mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-21 06:03:12 +00:00
7564d529a1
Update a few existing copyright notices to reflect recent work
150 lines
5.3 KiB
C
150 lines
5.3 KiB
C
/*
|
|
Serval DNA crypto NaCl test utility
|
|
Copyright (C) 2011 Paul Gardner-Stephen
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <strings.h>
|
|
#include <string.h>
|
|
|
|
#include "crypto_box_curve25519xsalsa20poly1305.h"
|
|
#include "crypto_sign_edwards25519sha512batch.h"
|
|
|
|
struct agent {
|
|
unsigned char box_pk[crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES];
|
|
unsigned char box_sk[crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES];
|
|
|
|
unsigned char sign_pk[crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES];
|
|
unsigned char sign_sk[crypto_sign_edwards25519sha512batch_SECRETKEYBYTES];
|
|
};
|
|
|
|
struct agent *newAgent()
|
|
{
|
|
struct agent *a;
|
|
|
|
a=calloc(sizeof(struct agent),1);
|
|
if (!a) { perror("calloc() failed"); exit(-3); }
|
|
|
|
// Generate keys required for various crypto functions.
|
|
|
|
if (crypto_box_curve25519xsalsa20poly1305_keypair(a->box_pk,a->box_sk))
|
|
{ fprintf(stderr,"crypto_box_curve25519xsalsa20poly1305_keypair() failed.\n"); exit(-1); }
|
|
|
|
if (crypto_sign_edwards25519sha512batch_keypair(a->sign_pk,a->sign_sk))
|
|
{ fprintf(stderr,"crypto_box_curve25519xsalsa20poly1305_keypair() failed.\n"); exit(-1); }
|
|
|
|
return a;
|
|
}
|
|
|
|
#define MESSAGE "Ketchup is a vegetable"
|
|
|
|
void dump(char *m,unsigned char *c,int l)
|
|
{
|
|
fprintf(stderr,"%s: (%d bytes)\n",m,l);
|
|
int i,j;
|
|
|
|
for(i=0;i<l;i+=16)
|
|
{
|
|
fprintf(stderr,"%06x:",i);
|
|
for(j=0;j<16;j++)
|
|
if ((i+j)<l) fprintf(stderr," %02x",c[i+j]); else fprintf(stderr," ");
|
|
fprintf(stderr," ");
|
|
for(j=0;j<16;j++)
|
|
if ((i+j)<l) {
|
|
unsigned char sanitised=c[i+j];
|
|
if (sanitised<' '||sanitised>0x7d) sanitised='.';
|
|
fprintf(stderr,"%c",sanitised);
|
|
}
|
|
fprintf(stderr,"\n");
|
|
}
|
|
}
|
|
|
|
int main()
|
|
{
|
|
int r,i;
|
|
|
|
// Make Alice and Bob's keys
|
|
struct agent *alice = newAgent();
|
|
struct agent *bob = newAgent();
|
|
fprintf(stderr,"crypto_box_keypair() and crypto_sign_keypair() succeeded.\n");
|
|
|
|
// Make a handy nonce
|
|
char nonce[1024];
|
|
time_t t=time(0);
|
|
snprintf(nonce,1024,"%s",ctime(&t));
|
|
|
|
char plainTextIn[1024];
|
|
char cipherText[1024];
|
|
char plainTextOut[1024];
|
|
|
|
long long plainLenIn;
|
|
long long cipherLen;
|
|
long long plainLenOut;
|
|
|
|
/* Crypto box test */
|
|
bzero(&plainTextIn[0],crypto_box_curve25519xsalsa20poly1305_ZEROBYTES);
|
|
snprintf(&plainTextIn[crypto_box_curve25519xsalsa20poly1305_ZEROBYTES],1024-crypto_box_curve25519xsalsa20poly1305_ZEROBYTES,"%s",MESSAGE);
|
|
plainLenIn=crypto_box_curve25519xsalsa20poly1305_ZEROBYTES+strlen(MESSAGE)+1;
|
|
r=crypto_box_curve25519xsalsa20poly1305(cipherText,plainTextIn,plainLenIn,nonce,bob->box_pk,alice->box_sk);
|
|
dump("crypto_box plain text in",plainTextIn,plainLenIn);
|
|
dump("crypto_box cipher text",cipherText,plainLenIn);
|
|
if (r) { fprintf(stderr,"crypto_box() failed.\n"); exit(-1); }
|
|
fprintf(stderr,"crypto_box() call succeeded.\n");
|
|
|
|
bzero(&plainTextOut,1024); plainLenOut=0;
|
|
r=crypto_box_curve25519xsalsa20poly1305_open(plainTextOut,cipherText,plainLenIn,nonce,alice->box_pk,bob->box_sk);
|
|
dump("crypto_box recovered text",plainTextOut,plainLenIn);
|
|
if (r) { fprintf(stderr,"crypto_box_open() failed (r=%d).\n",r); exit(-1); }
|
|
fprintf(stderr,"crypto_box_open() call succeeded.\n");
|
|
|
|
cipherText[33]^=1;
|
|
bzero(&plainTextOut,1024); plainLenOut=0;
|
|
r=crypto_box_curve25519xsalsa20poly1305_open(plainTextOut,cipherText,plainLenIn,nonce,alice->box_pk,bob->box_sk);
|
|
if (!r) { fprintf(stderr,"crypto_box_open() failed to detect modification.\n",r); exit(-1); }
|
|
fprintf(stderr,"crypto_box_open() call succeeded in detecting modification.\n");
|
|
|
|
/* Crypto sign test */
|
|
snprintf(&plainTextIn[0],1024,"%s",MESSAGE);
|
|
plainLenIn=strlen(MESSAGE)+1;
|
|
r=crypto_sign_edwards25519sha512batch(cipherText,&cipherLen,plainTextIn,plainLenIn,alice->sign_sk);
|
|
dump("crypto_sign cipher text",cipherText,cipherLen);
|
|
if (r) { fprintf(stderr,"crypto_sign() failed.\n"); exit(-1); }
|
|
fprintf(stderr,"crypto_sign() call succeeded.\n");
|
|
|
|
bzero(&plainTextOut,1024); plainLenOut=0;
|
|
r=crypto_sign_edwards25519sha512batch_open(plainTextOut,&plainLenOut,cipherText,cipherLen,alice->sign_pk);
|
|
dump("crypto_sign recovered text",plainTextOut,plainLenOut);
|
|
if (r) { fprintf(stderr,"crypto_sign_open() failed (r=%d).\n",r); exit(-1); }
|
|
fprintf(stderr,"crypto_sign_open() call succeeded.\n");
|
|
|
|
cipherText[33]^=1;
|
|
bzero(&plainTextOut,1024); plainLenOut=0;
|
|
r=crypto_sign_edwards25519sha512batch_open(plainTextOut,&plainLenOut,cipherText,cipherLen,alice->sign_pk);
|
|
if (!r) { fprintf(stderr,"crypto_sign_open() failed to detect modification.\n",r); exit(-1); }
|
|
fprintf(stderr,"crypto_sign_open() call succeeded in detecting modification.\n");
|
|
|
|
|
|
|
|
return 0;
|
|
}
|