2018-12-31 20:04:05 +01:00
|
|
|
//
|
2018-12-31 23:02:34 +01:00
|
|
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2019
|
2018-12-31 20:04:05 +01:00
|
|
|
//
|
|
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
|
|
//
|
|
|
|
#include "td/mtproto/RawConnection.h"
|
|
|
|
|
|
|
|
#include "td/mtproto/AuthKey.h"
|
|
|
|
#include "td/mtproto/Transport.h"
|
|
|
|
|
|
|
|
#include "td/utils/format.h"
|
|
|
|
#include "td/utils/logging.h"
|
2018-06-26 01:43:11 +02:00
|
|
|
#include "td/utils/misc.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
#include "td/utils/Status.h"
|
2019-01-31 03:05:40 +01:00
|
|
|
#include "td/utils/StorerBase.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
#include <utility>
|
|
|
|
|
|
|
|
namespace td {
|
|
|
|
namespace mtproto {
|
|
|
|
|
|
|
|
void RawConnection::send_crypto(const Storer &storer, int64 session_id, int64 salt, const AuthKey &auth_key,
|
|
|
|
uint64 quick_ack_token) {
|
2019-01-31 03:05:40 +01:00
|
|
|
PacketInfo info;
|
2018-12-31 20:04:05 +01:00
|
|
|
info.version = 2;
|
|
|
|
info.no_crypto_flag = false;
|
|
|
|
info.salt = salt;
|
|
|
|
info.session_id = session_id;
|
|
|
|
|
2019-01-31 03:05:40 +01:00
|
|
|
auto packet = BufferWriter{Transport::write(storer, auth_key, &info), transport_->max_prepend_size(),
|
2018-06-15 20:54:22 +02:00
|
|
|
transport_->max_append_size()};
|
2019-01-31 03:05:40 +01:00
|
|
|
Transport::write(storer, auth_key, &info, packet.as_slice());
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
bool use_quick_ack = false;
|
|
|
|
if (quick_ack_token != 0 && transport_->support_quick_ack()) {
|
|
|
|
auto tmp = quick_ack_to_token_.insert(std::make_pair(info.message_ack, quick_ack_token));
|
|
|
|
if (tmp.second) {
|
|
|
|
use_quick_ack = true;
|
|
|
|
} else {
|
|
|
|
LOG(ERROR) << "quick_ack collision " << tag("quick_ack", info.message_ack);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
transport_->write(std::move(packet), use_quick_ack);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64 RawConnection::send_no_crypto(const Storer &storer) {
|
2019-01-31 03:05:40 +01:00
|
|
|
PacketInfo info;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
info.no_crypto_flag = true;
|
2019-01-31 03:05:40 +01:00
|
|
|
auto packet = BufferWriter{Transport::write(storer, AuthKey(), &info), transport_->max_prepend_size(),
|
|
|
|
transport_->max_append_size()};
|
|
|
|
Transport::write(storer, AuthKey(), &info, packet.as_slice());
|
2018-12-31 20:04:05 +01:00
|
|
|
LOG(INFO) << "Send handshake packet: " << format::as_hex_dump<4>(packet.as_slice());
|
|
|
|
transport_->write(std::move(packet), false);
|
|
|
|
return info.message_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
Status RawConnection::flush_read(const AuthKey &auth_key, Callback &callback) {
|
|
|
|
auto r = socket_fd_.flush_read();
|
2018-11-20 13:07:27 +01:00
|
|
|
if (r.is_ok()) {
|
|
|
|
if (stats_callback_) {
|
|
|
|
stats_callback_->on_read(r.ok());
|
|
|
|
}
|
|
|
|
callback.on_read(r.ok());
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
while (transport_->can_read()) {
|
|
|
|
BufferSlice packet;
|
|
|
|
uint32 quick_ack = 0;
|
|
|
|
TRY_RESULT(wait_size, transport_->read_next(&packet, &quick_ack));
|
2018-06-15 16:30:32 +02:00
|
|
|
if (!is_aligned_pointer<4>(packet.as_slice().ubegin())) {
|
|
|
|
BufferSlice new_packet(packet.size());
|
|
|
|
new_packet.as_slice().copy_from(packet.as_slice());
|
|
|
|
packet = std::move(new_packet);
|
|
|
|
}
|
2019-02-12 17:17:20 +01:00
|
|
|
LOG_CHECK(is_aligned_pointer<4>(packet.as_slice().ubegin()))
|
2018-10-25 14:49:30 +02:00
|
|
|
