692afbca68
git-svn-id: http://mc-server.googlecode.com/svn/trunk@835 0a769ca7-a7f5-676a-18bf-c427514a06d6
1147 lines
30 KiB
C++
1147 lines
30 KiB
C++
|
|
// Connection.cpp
|
|
|
|
// Interfaces to the cConnection class representing a single pair of connected sockets
|
|
|
|
#include "Globals.h"
|
|
#include "Connection.h"
|
|
#include "Server.h"
|
|
#include <iostream>
|
|
|
|
|
|
|
|
|
|
|
|
#define HANDLE_CLIENT_PACKET_READ(Proc, Type, Var) \
|
|
Type Var; \
|
|
{ \
|
|
if (!m_ClientBuffer.Proc(Var)) \
|
|
{ \
|
|
return false; \
|
|
} \
|
|
}
|
|
|
|
#define HANDLE_SERVER_PACKET_READ(Proc, Type, Var) \
|
|
Type Var; \
|
|
{ \
|
|
if (!m_ServerBuffer.Proc(Var)) \
|
|
{ \
|
|
return false; \
|
|
} \
|
|
}
|
|
|
|
#define CLIENTSEND(...) SendData(m_ClientSocket, __VA_ARGS__, "Client")
|
|
#define SERVERSEND(...) SendData(m_ServerSocket, __VA_ARGS__, "Server")
|
|
#define CLIENTENCRYPTSEND(...) SendEncryptedData(m_ClientSocket, m_ClientEncryptor, __VA_ARGS__, "Client")
|
|
#define SERVERENCRYPTSEND(...) SendEncryptedData(m_ServerSocket, m_ServerEncryptor, __VA_ARGS__, "Server")
|
|
|
|
#define COPY_TO_SERVER() \
|
|
{ \
|
|
AString ToServer; \
|
|
m_ClientBuffer.ReadAgain(ToServer); \
|
|
if (m_ServerState == csUnencrypted) \
|
|
{ \
|
|
SERVERSEND(ToServer.data(), ToServer.size()); \
|
|
} \
|
|
else \
|
|
{ \
|
|
SERVERENCRYPTSEND(ToServer.data(), ToServer.size()); \
|
|
} \
|
|
}
|
|
|
|
#define COPY_TO_CLIENT() \
|
|
{ \
|
|
AString ToClient; \
|
|
m_ServerBuffer.ReadAgain(ToClient); \
|
|
if (m_ClientState == csUnencrypted) \
|
|
{ \
|
|
CLIENTSEND(ToClient.data(), ToClient.size()); \
|
|
} \
|
|
else \
|
|
{ \
|
|
CLIENTENCRYPTSEND(ToClient.data(), ToClient.size()); \
|
|
} \
|
|
}
|
|
|
|
#define HANDLE_CLIENT_READ(Proc) \
|
|
{ \
|
|
if (!Proc()) \
|
|
{ \
|
|
m_ClientBuffer.ResetRead(); \
|
|
return true; \
|
|
} \
|
|
}
|
|
|
|
#define HANDLE_SERVER_READ(Proc) \
|
|
{ \
|
|
if (!Proc()) \
|
|
{ \
|
|
m_ServerBuffer.ResetRead(); \
|
|
return true; \
|
|
} \
|
|
}
|
|
|
|
|
|
#define MAX_ENC_LEN 1024
|
|
|
|
|
|
|
|
|
|
typedef unsigned char Byte;
|
|
|
|
|
|
|
|
|
|
|
|
enum
|
|
{
|
|
PACKET_KEEPALIVE = 0x00,
|
|
PACKET_LOGIN = 0x01,
|
|
PACKET_HANDSHAKE = 0x02,
|
|
PACKET_CHAT_MESSAGE = 0x03,
|
|
PACKET_TIME_UPDATE = 0x04,
|
|
PACKET_ENTITY_EQUIPMENT = 0x05,
|
|
PACKET_COMPASS = 0x06,
|
|
PACKET_UPDATE_HEALTH = 0x08,
|
|
PACKET_PLAYER_ON_GROUND = 0x0a,
|
|
PACKET_PLAYER_POSITION = 0x0b,
|
|
PACKET_PLAYER_LOOK = 0x0c,
|
|
PACKET_PLAYER_POSITION_LOOK = 0x0d,
|
|
PACKET_MAP_CHUNK = 0x33,
|
|
PACKET_WINDOW_CONTENTS = 0x68,
|
|
PACKET_PLAYER_LIST_ITEM = 0xc9,
|
|
PACKET_PLAYER_ABILITIES = 0xca,
|
|
PACKET_LOCALE_AND_VIEW = 0xcc,
|
|
PACKET_CLIENT_STATUSES = 0xcd,
|
|
PACKET_ENCRYPTION_KEY_RESPONSE = 0xfc,
|
|
PACKET_ENCRYPTION_KEY_REQUEST = 0xfd,
|
|
PACKET_PING = 0xfe,
|
|
PACKET_KICK = 0xff,
|
|
} ;
|
|
|
|
|
|
|
|
|
|
|
|
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
// cConnection:
|
|
|
|
cConnection::cConnection(SOCKET a_ClientSocket, cServer & a_Server) :
|
|
m_Server(a_Server),
|
|
m_LogFile(NULL),
|
|
m_ClientSocket(a_ClientSocket),
|
|
m_ServerSocket(-1),
|
|
m_BeginTick(clock()),
|
|
m_ClientState(csUnencrypted),
|
|
m_ServerState(csUnencrypted),
|
|
m_ClientBuffer(1024 KiB),
|
|
m_ServerBuffer(1024 KiB),
|
|
m_Nonce(0)
|
|
{
|
|
AString fnam;
|
|
Printf(fnam, "Log_%d.log", (int)time(NULL));
|
|
m_LogFile = fopen(fnam.c_str(), "w");
|
|
Log("Log file created");
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
cConnection::~cConnection()
|
|
{
|
|
fclose(m_LogFile);
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void cConnection::Run(void)
|
|
{
|
|
if (!ConnectToServer())
|
|
{
|
|
Log("Cannot connect to server; aborting");
|
|
return;
|
|
}
|
|
|
|
while (true)
|
|
{
|
|
fd_set ReadFDs;
|
|
FD_ZERO(&ReadFDs);
|
|
FD_SET(m_ServerSocket, &ReadFDs);
|
|
FD_SET(m_ClientSocket, &ReadFDs);
|
|
