xref: /freebsd/crypto/openssl/crypto/md2/md2_dgst.c (revision aa0a1e58)
1 /* crypto/md2/md2_dgst.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include <openssl/md2.h>
63 #include <openssl/opensslv.h>
64 #include <openssl/crypto.h>
65 #ifdef OPENSSL_FIPS
66 #include <openssl/fips.h>
67 #endif
68 
69 #include <openssl/err.h>
70 
71 const char MD2_version[]="MD2" OPENSSL_VERSION_PTEXT;
72 
73 /* Implemented from RFC1319 The MD2 Message-Digest Algorithm
74  */
75 
76 #define UCHAR	unsigned char
77 
78 static void md2_block(MD2_CTX *c, const unsigned char *d);
79 /* The magic S table - I have converted it to hex since it is
80  * basically just a random byte string. */
81 static MD2_INT S[256]={
82 	0x29, 0x2E, 0x43, 0xC9, 0xA2, 0xD8, 0x7C, 0x01,
83 	0x3D, 0x36, 0x54, 0xA1, 0xEC, 0xF0, 0x06, 0x13,
84 	0x62, 0xA7, 0x05, 0xF3, 0xC0, 0xC7, 0x73, 0x8C,
85 	0x98, 0x93, 0x2B, 0xD9, 0xBC, 0x4C, 0x82, 0xCA,
86 	0x1E, 0x9B, 0x57, 0x3C, 0xFD, 0xD4, 0xE0, 0x16,
87 	0x67, 0x42, 0x6F, 0x18, 0x8A, 0x17, 0xE5, 0x12,
88 	0xBE, 0x4E, 0xC4, 0xD6, 0xDA, 0x9E, 0xDE, 0x49,
89 	0xA0, 0xFB, 0xF5, 0x8E, 0xBB, 0x2F, 0xEE, 0x7A,
90 	0xA9, 0x68, 0x79, 0x91, 0x15, 0xB2, 0x07, 0x3F,
91 	0x94, 0xC2, 0x10, 0x89, 0x0B, 0x22, 0x5F, 0x21,
92 	0x80, 0x7F, 0x5D, 0x9A, 0x5A, 0x90, 0x32, 0x27,
93 	0x35, 0x3E, 0xCC, 0xE7, 0xBF, 0xF7, 0x97, 0x03,
94 	0xFF, 0x19, 0x30, 0xB3, 0x48, 0xA5, 0xB5, 0xD1,
95 	0xD7, 0x5E, 0x92, 0x2A, 0xAC, 0x56, 0xAA, 0xC6,
96 	0x4F, 0xB8, 0x38, 0xD2, 0x96, 0xA4, 0x7D, 0xB6,
97 	0x76, 0xFC, 0x6B, 0xE2, 0x9C, 0x74, 0x04, 0xF1,
98 	0x45, 0x9D, 0x70, 0x59, 0x64, 0x71, 0x87, 0x20,
99 	0x86, 0x5B, 0xCF, 0x65, 0xE6, 0x2D, 0xA8, 0x02,
100 	0x1B, 0x60, 0x25, 0xAD, 0xAE, 0xB0, 0xB9, 0xF6,
101 	0x1C, 0x46, 0x61, 0x69, 0x34, 0x40, 0x7E, 0x0F,
102 	0x55, 0x47, 0xA3, 0x23, 0xDD, 0x51, 0xAF, 0x3A,
103 	0xC3, 0x5C, 0xF9, 0xCE, 0xBA, 0xC5, 0xEA, 0x26,
104 	0x2C, 0x53, 0x0D, 0x6E, 0x85, 0x28, 0x84, 0x09,
105 	0xD3, 0xDF, 0xCD, 0xF4, 0x41, 0x81, 0x4D, 0x52,
106 	0x6A, 0xDC, 0x37, 0xC8, 0x6C, 0xC1, 0xAB, 0xFA,
107 	0x24, 0xE1, 0x7B, 0x08, 0x0C, 0xBD, 0xB1, 0x4A,
108 	0x78, 0x88, 0x95, 0x8B, 0xE3, 0x63, 0xE8, 0x6D,
109 	0xE9, 0xCB, 0xD5, 0xFE, 0x3B, 0x00, 0x1D, 0x39,
110 	0xF2, 0xEF, 0xB7, 0x0E, 0x66, 0x58, 0xD0, 0xE4,
111 	0xA6, 0x77, 0x72, 0xF8, 0xEB, 0x75, 0x4B, 0x0A,
112 	0x31, 0x44, 0x50, 0xB4, 0x8F, 0xED, 0x1F, 0x1A,
113 	0xDB, 0x99, 0x8D, 0x33, 0x9F, 0x11, 0x83, 0x14,
114 	};
115 
116 const char *MD2_options(void)
117 	{
118 	if (sizeof(MD2_INT) == 1)
119 		return("md2(char)");
