From f955edd17464fb35df86e07bb2c3076b7e1274d8 Mon Sep 17 00:00:00 2001 From: Jesse Luehrs Date: Sun, 5 Apr 2015 23:23:31 -0400 Subject: remove a bunch of unnecessary imports --- src/aes.rs | 15 ++++++--------- src/crack.rs | 17 ++++++++--------- src/primitives.rs | 4 +--- src/random.rs | 9 ++++----- 4 files changed, 19 insertions(+), 26 deletions(-) (limited to 'src') diff --git a/src/aes.rs b/src/aes.rs index d86246f..19a47cc 100644 --- a/src/aes.rs +++ b/src/aes.rs @@ -1,13 +1,10 @@ -use openssl; -use std; - use primitives::{fixed_xor, pad_pkcs7, unpad_pkcs7}; pub fn decrypt_aes_128_ecb (bytes: &[u8], key: &[u8]) -> Option> { // openssl already doesn't return differentiable results for invalid // padding, so we can't either - return Some(openssl::crypto::symm::decrypt( - openssl::crypto::symm::Type::AES_128_ECB, + return Some(::openssl::crypto::symm::decrypt( + ::openssl::crypto::symm::Type::AES_128_ECB, key, vec![], bytes @@ -31,8 +28,8 @@ pub fn decrypt_aes_128_cbc (bytes: &[u8], key: &[u8], iv: &[u8]) -> Option Vec { - return openssl::crypto::symm::encrypt( - openssl::crypto::symm::Type::AES_128_ECB, + return ::openssl::crypto::symm::encrypt( + ::openssl::crypto::symm::Type::AES_128_ECB, key, vec![], bytes @@ -56,13 +53,13 @@ pub fn encrypt_aes_128_cbc (bytes: &[u8], key: &[u8], iv: &[u8]) -> Vec { pub fn aes_128_ctr (bytes: &[u8], key: &[u8], nonce: u64) -> Vec { let nonce_array: [u8; 8] = unsafe { - std::mem::transmute(nonce.to_le()) + ::std::mem::transmute(nonce.to_le()) }; let mut counter = 0u64; let mut ret = vec![]; for block in bytes.chunks(16) { let counter_array: [u8; 8] = unsafe { - std::mem::transmute(counter.to_le()) + ::std::mem::transmute(counter.to_le()) }; let keystream = encrypt_aes_128_ecb( &pad_pkcs7( diff --git a/src/crack.rs b/src/crack.rs index dda7b15..92950c4 100644 --- a/src/crack.rs +++ b/src/crack.rs @@ -1,4 +1,3 @@ -use std; use std::ascii::AsciiExt; use std::borrow::ToOwned; use std::collections::{HashMap, HashSet}; @@ -96,14 +95,14 @@ pub fn find_aes_128_ecb_encrypted_string (inputs: &[Vec]) -> Vec { } pub fn detect_ecb_cbc (f: &F, block_size: usize) -> BlockCipherMode where F: Fn(&[u8]) -> Vec { - if block_size >= std::u8::MAX as usize { + if block_size >= ::std::u8::MAX as usize { panic!("invalid block size: {}", block_size); } let block_size_byte = block_size as u8; let plaintext: Vec = (0..block_size_byte) .cycle() .take(block_size * 2) - .flat_map(|n| std::iter::repeat(n).take(block_size + 1)) + .flat_map(|n| ::std::iter::repeat(n).take(block_size + 1)) .collect(); let ciphertext = f(&plaintext[..]); @@ -135,7 +134,7 @@ pub fn crack_padded_aes_128_ecb (f: &F) -> Vec where F: Fn(&[u8]) -> Vec< loop { let mut map = HashMap::new(); - let prefix: Vec = std::iter::repeat(b'A') + let prefix: Vec = ::std::iter::repeat(b'A') .take(block_size - ((i % block_size) + 1)) .collect(); for c in 0..256 { @@ -165,7 +164,7 @@ pub fn crack_padded_aes_128_ecb_with_prefix (f: &F) -> Vec where F: Fn(&[ let (block_size, prefix_len) = find_block_size_and_fixed_prefix_len(f); let wrapped_f = |input: &[u8]| { let alignment_padding = block_size - (prefix_len % block_size); - let padded_input: Vec = std::iter::repeat(b'A') + let padded_input: Vec = ::std::iter::repeat(b'A') .take(alignment_padding) .chain(input.iter().map(|x| *x)) .collect(); @@ -191,8 +190,8 @@ pub fn crack_querystring_aes_128_ecb (encrypter: &F) -> (String, Vec> let find_uid_role_blocks = || { let mut map = HashMap::new(); for c in 32..127 { - let email_bytes: Vec = std::iter::repeat(c).take(9).collect(); - let email = std::str::from_utf8(&email_bytes[..]).unwrap(); + let email_bytes: Vec = ::std::iter::repeat(c).take(9).collect(); + let email = ::std::str::from_utf8(&email_bytes[..]).unwrap(); let ciphertext = encrypter(email); incr_map_element(&mut map, ciphertext[..16].to_vec()); incr_map_element(&mut map, ciphertext[16..32].to_vec()); @@ -393,7 +392,7 @@ fn crack_single_byte_xor_with_confidence (input: &[u8]) -> (u8, f64) { for a in 0..256u16 { let decrypted = fixed_xor( input, - &std::iter::repeat(a as u8) + &::std::iter::repeat(a as u8) .take(input.len()) .collect::>()[..] ); @@ -483,7 +482,7 @@ fn find_block_size_and_fixed_prefix_len (f: &F) -> (usize, usize) where F: Fn let mut prev = f(&[b'f']); let mut len = 0; loop { - let prefix: Vec = std::iter::repeat(byte) + let prefix: Vec = ::std::iter::repeat(byte) .take(len) .collect(); let next = f(&prefix[..]); diff --git a/src/primitives.rs b/src/primitives.rs index fb80a79..d537081 100644 --- a/src/primitives.rs +++ b/src/primitives.rs @@ -1,5 +1,3 @@ -use std; - pub fn fixed_xor (bytes1: &[u8], bytes2: &[u8]) -> Vec { return bytes1.iter() .zip(bytes2.iter()) @@ -28,7 +26,7 @@ pub fn pad_pkcs7 (block: &[u8], blocksize: u8) -> Vec { return block .iter() .map(|c| *c) - .chain(std::iter::repeat(padding_bytes).take(padding_bytes as usize)) + .chain(::std::iter::repeat(padding_bytes).take(padding_bytes as usize)) .collect(); } diff --git a/src/random.rs b/src/random.rs index af0bc43..e248293 100644 --- a/src/random.rs +++ b/src/random.rs @@ -1,5 +1,4 @@ use rand::{Rand, Rng, SeedableRng}; -use std; pub struct MersenneTwister { state: [u32; 624], @@ -83,12 +82,12 @@ impl Clone for MersenneTwister { } } -impl std::fmt::Debug for MersenneTwister { - fn fmt (&self, f: &mut std::fmt::Formatter) -> Result<(), std::fmt::Error> { +impl ::std::fmt::Debug for MersenneTwister { + fn fmt (&self, f: &mut ::std::fmt::Formatter) -> Result<(), ::std::fmt::Error> { try!(write!(f, "MersenneTwister {{ ")); - try!(std::fmt::Debug::fmt(&&self.state[..], f)); + try!(::std::fmt::Debug::fmt(&&self.state[..], f)); try!(write!(f, ", ")); - try!(std::fmt::Debug::fmt(&self.index, f)); + try!(::std::fmt::Debug::fmt(&self.index, f)); write!(f, " }}") } } -- cgit v1.2.3-54-g00ecf