2013-10-11 16:52:20 -04:00
# define _FILE_OFFSET_BITS 64
# include <assert.h>
# include <string.h>
# include <stdio.h>
# include <stdlib.h>
# include <signal.h>
# include <unistd.h>
# include <fcntl.h>
# include <sys/types.h>
# include <aio.h>
# include <netdb.h>
# include <openssl/rand.h>
# include <openssl/rsa.h>
# include <openssl/pem.h>
# include <openssl/sha.h>
# include <sys/socket.h>
# include <netinet/tcp.h>
# include <poll.h>
2013-10-18 12:00:47 -04:00
# include <zlib.h>
2013-10-11 16:52:20 -04:00
# include "net.h"
# include "include.h"
# include "queries.h"
# include "loop.h"
2013-10-13 06:18:08 -04:00
# include "interface.h"
2013-10-16 15:19:39 -04:00
# include "structures.h"
2013-10-11 16:52:20 -04:00
# define sha1 SHA1
# include "mtproto-common.h"
# define MAX_NET_RES (1L << 16)
int verbosity ;
int auth_success ;
enum dc_state c_state ;
char nonce [ 256 ] ;
char new_nonce [ 256 ] ;
char server_nonce [ 256 ] ;
int rpc_execute ( struct connection * c , int op , int len ) ;
int rpc_becomes_ready ( struct connection * c ) ;
int rpc_close ( struct connection * c ) ;
struct connection_methods auth_methods = {
. execute = rpc_execute ,
. ready = rpc_becomes_ready ,
. close = rpc_close
} ;
long long precise_time ;
long long precise_time_rdtsc ;
double get_utime ( int clock_id ) {
struct timespec T ;
# if _POSIX_TIMERS
assert ( clock_gettime ( clock_id , & T ) > = 0 ) ;
double res = T . tv_sec + ( double ) T . tv_nsec * 1e-9 ;
# else
# error "No high-precision clock"
double res = time ( ) ;
# endif
if ( clock_id = = CLOCK_REALTIME ) {
precise_time = ( long long ) ( res * ( 1LL < < 32 ) ) ;
precise_time_rdtsc = rdtsc ( ) ;
}
return res ;
}
# define STATS_BUFF_SIZE (64 << 10)
int stats_buff_len ;
char stats_buff [ STATS_BUFF_SIZE ] ;
# define MAX_RESPONSE_SIZE (1L << 24)
char Response [ MAX_RESPONSE_SIZE ] ;
int Response_len ;
/*
*
* STATE MACHINE
*
*/
char * rsa_public_key_name = " id_rsa.pub " ;
RSA * pubKey ;
long long pk_fingerprint ;
static int rsa_load_public_key ( const char * public_key_name ) {
pubKey = NULL ;
FILE * f = fopen ( public_key_name , " r " ) ;
if ( f = = NULL ) {
2013-10-13 06:18:08 -04:00
logprintf ( " Couldn't open public key file: %s \n " , public_key_name ) ;
2013-10-11 16:52:20 -04:00
return - 1 ;
}
pubKey = PEM_read_RSAPublicKey ( f , NULL , NULL , NULL ) ;
fclose ( f ) ;
if ( pubKey = = NULL ) {
2013-10-13 06:18:08 -04:00
logprintf ( " PEM_read_RSAPublicKey returns NULL. \n " ) ;
2013-10-11 16:52:20 -04:00
return - 1 ;
}
return 0 ;
}
int auth_work_start ( struct connection * c ) ;
/*
*
* UNAUTHORIZED ( DH KEY EXCHANGE ) PROTOCOL PART
*
*/
BIGNUM dh_prime , dh_g , g_a , dh_power , auth_key_num ;
char s_power [ 256 ] ;
struct {
long long auth_key_id ;
long long out_msg_id ;
int msg_len ;
} unenc_msg_header ;
# define ENCRYPT_BUFFER_INTS 16384
int encrypt_buffer [ ENCRYPT_BUFFER_INTS ] ;
# define DECRYPT_BUFFER_INTS 16384
int decrypt_buffer [ ENCRYPT_BUFFER_INTS ] ;
int encrypt_packet_buffer ( void ) {
return pad_rsa_encrypt ( ( char * ) packet_buffer , ( packet_ptr - packet_buffer ) * 4 , ( char * ) encrypt_buffer , ENCRYPT_BUFFER_INTS * 4 , pubKey - > n , pubKey - > e ) ;
}
int encrypt_packet_buffer_aes_unauth ( const char server_nonce [ 16 ] , const char hidden_client_nonce [ 32 ] ) {
init_aes_unauth ( server_nonce , hidden_client_nonce , AES_ENCRYPT ) ;
return pad_aes_encrypt ( ( char * ) packet_buffer , ( packet_ptr - packet_buffer ) * 4 , ( char * ) encrypt_buffer , ENCRYPT_BUFFER_INTS * 4 ) ;
}
int rpc_send_packet ( struct connection * c ) {
int len = ( packet_ptr - packet_buffer ) * 4 ;
c - > out_packet_num + + ;
long long next_msg_id = ( long long ) ( ( 1LL < < 32 ) * get_utime ( CLOCK_REALTIME ) ) & - 4 ;
if ( next_msg_id < = unenc_msg_header . out_msg_id ) {
unenc_msg_header . out_msg_id + = 4 ;
} else {
unenc_msg_header . out_msg_id = next_msg_id ;
}
unenc_msg_header . msg_len = len ;
int total_len = len + 20 ;
assert ( total_len > 0 & & ! ( total_len & 0xfc000003 ) ) ;
total_len > > = 2 ;
if ( total_len < 0x7f ) {
assert ( write_out ( c , & total_len , 1 ) = = 1 ) ;
} else {
total_len = ( total_len < < 8 ) | 0x7f ;
