stream-deploy/ZLM/3rdpart/media-server/librtmp/source/rtmp-handshake.c

287 lines
7.9 KiB
C++

#include "rtmp-handshake.h"
#include "rtmp-util.h"
#include <stdlib.h>
#include <string.h>
#include <assert.h>
#include <math.h>
#if defined(_OPENSSL_)
#include <openssl/sha.h>
#include <openssl/hmac.h>
#define _FLASH_HANDSHAKE_
#elif defined(_IETF_HMAC_)
#include "sha.h"
#define SHA256_DIGEST_LENGTH SHA256HashSize
#define _FLASH_HANDSHAKE_
#endif
#if defined(_FLASH_HANDSHAKE_)
// nginx-rtmp-module / ngx_rtmp_handshake.c
static const uint8_t rtmp_server_key[] = {
'G', 'e', 'n', 'u', 'i', 'n', 'e', ' ', 'A', 'd', 'o', 'b', 'e', ' ',
'F', 'l', 'a', 's', 'h', ' ', 'M', 'e', 'd', 'i', 'a', ' ',
'S', 'e', 'r', 'v', 'e', 'r', ' ',
'0', '0', '1', /* Genuine Adobe Flash Media Server 001 */
0xF0, 0xEE, 0xC2, 0x4A, 0x80, 0x68, 0xBE, 0xE8, 0x2E, 0x00, 0xD0, 0xD1,
0x02, 0x9E, 0x7E, 0x57, 0x6E, 0xEC, 0x5D, 0x2D, 0x29, 0x80, 0x6F, 0xAB,
0x93, 0xB8, 0xE6, 0x36, 0xCF, 0xEB, 0x31, 0xAE
};
static const uint8_t rtmp_client_key[] = {
'G', 'e', 'n', 'u', 'i', 'n', 'e', ' ', 'A', 'd', 'o', 'b', 'e', ' ',
'F', 'l', 'a', 's', 'h', ' ', 'P', 'l', 'a', 'y', 'e', 'r', ' ',
'0', '0', '1', /* Genuine Adobe Flash Player 001 */
0xF0, 0xEE, 0xC2, 0x4A, 0x80, 0x68, 0xBE, 0xE8, 0x2E, 0x00, 0xD0, 0xD1,
0x02, 0x9E, 0x7E, 0x57, 0x6E, 0xEC, 0x5D, 0x2D, 0x29, 0x80, 0x6F, 0xAB,
0x93, 0xB8, 0xE6, 0x36, 0xCF, 0xEB, 0x31, 0xAE
};
static const uint8_t rtmp_server_version[] = {
0x0D, 0x0E, 0x0A, 0x0D
};
static const uint8_t rtmp_client_version[] = {
0x0C, 0x00, 0x0D, 0x0E
};
#if defined(_OPENSSL_)
static int rtmp_handshake_make_digest(const uint8_t* key, size_t len, const uint8_t* ptr, size_t ptrlen, const uint8_t* digest, uint8_t* dst)
{
static HMAC_CTX *hmac;
unsigned int digestlen;
if (hmac == NULL) {
#if OPENSSL_VERSION_NUMBER < 0x10100000L
static HMAC_CTX shmac;
hmac = &shmac;
HMAC_CTX_init(hmac);
#else
hmac = HMAC_CTX_new();
#endif
}
HMAC_Init_ex(hmac, key, len, EVP_sha256(), NULL);
if (digest)
{
assert(digest + SHA256_DIGEST_LENGTH <= ptr + ptrlen);
HMAC_Update(hmac, ptr, digest - ptr);
if (digest + SHA256_DIGEST_LENGTH < ptr + ptrlen)
HMAC_Update(hmac, digest + SHA256_DIGEST_LENGTH, ptrlen - (digest - ptr) - SHA256_DIGEST_LENGTH);
}
else
{
HMAC_Update(hmac, ptr, ptrlen);
}
HMAC_Final(hmac, dst, &digestlen);
assert(digestlen == SHA256_DIGEST_LENGTH);
return 0;
}
#else
static int rtmp_handshake_make_digest(const uint8_t* key, size_t len, const uint8_t* ptr, size_t ptrlen, const uint8_t* digest, uint8_t* dst)
{
HMACContext hmac;
hmacReset(&hmac, SHA256, key, len);
if (digest)
{
assert(digest + SHA256_DIGEST_LENGTH <= ptr + ptrlen);
