn set_CA_file(&mut self, file: &str) -> Option<SslError> { let ret = file.with_c_str(|file| { Loading