int res = select(2, &ReadFDs, NULL, NULL, NULL);
|
|
if (res <= 0)
|
|
{
|
|
printf("select() failed: %d; aborting client", WSAGetLastError());
|
|
break;
|
|
}
|
|
if (FD_ISSET(m_ServerSocket, &ReadFDs))
|
|
{
|
|
if (!RelayFromServer())
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
if (FD_ISSET(m_ClientSocket, &ReadFDs))
|
|
{
|
|
if (!RelayFromClient())
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
Log("Relaying ended, closing sockets");
|
|
closesocket(m_ServerSocket);
|
|
closesocket(m_ClientSocket);
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void cConnection::Log(const char * a_Format, ...)
|
|
{
|
|
va_list args;
|
|
va_start(args, a_Format);
|
|
AString msg;
|
|
AppendVPrintf(msg, a_Format, args);
|
|
va_end(args);
|
|
AString FullMsg;
|
|
Printf(FullMsg, "[%5.3f] %s\n", GetRelativeTime(), msg.c_str());
|
|
|
|
// Log to file:
|
|
cCSLock Lock(m_CSLog);
|
|
fputs(FullMsg.c_str(), m_LogFile);
|
|
|
|
// Log to screen:
|
|
std::cout << FullMsg;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void cConnection::DataLog(const void * a_Data, int a_Size, const char * a_Format, ...)
|
|
{
|
|
va_list args;
|
|
va_start(args, a_Format);
|
|
AString msg;
|
|
AppendVPrintf(msg, a_Format, args);
|
|
va_end(args);
|
|
AString FullMsg;
|
|
AString Hex;
|
|
Printf(FullMsg, "[%5.3f] %s\n%s\n", GetRelativeTime(), msg.c_str(), CreateHexDump(Hex, a_Data, a_Size, 16).c_str());
|
|
|
|
// Log to file:
|
|
cCSLock Lock(m_CSLog);
|
|
fputs(FullMsg.c_str(), m_LogFile);
|
|
|
|
/*
|
|
// Log to screen:
|
|
std::cout << FullMsg;
|
|
//*/
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::ConnectToServer(void)
|
|
{
|
|
m_ServerSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
|
if (m_ServerSocket == INVALID_SOCKET)
|
|
{
|
|
return false;
|
|
}
|
|
sockaddr_in localhost;
|
|
localhost.sin_family = AF_INET;
|
|
localhost.sin_port = htons(m_Server.GetConnectPort());
|
|
localhost.sin_addr.s_addr = htonl(0x7f000001); // localhost
|
|
if (connect(m_ServerSocket, (sockaddr *)&localhost, sizeof(localhost)) != 0)
|
|
{
|
|
printf("connection to server failed: %d\n", WSAGetLastError());
|
|
return false;
|
|
}
|
|
Log("Connected to SERVER");
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::RelayFromServer(void)
|
|
{
|
|
char Buffer[64 KiB];
|
|
int res = recv(m_ServerSocket, Buffer, sizeof(Buffer), 0);
|
|
if (res <= 0)
|
|
{
|
|
Log("Server closed the socket: %d; %d; aborting connection", res, WSAGetLastError());
|
|
return false;
|
|
}
|
|
|
|
DataLog(Buffer, res, "Received %d bytes from the SERVER", res);
|
|
|
|
switch (m_ServerState)
|
|
{
|
|
case csUnencrypted:
|
|
{
|
|
return DecodeServersPackets(Buffer, res);
|
|
}
|
|
case csEncryptedUnderstood:
|
|
{
|
|
m_ServerDecryptor.ProcessData((byte *)Buffer, (byte *)Buffer, res);
|
|
DataLog(Buffer, res, "Decrypted %d bytes from the SERVER", res);
|
|
return DecodeServersPackets(Buffer, res);
|
|
}
|
|
case csEncryptedUnknown:
|
|
{
|
|
m_ServerDecryptor.ProcessData((byte *)Buffer, (byte *)Buffer, res);
|
|
DataLog(Buffer, res, "Decrypted %d bytes from the SERVER", res);
|
|
m_ClientEncryptor.ProcessData((byte *)Buffer, (byte *)Buffer, res);
|
|
return CLIENTSEND(Buffer, res);
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::RelayFromClient(void)
|
|
{
|
|
char Buffer[64 KiB];
|
|
int res = recv(m_ClientSocket, Buffer, sizeof(Buffer), 0);
|
|
if (res <= 0)
|
|
{
|
|
Log("Client closed the socket: %d; %d; aborting connection", res, WSAGetLastError());
|
|
return false;
|
|
}
|
|
|
|
DataLog(Buffer, res, "Received %d bytes from the CLIENT", res);
|
|
|
|
switch (m_ClientState)
|
|
{
|
|
case csUnencrypted:
|
|
{
|
|
return DecodeClientsPackets(Buffer, res);
|
|
}
|
|
case csEncryptedUnderstood:
|
|
{
|
|
m_ClientDecryptor.ProcessData((byte *)Buffer, (byte *)Buffer, res);
|
|
DataLog(Buffer, res, "Decrypted %d bytes from the CLIENT", res);
|
|
