code
stringlengths
1
1.05M
repo_name
stringlengths
6
83
path
stringlengths
3
242
language
stringclasses
222 values
license
stringclasses
20 values
size
int64
1
1.05M
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_PROVIDER) #include "crypt_eal_implprovider.h" #include "crypt_eal_pkey.h" #include "crypt_provider.h" #include "crypt_params_key.h" #include "crypt_types.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "eal_pkey.h" #include "crypt_decode_key_impl.h" #include "bsl_err_internal.h" typedef struct { CRYPT_EAL_LibCtx *libCtx; const char *targetAttrName; const char *outFormat; const char *outType; } DECODER_Lowkey2PkeyCtx; void *DECODER_LowKeyObject2PkeyObjectNewCtx(void *provCtx) { (void)provCtx; DECODER_Lowkey2PkeyCtx *ctx = (DECODER_Lowkey2PkeyCtx *)BSL_SAL_Calloc(1, sizeof(DECODER_Lowkey2PkeyCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->outFormat = "OBJECT"; ctx->outType = "HIGH_KEY"; return (void *)ctx; } int32_t DECODER_LowKeyObject2PkeyObjectSetParam(void *ctx, const BSL_Param *param) { DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; if (decoderCtx == NULL || param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const BSL_Param *libCtxParam = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_LIB_CTX); if (libCtxParam != NULL) { if (libCtxParam->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->libCtx = (CRYPT_EAL_LibCtx *)(uintptr_t)libCtxParam->value; } const BSL_Param *targetAttrNameParam = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_TARGET_ATTR_NAME); if (targetAttrNameParam != NULL) { if (targetAttrNameParam->valueType != BSL_PARAM_TYPE_OCTETS_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->targetAttrName = (const char *)(uintptr_t)targetAttrNameParam->value; } return CRYPT_SUCCESS; } int32_t DECODER_LowKeyObject2PkeyObjectGetParam(void *ctx, BSL_Param *param) { DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; if (decoderCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_CommonCtx commonCtx = { .outFormat = decoderCtx->outFormat, .outType = decoderCtx->outType }; return DECODER_CommonGetParam(&commonCtx, param); } typedef struct LowKeyObjectMethodInfo { CRYPT_EAL_ImplPkeyMgmtExport export; CRYPT_EAL_ImplPkeyMgmtDupCtx dupCtx; CRYPT_EAL_ImplPkeyMgmtFreeCtx freeCtx; } LowKeyObjectMethodInfo; static int32_t GetLowKeyObjectInfo(const BSL_Param *inParam, void **object, int32_t *objectType, LowKeyObjectMethodInfo *method) { const BSL_Param *lowObjectRef = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_OBJECT_DATA); if (lowObjectRef == NULL || lowObjectRef->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *lowObjectRefType = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_OBJECT_TYPE); if (lowObjectRefType == NULL || lowObjectRefType->valueType != BSL_PARAM_TYPE_INT32) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *exportFunc = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PKEY_EXPORT_METHOD_FUNC); if (exportFunc == NULL || exportFunc->valueType != BSL_PARAM_TYPE_FUNC_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *dupFunc = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PKEY_DUP_METHOD_FUNC); if (dupFunc == NULL || dupFunc->valueType != BSL_PARAM_TYPE_FUNC_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *freeFunc = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PKEY_FREE_METHOD_FUNC); if (freeFunc == NULL || freeFunc->valueType != BSL_PARAM_TYPE_FUNC_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } if (lowObjectRef->value == NULL || lowObjectRefType->value == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *object = (void *)(uintptr_t)lowObjectRef->value; *objectType = *((int32_t *)(uintptr_t)lowObjectRefType->value); method->export = (CRYPT_EAL_ImplPkeyMgmtExport)(uintptr_t)exportFunc->value; method->dupCtx = (CRYPT_EAL_ImplPkeyMgmtDupCtx)(uintptr_t)dupFunc->value; method->freeCtx = (CRYPT_EAL_ImplPkeyMgmtFreeCtx)(uintptr_t)freeFunc->value; return CRYPT_SUCCESS; } static int32_t GetProviderInfo(const BSL_Param *inParam, CRYPT_EAL_ProvMgrCtx **lastDecoderProviderCtx) { const BSL_Param *lastDecoderProvCtxParam = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PROVIDER_CTX); if (lastDecoderProvCtxParam != NULL) { if (lastDecoderProvCtxParam->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } *lastDecoderProviderCtx = (CRYPT_EAL_ProvMgrCtx *)(uintptr_t)lastDecoderProvCtxParam->value; } return CRYPT_SUCCESS; } typedef struct { CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo; void *targetKeyRef; } ImportTargetPkeyArgs; static int32_t ImportTargetPkey(const BSL_Param *param, void *args) { if (param == NULL || args == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ImportTargetPkeyArgs *importTargetPkeyArgs = (ImportTargetPkeyArgs *)args; void *provCtx = NULL; CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo = importTargetPkeyArgs->pkeyAlgInfo; if (pkeyAlgInfo == NULL || pkeyAlgInfo->keyMgmtMethod->provNewCtx == NULL || pkeyAlgInfo->keyMgmtMethod->import == NULL || pkeyAlgInfo->keyMgmtMethod->freeCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_EAL_ProviderCtrl(pkeyAlgInfo->mgrCtx, CRYPT_PROVIDER_GET_USER_CTX, &provCtx, sizeof(provCtx)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } void *keyRef = pkeyAlgInfo->keyMgmtMethod->provNewCtx(provCtx, pkeyAlgInfo->algId); if (keyRef == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = pkeyAlgInfo->keyMgmtMethod->import(keyRef, param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); pkeyAlgInfo->keyMgmtMethod->freeCtx(keyRef); return ret; } importTargetPkeyArgs->targetKeyRef = keyRef; return CRYPT_SUCCESS; } static int32_t TransLowKeyToTargetLowKey(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, const LowKeyObjectMethodInfo *method, void *lowObjectRef, void **targetKeyRef) { ImportTargetPkeyArgs importTargetPkeyArgs = {0}; importTargetPkeyArgs.pkeyAlgInfo = pkeyAlgInfo; if (method->export == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Param param[3] = { {CRYPT_PARAM_PKEY_PROCESS_FUNC, BSL_PARAM_TYPE_FUNC_PTR, ImportTargetPkey, 0, 0}, {CRYPT_PARAM_PKEY_PROCESS_ARGS, BSL_PARAM_TYPE_CTX_PTR, &importTargetPkeyArgs, 0, 0}, BSL_PARAM_END }; int32_t ret = method->export(lowObjectRef, param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } *targetKeyRef = importTargetPkeyArgs.targetKeyRef; return CRYPT_SUCCESS; } static int32_t DupLowKey(const LowKeyObjectMethodInfo *method, void *lowObjectRef, void **targetKeyRef) { if (method->dupCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *targetKeyRef = method->dupCtx(lowObjectRef); if (*targetKeyRef == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } return CRYPT_SUCCESS; } static int32_t ConstructOutObjectParam(BSL_Param **outParam, void *object) { BSL_Param *result = BSL_SAL_Calloc(2, sizeof(BSL_Param)); if (result == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BSL_PARAM_InitValue(&result[0], CRYPT_PARAM_DECODE_OBJECT_DATA, BSL_PARAM_TYPE_CTX_PTR, object, 0); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(result); BSL_ERR_PUSH_ERROR(ret); } *outParam = result; return ret; } /* input is pem format buffer, output is der format buffer */ int32_t DECODER_LowKeyObject2PkeyObjectDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) { if (ctx == NULL || inParam == NULL || outParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; void *lowObjectRef = NULL; int32_t lowObjectRefType = 0; CRYPT_EAL_ProvMgrCtx *lastDecoderProviderCtx = NULL; LowKeyObjectMethodInfo method = {0}; void *targetKeyRef = NULL; CRYPT_EAL_PkeyMgmtInfo pkeyAlgInfo = {0}; int32_t ret = 0; RETURN_RET_IF_ERR(GetLowKeyObjectInfo(inParam, &lowObjectRef, &lowObjectRefType, &method), ret); if (method.freeCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } RETURN_RET_IF_ERR(GetProviderInfo(inParam, &lastDecoderProviderCtx), ret); RETURN_RET_IF_ERR(CRYPT_EAL_GetPkeyAlgInfo(decoderCtx->libCtx, lowObjectRefType, decoderCtx->targetAttrName, &pkeyAlgInfo), ret); if (pkeyAlgInfo.mgrCtx != lastDecoderProviderCtx) { ret = TransLowKeyToTargetLowKey(&pkeyAlgInfo, &method, lowObjectRef, &targetKeyRef); } else { ret = DupLowKey(&method, lowObjectRef, &targetKeyRef); } if (ret != CRYPT_SUCCESS) { goto EXIT; } CRYPT_EAL_PkeyCtx *ealPKey = CRYPT_EAL_MakeKeyByPkeyAlgInfo(&pkeyAlgInfo, targetKeyRef, sizeof(void *)); if (ealPKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto EXIT; } ret = ConstructOutObjectParam(outParam, ealPKey); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(ealPKey); BSL_ERR_PUSH_ERROR(ret); } return ret; EXIT: BSL_SAL_Free(pkeyAlgInfo.keyMgmtMethod); if (targetKeyRef != NULL) { method.freeCtx(targetKeyRef); } return ret; } void DECODER_LowKeyObject2PkeyObjectFreeOutData(void *ctx, BSL_Param *outParam) { DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; if (outParam == NULL || decoderCtx == NULL) { return; } BSL_Param *objectDataParam = BSL_PARAM_FindParam(outParam, CRYPT_PARAM_DECODE_OBJECT_DATA); if (objectDataParam == NULL || objectDataParam->valueType != BSL_PARAM_TYPE_CTX_PTR || objectDataParam->value == NULL) { return; } CRYPT_EAL_PkeyCtx *ealPKey = (CRYPT_EAL_PkeyCtx *)objectDataParam->value; CRYPT_EAL_PkeyFreeCtx(ealPKey); BSL_SAL_Free(outParam); } void DECODER_LowKeyObject2PkeyObjectFreeCtx(void *ctx) { if (ctx == NULL) { return; } BSL_SAL_Free(ctx); } #endif
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_decode_lowkey2pkey.c
C
unknown
11,815
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_BSL_PEM) && defined(HITLS_CRYPTO_PROVIDER) #include <stdint.h> #include <string.h> #include "crypt_eal_implprovider.h" #include "crypt_errno.h" #include "crypt_params_key.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "bsl_pem_internal.h" #include "crypt_encode_decode_local.h" #include "crypt_decode_key_impl.h" typedef struct { void *provCtx; const char *outFormat; const char *outType; } DECODER_Pem2DerCtx; void *DECODER_Pem2DerNewCtx(void *provCtx) { (void)provCtx; DECODER_Pem2DerCtx *ctx = (DECODER_Pem2DerCtx *)BSL_SAL_Calloc(1, sizeof(DECODER_Pem2DerCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->provCtx = provCtx; ctx->outFormat = "ASN1"; ctx->outType = NULL; return ctx; } int32_t DECODER_Pem2DerGetParam(void *ctx, BSL_Param *param) { DECODER_Pem2DerCtx *decoderCtx = (DECODER_Pem2DerCtx *)ctx; if (decoderCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_CommonCtx commonCtx = { .outFormat = decoderCtx->outFormat, .outType = decoderCtx->outType }; return DECODER_CommonGetParam(&commonCtx, param); } int32_t DECODER_Pem2DerSetParam(void *ctx, const BSL_Param *param) { (void)ctx; (void)param; return CRYPT_SUCCESS; } /* input is pem format buffer, output is der format buffer */ int32_t DECODER_Pem2DerDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) { if (ctx == NULL || inParam == NULL || outParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_PEM_Symbol symbol = {0}; char *dataType = NULL; DECODER_Pem2DerCtx *decoderCtx = (DECODER_Pem2DerCtx *)ctx; const BSL_Param *input = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (input == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (input->value == NULL || input->valueLen == 0 || input->valueType != BSL_PARAM_TYPE_OCTETS) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } BSL_Buffer encode = {(uint8_t *)(uintptr_t)input->value, input->valueLen}; uint8_t *asn1Encode = NULL; uint32_t asn1Len = 0; int32_t ret = BSL_PEM_GetSymbolAndType((char *)encode.data, encode.dataLen, &symbol, &dataType); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_PEM_DecodePemToAsn1((char **)&encode.data, &encode.dataLen, &symbol, &asn1Encode, &asn1Len); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(asn1Encode); BSL_ERR_PUSH_ERROR(ret); return ret; } decoderCtx->outType = dataType; return CRYPT_DECODE_ConstructBufferOutParam(outParam, asn1Encode, asn1Len); } void DECODER_Pem2DerFreeOutData(void *ctx, BSL_Param *outParam) { (void)ctx; if (outParam == NULL) { return; } BSL_Param *asn1DataParam = BSL_PARAM_FindParam(outParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (asn1DataParam == NULL) { return; } BSL_SAL_Free(asn1DataParam->value); asn1DataParam->value = NULL; asn1DataParam->valueLen = 0; BSL_SAL_Free(outParam); } void DECODER_Pem2DerFreeCtx(void *ctx) { if (ctx == NULL) { return; } BSL_SAL_Free(ctx); } #endif /* HITLS_CRYPTO_CODECSKEY && HITLS_BSL_PEM && HITLS_CRYPTO_PROVIDER */
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_decode_pem2der.c
C
unknown
4,088
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) #include "securec.h" #include "bsl_sal.h" #include "bsl_list.h" #include "sal_file.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_eal_provider.h" #include "crypt_eal_implprovider.h" #include "crypt_eal_codecs.h" #include "crypt_provider.h" #include "crypt_eal_pkey.h" #include "bsl_types.h" #include "crypt_types.h" #include "crypt_utils.h" #include "eal_pkey.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" #if defined(HITLS_CRYPTO_PROVIDER) static int32_t SetDecodePoolParamForKey(CRYPT_DECODER_PoolCtx *poolCtx, char *targetType, char *targetFormat) { int32_t ret = CRYPT_DECODE_PoolCtrl(poolCtx, CRYPT_DECODE_POOL_CMD_SET_TARGET_FORMAT, targetFormat, (int32_t)strlen(targetFormat)); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_DECODE_PoolCtrl(poolCtx, CRYPT_DECODE_POOL_CMD_SET_TARGET_TYPE, targetType, (int32_t)strlen(targetType)); if (ret != CRYPT_SUCCESS) { return ret; } return ret; } static int32_t GetObjectFromOutData(BSL_Param *outData, void **object) { if (outData == NULL || object == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Param *param = BSL_PARAM_FindParam(outData, CRYPT_PARAM_DECODE_OBJECT_DATA); if (param == NULL || param->valueType != BSL_PARAM_TYPE_CTX_PTR || param->value == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } *object = param->value; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_ProviderDecodeBuffKeyInner(CRYPT_EAL_LibCtx *libCtx, const char *attrName, int32_t keyType, const char *format, const char *type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPKey) { char *targetType = "HIGH_KEY"; char *targetFormat = "OBJECT"; uint32_t index = 0; BSL_Param *outParam = NULL; bool isFreeOutData = false; BSL_Param input[3] = {{0}, {0}, BSL_PARAM_END}; CRYPT_EAL_PkeyCtx *tmpPKey = NULL; if (encode == NULL || encode->data == NULL || encode->dataLen == 0 || ealPKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODER_PoolCtx *poolCtx = CRYPT_DECODE_PoolNewCtx(libCtx, attrName, keyType, format, type); if (poolCtx == NULL) { return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = SetDecodePoolParamForKey(poolCtx, targetType, targetFormat); if (ret != CRYPT_SUCCESS) { goto EXIT; } (void)BSL_PARAM_InitValue(&input[index++], CRYPT_PARAM_DECODE_BUFFER_DATA, BSL_PARAM_TYPE_OCTETS, encode->data, encode->dataLen); if (pwd != NULL) { (void)BSL_PARAM_InitValue(&input[index++], CRYPT_PARAM_DECODE_PASSWORD, BSL_PARAM_TYPE_OCTETS, pwd->data, pwd->dataLen); } ret = CRYPT_DECODE_PoolDecode(poolCtx, input, &outParam); if (ret != CRYPT_SUCCESS) { goto EXIT; } ret = GetObjectFromOutData(outParam, (void **)(&tmpPKey)); if (ret != CRYPT_SUCCESS) { goto EXIT; } int32_t algId = CRYPT_EAL_PkeyGetId(tmpPKey); if (keyType != BSL_CID_UNKNOWN && algId != keyType) { ret = CRYPT_EAL_ERR_ALGID; BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); goto EXIT; } ret = CRYPT_DECODE_PoolCtrl(poolCtx, CRYPT_DECODE_POOL_CMD_SET_FLAG_FREE_OUT_DATA, &isFreeOutData, sizeof(bool)); if (ret != CRYPT_SUCCESS) { goto EXIT; } *ealPKey = tmpPKey; BSL_SAL_Free(outParam); EXIT: CRYPT_DECODE_PoolFreeCtx(poolCtx); return ret; } #endif /* HITLS_CRYPTO_PROVIDER */ int32_t CRYPT_EAL_ProviderDecodeBuffKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, int32_t keyType, const char *format, const char *type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPKey) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderDecodeBuffKeyInner(libCtx, attrName, keyType, format, type, encode, pwd, ealPKey); #else (void)libCtx; (void)attrName; (void)keyType; int32_t encodeType = CRYPT_EAL_GetEncodeType(type); int32_t encodeFormat = CRYPT_EAL_GetEncodeFormat(format); if (pwd == NULL) { return CRYPT_EAL_DecodeBuffKey(encodeFormat, encodeType, encode, NULL, 0, ealPKey); } else { return CRYPT_EAL_DecodeBuffKey(encodeFormat, encodeType, encode, pwd->data, pwd->dataLen, ealPKey); } #endif } #ifdef HITLS_BSL_SAL_FILE int32_t CRYPT_EAL_ProviderDecodeFileKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, int32_t keyType, const char *format, const char *type, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPKey) { if (path == NULL || strlen(path) > PATH_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_ProviderDecodeBuffKey(libCtx, attrName, keyType, format, type, &encode, pwd, ealPKey); BSL_SAL_Free(data); return ret; } #endif /* HITLS_BSL_SAL_FILE */ #endif /* HITLS_CRYPTO_CODECSKEY */
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_decode_pkey.c
C
unknown
5,857
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_KEY_DECODE) && defined(HITLS_CRYPTO_RSA) #include "crypt_rsa.h" #include "bsl_asn1_internal.h" #include "bsl_params.h" #include "bsl_errno.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_params_key.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" static int32_t ProcRsaPubKey(const BSL_ASN1_Buffer *asn1, CRYPT_RSA_Ctx *rsaKey) { const BSL_Param param[3] = { {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_E_IDX].buff, asn1[CRYPT_RSA_PRV_E_IDX].len, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_N_IDX].buff, asn1[CRYPT_RSA_PRV_N_IDX].len, 0}, BSL_PARAM_END }; return CRYPT_RSA_SetPubKeyEx(rsaKey, param); } static int32_t ProcRsaPrivKey(const BSL_ASN1_Buffer *asn1, CRYPT_RSA_Ctx *rsaKey) { const BSL_Param param[10] = { {CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_D_IDX].buff, asn1[CRYPT_RSA_PRV_D_IDX].len, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_N_IDX].buff, asn1[CRYPT_RSA_PRV_N_IDX].len, 0}, {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_E_IDX].buff, asn1[CRYPT_RSA_PRV_E_IDX].len, 0}, {CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_P_IDX].buff, asn1[CRYPT_RSA_PRV_P_IDX].len, 0}, {CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_Q_IDX].buff, asn1[CRYPT_RSA_PRV_Q_IDX].len, 0}, {CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_DP_IDX].buff, asn1[CRYPT_RSA_PRV_DP_IDX].len, 0}, {CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_DQ_IDX].buff, asn1[CRYPT_RSA_PRV_DQ_IDX].len, 0}, {CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_QINV_IDX].buff, asn1[CRYPT_RSA_PRV_QINV_IDX].len, 0}, BSL_PARAM_END }; return CRYPT_RSA_SetPrvKeyEx(rsaKey, param); } static int32_t ProcRsaKeyPair(uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx *rsaKey) { // decode n and e BSL_ASN1_Buffer asn1[CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ProcRsaPrivKey(asn1, rsaKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ProcRsaPubKey(asn1, rsaKey); } static int32_t ProcRsaPssParam(BSL_ASN1_Buffer *rsaPssParam, CRYPT_RSA_Ctx *rsaPriKey) { CRYPT_RsaPadType padType = CRYPT_EMSA_PSS; int32_t ret = CRYPT_RSA_Ctrl(rsaPriKey, CRYPT_CTRL_SET_RSA_PADDING, &padType, sizeof(CRYPT_RsaPadType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (rsaPssParam == NULL || rsaPssParam->buff == NULL) { return CRYPT_SUCCESS; } CRYPT_RSA_PssPara para = {0}; ret = CRYPT_EAL_ParseRsaPssAlgParam(rsaPssParam, &para); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Param param[4] = { {CRYPT_PARAM_RSA_MD_ID, BSL_PARAM_TYPE_INT32, &para.mdId, sizeof(para.mdId), 0}, {CRYPT_PARAM_RSA_MGF1_ID, BSL_PARAM_TYPE_INT32, &para.mgfId, sizeof(para.mgfId), 0}, {CRYPT_PARAM_RSA_SALTLEN, BSL_PARAM_TYPE_INT32, &para.saltLen, sizeof(para.saltLen), 0}, BSL_PARAM_END}; return CRYPT_RSA_Ctrl(rsaPriKey, CRYPT_CTRL_SET_RSA_EMSA_PSS, param, 0); } static int32_t DecodeRsaPrikeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, BslCid cid, CRYPT_RSA_Ctx **rsaPriKey) { CRYPT_RSA_Ctx *pctx = CRYPT_RSA_NewCtxEx(libCtx); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ProcRsaKeyPair(buff, buffLen, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_RSA_FreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } if (cid != BSL_CID_RSASSAPSS) { *rsaPriKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(rsaPssParam, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_RSA_FreeCtx(pctx); return ret; } *rsaPriKey = pctx; return ret; } int32_t CRYPT_RSA_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, CRYPT_RSA_Ctx **rsaPriKey) { return DecodeRsaPrikeyAsn1Buff(libCtx, buff, buffLen, rsaPssParam, BSL_CID_UNKNOWN, rsaPriKey); } int32_t CRYPT_RSA_ParsePubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_RSA_Ctx **rsaPubKey, BslCid cid) { // decode n and e BSL_ASN1_Buffer pubAsn1[CRYPT_RSA_PUB_E_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPubkeyAsn1Buff(buff, buffLen, pubAsn1, CRYPT_RSA_PUB_E_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_RSA_Ctx *pctx = CRYPT_RSA_NewCtxEx(libCtx); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BSL_Param pubParam[3] = { {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, pubAsn1[CRYPT_RSA_PUB_E_IDX].buff, pubAsn1[CRYPT_RSA_PUB_E_IDX].len, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, pubAsn1[CRYPT_RSA_PUB_N_IDX].buff, pubAsn1[CRYPT_RSA_PUB_N_IDX].len, 0}, BSL_PARAM_END }; ret = CRYPT_RSA_SetPubKeyEx(pctx, pubParam); if (cid != BSL_CID_RSASSAPSS) { *rsaPubKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(param, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_RSA_FreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *rsaPubKey = pctx; return ret; } int32_t CRYPT_RSA_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **pubKey, bool isComplete) { if (pubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODE_SubPubkeyInfo subPubkeyInfo = {0}; CRYPT_RSA_Ctx *pctx = NULL; int32_t ret = CRYPT_DECODE_SubPubkey(buff, buffLen, NULL, &subPubkeyInfo, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (subPubkeyInfo.keyType != BSL_CID_RSASSAPSS && subPubkeyInfo.keyType != BSL_CID_RSA) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = CRYPT_RSA_ParsePubkeyAsn1Buff(libCtx, subPubkeyInfo.pubKey.buff, subPubkeyInfo.pubKey.len, &subPubkeyInfo.keyParam, &pctx, subPubkeyInfo.keyType); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } *pubKey = pctx; return ret; } int32_t CRYPT_RSA_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **rsaPriKey) { CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(buff, buffLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (pk8PrikeyInfo.keyType != BSL_CID_RSASSAPSS && pk8PrikeyInfo.keyType != BSL_CID_RSA) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = DecodeRsaPrikeyAsn1Buff(libCtx, pk8PrikeyInfo.pkeyRawKey, pk8PrikeyInfo.pkeyRawKeyLen, &pk8PrikeyInfo.keyParam, pk8PrikeyInfo.keyType, rsaPriKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_KEY_DECODE && HITLS_CRYPTO_RSA
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_decode_rsa.c
C
unknown
8,338
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include <stdint.h> #include <string.h> #ifdef HITLS_BSL_SAL_FILE #include "sal_file.h" #endif #include "bsl_types.h" #include "bsl_asn1_internal.h" #ifdef HITLS_BSL_PEM #include "bsl_pem_internal.h" #endif // HITLS_BSL_PEM #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_eal_pkey.h" #include "crypt_eal_codecs.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" int32_t CRYPT_EAL_GetEncodeFormat(const char *format) { if (format == NULL) { return BSL_FORMAT_UNKNOWN; } static const struct { const char *formatStr; int32_t formatInt; } FORMAT_MAP[] = { {"ASN1", BSL_FORMAT_ASN1}, {"PEM", BSL_FORMAT_PEM}, {"PFX_COM", BSL_FORMAT_PFX_COM}, {"PKCS12", BSL_FORMAT_PKCS12}, {"OBJECT", BSL_FORMAT_OBJECT} }; for (size_t i = 0; i < sizeof(FORMAT_MAP) / sizeof(FORMAT_MAP[0]); i++) { if (strcmp(format, FORMAT_MAP[i].formatStr) == 0) { return FORMAT_MAP[i].formatInt; } } return BSL_FORMAT_UNKNOWN; } #ifdef HITLS_BSL_PEM static int32_t EAL_GetPemPubKeySymbol(int32_t type, BSL_PEM_Symbol *symbol) { switch (type) { case CRYPT_PUBKEY_SUBKEY: symbol->head = BSL_PEM_PUB_KEY_BEGIN_STR; symbol->tail = BSL_PEM_PUB_KEY_END_STR; return CRYPT_SUCCESS; #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: symbol->head = BSL_PEM_RSA_PUB_KEY_BEGIN_STR; symbol->tail = BSL_PEM_RSA_PUB_KEY_END_STR; return CRYPT_SUCCESS; #endif default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } static int32_t EAL_GetPemPriKeySymbol(int32_t type, BSL_PEM_Symbol *symbol) { switch (type) { #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: symbol->head = BSL_PEM_EC_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_EC_PRI_KEY_END_STR; return CRYPT_SUCCESS; #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: symbol->head = BSL_PEM_RSA_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_RSA_PRI_KEY_END_STR; return CRYPT_SUCCESS; #endif case CRYPT_PRIKEY_PKCS8_UNENCRYPT: symbol->head = BSL_PEM_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_PRI_KEY_END_STR; return CRYPT_SUCCESS; case CRYPT_PRIKEY_PKCS8_ENCRYPT: symbol->head = BSL_PEM_P8_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_P8_PRI_KEY_END_STR; return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #endif // HITLS_BSL_PEM #ifdef HITLS_CRYPTO_KEY_DECODE int32_t CRYPT_EAL_ParseAsn1PriKey(int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { (void)pwd; switch (type) { #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: return ParseEccPrikeyAsn1Buff(encode->data, encode->dataLen, NULL, ealPriKey); #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: return ParseRsaPrikeyAsn1Buff(encode->data, encode->dataLen, NULL, BSL_CID_UNKNOWN, ealPriKey); #endif case CRYPT_PRIKEY_PKCS8_UNENCRYPT: return ParsePk8PriKeyBuff(encode, ealPriKey); #ifdef HITLS_CRYPTO_KEY_EPKI case CRYPT_PRIKEY_PKCS8_ENCRYPT: return ParsePk8EncPriKeyBuff(encode, pwd, ealPriKey); #endif default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #ifdef HITLS_BSL_PEM int32_t CRYPT_EAL_ParsePemPriKey(int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_PEM_Symbol symbol = {0}; uint8_t *buff = encode->data; uint32_t buffLen = encode->dataLen; int32_t ret = EAL_GetPemPriKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Buffer asn1 = {0}; ret = BSL_PEM_DecodePemToAsn1((char **)&buff, &buffLen, &symbol, &(asn1.data), &(asn1.dataLen)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_ParseAsn1PriKey(type, &asn1, pwd, ealPriKey); BSL_SAL_Free(asn1.data); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_ParseUnknownPriKey(int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { #ifdef HITLS_BSL_PEM bool isPem = BSL_PEM_IsPemFormat((char *)(encode->data), encode->dataLen); if (isPem) { return CRYPT_EAL_ParsePemPriKey(type, encode, pwd, ealPriKey); } #endif return CRYPT_EAL_ParseAsn1PriKey(type, encode, pwd, ealPriKey); } int32_t CRYPT_EAL_PriKeyParseBuff(BSL_ParseFormat format, int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { if (encode == NULL || encode->data == NULL || encode->dataLen == 0 || ealPriKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_ParseAsn1PriKey(type, encode, pwd, ealPriKey); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_ParsePemPriKey(type, encode, pwd, ealPriKey); #endif // HITLS_BSL_PEM case BSL_FORMAT_UNKNOWN: return CRYPT_EAL_ParseUnknownPriKey(type, encode, pwd, ealPriKey); default: return CRYPT_DECODE_NO_SUPPORT_FORMAT; } } int32_t CRYPT_EAL_ParseAsn1PubKey(int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { switch (type) { case CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ: return CRYPT_EAL_ParseAsn1SubPubkey(encode->data, encode->dataLen, (void **)ealPubKey, false); case CRYPT_PUBKEY_SUBKEY: return CRYPT_EAL_ParseAsn1SubPubkey(encode->data, encode->dataLen, (void **)ealPubKey, true); default: #ifdef HITLS_CRYPTO_RSA return ParseRsaPubkeyAsn1Buff(encode->data, encode->dataLen, NULL, ealPubKey, BSL_CID_UNKNOWN); #else return CRYPT_DECODE_NO_SUPPORT_TYPE; #endif } } #ifdef HITLS_BSL_PEM int32_t CRYPT_EAL_ParsePemPubKey(int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { BSL_PEM_Symbol symbol = {0}; int32_t ret = EAL_GetPemPubKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Buffer asn1 = {0}; ret = BSL_PEM_DecodePemToAsn1((char **)&(encode->data), &(encode->dataLen), &symbol, &(asn1.data), &(asn1.dataLen)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_ParseAsn1PubKey(type, &asn1, ealPubKey); BSL_SAL_Free(asn1.data); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_ParseUnknownPubKey(int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { #ifdef HITLS_BSL_PEM bool isPem = BSL_PEM_IsPemFormat((char *)(encode->data), encode->dataLen); if (isPem) { return CRYPT_EAL_ParsePemPubKey(type, encode, ealPubKey); } #endif return CRYPT_EAL_ParseAsn1PubKey(type, encode, ealPubKey); } int32_t CRYPT_EAL_PubKeyParseBuff(BSL_ParseFormat format, int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { if (encode == NULL || encode->data == NULL || encode->dataLen == 0 || ealPubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_ParseAsn1PubKey(type, encode, ealPubKey); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_ParsePemPubKey(type, encode, ealPubKey); #endif // HITLS_BSL_PEM case BSL_FORMAT_UNKNOWN: return CRYPT_EAL_ParseUnknownPubKey(type, encode, ealPubKey); default: return CRYPT_DECODE_NO_SUPPORT_FORMAT; } } int32_t CRYPT_EAL_UnKnownKeyParseBuff(BSL_ParseFormat format, const BSL_Buffer *pwd, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPKey) { int32_t ret; for (int32_t type = CRYPT_PRIKEY_PKCS8_UNENCRYPT; type <= CRYPT_PRIKEY_ECC; type++) { ret = CRYPT_EAL_PriKeyParseBuff(format, type, encode, pwd, ealPKey); if (ret == CRYPT_SUCCESS) { return ret; } } for (int32_t type = CRYPT_PUBKEY_SUBKEY; type <= CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ; type++) { ret = CRYPT_EAL_PubKeyParseBuff(format, type, encode, ealPKey); if (ret == CRYPT_SUCCESS) { return ret; } } return CRYPT_DECODE_NO_SUPPORT_TYPE; } int32_t CRYPT_EAL_DecodeBuffKey(int32_t format, int32_t type, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, CRYPT_EAL_PkeyCtx **ealPKey) { BSL_Buffer pwdBuffer = {(uint8_t *)(uintptr_t)pwd, pwdlen}; switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif return CRYPT_EAL_PriKeyParseBuff(format, type, encode, &pwdBuffer, ealPKey); case CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ: case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: #endif return CRYPT_EAL_PubKeyParseBuff(format, type, encode, ealPKey); case CRYPT_ENCDEC_UNKNOW: return CRYPT_EAL_UnKnownKeyParseBuff(format, &pwdBuffer, encode, ealPKey); default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #ifdef HITLS_BSL_SAL_FILE int32_t CRYPT_EAL_PriKeyParseFile(BSL_ParseFormat format, int32_t type, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_PriKeyParseBuff(format, type, &encode, pwd, ealPriKey); BSL_SAL_Free(data); return ret; } int32_t CRYPT_EAL_PubKeyParseFile(BSL_ParseFormat format, int32_t type, const char *path, CRYPT_EAL_PkeyCtx **ealPubKey) { uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_PubKeyParseBuff(format, type, &encode, ealPubKey); BSL_SAL_Free(data); return ret; } int32_t CRYPT_EAL_UnKnownKeyParseFile(BSL_ParseFormat format, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealKey) { uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_UnKnownKeyParseBuff(format, pwd, &encode, ealKey); BSL_SAL_Free(data); return ret; } int32_t CRYPT_EAL_DecodeFileKey(int32_t format, int32_t type, const char *path, uint8_t *pwd, uint32_t pwdlen, CRYPT_EAL_PkeyCtx **ealPKey) { BSL_Buffer pwdBuffer = {(uint8_t *)pwd, pwdlen}; if (path == NULL || strlen(path) > PATH_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif return CRYPT_EAL_PriKeyParseFile(format, type, path, &pwdBuffer, ealPKey); case CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ: case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: return CRYPT_EAL_PubKeyParseFile(format, type, path, ealPKey); #endif case CRYPT_ENCDEC_UNKNOW: return CRYPT_EAL_UnKnownKeyParseFile(format, path, &pwdBuffer, ealPKey); default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #endif // HITLS_BSL_SAL_FILE #endif // HITLS_CRYPTO_KEY_DECODE int32_t CRYPT_EAL_GetEncodeType(const char *type) { if (type == NULL) { return CRYPT_ENCDEC_UNKNOW; } static const struct { const char *typeStr; int32_t typeInt; } TYPE_MAP[] = { {"PRIKEY_PKCS8_UNENCRYPT", CRYPT_PRIKEY_PKCS8_UNENCRYPT}, {"PRIKEY_PKCS8_ENCRYPT", CRYPT_PRIKEY_PKCS8_ENCRYPT}, {"PRIKEY_RSA", CRYPT_PRIKEY_RSA}, {"PRIKEY_ECC", CRYPT_PRIKEY_ECC}, {"PUBKEY_SUBKEY", CRYPT_PUBKEY_SUBKEY}, {"PUBKEY_RSA", CRYPT_PUBKEY_RSA}, {"PUBKEY_SUBKEY_WITHOUT_SEQ", CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ} }; for (size_t i = 0; i < sizeof(TYPE_MAP) / sizeof(TYPE_MAP[0]); i++) { if (strcmp(type, TYPE_MAP[i].typeStr) == 0) { return TYPE_MAP[i].typeInt; } } return CRYPT_ENCDEC_UNKNOW; } #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t CRYPT_EAL_EncodeAsn1PriKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, int32_t type, BSL_Buffer *encode) { #ifndef HITLS_CRYPTO_KEY_EPKI (void)libCtx; (void)attrName; (void)encodeParam; #endif switch (type) { #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: return EncodeEccPrikeyAsn1Buff(ealPriKey, NULL, encode); #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: return EncodeRsaPrikeyAsn1Buff(ealPriKey, CRYPT_PKEY_RSA, encode); #endif case CRYPT_PRIKEY_PKCS8_UNENCRYPT: return EncodePk8PriKeyBuff(ealPriKey, encode); #ifdef HITLS_CRYPTO_KEY_EPKI case CRYPT_PRIKEY_PKCS8_ENCRYPT: return EncodePk8EncPriKeyBuff(libCtx, attrName, ealPriKey, encodeParam, encode); #endif default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_FORMAT); return CRYPT_ENCODE_NO_SUPPORT_FORMAT; } } #ifdef HITLS_BSL_PEM int32_t CRYPT_EAL_EncodePemPriKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, int32_t type, BSL_Buffer *encode) { BSL_Buffer asn1 = {0}; int32_t ret = CRYPT_EAL_EncodeAsn1PriKey(libCtx, attrName, ealPriKey, encodeParam, type, &asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_PEM_Symbol symbol = {0}; ret = EAL_GetPemPriKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(asn1.data); return ret; } ret = BSL_PEM_EncodeAsn1ToPem(asn1.data, asn1.dataLen, &symbol, (char **)&encode->data, &encode->dataLen); BSL_SAL_Free(asn1.data); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_PriKeyEncodeBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_ParseFormat format, int32_t type, BSL_Buffer *encode) { if (ealPriKey == NULL || encode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_EncodeAsn1PriKey(libCtx, attrName, ealPriKey, encodeParam, type, encode); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_EncodePemPriKey(libCtx, attrName, ealPriKey, encodeParam, type, encode); #endif // HITLS_BSL_PEM default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_FORMAT); return CRYPT_ENCODE_NO_SUPPORT_FORMAT; } } int32_t CRYPT_EAL_PubKeyEncodeBuff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, BSL_Buffer *encode) { return CRYPT_EAL_EncodePubKeyBuffInternal(ealPubKey, format, type, true, encode); } static int32_t ProviderEncodeBuffKeyInternal(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, BSL_Buffer *encode) { switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif return CRYPT_EAL_PriKeyEncodeBuff(libCtx, attrName, ealPKey, encodeParam, format, type, encode); case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: #endif return CRYPT_EAL_PubKeyEncodeBuff(ealPKey, format, type, encode); default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } } int32_t CRYPT_EAL_ProviderEncodeBuffKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, const char *format, const char *type, BSL_Buffer *encode) { int32_t encodeType = CRYPT_EAL_GetEncodeType(type); int32_t encodeFormat = CRYPT_EAL_GetEncodeFormat(format); return ProviderEncodeBuffKeyInternal(libCtx, attrName, ealPKey, encodeParam, encodeFormat, encodeType, encode); } int32_t CRYPT_EAL_EncodeBuffKey(CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, BSL_Buffer *encode) { return ProviderEncodeBuffKeyInternal(NULL, NULL, ealPKey, encodeParam, format, type, encode); } static int32_t CRYPT_EAL_EncodeAsn1PubKey(CRYPT_EAL_PkeyCtx *ealPubKey, int32_t type, bool isComplete, BSL_Buffer *encode) { switch (type) { case CRYPT_PUBKEY_SUBKEY: return CRYPT_EAL_EncodeAsn1SubPubkey(ealPubKey, isComplete, encode); #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: return EncodeRsaPubkeyAsn1Buff(ealPubKey, NULL, encode); #endif default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } } #ifdef HITLS_BSL_PEM static int32_t CRYPT_EAL_EncodePemPubKey(CRYPT_EAL_PkeyCtx *ealPubKey, int32_t type, bool isComplete, BSL_Buffer *encode) { BSL_Buffer asn1 = {0}; int32_t ret = CRYPT_EAL_EncodeAsn1PubKey(ealPubKey, type, isComplete, &asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_PEM_Symbol symbol = {0}; ret = EAL_GetPemPubKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(asn1.data); return ret; } ret = BSL_PEM_EncodeAsn1ToPem(asn1.data, asn1.dataLen, &symbol, (char **)&encode->data, &encode->dataLen); BSL_SAL_Free(asn1.data); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_EncodePubKeyBuffInternal(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, bool isComplete, BSL_Buffer *encode) { if (ealPubKey == NULL || encode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_EncodeAsn1PubKey(ealPubKey, type, isComplete, encode); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_EncodePemPubKey(ealPubKey, type, isComplete, encode); #endif // HITLS_BSL_PEM default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_FORMAT); return CRYPT_ENCODE_NO_SUPPORT_FORMAT; } } #ifdef HITLS_BSL_SAL_FILE int32_t CRYPT_EAL_PriKeyEncodeFile(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_ParseFormat format, int32_t type, const char *path) { BSL_Buffer encode = {0}; int32_t ret = CRYPT_EAL_PriKeyEncodeBuff(libCtx, attrName, ealPriKey, encodeParam, format, type, &encode); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_SAL_WriteFile(path, encode.data, encode.dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } BSL_SAL_Free(encode.data); return ret; } int32_t CRYPT_EAL_PubKeyEncodeFile(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, const char *path) { BSL_Buffer encode = {0}; int32_t ret = CRYPT_EAL_PubKeyEncodeBuff(ealPubKey, format, type, &encode); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_SAL_WriteFile(path, encode.data, encode.dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } BSL_SAL_FREE(encode.data); return ret; } static int32_t ProviderEncodeFileKeyInternal(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, const char *path) { if (path == NULL || strlen(path) > PATH_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif return CRYPT_EAL_PriKeyEncodeFile(libCtx, attrName, ealPKey, encodeParam, format, type, path); case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: #endif return CRYPT_EAL_PubKeyEncodeFile(ealPKey, format, type, path); default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } } int32_t CRYPT_EAL_ProviderEncodeFileKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, const char *format, const char *type, const char *path) { int32_t encodeType = CRYPT_EAL_GetEncodeType(type); int32_t encodeFormat = CRYPT_EAL_GetEncodeFormat(format); return ProviderEncodeFileKeyInternal(libCtx, attrName, ealPKey, encodeParam, encodeFormat, encodeType, path); } int32_t CRYPT_EAL_EncodeFileKey(CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, const char *path) { return ProviderEncodeFileKeyInternal(NULL, NULL, ealPKey, encodeParam, format, type, path); } #endif // HITLS_BSL_SAL_FILE #endif // HITLS_CRYPTO_KEY_ENCODE #endif // HITLS_CRYPTO_CODECSKEY
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_encode_decode.c
C
unknown
23,492
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include "securec.h" #include "bsl_asn1_internal.h" #include "bsl_params.h" #include "bsl_err_internal.h" #include "bsl_obj_internal.h" #include "crypt_errno.h" #include "crypt_algid.h" #include "crypt_eal_kdf.h" #include "crypt_eal_rand.h" #include "crypt_eal_cipher.h" #include "crypt_params_key.h" #include "crypt_encode_decode_key.h" #include "crypt_encode_decode_local.h" #if defined(HITLS_CRYPTO_KEY_EPKI) && defined(HITLS_CRYPTO_KEY_ENCODE) /** * EncryptedPrivateKeyInfo ::= SEQUENCE { * encryptionAlgorithm EncryptionAlgorithmIdentifier, * encryptedData EncryptedData } * * https://datatracker.ietf.org/doc/html/rfc5208#autoid-6 */ static BSL_ASN1_TemplateItem g_pk8EncPriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, // EncryptionAlgorithmIdentifier {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 3}, // derivation param {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 3}, // enc scheme {BSL_ASN1_TAG_OBJECT_ID, 0, 4}, // alg {BSL_ASN1_TAG_OCTETSTRING, 0, 4}, // iv {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // EncryptedData }; #endif // HITLS_CRYPTO_KEY_EPKI && HITLS_CRYPTO_KEY_ENCODE #if defined(HITLS_CRYPTO_RSA) && (defined(HITLS_CRYPTO_KEY_ENCODE) || defined(HITLS_CRYPTO_KEY_INFO)) int32_t CRYPT_EAL_GetRsaPssPara(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_RSA_PssPara *rsaPssParam) { int32_t ret; ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_SALTLEN, &rsaPssParam->saltLen, sizeof(rsaPssParam->saltLen)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_MD, &rsaPssParam->mdId, sizeof(rsaPssParam->mdId)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_MGF, &rsaPssParam->mgfId, sizeof(rsaPssParam->mgfId)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t CRYPT_EAL_InitRsaPrv(const CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, CRYPT_EAL_PkeyPrv *rsaPrv) { uint32_t bnLen = CRYPT_EAL_PkeyGetKeyLen(ealPriKey); if (bnLen == 0) { return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pri = (uint8_t *)BSL_SAL_Malloc(bnLen * 8); // 8 items if (pri == NULL) { return CRYPT_MEM_ALLOC_FAIL; } rsaPrv->id = cid; rsaPrv->key.rsaPrv.d = pri; rsaPrv->key.rsaPrv.n = pri + bnLen; rsaPrv->key.rsaPrv.p = pri + bnLen * 2; // 2nd buffer rsaPrv->key.rsaPrv.q = pri + bnLen * 3; // 3rd buffer rsaPrv->key.rsaPrv.dP = pri + bnLen * 4; // 4th buffer rsaPrv->key.rsaPrv.dQ = pri + bnLen * 5; // 5th buffer rsaPrv->key.rsaPrv.qInv = pri + bnLen * 6; // 6th buffer rsaPrv->key.rsaPrv.e = pri + bnLen * 7; // 7th buffer rsaPrv->key.rsaPrv.dLen = bnLen; rsaPrv->key.rsaPrv.nLen = bnLen; rsaPrv->key.rsaPrv.pLen = bnLen; rsaPrv->key.rsaPrv.qLen = bnLen; rsaPrv->key.rsaPrv.dPLen = bnLen; rsaPrv->key.rsaPrv.dQLen = bnLen; rsaPrv->key.rsaPrv.qInvLen = bnLen; rsaPrv->key.rsaPrv.eLen = bnLen; return CRYPT_SUCCESS; } void CRYPT_EAL_DeinitRsaPrv(CRYPT_EAL_PkeyPrv *rsaPrv) { BSL_SAL_ClearFree(rsaPrv->key.rsaPrv.d, rsaPrv->key.rsaPrv.dLen * 8); // 8 items } #endif // HITLS_CRYPTO_KEY_ENCODE #endif // HITLS_CRYPTO_RSA #ifdef HITLS_CRYPTO_KEY_DECODE #ifdef HITLS_CRYPTO_RSA static int32_t ProcRsaPssParam(BSL_ASN1_Buffer *rsaPssParam, CRYPT_EAL_PkeyCtx *ealPriKey) { CRYPT_RsaPadType padType = CRYPT_EMSA_PSS; int32_t ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_SET_RSA_PADDING, &padType, sizeof(CRYPT_RsaPadType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (rsaPssParam == NULL || rsaPssParam->buff == NULL) { return CRYPT_SUCCESS; } CRYPT_RSA_PssPara para = {0}; ret = CRYPT_EAL_ParseRsaPssAlgParam(rsaPssParam, &para); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Param param[4] = { {CRYPT_PARAM_RSA_MD_ID, BSL_PARAM_TYPE_INT32, &para.mdId, sizeof(para.mdId), 0}, {CRYPT_PARAM_RSA_MGF1_ID, BSL_PARAM_TYPE_INT32, &para.mgfId, sizeof(para.mgfId), 0}, {CRYPT_PARAM_RSA_SALTLEN, BSL_PARAM_TYPE_INT32, &para.saltLen, sizeof(para.saltLen), 0}, BSL_PARAM_END}; return CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_SET_RSA_EMSA_PSS, param, 0); } static int32_t SetRsaPubKey(const BSL_ASN1_Buffer *n, const BSL_ASN1_Buffer *e, CRYPT_EAL_PkeyCtx *ealPkey) { CRYPT_EAL_PkeyPub rsaPub = { .id = CRYPT_PKEY_RSA, .key.rsaPub = {.n = n->buff, .nLen = n->len, .e = e->buff, .eLen = e->len}}; return CRYPT_EAL_PkeySetPub(ealPkey, &rsaPub); } int32_t ParseRsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_EAL_PkeyCtx **ealPubKey, BslCid cid) { // decode n and e BSL_ASN1_Buffer pubAsn1[CRYPT_RSA_PUB_E_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPubkeyAsn1Buff(buff, buffLen, pubAsn1, CRYPT_RSA_PUB_E_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_RSA); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = SetRsaPubKey(pubAsn1 + CRYPT_RSA_PUB_N_IDX, pubAsn1 + CRYPT_RSA_PUB_E_IDX, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } if (cid != BSL_CID_RSASSAPSS) { *ealPubKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(param, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPubKey = pctx; return ret; } static int32_t ProcEalRsaPrivKey(const BSL_ASN1_Buffer *asn1, CRYPT_EAL_PkeyCtx *ealPkey) { CRYPT_EAL_PkeyPrv rsaPrv = {0}; rsaPrv.id = CRYPT_PKEY_RSA; rsaPrv.key.rsaPrv.d = asn1[CRYPT_RSA_PRV_D_IDX].buff; rsaPrv.key.rsaPrv.dLen = asn1[CRYPT_RSA_PRV_D_IDX].len; rsaPrv.key.rsaPrv.n = asn1[CRYPT_RSA_PRV_N_IDX].buff; rsaPrv.key.rsaPrv.nLen = asn1[CRYPT_RSA_PRV_N_IDX].len; rsaPrv.key.rsaPrv.e = asn1[CRYPT_RSA_PRV_E_IDX].buff; rsaPrv.key.rsaPrv.eLen = asn1[CRYPT_RSA_PRV_E_IDX].len; rsaPrv.key.rsaPrv.p = asn1[CRYPT_RSA_PRV_P_IDX].buff; rsaPrv.key.rsaPrv.pLen = asn1[CRYPT_RSA_PRV_P_IDX].len; rsaPrv.key.rsaPrv.q = asn1[CRYPT_RSA_PRV_Q_IDX].buff; rsaPrv.key.rsaPrv.qLen = asn1[CRYPT_RSA_PRV_Q_IDX].len; rsaPrv.key.rsaPrv.dP = asn1[CRYPT_RSA_PRV_DP_IDX].buff; rsaPrv.key.rsaPrv.dPLen = asn1[CRYPT_RSA_PRV_DP_IDX].len; rsaPrv.key.rsaPrv.dQ = asn1[CRYPT_RSA_PRV_DQ_IDX].buff; rsaPrv.key.rsaPrv.dQLen = asn1[CRYPT_RSA_PRV_DQ_IDX].len; rsaPrv.key.rsaPrv.qInv = asn1[CRYPT_RSA_PRV_QINV_IDX].buff; rsaPrv.key.rsaPrv.qInvLen = asn1[CRYPT_RSA_PRV_QINV_IDX].len; return CRYPT_EAL_PkeySetPrv(ealPkey, &rsaPrv); } static int32_t ProcEalRsaKeyPair(uint8_t *buff, uint32_t buffLen, CRYPT_EAL_PkeyCtx *ealPkey) { // decode n and e BSL_ASN1_Buffer asn1[CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ProcEalRsaPrivKey(asn1, ealPkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return SetRsaPubKey(asn1 + CRYPT_RSA_PRV_N_IDX, asn1 + CRYPT_RSA_PRV_E_IDX, ealPkey); } int32_t ParseRsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, BslCid cid, CRYPT_EAL_PkeyCtx **ealPriKey) { CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_RSA); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ProcEalRsaKeyPair(buff, buffLen, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } if (cid != BSL_CID_RSASSAPSS) { *ealPriKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(rsaPssParam, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); return ret; } *ealPriKey = pctx; return ret; } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) static int32_t EccEalKeyNew(BSL_ASN1_Buffer *ecParamOid, int32_t *alg, CRYPT_EAL_PkeyCtx **ealKey) { int32_t algId; BslOidString oidStr = {ecParamOid->len, (char *)ecParamOid->buff, 0}; CRYPT_PKEY_ParaId paraId = (CRYPT_PKEY_ParaId)BSL_OBJ_GetCID(&oidStr); if (paraId == CRYPT_ECC_SM2) { algId = CRYPT_PKEY_SM2; } else if (IsEcdsaEcParaId(paraId)) { algId = CRYPT_PKEY_ECDSA; } else { // scenario ecdh is not considered, and it will be improved in the future return CRYPT_DECODE_UNKNOWN_OID; } CRYPT_EAL_PkeyCtx *key = CRYPT_EAL_PkeyNewCtx(algId); if (key == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } #ifdef HITLS_CRYPTO_ECDSA if (paraId != CRYPT_ECC_SM2) { int32_t ret = CRYPT_EAL_PkeySetParaById(key, paraId); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(key); BSL_ERR_PUSH_ERROR(ret); return ret; } } #endif *ealKey = key; *alg = algId; return CRYPT_SUCCESS; } static int32_t ParseEccPubkeyAsn1Buff(BSL_ASN1_BitString *bitPubkey, BSL_ASN1_Buffer *ecParamOid, CRYPT_EAL_PkeyCtx **ealPubKey) { int32_t algId; CRYPT_EAL_PkeyCtx *pctx = NULL; int32_t ret = EccEalKeyNew(ecParamOid, &algId, &pctx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_EAL_PkeyPub pub = {.id = algId, .key.eccPub = {.data = bitPubkey->buff, .len = bitPubkey->len}}; ret = CRYPT_EAL_PkeySetPub(pctx, &pub); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPubKey = pctx; return ret; } static int32_t ParseEccPrikeyAsn1(BSL_ASN1_Buffer *encode, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_ASN1_Buffer *prikey = &encode[CRYPT_ECPRIKEY_PRIKEY_IDX]; // the ECC OID BSL_ASN1_Buffer *ecParamOid = &encode[CRYPT_ECPRIKEY_PARAM_IDX]; // the parameters OID BSL_ASN1_Buffer *pubkey = &encode[CRYPT_ECPRIKEY_PUBKEY_IDX]; // the ECC OID BSL_ASN1_Buffer *param = pk8AlgoParam; if (ecParamOid->len != 0) { // has a valid Algorithm param param = ecParamOid; } else { if (param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (param->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } } if (pubkey->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_FAILED); return CRYPT_DECODE_ASN1_BUFF_FAILED; } int32_t algId; CRYPT_EAL_PkeyCtx *pctx = NULL; int32_t ret = EccEalKeyNew(param, &algId, &pctx); // Changed ecParamOid to param if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_EAL_PkeyPrv prv = {.id = algId, .key.eccPrv = {.data = prikey->buff, .len = prikey->len}}; ret = CRYPT_EAL_PkeySetPrv(pctx, &prv); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } // the tag of public key is BSL_ASN1_TAG_BITSTRING, 1 denote unusedBits CRYPT_EAL_PkeyPub pub = {.id = algId, .key.eccPub = {.data = pubkey->buff + 1, .len = pubkey->len - 1}}; ret = CRYPT_EAL_PkeySetPub(pctx, &pub); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPriKey = pctx; return ret; } int32_t ParseEccPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_ASN1_Buffer asn1[CRYPT_ECPRIKEY_PUBKEY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_PrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_ECPRIKEY_PUBKEY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ParseEccPrikeyAsn1(asn1, pk8AlgoParam, ealPriKey); } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_ED25519 static int32_t ParseEd25519PrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, CRYPT_EAL_PkeyCtx **ealPriKey) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; int32_t ret = BSL_ASN1_DecodeTagLen(BSL_ASN1_TAG_OCTETSTRING, &tmpBuff, &tmpBuffLen, &tmpBuffLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_ED25519); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPrv prv = {.id = CRYPT_PKEY_ED25519, .key.curve25519Prv = {.data = tmpBuff, .len = tmpBuffLen}}; ret = CRYPT_EAL_PkeySetPrv(pctx, &prv); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPriKey = pctx; return CRYPT_SUCCESS; } static int32_t ParseEd25519PubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, CRYPT_EAL_PkeyCtx **ealPubKey) { CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_ED25519); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPub pub = {.id = CRYPT_PKEY_ED25519, .key.curve25519Pub = {.data = buff, .len = buffLen}}; int32_t ret = CRYPT_EAL_PkeySetPub(pctx, &pub); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPubKey = pctx; return ret; } #endif // HITLS_CRYPTO_ED25519 static int32_t ParsePk8PrikeyAsn1(CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo, CRYPT_EAL_PkeyCtx **ealPriKey) { #ifdef HITLS_CRYPTO_RSA if (pk8PrikeyInfo->keyType == BSL_CID_RSA || pk8PrikeyInfo->keyType == BSL_CID_RSASSAPSS) { return ParseRsaPrikeyAsn1Buff(pk8PrikeyInfo->pkeyRawKey, pk8PrikeyInfo->pkeyRawKeyLen, &pk8PrikeyInfo->keyParam, pk8PrikeyInfo->keyType, ealPriKey); } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) if (pk8PrikeyInfo->keyType == BSL_CID_EC_PUBLICKEY) { return ParseEccPrikeyAsn1Buff(pk8PrikeyInfo->pkeyRawKey, pk8PrikeyInfo->pkeyRawKeyLen, &pk8PrikeyInfo->keyParam, ealPriKey); } #endif #ifdef HITLS_CRYPTO_ED25519 if (pk8PrikeyInfo->keyType == BSL_CID_ED25519) { return ParseEd25519PrikeyAsn1Buff(pk8PrikeyInfo->pkeyRawKey, pk8PrikeyInfo->pkeyRawKeyLen, ealPriKey); } #endif return CRYPT_DECODE_UNSUPPORTED_PKCS8_TYPE; } int32_t ParseSubPubkeyAsn1(BSL_ASN1_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { uint8_t *algoBuff = encode->buff; // AlgorithmIdentifier Tag and Len, 2 bytes. uint32_t algoBuffLen = encode->len; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_AlgoIdAsn1Buff(algoBuff, algoBuffLen, NULL, algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } BSL_ASN1_Buffer *oid = algoId; // OID BSL_ASN1_Buffer *algParam = algoId + 1; // the parameters BSL_ASN1_Buffer *pubkey = &encode[CRYPT_SUBKEYINFO_BITSTRING_IDX]; // the last BSL_ASN1_Buffer, the pubkey BSL_ASN1_BitString bitPubkey = {0}; ret = BSL_ASN1_DecodePrimitiveItem(pubkey, &bitPubkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {oid->len, (char *)oid->buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) if (cid == BSL_CID_EC_PUBLICKEY || cid == BSL_CID_SM2PRIME256) { return ParseEccPubkeyAsn1Buff(&bitPubkey, algParam, ealPubKey); } #endif #ifdef HITLS_CRYPTO_RSA if (cid == BSL_CID_RSA || cid == BSL_CID_RSASSAPSS) { return ParseRsaPubkeyAsn1Buff(bitPubkey.buff, bitPubkey.len, algParam, ealPubKey, cid); } #endif #ifdef HITLS_CRYPTO_ED25519 (void)algParam; if (cid == BSL_CID_ED25519) { return ParseEd25519PubkeyAsn1Buff(bitPubkey.buff, bitPubkey.len, ealPubKey); } #endif BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } int32_t ParsePk8PriKeyBuff(BSL_Buffer *buff, CRYPT_EAL_PkeyCtx **ealPriKey) { uint8_t *tmpBuff = buff->data; uint32_t tmpBuffLen = buff->dataLen; CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(tmpBuff, tmpBuffLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ParsePk8PrikeyAsn1(&pk8PrikeyInfo, ealPriKey); } #ifdef HITLS_CRYPTO_KEY_EPKI int32_t ParsePk8EncPriKeyBuff(BSL_Buffer *buff, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_Buffer decode = {0}; int32_t ret = CRYPT_DECODE_Pkcs8PrvDecrypt(NULL, NULL, buff, pwd, NULL, &decode); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ParsePk8PriKeyBuff(&decode, ealPriKey); BSL_SAL_ClearFree(decode.data, decode.dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif int32_t CRYPT_EAL_ParseAsn1SubPubkey(uint8_t *buff, uint32_t buffLen, void **ealPubKey, bool isComplete) { // decode sub pubkey info BSL_ASN1_Buffer pubAsn1[CRYPT_SUBKEYINFO_BITSTRING_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_ParseSubKeyInfo(buff, buffLen, pubAsn1, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ParseSubPubkeyAsn1(pubAsn1, (CRYPT_EAL_PkeyCtx **)ealPubKey); } #endif // HITLS_CRYPTO_KEY_DECODE #ifdef HITLS_CRYPTO_KEY_ENCODE #ifdef HITLS_CRYPTO_RSA static int32_t EncodePssParam(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *pssParam) { if (pssParam == NULL) { return CRYPT_SUCCESS; } int32_t padType = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(ealPubKey, CRYPT_CTRL_GET_RSA_PADDING, &padType, sizeof(padType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (padType != CRYPT_EMSA_PSS) { pssParam->tag = BSL_ASN1_TAG_NULL; return CRYPT_SUCCESS; } CRYPT_RSA_PssPara rsaPssParam = {0}; ret = CRYPT_EAL_GetRsaPssPara(ealPubKey, &rsaPssParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pssParam->tag = BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED; return CRYPT_EAL_EncodeRsaPssAlgParam(&rsaPssParam, &pssParam->buff, &pssParam->len); } int32_t EncodeRsaPubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *pssParam, BSL_Buffer *encodePub) { uint32_t bnLen = CRYPT_EAL_PkeyGetKeyLen(ealPubKey); if (bnLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } CRYPT_EAL_PkeyPub pub = {0}; pub.id = CRYPT_PKEY_RSA; pub.key.rsaPub.n = (uint8_t *)BSL_SAL_Malloc(bnLen); if (pub.key.rsaPub.n == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } pub.key.rsaPub.e = (uint8_t *)BSL_SAL_Malloc(bnLen); if (pub.key.rsaPub.e == NULL) { BSL_SAL_FREE(pub.key.rsaPub.n); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } pub.key.rsaPub.nLen = bnLen; pub.key.rsaPub.eLen = bnLen; int32_t ret = CRYPT_EAL_PkeyGetPub(ealPubKey, &pub); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(pub.key.rsaPub.n); BSL_SAL_FREE(pub.key.rsaPub.e); BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Buffer pubAsn1[CRYPT_RSA_PUB_E_IDX + 1] = { {BSL_ASN1_TAG_INTEGER, pub.key.rsaPub.nLen, pub.key.rsaPub.n}, {BSL_ASN1_TAG_INTEGER, pub.key.rsaPub.eLen, pub.key.rsaPub.e}, }; ret = CRYPT_ENCODE_RsaPubkeyAsn1Buff(pubAsn1, encodePub); BSL_SAL_FREE(pub.key.rsaPub.n); BSL_SAL_FREE(pub.key.rsaPub.e); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = EncodePssParam(ealPubKey, pssParam); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(encodePub->data); BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t EncodeRsaPrvKey(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_ASN1_Buffer *pk8AlgoParam, BSL_Buffer *bitStr, CRYPT_PKEY_AlgId *cid) { CRYPT_RsaPadType pad = CRYPT_RSA_PADDINGMAX; int32_t ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_PADDING, &pad, sizeof(pad)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_RSA_PssPara rsaPssParam = {0}; BSL_Buffer tmp = {0}; switch (pad) { case CRYPT_EMSA_PSS: ret = CRYPT_EAL_GetRsaPssPara(ealPriKey, &rsaPssParam); if (ret != BSL_SUCCESS) { return ret; } ret = EncodeRsaPrikeyAsn1Buff(ealPriKey, CRYPT_PKEY_RSA, &tmp); if (ret != BSL_SUCCESS) { return ret; } ret = CRYPT_EAL_EncodeRsaPssAlgParam(&rsaPssParam, &pk8AlgoParam->buff, &pk8AlgoParam->len); if (ret != BSL_SUCCESS) { BSL_SAL_ClearFree(tmp.data, tmp.dataLen); BSL_ERR_PUSH_ERROR(ret); return ret; } pk8AlgoParam->tag = BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED; *cid = (CRYPT_PKEY_AlgId)BSL_CID_RSASSAPSS; break; default: ret = EncodeRsaPrikeyAsn1Buff(ealPriKey, CRYPT_PKEY_RSA, &tmp); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pk8AlgoParam->tag = BSL_ASN1_TAG_NULL; break; } bitStr->data = tmp.data; bitStr->dataLen = tmp.dataLen; return CRYPT_SUCCESS; } static void SetRsaPrv2Arr(const CRYPT_EAL_PkeyPrv *rsaPrv, BSL_ASN1_Buffer *asn1) { asn1[CRYPT_RSA_PRV_D_IDX].buff = rsaPrv->key.rsaPrv.d; asn1[CRYPT_RSA_PRV_D_IDX].len = rsaPrv->key.rsaPrv.dLen; asn1[CRYPT_RSA_PRV_N_IDX].buff = rsaPrv->key.rsaPrv.n; asn1[CRYPT_RSA_PRV_N_IDX].len = rsaPrv->key.rsaPrv.nLen; asn1[CRYPT_RSA_PRV_E_IDX].buff = rsaPrv->key.rsaPrv.e; asn1[CRYPT_RSA_PRV_E_IDX].len = rsaPrv->key.rsaPrv.eLen; asn1[CRYPT_RSA_PRV_P_IDX].buff = rsaPrv->key.rsaPrv.p; asn1[CRYPT_RSA_PRV_P_IDX].len = rsaPrv->key.rsaPrv.pLen; asn1[CRYPT_RSA_PRV_Q_IDX].buff = rsaPrv->key.rsaPrv.q; asn1[CRYPT_RSA_PRV_Q_IDX].len = rsaPrv->key.rsaPrv.qLen; asn1[CRYPT_RSA_PRV_DP_IDX].buff = rsaPrv->key.rsaPrv.dP; asn1[CRYPT_RSA_PRV_DP_IDX].len = rsaPrv->key.rsaPrv.dPLen; asn1[CRYPT_RSA_PRV_DQ_IDX].buff = rsaPrv->key.rsaPrv.dQ; asn1[CRYPT_RSA_PRV_DQ_IDX].len = rsaPrv->key.rsaPrv.dQLen; asn1[CRYPT_RSA_PRV_QINV_IDX].buff = rsaPrv->key.rsaPrv.qInv; asn1[CRYPT_RSA_PRV_QINV_IDX].len = rsaPrv->key.rsaPrv.qInvLen; asn1[CRYPT_RSA_PRV_D_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_N_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_E_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_P_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_Q_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_DP_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_DQ_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_QINV_IDX].tag = BSL_ASN1_TAG_INTEGER; } int32_t EncodeRsaPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, BSL_Buffer *encode) { int32_t ret; BSL_ASN1_Buffer asn1[CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1] = {0}; CRYPT_EAL_PkeyPrv rsaPrv = {0}; ret = CRYPT_EAL_InitRsaPrv(ealPriKey, cid, &rsaPrv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_PkeyGetPrv(ealPriKey, &rsaPrv); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_DeinitRsaPrv(&rsaPrv); BSL_ERR_PUSH_ERROR(ret); return ret; } SetRsaPrv2Arr(&rsaPrv, asn1); uint8_t version = 0; asn1[CRYPT_RSA_PRV_VERSION_IDX].buff = (uint8_t *)&version; asn1[CRYPT_RSA_PRV_VERSION_IDX].len = sizeof(version); asn1[CRYPT_RSA_PRV_VERSION_IDX].tag = BSL_ASN1_TAG_INTEGER; ret = CRYPT_ENCODE_RsaPrikeyAsn1Buff(asn1, CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1, encode); CRYPT_EAL_DeinitRsaPrv(&rsaPrv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) static inline void SetAsn1Buffer(BSL_ASN1_Buffer *asn, uint8_t tag, uint32_t len, uint8_t *buff) { asn->tag = tag; asn->len = len; asn->buff = buff; } static int32_t EncodeEccKeyPair(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, BSL_ASN1_Buffer *asn1, BSL_Buffer *encode) { int32_t ret; uint32_t keyLen = CRYPT_EAL_PkeyGetKeyLen(ealPriKey); if (keyLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pri = (uint8_t *)BSL_SAL_Malloc(keyLen); if (pri == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPrv prv = {.id = cid, .key.eccPrv = {.data = pri, .len = keyLen}}; uint8_t *pub = NULL; do { ret = CRYPT_EAL_PkeyGetPrv(ealPriKey, &prv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } SetAsn1Buffer(asn1 + CRYPT_ECPRIKEY_PRIKEY_IDX, BSL_ASN1_TAG_OCTETSTRING, prv.key.eccPrv.len, prv.key.eccPrv.data); pub = (uint8_t *)BSL_SAL_Malloc(keyLen); if (pub == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); break; } CRYPT_EAL_PkeyPub pubKey = {.id = cid, .key.eccPub = {.data = pub, .len = keyLen}}; ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GEN_ECC_PUBLICKEY, NULL, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } ret = CRYPT_EAL_PkeyGetPub(ealPriKey, &pubKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } BSL_ASN1_BitString bitStr = {pubKey.key.eccPub.data, pubKey.key.eccPub.len, 0}; SetAsn1Buffer(asn1 + CRYPT_ECPRIKEY_PUBKEY_IDX, BSL_ASN1_TAG_BITSTRING, sizeof(BSL_ASN1_BitString), (uint8_t *)&bitStr); ret = CRYPT_ENCODE_EccPrikeyAsn1Buff(asn1, CRYPT_ECPRIKEY_PUBKEY_IDX + 1, encode); } while (0); BSL_SAL_ClearFree(pri, keyLen); BSL_SAL_FREE(pub); return ret; } int32_t EncodeEccPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_ASN1_Buffer *pk8AlgoParam, BSL_Buffer *encode) { uint8_t version = 1; BSL_ASN1_Buffer asn1[CRYPT_ECPRIKEY_PUBKEY_IDX + 1] = { {BSL_ASN1_TAG_INTEGER, sizeof(version), &version}, {0}, {0}, {0}}; CRYPT_PKEY_AlgId cid = CRYPT_EAL_PkeyGetId(ealPriKey); BslOidString *oid = cid == CRYPT_PKEY_SM2 ? BSL_OBJ_GetOID((BslCid)CRYPT_ECC_SM2) : BSL_OBJ_GetOID((BslCid)CRYPT_EAL_PkeyGetParaId(ealPriKey)); if (oid == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } if (pk8AlgoParam != NULL) { // pkcs8 pk8AlgoParam->buff = (uint8_t *)oid->octs; pk8AlgoParam->len = oid->octetLen; pk8AlgoParam->tag = BSL_ASN1_TAG_OBJECT_ID; } else { // pkcs1 asn1[CRYPT_ECPRIKEY_PARAM_IDX].buff = (uint8_t *)oid->octs; asn1[CRYPT_ECPRIKEY_PARAM_IDX].len = oid->octetLen; asn1[CRYPT_ECPRIKEY_PARAM_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; } return EncodeEccKeyPair(ealPriKey, cid, asn1, encode); } static int32_t EncodeEccPubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *ecParamOid, BSL_Buffer *encodePub) { int32_t ret; CRYPT_PKEY_ParaId paraId = CRYPT_EAL_PkeyGetParaId(ealPubKey); BslOidString *oid = BSL_OBJ_GetOID((BslCid)paraId); if (CRYPT_EAL_PkeyGetId(ealPubKey) == CRYPT_PKEY_SM2) { oid = BSL_OBJ_GetOID((BslCid)CRYPT_ECC_SM2); } if (oid == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } ecParamOid->buff = (uint8_t *)oid->octs; ecParamOid->len = oid->octetLen; ecParamOid->tag = BSL_ASN1_TAG_OBJECT_ID; uint32_t pubLen = CRYPT_EAL_PkeyGetKeyLen(ealPubKey); if (pubLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pub = (uint8_t *)BSL_SAL_Malloc(pubLen); if (pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPub pubKey = {.id = CRYPT_EAL_PkeyGetId(ealPubKey), .key.eccPub = {.data = pub, .len = pubLen}}; ret = CRYPT_EAL_PkeyGetPub(ealPubKey, &pubKey); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(pub); BSL_ERR_PUSH_ERROR(ret); return ret; } encodePub->data = pubKey.key.eccPub.data; encodePub->dataLen = pubKey.key.eccPub.len; return ret; } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_ED25519 static int32_t EncodeEd25519PubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_Buffer *bitStr) { uint32_t pubLen = CRYPT_EAL_PkeyGetKeyLen(ealPubKey); if (pubLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pub = (uint8_t *)BSL_SAL_Malloc(pubLen); if (pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPub pubKey = {.id = CRYPT_PKEY_ED25519, .key.curve25519Pub = {.data = pub, .len = pubLen}}; int32_t ret = CRYPT_EAL_PkeyGetPub(ealPubKey, &pubKey); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(pub); BSL_ERR_PUSH_ERROR(ret); return ret; } bitStr->data = pubKey.key.curve25519Pub.data; bitStr->dataLen = pubKey.key.curve25519Pub.len; return CRYPT_SUCCESS; } static int32_t EncodeEd25519PrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *bitStr) { uint8_t keyBuff[32] = {0}; // The length of the ed25519 private key is 32 CRYPT_EAL_PkeyPrv prv = {.id = CRYPT_PKEY_ED25519, .key.curve25519Prv = {.data = keyBuff, .len = sizeof(keyBuff)}}; int32_t ret = CRYPT_EAL_PkeyGetPrv(ealPriKey, &prv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_TemplateItem octStr[] = {{BSL_ASN1_TAG_OCTETSTRING, 0, 0}}; BSL_ASN1_Template templ = {octStr, 1}; BSL_ASN1_Buffer prvAsn1 = {BSL_ASN1_TAG_OCTETSTRING, prv.key.curve25519Prv.len, prv.key.curve25519Prv.data}; return BSL_ASN1_EncodeTemplate(&templ, &prvAsn1, 1, &bitStr->data, &bitStr->dataLen); } #endif // HITLS_CRYPTO_ED25519 static int32_t EncodePk8AlgidAny(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *bitStr, BSL_ASN1_Buffer *keyParam, BslCid *cidOut) { (void)keyParam; int32_t ret = CRYPT_DECODE_NO_SUPPORT_TYPE; BSL_Buffer tmp = {0}; CRYPT_PKEY_AlgId cid = CRYPT_EAL_PkeyGetId(ealPriKey); switch (cid) { #ifdef HITLS_CRYPTO_RSA case CRYPT_PKEY_RSA: ret = EncodeRsaPrvKey(ealPriKey, keyParam, &tmp, &cid); break; #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: cid = (CRYPT_PKEY_AlgId)BSL_CID_EC_PUBLICKEY; ret = EncodeEccPrikeyAsn1Buff(ealPriKey, keyParam, &tmp); break; #endif #ifdef HITLS_CRYPTO_ED25519 case CRYPT_PKEY_ED25519: ret = EncodeEd25519PrikeyAsn1Buff(ealPriKey, &tmp); break; #endif default: ret = CRYPT_DECODE_NO_SUPPORT_TYPE; break; } if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } bitStr->data = tmp.data; bitStr->dataLen = tmp.dataLen; *cidOut = (BslCid)cid; return ret; } int32_t EncodePk8PriKeyBuff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *asn1) { int32_t ret; BSL_Buffer bitStr = {0}; CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; do { ret = EncodePk8AlgidAny(ealPriKey, &bitStr, &pk8PrikeyInfo.keyParam, &pk8PrikeyInfo.keyType); if (ret != CRYPT_SUCCESS) { break; } pk8PrikeyInfo.pkeyRawKey = bitStr.data; pk8PrikeyInfo.pkeyRawKeyLen = bitStr.dataLen; ret = CRYPT_ENCODE_Pkcs8Info(&pk8PrikeyInfo, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } } while (0); // rsa-pss mode release buffer if (pk8PrikeyInfo.keyParam.tag == (BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED)) { BSL_SAL_FREE(pk8PrikeyInfo.keyParam.buff); } BSL_SAL_ClearFree(bitStr.data, bitStr.dataLen); return ret; } #ifdef HITLS_CRYPTO_KEY_EPKI static int32_t CheckEncodeParam(const CRYPT_EncodeParam *encodeParam) { if (encodeParam == NULL || encodeParam->param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (encodeParam->deriveMode != CRYPT_DERIVE_PBKDF2) { BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } CRYPT_Pbkdf2Param *pkcsParam = (CRYPT_Pbkdf2Param *)encodeParam->param; if (pkcsParam->pwdLen > PWD_MAX_LEN || (pkcsParam->pwd == NULL && pkcsParam->pwdLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } if (pkcsParam->pbesId != BSL_CID_PBES2 || pkcsParam->pbkdfId != BSL_CID_PBKDF2) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } return CRYPT_SUCCESS; } int32_t EncodePk8EncPriKeyBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_Buffer *encode) { /* EncAlgid */ int32_t ret = CheckEncodeParam(encodeParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_Pbkdf2Param *pkcs8Param = (CRYPT_Pbkdf2Param *)encodeParam->param; BSL_Buffer unEncrypted = {0}; ret = EncodePk8PriKeyBuff(ealPriKey, &unEncrypted); if (ret != CRYPT_SUCCESS) { return ret; } BSL_ASN1_Buffer asn1[CRYPT_PKCS_ENCPRIKEY_MAX] = {0}; ret = CRYPT_ENCODE_PkcsEncryptedBuff(libCtx, attrName, pkcs8Param, &unEncrypted, asn1); if (ret != CRYPT_SUCCESS) { BSL_SAL_ClearFree(unEncrypted.data, unEncrypted.dataLen); return ret; } BSL_ASN1_Template templ = {g_pk8EncPriKeyTempl, sizeof(g_pk8EncPriKeyTempl) / sizeof(g_pk8EncPriKeyTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&templ, asn1, CRYPT_PKCS_ENCPRIKEY_MAX, &encode->data, &encode->dataLen); BSL_SAL_ClearFree(unEncrypted.data, unEncrypted.dataLen); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len); BSL_SAL_FREE(asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff); return ret; } #endif // HITLS_CRYPTO_KEY_EPKI static int32_t CRYPT_EAL_SubPubkeyGetInfo(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *algo, BSL_Buffer *bitStr) { int32_t ret = CRYPT_ERR_ALGID; CRYPT_PKEY_AlgId cid = CRYPT_EAL_PkeyGetId(ealPubKey); BSL_Buffer bitTmp = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; #ifdef HITLS_CRYPTO_RSA if (cid == CRYPT_PKEY_RSA) { ret = EncodeRsaPubkeyAsn1Buff(ealPubKey, &algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX], &bitTmp); if (algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX].tag == (BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED)) { cid = (CRYPT_PKEY_AlgId)BSL_CID_RSASSAPSS; } } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) if (cid == CRYPT_PKEY_ECDSA || cid == CRYPT_PKEY_SM2) { cid = (CRYPT_PKEY_AlgId)BSL_CID_EC_PUBLICKEY; ret = EncodeEccPubkeyAsn1Buff(ealPubKey, &algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX], &bitTmp); } #endif #ifdef HITLS_CRYPTO_ED25519 if (cid == CRYPT_PKEY_ED25519) { ret = EncodeEd25519PubkeyAsn1Buff(ealPubKey, &bitTmp); } #endif if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)cid); if (oidStr == NULL) { BSL_SAL_FREE(bitTmp.data); ret = CRYPT_ERR_ALGID; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } algoId[BSL_ASN1_TAG_ALGOID_IDX].buff = (uint8_t *)oidStr->octs; algoId[BSL_ASN1_TAG_ALGOID_IDX].len = oidStr->octetLen; algoId[BSL_ASN1_TAG_ALGOID_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; ret = CRYPT_ENCODE_AlgoIdAsn1Buff(algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1, &algo->buff, &algo->len); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(bitTmp.data); BSL_ERR_PUSH_ERROR(ret); goto EXIT; } bitStr->data = bitTmp.data; bitStr->dataLen = bitTmp.dataLen; EXIT: #ifdef HITLS_CRYPTO_RSA if (cid == (CRYPT_PKEY_AlgId)BSL_CID_RSASSAPSS) { BSL_SAL_FREE(algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX].buff); } #endif return ret; } int32_t CRYPT_EAL_EncodeAsn1SubPubkey(CRYPT_EAL_PkeyCtx *ealPubKey, bool isComplete, BSL_Buffer *encodeH) { BSL_ASN1_Buffer algo = {0}; BSL_Buffer bitStr = {0}; int32_t ret = CRYPT_EAL_SubPubkeyGetInfo(ealPubKey, &algo, &bitStr); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_ENCODE_SubPubkeyByInfo(&algo, &bitStr, encodeH, isComplete); BSL_SAL_FREE(bitStr.data); BSL_SAL_FREE(algo.buff); return ret; } #ifdef HITLS_CRYPTO_RSA int32_t EncodeHashAlg(CRYPT_MD_AlgId mdId, BSL_ASN1_Buffer *asn) { if (mdId == CRYPT_MD_SHA1) { asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH; asn->buff = NULL; asn->len = 0; return CRYPT_SUCCESS; } BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)mdId); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BSL_ASN1_TemplateItem hashTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_OBJECT_ID, 0, 1}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 1}, }; BSL_ASN1_Template templ = {hashTempl, sizeof(hashTempl) / sizeof(hashTempl[0])}; BSL_ASN1_Buffer asnArr[2] = { {BSL_ASN1_TAG_OBJECT_ID, oidStr->octetLen, (uint8_t *)oidStr->octs}, {BSL_ASN1_TAG_NULL, 0, NULL}, }; int32_t ret = BSL_ASN1_EncodeTemplate(&templ, asnArr, 2, &(asn->buff), &(asn->len)); // 2: oid and null if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH; return CRYPT_SUCCESS; } static int32_t EncodeMgfAlg(CRYPT_MD_AlgId mgfId, BSL_ASN1_Buffer *asn) { if (mgfId == CRYPT_MD_SHA1) { asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN; asn->buff = NULL; asn->len = 0; return CRYPT_SUCCESS; } BslOidString *mgfStr = BSL_OBJ_GetOID(BSL_CID_MGF1); if (mgfStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)mgfId); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BSL_ASN1_TemplateItem mgfTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_OBJECT_ID, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 2}, }; BSL_ASN1_Template templ = {mgfTempl, sizeof(mgfTempl) / sizeof(mgfTempl[0])}; BSL_ASN1_Buffer asnArr[3] = { {BSL_ASN1_TAG_OBJECT_ID, mgfStr->octetLen, (uint8_t *)mgfStr->octs}, {BSL_ASN1_TAG_OBJECT_ID, oidStr->octetLen, (uint8_t *)oidStr->octs}, {BSL_ASN1_TAG_NULL, 0, NULL}, // param }; int32_t ret = BSL_ASN1_EncodeTemplate(&templ, asnArr, 3, &(asn->buff), &(asn->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN; return CRYPT_SUCCESS; } static int32_t EncodeSaltLen(int32_t saltLen, BSL_ASN1_Buffer *asn) { if (saltLen == 20) { // 20 : default saltLen asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN; asn->buff = NULL; asn->len = 0; return CRYPT_SUCCESS; } BSL_ASN1_Buffer saltAsn = {0}; int32_t ret = BSL_ASN1_EncodeLimb(BSL_ASN1_TAG_INTEGER, (uint64_t)saltLen, &saltAsn); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_TemplateItem saltTempl = {BSL_ASN1_TAG_INTEGER, 0, 0}; BSL_ASN1_Template templ = {&saltTempl, 1}; ret = BSL_ASN1_EncodeTemplate(&templ, &saltAsn, 1, &(asn->buff), &(asn->len)); BSL_SAL_Free(saltAsn.buff); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN; return CRYPT_SUCCESS; } #define X509_RSAPSS_ELEM_NUMBER 4 int32_t CRYPT_EAL_EncodeRsaPssAlgParam(const CRYPT_RSA_PssPara *rsaPssParam, uint8_t **buf, uint32_t *bufLen) { BSL_ASN1_Buffer asnArr[X509_RSAPSS_ELEM_NUMBER] = {0}; int32_t ret = EncodeHashAlg(rsaPssParam->mdId, &asnArr[0]); if (ret != CRYPT_SUCCESS) { return ret; } ret = EncodeMgfAlg(rsaPssParam->mgfId, &asnArr[1]); if (ret != CRYPT_SUCCESS) { goto EXIT; } ret = EncodeSaltLen(rsaPssParam->saltLen, &asnArr[2]); // 2: saltLength if (ret != CRYPT_SUCCESS) { goto EXIT; } if (asnArr[0].len + asnArr[1].len + asnArr[2].len == 0) { // [0]:hash + [1]:mgf + [2]:salt all default return ret; } // 3 : trailed asnArr[3].tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED; BSL_ASN1_TemplateItem rsapssTempl[] = { {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED, BSL_ASN1_FLAG_DEFAULT, 0}, }; BSL_ASN1_Template templ = {rsapssTempl, sizeof(rsapssTempl) / sizeof(rsapssTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&templ, asnArr, X509_RSAPSS_ELEM_NUMBER, buf, bufLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: for (uint32_t i = 0; i < X509_RSAPSS_ELEM_NUMBER; i++) { BSL_SAL_Free(asnArr[i].buff); } return ret; } #endif // HITLS_CRYPTO_RSA #endif // HITLS_CRYPTO_KEY_ENCODE #ifdef HITLS_PKI_PKCS12 #define HITLS_P7_SPECIFIC_ENCONTENTINFO_EXTENSION 0 /** * EncryptedContentInfo ::= SEQUENCE { * contentType ContentType, * contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier, * encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc5652#section-6.1 */ static BSL_ASN1_TemplateItem g_enContentInfoTempl[] = { /* ContentType */ {BSL_ASN1_TAG_OBJECT_ID, 0, 0}, /* ContentEncryptionAlgorithmIdentifier */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, // ContentEncryptionAlgorithmIdentifier {BSL_ASN1_TAG_OBJECT_ID, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 2}, // derivation param {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, // enc scheme {BSL_ASN1_TAG_OBJECT_ID, 0, 3}, // alg {BSL_ASN1_TAG_OCTETSTRING, 0, 3}, // iv /* encryptedContent */ {BSL_ASN1_CLASS_CTX_SPECIFIC | HITLS_P7_SPECIFIC_ENCONTENTINFO_EXTENSION, BSL_ASN1_FLAG_OPTIONAL, 0}, }; typedef enum { HITLS_P7_ENC_CONTINFO_TYPE_IDX, HITLS_P7_ENC_CONTINFO_ENCALG_IDX, HITLS_P7_ENC_CONTINFO_DERIVE_PARAM_IDX, HITLS_P7_ENC_CONTINFO_SYMALG_IDX, HITLS_P7_ENC_CONTINFO_SYMIV_IDX, HITLS_P7_ENC_CONTINFO_ENCONTENT_IDX, HITLS_P7_ENC_CONTINFO_MAX_IDX, } HITLS_P7_ENC_CONTINFO_IDX; #define HITLS_P7_SPECIFIC_UNPROTECTEDATTRS_EXTENSION 1 /** * EncryptedData ::= SEQUENCE { * version CMSVersion, * encryptedContentInfo EncryptedContentInfo, * unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc5652#page-29 */ static BSL_ASN1_TemplateItem g_encryptedDataTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, /* version */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* EncryptedContentInfo */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 1}, /* unprotectedAttrs */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SET | HITLS_P7_SPECIFIC_UNPROTECTEDATTRS_EXTENSION, BSL_ASN1_FLAG_OPTIONAL | BSL_ASN1_FLAG_HEADERONLY, 1}, }; typedef enum { HITLS_P7_ENCRYPTDATA_VERSION_IDX, HITLS_P7_ENCRYPTDATA_ENCRYPTINFO_IDX, HITLS_P7_ENCRYPTDATA_UNPROTECTEDATTRS_IDX, HITLS_P7_ENCRYPTDATA_MAX_IDX, } HITLS_P7_ENCRYPTDATA_IDX; #ifdef HITLS_PKI_PKCS12_PARSE static int32_t ParsePKCS7EncryptedContentInfo(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, BSL_Buffer *output) { uint8_t *temp = encode->data; uint32_t tempLen = encode->dataLen; BSL_ASN1_Buffer asn1[HITLS_P7_ENC_CONTINFO_MAX_IDX] = {0}; BSL_ASN1_Template templ = {g_enContentInfoTempl, sizeof(g_enContentInfoTempl) / sizeof(g_enContentInfoTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &temp, &tempLen, asn1, HITLS_P7_ENC_CONTINFO_MAX_IDX); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString typeOidStr = {asn1[HITLS_P7_ENC_CONTINFO_TYPE_IDX].len, (char *)asn1[HITLS_P7_ENC_CONTINFO_TYPE_IDX].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&typeOidStr); if (cid != BSL_CID_PKCS7_SIMPLEDATA) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNSUPPORTED_PKCS7_TYPE); return CRYPT_DECODE_UNSUPPORTED_PKCS7_TYPE; } BslOidString encOidStr = {asn1[HITLS_P7_ENC_CONTINFO_ENCALG_IDX].len, (char *)asn1[HITLS_P7_ENC_CONTINFO_ENCALG_IDX].buff, 0}; cid = BSL_OBJ_GetCID(&encOidStr); if (cid != BSL_CID_PBES2) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNSUPPORTED_ENCRYPT_TYPE); return CRYPT_DECODE_UNSUPPORTED_ENCRYPT_TYPE; } // parse sym alg id BslOidString symOidStr = {asn1[HITLS_P7_ENC_CONTINFO_SYMALG_IDX].len, (char *)asn1[HITLS_P7_ENC_CONTINFO_SYMALG_IDX].buff, 0}; BslCid symId = BSL_OBJ_GetCID(&symOidStr); if (symId == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } BSL_Buffer derivekeyData = {asn1[HITLS_P7_ENC_CONTINFO_DERIVE_PARAM_IDX].buff, asn1[HITLS_P7_ENC_CONTINFO_DERIVE_PARAM_IDX].len}; BSL_Buffer ivData = {asn1[HITLS_P7_ENC_CONTINFO_SYMIV_IDX].buff, asn1[HITLS_P7_ENC_CONTINFO_SYMIV_IDX].len}; BSL_Buffer enData = {asn1[HITLS_P7_ENC_CONTINFO_ENCONTENT_IDX].buff, asn1[HITLS_P7_ENC_CONTINFO_ENCONTENT_IDX].len}; EncryptPara encPara = {.derivekeyData = &derivekeyData, .ivData = &ivData, .enData = &enData}; BSL_Buffer pwdBuffer = {(uint8_t *)(uintptr_t)pwd, pwdlen}; ret = CRYPT_DECODE_ParseEncDataAsn1(libCtx, attrName, symId, &encPara, &pwdBuffer, NULL, output); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_EAL_ParseAsn1PKCS7EncryptedData(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, BSL_Buffer *output) { if (encode == NULL || pwd == NULL || output == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pwdlen > PWD_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } uint8_t *temp = encode->data; uint32_t tempLen = encode->dataLen; BSL_ASN1_Buffer asn1[HITLS_P7_ENCRYPTDATA_MAX_IDX] = {0}; BSL_ASN1_Template templ = {g_encryptedDataTempl, sizeof(g_encryptedDataTempl) / sizeof(g_encryptedDataTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &temp, &tempLen, asn1, HITLS_P7_ENCRYPTDATA_MAX_IDX); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint32_t version = 0; ret = BSL_ASN1_DecodePrimitiveItem(&asn1[HITLS_P7_ENCRYPTDATA_VERSION_IDX], &version); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (version == 0 && asn1[HITLS_P7_ENCRYPTDATA_UNPROTECTEDATTRS_IDX].buff != NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE); return CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE; } // In RFC5652, if the encapsulated content type is other than id-data, then the value of version MUST be 2. if (version == 2 && asn1[HITLS_P7_ENCRYPTDATA_UNPROTECTEDATTRS_IDX].buff == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE); return CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE; } BSL_Buffer encryptInfo = {asn1[HITLS_P7_ENCRYPTDATA_ENCRYPTINFO_IDX].buff, asn1[HITLS_P7_ENCRYPTDATA_ENCRYPTINFO_IDX].len}; ret = ParsePKCS7EncryptedContentInfo(libCtx, attrName, &encryptInfo, pwd, pwdlen, output); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_PKI_PKCS12_PARSE #ifdef HITLS_PKI_PKCS12_GEN /* Encode PKCS7-EncryptData:only support PBES2 + PBKDF2, the param check ref CheckEncodeParam. */ static int32_t EncodePKCS7EncryptedContentInfo(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *data, const CRYPT_EncodeParam *encodeParam, BSL_Buffer *encode) { /* EncAlgid */ int32_t ret = CheckEncodeParam(encodeParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_Pbkdf2Param *pkcs7Param = (CRYPT_Pbkdf2Param *)encodeParam->param; BSL_ASN1_Buffer asn1[CRYPT_PKCS_ENCPRIKEY_MAX] = {0}; ret = CRYPT_ENCODE_PkcsEncryptedBuff(libCtx, attrName, pkcs7Param, data, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } do { BslOidString *oidStr = BSL_OBJ_GetOID(BSL_CID_PKCS7_SIMPLEDATA); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); ret = CRYPT_ERR_ALGID; break; } BSL_ASN1_Buffer p7asn[HITLS_P7_ENC_CONTINFO_MAX_IDX] = { {BSL_ASN1_TAG_OBJECT_ID, oidStr->octetLen, (uint8_t *)oidStr->octs}, {asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].buff}, {asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff}, {asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].buff}, {asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff}, {BSL_ASN1_CLASS_CTX_SPECIFIC | HITLS_P7_SPECIFIC_ENCONTENTINFO_EXTENSION, asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff}, }; BSL_ASN1_Template templ = {g_enContentInfoTempl, sizeof(g_enContentInfoTempl) / sizeof(g_enContentInfoTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&templ, p7asn, HITLS_P7_ENC_CONTINFO_MAX_IDX, &encode->data, &encode->dataLen); } while (0); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len); BSL_SAL_FREE(asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff); return ret; } int32_t CRYPT_EAL_EncodePKCS7EncryptDataBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *data, const void *encodeParam, BSL_Buffer *encode) { if (data == NULL || encodeParam == NULL || encode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Buffer contentInfo = {0}; int32_t ret = EncodePKCS7EncryptedContentInfo(libCtx, attrName, data, encodeParam, &contentInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint8_t version = 0; BSL_ASN1_Buffer asn1[HITLS_P7_ENCRYPTDATA_MAX_IDX] = { {BSL_ASN1_TAG_INTEGER, sizeof(version), &version}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, contentInfo.dataLen, contentInfo.data}, {0, 0, 0}, }; BSL_ASN1_Template templ = {g_encryptedDataTempl, sizeof(g_encryptedDataTempl) / sizeof(g_encryptedDataTempl[0])}; BSL_Buffer tmp = {0}; ret = BSL_ASN1_EncodeTemplate(&templ, asn1, HITLS_P7_ENCRYPTDATA_MAX_IDX, &tmp.data, &tmp.dataLen); BSL_SAL_FREE(contentInfo.data); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } encode->data = tmp.data; encode->dataLen = tmp.dataLen; return ret; } #endif // HITLS_PKI_PKCS12_GEN #endif // HITLS_PKI_PKCS12 #endif // HITLS_CRYPTO_CODECSKEY
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_encode_decode_local.c
C
unknown
56,034
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ENCODE_DECODE_KEY_LOCAL_H #define CRYPT_ENCODE_DECODE_KEY_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include "bsl_types.h" #include "bsl_asn1_internal.h" #include "crypt_types.h" #include "crypt_eal_pkey.h" #ifdef HITLS_CRYPTO_RSA #include "crypt_rsa.h" #endif #ifdef HITLS_CRYPTO_SM2 #include "crypt_sm2.h" #endif #ifdef HITLS_CRYPTO_ED25519 #include "crypt_curve25519.h" #endif #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ typedef struct { BSL_Buffer *derivekeyData; BSL_Buffer *ivData; BSL_Buffer *enData; } EncryptPara; typedef enum { CRYPT_RSA_PUB_N_IDX = 0, CRYPT_RSA_PUB_E_IDX = 1, } CRYPT_RSA_PUB_TEMPL_IDX; typedef enum { BSL_ASN1_TAG_ALGOID_IDX = 0, BSL_ASN1_TAG_ALGOID_ANY_IDX = 1, } ALGOID_TEMPL_IDX; typedef enum { CRYPT_SUBKEYINFO_ALGOID_IDX = 0, CRYPT_SUBKEYINFO_BITSTRING_IDX = 1, } CRYPT_SUBKEYINFO_TEMPL_IDX; typedef enum { CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX, CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX, CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX, CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX, CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX, CRYPT_PKCS_ENCPRIKEY_MAX } CRYPT_PKCS_ENCPRIKEY_TEMPL_IDX; typedef enum { CRYPT_ECPRIKEY_VERSION_IDX = 0, CRYPT_ECPRIKEY_PRIKEY_IDX = 1, CRYPT_ECPRIKEY_PARAM_IDX = 2, CRYPT_ECPRIKEY_PUBKEY_IDX = 3, } CRYPT_ECPRIKEY_TEMPL_IDX; typedef enum { CRYPT_RSA_PRV_VERSION_IDX = 0, CRYPT_RSA_PRV_N_IDX = 1, CRYPT_RSA_PRV_E_IDX = 2, CRYPT_RSA_PRV_D_IDX = 3, CRYPT_RSA_PRV_P_IDX = 4, CRYPT_RSA_PRV_Q_IDX = 5, CRYPT_RSA_PRV_DP_IDX = 6, CRYPT_RSA_PRV_DQ_IDX = 7, CRYPT_RSA_PRV_QINV_IDX = 8, CRYPT_RSA_PRV_OTHER_PRIME_IDX = 9 } CRYPT_RSA_PRV_TEMPL_IDX; #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH 0 #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN 1 #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN 2 #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED 3 #define PATH_MAX_LEN 4096 #define PWD_MAX_LEN 4096 #ifdef HITLS_CRYPTO_KEY_DECODE int32_t ParseSubPubkeyAsn1(BSL_ASN1_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey); int32_t ParseRsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_EAL_PkeyCtx **ealPubKey, BslCid cid); int32_t ParseRsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, BslCid cid, CRYPT_EAL_PkeyCtx **ealPriKey); int32_t ParseEccPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_EAL_PkeyCtx **ealPriKey); int32_t ParsePk8PriKeyBuff(BSL_Buffer *buff, CRYPT_EAL_PkeyCtx **ealPriKey); #ifdef HITLS_CRYPTO_KEY_EPKI int32_t ParsePk8EncPriKeyBuff(BSL_Buffer *buff, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey); int32_t CRYPT_DECODE_Pkcs8PrvDecrypt(CRYPT_EAL_LibCtx *libctx, const char *attrName, BSL_Buffer *buff, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode); int32_t CRYPT_DECODE_ParseEncDataAsn1(CRYPT_EAL_LibCtx *libctx, const char *attrName, BslCid symAlg, EncryptPara *encPara, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode); #endif int32_t CRYPT_EAL_ParseAsn1SubPubkey(uint8_t *buff, uint32_t buffLen, void **ealPubKey, bool isComplete); int32_t CRYPT_DECODE_AlgoIdAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_ASN1_Buffer *algoId, uint32_t algoIdNum); int32_t CRYPT_DECODE_ConstructBufferOutParam(BSL_Param **outParam, uint8_t *buffer, uint32_t bufferLen); int32_t CRYPT_DECODE_ParseSubKeyInfo(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, bool isComplete); int32_t CRYPT_DECODE_PrikeyAsn1Buff(uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *asn1, uint32_t arrNum); #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_DECODE_RsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, uint32_t arrNum); int32_t CRYPT_DECODE_RsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *asn1, uint32_t asn1Num); int32_t CRYPT_RSA_ParsePubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_RSA_Ctx **rsaPubKey, BslCid cid); int32_t CRYPT_RSA_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **rsaPriKey); int32_t CRYPT_RSA_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **pubKey, bool isComplete); int32_t CRYPT_RSA_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, CRYPT_RSA_Ctx **rsaPriKey); #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_ECDH) int32_t CRYPT_ECC_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, void **pubKey, bool isComplete); int32_t CRYPT_ECC_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, void **ecdsaPriKey); int32_t CRYPT_ECC_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *pk8AlgoParam, void **ecPriKey); #endif #ifdef HITLS_CRYPTO_SM2 int32_t CRYPT_SM2_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_SM2_Ctx **pubKey, bool isComplete); int32_t CRYPT_SM2_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_SM2_Ctx **sm2PriKey); int32_t CRYPT_SM2_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_SM2_Ctx **sm2PriKey); #endif #ifdef HITLS_CRYPTO_ED25519 int32_t CRYPT_ED25519_ParsePkcs8Key(void *libCtx, uint8_t *buffer, uint32_t bufferLen, CRYPT_CURVE25519_Ctx **ed25519PriKey); int32_t CRYPT_ED25519_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_CURVE25519_Ctx **pubKey, bool isComplete); #endif #endif #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t EncodeRsaPubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *pssParam, BSL_Buffer *encodePub); int32_t EncodeRsaPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, BSL_Buffer *encode); int32_t EncodeEccPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_ASN1_Buffer *pk8AlgoParam, BSL_Buffer *encode); int32_t EncodePk8PriKeyBuff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *asn1); int32_t CRYPT_ENCODE_SubPubkeyByInfo(BSL_ASN1_Buffer *algo, BSL_Buffer *bitStr, BSL_Buffer *encodeH, bool isComplete); int32_t CRYPT_ENCODE_AlgoIdAsn1Buff(BSL_ASN1_Buffer *algoId, uint32_t algoIdNum, uint8_t **buff, uint32_t *buffLen); int32_t CRYPT_ENCODE_PkcsEncryptedBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_Pbkdf2Param *pkcsParam, BSL_Buffer *unEncrypted, BSL_ASN1_Buffer *asn1); int32_t CRYPT_ENCODE_EccPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode); #ifdef HITLS_CRYPTO_KEY_EPKI int32_t EncodePk8EncPriKeyBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_Buffer *encode); #endif int32_t CRYPT_EAL_EncodeAsn1SubPubkey(CRYPT_EAL_PkeyCtx *ealPubKey, bool isComplete, BSL_Buffer *encodeH); #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_ENCODE_RsaPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode); int32_t CRYPT_ENCODE_RsaPubkeyAsn1Buff(BSL_ASN1_Buffer *pubAsn1, BSL_Buffer *encodePub); #endif #endif static inline bool IsEcdsaEcParaId(int32_t paraId) { return paraId == CRYPT_ECC_NISTP224 || paraId == CRYPT_ECC_NISTP256 || paraId == CRYPT_ECC_NISTP384 || paraId == CRYPT_ECC_NISTP521 || paraId == CRYPT_ECC_BRAINPOOLP256R1 || paraId == CRYPT_ECC_BRAINPOOLP384R1 || paraId == CRYPT_ECC_BRAINPOOLP512R1; } #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CODECSKEY #endif // CRYPT_ENCODE_DECODE_KEY_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_encode_decode_local.h
C
unknown
8,212
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include <stdint.h> #include "securec.h" #include "bsl_types.h" #include "bsl_asn1_internal.h" #include "bsl_obj_internal.h" #include "bsl_err_internal.h" #include "crypt_params_key.h" #include "crypt_errno.h" #include "crypt_encode_decode_key.h" #include "crypt_encode_decode_local.h" #include "crypt_eal_kdf.h" #include "crypt_eal_cipher.h" #include "crypt_eal_rand.h" #ifdef HITLS_CRYPTO_RSA /** * RSAPrivateKey ::= SEQUENCE { * version Version, * modulus INTEGER, -- n * publicExponent INTEGER, -- e * privateExponent INTEGER, -- d * prime1 INTEGER, -- p * prime2 INTEGER, -- q * exponent1 INTEGER, -- d mod (p-1) * exponent2 INTEGER, -- d mod (q-1) * coefficient INTEGER, -- (inverse of q) mod p * otherPrimeInfos OtherPrimeInfos OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc3447#autoid-39 */ static BSL_ASN1_TemplateItem g_rsaPrvTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, /* ignore seq header */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* version */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* n */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* e */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* d */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* p */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* q */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* d mod (p-1) */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* d mod (q-1) */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* q^-1 mod p */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_OPTIONAL | BSL_ASN1_FLAG_HEADERONLY | BSL_ASN1_FLAG_SAME, 1}, /* OtherPrimeInfos OPTIONAL */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, /* OtherPrimeInfo */ {BSL_ASN1_TAG_INTEGER, 0, 3}, /* ri */ {BSL_ASN1_TAG_INTEGER, 0, 3}, /* di */ {BSL_ASN1_TAG_INTEGER, 0, 3} /* ti */ }; /** * RSAPublicKey ::= SEQUENCE { * modulus INTEGER, -- n * publicExponent INTEGER } -- e * * https://datatracker.ietf.org/doc/html/rfc4055#autoid-3 */ static BSL_ASN1_TemplateItem g_rsaPubTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, /* ignore seq */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* n */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* e */ }; #ifdef HITLS_CRYPTO_KEY_DECODE /** * ref: rfc4055 * RSASSA-PSS-params ::= SEQUENCE { * hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier, * maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT mgf1SHA1Identifier, * saltLength [2] INTEGER DEFAULT 20, * trailerField [3] INTEGER DEFAULT 1 * } * HashAlgorithm ::= AlgorithmIdentifier * MaskGenAlgorithm ::= AlgorithmIdentifier */ static BSL_ASN1_TemplateItem g_rsaPssTempl[] = { {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 2}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, {BSL_ASN1_TAG_OBJECT_ID, 0, 3}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 3}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_INTEGER, 0, 1}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_INTEGER, 0, 1} }; typedef enum { CRYPT_RSAPSS_HASH_IDX, CRYPT_RSAPSS_HASHANY_IDX, CRYPT_RSAPSS_MGF1_IDX, CRYPT_RSAPSS_MGF1PARAM_IDX, CRYPT_RSAPSS_MGF1PARAMANY_IDX, CRYPT_RSAPSS_SALTLEN_IDX, CRYPT_RSAPSS_TRAILED_IDX, CRYPT_RSAPSS_MAX } CRYPT_RSAPSS_IDX; #endif // HITLS_CRYPTO_KEY_DECODE #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) /** * ECPrivateKey ::= SEQUENCE { * version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1), * privateKey OCTET STRING, * parameters [0] ECParameters {{ NamedCurve }} OPTIONAL, * publicKey [1] BIT STRING OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc5915#autoid-3 */ #define BSL_ASN1_TAG_EC_PRIKEY_PARAM 0 #define BSL_ASN1_TAG_EC_PRIKEY_PUBKEY 1 static BSL_ASN1_TemplateItem g_ecPriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, // ignore seq header {BSL_ASN1_TAG_INTEGER, 0, 1}, /* version */ {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, /* private key */ {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_EC_PRIKEY_PARAM, BSL_ASN1_FLAG_OPTIONAL, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_EC_PRIKEY_PUBKEY, BSL_ASN1_FLAG_OPTIONAL, 1}, {BSL_ASN1_TAG_BITSTRING, 0, 2}, }; #endif /** * PrivateKeyInfo ::= SEQUENCE { * version INTEGER, * privateKeyAlgorithm AlgorithmIdentifier, * privateKey OCTET STRING, * attributes [0] IMPLICIT Attributes OPTIONAL } * * https://datatracker.ietf.org/doc/html/rfc5208#autoid-5 */ static BSL_ASN1_TemplateItem g_pk8PriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, // ignore seq header {BSL_ASN1_TAG_INTEGER, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 1}, {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, }; typedef enum { CRYPT_PK8_PRIKEY_VERSION_IDX = 0, CRYPT_PK8_PRIKEY_ALGID_IDX = 1, CRYPT_PK8_PRIKEY_PRIKEY_IDX = 2, } CRYPT_PK8_PRIKEY_TEMPL_IDX; #ifdef HITLS_CRYPTO_KEY_EPKI #ifdef HITLS_CRYPTO_KEY_DECODE /** * EncryptedPrivateKeyInfo ::= SEQUENCE { * encryptionAlgorithm EncryptionAlgorithmIdentifier, * encryptedData EncryptedData } * * https://datatracker.ietf.org/doc/html/rfc5208#autoid-6 */ static BSL_ASN1_TemplateItem g_pk8EncPriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, // EncryptionAlgorithmIdentifier {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 3}, // derivation param {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 3}, // enc scheme {BSL_ASN1_TAG_OBJECT_ID, 0, 4}, // alg {BSL_ASN1_TAG_OCTETSTRING, 0, 4}, // iv {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // EncryptedData }; #endif static BSL_ASN1_TemplateItem g_pbkdf2DerParamTempl[] = { {BSL_ASN1_TAG_OBJECT_ID, 0, 0}, // derive alg {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // salt {BSL_ASN1_TAG_INTEGER, 0, 1}, // iteration {BSL_ASN1_TAG_INTEGER, BSL_ASN1_FLAG_OPTIONAL, 1}, // keyLen {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_DEFAULT | BSL_ASN1_FLAG_HEADERONLY, 1}, // prf }; #endif // HITLS_CRYPTO_KEY_EPKI /** * SubjectPublicKeyInfo ::= SEQUENCE { * algorithm AlgorithmIdentifier, * subjectPublicKey BIT STRING * } * * https://datatracker.ietf.org/doc/html/rfc5480#autoid-3 */ static BSL_ASN1_TemplateItem g_subKeyInfoTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 1}, {BSL_ASN1_TAG_BITSTRING, 0, 1}, }; static BSL_ASN1_TemplateItem g_subKeyInfoInnerTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 0}, {BSL_ASN1_TAG_BITSTRING, 0, 0}, }; /** * AlgorithmIdentifier ::= SEQUENCE { * algorithm OBJECT IDENTIFIER, * parameters ANY DEFINED BY algorithm OPTIONAL } * * https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.1.2 */ static BSL_ASN1_TemplateItem g_algoIdTempl[] = { {BSL_ASN1_TAG_OBJECT_ID, 0, 0}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 0}, }; #ifdef HITLS_CRYPTO_KEY_EPKI typedef enum { CRYPT_PKCS_ENC_DERALG_IDX, CRYPT_PKCS_ENC_DERSALT_IDX, CRYPT_PKCS_ENC_DERITER_IDX, CRYPT_PKCS_ENC_DERKEYLEN_IDX, CRYPT_PKCS_ENC_DERPRF_IDX, CRYPT_PKCS_ENC_DERPARAM_MAX } CRYPT_PKCS_ENC_DERIVEPARAM_IDX; static int32_t CRYPT_ENCODE_DECODE_DecryptEncData(CRYPT_EAL_LibCtx *libctx, const char *attrName, BSL_Buffer *ivData, BSL_Buffer *enData, int32_t alg, bool isEnc, BSL_Buffer *key, uint8_t *output, uint32_t *dataLen) { uint32_t buffLen = *dataLen; CRYPT_EAL_CipherCtx *ctx = CRYPT_EAL_ProviderCipherNewCtx(libctx, alg, attrName); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } int32_t ret = CRYPT_EAL_CipherInit(ctx, key->data, key->dataLen, ivData->data, ivData->dataLen, isEnc); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } uint32_t blockSize; ret = CRYPT_EAL_CipherCtrl(ctx, CRYPT_CTRL_GET_BLOCKSIZE, &blockSize, sizeof(blockSize)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (blockSize != 1) { ret = CRYPT_EAL_CipherSetPadding(ctx, CRYPT_PADDING_PKCS7); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } ret = CRYPT_EAL_CipherUpdate(ctx, enData->data, enData->dataLen, output, dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } buffLen -= *dataLen; ret = CRYPT_EAL_CipherFinal(ctx, output + *dataLen, &buffLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } *dataLen += buffLen; EXIT: CRYPT_EAL_CipherFreeCtx(ctx); return ret; } static int32_t PbkdfDeriveKey(CRYPT_EAL_LibCtx *libctx, const char *attrName, uint32_t iter, int32_t prfId, BSL_Buffer *salt, const uint8_t *pwd, uint32_t pwdLen, BSL_Buffer *key) { CRYPT_EAL_KdfCTX *kdfCtx = CRYPT_EAL_ProviderKdfNewCtx(libctx, CRYPT_KDF_PBKDF2, attrName); if (kdfCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PBKDF2_NOT_SUPPORTED); return CRYPT_PBKDF2_NOT_SUPPORTED; } BSL_Param params[5] = {{0}, {0}, {0}, {0}, BSL_PARAM_END}; (void)BSL_PARAM_InitValue(&params[0], CRYPT_PARAM_KDF_MAC_ID, BSL_PARAM_TYPE_UINT32, &prfId, sizeof(prfId)); (void)BSL_PARAM_InitValue(&params[1], CRYPT_PARAM_KDF_PASSWORD, BSL_PARAM_TYPE_OCTETS, (uint8_t *)(uintptr_t)pwd, pwdLen); // Fixed pwd parameter (void)BSL_PARAM_InitValue(&params[2], CRYPT_PARAM_KDF_SALT, BSL_PARAM_TYPE_OCTETS, salt->data, salt->dataLen); (void)BSL_PARAM_InitValue(&params[3], CRYPT_PARAM_KDF_ITER, BSL_PARAM_TYPE_UINT32, &iter, sizeof(iter)); int32_t ret = CRYPT_EAL_KdfSetParam(kdfCtx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = CRYPT_EAL_KdfDerive(kdfCtx, key->data, key->dataLen); EXIT: CRYPT_EAL_KdfFreeCtx(kdfCtx); return ret; } #endif // HITLS_CRYPTO_EPKI #ifdef HITLS_CRYPTO_KEY_DECODE #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) int32_t CRYPT_DECODE_PrikeyAsn1Buff(uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *asn1, uint32_t arrNum) { uint8_t *tmpBuff = buffer; uint32_t tmpBuffLen = bufferLen; BSL_ASN1_Template templ = {g_ecPriKeyTempl, sizeof(g_ecPriKeyTempl) / sizeof(g_ecPriKeyTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, arrNum); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_DECODE_RsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, uint32_t arrNum) { if (buff == NULL || pubAsn1 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; BSL_ASN1_Template pubTempl = {g_rsaPubTempl, sizeof(g_rsaPubTempl) / sizeof(g_rsaPubTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&pubTempl, NULL, &tmpBuff, &tmpBuffLen, pubAsn1, arrNum); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DECODE_RsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *asn1, uint32_t asn1Num) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; BSL_ASN1_Template templ = {g_rsaPrvTempl, sizeof(g_rsaPrvTempl) / sizeof(g_rsaPrvTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, asn1Num); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t RsaPssTagGetOrCheck(int32_t type, uint32_t idx, void *data, void *expVal) { (void) idx; (void) data; if (type == BSL_ASN1_TYPE_GET_ANY_TAG) { *(uint8_t *) expVal = BSL_ASN1_TAG_NULL; // is null return CRYPT_SUCCESS; } BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_GET_ANY_TAG); return CRYPT_DECODE_ERR_RSSPSS_GET_ANY_TAG; } int32_t CRYPT_EAL_ParseRsaPssAlgParam(BSL_ASN1_Buffer *param, CRYPT_RSA_PssPara *para) { para->mdId = (CRYPT_MD_AlgId)BSL_CID_SHA1; // hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier, para->mgfId = (CRYPT_MD_AlgId)BSL_CID_SHA1; // maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT mgf1SHA1Identifier, para->saltLen = 20; // saltLength [2] INTEGER DEFAULT 20 uint8_t *temp = param->buff; uint32_t tempLen = param->len; BSL_ASN1_Buffer asns[CRYPT_RSAPSS_MAX] = {0}; BSL_ASN1_Template templ = {g_rsaPssTempl, sizeof(g_rsaPssTempl) / sizeof(g_rsaPssTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, RsaPssTagGetOrCheck, &temp, &tempLen, asns, CRYPT_RSAPSS_MAX); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS); return CRYPT_DECODE_ERR_RSSPSS; } if (asns[CRYPT_RSAPSS_HASH_IDX].tag != 0) { BslOidString hashOid = {asns[CRYPT_RSAPSS_HASH_IDX].len, (char *)asns[CRYPT_RSAPSS_HASH_IDX].buff, 0}; para->mdId = (CRYPT_MD_AlgId)BSL_OBJ_GetCID(&hashOid); if (para->mdId == (CRYPT_MD_AlgId)BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_MD); return CRYPT_DECODE_ERR_RSSPSS_MD; } } if (asns[CRYPT_RSAPSS_MGF1PARAM_IDX].tag != 0) { BslOidString mgf1 = {asns[CRYPT_RSAPSS_MGF1PARAM_IDX].len, (char *)asns[CRYPT_RSAPSS_MGF1PARAM_IDX].buff, 0}; para->mgfId = (CRYPT_MD_AlgId)BSL_OBJ_GetCID(&mgf1); if (para->mgfId == (CRYPT_MD_AlgId)BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_MGF1MD); return CRYPT_DECODE_ERR_RSSPSS_MGF1MD; } } if (asns[CRYPT_RSAPSS_SALTLEN_IDX].tag != 0) { ret = BSL_ASN1_DecodePrimitiveItem(&asns[CRYPT_RSAPSS_SALTLEN_IDX], &para->saltLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (asns[CRYPT_RSAPSS_TRAILED_IDX].tag != 0) { // trailerField ret = BSL_ASN1_DecodePrimitiveItem(&asns[CRYPT_RSAPSS_TRAILED_IDX], &tempLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (tempLen != 1) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_TRAILER); return CRYPT_DECODE_ERR_RSSPSS_TRAILER; } } return ret; } #endif static int32_t DecSubKeyInfoCb(int32_t type, uint32_t idx, void *data, void *expVal) { (void)idx; BSL_ASN1_Buffer *param = (BSL_ASN1_Buffer *)data; switch (type) { case BSL_ASN1_TYPE_GET_ANY_TAG: { BslOidString oidStr = {param->len, (char *)param->buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_EC_PUBLICKEY || cid == BSL_CID_SM2PRIME256) { // note: any It can be encoded empty or it can be null *(uint8_t *)expVal = BSL_ASN1_TAG_OBJECT_ID; } else if (cid == BSL_CID_RSASSAPSS) { *(uint8_t *)expVal = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; } else if (cid == BSL_CID_ED25519) { /* RFC8410: Ed25519 has no algorithm parameters */ *(uint8_t *)expVal = BSL_ASN1_TAG_EMPTY; // is empty } else { *(uint8_t *)expVal = BSL_ASN1_TAG_NULL; // is null } return CRYPT_SUCCESS; } default: break; } BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_FAILED); return CRYPT_DECODE_ASN1_BUFF_FAILED; } int32_t CRYPT_DECODE_ParseSubKeyInfo(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, bool isComplete) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; // decode sub pubkey info BSL_ASN1_Template pubTempl; if (isComplete) { pubTempl.templItems = g_subKeyInfoTempl; pubTempl.templNum = sizeof(g_subKeyInfoTempl) / sizeof(g_subKeyInfoTempl[0]); } else { pubTempl.templItems = g_subKeyInfoInnerTempl; pubTempl.templNum = sizeof(g_subKeyInfoInnerTempl) / sizeof(g_subKeyInfoInnerTempl[0]); } int32_t ret = BSL_ASN1_DecodeTemplate(&pubTempl, DecSubKeyInfoCb, &tmpBuff, &tmpBuffLen, pubAsn1, CRYPT_SUBKEYINFO_BITSTRING_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DECODE_AlgoIdAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_ASN1_Buffer *algoId, uint32_t algoIdNum) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; BSL_ASN1_DecTemplCallBack cb = keyInfoCb == NULL ? DecSubKeyInfoCb : keyInfoCb; BSL_ASN1_Template templ = {g_algoIdTempl, sizeof(g_algoIdTempl) / sizeof(g_algoIdTempl[0])}; return BSL_ASN1_DecodeTemplate(&templ, cb, &tmpBuff, &tmpBuffLen, algoId, algoIdNum); } int32_t CRYPT_DECODE_SubPubkey(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, CRYPT_DECODE_SubPubkeyInfo *subPubkeyInfo, bool isComplete) { if (buff == NULL || subPubkeyInfo == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_ASN1_Buffer pubAsn1[CRYPT_SUBKEYINFO_BITSTRING_IDX + 1] = {0}; BSL_ASN1_BitString bitPubkey = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_ParseSubKeyInfo(buff, buffLen, pubAsn1, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_DECODE_AlgoIdAsn1Buff(pubAsn1->buff, pubAsn1->len, keyInfoCb, algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Buffer *oid = algoId; BSL_ASN1_Buffer *pubkey = &pubAsn1[CRYPT_SUBKEYINFO_BITSTRING_IDX]; ret = BSL_ASN1_DecodePrimitiveItem(pubkey, &bitPubkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {oid->len, (char *)oid->buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } subPubkeyInfo->keyType = cid; subPubkeyInfo->keyParam = *(algoId + 1); subPubkeyInfo->pubKey = bitPubkey; return CRYPT_SUCCESS; } static int32_t ParsePk8PriParamAsn1(BSL_ASN1_Buffer *encode, BSL_ASN1_DecTemplCallBack keyInfoCb, BslCid *keyType, BSL_ASN1_Buffer *keyParam) { BSL_ASN1_Buffer *algo = &encode[CRYPT_PK8_PRIKEY_ALGID_IDX]; // AlgorithmIdentifier BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_AlgoIdAsn1Buff(algo->buff, algo->len, keyInfoCb, algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } BslOidString oidStr = {algoId[0].len, (char *)algoId[0].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } *keyType = cid; *keyParam = *(algoId + 1); return CRYPT_SUCCESS; } int32_t CRYPT_DECODE_Pkcs8Info(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo) { if (buff == NULL || buffLen == 0 || pk8PrikeyInfo == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; int32_t version = 0; BslCid keyType = BSL_CID_UNKNOWN; BSL_ASN1_Buffer keyParam = {0}; BSL_ASN1_Buffer asn1[CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1] = {0}; BSL_ASN1_Template templ = {g_pk8PriKeyTempl, sizeof(g_pk8PriKeyTempl) / sizeof(g_pk8PriKeyTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_ASN1_DecodePrimitiveItem(&asn1[CRYPT_PK8_PRIKEY_VERSION_IDX], &version); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Buffer octPriKey = asn1[CRYPT_PK8_PRIKEY_PRIKEY_IDX]; ret = ParsePk8PriParamAsn1(asn1, keyInfoCb, &keyType, &keyParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pk8PrikeyInfo->version = version; pk8PrikeyInfo->keyType = keyType; pk8PrikeyInfo->pkeyRawKey = octPriKey.buff; pk8PrikeyInfo->pkeyRawKeyLen = octPriKey.len; pk8PrikeyInfo->keyParam = keyParam; pk8PrikeyInfo->attrs = NULL; return CRYPT_SUCCESS; } #ifdef HITLS_CRYPTO_KEY_EPKI static int32_t ParseDeriveKeyPrfAlgId(BSL_ASN1_Buffer *asn, int32_t *prfId, BSL_ASN1_DecTemplCallBack keyInfoCb) { if (asn->len != 0) { BSL_ASN1_Buffer algoId[2] = {0}; int32_t ret = CRYPT_DECODE_AlgoIdAsn1Buff(asn->buff, asn->len, keyInfoCb, algoId, 2); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {algoId[BSL_ASN1_TAG_ALGOID_IDX].len, (char *)algoId[BSL_ASN1_TAG_ALGOID_IDX].buff, 0}; *prfId = BSL_OBJ_GetCID(&oidStr); if (*prfId == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } } else { *prfId = BSL_CID_HMAC_SHA1; } return CRYPT_SUCCESS; } static int32_t ParseDeriveKeyParam(BSL_Buffer *derivekeyData, uint32_t *iter, uint32_t *keyLen, BSL_Buffer *salt, int32_t *prfId, BSL_ASN1_DecTemplCallBack keyInfoCb) { uint8_t *tmpBuff = derivekeyData->data; uint32_t tmpBuffLen = derivekeyData->dataLen; BSL_ASN1_Buffer derParam[CRYPT_PKCS_ENC_DERPARAM_MAX] = {0}; BSL_ASN1_Template templ = {g_pbkdf2DerParamTempl, sizeof(g_pbkdf2DerParamTempl) / sizeof(g_pbkdf2DerParamTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, derParam, CRYPT_PKCS_ENC_DERPARAM_MAX); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {derParam[CRYPT_PKCS_ENC_DERALG_IDX].len, (char *)derParam[CRYPT_PKCS_ENC_DERALG_IDX].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid != BSL_CID_PBKDF2) { // only pbkdf2 is supported BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } ret = BSL_ASN1_DecodePrimitiveItem(&derParam[CRYPT_PKCS_ENC_DERITER_IDX], iter); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ITER); return CRYPT_DECODE_PKCS8_INVALID_ITER; } if (derParam[CRYPT_PKCS_ENC_DERKEYLEN_IDX].len != 0) { ret = BSL_ASN1_DecodePrimitiveItem(&derParam[CRYPT_PKCS_ENC_DERKEYLEN_IDX], keyLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_KEYLEN); return CRYPT_DECODE_PKCS8_INVALID_KEYLEN; } } salt->data = derParam[CRYPT_PKCS_ENC_DERSALT_IDX].buff; salt->dataLen = derParam[CRYPT_PKCS_ENC_DERSALT_IDX].len; return ParseDeriveKeyPrfAlgId(&derParam[CRYPT_PKCS_ENC_DERPRF_IDX], prfId, keyInfoCb); } int32_t CRYPT_DECODE_ParseEncDataAsn1(CRYPT_EAL_LibCtx *libctx, const char *attrName, BslCid symAlg, EncryptPara *encPara, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode) { uint32_t iter; int32_t prfId; uint32_t keylen = 0; uint8_t key[512] = {0}; // The maximum length of the symmetry algorithm BSL_Buffer salt = {0}; int32_t ret = ParseDeriveKeyParam(encPara->derivekeyData, &iter, &keylen, &salt, &prfId, keyInfoCb); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint32_t symKeyLen; ret = CRYPT_EAL_CipherGetInfo((CRYPT_CIPHER_AlgId)symAlg, CRYPT_INFO_KEY_LEN, &symKeyLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (keylen != 0 && symKeyLen != keylen) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_KEYLEN); return CRYPT_DECODE_PKCS8_INVALID_KEYLEN; } BSL_Buffer keyBuff = {key, symKeyLen}; ret = PbkdfDeriveKey(libctx, attrName, iter, prfId, &salt, pwd->data, pwd->dataLen, &keyBuff); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (encPara->enData->dataLen != 0) { uint8_t *output = BSL_SAL_Malloc(encPara->enData->dataLen); if (output == NULL) { (void)memset_s(key, sizeof(key), 0, sizeof(key)); BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } uint32_t dataLen = encPara->enData->dataLen; ret = CRYPT_ENCODE_DECODE_DecryptEncData(libctx, attrName, encPara->ivData, encPara->enData, symAlg, false, &keyBuff, output, &dataLen); if (ret != CRYPT_SUCCESS) { (void)memset_s(key, sizeof(key), 0, sizeof(key)); BSL_SAL_Free(output); BSL_ERR_PUSH_ERROR(ret); return ret; } decode->data = output; decode->dataLen = dataLen; } (void)memset_s(key, sizeof(key), 0, sizeof(key)); return CRYPT_SUCCESS; } int32_t CRYPT_DECODE_Pkcs8PrvDecrypt(CRYPT_EAL_LibCtx *libctx, const char *attrName, BSL_Buffer *buff, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode) { if (buff == NULL || buff->dataLen == 0 || pwd == NULL || decode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pwd->dataLen > PWD_MAX_LEN || (pwd->data == NULL && pwd->dataLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } uint8_t *tmpBuff = buff->data; uint32_t tmpBuffLen = buff->dataLen; BSL_ASN1_Buffer asn1[CRYPT_PKCS_ENCPRIKEY_MAX] = {0}; BSL_ASN1_Template templ = {g_pk8EncPriKeyTempl, sizeof(g_pk8EncPriKeyTempl) / sizeof(g_pk8EncPriKeyTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, CRYPT_PKCS_ENCPRIKEY_MAX); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString encOidStr = {asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].len, (char *)asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&encOidStr); if (cid != BSL_CID_PBES2) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } // parse sym alg id BslOidString symOidStr = {asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].len, (char *)asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].buff, 0}; BslCid symId = BSL_OBJ_GetCID(&symOidStr); if (symId == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } BSL_Buffer derivekeyData = {asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len}; BSL_Buffer ivData = {asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len}; BSL_Buffer enData = {asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].len}; EncryptPara encPara = { .derivekeyData = &derivekeyData, .ivData = &ivData, .enData = &enData, }; ret = CRYPT_DECODE_ParseEncDataAsn1(libctx, attrName, symId, &encPara, pwd, keyInfoCb, decode); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif /* HITLS_CRYPTO_KEY_EPKI */ int32_t CRYPT_DECODE_ConstructBufferOutParam(BSL_Param **outParam, uint8_t *buffer, uint32_t bufferLen) { BSL_Param *result = BSL_SAL_Calloc(2, sizeof(BSL_Param)); if (result == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BSL_PARAM_InitValue(&result[0], CRYPT_PARAM_DECODE_BUFFER_DATA, BSL_PARAM_TYPE_OCTETS, buffer, bufferLen); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(result); BSL_ERR_PUSH_ERROR(ret); return ret; } *outParam = result; return ret; } #endif /* HITLS_CRYPTO_KEY_DECODE */ #ifdef HITLS_CRYPTO_KEY_ENCODE #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) int32_t CRYPT_ENCODE_EccPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode) { BSL_ASN1_Template templ = {g_ecPriKeyTempl, sizeof(g_ecPriKeyTempl) / sizeof(g_ecPriKeyTempl[0])}; return BSL_ASN1_EncodeTemplate(&templ, asn1, asn1Num, &encode->data, &encode->dataLen); } #endif /* HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 */ #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_ENCODE_RsaPubkeyAsn1Buff(BSL_ASN1_Buffer *pubAsn1, BSL_Buffer *encodePub) { BSL_ASN1_Template pubTempl = {g_rsaPubTempl, sizeof(g_rsaPubTempl) / sizeof(g_rsaPubTempl[0])}; int32_t ret = BSL_ASN1_EncodeTemplate(&pubTempl, pubAsn1, CRYPT_RSA_PUB_E_IDX + 1, &encodePub->data, &encodePub->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return CRYPT_SUCCESS; } int32_t CRYPT_ENCODE_RsaPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode) { BSL_ASN1_Template templ = {g_rsaPrvTempl, sizeof(g_rsaPrvTempl) / sizeof(g_rsaPrvTempl[0])}; int32_t ret = BSL_ASN1_EncodeTemplate(&templ, asn1, asn1Num, &encode->data, &encode->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif int32_t CRYPT_ENCODE_SubPubkeyByInfo(BSL_ASN1_Buffer *algo, BSL_Buffer *bitStr, BSL_Buffer *encodeH, bool isComplete) { BSL_ASN1_Buffer encode[CRYPT_SUBKEYINFO_BITSTRING_IDX + 1] = {0}; encode[CRYPT_SUBKEYINFO_ALGOID_IDX].buff = algo->buff; encode[CRYPT_SUBKEYINFO_ALGOID_IDX].len = algo->len; encode[CRYPT_SUBKEYINFO_ALGOID_IDX].tag = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; BSL_ASN1_BitString bitPubkey = {bitStr->data, bitStr->dataLen, 0}; encode[CRYPT_SUBKEYINFO_BITSTRING_IDX].buff = (uint8_t *)&bitPubkey; encode[CRYPT_SUBKEYINFO_BITSTRING_IDX].len = sizeof(BSL_ASN1_BitString); encode[CRYPT_SUBKEYINFO_BITSTRING_IDX].tag = BSL_ASN1_TAG_BITSTRING; BSL_ASN1_Template pubTempl; if (isComplete) { pubTempl.templItems = g_subKeyInfoTempl; pubTempl.templNum = sizeof(g_subKeyInfoTempl) / sizeof(g_subKeyInfoTempl[0]); } else { pubTempl.templItems = g_subKeyInfoInnerTempl; pubTempl.templNum = sizeof(g_subKeyInfoInnerTempl) / sizeof(g_subKeyInfoInnerTempl[0]); } int32_t ret = BSL_ASN1_EncodeTemplate(&pubTempl, encode, CRYPT_SUBKEYINFO_BITSTRING_IDX + 1, &encodeH->data, &encodeH->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_ENCODE_AlgoIdAsn1Buff(BSL_ASN1_Buffer *algoId, uint32_t algoIdNum, uint8_t **buff, uint32_t *buffLen) { BSL_ASN1_Template templ = {g_algoIdTempl, sizeof(g_algoIdTempl) / sizeof(g_algoIdTempl[0])}; return BSL_ASN1_EncodeTemplate(&templ, algoId, algoIdNum, buff, buffLen); } #ifdef HITLS_CRYPTO_KEY_EPKI static int32_t EncodeDeriveKeyParam(CRYPT_EAL_LibCtx *libCtx, CRYPT_Pbkdf2Param *param, BSL_Buffer *encode, BSL_Buffer *salt) { BSL_ASN1_Buffer derParam[CRYPT_PKCS_ENC_DERPRF_IDX + 1] = {0}; /* deralg */ BslOidString *oidPbkdf = BSL_OBJ_GetOID((BslCid)param->pbkdfId); if (oidPbkdf == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } derParam[CRYPT_PKCS_ENC_DERALG_IDX].buff = (uint8_t *)oidPbkdf->octs; derParam[CRYPT_PKCS_ENC_DERALG_IDX].len = oidPbkdf->octetLen; derParam[CRYPT_PKCS_ENC_DERALG_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; /* salt */ int32_t ret = CRYPT_EAL_RandbytesEx(libCtx, salt->data, salt->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } derParam[CRYPT_PKCS_ENC_DERSALT_IDX].buff = salt->data; derParam[CRYPT_PKCS_ENC_DERSALT_IDX].len = salt->dataLen; derParam[CRYPT_PKCS_ENC_DERSALT_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; /* iter */ ret = BSL_ASN1_EncodeLimb(BSL_ASN1_TAG_INTEGER, param->itCnt, &derParam[CRYPT_PKCS_ENC_DERITER_IDX]); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Template templ = {g_pbkdf2DerParamTempl, sizeof(g_pbkdf2DerParamTempl) / sizeof(g_pbkdf2DerParamTempl[0])}; if (param->hmacId == CRYPT_MAC_HMAC_SHA1) { ret = BSL_ASN1_EncodeTemplate(&templ, derParam, CRYPT_PKCS_ENC_DERPRF_IDX + 1, &encode->data, &encode->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); return ret; } BslOidString *oidHmac = BSL_OBJ_GetOID((BslCid)param->hmacId); if (oidHmac == NULL) { BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BSL_Buffer algo = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = { {BSL_ASN1_TAG_OBJECT_ID, oidHmac->octetLen, (uint8_t *)oidHmac->octs}, {BSL_ASN1_TAG_NULL, 0, NULL}, }; ret = CRYPT_ENCODE_AlgoIdAsn1Buff(algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1, &algo.data, &algo.dataLen); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); BSL_ERR_PUSH_ERROR(ret); return ret; } derParam[CRYPT_PKCS_ENC_DERPRF_IDX].buff = algo.data; derParam[CRYPT_PKCS_ENC_DERPRF_IDX].len = algo.dataLen; derParam[CRYPT_PKCS_ENC_DERPRF_IDX].tag = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; ret = BSL_ASN1_EncodeTemplate(&templ, derParam, CRYPT_PKCS_ENC_DERPRF_IDX + 1, &encode->data, &encode->dataLen); BSL_SAL_FREE(algo.data); BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); return ret; } static int32_t EncodeEncryptedData(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_Pbkdf2Param *pkcsParam, BSL_Buffer *unEncrypted, BSL_Buffer *salt, BSL_ASN1_Buffer *asn1) { int32_t ret; uint8_t *output = NULL; BSL_Buffer keyBuff = {0}; do { ret = CRYPT_EAL_CipherGetInfo(pkcsParam->symId, CRYPT_INFO_KEY_LEN, &keyBuff.dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } keyBuff.data = (uint8_t *)BSL_SAL_Malloc(keyBuff.dataLen); if (keyBuff.data == NULL) { ret = BSL_MALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); break; } ret = PbkdfDeriveKey(libCtx, attrName, pkcsParam->itCnt, (int32_t)pkcsParam->hmacId, salt, pkcsParam->pwd, pkcsParam->pwdLen, &keyBuff); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } uint32_t pkcsDataLen = unEncrypted->dataLen + 16; // extras 16 for padding. output = (uint8_t *)BSL_SAL_Malloc(pkcsDataLen); if (output == NULL) { ret = BSL_MALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); break; } BSL_Buffer enData = {unEncrypted->data, unEncrypted->dataLen}; BSL_Buffer ivData = {asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len}; ret = CRYPT_ENCODE_DECODE_DecryptEncData(libCtx, attrName, &ivData, &enData, (int32_t)pkcsParam->symId, true, &keyBuff, output, &pkcsDataLen); if (ret != CRYPT_SUCCESS) { break; } asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff = output; asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].len = pkcsDataLen; asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; BSL_SAL_ClearFree(keyBuff.data, keyBuff.dataLen); return ret; } while (0); BSL_SAL_ClearFree(keyBuff.data, keyBuff.dataLen); BSL_SAL_FREE(output); return ret; } static int32_t GenRandIv(CRYPT_EAL_LibCtx *libCtx, CRYPT_Pbkdf2Param *pkcsParam, BSL_ASN1_Buffer *asn1) { int32_t ret; BslOidString *oidSym = BSL_OBJ_GetOID((BslCid)pkcsParam->symId); if (oidSym == NULL) { return CRYPT_ERR_ALGID; } asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].buff = (uint8_t *)oidSym->octs; asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].len = oidSym->octetLen; asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; uint32_t ivLen; ret = CRYPT_EAL_CipherGetInfo(pkcsParam->symId, CRYPT_INFO_IV_LEN, &ivLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (ivLen == 0) { asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; return CRYPT_SUCCESS; } uint8_t *iv = (uint8_t *)BSL_SAL_Malloc(ivLen); if (iv == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } ret = CRYPT_EAL_RandbytesEx(libCtx, iv, ivLen); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(iv); BSL_ERR_PUSH_ERROR(ret); return ret; } asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff = iv; asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len = ivLen; asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; return ret; } int32_t CRYPT_ENCODE_PkcsEncryptedBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_Pbkdf2Param *pkcsParam, BSL_Buffer *unEncrypted, BSL_ASN1_Buffer *asn1) { int32_t ret; BslOidString *oidPbes = BSL_OBJ_GetOID((BslCid)pkcsParam->pbesId); if (oidPbes == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } /* derivation param */ BSL_Buffer derParam = {0}; uint8_t *saltData = (uint8_t *)BSL_SAL_Malloc(pkcsParam->saltLen); if (saltData == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } do { BSL_Buffer salt = {saltData, pkcsParam->saltLen}; ret = EncodeDeriveKeyParam(libCtx, pkcsParam, &derParam, &salt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff = derParam.data; asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len = derParam.dataLen; asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].tag = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; /* iv */ ret = GenRandIv(libCtx, pkcsParam, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } /* encryptedData */ ret = EncodeEncryptedData(libCtx, attrName, pkcsParam, unEncrypted, &salt, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } BSL_SAL_ClearFree(saltData, pkcsParam->saltLen); asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].buff = (uint8_t *)oidPbes->octs; asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].len = oidPbes->octetLen; asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; return CRYPT_SUCCESS; } while (0); BSL_SAL_ClearFree(saltData, pkcsParam->saltLen); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len); return ret; } #endif // HITLS_CRYPTO_KEY_EPKI int32_t CRYPT_ENCODE_Pkcs8Info(CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo, BSL_Buffer *asn1) { if (pk8PrikeyInfo == NULL || asn1 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret; BSL_ASN1_Buffer algo = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; do { BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)pk8PrikeyInfo->keyType); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); ret = CRYPT_ERR_ALGID; break; } algoId[BSL_ASN1_TAG_ALGOID_IDX].buff = (uint8_t *)oidStr->octs; algoId[BSL_ASN1_TAG_ALGOID_IDX].len = oidStr->octetLen; algoId[BSL_ASN1_TAG_ALGOID_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX] = pk8PrikeyInfo->keyParam; ret = CRYPT_ENCODE_AlgoIdAsn1Buff(algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1, &algo.buff, &algo.len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } BSL_ASN1_Buffer encode[CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1] = { {BSL_ASN1_TAG_INTEGER, sizeof(pk8PrikeyInfo->version), (uint8_t *)&pk8PrikeyInfo->version}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, algo.len, algo.buff}, {BSL_ASN1_TAG_OCTETSTRING, pk8PrikeyInfo->pkeyRawKeyLen, pk8PrikeyInfo->pkeyRawKey} }; BSL_ASN1_Template pubTempl = {g_pk8PriKeyTempl, sizeof(g_pk8PriKeyTempl) / sizeof(g_pk8PriKeyTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&pubTempl, encode, CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1, &asn1->data, &asn1->dataLen); } while (0); BSL_SAL_ClearFree(algo.buff, algo.len); return ret; } #endif /* HITLS_CRYPTO_KEY_ENCODE */ #endif /* HITLS_CRYPTO_CODECSKEY */
