2 Bacula® - The Network Backup Solution
4 Copyright (C) 2000-2009 Free Software Foundation Europe e.V.
6 The main author of Bacula is Kern Sibbald, with contributions from
7 many others, a complete list can be found in the file AUTHORS.
8 This program is Free Software; you can redistribute it and/or
9 modify it under the terms of version three of the GNU Affero General Public
10 License as published by the Free Software Foundation and included
13 This program is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU Affero General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
23 Bacula® is a registered trademark of Kern Sibbald.
24 The licensor of Bacula is the Free Software Foundation Europe
25 (FSFE), Fiduciary Program, Sumatrastrasse 25, 8006 Zürich,
26 Switzerland, email:ftf@fsfeurope.org.
29 * This code implements the MD5 message-digest algorithm.
30 * The algorithm is due to Ron Rivest. This code was
31 * written by Colin Plumb in 1993, no copyright is claimed.
32 * This code is in the public domain; do with it what you wish.
34 * Equivalent code is available from RSA Data Security, Inc.
35 * This code has been tested against that, and is equivalent,
36 * except that you don't need to include two pages of legalese
39 * To compute the message digest of a chunk of bytes, declare an
40 * MD5Context structure, pass it to MD5Init, call MD5Update as
41 * needed on buffers full of bytes, and then call MD5Final, which
42 * will fill a supplied 16-byte array with the digest.
47 /* Brutally hacked by John Walker back from ANSI C to K&R (no
48 prototypes) to maintain the tradition that Netfone will compile
49 with Sun's original "cc". */
56 * Note: this code is harmless on little-endian machines. We'll swap the bytes
57 * on big-endian machines.
59 void byteReverse(unsigned char *buf, unsigned longs)
64 t = (uint32_t) ((unsigned) buf[3] << 8 | buf[2]) << 16 |
65 ((unsigned) buf[1] << 8 | buf[0]);
66 *(uint32_t *) buf = t;
73 * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious
74 * initialization constants.
76 void MD5Init(struct MD5Context *ctx)
78 ctx->buf[0] = 0x67452301;
79 ctx->buf[1] = 0xefcdab89;
80 ctx->buf[2] = 0x98badcfe;
81 ctx->buf[3] = 0x10325476;
88 * Update context to reflect the concatenation of another buffer full
91 void MD5Update(struct MD5Context *ctx, unsigned char *buf, unsigned len)
98 if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t)
99 ctx->bits[1]++; /* Carry from low to high */
100 ctx->bits[1] += len >> 29;
102 t = (t >> 3) & 0x3f; /* Bytes already in shsInfo->data */
104 /* Handle any leading odd-sized chunks */
107 unsigned char *p = (unsigned char *) ctx->in + t;
115 byteReverse(ctx->in, 16);
116 MD5Transform(ctx->buf, (uint32_t *) ctx->in);
120 /* Process data in 64-byte chunks */
123 memcpy(ctx->in, buf, 64);
124 byteReverse(ctx->in, 16);
125 MD5Transform(ctx->buf, (uint32_t *) ctx->in);
130 /* Handle any remaining bytes of data. */
132 memcpy(ctx->in, buf, len);
136 * Final wrapup - pad to 64-byte boundary with the bit pattern
137 * 1 0* (64-bit count of bits processed, MSB-first)
139 void MD5Final(unsigned char digest[16], struct MD5Context *ctx)
144 /* Compute number of bytes mod 64 */
145 count = (ctx->bits[0] >> 3) & 0x3F;
147 /* Set the first char of padding to 0x80. This is safe since there is
148 always at least one byte free */
152 /* Bytes of padding needed to make 64 bytes */
153 count = 64 - 1 - count;
155 /* Pad out to 56 mod 64 */
157 /* Two lots of padding: Pad the first block to 64 bytes */
159 byteReverse(ctx->in, 16);
160 MD5Transform(ctx->buf, (uint32_t *) ctx->in);
162 /* Now fill the next block with 56 bytes */
163 memset(ctx->in, 0, 56);
165 /* Pad block to 56 bytes */
166 memset(p, 0, count - 8);
168 byteReverse(ctx->in, 14);
170 /* Append length in bits and transform */
171 ((uint32_t *) ctx->in)[14] = ctx->bits[0];
172 ((uint32_t *) ctx->in)[15] = ctx->bits[1];
174 MD5Transform(ctx->buf, (uint32_t *) ctx->in);
175 byteReverse((unsigned char *) ctx->buf, 4);
176 memcpy(digest, ctx->buf, 16);
177 memset(ctx, 0, sizeof(ctx)); /* In case it's sensitive */
181 /* The four core functions - F1 is optimized somewhat */
183 /* #define F1(x, y, z) (x & y | ~x & z) */
184 #define F1(x, y, z) (z ^ (x & (y ^ z)))
185 #define F2(x, y, z) F1(z, x, y)
186 #define F3(x, y, z) (x ^ y ^ z)
187 #define F4(x, y, z) (y ^ (x | ~z))
189 /* This is the central step in the MD5 algorithm. */
190 #define MD5STEP(f, w, x, y, z, data, s) \
191 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
194 * The core of the MD5 algorithm, this alters an existing MD5 hash to
195 * reflect the addition of 16 longwords of new data. MD5Update blocks
196 * the data and converts bytes into longwords for this routine.
198 void MD5Transform(uint32_t buf[4], uint32_t in[16])
200 register uint32_t a, b, c, d;
207 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
208 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
209 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
210 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
211 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
212 MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
213 MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
214 MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
215 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
216 MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
217 MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
218 MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
219 MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
220 MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
221 MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
222 MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
224 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
225 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
226 MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
227 MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
228 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
229 MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
230 MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
231 MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
232 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
233 MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
234 MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
235 MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
236 MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
237 MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
238 MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
239 MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
241 MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
242 MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
243 MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
244 MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
245 MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
246 MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
247 MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
248 MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
249 MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
250 MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
251 MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
252 MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
253 MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
254 MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
255 MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
256 MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
258 MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
259 MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
260 MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
261 MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
262 MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
263 MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
264 MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
265 MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
266 MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
267 MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
268 MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
269 MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
270 MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
271 MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
272 MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
273 MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
282 #define OUTPUT_BASE64 1
288 "Usage: md5sum [-d decode] <data-file>\n"
289 " -d decode the data file\n"
290 " -? print this message.\n"
296 static bool decode = false;
299 * Reads a single ASCII file and prints the HEX md5 sum.
302 int main(int argc, char *argv[])
310 while ((ch = getopt(argc, argv, "d?")) != -1) {
325 printf("Must have filename\n");
329 fd = fopen(argv[0], "rb");
331 printf("Could not open %s: ERR=%s\n", argv[0], strerror(errno));
338 while (fgets(buf, sizeof(buf), fd)) {
339 MD5Update(&ctx, (unsigned char *)buf, strlen(buf));
341 MD5Final((unsigned char *)signature, &ctx);
342 for (int i=0; i < 16; i++) {
343 printf("%02x", signature[i]& 0xFF);
346 char MD5buf[40]; /* 24 should do */
347 memset(MD5buf, 0, 40);
348 bin_to_base64(MD5buf, sizeof(MD5buf), (char *)signature, 16, true); /* encode 16 bytes */
349 printf(" %s", MD5buf);
351 printf(" %s\n", argv[0]);
355 while (fgets(buf, sizeof(buf), fd)) {
357 unsigned char *p = (unsigned char *)buf;
360 for (int i=0; i < 16; i++) {
373 signature[i] = ch + val;
378 bin_to_base64(bin, sizeof(bin), (char *)signature, 16, true);