Skip to content

Commit 8f161de

Browse files
committed
Fix the tests
1 parent 27f4d70 commit 8f161de

File tree

5 files changed

+15
-27
lines changed

5 files changed

+15
-27
lines changed

Cargo.toml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,7 @@ rand = "0.6.5"
2121
byteorder = "1.3.1"
2222
failure = "0.1.5"
2323
subtle = "2.0.0"
24-
signature = { version = "0.2.0" }
25-
sha2 = { version = "0.8" }
26-
sha-1 = { version = "0.8.1" }
24+
digest = "0.8"
2725

2826
[dependencies.zeroize]
2927
version = "0.6"
@@ -39,6 +37,7 @@ features = ["std", "derive"]
3937
base64 = "0.10.1"
4038
hex = "0.3.2"
4139
serde_test = "1.0.89"
40+
sha-1 = "0.8.1"
4241

4342

4443
[[bench]]

src/key.rs

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -390,8 +390,10 @@ mod tests {
390390
#[test]
391391
fn test_from_into() {
392392
let private_key = RSAPrivateKey {
393-
n: BigUint::from_u64(100).unwrap(),
394-
e: BigUint::from_u64(200).unwrap(),
393+
pubkey_components: RSAPublicKey {
394+
n: BigUint::from_u64(100).unwrap(),
395+
e: BigUint::from_u64(200).unwrap(),
396+
},
395397
d: BigUint::from_u64(123).unwrap(),
396398
primes: vec![],
397399
precomputed: None,

src/lib.rs

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
//! extern crate rsa;
99
//! extern crate rand;
1010
//!
11-
//! use rsa::{PublicKey, RSAPrivateKey, PaddingScheme};
11+
//! use rsa::RSAPrivateKey;
1212
//! use rand::rngs::OsRng;
1313
//!
1414
//! let mut rng = OsRng::new().expect("no secure randomness available");
@@ -17,11 +17,11 @@
1717
//!
1818
//! // Encrypt
1919
//! let data = b"hello world";
20-
//! let enc_data = key.encrypt(&mut rng, PaddingScheme::PKCS1v15, &data[..]).expect("failed to encrypt");
20+
//! let enc_data = key.encrypt_pkcs1v15(&mut rng, &data[..]).expect("failed to encrypt");
2121
//! assert_ne!(&data[..], &enc_data[..]);
2222
//!
2323
//! // Decrypt
24-
//! let dec_data = key.decrypt(PaddingScheme::PKCS1v15, &enc_data).expect("failed to decrypt");
24+
//! let dec_data = key.decrypt_pkcs1v15(&enc_data).expect("failed to decrypt");
2525
//! assert_eq!(&data[..], &dec_data[..]);
2626
//! ```
2727
//!
@@ -57,15 +57,11 @@ pub mod errors;
5757
/// Supported hash functions.
5858
pub mod hash;
5959

60-
/// Supported padding schemes.
61-
pub mod padding;
62-
6360
mod key;
6461
mod pkcs1v15;
6562
mod pss;
6663

6764
pub use self::key::{RSAPrivateKey, RSAPublicKey};
68-
pub use self::padding::PaddingScheme;
6965

7066
// Optionally expose internals if requested via feature-flag.
7167

src/padding.rs

Lines changed: 0 additions & 7 deletions
This file was deleted.

src/pkcs1v15.rs

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,6 @@ mod tests {
266266

267267
use crate::hash::Hashes;
268268
use crate::key::RSAPublicKey;
269-
use crate::padding::PaddingScheme;
270269

271270
#[test]
272271
fn test_non_zero_bytes() {
@@ -323,7 +322,7 @@ mod tests {
323322

324323
for test in &tests {
325324
let out = priv_key
326-
.decrypt(PaddingScheme::PKCS1v15, &base64::decode(test[0]).unwrap())
325+
.decrypt_pkcs1v15(&base64::decode(test[0]).unwrap())
327326
.unwrap();
328327
assert_eq!(out, test[1].as_bytes());
329328
}
@@ -364,16 +363,15 @@ mod tests {
364363
let expected = hex::decode(test[1]).unwrap();
365364

366365
let out = priv_key
367-
.sign(PaddingScheme::PKCS1v15, Some(&Hashes::SHA1), &digest)
366+
.sign_pkcs1v15(Some(&Hashes::SHA1), &digest)
368367
.unwrap();
369368
assert_ne!(out, digest);
370369
assert_eq!(out, expected);
371370

372371
let mut rng = thread_rng();
373372
let out2 = priv_key
374-
.sign_blinded(
373+
.sign_pkcs1v15_blinded(
375374
&mut rng,
376-
PaddingScheme::PKCS1v15,
377375
Some(&Hashes::SHA1),
378376
&digest,
379377
)
@@ -396,7 +394,7 @@ mod tests {
396394
let sig = hex::decode(test[1]).unwrap();
397395

398396
pub_key
399-
.verify(PaddingScheme::PKCS1v15, Some(&Hashes::SHA1), &digest, &sig)
397+
.verify_pkcs1v15(Some(&Hashes::SHA1), &digest, &sig)
400398
.expect("failed to verify");
401399
}
402400
}
@@ -408,13 +406,13 @@ mod tests {
408406
let priv_key = get_private_key();
409407

410408
let sig = priv_key
411-
.sign::<Hashes>(PaddingScheme::PKCS1v15, None, msg)
409+
.sign_pkcs1v15::<Hashes>(None, msg)
412410
.unwrap();
413411
assert_eq!(expected_sig, sig);
414412

415413
let pub_key: RSAPublicKey = priv_key.into();
416414
pub_key
417-
.verify(PaddingScheme::PKCS1v15, None, msg, &sig)
415+
.verify_pkcs1v15::<Hashes>(None, msg, &sig)
418416
.expect("failed to verify");
419417
}
420418
}

0 commit comments

Comments
 (0)