added comments and changed executable name to xrdp-keygen

ulab-original
jsorg71 17 years ago
parent 2363bd373b
commit cc464bbd04

@ -10,13 +10,13 @@ LDFLAGS =
LIBS = -ldl -lcrypto LIBS = -ldl -lcrypto
CC = gcc CC = gcc
all: keygen_ all: xrdp-keygen
keygen_: $(KEYGENOBJ) xrdp-keygen: $(KEYGENOBJ)
$(CC) $(LDFLAGS) -o keygen $(KEYGENOBJ) $(LIBS) $(CC) $(LDFLAGS) -o xrdp-keygen $(KEYGENOBJ) $(LIBS)
clean: clean:
rm -f $(KEYGENOBJ) keygen rm -f $(KEYGENOBJ) xrdp-keygen
os_calls.o: ../common/os_calls.c os_calls.o: ../common/os_calls.c
$(CC) $(C_OS_FLAGS) ../common/os_calls.c $(CC) $(C_OS_FLAGS) ../common/os_calls.c

@ -106,17 +106,18 @@ static int APP_CC
out_params(void) out_params(void)
{ {
g_writeln(""); g_writeln("");
g_writeln("key gen utility examples"); g_writeln("xrdp rsa key gen utility examples");
g_writeln(" './keygen xrdp'"); g_writeln(" './xrdp-keygen xrdp'");
g_writeln(" './keygen test'"); g_writeln(" './xrdp-keygen test'");
g_writeln(""); g_writeln("");
return 0; return 0;
} }
/*****************************************************************************/ /*****************************************************************************/
/* this is the special key signing algorithm */
static int APP_CC static int APP_CC
sign_key(char* e_data, int e_len, char* n_data, int n_len, sign_key(char* e_data, int e_len, char* n_data, int n_len,
char* d_data, int d_len, char* sign_data, int sign_len) char* sign_data, int sign_len)
{ {
char* key; char* key;
char* md5_final; char* md5_final;
@ -129,18 +130,26 @@ sign_key(char* e_data, int e_len, char* n_data, int n_len,
key = (char*)g_malloc(176, 0); key = (char*)g_malloc(176, 0);
md5_final = (char*)g_malloc(64, 0); md5_final = (char*)g_malloc(64, 0);
md5 = ssl_md5_info_create(); md5 = ssl_md5_info_create();
/* copy the test key */
g_memcpy(key, g_testkey, 176); g_memcpy(key, g_testkey, 176);
/* replace e and n */
g_memcpy(key + 32, e_data, 4); g_memcpy(key + 32, e_data, 4);
g_memcpy(key + 36, n_data, 64); g_memcpy(key + 36, n_data, 64);
ssl_md5_clear(md5); ssl_md5_clear(md5);
/* the first 108 bytes */
ssl_md5_transform(md5, key, 108); ssl_md5_transform(md5, key, 108);
/* set the whole thing with 0xff */
g_memset(md5_final, 0xff, 64); g_memset(md5_final, 0xff, 64);
/* digest 16 bytes */
ssl_md5_complete(md5, md5_final); ssl_md5_complete(md5, md5_final);
/* set non 0xff array items */
md5_final[16] = 0; md5_final[16] = 0;
md5_final[62] = 1; md5_final[62] = 1;
md5_final[63] = 0; md5_final[63] = 0;
/* encrypt */
ssl_mod_exp(sign_data, 64, md5_final, 64, (char*)g_ppk_n, 64, ssl_mod_exp(sign_data, 64, md5_final, 64, (char*)g_ppk_n, 64,
(char*)g_ppk_d, 64); (char*)g_ppk_d, 64);
/* cleanup */
ssl_md5_info_delete(md5); ssl_md5_info_delete(md5);
g_free(key); g_free(key);
g_free(md5_final); g_free(md5_final);
@ -260,8 +269,7 @@ key_gen(void)
{ {
g_writeln("ssl_gen_key_xrdp1 ok"); g_writeln("ssl_gen_key_xrdp1 ok");
g_writeln(""); g_writeln("");
error = sign_key(e_data, e_len, n_data, n_len, d_data, d_len, error = sign_key(e_data, e_len, n_data, n_len, sign_data, sign_len);
sign_data, sign_len);
if (error != 0) if (error != 0)
{ {
g_writeln("error %d in key_gen, sign_key", error); g_writeln("error %d in key_gen, sign_key", error);

Loading…
Cancel
Save