sl@0: /* apps/enc.c */ sl@0: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) sl@0: * All rights reserved. sl@0: * sl@0: * This package is an SSL implementation written sl@0: * by Eric Young (eay@cryptsoft.com). sl@0: * The implementation was written so as to conform with Netscapes SSL. sl@0: * sl@0: * This library is free for commercial and non-commercial use as long as sl@0: * the following conditions are aheared to. The following conditions sl@0: * apply to all code found in this distribution, be it the RC4, RSA, sl@0: * lhash, DES, etc., code; not just the SSL code. The SSL documentation sl@0: * included with this distribution is covered by the same copyright terms sl@0: * except that the holder is Tim Hudson (tjh@cryptsoft.com). sl@0: * sl@0: * Copyright remains Eric Young's, and as such any Copyright notices in sl@0: * the code are not to be removed. sl@0: * If this package is used in a product, Eric Young should be given attribution sl@0: * as the author of the parts of the library used. sl@0: * This can be in the form of a textual message at program startup or sl@0: * in documentation (online or textual) provided with the package. sl@0: * sl@0: * Redistribution and use in source and binary forms, with or without sl@0: * modification, are permitted provided that the following conditions sl@0: * are met: sl@0: * 1. Redistributions of source code must retain the copyright sl@0: * notice, this list of conditions and the following disclaimer. sl@0: * 2. Redistributions in binary form must reproduce the above copyright sl@0: * notice, this list of conditions and the following disclaimer in the sl@0: * documentation and/or other materials provided with the distribution. sl@0: * 3. All advertising materials mentioning features or use of this software sl@0: * must display the following acknowledgement: sl@0: * "This product includes cryptographic software written by sl@0: * Eric Young (eay@cryptsoft.com)" sl@0: * The word 'cryptographic' can be left out if the rouines from the library sl@0: * being used are not cryptographic related :-). sl@0: * 4. If you include any Windows specific code (or a derivative thereof) from sl@0: * the apps directory (application code) you must include an acknowledgement: sl@0: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" sl@0: * sl@0: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND sl@0: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE sl@0: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE sl@0: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE sl@0: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL sl@0: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS sl@0: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) sl@0: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT sl@0: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY sl@0: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF sl@0: * SUCH DAMAGE. sl@0: * sl@0: * The licence and distribution terms for any publically available version or sl@0: * derivative of this code cannot be changed. i.e. this code cannot simply be sl@0: * copied and put under another