120 	else
121 		return("md2(int)");
122 	}
123 
124 FIPS_NON_FIPS_MD_Init(MD2)
125 	{
126 	c->num=0;
127 	memset(c->state,0,sizeof c->state);
128 	memset(c->cksm,0,sizeof c->cksm);
129 	memset(c->data,0,sizeof c->data);
130 	return 1;
131 	}
132 
133 int MD2_Update(MD2_CTX *c, const unsigned char *data, size_t len)
134 	{
135 	register UCHAR *p;
136 
137 	if (len == 0) return 1;
138 
139 	p=c->data;
140 	if (c->num != 0)
141 		{
142 		if ((c->num+len) >= MD2_BLOCK)
143 			{
144 			memcpy(&(p[c->num]),data,MD2_BLOCK-c->num);
145 			md2_block(c,c->data);
146 			data+=(MD2_BLOCK - c->num);
147 			len-=(MD2_BLOCK - c->num);
148 			c->num=0;
149 			/* drop through and do the rest */
150 			}
151 		else
152 			{
153 			memcpy(&(p[c->num]),data,len);
154 			/* data+=len; */
155 			c->num+=(int)len;
156 			return 1;
157 			}
158 		}
159 	/* we now can process the input data in blocks of MD2_BLOCK
160 	 * chars and save the leftovers to c->data. */
161 	while (len >= MD2_BLOCK)
162 		{
163 		md2_block(c,data);
164 		data+=MD2_BLOCK;
165 		len-=MD2_BLOCK;
166 		}
167 	memcpy(p,data,len);
168 	c->num=(int)len;
169 	return 1;
170 	}
171 
172 static void md2_block(MD2_CTX *c, const unsigned char *d)
173 	{
174 	register MD2_INT t,*sp1,*sp2;
175 	register int i,j;
176 	MD2_INT state[48];
177 
178 	sp1=c->state;
179 	sp2=c->cksm;
180 	j=sp2[MD2_BLOCK-1];
181 	for (i=0; i<16; i++)
182 		{
183 		state[i]=sp1[i];
184 		state[i+16]=t=d[i];
185 		state[i+32]=(t^sp1[i]);
186 		j=sp2[i]^=S[t^j];
187 		}
188 	t=0;
189 	for (i=0; i<18; i++)
190 		{
191 		for (j=0; j<48; j+=8)
192 			{
193 			t= state[j+ 0]^=S[t];
194 			t= state[j+ 1]^=S[t];
195 			t= state[j+ 2]^=S[t];
196 			t= state[j+ 3]^=S[t];
197 			t= state[j+ 4]^=S[t];
198 			t= state[j+ 5]^=S[t];
199 			t= state[j+ 6]^=S[t];
200 			t= state[j+ 7]^=S[t];
201 			}
202 		t=(t+i)&0xff;
203 		}
204 	memcpy(sp1,state,16*sizeof(MD2_INT));
205 	OPENSSL_cleanse(state,48*sizeof(MD2_INT));
206 	}
207 
208 int MD2_Final(unsigned char *md, MD2_CTX *c)
209 	{
210 	int i,v;
211 	register UCHAR *cp;
212 	register MD2_INT *p1,*p2;
213 
214 	cp=c->data;
215 	p1=c->state;
216 	p2=c->cksm;
217 	v=MD2_BLOCK-c->num;
218 	for (i=c->num; i<MD2_BLOCK; i++)
219 		cp[i]=(UCHAR)v;
220 
221 	md2_block(c,cp);
222 
223 	for (i=0; i<MD2_BLOCK; i++)
224 		cp[i]=(UCHAR)p2[i];
225 	md2_block(c,cp);
226 
227 	for (i=0; i<16; i++)
228 		md[i]=(UCHAR)(p1[i]&0xff);
229 	memset((char *)&c,0,sizeof(c));
230 	return 1;
231 	}
232 
233