Always choose correct address for key creation.

This commit is contained in:
John Preston 2019-11-20 12:16:53 +03:00
parent 43bab3eeaa
commit 885738ac32
9 changed files with 267 additions and 145 deletions

View File

@ -7,8 +7,7 @@ https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
*/ */
#include "mtproto/connection.h" #include "mtproto/connection.h"
#include "mtproto/details/mtproto_dc_key_binder.h" #include "mtproto/details/mtproto_bound_key_creator.h"
#include "mtproto/details/mtproto_dc_key_creator.h"
#include "mtproto/details/mtproto_dump_to_text.h" #include "mtproto/details/mtproto_dump_to_text.h"
#include "mtproto/session.h" #include "mtproto/session.h"
#include "mtproto/mtproto_rsa_public_key.h" #include "mtproto/mtproto_rsa_public_key.h"
@ -202,7 +201,7 @@ int16 ConnectionPrivate::getProtocolDcId() const {
} }
void ConnectionPrivate::destroyAllConnections() { void ConnectionPrivate::destroyAllConnections() {
clearKeyCreatorOnFail(); clearUnboundKeyCreator();
_waitForBetterTimer.cancel(); _waitForBetterTimer.cancel();
_waitForReceivedTimer.cancel(); _waitForReceivedTimer.cancel();
_waitForConnectedTimer.cancel(); _waitForConnectedTimer.cancel();
@ -244,8 +243,7 @@ ConnectionPrivate::ConnectionPrivate(
} }
ConnectionPrivate::~ConnectionPrivate() { ConnectionPrivate::~ConnectionPrivate() {
clearKeyCreatorOnFail(); releaseKeyCreationOnFail();
cancelKeyBinder();
Expects(_finished); Expects(_finished);
Expects(!_connection); Expects(!_connection);
@ -445,7 +443,7 @@ void ConnectionPrivate::tryToSend() {
const auto needsLayer = !_sessionData->connectionInited(); const auto needsLayer = !_sessionData->connectionInited();
const auto state = getState(); const auto state = getState();
const auto sendOnlyFirstPing = (state != ConnectedState); const auto sendOnlyFirstPing = (state != ConnectedState);
const auto sendAll = !sendOnlyFirstPing && !_keyBinder; const auto sendAll = !sendOnlyFirstPing && !_keyCreator;
const auto isMainSession = (GetDcIdShift(_shiftedDcId) == 0); const auto isMainSession = (GetDcIdShift(_shiftedDcId) == 0);
if (sendOnlyFirstPing && !_pingIdToSend) { if (sendOnlyFirstPing && !_pingIdToSend) {
DEBUG_LOG(("MTP Info: dc %1 not sending, waiting for Connected state, state: %2").arg(_shiftedDcId).arg(state)); DEBUG_LOG(("MTP Info: dc %1 not sending, waiting for Connected state, state: %2").arg(_shiftedDcId).arg(state));
@ -459,10 +457,10 @@ void ConnectionPrivate::tryToSend() {
} }
const auto forceNewMsgId = sendAll const auto forceNewMsgId = sendAll
&& _sessionData->markSessionAsStarted(); && _sessionData->markSessionAsStarted();
if (forceNewMsgId && _keyCreator) {
if (forceNewMsgId) { _keyCreator->restartBinder();
int a = 0;
} }
auto pingRequest = SecureRequest(); auto pingRequest = SecureRequest();
auto ackRequest = SecureRequest(); auto ackRequest = SecureRequest();
auto resendRequest = SecureRequest(); auto resendRequest = SecureRequest();
@ -529,8 +527,8 @@ void ConnectionPrivate::tryToSend() {
httpWaitRequest = SecureRequest::Serialize(MTPHttpWait( httpWaitRequest = SecureRequest::Serialize(MTPHttpWait(
MTP_http_wait(MTP_int(100), MTP_int(30), MTP_int(25000)))); MTP_http_wait(MTP_int(100), MTP_int(30), MTP_int(25000))));
} }
if (_keyBinder && !_keyBinder->requested()) { if (_keyCreator && _keyCreator->bindReadyToRequest()) {
