|
| 1 | +//! Basic IK Handshake Example |
| 2 | +//! |
| 3 | +//! This example demonstrates a complete IK pattern handshake between |
| 4 | +//! a client and server, followed by encrypted message exchange. |
| 5 | +//! |
| 6 | +//! ## Running |
| 7 | +//! |
| 8 | +//! ```bash |
| 9 | +//! cargo run --example basic_handshake |
| 10 | +//! ``` |
| 11 | +//! |
| 12 | +//! ## Overview |
| 13 | +//! |
| 14 | +//! The IK pattern is used when the client knows the server's static |
| 15 | +//! public key in advance. This is the most common pattern for |
| 16 | +//! connecting to a known server. |
| 17 | +//! |
| 18 | +//! ## 3-Step Handshake Flow |
| 19 | +//! |
| 20 | +//! 1. Client: Create first message with encrypted identity |
| 21 | +//! 2. Server: Process and create response |
| 22 | +//! 3. Client: Process response, both now have transport keys |
| 23 | +
|
| 24 | +use pubky_noise::datalink_adapter::{ |
| 25 | + client_complete_ik, client_start_ik_direct, server_accept_ik, server_complete_ik, |
| 26 | +}; |
| 27 | +use pubky_noise::{DummyRing, NoiseClient, NoiseServer, RingKeyProvider}; |
| 28 | +use std::sync::Arc; |
| 29 | + |
| 30 | +fn main() { |
| 31 | + println!("=== PubkyNoise Basic Handshake Example ===\n"); |
| 32 | + |
| 33 | + // ========================================================================= |
| 34 | + // Setup |
| 35 | + // ========================================================================= |
| 36 | + |
| 37 | + println!("1. Setting up client and server..."); |
| 38 | + |
| 39 | + // Create key providers with unique seeds |
| 40 | + // In production, use secure random seeds from key storage |
| 41 | + let client_seed = [1u8; 32]; |
| 42 | + let server_seed = [2u8; 32]; |
| 43 | + |
| 44 | + let ring_client = Arc::new(DummyRing::new(client_seed, "client-key-id")); |
| 45 | + let ring_server = Arc::new(DummyRing::new(server_seed, "server-key-id")); |
| 46 | + |
| 47 | + // Create client and server instances |
| 48 | + let client = NoiseClient::<_, ()>::new_direct("client-key-id", b"client-device", ring_client); |
| 49 | + let server = |
| 50 | + NoiseServer::<_, ()>::new_direct("server-key-id", b"server-device", ring_server.clone()); |
| 51 | + |
| 52 | + // Get server's static public key |
| 53 | + // In production, this would be distributed securely |
| 54 | + let server_sk = ring_server |
| 55 | + .derive_device_x25519("server-key-id", b"server-device", 0) |
| 56 | + .expect("Failed to derive server key"); |
| 57 | + let server_static_pk = pubky_noise::kdf::x25519_pk_from_sk(&server_sk); |
| 58 | + |
| 59 | + println!(" Client and server initialized"); |
| 60 | + println!( |
| 61 | + " Server public key: {}...", |
| 62 | + hex::encode(&server_static_pk[..8]) |
| 63 | + ); |
| 64 | + |
| 65 | + // ========================================================================= |
| 66 | + // 3-Step Handshake |
| 67 | + // ========================================================================= |
| 68 | + |
| 69 | + println!("\n2. Performing 3-step handshake..."); |
| 70 | + |
| 71 | + // Step 1: Client initiates |
| 72 | + println!(" Step 1: Client creates first message"); |
| 73 | + let (client_hs, first_msg) = client_start_ik_direct(&client, &server_static_pk, None) |
| 74 | + .expect("Client initiation failed"); |
| 75 | + println!(" First message: {} bytes", first_msg.len()); |
| 76 | + |
| 77 | + // Step 2: Server processes and responds |
| 78 | + println!(" Step 2: Server processes and responds"); |
| 79 | + let (server_hs, client_identity, response) = |
| 80 | + server_accept_ik(&server, &first_msg).expect("Server accept failed"); |
| 81 | + println!( |
| 82 | + " Client identity: {:?}", |
| 83 | + hex::encode(&client_identity.ed25519_pub[..8]) |
| 84 | + ); |
| 85 | + println!(" Response: {} bytes", response.len()); |
| 86 | + |
| 87 | + // Step 3: Both complete handshake |
| 88 | + println!(" Step 3: Both complete handshake"); |
| 89 | + let mut client_link = |
| 90 | + client_complete_ik(client_hs, &response).expect("Client completion failed"); |
| 91 | + let mut server_link = server_complete_ik(server_hs).expect("Server completion failed"); |
| 92 | + |
| 93 | + // Verify session IDs match |
| 94 | + assert_eq!(client_link.session_id(), server_link.session_id()); |
| 95 | + println!( |
| 96 | + " Session established: {}", |
| 97 | + client_link.session_id() |
| 98 | + ); |
| 99 | + |
| 100 | + // ========================================================================= |
| 101 | + // Encrypted Communication |
| 102 | + // ========================================================================= |
| 103 | + |
| 104 | + println!("\n3. Testing encrypted communication..."); |
| 105 | + |
| 106 | + // Client sends message to server |
| 107 | + let client_message = b"Hello, server! This is encrypted."; |
| 108 | + let ciphertext = client_link |
| 109 | + .encrypt(client_message) |
| 110 | + .expect("Encryption failed"); |
| 111 | + println!( |
| 112 | + " Client encrypted: {} bytes -> {} bytes", |
| 113 | + client_message.len(), |
| 114 | + ciphertext.len() |
| 115 | + ); |
| 116 | + |
| 117 | + // Server decrypts |
| 118 | + let decrypted = server_link.decrypt(&ciphertext).expect("Decryption failed"); |
| 119 | + assert_eq!(client_message.to_vec(), decrypted); |
| 120 | + println!(" Server decrypted: {:?}", String::from_utf8_lossy(&decrypted)); |
| 121 | + |
| 122 | + // Server sends response |
| 123 | + let server_response = b"Hello, client! Message received."; |
| 124 | + let response_ct = server_link |
| 125 | + .encrypt(server_response) |
| 126 | + .expect("Encryption failed"); |
| 127 | + let response_pt = client_link |
| 128 | + .decrypt(&response_ct) |
| 129 | + .expect("Decryption failed"); |
| 130 | + assert_eq!(server_response.to_vec(), response_pt); |
| 131 | + println!(" Client received: {:?}", String::from_utf8_lossy(&response_pt)); |
| 132 | + |
| 133 | + // ========================================================================= |
| 134 | + // Summary |
| 135 | + // ========================================================================= |
| 136 | + |
| 137 | + println!("\n=== Handshake and communication successful! ==="); |
| 138 | + println!("\nKey points:"); |
| 139 | + println!("- IK pattern requires knowing server's public key upfront"); |
| 140 | + println!("- 3-step handshake: initiate -> accept -> complete"); |
| 141 | + println!("- After handshake, both parties can encrypt/decrypt"); |
| 142 | + println!("- Session ID is derived from handshake hash (unique per session)"); |
| 143 | +} |
0 commit comments