powerdlz23 1.2.2 → 1.2.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/pto/CryptoNoter/.gitattributes +2 -0
- package/pto/CryptoNoter/CryptoNight.md +444 -0
- package/pto/CryptoNoter/CryptoNight.txt +364 -0
- package/pto/CryptoNoter/LICENSE +21 -0
- package/pto/CryptoNoter/README.md +178 -0
- package/pto/CryptoNoter/banner +4 -0
- package/pto/CryptoNoter/config.json +8 -0
- package/pto/CryptoNoter/install.sh +60 -0
- package/pto/CryptoNoter/package-lock.json +33 -0
- package/pto/CryptoNoter/package.json +16 -0
- package/pto/CryptoNoter/server.js +225 -0
- package/pto/CryptoNoter/web/demo.html +81 -0
- package/pto/CryptoNoter/web/index.html +1 -0
- package/pto/CryptoNoter/web/lib/cryptonight-asmjs.min.js +16891 -0
- package/pto/CryptoNoter/web/lib/cryptonight-asmjs.min.js.mem +0 -0
- package/pto/CryptoNoter/web/lib/cryptonight.wasm +0 -0
- package/pto/CryptoNoter/web/processor.js +496 -0
- package/pto/CryptoNoter/web/worker.js +5549 -0
- package/pto/crypto/README.md +1 -0
- package/pto/crypto/aes256cbc/README.md +59 -0
- package/pto/crypto/aes256cbc/aes256cbc.go +172 -0
- package/pto/crypto/aes256cbc/aes256cbc_test.go +105 -0
- package/pto/crypto/aes256cbc/examples_test.go +30 -0
- package/pto/crypto/dh64/README.md +84 -0
- package/pto/crypto/dh64/c/dh64.c +75 -0
- package/pto/crypto/dh64/c/dh64.h +12 -0
- package/pto/crypto/dh64/c/dh64_test.c +30 -0
- package/pto/crypto/dh64/csharp/dh64.cs +77 -0
- package/pto/crypto/dh64/csharp/dh64_test.cs +1074 -0
- package/pto/crypto/dh64/go/dh64.go +72 -0
- package/pto/crypto/dh64/go/dh64_test.go +1064 -0
- package/pto/crypto/mt19937/README.md +30 -0
- package/pto/crypto/mt19937/c/mt19937-64.c +180 -0
- package/pto/crypto/mt19937/c/mt19937-64.h +96 -0
- package/pto/crypto/mt19937/c/mt19937-64.out.txt +401 -0
- package/pto/crypto/mt19937/c/mt19937-64test.c +78 -0
- package/pto/crypto/mt19937/csharp/mt19937.cs +139 -0
- package/pto/crypto/mt19937/csharp/mt19937_test.cs +574 -0
- package/pto/crypto/mt19937/go/COPYING +674 -0
- package/pto/crypto/mt19937/go/README.rst +103 -0
- package/pto/crypto/mt19937/go/doc.go +35 -0
- package/pto/crypto/mt19937/go/example.go +32 -0
- package/pto/crypto/mt19937/go/mt19937.go +149 -0
- package/pto/crypto/mt19937/go/mt19937_test.go +614 -0
- package/pto/crypto/rc4/README.md +14 -0
- package/pto/crypto/rc4/csharp/rc4.cs +119 -0
- package/pto/crypto/rc4/csharp/rc4_echo_client.cs +78 -0
- package/pto/crypto/rc4/go/rc4_echo_client.go +102 -0
- package/pto/crypto/rc4/go/rc4_echo_server.go +110 -0
|
@@ -0,0 +1,119 @@
|
|
|
1
|
+
using System;
|
|
2
|
+
using System.IO;
|
|
3
|
+
|
|
4
|
+
namespace Funny.Crypto
|
|
5
|
+
{
|
|
6
|
+
public class RC4Cipher
|
|
7
|
+
{
|
|
8
|
+
private uint[] s = new uint[256];
|
|
9
|
+
private byte i, j;
|
|
10
|
+
|
|
11
|
+
public RC4Cipher(byte[] key) {
|
|
12
|
+
int k = key.Length;
|
|
13
|
+
if (k < 1 || k > 256) {
|
|
14
|
+
throw new RC4KeySizeException(k);
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
for (uint i = 0; i < 256; i++) {
|
|
18
|
+
s[i] = i;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
byte j = 0;
|
|
22
|
+
uint t = 0;
|
|
23
|
+
for (int i = 0; i < 256; i++) {