return DecodeClientsPackets(Buffer, res);
|
|
}
|
|
case csEncryptedUnknown:
|
|
{
|
|
m_ClientDecryptor.ProcessData((byte *)Buffer, (byte *)Buffer, res);
|
|
DataLog(Buffer, res, "Decrypted %d bytes from the CLIENT", res);
|
|
m_ServerEncryptor.ProcessData((byte *)Buffer, (byte *)Buffer, res);
|
|
return SERVERSEND(Buffer, res);
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
double cConnection::GetRelativeTime(void)
|
|
{
|
|
return (double)(clock() - m_BeginTick) / CLOCKS_PER_SEC;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::SendData(SOCKET a_Socket, const char * a_Data, int a_Size, const char * a_Peer)
|
|
{
|
|
DataLog(a_Data, a_Size, "Sending data to %s", a_Peer);
|
|
|
|
int res = send(a_Socket, a_Data, a_Size, 0);
|
|
if (res <= 0)
|
|
{
|
|
Log("%s closed the socket: %d, %d; aborting connection", a_Peer, res, WSAGetLastError());
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::SendData(SOCKET a_Socket, cByteBuffer & a_Data, const char * a_Peer)
|
|
{
|
|
AString All;
|
|
a_Data.ReadAll(All);
|
|
a_Data.CommitRead();
|
|
return SendData(a_Socket, All.data(), All.size(), a_Peer);
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::SendEncryptedData(SOCKET a_Socket, Encryptor & a_Encryptor, const char * a_Data, int a_Size, const char * a_Peer)
|
|
{
|
|
DataLog(a_Data, a_Size, "Encrypting %d bytes to %s", a_Size, a_Peer);
|
|
const byte * Data = (const byte *)a_Data;
|
|
while (a_Size > 0)
|
|
{
|
|
byte Buffer[64 KiB];
|
|
int NumBytes = (a_Size > sizeof(Buffer)) ? sizeof(Buffer) : a_Size;
|
|
a_Encryptor.ProcessData(Buffer, Data, NumBytes);
|
|
bool res = SendData(a_Socket, (const char *)Buffer, NumBytes, a_Peer);
|
|
if (!res)
|
|
{
|
|
return false;
|
|
}
|
|
Data += NumBytes;
|
|
a_Size -= NumBytes;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::SendEncryptedData(SOCKET a_Socket, Encryptor & a_Encryptor, cByteBuffer & a_Data, const char * a_Peer)
|
|
{
|
|
AString All;
|
|
a_Data.ReadAll(All);
|
|
a_Data.CommitRead();
|
|
return SendEncryptedData(a_Socket, a_Encryptor, All.data(), All.size(), a_Peer);
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::DecodeClientsPackets(const char * a_Data, int a_Size)
|
|
{
|
|
if (!m_ClientBuffer.Write(a_Data, a_Size))
|
|
{
|
|
Log("Too much queued data for the server, aborting connection");
|
|
return false;
|
|
}
|
|
|
|
while (m_ClientBuffer.CanReadBytes(1))
|
|
{
|
|
Log("Decoding client's packets, there are now %d bytes in the queue", m_ClientBuffer.GetReadableSpace());
|
|
unsigned char PacketType;
|
|
m_ClientBuffer.ReadByte(PacketType);
|
|
switch (PacketType)
|
|
{
|
|
case PACKET_CLIENT_STATUSES: HANDLE_CLIENT_READ(HandleClientClientStatuses); break;
|
|
case PACKET_ENCRYPTION_KEY_RESPONSE: HANDLE_CLIENT_READ(HandleClientEncryptionKeyResponse); break;
|
|
case PACKET_HANDSHAKE: HANDLE_CLIENT_READ(HandleClientHandshake); break;
|
|
case PACKET_LOCALE_AND_VIEW: HANDLE_CLIENT_READ(HandleClientLocaleAndView); break;
|
|
case PACKET_PING: HANDLE_CLIENT_READ(HandleClientPing); break;
|
|
case PACKET_PLAYER_LOOK: HANDLE_CLIENT_READ(HandleClientPlayerLook); break;
|
|
case PACKET_PLAYER_ON_GROUND: HANDLE_CLIENT_READ(HandleClientPlayerOnGround); break;
|
|
case PACKET_PLAYER_POSITION: HANDLE_CLIENT_READ(HandleClientPlayerPosition); break;
|
|
case PACKET_PLAYER_POSITION_LOOK: HANDLE_CLIENT_READ(HandleClientPlayerPositionLook); break;
|
|
default:
|
|
{
|
|
if (m_ClientState == csEncryptedUnderstood)
|
|
{
|
|
Log("Unknown packet 0x%02x from the client while encrypted; continuing to relay blind only", PacketType);
|
|
AString Data;
|
|
m_ClientBuffer.ResetRead();
|
|
m_ClientBuffer.ReadAll(Data);
|
|
DataLog(Data.data(), Data.size(), "Current data in the client packet queue: %d bytes", Data.size());
|
|
m_ClientState = csEncryptedUnknown;
|
|
m_ClientBuffer.ResetRead();
|
|
if (m_ServerState == csUnencrypted)
|
|
{
|
|
SERVERSEND(m_ClientBuffer);
|
|
}
|
|
