You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
99 lines
2.6 KiB
99 lines
2.6 KiB
3 years ago
|
package crypto
|
||
|
|
||
|
import (
|
||
|
"crypto/sha1" // #nosec G505
|
||
|
|
||
|
"github.com/gotd/td/bin"
|
||
|
)
|
||
|
|
||
|
// sha1a returns sha1_a value.
|
||
|
//
|
||
|
// sha1_a = SHA1 (msg_key + substr (auth_key, x, 32));
|
||
|
func sha1a(r []byte, authKey Key, msgKey bin.Int128, x int) []byte {
|
||
|
h := sha1.New() // #nosec G401
|
||
|
|
||
|
_, _ = h.Write(msgKey[:])
|
||
|
_, _ = h.Write(authKey[x : x+32])
|
||
|
|
||
|
return h.Sum(r)
|
||
|
}
|
||
|
|
||
|
// sha1b returns sha1_b value.
|
||
|
//
|
||
|
// sha1_b = SHA1 (substr (auth_key, 32+x, 16) + msg_key + substr (auth_key, 48+x, 16));
|
||
|
func sha1b(r []byte, authKey Key, msgKey bin.Int128, x int) []byte {
|
||
|
h := sha1.New() // #nosec G401
|
||
|
|
||
|
_, _ = h.Write(authKey[32+x : 32+x+16])
|
||
|
_, _ = h.Write(msgKey[:])
|
||
|
_, _ = h.Write(authKey[48+x : 48+x+16])
|
||
|
|
||
|
return h.Sum(r)
|
||
|
}
|
||
|
|
||
|
// sha1c returns sha1_c value.
|
||
|
//
|
||
|
// sha1_c = SHA1 (substr (auth_key, 64+x, 32) + msg_key);
|
||
|
func sha1c(r []byte, authKey Key, msgKey bin.Int128, x int) []byte {
|
||
|
h := sha1.New() // #nosec G401
|
||
|
|
||
|
_, _ = h.Write(authKey[64+x : 64+x+32])
|
||
|
_, _ = h.Write(msgKey[:])
|
||
|
|
||
|
return h.Sum(r)
|
||
|
}
|
||
|
|
||
|
// sha1d returns sha1_d value.
|
||
|
//
|
||
|
// sha1_d = SHA1 (msg_key + substr (auth_key, 96+x, 32));
|
||
|
func sha1d(r []byte, authKey Key, msgKey bin.Int128, x int) []byte {
|
||
|
h := sha1.New() // #nosec G401
|
||
|
|
||
|
_, _ = h.Write(msgKey[:])
|
||
|
_, _ = h.Write(authKey[96+x : 96+x+32])
|
||
|
|
||
|
return h.Sum(r)
|
||
|
}
|
||
|
|
||
|
// OldKeys returns (aes_key, aes_iv) pair for AES-IGE.
|
||
|
//
|
||
|
// See https://core.telegram.org/mtproto/description_v1#defining-aes-key-and-initialization-vector
|
||
|
//
|
||
|
// Example:
|
||
|
// key, iv := crypto.OldKeys(authKey, messageKey, crypto.Client)
|
||
|
// cipher, err := aes.NewCipher(key[:])
|
||
|
// if err != nil {
|
||
|
// return nil, err
|
||
|
// }
|
||
|
// encryptor := ige.NewIGEEncrypter(cipher, iv[:])
|
||
|
//
|
||
|
// Warning: MTProto 1.0 is deprecated.
|
||
|
func OldKeys(authKey Key, msgKey bin.Int128, mode Side) (key, iv bin.Int256) {
|
||
|
x := getX(mode)
|
||
|
|
||
|
aesKey := func(sha1a, sha1b, sha1c []byte) (v bin.Int256) {
|
||
|
// aes_key = substr (sha1_a, 0, 8) + substr (sha1_b, 8, 12) + substr (sha1_c, 4, 12);
|
||
|
n := copy(v[:], sha1a[:8])
|
||
|
n += copy(v[n:], sha1b[8:8+12])
|
||
|
copy(v[n:], sha1c[4:4+12])
|
||
|
return v
|
||
|
}
|
||
|
aesIV := func(sha1a, sha1b, sha1c, sha1d []byte) (v bin.Int256) {
|
||
|
// aes_iv = substr(sha1_a, 8, 12) + substr(sha1_b, 0, 8) + substr(sha1_c, 16, 4) + substr(sha1_d, 0, 8);
|
||
|
n := copy(v[:], sha1a[8:8+12])
|
||
|
n += copy(v[n:], sha1b[:8])
|
||
|
n += copy(v[n:], sha1c[16:16+4])
|
||
|
copy(v[n:], sha1d[:8])
|
||
|
return v
|
||
|
}
|
||
|
|
||
|
r := make([]byte, sha1.Size*4)
|
||
|
|
||
|
a := sha1a(r[0:0], authKey, msgKey, x)
|
||
|
b := sha1b(r[sha1.Size:sha1.Size], authKey, msgKey, x)
|
||
|
c := sha1c(r[2*sha1.Size:2*sha1.Size], authKey, msgKey, x)
|
||
|
d := sha1d(r[3*sha1.Size:3*sha1.Size], authKey, msgKey, x)
|
||
|
|
||
|
return aesKey(a, b, c), aesIV(a, b, c, d)
|
||
|
}
|