mirror of https://github.com/procxx/kepka.git
Refactor DC configuration
This commit is contained in:
parent
bbd77096d5
commit
792a88d064
|
@ -447,6 +447,7 @@ add_executable(Kepka WIN32 MACOSX_BUNDLE
|
||||||
SourceFiles/app.cpp
|
SourceFiles/app.cpp
|
||||||
SourceFiles/application.cpp
|
SourceFiles/application.cpp
|
||||||
SourceFiles/auth_session.cpp
|
SourceFiles/auth_session.cpp
|
||||||
|
SourceFiles/config.cpp
|
||||||
SourceFiles/facades.cpp
|
SourceFiles/facades.cpp
|
||||||
SourceFiles/layerwidget.cpp
|
SourceFiles/layerwidget.cpp
|
||||||
SourceFiles/layout.cpp
|
SourceFiles/layout.cpp
|
||||||
|
|
|
@ -0,0 +1,73 @@
|
||||||
|
//
|
||||||
|
// This file is part of Kepka,
|
||||||
|
// an unofficial desktop version of Telegram messaging app,
|
||||||
|
// see https://github.com/procxx/kepka
|
||||||
|
//
|
||||||
|
// Kepka is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// It is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU General Public License for more details.
|
||||||
|
//
|
||||||
|
// In addition, as a special exception, the copyright holders give permission
|
||||||
|
// to link the code of portions of this program with the OpenSSL library.
|
||||||
|
//
|
||||||
|
// Full license: https://github.com/procxx/kepka/blob/master/LICENSE
|
||||||
|
// Copyright (c) 2018- Kepka Contributors, https://github.com/procxx
|
||||||
|
//
|
||||||
|
|
||||||
|
#include "config.h"
|
||||||
|
#include "core/utils.h"
|
||||||
|
|
||||||
|
const char **cPublicRSAKeys(size_t &keysCount) {
|
||||||
|
static const char *(keys[]) = {
|
||||||
|
"\
|
||||||
|
-----BEGIN RSA PUBLIC KEY-----\n\
|
||||||
|
MIIBCgKCAQEAwVACPi9w23mF3tBkdZz+zwrzKOaaQdr01vAbU4E1pvkfj4sqDsm6\n\
|
||||||
|
lyDONS789sVoD/xCS9Y0hkkC3gtL1tSfTlgCMOOul9lcixlEKzwKENj1Yz/s7daS\n\
|
||||||
|
an9tqw3bfUV/nqgbhGX81v/+7RFAEd+RwFnK7a+XYl9sluzHRyVVaTTveB2GazTw\n\
|
||||||
|
Efzk2DWgkBluml8OREmvfraX3bkHZJTKX4EQSjBbbdJ2ZXIsRrYOXfaA+xayEGB+\n\
|
||||||
|
8hdlLmAjbCVfaigxX0CDqWeR1yFL9kwd9P0NsZRPsmoqVwMbMu7mStFai6aIhc3n\n\
|
||||||
|
Slv8kg9qv1m6XHVQY3PnEw+QQtqSIXklHwIDAQAB\n\
|
||||||
|
-----END RSA PUBLIC KEY-----"};
|
||||||
|
keysCount = base::array_size(keys);
|
||||||
|
return keys;
|
||||||
|
}
|
||||||
|
|
||||||
|
static const BuiltInDc _builtInDcs[] = {{1, "149.154.175.50", 443},
|
||||||
|
{2, "149.154.167.51", 443},
|
||||||
|
{3, "149.154.175.100", 443},
|
||||||
|
{4, "149.154.167.91", 443},
|
||||||
|
{5, "149.154.171.5", 443}};
|
||||||
|
|
||||||
|
static const BuiltInDc _builtInDcsIPv6[] = {{1, "2001:b28:f23d:f001::a", 443},
|
||||||
|
{2, "2001:67c:4e8:f002::a", 443},
|
||||||
|
{3, "2001:b28:f23d:f003::a", 443},
|
||||||
|
{4, "2001:67c:4e8:f004::a", 443},
