Skip to content

Commit b4e8193

Browse files
committed
Bump vodozemac
1 parent 056e90d commit b4e8193

File tree

25 files changed

+379
-284
lines changed

25 files changed

+379
-284
lines changed

Cargo.lock

Lines changed: 305 additions & 201 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ eyeball-im-util = "0.9.0"
3939
futures-core = "0.3.31"
4040
futures-executor = "0.3.31"
4141
futures-util = "0.3.31"
42-
getrandom = { version = "0.2.15", default-features = false }
42+
getrandom = { version = "0.3.3", default-features = false }
4343
gloo-timers = "0.3.0"
4444
growable-bloom-filter = "2.1.1"
4545
hkdf = "0.12.4"
@@ -56,7 +56,7 @@ once_cell = "1.20.2"
5656
pbkdf2 = { version = "0.12.2" }
5757
pin-project-lite = "0.2.16"
5858
proptest = { version = "1.6.0", default-features = false, features = ["std"] }
59-
rand = "0.8.5"
59+
rand = "0.9.2"
6060
reqwest = { version = "0.12.12", default-features = false }
6161
rmp-serde = "1.3.0"
6262
ruma = { git = "https://github.com/ruma/ruma", rev = "a626e6b8521bcaa01bf8b7c4161b26b361b72aff", features = [
@@ -100,7 +100,7 @@ uniffi = { version = "0.28.0" }
100100
uniffi_bindgen = { version = "0.28.0" }
101101
url = "2.5.4"
102102
uuid = "1.12.1"
103-
vodozemac = { version = "0.9.0", features = ["insecure-pk-encryption"] }
103+
vodozemac = { git = "https://github.com/matrix-org/vodozemac/", rev = "d2b8743802f4ad7efc9ae9cf48baccbfb04d4d8a", features = ["insecure-pk-encryption"] }
104104
wasm-bindgen = "0.2.84"
105105
wasm-bindgen-test = "0.3.50"
106106
web-sys = "0.3.69"

benchmarks/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ matrix-sdk-ui.workspace = true
2424
ruma.workspace = true
2525
serde.workspace = true
2626
serde_json.workspace = true
27-
tempfile = "3.3.0"
27+
tempfile = "3.20.0"
2828
tokio = { workspace = true, default-features = false, features = ["rt-multi-thread"] }
2929
wiremock.workspace = true
3030

bindings/matrix-sdk-crypto-ffi/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ vergen = { version = "8.2.5", features = ["build", "git", "gitcl"] }
6666

6767
[dev-dependencies]
6868
assert_matches2.workspace = true
69-
tempfile = "3.8.0"
69+
tempfile = "3.20.0"
7070

7171
[lints]
7272
workspace = true

crates/matrix-sdk-common/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ wasm-bindgen-test.workspace = true
6060

6161
[target.'cfg(target_family = "wasm")'.dev-dependencies]
6262
# Enable the JS feature for getrandom.
63-
getrandom = { workspace = true, default-features = false, features = ["js"] }
63+
getrandom = { workspace = true, default-features = false, features = ["wasm_js"] }
6464
js-sys.workspace = true
6565

6666
[lints]

crates/matrix-sdk-crypto/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ rustdoc-args = ["--cfg", "docsrs", "--generate-link-to-definition"]
1818
default = []
1919
automatic-room-key-forwarding = []
2020
experimental-send-custom-to-device = []
21-
js = ["ruma/js", "vodozemac/js", "matrix-sdk-common/js"]
21+
js = ["ruma/js", "vodozemac/wasm_js", "matrix-sdk-common/js"]
2222
qrcode = ["dep:matrix-sdk-qrcode"]
2323
experimental-algorithms = []
2424
uniffi = ["dep:uniffi"]

crates/matrix-sdk-crypto/src/backups/keys/decryption.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -177,9 +177,9 @@ impl BackupDecryptionKey {
177177
pub fn to_base58(&self) -> String {
178178
let bytes = Zeroizing::new(
179179
[
180-
Self::PREFIX.as_ref(),
181-
self.inner.as_ref(),
182-
[Self::parity_byte(self.inner.as_ref())].as_ref(),
180+
Self::PREFIX.as_slice(),
181+
self.inner.as_slice(),
182+
[Self::parity_byte(self.inner.as_slice())].as_slice(),
183183
]
184184
.concat(),
185185
);
@@ -303,7 +303,7 @@ mod tests {
303303

304304
#[test]
305305
fn base64_decoding() -> Result<(), DecodeError> {
306-
let key = BackupDecryptionKey::new().expect("Can't create a new recovery key");
306+
let key = BackupDecryptionKey::new();
307307

