cyassl re-port with cellular comms, PSK test
Dependencies: VodafoneUSBModem_bleedingedge2 mbed-rtos mbed-src
md4.c
00001 /* md4.c 00002 * 00003 * Copyright (C) 2006-2012 Sawtooth Consulting Ltd. 00004 * 00005 * This file is part of CyaSSL. 00006 * 00007 * CyaSSL is free software; you can redistribute it and/or modify 00008 * it under the terms of the GNU General Public License as published by 00009 * the Free Software Foundation; either version 2 of the License, or 00010 * (at your option) any later version. 00011 * 00012 * CyaSSL is distributed in the hope that it will be useful, 00013 * but WITHOUT ANY WARRANTY; without even the implied warranty of 00014 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 00015 * GNU General Public License for more details. 00016 * 00017 * You should have received a copy of the GNU General Public License 00018 * along with this program; if not, write to the Free Software 00019 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA 00020 */ 00021 00022 #ifdef HAVE_CONFIG_H 00023 #include <config.h> 00024 #endif 00025 00026 00027 #ifndef NO_MD4 00028 00029 #include <cyassl/ctaocrypt/md4.h> 00030 #ifdef NO_INLINE 00031 #include <cyassl/ctaocrypt/misc.h> 00032 #else 00033 #include <ctaocrypt/src/misc.c> 00034 #endif 00035 00036 00037 #ifndef min 00038 00039 static INLINE word32 min(word32 a, word32 b) 00040 { 00041 return a > b ? b : a; 00042 } 00043 00044 #endif /* min */ 00045 00046 00047 void InitMd4(Md4* md4) 00048 { 00049 md4->digest[0] = 0x67452301L; 00050 md4->digest[1] = 0xefcdab89L; 00051 md4->digest[2] = 0x98badcfeL; 00052 md4->digest[3] = 0x10325476L; 00053 00054 md4->buffLen = 0; 00055 md4->loLen = 0; 00056 md4->hiLen = 0; 00057 } 00058 00059 00060 static void Transform(Md4* md4) 00061 { 00062 #define F(x, y, z) ((z) ^ ((x) & ((y) ^ (z)))) 00063 #define G(x, y, z) (((x) & (y)) | ((x) & (z)) | ((y) & (z))) 00064 #define H(x, y, z) ((x) ^ (y) ^ (z)) 00065 00066 /* Copy context->state[] to working vars */ 00067 word32 A = md4->digest[0]; 00068 word32 B = md4->digest[1]; 00069 word32 C = md4->digest[2]; 00070 word32 D = md4->digest[3]; 00071 00072 #define function(a,b,c,d,k,s) a=rotlFixed(a+F(b,c,d)+md4->buffer[k],s); 00073 function(A,B,C,D, 0, 3); 00074 function(D,A,B,C, 1, 7); 00075 function(C,D,A,B, 2,11); 00076 function(B,C,D,A, 3,19); 00077 function(A,B,C,D, 4, 3); 00078 function(D,A,B,C, 5, 7); 00079 function(C,D,A,B, 6,11); 00080 function(B,C,D,A, 7,19); 00081 function(A,B,C,D, 8, 3); 00082 function(D,A,B,C, 9, 7); 00083 function(C,D,A,B,10,11); 00084 function(B,C,D,A,11,19); 00085 function(A,B,C,D,12, 3); 00086 function(D,A,B,C,13, 7); 00087 function(C,D,A,B,14,11); 00088 function(B,C,D,A,15,19); 00089 00090 #undef function 00091 #define function(a,b,c,d,k,s) \ 00092 a=rotlFixed(a+G(b,c,d)+md4->buffer[k]+0x5a827999,s); 00093 00094 function(A,B,C,D, 0, 3); 00095 function(D,A,B,C, 4, 5); 00096 function(C,D,A,B, 8, 9); 00097 function(B,C,D,A,12,13); 00098 function(A,B,C,D, 1, 3); 00099 function(D,A,B,C, 5, 5); 00100 function(C,D,A,B, 9, 9); 00101 function(B,C,D,A,13,13); 00102 function(A,B,C,D, 2, 3); 00103 function(D,A,B,C, 6, 5); 00104 function(C,D,A,B,10, 9); 00105 function(B,C,D,A,14,13); 00106 function(A,B,C,D, 3, 3); 00107 function(D,A,B,C, 7, 5); 00108 function(C,D,A,B,11, 9); 00109 function(B,C,D,A,15,13); 00110 00111 #undef function 00112 #define function(a,b,c,d,k,s) \ 00113 a=rotlFixed(a+H(b,c,d)+md4->buffer[k]+0x6ed9eba1,s); 00114 00115 function(A,B,C,D, 0, 3); 00116 function(D,A,B,C, 8, 9); 00117 function(C,D,A,B, 4,11); 00118 function(B,C,D,A,12,15); 00119 function(A,B,C,D, 2, 3); 00120 function(D,A,B,C,10, 9); 00121 function(C,D,A,B, 6,11); 00122 function(B,C,D,A,14,15); 00123 function(A,B,C,D, 1, 3); 00124 function(D,A,B,C, 9, 9); 00125 function(C,D,A,B, 5,11); 00126 function(B,C,D,A,13,15); 00127 function(A,B,C,D, 3, 3); 00128 function(D,A,B,C,11, 9); 00129 function(C,D,A,B, 7,11); 00130 function(B,C,D,A,15,15); 00131 00132 /* Add the working vars back into digest state[] */ 00133 md4->digest[0] += A; 00134 md4->digest[1] += B; 00135 md4->digest[2] += C; 00136 md4->digest[3] += D; 00137 } 00138 00139 00140 static INLINE void AddLength(Md4* md4, word32 len) 00141 { 00142 word32 tmp = md4->loLen; 00143 if ( (md4->loLen += len) < tmp) 00144 md4->hiLen++; /* carry low to high */ 00145 } 00146 00147 00148 void Md4Update(Md4* md4, const byte* data, word32 len) 00149 { 00150 /* do block size increments */ 00151 byte* local = (byte*)md4->buffer; 00152 00153 while (len) { 00154 word32 add = min(len, MD4_BLOCK_SIZE - md4->buffLen); 00155 XMEMCPY(&local[md4->buffLen], data, add); 00156 00157 md4->buffLen += add; 00158 data += add; 00159 len -= add; 00160 00161 if (md4->buffLen == MD4_BLOCK_SIZE) { 00162 #ifdef BIG_ENDIAN_ORDER 00163 ByteReverseBytes(local, local, MD4_BLOCK_SIZE); 00164 #endif 00165 Transform(md4); 00166 AddLength(md4, MD4_BLOCK_SIZE); 00167 md4->buffLen = 0; 00168 } 00169 } 00170 } 00171 00172 00173 void Md4Final(Md4* md4, byte* hash) 00174 { 00175 byte* local = (byte*)md4->buffer; 00176 00177 AddLength(md4, md4->buffLen); /* before adding pads */ 00178 00179 local[md4->buffLen++] = 0x80; /* add 1 */ 00180 00181 /* pad with zeros */ 00182 if (md4->buffLen > MD4_PAD_SIZE) { 00183 XMEMSET(&local[md4->buffLen], 0, MD4_BLOCK_SIZE - md4->buffLen); 00184 md4->buffLen += MD4_BLOCK_SIZE - md4->buffLen; 00185 00186 #ifdef BIG_ENDIAN_ORDER 00187 ByteReverseBytes(local, local, MD4_BLOCK_SIZE); 00188 #endif 00189 Transform(md4); 00190 md4->buffLen = 0; 00191 } 00192 XMEMSET(&local[md4->buffLen], 0, MD4_PAD_SIZE - md4->buffLen); 00193 00194 /* put lengths in bits */ 00195 md4->hiLen = (md4->loLen >> (8*sizeof(md4->loLen) - 3)) + 00196 (md4->hiLen << 3); 00197 md4->loLen = md4->loLen << 3; 00198 00199 /* store lengths */ 00200 #ifdef BIG_ENDIAN_ORDER 00201 ByteReverseBytes(local, local, MD4_BLOCK_SIZE); 00202 #endif 00203 /* ! length ordering dependent on digest endian type ! */ 00204 XMEMCPY(&local[MD4_PAD_SIZE], &md4->loLen, sizeof(word32)); 00205 XMEMCPY(&local[MD4_PAD_SIZE + sizeof(word32)], &md4->hiLen, sizeof(word32)); 00206 00207 Transform(md4); 00208 #ifdef BIG_ENDIAN_ORDER 00209 ByteReverseWords(md4->digest, md4->digest, MD4_DIGEST_SIZE); 00210 #endif 00211 XMEMCPY(hash, md4->digest, MD4_DIGEST_SIZE); 00212 00213 InitMd4(md4); /* reset state */ 00214 } 00215 00216 00217 #endif /* NO_MD4 */ 00218
Generated on Thu Jul 14 2022 00:25:23 by 1.7.2