diff --git a/CHANGELOG.md b/CHANGELOG.md index e1c1081..c5d90af 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,10 @@ All notable changes to this project will be documented in this file automatically by Versionist. DO NOT EDIT THIS FILE MANUALLY! This project adheres to [Semantic Versioning](http://semver.org/). +## v0.6.3 - 2017-08-02 + +* Fix clippy warnings about long literals [majorz] + ## v0.6.2 - 2017-07-04 * NetworkManager::get_connectivity fixed and added test [majorz] diff --git a/Cargo.toml b/Cargo.toml index c766c84..7b11d8d 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "network_manager" -version = "0.6.2" +version = "0.6.3" authors = ["Joseph Roberts ", "Zahari Petkov "] [dependencies] diff --git a/src/wifi.rs b/src/wifi.rs index b0e6f51..750b1ce 100644 --- a/src/wifi.rs +++ b/src/wifi.rs @@ -105,11 +105,11 @@ impl AccessPoint { bitflags! { pub struct Security: u32 { - const NONE = 0b0000000; - const WEP = 0b0000001; - const WPA = 0b0000010; - const WPA2 = 0b0000100; - const ENTERPRISE = 0b0001000; + const NONE = 0b0000_0000; + const WEP = 0b0000_0001; + const WPA = 0b0000_0010; + const WPA2 = 0b0000_0100; + const ENTERPRISE = 0b0000_1000; } } @@ -117,9 +117,9 @@ bitflags! { bitflags! { pub struct NM80211ApFlags: u32 { // access point has no special capabilities - const AP_FLAGS_NONE = 0x00000000; + const AP_FLAGS_NONE = 0x0000_0000; // access point requires authentication and - const AP_FLAGS_PRIVACY = 0x00000001; + const AP_FLAGS_PRIVACY = 0x0000_0001; } } @@ -127,27 +127,27 @@ bitflags! { bitflags! { pub struct NM80211ApSecurityFlags: u32 { // the access point has no special security requirements - const AP_SEC_NONE = 0x00000000; + const AP_SEC_NONE = 0x0000_0000; // 40/64-bit WEP is supported for pairwise/unicast encryption - const AP_SEC_PAIR_WEP40 = 0x00000001; + const AP_SEC_PAIR_WEP40 = 0x0000_0001; // 104/128-bit WEP is supported for pairwise/unicast encryption - const AP_SEC_PAIR_WEP104 = 0x00000002; + const AP_SEC_PAIR_WEP104 = 0x0000_0002; // TKIP is supported for pairwise/unicast encryption - const AP_SEC_PAIR_TKIP = 0x00000004; + const AP_SEC_PAIR_TKIP = 0x0000_0004; // AES/CCMP is supported for pairwise/unicast encryption - const AP_SEC_PAIR_CCMP = 0x00000008; + const AP_SEC_PAIR_CCMP = 0x0000_0008; // 40/64-bit WEP is supported for group/broadcast encryption - const AP_SEC_GROUP_WEP40 = 0x00000010; + const AP_SEC_GROUP_WEP40 = 0x0000_0010; // 104/128-bit WEP is supported for group/broadcast encryption - const AP_SEC_GROUP_WEP104 = 0x00000020; + const AP_SEC_GROUP_WEP104 = 0x0000_0020; // TKIP is supported for group/broadcast encryption - const AP_SEC_GROUP_TKIP = 0x00000040; + const AP_SEC_GROUP_TKIP = 0x0000_0040; // AES/CCMP is supported for group/broadcast encryption - const AP_SEC_GROUP_CCMP = 0x00000080; + const AP_SEC_GROUP_CCMP = 0x0000_0080; // WPA/RSN Pre-Shared Key encryption is supported - const AP_SEC_KEY_MGMT_PSK = 0x00000100; + const AP_SEC_KEY_MGMT_PSK = 0x0000_0100; // 802.1x authentication and key management is supported - const AP_SEC_KEY_MGMT_802_1X = 0x00000200; + const AP_SEC_KEY_MGMT_802_1X = 0x0000_0200; } }