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_encode_decode_utils.c
C
unknown
43,490
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_KEY_INFO #include <stdint.h> #include <string.h> #include "bsl_err_internal.h" #include "bsl_obj_internal.h" #include "bsl_print.h" #include "crypt_utils.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "crypt_encode_decode_key.h" #define CRYPT_UNKOWN_STRING "Unknown\n" #define CRYPT_UNSUPPORT_ALG "Unsupported alg\n" static inline int32_t PrintPubkeyBits(bool isEcc, uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (!isEcc) { return BSL_PRINT_Fmt(layer, uio, "Public-Key: (%d bit)\n", CRYPT_EAL_PkeyGetKeyBits(pkey)); } uint32_t bits = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_GET_ECC_ORDER_BITS, &bits, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return BSL_PRINT_Fmt(layer, uio, "Public-Key: (%d bit)\n", bits); } #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) static int32_t GetEccPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *pub) { uint32_t keyLen = CRYPT_EAL_PkeyGetKeyLen(pkey); if (keyLen == 0) { return CRYPT_DECODE_PRINT_NO_KEY; } uint8_t *buff = (uint8_t *)BSL_SAL_Malloc(keyLen); if (buff == NULL) { return CRYPT_MEM_ALLOC_FAIL; } pub->id = CRYPT_EAL_PkeyGetId(pkey); pub->key.eccPub.data = buff; pub->key.eccPub.len = keyLen; int32_t ret = CRYPT_EAL_PkeyGetPub(pkey, pub); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); BSL_SAL_Free(buff); pub->key.eccPub.data = NULL; } return ret; } static int32_t PrintEccPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { RETURN_RET_IF(PrintPubkeyBits(true, layer, pkey, uio) != 0, CRYPT_DECODE_PRINT_KEYBITS); /* pub key */ CRYPT_EAL_PkeyPub pub = {0}; int32_t ret = GetEccPub(pkey, &pub); if (ret != CRYPT_SUCCESS) { return ret; } if (BSL_PRINT_Fmt(layer, uio, "Pub:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pub.key.eccPub.data, pub.key.eccPub.len, uio) != 0) { BSL_SAL_Free(pub.key.eccPub.data); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_ECC_PUB); return CRYPT_DECODE_PRINT_ECC_PUB; } BSL_SAL_Free(pub.key.eccPub.data); /* ASN1 OID */ CRYPT_PKEY_ParaId paraId = CRYPT_EAL_PkeyGetId(pkey) == CRYPT_PKEY_SM2 ? CRYPT_ECC_SM2 : CRYPT_EAL_PkeyGetParaId(pkey); const char *name = BSL_OBJ_GetOidNameFromCID((BslCid)paraId); if (BSL_PRINT_Fmt(layer, uio, "ANS1 OID: %s\n", name == NULL ? CRYPT_UNKOWN_STRING : name) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_ECC_OID); return CRYPT_DECODE_PRINT_ECC_OID; } return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_RSA static int32_t GetRsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *pub) { uint32_t keyLen = CRYPT_EAL_PkeyGetKeyLen(pkey); if (keyLen == 0) { return CRYPT_DECODE_PRINT_NO_KEY; } uint8_t *buff = (uint8_t *)BSL_SAL_Malloc(keyLen * 2); // 2: n + e if (buff == NULL) { return CRYPT_MEM_ALLOC_FAIL; } pub->id = CRYPT_PKEY_RSA; pub->key.rsaPub.n = buff; pub->key.rsaPub.e = buff + keyLen; pub->key.rsaPub.nLen = keyLen; pub->key.rsaPub.eLen = keyLen; int32_t ret = CRYPT_EAL_PkeyGetPub(pkey, pub); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); BSL_SAL_Free(buff); pub->key.rsaPub.n = NULL; pub->key.rsaPub.e = NULL; } return ret; } int32_t CRYPT_EAL_PrintRsaPssPara(uint32_t layer, CRYPT_RSA_PssPara *para, BSL_UIO *uio) { if (para == NULL || uio == NULL) { return CRYPT_INVALID_ARG; } /* hash */ const char *mdIdName = BSL_OBJ_GetOidNameFromCID((BslCid)para->mdId); RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "Hash Algorithm: %s%s\n", mdIdName == NULL ? CRYPT_UNKOWN_STRING : mdIdName, para->mdId == CRYPT_MD_SHA1 ? " (default)" : "") != BSL_SUCCESS, CRYPT_DECODE_PRINT_RSAPSS_PARA); /* mgf */ const char *mgfIdName = BSL_OBJ_GetOidNameFromCID((BslCid)para->mgfId); RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "Mask Algorithm: %s%s\n", mgfIdName == NULL ? CRYPT_UNKOWN_STRING : mgfIdName, para->mgfId == CRYPT_MD_SHA1 ? " (default)" : "") != BSL_SUCCESS, CRYPT_DECODE_PRINT_RSAPSS_PARA); /* saltLen */ RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "Salt Length: 0x%x%s\n", para->saltLen, para->saltLen == 20 ? " (default)" : "") != 0, CRYPT_DECODE_PRINT_RSAPSS_PARA); /* trailer is not supported */ return CRYPT_SUCCESS; } static int32_t PrintRsaPssPara(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { CRYPT_RsaPadType padType = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_GET_RSA_PADDING, &padType, sizeof(CRYPT_RsaPadType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (padType != CRYPT_EMSA_PSS) { return CRYPT_SUCCESS; } CRYPT_RSA_PssPara para = {0}; ret = CRYPT_EAL_GetRsaPssPara(pkey, &para); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (para.saltLen <= 0 && para.mdId == 0 && para.mgfId == 0) { return BSL_PRINT_Fmt(layer, uio, "No PSS parameter restrictions\n"); } RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "PSS parameter restrictions:\n") != 0, CRYPT_DECODE_PRINT_RSAPSS_PARA); return CRYPT_EAL_PrintRsaPssPara(layer + 1, &para, uio); } static int32_t PrintRsaPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { RETURN_RET_IF(PrintPubkeyBits(false, layer, pkey, uio) != 0, CRYPT_DECODE_PRINT_KEYBITS); /* pub key */ CRYPT_EAL_PkeyPub pub = {0}; int32_t ret = GetRsaPub(pkey, &pub); if (ret != CRYPT_SUCCESS) { return ret; } if (BSL_PRINT_Fmt(layer, uio, "Modulus:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pub.key.rsaPub.n, pub.key.rsaPub.nLen, uio) != 0) { BSL_SAL_Free(pub.key.rsaPub.n); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Number(layer, "Exponent", pub.key.rsaPub.e, pub.key.rsaPub.eLen, uio) != 0) { BSL_SAL_Free(pub.key.rsaPub.n); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_EXPONENT); return CRYPT_DECODE_PRINT_EXPONENT; } BSL_SAL_Free(pub.key.rsaPub.n); return PrintRsaPssPara(layer, pkey, uio); } #endif // HITLS_CRYPTO_RSA int32_t CRYPT_EAL_PrintPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (uio == NULL) { return CRYPT_INVALID_ARG; } CRYPT_PKEY_AlgId algId = CRYPT_EAL_PkeyGetId(pkey); switch (algId) { #ifdef HITLS_CRYPTO_RSA case CRYPT_PKEY_RSA: return PrintRsaPubkey(layer, pkey, uio); #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: return PrintEccPubkey(layer, pkey, uio); #endif default: return CRYPT_DECODE_PRINT_UNSUPPORT_ALG; } } #ifdef HITLS_CRYPTO_RSA static inline int32_t PrintPrikeyBits(bool isEcc, uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (!isEcc) { return BSL_PRINT_Fmt(layer, uio, "Private-Key: (%d bit)\n", CRYPT_EAL_PkeyGetKeyBits(pkey)); } uint32_t bits = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_GET_ECC_ORDER_BITS, &bits, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return BSL_PRINT_Fmt(layer, uio, "Private-Key: (%d bit)\n", bits); } static int32_t PrintRsaPrikey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { RETURN_RET_IF(PrintPrikeyBits(false, layer, pkey, uio) != 0, CRYPT_DECODE_PRINT_KEYBITS); int32_t ret; /* pri key */ CRYPT_EAL_PkeyPrv pri = {0}; ret = CRYPT_EAL_InitRsaPrv(pkey, CRYPT_PKEY_RSA, &pri); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_PkeyGetPrv(pkey, &pri); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_DeinitRsaPrv(&pri); return ret; } if (BSL_PRINT_Fmt(layer, uio, "Modulus:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.n, pri.key.rsaPrv.nLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Number(layer, "PublicExponent", pri.key.rsaPrv.e, pri.key.rsaPrv.eLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_EXPONENT); return CRYPT_DECODE_PRINT_EXPONENT; } if (BSL_PRINT_Fmt(layer, uio, "PrivateExponent:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.d, pri.key.rsaPrv.dLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Prime1:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.p, pri.key.rsaPrv.pLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Prime2:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.q, pri.key.rsaPrv.qLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Exponent1:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.dP, pri.key.rsaPrv.dPLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Exponent2:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.dQ, pri.key.rsaPrv.dQLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Coefficient:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.qInv, pri.key.rsaPrv.qInvLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } CRYPT_EAL_DeinitRsaPrv(&pri); return CRYPT_SUCCESS; } #endif int32_t CRYPT_EAL_PrintPrikey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (uio == NULL) { return CRYPT_INVALID_ARG; } CRYPT_PKEY_AlgId algId = CRYPT_EAL_PkeyGetId(pkey); switch (algId) { #ifdef HITLS_CRYPTO_RSA case CRYPT_PKEY_RSA: return PrintRsaPrikey(layer, pkey, uio); #endif default: return CRYPT_DECODE_PRINT_UNSUPPORT_ALG; } } #endif // HITLS_CRYPTO_KEY_INFO
2302_82127028/openHiTLS-examples_2931
crypto/codecskey/src/crypt_encode_print.c
C
unknown
11,557
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_CURVE25519_H #define CRYPT_CURVE25519_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include <stdint.h> #include "crypt_local_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif #define CRYPT_CURVE25519_KEYLEN 32 #define CRYPT_CURVE25519_SIGNLEN 64 typedef struct CryptCurve25519Ctx CRYPT_CURVE25519_Ctx; #ifdef HITLS_CRYPTO_X25519 /** * @ingroup curve25519 * @brief curve25519 Create a key pair structure and allocate memory space. * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtx(void); /** * @ingroup curve25519 * @brief curve25519 Create a key pair structure and allocate memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtxEx(void *libCtx); #endif #ifdef HITLS_CRYPTO_ED25519 /** * @ingroup ed25519 * @brief curve25519 Create a key pair structure for ED25519 algorithm and allocate memory space. * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtx(void); /** * @ingroup ed25519 * @brief curve25519 Create a key pair structure for ED25519 algorithm and allocate memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtxEx(void *libCtx); #endif /** * @ingroup curve25519 * @brief Copy the curve25519 context. The memory management of the return value is handed over to the caller. * * @param ctx [IN] Source curve25519 context. The CTX is set NULL by the invoker. * * @return CRYPT_CURVE25519_Ctx curve25519 Context pointer * If the operation fails, null is returned. */ CRYPT_CURVE25519_Ctx *CRYPT_CURVE25519_DupCtx(CRYPT_CURVE25519_Ctx *ctx); /** * @ingroup curve25519 * @brief Clear the curve25519 key pair data and releases memory. * * @param pkey [IN] curve25519 Key pair structure. The pkey is set NULL by the invoker. */ void CRYPT_CURVE25519_FreeCtx(CRYPT_CURVE25519_Ctx *pkey); /** * @ingroup curve25519 * @brief curve25519 Control interface * * @param pkey [IN/OUT] curve25519 Key pair structure * @param val [IN] Hash method, which must be SHA512. * @param opt [IN] Operation mode * @param len [IN] val length * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_UNSUPPORTED_CTRL_OPTION The opt mode is not supported. * @retval CRYPT_CURVE25519_HASH_METH_ERROR The hash method is not SHA512 */ int32_t CRYPT_CURVE25519_Ctrl(CRYPT_CURVE25519_Ctx *pkey, int32_t opt, void *val, uint32_t len); /** * @ingroup curve25519 * @brief curve25519 Set the public key. * * @param pkey [IN] curve25519 Key pair structure * @param pub [IN] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is not equal to curve25519 public key length */ int32_t CRYPT_CURVE25519_SetPubKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Pub *pub); /** * @ingroup curve25519 * @brief curve25519 Obtain the public key. * * @param pkey [IN] curve25519 Key pair structure * @param pub [OUT] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_NO_PUBKEY The key pair has no public key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is less than curve25519 public key length. */ int32_t CRYPT_CURVE25519_GetPubKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Pub *pub); /** * @ingroup curve25519 * @brief curve25519 Set the private key. * * @param pkey [IN] curve25519 Key pair structure * @param prv [IN] Private key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is not equal to curve25519 private key length */ int32_t CRYPT_CURVE25519_SetPrvKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Prv *prv); /** * @ingroup curve25519 * @brief curve25519 Obtain the private key. * * @param pkey [IN] curve25519 Key pair structure * @param prv [OUT] private key * * @retval CRYPT_SUCCESS successfully set. * @retval CRYPT_NULL_INPUT Any input parameter is empty. * @retval CRYPT_CURVE25519_NO_PRVKEY The key pair has no private key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is less than the private key length of curve25519. */ int32_t CRYPT_CURVE25519_GetPrvKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Prv *prv); #ifdef HITLS_BSL_PARAMS /** * @ingroup curve25519 * @brief curve25519 Set the public key. * * @param pkey [IN] curve25519 Key pair structure * @param para [IN] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is not equal to curve25519 public key length */ int32_t CRYPT_CURVE25519_SetPubKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para); /** * @ingroup curve25519 * @brief curve25519 Set the private key. * * @param pkey [IN] curve25519 Key pair structure * @param para [IN] Private key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is not equal to curve25519 private key length */ int32_t CRYPT_CURVE25519_SetPrvKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para); /** * @ingroup curve25519 * @brief curve25519 Obtain the public key. * * @param pkey [IN] curve25519 Key pair structure * @param para [OUT] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_NO_PUBKEY The key pair has no public key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is less than curve25519 public key length. */ int32_t CRYPT_CURVE25519_GetPubKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para); /** * @ingroup curve25519 * @brief curve25519 Obtain the private key. * * @param pkey [IN] curve25519 Key pair structure * @param para [OUT] private key * * @retval CRYPT_SUCCESS successfully set. * @retval CRYPT_NULL_INPUT Any input parameter is empty. * @retval CRYPT_CURVE25519_NO_PRVKEY The key pair has no private key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is less than the private key length of curve25519. */ int32_t CRYPT_CURVE25519_GetPrvKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para); #endif /** * @ingroup curve25519 * @brief curve25519 Obtain the key length, in bits. * * @param pkey [IN] curve25519 Key pair structure * * @retval Key length */ int32_t CRYPT_CURVE25519_GetBits(const CRYPT_CURVE25519_Ctx *pkey); #ifdef HITLS_CRYPTO_ED25519 /** * @ingroup curve25519 * @brief curve25519 Sign * * @param pkey [IN/OUT] curve25519 Key pair structure. A private key is required for signature. * After signature, a public key is generated. * @param algid [IN] md algid * @param msg [IN] Data to be signed * @param msgLen [IN] Data length: 0 <= msgLen <= (2^125 - 64) bytes * @param hashMethod [IN] SHA512 method * @param sign [OUT] Signature * @param signLen [IN/OUT] Length of the signature buffer (must be greater than 64 bytes)/Length of the signature * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_CURVE25519_NO_PRVKEY The key pair has no private key. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval Error code of the hash module. An error occurs in the sha512 operation. * @retval CRYPT_CURVE25519_NO_HASH_METHOD No hash method is set. * @retval CRYPT_CURVE25519_SIGNLEN_ERROR signLen is less than the signature length of curve25519. */ int32_t CRYPT_CURVE25519_Sign(CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup curve25519 * @brief curve25519 Obtain the signature length, in bytes. * * @param pkey [IN] curve25519 Key pair structure * * @retval Signature length */ int32_t CRYPT_CURVE25519_GetSignLen(const CRYPT_CURVE25519_Ctx *pkey); /** * @ingroup curve25519 * @brief curve25519 Verification * * @param pkey [IN] curve25519 Key pair structure. A public key is required for signature verification. * @param algid [IN] md algid * @param msg [IN] Data * @param msgLen [IN] Data length: 0 <= msgLen <= (2^125 - 64) bytes * @param sign [IN] Signature * @param signLen [IN] Signature length, which must be 64 bytes * * @retval CRYPT_SUCCESS The signature verification is successful. * @retval CRYPT_CURVE25519_NO_PUBKEY The key pair has no public key. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval Error code of the hash module. An error occurs in the sha512 operation. * @retval CRYPT_CURVE25519_VERIFY_FAIL Failed to verify the signature. * @retval CRYPT_CURVE25519_INVALID_PUBKEY Invalid public key. * @retval CRYPT_CURVE25519_SIGNLEN_ERROR signLen is not equal to curve25519 signature length * @retval CRYPT_CURVE25519_NO_HASH_METHOD No hash method is set. */ int32_t CRYPT_CURVE25519_Verify(const CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup curve25519 * @brief ed25519 Generate a key pair (public and private keys). * * @param pkey [IN/OUT] curve25519 Key pair structure/Key pair structure containing public and private keys * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_NO_REGIST_RAND Unregistered random number * @retval Error code of the hash module. An error occurs during the SHA512 operation. * @retval Error code of the registered random number module. Failed to obtain the random number. * @retval CRYPT_CURVE25519_NO_HASH_METHOD No hash method is set. * @retval CRYPT_NULL_INPUT The input parameter is empty. */ int32_t CRYPT_ED25519_GenKey(CRYPT_CURVE25519_Ctx *pkey); #endif /* HITLS_CRYPTO_ED25519 */ #ifdef HITLS_CRYPTO_X25519 /** * @ingroup curve25519 * @brief x25519 Calculate the shared key based on the private key of the local end and the public key of the peer end. * * @param prvKey [IN] curve25519 Key pair structure, local private key * @param pubKey [IN] curve25519 Key pair structure, peer public key * @param sharedKey [OUT] Shared key * @param shareKeyLen [IN/OUT] Shared key length * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_CURVE25519_KEY_COMPUTE_FAILED Failed to generate the shared key. */ int32_t CRYPT_CURVE25519_ComputeSharedKey(CRYPT_CURVE25519_Ctx *prvKey, CRYPT_CURVE25519_Ctx *pubKey, uint8_t *sharedKey, uint32_t *shareKeyLen); /** * @ingroup curve25519 * @brief x25519 Generate a key pair (public and private keys). * * @param pkey [IN/OUT] curve25519 Key pair structure/Key pair structure containing public and private keys * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_NO_REGIST_RAND Unregistered random number callback * @retval Error code of the registered random number module. Failed to obtain the random number. * @retval CRYPT_NULL_INPUT The input parameter is empty. */ int32_t CRYPT_X25519_GenKey(CRYPT_CURVE25519_Ctx *pkey); #endif /* HITLS_CRYPTO_X25519 */ /** * @ingroup curve25519 * @brief curve25519 Public key comparison * * @param a [IN] curve25519 Context structure * @param b [IN] curve25519 Context structure * * @retval CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_CURVE25519_PUBKEY_NOT_EQUAL Public Keys are not equal */ int32_t CRYPT_CURVE25519_Cmp(const CRYPT_CURVE25519_Ctx *a, const CRYPT_CURVE25519_Ctx *b); /** * @ingroup curve25519 * @brief curve25519 get security bits * * @param ctx [IN] curve25519 Context structure * * @retval security bits */ int32_t CRYPT_CURVE25519_GetSecBits(const CRYPT_CURVE25519_Ctx *ctx); #ifdef HITLS_CRYPTO_PROVIDER /** * @ingroup curve25519 * @brief curve25519 import key * * @param ctx [IN/OUT] curve25519 context structure * @param params [IN] parameters */ int32_t CRYPT_CURVE25519_Import(CRYPT_CURVE25519_Ctx *ctx, const BSL_Param *params); /** * @ingroup curve25519 * @brief curve25519 export key * * @param ctx [IN] curve25519 context structure * @param params [IN/OUT] key parameters */ int32_t CRYPT_CURVE25519_Export(const CRYPT_CURVE25519_Ctx *ctx, BSL_Param *params); #endif // HITLS_CRYPTO_PROVIDER #ifdef HITLS_CRYPTO_ED25519_CHECK /** * @ingroup ed25519 * @brief ed25519 check key pair * * @param checkType [IN] check type * @param pkey1 [IN] ed25519 context structure * @param pkey2 [IN] ed25519 context structure * * @retval CRYPT_SUCCESS successfully. * @retval other error. */ int32_t CRYPT_ED25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2); #endif // HITLS_CRYPTO_ED25519_CHECK #ifdef HITLS_CRYPTO_X25519_CHECK /** * @ingroup x25519 * @brief x25519 check key pair * * @param checkType [IN] check type * @param pkey1 [IN] x25519 context structure * @param pkey2 [IN] x25519 context structure * * @retval CRYPT_SUCCESS successfully. * @retval other error. */ int32_t CRYPT_X25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2); #endif // HITLS_CRYPTO_X25519_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CURVE25519 #endif // CRYPT_CURVE25519_H
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/include/crypt_curve25519.h
C
unknown
15,400
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "crypt_arm.h" .file "x25519_armv8.S" .text .macro push_stack /* save register. */ stp x19, x20, [sp, #-16]! stp x21, x22, [sp, #-16]! sub sp, sp, #32 .endm .macro pop_stack add sp, sp, #32 /* pop register */ ldp x21, x22, [sp], #16 ldp x19, x20, [sp], #16 .endm .macro u64mul oper1, oper2 mul x19, \oper1, \oper2 umulh x2, \oper1, \oper2 .endm .macro u51mul cur, low, high u64mul x3, \cur adds \low, \low, x19 adc \high, \high, x2 .endm .macro reduce /* retain the last 51 bits */ mov x8, #0x7ffffffffffff /* 计算 h2' */ mov x3, x9 lsr x9, x9, #51 // carry(h2-low) lsl x10, x10, #13 // (h2-high) << 13 /* 计算 h0' */ mov x1, x4 lsr x4, x4, #51 // carry(h1-low) lsl x5, x5, #13 // (h1-high) << 13 /* 计算 h2' */ and x3, x3, x8 // h2' = rax = h2 & (2^51 - 1) = r12 & (2^51 - 1) orr x10, x10, x9 // r13 = (h2 >> 51) adds x11, x11, x10 // h3 += (h2 >> 51) adc x12, x12, XZR // h3-high carry /* 计算 h0' */ and x1, x1, x8 // h0' = rsi = h0 & (2^51 - 1) = r8 & (2^51 - 1) orr x5, x5, x4 // r9 = (h0 >> 51) adds x6, x6, x5 // h1 += (h0 >> 51) adc x7, x7, XZR // h1-high carry /* 计算 h3' */ mov x4, x11 // h3-low -> x4 lsr x11, x11, #51 // h3->low >> 51 lsl x12, x12, #13 // h3-high << 13 and x4, x4, x8 // h3' = r8 = h3 & (2^51 - 1) = r14 & (2^51 - 1) orr x12, x12, x11 // r15 = (h3 >> 51) adds x13, x13, x12 // h4 += (h3 >> 51) adc x14, x14, XZR // h4-high carry /* 计算 h1' */ mov x2, x6 // h1-low -> x2 lsr x6, x6, #51 // h1->low >> 51 lsl x7, x7, #13 // h1-high << 13 and x2, x2, x8 // h1' = rdx = h1 & (2^51 - 1) = r10 & (2^51 - 1) orr x7, x7, x6 // r11 = (h1 >> 51) adds x3, x3, x7 // h2 += (h1 >> 51) /* 计算 h4' */ mov x5, x13 // h4-low -> x5 lsr x13, x13, #51 // h4->low >> 51 lsl x14, x14, #13 // h4-high << 13 and x5, x5, x8 // h4' = r9 = h4 & (2^51 - 1) = rbx & (2^51 - 1) orr x14, x14, x13 // rcx = (h4 >> 51) /* out[0] = out[0] + 19 * carry */ lsl x6, x14, #3 adds x6, x6, x14 // h4-high * 8 + h4-high -> x6 (9 * h4-high) adds x14, x14, x6, lsl #1 // x6 *2 + x14 => x6 --- h4-high * 9 * 2 + h4-high adds x1, x1, x14 // h4-high * 19 +->h0-low /* h2 剩余 */ mov x6, x3 // h2-low -> x6 and x3, x8, x3 // h2 &= (2^51 - 1) lsr x6, x6, #51 // h2-low << 51 adds x4, x4, x6 // h2-low << 51 -> h3-low /* out[1] += out[0] >> 51 */ mov x6, x1 // h0-low -> x6 /* out[0] &= (2^51 - 1) */ and x1, x1, x8 // clear the upper 13 bits of h0-low lsr x6, x6, #51 // h0-low << 51 adds x2, x2, x6 // h0-low << 51 -> h1-low /* 存储结果 */ str x1, [x0] // h0' str x2, [x0, #8] // h1' str x3, [x0, #16] // h2' str x4, [x0, #24] // h3' str x5, [x0, #32] // h4' .endm ############################################################# # void Fp51Mul (Fp51 *out, const Fp51 *f, const Fp51 *g); ############################################################# .globl Fp51Mul .type Fp51Mul, @function .align 6 Fp51Mul: AARCH64_PACIASP /* save register */ push_stack /* * x0: out; x1: f; x2: g; fp51: array[u64; 5] */ ldr x3, [x1] // f0 ldr x13, [x2] // g0 ldp x11, x12, [x2, #8] // g1, g2 ldp x15, x14, [x2, #24] // g3, g4 str x0, [sp, #24] /* * x13, x11, and x12 will be overwritten in subsequent calculation, and g0 to g2 will be stored. */ mov x8, #19 /* h0 = f0g0 + 19f1g4 + 19f2g3 + 19f3g2 + 19f4g1; save in x4(low), x5(high) */ mul x4, x3, x13 // (x4, x5) = f0 * g0 umulh x5, x3, x13 str x13, [sp, #16] // g0 /* h1 = f0g1 + f1g0 + 19f2g4 + 19f3g3 + 19f4g2; save in x6, x7 */ mul x6, x3, x11 // (x6, x7) = f0 * g1 umulh x7, x3, x11 lsl x13, x14, #3 add x13, x13, x14 // g4 * 8 + g4 = g4 * 9 str x11, [sp, #8] // g1 /* h2 = f0g2 + f1g1 + f2g0 + 19f3g4 + 19f4g3; save in x9, x10 */ mul x9, x3, x12 // (x9, x10) = f0 * g2 umulh x10, x3, x12 lsl x0, x13, #1 add x0, x0, x14 // rdi = 2 * (9 * g4) + g4 str x12, [sp] // g2 /* h3 = f0g3 + f1g2 + f2g1 + f3g0 + 19f4g4; save in x11, x12 */ mul x11, x3, x15 // (x11, x12) = f0 * g3 umulh x12, x3, x15 /* h4 = f0g4 + f1g3 + f2g2 + f3g1 + f4g0; save in x13, x14 */ mul x13, x3, x14 // (x13, x14) = f0 * g4 umulh x14, x3, x14 ldr x3, [x1, #8] // f1 /* compute 19 * g4 */ u51mul x0, x4, x5 // (x4, x5) = 19 * f1 * g4; load f2 ldr x3, [x1, #16] u51mul x0, x6, x7 // (x6, x7) = 19 * f2 * g4; load f3 ldr x3, [x1, #24] u51mul x0, x9, x10 // (x9, x10) = 19 * f3 * g4; load f4 ldr x3, [x1, #32] u51mul x0, x11, x12 // (x11, x12) = 19 * f3 * g4; load f4 ldr x3, [x1, #8] mul x0, x15, x8 // 19 * g3 /* compute g3 */ u64mul x3, x15 // (x13, x14) = f1 * g3 ldr x15, [sp] // g2 adds x13, x13, x19 ldr x3, [x1, #16] // f2 adc x14, x14, x2 u51mul x0, x4, x5 // (x4, x5) = 19 * f2 * g3; load f3 ldr x3, [x1, #24] u51mul x0, x6, x7 // (x6, x7) = 19 * f3 * g3; load f4 ldr x3, [x1, #32] u64mul x3, x0 // (rax, rdx) = 19 * f4 * g3 mul x0, x15, x8 // 19 * g2 adds x9, x9, x19 ldr x3, [x1, #8] // f1 adc x10, x10, x2 /* compute g2 */ u51mul x15, x11, x12 // (x11, x12) = f1 * g2; load f2 ldr x3, [x1, #16] u64mul x3, x15 // (rax, rdx) = f2 * g2 ldr x15, [sp, #8] // g1 adds x13, x13, x19 ldr x3, [x1, #24] // f3 adc x14, x14, x2 u51mul x0, x4, x5 // (x4, x5) = 19 * f3 * g2; load f4 ldr x3, [x1, #32] u51mul x0, x6, x7 // (x6, x7) = 19 * f4 * g2; load f2 ldr x3, [x1, #8] /* compute g1 */ u64mul x3, x15 // (x19, x2) = f1 * g1 mul x0, x15, x8 // 19 * g1 adds x9, x9, x19 ldr x3, [x1, #16] // f2 adc x10, x10, x2 u51mul x15, x11, x12 // (x11, x12) += f2 * g1; load f3 ldr x3, [x1, #24] u64mul x3, x15 // (x19, x2) = f3 * g1 ldr x15, [sp, #16] // g0 adds x13, x13, x19 ldr x3, [x1, #32] // f4 adc x14, x14, x2 u51mul x0, x4, x5 // (x4, x5) += 19 * f4 * g1; load f1 ldr x3, [x1, #8] /* compute g0 */ u51mul x15, x6, x7 // (x6, x7) += f1 * g0; load f2 ldr x3, [x1, #16] u51mul x15, x9, x10 // (x9, x10) += f2 * g0; load f3 ldr x3, [x1, #24] u51mul x15, x11, x12 // (x11, x12) = f3 * g0; load f4 ldr x3, [x1, #32] u64mul x3, x15 // (x13, x14) += f4 * g0 adds x13, x13, x19 adc x14, x14, x2 /* pop stack register */ ldr x0, [sp, #24] reduce pop_stack AARCH64_AUTIASP ret .size Fp51Mul,.-Fp51Mul ############################################################# # void Fp51Square(Fp51 *out, const Fp51 *f); ############################################################# .globl Fp51Square .type Fp51Square, @function .align 6 Fp51Square: AARCH64_PACIASP push_stack /* * x0: out; x1: f; fp51 : array [u64; 5] */ ldr x3, [x1] // f0 ldr x12, [x1, #16] // f2 ldr x14, [x1, #32] // f4 mov x8, #19 lsl x2, x3, #1 // 2 * f0 str x0, [sp, #24] /* h0 = f0^2 + 38f1f4 + 38f2f3; save in x4, x5 */ mul x4, x3, x3 // (x4, x5) = f0^2 umulh x5, x3, x3 ldr x3, [x1, #8] // f1 /* h1 = 19f3^2 + 2f0f1 + 38f2g4; save in x6, x7 */ mul x6, x3, x2 // (x6, x7) = 2f0 * f1 umulh x7, x3, x2 str x12, [sp, #16] // save f2 /* h2 = f1^2 + 2f0f2 + 38f3g4; save in x9, x10 */ mul x9, x12, x2 // (x9, x10) = 2f0 * f2 umulh x10, x12, x2 ldr x3, [x1, #24] // f3 mul x0, x14, x8 // 19 * f4 /* h3 = 19f4^2 + 2f0f3 + 2f1f2; save in r14, r15 */ mul x11, x3, x2 // (x11, x12) = 2f0 * f3 umulh x12, x3, x2 mov x3, x14 // f4 /* h4 = f2^2 + 2f0f4 + 2f1f3; save in x13, x14 */ mul x13, x3, x2 // (x13, x14) = 2f0 * f4 umulh x14, x3, x2 /* * h3: compute 19 * f4 */ u51mul x0, x11, x12 // (x11, x12) += 19 * f4^2; load f1 ldr x3, [x1, #8] /* * h2 : compute f1 */ lsl x15, x3, #1 // 2 * f1 u51mul x3, x9, x10 // (x9, x10) += f1^2; load f2 ldr x3, [sp, #16] /* h3 */ u51mul x15, x11, x12 // (x11, x12) += 2 * f1 * f2; load f3 ldr x3, [x1, #24] /* h4 */ u51mul x15, x13, x14 // (x13, x14) = 2 * f1 * f3; load 2 * f1 mov x3, x15 ldr x1, [x1, #24] // f3 mul x15, x1, x8 // 19 * f3 /* h0 */ u64mul x3, x0 lsl x3, x1, #1 // 2 * f3 adds x4, x4, x19 // (x4, x5) += 2 * f1 * 19 * f4 adc x5, x5, x2 /* * h2: compute f3 */ u51mul x0, x9, x10 // (x9, x10) += f3 * 2 * 19 * f4; load f3 mov x3, x1 /* h1 */ u51mul x15, x6, x7 // (x6, x7) += 19 * f3 * f3; load f2 ldr x3, [sp, #16] /* * h4: compute f2 */ lsl x1, x3, #1 // 2 * f2 u51mul x3, x13, x14 // (x13, x14) += f2 * f2; load 19 * f3 mov x3, x15 /* h0 */ u51mul x1, x4, x5 // (x4, x5) = 2 * f2 * 19 * f3; load 2 * f2 mov x3, x1 /* h1 */ u64mul x3, x0 // (x6, x7) += 2 * f2 * 19 * f4 adds x6, x19, x6 adc x7, x2, x7 ldr x0, [sp, #24] reduce pop_stack AARCH64_AUTIASP ret .size Fp51Square,.-Fp51Square ############################################################# # void Fp51MulScalar(Fp51 *out, const Fp51 *in); ############################################################# .globl Fp51MulScalar .type Fp51MulScalar, @function .align 6 Fp51MulScalar: AARCH64_PACIASP /* * x0: out; x1: in; fp51 array [u64; 5] */ /* mov 121666 */ mov x3, #0xDB42 movk x3, #0x1, lsl #16 /* ldr f0, f1 */ ldp x2, x8, [x1] /* h0 */ mul x4, x2, x3 // f0 * 121666 umulh x5, x2, x3 /* h1 */ mul x6, x8, x3 // f1 * 121666 umulh x7, x8, x3 /* ldr f2, f3 */ ldp x2, x8, [x1, #16] /* h2 */ mul x9, x2, x3 // f2 * 121666 umulh x10, x2, x3 /* h3 */ mul x11, x8, x3 // f3 * 121666 umulh x12, x8, x3 /* ldr f4 */ ldr x8, [x1, #32] /* h4 */ mul x13, x3, x8 // f4 * 121666 umulh x14, x3, x8 reduce AARCH64_AUTIASP ret .size Fp51MulScalar,.-Fp51MulScalar #endif
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/asm/x25519_armv8.S
Unix Assembly
unknown
13,608
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 .file "x25519_x86_64.S" .text .macro push_stack /* Save register. The following registers need to be saved by the caller and restored when the function exits. */ pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 /* Allocate stack space and store the following necessary content: */ leaq -32(%rsp), %rsp .endm .macro pop_stack /* Recovery register */ movq 32(%rsp),%r15 movq 40(%rsp),%r14 movq 48(%rsp),%r13 movq 56(%rsp),%r12 movq 64(%rsp),%rbp movq 72(%rsp),%rbx /* Restore stack pointer. The stack is opened with 32 bytes and 6 registers are restored. The total number is 80 bytes. */ leaq 80(%rsp), %rsp .endm .macro u51mul cur, low, high, next mulq \cur addq %rax, \low movq \next, %rax adcq %rdx, \high .endm .macro reduce /* Retain the last 51 digits. */ movq $0x7ffffffffffff, %rbp /* Calculate h2' */ movq %r12, %rax shrq $51, %r12 shlq $13, %r13 /* Calculate h0' */ movq %r8, %rsi shrq $51, %r8 shlq $13, %r9 /* Calculate h2' */ andq %rbp, %rax // h2' = rax = h2 & (2^51 - 1) = r12 & (2^51 - 1) orq %r12, %r13 // r13 = (h2 >> 51) addq %r13, %r14 // h3 += (h2 >> 51) adcq $0, %r15 /* Calculate h0' */ andq %rbp, %rsi // h0' = rsi = h0 & (2^51 - 1) = r8 & (2^51 - 1) orq %r8, %r9 // r9 = (h0 >> 51) addq %r9, %r10 // h1 += (h0 >> 51) adcq $0, %r11 /* Calculate h3' */ movq %r14, %r8 shrq $51, %r14 shlq $13, %r15 andq %rbp, %r8 // h3' = r8 = h3 & (2^51 - 1) = r14 & (2^51 - 1) orq %r14, %r15 // r15 = (h3 >> 51) addq %r15, %rbx // h4 += (h3 >> 51) adcq $0, %rcx /* Calculate h1' */ movq %r10, %rdx shrq $51, %r10 shlq $13, %r11 andq %rbp, %rdx // h1' = rdx = h1 & (2^51 - 1) = r10 & (2^51 - 1) orq %r10, %r11 // r11 = (h1 >> 51) addq %r11, %rax // h2 += (h1 >> 51) /* Calculate h4' */ movq %rbx, %r9 shrq $51, %rbx shlq $13, %rcx andq %rbp, %r9 // h4' = r9 = h4 & (2^51 - 1) = rbx & (2^51 - 1) orq %rbx, %rcx // rcx = (h4 >> 51) /* out[0] = out[0] + 19 * carry */ leaq (%rcx, %rcx, 8), %r10 // r10 = 8 * rcx leaq (%rcx, %r10, 2), %rcx // rcx = 2 * (8 * rcx) + rcx = 19 * rcx addq %rcx, %rsi /* h2 remaining */ movq %rax, %r10 andq %rbp, %rax // h2 &= (2^51 - 1) shrq $51, %r10 addq %r10, %r8 /* out[1] += out[0] >> 51 */ movq %rsi, %r10 /* out[0] &= (2^51 - 1) */ andq %rbp, %rsi shrq $51, %r10 addq %r10, %rdx /* Storing Results */ movq %rsi, (%rdi) // h0' movq %rdx, 8(%rdi) // h1' movq %rax, 16(%rdi) // h2' movq %r8, 24(%rdi) // h3' movq %r9, 32(%rdi) // h4' .endm ############################################################# # void Fp51Mul (Fp51 *out, const Fp51 *f, const Fp51 *g); ############################################################# .globl Fp51Mul .type Fp51Mul, @function .align 32 Fp51Mul: .cfi_startproc /* Save Register */ push_stack /* The input and output parameters are transferred by registers rdi, rsi, and rdx. * rdi: out; rsi: f; rdx: g; fp51 is an array of [u64; 5] * rdx will be overwritten in subsequent calculation. * Therefore, you need to load the data in the rdx variable in advance. */ movq (%rsi), %rax // f0 movq (%rdx), %rbx // g0 movq 8(%rdx), %r14 // g1 movq 16(%rdx), %r15 // g2 movq 24(%rdx), %rbp // g3, Store g0-g3, store g3 in unaffected registers movq 32(%rdx), %rcx // g4 /* Stores the out pointer and frees the rdi so that the rdi can be used in subsequent calculations. Stores 19 * g4. */ movq %rdi, 24(%rsp) movq %rax, %rdi // f0 /* r14, r15, rbx, and rcx will be overwritten in subsequent calculations. g0 to g2 will be stored. * Storage actions will be scattered in the calculation code for performance purposes. */ /* h0 = f0g0 + 19f1g4 + 19f2g3 + 19f3g2 + 19f4g1; Stored in r8, r9 */ mulq %rbx // (rax, rdx) = f0 * g0, in le movq %rax, %r8 movq %rdi, %rax // f0 movq %rbx, 16(%rsp) // g0 movq %rdx, %r9 /* h1 = f0g1 + f1g0 + 19f2g4 + 19f3g3 + 19f4g2; Stored in r10, r11 */ mulq %r14 // (rax, rdx) = f0 * g1 movq %rax, %r10 movq %rdi, %rax // f0 leaq (%rcx, %rcx, 8), %rbx // g4 * 8 + g4 = g4 * 9 movq %r14, 8(%rsp) // g1 movq %rdx, %r11 /* h2 = f0g2 + f1g1 + f2g0 + 19f3g4 + 19f4g3; Stored in r12, r13 */ mulq %r15 // (rax, rdx) = f0 * g2 movq %rax, %r12 movq %rdi, %rax // f0 leaq (%rcx, %rbx, 2), %rdi // rdi = 2 * (9 * g4) + g4, Store 19 * g4 to rdi before rcx is overwritten movq %r15, (%rsp) // g2 movq %rdx, %r13 /* h3 = f0g3 + f1g2 + f2g1 + f3g0 + 19f4g4; Stored in r14, r15 */ mulq %rbp // (rax, rdx) = f0 * g3 movq %rax, %r14 movq (%rsi), %rax // f0 movq %rdx, %r15 /* h4 = f0g4 + f1g3 + f2g2 + f3g1 + f4g0; Stored in rbx, rcx */ mulq %rcx // (rax, rdx) = f0 * g4 movq %rax, %rbx movq 8(%rsi), %rax // f1 movq %rdx, %rcx /* Calculate 19 * g4 related */ u51mul %rdi, %r8, %r9, 16(%rsi) // (rax, rdx) = 19 * f1 * g4; load f2 u51mul %rdi, %r10, %r11, 24(%rsi) // (rax, rdx) = 19 * f2 * g4; load f3 u51mul %rdi, %r12, %r13, 32(%rsi) // (rax, rdx) = 19 * f3 * g4; load f4 mulq %rdi // (rax, rdx) = 19 * f4 * g4 imulq $19, %rbp, %rdi // 19 * g3 addq %rax, %r14 movq 8(%rsi), %rax // f1 adcq %rdx, %r15 /* Calculate g3 related */ mulq %rbp // (rax, rdx) = f1 * g3 movq (%rsp), %rbp // g2 addq %rax, %rbx movq 16(%rsi), %rax // f2 adcq %rdx, %rcx u51mul %rdi, %r8, %r9, 24(%rsi) // (rax, rdx) = 19 * f2 * g3; load f3 u51mul %rdi, %r10, %r11, 32(%rsi) // (rax, rdx) = 19 * f3 * g3; load f4 mulq %rdi // (rax, rdx) = 19 * f4 * g3 imulq $19, %rbp, %rdi // 19 * g2 addq %rax, %r12 movq 8(%rsi), %rax // f1 adcq %rdx, %r13 /* Calculate g2 related */ u51mul %rbp, %r14, %r15, 16(%rsi) // (rax, rdx) = f1 * g2; load f2 mulq %rbp // (rax, rdx) = f2 * g2 movq 8(%rsp), %rbp // g1 addq %rax, %rbx movq 24(%rsi), %rax // f3 adcq %rdx, %rcx u51mul %rdi, %r8, %r9, 32(%rsi) // (rax, rdx) = 19 * f3 * g2; load f4 u51mul %rdi, %r10, %r11, 8(%rsi) // (rax, rdx) = 19 * f4 * g2; load f2 /* Calculate g1 related */ mulq %rbp // (rax, rdx) = f1 * g1 imulq $19, %rbp, %rdi // 19 * g1 addq %rax, %r12 movq 16(%rsi), %rax // f2 adcq %rdx, %r13 u51mul %rbp, %r14, %r15, 24(%rsi) // (rax, rdx) = f2 * g1; load f3 mulq %rbp // (rax, rdx) = f3 * g1 movq 16(%rsp), %rbp // g0 addq %rax, %rbx movq 32(%rsi), %rax // f4 adcq %rdx, %rcx u51mul %rdi, %r8, %r9, 8(%rsi) // (rax, rdx) = 19 * f4 * g1; load f1 /* Calculate g0 related */ u51mul %rbp, %r10, %r11, 16(%rsi) // (rax, rdx) = f1 * g0; load f2 u51mul %rbp, %r12, %r13, 24(%rsi) // (rax, rdx) = f2 * g0; load f3 u51mul %rbp, %r14, %r15, 32(%rsi) // (rax, rdx) = f3 * g0; load f4 mulq %rbp // (rax, rdx) = f4 * g0 addq %rax, %rbx adcq %rdx, %rcx /* Restore the stack pointer. */ movq 24(%rsp), %rdi reduce /* Recovery register */ pop_stack ret .cfi_endproc .size Fp51Mul,.-Fp51Mul ############################################################# # void Fp51Square(Fp51 *out, const Fp51 *f); ############################################################# .globl Fp51Square .type Fp51Square, @function .align 32 Fp51Square: .cfi_startproc /* Save Register */ push_stack /* The input and output parameters are transferred by registers rdi and rsi. * rdi: out; rsi: f; fp51 is an array of [u64; 5] * Loads only non-adjacent data, vacating registers for storage calculations */ movq (%rsi), %rax // f0 movq 16(%rsi), %r15 // f2 movq 32(%rsi), %rcx // f4 /* Open the stack and store the following necessary content, which is consistent with the Fp51Mul. * Stores the out pointer, frees the rdi, * so that the rdi can be used in subsequent calculations, and stores 19 * f4. */ leaq (%rax, %rax, 1), %rbp // 2 * f0 movq %rdi, 24(%rsp) /* h0 = f0^2 + 38f1f4 + 38f2f3; Stored in r8, r9 */ mulq %rax // (rax, rdx) = f0^2 movq %rax, %r8 movq 8(%rsi), %rax // f1 movq %rdx, %r9 /* h1 = 19f3^2 + 2f0f1 + 38f2g4; Stored in r10, r11 */ mulq %rbp // (rax, rdx) = 2f0 * f1 movq %rax, %r10 movq %r15, %rax // f2 movq %r15, 16(%rsp) // Store f2 for later use of rsi movq %rdx, %r11 /* h2 = f1^2 + 2f0f2 + 38f3g4; Stored in r12, r13 */ mulq %rbp // (rax, rdx) = 2f0 * f2 movq %rax, %r12 movq 24(%rsi), %rax // f3 movq %rdx, %r13 imulq $19, %rcx, %rdi // Store 19 * f4 to rdi before rcx is overwritten /* h3 = 19f4^2 + 2f0f3 + 2f1f2; Stored in r14, r15 */ mulq %rbp // (rax, rdx) = 2f0 * f3 movq %rax, %r14 movq %rcx, %rax // f4 movq %rdx, %r15 /* h4 = f2^2 + 2f0f4 + 2f1f3; Stored in rbx, rcx */ mulq %rbp // (rax, rdx) = 2f0 * f4 movq %rax, %rbx movq %rcx, %rax // f4 movq %rdx, %rcx /* Calculate 19 * f4 related * h3 */ u51mul %rdi, %r14, %r15, 8(%rsi) // (rax, rdx) = 19 * f4^2; load f1 movq 24(%rsi), %rsi // f3 /* Calculate f1 related * h2 */ leaq (%rax, %rax, 1), %rbp // 2 * f1 u51mul %rax, %r12, %r13, 16(%rsp) // (rax, rdx) = f1^2; load f2 /* h3 */ u51mul %rbp, %r14, %r15, %rsi // (rax, rdx) = 2 * f1 * f2; load f3 /* h4 */ u51mul %rbp, %rbx, %rcx, %rbp // (rax, rdx) = 2 * f1 * f3; load 2 * f1 imulq $19, %rsi, %rbp // 19 * f3 /* h0 */ mulq %rdi // (rax, rdx) = 2 * f1 * 19 * f4 addq %rax, %r8 leaq (%rsi, %rsi, 1), %rax // 2 * f3 adcq %rdx, %r9 /* Calculate f3 related * h2 */ u51mul %rdi, %r12, %r13, %rsi // (rax, rdx) = f3 * 2 * 19 * f4; load f3 /* h1 */ u51mul %rbp, %r10, %r11, 16(%rsp) // (rax, rdx) = 19 * f3^2; load f2 /* Calculate f2 related * h4 */ leaq (%rax, %rax, 1), %rsi // 2 * f2 u51mul %rax, %rbx, %rcx, %rbp // (rax, rdx) = f2^2; load 19 * f3 /* h0 */ u51mul %rsi, %r8, %r9, %rsi // (rax, rdx) = 2 * f2 * 19 * f3; load 2 * f2 /* h1 */ mulq %rdi // (rax, rdx) = 2 * f2 * 19 * f4 addq %rax, %r10 adcq %rdx, %r11 /* Recovery register */ movq 24(%rsp), %rdi reduce /* Recovery register */ pop_stack ret .cfi_endproc .size Fp51Square,.-Fp51Square ############################################################# # void Fp51MulScalar(Fp51 *out, const Fp51 *in); ############################################################# .globl Fp51MulScalar .type Fp51MulScalar, @function .align 32 Fp51MulScalar: .cfi_startproc /* Save Register */ push_stack /*The input and output parameters are transferred by registers rdi, rsi, and rdx. * rdi: out; rsi: in; rdx: scalar; fp51 Is an array of [u64; 5] * Open stack, consistent with Fp51Mul */ /* h0 */ movl $121666, %eax mulq (%rsi) // f0 * 121666 movq %rax, %r8 movl $121666, %eax // Modify the rax immediately after the rax is vacated. movq %rdx, %r9 /* h1 */ mulq 8(%rsi) // f1 * 121666 movq %rax, %r10 movl $121666, %eax movq %rdx, %r11 /* h2 */ mulq 16(%rsi) // f2 * 121666 movq %rax, %r12 movl $121666, %eax movq %rdx, %r13 /* h3 */ mulq 24(%rsi) // f3 * 121666 movq %rax, %r14 movl $121666, %eax movq %rdx, %r15 /* h4 */ mulq 32(%rsi) // f4 * 121666 movq %rax, %rbx movq %rdx, %rcx reduce /* Recovery register */ pop_stack ret .cfi_endproc .size Fp51MulScalar,.-Fp51MulScalar /** * Fp64 reduce: * +------+-----+-----+-----+------+ * | | r15 | r14 | r13 | r12 | * | | | | | 38 | * +-------------------------------+ * | | | | r12'| r12' | * | | | r13'| r13'| | * | | r14'| r14'| | | * | r15' | r15'| | | | * +-------------------------------+ * | | r11'| r10'| r9' | r8' | * | | | | |19r15'| * +-------------------------------+ * | | r11 | r10 | r9 | r8 | * +------+-----+-----+-----+------+ */ .macro Fp64Reduce xorq %rsi, %rsi movq $38, %rdx mulx %r12, %rax, %rbx adcx %rax, %r8 adox %rbx, %r9 mulx %r13, %rax, %rbx adcx %rax, %r9 adox %rbx, %r10 mulx %r14, %rax, %rbx adcx %rax, %r10 adox %rbx, %r11 mulx %r15, %rax, %r12 adcx %rax, %r11 adcx %rsi, %r12 adox %rsi, %r12 shld $1, %r11, %r12 movq $0x7FFFFFFFFFFFFFFF, %rbp andq %rbp, %r11 imulq $19, %r12, %r12 addq %r12, %r8 adcx %rsi, %r9 adcx %rsi, %r10 adcx %rsi, %r11 movq 0(%rsp), %rdi movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq %r8, 0(%rdi) .endm .globl Fp64Mul .type Fp64Mul,@function .align 32 Fp64Mul: .cfi_startproc pushq %rbp pushq %rbx pushq %r12 pushq %r13 pushq %r14 pushq %r15 pushq %rdi /** * (f3, f2, f1, f0) * (g3, g2, g1, g0) : * + + + + + + + + + * | | | | | A3 | A2 | A1 | A0 | * | | | | | B3 | B2 | B1 | B0 | * +------------------------------------------+ * | | | | | | |A0B0|A0B0| * | | | | | |A1B0|A1B0| | * | | | | |A2B0|A2B0| | | * | | | |A3B0|A3B0| | | | * | | | | | |A0B1|A0B1| | * | | | | |A1B1|A1B1| | | * | | | |A2B1|A2B1| | | | * | | |A3B1|A3B1| | | | | * | | | | |A2B0|A2B0| | | * | | | |A2B1|A2B1| | | | * | | |A2B2|A2B2| | | | | * | |A2B3|A2B3| | | | | | * | | | |A3B0|A3B0| | | | * | | |A3B1|A3B1| | | | | * | |A3B2|A3B2| | | | | | * |A3B3|A3B3| | | | | | | * +------------------------------------------+ * |r15 |r14 |r13 |r12 |r11 |r10 |r9 |r8 | * + + + + + + + + + */ movq 0(%rdx), %rcx movq 8(%rdx), %rbp movq 16(%rdx), %rdi movq 24(%rdx), %r15 movq 0(%rsi), %rdx xorq %r14, %r14 // (f3, f2, f1, f0) * g0 mulx %rcx, %r8, %rax mulx %rbp, %r9, %rbx adcx %rax, %r9 mulx %rdi, %r10, %rax adcx %rbx, %r10 mulx %r15, %r11, %r12 movq 8(%rsi), %rdx adcx %rax, %r11 adcx %r14, %r12 // (f3, f2, f1, f0) * g1 mulx %rcx, %rax, %rbx adcx %rax, %r9 adox %rbx, %r10 mulx %rbp, %rax, %rbx adcx %rax, %r10 adox %rbx, %r11 mulx %rdi, %rax, %rbx adcx %rax, %r11 adox %rbx, %r12 mulx %r15, %rax, %r13 movq 16(%rsi), %rdx adcx %rax, %r12 adox %r14, %r13 adcx %r14, %r13 // (f3, f2, f1, f0) * g2 mulx %rcx, %rax, %rbx adcx %rax, %r10 adox %rbx, %r11 mulx %rbp, %rax, %rbx adcx %rax, %r11 adox %rbx, %r12 mulx %rdi, %rax, %rbx adcx %rax, %r12 adox %rbx, %r13 mulx %r15, %rax, %r14 movq 24(%rsi), %rdx adcx %rax, %r13 movq $0, %rsi adox %rsi, %r14 adcx %rsi, %r14 // (f3, f2, f1, f0) * g3 mulx %rcx, %rax, %rbx adcx %rax, %r11 adox %rbx, %r12 mulx %rbp, %rax, %rbx adcx %rax, %r12 adox %rbx, %r13 mulx %rdi, %rax, %rbx adcx %rax, %r13 adox %rbx, %r14 mulx %r15, %rax, %r15 adcx %rax, %r14 adox %rsi, %r15 adcx %rsi, %r15 // reduce Fp64Reduce movq 8(%rsp), %r15 movq 16(%rsp), %r14 movq 24(%rsp), %r13 movq 32(%rsp), %r12 movq 40(%rsp), %rbx movq 48(%rsp), %rbp leaq 56(%rsp), %rsp ret .cfi_endproc .size Fp64Mul,.-Fp64Mul .globl Fp64Sqr .type Fp64Sqr,@function .align 32 Fp64Sqr: .cfi_startproc pushq %rbp pushq %rbx pushq %r12 pushq %r13 pushq %r14 pushq %r15 pushq %rdi /** * (f3, f2, f1, f0) ^ 2 : * +----+----+----+----+----+----+----+----+----+ * | | | | | | A3 | A2 | A1 | A0 | * | * | | | | | A3 | A2 | A1 | A0 | * +--------------------------------------------+ * | | | | | | |A0A1|A0A1| | * | | | | | |A0A2|A0A2| | | * | + | | | |A0A3|A0A3| | | | * | | | | |A1A2|A1A2| | | | * | | | |A1A3|A1A3| | | | | * | | |A2A3|A2A3| | | | | | * +--------------------------------------------+ * | *2 | |r14`|r13`|r12`|r11`|r10`|r9` | | * +--------------------------------------------+ * | |r15'|r14'|r13'|r12'|r11'|r10'|r9' | | * +--------------------------------------------+ * | | | | | | | |A0A0|A0A0| * | | | | | |A1A1|A1A1| | | * | + | | |A2A2|A2A2| | | | | * | |A3A3|A3A3| | | | | | | * +--------------------------------------------+ * | |r15 |r14 |r13 |r12 |r11 |r10 |r9 |r8 | * +--------------------------------------------+ */ movq 0(%rsi), %rbx // a0 movq 8(%rsi), %rcx // a1 movq 16(%rsi), %rbp // a2 movq 24(%rsi), %rdi // a3 xorq %r15, %r15 // (a1, a2, a3) * a0 movq %rbx, %rdx mulx %rcx, %r9, %rsi mulx %rbp, %r10, %rax adcx %rsi, %r10 mulx %rdi, %r11, %r12 movq %rcx, %rdx adcx %rax, %r11 adcx %r15, %r12 // (a2, a3) * a1 mulx %rbp, %rsi, %rax adcx %rsi, %r11 adox %rax, %r12 mulx %rdi, %rsi, %r13 movq %rbp, %rdx adcx %rsi, %r12 adcx %r15, %r13 adox %r15, %r13 // a3 * a2 mulx %rdi, %rsi, %r14 movq %rbx, %rdx adcx %rsi, %r13 adcx %r15, %r14 // (r9 --- r14) *2 shld $1, %r14, %r15 shld $1, %r13, %r14 shld $1, %r12, %r13 shld $1, %r11, %r12 shld $1, %r10, %r11 shld $1, %r9, %r10 shlq $1, %r9 xorq %r8, %r8 // clear cf flag // a0 * a0 mulx %rdx, %r8, %rax movq %rcx, %rdx adcx %rax, %r9 // a1 * a1 mulx %rdx, %rsi, %rax movq %rbp, %rdx adcx %rsi, %r10 adcx %rax, %r11 // a2 * a2 mulx %rdx, %rsi, %rax movq %rdi, %rdx adcx %rsi, %r12 adcx %rax, %r13 // a3 * a3 mulx %rdx, %rsi, %rax adcx %rsi, %r14 adcx %rax, %r15 // reduce Fp64Reduce movq 8(%rsp), %r15 movq 16(%rsp), %r14 movq 24(%rsp), %r13 movq 32(%rsp), %r12 movq 40(%rsp), %rbx movq 48(%rsp), %rbp leaq 56(%rsp), %rsp ret .cfi_endproc .size Fp64Sqr, .-Fp64Sqr .globl Fp64MulScalar .type Fp64MulScalar, @function .align 32 Fp64MulScalar: .cfi_startproc movl $121666, %edx mulx 0(%rsi), %r8, %rax mulx 8(%rsi), %r9, %rcx addq %rax, %r9 mulx 16(%rsi), %r10, %rax adcx %rcx, %r10 mulx 24(%rsi), %r11, %rcx adcx %rax, %r11 movl $0, %edx adcx %rdx, %rcx movq $0x7FFFFFFFFFFFFFFF, %rax shld $1, %r11, %rcx andq %rax, %r11 imulq $19, %rcx, %rcx addq %rcx, %r8 adcx %rdx, %r9 movq %r8, 0(%rdi) adcx %rdx, %r10 movq %r9, 8(%rdi) adcx %rdx, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size Fp64MulScalar, .-Fp64MulScalar .globl Fp64Add .type Fp64Add, @function .align 32 Fp64Add: .cfi_startproc movq 0(%rsi),%r8 movq 8(%rsi),%r9 addq 0(%rdx),%r8 adcx 8(%rdx),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 adcx 16(%rdx),%r10 adcx 24(%rdx),%r11 movq $0, %rax movq $38, %rcx cmovae %rax, %rcx addq %rcx, %r8 adcx %rax, %r9 adcx %rax, %r10 movq %r9, 8(%rdi) adcx %rax, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) cmovc %rcx, %rax addq %rax, %r8 movq %r8, 0(%rdi) ret .cfi_endproc .size Fp64Add, .-Fp64Add .globl Fp64Sub .type Fp64Sub,@function .align 32 Fp64Sub: .cfi_startproc movq 0(%rsi),%r8 movq 8(%rsi),%r9 subq 0(%rdx),%r8 sbbq 8(%rdx),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 sbbq 16(%rdx),%r10 sbbq 24(%rdx),%r11 movq $0, %rax movq $38, %rcx cmovae %rax, %rcx subq %rcx, %r8 sbbq %rax, %r9 sbbq %rax, %r10 movq %r9,8(%rdi) sbbq %rax, %r11 movq %r10,16(%rdi) cmovc %rcx, %rax movq %r11,24(%rdi) subq %rax, %r8 movq %r8,0(%rdi) ret .cfi_endproc .size Fp64Sub,.-Fp64Sub .globl Fp64PolyToData .type Fp64PolyToData,@function .align 32 Fp64PolyToData: .cfi_startproc movq 24(%rsi), %r11 movq 16(%rsi), %r10 xorq %rax, %rax leaq (%r11, %r11, 1), %rcx sarq $63, %r11 shrq $1, %rcx andq $19, %r11 addq $19, %r11 movq 0(%rsi), %r8 movq 8(%rsi), %r9 addq %r11, %r8 adcx %rax, %r9 adcx %rax, %r10 adcx %rax, %rcx leaq (%rcx, %rcx, 1), %r11 sarq $63, %rcx shrq $1, %r11 notq %rcx andq $19, %rcx subq %rcx, %r8 sbbq $0, %r9 movq %r8, 0(%rdi) movq %r9, 8(%rdi) sbbq $0, %r10 sbbq $0, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size Fp64PolyToData,.-Fp64PolyToData #endif
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/asm/x25519_x86_64.S
Unix Assembly
unknown
25,769
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "x25519_asm.h" #include "securec.h" #include "curve25519_local.h" #ifdef HITLS_CRYPTO_X25519_X8664 #include "crypt_utils.h" #endif // X25519 alternative implementation, faster but require asm #define CURVE25519_51BITS_MASK 0x7ffffffffffff #define CURVE25519_51BITS 51 static void Fp51DataToPoly(Fp51 *out, const uint8_t in[32]) { uint64_t h[5]; CURVE25519_BYTES7_LOAD(h, in); // load 7 bytes CURVE25519_BYTES6_LOAD(h + 1, in + 7); // load 6 bytes from in7 to h1 h[1] <<= 5; // shift 5 to fit 51 bits CURVE25519_BYTES7_LOAD(h + 2, in + 13); // load 7 bytes from in13 to h2 h[2] <<= 2; // shift 2 to fit 51 bits CURVE25519_BYTES6_LOAD(h + 3, in + 20); // load 6 bytes from in20 to h3 h[3] <<= 7; // shift 7 to fit 51 bits CURVE25519_BYTES6_LOAD(h + 4, in + 26); // load 6 bytes from in26 to h4 h[4] &= 0x7fffffffffff; // 41 bits mask = 0x7fffffffffff h[4] <<= 4; // shift 4 to fit 51 bits h[1] |= h[0] >> CURVE25519_51BITS; // carry h[0] -> h[1] h[0] &= CURVE25519_51BITS_MASK; // clear h[0] h[2] |= h[1] >> CURVE25519_51BITS; // carry h[1] -> h[2] h[1] &= CURVE25519_51BITS_MASK; // clear h[1] h[3] |= h[2] >> CURVE25519_51BITS; // carry h[2] -> h[3] h[2] &= CURVE25519_51BITS_MASK; // clear h[2] h[4] |= h[3] >> CURVE25519_51BITS; // carry h[3] -> h[4] h[3] &= CURVE25519_51BITS_MASK; // clear h[3] out->data[0] = h[0]; // 0 out->data[1] = h[1]; // 1 out->data[2] = h[2]; // 2 out->data[3] = h[3]; // 3 out->data[4] = h[4]; // 4 } static void Fp51UnloadTo8Bits(uint8_t out[32], uint64_t h[5]) { // load from uint64 to uint8, load 8 bits at a time out[0] = (uint8_t)h[0]; out[1] = (uint8_t)(h[0] >> 8); // load from position 8 to out[1] out[2] = (uint8_t)(h[0] >> 16); // load from position 16 to out[2] out[3] = (uint8_t)(h[0] >> 24); // load from position 24 to out[3] out[4] = (uint8_t)(h[0] >> 32); // load from position 32 to out[4] out[5] = (uint8_t)(h[0] >> 40); // load from position 40 to out[5] // load from position 48 from h[1] and (8-5)=3 bits from h[1] to out[6] out[6] = (uint8_t)((h[0] >> 48) | (uint8_t)(h[1] << 3)); out[7] = (uint8_t)(h[1] >> 5); // load h[1] from position 5 to out[7] out[8] = (uint8_t)(h[1] >> 13); // load h[1] from position 13 to out[8] out[9] = (uint8_t)(h[1] >> 21); // load h[1] from position 21 to out[9] out[10] = (uint8_t)(h[1] >> 29); // load h[1] from position 29 to out[10] out[11] = (uint8_t)(h[1] >> 37); // load h[1] from position 37 to out[11] // load from position 45 from h[1] and (8-2)=6 bits from h[2] to out[12] out[12] = (uint8_t)((h[1] >> 45) | (uint8_t)(h[2] << 6)); out[13] = (uint8_t)(h[2] >> 2); // load h[2] from position 2 to out[13] out[14] = (uint8_t)(h[2] >> 10); // load h[2] from position 10 to out[14] out[15] = (uint8_t)(h[2] >> 18); // load h[2] from position 18 to out[15] out[16] = (uint8_t)(h[2] >> 26); // load h[2] from position 26 to out[16] out[17] = (uint8_t)(h[2] >> 34); // load h[2] from position 34 to out[17] out[18] = (uint8_t)(h[2] >> 42); // load h[2] from position 42 to out[18] // load from position 50 from h[2] and (8-1)=7 bits from h[3] to out[19] out[19] = (uint8_t)((h[2] >> 50) | (uint8_t)(h[3] << 1)); out[20] = (uint8_t)(h[3] >> 7); // load h[3] from position 7 to out[20] out[21] = (uint8_t)(h[3] >> 15); // load h[3] from position 15 to out[21] out[22] = (uint8_t)(h[3] >> 23); // load h[3] from position 23 to out[22] out[23] = (uint8_t)(h[3] >> 31); // load h[3] from position 31 to out[23] out[24] = (uint8_t)(h[3] >> 39); // load h[3] from position 39 to out[24] // load from position 47 from h[3] and (4-4)=4 bits from h[4] to out[25] out[25] = (uint8_t)((h[3] >> 47) | (uint8_t)(h[4] << 4)); out[26] = (uint8_t)(h[4] >> 4); // load h[4] from position 4 to out[26] out[27] = (uint8_t)(h[4] >> 12); // load h[4] from position 12 to out[27] out[28] = (uint8_t)(h[4] >> 20); // load h[4] from position 20 to out[28] out[29] = (uint8_t)(h[4] >> 28); // load h[4] from position 28 to out[29] out[30] = (uint8_t)(h[4] >> 36); // load h[4] from position 36 to out[30] out[31] = (uint8_t)(h[4] >> 44); // load h[4] from position 44 to out[31] } static void Fp51PolyToData(const Fp51 *in, uint8_t out[32]) { uint64_t h[5]; h[0] = in->data[0]; // 0 h[1] = in->data[1]; // 1 h[2] = in->data[2]; // 2 h[3] = in->data[3]; // 3 h[4] = in->data[4]; // 4 uint64_t carry; carry = (h[0] + 19) >> CURVE25519_51BITS; // plus 19 then calculate carry carry = (h[1] + carry) >> CURVE25519_51BITS; // carry of h[1] carry = (h[2] + carry) >> CURVE25519_51BITS; // carry of h[2] carry = (h[3] + carry) >> CURVE25519_51BITS; // carry of h[3] carry = (h[4] + carry) >> CURVE25519_51BITS; // carry of h[4] h[0] += 19 * carry; // process carry h[4] -> h[0], h[0] += 19 * carry h[1] += h[0] >> CURVE25519_51BITS; // process carry h[0] -> h[1] h[0] &= CURVE25519_51BITS_MASK; // clear h[0] h[2] += h[1] >> CURVE25519_51BITS; // process carry h[1] -> h[2] h[1] &= CURVE25519_51BITS_MASK; // clear h[1] h[3] += h[2] >> CURVE25519_51BITS; // process carry h[2] -> h[3] h[2] &= CURVE25519_51BITS_MASK; // clear h[2] h[4] += h[3] >> CURVE25519_51BITS; // process carry h[3] -> h[4] h[3] &= CURVE25519_51BITS_MASK; // clear h[3] h[4] &= CURVE25519_51BITS_MASK; // clear h[4] Fp51UnloadTo8Bits(out, h); } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static inline void Fp51MultiSquare(Fp51 *in1, Fp51 *in2, Fp51 *out, int32_t times) { int32_t i; Fp51 temp1, temp2; Fp51Square(&temp1, in1); Fp51Square(&temp2, &temp1); for (i = 0; i < times; i++) { Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); } Fp51Mul(out, in2, &temp2); } /* out = a ^ -1 */ static void Fp51Invert(Fp51 *out, const Fp51 *a) { Fp51 a0; /* save a^1 */ Fp51 a1; /* save a^2 */ Fp51 a2; /* save a^11 */ Fp51 a3; /* save a^(2^5-1) */ Fp51 a4; /* save a^(2^10-1) */ Fp51 a5; /* save a^(2^20-1) */ Fp51 a6; /* save a^(2^40-1) */ Fp51 a7; /* save a^(2^50-1) */ Fp51 a8; /* save a^(2^100-1) */ Fp51 a9; /* save a^(2^200-1) */ Fp51 a10; /* save a^(2^250-1) */ Fp51 temp1, temp2; /* We know a×b=1(mod p), then a and b are inverses of mod p, i.e. a=b^(-1), b=a^(-1); * According to Fermat's little theorem a^(p-1)=1(mod p), so a*a^(p-2)=1(mod p); * So the inverse element of a is a^(-1) = a^(p-2)(mod p) * Here it is, p=2^255-19, thus we need to compute a^(2^255-21)(mod(2^255-19)) */ /* a^1 */ CURVE25519_FP51_COPY(a0.data, a->data); /* a^2 */ Fp51Square(&a1, &a0); /* a^4 */ Fp51Square(&temp1, &a1); /* a^8 */ Fp51Square(&temp2, &temp1); /* a^9 */ Fp51Mul(&temp1, &a0, &temp2); /* a^11 */ Fp51Mul(&a2, &a1, &temp1); /* a^22 */ Fp51Square(&temp2, &a2); /* a^(2^5-1) = a^(9+22) */ Fp51Mul(&a3, &temp1, &temp2); /* a^(2^10-1) = a^(2^10-2^5) * a^(2^5-1) */ Fp51Square(&temp1, &a3); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Mul(&a4, &a3, &temp1); /* a^(2^20-1) = a^(2^20-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a4, &a4, &a5, 4); // (2 * 2) ^ 4 /* a^(2^40-1) = a^(2^40-2^20) * a^(2^20-1) */ Fp51MultiSquare(&a5, &a5, &a6, 9); // (2 * 2) ^ 9 /* a^(2^50-1) = a^(2^50-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a6, &a4, &a7, 4); // (2 * 2) ^ 4 /* a^(2^100-1) = a^(2^100-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a7, &a7, &a8, 24); // (2 * 2) ^ 24 /* a^(2^200-1) = a^(2^200-2^100) * a^(2^100-1) */ Fp51MultiSquare(&a8, &a8, &a9, 49); // (2 * 2) ^ 49 /* a^(2^250-1) = a^(2^250-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a9, &a7, &a10, 24); // (2 * 2) ^ 24 /* a^(2^5*(2^250-1)) = (a^(2^250-1))^5 */ Fp51Square(&temp1, &a10); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); /* The output:a^(2^255-21) = a(2^5*(2^250-1)+11) = a^(2^5*(2^250-1)) * a^11 */ Fp51Mul(out, &a2, &temp1); } void Fp51ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t k[32]; const uint8_t *u = point; int32_t t; uint32_t swap; uint32_t kTemp; Fp51 x1, x2, x3; Fp51 z2, z3; Fp51 t1, t2; /* Decord the scalar into k */ CURVE25519_DECODE_LITTLE_ENDIAN(k, scalar); /* Reference RFC 7748 section 5:The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ Fp51DataToPoly(&x1, u); CURVE25519_FP51_SET(x2.data, 1); CURVE25519_FP51_SET(z2.data, 0); CURVE25519_FP51_COPY(x3.data, x1.data); CURVE25519_FP51_SET(z3.data, 1); swap = 0; /* "bits" parameter set to 255 for x25519 */ /* For t = bits-1(254) down to 0: */ for (t = 254; t >= 0; t--) { /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ kTemp = (k[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; /* kTemp = (k >> t) & 1 */ swap ^= kTemp; /* swap ^= kTemp */ CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); /* (x_2, x_3) = cswap(swap, x_2, x_3) */ CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* (z_2, z_3) = cswap(swap, z_2, z_3) */ swap = kTemp; /* swap = kTemp */ CURVE25519_FP51_SUB(t1.data, x3.data, z3.data); /* x3 = D */ CURVE25519_FP51_SUB(t2.data, x2.data, z2.data); /* t2 = B */ CURVE25519_FP51_ADD(x2.data, x2.data, z2.data); /* t1 = A */ CURVE25519_FP51_ADD(z2.data, x3.data, z3.data); /* x2 = C */ Fp51Mul(&z3, &t1, &x2); Fp51Mul(&z2, &z2, &t2); Fp51Square(&t1, &t2); Fp51Square(&t2, &x2); CURVE25519_FP51_ADD(x3.data, z3.data, z2.data); CURVE25519_FP51_SUB(z2.data, z3.data, z2.data); Fp51Mul(&x2, &t2, &t1); CURVE25519_FP51_SUB(t2.data, t2.data, t1.data); Fp51Square(&z2, &z2); Fp51MulScalar(&z3, &t2); // z2 *= 121665 + 1 = 121666 Fp51Square(&x3, &x3); CURVE25519_FP51_ADD(t1.data, t1.data, z3.data); Fp51Mul(&z3, &x1, &z2); Fp51Mul(&z2, &t2, &t1); } CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* Return x2 * (z2 ^ (p - 2)) */ Fp51Invert(&t1, &z2); Fp51Mul(&t2, &x2, &t1); Fp51PolyToData(&t2, out); (void)memset_s(k, sizeof(k), 0, sizeof(k)); } #ifdef HITLS_CRYPTO_X25519_X8664 #define CURVE25519_63BITS_MASK 0x7fffffffffffffff #define CURVE25519_FP64_SET(dst, value) \ do { \ (dst)[0] = (value); \ (dst)[1] = 0; \ (dst)[2] = 0; \ (dst)[3] = 0; \ } while (0) #define CURVE25519_FP64_COPY(dst, src) \ do { \ (dst)[0] = (src)[0]; \ (dst)[1] = (src)[1]; \ (dst)[2] = (src)[2]; \ (dst)[3] = (src)[3]; \ } while (0) #define CURVE25519_BYTES8_LOAD(dst, src) \ do { \ dst = (uint64_t)(src)[0]; \ dst |= ((uint64_t)(src)[1]) << 8; \ dst |= ((uint64_t)(src)[2]) << 16; \ dst |= ((uint64_t)(src)[3]) << 24; \ dst |= ((uint64_t)(src)[4]) << 32; \ dst |= ((uint64_t)(src)[5]) << 40; \ dst |= ((uint64_t)(src)[6]) << 48; \ dst |= ((uint64_t)(src)[7]) << 56; \ } while (0) #define CURVE25519_FP64_CSWAP(s, a, b) \ do { \ uint64_t tt; \ const uint64_t tsMacro = 0 - (uint64_t)(s); \ for (uint32_t ii = 0; ii < 4; ii++) { \ tt = tsMacro & ((a)[ii] ^ (b)[ii]); \ (a)[ii] = (a)[ii] ^ tt; \ (b)[ii] = (b)[ii] ^ tt; \ } \ } while (0) static void Fp64DataToPoly(Fp64 h, const uint8_t *point) { uint8_t *tmp = (uint8_t *)(uintptr_t)point; CURVE25519_BYTES8_LOAD(h[0], tmp); tmp += 8; // the second 8 bytes CURVE25519_BYTES8_LOAD(h[1], tmp); tmp += 8; // the third 8 bytes CURVE25519_BYTES8_LOAD(h[2], tmp); tmp += 8; // the forth 8 bytes CURVE25519_BYTES8_LOAD(h[3], tmp); h[3] &= CURVE25519_63BITS_MASK; return; } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static inline void Fp64MultiSqr(Fp64 in1, Fp64 in2, Fp64 out, int32_t times) { int32_t i; Fp64 temp1, temp2; Fp64Sqr(temp1, in1); Fp64Sqr(temp2, temp1); for (i = 0; i < times; i++) { Fp64Sqr(temp1, temp2); Fp64Sqr(temp2, temp1); } Fp64Mul(out, in2, temp2); } static void Fe64Invert(Fp64 out, const Fp64 z) { Fp64 t0; Fp64 t1; Fp64 t2; Fp64 t3; Fp64 t4; Fp64Sqr(t0, z); /* t^2 */ Fp64Sqr(t1, t0); /* t^4 */ Fp64Sqr(t1, t1); /* t^8 */ Fp64Mul(t1, z, t1); /* t^9 */ Fp64Mul(t0, t0, t1); /* t^11 */ Fp64Sqr(t2, t0); /* t^22 */ Fp64Mul(t1, t1, t2); /* t^(2^5-1) = t^(9+22) */ /* t^(2^10-1) = t^(2^10-2^5) * t^(2^5-1) */ Fp64Sqr(t2, t1); Fp64Sqr(t4, t2); Fp64Sqr(t2, t4); Fp64Sqr(t4, t2); Fp64Sqr(t2, t4); Fp64Mul(t1, t2, t1); /* t^(2^20-1) = t^(2^20-2^10) * t^(2^10-1) */ Fp64MultiSqr(t1, t1, t2, 4); /* t^(2^40-1) = t^(2^40-2^20) * t^(2^20-1) */ Fp64MultiSqr(t2, t2, t4, 9); // (2 * 2) ^ 9 /* t^(2^50-1) = t^(2^50-2^10) * t^(2^10-1) */ Fp64MultiSqr(t4, t1, t2, 4); // (2 * 2) ^ 4 /* t^(2^100-1) = t^(2^100-2^50) * t^(2^50-1) */ Fp64MultiSqr(t2, t2, t1, 24); // (2 * 2) ^ 24 /* t^(2^200-1) = t^(2^200-2^100) * t^(2^100-1) */ Fp64MultiSqr(t1, t1, t4, 49); // (2 * 2) ^ 49 /* t^(2^250-1) = t^(2^250-2^50) * t^(2^50-1) */ Fp64MultiSqr(t4, t2, t3, 24); // (2 * 2) ^ 24 /* t^(2^5*(2^250-1)) = (t^(2^250-1))^5 */ Fp64Sqr(t1, t3); Fp64Sqr(t2, t1); Fp64Sqr(t1, t2); Fp64Sqr(t2, t1); Fp64Sqr(t1, t2); /* The output:t^(2^255-21) = t(2^5*(2^250-1)+11) = t^(2^5*(2^250-1)) * t^11 */ Fp64Mul(out, t0, t1); } void Fp64ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t e[32]; uint32_t swap = 0; int32_t t; Fp64 x1, x2, x3; Fp64 z2, z3; Fp64 t1, t2; CURVE25519_DECODE_LITTLE_ENDIAN(e, scalar); Fp64DataToPoly(x1, point); CURVE25519_FP64_SET(x2, 1); CURVE25519_FP64_SET(z2, 0); CURVE25519_FP64_COPY(x3, x1); CURVE25519_FP64_SET(z3, 1); for (t = 254; t >= 0; --t) { /* For t = bits-1(254) down to 0: */ /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ uint32_t kTemp = (e[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; swap ^= kTemp; CURVE25519_FP64_CSWAP(swap, x2, x3); CURVE25519_FP64_CSWAP(swap, z2, z3); swap = kTemp; Fp64Sub(t1, x3, z3); Fp64Sub(t2, x2, z2); Fp64Add(x2, x2, z2); Fp64Add(z2, x3, z3); Fp64Mul(z3, x2, t1); Fp64Mul(z2, z2, t2); Fp64Sqr(t1, t2); Fp64Sqr(t2, x2); Fp64Add(x3, z3, z2); Fp64Sub(z2, z3, z2); Fp64Mul(x2, t2, t1); Fp64Sub(t2, t2, t1); Fp64Sqr(z2, z2); Fp64MulScalar(z3, t2); Fp64Sqr(x3, x3); Fp64Add(t1, t1, z3); Fp64Mul(z3, x1, z2); Fp64Mul(z2, t2, t1); } Fe64Invert(z2, z2); Fp64Mul(x2, x2, z2); Fp64PolyToData(out, x2); (void)memset_s(e, sizeof(e), 0, sizeof(e)); } #endif void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { #if defined (__x86_64__) && defined (HITLS_CRYPTO_X25519_X8664) if (IsSupportBMI2() && IsSupportADX()) { Fp64ScalarMultiPoint(out, scalar, point); return; } #endif Fp51ScalarMultiPoint(out, scalar, point); return; } #endif /* HITLS_CRYPTO_X25519 */
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/asm_curve25519_ops.c
C
unknown
17,901
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "curve25519_local.h" #include "crypt_util_rand.h" #include "crypt_types.h" #include "eal_md_local.h" #ifdef HITLS_BSL_PARAMS #include "bsl_params.h" #include "crypt_params_key.h" #endif #ifdef HITLS_CRYPTO_X25519 CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtx(void) { CRYPT_CURVE25519_Ctx *ctx = NULL; ctx = (CRYPT_CURVE25519_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_CURVE25519_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_CURVE25519_Ctx), 0, sizeof(CRYPT_CURVE25519_Ctx)); ctx->keyType = CURVE25519_NOKEY; ctx->hashMethod = NULL; BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtxEx(void *libCtx) { CRYPT_CURVE25519_Ctx *ctx = CRYPT_X25519_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } #endif #ifdef HITLS_CRYPTO_ED25519 CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtx(void) { CRYPT_CURVE25519_Ctx *ctx = NULL; ctx = (CRYPT_CURVE25519_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_CURVE25519_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_CURVE25519_Ctx), 0, sizeof(CRYPT_CURVE25519_Ctx)); ctx->hashMethod = EAL_MdFindDefaultMethod(CRYPT_MD_SHA512); if (ctx->hashMethod == NULL) { BSL_SAL_Free(ctx); BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } ctx->keyType = CURVE25519_NOKEY; BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtxEx(void *libCtx) { CRYPT_CURVE25519_Ctx *ctx = CRYPT_ED25519_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } #endif CRYPT_CURVE25519_Ctx *CRYPT_CURVE25519_DupCtx(CRYPT_CURVE25519_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } CRYPT_CURVE25519_Ctx *newCtx = (CRYPT_CURVE25519_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_CURVE25519_Ctx)); if (newCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memcpy_s(newCtx, sizeof(CRYPT_CURVE25519_Ctx), ctx, sizeof(CRYPT_CURVE25519_Ctx)); BSL_SAL_ReferencesInit(&(newCtx->references)); return newCtx; } static int32_t CRYPT_CURVE25519_GetLen(CRYPT_CURVE25519_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } static int32_t CRYPT_CURVE25519_GetKeyLen(const CRYPT_CURVE25519_Ctx *pkey) { (void)pkey; return CRYPT_CURVE25519_KEYLEN; } int32_t CRYPT_CURVE25519_Ctrl(CRYPT_CURVE25519_Ctx *pkey, int32_t opt, void *val, uint32_t len) { if (pkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_BITS: return CRYPT_CURVE25519_GetLen(pkey, (GetLenFunc)CRYPT_CURVE25519_GetBits, val, len); #ifdef HITLS_CRYPTO_ED25519 case CRYPT_CTRL_GET_SIGNLEN: return CRYPT_CURVE25519_GetLen(pkey, (GetLenFunc)CRYPT_CURVE25519_GetSignLen, val, len); #endif case CRYPT_CTRL_GET_SECBITS: return CRYPT_CURVE25519_GetLen(pkey, (GetLenFunc)CRYPT_CURVE25519_GetSecBits, val, len); case CRYPT_CTRL_GET_PUBKEY_LEN: case CRYPT_CTRL_GET_PRVKEY_LEN: case CRYPT_CTRL_GET_SHARED_KEY_LEN: return GetUintCtrl(pkey, val, len, (GetUintCallBack)CRYPT_CURVE25519_GetKeyLen); case CRYPT_CTRL_UP_REFERENCES: if (val == NULL || len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return BSL_SAL_AtomicUpReferences(&(pkey->references), (int *)val); #ifdef HITLS_CRYPTO_X25519 case CRYPT_CTRL_GEN_X25519_PUBLICKEY: if ((pkey->keyType & CURVE25519_PUBKEY) != 0) { return CRYPT_SUCCESS; } if ((pkey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } CRYPT_X25519_PublicFromPrivate(pkey->prvKey, pkey->pubKey); pkey->keyType |= CURVE25519_PUBKEY; return CRYPT_SUCCESS; #endif default: break; } BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_UNSUPPORTED_CTRL_OPTION); return CRYPT_CURVE25519_UNSUPPORTED_CTRL_OPTION; } void CRYPT_CURVE25519_FreeCtx(CRYPT_CURVE25519_Ctx *pkey) { if (pkey == NULL) { return; } int ret = 0; BSL_SAL_AtomicDownReferences(&(pkey->references), &ret); if (ret > 0) { return; } BSL_SAL_ReferencesFree(&(pkey->references)); BSL_SAL_CleanseData((void *)(pkey), sizeof(CRYPT_CURVE25519_Ctx)); BSL_SAL_FREE(pkey); } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_CURVE25519_SetPubKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Pub pub = {0}; if (GetConstParamValue(para, CRYPT_PARAM_CURVE25519_PUBKEY, &pub.data, &pub.len) == NULL) { (void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len); } return CRYPT_CURVE25519_SetPubKey(pkey, &pub); } int32_t CRYPT_CURVE25519_SetPrvKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Prv prv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_CURVE25519_PRVKEY, &prv.data, &prv.len); return CRYPT_CURVE25519_SetPrvKey(pkey, &prv); } int32_t CRYPT_CURVE25519_GetPubKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Pub pub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_CURVE25519_PUBKEY, &pub.data, &(pub.len)); if (paramPub == NULL) { paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len)); } int32_t ret = CRYPT_CURVE25519_GetPubKey(pkey, &pub); if (ret != CRYPT_SUCCESS) { return ret; } paramPub->useLen = pub.len; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetPrvKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Prv prv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_CURVE25519_PRVKEY, &prv.data, &(prv.len)); int32_t ret = CRYPT_CURVE25519_GetPrvKey(pkey, &prv); if (ret != CRYPT_SUCCESS) { return ret; } paramPrv->useLen = prv.len; return CRYPT_SUCCESS; } #endif int32_t CRYPT_CURVE25519_SetPubKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Pub *pub) { if (pkey == NULL || pub == NULL || pub->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->len != CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(pkey->pubKey, CRYPT_CURVE25519_KEYLEN, pub->data, pub->len); pkey->keyType |= CURVE25519_PUBKEY; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_SetPrvKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Prv *prv) { if (pkey == NULL || prv == NULL || prv->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->len != CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(pkey->prvKey, CRYPT_CURVE25519_KEYLEN, prv->data, prv->len); pkey->keyType |= CURVE25519_PRVKEY; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetPubKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Pub *pub) { if (pkey == NULL || pub == NULL || pub->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->len < CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } if ((pkey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(pub->data, pub->len, pkey->pubKey, CRYPT_CURVE25519_KEYLEN); pub->len = CRYPT_CURVE25519_KEYLEN; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetPrvKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Prv *prv) { if (pkey == NULL || prv == NULL || prv->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->len < CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } if ((pkey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(prv->data, prv->len, pkey->prvKey, CRYPT_CURVE25519_KEYLEN); prv->len = CRYPT_CURVE25519_KEYLEN; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetBits(const CRYPT_CURVE25519_Ctx *pkey) { (void)pkey; return CRYPT_CURVE25519_KEYLEN * 8; // bits = 8 * bytes } #ifdef HITLS_CRYPTO_ED25519 static int32_t PrvKeyHash(const uint8_t *prvKey, uint32_t prvKeyLen, uint8_t *prvKeyHash, uint32_t prvHashLen, const EAL_MdMethod *hashMethod) { void *mdCtx = NULL; int32_t ret; uint32_t hashLen = prvHashLen; mdCtx = hashMethod->newCtx(NULL, hashMethod->id); if (mdCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = hashMethod->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, prvKey, prvKeyLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->final(mdCtx, prvKeyHash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: hashMethod->freeCtx(mdCtx); return ret; } static int32_t GetRHash(uint8_t r[CRYPT_CURVE25519_SIGNLEN], const uint8_t prefix[CRYPT_CURVE25519_KEYLEN], const uint8_t *msg, uint32_t msgLen, const EAL_MdMethod *hashMethod) { void *mdCtx = NULL; int32_t ret; uint32_t hashLen = CRYPT_CURVE25519_SIGNLEN; mdCtx = hashMethod->newCtx(NULL, hashMethod->id); if (mdCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = hashMethod->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, prefix, CRYPT_CURVE25519_KEYLEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, msg, msgLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->final(mdCtx, r, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: hashMethod->freeCtx(mdCtx); return ret; } static int32_t GetKHash(uint8_t k[CRYPT_CURVE25519_SIGNLEN], const uint8_t r[CRYPT_CURVE25519_KEYLEN], const uint8_t pubKey[CRYPT_CURVE25519_KEYLEN], const uint8_t *msg, uint32_t msgLen, const EAL_MdMethod *hashMethod) { void *mdCtx = NULL; uint32_t hashLen = CRYPT_CURVE25519_SIGNLEN; mdCtx = hashMethod->newCtx(NULL, hashMethod->id); if (mdCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = hashMethod->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, r, CRYPT_CURVE25519_KEYLEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, pubKey, CRYPT_CURVE25519_KEYLEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, msg, msgLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->final(mdCtx, k, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: hashMethod->freeCtx(mdCtx); return ret; } static int32_t SignInputCheck(const CRYPT_CURVE25519_Ctx *pkey, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, const uint32_t *signLen) { if (pkey == NULL || (msg == NULL && msgLen != 0) || sign == NULL || signLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((pkey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if (*signLen < CRYPT_CURVE25519_SIGNLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_SIGNLEN_ERROR); return CRYPT_CURVE25519_SIGNLEN_ERROR; } if (pkey->hashMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_HASH_METHOD); return CRYPT_CURVE25519_NO_HASH_METHOD; } return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_Sign(CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, uint8_t *sign, uint32_t *signLen) { (void)algId; uint8_t prvKeyHash[CRYPT_CURVE25519_SIGNLEN]; uint8_t r[CRYPT_CURVE25519_SIGNLEN]; uint8_t k[CRYPT_CURVE25519_SIGNLEN]; uint8_t outSign[CRYPT_CURVE25519_SIGNLEN]; GeE geTmp; int32_t ret = SignInputCheck(pkey, msg, msgLen, sign, signLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = PrvKeyHash(pkey->prvKey, CRYPT_CURVE25519_KEYLEN, prvKeyHash, CRYPT_CURVE25519_SIGNLEN, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } prvKeyHash[0] &= 0xf8; // on block 31, clear the highest bit prvKeyHash[31] &= 0x7f; // on block 31, set second highest bit to 1 prvKeyHash[31] |= 0x40; // if ctx has no public key, generate public key and store it in ctx if ((pkey->keyType & CURVE25519_PUBKEY) == 0) { ScalarMultiBase(&geTmp, prvKeyHash); PointEncoding(&geTmp, pkey->pubKey, CRYPT_CURVE25519_KEYLEN); pkey->keyType |= CURVE25519_PUBKEY; } ret = GetRHash(r, prvKeyHash + CRYPT_CURVE25519_KEYLEN, msg, msgLen, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ModuloL(r); ScalarMultiBase(&geTmp, r); PointEncoding(&geTmp, outSign, CRYPT_CURVE25519_SIGNLEN); ret = GetKHash(k, outSign, pkey->pubKey, msg, msgLen, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ModuloL(k); ScalarMulAdd(outSign + CRYPT_CURVE25519_KEYLEN, k, prvKeyHash, r); // The value of *signLen has been checked in SignInputCheck to ensure that // the value is greater than or equal to CRYPT_CURVE25519_SIGNLEN. // The sign memory is input from outside the function. The outSign memory is allocated within the function. // Memory overlap does not exist. There is no failure case for memcpy_s. (void)memcpy_s(sign, *signLen, outSign, CRYPT_CURVE25519_SIGNLEN); *signLen = CRYPT_CURVE25519_SIGNLEN; EXIT: BSL_SAL_CleanseData(prvKeyHash, sizeof(prvKeyHash)); BSL_SAL_CleanseData(r, sizeof(r)); BSL_SAL_CleanseData(k, sizeof(k)); return ret; } int32_t CRYPT_CURVE25519_GetSignLen(const CRYPT_CURVE25519_Ctx *pkey) { (void)pkey; return CRYPT_CURVE25519_SIGNLEN; } static int32_t VerifyInputCheck(const CRYPT_CURVE25519_Ctx *pkey, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, uint32_t signLen) { if (pkey == NULL || (msg == NULL && msgLen != 0) || sign == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((pkey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } if (signLen != CRYPT_CURVE25519_SIGNLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_SIGNLEN_ERROR); return CRYPT_CURVE25519_SIGNLEN_ERROR; } if (pkey->hashMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_HASH_METHOD); return CRYPT_CURVE25519_NO_HASH_METHOD; } return CRYPT_SUCCESS; } /* check 0 <= s < l, l = 2^252 + 27742317777372353535851937790883648493 */ static bool VerifyCheckSValid(const uint8_t s[CRYPT_CURVE25519_KEYLEN]) { const uint8_t l[CRYPT_CURVE25519_KEYLEN] = { 0xED, 0xD3, 0xF5, 0x5C, 0x1A, 0x63, 0x12, 0x58, 0xD6, 0x9C, 0xF7, 0xA2, 0xDE, 0xF9, 0xDE, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10 }; int32_t i; // start from highest block 31 for (i = 31; i >= 0; i--) { if (s[i] > l[i]) { return false; } else if (s[i] < l[i]) { return true; } } // s = l is invalid return false; } int32_t CRYPT_CURVE25519_Verify(const CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, uint32_t signLen) { if (algId != CRYPT_MD_SHA512) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } GeE geA, sG; uint8_t kHash[CRYPT_CURVE25519_SIGNLEN]; uint8_t localR[CRYPT_CURVE25519_KEYLEN]; const uint8_t *r = NULL; const uint8_t *s = NULL; int32_t ret = VerifyInputCheck(pkey, msg, msgLen, sign, signLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // r is first half of sign, length 32 r = sign; // s is second half of the sign, length 32 s = sign + 32; if (!VerifyCheckSValid(s)) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_VERIFY_FAIL); ret = CRYPT_CURVE25519_VERIFY_FAIL; return ret; } if (PointDecoding(&geA, pkey->pubKey) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_VERIFY_FAIL); ret = CRYPT_CURVE25519_INVALID_PUBKEY; return ret; } ret = GetKHash(kHash, r, pkey->pubKey, msg, msgLen, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CURVE25519_FP_NEGATE(geA.x, geA.x); CURVE25519_FP_NEGATE(geA.t, geA.t); ModuloL(kHash); KAMulPlusMulBase(&sG, kHash, &geA, s); PointEncoding(&sG, localR, CRYPT_CURVE25519_KEYLEN); if (memcmp(localR, r, CRYPT_CURVE25519_KEYLEN) != 0) { ret = CRYPT_CURVE25519_VERIFY_FAIL; BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t CRYPT_ED25519_PublicFromPrivate(const uint8_t prvKey[CRYPT_CURVE25519_KEYLEN], uint8_t pubKey[CRYPT_CURVE25519_KEYLEN], const EAL_MdMethod *hashMethod) { GeE tmp; uint8_t prvKeyHash[CRYPT_CURVE25519_SIGNLEN]; int32_t ret = PrvKeyHash(prvKey, CRYPT_CURVE25519_KEYLEN, prvKeyHash, CRYPT_CURVE25519_SIGNLEN, hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prvKeyHash[0] &= 0xf8; // on block 31, clear the highest bit prvKeyHash[31] &= 0x7f; // on block 31, set second highest bit to 1 prvKeyHash[31] |= 0x40; ScalarMultiBase(&tmp, prvKeyHash); PointEncoding(&tmp, pubKey, CRYPT_CURVE25519_KEYLEN); BSL_SAL_CleanseData(prvKeyHash, sizeof(prvKeyHash)); return CRYPT_SUCCESS; } int32_t CRYPT_ED25519_GenKey(CRYPT_CURVE25519_Ctx *pkey) { if (pkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // SHA512 digest size is 64, no other hash has 64 md size if (pkey->hashMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_HASH_METHOD); return CRYPT_CURVE25519_NO_HASH_METHOD; } int32_t ret; uint8_t prvKey[CRYPT_CURVE25519_KEYLEN]; ret = CRYPT_RandEx(pkey->libCtx, prvKey, sizeof(prvKey)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_ED25519_PublicFromPrivate(prvKey, pkey->pubKey, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // The pkey is not empty. The length of the prvKey is CRYPT_CURVE25519_KEYLEN, // which is the same as the length of local prvKey. // The pkey->prvKey memory is input outside the function. The local prvKey memory is allocated within the function. // Memory overlap does not exist. No failure case exists for memcpy_s. (void)memcpy_s(pkey->prvKey, CRYPT_CURVE25519_KEYLEN, prvKey, CRYPT_CURVE25519_KEYLEN); pkey->keyType = CURVE25519_PRVKEY | CURVE25519_PUBKEY; EXIT: BSL_SAL_CleanseData(prvKey, sizeof(prvKey)); return ret; } #endif /* HITLS_CRYPTO_ED25519 */ #ifdef HITLS_CRYPTO_X25519 /* Calculate the shared key based on the local private key and peer public key * Shared12 = prv1 * Pub2 = prv1 * (prv2 * G) = prv1 * prv2 * G */ int32_t CRYPT_CURVE25519_ComputeSharedKey(CRYPT_CURVE25519_Ctx *prvKey, CRYPT_CURVE25519_Ctx *pubKey, uint8_t *sharedKey, uint32_t *shareKeyLen) { if (prvKey == NULL || pubKey == NULL || sharedKey == NULL || shareKeyLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (*shareKeyLen < CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if ((pubKey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } uint32_t tmpLen = *shareKeyLen; ScalarMultiPoint(sharedKey, prvKey->prvKey, pubKey->pubKey); int32_t i; uint8_t checkValid = 0; for (i = 0; i < CRYPT_CURVE25519_KEYLEN; i++) { checkValid |= sharedKey[i]; } if (checkValid == 0) { *shareKeyLen = tmpLen; BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEY_COMPUTE_FAILED); return CRYPT_CURVE25519_KEY_COMPUTE_FAILED; } else { *shareKeyLen = CRYPT_CURVE25519_KEYLEN; return CRYPT_SUCCESS; } } /** * @brief x25519 Calculate the public key based on the private key. * * @param privateKey [IN] Private key * @param publicKey [OUT] Public key * */ void CRYPT_X25519_PublicFromPrivate(const uint8_t privateKey[CRYPT_CURVE25519_KEYLEN], uint8_t publicKey[CRYPT_CURVE25519_KEYLEN]) { uint8_t privateCopy[CRYPT_CURVE25519_KEYLEN]; GeE out; Fp25 zPlusY, zMinusY, zMinusYInvert; (void)memcpy_s(privateCopy, sizeof(privateCopy), privateKey, sizeof(privateCopy)); privateCopy[0] &= 0xf8; /* decodeScalar25519(k): k_list[0] &= 0xf8 */ privateCopy[31] &= 0x7f; /* decodeScalar25519(k): k_list[31] &= 0x7f */ privateCopy[31] |= 0x40; /* decodeScalar25519(k): k_list[31] |= 0x40 */ ScalarMultiBase(&out, privateCopy); CURVE25519_FP_ADD(zPlusY, out.z, out.y); CURVE25519_FP_SUB(zMinusY, out.z, out.y); FpInvert(zMinusYInvert, zMinusY); FpMul(zPlusY, zPlusY, zMinusYInvert); PolynomialToData(publicKey, zPlusY); /* cleanup tmp private key */ BSL_SAL_CleanseData(privateCopy, sizeof(privateCopy)); } int32_t CRYPT_X25519_GenKey(CRYPT_CURVE25519_Ctx *pkey) { if (pkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_RandEx(pkey->libCtx, pkey->prvKey, sizeof(pkey->prvKey)); if (ret != CRYPT_SUCCESS) { pkey->keyType = 0; BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_X25519_PublicFromPrivate(pkey->prvKey, pkey->pubKey); pkey->keyType = CURVE25519_PRVKEY | CURVE25519_PUBKEY; return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_X25519 */ int32_t CRYPT_CURVE25519_Cmp(const CRYPT_CURVE25519_Ctx *a, const CRYPT_CURVE25519_Ctx *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF((a->keyType & CURVE25519_PUBKEY) == 0 || (b->keyType & CURVE25519_PUBKEY) == 0, CRYPT_CURVE25519_NO_PUBKEY); RETURN_RET_IF(memcmp(a->pubKey, b->pubKey, CRYPT_CURVE25519_KEYLEN) != 0, CRYPT_CURVE25519_PUBKEY_NOT_EQUAL); return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetSecBits(const CRYPT_CURVE25519_Ctx *ctx) { (void) ctx; return 128; } #ifdef HITLS_CRYPTO_PROVIDER int32_t CRYPT_CURVE25519_Import(CRYPT_CURVE25519_Ctx *ctx, const BSL_Param *params) { if (ctx == NULL || params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; const BSL_Param *prv = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_CURVE25519_PRVKEY); const BSL_Param *pub = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_CURVE25519_PUBKEY); if (prv != NULL) { ret = CRYPT_CURVE25519_SetPrvKeyEx(ctx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (pub != NULL) { ret = CRYPT_CURVE25519_SetPubKeyEx(ctx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return ret; } int32_t CRYPT_CURVE25519_Export(const CRYPT_CURVE25519_Ctx *ctx, BSL_Param *params) { if (ctx == NULL || params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint32_t index = 0; uint32_t keyBytes = CRYPT_CURVE25519_KEYLEN; CRYPT_EAL_ProcessFuncCb processCb = NULL; void *args = NULL; BSL_Param ed25519Params[3] = {0}; // 3: pub key + priv key + end marker int32_t ret = CRYPT_GetPkeyProcessParams(params, &processCb, &args); if (ret != CRYPT_SUCCESS) { return ret; } uint8_t *buffer = BSL_SAL_Calloc(1, keyBytes * 2); // For public + private key if (buffer == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } if ((ctx->keyType & CURVE25519_PUBKEY) != 0) { (void)BSL_PARAM_InitValue(&ed25519Params[index], CRYPT_PARAM_CURVE25519_PUBKEY, BSL_PARAM_TYPE_OCTETS, buffer, keyBytes); ret = CRYPT_CURVE25519_GetPubKeyEx(ctx, ed25519Params); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(buffer); return ret; } ed25519Params[index].valueLen = ed25519Params[index].useLen; index++; } if ((ctx->keyType & CURVE25519_PRVKEY) != 0) { (void)BSL_PARAM_InitValue(&ed25519Params[index], CRYPT_PARAM_CURVE25519_PRVKEY, BSL_PARAM_TYPE_OCTETS, buffer + keyBytes, keyBytes); ret = CRYPT_CURVE25519_GetPrvKeyEx(ctx, ed25519Params); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(buffer); return ret; } ed25519Params[index].valueLen = ed25519Params[index].useLen; index++; } ret = processCb(ed25519Params, args); BSL_SAL_Free(buffer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_PROVIDER #if defined(HITLS_CRYPTO_X25519_CHECK) || defined(HITLS_CRYPTO_ED25519_CHECK) static int32_t Curve25519PrvKeyCheck(const CRYPT_CURVE25519_Ctx *prvKey) { if (prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } uint8_t tmp[CRYPT_CURVE25519_KEYLEN] = {0}; // prv key is not all 0. if (memcmp(tmp, prvKey->prvKey, CRYPT_CURVE25519_KEYLEN) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_INVALID_PRVKEY); return CRYPT_CURVE25519_INVALID_PRVKEY; } return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_X25519_CHECK || HITLS_CRYPTO_ED25519_CHECK #ifdef HITLS_CRYPTO_ED25519_CHECK static int32_t ED25519KeyPairCheck(const CRYPT_CURVE25519_Ctx *pubKey, const CRYPT_CURVE25519_Ctx *prvKey) { if (pubKey == NULL || prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if ((pubKey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } uint8_t res[CRYPT_CURVE25519_KEYLEN]; int32_t ret = CRYPT_ED25519_PublicFromPrivate(prvKey->prvKey, res, prvKey->hashMethod); if (ret != CRYPT_SUCCESS) { return ret; } if (memcmp(res, pubKey->pubKey, CRYPT_CURVE25519_KEYLEN) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL); return CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL; } return CRYPT_SUCCESS; } int32_t CRYPT_ED25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return ED25519KeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return Curve25519PrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_ED25519_CHECK #ifdef HITLS_CRYPTO_X25519_CHECK static int32_t X25519KeyPairCheck(const CRYPT_CURVE25519_Ctx *pubKey, const CRYPT_CURVE25519_Ctx *prvKey) { if (pubKey == NULL || prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if ((pubKey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } uint8_t res[CRYPT_CURVE25519_KEYLEN]; CRYPT_X25519_PublicFromPrivate(prvKey->prvKey, res); if (memcmp(res, pubKey->pubKey, CRYPT_CURVE25519_KEYLEN) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL); return CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL; } return CRYPT_SUCCESS; } int32_t CRYPT_X25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return X25519KeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return Curve25519PrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_X25519_CHECK #endif /* HITLS_CRYPTO_CURVE25519 */
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/curve25519.c
C
unknown
33,267
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CURVE25519_LOCAL_H #define CURVE25519_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include "crypt_curve25519.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif #define CURVE25519_NOKEY 0 #define CURVE25519_PRVKEY 0x1 #define CURVE25519_PUBKEY 0x10 #define UINT8_32_21BITS_BLOCKNUM 12 #define UINT8_64_21BITS_BLOCKNUM 24 struct CryptCurve25519Ctx { uint8_t keyType; /* specify the key type */ const EAL_MdMethod *hashMethod; uint8_t pubKey[CRYPT_CURVE25519_KEYLEN]; uint8_t prvKey[CRYPT_CURVE25519_KEYLEN]; BSL_SAL_RefCount references; void *libCtx; }; typedef int32_t Fp25[10]; typedef struct Fp51 { uint64_t data[5]; } Fp51; typedef struct H19 { int64_t data[19]; } H19; // group element in Projective Coordinate, x = X / Z, y = Y / Z typedef struct GeP { Fp25 x; Fp25 y; Fp25 z; } GeP; // group element in Extended Coordinate, x = X / Z, y = Y / Z, T = XY / Z which leads to XY = ZT typedef struct GeE { Fp25 x; Fp25 y; Fp25 t; Fp25 z; } GeE; // group element in Completed Coordinate, x = X / Z, y = Y / T typedef struct GeC { Fp25 x; Fp25 y; Fp25 t; Fp25 z; } GeC; typedef struct GePre { Fp25 yplusx; Fp25 yminusx; Fp25 xy2d; } GePre; typedef struct GeEPre { Fp25 yplusx; Fp25 yminusx; Fp25 t2z; Fp25 z; } GeEPre; /* Get High x bits for 64bits block */ #define MASK_HIGH64(x) (0xFFFFFFFFFFFFFFFFLL << (64 - (x))) /* Get low x bits for 32bits block */ #define MASK_LOW32(x) (0xFFFFFFFF >> (32 - (x))) /* Get high x bits for 32bits block */ #define MASK_HIGH32(x) (0xFFFFFFFF << (32 - (x))) /* low 21 bits for 64bits block */ #define MASK_64_LOW21 0x1fffffLL #define CURVE25519_MASK_HIGH_38 0xfffffffffc000000LL #define CURVE25519_MASK_HIGH_39 0xfffffffffe000000LL /* process carry from h0_ to h1_, h0_ boundary restrictions is bits */ #define PROCESS_CARRY(h0_, h1_, signMask_, over_, bits) \ do { \ (over_) = (h0_) + (1 << (bits)); \ (signMask_) = MASK_HIGH64((bits) + 1) & (-((over_) >> 63)); \ (h1_) += ((over_) >> ((bits) + 1)) | (signMask_); \ (h0_) -= MASK_HIGH64(64 - ((bits) + 1)) & (over_); \ } while (0) /* process carry from h0_ to h1_ ignoring sign, h0_ boundary restrictions is bits */ #define PROCESS_CARRY_UNSIGN(h0_, h1_, signMask_, over_, bits) \ do { \ (signMask_) = MASK_HIGH64((bits)) & (-((h0_) >> 63)); \ (over_) = ((h0_) >> (bits)) | (signMask_); \ (h1_) += (over_); \ (h0_) -= (over_) * (1 << (bits)); \ } while (0) /* l = 2^252 + 27742317777372353535851937790883648493, let l0 = 27742317777372353535851937790883648493 */ /* -l0 = 666643 * 2^0 + 470296 * 2^21 + 654183 * 2^(2*21) - 997805 * 2^(3*21) + 136657 * 2^(4*21) - 683901 * 2^(5*21) */ #define CURVE25519_MULTI_BY_L0(src, pos) \ do { \ (src)[0 + (pos)] += (src)[12 + (pos)] * 666643; \ (src)[1 + (pos)] += (src)[12 + (pos)] * 470296; \ (src)[2 + (pos)] += (src)[12 + (pos)] * 654183; \ (src)[3 + (pos)] -= (src)[12 + (pos)] * 997805; \ (src)[4 + (pos)] += (src)[12 + (pos)] * 136657; \ (src)[5 + (pos)] -= (src)[12 + (pos)] * 683901; \ (src)[12 + (pos)] = 0; \ } while (0) /* Compute multiplications by 19 */ #define CURVE25519_MULTI_BY_19(dst, src, t1_, t2_, t16_) \ do { \ (t1_) = (uint64_t)(src); \ (t2_) = (t1_) << 1; \ (t16_) = (t1_) << 4; \ (dst) += (int64_t)((t1_) + (t2_) + (t16_)); \ } while (0) /* Set this parameter to value, */ #define CURVE25519_FP_SET(dst, value) \ do { \ (dst)[0] = (value); \ (dst)[1] = 0; \ (dst)[2] = 0; \ (dst)[3] = 0; \ (dst)[4] = 0; \ (dst)[5] = 0; \ (dst)[6] = 0; \ (dst)[7] = 0; \ (dst)[8] = 0; \ (dst)[9] = 0; \ } while (0) #define CURVE25519_FP51_SET(dst, value) \ do { \ (dst)[0] = (value); \ (dst)[1] = 0; \ (dst)[2] = 0; \ (dst)[3] = 0; \ (dst)[4] = 0; \ } while (0) /* Copy */ #define CURVE25519_FP_COPY(dst, src) \ do { \ (dst)[0] = (src)[0]; \ (dst)[1] = (src)[1]; \ (dst)[2] = (src)[2]; \ (dst)[3] = (src)[3]; \ (dst)[4] = (src)[4]; \ (dst)[5] = (src)[5]; \ (dst)[6] = (src)[6]; \ (dst)[7] = (src)[7]; \ (dst)[8] = (src)[8]; \ (dst)[9] = (src)[9]; \ } while (0) #define CURVE25519_FP51_COPY(dst, src) \ do { \ (dst)[0] = (src)[0]; \ (dst)[1] = (src)[1]; \ (dst)[2] = (src)[2]; \ (dst)[3] = (src)[3]; \ (dst)[4] = (src)[4]; \ } while (0) /* Negate */ #define CURVE25519_FP_NEGATE(dst, src) \ do { \ (dst)[0] = -(src)[0]; \ (dst)[1] = -(src)[1]; \ (dst)[2] = -(src)[2]; \ (dst)[3] = -(src)[3]; \ (dst)[4] = -(src)[4]; \ (dst)[5] = -(src)[5]; \ (dst)[6] = -(src)[6]; \ (dst)[7] = -(src)[7]; \ (dst)[8] = -(src)[8]; \ (dst)[9] = -(src)[9]; \ } while (0) /* Basic operation */ #define CURVE25519_FP_OP(dst, src1, src2, op) \ do { \ (dst)[0] = (src1)[0] op (src2)[0]; \ (dst)[1] = (src1)[1] op (src2)[1]; \ (dst)[2] = (src1)[2] op (src2)[2]; \ (dst)[3] = (src1)[3] op (src2)[3]; \ (dst)[4] = (src1)[4] op (src2)[4]; \ (dst)[5] = (src1)[5] op (src2)[5]; \ (dst)[6] = (src1)[6] op (src2)[6]; \ (dst)[7] = (src1)[7] op (src2)[7]; \ (dst)[8] = (src1)[8] op (src2)[8]; \ (dst)[9] = (src1)[9] op (src2)[9]; \ } while (0) /* Basic operation */ #define CURVE25519_FP51_ADD(dst, src1, src2) \ do { \ (dst)[0] = (src1)[0] + (src2)[0]; \ (dst)[1] = (src1)[1] + (src2)[1]; \ (dst)[2] = (src1)[2] + (src2)[2]; \ (dst)[3] = (src1)[3] + (src2)[3]; \ (dst)[4] = (src1)[4] + (src2)[4]; \ } while (0) #define CURVE25519_FP51_SUB(dst, src1, src2) \ do { \ (dst)[0] = ((src1)[0] + 0xfffffffffffda) - (src2)[0]; \ (dst)[1] = ((src1)[1] + 0xffffffffffffe) - (src2)[1]; \ (dst)[2] = ((src1)[2] + 0xffffffffffffe) - (src2)[2]; \ (dst)[3] = ((src1)[3] + 0xffffffffffffe) - (src2)[3]; \ (dst)[4] = ((src1)[4] + 0xffffffffffffe) - (src2)[4]; \ } while (0) #define CURVE25519_GE_COPY(dst, src) \ do { \ CURVE25519_FP_COPY((dst).x, (src).x); \ CURVE25519_FP_COPY((dst).y, (src).y); \ CURVE25519_FP_COPY((dst).z, (src).z); \ CURVE25519_FP_COPY((dst).t, (src).t); \ } while (0) /* Add */ #define CURVE25519_FP_ADD(dst, src1, src2) CURVE25519_FP_OP(dst, src1, src2, +) /* Subtract */ #define CURVE25519_FP_SUB(dst, src1, src2) CURVE25519_FP_OP(dst, src1, src2, -) /* dst = dst * bit, bit = 0 or 1 */ #define CURVE25519_FP_MUL_BIT(dst, bit) \ do { \ int ii; \ for (ii = 0; ii < 10; ii++) { \ (dst)[ii] = (dst)[ii] * (bit); \ } \ } while (0) /* dst[i] = src[i] * scalar */ #define CURVE25519_FP_MUL_SCALAR(dst, src, scalar) \ do { \ uint32_t ii; \ for (ii = 0; ii < 10; ii++) { \ (dst)[ii] = (uint64_t)((src)[ii] * (scalar)); \ } \ } while (0) #define CURVE25519_BYTES3_LOAD_PADDING(dst, bits, src) \ do { \ uint64_t valMacro = ((uint64_t)*((src) + 0)) << 0; \ valMacro |= ((uint64_t)*((src) + 1)) << 8; \ valMacro |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) = (uint64_t)(valMacro<< (bits)); \ } while (0) #define CURVE25519_BYTES3_LOAD(dst, src) \ do { \ *(dst) = ((uint64_t)*((src) + 0)) << 0; \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ } while (0) #define CURVE25519_BYTES4_LOAD(dst, src) \ do { \ *(dst) = ((uint64_t)*((src) + 0)) << 0; \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) |= ((uint64_t)*((src) + 3)) << 24; \ } while (0) #define CURVE25519_BYTES6_LOAD(dst, src) \ do { \ *(dst) = (uint64_t)*(src); \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) |= ((uint64_t)*((src) + 3)) << 24; \ *(dst) |= ((uint64_t)*((src) + 4)) << 32; \ *(dst) |= ((uint64_t)*((src) + 5)) << 40; \ } while (0) #define CURVE25519_BYTES7_LOAD(dst, src) \ do { \ *(dst) = (uint64_t)*(src); \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) |= ((uint64_t)*((src) + 3)) << 24; \ *(dst) |= ((uint64_t)*((src) + 4)) << 32; \ *(dst) |= ((uint64_t)*((src) + 5)) << 40; \ *(dst) |= ((uint64_t)*((src) + 6)) << 48; \ } while (0) #define CURVE25519_BYTES3_PADDING_UNLOAD(dst, bits1, bits2, src) \ do { \ const uint32_t posMacro = 8 - (bits1); \ uint32_t valMacro = (uint32_t)(*(src)); \ uint32_t signMaskMacro= -(valMacro >> 31); \ uint32_t expand =( (uint32_t)(*((src) + 1))) << (bits2); \ *((dst) + 0) = (uint8_t)(valMacro >> (0 + posMacro) | (signMaskMacro>> (0 + posMacro))); \ *((dst) + 1) = (uint8_t)(valMacro >> (8 + posMacro) | (signMaskMacro>> (8 + posMacro))); \ *((dst) + 2) = (uint8_t)(expand | ((valMacro >> (16 + posMacro)) | (signMaskMacro>> (16 + posMacro)))); \ } while (0) #define CURVE25519_BYTES3_UNLOAD(dst, bits, src) \ do { \ const uint32_t posMacro = 8 - (bits); \ uint32_t valMacro = (uint32_t)(*(src)); \ uint32_t signMaskMacro= -(valMacro >> 31); \ *((dst) + 0) = (uint8_t)((valMacro >> (0 + posMacro)) | (signMaskMacro>> (0 + posMacro))); \ *((dst) + 1) = (uint8_t)((valMacro >> (8 + posMacro)) | (signMaskMacro>> (8 + posMacro))); \ *((dst) + 2) = (uint8_t)((valMacro >> (16 + posMacro)) | (signMaskMacro>> (16 + posMacro))); \ } while (0) #define CURVE25519_BYTES4_PADDING_UNLOAD(dst, bits, src) \ do { \ uint32_t valMacro = (uint32_t)(*(src)); \ uint32_t signMaskMacro= -(valMacro >> 31); \ uint32_t expand = ((uint32_t)(*((src) + 1))) << (bits); \ *((dst) + 0) = (uint8_t)((valMacro >> 0) | (signMaskMacro>> 0)); \ *((dst) + 1) = (uint8_t)((valMacro >> 8) | (signMaskMacro>> 8)); \ *((dst) + 2) = (uint8_t)((valMacro >> 16) | (signMaskMacro>> 16)); \ *((dst) + 3) = (uint8_t)(expand | ((valMacro >> 24) | (signMaskMacro>> 24))); \ } while (0) /** * Reference RFC 7748 section 5: For X25519, in order to decode 32 random bytes as an integer scalar, * set the three least significant bits of the first byte and the most significant bit of the last to zero, * set the second most significant bit of the last byte to 1 and, finally, decode as little-endian. */ #define CURVE25519_DECODE_LITTLE_ENDIAN(dst, src) \ do { \ uint32_t ii; \ for (ii = 0; ii < 32; ii++) { \ (dst)[ii] = (src)[ii]; \ } \ (dst)[0] &= 248; \ (dst)[31] &= 127; \ (dst)[31] |= 64; \ } while (0) #define CURVE25519_FP_CSWAP(s, a, b) \ do { \ uint32_t tt; \ const uint32_t tsMacro = 0 - (s); \ for (uint32_t ii = 0; ii < 10; ii++) { \ tt = tsMacro & (((uint32_t)(a)[ii]) ^ ((uint32_t)(b)[ii])); \ (a)[ii] = (int32_t)((uint32_t)(a)[ii] ^ tt); \ (b)[ii] = (int32_t)((uint32_t)(b)[ii] ^ tt); \ } \ } while (0) #define CURVE25519_FP51_CSWAP(s, a, b) \ do { \ uint64_t tt; \ const uint64_t tsMacro = 0 - (uint64_t)(s); \ for (uint32_t ii = 0; ii < 5; ii++) { \ tt = tsMacro & ((a)[ii] ^ (b)[ii]); \ (a)[ii] = (a)[ii] ^ tt; \ (b)[ii] = (b)[ii] ^ tt; \ } \ } while (0) void TableLookup(GePre *preCompute, int32_t pos, int8_t e); void ConditionalMove(GePre *preCompute, const GePre *tableElement, uint32_t indicator); void ScalarMultiBase(GeE *out, const uint8_t in[CRYPT_CURVE25519_KEYLEN]); #ifdef HITLS_CRYPTO_ED25519 void PointEncoding(const GeE *point, uint8_t *output, uint32_t outputLen); int32_t PointDecoding(GeE *point, const uint8_t in[CRYPT_CURVE25519_KEYLEN]); void ScalarMulAdd(uint8_t s[CRYPT_CURVE25519_KEYLEN], const uint8_t a[CRYPT_CURVE25519_KEYLEN], const uint8_t b[CRYPT_CURVE25519_KEYLEN], const uint8_t c[CRYPT_CURVE25519_KEYLEN]); void ModuloL(uint8_t s[CRYPT_CURVE25519_SIGNLEN]); void KAMulPlusMulBase(GeE *out, const uint8_t hash[CRYPT_CURVE25519_KEYLEN], const GeE *p, const uint8_t s[CRYPT_CURVE25519_KEYLEN]); #endif #ifdef HITLS_CRYPTO_X25519 void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]); #endif void FpInvert(Fp25 out, const Fp25 a); void FpMul(Fp25 out, const Fp25 f, const Fp25 g); void FpSquareDoubleCore(Fp25 out, const Fp25 in, bool doDouble); void PolynomialToData(uint8_t out[32], const Fp25 polynomial); void DataToPolynomial(Fp25 out, const uint8_t data[32]); #ifdef HITLS_CRYPTO_X25519 void CRYPT_X25519_PublicFromPrivate(const uint8_t privateKey[CRYPT_CURVE25519_KEYLEN], uint8_t publicKey[CRYPT_CURVE25519_KEYLEN]); #endif #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CURVE25519 #endif // CURVE25519_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/curve25519_local.h
C
unknown
18,563
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ /* Some of these codes are adapted from https://ed25519.cr.yp.to/software.html */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include <stdbool.h> #include "securec.h" #include "curve25519_local.h" #include "bsl_sal.h" #ifdef HITLS_CRYPTO_ED25519 #define CRYPT_CURVE25519_OPTLEN 32 #endif #define CONDITION_COPY(dst, src, indicate) \ (int32_t)((uint32_t)(dst) ^ (((uint32_t)(dst) ^ (uint32_t)(src)) & (indicate))) // process Fp multiplication carry #define FP_PROCESS_CARRY(h) \ do { \ int64_t carry0, carry1, carry2, carry3, carry4, carry5, carry6, carry7, carry8, carry9; \ carry0 = h##0 + (1 << 25); h##1 += carry0 >> 26; h##0 -= carry0 & CURVE25519_MASK_HIGH_38; \ carry4 = h##4 + (1 << 25); h##5 += carry4 >> 26; h##4 -= carry4 & CURVE25519_MASK_HIGH_38; \ carry1 = h##1 + (1 << 24); h##2 += carry1 >> 25; h##1 -= carry1 & CURVE25519_MASK_HIGH_39; \ carry5 = h##5 + (1 << 24); h##6 += carry5 >> 25; h##5 -= carry5 & CURVE25519_MASK_HIGH_39; \ carry2 = h##2 + (1 << 25); h##3 += carry2 >> 26; h##2 -= carry2 & CURVE25519_MASK_HIGH_38; \ carry6 = h##6 + (1 << 25); h##7 += carry6 >> 26; h##6 -= carry6 & CURVE25519_MASK_HIGH_38; \ carry3 = h##3 + (1 << 24); h##4 += carry3 >> 25; h##3 -= carry3 & CURVE25519_MASK_HIGH_39; \ carry7 = h##7 + (1 << 24); h##8 += carry7 >> 25; h##7 -= carry7 & CURVE25519_MASK_HIGH_39; \ carry4 = h##4 + (1 << 25); h##5 += carry4 >> 26; h##4 -= carry4 & CURVE25519_MASK_HIGH_38; \ carry8 = h##8 + (1 << 25); h##9 += carry8 >> 26; h##8 -= carry8 & CURVE25519_MASK_HIGH_38; \ carry9 = h##9 + (1 << 24); h##0 += (carry9 >> 25) * 19; h##9 -= carry9 & CURVE25519_MASK_HIGH_39; \ carry0 = h##0 + (1 << 25); h##1 += carry0 >> 26; h##0 -= carry0 & CURVE25519_MASK_HIGH_38; \ } while (0) // h0...h9 to Fp25 #define INT64_2_FP25(h, out) \ do { \ (out)[0] = (int32_t)h##0; \ (out)[1] = (int32_t)h##1; \ (out)[2] = (int32_t)h##2; \ (out)[3] = (int32_t)h##3; \ (out)[4] = (int32_t)h##4; \ (out)[5] = (int32_t)h##5; \ (out)[6] = (int32_t)h##6; \ (out)[7] = (int32_t)h##7; \ (out)[8] = (int32_t)h##8; \ (out)[9] = (int32_t)h##9; \ } while (0) #define FP25_2_INT32(in, out) \ do { \ out##0 = (in)[0]; \ out##1 = (in)[1]; \ out##2 = (in)[2]; \ out##3 = (in)[3]; \ out##4 = (in)[4]; \ out##5 = (in)[5]; \ out##6 = (in)[6]; \ out##7 = (in)[7]; \ out##8 = (in)[8]; \ out##9 = (in)[9]; \ } while (0) /* out = f * g */ void FpMul(Fp25 out, const Fp25 f, const Fp25 g) { int32_t f0, f1, f2, f3, f4, f5, f6, f7, f8, f9; int32_t g0, g1, g2, g3, g4, g5, g6, g7, g8, g9; int64_t h0, h1, h2, h3, h4, h5, h6, h7, h8, h9; FP25_2_INT32(f, f); FP25_2_INT32(g, g); int32_t f1_2 = f1 * 2; int32_t f3_2 = f3 * 2; int32_t f5_2 = f5 * 2; int32_t f7_2 = f7 * 2; int32_t f9_2 = f9 * 2; int32_t g1_19 = g1 * 19; int32_t g2_19 = g2 * 19; int32_t g3_19 = g3 * 19; int32_t g4_19 = g4 * 19; int32_t g5_19 = g5 * 19; int32_t g6_19 = g6 * 19; int32_t g7_19 = g7 * 19; int32_t g8_19 = g8 * 19; int32_t g9_19 = g9 * 19; /* h0 = f0g0 + 38f1g9 + 19f2g8 + 38f3g7 + 19f4g6 + 38f5g5 + 19f6g4 + 38f7g3 + 19f8g2 + 38f9g1 h1 = f0g1 + f1g0 + 19f2g9 + 19f3g8 + 19f4g7 + 19f5g6 + 19f6g5 + 19f7g4 + 19f8g3 + 19f9g2 h2 = f0g2 + 2f1g1 + f2g0 + 38f3g9 + 19f4g8 + 38f5g7 + 19f6g6 + 38f7g5 + 19f8g4 + 38f9g2 h3 = f0g3 + f1g2 + f2g1 + f3g0 + 19f4g9 + 19f5g8 + 19f6g7 + 19f7g6 + 19f8g5 + 19f9g4 h4 = f0g4 + 2f1g3 + f2g2 + 2f3g1 + f4g0 + 38f5g9 + 19f6g8 + 38f7g7 + 19f8g6 + 38f9g5 h5 = f0g5 + f1g4 + f2g3 + f3g2 + f4g1 + f5g0 + 19f6g9 + 19f7g8 + 19f8g7 + 19f9g6 h6 = f0g6 + 2f1g5 + f2g4 + 2f3g3 + f4g2 + 2f5g1 + f6g0 + 38f7g9 + 19f8g8 + 38f9g7 h7 = f0g7 + f1g6 + f2g5 + f3g4 + f4g3 + f5g2 + f6g1 + f7g0 + 19f8g9 + 19f9g8 h8 = f0g8 + 2f1g7 + f2g6 + 2f3g5 + f4g4 + 2f5g3 + f6g2 + 2f7g1 + f8g0 + 38f9g9 h9 = f0g9 + f1g8 + f2g7 + f3g6 + f4g5 + f5g4 + f6g3 + f7g2 + f8g1 + f9g0 The calculation is performed by column. */ h0 = (int64_t)f0 * g0; h1 = (int64_t)f0 * g1; h2 = (int64_t)f0 * g2; h3 = (int64_t)f0 * g3; h4 = (int64_t)f0 * g4; h5 = (int64_t)f0 * g5; h6 = (int64_t)f0 * g6; h7 = (int64_t)f0 * g7; h8 = (int64_t)f0 * g8; h9 = (int64_t)f0 * g9; h0 += (int64_t)f1_2 * g9_19; h1 += (int64_t)f1 * g0; h2 += (int64_t)f1_2 * g1; h3 += (int64_t)f1 * g2; h4 += (int64_t)f1_2 * g3; h5 += (int64_t)f1 * g4; h6 += (int64_t)f1_2 * g5; h7 += (int64_t)f1 * g6; h8 += (int64_t)f1_2 * g7; h9 += (int64_t)f1 * g8; h0 += (int64_t)f2 * g8_19; h1 += (int64_t)f2 * g9_19; h2 += (int64_t)f2 * g0; h3 += (int64_t)f2 * g1; h4 += (int64_t)f2 * g2; h5 += (int64_t)f2 * g3; h6 += (int64_t)f2 * g4; h7 += (int64_t)f2 * g5; h8 += (int64_t)f2 * g6; h9 += (int64_t)f2 * g7; h0 += (int64_t)f3_2 * g7_19; h1 += (int64_t)f3 * g8_19; h2 += (int64_t)f3_2 * g9_19; h3 += (int64_t)f3 * g0; h4 += (int64_t)f3_2 * g1; h5 += (int64_t)f3 * g2; h6 += (int64_t)f3_2 * g3; h7 += (int64_t)f3 * g4; h8 += (int64_t)f3_2 * g5; h9 += (int64_t)f3 * g6; h0 += (int64_t)f4 * g6_19; h1 += (int64_t)f4 * g7_19; h2 += (int64_t)f4 * g8_19; h3 += (int64_t)f4 * g9_19; h4 += (int64_t)f4 * g0; h5 += (int64_t)f4 * g1; h6 += (int64_t)f4 * g2; h7 += (int64_t)f4 * g3; h8 += (int64_t)f4 * g4; h9 += (int64_t)f4 * g5; h0 += (int64_t)f5_2 * g5_19; h1 += (int64_t)f5 * g6_19; h2 += (int64_t)f5_2 * g7_19; h3 += (int64_t)f5 * g8_19; h4 += (int64_t)f5_2 * g9_19; h5 += (int64_t)f5 * g0; h6 += (int64_t)f5_2 * g1; h7 += (int64_t)f5 * g2; h8 += (int64_t)f5_2 * g3; h9 += (int64_t)f5 * g4; h0 += (int64_t)f6 * g4_19; h1 += (int64_t)f6 * g5_19; h2 += (int64_t)f6 * g6_19; h3 += (int64_t)f6 * g7_19; h4 += (int64_t)f6 * g8_19; h5 += (int64_t)f6 * g9_19; h6 += (int64_t)f6 * g0; h7 += (int64_t)f6 * g1; h8 += (int64_t)f6 * g2; h9 += (int64_t)f6 * g3; h0 += (int64_t)f7_2 * g3_19; h1 += (int64_t)f7 * g4_19; h2 += (int64_t)f7_2 * g5_19; h3 += (int64_t)f7 * g6_19; h4 += (int64_t)f7_2 * g7_19; h5 += (int64_t)f7 * g8_19; h6 += (int64_t)f7_2 * g9_19; h7 += (int64_t)f7 * g0; h8 += (int64_t)f7_2 * g1; h9 += (int64_t)f7 * g2; h0 += (int64_t)f8 * g2_19; h1 += (int64_t)f8 * g3_19; h2 += (int64_t)f8 * g4_19; h3 += (int64_t)f8 * g5_19; h4 += (int64_t)f8 * g6_19; h5 += (int64_t)f8 * g7_19; h6 += (int64_t)f8 * g8_19; h7 += (int64_t)f8 * g9_19; h8 += (int64_t)f8 * g0; h9 += (int64_t)f8 * g1; h0 += (int64_t)f9_2 * g1_19; h1 += (int64_t)f9 * g2_19; h2 += (int64_t)f9_2 * g3_19; h3 += (int64_t)f9 * g4_19; h4 += (int64_t)f9_2 * g5_19; h5 += (int64_t)f9 * g6_19; h6 += (int64_t)f9_2 * g7_19; h7 += (int64_t)f9 * g8_19; h8 += (int64_t)f9_2 * g9_19; h9 += (int64_t)f9 * g0; FP_PROCESS_CARRY(h); INT64_2_FP25(h, out); } void FpSquareDoubleCore(Fp25 out, const Fp25 in, bool doDouble) { int64_t h0, h1, h2, h3, h4, h5, h6, h7, h8, h9; int32_t f0, f1, f2, f3, f4, f5, f6, f7, f8, f9; FP25_2_INT32(in, f); int32_t f0_2 = f0 * 2; int32_t f1_2 = f1 * 2; int32_t f2_2 = f2 * 2; int32_t f3_2 = f3 * 2; int32_t f4_2 = f4 * 2; int32_t f5_2 = f5 * 2; int32_t f6_2 = f6 * 2; int32_t f7_2 = f7 * 2; int32_t f9_38 = f9 * 38; int32_t f8_19 = f8 * 19; int32_t f7_38 = f7 * 38; int32_t f6_19 = f6 * 19; int32_t f5_19 = f5 * 19; h0 = (int64_t)f0 * f0; h1 = (int64_t)f0_2 * f1; h2 = (int64_t)f0_2 * f2; h3 = (int64_t)f0_2 * f3; h4 = (int64_t)f0_2 * f4; h5 = (int64_t)f0_2 * f5; h6 = (int64_t)f0_2 * f6; h7 = (int64_t)f0_2 * f7; h8 = (int64_t)f0_2 * f8; h9 = (int64_t)f0_2 * f9; h0 += (int64_t)f1_2 * f9_38; h1 += (int64_t)f2 * f9_38; h2 += (int64_t)f1_2 * f1; h3 += (int64_t)f1_2 * f2; h4 += (int64_t)f1_2 * f3_2; h5 += (int64_t)f1_2 * f4; h6 += (int64_t)f1_2 * f5_2; h7 += (int64_t)f1_2 * f6; h8 += (int64_t)f1_2 * f7_2; h9 += (int64_t)f1_2 * f8; h0 += (int64_t)f2_2 * f8_19; h1 += (int64_t)f3_2 * f8_19; h2 += (int64_t)f3_2 * f9_38; h3 += (int64_t)f4 * f9_38; h4 += (int64_t)f2 * f2; h5 += (int64_t)f2_2 * f3; h6 += (int64_t)f2_2 * f4; h7 += (int64_t)f2_2 * f5; h8 += (int64_t)f2_2 * f6; h9 += (int64_t)f2_2 * f7; h0 += (int64_t)f3_2 * f7_38; h1 += (int64_t)f4 * f7_38; h2 += (int64_t)f4_2 * f8_19; h3 += (int64_t)f5_2 * f8_19; h4 += (int64_t)f5_2 * f9_38; h5 += (int64_t)f6 * f9_38; h6 += (int64_t)f3_2 * f3; h7 += (int64_t)f3_2 * f4; h8 += (int64_t)f3_2 * f5_2; h9 += (int64_t)f3_2 * f6; h0 += (int64_t)f4_2 * f6_19; h1 += (int64_t)f5_2 * f6_19; h2 += (int64_t)f5_2 * f7_38; h3 += (int64_t)f6 * f7_38; h4 += (int64_t)f6_2 * f8_19; h5 += (int64_t)f7_2 * f8_19; h6 += (int64_t)f7_2 * f9_38; h7 += (int64_t)f8 * f9_38; h8 += (int64_t)f4 * f4; h9 += (int64_t)f4_2 * f5; h0 += (int64_t)f5_2 * f5_19; h2 += (int64_t)f6 * f6_19; h4 += (int64_t)f7 * f7_38; h6 += (int64_t)f8 * f8_19; h8 += (int64_t)f9 * f9_38; if (doDouble) { h0 *= 2; h1 *= 2; h2 *= 2; h3 *= 2; h4 *= 2; h5 *= 2; h6 *= 2; h7 *= 2; h8 *= 2; h9 *= 2; } FP_PROCESS_CARRY(h); INT64_2_FP25(h, out); } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static void FpMultiSquare(Fp25 in1, Fp25 in2, Fp25 out, int32_t times) { int32_t i; Fp25 temp1, temp2; FpSquareDoubleCore(temp1, in1, false); FpSquareDoubleCore(temp2, temp1, false); for (i = 0; i < times; i++) { FpSquareDoubleCore(temp1, temp2, false); FpSquareDoubleCore(temp2, temp1, false); } FpMul(out, in2, temp2); } /* out = a ^ -1 */ void FpInvert(Fp25 out, const Fp25 a) { int32_t i; Fp25 a0; /* save a^1 */ Fp25 a1; /* save a^2 */ Fp25 a2; /* save a^11 */ Fp25 a3; /* save a^(2^5-1) */ Fp25 a4; /* save a^(2^10-1) */ Fp25 a5; /* save a^(2^20-1) */ Fp25 a6; /* save a^(2^40-1) */ Fp25 a7; /* save a^(2^50-1) */ Fp25 a8; /* save a^(2^100-1) */ Fp25 a9; /* save a^(2^200-1) */ Fp25 a10; /* save a^(2^250-1) */ Fp25 temp1, temp2; /* We know a×b=1(mod p), then a and b are inverses of mod p, i.e. a=b^(-1), b=a^(-1); * According to Fermat's little theorem a^(p-1)=1(mod p), so a*a^(p-2)=1(mod p); * So the inverse element of a is a^(-1) = a^(p-2)(mod p) * Here it is, p=2^255-19, thus we need to compute a^(2^255-21)(mod(2^255-19)) */ /* a^1 */ CURVE25519_FP_COPY(a0, a); /* a^2 */ FpSquareDoubleCore(a1, a0, false); /* a^4 */ FpSquareDoubleCore(temp1, a1, false); /* a^8 */ FpSquareDoubleCore(temp2, temp1, false); /* a^9 */ FpMul(temp1, a0, temp2); /* a^11 */ FpMul(a2, a1, temp1); /* a^22 */ FpSquareDoubleCore(temp2, a2, false); /* a^(2^5-1) = a^(9+22) */ FpMul(a3, temp1, temp2); /* a^(2^10-1) = a^(2^10-2^5) * a^(2^5-1) */ FpSquareDoubleCore(temp1, a3, false); for (i = 0; i < 2; i++) { // (2 * 2)^2 FpSquareDoubleCore(temp2, temp1, false); FpSquareDoubleCore(temp1, temp2, false); } FpMul(a4, a3, temp1); /* a^(2^20-1) = a^(2^20-2^10) * a^(2^10-1) */ FpMultiSquare(a4, a4, a5, 4); // (2 * 2) ^ 4 /* a^(2^40-1) = a^(2^40-2^20) * a^(2^20-1) */ FpMultiSquare(a5, a5, a6, 9); // (2 * 2) ^ 9 /* a^(2^50-1) = a^(2^50-2^10) * a^(2^10-1) */ FpMultiSquare(a6, a4, a7, 4); // (2 * 2) ^ 4 /* a^(2^100-1) = a^(2^100-2^50) * a^(2^50-1) */ FpMultiSquare(a7, a7, a8, 24); // (2 * 2) ^ 24 /* a^(2^200-1) = a^(2^200-2^100) * a^(2^100-1) */ FpMultiSquare(a8, a8, a9, 49); // (2 * 2) ^ 49 /* a^(2^250-1) = a^(2^250-2^50) * a^(2^50-1) */ FpMultiSquare(a9, a7, a10, 24); // (2 * 2) ^ 24 /* a^(2^5*(2^250-1)) = (a^(2^250-1))^5 */ FpSquareDoubleCore(temp1, a10, false); FpSquareDoubleCore(temp2, temp1, false); FpSquareDoubleCore(temp1, temp2, false); FpSquareDoubleCore(temp2, temp1, false); FpSquareDoubleCore(temp1, temp2, false); /* The output:a^(2^255-21) = a(2^5*(2^250-1)+11) = a^(2^5*(2^250-1)) * a^11 */ FpMul(out, a2, temp1); } #ifdef HITLS_CRYPTO_ED25519 /* out = in ^ ((q - 5) / 8) */ static void FpPowq58(Fp25 out, Fp25 in) { Fp25 a, b, c; int32_t i; FpSquareDoubleCore(a, in, false); FpSquareDoubleCore(b, a, false); FpSquareDoubleCore(b, b, false); FpMul(b, in, b); FpMul(a, a, b); FpSquareDoubleCore(a, a, false); FpMul(a, b, a); FpSquareDoubleCore(b, a, false); // b = a ^ (2^5) for (i = 1; i < 5; i++) { FpSquareDoubleCore(b, b, false); } FpMul(a, b, a); FpSquareDoubleCore(b, a, false); // b = a ^ (2^10) for (i = 1; i < 10; i++) { FpSquareDoubleCore(b, b, false); } FpMul(b, b, a); FpSquareDoubleCore(c, b, false); // c = b ^ (2^20) for (i = 1; i < 20; i++) { FpSquareDoubleCore(c, c, false); } FpMul(b, c, b); // b = b ^ (2^10) for (i = 0; i < 10; i++) { FpSquareDoubleCore(b, b, false); } FpMul(a, b, a); FpSquareDoubleCore(b, a, false); // b = a ^ (2^50) for (i = 1; i < 50; i++) { FpSquareDoubleCore(b, b, false); } FpMul(b, b, a); FpSquareDoubleCore(c, b, false); // c = b ^ (2 ^ 100) for (i = 1; i < 100; i++) { FpSquareDoubleCore(c, c, false); } FpMul(b, c, b); // b = b ^ (2^50) for (i = 0; i < 50; i++) { FpSquareDoubleCore(b, b, false); } FpMul(a, b, a); FpSquareDoubleCore(a, a, false); FpSquareDoubleCore(a, a, false); FpMul(out, a, in); } #endif static void PaddingUnload(uint8_t out[32], Fp25 pFp25) { int32_t *p = (int32_t *)pFp25; /* Take a polynomial form number into a 32-byte array */ CURVE25519_BYTES4_PADDING_UNLOAD(out, 2, p); /* p0 unload 4 bytes on out[0] expand 2 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 4, 2, 3, p + 1); /* p1 unload 3 bytes on out[4] shift 2 expand 3 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 7, 3, 5, p + 2); /* p2 unload 3 bytes on out[7] shift 3 expand 5 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 10, 5, 6, p + 3); /* p3 unload 3 bytes on out[10] shift 5 expand 6 */ CURVE25519_BYTES3_UNLOAD(out + 13, 6, p + 4); /* p4 unload 3 bytes on out[13] shift 6 */ CURVE25519_BYTES4_PADDING_UNLOAD(out + 16, 1, p + 5); /* p5 unload 4 bytes on out[16] expand 1 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 20, 1, 3, p + 6); /* p6 unload 3 bytes on out[20] shift 1 expand 3 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 23, 3, 4, p + 7); /* p7 unload 3 bytes on out[23] shift 3 expand 4 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 26, 4, 6, p + 8); /* p8 unload 3 bytes on out[26] shift 4 expand 6 */ CURVE25519_BYTES3_UNLOAD(out + 29, 6, p + 9); /* p9 unload 3 bytes on out[29] shift 6 */ } void PolynomialToData(uint8_t out[32], const Fp25 polynomial) { Fp25 pFp25; uint32_t pos; uint32_t over; uint32_t mul19; uint32_t signMask; CURVE25519_FP_COPY(pFp25, polynomial); /* First process, all the carry transport to pFp25[0] */ mul19 = (uint32_t)pFp25[9] * 19; // mul 19 for mod over = mul19 + (1 << 24); // plus 1 << 24 for carry // restricted to 25 bits, shift 31 for sign signMask = (-(over >> 31)) & MASK_HIGH32(25); over = (over >> 25) | signMask; // 25 bits pos = 0; do { over = (uint32_t)pFp25[pos] + over; // first carry is restricted to 25 bits, shift 31 for sign signMask = (-(over >> 31)) & MASK_HIGH32(25); over = (over >> 25) | signMask; // 25 bits pos++; over = (uint32_t)pFp25[pos] + over; // second carry is restricted to 26 bits, shift 31 for sign signMask = (-(over >> 31)) & MASK_HIGH32(26); over = (over >> 26) | signMask; // 26 bits pos++; } while (pos < 10); // process from 0 to 9, pos < 10 mul19 = over * 19; // mul 19 for mod pFp25[0] += (int32_t)mul19; /* We subtracted 2^255-19 and get the result * all polynomial[i] is restricted to 25 bits or 26 bits */ pos = 0; do { // first polynomial is restricted to 26 bits, shift 31 for sign signMask = (-((uint32_t)pFp25[pos] >> 31)) & MASK_HIGH32(26); over = ((uint32_t)pFp25[pos] >> 26) | signMask; // 26 bits pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(26)); // 26 bits pos++; pFp25[pos] += (int32_t)over; // second polynomial is restricted to 25 bits, shift 31 for sign signMask = (-((uint32_t)pFp25[pos] >> 31)) & MASK_HIGH32(25); over = ((uint32_t)pFp25[pos] >> 25) | signMask; // 25 bits pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(25)); pos++; pFp25[pos] += (int32_t)over; } while (pos < 8); // process form 0 to 7, pos < 8 // process pFp25[8], restricted to 26 bits, shift 31 for sign signMask = (-((uint32_t)pFp25[pos] >> 31)) & MASK_HIGH32(26); over = ((uint32_t)pFp25[pos] >> 26) | signMask; // 26 bits pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(26)); // 26 bits pos++; // process pFp25[9] pFp25[pos] += (int32_t)over; pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(25)); // pFp25[9] is restricted to 25 bits PaddingUnload(out, pFp25); } /* unified addition in Extended twist Edwards Coordinate */ /* out = out + tableElement */ static void GeAdd(GeE *out, const GePre *tableElement) { Fp25 a; Fp25 b; Fp25 c; Fp25 d; Fp25 e; Fp25 f; Fp25 g; Fp25 h; /* a = (Y1 − X1) * (Y2 − X2), b = (Y1 + X1) * (Y2 + X2) * c = 2 * d * T1 * X2 * Y2, d = 2 * Z1 * e = b − a, f = d − c, g = d + c, h = b + a * X3 = e * f, Y3 = g * h, T3 = e * h, Z3 = f * g */ CURVE25519_FP_ADD(e, out->y, out->x); CURVE25519_FP_SUB(f, out->y, out->x); FpMul(b, e, tableElement->yplusx); FpMul(a, f, tableElement->yminusx); FpMul(c, out->t, tableElement->xy2d); CURVE25519_FP_ADD(d, out->z, out->z); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_SUB(f, d, c); CURVE25519_FP_ADD(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, h, g); FpMul(out->z, g, f); FpMul(out->t, e, h); } #ifdef HITLS_CRYPTO_ED25519 /* out = out - tableElement */ static void GeSub(GeE *out, const GePre *tableElement) { Fp25 a; Fp25 b; Fp25 c; Fp25 d; Fp25 e; Fp25 f; Fp25 g; Fp25 h; CURVE25519_FP_ADD(e, out->y, out->x); CURVE25519_FP_SUB(f, out->y, out->x); FpMul(b, e, tableElement->yminusx); FpMul(a, f, tableElement->yplusx); FpMul(c, out->t, tableElement->xy2d); CURVE25519_FP_ADD(d, out->z, out->z); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_ADD(f, d, c); CURVE25519_FP_SUB(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, h, g); FpMul(out->z, g, f); FpMul(out->t, e, h); } #endif /* double in Projective twist Edwards Coordinate */ static void ProjectiveDouble(GeC *complete, const GeP *projective) { Fp25 tmp; FpSquareDoubleCore((complete->x), (projective->x), false); FpSquareDoubleCore((complete->z), (projective->y), false); // T = 2 * Z^2 FpSquareDoubleCore(complete->t, projective->z, true); CURVE25519_FP_ADD(complete->y, projective->x, projective->y); FpSquareDoubleCore(tmp, complete->y, false); // tmp = (X1 + Y1) ^ 2, T = 2 * Z^2, X = X1 ^ 2, Y = Z1 ^ 2, Z = Y1 ^ 2 CURVE25519_FP_ADD(complete->y, complete->z, complete->x); CURVE25519_FP_SUB(complete->z, complete->z, complete->x); CURVE25519_FP_SUB(complete->x, tmp, complete->y); CURVE25519_FP_SUB(complete->t, complete->t, complete->z); } /* Convert complete coordinate to projective coordinate */ static void GeCompleteToProjective(GeP *out, const GeC *complete) { FpMul(out->x, complete->t, complete->x); FpMul(out->y, complete->z, complete->y); FpMul(out->z, complete->t, complete->z); } /* p1 = 16 * p1 */ static void P1DoubleFourTimes(GeE *p1) { GeP p; GeC c; // From extended coordinate to projective coordinate, just ignore T CURVE25519_FP_COPY(p.x, p1->x); CURVE25519_FP_COPY(p.y, p1->y); CURVE25519_FP_COPY(p.z, p1->z); // double 4 times to get 16p1 ProjectiveDouble(&c, &p); GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); FpMul(p1->x, c.x, c.t); FpMul(p1->y, c.y, c.z); FpMul(p1->z, c.z, c.t); FpMul(p1->t, c.x, c.y); } static void SetExtendedBasePoint(GeE *out) { CURVE25519_FP_SET(out->x, 0); CURVE25519_FP_SET(out->y, 1); CURVE25519_FP_SET(out->t, 0); CURVE25519_FP_SET(out->z, 1); } /* Multiple with Base point, see paper: High-speed high-security signatures */ void ScalarMultiBase(GeE *out, const uint8_t in[CRYPT_CURVE25519_KEYLEN]) { uint8_t carry; // inLen is always 32, buffer needs 32 * 2 = 64 uint8_t privateKey[64]; int32_t i; GePre preCompute; // split 32 8bits input into 64 4bits-based number for (i = 0; i < 32; i++) { privateKey[i * 2] = in[i] & 15; // and 15 to get low 4 bits, stored in 2i privateKey[i * 2 + 1] = (in[i] >> 4) & 15; // shift 4 then and 15 to get upper 4 bits, stored in 2i+1 } carry = 0; /** * change from 0 - 15 to -8 - 7, if privateKey[i] >= 8, carry = 1, privateKey[i] -= 16 * if privateKey[i] < 8, privateKey[i] = privateKey[i] */ for (i = 0; i < 63; i++) { // 0 to 63 privateKey[i] += carry; carry = (privateKey[i] + 8) >> 4; // plus 8 then shit 4 to get carry privateKey[i] -= carry << 4; // left shift 4 } // never overflow since we set first bit to 0 of private key privateKey[63] += carry; // last one is 63 // set base point X:Y:T:Z -> 0:1:0:1 SetExtendedBasePoint(out); for (i = 1; i < 64; i += 2) { // form 1 to 63, process all odd element, increment by 2, i < 64 TableLookup(&preCompute, i / 2, (int8_t)privateKey[i]); // position goes from 0 to 31, i / 2 = pos // Fit with paper: Twisted Edwards Curves Revisited GeAdd(out, &preCompute); } // now we have P1, double it four times we have 16P1, P1 is in Extended now, we do double in projective coordinate P1DoubleFourTimes(out); // Add P0 with precomute for (i = 0; i < 64; i += 2) { // form 0 to 62, process all even element, increment by 2, i < 64 TableLookup(&preCompute, i / 2, (int8_t)privateKey[i]); // position goes from 0 to 31, i / 2 = pos GeAdd(out, &preCompute); } // clean up private key information BSL_SAL_CleanseData(privateKey, sizeof(privateKey)); } #ifdef HITLS_CRYPTO_ED25519 void PointEncoding(const GeE *point, uint8_t *output, uint32_t outputLen) { Fp25 zInvert; Fp25 x; Fp25 y; uint8_t xData[CRYPT_CURVE25519_KEYLEN]; /* x = X / Z, y = Y / Z */ (void)outputLen; FpInvert(zInvert, point->z); FpMul(x, point->x, zInvert); FpMul(y, point->y, zInvert); PolynomialToData(output, y); PolynomialToData(xData, x); // PointEcoding writes only 32 bytes data, therefore output[31] is the last one output[31] ^= (xData[0] & 0x1) << 7; // last one is output[31], get only last bit then shift 7 } #endif static void FeCmove(Fp25 dst, const Fp25 src, const uint32_t indicator) { // if indicator = 1, now it will be 111111111111b.... const uint32_t indicate = 0 - indicator; /* des become source if dst->data[i] ^ src->data[i] is in 1111....b, or it does not change if (dst->data[i] ^ src->data[i]) & indicate is all 0 */ dst[0] = CONDITION_COPY(dst[0], src[0], indicate); // 0 dst[1] = CONDITION_COPY(dst[1], src[1], indicate); // 1 dst[2] = CONDITION_COPY(dst[2], src[2], indicate); // 2 dst[3] = CONDITION_COPY(dst[3], src[3], indicate); // 3 dst[4] = CONDITION_COPY(dst[4], src[4], indicate); // 4 dst[5] = CONDITION_COPY(dst[5], src[5], indicate); // 5 dst[6] = CONDITION_COPY(dst[6], src[6], indicate); // 6 dst[7] = CONDITION_COPY(dst[7], src[7], indicate); // 7 dst[8] = CONDITION_COPY(dst[8], src[8], indicate); // 8 dst[9] = CONDITION_COPY(dst[9], src[9], indicate); // 9 } void ConditionalMove(GePre *preCompute, const GePre *tableElement, uint32_t indicator) { FeCmove(preCompute->yplusx, tableElement->yplusx, indicator); FeCmove(preCompute->yminusx, tableElement->yminusx, indicator); FeCmove(preCompute->xy2d, tableElement->xy2d, indicator); } void DataToPolynomial(Fp25 out, const uint8_t data[32]) { const uint8_t *t = data; uint64_t p[10]; uint64_t over; int32_t i; uint64_t signMask; /* f0, load 32 bits */ CURVE25519_BYTES4_LOAD(p, t); /* f1, load 24 bits from t4, shift bits: 26 - 24 - (8 - x) = 0 -> x = 6 */ CURVE25519_BYTES3_LOAD_PADDING(p + 1, 6, t + 4); /* f2, load 24 bits from t7, shift bits: 51 - 48 - (8 - x) = 0 -> x = 5 */ CURVE25519_BYTES3_LOAD_PADDING(p + 2, 5, t + 7); /* f3, load 24 bits from t10, shift bits: 77 - 72 - (8 - x) = 0 -> x = 3 */ CURVE25519_BYTES3_LOAD_PADDING(p + 3, 3, t + 10); /* f4, load 24 bits from t13, shift bits: 102 - 96 - (8 - x) = 0 -> x = 2 */ CURVE25519_BYTES3_LOAD_PADDING(p + 4, 2, t + 13); /* f5, load 32 bits from t16 */ CURVE25519_BYTES4_LOAD(p + 5, t + 16); /* f6, load 24 bits from t20, shift bits: 153 - 152 - (8 - x) = 0 -> x = 7 */ CURVE25519_BYTES3_LOAD_PADDING(p + 6, 7, t + 20); /* f7, load 24 bits from t23, shift bits: 179 - 176 - (8 - x) = 0 -> x = 5 */ CURVE25519_BYTES3_LOAD_PADDING(p + 7, 5, t + 23); /* f8, load 24 bits from t26, shift bits: 204 - 200 - (8 - x) = 0 -> x = 4 */ CURVE25519_BYTES3_LOAD_PADDING(p + 8, 4, t + 26); /* f9, load 24 bits from t29, shift bits: 230 - 224 - (8 - x) = 0 -> x = 2 */ CURVE25519_BYTES3_LOAD(p + 9, t + 29); p[9] = (p[9] & 0x7fffff) << 2; /* p9 is 25 bits, left shift 2 */ /* Limiting the number of bits, exchange 2^1 to 2^25.5, turn into polynomial representation */ /* f9->f0, shift 24 for carry */ over = p[9] + (1 << 24); signMask = MASK_HIGH64(25) & (-((over) >> 63)); // shift 63 bits for sign, mask 25 bits p[0] += ((over >> 25) | signMask) * 19; // 24 bits plus sign is 25, mul 19 for mod p[9] -= MASK_HIGH64(39) & over; // 64 - 25 = 39 bits mask /* f1->f2, restricted to 24 bits */ PROCESS_CARRY(p[1], p[2], signMask, over, 24); /* f3->f4, restricted to 24 bits */ PROCESS_CARRY(p[3], p[4], signMask, over, 24); /* f5->f6, restricted to 24 bits */ PROCESS_CARRY(p[5], p[6], signMask, over, 24); /* f7->f8, restricted to 24 bits */ PROCESS_CARRY(p[7], p[8], signMask, over, 24); /* f0->f1, restricted to 25 bits */ PROCESS_CARRY(p[0], p[1], signMask, over, 25); /* f2->f3, restricted to 25 bits */ PROCESS_CARRY(p[2], p[3], signMask, over, 25); /* f4->f5, restricted to 25 bits */ PROCESS_CARRY(p[4], p[5], signMask, over, 25); /* f6->f7, restricted to 25 bits */ PROCESS_CARRY(p[6], p[7], signMask, over, 25); /* f8->f9, restricted to 25 bits */ PROCESS_CARRY(p[8], p[9], signMask, over, 25); /* After process carry, polynomial every term would not exceed 32 bits, convert form 0 to 9, i < 10 */ for (i = 0; i < 10; i++) { out[i] = (int32_t)p[i]; } } #ifdef HITLS_CRYPTO_ED25519 static bool CheckZero(Fp25 x) { uint8_t tmp[32]; const uint8_t zero[32] = {0}; PolynomialToData(tmp, x); if (memcmp(tmp, zero, sizeof(zero)) == 0) { return true; } else { return false; } } static uint8_t GetXBit(Fp25 in) { uint8_t tmp[32]; PolynomialToData(tmp, in); return tmp[0] & 0x1; } static const Fp25 SQRTM1 = {-32595792, -7943725, 9377950, 3500415, 12389472, -272473, -25146209, -2005654, 326686, 11406482}; static const Fp25 D = {-10913610, 13857413, -15372611, 6949391, 114729, -8787816, -6275908, -3247719, -18696448, -12055116}; int32_t PointDecoding(GeE *point, const uint8_t in[CRYPT_CURVE25519_KEYLEN]) { Fp25 u, v, v3, x2, result; // get the last block (31), shift 7 for first bit uint8_t x0 = in[31] >> 7; DataToPolynomial(point->y, in); CURVE25519_FP_SET(point->z, 1); FpSquareDoubleCore(u, point->y, false); FpMul(v, u, D); CURVE25519_FP_SUB(u, u, point->z); CURVE25519_FP_ADD(v, v, point->z); FpSquareDoubleCore(v3, v, false); FpMul(v3, v3, v); FpSquareDoubleCore(point->x, v3, false); FpMul(point->x, point->x, v); FpMul(point->x, point->x, u); /* x = x ^ ((q - 5) / 8) */ FpPowq58(point->x, point->x); FpMul(point->x, point->x, v3); FpMul(point->x, point->x, u); FpSquareDoubleCore(x2, point->x, false); FpMul(x2, x2, v); CURVE25519_FP_SUB(result, x2, u); if (CheckZero(result) == false) { CURVE25519_FP_ADD(result, x2, u); if (CheckZero(result) == false) { return 1; } FpMul(point->x, point->x, SQRTM1); } uint8_t bit = GetXBit(point->x); if (bit != x0) { CURVE25519_FP_NEGATE(point->x, point->x); } FpMul(point->t, point->x, point->y); return 0; } static void ScalarMulAddPreLoad(const uint8_t in[CRYPT_CURVE25519_KEYLEN], uint64_t out[UINT8_32_21BITS_BLOCKNUM]) { CURVE25519_BYTES3_LOAD(&out[0], in); out[0] = out[0] & MASK_64_LOW21; CURVE25519_BYTES4_LOAD(&out[1], in + 2); // 1: load 4 bytes form position 2 out[1] = MASK_64_LOW21 & (out[1] >> 5); // 1: 8 - ((3 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&out[2], in + 5); // 2: load 3 bytes form position 5 out[2] = MASK_64_LOW21 & (out[2] >> 2); // 2: 8 - ((6 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&out[3], in + 7); // 3: load 4 bytes form position 7 out[3] = MASK_64_LOW21 & (out[3] >> 7); // 3: 8 - ((8 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&out[4], in + 10); // 4: load 4 bytes form position 10 out[4] = MASK_64_LOW21 & (out[4] >> 4); // 4: 8 - ((11 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&out[5], in + 13); // 5: load 3 bytes form position 13 out[5] = MASK_64_LOW21 & (out[5] >> 1); // 5: 8 - ((14 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&out[6], in + 15); // 6: load 4 bytes form position 15 out[6] = MASK_64_LOW21 & (out[6] >> 6); // 6: 8 - ((16 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES3_LOAD(&out[7], in + 18); // 7: load 3 bytes form position 18 out[7] = MASK_64_LOW21 & (out[7] >> 3); // 7: 8 - ((19 * 8) mod 21) mod 8 = 3 CURVE25519_BYTES3_LOAD(&out[8], in + 21); // 8: load 3 bytes form position 21 out[8] = MASK_64_LOW21 & out[8]; // 8: ((22 * 8) mod 21) mod 8 = 0 CURVE25519_BYTES4_LOAD(&out[9], in + 23); // 9: load 4 bytes form position 23 out[9] = MASK_64_LOW21 & (out[9] >> 5); // 9: 8 - ((24 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&out[10], in + 26); // 10: load 3 bytes form position 26 out[10] = MASK_64_LOW21 & (out[10] >> 2); // 10: 8 - ((27 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&out[11], in + 28); // 11: load 4 bytes form position 28 out[11] = (out[11] >> 7); // 11: 8 - ((29 * 8) mod 21) mod 8 = 7 } static void ModuloLPreLoad(const uint8_t s[CRYPT_CURVE25519_SIGNLEN], uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]) { CURVE25519_BYTES3_LOAD(&s21Bits[0], s); s21Bits[0] = s21Bits[0] & MASK_64_LOW21; CURVE25519_BYTES4_LOAD(&s21Bits[1], s + 2); // 1: load 4 bytes form position 2 s21Bits[1] = MASK_64_LOW21 & (s21Bits[1] >> 5); // 1: 8 - ((3 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&s21Bits[2], s + 5); // 2: load 3 bytes form position 5 s21Bits[2] = MASK_64_LOW21 & (s21Bits[2] >> 2); // 2: 8 - ((6 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&s21Bits[3], s + 7); // 3: load 4 bytes form position 7 s21Bits[3] = MASK_64_LOW21 & (s21Bits[3] >> 7); // 3: 8 - ((8 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&s21Bits[4], s + 10); // 4: load 4 bytes form position 10 s21Bits[4] = MASK_64_LOW21 & (s21Bits[4] >> 4); // 4: 8 - ((11 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&s21Bits[5], s + 13); // 5: load 3 bytes form position 13 s21Bits[5] = MASK_64_LOW21 & (s21Bits[5] >> 1); // 5: 8 - ((14 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&s21Bits[6], s + 15); // 6: load 4 bytes form position 15 s21Bits[6] = MASK_64_LOW21 & (s21Bits[6] >> 6); // 6: 8 - ((16 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES3_LOAD(&s21Bits[7], s + 18); // 7: load 3 bytes form position 18 s21Bits[7] = MASK_64_LOW21 & (s21Bits[7] >> 3); // 7: 8 - ((19 * 8) mod 21) mod 8 = 3 CURVE25519_BYTES3_LOAD(&s21Bits[8], s + 21); // 8: load 3 bytes form position 21 s21Bits[8] = MASK_64_LOW21 & s21Bits[8]; // 8: ((22 * 8) mod 21) mod 8 = 0 CURVE25519_BYTES4_LOAD(&s21Bits[9], s + 23); // 9: load 4 bytes form position 23 s21Bits[9] = MASK_64_LOW21 & (s21Bits[9] >> 5); // 9: 8 - ((24 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&s21Bits[10], s + 26); // 10: load 3 bytes form position 26 s21Bits[10] = MASK_64_LOW21 & (s21Bits[10] >> 2); // 10: 8 - ((27 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&s21Bits[11], s + 28); // 11: load 4 bytes form position 28 s21Bits[11] = MASK_64_LOW21 & (s21Bits[11] >> 7); // 11: 8 - ((29 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&s21Bits[12], s + 31); // 12: load 4 bytes form position 31 s21Bits[12] = MASK_64_LOW21 & (s21Bits[12] >> 4); // 12: 8 - ((32 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&s21Bits[13], s + 34); // 13: load 3 bytes form position 34 s21Bits[13] = MASK_64_LOW21 & (s21Bits[13] >> 1); // 13: 8 - ((35 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&s21Bits[14], s + 36); // 14: load 4 bytes form position 36 s21Bits[14] = MASK_64_LOW21 & (s21Bits[14] >> 6); // 14: 8 - ((37 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES3_LOAD(&s21Bits[15], s + 39); // 15: load 3 bytes form position 39 s21Bits[15] = MASK_64_LOW21 & (s21Bits[15] >> 3); // 15: 8 - ((40 * 8) mod 21) mod 8 = 3 CURVE25519_BYTES3_LOAD(&s21Bits[16], s + 42); // 16: load 3 bytes form position 42 s21Bits[16] = MASK_64_LOW21 & s21Bits[16]; // 16: ((43 * 8) mod 21) mod 8 = 0 CURVE25519_BYTES4_LOAD(&s21Bits[17], s + 44); // 17: load 4 bytes form position 44 s21Bits[17] = MASK_64_LOW21 & (s21Bits[17] >> 5); // 17: 8 - ((45 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&s21Bits[18], s + 47); // 18: load 3 bytes form position 47 s21Bits[18] = MASK_64_LOW21 & (s21Bits[18] >> 2); // 18: 8 - ((48 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&s21Bits[19], s + 49); // 19: load 4 bytes form position 49 s21Bits[19] = MASK_64_LOW21 & (s21Bits[19] >> 7); // 19: 8 - ((50 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&s21Bits[20], s + 52); // 20: load 4 bytes form position 52 s21Bits[20] = MASK_64_LOW21 & (s21Bits[20] >> 4); // 20: 8 - ((53 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&s21Bits[21], s + 55); // 21: load 3 bytes form position 55 s21Bits[21] = MASK_64_LOW21 & (s21Bits[21] >> 1); // 21: 8 - ((56 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&s21Bits[22], s + 57); // 22: load 4 bytes form position 57 s21Bits[22] = MASK_64_LOW21 & (s21Bits[22] >> 6); // 22: 8 - ((58 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES4_LOAD(&s21Bits[23], s + 60); // 23: load 4 bytes form position 60 s21Bits[23] = s21Bits[23] >> 3; // 23: 8 - ((61 * 8) mod 21) mod 8 = 3 } static void UnloadTo8Bits(uint8_t s8Bits[CRYPT_CURVE25519_OPTLEN], uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]) { s8Bits[0] = (uint8_t)s21Bits[0]; // 1: load from 8 on block 0 s8Bits[1] = (uint8_t)(s21Bits[0] >> 8); // 2: load from (16 + 1) to 21 on block 0 and 1 to 3 on block 1, 8 - 3 = 5 s8Bits[2] = (uint8_t)((s21Bits[0] >> 16) | (s21Bits[1] << 5)); // 3: load from (3 + 1) on block 1 s8Bits[3] = (uint8_t)(s21Bits[1] >> 3); // 4: load from (11 + 1) on block 1 s8Bits[4] = (uint8_t)(s21Bits[1] >> 11); // 5: load from (19 + 1) to 21 on block 1 and 1 to 6 on block 2, 8 - 6 = 2 s8Bits[5] = (uint8_t)((s21Bits[1] >> 19) | (s21Bits[2] << 2)); // 6: load from (6 + 1) on block 2 s8Bits[6] = (uint8_t)(s21Bits[2] >> 6); // 7: load from (14 + 1) to 21 on block 2 and 1 on block 3, 8 - 7 = 1 s8Bits[7] = (uint8_t)((s21Bits[2] >> 14) | (s21Bits[3] << 7)); // 8: load from (1 + 1) on block 3 s8Bits[8] = (uint8_t)(s21Bits[3] >> 1); // 9: load from (9 + 1) on block 3 s8Bits[9] = (uint8_t)(s21Bits[3] >> 9); // 10: load from (17 + 1) to 21 on block 3 and 1 to 4 on block 4, 8 - 4 = 4 s8Bits[10] = (uint8_t)((s21Bits[3] >> 17) | (s21Bits[4] << 4)); // 11: load from (4 + 1) on block 4 s8Bits[11] = (uint8_t)(s21Bits[4] >> 4); // 12: load from (12 + 1) on block 4 s8Bits[12] = (uint8_t)(s21Bits[4] >> 12); // 13: load from (20 + 1) on block 4 and 1 to 7 on block 5, 8 - 7 = 1 s8Bits[13] = (uint8_t)((s21Bits[4] >> 20) | (s21Bits[5] << 1)); // 14: load from (7 + 1) on block 5 s8Bits[14] = (uint8_t)(s21Bits[5] >> 7); // 15: load from (15 + 1) to 21 on block 5 and 1 to 2 on block 6, 8 - 2 = 6 s8Bits[15] = (uint8_t)((s21Bits[5] >> 15) | (s21Bits[6] << 6)); // 16: load from (2 + 1) on block 6 s8Bits[16] = (uint8_t)(s21Bits[6] >> 2); // 17: load from (10 + 1) on block 6 s8Bits[17] = (uint8_t)(s21Bits[6] >> 10); // 18: load from (18 + 1) to 21 on block 6 and 1 to 5 on block 7, 8 - 5 = 3 s8Bits[18] = (uint8_t)((s21Bits[6] >> 18) | (s21Bits[7] << 3)); // 19: load from (5 + 1) on block 7 s8Bits[19] = (uint8_t)(s21Bits[7] >> 5); // 20: load from (13 + 1) on block 7 s8Bits[20] = (uint8_t)(s21Bits[7] >> 13); // 21: load 8bits on block 8 s8Bits[21] = (uint8_t)s21Bits[8]; // 22: load from (8 + 1) on block 8 s8Bits[22] = (uint8_t)(s21Bits[8] >> 8); // 23: load from (16 + 1) to 21 on block 8 and 1 to 3 on block 9, 8 - 3 = 5 s8Bits[23] = (uint8_t)((s21Bits[8] >> 16) | (s21Bits[9] << 5)); // 24: load from (3 + 1) on block 9 s8Bits[24] = (uint8_t)(s21Bits[9] >> 3); // 25: load from (11 + 1) on block 9 s8Bits[25] = (uint8_t)(s21Bits[9] >> 11); // 26: load from (19 + 1) to 21 on block 9 and 1 to 6 on block 10, 8 - 6 = 2 s8Bits[26] = (uint8_t)((s21Bits[9] >> 19) | (s21Bits[10] << 2)); // 27: load from (6 + 1) on block 10 s8Bits[27] = (uint8_t)(s21Bits[10] >> 6); // 28: load from (14 + 1) to 21 on block 10 and 1 on block 11, 8 - 7 = 1 s8Bits[28] = (uint8_t)((s21Bits[10] >> 14) | (s21Bits[11] << 7)); // 29: load from (1 + 1) on block 11 s8Bits[29] = (uint8_t)(s21Bits[11] >> 1); // 30: load from (9 + 1) on block 11 s8Bits[30] = (uint8_t)(s21Bits[11] >> 9); // 31: load from (17 + 1) on block 11 s8Bits[31] = (uint8_t)(s21Bits[11] >> 17); } static void ModuloLCore(uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]) { int32_t i; uint64_t signMask1, signMask2; uint64_t carry1, carry2; // multiply by l0, start with {11, 12, 13, 14, 15, 16} to {6, 7, 8, 9, 10, 11, 12} CURVE25519_MULTI_BY_L0(s21Bits, 11); CURVE25519_MULTI_BY_L0(s21Bits, 10); CURVE25519_MULTI_BY_L0(s21Bits, 9); CURVE25519_MULTI_BY_L0(s21Bits, 8); CURVE25519_MULTI_BY_L0(s21Bits, 7); CURVE25519_MULTI_BY_L0(s21Bits, 6); // need to process carry to prevent overflow, process carry from 6->7, 8->9 ... 16->17, increment by 2 for (i = 6; i <= 16; i += 2) { // 21 bits minus sign is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 20); } // process carry from 7->8, 9->10 ... 15->16, increment by 2 for (i = 7; i <= 15; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask2, carry2, 20); } // {5, 6, 7, 8, 9, 10} to {0, 1, 2, 3, 4, 5, 6} CURVE25519_MULTI_BY_L0(s21Bits, 5); CURVE25519_MULTI_BY_L0(s21Bits, 4); CURVE25519_MULTI_BY_L0(s21Bits, 3); CURVE25519_MULTI_BY_L0(s21Bits, 2); CURVE25519_MULTI_BY_L0(s21Bits, 1); CURVE25519_MULTI_BY_L0(s21Bits, 0); // process carry again, from 0->1, 2->3 ... 10->11, increment by 2 for (i = 0; i <= 10; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 20); } // from 1->2, 3->4 ... 11->12, increment by 2 for (i = 1; i <= 11; i += 2) { // 21 bits minus sign is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask2, carry2, 20); } CURVE25519_MULTI_BY_L0(s21Bits, 0); // process carry from 0 to 11 for (i = 0; i <= 11; i++) { PROCESS_CARRY_UNSIGN(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 21); // s21Bits is 21 bits } CURVE25519_MULTI_BY_L0(s21Bits, 0); // from 0 to 10 for (i = 0; i <= 10; i++) { PROCESS_CARRY_UNSIGN(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 21); // s21Bits is 21 bits } } void ModuloL(uint8_t s[CRYPT_CURVE25519_SIGNLEN]) { // 24 of 21 bits block uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM] = {0}; ModuloLPreLoad(s, s21Bits); ModuloLCore(s21Bits); UnloadTo8Bits(s, s21Bits); } static void MulAdd(uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM], const uint64_t a21Bits[UINT8_32_21BITS_BLOCKNUM], const uint64_t b21Bits[UINT8_32_21BITS_BLOCKNUM], const uint64_t c21Bits[UINT8_32_21BITS_BLOCKNUM]) { // s0 = c0 + a0b0 s21Bits[0] = c21Bits[0] + a21Bits[0] * b21Bits[0]; // s1 = c1 + a0b1 + a1b0 s21Bits[1] = c21Bits[1] + a21Bits[0] * b21Bits[1] + a21Bits[1] * b21Bits[0]; // s2 = c2 + a0b2 + b1a1 + a2b0 s21Bits[2] = c21Bits[2] + a21Bits[0] * b21Bits[2] + a21Bits[1] * b21Bits[1] + a21Bits[2] * b21Bits[0]; // s3 = c3 + a0b3 + a1b2 + a2b1 + a3b0 s21Bits[3] = c21Bits[3] + a21Bits[0] * b21Bits[3] + a21Bits[1] * b21Bits[2] + a21Bits[2] * b21Bits[1] + a21Bits[3] * b21Bits[0]; // a2b1 + a3b0 // s4 = c4 + a0b4 +a1b3 + a2b2 + a3b1 + a4b0 s21Bits[4] = c21Bits[4] + a21Bits[0] * b21Bits[4] + a21Bits[1] * b21Bits[3] + a21Bits[2] * b21Bits[2] + a21Bits[3] * b21Bits[1] + a21Bits[4] * b21Bits[0]; // a2b2 + a3b1 + a4b0 // s5 = c5 + a0b5 + a1b4 + a2b3 + a3b2 + a4b1 + a5b0 s21Bits[5] = c21Bits[5] + a21Bits[0] * b21Bits[5] + a21Bits[1] * b21Bits[4] + a21Bits[2] * b21Bits[3] + a21Bits[3] * b21Bits[2] + a21Bits[4] * b21Bits[1] + a21Bits[5] * b21Bits[0]; // a3b2 + a4b1 + a5b0 // s6 = c6 + a0b6 + a1b5 + a2b4 + a3b3 + a2b4 + a5b1 + a6b0 s21Bits[6] = c21Bits[6] + a21Bits[0] * b21Bits[6] + a21Bits[1] * b21Bits[5] + a21Bits[2] * b21Bits[4] + a21Bits[3] * b21Bits[3] + a21Bits[4] * b21Bits[2] + a21Bits[5] * b21Bits[1] + // a3b3 + a2b4 + a5b1 a21Bits[6] * b21Bits[0]; // a6b0 // s7 = c7 + a0b7 + a1b6 + a2b5 + a3b4 + a4b3 + a5b2 + a6b1 + a7b0 s21Bits[7] = c21Bits[7] + a21Bits[0] * b21Bits[7] + a21Bits[1] * b21Bits[6] + a21Bits[2] * b21Bits[5] + a21Bits[3] * b21Bits[4] + a21Bits[4] * b21Bits[3] + a21Bits[5] * b21Bits[2] + // a3b4 + a4b3 + a5b2 a21Bits[6] * b21Bits[1] + a21Bits[7] * b21Bits[0]; // a6b1 + a7b0 // s8 = c8 + a0b8 + a1b7 + a2b6 + a3b5 + a4b4 + a5b3 + a6b2 + a7b1 + a8b0 s21Bits[8] = c21Bits[8] + a21Bits[0] * b21Bits[8] + a21Bits[1] * b21Bits[7] + a21Bits[2] * b21Bits[6] + a21Bits[3] * b21Bits[5] + a21Bits[4] * b21Bits[4] + a21Bits[5] * b21Bits[3] + // a3b5 + a4b4 + a5b3 a21Bits[6] * b21Bits[2] + a21Bits[7] * b21Bits[1] + a21Bits[8] * b21Bits[0]; // a6b2 + a7b1 + a8b0 // s9 = c9 + a0b9 + a1b8 + a2b7 + a3b6 + a4b5 + a5b4 + a6b3 + a7b2 + a8b1 + a9b0 s21Bits[9] = c21Bits[9] + a21Bits[0] * b21Bits[9] + a21Bits[1] * b21Bits[8] + a21Bits[2] * b21Bits[7] + a21Bits[3] * b21Bits[6] + a21Bits[4] * b21Bits[5] + a21Bits[5] * b21Bits[4] + // a3b6 + a4b5 + a5b4 a21Bits[6] * b21Bits[3] + a21Bits[7] * b21Bits[2] + a21Bits[8] * b21Bits[1] + // a6b3 + a7b2 + a8b1 a21Bits[9] * b21Bits[0]; // a9b0 // s10 = c10 + a0b10 + a1b9 + a2b8 + a3b7 + a4b6 + a5b5 + a6b4 + a7b3 + a8b2 + a9b1 + a10b0 s21Bits[10] = c21Bits[10] + a21Bits[0] * b21Bits[10] + a21Bits[1] * b21Bits[9] + a21Bits[2] * b21Bits[8] + a21Bits[3] * b21Bits[7] + a21Bits[4] * b21Bits[6] + a21Bits[5] * b21Bits[5] + // a3b7 + a4b6 + a5b5 a21Bits[6] * b21Bits[4] + a21Bits[7] * b21Bits[3] + a21Bits[8] * b21Bits[2] + // a6b4 + a7b3 + a8b2 a21Bits[9] * b21Bits[1] + a21Bits[10] * b21Bits[0]; // a9b1 + a10b0 // s11 = c11 + a0b11 + a1b10 + a2b9 + a3b8 + a4b7 + a5b6 + a6b5 + a7b4 + a8b3 + a9b2 + a10b1 + a11b0 s21Bits[11] = c21Bits[11] + a21Bits[0] * b21Bits[11] + a21Bits[1] * b21Bits[10] + a21Bits[2] * b21Bits[9] + a21Bits[3] * b21Bits[8] + a21Bits[4] * b21Bits[7] + a21Bits[5] * b21Bits[6] + // a3b8 + a4b7 + a5b6 a21Bits[6] * b21Bits[5] + a21Bits[7] * b21Bits[4] + a21Bits[8] * b21Bits[3] + // a6b5 + a7b4 + a8b3 a21Bits[9] * b21Bits[2] + a21Bits[10] * b21Bits[1] + a21Bits[11] * b21Bits[0]; // a9b2 + a10b1 + a11b0 // s12 = a1b11 + a2b10 + a3b9 + a4b8 + a5b7 + a6b6 + a7b5 + a8b4 + a9b3 + a10b2 + a11b1 s21Bits[12] = a21Bits[1] * b21Bits[11] + a21Bits[2] * b21Bits[10] + a21Bits[3] * b21Bits[9] + a21Bits[4] * b21Bits[8] + a21Bits[5] * b21Bits[7] + a21Bits[6] * b21Bits[6] + // a4b8 + a5b7 + a6b6 a21Bits[7] * b21Bits[5] + a21Bits[8] * b21Bits[4] + a21Bits[9] * b21Bits[3] + // a7b5 + a8b4 + a9b3 a21Bits[10] * b21Bits[2] + a21Bits[11] * b21Bits[1]; // a10b2 + a11b1 // s13 = a2b11 + a3b10 + a4b9 + a5b8 + a6b7 + a7b6 + a8b5 + a9b4 + a10b3 + a11b2 s21Bits[13] = a21Bits[2] * b21Bits[11] + a21Bits[3] * b21Bits[10] + a21Bits[4] * b21Bits[9] + a21Bits[5] * b21Bits[8] + a21Bits[6] * b21Bits[7] + a21Bits[7] * b21Bits[6] + // a5b8 + a6b7 + a7b6 a21Bits[8] * b21Bits[5] + a21Bits[9] * b21Bits[4] + a21Bits[10] * b21Bits[3] + // a8b5 + a9b4 + a10b3 a21Bits[11] * b21Bits[2]; // a11b2 // s14 = a3b11 + a4b10 + a5b9 + a6b8 + a7b7 + a8b6 + a9b5 + a10b4 + a11b3 s21Bits[14] = a21Bits[3] * b21Bits[11] + a21Bits[4] * b21Bits[10] + a21Bits[5] * b21Bits[9] + a21Bits[6] * b21Bits[8] + a21Bits[7] * b21Bits[7] + a21Bits[8] * b21Bits[6] + // a6b8 + a7b7 + a8b6 a21Bits[9] * b21Bits[5] + a21Bits[10] * b21Bits[4] + a21Bits[11] * b21Bits[3]; // a9b5 + a10b4 + a11b3 // s15 = a4b11 + a5b10 + a6b9 + a7b8 + a8b7 + a9b6 + a10b5 + a11b4 s21Bits[15] = a21Bits[4] * b21Bits[11] + a21Bits[5] * b21Bits[10] + a21Bits[6] * b21Bits[9] + a21Bits[7] * b21Bits[8] + a21Bits[8] * b21Bits[7] + a21Bits[9] * b21Bits[6] + // a7b8 + a8b7 + a9b6 a21Bits[10] * b21Bits[5] + a21Bits[11] * b21Bits[4]; // a10b5 + a11b4 // s16 = a5b11 + a6b10 + a7b9 + a8b8 + a9b7 + a10b6 + a11b5 s21Bits[16] = a21Bits[5] * b21Bits[11] + a21Bits[6] * b21Bits[10] + a21Bits[7] * b21Bits[9] + a21Bits[8] * b21Bits[8] + a21Bits[9] * b21Bits[7] + a21Bits[10] * b21Bits[6] + // a8b8 + a9b7 + a10b6 a21Bits[11] * b21Bits[5]; // a11b5 // s17 = a6b11 + a7b10 + a8b9 + a9b8 + a10b7 + a11b6 s21Bits[17] = a21Bits[6] * b21Bits[11] + a21Bits[7] * b21Bits[10] + a21Bits[8] * b21Bits[9] + a21Bits[9] * b21Bits[8] + a21Bits[10] * b21Bits[7] + a21Bits[11] * b21Bits[6]; // a9b8 + a10b7 + a11b6 // s18 = a7b11 + a8b10 + a9b9 + a10b8 + a11b7 s21Bits[18] = a21Bits[7] * b21Bits[11] + a21Bits[8] * b21Bits[10] + a21Bits[9] * b21Bits[9] + a21Bits[10] * b21Bits[8] + a21Bits[11] * b21Bits[7]; // a10b8 + a11b7 // s19 = a8b11 + a9b10 + a10b9 + a11b8 s21Bits[19] = a21Bits[8] * b21Bits[11] + a21Bits[9] * b21Bits[10] + a21Bits[10] * b21Bits[9] + a21Bits[11] * b21Bits[8]; // a11b8 // s20 = a9b11 + a10b10 + a11b9 s21Bits[20] = a21Bits[9] * b21Bits[11] + a21Bits[10] * b21Bits[10] + a21Bits[11] * b21Bits[9]; // s21 = a10b11 + a11b10 s21Bits[21] = a21Bits[10] * b21Bits[11] + a21Bits[11] * b21Bits[10]; // s22 = a11b11 s21Bits[22] = a21Bits[11] * b21Bits[11]; // s23 = 0 s21Bits[23] = 0; } void ScalarMulAdd(uint8_t s[CRYPT_CURVE25519_KEYLEN], const uint8_t a[CRYPT_CURVE25519_KEYLEN], const uint8_t b[CRYPT_CURVE25519_KEYLEN], const uint8_t c[CRYPT_CURVE25519_KEYLEN]) { uint64_t a21Bits[UINT8_32_21BITS_BLOCKNUM]; uint64_t b21Bits[UINT8_32_21BITS_BLOCKNUM]; uint64_t c21Bits[UINT8_32_21BITS_BLOCKNUM]; ScalarMulAddPreLoad(a, a21Bits); ScalarMulAddPreLoad(b, b21Bits); ScalarMulAddPreLoad(c, c21Bits); uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]; MulAdd(s21Bits, a21Bits, b21Bits, c21Bits); int32_t i; uint64_t signMask1, signMask2; uint64_t carryA, carryB; // process carry 0->1, 2->3 ... 22->23 for (i = 0; i <= 22; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask1, carryA, 20); } // process carry 1->2, 3->4 ... 21->22 for (i = 1; i <= 21; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask2, carryB, 20); } ModuloLCore(s21Bits); UnloadTo8Bits(s, s21Bits); } /* RFC8032, out = a + b */ static void PointAdd(GeE *out, GeE *greA, GeE *greB) { const Fp25 d2 = {-21827239, -5839606, -30745221, 13898782, 229458, 15978800, -12551817, -6495438, 29715968, 9444199}; Fp25 a, b, c, d, e, f, g, h; CURVE25519_FP_SUB(e, greA->y, greA->x); CURVE25519_FP_SUB(f, greB->y, greB->x); CURVE25519_FP_ADD(g, greA->y, greA->x); CURVE25519_FP_ADD(h, greB->y, greB->x); FpMul(a, e, f); FpMul(b, g, h); FpMul(c, greA->t, greB->t); FpMul(c, c, d2); FpMul(d, greA->z, greB->z); CURVE25519_FP_ADD(d, d, d); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_SUB(f, d, c); CURVE25519_FP_ADD(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, g, h); FpMul(out->z, f, g); FpMul(out->t, e, h); } static void PointAddPrecompute(GeE *out, GeE *greA, GeEPre *greB) { Fp25 a, b, c, d, e, f, g, h; CURVE25519_FP_SUB(e, greA->y, greA->x); CURVE25519_FP_ADD(g, greA->y, greA->x); FpMul(a, e, greB->yminusx); FpMul(b, g, greB->yplusx); FpMul(c, greA->t, greB->t2z); FpMul(d, greA->z, greB->z); CURVE25519_FP_ADD(d, d, d); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_SUB(f, d, c); CURVE25519_FP_ADD(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, g, h); FpMul(out->z, f, g); FpMul(out->t, e, h); } static void PointSubPrecompute(GeE *out, GeE *greA, GeEPre *greB) { Fp25 a, b, c, d, e, f, g, h; CURVE25519_FP_SUB(e, greA->y, greA->x); CURVE25519_FP_ADD(g, greA->y, greA->x); FpMul(a, e, greB->yplusx); FpMul(b, g, greB->yminusx); FpMul(c, greA->t, greB->t2z); FpMul(d, greA->z, greB->z); CURVE25519_FP_ADD(d, d, d); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_ADD(f, d, c); CURVE25519_FP_SUB(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, g, h); FpMul(out->z, f, g); FpMul(out->t, e, h); } static void P1DoubleN(GeE *p1, int32_t n) { GeP p; GeC c; int32_t i; // From extended coordinate to projective coordinate, just ignore T CURVE25519_FP_COPY(p.x, p1->x); CURVE25519_FP_COPY(p.y, p1->y); CURVE25519_FP_COPY(p.z, p1->z); ProjectiveDouble(&c, &p); for (i = 1; i < n; i++) { GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); } FpMul(p1->x, c.t, c.x); FpMul(p1->y, c.z, c.y); FpMul(p1->z, c.t, c.z); FpMul(p1->t, c.y, c.x); } static void PointToPrecompute(GeEPre *out, GeE *in) { const Fp25 d2 = {-21827239, -5839606, -30745221, 13898782, 229458, 15978800, -12551817, -6495438, 29715968, 9444199}; CURVE25519_FP_ADD(out->yplusx, in->y, in->x); CURVE25519_FP_SUB(out->yminusx, in->y, in->x); CURVE25519_FP_COPY(out->z, in->z); FpMul(out->t2z, in->t, d2); } static void FlipK(int8_t slide[256], uint32_t start) { uint32_t k; for (k = start; k < 256; k++) { if (slide[k] == 0) { slide[k] = 1; break; } else { slide[k] = 0; } } } static void SlideReduce(int8_t *out, uint32_t outLen, const uint8_t *in, uint32_t inLen) { uint32_t i, j; int8_t tmp; (void)outLen; (void)inLen; // 32 * 8 = 256 for (i = 0; i < 256; i++) { // turn 32 8bits to 256 1bit, block: in[i >> 3], bit: (i & 7) out[i] = (int8_t)((in[i >> 3] >> (i & 7)) & 1); } // 32 * 8 = 256 for (i = 0; i < 256; i++) { if (out[i] == 0) { continue; } for (j = 1; j <= 6 && (i + j) < 256; j++) { // check next 6 since 2^6 - 2^5 = 16 > 15, 256 is array length if (out[i + j] == 0) { continue; } // range 15 to -15 tmp = (int8_t)((uint8_t)(out[i + j]) << j); if (out[i] + tmp <= 15) { // max 15, 0x1, 0x1, 0x1, 0x1 , 0 -> 0x1111, 0, 0, 0, 0 out[i] += tmp; out[i + j] = 0; } else if (out[i] - tmp >= -15) { // min -15, 0x1111, 0, 0, 0, 1, 1 -> -1, 0, 0, 0, 0, 1 out[i] -= tmp; FlipK(out, i + j); } else { break; } } } } // Base on article "High-speed high-security signatures" // stores B, 3B, 5B, 7B, 9B, 11B, 13B, 15B, with B as ed25519 base point static const GePre g_precomputedB[8] = { { {25967493, -14356035, 29566456, 3660896, -12694345, 4014787, 27544626, -11754271, -6079156, 2047605}, {-12545711, 934262, -2722910, 3049990, -727428, 9406986, 12720692, 5043384, 19500929, -15469378}, {-8738181, 4489570, 9688441, -14785194, 10184609, -12363380, 29287919, 11864899, -24514362, -4438546}, }, { {15636291, -9688557, 24204773, -7912398, 616977, -16685262, 27787600, -14772189, 28944400, -1550024}, {16568933, 4717097, -11556148, -1102322, 15682896, -11807043, 16354577, -11775962, 7689662, 11199574}, {30464156, -5976125, -11779434, -15670865, 23220365, 15915852, 7512774, 10017326, -17749093, -9920357}, }, { {10861363, 11473154, 27284546, 1981175, -30064349, 12577861, 32867885, 14515107, -15438304, 10819380}, {4708026, 6336745, 20377586, 9066809, -11272109, 6594696, -25653668, 12483688, -12668491, 5581306}, {19563160, 16186464, -29386857, 4097519, 10237984, -4348115, 28542350, 13850243, -23678021, -15815942}, }, { {5153746, 9909285, 1723747, -2777874, 30523605, 5516873, 19480852, 5230134, -23952439, -15175766}, {-30269007, -3463509, 7665486, 10083793, 28475525, 1649722, 20654025, 16520125, 30598449, 7715701}, {28881845, 14381568, 9657904, 3680757, -20181635, 7843316, -31400660, 1370708, 29794553, -1409300}, }, { {-22518993, -6692182, 14201702, -8745502, -23510406, 8844726, 18474211, -1361450, -13062696, 13821877}, {-6455177, -7839871, 3374702, -4740862, -27098617, -10571707, 31655028, -7212327, 18853322, -14220951}, {4566830, -12963868, -28974889, -12240689, -7602672, -2830569, -8514358, -10431137, 2207753, -3209784}, }, { {-25154831, -4185821, 29681144, 7868801, -6854661, -9423865, -12437364, -663000, -31111463, -16132436}, {25576264, -2703214, 7349804, -11814844, 16472782, 9300885, 3844789, 15725684, 171356, 6466918}, {23103977, 13316479, 9739013, -16149481, 817875, -15038942, 8965339, -14088058, -30714912, 16193877}, }, { {-33521811, 3180713, -2394130, 14003687, -16903474, -16270840, 17238398, 4729455, -18074513, 9256800}, {-25182317, -4174131, 32336398, 5036987, -21236817, 11360617, 22616405, 9761698, -19827198, 630305}, {-13720693, 2639453, -24237460, -7406481, 9494427, -5774029, -6554551, -15960994, -2449256, -14291300}, }, { {-3151181, -5046075, 9282714, 6866145, -31907062, -863023, -18940575, 15033784, 25105118, -7894876}, {-24326370, 15950226, -31801215, -14592823, -11662737, -5090925, 1573892, -2625887, 2198790, -15804619}, {-3099351, 10324967, -2241613, 7453183, -5446979, -2735503, -13812022, -16236442, -32461234, -12290683}, }, }; /* out = hash * p + s * B */ void KAMulPlusMulBase(GeE *out, const uint8_t hash[CRYPT_CURVE25519_KEYLEN], const GeE *p, const uint8_t s[CRYPT_CURVE25519_KEYLEN]) { SetExtendedBasePoint(out); GeE tmpP[8]; // stores p, 3p, 5p, 7p, 9p, 11p, 13p, 15p GeE doubleP; GeEPre preComputedP[8]; // stores p, 3p, 5p, 7p, 9p, 11p, 13p, 15p int8_t slideP[256]; int8_t slideS[256]; int32_t i; SlideReduce(slideP, 256, hash, CRYPT_CURVE25519_KEYLEN); SlideReduce(slideS, 256, s, CRYPT_CURVE25519_KEYLEN); CURVE25519_GE_COPY(tmpP[0], *p); CURVE25519_GE_COPY(doubleP, *p); PointToPrecompute(&preComputedP[0], &tmpP[0]); P1DoubleN(&doubleP, 1); for (i = 1; i < 8; i += 1) { // p, 3p, ....., 13p, 15p, total 8 PointAdd(&tmpP[i], &tmpP[i - 1], &doubleP); PointToPrecompute(&preComputedP[i], &tmpP[i]); } int32_t zeroCount = 0; i = 255; // 255 to 0 while (i >= 0 && slideP[i] == 0 && slideS[i] == 0) { i--; } for (; i >= 0; i--) { while (i >= 0 && slideP[i] == 0 && slideS[i] == 0) { zeroCount++; i--; } if (i < 0) { P1DoubleN(out, zeroCount); break; } else { P1DoubleN(out, zeroCount + 1); } zeroCount = 0; if (slideP[i] > 0) { PointAddPrecompute(out, out, &preComputedP[slideP[i] / 2]); // preComputedP[i] = (i * 2 + 1)P } else if (slideP[i] < 0) { PointSubPrecompute(out, out, &preComputedP[(-slideP[i]) / 2]); // preComputedP[i] = (i * 2 + 1)P } if (slideS[i] > 0) { GeAdd(out, &g_precomputedB[slideS[i] / 2]); // g_precomputedB[i] = (i * 2 + 1)P } else if (slideS[i] < 0) { GeSub(out, &g_precomputedB[(-slideS[i]) / 2]); // g_precomputedB[i] = (i * 2 + 1)P } } } #endif /* HITLS_CRYPTO_ED25519 */ #endif /* HITLS_CRYPTO_CURVE25519 */
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/curve25519_op.c
C
unknown
60,542
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ /* Some of these codes are adapted from https://ed25519.cr.yp.to/software.html */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include "curve25519_local.h" /* lookup table that computing y-x, y+x and 2dxy, with 512 ^ n B, n starts from 0 */ /* table is generated base on article "High-speed high-security signatures" */ static const GePre CURVE25519PRE_COMPUTE[32][8] = { { { {25967493, -14356035, 29566456, 3660896, -12694345, 4014787, 27544626, -11754271, -6079156, 2047605}, {-12545711, 934262, -2722910, 3049990, -727428, 9406986, 12720692, 5043384, 19500929, -15469378}, {-8738181, 4489570, 9688441, -14785194, 10184609, -12363380, 29287919, 11864899, -24514362, -4438546}, }, { {-12815894, -12976347, -21581243, 11784320, -25355658, -2750717, -11717903, -3814571, -358445, -10211303}, {-21703237, 6903825, 27185491, 6451973, -29577724, -9554005, -15616551, 11189268, -26829678, -5319081}, {26966642, 11152617, 32442495, 15396054, 14353839, -12752335, -3128826, -9541118, -15472047, -4166697}, }, { {15636291, -9688557, 24204773, -7912398, 616977, -16685262, 27787600, -14772189, 28944400, -1550024}, {16568933, 4717097, -11556148, -1102322, 15682896, -11807043, 16354577, -11775962, 7689662, 11199574}, {30464156, -5976125, -11779434, -15670865, 23220365, 15915852, 7512774, 10017326, -17749093, -9920357}, }, { {-17036878, 13921892, 10945806, -6033431, 27105052, -16084379, -28926210, 15006023, 3284568, -6276540}, {23599295, -8306047, -11193664, -7687416, 13236774, 10506355, 7464579, 9656445, 13059162, 10374397}, {7798556, 16710257, 3033922, 2874086, 28997861, 2835604, 32406664, -3839045, -641708, -101325}, }, { {10861363, 11473154, 27284546, 1981175, -30064349, 12577861, 32867885, 14515107, -15438304, 10819380}, {4708026, 6336745, 20377586, 9066809, -11272109, 6594696, -25653668, 12483688, -12668491, 5581306}, {19563160, 16186464, -29386857, 4097519, 10237984, -4348115, 28542350, 13850243, -23678021, -15815942}, }, { {-15371964, -12862754, 32573250, 4720197, -26436522, 5875511, -19188627, -15224819, -9818940, -12085777}, {-8549212, 109983, 15149363, 2178705, 22900618, 4543417, 3044240, -15689887, 1762328, 14866737}, {-18199695, -15951423, -10473290, 1707278, -17185920, 3916101, -28236412, 3959421, 27914454, 4383652}, }, { {5153746, 9909285, 1723747, -2777874, 30523605, 5516873, 19480852, 5230134, -23952439, -15175766}, {-30269007, -3463509, 7665486, 10083793, 28475525, 1649722, 20654025, 16520125, 30598449, 7715701}, {28881845, 14381568, 9657904, 3680757, -20181635, 7843316, -31400660, 1370708, 29794553, -1409300}, }, { {14499471, -2729599, -33191113, -4254652, 28494862, 14271267, 30290735, 10876454, -33154098, 2381726}, {-7195431, -2655363, -14730155, 462251, -27724326, 3941372, -6236617, 3696005, -32300832, 15351955}, {27431194, 8222322, 16448760, -3907995, -18707002, 11938355, -32961401, -2970515, 29551813, 10109425}, }, }, { { {-13657040, -13155431, -31283750, 11777098, 21447386, 6519384, -2378284, -1627556, 10092783, -4764171}, {27939166, 14210322, 4677035, 16277044, -22964462, -12398139, -32508754, 12005538, -17810127, 12803510}, {17228999, -15661624, -1233527, 300140, -1224870, -11714777, 30364213, -9038194, 18016357, 4397660}, }, { {-10958843, -7690207, 4776341, -14954238, 27850028, -15602212, -26619106, 14544525, -17477504, 982639}, {29253598, 15796703, -2863982, -9908884, 10057023, 3163536, 7332899, -4120128, -21047696, 9934963}, {5793303, 16271923, -24131614, -10116404, 29188560, 1206517, -14747930, 4559895, -30123922, -10897950}, }, { {-27643952, -11493006, 16282657, -11036493, 28414021, -15012264, 24191034, 4541697, -13338309, 5500568}, {12650548, -1497113, 9052871, 11355358, -17680037, -8400164, -17430592, 12264343, 10874051, 13524335}, {25556948, -3045990, 714651, 2510400, 23394682, -10415330, 33119038, 5080568, -22528059, 5376628}, }, { {-26088264, -4011052, -17013699, -3537628, -6726793, 1920897, -22321305, -9447443, 4535768, 1569007}, {-2255422, 14606630, -21692440, -8039818, 28430649, 8775819, -30494562, 3044290, 31848280, 12543772}, {-22028579, 2943893, -31857513, 6777306, 13784462, -4292203, -27377195, -2062731, 7718482, 14474653}, }, { {2385315, 2454213, -22631320, 46603, -4437935, -15680415, 656965, -7236665, 24316168, -5253567}, {13741529, 10911568, -33233417, -8603737, -20177830, -1033297, 33040651, -13424532, -20729456, 8321686}, {21060490, -2212744, 15712757, -4336099, 1639040, 10656336, 23845965, -11874838, -9984458, 608372}, }, { {-13672732, -15087586, -10889693, -7557059, -6036909, 11305547, 1123968, -6780577, 27229399, 23887}, {-23244140, -294205, -11744728, 14712571, -29465699, -2029617, 12797024, -6440308, -1633405, 16678954}, {-29500620, 4770662, -16054387, 14001338, 7830047, 9564805, -1508144, -4795045, -17169265, 4904953}, }, { {24059557, 14617003, 19037157, -15039908, 19766093, -14906429, 5169211, 16191880, 2128236, -4326833}, {-16981152, 4124966, -8540610, -10653797, 30336522, -14105247, -29806336, 916033, -6882542, -2986532}, {-22630907, 12419372, -7134229, -7473371, -16478904, 16739175, 285431, 2763829, 15736322, 4143876}, }, { {2379352, 11839345, -4110402, -5988665, 11274298, 794957, 212801, -14594663, 23527084, -16458268}, {33431127, -11130478, -17838966, -15626900, 8909499, 8376530, -32625340, 4087881, -15188911, -14416214}, {1767683, 7197987, -13205226, -2022635, -13091350, 448826, 5799055, 4357868, -4774191, -16323038}, }, }, { { {6721966, 13833823, -23523388, -1551314, 26354293, -11863321, 23365147, -3949732, 7390890, 2759800}, {4409041, 2052381, 23373853, 10530217, 7676779, -12885954, 21302353, -4264057, 1244380, -12919645}, {-4421239, 7169619, 4982368, -2957590, 30256825, -2777540, 14086413, 9208236, 15886429, 16489664}, }, { {1996075, 10375649, 14346367, 13311202, -6874135, -16438411, -13693198, 398369, -30606455, -712933}, {-25307465, 9795880, -2777414, 14878809, -33531835, 14780363, 13348553, 12076947, -30836462, 5113182}, {-17770784, 11797796, 31950843, 13929123, -25888302, 12288344, -30341101, -7336386, 13847711, 5387222}, }, { {-18582163, -3416217, 17824843, -2340966, 22744343, -10442611, 8763061, 3617786, -19600662, 10370991}, {20246567, -14369378, 22358229, -543712, 18507283, -10413996, 14554437, -8746092, 32232924, 16763880}, {9648505, 10094563, 26416693, 14745928, -30374318, -6472621, 11094161, 15689506, 3140038, -16510092}, }, { {-16160072, 5472695, 31895588, 4744994, 8823515, 10365685, -27224800, 9448613, -28774454, 366295}, {19153450, 11523972, -11096490, -6503142, -24647631, 5420647, 28344573, 8041113, 719605, 11671788}, {8678025, 2694440, -6808014, 2517372, 4964326, 11152271, -15432916, -15266516, 27000813, -10195553}, }, { {-15157904, 7134312, 8639287, -2814877, -7235688, 10421742, 564065, 5336097, 6750977, -14521026}, {11836410, -3979488, 26297894, 16080799, 23455045, 15735944, 1695823, -8819122, 8169720, 16220347}, {-18115838, 8653647, 17578566, -6092619, -8025777, -16012763, -11144307, -2627664, -5990708, -14166033}, }, { {-23308498, -10968312, 15213228, -10081214, -30853605, -11050004, 27884329, 2847284, 2655861, 1738395}, {-27537433, -14253021, -25336301, -8002780, -9370762, 8129821, 21651608, -3239336, -19087449, -11005278}, {1533110, 3437855, 23735889, 459276, 29970501, 11335377, 26030092, 5821408, 10478196, 8544890}, }, { {32173121, -16129311, 24896207, 3921497, 22579056, -3410854, 19270449, 12217473, 17789017, -3395995}, {-30552961, -2228401, -15578829, -10147201, 13243889, 517024, 15479401, -3853233, 30460520, 1052596}, {-11614875, 13323618, 32618793, 8175907, -15230173, 12596687, 27491595, -4612359, 3179268, -9478891}, }, { {31947069, -14366651, -4640583, -15339921, -15125977, -6039709, -14756777, -16411740, 19072640, -9511060}, {11685058, 11822410, 3158003, -13952594, 33402194, -4165066, 5977896, -5215017, 473099, 5040608}, {-20290863, 8198642, -27410132, 11602123, 1290375, -2799760, 28326862, 1721092, -19558642, -3131606}, }, }, { { {7881532, 10687937, 7578723, 7738378, -18951012, -2553952, 21820786, 8076149, -27868496, 11538389}, {-19935666, 3899861, 18283497, -6801568, -15728660, -11249211, 8754525, 7446702, -5676054, 5797016}, {-11295600, -3793569, -15782110, -7964573, 12708869, -8456199, 2014099, -9050574, -2369172, -5877341}, }, { {-22472376, -11568741, -27682020, 1146375, 18956691, 16640559, 1192730, -3714199, 15123619, 10811505}, {14352098, -3419715, -18942044, 10822655, 32750596, 4699007, -70363, 15776356, -28886779, -11974553}, {-28241164, -8072475, -4978962, -5315317, 29416931, 1847569, -20654173, -16484855, 4714547, -9600655}, }, { {15200332, 8368572, 19679101, 15970074, -31872674, 1959451, 24611599, -4543832, -11745876, 12340220}, {12876937, -10480056, 33134381, 6590940, -6307776, 14872440, 9613953, 8241152, 15370987, 9608631}, {-4143277, -12014408, 8446281, -391603, 4407738, 13629032, -7724868, 15866074, -28210621, -8814099}, }, { {26660628, -15677655, 8393734, 358047, -7401291, 992988, -23904233, 858697, 20571223, 8420556}, {14620715, 13067227, -15447274, 8264467, 14106269, 15080814, 33531827, 12516406, -21574435, -12476749}, {236881, 10476226, 57258, -14677024, 6472998, 2466984, 17258519, 7256740, 8791136, 15069930}, }, { {1276410, -9371918, 22949635, -16322807, -23493039, -5702186, 14711875, 4874229, -30663140, -2331391}, {5855666, 4990204, -13711848, 7294284, -7804282, 1924647, -1423175, -7912378, -33069337, 9234253}, {20590503, -9018988, 31529744, -7352666, -2706834, 10650548, 31559055, -11609587, 18979186, 13396066}, }, { {24474287, 4968103, 22267082, 4407354, 24063882, -8325180, -18816887, 13594782, 33514650, 7021958}, {-11566906, -6565505, -21365085, 15928892, -26158305, 4315421, -25948728, -3916677, -21480480, 12868082}, {-28635013, 13504661, 19988037, -2132761, 21078225, 6443208, -21446107, 2244500, -12455797, -8089383}, }, { {-30595528, 13793479, -5852820, 319136, -25723172, -6263899, 33086546, 8957937, -15233648, 5540521}, {-11630176, -11503902, -8119500, -7643073, 2620056, 1022908, -23710744, -1568984, -16128528, -14962807}, {23152971, 775386, 27395463, 14006635, -9701118, 4649512, 1689819, 892185, -11513277, -15205948}, }, { {9770129, 9586738, 26496094, 4324120, 1556511, -3550024, 27453819, 4763127, -19179614, 5867134}, {-32765025, 1927590, 31726409, -4753295, 23962434, -16019500, 27846559, 5931263, -29749703, -16108455}, {27461885, -2977536, 22380810, 1815854, -23033753, -3031938, 7283490, -15148073, -19526700, 7734629}, }, }, { { {-8010264, -9590817, -11120403, 6196038, 29344158, -13430885, 7585295, -3176626, 18549497, 15302069}, {-32658337, -6171222, -7672793, -11051681, 6258878, 13504381, 10458790, -6418461, -8872242, 8424746}, {24687205, 8613276, -30667046, -3233545, 1863892, -1830544, 19206234, 7134917, -11284482, -828919}, }, { {11334899, -9218022, 8025293, 12707519, 17523892, -10476071, 10243738, -14685461, -5066034, 16498837}, {8911542, 6887158, -9584260, -6958590, 11145641, -9543680, 17303925, -14124238, 6536641, 10543906}, {-28946384, 15479763, -17466835, 568876, -1497683, 11223454, -2669190, -16625574, -27235709, 8876771}, }, { {-25742899, -12566864, -15649966, -846607, -33026686, -796288, -33481822, 15824474, -604426, -9039817}, {10330056, 70051, 7957388, -9002667, 9764902, 15609756, 27698697, -4890037, 1657394, 3084098}, {10477963, -7470260, 12119566, -13250805, 29016247, -5365589, 31280319, 14396151, -30233575, 15272409}, }, { {-12288309, 3169463, 28813183, 16658753, 25116432, -5630466, -25173957, -12636138, -25014757, 1950504}, {-26180358, 9489187, 11053416, -14746161, -31053720, 5825630, -8384306, -8767532, 15341279, 8373727}, {28685821, 7759505, -14378516, -12002860, -31971820, 4079242, 298136, -10232602, -2878207, 15190420}, }, { {-32932876, 13806336, -14337485, -15794431, -24004620, 10940928, 8669718, 2742393, -26033313, -6875003}, {-1580388, -11729417, -25979658, -11445023, -17411874, -10912854, 9291594, -16247779, -12154742, 6048605}, {-30305315, 14843444, 1539301, 11864366, 20201677, 1900163, 13934231, 5128323, 11213262, 9168384}, }, { {-26280513, 11007847, 19408960, -940758, -18592965, -4328580, -5088060, -11105150, 20470157, -16398701}, {-23136053, 9282192, 14855179, -15390078, -7362815, -14408560, -22783952, 14461608, 14042978, 5230683}, {29969567, -2741594, -16711867, -8552442, 9175486, -2468974, 21556951, 3506042, -5933891, -12449708}, }, { {-3144746, 8744661, 19704003, 4581278, -20430686, 6830683, -21284170, 8971513, -28539189, 15326563}, {-19464629, 10110288, -17262528, -3503892, -23500387, 1355669, -15523050, 15300988, -20514118, 9168260}, {-5353335, 4488613, -23803248, 16314347, 7780487, -15638939, -28948358, 9601605, 33087103, -9011387}, }, { {-19443170, -15512900, -20797467, -12445323, -29824447, 10229461, -27444329, -15000531, -5996870, 15664672}, {23294591, -16632613, -22650781, -8470978, 27844204, 11461195, 13099750, -2460356, 18151676, 13417686}, {-24722913, -4176517, -31150679, 5988919, -26858785, 6685065, 1661597, -12551441, 15271676, -15452665}, }, }, { { {11433042, -13228665, 8239631, -5279517, -1985436, -725718, -18698764, 2167544, -6921301, -13440182}, {-31436171, 15575146, 30436815, 12192228, -22463353, 9395379, -9917708, -8638997, 12215110, 12028277}, {14098400, 6555944, 23007258, 5757252, -15427832, -12950502, 30123440, 4617780, -16900089, -655628}, }, { {-4026201, -15240835, 11893168, 13718664, -14809462, 1847385, -15819999, 10154009, 23973261, -12684474}, {-26531820, -3695990, -1908898, 2534301, -31870557, -16550355, 18341390, -11419951, 32013174, -10103539}, {-25479301, 10876443, -11771086, -14625140, -12369567, 1838104, 21911214, 6354752, 4425632, -837822}, }, { {-10433389, -14612966, 22229858, -3091047, -13191166, 776729, -17415375, -12020462, 4725005, 14044970}, {19268650, -7304421, 1555349, 8692754, -21474059, -9910664, 6347390, -1411784, -19522291, -16109756}, {-24864089, 12986008, -10898878, -5558584, -11312371, -148526, 19541418, 8180106, 9282262, 10282508}, }, { {-26205082, 4428547, -8661196, -13194263, 4098402, -14165257, 15522535, 8372215, 5542595, -10702683}, {-10562541, 14895633, 26814552, -16673850, -17480754, -2489360, -2781891, 6993761, -18093885, 10114655}, {-20107055, -929418, 31422704, 10427861, -7110749, 6150669, -29091755, -11529146, 25953725, -106158}, }, { {-4234397, -8039292, -9119125, 3046000, 2101609, -12607294, 19390020, 6094296, -3315279, 12831125}, {-15998678, 7578152, 5310217, 14408357, -33548620, -224739, 31575954, 6326196, 7381791, -2421839}, {-20902779, 3296811, 24736065, -16328389, 18374254, 7318640, 6295303, 8082724, -15362489, 12339664}, }, { {27724736, 2291157, 6088201, -14184798, 1792727, 5857634, 13848414, 15768922, 25091167, 14856294}, {-18866652, 8331043, 24373479, 8541013, -701998, -9269457, 12927300, -12695493, -22182473, -9012899}, {-11423429, -5421590, 11632845, 3405020, 30536730, -11674039, -27260765, 13866390, 30146206, 9142070}, }, { {3924129, -15307516, -13817122, -10054960, 12291820, -668366, -27702774, 9326384, -8237858, 4171294}, {-15921940, 16037937, 6713787, 16606682, -21612135, 2790944, 26396185, 3731949, 345228, -5462949}, {-21327538, 13448259, 25284571, 1143661, 20614966, -8849387, 2031539, -12391231, -16253183, -13582083}, }, { {31016211, -16722429, 26371392, -14451233, -5027349, 14854137, 17477601, 3842657, 28012650, -16405420}, {-5075835, 9368966, -8562079, -4600902, -15249953, 6970560, -9189873, 16292057, -8867157, 3507940}, {29439664, 3537914, 23333589, 6997794, -17555561, -11018068, -15209202, -15051267, -9164929, 6580396}, }, }, { { {-12185861, -7679788, 16438269, 10826160, -8696817, -6235611, 17860444, -9273846, -2095802, 9304567}, {20714564, -4336911, 29088195, 7406487, 11426967, -5095705, 14792667, -14608617, 5289421, -477127}, {-16665533, -10650790, -6160345, -13305760, 9192020, -1802462, 17271490, 12349094, 26939669, -3752294}, }, { {-12889898, 9373458, 31595848, 16374215, 21471720, 13221525, -27283495, -12348559, -3698806, 117887}, {22263325, -6560050, 3984570, -11174646, -15114008, -566785, 28311253, 5358056, -23319780, 541964}, {16259219, 3261970, 2309254, -15534474, -16885711, -4581916, 24134070, -16705829, -13337066, -13552195}, }, { {9378160, -13140186, -22845982, -12745264, 28198281, -7244098, -2399684, -717351, 690426, 14876244}, {24977353, -314384, -8223969, -13465086, 28432343, -1176353, -13068804, -12297348, -22380984, 6618999}, {-1538174, 11685646, 12944378, 13682314, -24389511, -14413193, 8044829, -13817328, 32239829, -5652762}, }, { {-18603066, 4762990, -926250, 8885304, -28412480, -3187315, 9781647, -10350059, 32779359, 5095274}, {-33008130, -5214506, -32264887, -3685216, 9460461, -9327423, -24601656, 14506724, 21639561, -2630236}, {-16400943, -13112215, 25239338, 15531969, 3987758, -4499318, -1289502, -6863535, 17874574, 558605}, }, { {-13600129, 10240081, 9171883, 16131053, -20869254, 9599700, 33499487, 5080151, 2085892, 5119761}, {-22205145, -2519528, -16381601, 414691, -25019550, 2170430, 30634760, -8363614, -31999993, -5759884}, {-6845704, 15791202, 8550074, -1312654, 29928809, -12092256, 27534430, -7192145, -22351378, 12961482}, }, { {-24492060, -9570771, 10368194, 11582341, -23397293, -2245287, 16533930, 8206996, -30194652, -5159638}, {-11121496, -3382234, 2307366, 6362031, -135455, 8868177, -16835630, 7031275, 7589640, 8945490}, {-32152748, 8917967, 6661220, -11677616, -1192060, -15793393, 7251489, -11182180, 24099109, -14456170}, }, { {5019558, -7907470, 4244127, -14714356, -26933272, 6453165, -19118182, -13289025, -6231896, -10280736}, {10853594, 10721687, 26480089, 5861829, -22995819, 1972175, -1866647, -10557898, -3363451, -6441124}, {-17002408, 5906790, 221599, -6563147, 7828208, -13248918, 24362661, -2008168, -13866408, 7421392}, }, { {8139927, -6546497, 32257646, -5890546, 30375719, 1886181, -21175108, 15441252, 28826358, -4123029}, {6267086, 9695052, 7709135, -16603597, -32869068, -1886135, 14795160, -7840124, 13746021, -1742048}, {28584902, 7787108, -6732942, -15050729, 22846041, -7571236, -3181936, -363524, 4771362, -8419958}, }, }, { { {24949256, 6376279, -27466481, -8174608, -18646154, -9930606, 33543569, -12141695, 3569627, 11342593}, {26514989, 4740088, 27912651, 3697550, 19331575, -11472339, 6809886, 4608608, 7325975, -14801071}, {-11618399, -14554430, -24321212, 7655128, -1369274, 5214312, -27400540, 10258390, -17646694, -8186692}, }, { {11431204, 15823007, 26570245, 14329124, 18029990, 4796082, -31446179, 15580664, 9280358, -3973687}, {-160783, -10326257, -22855316, -4304997, -20861367, -13621002, -32810901, -11181622, -15545091, 4387441}, {-20799378, 12194512, 3937617, -5805892, -27154820, 9340370, -24513992, 8548137, 20617071, -7482001}, }, { {-938825, -3930586, -8714311, 16124718, 24603125, -6225393, -13775352, -11875822, 24345683, 10325460}, {-19855277, -1568885, -22202708, 8714034, 14007766, 6928528, 16318175, -1010689, 4766743, 3552007}, {-21751364, -16730916, 1351763, -803421, -4009670, 3950935, 3217514, 14481909, 10988822, -3994762}, }, { {15564307, -14311570, 3101243, 5684148, 30446780, -8051356, 12677127, -6505343, -8295852, 13296005}, {-9442290, 6624296, -30298964, -11913677, -4670981, -2057379, 31521204, 9614054, -30000824, 12074674}, {4771191, -135239, 14290749, -13089852, 27992298, 14998318, -1413936, -1556716, 29832613, -16391035}, }, { {7064884, -7541174, -19161962, -5067537, -18891269, -2912736, 25825242, 5293297, -27122660, 13101590}, {-2298563, 2439670, -7466610, 1719965, -27267541, -16328445, 32512469, -5317593, -30356070, -4190957}, {-30006540, 10162316, -33180176, 3981723, -16482138, -13070044, 14413974, 9515896, 19568978, 9628812}, }, { {33053803, 199357, 15894591, 1583059, 27380243, -4580435, -17838894, -6106839, -6291786, 3437740}, {-18978877, 3884493, 19469877, 12726490, 15913552, 13614290, -22961733, 70104, 7463304, 4176122}, {-27124001, 10659917, 11482427, -16070381, 12771467, -6635117, -32719404, -5322751, 24216882, 5944158}, }, { {8894125, 7450974, -2664149, -9765752, -28080517, -12389115, 19345746, 14680796, 11632993, 5847885}, {26942781, -2315317, 9129564, -4906607, 26024105, 11769399, -11518837, 6367194, -9727230, 4782140}, {19916461, -4828410, -22910704, -11414391, 25606324, -5972441, 33253853, 8220911, 6358847, -1873857}, }, { {801428, -2081702, 16569428, 11065167, 29875704, 96627, 7908388, -4480480, -13538503, 1387155}, {19646058, 5720633, -11416706, 12814209, 11607948, 12749789, 14147075, 15156355, -21866831, 11835260}, {19299512, 1155910, 28703737, 14890794, 2925026, 7269399, 26121523, 15467869, -26560550, 5052483}, }, }, { { {-3017432, 10058206, 1980837, 3964243, 22160966, 12322533, -6431123, -12618185, 12228557, -7003677}, {32944382, 14922211, -22844894, 5188528, 21913450, -8719943, 4001465, 13238564, -6114803, 8653815}, {22865569, -4652735, 27603668, -12545395, 14348958, 8234005, 24808405, 5719875, 28483275, 2841751}, }, { {-16420968, -1113305, -327719, -12107856, 21886282, -15552774, -1887966, -315658, 19932058, -12739203}, {-11656086, 10087521, -8864888, -5536143, -19278573, -3055912, 3999228, 13239134, -4777469, -13910208}, {1382174, -11694719, 17266790, 9194690, -13324356, 9720081, 20403944, 11284705, -14013818, 3093230}, }, { {16650921, -11037932, -1064178, 1570629, -8329746, 7352753, -302424, 16271225, -24049421, -6691850}, {-21911077, -5927941, -4611316, -5560156, -31744103, -10785293, 24123614, 15193618, -21652117, -16739389}, {-9935934, -4289447, -25279823, 4372842, 2087473, 10399484, 31870908, 14690798, 17361620, 11864968}, }, { {-11307610, 6210372, 13206574, 5806320, -29017692, -13967200, -12331205, -7486601, -25578460, -16240689}, {14668462, -12270235, 26039039, 15305210, 25515617, 4542480, 10453892, 6577524, 9145645, -6443880}, {5974874, 3053895, -9433049, -10385191, -31865124, 3225009, -7972642, 3936128, -5652273, -3050304}, }, { {30625386, -4729400, -25555961, -12792866, -20484575, 7695099, 17097188, -16303496, -27999779, 1803632}, {-3553091, 9865099, -5228566, 4272701, -5673832, -16689700, 14911344, 12196514, -21405489, 7047412}, {20093277, 9920966, -11138194, -5343857, 13161587, 12044805, -32856851, 4124601, -32343828, -10257566}, }, { {-20788824, 14084654, -13531713, 7842147, 19119038, -13822605, 4752377, -8714640, -21679658, 2288038}, {-26819236, -3283715, 29965059, 3039786, -14473765, 2540457, 29457502, 14625692, -24819617, 12570232}, {-1063558, -11551823, 16920318, 12494842, 1278292, -5869109, -21159943, -3498680, -11974704, 4724943}, }, { {17960970, -11775534, -4140968, -9702530, -8876562, -1410617, -12907383, -8659932, -29576300, 1903856}, {23134274, -14279132, -10681997, -1611936, 20684485, 15770816, -12989750, 3190296, 26955097, 14109738}, {15308788, 5320727, -30113809, -14318877, 22902008, 7767164, 29425325, -11277562, 31960942, 11934971}, }, { {-27395711, 8435796, 4109644, 12222639, -24627868, 14818669, 20638173, 4875028, 10491392, 1379718}, {-13159415, 9197841, 3875503, -8936108, -1383712, -5879801, 33518459, 16176658, 21432314, 12180697}, {-11787308, 11500838, 13787581, -13832590, -22430679, 10140205, 1465425, 12689540, -10301319, -13872883}, }, }, { { {5414091, -15386041, -21007664, 9643570, 12834970, 1186149, -2622916, -1342231, 26128231, 6032912}, {-26337395, -13766162, 32496025, -13653919, 17847801, -12669156, 3604025, 8316894, -25875034, -10437358}, {3296484, 6223048, 24680646, -12246460, -23052020, 5903205, -8862297, -4639164, 12376617, 3188849}, }, { {29190488, -14659046, 27549113, -1183516, 3520066, -10697301, 32049515, -7309113, -16109234, -9852307}, {-14744486, -9309156, 735818, -598978, -20407687, -5057904, 25246078, -15795669, 18640741, -960977}, {-6928835, -16430795, 10361374, 5642961, 4910474, 12345252, -31638386, -494430, 10530747, 1053335}, }, { {-29265967, -14186805, -13538216, -12117373, -19457059, -10655384, -31462369, -2948985, 24018831, 15026644}, {-22592535, -3145277, -2289276, 5953843, -13440189, 9425631, 25310643, 13003497, -2314791, -15145616}, {-27419985, -603321, -8043984, -1669117, -26092265, 13987819, -27297622, 187899, -23166419, -2531735}, }, { {-21744398, -13810475, 1844840, 5021428, -10434399, -15911473, 9716667, 16266922, -5070217, 726099}, {29370922, -6053998, 7334071, -15342259, 9385287, 2247707, -13661962, -4839461, 30007388, -15823341}, {-936379, 16086691, 23751945, -543318, -1167538, -5189036, 9137109, 730663, 9835848, 4555336}, }, { {-23376435, 1410446, -22253753, -12899614, 30867635, 15826977, 17693930, 544696, -11985298, 12422646}, {31117226, -12215734, -13502838, 6561947, -9876867, -12757670, -5118685, -4096706, 29120153, 13924425}, {-17400879, -14233209, 19675799, -2734756, -11006962, -5858820, -9383939, -11317700, 7240931, -237388}, }, { {-31361739, -11346780, -15007447, -5856218, -22453340, -12152771, 1222336, 4389483, 3293637, -15551743}, {-16684801, -14444245, 11038544, 11054958, -13801175, -3338533, -24319580, 7733547, 12796905, -6335822}, {-8759414, -10817836, -25418864, 10783769, -30615557, -9746811, -28253339, 3647836, 3222231, -11160462}, }, { {18606113, 1693100, -25448386, -15170272, 4112353, 10045021, 23603893, -2048234, -7550776, 2484985}, {9255317, -3131197, -12156162, -1004256, 13098013, -9214866, 16377220, -2102812, -19802075, -3034702}, {-22729289, 7496160, -5742199, 11329249, 19991973, -3347502, -31718148, 9936966, -30097688, -10618797}, }, { {21878590, -5001297, 4338336, 13643897, -3036865, 13160960, 19708896, 5415497, -7360503, -4109293}, {27736861, 10103576, 12500508, 8502413, -3413016, -9633558, 10436918, -1550276, -23659143, -8132100}, {19492550, -12104365, -29681976, -852630, -3208171, 12403437, 30066266, 8367329, 13243957, 8709688}, }, }, { { {12015105, 2801261, 28198131, 10151021, 24818120, -4743133, -11194191, -5645734, 5150968, 7274186}, {2831366, -12492146, 1478975, 6122054, 23825128, -12733586, 31097299, 6083058, 31021603, -9793610}, {-2529932, -2229646, 445613, 10720828, -13849527, -11505937, -23507731, 16354465, 15067285, -14147707}, }, { {7840942, 14037873, -33364863, 15934016, -728213, -3642706, 21403988, 1057586, -19379462, -12403220}, {915865, -16469274, 15608285, -8789130, -24357026, 6060030, -17371319, 8410997, -7220461, 16527025}, {32922597, -556987, 20336074, -16184568, 10903705, -5384487, 16957574, 52992, 23834301, 6588044}, }, { {32752030, 11232950, 3381995, -8714866, 22652988, -10744103, 17159699, 16689107, -20314580, -1305992}, {-4689649, 9166776, -25710296, -10847306, 11576752, 12733943, 7924251, -2752281, 1976123, -7249027}, {21251222, 16309901, -2983015, -6783122, 30810597, 12967303, 156041, -3371252, 12331345, -8237197}, }, { {8651614, -4477032, -16085636, -4996994, 13002507, 2950805, 29054427, -5106970, 10008136, -4667901}, {31486080, 15114593, -14261250, 12951354, 14369431, -7387845, 16347321, -13662089, 8684155, -10532952}, {19443825, 11385320, 24468943, -9659068, -23919258, 2187569, -26263207, -6086921, 31316348, 14219878}, }, { {-28594490, 1193785, 32245219, 11392485, 31092169, 15722801, 27146014, 6992409, 29126555, 9207390}, {32382935, 1110093, 18477781, 11028262, -27411763, -7548111, -4980517, 10843782, -7957600, -14435730}, {2814918, 7836403, 27519878, -7868156, -20894015, -11553689, -21494559, 8550130, 28346258, 1994730}, }, { {-19578299, 8085545, -14000519, -3948622, 2785838, -16231307, -19516951, 7174894, 22628102, 8115180}, {-30405132, 955511, -11133838, -15078069, -32447087, -13278079, -25651578, 3317160, -9943017, 930272}, {-15303681, -6833769, 28856490, 1357446, 23421993, 1057177, 24091212, -1388970, -22765376, -10650715}, }, { {-22751231, -5303997, -12907607, -12768866, -15811511, -7797053, -14839018, -16554220, -1867018, 8398970}, {-31969310, 2106403, -4736360, 1362501, 12813763, 16200670, 22981545, -6291273, 18009408, -15772772}, {-17220923, -9545221, -27784654, 14166835, 29815394, 7444469, 29551787, -3727419, 19288549, 1325865}, }, { {15100157, -15835752, -23923978, -1005098, -26450192, 15509408, 12376730, -3479146, 33166107, -8042750}, {20909231, 13023121, -9209752, 16251778, -5778415, -8094914, 12412151, 10018715, 2213263, -13878373}, {32529814, -11074689, 30361439, -16689753, -9135940, 1513226, 22922121, 6382134, -5766928, 8371348}, }, }, { { {9923462, 11271500, 12616794, 3544722, -29998368, -1721626, 12891687, -8193132, -26442943, 10486144}, {-22597207, -7012665, 8587003, -8257861, 4084309, -12970062, 361726, 2610596, -23921530, -11455195}, {5408411, -1136691, -4969122, 10561668, 24145918, 14240566, 31319731, -4235541, 19985175, -3436086}, }, { {-13994457, 16616821, 14549246, 3341099, 32155958, 13648976, -17577068, 8849297, 65030, 8370684}, {-8320926, -12049626, 31204563, 5839400, -20627288, -1057277, -19442942, 6922164, 12743482, -9800518}, {-2361371, 12678785, 28815050, 4759974, -23893047, 4884717, 23783145, 11038569, 18800704, 255233}, }, { {-5269658, -1773886, 13957886, 7990715, 23132995, 728773, 13393847, 9066957, 19258688, -14753793}, {-2936654, -10827535, -10432089, 14516793, -3640786, 4372541, -31934921, 2209390, -1524053, 2055794}, {580882, 16705327, 5468415, -2683018, -30926419, -14696000, -7203346, -8994389, -30021019, 7394435}, }, { {23838809, 1822728, -15738443, 15242727, 8318092, -3733104, -21672180, -3492205, -4821741, 14799921}, {13345610, 9759151, 3371034, -16137791, 16353039, 8577942, 31129804, 13496856, -9056018, 7402518}, {2286874, -4435931, -20042458, -2008336, -13696227, 5038122, 11006906, -15760352, 8205061, 1607563}, }, { {14414086, -8002132, 3331830, -3208217, 22249151, -5594188, 18364661, -2906958, 30019587, -9029278}, {-27688051, 1585953, -10775053, 931069, -29120221, -11002319, -14410829, 12029093, 9944378, 8024}, {4368715, -3709630, 29874200, -15022983, -20230386, -11410704, -16114594, -999085, -8142388, 5640030}, }, { {10299610, 13746483, 11661824, 16234854, 7630238, 5998374, 9809887, -16694564, 15219798, -14327783}, {27425505, -5719081, 3055006, 10660664, 23458024, 595578, -15398605, -1173195, -18342183, 9742717}, {6744077, 2427284, 26042789, 2720740, -847906, 1118974, 32324614, 7406442, 12420155, 1994844}, }, { {14012521, -5024720, -18384453, -9578469, -26485342, -3936439, -13033478, -10909803, 24319929, -6446333}, {16412690, -4507367, 10772641, 15929391, -17068788, -4658621, 10555945, -10484049, -30102368, -4739048}, {22397382, -7767684, -9293161, -12792868, 17166287, -9755136, -27333065, 6199366, 21880021, -12250760}, }, { {-4283307, 5368523, -31117018, 8163389, -30323063, 3209128, 16557151, 8890729, 8840445, 4957760}, {-15447727, 709327, -6919446, -10870178, -29777922, 6522332, -21720181, 12130072, -14796503, 5005757}, {-2114751, -14308128, 23019042, 15765735, -25269683, 6002752, 10183197, -13239326, -16395286, -2176112}, }, }, { { {-19025756, 1632005, 13466291, -7995100, -23640451, 16573537, -32013908, -3057104, 22208662, 2000468}, {3065073, -1412761, -25598674, -361432, -17683065, -5703415, -8164212, 11248527, -3691214, -7414184}, {10379208, -6045554, 8877319, 1473647, -29291284, -12507580, 16690915, 2553332, -3132688, 16400289}, }, { {15716668, 1254266, -18472690, 7446274, -8448918, 6344164, -22097271, -7285580, 26894937, 9132066}, {24158887, 12938817, 11085297, -8177598, -28063478, -4457083, -30576463, 64452, -6817084, -2692882}, {13488534, 7794716, 22236231, 5989356, 25426474, -12578208, 2350710, -3418511, -4688006, 2364226}, }, { {16335052, 9132434, 25640582, 6678888, 1725628, 8517937, -11807024, -11697457, 15445875, -7798101}, {29004207, -7867081, 28661402, -640412, -12794003, -7943086, 31863255, -4135540, -278050, -15759279}, {-6122061, -14866665, -28614905, 14569919, -10857999, -3591829, 10343412, -6976290, -29828287, -10815811}, }, { {27081650, 3463984, 14099042, -4517604, 1616303, -6205604, 29542636, 15372179, 17293797, 960709}, {20263915, 11434237, -5765435, 11236810, 13505955, -10857102, -16111345, 6493122, -19384511, 7639714}, {-2830798, -14839232, 25403038, -8215196, -8317012, -16173699, 18006287, -16043750, 29994677, -15808121}, }, { {9769828, 5202651, -24157398, -13631392, -28051003, -11561624, -24613141, -13860782, -31184575, 709464}, {12286395, 13076066, -21775189, -1176622, -25003198, 4057652, -32018128, -8890874, 16102007, 13205847}, {13733362, 5599946, 10557076, 3195751, -5557991, 8536970, -25540170, 8525972, 10151379, 10394400}, }, { {4024660, -16137551, 22436262, 12276534, -9099015, -2686099, 19698229, 11743039, -33302334, 8934414}, {-15879800, -4525240, -8580747, -2934061, 14634845, -698278, -9449077, 3137094, -11536886, 11721158}, {17555939, -5013938, 8268606, 2331751, -22738815, 9761013, 9319229, 8835153, -9205489, -1280045}, }, { {-461409, -7830014, 20614118, 16688288, -7514766, -4807119, 22300304, 505429, 6108462, -6183415}, {-5070281, 12367917, -30663534, 3234473, 32617080, -8422642, 29880583, -13483331, -26898490, -7867459}, {-31975283, 5726539, 26934134, 10237677, -3173717, -605053, 24199304, 3795095, 7592688, -14992079}, }, { {21594432, -14964228, 17466408, -4077222, 32537084, 2739898, 6407723, 12018833, -28256052, 4298412}, {-20650503, -11961496, -27236275, 570498, 3767144, -1717540, 13891942, -1569194, 13717174, 10805743}, {-14676630, -15644296, 15287174, 11927123, 24177847, -8175568, -796431, 14860609, -26938930, -5863836}, }, }, { { {12962541, 5311799, -10060768, 11658280, 18855286, -7954201, 13286263, -12808704, -4381056, 9882022}, {18512079, 11319350, -20123124, 15090309, 18818594, 5271736, -22727904, 3666879, -23967430, -3299429}, {-6789020, -3146043, 16192429, 13241070, 15898607, -14206114, -10084880, -6661110, -2403099, 5276065}, }, { {30169808, -5317648, 26306206, -11750859, 27814964, 7069267, 7152851, 3684982, 1449224, 13082861}, {10342826, 3098505, 2119311, 193222, 25702612, 12233820, 23697382, 15056736, -21016438, -8202000}, {-33150110, 3261608, 22745853, 7948688, 19370557, -15177665, -26171976, 6482814, -10300080, -11060101}, }, { {32869458, -5408545, 25609743, 15678670, -10687769, -15471071, 26112421, 2521008, -22664288, 6904815}, {29506923, 4457497, 3377935, -9796444, -30510046, 12935080, 1561737, 3841096, -29003639, -6657642}, {10340844, -6630377, -18656632, -2278430, 12621151, -13339055, 30878497, -11824370, -25584551, 5181966}, }, { {25940115, -12658025, 17324188, -10307374, -8671468, 15029094, 24396252, -16450922, -2322852, -12388574}, {-21765684, 9916823, -1300409, 4079498, -1028346, 11909559, 1782390, 12641087, 20603771, -6561742}, {-18882287, -11673380, 24849422, 11501709, 13161720, -4768874, 1925523, 11914390, 4662781, 7820689}, }, { {12241050, -425982, 8132691, 9393934, 32846760, -1599620, 29749456, 12172924, 16136752, 15264020}, {-10349955, -14680563, -8211979, 2330220, -17662549, -14545780, 10658213, 6671822, 19012087, 3772772}, {3753511, -3421066, 10617074, 2028709, 14841030, -6721664, 28718732, -15762884, 20527771, 12988982}, }, { {-14822485, -5797269, -3707987, 12689773, -898983, -10914866, -24183046, -10564943, 3299665, -12424953}, {-16777703, -15253301, -9642417, 4978983, 3308785, 8755439, 6943197, 6461331, -25583147, 8991218}, {-17226263, 1816362, -1673288, -6086439, 31783888, -8175991, -32948145, 7417950, -30242287, 1507265}, }, { {29692663, 6829891, -10498800, 4334896, 20945975, -11906496, -28887608, 8209391, 14606362, -10647073}, {-3481570, 8707081, 32188102, 5672294, 22096700, 1711240, -33020695, 9761487, 4170404, -2085325}, {-11587470, 14855945, -4127778, -1531857, -26649089, 15084046, 22186522, 16002000, -14276837, -8400798}, }, { {-4811456, 13761029, -31703877, -2483919, -3312471, 7869047, -7113572, -9620092, 13240845, 10965870}, {-7742563, -8256762, -14768334, -13656260, -23232383, 12387166, 4498947, 14147411, 29514390, 4302863}, {-13413405, -12407859, 20757302, -13801832, 14785143, 8976368, -5061276, -2144373, 17846988, -13971927}, }, }, { { {-2244452, -754728, -4597030, -1066309, -6247172, 1455299, -21647728, -9214789, -5222701, 12650267}, {-9906797, -16070310, 21134160, 12198166, -27064575, 708126, 387813, 13770293, -19134326, 10958663}, {22470984, 12369526, 23446014, -5441109, -21520802, -9698723, -11772496, -11574455, -25083830, 4271862}, }, { {-25169565, -10053642, -19909332, 15361595, -5984358, 2159192, 75375, -4278529, -32526221, 8469673}, {15854970, 4148314, -8893890, 7259002, 11666551, 13824734, -30531198, 2697372, 24154791, -9460943}, {15446137, -15806644, 29759747, 14019369, 30811221, -9610191, -31582008, 12840104, 24913809, 9815020}, }, { {-4709286, -5614269, -31841498, -12288893, -14443537, 10799414, -9103676, 13438769, 18735128, 9466238}, {11933045, 9281483, 5081055, -5183824, -2628162, -4905629, -7727821, -10896103, -22728655, 16199064}, {14576810, 379472, -26786533, -8317236, -29426508, -10812974, -102766, 1876699, 30801119, 2164795}, }, { {15995086, 3199873, 13672555, 13712240, -19378835, -4647646, -13081610, -15496269, -13492807, 1268052}, {-10290614, -3659039, -3286592, 10948818, 23037027, 3794475, -3470338, -12600221, -17055369, 3565904}, {29210088, -9419337, -5919792, -4952785, 10834811, -13327726, -16512102, -10820713, -27162222, -14030531}, }, { {-13161890, 15508588, 16663704, -8156150, -28349942, 9019123, -29183421, -3769423, 2244111, -14001979}, {-5152875, -3800936, -9306475, -6071583, 16243069, 14684434, -25673088, -16180800, 13491506, 4641841}, {10813417, 643330, -19188515, -728916, 30292062, -16600078, 27548447, -7721242, 14476989, -12767431}, }, { {10292079, 9984945, 6481436, 8279905, -7251514, 7032743, 27282937, -1644259, -27912810, 12651324}, {-31185513, -813383, 22271204, 11835308, 10201545, 15351028, 17099662, 3988035, 21721536, -3148940}, {10202177, -6545839, -31373232, -9574638, -32150642, -8119683, -12906320, 3852694, 13216206, 14842320}, }, { {-15815640, -10601066, -6538952, -7258995, -6984659, -6581778, -31500847, 13765824, -27434397, 9900184}, {14465505, -13833331, -32133984, -14738873, -27443187, 12990492, 33046193, 15796406, -7051866, -8040114}, {30924417, -8279620, 6359016, -12816335, 16508377, 9071735, -25488601, 15413635, 9524356, -7018878}, }, { {12274201, -13175547, 32627641, -1785326, 6736625, 13267305, 5237659, -5109483, 15663516, 4035784}, {-2951309, 8903985, 17349946, 601635, -16432815, -4612556, -13732739, -15889334, -22258478, 4659091}, {-16916263, -4952973, -30393711, -15158821, 20774812, 15897498, 5736189, 15026997, -2178256, -13455585}, }, }, { { {-8858980, -2219056, 28571666, -10155518, -474467, -10105698, -3801496, 278095, 23440562, -290208}, {10226241, -5928702, 15139956, 120818, -14867693, 5218603, 32937275, 11551483, -16571960, -7442864}, {17932739, -12437276, -24039557, 10749060, 11316803, 7535897, 22503767, 5561594, -3646624, 3898661}, }, { {7749907, -969567, -16339731, -16464, -25018111, 15122143, -1573531, 7152530, 21831162, 1245233}, {26958459, -14658026, 4314586, 8346991, -5677764, 11960072, -32589295, -620035, -30402091, -16716212}, {-12165896, 9166947, 33491384, 13673479, 29787085, 13096535, 6280834, 14587357, -22338025, 13987525}, }, { {-24349909, 7778775, 21116000, 15572597, -4833266, -5357778, -4300898, -5124639, -7469781, -2858068}, {9681908, -6737123, -31951644, 13591838, -6883821, 386950, 31622781, 6439245, -14581012, 4091397}, {-8426427, 1470727, -28109679, -1596990, 3978627, -5123623, -19622683, 12092163, 29077877, -14741988}, }, { {5269168, -6859726, -13230211, -8020715, 25932563, 1763552, -5606110, -5505881, -20017847, 2357889}, {32264008, -15407652, -5387735, -1160093, -2091322, -3946900, 23104804, -12869908, 5727338, 189038}, {14609123, -8954470, -6000566, -16622781, -14577387, -7743898, -26745169, 10942115, -25888931, -14884697}, }, { {20513500, 5557931, -15604613, 7829531, 26413943, -2019404, -21378968, 7471781, 13913677, -5137875}, {-25574376, 11967826, 29233242, 12948236, -6754465, 4713227, -8940970, 14059180, 12878652, 8511905}, {-25656801, 3393631, -2955415, -7075526, -2250709, 9366908, -30223418, 6812974, 5568676, -3127656}, }, { {11630004, 12144454, 2116339, 13606037, 27378885, 15676917, -17408753, -13504373, -14395196, 8070818}, {27117696, -10007378, -31282771, -5570088, 1127282, 12772488, -29845906, 10483306, -11552749, -1028714}, {10637467, -5688064, 5674781, 1072708, -26343588, -6982302, -1683975, 9177853, -27493162, 15431203}, }, { {20525145, 10892566, -12742472, 12779443, -29493034, 16150075, -28240519, 14943142, -15056790, -7935931}, {-30024462, 5626926, -551567, -9981087, 753598, 11981191, 25244767, -3239766, -3356550, 9594024}, {-23752644, 2636870, -5163910, -10103818, 585134, 7877383, 11345683, -6492290, 13352335, -10977084}, }, { {-1931799, -5407458, 3304649, -12884869, 17015806, -4877091, -29783850, -7752482, -13215537, -319204}, {20239939, 6607058, 6203985, 3483793, -18386976, -779229, -20723742, 15077870, -22750759, 14523817}, {27406042, -6041657, 27423596, -4497394, 4996214, 10002360, -28842031, -4545494, -30172742, -4805667}, }, }, { { {11374242, 12660715, 17861383, -12540833, 10935568, 1099227, -13886076, -9091740, -27727044, 11358504}, {-12730809, 10311867, 1510375, 10778093, -2119455, -9145702, 32676003, 11149336, -26123651, 4985768}, {-19096303, 341147, -6197485, -239033, 15756973, -8796662, -983043, 13794114, -19414307, -15621255}, }, { {6490081, 11940286, 25495923, -7726360, 8668373, -8751316, 3367603, 6970005, -1691065, -9004790}, {1656497, 13457317, 15370807, 6364910, 13605745, 8362338, -19174622, -5475723, -16796596, -5031438}, {-22273315, -13524424, -64685, -4334223, -18605636, -10921968, -20571065, -7007978, -99853, -10237333}, }, { {17747465, 10039260, 19368299, -4050591, -20630635, -16041286, 31992683, -15857976, -29260363, -5511971}, {31932027, -4986141, -19612382, 16366580, 22023614, 88450, 11371999, -3744247, 4882242, -10626905}, {29796507, 37186, 19818052, 10115756, -11829032, 3352736, 18551198, 3272828, -5190932, -4162409}, }, { {12501286, 4044383, -8612957, -13392385, -32430052, 5136599, -19230378, -3529697, 330070, -3659409}, {6384877, 2899513, 17807477, 7663917, -2358888, 12363165, 25366522, -8573892, -271295, 12071499}, {-8365515, -4042521, 25133448, -4517355, -6211027, 2265927, -32769618, 1936675, -5159697, 3829363}, }, { {28425966, -5835433, -577090, -4697198, -14217555, 6870930, 7921550, -6567787, 26333140, 14267664}, {-11067219, 11871231, 27385719, -10559544, -4585914, -11189312, 10004786, -8709488, -21761224, 8930324}, {-21197785, -16396035, 25654216, -1725397, 12282012, 11008919, 1541940, 4757911, -26491501, -16408940}, }, { {13537262, -7759490, -20604840, 10961927, -5922820, -13218065, -13156584, 6217254, -15943699, 13814990}, {-17422573, 15157790, 18705543, 29619, 24409717, -260476, 27361681, 9257833, -1956526, -1776914}, {-25045300, -10191966, 15366585, 15166509, -13105086, 8423556, -29171540, 12361135, -18685978, 4578290}, }, { {24579768, 3711570, 1342322, -11180126, -27005135, 14124956, -22544529, 14074919, 21964432, 8235257}, {-6528613, -2411497, 9442966, -5925588, 12025640, -1487420, -2981514, -1669206, 13006806, 2355433}, {-16304899, -13605259, -6632427, -5142349, 16974359, -10911083, 27202044, 1719366, 1141648, -12796236}, }, { {-12863944, -13219986, -8318266, -11018091, -6810145, -4843894, 13475066, -3133972, 32674895, 13715045}, {11423335, -5468059, 32344216, 8962751, 24989809, 9241752, -13265253, 16086212, -28740881, -15642093}, {-1409668, 12530728, -6368726, 10847387, 19531186, -14132160, -11709148, 7791794, -27245943, 4383347}, }, }, { { {-28970898, 5271447, -1266009, -9736989, -12455236, 16732599, -4862407, -4906449, 27193557, 6245191}, {-15193956, 5362278, -1783893, 2695834, 4960227, 12840725, 23061898, 3260492, 22510453, 8577507}, {-12632451, 11257346, -32692994, 13548177, -721004, 10879011, 31168030, 13952092, -29571492, -3635906}, }, { {3877321, -9572739, 32416692, 5405324, -11004407, -13656635, 3759769, 11935320, 5611860, 8164018}, {-16275802, 14667797, 15906460, 12155291, -22111149, -9039718, 32003002, -8832289, 5773085, -8422109}, {-23788118, -8254300, 1950875, 8937633, 18686727, 16459170, -905725, 12376320, 31632953, 190926}, }, { {-24593607, -16138885, -8423991, 13378746, 14162407, 6901328, -8288749, 4508564, -25341555, -3627528}, {8884438, -5884009, 6023974, 10104341, -6881569, -4941533, 18722941, -14786005, -1672488, 827625}, {-32720583, -16289296, -32503547, 7101210, 13354605, 2659080, -1800575, -14108036, -24878478, 1541286}, }, { {2901347, -1117687, 3880376, -10059388, -17620940, -3612781, -21802117, -3567481, 20456845, -1885033}, {27019610, 12299467, -13658288, -1603234, -12861660, -4861471, -19540150, -5016058, 29439641, 15138866}, {21536104, -6626420, -32447818, -10690208, -22408077, 5175814, -5420040, -16361163, 7779328, 109896}, }, { {30279744, 14648750, -8044871, 6425558, 13639621, -743509, 28698390, 12180118, 23177719, -554075}, {26572847, 3405927, -31701700, 12890905, -19265668, 5335866, -6493768, 2378492, 4439158, -13279347}, {-22716706, 3489070, -9225266, -332753, 18875722, -1140095, 14819434, -12731527, -17717757, -5461437}, }, { {-5056483, 16566551, 15953661, 3767752, -10436499, 15627060, -820954, 2177225, 8550082, -15114165}, {-18473302, 16596775, -381660, 15663611, 22860960, 15585581, -27844109, -3582739, -23260460, -8428588}, {-32480551, 15707275, -8205912, -5652081, 29464558, 2713815, -22725137, 15860482, -21902570, 1494193}, }, { {-19562091, -14087393, -25583872, -9299552, 13127842, 759709, 21923482, 16529112, 8742704, 12967017}, {-28464899, 1553205, 32536856, -10473729, -24691605, -406174, -8914625, -2933896, -29903758, 15553883}, {21877909, 3230008, 9881174, 10539357, -4797115, 2841332, 11543572, 14513274, 19375923, -12647961}, }, { {8832269, -14495485, 13253511, 5137575, 5037871, 4078777, 24880818, -6222716, 2862653, 9455043}, {29306751, 5123106, 20245049, -14149889, 9592566, 8447059, -2077124, -2990080, 15511449, 4789663}, {-20679756, 7004547, 8824831, -9434977, -4045704, -3750736, -5754762, 108893, 23513200, 16652362}, }, }, { { {-33256173, 4144782, -4476029, -6579123, 10770039, -7155542, -6650416, -12936300, -18319198, 10212860}, {2756081, 8598110, 7383731, -6859892, 22312759, -1105012, 21179801, 2600940, -9988298, -12506466}, {-24645692, 13317462, -30449259, -15653928, 21365574, -10869657, 11344424, 864440, -2499677, -16710063}, }, { {-26432803, 6148329, -17184412, -14474154, 18782929, -275997, -22561534, 211300, 2719757, 4940997}, {-1323882, 3911313, -6948744, 14759765, -30027150, 7851207, 21690126, 8518463, 26699843, 5276295}, {-13149873, -6429067, 9396249, 365013, 24703301, -10488939, 1321586, 149635, -15452774, 7159369}, }, { {9987780, -3404759, 17507962, 9505530, 9731535, -2165514, 22356009, 8312176, 22477218, -8403385}, {18155857, -16504990, 19744716, 9006923, 15154154, -10538976, 24256460, -4864995, -22548173, 9334109}, {2986088, -4911893, 10776628, -3473844, 10620590, -7083203, -21413845, 14253545, -22587149, 536906}, }, { {4377756, 8115836, 24567078, 15495314, 11625074, 13064599, 7390551, 10589625, 10838060, -15420424}, {-19342404, 867880, 9277171, -3218459, -14431572, -1986443, 19295826, -15796950, 6378260, 699185}, {7895026, 4057113, -7081772, -13077756, -17886831, -323126, -716039, 15693155, -5045064, -13373962}, }, { {-7737563, -5869402, -14566319, -7406919, 11385654, 13201616, 31730678, -10962840, -3918636, -9669325}, {10188286, -15770834, -7336361, 13427543, 22223443, 14896287, 30743455, 7116568, -21786507, 5427593}, {696102, 13206899, 27047647, -10632082, 15285305, -9853179, 10798490, -4578720, 19236243, 12477404}, }, { {-11229439, 11243796, -17054270, -8040865, -788228, -8167967, -3897669, 11180504, -23169516, 7733644}, {17800790, -14036179, -27000429, -11766671, 23887827, 3149671, 23466177, -10538171, 10322027, 15313801}, {26246234, 11968874, 32263343, -5468728, 6830755, -13323031, -15794704, -101982, -24449242, 10890804}, }, { {-31365647, 10271363, -12660625, -6267268, 16690207, -13062544, -14982212, 16484931, 25180797, -5334884}, {-586574, 10376444, -32586414, -11286356, 19801893, 10997610, 2276632, 9482883, 316878, 13820577}, {-9882808, -4510367, -2115506, 16457136, -11100081, 11674996, 30756178, -7515054, 30696930, -3712849}, }, { {32988917, -9603412, 12499366, 7910787, -10617257, -11931514, -7342816, -9985397, -32349517, 7392473}, {-8855661, 15927861, 9866406, -3649411, -2396914, -16655781, -30409476, -9134995, 25112947, -2926644}, {-2504044, -436966, 25621774, -5678772, 15085042, -5479877, -24884878, -13526194, 5537438, -13914319}, }, }, { { {-11225584, 2320285, -9584280, 10149187, -33444663, 5808648, -14876251, -1729667, 31234590, 6090599}, {-9633316, 116426, 26083934, 2897444, -6364437, -2688086, 609721, 15878753, -6970405, -9034768}, {-27757857, 247744, -15194774, -9002551, 23288161, -10011936, -23869595, 6503646, 20650474, 1804084}, }, { {-27589786, 15456424, 8972517, 8469608, 15640622, 4439847, 3121995, -10329713, 27842616, -202328}, {-15306973, 2839644, 22530074, 10026331, 4602058, 5048462, 28248656, 5031932, -11375082, 12714369}, {20807691, -7270825, 29286141, 11421711, -27876523, -13868230, -21227475, 1035546, -19733229, 12796920}, }, { {12076899, -14301286, -8785001, -11848922, -25012791, 16400684, -17591495, -12899438, 3480665, -15182815}, {-32361549, 5457597, 28548107, 7833186, 7303070, -11953545, -24363064, -15921875, -33374054, 2771025}, {-21389266, 421932, 26597266, 6860826, 22486084, -6737172, -17137485, -4210226, -24552282, 15673397}, }, { {-20184622, 2338216, 19788685, -9620956, -4001265, -8740893, -20271184, 4733254, 3727144, -12934448}, {6120119, 814863, -11794402, -622716, 6812205, -15747771, 2019594, 7975683, 31123697, -10958981}, {30069250, -11435332, 30434654, 2958439, 18399564, -976289, 12296869, 9204260, -16432438, 9648165}, }, { {32705432, -1550977, 30705658, 7451065, -11805606, 9631813, 3305266, 5248604, -26008332, -11377501}, {17219865, 2375039, -31570947, -5575615, -19459679, 9219903, 294711, 15298639, 2662509, -16297073}, {-1172927, -7558695, -4366770, -4287744, -21346413, -8434326, 32087529, -1222777, 32247248, -14389861}, }, { {14312628, 1221556, 17395390, -8700143, -4945741, -8684635, -28197744, -9637817, -16027623, -13378845}, {-1428825, -9678990, -9235681, 6549687, -7383069, -468664, 23046502, 9803137, 17597934, 2346211}, {18510800, 15337574, 26171504, 981392, -22241552, 7827556, -23491134, -11323352, 3059833, -11782870}, }, { {10141598, 6082907, 17829293, -1947643, 9830092, 13613136, -25556636, -5544586, -33502212, 3592096}, {33114168, -15889352, -26525686, -13343397, 33076705, 8716171, 1151462, 1521897, -982665, -6837803}, {-32939165, -4255815, 23947181, -324178, -33072974, -12305637, -16637686, 3891704, 26353178, 693168}, }, { {30374239, 1595580, -16884039, 13186931, 4600344, 406904, 9585294, -400668, 31375464, 14369965}, {-14370654, -7772529, 1510301, 6434173, -18784789, -6262728, 32732230, -13108839, 17901441, 16011505}, {18171223, -11934626, -12500402, 15197122, -11038147, -15230035, -19172240, -16046376, 8764035, 12309598}, }, }, { { {5975908, -5243188, -19459362, -9681747, -11541277, 14015782, -23665757, 1228319, 17544096, -10593782}, {5811932, -1715293, 3442887, -2269310, -18367348, -8359541, -18044043, -15410127, -5565381, 12348900}, {-31399660, 11407555, 25755363, 6891399, -3256938, 14872274, -24849353, 8141295, -10632534, -585479}, }, { {-12675304, 694026, -5076145, 13300344, 14015258, -14451394, -9698672, -11329050, 30944593, 1130208}, {8247766, -6710942, -26562381, -7709309, -14401939, -14648910, 4652152, 2488540, 23550156, -271232}, {17294316, -3788438, 7026748, 15626851, 22990044, 113481, 2267737, -5908146, -408818, -137719}, }, { {16091085, -16253926, 18599252, 7340678, 2137637, -1221657, -3364161, 14550936, 3260525, -7166271}, {-4910104, -13332887, 18550887, 10864893, -16459325, -7291596, -23028869, -13204905, -12748722, 2701326}, {-8574695, 16099415, 4629974, -16340524, -20786213, -6005432, -10018363, 9276971, 11329923, 1862132}, }, { {14763076, -15903608, -30918270, 3689867, 3511892, 10313526, -21951088, 12219231, -9037963, -940300}, {8894987, -3446094, 6150753, 3013931, 301220, 15693451, -31981216, -2909717, -15438168, 11595570}, {15214962, 3537601, -26238722, -14058872, 4418657, -15230761, 13947276, 10730794, -13489462, -4363670}, }, { {-2538306, 7682793, 32759013, 263109, -29984731, -7955452, -22332124, -10188635, 977108, 699994}, {-12466472, 4195084, -9211532, 550904, -15565337, 12917920, 19118110, -439841, -30534533, -14337913}, {31788461, -14507657, 4799989, 7372237, 8808585, -14747943, 9408237, -10051775, 12493932, -5409317}, }, { {-25680606, 5260744, -19235809, -6284470, -3695942, 16566087, 27218280, 2607121, 29375955, 6024730}, {842132, -2794693, -4763381, -8722815, 26332018, -12405641, 11831880, 6985184, -9940361, 2854096}, {-4847262, -7969331, 2516242, -5847713, 9695691, -7221186, 16512645, 960770, 12121869, 16648078}, }, { {-15218652, 14667096, -13336229, 2013717, 30598287, -464137, -31504922, -7882064, 20237806, 2838411}, {-19288047, 4453152, 15298546, -16178388, 22115043, -15972604, 12544294, -13470457, 1068881, -12499905}, {-9558883, -16518835, 33238498, 13506958, 30505848, -1114596, -8486907, -2630053, 12521378, 4845654}, }, { {-28198521, 10744108, -2958380, 10199664, 7759311, -13088600, 3409348, -873400, -6482306, -12885870}, {-23561822, 6230156, -20382013, 10655314, -24040585, -11621172, 10477734, -1240216, -3113227, 13974498}, {12966261, 15550616, -32038948, -1615346, 21025980, -629444, 5642325, 7188737, 18895762, 12629579}, }, }, { { {14741879, -14946887, 22177208, -11721237, 1279741, 8058600, 11758140, 789443, 32195181, 3895677}, {10758205, 15755439, -4509950, 9243698, -4879422, 6879879, -2204575, -3566119, -8982069, 4429647}, {-2453894, 15725973, -20436342, -10410672, -5803908, -11040220, -7135870, -11642895, 18047436, -15281743}, }, { {-25173001, -11307165, 29759956, 11776784, -22262383, -15820455, 10993114, -12850837, -17620701, -9408468}, {21987233, 700364, -24505048, 14972008, -7774265, -5718395, 32155026, 2581431, -29958985, 8773375}, {-25568350, 454463, -13211935, 16126715, 25240068, 8594567, 20656846, 12017935, -7874389, -13920155}, }, { {6028182, 6263078, -31011806, -11301710, -818919, 2461772, -31841174, -5468042, -1721788, -2776725}, {-12278994, 16624277, 987579, -5922598, 32908203, 1248608, 7719845, -4166698, 28408820, 6816612}, {-10358094, -8237829, 19549651, -12169222, 22082623, 16147817, 20613181, 13982702, -10339570, 5067943}, }, { {-30505967, -3821767, 12074681, 13582412, -19877972, 2443951, -19719286, 12746132, 5331210, -10105944}, {30528811, 3601899, -1957090, 4619785, -27361822, -15436388, 24180793, -12570394, 27679908, -1648928}, {9402404, -13957065, 32834043, 10838634, -26580150, -13237195, 26653274, -8685565, 22611444, -12715406}, }, { {22190590, 1118029, 22736441, 15130463, -30460692, -5991321, 19189625, -4648942, 4854859, 6622139}, {-8310738, -2953450, -8262579, -3388049, -10401731, -271929, 13424426, -3567227, 26404409, 13001963}, {-31241838, -15415700, -2994250, 8939346, 11562230, -12840670, -26064365, -11621720, -15405155, 11020693}, }, { {1866042, -7949489, -7898649, -10301010, 12483315, 13477547, 3175636, -12424163, 28761762, 1406734}, {-448555, -1777666, 13018551, 3194501, -9580420, -11161737, 24760585, -4347088, 25577411, -13378680}, {-24290378, 4759345, -690653, -1852816, 2066747, 10693769, -29595790, 9884936, -9368926, 4745410}, }, { {-9141284, 6049714, -19531061, -4341411, -31260798, 9944276, -15462008, -11311852, 10931924, -11931931}, {-16561513, 14112680, -8012645, 4817318, -8040464, -11414606, -22853429, 10856641, -20470770, 13434654}, {22759489, -10073434, -16766264, -1871422, 13637442, -10168091, 1765144, -12654326, 28445307, -5364710}, }, { {29875063, 12493613, 2795536, -3786330, 1710620, 15181182, -10195717, -8788675, 9074234, 1167180}, {-26205683, 11014233, -9842651, -2635485, -26908120, 7532294, -18716888, -9535498, 3843903, 9367684}, {-10969595, -6403711, 9591134, 9582310, 11349256, 108879, 16235123, 8601684, -139197, 4242895}, }, }, { { {22092954, -13191123, -2042793, -11968512, 32186753, -11517388, -6574341, 2470660, -27417366, 16625501}, {-11057722, 3042016, 13770083, -9257922, 584236, -544855, -7770857, 2602725, -27351616, 14247413}, {6314175, -10264892, -32772502, 15957557, -10157730, 168750, -8618807, 14290061, 27108877, -1180880}, }, { {-8586597, -7170966, 13241782, 10960156, -32991015, -13794596, 33547976, -11058889, -27148451, 981874}, {22833440, 9293594, -32649448, -13618667, -9136966, 14756819, -22928859, -13970780, -10479804, -16197962}, {-7768587, 3326786, -28111797, 10783824, 19178761, 14905060, 22680049, 13906969, -15933690, 3797899}, }, { {21721356, -4212746, -12206123, 9310182, -3882239, -13653110, 23740224, -2709232, 20491983, -8042152}, {9209270, -15135055, -13256557, -6167798, -731016, 15289673, 25947805, 15286587, 30997318, -6703063}, {7392032, 16618386, 23946583, -8039892, -13265164, -1533858, -14197445, -2321576, 17649998, -250080}, }, { {-9301088, -14193827, 30609526, -3049543, -25175069, -1283752, -15241566, -9525724, -2233253, 7662146}, {-17558673, 1763594, -33114336, 15908610, -30040870, -12174295, 7335080, -8472199, -3174674, 3440183}, {-19889700, -5977008, -24111293, -9688870, 10799743, -16571957, 40450, -4431835, 4862400, 1133}, }, { {-32856209, -7873957, -5422389, 14860950, -16319031, 7956142, 7258061, 311861, -30594991, -7379421}, {-3773428, -1565936, 28985340, 7499440, 24445838, 9325937, 29727763, 16527196, 18278453, 15405622}, {-4381906, 8508652, -19898366, -3674424, -5984453, 15149970, -13313598, 843523, -21875062, 13626197}, }, { {2281448, -13487055, -10915418, -2609910, 1879358, 16164207, -10783882, 3953792, 13340839, 15928663}, {31727126, -7179855, -18437503, -8283652, 2875793, -16390330, -25269894, -7014826, -23452306, 5964753}, {4100420, -5959452, -17179337, 6017714, -18705837, 12227141, -26684835, 11344144, 2538215, -7570755}, }, { {-9433605, 6123113, 11159803, -2156608, 30016280, 14966241, -20474983, 1485421, -629256, -15958862}, {-26804558, 4260919, 11851389, 9658551, -32017107, 16367492, -20205425, -13191288, 11659922, -11115118}, {26180396, 10015009, -30844224, -8581293, 5418197, 9480663, 2231568, -10170080, 33100372, -1306171}, }, { {15121113, -5201871, -10389905, 15427821, -27509937, -15992507, 21670947, 4486675, -5931810, -14466380}, {16166486, -9483733, -11104130, 6023908, -31926798, -1364923, 2340060, -16254968, -10735770, -10039824}, {28042865, -3557089, -12126526, 12259706, -3717498, -6945899, 6766453, -8689599, 18036436, 5803270}, }, }, { { {-817581, 6763912, 11803561, 1585585, 10958447, -2671165, 23855391, 4598332, -6159431, -14117438}, {-31031306, -14256194, 17332029, -2383520, 31312682, -5967183, 696309, 50292, -20095739, 11763584}, {-594563, -2514283, -32234153, 12643980, 12650761, 14811489, 665117, -12613632, -19773211, -10713562}, }, { {30464590, -11262872, -4127476, -12734478, 19835327, -7105613, -24396175, 2075773, -17020157, 992471}, {18357185, -6994433, 7766382, 16342475, -29324918, 411174, 14578841, 8080033, -11574335, -10601610}, {19598397, 10334610, 12555054, 2555664, 18821899, -10339780, 21873263, 16014234, 26224780, 16452269}, }, { {-30223925, 5145196, 5944548, 16385966, 3976735, 2009897, -11377804, -7618186, -20533829, 3698650}, {14187449, 3448569, -10636236, -10810935, -22663880, -3433596, 7268410, -10890444, 27394301, 12015369}, {19695761, 16087646, 28032085, 12999827, 6817792, 11427614, 20244189, -1312777, -13259127, -3402461}, }, { {30860103, 12735208, -1888245, -4699734, -16974906, 2256940, -8166013, 12298312, -8550524, -10393462}, {-5719826, -11245325, -1910649, 15569035, 26642876, -7587760, -5789354, -15118654, -4976164, 12651793}, {-2848395, 9953421, 11531313, -5282879, 26895123, -12697089, -13118820, -16517902, 9768698, -2533218}, }, { {-24719459, 1894651, -287698, -4704085, 15348719, -8156530, 32767513, 12765450, 4940095, 10678226}, {18860224, 15980149, -18987240, -1562570, -26233012, -11071856, -7843882, 13944024, -24372348, 16582019}, {-15504260, 4970268, -29893044, 4175593, -20993212, -2199756, -11704054, 15444560, -11003761, 7989037}, }, { {31490452, 5568061, -2412803, 2182383, -32336847, 4531686, -32078269, 6200206, -19686113, -14800171}, {-17308668, -15879940, -31522777, -2831, -32887382, 16375549, 8680158, -16371713, 28550068, -6857132}, {-28126887, -5688091, 16837845, -1820458, -6850681, 12700016, -30039981, 4364038, 1155602, 5988841}, }, { {21890435, -13272907, -12624011, 12154349, -7831873, 15300496, 23148983, -4470481, 24618407, 8283181}, {-33136107, -10512751, 9975416, 6841041, -31559793, 16356536, 3070187, -7025928, 1466169, 10740210}, {-1509399, -15488185, -13503385, -10655916, 32799044, 909394, -13938903, -5779719, -32164649, -15327040}, }, { {3960823, -14267803, -28026090, -15918051, -19404858, 13146868, 15567327, 951507, -3260321, -573935}, {24740841, 5052253, -30094131, 8961361, 25877428, 6165135, -24368180, 14397372, -7380369, -6144105}, {-28888365, 3510803, -28103278, -1158478, -11238128, -10631454, -15441463, -14453128, -1625486, -6494814}, }, }, { { {793299, -9230478, 8836302, -6235707, -27360908, -2369593, 33152843, -4885251, -9906200, -621852}, {5666233, 525582, 20782575, -8038419, -24538499, 14657740, 16099374, 1468826, -6171428, -15186581}, {-4859255, -3779343, -2917758, -6748019, 7778750, 11688288, -30404353, -9871238, -1558923, -9863646}, }, { {10896332, -7719704, 824275, 472601, -19460308, 3009587, 25248958, 14783338, -30581476, -15757844}, {10566929, 12612572, -31944212, 11118703, -12633376, 12362879, 21752402, 8822496, 24003793, 14264025}, {27713862, -7355973, -11008240, 9227530, 27050101, 2504721, 23886875, -13117525, 13958495, -5732453}, }, { {-23481610, 4867226, -27247128, 3900521, 29838369, -8212291, -31889399, -10041781, 7340521, -15410068}, {4646514, -8011124, -22766023, -11532654, 23184553, 8566613, 31366726, -1381061, -15066784, -10375192}, {-17270517, 12723032, -16993061, 14878794, 21619651, -6197576, 27584817, 3093888, -8843694, 3849921}, }, { {-9064912, 2103172, 25561640, -15125738, -5239824, 9582958, 32477045, -9017955, 5002294, -15550259}, {-12057553, -11177906, 21115585, -13365155, 8808712, -12030708, 16489530, 13378448, -25845716, 12741426}, {-5946367, 10645103, -30911586, 15390284, -3286982, -7118677, 24306472, 15852464, 28834118, -7646072}, }, { {-17335748, -9107057, -24531279, 9434953, -8472084, -583362, -13090771, 455841, 20461858, 5491305}, {13669248, -16095482, -12481974, -10203039, -14569770, -11893198, -24995986, 11293807, -28588204, -9421832}, {28497928, 6272777, -33022994, 14470570, 8906179, -1225630, 18504674, -14165166, 29867745, -8795943}, }, { {-16207023, 13517196, -27799630, -13697798, 24009064, -6373891, -6367600, -13175392, 22853429, -4012011}, {24191378, 16712145, -13931797, 15217831, 14542237, 1646131, 18603514, -11037887, 12876623, -2112447}, {17902668, 4518229, -411702, -2829247, 26878217, 5258055, -12860753, 608397, 16031844, 3723494}, }, { {-28632773, 12763728, -20446446, 7577504, 33001348, -13017745, 17558842, -7872890, 23896954, -4314245}, {-20005381, -12011952, 31520464, 605201, 2543521, 5991821, -2945064, 7229064, -9919646, -8826859}, {28816045, 298879, -28165016, -15920938, 19000928, -1665890, -12680833, -2949325, -18051778, -2082915}, }, { {16000882, -344896, 3493092, -11447198, -29504595, -13159789, 12577740, 16041268, -19715240, 7847707}, {10151868, 10572098, 27312476, 7922682, 14825339, 4723128, -32855931, -6519018, -10020567, 3852848}, {-11430470, 15697596, -21121557, -4420647, 5386314, 15063598, 16514493, -15932110, 29330899, -15076224}, }, }, { { {-25499735, -4378794, -15222908, -6901211, 16615731, 2051784, 3303702, 15490, -27548796, 12314391}, {15683520, -6003043, 18109120, -9980648, 15337968, -5997823, -16717435, 15921866, 16103996, -3731215}, {-23169824, -10781249, 13588192, -1628807, -3798557, -1074929, -19273607, 5402699, -29815713, -9841101}, }, { {23190676, 2384583, -32714340, 3462154, -29903655, -1529132, -11266856, 8911517, -25205859, 2739713}, {21374101, -3554250, -33524649, 9874411, 15377179, 11831242, -33529904, 6134907, 4931255, 11987849}, {-7732, -2978858, -16223486, 7277597, 105524, -322051, -31480539, 13861388, -30076310, 10117930}, }, { {-29501170, -10744872, -26163768, 13051539, -25625564, 5089643, -6325503, 6704079, 12890019, 15728940}, {-21972360, -11771379, -951059, -4418840, 14704840, 2695116, 903376, -10428139, 12885167, 8311031}, {-17516482, 5352194, 10384213, -13811658, 7506451, 13453191, 26423267, 4384730, 1888765, -5435404}, }, { {-25817338, -3107312, -13494599, -3182506, 30896459, -13921729, -32251644, -12707869, -19464434, -3340243}, {-23607977, -2665774, -526091, 4651136, 5765089, 4618330, 6092245, 14845197, 17151279, -9854116}, {-24830458, -12733720, -15165978, 10367250, -29530908, -265356, 22825805, -7087279, -16866484, 16176525}, }, { {-23583256, 6564961, 20063689, 3798228, -4740178, 7359225, 2006182, -10363426, -28746253, -10197509}, {-10626600, -4486402, -13320562, -5125317, 3432136, -6393229, 23632037, -1940610, 32808310, 1099883}, {15030977, 5768825, -27451236, -2887299, -6427378, -15361371, -15277896, -6809350, 2051441, -15225865}, }, { {-3362323, -7239372, 7517890, 9824992, 23555850, 295369, 5148398, -14154188, -22686354, 16633660}, {4577086, -16752288, 13249841, -15304328, 19958763, -14537274, 18559670, -10759549, 8402478, -9864273}, {-28406330, -1051581, -26790155, -907698, -17212414, -11030789, 9453451, -14980072, 17983010, 9967138}, }, { {-25762494, 6524722, 26585488, 9969270, 24709298, 1220360, -1677990, 7806337, 17507396, 3651560}, {-10420457, -4118111, 14584639, 15971087, -15768321, 8861010, 26556809, -5574557, -18553322, -11357135}, {2839101, 14284142, 4029895, 3472686, 14402957, 12689363, -26642121, 8459447, -5605463, -7621941}, }, { {-4839289, -3535444, 9744961, 2871048, 25113978, 3187018, -25110813, -849066, 17258084, -7977739}, {18164541, -10595176, -17154882, -1542417, 19237078, -9745295, 23357533, -15217008, 26908270, 12150756}, {-30264870, -7647865, 5112249, -7036672, -1499807, -6974257, 43168, -5537701, -32302074, 16215819}, }, }, { { {-6898905, 9824394, -12304779, -4401089, -31397141, -6276835, 32574489, 12532905, -7503072, -8675347}, {-27343522, -16515468, -27151524, -10722951, 946346, 16291093, 254968, 7168080, 21676107, -1943028}, {21260961, -8424752, -16831886, -11920822, -23677961, 3968121, -3651949, -6215466, -3556191, -7913075}, }, { {16544754, 13250366, -16804428, 15546242, -4583003, 12757258, -2462308, -8680336, -18907032, -9662799}, {-2415239, -15577728, 18312303, 4964443, -15272530, -12653564, 26820651, 16690659, 25459437, -4564609}, {-25144690, 11425020, 28423002, -11020557, -6144921, -15826224, 9142795, -2391602, -6432418, -1644817}, }, { {-23104652, 6253476, 16964147, -3768872, -25113972, -12296437, -27457225, -16344658, 6335692, 7249989}, {-30333227, 13979675, 7503222, -12368314, -11956721, -4621693, -30272269, 2682242, 25993170, -12478523}, {4364628, 5930691, 32304656, -10044554, -8054781, 15091131, 22857016, -10598955, 31820368, 15075278}, }, { {31879134, -8918693, 17258761, 90626, -8041836, -4917709, 24162788, -9650886, -17970238, 12833045}, {19073683, 14851414, -24403169, -11860168, 7625278, 11091125, -19619190, 2074449, -9413939, 14905377}, {24483667, -11935567, -2518866, -11547418, -1553130, 15355506, -25282080, 9253129, 27628530, -7555480}, }, { {17597607, 8340603, 19355617, 552187, 26198470, -3176583, 4593324, -9157582, -14110875, 15297016}, {510886, 14337390, -31785257, 16638632, 6328095, 2713355, -20217417, -11864220, 8683221, 2921426}, {18606791, 11874196, 27155355, -5281482, -24031742, 6265446, -25178240, -1278924, 4674690, 13890525}, }, { {13609624, 13069022, -27372361, -13055908, 24360586, 9592974, 14977157, 9835105, 4389687, 288396}, {9922506, -519394, 13613107, 5883594, -18758345, -434263, -12304062, 8317628, 23388070, 16052080}, {12720016, 11937594, -31970060, -5028689, 26900120, 8561328, -20155687, -11632979, -14754271, -10812892}, }, { {15961858, 14150409, 26716931, -665832, -22794328, 13603569, 11829573, 7467844, -28822128, 929275}, {11038231, -11582396, -27310482, -7316562, -10498527, -16307831, -23479533, -9371869, -21393143, 2465074}, {20017163, -4323226, 27915242, 1529148, 12396362, 15675764, 13817261, -9658066, 2463391, -4622140}, }, { {-16358878, -12663911, -12065183, 4996454, -1256422, 1073572, 9583558, 12851107, 4003896, 12673717}, {-1731589, -15155870, -3262930, 16143082, 19294135, 13385325, 14741514, -9103726, 7903886, 2348101}, {24536016, -16515207, 12715592, -3862155, 1511293, 10047386, -3842346, -7129159, -28377538, 10048127}, }, }, { { {-12622226, -6204820, 30718825, 2591312, -10617028, 12192840, 18873298, -7297090, -32297756, 15221632}, {-26478122, -11103864, 11546244, -1852483, 9180880, 7656409, -21343950, 2095755, 29769758, 6593415}, {-31994208, -2907461, 4176912, 3264766, 12538965, -868111, 26312345, -6118678, 30958054, 8292160}, }, { {31429822, -13959116, 29173532, 15632448, 12174511, -2760094, 32808831, 3977186, 26143136, -3148876}, {22648901, 1402143, -22799984, 13746059, 7936347, 365344, -8668633, -1674433, -3758243, -2304625}, {-15491917, 8012313, -2514730, -12702462, -23965846, -10254029, -1612713, -1535569, -16664475, 8194478}, }, { {27338066, -7507420, -7414224, 10140405, -19026427, -6589889, 27277191, 8855376, 28572286, 3005164}, {26287124, 4821776, 25476601, -4145903, -3764513, -15788984, -18008582, 1182479, -26094821, -13079595}, {-7171154, 3178080, 23970071, 6201893, -17195577, -4489192, -21876275, -13982627, 32208683, -1198248}, }, { {-16657702, 2817643, -10286362, 14811298, 6024667, 13349505, -27315504, -10497842, -27672585, -11539858}, {15941029, -9405932, -21367050, 8062055, 31876073, -238629, -15278393, -1444429, 15397331, -4130193}, {8934485, -13485467, -23286397, -13423241, -32446090, 14047986, 31170398, -1441021, -27505566, 15087184}, }, { {-18357243, -2156491, 24524913, -16677868, 15520427, -6360776, -15502406, 11461896, 16788528, -5868942}, {-1947386, 16013773, 21750665, 3714552, -17401782, -16055433, -3770287, -10323320, 31322514, -11615635}, {21426655, -5650218, -13648287, -5347537, -28812189, -4920970, -18275391, -14621414, 13040862, -12112948}, }, { {11293895, 12478086, -27136401, 15083750, -29307421, 14748872, 14555558, -13417103, 1613711, 4896935}, {-25894883, 15323294, -8489791, -8057900, 25967126, -13425460, 2825960, -4897045, -23971776, -11267415}, {-15924766, -5229880, -17443532, 6410664, 3622847, 10243618, 20615400, 12405433, -23753030, -8436416}, }, { {-7091295, 12556208, -20191352, 9025187, -17072479, 4333801, 4378436, 2432030, 23097949, -566018}, {4565804, -16025654, 20084412, -7842817, 1724999, 189254, 24767264, 10103221, -18512313, 2424778}, {366633, -11976806, 8173090, -6890119, 30788634, 5745705, -7168678, 1344109, -3642553, 12412659}, }, { {-24001791, 7690286, 14929416, -168257, -32210835, -13412986, 24162697, -15326504, -3141501, 11179385}, {18289522, -14724954, 8056945, 16430056, -21729724, 7842514, -6001441, -1486897, -18684645, -11443503}, {476239, 6601091, -6152790, -9723375, 17503545, -4863900, 27672959, 13403813, 11052904, 5219329}, }, }, { { {20678546, -8375738, -32671898, 8849123, -5009758, 14574752, 31186971, -3973730, 9014762, -8579056}, {-13644050, -10350239, -15962508, 5075808, -1514661, -11534600, -33102500, 9160280, 8473550, -3256838}, {24900749, 14435722, 17209120, -15292541, -22592275, 9878983, -7689309, -16335821, -24568481, 11788948}, }, { {-3118155, -11395194, -13802089, 14797441, 9652448, -6845904, -20037437, 10410733, -24568470, -1458691}, {-15659161, 16736706, -22467150, 10215878, -9097177, 7563911, 11871841, -12505194, -18513325, 8464118}, {-23400612, 8348507, -14585951, -861714, -3950205, -6373419, 14325289, 8628612, 33313881, -8370517}, }, { {-20186973, -4967935, 22367356, 5271547, -1097117, -4788838, -24805667, -10236854, -8940735, -5818269}, {-6948785, -1795212, -32625683, -16021179, 32635414, -7374245, 15989197, -12838188, 28358192, -4253904}, {-23561781, -2799059, -32351682, -1661963, -9147719, 10429267, -16637684, 4072016, -5351664, 5596589}, }, { {-28236598, -3390048, 12312896, 6213178, 3117142, 16078565, 29266239, 2557221, 1768301, 15373193}, {-7243358, -3246960, -4593467, -7553353, -127927, -912245, -1090902, -4504991, -24660491, 3442910}, {-30210571, 5124043, 14181784, 8197961, 18964734, -11939093, 22597931, 7176455, -18585478, 13365930}, }, { {-7877390, -1499958, 8324673, 4690079, 6261860, 890446, 24538107, -8570186, -9689599, -3031667}, {25008904, -10771599, -4305031, -9638010, 16265036, 15721635, 683793, -11823784, 15723479, -15163481}, {-9660625, 12374379, -27006999, -7026148, -7724114, -12314514, 11879682, 5400171, 519526, -1235876}, }, { {22258397, -16332233, -7869817, 14613016, -22520255, -2950923, -20353881, 7315967, 16648397, 7605640}, {-8081308, -8464597, -8223311, 9719710, 19259459, -15348212, 23994942, -5281555, -9468848, 4763278}, {-21699244, 9220969, -15730624, 1084137, -25476107, -2852390, 31088447, -7764523, -11356529, 728112}, }, { {26047220, -11751471, -6900323, -16521798, 24092068, 9158119, -4273545, -12555558, -29365436, -5498272}, {17510331, -322857, 5854289, 8403524, 17133918, -3112612, -28111007, 12327945, 10750447, 10014012}, {-10312768, 3936952, 9156313, -8897683, 16498692, -994647, -27481051, -666732, 3424691, 7540221}, }, { {30322361, -6964110, 11361005, -4143317, 7433304, 4989748, -7071422, -16317219, -9244265, 15258046}, {13054562, -2779497, 19155474, 469045, -12482797, 4566042, 5631406, 2711395, 1062915, -5136345}, {-19240248, -11254599, -29509029, -7499965, -5835763, 13005411, -6066489, 12194497, 32960380, 1459310}, }, }, { { {19852034, 7027924, 23669353, 10020366, 8586503, -6657907, 394197, -6101885, 18638003, -11174937}, {31395534, 15098109, 26581030, 8030562, -16527914, -5007134, 9012486, -7584354, -6643087, -5442636}, {-9192165, -2347377, -1997099, 4529534, 25766844, 607986, -13222, 9677543, -32294889, -6456008}, }, { {-2444496, -149937, 29348902, 8186665, 1873760, 12489863, -30934579, -7839692, -7852844, -8138429}, {-15236356, -15433509, 7766470, 746860, 26346930, -10221762, -27333451, 10754588, -9431476, 5203576}, {31834314, 14135496, -770007, 5159118, 20917671, -16768096, -7467973, -7337524, 31809243, 7347066}, }, { {-9606723, -11874240, 20414459, 13033986, 13716524, -11691881, 19797970, -12211255, 15192876, -2087490}, {-12663563, -2181719, 1168162, -3804809, 26747877, -14138091, 10609330, 12694420, 33473243, -13382104}, {33184999, 11180355, 15832085, -11385430, -1633671, 225884, 15089336, -11023903, -6135662, 14480053}, }, { {31308717, -5619998, 31030840, -1897099, 15674547, -6582883, 5496208, 13685227, 27595050, 8737275}, {-20318852, -15150239, 10933843, -16178022, 8335352, -7546022, -31008351, -12610604, 26498114, 66511}, {22644454, -8761729, -16671776, 4884562, -3105614, -13559366, 30540766, -4286747, -13327787, -7515095}, }, { {-28017847, 9834845, 18617207, -2681312, -3401956, -13307506, 8205540, 13585437, -17127465, 15115439}, {23711543, -672915, 31206561, -8362711, 6164647, -9709987, -33535882, -1426096, 8236921, 16492939}, {-23910559, -13515526, -26299483, -4503841, 25005590, -7687270, 19574902, 10071562, 6708380, -6222424}, }, { {2101391, -4930054, 19702731, 2367575, -15427167, 1047675, 5301017, 9328700, 29955601, -11678310}, {3096359, 9271816, -21620864, -15521844, -14847996, -7592937, -25892142, -12635595, -9917575, 6216608}, {-32615849, 338663, -25195611, 2510422, -29213566, -13820213, 24822830, -6146567, -26767480, 7525079}, }, { {-23066649, -13985623, 16133487, -7896178, -3389565, 778788, -910336, -2782495, -19386633, 11994101}, {21691500, -13624626, -641331, -14367021, 3285881, -3483596, -25064666, 9718258, -7477437, 13381418}, {18445390, -4202236, 14979846, 11622458, -1727110, -3582980, 23111648, -6375247, 28535282, 15779576}, }, { {30098053, 3089662, -9234387, 16662135, -21306940, 11308411, -14068454, 12021730, 9955285, -16303356}, {9734894, -14576830, -7473633, -9138735, 2060392, 11313496, -18426029, 9924399, 20194861, 13380996}, {-26378102, -7965207, -22167821, 15789297, -18055342, -6168792, -1984914, 15707771, 26342023, 10146099}, }, }, { { {-26016874, -219943, 21339191, -41388, 19745256, -2878700, -29637280, 2227040, 21612326, -545728}, {-13077387, 1184228, 23562814, -5970442, -20351244, -6348714, 25764461, 12243797, -20856566, 11649658}, {-10031494, 11262626, 27384172, 2271902, 26947504, -15997771, 39944, 6114064, 33514190, 2333242}, }, { {-21433588, -12421821, 8119782, 7219913, -21830522, -9016134, -6679750, -12670638, 24350578, -13450001}, {-4116307, -11271533, -23886186, 4843615, -30088339, 690623, -31536088, -10406836, 8317860, 12352766}, {18200138, -14475911, -33087759, -2696619, -23702521, -9102511, -23552096, -2287550, 20712163, 6719373}, }, { {26656208, 6075253, -7858556, 1886072, -28344043, 4262326, 11117530, -3763210, 26224235, -3297458}, {-17168938, -14854097, -3395676, -16369877, -19954045, 14050420, 21728352, 9493610, 18620611, -16428628}, {-13323321, 13325349, 11432106, 5964811, 18609221, 6062965, -5269471, -9725556, -30701573, -16479657}, }, { {-23860538, -11233159, 26961357, 1640861, -32413112, -16737940, 12248509, -5240639, 13735342, 1934062}, {25089769, 6742589, 17081145, -13406266, 21909293, -16067981, -15136294, -3765346, -21277997, 5473616}, {31883677, -7961101, 1083432, -11572403, 22828471, 13290673, -7125085, 12469656, 29111212, -5451014}, }, { {24244947, -15050407, -26262976, 2791540, -14997599, 16666678, 24367466, 6388839, -10295587, 452383}, {-25640782, -3417841, 5217916, 16224624, 19987036, -4082269, -24236251, -5915248, 15766062, 8407814}, {-20406999, 13990231, 15495425, 16395525, 5377168, 15166495, -8917023, -4388953, -8067909, 2276718}, }, { {30157918, 12924066, -17712050, 9245753, 19895028, 3368142, -23827587, 5096219, 22740376, -7303417}, {2041139, -14256350, 7783687, 13876377, -25946985, -13352459, 24051124, 13742383, -15637599, 13295222}, {33338237, -8505733, 12532113, 7977527, 9106186, -1715251, -17720195, -4612972, -4451357, -14669444}, }, { {-20045281, 5454097, -14346548, 6447146, 28862071, 1883651, -2469266, -4141880, 7770569, 9620597}, {23208068, 7979712, 33071466, 8149229, 1758231, -10834995, 30945528, -1694323, -33502340, -14767970}, {1439958, -16270480, -1079989, -793782, 4625402, 10647766, -5043801, 1220118, 30494170, -11440799}, }, { {-5037580, -13028295, -2970559, -3061767, 15640974, -6701666, -26739026, 926050, -1684339, -13333647}, {13908495, -3549272, 30919928, -6273825, -21521863, 7989039, 9021034, 9078865, 3353509, 4033511}, {-29663431, -15113610, 32259991, -344482, 24295849, -12912123, 23161163, 8839127, 27485041, 7356032}, }, }, { { {9661027, 705443, 11980065, -5370154, -1628543, 14661173, -6346142, 2625015, 28431036, -16771834}, {-23839233, -8311415, -25945511, 7480958, -17681669, -8354183, -22545972, 14150565, 15970762, 4099461}, {29262576, 16756590, 26350592, -8793563, 8529671, -11208050, 13617293, -9937143, 11465739, 8317062}, }, { {-25493081, -6962928, 32500200, -9419051, -23038724, -2302222, 14898637, 3848455, 20969334, -5157516}, {-20384450, -14347713, -18336405, 13884722, -33039454, 2842114, -21610826, -3649888, 11177095, 14989547}, {-24496721, -11716016, 16959896, 2278463, 12066309, 10137771, 13515641, 2581286, -28487508, 9930240}, }, { {-17751622, -2097826, 16544300, -13009300, -15914807, -14949081, 18345767, -13403753, 16291481, -5314038}, {-33229194, 2553288, 32678213, 9875984, 8534129, 6889387, -9676774, 6957617, 4368891, 9788741}, {16660756, 7281060, -10830758, 12911820, 20108584, -8101676, -21722536, -8613148, 16250552, -11111103}, }, { {-19765507, 2390526, -16551031, 14161980, 1905286, 6414907, 4689584, 10604807, -30190403, 4782747}, {-1354539, 14736941, -7367442, -13292886, 7710542, -14155590, -9981571, 4383045, 22546403, 437323}, {31665577, -12180464, -16186830, 1491339, -18368625, 3294682, 27343084, 2786261, -30633590, -14097016}, }, { {-14467279, -683715, -33374107, 7448552, 19294360, 14334329, -19690631, 2355319, -19284671, -6114373}, {15121312, -15796162, 6377020, -6031361, -10798111, -12957845, 18952177, 15496498, -29380133, 11754228}, {-2637277, -13483075, 8488727, -14303896, 12728761, -1622493, 7141596, 11724556, 22761615, -10134141}, }, { {16918416, 11729663, -18083579, 3022987, -31015732, -13339659, -28741185, -12227393, 32851222, 11717399}, {11166634, 7338049, -6722523, 4531520, -29468672, -7302055, 31474879, 3483633, -1193175, -4030831}, {-185635, 9921305, 31456609, -13536438, -12013818, 13348923, 33142652, 6546660, -19985279, -3948376}, }, { {-32460596, 11266712, -11197107, -7899103, 31703694, 3855903, -8537131, -12833048, -30772034, -15486313}, {-18006477, 12709068, 3991746, -6479188, -21491523, -10550425, -31135347, -16049879, 10928917, 3011958}, {-6957757, -15594337, 31696059, 334240, 29576716, 14796075, -30831056, -12805180, 18008031, 10258577}, }, { {-22448644, 15655569, 7018479, -4410003, -30314266, -1201591, -1853465, 1367120, 25127874, 6671743}, {29701166, -14373934, -10878120, 9279288, -17568, 13127210, 21382910, 11042292, 25838796, 4642684}, {-20430234, 14955537, -24126347, 8124619, -5369288, -5990470, 30468147, -13900640, 18423289, 4177476}, }, }, }; void TableLookup(GePre *preCompute, int32_t pos, int8_t e) { GePre negate; // Prevent side-channel attack: Do not use conditional statements to ensure that the execution time is constant. // -negative = 11111111 if e is negative, or 0 if e is not // (-negative & e) << 1 = 2e if e is negative, or 0 if e is positive // absolute value = e - 2e (e negative) or e (e positive) uint8_t negative = (uint8_t)e >> 7; // shift 7 to check negative // range of e is -7 to 8, left shift won't cause sign change uint8_t abs = (uint8_t)(e - ((uint8_t)(-negative & (uint8_t)e) << 1)); // set base result CURVE25519_FP_SET(preCompute->yplusx, 1); CURVE25519_FP_SET(preCompute->yminusx, 1); CURVE25519_FP_SET(preCompute->xy2d, 0); // only copy the corrsponding position ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][0], abs == 1); // 1 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][1], abs == 2); // 2 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][2], abs == 3); // 3 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][3], abs == 4); // 4 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][4], abs == 5); // 5 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][5], abs == 6); // 6 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][6], abs == 7); // 7 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][7], abs == 8); // 8 of 8 CURVE25519_FP_COPY(negate.yminusx, preCompute->yplusx); CURVE25519_FP_COPY(negate.yplusx, preCompute->yminusx); CURVE25519_FP_NEGATE(negate.xy2d, preCompute->xy2d); ConditionalMove(preCompute, &negate, negative); } #endif /* HITLS_CRYPTO_CURVE25519 */
