summaryrefslogtreecommitdiff
path: root/Userland/Utilities/checksum.cpp
blob: 5ac56e8cb47b3d2f78fc204fa79ec75039a47cbc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/*
 * Copyright (c) 2020-2021, Linus Groh <linusg@serenityos.org>
 *
 * SPDX-License-Identifier: BSD-2-Clause
 */

#include <AK/LexicalPath.h>
#include <LibCore/ArgsParser.h>
#include <LibCore/Stream.h>
#include <LibCore/System.h>
#include <LibCrypto/Hash/HashManager.h>
#include <LibMain/Main.h>
#include <unistd.h>

ErrorOr<int> serenity_main(Main::Arguments arguments)
{
    TRY(Core::System::pledge("stdio rpath"));

    auto program_name = LexicalPath::basename(arguments.strings[0]);
    auto hash_kind = Crypto::Hash::HashKind::None;

    if (program_name == "md5sum")
        hash_kind = Crypto::Hash::HashKind::MD5;
    else if (program_name == "sha1sum")
        hash_kind = Crypto::Hash::HashKind::SHA1;
    else if (program_name == "sha256sum")
        hash_kind = Crypto::Hash::HashKind::SHA256;
    else if (program_name == "sha512sum")
        hash_kind = Crypto::Hash::HashKind::SHA512;

    if (hash_kind == Crypto::Hash::HashKind::None) {
        warnln("Error: program must be executed as 'md5sum', 'sha1sum', 'sha256sum' or 'sha512sum'; got '{}'", program_name);
        exit(1);
    }

    auto hash_name = program_name.substring_view(0, program_name.length() - 3).to_deprecated_string().to_uppercase();
    auto paths_help_string = DeprecatedString::formatted("File(s) to print {} checksum of", hash_name);

    bool verify_from_paths = false;
    Vector<StringView> paths;

    Core::ArgsParser args_parser;
    args_parser.add_option(verify_from_paths, "Verify checksums from file(s)", "check", 'c');
    args_parser.add_positional_argument(paths, paths_help_string.characters(), "path", Core::ArgsParser::Required::No);
    args_parser.parse(arguments);

    if (paths.is_empty())
        paths.append("-"sv);

    Crypto::Hash::Manager hash;
    hash.initialize(hash_kind);

    bool has_error = false;
    int read_fail_count = 0;
    int failed_verification_count = 0;

    for (auto const& path : paths) {
        auto file_or_error = Core::Stream::File::open_file_or_standard_stream(path, Core::Stream::OpenMode::Read);
        if (file_or_error.is_error()) {
            ++read_fail_count;
            has_error = true;
            warnln("{}: {}", path, file_or_error.release_error());
            continue;
        }
        auto file = file_or_error.release_value();
        Array<u8, PAGE_SIZE> buffer;
        if (!verify_from_paths) {
            while (!file->is_eof())
                hash.update(TRY(file->read(buffer)));
            outln("{:hex-dump}  {}", hash.digest().bytes(), path);
        } else {
            StringBuilder checksum_list_contents;
            Array<u8, 1> checksum_list_buffer;
            while (!file->is_eof())
                checksum_list_contents.append(TRY(file->read(checksum_list_buffer)).data()[0]);
            Vector<StringView> const lines = checksum_list_contents.string_view().split_view("\n"sv);

            for (size_t i = 0; i < lines.size(); ++i) {
                Vector<StringView> const line = lines[i].split_view("  "sv);
                if (line.size() != 2) {
                    ++read_fail_count;
                    // The real line number is greater than the iterator.
                    warnln("{}: {}: Failed to parse line {}", program_name, path, i + 1);
                    continue;
                }

                // line[0] = checksum
                // line[1] = filename
                StringView const filename = line[1];
                auto file_from_filename_or_error = Core::Stream::File::open_file_or_standard_stream(filename, Core::Stream::OpenMode::Read);
                if (file_from_filename_or_error.is_error()) {
                    ++read_fail_count;
                    warnln("{}: {}", filename, file_from_filename_or_error.release_error());
                    continue;
                }
                auto file_from_filename = file_from_filename_or_error.release_value();
                hash.reset();
                while (!file_from_filename->is_eof())
                    hash.update(TRY(file_from_filename->read(buffer)));
                if (DeprecatedString::formatted("{:hex-dump}", hash.digest().bytes()) == line[0])
                    outln("{}: OK", filename);
                else {
                    ++failed_verification_count;
                    warnln("{}: FAILED", filename);
                }
            }
        }
    }
    // Print the warnings here in order to only print them once.
    if (verify_from_paths) {
        if (read_fail_count) {
            if (read_fail_count == 1)
                warnln("WARNING: 1 file could not be read");
            else
                warnln("WARNING: {} files could not be read", read_fail_count);
            has_error = true;
        }

        if (failed_verification_count) {
            if (failed_verification_count == 1)
                warnln("WARNING: 1 checksum did NOT match");
            else
                warnln("WARNING: {} checksums did NOT match", failed_verification_count);
            has_error = true;
        }
    }
    return has_error ? 1 : 0;
}