mirror of
https://gitlab.com/fabinfra/fabaccess/nfc_rs.git
synced 2025-03-12 06:41:46 +01:00
bump dependencies
This commit is contained in:
parent
3dd731e1cc
commit
cd299c01bb
14
Cargo.toml
14
Cargo.toml
@ -8,16 +8,16 @@ license = "MIT OR Apache-2.0"
|
||||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||
|
||||
[dependencies]
|
||||
des = "0.6.0"
|
||||
aes = "0.6.0"
|
||||
block-modes = "0.7.0"
|
||||
des = "0.7.0"
|
||||
aes = "0.7.5"
|
||||
block-modes = "0.8.1"
|
||||
simple-error = "0.2.3"
|
||||
hex = "0.4.2"
|
||||
hex = "0.4.3"
|
||||
num-traits = "0.2.14"
|
||||
num-derive = "0.3.3"
|
||||
rand = "0.8.3"
|
||||
rand = "0.8.4"
|
||||
|
||||
[dev-dependencies]
|
||||
hex-literal = "0.3.1"
|
||||
mockall = "0.10.2"
|
||||
hex-literal = "0.3.4"
|
||||
mockall = "0.11.0"
|
||||
pcsc = "2.6.0"
|
||||
|
@ -13,13 +13,13 @@ impl Cipher for AES {
|
||||
const KEY_SIZE: usize = 16;
|
||||
|
||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = Aes128Cbc::new_var(&key, &iv)?;
|
||||
let cipher = Aes128Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
return Ok(cipher.encrypt_vec(data));
|
||||
}
|
||||
|
||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = Aes128Cbc::new_var(&key, &iv)?;
|
||||
let cipher = Aes128Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
let result = cipher.decrypt_vec(data);
|
||||
return match result {
|
||||
|
@ -14,13 +14,13 @@ impl Cipher for Tdes {
|
||||
const KEY_SIZE: usize = 16;
|
||||
|
||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
||||
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
return Ok(cipher.encrypt_vec(data));
|
||||
}
|
||||
|
||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
||||
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
let result = cipher.decrypt_vec(data);
|
||||
return match result {
|
||||
|
@ -14,13 +14,13 @@ impl Cipher for Tdes2k {
|
||||
const KEY_SIZE: usize = 16;
|
||||
|
||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
||||
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
return Ok(cipher.encrypt_vec(data));
|
||||
}
|
||||
|
||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = TDesEde2Cbc::new_var(&key, &iv)?;
|
||||
let cipher = TDesEde2Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
let result = cipher.decrypt_vec(data);
|
||||
return match result {
|
||||
|
@ -14,13 +14,13 @@ impl Cipher for Tdes3k {
|
||||
const KEY_SIZE: usize = 24;
|
||||
|
||||
fn encrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = TDesEde3Cbc::new_var(&key, &iv)?;
|
||||
let cipher = TDesEde3Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
return Ok(cipher.encrypt_vec(data));
|
||||
}
|
||||
|
||||
fn decrypt(data: &[u8], key: &[u8], iv: &[u8]) -> Result<Vec<u8>> {
|
||||
let cipher = TDesEde3Cbc::new_var(&key, &iv)?;
|
||||
let cipher = TDesEde3Cbc::new_from_slices(&key, &iv)?;
|
||||
|
||||
let result = cipher.decrypt_vec(data);
|
||||
return match result {
|
||||
|
Loading…
x
Reference in New Issue
Block a user