xref: /rk3399_rockchip-uboot/lib/md5.c (revision 78acc472d9719316f22e002a009a998d9ceec29d)
1*78acc472SPeter Tyser /*
2*78acc472SPeter Tyser  * This file was transplanted with slight modifications from Linux sources
3*78acc472SPeter Tyser  * (fs/cifs/md5.c) into U-Boot by Bartlomiej Sieka <tur@semihalf.com>.
4*78acc472SPeter Tyser  */
5*78acc472SPeter Tyser 
6*78acc472SPeter Tyser /*
7*78acc472SPeter Tyser  * This code implements the MD5 message-digest algorithm.
8*78acc472SPeter Tyser  * The algorithm is due to Ron Rivest.  This code was
9*78acc472SPeter Tyser  * written by Colin Plumb in 1993, no copyright is claimed.
10*78acc472SPeter Tyser  * This code is in the public domain; do with it what you wish.
11*78acc472SPeter Tyser  *
12*78acc472SPeter Tyser  * Equivalent code is available from RSA Data Security, Inc.
13*78acc472SPeter Tyser  * This code has been tested against that, and is equivalent,
14*78acc472SPeter Tyser  * except that you don't need to include two pages of legalese
15*78acc472SPeter Tyser  * with every copy.
16*78acc472SPeter Tyser  *
17*78acc472SPeter Tyser  * To compute the message digest of a chunk of bytes, declare an
18*78acc472SPeter Tyser  * MD5Context structure, pass it to MD5Init, call MD5Update as
19*78acc472SPeter Tyser  * needed on buffers full of bytes, and then call MD5Final, which
20*78acc472SPeter Tyser  * will fill a supplied 16-byte array with the digest.
21*78acc472SPeter Tyser  */
22*78acc472SPeter Tyser 
23*78acc472SPeter Tyser /* This code slightly modified to fit into Samba by
24*78acc472SPeter Tyser    abartlet@samba.org Jun 2001
25*78acc472SPeter Tyser    and to fit the cifs vfs by
26*78acc472SPeter Tyser    Steve French sfrench@us.ibm.com */
27*78acc472SPeter Tyser 
28*78acc472SPeter Tyser #include "compiler.h"
29*78acc472SPeter Tyser 
30*78acc472SPeter Tyser #ifndef USE_HOSTCC
31*78acc472SPeter Tyser #include <common.h>
32*78acc472SPeter Tyser #include <watchdog.h>
33*78acc472SPeter Tyser #endif /* USE_HOSTCC */
34*78acc472SPeter Tyser #include <u-boot/md5.h>
35*78acc472SPeter Tyser 
36*78acc472SPeter Tyser static void
37*78acc472SPeter Tyser MD5Transform(__u32 buf[4], __u32 const in[16]);
38*78acc472SPeter Tyser 
39*78acc472SPeter Tyser /*
40*78acc472SPeter Tyser  * Note: this code is harmless on little-endian machines.
41*78acc472SPeter Tyser  */
42*78acc472SPeter Tyser static void
43*78acc472SPeter Tyser byteReverse(unsigned char *buf, unsigned longs)
44*78acc472SPeter Tyser {
45*78acc472SPeter Tyser 	__u32 t;
46*78acc472SPeter Tyser 	do {
47*78acc472SPeter Tyser 		t = (__u32) ((unsigned) buf[3] << 8 | buf[2]) << 16 |
48*78acc472SPeter Tyser 		    ((unsigned) buf[1] << 8 | buf[0]);
49*78acc472SPeter Tyser 		*(__u32 *) buf = t;
50*78acc472SPeter Tyser 		buf += 4;
51*78acc472SPeter Tyser 	} while (--longs);
52*78acc472SPeter Tyser }
53*78acc472SPeter Tyser 
54*78acc472SPeter Tyser /*
55*78acc472SPeter Tyser  * Start MD5 accumulation.  Set bit count to 0 and buffer to mysterious
56*78acc472SPeter Tyser  * initialization constants.
