static uint8 sec_encrypt_update_key[16];
static uint8 sec_crypted_random[SEC_MODULUS_SIZE];
+RSA *privkey;
+
uint16 g_server_rdp_version = 0;
/*
if (sec_flags & SEC_CLIENT_RANDOM) {
uint32 length;
+ uint8 inr[SEC_MODULUS_SIZE];
+ int i;
printf("Receiving the client random!\n");
in_uint32_le(s, length);
if (!s_check_end(s)) {
error("Junk after client random\n");
}
+
+ reverse(sec_crypted_random, SEC_MODULUS_SIZE);
+
+ RSA_private_decrypt(SEC_MODULUS_SIZE, sec_crypted_random, inr, privkey, RSA_NO_PADDING);
+
+ reverse(inr + SEC_RANDOM_SIZE, SEC_RANDOM_SIZE);
+
+ printf("Unencrypted client random: ");
+ for (i = 0; i < SEC_RANDOM_SIZE; ++i) {
+ printf("0x%x ", inr[i + SEC_RANDOM_SIZE]);
+ }
+ printf("\n");
}
}