def pack(data: Object) -> bytes: return ( bytes(8) + Long(MsgId()) + Int(len(data.write())) + data.write() )
def pack(self, data: Object) -> bytes: return ( bytes(8) + Long(self.msg_id()) + Int(len(data.write())) + data.write() )
def pack(self, message: Message): data = Long(self.current_salt.salt) + self.session_id + message.write() padding = urandom(-(len(data) + 12) % 16 + 12) # 88 = 88 + 0 (outgoing message) msg_key_large = sha256(self.auth_key[88: 88 + 32] + data + padding).digest() msg_key = msg_key_large[8:24] aes_key, aes_iv = KDF(self.auth_key, msg_key, True) return self.auth_key_id + msg_key + AES.ige_encrypt(data + padding, aes_key, aes_iv)
def pack(message: Message, salt: int, session_id: bytes, auth_key: bytes, auth_key_id: bytes) -> bytes: data = Long(salt) + session_id + message.write() padding = urandom(-(len(data) + 12) % 16 + 12) # 88 = 88 + 0 (outgoing message) msg_key_large = sha256(auth_key[88:88 + 32] + data + padding).digest() msg_key = msg_key_large[8:24] aes_key, aes_iv = KDF(auth_key, msg_key, True) return auth_key_id + msg_key + AES.ige256_encrypt( data + padding, aes_key, aes_iv)
def pack(self, message: Message): data = Long(self.current_salt.salt) + self.session_id + message.write() # MTProto 2.0 requires a minimum of 12 padding bytes. # I don't get why it says up to 1024 when what it actually needs after the # required 12 bytes is just extra 0..15 padding bytes for aes # TODO: It works, but recheck this. What's the meaning of 12..1024 padding bytes? padding = urandom(-(len(data) + 12) % 16 + 12) # 88 = 88 + 0 (outgoing message) msg_key_large = sha256(self.auth_key[88:88 + 32] + data + padding).digest() msg_key = msg_key_large[8:24] aes_key, aes_iv = KDF(self.auth_key, msg_key, True) return self.auth_key_id + msg_key + IGE.encrypt( data + padding, aes_key, aes_iv)
def __init__(self, dc_id: int, test_mode: bool, proxy: type, auth_key: bytes, api_id: str, is_cdn: bool = False): if not Session.notice_displayed: print("Pyrogram v{}, {}".format(__version__, __copyright__)) print("Licensed under the terms of the " + __license__, end="\n\n") Session.notice_displayed = True self.is_cdn = is_cdn self.connection = Connection(DataCenter(dc_id, test_mode), proxy) self.api_id = api_id self.auth_key = auth_key self.auth_key_id = sha1(auth_key).digest()[-8:] self.msg_id = MsgId() self.session_id = Long(self.msg_id()) self.msg_factory = MsgFactory(self.msg_id) self.current_salt = None self.pending_acks = set() self.recv_queue = Queue() self.results = {} self.ping_thread = None self.ping_thread_event = Event() self.next_salt_thread = None self.next_salt_thread_event = Event() self.is_connected = Event() self.update_handler = None self.total_connections = 0 self.total_messages = 0 self.total_bytes = 0
def __init__( self, client: pyrogram, dc_id: int, auth_key: bytes, is_media: bool = False, is_cdn: bool = False ): if not Session.notice_displayed: print("Pyrogram v{}, {}".format(__version__, __copyright__)) print("Licensed under the terms of the " + __license__, end="\n\n") Session.notice_displayed = True self.client = client self.dc_id = dc_id self.auth_key = auth_key self.is_media = is_media self.is_cdn = is_cdn self.connection = None self.auth_key_id = sha1(auth_key).digest()[-8:] self.session_id = Long(MsgId()) self.msg_factory = MsgFactory() self.current_salt = None self.pending_acks = set() self.recv_queue = asyncio.Queue() self.results = {} self.ping_task = None self.ping_task_event = asyncio.Event() self.next_salt_task = None self.next_salt_task_event = asyncio.Event() self.net_worker_task = None self.recv_task = None self.is_connected = asyncio.Event()
def access_hash_translate(access_hash: int): return str(Long.read(BytesIO(Long(access_hash)), signed=False))