/* * This file is part of the TrinityCore Project. See AUTHORS file for Copyright information * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License along * with this program. If not, see . */ #ifndef TRINITY_SRP6_H #define TRINITY_SRP6_H #include "AuthDefines.h" #include "BigNumber.h" #include "Define.h" #include "Common.h" #include "CryptoHash.h" #include "Optional.h" #include namespace Trinity { namespace Crypto { class TC_COMMON_API SRP6 { public: static constexpr size_t SALT_LENGTH = 32; using Salt = std::array; static constexpr size_t VERIFIER_LENGTH = 32; using Verifier = std::array; static constexpr size_t EPHEMERAL_KEY_LENGTH = 32; using EphemeralKey = std::array; static std::array const g; static std::array const N; // this is the old sha_pass_hash hack // YOU SHOULD NEVER STORE THIS HASH, if you do you are breaking SRP6 guarantees // use MakeRegistrationData instead static std::pair MakeRegistrationDataFromHash_DEPRECATED_DONOTUSE(SHA1::Digest const& hash); // username + password must be passed through Utf8ToUpperOnlyLatin FIRST! static std::pair MakeRegistrationData(std::string const& username, std::string const& password); // username + password must be passed through Utf8ToUpperOnlyLatin FIRST! static bool CheckLogin(std::string const& username, std::string const& password, Salt const& salt, Verifier const& verifier) { return (verifier == CalculateVerifier(username, password, salt)); } static SHA1::Digest GetSessionVerifier(EphemeralKey const& A, SHA1::Digest const& clientM, SessionKey const& K) { return SHA1::GetDigestOf(A, clientM, K); } SRP6(std::string const& username, Salt const& salt, Verifier const& verifier); Optional VerifyChallengeResponse(EphemeralKey const& A, SHA1::Digest const& clientM); private: bool _used = false; // a single instance can only be used to verify once static Verifier CalculateVerifier(std::string const& username, std::string const& password, Salt const& salt); static Verifier CalculateVerifierFromHash(SHA1::Digest const& hash, Salt const& salt); static SessionKey SHA1Interleave(EphemeralKey const& S); /* global algorithm parameters */ static BigNumber const _g; // a [g]enerator for the ring of integers mod N, algorithm parameter static BigNumber const _N; // the modulus, an algorithm parameter; all operations are mod this static EphemeralKey _B(BigNumber const& b, BigNumber const& v) { return ((_g.ModExp(b,_N) + (v * 3)) % N).ToByteArray(); } /* per-instantiation parameters, set on construction */ SHA1::Digest const _I; // H(I) - the username, all uppercase BigNumber const _b; // b - randomly chosen by the server, 19 bytes, never given out BigNumber const _v; // v - the user's password verifier, derived from s + H(USERNAME || ":" || PASSWORD) public: Salt const s; // s - the user's password salt, random, used to calculate v on registration EphemeralKey const B; // B = 3v + g^b }; } } #endif