@@ -244,18 +244,18 @@ fn sign_verify_multipart() -> TestResult {
244
244
let data = vec ! [ 0xFF , 0x55 , 0xDD , 0x11 , 0xBB , 0x33 ] ;
245
245
246
246
// Sign data in parts (standard RsaPkcs doesn't support this)
247
- session. sign_initialize ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
247
+ session. sign_init ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
248
248
for part in data. chunks ( 3 ) {
249
249
session. sign_update ( part) ?;
250
250
}
251
- let signature = session. sign_finalize ( ) ?;
251
+ let signature = session. sign_final ( ) ?;
252
252
253
253
// Verify signature in parts (standard RsaPkcs doesn't support this)
254
- session. verify_initialize ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
254
+ session. verify_init ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
255
255
for part in data. chunks ( 3 ) {
256
256
session. verify_update ( part) ?;
257
257
}
258
- session. verify_finalize ( & signature) ?;
258
+ session. verify_final ( & signature) ?;
259
259
260
260
// Delete keys
261
261
session. destroy_object ( pub_key) ?;
@@ -287,7 +287,7 @@ fn sign_verify_multipart_not_initialized() -> TestResult {
287
287
) ) ;
288
288
289
289
// Attempt to finalize signing without an operation having been initialized
290
- let result = session. sign_finalize ( ) ;
290
+ let result = session. sign_final ( ) ;
291
291
292
292
assert ! ( result. is_err( ) ) ;
293
293
assert ! ( matches!(
@@ -305,7 +305,7 @@ fn sign_verify_multipart_not_initialized() -> TestResult {
305
305
) ) ;
306
306
307
307
// Attempt to finalize verification without an operation having been initialized
308
- let result = session. verify_finalize ( & signature) ;
308
+ let result = session. verify_final ( & signature) ;
309
309
310
310
assert ! ( result. is_err( ) ) ;
311
311
assert ! ( matches!(
@@ -344,8 +344,8 @@ fn sign_verify_multipart_already_initialized() -> TestResult {
344
344
) ?;
345
345
346
346
// Initialize signing operation twice in a row
347
- session. sign_initialize ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
348
- let result = session. sign_initialize ( & Mechanism :: Sha256RsaPkcs , priv_key) ;
347
+ session. sign_init ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
348
+ let result = session. sign_init ( & Mechanism :: Sha256RsaPkcs , priv_key) ;
349
349
350
350
assert ! ( result. is_err( ) ) ;
351
351
assert ! ( matches!(
@@ -354,11 +354,11 @@ fn sign_verify_multipart_already_initialized() -> TestResult {
354
354
) ) ;
355
355
356
356
// Make sure signing operation is over before trying same with verification
357
- session. sign_finalize ( ) ?;
357
+ session. sign_final ( ) ?;
358
358
359
359
// Initialize verification operation twice in a row
360
- session. verify_initialize ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
361
- let result = session. verify_initialize ( & Mechanism :: Sha256RsaPkcs , pub_key) ;
360
+ session. verify_init ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
361
+ let result = session. verify_init ( & Mechanism :: Sha256RsaPkcs , pub_key) ;
362
362
363
363
assert ! ( result. is_err( ) ) ;
364
364
assert ! ( matches!(
@@ -448,22 +448,22 @@ fn encrypt_decrypt_multipart() -> TestResult {
448
448
] ;
449
449
450
450
// Encrypt data in parts
451
- session. encrypt_initialize ( & Mechanism :: AesEcb , key) ?;
451
+ session. encrypt_init ( & Mechanism :: AesEcb , key) ?;
452
452
453
453
let mut encrypted_data = vec ! [ ] ;
454
454
for part in data. chunks ( 3 ) {
455
455
encrypted_data. extend ( session. encrypt_update ( part) ?) ;
456
456
}
457
- encrypted_data. extend ( session. encrypt_finalize ( ) ?) ;
457
+ encrypted_data. extend ( session. encrypt_final ( ) ?) ;
458
458
459
459
// Decrypt data in parts
460
- session. decrypt_initialize ( & Mechanism :: AesEcb , key) ?;
460
+ session. decrypt_init ( & Mechanism :: AesEcb , key) ?;
461
461
462
462
let mut decrypted_data = vec ! [ ] ;
463
463
for part in encrypted_data. chunks ( 3 ) {
464
464
decrypted_data. extend ( session. decrypt_update ( part) ?) ;
465
465
}
466
- decrypted_data. extend ( session. decrypt_finalize ( ) ?) ;
466
+ decrypted_data. extend ( session. decrypt_final ( ) ?) ;
467
467
468
468
assert_eq ! ( data, decrypted_data) ;
469
469
@@ -498,7 +498,7 @@ fn encrypt_decrypt_multipart_not_initialized() -> TestResult {
