]> jfr.im git - irc/evilnet/x3.git/blame - src/md5.c
Initial revision
[irc/evilnet/x3.git] / src / md5.c
CommitLineData
d76ed9a9 1/* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm */
2
3/* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
4rights reserved.
5
6License to copy and use this software is granted provided that it
7is identified as the "RSA Data Security, Inc. MD5 Message-Digest
8Algorithm" in all material mentioning or referencing this software
9or this function.
10
11License is also granted to make and use derivative works provided
12that such works are identified as "derived from the RSA Data
13Security, Inc. MD5 Message-Digest Algorithm" in all material
14mentioning or referencing the derived work.
15
16RSA Data Security, Inc. makes no representations concerning either
17the merchantability of this software or the suitability of this
18software for any particular purpose. It is provided "as is"
19without express or implied warranty of any kind.
20
21These notices must be retained in any copies of any part of this
22documentation and/or software.
23 */
24
25#include "common.h"
26#include "md5.h"
27
28/* Constants for MD5Transform routine.
29 */
30#define S11 7
31#define S12 12
32#define S13 17
33#define S14 22
34#define S21 5
35#define S22 9
36#define S23 14
37#define S24 20
38#define S31 4
39#define S32 11
40#define S33 16
41#define S34 23
42#define S41 6
43#define S42 10
44#define S43 15
45#define S44 21
46
47static void MD5Transform PROTO_LIST ((UINT4 [4], unsigned char [64]));
48static void Encode PROTO_LIST
49 ((unsigned char *, UINT4 *, unsigned int));
50static void Decode PROTO_LIST
51 ((UINT4 *, unsigned char *, unsigned int));
52
53static unsigned char PADDING[64] = {
54 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
55 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
56 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
57};
58
59/* F, G, H and I are basic MD5 functions.
60 */
61#define F(x, y, z) (((x) & (y)) | ((~x) & (z)))
62#define G(x, y, z) (((x) & (z)) | ((y) & (~z)))
63#define H(x, y, z) ((x) ^ (y) ^ (z))
64#define I(x, y, z) ((y) ^ ((x) | (~z)))
65
66/* ROTATE_LEFT rotates x left n bits. */
67#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n))))
68
69/* FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4.
70Rotation is separate from addition to prevent recomputation.
71 */
72#define FF(a, b, c, d, x, s, ac) { \
73 (a) += F ((b), (c), (d)) + (x) + (UINT4)(ac); \
74 (a) = ROTATE_LEFT ((a), (s)); \
75 (a) += (b); \
76 }
77#define GG(a, b, c, d, x, s, ac) { \
78 (a) += G ((b), (c), (d)) + (x) + (UINT4)(ac); \
79 (a) = ROTATE_LEFT ((a), (s)); \
80 (a) += (b); \
81 }
82#define HH(a, b, c, d, x, s, ac) { \
83 (a) += H ((b), (c), (d)) + (x) + (UINT4)(ac); \
84 (a) = ROTATE_LEFT ((a), (s)); \
85 (a) += (b); \
86 }
87#define II(a, b, c, d, x, s, ac) { \
88 (a) += I ((b), (c), (d)) + (x) + (UINT4)(ac); \
89 (a) = ROTATE_LEFT ((a), (s)); \
90 (a) += (b); \
91 }
92
93/* MD5 initialization. Begins an MD5 operation, writing a new context. */
94void MD5Init (context)
95MD5_CTX *context; /* context */
96{
97 context->count[0] = context->count[1] = 0;
98 /* Load magic initialization constants. */
99 context->state[0] = 0x67452301;
100 context->state[1] = 0xefcdab89;
101 context->state[2] = 0x98badcfe;
102 context->state[3] = 0x10325476;
103}
104
105/* MD5 block update operation. Continues an MD5 message-digest
106 operation, processing another message block, and updating the
107 context.
