-impl Crypto {
- pub fn new() -> Crypto {
- Crypto {
- key_a: [125, 31, 131, 118, 143, 180, 252, 53, 211, 217, 79, 240, 128, 91, 252, 87, 104, 236, 145, 198, 163, 203, 161, 12, 53, 56, 218, 40, 221, 95, 171, 140].to_vec(),
- key_c: [75, 226, 88, 31, 223, 216, 182, 216, 178, 58, 59, 193, 245, 80, 254, 128, 125, 246, 246, 224, 194, 190, 123, 123, 10, 131, 217, 183, 112, 157, 166, 102].to_vec()
- }
- }
-
- pub fn compute_mac(&self, data: &[u8]) -> [u8, ..10] {
- let mut hmac = HMAC(SHA256, self.key_a.as_slice());
- hmac.update(data);
- let mut result = [0u8, ..10];
- copy_memory(&mut result, hmac.finalize().slice(0, 9));
- result
+pub fn encrypt(plaindata: &[u8], iv: &[u8]) -> Option<Vec<u8>> {
+ let c = symm::Crypter::new(symm::AES_256_CBC);
+ c.init(symm::Encrypt, KEY_C, iv.to_vec());
+ c.pad(false); // Padding disabled!
+ let mut r = c.update(plaindata);
+ let rest = c.finalize();
+ if rest.is_empty() {
+ Some(r)
+ } else {
+ None