| /* |
| * Copyright (C) 2008-2009 Andrej Stepanchuk |
| * Copyright (C) 2009-2010 Howard Chu |
| * Copyright (C) 2010 2a665470ced7adb7156fcef47f8199a6371c117b8a79e399a2771e0b36384090 |
| * |
| * This file is part of librtmp. |
| * |
| * librtmp is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU Lesser General Public License as |
| * published by the Free Software Foundation; either version 2.1, |
| * or (at your option) any later version. |
| * |
| * librtmp is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public License |
| * along with librtmp see the file COPYING. If not, write to |
| * the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. |
| * http://www.gnu.org/copyleft/lgpl.html |
| */ |
| |
| /* This file is #included in rtmp.c, it is not meant to be compiled alone */ |
| |
| #ifdef USE_POLARSSL |
| #include <polarssl/sha2.h> |
| #include <polarssl/arc4.h> |
| #ifndef SHA256_DIGEST_LENGTH |
| #define SHA256_DIGEST_LENGTH 32 |
| #endif |
| #define HMAC_CTX sha2_context |
| #define HMAC_setup(ctx, key, len) sha2_hmac_starts(&ctx, (unsigned char *)key, len, 0) |
| #define HMAC_crunch(ctx, buf, len) sha2_hmac_update(&ctx, buf, len) |
| #define HMAC_finish(ctx, dig, dlen) dlen = SHA256_DIGEST_LENGTH; sha2_hmac_finish(&ctx, dig) |
| |
| typedef arc4_context * RC4_handle; |
| #define RC4_setup(h) *h = malloc(sizeof(arc4_context)) |
| #define RC4_setkey(h,l,k) arc4_setup(h,k,l) |
| #define RC4_encrypt(h,l,d) arc4_crypt(h,l,(unsigned char *)d,(unsigned char *)d) |
| #define RC4_encrypt2(h,l,s,d) arc4_crypt(h,l,(unsigned char *)s,(unsigned char *)d) |
| |
| #elif defined(USE_GNUTLS) |
| #include <gcrypt.h> |
| #ifndef SHA256_DIGEST_LENGTH |
| #define SHA256_DIGEST_LENGTH 32 |
| #endif |
| #define HMAC_CTX gcry_md_hd_t |
| #define HMAC_setup(ctx, key, len) gcry_md_open(&ctx, GCRY_MD_SHA256, GCRY_MD_FLAG_HMAC); gcry_md_setkey(ctx, key, len) |
| #define HMAC_crunch(ctx, buf, len) gcry_md_write(ctx, buf, len) |
| #define HMAC_finish(ctx, dig, dlen) dlen = SHA256_DIGEST_LENGTH; memcpy(dig, gcry_md_read(ctx, 0), dlen); gcry_md_close(ctx) |
| |
| typedef gcry_cipher_hd_t RC4_handle; |
| #define RC4_setup(h) gcry_cipher_open(h, GCRY_CIPHER_ARCFOUR, GCRY_CIPHER_MODE_STREAM, 0) |
| #define RC4_setkey(h,l,k) gcry_cipher_setkey(h,k,l) |
| #define RC4_encrypt(h,l,d) gcry_cipher_encrypt(h,(void *)d,l,NULL,0) |
| #define RC4_encrypt2(h,l,s,d) gcry_cipher_encrypt(h,(void *)d,l,(void *)s,l) |
| |
| #else /* USE_OPENSSL */ |
| #include <openssl/sha.h> |
| #include <openssl/hmac.h> |
| #include <openssl/rc4.h> |
| #if OPENSSL_VERSION_NUMBER < 0x0090800 || !defined(SHA256_DIGEST_LENGTH) |
| #error Your OpenSSL is too old, need 0.9.8 or newer with SHA256 |
| #endif |
| #define HMAC_setup(ctx, key, len) HMAC_CTX_init(&ctx); HMAC_Init_ex(&ctx, key, len, EVP_sha256(), 0) |
| #define HMAC_crunch(ctx, buf, len) HMAC_Update(&ctx, buf, len) |
| #define HMAC_finish(ctx, dig, dlen) HMAC_Final(&ctx, dig, &dlen); HMAC_CTX_cleanup(&ctx) |
| |
| typedef RC4_KEY * RC4_handle; |
| #define RC4_setup(h) *h = malloc(sizeof(RC4_KEY)) |
| #define RC4_setkey(h,l,k) RC4_set_key(h,l,k) |
| #define RC4_encrypt(h,l,d) RC4(h,l,(uint8_t *)d,(uint8_t *)d) |
| #define RC4_encrypt2(h,l,s,d) RC4(h,l,(uint8_t *)s,(uint8_t *)d) |
| #endif |
| |
| #define FP10 |
| |
| #include "dh.h" |
| |
| static const uint8_t GenuineFMSKey[] = { |
| 0x47, 0x65, 0x6e, 0x75, 0x69, 0x6e, 0x65, 0x20, 0x41, 0x64, 0x6f, 0x62, |
| 0x65, 0x20, 0x46, 0x6c, |
| 0x61, 0x73, 0x68, 0x20, 0x4d, 0x65, 0x64, 0x69, 0x61, 0x20, 0x53, 0x65, |
| 0x72, 0x76, 0x65, 0x72, |
| 0x20, 0x30, 0x30, 0x31, /* Genuine Adobe Flash Media Server 001 */ |
| |
| 0xf0, 0xee, 0xc2, 0x4a, 0x80, 0x68, 0xbe, 0xe8, 0x2e, 0x00, 0xd0, 0xd1, |
| 0x02, 0x9e, 0x7e, 0x57, 0x6e, 0xec, 0x5d, 0x2d, 0x29, 0x80, 0x6f, 0xab, |
| 0x93, 0xb8, 0xe6, 0x36, |
| 0xcf, 0xeb, 0x31, 0xae |
| }; /* 68 */ |
| |
| static const uint8_t GenuineFPKey[] = { |
| 0x47, 0x65, 0x6E, 0x75, 0x69, 0x6E, 0x65, 0x20, 0x41, 0x64, 0x6F, 0x62, |
| 0x65, 0x20, 0x46, 0x6C, |
| 0x61, 0x73, 0x68, 0x20, 0x50, 0x6C, 0x61, 0x79, 0x65, 0x72, 0x20, 0x30, |
