VirtualBox

source: vbox/trunk/src/VBox/Runtime/common/checksum/md5.cpp@ 25631

Last change on this file since 25631 was 22092, checked in by vboxsync, 15 years ago

iprt/md5.cpp|h: some cleanup and tuning to see how fast it can be (too slow for my purpose).

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 11.3 KB
Line 
1/* $Id: md5.cpp 22092 2009-08-07 21:17:39Z vboxsync $ */
2/** @file
3 * IPRT - MD5 message digest functions.
4 */
5
6/*
7 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * The contents of this file may alternatively be used under the terms
18 * of the Common Development and Distribution License Version 1.0
19 * (CDDL) only, as it comes in the "COPYING.CDDL" file of the
20 * VirtualBox OSE distribution, in which case the provisions of the
21 * CDDL are applicable instead of those of the GPL.
22 *
23 * You may elect to license modified versions of this file under the
24 * terms and conditions of either the GPL or the CDDL or both.
25 *
26 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
27 * Clara, CA 95054 USA or visit http://www.sun.com if you need
28 * additional information or have any questions.
29 */
30
31/* The code is virtually unchanged from the original version (see copyright
32 * notice below). Most changes are related to the function names and data
33 * types - in order to fit the code in the IPRT naming style. */
34
35/*
36 * This code implements the MD5 message-digest algorithm.
37 * The algorithm is due to Ron Rivest. This code was
38 * written by Colin Plumb in 1993, no copyright is claimed.
39 * This code is in the public domain; do with it what you wish.
40 *
41 * Equivalent code is available from RSA Data Security, Inc.
42 * This code has been tested against that, and is equivalent,
43 * except that you don't need to include two pages of legalese
44 * with every copy.
45 *
46 * To compute the message digest of a chunk of bytes, declare an
47 * RTMD5CONTEXT structure, pass it to MD5Init, call MD5Update as
48 * needed on buffers full of bytes, and then call MD5Final, which
49 * will fill a supplied 16-byte array with the digest.
50 */
51
52/*******************************************************************************
53* Header Files *
54*******************************************************************************/
55#include <iprt/md5.h>
56#include "internal/iprt.h"
57
58#include <iprt/string.h> /* for memcpy() */
59
60
61/*******************************************************************************
62* Defined Constants And Macros *
63*******************************************************************************/
64/* The four core functions - F1 is optimized somewhat */
65#if 1
66/* #define F1(x, y, z) (x & y | ~x & z) */
67# define F1(x, y, z) (z ^ (x & (y ^ z)))
68# define F2(x, y, z) F1(z, x, y)
69# define F3(x, y, z) (x ^ y ^ z)
70# define F4(x, y, z) (y ^ (x | ~z))
71#else /* gcc 4.0.1 (x86) benefits from the explicitness of F1() here. */
72DECL_FORCE_INLINE(uint32_t) F1(uint32_t x, uint32_t y, uint32_t z)
73{
74 register uint32_t r = y ^ z;
75 r &= x;
76 r ^= z;
77 return r;
78}
79# define F2(x, y, z) F1(z, x, y)
80DECL_FORCE_INLINE(uint32_t) F3(uint32_t x, uint32_t y, uint32_t z)
81{
82 register uint32_t r = x ^ y;
83 r ^= z;
84 return r;
85}
86DECL_FORCE_INLINE(uint32_t) F4(uint32_t x, uint32_t y, uint32_t z)
87{
88 register uint32_t r = ~z;
89 r |= x;
90 r ^= y;
91 return r;
92}
93#endif
94
95/* This is the central step in the MD5 algorithm. */
96#define MD5STEP(f, w, x, y, z, data, s) \
97 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
98
99
100/**
101 * The core of the MD5 algorithm, this alters an existing MD5 hash to reflect
102 * the addition of 16 longwords of new data. RTMd5Update blocks the data and
103 * converts bytes into longwords for this routine.
104 */
105static void rtMd5Transform(uint32_t buf[4], uint32_t const in[16])
106{
107 uint32_t a, b, c, d;
108
109 a = buf[0];
110 b = buf[1];
111 c = buf[2];
112 d = buf[3];
113
114 /* fn, w, x, y, z, data, s) */
115 MD5STEP(F1, a, b, c, d, in[ 0] + 0xd76aa478, 7);
116 MD5STEP(F1, d, a, b, c, in[ 1] + 0xe8c7b756, 12);
117 MD5STEP(F1, c, d, a, b, in[ 2] + 0x242070db, 17);
118 MD5STEP(F1, b, c, d, a, in[ 3] + 0xc1bdceee, 22);
119 MD5STEP(F1, a, b, c, d, in[ 4] + 0xf57c0faf, 7);
120 MD5STEP(F1, d, a, b, c, in[ 5] + 0x4787c62a, 12);
121 MD5STEP(F1, c, d, a, b, in[ 6] + 0xa8304613, 17);
122 MD5STEP(F1, b, c, d, a, in[ 7] + 0xfd469501, 22);
123 MD5STEP(F1, a, b, c, d, in[ 8] + 0x698098d8, 7);
124 MD5STEP(F1, d, a, b, c, in[ 9] + 0x8b44f7af, 12);
125 MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
126 MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
127 MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
128 MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
129 MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
130 MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
131
132 MD5STEP(F2, a, b, c, d, in[ 1] + 0xf61e2562, 5);
133 MD5STEP(F2, d, a, b, c, in[ 6] + 0xc040b340, 9);
134 MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
135 MD5STEP(F2, b, c, d, a, in[ 0] + 0xe9b6c7aa, 20);
136 MD5STEP(F2, a, b, c, d, in[ 5] + 0xd62f105d, 5);
137 MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
138 MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
139 MD5STEP(F2, b, c, d, a, in[ 4] + 0xe7d3fbc8, 20);
140 MD5STEP(F2, a, b, c, d, in[ 9] + 0x21e1cde6, 5);
141 MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
142 MD5STEP(F2, c, d, a, b, in[ 3] + 0xf4d50d87, 14);
143 MD5STEP(F2, b, c, d, a, in[ 8] + 0x455a14ed, 20);
144 MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
145 MD5STEP(F2, d, a, b, c, in[ 2] + 0xfcefa3f8, 9);
146 MD5STEP(F2, c, d, a, b, in[ 7] + 0x676f02d9, 14);
147 MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
148
149 MD5STEP(F3, a, b, c, d, in[ 5] + 0xfffa3942, 4);
150 MD5STEP(F3, d, a, b, c, in[ 8] + 0x8771f681, 11);
151 MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
152 MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
153 MD5STEP(F3, a, b, c, d, in[ 1] + 0xa4beea44, 4);
154 MD5STEP(F3, d, a, b, c, in[ 4] + 0x4bdecfa9, 11);
155 MD5STEP(F3, c, d, a, b, in[ 7] + 0xf6bb4b60, 16);
156 MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
157 MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
158 MD5STEP(F3, d, a, b, c, in[ 0] + 0xeaa127fa, 11);
159 MD5STEP(F3, c, d, a, b, in[ 3] + 0xd4ef3085, 16);
160 MD5STEP(F3, b, c, d, a, in[ 6] + 0x04881d05, 23);
161 MD5STEP(F3, a, b, c, d, in[ 9] + 0xd9d4d039, 4);
162 MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
163 MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
164 MD5STEP(F3, b, c, d, a, in[ 2] + 0xc4ac5665, 23);
165
166 MD5STEP(F4, a, b, c, d, in[ 0] + 0xf4292244, 6);
167 MD5STEP(F4, d, a, b, c, in[ 7] + 0x432aff97, 10);
168 MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
169 MD5STEP(F4, b, c, d, a, in[ 5] + 0xfc93a039, 21);
170 MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
171 MD5STEP(F4, d, a, b, c, in[ 3] + 0x8f0ccc92, 10);
172 MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
173 MD5STEP(F4, b, c, d, a, in[ 1] + 0x85845dd1, 21);
174 MD5STEP(F4, a, b, c, d, in[ 8] + 0x6fa87e4f, 6);
175 MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
176 MD5STEP(F4, c, d, a, b, in[ 6] + 0xa3014314, 15);
177 MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
178 MD5STEP(F4, a, b, c, d, in[ 4] + 0xf7537e82, 6);
179 MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
180 MD5STEP(F4, c, d, a, b, in[ 2] + 0x2ad7d2bb, 15);
181 MD5STEP(F4, b, c, d, a, in[ 9] + 0xeb86d391, 21);
182
183 buf[0] += a;
184 buf[1] += b;
185 buf[2] += c;
186 buf[3] += d;
187}
188
189
190#ifdef RT_BIG_ENDIAN
191/*
192 * Note: this code is harmless on little-endian machines.
193 */
194static void rtMd5ByteReverse(uint32_t *buf, unsigned int longs)
195{
196 uint32_t t;
197 do {
198 t = *buf
199 t = RT_LE2H_U32(t);
200 *buf = t;
201 buf++;
202 } while (--longs);
203}
204#else /* little endian - do nothing */
205# define rtMd5ByteReverse(buf, len) do { /* Nothing */ } while (0)
206#endif
207
208
209
210/*
211 * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious
212 * initialization constants.
213 */
214RTDECL(void) RTMd5Init(PRTMD5CONTEXT ctx)
215{
216 ctx->buf[0] = 0x67452301;
217 ctx->buf[1] = 0xefcdab89;
218 ctx->buf[2] = 0x98badcfe;
219 ctx->buf[3] = 0x10325476;
220
221 ctx->bits[0] = 0;
222 ctx->bits[1] = 0;
223}
224RT_EXPORT_SYMBOL(RTMd5Init);
225
226
227/*
228 * Update context to reflect the concatenation of another buffer full
229 * of bytes.
