You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
157 lines
4.8 KiB
157 lines
4.8 KiB
/*==LICENSE==* |
|
|
|
CyanWorlds.com Engine - MMOG client, server and tools |
|
Copyright (C) 2011 Cyan Worlds, Inc. |
|
|
|
This program is free software: you can redistribute it and/or modify |
|
it under the terms of the GNU General Public License as published by |
|
the Free Software Foundation, either version 3 of the License, or |
|
(at your option) any later version. |
|
|
|
This program is distributed in the hope that it will be useful, |
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
GNU General Public License for more details. |
|
|
|
You should have received a copy of the GNU General Public License |
|
along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
|
|
Additional permissions under GNU GPL version 3 section 7 |
|
|
|
If you modify this Program, or any covered work, by linking or |
|
combining it with any of RAD Game Tools Bink SDK, Autodesk 3ds Max SDK, |
|
NVIDIA PhysX SDK, Microsoft DirectX SDK, OpenSSL library, Independent |
|
JPEG Group JPEG library, Microsoft Windows Media SDK, or Apple QuickTime SDK |
|
(or a modified version of those libraries), |
|
containing parts covered by the terms of the Bink SDK EULA, 3ds Max EULA, |
|
PhysX SDK EULA, DirectX SDK EULA, OpenSSL and SSLeay licenses, IJG |
|
JPEG Library README, Windows Media SDK EULA, or QuickTime SDK EULA, the |
|
licensors of this Program grant you additional |
|
permission to convey the resulting work. Corresponding Source for a |
|
non-source form of such a combination shall include the source code for |
|
the parts of OpenSSL and IJG JPEG Library used as well as that of the covered |
|
work. |
|
|
|
You can contact Cyan Worlds, Inc. by email legal@cyan.com |
|
or by snail mail at: |
|
Cyan Worlds, Inc. |
|
14617 N Newport Hwy |
|
Mead, WA 99021 |
|
|
|
*==LICENSE==*/ |
|
/***************************************************************************** |
|
* |
|
* $/Plasma20/Sources/Plasma/NucleusLib/pnNetCli/pnNcEncrypt.cpp |
|
* |
|
***/ |
|
|
|
#include "Pch.h" |
|
#pragma hdrstop |
|
|
|
|
|
namespace pnNetCli { |
|
|
|
/**************************************************************************** |
|
* |
|
* Diffie-Hellman constants |
|
* |
|
|
|
// g and n are pregenerated and published |
|
// (built into both client and server software) |
|
plBigNum g(4); |
|
plBigNum n; n.RandPrime(kKeyBits, &seed); |
|
|
|
// a and x are pregenerated; a is built into server software, and x is |
|
// built into client software |
|
plBigNum a; a.Rand(kKeyBits, &seed); |
|
plBigNum x; x.PowMod(g, a, n); |
|
|
|
// client chooses b and y on connect, and sends y to the server |
|
plBigNum b; b.Rand(kKeyBits, &seed); |
|
plBigNum y; y.PowMod(g, b, n); |
|
|
|
// server computes key: k = y^a mod n |
|
plBigNum ka; ka.PowMod(y, a, n); |
|
|
|
// client computes key: k = x^b mod n |
|
plBigNum kb; kb.PowMod(x, b, n); |
|
|
|
***/ |
|
|
|
static_assert(IS_POW2(kNetDiffieHellmanKeyBits), "DH Key bit count is not a power of 2"); |
|
|
|
|
|
/***************************************************************************** |
|
* |
|
* Private |
|
* |
|
***/ |
|
|
|
//============================================================================ |
|
// TODO: Cache computed keys |
|
static void GetCachedServerKey ( |
|
NetMsgChannel* channel, |
|
plBigNum* ka, |
|
const plBigNum& dh_y |
|
) { |
|
// Get diffie-hellman constants |
|
unsigned DH_G; |
|
const plBigNum* DH_A; |
|
const plBigNum* DH_N; |
|
NetMsgChannelGetDhConstants(channel, &DH_G, &DH_A, &DH_N); |
|
hsAssert(!DH_N->isZero(), "DH_N must not be zero in encrypted mode"); |
|
|
|
// Compute the result |
|
ka->PowMod(dh_y, *DH_A, *DH_N); |
|
} |
|
|
|
|
|
/***************************************************************************** |
|
* |
|
* Module functions |
|
* |
|
***/ |
|
|
|
//============================================================================ |
|
void NetMsgCryptClientStart ( |
|
NetMsgChannel* channel, |
|
unsigned seedBytes, |
|
const uint8_t seedData[], |
|
plBigNum* clientSeed, |
|
plBigNum* serverSeed |
|
) { |
|
unsigned DH_G; |
|
const plBigNum* DH_X; |
|
const plBigNum* DH_N; |
|
NetMsgChannelGetDhConstants(channel, &DH_G, &DH_X, &DH_N); |
|
if (DH_N->isZero()) { // no actual encryption, but the caller expects a seed |
|
clientSeed->SetZero(); |
|
serverSeed->SetZero(); |
|
} |
|
else { |
|
// Client chooses b and y on connect |
|
plBigNum g(DH_G); |
|
plBigNum seed(seedBytes, seedData); |
|
plBigNum b; b.Rand(kNetDiffieHellmanKeyBits, &seed); |
|
|
|
// Client computes key: kb = x^b mod n |
|
clientSeed->PowMod(*DH_X, b, *DH_N); |
|
|
|
// Client sends y to server |
|
serverSeed->PowMod(g, b, *DH_N); |
|
} |
|
} |
|
|
|
//============================================================================ |
|
void NetMsgCryptServerConnect ( |
|
NetMsgChannel* channel, |
|
unsigned seedBytes, |
|
const uint8_t seedData[], |
|
plBigNum* clientSeed |
|
) { |
|
// Server computes client key: ka = y^a mod n |
|
const plBigNum dh_y(seedBytes, seedData); |
|
GetCachedServerKey(channel, clientSeed, dh_y); |
|
} |
|
|
|
} // namespace pnNetCli
|
|
|