assert ( write_out ( c , & total_len , 4 ) = = 4 ) ;
}
write_out ( c , & unenc_msg_header , 20 ) ;
write_out ( c , packet_buffer , len ) ;
flush_out ( c ) ;
return 1 ;
}
int rpc_send_message ( struct connection * c , void * data , int len ) {
assert ( len > 0 & & ! ( len & 0xfc000003 ) ) ;
int total_len = len > > 2 ;
if ( total_len < 0x7f ) {
assert ( write_out ( c , & total_len , 1 ) = = 1 ) ;
} else {
total_len = ( total_len < < 8 ) | 0x7f ;
assert ( write_out ( c , & total_len , 4 ) = = 4 ) ;
}
c - > out_packet_num + + ;
write_out ( c , data , len ) ;
flush_out ( c ) ;
return 1 ;
}
int send_req_pq_packet ( struct connection * c ) {
assert ( c_state = = st_init ) ;
assert ( RAND_pseudo_bytes ( ( unsigned char * ) nonce , 16 ) > = 0 ) ;
unenc_msg_header . out_msg_id = 0 ;
clear_packet ( ) ;
out_int ( CODE_req_pq ) ;
out_ints ( ( int * ) nonce , 4 ) ;
rpc_send_packet ( c ) ;
c_state = st_reqpq_sent ;
return 1 ;
}
unsigned long long gcd ( unsigned long long a , unsigned long long b ) {
return b ? gcd ( b , a % b ) : a ;
}
//typedef unsigned int uint128_t __attribute__ ((mode(TI)));
unsigned long long what ;
unsigned p1 , p2 ;
int process_respq_answer ( struct connection * c , char * packet , int len ) {
int i ;
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " process_respq_answer(), len=%d \n " , len ) ;
2013-10-11 16:52:20 -04:00
}
assert ( len > = 76 ) ;
assert ( ! * ( long long * ) packet ) ;
assert ( * ( int * ) ( packet + 16 ) = = len - 20 ) ;
assert ( ! ( len & 3 ) ) ;
assert ( * ( int * ) ( packet + 20 ) = = CODE_resPQ ) ;
assert ( ! memcmp ( packet + 24 , nonce , 16 ) ) ;
memcpy ( server_nonce , packet + 40 , 16 ) ;
char * from = packet + 56 ;
int clen = * from + + ;
assert ( clen < = 8 ) ;
what = 0 ;
for ( i = 0 ; i < clen ; i + + ) {
what = ( what < < 8 ) + ( unsigned char ) * from + + ;
}
while ( ( ( unsigned long ) from ) & 3 ) + + from ;
p1 = 0 , p2 = 0 ;
if ( verbosity > = 2 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " %lld received \n " , what ) ;
2013-10-11 16:52:20 -04:00
}
int it = 0 ;
unsigned long long g = 0 ;
for ( i = 0 ; i < 3 | | it < 1000 ; i + + ) {
int q = ( ( lrand48 ( ) & 15 ) + 17 ) % what ;
unsigned long long x = ( long long ) lrand48 ( ) % ( what - 1 ) + 1 , y = x ;
int lim = 1 < < ( i + 18 ) ;
int j ;
for ( j = 1 ; j < lim ; j + + ) {
+ + it ;
unsigned long long a = x , b = x , c = q ;
while ( b ) {
if ( b & 1 ) {
c + = a ;
if ( c > = what ) {
c - = what ;
}
}
a + = a ;
if ( a > = what ) {
a - = what ;
}
b > > = 1 ;
}
x = c ;
unsigned long long z = x < y ? what + x - y : x - y ;
g = gcd ( z , what ) ;
if ( g ! = 1 ) {
break ;
}
if ( ! ( j & ( j - 1 ) ) ) {
y = x ;
}
}
if ( g > 1 & & g < what ) break ;
}
assert ( g > 1 & & g < what ) ;
p1 = g ;
p2 = what / g ;
if ( p1 > p2 ) {
unsigned t = p1 ; p1 = p2 ; p2 = t ;
}
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " p1 = %d, p2 = %d, %d iterations \n " , p1 , p2 , it ) ;
2013-10-11 16:52:20 -04:00
}
/// ++p1; ///
assert ( * ( int * ) ( from ) = = CODE_vector ) ;
int fingerprints_num = * ( int * ) ( from + 4 ) ;
assert ( fingerprints_num > = 1 & & fingerprints_num < = 64 & & len = = fingerprints_num * 8 + 8 + ( from - packet ) ) ;
long long * fingerprints = ( long long * ) ( from + 8 ) ;
for ( i = 0 ; i < fingerprints_num ; i + + ) {
if ( fingerprints [ i ] = = pk_fingerprint ) {
2013-10-13 06:18:08 -04:00
//logprintf ( "found our public key at position %d\n", i);
2013-10-11 16:52:20 -04:00
break ;
}
}
if ( i = = fingerprints_num ) {
2013-10-13 06:18:08 -04:00
logprintf ( " fatal: don't have any matching keys (%016llx expected) \n " , pk_fingerprint ) ;
2013-10-11 16:52:20 -04:00
exit ( 2 ) ;
}
// create inner part (P_Q_inner_data)
clear_packet ( ) ;
packet_ptr + = 5 ;
out_int ( CODE_p_q_inner_data ) ;
out_cstring ( packet + 57 , clen ) ;
//out_int (0x0f01); // pq=15
if ( p1 < 256 ) {
clen = 1 ;
} else if ( p1 < 65536 ) {
clen = 2 ;
} else if ( p1 < 16777216 ) {
clen = 3 ;
} else {
clen = 4 ;
}
p1 = __builtin_bswap32 ( p1 ) ;
out_cstring ( ( char * ) & p1 + 4 - clen , clen ) ;
p1 = __builtin_bswap32 ( p1 ) ;
if ( p2 < 256 ) {
clen = 1 ;
} else if ( p2 < 65536 ) {
clen = 2 ;
} else if ( p2 < 16777216 ) {
clen = 3 ;
} else {
clen = 4 ;
}
p2 = __builtin_bswap32 ( p2 ) ;
out_cstring ( ( char * ) & p2 + 4 - clen , clen ) ;
p2 = __builtin_bswap32 ( p2 ) ;
//out_int (0x0301); // p=3
//out_int (0x0501); // q=5
out_ints ( ( int * ) nonce , 4 ) ;
out_ints ( ( int * ) server_nonce , 4 ) ;
assert ( RAND_pseudo_bytes ( ( unsigned char * ) new_nonce , 32 ) > = 0 ) ;
out_ints ( ( int * ) new_nonce , 8 ) ;
sha1 ( ( unsigned char * ) ( packet_buffer + 5 ) , ( packet_ptr - packet_buffer - 5 ) * 4 , ( unsigned char * ) packet_buffer ) ;
int l = encrypt_packet_buffer ( ) ;
clear_packet ( ) ;
out_int ( CODE_req_DH_params ) ;
out_ints ( ( int * ) nonce , 4 ) ;
out_ints ( ( int * ) server_nonce , 4 ) ;
//out_int (0x0301); // p=3
//out_int (0x0501); // q=5
if ( p1 < 256 ) {
clen = 1 ;
} else if ( p1 < 65536 ) {
clen = 2 ;
} else if ( p1 < 16777216 ) {
clen = 3 ;
} else {
clen = 4 ;
}
p1 = __builtin_bswap32 ( p1 ) ;
out_cstring ( ( char * ) & p1 + 4 - clen , clen ) ;
p1 = __builtin_bswap32 ( p1 ) ;
if ( p2 < 256 ) {
clen = 1 ;
} else if ( p2 < 65536 ) {
clen = 2 ;
} else if ( p2 < 16777216 ) {
clen = 3 ;
} else {
clen = 4 ;
}
p2 = __builtin_bswap32 ( p2 ) ;
out_cstring ( ( char * ) & p2 + 4 - clen , clen ) ;
p2 = __builtin_bswap32 ( p2 ) ;
out_long ( pk_fingerprint ) ;
out_cstring ( ( char * ) encrypt_buffer , l ) ;
c_state = st_reqdh_sent ;
return rpc_send_packet ( c ) ;
}
int process_dh_answer ( struct connection * c , char * packet , int len ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " process_dh_answer(), len=%d \n " , len ) ;
2013-10-11 16:52:20 -04:00
}
if ( len < 116 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " %u * %u = %llu " , p1 , p2 , what ) ;
2013-10-11 16:52:20 -04:00
}
assert ( len > = 116 ) ;
assert ( ! * ( long long * ) packet ) ;
assert ( * ( int * ) ( packet + 16 ) = = len - 20 ) ;
assert ( ! ( len & 3 ) ) ;
assert ( * ( int * ) ( packet + 20 ) = = ( int ) CODE_server_DH_params_ok ) ;
assert ( ! memcmp ( packet + 24 , nonce , 16 ) ) ;
assert ( ! memcmp ( packet + 40 , server_nonce , 16 ) ) ;
init_aes_unauth ( server_nonce , new_nonce , AES_DECRYPT ) ;
in_ptr = ( int * ) ( packet + 56 ) ;
in_end = ( int * ) ( packet + len ) ;
int l = prefetch_strlen ( ) ;
assert ( l > 0 ) ;
l = pad_aes_decrypt ( fetch_str ( l ) , l , ( char * ) decrypt_buffer , DECRYPT_BUFFER_INTS * 4 - 16 ) ;
assert ( in_ptr = = in_end ) ;
assert ( l > = 60 ) ;
assert ( decrypt_buffer [ 5 ] = = ( int ) CODE_server_DH_inner_data ) ;
assert ( ! memcmp ( decrypt_buffer + 6 , nonce , 16 ) ) ;
assert ( ! memcmp ( decrypt_buffer + 10 , server_nonce , 16 ) ) ;
assert ( decrypt_buffer [ 14 ] = = 2 ) ;
in_ptr = decrypt_buffer + 15 ;
in_end = decrypt_buffer + ( l > > 2 ) ;
BN_init ( & dh_prime ) ;
BN_init ( & g_a ) ;
assert ( fetch_bignum ( & dh_prime ) > 0 ) ;
assert ( fetch_bignum ( & g_a ) > 0 ) ;
int server_time = * in_ptr + + ;
assert ( in_ptr < = in_end ) ;
static char sha1_buffer [ 20 ] ;
sha1 ( ( unsigned char * ) decrypt_buffer + 20 , ( in_ptr - decrypt_buffer - 5 ) * 4 , ( unsigned char * ) sha1_buffer ) ;
assert ( ! memcmp ( decrypt_buffer , sha1_buffer , 20 ) ) ;
assert ( ( char * ) in_end - ( char * ) in_ptr < 16 ) ;
GET_DC ( c ) - > server_time_delta = server_time - time ( 0 ) ;
GET_DC ( c ) - > server_time_udelta = server_time - get_utime ( CLOCK_MONOTONIC ) ;
2013-10-13 06:18:08 -04:00
//logprintf ( "server time is %d, delta = %d\n", server_time, server_time_delta);
2013-10-11 16:52:20 -04:00
// Build set_client_DH_params answer
clear_packet ( ) ;
packet_ptr + = 5 ;
out_int ( CODE_client_DH_inner_data ) ;
out_ints ( ( int * ) nonce , 4 ) ;
out_ints ( ( int * ) server_nonce , 4 ) ;
out_long ( 0LL ) ;
BN_init ( & dh_g ) ;
BN_set_word ( & dh_g , 2 ) ;
assert ( RAND_pseudo_bytes ( ( unsigned char * ) s_power , 256 ) > = 0 ) ;
BIGNUM * dh_power = BN_new ( ) ;
assert ( BN_bin2bn ( ( unsigned char * ) s_power , 256 , dh_power ) = = dh_power ) ;
BIGNUM * y = BN_new ( ) ;
assert ( BN_mod_exp ( y , & dh_g , dh_power , & dh_prime , BN_ctx ) = = 1 ) ;
out_bignum ( y ) ;
BN_free ( y ) ;
BN_init ( & auth_key_num ) ;
assert ( BN_mod_exp ( & auth_key_num , & g_a , dh_power , & dh_prime , BN_ctx ) = = 1 ) ;
