• There is NO official Otland's Discord server and NO official Otland's server list. The Otland's Staff does not manage any Discord server or server list. Moderators or administrator of any Discord server or server lists have NO connection to the Otland's Staff. Do not get scammed!

RSA Keys Generator

secondlife

Member
Joined
Aug 1, 2009
Messages
298
Reaction score
23
Hi guys!

Can anyone who has some knowledge about RSA keys try to help me with this problem?

Is it possible to generate new unique RSA Keys for use on my server? I know how to change RSA on client (HexEdit) and server (Sources/ServerSide)

But my question is related to how it is possible to generate new keys that are "unique" for my client.

I've tried it with openssl, but the key format has nothing like the keys used in otservers.
OTServer format (look that - there are only numbers):
Code:
std::clog << ">> Loading RSA key" << std::endl;
    const char* p("14299623962416399520070177382898895550795403345466153217470516082934737582776038882967213386204600674145392845853859217990626450972452084065728686565928113");
    const char* q("7630979195970404721891201847792002125535401292779123937207447574596692788513647179235335529307251350570728407373705564708871762033017096809910315212884101");
    const char* d("46730330223584118622160180015036832148732986808519344675210555262940258739805766860224610646919605860206328024326703361630109888417839241959507572247284807035235569619173792292786907845791904955103601652822519121908367187885509270025388641700821735345222087940578381210879116823013776808975766851829020659073");

OpenSSL is like this (512bit):
Code:
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALGnKHHyAoNwD2Hd1vCN4S0N2xBz0Ttx
N2aX0GKHhy/3s7zeYl8jPCnHo9HtWUs9ainKIS9muJULKqKL/p1IQw8CAwEAAQ==

Many thanks!
Hugs.
 
Can you try following those steps?
 
Look at this:

Code:
[root@marley ~]# openssl genrsa -out openssl_key.pem
Generating RSA private key, 2048 bit long modulus (2 primes)
................................................................................+++++
...........+++++
e is 65537 (0x010001)
[root@marley ~]# openssl rsa -in openssl_key.pem -inform pem -text -check             
RSA Private-Key: (2048 bit, 2 primes)
modulus:
    00:c5:ec:c5:03:54:9b:93:1d:27:8b:4d:55:d9:aa:
    37:75:39:ea:43:a9:90:3f:b0:f6:14:91:5e:3e:75:
    be:33:09:fa:53:a1:66:e0:e4:ec:36:bd:45:c8:fe:
    92:b3:cb:93:c2:16:e2:e6:2c:77:83:fd:6a:5a:d1:
    2d:39:c2:d7:a4:b2:fb:14:d9:89:78:4c:4d:71:a0:
    df:a4:ad:ad:f1:0b:da:92:92:1c:6c:ed:43:7b:fe:
    61:bb:9a:cb:60:bc:54:6e:38:17:fb:10:44:d2:a4:
    cd:9a:75:6f:bf:e7:df:ad:bc:c2:df:f5:49:f7:f8:
    6a:47:45:c9:14:3f:ea:55:e0:a2:bb:b4:73:fc:a7:
    94:37:ad:30:c3:fe:64:66:fa:68:75:e1:8e:84:69:
    05:ba:4c:9e:1a:1c:25:82:70:38:4c:2d:f7:cf:97:
    86:20:01:90:f9:94:84:be:c0:42:3b:b9:97:75:ba:
    05:94:a7:f1:4a:cb:aa:c9:9f:14:75:f2:61:87:f3:
    b0:5b:fa:69:52:c9:5c:4b:14:ec:61:fb:e6:9d:8c:
    53:cd:c6:20:65:bd:79:25:a6:21:27:01:ae:fa:f9:
    37:c9:90:52:7c:cc:a1:1d:a5:1d:86:e1:6e:48:bb:
    6b:6e:a7:7f:59:26:79:c4:66:3a:6b:1b:1a:6c:4f:
    6a:5f
publicExponent: 65537 (0x10001)
privateExponent:
    69:26:eb:5c:63:9c:eb:c1:b7:7a:98:b1:9d:9c:83:
    2e:32:80:b5:45:e6:af:0f:d3:0d:06:56:2d:94:dc:
    61:bd:51:53:11:12:d9:34:86:12:66:e8:26:6a:a9:
    82:00:0c:16:37:96:80:76:eb:60:22:48:58:cb:7c:
    dd:8d:18:88:15:d6:b3:33:07:87:f3:f1:c9:06:91:
    0a:aa:83:18:e7:15:4e:7d:75:c0:a1:25:13:41:08:
    a7:65:0b:db:ee:f2:64:44:44:e9:4b:b1:64:bf:cd:
    c3:db:d4:6c:fe:41:a5:c9:fd:36:82:d8:b3:77:34:
    ef:7c:b1:e1:a2:3b:5b:37:b7:b9:41:7c:ec:c5:b0:
    71:5a:67:3a:76:d5:eb:4c:9d:dd:f2:4b:54:2c:02:
    b4:11:17:4d:82:4c:ea:e7:c1:4d:10:95:9b:8e:96:
    39:58:2a:11:c6:df:3d:3f:39:4f:39:19:59:25:54:
    9f:ae:aa:c3:b5:69:4a:40:a5:d2:e0:ce:ee:bd:7e:
    33:b7:25:e1:66:32:24:24:d5:bb:48:3d:f0:40:71:
    90:94:0a:d9:3f:80:88:60:c1:be:e0:18:76:d7:af:
    5d:dd:7b:b8:79:c5:46:46:37:60:1e:ef:2e:ea:7d:
    17:28:bb:a3:dc:5c:5f:a4:11:8b:21:3e:73:f7:1b:
    51
prime1:
    00:e7:38:37:f6:31:2f:c5:4c:d5:09:32:60:85:23:
    1e:42:e3:72:06:a3:33:a9:86:56:69:4e:35:35:51:
    6c:85:c7:d7:6b:99:2a:6a:45:6e:9f:59:55:93:81:
    47:ac:9a:66:21:b4:d0:da:de:b0:04:fe:3a:cb:cf:
    9e:19:e3:9c:c3:cc:9b:f5:73:13:e8:a8:c4:88:f9:
    eb:e8:93:28:e2:24:f2:af:ea:c0:90:74:aa:ed:d9:
    10:47:60:b8:22:49:b1:85:69:a5:0f:d3:49:38:29:
    e9:64:4e:50:fd:b6:b4:ff:74:0b:e9:40:e5:61:c4:
    21:1c:87:d8:68:b6:d1:f9:23
prime2:
    00:db:23:12:37:7c:f4:0a:cd:a6:0c:db:ab:b8:b1:
    59:87:2e:0e:d2:32:0f:c4:85:1b:0c:07:9b:83:52:
    3a:69:cb:64:c6:f9:0f:87:0d:d5:39:48:b6:ed:90:
    1f:e8:b5:d9:eb:2b:e6:50:d5:62:35:30:6f:12:4c:
    b4:95:e7:87:e1:1d:15:7d:df:fe:72:03:8e:a8:be:
    52:bf:a9:f5:7d:e6:d3:89:07:23:e3:65:e2:fd:5a:
    31:57:41:5e:a0:72:fd:09:aa:c6:ad:64:41:9f:18:
    7f:e7:ef:b6:93:33:ae:12:e9:c1:d0:43:75:29:9e:
    20:14:ac:6f:31:d6:fa:03:95
exponent1:
    00:bc:96:18:e6:bf:35:74:59:f7:44:1a:07:a9:6f:
    7c:46:18:16:af:9d:3b:0c:e0:d9:e7:e7:f6:f3:f6:
    e6:69:b3:16:5b:d7:40:46:0f:3d:6b:d0:c4:40:9b:
    e8:26:ba:83:e4:a8:02:d5:11:5e:45:a4:49:b6:64:
    2f:52:74:58:2f:46:da:49:76:c3:dd:36:91:9e:1b:
    21:b3:bf:1b:50:5f:cc:65:79:35:f8:5c:7f:f1:a0:
    e2:6b:25:52:e9:fc:6b:43:22:68:93:a0:c4:0e:7f:
    f8:b1:6c:43:18:bc:85:a1:f9:37:a1:d6:e1:80:3d:
    24:b8:8d:80:0f:e0:55:20:3b
exponent2:
    7c:97:ee:2d:9a:5f:ef:1c:8a:02:d9:8b:43:51:a2:
    c3:97:4e:59:f8:98:ba:75:ab:b1:25:4a:28:5a:42:
    58:10:8a:d6:0e:99:e3:81:db:ef:dc:06:16:00:52:
    04:30:11:1d:03:32:ca:56:e8:a5:b1:4a:15:af:83:
    25:90:24:d3:bb:83:92:b4:1e:a9:98:98:2e:1d:38:
    53:3d:41:15:3a:7e:9f:74:6d:d5:47:02:ce:65:cf:
    93:fa:d8:e0:85:40:95:94:81:ad:e8:48:df:3a:40:
    cf:10:9e:50:07:9c:3b:a8:a8:c7:ce:f2:f8:9c:ad:
    44:d3:dd:cd:0a:9b:d0:19
coefficient:
    00:c9:98:4b:38:05:bd:c8:4d:30:45:f4:2f:94:44:
    ba:3f:9d:ef:90:0e:e6:69:1a:be:4d:bf:cb:22:7d:
    11:7d:ec:ac:f8:f5:40:cf:f8:97:4f:03:54:a8:75:
    ca:f6:9b:fe:41:ab:2f:c5:3d:bb:32:99:05:45:3f:
    8a:07:a8:0f:07:a0:a4:df:53:a5:b7:97:24:c3:71:
    a5:af:00:74:77:e1:7f:3b:37:04:eb:71:49:73:05:
    3c:62:b9:0f:95:9a:ab:95:78:9f:44:00:d0:66:12:
    e7:38:09:35:2a:be:67:62:c6:80:20:44:85:a7:42:
    13:b8:ff:66:b1:ff:e8:81:0c
RSA key ok
writing RSA key
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

Generally, p is prime1, q is prime2, d is privateExponent. You just need to conver the numbers from hex to decimal.
 
Can you try following those steps?
That tutorial generates a really weak key though. But yeah you can use it and just generate one with a higher number of bits instead.
But in total, this is an issue you can solve by googling once. It takes you 2min to google and at least 2 hours until someone answeres here with a half way competent answer.
For example here.
If you wanna know how RSA works itself, try this.

Look at this:

Code:
[root@marley ~]# openssl genrsa -out openssl_key.pem
Generating RSA private key, 2048 bit long modulus (2 primes)
................................................................................+++++
...........+++++
e is 65537 (0x010001)
[root@marley ~]# openssl rsa -in openssl_key.pem -inform pem -text -check            
RSA Private-Key: (2048 bit, 2 primes)
modulus:
    00:c5:ec:c5:03:54:9b:93:1d:27:8b:4d:55:d9:aa:
    37:75:39:ea:43:a9:90:3f:b0:f6:14:91:5e:3e:75:
    be:33:09:fa:53:a1:66:e0:e4:ec:36:bd:45:c8:fe:
    92:b3:cb:93:c2:16:e2:e6:2c:77:83:fd:6a:5a:d1:
    2d:39:c2:d7:a4:b2:fb:14:d9:89:78:4c:4d:71:a0:
    df:a4:ad:ad:f1:0b:da:92:92:1c:6c:ed:43:7b:fe:
    61:bb:9a:cb:60:bc:54:6e:38:17:fb:10:44:d2:a4:
    cd:9a:75:6f:bf:e7:df:ad:bc:c2:df:f5:49:f7:f8:
    6a:47:45:c9:14:3f:ea:55:e0:a2:bb:b4:73:fc:a7:
    94:37:ad:30:c3:fe:64:66:fa:68:75:e1:8e:84:69:
    05:ba:4c:9e:1a:1c:25:82:70:38:4c:2d:f7:cf:97:
    86:20:01:90:f9:94:84:be:c0:42:3b:b9:97:75:ba:
    05:94:a7:f1:4a:cb:aa:c9:9f:14:75:f2:61:87:f3:
    b0:5b:fa:69:52:c9:5c:4b:14:ec:61:fb:e6:9d:8c:
    53:cd:c6:20:65:bd:79:25:a6:21:27:01:ae:fa:f9:
    37:c9:90:52:7c:cc:a1:1d:a5:1d:86:e1:6e:48:bb:
    6b:6e:a7:7f:59:26:79:c4:66:3a:6b:1b:1a:6c:4f:
    6a:5f
publicExponent: 65537 (0x10001)
privateExponent:
    69:26:eb:5c:63:9c:eb:c1:b7:7a:98:b1:9d:9c:83:
    2e:32:80:b5:45:e6:af:0f:d3:0d:06:56:2d:94:dc:
    61:bd:51:53:11:12:d9:34:86:12:66:e8:26:6a:a9:
    82:00:0c:16:37:96:80:76:eb:60:22:48:58:cb:7c:
    dd:8d:18:88:15:d6:b3:33:07:87:f3:f1:c9:06:91:
    0a:aa:83:18:e7:15:4e:7d:75:c0:a1:25:13:41:08:
    a7:65:0b:db:ee:f2:64:44:44:e9:4b:b1:64:bf:cd:
    c3:db:d4:6c:fe:41:a5:c9:fd:36:82:d8:b3:77:34:
    ef:7c:b1:e1:a2:3b:5b:37:b7:b9:41:7c:ec:c5:b0:
    71:5a:67:3a:76:d5:eb:4c:9d:dd:f2:4b:54:2c:02:
    b4:11:17:4d:82:4c:ea:e7:c1:4d:10:95:9b:8e:96:
    39:58:2a:11:c6:df:3d:3f:39:4f:39:19:59:25:54:
    9f:ae:aa:c3:b5:69:4a:40:a5:d2:e0:ce:ee:bd:7e:
    33:b7:25:e1:66:32:24:24:d5:bb:48:3d:f0:40:71:
    90:94:0a:d9:3f:80:88:60:c1:be:e0:18:76:d7:af:
    5d:dd:7b:b8:79:c5:46:46:37:60:1e:ef:2e:ea:7d:
    17:28:bb:a3:dc:5c:5f:a4:11:8b:21:3e:73:f7:1b:
    51
prime1:
    00:e7:38:37:f6:31:2f:c5:4c:d5:09:32:60:85:23:
    1e:42:e3:72:06:a3:33:a9:86:56:69:4e:35:35:51:
    6c:85:c7:d7:6b:99:2a:6a:45:6e:9f:59:55:93:81:
    47:ac:9a:66:21:b4:d0:da:de:b0:04:fe:3a:cb:cf:
    9e:19:e3:9c:c3:cc:9b:f5:73:13:e8:a8:c4:88:f9:
    eb:e8:93:28:e2:24:f2:af:ea:c0:90:74:aa:ed:d9:
    10:47:60:b8:22:49:b1:85:69:a5:0f:d3:49:38:29:
    e9:64:4e:50:fd:b6:b4:ff:74:0b:e9:40:e5:61:c4:
    21:1c:87:d8:68:b6:d1:f9:23
prime2:
    00:db:23:12:37:7c:f4:0a:cd:a6:0c:db:ab:b8:b1:
    59:87:2e:0e:d2:32:0f:c4:85:1b:0c:07:9b:83:52:
    3a:69:cb:64:c6:f9:0f:87:0d:d5:39:48:b6:ed:90:
    1f:e8:b5:d9:eb:2b:e6:50:d5:62:35:30:6f:12:4c:
    b4:95:e7:87:e1:1d:15:7d:df:fe:72:03:8e:a8:be:
    52:bf:a9:f5:7d:e6:d3:89:07:23:e3:65:e2:fd:5a:
    31:57:41:5e:a0:72:fd:09:aa:c6:ad:64:41:9f:18:
    7f:e7:ef:b6:93:33:ae:12:e9:c1:d0:43:75:29:9e:
    20:14:ac:6f:31:d6:fa:03:95
exponent1:
    00:bc:96:18:e6:bf:35:74:59:f7:44:1a:07:a9:6f:
    7c:46:18:16:af:9d:3b:0c:e0:d9:e7:e7:f6:f3:f6:
    e6:69:b3:16:5b:d7:40:46:0f:3d:6b:d0:c4:40:9b:
    e8:26:ba:83:e4:a8:02:d5:11:5e:45:a4:49:b6:64:
    2f:52:74:58:2f:46:da:49:76:c3:dd:36:91:9e:1b:
    21:b3:bf:1b:50:5f:cc:65:79:35:f8:5c:7f:f1:a0:
    e2:6b:25:52:e9:fc:6b:43:22:68:93:a0:c4:0e:7f:
    f8:b1:6c:43:18:bc:85:a1:f9:37:a1:d6:e1:80:3d:
    24:b8:8d:80:0f:e0:55:20:3b
exponent2:
    7c:97:ee:2d:9a:5f:ef:1c:8a:02:d9:8b:43:51:a2:
    c3:97:4e:59:f8:98:ba:75:ab:b1:25:4a:28:5a:42:
    58:10:8a:d6:0e:99:e3:81:db:ef:dc:06:16:00:52:
    04:30:11:1d:03:32:ca:56:e8:a5:b1:4a:15:af:83:
    25:90:24:d3:bb:83:92:b4:1e:a9:98:98:2e:1d:38:
    53:3d:41:15:3a:7e:9f:74:6d:d5:47:02:ce:65:cf:
    93:fa:d8:e0:85:40:95:94:81:ad:e8:48:df:3a:40:
    cf:10:9e:50:07:9c:3b:a8:a8:c7:ce:f2:f8:9c:ad:
    44:d3:dd:cd:0a:9b:d0:19
coefficient:
    00:c9:98:4b:38:05:bd:c8:4d:30:45:f4:2f:94:44:
    ba:3f:9d:ef:90:0e:e6:69:1a:be:4d:bf:cb:22:7d:
    11:7d:ec:ac:f8:f5:40:cf:f8:97:4f:03:54:a8:75:
    ca:f6:9b:fe:41:ab:2f:c5:3d:bb:32:99:05:45:3f:
    8a:07:a8:0f:07:a0:a4:df:53:a5:b7:97:24:c3:71:
    a5:af:00:74:77:e1:7f:3b:37:04:eb:71:49:73:05:
    3c:62:b9:0f:95:9a:ab:95:78:9f:44:00:d0:66:12:
    e7:38:09:35:2a:be:67:62:c6:80:20:44:85:a7:42:
    13:b8:ff:66:b1:ff:e8:81:0c
RSA key ok
writing RSA key
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

Generally, p is prime1, q is prime2, d is privateExponent. You just need to conver the numbers from hex to decimal.
I hope you are not suggesting he uses the one you generated for him. That would not just be stupid but reckless. That would destroy the whole purpose of asymmetric encryption. He might as well not encrypt at all then.
 
Can you try following those steps?
Thanks for the reply, guy. Had already seen but this topic does not help me at the moment.

Look at this:

Code:
[root@marley ~]# openssl genrsa -out openssl_key.pem
Generating RSA private key, 2048 bit long modulus (2 primes)
................................................................................+++++
...........+++++
e is 65537 (0x010001)
[root@marley ~]# openssl rsa -in openssl_key.pem -inform pem -text -check            
RSA Private-Key: (2048 bit, 2 primes)
modulus:
    00:c5:ec:c5:03:54:9b:93:1d:27:8b:4d:55:d9:aa:
    37:75:39:ea:43:a9:90:3f:b0:f6:14:91:5e:3e:75:
    be:33:09:fa:53:a1:66:e0:e4:ec:36:bd:45:c8:fe:
    92:b3:cb:93:c2:16:e2:e6:2c:77:83:fd:6a:5a:d1:
    2d:39:c2:d7:a4:b2:fb:14:d9:89:78:4c:4d:71:a0:
    df:a4:ad:ad:f1:0b:da:92:92:1c:6c:ed:43:7b:fe:
    61:bb:9a:cb:60:bc:54:6e:38:17:fb:10:44:d2:a4:
    cd:9a:75:6f:bf:e7:df:ad:bc:c2:df:f5:49:f7:f8:
    6a:47:45:c9:14:3f:ea:55:e0:a2:bb:b4:73:fc:a7:
    94:37:ad:30:c3:fe:64:66:fa:68:75:e1:8e:84:69:
    05:ba:4c:9e:1a:1c:25:82:70:38:4c:2d:f7:cf:97:
    86:20:01:90:f9:94:84:be:c0:42:3b:b9:97:75:ba:
    05:94:a7:f1:4a:cb:aa:c9:9f:14:75:f2:61:87:f3:
    b0:5b:fa:69:52:c9:5c:4b:14:ec:61:fb:e6:9d:8c:
    53:cd:c6:20:65:bd:79:25:a6:21:27:01:ae:fa:f9:
    37:c9:90:52:7c:cc:a1:1d:a5:1d:86:e1:6e:48:bb:
    6b:6e:a7:7f:59:26:79:c4:66:3a:6b:1b:1a:6c:4f:
    6a:5f
publicExponent: 65537 (0x10001)
privateExponent:
    69:26:eb:5c:63:9c:eb:c1:b7:7a:98:b1:9d:9c:83:
    2e:32:80:b5:45:e6:af:0f:d3:0d:06:56:2d:94:dc:
    61:bd:51:53:11:12:d9:34:86:12:66:e8:26:6a:a9:
    82:00:0c:16:37:96:80:76:eb:60:22:48:58:cb:7c:
    dd:8d:18:88:15:d6:b3:33:07:87:f3:f1:c9:06:91:
    0a:aa:83:18:e7:15:4e:7d:75:c0:a1:25:13:41:08:
    a7:65:0b:db:ee:f2:64:44:44:e9:4b:b1:64:bf:cd:
    c3:db:d4:6c:fe:41:a5:c9:fd:36:82:d8:b3:77:34:
    ef:7c:b1:e1:a2:3b:5b:37:b7:b9:41:7c:ec:c5:b0:
    71:5a:67:3a:76:d5:eb:4c:9d:dd:f2:4b:54:2c:02:
    b4:11:17:4d:82:4c:ea:e7:c1:4d:10:95:9b:8e:96:
    39:58:2a:11:c6:df:3d:3f:39:4f:39:19:59:25:54:
    9f:ae:aa:c3:b5:69:4a:40:a5:d2:e0:ce:ee:bd:7e:
    33:b7:25:e1:66:32:24:24:d5:bb:48:3d:f0:40:71:
