@@ -204,7 +204,7 @@ fn verify_callback() {
204
204
CALLED_BACK . store ( true , Ordering :: SeqCst ) ;
205
205
let cert = x509. current_cert ( ) . unwrap ( ) ;
206
206
let digest = cert. digest ( MessageDigest :: sha1 ( ) ) . unwrap ( ) ;
207
- assert_eq ! ( hex:: encode( & digest) , expected) ;
207
+ assert_eq ! ( hex:: encode( digest) , expected) ;
208
208
true
209
209
} ) ;
210
210
@@ -226,7 +226,7 @@ fn ssl_verify_callback() {
226
226
CALLED_BACK . store ( true , Ordering :: SeqCst ) ;
227
227
let cert = x509. current_cert ( ) . unwrap ( ) ;
228
228
let digest = cert. digest ( MessageDigest :: sha1 ( ) ) . unwrap ( ) ;
229
- assert_eq ! ( hex:: encode( & digest) , expected) ;
229
+ assert_eq ! ( hex:: encode( digest) , expected) ;
230
230
true
231
231
} ) ;
232
232
@@ -319,9 +319,9 @@ fn test_connect_with_srtp_ctx() {
319
319
let mut ctx = SslContext :: builder ( SslMethod :: dtls ( ) ) . unwrap ( ) ;
320
320
ctx. set_tlsext_use_srtp ( "SRTP_AES128_CM_SHA1_80:SRTP_AES128_CM_SHA1_32" )
321
321
. unwrap ( ) ;
322
- ctx. set_certificate_file ( & Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
322
+ ctx. set_certificate_file ( Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
323
323
. unwrap ( ) ;
324
- ctx. set_private_key_file ( & Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
324
+ ctx. set_private_key_file ( Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
325
325
. unwrap ( ) ;
326
326
let mut ssl = Ssl :: new ( & ctx. build ( ) ) . unwrap ( ) ;
327
327
ssl. set_mtu ( 1500 ) . unwrap ( ) ;
@@ -375,9 +375,9 @@ fn test_connect_with_srtp_ssl() {
375
375
let guard = thread:: spawn ( move || {
376
376
let stream = listener. accept ( ) . unwrap ( ) . 0 ;
377
377
let mut ctx = SslContext :: builder ( SslMethod :: dtls ( ) ) . unwrap ( ) ;
378
- ctx. set_certificate_file ( & Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
378
+ ctx. set_certificate_file ( Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
379
379
. unwrap ( ) ;
380
- ctx. set_private_key_file ( & Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
380
+ ctx. set_private_key_file ( Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
381
381
. unwrap ( ) ;
382
382
let mut ssl = Ssl :: new ( & ctx. build ( ) ) . unwrap ( ) ;
383
383
ssl. set_tlsext_use_srtp ( "SRTP_AES128_CM_SHA1_80:SRTP_AES128_CM_SHA1_32" )
@@ -1073,9 +1073,9 @@ fn keying_export() {
1073
1073
let guard = thread:: spawn ( move || {
1074
1074
let stream = listener. accept ( ) . unwrap ( ) . 0 ;
1075
1075
let mut ctx = SslContext :: builder ( SslMethod :: tls ( ) ) . unwrap ( ) ;
1076
- ctx. set_certificate_file ( & Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
1076
+ ctx. set_certificate_file ( Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
1077
1077
. unwrap ( ) ;
1078
- ctx. set_private_key_file ( & Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
1078
+ ctx. set_private_key_file ( Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
1079
1079
. unwrap ( ) ;
1080
1080
let ssl = Ssl :: new ( & ctx. build ( ) ) . unwrap ( ) ;
1081
1081
let mut stream = ssl. accept ( stream) . unwrap ( ) ;
@@ -1271,10 +1271,10 @@ fn stateless() {
1271
1271
1272
1272
let mut server_ctx = SslContext :: builder ( SslMethod :: tls ( ) ) . unwrap ( ) ;
1273
1273
server_ctx
1274
- . set_certificate_file ( & Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
1274
+ . set_certificate_file ( Path :: new ( "test/cert.pem" ) , SslFiletype :: PEM )
1275
1275
. unwrap ( ) ;
1276
1276
server_ctx
1277
- . set_private_key_file ( & Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
1277
+ . set_private_key_file ( Path :: new ( "test/key.pem" ) , SslFiletype :: PEM )
1278
1278
. unwrap ( ) ;
1279
1279
const COOKIE : & [ u8 ] = b"chocolate chip" ;
1280
1280
server_ctx. set_stateless_cookie_generate_cb ( |_tls, buf| {
0 commit comments