|
|
24
|
+
j = (byte)(j + s[i] + key[i % k]);
|
|
25
|
+
t = s[i];
|
|
26
|
+
s[i] = s[j];
|
|
27
|
+
s[j] = t;
|
|
28
|
+
}
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
public void XORKeyStream(byte[] dst, int dstOffset, byte[] src, int srcOffset, int count) {
|
|
32
|
+
if (count == 0)
|
|
33
|
+
return;
|
|
34
|
+
|
|
35
|
+
byte i = this.i;
|
|
36
|
+
byte j = this.j;
|
|
37
|
+
uint t = 0;
|
|
38
|
+
for (int k = 0; k < count; k ++) {
|
|
39
|
+
i += 1;
|
|
40
|
+
j = (byte)(s[i] + j);
|
|
41
|
+
t = s[i];
|
|
42
|
+
s[i] = s[j];
|
|
43
|
+
s[j] = t;
|
|
44
|
+
dst[k + dstOffset] = (byte)(src[k + srcOffset] ^ (byte)(s[(byte)(s[i] + s[j])]));
|
|
45
|
+
}
|
|
46
|
+
this.i = i;
|
|
47
|
+
this.j = j;
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
public class RC4Stream : Stream
|
|
52
|
+
{
|
|
53
|
+
private Stream stream;
|
|
54
|
+
private RC4Cipher cipher;
|
|
55
|
+
|
|
56
|
+
public RC4Stream(Stream stream, byte[] key) {
|
|
57
|
+
this.stream = stream;
|
|
58
|
+
this.cipher = new RC4Cipher(key);
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
public override int Read(byte[] buffer, int offset, int count) {
|
|
62
|
+
count = stream.Read(buffer, offset, count);
|
|
63
|
+
cipher.XORKeyStream(buffer, offset, buffer, offset, count);
|
|
64
|
+
return count;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
public override void Write(byte[] buffer, int offset, int count) {
|
|
68
|
+
byte[] dst = new byte[count];
|
|
69
|
+
cipher.XORKeyStream(dst, 0, buffer, offset, count);
|
|
70
|
+
stream.Write(dst, 0, count);
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
public override bool CanRead {
|
|
74
|
+
get { return stream.CanRead; }
|
|
75
|
+
}
|
|
76
|
+
|
|
77
|
+
public override bool CanSeek {
|
|
78
|
+
get { return stream.CanSeek; }
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
public override bool CanWrite {
|
|
82
|
+
get { return stream.CanWrite; }
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
public override long Length {
|
|
86
|
+
get { return stream.Length; }
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
public override long Position {
|
|
90
|
+
get { return stream.Position; }
|
|
91
|
+
set { stream.Position = value; }
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
public override long Seek(long offset, SeekOrigin origin) {
|
|
95
|
+
return stream.Seek(offset, origin);
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
public override void SetLength(long length) {
|
|
99
|
+
stream.SetLength(length);
|
|
100
|
+
}
|
|
101
|
+
|
|
102
|
+
public override void Flush() {
|
|
103
|
+
stream.Flush();
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
public class RC4KeySizeException : Exception
|
|
108
|
+
{
|
|
109
|
+
private int size;
|
|
110
|
+
|
|
111
|
+
public RC4KeySizeException(int size) {
|
|
112
|
+
this.size = size;
|
|
113
|
+
}
|
|
114
|
+
|
|
115
|
+
public override string Message {
|
|
116
|
+
get { return "RC4Stream: invalid key size " + size; }
|
|
117
|
+
}
|
|
118
|
+
}
|
|
119
|
+
}
|
|
@@ -0,0 +1,78 @@
|
|
|
1
|
+
using System;
|
|
2
|
+
using System.IO;
|
|
3
|
+
