Nagram/TMessagesProj/jni/tgnet/Datacenter.cpp
2021-07-15 17:24:57 +03:00

1562 lines
56 KiB
C++

/*
* This is the source code of tgnet library v. 1.1
* It is licensed under GNU GPL v. 2 or later.
* You should have received a copy of the license in this archive (see LICENSE).
*
* Copyright Nikolai Kudashov, 2015-2018.
*/
#include <stdlib.h>
#include <algorithm>
#include <openssl/rand.h>
#include <openssl/sha.h>
#include <openssl/bn.h>
#include <openssl/pem.h>
#include <openssl/aes.h>
#include <memory.h>
#include <inttypes.h>
#include "Datacenter.h"
#include "Connection.h"
#include "MTProtoScheme.h"
#include "ApiScheme.h"
#include "FileLog.h"
#include "NativeByteBuffer.h"
#include "ByteArray.h"
#include "BuffersStorage.h"
#include "ConnectionsManager.h"
#include "Config.h"
#include "Handshake.h"
thread_local static SHA256_CTX sha256Ctx;
Datacenter::Datacenter(int32_t instance, uint32_t id) {
instanceNum = instance;
datacenterId = id;
for (auto & a : uploadConnection) {
a = nullptr;
}
for (auto & a : downloadConnection) {
a = nullptr;
}
for (auto & a : proxyConnection) {
a = nullptr;
}
}
Datacenter::Datacenter(int32_t instance, NativeByteBuffer *data) {
instanceNum = instance;
for (auto & a : uploadConnection) {
a = nullptr;
}
for (auto & a : downloadConnection) {
a = nullptr;
}
for (auto & a : proxyConnection) {
a = nullptr;
}
uint32_t currentVersion = data->readUint32(nullptr);
if (currentVersion >= 2 && currentVersion <= configVersion) {
datacenterId = data->readUint32(nullptr);
if (currentVersion >= 3) {
lastInitVersion = data->readUint32(nullptr);
}
if (currentVersion >= 10) {
lastInitMediaVersion = data->readUint32(nullptr);
}
int count = currentVersion >= 5 ? 4 : 1;
for (int b = 0; b < count; b++) {
std::vector<TcpAddress> *array;
switch (b) {
case 0:
array = &addressesIpv4;
break;
case 1:
array = &addressesIpv6;
break;
case 2:
array = &addressesIpv4Download;
break;
case 3:
array = &addressesIpv6Download;
break;
default:
array = nullptr;
break;
}
if (array == nullptr) {
continue;
}
uint32_t len = data->readUint32(nullptr);
for (uint32_t a = 0; a < len; a++) {
std::string address = data->readString(nullptr);
uint32_t port = data->readUint32(nullptr);
int32_t flags;
std::string secret;
if (currentVersion >= 7) {
flags = data->readInt32(nullptr);
} else {
flags = 0;
}
if (currentVersion >= 11) {
secret = data->readString(nullptr);
} else if (currentVersion >= 9) {
secret = data->readString(nullptr);
if (!secret.empty()) {
size_t size = secret.size() / 2;
char *result = new char[size];
for (int32_t i = 0; i < size; i++) {
result[i] = (char) (char2int(secret[i * 2]) * 16 + char2int(secret[i * 2 + 1]));
}
secret = std::string(result, size);
delete[] result;
}
}
(*array).push_back(TcpAddress(address, port, flags, secret));
}
}
if (currentVersion >= 6) {
isCdnDatacenter = data->readBool(nullptr);
}
uint32_t len = data->readUint32(nullptr);
if (len != 0) {
authKeyPerm = data->readBytes(len, nullptr);
}
if (currentVersion >= 4) {
authKeyPermId = data->readInt64(nullptr);
} else {
len = data->readUint32(nullptr);
if (len != 0) {
authKeyPermId = data->readInt64(nullptr);
}
}
if (currentVersion >= 8) {
len = data->readUint32(nullptr);
if (len != 0) {
authKeyTemp = data->readBytes(len, nullptr);
}
authKeyTempId = data->readInt64(nullptr);
}
if (currentVersion >= 12) {
len = data->readUint32(nullptr);
if (len != 0) {
authKeyMediaTemp = data->readBytes(len, nullptr);
}
authKeyMediaTempId = data->readInt64(nullptr);
}
authorized = data->readInt32(nullptr) != 0;
len = data->readUint32(nullptr);
for (uint32_t a = 0; a < len; a++) {
auto salt = new TL_future_salt();
salt->valid_since = data->readInt32(nullptr);
salt->valid_until = data->readInt32(nullptr);
salt->salt = data->readInt64(nullptr);
serverSalts.push_back(std::unique_ptr<TL_future_salt>(salt));
}
if (currentVersion >= 13) {
len = data->readUint32(nullptr);
for (uint32_t a = 0; a < len; a++) {
auto salt = new TL_future_salt();
salt->valid_since = data->readInt32(nullptr);
salt->valid_until = data->readInt32(nullptr);
salt->salt = data->readInt64(nullptr);
mediaServerSalts.push_back(std::unique_ptr<TL_future_salt>(salt));
}
}
}
if (config == nullptr) {
config = new Config(instanceNum, "dc" + to_string_int32(datacenterId) + "conf.dat");
}
NativeByteBuffer *buffer = config->readConfig();
if (buffer != nullptr) {
uint32_t version = buffer->readUint32(nullptr);
if (version >= 1) {
currentPortNumIpv4 = buffer->readUint32(nullptr);
currentAddressNumIpv4 = buffer->readUint32(nullptr);
currentPortNumIpv6 = buffer->readUint32(nullptr);
currentAddressNumIpv6 = buffer->readUint32(nullptr);
currentPortNumIpv4Download = buffer->readUint32(nullptr);
currentAddressNumIpv4Download = buffer->readUint32(nullptr);
currentPortNumIpv6Download = buffer->readUint32(nullptr);
currentAddressNumIpv6Download = buffer->readUint32(nullptr);
}
buffer->reuse();
} else {
currentPortNumIpv4 = 0;
currentAddressNumIpv4 = 0;
currentPortNumIpv6 = 0;
currentAddressNumIpv6 = 0;
currentPortNumIpv4Download = 0;
currentAddressNumIpv4Download = 0;
currentPortNumIpv6Download = 0;
currentAddressNumIpv6Download = 0;
}
}
TcpAddress *Datacenter::getCurrentAddress(uint32_t flags) {
uint32_t currentAddressNum;
std::vector<TcpAddress> *addresses;
if (flags == 0 && (authKeyPerm == nullptr || PFS_ENABLED && authKeyTemp == nullptr) && !addressesIpv4Temp.empty()) {
flags = TcpAddressFlagTemp;
}
if ((flags & TcpAddressFlagTemp) != 0) {
currentAddressNum = currentAddressNumIpv4Temp;
addresses = &addressesIpv4Temp;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNum = currentAddressNumIpv6Download;
addresses = &addressesIpv6Download;
} else {
