forked from Green-Sky/tomato
Green Sky
aae086cc65
b03b571272 fix: flaky tcp test This only fixes the symptoms, not the real problem. Sometimes or consistently on some platforms a socket might need a moment before it can be written to. 32e67ab4c2 cleanup: use typedef for private message ID's in callback 7b1db6adc1 feat: add message IDs to private group messages 99e0bcc27d refactor: Observers/ignored peers can now send and receive custom packets b3c3c49d26 fix: Disable IPv6 in Windows cross-compilation tests e742deddff feat: Check hashes of Windows dependencies when cross-compiling dfb9a0b02b fix: Test the current Windows Dockerfile, not an old Dockerhub image 14de93ccec chore: Use WineHQ's Wine as Debian Bookworm's crashes ed37616249 docs: Update the Windows cross-compilation section 9bb79c174f cleanup: Remove a couple of unnecessary misc_tools dependencies 19475adb70 chore: Statically link OpenMP into the cracker fun util on Windows 1be311e51f feat: Build the fun utils when cross-compiling to Windows 88133f8446 chore: Strip Windows binaries 3cc0ae7535 refactor: Copy over all of the required static dependencies c4fa8f7fb1 feat: Generate .def, .exp and .lib files when building for Windows 74bbac5363 feat: Let CMake create the dll instead of doing so ourselves 246642e9ae feat: Harden Windows cross-compilation 8d431c0d11 chore: Bump Windows build dependency versions e519f7998b fix: Remove unnecessary wsock32 dependency on Windows ed2b60c217 chore: Use a specific non-broken slimcc version. d7f21010a1 chore: Update github actions. e71a68b7f2 docs: Update the list of CMake options 77e08876ff chore: Remove mod and founder from group API naming scheme 12bc042767 docs: add the experimental api build option to INSTALL.md e1fa5cae96 refactor: Rename Queries to Query to align with other enums. be82a3ea30 fix: Correct type for conference offline peer numbers. 0627c36716 test: Add pkgsrc build. 92578afe4b test: Add FreeBSD VM action on GitHub. 52ece0f57b test: Build toxcore on NetBSD (VM). 3fe8ee2c11 chore: Only install tox_private.h on request. 9a8dfa06ab fix: save_compatibility_test failing on big-endian systems 86f5e55578 fix: Don't serve files from websockify. 710eb674a5 fix: Correctly pass extended public keys to group moderation code. 021db7031c refactor: Use `struct`s for extended public/secret keys. a1e999fd80 chore: Compile libsodium reference implementation with compcert. fbe3c19cf5 cleanup: correct a few nullable annotations 623e3ee5c3 cleanup: Don't use `memcpy` to cast arbitrary `struct`s to `uint8_t[]`. c71567dc18 fix: Pass array, not array pointer, to `memcmp`. 9b46a08144 cleanup: Never pass `void*` directly to `memcpy`. 5d7b7a7bbc refactor: Use tox rng to seed the keypair generation. 961891d568 cleanup: Small improvements found by PVS Studio. 8201019f0d chore: Disable NGC saving by default, enable through Tox_Options. 5dd9ee3f65 cleanup: Replace pointer arithmetic with explicit `&arr[i]`. ca4606d49d refactor: Use strong typedef for NGC peer id. 442213b722 cleanup: Simplify custom packet length check in NGC. 08d3393def fix: Correct a few potential null derefs in bootstrap daemon. b9877b32b0 fix: Add missing memunlock of local variable when it goes out of scope. dab5fe44b9 fix: Zero out stack-allocated secret key before return. f058103299 refactor: Make prune_gc_sanctions_list more obviously correct. 3ba7a0dec9 docs: Add static analysis tool list to README. 8d0811a0f3 docs: Run prettier-markdown on markdown files. 969e3a2bfc refactor: Fix network test not using the strong typedef 93c83fbc7c refactor: Use strong typedef instead of struct for `Socket`. 9fe18b176f fix: Fix some false positive from PVS Studio. 7c44379ccb cleanup: Check that WINXP macro exists before comparing it. 5c93231bef refactor: Make tox mutex non-recursive. aacff73939 docs: Fix up doxyfile. d55fc85ff5 docs: Add more documentation to crypto_core. 5bdaaaedb6 refactor: Remove `Tox *` from `tox_dispatch`. e202341e76 refactor: Don't rely on tox_dispatch passing tox in tests. 