summaryrefslogtreecommitdiff
path: root/protocols/Telegram/src/tgl/queries-encrypted.c
diff options
context:
space:
mode:
Diffstat (limited to 'protocols/Telegram/src/tgl/queries-encrypted.c')
-rw-r--r--protocols/Telegram/src/tgl/queries-encrypted.c758
1 files changed, 758 insertions, 0 deletions
diff --git a/protocols/Telegram/src/tgl/queries-encrypted.c b/protocols/Telegram/src/tgl/queries-encrypted.c
new file mode 100644
index 0000000000..cdfea63029
--- /dev/null
+++ b/protocols/Telegram/src/tgl/queries-encrypted.c
@@ -0,0 +1,758 @@
+
+/* {{{ Encrypt decrypted */
+static int *encr_extra;
+static int *encr_ptr;
+static int *encr_end;
+
+static char *encrypt_decrypted_message (struct tgl_secret_chat *E) {
+ static int msg_key[4];
+ static unsigned char sha1a_buffer[20];
+ static unsigned char sha1b_buffer[20];
+ static unsigned char sha1c_buffer[20];
+ static unsigned char sha1d_buffer[20];
+ int x = *(encr_ptr);
+ assert (x >= 0 && !(x & 3));
+ sha1 ((void *)encr_ptr, 4 + x, sha1a_buffer);
+ memcpy (msg_key, sha1a_buffer + 4, 16);
+
+ static unsigned char buf[64];
+ memcpy (buf, msg_key, 16);
+ memcpy (buf + 16, E->key, 32);
+ sha1 (buf, 48, sha1a_buffer);
+
+ memcpy (buf, E->key + 8, 16);
+ memcpy (buf + 16, msg_key, 16);
+ memcpy (buf + 32, E->key + 12, 16);
+ sha1 (buf, 48, sha1b_buffer);
+
+ memcpy (buf, E->key + 16, 32);
+ memcpy (buf + 32, msg_key, 16);
+ sha1 (buf, 48, sha1c_buffer);
+
+ memcpy (buf, msg_key, 16);
+ memcpy (buf + 16, E->key + 24, 32);
+ sha1 (buf, 48, sha1d_buffer);
+
+ static unsigned char key[32];
+ memcpy (key, sha1a_buffer + 0, 8);
+ memcpy (key + 8, sha1b_buffer + 8, 12);
+ memcpy (key + 20, sha1c_buffer + 4, 12);
+
+ static unsigned char iv[32];
+ memcpy (iv, sha1a_buffer + 8, 12);
+ memcpy (iv + 12, sha1b_buffer + 0, 8);
+ memcpy (iv + 20, sha1c_buffer + 16, 4);
+ memcpy (iv + 24, sha1d_buffer + 0, 8);
+
+ AES_KEY aes_key;
+ AES_set_encrypt_key (key, 256, &aes_key);
+ AES_ige_encrypt ((void *)encr_ptr, (void *)encr_ptr, 4 * (encr_end - encr_ptr), &aes_key, iv, 1);
+ memset (&aes_key, 0, sizeof (aes_key));
+
+ return (void *)msg_key;
+}
+
+static void encr_start (void) {
+ encr_extra = packet_ptr;
+ packet_ptr += 1; // str len
+ packet_ptr += 2; // fingerprint
+ packet_ptr += 4; // msg_key
+ packet_ptr += 1; // len
+}
+
+
+static void encr_finish (struct tgl_secret_chat *E) {
+ int l = packet_ptr - (encr_extra + 8);
+ while (((packet_ptr - encr_extra) - 3) & 3) {
+ int t;
+ tglt_secure_random (&t, 4);
+ out_int (t);
+ }
+
+ *encr_extra = ((packet_ptr - encr_extra) - 1) * 4 * 256 + 0xfe;
+ encr_extra ++;
+ *(long long *)encr_extra = E->key_fingerprint;
+ encr_extra += 2;
+ encr_extra[4] = l * 4;
+ encr_ptr = encr_extra + 4;
+ encr_end = packet_ptr;
+ memcpy (encr_extra, encrypt_decrypted_message (E), 16);
+}
+/* }}} */
+
+void tgl_do_send_encr_action (struct tgl_state *TLS, struct tgl_secret_chat *E, struct tl_ds_decrypted_message_action *A) {
+ long long t;
+ tglt_secure_random (&t, 8);
+ int peer_id = tgl_get_peer_id (E->id);
+ int peer_type = TGL_PEER_ENCR_CHAT;
+ int date = time (0);
+
+ bl_do_create_message_encr_new (TLS, t, &TLS->our_id, &peer_type, &peer_id, &date, NULL, 0, NULL, A, NULL, TGLMF_PENDING | TGLMF_OUT | TGLMF_UNREAD | TGLMF_CREATE | TGLMF_CREATED | TGLMF_ENCRYPTED);
+
+ struct tgl_message *M = tgl_message_get (TLS, t);
+ assert (M);
+ tgl_do_send_msg (TLS, M, 0, 0);
+}
+
+void tgl_do_send_encr_chat_layer (struct tgl_state *TLS, struct tgl_secret_chat *E) {
+ static struct tl_ds_decrypted_message_action A;
+ A.magic = CODE_decrypted_message_action_notify_layer;
+ int layer = TGL_ENCRYPTED_LAYER;
+ A.layer = &layer;
+
+ tgl_do_send_encr_action (TLS, E, &A);
+}
+
+void tgl_do_set_encr_chat_ttl (struct tgl_state *TLS, struct tgl_secret_chat *E, int ttl, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_message *M), void *callback_extra) {
+ static struct tl_ds_decrypted_message_action A;
+ A.magic = CODE_decrypted_message_action_set_message_t_t_l;
+ A.layer = &ttl;
+
+ tgl_do_send_encr_action (TLS, E, &A);
+}
+
+
+/* {{{ Seng msg (plain text, encrypted) */
+static int msg_send_encr_on_answer (struct tgl_state *TLS, struct query *q, void *D) {
+ struct tgl_message *M = q->extra;
+ assert (M->flags & TGLMF_ENCRYPTED);
+
+ if (M->flags & TGLMF_PENDING) {
+ bl_do_create_message_encr_new (TLS, M->id, NULL, NULL, NULL,
+ &M->date,
+ NULL, 0, NULL, NULL, NULL, M->flags ^ TGLMF_PENDING);
+
+ bl_do_msg_update (TLS, M->id);
+ }
+
+ if (q->callback) {
+ ((void (*)(struct tgl_state *TLS, void *, int, struct tgl_message *))q->callback) (TLS, q->callback_extra, 1, M);
+ }
+ return 0;
+}
+
+static int msg_send_encr_on_error (struct tgl_state *TLS, struct query *q, int error_code, int error_len, const char *error) {
+ struct tgl_message *M = q->extra;
+ tgl_peer_t *P = tgl_peer_get (TLS, M->to_id);
+ if (P && P->encr_chat.state != sc_deleted && error_code == 400) {
+ if (strncmp (error, "ENCRYPTION_DECLINED", 19) == 0) {
+ bl_do_encr_chat_delete (TLS, &P->encr_chat);
+ }
+ }
+ if (q->callback) {
+ ((void (*)(struct tgl_state *TLS, void *, int, struct tgl_message *))q->callback) (TLS, q->callback_extra, 0, M);
+ }
+ if (M) {
+ bl_do_message_delete (TLS, M);
+ }
+ return 0;
+}
+
+static struct query_methods msg_send_encr_methods = {
+ .on_answer = msg_send_encr_on_answer,
+ .on_error = msg_send_encr_on_error,
+ .type = TYPE_TO_PARAM(messages_sent_encrypted_message)
+};
+/* }}} */
+
+void tgl_do_send_encr_msg_action (struct tgl_state *TLS, struct tgl_message *M, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_message *M), void *callback_extra) {
+ tgl_peer_t *P = tgl_peer_get (TLS, M->to_id);
+ if (!P || P->encr_chat.state != sc_ok) {
+ vlogprintf (E_WARNING, "Unknown encrypted chat\n");
+ if (callback) {
+ callback (TLS, callback_extra, 0, 0);
+ }
+ return;
+ }
+
+ assert (M->flags & TGLMF_ENCRYPTED);
+ clear_packet ();
+ out_int (CODE_messages_send_encrypted_service);
+ out_int (CODE_input_encrypted_chat);
+ out_int (tgl_get_peer_id (M->to_id));
+ out_long (P->encr_chat.access_hash);
+ out_long (M->id);
+ encr_start ();
+ out_int (CODE_decrypted_message_layer);
+ out_random (15 + 4 * (lrand48 () % 3));
+ out_int (TGL_ENCRYPTED_LAYER);
+ out_int (2 * P->encr_chat.in_seq_no + (P->encr_chat.admin_id != TLS->our_id));