308308
let base64 = key.to_base64();
309309
let decoded_key = BackupDecryptionKey::from_base64(&base64)?;
@@ -316,7 +316,7 @@ mod tests {
316316

317317
#[test]
318318
fn base58_decoding() -> Result<(), DecodeError> {
319-
let key = BackupDecryptionKey::new().expect("Can't create a new recovery key");
319+
let key = BackupDecryptionKey::new();
320320

321321
let base64 = key.to_base58();
322322
let decoded_key = BackupDecryptionKey::from_base58(&base64)?;
@@ -394,7 +394,7 @@ mod tests {
394394
async fn test_encryption_cycle() {
395395
let session = InboundGroupSession::from_export(&room_key()).unwrap();
396396

397-
let decryption_key = BackupDecryptionKey::new().unwrap();
397+
let decryption_key = BackupDecryptionKey::new();
398398
let encryption_key = decryption_key.megolm_v1_public_key();
399399

400400
let encrypted = encryption_key.encrypt(session).await;
@@ -406,7 +406,7 @@ mod tests {
406406

407407
#[test]
408408
fn key_matches() {
409-
let decryption_key = BackupDecryptionKey::new().unwrap();
409+
let decryption_key = BackupDecryptionKey::new();
410410

411411
let key_info = decryption_key.to_backup_info();
412412

crates/matrix-sdk-crypto/src/backups/mod.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -705,7 +705,7 @@ mod tests {
705705
assert_eq!(counts.total, 2, "Two room keys need to exist in the store");
706706
assert_eq!(counts.backed_up, 0, "No room keys have been backed up yet");
707707

708-
let decryption_key = BackupDecryptionKey::new().expect("Can't create new recovery key");
708+
let decryption_key = BackupDecryptionKey::new();
709709
let backup_key = decryption_key.megolm_v1_public_key();
710710
backup_key.set_version("1".to_owned());
711711

@@ -842,7 +842,7 @@ mod tests {
842842
let backup_machine = machine.backup_machine();
843843

844844
// We set up a backup key, so that we can test `backup_machine.backup()` later.
845-
let decryption_key = BackupDecryptionKey::new().expect("Couldn't create new recovery key");
845+
let decryption_key = BackupDecryptionKey::new();
846846
let backup_key = decryption_key.megolm_v1_public_key();
847847
backup_key.set_version("1".to_owned());
848848
backup_machine.enable_backup_v1(backup_key).await.expect("Couldn't enable backup");
@@ -890,7 +890,7 @@ mod tests {
890890
let machine = OlmMachine::new(alice_id(), alice_device_id()).await;
891891
let backup_machine = machine.backup_machine();
892892

893-
let decryption_key = BackupDecryptionKey::new().unwrap();
893+
let decryption_key = BackupDecryptionKey::new();
894894
let mut backup_info = decryption_key.to_backup_info();
895895

896896
let result = backup_machine.verify_backup(backup_info.to_owned(), false).await.unwrap();
@@ -908,7 +908,7 @@ mod tests {
908908
async fn test_fix_backup_key_mismatch() {
909909
let store = MemoryStore::new();
910910

911-
let backup_decryption_key = BackupDecryptionKey::new().unwrap();
911+
let backup_decryption_key = BackupDecryptionKey::new();
912912

913913
store
914914
.save_changes(Changes {

crates/matrix-sdk-crypto/src/ciphers.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ use hmac::{
2323
Hmac, Mac as _,
2424
};
2525
use pbkdf2::pbkdf2;
26-
use rand::{thread_rng, RngCore};
26+
use rand::{rng, RngCore};
2727
use sha2::{Sha256, Sha512};
2828
use zeroize::{Zeroize, ZeroizeOnDrop};
2929

@@ -247,7 +247,7 @@ impl AesHmacSha2Key {
247247
/// The initialization vector will be clamped and will be used to encrypt
248248
/// the ciphertext.
249249
fn generate_iv() -> [u8; IV_SIZE] {
250-
let mut rng = thread_rng();
250+
let mut rng = rng();
251251
let mut iv = [0u8; IV_SIZE];
252252

253253
rng.fill_bytes(&mut iv);

crates/matrix-sdk-crypto/src/dehydrated_devices.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -611,7 +611,7 @@ mod tests {
611611
let stored_key = dehydrated_manager.get_dehydrated_device_pickle_key().await.unwrap();
612612
assert!(stored_key.is_none());
613613

614-
let pickle_key = DehydratedDeviceKey::new().unwrap();
614+
let pickle_key = DehydratedDeviceKey::new();
615615

616616
dehydrated_manager.save_dehydrated_device_pickle_key(&pickle_key).await.unwrap();
617617

0 commit comments

Comments
 (0)