summaryrefslogtreecommitdiff
path: root/src/common/Cryptography/Authentication/SRP6.h
blob: 49f7ce6de09b90e749cddfaef7382d92a7831a67 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
/*
 * This file is part of the AzerothCore Project. See AUTHORS file for Copyright information
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU Affero General Public License as published by the
 * Free Software Foundation; either version 3 of the License, or (at your
 * option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for
 * more details.
 *
 * You should have received a copy of the GNU General Public License along
 * with this program. If not, see <http://www.gnu.org/licenses/>.
 */

#ifndef AZEROTHCORE_SRP6_H
#define AZEROTHCORE_SRP6_H

#include "AuthDefines.h"
#include "BigNumber.h"
#include "Common.h"
#include "CryptoHash.h"
#include "Define.h"
#include <array>
#include <optional>

namespace Acore::Crypto
{
    class SRP6
    {
    public:
        static constexpr size_t SALT_LENGTH = 32;
        using Salt = std::array<uint8, SALT_LENGTH>;
        static constexpr size_t VERIFIER_LENGTH = 32;
        using Verifier = std::array<uint8, VERIFIER_LENGTH>;
        static constexpr size_t EPHEMERAL_KEY_LENGTH = 32;
        using EphemeralKey = std::array<uint8, EPHEMERAL_KEY_LENGTH>;

        static std::array<uint8, 1> const g;
        static std::array<uint8, 32> const N;

        // username + password must be passed through Utf8ToUpperOnlyLatin FIRST!
        static std::pair<Salt, Verifier> MakeRegistrationData(std::string const& username, std::string const& password);
        // username + password must be passed through Utf8ToUpperOnlyLatin FIRST!
        static bool CheckLogin(std::string const& username, std::string const& password, Salt const& salt, Verifier const& verifier)
        {
            return (verifier == CalculateVerifier(username, password, salt));
        }

        static SHA1::Digest GetSessionVerifier(EphemeralKey const& A, SHA1::Digest const& clientM, SessionKey const& K)
        {
            return SHA1::GetDigestOf(A, clientM, K);
        }

        SRP6(std::string const& username, Salt const& salt, Verifier const& verifier);
        std::optional<SessionKey> VerifyChallengeResponse(EphemeralKey const& A, SHA1::Digest const& clientM);

    private:
        bool _used = false; // a single instance can only be used to verify once

        static Verifier CalculateVerifier(std::string const& username, std::string const& password, Salt const& salt);
        static SessionKey SHA1Interleave(EphemeralKey const& S);

        /* global algorithm parameters */
        static BigNumber const _g; // a [g]enerator for the ring of integers mod N, algorithm parameter
        static BigNumber const _N; // the modulus, an algorithm parameter; all operations are mod this

        static EphemeralKey _B(BigNumber const& b, BigNumber const& v) { return ((_g.ModExp(b, _N) + (v * 3)) % N).ToByteArray<EPHEMERAL_KEY_LENGTH>(); }

        /* per-instantiation parameters, set on construction */
        SHA1::Digest const _I; // H(I) - the username, all uppercase
        BigNumber const _b; // b - randomly chosen by the server, 19 bytes, never given out
        BigNumber const _v; // v - the user's password verifier, derived from s + H(USERNAME || ":" || PASSWORD)

    public:
        Salt const s; // s - the user's password salt, random, used to calculate v on registration
        EphemeralKey const B; // B = 3v + g^b
    };
}

#endif