1 /*****************************************************************************\
2 * $Id: ipmi-md2.c,v 1.16 2010-02-08 22:09:40 chu11 Exp $
3 *****************************************************************************
4 * Copyright (C) 2007-2015 Lawrence Livermore National Security, LLC.
5 * Copyright (C) 2003-2007 The Regents of the University of California.
6 * Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
7 * Written by Albert Chu <chu11@llnl.gov>
8 * UCRL-CODE-155698
9 *
10 * This file is part of Ipmipower, a remote power control utility.
11 * For details, see http://www.llnl.gov/linux/.
12 *
13 * Ipmipower is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by the
15 * Free Software Foundation; either version 3 of the License, or (at your
16 * option) any later version.
17 *
18 * Ipmipower is distributed in the hope that it will be useful, but
19 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
20 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
21 * for more details.
22 *
23 * You should have received a copy of the GNU General Public License along
24 * with Ipmipower. If not, see <http://www.gnu.org/licenses/>.
25 \*****************************************************************************/
26
27 /* achu: Concern/question over license of openssl. Other
28 * implementations found online questionable. End result was
29 * re-implementation from scratch.
30 */
31
32 #ifdef HAVE_CONFIG_H
33 #include <config.h>
34 #endif /* HAVE_CONFIG_H */
35
36 #include <stdio.h>
37 #include <stdlib.h>
38 #ifdef STDC_HEADERS
39 #include <string.h>
40 #endif /* STDC_HEADERS */
41 #include <sys/types.h>
42 #include <errno.h>
43
44 #include "ipmi-md2.h"
45
46 #include "freeipmi-portability.h"
47
48 static char padding[16][16] =
49 {
50 { 0x01},
51 { 0x02,0x02},
52 { 0x03,0x03,0x03},
53 { 0x04,0x04,0x04,0x04},
54 { 0x05,0x05,0x05,0x05,0x05},
55 { 0x06,0x06,0x06,0x06,0x06,0x06},
56 { 0x07,0x07,0x07,0x07,0x07,0x07,0x07},
57 { 0x08,0x08,0x08,0x08,0x08,0x08,0x08,0x08},
58 { 0x09,0x09,0x09,0x09,0x09,0x09,0x09,0x09,0x09},
59 { 0x0A,0x0A,0x0A,0x0A,0x0A,0x0A,0x0A,0x0A,0x0A,0x0A},
60 { 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B},
61 { 0x0C,0x0C,0x0C,0x0C,0x0C,0x0C,0x0C,0x0C,0x0C,0x0C,0x0C,0x0C},
62 { 0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D,0x0D},
63 { 0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E,0x0E},
64 { 0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F,0x0F},
65 { 0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10,0x10}
66 };
67
68 static unsigned char S[256] =
69 {
70 0x29, 0x2E, 0x43, 0xC9, 0xA2, 0xD8, 0x7C, 0x01,
71 0x3D, 0x36, 0x54, 0xA1, 0xEC, 0xF0, 0x06, 0x13,
72 0x62, 0xA7, 0x05, 0xF3, 0xC0, 0xC7, 0x73, 0x8C,
73 0x98, 0x93, 0x2B, 0xD9, 0xBC, 0x4C, 0x82, 0xCA,
74 0x1E, 0x9B, 0x57, 0x3C, 0xFD, 0xD4, 0xE0, 0x16,
75 0x67, 0x42, 0x6F, 0x18, 0x8A, 0x17, 0xE5, 0x12,
76 0xBE, 0x4E, 0xC4, 0xD6, 0xDA, 0x9E, 0xDE, 0x49,
77 0xA0, 0xFB, 0xF5, 0x8E, 0xBB, 0x2F, 0xEE, 0x7A,
78 0xA9, 0x68, 0x79, 0x91, 0x15, 0xB2, 0x07, 0x3F,
79 0x94, 0xC2, 0x10, 0x89, 0x0B, 0x22, 0x5F, 0x21,
80 0x80, 0x7F, 0x5D, 0x9A, 0x5A, 0x90, 0x32, 0x27,
81 0x35, 0x3E, 0xCC, 0xE7, 0xBF, 0xF7, 0x97, 0x03,
82 0xFF, 0x19, 0x30, 0xB3, 0x48, 0xA5, 0xB5, 0xD1,
83 0xD7, 0x5E, 0x92, 0x2A, 0xAC, 0x56, 0xAA, 0xC6,
84 0x4F, 0xB8, 0x38, 0xD2, 0x96, 0xA4, 0x7D, 0xB6,
85 0x76, 0xFC, 0x6B, 0xE2, 0x9C, 0x74, 0x04, 0xF1,
86 0x45, 0x9D, 0x70, 0x59, 0x64, 0x71, 0x87, 0x20,
87 0x86, 0x5B, 0xCF, 0x65, 0xE6, 0x2D, 0xA8, 0x02,
88 0x1B, 0x60, 0x25, 0xAD, 0xAE, 0xB0, 0xB9, 0xF6,
89 0x1C, 0x46, 0x61, 0x69, 0x34, 0x40, 0x7E, 0x0F,
90 0x55, 0x47, 0xA3, 0x23, 0xDD, 0x51, 0xAF, 0x3A,
91 0xC3, 0x5C, 0xF9, 0xCE, 0xBA, 0xC5, 0xEA, 0x26,
