enc.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715
  1. /* apps/enc.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include <stdlib.h>
  60. #include <string.h>
  61. #include "apps.h"
  62. #include <openssl/bio.h>
  63. #include <openssl/err.h>
  64. #include <openssl/evp.h>
  65. #include <openssl/objects.h>
  66. #include <openssl/x509.h>
  67. #include <openssl/rand.h>
  68. #include <openssl/pem.h>
  69. #ifndef OPENSSL_NO_COMP
  70. # include <openssl/comp.h>
  71. #endif
  72. #include <ctype.h>
  73. int set_hex(char *in, unsigned char *out, int size);
  74. #undef SIZE
  75. #undef BSIZE
  76. #undef PROG
  77. #define SIZE (512)
  78. #define BSIZE (8*1024)
  79. #define PROG enc_main
  80. static void show_ciphers(const OBJ_NAME *name, void *bio_)
  81. {
  82. BIO *bio = bio_;
  83. static int n;
  84. if (!islower((unsigned char)*name->name))
  85. return;
  86. BIO_printf(bio, "-%-25s", name->name);
  87. if (++n == 3) {
  88. BIO_printf(bio, "\n");
  89. n = 0;
  90. } else
  91. BIO_printf(bio, " ");
  92. }
  93. int MAIN(int, char **);
  94. int MAIN(int argc, char **argv)
  95. {
  96. static const char magic[] = "Salted__";
  97. char mbuf[sizeof magic - 1];
  98. char *strbuf = NULL;
  99. unsigned char *buff = NULL, *bufsize = NULL;
  100. int bsize = BSIZE, verbose = 0;
  101. int ret = 1, inl;
  102. int nopad = 0;
  103. unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
  104. unsigned char salt[PKCS5_SALT_LEN];
  105. char *str = NULL, *passarg = NULL, *pass = NULL;
  106. char *hkey = NULL, *hiv = NULL, *hsalt = NULL;
  107. char *md = NULL;
  108. int enc = 1, printkey = 0, i, base64 = 0;
  109. #ifdef ZLIB
  110. int do_zlib = 0;
  111. BIO *bzl = NULL;
  112. #endif
  113. int debug = 0, olb64 = 0, nosalt = 0;
  114. const EVP_CIPHER *cipher = NULL, *c;
  115. EVP_CIPHER_CTX *ctx = NULL;
  116. char *inf = NULL, *outf = NULL;
  117. BIO *in = NULL, *out = NULL, *b64 = NULL, *benc = NULL, *rbio =
  118. NULL, *wbio = NULL;
  119. #define PROG_NAME_SIZE 39
  120. char pname[PROG_NAME_SIZE + 1];
  121. #ifndef OPENSSL_NO_ENGINE
  122. char *engine = NULL;
  123. #endif
  124. const EVP_MD *dgst = NULL;
  125. int non_fips_allow = 0;
  126. apps_startup();
  127. if (bio_err == NULL)
  128. if ((bio_err = BIO_new(BIO_s_file())) != NULL)
  129. BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
  130. if (!load_config(bio_err, NULL))
  131. goto end;
  132. /* first check the program name */
  133. program_name(argv[0], pname, sizeof pname);
  134. if (strcmp(pname, "base64") == 0)
  135. base64 = 1;
  136. #ifdef ZLIB
  137. if (strcmp(pname, "zlib") == 0)
  138. do_zlib = 1;
  139. #endif
  140. cipher = EVP_get_cipherbyname(pname);
  141. #ifdef ZLIB
  142. if (!do_zlib && !base64 && (cipher == NULL)
  143. && (strcmp(pname, "enc") != 0))
  144. #else
  145. if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0))
  146. #endif
  147. {
  148. BIO_printf(bio_err, "%s is an unknown cipher\n", pname);
  149. goto bad;
  150. }
  151. argc--;
  152. argv++;
  153. while (argc >= 1) {
  154. if (strcmp(*argv, "-e") == 0)
  155. enc = 1;