57*78acc472SPeter Tyser  */
58*78acc472SPeter Tyser static void
59*78acc472SPeter Tyser MD5Init(struct MD5Context *ctx)
60*78acc472SPeter Tyser {
61*78acc472SPeter Tyser 	ctx->buf[0] = 0x67452301;
62*78acc472SPeter Tyser 	ctx->buf[1] = 0xefcdab89;
63*78acc472SPeter Tyser 	ctx->buf[2] = 0x98badcfe;
64*78acc472SPeter Tyser 	ctx->buf[3] = 0x10325476;
65*78acc472SPeter Tyser 
66*78acc472SPeter Tyser 	ctx->bits[0] = 0;
67*78acc472SPeter Tyser 	ctx->bits[1] = 0;
68*78acc472SPeter Tyser }
69*78acc472SPeter Tyser 
70*78acc472SPeter Tyser /*
71*78acc472SPeter Tyser  * Update context to reflect the concatenation of another buffer full
72*78acc472SPeter Tyser  * of bytes.
73*78acc472SPeter Tyser  */
74*78acc472SPeter Tyser static void
75*78acc472SPeter Tyser MD5Update(struct MD5Context *ctx, unsigned char const *buf, unsigned len)
76*78acc472SPeter Tyser {
77*78acc472SPeter Tyser 	register __u32 t;
78*78acc472SPeter Tyser 
79*78acc472SPeter Tyser 	/* Update bitcount */
80*78acc472SPeter Tyser 
81*78acc472SPeter Tyser 	t = ctx->bits[0];
82*78acc472SPeter Tyser 	if ((ctx->bits[0] = t + ((__u32) len << 3)) < t)
83*78acc472SPeter Tyser 		ctx->bits[1]++;	/* Carry from low to high */
84*78acc472SPeter Tyser 	ctx->bits[1] += len >> 29;
85*78acc472SPeter Tyser 
86*78acc472SPeter Tyser 	t = (t >> 3) & 0x3f;	/* Bytes already in shsInfo->data */
87*78acc472SPeter Tyser 
88*78acc472SPeter Tyser 	/* Handle any leading odd-sized chunks */
89*78acc472SPeter Tyser 
90*78acc472SPeter Tyser 	if (t) {
91*78acc472SPeter Tyser 		unsigned char *p = (unsigned char *) ctx->in + t;
92*78acc472SPeter Tyser 
93*78acc472SPeter Tyser 		t = 64 - t;
94*78acc472SPeter Tyser 		if (len < t) {
95*78acc472SPeter Tyser 			memmove(p, buf, len);
96*78acc472SPeter Tyser 			return;
97*78acc472SPeter Tyser 		}
98*78acc472SPeter Tyser 		memmove(p, buf, t);
99*78acc472SPeter Tyser 		byteReverse(ctx->in, 16);
100*78acc472SPeter Tyser 		MD5Transform(ctx->buf, (__u32 *) ctx->in);
101*78acc472SPeter Tyser 		buf += t;
102*78acc472SPeter Tyser 		len -= t;
103*78acc472SPeter Tyser 	}
104*78acc472SPeter Tyser 	/* Process data in 64-byte chunks */
105*78acc472SPeter Tyser 
106*78acc472SPeter Tyser 	while (len >= 64) {
107*78acc472SPeter Tyser 		memmove(ctx->in, buf, 64);
108*78acc472SPeter Tyser 		byteReverse(ctx->in, 16);
109*78acc472SPeter Tyser 		MD5Transform(ctx->buf, (__u32 *) ctx->in);
110*78acc472SPeter Tyser 		buf += 64;
111*78acc472SPeter Tyser 		len -= 64;
112*78acc472SPeter Tyser 	}
113*78acc472SPeter Tyser 
114*78acc472SPeter Tyser 	/* Handle any remaining bytes of data. */
115*78acc472SPeter Tyser 
116*78acc472SPeter Tyser 	memmove(ctx->in, buf, len);
117*78acc472SPeter Tyser }
118*78acc472SPeter Tyser 
119*78acc472SPeter Tyser /*
120*78acc472SPeter Tyser  * Final wrapup - pad to 64-byte boundary with the bit pattern
121*78acc472SPeter Tyser  * 1 0* (64-bit count of bits processed, MSB-first)
122*78acc472SPeter Tyser  */
123*78acc472SPeter Tyser static void
124*78acc472SPeter Tyser MD5Final(unsigned char digest[16], struct MD5Context *ctx)
