blob: c4ac94e0f4c4065743baa0ff14830eb23934b78c [file] [log] [blame]
Theodore Ts'o52783e02002-03-11 15:04:45 -05001/*
2 * dirhash.c -- Calculate the hash of a directory entry
3 *
4 * Copyright (c) 2001 Daniel Phillips
Theodore Ts'oefc6f622008-08-27 23:07:54 -04005 *
Theodore Ts'o52783e02002-03-11 15:04:45 -05006 * Copyright (c) 2002 Theodore Ts'o.
7 *
8 * %Begin-Header%
Theodore Ts'o543547a2010-05-17 21:31:56 -04009 * This file may be redistributed under the terms of the GNU Library
10 * General Public License, version 2.
Theodore Ts'o52783e02002-03-11 15:04:45 -050011 * %End-Header%
12 */
13
Theodore Ts'od1154eb2011-09-18 17:34:37 -040014#include "config.h"
Theodore Ts'o52783e02002-03-11 15:04:45 -050015#include <stdio.h>
Theodore Ts'od3f91792003-01-25 00:26:48 -050016#include <string.h>
Theodore Ts'o52783e02002-03-11 15:04:45 -050017
18#include "ext2_fs.h"
19#include "ext2fs.h"
20
Theodore Ts'ob33278c2002-08-17 10:52:51 -040021/*
22 * Keyed 32-bit hash function using TEA in a Davis-Meyer function
23 * H0 = Key
24 * Hi = E Mi(Hi-1) + Hi-1
25 *
26 * (see Applied Cryptography, 2nd edition, p448).
27 *
28 * Jeremy Fitzhardinge <jeremy@zip.com.au> 1998
Theodore Ts'oefc6f622008-08-27 23:07:54 -040029 *
Theodore Ts'ob33278c2002-08-17 10:52:51 -040030 * This code is made available under the terms of the GPL
31 */
32#define DELTA 0x9E3779B9
33
34static void TEA_transform(__u32 buf[4], __u32 const in[])
35{
36 __u32 sum = 0;
37 __u32 b0 = buf[0], b1 = buf[1];
38 __u32 a = in[0], b = in[1], c = in[2], d = in[3];
39 int n = 16;
40
Theodore Ts'oefc6f622008-08-27 23:07:54 -040041 do {
42 sum += DELTA;
43 b0 += ((b1 << 4)+a) ^ (b1+sum) ^ ((b1 >> 5)+b);
44 b1 += ((b0 << 4)+c) ^ (b0+sum) ^ ((b0 >> 5)+d);
Theodore Ts'ob33278c2002-08-17 10:52:51 -040045 } while(--n);
46
47 buf[0] += b0;
48 buf[1] += b1;
49}
50
Theodore Ts'o503f9e72002-06-26 16:52:10 -040051/* F, G and H are basic MD4 functions: selection, majority, parity */
52#define F(x, y, z) ((z) ^ ((x) & ((y) ^ (z))))
53#define G(x, y, z) (((x) & (y)) + (((x) ^ (y)) & (z)))
54#define H(x, y, z) ((x) ^ (y) ^ (z))
55
56/*
57 * The generic round function. The application is so specific that
58 * we don't bother protecting all the arguments with parens, as is generally
59 * good macro practice, in favor of extra legibility.
60 * Rotation is separate from addition to prevent recomputation
61 */
62#define ROUND(f, a, b, c, d, x, s) \
63 (a += f(b, c, d) + x, a = (a << s) | (a >> (32-s)))
64#define K1 0
65#define K2 013240474631UL
66#define K3 015666365641UL
67
68/*
69 * Basic cut-down MD4 transform. Returns only 32 bits of result.
70 */
Theodore Ts'ob33278c2002-08-17 10:52:51 -040071static void halfMD4Transform (__u32 buf[4], __u32 const in[])
Theodore Ts'o503f9e72002-06-26 16:52:10 -040072{
73 __u32 a = buf[0], b = buf[1], c = buf[2], d = buf[3];
74
75 /* Round 1 */
76 ROUND(F, a, b, c, d, in[0] + K1, 3);
77 ROUND(F, d, a, b, c, in[1] + K1, 7);
78 ROUND(F, c, d, a, b, in[2] + K1, 11);
79 ROUND(F, b, c, d, a, in[3] + K1, 19);
80 ROUND(F, a, b, c, d, in[4] + K1, 3);
81 ROUND(F, d, a, b, c, in[5] + K1, 7);
82 ROUND(F, c, d, a, b, in[6] + K1, 11);
83 ROUND(F, b, c, d, a, in[7] + K1, 19);
84
85 /* Round 2 */
86 ROUND(G, a, b, c, d, in[1] + K2, 3);
87 ROUND(G, d, a, b, c, in[3] + K2, 5);
88 ROUND(G, c, d, a, b, in[5] + K2, 9);
89 ROUND(G, b, c, d, a, in[7] + K2, 13);
90 ROUND(G, a, b, c, d, in[0] + K2, 3);
91 ROUND(G, d, a, b, c, in[2] + K2, 5);
92 ROUND(G, c, d, a, b, in[4] + K2, 9);
93 ROUND(G, b, c, d, a, in[6] + K2, 13);
94
95 /* Round 3 */
96 ROUND(H, a, b, c, d, in[3] + K3, 3);
97 ROUND(H, d, a, b, c, in[7] + K3, 9);
98 ROUND(H, c, d, a, b, in[2] + K3, 11);
99 ROUND(H, b, c, d, a, in[6] + K3, 15);
100 ROUND(H, a, b, c, d, in[1] + K3, 3);
101 ROUND(H, d, a, b, c, in[5] + K3, 9);
102 ROUND(H, c, d, a, b, in[0] + K3, 11);
103 ROUND(H, b, c, d, a, in[4] + K3, 15);
104
105 buf[0] += a;
106 buf[1] += b;
107 buf[2] += c;
108 buf[3] += d;
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400109}
110
111#undef ROUND
112#undef F
113#undef G
114#undef H
115#undef K1
116#undef K2
117#undef K3
118
119/* The old legacy hash */
Theodore Ts'of77704e2006-11-11 22:32:35 -0500120static ext2_dirhash_t dx_hack_hash (const char *name, int len,
121 int unsigned_flag)
Theodore Ts'o52783e02002-03-11 15:04:45 -0500122{
Theodore Ts'of77704e2006-11-11 22:32:35 -0500123 __u32 hash, hash0 = 0x12a3fe2d, hash1 = 0x37abe8f9;
124 const unsigned char *ucp = (const unsigned char *) name;
125 const signed char *scp = (const signed char *) name;
126 int c;
127
Theodore Ts'o52783e02002-03-11 15:04:45 -0500128 while (len--) {
Theodore Ts'of77704e2006-11-11 22:32:35 -0500129 if (unsigned_flag)
130 c = (int) *ucp++;
131 else
132 c = (int) *scp++;
133 hash = hash1 + (hash0 ^ (c * 7152373));
Theodore Ts'oefc6f622008-08-27 23:07:54 -0400134
Theodore Ts'o52783e02002-03-11 15:04:45 -0500135 if (hash & 0x80000000) hash -= 0x7fffffff;
136 hash1 = hash0;
137 hash0 = hash;
138 }
Theodore Ts'o1acb01b2002-03-12 13:41:31 -0500139 return (hash0 << 1);
Theodore Ts'o52783e02002-03-11 15:04:45 -0500140}
141
Theodore Ts'of77704e2006-11-11 22:32:35 -0500142static void str2hashbuf(const char *msg, int len, __u32 *buf, int num,
143 int unsigned_flag)
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400144{
145 __u32 pad, val;
Theodore Ts'of77704e2006-11-11 22:32:35 -0500146 int i, c;
147 const unsigned char *ucp = (const unsigned char *) msg;
148 const signed char *scp = (const signed char *) msg;
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400149
150 pad = (__u32)len | ((__u32)len << 8);
151 pad |= pad << 16;
152
153 val = pad;
154 if (len > num*4)
155 len = num * 4;
156 for (i=0; i < len; i++) {
157 if ((i % 4) == 0)
158 val = pad;
Theodore Ts'of77704e2006-11-11 22:32:35 -0500159 if (unsigned_flag)
160 c = (int) ucp[i];
161 else
162 c = (int) scp[i];
163
164 val = c + (val << 8);
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400165 if ((i % 4) == 3) {
166 *buf++ = val;
167 val = pad;
168 num--;
169 }
170 }
171 if (--num >= 0)
172 *buf++ = val;
173 while (--num >= 0)
174 *buf++ = pad;
175}
176
Theodore Ts'o52783e02002-03-11 15:04:45 -0500177/*
178 * Returns the hash of a filename. If len is 0 and name is NULL, then
179 * this function can be used to test whether or not a hash version is
180 * supported.