  156. else if (strcmp(*argv, "-in") == 0) {
  157. if (--argc < 1)
  158. goto bad;
  159. inf = *(++argv);
  160. } else if (strcmp(*argv, "-out") == 0) {
  161. if (--argc < 1)
  162. goto bad;
  163. outf = *(++argv);
  164. } else if (strcmp(*argv, "-pass") == 0) {
  165. if (--argc < 1)
  166. goto bad;
  167. passarg = *(++argv);
  168. }
  169. #ifndef OPENSSL_NO_ENGINE
  170. else if (strcmp(*argv, "-engine") == 0) {
  171. if (--argc < 1)
  172. goto bad;
  173. engine = *(++argv);
  174. }
  175. #endif
  176. else if (strcmp(*argv, "-d") == 0)
  177. enc = 0;
  178. else if (strcmp(*argv, "-p") == 0)
  179. printkey = 1;
  180. else if (strcmp(*argv, "-v") == 0)
  181. verbose = 1;
  182. else if (strcmp(*argv, "-nopad") == 0)
  183. nopad = 1;
  184. else if (strcmp(*argv, "-salt") == 0)
  185. nosalt = 0;
  186. else if (strcmp(*argv, "-nosalt") == 0)
  187. nosalt = 1;
  188. else if (strcmp(*argv, "-debug") == 0)
  189. debug = 1;
  190. else if (strcmp(*argv, "-P") == 0)
  191. printkey = 2;
  192. else if (strcmp(*argv, "-A") == 0)
  193. olb64 = 1;
  194. else if (strcmp(*argv, "-a") == 0)
  195. base64 = 1;
  196. else if (strcmp(*argv, "-base64") == 0)
  197. base64 = 1;
  198. #ifdef ZLIB
  199. else if (strcmp(*argv, "-z") == 0)
  200. do_zlib = 1;
  201. #endif
  202. else if (strcmp(*argv, "-bufsize") == 0) {
  203. if (--argc < 1)
  204. goto bad;
  205. bufsize = (unsigned char *)*(++argv);
  206. } else if (strcmp(*argv, "-k") == 0) {
  207. if (--argc < 1)
  208. goto bad;
  209. str = *(++argv);
  210. } else if (strcmp(*argv, "-kfile") == 0) {
  211. static char buf[128];
  212. FILE *infile;
  213. char *file;
  214. if (--argc < 1)
  215. goto bad;
  216. file = *(++argv);
  217. infile = fopen(file, "r");
  218. if (infile == NULL) {
  219. BIO_printf(bio_err, "unable to read key from '%s'\n", file);
  220. goto bad;
  221. }
  222. buf[0] = '\0';
  223. if (!fgets(buf, sizeof buf, infile)) {
  224. BIO_printf(bio_err, "unable to read key from '%s'\n", file);
  225. goto bad;
  226. }
  227. fclose(infile);
  228. i = strlen(buf);
  229. if ((i > 0) && ((buf[i - 1] == '\n') || (buf[i - 1] == '\r')))
  230. buf[--i] = '\0';
  231. if ((i > 0) && ((buf[i - 1] == '\n') || (buf[i - 1] == '\r')))
  232. buf[--i] = '\0';
  233. if (i < 1) {
  234. BIO_printf(bio_err, "zero length password\n");
  235. goto bad;
  236. }
  237. str = buf;
  238. } else if (strcmp(*argv, "-K") == 0) {
  239. if (--argc < 1)
  240. goto bad;
  241. hkey = *(++argv);
  242. } else if (strcmp(*argv, "-S") == 0) {
  243. if (--argc < 1)
  244. goto bad;
  245. hsalt = *(++argv);
  246. } else if (strcmp(*argv, "-iv") == 0) {
  247. if (--argc < 1)
  248. goto bad;
  249. hiv = *(++argv);
  250. } else if (strcmp(*argv, "-md") == 0) {
  251. if (--argc < 1)
  252. goto bad;
  253. md = *(++argv);
  254. } else if (strcmp(*argv, "-non-fips-allow") == 0)
  255. non_fips_allow = 1;
  256. else if ((argv[0][0] == '-') &&
  257. ((c = EVP_get_cipherbyname(&(argv[0][1]))) != NULL)) {
  258. cipher = c;
  259. } else if (strcmp(*argv, "-none") == 0)
  260. cipher = NULL;
  261. else {