bindDcKeyRequest = _keyBinder->prepareRequest( bindDcKeyRequest = _keyCreator->prepareBindRequest(
_temporaryKey, _temporaryKey,
_sessionData->getSessionId()); _sessionData->getSessionId());
@ -857,14 +855,13 @@ void ConnectionPrivate::connectToServer(bool afterConfig) {
_connectionOptions = std::make_unique<ConnectionOptions>( _connectionOptions = std::make_unique<ConnectionOptions>(
_sessionData->connectionOptions()); _sessionData->connectionOptions());
// #TODO race. tryAcquireKeyCreation();
const auto hasKey = (_sessionData->getTemporaryKey() != nullptr);
const auto bareDc = BareDcId(_shiftedDcId); const auto bareDc = BareDcId(_shiftedDcId);
_dcType = _instance->dcOptions()->dcType(_shiftedDcId); _dcType = _instance->dcOptions()->dcType(_shiftedDcId);
// Use media_only addresses only if key for this dc is already created. // Use media_only addresses only if key for this dc is already created.
if (_dcType == DcType::MediaDownload && !hasKey) { if (_dcType == DcType::MediaDownload && _keyCreator) {
_dcType = DcType::Regular; _dcType = DcType::Regular;
} else if (_dcType == DcType::Cdn && !_instance->isKeysDestroyer()) { } else if (_dcType == DcType::Cdn && !_instance->isKeysDestroyer()) {
if (!_instance->dcOptions()->hasCDNKeysForDc(bareDc)) { if (!_instance->dcOptions()->hasCDNKeysForDc(bareDc)) {
@ -1790,7 +1787,7 @@ ConnectionPrivate::HandleResult ConnectionPrivate::handleOneReceived(const mtpPr
memcpy(response.data(), from, (end - from) * sizeof(mtpPrime)); memcpy(response.data(), from, (end - from) * sizeof(mtpPrime));
} }
if (typeId == mtpc_rpc_error) { if (typeId == mtpc_rpc_error) {
if (DcKeyBinder::IsDestroyedTemporaryKeyError(response)) { if (IsDestroyedTemporaryKeyError(response)) {
return HandleResult::DestroyTemporaryKey; return HandleResult::DestroyTemporaryKey;
} }
// An error could be some RPC_CALL_FAIL or other error inside // An error could be some RPC_CALL_FAIL or other error inside
@ -1801,22 +1798,22 @@ ConnectionPrivate::HandleResult ConnectionPrivate::handleOneReceived(const mtpPr
} }
requestsAcked(ids, true); requestsAcked(ids, true);
if (_keyBinder) { if (_keyCreator) {
const auto result = _keyBinder->handleResponse( const auto result = _keyCreator->handleBindResponse(
reqMsgId, reqMsgId,
response); response);
if (result == DcKeyBindState::Success) { if (result == DcKeyBindState::Success) {
_sessionData->releaseKeyCreationOnDone( _sessionData->releaseKeyCreationOnDone(
_temporaryKey, _temporaryKey,
base::take(_keyBinder)->persistentKey()); base::take(_keyCreator)->bindPersistentKey());
_sessionData->queueNeedToResumeAndSend(); _sessionData->queueNeedToResumeAndSend();
return HandleResult::Success; return HandleResult::Success;
} else if (result == DcKeyBindState::Failed } else if (result == DcKeyBindState::Failed
|| result == DcKeyBindState::DefinitelyDestroyed) { || result == DcKeyBindState::DefinitelyDestroyed) {
// #TODO maybe destroy persistent key // #TODO maybe destroy persistent key
// crl::on_main( // crl::on_main(
// _keyBinder->persistentKey()->setLastCheckTime(crl::now()); // _keyCreator->bindPersistentKey()->setLastCheckTime(crl::now());
// instance->keyDestroyedOnServer(BareDcId(shiftedDcId), base::take(_keyBinder)->persistentKey()->keyId()); // instance->keyDestroyedOnServer(BareDcId(shiftedDcId), base::take(_keyCreator)->bindPersistentKey()->keyId());
