X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fgenauth.c;h=ad910b1e20ada5eb162f539969250998f7a02446;hp=a27bd77936bd01eb2a6c8cfc8f663398fad47f2c;hb=d5fd1344e668da0bc8536e798f347041d5377843;hpb=571cfb5846c710a0a3cdbdddce8936f6b34f1cf1 diff --git a/src/genauth.c b/src/genauth.c index a27bd779..ad910b1e 100644 --- a/src/genauth.c +++ b/src/genauth.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: genauth.c,v 1.7.4.2 2000/10/15 00:59:34 guus Exp $ + $Id: genauth.c,v 1.7.4.3 2000/10/19 14:42:00 guus Exp $ */ #include "config.h" @@ -26,6 +26,7 @@ #include #include #include +#include #include @@ -92,16 +93,20 @@ int main(int argc, char **argv) bits = ((bits - 1) | 7) + 1; /* Align to bytes for easy mallocing and reading */ + fprintf(stderr, _("Seeding the PRNG: please press some keys or move\nthe mouse if this program seems to have halted...\n")); + + RAND_load_file("/dev/random", 1024); /* OpenSSL PRNG state apparently uses 1024 bytes */ + fprintf(stderr, _("Generating %d bits keys:\n"), bits); - key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); + key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); fprintf(stderr, _("Done.\n")); printf(_("Public key: %s\n"), BN_bn2hex(key->n)); printf(_("Private key: %s\n"), BN_bn2hex(key->d)); + fflush(stdin); /* Flush any input caused by random keypresses */ + return 0; } - -