@@ -218,11 +218,7 @@ async fn custom_key_material() -> Result<()> {
218
218
datakeys. insert_one ( key_doc) . await ?;
219
219
220
220
let encrypted = enc
221
- . encrypt (
222
- "test" ,
223
- EncryptKey :: Id ( new_key_id) ,
224
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
225
- )
221
+ . encrypt ( "test" , EncryptKey :: Id ( new_key_id) , Algorithm :: Deterministic )
226
222
. await ?;
227
223
let expected = base64:: decode (
228
224
"AQAAAAAAAAAAAAAAAAAAAAACz0ZOLuuhEYi807ZXTdhbqhLaS2/t9wLifJnnNYwiw79d75QYIZ6M/\
@@ -370,7 +366,7 @@ async fn data_key_double_encryption() -> Result<()> {
370
366
. encrypt (
371
367
format ! ( "hello {}" , provider. name( ) ) ,
372
368
EncryptKey :: Id ( datakey_id) ,
373
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
369
+ Algorithm :: Deterministic ,
374
370
)
375
371
. await ?;
376
372
assert_eq ! ( encrypted. subtype, BinarySubtype :: Encrypted ) ;
@@ -390,7 +386,7 @@ async fn data_key_double_encryption() -> Result<()> {
390
386
. encrypt (
391
387
format ! ( "hello {}" , provider. name( ) ) ,
392
388
EncryptKey :: AltName ( format ! ( "{}_altname" , provider. name( ) ) ) ,
393
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
389
+ Algorithm :: Deterministic ,
394
390
)
395
391
. await ?;
396
392
assert_eq ! ( other_encrypted. subtype, BinarySubtype :: Encrypted ) ;
@@ -491,7 +487,7 @@ async fn external_key_vault() -> Result<()> {
491
487
. encrypt (
492
488
"test" ,
493
489
EncryptKey :: Id ( base64_uuid ( "LOCALAAAAAAAAAAAAAAAAA==" ) ?) ,
494
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
490
+ Algorithm :: Deterministic ,
495
491
)
496
492
. await ;
497
493
if with_external_key_vault {
@@ -811,8 +807,8 @@ async fn run_corpus_test(local_schema: bool) -> Result<()> {
811
807
return Err ( failure ! ( "Invalid method {:?}" , method) ) ;
812
808
}
813
809
let algo = match subdoc. get_str ( "algo" ) ? {
814
- "rand" => Algorithm :: AeadAes256CbcHmacSha512Random ,
815
- "det" => Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
810
+ "rand" => Algorithm :: Random ,
811
+ "det" => Algorithm :: Deterministic ,
816
812
s => return Err ( failure ! ( "Invalid algorithm {:?}" , s) ) ,
817
813
} ;
818
814
let kms = KmsProvider :: from_name ( subdoc. get_str ( "kms" ) ?) ;
@@ -973,7 +969,7 @@ async fn validate_roundtrip(
973
969
. encrypt (
974
970
value. clone ( ) ,
975
971
EncryptKey :: Id ( key_id) ,
976
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
972
+ Algorithm :: Deterministic ,
977
973
)
978
974
. await ?;
979
975
let decrypted = client_encryption. decrypt ( encrypted. as_raw_binary ( ) ) . await ?;
@@ -1543,7 +1539,7 @@ impl DeadlockTestCase {
1543
1539
. encrypt (
1544
1540
RawBson :: String ( "string0" . to_string ( ) ) ,
1545
1541
EncryptKey :: AltName ( "local" . to_string ( ) ) ,
1546
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
1542
+ Algorithm :: Deterministic ,
1547
1543
)
1548
1544
. await ?;
1549
1545
@@ -2551,11 +2547,7 @@ impl DecryptionEventsTestdata {
2551
2547
) ?;
2552
2548
let key_id = client_encryption. create_data_key ( MasterKey :: Local ) . await ?;
2553
2549
let ciphertext = client_encryption
2554
- . encrypt (
2555
- "hello" ,
2556
- EncryptKey :: Id ( key_id) ,
2557
- Algorithm :: AeadAes256CbcHmacSha512Deterministic ,
2558
- )
2550
+ . encrypt ( "hello" , EncryptKey :: Id ( key_id) , Algorithm :: Deterministic )
2559
2551
. await ?;
2560
2552
let mut malformed_ciphertext = ciphertext. clone ( ) ;
2561
2553
let last = malformed_ciphertext. bytes . last_mut ( ) . unwrap ( ) ;
@@ -3125,6 +3117,7 @@ async fn range_explicit_encryption_test(
3125
3117
. encrypt (
3126
3118
bson_numbers[ num] . clone ( ) ,
3127
3119
key1_id. clone ( ) ,
3120
+ #[ allow( deprecated) ]
3128
3121
Algorithm :: RangePreview ,
3129
3122
)
3130
3123
. contention_factor ( 0 )
@@ -3144,6 +3137,7 @@ async fn range_explicit_encryption_test(
3144
3137
. encrypt (
3145
3138
bson_numbers[ & 6 ] . clone ( ) ,
3146
3139
key1_id. clone ( ) ,
3140
+ #[ allow( deprecated) ]
3147
3141
Algorithm :: RangePreview ,
3148
3142
)
3149
3143
. contention_factor ( 0 )
@@ -3256,6 +3250,7 @@ async fn range_explicit_encryption_test(
3256
3250
// Case 6: Encrypting a document greater than the maximum errors
3257
3251
if bson_type != "DoubleNoPrecision" && bson_type != "DecimalNoPrecision" {
3258
3252
let num = get_raw_bson_from_num ( bson_type, 201 ) ;
3253
+ #[ allow( deprecated) ]
3259
3254
let error = client_encryption
3260
3255
. encrypt ( num, key1_id. clone ( ) , Algorithm :: RangePreview )
3261
3256
. contention_factor ( 0 )
@@ -3272,6 +3267,7 @@ async fn range_explicit_encryption_test(
3272
3267
} else {
3273
3268
rawdoc ! { & key: { "$numberInt" : "6" } }
3274
3269
} ;
3270
+ #[ allow( deprecated) ]
3275
3271
let error = client_encryption
3276
3272
. encrypt ( value, key1_id. clone ( ) , Algorithm :: RangePreview )
3277
3273
. contention_factor ( 0 )
@@ -3293,6 +3289,7 @@ async fn range_explicit_encryption_test(
3293
3289
. encrypt (
3294
3290
bson_numbers[ & 6 ] . clone ( ) ,
3295
3291
key1_id. clone ( ) ,
3292
+ #[ allow( deprecated) ]
3296
3293
Algorithm :: RangePreview ,
3297
3294
)
3298
3295
. contention_factor ( 0 )
0 commit comments