12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788 |
- use crypto_box::{
- aead::{Aead, AeadCore, OsRng},
- PublicKey, SalsaBox, SecretKey,
- };
- use std::io::Write;
- use std::net::TcpStream;
- use crate::message::*;
-
- mod message;
-
- fn main() {
- // Server Port
- let port: u32 = 7878;
-
- match TcpStream::connect(format!("localhost:{}", port)) {
- Ok(mut stream) => {
- println!("Successfully connected to server");
-
- let bob_init_pub_key = PublicKey::from([
- 0xe8, 0x98, 0xc, 0x86, 0xe0, 0x32, 0xf1, 0xeb, 0x29, 0x75, 0x5, 0x2e, 0x8d, 0x65,
- 0xbd, 0xdd, 0x15, 0xc3, 0xb5, 0x96, 0x41, 0x17, 0x4e, 0xc9, 0x67, 0x8a, 0x53, 0x78,
- 0x9d, 0x92, 0xc7, 0x54,
- ]);
-
- // Generate a random secret key.
- // NOTE: The secret key bytes can be accessed by calling `secret_key.as_bytes()`
- let own_secret_key = SecretKey::generate(&mut OsRng);
-
- // Get the public key for the secret key we just generated
- let own_public_key = own_secret_key.public_key().clone();
-
- // Create a `SalsaBox` by performing Diffie-Hellman key agreement between
- // the two keys.
- let salsa_box = SalsaBox::new(&bob_init_pub_key, &own_secret_key);
-
- loop {
- let mut buffer = String::new();
- match std::io::stdin().read_line(&mut buffer) {
- Ok(n) => {
- if n == 0 {
- break; // Beenden bei EOF
- }
- //
- // Encryption
- //
-
- // Get a random nonce to encrypt the message under
- let nonce = SalsaBox::generate_nonce(&mut OsRng);
-
- // Message to encrypt
- let plaintext = buffer.trim().as_bytes();
-
- // Encrypt the message using the box
- let ciphertext = salsa_box.encrypt(&nonce, &plaintext[..]).expect("Fehler");
- let message = Message::new(0,0,4, PayloadType::Msg);
-
- println!("Sending {0} as {1:?}", buffer.trim(), plaintext);
- stream.write(buffer.as_bytes()).unwrap();
-
- //
- // Decryption
- //
-
- // Decrypt the message, using the same randomly generated nonce
- let decrypted_plaintext =
- salsa_box.decrypt(&nonce, &ciphertext[..]).expect("Fehler");
- let dec_plain_plaintext =
- std::str::from_utf8(&*decrypted_plaintext).expect("Nö");
- assert_eq!(&plaintext[..], &decrypted_plaintext[..]);
-
- println!(
- "Sent {0:?} as cypher: {1:?}, decrypted: {2:?}, {3}",
- plaintext, ciphertext, decrypted_plaintext, dec_plain_plaintext
- );
- }
- Err(error) => {
- println!("error: {error}");
- break;
- }
- }
- }
- }
- Err(e) => {
- println!("Failed to connect: {}", e);
- }
- }
- println!("Terminated.");
- }
|