| 0x30, 0x31, /* Genuine Adobe Flash Player 001 */ |
| 0xF0, 0xEE, |
| 0xC2, 0x4A, 0x80, 0x68, 0xBE, 0xE8, 0x2E, 0x00, 0xD0, 0xD1, 0x02, 0x9E, |
| 0x7E, 0x57, 0x6E, 0xEC, |
| 0x5D, 0x2D, 0x29, 0x80, 0x6F, 0xAB, 0x93, 0xB8, 0xE6, 0x36, 0xCF, 0xEB, |
| 0x31, 0xAE |
| }; /* 62 */ |
| |
| static void InitRC4Encryption |
| (uint8_t * secretKey, |
| uint8_t * pubKeyIn, |
| uint8_t * pubKeyOut, RC4_handle *rc4keyIn, RC4_handle *rc4keyOut) |
| { |
| uint8_t digest[SHA256_DIGEST_LENGTH]; |
| unsigned int digestLen = 0; |
| HMAC_CTX ctx; |
| |
| RC4_setup(rc4keyIn); |
| RC4_setup(rc4keyOut); |
| |
| HMAC_setup(ctx, secretKey, 128); |
| HMAC_crunch(ctx, pubKeyIn, 128); |
| HMAC_finish(ctx, digest, digestLen); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "RC4 Out Key: "); |
| RTMP_LogHex(RTMP_LOGDEBUG, digest, 16); |
| |
| RC4_setkey(*rc4keyOut, 16, digest); |
| |
| HMAC_setup(ctx, secretKey, 128); |
| HMAC_crunch(ctx, pubKeyOut, 128); |
| HMAC_finish(ctx, digest, digestLen); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "RC4 In Key: "); |
| RTMP_LogHex(RTMP_LOGDEBUG, digest, 16); |
| |
| RC4_setkey(*rc4keyIn, 16, digest); |
| } |
| |
| typedef unsigned int (getoff)(uint8_t *buf, unsigned int len); |
| |
| static unsigned int |
| GetDHOffset2(uint8_t *handshake, unsigned int len) |
| { |
| unsigned int offset = 0; |
| uint8_t *ptr = handshake + 768; |
| unsigned int res; |
| |
| assert(RTMP_SIG_SIZE <= len); |
| |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| |
| res = (offset % 632) + 8; |
| |
| if (res + 128 > 767) |
| { |
| RTMP_Log(RTMP_LOGERROR, |
| "%s: Couldn't calculate correct DH offset (got %d), exiting!", |
| __FUNCTION__, res); |
| exit(1); |
| } |
| return res; |
| } |
| |
| static unsigned int |
| GetDigestOffset2(uint8_t *handshake, unsigned int len) |
| { |
| unsigned int offset = 0; |
| uint8_t *ptr = handshake + 772; |
| unsigned int res; |
| |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| |
| res = (offset % 728) + 776; |
| |
| if (res + 32 > 1535) |
| { |
| RTMP_Log(RTMP_LOGERROR, |
| "%s: Couldn't calculate correct digest offset (got %d), exiting", |
| __FUNCTION__, res); |
| exit(1); |
| } |
| return res; |
| } |
| |
| static unsigned int |
| GetDHOffset1(uint8_t *handshake, unsigned int len) |
| { |
| unsigned int offset = 0; |
| uint8_t *ptr = handshake + 1532; |
| unsigned int res; |
| |
| assert(RTMP_SIG_SIZE <= len); |
| |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| |
| res = (offset % 632) + 772; |
| |
| if (res + 128 > 1531) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't calculate DH offset (got %d), exiting!", |
| __FUNCTION__, res); |
| exit(1); |
| } |
| |
| return res; |
| } |
| |
| static unsigned int |
| GetDigestOffset1(uint8_t *handshake, unsigned int len) |
| { |
| unsigned int offset = 0; |
| uint8_t *ptr = handshake + 8; |
| unsigned int res; |
| |
| assert(12 <= len); |
| |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| ptr++; |
| offset += (*ptr); |
| |
| res = (offset % 728) + 12; |
| |
| if (res + 32 > 771) |
| { |
| RTMP_Log(RTMP_LOGERROR, |
| "%s: Couldn't calculate digest offset (got %d), exiting!", |
| __FUNCTION__, res); |
| exit(1); |
| } |
| |
| return res; |
| } |
| |
| static getoff *digoff[] = {GetDigestOffset1, GetDigestOffset2}; |
| static getoff *dhoff[] = {GetDHOffset1, GetDHOffset2}; |
| |
| static void |
| HMACsha256(const uint8_t *message, size_t messageLen, const uint8_t *key, |
| size_t keylen, uint8_t *digest) |
| { |
| unsigned int digestLen; |
| HMAC_CTX ctx; |
| |
| HMAC_setup(ctx, key, keylen); |
| HMAC_crunch(ctx, message, messageLen); |
| HMAC_finish(ctx, digest, digestLen); |
| |
| assert(digestLen == 32); |
| } |
| |
| static void |
| CalculateDigest(unsigned int digestPos, uint8_t *handshakeMessage, |
| const uint8_t *key, size_t keyLen, uint8_t *digest) |
| { |
| const int messageLen = RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH; |
| uint8_t message[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH]; |
| |
| memcpy(message, handshakeMessage, digestPos); |
| memcpy(message + digestPos, |
| &handshakeMessage[digestPos + SHA256_DIGEST_LENGTH], |
| messageLen - digestPos); |
| |
| HMACsha256(message, messageLen, key, keyLen, digest); |
| } |
| |
| static bool |
| VerifyDigest(unsigned int digestPos, uint8_t *handshakeMessage, const uint8_t *key, |
| size_t keyLen) |
| { |
| uint8_t calcDigest[SHA256_DIGEST_LENGTH]; |
| |
| CalculateDigest(digestPos, handshakeMessage, key, keyLen, calcDigest); |
| |
| return memcmp(&handshakeMessage[digestPos], calcDigest, |
| SHA256_DIGEST_LENGTH) == 0; |
| } |
| |
| /* handshake |
| * |
| * Type = [1 bytes] plain: 0x03, encrypted: 0x06, 0x08, 0x09 |
| * -------------------------------------------------------------------- [1536 bytes] |
| * Uptime = [4 bytes] big endian unsigned number, uptime |
| * Version = [4 bytes] each byte represents a version number, e.g. 9.0.124.0 |
| * ... |
| * |
| */ |
| |
| static const uint32_t rtmpe8_keys[16][4] = { |
| {0xbff034b2, 0x11d9081f, 0xccdfb795, 0x748de732}, |
| {0x086a5eb6, 0x1743090e, 0x6ef05ab8, 0xfe5a39e2}, |
| {0x7b10956f, 0x76ce0521, 0x2388a73a, 0x440149a1}, |
| {0xa943f317, 0xebf11bb2, 0xa691a5ee, 0x17f36339}, |
| {0x7a30e00a, 0xb529e22c, 0xa087aea5, 0xc0cb79ac}, |
| {0xbdce0c23, 0x2febdeff, 0x1cfaae16, 0x1123239d}, |
| {0x55dd3f7b, 0x77e7e62e, 0x9bb8c499, 0xc9481ee4}, |
| {0x407bb6b4, 0x71e89136, 0xa7aebf55, 0xca33b839}, |
| {0xfcf6bdc3, 0xb63c3697, 0x7ce4f825, 0x04d959b2}, |
| {0x28e091fd, 0x41954c4c, 0x7fb7db00, 0xe3a066f8}, |
| {0x57845b76, 0x4f251b03, 0x46d45bcd, 0xa2c30d29}, |
| {0x0acceef8, 0xda55b546, 0x03473452, 0x5863713b}, |
| {0xb82075dc, 0xa75f1fee, 0xd84268e8, 0xa72a44cc}, |
| {0x07cf6e9e, 0xa16d7b25, 0x9fa7ae6c, 0xd92f5629}, |
| {0xfeb1eae4, 0x8c8c3ce1, 0x4e0064a7, 0x6a387c2a}, |
| {0x893a9427, 0xcc3013a2, 0xf106385b, 0xa829f927} |
| }; |
| |
| /* RTMPE type 8 uses XTEA on the regular signature |
| * http://en.wikipedia.org/wiki/XTEA |
| */ |
| static void rtmpe8_sig(uint8_t *in, uint8_t *out, int keyid) |
| { |
| unsigned int i, num_rounds = 32; |
| uint32_t v0, v1, sum=0, delta=0x9E3779B9; |
| uint32_t const *k; |
| |
| v0 = in[0] | (in[1] << 8) | (in[2] << 16) | (in[3] << 24); |
| v1 = in[4] | (in[5] << 8) | (in[6] << 16) | (in[7] << 24); |
| k = rtmpe8_keys[keyid]; |
| |
| for (i=0; i < num_rounds; i++) { |
| v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); |
| sum += delta; |
| v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); |
| } |
| |
| out[0] = v0; v0 >>= 8; |
| out[1] = v0; v0 >>= 8; |
| out[2] = v0; v0 >>= 8; |
| out[3] = v0; |
| |
| out[4] = v1; v1 >>= 8; |
| out[5] = v1; v1 >>= 8; |
| out[6] = v1; v1 >>= 8; |
| out[7] = v1; |
| } |
| |
| static bool |
| HandShake(RTMP * r, bool FP9HandShake) |
| { |
| int i, offalg = 0; |
| int dhposClient = 0; |
| int digestPosClient = 0; |
| bool encrypted = r->Link.protocol & RTMP_FEATURE_ENC; |
| |
| RC4_handle keyIn = 0; |
| RC4_handle keyOut = 0; |
| |
| int32_t *ip; |
| uint32_t uptime; |
| |
| uint8_t clientbuf[RTMP_SIG_SIZE + 4], *clientsig=clientbuf+4; |
| uint8_t serversig[RTMP_SIG_SIZE], client2[RTMP_SIG_SIZE], *reply; |
| uint8_t type; |
| getoff *getdh = NULL, *getdig = NULL; |
| |
| if (encrypted || r->Link.SWFSize) |
| FP9HandShake = true; |
| else |
| FP9HandShake = false; |
| |
| r->Link.rc4keyIn = r->Link.rc4keyOut = 0; |
| |
| if (encrypted) |
| { |
| clientsig[-1] = 0x06; /* 0x08 is RTMPE as well */ |
| offalg = 1; |
| } |
| else |
| clientsig[-1] = 0x03; |
| |
| uptime = htonl(RTMP_GetTime()); |
| memcpy(clientsig, &uptime, 4); |
| |
| if (FP9HandShake) |
| { |
| /* set version to at least 9.0.115.0 */ |
| if (encrypted) |
| { |
| clientsig[4] = 128; |
| clientsig[6] = 3; |
| } |
| else |
| { |
| clientsig[4] = 10; |
| clientsig[6] = 45; |
| } |
| clientsig[5] = 0; |
| clientsig[7] = 2; |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Client type: %02X", __FUNCTION__, clientsig[-1]); |
| getdig = digoff[offalg]; |
| getdh = dhoff[offalg]; |
| } |
| else |
| { |
| memset(&clientsig[4], 0, 4); |
| } |
| |
| /* generate random data */ |
| #ifdef _DEBUG |