  262. BIO_printf(bio_err, "unknown option '%s'\n", *argv);
  263. bad:
  264. BIO_printf(bio_err, "options are\n");
  265. BIO_printf(bio_err, "%-14s input file\n", "-in <file>");
  266. BIO_printf(bio_err, "%-14s output file\n", "-out <file>");
  267. BIO_printf(bio_err, "%-14s pass phrase source\n", "-pass <arg>");
  268. BIO_printf(bio_err, "%-14s encrypt\n", "-e");
  269. BIO_printf(bio_err, "%-14s decrypt\n", "-d");
  270. BIO_printf(bio_err,
  271. "%-14s base64 encode/decode, depending on encryption flag\n",
  272. "-a/-base64");
  273. BIO_printf(bio_err, "%-14s passphrase is the next argument\n",
  274. "-k");
  275. BIO_printf(bio_err,
  276. "%-14s passphrase is the first line of the file argument\n",
  277. "-kfile");
  278. BIO_printf(bio_err,
  279. "%-14s the next argument is the md to use to create a key\n",
  280. "-md");
  281. BIO_printf(bio_err,
  282. "%-14s from a passphrase. One of md2, md5, sha or sha1\n",
  283. "");
  284. BIO_printf(bio_err, "%-14s salt in hex is the next argument\n",
  285. "-S");
  286. BIO_printf(bio_err, "%-14s key/iv in hex is the next argument\n",
  287. "-K/-iv");
  288. BIO_printf(bio_err, "%-14s print the iv/key (then exit if -P)\n",
  289. "-[pP]");
  290. BIO_printf(bio_err, "%-14s buffer size\n", "-bufsize <n>");
  291. BIO_printf(bio_err, "%-14s disable standard block padding\n",
  292. "-nopad");
  293. #ifndef OPENSSL_NO_ENGINE
  294. BIO_printf(bio_err,
  295. "%-14s use engine e, possibly a hardware device.\n",
  296. "-engine e");
  297. #endif
  298. BIO_printf(bio_err, "Cipher Types\n");
  299. OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH,
  300. show_ciphers, bio_err);
  301. BIO_printf(bio_err, "\n");
  302. goto end;
  303. }
  304. argc--;
  305. argv++;
  306. }
  307. #ifndef OPENSSL_NO_ENGINE
  308. setup_engine(bio_err, engine, 0);
  309. #endif
  310. if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
  311. BIO_printf(bio_err,
  312. "AEAD ciphers not supported by the enc utility\n");
  313. goto end;
  314. }
  315. if (cipher && (EVP_CIPHER_mode(cipher) == EVP_CIPH_XTS_MODE)) {
  316. BIO_printf(bio_err,
  317. "Ciphers in XTS mode are not supported by the enc utility\n");
  318. goto end;
  319. }
  320. if (md && (dgst = EVP_get_digestbyname(md)) == NULL) {
  321. BIO_printf(bio_err, "%s is an unsupported message digest type\n", md);
  322. goto end;
  323. }
  324. if (dgst == NULL) {
  325. dgst = EVP_md5();
  326. }
  327. if (bufsize != NULL) {
  328. unsigned long n;
  329. for (n = 0; *bufsize; bufsize++) {
  330. i = *bufsize;
  331. if ((i <= '9') && (i >= '0'))
  332. n = n * 10 + i - '0';
  333. else if (i == 'k') {
  334. n *= 1024;
  335. bufsize++;
  336. break;
  337. }
  338. }
  339. if (*bufsize != '\0') {
  340. BIO_printf(bio_err, "invalid 'bufsize' specified.\n");
  341. goto end;
  342. }
  343. /* It must be large enough for a base64 encoded line */
  344. if (base64 && n < 80)
  345. n = 80;
  346. bsize = (int)n;
  347. if (verbose)
  348. BIO_printf(bio_err, "bufsize=%d\n", bsize);
  349. }
  350. strbuf = OPENSSL_malloc(SIZE);
