diff options
-rw-r--r-- | Cargo.toml | 4 | ||||
-rw-r--r-- | src/security/signed.rs | 8 |
2 files changed, 6 insertions, 6 deletions
@@ -28,9 +28,9 @@ hyper = { version = "0.14", optional = true } serde_json = { version = "1.0", optional = true } base64 = { version = "0.13", optional = true } -hmac = { version = "0.10", optional = true } +hmac = { version = "0.12", optional = true } rand = { version = "0.8", optional = true } -sha2 = { version = "0.9", optional = true } +sha2 = { version = "0.10", optional = true } [package.metadata.docs.rs] all-features = true diff --git a/src/security/signed.rs b/src/security/signed.rs index 2954954..080bed2 100644 --- a/src/security/signed.rs +++ b/src/security/signed.rs @@ -1,4 +1,4 @@ -use hmac::{Hmac, Mac, NewMac}; +use hmac::{Hmac, Mac}; use sha2::Sha256; const SIGNED_KEY_LEN: usize = 32; @@ -42,7 +42,7 @@ impl Key { /// Signs the value providing integrity and authenticity. pub fn sign(&self, value: &str) -> String { // Compute HMAC-SHA256 of the cookie's value. - let mut mac = Hmac::<Sha256>::new_varkey(&self.0).expect("good key"); + let mut mac = Hmac::<Sha256>::new_from_slice(&self.0).expect("good key"); mac.update(value.as_bytes()); // Cookie's new value is [MAC | original-value]. @@ -63,9 +63,9 @@ impl Key { let digest = base64::decode(digest_str).map_err(|_| "bad base64 digest")?; // Perform the verification. - let mut mac = Hmac::<Sha256>::new_varkey(&self.0).expect("good key"); + let mut mac = Hmac::<Sha256>::new_from_slice(&self.0).expect("good key"); mac.update(value.as_bytes()); - mac.verify(&digest) + mac.verify_slice(&digest) .map(|_| value.to_string()) .map_err(|_| "value did not verify".to_string()) } |