// ) // )
_sessionData->queueNeedToResumeAndSend(); _sessionData->queueNeedToResumeAndSend();
return HandleResult::Success; return HandleResult::Success;
@ -2251,9 +2248,6 @@ void ConnectionPrivate::removeTestConnection(
} }
void ConnectionPrivate::checkAuthKey() { void ConnectionPrivate::checkAuthKey() {
Expects(_keyCreator == nullptr);
Expects(_keyBinder == nullptr || _keyId != 0);
if (_keyId) { if (_keyId) {
authKeyChecked(); authKeyChecked();
} else { } else {
@ -2262,7 +2256,7 @@ void ConnectionPrivate::checkAuthKey() {
} }
void ConnectionPrivate::updateAuthKey() { void ConnectionPrivate::updateAuthKey() {
if (_keyCreator || _keyBinder) { if (_keyCreator) {
return; return;
} }
@ -2316,67 +2310,69 @@ void ConnectionPrivate::applyAuthKey(AuthKeyPtr &&temporaryKey) {
// We are here to destroy an old key, so we're done. // We are here to destroy an old key, so we're done.
LOG(("MTP Error: No key %1 in updateAuthKey() for destroying.").arg(_shiftedDcId)); LOG(("MTP Error: No key %1 in updateAuthKey() for destroying.").arg(_shiftedDcId));
_instance->checkIfKeyWasDestroyed(_shiftedDcId); _instance->checkIfKeyWasDestroyed(_shiftedDcId);
return; } else if (_keyCreator) {
} else if (!_sessionData->acquireKeyCreation()) { DEBUG_LOG(("AuthKey Info: No key in updateAuthKey(), creating."));
_keyCreator->start(
BareDcId(_shiftedDcId),
getProtocolDcId(),
_connection.get(),
_instance->dcOptions());
} else {
DEBUG_LOG(("AuthKey Info: No key in updateAuthKey(), but someone is creating already.")); DEBUG_LOG(("AuthKey Info: No key in updateAuthKey(), but someone is creating already."));
}
}
void ConnectionPrivate::tryAcquireKeyCreation() {
if (_keyCreator || !_sessionData->acquireKeyCreation()) {
return; return;
} }
DEBUG_LOG(("AuthKey Info: No key in updateAuthKey(), creating.")); using Result = DcKeyResult;
createDcKey(); using Error = DcKeyError;
} auto delegate = BoundKeyCreator::Delegate();
delegate.unboundReady = [=](base::expected<Result, Error> result) {
void ConnectionPrivate::createDcKey() { if (!result) {
Expects(_keyCreator == nullptr); releaseKeyCreationOnFail();
Expects(_keyBinder == nullptr); if (result.error() == Error::UnknownPublicKey) {
if (_dcType == DcType::Cdn) {
using Result = DcKeyCreator::Result; LOG(("Warning: CDN public RSA key not found"));
using Error = DcKeyCreator::Error; requestCDNConfig();
auto delegate = DcKeyCreator::Delegate(); return;
delegate.done = [=](base::expected<Result, Error> result) { }
if (result) { LOG(("AuthKey Error: could not choose public RSA key"));
DEBUG_LOG(("AuthKey Info: auth key gen succeed, "
"ids: (%1, %2) server salts: (%3, %4)"
).arg(result->temporaryKey
? result->temporaryKey->keyId()
: 0
).arg(result->persistentKey
? result->persistentKey->keyId()
: 0
).arg(result->temporaryServerSalt
).arg(result->persistentServerSalt));
_sessionData->setSalt(result->temporaryServerSalt);
if (result->persistentKey) {
_sessionData->clearForNewKey(_instance);
} }
restart();
auto key = result->persistentKey
? std::move(result->persistentKey)
: _sessionData->getPersistentKey();
if (!key) {
restart();
}
_keyCreator = nullptr;
_keyBinder = std::make_unique<DcKeyBinder>(std::move(key));
result->temporaryKey->setExpiresAt(base::unixtime::now()
+ kTemporaryExpiresIn
+ kBindKeyAdditionalExpiresTimeout);
applyAuthKey(std::move(result->temporaryKey));