else
|
|
{
|
|
SERVERENCRYPTSEND(m_ClientBuffer);
|
|
}
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
Log("Unknown packet 0x%02x from the client while unencrypted; aborting connection", PacketType);
|
|
return false;
|
|
}
|
|
}
|
|
} // switch (PacketType)
|
|
m_ClientBuffer.CommitRead();
|
|
} // while (CanReadBytes(1))
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::DecodeServersPackets(const char * a_Data, int a_Size)
|
|
{
|
|
if (!m_ServerBuffer.Write(a_Data, a_Size))
|
|
{
|
|
Log("Too much queued data for the client, aborting connection");
|
|
return false;
|
|
}
|
|
|
|
if (
|
|
(m_ServerState == csEncryptedUnderstood) &&
|
|
(m_ClientState == csUnencrypted)
|
|
)
|
|
{
|
|
// Client hasn't finished encryption handshake yet, don't send them any data yet
|
|
}
|
|
|
|
while (m_ServerBuffer.CanReadBytes(1))
|
|
{
|
|
Log("Decoding server's packets, there are now %d bytes in the queue", m_ServerBuffer.GetReadableSpace());
|
|
unsigned char PacketType;
|
|
m_ServerBuffer.ReadByte(PacketType);
|
|
switch (PacketType)
|
|
{
|
|
case PACKET_CHAT_MESSAGE: HANDLE_SERVER_READ(HandleServerChatMessage); break;
|
|
case PACKET_COMPASS: HANDLE_SERVER_READ(HandleServerCompass); break;
|
|
case PACKET_ENCRYPTION_KEY_REQUEST: HANDLE_SERVER_READ(HandleServerEncryptionKeyRequest); break;
|
|
case PACKET_ENCRYPTION_KEY_RESPONSE: HANDLE_SERVER_READ(HandleServerEncryptionKeyResponse); break;
|
|
case PACKET_ENTITY_EQUIPMENT: HANDLE_SERVER_READ(HandleServerEntityEquipment); break;
|
|
case PACKET_KEEPALIVE: HANDLE_SERVER_READ(HandleServerKeepAlive); break;
|
|
case PACKET_KICK: HANDLE_SERVER_READ(HandleServerKick); break;
|
|
case PACKET_LOGIN: HANDLE_SERVER_READ(HandleServerLogin); break;
|
|
case PACKET_MAP_CHUNK: HANDLE_SERVER_READ(HandleServerMapChunk); break;
|
|
case PACKET_PLAYER_ABILITIES: HANDLE_SERVER_READ(HandleServerPlayerAbilities); break;
|
|
case PACKET_PLAYER_LIST_ITEM: HANDLE_SERVER_READ(HandleServerPlayerListItem); break;
|
|
case PACKET_PLAYER_POSITION_LOOK: HANDLE_SERVER_READ(HandleServerPlayerPositionLook); break;
|
|
case PACKET_TIME_UPDATE: HANDLE_SERVER_READ(HandleServerTimeUpdate); break;
|
|
case PACKET_UPDATE_HEALTH: HANDLE_SERVER_READ(HandleServerUpdateHealth); break;
|
|
case PACKET_WINDOW_CONTENTS: HANDLE_SERVER_READ(HandleServerWindowContents); break;
|
|
default:
|
|
{
|
|
if (m_ServerState == csEncryptedUnderstood)
|
|
{
|
|
Log("Unknown packet 0x%02x from the server while encrypted; continuing to relay blind only", PacketType);
|
|
AString Data;
|
|
m_ServerBuffer.ResetRead();
|
|
m_ServerBuffer.ReadAll(Data);
|
|
DataLog(Data.data(), Data.size(), "Current data in the server packet queue: %d bytes", Data.size());
|
|
m_ServerState = csEncryptedUnknown;
|
|
m_ServerBuffer.ResetRead();
|
|
if (m_ClientState == csUnencrypted)
|
|
{
|
|
CLIENTSEND(m_ServerBuffer);
|
|
}
|
|
else
|
|
{
|
|
CLIENTENCRYPTSEND(m_ServerBuffer);
|
|
}
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
Log("Unknown packet 0x%02x from the server while unencrypted; aborting connection", PacketType);
|
|
return false;
|
|
}
|
|
}
|
|
} // switch (PacketType)
|
|
m_ServerBuffer.CommitRead();
|
|
} // while (CanReadBytes(1))
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientClientStatuses(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, Statuses);
|
|
Log("Received a PACKET_CLIENT_STATUSES from the CLIENT:");
|
|
Log(" Statuses = %d", Statuses);
|
|
|
|
COPY_TO_SERVER();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientEncryptionKeyResponse(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEShort, short, EncKeyLength);
|
|
AString EncKey;
|
|
if (!m_ClientBuffer.ReadString(EncKey, EncKeyLength))
|
|
{
|
|
return true;
|
|
}
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEShort, short, EncNonceLength);
|
|
AString EncNonce;
|
|
if (!m_ClientBuffer.ReadString(EncNonce, EncNonceLength))
|
|
{
|
|
