1 // This is mozilla/security/manager/ssl/src/md4.c, CVS rev. 1.1, with trivial
2 // changes to port it to our source tree.
4 // WARNING: MD4 is cryptographically weak. Do not use MD4 except in NTLM
7 /* vim:set ts=2 sw=2 et cindent: */
8 /* ***** BEGIN LICENSE BLOCK *****
9 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
11 * The contents of this file are subject to the Mozilla Public License Version
12 * 1.1 (the "License"); you may not use this file except in compliance with
13 * the License. You may obtain a copy of the License at
14 * http://www.mozilla.org/MPL/
16 * Software distributed under the License is distributed on an "AS IS" basis,
17 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
18 * for the specific language governing rights and limitations under the
21 * The Original Code is Mozilla.
23 * The Initial Developer of the Original Code is IBM Corporation.
24 * Portions created by IBM Corporation are Copyright (C) 2003
25 * IBM Corporation. All Rights Reserved.
28 * Darin Fisher <darin@meer.net>
30 * Alternatively, the contents of this file may be used under the terms of
31 * either the GNU General Public License Version 2 or later (the "GPL"), or
32 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
33 * in which case the provisions of the GPL or the LGPL are applicable instead
34 * of those above. If you wish to allow use of your version of this file only
35 * under the terms of either the GPL or the LGPL, and not to allow others to
36 * use your version of this file under the terms of the MPL, indicate your
37 * decision by deleting the provisions above and replace them with the notice
38 * and other provisions required by the GPL or the LGPL. If you do not delete
39 * the provisions above, a recipient may use your version of this file under
40 * the terms of any one of the MPL, the GPL or the LGPL.
42 * ***** END LICENSE BLOCK ***** */
45 * "clean room" MD4 implementation (see RFC 1320)
48 #include "net/http/md4.h"
52 typedef uint32 Uint32
;
55 /* the "conditional" function */
56 #define F(x,y,z) (((x) & (y)) | (~(x) & (z)))
58 /* the "majority" function */
59 #define G(x,y,z) (((x) & (y)) | ((x) & (z)) | ((y) & (z)))
61 /* the "parity" function */
62 #define H(x,y,z) ((x) ^ (y) ^ (z))
64 /* rotate n-bits to the left */
65 #define ROTL(x,n) (((x) << (n)) | ((x) >> (0x20 - n)))
67 /* round 1: [abcd k s]: a = (a + F(b,c,d) + X[k]) <<< s */
68 #define RD1(a,b,c,d,k,s) a += F(b,c,d) + X[k]; a = ROTL(a,s)
70 /* round 2: [abcd k s]: a = (a + G(b,c,d) + X[k] + MAGIC) <<< s */
71 #define RD2(a,b,c,d,k,s) a += G(b,c,d) + X[k] + 0x5A827999; a = ROTL(a,s)
73 /* round 3: [abcd k s]: a = (a + H(b,c,d) + X[k] + MAGIC) <<< s */
74 #define RD3(a,b,c,d,k,s) a += H(b,c,d) + X[k] + 0x6ED9EBA1; a = ROTL(a,s)
76 /* converts from word array to byte array, len is number of bytes */
