X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fencr.c;h=cae34c43e19c3304fc205ed773807b48781b099b;hp=fe7b2e8f1c4aa32c9f4e2965cc5dd55976a1d13a;hb=f826301889e1fa1a22770919f0385c3ca04c740a;hpb=a9247e6f2c57bda9dc62ed050f41048847109e83 diff --git a/src/encr.c b/src/encr.c index fe7b2e8f..cae34c43 100644 --- a/src/encr.c +++ b/src/encr.c @@ -1,6 +1,6 @@ /* encr.c -- everything that deals with encryption - Copyright (C) 1998,99 Ivo Timmermans + Copyright (C) 1998,1999,2000 Ivo Timmermans This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -19,6 +19,8 @@ #include "config.h" +#include + #include #include #include @@ -45,6 +47,8 @@ #include "net.h" #include "protocol.h" +#include "system.h" + #define ENCR_GENERATOR "0xd" #define ENCR_PRIME "0x7fffffffffffffffffffffffffffffff" /* Mersenne :) */ @@ -102,14 +106,14 @@ cp if((f = fopen(filename, "rb")) == NULL) { - syslog(LOG_ERR, "Could not open %s: %m", filename); + syslog(LOG_ERR, _("Could not open %s: %m"), filename); return -1; } fscanf(f, "%d ", &size); if(size < 1 || size > (1<<15)) { - syslog(LOG_ERR, "Illegal passphrase in %s; size would be %d", filename, size); + syslog(LOG_ERR, _("Illegal passphrase in %s; size would be %d"), filename, size); return -1; } size >>= 2; /* bits->nibbles */ @@ -143,11 +147,11 @@ cp else my_key_expiry = (time_t)(time(NULL) + cfg->data.val); - syslog(LOG_NOTICE, "Generating %d bits keys.", PRIVATE_KEY_BITS); + syslog(LOG_NOTICE, _("Generating %d bits keys."), PRIVATE_KEY_BITS); if((f = fopen("/dev/urandom", "r")) == NULL) { - syslog(LOG_ERR, "Opening /dev/urandom failed: %m"); + syslog(LOG_ERR, _("Opening /dev/urandom failed: %m")); return -1; } @@ -212,7 +216,7 @@ cp encryption_keylen = len; if(debug_lvl > 2) - syslog(LOG_INFO, "Encryption key set to %s", tmp); + syslog(LOG_INFO, _("Encryption key set to %s"), tmp); free(tmp); mpz_clear(ak); @@ -343,7 +347,7 @@ void regenerate_keys(void) cp generate_private_key(); calculate_public_key(); - send_key_changed2(); + send_key_changed_all(); recalculate_encryption_keys(); cp }