diff --git a/src/fingerprint/mod.rs b/src/fingerprint/mod.rs index 7fc4fe4..14bd46f 100644 --- a/src/fingerprint/mod.rs +++ b/src/fingerprint/mod.rs @@ -1,4 +1,10 @@ -use {digest::Digest, rustls::Certificate, sha2::Sha256, std::{io::Read, fmt::Write}, x509_parser::prelude::*}; +use { + digest::Digest, + rustls::Certificate, + sha2::Sha256, + std::{fmt::Write, io::Read}, + x509_parser::prelude::*, +}; mod error; pub use error::Error; @@ -40,6 +46,9 @@ impl GetFingerprint for Certificate { for c in res { write!(s, "{c:02x}")?; } - Ok(Fingerprint { names, fingerprint: s }) + Ok(Fingerprint { + names, + fingerprint: s, + }) } } diff --git a/src/sender/verifier.rs b/src/sender/verifier.rs index a0bda39..7e9c041 100644 --- a/src/sender/verifier.rs +++ b/src/sender/verifier.rs @@ -1,5 +1,5 @@ use { - crate::prelude::{CertificateStore, Fingerprint, GetFingerprint}, + crate::prelude::{CertificateStore, GetFingerprint}, rustls::{ client::{ServerCertVerified, ServerCertVerifier}, Certificate, @@ -46,13 +46,19 @@ impl ServerCertVerifier for Verifier { return Ok(ServerCertVerified::assertion()); } } - Err(rustls::Error::InvalidCertificate(rustls::CertificateError::NotValidForName)) + Err(rustls::Error::InvalidCertificate( + rustls::CertificateError::NotValidForName, + )) } else { - Err(rustls::Error::InvalidCertificate(rustls::CertificateError::NotValidForName)) + Err(rustls::Error::InvalidCertificate( + rustls::CertificateError::NotValidForName, + )) } } else { if !store.contains_certificate(&name) { - let _key = store.borrow_mut().insert_certificate(&name, &fp.fingerprint); + let _key = store + .borrow_mut() + .insert_certificate(&name, &fp.fingerprint); } return Ok(ServerCertVerified::assertion()); }