l = BN_num_bytes ( & auth_key_num ) ;
assert ( l > = 250 & & l < = 256 ) ;
assert ( BN_bn2bin ( & auth_key_num , ( unsigned char * ) GET_DC ( c ) - > auth_key ) ) ;
memset ( GET_DC ( c ) - > auth_key + l , 0 , 256 - l ) ;
BN_free ( dh_power ) ;
BN_free ( & auth_key_num ) ;
BN_free ( & dh_g ) ;
BN_free ( & g_a ) ;
BN_free ( & dh_prime ) ;
//hexdump (auth_key, auth_key + 256);
sha1 ( ( unsigned char * ) ( packet_buffer + 5 ) , ( packet_ptr - packet_buffer - 5 ) * 4 , ( unsigned char * ) packet_buffer ) ;
//hexdump ((char *)packet_buffer, (char *)packet_ptr);
l = encrypt_packet_buffer_aes_unauth ( server_nonce , new_nonce ) ;
clear_packet ( ) ;
out_int ( CODE_set_client_DH_params ) ;
out_ints ( ( int * ) nonce , 4 ) ;
out_ints ( ( int * ) server_nonce , 4 ) ;
out_cstring ( ( char * ) encrypt_buffer , l ) ;
c_state = st_client_dh_sent ;
return rpc_send_packet ( c ) ;
}
int process_auth_complete ( struct connection * c UU , char * packet , int len ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " process_dh_answer(), len=%d \n " , len ) ;
2013-10-11 16:52:20 -04:00
}
assert ( len = = 72 ) ;
assert ( ! * ( long long * ) packet ) ;
assert ( * ( int * ) ( packet + 16 ) = = len - 20 ) ;
assert ( ! ( len & 3 ) ) ;
assert ( * ( int * ) ( packet + 20 ) = = CODE_dh_gen_ok ) ;
assert ( ! memcmp ( packet + 24 , nonce , 16 ) ) ;
assert ( ! memcmp ( packet + 40 , server_nonce , 16 ) ) ;
static unsigned char tmp [ 44 ] , sha1_buffer [ 20 ] ;
memcpy ( tmp , new_nonce , 32 ) ;
tmp [ 32 ] = 1 ;
sha1 ( ( unsigned char * ) GET_DC ( c ) - > auth_key , 256 , sha1_buffer ) ;
GET_DC ( c ) - > auth_key_id = * ( long long * ) ( sha1_buffer + 12 ) ;
memcpy ( tmp + 33 , sha1_buffer , 8 ) ;
sha1 ( tmp , 41 , sha1_buffer ) ;
assert ( ! memcmp ( packet + 56 , sha1_buffer + 4 , 16 ) ) ;
GET_DC ( c ) - > server_salt = * ( long long * ) server_nonce ^ * ( long long * ) new_nonce ;
if ( verbosity > = 3 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " auth_key_id=%016llx \n " , GET_DC ( c ) - > auth_key_id ) ;
2013-10-11 16:52:20 -04:00
}
//kprintf ("OK\n");
//c->status = conn_error;
//sleep (1);
c_state = st_authorized ;
//return 1;
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " Auth success \n " ) ;
2013-10-11 16:52:20 -04:00
}
auth_success + + ;
GET_DC ( c ) - > flags | = 1 ;
write_auth_file ( ) ;
return 1 ;
}
/*
*
* AUTHORIZED ( MAIN ) PROTOCOL PART
*
*/
struct encrypted_message enc_msg ;
long long client_last_msg_id , server_last_msg_id ;
double get_server_time ( struct dc * DC ) {
if ( ! DC - > server_time_udelta ) {
DC - > server_time_udelta = get_utime ( CLOCK_REALTIME ) - get_utime ( CLOCK_MONOTONIC ) ;
}
return get_utime ( CLOCK_MONOTONIC ) + DC - > server_time_udelta ;
}
long long generate_next_msg_id ( struct dc * DC ) {
long long next_id = ( long long ) ( get_server_time ( DC ) * ( 1LL < < 32 ) ) & - 4 ;
if ( next_id < = client_last_msg_id ) {
next_id = client_last_msg_id + = 4 ;
} else {
client_last_msg_id = next_id ;
}
return next_id ;
}
void init_enc_msg ( struct session * S , int useful ) {
struct dc * DC = S - > dc ;
assert ( DC - > auth_key_id ) ;
enc_msg . auth_key_id = DC - > auth_key_id ;
assert ( DC - > server_salt ) ;
enc_msg . server_salt = DC - > server_salt ;
if ( ! S - > session_id ) {
assert ( RAND_pseudo_bytes ( ( unsigned char * ) & S - > session_id , 8 ) > = 0 ) ;
}
enc_msg . session_id = S - > session_id ;
//enc_msg.auth_key_id2 = auth_key_id;
enc_msg . msg_id = generate_next_msg_id ( DC ) ;
//enc_msg.msg_id -= 0x10000000LL * (lrand48 () & 15);
//kprintf ("message id %016llx\n", enc_msg.msg_id);
enc_msg . seq_no = S - > seq_no ;
if ( useful ) {
enc_msg . seq_no | = 1 ;
}
S - > seq_no + = 2 ;
} ;
int aes_encrypt_message ( struct dc * DC , struct encrypted_message * enc ) {
unsigned char sha1_buffer [ 20 ] ;
const int MINSZ = offsetof ( struct encrypted_message , message ) ;
const int UNENCSZ = offsetof ( struct encrypted_message , server_salt ) ;
int enc_len = ( MINSZ - UNENCSZ ) + enc - > msg_len ;
assert ( enc - > msg_len > = 0 & & enc - > msg_len < = MAX_MESSAGE_INTS * 4 - 16 & & ! ( enc - > msg_len & 3 ) ) ;
sha1 ( ( unsigned char * ) & enc - > server_salt , enc_len , sha1_buffer ) ;
//printf ("enc_len is %d\n", enc_len);
if ( verbosity > = 2 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " sending message with sha1 %08x \n " , * ( int * ) sha1_buffer ) ;
2013-10-11 16:52:20 -04:00
}
memcpy ( enc - > msg_key , sha1_buffer + 4 , 16 ) ;
init_aes_auth ( DC - > auth_key , enc - > msg_key , AES_ENCRYPT ) ;
//hexdump ((char *)enc, (char *)enc + enc_len + 24);
return pad_aes_encrypt ( ( char * ) & enc - > server_salt , enc_len , ( char * ) & enc - > server_salt , MAX_MESSAGE_INTS * 4 + ( MINSZ - UNENCSZ ) ) ;
}
long long encrypt_send_message ( struct connection * c , int * msg , int msg_ints , int useful ) {
struct dc * DC = GET_DC ( c ) ;
struct session * S = c - > session ;
assert ( S ) ;
const int UNENCSZ = offsetof ( struct encrypted_message , server_salt ) ;
if ( msg_ints < = 0 | | msg_ints > MAX_MESSAGE_INTS - 4 ) {
return - 1 ;
}
if ( msg ) {
memcpy ( enc_msg . message , msg , msg_ints * 4 ) ;
enc_msg . msg_len = msg_ints * 4 ;
} else {
if ( ( enc_msg . msg_len & 0x80000003 ) | | enc_msg . msg_len > MAX_MESSAGE_INTS * 4 - 16 ) {
return - 1 ;
}
}
init_enc_msg ( S , useful ) ;
//hexdump ((char *)msg, (char *)msg + (msg_ints * 4));
int l = aes_encrypt_message ( DC , & enc_msg ) ;
//hexdump ((char *)&enc_msg, (char *)&enc_msg + l + 24);
assert ( l > 0 ) ;
rpc_send_message ( c , & enc_msg , l + UNENCSZ ) ;
return client_last_msg_id ;
}
int longpoll_count , good_messages ;
int auth_work_start ( struct connection * c UU ) {
return 1 ;
}
void rpc_execute_answer ( struct connection * c , long long msg_id UU ) ;
2013-10-16 15:19:39 -04:00
void work_update ( struct connection * c UU , long long msg_id UU ) {
unsigned op = fetch_int ( ) ;
switch ( op ) {
case CODE_update_new_message :
{
struct message * M = fetch_alloc_message ( ) ;
2013-10-18 12:00:47 -04:00
fetch_int ( ) ; //pts
2013-10-16 15:19:39 -04:00
print_message ( M ) ;
break ;
} ;
case CODE_update_message_i_d :
{
int id = fetch_int ( ) ; // id
int new = fetch_long ( ) ; // random_id
struct message * M = message_get ( new ) ;
update_message_id ( M , id ) ;
}
break ;
case CODE_update_read_messages :
{
assert ( fetch_int ( ) = = ( int ) CODE_vector ) ;
int n = fetch_int ( ) ;
int i ;
for ( i = 0 ; i < n ; i + + ) {
int id = fetch_int ( ) ;
struct message * M = message_get ( id ) ;
if ( M ) {
M - > unread = 0 ;
}
}
fetch_int ( ) ; //pts
}
break ;
case CODE_update_user_typing :
{
int id = fetch_int ( ) ;
union user_chat * U = user_chat_get ( id ) ;
if ( U ) {
rprintf ( COLOR_YELLOW " User " COLOR_RED " %s %s " COLOR_YELLOW " is typing.... \n " COLOR_NORMAL , U - > user . first_name , U - > user . last_name ) ;
}
}
break ;
case CODE_update_chat_user_typing :
{
int chat_id = fetch_int ( ) ;
int id = fetch_int ( ) ;
union user_chat * C = user_chat_get ( - chat_id ) ;
union user_chat * U = user_chat_get ( id ) ;
if ( U & & C ) {
rprintf ( COLOR_YELLOW " User " COLOR_RED " %s %s " COLOR_YELLOW " is typing in chat %s.... \n " COLOR_NORMAL , U - > user . first_name , U - > user . last_name , C - > chat . title ) ;
}
}
break ;
case CODE_update_user_status :
{
int user_id = fetch_int ( ) ;
union user_chat * U = user_chat_get ( user_id ) ;
if ( U ) {
fetch_user_status ( & U - > user . status ) ;
rprintf ( COLOR_YELLOW " User " COLOR_RED " %s %s " COLOR_YELLOW " is now %s \n " COLOR_NORMAL , U - > user . first_name , U - > user . last_name , ( U - > user . status . online > 0 ) ? " online " : " offline " ) ;
} else {
struct user_status t ;
fetch_user_status ( & t ) ;
}
}
break ;
case CODE_update_user_name :
{
int user_id = fetch_int ( ) ;
union user_chat * UC = user_chat_get ( user_id ) ;
if ( UC ) {
struct user * U = & UC - > user ;
if ( U - > first_name ) { free ( U - > first_name ) ; }
if ( U - > last_name ) { free ( U - > first_name ) ; }
if ( U - > print_name ) { free ( U - > first_name ) ; }
U - > first_name = fetch_str_dup ( ) ;
U - > last_name = fetch_str_dup ( ) ;
if ( ! strlen ( U - > first_name ) ) {
if ( ! strlen ( U - > last_name ) ) {
U - > print_name = strdup ( " none " ) ;
} else {
U - > print_name = strdup ( U - > last_name ) ;
}
} else {
if ( ! strlen ( U - > last_name ) ) {
