Skip to content

Commit

Permalink
Auto-merge for PR #90 via VersionBot
Browse files Browse the repository at this point in the history
Fix clippy warnings about long literals
  • Loading branch information
resin-io-modules-versionbot[bot] authored Aug 2, 2017
2 parents 2c58dfc + ddb24ee commit ca54abe
Show file tree
Hide file tree
Showing 3 changed files with 23 additions and 19 deletions.
4 changes: 4 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@ All notable changes to this project will be documented in this file
automatically by Versionist. DO NOT EDIT THIS FILE MANUALLY!
This project adheres to [Semantic Versioning](http://semver.org/).

## v0.6.3 - 2017-08-02

* Fix clippy warnings about long literals [majorz]

## v0.6.2 - 2017-07-04

* NetworkManager::get_connectivity fixed and added test [majorz]
Expand Down
2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "network_manager"
version = "0.6.2"
version = "0.6.3"
authors = ["Joseph Roberts <[email protected]>", "Zahari Petkov <[email protected]>"]

[dependencies]
Expand Down
36 changes: 18 additions & 18 deletions src/wifi.rs
Original file line number Diff line number Diff line change
Expand Up @@ -105,49 +105,49 @@ impl AccessPoint {

bitflags! {
pub struct Security: u32 {
const NONE = 0b0000000;
const WEP = 0b0000001;
const WPA = 0b0000010;
const WPA2 = 0b0000100;
const ENTERPRISE = 0b0001000;
const NONE = 0b0000_0000;
const WEP = 0b0000_0001;
const WPA = 0b0000_0010;
const WPA2 = 0b0000_0100;
const ENTERPRISE = 0b0000_1000;
}
}


bitflags! {
pub struct NM80211ApFlags: u32 {
// access point has no special capabilities
const AP_FLAGS_NONE = 0x00000000;
const AP_FLAGS_NONE = 0x0000_0000;
// access point requires authentication and
const AP_FLAGS_PRIVACY = 0x00000001;
const AP_FLAGS_PRIVACY = 0x0000_0001;
}
}


bitflags! {
pub struct NM80211ApSecurityFlags: u32 {
// the access point has no special security requirements
const AP_SEC_NONE = 0x00000000;
const AP_SEC_NONE = 0x0000_0000;
// 40/64-bit WEP is supported for pairwise/unicast encryption
const AP_SEC_PAIR_WEP40 = 0x00000001;
const AP_SEC_PAIR_WEP40 = 0x0000_0001;
// 104/128-bit WEP is supported for pairwise/unicast encryption
const AP_SEC_PAIR_WEP104 = 0x00000002;
const AP_SEC_PAIR_WEP104 = 0x0000_0002;
// TKIP is supported for pairwise/unicast encryption
const AP_SEC_PAIR_TKIP = 0x00000004;
const AP_SEC_PAIR_TKIP = 0x0000_0004;
// AES/CCMP is supported for pairwise/unicast encryption
const AP_SEC_PAIR_CCMP = 0x00000008;
const AP_SEC_PAIR_CCMP = 0x0000_0008;
// 40/64-bit WEP is supported for group/broadcast encryption
const AP_SEC_GROUP_WEP40 = 0x00000010;
const AP_SEC_GROUP_WEP40 = 0x0000_0010;
// 104/128-bit WEP is supported for group/broadcast encryption
const AP_SEC_GROUP_WEP104 = 0x00000020;
const AP_SEC_GROUP_WEP104 = 0x0000_0020;
// TKIP is supported for group/broadcast encryption
const AP_SEC_GROUP_TKIP = 0x00000040;
const AP_SEC_GROUP_TKIP = 0x0000_0040;
// AES/CCMP is supported for group/broadcast encryption
const AP_SEC_GROUP_CCMP = 0x00000080;
const AP_SEC_GROUP_CCMP = 0x0000_0080;
// WPA/RSN Pre-Shared Key encryption is supported
const AP_SEC_KEY_MGMT_PSK = 0x00000100;
const AP_SEC_KEY_MGMT_PSK = 0x0000_0100;
// 802.1x authentication and key management is supported
const AP_SEC_KEY_MGMT_802_1X = 0x00000200;
const AP_SEC_KEY_MGMT_802_1X = 0x0000_0200;
}
}

Expand Down

0 comments on commit ca54abe

Please sign in to comment.