Coverage Report

Created: 2025-06-11 06:40

/src/boringssl/crypto/md5/md5.cc
Line
Count
Source (jump to first uncovered line)
1
// Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
2
//
3
// Licensed under the Apache License, Version 2.0 (the "License");
4
// you may not use this file except in compliance with the License.
5
// You may obtain a copy of the License at
6
//
7
//     https://www.apache.org/licenses/LICENSE-2.0
8
//
9
// Unless required by applicable law or agreed to in writing, software
10
// distributed under the License is distributed on an "AS IS" BASIS,
11
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
// See the License for the specific language governing permissions and
13
// limitations under the License.
14
15
#include <openssl/md5.h>
16
17
#include <string.h>
18
19
#include <openssl/mem.h>
20
#include <openssl/span.h>
21
22
#include "../fipsmodule/digest/md32_common.h"
23
#include "../internal.h"
24
#include "internal.h"
25
26
27
0
uint8_t *MD5(const uint8_t *data, size_t len, uint8_t out[MD5_DIGEST_LENGTH]) {
28
0
  MD5_CTX ctx;
29
0
  MD5_Init(&ctx);
30
0
  MD5_Update(&ctx, data, len);
31
0
  MD5_Final(out, &ctx);
32
33
0
  return out;
34
0
}
35
36
0
int MD5_Init(MD5_CTX *md5) {
37
0
  OPENSSL_memset(md5, 0, sizeof(MD5_CTX));
38
0
  md5->h[0] = 0x67452301UL;
39
0
  md5->h[1] = 0xefcdab89UL;
40
0
  md5->h[2] = 0x98badcfeUL;
41
0
  md5->h[3] = 0x10325476UL;
42
0
  return 1;
43
0
}
44
45
#if defined(MD5_ASM)
46
0
#define md5_block_data_order md5_block_asm_data_order
47
#else
48
static void md5_block_data_order(uint32_t *state, const uint8_t *data,
49
                                 size_t num);
50
#endif
51
52
0
void MD5_Transform(MD5_CTX *c, const uint8_t data[MD5_CBLOCK]) {
53
0
  md5_block_data_order(c->h, data, 1);
54
0
}
55
56
namespace {
57
struct MD5Traits {
58
  using HashContext = MD5_CTX;
59
  static constexpr size_t kBlockSize = MD5_CBLOCK;
60
  static constexpr bool kLengthIsBigEndian = false;
61
  static void HashBlocks(uint32_t *state, const uint8_t *data,
62
0
                         size_t num_blocks) {
63
0
    md5_block_data_order(state, data, num_blocks);
64
0
  }
65
};
66
}  // namespace
67
68
0
int MD5_Update(MD5_CTX *c, const void *data, size_t len) {
69
0
  bssl::crypto_md32_update<MD5Traits>(
70
0
      c, bssl::Span(static_cast<const uint8_t *>(data), len));
71
0
  return 1;
72
0
}
73
74
0
int MD5_Final(uint8_t out[MD5_DIGEST_LENGTH], MD5_CTX *c) {
75
0
  bssl::crypto_md32_final<MD5Traits>(c);
76
0
  CRYPTO_store_u32_le(out, c->h[0]);
77
0
  CRYPTO_store_u32_le(out + 4, c->h[1]);
78
0
  CRYPTO_store_u32_le(out + 8, c->h[2]);
79
0
  CRYPTO_store_u32_le(out + 12, c->h[3]);
80
0
  return 1;
81
0
}
82
83
// As pointed out by Wei Dai <weidai@eskimo.com>, the above can be
84
// simplified to the code below.  Wei attributes these optimizations
85
// to Peter Gutmann's SHS code, and he attributes it to Rich Schroeppel.
