/* Serval DNA crypto NaCl test utility Copyright (C) 2011 Paul Gardner-Stephen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ #include #include #include #include #include #include #include #include #include #include "crypto_box_curve25519xsalsa20poly1305.h" #include "crypto_sign_edwards25519sha512batch.h" struct agent { unsigned char box_pk[crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES]; unsigned char box_sk[crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES]; unsigned char sign_pk[crypto_sign_PUBLICKEYBYTES]; unsigned char sign_sk[crypto_sign_SECRETKEYBYTES]; }; struct agent *newAgent() { struct agent *a; a=calloc(sizeof(struct agent),1); if (!a) { perror("calloc() failed"); exit(-3); } // Generate keys required for various crypto functions. if (crypto_box_curve25519xsalsa20poly1305_keypair(a->box_pk,a->box_sk)) { fprintf(stderr,"crypto_box_curve25519xsalsa20poly1305_keypair() failed.\n"); exit(-1); } if (crypto_sign_edwards25519sha512batch_keypair(a->sign_pk,a->sign_sk)) { fprintf(stderr,"crypto_box_curve25519xsalsa20poly1305_keypair() failed.\n"); exit(-1); } return a; } #define MESSAGE "Ketchup is a vegetable" void dump(char *m,unsigned char *c,int l) { fprintf(stderr,"%s: (%d bytes)\n",m,l); int i,j; for(i=0;i0x7d) sanitised='.'; fprintf(stderr,"%c",sanitised); } fprintf(stderr,"\n"); } } int main() { int r,i; // Make Alice and Bob's keys struct agent *alice = newAgent(); struct agent *bob = newAgent(); fprintf(stderr,"crypto_box_keypair() and crypto_sign_keypair() succeeded.\n"); // Make a handy nonce char nonce[1024]; time_t t=time(0); snprintf(nonce,1024,"%s",ctime(&t)); char plainTextIn[1024]; char cipherText[1024]; char plainTextOut[1024]; long long plainLenIn; long long cipherLen; long long plainLenOut; /* Crypto box test */ bzero(&plainTextIn[0],crypto_box_curve25519xsalsa20poly1305_ZEROBYTES); snprintf(&plainTextIn[crypto_box_curve25519xsalsa20poly1305_ZEROBYTES],1024-crypto_box_curve25519xsalsa20poly1305_ZEROBYTES,"%s",MESSAGE); plainLenIn=crypto_box_curve25519xsalsa20poly1305_ZEROBYTES+strlen(MESSAGE)+1; r=crypto_box_curve25519xsalsa20poly1305(cipherText,plainTextIn,plainLenIn,nonce,bob->box_pk,alice->box_sk); dump("crypto_box plain text in",plainTextIn,plainLenIn); dump("crypto_box cipher text",cipherText,plainLenIn); if (r) { fprintf(stderr,"crypto_box() failed.\n"); exit(-1); } fprintf(stderr,"crypto_box() call succeeded.\n"); bzero(&plainTextOut,1024); plainLenOut=0; r=crypto_box_curve25519xsalsa20poly1305_open(plainTextOut,cipherText,plainLenIn,nonce,alice->box_pk,bob->box_sk); dump("crypto_box recovered text",plainTextOut,plainLenIn); if (r) { fprintf(stderr,"crypto_box_open() failed (r=%d).\n",r); exit(-1); } fprintf(stderr,"crypto_box_open() call succeeded.\n"); cipherText[33]^=1; bzero(&plainTextOut,1024); plainLenOut=0; r=crypto_box_curve25519xsalsa20poly1305_open(plainTextOut,cipherText,plainLenIn,nonce,alice->box_pk,bob->box_sk); if (!r) { fprintf(stderr,"crypto_box_open() failed to detect modification.\n",r); exit(-1); } fprintf(stderr,"crypto_box_open() call succeeded in detecting modification.\n"); /* Crypto sign test */ snprintf(&plainTextIn[0],1024,"%s",MESSAGE); plainLenIn=strlen(MESSAGE)+1; r=crypto_sign_edwards25519sha512batch(cipherText,&cipherLen,plainTextIn,plainLenIn,alice->sign_sk); dump("crypto_sign cipher text",cipherText,cipherLen); if (r) { fprintf(stderr,"crypto_sign() failed.\n"); exit(-1); } fprintf(stderr,"crypto_sign() call succeeded.\n"); bzero(&plainTextOut,1024); plainLenOut=0; r=crypto_sign_edwards25519sha512batch_open(plainTextOut,&plainLenOut,cipherText,cipherLen,alice->sign_pk); dump("crypto_sign recovered text",plainTextOut,plainLenOut); if (r) { fprintf(stderr,"crypto_sign_open() failed (r=%d).\n",r); exit(-1); } fprintf(stderr,"crypto_sign_open() call succeeded.\n"); cipherText[33]^=1; bzero(&plainTextOut,1024); plainLenOut=0; r=crypto_sign_edwards25519sha512batch_open(plainTextOut,&plainLenOut,cipherText,cipherLen,alice->sign_pk); if (!r) { fprintf(stderr,"crypto_sign_open() failed to detect modification.\n",r); exit(-1); } fprintf(stderr,"crypto_sign_open() call succeeded in detecting modification.\n"); return 0; }