  351. buff = (unsigned char *)OPENSSL_malloc(EVP_ENCODE_LENGTH(bsize));
  352. if ((buff == NULL) || (strbuf == NULL)) {
  353. BIO_printf(bio_err, "OPENSSL_malloc failure %ld\n",
  354. (long)EVP_ENCODE_LENGTH(bsize));
  355. goto end;
  356. }
  357. in = BIO_new(BIO_s_file());
  358. out = BIO_new(BIO_s_file());
  359. if ((in == NULL) || (out == NULL)) {
  360. ERR_print_errors(bio_err);
  361. goto end;
  362. }
  363. if (debug) {
  364. BIO_set_callback(in, BIO_debug_callback);
  365. BIO_set_callback(out, BIO_debug_callback);
  366. BIO_set_callback_arg(in, (char *)bio_err);
  367. BIO_set_callback_arg(out, (char *)bio_err);
  368. }
  369. if (inf == NULL) {
  370. #ifndef OPENSSL_NO_SETVBUF_IONBF
  371. if (bufsize != NULL)
  372. setvbuf(stdin, (char *)NULL, _IONBF, 0);
  373. #endif /* ndef OPENSSL_NO_SETVBUF_IONBF */
  374. BIO_set_fp(in, stdin, BIO_NOCLOSE);
  375. } else {
  376. if (BIO_read_filename(in, inf) <= 0) {
  377. perror(inf);
  378. goto end;
  379. }
  380. }
  381. if (!str && passarg) {
  382. if (!app_passwd(bio_err, passarg, NULL, &pass, NULL)) {
  383. BIO_printf(bio_err, "Error getting password\n");
  384. goto end;
  385. }
  386. str = pass;
  387. }
  388. if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) {
  389. for (;;) {
  390. char buf[200];
  391. BIO_snprintf(buf, sizeof buf, "enter %s %s password:",
  392. OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
  393. (enc) ? "encryption" : "decryption");
  394. strbuf[0] = '\0';
  395. i = EVP_read_pw_string((char *)strbuf, SIZE, buf, enc);
  396. if (i == 0) {
  397. if (strbuf[0] == '\0') {
  398. ret = 1;
  399. goto end;
  400. }
  401. str = strbuf;
  402. break;
  403. }
  404. if (i < 0) {
  405. BIO_printf(bio_err, "bad password read\n");
  406. goto end;
  407. }
  408. }
  409. }
  410. if (outf == NULL) {
  411. BIO_set_fp(out, stdout, BIO_NOCLOSE);
  412. #ifndef OPENSSL_NO_SETVBUF_IONBF
  413. if (bufsize != NULL)
  414. setvbuf(stdout, (char *)NULL, _IONBF, 0);
  415. #endif /* ndef OPENSSL_NO_SETVBUF_IONBF */
  416. #ifdef OPENSSL_SYS_VMS
  417. {
  418. BIO *tmpbio = BIO_new(BIO_f_linebuffer());
  419. out = BIO_push(tmpbio, out);
  420. }
  421. #endif
  422. } else {
  423. if (BIO_write_filename(out, outf) <= 0) {
  424. perror(outf);
  425. goto end;
  426. }
  427. }
  428. rbio = in;
  429. wbio = out;
  430. #ifdef ZLIB
  431. if (do_zlib) {
  432. if ((bzl = BIO_new(BIO_f_zlib())) == NULL)
  433. goto end;
  434. if (enc)
  435. wbio = BIO_push(bzl, wbio);
  436. else
  437. rbio = BIO_push(bzl, rbio);
  438. }
  439. #endif
  440. if (base64) {
  441. if ((b64 = BIO_new(BIO_f_base64())) == NULL)
  442. goto end;
  443. if (debug) {
  444. BIO_set_callback(b64, BIO_debug_callback);
  445. BIO_set_callback_arg(b64, (char *)bio_err);
  446. }
  447. if (olb64)
  448. BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
  449. if (enc)
  450. wbio = BIO_push(b64, wbio);
  451. else
  452. rbio = BIO_push(b64, rbio);
  453. }
  454. if (cipher != NULL) {
  455. /*
  456. * Note that str is NULL if a key was passed on the command line, so
  457. * we get no salt in that case. Is this a bug?
