/* This file is part of telegram-client. Telegram-client is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 2 of the License, or (at your option) any later version. Telegram-client is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this telegram-client. If not, see . Copyright Nikolay Durov, Andrey Lopatin 2012-2013 Copyright Vitaly Valtman 2013 */ #define _FILE_OFFSET_BITS 64 #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "net.h" #include "include.h" #include "queries.h" #include "loop.h" #include "interface.h" #include "structures.h" #define sha1 SHA1 #include "mtproto-common.h" #define MAX_NET_RES (1L << 16) int verbosity; int auth_success; enum dc_state c_state; char nonce[256]; char new_nonce[256]; char server_nonce[256]; int rpc_execute (struct connection *c, int op, int len); int rpc_becomes_ready (struct connection *c); int rpc_close (struct connection *c); struct connection_methods auth_methods = { .execute = rpc_execute, .ready = rpc_becomes_ready, .close = rpc_close }; long long precise_time; long long precise_time_rdtsc; double get_utime (int clock_id) { struct timespec T; #if _POSIX_TIMERS assert (clock_gettime (clock_id, &T) >= 0); double res = T.tv_sec + (double) T.tv_nsec * 1e-9; #else #error "No high-precision clock" double res = time (); #endif if (clock_id == CLOCK_REALTIME) { precise_time = (long long) (res * (1LL << 32)); precise_time_rdtsc = rdtsc (); } return res; } #define STATS_BUFF_SIZE (64 << 10) int stats_buff_len; char stats_buff[STATS_BUFF_SIZE]; #define MAX_RESPONSE_SIZE (1L << 24) char Response[MAX_RESPONSE_SIZE]; int Response_len; /* * * STATE MACHINE * */ char *rsa_public_key_name = "id_rsa.pub"; RSA *pubKey; long long pk_fingerprint; static int rsa_load_public_key (const char *public_key_name) { pubKey = NULL; FILE *f = fopen (public_key_name, "r"); if (f == NULL) { logprintf ( "Couldn't open public key file: %s\n", public_key_name); return -1; } pubKey = PEM_read_RSAPublicKey (f, NULL, NULL, NULL); fclose (f); if (pubKey == NULL) { logprintf ( "PEM_read_RSAPublicKey returns NULL.\n"); return -1; } return 0; } int auth_work_start (struct connection *c); /* * * UNAUTHORIZED (DH KEY EXCHANGE) PROTOCOL PART * */ BIGNUM dh_prime, dh_g, g_a, dh_power, auth_key_num; char s_power [256]; struct { long long auth_key_id; long long out_msg_id; int msg_len; } unenc_msg_header; #define ENCRYPT_BUFFER_INTS 16384 int encrypt_buffer[ENCRYPT_BUFFER_INTS]; #define DECRYPT_BUFFER_INTS 16384 int decrypt_buffer[ENCRYPT_BUFFER_INTS]; int encrypt_packet_buffer (void) { return pad_rsa_encrypt ((char *) packet_buffer, (packet_ptr - packet_buffer) * 4, (char *) encrypt_buffer, ENCRYPT_BUFFER_INTS * 4, pubKey->n, pubKey->e); } int encrypt_packet_buffer_aes_unauth (const char server_nonce[16], const char hidden_client_nonce[32]) { init_aes_unauth (server_nonce, hidden_client_nonce, AES_ENCRYPT); return pad_aes_encrypt ((char *) packet_buffer, (packet_ptr - packet_buffer) * 4, (char *) encrypt_buffer, ENCRYPT_BUFFER_INTS * 4); } int rpc_send_packet (struct connection *c) { int len = (packet_ptr - packet_buffer) * 4; c->out_packet_num ++; long long next_msg_id = (long long) ((1LL << 32) * get_utime (CLOCK_REALTIME)) & -4; if (next_msg_id <= unenc_msg_header.out_msg_id) { unenc_msg_header.out_msg_id += 4; } else { unenc_msg_header.out_msg_id = next_msg_id; } unenc_msg_header.msg_len = len; int total_len = len + 20; assert (total_len > 0 && !(total_len & 0xfc000003)); total_len >>= 2; if (total_len < 0x7f) { assert (write_out (c, &total_len, 1) == 1); } else { total_len = (total_len << 8) | 0x7f; assert (write_out (c, &total_len, 4) == 4); } write_out (c, &unenc_msg_header, 20); write_out (c, packet_buffer, len); flush_out (c); return 1; } int rpc_send_message (struct connection *c, void *data, int len) { assert (len > 0 && !(len & 0xfc000003)); int total_len = len >> 2; if (total_len < 0x7f) { assert (write_out (c, &total_len, 1) == 1); } else { total_len = (total_len << 8) | 0x7f; assert (write_out (c, &total_len, 4) == 4); } c->out_packet_num ++; write_out (c, data, len); flush_out (c); return 1; } int send_req_pq_packet (struct connection *c) { assert (c_state == st_init); assert (RAND_pseudo_bytes ((unsigned char *) nonce, 16) >= 0); unenc_msg_header.out_msg_id = 0; clear_packet (); out_int (CODE_req_pq); out_ints ((int *)nonce, 4); rpc_send_packet (c); c_state = st_reqpq_sent; return 1; } unsigned long long gcd (unsigned long long a, unsigned long long b) { return b ? gcd (b, a % b) : a; } //typedef unsigned int uint128_t __attribute__ ((mode(TI))); unsigned long long what; unsigned p1, p2; int process_respq_answer (struct connection *c, char *packet, int len) { int i; if (verbosity) { logprintf ( "process_respq_answer(), len=%d\n", len); } assert (len >= 76); assert (!*(long long *) packet); assert (*(int *) (packet + 16) == len - 20); assert (!(len & 3)); assert (*(int *) (packet + 20) == CODE_resPQ); assert (!memcmp (packet + 24, nonce, 16)); memcpy (server_nonce, packet + 40, 16); char *from = packet + 56; int clen = *from++; assert (clen <= 8); what = 0; for (i = 0; i < clen; i++) { what = (what << 8) + (unsigned char)*from++; } while (((unsigned long)from) & 3) ++from; p1 = 0, p2 = 0; if (verbosity >= 2) { logprintf ( "%lld received\n", what); } int it = 0; unsigned long long g = 0; for (i = 0; i < 3 || it < 1000; i++) { int q = ((lrand48() & 15) + 17) % what; unsigned long long x = (long long)lrand48 () % (what - 1) + 1, y = x; int lim = 1 << (i + 18); int j; for (j = 1; j < lim; j++) { ++it; unsigned long long a = x, b = x, c = q; while (b) { if (b & 1) { c += a; if (c >= what) { c -= what; } } a += a; if (a >= what) { a -= what; } b >>= 1; } x = c; unsigned long long z = x < y ? what + x - y : x - y; g = gcd (z, what); if (g != 1) { break; } if (!(j & (j - 1))) { y = x; } } if (g > 1 && g < what) break; } assert (g > 1 && g < what); p1 = g; p2 = what / g; if (p1 > p2) { unsigned t = p1; p1 = p2; p2 = t; } if (verbosity) { logprintf ( "p1 = %d, p2 = %d, %d iterations\n", p1, p2, it); } /// ++p1; /// assert (*(int *) (from) == CODE_vector); int fingerprints_num = *(int *)(from + 4); assert (fingerprints_num >= 1 && fingerprints_num <= 64 && len == fingerprints_num * 8 + 8 + (from - packet)); long long *fingerprints = (long long *) (from + 8); for (i = 0; i < fingerprints_num; i++) { if (fingerprints[i] == pk_fingerprint) { //logprintf ( "found our public key at position %d\n", i); break; } } if (i == fingerprints_num) { logprintf ( "fatal: don't have any matching keys (%016llx expected)\n", pk_fingerprint); exit (2); } // create inner part (P_Q_inner_data) clear_packet (); packet_ptr += 5; out_int (CODE_p_q_inner_data); out_cstring (packet + 57, clen); //out_int (0x0f01); // pq=15 if (p1 < 256) { clen = 1; } else if (p1 < 65536) { clen = 2; } else if (p1 < 16777216) { clen = 3; } else { clen = 4; } p1 = __builtin_bswap32 (p1); out_cstring ((char *)&p1 + 4 - clen, clen); p1 = __builtin_bswap32 (p1); if (p2 < 256) { clen = 1; } else if (p2 < 65536) { clen = 2; } else if (p2 < 16777216) { clen = 3; } else { clen = 4; } p2 = __builtin_bswap32 (p2); out_cstring ((char *)&p2 + 4 - clen, clen); p2 = __builtin_bswap32 (p2); //out_int (0x0301); // p=3 //out_int (0x0501); // q=5 out_ints ((int *) nonce, 4); out_ints ((int *) server_nonce, 4); assert (RAND_pseudo_bytes ((unsigned char *) new_nonce, 32) >= 0); out_ints ((int *) new_nonce, 8); sha1 ((unsigned char *) (packet_buffer + 5), (packet_ptr - packet_buffer - 5) * 4, (unsigned char *) packet_buffer); int l = encrypt_packet_buffer (); clear_packet (); out_int (CODE_req_DH_params); out_ints ((int *) nonce, 4); out_ints ((int *) server_nonce, 4); //out_int (0x0301); // p=3 //out_int (0x0501); // q=5 if (p1 < 256) { clen = 1; } else if (p1 < 65536) { clen = 2; } else if (p1 < 16777216) { clen = 3; } else { clen = 4; } p1 = __builtin_bswap32 (p1); out_cstring ((char *)&p1 + 4 - clen, clen); p1 = __builtin_bswap32 (p1); if (p2 < 256) { clen = 1; } else if (p2 < 65536) { clen = 2; } else if (p2 < 16777216) { clen = 3; } else { clen = 4; } p2 = __builtin_bswap32 (p2); out_cstring ((char *)&p2 + 4 - clen, clen); p2 = __builtin_bswap32 (p2); out_long (pk_fingerprint); out_cstring ((char *) encrypt_buffer, l); c_state = st_reqdh_sent; return rpc_send_packet (c); } int process_dh_answer (struct connection *c, char *packet, int len) { if (verbosity) { logprintf ( "process_dh_answer(), len=%d\n", len); } if (len < 116) { logprintf ( "%u * %u = %llu", p1, p2, what); } assert (len >= 116); assert (!*(long long *) packet); assert (*(int *) (packet + 16) == len - 20); assert (!(len & 3)); assert (*(int *) (packet + 20) == (int)CODE_server_DH_params_ok); assert (!memcmp (packet + 24, nonce, 16)); assert (!memcmp (packet + 40, server_nonce, 16)); init_aes_unauth (server_nonce, new_nonce, AES_DECRYPT); in_ptr = (int *)(packet + 56); in_end = (int *)(packet + len); int l = prefetch_strlen (); assert (l > 0); l = pad_aes_decrypt (fetch_str (l), l, (char *) decrypt_buffer, DECRYPT_BUFFER_INTS * 4 - 16); assert (in_ptr == in_end); assert (l >= 60); assert (decrypt_buffer[5] == (int)CODE_server_DH_inner_data); assert (!memcmp (decrypt_buffer + 6, nonce, 16)); assert (!memcmp (decrypt_buffer + 10, server_nonce, 16)); assert (decrypt_buffer[14] == 2); in_ptr = decrypt_buffer + 15; in_end = decrypt_buffer + (l >> 2); BN_init (&dh_prime); BN_init (&g_a); assert (fetch_bignum (&dh_prime) > 0); assert (fetch_bignum (&g_a) > 0); int server_time = *in_ptr++; assert (in_ptr <= in_end); static char sha1_buffer[20]; sha1 ((unsigned char *) decrypt_buffer + 20, (in_ptr - decrypt_buffer - 5) * 4, (unsigned char *) sha1_buffer); assert (!memcmp (decrypt_buffer, sha1_buffer, 20)); assert ((char *) in_end - (char *) in_ptr < 16); GET_DC(c)->server_time_delta = server_time - time (0); GET_DC(c)->server_time_udelta = server_time - get_utime (CLOCK_MONOTONIC); //logprintf ( "server time is %d, delta = %d\n", server_time, server_time_delta); // Build set_client_DH_params answer clear_packet (); packet_ptr += 5; out_int (CODE_client_DH_inner_data); out_ints ((int *) nonce, 4); out_ints ((int *) server_nonce, 4); out_long (0LL); BN_init (&dh_g); BN_set_word (&dh_g, 2); assert (RAND_pseudo_bytes ((unsigned char *)s_power, 256) >= 0); BIGNUM *dh_power = BN_new (); assert (BN_bin2bn ((unsigned char *)s_power, 256, dh_power) == dh_power); BIGNUM *y = BN_new (); assert (BN_mod_exp (y, &dh_g, dh_power, &dh_prime, BN_ctx) == 1); out_bignum (y); BN_free (y); BN_init (&auth_key_num); assert (BN_mod_exp (&auth_key_num, &g_a, dh_power, &dh_prime, BN_ctx) == 1); l = BN_num_bytes (&auth_key_num); assert (l >= 250 && l <= 256); assert (BN_bn2bin (&auth_key_num, (unsigned char *)GET_DC(c)->auth_key)); memset (GET_DC(c)->auth_key + l, 0, 256 - l); BN_free (dh_power); BN_free (&auth_key_num); BN_free (&dh_g); BN_free (&g_a); BN_free (&dh_prime); //hexdump (auth_key, auth_key + 256); sha1 ((unsigned char *) (packet_buffer + 5), (packet_ptr - packet_buffer - 5) * 4, (unsigned char *) packet_buffer); //hexdump ((char *)packet_buffer, (char *)packet_ptr); l = encrypt_packet_buffer_aes_unauth (server_nonce, new_nonce); clear_packet (); out_int (CODE_set_client_DH_params); out_ints ((int *) nonce, 4); out_ints ((int *) server_nonce, 4); out_cstring ((char *) encrypt_buffer, l); c_state = st_client_dh_sent; return rpc_send_packet (c); } int process_auth_complete (struct connection *c UU, char *packet, int len) { if (verbosity) { logprintf ( "process_dh_answer(), len=%d\n", len); } assert (len == 72); assert (!*(long long *) packet); assert (*(int *) (packet + 16) == len - 20); assert (!(len & 3)); assert (*(int *) (packet + 20) == CODE_dh_gen_ok); assert (!memcmp (packet + 24, nonce, 16)); assert (!memcmp (packet + 40, server_nonce, 16)); static unsigned char tmp[44], sha1_buffer[20]; memcpy (tmp, new_nonce, 32); tmp[32] = 1; sha1 ((unsigned char *)GET_DC(c)->auth_key, 256, sha1_buffer); GET_DC(c)->auth_key_id = *(long long *)(sha1_buffer + 12); memcpy (tmp + 33, sha1_buffer, 8); sha1 (tmp, 41, sha1_buffer); assert (!memcmp (packet + 56, sha1_buffer + 4, 16)); GET_DC(c)->server_salt = *(long long *)server_nonce ^ *(long long *)new_nonce; if (verbosity >= 3) { logprintf ( "auth_key_id=%016llx\n", GET_DC(c)->auth_key_id); } //kprintf ("OK\n"); //c->status = conn_error; //sleep (1); c_state = st_authorized; //return 1; if (verbosity) { logprintf ( "Auth success\n"); } auth_success ++; GET_DC(c)->flags |= 1; write_auth_file (); return 1; } /* * * AUTHORIZED (MAIN) PROTOCOL PART * */ struct encrypted_message enc_msg; long long client_last_msg_id, server_last_msg_id; double get_server_time (struct dc *DC) { if (!DC->server_time_udelta) { DC->server_time_udelta = get_utime (CLOCK_REALTIME) - get_utime (CLOCK_MONOTONIC); } return get_utime (CLOCK_MONOTONIC) + DC->server_time_udelta; } long long generate_next_msg_id (struct dc *DC) { long long next_id = (long long) (get_server_time (DC) * (1LL << 32)) & -4; if (next_id <= client_last_msg_id) { next_id = client_last_msg_id += 4; } else { client_last_msg_id = next_id; } return next_id; } void init_enc_msg (struct session *S, int useful) { struct dc *DC = S->dc; assert (DC->auth_key_id); enc_msg.auth_key_id = DC->auth_key_id; assert (DC->server_salt); enc_msg.server_salt = DC->server_salt; if (!S->session_id) { assert (RAND_pseudo_bytes ((unsigned char *) &S->session_id, 8) >= 0); } enc_msg.session_id = S->session_id; //enc_msg.auth_key_id2 = auth_key_id; enc_msg.msg_id = generate_next_msg_id (DC); //enc_msg.msg_id -= 0x10000000LL * (lrand48 () & 15); //kprintf ("message id %016llx\n", enc_msg.msg_id); enc_msg.seq_no = S->seq_no; if (useful) { enc_msg.seq_no |= 1; } S->seq_no += 2; }; int aes_encrypt_message (struct dc *DC, struct encrypted_message *enc) { unsigned char sha1_buffer[20]; const int MINSZ = offsetof (struct encrypted_message, message); const int UNENCSZ = offsetof (struct encrypted_message, server_salt); int enc_len = (MINSZ - UNENCSZ) + enc->msg_len; assert (enc->msg_len >= 0 && enc->msg_len <= MAX_MESSAGE_INTS * 4 - 16 && !(enc->msg_len & 3)); sha1 ((unsigned char *) &enc->server_salt, enc_len, sha1_buffer); //printf ("enc_len is %d\n", enc_len); if (verbosity >= 2) { logprintf ( "sending message with sha1 %08x\n", *(int *)sha1_buffer); } memcpy (enc->msg_key, sha1_buffer + 4, 16); init_aes_auth (DC->auth_key, enc->msg_key, AES_ENCRYPT); //hexdump ((char *)enc, (char *)enc + enc_len + 24); return pad_aes_encrypt ((char *) &enc->server_salt, enc_len, (char *) &enc->server_salt, MAX_MESSAGE_INTS * 4 + (MINSZ - UNENCSZ)); } long long encrypt_send_message (struct connection *c, int *msg, int msg_ints, int useful) { struct dc *DC = GET_DC(c); struct session *S = c->session; assert (S); const int UNENCSZ = offsetof (struct encrypted_message, server_salt); if (msg_ints <= 0 || msg_ints > MAX_MESSAGE_INTS - 4) { return -1; } if (msg) { memcpy (enc_msg.message, msg, msg_ints * 4); enc_msg.msg_len = msg_ints * 4; } else { if ((enc_msg.msg_len & 0x80000003) || enc_msg.msg_len > MAX_MESSAGE_INTS * 4 - 16) { return -1; } } init_enc_msg (S, useful); //hexdump ((char *)msg, (char *)msg + (msg_ints * 4)); int l = aes_encrypt_message (DC, &enc_msg); //hexdump ((char *)&enc_msg, (char *)&enc_msg + l + 24); assert (l > 0); rpc_send_message (c, &enc_msg, l + UNENCSZ); return client_last_msg_id; } int longpoll_count, good_messages; int auth_work_start (struct connection *c UU) { return 1; } void rpc_execute_answer (struct connection *c, long