Advertisement
Guest User

3

a guest
Mar 17th, 2018
136
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.13 KB | None | 0 0
  1. // Code by: B-Con (http://b-con.us)
  2. // Released under the GNU GPL
  3. // MD5 Hash Digest implementation (little endian byte order)
  4.  
  5.  
  6. // Bah, signed variables are for wimps
  7. #define uchar unsigned char
  8. #define uint unsigned int
  9.  
  10. // DBL_INT_ADD treats two unsigned ints a and b as one 64-bit integer and adds c to it
  11. #define DBL_INT_ADD(a,b,c) if (a > 0xffffffff - c) ++b; a += c;
  12. #define ROTLEFT(a,b) ((a << b) | (a >> (32-b)))
  13.  
  14. #define F(x,y,z) ((x & y) | (~x & z))
  15. #define G(x,y,z) ((x & z) | (y & ~z))
  16. #define H(x,y,z) (x ^ y ^ z)
  17. #define I(x,y,z) (y ^ (x | ~z))
  18.  
  19. #define FF(a,b,c,d,m,s,t) { a += F(b,c,d) + m + t; \
  20. a = b + ROTLEFT(a,s); }
  21. #define GG(a,b,c,d,m,s,t) { a += G(b,c,d) + m + t; \
  22. a = b + ROTLEFT(a,s); }
  23. #define HH(a,b,c,d,m,s,t) { a += H(b,c,d) + m + t; \
  24. a = b + ROTLEFT(a,s); }
  25. #define II(a,b,c,d,m,s,t) { a += I(b,c,d) + m + t; \
  26. a = b + ROTLEFT(a,s); }
  27.  
  28.  
  29. typedef struct {
  30. uchar data[64];
  31. uint datalen;
  32. uint bitlen[2];
  33. uint state[4];
  34. } MD5_CTX;
  35.  
  36.  
  37. void md5_transform(MD5_CTX *ctx, uchar data[])
  38. {
  39. uint a,b,c,d,m[16],i,j;
  40.  
  41. // MD5 specifies big endian byte order, but this implementation assumes a little
  42. // endian byte order CPU. Reverse all the bytes upon input, and re-reverse them
  43. // on output (in md5_final()).
  44. for (i=0,j=0; i < 16; ++i, j += 4)
  45. m[i] = (data[j]) + (data[j+1] << 8) + (data[j+2] << 16) + (data[j+3] << 24);
  46.  
  47. a = ctx->state[0];
  48. b = ctx->state[1];
  49. c = ctx->state[2];
  50. d = ctx->state[3];
  51.  
  52. FF(a,b,c,d,m[0], 7,0xd76aa478);
  53. FF(d,a,b,c,m[1], 12,0xe8c7b756);
  54. FF(c,d,a,b,m[2], 17,0x242070db);
  55. FF(b,c,d,a,m[3], 22,0xc1bdceee);
  56. FF(a,b,c,d,m[4], 7,0xf57c0faf);
  57. FF(d,a,b,c,m[5], 12,0x4787c62a);
  58. FF(c,d,a,b,m[6], 17,0xa8304613);
  59. FF(b,c,d,a,m[7], 22,0xfd469501);
  60. FF(a,b,c,d,m[8], 7,0x698098d8);
  61. FF(d,a,b,c,m[9], 12,0x8b44f7af);
  62. FF(c,d,a,b,m[10],17,0xffff5bb1);
  63. FF(b,c,d,a,m[11],22,0x895cd7be);
  64. FF(a,b,c,d,m[12], 7,0x6b901122);
  65. FF(d,a,b,c,m[13],12,0xfd987193);
  66. FF(c,d,a,b,m[14],17,0xa679438e);
  67. FF(b,c,d,a,m[15],22,0x49b40821);
  68.  
  69. GG(a,b,c,d,m[1], 5,0xf61e2562);
  70. GG(d,a,b,c,m[6], 9,0xc040b340);
  71. GG(c,d,a,b,m[11],14,0x265e5a51);
  72. GG(b,c,d,a,m[0], 20,0xe9b6c7aa);
  73. GG(a,b,c,d,m[5], 5,0xd62f105d);
  74. GG(d,a,b,c,m[10], 9,0x02441453);
  75. GG(c,d,a,b,m[15],14,0xd8a1e681);
  76. GG(b,c,d,a,m[4], 20,0xe7d3fbc8);
  77. GG(a,b,c,d,m[9], 5,0x21e1cde6);
  78. GG(d,a,b,c,m[14], 9,0xc33707d6);
  79. GG(c,d,a,b,m[3], 14,0xf4d50d87);
  80. GG(b,c,d,a,m[8], 20,0x455a14ed);
  81. GG(a,b,c,d,m[13], 5,0xa9e3e905);
  82. GG(d,a,b,c,m[2], 9,0xfcefa3f8);
  83. GG(c,d,a,b,m[7], 14,0x676f02d9);
  84. GG(b,c,d,a,m[12],20,0x8d2a4c8a);
  85.  