|
||||||
|
{5, "2001:b28:f23f:f005::a", 443}};
|
||||||
|
|
||||||
|
static const BuiltInDc _builtInTestDcs[] = {
|
||||||
|
{1, "149.154.175.10", 443}, {2, "149.154.167.40", 443}, {3, "149.154.175.117", 443}};
|
||||||
|
|
||||||
|
static const BuiltInDc _builtInTestDcsIPv6[] = {
|
||||||
|
{1, "2001:b28:f23d:f001::e", 443}, {2, "2001:67c:4e8:f002::e", 443}, {3, "2001:b28:f23d:f003::e", 443}};
|
||||||
|
|
||||||
|
const BuiltInDc *builtInDcs() {
|
||||||
|
return cTestMode() ? _builtInTestDcs : _builtInDcs;
|
||||||
|
}
|
||||||
|
|
||||||
|
int builtInDcsCount() {
|
||||||
|
return (cTestMode() ? sizeof(_builtInTestDcs) : sizeof(_builtInDcs)) / sizeof(BuiltInDc);
|
||||||
|
}
|
||||||
|
|
||||||
|
const BuiltInDc *builtInDcsIPv6() {
|
||||||
|
return cTestMode() ? _builtInTestDcsIPv6 : _builtInDcsIPv6;
|
||||||
|
}
|
||||||
|
|
||||||
|
int builtInDcsCountIPv6() {
|
||||||
|
return (cTestMode() ? sizeof(_builtInTestDcsIPv6) : sizeof(_builtInDcsIPv6)) / sizeof(BuiltInDc);
|
||||||
|
}
|
|
@ -174,19 +174,7 @@ inline const char *cGUIDStr() {
|
||||||
return gGuidStr;
|
return gGuidStr;
|
||||||
}
|
}
|
||||||
|
|
||||||
inline const char **cPublicRSAKeys(size_t &keysCount) {
|
const char **cPublicRSAKeys(size_t &keysCount);
|
||||||
static const char *(keys[]) = {"\
|
|
||||||
-----BEGIN RSA PUBLIC KEY-----\n\
|
|
||||||
MIIBCgKCAQEAwVACPi9w23mF3tBkdZz+zwrzKOaaQdr01vAbU4E1pvkfj4sqDsm6\n\
|
|
||||||
lyDONS789sVoD/xCS9Y0hkkC3gtL1tSfTlgCMOOul9lcixlEKzwKENj1Yz/s7daS\n\
|
|
||||||
an9tqw3bfUV/nqgbhGX81v/+7RFAEd+RwFnK7a+XYl9sluzHRyVVaTTveB2GazTw\n\
|
|
||||||
Efzk2DWgkBluml8OREmvfraX3bkHZJTKX4EQSjBbbdJ2ZXIsRrYOXfaA+xayEGB+\n\
|
|
||||||
8hdlLmAjbCVfaigxX0CDqWeR1yFL9kwd9P0NsZRPsmoqVwMbMu7mStFai6aIhc3n\n\
|
|
||||||
Slv8kg9qv1m6XHVQY3PnEw+QQtqSIXklHwIDAQAB\n\
|
|
||||||
-----END RSA PUBLIC KEY-----"};
|
|
||||||
keysCount = base::array_size(keys);
|
|
||||||
return keys;
|
|
||||||
}
|
|
||||||
|
|
||||||
struct BuiltInDc {
|
struct BuiltInDc {
|
||||||
int id;
|
int id;
|
||||||
|
@ -194,49 +182,13 @@ struct BuiltInDc {
|
||||||
int port;
|
int port;
|
||||||
};
|
};
|
||||||
|
|
||||||
static const BuiltInDc _builtInDcs[] = {
|
const BuiltInDc *builtInDcs();
|
||||||
{ 1, "149.154.175.50", 443 },
|
|
||||||
{ 2, "149.154.167.51", 443 },
|
|
||||||
{ 3, "149.154.175.100", 443 },
|
|
||||||
{ 4, "149.154.167.91", 443 },
|
|
||||||
{ 5, "149.154.171.5", 443 }
|
|
||||||
};
|
|
||||||
|
|
||||||
static const BuiltInDc _builtInDcsIPv6[] = {
|
int builtInDcsCount();
|
||||||
{ 1, "2001:b28:f23d:f001::a", 443 },
|
|
||||||
{ 2, "2001:67c:4e8:f002::a", 443 },
|
|
||||||
{ 3, "2001:b28:f23d:f003::a", 443 },
|
|
||||||
{ 4, "2001:67c:4e8:f004::a", 443 },
