mirror of
https://github.com/raphaeIl/Novaria.git
synced 2025-12-12 14:34:38 +01:00
145 lines
5.1 KiB
C#
145 lines
5.1 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Security.Cryptography;
|
|
using System.Text;
|
|
using System.Threading.Tasks;
|
|
using Novaria.Common.Util;
|
|
|
|
//using Mono.Security.Cryptography;
|
|
using NSec.Cryptography;
|
|
using static System.Runtime.InteropServices.JavaScript.JSType;
|
|
|
|
namespace Novaria.Common.Crypto
|
|
{
|
|
public static class AeadTool
|
|
{
|
|
public static ClientType clientType; // apprently the ike key for pc and mobile is different somehow
|
|
|
|
public static byte[] PS_REQUEST_NONCE = new byte[12];
|
|
public static byte[] PS_PUBLIC_KEY { get => DiffieHellman.Instance.ServerPublicKey.ToByteArray(); }
|
|
public static string TOKEN = "seggs"; // hardcoded for now
|
|
|
|
public static readonly byte[] DEFAULT_SERVERLIST_KEY;
|
|
public static readonly byte[] DEFAULT_SERVERLIST_IV;
|
|
|
|
public static readonly byte[] FIRST_IKE_KEY;
|
|
|
|
public static readonly byte[] associatedData;
|
|
|
|
public static ReadOnlySpan<byte> AEADMARK
|
|
{
|
|
get
|
|
{
|
|
return AeadTool.associatedData.AsSpan(12, 1);
|
|
}
|
|
}
|
|
|
|
public static byte[] key3 { get; set; }
|
|
|
|
static AeadTool()
|
|
{
|
|
AeadTool.clientType = ClientType.Mobile;
|
|
|
|
DEFAULT_SERVERLIST_KEY = new byte[] { 74, 72, 42, 67, 80, 51, 50, 57, 89, 120, 111, 103, 81, 74, 69, 120 };
|
|
DEFAULT_SERVERLIST_IV = new byte[] { 225, 92, 61, 72, 193, 89, 3, 64, 50, 61, 50, 145, 59, 128, 99, 72 };
|
|
|
|
FIRST_IKE_KEY = new byte[] { 51, 76, 83, 57, 38, 111, 89, 100, 115, 112, 94, 53, 119, 105, 56, 38, 90, 120, 67, 35, 99, 55, 77, 90, 103, 55, 51, 104, 98, 69, 68, 119 };
|
|
|
|
if (clientType == ClientType.Mobile)
|
|
{
|
|
FIRST_IKE_KEY = Encoding.ASCII.GetBytes("3LS9&oYdsp^5wi8&ZxC#c7MZg73hbEDw");
|
|
}
|
|
|
|
else
|
|
{
|
|
FIRST_IKE_KEY = Encoding.ASCII.GetBytes("#$*;1H&x*)0!@,/OcIe4VbiL[~fLyE7t");
|
|
}
|
|
|
|
associatedData = new byte[13];
|
|
|
|
// assume AesGcm not supported (frida log)
|
|
associatedData[associatedData.Length - 1] = 1;
|
|
|
|
PS_PUBLIC_KEY[0] = 69;
|
|
PS_PUBLIC_KEY[95] = 69;
|
|
|
|
PS_REQUEST_NONCE[0] = 42;
|
|
PS_REQUEST_NONCE[11] = 42;
|
|
}
|
|
|
|
public static bool Dencrypt_ChaCha20(Span<byte> result, ReadOnlySpan<byte> key, ReadOnlySpan<byte> nonce, ReadOnlySpan<byte> data, ReadOnlySpan<byte> associatedData)
|
|
{
|
|
Algorithm chaCha20Poly = AeadAlgorithm.ChaCha20Poly1305;
|
|
KeyBlobFormat keyBlobFormat = KeyBlobFormat.RawSymmetricKey;
|
|
KeyCreationParameters keyCreationParameters = default(KeyCreationParameters);
|
|
bool result2;
|
|
|
|
using (Key key2 = Key.Import(chaCha20Poly, key, keyBlobFormat, ref keyCreationParameters))
|
|
{
|
|
result2 = AeadAlgorithm.ChaCha20Poly1305.Decrypt(key2, nonce, associatedData, data, result);
|
|
}
|
|
|
|
return result2;
|
|
}
|
|
|
|
|
|
public static void Encrypt_ChaCha20(Span<byte> result, ReadOnlySpan<byte> key, ReadOnlySpan<byte> nonce, ReadOnlySpan<byte> data, bool needAssociatedData)
|
|
{
|
|
Algorithm chaCha20Poly = AeadAlgorithm.ChaCha20Poly1305;
|
|
KeyBlobFormat keyBlobFormat = KeyBlobFormat.RawSymmetricKey;
|
|
KeyCreationParameters keyCreationParameters = default(KeyCreationParameters);
|
|
using (Key key2 = Key.Import(chaCha20Poly, key, keyBlobFormat, ref keyCreationParameters))
|
|
{
|
|
if (!needAssociatedData)
|
|
{
|
|
AeadAlgorithm.ChaCha20Poly1305.Encrypt(key2, nonce, null, data, result);
|
|
} else
|
|
{
|
|
nonce.CopyTo(AeadTool.associatedData.AsSpan(0, 12));
|
|
AeadAlgorithm.ChaCha20Poly1305.Encrypt(key2, nonce, AeadTool.associatedData.AsSpan<byte>(), data, result);
|
|
}
|
|
}
|
|
}
|
|
|
|
// probably wrong
|
|
public static byte[] DecryptAesCBCInfo(byte[] key, byte[] IV, byte[] cipherBytes)
|
|
{
|
|
using (Aes aes = Aes.Create())
|
|
{
|
|
aes.Key = key;
|
|
aes.IV = IV;
|
|
aes.Mode = CipherMode.CBC;
|
|
aes.Padding = PaddingMode.PKCS7;
|
|
|
|
using (ICryptoTransform decryptor = aes.CreateDecryptor())
|
|
{
|
|
return decryptor.TransformFinalBlock(cipherBytes, 0, cipherBytes.Length);
|
|
}
|
|
}
|
|
}
|
|
|
|
public static byte[] EncryptAesCBCInfo(byte[] key, byte[] IV, byte[] plainBytes)
|
|
{
|
|
using (Aes aes = Aes.Create())
|
|
{
|
|
aes.Key = key;
|
|
aes.IV = IV;
|
|
aes.Mode = CipherMode.CBC;
|
|
aes.Padding = PaddingMode.PKCS7;
|
|
|
|
using (ICryptoTransform encryptor = aes.CreateEncryptor())
|
|
{
|
|
return encryptor.TransformFinalBlock(plainBytes, 0, plainBytes.Length);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public enum ClientType
|
|
{
|
|
PC,
|
|
Mobile,
|
|
}
|
|
|
|
} |