X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fgenauth.c;h=fa2e1ec7a5e2624db25641b567ec50501f376ab2;hp=0d47d510422deab5cb05faa3b09d5ff3638f0518;hb=451e9e3e7a968151de541de68603a01f0922b415;hpb=1243156a5e03a666b36bc4400f1402243a85c9a7 diff --git a/src/genauth.c b/src/genauth.c index 0d47d510..fa2e1ec7 100644 --- a/src/genauth.c +++ b/src/genauth.c @@ -1,6 +1,7 @@ /* - genauth.c -- generate a random passphrase - Copyright (C) 1998,99 Ivo Timmermans + genauth.c -- generate public/private keypairs + Copyright (C) 1998,1999,2000 Ivo Timmermans + 2000 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -15,6 +16,8 @@ You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. + + $Id: genauth.c,v 1.7.4.1 2000/10/11 12:07:27 guus Exp $ */ #include "config.h" @@ -22,71 +25,80 @@ #include #include #include +#include #include -#include "encr.h" +#include "system.h" -unsigned char initvec[] = { 0x22, 0x7b, 0xad, 0x55, 0x41, 0xf4, 0x3e, 0xf3 }; +#define RSA_PUBLIC_EXPONENT 65535 + +void indicator(int a, int b, void *p) +{ + switch(a) + { + case 0: + fprintf(stderr, "."); + break; + case 1: + fprintf(stderr, "+"); + break; + case 2: + fprintf(stderr, "-"); + break; + case 3: + switch(b) + { + case 0: + fprintf(stderr, " p\n"); + break; + case 1: + fprintf(stderr, " q\n"); + break; + default: + fprintf(stderr, "?"); + } + break; + default: + fprintf(stderr, "?"); + } +} int main(int argc, char **argv) { - FILE *fp; - int bits, c, i, bytes; - unsigned char *p; + int bits; + RSA *key; - if(argc != 2) - { - fprintf(stderr, "Usage: %s bits\n", argv[0]); - return 1; - } + setlocale (LC_ALL, ""); + bindtextdomain (PACKAGE, LOCALEDIR); + textdomain (PACKAGE); - if(!(bits = atol(argv[1]))) + if(argc > 2 || (argc == 2 && (!strcmp(argv[1], "-h") || !strcmp(argv[1], "--help")))) { - fprintf(stderr, "Illegal number: %s\n", argv[1]); + fprintf(stderr, _("Usage: %s bits\n"), argv[0]); return 1; } - bits = ((bits - 1) | 63) + 1; - fprintf(stderr, "Generating %d bits number", bits); - bytes = bits >> 3; + if(!argv[1]) + argv[1] = "1024"; + + bits = atol(argv[1]); - if((fp = fopen("/dev/urandom", "r")) == NULL) + if(bits<32) { - perror("Opening /dev/urandom"); + fprintf(stderr, _("Illegal number: %s\n"), argv[1]); return 1; } + + bits = ((bits - 1) | 7) + 1; /* Align to bytes for easy mallocing and reading */ - p = xmalloc(bytes); + fprintf(stderr, _("Generating %d bits keys:\n"), bits); - setbuf(stdout, NULL); - for(i = 0; i < 128; i++) - { - c = fgetc(fp); - if(feof(fp)) - { - puts(""); - fprintf(stderr, "File was empty!\n"); - } - p[i] = c; - } + key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); - for(i = 0; i < (bytes); i++) - { - c = fgetc(fp); - if(feof(fp)) - { - puts(""); - fprintf(stderr, "File was empty!\n"); - } - p[i] = c; - } - fclose(fp); + fprintf(stderr, _("Done.\n")); - printf("%d ", bits); - for(i = 0; i < bytes; i++) - printf("%02x", p[i]); - puts(""); + printf("Public key:\t%s\nPrivate key:\t%s\n", BN_bn2hex(key->n), BN_bn2hex(key->d)); return 0; }