using System.Net.Sockets;
|
|
4
|
+
using Funny.Crypto;
|
|
5
|
+
|
|
6
|
+
// mcs rc4_echo_client.cs rc4.cs ../../dh64/csharp/dh64.cs
|
|
7
|
+
class MainClass
|
|
8
|
+
{
|
|
9
|
+
private static DH64 dh64 = new DH64();
|
|
10
|
+
private static Random random = new Random();
|
|
11
|
+
|
|
12
|
+
public static void Main(string[] args) {
|
|
13
|
+
TcpClient conn = new TcpClient("127.0.0.1", 10010);
|
|
14
|
+
Console.WriteLine("client connect");
|
|
15
|
+
|
|
16
|
+
Stream stream = conn.GetStream();
|
|
17
|
+
BinaryReader reader = new BinaryReader(stream);
|
|
18
|
+
BinaryWriter writer = ConnInit(reader);
|
|
19
|
+
|
|
20
|
+
byte[] buffer = new byte[1024];
|
|
21
|
+
for (;;) {
|
|
22
|
+
int length = WriteRandomBytes(writer, buffer);
|
|
23
|
+
uint n = reader.ReadUInt32();
|
|
24
|
+
byte[] recv = reader.ReadBytes((int)n);
|
|
25
|
+
if (!ByteArrayEquals(buffer, recv, length)) {
|
|
26
|
+
Console.WriteLine("send != recv");
|
|
27
|
+
Console.WriteLine("send: {0}", BitConverter.ToString(buffer, length));
|
|
28
|
+
Console.WriteLine("recv: {0}", BitConverter.ToString(recv));
|
|
29
|
+
return;
|
|
30
|
+
}
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
// Do DH64 key exchange and return a RC4 writer
|
|
35
|
+
private static BinaryWriter ConnInit(BinaryReader r) {
|
|
36
|
+
ulong privateKey;
|
|
37
|
+
ulong publicKey;
|
|
38
|
+
dh64.KeyPair(out privateKey, out publicKey);
|
|
39
|
+
Console.WriteLine("client public key: {0}", publicKey);
|
|
40
|
+
|
|
41
|
+
new BinaryWriter(r.BaseStream).Write(publicKey);
|
|
42
|
+
ulong srvPublicKey = r.ReadUInt64();
|
|
43
|
+
Console.WriteLine("server public key: {0}", srvPublicKey);
|
|
44
|
+
|
|
45
|
+
ulong secret = dh64.Secret(privateKey, srvPublicKey);
|
|
46
|
+
Console.WriteLine("secret: {0}", secret);
|
|
47
|
+
|
|
48
|
+
byte[] key;
|
|
49
|
+
using (MemoryStream ms = new MemoryStream()) {
|
|
50
|
+
new BinaryWriter(ms).Write(secret);
|
|
51
|
+
key = ms.ToArray();
|
|
52
|
+
}
|
|
53
|
+
Console.WriteLine("key: {0}", BitConverter.ToString(key).Replace("-", "").ToLower());
|
|
54
|
+
|
|
55
|
+
return new BinaryWriter(
|
|
56
|
+
new RC4Stream(r.BaseStream, key)
|
|
57
|
+
);
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
private static int WriteRandomBytes(BinaryWriter w, byte[] buffer) {
|
|
61
|
+
int length = random.Next(buffer.Length);
|
|
62
|
+
for (int i = 0; i < length; i ++) {
|
|
63
|
+
buffer[i] = (byte)random.Next(256);
|
|
64
|
+
}
|
|
65
|
+
w.Write((uint)length);
|
|
66
|
+
w.Write(buffer, 0, length);
|
|
67
|
+
return length;
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
private static bool ByteArrayEquals(byte[] a1, byte[] a2, int length) {
|
|
71
|
+
if (a2.Length != length)
|
|
72
|
+
return false;
|
|
73
|
+
for (int i=0; i<length; i++)
|
|
74
|
+
if (a1[i]!=a2[i])
|
|
75
|
+
return false;
|
|
76
|
+
return true;
|
|
77
|
+
}
|
|
78
|
+
}
|
|
@@ -0,0 +1,102 @@
|
|
|
1
|
+
package main
|
|
2
|
+
|
|
3
|
+
import (
|
|
4
|
+
"bytes"
|
|
5
|
+
"crypto/cipher"
|
|
6
|
+
"crypto/rc4"
|
|
7
|
+
"encoding/hex"
|
|
8
|
+
"flag"
|
|
9
|
+
"github.com/funny/binary"
|
|
10
|
+
dh64 "github.com/funny/crypto/dh64/go"