+ out_int (2 * P->encr_chat.out_seq_no + (P->encr_chat.admin_id == TLS->our_id) - 2);
+ out_int (CODE_decrypted_message_service);
+ out_long (M->id);
+
+ switch (M->action.type) {
+ case tgl_message_action_notify_layer:
+ out_int (CODE_decrypted_message_action_notify_layer);
+ out_int (M->action.layer);
+ break;
+ case tgl_message_action_set_message_ttl:
+ out_int (CODE_decrypted_message_action_set_message_t_t_l);
+ out_int (M->action.ttl);
+ break;
+ case tgl_message_action_request_key:
+ out_int (CODE_decrypted_message_action_request_key);
+ out_long (M->action.exchange_id);
+ out_cstring ((void *)M->action.g_a, 256);
+ break;
+ case tgl_message_action_accept_key:
+ out_int (CODE_decrypted_message_action_accept_key);
+ out_long (M->action.exchange_id);
+ out_cstring ((void *)M->action.g_a, 256);
+ out_long (M->action.key_fingerprint);
+ break;
+ case tgl_message_action_commit_key:
+ out_int (CODE_decrypted_message_action_commit_key);
+ out_long (M->action.exchange_id);
+ out_long (M->action.key_fingerprint);
+ break;
+ case tgl_message_action_abort_key:
+ out_int (CODE_decrypted_message_action_abort_key);
+ out_long (M->action.exchange_id);
+ break;
+ case tgl_message_action_noop:
+ out_int (CODE_decrypted_message_action_noop);
+ break;
+ default:
+ assert (0);
+ }
+ encr_finish (&P->encr_chat);
+
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &msg_send_encr_methods, M, callback, callback_extra);
+}
+
+void tgl_do_send_encr_msg (struct tgl_state *TLS, struct tgl_message *M, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_message *M), void *callback_extra) {
+ if (M->flags & TGLMF_SERVICE) {
+ tgl_do_send_encr_msg_action (TLS, M, callback, callback_extra);
+ return;
+ }
+ tgl_peer_t *P = tgl_peer_get (TLS, M->to_id);
+ if (!P || P->encr_chat.state != sc_ok) {
+ vlogprintf (E_WARNING, "Unknown encrypted chat\n");
+ if (callback) {
+ callback (TLS, callback_extra, 0, M);
+ }
+ return;
+ }
+
+ assert (M->flags & TGLMF_ENCRYPTED);
+
+ clear_packet ();
+ out_int (CODE_messages_send_encrypted);
+ out_int (CODE_input_encrypted_chat);
+ out_int (tgl_get_peer_id (M->to_id));
+ out_long (P->encr_chat.access_hash);
+ out_long (M->id);
+ encr_start ();
+ out_int (CODE_decrypted_message_layer);
+ out_random (15 + 4 * (lrand48 () % 3));
+ out_int (TGL_ENCRYPTED_LAYER);
+ out_int (2 * P->encr_chat.in_seq_no + (P->encr_chat.admin_id != TLS->our_id));
+ out_int (2 * P->encr_chat.out_seq_no + (P->encr_chat.admin_id == TLS->our_id) - 2);
+ out_int (CODE_decrypted_message);
+ out_long (M->id);
+ out_int (P->encr_chat.ttl);
+ out_cstring ((void *)M->message, M->message_len);
+ switch (M->media.type) {
+ case tgl_message_media_none:
+ out_int (CODE_decrypted_message_media_empty);
+ break;
+ case tgl_message_media_geo:
+ out_int (CODE_decrypted_message_media_geo_point);
+ out_double (M->media.geo.latitude);
+ out_double (M->media.geo.longitude);
+ break;
+ default:
+ assert (0);
+ }
+ encr_finish (&P->encr_chat);
+
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &msg_send_encr_methods, M, callback, callback_extra);
+}
+
