-static void
-usage(int status)
-{
- if(status != 0)
- fprintf(stderr, _("Try `%s --help\' for more information.\n"), program_name);
- else
- {
- printf(_("Usage: %s [option]...\n\n"), program_name);
- printf(_(" -c, --config=DIR Read configuration options from DIR.\n"
- " -D, --no-detach Don't fork and detach.\n"
- " -d Increase debug level.\n"
- " -k, --kill Attempt to kill a running tincd and exit.\n"
- " -n, --net=NETNAME Connect to net NETNAME.\n"));
- printf(_(" -K, --keygen[=BITS] Generate public/private RSA keypair.\n"
- " --help Display this help and exit.\n"
- " --version Output version information and exit.\n\n"));
- printf(_("Report bugs to tinc@nl.linux.org.\n"));
- }
- exit(status);
-}
-
-void
-parse_options(int argc, char **argv, char **envp)
-{
- int r;
- int option_index = 0;
-
- while((r = getopt_long(argc, argv, "c:Ddkn:K::", long_options, &option_index)) != EOF)
- {
- switch(r)
- {
- case 0: /* long option */
- break;
- case 'c': /* config file */
- confbase = xmalloc(strlen(optarg)+1);
- strcpy(confbase, optarg);
- break;
- case 'D': /* no detach */
- do_detach = 0;
- break;
- case 'd': /* inc debug level */
- debug_lvl++;
- break;
- case 'k': /* kill old tincds */
- kill_tincd = 1;
- break;
- case 'n': /* net name given */
- netname = xmalloc(strlen(optarg)+1);
- strcpy(netname, optarg);
- break;
- case 'K': /* generate public/private keypair */
- if(optarg)
- {
- generate_keys = atoi(optarg);
- if(generate_keys < 512)
- {
- fprintf(stderr, _("Invalid argument! BITS must be a number equal to or greater than 512.\n"));
- usage(1);
- }
- generate_keys &= ~7; /* Round it to bytes */
- }
- else
- generate_keys = 1024;
- break;
- case '?':
- usage(1);
- default:
- break;
- }
- }
-}
-
-/* This function prettyprints the key generation process */
-
-void indicator(int a, int b, void *p)
-{
- switch(a)
- {
- case 0:
- fprintf(stderr, ".");
- break;
- case 1:
- fprintf(stderr, "+");
- break;
- case 2:
- fprintf(stderr, "-");
- break;
- case 3:
- switch(b)
- {
- case 0:
- fprintf(stderr, " p\n");
- break;
- case 1:
- fprintf(stderr, " q\n");
- break;
- default:
- fprintf(stderr, "?");
- }
- break;
- default:
- fprintf(stderr, "?");
- }
-}
-
-/* Generate a public/private RSA keypair, and possibly store it into the configuration file. */
-
-int keygen(int bits)
-{
- RSA *rsa_key;
-
- fprintf(stderr, _("Seeding the PRNG: please press some keys or move\nthe mouse if this program seems to have halted...\n"));
- RAND_load_file("/dev/random", 1024); /* OpenSSL PRNG state apparently uses 1024 bytes, but it seems pretty sufficient anyway :) */
-
- fprintf(stderr, _("Generating %d bits keys:\n"), bits);
- rsa_key = RSA_generate_key(bits, 0xFFFF, indicator, NULL);
- if(!rsa_key)
- {
- fprintf(stderr, _("Error during key generation!"));
- return -1;
- }
- else
- fprintf(stderr, _("Done.\n"));
-
- fprintf(stderr, _("Please copy the private key to tinc.conf and the\npublic key to your host configuration file:\n\n"));
- printf("PublicKey = %s\n", BN_bn2hex(rsa_key->n));
- printf("PrivateKey = %s\n", BN_bn2hex(rsa_key->d));
-
- fflush(stdin);
- return 0;
-}