package com.aionemu.gameserver.network;
import java.nio.ByteBuffer;
/**
* @author cura
*/
public class EncryptionKeyPair {
/**
* keys index to access SERVER encryption key
*
* @see EncryptionKeyPair.keys
*/
private static final int SERVER = 0;
/**
* keys index to access CLIENT encryption key
*
* @see EncryptionKeyPair.keys
*/
private static final int CLIENT = 1;
/**
* Static xor key
*/
private final static byte[] staticKey = "nKO/WctQ0AVLbpzfBkS6NevDYT8ourG5CRlmdjyJ72aswx4EPq1UgZhFMXH?3iI9".getBytes();
/**
* Second byte of client packet must be equal to this
*/
private final static byte staticClientPacketCode = 0x65;
/**
* Base key used to generate client/server keys
*/
private int baseKey = 0;
/**
* Encryption keys
*/
private byte[][] keys = null;
/**
* Date of last key use
*/
private long lastUpdate;
/**
* Initializes client/server encryption keys based on baseKey
*
* @param baseKey
* random integer
*/
public EncryptionKeyPair(int baseKey) {
this.baseKey = baseKey;
this.keys = new byte[2][];
this.keys[SERVER] = new byte[] { (byte) (baseKey & 0xff), (byte) ((baseKey >> 8) & 0xff), (byte) ((baseKey >> 16) & 0xff),
(byte) ((baseKey >> 24) & 0xff), (byte) 0xa1, (byte) 0x6c, (byte) 0x54, (byte) 0x87 };
this.keys[CLIENT] = new byte[this.keys[SERVER].length];
System.arraycopy(this.keys[SERVER], 0, this.keys[CLIENT], 0, this.keys[SERVER].length);
this.lastUpdate = System.currentTimeMillis();
}
/**
* @return the baseKey used to generate the key pair
*/
public int getBaseKey() {
return baseKey;
}
@Override
public String toString() {
StringBuilder sb = new StringBuilder();
sb.append("{client:0x");
for (int i = 0; i < keys[CLIENT].length; i++) {
sb.append(Integer.toHexString(keys[CLIENT][i] & 0xff));
}
sb.append(",server:0x");
for (int i = 0; i < keys[SERVER].length; i++) {
sb.append(Integer.toHexString(keys[SERVER][i] & 0xff));
}
sb.append(",base:0x");
sb.append(Integer.toHexString(baseKey));
sb.append(",update:" + lastUpdate + "}");
return sb.toString();
}
/**
* Check if packet was correctly decoded, also check if packet was correctly coded by aion client
*/
private boolean validateClientPacket(ByteBuffer buf) {
return buf.limit() >= 5 && buf.getShort(0) == ~buf.getShort(3) && buf.get(2) == staticClientPacketCode;
}
/**
* Decrypt client packet from this ByteBuffer If decryption is successful, update client key
*
* @return true if decryption was successful
*/
@SuppressWarnings("lossy-conversions")
public boolean decrypt(ByteBuffer buf) {
final byte[] data = buf.array();
final int size = buf.remaining();
byte[] clientPacketKey = keys[CLIENT];
// index to byte that should be decrypted now
int arrayIndex = buf.arrayOffset() + buf.position();
// prev encrypted byte
int prev = data[arrayIndex];
// decrypt first byte
data[arrayIndex++] ^= (clientPacketKey[0] & 0xff);
// decrypt loop
for (int i = 1; i < size; i++, arrayIndex++) {
int curr = data[arrayIndex] & 0xff;
data[arrayIndex] ^= (staticKey[i & 63] & 0xff) ^ (clientPacketKey[i & 7] & 0xff) ^ prev;
prev = curr;
}
// oldKey value as long
long oldKey = (((long) clientPacketKey[0] & 0xff) << 0) | (((long) clientPacketKey[1] & 0xff) << 8) | (((long) clientPacketKey[2] & 0xff) << 16)
| (((long) clientPacketKey[3] & 0xff) << 24) | (((long) clientPacketKey[4] & 0xff) << 32) | (((long) clientPacketKey[5] & 0xff) << 40)
| (((long) clientPacketKey[6] & 0xff) << 48) | (((long) clientPacketKey[7] & 0xff) << 56);
// change key
oldKey += size;
if (validateClientPacket(buf)) {
// set key new value
clientPacketKey[0] = (byte) (oldKey >> 0 & 0xff);
clientPacketKey[1] = (byte) (oldKey >> 8 & 0xff);
clientPacketKey[2] = (byte) (oldKey >> 16 & 0xff);
clientPacketKey[3] = (byte) (oldKey >> 24 & 0xff);
clientPacketKey[4] = (byte) (oldKey >> 32 & 0xff);
clientPacketKey[5] = (byte) (oldKey >> 40 & 0xff);
clientPacketKey[6] = (byte) (oldKey >> 48 & 0xff);
clientPacketKey[7] = (byte) (oldKey >> 56 & 0xff);
return true;
}
return false;
}
/**
* Encrypt server packet from this ByteBuffer
*/
@SuppressWarnings("lossy-conversions")
public void encrypt(ByteBuffer buf) {
final byte[] data = buf.array();
final int size = buf.remaining();
byte[] serverPacketKey = keys[SERVER];
// index to byte that should be encrypted now
int arrayIndex = buf.arrayOffset() + buf.position();
// encrypt first byte
data[arrayIndex] ^= (serverPacketKey[0] & 0xff);
// prev encrypted byte
int prev = data[arrayIndex++];
// encrypt loop
for (int i = 1; i < size; i++, arrayIndex++) {
data[arrayIndex] ^= (staticKey[i & 63] & 0xff) ^ (serverPacketKey[i & 7] & 0xff) ^ prev;
prev = data[arrayIndex];
}
// oldKey value as long
long oldKey = (((long) serverPacketKey[0] & 0xff) << 0) | (((long) serverPacketKey[1] & 0xff) << 8) | (((long) serverPacketKey[2] & 0xff) << 16)
| (((long) serverPacketKey[3] & 0xff) << 24) | (((long) serverPacketKey[4] & 0xff) << 32) | (((long) serverPacketKey[5] & 0xff) << 40)
| (((long) serverPacketKey[6] & 0xff) << 48) | (((long) serverPacketKey[7] & 0xff) << 56);
// change key
oldKey += size;
// set key new value
serverPacketKey[0] = (byte) (oldKey >> 0 & 0xff);
serverPacketKey[1] = (byte) (oldKey >> 8 & 0xff);
serverPacketKey[2] = (byte) (oldKey >> 16 & 0xff);
serverPacketKey[3] = (byte) (oldKey >> 24 & 0xff);
serverPacketKey[4] = (byte) (oldKey >> 32 & 0xff);
serverPacketKey[5] = (byte) (oldKey >> 40 & 0xff);
serverPacketKey[6] = (byte) (oldKey >> 48 & 0xff);
serverPacketKey[7] = (byte) (oldKey >> 56 & 0xff);
}
}