md5calc.c 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239
  1. /***********************************************************
  2. * md5 calculation algorithm
  3. *
  4. * The source code referred to the following URL.
  5. * http://www.geocities.co.jp/SiliconValley-Oakland/8878/lab17/lab17.html
  6. *
  7. ***********************************************************/
  8. #include "../common/random.h"
  9. #include "md5calc.h"
  10. #include <string.h>
  11. #include <stdio.h>
  12. #ifndef UINT_MAX
  13. #define UINT_MAX 4294967295U
  14. #endif
  15. // Global variable
  16. static unsigned int *pX;
  17. // String Table
  18. static const unsigned int T[] = {
  19. 0xd76aa478, 0xe8c7b756, 0x242070db, 0xc1bdceee, //0
  20. 0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501, //4
  21. 0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be, //8
  22. 0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821, //12
  23. 0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa, //16
  24. 0xd62f105d, 0x2441453, 0xd8a1e681, 0xe7d3fbc8, //20
  25. 0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed, //24
  26. 0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a, //28
  27. 0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c, //32
  28. 0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70, //36
  29. 0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x4881d05, //40
  30. 0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665, //44
  31. 0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039, //48
  32. 0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1, //52
  33. 0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1, //56
  34. 0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391 //60
  35. };
  36. // ROTATE_LEFT The left is made to rotate x [ n-bit ]. This is diverted as it is from RFC.
  37. #define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n))))
  38. // The function used for other calculation
  39. static unsigned int F(unsigned int X, unsigned int Y, unsigned int Z)
  40. {
  41. return (X & Y) | (~X & Z);
  42. }
  43. static unsigned int G(unsigned int X, unsigned int Y, unsigned int Z)
  44. {
  45. return (X & Z) | (Y & ~Z);
  46. }
  47. static unsigned int H(unsigned int X, unsigned int Y, unsigned int Z)
  48. {
  49. return X ^ Y ^ Z;
  50. }
  51. static unsigned int I(unsigned int X, unsigned int Y, unsigned int Z)
  52. {
  53. return Y ^ (X | ~Z);
  54. }
  55. static unsigned int Round(unsigned int a, unsigned int b, unsigned int FGHI,
  56. unsigned int k, unsigned int s, unsigned int i)
  57. {
  58. return b + ROTATE_LEFT(a + FGHI + pX[k] + T[i], s);
  59. }
  60. static void Round1(unsigned int *a, unsigned int b, unsigned int c,
  61. unsigned int d,unsigned int k, unsigned int s, unsigned int i)
  62. {
  63. *a = Round(*a, b, F(b,c,d), k, s, i);
  64. }
  65. static void Round2(unsigned int *a, unsigned int b, unsigned int c,
  66. unsigned int d,unsigned int k, unsigned int s, unsigned int i)
  67. {
  68. *a = Round(*a, b, G(b,c,d), k, s, i);
  69. }
  70. static void Round3(unsigned int *a, unsigned int b, unsigned int c,
  71. unsigned int d,unsigned int k, unsigned int s, unsigned int i)
  72. {
  73. *a = Round(*a, b, H(b,c,d), k, s, i);
  74. }
  75. static void Round4(unsigned int *a, unsigned int b, unsigned int c,
  76. unsigned int d,unsigned int k, unsigned int s, unsigned int i)
  77. {
  78. *a = Round(*a, b, I(b,c,d), k, s, i);
  79. }
  80. static void MD5_Round_Calculate(const unsigned char *block,
  81. unsigned int *A2, unsigned int *B2, unsigned int *C2, unsigned int *D2)
  82. {
  83. //create X It is since it is required.
  84. unsigned int X[16]; //512bit 64byte
  85. int j,k;
  86. //Save A as AA, B as BB, C as CC, and and D as DD (saving of A, B, C, and D)
  87. unsigned int A=*A2, B=*B2, C=*C2, D=*D2;
  88. unsigned int AA = A,BB = B,CC = C,DD = D;
  89. //It is a large region variable reluctantly because of calculation of a round. . . for Round1...4
  90. pX = X;
  91. //Copy block(padding_message) i into X
  92. for (j=0,k=0; j<64; j+=4,k++)
  93. X[k] = ( (unsigned int )block[j] ) // 8byte*4 -> 32byte conversion
  94. | ( ((unsigned int )block[j+1]) << 8 ) // A function called Decode as used in the field of RFC
  95. | ( ((unsigned int )block[j+2]) << 16 )
  96. | ( ((unsigned int )block[j+3]) << 24 );
  97. //Round 1
  98. Round1(&A,B,C,D, 0, 7, 0); Round1(&D,A,B,C, 1, 12, 1); Round1(&C,D,A,B, 2, 17, 2); Round1(&B,C,D,A, 3, 22, 3);
  99. Round1(&A,B,C,D, 4, 7, 4); Round1(&D,A,B,C, 5, 12, 5); Round1(&C,D,A,B, 6, 17, 6); Round1(&B,C,D,A, 7, 22, 7);
  100. Round1(&A,B,C,D, 8, 7, 8); Round1(&D,A,B,C, 9, 12, 9); Round1(&C,D,A,B, 10, 17, 10); Round1(&B,C,D,A, 11, 22, 11);
  101. Round1(&A,B,C,D, 12, 7, 12); Round1(&D,A,B,C, 13, 12, 13); Round1(&C,D,A,B, 14, 17, 14); Round1(&B,C,D,A, 15, 22, 15);
  102. //Round 2
  103. Round2(&A,B,C,D, 1, 5, 16); Round2(&D,A,B,C, 6, 9, 17); Round2(&C,D,A,B, 11, 14, 18); Round2(&B,C,D,A, 0, 20, 19);
  104. Round2(&A,B,C,D, 5, 5, 20); Round2(&D,A,B,C, 10, 9, 21); Round2(&C,D,A,B, 15, 14, 22); Round2(&B,C,D,A, 4, 20, 23);
  105. Round2(&A,B,C,D, 9, 5, 24); Round2(&D,A,B,C, 14, 9, 25); Round2(&C,D,A,B, 3, 14, 26); Round2(&B,C,D,A, 8, 20, 27);
  106. Round2(&A,B,C,D, 13, 5, 28); Round2(&D,A,B,C, 2, 9, 29); Round2(&C,D,A,B, 7, 14, 30); Round2(&B,C,D,A, 12, 20, 31);
  107. //Round 3
  108. Round3(&A,B,C,D, 5, 4, 32); Round3(&D,A,B,C, 8, 11, 33); Round3(&C,D,A,B, 11, 16, 34); Round3(&B,C,D,A, 14, 23, 35);
  109. Round3(&A,B,C,D, 1, 4, 36); Round3(&D,A,B,C, 4, 11, 37); Round3(&C,D,A,B, 7, 16, 38); Round3(&B,C,D,A, 10, 23, 39);
  110. Round3(&A,B,C,D, 13, 4, 40); Round3(&D,A,B,C, 0, 11, 41); Round3(&C,D,A,B, 3, 16, 42); Round3(&B,C,D,A, 6, 23, 43);
  111. Round3(&A,B,C,D, 9, 4, 44); Round3(&D,A,B,C, 12, 11, 45); Round3(&C,D,A,B, 15, 16, 46); Round3(&B,C,D,A, 2, 23, 47);
  112. //Round 4
  113. Round4(&A,B,C,D, 0, 6, 48); Round4(&D,A,B,C, 7, 10, 49); Round4(&C,D,A,B, 14, 15, 50); Round4(&B,C,D,A, 5, 21, 51);
  114. Round4(&A,B,C,D, 12, 6, 52); Round4(&D,A,B,C, 3, 10, 53); Round4(&C,D,A,B, 10, 15, 54); Round4(&B,C,D,A, 1, 21, 55);
  115. Round4(&A,B,C,D, 8, 6, 56); Round4(&D,A,B,C, 15, 10, 57); Round4(&C,D,A,B, 6, 15, 58); Round4(&B,C,D,A, 13, 21, 59);
  116. Round4(&A,B,C,D, 4, 6, 60); Round4(&D,A,B,C, 11, 10, 61); Round4(&C,D,A,B, 2, 15, 62); Round4(&B,C,D,A, 9, 21, 63);
  117. // Then perform the following additions. (let's add)
  118. *A2 = A + AA;
  119. *B2 = B + BB;
  120. *C2 = C + CC;
  121. *D2 = D + DD;
  122. //The clearance of confidential information
  123. memset(pX, 0, sizeof(X));
  124. }
  125. static void MD5_String2binary(const char * string, unsigned char * output)
  126. {
  127. //var
  128. /*8bit*/
  129. unsigned char padding_message[64]; //Extended message 512bit 64byte
  130. unsigned char *pstring; //The position of string in the present scanning notes is held.
