Loading pkcs5.rs +2 −2 Original line number Diff line number Diff line Loading @@ -29,10 +29,10 @@ pub fn pbkdf2_hmac_sha1(pass: &str, salt: &[u8], iter: uint, out_buf); if r != 1 as c_int { fail; } unsafe { vec::raw::set_len(out, keylen); } } unsafe { vec::raw::set_len(&mut out, keylen); } out } } Loading pkey.rs +1 −1 Original line number Diff line number Diff line Loading @@ -260,7 +260,7 @@ pub impl PKey { do vec::as_mut_buf(r) |pr, _len| { do vec::as_imm_buf(s) |ps, s_len| { let plen = ptr::addr_of(len); let plen = ptr::addr_of(&len); // XXX: 672 == NID_sha256 let rv = libcrypto::RSA_sign( Loading rand.rs +1 −1 Original line number Diff line number Diff line Loading @@ -14,7 +14,7 @@ pub fn rand_bytes(len: uint) -> ~[u8] { if r != 1 as c_int { fail } } unsafe { vec::raw::set_len(out, len); } unsafe { vec::raw::set_len(&mut out, len); } out } Loading Loading
pkcs5.rs +2 −2 Original line number Diff line number Diff line Loading @@ -29,10 +29,10 @@ pub fn pbkdf2_hmac_sha1(pass: &str, salt: &[u8], iter: uint, out_buf); if r != 1 as c_int { fail; } unsafe { vec::raw::set_len(out, keylen); } } unsafe { vec::raw::set_len(&mut out, keylen); } out } } Loading
pkey.rs +1 −1 Original line number Diff line number Diff line Loading @@ -260,7 +260,7 @@ pub impl PKey { do vec::as_mut_buf(r) |pr, _len| { do vec::as_imm_buf(s) |ps, s_len| { let plen = ptr::addr_of(len); let plen = ptr::addr_of(&len); // XXX: 672 == NID_sha256 let rv = libcrypto::RSA_sign( Loading
rand.rs +1 −1 Original line number Diff line number Diff line Loading @@ -14,7 +14,7 @@ pub fn rand_bytes(len: uint) -> ~[u8] { if r != 1 as c_int { fail } } unsafe { vec::raw::set_len(out, len); } unsafe { vec::raw::set_len(&mut out, len); } out } Loading