@@ -77,7 +77,7 @@ pub fn encrypt<R: Rng, K: PublicKey>(
77
77
pub_key : & K ,
78
78
msg : & [ u8 ] ,
79
79
digest : & mut impl DynDigest ,
80
- label : Option < String >
80
+ label : Option < String > ,
81
81
) -> Result < Vec < u8 > > {
82
82
key:: check_public ( pub_key) ?;
83
83
@@ -101,7 +101,7 @@ pub fn encrypt<R: Rng, K: PublicKey>(
101
101
rng. fill ( seed) ;
102
102
103
103
// Data block DB = pHash || PS || 01 || M
104
- let db_len = k -h_size - 1 ;
104
+ let db_len = k - h_size - 1 ;
105
105
106
106
digest. input ( label. as_bytes ( ) ) ;
107
107
let p_hash = digest. result_reset ( ) ;
@@ -139,7 +139,7 @@ pub fn decrypt<R: Rng>(
139
139
priv_key : & RSAPrivateKey ,
140
140
ciphertext : & [ u8 ] ,
141
141
digest : & mut impl DynDigest ,
142
- label : Option < String >
142
+ label : Option < String > ,
143
143
) -> Result < Vec < u8 > > {
144
144
key:: check_public ( priv_key) ?;
145
145
@@ -163,7 +163,7 @@ fn decrypt_inner<R: Rng>(
163
163
priv_key : & RSAPrivateKey ,
164
164
ciphertext : & [ u8 ] ,
165
165
digest : & mut impl DynDigest ,
166
- label : Option < String >
166
+ label : Option < String > ,
167
167
) -> Result < ( u8 , Vec < u8 > , u32 ) > {
168
168
let k = priv_key. size ( ) ;
169
169
if k < 11 {
@@ -287,7 +287,6 @@ mod tests {
287
287
288
288
#[ test]
289
289
fn test_encrypt_decrypt_oaep ( ) {
290
-
291
290
let priv_key = get_private_key ( ) ;
292
291
do_test_encrypt_decrypt_oaep ( & priv_key, & mut Sha1 :: default ( ) ) ;
293
292
do_test_encrypt_decrypt_oaep ( & priv_key, & mut Sha224 :: default ( ) ) ;
@@ -299,16 +298,12 @@ mod tests {
299
298
do_test_encrypt_decrypt_oaep ( & priv_key, & mut Sha3_512 :: default ( ) ) ;
300
299
}
301
300
302
- fn do_test_encrypt_decrypt_oaep < D : DynDigest > (
303
- prk : & RSAPrivateKey ,
304
- digest : & mut D ,
305
- ) {
306
-
301
+ fn do_test_encrypt_decrypt_oaep < D : DynDigest > ( prk : & RSAPrivateKey , digest : & mut D ) {
307
302
let mut rng = thread_rng ( ) ;
308
303
309
304
let k = prk. size ( ) ;
310
305
311
- for i in 1 ..8 {
306
+ for i in 1 ..8 {
312
307
let mut input: Vec < u8 > = ( 0 ..i * 8 ) . map ( |_| rng. gen ( ) ) . collect ( ) ;
313
308
if input. len ( ) > k - 11 {
314
309
input = input[ 0 ..k - 11 ] . to_vec ( ) ;
@@ -327,8 +322,7 @@ mod tests {
327
322
let blinder = if blind { Some ( & mut rng) } else { None } ;
328
323
let plaintext = decrypt ( blinder, & prk, & ciphertext, digest, label) . unwrap ( ) ;
329
324
assert_eq ! ( input, plaintext) ;
330
- }
331
-
325
+ }
332
326
}
333
327
334
328
#[ test]
@@ -346,9 +340,15 @@ mod tests {
346
340
)
347
341
. unwrap ( ) ;
348
342
assert ! (
349
- decrypt( Some ( & mut rng) , & priv_key, & ciphertext, & mut digest, Some ( "label" . to_owned( ) ) ) . is_err( ) ,
343
+ decrypt(
344
+ Some ( & mut rng) ,
345
+ & priv_key,
346
+ & ciphertext,
347
+ & mut digest,
348
+ Some ( "label" . to_owned( ) )
349
+ )
350
+ . is_err( ) ,
350
351
"decrypt should have failed on hash verification"
351
352
) ;
352
353
}
353
-
354
354
}
0 commit comments