Skip to content

Commit 2d1fbde

Browse files
committed
Update to new dependencies
1 parent a405cdd commit 2d1fbde

File tree

2 files changed

+16
-16
lines changed

2 files changed

+16
-16
lines changed

Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ rand = "0.7.0"
2121
byteorder = "1.3.1"
2222
failure = "0.1.5"
2323
subtle = "2.0.0"
24-
digest = "0.8.0"
24+
digest = { version = "0.8.0", features = ["std"] }
2525
sha-1 = "0.8.1"
2626
sha2 = "0.8.0"
2727
sha3 = "0.8.1"

src/oaep.rs

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ pub fn encrypt<R: Rng, K: PublicKey>(
7777
pub_key: &K,
7878
msg: &[u8],
7979
digest: &mut impl DynDigest,
80-
label: Option<String>
80+
label: Option<String>,
8181
) -> Result<Vec<u8>> {
8282
key::check_public(pub_key)?;
8383

@@ -101,7 +101,7 @@ pub fn encrypt<R: Rng, K: PublicKey>(
101101
rng.fill(seed);
102102

103103
// Data block DB = pHash || PS || 01 || M
104-
let db_len = k -h_size - 1;
104+
let db_len = k - h_size - 1;
105105

106106
digest.input(label.as_bytes());
107107
let p_hash = digest.result_reset();
@@ -139,7 +139,7 @@ pub fn decrypt<R: Rng>(
139139
priv_key: &RSAPrivateKey,
140140
ciphertext: &[u8],
141141
digest: &mut impl DynDigest,
142-
label: Option<String>
142+
label: Option<String>,
143143
) -> Result<Vec<u8>> {
144144
key::check_public(priv_key)?;
145145

@@ -163,7 +163,7 @@ fn decrypt_inner<R: Rng>(
163163
priv_key: &RSAPrivateKey,
164164
ciphertext: &[u8],
165165
digest: &mut impl DynDigest,
166-
label: Option<String>
166+
label: Option<String>,
167167
) -> Result<(u8, Vec<u8>, u32)> {
168168
let k = priv_key.size();
169169
if k < 11 {
@@ -287,7 +287,6 @@ mod tests {
287287

288288
#[test]
289289
fn test_encrypt_decrypt_oaep() {
290-
291290
let priv_key = get_private_key();
292291
do_test_encrypt_decrypt_oaep(&priv_key, &mut Sha1::default());
293292
do_test_encrypt_decrypt_oaep(&priv_key, &mut Sha224::default());
@@ -299,16 +298,12 @@ mod tests {
299298
do_test_encrypt_decrypt_oaep(&priv_key, &mut Sha3_512::default());
300299
}
301300

302-
fn do_test_encrypt_decrypt_oaep<D: DynDigest>(
303-
prk: &RSAPrivateKey,
304-
digest: &mut D,
305-
) {
306-
301+
fn do_test_encrypt_decrypt_oaep<D: DynDigest>(prk: &RSAPrivateKey, digest: &mut D) {
307302
let mut rng = thread_rng();
308303

309304
let k = prk.size();
310305

311-
for i in 1..8 {
306+
for i in 1..8 {
312307
let mut input: Vec<u8> = (0..i * 8).map(|_| rng.gen()).collect();
313308
if input.len() > k - 11 {
314309
input = input[0..k - 11].to_vec();
@@ -327,8 +322,7 @@ mod tests {
327322
let blinder = if blind { Some(&mut rng) } else { None };
328323
let plaintext = decrypt(blinder, &prk, &ciphertext, digest, label).unwrap();
329324
assert_eq!(input, plaintext);
330-
}
331-
325+
}
332326
}
333327

334328
#[test]
@@ -346,9 +340,15 @@ mod tests {
346340
)
347341
.unwrap();
348342
assert!(
349-
decrypt(Some(&mut rng), &priv_key, &ciphertext, &mut digest, Some("label".to_owned())).is_err(),
343+
decrypt(
344+
Some(&mut rng),
345+
&priv_key,
346+
&ciphertext,
347+
&mut digest,
348+
Some("label".to_owned())
349+
)
350+
.is_err(),
350351
"decrypt should have failed on hash verification"
351352
);
352353
}
353-
354354
}

0 commit comments

Comments
 (0)