77 static void w2b(Uint8
*out
, const Uint32
*in
, Uint32 len
)
79 Uint8
*bp
; const Uint32
*wp
, *wpend
;
83 wpend
= wp
+ (len
>> 2);
85 for (; wp
!= wpend
; ++wp
, bp
+= 4)
87 bp
[0] = (Uint8
) ((*wp
) & 0xFF);
88 bp
[1] = (Uint8
) ((*wp
>> 8) & 0xFF);
89 bp
[2] = (Uint8
) ((*wp
>> 16) & 0xFF);
90 bp
[3] = (Uint8
) ((*wp
>> 24) & 0xFF);
94 /* converts from byte array to word array, len is number of bytes */
95 static void b2w(Uint32
*out
, const Uint8
*in
, Uint32 len
)
97 Uint32
*wp
; const Uint8
*bp
, *bpend
;
103 for (; bp
!= bpend
; bp
+= 4, ++wp
)
105 *wp
= (Uint32
) (bp
[0] ) |
106 (Uint32
) (bp
[1] << 8) |
107 (Uint32
) (bp
[2] << 16) |
108 (Uint32
) (bp
[3] << 24);
112 /* update state: data is 64 bytes in length */
113 static void md4step(Uint32 state
[4], const Uint8
*data
)
115 Uint32 A
, B
, C
, D
, X
[16];
124 RD1(A
,B
,C
,D
, 0,3); RD1(D
,A
,B
,C
, 1,7); RD1(C
,D
,A
,B
, 2,11); RD1(B
,C
,D
,A
, 3,19);
125 RD1(A
,B
,C
,D
, 4,3); RD1(D
,A
,B
,C
, 5,7); RD1(C
,D
,A
,B
, 6,11); RD1(B
,C
,D
,A
, 7,19);
126 RD1(A
,B
,C
,D
, 8,3); RD1(D
,A
,B
,C
, 9,7); RD1(C
,D
,A
,B
,10,11); RD1(B
,C
,D
,A
,11,19);
127 RD1(A
,B
,C
,D
,12,3); RD1(D
,A
,B
,C
,13,7); RD1(C
,D
,A
,B
,14,11); RD1(B
,C
,D
,A
,15,19);
129 RD2(A
,B
,C
,D
, 0,3); RD2(D
,A
,B
,C
, 4,5); RD2(C
,D
,A
,B
, 8, 9); RD2(B
,C
,D
,A
,12,13);
130 RD2(A
,B
,C
,D
, 1,3); RD2(D
,A
,B
,C
, 5,5); RD2(C
,D
,A
,B
, 9, 9); RD2(B
,C
,D
,A
,13,13);
131 RD2(A
,B
,C
,D
, 2,3); RD2(D
,A
,B
,C
, 6,5); RD2(C
,D
,A
,B
,10, 9); RD2(B
,C
,D
,A
,14,13);
132 RD2(A
,B
,C
,D
, 3,3); RD2(D
,A
,B
,C
, 7,5); RD2(C
,D
,A
,B
,11, 9); RD2(B
,C
,D
,A
,15,13);
134 RD3(A
,B
,C
,D
, 0,3); RD3(D
,A
,B
,C
, 8,9); RD3(C
,D
,A
,B
, 4,11); RD3(B
,C
,D
,A
,12,15);
135 RD3(A
,B
,C
,D
, 2,3); RD3(D
,A
,B
,C
,10,9); RD3(C
,D
,A
,B
, 6,11); RD3(B
,C
,D
,A
,14,15);
136 RD3(A
,B
,C
,D
, 1,3); RD3(D
,A
,B
,C
, 9,9); RD3(C
,D
,A
,B
, 5,11); RD3(B
,C
,D
,A
,13,15);
137 RD3(A
,B
,C
,D
, 3,3); RD3(D
,A
,B
,C
,11,9); RD3(C
,D
,A
,B
, 7,11); RD3(B
,C
,D
,A
,15,15);
146 namespace weak_crypto
{
148 void MD4Sum(const Uint8
*input
, Uint32 inputLen
, Uint8
*result
)
151 Uint32 i
, n
, m
, state
[4];
153 /* magic initial states */
154 state
[0] = 0x67452301;
155 state
[1] = 0xEFCDAB89;
156 state
[2] = 0x98BADCFE;
157 state
[3] = 0x10325476;
159 /* compute number of complete 64-byte segments contained in input */
162 /* digest first m segments */
164 md4step(state
, (input
+ (i
<< 6)));
166 /* build final buffer */
168 memcpy(final
, input
+ (m
<< 6), n
);
170 memset(final
+ n
+ 1, 0, 120 - (n
+ 1));
172 inputLen
= inputLen
<< 3;
173 w2b(final
+ (n
>= 56 ? 120 : 56), &inputLen
, 4);
175 md4step(state
, final
);
177 md4step(state
, final
+ 64);
179 /* copy state to result */
180 w2b(result
, state
, 16);
183 } // namespace net::weak_crypto