24 changed files with 782 additions and 473 deletions
@ -0,0 +1,118 @@
@@ -0,0 +1,118 @@
|
||||
package handshake |
||||
|
||||
import ( |
||||
"crypto/rand" |
||||
"fmt" |
||||
"math/big" |
||||
) |
||||
|
||||
const ( |
||||
dhKeyLength = 128 |
||||
) |
||||
|
||||
var ( |
||||
p1024 = []byte{ |
||||
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
||||
0xc9, 0x0f, 0xda, 0xa2, 0x21, 0x68, 0xc2, 0x34, |
||||
0xc4, 0xc6, 0x62, 0x8b, 0x80, 0xdc, 0x1c, 0xd1, |
||||
0x29, 0x02, 0x4e, 0x08, 0x8a, 0x67, 0xcc, 0x74, |
||||
0x02, 0x0b, 0xbe, 0xa6, 0x3b, 0x13, 0x9b, 0x22, |
||||
0x51, 0x4a, 0x08, 0x79, 0x8e, 0x34, 0x04, 0xdd, |
||||
0xef, 0x95, 0x19, 0xb3, 0xcd, 0x3a, 0x43, 0x1b, |
||||
0x30, 0x2b, 0x0a, 0x6d, 0xf2, 0x5f, 0x14, 0x37, |
||||
0x4f, 0xe1, 0x35, 0x6d, 0x6d, 0x51, 0xc2, 0x45, |
||||
0xe4, 0x85, 0xb5, 0x76, 0x62, 0x5e, 0x7e, 0xc6, |
||||
0xf4, 0x4c, 0x42, 0xe9, 0xa6, 0x37, 0xed, 0x6b, |
||||
0x0b, 0xff, 0x5c, 0xb6, 0xf4, 0x06, 0xb7, 0xed, |
||||
0xee, 0x38, 0x6b, 0xfb, 0x5a, 0x89, 0x9f, 0xa5, |
||||
0xae, 0x9f, 0x24, 0x11, 0x7c, 0x4b, 0x1f, 0xe6, |
||||
0x49, 0x28, 0x66, 0x51, 0xec, 0xe6, 0x53, 0x81, |
||||
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
||||
} |
||||
q1024 = []byte{ |
||||
0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
||||
0xe4, 0x87, 0xed, 0x51, 0x10, 0xb4, 0x61, 0x1a, |
||||
0x62, 0x63, 0x31, 0x45, 0xc0, 0x6e, 0x0e, 0x68, |
||||
0x94, 0x81, 0x27, 0x04, 0x45, 0x33, 0xe6, 0x3a, |
||||
0x01, 0x05, 0xdf, 0x53, 0x1d, 0x89, 0xcd, 0x91, |
||||
0x28, 0xa5, 0x04, 0x3c, 0xc7, 0x1a, 0x02, 0x6e, |
||||
0xf7, 0xca, 0x8c, 0xd9, 0xe6, 0x9d, 0x21, 0x8d, |
||||
0x98, 0x15, 0x85, 0x36, 0xf9, 0x2f, 0x8a, 0x1b, |
||||
0xa7, 0xf0, 0x9a, 0xb6, 0xb6, 0xa8, 0xe1, 0x22, |
||||
0xf2, 0x42, 0xda, 0xbb, 0x31, 0x2f, 0x3f, 0x63, |
||||
0x7a, 0x26, 0x21, 0x74, 0xd3, 0x1b, 0xf6, 0xb5, |
||||
0x85, 0xff, 0xae, 0x5b, 0x7a, 0x03, 0x5b, 0xf6, |
||||
0xf7, 0x1c, 0x35, 0xfd, 0xad, 0x44, 0xcf, 0xd2, |
||||
0xd7, 0x4f, 0x92, 0x08, 0xbe, 0x25, 0x8f, 0xf3, |
||||
0x24, 0x94, 0x33, 0x28, 0xf6, 0x73, 0x29, 0xc0, |
||||
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
||||
} |
||||
) |
||||
|
||||
// https://datatracker.ietf.org/doc/html/rfc2631#section-2.1.5
|
||||
func dhValidatePublicKey(key []byte) error { |
||||
// 1. y >= 2 && y < p
|
||||
var y big.Int |
||||
y.SetBytes(key) |
||||
var two big.Int |
||||
two.SetUint64(2) |
||||
r := y.Cmp(&two) |
||||
if r < 0 { |
||||
return fmt.Errorf("key is < 2") |
||||
} |
||||
var p big.Int |
||||
p.SetBytes(p1024) |
||||
r = y.Cmp(&p) |
||||
if r >= 0 { |
||||
return fmt.Errorf("key is >= p") |
||||
} |
||||
|
||||
// 2. (y^q mod p) == 1
|
||||
var q big.Int |
||||
q.SetBytes(q1024) |
||||
var z big.Int |
||||
z.Exp(&y, &q, &p) |
||||
var one big.Int |
||||
one.SetUint64(1) |
||||
r = z.Cmp(&one) |
||||
if r != 0 { |
||||
return fmt.Errorf("y^q mod p is != 1") |
||||
} |
||||
|
||||
return nil |
||||
} |
||||
|
||||
func dhGenerateKeyPair() ([]byte, []byte, error) { |
||||
priv := make([]byte, dhKeyLength) |
||||
_, err := rand.Read(priv) |
||||
if err != nil { |
||||
return nil, nil, err |
||||
} |
||||
|
||||
// y = g ^ x mod p
|
||||
var g big.Int |
||||
g.SetUint64(2) |
||||
var x big.Int |
||||
x.SetBytes(priv) |
||||
var p big.Int |
||||
p.SetBytes(p1024) |
||||
var y big.Int |
||||
y.Exp(&g, &x, &p) |
||||
pub := y.Bytes() |
||||
|
||||
return priv, pub, nil |
||||
} |
||||
|
||||
// https://datatracker.ietf.org/doc/html/rfc2631#section-2.1.1
|
||||
func dhComputeSharedSecret(priv []byte, pub []byte) []byte { |
||||
// ZZ = (ya ^ xb) mod p
|
||||
var y big.Int |
||||
y.SetBytes(pub) |
||||
var x big.Int |
||||
x.SetBytes(priv) |
||||
var p big.Int |
||||
p.SetBytes(p1024) |
||||
var z big.Int |
||||
z.Exp(&y, &x, &p) |
||||
return z.Bytes() |
||||
} |
||||
@ -1,91 +1,50 @@
@@ -1,91 +1,50 @@
|
||||
package handshake |
||||
|
||||
import ( |
||||
"crypto/rand" |
||||
"net" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/require" |
||||
) |
||||
|
||||
func TestHandshake(t *testing.T) { |
||||
ln, err := net.Listen("tcp", "127.0.0.1:9122") |
||||
require.NoError(t, err) |
||||
defer ln.Close() |
||||
|
||||
done := make(chan struct{}) |
||||
|
||||
go func() { |
||||
conn, err := ln.Accept() |
||||
require.NoError(t, err) |
||||
defer conn.Close() |
||||
|
||||
err = DoServer(conn, true) |
||||
require.NoError(t, err) |
||||
|
||||
close(done) |
||||
}() |
||||
|
||||
conn, err := net.Dial("tcp", "127.0.0.1:9122") |
||||
require.NoError(t, err) |
||||
defer conn.Close() |
||||
|
||||
err = DoClient(conn, true) |
||||
require.NoError(t, err) |
||||
|
||||
<-done |
||||
type testReadWriter struct { |
||||
ch chan []byte |
||||
} |
||||
|
||||
// when C1 signature is invalid, S2 must be equal to C1.
|
||||
func TestHandshakeFallback(t *testing.T) { |
||||
ln, err := net.Listen("tcp", "127.0.0.1:9122") |
||||
require.NoError(t, err) |
||||
defer ln.Close() |
||||
|
||||
done := make(chan struct{}) |
||||
|
||||
go func() { |
||||
conn, err := ln.Accept() |
||||
require.NoError(t, err) |
||||
defer conn.Close() |
||||
|
||||
err = DoServer(conn, false) |
||||
require.NoError(t, err) |
||||
|
||||
close(done) |
||||
}() |
||||
|
||||
conn, err := net.Dial("tcp", "127.0.0.1:9122") |
||||
require.NoError(t, err) |
||||
defer conn.Close() |
||||
|
||||
err = C0S0{}.Write(conn) |
||||
require.NoError(t, err) |
||||
|
||||
c1 := make([]byte, 1536) |
||||
_, err = rand.Read(c1[8:]) |
||||
require.NoError(t, err) |
||||
_, err = conn.Write(c1) |
||||
require.NoError(t, err) |
||||
|
||||
err = C0S0{}.Read(conn) |
||||
require.NoError(t, err) |
||||
|
||||
s1 := C1S1{} |
||||
err = s1.Read(conn, false, false) |
||||
require.NoError(t, err) |
||||
|
||||
s2 := C2S2{} |
||||
err = s2.Read(conn, false) |
||||
require.NoError(t, err) |
||||
require.Equal(t, c1[8:], s2.Random) |
||||
func (rw *testReadWriter) Read(p []byte) (int, error) { |
||||
in := <-rw.ch |
||||
n := copy(p, in) |
||||
return n, nil |
||||
} |
||||
|
||||
err = C2S2{ |
||||
Time: s1.Time, |
||||
Random: s1.Random, |
||||
Digest: s1.Digest, |
||||
}.Write(conn) |
||||
require.NoError(t, err) |
||||
func (rw *testReadWriter) Write(p []byte) (int, error) { |
||||
rw.ch <- p |
||||
return len(p), nil |
||||
} |
||||
|
||||
<-done |
||||
func TestHandshake(t *testing.T) { |
||||
for _, ca := range []string{"plain", "encrypted"} { |
||||
t.Run(ca, func(t *testing.T) { |
||||
rw := &testReadWriter{ch: make(chan []byte)} |
||||
var serverInKey []byte |
||||
var serverOutKey []byte |
||||
done := make(chan struct{}) |
||||
|
||||
go func() { |
||||
var err error |
||||
serverInKey, serverOutKey, err = DoServer(rw, true) |
||||
require.NoError(t, err) |
||||
close(done) |
||||
}() |
||||
|
||||
clientInKey, clientOutKey, err := DoClient(rw, ca == "encrypted", true) |
||||
require.NoError(t, err) |
||||
<-done |
||||
|
||||
if ca == "encrypted" { |
||||
require.NotNil(t, serverInKey) |
||||
require.Equal(t, serverInKey, clientOutKey) |
||||
require.Equal(t, serverOutKey, clientInKey) |
||||
} |
||||
}) |
||||
} |
||||
} |
||||
|
||||
@ -0,0 +1,49 @@
@@ -0,0 +1,49 @@
|
||||
package rtmp |
||||
|
||||
import ( |
||||
"crypto/rc4" |
||||
"io" |
||||
) |
||||
|
||||
type rc4ReadWriter struct { |
||||
rw io.ReadWriter |
||||
in *rc4.Cipher |
||||
out *rc4.Cipher |
||||
} |
||||
|
||||
func newRC4ReadWriter(rw io.ReadWriter, keyIn []byte, keyOut []byte) (*rc4ReadWriter, error) { |
||||
in, err := rc4.NewCipher(keyIn) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
out, err := rc4.NewCipher(keyOut) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
p := make([]byte, 1536) |
||||
in.XORKeyStream(p, p) |
||||
out.XORKeyStream(p, p) |
||||
|
||||
return &rc4ReadWriter{ |
||||
rw: rw, |
||||
in: in, |
||||
out: out, |
||||
}, nil |
||||
} |
||||
|
||||
func (r *rc4ReadWriter) Read(p []byte) (int, error) { |
||||
n, err := r.rw.Read(p) |
||||
if n == 0 { |
||||
return 0, err |
||||
} |
||||
|
||||
r.in.XORKeyStream(p[:n], p[:n]) |
||||
return n, err |
||||
} |
||||
|
||||
func (r *rc4ReadWriter) Write(p []byte) (int, error) { |
||||
r.out.XORKeyStream(p, p) |
||||
return r.rw.Write(p) |
||||
} |
||||
Loading…
Reference in new issue