You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

250 lines
6.7 KiB

  1. // Code by: B-Con (http://b-con.us)
  2. // Released under the GNU GPL
  3. // MD5 Hash Digest implementation (little endian byte order)
  4. #include <cstring>
  5. #include <cstdio>
  6. #include <md5_hash.h>
  7. // DBL_INT_ADD treats two unsigned ints a and b as one 64-bit integer and adds c to it
  8. #define DBL_INT_ADD(a,b,c) if (a > 0xffffffff - c) ++b; a += c;
  9. #define ROTLEFT(a,b) ((a << b) | (a >> (32-b)))
  10. #define F(x,y,z) ((x & y) | (~x & z))
  11. #define G(x,y,z) ((x & z) | (y & ~z))
  12. #define H(x,y,z) (x ^ y ^ z)
  13. #define I(x,y,z) (y ^ (x | ~z))
  14. #define FF(a,b,c,d,m,s,t) { a += F(b,c,d) + m + t; \
  15. a = b + ROTLEFT(a,s); }
  16. #define GG(a,b,c,d,m,s,t) { a += G(b,c,d) + m + t; \
  17. a = b + ROTLEFT(a,s); }
  18. #define HH(a,b,c,d,m,s,t) { a += H(b,c,d) + m + t; \
  19. a = b + ROTLEFT(a,s); }
  20. #define II(a,b,c,d,m,s,t) { a += I(b,c,d) + m + t; \
  21. a = b + ROTLEFT(a,s); }
  22. MD5_HASH::MD5_HASH()
  23. {
  24. Init();
  25. }
  26. MD5_HASH::MD5_HASH( const MD5_HASH& aOther )
  27. {
  28. m_valid = aOther.m_valid;
  29. m_ctx = aOther.m_ctx;
  30. memcpy( m_hash, aOther.m_hash, 16 );
  31. }
  32. MD5_HASH::~MD5_HASH()
  33. {
  34. }
  35. MD5_HASH& MD5_HASH::operator=( const MD5_HASH& aOther )
  36. {
  37. m_valid = aOther.m_valid;
  38. m_ctx = aOther.m_ctx;
  39. memcpy( m_hash, aOther.m_hash, 16 );
  40. return *this;
  41. }
  42. void MD5_HASH::Init()
  43. {
  44. //printf("%p init\n", this);
  45. m_valid = false;
  46. md5_init(&m_ctx);
  47. }
  48. void MD5_HASH::Hash ( uint8_t *data, uint32_t length )
  49. {
  50. md5_update(&m_ctx, data, length);
  51. }
  52. void MD5_HASH::Hash ( int value )
  53. {
  54. md5_update(&m_ctx, (uint8_t*) &value, sizeof(int) );
  55. }
  56. void MD5_HASH::Finalize()
  57. {
  58. //printf("%p final\n", this);
  59. md5_final(&m_ctx, m_hash);
  60. m_valid = true;
  61. }
  62. bool MD5_HASH::operator==( const MD5_HASH& aOther ) const
  63. {
  64. return ( memcmp( m_hash, aOther.m_hash, 16 ) == 0 );
  65. }
  66. bool MD5_HASH::operator!=( const MD5_HASH& aOther ) const
  67. {
  68. return ( memcmp( m_hash, aOther.m_hash, 16 ) != 0 );
  69. }
  70. void MD5_HASH::md5_transform(MD5_CTX *ctx, uint8_t data[])
  71. {
  72. uint32_t a,b,c,d,m[16],i,j;
  73. // MD5 specifies big endian byte order, but this implementation assumes a little
  74. // endian byte order CPU. Reverse all the bytes upon input, and re-reverse them
  75. // on output (in md5_final()).
  76. for (i=0,j=0; i < 16; ++i, j += 4)
  77. m[i] = (data[j]) + (data[j+1] << 8) + (data[j+2] << 16) + (data[j+3] << 24);
  78. a = ctx->state[0];
  79. b = ctx->state[1];
  80. c = ctx->state[2];
  81. d = ctx->state[3];
  82. FF(a,b,c,d,m[0], 7,0xd76aa478);
  83. FF(d,a,b,c,m[1], 12,0xe8c7b756);
  84. FF(c,d,a,b,m[2], 17,0x242070db);
  85. FF(b,c,d,a,m[3], 22,0xc1bdceee);
  86. FF(a,b,c,d,m[4], 7,0xf57c0faf);
  87. FF(d,a,b,c,m[5], 12,0x4787c62a);
  88. FF(c,d,a,b,m[6], 17,0xa8304613);
  89. FF(b,c,d,a,m[7], 22,0xfd469501);
  90. FF(a,b,c,d,m[8], 7,0x698098d8);
  91. FF(d,a,b,c,m[9], 12,0x8b44f7af);
  92. FF(c,d,a,b,m[10],17,0xffff5bb1);
  93. FF(b,c,d,a,m[11],22,0x895cd7be);
  94. FF(a,b,c,d,m[12], 7,0x6b901122);
  95. FF(d,a,b,c,m[13],12,0xfd987193);
  96. FF(c,d,a,b,m[14],17,0xa679438e);
  97. FF(b,c,d,a,m[15],22,0x49b40821);
  98. GG(a,b,c,d,m[1], 5,0xf61e2562);
  99. GG(d,a,b,c,m[6], 9,0xc040b340);
  100. GG(c,d,a,b,m[11],14,0x265e5a51);
  101. GG(b,c,d,a,m[0], 20,0xe9b6c7aa);
  102. GG(a,b,c,d,m[5], 5,0xd62f105d);
  103. GG(d,a,b,c,m[10], 9,0x02441453);
  104. GG(c,d,a,b,m[15],14,0xd8a1e681);
  105. GG(b,c,d,a,m[4], 20,0xe7d3fbc8);
  106. GG(a,b,c,d,m[9], 5,0x21e1cde6);
  107. GG(d,a,b,c,m[14], 9,0xc33707d6);
  108. GG(c,d,a,b,m[3], 14,0xf4d50d87);
  109. GG(b,c,d,a,m[8], 20,0x455a14ed);
  110. GG(a,b,c,d,m[13], 5,0xa9e3e905);
  111. GG(d,a,b,c,m[2], 9,0xfcefa3f8);
  112. GG(c,d,a,b,m[7], 14,0x676f02d9);
  113. GG(b,c,d,a,m[12],20,0x8d2a4c8a);
  114. HH(a,b,c,d,m[5], 4,0xfffa3942);
  115. HH(d,a,b,c,m[8], 11,0x8771f681);
  116. HH(c,d,a,b,m[11],16,0x6d9d6122);
  117. HH(b,c,d,a,m[14],23,0xfde5380c);
  118. HH(a,b,c,d,m[1], 4,0xa4beea44);
  119. HH(d,a,b,c,m[4], 11,0x4bdecfa9);
  120. HH(c,d,a,b,m[7], 16,0xf6bb4b60);
  121. HH(b,c,d,a,m[10],23,0xbebfbc70);
  122. HH(a,b,c,d,m[13], 4,0x289b7ec6);
  123. HH(d,a,b,c,m[0], 11,0xeaa127fa);
  124. HH(c,d,a,b,m[3], 16,0xd4ef3085);
  125. HH(b,c,d,a,m[6], 23,0x04881d05);
  126. HH(a,b,c,d,m[9], 4,0xd9d4d039);
  127. HH(d,a,b,c,m[12],11,0xe6db99e5);
  128. HH(c,d,a,b,m[15],16,0x1fa27cf8);
  129. HH(b,c,d,a,m[2], 23,0xc4ac5665);
  130. II(a,b,c,d,m[0], 6,0xf4292244);
  131. II(d,a,b,c,m[7], 10,0x432aff97);
  132. II(c,d,a,b,m[14],15,0xab9423a7);
  133. II(b,c,d,a,m[5], 21,0xfc93a039);
  134. II(a,b,c,d,m[12], 6,0x655b59c3);
  135. II(d,a,b,c,m[3], 10,0x8f0ccc92);
  136. II(c,d,a,b,m[10],15,0xffeff47d);
  137. II(b,c,d,a,m[1], 21,0x85845dd1);
  138. II(a,b,c,d,m[8], 6,0x6fa87e4f);
  139. II(d,a,b,c,m[15],10,0xfe2ce6e0);
  140. II(c,d,a,b,m[6], 15,0xa3014314);
  141. II(b,c,d,a,m[13],21,0x4e0811a1);
  142. II(a,b,c,d,m[4], 6,0xf7537e82);
  143. II(d,a,b,c,m[11],10,0xbd3af235);
  144. II(c,d,a,b,m[2], 15,0x2ad7d2bb);
  145. II(b,c,d,a,m[9], 21,0xeb86d391);
  146. ctx->state[0] += a;
  147. ctx->state[1] += b;
  148. ctx->state[2] += c;
  149. ctx->state[3] += d;
  150. }
  151. void MD5_HASH::md5_init(MD5_CTX *ctx)
  152. {
  153. ctx->datalen = 0;
  154. ctx->bitlen[0] = 0;
  155. ctx->bitlen[1] = 0;
  156. ctx->state[0] = 0x67452301;
  157. ctx->state[1] = 0xEFCDAB89;
  158. ctx->state[2] = 0x98BADCFE;
  159. ctx->state[3] = 0x10325476;
  160. }
  161. void MD5_HASH::md5_update(MD5_CTX *ctx, uint8_t data[], uint32_t len)
  162. {
  163. uint32_t i;
  164. for (i=0; i < len; ++i) {
  165. ctx->data[ctx->datalen] = data[i];
  166. ctx->datalen++;
  167. if (ctx->datalen == 64) {
  168. md5_transform(ctx,ctx->data);
  169. DBL_INT_ADD(ctx->bitlen[0],ctx->bitlen[1],512);
  170. ctx->datalen = 0;
  171. }
  172. }
  173. }
  174. void MD5_HASH::md5_final(MD5_CTX *ctx, uint8_t hash[])
  175. {
  176. uint32_t i;
  177. i = ctx->datalen;
  178. // Pad whatever data is left in the buffer.
  179. if (ctx->datalen < 56) {
  180. ctx->data[i++] = 0x80;
  181. while (i < 56)
  182. ctx->data[i++] = 0x00;
  183. }
  184. else if (ctx->datalen >= 56) {
  185. ctx->data[i++] = 0x80;
  186. while (i < 64)
  187. ctx->data[i++] = 0x00;
  188. md5_transform(ctx,ctx->data);
  189. memset(ctx->data,0,56);
  190. }
  191. // Append to the padding the total message's length in bits and transform.
  192. DBL_INT_ADD(ctx->bitlen[0],ctx->bitlen[1],8 * ctx->datalen);
  193. ctx->data[56] = ctx->bitlen[0];
  194. ctx->data[57] = ctx->bitlen[0] >> 8;
  195. ctx->data[58] = ctx->bitlen[0] >> 16;
  196. ctx->data[59] = ctx->bitlen[0] >> 24;
  197. ctx->data[60] = ctx->bitlen[1];
  198. ctx->data[61] = ctx->bitlen[1] >> 8;
  199. ctx->data[62] = ctx->bitlen[1] >> 16;
  200. ctx->data[63] = ctx->bitlen[1] >> 24;
  201. md5_transform(ctx,ctx->data);
  202. // Since this implementation uses little endian byte ordering and MD uses big endian,
  203. // reverse all the bytes when copying the final state to the output hash.
  204. for (i=0; i < 4; ++i) {
  205. hash[i] = (ctx->state[0] >> (i*8)) & 0x000000ff;
  206. hash[i+4] = (ctx->state[1] >> (i*8)) & 0x000000ff;
  207. hash[i+8] = (ctx->state[2] >> (i*8)) & 0x000000ff;
  208. hash[i+12] = (ctx->state[3] >> (i*8)) & 0x000000ff;
  209. }
  210. }