librespot/src/session.rs

228 lines
7.6 KiB
Rust
Raw Normal View History

2015-06-23 14:38:29 +00:00
use crypto::digest::Digest;
2016-01-01 23:16:12 +00:00
use crypto::mac::Mac;
2015-06-23 14:38:29 +00:00
use crypto::sha1::Sha1;
2016-01-01 23:16:12 +00:00
use crypto::hmac::Hmac;
2015-09-01 11:20:37 +00:00
use eventual::Future;
2015-06-23 14:38:29 +00:00
use protobuf::{self, Message};
use rand::thread_rng;
2016-01-01 23:16:12 +00:00
use std::io::Write;
2015-07-07 21:40:31 +00:00
use std::path::PathBuf;
2016-01-01 23:16:12 +00:00
use std::sync::{Mutex, RwLock, Arc, mpsc};
2015-06-23 14:38:29 +00:00
2016-01-01 23:16:12 +00:00
use audio_key::{AudioKeyManager, AudioKey, AudioKeyError};
use audio_file::{AudioFileManager, AudioFile};
use connection::{self, PlainConnection, CipherConnection};
2016-01-01 23:16:12 +00:00
use connection::PacketHandler;
use diffie_hellman::DHLocalKeys;
use librespot_protocol as protocol;
use mercury::{MercuryManager, MercuryRequest, MercuryResponse};
use metadata::{MetadataManager, MetadataRef, MetadataTrait};
use stream::{StreamManager, StreamEvent};
2016-01-01 23:16:12 +00:00
use util::{SpotifyId, FileId, mkdir_existing};
2015-04-25 20:32:07 +00:00
use util;
2016-01-02 02:30:24 +00:00
pub enum Bitrate {
Bitrate96,
Bitrate160,
2016-01-02 15:19:39 +00:00
Bitrate320,
2016-01-02 02:30:24 +00:00
}
pub struct Config {
pub application_key: Vec<u8>,
pub user_agent: String,
2016-01-01 23:16:12 +00:00
pub device_name: String,
2015-07-07 21:40:31 +00:00
pub cache_location: PathBuf,
2016-01-02 02:30:24 +00:00
pub bitrate: Bitrate,
}
2015-09-01 11:20:37 +00:00
pub struct SessionData {
pub country: String,
pub canonical_username: String,
2016-01-01 23:16:12 +00:00
pub device_id: String,
}
pub struct SessionInternal {
2015-07-01 22:40:38 +00:00
pub config: Config,
pub data: RwLock<SessionData>,
2015-06-23 14:38:29 +00:00
mercury: Mutex<MercuryManager>,
metadata: Mutex<MetadataManager>,
stream: Mutex<StreamManager>,
audio_key: Mutex<AudioKeyManager>,
2015-07-03 00:23:49 +00:00
audio_file: Mutex<AudioFileManager>,
2016-01-01 23:16:12 +00:00
rx_connection: Mutex<Option<CipherConnection>>,
tx_connection: Mutex<Option<CipherConnection>>,
2015-04-25 20:32:07 +00:00
}
2015-09-01 11:20:37 +00:00
#[derive(Clone)]
pub struct Session(pub Arc<SessionInternal>);
2015-04-25 20:32:07 +00:00
impl Session {
2016-01-01 23:16:12 +00:00
pub fn new(config: Config) -> Session {
mkdir_existing(&config.cache_location).unwrap();
let device_id = {
let mut h = Sha1::new();
2016-01-01 23:16:12 +00:00
h.input_str(&config.device_name);
h.result_str()
};
2016-01-01 23:16:12 +00:00
Session(Arc::new(SessionInternal {
config: config,
data: RwLock::new(SessionData {
country: String::new(),
canonical_username: String::new(),
device_id: device_id,
}),
rx_connection: Mutex::new(None),
tx_connection: Mutex::new(None),
mercury: Mutex::new(MercuryManager::new()),
metadata: Mutex::new(MetadataManager::new()),
stream: Mutex::new(StreamManager::new()),
audio_key: Mutex::new(AudioKeyManager::new()),
audio_file: Mutex::new(AudioFileManager::new()),
}))
}
pub fn connect(&self) {
let local_keys = DHLocalKeys::random(&mut thread_rng());
2015-07-07 21:40:31 +00:00
let mut connection = PlainConnection::connect().unwrap();
let request = protobuf_init!(protocol::keyexchange::ClientHello::new(), {
build_info => {
product: protocol::keyexchange::Product::PRODUCT_LIBSPOTIFY_EMBEDDED,
platform: protocol::keyexchange::Platform::PLATFORM_LINUX_X86,
version: 0x10800000000,
2015-04-25 20:32:07 +00:00
},
/*
fingerprints_supported => [
protocol::keyexchange::Fingerprint::FINGERPRINT_GRAIN
],
*/
cryptosuites_supported => [
protocol::keyexchange::Cryptosuite::CRYPTO_SUITE_SHANNON,
//protocol::keyexchange::Cryptosuite::CRYPTO_SUITE_RC4_SHA1_HMAC
],
/*
powschemes_supported => [
protocol::keyexchange::Powscheme::POW_HASH_CASH
],
*/
login_crypto_hello.diffie_hellman => {
2016-01-01 23:16:12 +00:00
gc: local_keys.public_key(),
server_keys_known: 1,
2015-04-25 20:32:07 +00:00
},
client_nonce: util::rand_vec(&mut thread_rng(), 0x10),
padding: vec![0x1e],
feature_set => {
autoupdate2: true,
}
2015-04-25 20:32:07 +00:00
});
2016-01-02 15:19:39 +00:00
let init_client_packet = connection.send_packet_prefix(&[0, 4],
&request.write_to_bytes().unwrap())
.unwrap();
let init_server_packet = connection.recv_packet().unwrap();
2015-04-25 20:32:07 +00:00
2016-01-02 15:19:39 +00:00
let response: protocol::keyexchange::APResponseMessage =
2015-06-23 14:38:29 +00:00
protobuf::parse_from_bytes(&init_server_packet[4..]).unwrap();
2015-04-25 20:32:07 +00:00
2016-01-01 23:16:12 +00:00
let remote_key = response.get_challenge()
.get_login_crypto_challenge()
.get_diffie_hellman()
.get_gs();
let shared_secret = local_keys.shared_secret(remote_key);
let (challenge, send_key, recv_key) = {
let mut data = Vec::with_capacity(0x64);
let mut mac = Hmac::new(Sha1::new(), &shared_secret);
for i in 1..6 {
mac.input(&init_client_packet);
mac.input(&init_server_packet);
mac.input(&[i]);
data.write(&mac.result().code()).unwrap();
mac.reset();
}
2015-04-25 20:32:07 +00:00
2016-01-01 23:16:12 +00:00
mac = Hmac::new(Sha1::new(), &data[..0x14]);
mac.input(&init_client_packet);
mac.input(&init_server_packet);
(mac.result().code().to_vec(),
data[0x14..0x34].to_vec(),
data[0x34..0x54].to_vec())
};
2015-04-25 20:32:07 +00:00
let packet = protobuf_init!(protocol::keyexchange::ClientResponsePlaintext::new(), {
login_crypto_response.diffie_hellman => {
2016-01-02 15:19:39 +00:00
hmac: challenge
2015-04-25 20:32:07 +00:00
},
pow_response => {},
crypto_response => {},
});
2016-01-01 23:16:12 +00:00
connection.send_packet(&packet.write_to_bytes().unwrap()).unwrap();
2016-01-02 15:19:39 +00:00
let cipher_connection = CipherConnection::new(connection.into_stream(),
&send_key,
&recv_key);
2016-01-01 23:16:12 +00:00
*self.0.rx_connection.lock().unwrap() = Some(cipher_connection.clone());
*self.0.tx_connection.lock().unwrap() = Some(cipher_connection);
2015-06-23 14:38:29 +00:00
}
2015-06-23 14:38:29 +00:00
pub fn poll(&self) {
2016-01-01 23:16:12 +00:00
let (cmd, data) = self.recv();
match cmd {
0x4 => self.send_packet(0x49, &data).unwrap(),
0x4a => (),
2016-01-02 15:19:39 +00:00
0x9 => self.0.stream.lock().unwrap().handle(cmd, data),
2015-09-01 11:20:37 +00:00
0xd | 0xe => self.0.audio_key.lock().unwrap().handle(cmd, data),
0x1b => {
2016-01-02 15:19:39 +00:00
self.0.data.write().unwrap().country = String::from_utf8(data).unwrap();
}
2015-09-01 11:20:37 +00:00
0xb2...0xb6 => self.0.mercury.lock().unwrap().handle(cmd, data),
2016-01-02 15:19:39 +00:00
_ => (),
}
}
2016-01-01 23:16:12 +00:00
pub fn recv(&self) -> (u8, Vec<u8>) {
self.0.rx_connection.lock().unwrap().as_mut().unwrap().recv_packet().unwrap()
}
pub fn send_packet(&self, cmd: u8, data: &[u8]) -> connection::Result<()> {
2016-01-01 23:16:12 +00:00
self.0.tx_connection.lock().unwrap().as_mut().unwrap().send_packet(cmd, data)
}
pub fn audio_key(&self, track: SpotifyId, file: FileId) -> Future<AudioKey, AudioKeyError> {
2015-09-01 11:20:37 +00:00
self.0.audio_key.lock().unwrap().request(self, track, file)
}
2015-07-03 00:23:49 +00:00
pub fn audio_file(&self, file: FileId) -> AudioFile {
2015-09-01 11:20:37 +00:00
self.0.audio_file.lock().unwrap().request(self, file)
2015-07-03 00:23:49 +00:00
}
pub fn stream(&self, file: FileId, offset: u32, size: u32) -> mpsc::Receiver<StreamEvent> {
2015-09-01 11:20:37 +00:00
self.0.stream.lock().unwrap().request(self, file, offset, size)
}
pub fn metadata<T: MetadataTrait>(&self, id: SpotifyId) -> MetadataRef<T> {
2015-09-01 11:20:37 +00:00
self.0.metadata.lock().unwrap().get(self, id)
}
2015-09-01 11:20:37 +00:00
pub fn mercury(&self, req: MercuryRequest) -> Future<MercuryResponse, ()> {
self.0.mercury.lock().unwrap().request(self, req)
}
pub fn mercury_sub(&self, uri: String) -> mpsc::Receiver<MercuryResponse> {
2015-09-01 11:20:37 +00:00
self.0.mercury.lock().unwrap().subscribe(self, uri)
2015-04-25 20:32:07 +00:00
}
}