You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

client.rs 3.9KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. use crypto_box::{
  2. aead::{Aead, AeadCore, OsRng},
  3. PublicKey, SalsaBox, SecretKey,
  4. };
  5. use std::io::Write;
  6. use std::net::TcpStream;
  7. fn main() {
  8. let port: u32 = 7878; // Port Server
  9. //let stream = TcpStream::connect("172.30.16.1:8080");
  10. //let stream = TcpStream::connect("27.0.0.1:8080");
  11. match TcpStream::connect(format!("localhost:{}", port)) {
  12. Ok(mut stream) => {
  13. println!("Successfully connected to server");
  14. let bob_init_pub_key = PublicKey::from([
  15. 0xe8, 0x98, 0xc, 0x86, 0xe0, 0x32, 0xf1, 0xeb, 0x29, 0x75, 0x5, 0x2e, 0x8d, 0x65,
  16. 0xbd, 0xdd, 0x15, 0xc3, 0xb5, 0x96, 0x41, 0x17, 0x4e, 0xc9, 0x67, 0x8a, 0x53, 0x78,
  17. 0x9d, 0x92, 0xc7, 0x54,
  18. ]);
  19. // Generate a random secret key.
  20. // NOTE: The secret key bytes can be accessed by calling `secret_key.as_bytes()`
  21. let own_secret_key = SecretKey::generate(&mut OsRng);
  22. // Get the public key for the secret key we just generated
  23. let own_public_key = own_secret_key.public_key().clone();
  24. // Create a `SalsaBox` by performing Diffie-Hellman key agreement between
  25. // the two keys.
  26. let salsa_box = SalsaBox::new(&bob_init_pub_key, &own_secret_key);
  27. loop {
  28. let mut buffer = String::new();
  29. match std::io::stdin().read_line(&mut buffer) {
  30. Ok(n) => {
  31. if n == 0 {
  32. break; // Beenden bei EOF
  33. }
  34. //
  35. // Encryption
  36. //
  37. // Get a random nonce to encrypt the message under
  38. let nonce = SalsaBox::generate_nonce(&mut OsRng);
  39. // Message to encrypt
  40. let plaintext = buffer.trim().as_bytes();
  41. // Encrypt the message using the box
  42. let ciphertext = salsa_box.encrypt(&nonce, &plaintext[..]).expect("Fehler");
  43. println!("Sending {0} as {1:?}", buffer.trim(), plaintext);
  44. stream.write(buffer.as_bytes()).unwrap();
  45. //
  46. // Decryption
  47. //
  48. // Decrypt the message, using the same randomly generated nonce
  49. let decrypted_plaintext =
  50. salsa_box.decrypt(&nonce, &ciphertext[..]).expect("Fehler");
  51. let dec_plain_plaintext =
  52. std::str::from_utf8(&*decrypted_plaintext).expect("Nö");
  53. assert_eq!(&plaintext[..], &decrypted_plaintext[..]);
  54. println!(
  55. "Sent {0:?} as cypher: {1:?}, decrypted: {2:?}, {3}",
  56. plaintext, ciphertext, decrypted_plaintext, dec_plain_plaintext
  57. );
  58. }
  59. Err(error) => {
  60. println!("error: {error}");
  61. break;
  62. }
  63. }
  64. }
  65. }
  66. Err(e) => {
  67. println!("Failed to connect: {}", e);
  68. }
  69. }
  70. println!("Terminated.");
  71. }
  72. fn generate_box(partner_public_key: PublicKey) -> (SalsaBox, PublicKey) {
  73. // Generate a random secret key.
  74. // NOTE: The secret key bytes can be accessed by calling `secret_key.as_bytes()`
  75. let own_secret_key = SecretKey::generate(&mut OsRng);
  76. // Get the public key for the secret key we just generated
  77. let own_public_key = own_secret_key.public_key().clone();
  78. // Create a `SalsaBox` by performing Diffie-Hellman key agreement between
  79. // the two keys.
  80. let salsa_box = SalsaBox::new(&partner_public_key, &own_secret_key);
  81. (salsa_box, own_public_key)
  82. }