92 0x2C, 0x53, 0x0D, 0x6E, 0x85, 0x28, 0x84, 0x09,
93 0xD3, 0xDF, 0xCD, 0xF4, 0x41, 0x81, 0x4D, 0x52,
94 0x6A, 0xDC, 0x37, 0xC8, 0x6C, 0xC1, 0xAB, 0xFA,
95 0x24, 0xE1, 0x7B, 0x08, 0x0C, 0xBD, 0xB1, 0x4A,
96 0x78, 0x88, 0x95, 0x8B, 0xE3, 0x63, 0xE8, 0x6D,
main(int argc,char ** argv)97 0xE9, 0xCB, 0xD5, 0xFE, 0x3B, 0x00, 0x1D, 0x39,
98 0xF2, 0xEF, 0xB7, 0x0E, 0x66, 0x58, 0xD0, 0xE4,
99 0xA6, 0x77, 0x72, 0xF8, 0xEB, 0x75, 0x4B, 0x0A,
100 0x31, 0x44, 0x50, 0xB4, 0x8F, 0xED, 0x1F, 0x1A,
101 0xDB, 0x99, 0x8D, 0x33, 0x9F, 0x11, 0x83, 0x14
102 };
103
104 #define L ctx->l
105 #define X ctx->x
106 #define C ctx->c
107 #define M ctx->m
108 #define Mlen ctx->mlen
109 #define MD2_MAGIC 0xf00fd00d
110
111 int
112 md2_init (md2_t *ctx)
113 {
114
115 if (ctx == NULL)
116 {
117 errno = EINVAL;
118 return (-1);
119 }
120
121 ctx->magic = MD2_MAGIC;
122
123 L = 0;
124 Mlen = 0;
125 memset (X, '\0', MD2_BUFFER_LENGTH);
126 memset (C, '\0', MD2_CHKSUM_LENGTH);
127 memset (M, '\0', MD2_BLOCK_LENGTH);
128
129 return (0);
130 }
131
132 static void
133 _md2_update_digest_and_checksum (md2_t *ctx)
134 {
135 unsigned int j, k;
136 uint8_t c, t;
137
138 /* Update X */
get_options(int * argc,char *** argv)139
140 for (j = 0; j < MD2_BLOCK_LENGTH; j++)
141 {
142 X[16+j] = M[j];
143 X[32+j] = (X[16+j] ^ X[j]);
144 }
145
146 t = 0;
147
148 for (j = 0; j < MD2_ROUNDS_LENGTH; j++)
149 {
150 for (k = 0; k < MD2_BUFFER_LENGTH; k++)
151 {
152 t = X[k] = (X[k] ^ S[t]);
print_version(void)153 }
154 t = (t + j) % 256;
155 }
156
157 /* Update C and L */
158
159 /* achu: Note that there is a typo in the RFC 1319 specification.
160 * In section 3.2, the line:
usage(void)161 *
162 * Set C[j] to S[c xor L]
163 *
164 * should read:
165 *
166 * Set C[j] to C[j] xor S[c xor L].
167 */
168
169 for (j = 0; j < MD2_BLOCK_LENGTH; j++)
170 {
171 c = M[j];
172 C[j] = C[j] ^ S[c ^ L];
173 L = C[j];
174 }
175 }
176
177 int
178 md2_update_data (md2_t *ctx, const void *buf, unsigned int buflen)
179 {
180
181 if (ctx == NULL || ctx->magic != MD2_MAGIC || buf == NULL)
182 {
set_run_mode(run_mode_t mode)183 errno = EINVAL;
184 return (-1);
185 }
186
187 if (buflen == 0)
188 return (0);
189
190 if ((Mlen + buflen) >= MD2_BLOCK_LENGTH)
191 {
192 unsigned int bufcount;
193
194 bufcount = (MD2_BLOCK_LENGTH - Mlen);
195 memcpy (M + Mlen, buf, bufcount);
196 _md2_update_digest_and_checksum (ctx);
get_one_option(int optid,const struct my_option * opt,char * argument)197
198 while ((buflen - bufcount) >= MD2_BLOCK_LENGTH)
199 {
200 memcpy (M, buf + bufcount, MD2_BLOCK_LENGTH);
201 bufcount += MD2_BLOCK_LENGTH;
202 _md2_update_digest_and_checksum (ctx);
203 }
204
205 Mlen = buflen - bufcount;
206 if (Mlen > 0)
207 memcpy (M, buf + bufcount, Mlen);
208 }
209 else
210 {
211 /* Not enough data to update X and C, just copy in data */
212 memcpy (M + Mlen, buf, buflen);
213 Mlen += buflen;
214 }
215
216 return (buflen);
217 }
218
219 static void
220 _md2_append_padding_and_checksum (md2_t *ctx)
stream_one_file(File file,xb_wstream_file_t * xbfile)221 {
222 unsigned int padlen;
223 int padindex;
224
225 padlen = MD2_PADDING_LENGTH - Mlen;
226 padindex = padlen - 1;
227
228 md2_update_data (ctx, padding[padindex], padlen);
229
230 md2_update_data (ctx, C, MD2_CHKSUM_LENGTH);
231 }
232
233 int
234 md2_finish (md2_t *ctx, void *digest, unsigned int digestlen)
235 {
236 if (ctx == NULL || ctx->magic != MD2_MAGIC
237 || digest == NULL || digestlen < MD2_DIGEST_LENGTH)
238 {
239 errno = EINVAL;
240 return (-1);
241 }
242
243 _md2_append_padding_and_checksum (ctx);
244 memcpy (digest, X, MD2_DIGEST_LENGTH);
245
246 ctx->magic = ~MD2_MAGIC;
247 return (MD2_DIGEST_LENGTH);
248 }
249
250