Archive for April, 2014 Sort by: Most recent

 

LDK c2v and system fingerprint

c2v (<haspformat format=”updateinfo”/>) sometimes include fingerprint added at the end of the xml.   The fingerprint details are added at the bottom of the c2v if a SL is installed.   If a SL-AdminMode is installed: it retrieves it’s c2v + host_fingerprint type=”SL-UserMode” If a SL-UserMode is installed: it retrieves…

 

Envelope 7.0 does not require a Master\Developer key

Envelope 7.0 (and other older LDK versions) allows to protect a binary even without any local master\developer key attached. It’s enough that envelope sees a valid license in the network from same batch code and same feature against which you are applying the protection, could be a SL or HL.…

 

New Sentinel HASP HL tokens versus NVIDIA

In past we had some incompatibility issues using HASP USB dongles on machines with NVIDIA components. These issues should have been solved using latest Sentinel HL dongles from Firmware 4.x. The new hardware uses USB full speed, while the NVIDIA issue is for USB low speed.   Example: Machine Win 2008…

 

AttributeError: ‘ModuleRecord’ object has no attribute ‘_setModule’

If below errors while running the Python sample for Sentinel Cloud Web Services then solution is:   Errors: Traceback (most recent call last):   File “C:\Program Files (x86)\Safenet Sentinel\Sentinel Cloud Services_3.3_sandbox\Sentinel Cloud Connect Web Services\Samples\Python\ws_demo.py”, line 12, in     import scc_objects   File “C:\Program Files (x86)\Safenet Sentinel\Sentinel Cloud Services_3.3_sandbox\Sentinel Cloud Connect…

 

Encryption Algorithm in C2V/V2C

Both the C2V & V2C data blobs are encrypted using the AES-128 specific to the vendor’s batch code, as well as RSA signed (to make sure the data blob is not tampered with).The C2V/V2C files are indeed secure and tamperproof The V2C file is decrypted at the end user side…