From 4061b03b3be49ae4fab026a92c463f837173831b Mon Sep 17 00:00:00 2001 From: Martin Fischer Date: Thu, 23 Dec 2021 15:55:41 +0100 Subject: upgrade hmac and sha2 --- src/security/signed.rs | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'src') diff --git a/src/security/signed.rs b/src/security/signed.rs index 2954954..080bed2 100644 --- a/src/security/signed.rs +++ b/src/security/signed.rs @@ -1,4 +1,4 @@ -use hmac::{Hmac, Mac, NewMac}; +use hmac::{Hmac, Mac}; use sha2::Sha256; const SIGNED_KEY_LEN: usize = 32; @@ -42,7 +42,7 @@ impl Key { /// Signs the value providing integrity and authenticity. pub fn sign(&self, value: &str) -> String { // Compute HMAC-SHA256 of the cookie's value. - let mut mac = Hmac::::new_varkey(&self.0).expect("good key"); + let mut mac = Hmac::::new_from_slice(&self.0).expect("good key"); mac.update(value.as_bytes()); // Cookie's new value is [MAC | original-value]. @@ -63,9 +63,9 @@ impl Key { let digest = base64::decode(digest_str).map_err(|_| "bad base64 digest")?; // Perform the verification. - let mut mac = Hmac::::new_varkey(&self.0).expect("good key"); + let mut mac = Hmac::::new_from_slice(&self.0).expect("good key"); mac.update(value.as_bytes()); - mac.verify(&digest) + mac.verify_slice(&digest) .map(|_| value.to_string()) .map_err(|_| "value did not verify".to_string()) } -- cgit v1.2.3