return true;
|
|
}
|
|
if ((EncKeyLength > MAX_ENC_LEN) || (EncNonceLength > MAX_ENC_LEN))
|
|
{
|
|
Log("Client: Too long encryption params");
|
|
return true;
|
|
}
|
|
StartClientEncryption(EncKey, EncNonce);
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientHandshake(void)
|
|
{
|
|
// Read the packet from the client:
|
|
HANDLE_CLIENT_PACKET_READ(ReadByte, Byte, ProtocolVersion);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEUTF16String16, AString, Username);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEUTF16String16, AString, ServerHost);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEInt, int, ServerPort);
|
|
m_ClientBuffer.CommitRead();
|
|
|
|
// Send the same packet to the server, but with our port:
|
|
cByteBuffer ToServer(512);
|
|
ToServer.WriteByte (PACKET_HANDSHAKE);
|
|
ToServer.WriteByte (ProtocolVersion);
|
|
ToServer.WriteBEUTF16String16(Username);
|
|
ToServer.WriteBEUTF16String16(ServerHost);
|
|
ToServer.WriteBEInt (m_Server.GetConnectPort());
|
|
SERVERSEND(ToServer);
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientLocaleAndView(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEUTF16String16, AString, Locale);
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, ViewDistance);
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, ChatFlags);
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, Difficulty);
|
|
Log("Received a PACKET_LOCALE_AND_VIEW from the client");
|
|
COPY_TO_SERVER();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientPing(void)
|
|
{
|
|
Log("Received a PACKET_PING from the client");
|
|
m_ClientBuffer.ResetRead();
|
|
SERVERSEND(m_ClientBuffer);
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientPlayerLook(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEFloat, float, Yaw);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEFloat, float, Pitch);
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, OnGround);
|
|
Log("Received a PACKET_PLAYER_LOOK from the client");
|
|
COPY_TO_SERVER();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientPlayerOnGround(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, OnGround);
|
|
Log("Received a PACKET_PLAYER_ON_GROUND from the client");
|
|
COPY_TO_SERVER();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientPlayerPosition(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, PosX);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, Stance);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, PosY);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, PosZ);
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, IsOnGround);
|
|
Log("Received a PACKET_PLAYER_POSITION from the client");
|
|
|
|
// TODO: list packet contents
|
|
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleClientPlayerPositionLook(void)
|
|
{
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, PosX);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, Stance);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, PosY);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEDouble, double, PosZ);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEFloat, float, Yaw);
|
|
HANDLE_CLIENT_PACKET_READ(ReadBEFloat, float, Pitch);
|
|
HANDLE_CLIENT_PACKET_READ(ReadChar, char, IsOnGround);
|
|
Log("Received a PACKET_PLAYER_POSITION_LOOK from the client");
|
|
|
|
// TODO: list packet contents
|
|
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerChatMessage(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEUTF16String16, AString, Message);
|
|
Log("Received a PACKET_CHAT_MESSAGE from the server:");
|
|
Log(" Message = \"%s\"", Message);
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerCompass(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, SpawnX);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, SpawnY);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, SpawnZ);
