161 lines
4.2 KiB
C
161 lines
4.2 KiB
C
|
//
|
||
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2017
|
||
|
//
|
||
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
||
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
||
|
//
|
||
|
#pragma once
|
||
|
|
||
|
#include "td/utils/BigNum.h"
|
||
|
#include "td/utils/common.h"
|
||
|
#include "td/utils/Slice.h"
|
||
|
#include "td/utils/Status.h"
|
||
|
|
||
|
#include <utility>
|
||
|
|
||
|
namespace td {
|
||
|
|
||
|
/*** RSA ***/
|
||
|
class RSA {
|
||
|
public:
|
||
|
RSA clone() const;
|
||
|
int64 get_fingerprint() const;
|
||
|
size_t size() const;
|
||
|
size_t encrypt(unsigned char *from, size_t from_len, unsigned char *to) const;
|
||
|
|
||
|
void decrypt(Slice from, MutableSlice to) const;
|
||
|
|
||
|
static Result<RSA> from_pem(Slice pem);
|
||
|
|
||
|
private:
|
||
|
RSA(BigNum n, BigNum e);
|
||
|
BigNum n_;
|
||
|
BigNum e_;
|
||
|
};
|
||
|
|
||
|
/*** PublicRsaKeyInterface ***/
|
||
|
class PublicRsaKeyInterface {
|
||
|
public:
|
||
|
virtual ~PublicRsaKeyInterface() = default;
|
||
|
virtual Result<std::pair<RSA, int64>> get_rsa(const vector<int64> &fingerprints) = 0;
|
||
|
virtual void drop_keys() = 0;
|
||
|
};
|
||
|
|
||
|
/*** DH ***/
|
||
|
class DhCallback {
|
||
|
public:
|
||
|
DhCallback() = default;
|
||
|
DhCallback(const DhCallback &) = delete;
|
||
|
DhCallback &operator=(const DhCallback &) = delete;
|
||
|
DhCallback(DhCallback &&) = delete;
|
||
|
DhCallback &operator=(DhCallback &&) = delete;
|
||
|
virtual ~DhCallback() = default;
|
||
|
|
||
|
virtual int is_good_prime(Slice prime_str) const = 0;
|
||
|
virtual void add_good_prime(Slice prime_str) const = 0;
|
||
|
virtual void add_bad_prime(Slice prime_str) const = 0;
|
||
|
};
|
||
|
class DhHandshake {
|
||
|
public:
|
||
|
void set_config(int32 g_int, Slice prime_str);
|
||
|
|
||
|
bool has_config() const {
|
||
|
return has_config_;
|
||
|
}
|
||
|
void set_g_a_hash(Slice g_a_hash);
|
||
|
void set_g_a(Slice g_a_str);
|
||
|
bool has_g_a() const {
|
||
|
return has_g_a_;
|
||
|
}
|
||
|
string get_g_a() const;
|
||
|
string get_g_b() const;
|
||
|
string get_g_b_hash() const;
|
||
|
Status run_checks(DhCallback *callback) TD_WARN_UNUSED_RESULT;
|
||
|
|
||
|
std::pair<int64, string> gen_key();
|
||
|
|
||
|
static int64 calc_key_id(const string &auth_key);
|
||
|
|
||
|
enum Flags { HasConfig = 1, HasGA = 2 };
|
||
|
|
||
|
template <class StorerT>
|
||
|
void store(StorerT &storer) const {
|
||
|
auto flags = 0;
|
||
|
if (has_config_) {
|
||
|
flags |= HasConfig;
|
||
|
}
|
||
|
if (has_g_a_) {
|
||
|
flags |= HasGA;
|
||
|
}
|
||
|
storer.store_int(flags);
|
||
|
|
||
|
if (has_config_) {
|
||
|
// prime_, prime_str_, b_, g_, g_int_, g_b_
|
||
|
storer.store_string(prime_str_);
|
||
|
storer.store_string(b_.to_binary());
|
||
|
storer.store_int(g_int_);
|
||
|
storer.store_string(g_b_.to_binary());
|
||
|
}
|
||
|
if (has_g_a_) {
|
||
|
storer.store_string(g_a_.to_binary());
|
||
|
}
|
||
|
}
|
||
|
template <class ParserT>
|
||
|
void parse(ParserT &parser) {
|
||
|
auto flags = parser.fetch_int();
|
||
|
if (flags & HasConfig) {
|
||
|
has_config_ = true;
|
||
|
}
|
||
|
if (flags & HasGA) {
|
||
|
has_g_a_ = true;
|
||
|
}
|
||
|
if (has_config_) {
|
||
|
// prime_, prime_str_, b_, g_, g_int_, g_b_
|
||
|
prime_str_ = parser.template fetch_string<std::string>();
|
||
|
prime_ = BigNum::from_binary(prime_str_);
|
||
|
|
||
|
b_ = BigNum::from_binary(parser.template fetch_string<string>());
|
||
|
|
||
|
g_int_ = parser.fetch_int();
|
||
|
g_.set_value(g_int_);
|
||
|
|
||
|
g_b_ = BigNum::from_binary(parser.template fetch_string<string>());
|
||
|
}
|
||
|
if (has_g_a_) {
|
||
|
g_a_ = BigNum::from_binary(parser.template fetch_string<string>());
|
||
|
}
|
||
|
}
|
||
|
|
||
|
private:
|
||
|
static Status dh_check(Slice prime_str, const BigNum &prime, int32 g_int, const BigNum &g_a, const BigNum &g_b,
|
||
|
BigNumContext &ctx, DhCallback *callback) TD_WARN_UNUSED_RESULT;
|
||
|
|
||
|
string prime_str_;
|
||
|
BigNum prime_;
|
||
|
BigNum g_;
|
||
|
int32 g_int_;
|
||
|
BigNum b_;
|
||
|
BigNum g_b_;
|
||
|
BigNum g_a_;
|
||
|
|
||
|
string g_a_hash_;
|
||
|
bool has_g_a_hash_{false};
|
||
|
bool ok_g_a_hash_{false};
|
||
|
|
||
|
bool has_config_ = false;
|
||
|
bool has_g_a_ = false;
|
||
|
|
||
|
BigNumContext ctx_;
|
||
|
};
|
||
|
|
||
|
// TODO: remove this legacy functions
|
||
|
Status dh_handshake(int g_int, Slice prime_str, Slice g_a_str, string *g_b_str, string *g_ab_str,
|
||
|
DhCallback *callback) TD_WARN_UNUSED_RESULT;
|
||
|
int64 dh_auth_key_id(const string &auth_key);
|
||
|
|
||
|
/*** KDF ***/
|
||
|
void KDF(const string &auth_key, const UInt128 &msg_key, int X, UInt256 *aes_key, UInt256 *aes_iv);
|
||
|
void tmp_KDF(const UInt128 &server_nonce, const UInt256 &new_nonce, UInt256 *tmp_aes_key, UInt256 *tmp_aes_iv);
|
||
|
void KDF2(Slice auth_key, const UInt128 &msg_key, int X, UInt256 *aes_key, UInt256 *aes_iv);
|
||
|
} // namespace td
|