86
#define F(b, c, d) ((((c) ^ (d)) & (b)) ^ (d))
87
#define G(b, c, d) ((((b) ^ (c)) & (d)) ^ (c))
88
#define H(b, c, d) ((b) ^ (c) ^ (d))
89
#define I(b, c, d) (((~(d)) | (b)) ^ (c))
90
91
#define R0(a, b, c, d, k, s, t)            \
92
  do {                                     \
93
    (a) += ((k) + (t) + F((b), (c), (d))); \
94
    (a) = CRYPTO_rotl_u32(a, s);           \
95
    (a) += (b);                            \
96
  } while (0)
97
98
#define R1(a, b, c, d, k, s, t)            \
99
  do {                                     \
100
    (a) += ((k) + (t) + G((b), (c), (d))); \
101
    (a) = CRYPTO_rotl_u32(a, s);           \
102
    (a) += (b);                            \
103
  } while (0)
104
105
#define R2(a, b, c, d, k, s, t)            \
106
  do {                                     \
107
    (a) += ((k) + (t) + H((b), (c), (d))); \
108
    (a) = CRYPTO_rotl_u32(a, s);           \
109
    (a) += (b);                            \
110
  } while (0)
111
112
#define R3(a, b, c, d, k, s, t)            \
113
  do {                                     \
114
    (a) += ((k) + (t) + I((b), (c), (d))); \
115
    (a) = CRYPTO_rotl_u32(a, s);           \
116
    (a) += (b);                            \
117
  } while (0)
118
119
#ifndef MD5_ASM
120
#ifdef X
121
#undef X
122
#endif
123
static void md5_block_data_order(uint32_t *state, const uint8_t *data,
124
                                 size_t num) {
125
  uint32_t A, B, C, D;
126
  uint32_t XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7, XX8, XX9, XX10, XX11, XX12,
127
      XX13, XX14, XX15;
128
#define X(i) XX##i
129
130
  A = state[0];
131
  B = state[1];
132
  C = state[2];
133
  D = state[3];
134
135
  for (; num--;) {
136
    X(0) = CRYPTO_load_u32_le(data);
137
    data += 4;
138
    X(1) = CRYPTO_load_u32_le(data);
139
    data += 4;
140
    // Round 0
141
    R0(A, B, C, D, X(0), 7, 0xd76aa478L);
142
    X(2) = CRYPTO_load_u32_le(data);
143
    data += 4;
144
    R0(D, A, B, C, X(1), 12, 0xe8c7b756L);
145
    X(3) = CRYPTO_load_u32_le(data);
146
    data += 4;
147
    R0(C, D, A, B, X(2), 17, 0x242070dbL);
148
    X(4) = CRYPTO_load_u32_le(data);
149
    data += 4;
150
    R0(B, C, D, A, X(3), 22, 0xc1bdceeeL);
151
    X(5) = CRYPTO_load_u32_le(data);
152
    data += 4;
153
    R0(A, B, C, D, X(4), 7, 0xf57c0fafL);
154
    X(6) = CRYPTO_load_u32_le(data);
155
    data += 4;
156
    R0(D, A, B, C, X(5), 12, 0x4787c62aL);
157
    X(7) = CRYPTO_load_u32_le(data);
158
    data += 4;
159
    R0(C, D, A, B, X(6), 17, 0xa8304613L);
160
    X(8) = CRYPTO_load_u32_le(data);
161
    data += 4;
162
    R0(B, C, D, A, X(7), 22, 0xfd469501L);
163
    X(9) = CRYPTO_load_u32_le(data);
164
    data += 4;
165
    R0(A, B, C, D, X(8), 7, 0x698098d8L);
166
    X(10) = CRYPTO_load_u32_le(data);
167
    data += 4;
168
    R0(D, A, B, C, X(9), 12, 0x8b44f7afL);
169
    X(11) = CRYPTO_load_u32_le(data);
170
    data += 4;
171
    R0(C, D, A, B, X(10), 17, 0xffff5bb1L);
172
    X(12) = CRYPTO_load_u32_le(data);
