MTPyroger/pyrogram/connection/transport/tcp/tcp_abridged_o.py

86 lines
2.7 KiB
Python
Raw Normal View History

2020-03-21 14:43:32 +00:00
# Pyrogram - Telegram MTProto API Client Library for Python
# Copyright (C) 2017-2020 Dan <https://github.com/delivrance>
2018-05-28 17:57:57 +00:00
#
2020-03-21 14:43:32 +00:00
# This file is part of Pyrogram.
2018-05-28 17:57:57 +00:00
#
2020-03-21 14:43:32 +00:00
# Pyrogram is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License as published
# by the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
2018-05-28 17:57:57 +00:00
#
2020-03-21 14:43:32 +00:00
# Pyrogram is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
2018-05-28 17:57:57 +00:00
#
2020-03-21 14:43:32 +00:00
# You should have received a copy of the GNU Lesser General Public License
# along with Pyrogram. If not, see <http://www.gnu.org/licenses/>.
2018-05-28 17:57:57 +00:00
import logging
2018-05-28 17:57:57 +00:00
import os
from pyrogram import utils
from pyrogram.crypto import aes
2018-05-28 17:57:57 +00:00
from .tcp import TCP
log = logging.getLogger(__name__)
2018-05-28 17:57:57 +00:00
class TCPAbridgedO(TCP):
RESERVED = (b"HEAD", b"POST", b"GET ", b"OPTI", b"\xee" * 4)
def __init__(self, ipv6: bool, proxy: dict):
super().__init__(ipv6, proxy)
2018-05-28 17:57:57 +00:00
self.encrypt = None
self.decrypt = None
async def connect(self, address: tuple):
await super().connect(address)
2018-05-28 17:57:57 +00:00
while True:
nonce = bytearray(os.urandom(64))
2019-03-16 16:51:37 +00:00
if nonce[0] != b"\xef" and nonce[:4] not in self.RESERVED and nonce[4:4] != b"\x00" * 4:
2018-05-28 17:57:57 +00:00
nonce[56] = nonce[57] = nonce[58] = nonce[59] = 0xef
break
temp = bytearray(nonce[55:7:-1])
self.encrypt = (nonce[8:40], nonce[40:56], bytearray(1))
self.decrypt = (temp[0:32], temp[32:48], bytearray(1))
nonce[56:64] = aes.ctr256_encrypt(nonce, *self.encrypt)[56:64]
2018-05-28 17:57:57 +00:00
await super().send(nonce)
2018-05-28 17:57:57 +00:00
async def send(self, data: bytes, *args):
2018-05-28 17:57:57 +00:00
length = len(data) // 4
data = (bytes([length]) if length <= 126 else b"\x7f" + length.to_bytes(3, "little")) + data
payload = await utils.maybe_run_in_executor(aes.ctr256_encrypt, data, len(data), self.loop, *self.encrypt)
2018-05-28 17:57:57 +00:00
await super().send(payload)
2018-05-28 17:57:57 +00:00
async def recv(self, length: int = 0) -> bytes or None:
length = await super().recv(1)
2018-05-28 17:57:57 +00:00
if length is None:
return None
length = aes.ctr256_decrypt(length, *self.decrypt)
2018-05-28 17:57:57 +00:00
if length == b"\x7f":
length = await super().recv(3)
2018-05-28 17:57:57 +00:00
if length is None:
return None
length = aes.ctr256_decrypt(length, *self.decrypt)
2018-05-28 17:57:57 +00:00
data = await super().recv(int.from_bytes(length, "little") * 4)
2018-05-28 17:57:57 +00:00
if data is None:
return None
return await utils.maybe_run_in_executor(aes.ctr256_decrypt, data, len(data), self.loop, *self.decrypt)