return; return;
} }
clearKeyCreatorOnFail(); DEBUG_LOG(("AuthKey Info: unbound key creation succeed, "
if (result.error() == Error::UnknownPublicKey) { "ids: (%1, %2) server salts: (%3, %4)"
if (_dcType == DcType::Cdn) { ).arg(result->temporaryKey
LOG(("Warning: CDN public RSA key not found")); ? result->temporaryKey->keyId()
requestCDNConfig(); : 0
} else { ).arg(result->persistentKey
LOG(("AuthKey Error: could not choose public RSA key")); ? result->persistentKey->keyId()
restart(); : 0
} ).arg(result->temporaryServerSalt
} else { ).arg(result->persistentServerSalt));
restart();
_sessionData->setSalt(result->temporaryServerSalt);
if (result->persistentKey) {
_sessionData->clearForNewKey(_instance);
} }
auto key = result->persistentKey
? std::move(result->persistentKey)
: _sessionData->getPersistentKey();
if (!key) {
releaseKeyCreationOnFail();
restart();
return;
}
result->temporaryKey->setExpiresAt(base::unixtime::now()
+ kTemporaryExpiresIn
+ kBindKeyAdditionalExpiresTimeout);
_keyCreator->bind(std::move(key));
applyAuthKey(std::move(result->temporaryKey));
}; };
delegate.sentSome = [=](uint64 size) { delegate.sentSome = [=](uint64 size) {
onSentSome(size); onSentSome(size);
@ -2384,17 +2380,14 @@ void ConnectionPrivate::createDcKey() {
delegate.receivedSome = [=] { delegate.receivedSome = [=] {
onReceivedSome(); onReceivedSome();
}; };
// const auto check = (GetDcIdShift(_shiftedDcId) == kCheckKeyDcShift); // #TODO remove kCheckKeyDcShift
auto request = DcKeyCreator::Request(); // const auto check = (GetDcIdShift(_shiftedDcId) == kCheckKeyDcShift); // #TODO remove kCheckKeyDcShift
auto request = DcKeyRequest();
request.persistentNeeded = !_sessionData->getPersistentKey(); request.persistentNeeded = !_sessionData->getPersistentKey();
request.temporaryExpiresIn = kTemporaryExpiresIn; request.temporaryExpiresIn = kTemporaryExpiresIn;
_keyCreator = std::make_unique<DcKeyCreator>( _keyCreator = std::make_unique<BoundKeyCreator>(
BareDcId(_shiftedDcId), request,
getProtocolDcId(), std::move(delegate));
_connection.get(),
_instance->dcOptions(),
std::move(delegate),
request);
} }
void ConnectionPrivate::authKeyChecked() { void ConnectionPrivate::authKeyChecked() {
@ -2449,7 +2442,7 @@ void ConnectionPrivate::handleError(int errorCode) {
} }
void ConnectionPrivate::destroyTemporaryKey() { void ConnectionPrivate::destroyTemporaryKey() {
cancelKeyBinder(); releaseKeyCreationOnFail();
if (_temporaryKey) { if (_temporaryKey) {
_sessionData->destroyTemporaryKey(_temporaryKey->keyId()); _sessionData->destroyTemporaryKey(_temporaryKey->keyId());
} }
@ -2566,7 +2559,13 @@ mtpRequestId ConnectionPrivate::wasSent(mtpMsgId msgId) const {
return 0; return 0;
} }
void ConnectionPrivate::clearKeyCreatorOnFail() { void ConnectionPrivate::clearUnboundKeyCreator() {
if (_keyCreator) {
_keyCreator->stop();
}
}
void ConnectionPrivate::releaseKeyCreationOnFail() {
if (!_keyCreator) { if (!_keyCreator) {
return; return;
} }
@ -2574,14 +2573,6 @@ void ConnectionPrivate::clearKeyCreatorOnFail() {
_sessionData->releaseKeyCreationOnFail(); _sessionData->releaseKeyCreationOnFail();
} }
void ConnectionPrivate::cancelKeyBinder() {
if (!_keyBinder) {
return;
}
_keyBinder = nullptr;
_sessionData->releaseKeyCreationOnFail();
}
void ConnectionPrivate::stop() { void ConnectionPrivate::stop() {
} }

View File

@ -16,8 +16,7 @@ https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
namespace MTP { namespace MTP {
namespace details { namespace details {
class DcKeyCreator; class BoundKeyCreator;
class DcKeyBinder;
} // namespace details } // namespace details
// How much time to wait for some more requests, when sending msg acks. // How much time to wait for some more requests, when sending msg acks.
@ -179,13 +178,13 @@ private:
crl::time msCanWait = 0, crl::time msCanWait = 0,
bool forceContainer = false); bool forceContainer = false);
void createDcKey(); void tryAcquireKeyCreation();
void resetSession(); void resetSession();
void checkAuthKey(); void checkAuthKey();
void authKeyChecked(); void authKeyChecked();
void destroyTemporaryKey(); void destroyTemporaryKey();
void clearKeyCreatorOnFail(); void clearUnboundKeyCreator();
void cancelKeyBinder(); void releaseKeyCreationOnFail();
void applyAuthKey(AuthKeyPtr &&temporaryKey); void applyAuthKey(AuthKeyPtr &&temporaryKey);
const not_null<Instance*> _instance; const not_null<Instance*> _instance;
@ -232,8 +231,7 @@ private:
std::shared_ptr<SessionData> _sessionData; std::shared_ptr<SessionData> _sessionData;
std::unique_ptr<ConnectionOptions> _connectionOptions; std::unique_ptr<ConnectionOptions> _connectionOptions;
std::unique_ptr<details::DcKeyCreator> _keyCreator; std::unique_ptr<details::BoundKeyCreator> _keyCreator;
std::unique_ptr<details::DcKeyBinder> _keyBinder;
}; };

View File

@ -0,0 +1,92 @@
/*
This file is part of Telegram Desktop,
the official desktop application for the Telegram messaging service.
For license and copyright information please follow this link:
https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
*/
#include "mtproto/details/mtproto_bound_key_creator.h"
namespace MTP::details {
BoundKeyCreator::BoundKeyCreator(DcKeyRequest request, Delegate delegate)
: _request(request)
, _delegate(std::move(delegate)) {
}
void BoundKeyCreator::start(
DcId dcId,
int16 protocolDcId,
not_null<AbstractConnection*> connection,
not_null<DcOptions*> dcOptions) {
Expects(!_creator.has_value());
auto delegate = DcKeyCreator::Delegate();
delegate.done = _delegate.unboundReady;
delegate.sentSome = _delegate.sentSome;
delegate.receivedSome = _delegate.receivedSome;
_creator.emplace(
dcId,
protocolDcId,
connection,
dcOptions,
std::move(delegate),
_request);
}
void BoundKeyCreator::stop() {
_creator = std::nullopt;
}
void BoundKeyCreator::bind(AuthKeyPtr &&persistentKey) {
stop();
_binder.emplace(std::move(persistentKey));
}
void BoundKeyCreator::restartBinder() {
if (_binder) {
_binder.emplace(_binder->persistentKey());
}
}
bool BoundKeyCreator::bindReadyToRequest() const {
return _binder ? !_binder->requested() : false;
}
SecureRequest BoundKeyCreator::prepareBindRequest(
const AuthKeyPtr &temporaryKey,
uint64 sessionId) {
Expects(_binder.has_value());
return _binder->prepareRequest(temporaryKey, sessionId);
}
DcKeyBindState BoundKeyCreator::handleBindResponse(
MTPlong requestMsgId,
const mtpBuffer &response) {
return _binder
? _binder->handleResponse(requestMsgId, response)
: DcKeyBindState::Unknown;
}
AuthKeyPtr BoundKeyCreator::bindPersistentKey() const {
Expects(_binder.has_value());
return _binder->persistentKey();
}
bool IsDestroyedTemporaryKeyError(const mtpBuffer &buffer) {
auto from = buffer.data();
const auto end = from + buffer.size();
auto error = MTPRpcError();
if (!error.read(from, from + buffer.size())) {
return false;
}
return error.match([&](const MTPDrpc_error &data) {
return (data.verror_code().v == 401)
&& (data.verror_message().v == "AUTH_KEY_PERM_EMPTY");
});
}
} // namespace MTP::details

