diff --git a/Telegram/SourceFiles/autoupdater.cpp b/Telegram/SourceFiles/autoupdater.cpp index 7471dde59..e008a39d5 100644 --- a/Telegram/SourceFiles/autoupdater.cpp +++ b/Telegram/SourceFiles/autoupdater.cpp @@ -20,9 +20,16 @@ Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org */ #include "stdafx.h" + +#include "autoupdater.h" + +#include +#include +#include +#include + #include "application.h" #include "pspecific.h" -#include "autoupdater.h" #ifndef TDESKTOP_DISABLE_AUTOUPDATE diff --git a/Telegram/SourceFiles/config.h b/Telegram/SourceFiles/config.h index b232cbb75..4f0a5668a 100644 --- a/Telegram/SourceFiles/config.h +++ b/Telegram/SourceFiles/config.h @@ -200,7 +200,7 @@ inline const char *cGUIDStr() { return gGuidStr; } -inline const char **cPublicRSAKeys(uint32 &cnt) { +inline const char **cPublicRSAKeys(int &keysCount) { static const char *(keys[]) = {"\ -----BEGIN RSA PUBLIC KEY-----\n\ MIIBCgKCAQEAwVACPi9w23mF3tBkdZz+zwrzKOaaQdr01vAbU4E1pvkfj4sqDsm6\n\ @@ -210,7 +210,7 @@ Efzk2DWgkBluml8OREmvfraX3bkHZJTKX4EQSjBbbdJ2ZXIsRrYOXfaA+xayEGB+\n\ 8hdlLmAjbCVfaigxX0CDqWeR1yFL9kwd9P0NsZRPsmoqVwMbMu7mStFai6aIhc3n\n\ Slv8kg9qv1m6XHVQY3PnEw+QQtqSIXklHwIDAQAB\n\ -----END RSA PUBLIC KEY-----"}; - cnt = sizeof(keys) / sizeof(const char*); + keysCount = arraysize(keys); return keys; } diff --git a/Telegram/SourceFiles/localstorage.cpp b/Telegram/SourceFiles/localstorage.cpp index 3dc3abe2e..8c4bdcb1e 100644 --- a/Telegram/SourceFiles/localstorage.cpp +++ b/Telegram/SourceFiles/localstorage.cpp @@ -19,8 +19,11 @@ Full license: https://github.com/telegramdesktop/tdesktop/blob/master/LICENSE Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org */ #include "stdafx.h" + #include "localstorage.h" +#include + #include "mainwidget.h" #include "window.h" #include "lang.h" diff --git a/Telegram/SourceFiles/mtproto/mtpAuthKey.cpp b/Telegram/SourceFiles/mtproto/mtpAuthKey.cpp index 7e2470e7a..8af05ae13 100644 --- a/Telegram/SourceFiles/mtproto/mtpAuthKey.cpp +++ b/Telegram/SourceFiles/mtproto/mtpAuthKey.cpp @@ -20,6 +20,8 @@ Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org */ #include "stdafx.h" +#include + void aesEncrypt(const void *src, void *dst, uint32 len, void *key, void *iv) { uchar aes_key[32], aes_iv[32]; memcpy(aes_key, key, 32); diff --git a/Telegram/SourceFiles/mtproto/mtpConnection.cpp b/Telegram/SourceFiles/mtproto/mtpConnection.cpp index 9903cfd54..98337156e 100644 --- a/Telegram/SourceFiles/mtproto/mtpConnection.cpp +++ b/Telegram/SourceFiles/mtproto/mtpConnection.cpp @@ -20,261 +20,272 @@ Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org */ #include "stdafx.h" +#include "mtproto/mtpConnection.h" + +#include +#include +#include +#include +#include #include -namespace { - bool parsePQ(const std::string &pqStr, std::string &pStr, std::string &qStr) { - if (pqStr.length() > 8) return false; // more than 64 bit pq +#include "mtproto/rsa_public_key.h" - uint64 pq = 0, p, q; - const uchar *pqChars = (const uchar*)&pqStr[0]; - for (uint32 i = 0, l = pqStr.length(); i < l; ++i) { - pq <<= 8; - pq |= (uint64)pqChars[i]; - } - uint64 pqSqrt = (uint64)sqrtl((long double)pq), ySqr, y; - while (pqSqrt * pqSqrt > pq) --pqSqrt; - while (pqSqrt * pqSqrt < pq) ++pqSqrt; - for (ySqr = pqSqrt * pqSqrt - pq; ; ++pqSqrt, ySqr = pqSqrt * pqSqrt - pq) { - y = (uint64)sqrtl((long double)ySqr); - while (y * y > ySqr) --y; - while (y * y < ySqr) ++y; - if (!ySqr || y + pqSqrt >= pq) return false; - if (y * y == ySqr) { - p = pqSqrt + y; - q = (pqSqrt > y) ? (pqSqrt - y) : (y - pqSqrt); - break; - } - } - if (p > q) swap(p, q); +using std::string; - pStr.resize(4); - uchar *pChars = (uchar*)&pStr[0]; - for (uint32 i = 0; i < 4; ++i) { - *(pChars + 3 - i) = (uchar)(p & 0xFF); - p >>= 8; +namespace MTP { +namespace internal { + +bool parsePQ(const string &pqStr, string &pStr, string &qStr) { + if (pqStr.length() > 8) return false; // more than 64 bit pq + + uint64 pq = 0, p, q; + const uchar *pqChars = (const uchar*)&pqStr[0]; + for (uint32 i = 0, l = pqStr.length(); i < l; ++i) { + pq <<= 8; + pq |= (uint64)pqChars[i]; + } + uint64 pqSqrt = (uint64)sqrtl((long double)pq), ySqr, y; + while (pqSqrt * pqSqrt > pq) --pqSqrt; + while (pqSqrt * pqSqrt < pq) ++pqSqrt; + for (ySqr = pqSqrt * pqSqrt - pq; ; ++pqSqrt, ySqr = pqSqrt * pqSqrt - pq) { + y = (uint64)sqrtl((long double)ySqr); + while (y * y > ySqr) --y; + while (y * y < ySqr) ++y; + if (!ySqr || y + pqSqrt >= pq) return false; + if (y * y == ySqr) { + p = pqSqrt + y; + q = (pqSqrt > y) ? (pqSqrt - y) : (y - pqSqrt); + break; + } + } + if (p > q) swap(p, q); + + pStr.resize(4); + uchar *pChars = (uchar*)&pStr[0]; + for (uint32 i = 0; i < 4; ++i) { + *(pChars + 3 - i) = (uchar)(p & 0xFF); + p >>= 8; + } + + qStr.resize(4); + uchar *qChars = (uchar*)&qStr[0]; + for (uint32 i = 0; i < 4; ++i) { + *(qChars + 3 - i) = (uchar)(q & 0xFF); + q >>= 8; + } + + return true; +} + +class BigNumCounter { +public: + bool count(const void *power, const void *modul, uint32 g, void *gResult, const void *g_a, void *g_aResult) { + DEBUG_LOG(("BigNum Info: counting g_b = g ^ b % dh_prime and auth_key = g_a ^ b % dh_prime")); + uint32 g_be = qToBigEndian(g); + if ( + !BN_bin2bn((const uchar*)power, 64 * sizeof(uint32), &bnPower) || + !BN_bin2bn((const uchar*)modul, 64 * sizeof(uint32), &bnModul) || + !BN_bin2bn((const uchar*)&g_be, sizeof(uint32), &bn_g) || + !BN_bin2bn((const uchar*)g_a, 64 * sizeof(uint32), &bn_g_a) + ) { + ERR_load_crypto_strings(); + LOG(("BigNum Error: BN_bin2bn failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); + DEBUG_LOG(("BigNum Error: base %1, power %2, modul %3").arg(Logs::mb(&g_be, sizeof(uint32)).str()).arg(Logs::mb(power, 64 * sizeof(uint32)).str()).arg(Logs::mb(modul, 64 * sizeof(uint32)).str())); + return false; } - qStr.resize(4); - uchar *qChars = (uchar*)&qStr[0]; - for (uint32 i = 0; i < 4; ++i) { - *(qChars + 3 - i) = (uchar)(q & 0xFF); - q >>= 8; + if (!BN_mod_exp(&bnResult, &bn_g, &bnPower, &bnModul, ctx)) { + ERR_load_crypto_strings(); + LOG(("BigNum Error: BN_mod_exp failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); + DEBUG_LOG(("BigNum Error: base %1, power %2, modul %3").arg(Logs::mb(&g_be, sizeof(uint32)).str()).arg(Logs::mb(power, 64 * sizeof(uint32)).str()).arg(Logs::mb(modul, 64 * sizeof(uint32)).str())); + return false; + } + + uint32 resultLen = BN_num_bytes(&bnResult); + if (resultLen != 64 * sizeof(uint32)) { + DEBUG_LOG(("BigNum Error: bad gResult len (%1)").arg(resultLen)); + return false; + } + resultLen = BN_bn2bin(&bnResult, (uchar*)gResult); + if (resultLen != 64 * sizeof(uint32)) { + DEBUG_LOG(("BigNum Error: bad gResult export len (%1)").arg(resultLen)); + return false; + } + + BN_add_word(&bnResult, 1); // check g_b < dh_prime - 1 + if (BN_cmp(&bnResult, &bnModul) >= 0) { + DEBUG_LOG(("BigNum Error: bad g_b >= dh_prime - 1")); + return false; + } + + if (!BN_mod_exp(&bnResult, &bn_g_a, &bnPower, &bnModul, ctx)) { + ERR_load_crypto_strings(); + LOG(("BigNum Error: BN_mod_exp failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); + DEBUG_LOG(("BigNum Error: base %1, power %2, modul %3").arg(Logs::mb(&g_be, sizeof(uint32)).str()).arg(Logs::mb(power, 64 * sizeof(uint32)).str()).arg(Logs::mb(modul, 64 * sizeof(uint32)).str())); + return false; + } + + resultLen = BN_num_bytes(&bnResult); + if (resultLen != 64 * sizeof(uint32)) { + DEBUG_LOG(("BigNum Error: bad g_aResult len (%1)").arg(resultLen)); + return false; + } + resultLen = BN_bn2bin(&bnResult, (uchar*)g_aResult); + if (resultLen != 64 * sizeof(uint32)) { + DEBUG_LOG(("BigNum Error: bad g_aResult export len (%1)").arg(resultLen)); + return false; + } + + BN_add_word(&bn_g_a, 1); // check g_a < dh_prime - 1 + if (BN_cmp(&bn_g_a, &bnModul) >= 0) { + DEBUG_LOG(("BigNum Error: bad g_a >= dh_prime - 1")); + return false; } return true; } - class _BigNumCounter { - public: - bool count(const void *power, const void *modul, uint32 g, void *gResult, const void *g_a, void *g_aResult) { - DEBUG_LOG(("BigNum Info: counting g_b = g ^ b % dh_prime and auth_key = g_a ^ b % dh_prime")); - uint32 g_be = qToBigEndian(g); - if ( - !BN_bin2bn((const uchar*)power, 64 * sizeof(uint32), &bnPower) || - !BN_bin2bn((const uchar*)modul, 64 * sizeof(uint32), &bnModul) || - !BN_bin2bn((const uchar*)&g_be, sizeof(uint32), &bn_g) || - !BN_bin2bn((const uchar*)g_a, 64 * sizeof(uint32), &bn_g_a) - ) { - ERR_load_crypto_strings(); - LOG(("BigNum Error: BN_bin2bn failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); - DEBUG_LOG(("BigNum Error: base %1, power %2, modul %3").arg(Logs::mb(&g_be, sizeof(uint32)).str()).arg(Logs::mb(power, 64 * sizeof(uint32)).str()).arg(Logs::mb(modul, 64 * sizeof(uint32)).str())); - return false; - } - - if (!BN_mod_exp(&bnResult, &bn_g, &bnPower, &bnModul, ctx)) { - ERR_load_crypto_strings(); - LOG(("BigNum Error: BN_mod_exp failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); - DEBUG_LOG(("BigNum Error: base %1, power %2, modul %3").arg(Logs::mb(&g_be, sizeof(uint32)).str()).arg(Logs::mb(power, 64 * sizeof(uint32)).str()).arg(Logs::mb(modul, 64 * sizeof(uint32)).str())); - return false; - } - - uint32 resultLen = BN_num_bytes(&bnResult); - if (resultLen != 64 * sizeof(uint32)) { - DEBUG_LOG(("BigNum Error: bad gResult len (%1)").arg(resultLen)); - return false; - } - resultLen = BN_bn2bin(&bnResult, (uchar*)gResult); - if (resultLen != 64 * sizeof(uint32)) { - DEBUG_LOG(("BigNum Error: bad gResult export len (%1)").arg(resultLen)); - return