  458. */
  459. if (str != NULL) {
  460. /*
  461. * Salt handling: if encrypting generate a salt and write to
  462. * output BIO. If decrypting read salt from input BIO.
  463. */
  464. unsigned char *sptr;
  465. if (nosalt)
  466. sptr = NULL;
  467. else {
  468. if (enc) {
  469. if (hsalt) {
  470. if (!set_hex(hsalt, salt, sizeof salt)) {
  471. BIO_printf(bio_err, "invalid hex salt value\n");
  472. goto end;
  473. }
  474. } else if (RAND_pseudo_bytes(salt, sizeof salt) < 0)
  475. goto end;
  476. /*
  477. * If -P option then don't bother writing
  478. */
  479. if ((printkey != 2)
  480. && (BIO_write(wbio, magic,
  481. sizeof magic - 1) != sizeof magic - 1
  482. || BIO_write(wbio,
  483. (char *)salt,
  484. sizeof salt) != sizeof salt)) {
  485. BIO_printf(bio_err, "error writing output file\n");
  486. goto end;
  487. }
  488. } else if (BIO_read(rbio, mbuf, sizeof mbuf) != sizeof mbuf
  489. || BIO_read(rbio,
  490. (unsigned char *)salt,
  491. sizeof salt) != sizeof salt) {
  492. BIO_printf(bio_err, "error reading input file\n");
  493. goto end;
  494. } else if (memcmp(mbuf, magic, sizeof magic - 1)) {
  495. BIO_printf(bio_err, "bad magic number\n");
  496. goto end;
  497. }
  498. sptr = salt;
  499. }
  500. EVP_BytesToKey(cipher, dgst, sptr,
  501. (unsigned char *)str, strlen(str), 1, key, iv);
  502. /*
  503. * zero the complete buffer or the string passed from the command
  504. * line bug picked up by Larry J. Hughes Jr. <hughes@indiana.edu>
  505. */
  506. if (str == strbuf)
  507. OPENSSL_cleanse(str, SIZE);
  508. else
  509. OPENSSL_cleanse(str, strlen(str));
  510. }
  511. if (hiv != NULL) {
  512. int siz = EVP_CIPHER_iv_length(cipher);
  513. if (siz == 0) {
  514. BIO_printf(bio_err, "warning: iv not use by this cipher\n");
  515. } else if (!set_hex(hiv, iv, sizeof iv)) {
  516. BIO_printf(bio_err, "invalid hex iv value\n");
  517. goto end;
  518. }
  519. }
  520. if ((hiv == NULL) && (str == NULL)
  521. && EVP_CIPHER_iv_length(cipher) != 0) {
  522. /*
  523. * No IV was explicitly set and no IV was generated during
  524. * EVP_BytesToKey. Hence the IV is undefined, making correct
  525. * decryption impossible.
  526. */
  527. BIO_printf(bio_err, "iv undefined\n");
  528. goto end;
  529. }
  530. if ((hkey != NULL) && !set_hex(hkey, key, EVP_CIPHER_key_length(cipher))) {
  531. BIO_printf(bio_err, "invalid hex key value\n");
  532. goto end;
  533. }
  534. if ((benc = BIO_new(BIO_f_cipher())) == NULL)
  535. goto end;
  536. /*
  537. * Since we may be changing parameters work on the encryption context
  538. * rather than calling BIO_set_cipher().