|
|
11
|
+
"log"
|
|
12
|
+
"math/rand"
|
|
13
|
+
"net"
|
|
14
|
+
"time"
|
|
15
|
+
)
|
|
16
|
+
|
|
17
|
+
func main() {
|
|
18
|
+
addr := flag.String("addr", "127.0.0.1:10010", "server address")
|
|
19
|
+
flag.Parse()
|
|
20
|
+
|
|
21
|
+
conn, err := net.Dial("tcp", *addr)
|
|
22
|
+
if err != nil {
|
|
23
|
+
log.Print("connect failed: ", err)
|
|
24
|
+
return
|
|
25
|
+
}
|
|
26
|
+
log.Print("client connect")
|
|
27
|
+
|
|
28
|
+
writer, reader, err := conn_init(conn)
|
|
29
|
+
if err != nil {
|
|
30
|
+
log.Print("conn init failed: ", err)
|
|
31
|
+
return
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
send := make([]byte, 0, 1024)
|
|
35
|
+
for {
|
|
36
|
+
send = randomData(send)
|
|
37
|
+
writer.WritePacket(send, binary.SplitByUint32LE)
|
|
38
|
+
if writer.Error() != nil {
|
|
39
|
+
log.Print("send failed: ", writer.Error())
|
|
40
|
+
return
|
|
41
|
+
}
|
|
42
|
+
recv := reader.ReadPacket(binary.SplitByUint32LE)
|
|
43
|
+
if reader.Error() != nil {
|
|
44
|
+
log.Print("receive failed: ", reader.Error())
|
|
45
|
+
return
|
|
46
|
+
}
|
|
47
|
+
if !bytes.Equal(send, recv) {
|
|
48
|
+
log.Print("send != recv")
|
|
49
|
+
log.Print("send: ", hex.EncodeToString(send))
|
|
50
|
+
log.Print("recv: ", hex.EncodeToString(recv))
|
|
51
|
+
return
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
|
|
56
|
+
// Do DH64 key exchange and return a RC4 writer.
|
|
57
|
+
func conn_init(conn net.Conn) (*binary.Writer, *binary.Reader, error) {
|
|
58
|
+
var (
|
|
59
|
+
writer = binary.NewWriter(conn)
|
|
60
|
+
reader = binary.NewReader(conn)
|
|
61
|
+
)
|
|
62
|
+
|
|
63
|
+
rand.Seed(time.Now().UnixNano())
|
|
64
|
+
|
|
65
|
+
privateKey, publicKey := dh64.KeyPair()
|
|
66
|
+
log.Print("client public key: ", publicKey)
|
|
67
|
+
|
|
68
|
+
writer.WriteUint64LE(publicKey)
|
|
69
|
+
if writer.Error() != nil {
|
|
70
|
+
return nil, nil, writer.Error()
|
|
71
|
+
}
|
|
72
|
+
serverPublicKey := reader.ReadUint64LE()
|
|
73
|
+
if reader.Error() != nil {
|
|
74
|
+
return nil, nil, reader.Error()
|
|
75
|
+
}
|
|
76
|
+
log.Print("server public key: ", serverPublicKey)
|
|
77
|
+
|
|
78
|
+
secert := dh64.Secret(privateKey, serverPublicKey)
|
|
79
|
+
log.Print("secert: ", secert)
|
|
80
|
+
|
|
81
|
+
key := make([]byte, 8)
|
|
82
|
+
binary.PutUint64LE(key, secert)
|
|
83
|
+
rc4stream, err := rc4.NewCipher(key)
|
|
84
|
+
if err != nil {
|
|
85
|
+
return nil, nil, err
|
|
86
|
+
}
|
|
87
|
+
log.Print("key: ", hex.EncodeToString(key))
|
|
88
|
+
|
|
89
|
+
writer = binary.NewWriter(cipher.StreamWriter{
|
|
90
|
+
W: conn,
|
|
91
|
+
S: rc4stream,
|
|
92
|
+
})
|
|
93
|
+
return writer, reader, nil
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
func randomData(b []byte) []byte {
|
|
97
|
+
a := b[:rand.Intn(cap(b))]
|
|
98
|
+
for i := 0; i < len(a); i++ {
|
|
99
|
+
a[i] = byte(rand.Int() % 256)
|
|
100
|
+
}
|
|
101
|
+
return a
|
|
102
|
+
}
|
|
@@ -0,0 +1,110 @@
|
|
|
1
|
+
package main
|
|
2
|
+
|
|
3
|
+
import (
|
|
4
|
+
"crypto/cipher"
|
|
5
|
+
"crypto/rc4"
|
|
6
|
+
"encoding/hex"
|
|
7
|
+
"flag"
|
|
8
|
+
"github.com/funny/binary"
|
|
9
