package obfuscated2 import ( "crypto/aes" "crypto/cipher" "crypto/sha256" "github.com/juju/errors" ) // Obfuscated2 contains AES CTR encryption and decryption streams // for telegram connection. type Obfuscated2 struct { Decryptor cipher.Stream Encryptor cipher.Stream } // ParseObfuscated2ClientFrame parses client frame. Please check this link for // details: http://telegra.ph/telegram-blocks-wtf-05-26 // // Beware, link above is in russian. func ParseObfuscated2ClientFrame(secret []byte, frame Frame) (*Obfuscated2, int16, error) { decHasher := sha256.New() decHasher.Write(frame.Key()) // nolint: errcheck decHasher.Write(secret) // nolint: errcheck decryptor := makeStreamCipher(decHasher.Sum(nil), frame.IV()) invertedFrame := frame.Invert() encHasher := sha256.New() encHasher.Write(invertedFrame.Key()) // nolint: errcheck encHasher.Write(secret) // nolint: errcheck encryptor := makeStreamCipher(encHasher.Sum(nil), invertedFrame.IV()) decryptedFrame := make(Frame, FrameLen) decryptor.XORKeyStream(decryptedFrame, frame) if !decryptedFrame.Valid() { return nil, 0, errors.New("Unknown protocol") } obfs := &Obfuscated2{ Decryptor: decryptor, Encryptor: encryptor, } return obfs, decryptedFrame.DC(), nil } // MakeTelegramObfuscated2Frame creates new handshake frame to send to // Telegram. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/ func MakeTelegramObfuscated2Frame() (*Obfuscated2, Frame) { frame := generateFrame() encryptor := makeStreamCipher(frame.Key(), frame.IV()) decryptorFrame := frame.Invert() decryptor := makeStreamCipher(decryptorFrame.Key(), decryptorFrame.IV()) copyFrame := make(Frame, frameOffsetIV) copy(copyFrame, frame) encryptor.XORKeyStream(frame, frame) copy(frame, copyFrame) obfs := &Obfuscated2{ Decryptor: decryptor, Encryptor: encryptor, } return obfs, frame } func makeStreamCipher(key, iv []byte) cipher.Stream { block, _ := aes.NewCipher(key) return cipher.NewCTR(block, iv) }