📄 login.c
字号:
/* libdrcom - Library for communicating with DrCOM 2133 Broadband Access Server Copyright (C) 2005 William Poetra Yoga Hadisoeseno <williampoetra@yahoo.com> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA*/#include <stdio.h>#include <string.h>#include <openssl/md5.h>#include "log.h"#include "private.h"void _build_login_packet(struct drcom_login_packet *, struct drcom_info *, struct drcom_host *, struct drcom_challenge *);void _build_authentication(struct drcom_auth *, struct drcom_acknowledgement *);void _build_keepalive(struct drcom_host_msg *, struct drcom_login_packet *, struct drcom_acknowledgement *);/*static void mylog_message(int priority, const char *format, va_list args){ vfprintf(stderr, format, args);}void myloginfo(const char *format, ...){ va_list args; va_start(args, format); mylog_message(LOG_INFO, format, args); va_end(args);}*//* drcom_login Logs in.*/int drcom_login(struct drcom_handle *h, int timeout){ struct drcom_socks *socks = (struct drcom_socks *) h->socks; struct drcom_info *info = (struct drcom_info *) h->info; struct drcom_host *host = (struct drcom_host *) h->host; struct drcom_host_msg *response = (struct drcom_host_msg *) h->response; struct drcom_host_msg *keepalive = (struct drcom_host_msg *) h->keepalive; struct drcom_auth *auth = (struct drcom_auth *) h->auth; struct drcom_challenge challenge; struct drcom_login_packet login_packet; struct drcom_acknowledgement acknowledgement; _send_dialog_packet(socks, NULL, PKT_REQUEST); _recv_dialog_packet(socks, &challenge, PKT_CHALLENGE); /* Now the _real_ ip address of the server is known */ info->servip = socks->servaddr_in.sin_addr.s_addr; _build_login_packet(&login_packet, info, host, &challenge); _send_dialog_packet(socks, &login_packet, PKT_LOGIN); _recv_dialog_packet(socks, &acknowledgement, PKT_ACK_SUCCESS); if (acknowledgement.serv_header.pkt_type == PKT_ACK_SUCCESS) { _build_authentication(auth, &acknowledgement); _build_keepalive(keepalive, &login_packet, &acknowledgement); memcpy(response, keepalive, sizeof(*keepalive)); loginfo("You have used %u Minutes, and %uK bytes\n", acknowledgement.time_usage, acknowledgement.vol_usage); return 0; } else return -1;}void _build_login_packet(struct drcom_login_packet *login_packet, struct drcom_info *info, struct drcom_host *host, struct drcom_challenge *challenge){ char s[25]; unsigned char t[22], d[16]; int i, passwd_len; /* header */ login_packet->host_header.pkt_type = PKT_LOGIN; login_packet->host_header.zero = 0; login_packet->host_header.len = strlen(info->username) + sizeof(struct drcom_host_header); memset(t, 0, 22); memcpy(t, &login_packet->host_header.pkt_type, 2); memcpy(t + 2, &challenge->challenge, 4); passwd_len = strlen(info->password); strncpy((char *) (t + 6), info->password, 16); MD5((unsigned char *) t, passwd_len + 6, d); memcpy(login_packet->host_header.checksum, d, 16); /* username */ memset(login_packet->username, 0, 36); strncpy(login_packet->username, info->username, 36); /* unknown, maybe just a signature? */ login_packet->unknown0 = 0x18; /* mac */ login_packet->mac_code = 1; memcpy(login_packet->mac_xor, info->mac, 6); for (i = 0; i < 6; ++i) login_packet->mac_xor[i] ^= login_packet->host_header.checksum[i]; /* ok, first checksum */ /* l already calculated */ /* l = strlen(info->password); */ s[0] = 0x01; memcpy(s + 1, info->password, passwd_len); memcpy(s + 1 + passwd_len, &challenge->challenge, 4); memset(s + 1 + passwd_len + 4, 0, 4); MD5((unsigned char *) s, 1 + passwd_len + 4 + 4, d); memcpy(login_packet->checksum1, d, 16); /* nic */ login_packet->num_nic = 1; memcpy(login_packet->nic, info->nic, 16); /* second checksum */ login_packet->checksum2_half[0] = 0x14; login_packet->checksum2_half[1] = 0x00; login_packet->checksum2_half[2] = 0x07; login_packet->checksum2_half[3] = 0x0b; MD5((unsigned char *) login_packet, 0x65, d); memcpy(login_packet->checksum2_half, d, 8); /* we've got a dog */ login_packet->dog = 1; /* host info */ memset(login_packet->zero1, 0, 4); memcpy(&login_packet->host_info, host, sizeof(struct drcom_host)); memset(login_packet->zero2, 0, 96); /* wtf? */ login_packet->unknown1 = 0x01; login_packet->unknown2 = 0x00; login_packet->unknown3[0] = 0x01; login_packet->unknown3[1] = 0x08; /* maybe we should use something random instead? *//* memset(login_packet->unknown4, 0, 8);*/ login_packet->unknown4[0] = 0x00; login_packet->unknown4[1] = 0xf0; login_packet->unknown4[2] = 0x66; login_packet->unknown4[3] = 0x33; login_packet->unknown4[4] = 0x72; login_packet->unknown4[5] = 0x5b; login_packet->unknown4[6] = 0xc4; login_packet->unknown4[7] = 0x01;/* memcpy(login_packet->unknown4, d + 8, 8);*/ return;}void _build_authentication(struct drcom_auth *auth, struct drcom_acknowledgement *acknowledgement){ memcpy(auth, &acknowledgement->auth_info, sizeof(struct drcom_auth)); return;}void _build_keepalive(struct drcom_host_msg *keepalive, struct drcom_login_packet *login_packet, struct drcom_acknowledgement *acknowledgement){ keepalive->msgtype = 0xff; memset(keepalive->msg, 0, 19); memcpy(keepalive->msg, login_packet->host_header.checksum, 16); memcpy(&keepalive->auth_info, &acknowledgement->auth_info, sizeof(struct drcom_auth)); return;}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -