From 6c078c38d0904cdf51eac4a2d45cc489d8e8f00a Mon Sep 17 00:00:00 2001 From: Sam Date: Wed, 19 Jan 2022 22:18:17 +0800 Subject: [PATCH] =?UTF-8?q?=E2=9C=A8=20Auth:=20Add=20type=20hint=20for=20s?= =?UTF-8?q?end=20result?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- pyrogram/session/auth.py | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/pyrogram/session/auth.py b/pyrogram/session/auth.py index 6187a85d..e053a980 100644 --- a/pyrogram/session/auth.py +++ b/pyrogram/session/auth.py @@ -28,6 +28,7 @@ from pyrogram import raw from pyrogram.connection import Connection from pyrogram.crypto import aes, rsa, prime from pyrogram.errors import SecurityCheckMismatch +from pyrogram.raw import types from pyrogram.raw.core import TLObject, Long, Int from .internals import MsgId @@ -87,7 +88,7 @@ class Auth: # Step 1; Step 2 nonce = int.from_bytes(urandom(16), "little", signed=True) log.debug(f"Send req_pq: {nonce}") - res_pq = await self.send(raw.functions.ReqPqMulti(nonce=nonce)) + res_pq: types.ResPQ = await self.send(raw.functions.ReqPqMulti(nonce=nonce)) log.debug(f"Got ResPq: {res_pq.server_nonce}") log.debug(f"Server public key fingerprints: {res_pq.server_public_key_fingerprints}") @@ -131,7 +132,7 @@ class Auth: # Step 5. TODO: Handle "server_DH_params_fail". Code assumes response is ok log.debug("Send req_DH_params") - server_dh_params = await self.send( + server_dh_params: types.ServerDHParamsOk = await self.send( raw.functions.ReqDHParams( nonce=nonce, server_nonce=server_nonce, @@ -191,7 +192,7 @@ class Auth: encrypted_data = aes.ige256_encrypt(data_with_hash, tmp_aes_key, tmp_aes_iv) log.debug("Send set_client_DH_params") - set_client_dh_params_answer = await self.send( + set_client_dh_params_answer: types.DhGenOk = await self.send( raw.functions.SetClientDHParams( nonce=nonce, server_nonce=server_nonce,