Kaynağa Gözat

Make crypt testable

tags/0.9
9seconds 7 yıl önce
ebeveyn
işleme
ffa7ef7a0a
3 değiştirilmiş dosya ile 65 ekleme ve 16 silme
  1. 18
    14
      mtproto/wrappers/crypt.go
  2. 45
    0
      mtproto/wrappers/crypt_test.go
  3. 2
    2
      telegram/middle.go

+ 18
- 14
mtproto/wrappers/crypt.go Dosyayı Görüntüle

@@ -25,14 +25,17 @@ var emptyIP = [4]byte{0x00, 0x00, 0x00, 0x00}
25 25
 func NewMiddleProxyCipherRWC(conn wrappers.ReadWriteCloserWithAddr, req *rpc.RPCNonceRequest,
26 26
 	resp *rpc.RPCNonceResponse, client *net.TCPAddr, secret []byte) wrappers.ReadWriteCloserWithAddr {
27 27
 	remote := conn.Addr()
28
-	encryptor, _ := newCBCCipher(CipherPurposeClient, req, resp, client, remote, secret)
29
-	_, decryptor := newCBCCipher(CipherPurposeServer, req, resp, client, remote, secret)
28
+	encKey, encIV := makeKeys(CipherPurposeClient, req, resp, client, remote, secret)
29
+	decKey, decIV := makeKeys(CipherPurposeServer, req, resp, client, remote, secret)
30 30
 
31
-	return wrappers.NewBlockCipherRWC(conn, encryptor, decryptor)
31
+	enc, _ := makeEncrypterDecrypter(encKey, encIV)
32
+	_, dec := makeEncrypterDecrypter(decKey, decIV)
33
+
34
+	return wrappers.NewBlockCipherRWC(conn, enc, dec)
32 35
 }
33 36
 
34
-func newCBCCipher(purpose CipherPurpose, req *rpc.RPCNonceRequest, resp *rpc.RPCNonceResponse,
35
-	client *net.TCPAddr, remote *net.TCPAddr, secret []byte) (cipher.BlockMode, cipher.BlockMode) {
37
+func makeKeys(purpose CipherPurpose, req *rpc.RPCNonceRequest, resp *rpc.RPCNonceResponse,
38
+	client *net.TCPAddr, remote *net.TCPAddr, secret []byte) ([]byte, []byte) {
36 39
 	message := bytes.Buffer{}
37 40
 	message.Write(resp.Nonce[:])
38 41
 	message.Write(req.Nonce[:])
@@ -71,22 +74,23 @@ func newCBCCipher(purpose CipherPurpose, req *rpc.RPCNonceRequest, resp *rpc.RPC
71 74
 	}
72 75
 	message.Write(req.Nonce[:])
73 76
 
74
-	return makeCipher(message.Bytes())
75
-}
77
+	data := message.Bytes()
78
+	md5sum := md5.Sum(data[1:])
79
+	sha1sum := sha1.Sum(data)
76 80
 
77
-func makeCipher(message []byte) (cipher.BlockMode, cipher.BlockMode) {
78
-	md5sum := md5.Sum(message[1:])
79
-	sha1sum := sha1.Sum(message)
81
+	key := append(md5sum[:12], sha1sum[:]...)
82
+	iv := md5.Sum(data[2:])
80 83
 
81
-	key := append(md5sum[12:], sha1sum[:]...)
82
-	iv := md5.Sum(message[2:])
84
+	return key, iv[:]
85
+}
83 86
 
87
+func makeEncrypterDecrypter(key, iv []byte) (cipher.BlockMode, cipher.BlockMode) {
84 88
 	block, err := aes.NewCipher(key)
85 89
 	if err != nil {
86
-		panic("Cannot create cipher from the given key")
90
+		panic(err)
87 91
 	}
88 92
 
89
-	return cipher.NewCBCEncrypter(block, iv[:]), cipher.NewCBCDecrypter(block, iv[:])
93
+	return cipher.NewCBCEncrypter(block, iv), cipher.NewCBCDecrypter(block, iv)
90 94
 }
91 95
 