currentAddressNum = currentAddressNumIpv4Download;
addresses = &addressesIpv4Download;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNum = currentAddressNumIpv6;
addresses = &addressesIpv6;
} else {
currentAddressNum = currentAddressNumIpv4;
addresses = &addressesIpv4;
}
}
if (addresses->empty()) {
return nullptr;
}
if ((flags & TcpAddressFlagStatic) != 0) {
for (auto & addresse : *addresses) {
if ((addresse.flags & TcpAddressFlagStatic) != 0) {
return &addresse;
}
}
}
if (currentAddressNum >= addresses->size()) {
currentAddressNum = 0;
if ((flags & TcpAddressFlagTemp) != 0) {
currentAddressNumIpv4Temp = currentAddressNum;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNumIpv6Download = currentAddressNum;
} else {
currentAddressNumIpv4Download = currentAddressNum;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNumIpv6 = currentAddressNum;
} else {
currentAddressNumIpv4 = currentAddressNum;
}
}
}
return &(*addresses)[currentAddressNum];
}
int32_t Datacenter::getCurrentPort(uint32_t flags) {
uint32_t currentAddressNum;
uint32_t currentPortNum;
std::vector<TcpAddress> *addresses;
if (flags == 0 && (authKeyPerm == nullptr || PFS_ENABLED && authKeyTemp == nullptr) && !addressesIpv4Temp.empty()) {
flags = TcpAddressFlagTemp;
}
if ((flags & TcpAddressFlagTemp) != 0) {
currentAddressNum = currentAddressNumIpv4Temp;
currentPortNum = currentPortNumIpv4Temp;
addresses = &addressesIpv4Temp;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNum = currentAddressNumIpv6Download;
currentPortNum = currentPortNumIpv6Download;
addresses = &addressesIpv6Download;
} else {
currentAddressNum = currentAddressNumIpv4Download;
currentPortNum = currentPortNumIpv4Download;
addresses = &addressesIpv4Download;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNum = currentAddressNumIpv6;
currentPortNum = currentPortNumIpv6;
addresses = &addressesIpv6;
} else {
currentAddressNum = currentAddressNumIpv4;
currentPortNum = currentPortNumIpv4;
addresses = &addressesIpv4;
}
}
if (addresses->empty()) {
return 443;
}
if ((flags & TcpAddressFlagStatic) != 0) {
uint32_t num = 0;
for (auto & addresse : *addresses) {
if ((addresse.flags & TcpAddressFlagStatic) != 0) {
currentAddressNum = num;
break;
}
num++;
}
}
if (currentAddressNum >= addresses->size()) {
currentAddressNum = 0;
if ((flags & TcpAddressFlagTemp) != 0) {
currentAddressNumIpv4Temp = currentAddressNum;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNumIpv6Download = currentAddressNum;
} else {
currentAddressNumIpv4Download = currentAddressNum;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentAddressNumIpv6 = currentAddressNum;
} else {
currentAddressNumIpv4 = currentAddressNum;
}
}
}
if (currentPortNum >= 4) {
currentPortNum = 0;
if ((flags & TcpAddressFlagTemp) != 0) {
currentPortNumIpv4Temp = currentAddressNum;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNumIpv6Download = currentPortNum;
} else {
currentPortNumIpv4Download = currentPortNum;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNumIpv6 = currentPortNum;
} else {
currentPortNumIpv4 = currentPortNum;
}
}
}
TcpAddress *address = &((*addresses) [currentAddressNum]);
int32_t port;
if (!address->secret.empty()) {
port = -1;
} else {
port = defaultPorts[currentPortNum];
}
if (port == -1) {
return address->port;
}
return port;
}
void Datacenter::addAddressAndPort(std::string address, uint32_t port, uint32_t flags, std::string secret) {
std::vector<TcpAddress> *addresses;
if ((flags & TcpAddressFlagTemp) != 0) {
addresses = &addressesIpv4Temp;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
addresses = &addressesIpv6Download;
} else {
addresses = &addressesIpv4Download;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
addresses = &addressesIpv6;
} else {
addresses = &addressesIpv4;
}
}
for (auto & addresse : *addresses) {
if (addresse.address == address && addresse.port == port) {
return;
}
}
addresses->push_back(TcpAddress(address, port, flags, secret));
}
void Datacenter::nextAddressOrPort(uint32_t flags) {
uint32_t currentPortNum;
uint32_t currentAddressNum;
std::vector<TcpAddress> *addresses;
if (flags == 0 && (authKeyPerm == nullptr || PFS_ENABLED && authKeyTemp == nullptr) && !addressesIpv4Temp.empty()) {
flags = TcpAddressFlagTemp;
}
if ((flags & TcpAddressFlagTemp) != 0) {
currentPortNum = currentPortNumIpv4Temp;
currentAddressNum = currentAddressNumIpv4Temp;
addresses = &addressesIpv4Temp;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNum = currentPortNumIpv6Download;
currentAddressNum = currentAddressNumIpv6Download;
addresses = &addressesIpv6Download;
} else {
currentPortNum = currentPortNumIpv4Download;
currentAddressNum = currentAddressNumIpv4Download;
addresses = &addressesIpv4Download;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNum = currentPortNumIpv6;
currentAddressNum = currentAddressNumIpv6;
addresses = &addressesIpv6;
} else {
currentPortNum = currentPortNumIpv4;
currentAddressNum = currentAddressNumIpv4;
addresses = &addressesIpv4;
}
}
bool tryNextPort = true;
if ((flags & TcpAddressFlagStatic) == 0 && currentAddressNum < addresses->size()) {
TcpAddress *currentAddress = &((*addresses)[currentAddressNum]);
tryNextPort = (currentAddress->flags & TcpAddressFlagStatic) == 0;
}
if (tryNextPort && currentPortNum + 1 < 4) {
currentPortNum++;
} else {
if (currentAddressNum + 1 < addresses->size()) {
currentAddressNum++;
} else {
currentAddressNum = 0;
}
currentPortNum = 0;
}
if ((flags & TcpAddressFlagTemp) != 0) {
currentPortNumIpv4Temp = currentPortNum;
currentAddressNumIpv4Temp = currentAddressNum;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNumIpv6Download = currentPortNum;
currentAddressNumIpv6Download = currentAddressNum;
} else {
currentPortNumIpv4Download = currentPortNum;
currentAddressNumIpv4Download = currentAddressNum;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNumIpv6 = currentPortNum;
currentAddressNumIpv6 = currentAddressNum;
} else {
currentPortNumIpv4 = currentPortNum;
currentAddressNumIpv4 = currentAddressNum;
}
}
}
bool Datacenter::isCustomPort(uint32_t flags) {
uint32_t currentPortNum;
if (flags == 0 && (authKeyPerm == nullptr || PFS_ENABLED && authKeyTemp == nullptr) && !addressesIpv4Temp.empty()) {
flags = TcpAddressFlagTemp;
}
if ((flags & TcpAddressFlagTemp) != 0) {
currentPortNum = currentPortNumIpv4Temp;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNum = currentPortNumIpv6Download;
} else {
currentPortNum = currentPortNumIpv4Download;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNum = currentPortNumIpv6;
} else {
currentPortNum = currentPortNumIpv4;
}
}
return defaultPorts[currentPortNum] != -1;
}
void Datacenter::storeCurrentAddressAndPortNum() {
if (config == nullptr) {
config = new Config(instanceNum, "dc" + to_string_int32(datacenterId) + "conf.dat");
}
NativeByteBuffer *buffer = BuffersStorage::getInstance().getFreeBuffer(128);
buffer->writeInt32(paramsConfigVersion);
buffer->writeInt32(currentPortNumIpv4);
buffer->writeInt32(currentAddressNumIpv4);
buffer->writeInt32(currentPortNumIpv6);
buffer->writeInt32(currentAddressNumIpv6);
buffer->writeInt32(currentPortNumIpv4Download);
buffer->writeInt32(currentAddressNumIpv4Download);
buffer->writeInt32(currentPortNumIpv6Download);
buffer->writeInt32(currentAddressNumIpv6Download);
config->writeConfig(buffer);
buffer->reuse();
}
void Datacenter::resetAddressAndPortNum() {
currentPortNumIpv4 = 0;
currentAddressNumIpv4 = 0;
currentPortNumIpv6 = 0;
currentAddressNumIpv6 = 0;
currentPortNumIpv4Download = 0;
currentAddressNumIpv4Download = 0;
currentPortNumIpv6Download = 0;
currentAddressNumIpv6Download = 0;
storeCurrentAddressAndPortNum();
}
void Datacenter::replaceAddresses(std::vector<TcpAddress> &newAddresses, uint32_t flags) {
isCdnDatacenter = (flags & 8) != 0;
TcpAddress *currentTcpAddress = getCurrentAddress(flags);
std::string currentAddress = currentTcpAddress != nullptr ? currentTcpAddress->address : "";
if ((flags & TcpAddressFlagTemp) != 0) {
addressesIpv4Temp = newAddresses;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
addressesIpv6Download = newAddresses;
} else {
addressesIpv4Download = newAddresses;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
addressesIpv6 = newAddresses;
} else {
addressesIpv4 = newAddresses;
}
}
TcpAddress *newTcpAddress = getCurrentAddress(flags);
std::string newAddress = newTcpAddress != nullptr ? newTcpAddress->address : "";
if (currentAddress.compare(newAddress)) {
if ((flags & TcpAddressFlagTemp) != 0) {
currentPortNumIpv4Temp = 0;
} else if ((flags & TcpAddressFlagDownload) != 0) {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNumIpv6Download = 0;
} else {
currentPortNumIpv4Download = 0;
}
} else {
if ((flags & TcpAddressFlagIpv6) != 0) {
currentPortNumIpv6 = 0;
} else {
currentPortNumIpv4 = 0;
}
}
}
}
void Datacenter::serializeToStream(NativeByteBuffer *stream) {
stream->writeInt32(configVersion);
stream->writeInt32(datacenterId);
stream->writeInt32(lastInitVersion);
stream->writeInt32(lastInitMediaVersion);
size_t size;
for (int b = 0; b < 4; b++) {
std::vector<TcpAddress> *array;
switch (b) {
case 0:
array = &addressesIpv4;
break;
case 1:
array = &addressesIpv6;
break;
case 2:
array = &addressesIpv4Download;
break;
case 3:
array = &addressesIpv6Download;
break;
default:
array = nullptr;
break;
}
if (array == nullptr) {
continue;
}
stream->writeInt32((int32_t) (size = array->size()));
for (uint32_t a = 0; a < size; a++) {
stream->writeString((*array)[a].address);
stream->writeInt32((*array)[a].port);
stream->writeInt32((*array)[a].flags);
stream->writeString((*array)[a].secret);
}
}
stream->writeBool(isCdnDatacenter);
if (authKeyPerm != nullptr) {
stream->writeInt32(authKeyPerm->length);
stream->writeBytes(authKeyPerm);
} else {
stream->writeInt32(0);
}
stream->writeInt64(authKeyPermId);
if (authKeyTemp != nullptr) {
stream->writeInt32(authKeyTemp->length);
stream->writeBytes(authKeyTemp);
} else {
stream->writeInt32(0);
}
stream->writeInt64(authKeyTempId);
if (authKeyMediaTemp != nullptr) {
stream->writeInt32(authKeyMediaTemp->length);
stream->writeBytes(authKeyMediaTemp);
} else {
stream->writeInt32(0);
}
stream->writeInt64(authKeyMediaTempId);
stream->writeInt32(authorized ? 1 : 0);
stream->writeInt32((int32_t) (size = serverSalts.size()));
for (uint32_t a = 0; a < size; a++) {
stream->writeInt32(serverSalts[a]->valid_since);
stream->writeInt32(serverSalts[a]->valid_until);
stream->writeInt64(serverSalts[a]->salt);
}
stream->writeInt32((int32_t) (size = mediaServerSalts.size()));
for (uint32_t a = 0; a < size; a++) {
stream->writeInt32(mediaServerSalts[a]->valid_since);
stream->writeInt32(mediaServerSalts[a]->valid_until);
stream->writeInt64(mediaServerSalts[a]->salt);
}
}
void Datacenter::clearAuthKey(HandshakeType type) {
if (type == HandshakeTypeAll || isCdnDatacenter) {
if (authKeyPerm != nullptr) {
delete authKeyPerm;
authKeyPerm = nullptr;
if (LOGS_ENABLED) DEBUG_D("dc%d account%u clear authKeyPerm", datacenterId, instanceNum);
}
authKeyPermId = 0;
serverSalts.clear();
}
if (type == HandshakeTypeMediaTemp || type == HandshakeTypeAll) {
if (authKeyMediaTemp != nullptr) {
delete authKeyMediaTemp;
authKeyMediaTemp = nullptr;
if (LOGS_ENABLED) DEBUG_D("dc%d account%u clear authKeyMediaTemp", datacenterId, instanceNum);
}
authKeyMediaTempId = 0;
lastInitMediaVersion = 0;
mediaServerSalts.clear();
}
if (type == HandshakeTypeTemp || type == HandshakeTypeAll) {
if (authKeyTemp != nullptr) {
delete authKeyTemp;
authKeyTemp = nullptr;
if (LOGS_ENABLED) DEBUG_D("dc%d account%u clear authKeyTemp", datacenterId, instanceNum);
}
authKeyTempId = 0;
lastInitVersion = 0;
}
handshakes.clear();
}
void Datacenter::clearServerSalts(bool media) {
std::vector<std::unique_ptr<TL_future_salt>> &salts = media ? mediaServerSalts : serverSalts;
salts.clear();
}
int64_t Datacenter::getServerSalt(bool media) {
int32_t date = ConnectionsManager::getInstance(instanceNum).getCurrentTime();
bool cleanupNeeded = false;
int64_t result = 0;
int32_t maxRemainingInterval = 0;
std::vector<std::unique_ptr<TL_future_salt>> &salts = media ? mediaServerSalts : serverSalts;
size_t size = salts.size();
for (uint32_t a = 0; a < size; a++) {
TL_future_salt *salt = salts[a].get();
if (salt->valid_until < date) {
cleanupNeeded = true;
} else if (salt->valid_since <= date && salt->valid_until > date) {
if (maxRemainingInterval == 0 || abs(salt->valid_until - date) > maxRemainingInterval) {
maxRemainingInterval = abs(salt->valid_until - date);
result = salt->salt;
}
}
}
if (cleanupNeeded) {
size = salts.size();
for (uint32_t i = 0; i < size; i++) {
if (salts[i]->valid_until < date) {
salts.erase(salts.begin() + i);
size--;
i--;
}
}
}
if (result == 0) {
if (LOGS_ENABLED) DEBUG_D("dc%u valid salt not found", datacenterId);
}
return result;
}
void Datacenter::mergeServerSalts(TL_future_salts *futureSalts, bool media) {
if (futureSalts->salts.empty()) {
return;
}
std::vector<std::unique_ptr<TL_future_salt>> &salts = media ? mediaServerSalts : serverSalts;
int32_t date = ConnectionsManager::getInstance(instanceNum).getCurrentTime();
std::vector<int64_t> existingSalts;
existingSalts.reserve(salts.size());
size_t size = salts.size();
for (uint32_t a = 0; a < size; a++) {
existingSalts.push_back(salts[a]->salt);
}
bool added = false;
size = futureSalts->salts.size();
for (uint32_t a = 0; a < size; a++) {
int64_t value = futureSalts->salts[a]->salt;
if (std::find(existingSalts.begin(), existingSalts.end(), value) == existingSalts.end() && futureSalts->salts[a]->valid_until > date) {
salts.push_back(std::unique_ptr<TL_future_salt>(std::move(futureSalts->salts[a])));
added = true;
}
}
if (added) {
std::sort(salts.begin(), salts.end(), [](const std::unique_ptr<TL_future_salt> &x, const std::unique_ptr<TL_future_salt> &y) { return x->valid_since < y->valid_since; });
}
}
void Datacenter::addServerSalt(std::unique_ptr<TL_future_salt> &serverSalt, bool media) {
std::vector<std::unique_ptr<TL_future_salt>> &salts = media ? mediaServerSalts : serverSalts;
size_t size = salts.size();
for (uint32_t a = 0; a < size; a++) {
if (salts[a]->salt == serverSalt->salt) {
return;
}
}
salts.push_back(std::move(serverSalt));
std::sort(salts.begin(), salts.end(), [](const std::unique_ptr<TL_future_salt> &x, const std::unique_ptr<TL_future_salt> &y) { return x->valid_since < y->valid_since; });
}
bool Datacenter::containsServerSalt(int64_t value, bool media) {
std::vector<std::unique_ptr<TL_future_salt>> &salts = media ? mediaServerSalts : serverSalts;
size_t size = salts.size();
for (uint32_t a = 0; a < size; a++) {
if (salts[a]->salt == value) {
return true;
}
}
return false;
}
void Datacenter::suspendConnections(bool suspendPush) {
if (genericConnection != nullptr) {
genericConnection->suspendConnection();
}
if (suspendPush && pushConnection != nullptr) {
pushConnection->suspendConnection();
}
if (genericMediaConnection != nullptr) {
genericMediaConnection->suspendConnection();
}
if (tempConnection != nullptr) {
tempConnection->suspendConnection();
}
for (auto & a : uploadConnection) {
if (a != nullptr) {
a->suspendConnection();
}
}
for (auto & a : downloadConnection) {
if (a != nullptr) {
a->suspendConnection();
}
}
}
void Datacenter::getSessions(std::vector<int64_t> &sessions) {
if (genericConnection != nullptr) {
sessions.push_back(genericConnection->getSessionId());
}
if (genericMediaConnection != nullptr) {
sessions.push_back(genericMediaConnection->getSessionId());
}
if (tempConnection != nullptr) {
sessions.push_back(tempConnection->getSessionId());
}
for (auto & a : uploadConnection) {
if (a != nullptr) {
sessions.push_back(a->getSessionId());
}
}
for (auto & a : downloadConnection) {
if (a != nullptr) {
sessions.push_back(a->getSessionId());
}
}
for (auto & a : proxyConnection) {
if (a != nullptr) {
sessions.push_back(a->getSessionId());
}
}
}
void Datacenter::recreateSessions(HandshakeType type) {
if (type == HandshakeTypeAll || type == HandshakeTypeTemp || type == HandshakeTypePerm) {
if (genericConnection != nullptr) {
genericConnection->recreateSession();
}
if (tempConnection != nullptr) {
tempConnection->recreateSession();
}
for (auto & a : uploadConnection) {
if (a != nullptr) {
a->recreateSession();
}
}
for (auto & a : proxyConnection) {
if (a != nullptr) {
a->recreateSession();
}
}
}
if (type == HandshakeTypeAll || type == HandshakeTypeMediaTemp || type == HandshakeTypePerm) {
for (auto & a : downloadConnection) {
if (a != nullptr) {
a->recreateSession();
}
}
if (genericMediaConnection != nullptr) {
genericMediaConnection->recreateSession();
}
}
}
Connection *Datacenter::createProxyConnection(uint8_t num) {
if (proxyConnection[num] == nullptr) {
proxyConnection[num] = new Connection(this, ConnectionTypeProxy, num);
}
return proxyConnection[num];
}
Connection *Datacenter::createDownloadConnection(uint8_t num) {
if (downloadConnection[num] == nullptr) {
downloadConnection[num] = new Connection(this, ConnectionTypeDownload, num);
}
return downloadConnection[num];
}
Connection *Datacenter::createUploadConnection(uint8_t num) {
if (uploadConnection[num] == nullptr) {
uploadConnection[num] = new Connection(this, ConnectionTypeUpload, num);
}
return uploadConnection[num];
}
Connection *Datacenter::createGenericConnection() {
if (genericConnection == nullptr) {
genericConnection = new Connection(this, ConnectionTypeGeneric, 0);
}
return genericConnection;
}
Connection *Datacenter::createGenericMediaConnection() {
if (genericMediaConnection == nullptr) {
genericMediaConnection = new Connection(this, ConnectionTypeGenericMedia, 0);
}
return genericMediaConnection;
}
Connection *Datacenter::createPushConnection() {
if (pushConnection == nullptr) {
pushConnection = new Connection(this, ConnectionTypePush, 0);
}
return pushConnection;
}
Connection *Datacenter::createTempConnection() {
if (tempConnection == nullptr) {
tempConnection = new Connection(this, ConnectionTypeTemp, 0);
}
return tempConnection;
}
uint32_t Datacenter::getDatacenterId() {
return datacenterId;
}
bool Datacenter::isHandshakingAny() {
return !handshakes.empty();
}
bool Datacenter::isHandshaking(bool media) {
if (handshakes.empty()) {
return false;
}
if (media && (isCdnDatacenter || !PFS_ENABLED)) {
media = false;
}
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if (handshake->getType() == HandshakeTypePerm || (media && handshake->getType() == HandshakeTypeMediaTemp) || (!media && handshake->getType() != HandshakeTypeMediaTemp)) {
return true;
}
}
return false;
}
bool Datacenter::isHandshaking(HandshakeType type) {
if (handshakes.empty()) {
return false;
}
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if (handshake->getType() == type) {
return true;
}
}
return false;
}
void Datacenter::beginHandshake(HandshakeType handshakeType, bool reconnect) {
if (handshakeType == HandshakeTypeCurrent) {
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
handshake->beginHandshake(reconnect);
}
} else {
if (authKeyPerm == nullptr) {
if (!isHandshaking(HandshakeTypePerm)) {
auto handshake = new Handshake(this, HandshakeTypePerm, this);
handshakes.push_back(std::unique_ptr<Handshake>(handshake));
handshake->beginHandshake(reconnect);
}
} else if (PFS_ENABLED) {
if (handshakeType == HandshakeTypeAll || handshakeType == HandshakeTypeTemp) {
if (!isHandshaking(HandshakeTypeTemp)) {
auto handshake = new Handshake(this, HandshakeTypeTemp, this);
handshakes.push_back(std::unique_ptr<Handshake>(handshake));
handshake->beginHandshake(reconnect);
}
}
if ((handshakeType == HandshakeTypeAll || handshakeType == HandshakeTypeMediaTemp) && hasMediaAddress()) {
if (!isHandshaking(HandshakeTypeMediaTemp)) {
auto handshake = new Handshake(this, HandshakeTypeMediaTemp, this);
handshakes.push_back(std::unique_ptr<Handshake>(handshake));
handshake->beginHandshake(reconnect);
}
}
}
}
}
void Datacenter::onHandshakeConnectionClosed(Connection *connection) {
if (handshakes.empty()) {
return;
}
bool media = connection->getConnectionType() == ConnectionTypeGenericMedia;
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if ((media && handshake->getType() == HandshakeTypeMediaTemp) || (!media && handshake->getType() != HandshakeTypeMediaTemp)) {
handshake->onHandshakeConnectionClosed();
}
}
}
void Datacenter::onHandshakeConnectionConnected(Connection *connection) {
if (handshakes.empty()) {
return;
}
bool media = connection->getConnectionType() == ConnectionTypeGenericMedia;
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if ((media && handshake->getType() == HandshakeTypeMediaTemp) || (!media && handshake->getType() != HandshakeTypeMediaTemp)) {
handshake->onHandshakeConnectionConnected();
}
}
}
void Datacenter::aesIgeEncryption(uint8_t *buffer, uint8_t *key, uint8_t *iv, bool encrypt, bool changeIv, uint32_t length) {
uint8_t *ivBytes = iv;
if (!changeIv) {
ivBytes = new uint8_t[32];
memcpy(ivBytes, iv, 32);
}
AES_KEY akey;
if (!encrypt) {
AES_set_decrypt_key(key, 32 * 8, &akey);
AES_ige_encrypt(buffer, buffer, length, &akey, ivBytes, AES_DECRYPT);
} else {
AES_set_encrypt_key(key, 32 * 8, &akey);
AES_ige_encrypt(buffer, buffer, length, &akey, ivBytes, AES_ENCRYPT);
}
if (!changeIv) {
delete [] ivBytes;
}
}
void Datacenter::processHandshakeResponse(bool media, TLObject *message, int64_t messageId) {
if (handshakes.empty()) {
return;
}
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if ((media && handshake->getType() == HandshakeTypeMediaTemp) || (!media && handshake->getType() != HandshakeTypeMediaTemp)) {
handshake->processHandshakeResponse(message, messageId);
}
}
}
TLObject *Datacenter::getCurrentHandshakeRequest(bool media) {
if (handshakes.empty()) {
return nullptr;
}
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if ((media && handshake->getType() == HandshakeTypeMediaTemp) || (!media && handshake->getType() != HandshakeTypeMediaTemp)) {
return handshake->getCurrentHandshakeRequest();
}
}
return nullptr;
}
inline void generateMessageKey(int32_t instanceNum, uint8_t *authKey, uint8_t *messageKey, uint8_t *result, bool incoming, int mtProtoVersion) {
uint32_t x = incoming ? 8 : 0;
thread_local static uint8_t sha[68];
switch (mtProtoVersion) {
case 2:
SHA256_Init(&sha256Ctx);
SHA256_Update(&sha256Ctx, messageKey, 16);
SHA256_Update(&sha256Ctx, authKey + x, 36);
SHA256_Final(sha, &sha256Ctx);
SHA256_Init(&sha256Ctx);
SHA256_Update(&sha256Ctx, authKey + 40 + x, 36);
SHA256_Update(&sha256Ctx, messageKey, 16);
SHA256_Final(sha + 32, &sha256Ctx);
memcpy(result, sha, 8);
memcpy(result + 8, sha + 32 + 8, 16);
memcpy(result + 8 + 16, sha + 24, 8);
memcpy(result + 32, sha + 32, 8);
memcpy(result + 32 + 8, sha + 8, 16);
memcpy(result + 32 + 8 + 16, sha + 32 + 24, 8);
break;
default:
memcpy(sha + 20, messageKey, 16);
memcpy(sha + 20 + 16, authKey + x, 32);
SHA1(sha + 20, 48, sha);
memcpy(result, sha, 8);
memcpy(result + 32, sha + 8, 12);
memcpy(sha + 20, authKey + 32 + x, 16);
memcpy(sha + 20 + 16, messageKey, 16);
memcpy(sha + 20 + 16 + 16, authKey + 48 + x, 16);
SHA1(sha + 20, 48, sha);
memcpy(result + 8, sha + 8, 12);
memcpy(result + 32 + 12, sha, 8);
memcpy(sha + 20, authKey + 64 + x, 32);
memcpy(sha + 20 + 32, messageKey, 16);
SHA1(sha + 20, 48, sha);
memcpy(result + 8 + 12, sha + 4, 12);
memcpy(result + 32 + 12 + 8, sha + 16, 4);
memcpy(sha + 20, messageKey, 16);
memcpy(sha + 20 + 16, authKey + 96 + x, 32);
SHA1(sha + 20, 48, sha);
memcpy(result + 32 + 12 + 8 + 4, sha, 8);
break;
}
}
ByteArray *Datacenter::getAuthKey(ConnectionType connectionType, bool perm, int64_t *authKeyId, int32_t allowPendingKey) {
bool usePermKey = isCdnDatacenter || perm || !PFS_ENABLED;
if (usePermKey) {
if (authKeyId != nullptr) {
*authKeyId = authKeyPermId;
}
return authKeyPerm;
} else {
bool media = Connection::isMediaConnectionType(connectionType) && hasMediaAddress();
ByteArray *authKeyPending = nullptr;
int64_t authKeyPendingId = 0;
for (auto & iter : handshakes) {
Handshake *handshake = iter.get();
if ((media && handshake->getType() == HandshakeTypeMediaTemp) || (!media && handshake->getType() == HandshakeTypeTemp)) {
authKeyPending = handshake->getPendingAuthKey();
authKeyPendingId = handshake->getPendingAuthKeyId();
break;
}
}
if ((allowPendingKey & 1) != 0 && authKeyPending != nullptr) {
if (authKeyId != nullptr) {
*authKeyId = authKeyPendingId;
}
return authKeyPending;
} else if (media) {
if (authKeyId != nullptr) {
*authKeyId = authKeyMediaTempId;
}
return authKeyMediaTemp;
} else {
if (authKeyId != nullptr) {
*authKeyId = authKeyTempId;
}
return authKeyTemp;
}
}
}
NativeByteBuffer *Datacenter::createRequestsData(std::vector<std::unique_ptr<NetworkMessage>> &requests, int32_t *quickAckId, Connection *connection, bool pfsInit) {
int64_t authKeyId;
ByteArray *authKey = getAuthKey(connection->getConnectionType(), pfsInit, &authKeyId, 1);
if (authKey == nullptr) {
return nullptr;
}
int64_t messageId;
TLObject *messageBody;
bool freeMessageBody = false;
int32_t messageSeqNo;
if (requests.size() == 1) {
NetworkMessage *networkMessage = requests[0].get();
if (networkMessage->message->outgoingBody != nullptr) {
messageBody = networkMessage->message->outgoingBody;
} else {
messageBody = networkMessage->message->body.get();
}
if (LOGS_ENABLED) DEBUG_D("connection(%p, account%u, dc%u, type %d) send message (session: 0x%" PRIx64 ", seqno: %d, messageid: 0x%" PRIx64 "): %s(%p)", connection, instanceNum, datacenterId, connection->getConnectionType(), (uint64_t) connection->getSessionId(), networkMessage->message->seqno, (uint64_t) networkMessage->message->msg_id, typeid(*messageBody).name(), messageBody);
auto messageTime = (int64_t) (networkMessage->message->msg_id / 4294967296.0 * 1000);
int64_t currentTime = ConnectionsManager::getInstance(instanceNum).getCurrentTimeMillis() + (int64_t) ConnectionsManager::getInstance(instanceNum).getTimeDifference() * 1000;
if (!pfsInit && (networkMessage->forceContainer || messageTime < currentTime - 30000 || messageTime > currentTime + 25000)) {
if (LOGS_ENABLED) DEBUG_D("wrap message in container");
auto messageContainer = new TL_msg_container();
messageContainer->messages.push_back(std::move(networkMessage->message));
messageId = ConnectionsManager::getInstance(instanceNum).generateMessageId();
messageBody = messageContainer;
messageSeqNo = connection->generateMessageSeqNo(false);
freeMessageBody = true;
} else {
messageId = networkMessage->message->msg_id;
messageSeqNo = networkMessage->message->seqno;
}
} else {
if (LOGS_ENABLED) DEBUG_D("start write messages to container");
auto messageContainer = new TL_msg_container();
size_t count = requests.size();
for (uint32_t a = 0; a < count; a++) {
NetworkMessage *networkMessage = requests[a].get();
if (networkMessage->message->outgoingBody != nullptr) {
messageBody = networkMessage->message->outgoingBody;
} else {
messageBody = networkMessage->message->body.get();
}
if (LOGS_ENABLED) DEBUG_D("connection(%p, account%u, dc%u, type %d) send message (session: 0x%" PRIx64 ", seqno: %d, messageid: 0x%" PRIx64 "): %s(%p)", connection, instanceNum, datacenterId, connection->getConnectionType(), (uint64_t) connection->getSessionId(), networkMessage->message->seqno, (uint64_t) networkMessage->message->msg_id, typeid(*messageBody).name(), messageBody);
messageContainer->messages.push_back(std::unique_ptr<TL_message>(std::move(networkMessage->message)));
}
messageId = ConnectionsManager::getInstance(instanceNum).generateMessageId();
messageBody = messageContainer;
freeMessageBody = true;
messageSeqNo = connection->generateMessageSeqNo(false);
}
int32_t mtProtoVersion;
if (pfsInit) {
mtProtoVersion = 1;
} else {
mtProtoVersion = 2;
}
uint32_t messageSize = messageBody->getObjectSize();
uint32_t additionalSize = (32 + messageSize) % 16;
if (additionalSize != 0) {
additionalSize = 16 - additionalSize;
}
if (mtProtoVersion == 2) {
uint8_t index;
RAND_bytes(&index, 1);
additionalSize += (2 + (index % 14)) * 16;
}
NativeByteBuffer *buffer = BuffersStorage::getInstance().getFreeBuffer(24 + 32 + messageSize + additionalSize);
buffer->writeInt64(authKeyId);
buffer->position(24);
if (pfsInit) {
int64_t value;
RAND_bytes((uint8_t *) &value, 8);
buffer->writeInt64(value);
RAND_bytes((uint8_t *) &value, 8);
buffer->writeInt64(value);
} else {
buffer->writeInt64(getServerSalt(Connection::isMediaConnectionType(connection->getConnectionType())));
buffer->writeInt64(connection->getSessionId());
}
buffer->writeInt64(messageId);
buffer->writeInt32(messageSeqNo);
buffer->writeInt32(messageSize);
messageBody->serializeToStream(buffer);
if (freeMessageBody) {
delete messageBody;
}
if (additionalSize != 0) {
RAND_bytes(buffer->bytes() + 24 + 32 + messageSize, additionalSize);
}
thread_local static uint8_t messageKey[96];
switch (mtProtoVersion) {
case 2: {
SHA256_Init(&sha256Ctx);
SHA256_Update(&sha256Ctx, authKey->bytes + 88, 32);
SHA256_Update(&sha256Ctx, buffer->bytes() + 24, 32 + messageSize + additionalSize);
SHA256_Final(messageKey, &sha256Ctx);
if (quickAckId != nullptr) {
*quickAckId = (((messageKey[0] & 0xff)) |
((messageKey[1] & 0xff) << 8) |
((messageKey[2] & 0xff) << 16) |
((messageKey[3] & 0xff) << 24)) & 0x7fffffff;
}
break;
}
default: {
SHA1(buffer->bytes() + 24, 32 + messageSize, messageKey + 4);
if (quickAckId != nullptr) {
*quickAckId = (((messageKey[4] & 0xff)) |
((messageKey[5] & 0xff) << 8) |
((messageKey[6] & 0xff) << 16) |
((messageKey[7] & 0xff) << 24)) & 0x7fffffff;
}
break;
}
}
memcpy(buffer->bytes() + 8, messageKey + 8, 16);
generateMessageKey(instanceNum, authKey->bytes, messageKey + 8, messageKey + 32, false, mtProtoVersion);
aesIgeEncryption(buffer->bytes() + 24, messageKey + 32, messageKey + 64, true, false, buffer->limit() - 24);
return buffer;
}
bool Datacenter::decryptServerResponse(int64_t keyId, uint8_t *key, uint8_t *data, uint32_t length, Connection *connection) {
int64_t authKeyId;
ByteArray *authKey = getAuthKey(connection->getConnectionType(), false, &authKeyId, 1);
if (authKey == nullptr) {
return false;
}
bool error = authKeyId != keyId;
thread_local static uint8_t messageKey[96];
generateMessageKey(instanceNum, authKey->bytes, key, messageKey + 32, true, 2);
aesIgeEncryption(data, messageKey + 32, messageKey + 64, false, false, length);
uint32_t messageLength;
memcpy(&messageLength, data + 28, sizeof(uint32_t));
uint32_t paddingLength = length - (messageLength + 32);
error |= (messageLength > length - 32);
error |= (paddingLength < 12);
error |= (paddingLength > 1024);
SHA256_Init(&sha256Ctx);
SHA256_Update(&sha256Ctx, authKey->bytes + 88 + 8, 32);
SHA256_Update(&sha256Ctx, data, length);
SHA256_Final(messageKey, &sha256Ctx);
for (uint32_t i = 0; i < 16; i++) {
error |= (messageKey[i + 8] != key[i]);
}
return !error;
}
bool Datacenter::hasPermanentAuthKey() {
return authKeyPerm != nullptr;
}
int64_t Datacenter::getPermanentAuthKeyId() {
return authKeyPermId;
}
bool Datacenter::hasAuthKey(ConnectionType connectionType, int32_t allowPendingKey) {
return getAuthKey(connectionType, false, nullptr, allowPendingKey) != nullptr;
}
Connection *Datacenter::createConnectionByType(uint32_t connectionType) {
uint8_t connectionNum = (uint8_t) (connectionType >> 16);
connectionType = connectionType & 0x0000ffff;
switch (connectionType) {
case ConnectionTypeGeneric:
return createGenericConnection();
case ConnectionTypeGenericMedia:
return createGenericMediaConnection();
case ConnectionTypeDownload:
return createDownloadConnection(connectionNum);
case ConnectionTypeUpload:
return createUploadConnection(connectionNum);
case ConnectionTypePush:
return createPushConnection();
case ConnectionTypeTemp:
return createTempConnection();
case ConnectionTypeProxy:
return createProxyConnection(connectionNum);
default:
return nullptr;
}
}
Connection *Datacenter::getProxyConnection(uint8_t num, bool create, bool connect) {
ByteArray *authKey = getAuthKey(ConnectionTypeProxy, false, nullptr, 1);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
Connection *connection = createProxyConnection(num);
if (connect) {
connection->connect();
}
}
return proxyConnection[num];
}
Connection *Datacenter::getDownloadConnection(uint8_t num, bool create) {
ByteArray *authKey = getAuthKey(ConnectionTypeDownload, false, nullptr, 0);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
createDownloadConnection(num)->connect();
}
return downloadConnection[num];
}
Connection *Datacenter::getUploadConnection(uint8_t num, bool create) {
ByteArray *authKey = getAuthKey(ConnectionTypeUpload, false, nullptr, 0);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
createUploadConnection(num)->connect();
}
return uploadConnection[num];
}
Connection *Datacenter::getGenericConnection(bool create, int32_t allowPendingKey) {
ByteArray *authKey = getAuthKey(ConnectionTypeGeneric, false, nullptr, allowPendingKey);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
createGenericConnection()->connect();
}
return genericConnection;
}
Connection *Datacenter::getGenericMediaConnection(bool create, int32_t allowPendingKey) {
ByteArray *authKey = getAuthKey(ConnectionTypeGenericMedia, false, nullptr, allowPendingKey);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
createGenericMediaConnection()->connect();
}
return genericMediaConnection;
}
Connection *Datacenter::getPushConnection(bool create) {
ByteArray *authKey = getAuthKey(ConnectionTypePush, false, nullptr, 0);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
createPushConnection()->connect();
}
return pushConnection;
}
Connection *Datacenter::getTempConnection(bool create) {
ByteArray *authKey = getAuthKey(ConnectionTypeTemp, false, nullptr, 1);
if (authKey == nullptr) {
return nullptr;
}
if (create) {
createTempConnection()->connect();
}
return tempConnection;
}
Connection *Datacenter::getConnectionByType(uint32_t connectionType, bool create, int32_t allowPendingKey) {
uint8_t connectionNum = (uint8_t) (connectionType >> 16);
connectionType = connectionType & 0x0000ffff;
switch (connectionType) {