|
|
Log("Received PACKET_COMPASS from the server:");
|
|
Log(" Spawn = {%d, %d, %d}", SpawnX, SpawnY, SpawnZ);
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerEncryptionKeyRequest(void)
|
|
{
|
|
// Read the packet from the server:
|
|
HANDLE_SERVER_PACKET_READ(ReadBEUTF16String16, AString, ServerID);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, PublicKeyLength);
|
|
AString PublicKey;
|
|
if (!m_ServerBuffer.ReadString(PublicKey, PublicKeyLength))
|
|
{
|
|
return false;
|
|
}
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, NonceLength);
|
|
AString Nonce;
|
|
if (!m_ServerBuffer.ReadString(Nonce, NonceLength))
|
|
{
|
|
return false;
|
|
}
|
|
Log("Got PACKET_ENCRYPTION_KEY_REQUEST from the SERVER:");
|
|
Log(" ServerID = %s", ServerID.c_str());
|
|
|
|
// Reply to the server:
|
|
SendEncryptionKeyResponse(PublicKey, Nonce);
|
|
|
|
// Send a 0xFD Encryption Key Request http://wiki.vg/Protocol#0xFD to the client, using our own key:
|
|
Log("Sending PACKET_ENCRYPTION_KEY_REQUEST to the CLIENT");
|
|
AString key;
|
|
StringSink sink(key); // GCC won't allow inline instantiation in the following line, damned temporary refs
|
|
m_Server.GetPublicKey().Save(sink);
|
|
cByteBuffer ToClient(512);
|
|
ToClient.WriteByte (PACKET_ENCRYPTION_KEY_REQUEST);
|
|
ToClient.WriteBEUTF16String16(ServerID);
|
|
ToClient.WriteBEShort ((short)key.size());
|
|
ToClient.WriteBuf (key.data(), key.size());
|
|
ToClient.WriteBEShort (4);
|
|
ToClient.WriteBEInt (m_Nonce); // Using 'this' as the cryptographic nonce, so that we don't have to generate one each time :)
|
|
CLIENTSEND(ToClient);
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerEntityEquipment(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, EntityID);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, SlotNum);
|
|
AString Item;
|
|
if (!ParseSlot(m_ServerBuffer, Item))
|
|
{
|
|
return false;
|
|
}
|
|
Log("Received a PACKET_ENTITY_EQUIPMENT from the server:");
|
|
Log(" EntityID = %d", EntityID);
|
|
Log(" SlotNum = %d", SlotNum);
|
|
Log(" Item = %s", Item.c_str());
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerKeepAlive(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, PingID);
|
|
Log("Received a PACKET_KEEP_ALIVE from the server:");
|
|
Log(" ID = %d", PingID);
|
|
COPY_TO_CLIENT()
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerEncryptionKeyResponse(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, Lengths);
|
|
if (Lengths != 0)
|
|
{
|
|
Log("Lengths are not zero!");
|
|
return true;
|
|
}
|
|
Log("Server communication is now encrypted");
|
|
m_ServerState = csEncryptedUnderstood;
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerKick(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEUTF16String16, AString, Reason);
|
|
Log("Received PACKET_KICK from the SERVER:");
|
|
Log(" Reason = \"%s\"", Reason.c_str());
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerLogin(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, EntityID);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEUTF16String16, AString, LevelType);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, GameMode);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, Dimension);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, Difficulty);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, Unused);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, MaxPlayers);
|
|
Log("Received a PACKET_LOGIN from the server:");
|
|
Log(" EntityID = %d", EntityID);
|
|
Log(" LevelType = \"%s\"", LevelType.c_str());
|
|
Log(" GameMode = %d", GameMode);
|
|
Log(" Dimension = %d", Dimension);
|
|
Log(" Difficulty = %d", Difficulty);
|
|
Log(" Unused = %d", Unused);
|
|
Log(" MaxPlayers = %d", MaxPlayers);
