Files
AirplayServer/lib/mirror_buffer.c
2020-04-19 14:49:21 +02:00

143 lines
4.9 KiB
C
Executable File

/*
* Copyright (c) 2019 dsafa22, All Rights Reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*/
#include "mirror_buffer.h"
#include "raop_rtp.h"
#include "raop_rtp.h"
#include <stdint.h>
#include "crypto.h"
#include "compat.h"
#include <math.h>
#include <stdlib.h>
#include <assert.h>
#include <string.h>
#include <stdio.h>
//#define DUMP_KEI_IV
struct mirror_buffer_s {
logger_t *logger;
aes_ctx_t *aes_ctx;
int nextDecryptCount;
uint8_t og[16];
/* AES key and IV */
// Need secondary processing to use
unsigned char aeskey[RAOP_AESKEY_LEN];
unsigned char ecdh_secret[32];
};
void
mirror_buffer_init_aes(mirror_buffer_t *mirror_buffer, uint64_t streamConnectionID)
{
sha_ctx_t *ctx = sha_init();
unsigned char eaeskey[64] = {};
memcpy(eaeskey, mirror_buffer->aeskey, 16);
sha_update(ctx, eaeskey, 16);
sha_update(ctx, mirror_buffer->ecdh_secret, 32);
sha_final(ctx, eaeskey, NULL);
unsigned char hash1[64];
unsigned char hash2[64];
char* skey = "AirPlayStreamKey";
char* siv = "AirPlayStreamIV";
unsigned char skeyall[255];
unsigned char sivall[255];
sprintf((char*) skeyall, "%s%llu", skey, streamConnectionID);
sprintf((char*) sivall, "%s%llu", siv, streamConnectionID);
sha_reset(ctx);
sha_update(ctx, skeyall, strlen((char*) skeyall));
sha_update(ctx, eaeskey, 16);
sha_final(ctx, hash1, NULL);
sha_reset(ctx);
sha_update(ctx, sivall, strlen((char*) sivall));
sha_update(ctx, eaeskey, 16);
sha_final(ctx, hash2, NULL);
sha_destroy(ctx);
unsigned char decrypt_aeskey[16];
unsigned char decrypt_aesiv[16];
memcpy(decrypt_aeskey, hash1, 16);
memcpy(decrypt_aesiv, hash2, 16);
#ifdef DUMP_KEI_IV
FILE* keyfile = fopen("/sdcard/111.keyiv", "wb");
fwrite(decrypt_aeskey, 16, 1, keyfile);
fwrite(decrypt_aesiv, 16, 1, keyfile);
fclose(keyfile);
#endif
// Need to be initialized externally
mirror_buffer->aes_ctx = aes_ctr_init(decrypt_aeskey, decrypt_aesiv);
mirror_buffer->nextDecryptCount = 0;
}
mirror_buffer_t *
mirror_buffer_init(logger_t *logger,
const unsigned char *aeskey,
const unsigned char *ecdh_secret)
{
mirror_buffer_t *mirror_buffer;
assert(aeskey);
assert(ecdh_secret);
mirror_buffer = calloc(1, sizeof(mirror_buffer_t));
if (!mirror_buffer) {
return NULL;
}
memcpy(mirror_buffer->aeskey, aeskey, RAOP_AESKEY_LEN);
memcpy(mirror_buffer->ecdh_secret, ecdh_secret, 32);
mirror_buffer->logger = logger;
mirror_buffer->nextDecryptCount = 0;
//mirror_buffer_init_aes(mirror_buffer, aeskey, ecdh_secret, streamConnectionID);
return mirror_buffer;
}
void mirror_buffer_decrypt(mirror_buffer_t *mirror_buffer, unsigned char* input, unsigned char* output, int inputLen) {
// Start decrypting
if (mirror_buffer->nextDecryptCount > 0) {//mirror_buffer->nextDecryptCount = 10
for (int i = 0; i < mirror_buffer->nextDecryptCount; i++) {
output[i] = (input[i] ^ mirror_buffer->og[(16 - mirror_buffer->nextDecryptCount) + i]);
}
}
// Handling encrypted bytes
int encryptlen = ((inputLen - mirror_buffer->nextDecryptCount) / 16) * 16;
// Aes decryption
aes_ctr_start_fresh_block(mirror_buffer->aes_ctx);
aes_ctr_decrypt(mirror_buffer->aes_ctx, input + mirror_buffer->nextDecryptCount,
input + mirror_buffer->nextDecryptCount, encryptlen);
// Copy to output
memcpy(output + mirror_buffer->nextDecryptCount, input + mirror_buffer->nextDecryptCount, encryptlen);
int outputlength = mirror_buffer->nextDecryptCount + encryptlen;
// Processing remaining length
int restlen = (inputLen - mirror_buffer->nextDecryptCount) % 16;
int reststart = inputLen - restlen;
mirror_buffer->nextDecryptCount = 0;
if (restlen > 0) {
memset(mirror_buffer->og, 0, 16);
memcpy(mirror_buffer->og, input + reststart, restlen);
aes_ctr_decrypt(mirror_buffer->aes_ctx, mirror_buffer->og, mirror_buffer->og, 16);
for (int j = 0; j < restlen; j++) {
output[reststart + j] = mirror_buffer->og[j];
}
outputlength += restlen;
mirror_buffer->nextDecryptCount = 16 - restlen;// Difference 16-6=10 bytes
}
}
void
mirror_buffer_destroy(mirror_buffer_t *mirror_buffer)
{
if (mirror_buffer) {
aes_ctr_destroy(mirror_buffer->aes_ctx);
free(mirror_buffer);
}
}