pypush-plus-plus/imessage.py

723 lines
23 KiB
Python
Raw Normal View History

2023-07-31 18:38:28 -05:00
import base64
2023-07-31 12:03:45 -05:00
import gzip
import logging
2023-07-27 10:52:20 -05:00
import plistlib
2023-07-31 12:03:45 -05:00
import random
import uuid
from dataclasses import dataclass, field
from hashlib import sha1, sha256
2023-07-27 10:52:20 -05:00
from io import BytesIO
from cryptography.hazmat.primitives import hashes
2023-07-31 12:03:45 -05:00
from cryptography.hazmat.primitives.asymmetric import ec, padding
2023-07-27 10:52:20 -05:00
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
2023-07-31 18:38:28 -05:00
from xml.etree import ElementTree
2023-07-31 12:03:45 -05:00
import apns
import ids
2023-07-27 10:52:20 -05:00
2023-07-27 16:34:38 -05:00
logger = logging.getLogger("imessage")
2023-07-31 12:03:45 -05:00
NORMAL_NONCE = b"\x00" * 15 + b"\x01" # This is always used as the AES nonce
2023-07-27 10:52:20 -05:00
class BalloonBody:
2023-07-31 12:03:45 -05:00
"""Represents the special parts of message extensions etc."""
def __init__(self, type: str, data: bytes):
self.type = type
self.data = data
# TODO : Register handlers based on type id
2023-07-31 12:03:45 -05:00
2023-07-31 18:38:28 -05:00
class AttachmentFile:
def data(self) -> bytes:
raise NotImplementedError()
@dataclass
class MMCSFile(AttachmentFile):
url: str | None = None
size: int | None = None
owner: str | None = None
signature: bytes | None = None
decryption_key: bytes | None = None
def data(self) -> bytes:
import requests
2023-08-13 22:24:34 -05:00
logger.info(
requests.get(
url=self.url, # type: ignore
2023-08-13 22:24:34 -05:00
headers={
"User-Agent": f"IMTransferAgent/900 CFNetwork/596.2.3 Darwin/12.2.0 (x86_64) (Macmini5,1)",
# "MMCS-Url": self.url,
# "MMCS-Signature": str(base64.encodebytes(self.signature)),
# "MMCS-Owner": self.owner
},
).headers
)
2023-07-31 18:38:28 -05:00
return b""
@dataclass
class InlineFile(AttachmentFile):
_data: bytes
def data(self) -> bytes:
return self._data
@dataclass
class Attachment:
name: str
mime_type: str
versions: list[AttachmentFile]
def __init__(self, message_raw_content: dict, xml_element: ElementTree.Element):
2023-08-12 06:41:41 -05:00
attrib = xml_element.attrib
2023-07-31 18:38:28 -05:00
self.name = attrib["name"] if "name" in attrib else None # type: ignore
self.mime_type = attrib["mime-type"] if "mime-type" in attrib else None # type: ignore
2023-07-31 18:38:28 -05:00
2023-08-12 06:41:41 -05:00
if "inline-attachment" in attrib:
2023-07-31 18:38:28 -05:00
# just grab the inline attachment !
2023-08-13 22:24:34 -05:00
self.versions = [
InlineFile(message_raw_content[attrib["inline-attachment"]])
]
2023-07-31 18:38:28 -05:00
else:
# suffer
2023-08-12 06:41:41 -05:00
versions = [InlineFile(b"")]
print(attrib)
# for attribute in attrs:
# if attribute.startswith("mmcs") or \
# attribute.startswith("decryption-key") or \
# attribute.startswith("file-size"):
# segments = attribute.split('-')
# if segments[-1].isnumeric():
# index = int(segments[-1])
# attribute_name = segments[:-1]
# else:
# index = 0
# attribute_name = attribute
# while index >= len(versions):
# versions.append(MMCSFile())
# val = attrs[attribute_name]
# match attribute_name:
# case "mmcs-url":
# versions[index].url = val
# case "mmcs-owner":
# versions[index].owner = val
# case "mmcs-signature-hex":
# versions[index].signature = base64.b16decode(val)
# case "file-size":
# versions[index].size = int(val)
# case "decryption-key":
# versions[index].decryption_key = base64.b16decode(val)[1:]
2023-07-31 18:38:28 -05:00
self.versions = versions # type: ignore
2023-07-31 18:38:28 -05:00
def __repr__(self):
return f'<Attachment name="{self.name}" type="{self.mime_type}">'
2023-08-14 08:49:11 -05:00
@dataclass
2023-08-14 08:40:33 -05:00
class Message:
2023-08-14 08:49:11 -05:00
text: str
sender: str
participants: list[str]
id: uuid.UUID
2023-08-15 15:28:02 -05:00
_raw: dict | None = None
2023-08-14 08:49:11 -05:00
_compressed: bool = True
2023-08-14 19:31:03 -05:00
xml: str | None = None
2023-08-14 08:40:33 -05:00
@staticmethod
2023-08-14 08:40:33 -05:00
def from_raw(message: bytes, sender: str | None = None) -> "Message":
"""Create a `Message` from raw message bytes"""
raise NotImplementedError()
def to_raw(self) -> bytes:
"""Convert a `Message` to raw message bytes"""
raise NotImplementedError()
def __str__(self):
2023-08-14 08:40:33 -05:00
raise NotImplementedError()
2023-08-14 08:49:11 -05:00
@dataclass
2023-08-14 08:40:33 -05:00
class SMSReflectedMessage(Message):
@staticmethod
2023-08-14 08:40:33 -05:00
def from_raw(message: bytes, sender: str | None = None) -> "SMSReflectedMessage":
2023-08-16 12:31:15 -05:00
"""Create a `SMSReflectedMessage` from raw message bytes"""
2023-08-14 08:40:33 -05:00
# Decompress the message
try:
message = gzip.decompress(message)
compressed = True
except:
compressed = False
message = plistlib.loads(message)
2023-08-16 12:31:15 -05:00
logger.info(f"Decoding SMSReflectedMessage: {message}")
2023-08-14 19:31:03 -05:00
2023-08-14 08:40:33 -05:00
return SMSReflectedMessage(
text=message["mD"]["plain-body"], # type: ignore
sender=sender, # type: ignore
participants=[re["id"] for re in message["re"]] + [sender], # type: ignore
id=uuid.UUID(message["mD"]["guid"]), # type: ignore
_raw=message, # type: ignore
2023-08-14 08:40:33 -05:00
_compressed=compressed,
)
2023-08-16 12:31:15 -05:00
def to_raw(self) -> bytes:
# {'re': [{'id': '+14155086773', 'uID': '4155086773', 'n': 'us'}], 'ic': 0, 'mD': {'handle': '+14155086773', 'guid': imessage.py:201
# '35694E24-E265-4D5C-8CA7-9499E35D0402', 'replyToGUID': '4F9BC76B-B09C-2A60-B312-9029D529706B', 'plain-body': 'Test sms', 'service':
# 'SMS', 'sV': '1'}, 'fR': True, 'chat-style': 'im'}
#pass
# Strip tel: from participants, making sure they are all phone numbers
#participants = [p.replace("tel:", "") for p in self.participants]
d = {
"re": [{"id": p} for p in self.participants],
"ic": 0,
"mD": {
"handle": self.participants[0] if len(self.participants) == 1 else None,
#"handle": self.sender,
"guid": str(self.id).upper(),
#"replyToGUID": "3B4B465F-F419-40FD-A8EF-94A110518E9F",
#"replyToGUID": str(self.id).upper(),
"xhtml": f"<html><body>{self.text}</body></html>",
"plain-body": self.text,
"service": "SMS",
"sV": "1",
},
#"fR": True,
"chat-style": "im" if len(self.participants) == 1 else "chat"
}
# Dump as plist
d = plistlib.dumps(d, fmt=plistlib.FMT_BINARY)
# Compress
if self._compressed:
d = gzip.compress(d, mtime=0)
return d
2023-08-14 08:40:33 -05:00
def __str__(self):
return f"[SMS {self.sender}] '{self.text}'"
2023-08-14 08:49:11 -05:00
@dataclass
2023-08-14 08:40:33 -05:00
class SMSIncomingMessage(Message):
@staticmethod
2023-08-14 08:40:33 -05:00
def from_raw(message: bytes, sender: str | None = None) -> "SMSIncomingMessage":
"""Create a `SMSIncomingMessage` from raw message bytes"""
# Decompress the message
try:
message = gzip.decompress(message)
compressed = True
except:
compressed = False
message = plistlib.loads(message)
2023-08-14 19:31:03 -05:00
logger.debug(f"Decoding SMSIncomingMessage: {message}")
2023-08-14 08:40:33 -05:00
return SMSIncomingMessage(
text=message["k"][0]["data"].decode(), # type: ignore
sender=message["h"], # Don't use sender parameter, that is the phone that forwarded the message # type: ignore
participants=[message["h"], message["co"]], # type: ignore
id=uuid.UUID(message["g"]), # type: ignore
_raw=message, # type: ignore
2023-08-14 08:40:33 -05:00
_compressed=compressed,
)
def __str__(self):
return f"[SMS {self.sender}] '{self.text}'"
2023-08-14 19:31:03 -05:00
@dataclass
class SMSIncomingImage(Message):
@staticmethod
2023-08-14 19:31:03 -05:00
def from_raw(message: bytes, sender: str | None = None) -> "SMSIncomingImage":
"""Create a `SMSIncomingImage` from raw message bytes"""
# TODO: Implement this
return "SMSIncomingImage" # type: ignore
2023-08-14 08:40:33 -05:00
2023-08-14 08:49:11 -05:00
@dataclass
2023-08-14 08:40:33 -05:00
class iMessage(Message):
2023-08-14 08:49:11 -05:00
effect: str | None = None
@staticmethod
2023-08-15 15:28:02 -05:00
def create(user: "iMessageUser", text: str, participants: list[str]) -> "iMessage":
"""Creates a basic outgoing `iMessage` from the given text and participants"""
sender = user.user.current_handle
2023-08-19 10:27:44 -05:00
if sender not in participants:
participants += [sender]
2023-08-15 15:28:02 -05:00
return iMessage(
text=text,
sender=sender,
participants=participants,
id=uuid.uuid4(),
)
@staticmethod
2023-08-14 08:40:33 -05:00
def from_raw(message: bytes, sender: str | None = None) -> "iMessage":
"""Create a `iMessage` from raw message bytes"""
# Decompress the message
try:
message = gzip.decompress(message)
compressed = True
except:
compressed = False
message = plistlib.loads(message)
2023-08-14 19:31:03 -05:00
logger.debug(f"Decoding iMessage: {message}")
2023-08-14 08:40:33 -05:00
return iMessage(
text=message["t"], # type: ignore
participants=message["p"], # type: ignore
sender=sender, # type: ignore
id=uuid.UUID(message["r"]) if "r" in message else None, # type: ignore
xml=message["x"] if "x" in message else None, # type: ignore
_raw=message, # type: ignore
2023-08-14 08:40:33 -05:00
_compressed=compressed,
effect=message["iid"] if "iid" in message else None, # type: ignore
2023-08-14 08:40:33 -05:00
)
2023-07-31 12:03:45 -05:00
def to_raw(self) -> bytes:
"""Convert an `iMessage` to raw message bytes"""
2023-07-31 09:58:01 -05:00
d = {
"t": self.text,
"x": self.xml,
"p": self.participants,
2023-07-31 18:38:28 -05:00
"r": str(self.id).upper(),
2023-07-30 16:00:04 -05:00
"pv": 0,
2023-07-31 12:03:45 -05:00
"gv": "8",
"v": "1",
2023-08-13 22:24:34 -05:00
"iid": self.effect,
}
2023-07-31 12:03:45 -05:00
2023-07-31 09:58:01 -05:00
# Remove keys that are None
2023-07-31 12:03:45 -05:00
d = {k: v for k, v in d.items() if v is not None}
# Serialize as a plist
d = plistlib.dumps(d, fmt=plistlib.FMT_BINARY)
# Compression
if self._compressed:
d = gzip.compress(d, mtime=0)
return d
2023-08-15 15:28:02 -05:00
def __str__(self):
return f"[iMessage {self.sender}] '{self.text}'"
2023-08-16 12:31:15 -05:00
MESSAGE_TYPES = {
100: ("com.apple.madrid", iMessage),
140: ("com.apple.private.alloy.sms", SMSIncomingMessage),
141: ("com.apple.private.alloy.sms", SMSIncomingImage),
143: ("com.apple.private.alloy.sms", SMSReflectedMessage),
144: ("com.apple.private.alloy.sms", SMSReflectedMessage),
}
def maybe_decompress(message: bytes) -> bytes:
"""Decompresses a message if it is compressed, otherwise returns the original message"""
try:
message = gzip.decompress(message)
except:
pass
return message
2023-07-27 10:04:57 -05:00
class iMessageUser:
2023-07-31 12:03:45 -05:00
"""Represents a logged in and connected iMessage user.
This abstraction should probably be reworked into IDS some time..."""
2023-07-27 10:04:57 -05:00
2023-07-27 10:52:20 -05:00
def __init__(self, connection: apns.APNSConnection, user: ids.IDSUser):
self.connection = connection
self.user = user
2023-07-27 10:04:57 -05:00
@staticmethod
def _parse_payload(p: bytes) -> tuple[bytes, bytes]:
payload = BytesIO(p)
2023-07-27 10:04:57 -05:00
2023-07-27 10:52:20 -05:00
tag = payload.read(1)
2023-08-13 22:24:34 -05:00
# print("TAG", tag)
2023-07-27 10:52:20 -05:00
body_length = int.from_bytes(payload.read(2), "big")
body = payload.read(body_length)
2023-07-31 12:03:45 -05:00
2023-07-27 10:52:20 -05:00
signature_len = payload.read(1)[0]
signature = payload.read(signature_len)
return (body, signature)
2023-07-31 12:03:45 -05:00
@staticmethod
2023-07-28 18:20:32 -05:00
def _construct_payload(body: bytes, signature: bytes) -> bytes:
2023-07-31 12:03:45 -05:00
payload = (
b"\x02"
+ len(body).to_bytes(2, "big")
+ body
+ len(signature).to_bytes(1, "big")
+ signature
)
2023-07-28 18:20:32 -05:00
return payload
@staticmethod
2023-07-31 09:58:01 -05:00
def _hash_identity(id: bytes) -> bytes:
iden = ids.identity.IDSIdentity.decode(id)
# TODO: Combine this with serialization code in ids.identity
output = BytesIO()
2023-07-31 12:03:45 -05:00
output.write(b"\x00\x41\x04")
output.write(
ids._helpers.parse_key(iden.signing_public_key)
.public_numbers().x.to_bytes(32, "big") # type: ignore
2023-07-31 12:03:45 -05:00
)
output.write(
ids._helpers.parse_key(iden.signing_public_key)
.public_numbers().y.to_bytes(32, "big") # type: ignore
2023-07-31 12:03:45 -05:00
)
2023-07-31 09:58:01 -05:00
2023-07-31 12:03:45 -05:00
output.write(b"\x00\xAC")
output.write(b"\x30\x81\xA9")
output.write(b"\x02\x81\xA1")
output.write(
ids._helpers.parse_key(iden.encryption_public_key)
.public_numbers().n.to_bytes(161, "big") # type: ignore
2023-07-31 12:03:45 -05:00
)
output.write(b"\x02\x03\x01\x00\x01")
2023-07-31 09:58:01 -05:00
return sha256(output.getvalue()).digest()
2023-07-28 18:20:32 -05:00
2023-07-31 12:03:45 -05:00
def _encrypt_sign_payload(
self, key: ids.identity.IDSIdentity, message: bytes
) -> bytes:
2023-07-28 18:20:32 -05:00
# Generate a random AES key
2023-07-31 09:58:01 -05:00
random_seed = random.randbytes(11)
# Create the HMAC
import hmac
2023-07-31 12:03:45 -05:00
hm = hmac.new(
random_seed,
message
+ b"\x02"
+ iMessageUser._hash_identity(self.user.encryption_identity.encode())
+ iMessageUser._hash_identity(key.encode()),
sha256,
).digest()
2023-07-31 09:58:01 -05:00
aes_key = random_seed + hm[:5]
2023-07-31 12:03:45 -05:00
# print(len(aes_key))
2023-07-28 18:20:32 -05:00
# Encrypt the message with the AES key
cipher = Cipher(algorithms.AES(aes_key), modes.CTR(NORMAL_NONCE))
encrypted = cipher.encryptor().update(message)
# Encrypt the AES key with the public key of the recipient
recipient_key = ids._helpers.parse_key(key.encryption_public_key)
rsa_body = recipient_key.encrypt( # type: ignore
2023-07-31 12:03:45 -05:00
aes_key + encrypted[:100],
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA1()),
algorithm=hashes.SHA1(),
label=None,
),
2023-07-28 18:20:32 -05:00
)
# Construct the payload
body = rsa_body + encrypted[100:]
sig = ids._helpers.parse_key(self.user.encryption_identity.signing_key).sign( # type: ignore
body, ec.ECDSA(hashes.SHA1()) # type: ignore
2023-07-31 12:03:45 -05:00
)
2023-07-28 18:20:32 -05:00
payload = iMessageUser._construct_payload(body, sig)
return payload
2023-07-31 12:03:45 -05:00
def _decrypt_payload(self, p: bytes) -> bytes:
payload = iMessageUser._parse_payload(p)
2023-07-27 10:52:20 -05:00
body = BytesIO(payload[0])
2023-07-31 12:03:45 -05:00
rsa_body = ids._helpers.parse_key(
self.user.encryption_identity.encryption_key # type: ignore
).decrypt( # type: ignore
2023-07-27 10:52:20 -05:00
body.read(160),
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA1()),
algorithm=hashes.SHA1(),
label=None,
),
)
cipher = Cipher(algorithms.AES(rsa_body[:16]), modes.CTR(NORMAL_NONCE))
decrypted = cipher.decryptor().update(rsa_body[16:] + body.read())
2023-07-31 12:08:57 -05:00
2023-07-31 12:03:45 -05:00
return decrypted
2023-07-27 10:52:20 -05:00
async def _verify_payload(self, p: bytes, sender: str, sender_token: str) -> bool:
2023-07-27 10:52:20 -05:00
# Get the public key for the sender
await self._cache_keys([sender], "com.apple.madrid")
2023-07-27 10:52:20 -05:00
2023-07-31 12:03:45 -05:00
if not sender_token in self.KEY_CACHE:
logger.warning("Unable to find the public key of the sender, cannot verify")
return False
2023-07-27 10:52:20 -05:00
2023-08-13 22:24:34 -05:00
identity_keys = ids.identity.IDSIdentity.decode(
self.KEY_CACHE[sender_token]["com.apple.madrid"][0]
)
2023-07-27 10:52:20 -05:00
sender_ec_key = ids._helpers.parse_key(identity_keys.signing_public_key)
payload = iMessageUser._parse_payload(p)
2023-07-27 10:52:20 -05:00
try:
# Verify the signature (will throw an exception if it fails)
sender_ec_key.verify( # type: ignore
2023-07-27 10:52:20 -05:00
payload[1],
payload[0],
ec.ECDSA(hashes.SHA1()), # type: ignore
2023-07-27 10:52:20 -05:00
)
return True
except:
return False
2023-08-19 10:27:44 -05:00
async def receive(self) -> Message:
"""
Will return the next iMessage in the queue, or None if there are no messages
"""
2023-08-19 10:27:44 -05:00
body = await self._receive_raw([t for t, _ in MESSAGE_TYPES.items()], [t[0] for _, t in MESSAGE_TYPES.items()])
t = MESSAGE_TYPES[body["c"]][1]
2023-07-31 12:03:45 -05:00
if not await self._verify_payload(body["P"], body["sP"], body["t"]):
2023-07-31 12:03:45 -05:00
raise Exception("Failed to verify payload")
2023-08-13 22:24:34 -05:00
2023-08-12 06:41:41 -05:00
logger.debug(f"Encrypted body : {body}")
2023-08-13 22:24:34 -05:00
2023-08-14 08:40:33 -05:00
decrypted = self._decrypt_payload(body["P"])
2023-08-13 22:24:34 -05:00
2023-08-15 15:28:02 -05:00
try:
return t.from_raw(decrypted, body["sP"])
except Exception as e:
logger.error(f"Failed to parse message : {e}")
2023-08-19 10:27:44 -05:00
return Message(text="Failed to parse message", sender="System", participants=[], id=uuid.uuid4(), _raw=body)
2023-07-31 12:03:45 -05:00
2023-07-31 15:30:06 -05:00
KEY_CACHE_HANDLE: str = ""
2023-08-13 18:26:57 -05:00
KEY_CACHE: dict[bytes, dict[str, tuple[bytes, bytes]]] = {}
"""Mapping of push token : topic : (public key, session token)"""
2023-07-31 12:03:45 -05:00
USER_CACHE: dict[str, list[bytes]] = {}
"""Mapping of handle : [push tokens]"""
async def _cache_keys(self, participants: list[str], topic: str):
2023-07-31 15:30:06 -05:00
# Clear the cache if the handle has changed
if self.KEY_CACHE_HANDLE != self.user.current_handle:
self.KEY_CACHE_HANDLE = self.user.current_handle
self.KEY_CACHE = {}
self.USER_CACHE = {}
2023-08-13 22:24:34 -05:00
2023-07-31 12:03:45 -05:00
# Check to see if we have cached the keys for all of the participants
2023-08-16 12:31:15 -05:00
