powerdlz23 1.2.2 → 1.2.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/package.json +1 -1
  2. package/pto/CryptoNoter/.gitattributes +2 -0
  3. package/pto/CryptoNoter/CryptoNight.md +444 -0
  4. package/pto/CryptoNoter/CryptoNight.txt +364 -0
  5. package/pto/CryptoNoter/LICENSE +21 -0
  6. package/pto/CryptoNoter/README.md +178 -0
  7. package/pto/CryptoNoter/banner +4 -0
  8. package/pto/CryptoNoter/config.json +8 -0
  9. package/pto/CryptoNoter/install.sh +60 -0
  10. package/pto/CryptoNoter/package-lock.json +33 -0
  11. package/pto/CryptoNoter/package.json +16 -0
  12. package/pto/CryptoNoter/server.js +225 -0
  13. package/pto/CryptoNoter/web/demo.html +81 -0
  14. package/pto/CryptoNoter/web/index.html +1 -0
  15. package/pto/CryptoNoter/web/lib/cryptonight-asmjs.min.js +16891 -0
  16. package/pto/CryptoNoter/web/lib/cryptonight-asmjs.min.js.mem +0 -0
  17. package/pto/CryptoNoter/web/lib/cryptonight.wasm +0 -0
  18. package/pto/CryptoNoter/web/processor.js +496 -0
  19. package/pto/CryptoNoter/web/worker.js +5549 -0
  20. package/pto/crypto/README.md +1 -0
  21. package/pto/crypto/aes256cbc/README.md +59 -0
  22. package/pto/crypto/aes256cbc/aes256cbc.go +172 -0
  23. package/pto/crypto/aes256cbc/aes256cbc_test.go +105 -0
  24. package/pto/crypto/aes256cbc/examples_test.go +30 -0
  25. package/pto/crypto/dh64/README.md +84 -0
  26. package/pto/crypto/dh64/c/dh64.c +75 -0
  27. package/pto/crypto/dh64/c/dh64.h +12 -0
  28. package/pto/crypto/dh64/c/dh64_test.c +30 -0
  29. package/pto/crypto/dh64/csharp/dh64.cs +77 -0
  30. package/pto/crypto/dh64/csharp/dh64_test.cs +1074 -0
  31. package/pto/crypto/dh64/go/dh64.go +72 -0
  32. package/pto/crypto/dh64/go/dh64_test.go +1064 -0
  33. package/pto/crypto/mt19937/README.md +30 -0
  34. package/pto/crypto/mt19937/c/mt19937-64.c +180 -0
  35. package/pto/crypto/mt19937/c/mt19937-64.h +96 -0
  36. package/pto/crypto/mt19937/c/mt19937-64.out.txt +401 -0
  37. package/pto/crypto/mt19937/c/mt19937-64test.c +78 -0
  38. package/pto/crypto/mt19937/csharp/mt19937.cs +139 -0
  39. package/pto/crypto/mt19937/csharp/mt19937_test.cs +574 -0
  40. package/pto/crypto/mt19937/go/COPYING +674 -0
  41. package/pto/crypto/mt19937/go/README.rst +103 -0
  42. package/pto/crypto/mt19937/go/doc.go +35 -0
  43. package/pto/crypto/mt19937/go/example.go +32 -0
  44. package/pto/crypto/mt19937/go/mt19937.go +149 -0
  45. package/pto/crypto/mt19937/go/mt19937_test.go +614 -0
  46. package/pto/crypto/rc4/README.md +14 -0
  47. package/pto/crypto/rc4/csharp/rc4.cs +119 -0
  48. package/pto/crypto/rc4/csharp/rc4_echo_client.cs +78 -0
  49. package/pto/crypto/rc4/go/rc4_echo_client.go +102 -0
  50. package/pto/crypto/rc4/go/rc4_echo_server.go +110 -0
@@ -0,0 +1,119 @@
1
+ using System;
2
+ using System.IO;
3
+
4
+ namespace Funny.Crypto
5
+ {
6
+ public class RC4Cipher
7
+ {
8
+ private uint[] s = new uint[256];
9
+ private byte i, j;
10
+
11
+ public RC4Cipher(byte[] key) {
12
+ int k = key.Length;
13
+ if (k < 1 || k > 256) {
14
+ throw new RC4KeySizeException(k);
15
+ }
16
+
17
+ for (uint i = 0; i < 256; i++) {