230 */
231RTDECL(void) RTMd5Update(PRTMD5CONTEXT ctx, const void *pvBuf, size_t len)
232{
233 const uint8_t *buf = (const uint8_t *)pvBuf;
234 uint32_t t;
235
236 /* Update bitcount */
237 t = ctx->bits[0];
238 if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t)
239 ctx->bits[1]++; /* Carry from low to high */
240 ctx->bits[1] += (uint32_t)(len >> 29);
241
242 t = (t >> 3) & 0x3f; /* Bytes already in shsInfo->data */
243
244 /* Handle any leading odd-sized chunks */
245 if (t) {
246 uint8_t *p = (uint8_t *) ctx->in + t;
247
248 t = 64 - t;
249 if (len < t) {
250 memcpy(p, buf, len);
251 return;
252 }
253 memcpy(p, buf, t);
254 rtMd5ByteReverse(ctx->in, 16);
255 rtMd5Transform(ctx->buf, ctx->in);
256 buf += t;
257 len -= t;
258 }
259
260 /* Process data in 64-byte chunks */
261#ifndef RT_BIG_ENDIAN
262 if (!((uintptr_t)buf & 0x3))
263 {
264 while (len >= 64) {
265 rtMd5Transform(ctx->buf, (uint32_t const *)buf);
266 buf += 64;
267 len -= 64;
268 }
269 }
270 else
271#endif
272 {
273 while (len >= 64) {
274 memcpy(ctx->in, buf, 64);
275 rtMd5ByteReverse(ctx->in, 16);
276 rtMd5Transform(ctx->buf, ctx->in);
277 buf += 64;
278 len -= 64;
279 }
280 }
281
282 /* Handle any remaining bytes of data */
283 memcpy(ctx->in, buf, len);
284}
285RT_EXPORT_SYMBOL(RTMd5Update);
286
287
288/*
289 * Final wrapup - pad to 64-byte boundary with the bit pattern
290 * 1 0* (64-bit count of bits processed, MSB-first)
291 */
292RTDECL(void) RTMd5Final(uint8_t digest[16], PRTMD5CONTEXT ctx)
293{
294 unsigned int count;
295 uint8_t *p;
296
297 /* Compute number of bytes mod 64 */
298 count = (ctx->bits[0] >> 3) & 0x3F;
299
300 /* Set the first char of padding to 0x80. This is safe since there is
301 always at least one byte free */
302 p = (uint8_t *)ctx->in + count;
303 *p++ = 0x80;
304
305 /* Bytes of padding needed to make 64 bytes */
306 count = 64 - 1 - count;
307
308 /* Pad out to 56 mod 64 */
309 if (count < 8) {
310 /* Two lots of padding: Pad the first block to 64 bytes */
311 memset(p, 0, count);
312 rtMd5ByteReverse(ctx->in, 16);
313 rtMd5Transform(ctx->buf, ctx->in);
314
315 /* Now fill the next block with 56 bytes */
316 memset(ctx->in, 0, 56);
317 } else {
318 /* Pad block to 56 bytes */
319 memset(p, 0, count - 8);
320 }
321 rtMd5ByteReverse(ctx->in, 14);
322
323 /* Append length in bits and transform */
324 ctx->in[14] = ctx->bits[0];
325 ctx->in[15] = ctx->bits[1];
326
327 rtMd5Transform(ctx->buf, ctx->in);
328 rtMd5ByteReverse(ctx->buf, 4);
329 memcpy(digest, ctx->buf, 16);
330 memset(ctx, 0, sizeof(ctx)); /* In case it's sensitive */
331}
332RT_EXPORT_SYMBOL(RTMd5Final);
333
334
335RTDECL(void) RTMd5(const void *pvBuf, size_t cbBuf, uint8_t pabDigest[RTMD5HASHSIZE])
336{
337#if 0
338 RTMD5CONTEXT Ctx[2];
339 PRTMD5CONTEXT const pCtx = RT_ALIGN_PT(&Ctx[0], 64, PRTMD5CONTEXT);
340#else
341 RTMD5CONTEXT Ctx;
342 PRTMD5CONTEXT const pCtx = &Ctx;
343#endif
344
345 RTMd5Init(pCtx);
346 for (;;)
347 {
348 uint32_t cb = (uint32_t)RT_MIN(cbBuf, _2M);
349 RTMd5Update(pCtx, pvBuf, cb);
350 if (cb == cbBuf)
351 break;
352 cbBuf -= cb;
353 pvBuf = (uint8_t const *)pvBuf + cb;
354 }
355 RTMd5Final(pabDigest, pCtx);
356}
357RT_EXPORT_SYMBOL(RTMd5);
358
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette