// this is a good time to load our private key :-)
{
unsigned char *buf = (unsigned char *)malloc(1024);
- unsigned char *ptr = buf;
+ const unsigned char *ptr = buf;
memcpy(buf, private_key, sizeof(private_key));
privkey = d2i_RSAPrivateKey(NULL, &ptr, sizeof(private_key));
free(buf);
+
+ printf("Loaded private key (%u bytes)\n", sizeof(private_key));
}
}
if (sec_flags & SEC_CLIENT_RANDOM) {
uint32 length;
+ uint8 inr[SEC_MODULUS_SIZE];
+ int i;
printf("Receiving the client random!\n");
in_uint32_le(s, length);
if (!s_check_end(s)) {
error("Junk after client random\n");
}
+
+ reverse(sec_crypted_random, SEC_MODULUS_SIZE);
+
+ RSA_private_decrypt(SEC_MODULUS_SIZE, sec_crypted_random, inr, privkey, RSA_NO_PADDING);
+
+ reverse(inr + SEC_RANDOM_SIZE, SEC_RANDOM_SIZE);
+
+ printf("Unencrypted client random: ");
+ for (i = 0; i < SEC_RANDOM_SIZE; ++i) {
+ printf("0x%x ", inr[i + SEC_RANDOM_SIZE]);
+ }
+ printf("\n");
}
}