mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			124 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			124 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package stun
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/md5"  // #nosec
 | 
						|
	"crypto/sha1" // #nosec
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/pion/stun/internal/hmac"
 | 
						|
)
 | 
						|
 | 
						|
// separator for credentials.
 | 
						|
const credentialsSep = ":"
 | 
						|
 | 
						|
// NewLongTermIntegrity returns new MessageIntegrity with key for long-term
 | 
						|
// credentials. Password, username, and realm must be SASL-prepared.
 | 
						|
func NewLongTermIntegrity(username, realm, password string) MessageIntegrity {
 | 
						|
	k := strings.Join([]string{username, realm, password}, credentialsSep)
 | 
						|
	// #nosec
 | 
						|
	h := md5.New()
 | 
						|
	fmt.Fprint(h, k)
 | 
						|
	return MessageIntegrity(h.Sum(nil))
 | 
						|
}
 | 
						|
 | 
						|
// NewShortTermIntegrity returns new MessageIntegrity with key for short-term
 | 
						|
// credentials. Password must be SASL-prepared.
 | 
						|
func NewShortTermIntegrity(password string) MessageIntegrity {
 | 
						|
	return MessageIntegrity(password)
 | 
						|
}
 | 
						|
 | 
						|
// MessageIntegrity represents MESSAGE-INTEGRITY attribute.
 | 
						|
//
 | 
						|
// AddTo and Check methods are using zero-allocation version of hmac, see
 | 
						|
// newHMAC function and internal/hmac/pool.go.
 | 
						|
//
 | 
						|
// RFC 5389 Section 15.4
 | 
						|
type MessageIntegrity []byte
 | 
						|
 | 
						|
func newHMAC(key, message, buf []byte) []byte {
 | 
						|
	mac := hmac.AcquireSHA1(key)
 | 
						|
	writeOrPanic(mac, message)
 | 
						|
	defer hmac.PutSHA1(mac)
 | 
						|
	return mac.Sum(buf)
 | 
						|
}
 | 
						|
 | 
						|
func (i MessageIntegrity) String() string {
 | 
						|
	return fmt.Sprintf("KEY: 0x%x", []byte(i))
 | 
						|
}
 | 
						|
 | 
						|
const messageIntegritySize = 20
 | 
						|
 | 
						|
// ErrFingerprintBeforeIntegrity means that FINGERPRINT attribute is already in
 | 
						|
// message, so MESSAGE-INTEGRITY attribute cannot be added.
 | 
						|
var ErrFingerprintBeforeIntegrity = errors.New("FINGERPRINT before MESSAGE-INTEGRITY attribute")
 | 
						|
 | 
						|
// AddTo adds MESSAGE-INTEGRITY attribute to message.
 | 
						|
//
 | 
						|
// CPU costly, see BenchmarkMessageIntegrity_AddTo.
 | 
						|
func (i MessageIntegrity) AddTo(m *Message) error {
 | 
						|
	for _, a := range m.Attributes {
 | 
						|
		// Message should not contain FINGERPRINT attribute
 | 
						|
		// before MESSAGE-INTEGRITY.
 | 
						|
		if a.Type == AttrFingerprint {
 | 
						|
			return ErrFingerprintBeforeIntegrity
 | 
						|
		}
 | 
						|
	}
 | 
						|
	// The text used as input to HMAC is the STUN message,
 | 
						|
	// including the header, up to and including the attribute preceding the
 | 
						|
	// MESSAGE-INTEGRITY attribute.
 | 
						|
	length := m.Length
 | 
						|
	// Adjusting m.Length to contain MESSAGE-INTEGRITY TLV.
 | 
						|
	m.Length += messageIntegritySize + attributeHeaderSize
 | 
						|
	m.WriteLength()                            // writing length to m.Raw
 | 
						|
	v := newHMAC(i, m.Raw, m.Raw[len(m.Raw):]) // calculating HMAC for adjusted m.Raw
 | 
						|
	m.Length = length                          // changing m.Length back
 | 
						|
 | 
						|
	// Copy hmac value to temporary variable to protect it from resetting
 | 
						|
	// while processing m.Add call.
 | 
						|
	vBuf := make([]byte, sha1.Size)
 | 
						|
	copy(vBuf, v)
 | 
						|
 | 
						|
	m.Add(AttrMessageIntegrity, vBuf)
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// ErrIntegrityMismatch means that computed HMAC differs from expected.
 | 
						|
var ErrIntegrityMismatch = errors.New("integrity check failed")
 | 
						|
 | 
						|
// Check checks MESSAGE-INTEGRITY attribute.
 | 
						|
//
 | 
						|
// CPU costly, see BenchmarkMessageIntegrity_Check.
 | 
						|
func (i MessageIntegrity) Check(m *Message) error {
 | 
						|
	v, err := m.Get(AttrMessageIntegrity)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	// Adjusting length in header to match m.Raw that was
 | 
						|
	// used when computing HMAC.
 | 
						|
	var (
 | 
						|
		length         = m.Length
 | 
						|
		afterIntegrity = false
 | 
						|
		sizeReduced    int
 | 
						|
	)
 | 
						|
	for _, a := range m.Attributes {
 | 
						|
		if afterIntegrity {
 | 
						|
			sizeReduced += nearestPaddedValueLength(int(a.Length))
 | 
						|
			sizeReduced += attributeHeaderSize
 | 
						|
		}
 | 
						|
		if a.Type == AttrMessageIntegrity {
 | 
						|
			afterIntegrity = true
 | 
						|
		}
 | 
						|
	}
 | 
						|
	m.Length -= uint32(sizeReduced)
 | 
						|
	m.WriteLength()
 | 
						|
	// startOfHMAC should be first byte of integrity attribute.
 | 
						|
	startOfHMAC := messageHeaderSize + m.Length - (attributeHeaderSize + messageIntegritySize)
 | 
						|
	b := m.Raw[:startOfHMAC] // data before integrity attribute
 | 
						|
	expected := newHMAC(i, b, m.Raw[len(m.Raw):])
 | 
						|
	m.Length = length
 | 
						|
	m.WriteLength() // writing length back
 | 
						|
	return checkHMAC(v, expected)
 | 
						|
}
 |