125*78acc472SPeter Tyser {
126*78acc472SPeter Tyser 	unsigned int count;
127*78acc472SPeter Tyser 	unsigned char *p;
128*78acc472SPeter Tyser 
129*78acc472SPeter Tyser 	/* Compute number of bytes mod 64 */
130*78acc472SPeter Tyser 	count = (ctx->bits[0] >> 3) & 0x3F;
131*78acc472SPeter Tyser 
132*78acc472SPeter Tyser 	/* Set the first char of padding to 0x80.  This is safe since there is
133*78acc472SPeter Tyser 	   always at least one byte free */
134*78acc472SPeter Tyser 	p = ctx->in + count;
135*78acc472SPeter Tyser 	*p++ = 0x80;
136*78acc472SPeter Tyser 
137*78acc472SPeter Tyser 	/* Bytes of padding needed to make 64 bytes */
138*78acc472SPeter Tyser 	count = 64 - 1 - count;
139*78acc472SPeter Tyser 
140*78acc472SPeter Tyser 	/* Pad out to 56 mod 64 */
141*78acc472SPeter Tyser 	if (count < 8) {
142*78acc472SPeter Tyser 		/* Two lots of padding:  Pad the first block to 64 bytes */
143*78acc472SPeter Tyser 		memset(p, 0, count);
144*78acc472SPeter Tyser 		byteReverse(ctx->in, 16);
145*78acc472SPeter Tyser 		MD5Transform(ctx->buf, (__u32 *) ctx->in);
146*78acc472SPeter Tyser 
147*78acc472SPeter Tyser 		/* Now fill the next block with 56 bytes */
148*78acc472SPeter Tyser 		memset(ctx->in, 0, 56);
149*78acc472SPeter Tyser 	} else {
150*78acc472SPeter Tyser 		/* Pad block to 56 bytes */
151*78acc472SPeter Tyser 		memset(p, 0, count - 8);
152*78acc472SPeter Tyser 	}
153*78acc472SPeter Tyser 	byteReverse(ctx->in, 14);
154*78acc472SPeter Tyser 
155*78acc472SPeter Tyser 	/* Append length in bits and transform */
156*78acc472SPeter Tyser 	((__u32 *) ctx->in)[14] = ctx->bits[0];
157*78acc472SPeter Tyser 	((__u32 *) ctx->in)[15] = ctx->bits[1];
158*78acc472SPeter Tyser 
159*78acc472SPeter Tyser 	MD5Transform(ctx->buf, (__u32 *) ctx->in);
160*78acc472SPeter Tyser 	byteReverse((unsigned char *) ctx->buf, 4);
161*78acc472SPeter Tyser 	memmove(digest, ctx->buf, 16);
162*78acc472SPeter Tyser 	memset(ctx, 0, sizeof(*ctx));	/* In case it's sensitive */
163*78acc472SPeter Tyser }
164*78acc472SPeter Tyser 
165*78acc472SPeter Tyser /* The four core functions - F1 is optimized somewhat */
166*78acc472SPeter Tyser 
167*78acc472SPeter Tyser /* #define F1(x, y, z) (x & y | ~x & z) */
168*78acc472SPeter Tyser #define F1(x, y, z) (z ^ (x & (y ^ z)))
169*78acc472SPeter Tyser #define F2(x, y, z) F1(z, x, y)
170*78acc472SPeter Tyser #define F3(x, y, z) (x ^ y ^ z)
171*78acc472SPeter Tyser #define F4(x, y, z) (y ^ (x | ~z))
172*78acc472SPeter Tyser 
173*78acc472SPeter Tyser /* This is the central step in the MD5 algorithm. */
174*78acc472SPeter Tyser #define MD5STEP(f, w, x, y, z, data, s) \
175*78acc472SPeter Tyser 	( w += f(x, y, z) + data,  w = w<<s | w>>(32-s),  w += x )
176*78acc472SPeter Tyser 
177*78acc472SPeter Tyser /*
178*78acc472SPeter Tyser  * The core of the MD5 algorithm, this alters an existing MD5 hash to
179*78acc472SPeter Tyser  * reflect the addition of 16 longwords of new data.  MD5Update blocks
180*78acc472SPeter Tyser  * the data and converts bytes into longwords for this routine.
181*78acc472SPeter Tyser  */
182*78acc472SPeter Tyser static void
183*78acc472SPeter Tyser MD5Transform(__u32 buf[4], __u32 const in[16])
184*78acc472SPeter Tyser {
185*78acc472SPeter Tyser 	register __u32 a, b, c, d;
186*78acc472SPeter Tyser 
187*78acc472SPeter Tyser 	a = buf[0];
188*78acc472SPeter Tyser 	b = buf[1];
189*78acc472SPeter Tyser 	c = buf[2];
190*78acc472SPeter Tyser 	d = buf[3];
191*78acc472SPeter Tyser 
192*78acc472SPeter Tyser 	MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
193*78acc472SPeter Tyser 	MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
194*78acc472SPeter Tyser 	MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
195*78acc472SPeter Tyser 	MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
196*78acc472SPeter Tyser 	MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
197*78acc472SPeter Tyser 	MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
198*78acc472SPeter Tyser 	MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
199*78acc472SPeter Tyser 	MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
200*78acc472SPeter Tyser 	MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
201*78acc472SPeter Tyser 	MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
202*78acc472SPeter Tyser 	MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
203*78acc472SPeter Tyser 	MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
204*78acc472SPeter Tyser 	MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
205*78acc472SPeter Tyser 	MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
206*78acc472SPeter Tyser 	MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
207*78acc472SPeter Tyser 	MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
208*78acc472SPeter Tyser 
209*78acc472SPeter Tyser 	MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
210*78acc472SPeter Tyser 	MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
211*78acc472SPeter Tyser 	MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
212*78acc472SPeter Tyser 	MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
213*78acc472SPeter Tyser 	MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
214*78acc472SPeter Tyser 	MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
215*78acc472SPeter Tyser 	MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
216*78acc472SPeter Tyser 	MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
217*78acc472SPeter Tyser 	MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
218*78acc472SPeter Tyser 	MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
219*78acc472SPeter Tyser 	MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
220*78acc472SPeter Tyser 	MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
221*78acc472SPeter Tyser 	MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
222*78acc472SPeter Tyser 	MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
223*78acc472SPeter Tyser 	MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
224*78acc472SPeter Tyser 	MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
225*78acc472SPeter Tyser 
226*78acc472SPeter Tyser 	MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
227*78acc472SPeter Tyser 	MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
228*78acc472SPeter Tyser 	MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
229*78acc472SPeter Tyser 	MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
230*78acc472SPeter Tyser 	MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
231*78acc472SPeter Tyser 	MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
232*78acc472SPeter Tyser 	MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
233*78acc472SPeter Tyser 	MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
234*78acc472SPeter Tyser 	MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
235*78acc472SPeter Tyser 	MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
236*78acc472SPeter Tyser 	MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
237*78acc472SPeter Tyser 	MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
238*78acc472SPeter Tyser 	MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
239*78acc472SPeter Tyser 	MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
240*78acc472SPeter Tyser 	MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
241*78acc472SPeter Tyser 	MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
242*78acc472SPeter Tyser 
243*78acc472SPeter Tyser 	MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
244*78acc472SPeter Tyser 	MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
245*78acc472SPeter Tyser 	MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
246*78acc472SPeter Tyser 	MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
247*78acc472SPeter Tyser 	MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
248*78acc472SPeter Tyser 	MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
249*78acc472SPeter Tyser 	MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
250*78acc472SPeter Tyser 	MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
251*78acc472SPeter Tyser 	MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
252*78acc472SPeter Tyser 	MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
253*78acc472SPeter Tyser 	MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
254*78acc472SPeter Tyser 	MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
255*78acc472SPeter Tyser 	MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
256*78acc472SPeter Tyser 	MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
257*78acc472SPeter Tyser 	MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
258*78acc472SPeter Tyser 	MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
259*78acc472SPeter Tyser 
260*78acc472SPeter Tyser 	buf[0] += a;
261*78acc472SPeter Tyser 	buf[1] += b;
262*78acc472SPeter Tyser 	buf[2] += c;
263*78acc472SPeter Tyser 	buf[3] += d;
264*78acc472SPeter Tyser }
265*78acc472SPeter Tyser 
266*78acc472SPeter Tyser /*
267*78acc472SPeter Tyser  * Calculate and store in 'output' the MD5 digest of 'len' bytes at
268*78acc472SPeter Tyser  * 'input'. 'output' must have enough space to hold 16 bytes.
269*78acc472SPeter Tyser  */
270*78acc472SPeter Tyser void
271*78acc472SPeter Tyser md5 (unsigned char *input, int len, unsigned char output[16])
272*78acc472SPeter Tyser {
273*78acc472SPeter Tyser 	struct MD5Context context;
274*78acc472SPeter Tyser 
275*78acc472SPeter Tyser 	MD5Init(&context);
276*78acc472SPeter Tyser 	MD5Update(&context, input, len);
277*78acc472SPeter Tyser 	MD5Final(output, &context);
278*78acc472SPeter Tyser }
279*78acc472SPeter Tyser 
280*78acc472SPeter Tyser 
281*78acc472SPeter Tyser /*
282*78acc472SPeter Tyser  * Calculate and store in 'output' the MD5 digest of 'len' bytes at 'input'.
283*78acc472SPeter Tyser  * 'output' must have enough space to hold 16 bytes. If 'chunk' Trigger the
284*78acc472SPeter Tyser  * watchdog every 'chunk_sz' bytes of input processed.
285*78acc472SPeter Tyser  */
286*78acc472SPeter Tyser void
287*78acc472SPeter Tyser md5_wd (unsigned char *input, int len, unsigned char output[16],
288*78acc472SPeter Tyser 	unsigned int chunk_sz)
289*78acc472SPeter Tyser {
290*78acc472SPeter Tyser 	struct MD5Context context;
291*78acc472SPeter Tyser #if defined(CONFIG_HW_WATCHDOG) || defined(CONFIG_WATCHDOG)
292*78acc472SPeter Tyser 	unsigned char *end, *curr;
293*78acc472SPeter Tyser 	int chunk;
294*78acc472SPeter Tyser #endif
295*78acc472SPeter Tyser 
296*78acc472SPeter Tyser 	MD5Init(&context);
297*78acc472SPeter Tyser 
298*78acc472SPeter Tyser #if defined(CONFIG_HW_WATCHDOG) || defined(CONFIG_WATCHDOG)
299*78acc472SPeter Tyser 	curr = input;
300*78acc472SPeter Tyser 	end = input + len;
301*78acc472SPeter Tyser 	while (curr < end) {
302*78acc472SPeter Tyser 		chunk = end - curr;
303*78acc472SPeter Tyser 		if (chunk > chunk_sz)
304*78acc472SPeter Tyser 			chunk = chunk_sz;
305*78acc472SPeter Tyser 		MD5Update(&context, curr, chunk);
306*78acc472SPeter Tyser 		curr += chunk;
307*78acc472SPeter Tyser 		WATCHDOG_RESET ();
308*78acc472SPeter Tyser 	}
309*78acc472SPeter Tyser #else
310*78acc472SPeter Tyser 	MD5Update(&context, input, len);
311*78acc472SPeter Tyser #endif
312*78acc472SPeter Tyser 
313*78acc472SPeter Tyser 	MD5Final(output, &context);
314*78acc472SPeter Tyser }
315