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/curve25519_table.c
C
unknown
96,121
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "securec.h" #include "curve25519_local.h" // X25519 alternative implementation, faster but require int128 #if (defined(__SIZEOF_INT128__) && (__SIZEOF_INT128__ == 16)) #define CURVE25519_51BITS_MASK 0x7ffffffffffff #define CURVE25519_51BITS 51 static void Fp51DataToPoly(Fp51 *out, const uint8_t in[32]) { uint64_t h[5]; CURVE25519_BYTES7_LOAD(h, in); CURVE25519_BYTES6_LOAD(h + 1, in + 7); h[1] <<= 5; CURVE25519_BYTES7_LOAD(h + 2, in + 13); h[2] <<= 2; CURVE25519_BYTES6_LOAD(h + 3, in + 20); h[3] <<= 7; CURVE25519_BYTES6_LOAD(h + 4, in + 26); h[4] &= 0x7fffffffffff; // 41 bits mask = 0x7fffffffffff h[4] <<= 4; h[1] |= h[0] >> CURVE25519_51BITS; h[0] &= CURVE25519_51BITS_MASK; h[2] |= h[1] >> CURVE25519_51BITS; h[1] &= CURVE25519_51BITS_MASK; h[3] |= h[2] >> CURVE25519_51BITS; h[2] &= CURVE25519_51BITS_MASK; h[4] |= h[3] >> CURVE25519_51BITS; h[3] &= CURVE25519_51BITS_MASK; out->data[0] = h[0]; out->data[1] = h[1]; out->data[2] = h[2]; out->data[3] = h[3]; out->data[4] = h[4]; } static void Fp51UnloadTo8Bits(uint8_t out[32], uint64_t h[5]) { // load from uint64 to uint8, load 8 bits at a time out[0] = (uint8_t)h[0]; out[1] = (uint8_t)(h[0] >> 8); out[2] = (uint8_t)(h[0] >> 16); out[3] = (uint8_t)(h[0] >> 24); out[4] = (uint8_t)(h[0] >> 32); out[5] = (uint8_t)(h[0] >> 40); // load from position 48 from h[1] and (8-5)=3 bits from h[1] to out[6] out[6] = (uint8_t)((h[0] >> 48) | (uint8_t)(h[1] << 3)); out[7] = (uint8_t)(h[1] >> 5); out[8] = (uint8_t)(h[1] >> 13); out[9] = (uint8_t)(h[1] >> 21); out[10] = (uint8_t)(h[1] >> 29); out[11] = (uint8_t)(h[1] >> 37); // load from position 45 from h[1] and (8-2)=6 bits from h[2] to out[12] out[12] = (uint8_t)((h[1] >> 45) | (uint8_t)(h[2] << 6)); out[13] = (uint8_t)(h[2] >> 2); out[14] = (uint8_t)(h[2] >> 10); out[15] = (uint8_t)(h[2] >> 18); out[16] = (uint8_t)(h[2] >> 26); out[17] = (uint8_t)(h[2] >> 34); out[18] = (uint8_t)(h[2] >> 42); // load from position 50 from h[2] and (8-1)=7 bits from h[3] to out[19] out[19] = (uint8_t)((h[2] >> 50) | (uint8_t)(h[3] << 1)); out[20] = (uint8_t)(h[3] >> 7); out[21] = (uint8_t)(h[3] >> 15); out[22] = (uint8_t)(h[3] >> 23); out[23] = (uint8_t)(h[3] >> 31); out[24] = (uint8_t)(h[3] >> 39); // load from position 47 from h[3] and (4-4)=4 bits from h[4] to out[25] out[25] = (uint8_t)((h[3] >> 47) | (uint8_t)(h[4] << 4)); out[26] = (uint8_t)(h[4] >> 4); out[27] = (uint8_t)(h[4] >> 12); out[28] = (uint8_t)(h[4] >> 20); out[29] = (uint8_t)(h[4] >> 28); out[30] = (uint8_t)(h[4] >> 36); out[31] = (uint8_t)(h[4] >> 44); } static void Fp51PolyToData(const Fp51 *in, uint8_t out[32]) { uint64_t h[5]; h[0] = in->data[0]; h[1] = in->data[1]; h[2] = in->data[2]; h[3] = in->data[3]; h[4] = in->data[4]; uint64_t carry; carry = (h[0] + 19) >> CURVE25519_51BITS; // plus 19 then calculate carry carry = (h[1] + carry) >> CURVE25519_51BITS; carry = (h[2] + carry) >> CURVE25519_51BITS; carry = (h[3] + carry) >> CURVE25519_51BITS; carry = (h[4] + carry) >> CURVE25519_51BITS; h[0] += 19 * carry; // process carry h[4] -> h[0], h[0] += 19 * carry h[1] += h[0] >> CURVE25519_51BITS; h[0] &= CURVE25519_51BITS_MASK; h[2] += h[1] >> CURVE25519_51BITS; h[1] &= CURVE25519_51BITS_MASK; h[3] += h[2] >> CURVE25519_51BITS; h[2] &= CURVE25519_51BITS_MASK; h[4] += h[3] >> CURVE25519_51BITS; h[3] &= CURVE25519_51BITS_MASK; h[4] &= CURVE25519_51BITS_MASK; Fp51UnloadTo8Bits(out, h); } void Fp51ProcessCarry(__uint128_t in[5]) { in[1] += (uint64_t)(in[0] >> CURVE25519_51BITS); in[0] = (uint64_t)in[0] & CURVE25519_51BITS_MASK; in[2] += (uint64_t)(in[1] >> CURVE25519_51BITS); in[1] = (uint64_t)in[1] & CURVE25519_51BITS_MASK; in[3] += (uint64_t)(in[2] >> CURVE25519_51BITS); in[2] = (uint64_t)in[2] & CURVE25519_51BITS_MASK; in[4] += (uint64_t)(in[3] >> CURVE25519_51BITS); in[3] = (uint64_t)in[3] & CURVE25519_51BITS_MASK; in[0] += (uint64_t)(in[4] >> CURVE25519_51BITS) * 19; in[4] = (uint64_t)in[4] & CURVE25519_51BITS_MASK; in[1] += in[0] >> CURVE25519_51BITS; in[0] &= CURVE25519_51BITS_MASK; } void Fp51Mul(Fp51 *out, const Fp51 *f, const Fp51 *g) { __uint128_t h[5]; // h[0] = f0g0 + 19*f1g4 + 19*f2g3 + 19*f3g2 + 19*f4g1 h[0] = (__uint128_t)f->data[0] * g->data[0] + (__uint128_t)f->data[1] * g->data[4] * 19 + (__uint128_t)f->data[2] * g->data[3] * 19 + (__uint128_t)f->data[3] * g->data[2] * 19 + // 19*f2g3 + 19*f3g2 (__uint128_t)f->data[4] * g->data[1] * 19; // 19*f4g1 // h[1] = f0g1 + f1g0 + 19*f2g4 + 19*f3g3 + 19*f4g2 h[1] = (__uint128_t)f->data[0] * g->data[1] + (__uint128_t)f->data[1] * g->data[0] + (__uint128_t)f->data[2] * g->data[4] * 19 + (__uint128_t)f->data[3] * g->data[3] * 19 + // 19*f2g4 + 19*f3g3 (__uint128_t)f->data[4] * g->data[2] * 19; // 19*f4g2 // h[2] = f0g2 + f1g1 + f2g0 + 19*f3g4 + 19*f4g3 h[2] = (__uint128_t)f->data[0] * g->data[2] + (__uint128_t)f->data[1] * g->data[1] + (__uint128_t)f->data[2] * g->data[0] + (__uint128_t)f->data[3] * g->data[4] * 19 + // f2g0 + 19*f3g4 (__uint128_t)f->data[4] * g->data[3] * 19; // 19*f4g3 // h[3] = f0g3 + f1g2 + f2g1 + f3g0 + 19*f4g4 h[3] = (__uint128_t)f->data[0] * g->data[3] + (__uint128_t)f->data[1] * g->data[2] + (__uint128_t)f->data[2] * g->data[1] + (__uint128_t)f->data[3] * g->data[0] + // f2g1 + f3g0 (__uint128_t)f->data[4] * g->data[4] * 19; // 19*f4g4 // h[4] = f0g4 + f1g3 + f2g2 + f3g1 + f4g0 h[4] = (__uint128_t)f->data[0] * g->data[4] + (__uint128_t)f->data[1] * g->data[3] + (__uint128_t)f->data[2] * g->data[2] + (__uint128_t)f->data[3] * g->data[1] + // f2g2 + f3g1 (__uint128_t)f->data[4] * g->data[0]; // f4g0 Fp51ProcessCarry(h); out->data[0] = (uint64_t)h[0]; out->data[1] = (uint64_t)h[1]; out->data[2] = (uint64_t)h[2]; out->data[3] = (uint64_t)h[3]; out->data[4] = (uint64_t)h[4]; } void Fp51Square(Fp51 *out, const Fp51 *in) { __uint128_t h[5]; uint64_t in0mul2 = in->data[0] * 2; uint64_t in1mul2 = in->data[1] * 2; uint64_t in2mul2 = in->data[2] * 2; uint64_t in3mul19 = in->data[3] * 19; uint64_t in4mul19 = in->data[4] * 19; // h0 = in0^2 + 38 * in1 * in4 + 38 * in2 * in3 h[0] = (__uint128_t)in->data[0] * in->data[0] + (__uint128_t)in1mul2 * in4mul19 + (__uint128_t)in2mul2 * in3mul19; // h1 = 2 * in0 * in1 + 19 * in3^2 + 38 * in2 * in4 h[1] = (__uint128_t)in0mul2 * in->data[1] + (__uint128_t)in->data[3] * in3mul19 + (__uint128_t)in2mul2 * in4mul19; // h2 = 2 * in0 * in2 + in1^2 + 38 * in3 * in4 h[2] = (__uint128_t)in0mul2 * in->data[2] + (__uint128_t)in->data[1] * in->data[1] + (__uint128_t)(in->data[3] * 2) * in4mul19; // 2 * 19 * in3 * in4 // h3 = 2 * in0 * in3 + 19 * in4^2 + 2 * in1 * in2 h[3] = (__uint128_t)in0mul2 * in->data[3] + (__uint128_t)in->data[4] * in4mul19 + (__uint128_t)in1mul2 * in->data[2]; // 2 * in1 * in2 // h4 = 2 * in0 * in4 + 2 * in1 * in3 + in2^2 h[4] = (__uint128_t)in0mul2 * in->data[4] + (__uint128_t)in1mul2 * in->data[3] + (__uint128_t)in->data[2] * in->data[2]; // in2^2 Fp51ProcessCarry(h); out->data[0] = (uint64_t)h[0]; out->data[1] = (uint64_t)h[1]; out->data[2] = (uint64_t)h[2]; out->data[3] = (uint64_t)h[3]; out->data[4] = (uint64_t)h[4]; } void Fp51MulScalar(Fp51 *out, const Fp51 *in, const uint32_t scalar) { __uint128_t h[5]; h[0] = in->data[0] * (__uint128_t)scalar; h[1] = in->data[1] * (__uint128_t)scalar; h[2] = in->data[2] * (__uint128_t)scalar; h[3] = in->data[3] * (__uint128_t)scalar; h[4] = in->data[4] * (__uint128_t)scalar; Fp51ProcessCarry(h); out->data[0] = (uint64_t)h[0]; out->data[1] = (uint64_t)h[1]; out->data[2] = (uint64_t)h[2]; out->data[3] = (uint64_t)h[3]; out->data[4] = (uint64_t)h[4]; } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static inline void Fp51MultiSquare(Fp51 *in1, Fp51 *in2, Fp51 *out, int32_t times) { int32_t i; Fp51 temp1, temp2; Fp51Square(&temp1, in1); Fp51Square(&temp2, &temp1); for (i = 0; i < times; i++) { Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); } Fp51Mul(out, in2, &temp2); } /* out = a ^ -1 */ static void Fp51Invert(Fp51 *out, const Fp51 *a) { Fp51 a0; /* save a^1 */ Fp51 a1; /* save a^2 */ Fp51 a2; /* save a^11 */ Fp51 a3; /* save a^(2^5-1) */ Fp51 a4; /* save a^(2^10-1) */ Fp51 a5; /* save a^(2^20-1) */ Fp51 a6; /* save a^(2^40-1) */ Fp51 a7; /* save a^(2^50-1) */ Fp51 a8; /* save a^(2^100-1) */ Fp51 a9; /* save a^(2^200-1) */ Fp51 a10; /* save a^(2^250-1) */ Fp51 temp1, temp2; /* We know a×b=1(mod p), then a and b are inverses of mod p, i.e. a=b^(-1), b=a^(-1); * According to Fermat's little theorem a^(p-1)=1(mod p), so a*a^(p-2)=1(mod p); * So the inverse element of a is a^(-1) = a^(p-2)(mod p) * Here it is, p=2^255-19, thus we need to compute a^(2^255-21)(mod(2^255-19)) */ /* a^1 */ CURVE25519_FP51_COPY(a0.data, a->data); /* a^2 */ Fp51Square(&a1, &a0); /* a^4 */ Fp51Square(&temp1, &a1); /* a^8 */ Fp51Square(&temp2, &temp1); /* a^9 */ Fp51Mul(&temp1, &a0, &temp2); /* a^11 */ Fp51Mul(&a2, &a1, &temp1); /* a^22 */ Fp51Square(&temp2, &a2); /* a^(2^5-1) = a^(9+22) */ Fp51Mul(&a3, &temp1, &temp2); /* a^(2^10-1) = a^(2^10-2^5) * a^(2^5-1) */ Fp51Square(&temp1, &a3); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Mul(&a4, &a3, &temp1); /* a^(2^20-1) = a^(2^20-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a4, &a4, &a5, 4); // (2 * 2) ^ 4 /* a^(2^40-1) = a^(2^40-2^20) * a^(2^20-1) */ Fp51MultiSquare(&a5, &a5, &a6, 9); // (2 * 2) ^ 9 /* a^(2^50-1) = a^(2^50-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a6, &a4, &a7, 4); // (2 * 2) ^ 4 /* a^(2^100-1) = a^(2^100-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a7, &a7, &a8, 24); // (2 * 2) ^ 24 /* a^(2^200-1) = a^(2^200-2^100) * a^(2^100-1) */ Fp51MultiSquare(&a8, &a8, &a9, 49); // (2 * 2) ^ 49 /* a^(2^250-1) = a^(2^250-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a9, &a7, &a10, 24); // (2 * 2) ^ 24 /* a^(2^5*(2^250-1)) = (a^(2^250-1))^5 */ Fp51Square(&temp1, &a10); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); /* The output: a^(2^255-21) = a(2^5*(2^250-1)+11) = a^(2^5*(2^250-1)) * a^11 */ Fp51Mul(out, &a2, &temp1); } void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t k[32]; const uint8_t *u = point; int32_t t; uint32_t swap; uint32_t kTemp; Fp51 x1, x2, x3; Fp51 z2, z3; Fp51 t1, t2; /* Decord the scalar into k */ CURVE25519_DECODE_LITTLE_ENDIAN(k, scalar); /* Reference RFC 7748 section 5: The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ Fp51DataToPoly(&x1, u); CURVE25519_FP51_SET(x2.data, 1); CURVE25519_FP51_SET(z2.data, 0); CURVE25519_FP51_COPY(x3.data, x1.data); CURVE25519_FP51_SET(z3.data, 1); swap = 0; /* "bits" parameter set to 255 for x25519 */ /* For t = bits-1(254) down to 0: */ for (t = 254; t >= 0; t--) { /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ kTemp = (k[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; /* kTemp = (k >> t) & 1 */ swap ^= kTemp; /* swap ^= kTemp */ CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); /* (x_2, x_3) = cswap(swap, x_2, x_3) */ CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* (z_2, z_3) = cswap(swap, z_2, z_3) */ swap = kTemp; /* swap = kTemp */ CURVE25519_FP51_SUB(t1.data, x3.data, z3.data); /* x3 = D */ CURVE25519_FP51_SUB(t2.data, x2.data, z2.data); /* t2 = B */ CURVE25519_FP51_ADD(x2.data, x2.data, z2.data); /* t1 = A */ CURVE25519_FP51_ADD(z2.data, x3.data, z3.data); /* x2 = C */ Fp51Mul(&z3, &t1, &x2); Fp51Mul(&z2, &z2, &t2); Fp51Square(&t1, &t2); Fp51Square(&t2, &x2); CURVE25519_FP51_ADD(x3.data, z3.data, z2.data); CURVE25519_FP51_SUB(z2.data, z3.data, z2.data); Fp51Mul(&x2, &t2, &t1); CURVE25519_FP51_SUB(t2.data, t2.data, t1.data); Fp51Square(&z2, &z2); Fp51MulScalar(&z3, &t2, 121666); // z2 *= 121665 + 1 = 121666 Fp51Square(&x3, &x3); CURVE25519_FP51_ADD(t1.data, t1.data, z3.data); Fp51Mul(&z3, &x1, &z2); Fp51Mul(&z2, &t2, &t1); } CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* Return x2 * (z2 ^ (p - 2)) */ Fp51Invert(&t1, &z2); Fp51Mul(&t2, &x2, &t1); Fp51PolyToData(&t2, out); BSL_SAL_CleanseData(k, sizeof(k)); } #else void FpMulScalar(Fp25 out, const Fp25 p, const int32_t scalar) { int64_t s = (int64_t)scalar; uint64_t over; uint64_t result[10]; uint64_t mul19; uint64_t t1; uint64_t signMask1; uint64_t signMask2; /* Could be more than 32 bits but not be more than 64 bits */ CURVE25519_FP_MUL_SCALAR(result, p, s); /* Process Carry */ /* the radix 2^25.5 representation: * f0+2^26*f1+2^51*f2+2^77*f3+2^102*f4+2^128*f5+2^153*f6+2^179*f7+2^204*f8+2^230*f9 */ over = result[9] + (1 << 24); /* carry chain: index 9->0; 2^25 progressiv, left shift by 24 bits */ signMask1 = MASK_HIGH64(25) & (-((over) >> 63)); /* 2^25 progressiv, shift 63 for sign */ t1 = (over >> 25) | signMask1; mul19 = (t1 + (t1 << 1) + (t1 << 4)); /* 19 = 1 + 2^1 + 2^4 */ result[0] += mul19; /* carry chain: index 9->0 */ result[9] -= CURVE25519_MASK_HIGH_39 & over; /* carry chain: index 1->2; 2^25 progressiv(26->51) */ /* carry chain: index 1->2; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[1], result[2], signMask1, over, 24); /* carry chain: index 3->4; 2^25 progressiv(77->102) */ /* carry chain: index 3->4; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[3], result[4], signMask1, over, 24); /* carry chain: index 5->6; 2^25 progressiv(128->153) */ /* carry chain: index 5->6; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[5], result[6], signMask1, over, 24); /* carry chain: index 7->8; 2^25 progressiv(179->204) */ /* carry chain: index 7->8; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[7], result[8], signMask1, over, 24); /* carry chain: index 0->1; 2^26 progressiv(0->26) */ /* carry chain: index 0->1; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[0], result[1], signMask2, over, 25); /* carry chain: index 2->3; 2^26 progressiv(51->77) */ /* carry chain: index 2->3; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[2], result[3], signMask2, over, 25); /* carry chain: index 4->5; 2^26 progressiv(102->128) */ /* carry chain: index 4->5; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[4], result[5], signMask2, over, 25); /* carry chain: index 6->7; 2^26 progressiv(153->179) */ /* carry chain: index 6->7; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[6], result[7], signMask2, over, 25); /* carry chain: index 8->9; 2^26 progressiv(204->230) */ /* carry chain: index 8->9; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[8], result[9], signMask2, over, 25); /* The result would not be more than 32 bits */ out[0] = (int32_t)result[0]; // 0 out[1] = (int32_t)result[1]; // 1 out[2] = (int32_t)result[2]; // 2 out[3] = (int32_t)result[3]; // 3 out[4] = (int32_t)result[4]; // 4 out[5] = (int32_t)result[5]; // 5 out[6] = (int32_t)result[6]; // 6 out[7] = (int32_t)result[7]; // 7 out[8] = (int32_t)result[8]; // 8 out[9] = (int32_t)result[9]; // 9 (void)memset_s(result, sizeof(result), 0, sizeof(result)); } void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t k[32]; const uint8_t *u = point; int32_t t; uint32_t swap; uint32_t kTemp; Fp25 x1, x2, x3, z2, z3, t1, t2, t3; /* Decord the scalar into k */ CURVE25519_DECODE_LITTLE_ENDIAN(k, scalar); /* Reference RFC 7748 section 5:The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ DataToPolynomial(x1, u); CURVE25519_FP_SET(x2, 1); CURVE25519_FP_SET(z2, 0); CURVE25519_FP_COPY(x3, x1); CURVE25519_FP_SET(z3, 1); swap = 0; /* "bits" parameter set to 255 for x25519 */ /* For t = bits-1(254) down to 0: */ for (t = 254; t >= 0; t--) { /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ kTemp = (k[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; /* kTemp = (k >> t) & 1 */ swap ^= kTemp; /* swap ^= kTemp */ CURVE25519_FP_CSWAP(swap, x2, x3); /* (x_2, x_3) = cswap(swap, x_2, x_3) */ CURVE25519_FP_CSWAP(swap, z2, z3); /* (z_2, z_3) = cswap(swap, z_2, z_3) */ swap = kTemp; /* swap = kTemp */ CURVE25519_FP_ADD(t1, x2, z2); /* t1 = A */ CURVE25519_FP_SUB(t2, x2, z2); /* t2 = B */ CURVE25519_FP_ADD(x2, x3, z3); /* x2 = C */ CURVE25519_FP_SUB(x3, x3, z3); /* x3 = D */ FpMul(z2, x3, t1); /* z2 = DA */ FpMul(z3, x2, t2); /* z3 = CB */ FpSquareDoubleCore(t1, t1, false); /* t1 = AA */ FpSquareDoubleCore(t2, t2, false); /* t2 = BB */ CURVE25519_FP_SUB(t3, t1, t2); /* t3 = E = AA - BB */ CURVE25519_FP_ADD(x3, z2, z3); /* x3 = DA + CB */ FpSquareDoubleCore(x3, x3, false); /* x3 = (DA + CB)^2 */ CURVE25519_FP_SUB(z3, z2, z3); /* z3 = DA - CB */ FpSquareDoubleCore(z3, z3, false); /* z3 = (DA - CB)^2 */ FpMul(z3, x1, z3); /* z3 = x1 * (DA - CB)^2 */ FpMul(x2, t1, t2); /* x2 = AA * BB */ FpMul(t1, t3, t1); /* t1 = E * AA */ FpSquareDoubleCore(z2, t3, false); /* z2 = E^2 */ /* Reference RFC 7748 section 5:The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ FpMulScalar(z2, z2, 121665); /* z2 = a24 * E^2 */ CURVE25519_FP_ADD(z2, t1, z2); /* z2 = E * (AA + a24 * E) */ } CURVE25519_FP_CSWAP(swap, x2, x3); CURVE25519_FP_CSWAP(swap, z2, z3); /* Return x2 * (z2 ^ (p - 2)) */ FpInvert(t1, z2); FpMul(t2, x2, t1); PolynomialToData(out, t2); } #endif // uint128 #endif /* HITLS_CRYPTO_X25519 */
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/noasm_curve25519_fp51_ops.c
C
unknown
20,251
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef X25519_ASM_H #define X25519_ASM_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "curve25519_local.h" #ifdef __cplusplus extern "C" { #endif /** * Function description: out = f * g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp51Mul(Fp51 *out, const Fp51 *f, const Fp51 *g); * Input register: rdi: out; rsi: f; rdx: g; fp51 is an array of [u64; 5]. * rdi: out, array pointer of output parameter fp51. * rsi: pointer f of the input source data fp51 array. * rdx: pointer g of the input source data fp51 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp51Mul(Fp51 *out, const Fp51 *f, const Fp51 *g); /** * Function description: out = f ^ 2 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp51Square(Fp51 *out, const Fp51 *f); * Input register: rdi: out; rsi: f; fp51 is an array of [u64; 5] * rdi: out, array pointer of output parameter fp51. * rsi: pointer f of the input source data fp51 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp51Square(Fp51 *out, const Fp51 *f); /** * Function description: out = f * 121666 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp51MulScalar(Fp51 *out, const Fp51 *f, const uint32_t scalar); * Input register: rdi: out; rsi: f; fp51 is an array of [u64; 5] * rdi: out, array pointer of output parameter fp51. * rsi: pointer f of the input source data fp51 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp51MulScalar(Fp51 *out, const Fp51 *in); #ifdef HITLS_CRYPTO_X25519_X8664 typedef uint64_t Fp64[4]; /** * Function description: out = f * g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Mul(Fp64 h, const Fp64 f, const Fp64 g); * Input register: rdi: out; rsi: f; rdx: g; Fp64 is an array of [u64; 4]. * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * rdx: pointer g of the input source data Fp64 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp64Mul(Fp64 out, const Fp64 f, const Fp64 g); /** * Function description: out = f ^ 2 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Sqr(Fp64 h, const Fp64 f); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp64Sqr(Fp64 out, const Fp64 f); /** * Function description: out = f * 121666 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64MulScalar(Fp64 h, Fp64 f); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp64MulScalar(Fp64 out, Fp64 f); /** * Function description: out = f + g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Add(Fp64 h, const Fp64 f, const Fp64 g); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * rdx: pointer g of the input source data Fp64 array. * Modify the register as follows: rax, rcx, r8-r11. * Output register: None * Function/Macro Call: None */ void Fp64Add(Fp64 out, const Fp64 f, const Fp64 g); /** * Function description: out = f - g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Sub(Fp64 h, const Fp64 f, const Fp64 g); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * rdx: pointer g of the input source data Fp64 array. * Modify the register as follows: rax, rcx, r8-r11. * Output register: None * Function/Macro Call: None */ void Fp64Sub(Fp64 out, const Fp64 f, const Fp64 g); /** * Function description: data conversion. * Function prototype: void Fp64PolyToData(uint8_t *out, const Fp64 f); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * Modify the register as follows: rax, rcx, r8-r11. * Output register: None * Function/Macro Call: None */ void Fp64PolyToData(uint8_t *out, const Fp64 f); #endif #ifdef __cplusplus } #endif #endif /* HITLS_CRYPTO_X25519 */ #endif // X25519_ASM_H
2302_82127028/openHiTLS-examples_2931
crypto/curve25519/src/x25519_asm.h
C
unknown
6,217
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DH_H #define CRYPT_DH_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include <stdint.h> #include "crypt_types.h" #include "crypt_algid.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #ifndef CRYPT_DH_TRY_CNT_MAX #define CRYPT_DH_TRY_CNT_MAX 100 #endif /* DH key parameter */ typedef struct DH_Para CRYPT_DH_Para; /* DH key context */ typedef struct DH_Ctx CRYPT_DH_Ctx; /** * @ingroup dh * @brief dh Allocate the context of dh. * * @retval (CRYPT_DH_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Ctx *CRYPT_DH_NewCtx(void); /** * @ingroup dh * @brief dh Allocate the context of dh. * * @param libCtx [IN] Library context * * @retval (CRYPT_DH_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Ctx *CRYPT_DH_NewCtxEx(void *libCtx); /** * @ingroup dh * @brief Copy the DH context. After the duplicated context is used up, call CRYPT_DH_FreeCtx to release the memory. * * @param ctx [IN] Source DH context * * @return CRYPT_DH_Ctx DH context pointer * If the operation fails, null is returned. */ CRYPT_DH_Ctx *CRYPT_DH_DupCtx(CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief dh Release context structure of dh key * * @param ctx [IN] Indicates the pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_DH_FreeCtx(CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief dh Allocate key parameter structure space * * @param para [IN] DH External parameter * * @retval (CRYPT_DH_Para *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Para *CRYPT_DH_NewPara(const CRYPT_DhPara *para); /** * @ingroup dh * @brief Release dh key parameter structure * * @param para [IN] Pointer to the key parameter structure to be released. The parameter is set NULL by the invoker. */ void CRYPT_DH_FreePara(CRYPT_DH_Para *dhPara); /** * @ingroup dh * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-8192 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Internal Memory Allocation Error * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPara(CRYPT_DH_Ctx *ctx, const CRYPT_DhPara *para); /** * @ingroup dh * @brief Obtain the key structure parameters. * * @param ctx [IN] Key structure * @param para [OUT] Obtained key parameter. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_GetPara(const CRYPT_DH_Ctx *ctx, CRYPT_DhPara *para); /** * @ingroup dh * @brief Set a parameter based on the parameter ID. * * @param id [IN] Parameter ID * * @retval (CRYPT_DH_Para *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Para *CRYPT_DH_NewParaById(CRYPT_PKEY_ParaId id); /** * @ingroup dh * @brief Obtain the parameter ID. * * @param ctx [IN] Key structure * * @retval ID. If the context is invalid, CRYPT_PKEY_PARAID_MAX is returned. */ CRYPT_PKEY_ParaId CRYPT_DH_GetParaId(const CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief Obtain the valid length of the key. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t Valid key length */ uint32_t CRYPT_DH_GetBits(const CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief Generate the DH key pair. * * @param ctx [IN] dh Context structure * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_DH_RAND_GENRATE_ERROR Unable to generate results within the specified number of attempts * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_DH_Gen(CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief DH key exchange * * @param ctx [IN] dh Context structure * @param pubKey [IN] Public key data * @param shareKey [OUT] Shared key * @param shareKeyLen [IN/OUT] The input parameter is the length of the shareKey, * and the output parameter is the valid length of the shareKey. * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Key exchange succeeded. */ int32_t CRYPT_DH_ComputeShareKey(const CRYPT_DH_Ctx *ctx, const CRYPT_DH_Ctx *pubKey, uint8_t *shareKey, uint32_t *shareKeyLen); /** * @ingroup dh * @brief DH Set the private key. * * @param ctx [OUT] dh Context structure * @param prv [IN] Private key * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPrvKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPrv *prv); /** * @ingroup dh * @brief DH Set the public key data. * * @param ctx [OUT] dh Context structure * @param pub [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPubKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPub *pub); /** * @ingroup dh * @brief DH Obtain the private key data. * * @param ctx [IN] dh Context structure * @param prv [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DH_GetPrvKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPrv *prv); /** * @ingroup dh * @brief DH Obtain the public key data. * * @param ctx [IN] dh Context structure * @param pub [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DH_GetPubKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup dh * @brief DH Set the private key. * * @param ctx [OUT] dh Context structure * @param para [IN] Private key * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPrvKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para); /** * @ingroup dh * @brief DH Set the public key data. * * @param ctx [OUT] dh Context structure * @param para [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPubKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para); /** * @ingroup dh * @brief DH Obtain the private key data. * * @param ctx [IN] dh Context structure * @param para [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DH_GetPrvKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para); /** * @ingroup dh * @brief DH Obtain the public key data. * * @param ctx [IN] dh Context structure * @param para [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DH_GetPubKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para); /** * @ingroup dh * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-8192 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Internal Memory Allocation Error * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetParaEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para); /** * @ingroup dh * @brief Obtain the key structure parameters. * * @param ctx [IN] Key structure * @param para [OUT] Obtained key parameter. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_GetParaEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para); #endif /** * @ingroup dh * @brief dh Compare public keys and parameters * * @param a [IN] dh Context structure * @param b [IN] dh Context structure * * @return CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_DH_PUBKEY_NOT_EQUAL Public Keys are not equal * @retval CRYPT_DH_PARA_ERROR The parameter data is incorrect. * @retval CRYPT_DH_PARA_NOT_EQUAL The parameters are not equal. */ int32_t CRYPT_DH_Cmp(const CRYPT_DH_Ctx *a, const CRYPT_DH_Ctx *b); /** * @ingroup dh * @brief DH control interface * * @param ctx [IN] dh Context structure * @param opt [IN] Operation mode * @param val [IN] Parameter * @param len [IN] val length * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DH_Ctrl(CRYPT_DH_Ctx *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup dh * @brief dh get security bits * * @param ctx [IN] dh Context structure * * @retval security bits */ int32_t CRYPT_DH_GetSecBits(const CRYPT_DH_Ctx *ctx); #ifdef HITLS_CRYPTO_DH_CHECK /** * @ingroup dh * @brief check the key pair consistency * * @param checkType [IN] check type * @param pkey1 [IN] dh key context structure * @param pkey2 [IN] dh key context structure * * @retval CRYPT_SUCCESS check success. * Others. For details, see error code in errno. */ int32_t CRYPT_DH_Check(uint32_t checkType, const CRYPT_DH_Ctx *pkey1, const CRYPT_DH_Ctx *pkey2); #endif // HITLS_CRYPTO_DH_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DH #endif // CRYPT_DH_H
2302_82127028/openHiTLS-examples_2931
crypto/dh/include/crypt_dh.h
C
unknown
13,923
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include "crypt_errno.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_utils.h" #include "crypt_dh.h" #include "dh_local.h" #include "sal_atomic.h" #include "crypt_local_types.h" #include "crypt_params_key.h" CRYPT_DH_Ctx *CRYPT_DH_NewCtx(void) { CRYPT_DH_Ctx *ctx = BSL_SAL_Malloc(sizeof(CRYPT_DH_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_DH_Ctx), 0, sizeof(CRYPT_DH_Ctx)); BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_DH_Ctx *CRYPT_DH_NewCtxEx(void *libCtx) { CRYPT_DH_Ctx *ctx = CRYPT_DH_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } static CRYPT_DH_Para *ParaMemGet(uint32_t bits) { CRYPT_DH_Para *para = BSL_SAL_Calloc(1u, sizeof(CRYPT_DH_Para)); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } para->p = BN_Create(bits); para->g = BN_Create(bits); para->id = CRYPT_PKEY_PARAID_MAX; if (para->p == NULL || para->g == NULL) { CRYPT_DH_FreePara(para); BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); return NULL; } return para; } static int32_t NewParaCheck(const CRYPT_DhPara *para) { if (para == NULL || para->p == NULL || para->g == NULL || para->pLen == 0 || para->gLen == 0 || (para->q == NULL && para->qLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->pLen > BN_BITS_TO_BYTES(DH_MAX_PBITS)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (para->gLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (para->q == NULL) { return CRYPT_SUCCESS; } if (para->qLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } return CRYPT_SUCCESS; } CRYPT_DH_Para *CRYPT_DH_NewPara(const CRYPT_DhPara *para) { if (NewParaCheck(para) != CRYPT_SUCCESS) { return NULL; } uint32_t modBits = BN_BYTES_TO_BITS(para->pLen); CRYPT_DH_Para *retPara = ParaMemGet(modBits); if (retPara == NULL) { return NULL; } int32_t ret = BN_Bin2Bn(retPara->p, para->p, para->pLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(retPara->g, para->g, para->gLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } if (para->q == NULL) { return retPara; // The parameter q does not exist, this function is ended early. } retPara->q = BN_Create(modBits); if (retPara->q == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); goto ERR; } ret = BN_Bin2Bn(retPara->q, para->q, para->qLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } retPara->id = CRYPT_PKEY_PARAID_MAX; // No ID is passed in this function. Assign a invalid ID temporarily. return retPara; ERR: CRYPT_DH_FreePara(retPara); return NULL; } void CRYPT_DH_FreePara(CRYPT_DH_Para *dhPara) { if (dhPara == NULL) { return; } BN_Destroy(dhPara->p); BN_Destroy(dhPara->q); BN_Destroy(dhPara->g); BSL_SAL_FREE(dhPara); } void CRYPT_DH_FreeCtx(CRYPT_DH_Ctx *ctx) { if (ctx == NULL) { return; } int val = 0; BSL_SAL_AtomicDownReferences(&(ctx->references), &val); if (val > 0) { return; } CRYPT_DH_FreePara(ctx->para); BN_Destroy(ctx->x); BN_Destroy(ctx->y); BSL_SAL_ReferencesFree(&(ctx->references)); BSL_SAL_FREE(ctx); } static int32_t ParaQCheck(BN_BigNum *q, BN_BigNum *r) { // 1. Determine the length. if (BN_Bits(q) < DH_MIN_QBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 2. Parity and even judgment if (BN_GetBit(q, 0) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 3. Compare q and r. if (BN_Cmp(q, r) >= 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 4. Check the pq multiple relationship. BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Div(NULL, r, r, q, opt); BN_OptimizerDestroy(opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // (p - 1) % q == 0 if (!BN_IsZero(r)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } return CRYPT_SUCCESS; } static int32_t ParaDataCheck(const CRYPT_DH_Para *para) { int32_t ret; const BN_BigNum *p = para->p; const BN_BigNum *g = para->g; // 1. Determine the length. uint32_t pBits = BN_Bits(p); if (pBits < DH_MIN_PBITS || pBits > DH_MAX_PBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 2. P parity and g value judgment // p is an odd number if (BN_GetBit(p, 0) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // g != 0 && g != 1 if (BN_IsZero(g) || BN_IsOne(g)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } BN_BigNum *r = BN_Create(pBits + 1); if (r == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } // r = p - 1 ret = BN_SubLimb(r, p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // g < p - 1 if (BN_Cmp(g, r) >= 0) { ret = CRYPT_DH_PARA_ERROR; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (para->q != NULL) { ret = ParaQCheck(para->q, r); } EXIT: BN_Destroy(r); return ret; } static CRYPT_DH_Para *ParaDup(const CRYPT_DH_Para *para) { CRYPT_DH_Para *ret = BSL_SAL_Malloc(sizeof(CRYPT_DH_Para)); if (ret == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ret->p = BN_Dup(para->p); ret->q = BN_Dup(para->q); ret->g = BN_Dup(para->g); ret->id = para->id; if (ret->p == NULL || ret->g == NULL) { CRYPT_DH_FreePara(ret); BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); return NULL; } if (para->q != NULL && ret->q == NULL) { CRYPT_DH_FreePara(ret); BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); return NULL; } return ret; } CRYPT_DH_Ctx *CRYPT_DH_DupCtx(CRYPT_DH_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } CRYPT_DH_Ctx *newKeyCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_DH_Ctx)); if (newKeyCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } // If x, y and para is not empty, copy the value. GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->x, ctx->x, BN_Dup(ctx->x), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->y, ctx->y, BN_Dup(ctx->y), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->para, ctx->para, ParaDup(ctx->para), CRYPT_MEM_ALLOC_FAIL); newKeyCtx->libCtx = ctx->libCtx; BSL_SAL_ReferencesInit(&(newKeyCtx->references)); return newKeyCtx; ERR: CRYPT_DH_FreeCtx(newKeyCtx); return NULL; } static int32_t DhSetPara(CRYPT_DH_Ctx *ctx, CRYPT_DH_Para *para) { int32_t ret = ParaDataCheck(para); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BN_Destroy(ctx->x); BN_Destroy(ctx->y); CRYPT_DH_FreePara(ctx->para); ctx->x = NULL; ctx->y = NULL; ctx->para = para; return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetPara(CRYPT_DH_Ctx *ctx, const CRYPT_DhPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DH_Para *dhPara = CRYPT_DH_NewPara(para); if (dhPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_NEW_PARA_FAIL); return CRYPT_EAL_ERR_NEW_PARA_FAIL; } int32_t ret = DhSetPara(ctx, dhPara); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); CRYPT_DH_FreePara(dhPara); } return ret; } int32_t CRYPT_DH_GetPara(const CRYPT_DH_Ctx *ctx, CRYPT_DhPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } int32_t ret = BN_Bn2Bin(ctx->para->p, para->p, &(para->pLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (ctx->para->q == NULL) { para->q = NULL; para->qLen = 0; } else { ret = BN_Bn2Bin(ctx->para->q, para->q, &(para->qLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } ret = BN_Bn2Bin(ctx->para->g, para->g, &(para->gLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t PubCheck(const BN_BigNum *y, const BN_BigNum *minP) { // y != 0, y != 1 if (BN_IsZero(y) || BN_IsOne(y)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } // y < p - 1 if (BN_Cmp(y, minP) >= 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } return CRYPT_SUCCESS; } // Get p-2 or q-1 static int32_t GetXLimb(BN_BigNum *xLimb, const BN_BigNum *p, const BN_BigNum *q) { if (q != NULL) { // xLimb = q - 1 return BN_SubLimb(xLimb, q, 1); } // xLimb = p - 2 return BN_SubLimb(xLimb, p, 2); } static void RefreshCtx(CRYPT_DH_Ctx *dhCtx, BN_BigNum *x, BN_BigNum *y, int32_t ret) { if (ret == CRYPT_SUCCESS) { BN_Destroy(dhCtx->x); BN_Destroy(dhCtx->y); dhCtx->x = x; dhCtx->y = y; } else { BN_Destroy(x); BN_Destroy(y); } } /* SP800-56Ar3 5_6_1_1_4 Key-Pair Generation by Testing Candidates */ static int32_t DH_GenSp80056ATestCandidates(CRYPT_DH_Ctx *ctx) { int32_t ret; uint32_t bits = BN_Bits(ctx->para->p); uint32_t qbits = BN_Bits(ctx->para->q); /* If s is not the maximum security strength that can be support by (p, q, g), then return an error. */ uint32_t s = (uint32_t)CRYPT_DH_GetSecBits(ctx); if (bits == 0 || qbits == 0 || s == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } /* 2*s <= n <= len(q), set n = 2*s */ uint32_t n = 2 * s; BN_BigNum *x = BN_Create(bits); BN_BigNum *y = BN_Create(bits); BN_BigNum *twoPowN = BN_Create(n); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_BigNum *m = ctx->para->q; BN_Optimizer *opt = BN_OptimizerCreate(); if (x == NULL || y == NULL || mont == NULL || opt == NULL || twoPowN == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } ret = BN_SetLimb(twoPowN, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Lshift(twoPowN, twoPowN, n); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* Set M = min(2^N, q), the minimum of 2^N and q. */ if (BN_Cmp(twoPowN, m) < 0) { m = twoPowN; } for (int32_t cnt = 0; cnt < CRYPT_DH_TRY_CNT_MAX; cnt++) { /* c in the interval [0, 2N - 1] */ ret = BN_RandRangeEx(ctx->libCtx, x, twoPowN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* x = c + 1 */ ret = BN_AddLimb(x, x, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* If c > M - 2, (i.e. c + 1 >= M) continue */ if (BN_Cmp(x, m) >= 0) { continue; } ret = BN_MontExpConsttime(y, ctx->para->g, x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } goto ERR; // The function exits successfully. } ret = CRYPT_DH_RAND_GENERATE_ERROR; BSL_ERR_PUSH_ERROR(ret); ERR: RefreshCtx(ctx, x, y, ret); BN_Destroy(twoPowN); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } static int32_t DH_GenSp80056ASafePrime(CRYPT_DH_Ctx *ctx) { int32_t ret; uint32_t bits = BN_Bits(ctx->para->p); BN_BigNum *x = BN_Create(bits); BN_BigNum *y = BN_Create(bits); BN_BigNum *minP = BN_Create(bits); BN_BigNum *xLimb = BN_Create(bits); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (x == NULL || y == NULL || minP == NULL || xLimb == NULL || mont == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_SubLimb(minP, ctx->para->p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = GetXLimb(xLimb, ctx->para->p, ctx->para->q); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } for (int32_t cnt = 0; cnt < CRYPT_DH_TRY_CNT_MAX; cnt++) { /* Generate private key x for [1, q-1] or [1, p-2] */ ret = BN_RandRangeEx(ctx->libCtx, x, xLimb); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_AddLimb(x, x, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Calculate the public key y. */ ret = BN_MontExpConsttime(y, ctx->para->g, x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Check whether the public key meets the requirements. If not, try to generate the key again. */ // y != 0, y != 1, y < p - 1 if (BN_IsZero(y) || BN_IsOne(y) || BN_Cmp(y, minP) >= 0) { continue; } goto EXIT; // The function exits successfully. } ret = CRYPT_DH_RAND_GENERATE_ERROR; BSL_ERR_PUSH_ERROR(ret); EXIT: RefreshCtx(ctx, x, y, ret); BN_Destroy(minP); BN_Destroy(xLimb); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } int32_t CRYPT_DH_Gen(CRYPT_DH_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } int32_t s = CRYPT_DH_GetSecBits(ctx); if (ctx->para->q != NULL && s != 0) { return DH_GenSp80056ATestCandidates(ctx); } return DH_GenSp80056ASafePrime(ctx); } static int32_t ComputeShareKeyInputCheck(const CRYPT_DH_Ctx *ctx, const CRYPT_DH_Ctx *pubKey, const uint8_t *shareKey, const uint32_t *shareKeyLen) { if (ctx == NULL || pubKey == NULL || shareKey == NULL || shareKeyLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (ctx->x == NULL || pubKey->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } if (BN_Bytes(ctx->para->p) > *shareKeyLen) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } return CRYPT_SUCCESS; } static void CheckAndFillZero(uint8_t *shareKey, uint32_t *shareKeyLen, uint32_t bytes) { int32_t i; if (*shareKeyLen == bytes) { // (*shareKeyLen > bytes) is not possible return; } uint32_t fill = bytes - *shareKeyLen; for (i = (int32_t)*shareKeyLen - 1; i >= 0; i--) { shareKey[i + (int32_t)fill] = shareKey[i]; } for (i = 0; i < (int32_t)fill; i++) { shareKey[i] = 0; } *shareKeyLen = bytes; } int32_t CRYPT_DH_ComputeShareKey(const CRYPT_DH_Ctx *ctx, const CRYPT_DH_Ctx *pubKey, uint8_t *shareKey, uint32_t *shareKeyLen) { uint32_t bytes = 0; int32_t ret = ComputeShareKeyInputCheck(ctx, pubKey, shareKey, shareKeyLen); if (ret != CRYPT_SUCCESS) { return ret; } uint32_t bits = BN_Bits(ctx->para->p); BN_BigNum *tmp = BN_Create(bits); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (tmp == NULL || mont == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_SubLimb(tmp, ctx->para->p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Check whether the public key meets the requirements. */ ret = PubCheck(pubKey->y, tmp); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_MontExpConsttime(tmp, pubKey->y, ctx->x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Bn2Bin(tmp, shareKey, shareKeyLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // no need to filled zero in the leading. if ((ctx->flags & CRYPT_DH_NO_PADZERO) == 0) { bytes = BN_BITS_TO_BYTES(bits); CheckAndFillZero(shareKey, shareKeyLen, bytes); } EXIT: BN_Destroy(tmp); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } static int32_t PrvLenCheck(const CRYPT_DH_Ctx *ctx, const CRYPT_DhPrv *prv) { if (ctx->para->q != NULL) { if (BN_Bytes(ctx->para->q) < prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } } else { if (BN_Bytes(ctx->para->p) < prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } } return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetPrvKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPrv *prv) { if (ctx == NULL || prv == NULL || prv->data == NULL || prv->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } int32_t ret = PrvLenCheck(ctx, prv); if (ret != CRYPT_SUCCESS) { return ret; } BN_BigNum *bnX = BN_Create(BN_BYTES_TO_BITS(prv->len)); BN_BigNum *xLimb = BN_Create(BN_Bits(ctx->para->p) + 1); if (bnX == NULL || xLimb == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(GetXLimb(xLimb, ctx->para->p, ctx->para->q), ret); GOTO_ERR_IF(BN_Bin2Bn(bnX, prv->data, prv->len), ret); // Satisfy x <= q - 1 or x <= p - 2 if (BN_Cmp(bnX, xLimb) > 0) { ret = CRYPT_DH_KEYINFO_ERROR; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // x != 0 if (BN_IsZero(bnX)) { ret = CRYPT_DH_KEYINFO_ERROR; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(xLimb); BN_Destroy(ctx->x); ctx->x = bnX; return ret; ERR: BN_Destroy(bnX); BN_Destroy(xLimb); return ret; } // No parameter information is required for setting the public key. // Therefore, the validity of the public key is not checked during the setting. // The validity of the public key is checked during the calculation of the shared key. int32_t CRYPT_DH_SetPubKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPub *pub) { if (ctx == NULL || pub == NULL || pub->data == NULL || pub->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->len > BN_BITS_TO_BYTES(DH_MAX_PBITS)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } BN_BigNum *bnY = BN_Create(BN_BYTES_TO_BITS(pub->len)); if (bnY == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Bin2Bn(bnY, pub->data, pub->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->y); ctx->y = bnY; return ret; ERR: BN_Destroy(bnY); return ret; } int32_t CRYPT_DH_GetPrvKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPrv *prv) { if (ctx == NULL || prv == NULL || prv->data == NULL || prv->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (ctx->para->q != NULL) { if (BN_Bytes(ctx->para->q) > prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } } else { if (BN_Bytes(ctx->para->p) > prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } } int32_t ret = BN_Bn2Bin(ctx->x, prv->data, &(prv->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DH_GetPubKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPub *pub) { if (ctx == NULL || pub == NULL || pub->data == NULL || pub->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL || ctx->para->p == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (ctx->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } uint32_t pubLen = BN_Bytes(ctx->para->p); if (pubLen > pub->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } // RFC 8446 requires the dh public value should be encoded as a big-endian integer and padded to // the left with zeros to the size of p in bytes. int32_t ret = BN_Bn2BinFixZero(ctx->y, pub->data, pubLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } pub->len = pubLen; return ret; } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_DH_SetParaEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPara dhPara = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DH_P, &(dhPara.p), &(dhPara.pLen)); (void)GetConstParamValue(para, CRYPT_PARAM_DH_Q, &(dhPara.q), &(dhPara.qLen)); (void)GetConstParamValue(para, CRYPT_PARAM_DH_G, &(dhPara.g), &(dhPara.gLen)); return CRYPT_DH_SetPara(ctx, &dhPara); } int32_t CRYPT_DH_GetParaEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPara dhPara = {0}; BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_DH_P, &(dhPara.p), &(dhPara.pLen)); BSL_Param *paramQ = GetParamValue(para, CRYPT_PARAM_DH_Q, &(dhPara.q), &(dhPara.qLen)); BSL_Param *paramG = GetParamValue(para, CRYPT_PARAM_DH_G, &(dhPara.g), &(dhPara.gLen)); int32_t ret = CRYPT_DH_GetPara(ctx, &dhPara); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } paramP->useLen = dhPara.pLen; paramQ->useLen = dhPara.qLen; paramG->useLen = dhPara.gLen; return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetPrvKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPrv prv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DH_PRVKEY, &prv.data, &prv.len); return CRYPT_DH_SetPrvKey(ctx, &prv); } int32_t CRYPT_DH_SetPubKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPub pub = {0}; if (GetConstParamValue(para, CRYPT_PARAM_DH_PUBKEY, &pub.data, &pub.len) == NULL) { (void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len); } return CRYPT_DH_SetPubKey(ctx, &pub); } int32_t CRYPT_DH_GetPrvKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPrv prv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_DH_PRVKEY, &prv.data, &(prv.len)); int32_t ret = CRYPT_DH_GetPrvKey(ctx, &prv); if (ret != CRYPT_SUCCESS) { return ret; } paramPrv->useLen = prv.len; return CRYPT_SUCCESS; } int32_t CRYPT_DH_GetPubKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPub pub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_DH_PUBKEY, &pub.data, &(pub.len)); if (paramPub == NULL) { paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len)); } int32_t ret = CRYPT_DH_GetPubKey(ctx, &pub); if (ret != CRYPT_SUCCESS) { return ret; } paramPub->useLen = pub.len; return ret; } #endif uint32_t CRYPT_DH_GetBits(const CRYPT_DH_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_Bits(ctx->para->p); } static uint32_t CRYPT_DH_GetPrvKeyLen(const CRYPT_DH_Ctx *ctx) { return BN_Bytes(ctx->x); } static uint32_t CRYPT_DH_GetPubKeyLen(const CRYPT_DH_Ctx *ctx) { if (ctx->para != NULL) { return BN_Bytes(ctx->para->p); } if (ctx->y != NULL) { return BN_Bytes(ctx->y); } BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } static uint32_t CRYPT_DH_GetSharedKeyLen(const CRYPT_DH_Ctx *ctx) { if (ctx->para != NULL) { return BN_Bytes(ctx->para->p); } BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } #ifdef HITLS_CRYPTO_DH_CHECK static int32_t DhKeyPairCheck(const CRYPT_DH_Ctx *pub, const CRYPT_DH_Ctx *prv) { int32_t ret; if (prv == NULL || pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } ret = CRYPT_FFC_KeyPairCheck(prv->x, pub->y, prv->para->p, prv->para->g); if (ret == CRYPT_PAIRWISE_CHECK_FAIL) { ret = CRYPT_DH_PAIRWISE_CHECK_FAIL; BSL_ERR_PUSH_ERROR(ret); } return ret; } /* * SP800-56a 5.6.2.1.2 * for check an FFC key pair. */ static int32_t DhPrvKeyCheck(const CRYPT_DH_Ctx *pkey) { if (pkey == NULL || pkey->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_FFC_PrvCheck(pkey->x, pkey->para->p, pkey->para->q); if (ret == CRYPT_INVALID_KEY) { ret = CRYPT_DH_INVALID_PRVKEY; BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DH_Check(uint32_t checkType, const CRYPT_DH_Ctx *pkey1, const CRYPT_DH_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return DhKeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return DhPrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_DH_CHECK int32_t CRYPT_DH_Cmp(const CRYPT_DH_Ctx *a, const CRYPT_DH_Ctx *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF(a->y == NULL || b->y == NULL, CRYPT_DH_KEYINFO_ERROR); RETURN_RET_IF(BN_Cmp(a->y, b->y) != 0, CRYPT_DH_PUBKEY_NOT_EQUAL); // para must be both null and non-null. RETURN_RET_IF((a->para == NULL) != (b->para == NULL), CRYPT_DH_PARA_ERROR); if (a->para != NULL) { RETURN_RET_IF(BN_Cmp(a->para->p, b->para->p) != 0 || BN_Cmp(a->para->q, b->para->q) != 0 || BN_Cmp(a->para->g, b->para->g) != 0, CRYPT_DH_PARA_NOT_EQUAL); } return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetParamById(CRYPT_DH_Ctx *ctx, CRYPT_PKEY_ParaId id) { CRYPT_DH_Para *para = CRYPT_DH_NewParaById(id); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_NEW_PARA_FAIL); return CRYPT_EAL_ERR_NEW_PARA_FAIL; } int32_t ret = DhSetPara(ctx, para); if (ret != CRYPT_SUCCESS) { CRYPT_DH_FreePara(para); } return ret; } static int32_t CRYPT_DH_GetLen(const CRYPT_DH_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } static int32_t CRYPT_DH_SetFlag(CRYPT_DH_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_SET_FLAG_LEN_ERROR); return CRYPT_DH_SET_FLAG_LEN_ERROR; } uint32_t flag = *(const uint32_t *)val; if (flag == 0 || flag >= CRYPT_DH_MAXFLAG) { BSL_ERR_PUSH_ERROR(CRYPT_DH_FLAG_NOT_SUPPORT_ERROR); return CRYPT_DH_FLAG_NOT_SUPPORT_ERROR; } ctx->flags |= flag; return CRYPT_SUCCESS; } int32_t CRYPT_DH_Ctrl(CRYPT_DH_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_PARAID: return CRYPT_DH_GetLen(ctx, (GetLenFunc)CRYPT_DH_GetParaId, val, len); case CRYPT_CTRL_GET_BITS: return CRYPT_DH_GetLen(ctx, (GetLenFunc)CRYPT_DH_GetBits, val, len); case CRYPT_CTRL_GET_SECBITS: return CRYPT_DH_GetLen(ctx, (GetLenFunc)CRYPT_DH_GetSecBits, val, len); case CRYPT_CTRL_GET_PUBKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DH_GetPubKeyLen); case CRYPT_CTRL_GET_PRVKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DH_GetPrvKeyLen); case CRYPT_CTRL_GET_SHARED_KEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DH_GetSharedKeyLen); case CRYPT_CTRL_SET_PARA_BY_ID: return CRYPT_DH_SetParamById(ctx, *(CRYPT_PKEY_ParaId *)val); case CRYPT_CTRL_SET_DH_FLAG: return CRYPT_DH_SetFlag(ctx, val, len); case CRYPT_CTRL_UP_REFERENCES: if (val == NULL || len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val); default: break; } BSL_ERR_PUSH_ERROR(CRYPT_DH_UNSUPPORTED_CTRL_OPTION); return CRYPT_DH_UNSUPPORTED_CTRL_OPTION; } /** * @ingroup dh * @brief dh get security bits * * @param ctx [IN] dh Context structure * * @retval security bits */ int32_t CRYPT_DH_GetSecBits(const CRYPT_DH_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL || ctx->para->p == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } if (ctx->para->q == NULL) { return BN_SecBits(BN_Bits(ctx->para->p), -1); } return BN_SecBits(BN_Bits(ctx->para->p), BN_Bits(ctx->para->q)); } #endif /* HITLS_CRYPTO_DH */
2302_82127028/openHiTLS-examples_2931
crypto/dh/src/dh_core.c
C
unknown
32,906
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef DH_LOCAL_H #define DH_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include "crypt_bn.h" #include "crypt_dh.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #define DH_MIN_PBITS 768 // Minimum DH specification: 768 bits #define DH_MAX_PBITS 8192 // Maximum DH specification: 8192 bits #define DH_MIN_QBITS 160 // Minimum specification of DH parameter Q: 160 bits /* DH key parameter */ struct DH_Para { BN_BigNum *p; BN_BigNum *q; BN_BigNum *g; CRYPT_PKEY_ParaId id; }; /* DH key context */ struct DH_Ctx { BN_BigNum *x; // Private key BN_BigNum *y; // Public key CRYPT_DH_Para *para; // key parameter BSL_SAL_RefCount references; void *libCtx; uint32_t flags; }; #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DH #endif // CRYPT_DH_H
2302_82127028/openHiTLS-examples_2931
crypto/dh/src/dh_local.h
C
unknown
1,389
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_params_key.h" #include "dh_local.h" #include "crypt_dh.h" static uint8_t g_rfc3526_2409_primeG[] = { 0x02 }; static uint8_t g_rfc7919G[] = { 0x02 }; static uint8_t g_rfc2409_prime768P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x3A, 0x36, 0x20, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, }; static uint8_t g_rfc2409_prime1024P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE6, 0x53, 0x81, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, }; static uint8_t g_rfc3526_prime1536P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x23, 0x73, 0x27, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime2048P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAC, 0xAA, 0x68, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime3072P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x3A, 0xD2, 0xCA, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime4096P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x06, 0x31, 0x99, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime6144P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x02, 0x84, 0x92, 0x36, 0xC3, 0xFA, 0xB4, 0xD2, 0x7C, 0x70, 0x26, 0xC1, 0xD4, 0xDC, 0xB2, 0x60, 0x26, 0x46, 0xDE, 0xC9, 0x75, 0x1E, 0x76, 0x3D, 0xBA, 0x37, 0xBD, 0xF8, 0xFF, 0x94, 0x06, 0xAD, 0x9E, 0x53, 0x0E, 0xE5, 0xDB, 0x38, 0x2F, 0x41, 0x30, 0x01, 0xAE, 0xB0, 0x6A, 0x53, 0xED, 0x90, 0x27, 0xD8, 0x31, 0x17, 0x97, 0x27, 0xB0, 0x86, 0x5A, 0x89, 0x18, 0xDA, 0x3E, 0xDB, 0xEB, 0xCF, 0x9B, 0x14, 0xED, 0x44, 0xCE, 0x6C, 0xBA, 0xCE, 0xD4, 0xBB, 0x1B, 0xDB, 0x7F, 0x14, 0x47, 0xE6, 0xCC, 0x25, 0x4B, 0x33, 0x20, 0x51, 0x51, 0x2B, 0xD7, 0xAF, 0x42, 0x6F, 0xB8, 0xF4, 0x01, 0x37, 0x8C, 0xD2, 0xBF, 0x59, 0x83, 0xCA, 0x01, 0xC6, 0x4B, 0x92, 0xEC, 0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03, 0xF4, 0x82, 0xD7, 0xCE, 0x6E, 0x74, 0xFE, 0xF6, 0xD5, 0x5E, 0x70, 0x2F, 0x46, 0x98, 0x0C, 0x82, 0xB5, 0xA8, 0x40, 0x31, 0x90, 0x0B, 0x1C, 0x9E, 0x59, 0xE7, 0xC9, 0x7F, 0xBE, 0xC7, 0xE8, 0xF3, 0x23, 0xA9, 0x7A, 0x7E, 0x36, 0xCC, 0x88, 0xBE, 0x0F, 0x1D, 0x45, 0xB7, 0xFF, 0x58, 0x5A, 0xC5, 0x4B, 0xD4, 0x07, 0xB2, 0x2B, 0x41, 0x54, 0xAA, 0xCC, 0x8F, 0x6D, 0x7E, 0xBF, 0x48, 0xE1, 0xD8, 0x14, 0xCC, 0x5E, 0xD2, 0x0F, 0x80, 0x37, 0xE0, 0xA7, 0x97, 0x15, 0xEE, 0xF2, 0x9B, 0xE3, 0x28, 0x06, 0xA1, 0xD5, 0x8B, 0xB7, 0xC5, 0xDA, 0x76, 0xF5, 0x50, 0xAA, 0x3D, 0x8A, 0x1F, 0xBF, 0xF0, 0xEB, 0x19, 0xCC, 0xB1, 0xA3, 0x13, 0xD5, 0x5C, 0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32, 0x38, 0x7F, 0xE8, 0xD7, 0x6E, 0x3C, 0x04, 0x68, 0x04, 0x3E, 0x8F, 0x66, 0x3F, 0x48, 0x60, 0xEE, 0x12, 0xBF, 0x2D, 0x5B, 0x0B, 0x74, 0x74, 0xD6, 0xE6, 0x94, 0xF9, 0x1E, 0x6D, 0xCC, 0x40, 0x24, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime8192P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x02, 0x84, 0x92, 0x36, 0xC3, 0xFA, 0xB4, 0xD2, 0x7C, 0x70, 0x26, 0xC1, 0xD4, 0xDC, 0xB2, 0x60, 0x26, 0x46, 0xDE, 0xC9, 0x75, 0x1E, 0x76, 0x3D, 0xBA, 0x37, 0xBD, 0xF8, 0xFF, 0x94, 0x06, 0xAD, 0x9E, 0x53, 0x0E, 0xE5, 0xDB, 0x38, 0x2F, 0x41, 0x30, 0x01, 0xAE, 0xB0, 0x6A, 0x53, 0xED, 0x90, 0x27, 0xD8, 0x31, 0x17, 0x97, 0x27, 0xB0, 0x86, 0x5A, 0x89, 0x18, 0xDA, 0x3E, 0xDB, 0xEB, 0xCF, 0x9B, 0x14, 0xED, 0x44, 0xCE, 0x6C, 0xBA, 0xCE, 0xD4, 0xBB, 0x1B, 0xDB, 0x7F, 0x14, 0x47, 0xE6, 0xCC, 0x25, 0x4B, 0x33, 0x20, 0x51, 0x51, 0x2B, 0xD7, 0xAF, 0x42, 0x6F, 0xB8, 0xF4, 0x01, 0x37, 0x8C, 0xD2, 0xBF, 0x59, 0x83, 0xCA, 0x01, 0xC6, 0x4B, 0x92, 0xEC, 0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03, 0xF4, 0x82, 0xD7, 0xCE, 0x6E, 0x74, 0xFE, 0xF6, 0xD5, 0x5E, 0x70, 0x2F, 0x46, 0x98, 0x0C, 0x82, 0xB5, 0xA8, 0x40, 0x31, 0x90, 0x0B, 0x1C, 0x9E, 0x59, 0xE7, 0xC9, 0x7F, 0xBE, 0xC7, 0xE8, 0xF3, 0x23, 0xA9, 0x7A, 0x7E, 0x36, 0xCC, 0x88, 0xBE, 0x0F, 0x1D, 0x45, 0xB7, 0xFF, 0x58, 0x5A, 0xC5, 0x4B, 0xD4, 0x07, 0xB2, 0x2B, 0x41, 0x54, 0xAA, 0xCC, 0x8F, 0x6D, 0x7E, 0xBF, 0x48, 0xE1, 0xD8, 0x14, 0xCC, 0x5E, 0xD2, 0x0F, 0x80, 0x37, 0xE0, 0xA7, 0x97, 0x15, 0xEE, 0xF2, 0x9B, 0xE3, 0x28, 0x06, 0xA1, 0xD5, 0x8B, 0xB7, 0xC5, 0xDA, 0x76, 0xF5, 0x50, 0xAA, 0x3D, 0x8A, 0x1F, 0xBF, 0xF0, 0xEB, 0x19, 0xCC, 0xB1, 0xA3, 0x13, 0xD5, 0x5C, 0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32, 0x38, 0x7F, 0xE8, 0xD7, 0x6E, 0x3C, 0x04, 0x68, 0x04, 0x3E, 0x8F, 0x66, 0x3F, 0x48, 0x60, 0xEE, 0x12, 0xBF, 0x2D, 0x5B, 0x0B, 0x74, 0x74, 0xD6, 0xE6, 0x94, 0xF9, 0x1E, 0x6D, 0xBE, 0x11, 0x59, 0x74, 0xA3, 0x92, 0x6F, 0x12, 0xFE, 0xE5, 0xE4, 0x38, 0x77, 0x7C, 0xB6, 0xA9, 0x32, 0xDF, 0x8C, 0xD8, 0xBE, 0xC4, 0xD0, 0x73, 0xB9, 0x31, 0xBA, 0x3B, 0xC8, 0x32, 0xB6, 0x8D, 0x9D, 0xD3, 0x00, 0x74, 0x1F, 0xA7, 0xBF, 0x8A, 0xFC, 0x47, 0xED, 0x25, 0x76, 0xF6, 0x93, 0x6B, 0xA4, 0x24, 0x66, 0x3A, 0xAB, 0x63, 0x9C, 0x5A, 0xE4, 0xF5, 0x68, 0x34, 0x23, 0xB4, 0x74, 0x2B, 0xF1, 0xC9, 0x78, 0x23, 0x8F, 0x16, 0xCB, 0xE3, 0x9D, 0x65, 0x2D, 0xE3, 0xFD, 0xB8, 0xBE, 0xFC, 0x84, 0x8A, 0xD9, 0x22, 0x22, 0x2E, 0x04, 0xA4, 0x03, 0x7C, 0x07, 0x13, 0xEB, 0x57, 0xA8, 0x1A, 0x23, 0xF0, 0xC7, 0x34, 0x73, 0xFC, 0x64, 0x6C, 0xEA, 0x30, 0x6B, 0x4B, 0xCB, 0xC8, 0x86, 0x2F, 0x83, 0x85, 0xDD, 0xFA, 0x9D, 0x4B, 0x7F, 0xA2, 0xC0, 0x87, 0xE8, 0x79, 0x68, 0x33, 0x03, 0xED, 0x5B, 0xDD, 0x3A, 0x06, 0x2B, 0x3C, 0xF5, 0xB3, 0xA2, 0x78, 0xA6, 0x6D, 0x2A, 0x13, 0xF8, 0x3F, 0x44, 0xF8, 0x2D, 0xDF, 0x31, 0x0E, 0xE0, 0x74, 0xAB, 0x6A, 0x36, 0x45, 0x97, 0xE8, 0x99, 0xA0, 0x25, 0x5D, 0xC1, 0x64, 0xF3, 0x1C, 0xC5, 0x08, 0x46, 0x85, 0x1D, 0xF9, 0xAB, 0x48, 0x19, 0x5D, 0xED, 0x7E, 0xA1, 0xB1, 0xD5, 0x10, 0xBD, 0x7E, 0xE7, 0x4D, 0x73, 0xFA, 0xF3, 0x6B, 0xC3, 0x1E, 0xCF, 0xA2, 0x68, 0x35, 0x90, 0x46, 0xF4, 0xEB, 0x87, 0x9F, 0x92, 0x40, 0x09, 0x43, 0x8B, 0x48, 0x1C, 0x6C, 0xD7, 0x88, 0x9A, 0x00, 0x2E, 0xD5, 0xEE, 0x38, 0x2B, 0xC9, 0x19, 0x0D, 0xA6, 0xFC, 0x02, 0x6E, 0x47, 0x95, 0x58, 0xE4, 0x47, 0x56, 0x77, 0xE9, 0xAA, 0x9E, 0x30, 0x50, 0xE2, 0x76, 0x56, 0x94, 0xDF, 0xC8, 0x1F, 0x56, 0xE8, 0x80, 0xB9, 0x6E, 0x71, 0x60, 0xC9, 0x80, 0xDD, 0x98, 0xED, 0xD3, 0xDF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe2048P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x28, 0x5C, 0x97, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe2048Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x94, 0x2E, 0x4B, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe3072P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0xC6, 0x2E, 0x37, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe3072Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x63, 0x17, 0x1B, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe4096P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x65, 0x5F, 0x6A, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe4096Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x4F, 0x0F, 0x78, 0xB7, 0x37, 0xA9, 0x61, 0x8B, 0x26, 0xFA, 0x7D, 0xBC, 0x98, 0x74, 0xF2, 0x72, 0xC4, 0x2B, 0xDB, 0x56, 0x3E, 0xAF, 0xA1, 0x6B, 0x4F, 0xB6, 0x8C, 0x3B, 0xB1, 0xE7, 0x8E, 0xAA, 0x81, 0xA0, 0x02, 0x43, 0xFA, 0xAD, 0xD2, 0xBF, 0x18, 0xE6, 0x3D, 0x38, 0x9A, 0xE4, 0x43, 0x77, 0xDA, 0x18, 0xC5, 0x76, 0xB5, 0x0F, 0x00, 0x96, 0xCF, 0x34, 0x19, 0x54, 0x83, 0xB0, 0x05, 0x48, 0xC0, 0x98, 0x62, 0x36, 0xE3, 0xBC, 0x7C, 0xB8, 0xD6, 0x80, 0x1C, 0x04, 0x94, 0xCC, 0xD1, 0x99, 0xE5, 0xC5, 0xBD, 0x0D, 0x0E, 0xDC, 0x9E, 0xB8, 0xA0, 0x00, 0x1E, 0x15, 0x27, 0x67, 0x54, 0xFC, 0xC6, 0x85, 0x66, 0x05, 0x41, 0x48, 0xE6, 0xE7, 0x64, 0xBE, 0xE7, 0xC7, 0x64, 0xDA, 0xAD, 0x3F, 0xC4, 0x52, 0x35, 0xA6, 0xDA, 0xD4, 0x28, 0xFA, 0x20, 0xC1, 0x70, 0xE3, 0x45, 0x00, 0x3F, 0x2F, 0x32, 0xAF, 0xB5, 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe6144P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, 0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, 0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, 0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, 0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, 0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, 0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, 0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, 0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, 0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, 0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, 0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, 0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, 0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, 0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, 0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, 0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, 0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, 0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, 0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, 0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, 0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, 0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, 0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, 0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, 0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, 0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, 0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, 0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, 0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, 0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, 0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, 0xA4, 0x0E, 0x32, 0x9C, 0xD0, 0xE4, 0x0E, 0x65, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe6144Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x4F, 0x0F, 0x78, 0xB7, 0x37, 0xA9, 0x61, 0x8B, 0x26, 0xFA, 0x7D, 0xBC, 0x98, 0x74, 0xF2, 0x72, 0xC4, 0x2B, 0xDB, 0x56, 0x3E, 0xAF, 0xA1, 0x6B, 0x4F, 0xB6, 0x8C, 0x3B, 0xB1, 0xE7, 0x8E, 0xAA, 0x81, 0xA0, 0x02, 0x43, 0xFA, 0xAD, 0xD2, 0xBF, 0x18, 0xE6, 0x3D, 0x38, 0x9A, 0xE4, 0x43, 0x77, 0xDA, 0x18, 0xC5, 0x76, 0xB5, 0x0F, 0x00, 0x96, 0xCF, 0x34, 0x19, 0x54, 0x83, 0xB0, 0x05, 0x48, 0xC0, 0x98, 0x62, 0x36, 0xE3, 0xBC, 0x7C, 0xB8, 0xD6, 0x80, 0x1C, 0x04, 0x94, 0xCC, 0xD1, 0x99, 0xE5, 0xC5, 0xBD, 0x0D, 0x0E, 0xDC, 0x9E, 0xB8, 0xA0, 0x00, 0x1E, 0x15, 0x27, 0x67, 0x54, 0xFC, 0xC6, 0x85, 0x66, 0x05, 0x41, 0x48, 0xE6, 0xE7, 0x64, 0xBE, 0xE7, 0xC7, 0x64, 0xDA, 0xAD, 0x3F, 0xC4, 0x52, 0x35, 0xA6, 0xDA, 0xD4, 0x28, 0xFA, 0x20, 0xC1, 0x70, 0xE3, 0x45, 0x00, 0x3F, 0x2F, 0x06, 0xEC, 0x81, 0x05, 0xFE, 0xB2, 0x5B, 0x22, 0x81, 0xB6, 0x3D, 0x27, 0x33, 0xBE, 0x96, 0x1C, 0x29, 0x95, 0x1D, 0x11, 0xDD, 0x22, 0x21, 0x65, 0x7A, 0x9F, 0x53, 0x1D, 0xDA, 0x2A, 0x19, 0x4D, 0xBB, 0x12, 0x64, 0x48, 0xBD, 0xEE, 0xB2, 0x58, 0xE0, 0x7E, 0xA6, 0x59, 0xC7, 0x46, 0x19, 0xA6, 0x38, 0x0E, 0x1D, 0x66, 0xD6, 0x83, 0x2B, 0xFE, 0x67, 0xF6, 0x38, 0xCD, 0x8F, 0xAE, 0x1F, 0x27, 0x23, 0x02, 0x0F, 0x9C, 0x40, 0xA3, 0xFD, 0xA6, 0x7E, 0xDA, 0x3B, 0xD2, 0x92, 0x38, 0xFB, 0xD4, 0xD4, 0xB4, 0x88, 0x5C, 0x2A, 0x99, 0x17, 0x6D, 0xB1, 0xA0, 0x6C, 0x50, 0x07, 0x78, 0x49, 0x1A, 0x82, 0x88, 0xF1, 0x85, 0x5F, 0x60, 0xFF, 0xFC, 0xF1, 0xD1, 0x37, 0x3F, 0xD9, 0x4F, 0xC6, 0x0C, 0x18, 0x11, 0xE1, 0xAC, 0x3F, 0x1C, 0x6D, 0x00, 0x3B, 0xEC, 0xDA, 0x3B, 0x1F, 0x27, 0x25, 0xCA, 0x59, 0x5D, 0xE0, 0xCA, 0x63, 0x32, 0x8F, 0x3B, 0xE5, 0x7C, 0xC9, 0x77, 0x55, 0x60, 0x11, 0x95, 0x14, 0x0D, 0xFB, 0x59, 0xD3, 0x9C, 0xE0, 0x91, 0x30, 0x8B, 0x41, 0x05, 0x74, 0x6D, 0xAC, 0x23, 0xD3, 0x3E, 0x5F, 0x7C, 0xE4, 0x84, 0x8D, 0xA3, 0x16, 0xA9, 0xC6, 0x6B, 0x95, 0x81, 0xBA, 0x35, 0x73, 0xBF, 0xAF, 0x31, 0x14, 0x96, 0x18, 0x8A, 0xB1, 0x54, 0x23, 0x28, 0x2E, 0xE4, 0x16, 0xDC, 0x2A, 0x19, 0xC5, 0x72, 0x4F, 0xA9, 0x1A, 0xE4, 0xAD, 0xC8, 0x8B, 0xC6, 0x67, 0x96, 0xEA, 0xE5, 0x67, 0x7A, 0x01, 0xF6, 0x4E, 0x8C, 0x08, 0x63, 0x13, 0x95, 0x82, 0x2D, 0x9D, 0xB8, 0xFC, 0xEE, 0x35, 0xC0, 0x6B, 0x1F, 0xEE, 0xA5, 0x47, 0x4D, 0x6D, 0x8F, 0x34, 0xB1, 0x53, 0x4A, 0x93, 0x6A, 0x18, 0xB0, 0xE0, 0xD2, 0x0E, 0xAB, 0x86, 0xBC, 0x9C, 0x6D, 0x6A, 0x52, 0x07, 0x19, 0x4E, 0x68, 0x72, 0x07, 0x32, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe8192P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, 0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, 0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, 0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, 0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, 0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, 0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, 0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, 0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, 0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, 0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, 0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, 0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, 0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, 0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, 0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, 0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, 0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, 0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, 0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, 0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, 0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, 0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, 0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, 0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, 0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, 0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, 0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, 0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, 0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, 0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, 0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, 0xA4, 0x0E, 0x32, 0x9C, 0xCF, 0xF4, 0x6A, 0xAA, 0x36, 0xAD, 0x00, 0x4C, 0xF6, 0x00, 0xC8, 0x38, 0x1E, 0x42, 0x5A, 0x31, 0xD9, 0x51, 0xAE, 0x64, 0xFD, 0xB2, 0x3F, 0xCE, 0xC9, 0x50, 0x9D, 0x43, 0x68, 0x7F, 0xEB, 0x69, 0xED, 0xD1, 0xCC, 0x5E, 0x0B, 0x8C, 0xC3, 0xBD, 0xF6, 0x4B, 0x10, 0xEF, 0x86, 0xB6, 0x31, 0x42, 0xA3, 0xAB, 0x88, 0x29, 0x55, 0x5B, 0x2F, 0x74, 0x7C, 0x93, 0x26, 0x65, 0xCB, 0x2C, 0x0F, 0x1C, 0xC0, 0x1B, 0xD7, 0x02, 0x29, 0x38, 0x88, 0x39, 0xD2, 0xAF, 0x05, 0xE4, 0x54, 0x50, 0x4A, 0xC7, 0x8B, 0x75, 0x82, 0x82, 0x28, 0x46, 0xC0, 0xBA, 0x35, 0xC3, 0x5F, 0x5C, 0x59, 0x16, 0x0C, 0xC0, 0x46, 0xFD, 0x82, 0x51, 0x54, 0x1F, 0xC6, 0x8C, 0x9C, 0x86, 0xB0, 0x22, 0xBB, 0x70, 0x99, 0x87, 0x6A, 0x46, 0x0E, 0x74, 0x51, 0xA8, 0xA9, 0x31, 0x09, 0x70, 0x3F, 0xEE, 0x1C, 0x21, 0x7E, 0x6C, 0x38, 0x26, 0xE5, 0x2C, 0x51, 0xAA, 0x69, 0x1E, 0x0E, 0x42, 0x3C, 0xFC, 0x99, 0xE9, 0xE3, 0x16, 0x50, 0xC1, 0x21, 0x7B, 0x62, 0x48, 0x16, 0xCD, 0xAD, 0x9A, 0x95, 0xF9, 0xD5, 0xB8, 0x01, 0x94, 0x88, 0xD9, 0xC0, 0xA0, 0xA1, 0xFE, 0x30, 0x75, 0xA5, 0x77, 0xE2, 0x31, 0x83, 0xF8, 0x1D, 0x4A, 0x3F, 0x2F, 0xA4, 0x57, 0x1E, 0xFC, 0x8C, 0xE0, 0xBA, 0x8A, 0x4F, 0xE8, 0xB6, 0x85, 0x5D, 0xFE, 0x72, 0xB0, 0xA6, 0x6E, 0xDE, 0xD2, 0xFB, 0xAB, 0xFB, 0xE5, 0x8A, 0x30, 0xFA, 0xFA, 0xBE, 0x1C, 0x5D, 0x71, 0xA8, 0x7E, 0x2F, 0x74, 0x1E, 0xF8, 0xC1, 0xFE, 0x86, 0xFE, 0xA6, 0xBB, 0xFD, 0xE5, 0x30, 0x67, 0x7F, 0x0D, 0x97, 0xD1, 0x1D, 0x49, 0xF7, 0xA8, 0x44, 0x3D, 0x08, 0x22, 0xE5, 0x06, 0xA9, 0xF4, 0x61, 0x4E, 0x01, 0x1E, 0x2A, 0x94, 0x83, 0x8F, 0xF8, 0x8C, 0xD6, 0x8C, 0x8B, 0xB7, 0xC5, 0xC6, 0x42, 0x4C, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe8192Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x4F, 0x0F, 0x78, 0xB7, 0x37, 0xA9, 0x61, 0x8B, 0x26, 0xFA, 0x7D, 0xBC, 0x98, 0x74, 0xF2, 0x72, 0xC4, 0x2B, 0xDB, 0x56, 0x3E, 0xAF, 0xA1, 0x6B, 0x4F, 0xB6, 0x8C, 0x3B, 0xB1, 0xE7, 0x8E, 0xAA, 0x81, 0xA0, 0x02, 0x43, 0xFA, 0xAD, 0xD2, 0xBF, 0x18, 0xE6, 0x3D, 0x38, 0x9A, 0xE4, 0x43, 0x77, 0xDA, 0x18, 0xC5, 0x76, 0xB5, 0x0F, 0x00, 0x96, 0xCF, 0x34, 0x19, 0x54, 0x83, 0xB0, 0x05, 0x48, 0xC0, 0x98, 0x62, 0x36, 0xE3, 0xBC, 0x7C, 0xB8, 0xD6, 0x80, 0x1C, 0x04, 0x94, 0xCC, 0xD1, 0x99, 0xE5, 0xC5, 0xBD, 0x0D, 0x0E, 0xDC, 0x9E, 0xB8, 0xA0, 0x00, 0x1E, 0x15, 0x27, 0x67, 0x54, 0xFC, 0xC6, 0x85, 0x66, 0x05, 0x41, 0x48, 0xE6, 0xE7, 0x64, 0xBE, 0xE7, 0xC7, 0x64, 0xDA, 0xAD, 0x3F, 0xC4, 0x52, 0x35, 0xA6, 0xDA, 0xD4, 0x28, 0xFA, 0x20, 0xC1, 0x70, 0xE3, 0x45, 0x00, 0x3F, 0x2F, 0x06, 0xEC, 0x81, 0x05, 0xFE, 0xB2, 0x5B, 0x22, 0x81, 0xB6, 0x3D, 0x27, 0x33, 0xBE, 0x96, 0x1C, 0x29, 0x95, 0x1D, 0x11, 0xDD, 0x22, 0x21, 0x65, 0x7A, 0x9F, 0x53, 0x1D, 0xDA, 0x2A, 0x19, 0x4D, 0xBB, 0x12, 0x64, 0x48, 0xBD, 0xEE, 0xB2, 0x58, 0xE0, 0x7E, 0xA6, 0x59, 0xC7, 0x46, 0x19, 0xA6, 0x38, 0x0E, 0x1D, 0x66, 0xD6, 0x83, 0x2B, 0xFE, 0x67, 0xF6, 0x38, 0xCD, 0x8F, 0xAE, 0x1F, 0x27, 0x23, 0x02, 0x0F, 0x9C, 0x40, 0xA3, 0xFD, 0xA6, 0x7E, 0xDA, 0x3B, 0xD2, 0x92, 0x38, 0xFB, 0xD4, 0xD4, 0xB4, 0x88, 0x5C, 0x2A, 0x99, 0x17, 0x6D, 0xB1, 0xA0, 0x6C, 0x50, 0x07, 0x78, 0x49, 0x1A, 0x82, 0x88, 0xF1, 0x85, 0x5F, 0x60, 0xFF, 0xFC, 0xF1, 0xD1, 0x37, 0x3F, 0xD9, 0x4F, 0xC6, 0x0C, 0x18, 0x11, 0xE1, 0xAC, 0x3F, 0x1C, 0x6D, 0x00, 0x3B, 0xEC, 0xDA, 0x3B, 0x1F, 0x27, 0x25, 0xCA, 0x59, 0x5D, 0xE0, 0xCA, 0x63, 0x32, 0x8F, 0x3B, 0xE5, 0x7C, 0xC9, 0x77, 0x55, 0x60, 0x11, 0x95, 0x14, 0x0D, 0xFB, 0x59, 0xD3, 0x9C, 0xE0, 0x91, 0x30, 0x8B, 0x41, 0x05, 0x74, 0x6D, 0xAC, 0x23, 0xD3, 0x3E, 0x5F, 0x7C, 0xE4, 0x84, 0x8D, 0xA3, 0x16, 0xA9, 0xC6, 0x6B, 0x95, 0x81, 0xBA, 0x35, 0x73, 0xBF, 0xAF, 0x31, 0x14, 0x96, 0x18, 0x8A, 0xB1, 0x54, 0x23, 0x28, 0x2E, 0xE4, 0x16, 0xDC, 0x2A, 0x19, 0xC5, 0x72, 0x4F, 0xA9, 0x1A, 0xE4, 0xAD, 0xC8, 0x8B, 0xC6, 0x67, 0x96, 0xEA, 0xE5, 0x67, 0x7A, 0x01, 0xF6, 0x4E, 0x8C, 0x08, 0x63, 0x13, 0x95, 0x82, 0x2D, 0x9D, 0xB8, 0xFC, 0xEE, 0x35, 0xC0, 0x6B, 0x1F, 0xEE, 0xA5, 0x47, 0x4D, 0x6D, 0x8F, 0x34, 0xB1, 0x53, 0x4A, 0x93, 0x6A, 0x18, 0xB0, 0xE0, 0xD2, 0x0E, 0xAB, 0x86, 0xBC, 0x9C, 0x6D, 0x6A, 0x52, 0x07, 0x19, 0x4E, 0x67, 0xFA, 0x35, 0x55, 0x1B, 0x56, 0x80, 0x26, 0x7B, 0x00, 0x64, 0x1C, 0x0F, 0x21, 0x2D, 0x18, 0xEC, 0xA8, 0xD7, 0x32, 0x7E, 0xD9, 0x1F, 0xE7, 0x64, 0xA8, 0x4E, 0xA1, 0xB4, 0x3F, 0xF5, 0xB4, 0xF6, 0xE8, 0xE6, 0x2F, 0x05, 0xC6, 0x61, 0xDE, 0xFB, 0x25, 0x88, 0x77, 0xC3, 0x5B, 0x18, 0xA1, 0x51, 0xD5, 0xC4, 0x14, 0xAA, 0xAD, 0x97, 0xBA, 0x3E, 0x49, 0x93, 0x32, 0xE5, 0x96, 0x07, 0x8E, 0x60, 0x0D, 0xEB, 0x81, 0x14, 0x9C, 0x44, 0x1C, 0xE9, 0x57, 0x82, 0xF2, 0x2A, 0x28, 0x25, 0x63, 0xC5, 0xBA, 0xC1, 0x41, 0x14, 0x23, 0x60, 0x5D, 0x1A, 0xE1, 0xAF, 0xAE, 0x2C, 0x8B, 0x06, 0x60, 0x23, 0x7E, 0xC1, 0x28, 0xAA, 0x0F, 0xE3, 0x46, 0x4E, 0x43, 0x58, 0x11, 0x5D, 0xB8, 0x4C, 0xC3, 0xB5, 0x23, 0x07, 0x3A, 0x28, 0xD4, 0x54, 0x98, 0x84, 0xB8, 0x1F, 0xF7, 0x0E, 0x10, 0xBF, 0x36, 0x1C, 0x13, 0x72, 0x96, 0x28, 0xD5, 0x34, 0x8F, 0x07, 0x21, 0x1E, 0x7E, 0x4C, 0xF4, 0xF1, 0x8B, 0x28, 0x60, 0x90, 0xBD, 0xB1, 0x24, 0x0B, 0x66, 0xD6, 0xCD, 0x4A, 0xFC, 0xEA, 0xDC, 0x00, 0xCA, 0x44, 0x6C, 0xE0, 0x50, 0x50, 0xFF, 0x18, 0x3A, 0xD2, 0xBB, 0xF1, 0x18, 0xC1, 0xFC, 0x0E, 0xA5, 0x1F, 0x97, 0xD2, 0x2B, 0x8F, 0x7E, 0x46, 0x70, 0x5D, 0x45, 0x27, 0xF4, 0x5B, 0x42, 0xAE, 0xFF, 0x39, 0x58, 0x53, 0x37, 0x6F, 0x69, 0x7D, 0xD5, 0xFD, 0xF2, 0xC5, 0x18, 0x7D, 0x7D, 0x5F, 0x0E, 0x2E, 0xB8, 0xD4, 0x3F, 0x17, 0xBA, 0x0F, 0x7C, 0x60, 0xFF, 0x43, 0x7F, 0x53, 0x5D, 0xFE, 0xF2, 0x98, 0x33, 0xBF, 0x86, 0xCB, 0xE8, 0x8E, 0xA4, 0xFB, 0xD4, 0x22, 0x1E, 0x84, 0x11, 0x72, 0x83, 0x54, 0xFA, 0x30, 0xA7, 0x00, 0x8F, 0x15, 0x4A, 0x41, 0xC7, 0xFC, 0x46, 0x6B, 0x46, 0x45, 0xDB, 0xE2, 0xE3, 0x21, 0x26, 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; typedef struct { CRYPT_PKEY_ParaId id; const CRYPT_Data *p; const CRYPT_Data *q; const CRYPT_Data *g; } DH_PARA_VECTOR; static const CRYPT_Data G_VECTOR_RFC_3526_2409 = { .data = (uint8_t *)g_rfc3526_2409_primeG, .len = sizeof(g_rfc3526_2409_primeG) }; static const CRYPT_Data G_VECTOR_RFC_7919 = { .data = (uint8_t *)g_rfc7919G, .len = sizeof(g_rfc7919G) }; static const CRYPT_Data Q_VECTOR_RFC_3526_2409 = { .data = NULL, .len = 0 }; static const CRYPT_Data Q_VECTOR_RFC_7919_2048 = { .data = (uint8_t *)g_rfc7919_ffdhe2048Q, .len = sizeof(g_rfc7919_ffdhe2048Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_3072 = { .data = (uint8_t *)g_rfc7919_ffdhe3072Q, .len = sizeof(g_rfc7919_ffdhe3072Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_4096 = { .data = (uint8_t *)g_rfc7919_ffdhe4096Q, .len = sizeof(g_rfc7919_ffdhe4096Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_6144 = { .data = (uint8_t *)g_rfc7919_ffdhe6144Q, .len = sizeof(g_rfc7919_ffdhe6144Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_8192 = { .data = (uint8_t *)g_rfc7919_ffdhe8192Q, .len = sizeof(g_rfc7919_ffdhe8192Q) }; static const CRYPT_Data P_VECTORS_RFC2409_768 = { .data = (uint8_t *)g_rfc2409_prime768P, .len = sizeof(g_rfc2409_prime768P) }; static const CRYPT_Data P_VECTORS_RFC2409_1024 = { .data = (uint8_t *)g_rfc2409_prime1024P, .len = sizeof(g_rfc2409_prime1024P) }; static const CRYPT_Data P_VECTORS_RFC3526_1536 = { .data = (uint8_t *)g_rfc3526_prime1536P, .len = sizeof(g_rfc3526_prime1536P) }; static const CRYPT_Data P_VECTORS_RFC3526_2048 = { .data = (uint8_t *)g_rfc3526_prime2048P, .len = sizeof(g_rfc3526_prime2048P) }; static const CRYPT_Data P_VECTORS_RFC3526_3072 = { .data = (uint8_t *)g_rfc3526_prime3072P, .len = sizeof(g_rfc3526_prime3072P) }; static const CRYPT_Data P_VECTORS_RFC3526_4096 = { .data = (uint8_t *)g_rfc3526_prime4096P, .len = sizeof(g_rfc3526_prime4096P) }; static const CRYPT_Data P_VECTORS_RFC3526_6144 = { .data = (uint8_t *)g_rfc3526_prime6144P, .len = sizeof(g_rfc3526_prime6144P) }; static const CRYPT_Data P_VECTORS_RFC3526_8192 = { .data = (uint8_t *)g_rfc3526_prime8192P, .len = sizeof(g_rfc3526_prime8192P) }; static const CRYPT_Data P_VECTORS_RFC7919_2048 = { .data = (uint8_t *)g_rfc7919_ffdhe2048P, .len = sizeof(g_rfc7919_ffdhe2048P) }; static const CRYPT_Data P_VECTORS_RFC7919_3072 = { .data = (uint8_t *)g_rfc7919_ffdhe3072P, .len = sizeof(g_rfc7919_ffdhe3072P) }; static const CRYPT_Data P_VECTORS_RFC7919_4096 = { .data = (uint8_t *)g_rfc7919_ffdhe4096P, .len = sizeof(g_rfc7919_ffdhe4096P) }; static const CRYPT_Data P_VECTORS_RFC7919_6144 = { .data = (uint8_t *)g_rfc7919_ffdhe6144P, .len = sizeof(g_rfc7919_ffdhe6144P) }; static const CRYPT_Data P_VECTORS_RFC7919_8192 = { .data = (uint8_t *)g_rfc7919_ffdhe8192P, .len = sizeof(g_rfc7919_ffdhe8192P) }; static const DH_PARA_VECTOR DH_PARA_VECTORS[] = { { .id = CRYPT_DH_RFC2409_768, .p = &P_VECTORS_RFC2409_768, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC2409_1024, .p = &P_VECTORS_RFC2409_1024, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_1536, .p = &P_VECTORS_RFC3526_1536, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_2048, .p = &P_VECTORS_RFC3526_2048, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_3072, .p = &P_VECTORS_RFC3526_3072, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_4096, .p = &P_VECTORS_RFC3526_4096, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_6144, .p = &P_VECTORS_RFC3526_6144, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_8192, .p = &P_VECTORS_RFC3526_8192, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC7919_2048, .p = &P_VECTORS_RFC7919_2048, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_2048, }, { .id = CRYPT_DH_RFC7919_3072, .p = &P_VECTORS_RFC7919_3072, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_3072, }, { .id = CRYPT_DH_RFC7919_4096, .p = &P_VECTORS_RFC7919_4096, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_4096, }, { .id = CRYPT_DH_RFC7919_6144, .p = &P_VECTORS_RFC7919_6144, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_6144, }, { .id = CRYPT_DH_RFC7919_8192, .p = &P_VECTORS_RFC7919_8192, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_8192, } }; static const DH_PARA_VECTOR *DhIdIsVaild(uint32_t id) { for (uint32_t i = 0; i < sizeof(DH_PARA_VECTORS) / sizeof(DH_PARA_VECTORS[0]); i++) { if (id == DH_PARA_VECTORS[i].id) { return &DH_PARA_VECTORS[i]; } } return NULL; } CRYPT_DH_Para *CRYPT_DH_NewParaById(CRYPT_PKEY_ParaId id) { CRYPT_DH_Para *retPara = NULL; const DH_PARA_VECTOR *vector = DhIdIsVaild(id); if (vector == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return NULL; } CRYPT_DhPara para; para.p = vector->p->data; para.pLen = vector->p->len; para.q = vector->q->data; para.qLen = vector->q->len; para.g = vector->g->data; para.gLen = vector->g->len; retPara = CRYPT_DH_NewPara(&para); if (retPara == NULL) { goto ERR; } retPara->id = id; static const uint32_t list[] = { CRYPT_DH_RFC3526_1536, CRYPT_DH_RFC3526_2048, CRYPT_DH_RFC3526_3072, CRYPT_DH_RFC3526_4096, CRYPT_DH_RFC3526_6144, CRYPT_DH_RFC3526_8192, }; for (uint32_t i = 0; i < sizeof(list) / sizeof(list[0]); i++) { if (id == list[i]) { /** * NIST.SP.800-56Ar3 * Appendix D * Finite Field Cryptography Groups for Key Establishment: The following safe-prime * groups are defined in RFC 3526 and RFC 7919 for use with key-agreement schemes that * employ either the FFC DH or FFC MQV primitives. * The domain parameters for these groups have the form ( p, q = (p − 1)/2, g = 2 ); the explicit * values for p are provided in the RFCs */ retPara->q = BN_Dup(retPara->p); if (retPara->q == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); goto ERR; } // Shift to the right by 1 bit: q = (p-1)/2 if (BN_Rshift(retPara->q, retPara->q, 1) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); goto ERR; } break; } } return retPara; ERR: CRYPT_DH_FreePara(retPara); return NULL; } CRYPT_PKEY_ParaId CRYPT_DH_GetParaId(const CRYPT_DH_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_PKEY_PARAID_MAX; } return ctx->para->id; } #endif /* HITLS_CRYPTO_DH */
2302_82127028/openHiTLS-examples_2931
crypto/dh/src/dh_para.c
C
unknown
67,041
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DRBG_H #define CRYPT_DRBG_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG #include <stdint.h> #include <stdbool.h> #include "crypt_types.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // hlcheck : health testing // pr : prediction_resistance typedef struct DrbgCtx DRBG_Ctx; #define DRBG_MAX_LEN (0x7ffffff0) #define DRBG_MAX_REQUEST (1 << 16) #ifndef DRBG_MAX_RESEED_INTERVAL #define DRBG_MAX_RESEED_INTERVAL (10000) #endif /* Default reseed intervals */ # define DRBG_RESEED_INTERVAL (1 << 8) # define DRBG_TIME_INTERVAL (60 * 60) /* 1 hour */ #ifndef DRBG_MAX_REQUEST_SM3 #define DRBG_MAX_REQUEST_SM3 (1 << 5) #endif #ifndef DRBG_MAX_REQUEST_SM4 #define DRBG_MAX_REQUEST_SM4 (1 << 4) #endif #ifndef DRBG_RESEED_INTERVAL_GM1 #define DRBG_RESEED_INTERVAL_GM1 (1 << 20) #endif #ifndef DRBG_RESEED_TIME_GM1 #define DRBG_RESEED_TIME_GM1 (600) #endif #ifndef DRBG_RESEED_INTERVAL_GM2 #define DRBG_RESEED_INTERVAL_GM2 (1 << 10) #endif #ifndef DRBG_RESEED_TIME_GM2 #define DRBG_RESEED_TIME_GM2 (60) #endif #ifndef HITLS_CRYPTO_DRBG_GM_LEVEL #define HITLS_CRYPTO_DRBG_GM_LEVEL 2 #endif #ifndef HITLS_CRYPTO_RESEED_INTERVAL_GM #if HITLS_CRYPTO_DRBG_GM_LEVEL == 1 #define HITLS_CRYPTO_RESEED_INTERVAL_GM DRBG_RESEED_INTERVAL_GM1 #else #define HITLS_CRYPTO_RESEED_INTERVAL_GM DRBG_RESEED_INTERVAL_GM2 #endif #endif #ifdef HITLS_CRYPTO_ENTROPY #ifndef HITLS_SEED_DRBG_INIT_RAND_ALG #ifdef HITLS_CRYPTO_AES #define HITLS_SEED_DRBG_INIT_RAND_ALG CRYPT_RAND_AES256_CTR #else #error "HITLS_SEED_DRBG_INIT_RAND_ALG configuration error." #endif #endif #endif #ifndef HITLS_CRYPTO_DRBG_RESEED_TIME_GM #if HITLS_CRYPTO_DRBG_GM_LEVEL == 1 #define HITLS_CRYPTO_DRBG_RESEED_TIME_GM DRBG_RESEED_TIME_GM1 #else #define HITLS_CRYPTO_DRBG_RESEED_TIME_GM DRBG_RESEED_TIME_GM2 #endif #endif #define DRBG_HASH_MAX_MDSIZE (64) #define RAND_TYPE_MD 1 #define RAND_TYPE_MAC 2 #define RAND_TYPE_AES 3 #define RAND_TYPE_AES_DF 4 #define RAND_TYPE_SM4_DF 5 typedef struct { CRYPT_RAND_AlgId drbgId; int32_t depId; uint32_t type; } DrbgIdMap; /** * @ingroup drbg * @brief Apply for a context for the DRBG. * @brief This API does not support multiple threads. * * @param libCtx Library context * @param algId Algorithm ID for the DRBG * @param param DRBG parameters * * @retval DRBG_Ctx* Success * @retval NULL Failure */ DRBG_Ctx *DRBG_New(void *libCtx, int32_t algId, BSL_Param *param); /** * @ingroup drbg * @brief Release the DRBG context. * @brief This API does not support multiple threads. * * @param ctx DRBG context * * @retval None */ void DRBG_Free(DRBG_Ctx *ctx); /** * @ingroup drbg * @brief Instantiating a DRBG based on personalization string. * @brief This API does not support multiple threads. * * @param ctx DRBG context * @param person Personalization string. The personalization string can be NULL. * @param persLen Personalization string length, * @param param DRBG parameters,Not in use yet * * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_DRBG_ERR_STATE The DRBG status is incorrect. * @retval CRYPT_DRBG_FAIL_GET_ENTROPY Failed to obtain the entropy. * @retval CRYPT_DRBG_FAIL_GET_NONCE Failed to obtain the nonce. * @retval Hash function error code: Failed to invoke the hash function. */ int32_t DRBG_Instantiate(DRBG_Ctx *ctx, const uint8_t *person, uint32_t persLen, BSL_Param *param); /** * @ingroup drbg * @brief Reseeding the DRBG. * @brief The additional input can be NULL. This API does not support multiple threads. * * @param ctx DRBG context * @param adin Additional input. The data can be empty. * @param adinLen Additional input length * @param param DRBG parameters,Not in use yet * * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_DRBG_ERR_STATE The DRBG status is incorrect. * @retval CRYPT_DRBG_FAIL_GET_ENTROPY Failed to obtain the entropy. * @retval Hash function error code: Failed to invoke the hash function. */ int32_t DRBG_Reseed(DRBG_Ctx *ctx, const uint8_t *adin, uint32_t adinLen, BSL_Param *param); /** * @ingroup drbg * @brief Generating pseudorandom bits using a DRBG. * @brief The additional input can be null. The user specifies the additional obfuscation data. * This API does not support multiple threads. * @brief External invoking must have a recovery mechanism after the status is abnormal. * * @param ctx DRBG context * @param out Output BUF * @param outLen Output length * @param adin Additional input. The data can be empty. * @param adinLen Additional input length * @param param DRBG parameters,involve: * pr Predicted resistance. If this parameter is set to true, reseed is executed each time. * * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_DRBG_ERR_STATE The DRBG status is incorrect. * @retval Hash function error code: Failed to invoke the hash function. */ int32_t DRBG_GenerateBytes(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const uint8_t *adin, uint32_t adinLen, BSL_Param *param); /** * @ingroup drbg * @brief Remove the DRBG instantiation * @brief This API does not support multiple threads. * * @param ctx DRBG context * * @retval CRYPT_SUCCESS Removed successfully. * @retval CRYPT_NULL_INPUT Invalid null pointer */ int32_t DRBG_Uninstantiate(DRBG_Ctx *ctx); /** * @ingroup drbg * @brief get or set drbg param * * @param ctx [IN] drbg context * @param cmd [IN] Option information * @param val [IN/OUT] Data to be set/obtained * @param valLen [IN] Length of the data marked as "val" * * @retval #CRYPT_SUCCESS. * For other error codes, see crypt_errno.h. */ int32_t DRBG_Ctrl(DRBG_Ctx *ctx, int32_t cmd, void *val, uint32_t valLen); /** * @ingroup drbg * @brief Get the map corresponding to the algid. * * @param id enum of CRYPT_RAND_AlgId * * @retval DrbgIdMap * @retval NULL Invalid arguments */ const DrbgIdMap *DRBG_GetIdMap(CRYPT_RAND_AlgId id); #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DRBG #endif // CRYPT_DRBG_H
2302_82127028/openHiTLS-examples_2931
crypto/drbg/include/crypt_drbg.h
C
unknown
7,080
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG #include <stdlib.h> #include <stdbool.h> #include <securec.h> #include "crypt_types.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "crypt_ealinit.h" #include "eal_entropy.h" #include "bsl_err_internal.h" #include "drbg_local.h" #include "crypt_drbg_local.h" #include "bsl_params.h" #include "crypt_params_key.h" #define DRBG_NONCE_FROM_ENTROPY (2) // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static void DRBG_CleanEntropy(DRBG_Ctx *ctx, CRYPT_Data *entropy) { CRYPT_RandSeedMethod *seedMeth = NULL; if (ctx == NULL || CRYPT_IsDataNull(entropy)) { return; } seedMeth = &ctx->seedMeth; if (seedMeth->cleanEntropy != NULL) { seedMeth->cleanEntropy(ctx->seedCtx, entropy); } entropy->data = NULL; entropy->len = 0; return; } // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static int32_t DRBG_GetEntropy(DRBG_Ctx *ctx, CRYPT_Data *entropy, bool addEntropy) { int32_t ret; CRYPT_RandSeedMethod *seedMeth = NULL; CRYPT_Range entropyRange = ctx->entropyRange; uint32_t strength = ctx->strength; seedMeth = &ctx->seedMeth; if (addEntropy) { strength += strength / DRBG_NONCE_FROM_ENTROPY; entropyRange.min += ctx->nonceRange.min; entropyRange.max += ctx->nonceRange.max; } if (seedMeth->getEntropy == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } // CPRNG is implemented by hooks, in DRBG, the CPRNG is not verified, // but only the entropy source pointer and its length are verified. ret = seedMeth->getEntropy(ctx->seedCtx, entropy, strength, &entropyRange); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } if (CRYPT_CHECK_DATA_INVALID(entropy)) { goto ERR; } if (!CRYPT_IN_RANGE(entropy->len, &entropyRange)) { goto ERR; } return CRYPT_SUCCESS; ERR: DRBG_CleanEntropy(ctx, entropy); BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static void DRBG_CleanNonce(DRBG_Ctx *ctx, CRYPT_Data *nonce) { CRYPT_RandSeedMethod *seedMeth = NULL; if (ctx == NULL || CRYPT_IsDataNull(nonce)) { return; } seedMeth = &ctx->seedMeth; if (seedMeth->cleanNonce != NULL) { seedMeth->cleanNonce(ctx->seedCtx, nonce); } nonce->data = NULL; nonce->len = 0; return; } // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static int32_t DRBG_GetNonce(DRBG_Ctx *ctx, CRYPT_Data *nonce, bool *addEntropy) { int32_t ret; CRYPT_RandSeedMethod *seedMeth = NULL; seedMeth = &ctx->seedMeth; // Allowed nonce which entered by the user can be NULL. // In this case, set *addEntropy to true to obtain the nonce from the entropy. if (seedMeth->getNonce == NULL || ctx->nonceRange.max == 0) { if (ctx->nonceRange.min > 0) { *addEntropy = true; } return CRYPT_SUCCESS; } ret = seedMeth->getNonce(ctx->seedCtx, nonce, ctx->strength, &ctx->nonceRange); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_NONCE); return CRYPT_DRBG_FAIL_GET_NONCE; } if (CRYPT_CHECK_DATA_INVALID(nonce)) { goto ERR; } if (!CRYPT_IN_RANGE(nonce->len, &ctx->nonceRange)) { goto ERR; } return CRYPT_SUCCESS; ERR: DRBG_CleanNonce(ctx, nonce); BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_NONCE); return CRYPT_DRBG_FAIL_GET_NONCE; } #ifdef HITLS_CRYPTO_DRBG_CTR #define RAND_AES128_KEYLEN 16 #define RAND_AES192_KEYLEN 24 #define RAND_AES256_KEYLEN 32 #define RAND_SM4_KEYLEN 16 static int32_t GetCipherKeyLen(int32_t id, uint32_t *keyLen) { switch (id) { case CRYPT_CIPHER_AES128_CTR: *keyLen = RAND_AES128_KEYLEN; break; case CRYPT_CIPHER_AES192_CTR: *keyLen = RAND_AES192_KEYLEN; break; case CRYPT_CIPHER_AES256_CTR: *keyLen = RAND_AES256_KEYLEN; break; case CRYPT_CIPHER_SM4_CTR: *keyLen = RAND_SM4_KEYLEN; break; default: BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ALG_NOT_SUPPORT); return CRYPT_DRBG_ALG_NOT_SUPPORT; } return CRYPT_SUCCESS; } #endif static int32_t DRBG_Restart(DRBG_Ctx *ctx) { if (ctx->state == DRBG_STATE_ERROR) { (void)DRBG_Uninstantiate(ctx); } if (ctx->state == DRBG_STATE_UNINITIALISED) { int32_t ret = DRBG_Instantiate(ctx, NULL, 0, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return CRYPT_SUCCESS; } DRBG_Ctx *DRBG_New(void *libCtx, int32_t algId, BSL_Param *param) { int32_t ret; (void)libCtx; CRYPT_RandSeedMethod seedMethArray = {0}; CRYPT_RandSeedMethod *seedMeth = &seedMethArray; void *seedCtx = NULL; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_GETENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.getEntropy), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_CLEANENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.cleanEntropy), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_GETNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.getNonce), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_CLEANNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.cleanNonce), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEEDCTX)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, &seedCtx, NULL), ret); } DRBG_Ctx *drbg = NULL; EAL_RandMethLookup lu = { 0 }; if (EAL_RandFindMethod(algId, &lu) != CRYPT_SUCCESS) { return NULL; } switch (lu.type) { #ifdef HITLS_CRYPTO_DRBG_HASH case RAND_TYPE_MD: drbg = DRBG_NewHashCtx((const EAL_MdMethod *)(lu.method), algId == CRYPT_RAND_SM3, seedMeth, seedCtx); break; #endif #ifdef HITLS_CRYPTO_DRBG_HMAC case RAND_TYPE_MAC: drbg = DRBG_NewHmacCtx(libCtx, (const EAL_MacMethod *)(lu.method), lu.methodId, seedMeth, seedCtx); break; #endif #ifdef HITLS_CRYPTO_DRBG_CTR case RAND_TYPE_SM4_DF: case RAND_TYPE_AES: case RAND_TYPE_AES_DF: { bool isUsedDF = (lu.type == RAND_TYPE_AES_DF || lu.type == RAND_TYPE_SM4_DF) ? true : false; uint32_t keyLen; if (GetCipherKeyLen(lu.methodId, &keyLen) != CRYPT_SUCCESS) { return NULL; } drbg = DRBG_NewCtrCtx((const EAL_SymMethod *)(lu.method), keyLen, algId == CRYPT_RAND_SM4_CTR_DF, isUsedDF, seedMeth, seedCtx); break; } #endif default: BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } return drbg; ERR: return NULL; } void DRBG_Free(DRBG_Ctx *ctx) { if (ctx == NULL || ctx->meth == NULL || ctx->meth->free == NULL) { return; } void (*ctxFree)(DRBG_Ctx *ctx) = ctx->meth->free; DRBG_Uninstantiate(ctx); ctxFree(ctx); return; } int32_t DRBG_Instantiate(DRBG_Ctx *ctx, const uint8_t *person, uint32_t persLen, BSL_Param *param) { (void) param; int32_t ret; CRYPT_Data entropy = {NULL, 0}; CRYPT_Data nonce = {NULL, 0}; CRYPT_Data pers = {(uint8_t *)(uintptr_t)person, persLen}; bool addEntropy = false; if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (CRYPT_CHECK_DATA_INVALID(&pers)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (persLen > ctx->maxPersLen) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_INVALID_LEN); return CRYPT_DRBG_INVALID_LEN; } if (ctx->state != DRBG_STATE_UNINITIALISED) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ERR_STATE); return CRYPT_DRBG_ERR_STATE; } ctx->state = DRBG_STATE_ERROR; ret = DRBG_GetNonce(ctx, &nonce, &addEntropy); if (ret != CRYPT_SUCCESS) { goto ERR_NONCE; } ret = DRBG_GetEntropy(ctx, &entropy, addEntropy); if (ret != CRYPT_SUCCESS) { goto ERR_ENTROPY; } ret = ctx->meth->instantiate(ctx, &entropy, &nonce, &pers); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR_ENTROPY; } ctx->state = DRBG_STATE_READY; ctx->reseedCtr = 1; #if defined(HITLS_CRYPTO_DRBG_GM) if (ctx->reseedIntervalTime != 0) { ctx->lastReseedTime = BSL_SAL_CurrentSysTimeGet(); } #endif ERR_ENTROPY: DRBG_CleanEntropy(ctx, &entropy); ERR_NONCE: DRBG_CleanNonce(ctx, &nonce); return ret; } static inline bool DRBG_IsNeedReseed(const DRBG_Ctx *ctx, bool pr) { if (pr) { return true; } if (ctx->reseedCtr > ctx->reseedInterval) { return true; } #if defined(HITLS_CRYPTO_DRBG_GM) if (ctx->reseedIntervalTime != 0) { int64_t time = BSL_SAL_CurrentSysTimeGet(); return ((time - ctx->lastReseedTime) > ctx->reseedIntervalTime) ? true : false; } #endif return false; } int32_t DRBG_Reseed(DRBG_Ctx *ctx, const uint8_t *adin, uint32_t adinLen, BSL_Param *param) { (void) param; int32_t ret; CRYPT_Data entropy = {NULL, 0}; CRYPT_Data adinData = {(uint8_t*)(uintptr_t)adin, adinLen}; if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (CRYPT_CHECK_BUF_INVALID(adin, adinLen)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (adinLen > ctx->maxAdinLen) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_INVALID_LEN); return CRYPT_DRBG_INVALID_LEN; } if (ctx->state != DRBG_STATE_READY) { if (DRBG_Restart(ctx) != CRYPT_SUCCESS) { return CRYPT_DRBG_ERR_STATE; } } ctx->state = DRBG_STATE_ERROR; ret = DRBG_GetEntropy(ctx, &entropy, false); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = ctx->meth->reseed(ctx, &entropy, &adinData); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ctx->reseedCtr = 1; #if defined(HITLS_CRYPTO_DRBG_GM) if (ctx->reseedIntervalTime != 0) { ctx->lastReseedTime = BSL_SAL_CurrentSysTimeGet(); } #endif ctx->state = DRBG_STATE_READY; ERR: DRBG_CleanEntropy(ctx, &entropy); return ret; } int32_t DRBG_Generate(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const uint8_t *adin, uint32_t adinLen, bool pr) { int32_t ret; CRYPT_Data adinData = {(uint8_t*)(uintptr_t)adin, adinLen}; if (CRYPT_CHECK_BUF_INVALID(adin, adinLen)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (outLen > ctx->maxRequest || adinLen > ctx->maxAdinLen) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_INVALID_LEN); return CRYPT_DRBG_INVALID_LEN; } if (ctx->state != DRBG_STATE_READY) { if (DRBG_Restart(ctx) != CRYPT_SUCCESS) { return CRYPT_DRBG_ERR_STATE; } } if (DRBG_IsNeedReseed(ctx, pr)) { ret = DRBG_Reseed(ctx, adin, adinLen, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } adinData.data = NULL; adinData.len = 0; } ret = ctx->meth->generate(ctx, out, outLen, &adinData); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ctx->reseedCtr++; return ret; } int32_t DRBG_GenerateBytes(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const uint8_t *adin, uint32_t adinLen, BSL_Param *param) { if (ctx == NULL || out == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; bool pr = ctx->predictionResistance; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_PR)) != NULL) { uint32_t boolSize = sizeof(bool); ret = BSL_PARAM_GetValue(temp, CRYPT_PARAM_RAND_PR, BSL_PARAM_TYPE_BOOL, (void *)&pr, &boolSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } uint32_t block = ctx->maxRequest; if (block == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } for (uint32_t leftLen = outLen; leftLen > 0; leftLen -= block, out += block) { block = leftLen > block ? block : leftLen; ret = DRBG_Generate(ctx, out, block, adin, adinLen, pr); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return CRYPT_SUCCESS; } int32_t DRBG_Uninstantiate(DRBG_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ctx->meth->uninstantiate(ctx); ctx->reseedCtr = 0; ctx->state = DRBG_STATE_UNINITIALISED; return CRYPT_SUCCESS; } #if defined(HITLS_CRYPTO_DRBG_GM) static int32_t DRBG_SetGmlevel(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } if (*(const uint32_t *)val == 1) { ctx->reseedInterval = DRBG_RESEED_INTERVAL_GM1; ctx->reseedIntervalTime = DRBG_RESEED_TIME_GM1; } else { ctx->reseedInterval = DRBG_RESEED_INTERVAL_GM2; ctx->reseedIntervalTime = DRBG_RESEED_TIME_GM2; } return CRYPT_SUCCESS; } static int32_t DRBG_SetReseedIntervalTime(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(uint64_t)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } ctx->reseedIntervalTime = *(const uint64_t *)val; return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_DRBG_GM static int32_t DRBG_SetReseedInterval(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } ctx->reseedInterval = *(const uint32_t *)val; return CRYPT_SUCCESS; } static int32_t DRBG_SetPredictionResistance(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(bool)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } ctx->predictionResistance = *(const bool *)val; return CRYPT_SUCCESS; } int32_t DRBG_Ctrl(DRBG_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { #if defined(HITLS_CRYPTO_DRBG_GM) case CRYPT_CTRL_SET_GM_LEVEL: return DRBG_SetGmlevel(ctx, val, len); case CRYPT_CTRL_SET_RESEED_TIME: return DRBG_SetReseedIntervalTime(ctx, val, len); #endif // HITLS_CRYPTO_DRBG_GM case CRYPT_CTRL_SET_RESEED_INTERVAL: return DRBG_SetReseedInterval(ctx, val, len); case CRYPT_CTRL_SET_PREDICTION_RESISTANCE: return DRBG_SetPredictionResistance(ctx, val, len); default: break; } BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } static const DrbgIdMap DRBG_METHOD_MAP[] = { #if defined(HITLS_CRYPTO_DRBG_HASH) { CRYPT_RAND_SHA1, CRYPT_MD_SHA1, RAND_TYPE_MD }, { CRYPT_RAND_SHA224, CRYPT_MD_SHA224, RAND_TYPE_MD }, { CRYPT_RAND_SHA256, CRYPT_MD_SHA256, RAND_TYPE_MD }, { CRYPT_RAND_SHA384, CRYPT_MD_SHA384, RAND_TYPE_MD }, { CRYPT_RAND_SHA512, CRYPT_MD_SHA512, RAND_TYPE_MD }, #ifdef HITLS_CRYPTO_DRBG_GM { CRYPT_RAND_SM3, CRYPT_MD_SM3, RAND_TYPE_MD }, #endif #endif #if defined(HITLS_CRYPTO_DRBG_HMAC) { CRYPT_RAND_HMAC_SHA1, CRYPT_MAC_HMAC_SHA1, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA224, CRYPT_MAC_HMAC_SHA224, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA256, CRYPT_MAC_HMAC_SHA256, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA384, CRYPT_MAC_HMAC_SHA384, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA512, CRYPT_MAC_HMAC_SHA512, RAND_TYPE_MAC }, #endif #if defined(HITLS_CRYPTO_DRBG_CTR) { CRYPT_RAND_AES128_CTR, CRYPT_CIPHER_AES128_CTR, RAND_TYPE_AES }, { CRYPT_RAND_AES192_CTR, CRYPT_CIPHER_AES192_CTR, RAND_TYPE_AES }, { CRYPT_RAND_AES256_CTR, CRYPT_CIPHER_AES256_CTR, RAND_TYPE_AES }, { CRYPT_RAND_AES128_CTR_DF, CRYPT_CIPHER_AES128_CTR, RAND_TYPE_AES_DF }, { CRYPT_RAND_AES192_CTR_DF, CRYPT_CIPHER_AES192_CTR, RAND_TYPE_AES_DF }, { CRYPT_RAND_AES256_CTR_DF, CRYPT_CIPHER_AES256_CTR, RAND_TYPE_AES_DF }, #ifdef HITLS_CRYPTO_DRBG_GM { CRYPT_RAND_SM4_CTR_DF, CRYPT_CIPHER_SM4_CTR, RAND_TYPE_SM4_DF } #endif #endif }; const DrbgIdMap *DRBG_GetIdMap(CRYPT_RAND_AlgId id) { uint32_t num = sizeof(DRBG_METHOD_MAP) / sizeof(DRBG_METHOD_MAP[0]); for (uint32_t i = 0; i < num; i++) { if (DRBG_METHOD_MAP[i].drbgId == id) { return &DRBG_METHOD_MAP[i]; } } return NULL; } #endif /* HITLS_CRYPTO_DRBG */
2302_82127028/openHiTLS-examples_2931
crypto/drbg/src/drbg.c
C
unknown
18,553
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG_CTR #include <stdlib.h> #include <securec.h> #include "crypt_errno.h" #include "crypt_local_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "crypt_types.h" #include "bsl_err_internal.h" #include "drbg_local.h" #define DRBG_CTR_MAX_KEYLEN (32) #define AES_BLOCK_LEN (16) #define DRBG_CTR_MAX_SEEDLEN (48) #define DRBG_CTR_MIN_ENTROPYLEN (32) typedef struct { uint8_t k[DRBG_CTR_MAX_KEYLEN]; // DRBG_CTR_MAX_KEYLEN 32 uint8_t v[AES_BLOCK_LEN]; // AES_BLOCK_LEN 16 (blockLen) uint8_t kx[DRBG_CTR_MAX_SEEDLEN]; // DRBG_CTR_MAX_SEEDLEN 48 uint32_t keyLen; uint32_t seedLen; const EAL_SymMethod *ciphMeth; void *ctrCtx; void *dfCtx; bool isUsedDf; } DRBG_CtrCtx; static void DRBG_CtrXor(CRYPT_Data *dst, const CRYPT_Data *src) { uint32_t xorlen; if (CRYPT_IsDataNull(dst) || CRYPT_IsDataNull(src)) { return; } xorlen = (dst->len > src->len) ? src->len : dst->len; DATA_XOR(dst->data, src->data, dst->data, xorlen); } static void DRBG_CtrInc(uint8_t *v, uint32_t len) { uint32_t i; uint8_t *p = v + len - 1; for (i = 0; i < len; i++, p--) { (*p)++; if (*p != 0) { break; } } } int32_t DRBG_CtrUpdate(DRBG_Ctx *drbg, const CRYPT_Data *in1, const CRYPT_Data *in2) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; const EAL_SymMethod *ciphMeth = ctx->ciphMeth; int32_t ret; uint8_t tempData[DRBG_CTR_MAX_SEEDLEN]; CRYPT_Data temp; uint32_t offset; if ((ret = ciphMeth->setEncryptKey(ctx->ctrCtx, ctx->k, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } /** While (len (temp) < seedlen) do If ctr_len < blocklen inc = (rightmost (V, ctr_len) + 1) mod 2ctr_len . V = leftmost (V, blocklen-ctr_len) || inc. Else V = (V+1) mod 2blocklen . output_block = Block_Encrypt (Key, V). temp = temp || output_block. */ for (offset = 0; offset < ctx->seedLen; offset += AES_BLOCK_LEN) { DRBG_CtrInc(ctx->v, AES_BLOCK_LEN); if ((ret = ciphMeth->encryptBlock(ctx->ctrCtx, ctx->v, tempData + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } // temp = temp ⊕ provided_data temp.data = tempData; temp.len = ctx->seedLen; DRBG_CtrXor(&temp, in1); DRBG_CtrXor(&temp, in2); // Key = leftmost (temp, keylen). V = rightmost (temp, blocklen). if (memcpy_s(ctx->k, DRBG_CTR_MAX_KEYLEN, temp.data, ctx->keyLen) != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); ret = CRYPT_SECUREC_FAIL; goto EXIT; } // The length to be copied of ctx->V is AES_BLOCK_LEN, which is also the array length. // The lower bits of temp.data are used for ctx->K, and the upper bits are used for ctx->V. (void)memcpy_s(ctx->v, AES_BLOCK_LEN, temp.data + ctx->keyLen, AES_BLOCK_LEN); EXIT: ciphMeth->cipherDeInitCtx(ctx->ctrCtx); return ret; } // BCC implementation, BCC is CBC-MAC: CBC encryption + IV(0) + last ciphertext returned. static int32_t DRBG_CtrBCCUpdateBlock(DRBG_Ctx *drbg, const uint8_t *in, uint8_t *out, uint32_t len) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; /** 4. For i = 1 to n do 4.1 input_block = chaining_value ⊕ blocki. 4.2 chaining_value = Block_Encrypt (Key, input_block). */ DATA_XOR(out, in, out, len); if ((ret = ctx->ciphMeth->encryptBlock(ctx->dfCtx, out, out, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ctx->ciphMeth->cipherDeInitCtx(ctx->dfCtx); } return ret; } static int32_t DRBG_CtrBCCInit(DRBG_Ctx *drbg) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; uint8_t *out = ctx->kx; int32_t ret = CRYPT_SUCCESS; uint8_t in[16] = { 0 }; uint32_t offset = 0; while (offset < ctx->seedLen) { if ((ret = DRBG_CtrBCCUpdateBlock(drbg, in, out + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } in[3]++; // Each cycle is incremented by 1 at the 3rd position. offset += AES_BLOCK_LEN; } return ret; } static int32_t DRBG_CtrBCCUpdateKX(DRBG_Ctx *drbg, const uint8_t *in) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; uint8_t *out = ctx->kx; int32_t ret = CRYPT_SUCCESS; uint32_t offset = 0; while (offset < ctx->seedLen) { if ((ret = DRBG_CtrBCCUpdateBlock(drbg, in, out + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } offset += AES_BLOCK_LEN; } return ret; } // Temporary block storage used by ctr_df static int32_t DRBG_CtrBCCUpdate(DRBG_Ctx *drbg, const CRYPT_Data *in, uint8_t temp[16], uint32_t *tempLen) { uint32_t dataLeft; uint32_t offset = 0; uint32_t tempPos = *tempLen; int32_t ret = CRYPT_SUCCESS; if (CRYPT_IsDataNull(in) || in->len == 0) { return ret; } dataLeft = in->len; do { const uint32_t left = AES_BLOCK_LEN - tempPos; const uint32_t cpyLen = (left > dataLeft) ? dataLeft : left; if (memcpy_s(temp + tempPos, left, in->data + offset, cpyLen) != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); return CRYPT_SECUREC_FAIL; } if (left == cpyLen) { if ((ret = DRBG_CtrBCCUpdateKX(drbg, temp)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } tempPos = 0; } else { tempPos += cpyLen; } dataLeft -= cpyLen; offset += cpyLen; } while (dataLeft > 0); *tempLen = tempPos; return ret; } static int32_t DRBG_CtrBCCFinal(DRBG_Ctx *drbg, uint8_t temp[16], uint32_t tempLen) { int32_t ret; uint32_t i; for (i = tempLen; i < AES_BLOCK_LEN; i++) { temp[i] = 0; } if ((ret = DRBG_CtrBCCUpdateKX(drbg, temp)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t BlockCipherDfCal(DRBG_Ctx *drbg, CRYPT_Data *out) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; const EAL_SymMethod *ciphMeth = ctx->ciphMeth; int32_t ret; uint32_t kOffset = 0; uint32_t vOffset = ctx->keyLen; /* Set up key K */ if ((ret = ciphMeth->setEncryptKey(ctx->ctrCtx, ctx->kx, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } while (kOffset < ctx->seedLen) { ret = ciphMeth->encryptBlock(ctx->ctrCtx, ctx->kx + vOffset, ctx->kx + kOffset, AES_BLOCK_LEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } vOffset = kOffset; kOffset += AES_BLOCK_LEN; } out->data = ctx->kx; out->len = ctx->seedLen; EXIT: ciphMeth->cipherDeInitCtx(ctx->ctrCtx); return ret; } static int32_t BlockCipherDf(DRBG_Ctx *drbg, const CRYPT_Data *in1, const CRYPT_Data *in2, const CRYPT_Data *in3, CRYPT_Data *out) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; uint32_t tempLen = 8; uint8_t temp[16] = { 0 }; uint32_t l; BSL_SAL_CleanseData(ctx->kx, sizeof(ctx->kx)); if ((ret = DRBG_CtrBCCInit(drbg)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } /** 2. L = len (input_string)/8. 3. N = number_of_bits_to_return/8. 4. S = L || N || input_string || 0x80. 5. While (len (S) mod outlen) ≠ 0, do S = S || 0x00. 6. temp = the Null string. 9. While len (temp) < keylen + outlen, do 9.1 IV = i || 0^(outlen - len (i)) 9.2 temp = temp || BCC (K, (IV || S)). 9.3 i = i + 1. */ l = (in1 ? in1->len : 0) + (in2 ? in2->len : 0) + (in3 ? in3->len : 0); temp[0] = (uint8_t)((l >> 24) & 0xff); temp[1] = (uint8_t)((l >> 16) & 0xff); temp[2] = (uint8_t)((l >> 8) & 0xff); temp[3] = (uint8_t)(l & 0xff); temp[4] = 0; temp[5] = 0; temp[6] = 0; temp[7] = (uint8_t)ctx->seedLen; if ((ret = DRBG_CtrBCCUpdate(drbg, in1, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrBCCUpdate(drbg, in2, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrBCCUpdate(drbg, in3, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } temp[tempLen++] = 0x80; if ((ret = DRBG_CtrBCCFinal(drbg, temp, tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } /** 13. While len (temp) < number_of_bits_to_return, do 13.1 X = Block_Encrypt (K, X). 13.2 temp = temp || X. */ if ((ret = BlockCipherDfCal(drbg, out)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DRBG_CtrSetDfKey(DRBG_Ctx *drbg) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; const EAL_SymMethod *ciphMeth = ctx->ciphMeth; int32_t ret = CRYPT_SUCCESS; BSL_SAL_CleanseData(ctx->ctrCtx, ciphMeth->ctxSize); if (ctx->isUsedDf) { /* df initialisation */ const uint8_t dfKey[32] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }; BSL_SAL_CleanseData(ctx->dfCtx, ciphMeth->ctxSize); /* Set key schedule for dfKey */ if ((ret = ctx->ciphMeth->setEncryptKey(ctx->dfCtx, dfKey, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } } return ret; } int32_t DRBG_CtrInstantiate(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *nonce, const CRYPT_Data *pers) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; CRYPT_Data seedMaterial; int32_t ret; if ((ret = DRBG_CtrSetDfKey(drbg)) != CRYPT_SUCCESS) { return ret; } /** * 4. Key = 0(keylen) * 5. V = 0(blocklen) */ BSL_SAL_CleanseData(ctx->k, sizeof(ctx->k)); BSL_SAL_CleanseData(ctx->v, sizeof(ctx->v)); /* seed_material = entropy_input ⊕ personalization_string. (Key, V) = CTR_DRBG_Update (seed_material, Key, V). */ if (!ctx->isUsedDf) { if ((ret = DRBG_CtrUpdate(drbg, entropy, pers)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } // seed_material = entropy_input || nonce || personalization_string. if ((ret = BlockCipherDf(drbg, entropy, nonce, pers, &seedMaterial)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ctx->ciphMeth->cipherDeInitCtx(ctx->dfCtx); return ret; } if ((ret = DRBG_CtrUpdate(drbg, &seedMaterial, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t DRBG_CtrReseed(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *adin) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; CRYPT_Data seedMaterial; int32_t ret; if (!ctx->isUsedDf) { if ((ret = DRBG_CtrUpdate(drbg, entropy, adin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } // seed_material = entropy_input || additional_input. if ((ret = BlockCipherDf(drbg, entropy, adin, NULL, &seedMaterial)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrUpdate(drbg, &seedMaterial, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DRBG_CtrGenerateBlock(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; DRBG_CtrInc(ctx->v, outLen); if ((ret = ctx->ciphMeth->encryptBlock(ctx->ctrCtx, ctx->v, out, outLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ctx->ciphMeth->cipherDeInitCtx(ctx->ctrCtx); } return ret; } static int32_t DRBG_CtrGenerateBlocks(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; uint32_t offset = 0; uint32_t tmpOutLen = outLen; int32_t ret; if ((ret = ctx->ciphMeth->setEncryptKey(ctx->ctrCtx, ctx->k, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } while (tmpOutLen >= AES_BLOCK_LEN) { if ((ret = DRBG_CtrGenerateBlock(drbg, out + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } tmpOutLen -= AES_BLOCK_LEN; offset += AES_BLOCK_LEN; } if (tmpOutLen > 0) { uint8_t temp[AES_BLOCK_LEN]; if ((ret = DRBG_CtrGenerateBlock(drbg, temp, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // tmpOutLen indicates the length of the out remaining. In the last part of DRBG generation, // truncate the length of tmpOutLen and assign it to the out remaining. (void)memcpy_s(out + offset, tmpOutLen, temp, tmpOutLen); } return ret; } int32_t DRBG_CtrGenerate(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; /** If (additional_input ≠ Null), then temp = len (additional_input) If (temp < seedlen), then additional_input = additional_input || 0^(seedlen - temp). (Key, V) = CTR_DRBG_Update (additional_input, Key, V) Else additional_input = 0seedlen. */ if (adin != NULL && adin->data != NULL && adin->len != 0) { if (!ctx->isUsedDf) { if ((ret = DRBG_CtrUpdate(drbg, adin, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } else { // additional_input = Block_Cipher_df (additional_input, seedlen). if ((ret = BlockCipherDf(drbg, adin, NULL, NULL, (CRYPT_Data *)(uintptr_t)adin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrUpdate(drbg, adin, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } } /** 3. temp = Null. 4. While (len (temp) < requested_number_of_bits) do: 4.1 If ctr_len < blocklen 4.1.1 inc = (rightmost (V, ctr_len) + 1) mod 2ctr_len . 4.1.2 V = leftmost (V, blocklen-ctr_len) || inc. Else V = (V+1) mod 2blocklen . 4.2 output_block = Block_Encrypt (Key, V). 4.3 temp = temp || output_block. 5. returned_bits = leftmost (temp, requested_number_of_bits). */ if ((ret = DRBG_CtrGenerateBlocks(drbg, out, outLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // (Key, V) = CTR_DRBG_Update (additional_input, Key, V). if ((ret = DRBG_CtrUpdate(drbg, adin, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } void DRBG_CtrUnInstantiate(DRBG_Ctx *drbg) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)drbg->ctx; ctx->ciphMeth->cipherDeInitCtx(ctx->ctrCtx); ctx->ciphMeth->cipherDeInitCtx(ctx->dfCtx); BSL_SAL_CleanseData((void *)(ctx->k), sizeof(ctx->k)); BSL_SAL_CleanseData((void *)(ctx->v), sizeof(ctx->v)); BSL_SAL_CleanseData((void *)(ctx->kx), sizeof(ctx->kx)); } DRBG_Ctx *DRBG_CtrDup(DRBG_Ctx *drbg) { if (drbg == NULL) { return NULL; } DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)drbg->ctx; DRBG_Ctx *newDrbg = DRBG_NewCtrCtx(ctx->ciphMeth, ctx->keyLen, drbg->isGm, ctx->isUsedDf, &(drbg->seedMeth), drbg->seedCtx); if (newDrbg == NULL) { return NULL; } newDrbg->libCtx = drbg->libCtx; return newDrbg; } void DRBG_CtrFree(DRBG_Ctx *drbg) { if (drbg == NULL) { return; } DRBG_CtrUnInstantiate(drbg); DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)drbg->ctx; BSL_SAL_FREE(ctx->dfCtx); BSL_SAL_FREE(drbg); return; } static void DRBG_InitializeRanges(DRBG_Ctx *drbg, DRBG_CtrCtx *ctx, bool isUsedDf, uint32_t keyLen) { // NIST.SP.800-90Ar1, Section 10.3.1 Table 3 defined those initial value. if (isUsedDf) { // shift rightwards by 3, converting from bit length to byte length drbg->entropyRange.min = (drbg->isGm) ? DRBG_CTR_MIN_ENTROPYLEN : keyLen; drbg->entropyRange.max = DRBG_MAX_LEN; drbg->maxPersLen = DRBG_MAX_LEN; drbg->maxAdinLen = DRBG_MAX_LEN; // NIST.SP.800-90Ar1, Section 8.6.7 defined, a nonce needs (security_strength/2) bits of entropy at least. drbg->nonceRange.min = drbg->entropyRange.min / DRBG_NONCE_FROM_ENTROPY; drbg->nonceRange.max = DRBG_MAX_LEN; } else { drbg->entropyRange.min = ctx->seedLen; drbg->entropyRange.max = ctx->seedLen; drbg->maxPersLen = ctx->seedLen; drbg->maxAdinLen = ctx->seedLen; drbg->nonceRange.min = 0; drbg->nonceRange.max = 0; } } DRBG_Ctx *DRBG_NewCtrCtx(const EAL_SymMethod *ciphMeth, const uint32_t keyLen, bool isGm, const bool isUsedDf, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { static DRBG_Method meth = { DRBG_CtrInstantiate, DRBG_CtrGenerate, DRBG_CtrReseed, DRBG_CtrUnInstantiate, DRBG_CtrDup, DRBG_CtrFree }; if (ciphMeth == NULL || keyLen == 0 || seedMeth == NULL) { return NULL; } DRBG_Ctx *drbg = (DRBG_Ctx*)BSL_SAL_Malloc(sizeof(DRBG_Ctx) + sizeof(DRBG_CtrCtx) + ciphMeth->ctxSize); if (drbg == NULL) { return NULL; } void *dfCtx = (void*)BSL_SAL_Malloc(ciphMeth->ctxSize); // have 2 contexts if (dfCtx == NULL) { BSL_SAL_FREE(drbg); return NULL; } DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)(drbg + 1); ctx->ctrCtx = (void*)(ctx + 1); ctx->dfCtx = dfCtx; ctx->ciphMeth = ciphMeth; drbg->state = DRBG_STATE_UNINITIALISED; drbg->isGm = isGm; drbg->reseedInterval = (drbg->isGm) ? HITLS_CRYPTO_RESEED_INTERVAL_GM : DRBG_MAX_RESEED_INTERVAL; #if defined(HITLS_CRYPTO_DRBG_GM) drbg->reseedIntervalTime = (drbg->isGm) ? HITLS_CRYPTO_DRBG_RESEED_TIME_GM : 0; #endif ctx->keyLen = keyLen; ctx->seedLen = AES_BLOCK_LEN + keyLen; ctx->isUsedDf = isUsedDf; drbg->meth = &meth; drbg->ctx = ctx; drbg->seedMeth = *seedMeth; drbg->seedCtx = seedCtx; drbg->strength = keyLen * 8; drbg->maxRequest = (drbg->isGm) ? DRBG_MAX_REQUEST_SM4 : DRBG_MAX_REQUEST; DRBG_InitializeRanges(drbg, ctx, isUsedDf, keyLen); drbg->predictionResistance = false; return drbg; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/drbg/src/drbg_ctr.c
