|
@@ -1,261 +1,98 @@
|
|
|
+const NodeRSA = require('node-rsa');
|
|
|
+const {TLObject} = require("../tl/tlobject");
|
|
|
+const struct = require("python-struct");
|
|
|
const Helpers = require("../utils/Helpers");
|
|
|
-const BigIntBuffer = require("bigint-buffer");
|
|
|
-
|
|
|
-
|
|
|
-class RSAServerKey {
|
|
|
- constructor(fingerprint, m, e) {
|
|
|
- this.fingerprint = fingerprint;
|
|
|
- this.m = m;
|
|
|
- this.e = e;
|
|
|
-
|
|
|
- }
|
|
|
+let _serverKeys = {};
|
|
|
+
|
|
|
+/**
|
|
|
+ * Gets the arbitrary-length byte array corresponding to the given integer
|
|
|
+ * @param integer {number,BigInt}
|
|
|
+ * @param signed {boolean}
|
|
|
+ * @returns {Buffer}
|
|
|
+ */
|
|
|
+function getByteArray(integer, signed = false) {
|
|
|
+
|
|
|
+ let bits = integer.toString(2).length;
|
|
|
+ let byteLength = Math.floor((bits + 8 - 1) / 8);
|
|
|
+ let f;
|
|
|
+ f = Helpers.readBufferFromBigInt(BigInt(integer), byteLength, false, signed);
|
|
|
+ return f;
|
|
|
+}
|
|
|
|
|
|
- /**
|
|
|
- * Encrypts the given data with the current key
|
|
|
- * @param data
|
|
|
- * @param offset
|
|
|
- * @param length
|
|
|
- */
|
|
|
- encrypt(data, offset, length) {
|
|
|
- if (offset === undefined) {
|
|
|
- offset = 0;
|
|
|
- }
|
|
|
- if (length === undefined) {
|
|
|
- length = data.length;
|
|
|
- }
|
|
|
+function _computeFingerprint(key) {
|
|
|
+ let buf = Helpers.readBigIntFromBuffer(key.keyPair.n.toBuffer(), false);
|
|
|
+ let nArray = getByteArray(buf);
|
|
|
|
|
|
- let dataToWrite = data.slice(offset, offset + length);
|
|
|
- let sha1Data = Helpers.sha1(dataToWrite);
|
|
|
- let writer = Buffer.concat([sha1Data, dataToWrite]);
|
|
|
- let rnd = Helpers.generateRandomBytes(235 - length);
|
|
|
+ let n = TLObject.serializeBytes(nArray);
|
|
|
+ let e = TLObject.serializeBytes(getByteArray(key.keyPair.e));
|
|
|
+//Telegram uses the last 8 bytes as the fingerprint
|
|
|
+ let sh = Helpers.sha1(Buffer.concat([n, e]));
|
|
|
+ return struct.unpack("<q", sh.slice(-8))[0]
|
|
|
+}
|
|
|
|
|
|
- if (length < 235) {
|
|
|
- writer = Buffer.concat([writer, rnd]);
|
|
|
+function addKey(pub) {
|
|
|
+ let key = new NodeRSA(pub);
|
|
|
+ _serverKeys[_computeFingerprint(key)] = key;
|
|
|
|
|
|
- }
|
|
|
+}
|
|
|
|
|
|
- let result = BigIntBuffer.toBigIntBE(writer);
|
|
|
|
|
|
- result = Helpers.modExp(result, this.e, this.m);
|
|
|
+function encrypt(fingerprint, data) {
|
|
|
|
|
|
- /**
|
|
|
- * If the result byte count is less than 256, since the byte order is big,
|
|
|
- * the non-used bytes on the left will be 0 and act as padding,
|
|
|
- * without need of any additional checks
|
|
|
- */
|
|
|
- result = BigInt(result);
|
|
|
- return BigIntBuffer.toBufferBE(result, 256);
|
|
|
+ let key = _serverKeys[fingerprint];
|
|
|
+ if (!key) {
|
|
|
+ return undefined;
|
|
|
}
|
|
|
+ let buf = Helpers.readBigIntFromBuffer(key.keyPair.n.toBuffer(), false);
|
|
|
+ let nArray = getByteArray(buf);
|
|
|
+ let toEncrypt = Buffer.concat([Helpers.sha1(data), data, Helpers.generateRandomBytes(235 - data.length)]);
|
|
|
+ let encrypted = Helpers.modExp(Helpers.readBigIntFromBuffer(toEncrypt, false), BigInt(key.keyPair.e),
|
|
|
+ buf);
|
|
|
+
|
|
|
+ let block = Helpers.readBufferFromBigInt(encrypted, 256, false);
|
|
|
+ return block;
|
|
|
}
|
|
|
|
|
|
-
|
|
|
-class RSA {
|
|
|
- static _server_keys = {
|
|
|
- '216be86c022bb4c3': new RSAServerKey("216be86c022bb4c3", BigInt('0xC150023E2F70DB7985DED064759CFECF0AF328E69A41DAF4D6F01B538135A6F9' +
|
|
|
- '1F8F8B2A0EC9BA9720CE352EFCF6C5680FFC424BD634864902DE0B4BD6D49F4E' +
|
|
|
- '580230E3AE97D95C8B19442B3C0A10D8F5633FECEDD6926A7F6DAB0DDB7D457F' +
|
|
|
- '9EA81B8465FCD6FFFEED114011DF91C059CAEDAF97625F6C96ECC74725556934' +
|
|
|
- 'EF781D866B34F011FCE4D835A090196E9A5F0E4449AF7EB697DDB9076494CA5F' +
|
|
|
- '81104A305B6DD27665722C46B60E5DF680FB16B210607EF217652E60236C255F' +
|
|
|
- '6A28315F4083A96791D7214BF64C1DF4FD0DB1944FB26A2A57031B32EEE64AD1' +
|
|
|
- '5A8BA68885CDE74A5BFC920F6ABF59BA5C75506373E7130F9042DA922179251F'), BigInt('0x010001')),
|
|
|
-// -4344800451088585951
|
|
|
- '-4344800451088585951': new RSAServerKey( // Telegram servers //1
|
|
|
-// -----BEGIN RSA PUBLIC KEY-----
|
|
|
- // MIIBCgKCAQEAwVACPi9w23mF3tBkdZz+zwrzKOaaQdr01vAbU4E1pvkfj4sqDsm6
|
|
|
- // lyDONS789sVoD/xCS9Y0hkkC3gtL1tSfTlgCMOOul9lcixlEKzwKENj1Yz/s7daS
|
|
|
- // an9tqw3bfUV/nqgbhGX81v/+7RFAEd+RwFnK7a+XYl9sluzHRyVVaTTveB2GazTw
|
|
|
- // Efzk2DWgkBluml8OREmvfraX3bkHZJTKX4EQSjBbbdJ2ZXIsRrYOXfaA+xayEGB+
|
|
|
- // 8hdlLmAjbCVfaigxX0CDqWeR1yFL9kwd9P0NsZRPsmoqVwMbMu7mStFai6aIhc3n
|
|
|
- // Slv8kg9qv1m6XHVQY3PnEw+QQtqSIXklHwIDAQAB
|
|
|
-// -----END RSA PUBLIC KEY-----
|
|
|
- "-4344800451088585951",
|
|
|
- parseInt(
|
|
|
- "C150023E2F70DB7985DED064759CFECF0AF328E69A41DAF4D6F01B538135A6F9" +
|
|
|
- "1F8F8B2A0EC9BA9720CE352EFCF6C5680FFC424BD634864902DE0B4BD6D49F4E" +
|
|
|
- "580230E3AE97D95C8B19442B3C0A10D8F5633FECEDD6926A7F6DAB0DDB7D457F" +
|
|
|
- "9EA81B8465FCD6FFFEED114011DF91C059CAEDAF97625F6C96ECC74725556934" +
|
|
|
- "EF781D866B34F011FCE4D835A090196E9A5F0E4449AF7EB697DDB9076494CA5F" +
|
|
|
- "81104A305B6DD27665722C46B60E5DF680FB16B210607EF217652E60236C255F" +
|
|
|
- "6A28315F4083A96791D7214BF64C1DF4FD0DB1944FB26A2A57031B32EEE64AD1" +
|
|
|
- "5A8BA68885CDE74A5BFC920F6ABF59BA5C75506373E7130F9042DA922179251F", +
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- ),
|
|
|
-
|
|
|
- // 847625836280919973
|
|
|
- '847625836280919973': new RSAServerKey( // Telegram servers //2
|
|
|
-// -----BEGIN PUBLIC KEY-----
|
|
|
- // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAruw2yP/BCcsJliRoW5eB
|
|
|
- // VBVle9dtjJw+OYED160Wybum9SXtBBLXriwt4rROd9csv0t0OHCaTmRqBcQ0J8fx
|
|
|
- // hN6/cpR1GWgOZRUAiQxoMnlt0R93LCX/j1dnVa/gVbCjdSxpbrfY2g2L4frzjJvd
|
|
|
- // l84Kd9ORYjDEAyFnEA7dD556OptgLQQ2e2iVNq8NZLYTzLp5YpOdO1doK+ttrltg
|
|
|
- // gTCy5SrKeLoCPPbOgGsdxJxyz5KKcZnSLj16yE5HvJQn0CNpRdENvRUXe6tBP78O
|
|
|
- // 39oJ8BTHp9oIjd6XWXAsp2CvK45Ol8wFXGF710w9lwCGNbmNxNYhtIkdqfsEcwR5
|
|
|
- // JwIDAQAB
|
|
|
-// -----END PUBLIC KEY-----
|
|
|
- '847625836280919973',
|
|
|
- parseInt(
|
|
|
- "AEEC36C8FFC109CB099624685B97815415657BD76D8C9C3E398103D7AD16C9BB" +
|
|
|
- "A6F525ED0412D7AE2C2DE2B44E77D72CBF4B7438709A4E646A05C43427C7F184" +
|
|
|
- "DEBF72947519680E651500890C6832796DD11F772C25FF8F576755AFE055B0A3" +
|
|
|
- "752C696EB7D8DA0D8BE1FAF38C9BDD97CE0A77D3916230C4032167100EDD0F9E" +
|
|
|
- "7A3A9B602D04367B689536AF0D64B613CCBA7962939D3B57682BEB6DAE5B6081" +
|
|
|
- "30B2E52ACA78BA023CF6CE806B1DC49C72CF928A7199D22E3D7AC84E47BC9427" +
|
|
|
- "D0236945D10DBD15177BAB413FBF0EDFDA09F014C7A7DA088DDE9759702CA760" +
|
|
|
- "AF2B8E4E97CC055C617BD74C3D97008635B98DC4D621B4891DA9FB0473047927",
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- ),
|
|
|
-
|
|
|
- // 1562291298945373506
|
|
|
- '1562291298945373506': new RSAServerKey( // Telegram servers //3
|
|
|
-// -----BEGIN PUBLIC KEY-----
|
|
|
- // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvfLHfYH2r9R70w8prHbl
|
|
|
- // Wt/nDkh+XkgpflqQVcnAfSuTtO05lNPspQmL8Y2XjVT4t8cT6xAkdgfmmvnvRPOO
|
|
|
- // KPi0OfJXoRVylFzAQG/j83u5K3kRLbae7fLccVhKZhY46lvsueI1hQdLgNV9n1cQ
|
|
|
- // 3TDS2pQOCtovG4eDl9wacrXOJTG2990VjgnIKNA0UMoP+KF03qzryqIt3oTvZq03
|
|
|
- // DyWdGK+AZjgBLaDKSnC6qD2cFY81UryRWOab8zKkWAnhw2kFpcqhI0jdV5QaSCEx
|
|
|
- // vnsjVaX0Y1N0870931/5Jb9ICe4nweZ9kSDF/gip3kWLG0o8XQpChDfyvsqB9OLV
|
|
|
-// /wIDAQAB
|
|
|
-// -----END PUBLIC KEY-----
|
|
|
- '1562291298945373506',
|
|
|
- parseInt(
|
|
|
- "BDF2C77D81F6AFD47BD30F29AC76E55ADFE70E487E5E48297E5A9055C9C07D2B" +
|
|
|
- "93B4ED3994D3ECA5098BF18D978D54F8B7C713EB10247607E69AF9EF44F38E28" +
|
|
|
- "F8B439F257A11572945CC0406FE3F37BB92B79112DB69EEDF2DC71584A661638" +
|
|
|
- "EA5BECB9E23585074B80D57D9F5710DD30D2DA940E0ADA2F1B878397DC1A72B5" +
|
|
|
- "CE2531B6F7DD158E09C828D03450CA0FF8A174DEACEBCAA22DDE84EF66AD370F" +
|
|
|
- "259D18AF806638012DA0CA4A70BAA83D9C158F3552BC9158E69BF332A45809E1" +
|
|
|
- "C36905A5CAA12348DD57941A482131BE7B2355A5F4635374F3BD3DDF5FF925BF" +
|
|
|
- "4809EE27C1E67D9120C5FE08A9DE458B1B4A3C5D0A428437F2BECA81F4E2D5FF",
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- ),
|
|
|
-
|
|
|
-// -5859577972006586033
|
|
|
- '-5859577972006586033': new RSAServerKey( // Telegram servers //4
|
|
|
-// -----BEGIN PUBLIC KEY-----
|
|
|
- // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs/ditzm+mPND6xkhzwFI
|
|
|
- // z6J/968CtkcSE/7Z2qAJiXbmZ3UDJPGrzqTDHkO30R8VeRM/Kz2f4nR05GIFiITl
|
|
|
- // 4bEjvpy7xqRDspJcCFIOcyXm8abVDhF+th6knSU0yLtNKuQVP6voMrnt9MV1X92L
|
|
|
- // GZQLgdHZbPQz0Z5qIpaKhdyA8DEvWWvSUwwc+yi1/gGaybwlzZwqXYoPOhwMebzK
|
|
|
- // Uk0xW14htcJrRrq+PXXQbRzTMynseCoPIoke0dtCodbA3qQxQovE16q9zz4Otv2k
|
|
|
- // 4j63cz53J+mhkVWAeWxVGI0lltJmWtEYK6er8VqqWot3nqmWMXogrgRLggv/Nbbo
|
|
|
- // oQIDAQAB
|
|
|
-// -----END PUBLIC KEY-----
|
|
|
- '-5859577972006586033',
|
|
|
- parseInt(
|
|
|
- "B3F762B739BE98F343EB1921CF0148CFA27FF7AF02B6471213FED9DAA0098976" +
|
|
|
- "E667750324F1ABCEA4C31E43B7D11F1579133F2B3D9FE27474E462058884E5E1" +
|
|
|
- "B123BE9CBBC6A443B2925C08520E7325E6F1A6D50E117EB61EA49D2534C8BB4D" +
|
|
|
- "2AE4153FABE832B9EDF4C5755FDD8B19940B81D1D96CF433D19E6A22968A85DC" +
|
|
|
- "80F0312F596BD2530C1CFB28B5FE019AC9BC25CD9C2A5D8A0F3A1C0C79BCCA52" +
|
|
|
