|
@@ -1,27 +1,19 @@
|
|
|
use crypto::digest::Digest;
|
|
|
-use crypto::mac::Mac;
|
|
|
use crypto::sha1::Sha1;
|
|
|
-use crypto::hmac::Hmac;
|
|
|
use eventual::Future;
|
|
|
-use protobuf::{self, Message};
|
|
|
-use rand::thread_rng;
|
|
|
use std::io::Write;
|
|
|
use std::path::PathBuf;
|
|
|
use std::sync::{Mutex, RwLock, Arc, mpsc};
|
|
|
|
|
|
use audio_key::{AudioKeyManager, AudioKey, AudioKeyError};
|
|
|
use audio_file::{AudioFileManager, AudioFile};
|
|
|
-use connection::{self, PlainConnection, CipherConnection};
|
|
|
+use connection::{self, CipherConnection};
|
|
|
use connection::PacketHandler;
|
|
|
-use diffie_hellman::DHLocalKeys;
|
|
|
-use librespot_protocol as protocol;
|
|
|
use mercury::{MercuryManager, MercuryRequest, MercuryResponse};
|
|
|
use metadata::{MetadataManager, MetadataRef, MetadataTrait};
|
|
|
use stream::{StreamManager, StreamEvent};
|
|
|
use util::{SpotifyId, FileId, mkdir_existing};
|
|
|
|
|
|
-use util;
|
|
|
-
|
|
|
pub enum Bitrate {
|
|
|
Bitrate96,
|
|
|
Bitrate160,
|
|
@@ -37,14 +29,14 @@ pub struct Config {
|
|
|
}
|
|
|
|
|
|
pub struct SessionData {
|
|
|
- pub country: String,
|
|
|
- pub canonical_username: String,
|
|
|
- pub device_id: String,
|
|
|
+ country: String,
|
|
|
+ canonical_username: String,
|
|
|
+ device_id: String,
|
|
|
}
|
|
|
|
|
|
pub struct SessionInternal {
|
|
|
config: Config,
|
|
|
- pub data: RwLock<SessionData>,
|
|
|
+ data: RwLock<SessionData>,
|
|
|
|
|
|
mercury: Mutex<MercuryManager>,
|
|
|
metadata: Mutex<MetadataManager>,
|
|
@@ -87,94 +79,10 @@ impl Session {
|
|
|
}))
|
|
|
}
|
|
|
|
|
|
- pub fn connect(&self) {
|
|
|
- let local_keys = DHLocalKeys::random(&mut thread_rng());
|
|
|
-
|
|
|
- let mut connection = PlainConnection::connect().unwrap();
|
|
|
-
|
|
|
- let request = protobuf_init!(protocol::keyexchange::ClientHello::new(), {
|
|
|
- build_info => {
|
|
|
- product: protocol::keyexchange::Product::PRODUCT_LIBSPOTIFY_EMBEDDED,
|
|
|
- platform: protocol::keyexchange::Platform::PLATFORM_LINUX_X86,
|
|
|
- version: 0x10800000000,
|
|
|
- },
|
|
|
- /*
|
|
|
- fingerprints_supported => [
|
|
|
- protocol::keyexchange::Fingerprint::FINGERPRINT_GRAIN
|
|
|
- ],
|
|
|
- */
|
|
|
- cryptosuites_supported => [
|
|
|
- protocol::keyexchange::Cryptosuite::CRYPTO_SUITE_SHANNON,
|
|
|
- //protocol::keyexchange::Cryptosuite::CRYPTO_SUITE_RC4_SHA1_HMAC
|
|
|
- ],
|
|
|
- /*
|
|
|
- powschemes_supported => [
|
|
|
- protocol::keyexchange::Powscheme::POW_HASH_CASH
|
|
|
- ],
|
|
|
- */
|
|
|
- login_crypto_hello.diffie_hellman => {
|
|
|
- gc: local_keys.public_key(),
|
|
|
- server_keys_known: 1,
|
|
|
- },
|
|
|
- client_nonce: util::rand_vec(&mut thread_rng(), 0x10),
|
|
|
- padding: vec![0x1e],
|
|
|
- feature_set => {
|
|
|
- autoupdate2: true,
|
|
|
- }
|
|
|
- });
|
|
|
-
|
|
|
- let init_client_packet = connection.send_packet_prefix(&[0, 4],
|
|
|
- &request.write_to_bytes().unwrap())
|
|
|
- .unwrap();
|
|
|
- let init_server_packet = connection.recv_packet().unwrap();
|
|
|
-
|
|
|
- let response: protocol::keyexchange::APResponseMessage =
|
|
|
- protobuf::parse_from_bytes(&init_server_packet[4..]).unwrap();
|
|
|
-
|
|
|
- let remote_key = response.get_challenge()
|
|
|
- .get_login_crypto_challenge()
|
|
|
- .get_diffie_hellman()
|
|
|
- .get_gs();
|
|
|
-
|
|
|
- let shared_secret = local_keys.shared_secret(remote_key);
|
|
|
- let (challenge, send_key, recv_key) = {
|
|
|
- let mut data = Vec::with_capacity(0x64);
|
|
|
- let mut mac = Hmac::new(Sha1::new(), &shared_secret);
|
|
|
-
|
|
|
- for i in 1..6 {
|
|
|
- mac.input(&init_client_packet);
|
|
|
- mac.input(&init_server_packet);
|
|
|
- mac.input(&[i]);
|
|
|
- data.write(&mac.result().code()).unwrap();
|
|
|
- mac.reset();
|
|
|
- }
|
|
|
-
|
|
|
- mac = Hmac::new(Sha1::new(), &data[..0x14]);
|
|
|
- mac.input(&init_client_packet);
|
|
|
- mac.input(&init_server_packet);
|
|
|
-
|
|
|
- (mac.result().code().to_vec(),
|
|
|
- data[0x14..0x34].to_vec(),
|
|
|
- data[0x34..0x54].to_vec())
|
|
|
- };
|
|
|
-
|
|
|
- let packet = protobuf_init!(protocol::keyexchange::ClientResponsePlaintext::new(), {
|
|
|
- login_crypto_response.diffie_hellman => {
|
|
|
- hmac: challenge
|
|
|
- },
|
|
|
- pow_response => {},
|
|
|
- crypto_response => {},
|
|
|
- });
|
|
|
-
|
|
|
-
|
|
|
- connection.send_packet(&packet.write_to_bytes().unwrap()).unwrap();
|
|
|
-
|
|
|
- let cipher_connection = CipherConnection::new(connection.into_stream(),
|
|
|
- &send_key,
|
|
|
- &recv_key);
|
|
|
-
|
|
|
- *self.0.rx_connection.lock().unwrap() = Some(cipher_connection.clone());
|
|
|
- *self.0.tx_connection.lock().unwrap() = Some(cipher_connection);
|
|
|
+ pub fn authenticated(&self, username: String, connection: CipherConnection) {
|
|
|
+ self.0.data.write().unwrap().canonical_username = username;
|
|
|
+ *self.0.rx_connection.lock().unwrap() = Some(connection.clone());
|
|
|
+ *self.0.tx_connection.lock().unwrap() = Some(connection);
|
|
|
}
|
|
|
|
|
|
pub fn poll(&self) {
|