| memset(clientsig+8, 0, RTMP_SIG_SIZE-8); |
| #else |
| ip = (int32_t *)(clientsig+8); |
| for (i = 2; i < RTMP_SIG_SIZE/4; i++) |
| *ip++ = rand(); |
| #endif |
| |
| /* set handshake digest */ |
| if (FP9HandShake) |
| { |
| if (encrypted) |
| { |
| /* generate Diffie-Hellmann parameters */ |
| r->Link.dh = DHInit(1024); |
| if (!r->Link.dh) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't initialize Diffie-Hellmann!", |
| __FUNCTION__); |
| return false; |
| } |
| |
| dhposClient = getdh(clientsig, RTMP_SIG_SIZE); |
| RTMP_Log(RTMP_LOGDEBUG, "%s: DH pubkey position: %d", __FUNCTION__, dhposClient); |
| |
| if (!DHGenerateKey(r->Link.dh)) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't generate Diffie-Hellmann public key!", |
| __FUNCTION__); |
| return false; |
| } |
| |
| if (!DHGetPublicKey(r->Link.dh, &clientsig[dhposClient], 128)) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't write public key!", __FUNCTION__); |
| return false; |
| } |
| } |
| |
| digestPosClient = getdig(clientsig, RTMP_SIG_SIZE); /* reuse this value in verification */ |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Client digest offset: %d", __FUNCTION__, |
| digestPosClient); |
| |
| CalculateDigest(digestPosClient, clientsig, GenuineFPKey, 30, |
| &clientsig[digestPosClient]); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Initial client digest: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, clientsig + digestPosClient, |
| SHA256_DIGEST_LENGTH); |
| } |
| |
| #ifdef _DEBUG |
| RTMP_Log(RTMP_LOGDEBUG, "Clientsig: "); |
| RTMP_LogHex(RTMP_LOGDEBUG, clientsig, RTMP_SIG_SIZE); |
| #endif |
| |
| if (!WriteN(r, (char *)clientsig-1, RTMP_SIG_SIZE + 1)) |
| return false; |
| |
| if (ReadN(r, (char *)&type, 1) != 1) /* 0x03 or 0x06 */ |
| return false; |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Type Answer : %02X", __FUNCTION__, type); |
| |
| if (type != clientsig[-1]) |
| RTMP_Log(RTMP_LOGWARNING, "%s: Type mismatch: client sent %d, server answered %d", |
| __FUNCTION__, clientsig[-1], type); |
| |
| if (ReadN(r, (char *)serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE) |
| return false; |
| |
| /* decode server response */ |
| memcpy(&uptime, serversig, 4); |
| uptime = ntohl(uptime); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Server Uptime : %d", __FUNCTION__, uptime); |
| RTMP_Log(RTMP_LOGDEBUG, "%s: FMS Version : %d.%d.%d.%d", __FUNCTION__, serversig[4], |
| serversig[5], serversig[6], serversig[7]); |
| |
| if (FP9HandShake && type == 3 && !serversig[4]) |
| FP9HandShake = false; |
| |
| #ifdef _DEBUG |
| RTMP_Log(RTMP_LOGDEBUG, "Server signature:"); |
| RTMP_LogHex(RTMP_LOGDEBUG, serversig, RTMP_SIG_SIZE); |
| #endif |
| |
| if (FP9HandShake) |
| { |
| uint8_t digestResp[SHA256_DIGEST_LENGTH]; |
| uint8_t *signatureResp = NULL; |
| |
| /* we have to use this signature now to find the correct algorithms for getting the digest and DH positions */ |
| int digestPosServer = getdig(serversig, RTMP_SIG_SIZE); |
| |
| if (!VerifyDigest(digestPosServer, serversig, GenuineFMSKey, 36)) |
| { |
| RTMP_Log(RTMP_LOGWARNING, "Trying different position for server digest!"); |
| offalg ^= 1; |
| getdig = digoff[offalg]; |
| getdh = dhoff[offalg]; |
| digestPosServer = getdig(serversig, RTMP_SIG_SIZE); |
| |
| if (!VerifyDigest(digestPosServer, serversig, GenuineFMSKey, 36)) |
| { |
| RTMP_Log(RTMP_LOGERROR, "Couldn't verify the server digest"); /* continuing anyway will probably fail */ |
| return false; |
| } |
| } |
| |
| /* generate SWFVerification token (SHA256 HMAC hash of decompressed SWF, key are the last 32 bytes of the server handshake) */ |
| if (r->Link.SWFSize) |
| { |
| const char swfVerify[] = { 0x01, 0x01 }; |
| char *vend = r->Link.SWFVerificationResponse+sizeof(r->Link.SWFVerificationResponse); |
| |
| memcpy(r->Link.SWFVerificationResponse, swfVerify, 2); |
| AMF_EncodeInt32(&r->Link.SWFVerificationResponse[2], vend, r->Link.SWFSize); |
| AMF_EncodeInt32(&r->Link.SWFVerificationResponse[6], vend, r->Link.SWFSize); |
| HMACsha256(r->Link.SWFHash, SHA256_DIGEST_LENGTH, |