498
498
) ) ;
499
499
500
500
// Attempt to finalize encryption without an operation having been initialized
501
- let result = session. encrypt_finalize ( ) ;
501
+ let result = session. encrypt_final ( ) ;
502
502
503
503
assert ! ( result. is_err( ) ) ;
504
504
assert ! ( matches!(
@@ -516,7 +516,7 @@ fn encrypt_decrypt_multipart_not_initialized() -> TestResult {
516
516
) ) ;
517
517
518
518
// Attempt to finalize decryption without an operation having been initialized
519
- let result = session. decrypt_finalize ( ) ;
519
+ let result = session. decrypt_final ( ) ;
520
520
521
521
assert ! ( result. is_err( ) ) ;
522
522
assert ! ( matches!(
@@ -544,8 +544,8 @@ fn encrypt_decrypt_multipart_already_initialized() -> TestResult {
544
544
let key = session. generate_key ( & Mechanism :: AesKeyGen , & template) ?;
545
545
546
546
// Initialize encryption operation twice in a row
547
- session. encrypt_initialize ( & Mechanism :: AesEcb , key) ?;
548
- let result = session. encrypt_initialize ( & Mechanism :: AesEcb , key) ;
547
+ session. encrypt_init ( & Mechanism :: AesEcb , key) ?;
548
+ let result = session. encrypt_init ( & Mechanism :: AesEcb , key) ;
549
549
550
550
assert ! ( result. is_err( ) ) ;
551
551
assert ! ( matches!(
@@ -554,11 +554,11 @@ fn encrypt_decrypt_multipart_already_initialized() -> TestResult {
554
554
) ) ;
555
555
556
556
// Make sure encryption operation is over before trying same with decryption
557
- session. encrypt_finalize ( ) ?;
557
+ session. encrypt_final ( ) ?;
558
558
559
559
// Initialize encryption operation twice in a row
560
- session. decrypt_initialize ( & Mechanism :: AesEcb , key) ?;
561
- let result = session. decrypt_initialize ( & Mechanism :: AesEcb , key) ;
560
+ session. decrypt_init ( & Mechanism :: AesEcb , key) ?;
561
+ let result = session. decrypt_init ( & Mechanism :: AesEcb , key) ;
562
562
563
563
assert ! ( result. is_err( ) ) ;
564
564
assert ! ( matches!(
@@ -1626,12 +1626,12 @@ fn sha256_digest_multipart() -> TestResult {
1626
1626
] ;
1627
1627
1628
1628
// Digest data in parts
1629
- session. digest_initialize ( & Mechanism :: Sha256 ) ?;
1629
+ session. digest_init ( & Mechanism :: Sha256 ) ?;
1630
1630
for part in data. chunks ( 3 ) {
1631
1631
session. digest_update ( part) ?;
1632
1632
}
1633
1633
1634
- let have = session. digest_finalize ( ) ?;
1634
+ let have = session. digest_final ( ) ?;
1635
1635
let want = vec ! [
1636
1636
0x8c , 0x18 , 0xb1 , 0x5f , 0x01 , 0x47 , 0x13 , 0x2a , 0x03 , 0xc2 , 0xe3 , 0xfd , 0x4f , 0x29 , 0xb7 ,
1637
1637
0x75 , 0x80 , 0x19 , 0xb5 , 0x58 , 0x5e , 0xfc , 0xeb , 0x45 , 0x18 , 0x33 , 0x2b , 0x2f , 0xa7 , 0xa4 ,
@@ -1673,12 +1673,12 @@ fn sha256_digest_multipart_with_key() -> TestResult {
1673
1673
} ;
1674
1674
1675
1675
// Digest data in parts
1676
- session. digest_initialize ( & Mechanism :: Sha256 ) ?;
1676
+ session. digest_init ( & Mechanism :: Sha256 ) ?;
1677
1677
session. digest_update ( & data) ?;
1678
1678
session. digest_key ( key) ?;
1679
1679
1680
1680
// Create digests to compare
1681
- let have = session. digest_finalize ( ) ?;
1681
+ let have = session. digest_final ( ) ?;
1682
1682
1683
1683
data. append ( & mut key_data) ;
1684
1684
let want = session. digest ( & Mechanism :: Sha256 , & data) ?;
@@ -1713,7 +1713,7 @@ fn sha256_digest_multipart_not_initialized() -> TestResult {
1713
1713
) ) ;
1714
1714
1715
1715
// Attempt to finalize digest without an operation having been initialized
1716
- let result = session. digest_finalize ( ) ;
1716
+ let result = session. digest_final ( ) ;
1717
1717
1718
1718
assert ! ( result. is_err( ) ) ;
1719
1719
assert ! ( matches!(
@@ -1734,8 +1734,8 @@ fn sha256_digest_multipart_already_initialized() -> TestResult {
1734
1734
session. login ( UserType :: User , Some ( & AuthPin :: new ( USER_PIN . into ( ) ) ) ) ?;
1735
1735
1736
1736
// Initialize digesting operation twice in a row
1737
- session. digest_initialize ( & Mechanism :: Sha256 ) ?;
1738
- let result = session. digest_initialize ( & Mechanism :: Sha256 ) ;
1737
+ session. digest_init ( & Mechanism :: Sha256 ) ?;
1738
+ let result = session. digest_init ( & Mechanism :: Sha256 ) ;
1739
1739
1740
1740
assert ! ( result. is_err( ) ) ;
1741
1741
assert ! ( matches!(
0 commit comments