173
    data += 4;
174
    R0(B, C, D, A, X(11), 22, 0x895cd7beL);
175
    X(13) = CRYPTO_load_u32_le(data);
176
    data += 4;
177
    R0(A, B, C, D, X(12), 7, 0x6b901122L);
178
    X(14) = CRYPTO_load_u32_le(data);
179
    data += 4;
180
    R0(D, A, B, C, X(13), 12, 0xfd987193L);
181
    X(15) = CRYPTO_load_u32_le(data);
182
    data += 4;
183
    R0(C, D, A, B, X(14), 17, 0xa679438eL);
184
    R0(B, C, D, A, X(15), 22, 0x49b40821L);
185
    // Round 1
186
    R1(A, B, C, D, X(1), 5, 0xf61e2562L);
187
    R1(D, A, B, C, X(6), 9, 0xc040b340L);
188
    R1(C, D, A, B, X(11), 14, 0x265e5a51L);
189
    R1(B, C, D, A, X(0), 20, 0xe9b6c7aaL);
190
    R1(A, B, C, D, X(5), 5, 0xd62f105dL);
191
    R1(D, A, B, C, X(10), 9, 0x02441453L);
192
    R1(C, D, A, B, X(15), 14, 0xd8a1e681L);
193
    R1(B, C, D, A, X(4), 20, 0xe7d3fbc8L);
194
    R1(A, B, C, D, X(9), 5, 0x21e1cde6L);
195
    R1(D, A, B, C, X(14), 9, 0xc33707d6L);
196
    R1(C, D, A, B, X(3), 14, 0xf4d50d87L);
197
    R1(B, C, D, A, X(8), 20, 0x455a14edL);
198
    R1(A, B, C, D, X(13), 5, 0xa9e3e905L);
199
    R1(D, A, B, C, X(2), 9, 0xfcefa3f8L);
200
    R1(C, D, A, B, X(7), 14, 0x676f02d9L);
201
    R1(B, C, D, A, X(12), 20, 0x8d2a4c8aL);
202
    // Round 2
203
    R2(A, B, C, D, X(5), 4, 0xfffa3942L);
204
    R2(D, A, B, C, X(8), 11, 0x8771f681L);
205
    R2(C, D, A, B, X(11), 16, 0x6d9d6122L);
206
    R2(B, C, D, A, X(14), 23, 0xfde5380cL);
207
    R2(A, B, C, D, X(1), 4, 0xa4beea44L);
208
    R2(D, A, B, C, X(4), 11, 0x4bdecfa9L);
209
    R2(C, D, A, B, X(7), 16, 0xf6bb4b60L);
210
    R2(B, C, D, A, X(10), 23, 0xbebfbc70L);
211
    R2(A, B, C, D, X(13), 4, 0x289b7ec6L);
212
    R2(D, A, B, C, X(0), 11, 0xeaa127faL);
213
    R2(C, D, A, B, X(3), 16, 0xd4ef3085L);
214
    R2(B, C, D, A, X(6), 23, 0x04881d05L);
215
    R2(A, B, C, D, X(9), 4, 0xd9d4d039L);
216
    R2(D, A, B, C, X(12), 11, 0xe6db99e5L);
217
    R2(C, D, A, B, X(15), 16, 0x1fa27cf8L);
218
    R2(B, C, D, A, X(2), 23, 0xc4ac5665L);
219
    // Round 3
220
    R3(A, B, C, D, X(0), 6, 0xf4292244L);
221
    R3(D, A, B, C, X(7), 10, 0x432aff97L);
222
    R3(C, D, A, B, X(14), 15, 0xab9423a7L);
223
    R3(B, C, D, A, X(5), 21, 0xfc93a039L);
224
    R3(A, B, C, D, X(12), 6, 0x655b59c3L);
225
    R3(D, A, B, C, X(3), 10, 0x8f0ccc92L);
226
    R3(C, D, A, B, X(10), 15, 0xffeff47dL);
227
    R3(B, C, D, A, X(1), 21, 0x85845dd1L);
228
    R3(A, B, C, D, X(8), 6, 0x6fa87e4fL);
229
    R3(D, A, B, C, X(15), 10, 0xfe2ce6e0L);
230
    R3(C, D, A, B, X(6), 15, 0xa3014314L);
231
    R3(B, C, D, A, X(13), 21, 0x4e0811a1L);
232
    R3(A, B, C, D, X(4), 6, 0xf7537e82L);
233
    R3(D, A, B, C, X(11), 10, 0xbd3af235L);
234
    R3(C, D, A, B, X(2), 15, 0x2ad7d2bbL);
235
    R3(B, C, D, A, X(9), 21, 0xeb86d391L);
236
237
    A = state[0] += A;
238
    B = state[1] += B;
239
    C = state[2] += C;
240
    D = state[3] += D;
241
  }
242
}
243
#undef X
244
#endif
245
246
#undef F
247
#undef G
248
#undef H
249
#undef I
250
#undef R0
251
#undef R1
252
#undef R2
253
#undef R3