    90:94:0a:d9:3f:80:88:60:c1:be:e0:18:76:d7:af:
    5d:dd:7b:b8:79:c5:46:46:37:60:1e:ef:2e:ea:7d:
    17:28:bb:a3:dc:5c:5f:a4:11:8b:21:3e:73:f7:1b:
    51
prime1:
    00:e7:38:37:f6:31:2f:c5:4c:d5:09:32:60:85:23:
    1e:42:e3:72:06:a3:33:a9:86:56:69:4e:35:35:51:
    6c:85:c7:d7:6b:99:2a:6a:45:6e:9f:59:55:93:81:
    47:ac:9a:66:21:b4:d0:da:de:b0:04:fe:3a:cb:cf:
    9e:19:e3:9c:c3:cc:9b:f5:73:13:e8:a8:c4:88:f9:
    eb:e8:93:28:e2:24:f2:af:ea:c0:90:74:aa:ed:d9:
    10:47:60:b8:22:49:b1:85:69:a5:0f:d3:49:38:29:
    e9:64:4e:50:fd:b6:b4:ff:74:0b:e9:40:e5:61:c4:
    21:1c:87:d8:68:b6:d1:f9:23
prime2:
    00:db:23:12:37:7c:f4:0a:cd:a6:0c:db:ab:b8:b1:
    59:87:2e:0e:d2:32:0f:c4:85:1b:0c:07:9b:83:52:
    3a:69:cb:64:c6:f9:0f:87:0d:d5:39:48:b6:ed:90:
    1f:e8:b5:d9:eb:2b:e6:50:d5:62:35:30:6f:12:4c:
    b4:95:e7:87:e1:1d:15:7d:df:fe:72:03:8e:a8:be:
    52:bf:a9:f5:7d:e6:d3:89:07:23:e3:65:e2:fd:5a:
    31:57:41:5e:a0:72:fd:09:aa:c6:ad:64:41:9f:18:
    7f:e7:ef:b6:93:33:ae:12:e9:c1:d0:43:75:29:9e:
    20:14:ac:6f:31:d6:fa:03:95
exponent1:
    00:bc:96:18:e6:bf:35:74:59:f7:44:1a:07:a9:6f:
    7c:46:18:16:af:9d:3b:0c:e0:d9:e7:e7:f6:f3:f6:
    e6:69:b3:16:5b:d7:40:46:0f:3d:6b:d0:c4:40:9b:
    e8:26:ba:83:e4:a8:02:d5:11:5e:45:a4:49:b6:64:
    2f:52:74:58:2f:46:da:49:76:c3:dd:36:91:9e:1b:
    21:b3:bf:1b:50:5f:cc:65:79:35:f8:5c:7f:f1:a0:
    e2:6b:25:52:e9:fc:6b:43:22:68:93:a0:c4:0e:7f:
    f8:b1:6c:43:18:bc:85:a1:f9:37:a1:d6:e1:80:3d:
    24:b8:8d:80:0f:e0:55:20:3b
exponent2:
    7c:97:ee:2d:9a:5f:ef:1c:8a:02:d9:8b:43:51:a2:
    c3:97:4e:59:f8:98:ba:75:ab:b1:25:4a:28:5a:42:
    58:10:8a:d6:0e:99:e3:81:db:ef:dc:06:16:00:52:
    04:30:11:1d:03:32:ca:56:e8:a5:b1:4a:15:af:83:
    25:90:24:d3:bb:83:92:b4:1e:a9:98:98:2e:1d:38:
    53:3d:41:15:3a:7e:9f:74:6d:d5:47:02:ce:65:cf:
    93:fa:d8:e0:85:40:95:94:81:ad:e8:48:df:3a:40:
    cf:10:9e:50:07:9c:3b:a8:a8:c7:ce:f2:f8:9c:ad:
    44:d3:dd:cd:0a:9b:d0:19
coefficient:
    00:c9:98:4b:38:05:bd:c8:4d:30:45:f4:2f:94:44:
    ba:3f:9d:ef:90:0e:e6:69:1a:be:4d:bf:cb:22:7d:
    11:7d:ec:ac:f8:f5:40:cf:f8:97:4f:03:54:a8:75:
    ca:f6:9b:fe:41:ab:2f:c5:3d:bb:32:99:05:45:3f:
    8a:07:a8:0f:07:a0:a4:df:53:a5:b7:97:24:c3:71:
    a5:af:00:74:77:e1:7f:3b:37:04:eb:71:49:73:05:
    3c:62:b9:0f:95:9a:ab:95:78:9f:44:00:d0:66:12:
    e7:38:09:35:2a:be:67:62:c6:80:20:44:85:a7:42:
    13:b8:ff:66:b1:ff:e8:81:0c
RSA key ok
writing RSA key
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

