xref: /optee_os/lib/libmbedtls/mbedtls/library/md5.c (revision 11fa71b9ddb429088f325cfda430183003ccd1db)
1 // SPDX-License-Identifier: Apache-2.0
2 /*
3  *  RFC 1321 compliant MD5 implementation
4  *
5  *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
6  *
7  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
8  *  not use this file except in compliance with the License.
9  *  You may obtain a copy of the License at
10  *
11  *  http://www.apache.org/licenses/LICENSE-2.0
12  *
13  *  Unless required by applicable law or agreed to in writing, software
14  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  *  See the License for the specific language governing permissions and
17  *  limitations under the License.
18  *
19  *  This file is part of mbed TLS (https://tls.mbed.org)
20  */
21 /*
22  *  The MD5 algorithm was designed by Ron Rivest in 1991.
23  *
24  *  http://www.ietf.org/rfc/rfc1321.txt
25  */
26 
27 #if !defined(MBEDTLS_CONFIG_FILE)
28 #include "mbedtls/config.h"
29 #else
30 #include MBEDTLS_CONFIG_FILE
31 #endif
32 
33 #if defined(MBEDTLS_MD5_C)
34 
35 #include "mbedtls/md5.h"
36 #include "mbedtls/platform_util.h"
37 #include "mbedtls/error.h"
38 
39 #include <string.h>
40 
41 #if defined(MBEDTLS_SELF_TEST)
42 #if defined(MBEDTLS_PLATFORM_C)
43 #include "mbedtls/platform.h"
44 #else
45 #include <stdio.h>
46 #define mbedtls_printf printf
47 #endif /* MBEDTLS_PLATFORM_C */
48 #endif /* MBEDTLS_SELF_TEST */
49 
50 #if !defined(MBEDTLS_MD5_ALT)
51 
52 /*
53  * 32-bit integer manipulation macros (little endian)
54  */
55 #ifndef GET_UINT32_LE
56 #define GET_UINT32_LE(n,b,i)                            \
57 {                                                       \
58     (n) = ( (uint32_t) (b)[(i)    ]       )             \
59         | ( (uint32_t) (b)[(i) + 1] <<  8 )             \
60         | ( (uint32_t) (b)[(i) + 2] << 16 )             \
61         | ( (uint32_t) (b)[(i) + 3] << 24 );            \
62 }
63 #endif
64 
65 #ifndef PUT_UINT32_LE
66 #define PUT_UINT32_LE(n,b,i)                                    \
67 {                                                               \
68     (b)[(i)    ] = (unsigned char) ( ( (n)       ) & 0xFF );    \
69     (b)[(i) + 1] = (unsigned char) ( ( (n) >>  8 ) & 0xFF );    \
70     (b)[(i) + 2] = (unsigned char) ( ( (n) >> 16 ) & 0xFF );    \
71     (b)[(i) + 3] = (unsigned char) ( ( (n) >> 24 ) & 0xFF );    \
72 }
73 #endif
74 
75 void mbedtls_md5_init( mbedtls_md5_context *ctx )
76 {
77     memset( ctx, 0, sizeof( mbedtls_md5_context ) );
78 }
79 
80 void mbedtls_md5_free( mbedtls_md5_context *ctx )
81 {
82     if( ctx == NULL )
83         return;
84 
85     mbedtls_platform_zeroize( ctx, sizeof( mbedtls_md5_context ) );
86 }
87 
88 void mbedtls_md5_clone( mbedtls_md5_context *dst,
89                         const mbedtls_md5_context *src )
90 {
91     *dst = *src;
92 }
93 
94 /*
95  * MD5 context setup
96  */
97 int mbedtls_md5_starts_ret( mbedtls_md5_context *ctx )
98 {
99     ctx->total[0] = 0;
100     ctx->total[1] = 0;
101 
102     ctx->state[0] = 0x67452301;
103     ctx->state[1] = 0xEFCDAB89;
104     ctx->state[2] = 0x98BADCFE;
105     ctx->state[3] = 0x10325476;
106 
107     return( 0 );
108 }
109 
110 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
111 void mbedtls_md5_starts( mbedtls_md5_context *ctx )
112 {
113     mbedtls_md5_starts_ret( ctx );
114 }
115 #endif
116 
117 #if !defined(MBEDTLS_MD5_PROCESS_ALT)
118 int mbedtls_internal_md5_process( mbedtls_md5_context *ctx,
119                                   const unsigned char data[64] )
120 {
121     uint32_t X[16], A, B, C, D;
122 
123     GET_UINT32_LE( X[ 0], data,  0 );
124     GET_UINT32_LE( X[ 1], data,  4 );
125     GET_UINT32_LE( X[ 2], data,  8 );
126     GET_UINT32_LE( X[ 3], data, 12 );
127     GET_UINT32_LE( X[ 4], data, 16 );
128     GET_UINT32_LE( X[ 5], data, 20 );
129     GET_UINT32_LE( X[ 6], data, 24 );
130     GET_UINT32_LE( X[ 7], data, 28 );
131     GET_UINT32_LE( X[ 8], data, 32 );
132     GET_UINT32_LE( X[ 9], data, 36 );
133     GET_UINT32_LE( X[10], data, 40 );
134     GET_UINT32_LE( X[11], data, 44 );
135     GET_UINT32_LE( X[12], data, 48 );
136     GET_UINT32_LE( X[13], data, 52 );
137     GET_UINT32_LE( X[14], data, 56 );
138     GET_UINT32_LE( X[15], data, 60 );
139 
140 #define S(x,n)                                                          \
141     ( ( (x) << (n) ) | ( ( (x) & 0xFFFFFFFF) >> ( 32 - (n) ) ) )
142 
143 #define P(a,b,c,d,k,s,t)                                        \
144     do                                                          \
145     {                                                           \
146         (a) += F((b),(c),(d)) + X[(k)] + (t);                   \
147         (a) = S((a),(s)) + (b);                                 \
148     } while( 0 )
149 
150     A = ctx->state[0];
151     B = ctx->state[1];
152     C = ctx->state[2];
153     D = ctx->state[3];
154 
155 #define F(x,y,z) ((z) ^ ((x) & ((y) ^ (z))))
156 
157     P( A, B, C, D,  0,  7, 0xD76AA478 );
158     P( D, A, B, C,  1, 12, 0xE8C7B756 );
159     P( C, D, A, B,  2, 17, 0x242070DB );
160     P( B, C, D, A,  3, 22, 0xC1BDCEEE );
161     P( A, B, C, D,  4,  7, 0xF57C0FAF );
162     P( D, A, B, C,  5, 12, 0x4787C62A );
163     P( C, D, A, B,  6, 17, 0xA8304613 );
164     P( B, C, D, A,  7, 22, 0xFD469501 );
165     P( A, B, C, D,  8,  7, 0x698098D8 );
166     P( D, A, B, C,  9, 12, 0x8B44F7AF );
167     P( C, D, A, B, 10, 17, 0xFFFF5BB1 );
168     P( B, C, D, A, 11, 22, 0x895CD7BE );
169     P( A, B, C, D, 12,  7, 0x6B901122 );
170     P( D, A, B, C, 13, 12, 0xFD987193 );
171     P( C, D, A, B, 14, 17, 0xA679438E );
172     P( B, C, D, A, 15, 22, 0x49B40821 );
173 
174 #undef F
175 
176 #define F(x,y,z) ((y) ^ ((z) & ((x) ^ (y))))
177 
178     P( A, B, C, D,  1,  5, 0xF61E2562 );
179     P( D, A, B, C,  6,  9, 0xC040B340 );
180     P( C, D, A, B, 11, 14, 0x265E5A51 );
181     P( B, C, D, A,  0, 20, 0xE9B6C7AA );
182     P( A, B, C, D,  5,  5, 0xD62F105D );
183     P( D, A, B, C, 10,  9, 0x02441453 );
184     P( C, D, A, B, 15, 14, 0xD8A1E681 );
185     P( B, C, D, A,  4, 20, 0xE7D3FBC8 );
186     P( A, B, C, D,  9,  5, 0x21E1CDE6 );
187     P( D, A, B, C, 14,  9, 0xC33707D6 );
188     P( C, D, A, B,  3, 14, 0xF4D50D87 );
189     P( B, C, D, A,  8, 20, 0x455A14ED );
190     P( A, B, C, D, 13,  5, 0xA9E3E905 );
191     P( D, A, B, C,  2,  9, 0xFCEFA3F8 );
192     P( C, D, A, B,  7, 14, 0x676F02D9 );
193     P( B, C, D, A, 12, 20, 0x8D2A4C8A );
194 
195 #undef F
196 
197 #define F(x,y,z) ((x) ^ (y) ^ (z))
198 
199     P( A, B, C, D,  5,  4, 0xFFFA3942 );
200     P( D, A, B, C,  8, 11, 0x8771F681 );
201     P( C, D, A, B, 11, 16, 0x6D9D6122 );
202     P( B, C, D, A, 14, 23, 0xFDE5380C );
203     P( A, B, C, D,  1,  4, 0xA4BEEA44 );
204     P( D, A, B, C,  4, 11, 0x4BDECFA9 );
205     P( C, D, A, B,  7, 16, 0xF6BB4B60 );
206     P( B, C, D, A, 10, 23, 0xBEBFBC70 );
207     P( A, B, C, D, 13,  4, 0x289B7EC6 );
208     P( D, A, B, C,  0, 11, 0xEAA127FA );
209     P( C, D, A, B,  3, 16, 0xD4EF3085 );
210     P( B, C, D, A,  6, 23, 0x04881D05 );
211     P( A, B, C, D,  9,  4, 0xD9D4D039 );
212     P( D, A, B, C, 12, 11, 0xE6DB99E5 );
213     P( C, D, A, B, 15, 16, 0x1FA27CF8 );
214     P( B, C, D, A,  2, 23, 0xC4AC5665 );
215 
216 #undef F
217 
218 #define F(x,y,z) ((y) ^ ((x) | ~(z)))
219 
220     P( A, B, C, D,  0,  6, 0xF4292244 );
221     P( D, A, B, C,  7, 10, 0x432AFF97 );
222     P( C, D, A, B, 14, 15, 0xAB9423A7 );
223     P( B, C, D, A,  5, 21, 0xFC93A039 );
224     P( A, B, C, D, 12,  6, 0x655B59C3 );
225     P( D, A, B, C,  3, 10, 0x8F0CCC92 );
226     P( C, D, A, B, 10, 15, 0xFFEFF47D );
227     P( B, C, D, A,  1, 21, 0x85845DD1 );
228     P( A, B, C, D,  8,  6, 0x6FA87E4F );
229     P( D, A, B, C, 15, 10, 0xFE2CE6E0 );
230     P( C, D, A, B,  6, 15, 0xA3014314 );
231     P( B, C, D, A, 13, 21, 0x4E0811A1 );
232     P( A, B, C, D,  4,  6, 0xF7537E82 );
233     P( D, A, B, C, 11, 10, 0xBD3AF235 );
234     P( C, D, A, B,  2, 15, 0x2AD7D2BB );
235     P( B, C, D, A,  9, 21, 0xEB86D391 );
236 
237 #undef F
238 
239     ctx->state[0] += A;
240     ctx->state[1] += B;
241     ctx->state[2] += C;
242     ctx->state[3] += D;
243 
244     return( 0 );
245 }
246 
247 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
248 void mbedtls_md5_process( mbedtls_md5_context *ctx,
249                           const unsigned char data[64] )
250 {
251     mbedtls_internal_md5_process( ctx, data );
252 }
253 #endif
254 #endif /* !MBEDTLS_MD5_PROCESS_ALT */
255 
256 /*
257  * MD5 process buffer
258  */
259 int mbedtls_md5_update_ret( mbedtls_md5_context *ctx,
260                             const unsigned char *input,
261                             size_t ilen )
262 {
263     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
264     size_t fill;
265     uint32_t left;
266 
267     if( ilen == 0 )
268         return( 0 );
269 
270     left = ctx->total[0] & 0x3F;
271     fill = 64 - left;
272 
273     ctx->total[0] += (uint32_t) ilen;
274     ctx->total[0] &= 0xFFFFFFFF;
275 
276     if( ctx->total[0] < (uint32_t) ilen )
277         ctx->total[1]++;
278 
279     if( left && ilen >= fill )
280     {
281         memcpy( (void *) (ctx->buffer + left), input, fill );
282         if( ( ret = mbedtls_internal_md5_process( ctx, ctx->buffer ) ) != 0 )
283             return( ret );
284 
285         input += fill;
286         ilen  -= fill;
287         left = 0;
288     }
289 
290     while( ilen >= 64 )
291     {
292         if( ( ret = mbedtls_internal_md5_process( ctx, input ) ) != 0 )
293             return( ret );
294 
295         input += 64;
296         ilen  -= 64;
297     }
298 
299     if( ilen > 0 )
300     {
301         memcpy( (void *) (ctx->buffer + left), input, ilen );
302     }
303 
304     return( 0 );
305 }
306 
307 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
308 void mbedtls_md5_update( mbedtls_md5_context *ctx,
309                          const unsigned char *input,
310                          size_t ilen )
311 {
312     mbedtls_md5_update_ret( ctx, input, ilen );
313 }
314 #endif
315 
316 /*
317  * MD5 final digest
318  */
319 int mbedtls_md5_finish_ret( mbedtls_md5_context *ctx,
320                             unsigned char output[16] )
321 {
322     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
323     uint32_t used;
324     uint32_t high, low;
325 
326     /*
327      * Add padding: 0x80 then 0x00 until 8 bytes remain for the length
328      */
329     used = ctx->total[0] & 0x3F;
330 
331     ctx->buffer[used++] = 0x80;
332 
333     if( used <= 56 )
334     {
335         /* Enough room for padding + length in current block */
336         memset( ctx->buffer + used, 0, 56 - used );
337     }
338     else
339     {
340         /* We'll need an extra block */
341         memset( ctx->buffer + used, 0, 64 - used );
342 
343         if( ( ret = mbedtls_internal_md5_process( ctx, ctx->buffer ) ) != 0 )
344             return( ret );
345 
346         memset( ctx->buffer, 0, 56 );
347     }
348 
349     /*
350      * Add message length
351      */
352     high = ( ctx->total[0] >> 29 )
353          | ( ctx->total[1] <<  3 );
354     low  = ( ctx->total[0] <<  3 );
355 
356     PUT_UINT32_LE( low,  ctx->buffer, 56 );
357     PUT_UINT32_LE( high, ctx->buffer, 60 );
358 
359     if( ( ret = mbedtls_internal_md5_process( ctx, ctx->buffer ) ) != 0 )
360         return( ret );
361 
362     /*
363      * Output final state
364      */
365     PUT_UINT32_LE( ctx->state[0], output,  0 );
366     PUT_UINT32_LE( ctx->state[1], output,  4 );
367     PUT_UINT32_LE( ctx->state[2], output,  8 );
368     PUT_UINT32_LE( ctx->state[3], output, 12 );
369 
370     return( 0 );
371 }
372 
373 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
374 void mbedtls_md5_finish( mbedtls_md5_context *ctx,
375                          unsigned char output[16] )
376 {
377     mbedtls_md5_finish_ret( ctx, output );
378 }
379 #endif
380 
381 #endif /* !MBEDTLS_MD5_ALT */
382 
383 /*
384  * output = MD5( input buffer )
385  */
386 int mbedtls_md5_ret( const unsigned char *input,
387                      size_t ilen,
388                      unsigned char output[16] )
389 {
390     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
391     mbedtls_md5_context ctx;
