thanks and for download dcpdll in planet-dl.org the username is planet-dl.org and password is planet-dl.org
sorry I gave you the wrong info. for office you will find the pidgen file inside the MSI installer file.
here is a redesigned version of the tool with a few tweaks and extras. curve parameter boxes now display the entire value. when validating multiple keys in a text file if a duplicate key is found it is ignored. added activation option for end of life / legacy / unsupported programs. the settings options have changed slightly so it might be a good idea to delete settings.ini and start from scratch. ***outdated version***
@pottzman It's really a nice tool you got there and amazingly the only one that works on Win9x (not tried it on Win 95 tho but not sure if Office XP plays well/or at all on this OS) It's a bit funny that other tools made for legacy OS/apps don't play on the earliest of the earliest. Beside that, would it be possible to add some sort of a import/export of Installation/Confirmation ID?
How to use ECDSolver? how to edit job_58bit.txt? i have short n and it takes forever to find k. how to know which bink is for which oem,rtl,vl?
Bug report When importing from pidgen-Win98se_111.dll i get Bink "00" and "02" "02" is correct, "00" is wrong - expected is "03"
ok. as i understand "Windows Server 2003 64 Bit VLK": { "BINK": ["68", "69", "6C", "6D"] one of them should be like this. 68=retail , 69=oem, 6c=rtl etc. not like that? which one is which one.
@liliactr Looking at Code: b38aebb7b43934f5a4b0031e34bd61f0df2b111f *en_ws_2003_std_x64_vl.iso Pidgen binks are 0x64, 0x65 Code: 4666a3591d97030f91a95b90d9d5f097e3ac96d1 *en_windows_server_2003_enterprise_x64.iso Pidgen binks are 0x68, 0x69, 0x6C, 0x6D
Mostly copy and paste from other resources but hopefully a basic explanation of where all the big numbers originates from This is the complete Bink 2C resource extracted from pidgen.dll found in en_winxp_mce_cd1.iso (same resource can be found in multple pidgen.dll's) Code: Bink ID: (located at 0x00) 00000000 2C 00 00 00 6C 01 00 00 07 00 00 00 2C EB F3 FD ,...l.......,... 00000010 AE DF 30 01 0C 00 00 00 1C 00 00 00 37 00 00 00 ..0.........7... P: (Point on the curve representing the finite field) 48 Byte/384 Bit 00000020 71 9B 8C 1D 02 C3 E8 8B E6 1C 99 36 5D 6C 1D 21 q..........6]l.! 00000030 60 8D DC 31 06 04 EE 72 80 7B 03 58 66 9C B9 56 `..1...r.{.Xf..V 00000040 B7 D4 25 1A 51 DB E3 D2 F1 F2 F9 6A 12 1B 9C 9E ..%.Q......j.... 00000050 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000070 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000080 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00000090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000000A0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Gx: (x co-ordinate for the Base Point G) 48 Byte/384 Bit 000000B0 7F 3B A4 0D 10 79 85 7C 06 F4 66 FF B0 E1 FC 53 .;...y.|..f....S 000000C0 0E 35 ED BE A9 16 0C 37 0A 5A A0 58 FC 8C 28 A7 .5.....7.Z.X..(. 000000D0 E9 6C 73 8C 6E BC 62 52 0E 47 95 10 61 8E D0 8C .ls.n.bR.G..a... Gy: (y co-ordinate for the Base Point G) 48 Byte/384 Bit 000000E0 B0 A2 FD 10 F4 C0 36 12 8D 1E 13 9B AC 5D 56 9B ......6......]V. 000000F0 21 8C 83 74 C4 3C FC 8A 0F 08 96 C6 D3 D3 65 85 !..t.<........e. 00000100 11 51 1C A5 3E A8 CE DC 02 CA 42 18 7A FF FE 21 .Q..>.....B.z..! Rx (Px): (x co-ordinate for the Public Point R) 48 Byte/384 Bit 00000110 31 1B 59 9A 34 28 80 98 35 73 4B F3 8E 97 1B 5A 1.Y.4(..5sK....Z 00000120 FE 95 FC D5 70 33 AE 40 91 4D 95 C1 47 7A 5D 81 [email protected]]. 00000130 60 CA CC 94 1C 22 5A 57 B0 CF 0E 8F 01 3D 06 8C `...."ZW.....=.. Ry (Py): (y co-ordinate for the Public Point R) 48 Byte/384 Bit 00000140 3A F4 94 C3 C7 2B 6C 61 E7 95 0B 6F D7 57 89 38 :....+la...o.W.8 00000150 7D DE EA AF AA 53 8B 76 E6 A8 35 E4 AD D8 0B 53 }....S.v..5....S 00000160 EA DF BD 2E E0 84 A6 56 CA B6 6F 1C 67 2B 7A 57 .......V..o.g+zW Take each string and reverse endianess. If you need the same value as referenced in keys.json from post #90, simply convert hex value to decimal. Ofc, this you can do in EllipCurveTool.exe but this is how it works anyway.
@Sajjo CHKPIDS will check any key against pidgens you indicated. For better understanding, just use only pidgen with correct bink id. EC Tool need to be set in according range, 620.000001 to 620.000001, and so on, if you want a custom number.