Enum cbor_event::StringLenSz
source · [−]Expand description
Encoding for the length of a string (text or bytes)
Indefinite encoding strings contain the indefinite marker followed by a series of definite encoded strings and then a break
Definite encoding strings can vary by how many bytes are used to encode the length e.g. 4 can be represented inline in the type, or in 1/2/4/8 additional bytes
Variants
Indefinite(Vec<(u64, Sz)>)
Len(Sz)
Trait Implementations
sourceimpl Clone for StringLenSz
impl Clone for StringLenSz
sourcefn clone(&self) -> StringLenSz
fn clone(&self) -> StringLenSz
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source. Read more
sourceimpl Debug for StringLenSz
impl Debug for StringLenSz
sourceimpl PartialEq<StringLenSz> for StringLenSz
impl PartialEq<StringLenSz> for StringLenSz
sourcefn eq(&self, other: &StringLenSz) -> bool
fn eq(&self, other: &StringLenSz) -> bool
This method tests for self and other values to be equal, and is used
by ==. Read more
sourcefn ne(&self, other: &StringLenSz) -> bool
fn ne(&self, other: &StringLenSz) -> bool
This method tests for !=.
impl Eq for StringLenSz
impl StructuralEq for StringLenSz
impl StructuralPartialEq for StringLenSz
Auto Trait Implementations
impl RefUnwindSafe for StringLenSz
impl Send for StringLenSz
impl Sync for StringLenSz
impl Unpin for StringLenSz
impl UnwindSafe for StringLenSz
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
🔬 This is a nightly-only experimental API. (
toowned_clone_into)Uses borrowed data to replace owned data, usually by cloning. Read more