108 */
109void MD5Update (context, input, inputLen)
110MD5_CTX *context; /* context */
111unsigned char *input; /* input block */
112unsigned int inputLen; /* length of input block */
113{
114 unsigned int i, index, partLen;
115
116 /* Compute number of bytes mod 64 */
117 index = (unsigned int)((context->count[0] >> 3) & 0x3F);
118
119 /* Update number of bits */
120 if ((context->count[0] += ((UINT4)inputLen << 3))
121 < ((UINT4)inputLen << 3))
122 context->count[1]++;
123 context->count[1] += ((UINT4)inputLen >> 29);
124
125 partLen = 64 - index;
126
127 /* Transform as many times as possible. */
128 if (inputLen >= partLen) {
129 memcpy((POINTER)&context->buffer[index], (POINTER)input, partLen);
130 MD5Transform (context->state, context->buffer);
131
132 for (i = partLen; i + 63 < inputLen; i += 64)
133 MD5Transform (context->state, &input[i]);
134
135 index = 0;
136 }
137 else
138 i = 0;
139
140 /* Buffer remaining input */
141 memcpy((POINTER)&context->buffer[index], (POINTER)&input[i],
142 inputLen-i);
143}
144
145/* MD5 finalization. Ends an MD5 message-digest operation, writing the
146 the message digest and zeroizing the context.
147 */
148void MD5Final (digest, context)
149unsigned char digest[16]; /* message digest */
150MD5_CTX *context; /* context */
151{
152 unsigned char bits[8];
153 unsigned int index, padLen;
154
155 /* Save number of bits */
156 Encode (bits, context->count, 8);
157
158 /* Pad out to 56 mod 64. */
159 index = (unsigned int)((context->count[0] >> 3) & 0x3f);
160 padLen = (index < 56) ? (56 - index) : (120 - index);
161 MD5Update (context, PADDING, padLen);
162
163 /* Append length (before padding) */
164 MD5Update (context, bits, 8);
165
166 /* Store state in digest */
167 Encode (digest, context->state, 16);
168
169 /* Zeroize sensitive information. */
170 memset ((POINTER)context, 0, sizeof (*context));
171}
172
173/* MD5 basic transformation. Transforms state based on block. */
174static void MD5Transform (state, block)
175UINT4 state[4];
176unsigned char block[64];
177{
178 UINT4 a = state[0], b = state[1], c = state[2], d = state[3], x[16];
179
180 Decode (x, block, 64);
181
182 /* Round 1 */
183 FF (a, b, c, d, x[ 0], S11, 0xd76aa478); /* 1 */
184 FF (d, a, b, c, x[ 1], S12, 0xe8c7b756); /* 2 */
185 FF (c, d, a, b, x[ 2], S13, 0x242070db); /* 3 */
186 FF (b, c, d, a, x[ 3], S14, 0xc1bdceee); /* 4 */
187 FF (a, b, c, d, x[ 4], S11, 0xf57c0faf); /* 5 */
188 FF (d, a, b, c, x[ 5], S12, 0x4787c62a); /* 6 */
189 FF (c, d, a, b, x[ 6], S13, 0xa8304613); /* 7 */
190 FF (b, c, d, a, x[ 7], S14, 0xfd469501); /* 8 */
191 FF (a, b, c, d, x[ 8], S11, 0x698098d8); /* 9 */
192 FF (d, a, b, c, x[ 9], S12, 0x8b44f7af); /* 10 */
193 FF (c, d, a, b, x[10], S13, 0xffff5bb1); /* 11 */
194 FF (b, c, d, a, x[11], S14, 0x895cd7be); /* 12 */
195 FF (a, b, c, d, x[12], S11, 0x6b901122); /* 13 */
196 FF (d, a, b, c, x[13], S12, 0xfd987193); /* 14 */
197 FF (c, d, a, b, x[14], S13, 0xa679438e); /* 15 */
