The Sleuth Kit 4.15.0-develop
md5c.c File Reference

Local copy of RSA Data Security, Inc. More...

#include "tsk_base_i.h"

Macros

#define F(x, y, z)
#define FF(a, b, c, d, x, s, ac)
#define G(x, y, z)
#define GG(a, b, c, d, x, s, ac)
#define H(x, y, z)
#define HH(a, b, c, d, x, s, ac)
#define I(x, y, z)
#define II(a, b, c, d, x, s, ac)
#define ROTATE_LEFT(x, n)
#define S11   7
#define S12   12
#define S13   17
#define S14   22
#define S21   5
#define S22   9
#define S23   14
#define S24   20
#define S31   4
#define S32   11
#define S33   16
#define S34   23
#define S41   6
#define S42   10
#define S43   15
#define S44   21

Functions

void TSK_MD5_Final (TSK_MD5_CTX *context, unsigned char digest[16])
 Calculate the MD5 hash of the data added to this context.
void TSK_MD5_Init (TSK_MD5_CTX *context)
 Initialize a MD5 context structure so that data can be added to it.
void TSK_MD5_Update (TSK_MD5_CTX *context, const unsigned char *input, unsigned int inputLen)
 Add data to an initialized MD5 operation.

Detailed Description

Local copy of RSA Data Security, Inc.

MD5 Message-Digest Algorithm.

Macro Definition Documentation

◆ F

#define F ( x,
y,
z )
Value:
(((x) & (y)) | ((~x) & (z)))

◆ FF

#define FF ( a,
b,
c,
d,
x,
s,
ac )
Value:
{ \
(a) += F ((b), (c), (d)) + (x) + (UINT4)(ac); \
(a) = ROTATE_LEFT ((a), (s)); \
(a) += (b); \
}

◆ G

#define G ( x,
y,
z )
Value:
(((x) & (z)) | ((y) & (~z)))

◆ GG

#define GG ( a,
b,
c,
d,
x,
s,
ac )
Value:
{ \
(a) += G ((b), (c), (d)) + (x) + (UINT4)(ac); \
(a) = ROTATE_LEFT ((a), (s)); \
(a) += (b); \
}

◆ H

#define H ( x,
y,
z )
Value:
((x) ^ (y) ^ (z))

◆ HH

#define HH ( a,
b,
c,
d,
x,
s,
ac )
Value:
{ \
(a) += H ((b), (c), (d)) + (x) + (UINT4)(ac); \
(a) = ROTATE_LEFT ((a), (s)); \
(a) += (b); \
}

◆ I

#define I ( x,
y,
z )
Value:
((y) ^ ((x) | (~z)))

◆ II

#define II ( a,
b,
c,
d,
x,
s,
ac )
Value:
{ \
(a) += I ((b), (c), (d)) + (x) + (UINT4)(ac); \
(a) = ROTATE_LEFT ((a), (s)); \
(a) += (b); \
}

◆ ROTATE_LEFT

#define ROTATE_LEFT ( x,
n )
Value:
(((x) << (n)) | ((x) >> (32-(n))))

Copyright © 2007-2020 Brian Carrier. (carrier -at- sleuthkit -dot- org)
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.