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerMapChunk(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, ChunkX);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, ChunkZ);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, IsContiguous);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, PrimaryBitmap);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, AdditionalBitmap);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt, int, CompressedSize);
|
|
AString CompressedData;
|
|
if (!m_ServerBuffer.ReadString(CompressedData, CompressedSize))
|
|
{
|
|
return false;
|
|
}
|
|
Log("Received a PACKET_MAP_CHUNK from the server:");
|
|
Log(" ChunkPos = [%d, %d]", ChunkX, ChunkZ);
|
|
Log(" Compressed size = %d (0x%x)", CompressedSize, CompressedSize);
|
|
|
|
// TODO: Save the compressed data into a file for later analysis
|
|
|
|
COPY_TO_CLIENT()
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerPlayerAbilities(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, Flags);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, FlyingSpeed);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, WalkingSpeed);
|
|
Log("Received a PACKET_PLAYER_ABILITIES from the server:");
|
|
Log(" Flags = 0x%x", Flags);
|
|
Log(" FlyingSpeed = %d", FlyingSpeed);
|
|
Log(" WalkingSpeed = %d", WalkingSpeed);
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerPlayerListItem(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEUTF16String16, AString, PlayerName);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, IsOnline);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, Ping);
|
|
Log("Received a PACKET_PLAYERLIST_ITEM from the server:");
|
|
Log(" PlayerName = \"%s\"", PlayerName.c_str());
|
|
Log(" Ping = %d", Ping);
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerPlayerPositionLook(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEDouble, double, PosX);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEDouble, double, Stance);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEDouble, double, PosY);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEDouble, double, PosZ);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEFloat, float, Yaw);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEFloat, float, Pitch);
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, IsOnGround);
|
|
Log("Received a PACKET_PLAYER_POSITION_LOOK from the server");
|
|
|
|
// TODO: list packet contents
|
|
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerTimeUpdate(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEInt64, Int64, Time);
|
|
Log("Received a PACKET_TIME_UPDATE from the server");
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerUpdateHealth(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, Health);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, Food);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEFloat, float, Saturation);
|
|
Log("Received a PACKET_UPDATE_HEALTH from the server");
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::HandleServerWindowContents(void)
|
|
{
|
|
HANDLE_SERVER_PACKET_READ(ReadChar, char, WindowID);
|
|
HANDLE_SERVER_PACKET_READ(ReadBEShort, short, NumSlots);
|
|
AStringVector Items;
|
|
for (short i = 0; i < NumSlots; i++)
|
|
{
|
|
AString Item;
|
|
if (!ParseSlot(m_ServerBuffer, Item))
|
|
{
|
|
return false;
|
|
}
|
|
Items.push_back(Item);
|
|
}
|
|
Log("Received a PACKET_WINDOW_CONTENTS from the server:");
|
|
Log(" WindowID = %d", WindowID);
|
|
Log(" NumSlots = %d", NumSlots);
|
|
|
|
// TODO: list items
|
|
|
|
COPY_TO_CLIENT();
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool cConnection::ParseSlot(cByteBuffer & a_Buffer, AString & a_ItemDesc)
|
|
{
|
|
short ItemType;
|
|
if (!a_Buffer.ReadBEShort(ItemType))
|
|
{
|
|
return false;
|
|
}
|
|
if (ItemType <= 0)
|
|
{
|
|
a_ItemDesc = "<empty>";
|
|
return true;
|
|
}
|
|
if (!a_Buffer.CanReadBytes(5))
|
|
{
|
|
return false;
|
|
}
|
|
char ItemCount;
|
|
short ItemDamage;
|
|
short MetadataLength;
|
|
a_Buffer.ReadChar(ItemCount);
|
|
a_Buffer.ReadBEShort(ItemDamage);
|
|
a_Buffer.ReadBEShort(MetadataLength);
|
|
Printf(a_ItemDesc, "%d:%d * %d", ItemType, ItemDamage, ItemCount);
|
|
if (MetadataLength <= 0)
|
|
{
|
|
return true;
|
|
}
|
|
AppendPrintf(a_ItemDesc, " (%d bytes of meta)", MetadataLength);
|
|
if (!a_Buffer.SkipRead(MetadataLength))
|
|
{
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void cConnection::SendEncryptionKeyResponse(const AString & a_ServerPublicKey, const AString & a_Nonce)
|
|
{
|
|
// Generate the shared secret and encrypt using the server's public key
|
|
byte SharedSecret[16];
|
|
byte EncryptedSecret[128];
|
|
memset(SharedSecret, 0, sizeof(SharedSecret)); // Use all zeroes for the initial secret
|
|
RSA::PublicKey pk;
|
|
CryptoPP::StringSource src(a_ServerPublicKey, true);
|
|
ByteQueue bq;
|
|
src.TransferTo(bq);
|
|
bq.MessageEnd();
|
|
pk.Load(bq);
|
|
RSAES<PKCS1v15>::Encryptor rsaEncryptor(pk);
|
|
RandomPool rng;
|
|
time_t CurTime = time(NULL);
|
|
rng.Put((const byte *)&CurTime, sizeof(CurTime));
|
|
int EncryptedLength = rsaEncryptor.FixedCiphertextLength();
|
|
ASSERT(EncryptedLength <= sizeof(EncryptedSecret));
|
|
rsaEncryptor.Encrypt(rng, SharedSecret, sizeof(SharedSecret), EncryptedSecret);
|
|
m_ServerEncryptor.SetKey(SharedSecret, 16, MakeParameters(Name::IV(), ConstByteArrayParameter(SharedSecret, 16))(Name::FeedbackSize(), 1));
|
|
m_ServerDecryptor.SetKey(SharedSecret, 16, MakeParameters(Name::IV(), ConstByteArrayParameter(SharedSecret, 16))(Name::FeedbackSize(), 1));
|
|
|
|
// Encrypt the nonce:
|
|
byte EncryptedNonce[128];
|
|
rsaEncryptor.Encrypt(rng, (const byte *)(a_Nonce.data()), a_Nonce.size(), EncryptedNonce);
|
|
|
|
// Send the packet to the server:
|
|
Log("Sending PACKET_ENCRYPTION_KEY_RESPONSE to the SERVER");
|
|
cByteBuffer ToServer(1024);
|
|
ToServer.WriteByte(PACKET_ENCRYPTION_KEY_RESPONSE);
|
|
ToServer.WriteBEShort(EncryptedLength);
|
|
ToServer.WriteBuf(EncryptedSecret, EncryptedLength);
|
|
ToServer.WriteBEShort(EncryptedLength);
|
|
ToServer.WriteBuf(EncryptedNonce, EncryptedLength);
|
|
SERVERSEND(ToServer);
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void cConnection::StartClientEncryption(const AString & a_EncKey, const AString & a_EncNonce)
|
|
{
|
|
// Decrypt EncNonce using privkey
|
|
RSAES<PKCS1v15>::Decryptor rsaDecryptor(m_Server.GetPrivateKey());
|
|
time_t CurTime = time(NULL);
|
|
RandomPool rng;
|
|
rng.Put((const byte *)&CurTime, sizeof(CurTime));
|
|
byte DecryptedNonce[MAX_ENC_LEN];
|
|
DecodingResult res = rsaDecryptor.Decrypt(rng, (const byte *)a_EncNonce.data(), a_EncNonce.size(), DecryptedNonce);
|
|
if (!res.isValidCoding || (res.messageLength != 4))
|
|
{
|
|
Log("Client: Bad nonce length");
|
|
return;
|
|
}
|
|
if (ntohl(*((int *)DecryptedNonce)) != m_Nonce)
|
|
{
|
|
Log("Bad nonce value");
|
|
return;
|
|
}
|
|
|
|
// Decrypt the symmetric encryption key using privkey:
|
|
byte SharedSecret[MAX_ENC_LEN];
|
|
res = rsaDecryptor.Decrypt(rng, (const byte *)a_EncKey.data(), a_EncKey.size(), SharedSecret);
|
|
if (!res.isValidCoding || (res.messageLength != 16))
|
|
{
|
|
Log("Bad key length");
|
|
return;
|
|
}
|
|
|
|
// Send encryption key response:
|
|
cByteBuffer ToClient(6);
|
|
ToClient.WriteByte((char)0xfc);
|
|
ToClient.WriteBEShort(0);
|
|
ToClient.WriteBEShort(0);
|
|
CLIENTSEND(ToClient);
|
|
|
|
// Start the encryption:
|
|
m_ClientEncryptor.SetKey(SharedSecret, 16, MakeParameters(Name::IV(), ConstByteArrayParameter(SharedSecret, 16))(Name::FeedbackSize(), 1));
|
|
m_ClientDecryptor.SetKey(SharedSecret, 16, MakeParameters(Name::IV(), ConstByteArrayParameter(SharedSecret, 16))(Name::FeedbackSize(), 1));
|
|
Log("Client connection is now encrypted");
|
|
m_ClientState = csEncryptedUnderstood;
|
|
|
|
// Handle all postponed server data
|
|
DecodeServersPackets(NULL, 0);
|
|
}
|
|
|
|
|
|
|
|
|