198 FF (b, c, d, a, x[15], S14, 0x49b40821); /* 16 */
199
200 /* Round 2 */
201 GG (a, b, c, d, x[ 1], S21, 0xf61e2562); /* 17 */
202 GG (d, a, b, c, x[ 6], S22, 0xc040b340); /* 18 */
203 GG (c, d, a, b, x[11], S23, 0x265e5a51); /* 19 */
204 GG (b, c, d, a, x[ 0], S24, 0xe9b6c7aa); /* 20 */
205 GG (a, b, c, d, x[ 5], S21, 0xd62f105d); /* 21 */
206 GG (d, a, b, c, x[10], S22, 0x2441453); /* 22 */
207 GG (c, d, a, b, x[15], S23, 0xd8a1e681); /* 23 */
208 GG (b, c, d, a, x[ 4], S24, 0xe7d3fbc8); /* 24 */
209 GG (a, b, c, d, x[ 9], S21, 0x21e1cde6); /* 25 */
210 GG (d, a, b, c, x[14], S22, 0xc33707d6); /* 26 */
211 GG (c, d, a, b, x[ 3], S23, 0xf4d50d87); /* 27 */
212 GG (b, c, d, a, x[ 8], S24, 0x455a14ed); /* 28 */
213 GG (a, b, c, d, x[13], S21, 0xa9e3e905); /* 29 */
214 GG (d, a, b, c, x[ 2], S22, 0xfcefa3f8); /* 30 */
215 GG (c, d, a, b, x[ 7], S23, 0x676f02d9); /* 31 */
216 GG (b, c, d, a, x[12], S24, 0x8d2a4c8a); /* 32 */
217
218 /* Round 3 */
219 HH (a, b, c, d, x[ 5], S31, 0xfffa3942); /* 33 */
220 HH (d, a, b, c, x[ 8], S32, 0x8771f681); /* 34 */
221 HH (c, d, a, b, x[11], S33, 0x6d9d6122); /* 35 */
222 HH (b, c, d, a, x[14], S34, 0xfde5380c); /* 36 */
223 HH (a, b, c, d, x[ 1], S31, 0xa4beea44); /* 37 */
224 HH (d, a, b, c, x[ 4], S32, 0x4bdecfa9); /* 38 */
225 HH (c, d, a, b, x[ 7], S33, 0xf6bb4b60); /* 39 */
226 HH (b, c, d, a, x[10], S34, 0xbebfbc70); /* 40 */
227 HH (a, b, c, d, x[13], S31, 0x289b7ec6); /* 41 */
228 HH (d, a, b, c, x[ 0], S32, 0xeaa127fa); /* 42 */
229 HH (c, d, a, b, x[ 3], S33, 0xd4ef3085); /* 43 */
230 HH (b, c, d, a, x[ 6], S34, 0x4881d05); /* 44 */
231 HH (a, b, c, d, x[ 9], S31, 0xd9d4d039); /* 45 */
232 HH (d, a, b, c, x[12], S32, 0xe6db99e5); /* 46 */
233 HH (c, d, a, b, x[15], S33, 0x1fa27cf8); /* 47 */
234 HH (b, c, d, a, x[ 2], S34, 0xc4ac5665); /* 48 */
235
236 /* Round 4 */
237 II (a, b, c, d, x[ 0], S41, 0xf4292244); /* 49 */
238 II (d, a, b, c, x[ 7], S42, 0x432aff97); /* 50 */
239 II (c, d, a, b, x[14], S43, 0xab9423a7); /* 51 */
240 II (b, c, d, a, x[ 5], S44, 0xfc93a039); /* 52 */
241 II (a, b, c, d, x[12], S41, 0x655b59c3); /* 53 */
242 II (d, a, b, c, x[ 3], S42, 0x8f0ccc92); /* 54 */
243 II (c, d, a, b, x[10], S43, 0xffeff47d); /* 55 */
244 II (b, c, d, a, x[ 1], S44, 0x85845dd1); /* 56 */
245 II (a, b, c, d, x[ 8], S41, 0x6fa87e4f); /* 57 */
246 II (d, a, b, c, x[15], S42, 0xfe2ce6e0); /* 58 */
247 II (c, d, a, b, x[ 6], S43, 0xa3014314); /* 59 */
248 II (b, c, d, a, x[13], S44, 0x4e0811a1); /* 60 */
249 II (a, b, c, d, x[ 4], S41, 0xf7537e82); /* 61 */
250 II (d, a, b, c, x[11], S42, 0xbd3af235); /* 62 */
251 II (c, d, a, b, x[ 2], S43, 0x2ad7d2bb); /* 63 */
252 II (b, c, d, a, x[ 9], S44, 0xeb86d391); /* 64 */
253
254 state[0] += a;
255 state[1] += b;
256 state[2] += c;
257 state[3] += d;
258
259 /* Zeroize sensitive information. */
260 memset ((POINTER)x, 0, sizeof (x));
261}
262
263/* Encodes input (UINT4) into output (unsigned char). Assumes len is
264 a multiple of 4.
