Solar Designer wrote:
> Thank you for working on this!

OK, try the attached patch...

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
Index: apps/dgst.c
===================================================================
RCS file: /e/openssl/cvs/openssl/apps/dgst.c,v
retrieving revision 1.23.2.2
diff -u -r1.23.2.2 dgst.c
--- apps/dgst.c 2002/04/06 18:59:57     1.23.2.2
+++ apps/dgst.c 2002/04/24 14:39:06
@@ -73,8 +73,8 @@
 #undef PROG
 #define PROG   dgst_main
 
-void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
-               EVP_PKEY *key, unsigned char *sigin, int siglen);
+int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
+         EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title);
 
 int MAIN(int, char **);
 
@@ -319,22 +319,33 @@
        if (argc == 0)
                {
                BIO_set_fp(in,stdin,BIO_NOCLOSE);
-               do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf, siglen);
+               do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf, siglen,
+                     "");
                }
        else
                {
                name=OBJ_nid2sn(md->type);
                for (i=0; i<argc; i++)
                        {
+                       char *tmp,*tofree=NULL;
+
                        if (BIO_read_filename(in,argv[i]) <= 0)
                                {
                                perror(argv[i]);
                                err++;
                                continue;
+                               }
+                       if(!out_bin)
+                               {
+                               
+tmp=tofree=OPENSSL_malloc(strlen(name)+strlen(argv[i])+5);
+                               sprintf(tmp,"%s(%s)= ",name,argv[i]);
                                }
-                       if(!out_bin) BIO_printf(out, "%s(%s)= ",name,argv[i]);
-                       do_fp(out, buf,inp,separator, out_bin, sigkey, 
-                                                               sigbuf, siglen);
+                       else
+                               tmp="";
+                       err=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
+                                 siglen,tmp);
+                       if(tofree)
+                               OPENSSL_free(tofree);
                        (void)BIO_reset(bmd);
                        }
                }
@@ -353,8 +364,8 @@
        EXIT(err);
        }
 
-void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
-                       EVP_PKEY *key, unsigned char *sigin, int siglen)
+int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
+         EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title)
        {
        int len;
        int i;
@@ -362,21 +373,33 @@
        for (;;)
                {
                i=BIO_read(bp,(char *)buf,BUFSIZE);
-               if (i <= 0) break;
+               if(i < 0)
+                   {
+                       BIO_printf(bio_err, "Read Error\n");
+                       ERR_print_errors(bio_err);
+                       return 1;
+                       }
+               if (i == 0) break;
                }
        if(sigin)
                {
                EVP_MD_CTX *ctx;
                BIO_get_md_ctx(bp, &ctx);
                i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key); 
-               if(i > 0) BIO_printf(out, "Verified OK\n");
-               else if(i == 0) BIO_printf(out, "Verification Failure\n");
+               if(i > 0)
+                       BIO_printf(out, "Verified OK\n");
+               else if(i == 0)
+                       {
+                       BIO_printf(out, "Verification Failure\n");
+                       return 1;
+                       }
                else
                        {
                        BIO_printf(bio_err, "Error Verifying Data\n");
                        ERR_print_errors(bio_err);
+                       return 1;
                        }
-               return;
+               return 0;
                }
        if(key)
                {
@@ -386,7 +409,7 @@
                        {
                        BIO_printf(bio_err, "Error Signing Data\n");
                        ERR_print_errors(bio_err);
-                       return;
+                       return 1;
                        }
                }
        else
@@ -395,6 +418,7 @@
        if(binout) BIO_write(out, buf, len);
        else 
                {
+               BIO_write(out,title,strlen(title));
                for (i=0; i<len; i++)
                        {
                        if (sep && (i != 0))
@@ -403,5 +427,6 @@
                        }
                BIO_printf(out, "\n");
                }
+       return 0;
        }
Index: crypto/bio/bss_file.c
===================================================================
RCS file: /e/openssl/cvs/openssl/crypto/bio/bss_file.c,v
retrieving revision 1.14
diff -u -r1.14 bss_file.c
--- crypto/bio/bss_file.c       2002/01/24 16:15:00     1.14
+++ crypto/bio/bss_file.c       2002/04/24 14:39:07
@@ -162,6 +162,8 @@
        if (b->init && (out != NULL))
                {
                ret=fread(out,1,(int)outl,(FILE *)b->ptr);
+               if(ret == 0 && ferror((FILE *)b->ptr))
+                       ret=-1;
                }
        return(ret);
        }

Reply via email to