189 lines
		
	
	
	
		
			5.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			189 lines
		
	
	
	
		
			5.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
| This file is part of Telegram Desktop,
 | |
| the official desktop application for the Telegram messaging service.
 | |
| 
 | |
| For license and copyright information please follow this link:
 | |
| https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
 | |
| */
 | |
| #include "mtproto/mtproto_auth_key.h"
 | |
| 
 | |
| #include "base/openssl_help.h"
 | |
| 
 | |
| #include <QtCore/QDataStream>
 | |
| 
 | |
| namespace MTP {
 | |
| 
 | |
| AuthKey::AuthKey(Type type, DcId dcId, const Data &data)
 | |
| : _type(type)
 | |
| , _dcId(dcId)
 | |
| , _key(data) {
 | |
| 	countKeyId();
 | |
| 	if (type == Type::Generated || type == Type::Temporary) {
 | |
| 		_creationTime = crl::now();
 | |
| 	}
 | |
| }
 | |
| 
 | |
| AuthKey::AuthKey(const Data &data) : _type(Type::Local), _key(data) {
 | |
| 	countKeyId();
 | |
| }
 | |
| 
 | |
| AuthKey::Type AuthKey::type() const {
 | |
| 	return _type;
 | |
| }
 | |
| 
 | |
| int AuthKey::dcId() const {
 | |
| 	return _dcId;
 | |
| }
 | |
| 
 | |
| AuthKey::KeyId AuthKey::keyId() const {
 | |
| 	return _keyId;
 | |
| }
 | |
| 
 | |
| void AuthKey::prepareAES_oldmtp(const MTPint128 &msgKey, MTPint256 &aesKey, MTPint256 &aesIV, bool send) const {
 | |
| 	uint32 x = send ? 0 : 8;
 | |
| 
 | |
| 	bytes::array<20> sha1_a, sha1_b, sha1_c, sha1_d;
 | |
| 	bytes::array<16 + 32> data_a;
 | |
| 	memcpy(data_a.data(), &msgKey, 16);
 | |
| 	memcpy(data_a.data() + 16, _key.data() + x, 32);
 | |
| 	openssl::Sha1To(sha1_a, data_a);
 | |
| 
 | |
| 	bytes::array<16 + 16 + 16> data_b;
 | |
| 	memcpy(data_b.data(), _key.data() + 32 + x, 16);
 | |
| 	memcpy(data_b.data() + 16, &msgKey, 16);
 | |
| 	memcpy(data_b.data() + 32, _key.data() + 48 + x, 16);
 | |
| 	openssl::Sha1To(sha1_b, data_b);
 | |
| 
 | |
| 	bytes::array<32 + 16> data_c;
 | |
| 	memcpy(data_c.data(), _key.data() + 64 + x, 32);
 | |
| 	memcpy(data_c.data() + 32, &msgKey, 16);
 | |
| 	openssl::Sha1To(sha1_c, data_c);
 | |
| 
 | |
| 	bytes::array<16 + 32> data_d;
 | |
| 	memcpy(data_d.data(), &msgKey, 16);
 | |
| 	memcpy(data_d.data() + 16, _key.data() + 96 + x, 32);
 | |
| 	openssl::Sha1To(sha1_d, data_d);
 | |
| 
 | |
| 	auto key = reinterpret_cast<bytes::type*>(&aesKey);
 | |
| 	auto iv = reinterpret_cast<bytes::type*>(&aesIV);
 | |
| 	memcpy(key, sha1_a.data(), 8);
 | |
| 	memcpy(key + 8, sha1_b.data() + 8, 12);
 | |
| 	memcpy(key + 8 + 12, sha1_c.data() + 4, 12);
 | |
| 	memcpy(iv, sha1_a.data() + 8, 12);
 | |
| 	memcpy(iv + 12, sha1_b.data(), 8);
 | |
| 	memcpy(iv + 12 + 8, sha1_c.data() + 16, 4);
 | |
| 	memcpy(iv + 12 + 8 + 4, sha1_d.data(), 8);
 | |
| }
 | |
| 
 | |
| void AuthKey::prepareAES(const MTPint128 &msgKey, MTPint256 &aesKey, MTPint256 &aesIV, bool send) const {
 | |
| 	uint32 x = send ? 0 : 8;
 | |
| 
 | |
| 	bytes::array<32> sha256_a, sha256_b;
 | |
| 	bytes::array<16 + 36> data_a;
 | |
| 	memcpy(data_a.data(), &msgKey, 16);
 | |
| 	memcpy(data_a.data() + 16, _key.data() + x, 36);
 | |
| 	openssl::Sha256To(sha256_a, data_a);
 | |
| 
 | |
| 	bytes::array<36 + 16> data_b;
 | |
| 	memcpy(data_b.data(), _key.data() + 40 + x, 36);
 | |
| 	memcpy(data_b.data() + 36, &msgKey, 16);
 | |
| 	openssl::Sha256To(sha256_b, data_b);
 | |
| 
 | |
| 	auto key = reinterpret_cast<uchar*>(&aesKey);
 | |
| 	auto iv = reinterpret_cast<uchar*>(&aesIV);
 | |
| 	memcpy(key, sha256_a.data(), 8);
 | |
| 	memcpy(key + 8, sha256_b.data() + 8, 16);
 | |
| 	memcpy(key + 8 + 16, sha256_a.data() + 24, 8);
 | |
| 	memcpy(iv, sha256_b.data(), 8);
 | |
| 	memcpy(iv + 8, sha256_a.data() + 8, 16);
 | |
| 	memcpy(iv + 8 + 16, sha256_b.data() + 24, 8);
 | |
| }
 | |
| 
 | |
| const void *AuthKey::partForMsgKey(bool send) const {
 | |
| 	return _key.data() + 88 + (send ? 0 : 8);
 | |
| }
 | |
| 
 | |
| void AuthKey::write(QDataStream &to) const {
 | |
| 	to.writeRawData(reinterpret_cast<const char*>(_key.data()), _key.size());
 | |
| }
 | |
| 
 | |
| bytes::const_span AuthKey::data() const {
 | |
| 	return _key;
 | |
| }
 | |
| 
 | |
| bool AuthKey::equals(const std::shared_ptr<AuthKey> &other) const {
 | |
| 	return other ? (_key == other->_key) : false;
 | |
| }
 | |
| 
 | |
| crl::time AuthKey::creationTime() const {
 | |
| 	return _creationTime;
 | |
| }
 | |
| 
 | |
| TimeId AuthKey::expiresAt() const {
 | |
| 	return _expiresAt;
 | |
| }
 | |
| 
 | |
| void AuthKey::setExpiresAt(TimeId expiresAt) {
 | |
| 	Expects(_type == Type::Temporary);
 | |
| 
 | |
| 	_expiresAt = expiresAt;
 | |
| }
 | |
| 
 | |
| void AuthKey::FillData(Data &authKey, bytes::const_span computedAuthKey) {
 | |
| 	auto computedAuthKeySize = computedAuthKey.size();
 | |
| 	Assert(computedAuthKeySize <= kSize);
 | |
| 	auto authKeyBytes = gsl::make_span(authKey);
 | |
| 	if (computedAuthKeySize < kSize) {
 | |
| 		bytes::set_with_const(authKeyBytes.subspan(0, kSize - computedAuthKeySize), gsl::byte());
 | |
| 		bytes::copy(authKeyBytes.subspan(kSize - computedAuthKeySize), computedAuthKey);
 | |
| 	} else {
 | |
| 		bytes::copy(authKeyBytes, computedAuthKey);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void AuthKey::countKeyId() {
 | |
| 	const auto hash = openssl::Sha1(_key);
 | |
| 
 | |
| 	// Lower 64 bits = 8 bytes of 20 byte SHA1 hash.
 | |
| 	_keyId = *reinterpret_cast<const KeyId*>(hash.data() + 12);
 | |
| }
 | |
| 
 | |
| void aesIgeEncryptRaw(const void *src, void *dst, uint32 len, const void *key, const void *iv) {
 | |
| 	uchar aes_key[32], aes_iv[32];
 | |
| 	memcpy(aes_key, key, 32);
 | |
| 	memcpy(aes_iv, iv, 32);
 | |
| 
 | |
| 	AES_KEY aes;
 | |
| 	AES_set_encrypt_key(aes_key, 256, &aes);
 | |
| 	AES_ige_encrypt(static_cast<const uchar*>(src), static_cast<uchar*>(dst), len, &aes, aes_iv, AES_ENCRYPT);
 | |
| }
 | |
| 
 | |
| void aesIgeDecryptRaw(const void *src, void *dst, uint32 len, const void *key, const void *iv) {
 | |
| 	uchar aes_key[32], aes_iv[32];
 | |
| 	memcpy(aes_key, key, 32);
 | |
| 	memcpy(aes_iv, iv, 32);
 | |
| 
 | |
| 	AES_KEY aes;
 | |
| 	AES_set_decrypt_key(aes_key, 256, &aes);
 | |
| 	AES_ige_encrypt(static_cast<const uchar*>(src), static_cast<uchar*>(dst), len, &aes, aes_iv, AES_DECRYPT);
 | |
| }
 | |
| 
 | |
| void aesCtrEncrypt(bytes::span data, const void *key, CTRState *state) {
 | |
| 	AES_KEY aes;
 | |
| 	AES_set_encrypt_key(static_cast<const uchar*>(key), 256, &aes);
 | |
| 
 | |
| 	static_assert(CTRState::IvecSize == AES_BLOCK_SIZE, "Wrong size of ctr ivec!");
 | |
| 	static_assert(CTRState::EcountSize == AES_BLOCK_SIZE, "Wrong size of ctr ecount!");
 | |
| 
 | |
| 	CRYPTO_ctr128_encrypt(
 | |
| 		reinterpret_cast<const uchar*>(data.data()),
 | |
| 		reinterpret_cast<uchar*>(data.data()),
 | |
| 		data.size(),
 | |
| 		&aes,
 | |
| 		state->ivec,
 | |
| 		state->ecount,
 | |
| 		&state->num,
 | |
| 		(block128_f)AES_encrypt);
 | |
| }
 | |
| 
 | |
| } // namespace MTP
 | 
