// Test that a valid key passes the key validation function - needs changes to // OTPgenerator to work properly public int[] testGoodDecrypt() { int[] passed = new int[2]; passed[1] = 1; string seed = "A021E0A80264A33C08B6C2884AC0685C"; string key = "0xb5b1870957d373ef0eeffecc6e4812c0fd08f554b37b233526acc331bf1544f7"; key = VerifyKeys.removeHexPrefix(key); byte[] otp = new byte[32]; byte[] seedByte = new byte[14]; byte[] encryptedKey = new byte[34]; byte[] keyByte = Encoding.ASCII.GetBytes(key); seedByte = Encoding.ASCII.GetBytes(seed); byte[] goodKey = OTPworker.OTPxor(seedByte, keyByte); byte[] decryptedKey = OTPworker.decryptFromBlob(seed, Convert.ToBase64String(goodKey)); string finalKey = Encoding.ASCII.GetString(keyByte); if (finalKey == key) { passed[0] = 1; } return(passed); }
// Takes a string for a key as input, encrypts it, and returns a byte[] of the encrypted key public byte[] encryptKey(string inputKey) { inputKey = VerifyKeys.removeHexPrefix(inputKey); byte[] otp = new byte[32]; byte[] seed = new byte[16]; byte[] encryptedKey = new byte[34]; byte[] key = Encoding.ASCII.GetBytes(inputKey); int size = 32; seed = OTPworker.randomSeedGenerator(seed); OTPworker.OTPGenerator(otp, size, seed); encryptedKey = OTPworker.OTPxor(key, otp); return(encryptedKey); }
// Test that a valid key passes the key validation function public void testGoodDecrypt() { string seed = "A021E0A80264A33C08B6C2884AC0685C"; string key = "0xb5b1870957d373ef0eeffecc6e4812c0fd08f554b37b233526acc331bf1544f7"; key = VerifyKeys.removeHexPrefix(key); byte[] otp = new byte[32]; byte[] seedByte = new byte[14]; byte[] encryptedKey = new byte[34]; byte[] keyByte = Encoding.ASCII.GetBytes(key); seedByte = Encoding.ASCII.GetBytes(seed); byte[] goodKey = OTPworker.OTPxor(seedByte, keyByte); byte[] decryptedKey = OTPworker.decryptFromBlob(seed, Convert.ToBase64String(goodKey)); string finalKey = Encoding.ASCII.GetString(keyByte); Debug.Log("Bad decrypted key: " + finalKey); }
// Takes a key as input, encrypts the key, sends it to didery in a POST request public void demoEncryptKey(string inputKey, string url = null) { inputKey = VerifyKeys.removeHexPrefix(inputKey); if (url == null) { url = urlAddress; } int size = 32; string[] dideryData; byte[] otp = new byte[32]; //byte[] seed = new byte[16]; // used for 128 bit seed byte[] seed = new byte[14]; // used for 108 bit seed byte[] encryptedKey = new byte[34]; byte[] key = Encoding.ASCII.GetBytes(inputKey); seed = OTPworker.randomSeedGenerator(seed); // Used for demo puroses - required if trying to use 108 bit seed if (seed[13] > 7) { seed[13] = (byte)((int)seed[13] % 7); } OTPworker.OTPGenerator(otp, size, seed); encryptedKey = OTPworker.OTPxor(key, otp); dideryData = DideryInterface.makePost(encryptedKey, seed); string did = dideryData[0]; string signature = dideryData[1]; string postBody = dideryData[2]; //Debug.Log("Did: " + did + " signature: " + " postBody: " + postBody); SeedManager.InputSeed = OTPworker.ByteArrayToHex(seed); DideryDemoManager.DemoDid = did; Debug.Log("Did: " + DideryDemoManager.DemoDid); postRequest(url, postBody, signature); }