18
+ s[i] = i;
19
+ }
20
+
21
+ byte j = 0;
22
+ uint t = 0;
23
+ for (int i = 0; i < 256; i++) {
24
+ j = (byte)(j + s[i] + key[i % k]);
25
+ t = s[i];
26
+ s[i] = s[j];
27
+ s[j] = t;
28
+ }
29
+ }
30
+
31
+ public void XORKeyStream(byte[] dst, int dstOffset, byte[] src, int srcOffset, int count) {
32
+ if (count == 0)
33
+ return;
34
+
35
+ byte i = this.i;
36
+ byte j = this.j;
37
+ uint t = 0;
38
+ for (int k = 0; k < count; k ++) {
39
+ i += 1;
40
+ j = (byte)(s[i] + j);
41
+ t = s[i];
42
+ s[i] = s[j];
43
+ s[j] = t;
44
+ dst[k + dstOffset] = (byte)(src[k + srcOffset] ^ (byte)(s[(byte)(s[i] + s[j])]));
45
+ }
46
+ this.i = i;
47
+ this.j = j;
48
+ }
49
+ }
50
+
51
+ public class RC4Stream : Stream
52
+ {
53
+ private Stream stream;
54
+ private RC4Cipher cipher;
55
+
56
+ public RC4Stream(Stream stream, byte[] key) {
57
+ this.stream = stream;
58
+ this.cipher = new RC4Cipher(key);
59
+ }
60
+
61
+ public override int Read(byte[] buffer, int offset, int count) {
62
+ count = stream.Read(buffer, offset, count);
63
+ cipher.XORKeyStream(buffer, offset, buffer, offset, count);
64
+ return count;
65
+ }
66
+
67
+ public override void Write(byte[] buffer, int offset, int count) {
68
+ byte[] dst = new byte[count];
69
+ cipher.XORKeyStream(dst, 0, buffer, offset, count);
70
+ stream.Write(dst, 0, count);
71
+ }
72
+
73
+ public override bool CanRead {
74
+ get { return stream.CanRead; }
75
+ }
76
+
77
+ public override bool CanSeek {
78
+ get { return stream.CanSeek; }
79
+ }
80
+
81
+ public override bool CanWrite {
82
+ get { return stream.CanWrite; }
83
+ }
84
+
85
+ public override long Length {
86
+ get { return stream.Length; }
87
+ }
88
+
89
+ public override long Position {
90
+ get { return stream.Position; }
91
+ set { stream.Position = value; }
92
+ }
93
+
94
+ public override long Seek(long offset, SeekOrigin origin) {
95
+ return stream.Seek(offset, origin);
96
+ }
97
+
98
+ public override void SetLength(long length) {
99
+ stream.SetLength(length);
100
+ }
101
+
102
+ public override void Flush() {
103
+ stream.Flush();
104
+ }
105
+ }
106
+
107
+ public class RC4KeySizeException : Exception
108
+ {
109
+ private int size;
110
+
111
+ public RC4KeySizeException(int size) {
112
+ this.size = size;
113
+ }
114
+
115
+ public override string Message {
116
+ get { return "RC4Stream: invalid key size " + size; }
117
+ }
118
+ }
119
+ }
@@ -0,0 +1,78 @@
1
+ using System;
2
+ using System.IO;
3
+ using System.Net.Sockets;
4
+ using Funny.Crypto;
5
+
6
+ // mcs rc4_echo_client.cs rc4.cs ../../dh64/csharp/dh64.cs
7
+ class MainClass
8
+ {
9
+ private static DH64 dh64 = new DH64();
10
+ private static Random random = new Random();
11
+
12
+ public static void Main(string[] args) {
13
+ TcpClient conn = new TcpClient("127.0.0.1", 10010);
14
+ Console.WriteLine("client connect");
15
+
16
+ Stream stream = conn.GetStream();
17
+ BinaryReader reader = new BinaryReader(stream);
18
+ BinaryWriter writer = ConnInit(reader);
19
+
20
+ byte[] buffer = new byte[1024];
21
+ for (;;) {
22
+ int length = WriteRandomBytes(writer, buffer);