hmacInput(&hmac, ptr, digest - ptr);
if (digest + SHA256_DIGEST_LENGTH < ptr + ptrlen)
hmacInput(&hmac, digest + SHA256_DIGEST_LENGTH, ptrlen - (digest - ptr) - SHA256_DIGEST_LENGTH);
}
else
{
hmacInput(&hmac, ptr, ptrlen);
}
hmacResult(&hmac, dst);
return 0;
}
#endif
/*
// http://blog.csdn.net/win_lin/article/details/13006803
// 764-bytes key
random-data: (offset)bytes
key-data: 128bytes
random-data: (764-offset-128-4)bytes
offset: 4bytes
// 764-bytes digest
offset: 4bytes
random-data: (offset)bytes
digest-data: 32bytes
random-data: (764-4-offset-32)bytes
*/
static const uint8_t* rtmp_handshake_find_digest(const uint8_t* handshake, size_t offset, const uint8_t* key, size_t len)
{
uint32_t bytes;
uint8_t digest[SHA256_DIGEST_LENGTH];
bytes = handshake[offset + 0];
bytes += handshake[offset + 1];
bytes += handshake[offset + 2];
bytes += handshake[offset + 3];
bytes %= 728;/*764 - 4bytesoffset - 32bytesdigest*/
rtmp_handshake_make_digest(key, len, handshake, RTMP_HANDSHAKE_SIZE, handshake + offset + 4 + bytes, digest);
if (0 == memcmp(digest, handshake + offset + 4 + bytes, SHA256_DIGEST_LENGTH))
return handshake + offset + 4 + bytes;
return NULL;
}
static int rtmp_handshake_parse_challenge(const uint8_t* handshake, const uint8_t* key, size_t len, uint8_t digest[SHA256_DIGEST_LENGTH])
{
uint32_t epoch;
uint32_t version;
const uint8_t* p;
be_read_uint32(handshake, &epoch);
be_read_uint32(handshake + 4, &version);
if (0 == version)
{
// simple handshake
return 0;
}
p = rtmp_handshake_find_digest(handshake, 764 + 8, key, len);
if(NULL == p)
p = rtmp_handshake_find_digest(handshake, 8, key, len);
if (p)
memcpy(digest, p, SHA256_DIGEST_LENGTH);
return p ? 1 : 0;
}
static int rtmp_handshake_create_challenge(uint8_t* handshake, const uint8_t* key, size_t len)
{
uint32_t offset;
uint8_t* digest;
offset = handshake[8];
offset += handshake[9];
offset += handshake[10];
offset += handshake[11];
digest = handshake + 12 + (offset % 728/*764 - 4bytesoffset - 32bytesdigest*/);
return rtmp_handshake_make_digest(key, len, handshake, RTMP_HANDSHAKE_SIZE, digest, digest);
}
static int rtmp_handshake_create_response(uint8_t* handshake, const uint8_t* key, size_t len)
{
uint8_t digest[SHA256_DIGEST_LENGTH];
rtmp_handshake_make_digest(key, len, handshake, RTMP_HANDSHAKE_SIZE - SHA256_DIGEST_LENGTH, NULL, digest);
memcpy(handshake + RTMP_HANDSHAKE_SIZE - SHA256_DIGEST_LENGTH, digest, SHA256_DIGEST_LENGTH);
return 0;
}
#endif
static void rtmp_handshake_random(uint8_t* p, uint32_t timestamp)
{
int i;
srand(timestamp);
for (i = 0; i * 4 < RTMP_HANDSHAKE_SIZE - 8; i++)
{
*((int*)p + i) = rand();
}
}