- "4D315B5E21B5C26B46BABE3D75D06D1CD33329EC782A0F22891ED1DB42A1D6C0" +
|
|
|
- "DEA431428BC4D7AABDCF3E0EB6FDA4E23EB7733E7727E9A1915580796C55188D" +
|
|
|
- "2596D2665AD1182BA7ABF15AAA5A8B779EA996317A20AE044B820BFF35B6E8A1",
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- ),
|
|
|
-
|
|
|
- // 6491968696586960280
|
|
|
- '6491968696586960280': new RSAServerKey( // Telegram servers //5
|
|
|
-// -----BEGIN PUBLIC KEY-----
|
|
|
- // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvmpxVY7ld/8DAjz6F6q0
|
|
|
- // 5shjg8/4p6047bn6/m8yPy1RBsvIyvuDuGnP/RzPEhzXQ9UJ5Ynmh2XJZgHoE9xb
|
|
|
- // nfxL5BXHplJhMtADXKM9bWB11PU1Eioc3+AXBB8QiNFBn2XI5UkO5hPhbb9mJpjA
|
|
|
- // 9Uhw8EdfqJP8QetVsI/xrCEbwEXe0xvifRLJbY08/Gp66KpQvy7g8w7VB8wlgePe
|
|
|
- // xW3pT13Ap6vuC+mQuJPyiHvSxjEKHgqePji9NP3tJUFQjcECqcm0yV7/2d0t/pbC
|
|
|
- // m+ZH1sadZspQCEPPrtbkQBlvHb4OLiIWPGHKSMeRFvp3IWcmdJqXahxLCUS1Eh6M
|
|
|
- // AQIDAQAB
|
|
|
-// -----END PUBLIC KEY-----
|
|
|
- '6491968696586960280',
|
|
|
- parseInt(
|
|
|
- "BE6A71558EE577FF03023CFA17AAB4E6C86383CFF8A7AD38EDB9FAFE6F323F2D" +
|
|
|
- "5106CBC8CAFB83B869CFFD1CCF121CD743D509E589E68765C96601E813DC5B9D" +
|
|
|
- "FC4BE415C7A6526132D0035CA33D6D6075D4F535122A1CDFE017041F1088D141" +
|
|
|
- "9F65C8E5490EE613E16DBF662698C0F54870F0475FA893FC41EB55B08FF1AC21" +
|
|
|
- "1BC045DED31BE27D12C96D8D3CFC6A7AE8AA50BF2EE0F30ED507CC2581E3DEC5" +
|
|
|
- "6DE94F5DC0A7ABEE0BE990B893F2887BD2C6310A1E0A9E3E38BD34FDED254150" +
|
|
|
- "8DC102A9C9B4C95EFFD9DD2DFE96C29BE647D6C69D66CA500843CFAED6E44019" +
|
|
|
- "6F1DBE0E2E22163C61CA48C79116FA77216726749A976A1C4B0944B5121E8C01",
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- ),
|
|
|
-
|
|
|
- // 6427105915145367799
|
|
|
- '6427105915145367799': new RSAServerKey( // CDN DC-121
|
|
|
-// -----BEGIN RSA PUBLIC KEY-----
|
|
|
- // MIIBCgKCAQEA+Lf3PvgE1yxbJUCMaEAkV0QySTVpnaDjiednB5RbtNWjCeqSVakY
|
|
|
- // HbqqGMIIv5WCGdFdrqOfMNcNSstPtSU6R9UmRw6tquOIykpSuUOje9H+4XVIKquj
|
|
|
- // yL2ISdK+4ZOMl4hCMkqauw4bP1Sbr03vZRQbU6qEA04V4j879BAyBVhr3WG9+Zi+
|
|
|
- // t5XfGSTgSExPYEl8rZNHYNV5RB+BuroVH2HLTOpT/mJVfikYpgjfWF5ldezV4Wo9
|
|
|
- // LSH0cZGSFIaeJl8d0A8Eiy5B9gtBO8mL+XfQRKOOmr7a4BM4Ro2de5rr2i2od7hY
|
|
|
- // Xd3DO9FRSl4y1zA8Am48Rfd95WHF3N/OmQIDAQAB
|
|
|
-// -----END RSA PUBLIC KEY-----
|
|
|
- '6427105915145367799',
|
|
|
- parseInt(
|
|
|
- "F8B7F73EF804D72C5B25408C6840245744324935699DA0E389E76707945BB4D5" +
|
|
|
- "A309EA9255A9181DBAAA18C208BF958219D15DAEA39F30D70D4ACB4FB5253A47" +
|
|
|
- "D526470EADAAE388CA4A52B943A37BD1FEE175482AABA3C8BD8849D2BEE1938C" +
|
|
|
- "978842324A9ABB0E1B3F549BAF4DEF65141B53AA84034E15E23F3BF410320558" +
|
|
|
- "6BDD61BDF998BEB795DF1924E0484C4F60497CAD934760D579441F81BABA151F" +
|
|
|
- "61CB4CEA53FE62557E2918A608DF585E6575ECD5E16A3D2D21F471919214869E" +
|
|
|
- "265F1DD00F048B2E41F60B413BC98BF977D044A38E9ABEDAE01338468D9D7B9A" +
|
|
|
- "EBDA2DA877B8585DDDC33BD1514A5E32D7303C026E3C45F77DE561C5DCDFCE99",
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- ),
|
|
|
-
|
|
|
- // 2685959930972952888
|
|
|
- '2685959930972952888': new RSAServerKey( // CDN DC-140
|
|
|
-// -----BEGIN RSA PUBLIC KEY-----
|
|
|
- // MIIBCgKCAQEAzuHVC7sE50Kho/yDVZtWnlmA5Bf/aM8KZY3WzS16w6w1sBqipj8o
|
|
|
- // gMGG7ULbGBtYmKEaI7IIJO6WM2m1MaXVnsqS8d7PaGAZiy8rSN3S7S2a8wp4RXZe
|
|
|
- // hs0JAXvZeIz45iByCMBfycbJKmSweYkesRUI7hUO8eQhmm/UYUEpJY7VOt0Iemiu
|
|
|
- // URSpqlRQ2FlcyHahYUNcvbICb4+/AP7coKBn6cB5FyzM7MCcKxbEKOx3Y3MUnbZq
|
|
|
- // q5pN6/eRazkegyrlp4kuJ94KsbRFHFX5Dx8uzjrO9wi8LF7gIgZu5DRMcmjXJKq6
|
|
|
- // rGZ2Z9cnrD8pVu1L2vcInd4K6ximZS2hbwIDAQAB
|
|
|
-// -----END RSA PUBLIC KEY-----
|
|
|
- '2685959930972952888',
|
|
|
- parseInt(
|
|
|
- "CEE1D50BBB04E742A1A3FC83559B569E5980E417FF68CF0A658DD6CD2D7AC3AC" +
|
|
|
- "35B01AA2A63F2880C186ED42DB181B5898A11A23B20824EE963369B531A5D59E" +
|
|
|
- "CA92F1DECF6860198B2F2B48DDD2ED2D9AF30A7845765E86CD09017BD9788CF8" +
|
|
|
- "E6207208C05FC9C6C92A64B079891EB11508EE150EF1E4219A6FD4614129258E" +
|
|
|
- "D53ADD087A68AE5114A9AA5450D8595CC876A161435CBDB2026F8FBF00FEDCA0" +
|
|
|
- "A067E9C079172CCCECC09C2B16C428EC776373149DB66AAB9A4DEBF7916B391E" +
|
|
|
- "832AE5A7892E27DE0AB1B4451C55F90F1F2ECE3ACEF708BC2C5EE022066EE434" +
|
|
|
- "4C7268D724AABAAC667667D727AC3F2956ED4BDAF7089DDE0AEB18A6652DA16F",
|
|
|
- 16
|
|
|
- ), // Modulus
|
|
|
- parseInt("010001", 16) // Exponent
|
|
|
- )
|
|
|
-
|
|
|
- };
|
|
|
-
|
|
|
- /**
|
|
|
- * Encrypts the given data given a fingerprint
|
|
|
- * @param fingerprint
|
|
|
- * @param data
|
|
|
- * @param offset
|
|
|
- * @param length
|
|
|
- */
|
|
|
- static encrypt(fingerprint, data, offset, length) {
|
|
|
- if (!(fingerprint.toLowerCase() in RSA._server_keys)) {
|
|
|
- return;
|
|
|
- }
|
|
|
- let key = RSA._server_keys[fingerprint.toLowerCase()];
|
|
|
- return key.encrypt(data, offset, length);
|
|
|
-
|
|
|
- }
|
|
|
+let publicKeys = [
|
|
|
+ `-----BEGIN RSA PUBLIC KEY-----
|
|
|
+MIIBCgKCAQEAwVACPi9w23mF3tBkdZz+zwrzKOaaQdr01vAbU4E1pvkfj4sqDsm6
|
|
|
+lyDONS789sVoD/xCS9Y0hkkC3gtL1tSfTlgCMOOul9lcixlEKzwKENj1Yz/s7daS
|
|
|
+an9tqw3bfUV/nqgbhGX81v/+7RFAEd+RwFnK7a+XYl9sluzHRyVVaTTveB2GazTw
|
|
|
+Efzk2DWgkBluml8OREmvfraX3bkHZJTKX4EQSjBbbdJ2ZXIsRrYOXfaA+xayEGB+
|
|
|
+8hdlLmAjbCVfaigxX0CDqWeR1yFL9kwd9P0NsZRPsmoqVwMbMu7mStFai6aIhc3n
|
|
|
+Slv8kg9qv1m6XHVQY3PnEw+QQtqSIXklHwIDAQAB
|
|
|
+-----END RSA PUBLIC KEY-----`,
|
|
|
+
|
|
|
+ `-----BEGIN RSA PUBLIC KEY-----
|
|
|
+MIIBCgKCAQEAxq7aeLAqJR20tkQQMfRn+ocfrtMlJsQ2Uksfs7Xcoo77jAid0bRt
|
|
|
+ksiVmT2HEIJUlRxfABoPBV8wY9zRTUMaMA654pUX41mhyVN+XoerGxFvrs9dF1Ru
|
|
|
+vCHbI02dM2ppPvyytvvMoefRoL5BTcpAihFgm5xCaakgsJ/tH5oVl74CdhQw8J5L
|
|
|
+xI/K++KJBUyZ26Uba1632cOiq05JBUW0Z2vWIOk4BLysk7+U9z+SxynKiZR3/xdi
|
|
|
+XvFKk01R3BHV+GUKM2RYazpS/P8v7eyKhAbKxOdRcFpHLlVwfjyM1VlDQrEZxsMp
|
|
|
+NTLYXb6Sce1Uov0YtNx5wEowlREH1WOTlwIDAQAB
|
|
|
+-----END RSA PUBLIC KEY-----`,
|
|
|
+
|
|
|
+ `-----BEGIN RSA PUBLIC KEY-----
|
|
|
+MIIBCgKCAQEAsQZnSWVZNfClk29RcDTJQ76n8zZaiTGuUsi8sUhW8AS4PSbPKDm+
|
|
|
+DyJgdHDWdIF3HBzl7DHeFrILuqTs0vfS7Pa2NW8nUBwiaYQmPtwEa4n7bTmBVGsB
|
|
|
+1700/tz8wQWOLUlL2nMv+BPlDhxq4kmJCyJfgrIrHlX8sGPcPA4Y6Rwo0MSqYn3s
|
|
|
+g1Pu5gOKlaT9HKmE6wn5Sut6IiBjWozrRQ6n5h2RXNtO7O2qCDqjgB2vBxhV7B+z
|
|
|
+hRbLbCmW0tYMDsvPpX5M8fsO05svN+lKtCAuz1leFns8piZpptpSCFn7bWxiA9/f
|
|
|
+x5x17D7pfah3Sy2pA+NDXyzSlGcKdaUmwQIDAQAB
|
|
|
+-----END RSA PUBLIC KEY-----`,
|
|
|
+
|
|
|
+ `-----BEGIN RSA PUBLIC KEY-----
|
|
|
+MIIBCgKCAQEAwqjFW0pi4reKGbkc9pK83Eunwj/k0G8ZTioMMPbZmW99GivMibwa
|
|
|
+xDM9RDWabEMyUtGoQC2ZcDeLWRK3W8jMP6dnEKAlvLkDLfC4fXYHzFO5KHEqF06i
|
|
|
+qAqBdmI1iBGdQv/OQCBcbXIWCGDY2AsiqLhlGQfPOI7/vvKc188rTriocgUtoTUc
|
|
|
+/n/sIUzkgwTqRyvWYynWARWzQg0I9olLBBC2q5RQJJlnYXZwyTL3y9tdb7zOHkks
|
|
|
+WV9IMQmZmyZh/N7sMbGWQpt4NMchGpPGeJ2e5gHBjDnlIf2p1yZOYeUYrdbwcS0t
|
|
|
+UiggS4UeE8TzIuXFQxw7fzEIlmhIaq3FnwIDAQAB
|
|
|
+-----END RSA PUBLIC KEY-----`
|
|
|
+];
|
|
|
+for (let pub of publicKeys) {
|
|
|
+ addKey(pub);
|
|
|
}
|
|
|
|
|
|
|
|
|
-module.exports = RSA;
|
|
|
+module.exports = {encrypt};
|