U - > print_name = strdup ( U - > first_name ) ;
} else {
U - > print_name = malloc ( strlen ( U - > first_name ) + strlen ( U - > last_name ) + 2 ) ;
sprintf ( U - > print_name , " %s_%s " , U - > first_name , U - > last_name ) ;
}
}
} else {
int l ;
l = prefetch_strlen ( ) ;
fetch_str ( l ) ;
l = prefetch_strlen ( ) ;
fetch_str ( l ) ;
l = prefetch_strlen ( ) ;
fetch_str ( l ) ;
}
}
break ;
case CODE_update_user_photo :
{
int user_id = fetch_int ( ) ;
union user_chat * UC = user_chat_get ( user_id ) ;
if ( UC ) {
struct user * U = & UC - > user ;
unsigned y = fetch_int ( ) ;
if ( y = = CODE_user_profile_photo_empty ) {
U - > photo_big . dc = - 2 ;
U - > photo_small . dc = - 2 ;
} else {
assert ( y = = CODE_user_profile_photo ) ;
fetch_file_location ( & U - > photo_small ) ;
fetch_file_location ( & U - > photo_big ) ;
}
} else {
struct file_location t ;
unsigned y = fetch_int ( ) ;
if ( y = = CODE_user_profile_photo_empty ) {
} else {
assert ( y = = CODE_user_profile_photo ) ;
fetch_file_location ( & t ) ;
fetch_file_location ( & t ) ;
}
}
}
break ;
default :
logprintf ( " Unknown update type %08x \n " , op ) ;
}
}
void work_update_short ( struct connection * c , long long msg_id ) {
assert ( fetch_int ( ) = = CODE_update_short ) ;
work_update ( c , msg_id ) ;
fetch_int ( ) ; // date
}
void work_updates ( struct connection * c , long long msg_id ) {
assert ( fetch_int ( ) = = CODE_updates ) ;
assert ( fetch_int ( ) = = CODE_vector ) ;
int n = fetch_int ( ) ;
int i ;
for ( i = 0 ; i < n ; i + + ) {
work_update ( c , msg_id ) ;
}
assert ( fetch_int ( ) = = CODE_vector ) ;
n = fetch_int ( ) ;
for ( i = 0 ; i < n ; i + + ) {
fetch_alloc_user ( ) ;
}
assert ( fetch_int ( ) = = CODE_vector ) ;
n = fetch_int ( ) ;
for ( i = 0 ; i < n ; i + + ) {
fetch_alloc_chat ( ) ;
}
fetch_int ( ) ; // date
fetch_int ( ) ; // seq
}
void work_update_short_message ( struct connection * c UU , long long msg_id UU ) {
assert ( fetch_int ( ) = = ( int ) CODE_update_short_message ) ;
struct message * M = fetch_alloc_message_short ( ) ;
print_message ( M ) ;
}
void work_update_short_chat_message ( struct connection * c UU , long long msg_id UU ) {
assert ( fetch_int ( ) = = CODE_update_short_chat_message ) ;
struct message * M = fetch_alloc_message_short_chat ( ) ;
print_message ( M ) ;
}
2013-10-11 16:52:20 -04:00
void work_container ( struct connection * c , long long msg_id UU ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " work_container: msg_id = %lld \n " , msg_id ) ;
2013-10-11 16:52:20 -04:00
}
assert ( fetch_int ( ) = = CODE_msg_container ) ;
int n = fetch_int ( ) ;
int i ;
for ( i = 0 ; i < n ; i + + ) {
long long id = fetch_long ( ) ;
int seqno = fetch_int ( ) ;
if ( seqno & 1 ) {
insert_seqno ( c - > session , seqno ) ;
}
int bytes = fetch_int ( ) ;
int * t = in_ptr ;
rpc_execute_answer ( c , id ) ;
assert ( in_ptr = = t + ( bytes / 4 ) ) ;
}
}
void work_new_session_created ( struct connection * c , long long msg_id UU ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " work_new_session_created: msg_id = %lld \n " , msg_id ) ;
2013-10-11 16:52:20 -04:00
}
assert ( fetch_int ( ) = = ( int ) CODE_new_session_created ) ;
fetch_long ( ) ; // first message id
//DC->session_id = fetch_long ();
fetch_long ( ) ; // unique_id
GET_DC ( c ) - > server_salt = fetch_long ( ) ;
}
void work_msgs_ack ( struct connection * c UU , long long msg_id UU ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " work_msgs_ack: msg_id = %lld \n " , msg_id ) ;
2013-10-11 16:52:20 -04:00
}
assert ( fetch_int ( ) = = CODE_msgs_ack ) ;
assert ( fetch_int ( ) = = CODE_vector ) ;
int n = fetch_int ( ) ;
int i ;
for ( i = 0 ; i < n ; i + + ) {
long long id = fetch_long ( ) ;
query_ack ( id ) ;
}
}
void work_rpc_result ( struct connection * c UU , long long msg_id UU ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " work_rpc_result: msg_id = %lld \n " , msg_id ) ;
2013-10-11 16:52:20 -04:00
}
assert ( fetch_int ( ) = = ( int ) CODE_rpc_result ) ;
long long id = fetch_long ( ) ;
int op = prefetch_int ( ) ;
if ( op = = CODE_rpc_error ) {
query_error ( id ) ;
} else {
query_result ( id ) ;
}
}
2013-10-18 12:00:47 -04:00