distribution licence sl@0: * [including the GNU Public Licence.] sl@0: */ sl@0: sl@0: #include sl@0: #include sl@0: #include sl@0: #include "apps.h" sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: sl@0: int set_hex(char *in,unsigned char *out,int size); sl@0: #undef SIZE sl@0: #undef BSIZE sl@0: #undef PROG sl@0: sl@0: #define SIZE (512) sl@0: #define BSIZE (8*1024) sl@0: #define PROG enc_main sl@0: sl@0: sl@0: sl@0: static void show_ciphers(const OBJ_NAME *name,void *bio_) sl@0: { sl@0: BIO *bio=bio_; sl@0: static int n; sl@0: sl@0: if(!islower((unsigned char)*name->name)) sl@0: return; sl@0: sl@0: BIO_printf(bio,"-%-25s",name->name); sl@0: if(++n == 3) sl@0: { sl@0: BIO_printf(bio,"\n"); sl@0: n=0; sl@0: } sl@0: else sl@0: BIO_printf(bio," "); sl@0: } sl@0: sl@0: int MAIN(int, char **); sl@0: sl@0: int MAIN(int argc, char **argv) sl@0: { sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: ENGINE *e = NULL; sl@0: #endif sl@0: static const char magic[]="Salted__"; sl@0: char mbuf[sizeof magic-1]; sl@0: char *strbuf=NULL; sl@0: unsigned char *buff=NULL,*bufsize=NULL; sl@0: int bsize=BSIZE,verbose=0; sl@0: int ret=1,inl; sl@0: int nopad = 0; sl@0: unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; sl@0: unsigned char salt[PKCS5_SALT_LEN]; sl@0: char *str=NULL, *passarg = NULL, *pass = NULL; sl@0: char *hkey=NULL,*hiv=NULL,*hsalt = NULL; sl@0: char *md=NULL; sl@0: int enc=1,printkey=0,i,base64=0; sl@0: int debug=0,olb64=0,nosalt=0; sl@0: const EVP_CIPHER *cipher=NULL,*c; sl@0: EVP_CIPHER_CTX *ctx = NULL; sl@0: char *inf=NULL,*outf=NULL; sl@0: BIO *in=NULL,*out=NULL,*b64=NULL,*benc=NULL,*rbio=NULL,*wbio=NULL; sl@0: #define PROG_NAME_SIZE 39 sl@0: char pname[PROG_NAME_SIZE+1]; sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: char *engine = NULL; sl@0: #endif sl@0: const EVP_MD *dgst=NULL; sl@0: sl@0: apps_startup(); sl@0: sl@0: if (bio_err == NULL) sl@0: if ((bio_err=BIO_new(BIO_s_file())) != NULL) sl@0: BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT); sl@0: sl@0: sl@0: if (!load_config(bio_err, NULL)) sl@0: goto end; sl@0: sl@0: /* first check the program name */ sl@0: program_name(argv[0],pname,sizeof pname); sl@0: if (strcmp(pname,"base64") == 0) sl@0: base64=1; sl@0: sl@0: cipher=EVP_get_cipherbyname(pname); sl@0: if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) sl@0: { sl@0: BIO_printf(bio_err,"%s is an unknown cipher\n",pname); sl@0: goto bad; sl@0: } sl@0: sl@0: argc--; sl@0: argv++; sl@0: while (argc >= 1) sl@0: { sl@0: if (strcmp(*argv,"-e") == 0) sl@0: enc=1; sl@0: else if (strcmp(*argv,"-in") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: inf= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-out") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: outf= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-pass") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: passarg= *(++argv); sl@0: } sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: else if (strcmp(*argv,"-engine") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: engine= *(++argv); sl@0: } sl@0: #endif sl@0: else if (strcmp(*argv,"-d") == 0) sl@0: enc=0; sl@0: else if (strcmp(*argv,"-p") == 0) sl@0: printkey=1; sl@0: else if (strcmp(*argv,"-v") == 0) sl@0: verbose=1; sl@0: else if (strcmp(*argv,"-nopad") == 0) sl@0: nopad=1; sl@0: else if (strcmp(*argv,"-salt") == 0) sl@0: nosalt=0; sl@0: else if (strcmp(*argv,"-nosalt") == 0) sl@0: nosalt=1; sl@0: else if (strcmp(*argv,"-debug") == 0) sl@0: debug=1; sl@0: else if (strcmp(*argv,"-P") == 0) sl@0: printkey=2; sl@0: else if (strcmp(*argv,"-A") == 0) sl@0: olb64=1; sl@0: else if (strcmp(*argv,"-a") == 0) sl@0: base64=1; sl@0: else if (strcmp(*argv,"-base64") == 0) sl@0: base64=1; sl@0: else if (strcmp(*argv,"-bufsize") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: bufsize=(unsigned char *)*(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-k") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: str= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-kfile") == 0) sl@0: { sl@0: static char buf[128]; sl@0: FILE *infile; sl@0: char *file; sl@0: sl@0: if (--argc < 1) goto bad; sl@0: file= *(++argv); sl@0: infile=fopen(file,"r"); sl@0: if (infile == NULL) sl@0: { sl@0: BIO_printf(bio_err,"unable to read key from '%s'\n", sl@0: file); sl@0: goto bad; sl@0: } sl@0: buf[0]='\0'; sl@0: fgets(buf,sizeof buf,infile); sl@0: fclose(infile); sl@0: i=strlen(buf); sl@0: if ((i > 0) && sl@0: ((buf[i-1] == '\n') || (buf[i-1] == '\r'))) sl@0: buf[--i]='\0'; sl@0: if ((i > 0) && sl@0: ((buf[i-1] == '\n') || (buf[i-1] == '\r'))) sl@0: buf[--i]='\0'; sl@0: if (i < 1) sl@0: { sl@0: BIO_printf(bio_err,"zero length password\n"); sl@0: goto bad; sl@0: } sl@0: str=buf; sl@0: } sl@0: else if (strcmp(*argv,"-K") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: hkey= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-S") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: hsalt= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-iv") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: hiv= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-md") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: md= *(++argv); sl@0: } sl@0: else if ((argv[0][0] == '-') && sl@0: ((c=EVP_get_cipherbyname(&(argv[0][1]))) != NULL)) sl@0: { sl@0: cipher=c; sl@0: } sl@0: else if (strcmp(*argv,"-none") == 0) sl@0: cipher=NULL; sl@0: else sl@0: { sl@0: BIO_printf(bio_err,"unknown option '%s'\n",*argv); sl@0: bad: sl@0: BIO_printf(bio_err,"options are\n"); sl@0: BIO_printf(bio_err,"%-14s input file\n","-in "); sl@0: BIO_printf(bio_err,"%-14s output file\n","-out "); sl@0: BIO_printf(bio_err,"%-14s pass phrase source\n","-pass "); sl@0: BIO_printf(bio_err,"%-14s encrypt\n","-e"); sl@0: BIO_printf(bio_err,"%-14s decrypt\n","-d"); sl@0: BIO_printf(bio_err,"%-14s base64 encode/decode, depending on encryption flag\n","-a/-base64"); sl@0: BIO_printf(bio_err,"%-14s passphrase is the next argument\n","-k"); sl@0: BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile"); sl@0: BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md"); sl@0: BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n",""); sl@0: BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv"); sl@0: BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]"); sl@0: BIO_printf(bio_err,"%-14s buffer size\n","-bufsize "); sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e"); sl@0: #endif sl@0: sl@0: BIO_printf(bio_err,"Cipher Types\n"); sl@0: OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH, sl@0: show_ciphers, sl@0: bio_err); sl@0: BIO_printf(bio_err,"\n"); sl@0: sl@0: goto end; sl@0: } sl@0: argc--; sl@0: argv++; sl@0: } sl@0: sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: e = setup_engine(bio_err, engine, 0); sl@0: #endif sl@0: sl@0: if (md && (dgst=EVP_get_digestbyname(md)) == NULL) sl@0: { sl@0: BIO_printf(bio_err,"%s is an unsupported message digest type\n",md); sl@0: goto end; sl@0: } sl@0: sl@0: if (dgst == NULL) sl@0: { sl@0: dgst = EVP_md5(); sl@0: } sl@0: sl@0: if (bufsize != NULL) sl@0: { sl@0: unsigned long n; sl@0: sl@0: for (n=0; *bufsize; bufsize++) sl@0: { sl@0: i= *bufsize; sl@0: if ((i <= '9') && (i >= '0')) sl@0: n=n*10+i-'0'; sl@0: else if (i == 'k') sl@0: { sl@0: n*=1024; sl@0: bufsize++; sl@0: break; sl@0: } sl@0: } sl@0: if (*bufsize != '\0') sl@0: { sl@0: BIO_printf(bio_err,"invalid 'bufsize' specified.\n"); sl@0: goto end; sl@0: } sl@0: sl@0: /* It must be large enough for a base64 encoded line */ sl@0: if (base64 && n < 80) n=80; sl@0: sl@0: bsize=(int)n; sl@0: if (verbose) BIO_printf(bio_err,"bufsize=%d\n",bsize); sl@0: } sl@0: sl@0: strbuf=OPENSSL_malloc(SIZE); sl@0: buff=(unsigned char *)OPENSSL_malloc(EVP_ENCODE_LENGTH(bsize)); sl@0: if ((buff == NULL) || (strbuf == NULL)) sl@0: { sl@0: BIO_printf(bio_err,"OPENSSL_malloc failure %ld\n",(long)EVP_ENCODE_LENGTH(bsize)); sl@0: goto end; sl@0: } sl@0: sl@0: in=BIO_new(BIO_s_file()); sl@0: out=BIO_new(BIO_s_file()); sl@0: if ((in == NULL) || (out == NULL)) sl@0: { sl@0: ERR_print_errors(bio_err); sl@0: goto end; sl@0: } sl@0: if (debug) sl@0: { sl@0: BIO_set_callback(in,BIO_debug_callback); sl@0: BIO_set_callback(out,BIO_debug_callback); sl@0: BIO_set_callback_arg(in,(char *)bio_err); sl@0: BIO_set_callback_arg(out,(char *)bio_err); sl@0: } sl@0: sl@0: if (inf == NULL) sl@0: { sl@0: if (bufsize != NULL) sl@0: setvbuf(stdin, (char *)NULL, _IONBF, 0); sl@0: BIO_set_fp(in,stdin,BIO_NOCLOSE); sl@0: } sl@0: else sl@0: { sl@0: if (BIO_read_filename(in,inf) <= 0) sl@0: { sl@0: perror(inf); sl@0: goto end; sl@0: } sl@0: } sl@0: sl@0: if(!str && passarg) { sl@0: if(!app_passwd(bio_err, passarg, NULL, &pass, NULL)) { sl@0: BIO_printf(bio_err, "Error getting password\n"); sl@0: goto end; sl@0: } sl@0: str = pass; sl@0: } sl@0: sl@0: if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) sl@0: { sl@0: for (;;) sl@0: { sl@0: char buf[200]; sl@0: sl@0: BIO_snprintf(buf,sizeof buf,"enter %s %s password:", sl@0: OBJ_nid2ln(EVP_CIPHER_nid(cipher)), sl@0: (enc)?"encryption":"decryption"); sl@0: strbuf[0]='\0'; sl@0: i=EVP_read_pw_string((char *)strbuf,SIZE,buf,enc); sl@0: if (i == 0) sl@0: { sl@0: if (strbuf[0] == '\0') sl@0: { sl@0: ret=1; sl@0: goto end; sl@0: } sl@0: str=strbuf; sl@0: break; sl@0: } sl@0: if (i < 0) sl@0: { sl@0: BIO_printf(bio_err,"bad password read\n"); sl@0: goto end; sl@0: } sl@0: } sl@0: } sl@0: sl@0: sl@0: if (outf == NULL) sl@0: { sl@0: BIO_set_fp(out,stdout,BIO_NOCLOSE); sl@0: if (bufsize != NULL) sl@0: setvbuf(stdout, (char *)NULL, _IONBF, 0); sl@0: #ifdef OPENSSL_SYS_VMS sl@0: { sl@0: BIO *tmpbio = BIO_new(BIO_f_linebuffer()); sl@0: out = BIO_push(tmpbio, out); sl@0: } sl@0: #endif sl@0: } sl@0: else sl@0: { sl@0: if (BIO_write_filename(out,outf) <= 0) sl@0: { sl@0: perror(outf); sl@0: goto end; sl@0: } sl@0: } sl@0: sl@0: rbio=in; sl@0: wbio=out; sl@0: sl@0: if (base64) sl@0: { sl@0: if ((b64=BIO_new(BIO_f_base64())) == NULL) sl@0: goto end; sl@0: if (debug) sl@0: { sl@0: BIO_set_callback(b64,BIO_debug_callback); sl@0: BIO_set_callback_arg(b64,(char *)bio_err); sl@0: } sl@0: if (olb64) sl@0: BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); sl@0: if (enc) sl@0: wbio=BIO_push(b64,wbio); sl@0: else sl@0: rbio=BIO_push(b64,rbio); sl@0: } sl@0: sl@0: if (cipher != NULL) sl@0: { sl@0: /* Note that str is NULL if a key was passed on the command sl@0: * line, so we get no salt in that case. Is this a bug? sl@0: */ sl@0: if (str != NULL) sl@0: { sl@0: /* Salt handling: if encrypting generate a salt and sl@0: * write to output BIO. If decrypting read salt from sl@0: * input BIO. sl@0: */ sl@0: unsigned char *sptr; sl@0: if(nosalt) sptr = NULL; sl@0: else { sl@0: if(enc) { sl@0: if(hsalt) { sl@0: if(!set_hex(hsalt,salt,sizeof salt)) { sl@0: BIO_printf(bio_err, sl@0: "invalid hex salt value\n"); sl@0: goto end; sl@0: } sl@0: } else if (RAND_pseudo_bytes(salt, sizeof salt) < 0) sl@0: goto end; sl@0: /* If -P option then don't bother writing */ sl@0: if((printkey != 2) sl@0: && (BIO_write(wbio,magic, sl@0: sizeof magic-1) != sizeof magic-1 sl@0: || BIO_write(wbio, sl@0: (char *)salt, sl@0: sizeof salt) != sizeof salt)) { sl@0: BIO_printf(bio_err,"error writing output file\n"); sl@0: goto end; sl@0: } sl@0: } else if(BIO_read(rbio,mbuf,sizeof mbuf) != sizeof mbuf sl@0: || BIO_read(rbio, sl@0: (unsigned char *)salt, sl@0: sizeof salt) != sizeof salt) { sl@0: BIO_printf(bio_err,"error reading input file\n"); sl@0: goto end; sl@0: } else if(memcmp(mbuf,magic,sizeof magic-1)) { sl@0: BIO_printf(bio_err,"bad magic number\n"); sl@0: goto end; sl@0: } sl@0: sl@0: sptr = salt; sl@0: } sl@0: sl@0: EVP_BytesToKey(cipher,dgst,sptr, sl@0: (unsigned char *)str, sl@0: strlen(str),1,key,iv); sl@0: /* zero the complete buffer or the string sl@0: * passed from the command line sl@0: * bug picked up by sl@0: * Larry J. Hughes Jr. */ sl@0: if (str == strbuf) sl@0: OPENSSL_cleanse(str,SIZE); sl@0: else sl@0: OPENSSL_cleanse(str,strlen(str)); sl@0: } sl@0: if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv)) sl@0: { sl@0: BIO_printf(bio_err,"invalid hex iv value\n"); sl@0: goto end; sl@0: } sl@0: if ((hiv == NULL) && (str == NULL)) sl@0: { sl@0: /* No IV was explicitly set and no IV was generated sl@0: * during EVP_BytesToKey. Hence the IV is undefined, sl@0: * making correct decryption impossible. */ sl@0: BIO_printf(bio_err, "iv undefined\n"); sl@0: goto end; sl@0: } sl@0: if ((hkey != NULL) && !set_hex(hkey,key,sizeof key)) sl@0: { sl@0: BIO_printf(bio_err,"invalid hex key value\n"); sl@0: goto end; sl@0: } sl@0: sl@0: if ((benc=BIO_new(BIO_f_cipher())) == NULL) sl@0: goto end; sl@0: sl@0: /* Since we may be changing parameters work on the encryption sl@0: * context rather than calling BIO_set_cipher(). sl@0: */ sl@0: sl@0: BIO_get_cipher_ctx(benc, &ctx); sl@0: if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc)) sl@0: { sl@0: BIO_printf(bio_err, "Error setting cipher %s\n", sl@0: EVP_CIPHER_name(cipher)); sl@0: ERR_print_errors(bio_err); sl@0: goto end; sl@0: } sl@0: sl@0: if (nopad) sl@0: EVP_CIPHER_CTX_set_padding(ctx, 0); sl@0: sl@0: if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc)) sl@0: { sl@0: BIO_printf(bio_err, "Error setting cipher %s\n", sl@0: EVP_CIPHER_name(cipher)); sl@0: ERR_print_errors(bio_err); sl@0: goto end; sl@0: } sl@0: sl@0: if (debug) sl@0: { sl@0: BIO_set_callback(benc,BIO_debug_callback); sl@0: BIO_set_callback_arg(benc,(char *)bio_err); sl@0: } sl@0: sl@0: if (printkey) sl@0: { sl@0: if (!nosalt) sl@0: { sl@0: printf("salt="); sl@0: for (i=0; i<(int)sizeof(salt); i++) sl@0: printf("%02X",salt[i]); sl@0: printf("\n"); sl@0: } sl@0: if (cipher->key_len > 0) sl@0: { sl@0: printf("key="); sl@0: for (i=0; ikey_len; i++) sl@0: printf("%02X",key[i]); sl@0: printf("\n"); sl@0: } sl@0: if (cipher->iv_len > 0) sl@0: { sl@0: printf("iv ="); sl@0: for (i=0; iiv_len; i++) sl@0: printf("%02X",iv[i]); sl@0: printf("\n"); sl@0: } sl@0: if (printkey == 2) sl@0: { sl@0: ret=0; sl@0: goto end; sl@0: } sl@0: sl@0: sl@0: } sl@0: } sl@0: sl@0: /* Only encrypt/decrypt as we write the file */ sl@0: if (benc != NULL) sl@0: wbio=BIO_push(benc,wbio); sl@0: sl@0: for (;;) sl@0: { sl@0: inl=BIO_read(rbio,(char *)buff,bsize); sl@0: if (inl <= 0) break; sl@0: if (BIO_write(wbio,(char *)buff,inl) != inl) sl@0: { sl@0: BIO_printf(bio_err,"error writing output file\n"); sl@0: goto end; sl@0: } sl@0: } sl@0: if (!BIO_flush(wbio)) sl@0: { sl@0: BIO_printf(bio_err,"bad decrypt\n"); sl@0: goto end; sl@0: } sl@0: sl@0: ret=0; sl@0: if (verbose) sl@0: { sl@0: BIO_printf(bio_err,"bytes read :%8ld\n",BIO_number_read(in)); sl@0: BIO_printf(bio_err,"bytes written:%8ld\n",BIO_number_written(out)); sl@0: } sl@0: end: sl@0: ERR_print_errors(bio_err); sl@0: if (strbuf != NULL) OPENSSL_free(strbuf); sl@0: if (buff != NULL) OPENSSL_free(buff); sl@0: if (in != NULL) BIO_free(in); sl@0: if (out != NULL) BIO_free_all(out); sl@0: if (benc != NULL) BIO_free(benc); sl@0: if (b64 != NULL) BIO_free(b64); sl@0: if(pass) OPENSSL_free(pass); sl@0: apps_shutdown(); sl@0: OPENSSL_EXIT(ret); sl@0: } sl@0: sl@0: int set_hex(char *in, unsigned char *out, int size) sl@0: { sl@0: int i,n; sl@0: unsigned char j; sl@0: sl@0: n=strlen(in); sl@0: if (n > (size*2)) sl@0: { sl@0: BIO_printf(bio_err,"hex string is too long\n"); sl@0: return(0); sl@0: } sl@0: memset(out,0,size); sl@0: for (i=0; i= '0') && (j <= '9')) sl@0: j-='0'; sl@0: else if ((j >= 'A') && (j <= 'F')) sl@0: j=j-'A'+10; sl@0: else if ((j >= 'a') && (j <= 'f')) sl@0: j=j-'a'+10; sl@0: else sl@0: { sl@0: BIO_printf(bio_err,"non-hex digit\n"); sl@0: return(0); sl@0: } sl@0: if (i&1) sl@0: out[i/2]|=j; sl@0: else sl@0: out[i/2]=(j<<4); sl@0: } sl@0: return(1); sl@0: }