1- use aucpace:: { Client , ClientMessage , Result , Server , ServerMessage , StrongDatabase } ;
1+ use aucpace:: {
2+ Client , ClientMessage , OsRng , Result , Server , ServerMessage , StrongDatabase ,
3+ rand_core:: TryRngCore ,
4+ } ;
25use curve25519_dalek:: ristretto:: RistrettoPoint ;
36use curve25519_dalek:: scalar:: Scalar ;
47use password_hash:: ParamsString ;
5- use rand_core:: OsRng ;
68use scrypt:: { Params , Scrypt } ;
79use sha2:: Sha512 ;
810use sha2:: digest:: Output ;
@@ -38,8 +40,11 @@ fn main() -> Result<()> {
3840 // the server socket address to bind to
3941 let server_socket: SocketAddr = SocketAddr :: new ( IpAddr :: V4 ( Ipv4Addr :: new ( 127 , 0 , 0 , 1 ) ) , 25519 ) ;
4042
43+ // random number generator from OS
44+ let mut rng = OsRng . unwrap_err ( ) ;
45+
4146 // register the user in the database
42- let mut base_client = Client :: new ( OsRng ) ;
47+ let mut base_client = Client :: new ( rng ) ;
4348 let mut database: SingleUserDatabase = Default :: default ( ) ;
4449
4550 let params = Params :: recommended ( ) ;
@@ -67,7 +72,7 @@ fn main() -> Result<()> {
6772
6873 // buffer for receiving packets
6974 let mut buf = [ 0u8 ; 1024 ] ;
70- let mut base_server = Server :: new ( OsRng ) ;
75+ let mut base_server = Server :: new ( rng ) ;
7176
7277 // ===== SSID Establishment =====
7378 let ( server, message) = base_server. begin ( ) ;
@@ -87,7 +92,7 @@ fn main() -> Result<()> {
8792 let ( server, message) =
8893 if let ClientMessage :: StrongUsername { username, blinded } = client_message {
8994 server
90- . generate_client_info_strong ( username, blinded, & database, OsRng )
95+ . generate_client_info_strong ( username, blinded, & database, rng )
9196 . unwrap ( )
9297 } else {
9398 panic ! ( "Received invalid client message {:?}" , client_message) ;
@@ -161,7 +166,7 @@ fn main() -> Result<()> {
161166 } ;
162167
163168 // ===== Augmentation Layer =====
164- let ( client, message) = client. start_augmentation_strong ( USERNAME , PASSWORD , & mut OsRng ) ;
169+ let ( client, message) = client. start_augmentation_strong ( USERNAME , PASSWORD , & mut rng ) ;
165170 let bytes_sent = send ! ( stream, message) ;
166171 CLIENT_BYTES_SENT . fetch_add ( bytes_sent, Ordering :: SeqCst ) ;
167172 println ! (
@@ -183,7 +188,7 @@ fn main() -> Result<()> {
183188 let r = pbkdf_params. get_str ( "r" ) . unwrap ( ) . parse ( ) . unwrap ( ) ;
184189 let p = pbkdf_params. get_str ( "p" ) . unwrap ( ) . parse ( ) . unwrap ( ) ;
185190
186- Params :: new ( log_n, r, p, scrypt :: Params :: RECOMMENDED_LEN ) . unwrap ( )
191+ Params :: new ( log_n, r, p) . unwrap ( )
187192 } ;
188193 client. generate_cpace_alloc ( x_pub, blinded_salt, params, Scrypt ) ?
189194 } else {
@@ -192,7 +197,7 @@ fn main() -> Result<()> {
192197
193198 // ===== CPace substep =====
194199 let ci = TcpChannelIdentifier :: new ( stream. local_addr ( ) . unwrap ( ) , server_socket) . unwrap ( ) ;
195- let ( client, message) = client. generate_public_key ( ci, & mut OsRng ) ;
200+ let ( client, message) = client. generate_public_key ( ci, & mut rng ) ;
196201 let bytes_sent = send ! ( stream, message) ;
197202 CLIENT_BYTES_SENT . fetch_add ( bytes_sent, Ordering :: SeqCst ) ;
198203 println ! (
@@ -235,7 +240,7 @@ fn main() -> Result<()> {
235240 let server_key: Output < Sha512 > = server_thread. join ( ) . unwrap ( ) . unwrap ( ) ;
236241 assert_eq ! ( client_key, server_key) ;
237242 println ! (
238- "Negotiation finished, both parties arrived at a key of: {:X }" ,
243+ "Negotiation finished, both parties arrived at a key of: {:? }" ,
239244 client_key
240245 ) ;
241246 println ! (
0 commit comments