32 |
|
|
33 |
/* Generate a session key and RC4 keys, given client and server randoms */ |
/* Generate a session key and RC4 keys, given client and server randoms */ |
34 |
static void |
static void |
35 |
licence_generate_keys(uint8 *client_key, uint8 *server_key, uint8 *client_rsa) |
licence_generate_keys(uint8 * client_key, uint8 * server_key, |
36 |
|
uint8 * client_rsa) |
37 |
{ |
{ |
38 |
uint8 session_key[48]; |
uint8 session_key[48]; |
39 |
uint8 temp_hash[48]; |
uint8 temp_hash[48]; |
50 |
} |
} |
51 |
|
|
52 |
static void |
static void |
53 |
licence_generate_hwid(uint8 *hwid) |
licence_generate_hwid(uint8 * hwid) |
54 |
{ |
{ |
55 |
buf_out_uint32(hwid, 2); |
buf_out_uint32(hwid, 2); |
56 |
strncpy(hwid + 4, hostname, LICENCE_HWID_SIZE - 4); |
strncpy(hwid + 4, hostname, LICENCE_HWID_SIZE - 4); |
58 |
|
|
59 |
/* Present an existing licence to the server */ |
/* Present an existing licence to the server */ |
60 |
static void |
static void |
61 |
licence_present(uint8 *client_random, uint8 *rsa_data, |
licence_present(uint8 * client_random, uint8 * rsa_data, |
62 |
uint8 *licence_data, int licence_size, |
uint8 * licence_data, int licence_size, |
63 |
uint8 *hwid, uint8 *signature) |
uint8 * hwid, uint8 * signature) |
64 |
{ |
{ |
65 |
uint32 sec_flags = SEC_LICENCE_NEG; |
uint32 sec_flags = SEC_LICENCE_NEG; |
66 |
uint16 length = 16 + SEC_RANDOM_SIZE + SEC_MODULUS_SIZE + SEC_PADDING_SIZE |
uint16 length = |
67 |
+ licence_size + LICENCE_HWID_SIZE + LICENCE_SIGNATURE_SIZE; |
16 + SEC_RANDOM_SIZE + SEC_MODULUS_SIZE + SEC_PADDING_SIZE + |
68 |
|
licence_size + LICENCE_HWID_SIZE + LICENCE_SIGNATURE_SIZE; |
69 |
STREAM s; |
STREAM s; |
70 |
|
|
71 |
s = sec_init(sec_flags, length + 4); |
s = sec_init(sec_flags, length + 4); |
99 |
|
|
100 |
/* Send a licence request packet */ |
/* Send a licence request packet */ |
101 |
static void |
static void |
102 |
licence_send_request(uint8 *client_random, uint8 *rsa_data, |
licence_send_request(uint8 * client_random, uint8 * rsa_data, |
103 |
char *user, char *host) |
char *user, char *host) |
104 |
{ |
{ |
105 |
uint32 sec_flags = SEC_LICENCE_NEG; |
uint32 sec_flags = SEC_LICENCE_NEG; |
158 |
licence_size = load_licence(&licence_data); |
licence_size = load_licence(&licence_data); |
159 |
if (licence_size == -1) |
if (licence_size == -1) |
160 |
{ |
{ |
161 |
licence_send_request(null_data, null_data, username, hostname); |
licence_send_request(null_data, null_data, username, |
162 |
|
hostname); |
163 |
return; |
return; |
164 |
} |
} |
165 |
|
|
172 |
RC4(&crypt_key, sizeof(hwid), hwid, hwid); |
RC4(&crypt_key, sizeof(hwid), hwid, hwid); |
173 |
|
|
174 |
licence_present(null_data, null_data, licence_data, licence_size, |
licence_present(null_data, null_data, licence_data, licence_size, |
175 |
hwid, signature); |
hwid, signature); |
176 |
xfree(licence_data); |
xfree(licence_data); |
177 |
} |
} |
178 |
|
|
179 |
/* Send an authentication response packet */ |
/* Send an authentication response packet */ |
180 |
static void |
static void |
181 |
licence_send_authresp(uint8 *token, uint8 *crypt_hwid, uint8 *signature) |
licence_send_authresp(uint8 * token, uint8 * crypt_hwid, uint8 * signature) |
182 |
{ |
{ |
183 |
uint32 sec_flags = SEC_LICENCE_NEG; |
uint32 sec_flags = SEC_LICENCE_NEG; |
184 |
uint16 length = 58; |
uint16 length = 58; |
205 |
|
|
206 |
/* Parse an authentication request packet */ |
/* Parse an authentication request packet */ |
207 |
static BOOL |
static BOOL |
208 |
licence_parse_authreq(STREAM s, uint8 **token, uint8 **signature) |
licence_parse_authreq(STREAM s, uint8 ** token, uint8 ** signature) |
209 |
{ |
{ |
210 |
uint16 tokenlen; |
uint16 tokenlen; |
211 |
|
|
283 |
return; |
return; |
284 |
|
|
285 |
licence_issued = True; |
licence_issued = True; |
286 |
save_licence(s->p, length-2); |
save_licence(s->p, length - 2); |
287 |
} |
} |
288 |
|
|
289 |
/* Process a licence packet */ |
/* Process a licence packet */ |