You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

158 lines
4.8 KiB

/*==LICENSE==*
CyanWorlds.com Engine - MMOG client, server and tools
Copyright (C) 2011 Cyan Worlds, Inc.
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
Additional permissions under GNU GPL version 3 section 7
If you modify this Program, or any covered work, by linking or
combining it with any of RAD Game Tools Bink SDK, Autodesk 3ds Max SDK,
NVIDIA PhysX SDK, Microsoft DirectX SDK, OpenSSL library, Independent
JPEG Group JPEG library, Microsoft Windows Media SDK, or Apple QuickTime SDK
(or a modified version of those libraries),
containing parts covered by the terms of the Bink SDK EULA, 3ds Max EULA,
PhysX SDK EULA, DirectX SDK EULA, OpenSSL and SSLeay licenses, IJG
JPEG Library README, Windows Media SDK EULA, or QuickTime SDK EULA, the
licensors of this Program grant you additional
permission to convey the resulting work. Corresponding Source for a
non-source form of such a combination shall include the source code for
the parts of OpenSSL and IJG JPEG Library used as well as that of the covered
work.
You can contact Cyan Worlds, Inc. by email legal@cyan.com
or by snail mail at:
Cyan Worlds, Inc.
14617 N Newport Hwy
Mead, WA 99021
*==LICENSE==*/
/*****************************************************************************
*
* $/Plasma20/Sources/Plasma/NucleusLib/pnNetCli/pnNcEncrypt.cpp
*
***/
#include "Pch.h"
#pragma hdrstop
namespace pnNetCli {
/****************************************************************************
*
* Diffie-Hellman constants
*
// g and n are pregenerated and published
// (built into both client and server software)
plBigNum g(4);
plBigNum n; n.RandPrime(kKeyBits, &seed);
// a and x are pregenerated; a is built into server software, and x is
// built into client software
plBigNum a; a.Rand(kKeyBits, &seed);
plBigNum x; x.PowMod(g, a, n);
// client chooses b and y on connect, and sends y to the server
plBigNum b; b.Rand(kKeyBits, &seed);
plBigNum y; y.PowMod(g, b, n);
// server computes key: k = y^a mod n
plBigNum ka; ka.PowMod(y, a, n);
// client computes key: k = x^b mod n
plBigNum kb; kb.PowMod(x, b, n);
***/
static_assert(IS_POW2(kNetDiffieHellmanKeyBits), "DH Key bit count is not a power of 2");
/*****************************************************************************
*
* Private
*
***/
//============================================================================
// TODO: Cache computed keys
static void GetCachedServerKey (
NetMsgChannel* channel,
plBigNum* ka,
const plBigNum& dh_y
) {
// Get diffie-hellman constants
unsigned DH_G;
const plBigNum* DH_A;
const plBigNum* DH_N;
NetMsgChannelGetDhConstants(channel, &DH_G, &DH_A, &DH_N);
hsAssert(!DH_N->isZero(), "DH_N must not be zero in encrypted mode");
// Compute the result
ka->PowMod(dh_y, *DH_A, *DH_N);
}
/*****************************************************************************
*
* Module functions
*
***/
//============================================================================
void NetMsgCryptClientStart (
NetMsgChannel* channel,
unsigned seedBytes,
const uint8_t seedData[],
plBigNum* clientSeed,
plBigNum* serverSeed
) {
unsigned DH_G;
const plBigNum* DH_X;
const plBigNum* DH_N;
NetMsgChannelGetDhConstants(channel, &DH_G, &DH_X, &DH_N);
if (DH_N->isZero()) { // no actual encryption, but the caller expects a seed
clientSeed->SetZero();
serverSeed->SetZero();
}
else {
// Client chooses b and y on connect
plBigNum g(DH_G);
plBigNum seed(seedBytes, seedData);
plBigNum b; b.Rand(kNetDiffieHellmanKeyBits, &seed);
// Client computes key: kb = x^b mod n
clientSeed->PowMod(*DH_X, b, *DH_N);
// Client sends y to server
serverSeed->PowMod(g, b, *DH_N);
}
}
//============================================================================
void NetMsgCryptServerConnect (
NetMsgChannel* channel,
unsigned seedBytes,
const uint8_t seedData[],
plBigNum* clientSeed
) {
// Server computes client key: ka = y^a mod n
const plBigNum dh_y(seedBytes, seedData);
GetCachedServerKey(channel, clientSeed, dh_y);
}
} // namespace pnNetCli