Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependencies #288

Merged
merged 2 commits into from
Dec 11, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 4 additions & 6 deletions Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ argon2 = { version = "0.4", default-features = false, features = [
"alloc",
], optional = true }
curve25519-dalek = { version = "=4.0.0-pre.1", default-features = false, optional = true }
derive-where = { version = "=1.0.0-rc.3", features = ["zeroize-on-drop"] }
derive-where = { version = "1", features = ["zeroize-on-drop"] }
digest = "0.10"
displaydoc = { version = "0.2", default-features = false }
elliptic-curve = { version = "0.12", features = ["hash2curve", "sec1"] }
Expand All @@ -46,17 +46,15 @@ serde_ = { version = "1", package = "serde", default-features = false, features
"derive",
], optional = true }
subtle = { version = "2.3", default-features = false }
voprf = { version = "=0.4.0-pre.3", default-features = false, features = [
"danger",
] }
voprf = { version = "0.4", default-features = false, features = ["danger"] }
zeroize = { version = "1.5", features = ["zeroize_derive"] }

[target.'cfg(target_arch = "wasm32")'.dependencies]
getrandom = { version = "0.2", features = ["js"], optional = true }

[dev-dependencies]
bincode = "1"
chacha20poly1305 = "=0.10.0-pre"
chacha20poly1305 = "0.10"
criterion = "0.4"
hex = "0.4"
json = "0.12"
Expand All @@ -67,7 +65,7 @@ p256 = { version = "0.11", default-features = false, features = [
proptest = "1"
rand = "0.8"
regex = "1"
rustyline = "9"
rustyline = "10"
scrypt = "0.10"
serde_json = "1"

Expand Down
4 changes: 2 additions & 2 deletions examples/digital_locker.rs
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@

use std::process::exit;

use chacha20poly1305::aead::{Aead, NewAead};
use chacha20poly1305::aead::{Aead, KeyInit};
use chacha20poly1305::{ChaCha20Poly1305, Key, Nonce};
use generic_array::GenericArray;
use opaque_ke::ciphersuite::CipherSuite;
Expand Down Expand Up @@ -216,7 +216,7 @@ fn main() {
let mut rng = OsRng;
let server_setup = ServerSetup::<DefaultCipherSuite>::new(&mut rng);

let mut rl = Editor::<()>::new();
let mut rl = Editor::<()>::new().unwrap();
let mut registered_lockers: Vec<Locker> = vec![];
loop {
display_lockers(&registered_lockers);
Expand Down
2 changes: 1 addition & 1 deletion examples/simple_login.rs
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@ fn main() {
let mut rng = OsRng;
let server_setup = ServerSetup::<DefaultCipherSuite>::new(&mut rng);

let mut rl = Editor::<()>::new();
let mut rl = Editor::<()>::new().unwrap();
let mut registered_users =
HashMap::<String, GenericArray<u8, ServerRegistrationLen<DefaultCipherSuite>>>::new();
loop {
Expand Down
4 changes: 2 additions & 2 deletions src/opaque.rs
Original file line number Diff line number Diff line change
Expand Up @@ -453,7 +453,7 @@ where
oprf_key_from_seed::<CS::OprfCs>(&server_setup.oprf_seed, credential_identifier)?;

let server = voprf::OprfServer::new_with_key(&oprf_key)?;
let evaluation_element = server.evaluate(&message.blinded_element);
let evaluation_element = server.blind_evaluate(&message.blinded_element);

Ok(ServerRegistrationStartResult {
message: RegistrationResponse {
Expand Down Expand Up @@ -760,7 +760,7 @@ where
.map_err(ProtocolError::into_custom)?;
let server = voprf::OprfServer::new_with_key(&oprf_key)
.map_err(|e| ProtocolError::into_custom(e.into()))?;
let evaluation_element = server.evaluate(&credential_request.blinded_element);
let evaluation_element = server.blind_evaluate(&credential_request.blinded_element);

let beta = OprfGroup::<CS>::serialize_elem(evaluation_element.value());
let credential_response_component =
Expand Down
2 changes: 1 addition & 1 deletion src/tests/full_test.rs
Original file line number Diff line number Diff line change
Expand Up @@ -276,7 +276,7 @@ static TEST_VECTOR_X25519_P256: &str = r#"
"#;

fn decode(values: &Value, key: &str) -> Option<Vec<u8>> {
values[key].as_str().and_then(|s| hex::decode(&s).ok())
values[key].as_str().and_then(|s| hex::decode(s).ok())
}

fn populate_test_vectors(values: &Value) -> TestVectorParameters {
Expand Down
2 changes: 1 addition & 1 deletion src/tests/mock_rng.rs
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ impl RngCore for CycleRng {
#[inline]
fn fill_bytes(&mut self, dest: &mut [u8]) {
let len = min(self.v.len(), dest.len());
(&mut dest[..len]).copy_from_slice(&self.v[..len]);
dest[..len].copy_from_slice(&self.v[..len]);
rotate_left(&mut self.v, len);
}

Expand Down
2 changes: 1 addition & 1 deletion src/tests/test_opaque_vectors.rs
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ macro_rules! parse_default {
}

fn decode(values: &JsonValue, key: &str) -> Option<Vec<u8>> {
values[key].as_str().and_then(|s| hex::decode(&s).ok())
values[key].as_str().and_then(|s| hex::decode(s).ok())
}

fn populate_test_vectors<CS: CipherSuite>(values: &JsonValue) -> OpaqueTestVectorParameters
Expand Down