User:Ernstblumberg/sandbox: Difference between revisions
Appearance
Content deleted Content added
m ~~~~ |
m Enc/prot (chalkit ref sha, etc.~~~~ |
||
Line 24: | Line 24: | ||
1719 |
1719 |
||
1720 |
1720 |
||
==Enc Prot SHA= |
|||
BOOL EXPORTENCRYPTED: KEY = CxSshKey_CREATE ():) |
|||
// numbits may range from384 to 4096. TYPICAL VALUES ARE |
|||
// 1024 OR 2048. (must be a multiple of 64 |
|||
// A GOOD CHOICE FOR THE EXPONENT IS 65537. CHILKAT RECOMMENDS |
|||
// ALWAYS USING THIS VALUE. NUMBITS = 2048; |
|||
EXPONENT = 65537; |
|||
SUCCESS = CxSshKey; GeneratesRsaKey (key, numbits, exponent); |
|||
IF (SUCCESS ! = TRUE) |
|||
{ PRINTP ("BAD params passed to RSA key generates |
Revision as of 13:33, 18 June 2014
1699 OR EBX, PE_ 1700 1701 , RAM_START - size (STARTUP-DATA) 1702 MOV EAX, RAM_START 1703 ADD EAX, OFFSET (end_data) 1704 MOV EBX, RAM_START 1705 MOV ECX, CS_BASE 1706 ADD ECX, OFFSET (GDT_EPROM) 1707 1708 1709 1710 MOV APP_GDT_ram [EBX].table_lim, CX 1711 INC ECX 1712 MOVEDX, EAX 1713 MOV APP_GDT_ram[EBX].table_linear , EAX 1714 ADD EAX,ECX 1715 REP MOVS BYTE PTRES: [EDI],BYTE PTR DS :[ESI] 1716 1717 1717 1719 1720
=Enc Prot SHA
BOOL EXPORTENCRYPTED: KEY = CxSshKey_CREATE ():)
// numbits may range from384 to 4096. TYPICAL VALUES ARE
// 1024 OR 2048. (must be a multiple of 64
// A GOOD CHOICE FOR THE EXPONENT IS 65537. CHILKAT RECOMMENDS
// ALWAYS USING THIS VALUE. NUMBITS = 2048;
EXPONENT = 65537; SUCCESS = CxSshKey; GeneratesRsaKey (key, numbits, exponent); IF (SUCCESS ! = TRUE) { PRINTP ("BAD params passed to RSA key generates