Advertisement
Guest User

aeslua

a guest
Jan 20th, 2017
96
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Lua 12.42 KB | None | 0 0
  1.  
  2. local function e(n)
  3. local s=setmetatable({},{__index=_ENV or getfenv()})if setfenv then setfenv(n,s)end;return n(s)or s end
  4. local t=e(function(n,...)local s=math.floor;local h,r
  5. r=function(d,l)return s(d%4294967296/2^l)end
  6. h=function(d,l)return(d*2^l)%4294967296 end
  7. return{bnot=bit.bnot,band=bit.band,bor=bit.bor,bxor=bit.bxor,rshift=r,lshift=h}end)
  8. local a=e(function(n,...)local s=t.bxor;local h=t.lshift;local r=0x100;local d=0xff;local l=0x11b;local u={}local c={}
  9. local function m(k,q)return s(k,q)end;local function f(k,q)return s(k,q)end
  10. local function w(k)if(k==1)then return 1 end;local q=d-c[k]return u[q]end;local function y(k,q)if(k==0 or q==0)then return 0 end;local j=c[k]+c[q]
  11. if(j>=d)then j=j-d end;return u[j]end
  12. local function p(k,q)
  13. if(k==0)then return 0 end;local j=c[k]-c[q]if(j<0)then j=j+d end;return u[j]end
  14. local function v()for k=1,r do print("log(",k-1,")=",c[k-1])end end
  15. local function b()for k=1,r do print("exp(",k-1,")=",u[k-1])end end;local function g()local k=1
  16. for q=0,d-1 do u[q]=k;c[k]=q;k=s(h(k,1),k)if k>d then k=f(k,l)end end end;g()return
  17. {add=m,sub=f,invert=w,mul=y,div=dib,printLog=v,printExp=b}end)
  18. util=e(function(n,...)local s=t.bxor;local h=t.rshift;local r=t.band;local d=t.lshift;local l;local function u(O)O=s(O,h(O,4))
  19. O=s(O,h(O,2))O=s(O,h(O,1))return r(O,1)end
  20. local function c(O,I)if(I==0)then return
  21. r(O,0xff)else return r(h(O,I*8),0xff)end end;local function m(O,I)
  22. if(I==0)then return r(O,0xff)else return d(r(O,0xff),I*8)end end
  23. local function f(O,I,N)local S={}
  24. for H=0,N-1 do
  25. S[H+1]=
  26. m(O[I+ (H*4)],3)+m(O[I+ (H*4)+1],2)+
  27. m(O[I+ (H*4)+2],1)+m(O[I+ (H*4)+3],0)if N%10000 ==0 then l()end end;return S end;local function w(O,I,N,S)S=S or#O;for H=0,S-1 do
  28. for R=0,3 do I[N+H*4+ (3-R)]=c(O[H+1],R)end;if S%10000 ==0 then l()end end
  29. return I end;local function y(O)local I=""
  30. for N,S in
  31. ipairs(O)do I=I..string.format("%02x ",S)end;return I end
  32. local function p(O)local I={}for N=1,#O,2 do I[#I+1]=tonumber(O:sub(N,
  33. N+1),16)end;return I end
  34. local function v(O)local I=type(O)
  35. if(I=="number")then return string.format("%08x",O)elseif
  36. (I=="table")then return y(O)elseif(I=="string")then local N={string.byte(O,1,#O)}
  37. return y(N)else return O end end
  38. local function b(O)local I=#O;local N=math.random(0,255)local S=math.random(0,255)
  39. local H=string.char(N,S,N,S,c(I,3),c(I,2),c(I,1),c(I,0))O=H..O;local R=math.ceil(#O/16)*16-#O;local D=""for L=1,R do D=D..
