Net-BitTorrent
view release on metacpan or search on metacpan
lib/Net/BitTorrent/Protocol/MSE/KeyExchange.pm view on Meta::CPAN
use v5.40;
use feature 'class';
no warnings qw[experimental::class experimental::builtin];
use Net::BitTorrent::Emitter;
class Net::BitTorrent::Protocol::MSE::KeyExchange v2.0.0 : isa(Net::BitTorrent::Emitter) {
use Digest::SHA qw[sha1];
use Math::BigInt try => 'GMP';
# -- Parameters --
field $infohash : param : reader;
field $is_initiator : param : reader;
# -- Internal State --
field $private_key;
field $public_key : reader;
field $shared_secret;
# -- Cipher State --
field $encrypt_rc4 : reader;
field $decrypt_rc4 : reader;
# Store the initial state (post-discard) for the decryptor
# to optimize the scan_for_vc loop.
field $decrypt_restore_point;
# 768-bit Safe Prime (Big Endian)
my $P_STR
= 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
'020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
'4FE1356D6D51C245E485B576625E7EC6F44C42E9A63A36210000000000090563';
ADJUST {
my $p = Math::BigInt->from_hex($P_STR);
my $g = Math::BigInt->new(2);
# Private Key: Random 160 bits
my $priv_hex = join '', map { sprintf "%02x", rand(256) } 1 .. 20;
$private_key = Math::BigInt->from_hex($priv_hex);
# Public Key: Y = G^X mod P
my $pub_val = $g->copy->bmodpow( $private_key, $p );
$public_key = $self->_int_to_bytes($pub_val);
}
method _int_to_bytes ($num) {
my $hex = $num->to_hex;
$hex =~ s/^0x//i;
$hex = "0$hex" if length($hex) % 2;
my $bin = pack( 'H*', $hex );
if ( length($bin) < 96 ) {
$bin = ( "\0" x ( 96 - length($bin) ) ) . $bin;
}
elsif ( length($bin) > 96 ) {
$bin = substr( $bin, -96 );
}
return $bin;
}
method compute_secret ($remote_pub_bytes) {
if ( length($remote_pub_bytes) != 96 ) {
$self->_emit( log => "Remote public key must be 96 bytes", level => 'fatal' );
return undef;
}
my $p = Math::BigInt->from_hex($P_STR);
my $remote_val = Math::BigInt->from_bytes($remote_pub_bytes);
# S = Y_remote ^ X_local mod P
my $s_val = $remote_val->copy->bmodpow( $private_key, $p );
$shared_secret = $self->_int_to_bytes($s_val);
return $shared_secret;
}
method get_secret () { return $shared_secret }
method get_sync_data ( $override_ih = undef ) {
my $ih = $override_ih // $infohash;
return undef unless $ih;
my $s = $shared_secret;
my $sk = $ih;
my $req1_hash = sha1( 'req1' . $s );
my $req2_hash = sha1( 'req2' . $sk );
my $req3_hash = sha1( 'req3' . $s );
my $xor_mask = $req2_hash^.$req3_hash;
return ( $req1_hash, $xor_mask );
}
method verify_skey ( $xor_block, $candidate_ih ) {
my $s = $shared_secret;
my $req3_hash = sha1( 'req3' . $s );
my $target_req2 = $xor_block^.$req3_hash;
my $check = sha1( 'req2' . $candidate_ih );
return $check eq $target_req2;
}
method init_rc4 ($ih) {
$infohash = $ih;
my $keyA = sha1( "keyA" . $shared_secret . $infohash );
my $keyB = sha1( "keyB" . $shared_secret . $infohash );
my ( $key_enc, $key_dec );
if ($is_initiator) {
$key_enc = $keyA;
$key_dec = $keyB;
}
else {
$key_enc = $keyB;
$key_dec = $keyA;
}
# Initialize Encryptor
$encrypt_rc4 = Net::BitTorrent::Protocol::MSE::RC4->new( key => $key_enc );
$encrypt_rc4->discard(1024);
# Initialize Decryptor
$decrypt_rc4 = Net::BitTorrent::Protocol::MSE::RC4->new( key => $key_dec );
$decrypt_rc4->discard(1024);
# Save state for efficient scanning
$decrypt_restore_point = $decrypt_rc4->snapshot();
}
method scan_for_vc ($buffer) {
my $limit = length($buffer) - 8;
$limit = 512 if $limit > 512;
# Use a temporary RC4 instance to avoid messing up the main decryptor
# during the brute force attempts.
my $trial_rc4 = Net::BitTorrent::Protocol::MSE::RC4->new( key => 'dummy' );
for my $offset ( 0 .. $limit ) {
( run in 0.627 second using v1.01-cache-2.11-cpan-39bf76dae61 )