| &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], |
| SHA256_DIGEST_LENGTH, |
| (uint8_t *)&r->Link.SWFVerificationResponse[10]); |
| } |
| |
| /* do Diffie-Hellmann Key exchange for encrypted RTMP */ |
| if (encrypted) |
| { |
| /* compute secret key */ |
| uint8_t secretKey[128] = { 0 }; |
| int len, dhposServer; |
| |
| dhposServer = getdh(serversig, RTMP_SIG_SIZE); |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Server DH public key offset: %d", __FUNCTION__, |
| dhposServer); |
| len = DHComputeSharedSecretKey(r->Link.dh, &serversig[dhposServer], |
| 128, secretKey); |
| if (len < 0) |
| { |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Wrong secret key position!", __FUNCTION__); |
| return false; |
| } |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Secret key: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, secretKey, 128); |
| |
| InitRC4Encryption(secretKey, |
| (uint8_t *) & serversig[dhposServer], |
| (uint8_t *) & clientsig[dhposClient], |
| &keyIn, &keyOut); |
| } |
| |
| |
| reply = client2; |
| #ifdef _DEBUG |
| memset(reply, 0xff, RTMP_SIG_SIZE); |
| #else |
| ip = (int32_t *)reply; |
| for (i = 0; i < RTMP_SIG_SIZE/4; i++) |
| *ip++ = rand(); |
| #endif |
| /* calculate response now */ |
| signatureResp = reply+RTMP_SIG_SIZE-SHA256_DIGEST_LENGTH; |
| |
| HMACsha256(&serversig[digestPosServer], SHA256_DIGEST_LENGTH, |
| GenuineFPKey, sizeof(GenuineFPKey), digestResp); |
| HMACsha256(reply, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digestResp, |
| SHA256_DIGEST_LENGTH, signatureResp); |
| |
| /* some info output */ |
| RTMP_Log(RTMP_LOGDEBUG, |
| "%s: Calculated digest key from secure key and server digest: ", |
| __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, digestResp, SHA256_DIGEST_LENGTH); |
| |
| #ifdef FP10 |
| if (type == 8 ) |
| { |
| uint8_t *dptr = digestResp; |
| uint8_t *sig = signatureResp; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe8_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #if 0 |
| else if (type == 9)) |
| { |
| uint8_t *dptr = digestResp; |
| uint8_t *sig = signatureResp; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe9_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #endif |
| #endif |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Client signature calculated:", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, signatureResp, SHA256_DIGEST_LENGTH); |
| } |
| else |
| { |
| reply = serversig; |
| #if 0 |
| uptime = htonl(RTMP_GetTime()); |
| memcpy(reply+4, &uptime, 4); |
| #endif |
| } |
| |
| #ifdef _DEBUG |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Sending handshake response: ", |
| __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, reply, RTMP_SIG_SIZE); |
| #endif |
| if (!WriteN(r, (char *)reply, RTMP_SIG_SIZE)) |
| return false; |
| |
| /* 2nd part of handshake */ |
| if (ReadN(r, (char *)serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE) |
| return false; |
| |
| #ifdef _DEBUG |
| RTMP_Log(RTMP_LOGDEBUG, "%s: 2nd handshake: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, serversig, RTMP_SIG_SIZE); |
| #endif |
| |
| if (FP9HandShake) |
| { |
| uint8_t signature[SHA256_DIGEST_LENGTH]; |
| uint8_t digest[SHA256_DIGEST_LENGTH]; |
| |
| if (serversig[4] == 0 && serversig[5] == 0 && serversig[6] == 0 |
| && serversig[7] == 0) |
| { |
| RTMP_Log(RTMP_LOGDEBUG, |
| "%s: Wait, did the server just refuse signed authentication?", |
| __FUNCTION__); |
| } |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Server sent signature:", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], |
| SHA256_DIGEST_LENGTH); |
| |
| /* verify server response */ |
| HMACsha256(&clientsig[digestPosClient], SHA256_DIGEST_LENGTH, |
| GenuineFMSKey, sizeof(GenuineFMSKey), digest); |
| HMACsha256(serversig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digest, |
| SHA256_DIGEST_LENGTH, signature); |
| |
| /* show some information */ |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Digest key: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, digest, SHA256_DIGEST_LENGTH); |
