mirror of
https://github.com/EQEmu/Server.git
synced 2026-04-28 13:22:26 +00:00
- License was intended to be GPLv3 per earlier commit of GPLv3 LICENSE FILE - This is confirmed by the inclusion of libraries that are incompatible with GPLv2 - This is also confirmed by KLS and the agreement of KLS's predecessors - Added GPLv3 license headers to the compilable source files - Removed Folly licensing in strings.h since the string functions do not match the Folly functions and are standard functions - this must have been left over from previous implementations - Removed individual contributor license headers since the project has been under the "developer" mantle for many years - Removed comments on files that were previously automatically generated since they've been manually modified multiple times and there are no automatic scripts referencing them (removed in 2023)
346 lines
8.5 KiB
C++
346 lines
8.5 KiB
C++
/* EQEmu: EQEmulator
|
|
|
|
Copyright (C) 2001-2026 EQEmu Development Team
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
#include "encryption.h"
|
|
|
|
#ifdef EQEMU_USE_OPENSSL
|
|
#include <openssl/des.h>
|
|
#include <openssl/sha.h>
|
|
#include <openssl/md5.h>
|
|
#endif
|
|
#ifdef EQEMU_USE_MBEDTLS
|
|
#include <mbedtls/des.h>
|
|
#include <mbedtls/md5.h>
|
|
#include <mbedtls/sha1.h>
|
|
#include <mbedtls/sha512.h>
|
|
#endif
|
|
|
|
#include <cstring>
|
|
#include <string>
|
|
|
|
#ifdef ENABLE_SECURITY
|
|
|
|
#include <sodium.h>
|
|
|
|
#endif
|
|
|
|
std::string GetEncryptionByModeId(uint32 mode)
|
|
{
|
|
switch (mode) {
|
|
case EncryptionModeMD5:
|
|
return "MD5";
|
|
case EncryptionModeMD5PassUser:
|
|
return "MD5PassUser";
|
|
case EncryptionModeMD5UserPass:
|
|
return "MD5UserPass";
|
|
case EncryptionModeMD5Triple:
|
|
return "MD5Triple";
|
|
case EncryptionModeSHA:
|
|
return "SHA";
|
|
case EncryptionModeSHAPassUser:
|
|
return "SHAPassUser";
|
|
case EncryptionModeSHAUserPass:
|
|
return "SHAUserPass";
|
|
case EncryptionModeSHATriple:
|
|
return "SHATriple";
|
|
case EncryptionModeSHA512:
|
|
return "SHA512";
|
|
case EncryptionModeSHA512PassUser:
|
|
return "SHA512PassUser";
|
|
case EncryptionModeSHA512UserPass:
|
|
return "SHA512UserPass";
|
|
case EncryptionModeSHA512Triple:
|
|
return "SHA512Triple";
|
|
case EncryptionModeArgon2:
|
|
return "Argon2";
|
|
case EncryptionModeSCrypt:
|
|
return "SCrypt";
|
|
default:
|
|
return "";
|
|
}
|
|
}
|
|
|
|
const char *eqcrypt_block(const char *buffer_in, size_t buffer_in_sz, char *buffer_out, bool enc)
|
|
{
|
|
#ifdef EQEMU_USE_MBEDTLS
|
|
if (enc) {
|
|
if (buffer_in_sz % 8 != 0) {
|
|
auto temp_buffer_sz = ((buffer_in_sz / 8) + 1) * 8;
|
|
unsigned char *temp_buffer = new unsigned char[temp_buffer_sz];
|
|
unsigned char *temp_buffer_in = &temp_buffer[0];
|
|
unsigned char *temp_buffer_out = &temp_buffer[temp_buffer_sz];
|
|
|
|
memset(temp_buffer, 0, temp_buffer_sz * 2);
|
|
memcpy(temp_buffer_in, buffer_in, buffer_in_sz);
|
|
|
|
unsigned char key[MBEDTLS_DES_KEY_SIZE];
|
|
unsigned char iv[8];
|
|
memset(&key, 0, MBEDTLS_DES_KEY_SIZE);
|
|
memset(&iv, 0, 8);
|
|
|
|
mbedtls_des_context context;
|
|
mbedtls_des_setkey_enc(&context, key);
|
|
mbedtls_des_crypt_cbc(&context, MBEDTLS_DES_ENCRYPT, temp_buffer_sz, iv, (const unsigned char*)temp_buffer_in, (unsigned char*)temp_buffer_out);