392 
393     mbedtls_md5_init( &ctx );
394 
395     if( ( ret = mbedtls_md5_starts_ret( &ctx ) ) != 0 )
396         goto exit;
397 
398     if( ( ret = mbedtls_md5_update_ret( &ctx, input, ilen ) ) != 0 )
399         goto exit;
400 
401     if( ( ret = mbedtls_md5_finish_ret( &ctx, output ) ) != 0 )
402         goto exit;
403 
404 exit:
405     mbedtls_md5_free( &ctx );
406 
407     return( ret );
408 }
409 
410 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
411 void mbedtls_md5( const unsigned char *input,
412                   size_t ilen,
413                   unsigned char output[16] )
414 {
415     mbedtls_md5_ret( input, ilen, output );
416 }
417 #endif
418 
419 #if defined(MBEDTLS_SELF_TEST)
420 /*
421  * RFC 1321 test vectors
422  */
423 static const unsigned char md5_test_buf[7][81] =
424 {
425     { "" },
426     { "a" },
427     { "abc" },
428     { "message digest" },
429     { "abcdefghijklmnopqrstuvwxyz" },
430     { "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" },
431     { "12345678901234567890123456789012345678901234567890123456789012"
432       "345678901234567890" }
433 };
434 
435 static const size_t md5_test_buflen[7] =
436 {
437     0, 1, 3, 14, 26, 62, 80
438 };
439 
440 static const unsigned char md5_test_sum[7][16] =
441 {
442     { 0xD4, 0x1D, 0x8C, 0xD9, 0x8F, 0x00, 0xB2, 0x04,
443       0xE9, 0x80, 0x09, 0x98, 0xEC, 0xF8, 0x42, 0x7E },
444     { 0x0C, 0xC1, 0x75, 0xB9, 0xC0, 0xF1, 0xB6, 0xA8,
445       0x31, 0xC3, 0x99, 0xE2, 0x69, 0x77, 0x26, 0x61 },
446     { 0x90, 0x01, 0x50, 0x98, 0x3C, 0xD2, 0x4F, 0xB0,
447       0xD6, 0x96, 0x3F, 0x7D, 0x28, 0xE1, 0x7F, 0x72 },
448     { 0xF9, 0x6B, 0x69, 0x7D, 0x7C, 0xB7, 0x93, 0x8D,
449       0x52, 0x5A, 0x2F, 0x31, 0xAA, 0xF1, 0x61, 0xD0 },
450     { 0xC3, 0xFC, 0xD3, 0xD7, 0x61, 0x92, 0xE4, 0x00,
451       0x7D, 0xFB, 0x49, 0x6C, 0xCA, 0x67, 0xE1, 0x3B },
452     { 0xD1, 0x74, 0xAB, 0x98, 0xD2, 0x77, 0xD9, 0xF5,
453       0xA5, 0x61, 0x1C, 0x2C, 0x9F, 0x41, 0x9D, 0x9F },
454     { 0x57, 0xED, 0xF4, 0xA2, 0x2B, 0xE3, 0xC9, 0x55,
455       0xAC, 0x49, 0xDA, 0x2E, 0x21, 0x07, 0xB6, 0x7A }
456 };
457 
458 /*
459  * Checkup routine
460  */
461 int mbedtls_md5_self_test( int verbose )
462 {
463     int i, ret = 0;
464     unsigned char md5sum[16];
465 
466     for( i = 0; i < 7; i++ )
467     {
468         if( verbose != 0 )
469             mbedtls_printf( "  MD5 test #%d: ", i + 1 );
470 
471         ret = mbedtls_md5_ret( md5_test_buf[i], md5_test_buflen[i], md5sum );
472         if( ret != 0 )
473             goto fail;
474 
475         if( memcmp( md5sum, md5_test_sum[i], 16 ) != 0 )
476         {
477             ret = 1;
478             goto fail;
479         }
480 
481         if( verbose != 0 )
482             mbedtls_printf( "passed\n" );
483     }
484 
485     if( verbose != 0 )
486         mbedtls_printf( "\n" );
487 
488     return( 0 );
489 
490 fail:
491     if( verbose != 0 )
492         mbedtls_printf( "failed\n" );
493 
494     return( ret );
495 }
496 
497 #endif /* MBEDTLS_SELF_TEST */
498 
499 #endif /* MBEDTLS_MD5_C */
500