case ConnectionTypeGeneric:
return getGenericConnection(create, allowPendingKey);
case ConnectionTypeGenericMedia:
return getGenericMediaConnection(create, allowPendingKey);
case ConnectionTypeDownload:
return getDownloadConnection(connectionNum, create);
case ConnectionTypeUpload:
return getUploadConnection(connectionNum, create);
case ConnectionTypePush:
return getPushConnection(create);
case ConnectionTypeTemp:
return getTempConnection(create);
case ConnectionTypeProxy:
return getProxyConnection(connectionNum, create, create);
default:
return nullptr;
}
}
void Datacenter::onHandshakeComplete(Handshake *handshake, int64_t keyId, ByteArray *authKey, int32_t timeDifference) {
HandshakeType type = handshake->getType();
for (auto iter = handshakes.begin(); iter != handshakes.end(); iter++) {
if (iter->get() == handshake) {
handshakes.erase(iter);
if (type == HandshakeTypePerm) {
authKeyPermId = keyId;
authKeyPerm = authKey;
if (!isCdnDatacenter && PFS_ENABLED) {
beginHandshake(HandshakeTypeAll, false);
}
} else {
if (type == HandshakeTypeTemp) {
authKeyTempId = keyId;
authKeyTemp = authKey;
lastInitVersion = 0;
} else if (type == HandshakeTypeMediaTemp) {
authKeyMediaTempId = keyId;
authKeyMediaTemp = authKey;
lastInitMediaVersion = 0;
}
}
ConnectionsManager::getInstance(instanceNum).onDatacenterHandshakeComplete(this, type, timeDifference);
break;
}
}
}
void Datacenter::exportAuthorization() {
if (exportingAuthorization || isCdnDatacenter) {
return;
}
exportingAuthorization = true;
auto request = new TL_auth_exportAuthorization();
request->dc_id = datacenterId;
if (LOGS_ENABLED) DEBUG_D("dc%u begin export authorization", datacenterId);
ConnectionsManager::getInstance(instanceNum).sendRequest(request, [&](TLObject *response, TL_error *error, int32_t networkType, int64_t responseTime) {
if (error == nullptr) {
auto res = (TL_auth_exportedAuthorization *) response;
auto request2 = new TL_auth_importAuthorization();
request2->bytes = std::move(res->bytes);
request2->id = res->id;
if (LOGS_ENABLED) DEBUG_D("dc%u begin import authorization", datacenterId);
ConnectionsManager::getInstance(instanceNum).sendRequest(request2, [&](TLObject *response2, TL_error *error2, int32_t networkType, int64_t responseTime) {
if (error2 == nullptr) {
authorized = true;
ConnectionsManager::getInstance(instanceNum).onDatacenterExportAuthorizationComplete(this);
} else {
if (LOGS_ENABLED) DEBUG_D("dc%u failed import authorization", datacenterId);
}
exportingAuthorization = false;
}, nullptr, RequestFlagEnableUnauthorized | RequestFlagWithoutLogin, datacenterId, ConnectionTypeGeneric, true);
} else {
if (LOGS_ENABLED) DEBUG_D("dc%u failed export authorization", datacenterId);
exportingAuthorization = false;
}
}, nullptr, 0, DEFAULT_DATACENTER_ID, ConnectionTypeGeneric, true);
}
bool Datacenter::isExportingAuthorization() {
return exportingAuthorization;
}
bool Datacenter::hasMediaAddress() {
std::vector<TcpAddress> *addresses;
int strategy = ConnectionsManager::getInstance(instanceNum).getIpStratagy();
if (strategy == USE_IPV6_ONLY) {
addresses = &addressesIpv6Download;
} else {
addresses = &addressesIpv4Download;
}
return !addresses->empty();
}
void Datacenter::resetInitVersion() {
lastInitVersion = 0;
lastInitMediaVersion = 0;
}
TL_help_configSimple *Datacenter::decodeSimpleConfig(NativeByteBuffer *buffer) {
TL_help_configSimple *result = nullptr;
if (buffer->limit() < 256) {
return result;
}
static std::string public_key =
"-----BEGIN RSA PUBLIC KEY-----\n"
"MIIBCgKCAQEAyr+18Rex2ohtVy8sroGPBwXD3DOoKCSpjDqYoXgCqB7ioln4eDCF\n"
"fOBUlfXUEvM/fnKCpF46VkAftlb4VuPDeQSS/ZxZYEGqHaywlroVnXHIjgqoxiAd\n"
"192xRGreuXIaUKmkwlM9JID9WS2jUsTpzQ91L8MEPLJ/4zrBwZua8W5fECwCCh2c\n"
"9G5IzzBm+otMS/YKwmR1olzRCyEkyAEjXWqBI9Ftv5eG8m0VkBzOG655WIYdyV0H\n"
"fDK/NWcvGqa0w/nriMD6mDjKOryamw0OP9QuYgMN0C9xMW9y8SmP4h92OAWodTYg\n"
"Y1hZCxdv6cs5UnW9+PWvS+WIbkh+GaWYxwIDAQAB\n"
"-----END RSA PUBLIC KEY-----";
BIO *keyBio = BIO_new(BIO_s_mem());
BIO_write(keyBio, public_key.c_str(), (int) public_key.length());
RSA *rsaKey = PEM_read_bio_RSAPublicKey(keyBio, nullptr, nullptr, nullptr);
if (rsaKey == nullptr) {
if (rsaKey == nullptr) {
if (LOGS_ENABLED) DEBUG_E("Invalid rsa public key");
return nullptr;
}
}
BIGNUM x, y;
uint8_t *bytes = buffer->bytes();
BN_CTX *bnContext = BN_CTX_new();
BN_init(&x);
BN_init(&y);
BN_bin2bn(bytes, 256, &x);
if (BN_mod_exp(&y, &x, rsaKey->e, rsaKey->n, bnContext) == 1) {
unsigned l = 256 - BN_num_bytes(&y);
memset(bytes, 0, l);
if (BN_bn2bin(&y, bytes + l) == 256 - l) {
AES_KEY aeskey;
unsigned char iv[16];
memcpy(iv, bytes + 16, 16);
AES_set_decrypt_key(bytes, 256, &aeskey);
AES_cbc_encrypt(bytes + 32, bytes + 32, 256 - 32, &aeskey, iv, AES_DECRYPT);
EVP_MD_CTX ctx;
unsigned char sha256_out[32];
unsigned olen = 0;
EVP_MD_CTX_init(&ctx);
EVP_DigestInit_ex(&ctx, EVP_sha256(), NULL);
EVP_DigestUpdate(&ctx, bytes + 32, 256 - 32 - 16);
EVP_DigestFinal_ex(&ctx, sha256_out, &olen);
EVP_MD_CTX_cleanup(&ctx);
if (olen == 32) {
if (memcmp(bytes + 256 - 16, sha256_out, 16) == 0) {
unsigned data_len = *(unsigned *) (bytes + 32);
if (data_len && data_len <= 256 - 32 - 16 && !(data_len & 3)) {
buffer->position(32 + 4);
bool error = false;
result = TL_help_configSimple::TLdeserialize(buffer, buffer->readUint32(&error), 0, error);
if (error) {
if (result != nullptr) {
delete result;
result = nullptr;
}
}
} else {
if (LOGS_ENABLED) DEBUG_E("TL data length field invalid - %d", data_len);
}
} else {
if (LOGS_ENABLED) DEBUG_E("RSA signature check FAILED (SHA256 mismatch)");
}
}
}
}
BN_CTX_free(bnContext);
BN_free(&x);
BN_free(&y);
RSA_free(rsaKey);
BIO_free(keyBio);
return result;
}