From d5fd1344e668da0bc8536e798f347041d5377843 Mon Sep 17 00:00:00 2001 From: Guus Sliepen Date: Thu, 19 Oct 2000 14:42:00 +0000 Subject: [PATCH] - Seed the PRNG using /dev/random before generating the keys. --- src/genauth.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/src/genauth.c b/src/genauth.c index a27bd779..ad910b1e 100644 --- a/src/genauth.c +++ b/src/genauth.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: genauth.c,v 1.7.4.2 2000/10/15 00:59:34 guus Exp $ + $Id: genauth.c,v 1.7.4.3 2000/10/19 14:42:00 guus Exp $ */ #include "config.h" @@ -26,6 +26,7 @@ #include #include #include +#include #include @@ -92,16 +93,20 @@ int main(int argc, char **argv) bits = ((bits - 1) | 7) + 1; /* Align to bytes for easy mallocing and reading */ + fprintf(stderr, _("Seeding the PRNG: please press some keys or move\nthe mouse if this program seems to have halted...\n")); + + RAND_load_file("/dev/random", 1024); /* OpenSSL PRNG state apparently uses 1024 bytes */ + fprintf(stderr, _("Generating %d bits keys:\n"), bits); - key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); + key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL); fprintf(stderr, _("Done.\n")); printf(_("Public key: %s\n"), BN_bn2hex(key->n)); printf(_("Private key: %s\n"), BN_bn2hex(key->d)); + fflush(stdin); /* Flush any input caused by random keypresses */ + return 0; } - - -- 2.20.1