C
unknown
19,544
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG_HASH #include <stdlib.h> #include <securec.h> #include "crypt_errno.h" #include "crypt_local_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "crypt_types.h" #include "bsl_err_internal.h" #include "drbg_local.h" #define DRBG_HASH_MAX_SEEDLEN (111) typedef enum { DRBG_SHA1MDSIZE = 20, DRBG_SHA224MDSIZE = 28, DRBG_SHA256MDSIZE = 32, DRBG_SHA384MDSIZE = 48, DRBG_SHA512MDSIZE = 64, DRBG_SM3MDSIZE = 32, } DRBG_MdSize; typedef struct { uint8_t v[DRBG_HASH_MAX_SEEDLEN]; uint8_t c[DRBG_HASH_MAX_SEEDLEN]; uint32_t seedLen; const EAL_MdMethod *md; void *mdCtx; } DRBG_HashCtx; // This function performs the ctx->V += xxx operation. static void DRBG_HashAddV(uint8_t *v, uint32_t vLen, uint8_t *src, uint32_t srcLen) { uint8_t *d = v + vLen - 1; uint8_t *s = src + srcLen - 1; uint8_t c = 0; uint32_t r; while (s >= src) { r = (uint32_t)(*d) + (*s) + c; *d = (uint8_t)(r & 0xff); c = (r > 0xff) ? 1 : 0; d--; s--; } while (d >= v && c > 0) { r = (uint32_t)(*d) + c; *d = (uint8_t)(r & 0xff); c = (r > 0xff) ? 1 : 0; d--; } return; } static int32_t DRBG_UpdateDataInHashDf(DRBG_HashCtx *ctx, const CRYPT_Data *in1, const CRYPT_Data *in2, const CRYPT_Data *in3, const CRYPT_Data *in4) { const EAL_MdMethod *meth = ctx->md; void *mdCtx = ctx->mdCtx; int32_t ret = CRYPT_SUCCESS; if (!CRYPT_IsDataNull(in1)) { ret = meth->update(mdCtx, in1->data, in1->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (!CRYPT_IsDataNull(in2)) { ret = meth->update(mdCtx, in2->data, in2->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (!CRYPT_IsDataNull(in3)) { ret = meth->update(mdCtx, in3->data, in3->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (!CRYPT_IsDataNull(in4)) { ret = meth->update(mdCtx, in4->data, in4->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } } return ret; } static void DRBG_HashDfValuesAssig(uint8_t values[5], uint32_t len) { // The value of values is the same as that of counter || no_of_bits_to_return in Hash_df Process // in section 10.3.1 in NIST 800-90a. values[0] = 0x1; // len is shifted leftward by 3, then byte-to-bit. Shift rightwards by 24 bits to get the highest 8 bits. values[1] = (uint8_t)(((len << 3) >> 24) & 0xff); // 2nd, len is shifted leftward by 3, then byte-to-bit. Shift rightwards by 16 bits to get the second 8 bits. values[2] = (uint8_t)(((len << 3) >> 16) & 0xff); // 3rd, len is shifted leftward by 3, then byte-to-bit. Shift rightwards by 8 bits to get the third 8 bits. values[3] = (uint8_t)(((len << 3) >> 8) & 0xff); values[4] = (uint8_t)((len << 3) & 0xff); // 4th, len is shifted leftward by 3, then byte-to-bit. } static int32_t DRBG_HashDf(DRBG_HashCtx *ctx, uint8_t *out, uint32_t outLen, const CRYPT_Data *in1, const CRYPT_Data *in2, const CRYPT_Data *in3, const CRYPT_Data *in4) { const EAL_MdMethod *meth = ctx->md; void *mdCtx = ctx->mdCtx; uint32_t mdSize = meth->mdSize; uint8_t *buf = out; uint32_t len = outLen; int32_t ret; // The temp is the same as that of counter || no_of_bits_to_return in Hash_df Process // in section 10.3.1 in NIST 800-90a. uint8_t temp[5]; // len = floor(no_of_bits_to_return / outlen) DRBG_HashDfValuesAssig(temp, len); do { // temp = temp || Hash (counter || no_of_bits_to_return || input_string). if ((ret = meth->init(mdCtx, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // 5 indicates the maximum length of temp. For details, see the temp statement. if ((ret = meth->update(mdCtx, temp, 5)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = DRBG_UpdateDataInHashDf(ctx, in1, in2, in3, in4)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } uint8_t tmpOut[DRBG_HASH_MAX_MDSIZE]; uint32_t tmpOutLen = DRBG_HASH_MAX_MDSIZE; if (len < mdSize) { if ((ret = meth->final(mdCtx, tmpOut, &tmpOutLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // tmpOutLen is the maximum supported MD length, // and len is the actual length, which must be smaller than tmpOutLen. // Only the len length needs to be truncated as the output. (void)memcpy_s(buf, len, tmpOut, len); break; } if ((ret = meth->final(mdCtx, buf, &tmpOutLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } buf += mdSize; len -= mdSize; temp[0]++; } while (len > 0); EXIT: meth->deinit(mdCtx); return ret; } static int32_t DRBG_Hashgen(DRBG_HashCtx *ctx, uint8_t *out, uint32_t outLen) { uint8_t data[DRBG_HASH_MAX_SEEDLEN]; const EAL_MdMethod *md = ctx->md; void *mdCtx = ctx->mdCtx; int32_t ret = CRYPT_SUCCESS; uint32_t mdSize = md->mdSize; uint32_t tmpLen = mdSize; uint32_t len = outLen; uint8_t *buf = out; // The length of the V array is the longest seedLen. Therefore, there is no failure. (void)memcpy_s(data, sizeof(data), ctx->v, ctx->seedLen); while (len > 0) { uint8_t n = 1; if ((ret = md->init(mdCtx, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = md->update(mdCtx, data, ctx->seedLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (len >= mdSize) { if ((ret = md->final(mdCtx, buf, &tmpLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } else { uint8_t temp[DRBG_HASH_MAX_SEEDLEN]; uint32_t tempLen = DRBG_HASH_MAX_SEEDLEN; if ((ret = md->final(mdCtx, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } (void)memcpy_s(buf, len, temp, len); break; } buf += mdSize; len -= mdSize; DRBG_HashAddV(data, ctx->seedLen, &n, 1); } EXIT: // Clear MD data. md->deinit(mdCtx); return ret; } int32_t DRBG_HashInstantiate(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *nonce, const CRYPT_Data *pers) { DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; CRYPT_Data seed = {ctx->v, (uint32_t)(ctx->seedLen)}; int32_t ret; uint8_t c = 0; CRYPT_Data temp = {&c, 1}; /** 1. seed_material = entropy || nonce || pers 2. seed = Hash_df(seed_material) 3. V = seed 4. C = Hash_df(0x00 || V) */ ret = DRBG_HashDf(ctx, ctx->v, ctx->seedLen, entropy, nonce, pers, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, &seed, NULL, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DRBG_HashAdinInHashGenerate(DRBG_HashCtx *ctx, const CRYPT_Data *adin) { void *mdCtx = ctx->mdCtx; const EAL_MdMethod *md = ctx->md; uint32_t mdSize = md->mdSize; int32_t ret; uint8_t temp = 0x2; uint8_t w[DRBG_HASH_MAX_MDSIZE]; uint32_t wLen = DRBG_HASH_MAX_MDSIZE; ret = md->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = md->update(mdCtx, &temp, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->update(mdCtx, ctx->v, ctx->seedLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->update(mdCtx, adin->data, adin->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->final(mdCtx, w, &wLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } DRBG_HashAddV(ctx->v, ctx->seedLen, w, mdSize); EXIT: // Clear MD data. md->deinit(mdCtx); return ret; } int32_t DRBG_HashGenerate(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin) { DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; const EAL_MdMethod *md = ctx->md; void *mdCtx = ctx->mdCtx; uint32_t mdSize = md->mdSize; uint8_t h[DRBG_HASH_MAX_MDSIZE]; uint32_t len = outLen; int32_t ret; uint32_t reseedCtrBe; /* if adin : w = HASH(0x02 || V || adin) V = (V + w) mod 2^seedLen */ if (!CRYPT_IsDataNull(adin)) { ret = DRBG_HashAdinInHashGenerate(ctx, adin); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } // Hashgen(V, out, len) ret = DRBG_Hashgen(ctx, out, len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // H = HASH(0x03 || V) uint8_t temp = 0x3; ret = md->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = md->update(mdCtx, &temp, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->update(mdCtx, ctx->v, ctx->seedLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->final(mdCtx, h, &mdSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // V = (V + H + C + reseed_counter) mod 2^seedlen DRBG_HashAddV(ctx->v, ctx->seedLen, h, mdSize); DRBG_HashAddV(ctx->v, ctx->seedLen, ctx->c, ctx->seedLen); reseedCtrBe = CRYPT_HTONL((uint32_t)(drbg->reseedCtr)); DRBG_HashAddV(ctx->v, ctx->seedLen, (uint8_t*)&reseedCtrBe, sizeof(reseedCtrBe)); EXIT: // Clear MD data. md->deinit(mdCtx); return ret; } int32_t DRBG_HashReseed(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *adin) { int32_t ret; DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; CRYPT_Data v = {ctx->v, ctx->seedLen}; uint8_t c = 0x1; CRYPT_Data temp = {&c, 1}; /** seed_material = 0x01 || V || entropy_input || additional_input. seed = Hash_Df(seed_material) // The memory of C is reused. V = seed C = Hash_Df(0x00 || V) */ if (drbg->isGm) { ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, entropy, &v, adin); } else { ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, &v, entropy, adin); } if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // The length of the C array is the longest seedLen. Therefore, there is no failure. (void)memcpy_s(ctx->v, sizeof(ctx->v), ctx->c, ctx->seedLen); c = 0x0; ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, &v, NULL, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } void DRBG_HashUnInstantiate(DRBG_Ctx *drbg) { DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; ctx->md->deinit(ctx->mdCtx); BSL_SAL_CleanseData((void *)(ctx->c), sizeof(ctx->c)); BSL_SAL_CleanseData((void *)(ctx->v), sizeof(ctx->v)); } DRBG_Ctx *DRBG_HashDup(DRBG_Ctx *drbg) { if (drbg == NULL) { return NULL; } DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; DRBG_Ctx *newDrbg = DRBG_NewHashCtx(ctx->md, drbg->isGm, &(drbg->seedMeth), drbg->seedCtx); if (newDrbg == NULL) { return NULL; } newDrbg->libCtx = drbg->libCtx; return newDrbg; } void DRBG_HashFree(DRBG_Ctx *drbg) { if (drbg == NULL) { return; } DRBG_HashUnInstantiate(drbg); DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; ctx->md->freeCtx(ctx->mdCtx); BSL_SAL_FREE(drbg); return; } static int32_t DRBG_NewHashCtxBase(uint32_t mdSize, DRBG_Ctx *drbg, DRBG_HashCtx *ctx) { switch (mdSize) { case DRBG_SHA1MDSIZE: drbg->strength = 128; // 128 is the standard content length of nist 800-90a. ctx->seedLen = 55; // 55 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; case DRBG_SHA224MDSIZE: drbg->strength = 192; // 192 is the standard content length of nist 800-90a. ctx->seedLen = 55; // 55 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; case DRBG_SHA256MDSIZE: drbg->strength = 256; // 256 is the standard content length of nist 800-90a. ctx->seedLen = 55; // 55 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; case DRBG_SHA384MDSIZE: case DRBG_SHA512MDSIZE: drbg->strength = 256; // 256 is the standard content length of nist 800-90a. ctx->seedLen = 111; // 111 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ALG_NOT_SUPPORT); return CRYPT_DRBG_ALG_NOT_SUPPORT; } } DRBG_Ctx *DRBG_NewHashCtx(const EAL_MdMethod *md, bool isGm, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { DRBG_Ctx *drbg = NULL; DRBG_HashCtx *ctx = NULL; static DRBG_Method meth = { DRBG_HashInstantiate, DRBG_HashGenerate, DRBG_HashReseed, DRBG_HashUnInstantiate, DRBG_HashDup, DRBG_HashFree }; if (md == NULL || md->newCtx == NULL || md->freeCtx == NULL || seedMeth == NULL) { return NULL; } drbg = (DRBG_Ctx*)BSL_SAL_Malloc(sizeof(DRBG_Ctx) + sizeof(DRBG_HashCtx)); if (drbg == NULL) { return NULL; } ctx = (DRBG_HashCtx*)(drbg + 1); ctx->md = md; ctx->mdCtx = md->newCtx(NULL, md->id); if (ctx->mdCtx == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); BSL_SAL_FREE(drbg); return NULL; } if (DRBG_NewHashCtxBase(md->mdSize, drbg, ctx) != CRYPT_SUCCESS) { BSL_SAL_FREE(drbg); md->freeCtx(ctx->mdCtx); ctx->mdCtx = NULL; return NULL; } drbg->state = DRBG_STATE_UNINITIALISED; drbg->isGm = isGm; drbg->reseedInterval = (drbg->isGm) ? HITLS_CRYPTO_RESEED_INTERVAL_GM : DRBG_MAX_RESEED_INTERVAL; #if defined(HITLS_CRYPTO_DRBG_GM) drbg->reseedIntervalTime = (drbg->isGm) ? HITLS_CRYPTO_DRBG_RESEED_TIME_GM : 0; #endif drbg->meth = &meth; drbg->ctx = ctx; drbg->seedMeth = *seedMeth; drbg->seedCtx = seedCtx; // Shift right by 3, from bit length to byte length drbg->entropyRange.min = drbg->strength >> 3; drbg->entropyRange.max = DRBG_MAX_LEN; drbg->nonceRange.min = drbg->entropyRange.min / DRBG_NONCE_FROM_ENTROPY; drbg->nonceRange.max = DRBG_MAX_LEN; drbg->maxPersLen = DRBG_MAX_LEN; drbg->maxAdinLen = DRBG_MAX_LEN; drbg->maxRequest = (drbg->isGm) ? DRBG_MAX_REQUEST_SM3 : DRBG_MAX_REQUEST; drbg->predictionResistance = false; return drbg; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/drbg/src/drbg_hash.c
C
unknown
16,203
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG_HMAC #include <stdlib.h> #include <securec.h> #include "crypt_errno.h" #include "crypt_local_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "crypt_types.h" #include "bsl_err_internal.h" #include "drbg_local.h" #define DRBG_HMAC_MAX_MDLEN (64) typedef enum { DRBG_HMAC_SHA1SIZE = 20, DRBG_HMAC_SHA224SIZE = 28, DRBG_HMAC_SHA256SIZE = 32, DRBG_HMAC_SHA384SIZE = 48, DRBG_HMAC_SHA512SIZE = 64, } DRBG_HmacSize; typedef struct { uint8_t k[DRBG_HMAC_MAX_MDLEN]; uint8_t v[DRBG_HMAC_MAX_MDLEN]; uint32_t blockLen; const EAL_MacMethod *hmacMeth; CRYPT_MAC_AlgId macId; void *hmacCtx; } DRBG_HmacCtx; static int32_t Hmac(DRBG_HmacCtx *ctx, uint8_t mark, const CRYPT_Data *provData[], int32_t provDataLen) { int32_t ret; uint32_t ctxKLen = sizeof(ctx->k); uint32_t ctxVLen = sizeof(ctx->v); // K = HMAC (K, V || mark || provided_data). mark can be 0x00 or 0x01, // provided_data = in1 || in2 || in3, private_data can be NULL if ((ret = ctx->hmacMeth->init(ctx->hmacCtx, ctx->k, ctx->blockLen, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, ctx->v, ctx->blockLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, &mark, 1)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } for (int32_t i = 0; i < provDataLen; i++) { if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, provData[i]->data, provData[i]->len)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } if ((ret = ctx->hmacMeth->final(ctx->hmacCtx, ctx->k, &ctxKLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // V = HMAC (K, V). if ((ret = ctx->hmacMeth->init(ctx->hmacCtx, ctx->k, ctx->blockLen, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, ctx->v, ctx->blockLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->final(ctx->hmacCtx, ctx->v, &ctxVLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: // clear hmacCtx ctx->hmacMeth->deinit(ctx->hmacCtx); return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.2 HMAC_DRBG Update Process */ static int32_t DRBG_HmacUpdate(DRBG_Ctx *drbg, const CRYPT_Data *provData[], int32_t provDataLen) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx *)drbg->ctx; int32_t ret; // K = HMAC (K, V || 0x00 || provided_data). V = HMAC (K, V), provided_data have 3 input ret = Hmac(ctx, 0x00, provData, provDataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // If (provided_data = Null), then return K and V. It's not an error, it's algorithmic. if (provDataLen == 0) { return ret; } // K = HMAC (K, V || 0x01 || provided_data). V = HMAC (K, V) ret = Hmac(ctx, 0x01, provData, provDataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.3 Instantiation of HMAC_DRBG */ int32_t DRBG_HmacInstantiate(DRBG_Ctx *drbg, const CRYPT_Data *entropyInput, const CRYPT_Data *nonce, const CRYPT_Data *perstr) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx *)drbg->ctx; int32_t ret; const CRYPT_Data *provData[3] = {0}; // We only need 3 at most. int32_t index = 0; if (!CRYPT_IsDataNull(entropyInput)) { provData[index++] = entropyInput; } if (!CRYPT_IsDataNull(nonce)) { provData[index++] = nonce; } if (!CRYPT_IsDataNull(perstr)) { provData[index++] = perstr; } // Key = 0x00 00...00. (void)memset_s(ctx->k, sizeof(ctx->k), 0, ctx->blockLen); // V = 0x01 01...01. (void)memset_s(ctx->v, sizeof(ctx->v), 1, ctx->blockLen); // seed_material = entropy_input || nonce || personalization_string. // (Key, V) = HMAC_DRBG_Update (seed_material, Key, V). ret = DRBG_HmacUpdate(drbg, provData, index); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.4 HMAC_DRBG Reseed Process */ int32_t DRBG_HmacReseed(DRBG_Ctx *drbg, const CRYPT_Data *entropyInput, const CRYPT_Data *adin) { int32_t ret; // seed_material = entropy_input || additional_input. const CRYPT_Data *seedMaterial[2] = {0}; // This stage only needs 2 at most. int32_t index = 0; if (!CRYPT_IsDataNull(entropyInput)) { seedMaterial[index++] = entropyInput; } if (!CRYPT_IsDataNull(adin)) { seedMaterial[index++] = adin; } // (Key, V) = HMAC_DRBG_Update (seed_material, Key, V). ret = DRBG_HmacUpdate(drbg, seedMaterial, index); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.5 HMAC_DRBG Generate Process */ int32_t DRBG_HmacGenerate(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx *)drbg->ctx; const EAL_MacMethod *hmacMeth = ctx->hmacMeth; const uint8_t *temp = ctx->v; uint32_t tmpLen = ctx->blockLen; uint32_t len = outLen; uint8_t *buf = out; int32_t ret; uint32_t ctxVLen; int32_t hasAdin = CRYPT_IsDataNull(adin) ? 0 : 1; // If additional_input ≠ Null, then (Key, V) = HMAC_DRBG_Update (additional_input, Key, V). if (hasAdin == 1) { if ((ret = DRBG_HmacUpdate(drbg, &adin, hasAdin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } /** While (len (temp) < requested_number_of_bits) do: V = HMAC (Key, V). temp = temp || V. */ while (len > 0) { if ((ret = hmacMeth->init(ctx->hmacCtx, ctx->k, ctx->blockLen, NULL)) != CRYPT_SUCCESS || (ret = hmacMeth->update(ctx->hmacCtx, temp, ctx->blockLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (len <= ctx->blockLen) { break; } if ((ret = hmacMeth->final(ctx->hmacCtx, buf, &tmpLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } temp = buf; buf += ctx->blockLen; len -= ctx->blockLen; } ctxVLen = sizeof(ctx->v); if ((ret = hmacMeth->final(ctx->hmacCtx, ctx->v, &ctxVLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // Intercepts the len-length V-value as an output, and because of len <= blockLen, // length of V is always greater than blockLen,Therefore, this problem does not exist. (void)memcpy_s(buf, len, ctx->v, len); // (Key, V) = HMAC_DRBG_Update (additional_input, Key, V). if ((ret = DRBG_HmacUpdate(drbg, &adin, hasAdin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: // clear hmacCtx hmacMeth->deinit(ctx->hmacCtx); return ret; } void DRBG_HmacUnInstantiate(DRBG_Ctx *drbg) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx*)drbg->ctx; ctx->hmacMeth->deinit(ctx->hmacCtx); BSL_SAL_CleanseData((void *)(ctx->k), sizeof(ctx->k)); BSL_SAL_CleanseData((void *)(ctx->v), sizeof(ctx->v)); } DRBG_Ctx *DRBG_HmacDup(DRBG_Ctx *drbg) { if (drbg == NULL) { return NULL; } DRBG_HmacCtx *ctx = (DRBG_HmacCtx*)drbg->ctx; DRBG_Ctx *newDrbg = DRBG_NewHmacCtx(drbg->libCtx, ctx->hmacMeth, ctx->macId, &(drbg->seedMeth), drbg->seedCtx); if (newDrbg == NULL) { return NULL; } newDrbg->libCtx = drbg->libCtx; return newDrbg; } void DRBG_HmacFree(DRBG_Ctx *drbg) { if (drbg == NULL) { return; } DRBG_HmacUnInstantiate(drbg); DRBG_HmacCtx *ctx = (DRBG_HmacCtx*)drbg->ctx; ctx->hmacMeth->freeCtx(ctx->hmacCtx); BSL_SAL_FREE(drbg); return; } static int32_t DRBG_NewHmacCtxBase(uint32_t hmacSize, DRBG_Ctx *drbg) { switch (hmacSize) { case DRBG_HMAC_SHA1SIZE: drbg->strength = 128; // nist 800-90a specified the length must be 128 return CRYPT_SUCCESS; case DRBG_HMAC_SHA224SIZE: drbg->strength = 192; // nist 800-90a specified the length must be 192 return CRYPT_SUCCESS; case DRBG_HMAC_SHA256SIZE: case DRBG_HMAC_SHA384SIZE: case DRBG_HMAC_SHA512SIZE: drbg->strength = 256; // nist 800-90a specified the length must be 256 return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ALG_NOT_SUPPORT); return CRYPT_DRBG_ALG_NOT_SUPPORT; } } DRBG_Ctx *DRBG_NewHmacCtx(void *libCtx, const EAL_MacMethod *hmacMeth, CRYPT_MAC_AlgId macId, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { DRBG_Ctx *drbg = NULL; DRBG_HmacCtx *ctx = NULL; static DRBG_Method meth = { DRBG_HmacInstantiate, DRBG_HmacGenerate, DRBG_HmacReseed, DRBG_HmacUnInstantiate, DRBG_HmacDup, DRBG_HmacFree }; if (hmacMeth == NULL || seedMeth == NULL) { return NULL; } drbg = (DRBG_Ctx*)BSL_SAL_Malloc(sizeof(DRBG_Ctx) + sizeof(DRBG_HmacCtx)); if (drbg == NULL) { return NULL; } ctx = (DRBG_HmacCtx*)(drbg + 1); ctx->hmacMeth = hmacMeth; ctx->macId = macId; void *macCtx = hmacMeth->newCtx(libCtx, ctx->macId); if (macCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(drbg); return NULL; } ctx->hmacCtx = macCtx; uint32_t tempLen = 0; int32_t ret = hmacMeth->ctrl(ctx->hmacCtx, CRYPT_CTRL_GET_MACLEN, &tempLen, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { hmacMeth->freeCtx(ctx->hmacCtx); BSL_SAL_FREE(drbg); return NULL; } ctx->blockLen = tempLen; if (DRBG_NewHmacCtxBase(ctx->blockLen, drbg) != CRYPT_SUCCESS) { hmacMeth->freeCtx(ctx->hmacCtx); BSL_SAL_FREE(drbg); return NULL; } drbg->state = DRBG_STATE_UNINITIALISED; drbg->reseedInterval = DRBG_MAX_RESEED_INTERVAL; drbg->meth = &meth; drbg->ctx = ctx; drbg->seedMeth = *seedMeth; drbg->seedCtx = seedCtx; // shift rightwards by 3, converting from bit length to byte length drbg->entropyRange.min = drbg->strength >> 3; drbg->entropyRange.max = DRBG_MAX_LEN; drbg->nonceRange.min = drbg->entropyRange.min / DRBG_NONCE_FROM_ENTROPY; drbg->nonceRange.max = DRBG_MAX_LEN; drbg->maxPersLen = DRBG_MAX_LEN; drbg->maxAdinLen = DRBG_MAX_LEN; drbg->maxRequest = DRBG_MAX_REQUEST; drbg->libCtx = libCtx; drbg->predictionResistance = false; return drbg; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/drbg/src/drbg_hmac.c
C
unknown
11,780
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef DRBG_LOCAL_H #define DRBG_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG #include <stdint.h> #include "crypt_drbg.h" #ifdef __cplusplus extern "C" { #endif // Relationship between the number of NONCE and ENTROPY #define DRBG_NONCE_FROM_ENTROPY (2) typedef enum { DRBG_STATE_UNINITIALISED, DRBG_STATE_READY, DRBG_STATE_ERROR, } DRBG_State; typedef struct { int32_t (*instantiate)(DRBG_Ctx *ctx, const CRYPT_Data *entropy, const CRYPT_Data *nonce, const CRYPT_Data *pers); int32_t (*generate)(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin); int32_t (*reseed)(DRBG_Ctx *ctx, const CRYPT_Data *entropy, const CRYPT_Data *adin); void (*uninstantiate)(DRBG_Ctx *ctx); DRBG_Ctx* (*dup)(DRBG_Ctx *ctx); void (*free)(DRBG_Ctx *ctx); } DRBG_Method; struct DrbgCtx { bool isGm; DRBG_State state; /* DRBG state */ uint32_t reseedCtr; /* reseed counter */ uint32_t reseedInterval; /* reseed interval times */ #if defined(HITLS_CRYPTO_DRBG_GM) uint64_t lastReseedTime; /* last reseed time, uint: second */ uint64_t reseedIntervalTime; /* Time threshold for reseed, uint: second */ #endif uint32_t strength; /* Algorithm strength */ uint32_t maxRequest; /* Maximum number of bytes per request, which is determined by the algorithm. */ CRYPT_Range entropyRange; /* entropy size range */ CRYPT_Range nonceRange; /* nonce size range */ uint32_t maxPersLen; /* Maximum private data length */ uint32_t maxAdinLen; /* Maximum additional data length */ DRBG_Method *meth; /* Internal different mode method */ void *ctx; /* Mode Context */ /* seed function, which is related to the entropy source and DRBG generation. When seedMeth and seedCtx are empty, the default entropy source is used. */ CRYPT_RandSeedMethod seedMeth; void *seedCtx; /* Seed context */ void *libCtx; /* Library context */ bool predictionResistance; }; #ifdef HITLS_CRYPTO_DRBG_HMAC /** * @ingroup drbg * @brief Apply for a context for the HMAC_DRBG. * @brief This API does not support multiple threads. * * @param libCtx Library context * @param hmacMeth HMAC method * @param mdMeth hash algid * @param seedMeth DRBG seed hook * @param seedCtx DRBG seed context * * @retval DRBG_Ctx* Success * @retval NULL failure */ DRBG_Ctx *DRBG_NewHmacCtx(void *libCtx, const EAL_MacMethod *hmacMeth, CRYPT_MAC_AlgId macId, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #endif #ifdef HITLS_CRYPTO_DRBG_HASH /** * @ingroup drbg * @brief Apply for a context for the Hash_DRBG. * @brief This API does not support multiple threads. * * @param md HASH method * @param isGm is sm3 * @param seedMeth DRBG seed hook * @param seedCtx DRBG seed context * * @retval DRBG_Ctx* Success * @retval NULL failure */ DRBG_Ctx *DRBG_NewHashCtx(const EAL_MdMethod *md, bool isGm, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #endif #ifdef HITLS_CRYPTO_DRBG_CTR /** * @ingroup drbg * @brief Apply for a context for the CTR_DRBG. * @brief This API does not support multiple threads. * * @param ciphMeth AES method * @param keyLen Key length * @param isGm is sm4 * @param isUsedDf Indicates whether to use derivation function. * @param seedMeth DRBG seed hook * @param seedCtx DRBG seed context * * @retval DRBG_Ctx* Success * @retval NULL failure */ DRBG_Ctx *DRBG_NewCtrCtx(const EAL_SymMethod *ciphMeth, const uint32_t keyLen, bool isGm, const bool isUsedDf, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #endif #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DRBG #endif // DRBG_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/drbg/src/drbg_local.h
C
unknown
4,287
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DSA_H #define CRYPT_DSA_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DSA #include <stdint.h> #include "crypt_bn.h" #include "crypt_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #ifndef CRYPT_DSA_TRY_MAX_CNT #define CRYPT_DSA_TRY_MAX_CNT 100 // Maximum number of attempts to generate keys and signatures #endif #define CRYPT_DSA_FFC_PARAM 1 #define CRYPT_DH_FFC_PARAM 2 #define CRYPT_DISABLE_SP800_KEYGEN_FLAG 0 #define CRYPT_ENABLE_SP800_KEYGEN_FLAG 1 /* DSA key parameters */ typedef struct DSA_Para CRYPT_DSA_Para; /* DSA key context */ typedef struct DSA_Ctx CRYPT_DSA_Ctx; /** * @ingroup dsa * @brief dsa Allocates context memory space. * * @retval (CRYPT_DSA_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DSA_Ctx *CRYPT_DSA_NewCtx(void); /** * @ingroup dsa * @brief dsa Allocates context memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_DSA_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DSA_Ctx *CRYPT_DSA_NewCtxEx(void *libCtx); /** * @ingroup dsa * @brief Copy the DSA context. After the duplication is complete, invoke the CRYPT_DSA_FreeCtx to release the memory. * * @param ctx [IN] Source DSA context * * @return CRYPT_DSA_Ctx Dsa context pointer * If the operation fails, null is returned. */ CRYPT_DSA_Ctx *CRYPT_DSA_DupCtx(CRYPT_DSA_Ctx *dsaCtx); /** * @ingroup dsa * @brief dsa Release the key context structure * * @param ctx [IN] Indicates the pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_DSA_FreeCtx(CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief dsa generate key parameter structure * * @param para [IN] dsa external parameter * * @retval (CRYPT_DSA_Para *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DSA_Para *CRYPT_DSA_NewPara(const CRYPT_DsaPara *para); /** * @ingroup dsa * @brief Release the key parameter structure of DSA. * * @param para [IN] Pointer to the key parameter structure to be released. para is set NULL by the invoker. */ void CRYPT_DSA_FreePara(CRYPT_DSA_Para *para); /** * @ingroup dsa * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPara(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPara *para); /** * @ingroup dsa * @brief Set the parameter data in the key structure to the key parameter structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_PARA_ERROR The key parameter data is incorrect. * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Get successfully. */ int32_t CRYPT_DSA_GetPara(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPara *para); /** * @ingroup dsa * @brief dsa Obtain the key length. * * @param ctx [IN] DSA context structure * * @retval 0 The input is incorrect or the corresponding key structure does not contain valid key length. * @retval uint32_t Valid key length */ uint32_t CRYPT_DSA_GetBits(const CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief dsa Obtain the required length of the signature. * * @param ctx [IN] DSA context structure * * @retval 0 The input is incorrect or the corresponding key structure does not contain valid parameter data. * @retval uint32_t Length required for valid signature data */ uint32_t CRYPT_DSA_GetSignLen(const CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief Generate a DSA key pair. * * @param ctx [IN/OUT] DSA context structure * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval CRYPT_DSA_ERR_TRY_CNT Unable to generate results within the specified number of attempts. * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_DSA_Gen(CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief DSA Signature * * @param ctx [IN] DSA context structure * @param algId [IN] md algId * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [OUT] Signature data * @param signLen [IN/OUT] The input parameter is the space length of the sign, * and the output parameter is the valid length of the sign. * The required space can be obtained by calling CRYPT_DSA_GetSignLen. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_DSA_ERR_TRY_CNT Unable to generate results within the specified number of attempts. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error An error occurred in the internal BigNum operation. * @retval CRYPT_SUCCESS Signed successfully. */ int32_t CRYPT_DSA_Sign(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup dsa * @brief DSA Signature * * @param ctx [IN] DSA context structure * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [OUT] Signature data * @param signLen [IN/OUT] The input parameter is the space length of the sign, * and the output parameter is the valid length of the sign. * The required space can be obtained by calling CRYPT_DSA_GetSignLen. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_DSA_ERR_TRY_CNT Unable to generate results within the specified number of attempts. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error An error occurred in the internal BigNum operation. * @retval CRYPT_SUCCESS Signed successfully. */ int32_t CRYPT_DSA_SignData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup dsa * @brief DSA verification * * @param ctx [IN] DSA context structure * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [IN] Signature data * @param signLen [IN] Valid length of the sign * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval CRYPT_DSA_DECODE_FAIL Signature Data Decoding Failure. * @retval CRYPT_DSA_VERIFY_FAIL Failed to verify the signature. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The signature is verified successfully. */ int32_t CRYPT_DSA_VerifyData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup dsa * @brief DSA verification * * @param ctx [IN] DSA context structure * @param algId [IN] md algId * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [IN] Signature data * @param signLen [IN] Valid length of the sign * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval CRYPT_DSA_DECODE_FAIL Signature Data Decoding Failure. * @retval CRYPT_DSA_VERIFY_FAIL Failed to verify the signature. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The signature is verified successfully. */ int32_t CRYPT_DSA_Verify(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup dsa * @brief Set the private key data for the DSA. * * @param ctx [IN] DSA context structure * @param prv [IN] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPrvKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPrv *prv); /** * @ingroup dsa * @brief Set the public key data for the DSA. * * @param ctx [IN] DSA context structure * @param pub [IN] External public key data * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPubKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPub *pub); /** * @ingroup dsa * @brief Obtain the private key data of the DSA. * * @param ctx [IN] DSA context structure * @param prv [OUT] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPrvKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPrv *prv); /** * @ingroup dsa * @brief Obtain the public key data of the DSA. * * @param ctx [IN] DSA context structure * @param pub [OUT] External public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPubKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup dsa * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetParaEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup dsa * @brief Set the parameter data in the key structure to the key parameter structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_PARA_ERROR The key parameter data is incorrect. * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Get successfully. */ int32_t CRYPT_DSA_GetParaEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para); /** * @ingroup dsa * @brief Set the private key data for the DSA. * * @param ctx [IN] DSA context structure * @param para [IN] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPrvKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup dsa * @brief Set the public key data for the DSA. * * @param ctx [IN] DSA context structure * @param para [IN] External public key data * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPubKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup dsa * @brief Obtain the private key data of the DSA. * * @param ctx [IN] DSA context structure * @param para [OUT] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPrvKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para); /** * @ingroup dsa * @brief Obtain the public key data of the DSA. * * @param ctx [IN] DSA context structure * @param para [OUT] External public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPubKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para); #endif /** * @ingroup dsa * @brief dsa Compare public keys and parameters * * @param a [IN] DSA context structure * @param b [IN] DSA context structure * * @retval CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_DSA_PUBKEY_NOT_EQUAL Public keys are not equal. * @retval CRYPT_DSA_PARA_ERROR The parameter information is incorrect. * @retval CRYPT_DSA_PARA_NOT_EQUAL The parameters are not equal. */ int32_t CRYPT_DSA_Cmp(const CRYPT_DSA_Ctx *a, const CRYPT_DSA_Ctx *b); /** * @ingroup dsa * @brief DSA control interface * * @param ctx [IN] DSA context structure * @param opt [IN] Operation mode * @param val [IN] Parameter * @param len [IN] val length * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DSA_Ctrl(CRYPT_DSA_Ctx *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup DSA * @brief DSA get security bits * * @param ctx [IN] DSA Context structure * * @retval security bits */ int32_t CRYPT_DSA_GetSecBits(const CRYPT_DSA_Ctx *ctx); #ifdef HITLS_CRYPTO_DSA_CHECK /** * @ingroup dsa * @brief check the key pair consistency * * @param checkType [IN] check type * @param pkey1 [IN] dsa key context structure * @param pkey2 [IN] dsa key context structure * * @retval CRYPT_SUCCESS succeeded * @retval other error. */ int32_t CRYPT_DSA_Check(uint32_t checkType, const CRYPT_DSA_Ctx *pkey1, const CRYPT_DSA_Ctx *pkey2); #endif // HITLS_CRYPTO_DSA_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DSA #endif // CRYPT_DSA_H
2302_82127028/openHiTLS-examples_2931
crypto/dsa/include/crypt_dsa.h
C
unknown
17,937
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DSA #include "crypt_errno.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_encode_internal.h" #include "dsa_local.h" #include "crypt_dsa.h" #include "eal_md_local.h" #include "crypt_util_rand.h" #include "crypt_params_key.h" #ifdef HITLS_BSL_PARAMS #include "bsl_params.h" #include "crypt_params_key.h" #endif CRYPT_DSA_Ctx *CRYPT_DSA_NewCtx(void) { CRYPT_DSA_Ctx *ctx = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_DSA_Ctx), 0, sizeof(CRYPT_DSA_Ctx)); BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_DSA_Ctx *CRYPT_DSA_NewCtxEx(void *libCtx) { CRYPT_DSA_Ctx *ctx = CRYPT_DSA_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } static bool InputBufferCheck(const uint8_t *buffer, uint32_t bufferLen) { if (buffer == NULL || bufferLen == 0) { return true; } return false; } static int32_t NewParaCheck(const CRYPT_DsaPara *para) { bool invalidInput = (para == NULL) || InputBufferCheck(para->p, para->pLen) || InputBufferCheck(para->q, para->qLen) || InputBufferCheck(para->g, para->gLen); if (invalidInput) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->pLen > BN_BITS_TO_BYTES(DSA_MAX_PBITS)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (para->qLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (para->gLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } return CRYPT_SUCCESS; } static CRYPT_DSA_Para *ParaMemGet(uint32_t bits) { CRYPT_DSA_Para *para = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Para)); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } para->p = BN_Create(bits); para->q = BN_Create(bits); para->g = BN_Create(bits); if (para->p == NULL || para->q == NULL || para->g == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); CRYPT_DSA_FreePara(para); return NULL; } return para; } CRYPT_DSA_Para *CRYPT_DSA_NewPara(const CRYPT_DsaPara *para) { if (NewParaCheck(para) != CRYPT_SUCCESS) { return NULL; } CRYPT_DSA_Para *retPara = ParaMemGet(para->pLen * 8); // bits = bytes * 8 if (retPara == NULL) { return NULL; } int32_t ret = BN_Bin2Bn(retPara->p, para->p, para->pLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(retPara->q, para->q, para->qLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(retPara->g, para->g, para->gLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } return retPara; ERR: CRYPT_DSA_FreePara(retPara); return NULL; } void CRYPT_DSA_FreePara(CRYPT_DSA_Para *para) { if (para == NULL) { return; } BN_Destroy(para->p); BN_Destroy(para->q); BN_Destroy(para->g); BSL_SAL_FREE(para); } void CRYPT_DSA_FreeCtx(CRYPT_DSA_Ctx *ctx) { if (ctx == NULL) { return; } int ref = 0; BSL_SAL_AtomicDownReferences(&(ctx->references), &ref); if (ref > 0) { return; } BSL_SAL_ReferencesFree(&(ctx->references)); CRYPT_DSA_FreePara(ctx->para); BN_Destroy(ctx->x); BN_Destroy(ctx->y); BSL_SAL_FREE(ctx->mdAttr); BSL_SAL_FREE(ctx); } static int32_t ParaPQGCheck(const BN_BigNum *p, const BN_BigNum *q, const BN_BigNum *g) { uint32_t pBits = BN_Bits(p); BN_BigNum *r = BN_Create(pBits + 1); BN_Optimizer *opt = BN_OptimizerCreate(); int32_t ret; if (r == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // judgment of numeric values // r = p - 1 ret = BN_SubLimb(r, p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // q < p - 1 if (BN_Cmp(q, r) >= 0) { ret = CRYPT_DSA_ERR_KEY_PARA; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // g < p - 1 if (BN_Cmp(g, r) >= 0) { ret = CRYPT_DSA_ERR_KEY_PARA; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // judgment of multiple relationship about p & q ret = BN_Div(NULL, r, r, q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // (p - 1) % q == 0 if (!BN_IsZero(r)) { ret = CRYPT_DSA_ERR_KEY_PARA; BSL_ERR_PUSH_ERROR(ret); } EXIT: BN_Destroy(r); BN_OptimizerDestroy(opt); return ret; } static int32_t ParaDataCheck(const CRYPT_DSA_Para *para) { const BN_BigNum *p = para->p; const BN_BigNum *q = para->q; const BN_BigNum *g = para->g; // 1. judge validity of length uint32_t pBits = BN_Bits(p); if (pBits < DSA_MIN_PBITS || pBits > DSA_MAX_PBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bits(q) < DSA_MIN_QBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } // 2. parity judgment of p & q and value judgment of g // p is an odd number && q is an odd number if (BN_GetBit(p, 0) == 0 || BN_GetBit(q, 0) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } // g != 1 && g != 0 if (BN_IsOne(g) || BN_IsZero(g)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } // This interface is invoked only here, and pushErr is performed internally. // If this interface fails, pushErr does not need to be invoked. return ParaPQGCheck(p, q, g); } static CRYPT_DSA_Para *ParaDup(const CRYPT_DSA_Para *para) { CRYPT_DSA_Para *ret = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Para)); if (ret == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ret->p = BN_Dup(para->p); ret->q = BN_Dup(para->q); ret->g = BN_Dup(para->g); if (ret->p == NULL || ret->q == NULL || ret->g == NULL) { CRYPT_DSA_FreePara(ret); BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return NULL; } return ret; } int32_t CRYPT_DSA_SetPara(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DSA_Para *dsaPara = CRYPT_DSA_NewPara(para); if (dsaPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_NEW_PARA_FAIL); return CRYPT_EAL_ERR_NEW_PARA_FAIL; } int32_t ret = ParaDataCheck(dsaPara); if (ret != CRYPT_SUCCESS) { CRYPT_DSA_FreePara(dsaPara); return ret; } BN_Destroy(ctx->x); BN_Destroy(ctx->y); CRYPT_DSA_FreePara(ctx->para); ctx->x = NULL; ctx->y = NULL; ctx->para = dsaPara; return CRYPT_SUCCESS; } int32_t CRYPT_DSA_GetPara(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PARA_ERROR); return CRYPT_DSA_PARA_ERROR; } int32_t ret = BN_Bn2Bin(ctx->para->p, para->p, &(para->pLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Bn2Bin(ctx->para->q, para->q, &(para->qLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Bn2Bin(ctx->para->g, para->g, &(para->gLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } CRYPT_DSA_Ctx *CRYPT_DSA_DupCtx(CRYPT_DSA_Ctx *dsaCtx) { if (dsaCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } CRYPT_DSA_Ctx *dsaNewCtx = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Ctx)); if (dsaNewCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(dsaNewCtx, sizeof(CRYPT_DSA_Ctx), 0, sizeof(CRYPT_DSA_Ctx)); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->x, dsaCtx->x, BN_Dup(dsaCtx->x), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->y, dsaCtx->y, BN_Dup(dsaCtx->y), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->para, dsaCtx->para, ParaDup(dsaCtx->para), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->mdAttr, dsaCtx->mdAttr, BSL_SAL_Dump(dsaCtx->mdAttr, strlen(dsaCtx->mdAttr) + 1), CRYPT_MEM_ALLOC_FAIL); dsaNewCtx->libCtx = dsaCtx->libCtx; BSL_SAL_ReferencesInit(&(dsaNewCtx->references)); return dsaNewCtx; ERR: CRYPT_DSA_FreeCtx(dsaNewCtx); return NULL; } uint32_t CRYPT_DSA_GetBits(const CRYPT_DSA_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return 0; } return BN_Bits(ctx->para->p); } uint32_t CRYPT_DSA_GetSignLen(const CRYPT_DSA_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL) { return 0; } uint32_t qLen = BN_Bytes(ctx->para->q); uint32_t maxSignLen = 0; int32_t ret = CRYPT_EAL_GetSignEncodeLen(qLen, qLen, &maxSignLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return 0; } return maxSignLen; } /* x != 0 && x < q */ int32_t CRYPT_DSA_SetPrvKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPrv *prv) { if (ctx == NULL || prv == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (InputBufferCheck(prv->data, prv->len)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bytes(ctx->para->q) < prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } BN_BigNum *bnX = BN_Create(prv->len * 8); if (bnX == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Bin2Bn(bnX, prv->data, prv->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } // x < q if (BN_Cmp(bnX, ctx->para->q) >= 0) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // x != 0 if (BN_IsZero(bnX)) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->x); ctx->x = bnX; return ret; ERR: BN_Destroy(bnX); return ret; } /* y != 0 && y != 1 && y < p */ int32_t CRYPT_DSA_SetPubKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPub *pub) { if (ctx == NULL || pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (InputBufferCheck(pub->data, pub->len)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bytes(ctx->para->p) < pub->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } BN_BigNum *bnY = BN_Create(pub->len * 8); // bits = bytes * 8 if (bnY == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Bin2Bn(bnY, pub->data, pub->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } // y < p if (BN_Cmp(bnY, ctx->para->p) >= 0) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // y != 0 && y != 1 if (BN_IsZero(bnY) || BN_IsOne(bnY)) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->y); ctx->y = bnY; return CRYPT_SUCCESS; ERR: BN_Destroy(bnY); return ret; } int32_t CRYPT_DSA_GetPrvKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPrv *prv) { if (ctx == NULL || prv == NULL || prv->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (ctx->x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } if (BN_Bytes(ctx->para->q) > prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_DSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret = BN_Bn2Bin(ctx->x, prv->data, &(prv->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DSA_GetPubKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPub *pub) { if (ctx == NULL || pub == NULL || pub->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bytes(ctx->para->p) > pub->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_DSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret = BN_Bn2Bin(ctx->y, pub->data, &(pub->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_DSA_SetParaEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } #ifdef HITLS_CRYPTO_PROVIDER int32_t ret; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(para, CRYPT_PARAM_MD_ATTR)) != NULL) { ret = CRYPT_PkeySetMdAttr((const char *)(temp->value), temp->valueLen, &(ctx->mdAttr)); if (ret != CRYPT_SUCCESS) { return ret; } } #endif if (BSL_PARAM_FindConstParam(para, CRYPT_PARAM_DSA_P) == NULL) { return CRYPT_SUCCESS; } CRYPT_DsaPara dsaPara = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DSA_P, &dsaPara.p, &dsaPara.pLen); (void)GetConstParamValue(para, CRYPT_PARAM_DSA_Q, &dsaPara.q, &dsaPara.qLen); (void)GetConstParamValue(para, CRYPT_PARAM_DSA_G, &dsaPara.g, &dsaPara.gLen); return CRYPT_DSA_SetPara(ctx, &dsaPara); } int32_t CRYPT_DSA_GetParaEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPara eccPara = {0}; BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_DSA_P, &eccPara.p, &eccPara.pLen); BSL_Param *paramQ = GetParamValue(para, CRYPT_PARAM_DSA_Q, &eccPara.q, &eccPara.qLen); BSL_Param *paramG = GetParamValue(para, CRYPT_PARAM_DSA_G, &eccPara.g, &eccPara.gLen); int32_t ret = CRYPT_DSA_GetPara(ctx, &eccPara); if (ret != CRYPT_SUCCESS) { return ret; } paramP->useLen = eccPara.pLen; paramQ->useLen = eccPara.qLen; paramG->useLen = eccPara.gLen; return ret; } int32_t CRYPT_DSA_SetPrvKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPrv dsaPrv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DSA_PRVKEY, &dsaPrv.data, &dsaPrv.len); return CRYPT_DSA_SetPrvKey(ctx, &dsaPrv); } int32_t CRYPT_DSA_SetPubKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPub dsaPub = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DSA_PUBKEY, &dsaPub.data, &dsaPub.len); return CRYPT_DSA_SetPubKey(ctx, &dsaPub); } int32_t CRYPT_DSA_GetPrvKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPrv dsaPrv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_DSA_PRVKEY, &dsaPrv.data, &dsaPrv.len); int32_t ret = CRYPT_DSA_GetPrvKey(ctx, &dsaPrv); if (ret != CRYPT_SUCCESS) { return ret; } if (paramPrv != NULL) { paramPrv->useLen = dsaPrv.len; } return CRYPT_SUCCESS; } int32_t CRYPT_DSA_GetPubKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPub dsaPub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_DSA_PUBKEY, &dsaPub.data, &dsaPub.len); int32_t ret = CRYPT_DSA_GetPubKey(ctx, &dsaPub); if (ret != CRYPT_SUCCESS) { return ret; } if (paramPub != NULL) { paramPub->useLen = dsaPub.len; } return CRYPT_SUCCESS; } #endif static int32_t RandRangeQ(void *libCtx, BN_BigNum *r, const BN_BigNum *q) { int32_t cnt = 0; for (cnt = 0; cnt < CRYPT_DSA_TRY_MAX_CNT; cnt++) { int32_t ret = BN_RandRangeEx(libCtx, r, q); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (BN_IsZero(r)) { continue; } return CRYPT_SUCCESS; // if succeed then exit } /* If the key fails to be generated after try CRYPT_DSA_TRI_MAX_CNT times, then failed and exit. */ BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_TRY_CNT); return CRYPT_DSA_ERR_TRY_CNT; } static void RefreshCtx(CRYPT_DSA_Ctx *ctx, BN_BigNum *x, BN_BigNum *y, int32_t ret) { if (ret == CRYPT_SUCCESS) { BN_Destroy(ctx->x); BN_Destroy(ctx->y); ctx->x = x; ctx->y = y; } else { BN_Destroy(x); BN_Destroy(y); } } /* Security length from NIST.FIPS.186-4 4.2 */ static uint32_t DSAFips1864ValidateSecurityLength(uint32_t pBits, uint32_t qBits, int isGen, int type) { if (type == CRYPT_DSA_FFC_PARAM) { if (pBits == 3072 && qBits == 256) { // If Pbits = 3072 and Qbits = 256. return 128; // Secure length is 128. } if (pBits == 2048 && (qBits == 224 || qBits == 256)) { // If Pbits = 2048 and Qbits = 224 or 256. return 112; // Secure length is 112. } /* Security strength of 80 bits is no longer considered adequate, and is retained only for compatibility. */ if (isGen == 1) { return 0; } if (pBits == 1024 && qBits == 160) { // If Pbits = 1024 and Qbits = 160. return 80; // Secure length is 80. } } else if (type == CRYPT_DH_FFC_PARAM) { if (pBits == 2048 && (qBits == 224 || qBits == 256)) { // If Pbits = 2048 and Qbits = 224 or 256. return 112; // Secure length is 112. } } return 0; } // fips186-4 A.2.2 int32_t CryptDsaFips1864PartialValidateG(const CRYPT_DSA_Para *dsaPara) { if (BN_IsNegative(dsaPara->g) == true || BN_IsZero(dsaPara->g) == true || BN_IsOne(dsaPara->g) == true) { // g < 2 BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); return CRYPT_DSA_VERIFY_FAIL; } int32_t ret; BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); uint32_t pBits = BN_Bits(dsaPara->p); BN_BigNum *p_1 = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); if (p_1 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } ret = BN_SubLimb(p_1, dsaPara->p, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_Cmp(dsaPara->g, p_1) > 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); ret = CRYPT_DSA_VERIFY_FAIL; goto ERR; } ret = BN_ModExp(p_1, dsaPara->g, dsaPara->q, dsaPara->p, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_IsOne(p_1) != true) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); ret = CRYPT_DSA_VERIFY_FAIL; } ERR: OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } // Generate private key, from SP800-56Ar3 5_6_1_1_4 static int32_t DSA_GenPrivateKey(void *libCtx, const CRYPT_DSA_Para *para, BN_BigNum *privKey) { uint32_t pBits = BN_Bits(para->p); uint32_t qBits = BN_Bits(para->q); RETURN_RET_IF(DSAFips1864ValidateSecurityLength(pBits, qBits, 1, CRYPT_DSA_FFC_PARAM) == 0, CRYPT_DSA_PARA_ERROR); int32_t ret = CryptDsaFips1864PartialValidateG(para); RETURN_RET_IF(ret != CRYPT_SUCCESS, ret); ret = CRYPT_MEM_ALLOC_FAIL; BN_BigNum *pow = BN_Create(qBits + 1); GOTO_ERR_IF_TRUE(pow == NULL, ret); GOTO_ERR_IF(BN_SetLimb(pow, 1), ret); GOTO_ERR_IF(BN_Lshift(pow, pow, qBits), ret); BN_BigNum *min = pow; if (BN_Cmp(min, para->q) > 0) { min = para->q; } while (true) { GOTO_ERR_IF(RandRangeQ(libCtx, privKey, pow), ret); // c GOTO_ERR_IF(BN_AddLimb(privKey, privKey, 1), ret); // c + 1 if (BN_Cmp(privKey, min) < 0) { // c <= min - 2 equal to c + 1 < min. break; } } ERR: if (ret != CRYPT_SUCCESS) { (void)BN_Zeroize(privKey); } BN_Destroy(pow); return ret; } int32_t CRYPT_DSA_Gen(CRYPT_DSA_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } int32_t ret = CRYPT_SUCCESS; int32_t cnt; BN_BigNum *x = BN_Create(BN_Bits(ctx->para->q)); BN_BigNum *y = BN_Create(BN_Bits(ctx->para->p)); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (x == NULL || y == NULL || opt == NULL || mont == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } for (cnt = 0; cnt < CRYPT_DSA_TRY_MAX_CNT; cnt++) { /* Generate the private key x of [1, q-1], see RFC6979-2.2. */ if ((ctx->flag & CRYPT_ENABLE_SP800_KEYGEN_FLAG) != 0) { ret = DSA_GenPrivateKey(ctx->libCtx, ctx->para, x); } else { ret = RandRangeQ(ctx->libCtx, x, ctx->para->q); } if (ret != CRYPT_SUCCESS) { // Internal API, the BSL_ERR_PUSH_ERROR info is already exists when failed. goto ERR; } /* Calculate the public key y. */ ret = BN_MontExpConsttime(y, ctx->para->g, x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* y != 0 && y != 1 */ if (BN_IsZero(y) || BN_IsOne(y)) { continue; } goto ERR; // If succeed then exit. } /* If the key fails to be generated after try CRYPT_DSA_TRY_MAX_CNT times, then failed and exit. */ ret = CRYPT_DSA_ERR_TRY_CNT; BSL_ERR_PUSH_ERROR(ret); ERR: RefreshCtx(ctx, x, y, ret); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } // Get the input hash data, see RFC6979-2.4.1 and RFC6979-2.3.2 static BN_BigNum *DSA_Bits2Int(BN_BigNum *q, const uint8_t *data, uint32_t dataLen) { BN_BigNum *d = BN_Create(BN_Bits(q)); // 1 byte = 8 bits if (d == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } if (data != NULL) { uint32_t qLen = BN_Bytes(q); uint32_t dLen = (dataLen < qLen) ? dataLen : qLen; // The input parameters of the function have been verified, and no failure exists. (void)BN_Bin2Bn(d, data, dLen); } return d; } // s = (h + x*r)*k^-1 mod q // s' = (h*blind + x*r*blind)*k^-1*blind^-1 mod q // s == s' static int32_t CalcSValue(const CRYPT_DSA_Ctx *ctx, BN_BigNum *r, BN_BigNum *s, BN_BigNum *k, BN_BigNum *d, BN_Optimizer *opt) { BN_BigNum *blind = BN_Create(BN_Bits(ctx->para->q)); if (blind == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BN_BigNum *blindm = BN_Create(BN_Bits(ctx->para->q)); if (blindm == NULL) { BN_Destroy(blind); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(RandRangeQ(ctx->libCtx, blind, ctx->para->q), ret); GOTO_ERR_IF(BN_ModMul(s, blind, ctx->x, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(s, s, r, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(blindm, blind, d, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModAdd(s, s, blindm, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModInv(k, k, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(s, s, k, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModInv(blind, blind, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(s, s, blind, ctx->para->q, opt), ret); ERR: BN_Destroy(blind); BN_Destroy(blindm); return ret; } static int32_t SignCore(const CRYPT_DSA_Ctx *ctx, BN_BigNum *d, BN_BigNum *r, BN_BigNum *s) { int32_t cnt = 0; int32_t ret = CRYPT_SUCCESS; BN_BigNum *k = BN_Create(BN_Bits(ctx->para->q)); BN_Mont *montP = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (k == NULL || montP == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } for (cnt = 0; cnt < CRYPT_DSA_TRY_MAX_CNT; cnt++) { // Generate random number k of [1, q-1], see RFC6979-2.4.2 */ ret = RandRangeQ(ctx->libCtx, k, ctx->para->q); if (ret != CRYPT_SUCCESS) { // Internal function. The BSL_ERR_PUSH_ERROR information exists when the failure occurs. goto EXIT; } // Compute r = g^k mod p mod q, see RFC6979-2.4.3 */ ret = BN_MontExpConsttime(r, ctx->para->g, k, montP, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Mod(r, r, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsZero(r)) { continue; } // Compute s = (h+x*sign->r)/k mod q, see RFC6979-2.4.4 */ ret = CalcSValue(ctx, r, s, k, d, opt); if (ret != CRYPT_SUCCESS) { goto EXIT; } if (BN_IsZero(s)) { continue; } goto EXIT; // The signature generation meets the requirements and exits successfully. } ret = CRYPT_DSA_ERR_TRY_CNT; BSL_ERR_PUSH_ERROR(ret); EXIT: BN_Destroy(k); BN_MontDestroy(montP); BN_OptimizerDestroy(opt); return ret; } static int32_t CryptDsaSign(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, BN_BigNum **r, BN_BigNum **s) { int32_t ret; BN_BigNum *signR = NULL; BN_BigNum *signS = NULL; BN_BigNum *d = DSA_Bits2Int(ctx->para->q, data, dataLen); if (d == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } signR = BN_Create(BN_Bits(ctx->para->p)); signS = BN_Create(BN_Bits(ctx->para->q)); if ((signR == NULL) || (signS == NULL)) { BN_Destroy(d); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } ret = SignCore(ctx, d, signR, signS); BN_Destroy(d); if (ret != CRYPT_SUCCESS) { goto ERR; } *r = signR; *s = signS; return ret; ERR: BN_Destroy(signR); BN_Destroy(signS); return ret; } // Data with a value of 0 can also be signed. int32_t CRYPT_DSA_SignData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { if (ctx == NULL || sign == NULL || signLen == NULL || (data == NULL && dataLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (ctx->x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } if (*signLen < CRYPT_DSA_GetSignLen(ctx)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_DSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret; BN_BigNum *r = NULL; BN_BigNum *s = NULL; ret = CryptDsaSign(ctx, data, dataLen, &r, &s); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_EncodeSign(r, s, sign, signLen); BN_Destroy(r); BN_Destroy(s); return ret; } int32_t CRYPT_DSA_Sign(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t hash[64]; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_DSA_SignData(ctx, hash, hashLen, sign, signLen); } static int32_t VerifyCore(const CRYPT_DSA_Ctx *ctx, BN_BigNum *d, BN_BigNum *r, BN_BigNum *s) { int32_t ret = CRYPT_MEM_ALLOC_FAIL; BN_BigNum *u1 = BN_Create(BN_Bits(ctx->para->p)); BN_BigNum *u2 = BN_Create(BN_Bits(ctx->para->p)); BN_BigNum *w = BN_Create(BN_Bits(ctx->para->q)); BN_Mont *montP = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (u1 == NULL || u2 == NULL || w == NULL || montP == NULL || opt == NULL) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Calculate w = 1/s mod q * u1 = (d * w) mod q * u2 = (r * w) mod q * u1 = (g ^ u1) mod p * u2 = (y ^ u2) mod p * v = (u1 * u2) mod p * v = v mod q * If v == r, sign verification is succeeded. */ ret = BN_ModInv(w, s, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModMul(u1, d, w, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModMul(u2, r, w, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_MontExpMul(u1, ctx->para->g, u1, ctx->y, u2, montP, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Mod(u1, u1, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Cmp(u1, r); if (ret != 0) { BSL_ERR_PUSH_ERROR(ret); ret = CRYPT_DSA_VERIFY_FAIL; } EXIT: BN_Destroy(u1); BN_Destroy(u2); BN_Destroy(w); BN_MontDestroy(montP); BN_OptimizerDestroy(opt); return ret; } int32_t CRYPT_DSA_VerifyData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { if (ctx == NULL || sign == NULL || signLen == 0 || (data == NULL && dataLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL || ctx->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } int32_t ret; BN_BigNum *r = BN_Create(BN_Bits(ctx->para->p)); BN_BigNum *s = BN_Create(BN_Bits(ctx->para->q)); BN_BigNum *d = DSA_Bits2Int(ctx->para->q, data, dataLen); if (r == NULL || s == NULL || d == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } ret = CRYPT_EAL_DecodeSign(sign, signLen, r, s); if (ret != CRYPT_SUCCESS) { goto EXIT; } ret = VerifyCore(ctx, d, r, s); EXIT: BN_Destroy(r); BN_Destroy(s); BN_Destroy(d); return ret; } int32_t CRYPT_DSA_Verify(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t hash[64]; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_DSA_VerifyData(ctx, hash, hashLen, sign, signLen); } int32_t CRYPT_DSA_Cmp(const CRYPT_DSA_Ctx *a, const CRYPT_DSA_Ctx *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF(a->y == NULL || b->y == NULL, CRYPT_DSA_ERR_KEY_INFO); RETURN_RET_IF(BN_Cmp(a->y, b->y) != 0, CRYPT_DSA_PUBKEY_NOT_EQUAL); // para must be both NULL and non-NULL. RETURN_RET_IF((a->para == NULL) != (b->para == NULL), CRYPT_DSA_PARA_ERROR); if (a->para != NULL) { RETURN_RET_IF(BN_Cmp(a->para->p, b->para->p) != 0 || BN_Cmp(a->para->q, b->para->q) != 0 || BN_Cmp(a->para->g, b->para->g) != 0, CRYPT_DSA_PARA_NOT_EQUAL); } return CRYPT_SUCCESS; } static uint32_t CRYPT_DSA_GetPrvKeyLen(const CRYPT_DSA_Ctx *ctx) { return BN_Bytes(ctx->x); } static uint32_t CRYPT_DSA_GetPubKeyLen(const CRYPT_DSA_Ctx *ctx) { if (ctx->para != NULL) { return BN_Bytes(ctx->para->p); } if (ctx->y != NULL) { return BN_Bytes(ctx->y); } BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } int32_t CRYPT_DSA_GetSecBits(const CRYPT_DSA_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL || ctx->para->p == NULL || ctx->para->q == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_SecBits((int32_t)BN_Bits(ctx->para->p), (int32_t)BN_Bits(ctx->para->q)); } #ifdef HITLS_CRYPTO_DSA_GEN_PARA static int32_t GetDsaParamValue(const BSL_Param *params, int32_t paramId, uint32_t maxLen, const uint8_t **value, uint32_t *valueLen) { const BSL_Param *param = BSL_PARAM_FindConstParam(params, paramId); if (param == NULL || param->value == NULL || param->valueLen > maxLen || param->valueLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } *value = param->value; *valueLen = param->valueLen; return CRYPT_SUCCESS; } static int32_t DSAFips1864GenQ(int32_t algId, void *libCtx, const char *mdAttr, uint32_t qBits, const uint8_t *seed, uint32_t seedLen, BN_BigNum *q) { uint8_t hash[64] = {0}; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, libCtx, mdAttr, seed, seedLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint8_t *md = hash; uint32_t qLen = qBits >> 3; if (hashLen > qLen) { md = hash + (hashLen - qLen); } md[0] |= 0x80; md[qLen - 1] |= 0x01; ret = BN_Bin2Bn(q, md, qLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DSAFips1864GenP(DSA_FIPS186_4_Para *fipsPara, const BN_BigNum *pow, BN_Optimizer *opt, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara, void *libCtx, const char *mdAttr) { uint8_t hash[64]; // 64 is max hash len uint32_t hashLen; uint32_t outLen = CRYPT_GetMdSizeById(fipsPara->algId) * 8; // bytes * 8 = bits RETURN_RET_IF(outLen == 0, CRYPT_EAL_ERR_ALGID); uint32_t n = (fipsPara->l - 1) / outLen; // ((pBits + outLen - 1) / outLen) - 1 int32_t ret = OptimizerStart(opt); RETURN_RET_IF(ret != CRYPT_SUCCESS, ret); BN_BigNum *V = OptimizerGetBn(opt, BITS_TO_BN_UNIT(outLen)); if (V == NULL) { OptimizerEnd(opt); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } for (uint32_t j = 0; j <= n; j++) { for (uint32_t k = 0; k < seed->dataLen; k++) { seed->data[seed->dataLen - k - 1]++; if (seed->data[seed->dataLen - k - 1] != 0) { // no carry break; } } hashLen = sizeof(hash) / sizeof(hash[0]); (void)memset_s(hash, hashLen, 0, hashLen); ret = EAL_Md(fipsPara->algId, libCtx, mdAttr, seed->data, seed->dataLen, hash, &hashLen); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Bin2Bn(V, hash, hashLen); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Lshift(V, V, outLen * j); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Add(dsaPara->p, dsaPara->p, V); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); } ret = BN_MaskBit(dsaPara->p, fipsPara->l - 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Add(V, pow, dsaPara->p); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Lshift(dsaPara->p, dsaPara->q, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Mod(dsaPara->p, V, dsaPara->p, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_SubLimb(dsaPara->p, dsaPara->p, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Sub(dsaPara->p, V, dsaPara->p); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); OptimizerEnd(opt); return CRYPT_SUCCESS; ERR: (void)BN_Zeroize(dsaPara->p); OptimizerEnd(opt); return ret; } static int32_t SetPQ2Para(CRYPT_DSA_Para *destPara, const CRYPT_DSA_Para *srcPara) { uint32_t pBits = BN_Bits(srcPara->p); uint32_t qBits = BN_Bits(srcPara->q); BN_BigNum *pOut = BN_Create(pBits); if (pOut == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BN_BigNum *qOut = BN_Create(qBits); if (qOut == NULL) { BN_Destroy(pOut); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Copy(pOut, srcPara->p); if (ret != CRYPT_SUCCESS) { BN_Destroy(pOut); BN_Destroy(qOut); BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Copy(qOut, srcPara->q); if (ret != CRYPT_SUCCESS) { BN_Destroy(pOut); BN_Destroy(qOut); BSL_ERR_PUSH_ERROR(ret); return ret; } BN_Destroy(destPara->p); BN_Destroy(destPara->q); destPara->p = pOut; destPara->q = qOut; return CRYPT_SUCCESS; } // fips186-4 A.1.1.2 int32_t CryptDsaFips1864GenPq(CRYPT_DSA_Ctx *ctx, DSA_FIPS186_4_Para *fipsPara, uint32_t type, BSL_Buffer *seed, uint32_t *counter) { BSL_Buffer msg = {NULL, 0}; RETURN_RET_IF(DSAFips1864ValidateSecurityLength(fipsPara->l, fipsPara->n, 1, type) == 0, CRYPT_DSA_PARA_ERROR); uint32_t outLen = CRYPT_GetMdSizeById(fipsPara->algId); RETURN_RET_IF(seed->dataLen * 8 < fipsPara->n || outLen * 8 < fipsPara->n, CRYPT_DSA_PARA_ERROR); // from FIPS.186-4 BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *pow = OptimizerGetBn(opt, BITS_TO_BN_UNIT(fipsPara->l)); BN_BigNum *pTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(fipsPara->l)); BN_BigNum *qTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(fipsPara->n)); msg.dataLen = seed->dataLen; msg.data = (uint8_t *)BSL_SAL_Calloc(seed->dataLen, 1); int32_t ret = CRYPT_MEM_ALLOC_FAIL; GOTO_ERR_IF_TRUE(pow == NULL || pTmp == NULL || qTmp == NULL || msg.data == NULL, ret); CRYPT_DSA_Para dsaParaTmp = {pTmp, qTmp, NULL}; GOTO_ERR_IF(BN_SetLimb(pow, 1), ret); GOTO_ERR_IF(BN_Lshift(pow, pow, fipsPara->l - 1), ret); while (true) { // until valid p,q or error occurs. /* Generate Q */ GOTO_ERR_IF(CRYPT_RandEx(ctx->libCtx, seed->data, seed->dataLen), ret); (void)memcpy_s(msg.data, seed->dataLen, seed->data, seed->dataLen); GOTO_ERR_IF(DSAFips1864GenQ(fipsPara->algId, ctx->libCtx, ctx->mdAttr, fipsPara->n, seed->data, seed->dataLen, qTmp), ret); ret = BN_PrimeCheck(qTmp, 0, opt, NULL); if (ret == CRYPT_BN_NOR_CHECK_PRIME) { continue; } GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); /* Generate P */ uint32_t cntMax = 4 * fipsPara->l - 1; // 4 * fipsPara->l - 1 from FIPS.186-4. for (uint32_t cnt = 0; cnt <= cntMax; cnt++) { GOTO_ERR_IF(BN_Zeroize(pTmp), ret); GOTO_ERR_IF(DSAFips1864GenP(fipsPara, pow, opt, &msg, &dsaParaTmp, ctx->libCtx, ctx->mdAttr), ret); if (BN_Cmp(pTmp, pow) < 0) { continue; } ret = BN_PrimeCheck(pTmp, 0, opt, NULL); if (ret == CRYPT_BN_NOR_CHECK_PRIME) { continue; } GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); GOTO_ERR_IF(SetPQ2Para(ctx->para, &dsaParaTmp), ret); *counter = cnt; goto ERR; // success } } ERR: BSL_SAL_ClearFree(msg.data, msg.dataLen); OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } // fips186-4 A.1.1.3 int32_t CryptDsaFips1864ValidatePq(int32_t algId, void *libCtx, const char *mdAttr, uint32_t type, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara, uint32_t counter) { BSL_Buffer msg = {NULL, 0}; uint32_t pBits = BN_Bits(dsaPara->p); uint32_t qBits = BN_Bits(dsaPara->q); RETURN_RET_IF(DSAFips1864ValidateSecurityLength(pBits, qBits, 0, type) == 0, CRYPT_DSA_PARA_ERROR); RETURN_RET_IF(seed->dataLen * 8 < qBits || counter > 4 * pBits - 1, CRYPT_DSA_PARA_ERROR); // from FIPS.186-4 BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *pow = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *pTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *qTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(qBits)); msg.dataLen = seed->dataLen; msg.data = (uint8_t *)BSL_SAL_Dump(seed->data, seed->dataLen); int32_t ret = CRYPT_MEM_ALLOC_FAIL; GOTO_ERR_IF_TRUE(pow == NULL || pTmp == NULL || qTmp == NULL || msg.data == NULL, ret); CRYPT_DSA_Para dsaParaTmp = {pTmp, qTmp, NULL}; GOTO_ERR_IF(BN_SetLimb(pow, 1), ret); GOTO_ERR_IF(BN_Lshift(pow, pow, pBits - 1), ret); /* Validate Q */ GOTO_ERR_IF(DSAFips1864GenQ(algId, libCtx, mdAttr, qBits, seed->data, seed->dataLen, qTmp), ret); GOTO_ERR_IF(BN_PrimeCheck(qTmp, 0, opt, NULL), ret); ret = CRYPT_DSA_PARA_NOT_EQUAL; GOTO_ERR_IF_TRUE(BN_Cmp(qTmp, dsaPara->q), ret); /* Validate P */ DSA_FIPS186_4_Para fipsPara = {algId, 0, pBits, qBits}; for (uint32_t i = 0; i <= counter; i++) { GOTO_ERR_IF(BN_Zeroize(pTmp), ret); GOTO_ERR_IF(DSAFips1864GenP(&fipsPara, pow, opt, &msg, &dsaParaTmp, libCtx, mdAttr), ret); if (BN_Cmp(pTmp, pow) < 0) { continue; } ret = BN_PrimeCheck(pTmp, 0, opt, NULL); if (ret == CRYPT_BN_NOR_CHECK_PRIME) { continue; } GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_Cmp(pTmp, dsaPara->p) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PARA_NOT_EQUAL); ret = CRYPT_DSA_PARA_NOT_EQUAL; } goto ERR; } ERR: OptimizerEnd(opt); BN_OptimizerDestroy(opt); BSL_SAL_ClearFree(msg.data, msg.dataLen); return ret; } // fips186-4 A.2.3 int32_t CryptDsaFips1864GenVerifiableG(DSA_FIPS186_4_Para *fipsPara, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara) { RETURN_RET_IF(fipsPara->index < 0, CRYPT_INVALID_ARG); int32_t ret; uint8_t hash[64]; // 64 is max hash len uint32_t hashLen; uint32_t pBits = BN_Bits(dsaPara->p); BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *e = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gOut = BN_Create(pBits); uint32_t msgLen = seed->dataLen + 7; // "ggen" + index + counter = 7 uint8_t *msg = (uint8_t *)BSL_SAL_Calloc(msgLen, 1); if (e == NULL || gTmp == NULL || gOut == NULL || msg == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(BN_SubLimb(e, dsaPara->p, 1), ret); GOTO_ERR_IF(BN_Div(e, NULL, e, dsaPara->q, opt), ret); (void)memcpy_s(msg, msgLen, seed->data, seed->dataLen); (void)memcpy_s(msg + seed->dataLen, msgLen - seed->dataLen, "ggen", 4); // 4 is the length of "ggen". msg[seed->dataLen + 4] = (uint8_t)(fipsPara->index & 0xff); // skip 4 bytes. for (int32_t cnt = 1; cnt <= 0xFFFF; cnt++) { msg[seed->dataLen + 5] = (uint8_t)((cnt >> 8) & 0xff); // skip 5 bytes, get high 8 bits in cnt. msg[seed->dataLen + 6] = (uint8_t)(cnt & 0xff); // skip 6 bytes. hashLen = sizeof(hash) / sizeof(hash[0]); (void)memset_s(hash, hashLen, 0, hashLen); GOTO_ERR_IF(EAL_Md(fipsPara->algId, NULL, NULL, msg, msgLen, hash, &hashLen), ret); GOTO_ERR_IF(BN_Bin2Bn(gTmp, hash, hashLen), ret); GOTO_ERR_IF(BN_ModExp(gTmp, gTmp, e, dsaPara->p, opt), ret); if (BN_IsNegative(gTmp) == true || BN_IsZero(gTmp) == true || BN_IsOne(gTmp) == true) { // gTmp < 2 continue; } GOTO_ERR_IF(BN_Copy(gOut, gTmp), ret); BN_Destroy(dsaPara->g); dsaPara->g = gOut; goto ERR; // success } BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_TRY_CNT); ret = CRYPT_DSA_ERR_TRY_CNT; ERR: if (ret != CRYPT_SUCCESS) { BN_Destroy(gOut); } OptimizerEnd(opt); BN_OptimizerDestroy(opt); BSL_SAL_ClearFree(msg, msgLen); return ret; } // fips186-4 A.2.1 int32_t CryptDsaFips1864GenUnverifiableG(CRYPT_DSA_Para *dsaPara) { int32_t ret; uint32_t pBits = BN_Bits(dsaPara->p); BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *e = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *p_1 = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *h = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gOut = BN_Create(pBits); if (e == NULL || p_1 == NULL || h == NULL || gTmp == NULL || gOut == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } ret = BN_SubLimb(p_1, dsaPara->p, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Div(e, NULL, p_1, dsaPara->q, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_SetLimb(h, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); while (true) { ret = BN_AddLimb(h, h, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_Cmp(h, p_1) >= 0) { BSL_ERR_PUSH_ERROR(CRYPT_BN_BITS_INVALID); ret = CRYPT_BN_BITS_INVALID; goto ERR; } ret = BN_ModExp(gTmp, h, e, dsaPara->p, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_IsOne(gTmp) == true) { // 4. If (gTmp = 1), then go to step 2. continue; } ret = BN_Copy(gOut, gTmp); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); BN_Destroy(dsaPara->g); dsaPara->g = gOut; goto ERR; // success } ERR: if (ret != CRYPT_SUCCESS) { BN_Destroy(gOut); } OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } // fips186-4 A.2.4 int32_t CryptDsaFips1864ValidateG(DSA_FIPS186_4_Para *fipsPara, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara) { int32_t ret = CryptDsaFips1864PartialValidateG(dsaPara); if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_DSA_Para dsaVerify = {dsaPara->p, dsaPara->q, NULL}; ret = CryptDsaFips1864GenVerifiableG(fipsPara, seed, &dsaVerify); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (BN_Cmp(dsaVerify.g, dsaPara->g) == 0) { ret = CRYPT_SUCCESS; } else { BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); ret = CRYPT_DSA_VERIFY_FAIL; } BN_Destroy(dsaVerify.g); return ret; } static int32_t DSA_GetFipsPara(BSL_Param *params, DSA_FIPS186_4_Para *fipsPara, BSL_Buffer *seed) { const uint8_t *algId = NULL; const uint8_t *pBits = NULL; const uint8_t *qBits = NULL; const uint8_t *index = NULL; const uint8_t *seedLen = NULL; uint32_t len = 0; int32_t ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_ALGID, sizeof(int32_t), &algId, &len); if (ret != CRYPT_SUCCESS || len != sizeof(int32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_PBITS, sizeof(uint32_t), &pBits, &len); if (ret != CRYPT_SUCCESS || len != sizeof(uint32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_QBITS, sizeof(uint32_t), &qBits, &len); if (ret != CRYPT_SUCCESS || len != sizeof(uint32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_GINDEX, sizeof(int32_t), &index, &len); if (ret != CRYPT_SUCCESS || len != sizeof(int32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_SEEDLEN, sizeof(uint32_t), &seedLen, &len); if (ret != CRYPT_SUCCESS || len != sizeof(uint32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } fipsPara->algId = *(const int32_t *)algId; fipsPara->l = *(const uint32_t *)pBits; fipsPara->n = *(const uint32_t *)qBits; fipsPara->index = *(const int32_t *)index; seed->dataLen = *(const uint32_t *)seedLen; seed->data = (uint8_t *)BSL_SAL_Calloc(seed->dataLen, 1); if (seed->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } return CRYPT_SUCCESS; } /* generate PQ NIST.FIPS.186-4 A.1.1.2 */ /* generate G NIST.FIPS.186-4 A.2.3 */ int32_t CryptDsaFips1864GenParams(CRYPT_DSA_Ctx *ctx, void *val) { int32_t ret; uint32_t counter; DSA_FIPS186_4_Para fipsPara = {0}; BSL_Buffer seed = {0}; CRYPT_DSA_Para *dsaPara = NULL; CRYPT_DSA_Para *oldPara = NULL; BSL_Param *params = (BSL_Param *)val; if (params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ret = DSA_GetFipsPara(params, &fipsPara, &seed); if (ret != CRYPT_SUCCESS) { return ret; } dsaPara = (CRYPT_DSA_Para *)BSL_SAL_Calloc(1, sizeof(CRYPT_DSA_Para)); if (dsaPara == NULL) { BSL_SAL_Free(seed.data); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } oldPara = ctx->para; ctx->para = dsaPara; ret = CryptDsaFips1864GenPq(ctx, &fipsPara, CRYPT_DSA_FFC_PARAM, &seed, &counter); if (ret != CRYPT_SUCCESS) { BSL_SAL_ClearFree(seed.data, seed.dataLen); BSL_SAL_Free(ctx->para); ctx->para = oldPara; return ret; } ret = CryptDsaFips1864GenVerifiableG(&fipsPara, &seed, ctx->para); BSL_SAL_ClearFree(seed.data, seed.dataLen); if (ret != CRYPT_SUCCESS) { CRYPT_DSA_FreePara(ctx->para); ctx->para = oldPara; return ret; } CRYPT_DSA_FreePara(oldPara); return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_DSA_GEN_PARA */ // Set flag == 1, enable generate private key SP800-56Ar3 5_6_1_1_4. static int32_t CRYPT_SetFipsFlag(CRYPT_DSA_Ctx *ctx, void *val, uint32_t len) { if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PARA_ERROR); return CRYPT_DSA_PARA_ERROR; } uint32_t flag = *(uint32_t *)val; ctx->flag = (uint8_t)flag; return CRYPT_SUCCESS; } int32_t CRYPT_DSA_Ctrl(CRYPT_DSA_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_BITS: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetBits); case CRYPT_CTRL_GET_SIGNLEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetSignLen); case CRYPT_CTRL_GET_SECBITS: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetSecBits); case CRYPT_CTRL_GET_PUBKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetPubKeyLen); case CRYPT_CTRL_GET_PRVKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetPrvKeyLen); case CRYPT_CTRL_UP_REFERENCES: if (val == NULL || len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val); case CRYPT_CTRL_SET_GEN_FLAG: return CRYPT_SetFipsFlag(ctx, val, len); #ifdef HITLS_CRYPTO_DSA_GEN_PARA case CRYPT_CTRL_GEN_PARA: return CryptDsaFips1864GenParams(ctx, val); #endif /* HITLS_CRYPTO_DSA_GEN_PARA */ default: break; } BSL_ERR_PUSH_ERROR(CRYPT_DSA_UNSUPPORTED_CTRL_OPTION); return CRYPT_DSA_UNSUPPORTED_CTRL_OPTION; } #ifdef HITLS_CRYPTO_DSA_CHECK static int32_t DsaKeyPairCheck(const CRYPT_DSA_Ctx *pub, const CRYPT_DSA_Ctx *prv) { int32_t ret; if (prv == NULL || pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } ret = CRYPT_FFC_KeyPairCheck(prv->x, pub->y, prv->para->p, prv->para->g); if (ret == CRYPT_PAIRWISE_CHECK_FAIL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PAIRWISE_CHECK_FAIL); ret = CRYPT_DSA_PAIRWISE_CHECK_FAIL; } return ret; } /* * SP800-56a 5.6.2.1.2 * for check an FFC key pair. */ static int32_t DsaPrvKeyCheck(const CRYPT_DSA_Ctx *pkey) { if (pkey == NULL || pkey->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_FFC_PrvCheck(pkey->x, pkey->para->p, pkey->para->q); if (ret == CRYPT_INVALID_KEY) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_INVALID_PRVKEY); ret = CRYPT_DSA_INVALID_PRVKEY; } return ret; } int32_t CRYPT_DSA_Check(uint32_t checkType, const CRYPT_DSA_Ctx *pkey1, const CRYPT_DSA_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return DsaKeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return DsaPrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_DSA_CHECK #endif /* HITLS_CRYPTO_DSA */
2302_82127028/openHiTLS-examples_2931
crypto/dsa/src/dsa_core.c
C
unknown
56,232
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef DSA_LOCAL_H #define DSA_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DSA #include "crypt_bn.h" #include "crypt_dsa.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #define DSA_MIN_PBITS 1024 // The minimum specification of DSA: 1024 bits #define DSA_MAX_PBITS 3072 // The maximum specification of DSA: 3072 bits #define DSA_MIN_QBITS 160 // The minimum specification of parameter q of DSA /* DSA key parameters */ struct DSA_Para { BN_BigNum *p; BN_BigNum *q; BN_BigNum *g; }; /* DSA key ctx */ struct DSA_Ctx { BN_BigNum *x; // private key BN_BigNum *y; // public key CRYPT_DSA_Para *para; // key parameter BSL_SAL_RefCount references; void *libCtx; char *mdAttr; uint8_t flag; }; typedef struct { int32_t algId; // hash algid int32_t index; // gen g need index uint32_t l; // pbits uint32_t n; // qbits } DSA_FIPS186_4_Para; #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DSA #endif // DSA_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/dsa/src/dsa_local.h
C
unknown
1,567
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_PKEY_H #define EAL_PKEY_H #include "crypt_eal_pkey.h" #include "crypt_eal_provider.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus typedef struct { int32_t algId; CRYPT_EAL_ProvMgrCtx *mgrCtx; EAL_PkeyUnitaryMethod *keyMgmtMethod; } CRYPT_EAL_PkeyMgmtInfo; typedef struct { CRYPT_EAL_ProvMgrCtx *mgrCtx; const CRYPT_EAL_Func *funcsAsyCipher; const CRYPT_EAL_Func *funcsExch; const CRYPT_EAL_Func *funcSign; const CRYPT_EAL_Func *funcKem; const CRYPT_EAL_Func *funcsKeyMgmt; } CRYPT_EAL_AsyAlgFuncsInfo; /** * @ingroup crypt_eal_pkey * @brief Create a new asymmetric key context by key management information. * * @param pkey [IN/OUT] The asymmetric key context to be created. * @param pkeyAlgInfo [IN] The key management information. * @param keyRef [IN] The reference to the key. * @param keyRefLen [IN] The length of the key reference. * * @return CRYPT_SUCCESS on success, CRYPT_ERROR on failure. */ CRYPT_EAL_PkeyCtx *CRYPT_EAL_MakeKeyByPkeyAlgInfo(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, void *keyRef, uint32_t keyRefLen); /** * @ingroup crypt_eal_pkey * @brief Get the key management information by algorithm ID and attribute name. * * @param libCtx [IN] The library context. * @param algId [IN] The algorithm ID. * @param attrName [IN] The attribute name. * @param pkeyAlgInfo [OUT] The key management information. */ int32_t CRYPT_EAL_GetPkeyAlgInfo(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo); int32_t CRYPT_EAL_SetPkeyMethod(EAL_PkeyUnitaryMethod **pkeyMethod, const CRYPT_EAL_Func *funcsKeyMgmt, const CRYPT_EAL_Func *funcsAsyCipher, const CRYPT_EAL_Func *funcsExch, const CRYPT_EAL_Func *funcSign, const CRYPT_EAL_Func *funcKem); int32_t CRYPT_EAL_ProviderGetAsyAlgFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName, CRYPT_EAL_AsyAlgFuncsInfo *funcs); #ifdef __cplusplus } #endif // __cplusplus #endif // EAL_PKEY_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/include/eal_pkey.h
C
unknown
2,600
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_CIPHER) #include "securec.h" #include "crypt_algid.h" #include "crypt_eal_cipher.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_errno.h" #include "eal_cipher_local.h" #include "eal_common.h" #include "crypt_utils.h" #include "crypt_ealinit.h" #include "crypt_types.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_provider.h" #endif static void CipherCopyMethod(const EAL_CipherMethod *modeMethod, EAL_CipherUnitaryMethod *method) { method->newCtx = modeMethod->newCtx; method->initCtx = modeMethod->initCtx; method->deinitCtx = modeMethod->deinitCtx; method->update = modeMethod->update; method->final = modeMethod->final; method->ctrl = modeMethod->ctrl; method->freeCtx = modeMethod->freeCtx; } static CRYPT_EAL_CipherCtx *CipherNewDefaultCtx(CRYPT_CIPHER_AlgId id) { int32_t ret; const EAL_CipherMethod *modeMethod = NULL; ret = EAL_FindCipher(id, &modeMethod); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, ret); return NULL; } CRYPT_EAL_CipherCtx *ctx = (CRYPT_EAL_CipherCtx *)BSL_SAL_Calloc(1u, sizeof(struct CryptEalCipherCtx)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } EAL_CipherUnitaryMethod *method = (EAL_CipherUnitaryMethod *)BSL_SAL_Calloc(1u, sizeof(EAL_CipherUnitaryMethod)); if (method == NULL) { BSL_SAL_Free(ctx); EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } void *modeCtx = modeMethod->newCtx(id); if (modeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_EAL_CIPHER_ERR_NEWCTX); BSL_SAL_Free(ctx); BSL_SAL_Free(method); return NULL; } CipherCopyMethod(modeMethod, method); ctx->id = id; ctx->method = method; ctx->ctx = modeCtx; ctx->states = EAL_CIPHER_STATE_NEW; return ctx; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t CRYPT_EAL_SetCipherMethod(CRYPT_EAL_CipherCtx *ctx, const CRYPT_EAL_Func *funcs) { int32_t index = 0; EAL_CipherUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_CipherUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLCIPHER_NEWCTX: method->provNewCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_INITCTX: method->initCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_UPDATE: method->update = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_FINAL: method->final = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_DEINITCTX: method->deinitCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_FREECTX: method->freeCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_CTRL: method->ctrl = funcs[index].func; break; default: BSL_SAL_FREE(method); BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } ctx->method = method; return CRYPT_SUCCESS; } CRYPT_EAL_CipherCtx *CRYPT_EAL_ProviderCipherNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { const CRYPT_EAL_Func *funcs = NULL; void *provCtx = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_SYMMCIPHER, algId, attrName, (const CRYPT_EAL_Func **)&funcs, &provCtx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, ret); return NULL; } CRYPT_EAL_CipherCtx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_CipherCtx)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CRYPT_EAL_SetCipherMethod(ctx, funcs); if (ret != BSL_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, ret); BSL_SAL_FREE(ctx); return NULL; } if (ctx->method->provNewCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, CRYPT_PROVIDER_ERR_IMPL_NULL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->ctx = ctx->method->provNewCtx(provCtx, algId); if (ctx->ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->id = algId; ctx->states = EAL_CIPHER_STATE_NEW; ctx->isProvider = true; return ctx; } #endif CRYPT_EAL_CipherCtx *CRYPT_EAL_ProviderCipherNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderCipherNewCtxInner(libCtx, algId, attrName); #else (void)libCtx; (void)attrName; return CRYPT_EAL_CipherNewCtx(algId); #endif } CRYPT_EAL_CipherCtx *CRYPT_EAL_CipherNewCtx(CRYPT_CIPHER_AlgId id) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Cipher(id) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return CipherNewDefaultCtx(id); } void CRYPT_EAL_CipherFreeCtx(CRYPT_EAL_CipherCtx *ctx) { if (ctx == NULL) { // If the input parameter is NULL, it is not considered as an error. return; } if (ctx->method == NULL || ctx->method->freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return; } (void)ctx->method->freeCtx(ctx->ctx); BSL_SAL_FREE(ctx->method); // Free the memory eal ctx and mode ctx at the EAL layer. BSL_SAL_FREE(ctx); } int32_t CRYPT_EAL_CipherInit(CRYPT_EAL_CipherCtx *ctx, const uint8_t *key, uint32_t keyLen, const uint8_t *iv, uint32_t ivLen, bool enc) { int32_t ret; if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->initCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } CRYPT_EAL_CipherDeinit(ctx); if (ctx->states != EAL_CIPHER_STATE_NEW) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } ret = ctx->method->initCtx(ctx->ctx, key, keyLen, iv, ivLen, NULL, enc); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } ctx->states = EAL_CIPHER_STATE_INIT; return CRYPT_SUCCESS; } void CRYPT_EAL_CipherDeinit(CRYPT_EAL_CipherCtx *ctx) { if (ctx == NULL) { // If the ctx is NULL during deinit, it is not considered as an error. return; } if (ctx->method == NULL || ctx->method->deinitCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return; } int32_t ret = ctx->method->deinitCtx(ctx->ctx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); } // Restore the state to the state after the new is successful. ctx->states = EAL_CIPHER_STATE_NEW; } // no need for IV, the value can be set to NULL int32_t CRYPT_EAL_CipherReinit(CRYPT_EAL_CipherCtx *ctx, uint8_t *iv, uint32_t ivLen) { int32_t ret; if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // Without init, reinit cannot be invoked directly. if (ctx->states == EAL_CIPHER_STATE_NEW) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } // Reset the IV. In this case, reset the IV is not restricted by the states. if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = ctx->method->ctrl(ctx->ctx, CRYPT_CTRL_REINIT_STATUS, iv, ivLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } // Reset the states. ctx->states = EAL_CIPHER_STATE_INIT; return CRYPT_SUCCESS; } static bool IsPartialOverLap(const void *out, const void *in, uint32_t len) { uintptr_t diff; if ((uintptr_t)out > (uintptr_t)in) { diff = (uintptr_t)out - (uintptr_t)in; return diff < (uintptr_t)len; } // If in >= out, this case is valid. return false; } static int32_t CheckUpdateParam(const CRYPT_EAL_CipherCtx *ctx, const uint8_t *in, uint32_t inLen, const uint8_t *out, const uint32_t *outLen) { if (ctx == NULL || out == NULL || outLen == NULL || (in == NULL && inLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((in != NULL && inLen != 0) && IsPartialOverLap(out, in, inLen)) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_PART_OVERLAP); return CRYPT_EAL_ERR_PART_OVERLAP; } // If the state is not init or update, the state is regarded as an error. // If the state is final or new, update cannot be directly invoked. if (!(ctx->states == EAL_CIPHER_STATE_INIT || ctx->states == EAL_CIPHER_STATE_UPDATE)) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->method == NULL || ctx->method->update == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_CipherUpdate(CRYPT_EAL_CipherCtx *ctx, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { int32_t ret = CheckUpdateParam(ctx, in, inLen, out, outLen); if (ret != CRYPT_SUCCESS) { // The push error in CheckUpdateParam can be locate the only error location. No need to add the push error here. EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, (ctx == NULL) ? CRYPT_CIPHER_MAX : ctx->id, ret); return ret; } ret = ctx->method->update(ctx->ctx, in, inLen, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } ctx->states = EAL_CIPHER_STATE_UPDATE; return CRYPT_SUCCESS; } int32_t CheckFinalParam(const CRYPT_EAL_CipherCtx *ctx, const uint8_t *out, const uint32_t *outLen) { if (ctx == NULL || out == NULL || outLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // If the state is not init or update, the state is regarded as an error. // If the state is final or new, update cannot be directly invoked. if (!(ctx->states == EAL_CIPHER_STATE_UPDATE || ctx->states == EAL_CIPHER_STATE_INIT)) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->method == NULL || ctx->method->final == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_CipherFinal(CRYPT_EAL_CipherCtx *ctx, uint8_t *out, uint32_t *outLen) { int32_t ret; ret = CheckFinalParam(ctx, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, (ctx == NULL) ? CRYPT_CIPHER_MAX : ctx->id, ret); return ret; } ret = ctx->method->final(ctx->ctx, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } ctx->states = EAL_CIPHER_STATE_FINAL; return CRYPT_SUCCESS; } static bool CipherCtrlIsCanSet(const CRYPT_EAL_CipherCtx *ctx, int32_t type) { if (ctx->states == EAL_CIPHER_STATE_NEW) { return false; } if (ctx->states == EAL_CIPHER_STATE_FINAL) { return false; } if ((ctx->states == EAL_CIPHER_STATE_UPDATE) && (type == CRYPT_CTRL_SET_COUNT || type == CRYPT_CTRL_SET_TAGLEN || type == CRYPT_CTRL_SET_MSGLEN || type == CRYPT_CTRL_SET_AAD)) { return false; } return true; } int32_t CRYPT_EAL_CipherCtrl(CRYPT_EAL_CipherCtx *ctx, int32_t type, void *data, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // The IV cannot be set through the Ctrl. You need to set the IV through the init and reinit. if (type == CRYPT_CTRL_SET_IV || type == CRYPT_CTRL_REINIT_STATUS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_CIPHER_CTRL_ERROR); return CRYPT_EAL_CIPHER_CTRL_ERROR; } // If the algorithm is running in the intermediate state, write operations are not allowed. if (!CipherCtrlIsCanSet(ctx, type)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } // Setting AAD indicates that the encryption operation has started and no more write operations are allowed. if (type == CRYPT_CTRL_SET_AAD) { ctx->states = EAL_CIPHER_STATE_UPDATE; } else if (type == CRYPT_CTRL_GET_TAG) { // After getTag the system enters the final state. ctx->states = EAL_CIPHER_STATE_FINAL; } if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method->ctrl(ctx->ctx, type, data, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } return ret; } int32_t CRYPT_EAL_CipherSetPadding(CRYPT_EAL_CipherCtx *ctx, CRYPT_PaddingType type) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method->ctrl(ctx->ctx, CRYPT_CTRL_SET_PADDING, (void *)&type, sizeof(type)); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); } return ret; } int32_t CRYPT_EAL_CipherGetPadding(CRYPT_EAL_CipherCtx *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t type; int32_t ret = ctx->method->ctrl(ctx->ctx, CRYPT_CTRL_GET_PADDING, (void *)&type, sizeof(type)); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return CRYPT_PADDING_MAX_COUNT; } return type; } bool CRYPT_EAL_CipherIsValidAlgId(CRYPT_CIPHER_AlgId id) { const EAL_CipherMethod *m = NULL; return EAL_FindCipher(id, &m) == CRYPT_SUCCESS; } static const uint32_t CIPHER_IS_AEAD[] = { CRYPT_CIPHER_AES128_CCM, CRYPT_CIPHER_AES192_CCM, CRYPT_CIPHER_AES256_CCM, CRYPT_CIPHER_AES128_GCM, CRYPT_CIPHER_AES192_GCM, CRYPT_CIPHER_AES256_GCM, CRYPT_CIPHER_CHACHA20_POLY1305, CRYPT_CIPHER_SM4_GCM, }; // Check whether the algorithm is the AEAD algorithm. If yes, true is returned. Otherwise, false is returned. static bool IsAeadAlg(CRYPT_CIPHER_AlgId id) { if (ParamIdIsValid(id, CIPHER_IS_AEAD, sizeof(CIPHER_IS_AEAD) / sizeof(CIPHER_IS_AEAD[0]))) { return true; } return false; } int32_t CRYPT_EAL_CipherGetInfo(CRYPT_CIPHER_AlgId id, int32_t type, uint32_t *infoValue) { if (infoValue == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } CRYPT_CipherInfo info = {0}; if (EAL_GetCipherInfo(id, &info) != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } switch (type) { case CRYPT_INFO_IS_AEAD: (*infoValue) = IsAeadAlg(id) ? 1 : 0; break; case CRYPT_INFO_IS_STREAM: (*infoValue) = (uint32_t)!((info.blockSize) != 1); break; case CRYPT_INFO_IV_LEN: (*infoValue) = info.ivLen; break; case CRYPT_INFO_KEY_LEN: (*infoValue) = info.keyLen; break; case CRYPT_INFO_BLOCK_LEN: (*infoValue) = (uint32_t)info.blockSize; break; default: EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_EAL_INTO_TYPE_NOT_SUPPORT); return CRYPT_EAL_INTO_TYPE_NOT_SUPPORT; } return CRYPT_SUCCESS; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_cipher.c
C
unknown
18,569
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_CIPHER_LOCAL_H #define EAL_CIPHER_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_CIPHER) #include "crypt_algid.h" #include "crypt_eal_cipher.h" #include "crypt_local_types.h" #ifdef HITLS_CRYPTO_GCM #include "crypt_modes_gcm.h" #endif #ifdef __cplusplus extern "C" { #endif // __cplusplus /** * @ingroup crypt_cipherstates * Symmetry encryption/decryption status */ typedef enum { EAL_CIPHER_STATE_NEW, EAL_CIPHER_STATE_INIT, EAL_CIPHER_STATE_UPDATE, EAL_CIPHER_STATE_FINAL } EAL_CipherStates; /** * @ingroup alg map * Symmetric encryption/decryption mode and ID of the encryption algorithm. */ typedef struct { uint32_t id; CRYPT_MODE_AlgId modeId; } EAL_SymAlgMap; /** * @ingroup EAL * * CRYPT_CipherInfo: User search algorithm information. Currently, only blockSize is available. */ typedef struct { CRYPT_CIPHER_AlgId id; uint8_t blockSize; uint32_t keyLen; uint32_t ivLen; } CRYPT_CipherInfo; /** * @ingroup crypt_eal_cipherctx * Asymmetric algorithm data type */ struct CryptEalCipherCtx { #ifdef HITLS_CRYPTO_PROVIDER bool isProvider; #endif CRYPT_CIPHER_AlgId id; EAL_CipherStates states; /**< record status */ void *ctx; /**< handle of the mode */ EAL_CipherUnitaryMethod *method; /**< method corresponding to the encryption/decryption mode */ }; const EAL_SymMethod *EAL_GetSymMethod(int32_t algId); /** * @brief Obtain the EAL_CipherMethod based on the algorithm ID. * * @param id [IN] Symmetric encryption/decryption algorithm ID. * @param modeMethod [IN/OUT] EAL_CipherMethod Pointer * @return If it's successful, the system returns CRYPT_SUCCESS and assigns the value to the method in m. * If it's failed, returns CRYPT_EAL_ERR_ALGID: ID of the unsupported algorithm. */ int32_t EAL_FindCipher(CRYPT_CIPHER_AlgId id, const EAL_CipherMethod **modeMethod); /** * @brief Obtain keyLen/ivLen/blockSize based on the algorithm ID. * * @param id [IN] Symmetric algorithm ID. * @param id [OUT] Assign the obtained keyLen/ivLen/blockSize to the variable corresponding to info. * * @return Success: CRYPT_SUCCESS * Failure: CRYPT_ERR_ALGID */ int32_t EAL_GetCipherInfo(CRYPT_CIPHER_AlgId id, CRYPT_CipherInfo *info); /** * @brief Obtain mode method based on the algorithm ID * * @param id [IN] Symmetric encryption/decryption algorithm ID. * @return If the operation is successful, the combination of ciphers is returned. * If the operation fails, NULL is returned. */ const EAL_CipherMethod *EAL_FindModeMethod(CRYPT_MODE_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_CIPHER #endif // EAL_CIPHER_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_cipher_local.h
C
unknown
3,325
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_CIPHER) #include "bsl_err_internal.h" #include "crypt_errno.h" #include "eal_cipher_local.h" #include "crypt_modes.h" #include "crypt_local_types.h" #ifdef HITLS_CRYPTO_CTR #include "crypt_modes_ctr.h" #endif #ifdef HITLS_CRYPTO_CBC #include "crypt_modes_cbc.h" #endif #ifdef HITLS_CRYPTO_ECB #include "crypt_modes_ecb.h" #endif #ifdef HITLS_CRYPTO_GCM #include "crypt_modes_gcm.h" #endif #ifdef HITLS_CRYPTO_CCM #include "crypt_modes_ccm.h" #endif #ifdef HITLS_CRYPTO_XTS #include "crypt_modes_xts.h" #endif #ifdef HITLS_CRYPTO_AES #include "crypt_aes.h" #endif #if defined(HITLS_CRYPTO_CHACHA20) && defined(HITLS_CRYPTO_CHACHA20POLY1305) #include "crypt_modes_chacha20poly1305.h" #endif #ifdef HITLS_CRYPTO_CHACHA20 #include "crypt_chacha20.h" #endif #ifdef HITLS_CRYPTO_SM4 #include "crypt_sm4.h" #endif #ifdef HITLS_CRYPTO_CFB #include "crypt_modes_cfb.h" #endif #ifdef HITLS_CRYPTO_OFB #include "crypt_modes_ofb.h" #endif #include "eal_common.h" #include "bsl_sal.h" #if defined(HITLS_CRYPTO_CHACHA20) && defined(HITLS_CRYPTO_CHACHA20POLY1305) static const EAL_CipherMethod CHACHA20_POLY1305_METHOD = { (CipherNewCtx)MODES_CHACHA20POLY1305_NewCtx, (CipherInitCtx)MODES_CHACHA20POLY1305_InitCtx, (CipherDeInitCtx)MODES_CHACHA20POLY1305_DeInitCtx, (CipherUpdate)MODES_CHACHA20POLY1305_Update, (CipherFinal)MODES_CHACHA20POLY1305_Final, (CipherCtrl)MODES_CHACHA20POLY1305_Ctrl, (CipherFreeCtx)MODES_CHACHA20POLY1305_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CTR static const EAL_CipherMethod CTR_METHOD = { (CipherNewCtx)MODES_CTR_NewCtx, (CipherInitCtx)MODES_CTR_InitCtxEx, (CipherDeInitCtx)MODES_CTR_DeInitCtx, (CipherUpdate)MODES_CTR_UpdateEx, (CipherFinal)MODES_CTR_Final, (CipherCtrl)MODES_CTR_Ctrl, (CipherFreeCtx)MODES_CTR_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CBC static const EAL_CipherMethod CBC_METHOD = { (CipherNewCtx)MODES_CBC_NewCtx, (CipherInitCtx)MODES_CBC_InitCtxEx, (CipherDeInitCtx)MODES_CBC_DeInitCtx, (CipherUpdate)MODES_CBC_UpdateEx, (CipherFinal)MODES_CBC_FinalEx, (CipherCtrl)MODES_CBC_Ctrl, (CipherFreeCtx)MODES_CBC_FreeCtx }; #endif #ifdef HITLS_CRYPTO_ECB static const EAL_CipherMethod ECB_METHOD = { (CipherNewCtx)MODES_ECB_NewCtx, (CipherInitCtx)MODES_ECB_InitCtxEx, (CipherDeInitCtx)MODES_ECB_DeinitCtx, (CipherUpdate)MODES_ECB_UpdateEx, (CipherFinal)MODES_ECB_FinalEx, (CipherCtrl)MODES_ECB_Ctrl, (CipherFreeCtx)MODES_ECB_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CCM static const EAL_CipherMethod CCM_METHOD = { (CipherNewCtx)MODES_CCM_NewCtx, (CipherInitCtx)MODES_CCM_InitCtx, (CipherDeInitCtx)MODES_CCM_DeInitCtx, (CipherUpdate)MODES_CCM_UpdateEx, (CipherFinal)MODES_CCM_Final, (CipherCtrl)MODES_CCM_Ctrl, (CipherFreeCtx)MODES_CCM_FreeCtx }; #endif #ifdef HITLS_CRYPTO_GCM static const EAL_CipherMethod GCM_METHOD = { (CipherNewCtx)MODES_GCM_NewCtx, (CipherInitCtx)MODES_GCM_InitCtxEx, (CipherDeInitCtx)MODES_GCM_DeInitCtx, (CipherUpdate)MODES_GCM_UpdateEx, (CipherFinal)MODES_GCM_Final, (CipherCtrl)MODES_GCM_Ctrl, (CipherFreeCtx)MODES_GCM_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CFB static const EAL_CipherMethod CFB_METHOD = { (CipherNewCtx)MODES_CFB_NewCtx, (CipherInitCtx)MODES_CFB_InitCtxEx, (CipherDeInitCtx)MODES_CFB_DeInitCtx, (CipherUpdate)MODES_CFB_UpdateEx, (CipherFinal)MODES_CFB_Final, (CipherCtrl)MODES_CFB_Ctrl, (CipherFreeCtx)MODES_CFB_FreeCtx }; #endif #ifdef HITLS_CRYPTO_OFB static const EAL_CipherMethod OFB_METHOD = { (CipherNewCtx)MODES_OFB_NewCtx, (CipherInitCtx)MODES_OFB_InitCtxEx, (CipherDeInitCtx)MODES_OFB_DeInitCtx, (CipherUpdate)MODES_OFB_UpdateEx, (CipherFinal)MODES_OFB_Final, (CipherCtrl)MODES_OFB_Ctrl, (CipherFreeCtx)MODES_OFB_FreeCtx }; #endif #ifdef HITLS_CRYPTO_XTS static const EAL_CipherMethod XTS_METHOD = { (CipherNewCtx)MODES_XTS_NewCtx, (CipherInitCtx)MODES_XTS_InitCtxEx, (CipherDeInitCtx)MODES_XTS_DeInitCtx, (CipherUpdate)MODES_XTS_UpdateEx, (CipherFinal)MODES_XTS_Final, (CipherCtrl)MODES_XTS_Ctrl, (CipherFreeCtx)MODES_XTS_FreeCtx }; #endif /** * g_modeMethod[id] * The content of g_modeMethod has a hash mapping relationship with CRYPT_MODE_AlgId. Change the value accordingly. */ static const EAL_CipherMethod *g_modeMethod[CRYPT_MODE_MAX] = { #ifdef HITLS_CRYPTO_CBC &CBC_METHOD, #else NULL, #endif // cbc #ifdef HITLS_CRYPTO_ECB &ECB_METHOD, #else NULL, #endif // ecb #ifdef HITLS_CRYPTO_CTR &CTR_METHOD, #else NULL, #endif // ctr #ifdef HITLS_CRYPTO_XTS &XTS_METHOD, #else NULL, #endif // xts #ifdef HITLS_CRYPTO_CCM &CCM_METHOD, #else NULL, #endif // ccm #ifdef HITLS_CRYPTO_GCM &GCM_METHOD, #else NULL, #endif // gcm #if defined(HITLS_CRYPTO_CHACHA20) && defined(HITLS_CRYPTO_CHACHA20POLY1305) &CHACHA20_POLY1305_METHOD, #else NULL, #endif // chacha20 #ifdef HITLS_CRYPTO_CFB &CFB_METHOD, #else NULL, #endif // cfb #ifdef HITLS_CRYPTO_OFB &OFB_METHOD #else NULL #endif // ofb }; const EAL_CipherMethod *EAL_FindModeMethod(CRYPT_MODE_AlgId id) { if (id < 0 || id >= CRYPT_MODE_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } return g_modeMethod[id]; } static const EAL_SymAlgMap SYM_ID_MAP[] = { #ifdef HITLS_CRYPTO_AES {.id = CRYPT_CIPHER_AES128_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_AES192_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_AES256_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_AES128_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_AES192_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_AES256_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_AES128_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_AES192_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_AES256_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_AES128_CCM, .modeId = CRYPT_MODE_CCM }, {.id = CRYPT_CIPHER_AES192_CCM, .modeId = CRYPT_MODE_CCM }, {.id = CRYPT_CIPHER_AES256_CCM, .modeId = CRYPT_MODE_CCM }, {.id = CRYPT_CIPHER_AES128_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_AES192_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_AES256_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_AES128_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_AES192_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_AES256_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_AES128_OFB, .modeId = CRYPT_MODE_OFB }, {.id = CRYPT_CIPHER_AES192_OFB, .modeId = CRYPT_MODE_OFB }, {.id = CRYPT_CIPHER_AES256_OFB, .modeId = CRYPT_MODE_OFB }, {.id = CRYPT_CIPHER_AES128_XTS, .modeId = CRYPT_MODE_XTS }, {.id = CRYPT_CIPHER_AES256_XTS, .modeId = CRYPT_MODE_XTS }, #endif #ifdef HITLS_CRYPTO_CHACHA20 {.id = CRYPT_CIPHER_CHACHA20_POLY1305, .modeId = CRYPT_MODE_CHACHA20_POLY1305}, #endif #ifdef HITLS_CRYPTO_SM4 {.id = CRYPT_CIPHER_SM4_XTS, .modeId = CRYPT_MODE_XTS }, {.id = CRYPT_CIPHER_SM4_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_SM4_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_SM4_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_SM4_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_SM4_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_SM4_OFB, .modeId = CRYPT_MODE_OFB }, #endif }; int32_t EAL_FindCipher(CRYPT_CIPHER_AlgId id, const EAL_CipherMethod **modeMethod) { uint32_t num = sizeof(SYM_ID_MAP) / sizeof(SYM_ID_MAP[0]); const EAL_SymAlgMap *symAlgMap = NULL; for (uint32_t i = 0; i < num; i++) { if (SYM_ID_MAP[i].id == id) { symAlgMap = &SYM_ID_MAP[i]; break; } } if (symAlgMap == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } *modeMethod = EAL_FindModeMethod(symAlgMap->modeId); if (*modeMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } #ifdef HITLS_CRYPTO_AES static const EAL_SymMethod AES128_METHOD = { (SetEncryptKey)CRYPT_AES_SetEncryptKey128, (SetDecryptKey)CRYPT_AES_SetDecryptKey128, (EncryptBlock)CRYPT_AES_Encrypt, (DecryptBlock)CRYPT_AES_Decrypt, (DeInitBlockCtx)CRYPT_AES_Clean, NULL, 16, sizeof(CRYPT_AES_Key), CRYPT_SYM_AES128 }; static const EAL_SymMethod AES192_METHOD = { (SetEncryptKey)CRYPT_AES_SetEncryptKey192, (SetDecryptKey)CRYPT_AES_SetDecryptKey192, (EncryptBlock)CRYPT_AES_Encrypt, (DecryptBlock)CRYPT_AES_Decrypt, (DeInitBlockCtx)CRYPT_AES_Clean, NULL, 16, sizeof(CRYPT_AES_Key), CRYPT_SYM_AES192 }; static const EAL_SymMethod AES256_METHOD = { (SetEncryptKey)CRYPT_AES_SetEncryptKey256, (SetDecryptKey)CRYPT_AES_SetDecryptKey256, (EncryptBlock)CRYPT_AES_Encrypt, (DecryptBlock)CRYPT_AES_Decrypt, (DeInitBlockCtx)CRYPT_AES_Clean, NULL, 16, sizeof(CRYPT_AES_Key), CRYPT_SYM_AES256 }; #endif #ifdef HITLS_CRYPTO_CHACHA20 static const EAL_SymMethod CHACHA20_METHOD = { (SetEncryptKey)CRYPT_CHACHA20_SetKey, (SetDecryptKey)CRYPT_CHACHA20_SetKey, (EncryptBlock)CRYPT_CHACHA20_Update, (DecryptBlock)CRYPT_CHACHA20_Update, (DeInitBlockCtx)CRYPT_CHACHA20_Clean, (CipherCtrl)CRYPT_CHACHA20_Ctrl, 1, sizeof(CRYPT_CHACHA20_Ctx), CRYPT_SYM_CHACHA20 }; #endif #ifdef HITLS_CRYPTO_SM4 static const EAL_SymMethod SM4_METHOD = { (SetEncryptKey)CRYPT_SM4_SetKey, (SetDecryptKey)CRYPT_SM4_SetKey, (EncryptBlock)CRYPT_SM4_Encrypt, (DecryptBlock)CRYPT_SM4_Decrypt, (DeInitBlockCtx)CRYPT_SM4_Clean, NULL, 16, sizeof(CRYPT_SM4_Ctx), CRYPT_SYM_SM4 }; #endif const EAL_SymMethod *EAL_GetSymMethod(int32_t algId) { switch (algId) { #ifdef HITLS_CRYPTO_AES case CRYPT_CIPHER_AES128_CBC: case CRYPT_CIPHER_AES128_ECB: case CRYPT_CIPHER_AES128_XTS: case CRYPT_CIPHER_AES128_CTR: case CRYPT_CIPHER_AES128_CCM: case CRYPT_CIPHER_AES128_GCM: case CRYPT_CIPHER_AES128_CFB: case CRYPT_CIPHER_AES128_OFB: return &AES128_METHOD; case CRYPT_CIPHER_AES192_CBC: case CRYPT_CIPHER_AES192_ECB: case CRYPT_CIPHER_AES192_CTR: case CRYPT_CIPHER_AES192_CCM: case CRYPT_CIPHER_AES192_GCM: case CRYPT_CIPHER_AES192_CFB: case CRYPT_CIPHER_AES192_OFB: return &AES192_METHOD; case CRYPT_CIPHER_AES256_CBC: case CRYPT_CIPHER_AES256_ECB: case CRYPT_CIPHER_AES256_CTR: case CRYPT_CIPHER_AES256_XTS: case CRYPT_CIPHER_AES256_CCM: case CRYPT_CIPHER_AES256_GCM: case CRYPT_CIPHER_AES256_CFB: case CRYPT_CIPHER_AES256_OFB: return &AES256_METHOD; #endif #ifdef HITLS_CRYPTO_SM4 case CRYPT_CIPHER_SM4_XTS: case CRYPT_CIPHER_SM4_CBC: case CRYPT_CIPHER_SM4_ECB: case CRYPT_CIPHER_SM4_CTR: case CRYPT_CIPHER_SM4_GCM: case CRYPT_CIPHER_SM4_CFB: case CRYPT_CIPHER_SM4_OFB: return &SM4_METHOD; #endif #ifdef HITLS_CRYPTO_CHACHA20 case CRYPT_CIPHER_CHACHA20_POLY1305: return &CHACHA20_METHOD; #endif default: return NULL; } } static CRYPT_CipherInfo g_cipherInfo[] = { #ifdef HITLS_CRYPTO_AES {.id = CRYPT_CIPHER_AES128_CBC, .blockSize = 16, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_CBC, .blockSize = 16, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_CBC, .blockSize = 16, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_ECB, .blockSize = 16, .keyLen = 16, .ivLen = 0}, {.id = CRYPT_CIPHER_AES192_ECB, .blockSize = 16, .keyLen = 24, .ivLen = 0}, {.id = CRYPT_CIPHER_AES256_ECB, .blockSize = 16, .keyLen = 32, .ivLen = 0}, {.id = CRYPT_CIPHER_AES128_CTR, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_CTR, .blockSize = 1, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_CTR, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_CCM, .blockSize = 1, .keyLen = 16, .ivLen = 12}, {.id = CRYPT_CIPHER_AES192_CCM, .blockSize = 1, .keyLen = 24, .ivLen = 12}, {.id = CRYPT_CIPHER_AES256_CCM, .blockSize = 1, .keyLen = 32, .ivLen = 12}, {.id = CRYPT_CIPHER_AES128_GCM, .blockSize = 1, .keyLen = 16, .ivLen = 12}, {.id = CRYPT_CIPHER_AES192_GCM, .blockSize = 1, .keyLen = 24, .ivLen = 12}, {.id = CRYPT_CIPHER_AES256_GCM, .blockSize = 1, .keyLen = 32, .ivLen = 12}, {.id = CRYPT_CIPHER_AES128_CFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_CFB, .blockSize = 1, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_CFB, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_OFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_OFB, .blockSize = 1, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_OFB, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_XTS, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_XTS, .blockSize = 1, .keyLen = 64, .ivLen = 16}, #endif #ifdef HITLS_CRYPTO_CHACHA20 {.id = CRYPT_CIPHER_CHACHA20_POLY1305, .blockSize = 1, .keyLen = 32, .ivLen = 12}, #endif #ifdef HITLS_CRYPTO_SM4 {.id = CRYPT_CIPHER_SM4_XTS, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_CBC, .blockSize = 16, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_ECB, .blockSize = 16, .keyLen = 16, .ivLen = 0}, {.id = CRYPT_CIPHER_SM4_CTR, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_GCM, .blockSize = 1, .keyLen = 16, .ivLen = 12}, {.id = CRYPT_CIPHER_SM4_CFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_OFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, #endif }; /** * Search for the lengths of the block, key, and IV of algorithm. If ID in g_cipherInfo is changed, * synchronize the value of the SDV_CRYPTO_CIPHER_FUN_TC008 test case. * The input ID has a mapping relationship with g_ealCipherMethod and CRYPT_CIPHER_AlgId. * The corresponding information must be synchronized to symMap. * The symMap and CRYPT_SYM_AlgId, CRYPT_MODE_AlgId depend on each other. Synchronize the corresponding information. */ int32_t EAL_GetCipherInfo(CRYPT_CIPHER_AlgId id, CRYPT_CipherInfo *info) { uint32_t num = sizeof(g_cipherInfo) / sizeof(g_cipherInfo[0]); const CRYPT_CipherInfo *cipherInfoGet = NULL; for (uint32_t i = 0; i < num; i++) { if (g_cipherInfo[i].id == id) { cipherInfoGet = &g_cipherInfo[i]; break; } } if (cipherInfoGet == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } info->blockSize = cipherInfoGet->blockSize; info->ivLen = cipherInfoGet->ivLen; info->keyLen = cipherInfoGet->keyLen; return CRYPT_SUCCESS; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_cipher_method.c
C
unknown
15,720
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) #include <stddef.h> #include "crypt_types.h" #include "crypt_eal_md.h" #include "crypt_eal_mac.h" #include "eal_cipher_local.h" #include "eal_pkey_local.h" #include "eal_md_local.h" #include "eal_mac_local.h" #include "bsl_err_internal.h" #include "eal_common.h" EventReport g_eventReportFunc = NULL; void CRYPT_EAL_RegEventReport(EventReport func) { g_eventReportFunc = func; } void EAL_EventReport(CRYPT_EVENT_TYPE oper, CRYPT_ALGO_TYPE type, int32_t id, int32_t err) { if (g_eventReportFunc == NULL) { return; } g_eventReportFunc(oper, type, id, err); } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_common.c
C
unknown
1,190
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_COMMON_H #define EAL_COMMON_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_EAL #include <stdint.h> #include "crypt_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus #define EAL_ERR_REPORT(oper, type, id, err) \ do { \ EAL_EventReport((oper), (type), (id), (err)); \ BSL_ERR_PUSH_ERROR((err)); \ } while (0) void EAL_EventReport(CRYPT_EVENT_TYPE oper, CRYPT_ALGO_TYPE type, int32_t id, int32_t err); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_EAL #endif // EAL_COMMON_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_common.h
C
unknown
1,094
