1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
|
/*
* Copyright 2015-2018 Yubico AB
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifdef NDEBUG
#undef NDEBUG
#endif
#include <assert.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <yubihsm.h>
const uint8_t password[] = "password";
const uint8_t data[] = "sudo make me a sandwich";
int main(void) {
yh_connector *connector = NULL;
yh_rc yrc = YHR_GENERIC_ERROR;
const char *connector_url;
connector_url = getenv("DEFAULT_CONNECTOR_URL");
if (connector_url == NULL) {
connector_url = DEFAULT_CONNECTOR_URL;
}
yrc = yh_init();
if (yrc != YHR_SUCCESS) {
fprintf(stderr, "unable to initialize yubihsm: %s\n", yh_strerror(yrc));
exit(EXIT_FAILURE);
}
yrc = yh_init_connector(connector_url, &connector);
assert(yrc == YHR_SUCCESS);
yrc = yh_connect(connector, 0);
assert(yrc == YHR_SUCCESS);
char *received_url;
yrc = yh_get_connector_address(connector, &received_url);
assert(yrc == YHR_SUCCESS);
yh_set_verbosity(connector, YH_VERB_ALL);
printf("Send a plain (unencrypted, unauthenticated) echo command\n");
uint16_t data_len = sizeof(data) - 1;
uint8_t response[sizeof(data)] = {0};
size_t response_len = sizeof(response);
yh_cmd response_cmd;
yrc = yh_send_plain_msg(connector, YHC_ECHO, data, data_len, &response_cmd,
response, &response_len);
if (yrc != YHR_SUCCESS) {
fprintf(stderr, "Failed to send ECHO command: %s\n", yh_strerror(yrc));
exit(EXIT_FAILURE);
}
printf("Response (%zu bytes): \"%s\"\n", response_len, response);
yh_session *session = NULL;
uint16_t authkey = 1;
yrc = yh_create_session_derived(connector, authkey, password,
sizeof(password) - 1, false, &session);
assert(yrc == YHR_SUCCESS);
uint8_t session_id;
yrc = yh_get_session_id(session, &session_id);
assert(yrc == YHR_SUCCESS);
printf("Successfully established session %02d\n", session_id);
printf("Send a secure echo command\n");
uint8_t response2[sizeof(data)] = {0};
size_t response2_len = sizeof(response);
yh_cmd response2_cmd;
yrc = yh_send_secure_msg(session, YHC_ECHO, data, data_len, &response2_cmd,
response2, &response2_len);
if (yrc != YHR_SUCCESS) {
fprintf(stderr, "Failed to send ECHO command: %s\n", yh_strerror(yrc));
exit(EXIT_FAILURE);
}
printf("Response (%zu bytes): \"%s\"\n", response_len, response);
assert(response_len == response2_len);
assert(memcmp(response, response2, response_len) == 0);
yrc = yh_util_close_session(session);
assert(yrc == YHR_SUCCESS);
yrc = yh_destroy_session(&session);
assert(yrc == YHR_SUCCESS);
yh_disconnect(connector);
assert(yrc == YHR_SUCCESS);
yrc = yh_exit();
assert(yrc == YHR_SUCCESS);
return 0;
}
|