@@ -244,18 +244,18 @@ fn sign_verify_multipart() -> TestResult {
244244 let data = vec ! [ 0xFF , 0x55 , 0xDD , 0x11 , 0xBB , 0x33 ] ;
245245
246246 // Sign data in parts (standard RsaPkcs doesn't support this)
247- session. sign_initialize ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
247+ session. sign_init ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
248248 for part in data. chunks ( 3 ) {
249249 session. sign_update ( part) ?;
250250 }
251- let signature = session. sign_finalize ( ) ?;
251+ let signature = session. sign_final ( ) ?;
252252
253253 // Verify signature in parts (standard RsaPkcs doesn't support this)
254- session. verify_initialize ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
254+ session. verify_init ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
255255 for part in data. chunks ( 3 ) {
256256 session. verify_update ( part) ?;
257257 }
258- session. verify_finalize ( & signature) ?;
258+ session. verify_final ( & signature) ?;
259259
260260 // Delete keys
261261 session. destroy_object ( pub_key) ?;
@@ -287,7 +287,7 @@ fn sign_verify_multipart_not_initialized() -> TestResult {
287287 ) ) ;
288288
289289 // Attempt to finalize signing without an operation having been initialized
290- let result = session. sign_finalize ( ) ;
290+ let result = session. sign_final ( ) ;
291291
292292 assert ! ( result. is_err( ) ) ;
293293 assert ! ( matches!(
@@ -305,7 +305,7 @@ fn sign_verify_multipart_not_initialized() -> TestResult {
305305 ) ) ;
306306
307307 // Attempt to finalize verification without an operation having been initialized
308- let result = session. verify_finalize ( & signature) ;
308+ let result = session. verify_final ( & signature) ;
309309
310310 assert ! ( result. is_err( ) ) ;
311311 assert ! ( matches!(
@@ -344,8 +344,8 @@ fn sign_verify_multipart_already_initialized() -> TestResult {
344344 ) ?;
345345
346346 // Initialize signing operation twice in a row
347- session. sign_initialize ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
348- let result = session. sign_initialize ( & Mechanism :: Sha256RsaPkcs , priv_key) ;
347+ session. sign_init ( & Mechanism :: Sha256RsaPkcs , priv_key) ?;
348+ let result = session. sign_init ( & Mechanism :: Sha256RsaPkcs , priv_key) ;
349349
350350 assert ! ( result. is_err( ) ) ;
351351 assert ! ( matches!(
@@ -354,11 +354,11 @@ fn sign_verify_multipart_already_initialized() -> TestResult {
354354 ) ) ;
355355
356356 // Make sure signing operation is over before trying same with verification
357- session. sign_finalize ( ) ?;
357+ session. sign_final ( ) ?;
358358
359359 // Initialize verification operation twice in a row
360- session. verify_initialize ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
361- let result = session. verify_initialize ( & Mechanism :: Sha256RsaPkcs , pub_key) ;
360+ session. verify_init ( & Mechanism :: Sha256RsaPkcs , pub_key) ?;
361+ let result = session. verify_init ( & Mechanism :: Sha256RsaPkcs , pub_key) ;
362362
363363 assert ! ( result. is_err( ) ) ;
364364 assert ! ( matches!(
@@ -448,22 +448,22 @@ fn encrypt_decrypt_multipart() -> TestResult {
448448 ] ;
449449
450450 // Encrypt data in parts
451- session. encrypt_initialize ( & Mechanism :: AesEcb , key) ?;
451+ session. encrypt_init ( & Mechanism :: AesEcb , key) ?;
452452
453453 let mut encrypted_data = vec ! [ ] ;
454454 for part in data. chunks ( 3 ) {
455455 encrypted_data. extend ( session. encrypt_update ( part) ?) ;
456456 }
457- encrypted_data. extend ( session. encrypt_finalize ( ) ?) ;
457+ encrypted_data. extend ( session. encrypt_final ( ) ?) ;
458458
459459 // Decrypt data in parts
460- session. decrypt_initialize ( & Mechanism :: AesEcb , key) ?;
460+ session. decrypt_init ( & Mechanism :: AesEcb , key) ?;
461461
462462 let mut decrypted_data = vec ! [ ] ;
463463 for part in encrypted_data. chunks ( 3 ) {
464464 decrypted_data. extend ( session. decrypt_update ( part) ?) ;
465465 }
466- decrypted_data. extend ( session. decrypt_finalize ( ) ?) ;
466+ decrypted_data. extend ( session. decrypt_final ( ) ?) ;
467467
468468 assert_eq ! ( data, decrypted_data) ;
469469
@@ -498,7 +498,7 @@ fn encrypt_decrypt_multipart_not_initialized() -> TestResult {
498498 ) ) ;
499499
500500 // Attempt to finalize encryption without an operation having been initialized
501- let result = session. encrypt_finalize ( ) ;
501+ let result = session. encrypt_final ( ) ;
502502
503503 assert ! ( result. is_err( ) ) ;
504504 assert ! ( matches!(
@@ -516,7 +516,7 @@ fn encrypt_decrypt_multipart_not_initialized() -> TestResult {
516516 ) ) ;
517517
518518 // Attempt to finalize decryption without an operation having been initialized
519- let result = session. decrypt_finalize ( ) ;
519+ let result = session. decrypt_final ( ) ;
520520
521521 assert ! ( result. is_err( ) ) ;
522522 assert ! ( matches!(
@@ -544,8 +544,8 @@ fn encrypt_decrypt_multipart_already_initialized() -> TestResult {
544544 let key = session. generate_key ( & Mechanism :: AesKeyGen , & template) ?;
545545
546546 // Initialize encryption operation twice in a row
547- session. encrypt_initialize ( & Mechanism :: AesEcb , key) ?;
548- let result = session. encrypt_initialize ( & Mechanism :: AesEcb , key) ;
547+ session. encrypt_init ( & Mechanism :: AesEcb , key) ?;
548+ let result = session. encrypt_init ( & Mechanism :: AesEcb , key) ;
549549
550550 assert ! ( result. is_err( ) ) ;
551551 assert ! ( matches!(
@@ -554,11 +554,11 @@ fn encrypt_decrypt_multipart_already_initialized() -> TestResult {
554554 ) ) ;
555555
556556 // Make sure encryption operation is over before trying same with decryption
557- session. encrypt_finalize ( ) ?;
557+ session. encrypt_final ( ) ?;
558558
559559 // Initialize encryption operation twice in a row
560- session. decrypt_initialize ( & Mechanism :: AesEcb , key) ?;
561- let result = session. decrypt_initialize ( & Mechanism :: AesEcb , key) ;
560+ session. decrypt_init ( & Mechanism :: AesEcb , key) ?;
561+ let result = session. decrypt_init ( & Mechanism :: AesEcb , key) ;
562562
563563 assert ! ( result. is_err( ) ) ;
564564 assert ! ( matches!(
@@ -1626,12 +1626,12 @@ fn sha256_digest_multipart() -> TestResult {
16261626 ] ;
16271627
16281628 // Digest data in parts
1629- session. digest_initialize ( & Mechanism :: Sha256 ) ?;
1629+ session. digest_init ( & Mechanism :: Sha256 ) ?;
16301630 for part in data. chunks ( 3 ) {
16311631 session. digest_update ( part) ?;
16321632 }
16331633
1634- let have = session. digest_finalize ( ) ?;
1634+ let have = session. digest_final ( ) ?;
16351635 let want = vec ! [
16361636 0x8c , 0x18 , 0xb1 , 0x5f , 0x01 , 0x47 , 0x13 , 0x2a , 0x03 , 0xc2 , 0xe3 , 0xfd , 0x4f , 0x29 , 0xb7 ,
16371637 0x75 , 0x80 , 0x19 , 0xb5 , 0x58 , 0x5e , 0xfc , 0xeb , 0x45 , 0x18 , 0x33 , 0x2b , 0x2f , 0xa7 , 0xa4 ,
@@ -1673,12 +1673,12 @@ fn sha256_digest_multipart_with_key() -> TestResult {
16731673 } ;
16741674
16751675 // Digest data in parts
1676- session. digest_initialize ( & Mechanism :: Sha256 ) ?;
1676+ session. digest_init ( & Mechanism :: Sha256 ) ?;
16771677 session. digest_update ( & data) ?;
16781678 session. digest_key ( key) ?;
16791679
16801680 // Create digests to compare
1681- let have = session. digest_finalize ( ) ?;
1681+ let have = session. digest_final ( ) ?;
16821682
16831683 data. append ( & mut key_data) ;
16841684 let want = session. digest ( & Mechanism :: Sha256 , & data) ?;
@@ -1713,7 +1713,7 @@ fn sha256_digest_multipart_not_initialized() -> TestResult {
17131713 ) ) ;
17141714
17151715 // Attempt to finalize digest without an operation having been initialized
1716- let result = session. digest_finalize ( ) ;
1716+ let result = session. digest_final ( ) ;
17171717
17181718 assert ! ( result. is_err( ) ) ;
17191719 assert ! ( matches!(
@@ -1734,8 +1734,8 @@ fn sha256_digest_multipart_already_initialized() -> TestResult {
17341734 session. login ( UserType :: User , Some ( & AuthPin :: new ( USER_PIN . into ( ) ) ) ) ?;
17351735
17361736 // Initialize digesting operation twice in a row
1737- session. digest_initialize ( & Mechanism :: Sha256 ) ?;
1738- let result = session. digest_initialize ( & Mechanism :: Sha256 ) ;
1737+ session. digest_init ( & Mechanism :: Sha256 ) ?;
1738+ let result = session. digest_init ( & Mechanism :: Sha256 ) ;
17391739
17401740 assert ! ( result. is_err( ) ) ;
17411741 assert ! ( matches!(
0 commit comments