Loading openssl/src/asn1.rs +1 −1 Original line number Diff line number Diff line Loading @@ -512,7 +512,7 @@ impl Asn1Integer { } impl Asn1IntegerRef { #[allow(missing_docs)] #[allow(missing_docs, clippy::unnecessary_cast)] #[deprecated(since = "0.10.6", note = "use to_bn instead")] pub fn get(&self) -> i64 { unsafe { ffi::ASN1_INTEGER_get(self.as_ptr()) as i64 } Loading openssl/src/bn.rs +1 −0 Original line number Diff line number Diff line Loading @@ -336,6 +336,7 @@ impl BigNumRef { /// Returns the number of significant bits in `self`. #[corresponds(BN_num_bits)] #[allow(clippy::unnecessary_cast)] pub fn num_bits(&self) -> i32 { unsafe { ffi::BN_num_bits(self.as_ptr()) as i32 } } Loading openssl/src/conf.rs +1 −0 Original line number Diff line number Diff line Loading @@ -20,6 +20,7 @@ mod methods { impl ConfMethod { /// Retrieve handle to the default OpenSSL configuration file processing function. #[corresponds(NCONF_default)] #[allow(clippy::should_implement_trait)] pub fn default() -> ConfMethod { unsafe { ffi::init(); Loading openssl/src/rsa.rs +1 −0 Original line number Diff line number Diff line Loading @@ -234,6 +234,7 @@ where /// Validates RSA parameters for correctness #[corresponds(RSA_check_key)] #[allow(clippy::unnecessary_cast)] pub fn check_key(&self) -> Result<bool, ErrorStack> { unsafe { let result = ffi::RSA_check_key(self.as_ptr()) as i32; Loading openssl/src/ssl/callbacks.rs +2 −2 Original line number Diff line number Diff line Loading @@ -482,7 +482,7 @@ where .ssl_context() .ex_data(SslContext::cached_ex_index::<F>()) .expect("BUG: stateless cookie verify callback missing") as *const F; let slice = slice::from_raw_parts(cookie as *const c_uchar as *const u8, cookie_len as usize); let slice = slice::from_raw_parts(cookie as *const c_uchar as *const u8, cookie_len); (*callback)(ssl, slice) as c_int } Loading Loading @@ -654,7 +654,7 @@ where .ex_data(SslContext::cached_ex_index::<F>()) .expect("BUG: custom ext parse callback missing") as *const F; let ectx = ExtensionContext::from_bits_truncate(context); let slice = slice::from_raw_parts(input as *const u8, inlen as usize); let slice = slice::from_raw_parts(input as *const u8, inlen); let cert = if ectx.contains(ExtensionContext::TLS1_3_CERTIFICATE) { Some((chainidx, X509Ref::from_ptr(x))) } else { Loading Loading
openssl/src/asn1.rs +1 −1 Original line number Diff line number Diff line Loading @@ -512,7 +512,7 @@ impl Asn1Integer { } impl Asn1IntegerRef { #[allow(missing_docs)] #[allow(missing_docs, clippy::unnecessary_cast)] #[deprecated(since = "0.10.6", note = "use to_bn instead")] pub fn get(&self) -> i64 { unsafe { ffi::ASN1_INTEGER_get(self.as_ptr()) as i64 } Loading
openssl/src/bn.rs +1 −0 Original line number Diff line number Diff line Loading @@ -336,6 +336,7 @@ impl BigNumRef { /// Returns the number of significant bits in `self`. #[corresponds(BN_num_bits)] #[allow(clippy::unnecessary_cast)] pub fn num_bits(&self) -> i32 { unsafe { ffi::BN_num_bits(self.as_ptr()) as i32 } } Loading
openssl/src/conf.rs +1 −0 Original line number Diff line number Diff line Loading @@ -20,6 +20,7 @@ mod methods { impl ConfMethod { /// Retrieve handle to the default OpenSSL configuration file processing function. #[corresponds(NCONF_default)] #[allow(clippy::should_implement_trait)] pub fn default() -> ConfMethod { unsafe { ffi::init(); Loading
openssl/src/rsa.rs +1 −0 Original line number Diff line number Diff line Loading @@ -234,6 +234,7 @@ where /// Validates RSA parameters for correctness #[corresponds(RSA_check_key)] #[allow(clippy::unnecessary_cast)] pub fn check_key(&self) -> Result<bool, ErrorStack> { unsafe { let result = ffi::RSA_check_key(self.as_ptr()) as i32; Loading
openssl/src/ssl/callbacks.rs +2 −2 Original line number Diff line number Diff line Loading @@ -482,7 +482,7 @@ where .ssl_context() .ex_data(SslContext::cached_ex_index::<F>()) .expect("BUG: stateless cookie verify callback missing") as *const F; let slice = slice::from_raw_parts(cookie as *const c_uchar as *const u8, cookie_len as usize); let slice = slice::from_raw_parts(cookie as *const c_uchar as *const u8, cookie_len); (*callback)(ssl, slice) as c_int } Loading Loading @@ -654,7 +654,7 @@ where .ex_data(SslContext::cached_ex_index::<F>()) .expect("BUG: custom ext parse callback missing") as *const F; let ectx = ExtensionContext::from_bits_truncate(context); let slice = slice::from_raw_parts(input as *const u8, inlen as usize); let slice = slice::from_raw_parts(input as *const u8, inlen); let cert = if ectx.contains(ExtensionContext::TLS1_3_CERTIFICATE) { Some((chainidx, X509Ref::from_ptr(x))) } else { Loading