You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
98 lines
2.6 KiB
98 lines
2.6 KiB
package crypto |
|
|
|
import ( |
|
"crypto/sha1" // #nosec G505 |
|
|
|
"github.com/gotd/td/bin" |
|
) |
|
|
|
// sha1a returns sha1_a value. |
|
// |
|
// sha1_a = SHA1 (msg_key + substr (auth_key, x, 32)); |
|
func sha1a(r []byte, authKey Key, msgKey bin.Int128, x int) []byte { |
|
h := sha1.New() // #nosec G401 |
|
|
|
_, _ = h.Write(msgKey[:]) |
|
_, _ = h.Write(authKey[x : x+32]) |
|
|
|
return h.Sum(r) |
|
} |
|
|
|
// sha1b returns sha1_b value. |
|
// |
|
// sha1_b = SHA1 (substr (auth_key, 32+x, 16) + msg_key + substr (auth_key, 48+x, 16)); |
|
func sha1b(r []byte, authKey Key, msgKey bin.Int128, x int) []byte { |
|
h := sha1.New() // #nosec G401 |
|
|
|
_, _ = h.Write(authKey[32+x : 32+x+16]) |
|
_, _ = h.Write(msgKey[:]) |
|
_, _ = h.Write(authKey[48+x : 48+x+16]) |
|
|
|
return h.Sum(r) |
|
} |
|
|
|
// sha1c returns sha1_c value. |
|
// |
|
// sha1_c = SHA1 (substr (auth_key, 64+x, 32) + msg_key); |
|
func sha1c(r []byte, authKey Key, msgKey bin.Int128, x int) []byte { |
|
h := sha1.New() // #nosec G401 |
|
|
|
_, _ = h.Write(authKey[64+x : 64+x+32]) |
|
_, _ = h.Write(msgKey[:]) |
|
|
|
return h.Sum(r) |
|
} |
|
|
|
// sha1d returns sha1_d value. |
|
// |
|
// sha1_d = SHA1 (msg_key + substr (auth_key, 96+x, 32)); |
|
func sha1d(r []byte, authKey Key, msgKey bin.Int128, x int) []byte { |
|
h := sha1.New() // #nosec G401 |
|
|
|
_, _ = h.Write(msgKey[:]) |
|
_, _ = h.Write(authKey[96+x : 96+x+32]) |
|
|
|
return h.Sum(r) |
|
} |
|
|
|
// OldKeys returns (aes_key, aes_iv) pair for AES-IGE. |
|
// |
|
// See https://core.telegram.org/mtproto/description_v1#defining-aes-key-and-initialization-vector |
|
// |
|
// Example: |
|
// key, iv := crypto.OldKeys(authKey, messageKey, crypto.Client) |
|
// cipher, err := aes.NewCipher(key[:]) |
|
// if err != nil { |
|
// return nil, err |
|
// } |
|
// encryptor := ige.NewIGEEncrypter(cipher, iv[:]) |
|
// |
|
// Warning: MTProto 1.0 is deprecated. |
|
func OldKeys(authKey Key, msgKey bin.Int128, mode Side) (key, iv bin.Int256) { |
|
x := getX(mode) |
|
|
|
aesKey := func(sha1a, sha1b, sha1c []byte) (v bin.Int256) { |
|
// aes_key = substr (sha1_a, 0, 8) + substr (sha1_b, 8, 12) + substr (sha1_c, 4, 12); |
|
n := copy(v[:], sha1a[:8]) |
|
n += copy(v[n:], sha1b[8:8+12]) |
|
copy(v[n:], sha1c[4:4+12]) |
|
return v |
|
} |
|
aesIV := func(sha1a, sha1b, sha1c, sha1d []byte) (v bin.Int256) { |
|
// aes_iv = substr(sha1_a, 8, 12) + substr(sha1_b, 0, 8) + substr(sha1_c, 16, 4) + substr(sha1_d, 0, 8); |
|
n := copy(v[:], sha1a[8:8+12]) |
|
n += copy(v[n:], sha1b[:8]) |
|
n += copy(v[n:], sha1c[16:16+4]) |
|
copy(v[n:], sha1d[:8]) |
|
return v |
|
} |
|
|
|
r := make([]byte, sha1.Size*4) |
|
|
|
a := sha1a(r[0:0], authKey, msgKey, x) |
|
b := sha1b(r[sha1.Size:sha1.Size], authKey, msgKey, x) |
|
c := sha1c(r[2*sha1.Size:2*sha1.Size], authKey, msgKey, x) |
|
d := sha1d(r[3*sha1.Size:3*sha1.Size], authKey, msgKey, x) |
|
|
|
return aesKey(a, b, c), aesIV(a, b, c, d) |
|
}
|
|
|