X-Git-Url: http://git.euphorik.ch/?a=blobdiff_plain;f=src%2Fcrypto.rs;h=ad7e6fab2f1af5589199f99ad2c2e5cd10a652ff;hb=HEAD;hp=39e8696725c5e831158fd0af7d785ff8d660071d;hpb=911f8410c05d3d16922587a59266096f3c6899e1;p=crypto_lab1.git diff --git a/src/crypto.rs b/src/crypto.rs deleted file mode 100644 index 39e8696..0000000 --- a/src/crypto.rs +++ /dev/null @@ -1,32 +0,0 @@ -use std::rand::{ OsRng, Rng }; -use std::io::IoResult; -use std::slice::bytes::copy_memory; -use openssl::crypto::hash::SHA256; -use openssl::crypto::hmac::HMAC; -use openssl::crypto::symm; - -static KEY_A: &'static [u8] = [125, 31, 131, 118, 143, 180, 252, 53, 211, 217, 79, 240, 128, 91, 252, 87, 104, 236, 145, 198, 163, 203, 161, 12, 53, 56, 218, 40, 221, 95, 171, 140]; -static KEY_C: &'static [u8] = [75, 226, 88, 31, 223, 216, 182, 216, 178, 58, 59, 193, 245, 80, 254, 128, 125, 246, 246, 224, 194, 190, 123, 123, 10, 131, 217, 183, 112, 157, 166, 102]; - -pub fn compute_mac(data: &[u8]) -> [u8, ..10] { - let mut hmac = HMAC(SHA256, KEY_A); - hmac.update(data); - let mut result = [0u8, ..10]; - copy_memory(&mut result, hmac.finalize().slice(0, 10)); - result -} - -pub fn encrypt(plaindata: &[u8], iv: &[u8]) -> Vec { - symm::encrypt(symm::AES_256_CBC, KEY_C, iv.to_vec(), plaindata) -} - -pub fn decrypt(cypherdata: &[u8], iv: &[u8]) -> Vec { - symm::decrypt(symm::AES_256_CBC, KEY_C, iv.to_vec(), cypherdata) -} - -pub fn generate_key(size_byte: uint) -> IoResult> { - let mut bytes = Vec:: from_elem(size_byte, 0u8); - let mut generator = try!(OsRng::new()); // Uses '/dev/urandom' on Unix-like systems. - generator.fill_bytes(bytes.as_mut_slice_()); - Ok(bytes) -} \ No newline at end of file