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "securec.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "eal_entropy.h" #define EAL_MAX_ENTROPY_EVERY_BYTE 8 #define EAL_ECF_OUT_LEN 16 static uint32_t GetMinLen(void *pool, uint32_t entropy, uint32_t minLen) { uint32_t minEntropy = ENTROPY_SeedPoolGetMinEntropy(pool); if (minEntropy == 0) { return 0; } uint32_t len = (uint32_t)(((uint64_t)entropy + (uint64_t)minEntropy - 1) / (uint64_t)minEntropy); /* '<' indicates that the data with a length of len can provide sufficient bit entropy. */ if (len < minLen) { len = minLen; } return len; } EAL_EntropyCtx *EAL_EntropyNewCtx(CRYPT_EAL_SeedPoolCtx *seedPool, uint8_t isNpesUsed, uint32_t minLen, uint32_t maxLen, uint32_t entropy) { if (minLen > maxLen || maxLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return NULL; } if (!ENTROPY_SeedPoolCheckState(seedPool->pool, isNpesUsed)) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_STATE_ERROR); return NULL; } if (entropy > maxLen * EAL_MAX_ENTROPY_EVERY_BYTE) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_RANGE_ERROR); return NULL; } EAL_EntropyCtx *ctx = BSL_SAL_Malloc(sizeof(EAL_EntropyCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(EAL_EntropyCtx), 0, sizeof(EAL_EntropyCtx)); ctx->minLen = minLen; ctx->maxLen = maxLen; ctx->isNpesUsed = isNpesUsed; ctx->requestEntropy = entropy; ctx->isNeedFe = (minLen == maxLen) ? true : false; uint32_t needLen; if (ctx->isNeedFe) { ctx->ecfuncId = CRYPT_MAC_CMAC_AES128; ctx->ecfOutLen = EAL_ECF_OUT_LEN; ctx->ecfunc = EAL_EntropyGetECF(CRYPT_MAC_CMAC_AES128); needLen = minLen; } else { needLen = GetMinLen(seedPool->pool, entropy, minLen); } ctx->buf = BSL_SAL_Malloc(needLen); if (ctx->buf == NULL) { BSL_SAL_Free(ctx); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->bufLen = needLen; return ctx; } void EAL_EntropyFreeCtx(EAL_EntropyCtx *ctx) { if (ctx->buf != NULL) { (void)memset_s(ctx->buf, ctx->bufLen, 0, ctx->bufLen); BSL_SAL_FREE(ctx->buf); } BSL_SAL_Free(ctx); } static int32_t EAL_EntropyObtain(void *seedPool, EAL_EntropyCtx *ctx) { while (ctx->curEntropy < ctx->requestEntropy) { uint32_t needEntropy = ctx->requestEntropy - ctx->curEntropy; uint8_t *buff = ctx->buf + ctx->curLen; uint32_t len = ctx->bufLen - ctx->curLen; uint32_t entropy = ENTROPY_SeedPoolCollect(seedPool, ctx->isNpesUsed, needEntropy, buff, &len); if (entropy == 0) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NO_ENTROPY_OBTAINED); return CRYPT_SEED_POOL_NO_ENTROPY_OBTAINED; } ctx->curEntropy += entropy; ctx->curLen += len; } /* * If the entropy data length is greater than the upper limit, the entropy source quality cannot meet the * requirements and an error is reported. */ if (ctx->curLen > ctx->maxLen) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT); return CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT; } if (ctx->curLen < ctx->minLen) { /* * If the length of the entropy data is less than the lower limit of the required length, * the entropy data that meets the length requirement is read without considering the entropy. */ uint32_t len = ctx->minLen - ctx->curLen; uint32_t ent = ENTROPY_SeedPoolCollect(seedPool, true, 0, ctx->buf + ctx->curLen, &len); if (ent == 0 || len != ctx->minLen - ctx->curLen) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NO_SUFFICIENT_ENTROPY); return CRYPT_SEED_POOL_NO_SUFFICIENT_ENTROPY; } ctx->curLen = ctx->minLen; } return CRYPT_SUCCESS; } static int32_t EAL_EntropyFesObtain(void *seedPool, EAL_EntropyCtx *ctx) { ENTROPY_ECFCtx seedCtx = {ctx->ecfuncId, ctx->ecfOutLen, ctx->ecfunc}; int32_t ret = ENTROPY_GetFullEntropyInput(&seedCtx, seedPool, ctx->isNpesUsed, ctx->requestEntropy, ctx->buf, ctx->bufLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ctx->curEntropy = ctx->requestEntropy; ctx->curLen = ctx->bufLen; return ret; } int32_t EAL_EntropyCollection(CRYPT_EAL_SeedPoolCtx *seedPool, EAL_EntropyCtx *ctx) { if (!ENTROPY_SeedPoolCheckState(seedPool->pool, true)) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_STATE_ERROR); return CRYPT_SEED_POOL_STATE_ERROR; } if (!ctx->isNeedFe || ENTROPY_SeedPoolGetMinEntropy(seedPool->pool) == EAL_MAX_ENTROPY_EVERY_BYTE) { return EAL_EntropyObtain(seedPool->pool, ctx); } else { return EAL_EntropyFesObtain(seedPool->pool, ctx); } } uint8_t *EAL_EntropyDetachBuf(EAL_EntropyCtx *ctx, uint32_t *len) { if (ctx->curEntropy < ctx->requestEntropy) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return NULL; } uint8_t *data = ctx->buf; *len = ctx->curLen; ctx->buf = NULL; ctx->bufLen = 0; ctx->curLen = 0; ctx->curEntropy = 0; return data; } static int32_t GetEntropy(void *seedCtx, CRYPT_Data *entropy, uint32_t strength, CRYPT_Range *lenRange) { return CRYPT_EAL_SeedPoolGetEntropy(seedCtx, entropy, strength, lenRange); } static void CleanEntropy(void *ctx, CRYPT_Data *entropy) { (void)ctx; BSL_SAL_CleanseData(entropy->data, entropy->len); BSL_SAL_FREE(entropy->data); } static int32_t GetNonce(void *ctx, CRYPT_Data *nonce, uint32_t strength, CRYPT_Range *lenRange) { return GetEntropy(ctx, nonce, strength, lenRange); } static void CleanNonce(void *ctx, CRYPT_Data *nonce) { CleanEntropy(ctx, nonce); } int32_t EAL_SetDefaultEntropyMeth(CRYPT_RandSeedMethod *meth) { if (meth == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } meth->getEntropy = GetEntropy; meth->cleanEntropy = CleanEntropy; meth->cleanNonce = CleanNonce; meth->getNonce = GetNonce; return CRYPT_SUCCESS; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_entropy.c
C
unknown
6,865
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_ENTROPY_H #define EAL_ENTROPY_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "crypt_eal_entropy.h" #include "bsl_sal.h" #include "crypt_entropy.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus #ifdef HITLS_CRYPTO_ENTROPY_SYS struct CryptEalEntropySource { ENTROPY_EntropySource *es; BSL_SAL_ThreadLockHandle lock; // thread lock }; #endif typedef struct { /* whether non-physical entropy sources are allowed. */ bool isNpesUsed; /* whether a full-entropy bit string is required. */ bool isNeedFe; /* the minimum length of entropy data. */ uint32_t minLen; /* the maximum length of entropy data. */ uint32_t maxLen; /* the amount of entropy required. */ uint32_t requestEntropy; /* the current amount of entropy. */ uint32_t curEntropy; /* external conditioning function algorithm */ int32_t ecfuncId; int32_t ecfOutLen; /* external conditioning function */ ExternalConditioningFunction ecfunc; /* the length of the existing entropy data */ uint32_t curLen; /* the length of entropy buffer. */ uint32_t bufLen; /* the buffer of entropy buffer. */ uint8_t *buf; } EAL_EntropyCtx; struct EAL_SeedPool { CRYPT_EAL_Es *es; void *pool; BSL_SAL_ThreadLockHandle lock; // thread lock }; /* * @brief Creating an Entropy Source Application Handle. * * @param seedPool[IN] seed pool handle * @param isNpesUsed[IN] whether non-physical entropy sources are allowed * @param minLen[IN] the minimum length of entropy data * @param maxLen[IN] the maximum length of entropy data * @param entropy[IN] the amount of entropy required * @return entropy context */ EAL_EntropyCtx *EAL_EntropyNewCtx(CRYPT_EAL_SeedPoolCtx *seedPool, uint8_t isNpesUsed, uint32_t minLen, uint32_t maxLen, uint32_t entropy); /* * @brief Release an Entropy Source Application Handle. * * @param ctx[IN] seed pool handle * @return void */ void EAL_EntropyFreeCtx(EAL_EntropyCtx *ctx); /* * @brief collect entropy data. * * @param seedPool[IN] seed pool handle * @param ctx[IN] entropy source application Handle * @return success: CRYPT_SUCCESS * failed: other error codes */ int32_t EAL_EntropyCollection(CRYPT_EAL_SeedPoolCtx *seedPool, EAL_EntropyCtx *ctx); /* * @brief pop entropy data. * * @param seedPool[IN] seed pool handle * @param ctx[IN] entropy source application Handle * @param len[OUT] entropy buf length * @return success: buffer * failed: NULL */ uint8_t *EAL_EntropyDetachBuf(EAL_EntropyCtx *ctx, uint32_t *len); /** * @brief Set the random number method that uses the default system entropy source. * * @param meth meth method * @return Success: CRYPT_SUCCESS */ int32_t EAL_SetDefaultEntropyMeth(CRYPT_RandSeedMethod *meth); /** * @brief Obtain the conditioning function of the corresponding algorithm. * * @param algId algId * @return ExternalConditioningFunction */ ExternalConditioningFunction EAL_EntropyGetECF(uint32_t algId); #ifdef __cplusplus } #endif // __cplusplus #endif #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_entropy.h
C
unknown
3,681
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_errno.h" #include "eal_entropy.h" #include "eal_common.h" #ifdef HITLS_CRYPTO_ENTROPY_SYS #include "eal_md_local.h" #endif #include "crypt_eal_entropy.h" #define CRYPT_ENTROPY_SOURCE_FULL_ENTROPY 8 #ifdef HITLS_CRYPTO_ENTROPY_GM_CF #define HITLS_ENTROPY_DEFAULT_CF "sm3_df" #else #define HITLS_ENTROPY_DEFAULT_CF "sha256_df" #endif #ifdef HITLS_CRYPTO_ENTROPY_SYS CRYPT_EAL_Es *CRYPT_EAL_EsNew(void) { CRYPT_EAL_Es *esCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_Es)); if (esCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(esCtx, sizeof(CRYPT_EAL_Es), 0, sizeof(CRYPT_EAL_Es)); esCtx->es = ENTROPY_EsNew(); if (esCtx->es == NULL) { BSL_SAL_Free(esCtx); BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CREATE_ERROR); return NULL; } int32_t ret = BSL_SAL_ThreadLockNew(&esCtx->lock); if (ret != CRYPT_SUCCESS) { ENTROPY_EsFree(esCtx->es); BSL_SAL_FREE(esCtx); BSL_ERR_PUSH_ERROR(ret); return NULL; } return esCtx; } void CRYPT_EAL_EsFree(CRYPT_EAL_Es *esCtx) { if (esCtx == NULL) { return; } BSL_SAL_ThreadLockHandle lock = esCtx->lock; esCtx->lock = NULL; if (BSL_SAL_ThreadWriteLock(lock) != BSL_SUCCESS) { ENTROPY_EsFree(esCtx->es); BSL_SAL_ThreadLockFree(lock); BSL_SAL_Free(esCtx); return; } ENTROPY_EsFree(esCtx->es); (void)BSL_SAL_ThreadUnlock(lock); BSL_SAL_ThreadLockFree(lock); BSL_SAL_Free(esCtx); return; } int32_t CRYPT_EAL_EsInit(CRYPT_EAL_Es *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = BSL_SAL_ThreadWriteLock(ctx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ENTROPY_EsInit(ctx->es); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } (void)BSL_SAL_ThreadUnlock(ctx->lock); return ret; } uint32_t CRYPT_EAL_EsEntropyGet(CRYPT_EAL_Es *esCtx, uint8_t *data, uint32_t len) { if (esCtx == NULL || data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } int32_t ret = BSL_SAL_ThreadWriteLock((esCtx->lock)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR((ret)); return 0; } uint32_t resLen = ENTROPY_EsEntropyGet(esCtx->es, data, len); (void)BSL_SAL_ThreadUnlock(esCtx->lock); return resLen; } static uint32_t EAL_CfGetAlgId(const char *name) { if (strcmp(name, "sm3_df") == 0) { return CRYPT_MD_SM3; } if (strcmp(name, "sha224_df") == 0) { return CRYPT_MD_SHA224; } if (strcmp(name, "sha256_df") == 0) { return CRYPT_MD_SHA256; } if (strcmp(name, "sha384_df") == 0) { return CRYPT_MD_SHA384; } if (strcmp(name, "sha512_df") == 0) { return CRYPT_MD_SHA512; } return CRYPT_MD_MAX; } static int32_t EAL_CFSetDfMethod(CRYPT_EAL_Es *esCtx, const char *name) { CRYPT_MD_AlgId alg = EAL_CfGetAlgId(name); if (alg == CRYPT_MD_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ECF_ALG_ERROR); return CRYPT_ENTROPY_ECF_ALG_ERROR; } const EAL_MdMethod *md = EAL_MdFindDefaultMethod(alg); if (md == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, alg, CRYPT_EAL_ERR_ALGID); return CRYPT_ENTROPY_ECF_ALG_ERROR; } ENTROPY_CFPara para = {alg, (void *)(uintptr_t)md}; return ENTROPY_EsCtrl(esCtx->es, CRYPT_ENTROPY_SET_CF, (void *)&para, sizeof(ENTROPY_CFPara)); } static int32_t EAL_EsPoolCfSet(CRYPT_EAL_Es *esCtx, void *data, uint32_t len) { if (data == NULL || len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (strstr(data, "df") != NULL) { return EAL_CFSetDfMethod(esCtx, data); } BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ECF_ALG_ERROR); return CRYPT_ENTROPY_ECF_ALG_ERROR; } static int32_t EAL_EsCtrl(CRYPT_EAL_Es *esCtx, int32_t cmd, void *data, uint32_t len) { switch (cmd) { case CRYPT_ENTROPY_SET_CF: return EAL_EsPoolCfSet(esCtx, data, len); case CRYPT_ENTROPY_GATHER_ENTROPY: return ENTROPY_EsEntropyGather(esCtx->es); default: return ENTROPY_EsCtrl(esCtx->es, cmd, data, len); } } int32_t CRYPT_EAL_EsCtrl(CRYPT_EAL_Es *esCtx, int32_t type, void *data, uint32_t len) { if (esCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (type < CRYPT_ENTROPY_SET_POOL_SIZE || type >= CRYPT_ENTROPY_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CTRL_ERROR); return CRYPT_ENTROPY_ES_CTRL_ERROR; } int32_t ret = BSL_SAL_ThreadWriteLock(esCtx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = EAL_EsCtrl(esCtx, type, data, len); (void)BSL_SAL_ThreadUnlock(esCtx->lock); return ret; } static CRYPT_EAL_Es *EsDefaultCreate(void) { CRYPT_EAL_Es *es = CRYPT_EAL_EsNew(); if (es == NULL) { return NULL; } char *data = HITLS_ENTROPY_DEFAULT_CF; int32_t ret = CRYPT_EAL_EsCtrl(es, CRYPT_ENTROPY_SET_CF, data, strlen(data)); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_EsFree(es); return NULL; } ret = ENTROPY_EsInit(es->es); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_EsFree(es); return NULL; } return es; } #endif CRYPT_EAL_SeedPoolCtx *CRYPT_EAL_SeedPoolNew(bool isCreateNullPool) { CRYPT_EAL_SeedPoolCtx *ctx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_SeedPoolCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_EAL_SeedPoolCtx), 0, sizeof(CRYPT_EAL_SeedPoolCtx)); int32_t ret = BSL_SAL_ThreadLockNew(&ctx->lock); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(ctx); BSL_ERR_PUSH_ERROR(ret); return NULL; } ctx->pool = ENTROPY_SeedPoolNew(isCreateNullPool); if (ctx->pool == NULL) { CRYPT_EAL_SeedPoolFree(ctx); BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NEW_ERROR); return NULL; } #ifdef HITLS_CRYPTO_ENTROPY_SYS if (isCreateNullPool) { ctx->es = NULL; return ctx; } ctx->es = EsDefaultCreate(); if (ctx->es == NULL) { CRYPT_EAL_SeedPoolFree(ctx); return NULL; } CRYPT_EAL_EsPara para = {false, CRYPT_ENTROPY_SOURCE_FULL_ENTROPY, ctx->es, (CRYPT_EAL_EntropyGet)CRYPT_EAL_EsEntropyGet}; ret = ENTROPY_SeedPoolAddEs(ctx->pool, &para); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_SeedPoolFree(ctx); BSL_ERR_PUSH_ERROR(ret); return NULL; } #endif return ctx; } int32_t CRYPT_EAL_SeedPoolAddEs(CRYPT_EAL_SeedPoolCtx *ctx, const CRYPT_EAL_EsPara *para) { if (ctx == NULL || para == NULL || para->minEntropy == 0 || para->minEntropy > CRYPT_ENTROPY_SOURCE_FULL_ENTROPY || para->entropyGet == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = BSL_SAL_ThreadWriteLock(ctx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ENTROPY_SeedPoolAddEs(ctx->pool, para); (void)BSL_SAL_ThreadUnlock(ctx->lock); return ret; } void CRYPT_EAL_SeedPoolFree(CRYPT_EAL_SeedPoolCtx *ctx) { if (ctx == NULL) { return; } (void)BSL_SAL_ThreadWriteLock(ctx->lock); if (ctx->pool != NULL) { ENTROPY_SeedPoolFree(ctx->pool); ctx->pool = NULL; } #ifdef HITLS_CRYPTO_ENTROPY_SYS if (ctx->es != NULL) { CRYPT_EAL_EsFree(ctx->es); ctx->es = NULL; } #endif (void)BSL_SAL_ThreadUnlock(ctx->lock); BSL_SAL_ThreadLockFree(ctx->lock); BSL_SAL_FREE(ctx); return; } static int32_t SeedPoolGetEntropy(CRYPT_EAL_SeedPoolCtx *poolCtx, CRYPT_Data *entropy, uint32_t strength, const CRYPT_Range *lenRange) { EAL_EntropyCtx *ctx = EAL_EntropyNewCtx(poolCtx, true, lenRange->min, lenRange->max, strength); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_CTX_CREATE_FAILED); return CRYPT_ENTROPY_CTX_CREATE_FAILED; } int32_t ret = EAL_EntropyCollection(poolCtx, ctx); if (ret != CRYPT_SUCCESS) { EAL_EntropyFreeCtx(ctx); BSL_ERR_PUSH_ERROR(ret); return ret; } entropy->data = EAL_EntropyDetachBuf(ctx, &entropy->len); EAL_EntropyFreeCtx(ctx); if (entropy->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_SeedPoolGetEntropy(CRYPT_EAL_SeedPoolCtx *ctx, CRYPT_Data *entropy, uint32_t strength, const CRYPT_Range *lenRange) { if (ctx == NULL || entropy == NULL || lenRange == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = BSL_SAL_ThreadWriteLock(ctx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = SeedPoolGetEntropy(ctx, entropy, strength, lenRange); (void)BSL_SAL_ThreadUnlock(ctx->lock); return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_entropyPool.c
C
unknown
10,317
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_errno.h" #include "eal_entropy.h" #include "eal_common.h" #include "crypt_eal_mac.h" #include "crypt_eal_md.h" #ifdef HITLS_CRYPTO_MAC #define ECF_ALG_KEY_LEN 16 static int32_t ECFMac(uint32_t algId, uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { CRYPT_EAL_MacCtx *ctx = CRYPT_EAL_MacNewCtx(algId); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_ENTROPY_CONDITION_FAILURE; } uint32_t keyLen = ECF_ALG_KEY_LEN; uint8_t *ecfKey = (uint8_t *)BSL_SAL_Malloc(keyLen); if (ecfKey == NULL) { CRYPT_EAL_MacFreeCtx(ctx); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } /* reference nist-800 90c-3pd section 3.3.1.1 * Unlike other cryptographic applications, keys used in these external conditioning functions do not require * secrecy to accomplish their purpose so may be hard-coded, fixed, or all zeros. */ (void)memset_s(ecfKey, keyLen, 0, keyLen); int32_t ret = CRYPT_EAL_MacInit(ctx, ecfKey, keyLen); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_MacFreeCtx(ctx); BSL_SAL_FREE(ecfKey); return ret; } ret = CRYPT_EAL_MacUpdate(ctx, in, inLen); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_MacFreeCtx(ctx); BSL_SAL_FREE(ecfKey); return ret; } ret = CRYPT_EAL_MacFinal(ctx, out, outLen); CRYPT_EAL_MacFreeCtx(ctx); BSL_SAL_FREE(ecfKey); return ret; } #endif ExternalConditioningFunction EAL_EntropyGetECF(uint32_t algId) { (void)algId; #ifdef HITLS_CRYPTO_MAC return ECFMac; #else return NULL; #endif } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_entropy_ecf.c
C
unknown
2,370
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF) #include <stdint.h> #include "crypt_eal_kdf.h" #include "securec.h" #include "bsl_err_internal.h" #include "crypt_local_types.h" #include "crypt_eal_mac.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #include "crypt_provider.h" #endif #include "crypt_algid.h" #include "crypt_errno.h" #include "eal_mac_local.h" #include "eal_kdf_local.h" #ifdef HITLS_CRYPTO_HMAC #include "crypt_hmac.h" #endif #ifdef HITLS_CRYPTO_PBKDF2 #include "crypt_pbkdf2.h" #endif #ifdef HITLS_CRYPTO_HKDF #include "crypt_hkdf.h" #endif #ifdef HITLS_CRYPTO_KDFTLS12 #include "crypt_kdf_tls12.h" #endif #ifdef HITLS_CRYPTO_SCRYPT #include "crypt_scrypt.h" #endif #include "eal_common.h" #include "crypt_utils.h" #include "bsl_sal.h" static CRYPT_EAL_KdfCTX *KdfAllocCtx(CRYPT_KDF_AlgId id, EAL_KdfUnitaryMethod *method) { CRYPT_EAL_KdfCTX *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_KdfCTX)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } void *data = method->newCtx(); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, id, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx); return NULL; } ctx->data = data; return ctx; } static void EalKdfCopyMethod(const EAL_KdfMethod *method, EAL_KdfUnitaryMethod *dest) { dest->newCtx = method->newCtx; dest->setParam = method->setParam; dest->derive = method->derive; dest->deinit = method->deinit; dest->freeCtx = method->freeCtx; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t CRYPT_EAL_SetKdfMethod(CRYPT_EAL_KdfCTX *ctx, const CRYPT_EAL_Func *funcs) { int32_t index = 0; EAL_KdfUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_KdfUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return BSL_MALLOC_FAIL; } while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLKDF_NEWCTX: method->provNewCtx = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_SETPARAM: method->setParam = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_DERIVE: method->derive = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_DEINITCTX: method->deinit = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_CTRL: method->ctrl = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_FREECTX: method->freeCtx = funcs[index].func; break; default: BSL_SAL_FREE(method); BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } ctx->method = method; return CRYPT_SUCCESS; } CRYPT_EAL_KdfCTX *CRYPT_EAL_ProviderKdfNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { const CRYPT_EAL_Func *funcs = NULL; void *provCtx = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_KDF, algId, attrName, &funcs, &provCtx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, ret); return NULL; } CRYPT_EAL_KdfCTX *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_KdfCTX)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CRYPT_EAL_SetKdfMethod(ctx, funcs); if (ret != BSL_SUCCESS) { BSL_SAL_FREE(ctx); return NULL; } if (ctx->method->provNewCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_PROVIDER_ERR_IMPL_NULL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->data = ctx->method->provNewCtx(provCtx, algId); if (ctx->data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->id = algId; ctx->isProvider = true; return ctx; } #endif // HITLS_CRYPTO_PROVIDER bool CRYPT_EAL_KdfIsValidAlgId(CRYPT_KDF_AlgId id) { const EAL_KdfMethod *method = EAL_KdfFindMethod(id); if (method == NULL) { return false; } else { return true; } } CRYPT_EAL_KdfCTX *CRYPT_EAL_ProviderKdfNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderKdfNewCtxInner(libCtx, algId, attrName); #else (void)libCtx; (void)attrName; return CRYPT_EAL_KdfNewCtx(algId); return NULL; #endif } CRYPT_EAL_KdfCTX *CRYPT_EAL_KdfNewCtx(CRYPT_KDF_AlgId algId) { const EAL_KdfMethod *method = EAL_KdfFindMethod(algId); if (method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_EAL_ERR_ALGID); return NULL; } EAL_KdfUnitaryMethod *temp = BSL_SAL_Calloc(1, sizeof(EAL_KdfUnitaryMethod)); if (temp == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, BSL_MALLOC_FAIL); return NULL; } EalKdfCopyMethod(method, temp); CRYPT_EAL_KdfCTX *ctx = KdfAllocCtx(algId, temp); if (ctx == NULL) { BSL_SAL_FREE(temp); return NULL; } ctx->id = algId; ctx->method = temp; return ctx; } int32_t CRYPT_EAL_KdfSetParam(CRYPT_EAL_KdfCTX *ctx, const BSL_Param *param) { int32_t ret; if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, CRYPT_KDF_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->setParam == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = ctx->method->setParam(ctx->data, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, ret); } return ret; } int32_t CRYPT_EAL_KdfDerive(CRYPT_EAL_KdfCTX *ctx, uint8_t *key, uint32_t keyLen) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, CRYPT_KDF_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->derive == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method->derive(ctx->data, key, keyLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, ret); return ret; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_KdfDeInitCtx(CRYPT_EAL_KdfCTX *ctx) { if (ctx == NULL || ctx->method == NULL || ctx->method->deinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, CRYPT_KDF_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ctx->method->deinit(ctx->data); return CRYPT_SUCCESS; } void CRYPT_EAL_KdfFreeCtx(CRYPT_EAL_KdfCTX *ctx) { if (ctx == NULL) { return; } if (ctx->method != NULL && ctx->method->freeCtx != NULL) { ctx->method->freeCtx(ctx->data); EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_KDF, ctx->id, CRYPT_SUCCESS); } else { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); } BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_kdf.c
C
unknown
8,217
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_KDF_LOCAL_H #define EAL_KDF_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus struct EalKdfCtx { bool isProvider; EAL_KdfUnitaryMethod *method; /* algorithm operation entity */ void *data; CRYPT_KDF_AlgId id; }; const EAL_KdfMethod *EAL_KdfFindMethod(CRYPT_KDF_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_KDF #endif // EAL_KDF_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_kdf_local.h
C
unknown
1,121
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF) #include "crypt_local_types.h" #include "crypt_algid.h" #ifdef HITLS_CRYPTO_PBKDF2 #include "crypt_pbkdf2.h" #endif #ifdef HITLS_CRYPTO_HKDF #include "crypt_hkdf.h" #endif #ifdef HITLS_CRYPTO_KDFTLS12 #include "crypt_kdf_tls12.h" #endif #ifdef HITLS_CRYPTO_SCRYPT #include "crypt_scrypt.h" #endif #include "bsl_err_internal.h" #include "eal_common.h" #include "bsl_sal.h" #define CRYPT_KDF_IMPL_METHOD_DECLARE(name) \ EAL_KdfMethod g_kdfMethod_##name = { \ (KdfNewCtx)CRYPT_##name##_NewCtx, (KdfSetParam)CRYPT_##name##_SetParam, \ (KdfDerive)CRYPT_##name##_Derive, (KdfDeinit)CRYPT_##name##_Deinit, \ (KdfFreeCtx)CRYPT_##name##_FreeCtx \ } #ifdef HITLS_CRYPTO_PBKDF2 CRYPT_KDF_IMPL_METHOD_DECLARE(PBKDF2); #endif #ifdef HITLS_CRYPTO_HKDF CRYPT_KDF_IMPL_METHOD_DECLARE(HKDF); #endif #ifdef HITLS_CRYPTO_KDFTLS12 CRYPT_KDF_IMPL_METHOD_DECLARE(KDFTLS12); #endif #ifdef HITLS_CRYPTO_SCRYPT CRYPT_KDF_IMPL_METHOD_DECLARE(SCRYPT); #endif static const EAL_CidToKdfMeth ID_TO_KDF_METH_TABLE[] = { #ifdef HITLS_CRYPTO_PBKDF2 {CRYPT_KDF_PBKDF2, &g_kdfMethod_PBKDF2}, #endif #ifdef HITLS_CRYPTO_HKDF {CRYPT_KDF_HKDF, &g_kdfMethod_HKDF}, #endif #ifdef HITLS_CRYPTO_KDFTLS12 {CRYPT_KDF_KDFTLS12, &g_kdfMethod_KDFTLS12}, #endif #ifdef HITLS_CRYPTO_SCRYPT {CRYPT_KDF_SCRYPT, &g_kdfMethod_SCRYPT}, #endif }; const EAL_KdfMethod *EAL_KdfFindMethod(CRYPT_KDF_AlgId id) { EAL_KdfMethod *pKdfMeth = NULL; uint32_t num = sizeof(ID_TO_KDF_METH_TABLE) / sizeof(ID_TO_KDF_METH_TABLE[0]); for (uint32_t i = 0; i < num; i++) { if (ID_TO_KDF_METH_TABLE[i].id == id) { pKdfMeth = ID_TO_KDF_METH_TABLE[i].kdfMeth; return pKdfMeth; } } return NULL; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_kdf_method.c
C
unknown
2,456
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_PROVIDER) #include "crypt_errno.h" #include "crypt_eal_pkey.h" #include "eal_pkey_local.h" #include "eal_pkey.h" #include "bsl_err_internal.h" #include "bsl_sal.h" CRYPT_EAL_PkeyCtx *CRYPT_EAL_MakeKeyByPkeyAlgInfo(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, void *keyRef, uint32_t keyRefLen) { if (pkeyAlgInfo == NULL || keyRef == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } if (keyRefLen != sizeof(void *)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return NULL; } CRYPT_EAL_PkeyCtx *pkeyCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx)); if (pkeyCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } pkeyCtx->isProvider = true; pkeyCtx->id = pkeyAlgInfo->algId; pkeyCtx->key = keyRef; pkeyCtx->extData = NULL; pkeyCtx->method = pkeyAlgInfo->keyMgmtMethod; BSL_SAL_ReferencesInit(&(pkeyCtx->references)); return pkeyCtx; } int32_t CRYPT_EAL_GetPkeyAlgInfo(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo) { CRYPT_EAL_AsyAlgFuncsInfo funcInfo = {0}; int32_t ret = CRYPT_EAL_ProviderGetAsyAlgFuncs(libCtx, algId, CRYPT_EAL_PKEY_UNKNOWN_OPERATE, attrName, &funcInfo); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_SetPkeyMethod(&(pkeyAlgInfo->keyMgmtMethod), funcInfo.funcsKeyMgmt, funcInfo.funcsAsyCipher, funcInfo.funcsExch, funcInfo.funcSign, funcInfo.funcKem); if (ret != CRYPT_SUCCESS) { return ret; } pkeyAlgInfo->algId = algId; pkeyAlgInfo->mgrCtx = funcInfo.mgrCtx; return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_CODECSKEY && CRYPT_EAL_PROVIDER */
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_keymgmt_util.c
C
unknown
2,358
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC) #include <stdio.h> #include <stdlib.h> #include "crypt_eal_mac.h" #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_local_types.h" #include "crypt_eal_mac.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "crypt_ealinit.h" #include "eal_mac_local.h" #include "eal_common.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #include "crypt_provider.h" #endif #define MAC_TYPE_INVALID 0 static CRYPT_EAL_MacCtx *MacNewCtxInner(int32_t algId, CRYPT_EAL_LibCtx *libCtx, const char *attrName, bool isProvider) { EAL_MacMethod *method = NULL; CRYPT_EAL_MacCtx *macCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MacCtx)); if (macCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(macCtx, sizeof(CRYPT_EAL_MacCtx), 0, sizeof(CRYPT_EAL_MacCtx)); void *provCtx = NULL; if (!isProvider) { method = EAL_MacFindMethod(algId, &macCtx->macMeth); } else { method = EAL_MacFindMethodEx(algId, libCtx, attrName, &macCtx->macMeth, &provCtx); } if (method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_EAL_ERR_METH_NULL_MEMBER); BSL_SAL_Free(macCtx); return NULL; } if (macCtx->macMeth.newCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_NULL_INPUT); BSL_SAL_Free(macCtx); return NULL; } void *data = macCtx->macMeth.newCtx(provCtx, algId); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_Free(macCtx); return NULL; } macCtx->ctx = data; macCtx->id = algId; macCtx->state = CRYPT_MAC_STATE_NEW; return macCtx; } CRYPT_EAL_MacCtx *CRYPT_EAL_ProviderMacNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { return MacNewCtxInner(algId, libCtx, attrName, true); } CRYPT_EAL_MacCtx *CRYPT_EAL_MacNewCtx(CRYPT_MAC_AlgId id) { #if defined(HITLS_CRYPTO_ASM_CHECK) if (CRYPT_ASMCAP_Mac(id) != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, id, CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return MacNewCtxInner(id, NULL, NULL, false); } void CRYPT_EAL_MacFreeCtx(CRYPT_EAL_MacCtx *ctx) { if (ctx == NULL) { return; } if (ctx->macMeth.freeCtx != NULL) { ctx->macMeth.freeCtx(ctx->ctx); EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_MAC, ctx->id, CRYPT_SUCCESS); } else { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); } BSL_SAL_Free(ctx); return; } int32_t CRYPT_EAL_MacInit(CRYPT_EAL_MacCtx *ctx, const uint8_t *key, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->macMeth.init == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.init(ctx->ctx, key, len, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_INIT; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MacUpdate(CRYPT_EAL_MacCtx *ctx, const uint8_t *in, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((ctx->state == CRYPT_MAC_STATE_FINAL) || (ctx->state == CRYPT_MAC_STATE_NEW)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->macMeth.update == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.update(ctx->ctx, in, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_UPDATE; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MacFinal(CRYPT_EAL_MacCtx *ctx, uint8_t *out, uint32_t *len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((ctx->state == CRYPT_MAC_STATE_NEW) || (ctx->state == CRYPT_MAC_STATE_FINAL)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->macMeth.final == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.final(ctx->ctx, out, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_FINAL; return CRYPT_SUCCESS; } void CRYPT_EAL_MacDeinit(CRYPT_EAL_MacCtx *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return; } if (ctx->macMeth.deinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return; } int32_t ret = ctx->macMeth.deinit(ctx->ctx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return; } ctx->state = CRYPT_MAC_STATE_NEW; return; } int32_t CRYPT_EAL_MacReinit(CRYPT_EAL_MacCtx *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->state == CRYPT_MAC_STATE_NEW) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->macMeth.reinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.reinit(ctx->ctx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_INIT; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MacCtrl(CRYPT_EAL_MacCtx *ctx, int32_t cmd, void *val, uint32_t valLen) { if (ctx == NULL || ctx->macMeth.ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (cmd == CRYPT_CTRL_GET_MACLEN) { return ctx->macMeth.ctrl(ctx->ctx, cmd, val, valLen); } if (ctx->state != CRYPT_MAC_STATE_INIT) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } return ctx->macMeth.ctrl(ctx->ctx, cmd, val, valLen); } uint32_t CRYPT_EAL_GetMacLen(const CRYPT_EAL_MacCtx *ctx) { uint32_t result = 0; int32_t ret = CRYPT_EAL_MacCtrl((CRYPT_EAL_MacCtx *)(uintptr_t)ctx, CRYPT_CTRL_GET_MACLEN, &result, sizeof(uint32_t)); return (ret == CRYPT_SUCCESS) ? result : 0; } /* The function not support provider */ bool CRYPT_EAL_MacIsValidAlgId(CRYPT_MAC_AlgId id) { // 1. Check if the dependency method is valid /** * The dependency method is getted from the global static table: * If the mac algorithm is HMAC, the method in mdMethod will be overwritten. * If the mac algorithm is other than HMAC, the depMeth.method will be overwritten. */ EAL_MdMethod mdMethod = {0}; EAL_MacDepMethod depMeth = {.method = {.md = &mdMethod}}; int32_t ret = EAL_MacFindDepMethod(id, NULL, NULL, &depMeth, NULL, false); if (ret != CRYPT_SUCCESS) { return false; } // 2. Check if the mac method is valid return EAL_MacFindDefaultMethod(id) != NULL; } int32_t CRYPT_EAL_MacSetParam(CRYPT_EAL_MacCtx *ctx, const BSL_Param *param) { if (ctx == NULL || param == NULL || ctx->macMeth.setParam == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return ctx->macMeth.setParam(ctx->ctx, param); } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_mac.c
C
unknown
9,152
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_MAC_LOCAL_H #define EAL_MAC_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus typedef enum { CRYPT_MAC_STATE_NEW = 0, CRYPT_MAC_STATE_INIT, CRYPT_MAC_STATE_UPDATE, CRYPT_MAC_STATE_FINAL } CRYPT_MAC_WORKSTATE; struct EAL_MacCtx { EAL_MacMethod macMeth; void *ctx; // MAC context CRYPT_MAC_AlgId id; CRYPT_MAC_WORKSTATE state; }; /** * @ingroup eal * @brief Find the default MAC method by the algorithm ID. * * @param id The algorithm ID. * * @return The MAC method. */ const EAL_MacMethod *EAL_MacFindDefaultMethod(CRYPT_MAC_AlgId id); /** * @ingroup eal * @brief Find MAC algorithm implementation method by algorithm ID * * This function retrieves the default implementation method for specified MAC algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MAC algorithm identifier (e.g. CRYPT_MAC_HMAC, CRYPT_MAC_CMAC) * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * * @return Pointer to MAC method structure on success. NULL on failure (invalid ID or allocate fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is not NULL, returns the same pointer with initialized contents. */ EAL_MacMethod *EAL_MacFindMethod(CRYPT_MAC_AlgId id, EAL_MacMethod *method); /** * @ingroup eal * @brief Find MAC algorithm implementation method by algorithm ID with provider context * * This function retrieves the default implementation method for specified MAC algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MAC algorithm identifier (e.g. CRYPT_MAC_HMAC, CRYPT_MAC_CMAC) * @param libCtx [IN] The library context. * @param attrName [IN] The attribute name. * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * @param provCtx [OUT] The provider context. * * @return Pointer to MAC method structure on success. NULL on failure (invalid ID or alloc fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is not NULL, returns the same pointer with initialized contents. */ EAL_MacMethod *EAL_MacFindMethodEx(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method, void **provCtx); /** * @ingroup eal * @brief Find dependent algorithm methods for MAC calculation * * @param macId [IN] MAC algorithm identifier * @param libCtx [IN] Library context (for provider operations) * @param attrName [IN] Attribute name for provider selection * @param depMeth [OUT] Structure containing dependent methods and algorithm IDs * @param provCtx [OUT] The provider context. * @param isProvider [IN] Whether to use the provider method. * * @return CRYPT_SUCCESS on success, error code on failure * * @note When macId is HMAC: * - depMeth->method.md is NULL: * - Function will allocate new EAL_MdMethod structure internally * - Caller MUST free allocated method * - depMeth->method.md is non-NULL: * - Function will reuse existing method structure * - Original contents will be overwritten */ int32_t EAL_MacFindDepMethod(CRYPT_MAC_AlgId macId, void *libCtx, const char *attrName, EAL_MacDepMethod *depMeth, void **provCtx, bool isProvider); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_MAC #endif // EAL_MAC_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_mac_local.h
C
unknown
4,785
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC) #include <stdint.h> #include "securec.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "eal_mac_local.h" #include "eal_cipher_local.h" #include "eal_md_local.h" #ifdef HITLS_CRYPTO_HMAC #include "crypt_hmac.h" #endif #ifdef HITLS_CRYPTO_CMAC #include "crypt_cmac.h" #endif #ifdef HITLS_CRYPTO_CBC_MAC #include "crypt_cbc_mac.h" #endif #ifdef HITLS_CRYPTO_GMAC #include "crypt_gmac.h" #endif #ifdef HITLS_CRYPTO_SIPHASH #include "crypt_siphash.h" #endif #include "bsl_err_internal.h" #include "eal_common.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #endif #define CRYPT_MAC_IMPL_METHOD_DECLARE(name) \ EAL_MacMethod g_macMethod_##name = { \ (MacNewCtx)CRYPT_##name##_NewCtxEx, \ (MacInit)CRYPT_##name##_Init, \ (MacUpdate)CRYPT_##name##_Update, \ (MacFinal)CRYPT_##name##_Final, \ (MacDeinit)CRYPT_##name##_Deinit, \ (MacReinit)CRYPT_##name##_Reinit, \ (MacCtrl)CRYPT_##name##_Ctrl, \ (MacSetParam)CRYPT_##name##_SetParam, \ (MacFreeCtx)CRYPT_##name##_FreeCtx \ } #ifdef HITLS_CRYPTO_HMAC CRYPT_MAC_IMPL_METHOD_DECLARE(HMAC); #endif #ifdef HITLS_CRYPTO_CMAC CRYPT_MAC_IMPL_METHOD_DECLARE(CMAC); #endif #ifdef HITLS_CRYPTO_CBC_MAC CRYPT_MAC_IMPL_METHOD_DECLARE(CBC_MAC); #endif #ifdef HITLS_CRYPTO_GMAC CRYPT_MAC_IMPL_METHOD_DECLARE(GMAC); #endif #ifdef HITLS_CRYPTO_SIPHASH CRYPT_MAC_IMPL_METHOD_DECLARE(SIPHASH); EAL_SiphashMethod g_siphash64Meth = {.hashSize = SIPHASH_MIN_DIGEST_SIZE, .compressionRounds = DEFAULT_COMPRESSION_ROUND, .finalizationRounds = DEFAULT_FINALIZATION_ROUND}; EAL_SiphashMethod g_siphash128Meth = {.hashSize = SIPHASH_MAX_DIGEST_SIZE, .compressionRounds = DEFAULT_COMPRESSION_ROUND, .finalizationRounds = DEFAULT_FINALIZATION_ROUND}; #endif typedef enum { CRYPT_MAC_HMAC = 0, CRYPT_MAC_CMAC, CRYPT_MAC_CBC_MAC, CRYPT_MAC_SIPHASH, CRYPT_MAC_GMAC, CRYPT_MAC_INVALID } CRYPT_MAC_ID; static const EAL_MacMethod *g_macMethods[] = { #ifdef HITLS_CRYPTO_HMAC &g_macMethod_HMAC, // HMAC #else NULL, #endif #ifdef HITLS_CRYPTO_CMAC &g_macMethod_CMAC, // CMAC #else NULL, #endif #ifdef HITLS_CRYPTO_CBC_MAC &g_macMethod_CBC_MAC, // CBC-MAC #else NULL, #endif #ifdef HITLS_CRYPTO_SIPHASH &g_macMethod_SIPHASH, // SIPHASH #else NULL, #endif #ifdef HITLS_CRYPTO_GMAC &g_macMethod_GMAC, // GMAC #else NULL, #endif }; typedef struct { uint32_t id; CRYPT_MAC_ID macId; union { CRYPT_MD_AlgId mdId; CRYPT_SYM_AlgId symId; }; } EAL_MacAlgMap; static const EAL_MacAlgMap CID_MAC_ALG_MAP[] = { #ifdef HITLS_CRYPTO_HMAC {.id = CRYPT_MAC_HMAC_MD5, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_MD5}, {.id = CRYPT_MAC_HMAC_SHA1, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA1}, {.id = CRYPT_MAC_HMAC_SHA224, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA224}, {.id = CRYPT_MAC_HMAC_SHA256, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA256}, {.id = CRYPT_MAC_HMAC_SHA384, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA384}, {.id = CRYPT_MAC_HMAC_SHA512, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA512}, {.id = CRYPT_MAC_HMAC_SHA3_224, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_224}, {.id = CRYPT_MAC_HMAC_SHA3_256, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_256}, {.id = CRYPT_MAC_HMAC_SHA3_384, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_384}, {.id = CRYPT_MAC_HMAC_SHA3_512, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_512}, {.id = CRYPT_MAC_HMAC_SM3, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SM3}, #endif // HITLS_CRYPTO_HMAC #ifdef HITLS_CRYPTO_CMAC_AES {.id = CRYPT_MAC_CMAC_AES128, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES128}, {.id = CRYPT_MAC_CMAC_AES192, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES192}, {.id = CRYPT_MAC_CMAC_AES256, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES256}, #endif #ifdef HITLS_CRYPTO_CMAC_SM4 {.id = CRYPT_MAC_CMAC_SM4, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_SM4}, #endif #ifdef HITLS_CRYPTO_CBC_MAC {.id = CRYPT_MAC_CBC_MAC_SM4, .macId = CRYPT_MAC_CBC_MAC, .symId = CRYPT_SYM_SM4}, #endif #ifdef HITLS_CRYPTO_GMAC {.id = CRYPT_MAC_GMAC_AES128, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES128}, {.id = CRYPT_MAC_GMAC_AES192, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES192}, {.id = CRYPT_MAC_GMAC_AES256, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES256}, #endif #ifdef HITLS_CRYPTO_SIPHASH {.id = CRYPT_MAC_SIPHASH64, .macId = CRYPT_MAC_SIPHASH}, {.id = CRYPT_MAC_SIPHASH128, .macId = CRYPT_MAC_SIPHASH} #endif }; static const EAL_MacAlgMap *EAL_FindMacAlgMap(CRYPT_MAC_AlgId id) { uint32_t num = sizeof(CID_MAC_ALG_MAP) / sizeof(CID_MAC_ALG_MAP[0]); const EAL_MacAlgMap *macAlgMap = NULL; for (uint32_t i = 0; i < num; i++) { if (CID_MAC_ALG_MAP[i].id == id) { macAlgMap = &CID_MAC_ALG_MAP[i]; break; } } return macAlgMap; } #if defined(HITLS_CRYPTO_CMAC) || defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_GMAC) static int32_t ConvertSymId2CipherId(CRYPT_SYM_AlgId algId) { switch (algId) { case CRYPT_SYM_AES128: return CRYPT_CIPHER_AES128_ECB; case CRYPT_SYM_AES192: return CRYPT_CIPHER_AES192_ECB; case CRYPT_SYM_AES256: return CRYPT_CIPHER_AES256_ECB; case CRYPT_SYM_SM4: return CRYPT_CIPHER_SM4_XTS; default: return CRYPT_CIPHER_MAX; } } #endif const EAL_MacMethod *EAL_MacFindDefaultMethod(CRYPT_MAC_AlgId id) { const EAL_MacAlgMap *macAlgMap = EAL_FindMacAlgMap(id); if (macAlgMap == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } return g_macMethods[macAlgMap->macId]; } EAL_MacMethod *EAL_MacFindMethod(CRYPT_MAC_AlgId id, EAL_MacMethod *method) { EAL_MacMethod *retMethod = method; const EAL_MacMethod *findMethod = EAL_MacFindDefaultMethod(id); if (findMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } if (retMethod == NULL) { retMethod = BSL_SAL_Malloc(sizeof(EAL_MacMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod)); } *retMethod = *findMethod; return retMethod; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t SetMacMethod(const CRYPT_EAL_Func *funcs, EAL_MacMethod *method) { int32_t index = 0; while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLMAC_NEWCTX: method->newCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_INIT: method->init = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_UPDATE: method->update = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_FINAL: method->final = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_REINITCTX: method->reinit = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_DEINITCTX: method->deinit = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_CTRL: method->ctrl = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_FREECTX: method->freeCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_SETPARAM: method->setParam = funcs[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } return CRYPT_SUCCESS; } static EAL_MacMethod *EAL_ProviderMacFindMethod(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method, void **provCtx) { EAL_MacMethod *retMethod = method; const CRYPT_EAL_Func *funcs = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_MAC, id, attrName, &funcs, provCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return NULL; } if (method == NULL) { retMethod = (EAL_MacMethod *)BSL_SAL_Malloc(sizeof(EAL_MacMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod)); } ret = SetMacMethod(funcs, retMethod); if (ret != CRYPT_SUCCESS) { if (retMethod != method) { BSL_SAL_Free(retMethod); } return NULL; } return retMethod; } #endif // HITLS_CRYPTO_PROVIDER EAL_MacMethod *EAL_MacFindMethodEx(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method, void **provCtx) { #ifdef HITLS_CRYPTO_PROVIDER return EAL_ProviderMacFindMethod(id, libCtx, attrName, method, provCtx); #else (void)libCtx; (void)attrName; (void)provCtx; return EAL_MacFindMethod(id, method); #endif } int32_t EAL_MacFindDepMethod(CRYPT_MAC_AlgId macId, void *libCtx, const char *attrName, EAL_MacDepMethod *depMeth, void **provCtx, bool isProvider) { (void)libCtx; (void)attrName; (void)provCtx; (void)isProvider; const EAL_MacAlgMap *macAlgMap = EAL_FindMacAlgMap(macId); if (macAlgMap == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } #ifdef HITLS_CRYPTO_HMAC EAL_MdMethod *mdMethod = NULL; #endif switch (macAlgMap->macId) { #ifdef HITLS_CRYPTO_HMAC case CRYPT_MAC_HMAC: depMeth->id.mdId = macAlgMap->mdId; mdMethod = isProvider ? EAL_MdFindMethodEx(macAlgMap->mdId, libCtx, attrName, depMeth->method.md, provCtx) : EAL_MdFindMethod(macAlgMap->mdId, depMeth->method.md); if (mdMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (depMeth->method.md == NULL) { // if the md pointer is NULL, the md method will be allocated. The caller should free the md method. depMeth->method.md = mdMethod; } // if the md pointer is not NULL, the md method has been overwritten before. return CRYPT_SUCCESS; #endif #if defined(HITLS_CRYPTO_CMAC) || defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_GMAC) case CRYPT_MAC_CMAC: case CRYPT_MAC_CBC_MAC: case CRYPT_MAC_GMAC: depMeth->id.symId = macAlgMap->symId; // sym method is get from global, so no need to free it. depMeth->method.sym = EAL_GetSymMethod(ConvertSymId2CipherId(macAlgMap->symId)); break; #endif #ifdef HITLS_CRYPTO_SIPHASH case CRYPT_MAC_SIPHASH: // sip method is get from global, so no need to free it. depMeth->method.sip = (macId == CRYPT_MAC_SIPHASH64) ? &g_siphash64Meth : &g_siphash128Meth; break; #endif default: BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (depMeth->method.sym == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_mac_method.c
C
unknown
12,428
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD) #include <stdio.h> #include <stdlib.h> #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_local_types.h" #include "crypt_eal_md.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "eal_md_local.h" #include "eal_common.h" #include "crypt_ealinit.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #include "crypt_provider.h" #endif static CRYPT_EAL_MdCTX *MdNewCtxInner(CRYPT_MD_AlgId id, CRYPT_EAL_LibCtx *libCtx, const char *attrName, bool isProvider) { EAL_MdMethod *method = NULL; CRYPT_EAL_MdCTX *ctx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MdCTX)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } void *provCtx = NULL; // The ctx->method will be overwritten if the method is found. (void)memset_s(&ctx->method, sizeof(ctx->method), 0, sizeof(ctx->method)); if (!isProvider) { method = EAL_MdFindMethod(id, &ctx->method); } else { method = EAL_MdFindMethodEx(id, libCtx, attrName, &ctx->method, &provCtx); } if (method == NULL) { BSL_SAL_Free(ctx); return NULL; } if (ctx->method.newCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT); BSL_SAL_Free(ctx); return NULL; } void *data = ctx->method.newCtx(provCtx, id); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_Free(ctx); return NULL; } ctx->id = id; ctx->state = CRYPT_MD_STATE_NEW; ctx->data = data; return ctx; } CRYPT_EAL_MdCTX *CRYPT_EAL_ProviderMdNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { return MdNewCtxInner(algId, libCtx, attrName, true); } CRYPT_EAL_MdCTX *CRYPT_EAL_MdNewCtx(CRYPT_MD_AlgId id) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Md(id) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return MdNewCtxInner(id, NULL, NULL, false); } bool CRYPT_EAL_MdIsValidAlgId(CRYPT_MD_AlgId id) { return EAL_MdFindDefaultMethod(id) != NULL; } int32_t CRYPT_EAL_MdGetId(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { return CRYPT_MD_MAX; } return ctx->id; } int32_t CRYPT_EAL_MdCopyCtx(CRYPT_EAL_MdCTX *to, const CRYPT_EAL_MdCTX *from) { if (to == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (from == NULL || from->method.dupCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (to->data != NULL) { if (to->method.freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } to->method.freeCtx(to->data); to->data = NULL; } void *data = from->method.dupCtx(from->data); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, from->id, CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } *to = *from; to->data = data; return CRYPT_SUCCESS; } CRYPT_EAL_MdCTX *CRYPT_EAL_MdDupCtx(const CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return NULL; } if (ctx->method.dupCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_NULL_INPUT); return NULL; } CRYPT_EAL_MdCTX *newCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MdCTX)); if (newCtx == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return NULL; } *newCtx = *ctx; newCtx->data = ctx->method.dupCtx(ctx->data); if (newCtx->data == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); BSL_SAL_Free(newCtx); return NULL; } return newCtx; } void CRYPT_EAL_MdFreeCtx(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { return; } if (ctx->method.freeCtx != NULL) { ctx->method.freeCtx(ctx->data); EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_MD, ctx->id, CRYPT_SUCCESS); } else { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); } BSL_SAL_FREE(ctx); return; } int32_t CRYPT_EAL_MdInit(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.init == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method.init(ctx->data, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_INIT; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdUpdate(CRYPT_EAL_MdCTX *ctx, const uint8_t *data, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.update == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((ctx->state == CRYPT_MD_STATE_FINAL) || (ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_SQUEEZE)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } int32_t ret = ctx->method.update(ctx->data, data, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_UPDATE; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdFinal(CRYPT_EAL_MdCTX *ctx, uint8_t *out, uint32_t *len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.final == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_FINAL) || (ctx->state == CRYPT_MD_STATE_SQUEEZE)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } // The validity of the buffer length that carries the output result (len > ctx->method->mdSize) // is determined by the algorithm bottom layer and is not verified here. int32_t ret = ctx->method.final(ctx->data, out, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_FINAL; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdSqueeze(CRYPT_EAL_MdCTX *ctx, uint8_t *out, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.squeeze == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_FINAL)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } int32_t ret = ctx->method.squeeze(ctx->data, out, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_SQUEEZE; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdDeinit(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL || ctx->method.deinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = ctx->method.deinit(ctx->data); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_NEW; return CRYPT_SUCCESS; } typedef struct { CRYPT_MD_AlgId id; uint32_t digestSize; } CRYPT_MD_DigestSizeMap; static const CRYPT_MD_DigestSizeMap g_mdDigestSizeMap[] = { {CRYPT_MD_SHA1, 20}, {CRYPT_MD_SHA224, 28}, {CRYPT_MD_SHA256, 32}, {CRYPT_MD_SHA384, 48}, {CRYPT_MD_SHA512, 64}, {CRYPT_MD_SHA3_224, 28}, {CRYPT_MD_SHA3_256, 32}, {CRYPT_MD_SHA3_384, 48}, {CRYPT_MD_SHA3_512, 64}, {CRYPT_MD_SHAKE128, 0}, {CRYPT_MD_SHAKE256, 0}, {CRYPT_MD_SM3, 32}, {CRYPT_MD_MD5, 16}, }; uint32_t CRYPT_EAL_MdGetDigestSize(CRYPT_MD_AlgId id) { for (uint32_t i = 0; i < sizeof(g_mdDigestSizeMap) / sizeof(g_mdDigestSizeMap[0]); i++) { if (g_mdDigestSizeMap[i].id == id) { return g_mdDigestSizeMap[i].digestSize; } } EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_ERR_ALGID); return 0; } int32_t CRYPT_EAL_Md(CRYPT_MD_AlgId id, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { return EAL_Md(id, NULL, NULL, in, inLen, out, outLen); } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_md.c
C
unknown
10,152
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_MD_LOCAL_H #define EAL_MD_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus typedef enum { CRYPT_MD_STATE_NEW = 0, CRYPT_MD_STATE_INIT, CRYPT_MD_STATE_UPDATE, CRYPT_MD_STATE_FINAL, CRYPT_MD_STATE_SQUEEZE } CRYPT_MD_WORKSTATE; struct EAL_MdCtx { EAL_MdMethod method; /* algorithm operation entity */ void *data; /* Algorithm ctx, mainly context */ uint32_t state; CRYPT_MD_AlgId id; }; /** * @ingroup eal * @brief Find the default MD method by the algorithm ID. * * @param id The algorithm ID. * * @return The MD method. */ const EAL_MdMethod *EAL_MdFindDefaultMethod(CRYPT_MD_AlgId id); /** * @ingroup eal * @brief Find Md algorithm implementation method by algorithm ID * * This function retrieves the default implementation method for specified MD algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MD algorithm identifier (e.g. CRYPT_MD_SHA256, CRYPT_MD_SHA384) * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * * @return Pointer to MD method structure on success. NULL on failure (invalid ID or alloc fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is valid, returns the same pointer with initialized contents. */ EAL_MdMethod *EAL_MdFindMethod(CRYPT_MD_AlgId id, EAL_MdMethod *method); /** * @ingroup eal * @brief Find Md algorithm implementation method by algorithm ID with provider context * * This function retrieves the default implementation method for specified MD algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MD algorithm identifier (e.g. CRYPT_MD_SHA256, CRYPT_MD_SHA384) * @param libCtx [IN] The library context. * @param attrName [IN] The attribute name. * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * @param provCtx [OUT] The provider context. * * @return Pointer to MD method structure on success. NULL on failure (invalid ID or alloc fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is valid, returns the same pointer with initialized contents. */ EAL_MdMethod *EAL_MdFindMethodEx(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method, void **provCtx); /** * @ingroup eal * @brief Calculate the hash value * * @param id [IN] Algorithm ID * @param libCtx [IN] Library context * @param attr [IN] Attribute * @param in [IN] Input data * @param inLen [IN] Input data length * @param out [OUT] Output data * @param outLen [OUT] Output data length * * @return #CRYPT_SUCCESS Success. * @return #CRYPT_EAL_ERR_ALGID Algorithm ID is invalid. */ int32_t EAL_Md(CRYPT_MD_AlgId id, void *libCtx, const char *attr, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_MD #endif // EAL_MD_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_md_local.h
C
unknown
4,333
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD) #include "securec.h" #include "crypt_local_types.h" #include "crypt_algid.h" #ifdef HITLS_CRYPTO_SHA2 #include "crypt_sha2.h" #endif #ifdef HITLS_CRYPTO_SHA1 #include "crypt_sha1.h" #endif #ifdef HITLS_CRYPTO_SM3 #include "crypt_sm3.h" #endif #ifdef HITLS_CRYPTO_SHA3 #include "crypt_sha3.h" #endif #ifdef HITLS_CRYPTO_MD5 #include "crypt_md5.h" #endif #include "bsl_err_internal.h" #include "eal_common.h" #include "bsl_sal.h" #include "crypt_errno.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_provider.h" #include "crypt_eal_implprovider.h" #endif typedef struct { uint32_t id; EAL_MdMethod *mdMeth; } EAL_CidToMdMeth; #define CRYPT_MD_IMPL_METHOD_DECLARE(name, id) \ EAL_MdMethod g_mdMethod_##name = { \ id, \ CRYPT_##name##_BLOCKSIZE, CRYPT_##name##_DIGESTSIZE, \ (MdNewCtx)CRYPT_##name##_NewCtxEx, (MdInit)CRYPT_##name##_Init, \ (MdUpdate)CRYPT_##name##_Update, (MdFinal)CRYPT_##name##_Final, \ (MdDeinit)CRYPT_##name##_Deinit, (MdCopyCtx)CRYPT_##name##_CopyCtx, \ (MdDupCtx)CRYPT_##name##_DupCtx, (MdFreeCtx)CRYPT_##name##_FreeCtx, \ (MdGetParam)CRYPT_##name##_GetParam, (MdSqueeze)CRYPT_##name##_Squeeze \ } #ifdef HITLS_CRYPTO_MD5 CRYPT_MD_IMPL_METHOD_DECLARE(MD5, CRYPT_MD_MD5); #endif #ifdef HITLS_CRYPTO_SHA1 CRYPT_MD_IMPL_METHOD_DECLARE(SHA1, CRYPT_MD_SHA1); #endif #ifdef HITLS_CRYPTO_SHA224 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_224, CRYPT_MD_SHA224); #endif #ifdef HITLS_CRYPTO_SHA256 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_256, CRYPT_MD_SHA256); #endif #ifdef HITLS_CRYPTO_SHA384 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_384, CRYPT_MD_SHA384); #endif #ifdef HITLS_CRYPTO_SHA512 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_512, CRYPT_MD_SHA512); #endif #ifdef HITLS_CRYPTO_SHA3 CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_224, CRYPT_MD_SHA3_224); CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_256, CRYPT_MD_SHA3_256); CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_384, CRYPT_MD_SHA3_384); CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_512, CRYPT_MD_SHA3_512); CRYPT_MD_IMPL_METHOD_DECLARE(SHAKE128, CRYPT_MD_SHAKE128); CRYPT_MD_IMPL_METHOD_DECLARE(SHAKE256, CRYPT_MD_SHAKE256); #endif #ifdef HITLS_CRYPTO_SM3 CRYPT_MD_IMPL_METHOD_DECLARE(SM3, CRYPT_MD_SM3); #endif static const EAL_CidToMdMeth ID_TO_MD_METH_TABLE[] = { #ifdef HITLS_CRYPTO_MD5 {CRYPT_MD_MD5, &g_mdMethod_MD5}, #endif #ifdef HITLS_CRYPTO_SHA1 {CRYPT_MD_SHA1, &g_mdMethod_SHA1}, #endif #ifdef HITLS_CRYPTO_SHA224 {CRYPT_MD_SHA224, &g_mdMethod_SHA2_224}, #endif #ifdef HITLS_CRYPTO_SHA256 {CRYPT_MD_SHA256, &g_mdMethod_SHA2_256}, #endif #ifdef HITLS_CRYPTO_SHA384 {CRYPT_MD_SHA384, &g_mdMethod_SHA2_384}, #endif #ifdef HITLS_CRYPTO_SHA512 {CRYPT_MD_SHA512, &g_mdMethod_SHA2_512}, #endif #ifdef HITLS_CRYPTO_SHA3 {CRYPT_MD_SHA3_224, &g_mdMethod_SHA3_224}, {CRYPT_MD_SHA3_256, &g_mdMethod_SHA3_256}, {CRYPT_MD_SHA3_384, &g_mdMethod_SHA3_384}, {CRYPT_MD_SHA3_512, &g_mdMethod_SHA3_512}, {CRYPT_MD_SHAKE128, &g_mdMethod_SHAKE128}, {CRYPT_MD_SHAKE256, &g_mdMethod_SHAKE256}, #endif #ifdef HITLS_CRYPTO_SM3 {CRYPT_MD_SM3, &g_mdMethod_SM3}, #endif }; const EAL_MdMethod *EAL_MdFindDefaultMethod(CRYPT_MD_AlgId id) { uint32_t num = sizeof(ID_TO_MD_METH_TABLE) / sizeof(ID_TO_MD_METH_TABLE[0]); for (uint32_t i = 0; i < num; i++) { if (ID_TO_MD_METH_TABLE[i].id == id) { return ID_TO_MD_METH_TABLE[i].mdMeth; } } return NULL; } EAL_MdMethod *EAL_MdFindMethod(CRYPT_MD_AlgId id, EAL_MdMethod *method) { EAL_MdMethod *retMethod = method; const EAL_MdMethod *findMethod = EAL_MdFindDefaultMethod(id); if (findMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } if (retMethod == NULL) { retMethod = BSL_SAL_Malloc(sizeof(EAL_MdMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MdMethod), 0, sizeof(EAL_MdMethod)); } *retMethod = *findMethod; return retMethod; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t SetMdMethod(const CRYPT_EAL_Func *funcs, EAL_MdMethod *method) { int32_t index = 0; while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLMD_NEWCTX: method->newCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMD_INITCTX: method->init = funcs[index].func; break; case CRYPT_EAL_IMPLMD_UPDATE: method->update = funcs[index].func; break; case CRYPT_EAL_IMPLMD_FINAL: method->final = funcs[index].func; break; case CRYPT_EAL_IMPLMD_DEINITCTX: method->deinit = funcs[index].func; break; case CRYPT_EAL_IMPLMD_DUPCTX: method->dupCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMD_GETPARAM: method->getParam = funcs[index].func; break; case CRYPT_EAL_IMPLMD_FREECTX: method->freeCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMD_SQUEEZE: method->squeeze = funcs[index].func; break; case CRYPT_EAL_IMPLMD_COPYCTX: method->copyCtx = funcs[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } return CRYPT_SUCCESS; } static EAL_MdMethod *EAL_ProviderMdFindMethod(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method, void **provCtx) { EAL_MdMethod *retMethod = method; const CRYPT_EAL_Func *funcs = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_HASH, id, attrName, &funcs, provCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return NULL; } if (method == NULL) { retMethod = (EAL_MdMethod *)BSL_SAL_Malloc(sizeof(EAL_MdMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MdMethod), 0, sizeof(EAL_MdMethod)); } ret = SetMdMethod(funcs, retMethod); if (ret != CRYPT_SUCCESS) { goto ERR; } if (retMethod->getParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_IMPL_NULL); goto ERR; } BSL_Param params[] = {{0}, {0}, BSL_PARAM_END}; ret = BSL_PARAM_InitValue(&params[0], CRYPT_PARAM_MD_DIGEST_SIZE, BSL_PARAM_TYPE_UINT16, &retMethod->mdSize, sizeof(retMethod->mdSize)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BSL_PARAM_InitValue(&params[1], CRYPT_PARAM_MD_BLOCK_SIZE, BSL_PARAM_TYPE_UINT16, &retMethod->blockSize, sizeof(retMethod->blockSize)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = retMethod->getParam(NULL, &params[0]); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } retMethod->id = id; return retMethod; ERR: if (retMethod != method) { BSL_SAL_Free(retMethod); } return NULL; } #endif // HITLS_CRYPTO_PROVIDER EAL_MdMethod *EAL_MdFindMethodEx(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method, void **provCtx) { #ifdef HITLS_CRYPTO_PROVIDER return EAL_ProviderMdFindMethod(id, libCtx, attrName, method, provCtx); #else (void)libCtx; (void)attrName; (void)provCtx; return EAL_MdFindMethod(id, method); #endif } int32_t EAL_Md(CRYPT_MD_AlgId id, void *libCtx, const char *attr, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { int32_t ret; if (out == NULL || outLen == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (in == NULL && inLen != 0) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } EAL_MdMethod method = {0}; void *provCtx = NULL; if (EAL_MdFindMethodEx(id, libCtx, attr, &method, &provCtx) == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (method.newCtx == NULL || method.init == NULL || method.update == NULL || method.final == NULL || method.freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_MD_METH_NULL); return CRYPT_EAL_MD_METH_NULL; } void *data = method.newCtx(provCtx, id); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = method.init(data, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret); goto EXIT; } if (inLen != 0) { ret = method.update(data, in, inLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret); goto EXIT; } } ret = method.final(data, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret); goto EXIT; } if (method.mdSize != 0) { *outLen = method.mdSize; } EXIT: method.freeCtx(data); return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_md_method.c
C
unknown
10,583
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <securec.h> #include "bsl_sal.h" #include "crypt_errno.h" #include "bsl_err_internal.h" #include "eal_pkey_local.h" #include "crypt_eal_pkey.h" #include "eal_common.h" int32_t CRYPT_EAL_PkeyComputeShareKey(const CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyCtx *pubKey, uint8_t *share, uint32_t *shareLen) { if (pkey == NULL || pubKey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->id != pubKey->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (pkey->method == NULL || pkey->method->computeShareKey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->computeShareKey(pkey->key, pubKey->key, share, shareLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret); } return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_computesharekey.c
C
unknown
1,751
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdbool.h> #include <securec.h> #include "bsl_sal.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "eal_pkey_local.h" #include "crypt_algid.h" #include "bsl_err_internal.h" #include "eal_common.h" int32_t CRYPT_EAL_PkeyEncrypt(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->encrypt == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->encrypt(pkey->key, data, dataLen, out, outLen); } int32_t CRYPT_EAL_PkeyDecrypt(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->decrypt == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->decrypt(pkey->key, data, dataLen, out, outLen); } int32_t CRYPT_EAL_PkeyPairCheck(CRYPT_EAL_PkeyCtx *pubKey, CRYPT_EAL_PkeyCtx *prvKey) { if ((pubKey == NULL) || (prvKey == NULL)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pubKey->method == NULL || prvKey->method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pubKey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_NULL_INPUT; } if (pubKey->method->check == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pubKey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pubKey->method->check(CRYPT_PKEY_CHECK_KEYPAIR, pubKey->key, prvKey->key); } int32_t CRYPT_EAL_PkeyPrvCheck(CRYPT_EAL_PkeyCtx *prvKey) { if (prvKey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prvKey->method == NULL || prvKey->method->check == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, prvKey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_NULL_INPUT; } return prvKey->method->check(CRYPT_PKEY_CHECK_PRVKEY, prvKey->key, NULL); } int32_t CRYPT_EAL_PkeyHEAdd(const CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *input, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->headd == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->headd(pkey->key, input, out, outLen); } int32_t CRYPT_EAL_PkeyHEMul(const CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *input, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->hemul == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->hemul(pkey->key, input, out, outLen); } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_crypt.c
C
unknown
4,356
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdlib.h> #include <stdbool.h> #include "securec.h" #include "eal_pkey_local.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "crypt_algid.h" #include "crypt_local_types.h" #include "crypt_types.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "eal_md_local.h" #include "eal_common.h" #include "crypt_eal_implprovider.h" #include "crypt_ealinit.h" #include "bsl_err_internal.h" #include "crypt_provider.h" #include "bsl_params.h" #include "crypt_params_key.h" #include "eal_pkey.h" static void EalPkeyCopyMethod(const EAL_PkeyMethod *method, EAL_PkeyUnitaryMethod *dest) { dest->newCtx = method->newCtx; dest->dupCtx = method->dupCtx; dest->freeCtx = method->freeCtx; dest->setPara = method->setPara; dest->getPara = method->getPara; dest->gen = method->gen; dest->ctrl = method->ctrl; dest->setPub = method->setPub; dest->setPrv = method->setPrv; dest->getPub = method->getPub; dest->getPrv = method->getPrv; dest->sign = method->sign; dest->signData = method->signData; dest->verify = method->verify; dest->verifyData = method->verifyData; dest->recover = method->recover; dest->computeShareKey = method->computeShareKey; dest->encrypt = method->encrypt; dest->decrypt = method->decrypt; dest->headd = method->headd; dest->hemul = method->hemul; dest->check = method->check; dest->cmp = method->cmp; dest->encaps = method->encaps; dest->decaps = method->decaps; dest->blind = method->blind; dest->unBlind = method->unBlind; } CRYPT_EAL_PkeyCtx *PkeyNewDefaultCtx(CRYPT_PKEY_AlgId id) { /* Obtain the method based on the algorithm ID. */ const EAL_PkeyMethod *method = CRYPT_EAL_PkeyFindMethod(id); if (method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_EAL_ERR_ALGID); return NULL; } EAL_PkeyUnitaryMethod *temp = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod)); if (temp == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } EalPkeyCopyMethod(method, temp); /* Resource application and initialization */ CRYPT_EAL_PkeyCtx *pkey = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx)); if (pkey == NULL) { BSL_SAL_FREE(temp); EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } pkey->key = method->newCtx(); if (pkey->key == NULL) { BSL_SAL_FREE(temp); EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL); goto ERR; } pkey->method = temp; pkey->id = id; BSL_SAL_ReferencesInit(&(pkey->references)); return pkey; ERR: CRYPT_EAL_PkeyFreeCtx(pkey); return NULL; } CRYPT_EAL_PkeyCtx *CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_AlgId id) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Pkey(id) != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return PkeyNewDefaultCtx(id); } static int32_t PkeyCopyCtx(CRYPT_EAL_PkeyCtx *to, const CRYPT_EAL_PkeyCtx *from) { if (from->method == NULL || from->method->dupCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } EAL_PkeyUnitaryMethod *temp = to->method; (void)memcpy_s(to, sizeof(CRYPT_EAL_PkeyCtx), from, sizeof(CRYPT_EAL_PkeyCtx)); to->key = from->method->dupCtx(from->key); if (to->key == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_EAL_PKEY_DUP_ERROR); return CRYPT_EAL_PKEY_DUP_ERROR; } if (temp == NULL) { temp = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod)); if (temp == NULL) { from->method->freeCtx(to->key); to->key = NULL; EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } } to->method = temp; *(EAL_PkeyUnitaryMethod *)(uintptr_t)to->method = *from->method; BSL_SAL_ReferencesInit(&(to->references)); return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyCopyCtx(CRYPT_EAL_PkeyCtx *to, const CRYPT_EAL_PkeyCtx *from) { if (to == NULL || from == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (to->key != NULL) { if (to->method->freeCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } to->method->freeCtx(to->key); to->key = NULL; } BSL_SAL_ReferencesFree(&(to->references)); return PkeyCopyCtx(to, from); } CRYPT_EAL_PkeyCtx *CRYPT_EAL_PkeyDupCtx(const CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return NULL; } CRYPT_EAL_PkeyCtx *newPkey = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx)); if (newPkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_MEM_ALLOC_FAIL); return NULL; } if (PkeyCopyCtx(newPkey, pkey) != CRYPT_SUCCESS) { BSL_SAL_FREE(newPkey); return NULL; } return newPkey; } void CRYPT_EAL_PkeyFreeCtx(CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { return; } if (pkey->method == NULL || pkey->method->freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); BSL_SAL_ReferencesFree(&(pkey->references)); BSL_SAL_FREE(pkey->method); BSL_SAL_FREE(pkey); return; } int ref = 0; BSL_SAL_AtomicDownReferences(&(pkey->references), &ref); if (ref > 0) { return; } BSL_SAL_ReferencesFree(&(pkey->references)); pkey->method->freeCtx(pkey->key); BSL_SAL_FREE(pkey->method); BSL_SAL_FREE(pkey); return; } static int32_t ParaIsVaild(const CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para) { bool isInputValid = (pkey == NULL) || (para == NULL); if (isInputValid) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->id != para->id) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } static int32_t SetDsaParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_DsaPara *dsaPara) { BSL_Param param[4] = { {CRYPT_PARAM_DSA_P, BSL_PARAM_TYPE_OCTETS, dsaPara->p, dsaPara->pLen, 0}, {CRYPT_PARAM_DSA_Q, BSL_PARAM_TYPE_OCTETS, dsaPara->q, dsaPara->qLen, 0}, {CRYPT_PARAM_DSA_G, BSL_PARAM_TYPE_OCTETS, dsaPara->g, dsaPara->gLen, 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetRsaParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_RsaPara *rsaPara) { uint32_t bits = rsaPara->bits; BSL_Param param[] = { {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, rsaPara->e, rsaPara->eLen, 0}, {CRYPT_PARAM_RSA_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetDhParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_DhPara *dhPara) { BSL_Param param[4] = { {CRYPT_PARAM_DH_P, BSL_PARAM_TYPE_OCTETS, dhPara->p, dhPara->pLen, 0}, {CRYPT_PARAM_DH_Q, BSL_PARAM_TYPE_OCTETS, dhPara->q, dhPara->qLen, 0}, {CRYPT_PARAM_DH_G, BSL_PARAM_TYPE_OCTETS, dhPara->g, dhPara->gLen, 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetEccParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EccPara *eccPara) { BSL_Param param[8] = { {CRYPT_PARAM_EC_P, BSL_PARAM_TYPE_OCTETS, eccPara->p, eccPara->pLen, 0}, {CRYPT_PARAM_EC_A, BSL_PARAM_TYPE_OCTETS, eccPara->a, eccPara->aLen, 0}, {CRYPT_PARAM_EC_B, BSL_PARAM_TYPE_OCTETS, eccPara->b, eccPara->bLen, 0}, {CRYPT_PARAM_EC_N, BSL_PARAM_TYPE_OCTETS, eccPara->n, eccPara->nLen, 0}, {CRYPT_PARAM_EC_H, BSL_PARAM_TYPE_OCTETS, eccPara->h, eccPara->hLen, 0}, {CRYPT_PARAM_EC_X, BSL_PARAM_TYPE_OCTETS, eccPara->x, eccPara->xLen, 0}, {CRYPT_PARAM_EC_Y, BSL_PARAM_TYPE_OCTETS, eccPara->y, eccPara->yLen, 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetPaillierParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_PaillierPara *paillierPara) { uint32_t bits = paillierPara->bits; BSL_Param param[4] = { {CRYPT_PARAM_PAILLIER_P, BSL_PARAM_TYPE_OCTETS, paillierPara->p, paillierPara->pLen, 0}, {CRYPT_PARAM_PAILLIER_Q, BSL_PARAM_TYPE_OCTETS, paillierPara->q, paillierPara->qLen, 0}, {CRYPT_PARAM_PAILLIER_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetElGamalParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_ElGamalPara *elgamalPara) { uint32_t bits = elgamalPara->bits; uint32_t k_bits = elgamalPara->k_bits; BSL_Param param[4] = { {CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, elgamalPara->q, elgamalPara->qLen, 0}, {CRYPT_PARAM_ELGAMAL_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0}, {CRYPT_PARAM_ELGAMAL_KBITS, BSL_PARAM_TYPE_UINT32, &k_bits, sizeof(k_bits), 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t GetDsaParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_DsaPara *dsaPara) { BSL_Param param[4] = { {CRYPT_PARAM_DSA_P, BSL_PARAM_TYPE_OCTETS, dsaPara->p, dsaPara->pLen, 0}, {CRYPT_PARAM_DSA_Q, BSL_PARAM_TYPE_OCTETS, dsaPara->q, dsaPara->qLen, 0}, {CRYPT_PARAM_DSA_G, BSL_PARAM_TYPE_OCTETS, dsaPara->g, dsaPara->gLen, 0}, BSL_PARAM_END }; int32_t ret = pkey->method->getPara(pkey->key, param); if (ret == CRYPT_SUCCESS) { dsaPara->pLen = param[0].useLen; dsaPara->qLen = param[1].useLen; dsaPara->gLen = param[2].useLen; } return ret; } static int32_t GetDhParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_DhPara *dhPara) { BSL_Param param[4] = { {CRYPT_PARAM_DH_P, BSL_PARAM_TYPE_OCTETS, dhPara->p, dhPara->pLen, 0}, {CRYPT_PARAM_DH_Q, BSL_PARAM_TYPE_OCTETS, dhPara->q, dhPara->qLen, 0}, {CRYPT_PARAM_DH_G, BSL_PARAM_TYPE_OCTETS, dhPara->g, dhPara->gLen, 0}, BSL_PARAM_END }; int32_t ret = pkey->method->getPara(pkey->key, param); if (ret == CRYPT_SUCCESS) { dhPara->pLen = param[0].useLen; dhPara->qLen = param[1].useLen; dhPara->gLen = param[2].useLen; } return ret; } static int32_t GetEccParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EccPara *eccPara) { BSL_Param param[8] = { {CRYPT_PARAM_EC_P, BSL_PARAM_TYPE_OCTETS, eccPara->p, eccPara->pLen, 0}, {CRYPT_PARAM_EC_A, BSL_PARAM_TYPE_OCTETS, eccPara->a, eccPara->aLen, 0}, {CRYPT_PARAM_EC_B, BSL_PARAM_TYPE_OCTETS, eccPara->b, eccPara->bLen, 0}, {CRYPT_PARAM_EC_N, BSL_PARAM_TYPE_OCTETS, eccPara->n, eccPara->nLen, 0}, {CRYPT_PARAM_EC_H, BSL_PARAM_TYPE_OCTETS, eccPara->h, eccPara->hLen, 0}, {CRYPT_PARAM_EC_X, BSL_PARAM_TYPE_OCTETS, eccPara->x, eccPara->xLen, 0}, {CRYPT_PARAM_EC_Y, BSL_PARAM_TYPE_OCTETS, eccPara->y, eccPara->yLen, 0}, BSL_PARAM_END }; int32_t ret = pkey->method->getPara(pkey->key, param); if (ret == CRYPT_SUCCESS) { eccPara->pLen = param[0].useLen; eccPara->aLen = param[1].useLen; eccPara->bLen = param[2].useLen; eccPara->nLen = param[3].useLen; eccPara->hLen = param[4].useLen; eccPara->xLen = param[5].useLen; eccPara->yLen = param[6].useLen; } return ret; } static int32_t CvtBslParamAndSetParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para) { int32_t ret = CRYPT_NOT_SUPPORT; switch (pkey->id) { case CRYPT_PKEY_DSA: ret = SetDsaParams(pkey, &para->para.dsaPara); break; case CRYPT_PKEY_RSA: ret = SetRsaParams(pkey, &para->para.rsaPara); break; case CRYPT_PKEY_DH: ret = SetDhParams(pkey, &para->para.dhPara); break; case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_ECDH: ret = SetEccParams(pkey, &para->para.eccPara); break; case CRYPT_PKEY_PAILLIER: ret = SetPaillierParams(pkey, &para->para.paillierPara); break; case CRYPT_PKEY_ELGAMAL: ret = SetElGamalParams(pkey, &para->para.elgamalPara); break; case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: case CRYPT_PKEY_SM2: default: return CRYPT_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t CvtBslParamAndGetParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPara *para) { int32_t ret = CRYPT_NOT_SUPPORT; switch (pkey->id) { case CRYPT_PKEY_DSA: ret = GetDsaParams(pkey, &para->para.dsaPara); break; case CRYPT_PKEY_DH: ret = GetDhParams(pkey, &para->para.dhPara); break; case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_ECDH: ret = GetEccParams(pkey, &para->para.eccPara); break; case CRYPT_PKEY_PAILLIER: case CRYPT_PKEY_ELGAMAL: case CRYPT_PKEY_RSA: case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: case CRYPT_PKEY_SM2: default: return CRYPT_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPara(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para) { int32_t ret; ret = ParaIsVaild(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret); return ret; } if (pkey->method == NULL || pkey->method->setPara == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = CvtBslParamAndSetParams(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetParaEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->setPara == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->setPara(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyGetPara(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPara *para) { int32_t ret; ret = ParaIsVaild(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret); return ret; } if (pkey->method == NULL || pkey->method->getPara == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = CvtBslParamAndGetParams(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyCtrl(CRYPT_EAL_PkeyCtx *pkey, int32_t opt, void *val, uint32_t len) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->ctrl(pkey->key, opt, val, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetParaById(CRYPT_EAL_PkeyCtx *pkey, CRYPT_PKEY_ParaId id) { return CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_SET_PARA_BY_ID, &id, sizeof(id)); } int32_t CRYPT_EAL_PkeyGen(CRYPT_EAL_PkeyCtx *pkey) { int32_t ret; if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->gen == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } /* Invoke the algorithm entity to generate a key pair. */ ret = pkey->method->gen(pkey->key); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); return ret; } return CRYPT_SUCCESS; } static int32_t PriAndPubParamIsValid(const CRYPT_EAL_PkeyCtx *pkey, const void *key, bool isPriKey) { bool isInputValid = (pkey == NULL) || (key == NULL); if (isInputValid) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // false indicates the public key path, and true indicates the private key path if (isPriKey == false) { CRYPT_EAL_PkeyPub *keyParam = (CRYPT_EAL_PkeyPub *)(uintptr_t)key; if (keyParam->id != pkey->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } } else { CRYPT_EAL_PkeyPrv *keyParam = (CRYPT_EAL_PkeyPrv *)(uintptr_t)key; if (keyParam->id != pkey->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeySetPub(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPub *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, false); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->setPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch (key->id) { case CRYPT_PKEY_RSA: { BSL_Param rsa[3] = {{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, key->key.rsaPub.e, key->key.rsaPub.eLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, key->key.rsaPub.n, key->key.rsaPub.nLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &rsa); break; } case CRYPT_PKEY_DSA: { BSL_Param dsa[2] = {{CRYPT_PARAM_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.dsaPub.data, key->key.dsaPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &dsa); break; } case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: { BSL_Param para[2] = {{CRYPT_PARAM_CURVE25519_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.curve25519Pub.data, key->key.curve25519Pub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &para); break; } case CRYPT_PKEY_DH: { BSL_Param dhParam[2] = {{CRYPT_PARAM_DH_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.dhPub.data, key->key.dhPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &dhParam); break; } case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: { BSL_Param ecParam[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.eccPub.data, key->key.eccPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &ecParam); break; } case CRYPT_PKEY_PAILLIER: { BSL_Param paParam[4] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.n, key->key.paillierPub.nLen, 0}, {CRYPT_PARAM_PAILLIER_G, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.g, key->key.paillierPub.gLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.n2, key->key.paillierPub.n2Len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemEk.data, key->key.kemEk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_DSA: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.mldsaPub.data, key->key.mldsaPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_ELGAMAL: { BSL_Param paParam[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.p, key->key.elgamalPub.pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.g, key->key.elgamalPub.gLen, 0}, {CRYPT_PARAM_ELGAMAL_Y, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.y, key->key.elgamalPub.pLen, 0}, {CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.q, key->key.elgamalPub.qLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_SLH_DSA: { BSL_Param slhDsaPub[3] = {{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPub.seed, key->key.slhDsaPub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPub.root, key->key.slhDsaPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &slhDsaPub); break; } case CRYPT_PKEY_XMSS: { BSL_Param xmssPub[3] = { {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPub.seed, key->key.xmssPub.len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.xmssPub.root, key->key.xmssPub.len, 0}, BSL_PARAM_END, }; ret = pkey->method->setPub(pkey->key, &xmssPub); break; } case CRYPT_PKEY_HYBRID_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_HYBRID_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemEk.data, key->key.kemEk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPrv(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPrv *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, true); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->setPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch(key->id) { case CRYPT_PKEY_RSA: { BSL_Param rsaParam[] = {{CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.d, key->key.rsaPrv.dLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.n, key->key.rsaPrv.nLen, 0}, {CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.p, key->key.rsaPrv.pLen, 0}, {CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.q, key->key.rsaPrv.qLen, 0}, {CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.dP, key->key.rsaPrv.dPLen, 0}, {CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.dQ, key->key.rsaPrv.dQLen, 0}, {CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.qInv, key->key.rsaPrv.qInvLen, 0}, {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.e, key->key.rsaPrv.eLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &rsaParam); break; } case CRYPT_PKEY_DSA: { BSL_Param dsaParam[2] = {{CRYPT_PARAM_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.dsaPrv.data, key->key.dsaPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &dsaParam); break; } case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: { BSL_Param para[2] = {{CRYPT_PARAM_CURVE25519_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.curve25519Prv.data, key->key.curve25519Prv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &para); break; } case CRYPT_PKEY_DH: { BSL_Param dhParam[2] = {{CRYPT_PARAM_DH_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.dhPrv.data, key->key.dhPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &dhParam); break; } case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: { BSL_Param ecParam[2] = {{CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.eccPrv.data, key->key.eccPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &ecParam); break; } case CRYPT_PKEY_PAILLIER: { BSL_Param paParam[5] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.n, key->key.paillierPrv.nLen, 0}, {CRYPT_PARAM_PAILLIER_LAMBDA, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.lambda, key->key.paillierPrv.lambdaLen, 0}, {CRYPT_PARAM_PAILLIER_MU, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.mu, key->key.paillierPrv.muLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.n2, key->key.paillierPrv.n2Len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_SLH_DSA: { BSL_Param slhDsaParam[5] = {{CRYPT_PARAM_SLH_DSA_PRV_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.seed, key->key.slhDsaPrv.pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PRV_PRF, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.prf, key->key.slhDsaPrv.pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.pub.seed, key->key.slhDsaPrv.pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.pub.root, key->key.slhDsaPrv.pub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &slhDsaParam); break; } case CRYPT_PKEY_XMSS: { uint64_t index = key->key.xmssPrv.index; BSL_Param xmssParam[6] = { {CRYPT_PARAM_XMSS_PRV_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.seed, key->key.xmssPrv.pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_PRF, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.prf, key->key.xmssPrv.pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_INDEX, BSL_PARAM_TYPE_UINT64, &index, sizeof(index), 0}, {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.pub.seed, key->key.xmssPrv.pub.len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.pub.root, key->key.xmssPrv.pub.len, 0}, BSL_PARAM_END, }; ret = pkey->method->setPrv(pkey->key, &xmssParam); break; } case CRYPT_PKEY_ELGAMAL: { BSL_Param paParam[4] = { {CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.p, key->key.elgamalPrv.pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.g, key->key.elgamalPrv.gLen, 0}, {CRYPT_PARAM_ELGAMAL_X, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.x, key->key.elgamalPrv.xLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemDk.data, key->key.kemDk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_DSA: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.mldsaPrv.data, key->key.mldsaPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_HYBRID_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_HYBRID_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemDk.data, key->key.kemDk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t GetRSAPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_RsaPub *pub) { BSL_Param param[3] = {{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, pub->e, pub->eLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, pub->n, pub->nLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->eLen = param[0].useLen; pub->nLen = param[1].useLen; return CRYPT_SUCCESS; } static int32_t GetCommonPub(const CRYPT_EAL_PkeyCtx *pkey, int32_t paramKey, CRYPT_Data *pub) { BSL_Param param[2] = {{paramKey, BSL_PARAM_TYPE_OCTETS, pub->data, pub->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetPaillierPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_PaillierPub *pub) { BSL_Param param[4] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, pub->n, pub->nLen, 0}, {CRYPT_PARAM_PAILLIER_G, BSL_PARAM_TYPE_OCTETS, pub->g, pub->gLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, pub->n2, pub->n2Len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->nLen = param[0].useLen; pub->gLen = param[1].useLen; pub->n2Len = param[2].useLen; return CRYPT_SUCCESS; } static int32_t GetElGamalPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_ElGamalPub *pub) { BSL_Param param[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, pub->p, pub->pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, pub->g, pub->gLen, 0}, {CRYPT_PARAM_ELGAMAL_Y, BSL_PARAM_TYPE_OCTETS, pub->y, pub->yLen, 0}, {CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, pub->q, pub->qLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->pLen = param[0].useLen; pub->gLen = param[1].useLen; pub->yLen = param[2].useLen; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyGetPubEx(const CRYPT_EAL_PkeyCtx *pkey, BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->getPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->getPub(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPubEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->setPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->setPub(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyGetPrvEx(const CRYPT_EAL_PkeyCtx *pkey, BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->getPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->getPrv(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPrvEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->setPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->setPrv(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t GetMlkemPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemEncapsKey *kemEk) { BSL_Param param[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, kemEk->data, kemEk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemEk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetMldsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MlDsaPub *dsaPub) { BSL_Param param[2] = {{CRYPT_PARAM_ML_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, dsaPub->data, dsaPub->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } dsaPub->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetHybridkemPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemEncapsKey *kemEk) { BSL_Param param[2] = {{CRYPT_PARAM_HYBRID_PUBKEY, BSL_PARAM_TYPE_OCTETS, kemEk->data, kemEk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemEk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetSlhDsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_SlhDsaPub *pub) { BSL_Param param[3] = {{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, pub->seed, pub->len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, pub->root, pub->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetXmssPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_XmssPub *pub) { BSL_Param param[3] = { {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, pub->seed, pub->len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, pub->root, pub->len, 0}, BSL_PARAM_END, }; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->len = param[0].useLen; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyGetPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, false); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->getPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch (key->id) { case CRYPT_PKEY_RSA: ret = GetRSAPub(pkey, &key->key.rsaPub); break; case CRYPT_PKEY_DSA: ret = GetCommonPub(pkey, CRYPT_PARAM_DSA_PUBKEY, &key->key.dsaPub); break; case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: ret = GetCommonPub(pkey, CRYPT_PARAM_CURVE25519_PUBKEY, &key->key.curve25519Pub); break; case CRYPT_PKEY_DH: ret = GetCommonPub(pkey, CRYPT_PARAM_DH_PUBKEY, &key->key.dhPub); break; case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: ret = GetCommonPub(pkey, CRYPT_PARAM_EC_PUBKEY, &key->key.eccPub); break; case CRYPT_PKEY_PAILLIER: ret = GetPaillierPub(pkey, &key->key.paillierPub); break; case CRYPT_PKEY_ELGAMAL: ret = GetElGamalPub(pkey, &key->key.elgamalPub); break; case CRYPT_PKEY_ML_KEM: ret = GetMlkemPub(pkey, &key->key.kemEk); break; case CRYPT_PKEY_ML_DSA: ret = GetMldsaPub(pkey, &key->key.mldsaPub); break; case CRYPT_PKEY_HYBRID_KEM: ret = GetHybridkemPub(pkey, &key->key.kemEk); break; case CRYPT_PKEY_SLH_DSA: ret = GetSlhDsaPub(pkey, &key->key.slhDsaPub); break; case CRYPT_PKEY_XMSS: ret = GetXmssPub(pkey, &key->key.xmssPub); break; default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t GetRSAPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_RsaPrv *prv) { BSL_Param param[] = {{CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, prv->d, prv->dLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, prv->n, prv->nLen, 0}, {CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, prv->p, prv->pLen, 0}, {CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, prv->q, prv->qLen, 0}, {CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, prv->dP, prv->dPLen, 0}, {CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, prv->dQ, prv->dQLen, 0}, {CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, prv->qInv, prv->qInvLen, 0}, {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, prv->e, prv->eLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->dLen = param[0].useLen; prv->nLen = param[1].useLen; prv->pLen = param[2].useLen; prv->qLen = param[3].useLen; prv->dPLen = param[4].useLen; prv->dQLen = param[5].useLen; prv->qInvLen = param[6].useLen; prv->eLen = param[7].useLen; return CRYPT_SUCCESS; } static int32_t GetCommonPrv(const CRYPT_EAL_PkeyCtx *pkey, int32_t paramKey, CRYPT_Data *prv) { BSL_Param param[2] = {{paramKey, BSL_PARAM_TYPE_OCTETS, prv->data, prv->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetPaillierPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_PaillierPrv *prv) { BSL_Param param[5] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, prv->n, prv->nLen, 0}, {CRYPT_PARAM_PAILLIER_LAMBDA, BSL_PARAM_TYPE_OCTETS, prv->lambda, prv->lambdaLen, 0}, {CRYPT_PARAM_PAILLIER_MU, BSL_PARAM_TYPE_OCTETS, prv->mu, prv->muLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, prv->n2, prv->n2Len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->nLen = param[0].useLen; prv->lambdaLen = param[1].useLen; prv->muLen = param[2].useLen; prv->n2Len = param[3].useLen; return CRYPT_SUCCESS; } static int32_t GetElGamalPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_ElGamalPrv *prv) { BSL_Param param[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, prv->p, prv->pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, prv->g, prv->gLen, 0}, {CRYPT_PARAM_ELGAMAL_X, BSL_PARAM_TYPE_OCTETS, prv->x, prv->xLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->pLen = param[0].useLen; prv->gLen = param[1].useLen; prv->xLen = param[2].useLen; return CRYPT_SUCCESS; } static int32_t GetMlkemPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemDecapsKey *kemDk) { BSL_Param param[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, kemDk->data, kemDk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemDk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetMldsaPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MlDsaPrv *dsaPrv) { BSL_Param param[2] = {{CRYPT_PARAM_ML_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, dsaPrv->data, dsaPrv->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } dsaPrv->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetHybridkemPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemDecapsKey *kemDk) { BSL_Param param[2] = {{CRYPT_PARAM_HYBRID_PRVKEY, BSL_PARAM_TYPE_OCTETS, kemDk->data, kemDk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemDk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetSlhDsaPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_SlhDsaPrv *prv) { BSL_Param param[5] = {{CRYPT_PARAM_SLH_DSA_PRV_SEED, BSL_PARAM_TYPE_OCTETS, prv->seed, prv->pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PRV_PRF, BSL_PARAM_TYPE_OCTETS, prv->prf, prv->pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, prv->pub.seed, prv->pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, prv->pub.root, prv->pub.len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->pub.len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetXmssPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_XmssPrv *prv) { BSL_Param param[6] = { {CRYPT_PARAM_XMSS_PRV_SEED, BSL_PARAM_TYPE_OCTETS, prv->seed, prv->pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_PRF, BSL_PARAM_TYPE_OCTETS, prv->prf, prv->pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_INDEX, BSL_PARAM_TYPE_UINT64, &prv->index, sizeof(prv->index), 0}, {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, prv->pub.seed, prv->pub.len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, prv->pub.root, prv->pub.len, 0}, BSL_PARAM_END, }; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->pub.len = param[0].useLen; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyGetPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPrv *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, true); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->getPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch(key->id) { case CRYPT_PKEY_RSA: ret = GetRSAPrv(pkey, &key->key.rsaPrv); break; case CRYPT_PKEY_DSA: ret = GetCommonPrv(pkey, CRYPT_PARAM_DSA_PRVKEY, &key->key.dsaPrv); break; case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: ret = GetCommonPrv(pkey, CRYPT_PARAM_CURVE25519_PRVKEY, &key->key.curve25519Prv); break; case CRYPT_PKEY_DH: ret = GetCommonPrv(pkey, CRYPT_PARAM_DH_PRVKEY, &key->key.dhPrv); break; case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: ret = GetCommonPrv(pkey, CRYPT_PARAM_EC_PRVKEY, &key->key.eccPrv); break; case CRYPT_PKEY_PAILLIER: ret = GetPaillierPrv(pkey, &key->key.paillierPrv); break; case CRYPT_PKEY_ELGAMAL: ret = GetElGamalPrv(pkey, &key->key.elgamalPrv); break; case CRYPT_PKEY_ML_KEM: ret = GetMlkemPrv(pkey, &key->key.kemDk); break; case CRYPT_PKEY_ML_DSA: ret = GetMldsaPrv(pkey, &key->key.mldsaPrv); break; case CRYPT_PKEY_SLH_DSA: ret = GetSlhDsaPrv(pkey, &key->key.slhDsaPrv); break; case CRYPT_PKEY_XMSS: ret = GetXmssPrv(pkey, &key->key.xmssPrv); break; case CRYPT_PKEY_HYBRID_KEM: ret = GetHybridkemPrv(pkey, &key->key.kemDk); break; default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } uint32_t CRYPT_EAL_PkeyGetSignLen(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_SIGNLEN, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : 0; } uint32_t CRYPT_EAL_PkeyGetKeyLen(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_BITS, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? ((result + 7) >> 3) : 0; // bytes = (bits + 7) >> 3 } uint32_t CRYPT_EAL_PkeyGetKeyBits(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_BITS, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : 0; } uint32_t CRYPT_EAL_PkeyGetSecurityBits(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_SECBITS, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : 0; } CRYPT_PKEY_AlgId CRYPT_EAL_PkeyGetId(const CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { return CRYPT_PKEY_MAX; } return pkey->id; } CRYPT_PKEY_ParaId CRYPT_EAL_PkeyGetParaId(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_PARAID, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : CRYPT_PKEY_PARAID_MAX; } int32_t CRYPT_EAL_PkeyCmp(const CRYPT_EAL_PkeyCtx *a, const CRYPT_EAL_PkeyCtx *b) { if (a == NULL || b == NULL) { if (a == b) { return CRYPT_SUCCESS; } EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (a->id != b->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_PKEY_CMP_DIFF_KEY_TYPE); return CRYPT_EAL_PKEY_CMP_DIFF_KEY_TYPE; } if (a->method == NULL || b->method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (a->method->cmp == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, a->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return a->method->cmp(a->key, b->key); } // Set the user's personal data. The life cycle is processed by the user. The value of data can be NULL, // which is used to release the personal data and is set NULL. int32_t CRYPT_EAL_PkeySetExtData(CRYPT_EAL_PkeyCtx *pkey, void *data) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } pkey->extData = data; return CRYPT_SUCCESS; } // Obtain user's personal data. void *CRYPT_EAL_PkeyGetExtData(const CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { return NULL; } return pkey->extData; } bool CRYPT_EAL_PkeyIsValidAlgId(CRYPT_PKEY_AlgId id) { return CRYPT_EAL_PkeyFindMethod(id) != NULL; } int32_t CRYPT_EAL_PkeyUpRef(CRYPT_EAL_PkeyCtx *pkey) { int i = 0; if (pkey == NULL) { return CRYPT_NULL_INPUT; } return BSL_SAL_AtomicUpReferences(&(pkey->references), &i); } #ifdef HITLS_CRYPTO_PROVIDER static int32_t CRYPT_EAL_SetKeyMethod(const CRYPT_EAL_Func *funcsKeyMgmt, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcsKeyMgmt != NULL) { while (funcsKeyMgmt[index].id != 0) { switch (funcsKeyMgmt[index].id) { case CRYPT_EAL_IMPLPKEYMGMT_NEWCTX: method->provNewCtx = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_SETPARAM: method->setPara = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GETPARAM: method->getPara = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GENKEY: method->gen = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_SETPRV: method->setPrv = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_SETPUB: method->setPub = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GETPRV: method->getPrv = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GETPUB: method->getPub = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_DUPCTX: method->dupCtx = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_CHECK: method->check = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_COMPARE: method->cmp = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_CTRL: method->ctrl = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_FREECTX: method->freeCtx = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_IMPORT: method->import = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_EXPORT: method->export = funcsKeyMgmt[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetCipherMethod(const CRYPT_EAL_Func *funcsAsyCipher, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcsAsyCipher != NULL) { while (funcsAsyCipher[index].id != 0) { switch (funcsAsyCipher[index].id) { case CRYPT_EAL_IMPLPKEYCIPHER_ENCRYPT: method->encrypt = funcsAsyCipher[index].func; break; case CRYPT_EAL_IMPLPKEYCIPHER_DECRYPT: method->decrypt = funcsAsyCipher[index].func; break; case CRYPT_EAL_IMPLPKEYCIPHER_HEADD: method->headd = funcsAsyCipher[index].func; break; case CRYPT_EAL_IMPLPKEYCIPHER_HEMUL: method->hemul = funcsAsyCipher[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetExchMethod(const CRYPT_EAL_Func *funcsExch, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcsExch != NULL) { while (funcsExch[index].id != 0) { switch (funcsExch[index].id) { case CRYPT_EAL_IMPLPKEYEXCH_EXCH: method->computeShareKey = funcsExch[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetSignMethod(const CRYPT_EAL_Func *funcSign, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcSign != NULL) { while (funcSign[index].id != 0) { switch (funcSign[index].id) { case CRYPT_EAL_IMPLPKEYSIGN_SIGN: method->sign = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_SIGNDATA: method->signData = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_VERIFY: method->verify = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_VERIFYDATA: method->verifyData = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_BLIND: method->blind = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_UNBLIND: method->unBlind = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_RECOVER: method->recover = funcSign[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetKemMethod(const CRYPT_EAL_Func *funcKem, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcKem != NULL) { while (funcKem[index].id != 0) { switch (funcKem[index].id) { case CRYPT_EAL_IMPLPKEYKEM_ENCAPSULATE_INIT: method->encapsInit = funcKem[index].func; break; case CRYPT_EAL_IMPLPKEYKEM_DECAPSULATE_INIT: method->decapsInit = funcKem[index].func; break; case CRYPT_EAL_IMPLPKEYKEM_ENCAPSULATE: method->encaps = funcKem[index].func; break; case CRYPT_EAL_IMPLPKEYKEM_DECAPSULATE: method->decaps = funcKem[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_SetPkeyMethod(EAL_PkeyUnitaryMethod **pkeyMethod, const CRYPT_EAL_Func *funcsKeyMgmt, const CRYPT_EAL_Func *funcsAsyCipher, const CRYPT_EAL_Func *funcsExch, const CRYPT_EAL_Func *funcSign, const CRYPT_EAL_Func *funcKem) { int32_t ret; EAL_PkeyUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return BSL_MALLOC_FAIL; } ret = CRYPT_EAL_SetKeyMethod(funcsKeyMgmt, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetCipherMethod(funcsAsyCipher, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetExchMethod(funcsExch, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetSignMethod(funcSign, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetKemMethod(funcKem, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } *pkeyMethod = method; return CRYPT_SUCCESS; } static int32_t ProviderGetTargetFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t operaId, int32_t algId, const char *attrName, const CRYPT_EAL_Func **funcs, CRYPT_EAL_ProvMgrCtx **mgrCtx) { int32_t ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, operaId, algId, attrName, funcs, mgrCtx); return ret == CRYPT_NOT_SUPPORT ? CRYPT_SUCCESS : ret; } int32_t CRYPT_EAL_ProviderGetAsyAlgFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName, CRYPT_EAL_AsyAlgFuncsInfo *funcs) { int32_t ret = CRYPT_PROVIDER_NOT_SUPPORT; if (pkeyOperType == CRYPT_EAL_PKEY_UNKNOWN_OPERATE) { RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_ASYMCIPHER, algId, attrName, &funcs->funcsAsyCipher, &funcs->mgrCtx), ret); RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_KEYEXCH, algId, attrName, &funcs->funcsExch, &funcs->mgrCtx), ret); RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_SIGN, algId, attrName, &funcs->funcSign, &funcs->mgrCtx), ret); RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_KEM, algId, attrName, &funcs->funcKem, &funcs->mgrCtx), ret); } if ((pkeyOperType & CRYPT_EAL_PKEY_CIPHER_OPERATE) == CRYPT_EAL_PKEY_CIPHER_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_ASYMCIPHER, algId, attrName, &funcs->funcsAsyCipher, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if ((pkeyOperType & CRYPT_EAL_PKEY_EXCH_OPERATE) == CRYPT_EAL_PKEY_EXCH_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEYEXCH, algId, attrName, &funcs->funcsExch, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if ((pkeyOperType & CRYPT_EAL_PKEY_SIGN_OPERATE) == CRYPT_EAL_PKEY_SIGN_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_SIGN, algId, attrName, &funcs->funcSign, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if ((pkeyOperType & CRYPT_EAL_PKEY_KEM_OPERATE) == CRYPT_EAL_PKEY_KEM_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEM, algId, attrName, &funcs->funcKem, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEYMGMT, algId, attrName, &funcs->funcsKeyMgmt, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } CRYPT_EAL_PkeyCtx *CRYPT_EAL_ProviderPkeyNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName) { void *provCtx = NULL; CRYPT_EAL_AsyAlgFuncsInfo funcInfo = {NULL, NULL, NULL, NULL, NULL, NULL}; int32_t ret = CRYPT_EAL_ProviderGetAsyAlgFuncs(libCtx, algId, pkeyOperType, attrName, &funcInfo); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, ret); return NULL; } ret = CRYPT_EAL_ProviderCtrl(funcInfo.mgrCtx, CRYPT_PROVIDER_GET_USER_CTX, &provCtx, sizeof(provCtx)); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, ret); return NULL; } CRYPT_EAL_PkeyCtx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_PkeyCtx)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CRYPT_EAL_SetPkeyMethod(&(ctx->method), funcInfo.funcsKeyMgmt, funcInfo.funcsAsyCipher, funcInfo.funcsExch, funcInfo.funcSign, funcInfo.funcKem); if (ret != BSL_SUCCESS) { BSL_SAL_FREE(ctx); return NULL; } if (ctx->method->provNewCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_PROVIDER_ERR_IMPL_NULL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->key = ctx->method->provNewCtx(provCtx, algId); if (ctx->key == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->isProvider = true; ctx->id = algId; BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } #endif // HITLS_CRYPTO_PROVIDER CRYPT_EAL_PkeyCtx *CRYPT_EAL_ProviderPkeyNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderPkeyNewCtxInner(libCtx, algId, pkeyOperType, attrName); #else (void)libCtx; (void)pkeyOperType; (void)attrName; return CRYPT_EAL_PkeyNewCtx(algId); #endif } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_gen.c
C
unknown
65,515
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include "securec.h" #include "eal_pkey_local.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "bsl_params.h" #include "eal_common.h" #include "crypt_eal_md.h" int32_t CRYPT_EAL_PkeyEncapsInit(CRYPT_EAL_PkeyCtx *pkey, BSL_Param *params) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; #ifdef HITLS_CRYPTO_PROVIDER if (pkey->isProvider && pkey->method != NULL && pkey->method->encapsInit != NULL) { ret = pkey->method->encapsInit(pkey->key, params); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } } #else (void)params; #endif return ret; } int32_t CRYPT_EAL_PkeyDecapsInit(CRYPT_EAL_PkeyCtx *pkey, BSL_Param *params) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; #ifdef HITLS_CRYPTO_PROVIDER if (pkey->isProvider && pkey->method != NULL && pkey->method->decapsInit != NULL) { ret = pkey->method->decapsInit(pkey->key, params); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } } #else (void)params; #endif return ret; } int32_t CRYPT_EAL_PkeyEncaps(const CRYPT_EAL_PkeyCtx *pkey, uint8_t *cipher, uint32_t *cipherLen, uint8_t *sharekey, uint32_t *shareKeyLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->encaps == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->encaps(pkey->key, cipher, cipherLen, sharekey, shareKeyLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyDecaps(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *cipher, uint32_t cipherLen, uint8_t *sharekey, uint32_t *shareKeyLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->decaps == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->decaps(pkey->key, cipher, cipherLen, sharekey, shareKeyLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_kem.c
C
unknown
3,575
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_PKEY_LOCAL_H #define EAL_PKEY_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #include "crypt_eal_pkey.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus /** * @ingroup EAL * * Pkey session structure */ struct EAL_PkeyCtx { bool isProvider; EAL_PkeyUnitaryMethod *method; void *key; void *extData; CRYPT_PKEY_AlgId id; BSL_SAL_RefCount references; }; /** * @ingroup crypt_method * @brief Generate the default method of the signature algorithm. * * @param id [IN] Algorithm ID. * * @return success: Pointer to EAL_PkeyMethod * For other error codes, see crypt_errno.h. */ const EAL_PkeyMethod *CRYPT_EAL_PkeyFindMethod(CRYPT_PKEY_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_PKEY #endif // EAL_PKEY_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_local.h
C
unknown
1,485
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include "securec.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "eal_pkey_local.h" #ifdef HITLS_CRYPTO_RSA #include "crypt_rsa.h" #endif #ifdef HITLS_CRYPTO_DSA #include "crypt_dsa.h" #endif #ifdef HITLS_CRYPTO_CURVE25519 #include "crypt_curve25519.h" #endif #ifdef HITLS_CRYPTO_DH #include "crypt_dh.h" #endif #ifdef HITLS_CRYPTO_ECDH #include "crypt_ecdh.h" #endif #ifdef HITLS_CRYPTO_ECDSA #include "crypt_ecdsa.h" #endif #ifdef HITLS_CRYPTO_SM2 #include "crypt_sm2.h" #endif #ifdef HITLS_CRYPTO_PAILLIER #include "crypt_paillier.h" #endif #ifdef HITLS_CRYPTO_ELGAMAL #include "crypt_elgamal.h" #endif #ifdef HITLS_CRYPTO_KEM #include "crypt_mlkem.h" #endif #ifdef HITLS_CRYPTO_MLDSA #include "crypt_mldsa.h" #endif #ifdef HITLS_CRYPTO_SLH_DSA #include "crypt_slh_dsa.h" #endif #ifdef HITLS_CRYPTO_HYBRIDKEM #include "crypt_hybridkem.h" #endif #ifdef HITLS_CRYPTO_XMSS #include "crypt_xmss.h" #endif #include "bsl_err_internal.h" #include "crypt_types.h" #include "crypt_errno.h" #include "eal_common.h" #include "bsl_sal.h" #define EAL_PKEY_METHOD_DEFINE(id, \ newCtx, dupCtx, freeCtx, setPara, getPara, gen, ctrl, setPub, setPrv, getPub, getPrv, \ sign, signData, verify, verifyData, recover, computeShareKey, encrypt, decrypt, \ headd, hemul, check, cmp, copyParam, encaps, decaps, blind, unBlind) { \ id, (PkeyNew)(newCtx), (PkeyDup)(dupCtx), (PkeyFree)(freeCtx), \ (PkeySetPara)(setPara), (PkeyGetPara)(getPara), (PkeyGen)(gen), (PkeyCtrl)(ctrl), \ (PkeySetPub)(setPub), (PkeySetPrv)(setPrv), (PkeyGetPub)(getPub), (PkeyGetPrv)(getPrv), \ (PkeySign)(sign), (PkeySignData)(signData), (PkeyVerify)(verify), (PkeyVerifyData)(verifyData), \ (PkeyRecover)(recover), (PkeyComputeShareKey)(computeShareKey), \ (PkeyCrypt)(encrypt), (PkeyCrypt)(decrypt), (PkeyHEOperation)(headd), (PkeyHEOperation)(hemul), \ (PkeyCheck)(check), (PkeyCmp)(cmp), (PkeyCopyParam)(copyParam), \ (PkeyEncapsulate)(encaps), (PkeyDecapsulate)(decaps), (PkeyBlind)(blind), (PkeyUnBlind)(unBlind)} static const EAL_PkeyMethod METHODS[] = { #ifdef HITLS_CRYPTO_DSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_DSA, CRYPT_DSA_NewCtx, CRYPT_DSA_DupCtx, CRYPT_DSA_FreeCtx, CRYPT_DSA_SetParaEx, CRYPT_DSA_GetParaEx, CRYPT_DSA_Gen, CRYPT_DSA_Ctrl, CRYPT_DSA_SetPubKeyEx, CRYPT_DSA_SetPrvKeyEx, CRYPT_DSA_GetPubKeyEx, CRYPT_DSA_GetPrvKeyEx, CRYPT_DSA_Sign, CRYPT_DSA_SignData, CRYPT_DSA_Verify, CRYPT_DSA_VerifyData, NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_DSA_CHECK CRYPT_DSA_Check, #else NULL, // check #endif CRYPT_DSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_DSA #endif #ifdef HITLS_CRYPTO_ED25519 EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ED25519, CRYPT_ED25519_NewCtx, CRYPT_CURVE25519_DupCtx, CRYPT_CURVE25519_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_ED25519_GenKey, CRYPT_CURVE25519_Ctrl, CRYPT_CURVE25519_SetPubKeyEx, CRYPT_CURVE25519_SetPrvKeyEx, CRYPT_CURVE25519_GetPubKeyEx, CRYPT_CURVE25519_GetPrvKeyEx, CRYPT_CURVE25519_Sign, NULL, // signData CRYPT_CURVE25519_Verify, NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_ED25519_CHECK CRYPT_ED25519_Check, #else NULL, // check #endif CRYPT_CURVE25519_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_ED25519 #endif #ifdef HITLS_CRYPTO_X25519 EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_X25519, CRYPT_X25519_NewCtx, CRYPT_CURVE25519_DupCtx, CRYPT_CURVE25519_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_X25519_GenKey, CRYPT_CURVE25519_Ctrl, CRYPT_CURVE25519_SetPubKeyEx, CRYPT_CURVE25519_SetPrvKeyEx, CRYPT_CURVE25519_GetPubKeyEx, CRYPT_CURVE25519_GetPrvKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover CRYPT_CURVE25519_ComputeSharedKey, NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_X25519_CHECK CRYPT_X25519_Check, #else NULL, // check #endif CRYPT_CURVE25519_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_X25519 #endif #ifdef HITLS_CRYPTO_RSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_RSA, CRYPT_RSA_NewCtx, CRYPT_RSA_DupCtx, CRYPT_RSA_FreeCtx, CRYPT_RSA_SetParaEx, NULL, // getPara #ifdef HITLS_CRYPTO_RSA_GEN CRYPT_RSA_Gen, #else NULL, // gen #endif CRYPT_RSA_Ctrl, CRYPT_RSA_SetPubKeyEx, CRYPT_RSA_SetPrvKeyEx, CRYPT_RSA_GetPubKeyEx, CRYPT_RSA_GetPrvKeyEx, #ifdef HITLS_CRYPTO_RSA_SIGN CRYPT_RSA_Sign, CRYPT_RSA_SignData, #else NULL, // sign NULL, // signData #endif #ifdef HITLS_CRYPTO_RSA_VERIFY CRYPT_RSA_Verify, CRYPT_RSA_VerifyData, CRYPT_RSA_Recover, #else NULL, // verify NULL, // verifyData NULL, // recover #endif NULL, // computeShareKey #ifdef HITLS_CRYPTO_RSA_ENCRYPT CRYPT_RSA_Encrypt, #else NULL, // encrypt #endif #ifdef HITLS_CRYPTO_RSA_DECRYPT CRYPT_RSA_Decrypt, #else NULL, // decrypt #endif NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_RSA_CHECK CRYPT_RSA_Check, #else NULL, // check #endif CRYPT_RSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps #ifdef HITLS_CRYPTO_RSA_BSSA #ifdef HITLS_CRYPTO_RSA_SIGN CRYPT_RSA_Blind, // blind #else NULL, // blind #endif #ifdef HITLS_CRYPTO_RSA_VERIFY CRYPT_RSA_UnBlind // unBlind #else NULL // unBlind #endif #else NULL, // blind NULL // unBlind #endif ), #endif #ifdef HITLS_CRYPTO_DH EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_DH, CRYPT_DH_NewCtx, CRYPT_DH_DupCtx, CRYPT_DH_FreeCtx, CRYPT_DH_SetParaEx, CRYPT_DH_GetParaEx, CRYPT_DH_Gen, CRYPT_DH_Ctrl, CRYPT_DH_SetPubKeyEx, CRYPT_DH_SetPrvKeyEx, CRYPT_DH_GetPubKeyEx, CRYPT_DH_GetPrvKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover CRYPT_DH_ComputeShareKey, NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_DH_CHECK CRYPT_DH_Check, #else NULL, // check #endif CRYPT_DH_Cmp, NULL, NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_ECDSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ECDSA, CRYPT_ECDSA_NewCtx, CRYPT_ECDSA_DupCtx, CRYPT_ECDSA_FreeCtx, CRYPT_ECDSA_SetParaEx, CRYPT_ECDSA_GetParaEx, CRYPT_ECDSA_Gen, CRYPT_ECDSA_Ctrl, CRYPT_ECDSA_SetPubKeyEx, CRYPT_ECDSA_SetPrvKeyEx, CRYPT_ECDSA_GetPubKeyEx, CRYPT_ECDSA_GetPrvKeyEx, CRYPT_ECDSA_Sign, CRYPT_ECDSA_SignData, CRYPT_ECDSA_Verify, CRYPT_ECDSA_VerifyData, NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_ECDSA_CHECK CRYPT_ECDSA_Check, #else NULL, // check #endif CRYPT_ECDSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_ECDH EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ECDH, CRYPT_ECDH_NewCtx, CRYPT_ECDH_DupCtx, CRYPT_ECDH_FreeCtx, CRYPT_ECDH_SetParaEx, CRYPT_ECDH_GetParaEx, CRYPT_ECDH_Gen, CRYPT_ECDH_Ctrl, CRYPT_ECDH_SetPubKeyEx, CRYPT_ECDH_SetPrvKeyEx, CRYPT_ECDH_GetPubKeyEx, CRYPT_ECDH_GetPrvKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover CRYPT_ECDH_ComputeShareKey, NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_ECDH_CHECK CRYPT_ECDH_Check, #else NULL, // check #endif CRYPT_ECDH_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_SM2 EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_SM2, CRYPT_SM2_NewCtx, CRYPT_SM2_DupCtx, CRYPT_SM2_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_SM2_Gen, CRYPT_SM2_Ctrl, CRYPT_SM2_SetPubKeyEx, CRYPT_SM2_SetPrvKeyEx, CRYPT_SM2_GetPubKeyEx, CRYPT_SM2_GetPrvKeyEx, #ifdef HITLS_CRYPTO_SM2_SIGN CRYPT_SM2_Sign, NULL, CRYPT_SM2_Verify, NULL, #else NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData #endif NULL, // recover #ifdef HITLS_CRYPTO_SM2_EXCH CRYPT_SM2_KapComputeKey, // compute share key #else NULL, // computeShareKey #endif #ifdef HITLS_CRYPTO_SM2_CRYPT CRYPT_SM2_Encrypt, // encrypt CRYPT_SM2_Decrypt, // decrypt #else NULL, // encrypt NULL, // decrypt #endif NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_SM2_CHECK CRYPT_SM2_Check, #else NULL, // check #endif CRYPT_SM2_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_SM2 #endif #ifdef HITLS_CRYPTO_PAILLIER EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_PAILLIER, CRYPT_PAILLIER_NewCtx, CRYPT_PAILLIER_DupCtx, CRYPT_PAILLIER_FreeCtx, CRYPT_PAILLIER_SetParaEx, NULL, CRYPT_PAILLIER_Gen, CRYPT_PAILLIER_Ctrl, CRYPT_PAILLIER_SetPubKeyEx, CRYPT_PAILLIER_SetPrvKeyEx, CRYPT_PAILLIER_GetPubKeyEx, CRYPT_PAILLIER_GetPrvKeyEx, NULL, NULL, NULL, NULL, NULL, // recover NULL, CRYPT_PAILLIER_Encrypt, CRYPT_PAILLIER_Decrypt, CRYPT_PAILLIER_Add, NULL, NULL, NULL, // cmp NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_PAILLIER #endif #ifdef HITLS_CRYPTO_ELGAMAL EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ELGAMAL, CRYPT_ELGAMAL_NewCtx, CRYPT_ELGAMAL_DupCtx, CRYPT_ELGAMAL_FreeCtx, CRYPT_ELGAMAL_SetParaEx, NULL, CRYPT_ELGAMAL_Gen, CRYPT_ELGAMAL_Ctrl, CRYPT_ELGAMAL_SetPubKeyEx, CRYPT_ELGAMAL_SetPrvKeyEx, CRYPT_ELGAMAL_GetPubKeyEx, CRYPT_ELGAMAL_GetPrvKeyEx, NULL, NULL, NULL, NULL, NULL, // recover NULL, CRYPT_ELGAMAL_Encrypt, CRYPT_ELGAMAL_Decrypt, NULL, // headd NULL, // hemul NULL, NULL, // cmp NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_ELGAMAL #endif #ifdef HITLS_CRYPTO_MLKEM EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ML_KEM, CRYPT_ML_KEM_NewCtx, CRYPT_ML_KEM_DupCtx, CRYPT_ML_KEM_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_ML_KEM_GenKey, CRYPT_ML_KEM_Ctrl, CRYPT_ML_KEM_SetEncapsKeyEx, CRYPT_ML_KEM_SetDecapsKeyEx, CRYPT_ML_KEM_GetEncapsKeyEx, CRYPT_ML_KEM_GetDecapsKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_MLKEM_CHECK CRYPT_ML_KEM_Check, #else NULL, // check #endif CRYPT_ML_KEM_Cmp, NULL, // copyPara CRYPT_ML_KEM_Encaps, CRYPT_ML_KEM_Decaps, NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_MLDSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ML_DSA, CRYPT_ML_DSA_NewCtx, CRYPT_ML_DSA_DupCtx, CRYPT_ML_DSA_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_ML_DSA_GenKey, CRYPT_ML_DSA_Ctrl, CRYPT_ML_DSA_SetPubKeyEx, CRYPT_ML_DSA_SetPrvKeyEx, CRYPT_ML_DSA_GetPubKeyEx, CRYPT_ML_DSA_GetPrvKeyEx, CRYPT_ML_DSA_Sign, // sign NULL, // signData CRYPT_ML_DSA_Verify, // verify NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_MLDSA_CHECK CRYPT_ML_DSA_Check, #else NULL, // check #endif CRYPT_ML_DSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_SLH_DSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_SLH_DSA, CRYPT_SLH_DSA_NewCtx, NULL, // dupCtx CRYPT_SLH_DSA_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_SLH_DSA_Gen, CRYPT_SLH_DSA_Ctrl, CRYPT_SLH_DSA_SetPubKeyEx, CRYPT_SLH_DSA_SetPrvKeyEx, CRYPT_SLH_DSA_GetPubKeyEx, CRYPT_SLH_DSA_GetPrvKeyEx, CRYPT_SLH_DSA_Sign, NULL, CRYPT_SLH_DSA_Verify, NULL, NULL, NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt #ifdef HITLS_CRYPTO_SLH_DSA_CHECK CRYPT_SLH_DSA_Check, #else NULL, // check #endif NULL, // cmp NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_XMSS EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_XMSS, CRYPT_XMSS_NewCtx, NULL, // dupCtx CRYPT_XMSS_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_XMSS_Gen, CRYPT_XMSS_Ctrl, CRYPT_XMSS_SetPubKey, CRYPT_XMSS_SetPrvKey, CRYPT_XMSS_GetPubKey, CRYPT_XMSS_GetPrvKey, CRYPT_XMSS_Sign, NULL, CRYPT_XMSS_Verify, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL ), #endif #ifdef HITLS_CRYPTO_HYBRIDKEM EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_HYBRID_KEM, CRYPT_HYBRID_KEM_NewCtx, NULL, CRYPT_HYBRID_KEM_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_HYBRID_KEM_GenKey, CRYPT_HYBRID_KEM_KeyCtrl, CRYPT_HYBRID_KEM_SetEncapsKeyEx, CRYPT_HYBRID_KEM_SetDecapsKeyEx, CRYPT_HYBRID_KEM_GetEncapsKeyEx, CRYPT_HYBRID_KEM_GetDecapsKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul NULL, // check NULL, NULL, // copyPara CRYPT_HYBRID_KEM_Encaps, CRYPT_HYBRID_KEM_Decaps, NULL, // blind NULL // unBlind ), #endif }; const EAL_PkeyMethod *CRYPT_EAL_PkeyFindMethod(CRYPT_PKEY_AlgId id) { uint32_t num = sizeof(METHODS) / sizeof(METHODS[0]); const EAL_PkeyMethod *pkeyMeth = NULL; for (uint32_t i = 0; i < num; i++) { if (METHODS[i].id == id) { pkeyMeth = &METHODS[i]; return pkeyMeth; } } return NULL; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_method.c
