PSO2SERVER/Server/Packets/Handlers/11-ClientHandler/11-0B-KeyExchange.cs

86 lines
2.8 KiB
C#
Raw Normal View History

2024-09-10 00:31:40 +08:00
using System;
using System.IO;
using System.Security.Cryptography;
2024-09-10 01:13:20 +08:00
using PSO2SERVER.Crypto;
2024-09-10 00:31:40 +08:00
2024-09-10 01:13:20 +08:00
namespace PSO2SERVER.Packets.Handlers
2024-09-10 00:31:40 +08:00
{
2024-09-16 02:56:02 +08:00
[PacketHandlerAttr(0x11, 0x0B)]
2024-09-10 00:31:40 +08:00
public class KeyExchange : PacketHandler
{
#region implemented abstract members of PacketHandler
public override void HandlePacket(Client context, byte flags, byte[] data, uint position, uint size)
{
if (context.InputArc4 != null)
return;
if (size < 0x80)
return;
// Extract the first 0x80 bytes into a separate array
var cryptedBlob = new byte[0x80];
2024-09-12 02:14:42 +08:00
var rsaBlob = File.ReadAllBytes(ServerApp.ServerPrivateKeyBlob);
2024-09-10 12:58:38 +08:00
2024-09-10 00:31:40 +08:00
Array.Copy(data, position, cryptedBlob, 0, 0x80);
Array.Reverse(cryptedBlob);
2024-09-10 12:58:38 +08:00
// Print the contents of cryptedBlob in hexadecimal format
//var info = string.Format("[<--] 接收到的数据 (hex): ");
2024-09-12 02:14:42 +08:00
//Logger.WriteHex(info, cryptedBlob);
2024-09-10 12:58:38 +08:00
2024-09-12 02:14:42 +08:00
//// Convert cryptedBlob to a hexadecimal string
//var hexString = BitConverter.ToString(cryptedBlob).Replace("-", "");
2024-09-11 16:33:10 +08:00
2024-09-12 02:14:42 +08:00
//// Save the hexadecimal string to a text file
//File.WriteAllText("cryptedBlob.txt", hexString);
2024-09-11 16:33:10 +08:00
2024-09-10 00:31:40 +08:00
// FIXME
if (Client.RsaCsp == null)
{
Client.RsaCsp = new RSACryptoServiceProvider();
Client.RsaCsp.ImportCspBlob(rsaBlob);
}
var pkcs = new RSAPKCS1KeyExchangeDeformatter(Client.RsaCsp);
byte[] decryptedBlob;
try
{
decryptedBlob = pkcs.DecryptKeyExchange(cryptedBlob);
}
catch (CryptographicException ex)
{
Logger.WriteException("解密RSA密钥交换时发生错误", ex);
context.Socket.Close();
return;
}
2024-09-11 00:44:21 +08:00
2024-09-10 00:31:40 +08:00
// Also a failure.
if (decryptedBlob.Length < 0x20)
return;
// Extract the RC4 key
var arc4Key = new byte[16];
Array.Copy(decryptedBlob, 0x10, arc4Key, 0, 0x10);
// Create three RC4 mungers
var arc4 = new Arc4Managed {Key = arc4Key};
context.InputArc4 = arc4.CreateDecryptor();
arc4 = new Arc4Managed {Key = arc4Key};
context.OutputArc4 = arc4.CreateEncryptor();
arc4 = new Arc4Managed {Key = arc4Key};
var tempDecryptor = arc4.CreateDecryptor();
// Also, grab the init token for the client
var decryptedToken = new byte[16];
tempDecryptor.TransformBlock(decryptedBlob, 0, 0x10, decryptedToken, 0);
2024-09-16 15:30:00 +08:00
context.SendPacket(0x11, 0x0C, 0, decryptedToken);
2024-09-10 00:31:40 +08:00
}
#endregion
}
}