|
|
|
|
memcpy(buffer_out, temp_buffer_out, temp_buffer_sz);
|
|
delete[] temp_buffer;
|
|
}
|
|
else {
|
|
unsigned char key[MBEDTLS_DES_KEY_SIZE];
|
|
unsigned char iv[8];
|
|
memset(&key, 0, MBEDTLS_DES_KEY_SIZE);
|
|
memset(&iv, 0, 8);
|
|
|
|
mbedtls_des_context context;
|
|
mbedtls_des_setkey_enc(&context, key);
|
|
mbedtls_des_crypt_cbc(&context, MBEDTLS_DES_ENCRYPT, buffer_in_sz, iv, (const unsigned char*)buffer_in, (unsigned char*)buffer_out);
|
|
}
|
|
}
|
|
else {
|
|
if (buffer_in_sz && buffer_in_sz % 8 != 0) {
|
|
return nullptr;
|
|
}
|
|
|
|
unsigned char key[MBEDTLS_DES_KEY_SIZE];
|
|
unsigned char iv[8];
|
|
memset(&key, 0, MBEDTLS_DES_KEY_SIZE);
|
|
memset(&iv, 0, 8);
|
|
|
|
mbedtls_des_context context;
|
|
mbedtls_des_setkey_dec(&context, key);
|
|
mbedtls_des_crypt_cbc(&context, MBEDTLS_DES_DECRYPT, buffer_in_sz, iv, (const unsigned char*)buffer_in, (unsigned char*)buffer_out);
|
|
}
|
|
#endif
|
|
|
|
#ifdef EQEMU_USE_OPENSSL
|
|
DES_key_schedule k;
|
|
DES_cblock v;
|
|
|
|
memset(&k, 0, sizeof(DES_key_schedule));
|
|
memset(&v, 0, sizeof(DES_cblock));
|
|
|
|
if (!enc && buffer_in_sz && buffer_in_sz % 8 != 0) {
|
|
return nullptr;
|
|
}
|
|
|
|
DES_ncbc_encrypt((const unsigned char*)buffer_in, (unsigned char*)buffer_out, (long)buffer_in_sz, &k, &v, enc);
|
|
#endif
|
|
return buffer_out;
|
|
}
|
|
|
|
std::string eqcrypt_md5(const std::string &msg)
|
|
{
|
|
std::string ret;
|
|
ret.reserve(32);
|
|
|
|
#ifdef EQEMU_USE_MBEDTLS
|
|
unsigned char digest[16];
|
|
char temp[4];
|
|
|
|
if (0 == mbedtls_md5_ret((const unsigned char*)msg.c_str(), msg.length(), digest)) {
|
|
for (int i = 0; i < 16; ++i) {
|
|
sprintf(&temp[0], "%02x", digest[i]);
|
|
ret.push_back(temp[0]);
|
|
ret.push_back(temp[1]);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#ifdef EQEMU_USE_OPENSSL
|
|
unsigned char md5_digest[16];
|
|
char tmp[4];
|
|
|
|
MD5((const unsigned char*)msg.c_str(), msg.length(), md5_digest);
|
|
|
|
for (int i = 0; i < 16; ++i) {
|
|
sprintf(&tmp[0], "%02x", md5_digest[i]);
|
|
ret.push_back(tmp[0]);
|
|
ret.push_back(tmp[1]);
|
|
}
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
std::string eqcrypt_sha1(const std::string &msg)
|
|
{
|
|
std::string ret;
|
|
ret.reserve(40);
|
|
|
|
#ifdef EQEMU_USE_MBEDTLS
|
|
unsigned char digest[20];
|
|
char temp[4];
|
|
|
|
if (0 == mbedtls_sha1_ret((const unsigned char*)msg.c_str(), msg.length(), digest)) {
|
|
for (int i = 0; i < 20; ++i) {
|
|
sprintf(&temp[0], "%02x", digest[i]);
|
|
ret.push_back(temp[0]);
|
|
ret.push_back(temp[1]);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#ifdef EQEMU_USE_OPENSSL
|
|
unsigned char sha_digest[20];
|
|
char tmp[4];
|
|
|
|
SHA1((const unsigned char*)msg.c_str(), msg.length(), sha_digest);
|
|
|
|
for (int i = 0; i < 20; ++i) {
|
|
sprintf(&tmp[0], "%02x", sha_digest[i]);
|
|
ret.push_back(tmp[0]);
|
|
ret.push_back(tmp[1]);
|
|
}
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
std::string eqcrypt_sha512(const std::string &msg)
|
|
{
|
|
std::string ret;
|
|
ret.reserve(128);
|
|
|
|
#ifdef EQEMU_USE_MBEDTLS
|
|
unsigned char digest[64];
|
|
char temp[4];
|
|
|
|
if (0 == mbedtls_sha512_ret((const unsigned char*)msg.c_str(), msg.length(), digest, 0)) {
|
|
for (int i = 0; i < 64; ++i) {
|
|
sprintf(&temp[0], "%02x", digest[i]);
|
|