#if all([p in self.USER_CACHE for p in participants]):
# return
# TODO: This doesn't work since it doesn't check if they are cached for all topics
2023-07-31 12:03:45 -05:00
2023-07-29 12:57:20 -05:00
# Look up the public keys for the participants, and cache a token : public key mapping
lookup = await self.user.lookup(participants, topic=topic)
2023-07-29 12:57:20 -05:00
2023-08-13 22:24:34 -05:00
logger.debug(f"Lookup response : {lookup}")
for key, participant in lookup.items():
if len(participant["identities"]) == 0:
logger.warning(f"Participant {key} has no identities, this is probably not a real account")
2023-07-29 12:57:20 -05:00
for key, participant in lookup.items():
2023-08-19 10:27:44 -05:00
self.USER_CACHE[key] = [] # Clear so that we don't keep appending multiple times
2023-07-31 12:03:45 -05:00
for identity in participant["identities"]:
if not "client-data" in identity:
2023-07-29 12:57:20 -05:00
continue
2023-07-31 12:03:45 -05:00
if not "public-message-identity-key" in identity["client-data"]:
2023-07-29 12:57:20 -05:00
continue
2023-07-31 12:03:45 -05:00
if not "push-token" in identity:
2023-07-29 12:57:20 -05:00
continue
2023-07-31 12:03:45 -05:00
if not "session-token" in identity:
2023-07-29 16:14:25 -05:00
continue
2023-07-29 12:57:20 -05:00
2023-07-31 12:03:45 -05:00
self.USER_CACHE[key].append(identity["push-token"])
2023-07-29 12:57:20 -05:00
2023-07-31 12:03:45 -05:00
# print(identity)
2023-08-13 18:26:57 -05:00
if not identity["push-token"] in self.KEY_CACHE:
self.KEY_CACHE[identity["push-token"]] = {}
self.KEY_CACHE[identity["push-token"]][topic] = (
2023-07-31 12:03:45 -05:00
identity["client-data"]["public-message-identity-key"],
identity["session-token"],
)
2023-07-29 16:14:25 -05:00
async def _send_raw(
2023-08-13 22:24:34 -05:00
self,
type: int,
participants: list[str],
topic: str,
payload: bytes | None = None,
id: uuid.UUID | None = None,
extra: dict = {},
):
await self._cache_keys(participants, topic)
2023-07-31 12:03:45 -05:00
2023-08-13 22:24:34 -05:00
dtl = []
2023-08-13 18:26:57 -05:00
for participant in participants:
2023-07-29 12:57:20 -05:00
for push_token in self.USER_CACHE[participant]:
if push_token == self.connection.credentials.token:
2023-08-13 22:24:34 -05:00
continue # Don't send to ourselves
2023-07-31 12:57:50 -05:00
2023-07-31 12:03:45 -05:00
identity_keys = ids.identity.IDSIdentity.decode(
2023-08-13 18:26:57 -05:00
self.KEY_CACHE[push_token][topic][0]
2023-07-31 12:03:45 -05:00
)
2023-08-13 18:26:57 -05:00
p = {
"tP": participant,
2023-08-13 22:24:34 -05:00
"D": not participant == self.user.current_handle,
2023-08-13 18:26:57 -05:00
"sT": self.KEY_CACHE[push_token][topic][1],
"t": push_token,
}
if payload is not None:
2023-08-13 22:24:34 -05:00
p["P"] = self._encrypt_sign_payload(identity_keys, payload)
2023-08-13 18:26:57 -05:00
logger.debug(f"Encoded payload : {p}")
2023-08-13 22:24:34 -05:00
dtl.append(p)
2023-08-13 18:26:57 -05:00
2023-08-13 22:24:34 -05:00
message_id = random.randbytes(4)
2023-08-13 18:26:57 -05:00
2023-08-13 22:24:34 -05:00
if id is None:
id = uuid.uuid4()
2023-08-13 18:26:57 -05:00
body = {
2023-08-13 22:24:34 -05:00
"c": type,
2023-08-13 18:26:57 -05:00
"fcn": 1,
"v": 8,
2023-08-13 22:24:34 -05:00
"i": int.from_bytes(message_id, "big"),
"U": id.bytes,
"dtl": dtl,
2023-08-13 18:26:57 -05:00
"sP": self.user.current_handle,
}
2023-08-13 22:24:34 -05:00
body.update(extra)
2023-08-13 18:26:57 -05:00
body = plistlib.dumps(body, fmt=plistlib.FMT_BINARY)
await self.connection.send_notification(topic, body, message_id)
2023-08-13 18:26:57 -05:00
2023-08-19 10:27:44 -05:00
async def _receive_raw(self, c: int | list[int], topics: str | list[str]) -> dict:
def check(payload: apns.APNSPayload):
# Check if the "c" key matches
body = payload.fields_with_id(3)[0].value
if body is None:
2023-08-13 22:24:34 -05:00
return False
body = plistlib.loads(body)
2023-08-19 10:27:44 -05:00
if not "c" in body:
return False
if isinstance(c, int) and body["c"] != c:
return False
elif isinstance(c, list) and body["c"] not in c:
2023-08-13 22:24:34 -05:00
return False
return True
2023-08-19 10:27:44 -05:00
payload = await self.connection.expect_notification(topics, check)
2023-08-13 18:26:57 -05:00
body = payload.fields_with_id(3)[0].value
2023-08-13 22:24:34 -05:00
body = plistlib.loads(body)
return body
2023-08-13 18:26:57 -05:00
async def activate_sms(self):
2023-08-13 22:24:34 -05:00
"""
Try to activate SMS forwarding
Returns True if we are able to perform SMS forwarding, False otherwise
Call repeatedly until it returns True
"""
2023-08-13 18:26:57 -05:00
act_message = await self._receive_raw(145, "com.apple.private.alloy.sms")
2023-08-13 22:24:34 -05:00
if act_message is None:
return False
2023-08-16 12:31:15 -05:00
logger.info(f"Received SMS activation message : {act_message}")
# Decrypt the payload
act_message = self._decrypt_payload(act_message["P"])
act_message = plistlib.loads(maybe_decompress(act_message))
if act_message == {'wc': False, 'ar': True}:
logger.info("SMS forwarding activated, sending response")
else:
logger.info("SMS forwarding de-activated, sending response")
await self._send_raw(
2023-08-13 22:24:34 -05:00
147,
[self.user.current_handle],
"com.apple.private.alloy.sms",
extra={
"nr": 1
}
)
2023-08-13 18:26:57 -05:00
async def send(self, message: Message):
2023-08-16 12:31:15 -05:00
# Check what type of message we are sending
for t, (topic, cls) in MESSAGE_TYPES.items():
if isinstance(message, cls):
break
else:
raise Exception("Unknown message type")
send_to = message.participants if isinstance(message, iMessage) else [self.user.current_handle]
await self._cache_keys(send_to, topic)
2023-08-13 18:26:57 -05:00
await self._send_raw(
2023-08-16 12:31:15 -05:00
t,
send_to,
topic,
2023-08-13 22:24:34 -05:00
message.to_raw(),
message.id,
{
2023-08-16 12:31:15 -05:00
"E": "pair", # TODO: Do we need the nr field for SMS?
2023-08-13 22:24:34 -05:00
}
2023-08-16 12:31:15 -05:00
)
2023-08-13 18:26:57 -05:00
2023-08-13 22:24:34 -05:00
# Check for delivery
count = 0
total = 0
2023-07-29 12:57:20 -05:00
2023-08-13 22:24:34 -05:00
import time
start = time.time()
2023-07-29 12:57:20 -05:00
2023-08-16 12:31:15 -05:00
for p in send_to:
2023-08-13 22:24:34 -05:00
for t in self.USER_CACHE[p]:
if t == self.connection.credentials.token:
2023-08-13 22:24:34 -05:00
continue
total += 1
while count < total and time.time() - start < 2:
resp = await self._receive_raw(255, topic)
2023-08-17 21:05:18 -05:00
#if resp is None:
# continue
2023-08-13 22:24:34 -05:00
count += 1
logger.debug(f"Received response : {resp}")
if resp["s"] != 0:
logger.warning(f"Message delivery to {base64.b64encode(resp['t']).decode()} failed : {resp['s']}")
2023-07-29 12:57:20 -05:00
2023-08-13 22:24:34 -05:00
if count < total:
logger.error(f"Unable to deliver message to all devices (got {count} of {total})")