  131. /*32bit*/
  132. unsigned int string_byte_len, //The byte chief of string is held.
  133. string_bit_len, //The bit length of string is held.
  134. copy_len, //The number of bytes which is used by 1-3 and which remained
  135. msg_digest[4]; //Message digest 128bit 4byte
  136. unsigned int *A = &msg_digest[0], //The message digest in accordance with RFC (reference)
  137. *B = &msg_digest[1],
  138. *C = &msg_digest[2],
  139. *D = &msg_digest[3];
  140. int i;
  141. //prog
  142. //Step 3.Initialize MD Buffer (although it is the initialization; step 3 of A, B, C, and D -- unavoidable -- a head)
  143. *A = 0x67452301;
  144. *B = 0xefcdab89;
  145. *C = 0x98badcfe;
  146. *D = 0x10325476;
  147. //Step 1.Append Padding Bits (extension of a mark bit)
  148. //1-1
  149. string_byte_len = (unsigned int)strlen(string); //The byte chief of a character sequence is acquired.
  150. pstring = (unsigned char *)string; //The position of the present character sequence is set.
  151. //1-2 Repeat calculation until length becomes less than 64 bytes.
  152. for (i=string_byte_len; 64<=i; i-=64,pstring+=64)
  153. MD5_Round_Calculate(pstring, A,B,C,D);
  154. //1-3
  155. copy_len = string_byte_len % 64; //The number of bytes which remained is computed.
  156. strncpy((char *)padding_message, (char *)pstring, copy_len); //A message is copied to an extended bit sequence.
  157. memset(padding_message+copy_len, 0, 64 - copy_len); //It buries by 0 until it becomes extended bit length.
  158. padding_message[copy_len] |= 0x80; //The next of a message is 1.
  159. //1-4
  160. //If 56 bytes or more (less than 64 bytes) of remainder becomes, it will calculate by extending to 64 bytes.
  161. if (56 <= copy_len) {
  162. MD5_Round_Calculate(padding_message, A,B,C,D);
  163. memset(padding_message, 0, 56); //56 bytes is newly fill uped with 0.
  164. }
  165. //Step 2.Append Length (the information on length is added)
  166. string_bit_len = string_byte_len * 8; //From the byte chief to bit length (32 bytes of low rank)
  167. memcpy(&padding_message[56], &string_bit_len, 4); //32 bytes of low rank is set.
  168. //When bit length cannot be expressed in 32 bytes of low rank, it is a beam raising to a higher rank.
  169. if (UINT_MAX / 8 < string_byte_len) {
  170. unsigned int high = (string_byte_len - UINT_MAX / 8) * 8;
  171. memcpy(&padding_message[60], &high, 4);
  172. } else
  173. memset(&padding_message[60], 0, 4); //In this case, it is good for a higher rank at 0.
  174. //Step 4.Process Message in 16-Word Blocks (calculation of MD5)
  175. MD5_Round_Calculate(padding_message, A,B,C,D);
  176. //Step 5.Output (output)
  177. memcpy(output,msg_digest,16);
  178. }
  179. //-------------------------------------------------------------------
  180. // The function for the exteriors
  181. /** output is the coded binary in the character sequence which wants to code string. */
  182. void MD5_Binary(const char * string, unsigned char * output)
  183. {
  184. MD5_String2binary(string,output);
  185. }
  186. /** output is the coded character sequence in the character sequence which wants to code string. */
  187. void MD5_String(const char * string, char * output)
  188. {
  189. unsigned char digest[16];
  190. MD5_String2binary(string,digest);
  191. sprintf(output, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x",
  192. digest[ 0], digest[ 1], digest[ 2], digest[ 3],
  193. digest[ 4], digest[ 5], digest[ 6], digest[ 7],
  194. digest[ 8], digest[ 9], digest[10], digest[11],
  195. digest[12], digest[13], digest[14], digest[15]);
  196. }
  197. /** output is a sequence of non-zero characters to be used as password salt. */
  198. void MD5_Salt(unsigned int len, char * output)
  199. {
  200. unsigned int i;
  201. for( i = 0; i < len; ++i )
  202. output[i] = (char)(1 + rnd() % 255);
  203. }