mirror of
https://gitlab.com/fabinfra/fabaccess/nfc_rs.git
synced 2025-03-12 14:51:50 +01:00
bump dependencies
This commit is contained in:
parent
3dd731e1cc
commit
cd299c01bb
14
Cargo.toml
14
Cargo.toml
@ -8,16 +8,16 @@ license = "MIT OR Apache-2.0"
|
|||||||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
des = "0.6.0"
|
des = "0.7.0"
|
||||||
aes = "0.6.0"
|
aes = "0.7.5"
|
||||||
block-modes = "0.7.0"
|
block-modes = "0.8.1"
|
||||||
simple-error = "0.2.3"
|
simple-error = "0.2.3"
|
||||||
hex = "0.4.2"
|
hex = "0.4.3"
|
||||||
num-traits = "0.2.14"
|
num-traits = "0.2.14"
|
||||||
num-derive = "0.3.3"
|
num-derive = "0.3.3"
|
||||||
rand = "0.8.3"
|
rand = "0.8.4"
|
||||||
|
|
||||||
[dev-dependencies]
|
[dev-dependencies]
|
||||||
hex-literal = "0.3.1"
|
hex-literal = "0.3.4"
|
||||||
mockall = "0.10.2"
|
mockall = "0.11.0"
|
||||||
pcsc = "2.6.0"
|
pcsc = "2.6.0"
|
||||||
|
@ -13,13 +13,13 @@ impl Cipher for AES {
|
|||||||
const KEY_SIZE: usize = 16;
|
const KEY_SIZE: usize = 16;
|
||||||
|
|
||||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = Aes128Cbc::new_var(&key, &iv)?;
|
let cipher = Aes128Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
return Ok(cipher.encrypt_vec(data));
|
return Ok(cipher.encrypt_vec(data));
|
||||||
}
|
}
|
||||||
|
|
||||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = Aes128Cbc::new_var(&key, &iv)?;
|
let cipher = Aes128Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
let result = cipher.decrypt_vec(data);
|
let result = cipher.decrypt_vec(data);
|
||||||
return match result {
|
return match result {
|
||||||
|
@ -14,13 +14,13 @@ impl Cipher for Tdes {
|
|||||||
const KEY_SIZE: usize = 16;
|
const KEY_SIZE: usize = 16;
|
||||||
|
|
||||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
return Ok(cipher.encrypt_vec(data));
|
return Ok(cipher.encrypt_vec(data));
|
||||||
}
|
}
|
||||||
|
|
||||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
let result = cipher.decrypt_vec(data);
|
let result = cipher.decrypt_vec(data);
|
||||||
return match result {
|
return match result {
|
||||||
|
@ -14,13 +14,13 @@ impl Cipher for Tdes2k {
|
|||||||
const KEY_SIZE: usize = 16;
|
const KEY_SIZE: usize = 16;
|
||||||
|
|
||||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
return Ok(cipher.encrypt_vec(data));
|
return Ok(cipher.encrypt_vec(data));
|
||||||
}
|
}
|
||||||
|
|
||||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
let result = cipher.decrypt_vec(data);
|
let result = cipher.decrypt_vec(data);
|
||||||
return match result {
|
return match result {
|
||||||
|
@ -14,13 +14,13 @@ impl Cipher for Tdes3k {
|
|||||||
const KEY_SIZE: usize = 24;
|
const KEY_SIZE: usize = 24;
|
||||||
|
|
||||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = TDesEde3Cbc::new_var(&key, &iv)?;
|
let cipher = TDesEde3Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
return Ok(cipher.encrypt_vec(data));
|
return Ok(cipher.encrypt_vec(data));
|
||||||
}
|
}
|
||||||
|
|
||||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||||
let cipher = TDesEde3Cbc::new_var(&key, &iv)?;
|
let cipher = TDesEde3Cbc::new_from_slices(&key, &iv)?;
|
||||||
|
|
||||||
let result = cipher.decrypt_vec(data);
|
let result = cipher.decrypt_vec(data);
|
||||||
return match result {
|
return match result {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user