  86. HH(a,b,c,d,m[5], 4,0xfffa3942);
  87. HH(d,a,b,c,m[8], 11,0x8771f681);
  88. HH(c,d,a,b,m[11],16,0x6d9d6122);
  89. HH(b,c,d,a,m[14],23,0xfde5380c);
  90. HH(a,b,c,d,m[1], 4,0xa4beea44);
  91. HH(d,a,b,c,m[4], 11,0x4bdecfa9);
  92. HH(c,d,a,b,m[7], 16,0xf6bb4b60);
  93. HH(b,c,d,a,m[10],23,0xbebfbc70);
  94. HH(a,b,c,d,m[13], 4,0x289b7ec6);
  95. HH(d,a,b,c,m[0], 11,0xeaa127fa);
  96. HH(c,d,a,b,m[3], 16,0xd4ef3085);
  97. HH(b,c,d,a,m[6], 23,0x04881d05);
  98. HH(a,b,c,d,m[9], 4,0xd9d4d039);
  99. HH(d,a,b,c,m[12],11,0xe6db99e5);
  100. HH(c,d,a,b,m[15],16,0x1fa27cf8);
  101. HH(b,c,d,a,m[2], 23,0xc4ac5665);
  102.  
  103. II(a,b,c,d,m[0], 6,0xf4292244);
  104. II(d,a,b,c,m[7], 10,0x432aff97);
  105. II(c,d,a,b,m[14],15,0xab9423a7);
  106. II(b,c,d,a,m[5], 21,0xfc93a039);
  107. II(a,b,c,d,m[12], 6,0x655b59c3);
  108. II(d,a,b,c,m[3], 10,0x8f0ccc92);
  109. II(c,d,a,b,m[10],15,0xffeff47d);
  110. II(b,c,d,a,m[1], 21,0x85845dd1);
  111. II(a,b,c,d,m[8], 6,0x6fa87e4f);
  112. II(d,a,b,c,m[15],10,0xfe2ce6e0);
  113. II(c,d,a,b,m[6], 15,0xa3014314);
  114. II(b,c,d,a,m[13],21,0x4e0811a1);
  115. II(a,b,c,d,m[4], 6,0xf7537e82);
  116. II(d,a,b,c,m[11],10,0xbd3af235);
  117. II(c,d,a,b,m[2], 15,0x2ad7d2bb);
  118. II(b,c,d,a,m[9], 21,0xeb86d391);
  119.  
  120. ctx->state[0] += a;
  121. ctx->state[1] += b;
  122. ctx->state[2] += c;
  123. ctx->state[3] += d;
  124. }
  125.  
  126. void md5_init(MD5_CTX *ctx)
  127. {
  128. ctx->datalen = 0;
  129. ctx->bitlen[0] = 0;
  130. ctx->bitlen[1] = 0;
  131. ctx->state[0] = 0x67452301;
  132. ctx->state[1] = 0xEFCDAB89;
  133. ctx->state[2] = 0x98BADCFE;
  134. ctx->state[3] = 0x10325476;
  135. }
  136.  
  137. void md5_update(MD5_CTX *ctx, uchar data[], uint len)
  138. {
  139. uint i;
  140.  
  141. for (i=0; i < len; ++i) {
  142. ctx->data[ctx->datalen] = data[i];
  143. ctx->datalen++;
  144. if (ctx->datalen == 64) {
  145. md5_transform(ctx,ctx->data);
  146. DBL_INT_ADD(ctx->bitlen[0],ctx->bitlen[1],512);
  147. ctx->datalen = 0;
  148. }
  149. }
  150. }
  151.  
  152. void md5_final(MD5_CTX *ctx, uchar hash[])
  153. {
  154. uint i;
  155.  
  156. i = ctx->datalen;
  157.  
  158. // Pad whatever data is left in the buffer.
  159. if (ctx->datalen < 56) {
  160. ctx->data[i++] = 0x80;
  161. while (i < 56)
  162. ctx->data[i++] = 0x00;
  163. }
  164. else if (ctx->datalen >= 56) {
  165. ctx->data[i++] = 0x80;
  166. while (i < 64)
  167. ctx->data[i++] = 0x00;
  168. md5_transform(ctx,ctx->data);
  169. memset(ctx->data,0,56);
  170. }
  171.  
  172. // Append to the padding the total message's length in bits and transform.
  173. DBL_INT_ADD(ctx->bitlen[0],ctx->bitlen[1],8 * ctx->datalen);
  174. ctx->data[56] = ctx->bitlen[0];
  175. ctx->data[57] = ctx->bitlen[0] >> 8;
  176. ctx->data[58] = ctx->bitlen[0] >> 16;
  177. ctx->data[59] = ctx->bitlen[0] >> 24;
  178. ctx->data[60] = ctx->bitlen[1];
  179. ctx->data[61] = ctx->bitlen[1] >> 8;
  180. ctx->data[62] = ctx->bitlen[1] >> 16;
  181. ctx->data[63] = ctx->bitlen[1] >> 24;
  182. md5_transform(ctx,ctx->data);
  183.  
  184. // Since this implementation uses little endian byte ordering and MD uses big endian,
  185. // reverse all the bytes when copying the final state to the output hash.
  186. for (i=0; i < 4; ++i) {
  187. hash[i] = (ctx->state[0] >> (i*8)) & 0x000000ff;
  188. hash[i+4] = (ctx->state[1] >> (i*8)) & 0x000000ff;
  189. hash[i+8] = (ctx->state[2] >> (i*8)) & 0x000000ff;
  190. hash[i+12] = (ctx->state[3] >> (i*8)) & 0x000000ff;
  191. }
  192. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement