Just a commit

This commit is contained in:
tomrus88 2009-03-08 14:35:15 +03:00
parent 8f9849969b
commit 2626d8c243
7 changed files with 77 additions and 53 deletions

View file

@ -187,7 +187,7 @@ int WorldSocket::SendPacket (const WorldPacket& pct)
} }
ServerPktHeader header(pct.size()+2, pct.GetOpcode()); ServerPktHeader header(pct.size()+2, pct.GetOpcode());
m_Crypt.EncryptSend ( header.header, header.getHeaderLength()); m_Crypt.EncryptSend ((uint8*)header.header, header.getHeaderLength());
if (m_OutBuffer->space () >= pct.size () + header.getHeaderLength() && msg_queue()->is_empty()) if (m_OutBuffer->space () >= pct.size () + header.getHeaderLength() && msg_queue()->is_empty())
{ {
@ -480,7 +480,7 @@ int WorldSocket::handle_input_header (void)
ACE_ASSERT (m_Header.length () == sizeof (ClientPktHeader)); ACE_ASSERT (m_Header.length () == sizeof (ClientPktHeader));
m_Crypt.DecryptRecv ((ACE_UINT8*) m_Header.rd_ptr (), sizeof (ClientPktHeader)); m_Crypt.DecryptRecv ((uint8*) m_Header.rd_ptr (), sizeof (ClientPktHeader));
ClientPktHeader& header = *((ClientPktHeader*) m_Header.rd_ptr ()); ClientPktHeader& header = *((ClientPktHeader*) m_Header.rd_ptr ());

