X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fgenauth.c;h=78c567d0dc2fc8b9c0a5ed5497c7656d980a8d08;hp=a27bd77936bd01eb2a6c8cfc8f663398fad47f2c;hb=9f64499e40a95a8c05c82924219517aa017fc411;hpb=85adeef21275633b78a234b2660cbe3bc9dd2c33 diff --git a/src/genauth.c b/src/genauth.c index a27bd779..78c567d0 100644 --- a/src/genauth.c +++ b/src/genauth.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: genauth.c,v 1.7.4.2 2000/10/15 00:59:34 guus Exp $ + $Id: genauth.c,v 1.7.4.4 2000/10/20 15:34:35 guus Exp $ */ #include "config.h" @@ -26,6 +26,7 @@ #include #include #include +#include #include @@ -92,16 +93,21 @@ int main(int argc, char **argv) bits = ((bits - 1) | 7) + 1; /* Align to bytes for easy mallocing and reading */ + fprintf(stderr, _("Seeding the PRNG: please press some keys or move\nthe mouse if this program seems to have halted...\n")); + + RAND_load_file("/dev/random", 1024); /* OpenSSL PRNG state apparently uses 1024 bytes */ + fprintf(stderr, _("Generating %d bits keys:\n"), bits); - key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); + key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); fprintf(stderr, _("Done.\n")); printf(_("Public key: %s\n"), BN_bn2hex(key->n)); printf(_("Private key: %s\n"), BN_bn2hex(key->d)); + printf(_("Public exp: %s\n"), BN_bn2hex(key->e)); + + fflush(stdin); /* Flush any input caused by random keypresses */ return 0; } - -