34df938f52 chore: Use C++ mode for clang-tidy. 8b05296a78 chore: Check that both gtest and gmock exist for tests. 42010660e1 test: Add slimcc compiler compatibility test. b473630321 chore: Add some comments to the astyle config. b7404f24f6 cleanup: Remove implicit bool conversions. 4e2dba4d9f chore: Reformat sources with astyle. 4359e3a6bc chore: Rename C++ headers to .hh suffixes. 0c05566e58 cleanup: Further `#include` cleanups. 8d29935b7a chore: Only check the bootstrap daemon checksum on release. f70e588bc6 cleanup: Add more `const` where possible. 511bfe39c8 cleanup: Use Bazel modules to enforce proper `#include` hygiene. 1710a0d091 refactor: Move pack/unpack `IP_Port` from DHT into network module. a975943564 chore: Really fix coverage docker image build. c08409390f chore: Fix post-submit coverage image. 39aadf8922 fix: Don't use `memcmp` to compare `IP_Port`s. d94246a906 fix: partially fix a bug that prevented group part messages from sending. eeaa039222 chore: Fix rpm build; add a CI check for it. 8328449c1a chore: Speed up docker builds a bit by reducing layer count. d6d67d56f3 cleanup: Add `const` where possible in auto tests. 6aa9e6850d cleanup: Minor cleanup of event unpack code. bdf460a3a9 refactor: Rename `system_{memory,...}` to `os_{memory,...}`. 203e1af81e fix: a few off by one errors in group autotests 5c093c4888 cleanup: Remove all uses of `SIZEOF_VLA`. 662c2140f3 test: Add goblint static analyser. 8f07755834 cleanup: Use `memzero(x, s)` instead of `memset(x, 0, s)`. a7258e40cf cleanup: Use explicit 0 instead of `PACKET_ID_PADDING`. 6370d0f15d cleanup: Expand the `Tox_Options` accessor macros. 14a1a0b9bd cleanup: Remove plan9 support. a05dccad13 test: Add a simple new/delete test for Tox. 1cdcf938b9 cleanup: Add comment after every `#endif`. ba99d4dc4b test: Fix comment I broke in the events test PR. e07248debb refactor: Migrate auto_tests to new events API. bdd42b5452 refactor: Add common msgpack array packer with callback. 3c659f5288 cleanup: Rename group to conference in groupav documentation. 89957be230 cleanup: Ensure handler params are named after callback params. c650d9d345 refactor: Pass `this` pointer as first param to s11n callbacks. e7fb91ddb8 refactor: Allow NULL pointers for byte arrays in events. 5e2c8cabc1 cleanup: make some improvements to group moderation test 259de4867e cleanup: Remove `bin_pack_{new,free}`. 21a8ff5895 cleanup: skip a do_gc iteration before removing peers marked for deletion 16809dc36e feat: Add dht_get_nodes_response event to the events system. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: b03b5712720de9a9901ea12fd741f177327a7021
261 lines
7.4 KiB
C
261 lines
7.4 KiB
C
/* Public key cracker.
|
|
*
|
|
* Can be used to find public keys starting with specific hex (ABCD) for example.
|
|
*
|
|
* NOTE: There's probably a way to make this faster.
|
|
*
|
|
* Usage: ./cracker ABCDEF
|
|
*
|
|
* Will try to find a public key starting with: ABCDEF
|
|
*/
|
|
|
|
#include <inttypes.h>
|
|
#include <stdbool.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
|
|
/* Sodium includes*/
|
|
#include <sodium/crypto_scalarmult_curve25519.h>
|
|
#include <sodium/randombytes.h>
|
|
|
|
/* NULL compatibility macro */
|
|
#include "../../toxcore/ccompat.h"
|
|
|
|
#define KEY_LEN 32
|
|
// Maximum number of bytes this program can crack in one run
|
|
#define MAX_CRACK_BYTES 8
|
|
// Maximum length of hex encoded prefix
|
|
#define MAX_HEX_PREFIX_LEN (MAX_CRACK_BYTES * 2)
|
|
|
|
#if defined(_OPENMP)
|
|
#include <omp.h>
|
|
#define NUM_THREADS() ((unsigned) omp_get_max_threads())
|
|
#else
|
|
#pragma message("Being built without OpenMP support -- the program will utilize a single thread only.")
