Telegram Web K with changes to work inside I2P https://web.telegram.i2p/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

262 lines
15 KiB

import bytesFromHex from '../helpers/bytes/bytesFromHex';
import bytesToHex from '../helpers/bytes/bytesToHex';
import CryptoWorker from '../lib/crypto/cryptoworker';
import type { RSAPublicKeyHex } from '../lib/mtproto/rsaKeysManager';
import '../lib/polyfill';
test('factorize', async() => {
const data: {good?: [Uint8Array, Uint8Array], pq: Uint8Array}[] = [{
good: [new Uint8Array([86, 190, 62, 123]), new Uint8Array([88, 30, 39, 1])],
pq: new Uint8Array([29, 219, 156, 252, 236, 172, 251, 123])
}, {
good: [new Uint8Array([59, 165, 190, 67]), new Uint8Array([88, 86, 117, 215])],
pq: new Uint8Array([20, 149, 30, 137, 202, 169, 105, 69])
}, {
good: [new Uint8Array([75, 215, 20, 103]), new Uint8Array([77, 137, 174, 55])],
pq: new Uint8Array([22, 248, 122, 217, 97, 50, 100, 33])
}, { // leemon cannot factorize that
good: [new Uint8Array([59, 223, 139, 105]), new Uint8Array([62, 179, 202, 59])],
pq: new Uint8Array([14, 170, 48, 94, 24, 240, 251, 51])
}, {
good: [new Uint8Array([11]), new Uint8Array([1, 15, 141])],
pq: new Uint8Array([11, 171, 15])
}, {
good: [new Uint8Array([3]), new Uint8Array([5])],
pq: new Uint8Array([15])
}];
const methods = [
'factorize' as const,
// 'factorize-tdlib' as const,
// 'factorize-new-new' as const
];
for(const {good, pq} of data) {
for(const method of methods) {
const perf = performance.now();
await CryptoWorker.invokeCrypto(method, pq).then(pAndQ => {
// console.log(method, performance.now() - perf, pAndQ);
if(good) {
expect(pAndQ).toEqual(good);
}
});
}
// break;
}
});
test('sha1', () => {
const bytes = new Uint8Array(bytesFromHex('ec5ac983081eeb1da706316227000000044af6cfb1000000046995dd57000000d55105998729349339eb322d86ec13bc0884f6ba0449d8ecbad0ef574837422579a11a88591796cdcc4c05690da0652462489286450179a635924bcc0ab83848'));
CryptoWorker.invokeCrypto('sha1', bytes)
.then(bytes => {
//console.log(bytesFromArrayBuffer(buffer));
expect(bytes).toEqual(new Uint8Array([
55, 160, 249, 190, 133, 135,
3, 45, 56, 157, 186, 81,
249, 0, 96, 235, 11, 10,
173, 197
]));
});
});
test('sha256', () => {
CryptoWorker.invokeCrypto('sha256', new Uint8Array([112, 20, 211, 20, 106, 249, 203, 252, 39, 107, 106, 194, 63, 60, 13, 130, 51, 78, 107, 6, 110, 156, 214, 65, 205, 10, 30, 150, 79, 10, 145, 194, 232, 240, 127, 55, 146, 103, 248, 227, 160, 172, 30, 153, 122, 189, 110, 162, 33, 86, 174, 117]))
.then(bytes => {
expect(bytes).toEqual(new Uint8Array([158, 59, 39, 247, 130, 244, 235, 160, 16, 249, 34, 114, 67, 171, 203, 208, 187, 72, 217, 106, 253, 62, 195, 242, 52, 118, 99, 72, 221, 29, 203, 95]));
});
const client_salt = new Uint8Array([58, 45, 208, 42, 210, 96, 229, 224, 220, 241, 61, 180, 91, 93, 132, 127, 29, 81, 244, 35, 114, 240, 134, 109, 60, 129, 157, 117, 214, 173, 161, 93, 61, 215, 199, 129, 184, 20, 247, 52]);
// ! ! ! ! ! ! ! ! ! ! THIS IS WRONG WAY TO ENCODE AND CONCAT THEM AFTER ! ! ! ! ! ! ! ! ! ! ! ! !
/* let clientSaltString = '';
for(let i = 0; i < client_salt.length; i++) clientSaltString += String.fromCharCode(client_salt[i]); */
const payload = [
['£', 'b4fe151e413445357b1c0935e7cf04a429492ebd23dc62bfadb2f898c431c1fd'],
['haha', '090b235e9eb8f197f2dd927937222c570396d971222d9009a9189e2b6cc0a2c1'],
['😂😘❤😍😊😁👁👍🏿', 'f3cd34d2345934e10d95d01c7eae9040a6f3c4e20a02a392078b762d876ece8a'],
['$', '09fc96082d34c2dfc1295d92073b5ea1dc8ef8da95f14dfded011ffb96d3e54b'],
//[clientSaltString + '😂😘❤😍😊😁👁👍🏿' + clientSaltString, 'c2ac294f00e8ac4db6b94099f2014d763315cb2127b1e1ea178cfc3f302680d0'],
[new Uint8Array(Array.from(client_salt).concat(Array.from(new TextEncoder().encode('😂😘❤😍😊😁👁👍🏿')), Array.from(client_salt))), 'f11950fb40baf391b06a57e7490c8ad4d99ec0c1516c2bc7e529895296616ea7']
];
payload.forEach(pair => {
//const uint8 = new TextEncoder().encode(pair[0]);
//CryptoWorker.sha256Hash(new Uint8Array(pair[0].split('').map(c => c.charCodeAt(0)))).then(bytes => {
CryptoWorker.invokeCrypto('sha256', pair[0]).then(bytes => {
const hex = bytesToHex(bytes);
expect(hex).toEqual(pair[1]);
});
});
});
test('rsa', () => {
const publicKey: RSAPublicKeyHex = {
// "fingerprint": "15032203592031600005",
"modulus": "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",
"exponent": "010001"
};
const bytes = new Uint8Array([
128, 44, 176, 17, 43, 185, 92, 222, 101, 45, 211, 184, 175, 154,
124, 57, 15, 214, 164, 165, 113, 127, 147, 133, 5, 140, 185, 174,
99, 182, 38, 56, 213, 169, 199, 173, 52, 240, 128, 225, 246, 190,
234, 221, 108, 175, 228, 25, 204, 154, 57, 235, 143, 95, 98, 15,
8, 100, 65, 117, 58, 91, 110, 200, 76, 207, 234, 44, 21, 138, 99,
134, 212, 188, 177, 72, 177, 203, 60, 145, 209, 63, 35, 230, 185,
73, 26, 103, 199, 71, 54, 53, 183, 182, 218, 163, 209, 26, 248,
231, 170, 70, 224, 204, 137, 177, 9, 228, 176, 212, 231, 137,
104, 205, 1, 68, 172, 59, 53, 246, 33, 95, 193, 158, 52, 203,
230, 57, 177, 7, 190, 97, 183, 79, 154, 242, 187, 170, 65, 30, 82,
102, 10, 1, 188, 191, 69, 156, 174, 208, 173, 141, 58, 190, 46,
243, 78, 200, 129, 210, 184, 100, 130, 83, 191, 107, 192, 143, 44,
232, 163, 150, 67, 62, 15, 91, 141, 115, 172, 183, 206, 133, 131,
239, 149, 133, 39, 15, 187, 200, 239, 75, 209, 102, 27, 185, 223,
186, 156, 34, 112, 120, 223, 37, 105, 130, 184, 232, 56, 173, 0,
165, 156, 83, 207, 134, 167, 32, 57, 60, 177, 219, 127, 102, 247,
76, 60, 248, 16, 0, 232, 215, 5, 235, 79, 237, 181, 229, 216, 97,
45, 52, 252, 109, 44, 94, 55, 113, 248, 125, 60, 216, 152, 79, 4, 7
]);
const good = new Uint8Array([
166, 252, 51, 235, 146, 3, 147, 182, 43, 71, 71, 180, 236, 84, 235,
122, 40, 36, 254, 75, 52, 194, 162, 6, 166, 44, 227, 83, 148, 215,
72, 75, 80, 32, 100, 106, 172, 59, 220, 231, 233, 39, 122, 167, 255,
209, 132, 170, 109, 31, 151, 227, 70, 39, 196, 240, 25, 77, 255,
178, 17, 156, 153, 18, 19, 157, 208, 116, 49, 236, 150, 249, 245,
149, 226, 176, 101, 20, 201, 198, 177, 75, 166, 62, 151, 119, 64,
67, 253, 12, 199, 62, 210, 162, 59, 143, 170, 189, 66, 158, 51, 168,
56, 173, 231, 214, 100, 85, 54, 183, 1, 177, 162, 75, 245, 87, 205,
199, 245, 109, 60, 144, 78, 114, 38, 38, 71, 36, 34, 240, 40, 119,
154, 244, 35, 22, 5, 110, 174, 153, 62, 114, 182, 2, 180, 92, 137,
224, 218, 147, 197, 211, 168, 245, 147, 171, 80, 123, 178, 112, 76,
24, 104, 236, 117, 191, 60, 219, 25, 205, 128, 19, 59, 46, 67, 30,
240, 117, 194, 44, 247, 50, 55, 87, 139, 224, 23, 152, 129, 182,
101, 202, 24, 190, 67, 253, 63, 172, 210, 21, 151, 1, 30, 164, 52,
77, 75, 128, 86, 80, 177, 202, 69, 67, 65, 120, 217, 164, 251, 29,
86, 185, 43, 175, 22, 124, 10, 175, 181, 223, 130, 232, 47, 134, 67,
54, 226, 253, 25, 230, 197, 109, 205, 240, 242, 65, 233, 17, 98,
120, 106, 17, 142, 143, 9, 233
]);
CryptoWorker.invokeCrypto('rsa-encrypt', bytes, publicKey).then(encrypted => {
expect(encrypted).toEqual(good);
});
});
test('pbkdf2', () => {
/* const crypto = require('crypto');
Object.defineProperty(global.self, 'crypto', {
value: {
getRandomValues: arr => crypto.randomBytes(arr.length),
},
}); */
/* let buffer = new Uint8Array([
166, 101, 158, 215, 174, 249, 101, 150, 109, 155, 243,
250, 221, 227, 251, 39, 34, 108, 230, 63, 198, 98, 9,
95, 20, 66, 186, 1, 245, 240, 185, 238
]);
let salt = new Uint8Array([
40, 95, 205, 123, 107, 81, 255, 138, 0, 0, 0, 0, 0, 0, 0, 0
]);
let iterations = 100000; */
});
test('mod-pow', () => {
const g_a = new Uint8Array([
0xa8, 0x8b, 0xf9, 0xeb, 0xf9, 0x15, 0x19, 0x11, 0xdf, 0x3b, 0x1, 0x82, 0x52,
0x9c, 0x8f, 0xe1, 0xcd, 0x6, 0xf0, 0x46, 0xf7, 0x50, 0x34, 0x53, 0xe, 0xb9,
0x51, 0x21, 0x6d, 0xab, 0x1a, 0x36, 0x9d, 0x45, 0x3a, 0x7c, 0x62, 0x4a, 0x41,
0x4e, 0x0, 0x15, 0x42, 0x87, 0xfc, 0xef, 0x51, 0x2d, 0xfa, 0x6f, 0x5b, 0xde,
0xfb, 0x74, 0x62, 0xc3, 0x19, 0x20, 0x74, 0x91, 0x75, 0x84, 0xf2, 0xa8, 0x4b,
0xd8, 0x62, 0xb0, 0xb4, 0x19, 0xfe, 0x9, 0x65, 0x8, 0x94, 0xae, 0x27, 0xd2,
0x82, 0xd9, 0x96, 0xd9, 0xad, 0x1f, 0xbd, 0xef, 0xce, 0x77, 0x62, 0x6c, 0x7f,
0x79, 0xf5, 0x62, 0xbc, 0xd6, 0x4c, 0xf3, 0x6, 0x31, 0xf4, 0xf7, 0x3f, 0xc1,
0xde, 0x99, 0x41, 0x15, 0xec, 0x5d, 0xea, 0x98, 0x4f, 0x2b, 0x71, 0x70, 0x6d,
0xc3, 0x39, 0x44, 0x7a, 0x37, 0x25, 0xa2, 0x25, 0x46, 0xdd, 0xd9, 0x4, 0x6b,
0xf0, 0xe5, 0xd7, 0x3f, 0x1, 0x32, 0x20, 0x2f, 0xfa, 0xc5, 0xbd, 0x69, 0xc0,
0xa5, 0x26, 0xb0, 0x2d, 0xa7, 0x7d, 0xa7, 0x39, 0xe4, 0x2d, 0xb6, 0x32, 0x95,
0xdf, 0x56, 0x88, 0x8c, 0x82, 0xe7, 0xc6, 0x89, 0x78, 0xfd, 0xe3, 0xb2, 0xc1,
0xd7, 0x3f, 0x95, 0x33, 0xb9, 0x9d, 0xbe, 0x4c, 0x95, 0x6b, 0x24, 0x21, 0xda,
0xa1, 0xa3, 0xab, 0xcd, 0x88, 0x45, 0xd5, 0x49, 0x92, 0xc5, 0x46, 0x21, 0xca,
0x8b, 0x51, 0xc7, 0x61, 0x7e, 0x68, 0x75, 0xf7, 0x4e, 0x53, 0x55, 0xce, 0xc6,
0xa1, 0x8d, 0x99, 0x2d, 0x50, 0x50, 0x2b, 0x51, 0x8c, 0x9, 0x8f, 0x49, 0xdd,
0x33, 0x98, 0xa9, 0x70, 0x1a, 0x8f, 0xc2, 0xf4, 0x4d, 0x2b, 0xab, 0x9b, 0x90,
0x8e, 0x1e, 0xfe, 0x1a, 0xe2, 0xfb, 0xe, 0x44, 0x58, 0x43, 0xc3, 0x94, 0x65,
0x92, 0x90, 0xa0, 0xd, 0x30, 0xdf, 0x9b, 0x1c, 0x45
]);
const randomPower = new Uint8Array([
0xbc, 0x52, 0x41, 0x6a, 0x18, 0x8b, 0x7a, 0x51, 0x99, 0xc2, 0x3d, 0x1a, 0xaa, 0xda,
0xda, 0x8a, 0xb4, 0x4d, 0x77, 0x1b, 0x3a, 0x54, 0xaf, 0x1c, 0x48, 0xdc, 0x9b, 0x6b,
0x59, 0x85, 0xbf, 0xa, 0xd6, 0x52, 0x92, 0x6f, 0xf3, 0xc2, 0xbd, 0x46, 0xb6, 0x13,
0xf7, 0xe0, 0x39, 0xcc, 0x6a, 0x9d, 0xee, 0x5d, 0xa4, 0x49, 0x94, 0x7b, 0xa6, 0xa3,
0x53, 0xa4, 0x38, 0xfd, 0x7a, 0xf9, 0xbf, 0xc0, 0xa8, 0x46, 0x1a, 0xb8, 0x3e, 0x49,
0xb7, 0xf7, 0xbf, 0x5d, 0xf4, 0x9, 0x95, 0x41, 0x23, 0x3d, 0x35, 0x50, 0x49, 0x4,
0xce, 0x5f, 0x26, 0xc9, 0x2b, 0x54, 0x78, 0x66, 0x1a, 0x9e, 0xd9, 0x2d, 0xb1, 0x79,
0x7c, 0xb4, 0xd0, 0x1d, 0xe3, 0x62, 0x81, 0x12, 0x98, 0xf5, 0x90, 0xf3, 0xd5, 0x71,
0xee, 0x48, 0xb6, 0xae, 0xd6, 0x5f, 0x85, 0x59, 0xce, 0x36, 0x96, 0xa3, 0xa5, 0xa3,
0x96, 0x64, 0xe, 0x7e, 0xa4, 0xa1, 0x3c, 0x9b, 0x68, 0x33, 0x67, 0xd7, 0xf3, 0x3f,
0x85, 0x15, 0x34, 0x6c, 0xd0, 0x7a, 0x94, 0x75, 0x12, 0xf2, 0x1, 0x98, 0x1, 0x90,
0x11, 0xbd, 0xa1, 0xa0, 0xda, 0x79, 0x3, 0xce, 0x22, 0x21, 0x69, 0xdf, 0x5d, 0x9a,
0xee, 0xd7, 0x98, 0xae, 0x1e, 0x74, 0x96, 0xb3, 0xda, 0xbd, 0x31, 0x4b, 0xb4, 0x71,
0x14, 0xba, 0xfa, 0xa9, 0x1, 0x62, 0x46, 0x7d, 0x35, 0x1c, 0xbf, 0x88, 0xa4, 0x46,
0x45, 0xb1, 0x91, 0x89, 0x69, 0xfb, 0x9f, 0xf, 0x9a, 0x8b, 0xe, 0xc0, 0xfc, 0xa,
0x7b, 0x78, 0x16, 0xe5, 0xce, 0x90, 0x4e, 0xb2, 0xf0, 0x39, 0x2c, 0xbd, 0x1e, 0xa9,
0xdc, 0x5c, 0xc1, 0x35, 0x29, 0xe2, 0xc4, 0x1a, 0x9a, 0xd7, 0xb5, 0x69, 0x30, 0xf2,
0x72, 0xc2, 0x6d, 0x90, 0x49, 0x48, 0x49, 0xc5, 0x87, 0x96, 0xa5, 0xf3, 0xb6, 0xa6,
0xc, 0xe5, 0xf8, 0x8e
]);
const p = new Uint8Array([
0xc7, 0x1c, 0xae, 0xb9, 0xc6, 0xb1, 0xc9, 0x4, 0x8e, 0x6c, 0x52, 0x2f, 0x70, 0xf1,
0x3f, 0x73, 0x98, 0xd, 0x40, 0x23, 0x8e, 0x3e, 0x21, 0xc1, 0x49, 0x34, 0xd0, 0x37,
0x56, 0x3d, 0x93, 0xf, 0x48, 0x19, 0x8a, 0xa, 0xa7, 0xc1, 0x40, 0x58, 0x22, 0x94,
0x93, 0xd2, 0x25, 0x30, 0xf4, 0xdb, 0xfa, 0x33, 0x6f, 0x6e, 0xa, 0xc9, 0x25, 0x13,
0x95, 0x43, 0xae, 0xd4, 0x4c, 0xce, 0x7c, 0x37, 0x20, 0xfd, 0x51, 0xf6, 0x94, 0x58,
0x70, 0x5a, 0xc6, 0x8c, 0xd4, 0xfe, 0x6b, 0x6b, 0x13, 0xab, 0xdc, 0x97, 0x46, 0x51,
0x29, 0x69, 0x32, 0x84, 0x54, 0xf1, 0x8f, 0xaf, 0x8c, 0x59, 0x5f, 0x64, 0x24, 0x77,
0xfe, 0x96, 0xbb, 0x2a, 0x94, 0x1d, 0x5b, 0xcd, 0x1d, 0x4a, 0xc8, 0xcc, 0x49, 0x88,
0x7, 0x8, 0xfa, 0x9b, 0x37, 0x8e, 0x3c, 0x4f, 0x3a, 0x90, 0x60, 0xbe, 0xe6, 0x7c,
0xf9, 0xa4, 0xa4, 0xa6, 0x95, 0x81, 0x10, 0x51, 0x90, 0x7e, 0x16, 0x27, 0x53, 0xb5,
0x6b, 0xf, 0x6b, 0x41, 0xd, 0xba, 0x74, 0xd8, 0xa8, 0x4b, 0x2a, 0x14, 0xb3, 0x14,
0x4e, 0xe, 0xf1, 0x28, 0x47, 0x54, 0xfd, 0x17, 0xed, 0x95, 0xd, 0x59, 0x65, 0xb4,
0xb9, 0xdd, 0x46, 0x58, 0x2d, 0xb1, 0x17, 0x8d, 0x16, 0x9c, 0x6b, 0xc4, 0x65, 0xb0,
0xd6, 0xff, 0x9c, 0xa3, 0x92, 0x8f, 0xef, 0x5b, 0x9a, 0xe4, 0xe4, 0x18, 0xfc, 0x15,
0xe8, 0x3e, 0xbe, 0xa0, 0xf8, 0x7f, 0xa9, 0xff, 0x5e, 0xed, 0x70, 0x5, 0xd, 0xed,
0x28, 0x49, 0xf4, 0x7b, 0xf9, 0x59, 0xd9, 0x56, 0x85, 0xc, 0xe9, 0x29, 0x85, 0x1f,
0xd, 0x81, 0x15, 0xf6, 0x35, 0xb1, 0x5, 0xee, 0x2e, 0x4e, 0x15, 0xd0, 0x4b, 0x24,
0x54, 0xbf, 0x6f, 0x4f, 0xad, 0xf0, 0x34, 0xb1, 0x4, 0x3, 0x11, 0x9c, 0xd8, 0xe3,
0xb9, 0x2f, 0xcc, 0x5b
]);
CryptoWorker.invokeCrypto('mod-pow', g_a, randomPower, p).then(encrypted => {
const good = new Uint8Array([
0x2c, 0xb2, 0x4, 0xe7, 0xa8, 0x63, 0x5f, 0x3e, 0xd0, 0x67, 0x5f, 0x76, 0x87, 0x37, 0x56, 0xc2,
0x2d, 0xe7, 0xd, 0xe3, 0x9b, 0xbd, 0x9d, 0xf6, 0x3b, 0x1f, 0xc, 0xb4, 0x37, 0xc6, 0xf, 0x75,
0x83, 0x1a, 0x8b, 0x65, 0x73, 0xf6, 0x83, 0x64, 0x16, 0x7e, 0xb3, 0xd8, 0xc1, 0xd, 0x1d, 0x69,
0xf4, 0x4, 0x25, 0x80, 0x6, 0x3b, 0xc7, 0x70, 0x55, 0xdb, 0x7d, 0x99, 0x39, 0x18, 0x6e, 0xcb,
0x35, 0x98, 0x9f, 0xa2, 0x47, 0x63, 0x2c, 0x1b, 0xaf, 0x13, 0xdc, 0x1e, 0x52, 0xf5, 0x36, 0x5e,
0xc5, 0x41, 0xd5, 0x4, 0x2b, 0x9c, 0x28, 0xee, 0xcf, 0x89, 0xa8, 0xcb, 0x6e, 0x43, 0xda, 0xbc,
0xbf, 0xcd, 0x12, 0xa8, 0x32, 0xe8, 0x3d, 0x27, 0x5f, 0xfb, 0xa9, 0x5, 0xa, 0x29, 0xfa, 0x70,
0x5e, 0x96, 0x8b, 0xd1, 0xe5, 0xdf, 0x4d, 0xfe, 0xed, 0xfc, 0xc1, 0xd9, 0x67, 0x25, 0x1b, 0x5a,
0x5b, 0x26, 0x41, 0x83, 0x52, 0x89, 0xf9, 0xb3, 0xed, 0x9d, 0xfd, 0xa3, 0xce, 0xbc, 0x5, 0x27,
0xd8, 0x54, 0xef, 0x4f, 0x4e, 0x73, 0xa1, 0xd5, 0x7d, 0x92, 0xdc, 0xe5, 0x64, 0xcd, 0x83, 0x87,
0x31, 0x98, 0xf5, 0x3f, 0x27, 0xd0, 0x78, 0x4b, 0x47, 0x58, 0x8b, 0x4f, 0x77, 0x8a, 0x1a, 0x85,
0x37, 0xc2, 0x68, 0xe9, 0xbc, 0xbe, 0x38, 0x2d, 0x51, 0xd3, 0x68, 0x89, 0xa1, 0x41, 0x38, 0x9c,
0xd6, 0x1c, 0x30, 0xf4, 0x83, 0x85, 0xba, 0x43, 0x12, 0xc, 0xff, 0xb3, 0x35, 0x43, 0xf7, 0x8f,
0x26, 0xb3, 0xcb, 0xfd, 0xa0, 0x27, 0xfc, 0xe2, 0xbd, 0x9d, 0xa9, 0xbf, 0x8e, 0xe, 0xf6, 0x88,
0x83, 0xc3, 0x4d, 0xae, 0x7c, 0x2, 0x7e, 0xcc, 0x9d, 0xb1, 0x4f, 0x28, 0x20, 0xed, 0x13, 0x32,
0x5b, 0x36, 0x1b, 0x50, 0x5a, 0xf2, 0x86, 0x35, 0xb2, 0x9f, 0x24, 0xf5, 0x64, 0xb3, 0x11, 0x75
]);
expect(encrypted).toEqual(good);
});
});