int rtmp_handshake_c0(uint8_t* c0, int version)
{
assert(RTMP_VERSION == version);
*c0 = (uint8_t)version;
return 1;
}
int rtmp_handshake_c1(uint8_t* c1, uint32_t timestamp)
{
be_write_uint32(c1, timestamp);
#if defined(_FLASH_HANDSHAKE_)
memcpy(c1 + 4, rtmp_client_version, 4);
rtmp_handshake_random(c1 + 8, timestamp);
rtmp_handshake_create_challenge(c1, rtmp_client_key, 30);
#else
be_write_uint32(c1 + 4, 0);
rtmp_handshake_random(c1 + 8, timestamp);
#endif
return RTMP_HANDSHAKE_SIZE;
}
int rtmp_handshake_c2(uint8_t* c2, uint32_t timestamp, const uint8_t* s1, size_t bytes)
{
#if defined(_FLASH_HANDSHAKE_)
uint8_t digest[SHA256_DIGEST_LENGTH];
assert(RTMP_HANDSHAKE_SIZE == bytes);
if (1 == rtmp_handshake_parse_challenge(s1, rtmp_server_key, 36, digest))
{
rtmp_handshake_make_digest(rtmp_client_key, sizeof(rtmp_client_key), digest, SHA256_DIGEST_LENGTH, NULL, digest);
rtmp_handshake_random(c2, timestamp);
rtmp_handshake_create_response(c2, digest, SHA256_DIGEST_LENGTH);
}
else
{
memmove(c2, s1, bytes);
//be_write_uint32(c2 + 4, timestamp);
}
#else
assert(RTMP_HANDSHAKE_SIZE == bytes);
memmove(c2, s1, bytes);
be_write_uint32(c2 + 4, timestamp);
#endif
return (int)bytes;
}
int rtmp_handshake_s0(uint8_t* s0, int version)
{
assert(RTMP_VERSION == version);
*s0 = (uint8_t)version;
return 1;
}
int rtmp_handshake_s1(uint8_t* s1, uint32_t timestamp, const uint8_t* c1, size_t bytes)
{
#if defined(_FLASH_HANDSHAKE_)
uint8_t digest[SHA256_DIGEST_LENGTH];
assert(RTMP_HANDSHAKE_SIZE == bytes);
if (1 == rtmp_handshake_parse_challenge(c1, rtmp_client_key, 30, digest))
{
be_write_uint32(s1, timestamp);
memcpy(s1 + 4, rtmp_server_version, 4);
rtmp_handshake_random(s1 + 8, timestamp);
rtmp_handshake_create_challenge(s1, rtmp_server_key, 36);
return RTMP_HANDSHAKE_SIZE;
}
#else
(void)c1, (void)bytes;
be_write_uint32(s1, timestamp);
be_write_uint32(s1 + 4, 0);
rtmp_handshake_random(s1 + 8, timestamp);
#endif
return RTMP_HANDSHAKE_SIZE;
}
int rtmp_handshake_s2(uint8_t* s2, uint32_t timestamp, const uint8_t* c1, size_t bytes)
{
#if defined(_FLASH_HANDSHAKE_)
uint8_t digest[SHA256_DIGEST_LENGTH];
assert(RTMP_HANDSHAKE_SIZE == bytes);
if (1 == rtmp_handshake_parse_challenge(c1, rtmp_client_key, 30, digest))
{
rtmp_handshake_make_digest(rtmp_server_key, sizeof(rtmp_server_key), digest, SHA256_DIGEST_LENGTH, NULL, digest);
rtmp_handshake_random(s2, timestamp);
rtmp_handshake_create_response(s2, digest, SHA256_DIGEST_LENGTH);
return RTMP_HANDSHAKE_SIZE;
}
#else
(void)timestamp;
assert(RTMP_HANDSHAKE_SIZE == bytes);
memmove(s2, c1, bytes);
//be_write_uint32(s2 + 4, timestamp); // for hik ipc
#endif
return RTMP_HANDSHAKE_SIZE;
}