  40. string.char(math.random(0,255))end;return O..D end
  41. local function g(O)local I={string.byte(O,1,4)}if
  42. (I[1]==I[3]and I[2]==I[4])then return true end;return false end
  43. local function k(O)if(not g(O))then return nil end
  44. local I=
  45. m(string.byte(O,5),3)+
  46. m(string.byte(O,6),2)+m(string.byte(O,7),1)+m(string.byte(O,8),0)return string.sub(O,9,8+I)end;local function q(O,I)for N=1,16 do O[N]=s(O[N],I[N])end end
  47. local function j(O)
  48. local I=16;while true do local N=O[I]+1
  49. if N>=256 then O[I]=N-256;I=(I-2)%16+1 else O[I]=N;break end end end;local x,z,_=os.queueEvent,coroutine.yield,os.time;local E=_()
  50. local function l()local O=_()if O-E>=0.03 then E=O
  51. x("sleep")z("sleep")end end
  52. local function T(O)local I,N,S,H=string.char,math.random,l,table.insert;local R={}for D=1,O do
  53. H(R,N(0,255))if D%10240 ==0 then S()end end;return R end
  54. local function A(O)local I,N,S,H=string.char,math.random,l,table.insert;local R={}for D=1,O do
  55. H(R,I(N(0,255)))if D%10240 ==0 then S()end end
  56. return table.concat(R)end
  57. return
  58. {byteParity=u,getByte=c,putByte=m,bytesToInts=f,intsToBytes=w,bytesToHex=y,hexToBytes=p,toHexString=v,padByteString=b,properlyDecrypted=g,unpadByteString=k,xorIV=q,increment=j,sleepCheckIn=l,getRandomData=T,getRandomString=A}end)
  59. aes=e(function(n,...)local s=util.putByte;local h=util.getByte;local r='rounds'local d="type"local l=1;local u=2
  60. local c={}local m={}local f={}local w={}local y={}local p={}local v={}local b={}local g={}local k={}
  61. local q={0x01000000,0x02000000,0x04000000,0x08000000,0x10000000,0x20000000,0x40000000,0x80000000,0x1b000000,0x36000000,0x6c000000,0xd8000000,0xab000000,0x4d000000,0x9a000000,0x2f000000}
  62. local function j(M)mask=0xf8;result=0
  63. for F=1,8 do result=t.lshift(result,1)
  64. parity=util.byteParity(t.band(M,mask))result=result+parity;lastbit=t.band(mask,1)
  65. mask=t.band(t.rshift(mask,1),0xff)
  66. if(lastbit~=0)then mask=t.bor(mask,0x80)else mask=t.band(mask,0x7f)end end;return t.bxor(result,0x63)end;local function x()
  67. for M=0,255 do if(M~=0)then inverse=a.invert(M)else inverse=M end
  68. mapped=j(inverse)c[M]=mapped;m[mapped]=M end end
  69. local function z()
  70. for M=0,255 do
  71. byte=c[M]
  72. f[M]=
  73. s(a.mul(0x03,byte),0)+s(byte,1)+s(byte,2)+s(a.mul(0x02,byte),3)w[M]=s(byte,0)+s(byte,1)+s(a.mul(0x02,byte),2)+
  74. s(a.mul(0x03,byte),3)y[M]=
  75.  
  76. s(byte,0)+s(a.mul(0x02,byte),1)+s(a.mul(0x03,byte),2)+s(byte,3)p[M]=
  77.  
  78. s(a.mul(0x02,byte),0)+s(a.mul(0x03,byte),1)+s(byte,2)+s(byte,3)end end
  79. local function _()
  80. for M=0,255 do byte=m[M]
  81. v[M]=
  82. s(a.mul(0x0b,byte),0)+s(a.mul(0x0d,byte),1)+s(a.mul(0x09,byte),2)+
  83. s(a.mul(0x0e,byte),3)
  84. b[M]=
  85. s(a.mul(0x0d,byte),0)+s(a.mul(0x09,byte),1)+s(a.mul(0x0e,byte),2)+
  86. s(a.mul(0x0b,byte),3)
  87. g[M]=
  88. s(a.mul(0x09,byte),0)+s(a.mul(0x0e,byte),1)+s(a.mul(0x0b,byte),2)+
  89. s(a.mul(0x0d,byte),3)
  90. k[M]=
  91. s(a.mul(0x0e,byte),0)+s(a.mul(0x0b,byte),1)+s(a.mul(0x0d,byte),2)+
  92. s(a.mul(0x09,byte),3)end end;local function E(M)local F=t.band(M,0xff000000)return
  93. (t.lshift(M,8)+t.rshift(F,24))end
  94. local function T(M)return
  95. s(c[h(M,0)],0)+s(c[h(M,1)],1)+s(c[h(M,2)],2)+
  96. s(c[h(M,3)],3)end
  97. local function A(M)local F={}local W=math.floor(#M/4)if(
  98. (W~=4 and W~=6 and W~=8)or(W*4 ~=#M))then
  99. error("Invalid key size: "..tostring(W))return nil end;F[r]=W+6;F[d]=l;for Y=0,W-1
  100. do
  101. F[Y]=
  102. s(M[Y*4+1],3)+s(M[Y*4+2],2)+s(M[Y*4+3],1)+s(M[Y*4+4],0)end
  103. for Y=W,(F[r]+1)*4-1 do
  104. local P=F[Y-1]
  105. if(Y%W==0)then P=E(P)P=T(P)local V=math.floor(Y/W)P=t.bxor(P,q[V])elseif(
  106. W>6 and Y%W==4)then P=T(P)end;F[Y]=t.bxor(F[(Y-W)],P)end;return F end
  107. local function O(M)local F=h(M,3)local W=h(M,2)local Y=h(M,1)local P=h(M,0)
  108. return
  109.  