265 */
266static void Encode (output, input, len)
267unsigned char *output;
268UINT4 *input;
269unsigned int len;
270{
271 unsigned int i, j;
272
273 for (i = 0, j = 0; j < len; i++, j += 4) {
274 output[j] = (unsigned char)(input[i] & 0xff);
275 output[j+1] = (unsigned char)((input[i] >> 8) & 0xff);
276 output[j+2] = (unsigned char)((input[i] >> 16) & 0xff);
277 output[j+3] = (unsigned char)((input[i] >> 24) & 0xff);
278 }
279}
280
281/* Decodes input (unsigned char) into output (UINT4). Assumes len is
282 a multiple of 4.
283 */
284static void Decode (output, input, len)
285UINT4 *output;
286unsigned char *input;
287unsigned int len;
288{
289 unsigned int i, j;
290
291 for (i = 0, j = 0; j < len; i++, j += 4)
292 output[i] = ((UINT4)input[j]) | (((UINT4)input[j+1]) << 8) |
293 (((UINT4)input[j+2]) << 16) | (((UINT4)input[j+3]) << 24);
294}
295
296static const char *
297cryptpass_real(const char *pass, char *buffer, int seed)
298{
299 static const char hex_digits[] = "0123456789ABCDEF";
300 MD5_CTX ctx;
301 unsigned int len, i, j;
302 unsigned char temp[64], buff[16];
303
304 /* first: generate seed */
305 if (seed) {
306 for (i=j=0; j<4; j++) {
307 temp[i++] = hex_digits[(seed >> (28 - 8*j)) & 15];
308 temp[i++] = hex_digits[(seed >> (24 - 8*j)) & 15];
309 }
310 /* fill temp buffer with password, 1 and then 0's */
311 j = strlen(pass);
312 if ((sizeof(temp) - i) < j) j = sizeof(temp) - i;
313 memcpy(temp+i, pass, j);
314 i += j;
315 if (i < sizeof(temp)) temp[i++] = '1';
316 while (i < sizeof(temp)) temp[i++] = '0';
317 } else {
318 i = 0;
319 /* next: duplicate password to fill temp buffer */
320 len = strlen(pass);
321 for (j=0; i<sizeof(temp); i++) {
322 temp[i] = pass[j];
323 if (++j == len) j = 0;
324 }
325 }
326 /* next: compute MD5 digest of repeated password */
327 MD5Init(&ctx);
328 MD5Update(&ctx, temp, sizeof(temp));
329 MD5Final(buff, &ctx);
330 /* finally: write digest to output buffer */
331 if (seed) {
332 buffer[0] = '$';
333 for (i=0,j=1; i<4; i++) {
334 buffer[j++] = hex_digits[(seed >> (28 - 8*i)) & 15];
335 buffer[j++] = hex_digits[(seed >> (24 - 8*i)) & 15];
336 }
337 } else {
338 j = 0;
339 }
340 for (i=0; i<sizeof(buff); i++) {
341 buffer[j++] = hex_digits[buff[i] >> 4];
342 buffer[j++] = hex_digits[buff[i] & 15];
343 }
344 buffer[j] = 0;
345 return buffer;
346}
347
348const char *
349cryptpass(const char *pass, char *buffer)
350{
351 int seed;
352 do { seed = rand(); } while (!seed);
353 return cryptpass_real(pass, buffer, seed);
354}
355
356int
357checkpass(const char *pass, const char *crypt)
358{
359 char new_crypt[MD5_CRYPT_LENGTH], hseed[9];
360 int seed;
361
362 if (crypt[0] == '$') {
363 /* new-style crypt, use "seed" after '$' */
364 strncpy(hseed, crypt+1, 8);
365 hseed[8] = 0;
366 seed = strtoul(hseed, NULL, 16);
367 } else {
368 /* old-style crypt, use "seed" of 0 */
369 seed = 0;
370 }
371 cryptpass_real(pass, new_crypt, seed);
372 return !strcmp(crypt, new_crypt);
373}