| |
| #ifdef FP10 |
| if (type == 8 ) |
| { |
| uint8_t *dptr = digest; |
| uint8_t *sig = signature; |
| /* encrypt signature */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe8_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #if 0 |
| else if (type == 9) |
| { |
| uint8_t *dptr = digest; |
| uint8_t *sig = signature; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe9_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #endif |
| #endif |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Signature calculated:", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, signature, SHA256_DIGEST_LENGTH); |
| if (memcmp |
| (signature, &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], |
| SHA256_DIGEST_LENGTH) != 0) |
| { |
| RTMP_Log(RTMP_LOGWARNING, "%s: Server not genuine Adobe!", __FUNCTION__); |
| return false; |
| } |
| else |
| { |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Genuine Adobe Flash Media Server", __FUNCTION__); |
| } |
| |
| if (encrypted) |
| { |
| char buff[RTMP_SIG_SIZE]; |
| /* set keys for encryption from now on */ |
| r->Link.rc4keyIn = keyIn; |
| r->Link.rc4keyOut = keyOut; |
| |
| |
| /* update the keystreams */ |
| if (r->Link.rc4keyIn) |
| { |
| RC4_encrypt(r->Link.rc4keyIn, RTMP_SIG_SIZE, (uint8_t *) buff); |
| } |
| |
| if (r->Link.rc4keyOut) |
| { |
| RC4_encrypt(r->Link.rc4keyOut, RTMP_SIG_SIZE, (uint8_t *) buff); |
| } |
| } |
| } |
| else |
| { |
| if (memcmp(serversig, clientsig, RTMP_SIG_SIZE) != 0) |
| { |
| RTMP_Log(RTMP_LOGWARNING, "%s: client signature does not match!", |
| __FUNCTION__); |
| } |
| } |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Handshaking finished....", __FUNCTION__); |
| return true; |
| } |
| |
| static bool |
| SHandShake(RTMP * r) |
| { |
| int i, offalg = 0; |
| int dhposServer = 0; |
| int digestPosServer = 0; |
| RC4_handle keyIn = 0; |
| RC4_handle keyOut = 0; |
| bool FP9HandShake = false; |
| bool encrypted; |
| int32_t *ip; |
| |
| uint8_t clientsig[RTMP_SIG_SIZE]; |
| uint8_t serverbuf[RTMP_SIG_SIZE + 4], *serversig = serverbuf+4; |
| uint8_t type; |
| uint32_t uptime; |
| getoff *getdh = NULL, *getdig = NULL; |
| |
| if (ReadN(r, (char *)&type, 1) != 1) /* 0x03 or 0x06 */ |
| return false; |
| |
| if (ReadN(r, (char *)clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE) |
| return false; |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Type Requested : %02X", __FUNCTION__, type); |
| RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE); |
| |
| if (type == 3) |
| { |
| encrypted = false; |
| } |
| else if (type == 6 || type == 8) |
| { |
| offalg = 1; |
| encrypted = true; |
| FP9HandShake = true; |
| r->Link.protocol |= RTMP_FEATURE_ENC; |
| /* use FP10 if client is capable */ |
| if (clientsig[4] == 128) |
| type = 8; |
| } |
| else |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Unknown version %02x", |
| __FUNCTION__, type); |
| return false; |
| } |
| |
| if (!FP9HandShake && clientsig[4]) |
| FP9HandShake = true; |
| |
| serversig[-1] = type; |
| |
| r->Link.rc4keyIn = r->Link.rc4keyOut = 0; |
| |
| uptime = htonl(RTMP_GetTime()); |
| memcpy(serversig, &uptime, 4); |
| |
| if (FP9HandShake) |
| { |
| /* Server version */ |
| serversig[4] = 3; |
| serversig[5] = 5; |
| serversig[6] = 1; |
| serversig[7] = 1; |
| |
| getdig = digoff[offalg]; |
| getdh = dhoff[offalg]; |
| } |
| else |
| { |
| memset(&serversig[4], 0, 4); |
| } |
| |
| /* generate random data */ |
| #ifdef _DEBUG |
| memset(serversig+8, 0, RTMP_SIG_SIZE-8); |
| #else |
| ip = (int32_t *)(serversig+8); |
| for (i = 2; i < RTMP_SIG_SIZE/4; i++) |
| *ip++ = rand(); |
| #endif |
| |
| /* set handshake digest */ |
| if (FP9HandShake) |
| { |
| if (encrypted) |
| { |
| /* generate Diffie-Hellmann parameters */ |
| r->Link.dh = DHInit(1024); |
| if (!r->Link.dh) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't initialize Diffie-Hellmann!", |
| __FUNCTION__); |
| return false; |
| } |
| |
| dhposServer = getdh(serversig, RTMP_SIG_SIZE); |
| RTMP_Log(RTMP_LOGDEBUG, "%s: DH pubkey position: %d", __FUNCTION__, dhposServer); |
| |
| if (!DHGenerateKey(r->Link.dh)) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't generate Diffie-Hellmann public key!", |
| __FUNCTION__); |
| return false; |
| } |
| |
| if (!DHGetPublicKey |
| (r->Link.dh, (uint8_t *) &serversig[dhposServer], 128)) |
| { |
| RTMP_Log(RTMP_LOGERROR, "%s: Couldn't write public key!", __FUNCTION__); |
| return false; |
| } |
| } |
| |
| digestPosServer = getdig(serversig, RTMP_SIG_SIZE); /* reuse this value in verification */ |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Server digest offset: %d", __FUNCTION__, |
| digestPosServer); |
| |
| CalculateDigest(digestPosServer, serversig, GenuineFMSKey, 36, |
| &serversig[digestPosServer]); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Initial server digest: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, serversig + digestPosServer, |
| SHA256_DIGEST_LENGTH); |
| } |
| |
| RTMP_Log(RTMP_LOGDEBUG2, "Serversig: "); |
| RTMP_LogHex(RTMP_LOGDEBUG2, serversig, RTMP_SIG_SIZE); |
| |
| if (!WriteN(r, (char *)serversig-1, RTMP_SIG_SIZE + 1)) |
| return false; |
| |
| /* decode client response */ |
| memcpy(&uptime, clientsig, 4); |
| uptime = ntohl(uptime); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Client Uptime : %d", __FUNCTION__, uptime); |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__, clientsig[4], |
| clientsig[5], clientsig[6], clientsig[7]); |
| |
| if (FP9HandShake) |
| { |
| uint8_t digestResp[SHA256_DIGEST_LENGTH]; |
| uint8_t *signatureResp = NULL; |
| |
| /* we have to use this signature now to find the correct algorithms for getting the digest and DH positions */ |
| int digestPosClient = getdig(clientsig, RTMP_SIG_SIZE); |
| |
| if (!VerifyDigest(digestPosClient, clientsig, GenuineFPKey, 30)) |
| { |
| RTMP_Log(RTMP_LOGWARNING, "Trying different position for client digest!"); |
| offalg ^= 1; |
| getdig = digoff[offalg]; |
| getdh = dhoff[offalg]; |
| |
| digestPosClient = getdig(clientsig, RTMP_SIG_SIZE); |
| |
| if (!VerifyDigest(digestPosClient, clientsig, GenuineFPKey, 30)) |
| { |
| RTMP_Log(RTMP_LOGERROR, "Couldn't verify the client digest"); /* continuing anyway will probably fail */ |
| return false; |
| } |
| } |
| |
| /* generate SWFVerification token (SHA256 HMAC hash of decompressed SWF, key are the last 32 bytes of the server handshake) */ |
| if (r->Link.SWFSize) |
| { |
| const char swfVerify[] = { 0x01, 0x01 }; |
| char *vend = r->Link.SWFVerificationResponse+sizeof(r->Link.SWFVerificationResponse); |
| |
| memcpy(r->Link.SWFVerificationResponse, swfVerify, 2); |
| AMF_EncodeInt32(&r->Link.SWFVerificationResponse[2], vend, r->Link.SWFSize); |
| AMF_EncodeInt32(&r->Link.SWFVerificationResponse[6], vend, r->Link.SWFSize); |
| HMACsha256(r->Link.SWFHash, SHA256_DIGEST_LENGTH, |
| &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], |
| SHA256_DIGEST_LENGTH, |
| (uint8_t *)&r->Link.SWFVerificationResponse[10]); |
| } |
| |
| /* do Diffie-Hellmann Key exchange for encrypted RTMP */ |
| if (encrypted) |
| { |
| int dhposClient, len; |
| /* compute secret key */ |
| uint8_t secretKey[128] = { 0 }; |
| |
| dhposClient = getdh(clientsig, RTMP_SIG_SIZE); |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Client DH public key offset: %d", __FUNCTION__, |
| dhposClient); |
| len = |
| DHComputeSharedSecretKey(r->Link.dh, |
| (uint8_t *) &clientsig[dhposClient], 128, |
| secretKey); |
| if (len < 0) |
| { |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Wrong secret key position!", __FUNCTION__); |
| return false; |
| } |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Secret key: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, secretKey, 128); |
| |
| InitRC4Encryption(secretKey, |
| (uint8_t *) &clientsig[dhposClient], |
| (uint8_t *) &serversig[dhposServer], |
| &keyIn, &keyOut); |
| } |
| |
| |
| /* calculate response now */ |
| signatureResp = clientsig+RTMP_SIG_SIZE-SHA256_DIGEST_LENGTH; |
| |
| HMACsha256(&clientsig[digestPosClient], SHA256_DIGEST_LENGTH, |
| GenuineFMSKey, sizeof(GenuineFMSKey), digestResp); |
| HMACsha256(clientsig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digestResp, |
| SHA256_DIGEST_LENGTH, signatureResp); |
| #ifdef FP10 |
| if (type == 8 ) |
| { |
| uint8_t *dptr = digestResp; |
| uint8_t *sig = signatureResp; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe8_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #if 0 |
| else if (type == 9)) |
| { |
| uint8_t *dptr = digestResp; |
| uint8_t *sig = signatureResp; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe9_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #endif |
| #endif |
| |
| /* some info output */ |
| RTMP_Log(RTMP_LOGDEBUG, |
| "%s: Calculated digest key from secure key and server digest: ", |
| __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, digestResp, SHA256_DIGEST_LENGTH); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Server signature calculated:", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, signatureResp, SHA256_DIGEST_LENGTH); |
| } |
| #if 0 |
| else |
| { |
| uptime = htonl(RTMP_GetTime()); |
| memcpy(clientsig+4, &uptime, 4); |
| } |
| #endif |
| |
| RTMP_Log(RTMP_LOGDEBUG2, "%s: Sending handshake response: ", |
| __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE); |
| |
| if (!WriteN(r, (char *)clientsig, RTMP_SIG_SIZE)) |
| return false; |
| |
| /* 2nd part of handshake */ |
| if (ReadN(r, (char *)clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE) |
| return false; |
| |
| RTMP_Log(RTMP_LOGDEBUG2, "%s: 2nd handshake: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE); |
| |
| if (FP9HandShake) |
| { |
| uint8_t signature[SHA256_DIGEST_LENGTH]; |
| uint8_t digest[SHA256_DIGEST_LENGTH]; |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Client sent signature:", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, &clientsig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], |
| SHA256_DIGEST_LENGTH); |
| |
| /* verify client response */ |
| HMACsha256(&serversig[digestPosServer], SHA256_DIGEST_LENGTH, |
| GenuineFPKey, sizeof(GenuineFPKey), digest); |
| HMACsha256(clientsig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digest, |
| SHA256_DIGEST_LENGTH, signature); |
| #ifdef FP10 |
| if (type == 8 ) |
| { |
| uint8_t *dptr = digest; |
| uint8_t *sig = signature; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe8_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #if 0 |
| else if (type == 9)) |
| { |
| uint8_t *dptr = digestResp; |
| uint8_t *sig = signatureResp; |
| /* encrypt signatureResp */ |
| for (i=0; i<SHA256_DIGEST_LENGTH; i+=8) |
| rtmpe9_sig(sig+i, sig+i, dptr[i] % 15); |
| } |
| #endif |
| #endif |
| |
| /* show some information */ |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Digest key: ", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, digest, SHA256_DIGEST_LENGTH); |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Signature calculated:", __FUNCTION__); |
| RTMP_LogHex(RTMP_LOGDEBUG, signature, SHA256_DIGEST_LENGTH); |
| if (memcmp |
| (signature, &clientsig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], |
| SHA256_DIGEST_LENGTH) != 0) |
| { |
| RTMP_Log(RTMP_LOGWARNING, "%s: Client not genuine Adobe!", __FUNCTION__); |
| return false; |
| } |
| else |
| { |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Genuine Adobe Flash Player", __FUNCTION__); |
| } |
| |
| if (encrypted) |
| { |
| char buff[RTMP_SIG_SIZE]; |
| /* set keys for encryption from now on */ |
| r->Link.rc4keyIn = keyIn; |
| r->Link.rc4keyOut = keyOut; |
| |
| /* update the keystreams */ |
| if (r->Link.rc4keyIn) |
| { |
| RC4_encrypt(r->Link.rc4keyIn, RTMP_SIG_SIZE, (uint8_t *) buff); |
| } |
| |
| if (r->Link.rc4keyOut) |
| { |
| RC4_encrypt(r->Link.rc4keyOut, RTMP_SIG_SIZE, (uint8_t *) buff); |
| } |
| } |
| } |
| else |
| { |
| if (memcmp(serversig, clientsig, RTMP_SIG_SIZE) != 0) |
| { |
| RTMP_Log(RTMP_LOGWARNING, "%s: client signature does not match!", |
| __FUNCTION__); |
| } |
| } |
| |
| RTMP_Log(RTMP_LOGDEBUG, "%s: Handshaking finished....", __FUNCTION__); |
| return true; |
| } |