User:Ernstblumberg/sandbox: Difference between revisions
m →=Enc Prot SHA: upfate |
m →=Enc Prot SHA: upd~~~~ |
||
Line 22: | Line 22: | ||
1717 |
1717 |
||
1717 |
1717 |
||
1719 |
|||
1720 |
|||
1699 OR EBX, PE_ |
|||
1700 |
|||
1701 , RAM_START - size (STARTUP-DATA) |
|||
1702 MOV EAX, RAM_START |
|||
1703 ADD EAX, OFFSET (end_data) |
|||
1704 MOV EBX, RAM_START |
|||
1705 MOV ECX, CS_BASE |
|||
1706 ADD ECX, OFFSET (GDT_EPROM) |
|||
1707 |
|||
1708 |
|||
1709 |
|||
1710 MOV APP_GDT_ram [EBX].table_lim, CX |
|||
1711 INC ECX |
|||
1712 MOVEDX, EAX |
|||
1713 MOV APP_GDT_ram[EBX].table_linear , EAX |
|||
1714 ADD EAX,ECX |
|||
1715 REP MOVS BYTE PTRES: [EDI],BYTE PTR DS :[ESI] |
|||
1716 |
|||
1717 |
|||
1718 |
|||
1719 |
1719 |
||
1720 |
1720 |
Revision as of 15:10, 19 June 2014
1699 OR EBX, PE_ 1700 1701 , RAM_START - size (STARTUP-DATA) 1702 MOV EAX, RAM_START 1703 ADD EAX, OFFSET (end_data) 1704 MOV EBX, RAM_START 1705 MOV ECX, CS_BASE 1706 ADD ECX, OFFSET (GDT_EPROM) 1707 1708 1709 1710 MOV APP_GDT_ram [EBX].table_lim, CX 1711 INC ECX 1712 MOVEDX, EAX 1713 MOV APP_GDT_ram[EBX].table_linear , EAX 1714 ADD EAX,ECX 1715 REP MOVS BYTE PTRES: [EDI],BYTE PTR DS :[ESI] 1716 1717 1717 1719 1720
1699 OR EBX, PE_
1700
1701 , RAM_START - size (STARTUP-DATA)
1702 MOV EAX, RAM_START
1703 ADD EAX, OFFSET (end_data)
1704 MOV EBX, RAM_START
1705 MOV ECX, CS_BASE
1706 ADD ECX, OFFSET (GDT_EPROM)
1707
1708
1709
1710 MOV APP_GDT_ram [EBX].table_lim, CX
1711 INC ECX
1712 MOVEDX, EAX
1713 MOV APP_GDT_ram[EBX].table_linear , EAX
1714 ADD EAX,ECX
1715 REP MOVS BYTE PTRES: [EDI],BYTE PTR DS :[ESI]
1716
1717
1718
1719
1720
=Enc Prot SHA
BOOL EXPORTENCRYPTED: KEY = CxSshKey_CREATE ():)
// numbits may range from384 to 4096. TYPICAL VALUES ARE // 1024 OR 2048. (must be a multiple of 64 // A GOOD CHOICE FOR THE EXPONENT IS 65537. CHILKAT RECOMMENDS // ALWAYS USING THIS VALUE.
// NUMBITS = 2048; // EXPONENT = 65537; // SUCCESS = CxSshKey; GeneratesRsaKey (key, numbits, exponent); // IF (SUCCESS ! = TRUE) { PRINTP ("BAD params passed to RSA key generates method D"); RETURN;} // NOTE: Generating a public/private key pair is CPU intensive // and make take a short amount of time ' (more than a few seconds but less than a minute)