|
|
#define NUM_THREADS() (1U)
|
|
#endif
|
|
|
|
static void print_key(const uint8_t *client_id)
|
|
{
|
|
for (uint32_t j = 0; j < 32; ++j) {
|
|
printf("%02X", client_id[j]);
|
|
}
|
|
}
|
|
|
|
/// bytes needs to be at least (hex_len+1)/2 long
|
|
static size_t hex_string_to_bin(const char *hex_string, size_t hex_len, uint8_t *bytes)
|
|
{
|
|
size_t i;
|
|
const char *pos = hex_string;
|
|
// make even
|
|
|
|
for (i = 0; i < hex_len / 2; ++i, pos += 2) {
|
|
uint8_t val;
|
|
|
|
if (sscanf(pos, "%02hhx", &val) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
bytes[i] = val;
|
|
}
|
|
|
|
if (i * 2 < hex_len) {
|
|
uint8_t val;
|
|
|
|
if (sscanf(pos, "%hhx", &val) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
bytes[i] = (uint8_t)(val << 4);
|
|
++i;
|
|
}
|
|
|
|
return i;
|
|
}
|
|
|
|
static size_t match_hex_prefix(const uint8_t *key, const uint8_t *prefix, size_t prefix_len)
|
|
{
|
|
size_t same = 0;
|
|
uint8_t diff = 0;
|
|
size_t i;
|
|
|
|
for (i = 0; i < prefix_len / 2; ++i) {
|
|
diff = key[i] ^ prefix[i];
|
|
|
|
// First check high nibble
|
|
if ((diff & 0xF0) == 0) {
|
|
++same;
|
|
}
|
|
|
|
// Then low nibble
|
|
if (diff == 0) {
|
|
++same;
|
|
} else {
|
|
break;
|
|
}
|
|
}
|
|
|
|
// check last high nibble
|
|
if ((prefix_len % 2) && diff == 0) {
|
|
diff = key[i] ^ prefix[i];
|
|
|
|
// First check high nibble
|
|
if ((diff & 0xF0) == 0) {
|
|
++same;
|
|
}
|
|
}
|
|
|
|
return same;
|
|
}
|
|
|
|
static void cracker_core(uint64_t range_start, uint64_t range_end, uint64_t range_offs, uint64_t priv_key_shadow[4],
|
|
uint32_t *longest_match, uint8_t hex_prefix[MAX_CRACK_BYTES], size_t prefix_chars_len)
|
|
{
|
|
#if defined(_OPENMP)
|
|
#pragma omp parallel for firstprivate(priv_key_shadow) shared(longest_match, range_start, range_end, range_offs, hex_prefix, prefix_chars_len) schedule(static) default(none)
|
|
#endif
|
|
for (uint64_t batch = range_start; batch < range_end; ++batch) {
|
|
uint8_t *priv_key = (uint8_t *) priv_key_shadow;
|
|
/*
|
|
* We can't use the first and last bytes because they are masked in
|
|
* curve25519. Offset by 16 bytes to get better alignment.
|
|
*/
|
|
uint64_t *counter = priv_key_shadow + 2;
|
|
/*
|
|
* Add to `counter` instead of assign here, to preservere more randomness on short runs
|
|
* There can be an intentional overflow in `batch + range_offs`
|
|
*/
|
|
*counter += batch + range_offs;
|
|
uint8_t pub_key[KEY_LEN] = {0};
|
|
|
|
crypto_scalarmult_curve25519_base(pub_key, priv_key);
|
|
|
|
const unsigned matching = (unsigned) match_hex_prefix(pub_key, hex_prefix, prefix_chars_len);
|
|
|
|
// Global compare and update
|
|
uint32_t l_longest_match;
|
|
#if defined(_OPENMP)
|
|
#pragma omp atomic read
|
|
#endif
|
|
l_longest_match = *longest_match;
|
|
|
|
if (matching > l_longest_match) {
|
|
#if defined(_OPENMP)
|
|
#pragma omp atomic write
|
|
#endif
|
|
*longest_match = matching;
|
|
#if defined(_OPENMP)
|
|
#pragma omp critical
|
|
#endif
|
|
{
|
|
printf("%u chars matching: \n", matching);
|
|
printf("Public key: ");
|
|
print_key(pub_key);
|
|
printf("\nSecret key: ");
|
|
print_key(priv_key);
|
|
printf("\n");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static void print_stats(double seconds_passed, double keys_tried)
|
|
{
|
|
printf("Runtime: %10lus, Keys tried %e/%e, Calculating %e keys/s\n",
|
|
(unsigned long) seconds_passed, keys_tried, (double) UINT64_MAX, keys_tried / seconds_passed);
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
if (argc < 2) {
|
|
printf("usage: ./cracker public_key(or beginning of one in hex format)\n");
|
|
return 0;
|
|
}
|
|
|
|
const size_t prefix_chars_len = strlen(argv[1]);
|
|
|
|
/*
|
|
* If you can afford the hardware to crack longer prefixes, you can probably
|
|
* afford to rewrite this program.
|
|
*/
|
|
if (prefix_chars_len > MAX_HEX_PREFIX_LEN) {
|
|
printf("Finding a key with more than 16 hex chars as prefix is not supported\n");
|
|
return 1;
|
|
}
|
|
|
|
uint8_t hex_prefix[MAX_CRACK_BYTES] = {0};
|
|
|
|
const size_t prefix_len = hex_string_to_bin(argv[1], prefix_chars_len, hex_prefix);
|
|
|
|
if (prefix_len == 0) {
|
|
printf("Invalid hex key specified\n");
|
|
return 1;
|
|
}
|
|
|
|
printf("Searching for key with prefix: %s\n", argv[1]);
|
|
|
|
time_t start_time = time(nullptr);
|
|
|
|
// Declare private key bytes as uint64_t[4] so we can lower the alignment without problems
|
|
uint64_t priv_key_shadow[KEY_LEN / 8];
|
|
uint8_t *priv_key = (uint8_t *) priv_key_shadow;
|
|
// Put randomness into the key
|
|
randombytes(priv_key, KEY_LEN);
|
|
uint32_t longest_match = 0;
|
|
|
|
// Finishes a batch every ~10s on my PC
|
|
const uint64_t batch_size = (UINT64_C(1) << 18) * NUM_THREADS();
|
|
|
|
// calculate remaining batch that doesn't fit the main loop
|
|
const uint64_t rem_batch_size = UINT64_MAX % batch_size;
|
|
|
|
const uint64_t rem_start = UINT64_MAX - rem_batch_size - 1;
|
|
|
|
cracker_core(rem_start, UINT64_MAX, 1, priv_key_shadow, &longest_match, hex_prefix, prefix_chars_len);
|
|
|
|
double seconds_passed = difftime(time(nullptr), start_time);
|
|
double old_seconds_passed = seconds_passed;
|
|
|
|
// Reduce time to first stats output
|
|
print_stats(seconds_passed, rem_batch_size + 1);
|
|
|
|
if (longest_match >= prefix_chars_len) {
|
|
printf("Found matching prefix, exiting...\n");
|
|
return 0;
|
|
}
|
|
|
|
for (uint64_t tries = 0; tries < rem_start; tries += batch_size) {
|
|
cracker_core(tries, tries + batch_size, 0, priv_key_shadow, &longest_match, hex_prefix, prefix_chars_len);
|
|
|
|
seconds_passed = difftime(time(nullptr), start_time);
|
|
// Use double type to avoid overflow in addition, we don't need precision here anyway
|
|
double keys_tried = ((double) tries) + rem_batch_size + 1;
|
|
|
|
if (longest_match >= prefix_chars_len) {
|
|
print_stats(seconds_passed, keys_tried);
|
|
printf("Found matching prefix, exiting...\n");
|
|
return 0;
|
|
}
|
|
|
|
// Rate limit output
|
|
if (seconds_passed - old_seconds_passed > 5.0) {
|
|
old_seconds_passed = seconds_passed;
|
|
print_stats(seconds_passed, keys_tried);
|
|
fflush(stdout);
|
|
}
|
|
}
|
|
|
|
printf("Congrats future person who successfully searched a key space of 2^64\n");
|
|
uint64_t *counter = priv_key_shadow + 2;
|
|
*counter = 0;
|
|
printf("Didn't find anything from:\n");
|
|
print_key(priv_key);
|
|
printf("\nto:\n");
|
|
*counter = UINT64_MAX;
|
|
print_key(priv_key);
|
|
printf("\n");
|
|
return 2;
|
|
}
|