diff options
| author | Steven Fackler <[email protected]> | 2014-06-12 22:02:20 -0400 |
|---|---|---|
| committer | Steven Fackler <[email protected]> | 2014-06-12 22:02:20 -0400 |
| commit | d766671bda3777690ef71739bbdd29382d56a7bc (patch) | |
| tree | c280ffd4610361d9feabcea2e4b7ad9cafae7acb | |
| parent | Update for mutex move (diff) | |
| parent | Update symm test for ~[T] changes (diff) | |
| download | rust-openssl-d766671bda3777690ef71739bbdd29382d56a7bc.tar.xz rust-openssl-d766671bda3777690ef71739bbdd29382d56a7bc.zip | |
Merge pull request #19 from zzmp/syntaxFix
Update symm for ~[T] changes
| -rw-r--r-- | crypto/symm.rs | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/crypto/symm.rs b/crypto/symm.rs index fa68c116..dbdb4b5c 100644 --- a/crypto/symm.rs +++ b/crypto/symm.rs @@ -101,7 +101,7 @@ impl Crypter { /** * Initializes this crypter. */ - pub fn init(&self, mode: Mode, key: &[u8], iv: &[u8]) { + pub fn init(&self, mode: Mode, key: &[u8], iv: Vec<u8>) { unsafe { let mode = match mode { Encrypt => 1 as c_int, @@ -171,7 +171,7 @@ impl Drop for Crypter { * Encrypts data, using the specified crypter type in encrypt mode with the * specified key and iv; returns the resulting (encrypted) data. */ -pub fn encrypt(t: Type, key: &[u8], iv: ~[u8], data: &[u8]) -> Vec<u8> { +pub fn encrypt(t: Type, key: &[u8], iv: Vec<u8>, data: &[u8]) -> Vec<u8> { let c = Crypter::new(t); c.init(Encrypt, key, iv); let r = c.update(data); @@ -183,7 +183,7 @@ pub fn encrypt(t: Type, key: &[u8], iv: ~[u8], data: &[u8]) -> Vec<u8> { * Decrypts data, using the specified crypter type in decrypt mode with the * specified key and iv; returns the resulting (decrypted) data. */ -pub fn decrypt(t: Type, key: &[u8], iv: ~[u8], data: &[u8]) -> Vec<u8> { +pub fn decrypt(t: Type, key: &[u8], iv: Vec<u8>, data: &[u8]) -> Vec<u8> { let c = Crypter::new(t); c.init(Decrypt, key, iv); let r = c.update(data); @@ -211,11 +211,11 @@ mod tests { vec!(0x8eu8, 0xa2u8, 0xb7u8, 0xcau8, 0x51u8, 0x67u8, 0x45u8, 0xbfu8, 0xeau8, 0xfcu8, 0x49u8, 0x90u8, 0x4bu8, 0x49u8, 0x60u8, 0x89u8); let c = super::Crypter::new(super::AES_256_ECB); - c.init(super::Encrypt, k0.as_slice(), []); + c.init(super::Encrypt, k0.as_slice(), vec![]); c.pad(false); let r0 = c.update(p0.as_slice()).append(c.final().as_slice()); assert!(r0 == c0); - c.init(super::Decrypt, k0.as_slice(), []); + c.init(super::Decrypt, k0.as_slice(), vec![]); c.pad(false); let p1 = c.update(r0.as_slice()).append(c.final().as_slice()); assert!(p1 == p0); @@ -225,7 +225,7 @@ mod tests { use serialize::hex::ToHex; let cipher = super::Crypter::new(ciphertype); - cipher.init(super::Encrypt, key.from_hex().unwrap().as_slice(), iv.from_hex().unwrap().as_slice()); + cipher.init(super::Encrypt, key.from_hex().unwrap().as_slice(), iv.from_hex().unwrap()); let expected = Vec::from_slice(ct.from_hex().unwrap().as_slice()); let computed = cipher.update(pt.from_hex().unwrap().as_slice()).append(cipher.final().as_slice()); |