Resolve more linter warnings
This commit is contained in:
22
src/set4.rs
22
src/set4.rs
@@ -203,21 +203,21 @@ pub fn challenge29() {
|
||||
for key_len in 1..128 {
|
||||
// get padding for key || orig-message
|
||||
let key_guessed = vec![b'z'; key_len]; // key-guessed
|
||||
let mut bytes = key_guessed.to_vec();
|
||||
bytes.append(&mut message.0.to_vec()); // original-message
|
||||
let mut bytes = key_guessed.clone();
|
||||
bytes.append(&mut message.0.clone()); // original-message
|
||||
let s1 = sha1::Sha1::default();
|
||||
let glue_padding = s1.get_padding(&bytes); // glue-padding
|
||||
|
||||
// forget MAC via fixture: make sure to fix sha1.h *and* sha1.byte_length
|
||||
let byte_length = (key_guessed.len() + message.len() + glue_padding.len()) as u64;
|
||||
let new_message = b"admin=true".to_vec(); // new-message
|
||||
mac_forged = hash_fixated(&Bytes(new_message.to_vec()), &mac, byte_length);
|
||||
mac_forged = hash_fixated(&Bytes(new_message.clone()), &mac, byte_length);
|
||||
|
||||
// forge message: original-message || glue-padding || new-message
|
||||
forged_message = message.0.to_vec();
|
||||
forged_message = message.0.clone();
|
||||
forged_message.append(&mut glue_padding.clone());
|
||||
forged_message.append(&mut new_message.clone());
|
||||
let r = sha1::verify(&Bytes(forged_message.to_vec()), &key, &mac_forged);
|
||||
let r = sha1::verify(&Bytes(forged_message.clone()), &key, &mac_forged);
|
||||
if r {
|
||||
break;
|
||||
}
|
||||
@@ -274,20 +274,20 @@ pub fn challenge30() {
|
||||
for key_len in 1..128 {
|
||||
// get padding for key || orig-message
|
||||
let key_guessed = vec![b'z'; key_len]; // key-guessed
|
||||
let mut bytes = key_guessed.to_vec();
|
||||
bytes.append(&mut message.0.to_vec()); // original-message
|
||||
let mut bytes = key_guessed.clone();
|
||||
bytes.append(&mut message.0.clone()); // original-message
|
||||
let md4 = md4::Md4Core::default();
|
||||
let glue_padding = md4.get_padding(&bytes); // glue-padding
|
||||
|
||||
// forget MAC via fixture: make sure to fix md4.state *and* md4.byte_length
|
||||
let byte_length = (key_guessed.len() + message.len() + glue_padding.len()) as u64;
|
||||
let new_message = b"admin=true".to_vec(); // new-message
|
||||
mac_forged = hash_fixated(&Bytes(new_message.to_vec()), &mac, byte_length);
|
||||
mac_forged = hash_fixated(&Bytes(new_message.clone()), &mac, byte_length);
|
||||
|
||||
// forge message: original-message || glue-padding || new-message
|
||||
forged_message = message.0.to_vec();
|
||||
forged_message.append(&mut glue_padding.to_vec());
|
||||
forged_message.append(&mut new_message.to_vec());
|
||||
forged_message = message.0.clone();
|
||||
forged_message.append(&mut glue_padding.clone());
|
||||
forged_message.append(&mut new_message.clone());
|
||||
let r = md4::verify(&Bytes(forged_message.clone()), &key, &mac_forged);
|
||||
if r {
|
||||
break;
|
||||
|
||||
Reference in New Issue
Block a user