  539. */
  540. BIO_get_cipher_ctx(benc, &ctx);
  541. if (non_fips_allow)
  542. EVP_CIPHER_CTX_set_flags(ctx, EVP_CIPH_FLAG_NON_FIPS_ALLOW);
  543. if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc)) {
  544. BIO_printf(bio_err, "Error setting cipher %s\n",
  545. EVP_CIPHER_name(cipher));
  546. ERR_print_errors(bio_err);
  547. goto end;
  548. }
  549. if (nopad)
  550. EVP_CIPHER_CTX_set_padding(ctx, 0);
  551. if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc)) {
  552. BIO_printf(bio_err, "Error setting cipher %s\n",
  553. EVP_CIPHER_name(cipher));
  554. ERR_print_errors(bio_err);
  555. goto end;
  556. }
  557. if (debug) {
  558. BIO_set_callback(benc, BIO_debug_callback);
  559. BIO_set_callback_arg(benc, (char *)bio_err);
  560. }
  561. if (printkey) {
  562. if (!nosalt) {
  563. printf("salt=");
  564. for (i = 0; i < (int)sizeof(salt); i++)
  565. printf("%02X", salt[i]);
  566. printf("\n");
  567. }
  568. if (cipher->key_len > 0) {
  569. printf("key=");
  570. for (i = 0; i < cipher->key_len; i++)
  571. printf("%02X", key[i]);
  572. printf("\n");
  573. }
  574. if (cipher->iv_len > 0) {
  575. printf("iv =");
  576. for (i = 0; i < cipher->iv_len; i++)
  577. printf("%02X", iv[i]);
  578. printf("\n");
  579. }
  580. if (printkey == 2) {
  581. ret = 0;
  582. goto end;
  583. }
  584. }
  585. }
  586. /* Only encrypt/decrypt as we write the file */
  587. if (benc != NULL)
  588. wbio = BIO_push(benc, wbio);
  589. for (;;) {
  590. inl = BIO_read(rbio, (char *)buff, bsize);
  591. if (inl <= 0)
  592. break;
  593. if (BIO_write(wbio, (char *)buff, inl) != inl) {
  594. BIO_printf(bio_err, "error writing output file\n");
  595. goto end;
  596. }
  597. }
  598. if (!BIO_flush(wbio)) {
  599. BIO_printf(bio_err, "bad decrypt\n");
  600. goto end;
  601. }
  602. ret = 0;
  603. if (verbose) {
  604. BIO_printf(bio_err, "bytes read :%8ld\n", BIO_number_read(in));
  605. BIO_printf(bio_err, "bytes written:%8ld\n", BIO_number_written(out));
  606. }
  607. end:
  608. ERR_print_errors(bio_err);
  609. if (strbuf != NULL)
  610. OPENSSL_free(strbuf);
  611. if (buff != NULL)
  612. OPENSSL_free(buff);
  613. if (in != NULL)
  614. BIO_free(in);
  615. if (out != NULL)
  616. BIO_free_all(out);
  617. if (benc != NULL)
  618. BIO_free(benc);
  619. if (b64 != NULL)
  620. BIO_free(b64);
  621. #ifdef ZLIB
  622. if (bzl != NULL)
  623. BIO_free(bzl);
  624. #endif
  625. if (pass)
  626. OPENSSL_free(pass);
  627. apps_shutdown();
  628. OPENSSL_EXIT(ret);
  629. }
  630. int set_hex(char *in, unsigned char *out, int size)
  631. {
  632. int i, n;
  633. unsigned char j;
  634. n = strlen(in);
  635. if (n > (size * 2)) {
  636. BIO_printf(bio_err, "hex string is too long\n");
  637. return (0);
  638. }
  639. memset(out, 0, size);
  640. for (i = 0; i < n; i++) {
  641. j = (unsigned char)*in;
  642. *(in++) = '\0';
  643. if (j == 0)
  644. break;
  645. if ((j >= '0') && (j <= '9'))
  646. j -= '0';
  647. else if ((j >= 'A') && (j <= 'F'))
  648. j = j - 'A' + 10;
  649. else if ((j >= 'a') && (j <= 'f'))
  650. j = j - 'a' + 10;
  651. else {
  652. BIO_printf(bio_err, "non-hex digit\n");
  653. return (0);
  654. }
  655. if (i & 1)
  656. out[i / 2] |= j;
  657. else
  658. out[i / 2] = (j << 4);
  659. }
  660. return (1);
  661. }