Fix according the new Rust nightly.
[crypto_lab1.git] / lab1_rust / src / main.rs
index 3beee95..80551f8 100644 (file)
@@ -28,7 +28,7 @@ fn do_oracle_attack(address: &str, variant: packet::Variant) {
    */
 
    match oracle_machine::decipher(address, PORT, &xor_operand, &cipher_block, variant) {
-      Some(ref deciphered) if deciphered.as_slice() == &expected_plain_block => {
+      Some(ref deciphered) if deciphered.as_slice() == expected_plain_block => {
          println!("The oracle machine has found the plain block!:");
          println!("   Expected block: {}", expected_plain_block.to_vec());
          println!("   Decrypted block: {}", deciphered)