Theodore Ts'oefc6f622008-08-27 23:07:54 -0400181 *
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400182 * The seed is an 4 longword (32 bits) "secret" which can be used to
183 * uniquify a hash. If the seed is all zero's, then some default seed
184 * may be used.
Theodore Ts'oefc6f622008-08-27 23:07:54 -0400185 *
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400186 * A particular hash version specifies whether or not the seed is
187 * represented, and whether or not the returned hash is 32 bits or 64
188 * bits. 32 bit hashes will return 0 for the minor hash.
Theodore Ts'o52783e02002-03-11 15:04:45 -0500189 */
190errcode_t ext2fs_dirhash(int version, const char *name, int len,
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400191 const __u32 *seed,
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400192 ext2_dirhash_t *ret_hash,
193 ext2_dirhash_t *ret_minor_hash)
Theodore Ts'o52783e02002-03-11 15:04:45 -0500194{
195 __u32 hash;
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400196 __u32 minor_hash = 0;
Theodore Ts'occ90bdf2002-07-23 13:11:53 -0400197 const char *p;
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400198 int i;
199 __u32 in[8], buf[4];
Theodore Ts'of77704e2006-11-11 22:32:35 -0500200 int unsigned_flag = 0;
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400201
202 /* Initialize the default seed for the hash checksum functions */
203 buf[0] = 0x67452301;
204 buf[1] = 0xefcdab89;
205 buf[2] = 0x98badcfe;
206 buf[3] = 0x10325476;
Theodore Ts'o52783e02002-03-11 15:04:45 -0500207
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400208 /* Check to see if the seed is all zero's */
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400209 if (seed) {
210 for (i=0; i < 4; i++) {
211 if (seed[i])
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400212 break;
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400213 }
214 if (i < 4)
215 memcpy(buf, seed, sizeof(buf));
216 }
Theodore Ts'oefc6f622008-08-27 23:07:54 -0400217
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400218 switch (version) {
Theodore Ts'of77704e2006-11-11 22:32:35 -0500219 case EXT2_HASH_LEGACY_UNSIGNED:
220 unsigned_flag++;
Eric Sandeen9e30fb22011-09-16 15:49:23 -0500221 /* fallthrough */
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400222 case EXT2_HASH_LEGACY:
Theodore Ts'of77704e2006-11-11 22:32:35 -0500223 hash = dx_hack_hash(name, len, unsigned_flag);
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400224 break;
Theodore Ts'of77704e2006-11-11 22:32:35 -0500225 case EXT2_HASH_HALF_MD4_UNSIGNED:
226 unsigned_flag++;
Eric Sandeen9e30fb22011-09-16 15:49:23 -0500227 /* fallthrough */
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400228 case EXT2_HASH_HALF_MD4:
229 p = name;
230 while (len > 0) {
Theodore Ts'of77704e2006-11-11 22:32:35 -0500231 str2hashbuf(p, len, in, 8, unsigned_flag);
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400232 halfMD4Transform(buf, in);
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400233 len -= 32;
234 p += 32;
235 }
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400236 minor_hash = buf[2];
237 hash = buf[1];
238 break;
Theodore Ts'of77704e2006-11-11 22:32:35 -0500239 case EXT2_HASH_TEA_UNSIGNED:
240 unsigned_flag++;
Eric Sandeen9e30fb22011-09-16 15:49:23 -0500241 /* fallthrough */
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400242 case EXT2_HASH_TEA:
243 p = name;
244 while (len > 0) {
Theodore Ts'of77704e2006-11-11 22:32:35 -0500245 str2hashbuf(p, len, in, 4, unsigned_flag);
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400246 TEA_transform(buf, in);
247 len -= 16;
248 p += 16;
249 }
250 hash = buf[0];
251 minor_hash = buf[1];
252 break;
253 default:
Theodore Ts'o52783e02002-03-11 15:04:45 -0500254 *ret_hash = 0;
255 return EXT2_ET_DIRHASH_UNSUPP;
256 }
Theodore Ts'ob33278c2002-08-17 10:52:51 -0400257 *ret_hash = hash & ~1;
Theodore Ts'o503f9e72002-06-26 16:52:10 -0400258 if (ret_minor_hash)
259 *ret_minor_hash = minor_hash;
Theodore Ts'o52783e02002-03-11 15:04:45 -0500260 return 0;
Theodore Ts'o52783e02002-03-11 15:04:45 -0500261}