mirror of
https://github.com/SourMesen/Mesen2.git
synced 2025-04-02 10:21:44 -04:00
53 lines
1.5 KiB
C++
53 lines
1.5 KiB
C++
#pragma once
|
|
#include "pch.h"
|
|
#include "Netplay/NetMessage.h"
|
|
#include "Utilities/sha1.h"
|
|
|
|
class HandShakeMessage : public NetMessage
|
|
{
|
|
private:
|
|
static constexpr int CurrentVersion = 200; //Use 200+ to distinguish from original Mesen & Mesen-S
|
|
uint32_t _emuVersion = 0;
|
|
uint32_t _protocolVersion = CurrentVersion;
|
|
string _hashedPassword;
|
|
bool _spectator = false;
|
|
|
|
protected:
|
|
void Serialize(Serializer &s) override
|
|
{
|
|
SV(_emuVersion); SV(_protocolVersion); SV(_hashedPassword); SV(_spectator);
|
|
}
|
|
|
|
public:
|
|
HandShakeMessage(void* buffer, uint32_t length) : NetMessage(buffer, length) {}
|
|
|
|
HandShakeMessage(string hashedPassword, bool spectator, uint32_t emuVersion) : NetMessage(MessageType::HandShake)
|
|
{
|
|
_emuVersion = emuVersion;
|
|
_protocolVersion = HandShakeMessage::CurrentVersion;
|
|
_hashedPassword = hashedPassword;
|
|
_spectator = spectator;
|
|
}
|
|
|
|
bool IsValid(uint32_t emuVersion)
|
|
{
|
|
return _protocolVersion == CurrentVersion && _emuVersion == emuVersion;
|
|
}
|
|
|
|
bool CheckPassword(string serverPassword, string connectionHash)
|
|
{
|
|
return GetPasswordHash(serverPassword, connectionHash) == string(_hashedPassword);
|
|
}
|
|
|
|
bool IsSpectator()
|
|
{
|
|
return _spectator;
|
|
}
|
|
|
|
static string GetPasswordHash(string serverPassword, string connectionHash)
|
|
{
|
|
string saltedPassword = serverPassword + connectionHash;
|
|
vector<uint8_t> dataToHash = vector<uint8_t>(saltedPassword.c_str(), saltedPassword.c_str() + saltedPassword.size());
|
|
return SHA1::GetHash(dataToHash);
|
|
}
|
|
};
|