# define MAX_PACKED_SIZE (1 << 20)
void work_packed ( struct connection * c , long long msg_id ) {
assert ( fetch_int ( ) = = CODE_gzip_packed ) ;
static int in_gzip ;
static int buf [ MAX_PACKED_SIZE > > 2 ] ;
assert ( ! in_gzip ) ;
in_gzip = 1 ;
int l = prefetch_strlen ( ) ;
char * s = fetch_str ( l ) ;
size_t dl = MAX_PACKED_SIZE ;
z_stream strm = { 0 } ;
assert ( inflateInit2 ( & strm , 16 + MAX_WBITS ) = = Z_OK ) ;
strm . avail_in = l ;
strm . next_in = ( void * ) s ;
strm . avail_out = MAX_PACKED_SIZE ;
strm . next_out = ( void * ) buf ;
int err = inflate ( & strm , Z_FINISH ) ;
if ( verbosity ) {
logprintf ( " inflate error = %d \n " , err ) ;
logprintf ( " inflated %d bytes \n " , ( int ) strm . total_out ) ;
}
int * end = in_ptr ;
int * eend = in_end ;
assert ( dl % 4 = = 0 ) ;
in_ptr = buf ;
in_end = in_ptr + strm . total_out / 4 ;
if ( verbosity > = 4 ) {
logprintf ( " Unzipped data: " ) ;
hexdump_in ( ) ;
}
rpc_execute_answer ( c , msg_id ) ;
in_ptr = end ;
in_end = eend ;
in_gzip = 0 ;
}
2013-10-11 16:52:20 -04:00
void rpc_execute_answer ( struct connection * c , long long msg_id UU ) {
2013-10-16 15:19:39 -04:00
if ( verbosity > = 5 ) {
hexdump_in ( ) ;
}
2013-10-11 16:52:20 -04:00
int op = prefetch_int ( ) ;
switch ( op ) {
case CODE_msg_container :
work_container ( c , msg_id ) ;
return ;
case CODE_new_session_created :
work_new_session_created ( c , msg_id ) ;
return ;
case CODE_msgs_ack :
work_msgs_ack ( c , msg_id ) ;
return ;
case CODE_rpc_result :
work_rpc_result ( c , msg_id ) ;
return ;
2013-10-16 15:19:39 -04:00
case CODE_update_short :
work_update_short ( c , msg_id ) ;
return ;
case CODE_updates :
work_updates ( c , msg_id ) ;
return ;
case CODE_update_short_message :
work_update_short_message ( c , msg_id ) ;
return ;
case CODE_update_short_chat_message :
work_update_short_chat_message ( c , msg_id ) ;
return ;
2013-10-18 12:00:47 -04:00
case CODE_gzip_packed :
work_packed ( c , msg_id ) ;
return ;
2013-10-11 16:52:20 -04:00
}
2013-10-13 06:18:08 -04:00
logprintf ( " Unknown message: \n " ) ;
2013-10-11 16:52:20 -04:00
hexdump_in ( ) ;
}
int process_rpc_message ( struct connection * c UU , struct encrypted_message * enc , int len ) {
const int MINSZ = offsetof ( struct encrypted_message , message ) ;
const int UNENCSZ = offsetof ( struct encrypted_message , server_salt ) ;
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " process_rpc_message(), len=%d \n " , len ) ;
2013-10-11 16:52:20 -04:00
}
assert ( len > = MINSZ & & ( len & 15 ) = = ( UNENCSZ & 15 ) ) ;
struct dc * DC = GET_DC ( c ) ;
assert ( enc - > auth_key_id = = DC - > auth_key_id ) ;
assert ( DC - > auth_key_id ) ;
init_aes_auth ( DC - > auth_key + 8 , enc - > msg_key , AES_DECRYPT ) ;
int l = pad_aes_decrypt ( ( char * ) & enc - > server_salt , len - UNENCSZ , ( char * ) & enc - > server_salt , len - UNENCSZ ) ;
assert ( l = = len - UNENCSZ ) ;
//assert (enc->auth_key_id2 == enc->auth_key_id);
assert ( ! ( enc - > msg_len & 3 ) & & enc - > msg_len > 0 & & enc - > msg_len < = len - MINSZ & & len - MINSZ - enc - > msg_len < = 12 ) ;
static unsigned char sha1_buffer [ 20 ] ;
sha1 ( ( void * ) & enc - > server_salt , enc - > msg_len + ( MINSZ - UNENCSZ ) , sha1_buffer ) ;
assert ( ! memcmp ( & enc - > msg_key , sha1_buffer + 4 , 16 ) ) ;
//assert (enc->server_salt == server_salt); //in fact server salt can change
if ( DC - > server_salt ! = enc - > server_salt ) {
DC - > server_salt = enc - > server_salt ;
write_auth_file ( ) ;
}
int this_server_time = enc - > msg_id > > 32LL ;
double st = get_server_time ( DC ) ;
assert ( this_server_time > = st - 300 & & this_server_time < = st + 30 ) ;
//assert (enc->msg_id > server_last_msg_id && (enc->msg_id & 3) == 1);
if ( verbosity > = 2 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " received mesage id %016llx \n " , enc - > msg_id ) ;
2013-10-11 16:52:20 -04:00
}
server_last_msg_id = enc - > msg_id ;
//*(long long *)(longpoll_query + 3) = *(long long *)((char *)(&enc->msg_id) + 0x3c);
//*(long long *)(longpoll_query + 5) = *(long long *)((char *)(&enc->msg_id) + 0x3c);
assert ( l > = ( MINSZ - UNENCSZ ) + 8 ) ;