Generally, p is prime1, q is prime2, d is privateExponent. You just need to conver the numbers from hex to decimal.
Thanks so much for the reply @Don Daniello. I was able to execute openssl code perfectly. Now i am converting hex to decimal.

Another question.. On the client (Client Side) which RSA value should be added? d value?
Tks again!
 
Don Daniello, sorry to take your time again. It just didn't work

Look.. regarding converting from HEX to DECIMAL .. should i need convert each value one by one? example:

Code:
HEX = 69:26:eb:5c:63:9c:eb:c1:b7:7a:98:b1:9d:9c:83:
Staying:
Code:
DECIMAL = 105:38:235:92:99:156:235:193:183:122:152:177:157:156:131
And after removing the ":" tabs
Code:
105382359299156235193183122152177157156131
(Ofc i would do that for all HEX lines)


Or i must convert as follows:

Code:
HEX = 69:26:eb:5c:63:9c:eb:c1:b7:7a:98:b1:9d:9c:83:
being able to group all values and remove sep ":" = 6926eb5c639cebc1b77a98b19d9c83

and add to a HEX converter, getting:
Code:
545980548922332114411686556610698371

Many thanks again!!
 

This looks like a good resource.
 
On the client side you are using the "modulus" (n) and the publicExponent, which is typically always 65537. Those two make up the "public" part of the key.
Hello, would you give an example of how the otclient module const.lua should look like? because if i convert all the hexas, i get 4 lines, and there are 5 lines in my OTSERV_RSA...

Also, once i compiled my server with the new RSA's, without editing my module in client side, i tried to connect to my server (local) and the server shutdown lol, when i changed the rsa in const.lua on my client, server don't shutdown but i get error connection (ERROR 2)
 
Last edited:
Back
Top