+static int mark_read_encr_on_receive (struct tgl_state *TLS, struct query *q, void *D) {
+ if (q->callback) {
+ ((void (*)(struct tgl_state *, void *, int))q->callback)(TLS, q->callback_extra, 1);
+ }
+ return 0;
+}
+
+static int mark_read_encr_on_error (struct tgl_state *TLS, struct query *q, int error_code, int error_len, const char *error) {
+ tgl_peer_t *P = q->extra;
+ if (P && P->encr_chat.state != sc_deleted && error_code == 400) {
+ if (strncmp (error, "ENCRYPTION_DECLINED", 19) == 0) {
+ bl_do_encr_chat_delete(TLS, &P->encr_chat);
+ }
+ }
+ return 0;
+}
+
+static struct query_methods mark_read_encr_methods = {
+ .on_answer = mark_read_encr_on_receive,
+ .on_error = mark_read_encr_on_error,
+ .type = TYPE_TO_PARAM(bool)
+};
+
+void tgl_do_messages_mark_read_encr (struct tgl_state *TLS, tgl_peer_id_t id, long long access_hash, int last_time, void (*callback)(struct tgl_state *TLS, void *callback_extra, int), void *callback_extra) {
+ clear_packet ();
+ out_int (CODE_messages_read_encrypted_history);
+ out_int (CODE_input_encrypted_chat);
+ out_int (tgl_get_peer_id (id));
+ out_long (access_hash);
+ out_int (last_time);
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &mark_read_encr_methods, tgl_peer_get (TLS, id), callback, callback_extra);
+}
+
+static int send_encr_file_on_answer (struct tgl_state *TLS, struct query *q, void *D) {
+ struct tl_ds_messages_sent_encrypted_message *DS_MSEM = D;
+ struct tgl_message *M = q->extra;
+
+ if (M->flags & TGLMF_PENDING) {
+ bl_do_create_message_encr_new (TLS, M->id, NULL, NULL, NULL, DS_MSEM->date,
+ NULL, 0, NULL, NULL, DS_MSEM->file, M->flags ^ TGLMF_PENDING);
+ bl_do_msg_update (TLS, M->id);
+ }
+
+ if (q->callback) {
+ ((void (*)(struct tgl_state *, void *, int, struct tgl_message *))q->callback)(TLS, q->callback_extra, 1, M);
+ }
+ return 0;
+}
+
+static struct query_methods send_encr_file_methods = {
+ .on_answer = send_encr_file_on_answer,
+ .on_error = msg_send_encr_on_error,
+ .type = TYPE_TO_PARAM(messages_sent_encrypted_message)
+};
+
+static void send_file_encrypted_end (struct tgl_state *TLS, struct send_file *f, void *callback, void *callback_extra) {
+ out_int (CODE_messages_send_encrypted_file);
+ out_int (CODE_input_encrypted_chat);
+ out_int (tgl_get_peer_id (f->to_id));
+ tgl_peer_t *P = tgl_peer_get (TLS, f->to_id);
+ assert (P);
+ out_long (P->encr_chat.access_hash);
+ long long r;
+ tglt_secure_random (&r, 8);
+ out_long (r);
+ encr_start ();
+ out_int (CODE_decrypted_message_layer);
+ out_random (15 + 4 * (lrand48 () % 3));
+ out_int (TGL_ENCRYPTED_LAYER);
+ out_int (2 * P->encr_chat.in_seq_no + (P->encr_chat.admin_id != TLS->our_id));
+ out_int (2 * P->encr_chat.out_seq_no + (P->encr_chat.admin_id == TLS->our_id));
+ out_int (CODE_decrypted_message);
+ out_long (r);
+ out_int (P->encr_chat.ttl);
+ out_string ("");
+ int *save_ptr = packet_ptr;
+ if (f->flags == -1) {
+ out_int (CODE_decrypted_message_media_photo);
+ } else if ((f->flags & TGLDF_VIDEO)) {
+ out_int (CODE_decrypted_message_media_video);
+ } else if ((f->flags & TGLDF_AUDIO)) {
+ out_int (CODE_decrypted_message_media_audio);
+ } else {
+ out_int (CODE_decrypted_message_media_document);
+ }
+ if (f->flags == -1 || !(f->flags & TGLDF_AUDIO)) {
+ out_cstring ("", 0);
+ out_int (90);
+ out_int (90);
+ }
+
+ if (f->flags == -1) {
+ out_int (f->w);
+ out_int (f->h);
+ } else if (f->flags & TGLDF_VIDEO) {
+ out_int (f->duration);
+ out_string (tg_mime_by_filename (f->file_name));
+ out_int (f->w);
+ out_int (f->h);
+ } else if (f->flags & TGLDF_AUDIO) {
+ out_int (f->duration);
+ out_string (tg_mime_by_filename (f->file_name));
+ } else {
+ out_string ("");
+ out_string (tg_mime_by_filename (f->file_name));
+ // document
+ }
+
+ out_int (f->size);
+ out_cstring ((void *)f->key, 32);
+ out_cstring ((void *)f->init_iv, 32);
+
+ int *save_in_ptr = in_ptr;
+ int *save_in_end = in_end;
+
+ in_ptr = save_ptr;
+ in_end = packet_ptr;
+
+ assert (skip_type_any (TYPE_TO_PARAM(decrypted_message_media)) >= 0);
+ assert (in_ptr == in_end);
+
+ in_ptr = save_ptr;
+ in_end = packet_ptr;
+
+ struct tl_ds_decrypted_message_media *DS_DMM = fetch_ds_type_decrypted_message_media (TYPE_TO_PARAM (decrypted_message_media));
+ in_end = save_in_ptr;
+ in_ptr = save_in_end;
+
+
+ int peer_type = tgl_get_peer_type (f->to_id);
+ int peer_id = tgl_get_peer_id (f->to_id);
+ int date = time (NULL);
+
+
+ encr_finish (&P->encr_chat);
+ if (f->size < (16 << 20)) {
+ out_int (CODE_input_encrypted_file_uploaded);
+ } else {
+ out_int (CODE_input_encrypted_file_big_uploaded);
+ }
+ out_long (f->id);
+ out_int (f->part_num);
+ if (f->size < (16 << 20)) {
+ out_string ("");
+ }
+
+ unsigned char md5[16];
+ unsigned char str[64];
+ memcpy (str, f->key, 32);
+ memcpy (str + 32, f->init_iv, 32);
+ MD5 (str, 64, md5);
+ out_int ((*(int *)md5) ^ (*(int *)(md5 + 4)));
+
+ tfree_secure (f->iv, 32);
+
+ bl_do_create_message_encr_new (TLS, r, &TLS->our_id, &peer_type, &peer_id, &date, NULL, 0, DS_DMM, NULL, NULL, TGLMF_OUT | TGLMF_UNREAD | TGLMF_ENCRYPTED | TGLMF_CREATE | TGLMF_CREATED);
+
+ free_ds_type_decrypted_message_media (DS_DMM, TYPE_TO_PARAM (decrypted_message_media));
+ struct tgl_message *M = tgl_message_get (TLS, r);
+ assert (M);
+
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &send_encr_file_methods, M, callback, callback_extra);
+
+ tfree_str (f->file_name);
+ tfree (f, sizeof (*f));
+
+}
+
+void tgl_do_send_location_encr (struct tgl_state *TLS, tgl_peer_id_t id, double latitude, double longitude, unsigned long long flags, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_message *M), void *callback_extra) {
+ struct tl_ds_decrypted_message_media TDSM;
+ TDSM.magic = CODE_decrypted_message_media_geo_point;
+ TDSM.latitude = talloc (sizeof (double));
+ *TDSM.latitude = latitude;
+ TDSM.longitude = talloc (sizeof (double));
+ *TDSM.longitude = longitude;
+
+ int peer_type = tgl_get_peer_type (id);
+ int peer_id = tgl_get_peer_id (id);
+ int date = time (0);
+
+ long long t;
+ tglt_secure_random (&t, 8);
+
+ bl_do_create_message_encr_new (TLS, t, &TLS->our_id, &peer_type, &peer_id, &date, NULL, 0, &TDSM, NULL, NULL, TGLMF_UNREAD | TGLMF_OUT | TGLMF_PENDING | TGLMF_CREATE | TGLMF_CREATED | TGLMF_ENCRYPTED);
+
+ tfree (TDSM.latitude, sizeof (double));