ret.push_back(temp[0]);
|
|
ret.push_back(temp[1]);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#ifdef EQEMU_USE_OPENSSL
|
|
unsigned char sha_digest[64];
|
|
char tmp[4];
|
|
|
|
SHA512((const unsigned char*)msg.c_str(), msg.length(), sha_digest);
|
|
|
|
for (int i = 0; i < 64; ++i) {
|
|
sprintf(&tmp[0], "%02x", sha_digest[i]);
|
|
ret.push_back(tmp[0]);
|
|
ret.push_back(tmp[1]);
|
|
}
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef ENABLE_SECURITY
|
|
|
|
std::string eqcrypt_argon2(const std::string &msg)
|
|
{
|
|
char buffer[crypto_pwhash_STRBYTES] = {0};
|
|
std::string ret;
|
|
|
|
if (crypto_pwhash_str(
|
|
&buffer[0],
|
|
&msg[0],
|
|
msg.length(),
|
|
crypto_pwhash_OPSLIMIT_INTERACTIVE,
|
|
crypto_pwhash_MEMLIMIT_INTERACTIVE
|
|
) != 0) {
|
|
return "";
|
|
}
|
|
|
|
ret = buffer;
|
|
return ret;
|
|
}
|
|
|
|
std::string eqcrypt_scrypt(const std::string &msg)
|
|
{
|
|
char buffer[crypto_pwhash_scryptsalsa208sha256_STRBYTES] = {0};
|
|
std::string ret;
|
|
|
|
if (crypto_pwhash_scryptsalsa208sha256_str(
|
|
&buffer[0],
|
|
&msg[0],
|
|
msg.length(),
|
|
crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVE,
|
|
crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVE
|
|
) != 0) {
|
|
return "";
|
|
}
|
|
|
|
ret = buffer;
|
|
return ret;
|
|
}
|
|
|
|
#endif
|
|
|
|
std::string eqcrypt_hash(const std::string &username, const std::string &password, int mode)
|
|
{
|
|
switch (mode) {
|
|
case EncryptionModeMD5:
|
|
return eqcrypt_md5(password);
|
|
case EncryptionModeMD5PassUser:
|
|
return eqcrypt_md5(password + ":" + username);
|
|
case EncryptionModeMD5UserPass:
|
|
return eqcrypt_md5(username + ":" + password);
|
|
case EncryptionModeMD5Triple:
|
|
return eqcrypt_md5(eqcrypt_md5(username) + eqcrypt_md5(password));
|
|
case EncryptionModeSHA:
|
|
return eqcrypt_sha1(password);
|
|
case EncryptionModeSHAPassUser:
|
|
return eqcrypt_sha1(password + ":" + username);
|
|
case EncryptionModeSHAUserPass:
|
|
return eqcrypt_sha1(username + ":" + password);
|
|
case EncryptionModeSHATriple:
|
|
return eqcrypt_sha1(eqcrypt_sha1(username) + eqcrypt_sha1(password));
|
|
case EncryptionModeSHA512:
|
|
return eqcrypt_sha512(password);
|
|
case EncryptionModeSHA512PassUser:
|
|
return eqcrypt_sha512(password + ":" + username);
|
|
case EncryptionModeSHA512UserPass:
|
|
return eqcrypt_sha512(username + ":" + password);
|
|
case EncryptionModeSHA512Triple:
|
|
return eqcrypt_sha512(eqcrypt_sha512(username) + eqcrypt_sha512(password));
|
|
#ifdef ENABLE_SECURITY
|
|
case EncryptionModeArgon2:
|
|
return eqcrypt_argon2(password);
|
|
case EncryptionModeSCrypt:
|
|
return eqcrypt_scrypt(password);
|
|
#endif
|
|
//todo bcrypt? pbkdf2?
|
|
default:
|
|
return "";
|
|
break;
|
|
}
|
|
}
|
|
|
|
bool eqcrypt_verify_hash(const std::string &username, const std::string &password, const std::string &pwhash, int mode)
|
|
{
|
|
switch (mode) {
|
|
#ifdef ENABLE_SECURITY
|
|
case 13:
|
|
return crypto_pwhash_str_verify(&pwhash[0], &password[0], password.length()) == 0;
|
|
case 14:
|
|
return crypto_pwhash_scryptsalsa208sha256_str_verify(&pwhash[0], &password[0], password.length()) == 0;
|
|
#endif
|
|
default: {
|
|
auto hash = eqcrypt_hash(username, password, mode);
|
|
return hash.compare(pwhash) == 0;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|