23
+ uint n = reader.ReadUInt32();
24
+ byte[] recv = reader.ReadBytes((int)n);
25
+ if (!ByteArrayEquals(buffer, recv, length)) {
26
+ Console.WriteLine("send != recv");
27
+ Console.WriteLine("send: {0}", BitConverter.ToString(buffer, length));
28
+ Console.WriteLine("recv: {0}", BitConverter.ToString(recv));
29
+ return;
30
+ }
31
+ }
32
+ }
33
+
34
+ // Do DH64 key exchange and return a RC4 writer
35
+ private static BinaryWriter ConnInit(BinaryReader r) {
36
+ ulong privateKey;
37
+ ulong publicKey;
38
+ dh64.KeyPair(out privateKey, out publicKey);
39
+ Console.WriteLine("client public key: {0}", publicKey);
40
+
41
+ new BinaryWriter(r.BaseStream).Write(publicKey);
42
+ ulong srvPublicKey = r.ReadUInt64();
43
+ Console.WriteLine("server public key: {0}", srvPublicKey);
44
+
45
+ ulong secret = dh64.Secret(privateKey, srvPublicKey);
46
+ Console.WriteLine("secret: {0}", secret);
47
+
48
+ byte[] key;
49
+ using (MemoryStream ms = new MemoryStream()) {
50
+ new BinaryWriter(ms).Write(secret);
51
+ key = ms.ToArray();
52
+ }
53
+ Console.WriteLine("key: {0}", BitConverter.ToString(key).Replace("-", "").ToLower());
54
+
55
+ return new BinaryWriter(
56
+ new RC4Stream(r.BaseStream, key)
57
+ );
58
+ }
59
+
60
+ private static int WriteRandomBytes(BinaryWriter w, byte[] buffer) {
61
+ int length = random.Next(buffer.Length);
62
+ for (int i = 0; i < length; i ++) {
63
+ buffer[i] = (byte)random.Next(256);
64
+ }
65
+ w.Write((uint)length);
66
+ w.Write(buffer, 0, length);
67
+ return length;
68
+ }
69
+
70
+ private static bool ByteArrayEquals(byte[] a1, byte[] a2, int length) {
71
+ if (a2.Length != length)
72
+ return false;
73
+ for (int i=0; i<length; i++)
74
+ if (a1[i]!=a2[i])
75
+ return false;
76
+ return true;
77
+ }
78
+ }
@@ -0,0 +1,102 @@
1
+ package main
2
+
3
+ import (
4
+ "bytes"
5
+ "crypto/cipher"
6
+ "crypto/rc4"
7
+ "encoding/hex"
8
+ "flag"
9
+ "github.com/funny/binary"
10
+ dh64 "github.com/funny/crypto/dh64/go"
11
+ "log"
12
+ "math/rand"
13
+ "net"
14
+ "time"
15
+ )
16
+
17
+ func main() {
18
+ addr := flag.String("addr", "127.0.0.1:10010", "server address")
19
+ flag.Parse()
20
+
21
+ conn, err := net.Dial("tcp", *addr)
22
+ if err != nil {
23
+ log.Print("connect failed: ", err)
24
+ return
25
+ }
26
+ log.Print("client connect")
27
+
28
+ writer, reader, err := conn_init(conn)
29
+ if err != nil {
30
+ log.Print("conn init failed: ", err)
31
+ return
32
+ }
33
+
34
+ send := make([]byte, 0, 1024)
35
+ for {
36
+ send = randomData(send)
37
+ writer.WritePacket(send, binary.SplitByUint32LE)
38
+ if writer.Error() != nil {
39
+ log.Print("send failed: ", writer.Error())
40
+ return
41
+ }
42
+ recv := reader.ReadPacket(binary.SplitByUint32LE)
43
+ if reader.Error() != nil {
44
+ log.Print("receive failed: ", reader.Error())
45
+ return
46
+ }
47
+ if !bytes.Equal(send, recv) {
48
+ log.Print("send != recv")
49
+ log.Print("send: ", hex.EncodeToString(send))
50
+ log.Print("recv: ", hex.EncodeToString(recv))
51
+ return
52
+ }
53
+ }
54
+ }
55
+
56
+ // Do DH64 key exchange and return a RC4 writer.