View file

@ -18,6 +18,8 @@
#include "AuthCrypt.h" #include "AuthCrypt.h"
#include "Hmac.h" #include "Hmac.h"
#include "Log.h"
#include "BigNumber.h"
AuthCrypt::AuthCrypt() AuthCrypt::AuthCrypt()
{ {
@ -31,32 +33,51 @@ AuthCrypt::~AuthCrypt()
void AuthCrypt::Init(BigNumber *K) void AuthCrypt::Init(BigNumber *K)
{ {
uint8 recvSeed[SEED_KEY_SIZE] = { 0x22, 0xBE, 0xE5, 0xCF, 0xBB, 0x07, 0x64, 0xD9, 0x00, 0x45, 0x1B, 0xD0, 0x24, 0xB8, 0xD5, 0x45 }; sLog.outDebug("SessionKey: %s", K->AsHexStr());
HmacHash recvHash(SEED_KEY_SIZE, (uint8*)recvSeed);
recvHash.UpdateBigNumber(K);
recvHash.Finalize();
uint8 sendSeed[SEED_KEY_SIZE] = { 0xF4, 0x66, 0x31, 0x59, 0xFC, 0x83, 0x6E, 0x31, 0x31, 0x02, 0x51, 0xD5, 0x44, 0x31, 0x67, 0x98 }; uint8 ServerEncryptionKey[SEED_KEY_SIZE] = { 0x22, 0xBE, 0xE5, 0xCF, 0xBB, 0x07, 0x64, 0xD9, 0x00, 0x45, 0x1B, 0xD0, 0x24, 0xB8, 0xD5, 0x45 };
HmacHash sendHash(SEED_KEY_SIZE, (uint8*)sendSeed); HmacHash serverEncryptHmac(SEED_KEY_SIZE, (uint8*)ServerEncryptionKey);
sendHash.UpdateBigNumber(K); uint8 *encryptHash = serverEncryptHmac.ComputeHash(K);
sendHash.Finalize();
_recvCrypt.Init(recvHash.GetDigest(), sendHash.GetDigest()); BigNumber eh;
_sendCrypt.Init(recvHash.GetDigest(), sendHash.GetDigest()); eh.SetBinary(encryptHash, SHA_DIGEST_LENGTH);
sLog.outDebug("EncryptHash: %s", eh.AsHexStr());
uint8 emptyBuf1[1024]; uint8 ServerDecryptionKey[SEED_KEY_SIZE] = { 0xF4, 0x66, 0x31, 0x59, 0xFC, 0x83, 0x6E, 0x31, 0x31, 0x02, 0x51, 0xD5, 0x44, 0x31, 0x67, 0x98 };
memset(emptyBuf1, 0, 1024); HmacHash clientDecryptHmac(SEED_KEY_SIZE, (uint8*)ServerDecryptionKey);
uint8 *decryptHash = clientDecryptHmac.ComputeHash(K);
_sendCrypt.Encrypt(1024, (uint8*)emptyBuf1); BigNumber dh;
_sendCrypt.Decrypt(1024, (uint8*)emptyBuf1); dh.SetBinary(decryptHash, SHA_DIGEST_LENGTH);
sLog.outDebug("DecryptHash: %s", dh.AsHexStr());
uint8 emptyBuf2[1024]; SARC4 _serverDecrypt(encryptHash);
memset(emptyBuf2, 0, 1024); _clientDecrypt.Init(decryptHash);
_serverEncrypt.Init(encryptHash);
SARC4 _clientEncrypt(decryptHash);
_recvCrypt.Encrypt(1024, (uint8*)emptyBuf2); uint8 *syncBuf = new uint8[1024];
_recvCrypt.Decrypt(1024, (uint8*)emptyBuf2); memset(syncBuf, 0, 1024);
_serverEncrypt.UpdateData(1024, syncBuf);
_clientEncrypt.UpdateData(1024, syncBuf);
BigNumber b1;
b1.SetBinary(syncBuf, 16);
sLog.outDebug("buf1: %s", b1.AsHexStr());
memset(syncBuf, 0, 1024);
_serverDecrypt.UpdateData(1024, syncBuf);
_clientDecrypt.UpdateData(1024, syncBuf);
BigNumber b2;
b2.SetBinary(syncBuf, 16);
sLog.outDebug("buf2: %s", b2.AsHexStr());
_initialized = true; _initialized = true;
delete[] syncBuf;
} }
void AuthCrypt::DecryptRecv(uint8 *data, size_t len) void AuthCrypt::DecryptRecv(uint8 *data, size_t len)
@ -64,7 +85,7 @@ void AuthCrypt::DecryptRecv(uint8 *data, size_t len)
if (!_initialized) if (!_initialized)
return; return;
_recvCrypt.Decrypt(len, data); _clientDecrypt.UpdateData(len, data);
} }
void AuthCrypt::EncryptSend(uint8 *data, size_t len) void AuthCrypt::EncryptSend(uint8 *data, size_t len)
@ -72,5 +93,5 @@ void AuthCrypt::EncryptSend(uint8 *data, size_t len)
if (!_initialized) if (!_initialized)
return; return;
_sendCrypt.Encrypt(len, data); _serverEncrypt.UpdateData(len, data);
} }

View file

@ -37,8 +37,8 @@ class AuthCrypt
bool IsInitialized() { return _initialized; } bool IsInitialized() { return _initialized; }
private: private:
SARC4 _recvCrypt; SARC4 _clientDecrypt;
SARC4 _sendCrypt; SARC4 _serverEncrypt;
bool _initialized; bool _initialized;
}; };
#endif #endif

View file

@ -45,6 +45,13 @@ void HmacHash::UpdateData(const uint8 *data, int length)
void HmacHash::Finalize() void HmacHash::Finalize()
{ {
uint32 length = 0; uint32 length = 0;
HMAC_Final(&m_ctx, m_digest, &length); HMAC_Final(&m_ctx, (uint8*)m_digest, &length);
ASSERT(length == SHA_DIGEST_LENGTH) ASSERT(length == SHA_DIGEST_LENGTH)
} }
uint8 *HmacHash::ComputeHash(BigNumber *bn)
{
HMAC_Update(&m_ctx, bn->AsByteArray(), bn->GetNumBytes());
Finalize();
return (uint8*)m_digest;
}

View file

@ -35,8 +35,9 @@ class HmacHash
void UpdateBigNumber(BigNumber *bn); void UpdateBigNumber(BigNumber *bn);
void UpdateData(const uint8 *data, int length); void UpdateData(const uint8 *data, int length);
void Finalize(); void Finalize();
uint8 *GetDigest() { return m_digest; }; uint8 *ComputeHash(BigNumber *bn);
int GetLength() { return SHA_DIGEST_LENGTH; }; uint8 *GetDigest() { return (uint8*)m_digest; }
int GetLength() { return SHA_DIGEST_LENGTH; }
private: private:
HMAC_CTX m_ctx; HMAC_CTX m_ctx;
uint8 m_digest[SHA_DIGEST_LENGTH]; uint8 m_digest[SHA_DIGEST_LENGTH];

View file

@ -21,36 +21,32 @@
SARC4::SARC4() SARC4::SARC4()
{ {
EVP_CIPHER_CTX_init(&m_encryptctx); EVP_CIPHER_CTX_init(&m_ctx);
EVP_EncryptInit_ex(&m_encryptctx, EVP_rc4(), NULL, NULL, NULL); EVP_EncryptInit_ex(&m_ctx, EVP_rc4(), NULL, NULL, NULL);
EVP_CIPHER_CTX_set_key_length(&m_encryptctx, SHA_DIGEST_LENGTH); EVP_CIPHER_CTX_set_key_length(&m_ctx, SHA_DIGEST_LENGTH);
EVP_CIPHER_CTX_init(&m_decryptctx); }
EVP_DecryptInit_ex(&m_decryptctx, EVP_rc4(), NULL, NULL, NULL);
EVP_CIPHER_CTX_set_key_length(&m_decryptctx, SHA_DIGEST_LENGTH); SARC4::SARC4(uint8 *seed)
{
EVP_CIPHER_CTX_init(&m_ctx);
EVP_EncryptInit_ex(&m_ctx, EVP_rc4(), NULL, NULL, NULL);
EVP_CIPHER_CTX_set_key_length(&m_ctx, SHA_DIGEST_LENGTH);
EVP_EncryptInit_ex(&m_ctx, NULL, NULL, seed, NULL);
} }
SARC4::~SARC4() SARC4::~SARC4()
{ {
EVP_CIPHER_CTX_cleanup(&m_encryptctx); EVP_CIPHER_CTX_cleanup(&m_ctx);
EVP_CIPHER_CTX_cleanup(&m_decryptctx);
} }
void SARC4::Init(uint8 *seed1, uint8 *seed2) void SARC4::Init(uint8 *seed)
{ {
EVP_EncryptInit_ex(&m_encryptctx, NULL, NULL, seed1, NULL); EVP_EncryptInit_ex(&m_ctx, NULL, NULL, seed, NULL);
EVP_DecryptInit_ex(&m_decryptctx, NULL, NULL, seed2, NULL);
} }
void SARC4::Encrypt(uint32 len, uint8 *data) void SARC4::UpdateData(int len, uint8 *data)
{ {
int outlen = 0; int outlen = 0;
EVP_EncryptUpdate(&m_encryptctx, data, &outlen, data, len); EVP_EncryptUpdate(&m_ctx, data, &outlen, data, len);
EVP_EncryptFinal_ex(&m_encryptctx, data, &outlen); EVP_EncryptFinal_ex(&m_ctx, data, &outlen);
}
void SARC4::Decrypt(uint32 len, uint8 *data)
{
int outlen = 0;
EVP_DecryptUpdate(&m_decryptctx, data, &outlen, data, len);
EVP_DecryptFinal_ex(&m_decryptctx, data, &outlen);
} }

View file

@ -26,12 +26,11 @@ class SARC4
{ {
public: public:
SARC4(); SARC4();
SARC4(uint8 *seed);
~SARC4(); ~SARC4();
void Init(uint8 *seed1, uint8 *seed2); void Init(uint8 *seed);
void Encrypt(uint32 len, uint8 *data); void UpdateData(int len, uint8 *data);
void Decrypt(uint32 len, uint8 *data);
private: private:
EVP_CIPHER_CTX m_encryptctx; EVP_CIPHER_CTX m_ctx;
EVP_CIPHER_CTX m_decryptctx;
}; };
#endif #endif