C
unknown
17,564
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdbool.h> #include "securec.h" #include "bsl_sal.h" #include "crypt_eal_pkey.h" #include "crypt_eal_md.h" #include "crypt_errno.h" #include "eal_md_local.h" #include "eal_pkey_local.h" #include "crypt_eal_rand.h" #include "crypt_algid.h" #include "bsl_err_internal.h" #include "eal_common.h" #include "crypt_utils.h" int32_t CRYPT_EAL_PkeySignData(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *hash, uint32_t hashLen, uint8_t *sign, uint32_t *signLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->signData == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((hash == NULL && hashLen != 0) || (hash != NULL && hashLen == 0)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret = pkey->method->signData(pkey->key, hash, hashLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySign(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { // 1. Check the input parameter if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->sign == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->sign(pkey->key, id, data, dataLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyVerify(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { // 1. Check the input parameter if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->verify == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } // 2. Hash the plaintext data and verify the hash value. int32_t ret = pkey->method->verify(pkey->key, id, data, dataLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); return ret; } return ret; } int32_t CRYPT_EAL_PkeyVerifyData(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *hash, uint32_t hashLen, const uint8_t *sign, uint32_t signLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->verifyData == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((hash == NULL && hashLen != 0) || (hash != NULL && hashLen == 0)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret = pkey->method->verifyData(pkey->key, hash, hashLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyBlind(CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *input, uint32_t inputLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->blind == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->blind(pkey->key, id, input, inputLen, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyUnBlind(CRYPT_EAL_PkeyCtx *pkey, const uint8_t *input, uint32_t inputLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->unBlind == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->unBlind(pkey->key, input, inputLen, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_pkey_sign.c
C
unknown
5,882
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG) #include <stdbool.h> #include <securec.h> #include "crypt_eal_rand.h" #include "crypt_errno.h" #include "bsl_errno.h" #include "bsl_sal.h" #include "crypt_algid.h" #include "crypt_drbg.h" #ifdef HITLS_CRYPTO_MD #include "eal_md_local.h" #endif #ifdef HITLS_CRYPTO_MAC #include "eal_mac_local.h" #endif #ifdef HITLS_CRYPTO_CIPHER #include "eal_cipher_local.h" #endif #include "crypt_drbg_local.h" #include "bsl_err_internal.h" #include "crypt_types.h" #include "crypt_utils.h" #include "crypt_util_rand.h" #include "eal_common.h" #include "eal_entropy.h" #include "sal_atomic.h" #include "crypt_ealinit.h" #include "crypt_eal_implprovider.h" #include "crypt_eal_provider.h" #include "crypt_provider.h" #include "crypt_params_key.h" #ifdef HITLS_CRYPTO_ENTROPY static EAL_SeedDrbg g_seedDrbg = {HITLS_SEED_DRBG_INIT_RAND_ALG, NULL, NULL, {0}, {0}}; static BSL_SAL_ThreadLockHandle g_seedLock = NULL; #endif static CRYPT_EAL_RndCtx *EAL_RandNewDrbg(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #define RETURN_RAND_LOCK(ctx, ret) \ do { \ (ret) = BSL_SAL_ThreadWriteLock(((ctx)->lock)); \ if ((ret) != BSL_SUCCESS) { \ BSL_ERR_PUSH_ERROR((ret)); \ return (ret); \ } \ } while (0) #define RAND_UNLOCK(ctx) (void)BSL_SAL_ThreadUnlock(((ctx)->lock)) #if defined(HITLS_CRYPTO_RAND_CB) static CRYPT_EAL_RandFunc g_rndFunc = NULL; static CRYPT_EAL_RandFuncEx g_rndFuncEx = NULL; #endif static int32_t EAL_RandSetMeth(EAL_RandUnitaryMethod *meth, CRYPT_EAL_RndCtx *ctx) { EAL_RandUnitaryMethod *temp = BSL_SAL_Dump(meth, sizeof(EAL_RandUnitaryMethod)); if (temp == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ctx->meth = temp; return CRYPT_SUCCESS; } static int32_t GetSeedParam(BSL_Param *seedParam, CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { uint32_t iter = 0; if (seedCtx != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, seedCtx, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->getEntropy != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->getEntropy, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->cleanEntropy != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->cleanEntropy, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->getNonce != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->getNonce, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->cleanNonce != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->cleanNonce, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } return CRYPT_SUCCESS; } /* Initialize the global DRBG. */ static int32_t EAL_RandNew(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx, CRYPT_EAL_RndCtx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->working == true) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_RAND_WORKING); return CRYPT_EAL_ERR_RAND_WORKING; } BSL_Param seedParam[6] = {BSL_PARAM_END}; int32_t ret = GetSeedParam(seedParam, seedMeth, seedCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ctx->ctx = ctx->meth->newCtx(NULL, id, seedParam); if (ctx->ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_INIT_FAIL); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } return CRYPT_SUCCESS; } static void MethFreeCtx(CRYPT_EAL_RndCtx *ctx) { EAL_RandUnitaryMethod *meth = ctx->meth; if (meth != NULL && meth->freeCtx != NULL) { meth->freeCtx(ctx->ctx); } BSL_SAL_FREE(ctx->meth); return; } #ifdef HITLS_CRYPTO_ENTROPY int32_t EAL_SeedDrbgLockInit(void) { if (g_seedLock != NULL) { return BSL_SUCCESS; } return BSL_SAL_ThreadLockNew(&g_seedLock); } void EAL_SeedDrbgLockDeInit(void) { if (g_seedLock == NULL) { return; } BSL_SAL_ThreadLockFree(g_seedLock); g_seedLock = NULL; } void EAL_SeedDrbgRandDeinit(CRYPT_EAL_RndCtx *rndCtx) { if (rndCtx == NULL) { return; } rndCtx->working = false; MethFreeCtx(rndCtx); BSL_SAL_ThreadLockFree(rndCtx->lock); BSL_SAL_FREE(rndCtx); } void EAL_SeedDrbgDeinit(bool isDefaultSeed) { if (!isDefaultSeed) { return; } (void)BSL_SAL_ThreadWriteLock(g_seedLock); int val = 0; BSL_SAL_AtomicDownReferences(&(g_seedDrbg.references), &val); if (val > 0) { (void)BSL_SAL_ThreadUnlock(g_seedLock); return; } if (g_seedDrbg.seed != NULL) { EAL_SeedDrbgRandDeinit(g_seedDrbg.seed); g_seedDrbg.seed = NULL; CRYPT_EAL_SeedPoolFree(g_seedDrbg.seedCtx); g_seedDrbg.seedCtx = NULL; (void)memset_s(&(g_seedDrbg.seedMeth), sizeof(g_seedDrbg.seedMeth), 0, sizeof(g_seedDrbg.seedMeth)); BSL_SAL_ReferencesFree(&(g_seedDrbg.references)); } (void)BSL_SAL_ThreadUnlock(g_seedLock); } #endif void EAL_RandDeinit(CRYPT_EAL_RndCtx *ctx) { if (ctx == NULL) { return; } BSL_SAL_ThreadLockHandle lock = ctx->lock; ctx->lock = NULL; if (BSL_SAL_ThreadWriteLock(lock) != BSL_SUCCESS) { // write lock MethFreeCtx(ctx); BSL_SAL_ThreadLockFree(lock); #ifdef HITLS_CRYPTO_ENTROPY EAL_SeedDrbgDeinit(ctx->isDefaultSeed); #endif BSL_SAL_FREE(ctx); return; } ctx->working = false; MethFreeCtx(ctx); (void)BSL_SAL_ThreadUnlock(lock); BSL_SAL_ThreadLockFree(lock); // free the lock resource #ifdef HITLS_CRYPTO_ENTROPY EAL_SeedDrbgDeinit(ctx->isDefaultSeed); #endif BSL_SAL_FREE(ctx); return; } // Check whether the state of CTX is available. static int32_t CheckRndCtxState(CRYPT_EAL_RndCtx *ctx) { if (ctx->working == false) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, CRYPT_EAL_ERR_RAND_NO_WORKING); return CRYPT_EAL_ERR_RAND_NO_WORKING; } return CRYPT_SUCCESS; } #if defined(HITLS_CRYPTO_RAND_CB) void CRYPT_EAL_SetRandCallBack(CRYPT_EAL_RandFunc func) { g_rndFunc = func; CRYPT_RandRegist(func); return; } void CRYPT_EAL_SetRandCallBackEx(CRYPT_EAL_RandFuncEx func) { g_rndFuncEx = func; CRYPT_RandRegistEx(func); return; } #endif int32_t EAL_DrbgbytesWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { if (ctx == NULL || ctx->meth == NULL || ctx->meth->gen == NULL || byte == NULL || len == 0) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; RETURN_RAND_LOCK(ctx, ret); // write lock ret = CheckRndCtxState(ctx); if (ret != CRYPT_SUCCESS) { RAND_UNLOCK(ctx); return ret; } ret = ctx->meth->gen(ctx->ctx, byte, len, addin, addinLen, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, ret); } RAND_UNLOCK(ctx); return ret; } int32_t EAL_DrbgSeedWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *addin, uint32_t addinLen) { if (ctx == NULL || ctx->meth == NULL || ctx->meth->reSeed == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; RETURN_RAND_LOCK(ctx, ret); // write lock ret = CheckRndCtxState(ctx); if (ret != CRYPT_SUCCESS) { RAND_UNLOCK(ctx); return ret; } ret = ctx->meth->reSeed(ctx->ctx, addin, addinLen, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, ret); } RAND_UNLOCK(ctx); return ret; } void EAL_RandDrbgFree(void *ctx) { if (ctx == NULL) { return; } DRBG_Ctx *drbg = (DRBG_Ctx *)ctx; DRBG_Free(drbg); return; } #ifdef HITLS_CRYPTO_ENTROPY static int32_t GetSeedDrbgEntropy(void *ctx, CRYPT_Data *entropy, uint32_t strength, CRYPT_Range *lenRange) { int32_t ret; CRYPT_EAL_RndCtx *seed = (CRYPT_EAL_RndCtx *)ctx; uint32_t strengthBytes = (strength + 7) / 8; // Figure out how many bytes needed. entropy->len = ((strengthBytes > lenRange->min) ? strengthBytes : lenRange->min); if (entropy->len > lenRange->max) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_RANGE_ERROR); return CRYPT_ENTROPY_RANGE_ERROR; } entropy->data = BSL_SAL_Malloc(entropy->len); if (entropy->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = EAL_DrbgbytesWithAdin(seed, entropy->data, entropy->len, NULL, 0); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(entropy->data); } return ret; } static void CleanSeedDrbgEntropy(void *ctx, CRYPT_Data *entropy) { (void)ctx; BSL_SAL_CleanseData(entropy->data, entropy->len); BSL_SAL_FREE(entropy->data); } void EAL_SeedDrbgEntropyMeth(CRYPT_RandSeedMethod *meth) { meth->getEntropy = GetSeedDrbgEntropy; meth->cleanEntropy = CleanSeedDrbgEntropy; meth->cleanNonce = CleanSeedDrbgEntropy; meth->getNonce = GetSeedDrbgEntropy; } static int32_t SetSeedDrbgReseedInfo(CRYPT_EAL_RndCtx *rndCtx) { int32_t ret; #if defined(HITLS_CRYPTO_DRBG_GM) if (g_seedDrbg.id == CRYPT_RAND_SM3 || g_seedDrbg.id == CRYPT_RAND_SM4_CTR_DF) { uint32_t gmLevel = 2; // Set gm level 2 ret = rndCtx->meth->ctrl(rndCtx->ctx, CRYPT_CTRL_SET_GM_LEVEL, &gmLevel, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif uint32_t reseedInterval = DRBG_RESEED_INTERVAL; ret = rndCtx->meth->ctrl(rndCtx->ctx, CRYPT_CTRL_SET_RESEED_INTERVAL, &reseedInterval, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t EAL_SeedDrbgInit(EAL_SeedDrbg *seedDrbg) { CRYPT_RandSeedMethod seedMethond = {0}; int32_t ret = EAL_SetDefaultEntropyMeth(&seedMethond); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_EAL_SeedPoolCtx *seedPoolCtx = CRYPT_EAL_SeedPoolNew(false); if (seedPoolCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NEW_ERROR); return CRYPT_SEED_POOL_NEW_ERROR; } CRYPT_EAL_RndCtx *rndCtx = EAL_RandNewDrbg(seedDrbg->id, &seedMethond, seedPoolCtx); if (rndCtx == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = SetSeedDrbgReseedInfo(rndCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = rndCtx->meth->inst(rndCtx->ctx, NULL, 0, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } rndCtx->working = true; seedDrbg->seed = rndCtx; seedDrbg->seedMeth = seedMethond; seedDrbg->seedCtx = seedPoolCtx; BSL_SAL_ReferencesInit(&(seedDrbg->references)); return CRYPT_SUCCESS; EXIT: CRYPT_EAL_SeedPoolFree(seedPoolCtx); EAL_RandDeinit(rndCtx); return ret; } int32_t EAL_GetDefaultSeed(CRYPT_RandSeedMethod *seedMeth, void **seedCtx) { EAL_SeedDrbgEntropyMeth(seedMeth); (void)BSL_SAL_ThreadWriteLock(g_seedLock); if (g_seedDrbg.seed != NULL) { *seedCtx = g_seedDrbg.seed; int val = 0; BSL_SAL_AtomicUpReferences(&(g_seedDrbg.references), &val); (void)BSL_SAL_ThreadUnlock(g_seedLock); return CRYPT_SUCCESS; } int32_t ret = EAL_SeedDrbgInit(&g_seedDrbg); if (ret != CRYPT_SUCCESS) { (void)BSL_SAL_ThreadUnlock(g_seedLock); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } *seedCtx = g_seedDrbg.seed; (void)BSL_SAL_ThreadUnlock(g_seedLock); return CRYPT_SUCCESS; } #endif static CRYPT_EAL_RndCtx *EAL_RandNewDrbg(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Drbg(id) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif CRYPT_RandSeedMethod seedMethTmp = {0}; CRYPT_RandSeedMethod *seedMethond = seedMeth; EAL_RandUnitaryMethod *meth = NULL; void *seedTmp = NULL; int32_t ret; CRYPT_EAL_RndCtx *randCtx = (CRYPT_EAL_RndCtx *)BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_RndCtx)); if (randCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } randCtx->isDefaultSeed = false; if (seedMeth == NULL || seedMeth->getEntropy == NULL) { #ifdef HITLS_CRYPTO_ENTROPY ret = EAL_GetDefaultSeed(&seedMethTmp, &seedTmp); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } seedCtx = seedTmp; seedMethond = &seedMethTmp; randCtx->isDefaultSeed = true; #else (void)seedMethTmp; (void)seedTmp; BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); goto ERR; #endif } meth = EAL_RandGetMethod(); // Apply for lock resources. ret = BSL_SAL_ThreadLockNew(&(randCtx->lock)); if (ret != CRYPT_SUCCESS) { goto ERR; } randCtx->isProvider = false; randCtx->working = false; randCtx->id = id; ret = EAL_RandSetMeth(meth, randCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = EAL_RandNew(id, seedMethond, seedCtx, randCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } return randCtx; ERR: EAL_RandDeinit(randCtx); return NULL; } #ifdef HITLS_CRYPTO_DRBG static CRYPT_EAL_RndCtx *g_globalRndCtx = NULL; static int32_t DrbgParaIsValid(CRYPT_RAND_AlgId id, const CRYPT_RandSeedMethod *seedMeth, const void *seedCtx, const uint8_t *pers, uint32_t persLen) { if (DRBG_GetIdMap(id) == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (seedMeth == NULL && seedCtx != NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pers == NULL && persLen != 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (seedMeth != NULL && seedMeth->getEntropy == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_RandInit(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx, const uint8_t *pers, uint32_t persLen) { CRYPT_EAL_RndCtx *ctx = NULL; if (g_globalRndCtx != NULL) { // Prevent DRBG repeated Init BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_REPEAT_INIT); return CRYPT_EAL_ERR_DRBG_REPEAT_INIT; } int32_t ret = DrbgParaIsValid(id, seedMeth, seedCtx, pers, persLen); if (ret != CRYPT_SUCCESS) { return ret; } ctx = EAL_RandNewDrbg(id, seedMeth, seedCtx); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, id, CRYPT_EAL_ERR_DRBG_INIT_FAIL); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } ret = CRYPT_EAL_DrbgInstantiate(ctx, pers, persLen); if (ret != CRYPT_SUCCESS) { EAL_RandDeinit(ctx); return ret; } CRYPT_RandRegist((CRYPT_EAL_RandFunc)CRYPT_EAL_Randbytes); g_globalRndCtx = ctx; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_RandbytesWithAdin(uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { if (g_globalRndCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_EAL_ERR_GLOBAL_DRBG_NULL); return CRYPT_EAL_ERR_GLOBAL_DRBG_NULL; } return EAL_DrbgbytesWithAdin(g_globalRndCtx, byte, len, addin, addinLen); } int32_t CRYPT_EAL_Randbytes(uint8_t *byte, uint32_t len) { #if defined(HITLS_CRYPTO_RAND_CB) if (g_rndFunc != NULL) { return g_rndFunc(byte, len); } #endif return CRYPT_EAL_RandbytesWithAdin(byte, len, NULL, 0); } int32_t CRYPT_EAL_RandSeedWithAdin(uint8_t *addin, uint32_t addinLen) { if (g_globalRndCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_EAL_ERR_GLOBAL_DRBG_NULL); return CRYPT_EAL_ERR_GLOBAL_DRBG_NULL; } return EAL_DrbgSeedWithAdin(g_globalRndCtx, addin, addinLen); } int32_t CRYPT_EAL_RandSeed(void) { return CRYPT_EAL_RandSeedWithAdin(NULL, 0); } bool CRYPT_EAL_RandIsValidAlgId(CRYPT_RAND_AlgId id) { return (DRBG_GetIdMap(id) != NULL); } #endif // end of HITLS_CRYPTO_DRBG int32_t CRYPT_EAL_DrbgInstantiate(CRYPT_EAL_RndCtx *rndCtx, const uint8_t *pers, uint32_t persLen) { if (rndCtx == NULL || rndCtx->meth == NULL || rndCtx->meth->inst == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; RETURN_RAND_LOCK(rndCtx, ret); ret = rndCtx->meth->inst(rndCtx->ctx, pers, persLen, NULL); if (ret != CRYPT_SUCCESS) { RAND_UNLOCK(rndCtx); return ret; } rndCtx->working = true; RAND_UNLOCK(rndCtx); return ret; } CRYPT_EAL_RndCtx *CRYPT_EAL_DrbgNew(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { if (seedMeth == NULL && seedCtx != NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, id, CRYPT_NULL_INPUT); return NULL; } return EAL_RandNewDrbg(id, seedMeth, seedCtx); } int32_t CRYPT_EAL_DrbgSeedWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *addin, uint32_t addinLen) { return EAL_DrbgSeedWithAdin(ctx, addin, addinLen); } int32_t CRYPT_EAL_DrbgSeed(CRYPT_EAL_RndCtx *ctx) { return CRYPT_EAL_DrbgSeedWithAdin(ctx, NULL, 0); } int32_t CRYPT_EAL_DrbgbytesWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { return EAL_DrbgbytesWithAdin(ctx, byte, len, addin, addinLen); } int32_t CRYPT_EAL_Drbgbytes(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len) { return CRYPT_EAL_DrbgbytesWithAdin(ctx, byte, len, NULL, 0); } void CRYPT_EAL_DrbgDeinit(CRYPT_EAL_RndCtx *ctx) { EAL_RandDeinit(ctx); return; } CRYPT_EAL_RndCtx *CRYPT_EAL_GetSeedCtx(bool isParentEntropy) { if (isParentEntropy) { #ifdef HITLS_CRYPTO_ENTROPY return g_seedDrbg.seed; #else return NULL; #endif } return g_globalRndCtx; } static int32_t GetDrbgWorkingStatus(CRYPT_EAL_RndCtx *rndCtx, void *val, uint32_t len) { RETURN_RET_IF(val == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF(len != sizeof(uint32_t), CRYPT_INVALID_ARG); *(uint32_t *)val = (uint32_t)(rndCtx->working); return CRYPT_SUCCESS; } int32_t CRYPT_EAL_DrbgCtrl(CRYPT_EAL_RndCtx *rndCtx, int32_t opt, void *val, uint32_t len) { if (rndCtx == NULL || rndCtx->meth == NULL || rndCtx->meth->ctrl == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (opt == CRYPT_CTRL_GET_WORKING_STATUS) { return GetDrbgWorkingStatus(rndCtx, val, len); } int32_t ret; RETURN_RAND_LOCK(rndCtx, ret); if (rndCtx->working == true) { RAND_UNLOCK(rndCtx); BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_RAND_WORKING); return CRYPT_EAL_ERR_RAND_WORKING; } ret = rndCtx->meth->ctrl(rndCtx->ctx, opt, val, len); RAND_UNLOCK(rndCtx); return ret; } #ifdef HITLS_CRYPTO_PROVIDER int32_t CRYPT_EAL_SetRandMethod(CRYPT_EAL_RndCtx *ctx, const CRYPT_EAL_Func *funcs) { int32_t index = 0; EAL_RandUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_RandUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLRAND_DRBGNEWCTX: method->newCtx = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGINST: method->inst = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGUNINST: method->unInst = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGGEN: method->gen = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGRESEED: method->reSeed = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGCTRL: method->ctrl = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGFREECTX: method->freeCtx = funcs[index].func; break; default: BSL_SAL_Free(method); BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } ctx->meth = method; return CRYPT_SUCCESS; } static CRYPT_EAL_RndCtx *EAL_ProvRandInitDrbg(CRYPT_EAL_LibCtx *libCtx, CRYPT_RAND_AlgId id, const char *attrName, BSL_Param *param) { const CRYPT_EAL_Func *funcs = NULL; void *provCtx = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_RAND, id, attrName, &funcs, &provCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return NULL; } CRYPT_EAL_RndCtx *randCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_RndCtx)); if (randCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } // Apply for lock resources. ret = BSL_SAL_ThreadLockNew(&(randCtx->lock)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); BSL_SAL_FREE(randCtx); return NULL; } randCtx->isDefaultSeed = false; randCtx->isProvider = true; randCtx->working = false; randCtx->id = id; ret = CRYPT_EAL_SetRandMethod(randCtx, funcs); if (ret != CRYPT_SUCCESS) { goto ERR; } if (randCtx->meth->newCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); goto ERR; } randCtx->ctx = randCtx->meth->newCtx(provCtx, id, param); if (randCtx->ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_INIT_FAIL); goto ERR; } return randCtx; ERR: BSL_SAL_ThreadLockFree(randCtx->lock); // free the lock resource BSL_SAL_FREE(randCtx->meth); BSL_SAL_FREE(randCtx); return NULL; } int32_t CRYPT_EAL_ProviderRandInitCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, const uint8_t *pers, uint32_t persLen, BSL_Param *param) { CRYPT_EAL_RndCtx *ctx = NULL; CRYPT_EAL_LibCtx *localLibCtx = NULL; localLibCtx = libCtx; if (localLibCtx == NULL) { localLibCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localLibCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } if (localLibCtx->drbg != NULL) { // Prevent DRBG repeated Init EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, algId, CRYPT_EAL_ERR_DRBG_REPEAT_INIT); return CRYPT_EAL_ERR_DRBG_REPEAT_INIT; } ctx = EAL_ProvRandInitDrbg(libCtx, algId, attrName, param); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, algId, CRYPT_EAL_ERR_DRBG_INIT_FAIL); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } if (ctx->meth->inst == NULL) { EAL_RandDeinit(ctx); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } int32_t ret = ctx->meth->inst(ctx->ctx, pers, persLen, param); if (ret != CRYPT_SUCCESS) { EAL_RandDeinit(ctx); return ret; } ctx->working = true; CRYPT_RandRegistEx((CRYPT_EAL_RandFuncEx)CRYPT_EAL_RandbytesEx); localLibCtx->drbg = ctx; return CRYPT_SUCCESS; } #endif // end of HITLS_CRYPTO_PROVIDER CRYPT_EAL_RndCtx *CRYPT_EAL_ProviderDrbgNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, BSL_Param *param) { #ifdef HITLS_CRYPTO_PROVIDER return EAL_ProvRandInitDrbg(libCtx, algId, attrName, param); #else (void) libCtx; (void) algId; (void) attrName; (void) param; return NULL; #endif } int32_t CRYPT_EAL_NoProviderRandInitCtxInner(int32_t algId, const uint8_t *pers, uint32_t persLen, BSL_Param *param) { CRYPT_RandSeedMethod seedMeth = {0}; void *seedCtx = NULL; const BSL_Param *temp = NULL; int32_t ret; bool hasEnt = false; if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_GETENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.getEntropy), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_CLEANENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.cleanEntropy), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_GETNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.getNonce), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_CLEANNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.cleanNonce), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEEDCTX)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, &seedCtx, NULL), ret); } if (hasEnt) { ret = CRYPT_EAL_RandInit(algId, &seedMeth, seedCtx, pers, persLen); } else { ret = CRYPT_EAL_RandInit(algId, NULL, seedCtx, pers, persLen); } if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } ERR: return ret; } int32_t CRYPT_EAL_ProviderRandInitCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, const uint8_t *pers, uint32_t persLen, BSL_Param *param) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderRandInitCtxInner(libCtx, algId, attrName, pers, persLen, param); #else (void) libCtx; (void) attrName; return CRYPT_EAL_NoProviderRandInitCtxInner(algId, pers, persLen, param); #endif } void CRYPT_EAL_RandDeinitEx(CRYPT_EAL_LibCtx *libCtx) { #ifdef HITLS_CRYPTO_PROVIDER CRYPT_EAL_LibCtx *localLibCtx = libCtx; if (localLibCtx == NULL) { localLibCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localLibCtx == NULL) { return; } EAL_RandDeinit(localLibCtx->drbg); localLibCtx->drbg = NULL; return; #else (void) libCtx; CRYPT_EAL_RandDeinit(); return; #endif } void CRYPT_EAL_RandDeinit(void) { EAL_RandDeinit(g_globalRndCtx); g_globalRndCtx = NULL; return; } #ifdef HITLS_CRYPTO_PROVIDER int32_t CRYPT_EAL_RandbytesWithAdinEx(CRYPT_EAL_LibCtx *libCtx, uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { CRYPT_EAL_LibCtx *localCtx = libCtx; if (localCtx == NULL) { localCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } return EAL_DrbgbytesWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, byte, len, addin, addinLen); } #endif int32_t CRYPT_EAL_RandbytesEx(CRYPT_EAL_LibCtx *libCtx, uint8_t *byte, uint32_t len) { #ifdef HITLS_CRYPTO_PROVIDER CRYPT_EAL_LibCtx *localCtx = libCtx; if (localCtx == NULL) { localCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } return EAL_DrbgbytesWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, byte, len, NULL, 0); #else (void) libCtx; return CRYPT_EAL_Randbytes(byte, len); #endif } int32_t CRYPT_EAL_RandSeedEx(CRYPT_EAL_LibCtx *libCtx) { #ifdef HITLS_CRYPTO_PROVIDER CRYPT_EAL_LibCtx *localCtx = libCtx; if (localCtx == NULL) { localCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } return EAL_DrbgSeedWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, NULL, 0); #else (void) libCtx; return CRYPT_EAL_RandSeed(); #endif } #endif // end of HITLS_CRYPTO_EAL && HITLS_CRYPTO_DRBG
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_rand.c
C
unknown
30,091
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG) #include <stdint.h> #include <stdbool.h> #include <securec.h> #include "crypt_eal_rand.h" #include "crypt_errno.h" #include "bsl_errno.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "eal_common.h" #include "crypt_types.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "crypt_drbg.h" #include "crypt_drbg_local.h" #ifdef HITLS_CRYPTO_MD #include "eal_md_local.h" #endif #ifdef HITLS_CRYPTO_MAC #include "eal_mac_local.h" #endif #ifdef HITLS_CRYPTO_CIPHER #include "eal_cipher_local.h" #endif static EAL_RandUnitaryMethod g_randMethod = { .newCtx = (RandDrbgNewCtx)DRBG_New, .inst = (RandDrbgInst)DRBG_Instantiate, .unInst = (RandDrbgUnInst)DRBG_Uninstantiate, .gen = (RandDrbgGen)DRBG_GenerateBytes, .reSeed = (RandDrbgReSeed)DRBG_Reseed, .ctrl = (RandDrbgCtrl)DRBG_Ctrl, .freeCtx = (RandDrbgFreeCtx)DRBG_Free, }; EAL_RandUnitaryMethod* EAL_RandGetMethod(void) { return &g_randMethod; } static int32_t GetRequiredMethod(const DrbgIdMap *map, EAL_RandMethLookup *lu) { switch (map->type) { #ifdef HITLS_CRYPTO_DRBG_HASH case RAND_TYPE_MD: { const EAL_MdMethod *md = EAL_MdFindDefaultMethod(map->depId); if (md == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } lu->methodId = map->depId; lu->method = md; break; } #endif #ifdef HITLS_CRYPTO_DRBG_HMAC case RAND_TYPE_MAC: { lu->method = EAL_MacFindDefaultMethod(map->depId); if (lu->method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } lu->methodId = map->depId; break; } #endif #ifdef HITLS_CRYPTO_DRBG_CTR case RAND_TYPE_SM4_DF: case RAND_TYPE_AES: case RAND_TYPE_AES_DF: { const EAL_SymMethod *ciphMeth = EAL_GetSymMethod(map->depId); if (ciphMeth == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } lu->methodId = map->depId; lu->method = ciphMeth; break; } #endif default: BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } int32_t EAL_RandFindMethod(CRYPT_RAND_AlgId id, EAL_RandMethLookup *lu) { if (lu == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const DrbgIdMap *map = DRBG_GetIdMap(id); if (map == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } int32_t ret = GetRequiredMethod(map, lu); if (ret != CRYPT_SUCCESS) { return ret; } lu->type = map->type; return CRYPT_SUCCESS; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/eal/src/eal_rand_method.c
C
unknown
3,536
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_EALINIT_H #define CRYPT_EALINIT_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ASM_CHECK #include <stdint.h> #ifdef __cplusplus extern "C" { #endif // __cplusplus /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Cipher(CRYPT_CIPHER_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Md(CRYPT_MD_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Pkey(CRYPT_PKEY_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Mac(CRYPT_MAC_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Drbg(CRYPT_RAND_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_ASM_CHECK #endif // CRYPT_EALINIT_H
2302_82127028/openHiTLS-examples_2931
crypto/ealinit/include/crypt_ealinit.h
C
unknown
2,512
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ASM_CHECK #ifdef __cplusplus extern "c" { #endif #include "crypt_errno.h" #include "crypt_utils.h" #include "bsl_err_internal.h" #include "asmcap_local.h" #if defined(HITLS_CRYPTO_CIPHER) #if defined(HITLS_CRYPTO_AES_ASM) int32_t CRYPT_AES_AsmCheck(void) { #if defined(HITLS_CRYPTO_AES_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAES() || !IsSupportSSE2()) { // SetEncryptKey256 uses AVX and SSE2. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #elif defined(HITLS_CRYPTO_AES_ARMV8) if (!IsSupportPMULL() || !IsSupportAES()) { // ARMV8 should support the PMULL instruction sets. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_AES_ASM #if defined(HITLS_CRYPTO_CHACHA20_ASM) int32_t CRYPT_CHACHA20_AsmCheck(void) { #if defined(HITLS_CRYPTO_CHACHA20_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2()) { // The CHACHA20_Update function uses the AVX and AVX2 instruction sets. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_CHACHA20 #if defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM) int32_t CRYPT_POLY1305_AsmCheck(void) { #if defined(HITLS_CRYPTO_CHACHA20POLY1305_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportSSE2()) { // The Poly1305BlockAVX2 function uses AVX, AVX2, and SSE2. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_CHACHA20POLY1305 #if defined(HITLS_CRYPTO_SM4_ASM) int32_t CRYPT_SM4_AsmCheck(void) { #if defined(HITLS_CRYPTO_SM4_X8664) if ((!IsSupportAVX()) || !IsOSSupportAVX() || !IsSupportAVX2() || (!IsSupportAES()) || (!IsSupportMOVBE())) { // The AES instruction is used for the SBOX assembly in the XTS. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #elif (HITLS_CRYPTO_SM4_ARMV8) if (!IsSupportAES()) { // sbox uses the AES instruction. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SM4 #if defined(HITLS_CRYPTO_GCM_ASM) int32_t CRYPT_GHASH_AsmCheck(void) { #if defined(HITLS_CRYPTO_GCM_X8664) if (!IsSupportAVX() || !IsOSSupportAVX()) { // GcmTableGen4bit uses the AVX. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #elif defined(HITLS_CRYPTO_GCM_ARMV8) if (!IsSupportPMULL()) { // In ARMV8, GHASH_BLOCK must support the PMULL instruction set. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_GCM #endif // HITLS_CRYPTO_CIPHER #if defined(HITLS_CRYPTO_MD) #if defined(HITLS_CRYPTO_MD5_ASM) int32_t CRYPT_MD5_AsmCheck(void) { #if defined(HITLS_CRYPTO_MD5_X8664) if (!IsSupportBMI1()) { // MD5_Compress uses the BMI1 instruction set. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_MD5 #if defined(HITLS_CRYPTO_SHA1_ASM) int32_t CRYPT_SHA1_AsmCheck(void) { #if defined(HITLS_CRYPTO_SHA1_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportBMI1() || !IsSupportBMI2()) { // The SHA1_Step function uses the AVX, AVX2, BMI1, and BMI2 instruction sets. return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SHA1 #if defined(HITLS_CRYPTO_SHA2_ASM) int32_t CRYPT_SHA2_AsmCheck(void) { #if defined(HITLS_CRYPTO_SHA2_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportBMI1() || !IsSupportBMI2()) { // The SHA*CompressMultiBlocks_Asm function uses the AVX, AVX2, BMI1, and BMI2 instruction sets. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SHA2 #if defined(HITLS_CRYPTO_SM3_ASM) int32_t CRYPT_SM3_AsmCheck(void) { #if defined(HITLS_CRYPTO_SM3_X8664) if (!IsSupportMOVBE()) { // MOVBE is used in the SM3_CompressAsm function. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SM3 #endif // HITLS_CRYPTO_MD #if defined(HITLS_CRYPTO_PKEY) #if defined(HITLS_CRYPTO_BN_ASM) int32_t CRYPT_BN_AsmCheck(void) { return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_BN #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) int32_t CRYPT_ECP256_AsmCheck(void) { #if defined(HITLS_CRYPTO_ECC_X8664) if (!IsSupportAVX() || !IsOSSupportAVX()) { // ECP256_OrdSqr uses AVX. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_ECC #endif // HITLS_CRYPTO_PKEY #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ASM_CHECK
2302_82127028/openHiTLS-examples_2931
crypto/ealinit/src/asmcap_alg_asm.c
C
unknown
6,038
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ASMCAP_LOCAL_H #define ASMCAP_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ASM_CHECK #include "crypt_ealinit.h" #ifdef __cplusplus extern "c" { #endif #if defined(HITLS_CRYPTO_CIPHER) #if defined(HITLS_CRYPTO_AES_ASM) int32_t CRYPT_AES_AsmCheck(void); #endif // HITLS_CRYPTO_AES_ASM #if defined(HITLS_CRYPTO_CHACHA20_ASM) int32_t CRYPT_CHACHA20_AsmCheck(void); #endif // HITLS_CRYPTO_CHACHA20 #if defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM) int32_t CRYPT_POLY1305_AsmCheck(void); #endif // HITLS_CRYPTO_CHACHA20POLY1305 #if defined(HITLS_CRYPTO_SM4_ASM) int32_t CRYPT_SM4_AsmCheck(void); #endif // HITLS_CRYPTO_SM4 #if defined(HITLS_CRYPTO_GCM_ASM) int32_t CRYPT_GHASH_AsmCheck(void); #endif // HITLS_CRYPTO_GCM #endif // HITLS_CRYPTO_CIPHER #if defined(HITLS_CRYPTO_MD) #if defined(HITLS_CRYPTO_MD5_ASM) int32_t CRYPT_MD5_AsmCheck(void); #endif // HITLS_CRYPTO_MD5 #if defined(HITLS_CRYPTO_SHA1_ASM) int32_t CRYPT_SHA1_AsmCheck(void); #endif // HITLS_CRYPTO_SHA1 #if defined(HITLS_CRYPTO_SHA2_ASM) int32_t CRYPT_SHA2_AsmCheck(void); #endif // HITLS_CRYPTO_SHA2 #if defined(HITLS_CRYPTO_SM3_ASM) int32_t CRYPT_SM3_AsmCheck(void); #endif // HITLS_CRYPTO_SM3 #endif // HITLS_CRYPTO_MD #if defined(HITLS_CRYPTO_PKEY) #if defined(HITLS_CRYPTO_BN_ASM) int32_t CRYPT_BN_AsmCheck(void); #endif // HITLS_CRYPTO_BN_ASM #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) int32_t CRYPT_ECP256_AsmCheck(void); #endif // HITLS_CRYPTO_ECC #endif // HITLS_CRYPTO_PKEY #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ASM_CHECK #endif // ASMCAP_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/ealinit/src/asmcap_local.h
C
unknown
2,112
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "crypt_utils.h" #ifdef __x86_64__ #include <cpuid.h> #include "securec.h" CpuInstrSupportState g_cpuState = {0}; /* Obtain whether the CPU supports the SIMD instruction set through the cpuid instruction. */ void GetCpuId(uint32_t eax, uint32_t ecx, uint32_t cpuId[CPU_ID_OUT_U32_CNT]) { uint32_t eaxOut, ebxOut, ecxOut, edxOut; __asm("cpuid": "=a"(eaxOut), "=b"(ebxOut), "=c"(ecxOut), "=d"(edxOut): "a"(eax), "c"(ecx):); cpuId[EAX_OUT_IDX] = eaxOut; cpuId[EBX_OUT_IDX] = ebxOut; cpuId[ECX_OUT_IDX] = ecxOut; cpuId[EDX_OUT_IDX] = edxOut; } /* Obtain whether the OS supports the SIMD instruction set by using the xgetbv instruction. */ static uint32_t GetExCtl(uint32_t ecx) { uint32_t ret = 0; __asm("xgetbv": "=a"(ret): "c"(ecx):); return ret; } bool IsSupportBMI1(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_BMI; } bool IsSupportMOVBE(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_MOVBE; } bool IsSupportBMI2(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_BMI2; } bool IsSupportADX(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_ADX; } bool IsSupportSSE(void) { return g_cpuState.code1Out[EDX_OUT_IDX] & bit_SSE; } bool IsSupportSSE2(void) { return g_cpuState.code1Out[EDX_OUT_IDX] & bit_SSE2; } bool IsSupportAVX(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_AVX; } bool IsSupportAES(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_AES; } bool IsSupportSSE3(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_SSE3; } bool IsSupportAVX2(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX2; } bool IsSupportAVX512F(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512F; } bool IsSupportAVX512DQ(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512DQ; } bool IsSupportAVX512VL(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512VL; } bool IsSupportAVX512BW(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512BW; } bool IsSupportXSAVE(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_XSAVE; } bool IsSupportOSXSAVE(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_OSXSAVE; } bool IsOSSupportAVX(void) { return g_cpuState.osSupportAVX; } bool IsOSSupportAVX512(void) { return g_cpuState.osSupportAVX512; } /* ARM */ #elif defined(__arm__) || defined (__arm) || defined(__aarch64__) #include "crypt_arm.h" uint32_t g_cryptArmCpuInfo = 0; #if defined(HITLS_CRYPTO_NO_AUXVAL) #include <setjmp.h> #include <signal.h> static jmp_buf g_jump_buffer; void signal_handler(int sig) { (void)sig; longjmp(g_jump_buffer, 1); } void getarmcap(void) { struct sigaction sa, old_sa; sa.sa_handler = signal_handler; sigemptyset(&sa.sa_mask); sa.sa_flags = 0; sigaction(SIGILL, &sa, &old_sa); // NEON if (setjmp(g_jump_buffer) == 0) { #if defined(__ARM_NEON) || defined(__aarch64__) // ORR v0.16b, v0.16b, v0.16b __asm__ volatile (".inst 0x4ea01c00" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_NEON; #endif #if defined(__aarch64__) // AES if (setjmp(g_jump_buffer) == 0) { // aese v0.16b, v0.16b __asm__ volatile (".inst 0x4e284800" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_AES; } // PMULL if (setjmp(g_jump_buffer) == 0) { // pmull v0.1q, v0.1d, v0.1d __asm__ volatile (".inst 0x0ee0e000" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_PMULL; } // SHA1 if (setjmp(g_jump_buffer) == 0) { // sha1h s0, s0 __asm__ volatile (".inst 0x5e280800" : : : "s0"); g_cryptArmCpuInfo |= CRYPT_ARM_SHA1; } // SHA256 if (setjmp(g_jump_buffer) == 0) { // sha256su0 v0.4s, v0.4s __asm__ volatile (".inst 0x5e282800" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_SHA256; } // SHA512 if (setjmp(g_jump_buffer) == 0) { // sha512su0 v0.2d, v0.2d __asm__ volatile (".inst 0xcec08000" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_SHA512; } #endif } sigaction(SIGILL, &old_sa, NULL); } #else #include <sys/auxv.h> static bool g_supportNEON = {0}; bool IsSupportAES(void) { return g_cryptArmCpuInfo & CRYPT_ARM_AES; } bool IsSupportPMULL(void) { return g_cryptArmCpuInfo & CRYPT_ARM_PMULL; } bool IsSupportSHA1(void) { return g_cryptArmCpuInfo & CRYPT_ARM_SHA1; } bool IsSupportSHA256(void) { return g_cryptArmCpuInfo & CRYPT_ARM_SHA256; } bool IsSupportNEON(void) { return g_supportNEON; } #if defined(__aarch64__) bool IsSupportSHA512(void) { return g_cryptArmCpuInfo & CRYPT_ARM_SHA512; } #endif // __aarch64__ #endif // HITLS_CRYPTO_NO_AUXVAL #endif // x86_64 || __arm__ || __arm || __aarch64__ void GetCpuInstrSupportState(void) { #ifdef __x86_64__ uint32_t cpuId[CPU_ID_OUT_U32_CNT]; uint64_t xcr0; /* SIMD CPU support */ GetCpuId(0x1, 0, cpuId); (void)memcpy_s(g_cpuState.code1Out, CPU_ID_OUT_U32_CNT * sizeof(uint32_t), cpuId, CPU_ID_OUT_U32_CNT * sizeof(uint32_t)); GetCpuId(0x7, 0, cpuId); (void)memcpy_s(g_cpuState.code7Out, CPU_ID_OUT_U32_CNT * sizeof(uint32_t), cpuId, CPU_ID_OUT_U32_CNT * sizeof(uint32_t)); /* SIMD OS support */ if (IsSupportXSAVE() && IsSupportOSXSAVE()) { xcr0 = GetExCtl(0); bool sse = xcr0 & XCR0_BIT_SSE; bool avx = xcr0 & XCR0_BIT_AVX; g_cpuState.osSupportAVX = sse && avx; bool opmask = xcr0 & XCR0_BIT_OPMASK; bool zmmLow = xcr0 & XCR0_BIT_ZMM_LOW; bool zmmHigh = xcr0 & XCR0_BIT_ZMM_HIGH; g_cpuState.osSupportAVX512 = opmask && zmmLow && zmmHigh; } #elif defined(__arm__) || defined (__arm) || defined(__aarch64__) #if defined(HITLS_CRYPTO_NO_AUXVAL) getarmcap(); #else // HITLS_CRYPTO_NO_AUXVAL g_supportNEON = getauxval(CRYPT_CAP) & CRYPT_ARM_NEON; if (g_supportNEON) { g_cryptArmCpuInfo = (uint32_t)getauxval(CRYPT_CE); } #endif // HITLS_CRYPTO_NO_AUXVAL #endif // defined(__arm__) || defined (__arm) || defined(__aarch64__) }
2302_82127028/openHiTLS-examples_2931
crypto/ealinit/src/cpucap.c
C
unknown
6,773
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "bsl_init.h" #include "bsl_err_internal.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "crypt_eal_rand.h" #include "crypt_utils.h" #include "asmcap_local.h" #include "crypt_ealinit.h" #include "crypt_util_rand.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_provider.h" #include "crypt_provider.h" #endif #include "crypt_eal_init.h" static uint64_t g_ealInitOpts = 0; #if defined(HITLS_CRYPTO_PROVIDER) static int32_t ProviderModuleInit(uint64_t initOpt, int32_t alg) { (void) alg; int32_t ret = CRYPT_SUCCESS; if (initOpt & CRYPT_EAL_INIT_PROVIDER && (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER) == 0) { ret = CRYPT_EAL_InitPreDefinedProviders(); if (ret != CRYPT_SUCCESS) { return ret; } g_ealInitOpts |= CRYPT_EAL_INIT_PROVIDER; } #if defined(HITLS_CRYPTO_DRBG) if (initOpt & CRYPT_EAL_INIT_PROVIDER_RAND && (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER_RAND) == 0) { ret = CRYPT_EAL_ProviderRandInitCtx(NULL, alg, "provider=default", NULL, 0, NULL); if (ret != CRYPT_SUCCESS) { return ret; } g_ealInitOpts |= CRYPT_EAL_INIT_PROVIDER_RAND; } #endif return ret; } static void ProviderModuleFree(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_PROVIDER) || (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER) == 0) { return; } CRYPT_EAL_FreePreDefinedProviders(); } #else static int32_t ProviderModuleInit(uint64_t initOpt, int32_t alg) { (void) initOpt; (void) alg; return CRYPT_SUCCESS; } static void ProviderModuleFree(uint64_t initOpt) { (void) initOpt; return; } #endif #if defined(HITLS_BSL_INIT) static int32_t BslModuleInit(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_BSL) || (g_ealInitOpts & CRYPT_EAL_INIT_BSL) != 0) { return BSL_SUCCESS; } int32_t ret = BSL_GLOBAL_Init(); if (ret == BSL_SUCCESS) { g_ealInitOpts |= CRYPT_EAL_INIT_BSL; } return ret; } static void BslModuleFree(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_BSL) || (g_ealInitOpts & CRYPT_EAL_INIT_BSL) == 0) { return; } BSL_GLOBAL_DeInit(); } #else static int32_t BslModuleInit(uint64_t initOpt) { (void) initOpt; return CRYPT_SUCCESS; } static void BslModuleFree(uint64_t initOpt) { (void) initOpt; return; } #endif #if defined(HITLS_CRYPTO_DRBG) static void RandModuleFree(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_RAND) || (g_ealInitOpts & CRYPT_EAL_INIT_RAND) == 0) { return; } CRYPT_EAL_RandDeinit(); } static int32_t RandModuleInit(uint64_t initOpt, int32_t alg) { if (!(initOpt & CRYPT_EAL_INIT_RAND) || (g_ealInitOpts & CRYPT_EAL_INIT_RAND) != 0) { return BSL_SUCCESS; } int32_t ret = CRYPT_EAL_RandInit(alg, NULL, NULL, NULL, 0); if (ret == CRYPT_SUCCESS) { g_ealInitOpts |= CRYPT_EAL_INIT_RAND; } return ret; } #else static void RandModuleFree(uint64_t initOpt) { (void) initOpt; return; } static int32_t RandModuleInit(uint64_t initOpt, int32_t alg) { (void) alg; (void) initOpt; return CRYPT_SUCCESS; } #endif static int32_t GlobalLockInit(uint64_t initOpt, int32_t alg) { (void) alg; if ((initOpt & CRYPT_EAL_INIT_LOCK) == 0 || (g_ealInitOpts & CRYPT_EAL_INIT_LOCK) != 0) { return CRYPT_SUCCESS; } #ifdef HITLS_CRYPTO_ENTROPY int32_t ret = EAL_SeedDrbgLockInit(); if (ret != CRYPT_SUCCESS) { return ret; } #endif g_ealInitOpts |= CRYPT_EAL_INIT_LOCK; return CRYPT_SUCCESS; } static void GlobalLockFree(uint64_t initOpt) { if ((initOpt & CRYPT_EAL_INIT_LOCK) == 0 || (g_ealInitOpts & CRYPT_EAL_INIT_LOCK) == 0) { return; } #ifdef HITLS_CRYPTO_ENTROPY EAL_SeedDrbgLockDeInit(); #endif return; } #if defined(HITLS_EAL_INIT_OPTS) static bool g_ealInitOptsFlags = false; #endif #if defined(HITLS_EAL_INIT_OPTS) __attribute__((constructor(102))) int32_t CRYPT_EAL_Init(uint64_t opts) #else int32_t CRYPT_EAL_Init(uint64_t opts) #endif { int32_t ret = CRYPT_SUCCESS; uint64_t initOpt = opts; #if defined(HITLS_EAL_INIT_OPTS) if (!g_ealInitOptsFlags) { initOpt = HITLS_EAL_INIT_OPTS; g_ealInitOptsFlags = true; } #endif #if defined(HITLS_CRYPTO_INIT_RAND_ALG) int32_t alg = HITLS_CRYPTO_INIT_RAND_ALG; #else int32_t alg = CRYPT_RAND_SHA256; #endif if ((initOpt & CRYPT_EAL_INIT_CPU) && (g_ealInitOpts & CRYPT_EAL_INIT_CPU) == 0) { GetCpuInstrSupportState(); g_ealInitOpts |= CRYPT_EAL_INIT_CPU; } ret = BslModuleInit(initOpt); if (ret != CRYPT_SUCCESS) { return ret; } ret = ProviderModuleInit(initOpt, alg); if (ret != CRYPT_SUCCESS) { BslModuleFree(initOpt); return ret; } ret = RandModuleInit(initOpt, alg); if (ret != CRYPT_SUCCESS) { BslModuleFree(initOpt); ProviderModuleFree(initOpt); return ret; } ret = GlobalLockInit(initOpt, alg); if (ret != CRYPT_SUCCESS) { RandModuleFree(initOpt); BslModuleFree(initOpt); ProviderModuleFree(initOpt); return ret; } return ret; } #if defined(HITLS_EAL_INIT_OPTS) __attribute__((destructor(101))) void CRYPT_EAL_Cleanup(uint64_t opts) #else void CRYPT_EAL_Cleanup(uint64_t opts) #endif { uint64_t initOpt = opts; #if defined(HITLS_EAL_INIT_OPTS) initOpt = HITLS_EAL_INIT_OPTS; #endif ProviderModuleFree(initOpt); RandModuleFree(initOpt); BslModuleFree(initOpt); GlobalLockFree(initOpt); g_ealInitOpts = 0; } #ifdef HITLS_CRYPTO_ASM_CHECK typedef int (*HITLS_ASM_CHECK_CALLBACK)(void); typedef struct EAL_CheckAsm { uint32_t id; HITLS_ASM_CHECK_CALLBACK callback[2]; } EAL_CheckAsm; static int32_t CryptCheckCapId(const BslCid id, const EAL_CheckAsm asmlist[], uint32_t len) { for (uint32_t i = 0; i < len; i++) { if (asmlist[i].id != id) { continue; } for (uint32_t j = 0; j < 2; j++) { // 2 means Alg and Method if (asmlist[i].callback[j] != NULL && asmlist[i].callback[j]() != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } } } return CRYPT_SUCCESS; } static const EAL_CheckAsm HITLS_ASM_SYM_ALG_CHECK[] = { /* symmetric encryption/decryption combination algorithm ID */ #if defined(HITLS_CRYPTO_AES_ASM) {.id = CRYPT_CIPHER_AES128_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_XTS, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_XTS, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}}, #if defined(HITLS_CRYPTO_GCM_ASM) {.id = CRYPT_CIPHER_AES128_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}}, {.id = CRYPT_CIPHER_AES192_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}}, {.id = CRYPT_CIPHER_AES256_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}}, #endif // HITLS_CRYPTO_GCM_ASM {.id = CRYPT_CIPHER_AES128_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, #endif // HITLS_CRYPTO_AES_ASM #if defined(HITLS_CRYPTO_CHACHA20_ASM) || defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM) {.id = CRYPT_CIPHER_CHACHA20_POLY1305, .callback = {CRYPT_CHACHA20_AsmCheck, CRYPT_POLY1305_AsmCheck}}, #endif // HITLS_CRYPTO_CHACHA20POLY1305_ASM #if defined(HITLS_CRYPTO_SM4_ASM) {.id = CRYPT_CIPHER_SM4_XTS, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_CBC, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_ECB, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_CTR, .callback = {CRYPT_SM4_AsmCheck, NULL}}, #if defined(HITLS_CRYPTO_GCM_ASM) {.id = CRYPT_CIPHER_SM4_GCM, .callback = {CRYPT_SM4_AsmCheck, CRYPT_GHASH_AsmCheck}}, #endif // HITLS_CRYPTO_GCM_ASM {.id = CRYPT_CIPHER_SM4_CFB, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_OFB, .callback = {CRYPT_SM4_AsmCheck, NULL}}, #endif // HITLS_CRYPTO_SM4 {.id = CRYPT_CIPHER_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Cipher(CRYPT_CIPHER_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_SYM_ALG_CHECK, sizeof(HITLS_ASM_SYM_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #if defined(HITLS_CRYPTO_MD) static const EAL_CheckAsm HITLS_ASM_MD_ALG_CHECK[] = { /* hash algorithm ID */ #if defined(HITLS_CRYPTO_MD5_ASM) {.id = CRYPT_MD_MD5, .callback = {CRYPT_MD5_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA1_ASM) {.id = CRYPT_MD_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA2_ASM) {.id = CRYPT_MD_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MD_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MD_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MD_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM3_ASM) {.id = CRYPT_MD_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}}, #endif {.id = CRYPT_MD_MAX, .callback = {NULL, NULL}}, }; #endif int32_t CRYPT_ASMCAP_Md(CRYPT_MD_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_MD_ALG_CHECK, sizeof(HITLS_ASM_MD_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #if defined(HITLS_CRYPTO_PKEY) static const EAL_CheckAsm HITLS_ASM_PKEY_ALG_CHECK[] = { /* Asymmetric algorithm ID */ #if defined(HITLS_CRYPTO_BN_ASM) {.id = CRYPT_PKEY_DSA, .callback = {CRYPT_BN_AsmCheck, NULL}}, {.id = CRYPT_PKEY_RSA, .callback = {CRYPT_BN_AsmCheck, NULL}}, {.id = CRYPT_PKEY_DH, .callback = {CRYPT_BN_AsmCheck, NULL}}, #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) {.id = CRYPT_PKEY_ECDSA, .callback = {CRYPT_BN_AsmCheck, CRYPT_ECP256_AsmCheck}}, {.id = CRYPT_PKEY_ECDH, .callback = {CRYPT_BN_AsmCheck, CRYPT_ECP256_AsmCheck}}, #endif {.id = CRYPT_PKEY_SM2, .callback = {CRYPT_BN_AsmCheck, NULL}}, #endif {.id = CRYPT_PKEY_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Pkey(CRYPT_PKEY_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_PKEY_ALG_CHECK, sizeof(HITLS_ASM_PKEY_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #endif // HITLS_CRYPTO_PKEY #if defined(HITLS_CRYPTO_DRBG) static const EAL_CheckAsm HITLS_ASM_DRBG_ALG_CHECK[] = { /* RAND algorithm ID */ #if defined(HITLS_CRYPTO_SHA1_ASM) {.id = CRYPT_RAND_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA2_ASM) {.id = CRYPT_RAND_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM3_ASM) {.id = CRYPT_RAND_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_AES_ASM) {.id = CRYPT_RAND_AES128_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES192_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES256_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES128_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES192_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES256_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM4_ASM) {.id = CRYPT_RAND_SM4_CTR_DF, .callback = {CRYPT_SM4_AsmCheck, NULL}}, #endif {.id = CRYPT_RAND_ALGID_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Drbg(CRYPT_RAND_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_DRBG_ALG_CHECK, sizeof(HITLS_ASM_DRBG_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #endif // HITLS_CRYPTO_DRBG #if defined(HITLS_CRYPTO_MAC) static const EAL_CheckAsm HITLS_ASM_MAC_ALG_CHECK[] = { /* MAC algorithm ID */ #if defined(HITLS_CRYPTO_MD5_ASM) {.id = CRYPT_MAC_HMAC_MD5, .callback = {CRYPT_MD5_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA1_ASM) {.id = CRYPT_MAC_HMAC_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA2_ASM) {.id = CRYPT_MAC_HMAC_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MAC_HMAC_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MAC_HMAC_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MAC_HMAC_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM3_ASM) {.id = CRYPT_MAC_HMAC_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_AES_ASM) {.id = CRYPT_MAC_CMAC_AES128, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_CMAC_AES192, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_CMAC_AES256, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_GMAC_AES128, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_GMAC_AES192, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_GMAC_AES256, .callback = {CRYPT_AES_AsmCheck, NULL}}, #endif {.id = CRYPT_MAC_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Mac(CRYPT_MAC_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_MAC_ALG_CHECK, sizeof(HITLS_ASM_MAC_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #endif // HITLS_CRYPTO_MAC #endif /* HITLS_CRYPTO_ASM_CHECK */
2302_82127028/openHiTLS-examples_2931
crypto/ealinit/src/crypt_init.c
C
unknown
15,574
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ECC_H #define CRYPT_ECC_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_bn.h" #include "crypt_algid.h" #include "crypt_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /** * Elliptic Curve Point Information */ typedef struct EccPointInfo ECC_Point; /** * Elliptic Curve Parameter Information */ typedef struct EccPara ECC_Para; /** * Point information of elliptic curve scalar after recoding */ typedef struct { int8_t *num; uint32_t *wide; uint32_t size; uint32_t baseBits; // Indicates the offset start address of the first block. uint32_t offset; } ReCodeData; /** * @ingroup ecc * @brief Creating curve parameters * * @param id [IN] Curve enumeration * * @retval Not NULL Success * @retval NULL failure */ ECC_Para *ECC_NewPara(CRYPT_PKEY_ParaId id); /** * @ingroup ecc * @brief Curve parameter release * * @param para [IN] Curve parameter information. The para is set NULL by the invoker. * * @retval None */ void ECC_FreePara(ECC_Para *para); /** * @ingroup ecc * @brief Read the curve parameter ID. * * @param para [IN] Curve parameter information * * @retval Curve ID */ CRYPT_PKEY_ParaId ECC_GetParaId(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the curve parameter ID based on the curve parameter information. * * @param eccpara [IN] Curve parameter information * * @retval Curve ID */ CRYPT_PKEY_ParaId GetCurveId(const CRYPT_EccPara *eccPara); /** * @ingroup ecc * @brief Point creation * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ ECC_Point *ECC_NewPoint(const ECC_Para *para); /** * @ingroup ecc * @brief Point Release * * @param pt [IN] Point data, pt is set to null by the invoker. * * @retval none */ void ECC_FreePoint(ECC_Point *pt); /** * @ingroup ecc * @brief Point copy * * @param dst [OUT] The copied point information * @param src [IN] Input * * @retval Not NULL Success * @retval NULL failure */ int32_t ECC_CopyPoint(ECC_Point *dst, const ECC_Point *src); /** * @ingroup ecc * @brief Generate a point data with the same content. * * @param pt [IN] Input point information * * @retval Not NULL Success * @retval NULL failure */ ECC_Point *ECC_DupPoint(const ECC_Point *pt); /** * @ingroup ecc * @brief Check if a and b are the same point * * @param para [IN] Curve parameter information * @param a [IN] Point a in Jacobian coordinate * @param b [IN] Point b in Jacobian coordinate * * @retval CRYPT_SUCCESS The two points are the same. * @retval CRYPT_ECC_POINT_NOT_EQUAL The two points are different. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get coordinates. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param x [OUT] x/z^2 * @param y [OUT] y/z^3 * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_GetPoint(const ECC_Para *para, ECC_Point *pt, CRYPT_Data *x, CRYPT_Data *y); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get coordinats. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param x [OUT] x/z^2 * @param y [OUT] y/z^3 * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_GetPoint2Bn(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x, BN_BigNum *y); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get x/z^2 * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param x [OUT] x/z^2 * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_GetPointDataX(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x); /** * @ingroup ecc * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G, where G is the generator * The pre-computation table under the para parameter will be updated. * * @param para [IN] Curve parameter information * @param r [OUT] Scalar multiplication * @param k [IN] Scalar * @param pt [IN] Point data, which can be NULL. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @ingroup ecc * @brief Calculate r = k1 * G + k2 * pt, where G is the generator. * * @param para [IN] Curve parameter information * @param r [OUT] Point k1 * G + k2 * pt * @param k1 [IN] Scalar k1 * @param k2 [IN] Scalar k2 * @param pt [IN] Point pt * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and encode point. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param data [OUT] Data stream * @param dataLen [IN/OUT] The input is the buff length of data and the output is the valid length of data. * @param format [IN] Encoding format * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format); /** * @ingroup ecc * @brief Encode the data stream into point information. * * @param para [IN] Curve parameter information * @param pt [OUT] Point in affine coordinate(z=1) * @param data [IN] Data stream * @param dataLen [IN] Data stream length * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen); /** * @ingroup ecc * @brief Obtain the parameter value h based on the curve parameter. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaH(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the parameter value n based on the curve parameter. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaN(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coefficient a based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaA(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coefficient b based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaB(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coordinate x of the base point G based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaX(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coordinate y of the base point G based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaY(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain bit length of parameter p based on the curve parameter. * * @param para [IN] Curve parameter information * * @retval Return the specification unit of the curve parameter is bits. 0 is returned when an error occurs. */ uint32_t ECC_ParaBits(const ECC_Para *para); /** * @ingroup ecc * @brief Generate a curve parameter with the same content. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ ECC_Para *ECC_DupPara(const ECC_Para *para); /** * @ingroup ecc * @brief Check whether the point is valid. * * @param pt [IN] Point information * * @retval CRYPT_SUCCESS This point is valid. * @retval CRYPT_ECC_POINT_AT_INFINITY The point is an infinite point (0 point). * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointCheck(const ECC_Point *pt); /** * @ingroup ecc * @brief Obtain the generator(with z=1) based on curve parameters. * * @param para [IN] Curve parameters * * @retval Not NULL Success * @retval NULL failure */ ECC_Point *ECC_GetGFromPara(const ECC_Para *para); /** * @ingroup ecc * @brief Scalar re-encoding to obtain the encoded data whose window is the 'window'. * * @param k [IN] Curve parameters * @param window [IN] Window size * * @retval Not NULL Success * @retval NULL failure */ ReCodeData *ECC_ReCodeK(const BN_BigNum *k, uint32_t window); /** * @ingroup ecc * @brief Release the encoded data. * * @param code [IN/OUT] Data to be released. The code is set NULL by the invoker. * * @retval None */ void ECC_ReCodeFree(ReCodeData *code); /** * @brief Calculate r = 1/a mod para->n * * @param para [IN] Curve parameter information * @param r [OUT] Output modulus inverse value * @param a [IN] Input BigNum that needs to be inverted. * * @retval CRYPT_SUCCESS set successfully. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); /** * @ingroup ecc * @brief Calculate addition r = a + b * * @param para [IN] Curve parameter * @param r [OUT] Point r = a + b * @param a [IN] Point a * @param b [IN] Point b * * @retval CRYPT_SUCCESS succeeded. * @retval For other errors, see crypt_errno.h. */ int32_t ECC_PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief ecc get security bits * * @param para [IN] ecc Context structure * * @retval security bits */ int32_t ECC_GetSecBits(const ECC_Para *para); /** * @ingroup ecc * @brief Randomize z for preventing attack. * Converting a point (x, y, z) -> (x/z0^2, y/z0^3, z*z0) * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECC_PointBlind(const ECC_Para *para, ECC_Point *pt); /** * @ingroup ecc * @brief convert ecc point to mont form * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECC_PointToMont(const ECC_Para *para, ECC_Point *pt, BN_Optimizer *opt); /** * @ingroup ecc * @brief recover ecc point from mont form * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ void ECC_PointFromMont(const ECC_Para *para, ECC_Point *r); /** * @ingroup ecc * @brief convert ecc point to mont form * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @param libCtx [IN] Pointer to the library context * @param para [OUT] Pointer to the elliptic curve parameters */ void ECC_SetLibCtx(void *libCtx, ECC_Para *para); #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // CRYPT_ECC_H
2302_82127028/openHiTLS-examples_2931
crypto/ecc/include/crypt_ecc.h
C
unknown
12,530
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ECC_PKEY_H #define CRYPT_ECC_PKEY_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_bn.h" #include "crypt_ecc.h" #include "crypt_algid.h" #include "bsl_params.h" #include "sal_atomic.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif #ifndef CRYPT_ECC_TRY_MAX_CNT #define CRYPT_ECC_TRY_MAX_CNT 100 // Maximum number of attempts to generate keys and signatures #endif /* ECC key context */ typedef struct ECC_PkeyCtx { BN_BigNum *prvkey; // Private key ECC_Point *pubkey; // Public key ECC_Para *para; // Key parameter CRYPT_PKEY_PointFormat pointFormat; // Public key point format uint32_t useCofactorMode; // Indicates whether to use the cofactor mode. 1 indicates yes, and 0 indicates no. BSL_SAL_RefCount references; void *libCtx; char *mdAttr; } ECC_Pkey; /** * @ingroup ecc * @brief After the copied ECC context is used up, call the ECC_FreeCtx to release the memory. * * @param ctx [IN] Source ECC context * * @return ECC_Pkey ECC context pointer * If the operation fails, null is returned. */ ECC_Pkey *ECC_DupCtx(ECC_Pkey *ctx); /** * @ingroup ecc * @brief ecc Release the key context structure * * @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void ECC_FreeCtx(ECC_Pkey *ctx); /** * @ingroup ecc * @brief Obtain the valid length of the key, which is used before obtaining the private key. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t Valid key length greater than 0 */ uint32_t ECC_PkeyGetBits(const ECC_Pkey *ctx); /** * @ingroup ecc * @brief Obtain curve parameters. * * @param pkey [IN] Curve parameter information * @param eccPara [OUT] Curve parameter information * * @retval CRYPT_SUCCESS * @retval Other failure */ int32_t ECC_GetPara(const ECC_Pkey *pkey, CRYPT_EccPara *eccPara); /** * @ingroup ecc * @brief Generate a public key from the public key. * * @param ctx [IN] ECC key context structure * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error code. Internal ECC calculation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The public key is successfully generated. */ int32_t ECC_GenPublicKey(ECC_Pkey *ctx); /** * @ingroup ecc * @brief Generate the ECC key pair. * * @param ctx [IN] dh Context structure * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error code. Internal ECC calculation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t ECC_PkeyGen(ECC_Pkey *ctx); /** * @ingroup ecc * @brief ECC Set the private key data. * * @param ctx [OUT] ECC context structure * @param prv [IN] Private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPrvKey(ECC_Pkey *ctx, const CRYPT_EccPrv *prv); /** * @ingroup ecc * @brief ECC Set the public key data. * * @param ctx [OUT] ECC context structure * @param pub [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPubKey(ECC_Pkey *ctx, const CRYPT_EccPub *pub); /** * @ingroup ecc * @brief ECC Obtain the private key data. * * @param ctx [IN] ECC context structure * @param prv [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPrvKey(const ECC_Pkey *ctx, CRYPT_EccPrv *prv); /** * @ingroup ecc * @brief ECC Obtain the public key data. * * @param ctx [IN] ECC context structure * @param pub [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPubKey(const ECC_Pkey *ctx, CRYPT_EccPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup ecc * @brief ECC Set the private key data. * * @param ctx [OUT] ECC context structure * @param para [IN] Private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPrvKeyEx(ECC_Pkey *ctx, const BSL_Param *para); /** * @ingroup ecc * @brief ECC Set the public key data. * * @param ctx [OUT] ECC context structure * @param para [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPubKeyEx(ECC_Pkey *ctx, const BSL_Param *para); /** * @ingroup ecc * @brief ECC Obtain the private key data. * * @param ctx [IN] ECC context structure * @param para [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPrvKeyEx(const ECC_Pkey *ctx, BSL_Param *para); /** * @ingroup ecc * @brief ECC Obtain the public key data. * * @param ctx [IN] ECC context structure * @param para [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPubKeyEx(const ECC_Pkey *ctx, BSL_Param *para); /** * @ingroup ecc * @brief Obtain curve parameters. * * @param pkey [IN] Curve parameter information * @param para [OUT] Curve parameter information * * @retval CRYPT_SUCCESS * @retval Other failure */ int32_t ECC_GetParaEx(const ECC_Pkey *ctx, BSL_Param *para); #endif /** * @ingroup ecc * @brief ECC control interface * * @param ctx [IN/OUT] ECC context structure * @param opt [IN] Operation mode. For details, see ECC_CtrlType. * @param val [IN] Input parameter * @param len [IN] val Length * * @retval CRYPT_SUCCESS Set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval ECC_Pkey_ERR_UNSUPPORTED_CTRL_OPTION opt mode not supported */ int32_t ECC_PkeyCtrl(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup ecc * @brief ecc Create a context. * * @param id [IN] elliptic curve ID * @return ECC_Pkey ECC context pointer * If the operation fails, null is returned. */ ECC_Pkey *ECC_PkeyNewCtx(CRYPT_PKEY_ParaId id); /** * @ingroup ecc * @brief ecc Compare public keys and parameters * * @param a [IN] ECC Context structure * @param b [IN] ECC context structure * * @retval CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_KEY_PUBKEY_NOT_EQUAL Public keys are not equal * @retval CRYPT_ECC_POINT_ERR_CURVE_ID Parameter curve IDs are not equal. * @retval CRYPT_ECC_ERR_POINT_FORMAT Point compression formats are not equal * @retval For other error codes, see crypt_errno.h. */ int32_t ECC_PkeyCmp(const ECC_Pkey *a, const ECC_Pkey *b); /** * @ingroup ecc * @brief Set the parameter of the ECC context * * @param ctx [IN] ECC context * @param para [IN] ECC parameter * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_SetPara(ECC_Pkey *ctx, ECC_Para *para); #ifdef HITLS_CRYPTO_ECC_CHECK /** * @ingroup ecc * @brief check the key pair consistency * * @param pkey1 [IN] ecc key context structure * @param pkey2 [IN] ecc key context structure * @param checkType [IN] check type * * @retval CRYPT_SUCCESS check success. * Others. For details, see error code in errno. */ int32_t ECC_PkeyCheck(const ECC_Pkey *pkey1, const ECC_Pkey *pkey2, uint32_t checkType); #endif // HITLS_CRYPTO_ECC_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // CRYPT_ECC_PKEY_H
2302_82127028/openHiTLS-examples_2931
crypto/ecc/include/crypt_ecc_pkey.h
C
unknown
10,209
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include "crypt_arm.h" #include "ecp256_pre_comp_table.s" .arch armv8-a+crypto .file "ecp256_armv8.S" .section .rodata .align 4 .Lpoly: // P .quad 0xffffffffffffffff,0x00000000ffffffff,0x0000000000000000,0xffffffff00000001 .Lone_mont: // R mod P, R = 2^256, = 2^256 - P .quad 0x0000000000000001,0xffffffff00000000,0xffffffffffffffff,0x00000000fffffffe .Lord: // Order, n .quad 0xf3b9cac2fc632551,0xbce6faada7179e84,0xffffffffffffffff,0xffffffff00000000 .LordK: // (2^64 - ord[0]) * ordK = 1 // LordK * Lord, the lower 64 bits are all Fs. // LordK * Lord, The lower 64 bits are all Fs, coincidence? .quad 0xccd1c8aaee00bc4f .Lone: .quad 1, 0, 0, 0 /* Initial z is not set to 1 0000000300000000, 00000001FFFFFFFE, FFFFFFFD00000002, FFFFFFFE00000003 */ .text .globl ECP256_GetPreCompTable .type ECP256_GetPreCompTable,%function .align 4 ECP256_GetPreCompTable: AARCH64_PACIASP adrp x0, g_preCompTable add x0, x0, :lo12:g_preCompTable AARCH64_AUTIASP ret .size ECP256_GetPreCompTable,.-ECP256_GetPreCompTable .globl ECP256_FromMont .type ECP256_FromMont,%function .align 4 ECP256_FromMont: AARCH64_PACIASP stp x29, x30, [sp, #-32]! add x29, sp , #0 stp x19, x20, [sp, #16] ldp x4 , x5 , [x1] ldp x6 , x7 , [x1, #16] adrp x14, .Lpoly+8 add x14,x14,:lo12:.Lpoly+8 ldr x12,[x14] ldr x13,[x14,#16] adrp x2, .Lone // &bp[0] add x2, x2, :lo12:.Lone bl ECP256_MulCore ldp x19, x20, [sp , #16] ldp x29, x30, [sp], #32 AARCH64_AUTIASP ret .size ECP256_FromMont,.-ECP256_FromMont .type ECP256_AddCore,%function .align 4 ECP256_AddCore: AARCH64_PACIASP adds x14, x14, x8 // ret = a+b adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x1 , xzr, xzr // r -= p, p = 0xffffffffffffffff,0x00000000ffffffff,0x0000000000000000,0xffffffff00000001 adds x8 , x14, #1 // x8 = x14 - 0xffffffffffffffff = x14 + 1 sbcs x9 , x15, x12 // x9 = x15 - 0x00000000ffffffff sbcs x10, x16, xzr // x10 = x16 - 0 sbcs x11, x17, x13 // x11 = x17 - 0xffffffff00000001 sbcs xzr, x1 , xzr // Determine whether r-p has borrowing // r = r < p ? r : r-p // x8~x11 saves r-p, x14~x17 saves r csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_AddCore,.-ECP256_AddCore /////////////////////////////////////// // x14~x17 = a[0~3], x8~x11 = b[0~3] // /////////////////////////////////////// .type ECP256_SubCore1,%function .align 4 ECP256_SubCore1: AARCH64_PACIASP subs x14, x14, x8 sbcs x15, x15, x9 sbcs x16, x16, x10 sbcs x17, x17, x11 sbc x1 , xzr, xzr // x1 = CF // r += p subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1 adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff adcs x10, x16, xzr // x10 = x16 + 0 adc x11, x17, x13 // x11 = x17 + 0xffffffff00000001 cmp x1 , xzr // r = borrow==0 ? r : r+p csel x14, x14, x8 , eq csel x15, x15, x9 , eq csel x16, x16, x10, eq csel x17, x17, x11, eq stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_SubCore1,.-ECP256_SubCore1 .type ECP256_SubCore2,%function .align 4 ECP256_SubCore2: AARCH64_PACIASP subs x14, x8 , x14 sbcs x15, x9 , x15 sbcs x16, x10, x16 sbcs x17, x11, x17 sbc x1 , xzr, xzr // x1 = CF // r += p subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1 adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff adcs x10, x16, xzr // x10 = x16 + 0 adc x11, x17, x13 // x11 = x17 + 0xffffffff00000001 cmp x1 , xzr // r = borrow==0 ? r : r+p csel x14, x14, x8 , eq csel x15, x15, x9 , eq csel x16, x16, x10, eq csel x17, x17, x11, eq stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_SubCore2,.-ECP256_SubCore2 .type ECP256_DivBy2Core,%function .align 4 ECP256_DivBy2Core: AARCH64_PACIASP // a+p subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1 adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff adcs x10, x16, xzr // x10 = x16 + 0 adcs x11, x17, x13 // x11 = x17 + 0xffffffff00000001 adc x1 , xzr, xzr // x1 = CF tst x14, #1 // Check whether a is an even number. eq indicates that a is an even number. // a = a Is an even number ? a : a+p csel x14, x14, x8 , eq csel x15, x15, x9 , eq csel x16, x16, x10, eq csel x17, x17, x11, eq csel x1 , xzr, x1 , eq // If a is still a, then x1, which holds the carry, is set to 0. lsr x14, x14, #1 // r >>= 1, Divided by 2. orr x14, x14, x15, lsl#63 // x15 is shifted leftward by 63 bits. The lower 63 bits become 0. // The most significant bit is the least significant bit before the shift. lsr x15, x15, #1 // The most significant bit of x14 is changed to the least significant bit of x15 // to achieve cyclic right shift. orr x15, x15, x16, lsl#63 lsr x16, x16, #1 orr x16, x16, x17, lsl#63 lsr x17, x17, #1 orr x17, x17, x1 , lsl#63 // The most significant bit of the highest block is x1. stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_DivBy2Core,.-ECP256_DivBy2Core .globl ECP256_Neg .type ECP256_Neg,%function .align 4 ECP256_Neg: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 ldp x14, x15, [x1] ldp x16, x17, [x1, #16] mov x8 , xzr mov x9 , xzr mov x10, xzr mov x11, xzr adrp x7, .Lpoly+8 add x7,x7,:lo12:.Lpoly+8 ldr x12,[x7] ldr x13,[x7,#16] // -a = 0 - a bl ECP256_SubCore2 ldp x29, x30, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Neg,.-ECP256_Neg .type ECP256_MulCore,%function .align 4 ECP256_MulCore: AARCH64_PACIASP ldr x3 , [x2] // b[0] mul x14, x4 , x3 umulh x8 , x4 , x3 mul x15, x5 , x3 umulh x9 , x5 , x3 mul x16, x6 , x3 umulh x10, x6 , x3 mul x17, x7 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adc x19, xzr, x11 // x19 = x11 + CF mov x20, xzr lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), x8 = lo(a[0]*b[i]). // The lower 32 bits are shifted to the left by 32 bits, and 0s are padded to the lower bits. lsr x9 , x14, #32 // x9 = The most significant 32 bits of lo(a[0]*b[i]) are shifted rightward by 32 bits // and 0s are padded to the most significant bits. subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr ldr x3 , [x2, #8] // b[1] // lo(a[0~3] * b[i]) mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr // hi(a[0~3] * b[i]) umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), // x8 = lo(a[0]*b[i]). The lower 32 bits are shifted to the left by 32 bits, // and 0s are padded to the lower bits. lsr x9 , x14, #32 // x9 = The most significant 32 bits of lo(a[0]*b[i]) are shifted rightward // by 32 bits and 0s are padded to the most significant bits. subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr ldr x3 , [x2, #8*2] // b[2] // lo(a[0~3] * b[i]) mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr // hi(a[0~3] * b[i]) umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr lsl x8 , x14, #32 // x8 = lq<<32 lsr x9 , x14, #32 // x9 = hq subs x10, x14, x8 // x10 = q - lq<<32 sbc x11, x14, x9 // x11 = q - hq adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr ldr x3 , [x2, #8*3] // b[3] // lo(a[0~3] * b[i]) mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr // hi(a[0~3] * b[i]) umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // last reduction lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), // x8 = The lower 32 bits of (lo(a[0]*b[i])) are shifted to the left by 32 bits, // and 0s are padded to the lower bits. lsr x9 , x14, #32 // x9 = The most significant 32 bits of (lo(a[0]*b[i])) are shifted rightward // by 32 bits and 0s are padded to the most significant bits. subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr // x8~x11 = r - p (r may be greater than p) adds x8 , x14, #1 // x8 = x14 - 0xffffffffffffffff = x14 + 1 sbcs x9 , x15, x12 // x9 = x15 - 0x00000000ffffffff sbcs x10, x16, xzr // x10 = x16 - 0 sbcs x11, x17, x13 // x11 = x17 - 0xffffffff00000001 sbcs xzr, x19, xzr // Determine whether to borrow csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] stp x16, x17, [x0, #8*2] AARCH64_AUTIASP ret .size ECP256_MulCore, .-ECP256_MulCore .type ECP256_SqrCore,%function .align 4 ECP256_SqrCore: AARCH64_PACIASP /****************************************** x7 x1 x20 x19 x17 x16 x15 x14 h0*1 l0*1 h0*2 l0*2 h0*3 l0*3 h1*2 l1*2 h1*3 l1*3 h2*3 l2*3 h3*3 l3*3 h2*2 l2*2 h1*1 l1*1 h0*0 l0*0 *******************************************/ // a[1~3] * a[0] mul x15, x5 , x4 // lo(a[1] * a[0]) umulh x8 , x5 , x4 // hi(a[1] * a[0]) mul x16, x6 , x4 // lo(a[2] * a[0]) umulh x9 , x6 , x4 // hi(a[2] * a[0]) mul x17, x7 , x4 // lo(a[3] * a[0]) umulh x19, x7 , x4 // hi(a[3] * a[0]) adds x16, x16, x8 adcs x17, x17, x9 adc x19, x19, xzr // There will be no more carry. // a[2~3] * a[1] mul x8 , x6 , x5 // lo(a[2] * a[1]) umulh x9 , x6 , x5 // hi(a[2] * a[1]) mul x10, x7 , x5 // lo(a[3] * a[1]) umulh x11, x7 , x5 // hi(a[3] * a[1]) // a[3] * a[2] mul x20, x7 , x6 umulh x1 , x7 , x6 // Add the results of the current round, and then add the acc (register in the note above). adds x9 , x10, x9 adc x10, x11, xzr adds x17, x17, x8 adcs x19, x19, x9 adcs x20, x20, x10 adc x1 , x1 , xzr // a[0-3] has been saved in x4 to x7. // a[0~3] ^ 2 mul x14, x4 , x4 umulh x4 , x4 , x4 mul x8 , x5 , x5 umulh x5 , x5 , x5 mul x9 , x6 , x6 umulh x6 , x6 , x6 mul x10, x7 , x7 umulh x7 , x7 , x7 // acc[1~6] << 1 adds x15, x15, x15 adcs x16, x16, x16 adcs x17, x17, x17 adcs x19, x19, x19 adcs x20, x20, x20 adcs x1 , x1 , x1 adc x2 , xzr, xzr // acc[] += a[] ^ 2 adds x15, x15, x4 adcs x16, x16, x8 adcs x17, x17, x5 adcs x19, x19, x9 adcs x20, x20, x6 adcs x1 , x1 , x10 adc x7 , x7 , x2 // Four rounds of reduce. lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr // Add acc[4-7]. x14~x19 is the current calculation result r. adds x14, x14, x19 adcs x15, x15, x20 adcs x16, x16, x1 adcs x17, x17, x7 adc x19, xzr, xzr // r -= p adds x8 , x14, #1 // subs x8,x14,#-1 sbcs x9 , x15, x12 sbcs x10, x16, xzr sbcs x11, x17, x13 sbcs xzr, x19, xzr // The set CF is used to determine the size relationship between r and p. // r = r-p < 0 ? r : r-p csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_SqrCore,.-ECP256_SqrCore .globl ECP256_Mul .type ECP256_Mul,%function .align 4 ECP256_Mul: AARCH64_PACIASP stp x29, x30, [sp, #-32]! add x29, sp , #0 stp x19, x20, [sp, #16] ldp x4 , x5 , [x1] ldp x6 , x7 , [x1,#16] adrp x3, .Lpoly+8 add x3,x3,:lo12:.Lpoly+8 ldr x12,[x3] ldr x13,[x3,#16] bl ECP256_MulCore ldp x19, x20, [sp , #16] ldp x29, x30, [sp], #32 AARCH64_AUTIASP ret .size ECP256_Mul,.-ECP256_Mul .globl ECP256_Sqr .type ECP256_Sqr,%function .align 4 ECP256_Sqr: AARCH64_PACIASP stp x29, x30, [sp, #-32]! add x29, sp , #0 stp x19, x20, [sp, #16] ldp x4 , x5 , [x1] ldp x6 , x7 , [x1, #16] adrp x3, .Lpoly+8 add x3,x3,:lo12:.Lpoly+8 ldr x12,[x3] ldr x13,[x3,#16] bl ECP256_SqrCore ldp x19, x20, [sp , #16] ldp x29, x30, [sp], #32 AARCH64_AUTIASP ret .size ECP256_Sqr,.-ECP256_Sqr # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl # Deal process: # Z1Z1 = Z12 # U2 = X2*Z1Z1 # S2 = Y2*Z1*Z1Z1 # H = U2-X1 # HH = H2 # I = 4*HH # J = H*I # r = 2*(S2-Y1) # V = X1*I # X3 = r2-J-2*V # Y3 = r*(V-X3)-2*Y1*J # Z3 = (Z1+H)2-Z1Z1-HH .globl ECP256_AddAffine .type ECP256_AddAffine,%function .align 5 ECP256_AddAffine: AARCH64_PACIASP stp x29, x30, [sp, #-80]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] stp x25, x26, [sp, #64] sub sp , sp , #32*10 // Each coordinate is 256 bits, that is, 32 bytes, and a space of 10 coordinates is applied for. // Based on C implementation, z1sqr and S2 lifecycles do not overlap. // You can share one piece of memory and save an extra piece of memory. // x0 to x2 will be used to invoke the interface to transfer parameters. // Therefore, the initial input parameters are saved to x21 to x23. // Obtains the structure members based on the address offset. Each member is 256 bits, that is, 32 bytes. mov x21, x0 // CRYPT_P256_Point *r mov x22, x1 // CRYPT_P256_Point *a mov x23, x2 // CRYPT_P256_AffinePoint *b adrp x14, .Lpoly+8 // p[1] add x14,x14,:lo12:.Lpoly+8 ldr x12,[x14] // p[3] ldr x13,[x14,#16] ldp x4, x5, [x1, #64] // x1+64 = &(a->z[0]), a->z[0] is marked as z1[0] ldp x6, x7, [x1, #64+16] // x1+64+16 = &(a->z[2]) orr x24, x4 , x5 // x24 = z1[0] | z1[1] orr x24, x24, x6 // x24 |= z1[2] orr x24, x24, x7 // x24 |= z1[3] cmp x24, #0 csetm x24, ne // x24 = x24!=0 ? -1 : 0, it means ~iszero(z1), // determine whether point a is (x, y, 0) ldp x8 , x9 , [x2] // x2 = &(b->x[0]), b->x[0] is marked as x2[0] ldp x10, x11, [x2, #16] // x2+16 = &(b->x[2]) ldp x14, x15, [x2, 32] // x2+32 = &(b->y[0]) ldp x16, x17, [x2, #32+16] // x2+32+16 = &(b->y[2]) // x25 = x2[0] | x2[1] | x2[2] | x2[3] | y2[0] | y2[1] | y2[2] | y2[3] orr x25, x8 , x9 orr x25, x25, x10 orr x25, x25, x11 orr x25, x25, x14 orr x25, x25, x15 orr x25, x25, x16 orr x25, x25, x17 cmp x25, #0 csetm x25, ne // x25 = x25!=0 ? -1 : 0, it means ~iszero(x2|y2), // Check whether point b is (0, 0). add x0 , sp , #32*3 // zsqr = sp[32*3] // x4~x7 = z1[0~3] (the value has been assigned.) bl ECP256_SqrCore // zsqr = z1^2 // x14~x17 also temporarily stored results // The next calculation requires the zsqr calculation result as the input. // The calculation result is stored in x4 to x7 in advance to prevent x14 to x17 from being overwritten // by the next calculation. Therefore, the calculation result needs to be read from the memory. mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x0 , sp , #32*4 // u2 = sp[32*4] add x2 , x23, #0 // x2 points to b->x. // x4~x7 * [x2] bl ECP256_MulCore // u2 = z1^2 * x2 // x14~x17 also temporarily stored results. ldp x8 , x9 , [x22] // a->x ldp x10, x11, [x22, #16] add x0 , sp , #32*5 // h = sp[32*5] // x14~x17 - x8~x11 bl ECP256_SubCore1 // h = u2 - x1 ldp x4 , x5 , [sp, #32*3] // zsqr = sp[32*3] ldp x6 , x7 , [sp, #32*3+16] add x2 , x22, #64 // x2 points to a->z add x0 , sp , #32*3 // s2 = sp[32*3], zsqr will not be used later. // You can use this block memory to store and calculate s2. bl ECP256_MulCore // s2 = zsqr * z1 = z1^3 ldp x4 , x5 , [sp, #32*5] // x4~x7 = h = sp[32*5] ldp x6 , x7 , [sp, #32*5+16] add x2 , x22, #64 add x0 , sp , #32*2 // x0 points to res_z. bl ECP256_MulCore // res_z = h * z1 ldp x4 , x5 , [sp, #32*3] // x4~x7 = s2 = sp[32*3] ldp x6 , x7 , [sp, #32*3+16] add x2 , x23, #32 // x2 points to b->y. add x0 , sp , #32*3 // s2 = sp[32*3] bl ECP256_MulCore // s2 = s2 * y2 = y2 * z1^3 ldp x8 , x9 , [x22, #32] ldp x10, x11, [x22, #32+16] add x0 , sp , #32*6 // R = sp[32*6] // x14~x17 - x8~x11 bl ECP256_SubCore1 // R = s2 - y1 // Rsqr = R^2 and hsqr = h^2 are independent of each other. The sequence can be adjusted. // If Rsqr is calculated first, the memory can be read less once. (The pipeline bubble needs to be optimized.) // In addition, the calculated hsqr can read less memory in hcub = hsqr x h. mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x0 , sp , #32*7 // Rsqr = sp[32*7] bl ECP256_SqrCore // Rsqr = R^2 ldp x4 , x5 , [sp, #32*5] // h = sp[32*5] ldp x6 , x7 , [sp, #32*5+16] add x0 , sp , #32*8 // hsqr = sp[32*8] bl ECP256_SqrCore // hsqr = h^2 // x14 to x17 stores the hsqr results and does not need to be read from the memory. // (The pipeline bubble exists and needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , sp , #32*5 // h = sp[32*5] add x0 , sp , #32*9 // hcub = sp[32*9] bl ECP256_MulCore // hcub = hsqr * h = h^3 // Because the multiplication involves too many registers, the preceding hsqr cannot be backed up. // If the registers after x19 are used, the hsqr needs to be pushed and popped at the beginning // and end of the stack, which outweighs the gain. Therefore, the hsqr can only be read from the memory. ldp x4 , x5 , [sp, #32*8] // hsqr = sp[32*8] ldp x6 , x7 , [sp, #32*8+16] add x2 , x22, #0 // x2 points to a->x add x0 , sp , #32*4 // u2 = sp[32*4] bl ECP256_MulCore // u2 = hsqr * x1 mov x8 , x14 mov x9 , x15 mov x10, x16 mov x11, x17 add x0 , sp , #32*8 // hsqr = sp[32*8] // x14~x17 + x8~x11 bl ECP256_AddCore // hsqr = 2 * u2 // x14~x17 saves hsqr, so ECP256_SubCore2 is called. ldp x8 , x9 , [sp, #32*7] // Rsqr = sp[32*7] ldp x10, x11, [sp, #32*7+16] // x8~x11 - x14~x17 add x0 , sp , #0 // x0 points to res_x bl ECP256_SubCore2 // res_x = Rsqr - hsqr // x14~x17 save res_x, so call ECP256_SubCore1 ldp x8 , x9 , [sp, #32*9] // hcub = sp[32*9] ldp x10, x11, [sp, #32*9+16] // x14~x17 - x8~x11 bl ECP256_SubCore1 // res_x = res_x - hcub // x14~x17 save res_x, so call ECP256_SubCore2 ldp x8 , x9 , [sp, #32*4] // u2 = sp[32*4] ldp x10, x11, [sp, #32*4+16] add x0 , sp , #32*1 bl ECP256_SubCore2 // res_y = u2 - res_x ldp x4 , x5 , [sp, #32*9] // hcub = sp[32*9] ldp x6 , x7 , [sp, #32*9+16] add x2 , x22, #32 // y1 = a->y add x0 , sp , #32*3 // s2 = sp[32*3] bl ECP256_MulCore // s2 = y1 * hcub add x2 , sp , #32*6 // R = sp[32*6] add x0 , sp , #32*1 // res_y = sp[32*1] ldp x4 , x5 , [x0] ldp x6 , x7 , [x0, #16] bl ECP256_MulCore // res_y = res_y * R // x14–x17 stores res_y, and x0 is still res_y. No value needs to be assigned again. ldp x8 , x9 , [sp, #32*3] // s2 = sp[32*3] ldp x10, x11, [sp, #32*3+16] // x14~x17 - x8~x11 bl ECP256_SubCore1 // res_y = res_y - s2 // Four memory blocks are not read. (The pipeline bubble exists and needs to be optimized.) // x14-x17 stores res_y. Therefore, res_y is judged and assigned a value. // copy y ldp x4 , x5 , [x23, #32] // in2_y, b->y ldp x6 , x7 , [x23, #32+16] ldp x8 , x9 , [x22, #32] // in1_y, a->y ldp x10, x11, [x22, #32+16] // res_y = in1infty == 0 ? res_y : in2_y cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_y = in2infty == 0 ? res_y : in1_y cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #32] stp x16, x17, [x21, #32+16] // copy x ldp x4 , x5 , [x23] // in2_x, b->x ldp x6 , x7 , [x23, #16] ldp x8 , x9 , [x22] // in1_x, a->x ldp x10, x11, [x22, #16] ldp x14, x15, [sp] // res_x ldp x16, x17, [sp , #16] // res_x = in1infty == 0 ? res_x : in2_x cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_x = in2infty == 0 ? res_x : in1_x cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21] stp x16, x17, [x21, #16] // copy z adrp x23, .Lone_mont add x23, x23, :lo12:.Lone_mont ldp x4 , x5 , [x23] // one_mont, 1 * RR * R' = R (mod p) ldp x6 , x7 , [x23, #16] ldp x8 , x9 , [x22, #64] // in1_z, a->z ldp x10, x11, [x22, #64+16] ldp x14, x15, [sp , #64] // res_z ldp x16, x17, [sp , #64+16] // res_z = in1infty == 0 ? res_z : ONE cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_z = in2infty == 0 ? res_z : in1_z cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #64] stp x16, x17, [x21, #64+16] add sp , x29, #0 ldp x19, x20, [x29, #16] ldp x21, x22, [x29, #32] ldp x23, x24, [x29, #48] ldp x25, x26, [x29, #64] ldp x29, x30, [sp], #80 AARCH64_AUTIASP ret .size ECP256_AddAffine,.-ECP256_AddAffine # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo # Deal process: # U1 = X1*Z22 # U2 = X2*Z12 # S1 = Y1*Z23 # S2 = Y2*Z13 # H = U2-U1 # r = S2-S1 # X3 = r2-H3-2*U1*H2 # Y3 = r*(U1*H2-X3)-S1*H3 # Z3 = Z1*Z2*H .globl ECP256_PointAdd .type ECP256_PointAdd,%function .align 5 ECP256_PointAdd: AARCH64_PACIASP stp x29, x30, [sp, #-96]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] stp x25, x26, [sp, #64] stp x27, x28, [sp, #80] sub sp , sp , #32*12 // Each coordinate is 256 bits, that is, 32 bytes, // and a space of 10 coordinates is applied for. adrp x14, .Lpoly+8 // p[1] add x14,x14,:lo12:.Lpoly+8 ldr x12,[x14] // p[3] ldr x13,[x14,#16] // Pointer to the initial backup input parameter. // x0 to x2 are used to transfer parameters when the interface is invoked. mov x21, x0 mov x22, x1 mov x23, x2 ldp x4 , x5 , [x22, #64] // z1 ldp x6 , x7 , [x22, #64+16] // x24 = z1[0] | z1[1] | z1[2] | z1[3] orr x24, x4 , x5 orr x24, x24, x6 orr x24, x24, x7 // x24 = ~in1infty cmp x24, #0 csetm x24, ne // x24 = (x24 != 0) ? -1 : 0, that is ~iszero(z1), // Determine whether point a is(x, y, 0) // Because x4 to x7 exactly hold z1, z1^2 can be calculated first. add x0 , sp , #0 // z1sqr = sp[32*0] bl ECP256_SqrCore // z1sqr = z1^2 // x14 to x17 exactly save the z1sqr result (the pipeline bubble exists and needs to be optimized). mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x22, #64 // x2 points to z1, that is a->z add x0 , sp , #32*1 // s2 = sp[32*1] bl ECP256_MulCore // s2 = z1^3 // x14 to x17 exactly save the result of s2. (The pipeline bubble exists and needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x23, #32 // x2 points to y2, that is b->y // add x0 , sp , #32*1 // s2 = sp[32*1], x0 It is exactly s2 and does not need to be set. // (There are pipeline bubbles to be optimized.) bl ECP256_MulCore // s2 = y2 * z1^3 ldp x4 , x5 , [x23, #64] // z2 ldp x6 , x7 , [x23, #64+16] // x25 = z2[0] | z2[1] | z2[2] | z2[3] orr x25, x4 , x5 orr x25, x25, x6 orr x25, x25, x7 // x25 = ~in2infty cmp x25, #0 csetm x25, ne // x25 = (x25 != 0) ? -1 : 0, that is ~iszero(z2), // Check whether point b is(x, y, 0) // Because x4~x7 happens to hold z2, z2^2 can be calculated add x0 , sp , #32*2 // z2sqr = sp[32*2] bl ECP256_SqrCore // z2sqr = z2^2 // x14 to x17 exactly save the z2sqr result. (There are pipeline bubbles to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x23, #64 // x2 points to z2, that is b->z add x0 , sp , #32*3 // s1 = sp[32*3] bl ECP256_MulCore // s1 = z2^3 // x14 to x17 exactly save the result of s2. (The pipeline bubble exists and needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x22, #32 // x2 points to y1, that is a->y // add x0 , sp , #32*3 // s1 = sp[32*3], x0 is exactly s1 and does not need to be set. // (There are pipeline bubbles to be optimized.) bl ECP256_MulCore // s1 = y1 * z2^3 // x14 to x17 save the result of s1. Therefore, the ECP256_SubCore2 interface is selected. ldp x8 , x9 , [sp, #32*1] // s2 = sp[32*1] ldp x10, x11, [sp, #32*1+16] // x8~x11 - x14~x17 add x0 , sp , #32*4 // R = sp[32*4] bl ECP256_SubCore2 // R = s2 - s1 // x14 to x17 save the result of R, (R==0) <==> (s2 == s1) orr x26, x14, x15 orr x26, x26, x16 orr x26, x26, x17 // x26 = ~(s1 == s2), The data of R is not read from the memory in advance. ldp x4 , x5 , [x22] // Take x1, that is a->x ldp x6 , x7 , [x22, #16] add x2 , sp , #32*2 // z2sqr = sp[32*2] add x0 , sp , #32*5 // u1 = sp[32*5] bl ECP256_MulCore // u1 = x1 * z2sqr ldp x4 , x5 , [x23] // Take x2, that is b->x ldp x6 , x7 , [x23, #16] add x2 , sp , #0 // z1sqr = sp[32*0] add x0 , sp , #32*6 // u2 = sp[32*6] bl ECP256_MulCore // u2 = x2 * z1sqr // x14 to x17 save the result of u2. Therefore, the ECP256_SubCore1 interface is selected. ldp x8 , x9 , [sp, #32*5] // u1 = sp[32*5] ldp x10, x11, [sp, #32*5+16] // x14~x17 - x8~x11 add x0 , sp , #32*7 // h = sp[32*7] bl ECP256_SubCore1 // h = u2 - u1 // x14 to x17 save the result of h, (h==0) <==> (u2 == u1) orr x14, x14, x15 orr x14, x14, x16 orr x14, x14, x17 // x14 = ~(u1 == u2), It is used for subsequent judgment. // The data of h does not need to be read from the memory in advance. // x24 = ~in2infty // x25 = ~in1infty // x26 = ~(s1 == s2) = ~is_equal(S1, S2) // x14 = ~(u1 == u2) = ~is_equal(U1, U2) // if(is_equal(U1, U2) & ~in1infty & ~in2infty & is_equal(S1, S2)) // 将(is_equal(U1, U2) & ~in1infty & ~in2infty & is_equal(S1, S2))记为flag // <==> // if ((~is_equal(U1, U2) | in1infty | in2infty | ~is_equal(S1, S2)) == 0) // if (flag == 0) mvn x27, x24 // x27 = in1infty mvn x28, x25 // x28 = in2infty orr x14, x14, x26 orr x14, x14, x27 orr x14, x14, x28 cbnz x14, .Lpoint_add // flag != 0, Continue calculation by C implementation .Ladd_double: mov x0 , x21 // x0 = r mov x1 , x22 // x1 = a ldp x23, x24, [x29, #48] // The double function uses only x19 to x22, and only x19 to x22 // is popped at the end. Therefore, x23 to x28 is popped in advance. ldp x25, x26, [x29, #64] ldp x27, x28, [x29, #80] add sp , sp , #32*(12-4) // The size of the stack space used varies. The double function // only releases 32 x 4. Therefore, you need to release part of the stack space in advance. b .Lpoint_double .align 4 .Lpoint_add: ldp x4 , x5 , [sp, #32*4] // R = sp[32*4] ldp x6 , x7 , [sp, #32*4+16] add x0 , sp , #0 // Rsqr = sp[0], Because z1sqr will not be used later, // this memory can be used to save Rsqr. bl ECP256_SqrCore // Rsqr = R^2 ldp x4 , x5 , [sp, #32*7] // h = sp[32*7] ldp x6 , x7 , [sp, #32*7+16] add x2 , x22, #64 // x2 points to z1 add x0 , sp , #32*11 // res_z = sp[32*11] bl ECP256_MulCore // res_z = h * z1 // The res_z result is stored in x14 to x17. (The pipeline bubble needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x23, #64 // x2 points to z2 // x0 is still res_z and does not need to be reassigned. // add x0 , sp , #32*11 // res_z = sp[32*11] bl ECP256_MulCore // res_z = res_z * z2 ldp x4 , x5 , [sp, #32*7] // h = sp[32*7] ldp x6 , x7 , [sp, #32*7+16] add x0 , sp , #32*2 // hsqr = sp[32*2], Because z2sqr will not be used later, // you can use this memory to save hsqr. bl ECP256_SqrCore // The hsqr result is stored in x14 to x17. (The pipeline bubble needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , sp , #32*7 // h = sp[32*7] add x0 , sp , #32*8 // hcub = sp[32*8] bl ECP256_MulCore // hcub = hsqr * h ldp x4 , x5 , [sp, #32*5] // u1 = sp[32*5] ldp x6 , x7 , [sp, #32*5+16] add x2 , sp , #32*2 // hsqr = sp[32*2] add x0 , sp , #32*6 // u2 = sp[32*6] bl ECP256_MulCore // u2 = u1 * hsqr // x14~x17 exactly save the result of u2. mov x8 , x14 mov x9 , x15 mov x10, x16 mov x11, x17 // add x0 , sp , #32*2 // hsqr = sp[32*2] // The previous operation x2 also saves the address of hsqr. mov x0 , x2 // x14~x17 + x8~x11 bl ECP256_AddCore // hsqr = 2 * u2 // x14 to x17 save the hsqr result. Therefore, ECP256_SubCore2 is called. ldp x8 , x9 , [sp] // Rsqr = sp[0] ldp x10, x11, [sp, #16] // x8~x11 - x14~x17 add x0 , sp , #32*9 // res_x = sp[32*9] bl ECP256_SubCore2 // res_x = Rsqr - hsqr // x14 to x17 exactly save the result of res_x, so ECP256_SubCore1 is called. ldp x8 , x9 , [sp, #32*8] // hcub = sp[32*8] ldp x10, x11, [sp, #32*8+16] // x14~x17 - x8~11 // The previous operation x0 also stores the address of res_x. bl ECP256_SubCore1 // res_x = res_x - hcub // x14 to x17 exactly save the result of res_x. Therefore, ECP256_SubCore2 is called. ldp x8 , x9 , [sp, #32*6] // u2 = sp[0] ldp x10, x11, [sp, #32*6+16] // x8~x11 - x14~x17 add x0 , sp , #32*10 bl ECP256_SubCore2 // res_y = u2 - res_x ldp x4 , x5 , [sp, #32*3] // s1 = sp[32*3] ldp x6 , x7 , [sp, #32*3+16] add x2 , sp , #32*8 // hcub = sp[32*8] add x0 , sp , #32*1 // s2 = sp[32*1] bl ECP256_MulCore // s2 = s1 * hcub add x2 , sp , #32*4 // R = sp[32*4] add x0 , sp , #32*10 // res_y = sp[32*10] ldp x4 , x5 , [x0] // res_y = sp[32*10], Borrowing x0 address without offset ldp x6 , x7 , [x0, #16] bl ECP256_MulCore // res_y = res_y * R // x14 to x17 exactly save the result of res_y. Therefore, ECP256_SubCore1 is called. ldp x8 , x9 , [sp, #32] // s2 = sp[32*1] ldp x10, x11, [sp, #32+16] // x14~x17 - x8~x11 // The previous operation x0 also stores the address of res_y. bl ECP256_SubCore1 // res_y = res_y - s2 // Four memory blocks are not read. (The pipeline bubble exists and needs to be optimized.) // x14-x17 stores res_y. Therefore, res_y is judged and assigned a value. // copy y ldp x4 , x5 , [x23, #32] // in2_y, b->y ldp x6 , x7 , [x23, #32+16] ldp x8 , x9 , [x22, #32] // in1_y, a->y ldp x10, x11, [x22, #32+16] // res_y = in1infty == 0 ? res_y : in2_y cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_y = in2infty == 0 ? res_y : in1_y cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #32] stp x16, x17, [x21, #32+16] // copy x ldp x4 , x5 , [x23] // in2_x, b->x ldp x6 , x7 , [x23, #16] ldp x8 , x9 , [x22] // in1_x, a->x ldp x10, x11, [x22, #16] ldp x14, x15, [sp , #32*9] // res_x ldp x16, x17, [sp , #32*9+16] // res_x = in1infty == 0 ? res_x : in2_x cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_x = in2infty == 0 ? res_x : in1_x cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21] stp x16, x17, [x21, #16] // copy z ldp x4 , x5 , [x23, #64] // in2_z, b->z ldp x6 , x7 , [x23, #64+16] ldp x8 , x9 , [x22, #64] // in1_z, a->z ldp x10, x11, [x22, #64+16] ldp x14, x15, [sp , #32*11] // res_z ldp x16, x17, [sp , #32*11+16] // res_z = in1infty == 0 ? res_z : in2_z cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_z = in2infty == 0 ? res_z : in1_z cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #64] stp x16, x17, [x21, #64+16] add sp , x29, #0 // Free temporary variable ldp x19, x20, [x29, #16] ldp x21, x22, [x29, #32] ldp x23, x24, [x29, #48] ldp x25, x26, [x29, #64] ldp x27, x28, [x29, #80] ldp x29, x30, [sp], #96 AARCH64_AUTIASP ret .size ECP256_PointAdd,.-ECP256_PointAdd # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b # Deal process: # delta = Z12 # gamma = Y12 # beta = X1*gamma # alpha = 3*(X1-delta)*(X1+delta) # X3 = alpha2-8*beta # Z3 = (Y1+Z1)2-gamma-delta # Y3 = alpha*(4*beta-X3)-8*gamma2 .globl ECP256_PointDouble .type ECP256_PointDouble,%function .align 5 ECP256_PointDouble: AARCH64_PACIASP stp x29, x30, [sp, #-96]! // Why is 96 space given here? Only x19~x22 is stacked. Theoretically, only [sp, #-48] is required. add x29, sp , #0 // Whether it is related to the Lpoint_double jump of the ecp_nistz256_point_add interface stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] sub sp , sp , #32*4 .Lpoint_double: ldp x14, x15, [x1 , #32] // a->y ldp x16, x17, [x1 , #32+16] // Back up the initial input parameter pointer r, a. mov x21, x0 mov x22, x1 adrp x3, .Lpoly+8 // p[1] add x3,x3,:lo12:.Lpoly+8 ldr x12,[x3] // p[3] ldr x13,[x3,#16] mov x8 , x14 mov x9 , x15 ldp x4 , x5 , [x22, #64] // a->z mov x10, x16 mov x11, x17 ldp x6 , x7 , [x22, #64+16] add x0 , sp , #0 // s = sp[0] bl ECP256_AddCore // s = 2 * a->y add x0 , sp , #32 // zsqr = sp[32*1] bl ECP256_SqrCore // zsqr = (a->z)^2 // x14 to x17 save the result of s. Calculate s^2 first. ldp x4 , x5 , [sp] add x0 , sp , #0 // s = sp[0] ldp x6 , x7 , [sp, #16] bl ECP256_SqrCore // s = s^2 ldp x14, x15, [sp, #32] // a->x ldp x8 , x9 , [x22] // a->x ldp x16, x17, [sp, #32+16] add x0 , sp , #64 // m = sp[32*2] ldp x10, x11, [x22, #16] bl ECP256_AddCore // m = a->x + zsqr ldp x14 , x15 , [sp, #32] // a->x ldp x8 , x9 , [x22] // a->x ldp x16, x17, [sp, #32+16] add x0 , sp , #32 ldp x10, x11, [x22, #16] bl ECP256_SubCore2 // zsqr = a->x - zsqr ldp x4 , x5 , [x22, #64] // a->z ldp x6 , x7 , [x22, #64+16] add x0 , x21, #64 // res_z add x2 , x22, #32 // a->y bl ECP256_MulCore // res_z = a->z * a->y // x14 to x17 save the result of res_z. mov x8 , x14 mov x9 , x15 ldp x4 , x5 , [sp] // s = sp[0] mov x10, x16 mov x11, x17 ldp x6 , x7 , [sp, #16] add x0 , x21, #64 // res_z bl ECP256_AddCore // res_z = 2 * res_z add x0 , x21, #32 // x0 points to res_y, that is r->y bl ECP256_SqrCore // res_y = s^2 add x0 , x21, #32 bl ECP256_DivBy2Core // res_y = res_y / 2 ldp x4 , x5 , [sp, #64] // m = sp[64] ldp x6 , x7 , [sp, #64+16] add x2 , sp , #32 // zsqr = sp[32] add x0 , sp , #64 bl ECP256_MulCore // m = m * zsqr // x14–x17 saves the result of m. Save an extra copy to x4–x7. mov x8 , x14 mov x4 , x14 mov x9 , x15 mov x5 , x15 mov x10, x16 mov x6 , x16 mov x11, x17 mov x7 , x17 add x0 , sp , #64 bl ECP256_AddCore // m = 2 * m mov x8 , x4 mov x9 , x5 mov x10, x6 mov x11, x7 bl ECP256_AddCore // m = 3 * m ldp x4 , x5 , [sp] // s = sp[0] add x2 , x22, #0 // a->x ldp x6 , x7 , [sp, #16] add x0 , sp , #0 // s = sp[0] bl ECP256_MulCore // s = s * a->x // x14~x17 exactly saves the result of s mov x8 , x14 mov x9 , x15 ldp x4 , x5 , [sp, #64] mov x10, x16 mov x11, x17 ldp x6 , x7 , [sp, #64+16] add x0 , sp , #96 // tmp = sp[96] bl ECP256_AddCore // tmp = 2 * s // x14~x17 exactly saves the result of m. add x0 , x21, #0 // res_x = r->x bl ECP256_SqrCore // res_x = m^2 // x14~x17 exactly saves the result of res_x. ldp x8 , x9 , [sp, #96] // tmp = sp[96] ldp x10, x11, [sp, #96+16] bl ECP256_SubCore1 // res_x = res_x - tmp // x14~x17 exactly saves the result of res_x, Therefore, ECP256_SubCore2 is invoked. ldp x8 , x9 , [sp] // s = sp[0] ldp x10, x11, [sp, #16] add x0 , sp , #0 bl ECP256_SubCore2 // s = s - res_x // x14~x17 exactly saves the result of s, x0 still points to s. mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , sp , #64 // m = sp[64] bl ECP256_MulCore // s = s * m // x14 to x17 just save the result of s, so call ECP256_SubCore1. add x0 , x21, #32 // x0 points to res_y ldp x8 , x9 , [x0] // res_y ldp x10, x11, [x0, #16] bl ECP256_SubCore1 // res_y = s - res_y add sp , x29, #0 // Free temporary variable ldp x19, x20, [x29, #16] ldp x21, x22, [x29, #32] ldp x29, x30, [sp], #96 AARCH64_AUTIASP ret .size ECP256_PointDouble,.-ECP256_PointDouble .globl ECP256_OrdMul .type ECP256_OrdMul,%function .align 4 ECP256_OrdMul: AARCH64_PACIASP stp x29, x30, [sp, #-64]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] adrp x23, .Lord add x23, x23, :lo12:.Lord // x23 = &n ldp x12, x13, [x23] // n[0~3] ldp x21, x22, [x23, #16] ldr x23, [x23, #32] // x23 = LordK ldp x4 , x5 , [x1] // a[0~3] ldp x6 , x7 , [x1, #16] ldr x3 , [x2] // x3 = b[0] mul x14, x4 , x3 // a[0~3] * b[0] umulh x8 , x4 , x3 mul x15, x5 , x3 umulh x9 , x5 , x3 mul x16, x6 , x3 umulh x10, x6 , x3 mul x17, x7 , x3 umulh x11, x7 , x3 // a[0-3] * b[0] is stored in x14~x17, x19, x20. adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adc x19, xzr, x11 // x19 = x11 + CF mov x20, xzr // reduce // n[0] = 0xf3b9cac2fc632551 // n[1] = 0xbce6faada7179e84 // n[2] = 0xffffffffffffffff, lo(q*n[2]) = -q , hi(q*n[2]) = q // n[3] = 0xffffffff00000000, lo(q*n[3]) = -lq<<32, hi(q*n[3]) = q-hq mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), Equivalent to q in Montgomery // modular multiplication lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x16, x16, x24 // x16 = x16 + lo(q*n[2]) = x16 - q sbcs x17, x17, x8 // x17 = x17 + lo(q*n[3]) = x17 - lq<<32 sbcs x19, x19, x9 // x19 = x19 - hq, Should have added q-hq, here first subtract hq, then add q. sbc x20, x20, xzr // x20 = x20 - CF umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1)? adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, // so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF ldr x3 , [x2, #8] // b[1] mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 // add lo(a[0~3] * b[i]) adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 // add hi(a[0~3] * b[i]) adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q // in Montgomery modular multiplication lsl x8 , x24, #32 lsr x9 , x24, #32 subs x16, x16, x24 sbcs x17, x17, x8 sbcs x19, x19, x9 sbc x20, x20, xzr umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) subs xzr, x14, #1 adcs x10, x10, x9 adc x11, x11, xzr // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, // so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF ldr x3 , [x2, #16] // b[2] mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 // adds lo(a[0~3] * b[i]) adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 // adds hi(a[0~3] * b[i]) adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication lsl x8 , x24, #32 lsr x9 , x24, #32 subs x16, x16, x24 sbcs x17, x17, x8 sbcs x19, x19, x9 sbc x20, x20, xzr umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) subs xzr, x14, #1 adcs x10, x10, x9 adc x11, x11, xzr // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, // so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF ldr x3 , [x2, #24] // b[3] mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 // add lo(a[0~3] * b[i]) adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 // add hi(a[0~3] * b[i]) adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication. lsl x8 , x24, #32 lsr x9 , x24, #32 subs x16, x16, x24 sbcs x17, x17, x8 sbcs x19, x19, x9 sbc x20, x20, xzr umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) subs xzr, x14, #1 adcs x10, x10, x9 adc x11, x11, xzr // S /= r, Accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF // So far, x14 to x17, and x19 retain the calculation results. // x8~x11 save r -= n subs x8 , x14, x12 sbcs x9 , x15, x13 sbcs x10, x16, x21 sbcs x11, x17, x22 sbcs xzr, x19, xzr // Finally, the CF bit is set to indicate whether r-n needs to be borrowed. // r = r-n < 0 ? r : r-n csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] // Write the result to r stp x16, x17, [x0, #16] ldp x19, x20, [sp, #16] ldp x21, x22, [sp, #32] ldp x23, x24, [sp, #48] ldr x29, [sp], #64 AARCH64_AUTIASP ret .size ECP256_OrdMul,.-ECP256_OrdMul .globl ECP256_OrdSqr .type ECP256_OrdSqr,%function .align 4 ECP256_OrdSqr: AARCH64_PACIASP stp x29, x30, [sp, #-64]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] adrp x23, .Lord add x23, x23, :lo12:.Lord // x23 = &n ldp x12, x13, [x23] // n[0~3] ldp x21, x22, [x23, #16] ldr x23, [x23, #32] // x23 = LordK ldp x4 , x5 , [x1] // x4~x7 = a[0~3] ldp x6 , x7 , [x1, #16] .align 4 .Lord_sqr: sub x2 , x2 , #1 /****************************************** x7 x1 x20 x19 x17 x16 x15 x14 h0*1 l0*1 h0*2 l0*2 h0*3 l0*3 h1*2 l1*2 h1*3 l1*3 h2*3 l2*3 h3*3 l3*3 h2*2 l2*2 h1*1 l1*1 h0*0 l0*0 *******************************************/ // a[1~3] * a[0] mul x15, x5 , x4 // lo(a[1] * a[0]) umulh x8 , x5 , x4 // hi(a[1] * a[0]) mul x16, x6 , x4 // lo(a[2] * a[0]) umulh x9 , x6 , x4 // hi(a[2] * a[0]) mul x17, x7 , x4 // lo(a[3] * a[0]) umulh x19, x7 , x4 // hi(a[3] * a[0]) adds x16, x16, x8 adcs x17, x17, x9 adc x19, x19, xzr // No more carry // a[2~3] * a[1] mul x8 , x6 , x5 // lo(a[2] * a[1]) umulh x9 , x6 , x5 // hi(a[2] * a[1]) mul x10, x7 , x5 // lo(a[3] * a[1]) umulh x11, x7 , x5 // hi(a[3] * a[1]) // a[3] * a[2] mul x20, x7 , x6 umulh x1 , x7 , x6 // Add the calculation result of the current round, // and then add the calculation result with the acc (register in the preceding note). adds x9 , x10, x9 adc x10, x11, xzr adds x17, x17, x8 adcs x19, x19, x9 adcs x20, x20, x10 adc x1 , x1 , xzr // a[0-3] has been saved in x4 to x7. // a[0~3] ^ 2 mul x14, x4 , x4 umulh x4 , x4 , x4 mul x8 , x5 , x5 umulh x5 , x5 , x5 mul x9 , x6 , x6 umulh x6 , x6 , x6 mul x10, x7 , x7 umulh x7 , x7 , x7 // acc[1~6] << 1 adds x15, x15, x15 adcs x16, x16, x16 adcs x17, x17, x17 adcs x19, x19, x19 adcs x20, x20, x20 adcs x1 , x1 , x1 adc x3 , xzr, xzr // acc[] += a[] ^ 2 adds x15, x15, x4 adcs x16, x16, x8 adcs x17, x17, x5 adcs x19, x19, x9 adcs x20, x20, x6 adcs x1 , x1 , x10 adc x7 , x7 , x3 // Four rounds of reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (remaining part of hi(q*n[3])) // Round 2 reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (The remainder of the hi(q*n[3])) // Round 3 reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (Remaining part of hi(q*n[3])) // Round 4 reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (Remaining part of hi(q*n[3])) // add acc[4-7], x14~x19 is the current calculation result r adds x14, x14, x19 adcs x15, x15, x20 adcs x16, x16, x1 adcs x17, x17, x7 adc x19, xzr, xzr // r -= p subs x8 , x14, x12 sbcs x9 , x15, x13 sbcs x10, x16, x21 sbcs x11, x17, x22 sbcs xzr, x19, xzr // The set CF is used to determine the relationship between r and p. // r = r-p < 0 ? r : r-p // Use x4 to x7 to save the result. You can perform the square operation cyclically. csel x4 , x14, x8 , lo csel x5 , x15, x9 , lo csel x6 , x16, x10, lo csel x7 , x17, x11, lo cbnz x2 , .Lord_sqr // Number of square operations, that is a^(2^rep) stp x4 , x5 , [x0] stp x6 , x7 , [x0, #16] ldp x19, x20, [sp, #16] ldp x21, x22, [sp, #32] ldp x23, x24, [sp, #48] ldr x29, [sp], #64 AARCH64_AUTIASP ret .size ECP256_OrdSqr,.-ECP256_OrdSqr .globl ECP256_Scatterw5 .type ECP256_Scatterw5,%function .align 4 ECP256_Scatterw5: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 add x0 , x0 , x2 , lsl#3 // Needs x0 = x0 + (x2-1)*8 = x0 + x2*8 - 8 // The action of -8 is placed in the str instruction. ldp x4 , x5 , [x1] // x ldp x6 , x7 , [x1, #16] str x4 , [x0, #128*0-8] // 8*16*0 str x5 , [x0, #128*1-8] // 8*16*1 str x6 , [x0, #128*2-8] // 8*16*2 str x7 , [x0, #128*3-8] // 8*16*3 add x0 , x0 , #64*8 ldp x4 , x5 , [x1, #32] // y ldp x6 , x7 , [x1, #32+16] str x4 , [x0, #128*0-8] // 8*16*0 str x5 , [x0, #128*1-8] // 8*16*1 str x6 , [x0, #128*2-8] // 8*16*2 str x7 , [x0, #128*3-8] // 8*16*3 add x0 , x0 , #64*8 ldp x4 , x5 , [x1, #64] // z ldp x6 , x7 , [x1, #64+16] str x4 , [x0, #128*0-8] // 8*16*0 str x5 , [x0, #128*1-8] // 8*16*1 str x6 , [x0, #128*2-8] // 8*16*2 str x7 , [x0, #128*3-8] // 8*16*3 ldr x29, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Scatterw5,.-ECP256_Scatterw5 .globl ECP256_Gatherw5 .type ECP256_Gatherw5,%function .align 4 ECP256_Gatherw5: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 cmp x2 , xzr csetm x3 , ne // x3 = (x2 == 0) ? 0 : -1 add x2 , x2 , x3 // x2 += x3, if x2 != 0, then x2 = x2 - 1, if not x2 = 0 add x1 , x1 , x2 , lsl#3 // x1 += x2*8, offset ldr x4 , [x1, #128*0] ldr x5 , [x1, #128*1] ldr x6 , [x1, #128*2] ldr x7 , [x1, #128*3] csel x4 , x4 , xzr, ne // If x2 = 0, Then return to 0. Otherwise, returns the read point coordinates csel x5 , x5 , xzr, ne csel x6 , x6 , xzr, ne csel x7 , x7 , xzr, ne stp x4 , x5 , [x0] // r->x stp x6 , x7 , [x0, #16] add x1 , x1 , #64*8 ldr x4 , [x1, #128*0] ldr x5 , [x1, #128*1] ldr x6 , [x1, #128*2] ldr x7 , [x1, #128*3] csel x4 , x4 , xzr, ne // If x2 = 0, return 0. Otherwise, returns the read point coordinates csel x5 , x5 , xzr, ne csel x6 , x6 , xzr, ne csel x7 , x7 , xzr, ne stp x4 , x5 , [x0, #32] // r->y stp x6 , x7 , [x0, #48] add x1 , x1 , #64*8 ldr x4 , [x1, #128*0] ldr x5 , [x1, #128*1] ldr x6 , [x1, #128*2] ldr x7 , [x1, #128*3] csel x4 , x4 , xzr, ne // If x2 = 0, return 0. Otherwise, returns the read point coordinates csel x5 , x5 , xzr, ne csel x6 , x6 , xzr, ne csel x7 , x7 , xzr, ne stp x4 , x5 , [x0, #64] // r->z stp x6 , x7 , [x0, #80] ldr x29, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Gatherw5,.-ECP256_Gatherw5 .globl ECP256_Scatterw7 .type ECP256_Scatterw7,%function .align 4 ECP256_Scatterw7: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 // add x0 , x0 , x2 sub x2 , x2 , #63 // x2 = x2 - 63 sub x0 , x0 , x2 // x0 = x0 - (x2(original) - 63) = x0 + (63 - x2(original)) mov x2 , #8 // Loop count .Lscatter_w7: ldr x3 , [x1], #8 subs x2 , x2 , #1 strb w3 , [x0, #64*0] lsr x3 , x3 , #8 strb w3 , [x0, #64*1] lsr x3 , x3 , #8 strb w3 , [x0, #64*2] lsr x3 , x3 , #8 strb w3 , [x0, #64*3] lsr x3 , x3 , #8 strb w3 , [x0, #64*4] lsr x3 , x3 , #8 strb w3 , [x0, #64*5] lsr x3 , x3 , #8 strb w3 , [x0, #64*6] lsr x3 , x3 , #8 strb w3 , [x0, #64*7] add x0 , x0 , #64*8 b.ne .Lscatter_w7 ldr x29, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Scatterw7,.-ECP256_Scatterw7 // The anti-cache attack solution can be used together with ECP256_Scatterw7. .globl ECP256_Gatherw7 .type ECP256_Gatherw7,%function .align 4 ECP256_Gatherw7: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 cmp x2 , xzr csetm x3 , ne // x3 = (x2 == 0) ? 0 : -1 add x2 , x2 , x3 // x2 = (x2 == 0) ? 0 : (x2 - 1) (offset) sub x2 , x2 , #63 // x2 = x2 - 63 sub x1 , x1 , x2 // x0 = x0 - (x2(original) - 63) = x0 + (63 - x2(original)) mov x2 , #8 // Indicates the number of cycles. The x and y coordinates contain 64 bytes in total, // and 8 bytes are obtained at a time. Therefore, eight cycles are required. nop .Lgather_w7: ldrb w4 , [x1, #64*0] ldrb w5 , [x1, #64*1] ldrb w6 , [x1, #64*2] ldrb w7 , [x1, #64*3] ldrb w8 , [x1, #64*4] ldrb w9 , [x1, #64*5] ldrb w10, [x1, #64*6] ldrb w11, [x1, #64*7] // x4 = x4 | x5 << 8 // x6 = x6 | x7 << 8 // x4 = x4 | x6 << 16 // x4 = [x7][x6][x5][x4] orr x4 , x4 , x5 , lsl#8 orr x6 , x6 , x7 , lsl#8 orr x4 , x4 , x6 , lsl#16 // x8 = x8 | x9 << 8 // x10 = x10 | x11 << 8 // x8 = x8 | x10 << 16 // x8 = [x11][x10][x9][x8] orr x8 , x8 , x9 , lsl#8 orr x10, x10, x11, lsl#8 orr x8 , x8 , x10, lsl#16 // x4 = x4 | x8 << 32 // x4 = [x11][x10][x9][x8] orr x4 , x4 , x8 , lsl#32 and x4 , x4 , x3 str x4 , [x0], #8 add x1 , x1 , #64*8 subs x2 , x2, #1 b.ne .Lgather_w7 ldr x29,[sp],#16 AARCH64_AUTIASP ret .size ECP256_Gatherw7,.-ECP256_Gatherw7 #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm/ecp256_armv8.S
Unix Assembly
unknown
71,139