57
+ func conn_init(conn net.Conn) (*binary.Writer, *binary.Reader, error) {
58
+ var (
59
+ writer = binary.NewWriter(conn)
60
+ reader = binary.NewReader(conn)
61
+ )
62
+
63
+ rand.Seed(time.Now().UnixNano())
64
+
65
+ privateKey, publicKey := dh64.KeyPair()
66
+ log.Print("client public key: ", publicKey)
67
+
68
+ writer.WriteUint64LE(publicKey)
69
+ if writer.Error() != nil {
70
+ return nil, nil, writer.Error()
71
+ }
72
+ serverPublicKey := reader.ReadUint64LE()
73
+ if reader.Error() != nil {
74
+ return nil, nil, reader.Error()
75
+ }
76
+ log.Print("server public key: ", serverPublicKey)
77
+
78
+ secert := dh64.Secret(privateKey, serverPublicKey)
79
+ log.Print("secert: ", secert)
80
+
81
+ key := make([]byte, 8)
82
+ binary.PutUint64LE(key, secert)
83
+ rc4stream, err := rc4.NewCipher(key)
84
+ if err != nil {
85
+ return nil, nil, err
86
+ }
87
+ log.Print("key: ", hex.EncodeToString(key))
88
+
89
+ writer = binary.NewWriter(cipher.StreamWriter{
90
+ W: conn,
91
+ S: rc4stream,
92
+ })
93
+ return writer, reader, nil
94
+ }
95
+
96
+ func randomData(b []byte) []byte {
97
+ a := b[:rand.Intn(cap(b))]
98
+ for i := 0; i < len(a); i++ {
99
+ a[i] = byte(rand.Int() % 256)
100
+ }
101
+ return a
102
+ }
@@ -0,0 +1,110 @@
1
+ package main
2
+
3
+ import (
4
+ "crypto/cipher"
5
+ "crypto/rc4"
6
+ "encoding/hex"
7
+ "flag"
8
+ "github.com/funny/binary"
9
+ dh64 "github.com/funny/crypto/dh64/go"
10
+ "log"
11
+ "math/rand"
12
+ "net"
13
+ "time"
14
+ )
15
+
16
+ func main() {
17
+ addr := flag.String("addr", "127.0.0.1:10010", "server address")
18
+ flag.Parse()
19
+
20
+ lsn, err := net.Listen("tcp", *addr)
21
+ if err != nil {
22
+ log.Print("listen failed: ", err)
23
+ return
24
+ }
25
+ log.Print("server wait")
26
+
27
+ for {
28
+ conn, err := lsn.Accept()
29
+ if err != nil {
30
+ log.Print("accept failed: ", err)
31
+ return
32
+ }
33
+ log.Print("server accpet: ", conn.RemoteAddr())
34
+
35
+ go func() {
36
+ writer, reader, err := conn_init(conn)
37
+ if err != nil {
38
+ log.Print("conn init failed: ", err)
39
+ return
40
+ }
41
+
42
+ var (
43
+ lastPrintTime = time.Now()
44
+ sendPacketCount uint64
45
+ recvPacketCount uint64
46
+ )
47
+
48
+ for {
49
+ recv := reader.ReadPacket(binary.SplitByUint32LE)
50
+ if reader.Error() != nil {
51
+ log.Print("receive failed: ", reader.Error())
52
+ return
53
+ }
54
+ recvPacketCount += 1
55
+
56
+ writer.WritePacket(recv, binary.SplitByUint32LE)
57
+ if writer.Error() != nil {
58
+ log.Print("send failed: ", writer.Error())
59
+ return
60
+ }
61
+ sendPacketCount += 1
62
+
63
+ if time.Since(lastPrintTime) > time.Second*2 {
64
+ lastPrintTime = time.Now()
65
+ log.Print("server: ", recvPacketCount, sendPacketCount)
66
+ }
67
+ }
68
+ }()
69
+ }
70
+ }
71
+
72
+ // Do DH64 key exchange and return a RC4 reader.
73
+ func conn_init(conn net.Conn) (*binary.Writer, *binary.Reader, error) {
74
+ var (
75
+ writer = binary.NewWriter(conn)
76
+ reader = binary.NewReader(conn)
77
+ )
78
+
79
+ rand.Seed(time.Now().UnixNano())
80
+
81
+ privateKey, publicKey := dh64.KeyPair()
82
+ log.Print("server public key: ", publicKey)
83
+
84
+ writer.WriteUint64LE(publicKey)
85
+ if writer.Error() != nil {
86
+ return nil, nil, writer.Error()
87
+ }
88
+ clientPublicKey := reader.ReadUint64LE()
89
+ if reader.Error() != nil {
90
+ return nil, nil, reader.Error()
91
+ }
92
+ log.Print("client public key: ", clientPublicKey)
93
+
94
+ secert := dh64.Secret(privateKey, clientPublicKey)
95
+ log.Print("secert: ", secert)
96
+
97
+ key := make([]byte, 8)
98
+ binary.PutUint64LE(key, secert)
99
+ rc4stream, err := rc4.NewCipher(key)
100
+ if err != nil {
101
+ return nil, nil, err
102
+ }
103
+ log.Print("key: ", hex.EncodeToString(key))
104
+
105
+ reader = binary.NewReader(cipher.StreamReader{
106
+ R: conn,
107
+ S: rc4stream,
108
+ })
109
+ return writer, reader, nil
110
+ }