# Pyrogram - Telegram MTProto API Client Library for Python # Copyright (C) 2017-2020 Dan # # This file is part of Pyrogram. # # Pyrogram is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as published # by the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # Pyrogram is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public License # along with Pyrogram. If not, see . import logging import os from pyrogram.crypto import aes from .tcp import TCP log = logging.getLogger(__name__) class TCPAbridgedO(TCP): RESERVED = (b"HEAD", b"POST", b"GET ", b"OPTI", b"\xee" * 4) def __init__(self, ipv6: bool, proxy: dict): super().__init__(ipv6, proxy) self.encrypt = None self.decrypt = None async def connect(self, address: tuple): await super().connect(address) while True: nonce = bytearray(os.urandom(64)) if nonce[0] != b"\xef" and nonce[:4] not in self.RESERVED and nonce[4:4] != b"\x00" * 4: nonce[56] = nonce[57] = nonce[58] = nonce[59] = 0xef break temp = bytearray(nonce[55:7:-1]) self.encrypt = (nonce[8:40], nonce[40:56], bytearray(1)) self.decrypt = (temp[0:32], temp[32:48], bytearray(1)) nonce[56:64] = aes.ctr256_encrypt(nonce, *self.encrypt)[56:64] await super().send(nonce) async def send(self, data: bytes, *args): length = len(data) // 4 await super().send( aes.ctr256_encrypt( (bytes([length]) if length <= 126 else b"\x7f" + length.to_bytes(3, "little")) + data, *self.encrypt ) ) async def recv(self, length: int = 0) -> bytes or None: length = await super().recv(1) if length is None: return None length = aes.ctr256_decrypt(length, *self.decrypt) if length == b"\x7f": length = await super().recv(3) if length is None: return None length = aes.ctr256_decrypt(length, *self.decrypt) data = await super().recv(int.from_bytes(length, "little") * 4) if data is None: return None return aes.ctr256_decrypt(data, *self.decrypt)