View File

@ -0,0 +1,55 @@
/*
This file is part of Telegram Desktop,
the official desktop application for the Telegram messaging service.
For license and copyright information please follow this link:
https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
*/
#pragma once
#include "mtproto/details/mtproto_dc_key_creator.h"
#include "mtproto/details/mtproto_dc_key_binder.h"
namespace MTP::details {
class BoundKeyCreator final {
public:
struct Delegate {
Fn<void(base::expected<DcKeyResult, DcKeyError>)> unboundReady;
Fn<void(uint64)> sentSome;
Fn<void()> receivedSome;
};
BoundKeyCreator(DcKeyRequest request, Delegate delegate);
void start(
DcId dcId,
int16 protocolDcId,
not_null<AbstractConnection*> connection,
not_null<DcOptions*> dcOptions);
void stop();
void bind(AuthKeyPtr &&persistentKey);
void restartBinder();
[[nodiscard]] bool bindReadyToRequest() const;
[[nodiscard]] SecureRequest prepareBindRequest(
const AuthKeyPtr &temporaryKey,
uint64 sessionId);
[[nodiscard]] DcKeyBindState handleBindResponse(
MTPlong requestMsgId,
const mtpBuffer &response);
[[nodiscard]] AuthKeyPtr bindPersistentKey() const;
private:
const DcKeyRequest _request;
Delegate _delegate;
std::optional<DcKeyCreator> _creator;
std::optional<DcKeyBinder> _binder;
};
[[nodiscard]] bool IsDestroyedTemporaryKeyError(const mtpBuffer &buffer);
} // namespace MTP::details

View File

@ -140,18 +140,4 @@ AuthKeyPtr DcKeyBinder::persistentKey() const {
return _persistentKey; return _persistentKey;
} }
bool DcKeyBinder::IsDestroyedTemporaryKeyError(
const mtpBuffer &buffer) {
auto from = buffer.data();
const auto end = from + buffer.size();
auto error = MTPRpcError();
if (!error.read(from, from + buffer.size())) {
return false;
}
return error.match([&](const MTPDrpc_error &data) {
return (data.verror_code().v == 401)
&& (data.verror_message().v == "AUTH_KEY_PERM_EMPTY");
});
}
} // namespace MTP::details } // namespace MTP::details

View File

@ -25,7 +25,7 @@ enum class DcKeyBindState {
class DcKeyBinder final { class DcKeyBinder final {
public: public:
DcKeyBinder(AuthKeyPtr &&persistentKey); explicit DcKeyBinder(AuthKeyPtr &&persistentKey);
[[nodiscard]] bool requested() const; [[nodiscard]] bool requested() const;
[[nodiscard]] SecureRequest prepareRequest( [[nodiscard]] SecureRequest prepareRequest(
@ -36,9 +36,6 @@ public:
const mtpBuffer &response); const mtpBuffer &response);
[[nodiscard]] AuthKeyPtr persistentKey() const; [[nodiscard]] AuthKeyPtr persistentKey() const;
[[nodiscard]] static bool IsDestroyedTemporaryKeyError(
const mtpBuffer &buffer);
private: private:
AuthKeyPtr _persistentKey; AuthKeyPtr _persistentKey;
mtpMsgId _requestMsgId = 0; mtpMsgId _requestMsgId = 0;

View File

@ -169,7 +169,7 @@ DcKeyCreator::DcKeyCreator(
not_null<AbstractConnection*> connection, not_null<AbstractConnection*> connection,
not_null<DcOptions*> dcOptions, not_null<DcOptions*> dcOptions,
Delegate delegate, Delegate delegate,
Request request) DcKeyRequest request)
: _connection(connection) : _connection(connection)
, _dcOptions(dcOptions) , _dcOptions(dcOptions)
, _dcId(dcId) , _dcId(dcId)
@ -313,7 +313,7 @@ void DcKeyCreator::pqAnswered(
_dcId, _dcId,
data.vserver_public_key_fingerprints().v); data.vserver_public_key_fingerprints().v);
if (!rsaKey.valid()) { if (!rsaKey.valid()) {
return failed(Error::UnknownPublicKey); return failed(DcKeyError::UnknownPublicKey);
} }
attempt->data.server_nonce = data.vserver_nonce(); attempt->data.server_nonce = data.vserver_nonce();
@ -596,7 +596,7 @@ void DcKeyCreator::dhClientParamsAnswered(
}); });
} }
void DcKeyCreator::failed(Error error) { void DcKeyCreator::failed(DcKeyError error) {
stopReceiving(); stopReceiving();
auto onstack = base::take(_delegate.done); auto onstack = base::take(_delegate.done);
onstack(tl::unexpected(error)); onstack(tl::unexpected(error));
@ -610,7 +610,7 @@ void DcKeyCreator::done() {
Assert(_temporary.stage == Stage::Ready); Assert(_temporary.stage == Stage::Ready);
Assert(_persistent.stage == Stage::Ready || _persistent.stage == Stage::None); Assert(_persistent.stage == Stage::Ready || _persistent.stage == Stage::None);
auto result = Result(); auto result = DcKeyResult();
result.temporaryKey = std::make_shared<AuthKey>( result.temporaryKey = std::make_shared<AuthKey>(
AuthKey::Type::Temporary, AuthKey::Type::Temporary,
_dcId, _dcId,

