/* This file is part of Telegram Desktop, the official desktop application for the Telegram messaging service. For license and copyright information please follow this link: https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL */ #include "mtproto/mtproto_auth_key.h" #include "base/openssl_help.h" #include namespace MTP { AuthKey::AuthKey(Type type, DcId dcId, const Data &data) : _type(type) , _dcId(dcId) , _key(data) { countKeyId(); if (type == Type::Generated || type == Type::Temporary) { _creationTime = crl::now(); } } AuthKey::AuthKey(const Data &data) : _type(Type::Local), _key(data) { countKeyId(); } AuthKey::Type AuthKey::type() const { return _type; } int AuthKey::dcId() const { return _dcId; } AuthKey::KeyId AuthKey::keyId() const { return _keyId; } void AuthKey::prepareAES_oldmtp(const MTPint128 &msgKey, MTPint256 &aesKey, MTPint256 &aesIV, bool send) const { uint32 x = send ? 0 : 8; bytes::array<20> sha1_a, sha1_b, sha1_c, sha1_d; bytes::array<16 + 32> data_a; memcpy(data_a.data(), &msgKey, 16); memcpy(data_a.data() + 16, _key.data() + x, 32); openssl::Sha1To(sha1_a, data_a); bytes::array<16 + 16 + 16> data_b; memcpy(data_b.data(), _key.data() + 32 + x, 16); memcpy(data_b.data() + 16, &msgKey, 16); memcpy(data_b.data() + 32, _key.data() + 48 + x, 16); openssl::Sha1To(sha1_b, data_b); bytes::array<32 + 16> data_c; memcpy(data_c.data(), _key.data() + 64 + x, 32); memcpy(data_c.data() + 32, &msgKey, 16); openssl::Sha1To(sha1_c, data_c); bytes::array<16 + 32> data_d; memcpy(data_d.data(), &msgKey, 16); memcpy(data_d.data() + 16, _key.data() + 96 + x, 32); openssl::Sha1To(sha1_d, data_d); auto key = reinterpret_cast(&aesKey); auto iv = reinterpret_cast(&aesIV); memcpy(key, sha1_a.data(), 8); memcpy(key + 8, sha1_b.data() + 8, 12); memcpy(key + 8 + 12, sha1_c.data() + 4, 12); memcpy(iv, sha1_a.data() + 8, 12); memcpy(iv + 12, sha1_b.data(), 8); memcpy(iv + 12 + 8, sha1_c.data() + 16, 4); memcpy(iv + 12 + 8 + 4, sha1_d.data(), 8); } void AuthKey::prepareAES(const MTPint128 &msgKey, MTPint256 &aesKey, MTPint256 &aesIV, bool send) const { uint32 x = send ? 0 : 8; bytes::array<32> sha256_a, sha256_b; bytes::array<16 + 36> data_a; memcpy(data_a.data(), &msgKey, 16); memcpy(data_a.data() + 16, _key.data() + x, 36); openssl::Sha256To(sha256_a, data_a); bytes::array<36 + 16> data_b; memcpy(data_b.data(), _key.data() + 40 + x, 36); memcpy(data_b.data() + 36, &msgKey, 16); openssl::Sha256To(sha256_b, data_b); auto key = reinterpret_cast(&aesKey); auto iv = reinterpret_cast(&aesIV); memcpy(key, sha256_a.data(), 8); memcpy(key + 8, sha256_b.data() + 8, 16); memcpy(key + 8 + 16, sha256_a.data() + 24, 8); memcpy(iv, sha256_b.data(), 8); memcpy(iv + 8, sha256_a.data() + 8, 16); memcpy(iv + 8 + 16, sha256_b.data() + 24, 8); } const void *AuthKey::partForMsgKey(bool send) const { return _key.data() + 88 + (send ? 0 : 8); } void AuthKey::write(QDataStream &to) const { to.writeRawData(reinterpret_cast(_key.data()), _key.size()); } bytes::const_span AuthKey::data() const { return _key; } bool AuthKey::equals(const std::shared_ptr &other) const { return other ? (_key == other->_key) : false; } crl::time AuthKey::creationTime() const { return _creationTime; } TimeId AuthKey::expiresAt() const { return _expiresAt; } void AuthKey::setExpiresAt(TimeId expiresAt) { Expects(_type == Type::Temporary); _expiresAt = expiresAt; } void AuthKey::FillData(Data &authKey, bytes::const_span computedAuthKey) { auto computedAuthKeySize = computedAuthKey.size(); Assert(computedAuthKeySize <= kSize); auto authKeyBytes = gsl::make_span(authKey); if (computedAuthKeySize < kSize) { bytes::set_with_const(authKeyBytes.subspan(0, kSize - computedAuthKeySize), gsl::byte()); bytes::copy(authKeyBytes.subspan(kSize - computedAuthKeySize), computedAuthKey); } else { bytes::copy(authKeyBytes, computedAuthKey); } } void AuthKey::countKeyId() { const auto hash = openssl::Sha1(_key); // Lower 64 bits = 8 bytes of 20 byte SHA1 hash. _keyId = *reinterpret_cast(hash.data() + 12); } void aesIgeEncryptRaw(const void *src, void *dst, uint32 len, const void *key, const void *iv) { uchar aes_key[32], aes_iv[32]; memcpy(aes_key, key, 32); memcpy(aes_iv, iv, 32); AES_KEY aes; AES_set_encrypt_key(aes_key, 256, &aes); AES_ige_encrypt(static_cast(src), static_cast(dst), len, &aes, aes_iv, AES_ENCRYPT); } void aesIgeDecryptRaw(const void *src, void *dst, uint32 len, const void *key, const void *iv) { uchar aes_key[32], aes_iv[32]; memcpy(aes_key, key, 32); memcpy(aes_iv, iv, 32); AES_KEY aes; AES_set_decrypt_key(aes_key, 256, &aes); AES_ige_encrypt(static_cast(src), static_cast(dst), len, &aes, aes_iv, AES_DECRYPT); } void aesCtrEncrypt(bytes::span data, const void *key, CTRState *state) { AES_KEY aes; AES_set_encrypt_key(static_cast(key), 256, &aes); static_assert(CTRState::IvecSize == AES_BLOCK_SIZE, "Wrong size of ctr ivec!"); static_assert(CTRState::EcountSize == AES_BLOCK_SIZE, "Wrong size of ctr ecount!"); CRYPTO_ctr128_encrypt( reinterpret_cast(data.data()), reinterpret_cast(data.data()), data.size(), &aes, state->ivec, state->ecount, &state->num, (block128_f)AES_encrypt); } } // namespace MTP