<< packet.as_slice().ubegin() << ' ' << packet.size() << ' ' << wait_size;
|
2018-12-31 20:04:05 +01:00
|
|
|
if (wait_size != 0) {
|
2018-11-20 13:07:27 +01:00
|
|
|
constexpr size_t MAX_PACKET_SIZE = (1 << 22) + 1024;
|
|
|
|
if (wait_size > MAX_PACKET_SIZE) {
|
|
|
|
return Status::Error(PSLICE() << "Expected packet size is too big: " << wait_size);
|
|
|
|
}
|
2018-12-31 20:04:05 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (quick_ack != 0) {
|
2018-06-17 19:52:40 +02:00
|
|
|
on_quick_ack(quick_ack, callback);
|
2018-12-31 20:04:05 +01:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
PacketInfo info;
|
|
|
|
info.version = 2;
|
|
|
|
|
2019-01-31 03:05:40 +01:00
|
|
|
TRY_RESULT(read_result, Transport::read(packet.as_slice(), auth_key, &info));
|
2018-06-17 19:52:40 +02:00
|
|
|
switch (read_result.type()) {
|
2019-01-31 03:05:40 +01:00
|
|
|
case Transport::ReadResult::Quickack: {
|
2018-06-17 19:52:40 +02:00
|
|
|
TRY_STATUS(on_quick_ack(read_result.quick_ack(), callback));
|
|
|
|
break;
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
2019-01-31 03:05:40 +01:00
|
|
|
case Transport::ReadResult::Error: {
|
2018-06-17 19:52:40 +02:00
|
|
|
TRY_STATUS(on_read_mtproto_error(read_result.error()));
|
|
|
|
break;
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
2019-01-31 03:05:40 +01:00
|
|
|
case Transport::ReadResult::Packet: {
|
2018-06-17 19:52:40 +02:00
|
|
|
// If a packet was successfully decrypted, then it is ok to assume that the connection is alive
|
|
|
|
if (!auth_key.empty()) {
|
|
|
|
if (stats_callback_) {
|
|
|
|
stats_callback_->on_pong();
|
|
|
|
}
|
|
|
|
}
|
2018-12-31 20:04:05 +01:00
|
|
|
|
2018-06-17 19:52:40 +02:00
|
|
|
TRY_STATUS(callback.on_raw_packet(info, packet.from_slice(read_result.packet())));
|
|
|
|
break;
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
2019-01-31 03:05:40 +01:00
|
|
|
case Transport::ReadResult::Nop:
|
2018-06-17 19:52:40 +02:00
|
|
|
break;
|
2018-09-05 20:07:50 +02:00
|
|
|
default:
|
|
|
|
UNREACHABLE();
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
}
|
2018-06-17 19:52:40 +02:00
|
|
|
|
2018-12-31 20:04:05 +01:00
|
|
|
TRY_STATUS(std::move(r));
|
|
|
|
return Status::OK();
|
|
|
|
}
|
|
|
|
|
2018-06-17 19:52:40 +02:00
|
|
|
Status RawConnection::on_read_mtproto_error(int32 error_code) {
|
|
|
|
if (error_code == -429) {
|
|
|
|
if (stats_callback_) {
|
|
|
|
stats_callback_->on_mtproto_error();
|
|
|
|
}
|
|
|
|
return Status::Error(500, PSLICE() << "Mtproto error: " << error_code);
|
|
|
|
}
|
|
|
|
if (error_code == -404) {
|
|
|
|
return Status::Error(-404, PSLICE() << "Mtproto error: " << error_code);
|
|
|
|
}
|
|
|
|
return Status::Error(PSLICE() << "Mtproto error: " << error_code);
|
|
|
|
}
|
|
|
|
|
|
|
|
Status RawConnection::on_quick_ack(uint32 quick_ack, Callback &callback) {
|
|
|
|
auto it = quick_ack_to_token_.find(quick_ack);
|
|
|
|
if (it == quick_ack_to_token_.end()) {
|
|
|
|
LOG(WARNING) << Status::Error(PSLICE() << "Unknown " << tag("quick_ack", quick_ack));
|
|
|
|
return Status::OK();
|
|
|
|
// TODO: return Status::Error(PSLICE() << "Unknown " << tag("quick_ack", quick_ack));
|
|
|
|
}
|
|
|
|
auto token = it->second;
|
|
|
|
quick_ack_to_token_.erase(it);
|
|
|
|
callback.on_quick_ack(token);
|
|
|
|
return Status::OK();
|
|
|
|
}
|
|
|
|
|
2018-12-31 20:04:05 +01:00
|
|
|
Status RawConnection::flush_write() {
|
|
|
|
TRY_RESULT(size, socket_fd_.flush_write());
|
|
|
|
if (size > 0 && stats_callback_) {
|
|
|
|
stats_callback_->on_write(size);
|
|
|
|
}
|
|
|
|
return Status::OK();
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace mtproto
|
|
|
|
} // namespace td
|