//assert (enc->message[0] == CODE_rpc_result && *(long long *)(enc->message + 1) == client_last_msg_id);
if ( verbosity > = 2 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " OK, message is good! \n " ) ;
2013-10-11 16:52:20 -04:00
}
+ + good_messages ;
in_ptr = enc - > message ;
in_end = in_ptr + ( enc - > msg_len / 4 ) ;
if ( enc - > seq_no & 1 ) {
insert_seqno ( c - > session , enc - > seq_no ) ;
}
assert ( c - > session - > session_id = = enc - > session_id ) ;
rpc_execute_answer ( c , enc - > msg_id ) ;
return 0 ;
}
int rpc_execute ( struct connection * c , int op , int len ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " outbound rpc connection #%d : received rpc answer %d with %d content bytes \n " , c - > fd , op , len ) ;
2013-10-11 16:52:20 -04:00
}
if ( len > = MAX_RESPONSE_SIZE /* - 12*/ | | len < 0 /*12*/ ) {
2013-10-13 06:18:08 -04:00
logprintf ( " answer too long (%d bytes), skipping \n " , len ) ;
2013-10-11 16:52:20 -04:00
return 0 ;
}
int Response_len = len ;
assert ( read_in ( c , Response , Response_len ) = = Response_len ) ;
Response [ Response_len ] = 0 ;
if ( verbosity > = 2 ) {
2013-10-13 06:18:08 -04:00
logprintf ( " have %d Response bytes \n " , Response_len ) ;
2013-10-11 16:52:20 -04:00
}
setsockopt ( c - > fd , IPPROTO_TCP , TCP_QUICKACK , ( int [ ] ) { 0 } , 4 ) ;
int o = c_state ;
if ( GET_DC ( c ) - > flags & 1 ) { o = st_authorized ; }
switch ( o ) {
case st_reqpq_sent :
process_respq_answer ( c , Response /* + 8*/ , Response_len /* - 12*/ ) ;
setsockopt ( c - > fd , IPPROTO_TCP , TCP_QUICKACK , ( int [ ] ) { 0 } , 4 ) ;
return 0 ;
case st_reqdh_sent :
process_dh_answer ( c , Response /* + 8*/ , Response_len /* - 12*/ ) ;
setsockopt ( c - > fd , IPPROTO_TCP , TCP_QUICKACK , ( int [ ] ) { 0 } , 4 ) ;
return 0 ;
case st_client_dh_sent :
process_auth_complete ( c , Response /* + 8*/ , Response_len /* - 12*/ ) ;
setsockopt ( c - > fd , IPPROTO_TCP , TCP_QUICKACK , ( int [ ] ) { 0 } , 4 ) ;
return 0 ;
case st_authorized :
process_rpc_message ( c , ( void * ) ( Response /* + 8*/ ) , Response_len /* - 12*/ ) ;
setsockopt ( c - > fd , IPPROTO_TCP , TCP_QUICKACK , ( int [ ] ) { 0 } , 4 ) ;
return 0 ;
default :
2013-10-13 06:18:08 -04:00
logprintf ( " fatal: cannot receive answer in state %d \n " , c_state ) ;
2013-10-11 16:52:20 -04:00
exit ( 2 ) ;
}
return 0 ;
}
int tc_close ( struct connection * c , int who ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " outbound http connection #%d : closing by %d \n " , c - > fd , who ) ;
2013-10-11 16:52:20 -04:00
}
return 0 ;
}
int tc_becomes_ready ( struct connection * c ) {
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " outbound connection #%d becomes ready \n " , c - > fd ) ;
2013-10-11 16:52:20 -04:00
}
char byte = 0xef ;
assert ( write_out ( c , & byte , 1 ) = = 1 ) ;
flush_out ( c ) ;
setsockopt ( c - > fd , IPPROTO_TCP , TCP_QUICKACK , ( int [ ] ) { 0 } , 4 ) ;
int o = c_state ;
if ( GET_DC ( c ) - > flags & 1 ) { o = st_authorized ; }
switch ( o ) {
case st_init :
send_req_pq_packet ( c ) ;
break ;
case st_authorized :
auth_work_start ( c ) ;
break ;
default :
2013-10-13 06:18:08 -04:00
logprintf ( " c_state = %d \n " , c_state ) ;
2013-10-11 16:52:20 -04:00
assert ( 0 ) ;
}
return 0 ;
}
int rpc_becomes_ready ( struct connection * c ) {
return tc_becomes_ready ( c ) ;
}
int rpc_close ( struct connection * c ) {
return tc_close ( c , 0 ) ;
}
int auth_is_success ( void ) {
return auth_success ;
}
void on_start ( void ) {
prng_seed ( 0 , 0 ) ;
if ( rsa_load_public_key ( rsa_public_key_name ) < 0 ) {
perror ( " rsa_load_public_key " ) ;
exit ( 1 ) ;
}
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " public key '%s' loaded successfully \n " , rsa_public_key_name ) ;
2013-10-11 16:52:20 -04:00
}
pk_fingerprint = compute_rsa_key_fingerprint ( pubKey ) ;
}
int auth_ok ( void ) {
return auth_success ;
}
void dc_authorize ( struct dc * DC ) {
c_state = 0 ;
auth_success = 0 ;
if ( ! DC - > sessions [ 0 ] ) {
dc_create_session ( DC ) ;
}
if ( verbosity ) {
2013-10-13 06:18:08 -04:00
logprintf ( " Starting authorization for DC #%d: %s:%d \n " , DC - > id , DC - > ip , DC - > port ) ;
2013-10-11 16:52:20 -04:00
}
net_loop ( 0 , auth_ok ) ;
}