|
+
dh64 "github.com/funny/crypto/dh64/go"
|
|
10
|
+
"log"
|
|
11
|
+
"math/rand"
|
|
12
|
+
"net"
|
|
13
|
+
"time"
|
|
14
|
+
)
|
|
15
|
+
|
|
16
|
+
func main() {
|
|
17
|
+
addr := flag.String("addr", "127.0.0.1:10010", "server address")
|
|
18
|
+
flag.Parse()
|
|
19
|
+
|
|
20
|
+
lsn, err := net.Listen("tcp", *addr)
|
|
21
|
+
if err != nil {
|
|
22
|
+
log.Print("listen failed: ", err)
|
|
23
|
+
return
|
|
24
|
+
}
|
|
25
|
+
log.Print("server wait")
|
|
26
|
+
|
|
27
|
+
for {
|
|
28
|
+
conn, err := lsn.Accept()
|
|
29
|
+
if err != nil {
|
|
30
|
+
log.Print("accept failed: ", err)
|
|
31
|
+
return
|
|
32
|
+
}
|
|
33
|
+
log.Print("server accpet: ", conn.RemoteAddr())
|
|
34
|
+
|
|
35
|
+
go func() {
|
|
36
|
+
writer, reader, err := conn_init(conn)
|
|
37
|
+
if err != nil {
|
|
38
|
+
log.Print("conn init failed: ", err)
|
|
39
|
+
return
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
var (
|
|
43
|
+
lastPrintTime = time.Now()
|
|
44
|
+
sendPacketCount uint64
|
|
45
|
+
recvPacketCount uint64
|
|
46
|
+
)
|
|
47
|
+
|
|
48
|
+
for {
|
|
49
|
+
recv := reader.ReadPacket(binary.SplitByUint32LE)
|
|
50
|
+
if reader.Error() != nil {
|
|
51
|
+
log.Print("receive failed: ", reader.Error())
|
|
52
|
+
return
|
|
53
|
+
}
|
|
54
|
+
recvPacketCount += 1
|
|
55
|
+
|
|
56
|
+
writer.WritePacket(recv, binary.SplitByUint32LE)
|
|
57
|
+
if writer.Error() != nil {
|
|
58
|
+
log.Print("send failed: ", writer.Error())
|
|
59
|
+
return
|
|
60
|
+
}
|
|
61
|
+
sendPacketCount += 1
|
|
62
|
+
|
|
63
|
+
if time.Since(lastPrintTime) > time.Second*2 {
|
|
64
|
+
lastPrintTime = time.Now()
|
|
65
|
+
log.Print("server: ", recvPacketCount, sendPacketCount)
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
}()
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
// Do DH64 key exchange and return a RC4 reader.
|
|
73
|
+
func conn_init(conn net.Conn) (*binary.Writer, *binary.Reader, error) {
|
|
74
|
+
var (
|
|
75
|
+
writer = binary.NewWriter(conn)
|
|
76
|
+
reader = binary.NewReader(conn)
|
|
77
|
+
)
|
|
78
|
+
|
|
79
|
+
rand.Seed(time.Now().UnixNano())
|
|
80
|
+
|
|
81
|
+
privateKey, publicKey := dh64.KeyPair()
|
|
82
|
+
log.Print("server public key: ", publicKey)
|
|
83
|
+
|
|
84
|
+
writer.WriteUint64LE(publicKey)
|
|
85
|
+
if writer.Error() != nil {
|
|
86
|
+
return nil, nil, writer.Error()
|
|
87
|
+
}
|
|
88
|
+
clientPublicKey := reader.ReadUint64LE()
|
|
89
|
+
if reader.Error() != nil {
|
|
90
|
+
return nil, nil, reader.Error()
|
|
91
|
+
}
|
|
92
|
+
log.Print("client public key: ", clientPublicKey)
|
|
93
|
+
|
|
94
|
+
secert := dh64.Secret(privateKey, clientPublicKey)
|
|
95
|
+
log.Print("secert: ", secert)
|
|
96
|
+
|
|
97
|
+
key := make([]byte, 8)
|
|
98
|
+
binary.PutUint64LE(key, secert)
|
|
99
|
+
rc4stream, err := rc4.NewCipher(key)
|
|
100
|
+
if err != nil {
|
|
101
|
+
return nil, nil, err
|
|
102
|
+
}
|
|
103
|
+
log.Print("key: ", hex.EncodeToString(key))
|
|
104
|
+
|
|
105
|
+
reader = binary.NewReader(cipher.StreamReader{
|
|
106
|
+
R: conn,
|
|
107
|
+
S: rc4stream,
|
|
108
|
+
})
|
|
109
|
+
return writer, reader, nil
|
|
110
|
+
}
|