along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
- $Id: genauth.c,v 1.7.4.1 2000/10/11 12:07:27 guus Exp $
+ $Id: genauth.c,v 1.7.4.4 2000/10/20 15:34:35 guus Exp $
*/
#include "config.h"
#include <stdlib.h>
#include <time.h>
#include <openssl/rsa.h>
+#include <openssl/rand.h>
#include <xalloc.h>
bits = ((bits - 1) | 7) + 1; /* Align to bytes for easy mallocing and reading */
+ fprintf(stderr, _("Seeding the PRNG: please press some keys or move\nthe mouse if this program seems to have halted...\n"));
+
+ RAND_load_file("/dev/random", 1024); /* OpenSSL PRNG state apparently uses 1024 bytes */
+
fprintf(stderr, _("Generating %d bits keys:\n"), bits);
- key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL);
+ key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL);
fprintf(stderr, _("Done.\n"));
- printf("Public key:\t%s\nPrivate key:\t%s\n", BN_bn2hex(key->n), BN_bn2hex(key->d));
+ printf(_("Public key: %s\n"), BN_bn2hex(key->n));
+ printf(_("Private key: %s\n"), BN_bn2hex(key->d));
+ printf(_("Public exp: %s\n"), BN_bn2hex(key->e));
+
+ fflush(stdin); /* Flush any input caused by random keypresses */
return 0;
}
-
-