Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fastdick 脚本BUG #6

Open
IxsCN opened this issue Jul 11, 2016 · 7 comments
Open

fastdick 脚本BUG #6

IxsCN opened this issue Jul 11, 2016 · 7 comments

Comments

@IxsCN
Copy link

IxsCN commented Jul 11, 2016

    a=`echo "$passwd_md5" | openssl rsautl -raw -pubin -inkey /etc/thunder.key  -hexdump | tr [a-z] [A-Z]`

fastdick的第60行大小写替换BUG,这样会比较好

    a=`echo "$passwd_md5" | openssl rsautl -raw -pubin -inkey /etc/thunder.key  -hexdump | tr '[a-z]' '[A-Z]'`
@zz090923610
Copy link
Owner

哥们,我这个版本现在应该已经不能用了233333,因为迅雷搞了好多变化。最近出国,两年内目测是没时间弄了,如果你需要搞的话可以继续按照
https://github.com/fffonion/Xunlei-Fastdick
的python的四月份及以后的更新来,还有我的那个thunder.key需要重新生成一下,根据新的rsa的n和e。。大概需要改的是登陆的函数,可能还有比如发送心跳的那几个api,理论上架构不需要做大的变化。。当然,openwrt上需要另外安装一个能生成sha1sum的包。。。

On Mon, Jul 11, 2016 at 10:17 PM, IxsCN [email protected] wrote:

a=`echo "$passwd_md5" | openssl rsautl -raw -pubin -inkey /etc/thunder.key  -hexdump | tr [a-z] [A-Z]`

fastdick的第60行大小写替换BUG,这样会比较好

a=`echo "$passwd_md5" | openssl rsautl -raw -pubin -inkey /etc/thunder.key  -hexdump | tr '[a-z]' '[A-Z]'`


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
#6, or mute the
thread
https://github.com/notifications/unsubscribe/ADccglWvIU1Dc4FR62bks_MSGGgZE45pks5qUlB2gaJpZM4JJaSo
.

Best Regards,

Zhao Zhang,
Master of Computer & Science,
Georgetown University
Phone 18678430893

@IxsCN
Copy link
Author

IxsCN commented Jul 12, 2016

您好!根据rsa的n和e生成key的方法有连接吗?或者openssl 能完成?

@zz090923610
Copy link
Owner

我记得上次是网上搜了半天。。。然后找到一个C程序然后编译了一下搞出来的?但是上次搞完没有注意现在那玩意找不到了。。。。。

不过这有个解释还比较详细你看下吧。。

http://stackoverflow.com/questions/12749858/rsa-public-key-format

希望能帮上忙

On Tue, Jul 12, 2016 at 9:37 PM, IxsCN [email protected] wrote:

您好!根据rsa的n和e生成key的方法有连接吗?或者openssl 能完成?


You are receiving this because you commented.
Reply to this email directly, view it on GitHub
#6 (comment),
or mute the thread
https://github.com/notifications/unsubscribe/ADccgvEB_N8XD8WeyhBDcJI3tK4iTnFcks5qU5ivgaJpZM4JJaSo
.

@IxsCN
Copy link
Author

IxsCN commented Jul 24, 2016

rsa加密搞定了但是登陆时返回的json总是

{"isequenceNo":1000001,"errorDesc":"协议不合法,请联系客服确认!","errorCode":12,"errorIsRetry":0,"cmdID":2,"protocolVersion":108,"sCompressed":0,"platformVersion":1,"errorDescUrl":""}

我对比了post的数据,应该没问题,之前你调试的时候出现类似的问题吗?怎么解决呢?

@zz090923610
Copy link
Owner

你跑一下https://github.com/fffonion/Xunlei-Fastdick 人家的python脚本,把登录时制作post数据
print 出来看一看,我之前就这么搞的。。

2016-07-24 18:41 GMT+08:00 IxsCN [email protected]:

rsa加密搞定了但是登陆时返回的json总是

{"isequenceNo":1000001,"errorDesc":"协议不合法,请联系客服确认!","errorCode":12,"errorIsRetry":0,"cmdID":2,"protocolVersion":108,"sCompressed":0,"platformVersion":1,"errorDescUrl":""}

我对比了post的数据,应该没问题,之前你调试的时候出现类似的问题吗?怎么解决呢?


You are receiving this because you commented.
Reply to this email directly, view it on GitHub
#6 (comment),
or mute the thread
https://github.com/notifications/unsubscribe-auth/ADccgmDM7KHVskMmz4nHOcDnM8vT833Dks5qY0FngaJpZM4JJaSo
.

Best Regards,

Zhao Zhang,
Master from
Dept. of Computer Science,
Georgetown University
Phone 18678430893

@IxsCN
Copy link
Author

IxsCN commented Jul 24, 2016

谢谢找到问题了,device_sign计算错了。

@zz090923610
Copy link
Owner

恩恩加油

On Sun, Jul 24, 2016 at 7:44 PM, IxsCN [email protected] wrote:

谢谢找到问题了,device_sign计算错了。


You are receiving this because you commented.
Reply to this email directly, view it on GitHub
#6 (comment),
or mute the thread
https://github.com/notifications/unsubscribe-auth/ADccghADNdjkTsSFsMeqkxvfKHxNEuDhks5qY1ArgaJpZM4JJaSo
.

Best Regards,

Zhao Zhang,
Master from
Dept. of Computer Science,
Georgetown University
Phone 18678430893

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants