Jump to content

Recommended Posts

  • Honorable Member

Lzo is a data compression algorithm. It compress data and there are no "lzo keys".

On the other hand, XTEA is a block cipher which uses a 8 byte key to encrypt/decrypt data.

static DWORD s_adwEterPackKey[] =
{
	45129401,
	92367215,
	681285731,
	1710201,
};

static DWORD s_adwEterPackSecurityKey[] =
{
	78952482,
	527348324,
	1632942,
	486274726,
};

I've made a converter in python: (as requested by someone via PM)

>>> from struct import pack as spack
>>> a1=spack("LLLL", 45129401,92367215,681285731,1710201)
>>> a1.encode('hex')
'b99eb0026f69810563989b2879181a00'
>>>
>>> a2 = 'b99eb0026f69810563989b2879181a00'
>>> a3=a2.decode('hex')
>>> from struct import unpack as sunpack
>>> sunpack("LLLL", a3)
(45129401L, 92367215L, 681285731L, 1710201L)
>>>
  • Love 13
Link to comment
Share on other sites

  • 7 months later...
  • 10 months later...
1 hour ago, AlCapone said:

I have this:

static DWORD s_adwEterPackKey[] =
{
    56219512,
    93478326,
    792396842,
    2821312,
};

static DWORD s_adwEterPackSecurityKey[] =
{
    67841371,
    416237213,
    2521831,
    375163615,
};

How can I know HEX? I dont know how to use your script :(

i do not understand how it works..

we help anyone?

Link to comment
Share on other sites

  • 1 month later...
  • 2 months later...
  • 1 year later...

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now

Announcements



×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.