143 lines
4.9 KiB
C
Executable File
143 lines
4.9 KiB
C
Executable File
/*
|
|
* Copyright (c) 2019 dsafa22, All Rights Reserved.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*/
|
|
|
|
#include "mirror_buffer.h"
|
|
#include "raop_rtp.h"
|
|
#include "raop_rtp.h"
|
|
#include <stdint.h>
|
|
#include "crypto.h"
|
|
#include "compat.h"
|
|
#include <math.h>
|
|
#include <stdlib.h>
|
|
#include <assert.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
|
|
//#define DUMP_KEI_IV
|
|
struct mirror_buffer_s {
|
|
logger_t *logger;
|
|
aes_ctx_t *aes_ctx;
|
|
int nextDecryptCount;
|
|
uint8_t og[16];
|
|
/* AES key and IV */
|
|
// Need secondary processing to use
|
|
unsigned char aeskey[RAOP_AESKEY_LEN];
|
|
unsigned char ecdh_secret[32];
|
|
};
|
|
|
|
void
|
|
mirror_buffer_init_aes(mirror_buffer_t *mirror_buffer, uint64_t streamConnectionID)
|
|
{
|
|
sha_ctx_t *ctx = sha_init();
|
|
unsigned char eaeskey[64] = {};
|
|
memcpy(eaeskey, mirror_buffer->aeskey, 16);
|
|
sha_update(ctx, eaeskey, 16);
|
|
sha_update(ctx, mirror_buffer->ecdh_secret, 32);
|
|
sha_final(ctx, eaeskey, NULL);
|
|
|
|
unsigned char hash1[64];
|
|
unsigned char hash2[64];
|
|
char* skey = "AirPlayStreamKey";
|
|
char* siv = "AirPlayStreamIV";
|
|
unsigned char skeyall[255];
|
|
unsigned char sivall[255];
|
|
sprintf((char*) skeyall, "%s%llu", skey, streamConnectionID);
|
|
sprintf((char*) sivall, "%s%llu", siv, streamConnectionID);
|
|
sha_reset(ctx);
|
|
sha_update(ctx, skeyall, strlen((char*) skeyall));
|
|
sha_update(ctx, eaeskey, 16);
|
|
sha_final(ctx, hash1, NULL);
|
|
|
|
sha_reset(ctx);
|
|
sha_update(ctx, sivall, strlen((char*) sivall));
|
|
sha_update(ctx, eaeskey, 16);
|
|
sha_final(ctx, hash2, NULL);
|
|
sha_destroy(ctx);
|
|
|
|
unsigned char decrypt_aeskey[16];
|
|
unsigned char decrypt_aesiv[16];
|
|
memcpy(decrypt_aeskey, hash1, 16);
|
|
memcpy(decrypt_aesiv, hash2, 16);
|
|
#ifdef DUMP_KEI_IV
|
|
FILE* keyfile = fopen("/sdcard/111.keyiv", "wb");
|
|
fwrite(decrypt_aeskey, 16, 1, keyfile);
|
|
fwrite(decrypt_aesiv, 16, 1, keyfile);
|
|
fclose(keyfile);
|
|
#endif
|
|
// Need to be initialized externally
|
|
mirror_buffer->aes_ctx = aes_ctr_init(decrypt_aeskey, decrypt_aesiv);
|
|
mirror_buffer->nextDecryptCount = 0;
|
|
}
|
|
|
|
mirror_buffer_t *
|
|
mirror_buffer_init(logger_t *logger,
|
|
const unsigned char *aeskey,
|
|
const unsigned char *ecdh_secret)
|
|
{
|
|
mirror_buffer_t *mirror_buffer;
|
|
assert(aeskey);
|
|
assert(ecdh_secret);
|
|
mirror_buffer = calloc(1, sizeof(mirror_buffer_t));
|
|
if (!mirror_buffer) {
|
|
return NULL;
|
|
}
|
|
memcpy(mirror_buffer->aeskey, aeskey, RAOP_AESKEY_LEN);
|
|
memcpy(mirror_buffer->ecdh_secret, ecdh_secret, 32);
|
|
mirror_buffer->logger = logger;
|
|
mirror_buffer->nextDecryptCount = 0;
|
|
//mirror_buffer_init_aes(mirror_buffer, aeskey, ecdh_secret, streamConnectionID);
|
|
return mirror_buffer;
|
|
}
|
|
|
|
void mirror_buffer_decrypt(mirror_buffer_t *mirror_buffer, unsigned char* input, unsigned char* output, int inputLen) {
|
|
// Start decrypting
|
|
if (mirror_buffer->nextDecryptCount > 0) {//mirror_buffer->nextDecryptCount = 10
|
|
for (int i = 0; i < mirror_buffer->nextDecryptCount; i++) {
|
|
output[i] = (input[i] ^ mirror_buffer->og[(16 - mirror_buffer->nextDecryptCount) + i]);
|
|
}
|
|
}
|
|
// Handling encrypted bytes
|
|
int encryptlen = ((inputLen - mirror_buffer->nextDecryptCount) / 16) * 16;
|
|
// Aes decryption
|
|
aes_ctr_start_fresh_block(mirror_buffer->aes_ctx);
|
|
aes_ctr_decrypt(mirror_buffer->aes_ctx, input + mirror_buffer->nextDecryptCount,
|
|
input + mirror_buffer->nextDecryptCount, encryptlen);
|
|
// Copy to output
|
|
memcpy(output + mirror_buffer->nextDecryptCount, input + mirror_buffer->nextDecryptCount, encryptlen);
|
|
int outputlength = mirror_buffer->nextDecryptCount + encryptlen;
|
|
// Processing remaining length
|
|
int restlen = (inputLen - mirror_buffer->nextDecryptCount) % 16;
|
|
int reststart = inputLen - restlen;
|
|
mirror_buffer->nextDecryptCount = 0;
|
|
if (restlen > 0) {
|
|
memset(mirror_buffer->og, 0, 16);
|
|
memcpy(mirror_buffer->og, input + reststart, restlen);
|
|
aes_ctr_decrypt(mirror_buffer->aes_ctx, mirror_buffer->og, mirror_buffer->og, 16);
|
|
for (int j = 0; j < restlen; j++) {
|
|
output[reststart + j] = mirror_buffer->og[j];
|
|
}
|
|
outputlength += restlen;
|
|
mirror_buffer->nextDecryptCount = 16 - restlen;// Difference 16-6=10 bytes
|
|
}
|
|
}
|
|
|
|
void
|
|
mirror_buffer_destroy(mirror_buffer_t *mirror_buffer)
|
|
{
|
|
if (mirror_buffer) {
|
|
aes_ctr_destroy(mirror_buffer->aes_ctx);
|
|
free(mirror_buffer);
|
|
}
|
|
}
|