bump dependencies

This commit is contained in:
Kai Jan Kriegel 2021-12-26 05:19:27 +01:00
parent 3dd731e1cc
commit cd299c01bb
5 changed files with 15 additions and 15 deletions

View File

@ -8,16 +8,16 @@ license = "MIT OR Apache-2.0"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
des = "0.6.0" des = "0.7.0"
aes = "0.6.0" aes = "0.7.5"
block-modes = "0.7.0" block-modes = "0.8.1"
simple-error = "0.2.3" simple-error = "0.2.3"
hex = "0.4.2" hex = "0.4.3"
num-traits = "0.2.14" num-traits = "0.2.14"
num-derive = "0.3.3" num-derive = "0.3.3"
rand = "0.8.3" rand = "0.8.4"
[dev-dependencies] [dev-dependencies]
hex-literal = "0.3.1" hex-literal = "0.3.4"
mockall = "0.10.2" mockall = "0.11.0"
pcsc = "2.6.0" pcsc = "2.6.0"

View File

@ -13,13 +13,13 @@ impl Cipher for AES {
const KEY_SIZE: usize = 16; const KEY_SIZE: usize = 16;
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = Aes128Cbc::new_var(&key, &iv)?; let cipher = Aes128Cbc::new_from_slices(&key, &iv)?;
return Ok(cipher.encrypt_vec(data)); return Ok(cipher.encrypt_vec(data));
} }
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = Aes128Cbc::new_var(&key, &iv)?; let cipher = Aes128Cbc::new_from_slices(&key, &iv)?;
let result = cipher.decrypt_vec(data); let result = cipher.decrypt_vec(data);
return match result { return match result {

View File

@ -14,13 +14,13 @@ impl Cipher for Tdes {
const KEY_SIZE: usize = 16; const KEY_SIZE: usize = 16;
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = TDesEde2Cbc::new_var(&key, &iv)?; let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
return Ok(cipher.encrypt_vec(data)); return Ok(cipher.encrypt_vec(data));
} }
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = TDesEde2Cbc::new_var(&key, &iv)?; let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
let result = cipher.decrypt_vec(data); let result = cipher.decrypt_vec(data);
return match result { return match result {

View File

@ -14,13 +14,13 @@ impl Cipher for Tdes2k {
const KEY_SIZE: usize = 16; const KEY_SIZE: usize = 16;
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = TDesEde2Cbc::new_var(&key, &iv)?; let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
return Ok(cipher.encrypt_vec(data)); return Ok(cipher.encrypt_vec(data));
} }
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = TDesEde2Cbc::new_var(&key, &iv)?; let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
let result = cipher.decrypt_vec(data); let result = cipher.decrypt_vec(data);
return match result { return match result {

View File

@ -14,13 +14,13 @@ impl Cipher for Tdes3k {
const KEY_SIZE: usize = 24; const KEY_SIZE: usize = 24;
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = TDesEde3Cbc::new_var(&key, &iv)?; let cipher = TDesEde3Cbc::new_from_slices(&key, &iv)?;
return Ok(cipher.encrypt_vec(data)); return Ok(cipher.encrypt_vec(data));
} }
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> { fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
let cipher = TDesEde3Cbc::new_var(&key, &iv)?; let cipher = TDesEde3Cbc::new_from_slices(&key, &iv)?;
let result = cipher.decrypt_vec(data); let result = cipher.decrypt_vec(data);
return match result { return match result {