tibia-client/src/framework/net/protocol.cpp

181 lines
5.3 KiB
C++
Raw Normal View History

2011-07-28 01:01:33 +02:00
#include "protocol.h"
#include "connection.h"
2011-07-13 23:12:36 +02:00
2011-08-16 05:27:46 +02:00
Protocol::Protocol()
2011-04-20 08:40:31 +02:00
{
2011-05-30 05:11:12 +02:00
m_xteaEncryptionEnabled = false;
2011-08-16 05:27:46 +02:00
m_checksumEnabled = false;
2011-04-20 08:40:31 +02:00
}
2011-07-27 20:10:49 +02:00
void Protocol::connect(const std::string& host, uint16 port)
2011-04-20 08:40:31 +02:00
{
2011-08-16 05:27:46 +02:00
m_connection = ConnectionPtr(new Connection);
m_connection->setErrorCallback(std::bind(&Protocol::onError, asProtocol(), _1));
2011-07-27 20:10:49 +02:00
m_connection->connect(host, port, std::bind(&Protocol::onConnect, asProtocol()));
2011-04-20 08:40:31 +02:00
}
2011-08-16 02:30:31 +02:00
void Protocol::disconnect()
{
2011-08-21 23:49:31 +02:00
if(m_connection) {
m_connection->close();
m_connection.reset();
}
2011-08-16 02:30:31 +02:00
}
2011-08-01 06:28:41 +02:00
void Protocol::send(OutputMessage& outputMessage)
2011-05-30 05:11:12 +02:00
{
2011-08-16 02:30:31 +02:00
// encrypt
2011-05-30 05:11:12 +02:00
if(m_xteaEncryptionEnabled)
xteaEncrypt(outputMessage);
2011-08-16 02:30:31 +02:00
// set checksum
2011-08-01 06:28:41 +02:00
uint32 checksum = getAdlerChecksum(outputMessage.getBuffer() + OutputMessage::DATA_POS, outputMessage.getMessageSize());
outputMessage.setWritePos(OutputMessage::CHECKSUM_POS);
outputMessage.addU32(checksum);
2011-05-30 05:11:12 +02:00
2011-08-16 02:30:31 +02:00
// set size
2011-08-01 06:28:41 +02:00
uint16 messageSize = outputMessage.getMessageSize();
outputMessage.setWritePos(OutputMessage::HEADER_POS);
outputMessage.addU16(messageSize);
2011-05-30 05:11:12 +02:00
2011-08-16 02:30:31 +02:00
// send
m_connection->write(outputMessage.getBuffer(), outputMessage.getMessageSize());
2011-05-30 05:11:12 +02:00
}
2011-07-27 20:10:49 +02:00
void Protocol::recv()
2011-05-30 05:11:12 +02:00
{
2011-07-27 20:10:49 +02:00
m_inputMessage.reset();
2011-08-16 02:30:31 +02:00
m_connection->read(InputMessage::HEADER_LENGTH, std::bind(&Protocol::internalRecvHeader, asProtocol(), _1, _2));
2011-07-27 20:10:49 +02:00
}
2011-07-28 01:01:33 +02:00
void Protocol::internalRecvHeader(uint8* buffer, uint16 size)
2011-07-27 20:10:49 +02:00
{
memcpy(m_inputMessage.getBuffer() + InputMessage::HEADER_POS, buffer, size);
2011-08-16 02:30:31 +02:00
// read message size
2011-07-27 20:10:49 +02:00
uint16 dataSize = m_inputMessage.getU16();
m_inputMessage.setMessageSize(dataSize);
2011-08-16 02:30:31 +02:00
// schedule read for message data
m_connection->read(dataSize, std::bind(&Protocol::internalRecvData, asProtocol(), _1, _2));
2011-07-27 20:10:49 +02:00
}
2011-07-28 01:01:33 +02:00
void Protocol::internalRecvData(uint8* buffer, uint16 size)
2011-07-27 20:10:49 +02:00
{
memcpy(m_inputMessage.getBuffer() + InputMessage::CHECKSUM_POS, buffer, size);
2011-08-01 06:28:41 +02:00
if(m_checksumEnabled) {
uint32 checksum = getAdlerChecksum(m_inputMessage.getBuffer() + InputMessage::DATA_POS, m_inputMessage.getMessageSize() - InputMessage::CHECKSUM_LENGTH);
if(m_inputMessage.getU32() != checksum) {
// error
2011-08-20 22:30:41 +02:00
logError("got a network message with invalid checksum");
2011-08-01 06:28:41 +02:00
return;
}
2011-05-30 05:11:12 +02:00
}
if(m_xteaEncryptionEnabled)
2011-08-01 06:28:41 +02:00
xteaDecrypt(m_inputMessage);
2011-07-27 20:10:49 +02:00
2011-08-01 06:28:41 +02:00
onRecv(m_inputMessage);
2011-05-30 05:11:12 +02:00
}
2011-08-16 05:27:46 +02:00
void Protocol::generateXteaKey()
{
std::mt19937 eng(std::time(NULL));
std::uniform_int_distribution<uint32> unif(0, 0xFFFFFFFF);
m_xteaKey[0] = unif(eng);
m_xteaKey[1] = unif(eng);
m_xteaKey[2] = unif(eng);
m_xteaKey[3] = unif(eng);
}
2011-08-01 06:28:41 +02:00
bool Protocol::xteaDecrypt(InputMessage& inputMessage)
2011-05-30 05:11:12 +02:00
{
// FIXME: this function has not been tested yet
2011-08-01 06:28:41 +02:00
uint16 messageSize = inputMessage.getMessageSize() - InputMessage::CHECKSUM_LENGTH;
2011-05-30 05:11:12 +02:00
if(messageSize % 8 != 0) {
2011-08-20 22:30:41 +02:00
logError("invalid encrypted network message");
2011-05-30 05:11:12 +02:00
return false;
}
2011-08-01 06:28:41 +02:00
uint32 *buffer = (uint32*)(inputMessage.getBuffer() + InputMessage::DATA_POS);
2011-05-30 05:11:12 +02:00
int readPos = 0;
while(readPos < messageSize/4) {
uint32 v0 = buffer[readPos], v1 = buffer[readPos + 1];
uint32 delta = 0x61C88647;
uint32 sum = 0xC6EF3720;
for(int32 i = 0; i < 32; i++) {
v1 -= ((v0 << 4 ^ v0 >> 5) + v0) ^ (sum + m_xteaKey[sum>>11 & 3]);
sum += delta;
v0 -= ((v1 << 4 ^ v1 >> 5) + v1) ^ (sum + m_xteaKey[sum & 3]);
}
buffer[readPos] = v0; buffer[readPos + 1] = v1;
readPos = readPos + 2;
}
2011-08-01 06:28:41 +02:00
int tmp = inputMessage.getU16();
if(tmp > inputMessage.getMessageSize() - 4) {
2011-08-20 22:30:41 +02:00
logError("invalid decrypted a network message");
2011-05-30 05:11:12 +02:00
return false;
}
2011-08-01 06:28:41 +02:00
inputMessage.setMessageSize(tmp + InputMessage::UNENCRYPTED_DATA_POS);
2011-05-30 05:11:12 +02:00
return true;
}
2011-08-01 06:28:41 +02:00
void Protocol::xteaEncrypt(OutputMessage& outputMessage)
2011-05-30 05:11:12 +02:00
{
2011-08-01 06:28:41 +02:00
uint16 messageLength = outputMessage.getMessageSize();
2011-05-30 05:11:12 +02:00
2011-08-12 02:06:01 +02:00
memmove(outputMessage.getBuffer() + OutputMessage::DATA_POS + 2, outputMessage.getBuffer() + OutputMessage::DATA_POS, messageLength);
*(uint16*)(outputMessage.getBuffer() + OutputMessage::DATA_POS) = messageLength;
messageLength += 2;
outputMessage.setMessageSize(messageLength);
outputMessage.setWritePos(messageLength + OutputMessage::DATA_POS);
2011-05-30 05:11:12 +02:00
//add bytes until reach 8 multiple
if((messageLength % 8) != 0) {
uint16 n = 8 - (messageLength % 8);
2011-08-01 06:28:41 +02:00
outputMessage.addPaddingBytes(n);
2011-05-30 05:11:12 +02:00
messageLength += n;
}
int readPos = 0;
2011-08-12 02:06:01 +02:00
uint32 *buffer = (uint32*)(outputMessage.getBuffer() + OutputMessage::DATA_POS);
2011-05-30 05:11:12 +02:00
while(readPos < messageLength / 4) {
uint32 v0 = buffer[readPos], v1 = buffer[readPos + 1];
uint32 delta = 0x61C88647;
uint32 sum = 0;
for(int32 i = 0; i < 32; i++) {
v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ (sum + m_xteaKey[sum & 3]);
sum -= delta;
v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ (sum + m_xteaKey[sum>>11 & 3]);
}
buffer[readPos] = v0; buffer[readPos + 1] = v1;
readPos = readPos + 2;
}
}
2011-07-28 01:01:33 +02:00
uint32 Protocol::getAdlerChecksum(uint8* buffer, uint16 size)
2011-05-30 05:11:12 +02:00
{
uint32 a = 1, b = 0;
while (size > 0) {
size_t tlen = size > 5552 ? 5552 : size;
size -= tlen;
do {
a += *buffer++;
b += a;
} while (--tlen);
a %= 65521;
b %= 65521;
}
return (b << 16) | a;
}