View File

@ -21,24 +21,27 @@ namespace MTP::details {
using namespace ::MTP::internal; using namespace ::MTP::internal;
struct DcKeyRequest {
TimeId temporaryExpiresIn = 0;
bool persistentNeeded = false;
};
enum class DcKeyError {
UnknownPublicKey,
Other,
};
struct DcKeyResult {
AuthKeyPtr persistentKey;
AuthKeyPtr temporaryKey;
uint64 temporaryServerSalt = 0;
uint64 persistentServerSalt = 0;
};
class DcKeyCreator final { class DcKeyCreator final {
public: public:
struct Request {
TimeId temporaryExpiresIn = 0;
bool persistentNeeded = false;
};
enum class Error {
UnknownPublicKey,
Other,
};
struct Result {
AuthKeyPtr persistentKey;
AuthKeyPtr temporaryKey;
uint64 temporaryServerSalt = 0;
uint64 persistentServerSalt = 0;
};
struct Delegate { struct Delegate {
FnMut<void(base::expected<Result, Error>)> done; Fn<void(base::expected<DcKeyResult, DcKeyError>)> done;
Fn<void(uint64)> sentSome; Fn<void(uint64)> sentSome;
Fn<void()> receivedSome; Fn<void()> receivedSome;
}; };
@ -49,7 +52,7 @@ public:
not_null<AbstractConnection*> connection, not_null<AbstractConnection*> connection,
not_null<DcOptions*> dcOptions, not_null<DcOptions*> dcOptions,
Delegate delegate, Delegate delegate,
Request request); DcKeyRequest request);
~DcKeyCreator(); ~DcKeyCreator();
private: private:
@ -120,21 +123,19 @@ private:
const MTPset_client_DH_params_answer &data); const MTPset_client_DH_params_answer &data);
void stopReceiving(); void stopReceiving();
void failed(Error error = Error::Other); void failed(DcKeyError error = DcKeyError::Other);
void done(); void done();
const not_null<AbstractConnection*> _connection; const not_null<AbstractConnection*> _connection;
const not_null<DcOptions*> _dcOptions; const not_null<DcOptions*> _dcOptions;
const DcId _dcId = 0; const DcId _dcId = 0;
const int16 _protocolDcId = 0; const int16 _protocolDcId = 0;
const Request _request; const DcKeyRequest _request;
Delegate _delegate; Delegate _delegate;
Attempt _temporary; Attempt _temporary;
Attempt _persistent; Attempt _persistent;
FnMut<void(base::expected<Result, Error>)> _done;
}; };
} // namespace MTP::details } // namespace MTP::details

View File

@ -34,6 +34,8 @@
'<(src_loc)', '<(src_loc)',
], ],
'sources': [ 'sources': [
'<(src_loc)/mtproto/details/mtproto_bound_key_creator.cpp',
'<(src_loc)/mtproto/details/mtproto_bound_key_creator.h',
'<(src_loc)/mtproto/details/mtproto_dc_key_binder.cpp', '<(src_loc)/mtproto/details/mtproto_dc_key_binder.cpp',
'<(src_loc)/mtproto/details/mtproto_dc_key_binder.h', '<(src_loc)/mtproto/details/mtproto_dc_key_binder.h',
'<(src_loc)/mtproto/details/mtproto_dc_key_creator.cpp', '<(src_loc)/mtproto/details/mtproto_dc_key_creator.cpp',