long msg_id UU); int unread_messages; int our_id; void work_update (struct connection *c UU, long long msg_id UU) { unsigned op = fetch_int (); switch (op) { case CODE_update_new_message: { struct message *M = fetch_alloc_message (); fetch_int (); //pts unread_messages ++; print_message (M); break; }; case CODE_update_message_i_d: { int id = fetch_int (); // id int new = fetch_long (); // random_id struct message *M = message_get (new); update_message_id (M, id); } break; case CODE_update_read_messages: { assert (fetch_int () == (int)CODE_vector); int n = fetch_int (); int i; for (i = 0; i < n; i++) { int id = fetch_int (); struct message *M = message_get (id); if (M) { M->unread = 0; } } fetch_int (); //pts print_start (); push_color (COLOR_YELLOW); printf ("%d messages marked as read\n", n); pop_color (); print_end (); } break; case CODE_update_user_typing: { int id = fetch_int (); union user_chat *U = user_chat_get (id); print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (id, U); printf (" is typing....\n"); pop_color (); print_end (); } break; case CODE_update_chat_user_typing: { int chat_id = fetch_int (); int id = fetch_int (); union user_chat *C = user_chat_get (-chat_id); union user_chat *U = user_chat_get (id); print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (id, U); printf (" is typing in chat "); print_chat_name (-chat_id, C); printf ("....\n"); pop_color (); print_end (); } break; case CODE_update_user_status: { int user_id = fetch_int (); union user_chat *U = user_chat_get (user_id); if (U) { fetch_user_status (&U->user.status); print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (user_id, U); printf (" is now "); printf ("%s\n", (U->user.status.online > 0) ? "online" : "offline"); pop_color (); print_end (); } else { struct user_status t; fetch_user_status (&t); } } break; case CODE_update_user_name: { int user_id = fetch_int (); union user_chat *UC = user_chat_get (user_id); if (UC) { struct user *U = &UC->user; print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (user_id, UC); if (U->first_name) { free (U->first_name); } if (U->last_name) { free (U->last_name); } if (U->print_name) { free (U->print_name); } U->first_name = fetch_str_dup (); U->last_name = fetch_str_dup (); printf (" changed name to "); print_user_name (user_id, UC); printf ("\n"); pop_color (); print_end (); if (!strlen (U->first_name)) { if (!strlen (U->last_name)) { U->print_name = strdup ("none"); } else { U->print_name = strdup (U->last_name); } } else { if (!strlen (U->last_name)) { U->print_name = strdup (U->first_name); } else { U->print_name = malloc (strlen (U->first_name) + strlen (U->last_name) + 2); sprintf (U->print_name, "%s_%s", U->first_name, U->last_name); } } } else { int l; l = prefetch_strlen (); fetch_str (l); l = prefetch_strlen (); fetch_str (l); l = prefetch_strlen (); fetch_str (l); } } break; case CODE_update_user_photo: { int user_id = fetch_int (); union user_chat *UC = user_chat_get (user_id); if (UC) { struct user *U = &UC->user; print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (user_id, UC); printf (" updated profile photo\n"); pop_color (); print_end (); unsigned y = fetch_int (); if (y == CODE_user_profile_photo_empty) { U->photo_big.dc = -2; U->photo_small.dc = -2; } else { assert (y == CODE_user_profile_photo); fetch_file_location (&U->photo_small); fetch_file_location (&U->photo_big); } } else { struct file_location t; unsigned y = fetch_int (); if (y == CODE_user_profile_photo_empty) { } else { assert (y == CODE_user_profile_photo); fetch_file_location (&t); fetch_file_location (&t); } } } break; case CODE_update_restore_messages: { assert (fetch_int () == CODE_vector); int n = fetch_int (); print_start (); push_color (COLOR_YELLOW); printf ("Restored %d messages\n", n); pop_color (); print_end (); fetch_skip (n); fetch_int (); // pts } break; case CODE_update_chat_participants: { assert (fetch_int () == CODE_chat_participants); int chat_id = fetch_int (); fetch_int (); // admin_id assert (fetch_int () == CODE_vector); int n = fetch_int (); fetch_skip (n * 4); fetch_int (); // version union user_chat *C = user_chat_get (-chat_id); print_start (); push_color (COLOR_YELLOW); printf ("Chat "); print_chat_name (-chat_id, C); printf (" changed list: now %d members\n", n); pop_color (); print_end (); } break; case CODE_update_contact_registered: { int user_id = fetch_int (); union user_chat *U = user_chat_get (user_id); fetch_int (); // date print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (user_id, U); printf (" registered\n"); pop_color (); print_end (); } break; case CODE_update_contact_link: { int user_id = fetch_int (); union user_chat *U = user_chat_get (user_id); print_start (); push_color (COLOR_YELLOW); printf ("Updated link with user "); print_user_name (user_id, U); printf ("\n"); pop_color (); print_end (); unsigned t = fetch_int (); assert (t == CODE_contacts_my_link_empty || t == CODE_contacts_my_link_requested || t == CODE_contacts_my_link_contact); if (t == CODE_contacts_my_link_requested) { fetch_bool (); // has_phone } t = fetch_int (); assert (t == CODE_contacts_foreign_link_unknown || t == CODE_contacts_foreign_link_requested || t == CODE_contacts_foreign_link_mutual); if (t == CODE_contacts_foreign_link_requested) { fetch_bool (); // has_phone } } break; case CODE_update_activation: { int user_id = fetch_int (); union user_chat *U = user_chat_get (user_id); print_start (); push_color (COLOR_YELLOW); printf ("User "); print_user_name (user_id, U); printf (" activated\n"); pop_color (); print_end (); } break; case CODE_update_new_authorization: { fetch_long (); // auth_key_id fetch_int (); // date char *s = fetch_str_dup (); char *location = fetch_str_dup (); print_start (); push_color (COLOR_YELLOW); printf ("New autorization: device='%s' location='%s'\n", s, location); pop_color (); print_end (); free (s); free (location); } break; default: logprintf ("Unknown update type %08x\n", op); } } void work_update_short (struct connection *c, long long msg_id) { assert (fetch_int () == CODE_update_short); work_update (c, msg_id); fetch_int (); // date } void work_updates (struct connection *c, long long msg_id) { assert (fetch_int () == CODE_updates); assert (fetch_int () == CODE_vector); int n = fetch_int (); int i; for (i = 0; i < n; i++) { work_update (c, msg_id); } assert (fetch_int () == CODE_vector); n = fetch_int (); for (i = 0; i < n; i++) { fetch_alloc_user (); } assert (fetch_int () == CODE_vector); n = fetch_int (); for (i = 0; i < n; i++) { fetch_alloc_chat (); } fetch_int (); // date fetch_int (); // seq } void work_update_short_message (struct connection *c UU, long long msg_id UU) { assert (fetch_int () == (int)CODE_update_short_message); struct message *M = fetch_alloc_message_short (); unread_messages ++; print_message (M); } void work_update_short_chat_message (struct connection *c UU, long long msg_id UU) { assert (fetch_int () == CODE_update_short_chat_message); struct message *M = fetch_alloc_message_short_chat (); unread_messages ++; print_message (M); } void work_container (struct connection *c, long long msg_id UU) { if (verbosity) { logprintf ( "work_container: msg_id = %lld\n", msg_id); } assert (fetch_int () == CODE_msg_container); int n = fetch_int (); int i; for (i = 0; i < n; i++) { long long id = fetch_long (); int seqno = fetch_int (); if (seqno & 1) { insert_seqno (c->session, seqno); } int bytes = fetch_int (); int *t = in_ptr; rpc_execute_answer (c, id); assert (in_ptr == t + (bytes / 4)); } } void work_new_session_created (struct connection *c, long long msg_id UU) { if (verbosity) { logprintf ( "work_new_session_created: msg_id = %lld\n", msg_id); } assert (fetch_int () == (int)CODE_new_session_created); fetch_long (); // first message id //DC->session_id = fetch_long (); fetch_long (); // unique_id GET_DC(c)->server_salt = fetch_long (); } void work_msgs_ack (struct connection *c UU, long long msg_id UU) { if (verbosity) { logprintf ( "work_msgs_ack: msg_id = %lld\n", msg_id); } assert (fetch_int () == CODE_msgs_ack); assert (fetch_int () == CODE_vector); int n = fetch_int (); int i; for (i = 0; i < n; i++) { long long id = fetch_long (); query_ack (id); } } void work_rpc_result (struct connection *c UU, long long msg_id UU) { if (verbosity) { logprintf ( "work_rpc_result: msg_id = %lld\n", msg_id); } assert (fetch_int () == (int)CODE_rpc_result); long long id = fetch_long (); int op = prefetch_int (); if (op == CODE_rpc_error) { query_error (id); } else { query_result (id); } } #define MAX_PACKED_SIZE (1 << 20) void work_packed (struct connection *c, long long msg_id) { assert (fetch_int () == CODE_gzip_packed); static int in_gzip; static int buf[MAX_PACKED_SIZE >> 2]; assert (!in_gzip); in_gzip = 1; int l = prefetch_strlen (); char *s = fetch_str (l); size_t dl = MAX_PACKED_SIZE; z_stream strm; memset (&strm, 0, sizeof (strm)); assert (inflateInit2 (&strm, 16 + MAX_WBITS) == Z_OK); strm.avail_in = l; strm.next_in = (void *)s; strm.avail_out = MAX_PACKED_SIZE; strm.next_out = (void *)buf; int err = inflate (&strm, Z_FINISH); if (verbosity) { logprintf ( "inflate error = %d\n", err); logprintf ( "inflated %d bytes\n", (int)strm.total_out); } int *end = in_ptr; int *eend = in_end; assert (dl % 4 == 0); in_ptr = buf; in_end = in_ptr + strm.total_out / 4; if (verbosity >= 4) { logprintf ( "Unzipped data: "); hexdump_in (); } rpc_execute_answer (c, msg_id); in_ptr = end; in_end = eend; in_gzip = 0; } void rpc_execute_answer (struct connection *c, long long msg_id UU) { if (verbosity >= 5) { hexdump_in (); } int op = prefetch_int (); switch (op) { case CODE_msg_container: work_container (c, msg_id); return; case CODE_new_session_created: work_new_session_created (c, msg_id); return; case CODE_msgs_ack: work_msgs_ack (c, msg_id); return; case CODE_rpc_result: work_rpc_result (c, msg_id); return; case CODE_update_short: work_update_short (c, msg_id); return; case CODE_updates: work_updates (c, msg_id); return; case CODE_update_short_message: work_update_short_message (c, msg_id); return; case CODE_update_short_chat_message: work_update_short_chat_message (c, msg_id); return; case CODE_gzip_packed: work_packed (c, msg_id); return; } logprintf ( "Unknown message: \n"); hexdump_in (); } int process_rpc_message (struct connection *c UU, struct encrypted_message *enc, int len) { const int MINSZ = offsetof (struct encrypted_message, message); const int UNENCSZ = offsetof (struct encrypted_message, server_salt); if (verbosity) { logprintf ( "process_rpc_message(), len=%d\n", len); } assert (len >= MINSZ && (len & 15) == (UNENCSZ & 15)); struct dc *DC = GET_DC(c); assert (enc->auth_key_id == DC->auth_key_id); assert (DC->auth_key_id); init_aes_auth (DC->auth_key + 8, enc->msg_key, AES_DECRYPT); int l = pad_aes_decrypt ((char *)&enc->server_salt, len - UNENCSZ, (char *)&enc->server_salt, len - UNENCSZ); assert (l == len - UNENCSZ); //assert (enc->auth_key_id2 == enc->auth_key_id); assert (!(enc->msg_len & 3) && enc->msg_len > 0 && enc->msg_len <= len - MINSZ && len - MINSZ - enc->msg_len <= 12); static unsigned char sha1_buffer[20]; sha1 ((void *)&enc->server_salt, enc->msg_len + (MINSZ - UNENCSZ), sha1_buffer); assert (!memcmp (&enc->msg_key, sha1_buffer + 4, 16)); //assert (enc->server_salt == server_salt); //in fact server salt can change if (DC->server_salt != enc->server_salt) { DC->server_salt = enc->server_salt; write_auth_file (); } int this_server_time = enc->msg_id >> 32LL; if (!DC->server_time_delta) { DC->server_time_delta = this_server_time - time (0); DC->server_time_udelta = this_server_time - get_utime (CLOCK_MONOTONIC); } double st = get_server_time (DC); assert (this_server_time >= st - 300 && this_server_time <= st + 30); //assert (enc->msg_id > server_last_msg_id && (enc->msg_id & 3) == 1); if (verbosity >= 2) { logprintf ( "received mesage id %016llx\n", enc->msg_id); } server_last_msg_id = enc->msg_id; //*(long long *)(longpoll_query + 3) = *(long long *)((char *)(&enc->msg_id) + 0x3c); //*(long long *)(longpoll_query + 5) = *(long long *)((char *)(&enc->msg_id) + 0x3c); assert (l >= (MINSZ - UNENCSZ) + 8); //assert (enc->message[0] == CODE_rpc_result && *(long long *)(enc->message + 1) == client_last_msg_id); if (verbosity >= 2) { logprintf ( "OK, message is good!\n"); } ++good_messages; in_ptr = enc->message; in_end = in_ptr + (enc->msg_len / 4); if (enc->seq_no & 1) { insert_seqno (c->session, enc->seq_no); } assert (c->session->session_id == enc->session_id); rpc_execute_answer (c, enc->msg_id); return 0; } int rpc_execute (struct connection *c, int op, int len) { if (verbosity) { logprintf ( "outbound rpc connection #%d : received rpc answer %d with %d content bytes\n", c->fd, op, len); } if (len >= MAX_RESPONSE_SIZE/* - 12*/ || len < 0/*12*/) { logprintf ( "answer too long (%d bytes), skipping\n", len); return 0; } int Response_len = len; if (verbosity >= 2) { logprintf ("Response_len = %d\n", Response_len); } assert (read_in (c, Response, Response_len) == Response_len); Response[Response_len] = 0; if (verbosity >= 2) { logprintf ( "have %d Response bytes\n", Response_len); } setsockopt (c->fd, IPPROTO_TCP, TCP_QUICKACK, (int[]){0}, 4); int o = c_state; if (GET_DC(c)->flags & 1) { o = st_authorized;} switch (o) { case st_reqpq_sent: process_respq_answer (c, Response/* + 8*/, Response_len/* - 12*/); setsockopt (c->fd, IPPROTO_TCP, TCP_QUICKACK, (int[]){0}, 4); return 0; case st_reqdh_sent: process_dh_answer (c, Response/* + 8*/, Response_len/* - 12*/); setsockopt (c->fd, IPPROTO_TCP, TCP_QUICKACK, (int[]){0}, 4); return 0; case st_client_dh_sent: process_auth_complete (c, Response/* + 8*/, Response_len/* - 12*/); setsockopt (c->fd, IPPROTO_TCP, TCP_QUICKACK, (int[]){0}, 4); return 0; case st_authorized: process_rpc_message (c, (void *)(Response/* + 8*/), Response_len/* - 12*/); setsockopt (c->fd, IPPROTO_TCP, TCP_QUICKACK, (int[]){0}, 4); return 0; default: logprintf ( "fatal: cannot receive answer in state %d\n", c_state); exit (2); } return 0; } int tc_close (struct connection *c, int who) { if (verbosity) { logprintf ( "outbound http connection #%d : closing by %d\n", c->fd, who); } return 0; } int tc_becomes_ready (struct connection *c) { if (verbosity) { logprintf ( "outbound connection #%d becomes ready\n", c->fd); } char byte = 0xef; assert (write_out (c, &byte, 1) == 1); flush_out (c); setsockopt (c->fd, IPPROTO_TCP, TCP_QUICKACK, (int[]){0}, 4); int o = c_state; if (GET_DC(c)->flags & 1) { o = st_authorized; } switch (o) { case st_init: send_req_pq_packet (c); break; case st_authorized: auth_work_start (c); break; default: logprintf ( "c_state = %d\n", c_state); assert (0); } return 0; } int rpc_becomes_ready (struct connection *c) { return tc_becomes_ready (c); } int rpc_close (struct connection *c) { return tc_close (c, 0); } int auth_is_success (void) { return auth_success; } void on_start (void) { prng_seed (0, 0); if (rsa_load_public_key (rsa_public_key_name) < 0) { perror ("rsa_load_public_key"); exit (1); } if (verbosity) { logprintf ( "public key '%s' loaded successfully\n", rsa_public_key_name); } pk_fingerprint = compute_rsa_key_fingerprint (pubKey); } int auth_ok (void) { return auth_success; } void dc_authorize (struct dc *DC) { c_state = 0; auth_success = 0; if (!DC->sessions[0]) { dc_create_session (DC); } if (verbosity) { logprintf ( "Starting authorization for DC #%d: %s:%d\n", DC->id, DC->ip, DC->port); } net_loop (0, auth_ok); }