diff options
| author | Kevin Ballard <[email protected]> | 2013-07-10 10:16:53 -0700 |
|---|---|---|
| committer | Kevin Ballard <[email protected]> | 2013-07-10 10:16:53 -0700 |
| commit | 867433a09778a55fa4f92a36c3fe7e70fa815bb7 (patch) | |
| tree | 1ae88436c915e94c7d8253a31e8f752713b6ea44 | |
| parent | Update for 0.7 (diff) | |
| download | rust-openssl-867433a09778a55fa4f92a36c3fe7e70fa815bb7.tar.xz rust-openssl-867433a09778a55fa4f92a36c3fe7e70fa815bb7.zip | |
Update for 0.8-pre (f503e53)
| -rw-r--r-- | hash.rs | 4 | ||||
| -rw-r--r-- | hmac.rs | 4 | ||||
| -rw-r--r-- | pkcs5.rs | 4 | ||||
| -rw-r--r-- | pkey.rs | 20 | ||||
| -rw-r--r-- | rand.rs | 2 | ||||
| -rw-r--r-- | symm.rs | 10 |
6 files changed, 22 insertions, 22 deletions
@@ -73,7 +73,7 @@ impl Hasher { /// Update this hasher with more input bytes pub fn update(&self, data: &[u8]) { unsafe { - do vec::as_imm_buf(data) |pdata, len| { + do data.as_imm_buf |pdata, len| { EVP_DigestUpdate(self.ctx, pdata, len as c_uint) } } @@ -86,7 +86,7 @@ impl Hasher { pub fn final(&self) -> ~[u8] { unsafe { let mut res = vec::from_elem(self.len, 0u8); - do vec::as_mut_buf(res) |pres, _len| { + do res.as_mut_buf |pres, _len| { EVP_DigestFinal(self.ctx, pres, ptr::null()); } res @@ -68,7 +68,7 @@ pub fn HMAC(ht: HashType, key: ~[u8]) -> HMAC { impl HMAC { pub fn update(&mut self, data: &[u8]) { unsafe { - do vec::as_imm_buf(data) |pdata, len| { + do data.as_imm_buf |pdata, len| { HMAC_Update(&mut self.ctx, pdata, len as libc::c_uint) } } @@ -78,7 +78,7 @@ impl HMAC { unsafe { let mut res = vec::from_elem(self.len, 0u8); let mut outlen: libc::c_uint = 0; - do vec::as_mut_buf(res) |pres, _len| { + do res.as_mut_buf |pres, _len| { HMAC_Final(&mut self.ctx, pres, &mut outlen); assert!(self.len == outlen as uint) } @@ -19,10 +19,10 @@ pub fn pbkdf2_hmac_sha1(pass: &str, salt: &[u8], iter: uint, assert!(keylen >= 1u); do str::as_buf(pass) |pass_buf, pass_len| { - do vec::as_imm_buf(salt) |salt_buf, salt_len| { + do salt.as_imm_buf |salt_buf, salt_len| { let mut out = vec::with_capacity(keylen); - do vec::as_mut_buf(out) |out_buf, _out_len| { + do out.as_mut_buf |out_buf, _out_len| { unsafe { let r = PKCS5_PBKDF2_HMAC_SHA1( pass_buf, pass_len as c_int, @@ -106,7 +106,7 @@ impl PKey { if len < 0 as c_int { return ~[]; } let mut s = vec::from_elem(len as uint, 0u8); - let r = do vec::as_mut_buf(s) |ps, _len| { + let r = do s.as_mut_buf |ps, _len| { f(self.evp, &ps) }; @@ -118,7 +118,7 @@ impl PKey { s: &[u8], f: extern "C" unsafe fn(c_int, &*EVP_PKEY, &*u8, c_uint) -> *EVP_PKEY ) { - do vec::as_imm_buf(s) |ps, len| { + do s.as_imm_buf |ps, len| { let evp = ptr::null(); f(6 as c_int, &evp, &ps, len as c_uint); self.evp = evp; @@ -242,8 +242,8 @@ impl PKey { let mut r = vec::from_elem(len as uint + 1u, 0u8); - let rv = do vec::as_mut_buf(r) |pr, _len| { - do vec::as_imm_buf(s) |ps, s_len| { + let rv = do r.as_mut_buf |pr, _len| { + do s.as_imm_buf |ps, s_len| { RSA_public_encrypt( s_len as c_uint, ps, @@ -270,8 +270,8 @@ impl PKey { let mut r = vec::from_elem(len as uint + 1u, 0u8); - let rv = do vec::as_mut_buf(r) |pr, _len| { - do vec::as_imm_buf(s) |ps, s_len| { + let rv = do r.as_mut_buf |pr, _len| { + do s.as_imm_buf |ps, s_len| { RSA_private_decrypt( s_len as c_uint, ps, @@ -319,8 +319,8 @@ impl PKey { let len = RSA_size(rsa); let mut r = vec::from_elem(len as uint + 1u, 0u8); - let rv = do vec::as_mut_buf(r) |pr, _len| { - do vec::as_imm_buf(s) |ps, s_len| { + let rv = do r.as_mut_buf |pr, _len| { + do s.as_imm_buf |ps, s_len| { RSA_sign( openssl_hash_nid(hash), ps, @@ -343,8 +343,8 @@ impl PKey { unsafe { let rsa = EVP_PKEY_get1_RSA(self.evp); - do vec::as_imm_buf(m) |pm, m_len| { - do vec::as_imm_buf(s) |ps, s_len| { + do m.as_imm_buf |pm, m_len| { + do s.as_imm_buf |ps, s_len| { let rv = RSA_verify( openssl_hash_nid(hash), pm, @@ -10,7 +10,7 @@ extern { pub fn rand_bytes(len: uint) -> ~[u8] { let mut out = vec::with_capacity(len); - do vec::as_mut_buf(out) |out_buf, len| { + do out.as_mut_buf |out_buf, len| { unsafe { let r = RAND_bytes(out_buf, len as c_int); if r != 1 as c_int { fail!() } @@ -111,8 +111,8 @@ impl Crypter { }; assert!(key.len() == self.keylen); - do vec::as_imm_buf(key) |pkey, _len| { - do vec::as_imm_buf(iv) |piv, _len| { + do key.as_imm_buf |pkey, _len| { + do iv.as_imm_buf |piv, _len| { EVP_CipherInit( self.ctx, self.evp, @@ -131,10 +131,10 @@ impl Crypter { */ pub fn update(&self, data: &[u8]) -> ~[u8] { unsafe { - do vec::as_imm_buf(data) |pdata, len| { + do data.as_imm_buf |pdata, len| { let mut res = vec::from_elem(len + self.blocksize, 0u8); - let reslen = do vec::as_mut_buf(res) |pres, _len| { + let reslen = do res.as_mut_buf |pres, _len| { let mut reslen = (len + self.blocksize) as u32; EVP_CipherUpdate( @@ -160,7 +160,7 @@ impl Crypter { unsafe { let mut res = vec::from_elem(self.blocksize, 0u8); - let reslen = do vec::as_mut_buf(res) |pres, _len| { + let reslen = do res.as_mut_buf |pres, _len| { let mut reslen = self.blocksize as c_int; EVP_CipherFinal(self.ctx, pres, &mut reslen); reslen |