false; - } - - BN_add_word(&bnResult, 1); // check g_b < dh_prime - 1 - if (BN_cmp(&bnResult, &bnModul) >= 0) { - DEBUG_LOG(("BigNum Error: bad g_b >= dh_prime - 1")); - return false; - } - - if (!BN_mod_exp(&bnResult, &bn_g_a, &bnPower, &bnModul, ctx)) { - ERR_load_crypto_strings(); - LOG(("BigNum Error: BN_mod_exp failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); - DEBUG_LOG(("BigNum Error: base %1, power %2, modul %3").arg(Logs::mb(&g_be, sizeof(uint32)).str()).arg(Logs::mb(power, 64 * sizeof(uint32)).str()).arg(Logs::mb(modul, 64 * sizeof(uint32)).str())); - return false; - } - - resultLen = BN_num_bytes(&bnResult); - if (resultLen != 64 * sizeof(uint32)) { - DEBUG_LOG(("BigNum Error: bad g_aResult len (%1)").arg(resultLen)); - return false; - } - resultLen = BN_bn2bin(&bnResult, (uchar*)g_aResult); - if (resultLen != 64 * sizeof(uint32)) { - DEBUG_LOG(("BigNum Error: bad g_aResult export len (%1)").arg(resultLen)); - return false; - } - - BN_add_word(&bn_g_a, 1); // check g_a < dh_prime - 1 - if (BN_cmp(&bn_g_a, &bnModul) >= 0) { - DEBUG_LOG(("BigNum Error: bad g_a >= dh_prime - 1")); - return false; - } - - return true; - } - - _BigNumCounter() : ctx(BN_CTX_new()) { - BN_init(&bnPower); - BN_init(&bnModul); - BN_init(&bn_g); - BN_init(&bn_g_a); - BN_init(&bnResult); - } - ~_BigNumCounter() { - BN_CTX_free(ctx); - BN_clear_free(&bnPower); - BN_clear_free(&bnModul); - BN_clear_free(&bn_g); - BN_clear_free(&bn_g_a); - BN_clear_free(&bnResult); - } - - private: - BIGNUM bnPower, bnModul, bn_g, bn_g_a, bnResult; - BN_CTX *ctx; - }; - - // Miller-Rabin primality test - class _BigNumPrimeTest { - public: - - bool isPrimeAndGood(const void *pData, uint32 iterCount, int32 g) { - if (!memcmp(pData, "\xC7\x1C\xAE\xB9\xC6\xB1\xC9\x04\x8E\x6C\x52\x2F\x70\xF1\x3F\x73\x98\x0D\x40\x23\x8E\x3E\x21\xC1\x49\x34\xD0\x37\x56\x3D\x93\x0F\x48\x19\x8A\x0A\xA7\xC1\x40\x58\x22\x94\x93\xD2\x25\x30\xF4\xDB\xFA\x33\x6F\x6E\x0A\xC9\x25\x13\x95\x43\xAE\xD4\x4C\xCE\x7C\x37\x20\xFD\x51\xF6\x94\x58\x70\x5A\xC6\x8C\xD4\xFE\x6B\x6B\x13\xAB\xDC\x97\x46\x51\x29\x69\x32\x84\x54\xF1\x8F\xAF\x8C\x59\x5F\x64\x24\x77\xFE\x96\xBB\x2A\x94\x1D\x5B\xCD\x1D\x4A\xC8\xCC\x49\x88\x07\x08\xFA\x9B\x37\x8E\x3C\x4F\x3A\x90\x60\xBE\xE6\x7C\xF9\xA4\xA4\xA6\x95\x81\x10\x51\x90\x7E\x16\x27\x53\xB5\x6B\x0F\x6B\x41\x0D\xBA\x74\xD8\xA8\x4B\x2A\x14\xB3\x14\x4E\x0E\xF1\x28\x47\x54\xFD\x17\xED\x95\x0D\x59\x65\xB4\xB9\xDD\x46\x58\x2D\xB1\x17\x8D\x16\x9C\x6B\xC4\x65\xB0\xD6\xFF\x9C\xA3\x92\x8F\xEF\x5B\x9A\xE4\xE4\x18\xFC\x15\xE8\x3E\xBE\xA0\xF8\x7F\xA9\xFF\x5E\xED\x70\x05\x0D\xED\x28\x49\xF4\x7B\xF9\x59\xD9\x56\x85\x0C\xE9\x29\x85\x1F\x0D\x81\x15\xF6\x35\xB1\x05\xEE\x2E\x4E\x15\xD0\x4B\x24\x54\xBF\x6F\x4F\xAD\xF0\x34\xB1\x04\x03\x11\x9C\xD8\xE3\xB9\x2F\xCC\x5B", 256)) { - if (g == 3 || g == 4 || g == 5 || g == 7) { - return true; - } - } - if ( - !BN_bin2bn((const uchar*)pData, 64 * sizeof(uint32), &bnPrime) - ) { - ERR_load_crypto_strings(); - LOG(("BigNum PT Error: BN_bin2bn failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); - DEBUG_LOG(("BigNum PT Error: prime %1").arg(Logs::mb(pData, 64 * sizeof(uint32)).str())); - return false; - } - - int32 numBits = BN_num_bits(&bnPrime); - if (numBits != 2048) { - LOG(("BigNum PT Error: BN_bin2bn failed, bad dh_prime num bits: %1").arg(numBits)); - return false; - } - - if (BN_is_prime_ex(&bnPrime, MTPMillerRabinIterCount, ctx, NULL) == 0) { - return false; - } - - switch (g) { - case 2: { - int32 mod8 = BN_mod_word(&bnPrime, 8); - if (mod8 != 7) { - LOG(("BigNum PT Error: bad g value: %1, mod8: %2").arg(g).arg(mod8)); - return false; - } - } break; - case 3: { - int32 mod3 = BN_mod_word(&bnPrime, 3); - if (mod3 != 2) { - LOG(("BigNum PT Error: bad g value: %1, mod3: %2").arg(g).arg(mod3)); - return false; - } - } break; - case 4: break; - case 5: { - int32 mod5 = BN_mod_word(&bnPrime, 5); - if (mod5 != 1 && mod5 != 4) { - LOG(("BigNum PT Error: bad g value: %1, mod5: %2").arg(g).arg(mod5)); - return false; - } - } break; - case 6: { - int32 mod24 = BN_mod_word(&bnPrime, 24); - if (mod24 != 19 && mod24 != 23) { - LOG(("BigNum PT Error: bad g value: %1, mod24: %2").arg(g).arg(mod24)); - return false; - } - } break; - case 7: { - int32 mod7 = BN_mod_word(&bnPrime, 7); - if (mod7 != 3 && mod7 != 5 && mod7 != 6) { - LOG(("BigNum PT Error: bad g value: %1, mod7: %2").arg(g).arg(mod7)); - return false; - } - } break; - default: - LOG(("BigNum PT Error: bad g value: %1").arg(g)); - return false; - break; - } - - BN_sub_word(&bnPrime, 1); // (p - 1) / 2 - BN_div_word(&bnPrime, 2); - - if (BN_is_prime_ex(&bnPrime, MTPMillerRabinIterCount, ctx, NULL) == 0) { - return false; - } - - return true; - } - - _BigNumPrimeTest() : ctx(BN_CTX_new()) { - BN_init(&bnPrime); - } - ~_BigNumPrimeTest() { - BN_CTX_free(ctx); - BN_clear_free(&bnPrime); - } - - private: - BIGNUM bnPrime; - BN_CTX *ctx; - }; - - typedef QMap PublicRSAKeys; - PublicRSAKeys gPublicRSA; - - bool gConfigInited = false; - void initRSAConfig() { - if (gConfigInited) return; - gConfigInited = true; - - DEBUG_LOG(("MTP Info: MTP config init")); - - // read all public keys - uint32 keysCnt; - const char **keys = cPublicRSAKeys(keysCnt); - for (uint32 i = 0; i < keysCnt; ++i) { - mtpPublicRSA key(keys[i]); - if (key.key()) { - gPublicRSA.insert(key.fingerPrint(), key); - } else { - LOG(("MTP Error: could not read this public RSA key:")); - LOG((keys[i])); - } - } - DEBUG_LOG(("MTP Info: read %1 public RSA keys").arg(gPublicRSA.size())); + BigNumCounter() : ctx(BN_CTX_new()) { + BN_init(&bnPower); + BN_init(&bnModul); + BN_init(&bn_g); + BN_init(&bn_g_a); + BN_init(&bnResult); } + ~BigNumCounter() { + BN_CTX_free(ctx); + BN_clear_free(&bnPower); + BN_clear_free(&bnModul); + BN_clear_free(&bn_g); + BN_clear_free(&bn_g_a); + BN_clear_free(&bnResult); + } + +private: + BIGNUM bnPower, bnModul, bn_g, bn_g_a, bnResult; + BN_CTX *ctx; +}; + +// Miller-Rabin primality test +class BigNumPrimeTest { +public: + + bool isPrimeAndGood(const void *pData, uint32 iterCount, int32 g) { + if (!memcmp(pData, "\xC7\x1C\xAE\xB9\xC6\xB1\xC9\x04\x8E\x6C\x52\x2F\x70\xF1\x3F\x73\x98\x0D\x40\x23\x8E\x3E\x21\xC1\x49\x34\xD0\x37\x56\x3D\x93\x0F\x48\x19\x8A\x0A\xA7\xC1\x40\x58\x22\x94\x93\xD2\x25\x30\xF4\xDB\xFA\x33\x6F\x6E\x0A\xC9\x25\x13\x95\x43\xAE\xD4\x4C\xCE\x7C\x37\x20\xFD\x51\xF6\x94\x58\x70\x5A\xC6\x8C\xD4\xFE\x6B\x6B\x13\xAB\xDC\x97\x46\x51\x29\x69\x32\x84\x54\xF1\x8F\xAF\x8C\x59\x5F\x64\x24\x77\xFE\x96\xBB\x2A\x94\x1D\x5B\xCD\x1D\x4A\xC8\xCC\x49\x88\x07\x08\xFA\x9B\x37\x8E\x3C\x4F\x3A\x90\x60\xBE\xE6\x7C\xF9\xA4\xA4\xA6\x95\x81\x10\x51\x90\x7E\x16\x27\x53\xB5\x6B\x0F\x6B\x41\x0D\xBA\x74\xD8\xA8\x4B\x2A\x14\xB3\x14\x4E\x0E\xF1\x28\x47\x54\xFD\x17\xED\x95\x0D\x59\x65\xB4\xB9\xDD\x46\x58\x2D\xB1\x17\x8D\x16\x9C\x6B\xC4\x65\xB0\xD6\xFF\x9C\xA3\x92\x8F\xEF\x5B\x9A\xE4\xE4\x18\xFC\x15\xE8\x3E\xBE\xA0\xF8\x7F\xA9\xFF\x5E\xED\x70\x05\x0D\xED\x28\x49\xF4\x7B\xF9\x59\xD9\x56\x85\x0C\xE9\x29\x85\x1F\x0D\x81\x15\xF6\x35\xB1\x05\xEE\x2E\x4E\x15\xD0\x4B\x24\x54\xBF\x6F\x4F\xAD\xF0\x34\xB1\x04\x03\x11\x9C\xD8\xE3\xB9\x2F\xCC\x5B", 256)) { + if (g == 3 || g == 4 || g == 5 || g == 7) { + return true; + } + } + if ( + !BN_bin2bn((const uchar*)pData, 64 * sizeof(uint32), &bnPrime) + ) { + ERR_load_crypto_strings(); + LOG(("BigNum PT Error: BN_bin2bn failed, error: %1").arg(ERR_error_string(ERR_get_error(), 0))); + DEBUG_LOG(("BigNum PT Error: prime %1").arg(Logs::mb(pData, 64 * sizeof(uint32)).str())); + return false; + } + + int32 numBits = BN_num_bits(&bnPrime); + if (numBits != 2048) { + LOG(("BigNum PT Error: BN_bin2bn failed, bad dh_prime num bits: %1").arg(numBits)); + return false; + } + + if (BN_is_prime_ex(&bnPrime, MTPMillerRabinIterCount, ctx, NULL) == 0) { + return false; + } + + switch (g) { + case 2: { + int32 mod8 = BN_mod_word(&bnPrime, 8); + if (mod8 != 7) { + LOG(("BigNum PT Error: bad g value: %1, mod8: %2").arg(g).arg(mod8)); + return false; + } + } break; + case 3: { + int32 mod3 = BN_mod_word(&bnPrime, 3); + if (mod3 != 2) { + LOG(("BigNum PT Error: bad g value: %1, mod3: %2").arg(g).arg(mod3)); + return false; + } + } break; + case 4: break; + case 5: { + int32 mod5 = BN_mod_word(&bnPrime, 5); + if (mod5 != 1 && mod5 != 4) { + LOG(("BigNum PT Error: bad g value: %1, mod5: %2").arg(g).arg(mod5)); + return false; + } + } break; + case 6: { + int32 mod24 = BN_mod_word(&bnPrime, 24); + if (mod24 != 19 && mod24 != 23) { + LOG(("BigNum PT Error: bad g value: %1, mod24: %2").arg(g).arg(mod24)); + return false; + } + } break; + case 7: { + int32 mod7 = BN_mod_word(&bnPrime, 7); + if (mod7 != 3 && mod7 != 5 && mod7 != 6) { + LOG(("BigNum PT Error: bad g value: %1, mod7: %2").arg(g).arg(mod7)); + return false; + } + } break; + default: + LOG(("BigNum PT Error: bad g value: %1").arg(g)); + return false; + break; + } + + BN_sub_word(&bnPrime, 1); // (p - 1) / 2 + BN_div_word(&bnPrime, 2); + + if (BN_is_prime_ex(&bnPrime, MTPMillerRabinIterCount, ctx, NULL) == 0) { + return false; + } + + return true; + } + + BigNumPrimeTest() : ctx(BN_CTX_new()) { + BN_init(&bnPrime); + } + ~BigNumPrimeTest() { + BN_CTX_free(ctx); + BN_clear_free(&bnPrime); + } + +private: + BIGNUM bnPrime; + BN_CTX *ctx; +}; + +typedef QMap RSAPublicKeys; +RSAPublicKeys InitRSAPublicKeys() { + DEBUG_LOG(("MTP Info: RSA public keys list creation")); + + RSAPublicKeys result; + + int keysCount; + const char **keys = cPublicRSAKeys(keysCount); + for (int i = 0; i < keysCount; ++i) { + RSAPublicKey key(keys[i]); + if (key.isValid()) { + result.insert(key.getFingerPrint(), key); + } else { + LOG(("MTP Error: could not read this public RSA key:")); + LOG((keys[i])); + } + } + DEBUG_LOG(("MTP Info: read %1 public RSA keys").arg(result.size())); + return result; } +} // namespace internal +} // namespace MTP + uint32 MTPThreadIdIncrement = 0; MTPThread::MTPThread() : QThread(0) @@ -294,8 +305,6 @@ MTProtoConnection::MTProtoConnection() : thread(nullptr), data(nullptr) { int32 MTProtoConnection::start(MTPSessionData *sessionData, int32 dc) { t_assert(thread == nullptr && data == nullptr); - initRSAConfig(); - thread = new MTPThread(); data = new MTProtoConnectionPrivate(thread, this, sessionData, dc); @@ -3330,22 +3339,22 @@ void MTProtoConnectionPrivate::pqAnswered() { return restart(); } - mtpPublicRSA *rsaKey = 0; + static MTP::internal::RSAPublicKeys RSAKeys = MTP::internal::InitRSAPublicKeys(); + const MTP::internal::RSAPublicKey *rsaKey = nullptr; const QVector &fingerPrints(res_pq.c_resPQ().vserver_public_key_fingerprints.c_vector().v); - for (uint32 i = 0, l = fingerPrints.size(); i < l; ++i) { - uint64 print(fingerPrints[i].v); - PublicRSAKeys::iterator rsaIndex = gPublicRSA.find(print); - if (rsaIndex != gPublicRSA.end()) { - rsaKey = &rsaIndex.value(); + for (const MTPlong &fingerPrint : fingerPrints) { + auto it = RSAKeys.constFind(fingerPrint.v); + if (it != RSAKeys.cend()) { + rsaKey = &it.value(); break; } } if (!rsaKey) { QStringList suggested, my; - for (uint32 i = 0, l = fingerPrints.size(); i < l; ++i) { - suggested.push_back(QString("%1").arg(fingerPrints[i].v)); + for (const MTPlong &fingerPrint : fingerPrints) { + suggested.push_back(QString("%1").arg(fingerPrint.v)); } - for (PublicRSAKeys::const_iterator i = gPublicRSA.cbegin(), e = gPublicRSA.cend(); i != e; ++i) { + for (auto i = RSAKeys.cbegin(), e = RSAKeys.cend(); i != e; ++i) { my.push_back(QString("%1").arg(i.key())); } LOG(("AuthKey Error: could not choose public RSA key, suggested fingerprints: %1, my fingerprints: %2").arg(suggested.join(", ")).arg(my.join(", "))); @@ -3363,7 +3372,7 @@ void MTProtoConnectionPrivate::pqAnswered() { const string &pq(res_pq_data.vpq.c_string().v); string &p(p_q_inner_data.vp._string().v), &q(p_q_inner_data.vq._string().v); - if (!parsePQ(pq, p, q)) { + if (!MTP::internal::parsePQ(pq, p, q)) { LOG(("AuthKey Error: could not factor pq!")); DEBUG_LOG(("AuthKey Error: problematic pq: %1").arg(Logs::mb(&pq[0], pq.length()).str())); return restart(); @@ -3375,7 +3384,7 @@ void MTProtoConnectionPrivate::pqAnswered() { MTPReq_DH_params req_DH_params; req_DH_params.vnonce = authKeyData->nonce; req_DH_params.vserver_nonce = authKeyData->server_nonce; - req_DH_params.vpublic_key_fingerprint = MTP_long(rsaKey->fingerPrint()); + req_DH_params.vpublic_key_fingerprint = MTP_long(rsaKey->getFingerPrint()); req_DH_params.vp = p_q_inner_data.vp; req_DH_params.vq = p_q_inner_data.vq; @@ -3403,14 +3412,9 @@ void MTProtoConnectionPrivate::pqAnswered() { memset_rand(&encBuffer[encSize], (65 - encSize) * sizeof(mtpPrime)); } - dhEncString.resize(256); - int32 res = RSA_public_encrypt(256, ((const uchar*)&encBuffer[0]) + 3, (uchar*)&dhEncString[0], rsaKey->key(), RSA_NO_PADDING); - if (res != 256) { - ERR_load_crypto_strings(); - LOG(("RSA Error: RSA_public_encrypt failed, key fp: %1, result: %2, error: %3").arg(rsaKey->fingerPrint()).arg(res).arg(ERR_error_string(ERR_get_error(), 0))); + if (!rsaKey->encrypt(reinterpret_cast(&encBuffer[0]) + 3, dhEncString)) { return restart(); } - connect(_conn, SIGNAL(receivedData()), this, SLOT(dhParamsAnswered())); DEBUG_LOG(("AuthKey Info: sending Req_DH_params..")); @@ -3498,7 +3502,7 @@ void MTProtoConnectionPrivate::dhParamsAnswered() { } // check that dhPrime and (dhPrime - 1) / 2 are really prime using openssl BIGNUM methods - _BigNumPrimeTest bnPrimeTest; + MTP::internal::BigNumPrimeTest bnPrimeTest; if (!bnPrimeTest.isPrimeAndGood(&dhPrime[0], MTPMillerRabinIterCount, dh_inner_data.vg.v)) { LOG(("AuthKey Error: bad dh_prime primality!").arg(dhPrime.length()).arg(g_a.length())); DEBUG_LOG(("AuthKey Error: dh_prime %1").arg(Logs::mb(&dhPrime[0], dhPrime.length()).str())); @@ -3556,7 +3560,7 @@ void MTProtoConnectionPrivate::dhClientParamsSend() { memset_rand(b, sizeof(b)); // count g_b and auth_key using openssl BIGNUM methods - _BigNumCounter bnCounter; + MTP::internal::BigNumCounter bnCounter; if (!bnCounter.count(b, authKeyStrings->dh_prime.constData(), authKeyData->g, g_b, authKeyStrings->g_a.constData(), authKeyData->auth_key)) { return dhClientParamsSend(); } diff --git a/Telegram/SourceFiles/mtproto/mtpConnection.h b/Telegram/SourceFiles/mtproto/mtpConnection.h index e63bc3f13..03592e29d 100644 --- a/Telegram/SourceFiles/mtproto/mtpConnection.h +++ b/Telegram/SourceFiles/mtproto/mtpConnection.h @@ -21,7 +21,6 @@ Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org #pragma once #include "mtproto/mtpCoreTypes.h" -#include "mtproto/mtpPublicRSA.h" #include "mtproto/mtpAuthKey.h" inline bool mtpRequestData::isSentContainer(const mtpRequest &request) { // "request-like" wrap for msgIds vector diff --git a/Telegram/SourceFiles/mtproto/mtpPublicRSA.h b/Telegram/SourceFiles/mtproto/mtpPublicRSA.h deleted file mode 100644 index 0827ebfac..000000000 --- a/Telegram/SourceFiles/mtproto/mtpPublicRSA.h +++ /dev/null @@ -1,85 +0,0 @@ -/* -This file is part of Telegram Desktop, -the official desktop version of Telegram messaging app, see https://telegram.org - -Telegram Desktop is free software: you can redistribute it and/or modify -it under the terms of the GNU General Public License as published by -the Free Software Foundation, either version 3 of the License, or -(at your option) any later version. - -It is distributed in the hope that it will be useful, -but WITHOUT ANY WARRANTY; without even the implied warranty of -MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -GNU General Public License for more details. - -In addition, as a special exception, the copyright holders give permission -to link the code of portions of this program with the OpenSSL library. - -Full license: https://github.com/telegramdesktop/tdesktop/blob/master/LICENSE -Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org -*/ -#pragma once - -class mtpPublicRSA { -public: - mtpPublicRSA(const char *key) : data(new mtpPublicRSAInner(PEM_read_bio_RSAPublicKey(BIO_new_mem_buf(const_cast(key), -1), 0, 0, 0), 0)) { - if (!data->prsa) return; - - int32 nBytes = BN_num_bytes(data->prsa->n); - int32 eBytes = BN_num_bytes(data->prsa->e); - string nStr(nBytes, 0), eStr(eBytes, 0); - BN_bn2bin(data->prsa->n, (uchar*)&nStr[0]); - BN_bn2bin(data->prsa->e, (uchar*)&eStr[0]); - - mtpBuffer tmp; - MTP_string(nStr).write(tmp); - MTP_string(eStr).write(tmp); - - uchar sha1Buffer[20]; - data->fp = *(uint64*)(hashSha1(&tmp[0], tmp.size() * sizeof(mtpPrime), sha1Buffer) + 3); - } - - mtpPublicRSA(const mtpPublicRSA &v) : data(v.data) { - ++data->cnt; - } - - mtpPublicRSA &operator=(const mtpPublicRSA &v) { - if (data != v.data) { - destroy(); - data = v.data; - ++data->cnt; - } - return *this; - } - - uint64 fingerPrint() const { - return data->fp; - } - - RSA *key() { - return data->prsa; - } - - ~mtpPublicRSA() { - destroy(); - } - -private: - void destroy() { - if (!--data->cnt) { - delete data; - } - } - - struct mtpPublicRSAInner { - mtpPublicRSAInner(RSA *_prsa, uint64 _fp) : prsa(_prsa), cnt(1), fp(_fp) { - } - ~mtpPublicRSAInner() { - RSA_free(prsa); - } - RSA *prsa; - uint32 cnt; - uint64 fp; - }; - mtpPublicRSAInner *data; -}; diff --git a/Telegram/SourceFiles/mtproto/rsa_public_key.cpp b/Telegram/SourceFiles/mtproto/rsa_public_key.cpp new file mode 100644 index 000000000..7d9e196c8 --- /dev/null +++ b/Telegram/SourceFiles/mtproto/rsa_public_key.cpp @@ -0,0 +1,84 @@ +/* +This file is part of Telegram Desktop, +the official desktop version of Telegram messaging app, see https://telegram.org + +Telegram Desktop is free software: you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation, either version 3 of the License, or +(at your option) any later version. + +It is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +In addition, as a special exception, the copyright holders give permission +to link the code of portions of this program with the OpenSSL library. + +Full license: https://github.com/telegramdesktop/tdesktop/blob/master/LICENSE +Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org +*/ +#include "stdafx.h" + +#include "mtproto/rsa_public_key.h" + +#include +#include +#include +#include + +using std::string; + +namespace MTP { +namespace internal { + +struct RSAPublicKey::Impl { + Impl(const char *key) : rsa(PEM_read_bio_RSAPublicKey(BIO_new_mem_buf(const_cast(key), -1), 0, 0, 0)) { + } + ~Impl() { + RSA_free(rsa); + } + RSA *rsa; + uint64 fp = 0; +}; + +RSAPublicKey::RSAPublicKey(const char *key) : impl_(new Impl(key)) { + if (!impl_->rsa) return; + + int nBytes = BN_num_bytes(impl_->rsa->n); + int eBytes = BN_num_bytes(impl_->rsa->e); + string nStr(nBytes, 0), eStr(eBytes, 0); + BN_bn2bin(impl_->rsa->n, (uchar*)&nStr[0]); + BN_bn2bin(impl_->rsa->e, (uchar*)&eStr[0]); + + mtpBuffer tmp; + MTP_string(nStr).write(tmp); + MTP_string(eStr).write(tmp); + + uchar sha1Buffer[20]; + impl_->fp = *(uint64*)(hashSha1(&tmp[0], tmp.size() * sizeof(mtpPrime), sha1Buffer) + 3); +} + +uint64 RSAPublicKey::getFingerPrint() const { + return impl_->fp; +} + +bool RSAPublicKey::isValid() const { + return impl_->rsa != nullptr; +} + +bool RSAPublicKey::encrypt(const void *data, string &result) const { + t_assert(isValid()); + + result.resize(256); + int res = RSA_public_encrypt(256, reinterpret_cast(data), reinterpret_cast(&result[0]), impl_->rsa, RSA_NO_PADDING); + if (res != 256) { + ERR_load_crypto_strings(); + LOG(("RSA Error: RSA_public_encrypt failed, key fp: %1, result: %2, error: %3").arg(getFingerPrint()).arg(res).arg(ERR_error_string(ERR_get_error(), 0))); + return false; + } + return true; +} + +} // namespace internal +} // namespace MTP diff --git a/Telegram/SourceFiles/mtproto/rsa_public_key.h b/Telegram/SourceFiles/mtproto/rsa_public_key.h new file mode 100644 index 000000000..b59deec79 --- /dev/null +++ b/Telegram/SourceFiles/mtproto/rsa_public_key.h @@ -0,0 +1,48 @@ +/* +This file is part of Telegram Desktop, +the official desktop version of Telegram messaging app, see https://telegram.org + +Telegram Desktop is free software: you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation, either version 3 of the License, or +(at your option) any later version. + +It is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +In addition, as a special exception, the copyright holders give permission +to link the code of portions of this program with the OpenSSL library. + +Full license: https://github.com/telegramdesktop/tdesktop/blob/master/LICENSE +Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org +*/ +#pragma once + +namespace MTP { +namespace internal { + +// this class holds an RSA public key and can encrypt fixed-size messages with it +class RSAPublicKey final { +public: + + // key in RSAPublicKey "-----BEGIN RSA PUBLIC KEY----- ..." format + RSAPublicKey(const char *key); + + bool isValid() const; + uint64 getFingerPrint() const; + + // data has exactly 256 chars to be encrypted + bool encrypt(const void *data, string &result) const; + +private: + + struct Impl; + typedef QSharedPointer ImplPtr; + ImplPtr impl_; + +}; + +} // namespace internal +} // namespace MTP diff --git a/Telegram/SourceFiles/stdafx.h b/Telegram/SourceFiles/stdafx.h index da667bb39..56a4b736e 100644 --- a/Telegram/SourceFiles/stdafx.h +++ b/Telegram/SourceFiles/stdafx.h @@ -36,16 +36,6 @@ Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org #include -#include -#include -#include -#include -#include -#include -#include -#include -#include - #include #include #include diff --git a/Telegram/SourceFiles/types.cpp b/Telegram/SourceFiles/types.cpp index 231b9bdf3..f851dc231 100644 --- a/Telegram/SourceFiles/types.cpp +++ b/Telegram/SourceFiles/types.cpp @@ -20,6 +20,11 @@ Copyright (c) 2014-2016 John Preston, https://desktop.telegram.org */ #include "stdafx.h" +#include "types.h" + +#include +#include + #include "application.h" uint64 _SharedMemoryLocation[4] = { 0x00, 0x01, 0x02, 0x03 }; diff --git a/Telegram/SourceFiles/types.h b/Telegram/SourceFiles/types.h index 5ecc19c16..6f9a05585 100644 --- a/Telegram/SourceFiles/types.h +++ b/Telegram/SourceFiles/types.h @@ -46,6 +46,10 @@ public: }; +// thanks Chromium see https://blogs.msdn.microsoft.com/the1/2004/05/07/how-would-you-get-the-count-of-an-array-in-c-2/ +template char(&ArraySizeHelper(T(&array)[N]))[N]; +#define arraysize(array) (sizeof(ArraySizeHelper(array))) + #define qsl(s) QStringLiteral(s) #define qstr(s) QLatin1String(s, sizeof(s) - 1) diff --git a/Telegram/Telegram.pro b/Telegram/Telegram.pro index 0bd01d56d..4aff21ad1 100644 --- a/Telegram/Telegram.pro +++ b/Telegram/Telegram.pro @@ -120,6 +120,7 @@ SOURCES += \ ./SourceFiles/mtproto/mtpCoreTypes.cpp \ ./SourceFiles/mtproto/mtpDC.cpp \ ./SourceFiles/mtproto/mtpFileLoader.cpp \ + ./SourceFiles/mtproto/rsa_public_key.cpp \ ./SourceFiles/mtproto/mtpRPC.cpp \ ./SourceFiles/mtproto/mtpScheme.cpp \ ./SourceFiles/mtproto/mtpSession.cpp \ @@ -212,7 +213,7 @@ HEADERS += \ ./SourceFiles/mtproto/mtpCoreTypes.h \ ./SourceFiles/mtproto/mtpDC.h \ ./SourceFiles/mtproto/mtpFileLoader.h \ - ./SourceFiles/mtproto/mtpPublicRSA.h \ + ./SourceFiles/mtproto/rsa_public_key.h \ ./SourceFiles/mtproto/mtpRPC.h \ ./SourceFiles/mtproto/mtpScheme.h \ ./SourceFiles/mtproto/mtpSession.h \ diff --git a/Telegram/Telegram.vcxproj b/Telegram/Telegram.vcxproj index 529a6b36a..28bad599a 100644 --- a/Telegram/Telegram.vcxproj +++ b/Telegram/Telegram.vcxproj @@ -1043,6 +1043,7 @@ + @@ -1924,7 +1925,7 @@ $(QTDIR)\bin\moc.exe;%(FullPath) $(QTDIR)\bin\moc.exe;%(FullPath) - + Moc%27ing mtpSession.h... diff --git a/Telegram/Telegram.vcxproj.filters b/Telegram/Telegram.vcxproj.filters index b1fff4cc4..05d327c33 100644 --- a/Telegram/Telegram.vcxproj.filters +++ b/Telegram/Telegram.vcxproj.filters @@ -921,6 +921,9 @@ Generated Files\Release + + mtproto + @@ -938,9 +941,6 @@ Source Files - - mtproto - Generated Files @@ -1022,6 +1022,9 @@ intro + + mtproto + diff --git a/Telegram/Telegram.xcodeproj/project.pbxproj b/Telegram/Telegram.xcodeproj/project.pbxproj index 710e4fea7..96b42f234 100644 --- a/Telegram/Telegram.xcodeproj/project.pbxproj +++ b/Telegram/Telegram.xcodeproj/project.pbxproj @@ -577,7 +577,7 @@ A022AF919D1977534CA66BB8 /* /usr/local/Qt-5.5.1/mkspecs/modules/qt_lib_widgets.pri */ = {isa = PBXFileReference; lastKnownFileType = text; path = "/usr/local/Qt-5.5.1/mkspecs/modules/qt_lib_widgets.pri"; sourceTree = ""; }; A1479F94376F9732B57C69DB /* moc_animation.cpp */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.cpp.cpp; name = moc_animation.cpp; path = GeneratedFiles/Debug/moc_animation.cpp; sourceTree = ""; }; A1A67BEAA744704B29168D39 /* IOKit.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = IOKit.framework; path = /System/Library/Frameworks/IOKit.framework; sourceTree = ""; }; - A3622760CEC6D6827A25E710 /* mtpPublicRSA.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; name = mtpPublicRSA.h; path = SourceFiles/mtproto/mtpPublicRSA.h; sourceTree = ""; }; + A3622760CEC6D6827A25E710 /* rsa_public_key.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; name = rsa_public_key.h; path = SourceFiles/mtproto/rsa_public_key.h; sourceTree = ""; }; A37C7E516201B0264A4CDA38 /* moc_introwidget.cpp */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.cpp.cpp; name = moc_introwidget.cpp; path = GeneratedFiles/Debug/moc_introwidget.cpp; sourceTree = ""; }; A4D8AC60897F435C1C3B9D02 /* /usr/local/Qt-5.5.1/mkspecs/modules/qt_plugin_qtsensors_generic.pri */ = {isa = PBXFileReference; lastKnownFileType = text; path = "/usr/local/Qt-5.5.1/mkspecs/modules/qt_plugin_qtsensors_generic.pri"; sourceTree = ""; }; A59F74CD76FDC2B4B9910E18 /* /usr/local/Qt-5.5.1/mkspecs/modules/qt_lib_scripttools_private.pri */ = {isa = PBXFileReference; lastKnownFileType = text; path = "/usr/local/Qt-5.5.1/mkspecs/modules/qt_lib_scripttools_private.pri"; sourceTree = ""; }; @@ -830,7 +830,7 @@ 27E7471A4EC90E84353AA16F /* mtpCoreTypes.h */, B3D42654F18B1FE49512C404 /* mtpDC.h */, 96ACDDE3DCB798B97F9EA2F4 /* mtpFileLoader.h */, - A3622760CEC6D6827A25E710 /* mtpPublicRSA.h */, + A3622760CEC6D6827A25E710 /* rsa_public_key.h */, FB61F72601D91BF3AC730D20 /* mtpRPC.h */, 7DBFC0B5EAF874BA10E3D603 /* mtpScheme.h */, 4D1099F2D3696E8A0E17D37D /* mtpSession.h */, diff --git a/Telegram/Telegram.xcodeproj/qt_preprocess.mak b/Telegram/Telegram.xcodeproj/qt_preprocess.mak index ad9983289..4f7753467 100644 --- a/Telegram/Telegram.xcodeproj/qt_preprocess.mak +++ b/Telegram/Telegram.xcodeproj/qt_preprocess.mak @@ -299,7 +299,7 @@ GeneratedFiles/Debug/moc_mtp.cpp: SourceFiles/mtproto/mtpSession.h \ ../../Libraries/QtStatic/qtbase/include/QtCore/QReadWriteLock \ SourceFiles/logs.h \ SourceFiles/mtproto/mtpScheme.h \ - SourceFiles/mtproto/mtpPublicRSA.h \ + SourceFiles/mtproto/rsa_public_key.h \ SourceFiles/mtproto/mtpAuthKey.h \ SourceFiles/mtproto/mtpDC.h \ SourceFiles/mtproto/mtpRPC.h \ @@ -313,7 +313,7 @@ GeneratedFiles/Debug/moc_mtpConnection.cpp: SourceFiles/mtproto/mtpCoreTypes.h \ ../../Libraries/QtStatic/qtbase/include/QtCore/QReadWriteLock \ SourceFiles/logs.h \ SourceFiles/mtproto/mtpScheme.h \ - SourceFiles/mtproto/mtpPublicRSA.h \ + SourceFiles/mtproto/rsa_public_key.h \ SourceFiles/mtproto/mtpAuthKey.h \ SourceFiles/mtproto/mtpConnection.h /usr/local/Qt-5.5.1/bin/moc $(DEFINES) -D__APPLE__ -D__GNUC__=4 -I/usr/local/Qt-5.5.1/mkspecs/macx-clang -I. -I/usr/local/Qt-5.5.1/include/QtGui/5.5.1/QtGui -I/usr/local/Qt-5.5.1/include/QtCore/5.5.1/QtCore -I/usr/local/Qt-5.5.1/include -I./SourceFiles -I./GeneratedFiles -I../../Libraries/lzma/C -I../../Libraries/libexif-0.6.20 -I/usr/local/Qt-5.5.1/include -I/usr/local/Qt-5.5.1/include/QtMultimedia -I/usr/local/Qt-5.5.1/include/QtWidgets -I/usr/local/Qt-5.5.1/include/QtNetwork -I/usr/local/Qt-5.5.1/include/QtGui -I/usr/local/Qt-5.5.1/include/QtCore -I/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.9.sdk/usr/include/c++/4.2.1 -I/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.9.sdk/usr/include/c++/4.2.1/backward -I/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/lib/clang/5.1/include -I/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/include -I/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.9.sdk/usr/include SourceFiles/mtproto/mtpConnection.h -o GeneratedFiles/Debug/moc_mtpConnection.cpp @@ -330,7 +330,7 @@ GeneratedFiles/Debug/moc_mtpSession.cpp: SourceFiles/mtproto/mtpConnection.h \ ../../Libraries/QtStatic/qtbase/include/QtCore/QReadWriteLock \ SourceFiles/logs.h \ SourceFiles/mtproto/mtpScheme.h \ - SourceFiles/mtproto/mtpPublicRSA.h \ + SourceFiles/mtproto/rsa_public_key.h \ SourceFiles/mtproto/mtpAuthKey.h \ SourceFiles/mtproto/mtpDC.h \ SourceFiles/mtproto/mtpRPC.h \