You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

243 lines
5.5 KiB

#include "dvlnet/packet.h"
namespace devilution {
namespace net {
#ifndef NONET
static constexpr bool DisableEncryption = false;
#endif
const char *packet_type_to_string(uint8_t packetType)
{
switch (packetType) {
case PT_MESSAGE:
return "PT_MESSAGE";
case PT_TURN:
return "PT_TURN";
case PT_JOIN_REQUEST:
return "PT_JOIN_REQUEST";
case PT_JOIN_ACCEPT:
return "PT_JOIN_ACCEPT";
case PT_CONNECT:
return "PT_CONNECT";
case PT_DISCONNECT:
return "PT_DISCONNECT";
case PT_INFO_REQUEST:
return "PT_INFO_REQUEST";
case PT_INFO_REPLY:
return "PT_INFO_REPLY";
default:
return nullptr;
}
}
wrong_packet_type_exception::wrong_packet_type_exception(std::initializer_list<packet_type> expectedTypes, std::uint8_t actual)
{
message_ = "Expected packet of type ";
const auto appendPacketType = [this](std::uint8_t t) {
const char *typeStr = packet_type_to_string(t);
if (typeStr != nullptr)
message_.append(typeStr);
else
message_.append(std::to_string(t));
};
constexpr char KJoinTypes[] = " or ";
for (const packet_type t : expectedTypes) {
appendPacketType(t);
message_.append(KJoinTypes);
}
message_.resize(message_.size() - (sizeof(KJoinTypes) - 1));
message_.append(", got");
appendPacketType(actual);
}
namespace {
void CheckPacketTypeOneOf(std::initializer_list<packet_type> expectedTypes, std::uint8_t actualType)
{
for (std::uint8_t packetType : expectedTypes)
if (actualType == packetType)
return;
throw wrong_packet_type_exception(expectedTypes, actualType);
}
} // namespace
const buffer_t &packet::data()
{
if (!have_decrypted || !have_encrypted)
ABORT();
return encrypted_buffer;
}
packet_type packet::type()
{
if (!have_decrypted)
ABORT();
return m_type;
}
plr_t packet::src() const
{
if (!have_decrypted)
ABORT();
return m_src;
}
plr_t packet::dest() const
{
if (!have_decrypted)
ABORT();
return m_dest;
}
const buffer_t &packet::message()
{
if (!have_decrypted)
ABORT();
CheckPacketTypeOneOf({ PT_MESSAGE }, m_type);
return m_message;
}
turn_t packet::turn()
{
if (!have_decrypted)
ABORT();
CheckPacketTypeOneOf({ PT_TURN }, m_type);
return m_turn;
}
cookie_t packet::cookie()
{
if (!have_decrypted)
ABORT();
CheckPacketTypeOneOf({ PT_JOIN_REQUEST, PT_JOIN_ACCEPT }, m_type);
return m_cookie;
}
plr_t packet::newplr()
{
if (!have_decrypted)
ABORT();
CheckPacketTypeOneOf({ PT_JOIN_ACCEPT, PT_CONNECT, PT_DISCONNECT }, m_type);
return m_newplr;
}
const buffer_t &packet::info()
{
if (!have_decrypted)
ABORT();
CheckPacketTypeOneOf({ PT_JOIN_REQUEST, PT_JOIN_ACCEPT, PT_CONNECT, PT_INFO_REPLY }, m_type);
return m_info;
}
leaveinfo_t packet::leaveinfo()
{
if (!have_decrypted)
ABORT();
CheckPacketTypeOneOf({ PT_DISCONNECT }, m_type);
return m_leaveinfo;
}
void packet_in::create(buffer_t buf)
{
if (have_encrypted || have_decrypted)
ABORT();
encrypted_buffer = std::move(buf);
have_encrypted = true;
}
void packet_in::decrypt()
{
if (!have_encrypted)
ABORT();
if (have_decrypted)
return;
#ifndef NONET
if (!DisableEncryption) {
if (encrypted_buffer.size() < crypto_secretbox_NONCEBYTES
+ crypto_secretbox_MACBYTES
+ sizeof(packet_type) + 2 * sizeof(plr_t))
throw packet_exception();
auto pktlen = (encrypted_buffer.size()
- crypto_secretbox_NONCEBYTES
- crypto_secretbox_MACBYTES);
decrypted_buffer.resize(pktlen);
int status = crypto_secretbox_open_easy(
decrypted_buffer.data(),
encrypted_buffer.data() + crypto_secretbox_NONCEBYTES,
encrypted_buffer.size() - crypto_secretbox_NONCEBYTES,
encrypted_buffer.data(),
key.data());
if (status != 0)
throw packet_exception();
} else
#endif
{
if (encrypted_buffer.size() < sizeof(packet_type) + 2 * sizeof(plr_t))
throw packet_exception();
decrypted_buffer = encrypted_buffer;
}
process_data();
have_decrypted = true;
}
void packet_out::encrypt()
{
if (!have_decrypted)
ABORT();
if (have_encrypted)
return;
process_data();
#ifndef NONET
if (!DisableEncryption) {
auto lenCleartext = encrypted_buffer.size();
encrypted_buffer.insert(encrypted_buffer.begin(),
crypto_secretbox_NONCEBYTES, 0);
encrypted_buffer.insert(encrypted_buffer.end(),
crypto_secretbox_MACBYTES, 0);
randombytes_buf(encrypted_buffer.data(), crypto_secretbox_NONCEBYTES);
int status = crypto_secretbox_easy(
encrypted_buffer.data() + crypto_secretbox_NONCEBYTES,
encrypted_buffer.data() + crypto_secretbox_NONCEBYTES,
lenCleartext,
encrypted_buffer.data(),
key.data());
if (status != 0)
ABORT();
}
#endif
have_encrypted = true;
}
packet_factory::packet_factory(std::string pw)
{
#ifndef NONET
if (sodium_init() < 0)
ABORT();
pw.resize(std::min<std::size_t>(pw.size(), crypto_pwhash_argon2id_PASSWD_MAX));
pw.resize(std::max<std::size_t>(pw.size(), crypto_pwhash_argon2id_PASSWD_MIN), 0);
std::string salt("W9bE9dQgVaeybwr2");
salt.resize(crypto_pwhash_argon2id_SALTBYTES, 0);
int status = crypto_pwhash(
key.data(),
crypto_secretbox_KEYBYTES,
pw.data(),
pw.size(),
reinterpret_cast<const unsigned char *>(salt.data()),
3 * crypto_pwhash_argon2id_OPSLIMIT_MIN,
2 * crypto_pwhash_argon2id_MEMLIMIT_MIN,
crypto_pwhash_ALG_ARGON2ID13);
if (status != 0)
ABORT();
#endif
}
} // namespace net
} // namespace devilution