X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fencr.c;h=81c6e11768eb8303e5be486f311297ae19bccbe7;hp=cde6a991b195650c14be0669776851174bdfd9aa;hb=3831f51a53088bfcc1d148fd54b3083afe7fde32;hpb=74b0cbecce5194dc5c594cc4e2aa3e97c14ea6c1 diff --git a/src/encr.c b/src/encr.c index cde6a991..81c6e117 100644 --- a/src/encr.c +++ b/src/encr.c @@ -1,6 +1,7 @@ /* encr.c -- everything that deals with encryption - Copyright (C) 1998,99 Ivo Timmermans + Copyright (C) 1998,1999,2000 Ivo Timmermans + 2000 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -15,6 +16,8 @@ You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. + + $Id: encr.c,v 1.12.4.3 2000/08/17 16:51:07 guus Exp $ */ #include "config.h" @@ -47,6 +50,8 @@ #include "net.h" #include "protocol.h" +#include "system.h" + #define ENCR_GENERATOR "0xd" #define ENCR_PRIME "0x7fffffffffffffffffffffffffffffff" /* Mersenne :) */ @@ -93,25 +98,24 @@ int read_passphrase(char *which, char **out) cp if((cfg = get_config_val(passphrasesdir)) == NULL) { - filename = xmalloc(strlen(confbase)+13+strlen(which)); - sprintf(filename, "%spassphrases/%s", confbase, which); + asprintf(&filename, "%spassphrases/%s", confbase, which); } else { - filename = xmalloc(strlen(cfg->data.ptr)+2+strlen(which)); - sprintf(filename, "%s/%s", (char*)cfg->data.ptr, which); + asprintf(&filename, "%s/%s", (char*)cfg->data.ptr, which); } if((f = fopen(filename, "rb")) == NULL) { - syslog(LOG_ERR, "Could not open %s: %m", filename); + if(debug_lvl > 1) + syslog(LOG_ERR, _("Could not open %s: %m"), filename); return -1; } fscanf(f, "%d ", &size); if(size < 1 || size > (1<<15)) { - syslog(LOG_ERR, "Illegal passphrase in %s; size would be %d", filename, size); + syslog(LOG_ERR, _("Illegal passphrase in %s; size would be %d"), filename, size); return -1; } size >>= 2; /* bits->nibbles */ @@ -145,11 +149,12 @@ cp else my_key_expiry = (time_t)(time(NULL) + cfg->data.val); - syslog(LOG_NOTICE, "Generating %d bits keys.", PRIVATE_KEY_BITS); + if(debug_lvl > 1) + syslog(LOG_NOTICE, _("Generating %d bits keys"), PRIVATE_KEY_BITS); if((f = fopen("/dev/urandom", "r")) == NULL) { - syslog(LOG_ERR, "Opening /dev/urandom failed: %m"); + syslog(LOG_ERR, _("Opening /dev/urandom failed: %m")); return -1; } @@ -214,7 +219,7 @@ cp encryption_keylen = len; if(debug_lvl > 2) - syslog(LOG_INFO, "Encryption key set to %s", tmp); + syslog(LOG_INFO, _("Encryption key set to %s"), tmp); free(tmp); mpz_clear(ak); @@ -261,7 +266,7 @@ int verify_passphrase(conn_list_t *cl, unsigned char *his_pubkey) mpz_t pk; unsigned char *out; BF_KEY bf_key; - char which[sizeof("123.123.123.123")+1]; + char *which; char *meuk; cp mpz_init_set_str(pk, his_pubkey, 36); @@ -275,7 +280,7 @@ cp if(key_inited) cipher_set_key(&encryption_key, encryption_keylen, text_key); - sprintf(which, IP_ADDR_S, IP_ADDR_V(cl->vpn_ip)); + asprintf(&which, IP_ADDR_S, IP_ADDR_V(cl->vpn_ip)); if((pplen = read_passphrase(which, &meuk)) < 0) return -1; @@ -345,7 +350,7 @@ void regenerate_keys(void) cp generate_private_key(); calculate_public_key(); - send_key_changed2(); + send_key_changed_all(); recalculate_encryption_keys(); cp }