+ tfree (TDSM.longitude, sizeof (double));
+
+ struct tgl_message *M = tgl_message_get (TLS, t);
+
+ tgl_do_send_encr_msg (TLS, M, callback, callback_extra);
+}
+
+/* {{{ Encr accept */
+static int send_encr_accept_on_answer (struct tgl_state *TLS, struct query *q, void *D) {
+ struct tgl_secret_chat *E = tglf_fetch_alloc_encrypted_chat_new (TLS, D);
+
+ if (E->state == sc_ok) {
+ tgl_do_send_encr_chat_layer (TLS, E);
+ }
+ if (q->callback) {
+ ((void (*)(struct tgl_state *, void *, int, struct tgl_secret_chat *))q->callback) (TLS, q->callback_extra, E->state == sc_ok, E);
+ }
+ return 0;
+}
+
+static int send_encr_request_on_answer (struct tgl_state *TLS, struct query *q, void *D) {
+ struct tgl_secret_chat *E = tglf_fetch_alloc_encrypted_chat_new (TLS, D);
+
+ if (q->callback) {
+ ((void (*)(struct tgl_state *, void *, int, struct tgl_secret_chat *))q->callback) (TLS, q->callback_extra, E->state != sc_deleted, E);
+ }
+ return 0;
+}
+
+static int encr_accept_on_error (struct tgl_state *TLS, struct query *q, int error_code, int error_len, const char *error) {
+ tgl_peer_t *P = q->extra;
+ if (P && P->encr_chat.state != sc_deleted && error_code == 400) {
+ if (strncmp (error, "ENCRYPTION_DECLINED", 19) == 0) {
+ bl_do_encr_chat_delete(TLS, &P->encr_chat);
+ }
+ }
+ if (q->callback) {
+ ((void (*)(struct tgl_state *, void *, int, struct tgl_secret_chat *))q->callback) (TLS, q->callback_extra, 0, NULL);
+ }
+ return 0;
+}
+
+static struct query_methods send_encr_accept_methods = {
+ .on_answer = send_encr_accept_on_answer,
+ .on_error = encr_accept_on_error,
+ .type = TYPE_TO_PARAM(encrypted_chat)
+};
+
+static struct query_methods send_encr_request_methods = {
+ .on_answer = send_encr_request_on_answer,
+ .on_error = q_ptr_on_error,
+ .type = TYPE_TO_PARAM(encrypted_chat)
+};
+
+//int encr_root;
+//unsigned char *encr_prime;
+//int encr_param_version;
+//static BN_CTX *ctx;
+
+void tgl_do_send_accept_encr_chat (struct tgl_state *TLS, struct tgl_secret_chat *E, unsigned char *random, void (*callback)(struct tgl_state *TLS,void *callback_extra, int success, struct tgl_secret_chat *E), void *callback_extra) {
+ int i;
+ int ok = 0;
+ for (i = 0; i < 64; i++) {
+ if (E->key[i]) {
+ ok = 1;
+ break;
+ }
+ }
+ if (ok) {
+ if (callback) {
+ callback (TLS, callback_extra, 1, E);
+ }
+ return;
+ } // Already generated key for this chat
+ assert (E->g_key);
+ assert (TLS->BN_ctx);
+ unsigned char random_here[256];
+ tglt_secure_random (random_here, 256);
+ for (i = 0; i < 256; i++) {
+ random[i] ^= random_here[i];
+ }
+ BIGNUM *b = BN_bin2bn (random, 256, 0);
+ ensure_ptr (b);
+ BIGNUM *g_a = BN_bin2bn (E->g_key, 256, 0);
+ ensure_ptr (g_a);
+ assert (tglmp_check_g_a (TLS, TLS->encr_prime_bn, g_a) >= 0);
+ //if (!ctx) {
+ // ctx = BN_CTX_new ();
+ // ensure_ptr (ctx);
+ //}
+ BIGNUM *p = TLS->encr_prime_bn;
+ BIGNUM *r = BN_new ();
+ ensure_ptr (r);
+ ensure (BN_mod_exp (r, g_a, b, p, TLS->BN_ctx));
+ static unsigned char kk[256];
+ memset (kk, 0, sizeof (kk));
+ BN_bn2bin (r, kk + (256 - BN_num_bytes (r)));
+ static unsigned char sha_buffer[20];
+ sha1 (kk, 256, sha_buffer);
+
+ long long fingerprint = *(long long *)(sha_buffer + 12);
+
+ //bl_do_encr_chat_set_key (TLS, E, kk, *(long long *)(sha_buffer + 12));
+ //bl_do_encr_chat_set_sha (TLS, E, sha_buffer);
+
+ int state = sc_ok;
+
+ bl_do_encr_chat_new (TLS, tgl_get_peer_id (E->id),
+ NULL, NULL, NULL, NULL,
+ kk, NULL, sha_buffer, &state,
+ NULL, NULL, NULL, NULL, NULL,
+ &fingerprint,
+ TGL_FLAGS_UNCHANGED
+ );
+
+ clear_packet ();
+ out_int (CODE_messages_accept_encryption);
+ out_int (CODE_input_encrypted_chat);
+ out_int (tgl_get_peer_id (E->id));
+ out_long (E->access_hash);
+
+ ensure (BN_set_word (g_a, TLS->encr_root));
+ ensure (BN_mod_exp (r, g_a, b, p, TLS->BN_ctx));
+ static unsigned char buf[256];
+ memset (buf, 0, sizeof (buf));
+ BN_bn2bin (r, buf + (256 - BN_num_bytes (r)));
+ out_cstring ((void *)buf, 256);
+
+ out_long (E->key_fingerprint);
+ BN_clear_free (b);
+ BN_clear_free (g_a);
+ BN_clear_free (r);
+
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &send_encr_accept_methods, E, callback, callback_extra);
+}
+
+void tgl_do_create_keys_end (struct tgl_state *TLS, struct tgl_secret_chat *U) {
+ assert (TLS->encr_prime);
+ BIGNUM *g_b = BN_bin2bn (U->g_key, 256, 0);
+ ensure_ptr (g_b);
+ assert (tglmp_check_g_a (TLS, TLS->encr_prime_bn, g_b) >= 0);
+
+ BIGNUM *p = TLS->encr_prime_bn;
+ ensure_ptr (p);
+ BIGNUM *r = BN_new ();
+ ensure_ptr (r);
+ BIGNUM *a = BN_bin2bn ((void *)U->key, 256, 0);
+ ensure_ptr (a);
+ ensure (BN_mod_exp (r, g_b, a, p, TLS->BN_ctx));
+
+ unsigned char *t = talloc (256);
+ memcpy (t, U->key, 256);
+
+ memset (U->key, 0, sizeof (U->key));
+ BN_bn2bin (r, (void *)(((char *)(U->key)) + (256 - BN_num_bytes (r))));
+
+ static unsigned char sha_buffer[20];
+ sha1 ((void *)U->key, 256, sha_buffer);
+ long long k = *(long long *)(sha_buffer + 12);
+ if (k != U->key_fingerprint) {
+ vlogprintf (E_WARNING, "Key fingerprint mismatch (my 0x%llx 0x%llx)\n", (unsigned long long)k, (unsigned long long)U->key_fingerprint);
+ U->state = sc_deleted;
+ }
+
+ memcpy (U->first_key_sha, sha_buffer, 20);
+ tfree_secure (t, 256);
+
+ BN_clear_free (g_b);
+ BN_clear_free (r);
+ BN_clear_free (a);
+}
+
+void tgl_do_send_create_encr_chat (struct tgl_state *TLS, void *x, unsigned char *random, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_secret_chat *E), void *callback_extra) {
+ int user_id = (long)x;
+ int i;
+ unsigned char random_here[256];
+ tglt_secure_random (random_here, 256);
+ for (i = 0; i < 256; i++) {
+ random[i] ^= random_here[i];
+ }
+ BIGNUM *a = BN_bin2bn (random, 256, 0);
+ ensure_ptr (a);
+ BIGNUM *p = BN_bin2bn (TLS->encr_prime, 256, 0);
+ ensure_ptr (p);
+
+ BIGNUM *g = BN_new ();
+ ensure_ptr (g);
+
+ ensure (BN_set_word (g, TLS->encr_root));
+
+ BIGNUM *r = BN_new ();
+ ensure_ptr (r);
+
+ ensure (BN_mod_exp (r, g, a, p, TLS->BN_ctx));
+
+ BN_clear_free (a);
+
+ static char g_a[256];
+ memset (g_a, 0, 256);
+
+ BN_bn2bin (r, (void *)(g_a + (256 - BN_num_bytes (r))));
+
+ int t = lrand48 ();
+ while (tgl_peer_get (TLS, TGL_MK_ENCR_CHAT (t))) {
+ t = lrand48 ();
+ }
+
+ //bl_do_encr_chat_init (TLS, t, user_id, (void *)random, (void *)g_a);
+
+ int state = sc_waiting;
+ bl_do_encr_chat_new (TLS, t, NULL, NULL, &TLS->our_id, &user_id, random, NULL, NULL, &state, NULL, NULL, NULL, NULL, NULL, NULL, TGLPF_CREATE | TGLPF_CREATED);
+
+
+ tgl_peer_t *_E = tgl_peer_get (TLS, TGL_MK_ENCR_CHAT (t));
+ assert (_E);
+ struct tgl_secret_chat *E = &_E->encr_chat;
+
+ clear_packet ();
+ out_int (CODE_messages_request_encryption);
+ tgl_peer_t *U = tgl_peer_get (TLS, TGL_MK_USER (E->user_id));
+ assert (U);
+ if (U && U->user.access_hash) {
+ out_int (CODE_input_user_foreign);
+ out_int (E->user_id);
+ out_long (U->user.access_hash);
+ } else {
+ out_int (CODE_input_user_contact);
+ out_int (E->user_id);
+ }
+ out_int (tgl_get_peer_id (E->id));
+ out_cstring (g_a, 256);
+ //write_secret_chat_file ();
+
+ BN_clear_free (g);
+ BN_clear_free (p);
+ BN_clear_free (r);
+
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &send_encr_request_methods, E, callback, callback_extra);
+}
+
+static int get_dh_config_on_answer (struct tgl_state *TLS, struct query *q, void *D) {
+ struct tl_ds_messages_dh_config *DS_MDC = D;
+
+ if (DS_MDC->magic == CODE_messages_dh_config) {
+ assert (DS_MDC->p->len == 256);
+ bl_do_set_dh_params (TLS, DS_LVAL (DS_MDC->g), (void *)DS_MDC->p->data, DS_LVAL (DS_MDC->version));
+ } else {
+ assert (TLS->encr_param_version);
+ }
+ unsigned char *random = talloc (256);
+ assert (DS_MDC->random->len == 256);
+ memcpy (random, DS_MDC->random->data, 256);
+
+ if (q->extra) {
+ void **x = q->extra;
+ ((void (*)(struct tgl_state *, void *, void *, void *, void *))(*x))(TLS, x[1], random, q->callback, q->callback_extra);
+ tfree (x, 2 * sizeof (void *));
+ tfree_secure (random, 256);
+ } else {
+ tfree_secure (random, 256);
+ }
+ return 0;
+}
+
+static struct query_methods get_dh_config_methods = {
+ .on_answer = get_dh_config_on_answer,
+ .on_error = q_void_on_error,
+ .type = TYPE_TO_PARAM(messages_dh_config)
+};
+
+void tgl_do_accept_encr_chat_request (struct tgl_state *TLS, struct tgl_secret_chat *E, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_secret_chat *E), void *callback_extra) {
+ if (E->state != sc_request) {
+ if (callback) {
+ callback (TLS, callback_extra, 0, E);
+ }
+ return;
+ }
+ assert (E->state == sc_request);
+
+ clear_packet ();
+ out_int (CODE_messages_get_dh_config);
+ out_int (TLS->encr_param_version);
+ out_int (256);
+ void **x = talloc (2 * sizeof (void *));
+ x[0] = tgl_do_send_accept_encr_chat;
+ x[1] = E;
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &get_dh_config_methods, x, callback, callback_extra);
+}
+
+void tgl_do_create_encr_chat_request (struct tgl_state *TLS, int user_id, void (*callback)(struct tgl_state *TLS, void *callback_extra, int success, struct tgl_secret_chat *E), void *callback_extra) {
+ clear_packet ();
+ out_int (CODE_messages_get_dh_config);
+ out_int (TLS->encr_param_version);
+ out_int (256);
+ void **x = talloc (2 * sizeof (void *));
+ x[0] = tgl_do_send_create_encr_chat;
+ x[1] = (void *)(long)(user_id);
+ tglq_send_query (TLS, TLS->DC_working, packet_ptr - packet_buffer, packet_buffer, &get_dh_config_methods, x, callback, callback_extra);
+}
+/* }}} */