handshake.rs 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193
  1. use crypto::sha1::Sha1;
  2. use crypto::hmac::Hmac;
  3. use crypto::mac::Mac;use byteorder::{BigEndian, ByteOrder, WriteBytesExt};
  4. use protobuf::{self, Message, MessageStatic};
  5. use rand::thread_rng;
  6. use std::io::{self, Read, Write};
  7. use std::marker::PhantomData;
  8. use tokio_core::io::{Io, Framed, write_all, WriteAll, read_exact, ReadExact, Window};
  9. use futures::{Poll, Async, Future};
  10. use diffie_hellman::DHLocalKeys;
  11. use protocol;
  12. use protocol::keyexchange::{ClientHello, APResponseMessage, ClientResponsePlaintext};
  13. use util;
  14. use super::codec::APCodec;
  15. pub struct Handshake<T> {
  16. keys: DHLocalKeys,
  17. state: HandshakeState<T>,
  18. }
  19. enum HandshakeState<T> {
  20. ClientHello(WriteAll<T, Vec<u8>>),
  21. APResponse(RecvPacket<T, APResponseMessage>),
  22. ClientResponse(Option<APCodec>, WriteAll<T, Vec<u8>>),
  23. }
  24. pub fn handshake<T: Io>(connection: T) -> Handshake<T> {
  25. let local_keys = DHLocalKeys::random(&mut thread_rng());
  26. let client_hello = client_hello(connection, local_keys.public_key());
  27. Handshake {
  28. keys: local_keys,
  29. state: HandshakeState::ClientHello(client_hello),
  30. }
  31. }
  32. impl <T: Io> Future for Handshake<T> {
  33. type Item = Framed<T, APCodec>;
  34. type Error = io::Error;
  35. fn poll(&mut self) -> Poll<Self::Item, io::Error> {
  36. use self::HandshakeState::*;
  37. loop {
  38. self.state = match self.state {
  39. ClientHello(ref mut write) => {
  40. let (connection, accumulator) = try_ready!(write.poll());
  41. let read = recv_packet(connection, accumulator);
  42. APResponse(read)
  43. }
  44. APResponse(ref mut read) => {
  45. let (connection, message, accumulator) = try_ready!(read.poll());
  46. let remote_key = message.get_challenge()
  47. .get_login_crypto_challenge()
  48. .get_diffie_hellman()
  49. .get_gs()
  50. .to_owned();
  51. let shared_secret = self.keys.shared_secret(&remote_key);
  52. let (challenge, send_key, recv_key) = compute_keys(&shared_secret,
  53. &accumulator);
  54. let codec = APCodec::new(&send_key, &recv_key);
  55. let write = client_response(connection, challenge);
  56. ClientResponse(Some(codec), write)
  57. }
  58. ClientResponse(ref mut codec, ref mut write) => {
  59. let (connection, _) = try_ready!(write.poll());
  60. let codec = codec.take().unwrap();
  61. let framed = connection.framed(codec);
  62. return Ok(Async::Ready(framed));
  63. }
  64. }
  65. }
  66. }
  67. }
  68. fn client_hello<T: Write>(connection: T, gc: Vec<u8>) -> WriteAll<T, Vec<u8>> {
  69. let packet = protobuf_init!(ClientHello::new(), {
  70. build_info => {
  71. product: protocol::keyexchange::Product::PRODUCT_PARTNER,
  72. platform: protocol::keyexchange::Platform::PLATFORM_LINUX_X86,
  73. version: 0x10800000000,
  74. },
  75. cryptosuites_supported => [
  76. protocol::keyexchange::Cryptosuite::CRYPTO_SUITE_SHANNON,
  77. ],
  78. login_crypto_hello.diffie_hellman => {
  79. gc: gc,
  80. server_keys_known: 1,
  81. },
  82. client_nonce: util::rand_vec(&mut thread_rng(), 0x10),
  83. padding: vec![0x1e],
  84. });
  85. let mut buffer = vec![0, 4];
  86. let size = 2 + 4 + packet.compute_size();
  87. buffer.write_u32::<BigEndian>(size).unwrap();
  88. packet.write_to_vec(&mut buffer).unwrap();
  89. write_all(connection, buffer)
  90. }
  91. fn client_response<T: Write>(connection: T, challenge: Vec<u8>) -> WriteAll<T, Vec<u8>> {
  92. let packet = protobuf_init!(ClientResponsePlaintext::new(), {
  93. login_crypto_response.diffie_hellman => {
  94. hmac: challenge
  95. },
  96. pow_response => {},
  97. crypto_response => {},
  98. });
  99. let mut buffer = vec![];
  100. let size = 4 + packet.compute_size();
  101. buffer.write_u32::<BigEndian>(size).unwrap();
  102. packet.write_to_vec(&mut buffer).unwrap();
  103. write_all(connection, buffer)
  104. }
  105. enum RecvPacket<T, M: MessageStatic> {
  106. Header(ReadExact<T, Window<Vec<u8>>>, PhantomData<M>),
  107. Body(ReadExact<T, Window<Vec<u8>>>, PhantomData<M>),
  108. }
  109. fn recv_packet<T, M>(connection: T, acc: Vec<u8>) -> RecvPacket<T, M>
  110. where T: Read,
  111. M: MessageStatic
  112. {
  113. RecvPacket::Header(read_into_accumulator(connection, 4, acc), PhantomData)
  114. }
  115. impl <T, M> Future for RecvPacket<T, M>
  116. where T: Read,
  117. M: MessageStatic
  118. {
  119. type Item = (T, M, Vec<u8>);
  120. type Error = io::Error;
  121. fn poll(&mut self) -> Poll<Self::Item, io::Error> {
  122. use self::RecvPacket::*;
  123. loop {
  124. *self = match *self {
  125. Header(ref mut read, _) => {
  126. let (connection, header) = try_ready!(read.poll());
  127. let size = BigEndian::read_u32(header.as_ref()) as usize;
  128. let acc = header.into_inner();
  129. let read = read_into_accumulator(connection, size - 4, acc);
  130. RecvPacket::Body(read, PhantomData)
  131. }
  132. Body(ref mut read, _) => {
  133. let (connection, data) = try_ready!(read.poll());
  134. let message = protobuf::parse_from_bytes(data.as_ref()).unwrap();
  135. let acc = data.into_inner();
  136. return Ok(Async::Ready((connection, message, acc)));
  137. }
  138. }
  139. }
  140. }
  141. }
  142. fn read_into_accumulator<T: Read>(connection: T, size: usize, mut acc: Vec<u8>) -> ReadExact<T, Window<Vec<u8>>> {
  143. let offset = acc.len();
  144. acc.resize(offset + size, 0);
  145. let mut window = Window::new(acc);
  146. window.set_start(offset);
  147. read_exact(connection, window)
  148. }
  149. fn compute_keys(shared_secret: &[u8], packets: &[u8]) -> (Vec<u8>, Vec<u8>, Vec<u8>) {
  150. let mut data = Vec::with_capacity(0x64);
  151. let mut mac = Hmac::new(Sha1::new(), &shared_secret);
  152. for i in 1..6 {
  153. mac.input(packets);
  154. mac.input(&[i]);
  155. data.extend_from_slice(&mac.result().code());
  156. mac.reset();
  157. }
  158. mac = Hmac::new(Sha1::new(), &data[..0x14]);
  159. mac.input(packets);
  160. (mac.result().code().to_vec(), data[0x14..0x34].to_vec(), data[0x34..0x54].to_vec())
  161. }