|
|
||||||
{ 5, "2001:b28:f23f:f005::a", 443 }
|
|
||||||
};
|
|
||||||
|
|
||||||
static const BuiltInDc _builtInTestDcs[] = {
|
const BuiltInDc *builtInDcsIPv6();
|
||||||
{ 1, "149.154.175.10", 443 },
|
|
||||||
{ 2, "149.154.167.40", 443 },
|
|
||||||
{ 3, "149.154.175.117", 443 }
|
|
||||||
};
|
|
||||||
|
|
||||||
static const BuiltInDc _builtInTestDcsIPv6[] = {
|
int builtInDcsCountIPv6();
|
||||||
{ 1, "2001:b28:f23d:f001::e", 443 },
|
|
||||||
{ 2, "2001:67c:4e8:f002::e", 443 },
|
|
||||||
{ 3, "2001:b28:f23d:f003::e", 443 }
|
|
||||||
};
|
|
||||||
|
|
||||||
inline const BuiltInDc *builtInDcs() {
|
|
||||||
return cTestMode() ? _builtInTestDcs : _builtInDcs;
|
|
||||||
}
|
|
||||||
|
|
||||||
inline int builtInDcsCount() {
|
|
||||||
return (cTestMode() ? sizeof(_builtInTestDcs) : sizeof(_builtInDcs)) / sizeof(BuiltInDc);
|
|
||||||
}
|
|
||||||
|
|
||||||
inline const BuiltInDc *builtInDcsIPv6() {
|
|
||||||
return cTestMode() ? _builtInTestDcsIPv6 : _builtInDcsIPv6;
|
|
||||||
}
|
|
||||||
|
|
||||||
inline int builtInDcsCountIPv6() {
|
|
||||||
return (cTestMode() ? sizeof(_builtInTestDcsIPv6) : sizeof(_builtInDcsIPv6)) / sizeof(BuiltInDc);
|
|
||||||
}
|
|
||||||
|
|
||||||
static const char *UpdatesPublicKey = "\
|
static const char *UpdatesPublicKey = "\
|
||||||
-----BEGIN RSA PUBLIC KEY-----\n\
|
-----BEGIN RSA PUBLIC KEY-----\n\
|
||||||
|
|
|
@ -64,6 +64,13 @@ void AuthKey::prepareAES_oldmtp(const MTPint128 &msgKey, MTPint256 &aesKey, MTPi
|
||||||
memcpy(iv + 12 + 8 + 4, sha1_d, 8);
|
memcpy(iv + 12 + 8 + 4, sha1_d, 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void AuthKey::countKeyId() {
|
||||||
|
auto sha1 = hashSha1(_key.data(), _key.size());
|
||||||
|
|
||||||
|
// Lower 64 bits = 8 bytes of 20 byte SHA1 hash.
|
||||||
|
_keyId = *reinterpret_cast<KeyId *>(sha1.data() + 12);
|
||||||
|
}
|
||||||
|
|
||||||
void AuthKey::prepareAES(const MTPint128 &msgKey, MTPint256 &aesKey, MTPint256 &aesIV, bool send) const {
|
void AuthKey::prepareAES(const MTPint128 &msgKey, MTPint256 &aesKey, MTPint256 &aesIV, bool send) const {
|
||||||
quint32 x = send ? 0 : 8;
|
quint32 x = send ? 0 : 8;
|
||||||
|
|
||||||
|
|
|
@ -98,12 +98,7 @@ public:
|
||||||
}
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
void countKeyId() {
|
void countKeyId();
|
||||||
auto sha1 = hashSha1(_key.data(), _key.size());
|
|
||||||
|
|
||||||
// Lower 64 bits = 8 bytes of 20 byte SHA1 hash.
|
|
||||||
_keyId = *reinterpret_cast<KeyId *>(sha1.data() + 12);
|
|
||||||
}
|
|
||||||
|
|
||||||
Type _type = Type::Generated;
|
Type _type = Type::Generated;
|
||||||
DcId _dcId = 0;
|
DcId _dcId = 0;
|
||||||
|
|
Loading…
Reference in New Issue