mirror of
https://github.com/rock88/moonlight-nx
synced 2024-11-27 05:50:18 +00:00
525 lines
18 KiB
C++
525 lines
18 KiB
C++
/*
|
|
* This file is part of Moonlight Embedded.
|
|
*
|
|
* Copyright (C) 2015-2017 Iwan Timmer
|
|
*
|
|
* Moonlight is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Moonlight is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with Moonlight; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "http.h"
|
|
#include "client.h"
|
|
#include "errors.h"
|
|
#include "limits.h"
|
|
#include <errno.h>
|
|
#include <sys/stat.h>
|
|
#include <stdbool.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <Limelight.h>
|
|
#include "CryptoManager.hpp"
|
|
#include "Log.h"
|
|
|
|
#define CHANNEL_COUNT_STEREO 2
|
|
#define CHANNEL_COUNT_51_SURROUND 6
|
|
|
|
#define CHANNEL_MASK_STEREO 0x3
|
|
#define CHANNEL_MASK_51_SURROUND 0xFC
|
|
|
|
static char* unique_id = "0123456789ABCDEF";
|
|
const char* gs_error;
|
|
|
|
int mkdirtree(const char* directory) {
|
|
char buffer[PATH_MAX];
|
|
char* p = buffer;
|
|
|
|
// The passed in string could be a string literal
|
|
// so we must copy it first
|
|
strncpy(p, directory, PATH_MAX - 1);
|
|
buffer[PATH_MAX - 1] = '\0';
|
|
|
|
while (*p != 0) {
|
|
// Find the end of the path element
|
|
do {
|
|
p++;
|
|
} while (*p != 0 && *p != '/');
|
|
|
|
char oldChar = *p;
|
|
*p = 0;
|
|
|
|
// Create the directory if it doesn't exist already
|
|
if (mkdir(buffer, 0775) == -1 && errno != EEXIST) {
|
|
return -1;
|
|
}
|
|
|
|
*p = oldChar;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int load_server_status(PSERVER_DATA server) {
|
|
int ret;
|
|
char url[4096];
|
|
int i;
|
|
|
|
i = 0;
|
|
do {
|
|
char *pairedText = NULL;
|
|
char *currentGameText = NULL;
|
|
char *stateText = NULL;
|
|
char *serverCodecModeSupportText = NULL;
|
|
|
|
ret = GS_INVALID;
|
|
|
|
// Modern GFE versions don't allow serverinfo to be fetched over HTTPS if the client
|
|
// is not already paired. Since we can't pair without knowing the server version, we
|
|
// make another request over HTTP if the HTTPS request fails. We can't just use HTTP
|
|
// for everything because it doesn't accurately tell us if we're paired.
|
|
|
|
printf("server->serverInfo.address: %s\n", server->serverInfo.address);
|
|
|
|
snprintf(url, sizeof(url), "%s://%s:%d/serverinfo?uniqueid=%s",
|
|
i == 0 ? "https" : "http", server->serverInfo.address, i == 0 ? 47984 : 47989, unique_id);
|
|
|
|
Data data;
|
|
|
|
if (http_request(url, &data) != GS_OK) {
|
|
ret = GS_IO_ERROR;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (xml_status(data.bytes(), data.size()) == GS_ERROR) {
|
|
ret = GS_ERROR;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (xml_search(data.bytes(), data.size(), "currentgame", ¤tGameText) != GS_OK) {
|
|
goto cleanup;
|
|
}
|
|
|
|
if (xml_search(data.bytes(), data.size(), "PairStatus", &pairedText) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "appversion", (char**) &server->serverInfo.serverInfoAppVersion) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "state", &stateText) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "ServerCodecModeSupport", &serverCodecModeSupportText) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "gputype", &server->gpuType) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "GsVersion", &server->gsVersion) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "hostname", &server->hostname) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_search(data.bytes(), data.size(), "GfeVersion", (char**) &server->serverInfo.serverInfoGfeVersion) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (xml_modelist(data.bytes(), data.size(), &server->modes) != GS_OK)
|
|
goto cleanup;
|
|
|
|
// These fields are present on all version of GFE that this client supports
|
|
if (!strlen(currentGameText) || !strlen(pairedText) || !strlen(server->serverInfo.serverInfoAppVersion) || !strlen(stateText))
|
|
goto cleanup;
|
|
|
|
server->paired = pairedText != NULL && strcmp(pairedText, "1") == 0;
|
|
server->currentGame = currentGameText == NULL ? 0 : atoi(currentGameText);
|
|
server->supports4K = serverCodecModeSupportText != NULL;
|
|
server->serverMajorVersion = atoi(server->serverInfo.serverInfoAppVersion);
|
|
|
|
if (strstr(stateText, "_SERVER_BUSY") == NULL) {
|
|
// After GFE 2.8, current game remains set even after streaming
|
|
// has ended. We emulate the old behavior by forcing it to zero
|
|
// if streaming is not active.
|
|
server->currentGame = 0;
|
|
}
|
|
ret = GS_OK;
|
|
|
|
cleanup:
|
|
if (pairedText != NULL)
|
|
free(pairedText);
|
|
|
|
if (currentGameText != NULL)
|
|
free(currentGameText);
|
|
|
|
if (serverCodecModeSupportText != NULL)
|
|
free(serverCodecModeSupportText);
|
|
|
|
i++;
|
|
} while (ret != GS_OK && i < 2);
|
|
|
|
if (ret == GS_OK && !server->unsupported) {
|
|
if (server->serverMajorVersion > MAX_SUPPORTED_GFE_VERSION) {
|
|
gs_error = "Ensure you're running the latest version of Moonlight Embedded or downgrade GeForce Experience and try again";
|
|
ret = GS_UNSUPPORTED_VERSION;
|
|
} else if (server->serverMajorVersion < MIN_SUPPORTED_GFE_VERSION) {
|
|
gs_error = "Moonlight Embedded requires a newer version of GeForce Experience. Please upgrade GFE on your PC and try again.";
|
|
ret = GS_UNSUPPORTED_VERSION;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int gs_unpair(PSERVER_DATA server) {
|
|
int ret = GS_OK;
|
|
char url[4096];
|
|
|
|
Data data;
|
|
|
|
snprintf(url, sizeof(url), "http://%s:47989/unpair?uniqueid=%s", server->serverInfo.address, unique_id);
|
|
ret = http_request(url, &data);
|
|
return ret;
|
|
}
|
|
|
|
static int gs_pair_validate(Data &data, char** result) {
|
|
if (*result) {
|
|
free(*result);
|
|
*result = NULL;
|
|
}
|
|
|
|
int ret = GS_OK;
|
|
if ((ret = xml_status(data.bytes(), data.size()) != GS_OK)) {
|
|
return ret;
|
|
} else if ((ret = xml_search(data.bytes(), data.size(), "paired", result)) != GS_OK) {
|
|
return ret;
|
|
}
|
|
|
|
// if (strcmp(*result, "1") != 0) {
|
|
// gs_error = "Pairing failed";
|
|
// ret = GS_FAILED;
|
|
// }
|
|
|
|
if (*result) {
|
|
free(*result);
|
|
*result = NULL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int gs_pair_cleanup(int ret, PSERVER_DATA server, char** result) {
|
|
if (ret != GS_OK) {
|
|
gs_unpair(server);
|
|
}
|
|
if (*result) {
|
|
free(*result);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int gs_pair(PSERVER_DATA server, char* pin) {
|
|
int ret = GS_OK;
|
|
Data data;
|
|
char* result = NULL;
|
|
char url[4096];
|
|
|
|
if (server->paired) {
|
|
gs_error = "Already paired";
|
|
return GS_WRONG_STATE;
|
|
}
|
|
|
|
if (server->currentGame != 0) {
|
|
gs_error = "The computer is currently in a game. You must close the game before pairing";
|
|
return GS_WRONG_STATE;
|
|
}
|
|
|
|
LOG_FMT("Pairing with generation %d server\n", server->serverMajorVersion);
|
|
LOG("Start pairing stage #1\n");
|
|
|
|
Data salt = Data::random_bytes(16);
|
|
Data salted_pin = salt.append(Data(pin, strlen(pin)));
|
|
LOG_FMT("PIN: %s, salt %s\n", pin, salt.hex().bytes());
|
|
|
|
snprintf(url, sizeof(url), "http://%s:47989/pair?uniqueid=%s&devicename=roth&updateState=1&phrase=getservercert&salt=%s&clientcert=%s", server->serverInfo.address, unique_id, salt.hex().bytes(), CryptoManager::cert_data().hex().bytes());
|
|
|
|
if ((ret = http_request(url, &data)) != GS_OK) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if ((ret = gs_pair_validate(data, &result) != GS_OK)) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if ((ret = xml_search(data.bytes(), data.size(), "plaincert", &result)) != GS_OK) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
LOG("Start pairing stage #2\n");
|
|
|
|
Data plainCert = Data(result, strlen(result));
|
|
Data aesKey;
|
|
|
|
// Gen 7 servers use SHA256 to get the key
|
|
int hashLength;
|
|
if (server->serverMajorVersion >= 7) {
|
|
aesKey = CryptoManager::create_AES_key_from_salt_SHA256(salted_pin);
|
|
hashLength = 32;
|
|
}
|
|
else {
|
|
aesKey = CryptoManager::create_AES_key_from_salt_SHA1(salted_pin);
|
|
hashLength = 20;
|
|
}
|
|
|
|
Data randomChallenge = Data::random_bytes(16);
|
|
Data encryptedChallenge = CryptoManager::aes_encrypt(randomChallenge, aesKey);
|
|
|
|
snprintf(url, sizeof(url), "http://%s:47989/pair?uniqueid=%s&devicename=roth&updateState=1&clientchallenge=%s", server->serverInfo.address, unique_id, encryptedChallenge.hex().bytes());
|
|
|
|
if ((ret = http_request(url, &data)) != GS_OK) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if ((ret = gs_pair_validate(data, &result) != GS_OK)) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if (xml_search(data.bytes(), data.size(), "challengeresponse", &result) != GS_OK) {
|
|
ret = GS_INVALID;
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
LOG("Start pairing stage #3\n");
|
|
|
|
Data encServerChallengeResp = Data(result, strlen(result)).hex_to_bytes();
|
|
Data decServerChallengeResp = CryptoManager::aes_decrypt(encServerChallengeResp, aesKey);
|
|
Data serverResponse = decServerChallengeResp.subdata(0, hashLength);
|
|
Data serverChallenge = decServerChallengeResp.subdata(hashLength, 16);
|
|
|
|
Data clientSecret = Data::random_bytes(16);
|
|
Data challengeRespHashInput = serverChallenge.append(CryptoManager::signature(CryptoManager::cert_data())).append(clientSecret);
|
|
|
|
Data challengeRespHash;
|
|
|
|
if (server->serverMajorVersion >= 7) {
|
|
challengeRespHash = CryptoManager::SHA256_hash_data(challengeRespHashInput);
|
|
}
|
|
else {
|
|
challengeRespHash = CryptoManager::SHA1_hash_data(challengeRespHashInput);
|
|
}
|
|
Data challengeRespEncrypted = CryptoManager::aes_encrypt(challengeRespHash, aesKey);
|
|
|
|
snprintf(url, sizeof(url), "http://%s:47989/pair?uniqueid=%s&devicename=roth&updateState=1&serverchallengeresp=%s", server->serverInfo.address, unique_id, challengeRespEncrypted.hex().bytes());
|
|
|
|
if ((ret = http_request(url, &data)) != GS_OK) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if ((ret = gs_pair_validate(data, &result) != GS_OK)) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if (xml_search(data.bytes(), data.size(), "pairingsecret", &result) != GS_OK) {
|
|
ret = GS_INVALID;
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
LOG("Start pairing stage #4\n");
|
|
|
|
Data serverSecretResp = Data(result, strlen(result)).hex_to_bytes();
|
|
Data serverSecret = serverSecretResp.subdata(0, 16);
|
|
Data serverSignature = serverSecretResp.subdata(16, 256);
|
|
|
|
if (!CryptoManager::verify_signature(serverSecret, serverSignature, plainCert.hex_to_bytes())) {
|
|
gs_error = "MITM attack detected";
|
|
ret = GS_FAILED;
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
Data serverChallengeRespHashInput = randomChallenge.append(CryptoManager::signature(plainCert.hex_to_bytes())).append(serverSecret);
|
|
Data serverChallengeRespHash;
|
|
if (server->serverMajorVersion >= 7) {
|
|
serverChallengeRespHash = CryptoManager::SHA256_hash_data(serverChallengeRespHashInput);
|
|
}
|
|
else {
|
|
serverChallengeRespHash = CryptoManager::SHA1_hash_data(serverChallengeRespHashInput);
|
|
}
|
|
|
|
Data clientPairingSecret = clientSecret.append(CryptoManager::sign_data(clientSecret, CryptoManager::key_data()));
|
|
|
|
snprintf(url, sizeof(url), "http://%s:47989/pair?uniqueid=%s&devicename=roth&updateState=1&clientpairingsecret=%s", server->serverInfo.address, unique_id, clientPairingSecret.hex().bytes());
|
|
if ((ret = http_request(url, &data)) != GS_OK) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if ((ret = gs_pair_validate(data, &result) != GS_OK)) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
LOG("Start pairing stage #5\n");
|
|
|
|
snprintf(url, sizeof(url), "https://%s:47984/pair?uniqueid=%s&devicename=roth&updateState=1&phrase=pairchallenge", server->serverInfo.address, unique_id);
|
|
if ((ret = http_request(url, &data)) != GS_OK) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
if ((ret = gs_pair_validate(data, &result) != GS_OK)) {
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
server->paired = true;
|
|
|
|
return gs_pair_cleanup(ret, server, &result);
|
|
}
|
|
|
|
int gs_applist(PSERVER_DATA server, PAPP_LIST *list) {
|
|
int ret = GS_OK;
|
|
char url[4096];
|
|
Data data;
|
|
|
|
snprintf(url, sizeof(url), "https://%s:47984/applist?uniqueid=%s", server->serverInfo.address, unique_id);
|
|
|
|
if (http_request(url, &data) != GS_OK)
|
|
ret = GS_IO_ERROR;
|
|
else if (xml_status(data.bytes(), data.size()) == GS_ERROR)
|
|
ret = GS_ERROR;
|
|
else if (xml_applist(data.bytes(), data.size(), list) != GS_OK)
|
|
ret = GS_INVALID;
|
|
return ret;
|
|
}
|
|
|
|
int gs_app_boxart(PSERVER_DATA server, int app_id, char **art_data, size_t *art_data_size) {
|
|
int ret = GS_OK;
|
|
char url[4096];
|
|
Data data;
|
|
|
|
snprintf(url, sizeof(url), "https://%s:47984/appasset?uniqueid=%s&appid=%d&AssetType=2&AssetIdx=0", server->serverInfo.address, unique_id, app_id);
|
|
|
|
if (http_request(url, &data) != GS_OK) {
|
|
ret = GS_IO_ERROR;
|
|
*art_data_size = 0;
|
|
*art_data = NULL;
|
|
}
|
|
else {
|
|
*art_data_size = data.size();
|
|
*art_data = (char *)malloc(*art_data_size);
|
|
memcpy(*art_data, data.bytes(), *art_data_size);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int gs_start_app(PSERVER_DATA server, STREAM_CONFIGURATION *config, int appId, bool sops, bool localaudio, int gamepad_mask) {
|
|
int ret = GS_OK;
|
|
char* result = NULL;
|
|
|
|
PDISPLAY_MODE mode = server->modes;
|
|
bool correct_mode = false;
|
|
bool supported_resolution = false;
|
|
while (mode != NULL) {
|
|
if (mode->width == config->width && mode->height == config->height) {
|
|
supported_resolution = true;
|
|
if (mode->refresh == config->fps)
|
|
correct_mode = true;
|
|
}
|
|
|
|
mode = mode->next;
|
|
}
|
|
|
|
if (!correct_mode && !server->unsupported)
|
|
return GS_NOT_SUPPORTED_MODE;
|
|
else if (sops && !supported_resolution)
|
|
return GS_NOT_SUPPORTED_SOPS_RESOLUTION;
|
|
|
|
if (config->height >= 2160 && !server->supports4K)
|
|
return GS_NOT_SUPPORTED_4K;
|
|
|
|
Data rand = Data::random_bytes(16);
|
|
memcpy(config->remoteInputAesKey, rand.bytes(), 16);
|
|
|
|
char url[4096];
|
|
u_int32_t rikeyid = 0;
|
|
|
|
Data data;
|
|
|
|
if (server->currentGame == 0) {
|
|
int channelCounnt = config->audioConfiguration == AUDIO_CONFIGURATION_STEREO ? CHANNEL_COUNT_STEREO : CHANNEL_COUNT_51_SURROUND;
|
|
int mask = config->audioConfiguration == AUDIO_CONFIGURATION_STEREO ? CHANNEL_MASK_STEREO : CHANNEL_MASK_51_SURROUND;
|
|
int fps = sops && config->fps > 60 ? 60 : config->fps;
|
|
snprintf(url, sizeof(url), "https://%s:47984/launch?uniqueid=%s&appid=%d&mode=%dx%dx%d&additionalStates=1&sops=%d&rikey=%s&rikeyid=%d&localAudioPlayMode=%d&surroundAudioInfo=%d&remoteControllersBitmap=%d&gcmap=%d", server->serverInfo.address, unique_id, appId, config->width, config->height, fps, sops, rand.hex().bytes(), rikeyid, localaudio, (mask << 16) + channelCounnt, gamepad_mask, gamepad_mask);
|
|
} else
|
|
snprintf(url, sizeof(url), "https://%s:47984/resume?uniqueid=%s&rikey=%s&rikeyid=%d", server->serverInfo.address, unique_id, rand.hex().bytes(), rikeyid);
|
|
|
|
if ((ret = http_request(url, &data)) == GS_OK)
|
|
server->currentGame = appId;
|
|
else
|
|
goto cleanup;
|
|
|
|
if ((ret = xml_status(data.bytes(), data.size()) != GS_OK))
|
|
goto cleanup;
|
|
else if ((ret = xml_search(data.bytes(), data.size(), "gamesession", &result)) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (!strcmp(result, "0")) {
|
|
ret = GS_FAILED;
|
|
goto cleanup;
|
|
}
|
|
|
|
cleanup:
|
|
if (result != NULL)
|
|
free(result);
|
|
|
|
return ret;
|
|
return GS_FAILED;
|
|
}
|
|
|
|
int gs_quit_app(PSERVER_DATA server) {
|
|
int ret = GS_OK;
|
|
char url[4096];
|
|
char* result = NULL;
|
|
Data data;
|
|
|
|
snprintf(url, sizeof(url), "https://%s:47984/cancel?uniqueid=%s", server->serverInfo.address, unique_id);
|
|
if ((ret = http_request(url, &data)) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if ((ret = xml_status(data.bytes(), data.size()) != GS_OK))
|
|
goto cleanup;
|
|
else if ((ret = xml_search(data.bytes(), data.size(), "cancel", &result)) != GS_OK)
|
|
goto cleanup;
|
|
|
|
if (strcmp(result, "0") == 0) {
|
|
ret = GS_FAILED;
|
|
goto cleanup;
|
|
}
|
|
|
|
cleanup:
|
|
if (result != NULL)
|
|
free(result);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int gs_init(PSERVER_DATA server, char *address, const char *keyDirectory, int log_level, bool unsupported) {
|
|
if (!CryptoManager::load_cert_key_pair()) {
|
|
LOG("No certs, generate new...\n");
|
|
|
|
if (!CryptoManager::generate_new_cert_key_pair()) {
|
|
LOG("Failed to generate certs...\n");
|
|
return GS_FAILED;
|
|
}
|
|
}
|
|
|
|
http_init(keyDirectory, log_level);
|
|
|
|
LiInitializeServerInformation(&server->serverInfo);
|
|
server->serverInfo.address = address;
|
|
server->unsupported = unsupported;
|
|
return load_server_status(server);
|
|
}
|