Mention Whirlpool in dgst -help.
[openssl.git] / apps / dgst.c
index c3e37be41fa159d4a28d388ffdb606a3495cde9a..65b2ae34ba509f92d3b22ad9f27853fea67c8f18 100644 (file)
@@ -73,8 +73,9 @@
 #undef PROG
 #define PROG   dgst_main
 
-void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
-               EVP_PKEY *key, unsigned char *sigin, int siglen);
+int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
+         EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
+         const char *file);
 
 int MAIN(int, char **);
 
@@ -88,8 +89,8 @@ int MAIN(int argc, char **argv)
        BIO *bmd=NULL;
        BIO *out = NULL;
        const char *name;
-#define PROG_NAME_SIZE  16
-       char pname[PROG_NAME_SIZE];
+#define PROG_NAME_SIZE  39
+       char pname[PROG_NAME_SIZE+1];
        int separator=0;
        int debug=0;
        int keyform=FORMAT_PEM;
@@ -99,7 +100,10 @@ int MAIN(int argc, char **argv)
        EVP_PKEY *sigkey = NULL;
        unsigned char *sigbuf = NULL;
        int siglen = 0;
+       char *passargin = NULL, *passin = NULL;
+#ifndef OPENSSL_NO_ENGINE
        char *engine=NULL;
+#endif
 
        apps_startup();
 
@@ -116,7 +120,7 @@ int MAIN(int argc, char **argv)
                goto end;
 
        /* first check the program name */
-       program_name(argv[0],pname,PROG_NAME_SIZE);
+       program_name(argv[0],pname,sizeof pname);
 
        md=EVP_get_digestbyname(pname);
 
@@ -142,6 +146,12 @@ int MAIN(int argc, char **argv)
                        if (--argc < 1) break;
                        keyfile=*(++argv);
                        }
+               else if (!strcmp(*argv,"-passin"))
+                       {
+                       if (--argc < 1)
+                               break;
+                       passargin=*++argv;
+                       }
                else if (strcmp(*argv,"-verify") == 0)
                        {
                        if (--argc < 1) break;
@@ -165,11 +175,13 @@ int MAIN(int argc, char **argv)
                        if (--argc < 1) break;
                        keyform=str2fmt(*(++argv));
                        }
+#ifndef OPENSSL_NO_ENGINE
                else if (strcmp(*argv,"-engine") == 0)
                        {
                        if (--argc < 1) break;
                        engine= *(++argv);
                        }
+#endif
                else if (strcmp(*argv,"-hex") == 0)
                        out_bin = 0;
                else if (strcmp(*argv,"-binary") == 0)
@@ -207,27 +219,47 @@ int MAIN(int argc, char **argv)
                BIO_printf(bio_err,"-keyform arg    key file format (PEM or ENGINE)\n");
                BIO_printf(bio_err,"-signature file signature to verify\n");
                BIO_printf(bio_err,"-binary         output in binary form\n");
+#ifndef OPENSSL_NO_ENGINE
                BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
+#endif
 
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm (default)\n",
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm (default)\n",
                        LN_md5,LN_md5);
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
                        LN_md4,LN_md4);
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
                        LN_md2,LN_md2);
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
+#ifndef OPENSSL_NO_SHA
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
                        LN_sha1,LN_sha1);
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
-                       LN_sha,LN_sha);
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
+#ifndef OPENSSL_NO_SHA256
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
+                       LN_sha224,LN_sha224);
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
+                       LN_sha256,LN_sha256);
+#endif
+#ifndef OPENSSL_NO_SHA512
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
+                       LN_sha384,LN_sha384);
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
+                       LN_sha512,LN_sha512);
+#endif
+#endif
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
                        LN_mdc2,LN_mdc2);
-               BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
                        LN_ripemd160,LN_ripemd160);
+#ifndef OPENSSL_NO_WHIRLPOOL
+               BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
+                       SN_whirlpool,SN_whirlpool);
+#endif
                err=1;
                goto end;
                }
 
+#ifndef OPENSSL_NO_ENGINE
         e = setup_engine(bio_err, engine, 0);
+#endif
 
        in=BIO_new(BIO_s_file());
        bmd=BIO_new(BIO_f_md());
@@ -238,6 +270,12 @@ int MAIN(int argc, char **argv)
                BIO_set_callback_arg(in,bio_err);
                }
 
+       if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
+               {
+               BIO_printf(bio_err, "Error getting password\n");
+               goto end;
+               }
+
        if ((in == NULL) || (bmd == NULL))
                {
                ERR_print_errors(bio_err);
@@ -276,10 +314,10 @@ int MAIN(int argc, char **argv)
        if(keyfile)
                {
                if (want_pub)
-                       sigkey = load_pubkey(bio_err, keyfile, keyform, NULL,
+                       sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
                                e, "key file");
                else
-                       sigkey = load_key(bio_err, keyfile, keyform, NULL,
+                       sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
                                e, "key file");
                if (!sigkey)
                        {
@@ -313,48 +351,72 @@ int MAIN(int argc, char **argv)
 
 
        /* we use md as a filter, reading from 'in' */
-       BIO_set_md(bmd,md);
+       if (!BIO_set_md(bmd,md))
+               {
+               BIO_printf(bio_err, "Error setting digest %s\n", pname);
+               ERR_print_errors(bio_err);
+               goto end;
+               }
+               
        inp=BIO_push(bmd,in);
 
        if (argc == 0)
                {
                BIO_set_fp(in,stdin,BIO_NOCLOSE);
-               do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf, siglen);
+               err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
+                         siglen,"","(stdin)");
                }
        else
                {
                name=OBJ_nid2sn(md->type);
                for (i=0; i<argc; i++)
                        {
+                       char *tmp,*tofree=NULL;
+                       int r;
+
                        if (BIO_read_filename(in,argv[i]) <= 0)
                                {
                                perror(argv[i]);
                                err++;
                                continue;
                                }
-                       if(!out_bin) BIO_printf(out, "%s(%s)= ",name,argv[i]);
-                       do_fp(out, buf,inp,separator, out_bin, sigkey, 
-                                                               sigbuf, siglen);
+                       if(!out_bin)
+                               {
+                               size_t len = strlen(name)+strlen(argv[i])+5;
+                               tmp=tofree=OPENSSL_malloc(len);
+                               BIO_snprintf(tmp,len,"%s(%s)= ",name,argv[i]);
+                               }
+                       else
+                               tmp="";
+                       r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
+                               siglen,tmp,argv[i]);
+                       if(r)
+                           err=r;
+                       if(tofree)
+                               OPENSSL_free(tofree);
                        (void)BIO_reset(bmd);
                        }
                }
 end:
        if (buf != NULL)
                {
-               memset(buf,0,BUFSIZE);
+               OPENSSL_cleanse(buf,BUFSIZE);
                OPENSSL_free(buf);
                }
        if (in != NULL) BIO_free(in);
+       if (passin)
+               OPENSSL_free(passin);
        BIO_free_all(out);
        EVP_PKEY_free(sigkey);
        if(sigbuf) OPENSSL_free(sigbuf);
        if (bmd != NULL) BIO_free(bmd);
        apps_shutdown();
-       EXIT(err);
+       OPENSSL_EXIT(err);
        }
 
-void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
-                       EVP_PKEY *key, unsigned char *sigin, int siglen)
+int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
+         EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
+         const char *file)
        {
        int len;
        int i;
@@ -362,21 +424,33 @@ void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
        for (;;)
                {
                i=BIO_read(bp,(char *)buf,BUFSIZE);
-               if (i <= 0) break;
+               if(i < 0)
+                       {
+                       BIO_printf(bio_err, "Read Error in %s\n",file);
+                       ERR_print_errors(bio_err);
+                       return 1;
+                       }
+               if (i == 0) break;
                }
        if(sigin)
                {
                EVP_MD_CTX *ctx;
                BIO_get_md_ctx(bp, &ctx);
                i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key); 
-               if(i > 0) BIO_printf(out, "Verified OK\n");
-               else if(i == 0) BIO_printf(out, "Verification Failure\n");
+               if(i > 0)
+                       BIO_printf(out, "Verified OK\n");
+               else if(i == 0)
+                       {
+                       BIO_printf(out, "Verification Failure\n");
+                       return 1;
+                       }
                else
                        {
                        BIO_printf(bio_err, "Error Verifying Data\n");
                        ERR_print_errors(bio_err);
+                       return 1;
                        }
-               return;
+               return 0;
                }
        if(key)
                {
@@ -386,7 +460,7 @@ void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
                        {
                        BIO_printf(bio_err, "Error Signing Data\n");
                        ERR_print_errors(bio_err);
-                       return;
+                       return 1;
                        }
                }
        else
@@ -395,6 +469,7 @@ void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
        if(binout) BIO_write(out, buf, len);
        else 
                {
+               BIO_write(out,title,strlen(title));
                for (i=0; i<len; i++)
                        {
                        if (sep && (i != 0))
@@ -403,5 +478,6 @@ void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
                        }
                BIO_printf(out, "\n");
                }
+       return 0;
        }