92 96
 func reverseBytes(data []byte) []byte {

+ 45
- 0
mtproto/wrappers/crypt_test.go Dosyayı Görüntüle

@@ -0,0 +1,45 @@
1
+package wrappers
2
+
3
+import (
4
+	"encoding/binary"
5
+	"net"
6
+	"testing"
7
+
8
+	"github.com/stretchr/testify/assert"
9
+
10
+	"github.com/9seconds/mtg/mtproto/rpc"
11
+)
12
+
13
+var proxySecret = []byte{196, 249, 250, 202, 150, 120, 230, 187, 72, 173,
14
+	108, 126, 44, 229, 192, 210, 68, 48, 100, 93, 85, 74, 221, 235, 85, 65,
15
+	158, 3, 77, 166, 39, 33, 208, 70, 234, 171, 110, 82, 171, 20, 169, 90, 68,
16
+	62, 207, 179, 70, 62, 121, 160, 90, 102, 97, 42, 223, 156, 174, 218, 139,
17
+	233, 168, 13, 166, 152, 111, 176, 166, 255, 56, 122, 248, 77, 136, 239,
18
+	58, 100, 19, 113, 62, 92, 51, 119, 246, 225, 163, 212, 125, 153, 245, 224,
19
+	197, 110, 236, 232, 240, 92, 84, 196, 144, 176, 121, 227, 27, 239, 130,
20
+	255, 14, 232, 242, 176, 163, 39, 86, 210, 73, 197, 242, 18, 105, 129, 108,
21
+	183, 6, 27, 38, 93, 178, 18}
22
+
23
+func TestMakeKeys(t *testing.T) {
24
+	req, err := rpc.NewRPCNonceRequest(proxySecret)
25
+	assert.Nil(t, err)
26
+
27
+	copy(req.Nonce[:], []byte{24, 49, 53, 111, 198, 10, 235, 180, 230, 112, 92, 78, 1, 201, 106, 105})
28
+	binary.LittleEndian.PutUint32(req.CryptoTS[:], 1528396015)
29
+
30
+	resp := &rpc.RPCNonceResponse{}
31
+	copy(resp.Nonce[:], []byte{247, 40, 210, 56, 65, 12, 101, 170, 216, 155, 14, 253, 250, 238, 219, 226})
32
+
33
+	cltAddr := &net.TCPAddr{
34
+		IP:   net.ParseIP("80.211.29.34"),
35
+		Port: 54208,
36
+	}
37
+	srvAddr := &net.TCPAddr{
38
+		IP:   net.ParseIP("149.154.162.38"),
39
+		Port: 80,
40
+	}
41
+
42
+	key, iv := makeKeys(CipherPurposeClient, req, resp, cltAddr, srvAddr, proxySecret)
43
+	assert.Equal(t, key, []byte{165, 158, 127, 49, 41, 232, 187, 69, 38, 29, 163, 226, 183, 146, 28, 67, 225, 224, 134, 191, 207, 152, 255, 166, 152, 66, 169, 196, 54, 135, 50, 188})
44
+	assert.Equal(t, iv, []byte{33, 110, 125, 221, 183, 121, 160, 116, 130, 180, 156, 249, 52, 111, 37, 178})
45
+}

+ 2
- 2
telegram/middle.go Dosyayı Görüntüle

@@ -54,9 +54,9 @@ func (t *middleTelegram) Init(connOpts *mtproto.ConnectionOpts, conn wrappers.Re
54 54
 		return nil, err
55 55
 	}
56 56
 
57
-	secureConn := mtwrappers.NewFrameRWC(conn, rpc.RPCHandshakeSeqNo)
58
-	secureConn = mtwrappers.NewMiddleProxyCipherRWC(secureConn, rpcNonceReq,
57
+	secureConn := mtwrappers.NewMiddleProxyCipherRWC(conn, rpcNonceReq,
59 58
 		rpcNonceResp, connOpts.ClientAddr, t.proxySecret)
59
+	secureConn = mtwrappers.NewFrameRWC(secureConn, rpc.RPCHandshakeSeqNo)
60 60
 
61 61
 	rpcHandshakeReq, err := t.sendRPCHandshakeRequest(secureConn)
62 62
 	if err != nil {

Loading…
İptal
Kaydet