Skip to content

Commit f5bfd00

Browse files
committed
Fix the tests
1 parent d354308 commit f5bfd00

File tree

5 files changed

+15
-27
lines changed

5 files changed

+15
-27
lines changed

Cargo.toml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,7 @@ byteorder = { version = "1.3.1", default-features = false }
2222
failure = { version = "0.1.5", default-features = false, features = ["derive"] }
2323
subtle = { version = "2.0.0", default-features = false }
2424
libm = "0.1.4"
25-
signature = { version = "0.2.0", default-features = false }
26-
sha2 = { version = "0.8", default-features = false }
27-
sha-1 = { version = "0.8.1", default-features = false }
25+
digest = "0.8"
2826

2927
[dependencies.zeroize]
3028
version = "0.6"
@@ -40,6 +38,7 @@ features = ["derive"]
4038
base64 = "0.10.1"
4139
hex = "0.3.2"
4240
serde_test = "1.0.89"
41+
sha-1 = "0.8.1"
4342

4443

4544
[[bench]]

src/key.rs

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -392,8 +392,10 @@ mod tests {
392392
#[test]
393393
fn test_from_into() {
394394
let private_key = RSAPrivateKey {
395-
n: BigUint::from_u64(100).unwrap(),
396-
e: BigUint::from_u64(200).unwrap(),
395+
pubkey_components: RSAPublicKey {
396+
n: BigUint::from_u64(100).unwrap(),
397+
e: BigUint::from_u64(200).unwrap(),
398+
},
397399
d: BigUint::from_u64(123).unwrap(),
398400
primes: vec![],
399401
precomputed: None,

src/lib.rs

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
//! extern crate rsa;
99
//! extern crate rand;
1010
//!
11-
//! use rsa::{PublicKey, RSAPrivateKey, PaddingScheme};
11+
//! use rsa::RSAPrivateKey;
1212
//! use rand::rngs::OsRng;
1313
//!
1414
//! let mut rng = OsRng::new().expect("no secure randomness available");
@@ -17,11 +17,11 @@
1717
//!
1818
//! // Encrypt
1919
//! let data = b"hello world";
20-
//! let enc_data = key.encrypt(&mut rng, PaddingScheme::PKCS1v15, &data[..]).expect("failed to encrypt");
20+
//! let enc_data = key.encrypt_pkcs1v15(&mut rng, &data[..]).expect("failed to encrypt");
2121
//! assert_ne!(&data[..], &enc_data[..]);
2222
//!
2323
//! // Decrypt
24-
//! let dec_data = key.decrypt(PaddingScheme::PKCS1v15, &enc_data).expect("failed to decrypt");
24+
//! let dec_data = key.decrypt_pkcs1v15(&enc_data).expect("failed to decrypt");
2525
//! assert_eq!(&data[..], &dec_data[..]);
2626
//! ```
2727
//!
@@ -65,15 +65,11 @@ pub mod errors;
6565
/// Supported hash functions.
6666
pub mod hash;
6767

68-
/// Supported padding schemes.
69-
pub mod padding;
70-
7168
mod key;
7269
mod pkcs1v15;
7370
mod pss;
7471

7572
pub use self::key::{RSAPrivateKey, RSAPublicKey};
76-
pub use self::padding::PaddingScheme;
7773

7874
// Optionally expose internals if requested via feature-flag.
7975

src/padding.rs

Lines changed: 0 additions & 7 deletions
This file was deleted.

src/pkcs1v15.rs

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,6 @@ mod tests {
267267

268268
use crate::hash::Hashes;
269269
use crate::key::RSAPublicKey;
270-
use crate::padding::PaddingScheme;
271270

272271
#[test]
273272
fn test_non_zero_bytes() {
@@ -324,7 +323,7 @@ mod tests {
324323

325324
for test in &tests {
326325
let out = priv_key
327-
.decrypt(PaddingScheme::PKCS1v15, &base64::decode(test[0]).unwrap())
326+
.decrypt_pkcs1v15(&base64::decode(test[0]).unwrap())
328327
.unwrap();
329328
assert_eq!(out, test[1].as_bytes());
330329
}
@@ -365,16 +364,15 @@ mod tests {
365364
let expected = hex::decode(test[1]).unwrap();
366365

367366
let out = priv_key
368-
.sign(PaddingScheme::PKCS1v15, Some(&Hashes::SHA1), &digest)
367+
.sign_pkcs1v15(Some(&Hashes::SHA1), &digest)
369368
.unwrap();
370369
assert_ne!(out, digest);
371370
assert_eq!(out, expected);
372371

373372
let mut rng = thread_rng();
374373
let out2 = priv_key
375-
.sign_blinded(
374+
.sign_pkcs1v15_blinded(
376375
&mut rng,
377-
PaddingScheme::PKCS1v15,
378376
Some(&Hashes::SHA1),
379377
&digest,
380378
)
@@ -397,7 +395,7 @@ mod tests {
397395
let sig = hex::decode(test[1]).unwrap();
398396

399397
pub_key
400-
.verify(PaddingScheme::PKCS1v15, Some(&Hashes::SHA1), &digest, &sig)
398+
.verify_pkcs1v15(Some(&Hashes::SHA1), &digest, &sig)
401399
.expect("failed to verify");
402400
}
403401
}
@@ -409,13 +407,13 @@ mod tests {
409407
let priv_key = get_private_key();
410408

411409
let sig = priv_key
412-
.sign::<Hashes>(PaddingScheme::PKCS1v15, None, msg)
410+
.sign_pkcs1v15::<Hashes>(None, msg)
413411
.unwrap();
414412
assert_eq!(expected_sig, sig);
415413

416414
let pub_key: RSAPublicKey = priv_key.into();
417415
pub_key
418-
.verify(PaddingScheme::PKCS1v15, None, msg, &sig)
416+
.verify_pkcs1v15::<Hashes>(None, msg, &sig)
419417
.expect("failed to verify");
420418
}
421419
}

0 commit comments

Comments
 (0)