  110.  
  111.  
  112. s(a.add(a.add(a.add(a.mul(0x0b,W),a.mul(0x0d,Y)),a.mul(0x09,P)),a.mul(0x0e,F)),3)+
  113. s(a.add(a.add(a.add(a.mul(0x0b,Y),a.mul(0x0d,P)),a.mul(0x09,F)),a.mul(0x0e,W)),2)+
  114. s(a.add(a.add(a.add(a.mul(0x0b,P),a.mul(0x0d,F)),a.mul(0x09,W)),a.mul(0x0e,Y)),1)+
  115. s(a.add(a.add(a.add(a.mul(0x0b,F),a.mul(0x0d,W)),a.mul(0x09,Y)),a.mul(0x0e,P)),0)end
  116. local function I(M)local F=h(M,3)local W=h(M,2)local Y=h(M,1)local P=h(M,0)local V=t.bxor(P,Y)
  117. local B=t.bxor(W,F)local G=t.bxor(V,B)G=t.bxor(G,a.mul(0x08,G))
  118. w=t.bxor(G,a.mul(0x04,t.bxor(Y,F)))G=t.bxor(G,a.mul(0x04,t.bxor(P,W)))
  119. return
  120.  
  121.  
  122. s(t.bxor(t.bxor(P,G),a.mul(0x02,t.bxor(F,P))),0)+s(t.bxor(t.bxor(Y,w),a.mul(0x02,V)),1)+
  123. s(t.bxor(t.bxor(W,G),a.mul(0x02,t.bxor(F,P))),2)+
  124. s(t.bxor(t.bxor(F,w),a.mul(0x02,B)),3)end
  125. local function N(M)local F=A(M)if(F==nil)then return nil end;F[d]=u;for W=4,(F[r]+1)*4-5 do
  126. F[W]=O(F[W])end;return F end;local function S(M,F,W)
  127. for Y=0,3 do M[Y+1]=t.bxor(M[Y+1],F[W*4+Y])end end
  128. local function H(M,F)
  129. F[1]=t.bxor(t.bxor(t.bxor(f[h(M[1],3)],w[h(M[2],2)]),y[h(M[3],1)]),p[h(M[4],0)])
  130. F[2]=t.bxor(t.bxor(t.bxor(f[h(M[2],3)],w[h(M[3],2)]),y[h(M[4],1)]),p[h(M[1],0)])
  131. F[3]=t.bxor(t.bxor(t.bxor(f[h(M[3],3)],w[h(M[4],2)]),y[h(M[1],1)]),p[h(M[2],0)])
  132. F[4]=t.bxor(t.bxor(t.bxor(f[h(M[4],3)],w[h(M[1],2)]),y[h(M[2],1)]),p[h(M[3],0)])end
  133. local function R(M,F)
  134. F[1]=s(c[h(M[1],3)],3)+s(c[h(M[2],2)],2)+
  135. s(c[h(M[3],1)],1)+s(c[h(M[4],0)],0)
  136. F[2]=s(c[h(M[2],3)],3)+s(c[h(M[3],2)],2)+
  137. s(c[h(M[4],1)],1)+s(c[h(M[1],0)],0)
  138. F[3]=s(c[h(M[3],3)],3)+s(c[h(M[4],2)],2)+
  139. s(c[h(M[1],1)],1)+s(c[h(M[2],0)],0)
  140. F[4]=s(c[h(M[4],3)],3)+s(c[h(M[1],2)],2)+
  141. s(c[h(M[2],1)],1)+s(c[h(M[3],0)],0)end
  142. local function D(M,F)
  143. F[1]=t.bxor(t.bxor(t.bxor(v[h(M[1],3)],b[h(M[4],2)]),g[h(M[3],1)]),k[h(M[2],0)])
  144. F[2]=t.bxor(t.bxor(t.bxor(v[h(M[2],3)],b[h(M[1],2)]),g[h(M[4],1)]),k[h(M[3],0)])
  145. F[3]=t.bxor(t.bxor(t.bxor(v[h(M[3],3)],b[h(M[2],2)]),g[h(M[1],1)]),k[h(M[4],0)])
  146. F[4]=t.bxor(t.bxor(t.bxor(v[h(M[4],3)],b[h(M[3],2)]),g[h(M[2],1)]),k[h(M[1],0)])end
  147. local function L(M,F)
  148. F[1]=s(m[h(M[1],3)],3)+s(m[h(M[4],2)],2)+
  149. s(m[h(M[3],1)],1)+s(m[h(M[2],0)],0)
  150. F[2]=s(m[h(M[2],3)],3)+s(m[h(M[1],2)],2)+
  151. s(m[h(M[4],1)],1)+s(m[h(M[3],0)],0)
  152. F[3]=s(m[h(M[3],3)],3)+s(m[h(M[2],2)],2)+
  153. s(m[h(M[1],1)],1)+s(m[h(M[4],0)],0)
  154. F[4]=s(m[h(M[4],3)],3)+s(m[h(M[3],2)],2)+
  155. s(m[h(M[2],1)],1)+s(m[h(M[1],0)],0)end
  156. local function U(M,F,W,Y,P)W=W or 1;Y=Y or{}P=P or 1;local V={}local B={}if(M[d]~=l)then
  157. error("No encryption key: "..
  158. tostring(M[d])..", expected "..l)return end
  159. V=util.bytesToInts(F,W,4)S(V,M,0)local G=1;while(G<M[r]-1)do H(V,B)S(B,M,G)G=G+1;H(B,V)S(V,M,G)
  160. G=G+1 end;H(V,B)S(B,M,G)G=G+1;R(B,V)S(V,M,G)
  161. util.sleepCheckIn()return util.intsToBytes(V,Y,P)end
  162. local function C(M,F,W,Y,P)W=W or 1;Y=Y or{}P=P or 1;local V={}local B={}
  163. if(M[d]~=u)then error("No decryption key: "..
  164. tostring(M[d]))return end;V=util.bytesToInts(F,W,4)S(V,M,M[r])local G=M[r]-1;while(G>2)do
  165. D(V,B)S(B,M,G)G=G-1;D(B,V)S(V,M,G)G=G-1 end;D(V,B)
  166. S(B,M,G)G=G-1;L(B,V)S(V,M,G)util.sleepCheckIn()return
  167. util.intsToBytes(V,Y,P)end;x()z()_()
  168. return{ROUNDS=r,KEY_TYPE=d,ENCRYPTION_KEY=l,DECRYPTION_KEY=u,expandEncryptionKey=A,expandDecryptionKey=N,encrypt=U,decrypt=C}end)
  169. local o=e(function(n,...)local function s()return{}end;local function h(d,l)table.insert(d,l)end;local function r(d)return
  170. table.concat(d)end;return{new=s,addString=h,toString=r}end)
  171. ciphermode=e(function(n,...)local s={}local h=math.random
  172. function s.encryptString(r,d,l,u)if u then local f={}for w=1,16 do f[w]=u[w]end;u=f else
  173. u={0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0}end
  174. local c=aes.expandEncryptionKey(r)local m=o.new()for f=1,#d/16 do local w=(f-1)*16+1
  175. local y={string.byte(d,w,w+15)}u=l(c,y,u)
  176. o.addString(m,string.char(unpack(y)))end
  177. return o.toString(m)end;function s.encryptECB(r,d,l)aes.encrypt(r,d,1,d,1)end;function s.encryptCBC(r,d,l)
  178. util.xorIV(d,l)aes.encrypt(r,d,1,d,1)return d end;function s.encryptOFB(r,d,l)
  179. aes.encrypt(r,l,1,l,1)util.xorIV(d,l)return l end;function s.encryptCFB(r,d,l)
  180. aes.encrypt(r,l,1,l,1)util.xorIV(d,l)return d end
  181. function s.encryptCTR(r,d,l)
  182. local u={}for c=1,16 do u[c]=l[c]end;aes.encrypt(r,l,1,l,1)
  183. util.xorIV(d,l)util.increment(u)return u end
  184. function s.decryptString(r,d,l,u)if u then local f={}for w=1,16 do f[w]=u[w]end;u=f else
  185. u={0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0}end;local c
  186. if l==s.decryptOFB or
  187. l==s.decryptCFB or l==s.decryptCTR then
  188. c=aes.expandEncryptionKey(r)else c=aes.expandDecryptionKey(r)end;local m=o.new()for f=1,#d/16 do local w=(f-1)*16+1
  189. local y={string.byte(d,w,w+15)}u=l(c,y,u)
  190. o.addString(m,string.char(unpack(y)))end
  191. return o.toString(m)end;function s.decryptECB(r,d,l)aes.decrypt(r,d,1,d,1)return l end;function s.decryptCBC(r,d,l)
  192. local u={}for c=1,16 do u[c]=d[c]end;aes.decrypt(r,d,1,d,1)
  193. util.xorIV(d,l)return u end;function s.decryptOFB(r,d,l)
  194. aes.encrypt(r,l,1,l,1)util.xorIV(d,l)return l end;function s.decryptCFB(r,d,l)
  195. local u={}for c=1,16 do u[c]=d[c]end;aes.encrypt(r,l,1,l,1)
  196. util.xorIV(d,l)return u end
  197. s.decryptCTR=s.encryptCTR;return s end)AES128=16;AES192=24;AES256=32;ECBMODE=1;CBCMODE=2;OFBMODE=3;CFBMODE=4;CTRMODE=4
  198. local function i(n,s,h)local r=s;if(s==
  199. AES192)then r=32 end
  200. if(r>#n)then local l=""for u=1,r-#n do
  201. l=l..string.char(0)end;n=n..l else n=string.sub(n,1,r)end;local d={string.byte(n,1,#n)}
  202. n=ciphermode.encryptString(d,n,ciphermode.encryptCBC,h)n=string.sub(n,1,s)return{string.byte(n,1,#n)}end
  203. function encrypt(n,s,h,r,d)assert(n~=nil,"Empty password.")
  204. assert(n~=nil,"Empty data.")local r=r or CBCMODE;local h=h or AES128;local l=i(n,h,d)
  205. local u=util.padByteString(s)
  206. if r==ECBMODE then
  207. return ciphermode.encryptString(l,u,ciphermode.encryptECB,d)elseif r==CBCMODE then
  208. return ciphermode.encryptString(l,u,ciphermode.encryptCBC,d)elseif r==OFBMODE then
  209. return ciphermode.encryptString(l,u,ciphermode.encryptOFB,d)elseif r==CFBMODE then
  210. return ciphermode.encryptString(l,u,ciphermode.encryptCFB,d)elseif r==CTRMODE then
  211. return ciphermode.encryptString(l,u,ciphermode.encryptCTR,d)else error("Unknown mode",2)end end
  212. function decrypt(n,s,h,r,d)local r=r or CBCMODE;local h=h or AES128;local l=i(n,h,d)local u
  213. if r==ECBMODE then
  214. u=ciphermode.decryptString(l,s,ciphermode.decryptECB,d)elseif r==CBCMODE then
  215. u=ciphermode.decryptString(l,s,ciphermode.decryptCBC,d)elseif r==OFBMODE then
  216. u=ciphermode.decryptString(l,s,ciphermode.decryptOFB,d)elseif r==CFBMODE then
  217. u=ciphermode.decryptString(l,s,ciphermode.decryptCFB,d)elseif r==CTRMODE then
  218. u=ciphermode.decryptString(l,s,ciphermode.decryptCTR,d)else error("Unknown mode",2)end;result=util.unpadByteString(u)
  219. if(result==nil)then return nil end;return result end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement