xref: /freebsd/crypto/openssl/apps/dgst.c (revision 8657387683946d0c03e09fe77029edfe309eeb20)
1 /* apps/dgst.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <string.h>
61 #include <stdlib.h>
62 #include "apps.h"
63 #include <openssl/bio.h>
64 #include <openssl/err.h>
65 #include <openssl/evp.h>
66 #include <openssl/objects.h>
67 #include <openssl/x509.h>
68 #include <openssl/pem.h>
69 #include <openssl/hmac.h>
70 
71 #undef BUFSIZE
72 #define BUFSIZE 1024*8
73 
74 #undef PROG
75 #define PROG    dgst_main
76 
77 int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
78           EVP_PKEY *key, unsigned char *sigin, int siglen,
79           const char *sig_name, const char *md_name,
80           const char *file, BIO *bmd);
81 
82 static void list_md_fn(const EVP_MD *m,
83                        const char *from, const char *to, void *arg)
84 {
85     const char *mname;
86     /* Skip aliases */
87     if (!m)
88         return;
89     mname = OBJ_nid2ln(EVP_MD_type(m));
90     /* Skip shortnames */
91     if (strcmp(from, mname))
92         return;
93     /* Skip clones */
94     if (EVP_MD_flags(m) & EVP_MD_FLAG_PKEY_DIGEST)
95         return;
96     if (strchr(mname, ' '))
97         mname = EVP_MD_name(m);
98     BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n",
99                mname, mname);
100 }
101 
102 int MAIN(int, char **);
103 
104 int MAIN(int argc, char **argv)
105 {
106     ENGINE *e = NULL, *impl = NULL;
107     unsigned char *buf = NULL;
108     int i, err = 1;
109     const EVP_MD *md = NULL, *m;
110     BIO *in = NULL, *inp;
111     BIO *bmd = NULL;
112     BIO *out = NULL;
113 #define PROG_NAME_SIZE  39
114     char pname[PROG_NAME_SIZE + 1];
115     int separator = 0;
116     int debug = 0;
117     int keyform = FORMAT_PEM;
118     const char *outfile = NULL, *keyfile = NULL;
119     const char *sigfile = NULL, *randfile = NULL;
120     int out_bin = -1, want_pub = 0, do_verify = 0;
121     EVP_PKEY *sigkey = NULL;
122     unsigned char *sigbuf = NULL;
123     int siglen = 0;
124     char *passargin = NULL, *passin = NULL;
125 #ifndef OPENSSL_NO_ENGINE
126     char *engine = NULL;
127     int engine_impl = 0;
128 #endif
129     char *hmac_key = NULL;
130     char *mac_name = NULL;
131     int non_fips_allow = 0;
132     STACK_OF(OPENSSL_STRING) *sigopts = NULL, *macopts = NULL;
133 
134     apps_startup();
135 
136     if ((buf = (unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL) {
137         BIO_printf(bio_err, "out of memory\n");
138         goto end;
139     }
140     if (bio_err == NULL)
141         if ((bio_err = BIO_new(BIO_s_file())) != NULL)
142             BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
143 
144     if (!load_config(bio_err, NULL))
145         goto end;
146 
147     /* first check the program name */
148     program_name(argv[0], pname, sizeof pname);
149 
150     md = EVP_get_digestbyname(pname);
151 
152     argc--;
153     argv++;
154     while (argc > 0) {
155         if ((*argv)[0] != '-')
156             break;
157         if (strcmp(*argv, "-c") == 0)
158             separator = 1;
159         else if (strcmp(*argv, "-r") == 0)
160             separator = 2;
161         else if (strcmp(*argv, "-rand") == 0) {
162             if (--argc < 1)
163                 break;
164             randfile = *(++argv);
165         } else if (strcmp(*argv, "-out") == 0) {
166             if (--argc < 1)
167                 break;
168             outfile = *(++argv);
169         } else if (strcmp(*argv, "-sign") == 0) {
170             if (--argc < 1)
171                 break;
172             keyfile = *(++argv);
173         } else if (!strcmp(*argv, "-passin")) {
174             if (--argc < 1)
175                 break;
176             passargin = *++argv;
177         } else if (strcmp(*argv, "-verify") == 0) {
178             if (--argc < 1)
179                 break;
180             keyfile = *(++argv);
181             want_pub = 1;
182             do_verify = 1;
183         } else if (strcmp(*argv, "-prverify") == 0) {
184             if (--argc < 1)
185                 break;
186             keyfile = *(++argv);
187             do_verify = 1;
188         } else if (strcmp(*argv, "-signature") == 0) {
189             if (--argc < 1)
190                 break;
191             sigfile = *(++argv);
192         } else if (strcmp(*argv, "-keyform") == 0) {
193             if (--argc < 1)
194                 break;
195             keyform = str2fmt(*(++argv));
196         }
197 #ifndef OPENSSL_NO_ENGINE
198         else if (strcmp(*argv, "-engine") == 0) {
199             if (--argc < 1)
200                 break;
201             engine = *(++argv);
202             e = setup_engine(bio_err, engine, 0);
203         } else if (strcmp(*argv, "-engine_impl") == 0)
204             engine_impl = 1;
205 #endif
206         else if (strcmp(*argv, "-hex") == 0)
207             out_bin = 0;
208         else if (strcmp(*argv, "-binary") == 0)
209             out_bin = 1;
210         else if (strcmp(*argv, "-d") == 0)
211             debug = 1;
212         else if (!strcmp(*argv, "-fips-fingerprint"))
213             hmac_key = "etaonrishdlcupfm";
214         else if (strcmp(*argv, "-non-fips-allow") == 0)
215             non_fips_allow = 1;
216         else if (!strcmp(*argv, "-hmac")) {
217             if (--argc < 1)
218                 break;
219             hmac_key = *++argv;
220         } else if (!strcmp(*argv, "-mac")) {
221             if (--argc < 1)
222                 break;
223             mac_name = *++argv;
224         } else if (strcmp(*argv, "-sigopt") == 0) {
225             if (--argc < 1)
226                 break;
227             if (!sigopts)
228                 sigopts = sk_OPENSSL_STRING_new_null();
229             if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
230                 break;
231         } else if (strcmp(*argv, "-macopt") == 0) {
232             if (--argc < 1)
233                 break;
234             if (!macopts)
235                 macopts = sk_OPENSSL_STRING_new_null();
236             if (!macopts || !sk_OPENSSL_STRING_push(macopts, *(++argv)))
237                 break;
238         } else if ((m = EVP_get_digestbyname(&((*argv)[1]))) != NULL)
239             md = m;
240         else
241             break;
242         argc--;
243         argv++;
244     }
245 
246     if (keyfile != NULL && argc > 1) {
247         BIO_printf(bio_err, "Can only sign or verify one file\n");
248         goto end;
249     }
250 
251     if (do_verify && !sigfile) {
252         BIO_printf(bio_err,
253                    "No signature to verify: use the -signature option\n");
254         goto end;
255     }
256 
257     if ((argc > 0) && (argv[0][0] == '-')) { /* bad option */
258         BIO_printf(bio_err, "unknown option '%s'\n", *argv);
259         BIO_printf(bio_err, "options are\n");
260         BIO_printf(bio_err,
261                    "-c              to output the digest with separating colons\n");
262         BIO_printf(bio_err,
263                    "-r              to output the digest in coreutils format\n");
264         BIO_printf(bio_err, "-d              to output debug info\n");
265         BIO_printf(bio_err, "-hex            output as hex dump\n");
266         BIO_printf(bio_err, "-binary         output in binary form\n");
267         BIO_printf(bio_err, "-hmac arg       set the HMAC key to arg\n");
268         BIO_printf(bio_err, "-non-fips-allow allow use of non FIPS digest\n");
269         BIO_printf(bio_err,
270                    "-sign   file    sign digest using private key in file\n");
271         BIO_printf(bio_err,
272                    "-verify file    verify a signature using public key in file\n");
273         BIO_printf(bio_err,
274                    "-prverify file  verify a signature using private key in file\n");
275         BIO_printf(bio_err,
276                    "-keyform arg    key file format (PEM or ENGINE)\n");
277         BIO_printf(bio_err,
278                    "-out filename   output to filename rather than stdout\n");
279         BIO_printf(bio_err, "-signature file signature to verify\n");
280         BIO_printf(bio_err, "-sigopt nm:v    signature parameter\n");
281         BIO_printf(bio_err, "-hmac key       create hashed MAC with key\n");
282         BIO_printf(bio_err,
283                    "-mac algorithm  create MAC (not neccessarily HMAC)\n");
284         BIO_printf(bio_err,
285                    "-macopt nm:v    MAC algorithm parameters or key\n");
286 #ifndef OPENSSL_NO_ENGINE
287         BIO_printf(bio_err,
288                    "-engine e       use engine e, possibly a hardware device.\n");
289 #endif
290 
291         EVP_MD_do_all_sorted(list_md_fn, bio_err);
292         goto end;
293     }
294 #ifndef OPENSSL_NO_ENGINE
295     if (engine_impl)
296         impl = e;
297 #endif
298 
299     in = BIO_new(BIO_s_file());
300     bmd = BIO_new(BIO_f_md());
301     if ((in == NULL) || (bmd == NULL)) {
302         ERR_print_errors(bio_err);
303         goto end;
304     }
305 
306     if (debug) {
307         BIO_set_callback(in, BIO_debug_callback);
308         /* needed for windows 3.1 */
309         BIO_set_callback_arg(in, (char *)bio_err);
310     }
311 
312     if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
313         BIO_printf(bio_err, "Error getting password\n");
314         goto end;
315     }
316 
317     if (out_bin == -1) {
318         if (keyfile)
319             out_bin = 1;
320         else
321             out_bin = 0;
322     }
323 
324     if (randfile)
325         app_RAND_load_file(randfile, bio_err, 0);
326 
327     if (outfile) {
328         if (out_bin)
329             out = BIO_new_file(outfile, "wb");
330         else
331             out = BIO_new_file(outfile, "w");
332     } else {
333         out = BIO_new_fp(stdout, BIO_NOCLOSE);
334 #ifdef OPENSSL_SYS_VMS
335         {
336             BIO *tmpbio = BIO_new(BIO_f_linebuffer());
337             out = BIO_push(tmpbio, out);
338         }
339 #endif
340     }
341 
342     if (!out) {
343         BIO_printf(bio_err, "Error opening output file %s\n",
344                    outfile ? outfile : "(stdout)");
345         ERR_print_errors(bio_err);
346         goto end;
347     }
348     if ((! !mac_name + ! !keyfile + ! !hmac_key) > 1) {
349         BIO_printf(bio_err, "MAC and Signing key cannot both be specified\n");
350         goto end;
351     }
352 
353     if (keyfile) {
354         if (want_pub)
355             sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
356                                  e, "key file");
357         else
358             sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
359                               e, "key file");
360         if (!sigkey) {
361             /*
362              * load_[pub]key() has already printed an appropriate message
363              */
364             goto end;
365         }
366     }
367 
368     if (mac_name) {
369         EVP_PKEY_CTX *mac_ctx = NULL;
370         int r = 0;
371         if (!init_gen_str(bio_err, &mac_ctx, mac_name, impl, 0))
372             goto mac_end;
373         if (macopts) {
374             char *macopt;
375             for (i = 0; i < sk_OPENSSL_STRING_num(macopts); i++) {
376                 macopt = sk_OPENSSL_STRING_value(macopts, i);
377                 if (pkey_ctrl_string(mac_ctx, macopt) <= 0) {
378                     BIO_printf(bio_err,
379                                "MAC parameter error \"%s\"\n", macopt);
380                     ERR_print_errors(bio_err);
381                     goto mac_end;
382                 }
383             }
384         }
385         if (EVP_PKEY_keygen(mac_ctx, &sigkey) <= 0) {
386             BIO_puts(bio_err, "Error generating key\n");
387             ERR_print_errors(bio_err);
388             goto mac_end;
389         }
390         r = 1;
391  mac_end:
392         if (mac_ctx)
393             EVP_PKEY_CTX_free(mac_ctx);
394         if (r == 0)
395             goto end;
396     }
397 
398     if (non_fips_allow) {
399         EVP_MD_CTX *md_ctx;
400         BIO_get_md_ctx(bmd, &md_ctx);
401         EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
402     }
403 
404     if (hmac_key) {
405         sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, impl,
406                                       (unsigned char *)hmac_key, -1);
407         if (!sigkey)
408             goto end;
409     }
410 
411     if (sigkey) {
412         EVP_MD_CTX *mctx = NULL;
413         EVP_PKEY_CTX *pctx = NULL;
414         int r;
415         if (!BIO_get_md_ctx(bmd, &mctx)) {
416             BIO_printf(bio_err, "Error getting context\n");
417             ERR_print_errors(bio_err);
418             goto end;
419         }
420         if (do_verify)
421             r = EVP_DigestVerifyInit(mctx, &pctx, md, impl, sigkey);
422         else
423             r = EVP_DigestSignInit(mctx, &pctx, md, impl, sigkey);
424         if (!r) {
425             BIO_printf(bio_err, "Error setting context\n");
426             ERR_print_errors(bio_err);
427             goto end;
428         }
429         if (sigopts) {
430             char *sigopt;
431             for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++) {
432                 sigopt = sk_OPENSSL_STRING_value(sigopts, i);
433                 if (pkey_ctrl_string(pctx, sigopt) <= 0) {
434                     BIO_printf(bio_err, "parameter error \"%s\"\n", sigopt);
435                     ERR_print_errors(bio_err);
436                     goto end;
437                 }
438             }
439         }
440     }
441     /* we use md as a filter, reading from 'in' */
442     else {
443         EVP_MD_CTX *mctx = NULL;
444         if (!BIO_get_md_ctx(bmd, &mctx)) {
445             BIO_printf(bio_err, "Error getting context\n");
446             ERR_print_errors(bio_err);
447             goto end;
448         }
449         if (md == NULL)
450             md = EVP_md5();
451         if (!EVP_DigestInit_ex(mctx, md, impl)) {
452             BIO_printf(bio_err, "Error setting digest %s\n", pname);
453             ERR_print_errors(bio_err);
454             goto end;
455         }
456     }
457 
458     if (sigfile && sigkey) {
459         BIO *sigbio;
460         sigbio = BIO_new_file(sigfile, "rb");
461         siglen = EVP_PKEY_size(sigkey);
462         sigbuf = OPENSSL_malloc(siglen);
463         if (!sigbio) {
464             BIO_printf(bio_err, "Error opening signature file %s\n", sigfile);
465             ERR_print_errors(bio_err);
466             goto end;
467         }
468         if (!sigbuf) {
469             BIO_printf(bio_err, "Out of memory\n");
470             ERR_print_errors(bio_err);
471             goto end;
472         }
473         siglen = BIO_read(sigbio, sigbuf, siglen);
474         BIO_free(sigbio);
475         if (siglen <= 0) {
476             BIO_printf(bio_err, "Error reading signature file %s\n", sigfile);
477             ERR_print_errors(bio_err);
478             goto end;
479         }
480     }
481     inp = BIO_push(bmd, in);
482 
483     if (md == NULL) {
484         EVP_MD_CTX *tctx;
485         BIO_get_md_ctx(bmd, &tctx);
486         md = EVP_MD_CTX_md(tctx);
487     }
488 
489     if (argc == 0) {
490         BIO_set_fp(in, stdin, BIO_NOCLOSE);
491         err = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
492                     siglen, NULL, NULL, "stdin", bmd);
493     } else {
494         const char *md_name = NULL, *sig_name = NULL;
495         if (!out_bin) {
496             if (sigkey) {
497                 const EVP_PKEY_ASN1_METHOD *ameth;
498                 ameth = EVP_PKEY_get0_asn1(sigkey);
499                 if (ameth)
500                     EVP_PKEY_asn1_get0_info(NULL, NULL,
501                                             NULL, NULL, &sig_name, ameth);
502             }
503             if (md)
504                 md_name = EVP_MD_name(md);
505         }
506         err = 0;
507         for (i = 0; i < argc; i++) {
508             int r;
509             if (BIO_read_filename(in, argv[i]) <= 0) {
510                 perror(argv[i]);
511                 err++;
512                 continue;
513             } else
514                 r = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
515                           siglen, sig_name, md_name, argv[i], bmd);
516             if (r)
517                 err = r;
518             (void)BIO_reset(bmd);
519         }
520     }
521  end:
522     if (buf != NULL) {
523         OPENSSL_cleanse(buf, BUFSIZE);
524         OPENSSL_free(buf);
525     }
526     if (in != NULL)
527         BIO_free(in);
528     if (passin)
529         OPENSSL_free(passin);
530     BIO_free_all(out);
531     EVP_PKEY_free(sigkey);
532     if (sigopts)
533         sk_OPENSSL_STRING_free(sigopts);
534     if (macopts)
535         sk_OPENSSL_STRING_free(macopts);
536     if (sigbuf)
537         OPENSSL_free(sigbuf);
538     if (bmd != NULL)
539         BIO_free(bmd);
540     release_engine(e);
541     apps_shutdown();
542     OPENSSL_EXIT(err);
543 }
544 
545 int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
546           EVP_PKEY *key, unsigned char *sigin, int siglen,
547           const char *sig_name, const char *md_name,
548           const char *file, BIO *bmd)
549 {
550     size_t len;
551     int i;
552 
553     for (;;) {
554         i = BIO_read(bp, (char *)buf, BUFSIZE);
555         if (i < 0) {
556             BIO_printf(bio_err, "Read Error in %s\n", file);
557             ERR_print_errors(bio_err);
558             return 1;
559         }
560         if (i == 0)
561             break;
562     }
563     if (sigin) {
564         EVP_MD_CTX *ctx;
565         BIO_get_md_ctx(bp, &ctx);
566         i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen);
567         if (i > 0)
568             BIO_printf(out, "Verified OK\n");
569         else if (i == 0) {
570             BIO_printf(out, "Verification Failure\n");
571             return 1;
572         } else {
573             BIO_printf(bio_err, "Error Verifying Data\n");
574             ERR_print_errors(bio_err);
575             return 1;
576         }
577         return 0;
578     }
579     if (key) {
580         EVP_MD_CTX *ctx;
581         BIO_get_md_ctx(bp, &ctx);
582         len = BUFSIZE;
583         if (!EVP_DigestSignFinal(ctx, buf, &len)) {
584             BIO_printf(bio_err, "Error Signing Data\n");
585             ERR_print_errors(bio_err);
586             return 1;
587         }
588     } else {
589         len = BIO_gets(bp, (char *)buf, BUFSIZE);
590         if ((int)len < 0) {
591             ERR_print_errors(bio_err);
592             return 1;
593         }
594     }
595 
596     if (binout)
597         BIO_write(out, buf, len);
598     else if (sep == 2) {
599         for (i = 0; i < (int)len; i++)
600             BIO_printf(out, "%02x", buf[i]);
601         BIO_printf(out, " *%s\n", file);
602     } else {
603         if (sig_name) {
604             BIO_puts(out, sig_name);
605             if (md_name)
606                 BIO_printf(out, "-%s", md_name);
607             BIO_printf(out, "(%s)= ", file);
608         } else if (md_name)
609             BIO_printf(out, "%s(%s)= ", md_name, file);
610         else
611             BIO_printf(out, "(%s)= ", file);
612         for (i = 0; i < (int)len; i++) {
613             if (sep && (i != 0))
614                 BIO_printf(out, ":");
615             BIO_printf(out, "%02x", buf[i]);
616         }
617         BIO_printf(out, "\n");
618     }
619     return 0;
620 }
621