158 lines
4.8 KiB
C
158 lines
4.8 KiB
C
|
/*
|
||
|
* GraxRabble
|
||
|
* 05 May 2014
|
||
|
* Demo programs for libsodium.
|
||
|
*/
|
||
|
#include <stdio.h>
|
||
|
#include <stdlib.h>
|
||
|
#include <string.h>
|
||
|
|
||
|
#include <sodium.h> /* library header */
|
||
|
|
||
|
#include "demo_utils.h" /* utility functions shared by demos */
|
||
|
|
||
|
|
||
|
|
||
|
/*
|
||
|
* Shows how crypto_box_afternm works using Bob and Alice with a simple
|
||
|
* message. Both clients must generate their own key pair and swap public
|
||
|
* key. The library will perform Diffie-Hellman to generate a shared key
|
||
|
* for symmetric encryption.
|
||
|
*
|
||
|
* Note that crypto_box uses padding at the start of both messages.
|
||
|
* The padding must be zero else the encryption or decryption will fail.
|
||
|
*
|
||
|
* Encrypted messages will be 16 bytes longer because a 16 byte
|
||
|
* authentication token will be prepended to the message.
|
||
|
*
|
||
|
* Note the same nonce must not be used; it should be safe to use a counter.
|
||
|
*/
|
||
|
static int
|
||
|
box(void)
|
||
|
{
|
||
|
unsigned char bob_pk[crypto_box_PUBLICKEYBYTES]; /* Bob public */
|
||
|
unsigned char bob_sk[crypto_box_SECRETKEYBYTES]; /* Bob secret */
|
||
|
unsigned char bob_ss[crypto_box_BEFORENMBYTES]; /* Bob session */
|
||
|
|
||
|
unsigned char alice_pk[crypto_box_PUBLICKEYBYTES]; /* Alice public */
|
||
|
unsigned char alice_sk[crypto_box_SECRETKEYBYTES]; /* Alice secret */
|
||
|
unsigned char alice_ss[crypto_box_BEFORENMBYTES]; /* Alice session */
|
||
|
|
||
|
unsigned char n[crypto_box_NONCEBYTES]; /* message nonce */
|
||
|
unsigned char m[BUFFER_SIZE + crypto_box_ZEROBYTES];/* plaintext */
|
||
|
unsigned char c[BUFFER_SIZE + crypto_box_ZEROBYTES];/* ciphertext */
|
||
|
size_t mlen; /* length */
|
||
|
int r;
|
||
|
|
||
|
puts("Example: crypto_box_afternm (archaic)\n");
|
||
|
|
||
|
puts("Generating keypairs...\n");
|
||
|
crypto_box_keypair(bob_pk, bob_sk); /* generate Bob's keys */
|
||
|
crypto_box_keypair(alice_pk, alice_sk); /* generate Alice's keys */
|
||
|
|
||
|
puts("Bob");
|
||
|
fputs("Public: ", stdout);
|
||
|
print_hex(bob_pk, sizeof bob_pk);
|
||
|
putchar('\n');
|
||
|
fputs("Secret: ", stdout);
|
||
|
print_hex(bob_sk, sizeof bob_sk);
|
||
|
putchar('\n');
|
||
|
putchar('\n');
|
||
|
|
||
|
puts("Alice");
|
||
|
fputs("Public: ", stdout);
|
||
|
print_hex(alice_pk, sizeof alice_pk);
|
||
|
putchar('\n');
|
||
|
fputs("Secret: ", stdout);
|
||
|
print_hex(alice_sk, sizeof alice_sk);
|
||
|
putchar('\n');
|
||
|
putchar('\n');
|
||
|
|
||
|
/* perform diffie hellman */
|
||
|
crypto_box_beforenm(bob_ss, alice_pk, bob_sk);
|
||
|
crypto_box_beforenm(alice_ss, bob_pk, alice_sk);
|
||
|
fputs("Bob shared key: ", stdout);
|
||
|
print_hex(bob_ss, sizeof bob_ss);
|
||
|
putchar('\n');
|
||
|
fputs("Alice shared key: ", stdout);
|
||
|
print_hex(alice_ss, sizeof alice_ss);
|
||
|
putchar('\n');
|
||
|
putchar('\n');
|
||
|
|
||
|
/* nonce must be generated per message, safe to send with message */
|
||
|
puts("Generating nonce...");
|
||
|
randombytes_buf(n, sizeof n);
|
||
|
fputs("Nonce: ", stdout);
|
||
|
print_hex(n, sizeof n);
|
||
|
putchar('\n');
|
||
|
putchar('\n');
|
||
|
|
||
|
/* read input */
|
||
|
mlen = prompt_input("Input your message > ",
|
||
|
(char*) m + crypto_box_ZEROBYTES,
|
||
|
sizeof m - crypto_box_ZEROBYTES);
|
||
|
|
||
|
/* must zero at least the padding */
|
||
|
sodium_memzero(m, crypto_box_ZEROBYTES);
|
||
|
|
||
|
puts("Notice the 32 bytes of zero");
|
||
|
print_hex(m, mlen + crypto_box_ZEROBYTES);
|
||
|
putchar('\n');
|
||
|
putchar('\n');
|
||
|
|
||
|
/* encrypt the message */
|
||
|
printf("Encrypting with %s\n\n", crypto_box_primitive());
|
||
|
crypto_box_afternm(c, m, mlen + crypto_box_ZEROBYTES, n, bob_ss);
|
||
|
|
||
|
/* sent message */
|
||
|
puts("Bob sending message...\n");
|
||
|
puts("Notice the prepended 16 byte authentication token");
|
||
|
puts("Format: nonce::message");
|
||
|
fputs("Ciphertext: ", stdout);
|
||
|
print_hex(n, sizeof n);
|
||
|
fputs("::", stdout);
|
||
|
print_hex(c, mlen + crypto_box_ZEROBYTES);
|
||
|
putchar('\n');
|
||
|
putchar('\n');
|
||
|
|
||
|
/* decrypt the message */
|
||
|
puts("Alice opening message...");
|
||
|
|
||
|
/* must zero at least the padding */
|
||
|
sodium_memzero(c, crypto_box_BOXZEROBYTES);
|
||
|
r = crypto_box_open_afternm(
|
||
|
m, c, mlen + crypto_box_ZEROBYTES,
|
||
|
n, alice_ss);
|
||
|
|
||
|
puts("Notice the 32 bytes of zero");
|
||
|
print_hex(m, mlen + crypto_box_ZEROBYTES);
|
||
|
putchar('\n');
|
||
|
|
||
|
print_verification(r);
|
||
|
if (r == 0) printf("Plaintext: %s\n\n", m + crypto_box_ZEROBYTES);
|
||
|
|
||
|
sodium_memzero(bob_pk, sizeof bob_pk); /* wipe sensitive data */
|
||
|
sodium_memzero(bob_sk, sizeof bob_sk);
|
||
|
sodium_memzero(bob_ss, sizeof bob_ss);
|
||
|
sodium_memzero(alice_pk, sizeof alice_pk);
|
||
|
sodium_memzero(alice_sk, sizeof alice_sk);
|
||
|
sodium_memzero(alice_ss, sizeof alice_ss);
|
||
|
sodium_memzero(n, sizeof n);
|
||
|
sodium_memzero(m, sizeof m);
|
||
|
sodium_memzero(c, sizeof c);
|
||
|
return r;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
main(int argc, char **argv)
|
||
|
{
|
||
|
int r;
|
||
|
|
||
|
sodium_init();
|
||
|
printf("Using LibSodium %s\n", sodium_version_string());
|
||
|
|
||
|
r = (0 == box() ? EXIT_SUCCESS : EXIT_FAILURE);
|
||
|
exit(r);
|
||
|
}
|
||
|
|