summary refs log tree commit diff stats
path: root/libotr/libotr-4.1.1/toolkit/otr_sesskeys.c
diff options
context:
space:
mode:
Diffstat (limited to 'libotr/libotr-4.1.1/toolkit/otr_sesskeys.c')
-rw-r--r--libotr/libotr-4.1.1/toolkit/otr_sesskeys.c92
1 files changed, 92 insertions, 0 deletions
diff --git a/libotr/libotr-4.1.1/toolkit/otr_sesskeys.c b/libotr/libotr-4.1.1/toolkit/otr_sesskeys.c
new file mode 100644
index 0000000..227d18f
--- /dev/null
+++ b/libotr/libotr-4.1.1/toolkit/otr_sesskeys.c
@@ -0,0 +1,92 @@
+/*
+ *  Off-the-Record Messaging Toolkit
+ *  Copyright (C) 2004-2012  Ian Goldberg, Chris Alexander, Nikita Borisov
+ *                           <otr@cypherpunks.ca>
+ *
+ *  This program is free software; you can redistribute it and/or modify
+ *  it under the terms of version 2 of the GNU General Public License as
+ *  published by the Free Software Foundation.
+ *
+ *  This program is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU General Public License
+ *  along with this program; if not, write to the Free Software
+ *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+/* system headers */
+#include <stdio.h>
+#include <stdlib.h>
+
+/* toolkit headers */
+#include "parse.h"
+#include "sesskeys.h"
+
+static void usage(const char *progname)
+{
+    fprintf(stderr, "Usage: %s our_privkey their_pubkey\n"
+"Calculate and display our public key, the session id, two AES keys,\n"
+"and two MAC keys generated by the given DH private key and public key.\n",
+	progname);
+    exit(1);
+}
+
+int main(int argc, char **argv)
+{
+    unsigned char *argbuf;
+    size_t argbuflen;
+    gcry_mpi_t our_x, our_y, their_y;
+    unsigned char *pubbuf;
+    size_t publen;
+    unsigned char sessionid[20], sendenc[16], rcvenc[16];
+    unsigned char sendmac[20], rcvmac[20];
+    int is_high;
+
+    if (argc != 3) {
+	usage(argv[0]);
+    }
+
+    argv_to_buf(&argbuf, &argbuflen, argv[1]);
+    /* Private keys are only 320 bits long, so check for that to make
+     * sure they didn't get the args the wrong way around */
+    if (!argbuf || argbuflen > 40) usage(argv[0]);
+    gcry_mpi_scan(&our_x, GCRYMPI_FMT_USG, argbuf, argbuflen, NULL);
+    free(argbuf);
+    argv_to_buf(&argbuf, &argbuflen, argv[2]);
+    if (!argbuf) usage(argv[0]);
+    gcry_mpi_scan(&their_y, GCRYMPI_FMT_USG, argbuf, argbuflen, NULL);
+    free(argbuf);
+
+    sesskeys_gen(sessionid, sendenc, rcvenc, &is_high, &our_y, our_x, their_y);
+    sesskeys_make_mac(sendmac, sendenc);
+    sesskeys_make_mac(rcvmac, rcvenc);
+
+    /* Print our public key into a buffer */
+    gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &publen, our_y);
+    pubbuf = malloc(publen);
+    if (!pubbuf) {
+	fprintf(stderr, "Out of memory!\n");
+	exit(1);
+    }
+    gcry_mpi_print(GCRYMPI_FMT_USG, pubbuf, publen, NULL, our_y);
+
+    puts("");
+    printf("We are the %s end of this key exchange.\n",
+	    is_high ? "high" : "low");
+    puts("");
+    dump_data(stdout, "Our public key", pubbuf, publen);
+    puts("");
+    dump_data(stdout, "Session id", sessionid, 20);
+    puts("");
+    dump_data(stdout, "Sending   AES key", sendenc, 16);
+    dump_data(stdout, "Sending   MAC key", sendmac, 20);
+    dump_data(stdout, "Receiving AES key", rcvenc, 16);
+    dump_data(stdout, "Receiving MAC key", rcvmac, 20);
+    puts("");
+    fflush(stdout);
+
+    return 0;
+}