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC /* * Base point pre-computation table, which contains 37 subtables of point multiplication results of each window. * The size of each subtable is 64 x 64 bytes. * Coordinates (x, y) of points in the subtable. Each column contains 32 bytes and is arranged in little-endian mode * from top to bottom. * The columns from right to left are the point multiplication results of window values starting from 1 and increasing. */ .section .rodata .type g_preCompTable,%object .balign 4096 g_preCompTable: .byte 0x80,0xe5,0x91,0xcc,0x19,0x8e,0xf0,0x28,0x14,0x83,0x53,0x8d,0x04,0xc9,0x1a,0xd3,0x12,0x97,0xd9,0xbf,0x7c,0x06,0x01,0x91,0x3e,0x42,0xee,0xb5,0xb7,0xf5,0xd3,0x34,0xd8,0x89,0x43,0x32,0x1f,0xb4,0x08,0x9f,0x19,0x68,0x76,0x08,0x31,0xe8,0x7a,0x9d,0x80,0x5b,0x4a,0x09,0x68,0x04,0xc8,0xe8,0x8f,0x4f,0x4a,0xf5,0xcc,0x27,0x4d,0x3c .byte 0x8b,0x1f,0x2f,0x04,0x6e,0xaa,0x82,0xca,0x7a,0x56,0xcf,0x4d,0x59,0x64,0x17,0xac,0xc6,0x60,0x90,0x79,0x89,0x7d,0xad,0x2e,0x9f,0xc1,0xc0,0x08,0x9b,0x7e,0x3c,0x45,0xa3,0xff,0xb3,0xe1,0xcd,0xfe,0x80,0x87,0x28,0x50,0x30,0xb2,0x7a,0x9a,0xa9,0x5c,0xfb,0x05,0x66,0xd7,0x77,0xe4,0x1e,0x20,0xa7,0x3b,0x66,0x61,0x8d,0xc1,0xd6,0x14 .byte 0x96,0xf9,0x96,0x4c,0x8a,0x46,0xea,0xca,0x8d,0x30,0x12,0x6c,0x44,0x3f,0x8c,0xf6,0xad,0xa7,0xee,0xcd,0x5a,0x8a,0x2b,0xd2,0x2e,0x59,0x63,0xce,0x21,0xc6,0xa2,0x66,0xe3,0x55,0x98,0x66,0x2c,0xe2,0x1f,0x37,0xd0,0xe4,0x6f,0x35,0x33,0x65,0xad,0x3c,0xc6,0x60,0xcf,0x2e,0x69,0x45,0xc2,0x4e,0x99,0x17,0x77,0x5c,0x91,0xeb,0xdd,0xa9 .byte 0x05,0x9f,0xa1,0x7f,0xed,0x5c,0xa7,0x7a,0x7e,0xe7,0xb2,0x54,0x83,0x3b,0x48,0x1f,0x77,0xca,0x49,0xd5,0xd5,0x24,0xed,0x2e,0xb8,0xa0,0x4d,0x8c,0xa8,0xde,0x7c,0x0f,0xc5,0x67,0x32,0xcb,0x17,0x97,0xed,0xd8,0x15,0x2d,0x2f,0xc1,0xd2,0xa5,0x56,0xd5,0x0b,0xbc,0xb0,0x4b,0xd2,0x62,0x9d,0x26,0x94,0xa0,0x3e,0xc4,0x46,0x4e,0x10,0x18 .byte 0xf3,0x31,0x75,0x1a,0x28,0xd6,0xe8,0xe7,0x40,0xf9,0x8e,0x38,0x6e,0x1c,0xd0,0x42,0x30,0x13,0xb1,0xcc,0x1f,0xfd,0xcf,0x49,0x1d,0x88,0xca,0xc5,0xd6,0x7f,0x14,0x56,0xcf,0x69,0xb1,0x6a,0xb7,0xf4,0x32,0xac,0xb2,0x53,0x35,0xec,0x29,0xba,0xc8,0xcb,0x65,0xb7,0x5b,0x63,0xa7,0x0a,0xd1,0x8f,0xd1,0x4e,0x37,0xae,0x0d,0x90,0xd4,0xd4 .byte 0x96,0xd9,0xf1,0xeb,0x68,0x4e,0x00,0x32,0x41,0xbb,0x5b,0x96,0xf3,0xec,0xc2,0x0b,0x41,0x75,0xb5,0x26,0x7c,0x3f,0x5c,0x60,0x68,0x94,0xc3,0x7b,0x58,0x84,0x20,0x14,0xfc,0x3c,0x1c,0xb4,0x3e,0x2a,0xad,0x19,0x83,0x76,0x11,0x4c,0x91,0x12,0x51,0x1d,0x0b,0xd8,0xa3,0x25,0x1a,0x26,0xdb,0x6e,0x4c,0x35,0x47,0x8a,0xb5,0x3f,0x46,0x30 .byte 0x6d,0xd3,0x35,0x67,0x1e,0xd4,0x6c,0xc8,0xc4,0x8b,0x42,0x35,0x92,0x8c,0xb9,0x95,0x34,0x3c,0x75,0xe4,0xfd,0xf2,0xb3,0x4d,0xd7,0xd8,0x2c,0x46,0x5e,0x16,0xab,0x15,0xc5,0xf7,0x24,0x5d,0x52,0x2c,0xe4,0xa3,0x38,0xf8,0xc6,0x2e,0x97,0xa9,0x3e,0x09,0x8b,0xbc,0x42,0xc4,0xb7,0x7d,0x18,0xc9,0xf1,0x46,0x39,0x1b,0xb0,0xac,0x00,0xe7 .byte 0xdb,0xb8,0xe5,0x36,0xdc,0x69,0xf2,0x3e,0x8f,0x25,0xa0,0x97,0x26,0x50,0x0f,0x21,0x6b,0x28,0x40,0x1e,0xec,0x4f,0x5f,0x62,0xe4,0xa9,0x8a,0x00,0x3d,0xfd,0xb6,0x87,0xd8,0xe2,0xb4,0x5e,0x4b,0x04,0x61,0xa4,0x6d,0xf4,0x0f,0x56,0x8a,0xfe,0x5f,0x97,0x80,0x72,0xa2,0xcc,0x04,0xea,0x2c,0x75,0x27,0x07,0x40,0xbe,0x74,0xff,0x85,0x79 .byte 0xb9,0xed,0xa7,0x84,0xc7,0xd1,0xaf,0x29,0x6a,0xe6,0x5f,0x79,0xc0,0x3f,0x78,0x09,0xa0,0x06,0xba,0x18,0xfb,0xfa,0xc7,0x22,0x3c,0x46,0xce,0x55,0x7f,0xb7,0x9d,0x03,0xbf,0xe6,0xa1,0x80,0x92,0x13,0x38,0xb0,0x35,0x6e,0x9a,0x7d,0xdc,0x6e,0x3e,0x7b,0x6b,0x4b,0xe3,0x0d,0x33,0xe0,0x39,0x41,0x55,0xf7,0x3e,0x7d,0x73,0xfb,0x7d,0x01 .byte 0x73,0x8e,0xf5,0x4f,0xd9,0x63,0x9a,0x5b,0xf3,0x5b,0x7c,0x46,0xf9,0xdf,0x52,0x69,0x03,0x39,0x9e,0x6e,0x10,0x73,0xa5,0x28,0xe1,0x93,0x48,0x8d,0xc5,0x76,0x84,0xf1,0xdf,0x17,0x65,0x58,0xa8,0x73,0x75,0x67,0x9a,0x1f,0x2a,0xf4,0x2b,0xa1,0x40,0x17,0x2e,0x7e,0x07,0xd3,0x5a,0xdf,0x81,0xa8,0x34,0x00,0xee,0x53,0xc1,0x81,0x82,0xb6 .byte 0x9f,0x51,0x58,0x40,0x89,0xd0,0x29,0x38,0x56,0xef,0x55,0xf2,0x45,0x5e,0x68,0xdc,0xd8,0xc8,0x6e,0x6c,0x91,0x88,0xa6,0x07,0x25,0x0b,0xe9,0x17,0x06,0x3e,0x91,0x68,0x79,0x30,0x4f,0x92,0xa6,0xbf,0xb1,0x6b,0xdd,0x2e,0x91,0x83,0x86,0xe1,0x8b,0x0a,0xfe,0xe2,0x97,0x6f,0x34,0x7f,0xcf,0xa7,0x9b,0x3c,0x6c,0xb9,0x23,0x7d,0x33,0xed .byte 0x08,0xf0,0xed,0xa9,0x41,0xa8,0xe4,0xc7,0x95,0x07,0xf8,0x92,0xaf,0x1e,0x13,0x53,0xbb,0x36,0xa0,0x94,0xb2,0x87,0x1d,0x6f,0xdf,0xff,0x0f,0x7f,0x1b,0x23,0xa3,0x4b,0x40,0x47,0xb4,0x0d,0x30,0xae,0xd8,0xed,0x40,0x9e,0xe3,0x47,0x0f,0x25,0x8f,0xac,0x3f,0x56,0x7f,0x85,0xca,0x6e,0x0f,0x59,0x6f,0xd2,0x34,0x94,0xc6,0x08,0xa4,0x5f .byte 0x13,0x00,0x61,0x21,0x36,0xd3,0x0d,0x57,0xca,0xbf,0x2e,0xc4,0x69,0xba,0xaa,0x84,0x29,0xa9,0x9a,0x0b,0xab,0xb4,0xe3,0xb5,0x0b,0x14,0x17,0x8c,0xbd,0x64,0xc6,0x7c,0x4c,0xe7,0x49,0x3a,0x28,0xd7,0x7a,0x9e,0x50,0xe8,0x23,0x65,0x8f,0xba,0x4d,0xb6,0x75,0xee,0xf7,0x69,0xf5,0x95,0x8a,0xed,0xc5,0x13,0x4f,0x9a,0xed,0x4a,0xc1,0xfc .byte 0x09,0x48,0xe0,0x66,0x23,0xd5,0xc8,0xea,0xf3,0xa5,0x51,0x3f,0xc4,0xc0,0xfb,0x04,0x65,0x4f,0x33,0x94,0x94,0xbf,0xcb,0xe0,0x0f,0xe7,0x31,0x45,0xd0,0xe4,0xa5,0xae,0x90,0xf7,0x4e,0x96,0xcb,0x42,0x26,0xb4,0x75,0xa7,0xfa,0xb2,0x86,0x3a,0x96,0x24,0xe0,0x23,0x48,0x67,0xde,0x07,0x86,0xbf,0xb5,0x02,0x74,0x64,0xa6,0xf8,0xe3,0x95 .byte 0x0a,0x9c,0xd7,0x55,0xfc,0x00,0xca,0xfe,0x1f,0xee,0x2e,0x9c,0x0e,0x0b,0x8b,0xe7,0x49,0x62,0x5c,0x32,0x91,0xc5,0x55,0xdf,0x20,0x5a,0x23,0x36,0x91,0x2e,0xa7,0xce,0xfd,0x3c,0xa1,0xbe,0x23,0x6a,0xc9,0xc1,0x0d,0xc7,0x9f,0xe1,0x16,0x36,0xfc,0x76,0x82,0xcc,0x6e,0x35,0xde,0xe4,0xf9,0xe6,0x2a,0xd2,0xae,0xec,0x50,0x27,0x6a,0xba .byte 0x38,0x03,0x6e,0x59,0x33,0x21,0x99,0x1b,0xbb,0x31,0x4f,0x5f,0x2e,0xe2,0xa7,0xff,0xa7,0x0a,0x78,0x00,0x00,0x80,0xa1,0x6f,0x83,0x6f,0x51,0xb6,0xc6,0x74,0xca,0x85,0xbe,0xdd,0xa3,0xf1,0x73,0xd3,0xe6,0x6f,0x6d,0x37,0xc9,0x74,0x59,0x68,0x4a,0xf1,0x58,0x03,0x12,0x0e,0xab,0x9d,0x98,0xab,0x46,0x2b,0x55,0x90,0x46,0xb0,0xaa,0x75 .byte 0x01,0x26,0x33,0x0a,0xbc,0x36,0xe1,0x38,0x44,0xc1,0x6c,0xd9,0xb7,0xd4,0x6a,0x27,0xbd,0xc7,0xe0,0x58,0xb0,0x81,0x8f,0x71,0x80,0x64,0x3b,0x06,0x6e,0xc8,0x94,0xb9,0x97,0x0d,0xcd,0xe2,0xeb,0xd7,0xfb,0xaf,0x9f,0x69,0x3d,0x30,0xba,0xac,0x79,0xff,0x49,0x70,0x60,0x11,0x5e,0xb5,0x49,0x00,0x6b,0x08,0xad,0x0c,0xf2,0x98,0xd9,0x10 .byte 0x1e,0xcb,0xa2,0xb5,0x39,0x7c,0x8b,0xaf,0x00,0x14,0xd5,0xac,0x28,0x18,0xfa,0x61,0x05,0xf2,0x25,0x7f,0xd3,0x59,0x2f,0x22,0x72,0x36,0xf3,0xd8,0x57,0xb4,0x8d,0x8a,0x01,0x60,0x7a,0xb9,0x53,0xfd,0xf6,0xf3,0x46,0x40,0xba,0x3b,0x83,0x41,0x29,0x2d,0xf5,0x93,0x26,0x98,0x38,0x1a,0x0b,0xeb,0xfc,0xbb,0xa3,0xc2,0x0a,0xbc,0x90,0x25 .byte 0xc6,0x82,0x89,0xce,0x1c,0xd1,0xd7,0x1e,0x60,0xc8,0xc4,0xc8,0x75,0x43,0xb1,0x76,0x88,0x5a,0xf8,0x47,0x81,0x74,0xa9,0xce,0xf2,0xfb,0x2e,0x77,0x57,0xc2,0x67,0x57,0xad,0xf7,0xc7,0x17,0xe1,0x4f,0x7f,0xf1,0x2b,0x58,0xf8,0x3f,0xd2,0x2c,0x2e,0xfe,0x83,0x81,0x83,0x9e,0x37,0xac,0x25,0xc8,0x2c,0x23,0x17,0x76,0x10,0xcb,0x14,0x62 .byte 0xc2,0x91,0x20,0x7e,0x67,0xa2,0x7e,0xfd,0x14,0x46,0x25,0xa8,0xc6,0x2f,0xd5,0x28,0x6d,0x71,0xab,0x57,0xe3,0x05,0x30,0x39,0x66,0x16,0x22,0xa6,0xd2,0xef,0x75,0x65,0xfe,0x3c,0x3a,0x03,0xcf,0x08,0x85,0x32,0x1d,0xa3,0xd2,0x5a,0x5d,0x75,0x41,0x2c,0x2c,0xe4,0xc6,0x55,0xee,0x8d,0x48,0x44,0xf0,0x0c,0x5b,0xd0,0xe8,0x87,0x8d,0x77 .byte 0x83,0x32,0xc0,0x53,0xe2,0xea,0xb6,0xe3,0x85,0x4a,0xf9,0xed,0x01,0x85,0x68,0xb2,0xa7,0xec,0x5b,0xe0,0x46,0x90,0x4c,0x15,0x4c,0x7d,0x85,0xae,0x10,0x34,0xa3,0xae,0x58,0x9d,0xcd,0x27,0xc0,0xeb,0xeb,0x33,0xf9,0xa2,0x85,0x6c,0xd9,0x77,0xab,0x75,0x7c,0x24,0x54,0x3f,0x9d,0x15,0xd6,0x04,0x2a,0xb5,0x1a,0xaa,0xac,0xdd,0x03,0x2b .byte 0x0b,0x76,0xa4,0xf6,0x8f,0x27,0xe3,0x12,0x43,0x0e,0x6f,0x8b,0x32,0xeb,0xe2,0xd0,0xaa,0xaf,0x0d,0x8a,0x20,0xad,0x59,0x11,0x98,0x23,0xfd,0x8b,0xcb,0x41,0x73,0xc4,0x6a,0x68,0xd6,0x70,0x2e,0xc9,0xc5,0x99,0xcb,0x5f,0x06,0x50,0x99,0x22,0x47,0x39,0x2f,0x74,0xbf,0xd4,0xd2,0xa4,0x2c,0x9c,0xf0,0xaa,0x96,0xb5,0xac,0x77,0x05,0x73 .byte 0xa7,0xc3,0x7a,0xcd,0x6f,0x97,0x6f,0x82,0x84,0xeb,0x28,0x2e,0x5a,0x1d,0xfb,0x4c,0x1b,0x20,0x03,0x1e,0x0e,0xd9,0xe2,0xca,0x09,0x8f,0x63,0x74,0xe4,0x8e,0x06,0x09,0x6d,0xf5,0xf4,0x4a,0x08,0xd2,0xc7,0x95,0xd7,0x82,0x0b,0x2a,0x80,0x84,0xf2,0xf1,0xef,0x33,0x17,0xbc,0x09,0xf3,0x7d,0xc0,0x90,0x3e,0x0a,0x1c,0xda,0xad,0x22,0xfb .byte 0x7d,0x95,0x17,0x71,0x02,0xcb,0xd6,0x06,0x6a,0x0d,0xc1,0x91,0x90,0xda,0xed,0xff,0x1a,0x6b,0xa1,0x1b,0x5f,0xb7,0xc2,0xee,0x89,0x06,0x74,0xc5,0x0a,0x0b,0x5b,0xac,0xbc,0x8e,0xc5,0x94,0x97,0x49,0x1a,0xe3,0x61,0xd0,0x6a,0x6d,0x04,0xb8,0xa6,0xb0,0xd5,0xee,0x17,0xbc,0x24,0x1f,0x73,0x2c,0x8f,0xf4,0xd5,0x94,0x0c,0x66,0x73,0x79 .byte 0xc7,0x8d,0x13,0xfa,0x15,0xb7,0xcd,0xcc,0x63,0xdd,0x51,0xb0,0x42,0x43,0xa7,0x2b,0xad,0xfd,0xdc,0x78,0x91,0x94,0x43,0x4f,0x27,0xac,0x6c,0xeb,0xc3,0x21,0x64,0x0c,0xa4,0xb4,0x3c,0x48,0x97,0x6a,0x10,0x2e,0x15,0x42,0xa4,0xfc,0x4e,0xfc,0xda,0x4e,0x23,0x09,0x2e,0x59,0x56,0x73,0x8f,0x6b,0x0d,0x03,0x73,0xc8,0x6b,0x7e,0x3b,0xc6 .byte 0x38,0x56,0xb4,0x35,0x99,0x53,0x02,0x8c,0xae,0x30,0xc8,0x34,0xe5,0xa4,0xab,0xdb,0x43,0x8b,0x31,0x32,0xd2,0x19,0xfe,0x61,0x32,0x86,0x3d,0x94,0x3d,0xe5,0x3e,0xb1,0x32,0x87,0xfc,0x3d,0xdb,0xc7,0xfb,0x2a,0x31,0xbf,0x58,0x62,0xfb,0xc3,0xeb,0x57,0xb7,0xda,0xc7,0xb7,0xe1,0x90,0x42,0xe1,0x23,0x3e,0x36,0x23,0x17,0x74,0x3a,0x55 .byte 0x9b,0xfc,0x39,0x83,0x6f,0xdd,0x8d,0xcf,0x51,0xb7,0x26,0x66,0xe5,0x3f,0x7e,0xb7,0x03,0xa7,0x29,0x82,0x8d,0xb0,0xfa,0x01,0xf7,0x31,0x60,0xa3,0x4a,0xa3,0x30,0x44,0x55,0xfc,0xb6,0x60,0xaa,0xf7,0xf2,0x43,0xfc,0x27,0x33,0x67,0x5b,0x97,0x80,0x7a,0x03,0xd3,0x12,0x95,0x83,0x9c,0xb3,0xc4,0x65,0x12,0x21,0x05,0xb0,0xff,0xcf,0x37 .byte 0x56,0x82,0xe5,0x9b,0xbc,0x8a,0x64,0x6a,0x74,0xa7,0xee,0x30,0xd0,0x5c,0x2b,0x4f,0x47,0xeb,0xa4,0x6d,0xa9,0x3d,0x5b,0xdb,0x75,0x36,0x7c,0xdf,0xd5,0x42,0xdd,0xf0,0x69,0xb1,0x52,0x48,0xf2,0x2e,0x55,0x65,0x2e,0x17,0xe9,0xc1,0xfe,0x28,0x6f,0x6c,0x91,0x0a,0xfd,0x53,0xcb,0x64,0x24,0xf0,0xb2,0xc3,0x54,0x89,0x41,0xb6,0x3d,0xa5 .byte 0x94,0x34,0x3a,0xa6,0xcd,0x1b,0x5f,0x30,0x4a,0x49,0xea,0x8d,0x34,0x0d,0xdb,0x08,0x02,0x74,0xc3,0x34,0xf6,0xdb,0xce,0x4f,0x00,0xc4,0xdc,0x87,0x6c,0x86,0xd4,0x68,0x77,0xf8,0xb5,0x59,0x6a,0x4b,0xa8,0xeb,0x2f,0x7c,0xe8,0xf4,0xb6,0x28,0x1b,0x0a,0x80,0x43,0x32,0xac,0x77,0xf1,0x47,0x80,0x1e,0x19,0x59,0x05,0xf5,0x3f,0xe4,0x76 .byte 0x83,0xa4,0xb0,0x44,0x4c,0xab,0x72,0x98,0x0c,0x84,0x0f,0x31,0x7f,0xbe,0xb8,0xe6,0x39,0x99,0x84,0x7d,0x25,0x85,0x89,0x0a,0x7b,0xe4,0xc7,0xa3,0x65,0x0b,0xdd,0x68,0x70,0xc4,0x8c,0xf9,0x6b,0xa5,0xaa,0x42,0x23,0xea,0x77,0xd9,0xee,0x5c,0xbd,0x5c,0x3c,0x0e,0x73,0x77,0xdf,0x90,0xc9,0x30,0x89,0x51,0x4b,0x96,0x62,0x6a,0x32,0x5f .byte 0xfb,0x63,0xbc,0x4a,0x0c,0x2b,0x5f,0x32,0x3f,0xee,0x8a,0x3a,0xf7,0x0e,0xce,0xdb,0x40,0x96,0xc6,0x4f,0x34,0x9c,0x9c,0x10,0x2d,0x53,0xf0,0x63,0x69,0x64,0x82,0xec,0x22,0x8d,0x28,0x66,0x7f,0x8a,0x4b,0x67,0x7b,0x2c,0xc7,0xea,0xd1,0x54,0x5a,0xa3,0xd6,0xaa,0xae,0x84,0xe1,0x70,0x61,0x5b,0x63,0xba,0x07,0x07,0x73,0x93,0xbb,0x90 .byte 0x95,0x07,0x0d,0x99,0xd4,0x4c,0x30,0xc1,0xba,0x5c,0xbb,0xec,0x88,0xd2,0x0d,0xab,0xc8,0x4b,0xce,0xe9,0x5f,0x17,0x64,0x98,0x46,0x58,0xad,0x27,0x35,0xca,0xc9,0x33,0x39,0x94,0xd0,0xe2,0xe9,0x9f,0x99,0x96,0xf9,0xaf,0xfd,0xec,0xe2,0xfe,0x67,0xc1,0x54,0xe2,0xfa,0x73,0x4e,0x3e,0xcc,0xe0,0xb7,0x13,0x13,0xc9,0x57,0x26,0xf6,0x18 .byte 0x2f,0xba,0x8e,0x69,0xca,0x04,0x1b,0x59,0x2a,0xde,0x7e,0x64,0x7c,0xa3,0x10,0xe8,0xf1,0x0e,0x63,0x1a,0xda,0x6c,0x7a,0x8f,0x98,0x98,0xe5,0xb6,0x3a,0xa9,0x71,0xf1,0xf5,0x99,0xbc,0x99,0xa1,0x70,0x18,0x28,0xc7,0xa9,0x04,0xb9,0x5d,0x6b,0x1d,0x87,0x9b,0x5d,0x6b,0x7f,0x43,0x88,0x76,0x14,0x77,0x4d,0x4b,0x10,0xa6,0xeb,0xa5,0x0a .byte 0xfe,0x76,0xe3,0x9b,0x75,0x67,0xb2,0x9e,0xf3,0x2b,0x10,0xb2,0x68,0x1e,0xb7,0x09,0xdf,0xd6,0x6e,0xa2,0x50,0x96,0x25,0x62,0x17,0x2f,0x65,0xeb,0xa0,0x6a,0xf9,0xc1,0x42,0x32,0x0a,0x88,0x3d,0x5e,0x80,0x62,0xcb,0x85,0x5f,0xe5,0x00,0x69,0x5a,0x99,0x3f,0xc4,0x58,0xe1,0x5b,0x4e,0x9e,0x33,0x49,0x9d,0xe4,0x4f,0xab,0xa7,0xe1,0x56 .byte 0xed,0x3e,0x32,0xeb,0x0e,0x42,0x3f,0xac,0x9a,0x18,0xd6,0x1c,0x64,0x24,0xe2,0x11,0x5a,0x21,0x58,0x2b,0x0d,0xa6,0xff,0x5c,0x65,0xc5,0x77,0x3c,0xcd,0xeb,0xb6,0x8e,0xef,0xa5,0x04,0x20,0xa8,0x89,0x24,0x96,0x4b,0x47,0x41,0x86,0x84,0x4c,0x48,0xe7,0xa2,0x83,0x5d,0x0e,0xbb,0x94,0xdd,0x5f,0x2d,0x5b,0x77,0xba,0xcb,0x83,0xbe,0x95 .byte 0x80,0x38,0xbb,0xdb,0xf8,0x15,0x62,0x2a,0x1f,0xa0,0xe7,0xc3,0x58,0x73,0x9a,0x5e,0x17,0xd9,0xc1,0x78,0x73,0x61,0xe9,0xa3,0xf2,0x63,0xfe,0x7d,0x94,0x8c,0x5d,0x3a,0xdb,0x4e,0x1c,0x5c,0xd1,0x09,0x1d,0xb4,0xb2,0x9e,0x35,0xe2,0x78,0xdc,0x5e,0x93,0x52,0x63,0x99,0xc0,0x1c,0x2b,0x80,0xa4,0x53,0x3f,0xd3,0xe7,0xe4,0xc9,0x61,0xce .byte 0x12,0xd5,0x4e,0x19,0xbb,0x0c,0xc4,0xdb,0x5b,0xc5,0xd2,0x41,0x29,0xa7,0x89,0x28,0x66,0xcc,0xc9,0x96,0x87,0x62,0x7d,0xa2,0x88,0x23,0x3b,0x8a,0xbd,0x90,0x0b,0x2b,0x6d,0x81,0x2f,0x73,0x3e,0xba,0xe1,0xfe,0x50,0xfb,0xbb,0xb2,0x41,0xe7,0x72,0x46,0xd6,0x4f,0xb7,0x90,0xd9,0x61,0x78,0x7a,0xa9,0x30,0x20,0x4a,0x4c,0x1f,0xd3,0x57 .byte 0x65,0x04,0x42,0xf8,0x35,0xe9,0x1b,0xf2,0xc2,0x95,0x70,0x7f,0x8d,0x4e,0x80,0x92,0x9f,0x55,0x62,0xcb,0x66,0xb0,0x66,0xda,0xa1,0x7d,0x2d,0x44,0xae,0x01,0x00,0x83,0x3e,0xfe,0x8c,0x66,0x39,0xb7,0x14,0xc9,0xd7,0xa4,0x87,0xd4,0x1c,0xe9,0xbd,0x31,0x1b,0x52,0x2d,0x2b,0x12,0x85,0x40,0x77,0xa3,0xd0,0x62,0x9b,0xf2,0x5c,0x48,0x53 .byte 0x3c,0x7c,0xdc,0xfa,0xa1,0x84,0xed,0x09,0xca,0xb4,0x8f,0x16,0x7a,0x0b,0x9e,0x7c,0xf5,0x07,0xab,0x47,0xa0,0x41,0x58,0xb0,0x0b,0xd8,0xc3,0x2b,0xeb,0x3a,0x7b,0xc4,0xe2,0xe9,0xcc,0xdb,0x3d,0x00,0xcf,0x8d,0x51,0x60,0xa7,0x9d,0xef,0x36,0xa2,0x7d,0xf1,0xb8,0xb5,0x75,0xac,0x76,0x2b,0xb7,0x9d,0x47,0xd3,0x30,0x96,0x4c,0x36,0xf2 .byte 0x9a,0x70,0xe3,0xd7,0xaf,0xa0,0x33,0xb9,0xdf,0xea,0xc2,0x80,0xf6,0x37,0xbf,0x83,0x39,0x22,0x42,0xc7,0xbf,0xba,0xd1,0xb6,0xd9,0xe2,0x0e,0xa1,0xe5,0x65,0xfd,0x6a,0x09,0xd9,0xd5,0x98,0x1d,0x92,0x84,0x4b,0xa5,0x03,0x94,0xf2,0x82,0x2d,0x66,0x22,0xf2,0x40,0x27,0x35,0x0c,0x1a,0x0c,0x1e,0xf5,0x28,0x93,0xeb,0x2d,0xb0,0x2f,0xdd .byte 0x82,0x97,0x1e,0x0d,0x2c,0xea,0xad,0x2a,0x4b,0xb4,0xaa,0xf2,0x62,0x65,0x96,0x5a,0xb7,0x13,0x2b,0xa5,0x7f,0xa8,0xae,0x47,0x34,0x76,0x09,0x50,0x13,0xd5,0x92,0xef,0x08,0x28,0x4a,0xa3,0x68,0x58,0x08,0x50,0x56,0x4a,0xa4,0x61,0xae,0xc5,0x3c,0x0e,0x87,0x25,0xc2,0xe3,0x37,0xc8,0x08,0xe3,0x15,0xdd,0xb5,0x2b,0x47,0x1a,0xf8,0x5c .byte 0xaf,0x81,0x70,0x35,0xff,0xeb,0x19,0x78,0x21,0xa6,0x65,0x13,0x35,0x5f,0x9c,0x5b,0xc5,0xca,0x3f,0x33,0x3b,0xe5,0x50,0x9a,0x1c,0x88,0x04,0xd8,0xfe,0x52,0x6f,0xd5,0x99,0x60,0x9b,0x18,0x2a,0xfb,0xc5,0x39,0xe3,0x9f,0xfe,0x3c,0xcb,0x77,0x0b,0xb8,0x65,0x1b,0x37,0xd2,0x56,0x61,0xbe,0x45,0xba,0x7b,0x14,0x88,0xf4,0xfe,0x6f,0xe4 .byte 0xae,0x4e,0x06,0xd4,0xad,0x37,0x63,0x61,0xf2,0x27,0x62,0x21,0xdf,0x1a,0x44,0x64,0xd8,0xae,0xb4,0x2b,0x08,0xdc,0x2c,0x7e,0xab,0x82,0x38,0x20,0x2b,0x78,0x87,0x47,0x0a,0xeb,0xbf,0xfb,0x4b,0xb7,0x8a,0xf4,0xa1,0x29,0x23,0xbb,0xff,0xa9,0x4f,0x9c,0x0b,0xa4,0x22,0x2e,0x89,0x7f,0x3f,0x5d,0x9e,0xa6,0xff,0xeb,0xd6,0x61,0x23,0x19 .byte 0x8f,0x82,0x68,0xee,0x22,0xa8,0x7a,0xb6,0xb1,0x9e,0xe7,0x52,0x22,0x5e,0xa4,0xf4,0xb7,0x7b,0x5a,0xf7,0x4b,0xea,0xf3,0xc8,0x36,0x81,0xbf,0x6f,0x16,0x54,0x6f,0x58,0x48,0x98,0x06,0xa2,0x80,0xdd,0x62,0x43,0x88,0x27,0x4d,0x83,0xff,0xfb,0x8f,0xe8,0x4b,0x42,0x83,0x74,0xca,0xe5,0x38,0xce,0xcf,0x5d,0xad,0xe5,0xfa,0x08,0xeb,0xba .byte 0xb9,0x30,0xef,0x80,0xa0,0xd3,0x3e,0x0d,0x86,0x87,0x44,0x6f,0xae,0x1c,0xe6,0x27,0xfb,0x10,0x66,0x69,0x6c,0x52,0x11,0x2e,0x8c,0x66,0x59,0x3e,0xd3,0x0c,0x1f,0x28,0x64,0xa2,0x1e,0x47,0xc7,0x6f,0x8b,0x12,0x49,0x9c,0x6a,0xc0,0x17,0x4a,0xaf,0x30,0x19,0x54,0x9e,0x90,0xf6,0x9e,0x91,0xed,0x7d,0xf2,0x53,0xef,0x71,0xad,0xcb,0xe4 .byte 0x6b,0xb9,0xe5,0x56,0x51,0xfc,0x53,0x06,0xdb,0x9f,0xc4,0x2f,0x2e,0x51,0x7a,0x7d,0xd7,0x4e,0x1d,0x44,0x44,0xd0,0x96,0x4d,0xe1,0xa7,0xb3,0xda,0x82,0x30,0xcb,0xd1,0x9b,0x1c,0x51,0x24,0xf9,0xc6,0x89,0x63,0x49,0xa4,0x2d,0xad,0xec,0x24,0x5c,0xbf,0xc3,0x35,0x56,0x83,0xd2,0x93,0x89,0x7b,0x32,0xf2,0x2b,0x68,0x84,0x47,0xd7,0xb8 .byte 0x72,0x98,0x72,0x3c,0xc6,0x8a,0x70,0x48,0xe0,0x75,0xe0,0xb8,0xb9,0xf1,0xde,0x14,0x26,0x94,0x43,0x25,0x23,0x82,0x35,0xf9,0xc6,0xc4,0xaa,0xad,0x4e,0x3c,0xa2,0x09,0x44,0x92,0x75,0x47,0xa7,0xd0,0x39,0xcc,0xea,0xfd,0x0c,0x0f,0xd4,0x06,0x2a,0x75,0x70,0x66,0x29,0x74,0x0e,0x0f,0x3a,0xaf,0xe3,0x42,0x9c,0xc5,0x62,0x3e,0x2c,0x4a .byte 0x8f,0xac,0x64,0x47,0x12,0x77,0xfa,0x57,0x01,0xee,0x7e,0x3d,0x23,0x61,0xef,0x26,0x0b,0x9b,0x45,0xc5,0x04,0x4d,0x9b,0xb6,0x74,0x2e,0xcc,0xe7,0x93,0x31,0xbb,0x55,0x7e,0x2d,0xb6,0x90,0xa6,0x3b,0x5a,0x96,0x11,0xe5,0x64,0x1b,0xa2,0x58,0x4b,0x05,0x36,0xd7,0xbe,0x68,0x17,0x25,0xc4,0x56,0x21,0x67,0x29,0x73,0x17,0x58,0x15,0x8b .byte 0xf8,0xe0,0xee,0xa2,0x96,0xf8,0x3e,0x01,0xac,0xca,0xb1,0x97,0x9e,0x62,0x46,0xd8,0xe3,0xd4,0x5d,0x81,0x17,0x18,0xcf,0xce,0x59,0x1c,0x9c,0x2c,0xc6,0xf7,0x26,0x74,0x40,0xfc,0x41,0x9f,0x1e,0xbb,0xf5,0xee,0x01,0x71,0xb5,0xa4,0x66,0xc1,0xba,0xbb,0x9e,0x97,0xdb,0xc1,0x66,0x3d,0xd2,0x1a,0xf0,0x95,0x11,0x68,0x2e,0x8e,0xbe,0x25 .byte 0x4b,0x0d,0xe9,0xbb,0xad,0x77,0xfb,0x7a,0x96,0x18,0x36,0xe1,0xc3,0x1c,0x3a,0x8e,0x75,0x93,0x83,0x0c,0x34,0xa3,0x14,0xd9,0x43,0x7b,0x31,0x46,0xa0,0x7a,0x94,0x15,0x2e,0x03,0xa4,0x61,0xb7,0x4c,0x44,0x31,0x75,0x2f,0x35,0x29,0x5e,0x08,0x7b,0x83,0x0e,0x47,0xe7,0x5b,0x6d,0x64,0xe5,0x2f,0xbb,0x41,0x9f,0x1f,0xd2,0xe9,0x2d,0xf3 .byte 0x42,0x23,0x4b,0x44,0x51,0xe4,0x5f,0x9b,0xb5,0xe5,0x19,0xaf,0xbe,0x68,0x14,0x81,0x9d,0xed,0xf7,0xf8,0x9d,0xe6,0x60,0x57,0xf5,0x4e,0x59,0x58,0x51,0x23,0x56,0x3f,0x9a,0x98,0x3a,0x7c,0x0c,0xeb,0xa9,0xb7,0xcb,0xac,0x3a,0xac,0xa9,0x95,0x84,0x18,0x58,0x8a,0x65,0x1f,0xde,0xad,0x9b,0xb1,0x60,0xc9,0x63,0x7a,0xdd,0x2e,0x04,0x21 .byte 0x78,0x91,0x81,0xda,0x4f,0x7c,0xbe,0xc7,0xa4,0x80,0x1d,0xdc,0x9b,0x82,0xcc,0xf7,0x52,0x5d,0x55,0xc7,0xd6,0xa5,0x90,0x1d,0x5e,0xe1,0x8e,0x15,0xe2,0x6b,0x3c,0x76,0xad,0x0c,0x9b,0x77,0x2d,0x78,0x5f,0xc9,0x93,0x71,0x15,0x7f,0x8a,0xe3,0x1b,0x0d,0xb1,0x77,0x2a,0xbd,0x8a,0x1e,0x77,0x88,0xbe,0x77,0xef,0x7e,0xe5,0x1a,0x92,0xdd .byte 0xa0,0x8f,0x98,0x66,0xbd,0x01,0x2d,0x32,0xc2,0x68,0xa4,0xd2,0x4b,0x3d,0x6b,0x92,0xce,0x51,0xc0,0xde,0x7d,0x3b,0x0b,0x59,0xa3,0xfa,0xd6,0xe5,0xba,0x12,0xa3,0x4f,0x1a,0xfd,0x37,0x39,0x48,0x08,0x7b,0x59,0x31,0x13,0xda,0x3e,0x3f,0x9b,0x7f,0x7f,0x3b,0xde,0x3e,0x22,0xfa,0x89,0x65,0x9a,0x84,0xdc,0x4c,0x87,0xde,0x31,0x0e,0x88 .byte 0xa4,0x7c,0xff,0x84,0x04,0xf7,0x56,0x26,0x5b,0x6a,0x77,0xbc,0x01,0xe2,0x71,0xf5,0xf5,0x9d,0xb2,0xf6,0x24,0xcd,0xb2,0x32,0x6e,0x64,0x84,0xbc,0xc0,0xab,0x32,0x60,0x9c,0xed,0xda,0x69,0x8b,0xd1,0xe9,0x88,0xf0,0x8e,0x17,0x02,0xc5,0x5e,0x92,0x24,0x62,0xa6,0x19,0x64,0x8c,0xaa,0x2d,0x01,0x7b,0x3b,0xd4,0xa9,0x36,0x08,0xfb,0x86 .byte 0x10,0xbf,0x47,0x65,0x0a,0x51,0xab,0xab,0x9a,0xcf,0xf2,0x55,0x27,0xa5,0xb7,0x78,0x75,0x81,0xc8,0x2e,0x7a,0x91,0x00,0x77,0x25,0xb8,0xaa,0x3e,0x0a,0xe4,0x73,0x09,0x96,0xec,0x67,0x96,0x68,0x97,0xfd,0x06,0x69,0x06,0xe9,0x75,0x61,0x66,0x26,0x4e,0xc4,0xef,0xe4,0xd0,0x22,0x0d,0x7d,0x6e,0x3c,0x93,0x24,0x40,0x6c,0x82,0xa8,0xe8 .byte 0x80,0x92,0xdd,0xb6,0xc4,0x66,0x17,0xc5,0x4e,0xc2,0x3d,0xb1,0x5c,0x99,0x43,0x4d,0xa8,0x04,0x57,0x77,0x39,0x9e,0x4b,0xc6,0xab,0x47,0xbd,0xf6,0x45,0x24,0xc7,0xf9,0x7b,0xfa,0xd6,0x8a,0x4a,0x2d,0x14,0x12,0x76,0x48,0x9d,0x7a,0x91,0x85,0x26,0x2f,0x55,0x64,0xe8,0x7c,0x28,0x0c,0x5f,0x2b,0x12,0xef,0xf4,0x35,0x6b,0x78,0x19,0xd2 .byte 0x70,0x70,0x09,0xf3,0x32,0x8b,0x41,0x26,0x08,0xf4,0xeb,0x83,0x8d,0x2d,0x13,0x36,0xc2,0x27,0x65,0xb5,0x2a,0xa0,0x3d,0x7b,0x2f,0x08,0x4d,0xa8,0x26,0xf8,0xf8,0xc4,0xa4,0x45,0x72,0x1b,0x78,0x31,0xc7,0x68,0x8a,0x6f,0x74,0xa3,0xd0,0x7b,0x4d,0xd0,0x20,0xf4,0xbb,0x97,0xca,0x8e,0xb5,0x9b,0x76,0x67,0x5f,0x16,0x63,0x07,0x3b,0x85 .byte 0x49,0x9b,0xe0,0xdb,0xe8,0x7a,0x47,0x76,0x2c,0xf3,0x95,0x52,0x0f,0x4c,0x8c,0xfa,0x5c,0xfd,0xf8,0xe6,0xa4,0xdd,0x7d,0x4a,0x70,0x24,0xc3,0x88,0xa5,0x7a,0x74,0x63,0xc2,0x47,0x1f,0xe2,0x52,0xde,0x5a,0x99,0x7b,0x66,0xd0,0x7f,0xe0,0x59,0x39,0xc3,0xe2,0xad,0x1b,0xb7,0x8a,0xb8,0x4a,0x5f,0xdf,0x08,0xf7,0xe9,0xb8,0xcc,0x8a,0x5d .byte 0x84,0x95,0xac,0x2b,0xe4,0xfb,0x67,0x01,0x6c,0x4c,0x95,0x46,0x0f,0xf5,0x62,0x47,0x32,0xdd,0xb7,0xd9,0x7b,0xb2,0xbc,0x88,0xaa,0x19,0x80,0x00,0x6d,0xb4,0x0d,0x2f,0x91,0x7b,0x60,0x3b,0x58,0x4b,0x2e,0xf7,0x73,0x77,0x5c,0x47,0xfe,0x12,0x02,0x74,0xef,0x79,0xaa,0xe7,0x23,0x25,0x3b,0x83,0x06,0x24,0x07,0xd1,0x5a,0x87,0x5b,0x88 .byte 0x0e,0x40,0x35,0x87,0xbb,0x46,0x56,0x00,0x02,0xf1,0xea,0x43,0x9c,0xa2,0xc3,0xf2,0x41,0x6d,0xc1,0x2c,0x38,0x95,0x89,0x03,0xd1,0x69,0x9c,0x62,0xdd,0x8b,0x57,0xc3,0x95,0x4d,0x51,0x2a,0x40,0xd8,0xd1,0x56,0xca,0x90,0x5d,0xc9,0xc5,0x6d,0x05,0x32,0x01,0x70,0x2e,0xc9,0x53,0xe1,0xeb,0xfd,0x77,0x6e,0x4a,0x2d,0x4c,0xe5,0x0a,0x25 .byte 0x44,0x01,0xff,0x80,0x09,0x98,0x94,0xc6,0x81,0x3f,0x3f,0x59,0x26,0x83,0x94,0x7e,0xe9,0x6e,0x38,0xfe,0x90,0x4f,0xe3,0xec,0x12,0xe5,0x80,0x43,0x11,0x62,0x0c,0x03,0x92,0x91,0xce,0x2a,0x5f,0x68,0x30,0xc3,0x5e,0x7b,0x07,0xf1,0xe1,0x25,0xd9,0x26,0xb2,0x0a,0xdc,0x69,0x95,0x23,0x54,0xcd,0xf2,0x15,0x6d,0xbb,0x39,0x29,0x51,0x18 .byte 0x20,0x6a,0xcf,0xc7,0x01,0x49,0x49,0xc6,0x76,0x01,0x6e,0xda,0xf2,0xe3,0x41,0x07,0xc7,0xf8,0xa3,0xcb,0x9f,0x5f,0xcf,0xfe,0x66,0xc0,0xc2,0x61,0x9e,0x01,0x10,0x43,0xd7,0xe8,0x45,0x14,0xcc,0x10,0x80,0x8d,0xc5,0x68,0x8d,0xd5,0x04,0xee,0xc7,0x12,0xf7,0x17,0x06,0x87,0x7c,0x00,0x9a,0x59,0x12,0xd9,0x91,0x76,0x4c,0x6a,0x77,0xff .byte 0x67,0x87,0x60,0x1b,0x82,0x62,0x37,0x44,0x92,0xe8,0x55,0xa1,0xf2,0x31,0xd3,0x94,0xef,0xbf,0x3d,0x3a,0x62,0x79,0xa8,0x0b,0x46,0x0b,0xa4,0xb3,0x0b,0xa9,0x59,0x6c,0x31,0x8a,0x0d,0x98,0xb4,0x43,0x17,0x94,0x5d,0xd0,0x3e,0x86,0xe1,0x20,0x6f,0xd5,0xed,0x42,0x27,0xc0,0xf5,0x93,0x71,0x66,0xec,0xed,0xc9,0xa0,0xb1,0xf0,0xc5,0x71 .byte 0x29,0x90,0x6b,0x0d,0x04,0xa0,0x06,0xda,0x83,0x25,0x1a,0xfb,0x7e,0xd7,0xd7,0xd3,0x85,0x9b,0x03,0xd7,0xeb,0x47,0xf3,0xf7,0x03,0x0c,0xd9,0x58,0x48,0x2b,0xa1,0xb1,0x62,0xf3,0x46,0x37,0xa9,0x2d,0xed,0x7b,0x59,0x83,0x79,0xc0,0x5e,0xf7,0x6c,0xeb,0x64,0x20,0x15,0xfb,0x7f,0x68,0x78,0x08,0x56,0xea,0xa4,0x73,0x84,0xd5,0x78,0x85 .byte 0xd5,0x40,0xba,0x98,0xc0,0x69,0x7b,0xf9,0x7d,0x36,0xc1,0x9d,0xcf,0xaa,0xdd,0x22,0x50,0x59,0xd1,0x60,0x61,0xa7,0x76,0xba,0xc9,0x25,0x11,0xae,0x88,0x65,0x17,0x20,0xa2,0xc7,0x70,0x17,0xd7,0x31,0x1a,0x80,0xd3,0x00,0x94,0x62,0x83,0x2a,0x59,0x0c,0xb8,0x0a,0x08,0xe3,0xf1,0xdf,0x90,0x2c,0xdd,0x4f,0x17,0xe9,0x96,0xcd,0xfc,0x2a .byte 0x21,0x3a,0xdb,0x12,0x4f,0x8e,0x1f,0xc3,0x0d,0x3d,0x76,0x1c,0xc5,0xd7,0x4b,0x57,0xea,0xe7,0x3e,0x06,0xa6,0xdb,0xbc,0x0e,0xed,0x52,0x35,0x90,0x64,0xb0,0x96,0xa8,0x35,0xc5,0x87,0x09,0xf2,0x6e,0x93,0x9a,0xd7,0x51,0x21,0xac,0xc0,0x84,0x33,0x54,0x26,0x04,0x61,0x8e,0xaf,0x84,0x9a,0x04,0x3a,0x3f,0x37,0x7d,0x92,0x93,0x46,0xd6 .byte 0xd7,0x54,0xee,0xbf,0xeb,0x5b,0xc7,0xea,0xef,0xef,0x5b,0x0c,0xa3,0x74,0x77,0x6c,0xc5,0x13,0xb0,0x81,0x04,0x53,0x61,0xe2,0xdf,0xbc,0x80,0x00,0xd9,0xe4,0xcd,0x8e,0x4b,0x72,0xc1,0xcc,0xef,0xf0,0x26,0xc6,0xe5,0x8c,0x84,0x3b,0x39,0xeb,0x92,0x63,0x79,0x74,0xa8,0x78,0xd7,0x89,0x36,0xa8,0xcc,0x91,0x4c,0xda,0x94,0xc2,0x69,0x2a .byte 0xd5,0x16,0x39,0x97,0xac,0xea,0x31,0x00,0x3c,0x12,0xeb,0x76,0xd8,0xd1,0x83,0x77,0xc5,0xb9,0x94,0x31,0x6c,0xad,0xdf,0x9f,0x83,0xc1,0x19,0x09,0xe9,0xf8,0xbc,0x6a,0xab,0xa6,0xdc,0x09,0xd4,0x8b,0x17,0x0a,0x91,0xe9,0x39,0x80,0x63,0x46,0xd5,0x60,0xeb,0x5f,0x74,0xf1,0x8b,0x16,0x08,0x82,0x44,0x08,0xed,0xc2,0x39,0x6e,0x69,0x7a .byte 0x62,0xc7,0x4d,0x06,0xee,0x1f,0x9c,0xc9,0x3b,0xca,0xcc,0x8b,0x57,0xb2,0x0f,0xc5,0xa1,0x14,0x69,0x81,0x4d,0x1b,0xd3,0xc2,0xf9,0x08,0xc7,0xec,0x4f,0x4b,0x33,0x2c,0xe5,0xf2,0x2e,0xac,0x9b,0xde,0xe2,0x27,0xe8,0x5c,0x09,0xf5,0x13,0xb0,0xe5,0xec,0xb9,0xc3,0xd4,0x04,0xf3,0x4b,0x5c,0x88,0xe1,0x20,0x3e,0x5b,0x10,0x6d,0xfa,0x81 .byte 0x98,0x09,0x63,0x5e,0xf1,0x25,0x6a,0xcc,0x53,0x79,0xdd,0x22,0xe3,0x47,0xe8,0x8e,0xbf,0xd0,0xbd,0xec,0x32,0x34,0x36,0x96,0x2c,0x04,0xbd,0x41,0x04,0xae,0xcd,0xdf,0xb0,0x72,0x75,0x64,0xd6,0xf1,0x4e,0x2e,0x7f,0x5a,0x61,0x08,0xd6,0x30,0xf1,0x67,0x24,0xd4,0x58,0x9e,0x6b,0x33,0x38,0x36,0x81,0x68,0xa5,0xfb,0x81,0x49,0x8f,0xcb .byte 0x00,0x21,0xd3,0xcc,0x81,0x72,0x2f,0x07,0x52,0x1e,0x38,0xd9,0x26,0x7b,0xfe,0xdb,0xcf,0xfc,0x35,0x38,0x70,0x3f,0x07,0x7a,0xae,0xed,0x33,0x2e,0x2d,0xb3,0x03,0xd1,0x72,0x70,0x5c,0x50,0x32,0xcc,0xd0,0x22,0x02,0xa6,0x10,0x91,0x1b,0x39,0xcb,0x5c,0x2b,0x2d,0x4a,0x66,0x15,0xef,0xb2,0x21,0x70,0x52,0xd6,0x30,0xe3,0x0a,0x6d,0xc5 .byte 0x80,0xe2,0x21,0xef,0x5d,0xf7,0x20,0xa4,0xe6,0x42,0x9c,0x37,0x57,0x4b,0x5d,0xc7,0x84,0xa6,0x84,0x14,0xa3,0x8a,0xe4,0x40,0x29,0xa4,0xc0,0x30,0x46,0xec,0xc5,0x17,0x67,0xb8,0x3a,0x06,0x7b,0xdf,0x41,0xf4,0x32,0xb4,0xc5,0x43,0xb3,0xe3,0xe8,0x73,0x3d,0xac,0x0c,0x07,0xb3,0x8c,0x33,0xe5,0x4f,0xf2,0x35,0xb8,0x44,0x38,0x48,0x63 .byte 0x82,0x6c,0x6d,0x9e,0x42,0xbc,0x5c,0x48,0x81,0xde,0xb4,0xda,0x13,0x04,0x85,0x0c,0x81,0x93,0x46,0x43,0x17,0x5a,0xdb,0xd3,0x1a,0x6d,0xbe,0x30,0xc1,0x2b,0xa3,0x54,0xcf,0xe2,0xa5,0xfd,0x0f,0x01,0xfd,0xf6,0x78,0x5a,0x95,0x5f,0x01,0x6d,0xb0,0x8f,0x09,0x57,0x90,0xa2,0x46,0x38,0xf8,0x98,0xcf,0x95,0xa3,0xbe,0xb5,0xf5,0x6d,0x54 .byte 0xa1,0x3c,0xa4,0x63,0x0f,0x5f,0xfe,0x47,0x43,0xa5,0x0a,0x18,0x2b,0x5d,0x44,0x29,0x06,0xde,0xc5,0x40,0x6d,0x62,0x8c,0x5a,0x63,0x22,0xc3,0x68,0xa0,0x02,0x30,0xc2,0xaa,0xc5,0xc3,0x40,0xb6,0x39,0xec,0x54,0x76,0x0f,0x52,0xd4,0x47,0xe5,0x9f,0xcb,0x55,0xc9,0x5d,0x38,0xb1,0x96,0xb4,0x82,0x82,0x3d,0xd2,0xd3,0xb1,0x51,0xa5,0xff .byte 0xd3,0xde,0x55,0x9d,0x6f,0xb7,0x6f,0xed,0xbb,0x7e,0xfc,0x5c,0xbb,0xa1,0x73,0x5f,0x96,0xf4,0x4c,0x4b,0x37,0x7b,0x77,0x2a,0x87,0x19,0x88,0xb0,0x82,0x53,0x77,0x2c,0xee,0x53,0x25,0x85,0x88,0x38,0x60,0x1e,0xa0,0xdd,0xd0,0x9b,0xb6,0xda,0x9b,0xf9,0xbe,0xea,0x4c,0x69,0x81,0x87,0x0e,0x27,0xbe,0xc9,0x0e,0xf8,0x1d,0x70,0xcb,0x62 .byte 0x5b,0xfe,0x04,0x21,0x5e,0xc5,0x29,0xe2,0x2b,0x3e,0x26,0x9b,0x2a,0xf3,0x85,0x2b,0x67,0x8f,0x63,0xde,0x5e,0x83,0x3f,0xe5,0x8d,0x27,0x88,0xed,0x81,0x2e,0xba,0xf2,0xf5,0x0d,0x88,0xc6,0x42,0xdd,0x36,0xf5,0x73,0x2d,0x49,0x37,0xdf,0x7b,0x53,0xe5,0xcd,0xfc,0xee,0xa8,0x1d,0x33,0x19,0xcd,0x87,0xea,0x3d,0x0f,0x36,0x8e,0xb9,0xac .byte 0xa3,0x36,0x68,0x30,0x02,0xbd,0xa3,0x80,0x18,0x6c,0x85,0x11,0xc3,0xe8,0x02,0x62,0x4c,0x86,0xe3,0x07,0xb6,0xcc,0xc0,0xbb,0x34,0xdb,0x3b,0xcc,0x2e,0xc4,0xe4,0x3b,0x01,0xc8,0x2f,0x29,0x71,0x44,0xc8,0x25,0x17,0x1d,0x3e,0x1d,0x55,0x9a,0x9d,0xc2,0xb3,0x71,0x8f,0xaf,0xcb,0x17,0x9b,0xaf,0xd6,0x61,0xcf,0xdf,0x7b,0xa7,0xd8,0xb9 .byte 0x57,0xfd,0x2e,0x67,0x60,0xb3,0x5a,0x62,0x7b,0xc3,0x52,0xbb,0xec,0xd8,0x16,0x7e,0xf1,0x47,0x1d,0x65,0xd3,0x69,0x19,0x68,0x71,0x46,0x7b,0xa0,0xd5,0x34,0xed,0x0d,0x60,0x11,0x1f,0x37,0x67,0x8f,0xb2,0x6d,0x7d,0x87,0x35,0xd9,0x81,0x4a,0xea,0x59,0x8c,0xeb,0x8a,0x27,0xe4,0xce,0xc5,0xcf,0xa1,0xed,0x40,0x43,0x82,0xbd,0xc6,0xb6 .byte 0x33,0xca,0xcd,0xdb,0x25,0xec,0xf9,0x5f,0x4f,0xe3,0x6f,0xef,0x97,0x72,0x13,0x46,0xba,0xda,0xad,0xfa,0x10,0xc2,0xa6,0x71,0x43,0xb9,0xf9,0x78,0x53,0xa8,0x5d,0xb5,0x8b,0xcb,0xaf,0xc5,0xae,0xdf,0xbb,0x09,0x4b,0xec,0xe2,0x7d,0xff,0x84,0x0c,0xb2,0xf8,0x9a,0x04,0x4f,0x5e,0x1d,0x90,0x31,0xff,0x20,0x82,0xe6,0x63,0x3d,0xfb,0xf2 .byte 0x0c,0x9a,0x35,0xcb,0x36,0xae,0x01,0x83,0xd9,0x9e,0x74,0xc7,0x11,0x40,0x63,0xdc,0xd3,0x53,0xd9,0x9d,0x97,0x8e,0x13,0xf2,0xf8,0xd0,0xa9,0x22,0x4b,0x07,0x36,0xb2,0x1d,0xea,0x4b,0x27,0x88,0x1f,0x0b,0x34,0xf1,0x6c,0xb7,0x0b,0x39,0x8e,0xdb,0x50,0xbf,0x40,0xf8,0xc1,0x1b,0xe8,0x29,0xd9,0xd5,0xea,0x9f,0xd0,0x5b,0x73,0x50,0x7e .byte 0xa4,0x14,0x0c,0x6f,0xc8,0xe5,0xa3,0x0d,0x00,0xf7,0x9f,0xc5,0xdd,0xed,0xa9,0xa9,0x42,0xe1,0xca,0x73,0x57,0x89,0x8f,0x89,0xd2,0x43,0x5e,0x90,0xe9,0x96,0x86,0x26,0x80,0x32,0xed,0x71,0x23,0xd2,0x18,0x91,0x61,0x8b,0xe0,0x81,0xab,0xfc,0x98,0xab,0x0b,0x23,0x80,0xc0,0x15,0xf0,0x80,0x40,0x72,0x6c,0xa5,0x41,0xf5,0x0a,0x15,0xb5 .byte 0xcd,0xe6,0xeb,0x8c,0x70,0xf0,0xc3,0x8e,0xf5,0x36,0x26,0xdb,0x88,0x07,0x69,0x25,0x09,0x68,0x20,0x02,0xe3,0x11,0xa2,0x9d,0xc8,0x2d,0xd0,0x96,0xe9,0xed,0x07,0x14,0x95,0x59,0x53,0x76,0xe7,0xe7,0x8e,0xa5,0xdd,0xe7,0x2e,0xc5,0x04,0xfd,0x9b,0xc6,0x64,0xec,0x4c,0x01,0xa9,0x20,0xac,0xa7,0x64,0xb2,0x3a,0x96,0xaf,0x14,0x5a,0x9d .byte 0xa2,0x24,0xd7,0x1e,0x13,0x7f,0xce,0xc9,0x80,0xff,0x2c,0xf6,0xae,0xfa,0x4a,0xf4,0xd5,0x20,0xe4,0x3e,0x44,0xe3,0x6e,0x1d,0x29,0x8d,0xc6,0xc9,0x91,0x92,0xdb,0x29,0x5b,0x43,0xb1,0x22,0xa1,0x17,0x81,0xff,0xdf,0xa2,0xb4,0x63,0x96,0xf7,0x85,0x99,0xdd,0xc4,0x6d,0x3a,0x28,0x37,0x8e,0x97,0xdd,0xa6,0x54,0x8a,0x6e,0x49,0xf3,0xad .byte 0x7a,0x68,0xf9,0xb8,0x75,0x88,0x53,0x1c,0x0e,0xcd,0xd6,0x19,0x31,0xd6,0x91,0x4f,0x0d,0xc3,0x00,0xcc,0x30,0x3a,0xc5,0xbf,0x74,0x75,0x85,0xfb,0x03,0x86,0x5d,0xb7,0x79,0xff,0x21,0xef,0x37,0x50,0x24,0x8f,0xc0,0x9b,0xef,0xca,0xe2,0x13,0x49,0x3f,0xe4,0x55,0xe8,0xe9,0xd6,0x26,0xc6,0xf5,0x0e,0x6c,0xe5,0x18,0x20,0xb8,0x90,0xb3 .byte 0x3b,0x52,0x65,0x16,0xd7,0x31,0x14,0x47,0xbe,0xb5,0x50,0xc8,0x7f,0x7f,0xae,0x70,0x03,0x79,0xfc,0xd8,0xf0,0x82,0xa4,0xb3,0x11,0x62,0xbc,0x32,0xd3,0xb3,0x55,0xba,0xe4,0x9d,0x74,0x8e,0xb4,0xad,0xe5,0xcb,0xb3,0x7f,0x5c,0x27,0xd2,0x9e,0xcf,0x9a,0xaf,0x82,0x24,0x34,0x41,0x9c,0x45,0xe0,0x6c,0xb4,0x05,0xba,0xed,0x8d,0x3e,0xa4 .byte 0xa8,0x68,0xfe,0xc1,0xd6,0x33,0x60,0xc3,0x52,0x98,0x3a,0x1b,0x7f,0xd4,0x24,0x7e,0x84,0x6d,0x23,0x15,0x98,0x27,0x21,0x0a,0x17,0xcd,0xae,0x59,0xdd,0x00,0x63,0x6c,0x7c,0xc2,0x3f,0x4c,0x61,0x5c,0x6d,0x48,0x97,0x0b,0x1d,0xe8,0x88,0x3a,0x34,0x4f,0x99,0xd7,0xc9,0xa3,0xac,0x94,0x61,0x0a,0x0b,0x38,0x4d,0x77,0x23,0x38,0x42,0xbb .byte 0xf3,0x20,0xca,0x09,0x67,0xca,0xc0,0x54,0x87,0x81,0xa6,0x0d,0x0d,0xb7,0xb5,0x29,0x39,0x61,0xf4,0xb5,0x8c,0x1a,0xd9,0xb6,0x57,0x9e,0x68,0x02,0xb6,0xd3,0x8c,0x85,0x8f,0xda,0xd6,0x2d,0x94,0x77,0xef,0xa6,0x84,0x1f,0x8c,0x51,0x33,0xef,0x5b,0x73,0xf3,0xba,0xc7,0x47,0xa1,0xe6,0x9a,0x9a,0x89,0xed,0x0d,0xee,0x53,0x7e,0x3d,0x49 .byte 0x27,0xfb,0xc8,0xd0,0x4b,0x1a,0x5f,0xcc,0x83,0xe4,0x52,0x7f,0x6c,0xee,0xa1,0xd4,0x26,0x14,0x2c,0x10,0xed,0xd7,0x6d,0x43,0xaf,0x10,0x3d,0x1d,0x84,0x1c,0x79,0x03,0x72,0x22,0xeb,0x0d,0x15,0x10,0xa6,0x00,0xf8,0x25,0xfc,0xd6,0x7c,0x34,0x0c,0xb8,0xd0,0x4f,0xe3,0x8b,0x7b,0xf6,0x81,0x06,0x89,0x51,0x8c,0x31,0x3e,0x03,0x7e,0x37 .byte 0x85,0xa0,0x3e,0xe5,0x89,0x31,0x45,0xeb,0xfb,0x28,0x21,0x5b,0xfe,0xb1,0xd7,0x72,0x63,0x2e,0xdd,0xb2,0x1c,0x20,0xb4,0x7a,0x72,0x9b,0xeb,0xda,0x09,0xec,0xbc,0x39,0xda,0x3c,0x23,0x04,0x8c,0xef,0x87,0x7f,0x48,0x5f,0x1c,0x4f,0x42,0x76,0xc6,0x85,0x45,0xec,0x60,0x08,0x9e,0xec,0x14,0x7c,0x63,0xb0,0xb4,0x02,0x90,0xf6,0x2c,0x17 .byte 0x30,0xdc,0xfb,0xe2,0x05,0xa1,0x8a,0x72,0x9b,0x22,0x86,0x90,0x3e,0xaf,0x00,0xbb,0xa6,0x35,0x96,0xcf,0x70,0x61,0x47,0x72,0x92,0x75,0x19,0x68,0x1a,0x14,0xd3,0xee,0x81,0x69,0x47,0x5a,0xae,0x1e,0x78,0x52,0x4f,0x2a,0x81,0x10,0x04,0xa1,0x3c,0xbc,0xed,0x76,0x1e,0x68,0x69,0xcb,0xa0,0x10,0x78,0x27,0xb4,0xd5,0x42,0xdb,0x96,0xa6 .byte 0xf8,0x25,0xce,0x7c,0xe8,0xf0,0x49,0xb5,0x9c,0xb8,0x45,0xe6,0xbb,0xbd,0xe3,0xf7,0x16,0xdf,0x30,0xd8,0x22,0xe9,0xa6,0x0e,0x6d,0x51,0x39,0x0d,0x74,0xee,0x9c,0xf5,0xfb,0x08,0xf6,0x78,0x0a,0xd1,0xd5,0xb6,0x8c,0x3a,0xce,0x9c,0xb1,0x6c,0x40,0xa7,0x76,0x7b,0x6a,0x36,0x89,0x93,0xc4,0x59,0xd1,0x43,0x33,0xf6,0x1f,0x46,0xdd,0xd5 .byte 0xf6,0xda,0x00,0x1a,0x03,0x19,0x5f,0xdc,0x9e,0xc6,0x99,0x07,0xfd,0xed,0xd4,0x0c,0x47,0xcc,0xa0,0x28,0x64,0x55,0x2f,0x71,0x14,0x27,0x19,0xb8,0xb1,0x61,0xfc,0x04,0x41,0x44,0xb2,0xa1,0x57,0x58,0xe7,0x69,0x2a,0xce,0x08,0x50,0xa6,0x63,0xa4,0xa3,0x2f,0x8a,0x05,0xd9,0xfd,0xf5,0x2e,0xeb,0x3e,0xea,0xdd,0xbc,0xc2,0x59,0xc0,0x46 .byte 0x4e,0xa9,0x9e,0xe3,0x98,0xff,0x37,0x37,0x88,0x67,0x55,0x4b,0x1a,0xf9,0xaf,0xc1,0x9c,0x64,0x80,0xdd,0xbe,0xa3,0x33,0xef,0x67,0x5a,0x9d,0xd2,0x48,0x92,0x0e,0xae,0x2a,0x9d,0x47,0x80,0x89,0x97,0x51,0xdc,0xc0,0x34,0xeb,0xf6,0x4b,0x82,0x56,0xd5,0x30,0x61,0xde,0x38,0x9c,0xaf,0x62,0xf3,0x1a,0xbc,0xfb,0xaa,0xd2,0xb0,0x95,0x2c .byte 0xe7,0x44,0xce,0xdd,0xb6,0x49,0x12,0x99,0x24,0xf9,0x9c,0x38,0x0d,0x9f,0xff,0x24,0x83,0xd6,0x6d,0x66,0xeb,0xf9,0x24,0x51,0x58,0x48,0x8a,0xfb,0x7b,0xf7,0x20,0x26,0xed,0xb9,0x3e,0x9f,0x47,0xa5,0xcc,0xac,0xee,0x84,0x84,0x75,0x08,0x8f,0x3c,0x13,0xe1,0xed,0x89,0x74,0x8f,0xfe,0x6d,0xb3,0x6e,0xdc,0xbb,0xa3,0x70,0x32,0xa1,0x1f .byte 0x8a,0x45,0xa3,0xff,0x08,0x5d,0x99,0x96,0x6e,0xf4,0x04,0x75,0xb2,0x2b,0xc2,0xe9,0xb7,0x87,0xd2,0x60,0x64,0xb4,0xa5,0x5c,0xd1,0xc8,0xb8,0x32,0xab,0xa6,0xc3,0xfd,0x20,0xbd,0x38,0x3a,0x3d,0xc3,0x21,0x87,0xc2,0x4a,0x48,0x5d,0x19,0x76,0x58,0xcc,0x5f,0x59,0xc8,0x62,0x3a,0x56,0x78,0xdb,0xa2,0x62,0xd5,0x8a,0x23,0x4b,0x3d,0x31 .byte 0xb5,0x2a,0xbd,0xa3,0x26,0xbe,0xeb,0x0e,0x8e,0xaf,0x60,0x48,0x15,0x6f,0xeb,0x4b,0xe4,0xb1,0xee,0x1b,0xc3,0x8f,0x76,0xe4,0x18,0x75,0xc3,0x0c,0x80,0x16,0xa6,0x87,0x4a,0x37,0xa2,0xd2,0x1f,0xdf,0xe4,0x4e,0xf7,0x22,0xe0,0x5c,0x1e,0xb3,0x5e,0xf8,0x3c,0xb3,0x28,0xff,0x8f,0x5c,0x7a,0x0a,0xad,0x86,0x45,0x4e,0x94,0xee,0x7c,0xad .byte 0x6b,0x06,0xa4,0xba,0x01,0x6f,0x87,0xcb,0x6a,0x7e,0x9e,0x86,0x39,0x8a,0xa5,0x31,0xc0,0x59,0xd2,0xbd,0x1c,0xcf,0x5d,0x21,0xb7,0x7a,0xe3,0xc1,0x7f,0xed,0xfd,0xba,0xe6,0x0f,0x9a,0x59,0xda,0x10,0xe6,0xb4,0x21,0x6f,0x0e,0x08,0xef,0x1c,0xb7,0x59,0x3d,0x60,0x40,0x65,0xe7,0x84,0x8d,0xb8,0xaa,0xaa,0x8e,0x0f,0xa1,0xd1,0x8b,0x6d .byte 0xad,0x0b,0xf7,0xd3,0x83,0x64,0xba,0xc9,0xca,0xdb,0x7c,0xcd,0x40,0xfe,0x46,0x21,0x6d,0x0b,0x09,0xfe,0xd6,0x75,0xdc,0x42,0x9b,0x17,0x0e,0xa6,0x31,0x49,0x5e,0xe4,0x01,0xc2,0xd1,0x03,0x71,0xff,0x7b,0xcc,0xe6,0xc4,0xf4,0xc3,0x47,0xe6,0x85,0x76,0xfb,0x4a,0xa0,0x59,0x8b,0x8c,0x3a,0x8e,0x3c,0x2a,0xd2,0x11,0x85,0x68,0x5d,0x3b .byte 0x6d,0xd6,0x9c,0x14,0x26,0xc8,0x91,0x30,0xca,0x7a,0x2f,0xa8,0x58,0x60,0xfa,0x89,0xde,0xc9,0xdb,0x9e,0x33,0x98,0x5b,0x9b,0x76,0xe4,0x8b,0x41,0xd3,0x86,0xe3,0xbe,0xec,0x99,0x46,0x65,0x98,0xec,0xa8,0x85,0x56,0xf5,0x19,0x2d,0xcd,0x09,0x81,0x21,0x64,0x6f,0x14,0x2a,0x74,0xe5,0xac,0xaa,0x48,0x5d,0x7f,0x49,0xd9,0xe3,0xfd,0xff .byte 0x2e,0x91,0x2c,0xa9,0x05,0xe5,0x5d,0x8f,0x16,0xc4,0x3c,0x3b,0x70,0x37,0x7c,0xa1,0xe7,0x1d,0xa4,0x9c,0x77,0xff,0xac,0x09,0x69,0x9c,0xc4,0xf3,0x27,0x6a,0xe5,0x02,0x4f,0x28,0x26,0x52,0x7f,0xb1,0xbe,0xe2,0x37,0x25,0x74,0x1f,0xec,0x4e,0xd4,0xc5,0x37,0xed,0xb2,0xca,0xa0,0xfd,0x20,0x5e,0x63,0x72,0x13,0x9a,0xe0,0xca,0x3c,0xc2 .byte 0x81,0x62,0x60,0xaa,0xfc,0xaa,0x5e,0xe8,0x97,0xd0,0x82,0xaa,0x26,0x15,0xb7,0xae,0x94,0x50,0xe7,0x91,0x51,0x23,0x91,0x76,0xcf,0x49,0x48,0xda,0xd4,0xc6,0x2c,0xcc,0xd4,0xb6,0x0a,0x28,0xc0,0xa0,0x08,0x37,0xf4,0x61,0x81,0x38,0xc0,0xe0,0x2d,0x05,0xf4,0x26,0x2e,0xd8,0xc9,0x01,0xbe,0x1e,0x15,0x5c,0x73,0x32,0x2e,0xa9,0xb0,0x87 .byte 0x1a,0x52,0x7a,0xba,0xd2,0x13,0x93,0xc8,0x16,0x9d,0x8f,0x0b,0xaa,0x16,0x3d,0xc5,0xf7,0xb6,0x0b,0x45,0x5d,0xf8,0x18,0x52,0x3e,0x5f,0x07,0x46,0x15,0x63,0xfb,0x96,0x5c,0x2f,0x62,0x95,0x18,0xc8,0xd2,0xe0,0x73,0x7f,0x5d,0xc7,0x54,0xf4,0x1a,0xb3,0x62,0x49,0x66,0x85,0xb9,0x56,0xad,0x95,0x27,0x29,0xcc,0x65,0xaf,0xfd,0xfd,0x80 .byte 0x91,0x98,0xc1,0x3f,0xc0,0x2c,0x9a,0x16,0x75,0xe1,0xf4,0xc5,0x06,0xc5,0xc9,0x5d,0xf1,0xaf,0xf6,0xb0,0x7f,0x4a,0x59,0xca,0x05,0xb7,0x30,0x91,0x0e,0x10,0x0f,0xb6,0x68,0xe6,0xbf,0xc5,0x91,0xc9,0x27,0x75,0x55,0x82,0xf7,0x5f,0xcf,0x21,0xfc,0xc1,0x35,0x74,0xe2,0x09,0x29,0xff,0xfa,0x3e,0x6f,0xaf,0x04,0xfb,0xca,0xc4,0x73,0x7a .byte 0x2a,0x25,0xdd,0xc5,0xcf,0x58,0xae,0x1b,0xc9,0x15,0xe7,0xc7,0xcd,0x18,0x52,0x0d,0xd5,0xf7,0xd7,0xd3,0x34,0x80,0x23,0xdf,0x83,0xb0,0x2d,0xd7,0xec,0x8f,0x06,0x9c,0x9f,0xf6,0xe7,0x98,0x86,0x6e,0xf1,0x05,0xaa,0x26,0xf1,0x7d,0x17,0x28,0x11,0x80,0x6f,0x12,0x57,0x7a,0x73,0x8b,0x33,0x98,0x27,0x6d,0xfa,0xf9,0xf2,0xb1,0xe6,0xb7 .byte 0x5b,0x45,0x73,0xee,0x12,0x80,0x19,0x61,0xd9,0xfa,0xf3,0xe0,0x47,0x13,0x50,0x92,0xce,0x26,0xf7,0xf4,0xc3,0x9b,0x01,0x59,0x82,0x3d,0xc1,0xa0,0x1e,0x14,0xc1,0xd6,0xad,0x24,0xfd,0xad,0x78,0x49,0x82,0x52,0x48,0xc0,0x41,0xbe,0x30,0xdc,0x87,0x54,0x2d,0xe3,0x47,0xb3,0x1f,0x14,0x30,0x78,0xfd,0xda,0xfd,0x20,0x6d,0xf3,0xa5,0xff .byte 0x6c,0x35,0x87,0x85,0x92,0x99,0x4a,0x46,0x1a,0x7d,0x5c,0x5d,0x97,0x6c,0x3b,0xc9,0xa7,0x1b,0x22,0x1f,0x26,0x2a,0xdc,0xa1,0xab,0x0c,0x46,0x68,0x67,0x3e,0xa1,0x0f,0x50,0xce,0x3f,0xac,0xe2,0x05,0xd6,0xcf,0xb9,0x5e,0xc2,0x54,0xfb,0xcd,0x17,0x2a,0xb6,0x2d,0x03,0xb9,0x62,0xb3,0x2d,0x8e,0x77,0xdc,0x3f,0xb2,0x84,0xb2,0xfc,0x34 .byte 0x3d,0x75,0xcb,0xdf,0x30,0xe1,0x56,0x3c,0x53,0x2e,0x7d,0x90,0xdc,0x6c,0x65,0x05,0x2a,0xaa,0x06,0x1c,0xa8,0x44,0xc7,0x57,0x79,0xc1,0xa7,0xef,0x64,0x9f,0x55,0x82,0xff,0x7e,0xc8,0xa1,0x35,0x40,0xcd,0xdd,0x25,0x54,0x95,0x84,0x5d,0xc7,0x52,0xc1,0x51,0x91,0xe1,0xe9,0x2e,0xcc,0xba,0xb4,0x60,0x52,0x3b,0xd6,0x39,0xb0,0x9d,0x78 .byte 0xf4,0x28,0x7b,0x88,0x40,0x20,0x0b,0x37,0x38,0x03,0x91,0xc2,0xa7,0xf0,0x21,0xa7,0x62,0x7d,0x96,0xa2,0xce,0x5d,0xba,0x25,0xc4,0x79,0x07,0x1b,0x1a,0x86,0x55,0x06,0xa7,0x44,0x03,0x74,0xf6,0x28,0xb1,0x50,0x18,0x48,0xa9,0xd9,0x4a,0xa0,0x6e,0x4e,0x31,0x4b,0x37,0xd6,0xa9,0x2e,0x5a,0x11,0x2f,0x8e,0xc7,0x2d,0x72,0xfd,0x88,0x36 .byte 0x51,0xe9,0xe4,0x0f,0x39,0xe8,0x81,0x75,0xd8,0x23,0x43,0xfb,0x69,0xbf,0x1f,0xe3,0xd4,0x43,0x9d,0xdf,0xb9,0x57,0x72,0x7c,0x56,0x1e,0x7c,0x39,0xdb,0xfe,0x5b,0x04,0xcc,0x12,0xec,0x01,0x78,0xcc,0xd3,0xe4,0x40,0xdc,0x62,0xbf,0x85,0xa1,0x7e,0xd4,0x18,0x7f,0x98,0x42,0x95,0x17,0x81,0xb5,0xd9,0x2f,0xef,0xf6,0x4b,0xb0,0xc2,0xf3 .byte 0x60,0x7b,0x2e,0x50,0x3d,0x12,0x62,0xae,0x49,0x9b,0x90,0x40,0xc9,0xe6,0x16,0xa8,0xf4,0xe9,0x56,0x4b,0x44,0x4f,0x1a,0x40,0xb8,0x1a,0xbc,0xa1,0x1d,0xfc,0xe2,0x18,0xdd,0xd5,0x44,0xad,0xda,0xd6,0x75,0x89,0xa2,0xbe,0xc1,0xa7,0x33,0xc3,0xbc,0x64,0xf3,0x8d,0x8e,0x55,0x1c,0x41,0x17,0xa8,0x4c,0x75,0xc6,0x17,0xc6,0xa7,0xb7,0xea .byte 0x28,0x1b,0x57,0x6d,0x94,0xaa,0xac,0x06,0x6c,0x69,0xd9,0xce,0x77,0x96,0xe6,0xf8,0xd0,0x70,0x7f,0x5d,0x56,0x22,0x4a,0xc6,0x5e,0xa6,0x06,0x0b,0xfc,0xcd,0xa4,0x12,0xd7,0x35,0xcb,0x09,0xfb,0x6e,0xa4,0x80,0x13,0x22,0x0a,0xfa,0x69,0x4d,0x3f,0x53,0x5a,0x1e,0xc4,0x9a,0x39,0xe2,0xa2,0x63,0x92,0xd2,0x2a,0x83,0x2c,0x01,0x04,0x6f .byte 0xde,0x28,0x01,0x83,0xa6,0xdb,0xc6,0xa6,0x86,0x45,0x6b,0xb0,0x22,0x7a,0x71,0x8b,0x5c,0x81,0xf4,0x42,0xd5,0x23,0xff,0x8d,0xc5,0x4f,0x75,0xae,0x8d,0xfb,0x99,0x53,0x3e,0x35,0x56,0xfa,0x35,0xee,0x16,0x18,0xc0,0x6a,0x5b,0x20,0x89,0x41,0xc9,0xfe,0x7b,0xe2,0xe8,0x3d,0x1d,0x74,0x31,0xe6,0xe6,0xba,0x86,0xd1,0x19,0x50,0x07,0xb4 .byte 0xd8,0x27,0xdf,0x51,0xc2,0x94,0x69,0xab,0xe1,0x6a,0x69,0x52,0x15,0x71,0x0a,0xc5,0xec,0x84,0x29,0xd3,0x48,0x79,0x53,0x95,0xb2,0xd7,0xf3,0x3a,0x92,0xec,0x51,0x85,0xfd,0xe3,0xf1,0x5c,0xac,0x73,0xf7,0x19,0x72,0xdc,0x46,0x31,0xf6,0xcd,0x8b,0xfe,0xf3,0x59,0x8a,0xe8,0x37,0x78,0x65,0xc5,0x3c,0xcc,0xf2,0x5a,0xf8,0x6e,0xaa,0x38 .byte 0xc4,0x3b,0x48,0x07,0xe1,0xbd,0x4e,0x2c,0xad,0x02,0xf4,0x19,0xd8,0xd0,0x58,0x5a,0xfe,0x0a,0xc7,0x07,0x55,0x26,0x84,0x58,0xf4,0xfc,0x57,0x4b,0x5b,0xb3,0x37,0xe9,0x97,0x7c,0xe9,0xbf,0x1d,0x8d,0x63,0xf7,0x85,0x5c,0x56,0xb0,0xf9,0x5f,0x5b,0x45,0xe5,0x5a,0x74,0x72,0xa8,0x8a,0xf5,0xf2,0x6e,0xda,0x1e,0xea,0x12,0xc4,0x05,0xb1 .byte 0x96,0xf1,0x75,0xee,0xd0,0xab,0xd4,0x50,0x51,0xae,0x01,0x23,0x55,0xa2,0xbc,0x30,0xac,0x0c,0x96,0x76,0xa2,0xc6,0xdf,0x03,0xb0,0x67,0x6d,0x77,0x9c,0xa7,0x0b,0x12,0x2d,0x57,0x6b,0x55,0x54,0x4f,0x9b,0x0f,0x87,0xbb,0xc5,0x17,0xda,0x94,0x10,0x13,0x9c,0x70,0xac,0xf9,0x10,0x9a,0xa4,0x03,0x46,0x17,0xf5,0xc3,0x63,0x3a,0x23,0xd6 .byte 0xf9,0x90,0x8c,0x66,0x1f,0xf7,0x3b,0x35,0x71,0x1f,0x87,0x7a,0x78,0x0e,0xa4,0x7a,0x59,0x70,0x72,0xd5,0x55,0xec,0x62,0x91,0x21,0xa1,0x6e,0x8d,0xd4,0x00,0xf7,0x02,0x0c,0xff,0x4f,0x0b,0xe1,0x1b,0x43,0x87,0x63,0xb1,0xc4,0xa5,0x47,0x54,0x05,0x68,0xd7,0xfc,0x80,0x4c,0x4d,0x4c,0xdb,0x8a,0x0a,0x0b,0x31,0x52,0xae,0x2e,0xf5,0x75 .byte 0x41,0x1a,0x01,0x1b,0xc2,0x1a,0x1c,0x9b,0x39,0x8b,0xa8,0x73,0x87,0x10,0x57,0x64,0xf1,0xd8,0xd7,0x19,0xad,0x9e,0x61,0x35,0x1c,0x00,0x7c,0x63,0x5f,0xc1,0x75,0x69,0x64,0x88,0xc9,0x29,0x41,0xae,0x84,0xa8,0x45,0xa0,0xbb,0xee,0xfb,0x37,0x58,0x5e,0xc7,0x59,0x62,0x0b,0x21,0x61,0x42,0x0d,0x98,0x21,0xf5,0x41,0x47,0x74,0x1f,0x6d .byte 0xcc,0x7b,0x2b,0xc7,0x90,0xf3,0xe8,0x68,0xe2,0x0c,0x17,0x06,0x95,0x04,0xfc,0xb0,0xf3,0xbd,0x5f,0xaf,0xe0,0x3b,0xe2,0x83,0x79,0xd3,0x43,0xa5,0x5d,0x97,0x53,0xc2,0xd2,0x6b,0x67,0x5a,0x36,0x7b,0xb6,0xc9,0xb3,0x5f,0x21,0x4b,0x23,0x94,0xa0,0x04,0x0b,0x5a,0x28,0xb8,0x6b,0x1b,0x27,0xcc,0xfe,0xe7,0xf9,0xed,0x8f,0x93,0x58,0x26 .byte 0xdc,0x66,0x2b,0x8d,0x2a,0x40,0x8f,0xaa,0x17,0x68,0x13,0x84,0xa6,0x7a,0x74,0xa0,0x95,0xe3,0x92,0xe5,0xc6,0x4d,0x05,0xad,0xf7,0x62,0x48,0xb8,0xcc,0xfb,0xd9,0xdf,0x0f,0xdc,0x72,0x2d,0x8f,0xad,0xb1,0x96,0x03,0xae,0x09,0x37,0xd0,0x37,0xe7,0x87,0xbd,0x57,0x74,0x3e,0x1e,0xf0,0x9d,0x31,0xa7,0x10,0x3f,0x3c,0x0b,0xf5,0xce,0xaa .byte 0x4b,0xec,0xa9,0xd9,0x19,0x8f,0x8a,0x47,0xc9,0x40,0xeb,0x70,0xbc,0x4d,0x35,0x73,0x52,0xc8,0xe5,0x5f,0x80,0x1c,0x99,0x0e,0x5e,0xc0,0xfc,0xc6,0x93,0x2c,0x11,0xa5,0x46,0xfb,0xaf,0x08,0x73,0xb5,0x9d,0xaa,0x1c,0x25,0x12,0x95,0x69,0xd5,0x47,0xbd,0xd5,0xe2,0x87,0xc2,0xe5,0xbc,0x20,0x16,0x05,0x22,0x40,0x7e,0x7c,0x6d,0xf6,0xf8 .byte 0x4e,0xb4,0xe3,0xfd,0x76,0x63,0x45,0x4f,0x07,0x4d,0xe0,0x26,0x2a,0xce,0x53,0xa8,0x07,0xfa,0x15,0x84,0xa7,0xb1,0x5f,0x32,0x25,0xa8,0x1a,0xd7,0x31,0xf1,0xf6,0x09,0xf9,0xf2,0xe9,0x84,0x5f,0xb9,0xb6,0x69,0x84,0x8f,0x97,0xac,0x59,0xf1,0xc8,0x7f,0x0f,0x0e,0xf2,0xfd,0x35,0x68,0xbb,0xe2,0x1f,0x32,0xa2,0x4a,0x08,0x56,0x53,0x88 .byte 0xe2,0x2e,0x00,0x16,0xdc,0x76,0x1d,0xb6,0xc4,0xbf,0x9f,0xde,0xb3,0xa5,0x12,0x77,0x06,0xbd,0x27,0x10,0x20,0xdd,0x26,0xdc,0x15,0x0f,0xa9,0xa4,0xa3,0xc2,0x1b,0x9a,0xf4,0x75,0xb5,0x80,0xe4,0xaa,0x13,0xe3,0x41,0xb9,0xcf,0x92,0xd9,0x5f,0x60,0x89,0x89,0xbc,0x06,0x72,0xb4,0x98,0x0f,0x71,0x2d,0x82,0xf5,0x9c,0x01,0xe6,0x5e,0x81 .byte 0xe1,0x0e,0x46,0x45,0xf1,0xfc,0xd1,0x9b,0x37,0x0d,0x44,0x43,0x88,0xe2,0xbc,0x8c,0x3e,0x82,0xca,0x48,0x42,0xe7,0x3b,0x55,0x49,0x0f,0xea,0x0b,0x74,0x30,0x0e,0x0f,0x82,0x05,0x6b,0x9b,0xda,0x0a,0xf1,0xc7,0x3a,0xb9,0x33,0x26,0x91,0x55,0x82,0x2f,0x66,0x2d,0x6b,0xdf,0x47,0x4c,0xaa,0xe2,0x90,0x1e,0x73,0x57,0x62,0xb3,0x4d,0x00 .byte 0x0a,0x94,0xa8,0x71,0x37,0x1d,0x9d,0x4d,0x60,0x55,0x9a,0xcf,0x51,0x0b,0xe1,0x9a,0x95,0x64,0x26,0x54,0x84,0xa0,0xe6,0x9c,0x3d,0x75,0xcf,0x88,0x36,0x71,0x16,0x16,0xeb,0x19,0xc0,0x41,0xc0,0xe0,0xf0,0x1f,0x65,0xfc,0x8d,0x64,0x7d,0xb3,0xdb,0x58,0xec,0xed,0x18,0x4f,0x49,0x54,0x55,0x11,0xb1,0xd5,0xbc,0x7d,0x96,0x39,0x91,0xec .byte 0xc0,0xff,0x09,0x05,0x13,0xa8,0x7f,0xae,0xc1,0x48,0xed,0x62,0x38,0x9b,0xdd,0x4e,0x52,0x5f,0x26,0xf7,0x1d,0xfb,0xdf,0x57,0xba,0x4c,0x87,0xbd,0x3d,0x3c,0x4a,0xfa,0x26,0xbd,0x7b,0x67,0x3a,0x1d,0xdb,0xd8,0xea,0x2f,0xc2,0xb1,0x0b,0xef,0x58,0xb1,0x20,0xde,0x22,0xbb,0x3a,0x5e,0xe3,0x1e,0xb0,0x12,0xfc,0x14,0x91,0xf2,0xeb,0x20 .byte 0x2e,0x3a,0xd3,0x70,0xf1,0xf5,0x46,0x14,0x6e,0x7a,0xe2,0xa2,0xa2,0x4e,0x15,0xca,0x35,0x34,0xdb,0x73,0x64,0x22,0x45,0xb9,0x56,0x87,0x15,0x07,0xd5,0x9b,0x35,0x7f,0x14,0x93,0xfd,0x1c,0xb1,0xf1,0xb3,0x6c,0x2b,0x68,0x20,0xb9,0x84,0x6e,0x4d,0xfe,0x6b,0xd4,0x40,0x33,0xf5,0xe3,0xe9,0xc1,0x94,0x79,0xe0,0x6a,0x1f,0x75,0x49,0xd3 .byte 0x31,0xa8,0x2f,0x3d,0x09,0x13,0x8b,0x90,0x01,0x34,0x3f,0x12,0x9e,0x91,0x90,0xc9,0x93,0x8d,0xf2,0xf7,0xa7,0xda,0xc0,0x9d,0x59,0xf3,0xd7,0xf3,0x95,0xa4,0x57,0x6f,0x24,0x66,0x2d,0x0f,0x94,0xb4,0x59,0xa5,0x47,0x93,0x35,0x36,0x22,0x1b,0x4d,0x8e,0xaf,0xf1,0xc2,0x1c,0x55,0x33,0x2c,0x77,0xc7,0x7f,0xd5,0x29,0xc6,0xf6,0x9d,0x38 .byte 0xe7,0x33,0x73,0x5a,0xb2,0x1f,0x7c,0xf8,0x2d,0x5a,0xbd,0xa9,0x89,0xa1,0xc0,0x00,0x8d,0x6e,0xef,0xbb,0x0a,0x91,0x3a,0x0a,0xaa,0x4d,0x5b,0x1c,0xc9,0xce,0x0a,0x66,0x3a,0x72,0x8b,0xa4,0x67,0x61,0x53,0x74,0xa0,0xd6,0x71,0xf0,0x92,0x15,0x7b,0x7f,0xfd,0x72,0xf1,0x5c,0xd2,0xa2,0xdb,0x75,0xf1,0xa3,0x34,0x0d,0x7d,0x4a,0x39,0xfa .byte 0x20,0x0d,0xdd,0xb6,0x6e,0x78,0xe0,0x57,0xdd,0xf2,0xd7,0xe1,0xba,0x49,0x92,0x71,0x5b,0x76,0xc2,0x26,0x79,0xef,0x52,0x54,0x18,0x66,0x44,0xcf,0x40,0x28,0x50,0xc7,0x02,0x7a,0x76,0x8f,0x77,0xe6,0x26,0x2c,0x2e,0x68,0xf9,0x2d,0x65,0xb3,0x95,0x98,0x5a,0xd5,0xaa,0x63,0xf3,0x7b,0x97,0xf8,0xc1,0x30,0x69,0x81,0xe3,0xd4,0xfd,0xb3 .byte 0x5e,0x83,0x8b,0xe2,0xa4,0xac,0x15,0xa7,0xf1,0xc4,0x65,0x56,0x1c,0x31,0x7d,0xd6,0x6f,0xef,0x4d,0x2d,0xcd,0x61,0x4c,0x06,0x48,0x0e,0x64,0x9a,0xab,0x04,0x7c,0xf6,0x38,0x86,0x16,0xd9,0x3d,0x1f,0xe3,0x74,0xf8,0x46,0xd3,0x84,0x5a,0x56,0x73,0x81,0x19,0xd2,0x8b,0xef,0x2a,0xb1,0xe2,0x24,0x41,0x9f,0x6b,0x65,0x9e,0x34,0xf9,0x85 .byte 0x4c,0x38,0xe4,0x6d,0x63,0xcb,0x7c,0x13,0x88,0xb3,0x62,0xfd,0xa7,0x91,0x16,0x4f,0x77,0xcc,0xb5,0x68,0x58,0x1f,0xd6,0xfc,0x63,0x0f,0xa0,0x55,0x7e,0xfb,0x0f,0x84,0x76,0x24,0xa7,0xe0,0x53,0x4c,0x3a,0x36,0x0c,0x30,0x46,0x58,0x14,0x31,0x88,0x96,0xf7,0xaf,0x39,0x6d,0x7a,0x6e,0xcf,0x62,0xa3,0x2e,0x2e,0x94,0x77,0x2e,0x36,0x64 .byte 0x58,0x13,0x66,0x39,0x59,0x70,0x4c,0x81,0x4d,0x56,0x46,0x00,0x96,0x1b,0x60,0xfd,0xbf,0xfe,0x7f,0xe5,0x59,0xc1,0x09,0xd1,0x38,0x74,0xbe,0x98,0x97,0x61,0x6f,0xcf,0xbd,0x49,0x60,0x7e,0xe3,0x6c,0x65,0xbc,0x6b,0xa1,0x79,0x65,0x59,0xc3,0xa1,0xdd,0x77,0x3d,0x32,0xed,0xbe,0x51,0x12,0x19,0x61,0x84,0x52,0x8d,0xe3,0xf7,0x3b,0x6e .byte 0x6a,0x16,0x24,0x0f,0xc8,0xa7,0x17,0xb9,0xda,0xe9,0x81,0xa7,0x56,0x46,0xa9,0xd6,0x5a,0x82,0x73,0xfe,0xd3,0xd4,0x8b,0x1a,0x61,0x2f,0x63,0xb8,0x8d,0x47,0x8b,0x4e,0xa9,0xce,0x10,0x86,0x07,0xe0,0xad,0xe8,0xb3,0x39,0x27,0xbe,0x39,0xac,0xdd,0xa5,0x09,0x4a,0x22,0x56,0x1d,0xab,0x4b,0xd4,0x03,0xf9,0xe5,0x1b,0xfc,0x3a,0x62,0xe7 .byte 0x74,0x79,0x8c,0x37,0x48,0x35,0x54,0x5b,0x66,0xdb,0x0f,0x00,0x5b,0x6c,0x22,0xd6,0x3c,0xb6,0xdf,0xb7,0xcd,0x12,0xc0,0xf2,0x22,0x1f,0xa1,0x2f,0x08,0x56,0x8c,0xed,0x6a,0xe1,0x18,0xea,0x8c,0x47,0x39,0x53,0x90,0xdc,0x93,0x74,0x33,0x71,0xe1,0xaa,0x77,0xf4,0x07,0xfd,0x8b,0xa3,0x1b,0x44,0x89,0xab,0x77,0x85,0x65,0xc3,0xfe,0x12 .byte 0xa8,0xf5,0xff,0x09,0x9f,0xce,0x10,0xd0,0xd0,0xc8,0x27,0x4c,0x59,0x99,0xc2,0x87,0xe5,0x61,0xe1,0x68,0xd5,0x6e,0x53,0xc8,0xc5,0xc7,0x7a,0x49,0x64,0x19,0xa2,0x6c,0x40,0xdb,0xfc,0x5f,0xe0,0x4f,0x12,0x53,0x8e,0x65,0x28,0xb9,0x61,0x01,0xac,0xb4,0xbf,0xee,0x6e,0x13,0x9b,0x06,0x20,0x8c,0x17,0x7c,0x3a,0x22,0x01,0x15,0xb0,0xd1 .byte 0xa7,0xa5,0x00,0xa0,0xe8,0x1c,0xf0,0x82,0xaa,0x63,0x99,0x8d,0x10,0x7b,0x24,0xef,0x2c,0xb9,0x9a,0x1d,0xd5,0x14,0x59,0x2c,0x2c,0x70,0xb6,0x5d,0x91,0xfc,0xfb,0xd1,0xed,0xe4,0x61,0xfe,0x26,0xcf,0x87,0x27,0xe5,0xa3,0xfe,0x30,0x3d,0xa5,0xec,0x5c,0xfa,0x57,0x76,0x98,0xbd,0x7e,0x48,0x8e,0x36,0x8a,0xda,0x73,0x0f,0xf6,0x79,0xf8 .byte 0x35,0xca,0x8e,0xbd,0xc7,0x58,0x32,0xe4,0xea,0xcc,0xf0,0x18,0xb7,0xda,0x8c,0x0e,0x05,0x92,0x49,0x7c,0x14,0x9e,0x49,0x73,0x0b,0xcc,0xf2,0x50,0x90,0xd4,0x6d,0x43,0xa1,0x17,0xd1,0x64,0x99,0x79,0x43,0x90,0xe7,0x06,0x73,0xa6,0x37,0x2e,0xde,0x6c,0x8f,0xd8,0x31,0x6c,0x72,0x2b,0xe5,0x9d,0x42,0xaf,0x18,0x12,0x9e,0x35,0xc0,0xf8 .byte 0x70,0x3f,0xd7,0xc7,0x61,0x39,0x7c,0x85,0x5d,0x77,0xad,0x7c,0xde,0x02,0xf1,0xa1,0x7b,0x6d,0x36,0xf8,0x31,0xe7,0x97,0x9d,0x2e,0x23,0xb6,0x9b,0xb3,0x24,0xcc,0x0f,0x3d,0x49,0x8a,0x18,0x1c,0xbb,0xbb,0xed,0xb5,0x96,0x22,0xd0,0x63,0x17,0x65,0x3a,0x83,0x98,0xa0,0x10,0x4a,0x37,0x74,0x07,0x61,0x83,0x6c,0xa0,0x5d,0xec,0x9f,0x52 .byte 0xdc,0x12,0xcc,0xec,0x9e,0xb2,0x27,0x98,0xd3,0x41,0xf7,0x52,0xca,0x4e,0x29,0xda,0x35,0xba,0x96,0xc7,0x37,0x83,0xdf,0x26,0x4c,0x6b,0x24,0xb7,0x60,0xe6,0x4d,0x09,0x30,0xb8,0x6a,0xf6,0x34,0x8b,0x4c,0xa0,0x15,0xf8,0x47,0xf3,0x40,0x80,0x2a,0x41,0xeb,0xed,0xfc,0x53,0xb7,0xc7,0x2f,0x4d,0xfd,0xab,0xcd,0xf4,0x49,0x0e,0xe1,0x1c .byte 0xb9,0xd2,0x11,0xf0,0xa9,0xf6,0x3a,0x8a,0x7a,0x90,0x4d,0xf9,0xfd,0x3a,0x75,0xc2,0x60,0x8b,0x25,0xae,0x1d,0x3a,0xf5,0x81,0xb4,0x2b,0xf7,0x4d,0x27,0xbe,0x85,0x2d,0x65,0x60,0xf6,0xdb,0x2e,0x29,0xa7,0xee,0x26,0x07,0x07,0x17,0xfa,0x4a,0x93,0x72,0xad,0x97,0x5c,0x7d,0x4f,0xd2,0x29,0x37,0x0c,0x5e,0xbb,0xbd,0xbd,0x11,0xfd,0x77 .byte 0xa1,0x6b,0xf9,0x4b,0x75,0x9b,0x02,0xb4,0x65,0xcf,0xe2,0x92,0xb2,0xef,0xf8,0x7e,0x71,0xf5,0x1b,0x6f,0xb5,0x54,0x9f,0x63,0xf4,0x6b,0xb2,0x2e,0xb6,0x4a,0xb8,0x9c,0xa0,0xb0,0xa8,0x4b,0x6a,0x1a,0x2a,0x7e,0x46,0x85,0x24,0x64,0x68,0xea,0x36,0x52,0x67,0xe5,0x42,0x82,0xa9,0x6f,0x9c,0x95,0x60,0xbf,0xc3,0x33,0x9d,0x40,0x23,0xdb .byte 0x4e,0x8a,0xf2,0x3d,0xb8,0x8e,0xfb,0xd2,0xf1,0x99,0x6f,0x96,0x38,0xe2,0xd6,0x68,0x40,0x11,0x39,0xf7,0xa1,0x07,0xe4,0xc9,0x14,0x61,0x5b,0x8c,0xc5,0x95,0xa2,0xfb,0x86,0x51,0xd1,0xd3,0x2e,0x1f,0xf7,0x42,0xd2,0xc8,0xbd,0x8c,0xc3,0x24,0x0f,0x1c,0x61,0xfa,0xee,0x64,0xca,0xc0,0x12,0xab,0xdc,0xd4,0x08,0x31,0x7f,0xea,0x3b,0x24 .byte 0x7e,0x4b,0x14,0x58,0x8a,0x48,0x9b,0xf2,0x04,0x7a,0x5b,0xec,0x49,0xaa,0xf9,0x33,0x72,0x8e,0x3e,0x06,0x80,0xe1,0xb5,0x1c,0x18,0x5c,0xe9,0x01,0xf4,0x78,0xeb,0x61,0x14,0x5f,0x52,0x1a,0x22,0x7e,0xbc,0x8f,0x38,0xa9,0x32,0xdf,0x9b,0x9d,0x96,0x13,0xc8,0xd1,0x5f,0xcf,0x51,0xbe,0xee,0xa4,0x04,0x31,0xc9,0xd1,0x0e,0xd9,0x54,0x3e .byte 0x26,0x6d,0x25,0x98,0x65,0x83,0x53,0x4e,0xc6,0x01,0xb1,0x02,0x94,0x36,0x62,0xa2,0x6f,0x8b,0x1f,0x52,0x35,0x9c,0xa1,0xc7,0x50,0x54,0x27,0x96,0x51,0x4d,0xa8,0x85,0xc2,0xbd,0xe8,0x20,0xd7,0x55,0x14,0x89,0x64,0xe4,0xe1,0x70,0xcd,0xf0,0x40,0xfa,0x8e,0x35,0x20,0x53,0xec,0x73,0x3e,0x75,0x36,0xa3,0x69,0xf0,0xe0,0x0b,0x26,0x4d .byte 0x9b,0xf8,0x03,0x72,0xb4,0x11,0x5f,0x5f,0x67,0xc1,0x7f,0xe1,0x71,0x94,0x14,0x96,0x7a,0xc4,0x81,0xab,0x26,0x15,0x7d,0xf9,0xa3,0xd7,0xab,0xaa,0x53,0xfd,0x42,0xb4,0xc4,0x79,0x1e,0xd4,0xed,0x14,0x83,0x00,0x5a,0x8d,0x86,0x6d,0xa0,0xef,0x29,0x03,0x2d,0xb1,0xf2,0xc1,0x97,0xa6,0xe8,0x23,0x6c,0x6a,0x56,0xe0,0x7a,0x4e,0xef,0x6d .byte 0x8c,0x46,0x06,0x06,0x17,0xb0,0xcf,0x86,0xca,0x0f,0x8f,0x42,0x84,0xe5,0xb1,0xeb,0x3f,0x75,0x50,0x51,0x57,0xca,0x5f,0x49,0xdb,0x8b,0xc8,0x66,0xd5,0x86,0x86,0x9d,0x2e,0x9a,0x23,0x31,0xc4,0x5a,0xc0,0x7b,0x14,0x22,0xae,0xe4,0x52,0x8e,0x55,0xd9,0x01,0xf9,0x9c,0x7a,0x96,0x6d,0x74,0xf1,0x31,0x2a,0xfd,0xda,0x4e,0xa3,0x82,0x2f .byte 0x54,0xc5,0x25,0x1d,0x85,0x6c,0xdc,0xa7,0x78,0x01,0x73,0x3e,0xcd,0x2d,0x53,0xc0,0xbf,0x23,0x05,0x19,0x93,0xbf,0x73,0x7f,0xdf,0x0a,0x38,0x9f,0x0d,0xae,0xb7,0x23,0xe6,0xb0,0x17,0xc0,0x2d,0xd4,0xd4,0x47,0x9c,0xc7,0xb6,0x42,0x8a,0xdc,0xa9,0x36,0x4f,0x07,0x02,0x1f,0x87,0x89,0xe8,0x48,0x33,0x7f,0x24,0x84,0x28,0xde,0x84,0x4a .byte 0xb9,0xf9,0xe1,0xe5,0x4b,0xd7,0xf9,0x1a,0x44,0x4d,0xf9,0x4a,0xfc,0x97,0x03,0x03,0x71,0x2b,0xfe,0x04,0xfa,0x6c,0x52,0x07,0x54,0xb4,0xd2,0x60,0x34,0xb8,0x36,0x6f,0xc7,0x3c,0x64,0x37,0x8d,0x30,0x20,0x3e,0x66,0xac,0x1e,0x75,0x2d,0x76,0x3a,0x95,0xbb,0x23,0x7a,0x43,0x63,0xba,0xc9,0x7d,0x85,0x01,0xd9,0x65,0x20,0xc1,0x95,0x68 .byte 0xcf,0x8a,0x4f,0x57,0x87,0x70,0x8e,0xe5,0x20,0xdb,0xd3,0x37,0x4c,0x03,0xc0,0x44,0x17,0x4c,0x2a,0x30,0x91,0xd9,0xb8,0x04,0xaa,0xcb,0xe9,0x8f,0x8f,0xe0,0x9a,0x79,0x1e,0x40,0x65,0x47,0x3d,0x4f,0x0e,0x7e,0xfc,0x8f,0x0c,0x20,0xe3,0xc6,0x5c,0x90,0xa8,0x09,0x41,0xbd,0x4b,0x55,0x4e,0xcc,0xeb,0xba,0x48,0x69,0xa2,0x5b,0xa0,0x41 .byte 0x15,0xa6,0x1f,0x6b,0x6f,0xa0,0x26,0x2b,0x07,0xbd,0xb2,0x49,0xda,0xa0,0x97,0x22,0x37,0xcc,0xc3,0x05,0x4c,0x73,0x8f,0xb2,0x81,0xcf,0xe3,0xa4,0x23,0x96,0xe8,0x3d,0x29,0x00,0xbd,0xfe,0xec,0x97,0x65,0x94,0xf8,0x89,0x51,0x35,0x1b,0x72,0xff,0x6a,0x85,0x8c,0x53,0x35,0x7a,0x4f,0x11,0x5e,0x95,0xcf,0x9e,0x0f,0xef,0xbc,0x64,0xee .byte 0x3a,0x6e,0xa1,0x4f,0x29,0x41,0x99,0x33,0xdc,0x7b,0x33,0xc4,0x82,0x8a,0x23,0x62,0x59,0x2c,0x2e,0x11,0x6e,0xec,0x6a,0xfb,0xe1,0x28,0x20,0xf4,0x38,0x48,0xf8,0x69,0xae,0x53,0x2b,0xd8,0x60,0x3b,0x37,0xf4,0xb1,0xa4,0xeb,0x80,0xd1,0x1f,0x11,0xd4,0x12,0x62,0x9f,0x1a,0x93,0xf7,0xfe,0x08,0x22,0x72,0x1b,0x51,0xa4,0x12,0x6e,0xe3 .byte 0x59,0x23,0xeb,0xf4,0x6e,0x03,0xe6,0x1e,0x7e,0x94,0xfe,0x21,0xa2,0xb6,0x41,0x75,0xb2,0x8f,0x24,0x41,0xa3,0x08,0x33,0xec,0xf7,0x45,0x3c,0x55,0xd2,0xb9,0x5f,0x7e,0x61,0x37,0x17,0x45,0x9d,0xf9,0x87,0x26,0x07,0x65,0xee,0x7c,0x82,0x4e,0x96,0x53,0xea,0x50,0xa4,0x99,0xb9,0xe4,0xe1,0x79,0x02,0xd2,0x1f,0xa3,0x1f,0x1c,0x13,0x48 .byte 0xf3,0x36,0x56,0x84,0x56,0x58,0xbd,0x52,0x06,0x21,0x95,0x0a,0xe1,0x45,0x43,0xe6,0x9f,0xfa,0xbd,0x1a,0x60,0x3f,0x6b,0x93,0x8c,0x22,0x17,0x4f,0xc9,0x13,0xdf,0x94,0x3e,0xd8,0x1f,0x22,0xf8,0xc4,0xaf,0xe3,0xcb,0x03,0x67,0x23,0x90,0xee,0x36,0x8e,0x3f,0xc6,0x0d,0xaf,0xd5,0x0f,0x41,0xd8,0x22,0xe3,0xf7,0x6d,0x19,0x99,0x25,0x51 .byte 0x12,0x8d,0xa1,0x19,0xc6,0x26,0xa3,0x1a,0xce,0x9b,0x0f,0xae,0xbf,0xd5,0x80,0x9b,0x4a,0x6c,0xc9,0xa7,0xd7,0x65,0x67,0xb7,0x71,0x77,0xae,0xa1,0x31,0x8b,0x3a,0x0d,0x33,0x43,0xb1,0x08,0x6c,0x97,0xd4,0x41,0xe1,0x83,0x50,0xc8,0xc5,0x44,0x5a,0x6d,0xab,0xa5,0x89,0x5f,0x87,0xb4,0xfc,0x5a,0x29,0xa0,0xb3,0x6c,0x62,0x46,0x58,0x55 .byte 0xd0,0x60,0x3f,0x6b,0x1b,0x1b,0x47,0x0d,0x02,0x2c,0xd7,0x92,0x37,0xc6,0x80,0xf1,0x0c,0xf8,0x91,0xb5,0x20,0x49,0xdd,0x56,0x59,0xb2,0xd6,0x00,0x1d,0x1c,0x87,0xbd,0x99,0x17,0xab,0x5f,0x47,0xaf,0x0e,0x87,0xf1,0xca,0x59,0xec,0xa1,0x3d,0x1e,0x60,0x3e,0xcb,0x23,0xe6,0x26,0x9e,0xc5,0xf6,0xaf,0xab,0x4b,0x9f,0xac,0xae,0x09,0xd9 .byte 0x4b,0xfa,0x24,0x55,0xfc,0xae,0x02,0x29,0xba,0xbb,0xd6,0x13,0x0d,0x4e,0xef,0x8b,0x44,0xe2,0x84,0xd4,0xef,0x5b,0x9a,0xca,0xe7,0x2a,0xdd,0x49,0xdb,0xc9,0xf6,0x77,0xdf,0xff,0x3b,0x79,0x7c,0x0b,0x11,0x30,0x36,0x84,0xf0,0xe4,0x97,0x5e,0x7c,0x48,0x9a,0xd6,0x40,0x63,0xec,0x8e,0x92,0x1b,0x44,0x83,0xaa,0x3c,0x47,0x49,0x9b,0x21 .byte 0x35,0x73,0x41,0x78,0xdc,0x06,0xa5,0x18,0xe0,0x0b,0xb9,0xab,0xf3,0x0d,0xdc,0x84,0x1c,0x52,0xef,0xc1,0x4d,0xad,0xdb,0x71,0xf0,0x33,0x4e,0xaf,0xc3,0x0c,0x8e,0x28,0x92,0xf8,0xbd,0xae,0x8f,0x2d,0x36,0x8a,0xda,0xff,0xc5,0x7f,0x27,0xdc,0xb0,0xd3,0x03,0xae,0xb8,0xdd,0x20,0xf8,0x5c,0x31,0xac,0xbc,0x36,0x71,0xde,0xc9,0x71,0x7d .byte 0x21,0x68,0xcd,0xb0,0xfc,0x9d,0x96,0x6b,0xfa,0xb0,0x3a,0xfb,0x05,0xc7,0x89,0xd1,0x50,0x7a,0x50,0x52,0x53,0x29,0xb6,0x25,0x8f,0x96,0x75,0xb3,0x66,0xac,0x1c,0xf9,0x04,0xe0,0xe7,0x9f,0x0d,0x1d,0x65,0x84,0xb2,0x47,0x08,0xfe,0x7b,0xaa,0x15,0xf0,0x35,0x4a,0x68,0x74,0x9d,0xfe,0x05,0x4d,0xe4,0x0a,0x4e,0xc1,0xba,0x84,0x37,0x95 .byte 0x6e,0xd3,0x22,0xd6,0xc4,0x6c,0x57,0xb7,0x0d,0xf9,0x55,0x76,0xec,0x4e,0x4d,0x32,0xd2,0x7f,0xd4,0xec,0x8c,0xff,0x32,0xe9,0xd5,0x83,0x13,0x43,0x85,0x67,0x0c,0x36,0x2a,0x3f,0x6d,0xf4,0xfe,0x4a,0xf8,0xd8,0xd8,0x23,0x77,0x51,0x87,0x0c,0x82,0x70,0x88,0xd8,0x8c,0xe2,0x9a,0x4a,0x9b,0xf0,0xbd,0x56,0xc6,0xa7,0x64,0x65,0xf6,0x61 .byte 0x5e,0xc1,0x8a,0x03,0x36,0xda,0x9f,0x22,0xa1,0xac,0x48,0x91,0x98,0x28,0x33,0x76,0x87,0x0d,0x5b,0x58,0xa3,0x09,0xb3,0xdd,0xcf,0xff,0x12,0x19,0x35,0x66,0x07,0xa7,0x62,0xdb,0x0d,0xd5,0xbd,0x17,0x3d,0x8a,0xb0,0x3e,0x77,0x72,0xf6,0xe6,0xc5,0xb2,0xd6,0x09,0xa8,0xf1,0x7c,0xbb,0x89,0x56,0x3d,0x27,0x37,0x03,0x45,0x68,0x23,0x71 .byte 0x6e,0x13,0xc6,0x12,0xef,0x52,0x69,0x83,0xe4,0x11,0xdb,0x18,0x4a,0x54,0xce,0xf4,0x40,0x33,0x89,0x9a,0x5b,0x6e,0xa4,0xf7,0xa8,0x9a,0x74,0x39,0xff,0x32,0xe4,0xee,0xe0,0xdb,0xf8,0x0c,0x05,0x53,0x55,0x46,0x4d,0xa3,0x9e,0x9a,0x25,0x8f,0x24,0xbc,0xc2,0x91,0xa8,0x80,0x14,0xb0,0xcf,0xb2,0x69,0x75,0x7d,0x1a,0x8e,0x42,0x2e,0x6c .byte 0x93,0x6d,0xe4,0x49,0x6d,0x8c,0x72,0x16,0xf4,0x36,0x94,0xb6,0x30,0x1d,0x83,0x5f,0x53,0x56,0xb3,0xcf,0x84,0x94,0x1a,0xd8,0x07,0xc9,0x0f,0x0d,0xf5,0xf8,0xd2,0x50,0x8e,0xa9,0x47,0xa4,0x66,0xbf,0xa5,0x2a,0x4c,0x23,0x02,0xac,0xdb,0x1d,0xa5,0xa3,0x04,0xa6,0xaa,0x78,0xf0,0x66,0xc8,0x02,0xef,0x6b,0x8d,0x38,0x8e,0xb9,0x14,0x2a .byte 0x8f,0x43,0x83,0xb6,0x90,0x64,0x15,0x35,0x36,0x17,0x1e,0xb7,0x98,0x39,0x43,0x73,0xb0,0xfe,0x1e,0x75,0xf5,0xda,0x51,0x7a,0xb5,0x5a,0x6e,0xa4,0x68,0xbc,0x84,0x19,0x7a,0x6f,0xe3,0xf4,0x05,0x1f,0x3c,0x4a,0x18,0x7d,0x97,0x9a,0xcb,0x9b,0xe1,0x53,0x90,0xaa,0x37,0xcc,0xf5,0x1d,0x39,0xa6,0x7e,0x3a,0x47,0x75,0x70,0x97,0xa1,0xb1 .byte 0x8c,0x8d,0xb2,0xb0,0xa3,0xdd,0x4f,0x44,0xaf,0x47,0xc2,0x44,0x06,0x61,0x2a,0x40,0x87,0x9e,0x98,0x0f,0x2f,0xe7,0xb4,0xf9,0xd3,0x02,0x71,0x15,0x50,0x43,0x64,0x2c,0xbb,0x55,0xc8,0xc7,0x1d,0xc5,0xb5,0xd7,0xd9,0xea,0x12,0x5e,0xf5,0x97,0xf0,0xa0,0x30,0x88,0x73,0x44,0x6e,0xe6,0x3a,0xbd,0x1c,0x0e,0xee,0xe4,0xc4,0x8c,0xb6,0xcd .byte 0x6a,0x95,0xf4,0x93,0xa1,0x30,0xe8,0x10,0x76,0x8d,0xc8,0xba,0x1b,0xd0,0xba,0xe9,0xe1,0x0a,0x67,0x99,0x0a,0xbd,0xa0,0xa3,0x14,0xd9,0x20,0xdf,0x9e,0x12,0x71,0x29,0x9d,0xd8,0x88,0x91,0xb6,0x30,0xe7,0x38,0xdb,0x77,0xcd,0xcb,0x9b,0xa6,0x58,0x64,0xf8,0xc7,0x41,0x3c,0x4f,0xc8,0x64,0x1c,0x5d,0x87,0xdf,0x38,0x2a,0xd3,0x96,0x83 .byte 0xcc,0xe4,0x8d,0xdd,0x27,0xfb,0x9d,0x23,0x1c,0xbc,0x2a,0xf1,0xce,0xb2,0x63,0xf8,0x52,0xd3,0xfc,0x8f,0xe4,0x72,0x88,0xd6,0xdb,0x27,0x10,0x96,0xd6,0x05,0xc3,0xd9,0x0c,0x94,0x6f,0xb2,0x9a,0x3b,0x6f,0x3c,0xda,0xfb,0xc8,0x34,0x81,0xf8,0x9b,0x75,0x24,0x1b,0x50,0xfa,0xe4,0xbe,0x7a,0xbf,0xfc,0x33,0xdb,0x7f,0x31,0x95,0xd5,0x12 .byte 0x31,0x76,0xe5,0xdb,0x52,0x01,0x83,0x8a,0xeb,0x70,0xc7,0x26,0x71,0xd2,0xec,0xd0,0x05,0x94,0x7e,0x48,0x88,0x1b,0x8b,0xbe,0x0c,0x91,0x43,0x24,0x5a,0x18,0xd3,0xb4,0xd8,0x78,0xde,0x0f,0xe5,0x00,0xd8,0x70,0xd5,0xf6,0xe2,0x91,0x7a,0x6e,0x8c,0x8c,0x5d,0x07,0x27,0x3f,0x73,0x75,0x47,0x20,0x8a,0xb8,0x4f,0xe9,0xe6,0xad,0xcf,0x63 .byte 0xdf,0xcd,0xa4,0x27,0xde,0xb7,0x8b,0x30,0xec,0x29,0x2c,0x87,0xe1,0xf3,0xd9,0x05,0x44,0xfd,0x36,0xf3,0x70,0xe3,0x55,0x9a,0xf9,0x04,0x8c,0xc2,0x3a,0x9f,0xbb,0x07,0x7f,0xed,0x6f,0xdb,0x1f,0x7a,0xd2,0x6c,0x54,0xa5,0x18,0xe5,0x83,0x00,0xd4,0x51,0xee,0x67,0xbc,0xf6,0x17,0x2d,0x4e,0xe2,0x89,0x94,0x5a,0x5b,0x90,0x13,0x14,0x19 .byte 0xdc,0xaf,0x3f,0x09,0x45,0xd1,0x6b,0x40,0x48,0x6f,0xee,0x1c,0x9b,0x92,0xa0,0xf1,0x32,0x34,0xd5,0xd5,0x7f,0xf2,0x55,0xbd,0xd8,0x3b,0xc2,0xc5,0x06,0x37,0x29,0xb3,0xdb,0xbf,0xc3,0x92,0x1f,0x25,0x38,0xa2,0x76,0xcd,0x5e,0x71,0x49,0x26,0xb8,0xef,0x5e,0x03,0xf4,0x81,0x00,0x0b,0xc9,0x69,0xa1,0xf5,0xa0,0x34,0xdf,0x62,0x0b,0x64 .byte 0x41,0x80,0x78,0x7b,0x89,0x9f,0x19,0x28,0x8f,0x75,0xbb,0x49,0xf7,0x4e,0x2b,0x31,0x4c,0xf9,0x50,0xd0,0x17,0xa4,0xcc,0xe3,0xda,0xe3,0x95,0xf7,0x6b,0x01,0x41,0x11,0xae,0x2f,0x9c,0xdd,0x55,0xb2,0xd5,0x7b,0x99,0x71,0x30,0x5d,0x02,0x8d,0xdf,0xca,0xe9,0xcb,0x84,0x69,0x69,0x30,0x3c,0x2c,0x4f,0x50,0xf7,0x33,0x9a,0x75,0xac,0xe1 .byte 0xc2,0xb0,0x39,0x68,0x41,0xfb,0x30,0xf2,0x3f,0x7d,0xc0,0xde,0xbd,0x11,0xf9,0x09,0x62,0x51,0x05,0x82,0x78,0x80,0xd5,0x4d,0x0b,0x63,0xc0,0x20,0xff,0x01,0x41,0xdc,0x01,0x41,0xd9,0x0d,0xa8,0x68,0xd5,0xa1,0x3d,0x2a,0xf9,0x04,0x09,0x78,0x90,0x86,0xff,0xe6,0xb3,0x25,0x0c,0x29,0x96,0x61,0x4f,0x9f,0x93,0x82,0x1e,0x5c,0x5a,0x50 .byte 0xb5,0x8f,0x8b,0x15,0x62,0x52,0x7a,0xa3,0xaf,0xac,0xbd,0xf1,0x21,0xfe,0x5c,0xc0,0x21,0x54,0x3a,0xba,0xbd,0xee,0xdb,0x92,0xc5,0x2b,0xff,0x4c,0xda,0xa0,0x0d,0x56,0x6c,0x23,0x9b,0x73,0x86,0xee,0xab,0x9b,0xf9,0x67,0xbb,0xf0,0xde,0x97,0xf5,0x1a,0x13,0xaf,0x0e,0x7c,0xe9,0xef,0x78,0xf9,0xd1,0x6b,0x01,0x85,0xa7,0x4e,0x33,0x2e .byte 0x04,0x21,0x59,0x34,0x57,0x2c,0xe5,0x96,0x92,0x08,0x8d,0xe9,0x44,0xd6,0x37,0x13,0xc8,0x6b,0x28,0x1f,0xbd,0x3b,0x52,0x3f,0x8e,0xa0,0x2e,0x84,0xfc,0xb7,0x8f,0x43,0xbc,0x69,0x47,0xc1,0xf6,0x91,0x0d,0xa9,0xd5,0x7d,0x5c,0x34,0xd8,0x1c,0x6b,0xb7,0x76,0xa9,0xad,0x6b,0x12,0xb4,0xfe,0x42,0x05,0xa2,0xbc,0x22,0xfb,0x1a,0xc6,0x82 .byte 0x4d,0xc2,0x98,0x34,0x5f,0xa0,0xc1,0x18,0x22,0xbe,0xc3,0xaa,0x14,0xd5,0xe9,0x6e,0x7c,0x24,0x19,0x95,0x40,0xeb,0x87,0x9d,0x47,0xd4,0xc8,0x46,0x35,0xf8,0x31,0x75,0xd3,0x21,0x75,0xd9,0x9d,0x09,0xb0,0x05,0x18,0x25,0x09,0x09,0xd1,0x8a,0x85,0x54,0x4b,0x57,0x64,0x42,0xf4,0xa4,0x9e,0x17,0x68,0xae,0xc8,0xa4,0x25,0x56,0xaa,0xa8 .byte 0xf8,0xd9,0xc2,0x3a,0xe9,0x4c,0x25,0x86,0x4b,0x4c,0x5a,0xd7,0x69,0xc5,0xc8,0x3e,0xbf,0x8d,0x7e,0x11,0xbb,0xf9,0x78,0xc1,0xbd,0x14,0x79,0xa4,0x14,0xad,0x78,0x17,0x2e,0x26,0x58,0x69,0xea,0x94,0x8c,0x3e,0xbb,0xac,0x61,0xbb,0x4f,0x90,0x06,0x82,0x6e,0xea,0xd3,0x1a,0xbc,0xbd,0xf0,0xee,0x89,0xc6,0x75,0x1b,0x57,0x09,0xa6,0x3f .byte 0x8a,0xd4,0x78,0x9b,0x9f,0x99,0xc8,0x9d,0x99,0x1a,0x79,0xb4,0x2d,0x69,0xce,0x3a,0xb7,0x2d,0xed,0xf4,0xe5,0xeb,0x09,0xe6,0x57,0xd3,0x66,0xb2,0xf3,0xfb,0xfb,0xda,0xdc,0xfa,0x1c,0x2e,0xa9,0xd8,0x68,0x5e,0x3d,0x2f,0x2c,0x11,0x2a,0x60,0xb4,0x08,0xa9,0x2d,0x9e,0x41,0x8a,0x02,0x82,0x73,0x58,0x25,0xba,0xca,0x4f,0x46,0x5e,0xbf .byte 0x86,0xb5,0x09,0xa9,0xde,0x86,0x91,0x47,0x8c,0xa2,0x8f,0xc0,0xc1,0xff,0xc0,0x18,0xdb,0x00,0x5c,0xab,0x20,0xe4,0xbd,0x00,0xaa,0x19,0x32,0x4c,0xf0,0xa7,0x0b,0x8e,0xec,0x91,0x50,0x87,0x8c,0x73,0x68,0xe4,0x47,0xd3,0xd9,0x4e,0x5f,0xc0,0x62,0xd0,0xa4,0x01,0x2f,0xe0,0x1e,0x5a,0x63,0x6b,0xca,0xd0,0xdf,0xda,0x9f,0x89,0xd5,0x73 .byte 0xfb,0x3f,0x98,0x20,0x6c,0x30,0x5a,0xd9,0xa6,0x41,0x47,0x82,0xde,0x2d,0x74,0x3f,0xcd,0x6a,0xe7,0x95,0x99,0x8c,0x52,0xa8,0xf9,0x45,0x29,0x40,0xbf,0x8a,0x3b,0x87,0x74,0x92,0x69,0x69,0x8d,0x41,0x84,0xa9,0x7d,0x44,0xd6,0x1d,0x0e,0xee,0x56,0xef,0x3e,0xac,0xa9,0x20,0x16,0xaa,0xf8,0xd0,0x21,0xf6,0x16,0x7d,0x4b,0x7f,0x1d,0xcc .byte 0x5e,0xad,0x25,0xec,0xd9,0x56,0x8a,0x1e,0xc8,0xd5,0x40,0xb5,0x21,0x48,0xbe,0xfe,0xfa,0x4e,0x3c,0x88,0x7f,0x59,0xcd,0x40,0xe5,0xd8,0xac,0x98,0xde,0xba,0xd9,0x6a,0xbe,0x7b,0x07,0xd7,0xfb,0x0f,0xd3,0xb9,0x14,0x6a,0x85,0xcb,0x99,0x6f,0xd9,0xb5,0x22,0x78,0xab,0xa4,0x42,0x6b,0x33,0x4f,0x3c,0xfd,0xcd,0xe1,0x68,0x73,0x08,0x66 .byte 0x34,0xe8,0xa5,0x51,0xfd,0x6f,0xdc,0x84,0x77,0x67,0x2e,0x07,0x1b,0xb4,0xc8,0xda,0x22,0x24,0xab,0x61,0x85,0x17,0xd8,0xa1,0x50,0x28,0xd0,0x3b,0xd6,0xb3,0x6a,0x7a,0x08,0xba,0x34,0x49,0x47,0x1c,0x1a,0x4a,0xd1,0x7e,0x6b,0xdb,0x74,0x26,0x9c,0x0a,0xbd,0x3d,0x29,0x93,0x81,0x02,0xd3,0x08,0x20,0xb5,0x56,0x0b,0x3d,0xf2,0xf3,0x31 .byte 0x6f,0x28,0xe2,0x61,0x81,0x17,0xbc,0xcd,0x7b,0xaa,0x49,0xb9,0x74,0xb5,0x88,0x6a,0xce,0xe3,0x6b,0xbe,0xa8,0x08,0x9c,0xf4,0xe2,0xe7,0xf4,0xfa,0x5b,0x89,0x9c,0xaa,0x12,0xdb,0xd0,0x54,0x1e,0xb7,0xa3,0x66,0x56,0xf8,0x58,0xb5,0xe7,0x5b,0x04,0xb4,0x12,0xb4,0x85,0xfd,0x22,0xde,0x8f,0xc8,0x60,0x1d,0x84,0xc7,0xae,0xae,0xbd,0x63 .byte 0x0a,0x17,0xae,0x64,0x1e,0x31,0xaa,0xdd,0xd7,0xf4,0xe4,0xf7,0x3b,0x00,0x42,0xde,0xa6,0xc6,0x77,0x75,0xa7,0xbd,0x3b,0x92,0x97,0x10,0xad,0x5a,0x9a,0x40,0xa3,0xbb,0x5a,0xe0,0x4e,0x10,0x94,0xa7,0xbd,0x6f,0x0f,0xbe,0xc2,0xd9,0x7d,0xf9,0x5e,0x8c,0xfe,0x1b,0x6f,0xb9,0xd0,0xa8,0xfd,0x8f,0x21,0x69,0x1e,0xc5,0x55,0xa4,0xe8,0x4b .byte 0x99,0x5c,0x35,0xba,0xc9,0x93,0xf0,0x59,0x9e,0xd9,0x1b,0x1d,0xcd,0x0f,0x8b,0xcc,0x55,0x34,0x2e,0xee,0x06,0xaa,0xb4,0xce,0xc1,0xc3,0xb3,0xa3,0x54,0x9b,0x21,0xdf,0xc3,0x3b,0xe5,0x4e,0x89,0x0a,0x81,0xfa,0x3e,0x08,0x66,0xe5,0x2a,0x08,0x60,0xba,0xdf,0xe1,0x81,0x98,0x7b,0xba,0xd3,0x00,0x00,0x3d,0xbc,0x3c,0x5f,0x94,0xa0,0x25 .byte 0x63,0x66,0x52,0x0d,0x20,0x06,0x6e,0x59,0xbf,0x06,0x0a,0xf9,0xd0,0xbe,0xfb,0x31,0x41,0x22,0x36,0x27,0x4f,0xd1,0x16,0x8d,0x29,0xc8,0x2e,0x76,0xae,0xc6,0x26,0xa5,0x35,0x56,0x78,0x75,0x84,0x5b,0xcf,0xc1,0x0a,0x69,0xe4,0x53,0x62,0x6e,0xc7,0xb3,0x0c,0xdf,0xe0,0xb6,0x38,0x8b,0x6f,0x76,0x05,0x80,0x84,0xf8,0xe9,0x9e,0x86,0xf6 .byte 0xcb,0xe0,0xdd,0x7c,0xde,0xab,0xe6,0xbf,0x9d,0x44,0x55,0x3a,0x71,0xc5,0x91,0x07,0xef,0x50,0x23,0x14,0x5d,0x80,0x6b,0x07,0x55,0xba,0x76,0x77,0x31,0x85,0xf7,0x8a,0x1f,0x34,0xba,0x87,0x10,0x53,0xb6,0xec,0x09,0x7a,0x30,0x91,0x1b,0x4e,0x82,0x5d,0x53,0x51,0x88,0xfe,0x2a,0x40,0x63,0xd1,0x0b,0x14,0x51,0x0f,0x15,0xb6,0x2a,0x38 .byte 0x62,0x72,0x27,0x18,0x80,0x6b,0x7f,0x73,0x4c,0xcf,0xde,0xaa,0x5f,0x33,0x43,0x12,0x37,0x8c,0xc5,0xab,0xf0,0x7e,0x69,0xaf,0xc8,0x84,0x7a,0x1b,0x13,0xce,0x17,0xb0,0x67,0xb2,0x83,0xdb,0x1b,0x71,0x67,0xd6,0x86,0x3d,0xa5,0xfc,0x51,0xc9,0xcf,0x94,0x9a,0xaa,0x8a,0xf8,0xff,0x44,0x9c,0x80,0x73,0x35,0xd1,0x8c,0xb4,0x78,0xc1,0xcc .byte 0xb9,0xd5,0x02,0x28,0x44,0x85,0x8b,0x4b,0x74,0xc2,0x2b,0x60,0xa1,0xbf,0x5d,0xe5,0x98,0xec,0x24,0x8a,0x68,0xf3,0xa2,0x37,0x0b,0xbc,0xbb,0x5d,0xe0,0x87,0xe9,0xec,0x9f,0x9f,0x6e,0x62,0x7f,0x0a,0x11,0x41,0xa4,0x1d,0x1e,0xde,0x45,0xe8,0x3e,0x05,0x73,0xd7,0xe3,0x53,0xb6,0x7f,0x94,0x13,0xef,0x33,0xfa,0x91,0x94,0x1c,0x3d,0xe8 .byte 0xb9,0xb3,0x0e,0xff,0xda,0x17,0x49,0x15,0x51,0x59,0x05,0xef,0x16,0xf5,0x10,0xcf,0x88,0xdd,0x1f,0x6d,0xe9,0x53,0xc2,0x13,0xe4,0xb3,0x01,0xff,0x75,0xe6,0xa9,0x4d,0x46,0x0c,0x79,0x76,0x4a,0xa2,0xf0,0x38,0xa0,0x89,0xda,0x92,0x79,0x22,0xa3,0x46,0xb6,0x7f,0x04,0xae,0xfc,0xa0,0xdc,0xf1,0x40,0xe6,0x46,0x0b,0x1e,0x37,0x00,0xae .byte 0x61,0x4d,0xb5,0x7f,0x7e,0x00,0x6c,0x94,0xea,0x89,0x94,0x30,0x8b,0xa5,0x2f,0x6a,0xcb,0x0d,0x08,0xd4,0x50,0xf4,0xa0,0x1e,0xf8,0x83,0xd3,0x25,0xb7,0xcd,0xc2,0x29,0x1a,0xc0,0x34,0x1d,0xeb,0xc9,0xcc,0x9a,0x8d,0x66,0x36,0x05,0xa0,0xc2,0xee,0x0e,0xe5,0x8c,0x41,0xc0,0x55,0xfd,0x2a,0x9f,0x30,0x09,0x08,0x94,0xb1,0xc6,0x79,0xae .byte 0x4e,0xbe,0x84,0xdb,0xe4,0x81,0xce,0x0c,0x44,0xb6,0x33,0x6c,0xcd,0x6f,0x91,0x36,0x28,0x5b,0xe3,0x60,0x3e,0xfe,0xc5,0x4d,0xee,0x89,0x70,0x57,0xf0,0xba,0x74,0xcb,0xcb,0xb8,0xf3,0x91,0x74,0x97,0xe3,0x2d,0x8c,0x75,0x6c,0xa9,0xa5,0x27,0x36,0x90,0x2e,0x41,0x19,0xdd,0x37,0xbe,0x2b,0xef,0x1f,0x75,0x8f,0x14,0xcc,0x94,0x9d,0xa7 .byte 0xef,0x1e,0x62,0x93,0xdb,0x2b,0xa8,0xef,0xf5,0xe8,0xbd,0x11,0x2e,0x59,0xd6,0x81,0x42,0x2b,0x90,0xe0,0xcc,0xb5,0x0b,0xf4,0xb6,0xcb,0xc9,0xc7,0xe5,0xc4,0x9d,0x70,0x40,0xa8,0xf0,0x24,0xb8,0x57,0xcf,0x4a,0xfa,0xf8,0xc0,0x97,0x0f,0x84,0xd0,0x59,0x5c,0x86,0x9e,0xfd,0x39,0x54,0x13,0x00,0x0d,0xb7,0xb0,0x8b,0xf7,0x75,0xb8,0xef .byte 0x6f,0xcf,0xc1,0xec,0x5a,0x3d,0xf4,0x0d,0x74,0xa3,0x81,0x7e,0x71,0xe1,0x67,0xf3,0x5a,0xde,0xe8,0xea,0xe3,0x18,0x7f,0x85,0x4d,0x0f,0x2c,0xbe,0x59,0xfa,0x97,0x1c,0xd5,0x6c,0x97,0x8a,0xfe,0x97,0x7c,0x47,0x2a,0x8f,0x8a,0x8d,0x84,0x61,0x0d,0x5c,0x8f,0x72,0x2e,0x89,0x50,0xff,0x85,0x40,0x6f,0x03,0x1f,0x15,0x47,0xf5,0x5f,0x3a .byte 0x52,0x26,0xbd,0x04,0x82,0x8c,0xee,0x22,0x23,0x84,0x6b,0x7d,0x35,0x28,0x2d,0xa9,0xaf,0x89,0x30,0xc3,0x8a,0x8c,0xbf,0xc3,0xa5,0x34,0x73,0xbe,0xaf,0x29,0x3c,0x26,0xed,0xa9,0x53,0x5e,0x1c,0x54,0x51,0xd5,0x20,0x34,0x4a,0x93,0x0d,0xd3,0xaa,0x26,0x37,0xce,0x5d,0x12,0xb7,0xea,0x80,0x38,0x5d,0x46,0x0b,0x72,0x63,0x5a,0x0f,0x08 .byte 0x9a,0x65,0xdf,0xa4,0xb7,0xe5,0x24,0x8f,0x08,0xb1,0xed,0x5a,0x0d,0x78,0x2c,0xa9,0xf3,0xee,0x6a,0xf8,0x73,0x39,0x61,0x6d,0x50,0x61,0x23,0x88,0x82,0x28,0x91,0xdb,0xbb,0xae,0x9c,0x39,0xe2,0xc2,0xe7,0x42,0xef,0xf9,0xdb,0xa7,0x32,0x19,0x98,0x0d,0xbb,0x67,0x68,0xe9,0x68,0x17,0xb2,0x54,0xf7,0xec,0x0c,0x35,0x05,0x76,0x73,0x26 .byte 0x79,0xb5,0x6d,0xc6,0xc8,0x84,0x80,0x84,0xf9,0xbb,0x95,0xfb,0x39,0xf9,0xaf,0x2d,0xb5,0xd6,0x72,0xad,0x77,0x35,0x09,0x32,0xaf,0xcc,0xc3,0x62,0xd9,0x02,0x33,0x1c,0x9f,0xc0,0xf1,0x18,0x54,0xdf,0xaf,0x0b,0x94,0x52,0xab,0xac,0x7e,0x62,0xab,0x07,0x11,0x83,0xe5,0x7b,0x1e,0xb5,0x3d,0xa3,0x8a,0xdc,0x43,0xf4,0x9c,0x39,0x3a,0x72 .byte 0x01,0x94,0xe5,0xfd,0x0a,0x3d,0x64,0x73,0x56,0x37,0x14,0xc6,0x7b,0x1d,0x81,0xd2,0x62,0x8f,0xe9,0x5f,0x8e,0xb8,0xb4,0xfa,0xfb,0x36,0xa1,0x63,0xe6,0x89,0x87,0x0c,0x87,0x2b,0xa9,0x5f,0x97,0x29,0x0c,0xd2,0x19,0x91,0x83,0x46,0x1f,0x93,0xdb,0x89,0x2c,0xf6,0x32,0x46,0x8b,0x47,0x52,0xad,0x86,0x74,0xda,0x26,0x71,0x6c,0xf4,0x25 .byte 0xa6,0x57,0x89,0xa4,0xd5,0xd8,0x67,0xf7,0x49,0x2a,0xd8,0x6b,0xb9,0xd7,0x97,0xf7,0x66,0xfd,0xf8,0xc2,0x39,0x5f,0xac,0xd3,0xab,0x84,0xac,0x1b,0x6c,0x04,0x00,0xe6,0x0b,0x5e,0xe8,0xc0,0xa3,0x5e,0xe5,0x83,0xb2,0x6a,0x97,0x0e,0xb0,0xa6,0x13,0x77,0xb2,0xc4,0xbb,0x2c,0x27,0x3c,0xca,0x41,0xc4,0x43,0xda,0x92,0xa8,0x0d,0xc8,0x09 .byte 0x8e,0x84,0x46,0x9a,0xd5,0x88,0x3c,0x85,0x3a,0xcd,0x27,0xd3,0x0c,0xaa,0x29,0x74,0xeb,0x3d,0x7d,0x10,0x03,0xc4,0xa7,0x95,0x90,0xb6,0x95,0xf2,0xe4,0xc4,0x35,0x3c,0x9f,0x1b,0x6d,0xd4,0x4e,0xdd,0x44,0xb3,0x59,0x5a,0x75,0xc7,0x2b,0x82,0x3e,0x71,0x34,0x97,0x16,0x86,0x83,0x26,0x2c,0x23,0xc8,0x92,0x3c,0xfe,0xaf,0xcf,0x7c,0x8f .byte 0x0d,0xe7,0x8a,0xa2,0x55,0x56,0x20,0xa3,0xdf,0x5b,0x77,0x08,0xbe,0x3d,0x5c,0x07,0xfe,0xb9,0x14,0xd7,0xec,0x30,0x41,0xcc,0x17,0x4f,0x63,0x34,0xad,0x7d,0xe7,0xac,0x36,0xb6,0x1c,0xc7,0x10,0xc0,0x5a,0x18,0xe0,0xc1,0x50,0x6b,0xb0,0x91,0x11,0xa7,0x02,0x4c,0xdf,0x1f,0x62,0x0e,0xa3,0x3e,0xd0,0xc3,0xbf,0x27,0x6a,0xe3,0xde,0x36 .byte 0x19,0x06,0x4f,0x53,0x5d,0xd3,0x94,0xac,0x4b,0x28,0x72,0x46,0xd8,0x17,0xd8,0xf1,0x47,0xcb,0xd7,0x8d,0xdd,0x85,0x57,0x23,0xf6,0x9d,0x53,0x8f,0x67,0x02,0x68,0x9b,0xf2,0x8e,0x23,0xce,0x27,0xbe,0xef,0xc0,0xd1,0x0d,0x49,0xae,0x4d,0xd3,0xa1,0xc6,0x54,0xfa,0x38,0xc0,0xf7,0xc2,0xb0,0x5c,0xd9,0x6c,0x92,0xb8,0x37,0x91,0xfc,0xf6 .byte 0x52,0x2d,0x3a,0x48,0x92,0xdb,0xcd,0x8e,0x7b,0xa6,0xe7,0xe0,0x27,0x77,0xda,0x0d,0x34,0xff,0x33,0xe2,0x26,0xc2,0xfa,0xea,0x50,0xdd,0x13,0x05,0x7c,0x79,0x40,0x05,0x69,0x31,0x4e,0x32,0x73,0x67,0x21,0x5f,0x18,0xc1,0x18,0x1b,0xea,0x19,0x24,0xc7,0xa3,0x55,0x44,0xcc,0xd3,0x5e,0x83,0x4e,0xea,0x3f,0xc6,0x58,0x9f,0x0b,0x0e,0xc6 .byte 0x29,0x00,0x98,0x99,0xc8,0x71,0xab,0x55,0x77,0x1f,0xdc,0xd0,0xab,0x78,0xd7,0x9b,0x37,0x8f,0x35,0xc0,0x64,0x41,0x6b,0x2c,0x07,0x43,0x0a,0xc3,0x4d,0x8f,0xdc,0xa2,0x18,0x94,0xe3,0xd0,0xc3,0xb2,0xd2,0x84,0xe3,0x12,0x4b,0x31,0x20,0xcb,0x10,0x8b,0x74,0x57,0xf5,0x30,0x29,0x5e,0x37,0x8c,0xc7,0xb7,0xda,0x47,0xc7,0xca,0x59,0xf5 .byte 0x6d,0x61,0x32,0x90,0xb3,0x85,0x2f,0xf8,0x1d,0x5d,0x82,0x2d,0x4a,0x93,0xb9,0x8a,0xbb,0x84,0xce,0x19,0xa4,0x8a,0xa5,0xfc,0x4e,0xa4,0x4c,0xa7,0x54,0x79,0x3a,0x7c,0x9d,0x32,0x74,0x80,0x63,0x98,0xdc,0x78,0x8a,0x0e,0xe8,0x79,0xa3,0x51,0x7b,0x1c,0x4c,0x5a,0xe6,0x3d,0x3f,0x68,0xd4,0x9b,0xc8,0xc2,0x96,0x82,0x5f,0x3c,0xab,0x1c .byte 0xb8,0x09,0xfe,0xa1,0x2d,0x95,0x8c,0xf3,0x74,0xa4,0xb6,0x6d,0x96,0xa8,0x81,0xcc,0x0a,0x46,0xaf,0xce,0xfb,0xb3,0x6a,0x18,0x68,0xc0,0x73,0xc8,0xe7,0x3b,0x3f,0x55,0xda,0xde,0x69,0x1f,0x8d,0x2b,0xd4,0x9f,0x63,0xed,0xde,0xe5,0x6d,0xae,0xa1,0xdd,0xed,0xbe,0x58,0xc7,0x30,0x30,0x50,0x04,0x45,0x54,0x3a,0x5d,0xbc,0xac,0x33,0x13 .byte 0x41,0x0f,0x07,0x1e,0xec,0x4c,0xf2,0x16,0x80,0x49,0x43,0x5a,0xbd,0xb5,0xc4,0x78,0x61,0x86,0xff,0xa2,0xef,0xbf,0x37,0x1f,0x6b,0xf3,0xaa,0x74,0x3e,0x77,0x63,0x47,0x86,0xd5,0x73,0x44,0xe6,0xf6,0x9c,0xef,0x69,0x5d,0xb6,0xe4,0x64,0x94,0x9b,0x4e,0xdd,0x0b,0x69,0xe9,0x7a,0xfd,0x8a,0x89,0xff,0x2d,0x0e,0x5b,0xdc,0xcd,0x3c,0xdb .byte 0xec,0xb8,0x0c,0xe0,0x22,0x09,0x63,0xd7,0x50,0xec,0x42,0xa1,0x2b,0x1c,0xd9,0xa6,0xb5,0xd9,0x16,0x38,0x63,0xa8,0x59,0xda,0xe7,0xbb,0x27,0xca,0xbf,0x39,0x61,0xd9,0xae,0x8f,0xbd,0x27,0xa3,0xfc,0x7c,0x10,0x3b,0x5e,0xbc,0xb0,0xc3,0xf1,0x46,0x8e,0x66,0x7d,0xe0,0x5e,0xad,0x48,0x9f,0xfc,0x5c,0xc0,0x85,0xab,0xd2,0x3a,0x6f,0x60 .byte 0x0c,0x5c,0x1b,0xd8,0x66,0xf5,0x87,0xda,0x0f,0xdc,0x39,0xee,0xdf,0x85,0xf7,0xb8,0xfa,0xd3,0xe2,0xbe,0x7a,0x06,0xda,0xf4,0x55,0xb9,0x10,0xfd,0xb6,0xe9,0xe8,0x94,0xf0,0x66,0x17,0xf2,0x87,0x55,0x99,0xa8,0x65,0x23,0x0f,0xf0,0x41,0xe1,0x9d,0xf2,0x03,0xf4,0xa9,0xc8,0x31,0xa4,0x88,0xa9,0x32,0xcf,0x02,0xd3,0x8a,0xdb,0x9b,0x12 .byte 0xa2,0x41,0xea,0x19,0xff,0x2a,0x18,0x53,0xba,0x51,0xb2,0xe3,0x01,0xbf,0xc0,0x45,0xce,0x16,0xb5,0x66,0xd0,0x61,0x4a,0x1d,0xdf,0x8e,0x35,0x9d,0xeb,0x40,0xcc,0xcd,0x0f,0x4f,0x57,0xd3,0xbc,0x44,0x73,0xf9,0x2a,0xf1,0x85,0x1c,0x06,0x5c,0xde,0xa1,0x2d,0xe4,0x68,0xf4,0xc7,0x79,0x5c,0xf4,0xd7,0x33,0x47,0xdf,0xcd,0xa2,0xe8,0x13 .byte 0x7c,0x0f,0xcb,0x81,0x42,0xa6,0x35,0xf9,0x60,0xcb,0xf3,0x6a,0xf8,0x3c,0x8d,0xff,0xb1,0xdf,0x40,0x22,0x86,0xdb,0xd1,0x59,0x05,0x2a,0xbc,0x04,0x87,0xad,0xe9,0xcd,0x45,0x7e,0xa9,0x5b,0x9a,0xad,0x24,0xf0,0x10,0xac,0xdc,0x16,0xa3,0x4c,0x3a,0x17,0x5d,0x79,0xc6,0xc7,0xcb,0xa0,0x6f,0x34,0xb0,0x9c,0x6a,0xc1,0xd3,0x50,0x0b,0xac .byte 0x2a,0xb1,0xb8,0x96,0xb6,0x82,0xc8,0x71,0xf7,0x34,0x10,0xa3,0x64,0x6f,0x3e,0x2c,0x5c,0x7a,0xec,0x50,0x6e,0xdc,0x65,0x7d,0xb0,0x7d,0xd5,0x9e,0xd0,0x6e,0x78,0xfd,0x6f,0xb8,0x8f,0x07,0xdb,0xf2,0x40,0x9d,0x90,0x7d,0x67,0xf7,0x89,0xa7,0x2d,0x1f,0xf2,0xa9,0xeb,0x3e,0x3e,0x31,0xd1,0xcf,0xec,0xd9,0x32,0x94,0x0c,0x3b,0x24,0xf7 .byte 0xff,0xdc,0x3c,0xe8,0x8b,0x06,0xae,0xc4,0x8b,0x96,0x86,0x97,0xef,0x64,0x53,0xc3,0xf3,0xa4,0xf1,0xfe,0x7f,0xf5,0xb7,0xa3,0x76,0x3b,0x6b,0x91,0x8b,0xbe,0xa2,0xb1,0x76,0xe4,0x50,0x86,0x09,0x2d,0x85,0xba,0x69,0x47,0x9e,0x02,0x13,0x07,0x46,0x9e,0xc5,0x98,0xc5,0xb8,0xd0,0x06,0x97,0x17,0x81,0x6c,0xac,0x90,0x75,0x95,0x03,0xb4 .byte 0x7f,0x76,0x87,0xd7,0x6b,0x76,0xbb,0x93,0xf3,0xe2,0x75,0x8f,0xc3,0x01,0x08,0xbd,0x19,0x1d,0x2f,0x4c,0xee,0x35,0x02,0xd0,0xf1,0x38,0x5e,0xea,0x3d,0x38,0x38,0x9d,0x56,0x38,0xf1,0xcb,0x41,0xc7,0xde,0xbd,0x2f,0xda,0x60,0x58,0x82,0xbf,0xc0,0x46,0xee,0xb2,0xcd,0x6a,0x57,0xf9,0x48,0x9f,0xcc,0xf2,0x15,0x53,0xcb,0xcb,0xad,0xfa .byte 0xb2,0x65,0x62,0xf1,0x41,0x19,0xac,0xb0,0xc3,0x64,0x4e,0xeb,0x65,0x94,0xae,0x22,0x0e,0x24,0x99,0x9c,0x9c,0xa6,0x45,0xdc,0xa7,0x2e,0xd6,0x1b,0x76,0x37,0x42,0x98,0x59,0xb1,0x16,0x7a,0xd7,0xa5,0xd1,0x53,0x58,0xec,0x6e,0xbe,0x5d,0x98,0x37,0x06,0xda,0x5d,0xf7,0xbe,0xa9,0x78,0xb3,0x5a,0x96,0x44,0xa5,0x3a,0x9f,0x08,0x29,0x3b .byte 0xff,0xc5,0x74,0xab,0xe7,0x7e,0x87,0x34,0x71,0x3b,0x45,0xa3,0x1a,0xc5,0x34,0xe7,0xe6,0xff,0xb7,0x27,0xe7,0xf9,0x91,0x9a,0x6d,0x0e,0xb5,0xfd,0xba,0x33,0xa9,0xd5,0xd7,0x2a,0xd2,0xb3,0x51,0x43,0x86,0x37,0xeb,0x06,0x23,0x31,0xfa,0x85,0x8b,0x4f,0x68,0x81,0xaf,0xf4,0x9c,0x6f,0x04,0x35,0x19,0x78,0xf0,0xd2,0xdb,0x2f,0xf5,0x35 .byte 0x62,0xe5,0x31,0xfc,0xfc,0xff,0x0f,0x7b,0x1d,0xde,0xb8,0xb0,0x8c,0x83,0x8a,0xc2,0x9d,0x0e,0x50,0x2a,0x58,0xe8,0xeb,0xbf,0x51,0x50,0xf1,0xec,0xb9,0xad,0x07,0x1b,0x51,0xa3,0xe1,0x68,0x33,0x4d,0xfd,0xaf,0xd5,0x3c,0x25,0xc6,0x95,0x8f,0xf4,0x5f,0xa9,0xde,0x5a,0xa6,0x5a,0x5f,0x3e,0xeb,0x47,0x91,0x1c,0x5d,0x3f,0x8f,0x23,0xeb .byte 0x30,0x89,0x2b,0x3c,0x48,0x4f,0xa8,0xab,0x09,0x6a,0x8a,0x75,0x3e,0xb0,0x83,0xd9,0x44,0x60,0xb5,0xd4,0x2e,0x21,0x7f,0x24,0xec,0xfc,0xd2,0x6d,0xd6,0x90,0xf4,0x1b,0x52,0x03,0xd9,0x7a,0x48,0x0b,0x32,0x40,0x70,0xc3,0x63,0x8d,0x6d,0xc7,0x23,0xea,0xf9,0x17,0x49,0x1f,0xfe,0xe5,0x50,0xbe,0xab,0x82,0xc9,0x31,0x30,0x28,0xc8,0x40 .byte 0x37,0xfe,0x9f,0x37,0xdc,0x7c,0x54,0xc7,0x02,0xf1,0xa4,0x1e,0xdd,0x52,0x11,0xa5,0xb9,0x71,0xfd,0xb8,0x41,0xed,0x82,0x1e,0xc7,0x57,0xed,0xf8,0x80,0x5d,0x92,0x49,0xfc,0x0b,0x24,0xdb,0xa7,0x97,0xbb,0xf9,0x4a,0x06,0xd8,0x4d,0x3d,0xbc,0x8d,0xe0,0x42,0x7d,0x5f,0xf9,0xa7,0x46,0xe8,0x10,0xed,0x89,0xe4,0x68,0x8e,0x1a,0xdb,0x29 .byte 0x9d,0x59,0x22,0x2d,0xe3,0x40,0x8d,0x4b,0x5b,0x6e,0x72,0xde,0xd1,0xd3,0x83,0x02,0x0e,0x7a,0x53,0xe1,0xd2,0x98,0x15,0x6e,0xdd,0x52,0xeb,0x91,0x12,0x0a,0x12,0xb1,0xd0,0xef,0xa1,0x92,0x4d,0x53,0x84,0xfd,0xf8,0x00,0xc6,0xee,0x8e,0xf1,0x07,0x78,0x31,0xdc,0x13,0x3c,0x97,0x63,0xf2,0xfe,0x24,0x3f,0x25,0x3d,0xb0,0xcf,0xa5,0xe8 .byte 0xf1,0x92,0x93,0x13,0xd7,0x9a,0x9d,0x64,0x62,0xb8,0x7d,0x83,0x6e,0xc6,0x1d,0x72,0x7f,0xd4,0xe9,0x24,0x32,0xe4,0xad,0x0d,0x2d,0x77,0x3d,0x19,0xc6,0x4c,0xb2,0xd8,0xe8,0xd0,0xda,0xef,0x13,0xa7,0x9b,0x1d,0xf5,0xea,0x36,0xdb,0xcd,0xcb,0x5c,0xdb,0xb6,0x77,0x8b,0x3e,0xbc,0x9e,0xf5,0x91,0x18,0x77,0x8c,0x62,0x18,0x43,0xbe,0xee .byte 0x79,0xff,0x2d,0x4e,0x69,0xe3,0xf2,0x19,0x9b,0x26,0x85,0x1c,0x71,0x50,0x31,0x33,0x15,0x0a,0xa1,0x0e,0xff,0xca,0xe6,0x32,0x7a,0x5b,0x22,0x8e,0x4d,0xf3,0x2a,0xa3,0x2b,0x73,0xda,0xaf,0x60,0x48,0xa0,0x13,0x09,0xb2,0x93,0xbd,0x8f,0x22,0x7c,0xfb,0x67,0xc1,0x37,0x4e,0x41,0xa7,0x08,0x6c,0x61,0xd1,0xab,0x66,0x44,0xcf,0x98,0x37 .byte 0xe5,0x82,0xdc,0x0d,0x8c,0x77,0xe0,0x69,0x0f,0xa7,0x84,0xcc,0xd1,0xcf,0x08,0xf5,0x14,0xa0,0x87,0x30,0x59,0x37,0xbe,0x53,0xbb,0x1c,0x24,0x8d,0x2d,0xbc,0x9d,0x08,0xc0,0x17,0x61,0xdd,0xe3,0xbe,0xdc,0xfc,0xf7,0x32,0xd9,0x6f,0x48,0xf2,0x37,0x2a,0x68,0x59,0x45,0x1c,0x0c,0xb1,0x78,0x0e,0xf3,0x95,0x49,0x7a,0x2f,0x2c,0xfe,0x80 .byte 0x32,0x69,0xed,0xa5,0x99,0x70,0x96,0xe0,0xd5,0x94,0xce,0x14,0x91,0x30,0xcb,0xb5,0xdb,0x54,0x3b,0xb5,0x04,0x71,0x97,0x00,0x53,0x62,0x9e,0x68,0x38,0xf6,0x1b,0x01,0xd8,0x45,0x23,0x64,0x24,0xe6,0x3a,0xdc,0x39,0x87,0x31,0xdc,0x97,0x58,0xe5,0x24,0x10,0xa6,0xa6,0x3c,0xd5,0x90,0x6e,0x1e,0x55,0xdd,0x4f,0xe3,0x05,0x58,0x9a,0x88 .byte 0x1b,0xbb,0x8d,0x21,0xd6,0xb2,0x2c,0x30,0x33,0x0c,0x43,0x98,0x72,0xad,0xc4,0x71,0xf8,0x97,0x61,0x7b,0x9b,0x70,0x1e,0x71,0x55,0xad,0x53,0xf2,0xfe,0x23,0x3c,0xda,0x84,0x37,0x11,0x47,0xa7,0x70,0xb5,0x0b,0x97,0xbe,0xd8,0x9b,0x69,0x71,0x52,0xfc,0x60,0xec,0x94,0x7a,0xc0,0xa7,0xdb,0x31,0x5d,0x19,0xde,0xc0,0xff,0x14,0xb7,0xc7 .byte 0x74,0x8b,0x65,0x33,0x31,0x4c,0x63,0xf5,0x96,0x08,0xc2,0xf5,0x56,0x3b,0x15,0xbf,0x39,0x1b,0x6b,0x59,0xe5,0x39,0x56,0xb6,0x57,0x7a,0x2b,0xcd,0x46,0x9c,0xd1,0x0e,0x49,0xe1,0x9f,0x07,0x0f,0xea,0xd5,0xb9,0x27,0x76,0x04,0x09,0x92,0x6d,0x37,0x78,0x36,0xd7,0xf8,0xa0,0x96,0x88,0x8c,0x3f,0xff,0x88,0x95,0x85,0x14,0x24,0x82,0x85 .byte 0x47,0x68,0x58,0x11,0xd0,0x21,0x5e,0x1a,0x61,0xe3,0x0f,0x3f,0xd3,0xea,0x14,0xb9,0xd6,0x98,0x10,0x7f,0x38,0x00,0xf5,0xd1,0x73,0xc0,0x71,0x7e,0x75,0xbb,0x5c,0xcc,0xf0,0x83,0x48,0x89,0x16,0xbf,0xd1,0x82,0x36,0x13,0x5d,0x05,0x43,0x18,0xb9,0xf1,0xd4,0xa3,0xcf,0xb3,0x24,0xe8,0x74,0x91,0xee,0x27,0x7c,0xe0,0x20,0xa8,0xde,0x4e .byte 0x7d,0x26,0xef,0x61,0xae,0xe3,0xa9,0xd3,0xde,0xfb,0x37,0xc2,0x06,0xbc,0x1e,0x4d,0xbf,0x3b,0x56,0xca,0x03,0x9f,0x82,0x44,0xfa,0x7c,0x1d,0xa6,0xbd,0xd8,0xcf,0x2f,0x08,0xc9,0x73,0xf3,0x0b,0xf3,0xd8,0xb7,0x93,0xd3,0xd4,0x8b,0xc1,0xce,0x4e,0x88,0xb6,0xd0,0x7e,0xbe,0x7f,0x9f,0x8e,0x98,0xa0,0xf4,0xc1,0x9a,0x65,0xe9,0xe5,0xf2 .byte 0xb5,0xbc,0x64,0xa8,0xdc,0xf0,0x00,0x59,0xc9,0x83,0xbf,0x33,0x54,0x6b,0x12,0xfc,0x61,0xc3,0x2d,0x53,0xfa,0x24,0x39,0x83,0x3a,0x8f,0xaa,0xf8,0xbd,0xff,0x74,0x15,0x10,0x3a,0x3b,0xc7,0x72,0x20,0xed,0x1a,0x79,0x0c,0x12,0xaf,0xb6,0x00,0x54,0x05,0xd7,0xde,0xe2,0x00,0x4f,0x96,0x9c,0xab,0x77,0x71,0x65,0xe1,0x2d,0xee,0x2f,0xbd .byte 0x4e,0x9a,0x0f,0xe9,0xca,0x4f,0x4c,0xdd,0xb8,0x22,0xdb,0x1c,0x5f,0x49,0x8e,0x69,0x3c,0x70,0x79,0xc1,0x20,0xd8,0xda,0x61,0x55,0x0a,0x0e,0xd0,0xb5,0xfb,0x1c,0x56,0xd2,0x85,0x82,0x7b,0xb0,0x58,0xdc,0xf0,0x8b,0x0c,0xfa,0x0c,0xce,0xe3,0x15,0x8b,0x68,0x49,0x09,0x0c,0x9b,0x80,0x17,0x92,0x19,0x08,0xe2,0x7b,0x3e,0x60,0x96,0xc3 .byte 0x81,0x5b,0x4d,0x63,0x04,0x47,0x0e,0xff,0x43,0xb1,0x71,0xb0,0x6c,0x02,0x85,0x2f,0x5b,0xdf,0xba,0xb7,0xe5,0x34,0xb6,0x7e,0xa3,0x74,0xec,0x44,0xe8,0x35,0xc7,0x10,0xa6,0xe6,0x31,0x50,0x29,0x69,0x11,0x91,0x3c,0x31,0x3b,0xb2,0x17,0x21,0xdd,0x92,0x2c,0x71,0x0a,0x45,0xe7,0x7d,0xf0,0x38,0x41,0xa6,0x09,0x72,0xcf,0xbc,0x56,0xff .byte 0x81,0x79,0xaf,0x68,0x80,0xc5,0xa6,0xb1,0xb7,0x3d,0x0d,0xc5,0x9c,0xb2,0x32,0x7f,0xcc,0x66,0x8d,0x86,0x84,0x38,0xa5,0x66,0x7c,0x4d,0x4c,0xdf,0xa7,0x1a,0x7e,0x66,0x95,0xf7,0x5e,0xe9,0x4c,0x61,0x7a,0x05,0x66,0x78,0xae,0x2b,0xef,0x6b,0x6a,0xc5,0x6d,0xbb,0x35,0xef,0x9f,0x0c,0x1c,0x00,0x45,0x2a,0xad,0x79,0x84,0x8b,0x28,0x81 .byte 0x0d,0xe8,0xef,0x49,0xaf,0x59,0xb0,0x9f,0xec,0x58,0x32,0xc9,0x49,0xb2,0xf8,0xc5,0xae,0x92,0xb8,0xde,0xec,0xc2,0xc4,0xf9,0xc8,0x28,0x99,0x07,0x39,0x71,0xed,0x06,0xcc,0x46,0x14,0xd1,0xf4,0xad,0x8d,0x72,0xa4,0x3f,0xea,0x35,0x6f,0x84,0xa8,0xc7,0xcd,0xfd,0x16,0xf8,0x66,0x16,0xb9,0xd2,0x31,0x57,0x1b,0x5c,0x50,0xec,0x8f,0x15 .byte 0xf8,0x4f,0x65,0xd0,0xdb,0x0f,0x29,0x3d,0x03,0xba,0x7b,0x56,0x95,0xfe,0x97,0x95,0xff,0x8f,0x87,0x3c,0xc5,0x70,0xbb,0x96,0x37,0x69,0xd4,0xe6,0xbd,0xd1,0x93,0x95,0x7e,0x1a,0x80,0xde,0x9f,0x2a,0x00,0x18,0x5d,0xcf,0x8d,0xcc,0x31,0x3b,0xe3,0xc9,0x07,0x20,0xf3,0x87,0xc4,0x62,0x6a,0xc2,0xbe,0x09,0xb0,0x57,0xf7,0x8d,0x56,0x4c .byte 0x6b,0xb1,0xa8,0x65,0x3c,0xff,0xfa,0x95,0x20,0xed,0xca,0x36,0x3f,0xba,0x5f,0xe1,0x03,0x6e,0xe1,0xbd,0xce,0xa0,0x68,0xaf,0x51,0x65,0x65,0x10,0xfe,0xdd,0xb4,0x33,0x49,0x57,0x69,0x60,0xad,0x8f,0x84,0x88,0xeb,0x0d,0x46,0xf2,0x2b,0x5d,0x79,0x1e,0x42,0xc5,0x9d,0x3e,0xef,0xb9,0x60,0xa9,0xc6,0x34,0x81,0xb5,0x09,0x42,0xf3,0xa8 .byte 0xf0,0x8f,0xc7,0xbc,0x05,0xc8,0xe9,0xa7,0x47,0x15,0xf7,0x41,0xe2,0xe8,0x0a,0x01,0x67,0x18,0xfb,0x63,0x5a,0x37,0xf4,0x45,0xc2,0x2d,0xcf,0xd0,0x28,0xd3,0xc1,0x2b,0x1c,0x8a,0x40,0x64,0xee,0xf6,0x2c,0x2a,0x37,0x26,0xe2,0x3d,0x76,0x27,0xa2,0x92,0x29,0xd3,0x17,0x4c,0x67,0x1b,0x1d,0xe9,0x38,0x1c,0x38,0x36,0xd5,0xa0,0x91,0xc5 .byte 0xae,0x67,0x0c,0xa3,0x1d,0x34,0x11,0xda,0xe7,0x93,0xe0,0xaa,0xa8,0xa1,0x00,0x5d,0x21,0x34,0x90,0x7d,0xff,0x25,0x46,0x64,0x55,0x56,0x1d,0x58,0xf2,0x49,0xa4,0x19,0x1a,0xe7,0x63,0x75,0xac,0x37,0xb3,0xf1,0x3c,0x14,0x46,0xd6,0x33,0x11,0xfb,0x35,0x84,0x34,0xf7,0x0d,0x99,0x49,0x21,0x8c,0x20,0xf0,0x7b,0x0d,0x4e,0x9a,0xc5,0xc3 .byte 0x16,0x1e,0x73,0x06,0xd8,0x1b,0xe0,0x08,0x5d,0x5a,0x78,0x6f,0x5b,0x18,0x85,0x76,0x41,0xdf,0xa1,0x70,0xea,0xab,0xb5,0xa0,0x4d,0x07,0x66,0x0b,0xb8,0x19,0xf1,0xe7,0x3a,0x68,0xac,0xb9,0x06,0x9e,0x74,0x6a,0x20,0xa6,0x47,0x72,0xd9,0x2d,0x80,0x15,0x0c,0xfb,0x58,0x00,0x3d,0x41,0x48,0x3e,0x72,0xf6,0x08,0xdf,0x14,0x72,0x60,0xf5 .byte 0xd4,0x34,0x7d,0x61,0x42,0xa6,0x40,0xdf,0x54,0xc8,0x37,0xa4,0x39,0x4f,0x1e,0x4c,0x1d,0xae,0x0a,0xb3,0xc8,0x8f,0xed,0x42,0xfc,0xce,0x1d,0x4b,0x31,0x49,0x48,0xe6,0xa0,0x2e,0xd5,0x50,0x13,0xdd,0xc8,0x11,0x4d,0x53,0xce,0x5a,0x41,0x30,0xa7,0xfd,0x09,0xd4,0x1e,0xb3,0xd8,0xd4,0x52,0xc1,0xc5,0x65,0x64,0x96,0xf8,0x02,0xdb,0xcb .byte 0x0e,0xf5,0x28,0xde,0x01,0x34,0x7f,0xe0,0x12,0xdd,0xfa,0x1d,0xda,0xfd,0xdc,0xd3,0xd4,0x87,0x27,0x0f,0x9a,0xb5,0x59,0xe0,0x3f,0xc2,0x38,0xdf,0x13,0xfb,0xdc,0x37,0x54,0xf4,0xf0,0xc8,0xcf,0xd2,0xd1,0xf2,0xf1,0x45,0xf8,0x50,0xb8,0xa6,0xae,0xa0,0x4f,0xaa,0x20,0xc2,0x81,0x2f,0x4e,0xdc,0xc4,0xf3,0x54,0x33,0xf0,0x9f,0x0a,0x75 .byte 0x2d,0xd4,0x43,0x0c,0x1b,0x9f,0xf1,0x82,0x75,0x2b,0x9a,0x6c,0xfd,0xf9,0xa7,0xda,0xa4,0xdc,0xe1,0xd3,0x93,0x14,0x26,0x7c,0x5f,0x20,0x83,0x85,0x38,0xfc,0x87,0xf0,0xbd,0xbd,0xd8,0x80,0xd0,0x10,0x6b,0x23,0xfd,0x52,0x25,0x4d,0xfc,0xfb,0x13,0xb7,0xf7,0xb2,0xed,0xe2,0xd7,0xf9,0x87,0x7b,0x85,0x0c,0xe4,0x6a,0xbd,0xc7,0x59,0xff .byte 0x7a,0xb5,0xfe,0x8c,0x80,0x16,0x2e,0x43,0xb4,0x90,0xff,0xa9,0x71,0x3c,0xee,0xb6,0xa5,0xaa,0x2e,0xa8,0x97,0x9f,0x0c,0xcc,0x31,0xe8,0x2a,0xd9,0xab,0x60,0x88,0xc2,0x29,0xc3,0x4d,0xc5,0x2d,0xf4,0x40,0xc8,0xfd,0x3c,0xe4,0xf7,0x67,0x35,0xf0,0xb6,0xa8,0x4c,0xec,0x30,0xfd,0x54,0xd8,0x25,0x50,0x8e,0x24,0x61,0x7e,0x54,0x0c,0x5b .byte 0x88,0xb9,0x70,0xef,0xc6,0xa7,0x23,0xd7,0xb2,0xec,0x3f,0x51,0xce,0x29,0x74,0x35,0xc2,0x32,0xda,0x1e,0x13,0xc2,0x20,0x3a,0x35,0xee,0x40,0xf4,0x00,0x3a,0xf1,0xa4,0xf3,0xd1,0x58,0x57,0xa6,0x83,0xb1,0x01,0x2d,0x15,0x1e,0x08,0xf8,0x9b,0xb5,0x35,0xee,0x33,0xba,0x5b,0x8d,0x26,0x00,0xee,0x95,0xaf,0xca,0x7e,0x98,0xd5,0x58,0x40 .byte 0xb5,0xa2,0x7d,0x8e,0x0e,0x1b,0x72,0x88,0x1c,0x4b,0x52,0x65,0x6e,0x60,0x62,0x46,0x1c,0x41,0x81,0xd2,0x83,0xc0,0x2d,0xbc,0x5d,0x58,0xc7,0xf8,0x43,0xd9,0x11,0x05,0x50,0x6d,0xc2,0x81,0x29,0xac,0xe8,0x44,0xfb,0x2d,0xf3,0xf4,0x17,0x9b,0x01,0xae,0xb1,0x8a,0x61,0xbf,0x20,0x75,0x12,0x3b,0xb4,0xf5,0xc5,0xff,0x5b,0xf5,0xa8,0x6f .byte 0xec,0x7d,0x04,0x9f,0x63,0xbc,0xb7,0xcc,0xce,0x96,0x7b,0x31,0x09,0x06,0x25,0x90,0x4e,0xd2,0xf5,0x60,0xa3,0x61,0x61,0x8d,0x3e,0x97,0x54,0x24,0x1c,0x25,0x3a,0x2e,0x6c,0xa9,0x97,0xa4,0x69,0xe5,0xdd,0xc1,0xdb,0xb2,0xf5,0xc4,0x8b,0x23,0x20,0xe5,0x68,0x85,0x78,0x08,0x2c,0x95,0x85,0xc5,0x4b,0xf1,0xfa,0xb1,0xf2,0x32,0x28,0x4e .byte 0x1c,0x7b,0x3d,0xfc,0x59,0x52,0x15,0xd5,0x74,0x86,0xea,0xde,0xd5,0x1c,0x5d,0xcb,0x22,0x4a,0x2e,0xbd,0xb4,0x5f,0x59,0xd6,0xaf,0x49,0x7b,0x0c,0xce,0x78,0x4b,0xc9,0xd2,0x2e,0x22,0x7d,0xe2,0x7b,0x05,0x0d,0xa1,0xca,0x24,0x91,0x11,0xa0,0xf2,0xbd,0x77,0x60,0xe9,0xfe,0x5d,0x5c,0xea,0x88,0xf9,0xbf,0xe1,0x26,0xd3,0x65,0x4a,0xa1 .byte 0xb0,0xbe,0x72,0x49,0xfc,0x96,0xd1,0x4b,0xc9,0xb3,0xe0,0x74,0x0e,0xff,0xb6,0x3f,0xed,0xe1,0xdc,0x92,0xe3,0x65,0xaa,0x14,0x2a,0xb9,0x2f,0xc5,0x7c,0x4b,0x30,0x1a,0xc5,0x85,0xc7,0xa4,0x8c,0xba,0xff,0xf3,0xdc,0xf8,0x75,0x4b,0x35,0x36,0x6c,0x91,0x04,0x28,0x3c,0x94,0xc3,0x23,0xd5,0x89,0xbf,0x88,0x3c,0xc8,0xf2,0xec,0x14,0x3f .byte 0x5f,0xf3,0x0c,0x6c,0x89,0x10,0xe1,0x6f,0xef,0xcc,0xd1,0x20,0x32,0xe7,0x59,0xd1,0xab,0xe8,0xe2,0x5f,0xa4,0xc3,0xe6,0x85,0x44,0x31,0xed,0x34,0xa7,0xef,0xff,0xb4,0x28,0x07,0x2f,0xc2,0x75,0x7d,0x72,0x80,0xa9,0x56,0xc1,0x6d,0x7e,0x5c,0xb7,0xdb,0x14,0x1d,0x27,0x0b,0xc7,0x5c,0xd4,0x97,0x35,0x29,0x58,0xb3,0xf0,0xd5,0x4a,0xc8 .byte 0x73,0x01,0xbc,0x86,0xb1,0xff,0xc0,0x5c,0x9d,0xc1,0x19,0xbf,0xeb,0x6d,0x60,0x0b,0x8f,0x2c,0xf4,0x90,0x10,0x43,0xe7,0x2d,0x46,0x95,0x1a,0xf8,0x09,0xc8,0x30,0xff,0x98,0xf2,0xd8,0xee,0x42,0xfb,0x44,0x1b,0xd8,0xa7,0x04,0x87,0x83,0xe2,0x5b,0x5b,0x75,0xf3,0xec,0xa0,0x92,0x64,0x48,0x2d,0x53,0xa5,0x3e,0xeb,0x3b,0x1c,0xc7,0xe8 .byte 0x09,0x66,0xae,0xaf,0x94,0x2b,0xf6,0x16,0x9f,0x07,0x01,0x46,0xcf,0xd2,0x0c,0x7e,0x7f,0x0d,0x02,0xac,0x03,0xd0,0xb8,0xa0,0xe8,0xbf,0x5f,0x57,0x07,0x09,0x38,0xde,0xab,0xac,0xe3,0xae,0x59,0x70,0x5d,0xa5,0x32,0x31,0x80,0xb9,0xbb,0x5f,0x8b,0xcc,0xe2,0x2c,0x2e,0x1a,0x78,0xa6,0xf9,0x1b,0x2d,0x7f,0xd4,0xa1,0xf4,0xd8,0x1f,0x35 .byte 0x5b,0x05,0xc9,0x41,0x8e,0x44,0x32,0x00,0xef,0x01,0x42,0x8f,0x16,0xf8,0xc0,0x8c,0x53,0xba,0x95,0xab,0x85,0xa7,0xe0,0x5b,0x28,0x2d,0xee,0xae,0xac,0x68,0xb6,0x2e,0x51,0x60,0x31,0xb3,0x2b,0xec,0x2f,0xe3,0x9b,0x20,0xb7,0x2d,0x21,0x40,0xab,0x64,0xe4,0x0f,0x2e,0x52,0xb3,0x7b,0x0a,0x3a,0x82,0x50,0xa6,0x53,0x37,0x5f,0x4c,0xca .byte 0x1f,0x68,0x26,0x51,0x2c,0x35,0x4e,0xc9,0x32,0x83,0x7d,0x6c,0xdd,0xd4,0x75,0x58,0xd9,0x6e,0x2a,0x54,0x98,0x94,0xe8,0x5a,0xff,0xcc,0xa5,0x01,0xce,0xc9,0x7c,0xc6,0xd2,0x84,0x74,0x87,0xa9,0x3e,0xb3,0xfb,0x8f,0x7a,0xc3,0x9b,0x48,0xd9,0x91,0x18,0xae,0xa4,0xbe,0xef,0x5c,0xce,0x84,0x14,0xa0,0x8e,0x97,0xd4,0xd8,0xe1,0x3f,0xe0 .byte 0x06,0x3d,0x2d,0x7f,0x76,0x58,0xb0,0x18,0xbd,0x25,0x8c,0x75,0x66,0x9e,0x50,0x3a,0x1a,0x94,0xf8,0x9a,0x9d,0xa1,0x19,0x0b,0x95,0xe0,0xdd,0xbf,0x37,0xa8,0x93,0xf6,0xd0,0x63,0xee,0xc5,0x66,0xec,0xe2,0x2d,0xd4,0x82,0x62,0x22,0xd2,0x05,0x28,0xff,0x62,0x4a,0x93,0x24,0x54,0xa3,0xf9,0xba,0xe2,0x5e,0xad,0x0a,0x54,0x82,0x20,0x95 .byte 0xc6,0xa1,0xd9,0xff,0xaf,0x83,0x14,0x4a,0x00,0xb6,0x05,0x1f,0xca,0x4e,0xb9,0x76,0x87,0x19,0xef,0x7b,0x8f,0x09,0xac,0x28,0x64,0x6e,0xd6,0xa0,0xf3,0xa0,0x58,0xc2,0x51,0xf1,0x9c,0x82,0xb7,0x36,0xfc,0xfb,0x77,0x77,0xad,0x9e,0x9f,0xdf,0xf0,0x12,0xfe,0xa2,0xd6,0x92,0xae,0xbe,0xe6,0xcd,0xc8,0xe7,0x6e,0x14,0xa3,0xcf,0xb3,0x02 .byte 0xaa,0xe2,0x39,0x0e,0x34,0xb7,0x62,0xd5,0x6a,0xcf,0xcb,0x7b,0x2b,0x9e,0xce,0x53,0x86,0xfc,0xe4,0xb6,0xa2,0xd6,0x20,0xe4,0x49,0xa5,0xa5,0x56,0x56,0xff,0x3c,0xc2,0x7c,0xb9,0xee,0x7f,0x92,0x45,0xcd,0x77,0xf0,0xd1,0x8f,0x73,0x2f,0x5d,0x14,0x5e,0x89,0xef,0xae,0xaa,0x7c,0xae,0x1e,0x9a,0xa6,0xea,0x18,0x85,0xcf,0x3a,0x98,0x0f .byte 0xca,0x59,0xa5,0x35,0x99,0x23,0x2c,0x92,0x4f,0xea,0xf8,0x6e,0xa9,0x1e,0xea,0x12,0x81,0xcb,0x30,0xff,0xfb,0x26,0xfe,0x09,0x11,0x5c,0x3f,0xef,0x7e,0x3c,0x5a,0xf6,0x08,0x49,0xcf,0x4e,0xdb,0xb6,0xf2,0x8f,0xcf,0x10,0x6d,0x84,0x55,0xb3,0xba,0x48,0x7e,0x73,0x2c,0x33,0x4f,0xc5,0xd4,0xe8,0xd8,0x57,0xb3,0x94,0x71,0x30,0x24,0x1c .byte 0x41,0xda,0xef,0x66,0x0e,0x54,0xec,0xa3,0x4a,0xf4,0x97,0x86,0x7b,0xc8,0x9b,0x75,0x5a,0x47,0x65,0xe7,0x15,0x59,0x3d,0xa1,0xb9,0xe9,0xea,0x76,0x24,0x23,0x8c,0x05,0xc0,0x06,0x6f,0x0b,0xc5,0x6b,0x25,0x24,0x40,0xee,0xa1,0xe1,0x92,0xbe,0x17,0x2c,0x5f,0x68,0xec,0xc1,0xf6,0x4c,0x76,0x7c,0x4a,0xb3,0x7c,0x5b,0xad,0x72,0x66,0x1d .byte 0x16,0x98,0x92,0x20,0x12,0xa2,0xaa,0xea,0x77,0x78,0xb9,0x3b,0xbe,0x39,0xec,0x61,0x0d,0x8a,0x01,0x98,0x91,0xdc,0xd8,0x4e,0x61,0x73,0x0b,0xe9,0x6a,0x24,0x35,0x11,0x32,0xa1,0x27,0x3f,0x96,0x63,0x2e,0xde,0xab,0x03,0xac,0x1c,0x4b,0xd8,0xe6,0xb4,0x4b,0x3b,0x47,0x32,0x8b,0xf4,0x40,0x92,0x89,0x4e,0xe1,0x63,0x86,0xa6,0x3b,0xb8 .byte 0x94,0x47,0x3c,0x34,0xc0,0x18,0x9a,0x53,0xaa,0x3a,0x64,0x96,0x1f,0x98,0x93,0x13,0x1e,0x44,0x9e,0xcb,0x92,0xc3,0x25,0x17,0xb7,0xe1,0x3e,0x91,0xbd,0x14,0x42,0x33,0xb0,0xf2,0x2f,0xcc,0x40,0x7d,0xac,0x45,0x3d,0xe1,0xe1,0xfa,0x03,0x05,0x0b,0xe7,0x9a,0x26,0x4f,0xab,0xb4,0xe8,0x42,0x9f,0x38,0x81,0xef,0x59,0xfa,0xd1,0x3b,0x27 .byte 0x87,0x23,0x17,0xd0,0xcd,0x25,0xda,0xc9,0x5e,0x21,0x26,0x2f,0x0c,0x33,0x46,0xd1,0xb2,0xf1,0x89,0xad,0xbe,0xe8,0x71,0x37,0xc7,0x27,0x5c,0xaa,0xdd,0x1f,0xd7,0x34,0x31,0x46,0x00,0xd7,0xb5,0x29,0xc2,0x35,0x58,0x07,0x74,0xb0,0x44,0xde,0x08,0x8e,0x51,0x52,0x97,0x8d,0x01,0xe7,0x13,0x18,0x6a,0xd3,0x82,0x2a,0x76,0x67,0x70,0x14 .byte 0x5d,0x1d,0x6b,0xd5,0x8b,0x3a,0x28,0xbd,0x3b,0x13,0xb0,0x43,0xde,0xf3,0x3c,0xc6,0x0f,0x32,0x77,0x7e,0xab,0x28,0xdd,0x8b,0x57,0xab,0xb7,0x65,0x56,0x5c,0x2e,0x05,0x8a,0x3f,0x4b,0xdb,0x22,0xcd,0xfb,0x99,0x06,0x38,0x6e,0x4f,0x7e,0x23,0x54,0xca,0x47,0x2f,0x33,0x18,0x79,0xdf,0x69,0xe9,0x63,0xfb,0x6e,0x9f,0x1a,0xa0,0xc2,0x15 .byte 0xc3,0x5f,0xe8,0xc1,0x35,0x5a,0x60,0xb7,0xd4,0xd4,0x5c,0xc0,0x4f,0x28,0x6d,0xea,0xe9,0xe0,0xa7,0x4a,0xfb,0x66,0x75,0x04,0xae,0xd7,0x30,0x42,0x9b,0x9b,0x0e,0xe8,0x67,0x40,0x8f,0x8e,0x0c,0x39,0xd6,0xa1,0x13,0x69,0x58,0xf3,0x09,0xdf,0x43,0x6a,0x41,0x6c,0x03,0x0d,0xc2,0x38,0x55,0x87,0x7f,0x88,0xed,0x01,0xa6,0x5f,0x1a,0x20 .byte 0xa7,0x7b,0x3a,0x59,0x1f,0x26,0xcc,0x62,0x42,0x48,0xa3,0x60,0x49,0xb0,0x62,0x8f,0xe0,0x66,0x2a,0xa1,0x21,0x6e,0x6b,0x93,0xdd,0x7b,0x89,0x65,0xf0,0xc4,0xf6,0xba,0xf5,0x8d,0x3b,0xd9,0x09,0xc0,0xe0,0xf6,0xf3,0x58,0x9d,0x47,0x0a,0x69,0x09,0x61,0x02,0x8d,0xda,0xf2,0x63,0x82,0x5b,0x50,0x36,0x6e,0x29,0xc2,0x8d,0x5d,0x7a,0x4f .byte 0xd3,0x8d,0xd3,0xfc,0x30,0x94,0xe1,0x7b,0xf7,0x0a,0xe5,0x7b,0x89,0x69,0x17,0x6b,0x07,0x90,0x28,0xa1,0xb1,0x01,0xbc,0xf9,0x3f,0x50,0xf5,0x4c,0xa2,0x9a,0x46,0x0c,0x7c,0xf0,0x68,0xdc,0x75,0x13,0x4c,0x22,0x02,0xe8,0x6f,0xcc,0x0a,0xcf,0x66,0xb7,0x86,0xb8,0x5b,0xe2,0x11,0x26,0x26,0x7b,0x07,0xc0,0xa2,0xf8,0xc6,0x5f,0x10,0x82 .byte 0xe6,0x6c,0x2a,0xb5,0x3f,0xf8,0x1e,0xe0,0x26,0x7f,0x88,0x5d,0x75,0xc1,0x0f,0x4c,0x8f,0x9d,0x87,0xab,0xe6,0x2b,0x07,0xc7,0xa2,0x28,0xef,0x05,0x02,0x55,0xee,0x79,0x7b,0x37,0x29,0x3f,0x90,0xb8,0x09,0x7c,0x62,0xae,0xad,0x0b,0xe1,0xd6,0x5c,0x6a,0x28,0xa9,0x2c,0x78,0x4b,0x37,0x6c,0xfe,0x4f,0x2a,0x59,0xdf,0xd5,0x91,0x37,0x99 .byte 0x0e,0x20,0xf2,0x74,0xe6,0xd6,0x17,0xd9,0x21,0x8f,0xdb,0xd6,0xff,0x5d,0x6b,0x2b,0xa1,0x21,0xd2,0xc9,0xb2,0x37,0x1c,0x69,0xbb,0x9e,0x4f,0x28,0xae,0x4a,0x41,0x7d,0x87,0xcb,0x6a,0xfa,0xbf,0x9f,0x23,0xd2,0x68,0x8f,0xb2,0xa4,0x15,0x60,0xf9,0x6e,0x20,0xb6,0xd7,0x5e,0xa1,0x21,0x05,0x81,0x4c,0x34,0x58,0x7b,0x55,0xae,0x85,0x7f .byte 0xe5,0x3a,0xe3,0xe0,0xf8,0x43,0x73,0xdd,0x85,0xdb,0x2e,0x2f,0x20,0x65,0xea,0x76,0xa1,0x6a,0xde,0xcf,0x76,0x22,0x8d,0x1c,0x22,0x7b,0x93,0x42,0xf3,0x2b,0x93,0x85,0x20,0xc7,0x20,0x53,0xd4,0xd9,0x51,0xba,0x2e,0xc7,0x84,0x09,0x65,0xa0,0x1c,0x58,0xf0,0xa8,0x46,0xef,0xf3,0x4b,0xc7,0x27,0xcb,0x93,0x4e,0x74,0xdc,0x0c,0xb5,0x06 .byte 0xba,0x25,0xf0,0x15,0x47,0x3d,0xf5,0x86,0x9b,0xec,0xc7,0x44,0xec,0x0f,0x7b,0x3c,0xfc,0xec,0x3c,0x71,0x00,0x75,0x42,0xae,0x25,0x5b,0x1c,0xfe,0x1c,0xdf,0x74,0x95,0xb6,0xc0,0xfc,0xd7,0x67,0xa5,0xf5,0x71,0x62,0xcc,0x04,0xab,0x46,0x39,0xfe,0x03,0x72,0x7c,0x01,0x85,0x8b,0x9d,0x9d,0xda,0xd5,0xa4,0xaf,0xbc,0x54,0x96,0x57,0x02 .byte 0x56,0xc2,0x9f,0xe2,0x9d,0x30,0x51,0xc0,0xa5,0x4b,0x86,0xb5,0xb6,0xe9,0xed,0x81,0xa7,0xb2,0x3f,0x2e,0x33,0x0a,0xa0,0x78,0x93,0x94,0x49,0x5e,0x2f,0x54,0x06,0x2c,0x98,0x0e,0xf4,0xcc,0xc2,0xbd,0x5f,0xd6,0x7c,0x81,0xb8,0xb1,0x85,0x93,0xf2,0xb4,0xb3,0x0d,0xa7,0xb8,0x9b,0xb7,0x04,0x2d,0x76,0x35,0xeb,0x4f,0x15,0x68,0xc8,0x43 .byte 0x03,0x4c,0xa7,0x67,0x0a,0xc6,0xc2,0x5b,0xdf,0xc0,0x86,0xde,0xe5,0x72,0x37,0x0e,0xbb,0xe8,0xd0,0x52,0xe1,0xb6,0x87,0xb1,0x1b,0x63,0x94,0x03,0x8a,0x3e,0x40,0x3d,0x39,0x1a,0x41,0xc6,0xb7,0x05,0x81,0x24,0x43,0x4e,0x67,0x1f,0x19,0x00,0x7b,0xd7,0x26,0x55,0x27,0xf4,0x89,0x2b,0x91,0xf4,0x0e,0x5c,0x65,0xcb,0xca,0x96,0x6b,0x92 .byte 0x58,0xba,0xa5,0xf6,0x99,0x99,0x1a,0xf2,0x66,0x6d,0xf1,0xa3,0xbe,0x1d,0x27,0x9c,0x80,0xb8,0x8f,0x01,0xfb,0x67,0x97,0x9a,0xf2,0x55,0xe2,0x04,0xac,0x1a,0x45,0xa0,0xae,0x43,0x7a,0x87,0xaa,0x6e,0xa1,0x36,0xa0,0x27,0xad,0xc8,0x86,0xa2,0xa5,0x39,0xac,0x44,0xae,0xd0,0xe0,0x15,0x04,0x5c,0xb7,0x84,0xe3,0xb3,0x1d,0x7f,0xd8,0xb6 .byte 0x65,0x45,0x1e,0xe9,0x9e,0x77,0xfe,0x6f,0x07,0x80,0x0b,0xe7,0x1a,0xc1,0xd6,0x3f,0x2b,0x32,0xda,0x75,0x50,0xd6,0xbc,0x98,0x42,0xa5,0x2f,0x83,0xb5,0xbe,0x10,0x25,0x01,0xfc,0x0d,0xbb,0x42,0xe1,0x37,0xcc,0x0d,0x53,0x83,0x0c,0x0a,0x7d,0xbf,0x0b,0x1e,0xb9,0x16,0x8e,0x36,0x7e,0x85,0x37,0x3f,0x4a,0x38,0x5b,0x44,0xb5,0x58,0x28 .byte 0x2e,0x46,0xe4,0x12,0x68,0x81,0x52,0x0f,0x4a,0x35,0x4c,0xeb,0x8a,0x7e,0xe7,0x7e,0xfd,0xb6,0x0e,0x8e,0x18,0xa0,0xc6,0x5a,0x53,0x19,0xb8,0xb1,0x39,0x44,0x3f,0xe7,0x03,0xb8,0x20,0x60,0xde,0xc7,0x80,0x01,0xb1,0x86,0x88,0x76,0x3d,0xd1,0x25,0xd1,0x98,0xd1,0xb5,0x96,0x92,0x41,0xe0,0x17,0x94,0xcd,0xf3,0xce,0x8b,0x34,0x92,0x68 .byte 0x04,0x79,0xe8,0xf7,0x07,0xcf,0x53,0x9f,0x05,0x20,0x5d,0xdd,0xbf,0xb0,0xf0,0xa6,0x00,0x1d,0xe2,0x92,0x28,0x07,0xb4,0xbf,0x34,0x7c,0x0b,0xa4,0x13,0xc4,0x57,0xc8,0xd5,0x94,0xc2,0x46,0x2c,0x8e,0x73,0xab,0x05,0xa3,0x48,0xb4,0xcb,0x66,0x52,0x97,0xd0,0x14,0x5d,0xe3,0xfd,0xea,0xe8,0xdb,0x9f,0x02,0x16,0xb3,0x59,0x41,0xb4,0x20 .byte 0xfd,0x08,0x10,0xe6,0x3a,0x96,0xf4,0x77,0x45,0xf5,0x3e,0xa2,0x6c,0xb1,0x6d,0xb9,0xb5,0x78,0x31,0x83,0x15,0xe2,0x9d,0x6b,0xa3,0x27,0xbb,0xc7,0x0d,0x91,0x04,0xed,0x96,0x2f,0xcc,0x4f,0x93,0x96,0x9c,0x8e,0xc8,0x84,0xdb,0xe3,0x26,0x23,0xfa,0x0d,0xc8,0x09,0x21,0x0f,0x0a,0x2d,0x0a,0x04,0x8b,0xcd,0xae,0xdd,0x9c,0xac,0xd1,0x57 .byte 0x22,0x9e,0x0c,0x00,0xd4,0x56,0x97,0xee,0xfd,0x87,0xd5,0x69,0xdb,0x1e,0x22,0xf4,0x67,0x2f,0x7d,0x4f,0x00,0x4e,0x6b,0x1d,0x4a,0x98,0x62,0xde,0xff,0x18,0xc3,0xf5,0xb3,0x14,0x8a,0xb6,0xd6,0x4b,0x11,0xc2,0x7b,0x5b,0x3d,0xbf,0x48,0x39,0x98,0xeb,0xeb,0x17,0xf9,0x57,0xda,0xcf,0xe2,0x59,0x8b,0xbb,0x67,0x73,0x27,0xda,0xcc,0x23 .byte 0x33,0x38,0x0d,0x02,0x43,0x9e,0xa9,0x5e,0x6b,0x85,0x82,0xff,0xe1,0xab,0x5b,0xe1,0xcd,0xa1,0xb0,0x2e,0x89,0x34,0xeb,0x4f,0x6d,0xfc,0xaf,0x39,0x9d,0xa4,0x54,0xd8,0x0f,0x32,0x33,0xe6,0xb0,0x10,0xef,0x69,0x6a,0x83,0x9c,0x73,0x7d,0x69,0x7d,0x5f,0x85,0xc4,0x0e,0x14,0xc6,0xe7,0xba,0x0a,0xb6,0xf1,0xad,0x91,0x3b,0x8e,0xda,0x11 .byte 0x64,0x58,0xdd,0x86,0x4f,0x61,0x3f,0x65,0x12,0x5d,0xa6,0x7d,0x87,0xfa,0xb7,0x3f,0x95,0xfd,0x50,0x3a,0x97,0x0a,0xfd,0x56,0x55,0xaa,0x89,0x96,0x83,0xed,0x9d,0xcd,0xc0,0xc3,0x3a,0x21,0x5a,0x0d,0x6b,0xa1,0x07,0x6f,0x36,0xa2,0xd6,0x0a,0x5c,0x1e,0xa7,0x1f,0x21,0x73,0xcb,0x76,0xc9,0xcf,0xa8,0x54,0x5e,0x8a,0x77,0xa4,0xbc,0xe1 .byte 0x8d,0xff,0x25,0xbd,0x2f,0x71,0x6e,0xff,0x36,0x99,0x62,0x07,0xfb,0x4a,0xc7,0x7c,0x27,0xd4,0xbb,0x27,0xec,0x1b,0x52,0x58,0xfe,0xa1,0x7a,0xe6,0xc7,0x04,0xff,0x76,0xc5,0xe3,0x7a,0x20,0xed,0x7c,0xbb,0x77,0x0f,0xf2,0xc7,0x93,0x11,0x85,0xe2,0x77,0xca,0xfc,0x81,0x8e,0xec,0x1c,0xf5,0x96,0xba,0xde,0x87,0x68,0xb9,0xd6,0xde,0xd7 .byte 0x69,0xd8,0xd7,0x0c,0x9e,0x04,0x23,0xcc,0x5e,0x4a,0x9b,0x53,0x78,0x3b,0x58,0x71,0x7f,0x0f,0x75,0xe7,0x81,0x75,0xce,0x90,0x80,0xf0,0x37,0xb0,0x69,0xd7,0x54,0xc4,0x57,0x14,0xf4,0x08,0xf9,0x79,0xb1,0x28,0xaa,0x0f,0xa2,0x09,0xe2,0xc9,0x04,0xd3,0xa7,0x85,0x52,0x56,0x91,0x1f,0x29,0xd8,0x10,0x89,0x13,0x7f,0x23,0x56,0x14,0x97 .byte 0x59,0x17,0xd2,0x52,0x68,0x0a,0xff,0xd1,0x0d,0xd3,0x3d,0xa2,0x22,0x7f,0x17,0x82,0x38,0x0d,0x7e,0xed,0x35,0x05,0x7e,0xfa,0x9c,0x43,0xac,0x87,0xb5,0xaa,0xe1,0xc5,0x42,0x85,0x3a,0xe9,0x18,0x34,0x73,0xfa,0x9a,0xc3,0x8a,0xca,0xd8,0xca,0xc0,0x87,0xd4,0x0c,0x70,0xc0,0xb0,0x64,0x13,0xf7,0x35,0xfa,0xd3,0x90,0x99,0x36,0xdf,0x90 .byte 0x9f,0xd5,0x01,0xfd,0x1f,0x51,0xf8,0x09,0x9d,0xec,0xea,0x79,0x70,0xae,0xc5,0x39,0x20,0xff,0x6a,0xea,0x09,0xcf,0x50,0x49,0xfd,0x6b,0xd8,0x68,0xf2,0x13,0xb1,0x58,0x73,0xbb,0xcf,0x9a,0xba,0x28,0xda,0x63,0xbf,0x02,0x75,0x8f,0x88,0x9f,0xc5,0x16,0xa9,0x58,0x34,0x46,0x42,0x59,0x13,0x22,0xb0,0xe8,0x0c,0xea,0xd3,0xbd,0x57,0xaa .byte 0x67,0x88,0xf9,0x88,0x04,0x7b,0x5f,0xf1,0x8f,0x71,0x31,0x22,0x8f,0x8a,0x3b,0x0e,0xf7,0x65,0xe4,0xd3,0xf5,0xec,0x32,0x4e,0x61,0x91,0x9f,0xa5,0x3d,0x88,0x02,0x1d,0xa6,0x7a,0x75,0x3f,0xd9,0x10,0xba,0x76,0x43,0xd4,0x31,0x3c,0x39,0x6d,0x60,0x7a,0xe9,0x19,0xe5,0x21,0x97,0xcc,0xb4,0xe6,0x1f,0x4c,0xb4,0x39,0xfc,0x36,0x29,0xec .byte 0x19,0x72,0x28,0x25,0x09,0x30,0x9d,0x7d,0x8a,0x3a,0xd4,0x31,0x65,0x53,0x61,0x05,0x07,0xd2,0x9d,0xbb,0x77,0xde,0x54,0xde,0xbb,0x5b,0xe4,0xae,0xa4,0xc7,0x75,0xfe,0x72,0x2a,0x89,0xfb,0x60,0x15,0x06,0x83,0x4e,0x38,0xfd,0x21,0x28,0x6a,0xaf,0xa2,0x58,0xd5,0x38,0x05,0xd2,0xcf,0xcd,0x48,0x7a,0xed,0x0b,0x54,0x9e,0x74,0x85,0x14 .byte 0xa6,0x84,0x2d,0xa2,0x92,0x5e,0x74,0xef,0x4f,0x6d,0x2a,0xcf,0xed,0x17,0x91,0xd8,0x97,0x25,0x37,0xe3,0xff,0x8b,0xc9,0x1f,0x25,0xa5,0x85,0x52,0xe9,0xb5,0x3a,0xa9,0xe6,0x0d,0x12,0x6b,0x46,0x51,0xf5,0xb0,0x8f,0x3d,0x9a,0x0b,0x9d,0x7c,0x9a,0x65,0xdf,0xc6,0x9c,0x17,0xd1,0x0b,0xdc,0xe3,0xd0,0x75,0xef,0xa7,0xbf,0x1d,0xae,0xe4 .byte 0x50,0x9f,0x03,0x3e,0x90,0x3a,0xa5,0x5b,0x38,0x9f,0x0b,0x02,0x35,0x5f,0x1f,0x26,0xd3,0x2a,0x6f,0x1c,0x75,0x11,0xb2,0xd3,0x65,0x3a,0x96,0x3d,0xfe,0x5e,0x8d,0xef,0x04,0xe8,0xe7,0xb3,0x6e,0x7c,0xee,0x2e,0x8f,0x0d,0x9f,0xf7,0x0b,0xed,0x01,0x82,0xdb,0x54,0x0c,0x01,0x5a,0xea,0xd9,0xeb,0x9e,0x25,0x54,0x95,0x36,0xfc,0xc4,0x09 .byte 0x15,0xee,0x88,0xb4,0x16,0xf6,0xc9,0x79,0xd7,0x79,0xf4,0x94,0x7a,0x5e,0x28,0x19,0xe7,0x2d,0x94,0xd1,0xed,0x48,0x12,0x15,0xba,0xbd,0x90,0xad,0x64,0xec,0x6a,0x52,0xa0,0x33,0xfb,0x13,0xa6,0xe7,0x30,0x04,0xfb,0x7b,0x69,0x07,0x6e,0xfc,0x1c,0xe4,0x0d,0x8b,0x8f,0x38,0x6f,0x59,0xe8,0x5a,0x0a,0x67,0x28,0xd3,0x3c,0xe4,0xd7,0xf2 .byte 0xae,0x0d,0x90,0xac,0x2a,0x9f,0xb6,0x5f,0xfb,0x30,0x5e,0x6d,0xad,0x19,0x86,0x58,0xa4,0x4c,0x2a,0x10,0xdd,0x9a,0x65,0x6e,0x07,0x4f,0x14,0xf6,0xe8,0x7b,0x43,0xb9,0x18,0x2c,0xa4,0xa7,0x2a,0xa2,0xc4,0xf9,0x4e,0x43,0x4e,0xfe,0xf6,0x57,0xbf,0x50,0xc5,0x36,0x7a,0x63,0xac,0x30,0xb3,0x7c,0x78,0x63,0xd2,0xd0,0x1d,0xe3,0x68,0xa2 .byte 0x79,0xa2,0xf3,0x29,0x54,0x04,0x31,0x47,0xf8,0x8c,0x60,0xa5,0x47,0x70,0xa8,0x86,0x89,0xfb,0x7e,0x7e,0xb1,0xc0,0xa5,0xec,0x39,0x3b,0xb5,0xb8,0xb9,0x92,0xd0,0x06,0xfb,0xed,0x39,0x56,0xa6,0x11,0xf6,0x5e,0xe9,0x04,0xb7,0xe4,0x9a,0xf0,0x61,0x3e,0x53,0xda,0xf1,0x61,0x1d,0x1e,0xc8,0xe5,0x46,0x1d,0x73,0xd3,0x33,0xc1,0xab,0xf9 .byte 0x93,0x4f,0x31,0x02,0x4d,0xab,0xd8,0x45,0xa1,0x4d,0x9b,0x37,0xc4,0xd9,0x40,0x58,0x5b,0x56,0x0b,0x46,0x69,0x0e,0xfc,0x27,0xa0,0x44,0xd7,0xf4,0xb0,0xcd,0x2a,0xd1,0xf9,0xf3,0x65,0x8a,0x3b,0xcc,0xdc,0x92,0x25,0xb6,0x8a,0x13,0xb3,0xbc,0x35,0xc8,0xd9,0xc1,0xbf,0x31,0xbb,0x27,0x96,0xa0,0xc2,0x34,0x1c,0x6c,0x33,0xda,0x24,0xac .byte 0x1e,0x0a,0x9e,0x2e,0x07,0xc7,0xc2,0xcc,0xcc,0xf6,0xd0,0x0a,0xf2,0x40,0xe0,0x20,0xce,0xf1,0xcf,0xf0,0x05,0x46,0x06,0xfc,0x33,0x8f,0x19,0x13,0x4e,0x34,0x21,0xa9,0x51,0x6c,0xcf,0x7f,0x6a,0x80,0x4a,0x32,0x6d,0x3d,0xb1,0x63,0xa8,0x2c,0x74,0x13,0x8f,0xf7,0xa1,0xfe,0x6e,0xbd,0xb4,0x80,0xc2,0x2b,0xc7,0x1c,0x99,0x26,0xd0,0x56 .byte 0x98,0x77,0x83,0xc8,0xa7,0x3e,0xe2,0x02,0xfc,0xa8,0x45,0x0d,0xcc,0xe6,0x8c,0x6f,0x07,0x03,0x93,0xdc,0x51,0xce,0xbd,0xe7,0x89,0xc8,0x7f,0x8a,0x06,0x8a,0x81,0x13,0x88,0x12,0x7f,0xd4,0xa9,0x63,0x10,0x0b,0xc2,0x82,0xbe,0x51,0x5c,0x66,0x14,0xb3,0x0f,0x3c,0x6d,0x8a,0xf7,0xec,0xe6,0x3c,0x9f,0x20,0xc8,0x02,0xe3,0xbb,0x59,0x53 .byte 0xc9,0x97,0x29,0xf0,0xa0,0xb1,0x50,0xf7,0x63,0x95,0x96,0x35,0xd0,0x81,0xb3,0xf0,0x44,0x5a,0xf5,0x55,0x10,0x3d,0xe8,0x76,0x21,0x62,0x49,0x1a,0xbb,0x8c,0x1a,0xff,0x75,0x39,0x3c,0x26,0x9e,0xee,0xef,0xaa,0x3d,0xa1,0x21,0xb0,0x47,0xb5,0x15,0x54,0x59,0x11,0x47,0x0c,0x1c,0x53,0x4e,0x0e,0x54,0x38,0xa5,0xed,0x8d,0x1f,0x4e,0x91 .byte 0xfc,0xd7,0x78,0xff,0x9c,0xfe,0xe3,0x86,0xd5,0x8d,0xc6,0xf2,0x03,0x01,0xbb,0xf7,0x89,0x25,0x19,0xb9,0xab,0xd8,0xd0,0x72,0xff,0x69,0x04,0x97,0x77,0xe4,0x43,0x0e,0xe8,0xb6,0xc3,0x57,0xab,0x96,0xe3,0x53,0xfa,0x5c,0x5e,0xfd,0xbd,0xf0,0xba,0xc9,0xfd,0xd5,0x12,0x4f,0xa9,0x72,0xfb,0xf4,0x6d,0xd2,0x74,0xef,0x29,0xd8,0x73,0x27 .byte 0x62,0xd8,0xe1,0x4c,0xd5,0xb0,0x1d,0xfa,0xf5,0x67,0x02,0xed,0x38,0xbe,0xa7,0x0c,0x3f,0xe1,0xad,0xc3,0x8f,0x4e,0x81,0x73,0xe1,0x65,0x7b,0xcc,0x41,0x16,0x2d,0x5b,0xeb,0xaf,0x14,0x96,0x7b,0x53,0x7b,0xcf,0xb7,0x98,0x28,0x92,0x88,0xc5,0x17,0xfe,0xcc,0xce,0x4e,0xe2,0x53,0xfd,0x38,0xd3,0x15,0xfb,0x31,0xd6,0x8e,0x69,0xd4,0xda .byte 0xae,0x72,0x71,0xe1,0x93,0xf9,0x2e,0x28,0x80,0x2a,0xc2,0x8a,0xaa,0x5c,0xba,0x64,0xad,0x2e,0x64,0x2a,0xb1,0x3d,0x71,0x03,0x10,0x2e,0x9a,0x93,0xca,0x85,0xaa,0x77,0xd8,0x80,0x1c,0xe0,0xf9,0x5a,0xfe,0xa3,0xc9,0x8a,0x2d,0xb9,0x45,0xc8,0x9f,0xa9,0x61,0x85,0x81,0xe7,0x1d,0x7d,0xf8,0x11,0x14,0x57,0x51,0xc4,0x84,0xf8,0xb5,0xc9 .byte 0xb9,0xa0,0x3f,0xd1,0xa2,0xcd,0x87,0xaa,0x76,0x2a,0xba,0xab,0xd4,0xb0,0x9d,0xf3,0x83,0x4e,0xcb,0x44,0xf0,0x4b,0xd9,0xce,0xb0,0x2b,0xca,0x92,0xf8,0x3c,0x4a,0x5c,0x8b,0x20,0xc3,0xfc,0x4b,0xca,0xe4,0x2f,0x35,0xfc,0xfc,0xcd,0xf9,0xc5,0x6f,0x75,0x63,0x07,0xf4,0xe1,0xe6,0x4c,0x5f,0x10,0x05,0xe3,0xb5,0xec,0x4c,0x4f,0xd8,0xda .byte 0x64,0xeb,0x7b,0x9c,0xae,0xe4,0x7c,0x3f,0x31,0x1b,0x71,0x8b,0x48,0x52,0x88,0x99,0x8f,0x5f,0x31,0xf3,0x7c,0x6e,0x15,0x4c,0x38,0x96,0xab,0xfb,0x4f,0xeb,0xee,0x3c,0xff,0x8d,0xce,0xab,0xb2,0x96,0x00,0x3b,0x8a,0xb3,0x10,0x3b,0xa5,0xc3,0x5e,0x8f,0x9d,0x2b,0x78,0x18,0x80,0x62,0x8c,0xa6,0x3c,0xeb,0x4c,0x92,0x2d,0x67,0x7e,0xdb .byte 0xc6,0x26,0x58,0x73,0x65,0x0c,0x03,0x07,0x28,0x0d,0xe7,0x9a,0x03,0x3d,0x81,0xc2,0x32,0x76,0x1d,0x27,0xef,0x6e,0xea,0x02,0x7b,0xca,0x3f,0x07,0x63,0x69,0xed,0x30,0x44,0xde,0x2b,0x7f,0x32,0x42,0x28,0x7a,0xc5,0x24,0xf9,0xb6,0x0b,0x24,0xca,0x61,0x17,0x8f,0x80,0xda,0xe7,0x86,0xf0,0xc5,0xca,0xd9,0x6a,0x9a,0x56,0xd4,0x80,0xe3 .byte 0x34,0x9e,0xae,0x9e,0x80,0xf9,0xe4,0x1f,0xa9,0x0d,0x66,0x0d,0x7c,0x31,0xad,0xeb,0x61,0xf1,0xef,0xe5,0xcf,0xfc,0x46,0xbf,0x11,0xb0,0xd1,0x4d,0x9f,0x66,0x11,0xb9,0xba,0x3a,0x32,0x9a,0x0e,0x87,0x56,0x9d,0x03,0x03,0x42,0x19,0xb8,0x4f,0x6e,0x1f,0xc9,0x70,0x69,0x78,0x1e,0x61,0xcc,0x05,0x81,0xea,0xad,0x33,0x7f,0x33,0xcc,0xfe .byte 0x29,0x42,0x02,0xc6,0xc6,0x8f,0x0c,0x02,0x80,0x11,0x1b,0x7b,0x9a,0x43,0xdc,0x66,0x22,0x6a,0x76,0xd5,0x9c,0xd2,0xbb,0xd6,0x52,0x0d,0x7a,0x93,0x24,0x54,0x6f,0x57,0x99,0x55,0xbe,0x1a,0xb6,0xa3,0x06,0xc4,0xff,0xbe,0x8c,0x2b,0x77,0xba,0x4f,0x0d,0xe6,0x34,0xc1,0xea,0x1f,0xca,0xe8,0xb7,0x77,0x84,0x69,0x77,0xa2,0x6c,0x95,0x1e .byte 0x6d,0xbf,0x45,0x59,0x8a,0x9d,0x1e,0x0f,0xf2,0xf2,0x6a,0x03,0x81,0x26,0xbd,0x2a,0x6c,0xe9,0x1e,0xd3,0xa8,0x99,0xc6,0x89,0xaa,0xce,0x1a,0x4c,0xfd,0x4b,0x88,0xe0,0x5d,0xe3,0xc7,0x0b,0xe3,0xce,0x0a,0x71,0x96,0x03,0x31,0x0c,0xc0,0xdc,0xb0,0x31,0x44,0x5a,0x33,0xde,0xd3,0x4f,0x41,0x8d,0x60,0xa9,0x7f,0x6a,0xa1,0xb2,0xc4,0x00 .byte 0x31,0x1d,0xb4,0x62,0x45,0x17,0xd9,0x05,0x55,0x7d,0x3a,0x76,0x38,0x62,0x65,0x16,0x94,0xf2,0x4f,0x7d,0x31,0x6d,0x17,0x79,0x54,0xd4,0x0a,0x5d,0x12,0x12,0xab,0xba,0xc6,0x60,0x9b,0xb2,0x42,0x55,0x2c,0x5b,0x93,0xc9,0x8a,0x11,0x66,0xd8,0x34,0x47,0x6b,0x33,0x13,0xff,0x12,0x25,0xeb,0x21,0x31,0x1a,0x70,0xb0,0x77,0xec,0xc8,0xb7 .byte 0xd6,0xc9,0x91,0x4b,0xfe,0x71,0x40,0x09,0x50,0x9d,0xf0,0xf2,0xb3,0xbd,0x4b,0x02,0x5b,0x6a,0x9e,0x30,0xed,0x31,0xd3,0x6d,0xb6,0xa8,0xed,0x9e,0x28,0xc8,0xb3,0x42,0xe4,0xbe,0x79,0x01,0x96,0x86,0x9a,0xeb,0xfb,0x7e,0x51,0x4b,0x79,0x8d,0xf9,0x8f,0x62,0xf6,0x66,0x75,0xa4,0x2e,0x9a,0x93,0x3f,0x4d,0x29,0xf9,0x8e,0xd3,0x40,0x34 .byte 0xd3,0x60,0xf6,0x68,0x61,0xe9,0x62,0xe6,0xca,0x8c,0x15,0xc3,0xac,0xde,0x40,0x61,0x02,0xcd,0x1a,0x96,0x3c,0xa6,0x4d,0x08,0x66,0x9d,0x35,0x15,0x5a,0x7a,0x38,0x24,0x64,0xb6,0xb6,0xed,0x03,0x4c,0xdd,0x7b,0xe5,0x2f,0x84,0x48,0x6b,0x31,0xc2,0x2e,0xe9,0x70,0xe1,0xaa,0x10,0x55,0x5a,0x18,0x95,0x0b,0xcd,0xa9,0xdb,0x9e,0x87,0x07 .byte 0xae,0x73,0x0c,0x87,0xd0,0xd5,0xc5,0x92,0x48,0xc5,0xa1,0x13,0x80,0xf5,0xe0,0xdc,0xa0,0x61,0x7b,0xba,0x95,0x43,0x38,0x64,0xc0,0x13,0x1b,0x3f,0x14,0x1b,0xcd,0x24,0x1e,0xf7,0x7e,0x9e,0x5d,0x05,0xeb,0xb2,0xe0,0xb8,0x34,0x8c,0xe0,0x25,0xde,0xcc,0x72,0x06,0xc1,0x4c,0x41,0x2f,0xfc,0xb1,0xc2,0x60,0x01,0x09,0xcf,0x44,0x5f,0x7e .byte 0xeb,0x79,0x15,0x89,0x8c,0xaf,0xcb,0xc6,0xcf,0x3f,0xc4,0xae,0xcc,0x82,0x1f,0x08,0x3b,0x97,0x9c,0x74,0x09,0x4c,0x24,0x79,0xea,0x4f,0xd6,0x29,0x9a,0xec,0xb7,0xbd,0xb7,0x09,0x23,0x37,0xd5,0x7d,0x3e,0x7f,0xce,0x33,0xc3,0xe2,0x6c,0xff,0x1e,0xe0,0xcf,0x88,0xca,0x51,0x77,0x9c,0xc6,0xc3,0x13,0xa0,0x7e,0x4a,0x70,0xe8,0xb3,0xe2 .byte 0x65,0x82,0x61,0xb9,0x00,0x96,0xf5,0xa8,0x78,0xba,0x4d,0x5c,0xce,0x1f,0x67,0x1e,0xc1,0xbc,0x60,0xf4,0x40,0x04,0xb6,0xd9,0xe6,0x6c,0x6e,0xbc,0x68,0xf8,0x0e,0x0c,0x93,0x2b,0xf6,0x4a,0x9b,0xfa,0x04,0xe2,0x94,0x4a,0x40,0xe3,0xc2,0x69,0xcb,0xd0,0x64,0x3f,0x4b,0x8a,0xcf,0x6e,0x50,0xde,0x54,0x6e,0xf8,0xc6,0xab,0x03,0xb9,0x88 .byte 0x4e,0xaf,0xfc,0xcc,0x90,0xfa,0x74,0x8f,0xb5,0x8f,0x8f,0xc6,0x17,0xf3,0xc9,0x7a,0x06,0x68,0x2d,0x77,0x91,0xcf,0x52,0xcd,0xf2,0x8d,0xc8,0xac,0x6f,0x4d,0x4a,0xb7,0xfd,0x7e,0x46,0xb7,0x4d,0x4d,0x92,0x05,0xc3,0x68,0xcf,0xf2,0x27,0x2b,0x9a,0x57,0xeb,0xcc,0x4d,0x5d,0xef,0x86,0xe0,0xfe,0xd9,0x43,0x66,0x88,0xb8,0x42,0x1d,0xb2 .byte 0x5e,0x80,0xbe,0x96,0x00,0x9a,0x69,0x7f,0x27,0xcf,0x15,0x44,0x6e,0x5d,0x8b,0x76,0xf9,0xd0,0xb6,0xfd,0xeb,0x56,0x39,0x4c,0x94,0x1b,0x3e,0x09,0xf8,0x59,0x03,0xc9,0x7d,0x1c,0x66,0x4e,0x7c,0xd5,0x87,0xd1,0xeb,0xcf,0x53,0xaa,0xda,0x08,0x26,0x65,0x22,0x15,0x42,0x7c,0x13,0x4d,0xfa,0x50,0xd8,0x52,0xe9,0x71,0x57,0xd9,0x29,0xd2 .byte 0x02,0xb3,0xbd,0x1c,0x1b,0x06,0x77,0x68,0xb2,0xd5,0x3a,0x7c,0x9e,0x54,0x3a,0x75,0xc7,0xa8,0x9d,0x0e,0x5f,0x89,0x20,0x46,0x20,0xdd,0x21,0xb1,0xac,0x96,0xa6,0xd4,0xdf,0x9f,0xe9,0xd4,0x06,0x52,0xc3,0x34,0x43,0x61,0xdc,0x5f,0x85,0x75,0xa1,0xc5,0x10,0x67,0x6f,0xf2,0xba,0xcd,0x64,0x9e,0x69,0x44,0xdd,0x15,0xea,0x05,0x5a,0xbb .byte 0xb3,0xa3,0x8d,0xe6,0xbf,0x4d,0xb0,0x29,0x81,0x81,0x56,0x95,0xc8,0x81,0xcd,0xc1,0x63,0x7b,0x9c,0xa1,0xf8,0x89,0xea,0xf0,0x19,0x05,0x1e,0xe9,0xbe,0xf8,0x9e,0x58,0xae,0xaa,0xf4,0xca,0x45,0x68,0x81,0x18,0x38,0xd7,0x27,0x81,0x14,0xcb,0x68,0x81,0x61,0x37,0x38,0x67,0xc3,0x4e,0xb7,0x30,0x2c,0x9f,0x00,0x6b,0x55,0x87,0xdd,0xb5 .byte 0x54,0x00,0x65,0x85,0x33,0xf6,0xde,0xe6,0x0b,0xee,0x2c,0x64,0xc7,0x14,0xbc,0xf2,0x95,0x31,0x8c,0x63,0x51,0x9d,0x41,0x72,0x14,0x3f,0x60,0x50,0xb7,0x15,0xd4,0xf4,0x8e,0x50,0x9e,0xe9,0x6a,0x94,0x3a,0x0e,0x7e,0x36,0x74,0xcb,0xdb,0xe8,0xe3,0xba,0xd9,0xe2,0x5b,0xdb,0x87,0xf8,0x17,0xd9,0x5e,0x5c,0x4d,0xca,0xc8,0x13,0xae,0xfa .byte 0x24,0x72,0xef,0xda,0x10,0xf6,0xf9,0xe9,0xe0,0xde,0xfe,0xc6,0x9b,0x76,0xfe,0x52,0xc7,0xe0,0xe1,0xf7,0x31,0xa9,0x54,0x5a,0x8e,0xb9,0x6b,0x2c,0x3a,0x18,0x57,0xe9,0x4b,0x39,0x11,0x30,0x4e,0xb5,0x85,0xb6,0xa7,0xee,0x37,0x1a,0xfe,0x60,0x64,0xf5,0x7f,0x46,0x9e,0x82,0x2d,0xcb,0x74,0x4e,0x95,0xc3,0xa0,0x87,0x94,0x85,0x84,0x54 .byte 0x28,0xe3,0x14,0x93,0xb6,0xa2,0x28,0x2c,0x14,0x68,0x8c,0x88,0x82,0xc5,0x75,0x1b,0x25,0x8e,0x50,0xf0,0xad,0xb7,0xfb,0x31,0xb2,0x24,0xf1,0x29,0x5e,0x65,0x58,0x9a,0x8c,0x2b,0x9b,0x6d,0xa4,0x07,0x08,0x0d,0x60,0x7d,0xd9,0xb4,0xe0,0x01,0x93,0x07,0xf3,0x8f,0xde,0x70,0x76,0x10,0x80,0x1d,0xe3,0x1b,0x21,0x58,0xba,0x4a,0xbe,0x9c .byte 0x04,0xdc,0x53,0x64,0x6d,0x12,0x37,0xea,0xa5,0xdf,0xa7,0x1a,0x1d,0x13,0x53,0x87,0xb0,0x98,0xa6,0x1f,0x48,0x5f,0xc2,0x56,0xf2,0x98,0x76,0xd1,0x5f,0x78,0x5e,0xb8,0x6b,0xf0,0x29,0x66,0xa6,0xb2,0x91,0x57,0xde,0xbf,0xc1,0xf1,0xd5,0x8c,0xa4,0x62,0x88,0x2c,0x40,0x53,0x0d,0x46,0x20,0x5c,0x82,0x75,0x03,0x91,0x79,0x6f,0x95,0xd0 .byte 0x95,0xda,0xab,0xd0,0x8a,0x20,0x1c,0x36,0x94,0x7c,0x12,0xe7,0xbe,0x9e,0x1f,0x99,0x7b,0x4b,0x79,0x6e,0xed,0x3e,0x7d,0x77,0x32,0x0b,0x0c,0x54,0xd3,0x22,0xe8,0xcd,0xe7,0x10,0xd7,0xe9,0xd4,0x4a,0xb5,0x68,0x61,0x29,0x1b,0x9f,0x0f,0x72,0xdd,0xaf,0xb2,0xc7,0x57,0x50,0x45,0x8d,0x45,0x6d,0xd2,0x70,0x7b,0x89,0x78,0xeb,0xb9,0x2d .byte 0xf9,0x82,0xb3,0xa3,0xc0,0x9d,0x96,0xf0,0x29,0x0c,0x4d,0xc2,0x03,0x3a,0xee,0x59,0x4e,0x26,0xe7,0x6a,0x88,0xae,0x4e,0x47,0x0d,0x18,0xce,0x71,0x01,0x79,0xf7,0xa3,0x04,0x64,0x54,0x53,0x7e,0x1f,0xb3,0x4f,0x83,0x9f,0x39,0xb8,0xfe,0x1e,0x0c,0x3e,0x9e,0x50,0xc8,0x6f,0xdf,0xf6,0x00,0x4d,0x7b,0xa3,0x0b,0x44,0x6f,0xbe,0x4f,0xf6 .byte 0x47,0x50,0xe5,0x02,0x58,0x5e,0x87,0x9a,0x18,0xc0,0xa0,0x89,0x8b,0x33,0x57,0x1a,0x31,0xab,0x6d,0xd0,0x87,0x54,0xee,0x66,0xca,0xf7,0xb9,0xe6,0x27,0x9c,0xbd,0x48,0x98,0x58,0xa5,0xcc,0x9e,0xe7,0xce,0x88,0x95,0x0e,0x1a,0x35,0x3a,0xee,0xe4,0x0c,0x7e,0xfa,0x87,0x86,0xb4,0x09,0xd7,0x10,0xdc,0x39,0x47,0x68,0xae,0x8b,0xf8,0xc4 .byte 0xf6,0x91,0x6e,0xbb,0x95,0xbf,0xba,0x41,0xd9,0xe3,0xb3,0x40,0x6b,0x3b,0xa3,0x0e,0x8f,0x6b,0xad,0x4b,0x1b,0x44,0x0d,0x35,0x7d,0xdf,0xfc,0x65,0xec,0xa7,0x73,0x14,0x2a,0xf9,0x26,0x24,0x5b,0x22,0x6e,0x97,0x65,0xdf,0x78,0x59,0xd3,0xb3,0xd9,0x68,0xbb,0x0c,0x4e,0x4d,0x4b,0x77,0xc3,0x4a,0xfa,0x0a,0xe4,0x99,0x9d,0x53,0x60,0x0f .byte 0x09,0x1c,0xcd,0x5d,0x74,0xd0,0x50,0x71,0xaa,0x2b,0x15,0xb4,0x73,0xe0,0xf9,0x66,0x54,0x7d,0x9b,0x74,0x9f,0x7f,0xf7,0x9c,0xa2,0x9c,0x91,0xeb,0xaf,0xc6,0xb7,0xb7,0x2f,0x7f,0x7a,0x25,0x6c,0xc4,0xad,0x08,0xde,0x01,0xe0,0x90,0x90,0x23,0x32,0xf9,0x3e,0x48,0x27,0xa4,0x37,0x96,0x53,0xf1,0x00,0xfe,0x6f,0xc2,0xdb,0xde,0xb3,0x63 .byte 0xab,0x6a,0xa5,0x2d,0x29,0x00,0x7d,0xbd,0x10,0xa4,0xf7,0x88,0x46,0x23,0xfb,0x05,0x5f,0x92,0x43,0x5d,0x3c,0x7c,0xbc,0x90,0x66,0x77,0xda,0x08,0x9b,0x87,0xd2,0x69,0xba,0x84,0x7b,0x7b,0x66,0x97,0x22,0xd6,0xce,0x5a,0x9d,0xc6,0xd2,0x7c,0x13,0x25,0x86,0x1b,0x4c,0x36,0x1f,0x73,0x09,0xdc,0xb3,0x96,0xd9,0x10,0xdc,0xcc,0x80,0x4c .byte 0xd9,0x72,0xed,0xa5,0x44,0x65,0x10,0x80,0xee,0x5e,0xfa,0x24,0x7a,0x23,0xb3,0xc7,0x61,0x93,0x6b,0xe4,0x0b,0x4a,0x4b,0x4a,0xa5,0xd8,0x51,0x76,0xf1,0xd9,0x92,0x2b,0x17,0x20,0x0c,0x9a,0xba,0xc3,0x4a,0x29,0x27,0x5c,0x34,0x5b,0xcf,0x44,0x17,0x16,0x61,0x52,0x41,0x3b,0x6e,0x99,0x14,0x94,0xa9,0x5f,0x9b,0x2b,0x1e,0xcf,0xdd,0xcc .byte 0xff,0xc0,0x7a,0xce,0x0a,0x1c,0xf5,0x33,0xaf,0xcb,0xde,0x92,0x56,0x36,0x81,0x98,0xa6,0x70,0x4c,0x49,0x4a,0xd8,0x88,0x0a,0xb8,0x5d,0x5a,0xbe,0x03,0x98,0xba,0xe1,0xf2,0x11,0x44,0x65,0x02,0xd8,0xef,0x8c,0x84,0x0f,0x48,0xa1,0xf1,0x61,0xff,0xef,0x18,0xf1,0x29,0x4a,0x7b,0x8b,0xb2,0xb2,0xa1,0x50,0x26,0xa9,0x86,0x2a,0x06,0x8a .byte 0x33,0x05,0x9f,0x20,0x5b,0x06,0xc3,0x50,0x79,0x20,0x34,0xe5,0x88,0xc0,0xfc,0xff,0xb6,0xa0,0x7c,0x0a,0xe2,0x43,0xc1,0xd2,0xf4,0xb2,0xdf,0xa6,0x51,0x98,0x67,0x6f,0x3e,0xc0,0xae,0xd3,0x35,0xd2,0x5f,0x73,0x71,0x2b,0x3e,0xa7,0x0d,0x8a,0x4c,0xa3,0xba,0xe4,0xac,0xc2,0xfe,0xb4,0x82,0x0e,0xe5,0x76,0x82,0x0f,0x9a,0xd3,0x54,0x24 .byte 0x21,0x01,0x34,0x4c,0xa1,0x0c,0x6e,0x80,0xe0,0x99,0xb1,0x4b,0x40,0xce,0x29,0x33,0xe3,0x5a,0x9c,0x15,0x33,0x06,0x1c,0xdf,0xea,0x01,0x3f,0x2f,0x9a,0x9a,0x34,0x07,0x53,0xc6,0x7c,0x0f,0xbd,0x17,0x06,0xa3,0x47,0x44,0x0f,0xd4,0xb4,0x96,0xf7,0xc5,0x71,0x4c,0xe0,0xc1,0xb7,0x42,0x0f,0x30,0xbb,0x09,0x17,0xc3,0xc4,0xaf,0x30,0x22 .byte 0x45,0x13,0x91,0x55,0x5e,0xde,0x31,0x19,0x0c,0xfc,0x85,0xd7,0x08,0x99,0x0b,0x30,0xbf,0xa7,0x15,0x26,0x2f,0x09,0x2d,0x2d,0xe0,0x60,0x7d,0x88,0x71,0xf4,0x97,0xa7,0x65,0x8d,0x5b,0x59,0x71,0x4d,0xc2,0xf0,0x46,0x2a,0x58,0xe1,0x23,0x78,0x33,0xd6,0x85,0xdd,0x1a,0x02,0x60,0x12,0xdd,0x45,0x8d,0xab,0xdb,0xe6,0x26,0x67,0xbe,0x12 .byte 0xb2,0xff,0xcb,0x20,0x79,0x09,0x5a,0x44,0x92,0x93,0xae,0x74,0x59,0x9d,0x20,0x96,0x81,0xe1,0x53,0x2d,0xf8,0x10,0xc8,0x69,0x4d,0xc8,0xe4,0x60,0x32,0x46,0xf1,0xba,0x6d,0x73,0x8d,0x70,0x8e,0x24,0xf1,0xb7,0x80,0x1b,0x77,0x70,0x3e,0x16,0xa1,0x15,0xb7,0x25,0xd2,0x11,0x41,0x7d,0xd8,0x7d,0x42,0xa0,0x81,0x02,0x61,0xd0,0x6d,0x3a .byte 0xb9,0xc2,0x97,0xda,0x0f,0xf0,0x20,0x23,0x45,0xd4,0xe9,0xf5,0xf4,0x15,0x4c,0x84,0x47,0x2e,0x97,0xce,0x57,0xec,0xcf,0xc3,0x6a,0x54,0x87,0xeb,0xee,0x7c,0x5b,0x9e,0x9f,0xde,0x25,0x5d,0x60,0x7d,0xbe,0xd9,0xb4,0xb9,0x41,0x57,0x9b,0xe2,0xeb,0x21,0x09,0x60,0xb5,0xb0,0x55,0xaa,0xb0,0x15,0xa4,0x0b,0x83,0x98,0xee,0x81,0x7a,0x08 .byte 0xfb,0xe6,0xf1,0xd8,0x02,0x87,0x85,0x15,0x59,0x4b,0xc7,0x6d,0x73,0x4f,0xac,0xf8,0x18,0x9e,0xd8,0x00,0xff,0x3b,0xec,0x44,0xaa,0x4a,0x1d,0x85,0x4b,0x52,0xd6,0xdd,0x88,0x6c,0xc1,0xb0,0x67,0x78,0xcd,0xa3,0xda,0xa1,0x30,0x18,0x7d,0xa6,0x14,0xc8,0x51,0xc1,0x03,0xeb,0x97,0x0b,0x03,0x94,0xcc,0x73,0x95,0xbd,0xea,0x44,0xe2,0xb2 .byte 0x20,0xa4,0x20,0x9a,0x58,0x44,0x75,0x92,0x1f,0xac,0x75,0xf3,0x61,0xea,0xc1,0x9c,0xf7,0x7c,0xf7,0x6b,0x79,0x41,0xb4,0x53,0x32,0x8a,0xb0,0xfe,0x06,0xef,0xb0,0xf9,0x87,0xdb,0x31,0x9a,0xa0,0x84,0xe3,0xa3,0x8b,0x36,0xcb,0xe7,0xb4,0x1e,0xf2,0x21,0x3d,0x06,0x37,0x1a,0xb2,0x96,0xc6,0x94,0x67,0xc5,0x50,0x84,0x06,0xcf,0x57,0x66 .byte 0x1a,0x7d,0x84,0xd6,0xa9,0xed,0x04,0xb3,0x83,0xa3,0xd4,0x55,0x4a,0x71,0x87,0x76,0x79,0xa4,0x9a,0x70,0x50,0x10,0x53,0x66,0x0e,0x7c,0xca,0xcb,0xac,0xcd,0x54,0x37,0x2e,0xe0,0x75,0x2d,0x75,0x06,0x92,0x50,0x0f,0x77,0xaf,0x87,0x71,0x1a,0x13,0x92,0xf9,0x7c,0x19,0x1c,0x3f,0x40,0xcb,0x14,0xbd,0x2e,0xe5,0x27,0x0d,0x1c,0x19,0xe3 .byte 0x0f,0xda,0xca,0xc4,0x58,0xc6,0x98,0x14,0x89,0xc7,0xb2,0x6d,0x21,0x32,0x1d,0x17,0xd2,0x5d,0x40,0x04,0x56,0xd1,0x47,0xa6,0xc6,0x89,0xc9,0x28,0x0e,0x33,0x09,0x15,0xca,0x70,0x2b,0x7f,0xde,0x83,0x5b,0x32,0x83,0x99,0xa9,0xac,0xe9,0xb3,0xb8,0x07,0xc8,0xdf,0xd3,0x16,0x0a,0x42,0x03,0x9c,0x26,0x5e,0x97,0x55,0x4f,0xf7,0x5d,0x64 .byte 0x83,0x8d,0x8f,0x14,0x89,0xed,0xd2,0xd3,0x67,0x92,0x1b,0x71,0x1f,0xef,0x17,0xcf,0xe6,0xa7,0xd7,0x3f,0xf2,0xab,0x5d,0x81,0x4b,0xfb,0x55,0x13,0xf5,0x56,0xf7,0xae,0xc3,0xae,0x40,0xbb,0xb4,0x70,0xfd,0xbc,0x6e,0xcf,0x17,0xea,0x94,0x07,0xec,0xba,0xd0,0xf9,0xc2,0x1c,0x40,0x48,0xf1,0x16,0x31,0x09,0x25,0x9a,0xe1,0xe1,0xdd,0x32 .byte 0xf1,0x9f,0x00,0x6e,0xd7,0xac,0x14,0x7a,0xa0,0xf7,0xd0,0xcc,0x0e,0x25,0x9f,0xfa,0x1d,0x4b,0xc0,0x36,0x3f,0x68,0x01,0xd3,0xca,0x48,0x93,0xfb,0xc6,0x7b,0xdb,0xcb,0xe4,0x13,0x41,0x0c,0x24,0x45,0x7d,0x5a,0x9b,0x17,0xc2,0x7a,0x73,0x7c,0x03,0x9d,0x5c,0x71,0x54,0x68,0x9a,0x5d,0xf9,0x6e,0x5f,0x13,0x79,0x6d,0x65,0xca,0x7f,0xef .byte 0xb2,0xa9,0x5a,0x77,0xc8,0x4a,0x4a,0x91,0x17,0xb1,0xb1,0x8c,0x28,0x22,0xe0,0xff,0xcb,0x00,0xa3,0xb6,0xe2,0x36,0xc2,0x5f,0xd9,0x7f,0x5f,0x85,0xef,0xe7,0x46,0x00,0xc7,0x08,0x8b,0xf3,0x1f,0x63,0x0f,0x23,0xff,0xe3,0x21,0x58,0x73,0xf7,0xaa,0xff,0x2d,0x9a,0x02,0xe5,0x18,0x66,0x34,0x65,0xfd,0x68,0xbf,0xd9,0x3b,0xfc,0xdc,0xc0 .byte 0xa8,0xf7,0x2b,0xc2,0x37,0x01,0x7e,0x3d,0x6e,0x44,0x73,0xc8,0x6b,0x53,0xc3,0x19,0x51,0x84,0x3a,0x28,0xbe,0x5f,0x5a,0x1c,0xcf,0xd3,0xfb,0x25,0x43,0x99,0x9b,0x24,0x58,0xdb,0xc0,0x27,0xf4,0xfc,0xe6,0x2f,0x17,0x48,0xbb,0xf3,0x33,0xc1,0x0a,0x3e,0xb2,0x41,0x9b,0x24,0x16,0xcb,0x0c,0x2a,0x87,0x7f,0x34,0x70,0x4f,0xf0,0xb7,0x6e .byte 0x39,0x18,0x3b,0xca,0x8f,0xcb,0x2c,0x51,0x68,0x5b,0x60,0xeb,0xeb,0x05,0xeb,0x96,0x77,0xca,0x60,0x0c,0x9c,0x88,0xc8,0x09,0x68,0x0d,0x7a,0x89,0x52,0xd7,0x8c,0x3f,0x71,0x71,0x21,0x89,0x4e,0xef,0x77,0x0a,0xdf,0xb7,0xfd,0x08,0x59,0x54,0x24,0x99,0x48,0x1f,0x27,0xca,0x7d,0x1b,0x46,0x2b,0x81,0x56,0xae,0x5a,0x02,0xd8,0x8e,0x1f .byte 0x2a,0xc1,0xd8,0x9b,0xb5,0xeb,0xfd,0xae,0xe5,0x35,0x0d,0x33,0x3d,0x49,0x9e,0x0a,0x62,0x01,0xfb,0xd0,0x25,0xd6,0x9f,0x7d,0x70,0xd9,0x6e,0xda,0x19,0x97,0x5d,0x46,0x67,0x8c,0x21,0xd3,0xe5,0xe5,0x50,0xaf,0x47,0x16,0xb3,0xea,0x21,0xe1,0xee,0x1c,0x93,0x14,0xd0,0x4a,0x1e,0xfb,0x19,0xa9,0x26,0x71,0x53,0x9b,0x17,0xda,0x8f,0x28 .byte 0xf5,0x35,0xf6,0x59,0x75,0xb1,0xeb,0xec,0x5a,0x92,0xc0,0xed,0xc1,0x48,0xaa,0xd8,0xb6,0x54,0x32,0x96,0x58,0x34,0x09,0x75,0x5e,0x0c,0x58,0x8d,0xc1,0x42,0xf1,0xfb,0x41,0xe1,0x23,0x84,0x25,0x3a,0x83,0x4c,0x13,0x0e,0x67,0x33,0xf9,0xfb,0x5b,0xa8,0xbb,0xbb,0x92,0x0a,0xca,0x5c,0x9e,0x7a,0x58,0xab,0x51,0x16,0xfc,0xf2,0x4d,0xee .byte 0xa1,0x2d,0xaa,0x2d,0xb6,0xaf,0x30,0xca,0x4a,0xec,0x63,0xd6,0xf0,0xee,0x81,0xfd,0x9e,0xe7,0x71,0xb1,0x5f,0x3a,0x8e,0xa0,0xd1,0xa9,0xe0,0x61,0xdc,0x9e,0x78,0xbd,0x2b,0xaf,0x93,0xf9,0x61,0xf7,0x70,0x5e,0x9a,0xe9,0x9a,0x31,0x9c,0x81,0x66,0x5d,0x33,0xe4,0xc9,0xf0,0x28,0xfb,0xd7,0xa4,0x10,0x31,0x38,0x83,0x9b,0x96,0x7d,0xfd .byte 0xd5,0x0e,0x23,0x62,0xa4,0x3b,0x6f,0x63,0xb7,0xbc,0x28,0xca,0xca,0xc5,0x14,0x1b,0xc5,0x3d,0x00,0x58,0xeb,0xf8,0x65,0x09,0x7f,0x0e,0x89,0xcf,0x6a,0x7d,0x0e,0x17,0xdc,0x74,0xde,0x8c,0xfd,0xe4,0x26,0x44,0xe4,0xce,0x2f,0x47,0x66,0x57,0x6f,0x4b,0x86,0x91,0xca,0x36,0xe3,0xeb,0x18,0xd3,0x48,0x63,0x5f,0x3f,0xc6,0xb5,0x38,0x5a .byte 0x7d,0x20,0xe8,0xc1,0x9b,0xb4,0xc0,0x4e,0xe8,0x93,0x5e,0xd0,0x34,0xa3,0x30,0xf6,0xd6,0x51,0x0c,0x46,0x27,0x2c,0xac,0x91,0x01,0x10,0x8f,0xed,0xcb,0x16,0xf3,0x28,0xfb,0x44,0x55,0xac,0x5e,0xdd,0xf0,0xf6,0xe8,0xbf,0x7f,0xdb,0x14,0x7e,0x40,0x5e,0xa7,0x14,0x52,0x69,0xea,0xd6,0x03,0x76,0x3a,0x10,0x64,0xea,0xe8,0x0c,0x76,0x04 .byte 0xc9,0x18,0x5e,0x22,0xe8,0x1c,0x19,0x2f,0xbe,0x72,0x61,0xe6,0xdc,0xbe,0x95,0x0b,0x95,0x39,0x3d,0x5a,0x34,0x43,0xca,0xb6,0x4b,0xa6,0xf5,0xd3,0x22,0xcc,0xa0,0x35,0x0d,0x06,0x89,0xd1,0xde,0x96,0x49,0x06,0x7e,0x62,0xa1,0x18,0xbd,0x78,0x65,0x2c,0x84,0x22,0xc0,0xea,0x9b,0x7c,0x5c,0xdd,0x97,0x20,0x60,0xc4,0xf1,0xdd,0x68,0xb7 .byte 0x4b,0x30,0x17,0xcb,0xb7,0xbd,0x3c,0xb5,0x66,0xa7,0xad,0xc2,0x9a,0x31,0x79,0x09,0xff,0x4d,0xd5,0xd6,0x35,0x02,0xa6,0x0b,0x8a,0x8a,0xbb,0x54,0xe1,0xea,0xc8,0xa9,0x67,0xfc,0x1a,0x23,0x8d,0xdb,0xc5,0xe5,0x8d,0x1b,0x6f,0x20,0x57,0xbb,0xbb,0xda,0xfa,0x5b,0x07,0x3e,0x3e,0x84,0x2e,0x00,0x36,0x06,0x5c,0x85,0xa3,0x08,0x4a,0x59 .byte 0x48,0x4c,0x7c,0xcc,0x63,0x49,0xde,0xb0,0x59,0xa2,0xb9,0x26,0x8c,0xb2,0x91,0xf8,0xf8,0x07,0xb8,0xba,0x16,0xdb,0xc7,0x6c,0x66,0x5f,0x91,0xc1,0xb8,0x24,0x97,0x1a,0xfb,0x95,0xf6,0x40,0xb0,0x5d,0xd7,0x55,0x40,0x8d,0x75,0x35,0xbf,0xd6,0xcf,0xe4,0xe8,0x6d,0x33,0x10,0xd7,0x8b,0xf3,0xc0,0x00,0x47,0xbb,0x90,0x51,0xd2,0xf5,0x56 .byte 0xf8,0x82,0xb6,0x50,0xea,0x88,0x44,0x0b,0x46,0x53,0xc4,0x10,0x80,0x03,0xfa,0x63,0xa7,0x92,0x38,0x7c,0x62,0xbe,0x90,0xea,0x9d,0x0d,0x09,0x6e,0x08,0x34,0x61,0x41,0x7f,0xe7,0xaf,0x45,0x3f,0xa5,0xbf,0x7a,0xae,0xc0,0xa8,0xfc,0x64,0x4a,0x73,0x85,0x08,0xce,0xf3,0x7b,0xcc,0x0d,0xf8,0xa4,0xa0,0x9f,0x48,0x28,0x81,0xf9,0xe4,0xb5 .byte 0xdd,0x6c,0x32,0xbb,0x1a,0x36,0xe6,0x78,0x8d,0x85,0x4a,0x8b,0xfb,0xf1,0x14,0xfe,0xde,0x15,0x92,0x8b,0xd6,0xee,0x73,0x43,0xc0,0x83,0x37,0xf2,0x0a,0xb7,0xc9,0x3b,0x25,0x2b,0x08,0x7a,0x54,0x49,0x21,0x5f,0xd4,0x78,0xc1,0x30,0x10,0x1c,0xad,0xfd,0xbd,0xb4,0xb1,0x6c,0xd8,0xd1,0x17,0x3e,0x61,0x2b,0x80,0x82,0x63,0x93,0x2d,0x0b .byte 0x0e,0xcc,0xaf,0xa9,0xc3,0x2d,0xb7,0xc7,0x25,0x37,0x5f,0x3e,0x61,0x94,0xe1,0x2c,0xd3,0x31,0x84,0x9f,0x48,0x9c,0xb2,0x73,0x7d,0xd5,0x84,0xba,0xb8,0x1c,0xa4,0x88,0x4c,0x9e,0x14,0x89,0x09,0x25,0xf1,0x47,0xc1,0x20,0x45,0xfd,0x1a,0x1f,0x25,0x33,0xeb,0x9f,0xa8,0x17,0x93,0xd4,0x41,0x24,0xbd,0xd2,0x08,0x90,0x68,0xad,0x76,0x43 .byte 0xa4,0xd9,0x35,0x68,0x0f,0x28,0xd4,0x2d,0x1e,0xcd,0x52,0x0d,0xf5,0x70,0x92,0x42,0x58,0xbb,0xa6,0xec,0xe9,0x71,0x04,0x66,0xf2,0x16,0x0d,0x3a,0xc0,0x6b,0x85,0x67,0x84,0x12,0x2d,0x02,0xa4,0x17,0x34,0x33,0x91,0x0b,0xa2,0x04,0x0c,0xe3,0xa4,0x80,0x5a,0x83,0xef,0x76,0xe7,0x9a,0xa8,0xa6,0xb8,0x41,0xe3,0x06,0xa7,0x9a,0xc7,0xe6 .byte 0x56,0xa0,0x21,0x53,0x0c,0x5c,0x38,0xad,0xa2,0x87,0x3d,0x7d,0x38,0x50,0xe1,0x49,0xb7,0x56,0xf7,0xfc,0xc4,0x60,0x9e,0xb9,0x4a,0x68,0x18,0x1b,0x84,0xea,0x9a,0x30,0x01,0x53,0xf8,0xd3,0x25,0xb1,0xd0,0x3d,0x23,0x71,0x21,0x19,0xdf,0xe0,0xe4,0xdb,0xba,0xcc,0x92,0xe8,0x97,0x56,0xba,0x4f,0x63,0x77,0xaf,0xbb,0xe9,0x30,0x09,0x40 .byte 0xbf,0x3c,0xf4,0xb6,0x0c,0x8b,0x1f,0x22,0x73,0x6e,0x49,0x1e,0x29,0x4f,0x92,0xa1,0x90,0xf7,0x2a,0x55,0xee,0xb3,0x36,0xe8,0x69,0x2c,0xc0,0x60,0xaa,0x1c,0xa6,0x84,0x0a,0x90,0xfa,0x5e,0x48,0x14,0x3a,0xf7,0x1e,0xe2,0x24,0xe7,0xae,0x2e,0x1f,0xdb,0xa6,0xc6,0xcb,0x6e,0x4b,0xae,0x88,0x4e,0x66,0xa9,0x96,0x23,0xa8,0xd7,0x94,0x3a .byte 0xae,0xa5,0xdc,0xdd,0xfb,0xbd,0x1c,0xbf,0xa6,0xe0,0x29,0xe2,0xd1,0xa5,0x1b,0xd9,0x6d,0x38,0xd1,0x84,0x6f,0xf7,0x46,0x72,0xf0,0x89,0x72,0x4f,0x7f,0xb6,0xf3,0xf9,0x91,0x61,0x68,0x12,0x48,0xfb,0x1b,0x74,0xc7,0x7a,0x6b,0x4c,0x5d,0xbd,0x4b,0x89,0xfb,0x43,0xa7,0xd7,0xd0,0xc2,0x88,0x86,0x9b,0xcf,0x0e,0x94,0xc3,0x49,0x47,0x82 .byte 0xd6,0x06,0x54,0xa4,0xb4,0x81,0xdb,0x07,0x38,0x5e,0x9e,0xc6,0x39,0x57,0x05,0x14,0x18,0xf9,0x68,0x6c,0x27,0x32,0xcf,0x90,0xd9,0xc8,0x7c,0xc4,0x1b,0xab,0xa8,0xc0,0x75,0x34,0x35,0x32,0xde,0x8e,0x20,0x09,0x6a,0x90,0x2a,0x67,0x86,0x61,0x08,0x9a,0x53,0xfc,0x6a,0x9a,0x0d,0x87,0x8b,0xa2,0xa3,0x72,0x6f,0xfa,0xc3,0xd0,0x9c,0x7a .byte 0xc6,0x9e,0x1e,0xb4,0x2e,0xaf,0x4a,0x39,0x95,0x07,0x4f,0xbb,0xb4,0x52,0x7f,0xea,0x54,0x21,0x79,0x7e,0x2b,0x7a,0xea,0xec,0xcd,0xa5,0xdc,0xfd,0x8c,0x3c,0x9b,0x1d,0x7d,0x15,0x5b,0x05,0x95,0x7a,0x14,0xa8,0x3c,0xdd,0x91,0x0e,0x25,0xfc,0xa6,0x91,0xd8,0x2d,0xa5,0xf7,0xcc,0x26,0x77,0x2e,0x08,0xda,0x56,0xb9,0xc8,0x0e,0x78,0x79 .byte 0xda,0x1d,0x56,0x41,0x1f,0x17,0x36,0x68,0x1c,0x16,0xcf,0x36,0xdf,0xb3,0x53,0xf9,0xf7,0x34,0x92,0x86,0x03,0xfe,0x67,0x8b,0x8b,0x4c,0xc3,0xfd,0xd0,0x44,0xce,0x91,0x57,0x3b,0x96,0x42,0x22,0xae,0xfc,0xf5,0xd7,0xcd,0x22,0x3e,0x91,0x05,0xf6,0x28,0xa7,0x6b,0xc7,0x0f,0xb8,0x67,0x26,0x84,0xa8,0x73,0x44,0xa5,0xd4,0x58,0x07,0x0a .byte 0xcc,0xaa,0xd6,0x49,0xff,0x1a,0xce,0x30,0x14,0x62,0x9a,0xcc,0x6e,0x98,0xb5,0x6d,0xb4,0xa4,0x5d,0x71,0x10,0xd1,0x64,0x84,0x70,0x51,0xb5,0xe1,0xfc,0x78,0xe4,0x70,0x88,0x2a,0xcf,0x41,0xcc,0x45,0x34,0xa2,0xef,0x9b,0xf0,0x8b,0x27,0x11,0x81,0x89,0xee,0x5d,0x37,0x8e,0x6d,0xe3,0x72,0x89,0x65,0x23,0x88,0x97,0x03,0xab,0xb3,0x90 .byte 0x76,0xf1,0x27,0x1b,0xa7,0xf0,0x5d,0xe4,0x83,0xda,0x4e,0x5b,0xbc,0x95,0xec,0x6f,0xdf,0x00,0xbf,0x2d,0xda,0xda,0x50,0x80,0xba,0xef,0x99,0x2b,0x6d,0xf7,0x61,0x01,0xcf,0xdb,0x9e,0x3d,0x65,0x22,0x03,0x5b,0x1d,0x0c,0x4a,0x08,0x83,0x78,0xd0,0x2b,0xe5,0x92,0x0d,0x53,0x50,0x0d,0xc0,0xdb,0x2d,0x8a,0x77,0xfe,0xb1,0x42,0x99,0xe1 .byte 0xcb,0x1e,0x07,0x51,0x39,0x7e,0x75,0xa1,0xf2,0x73,0xea,0x0e,0x5e,0x1d,0xe9,0x60,0xc1,0x18,0xe7,0x5f,0xc6,0x37,0x49,0xb0,0xd5,0xc0,0xfb,0x0b,0xbd,0xa7,0x0f,0xe1,0x07,0xea,0x99,0xad,0x98,0xee,0xa1,0xa3,0xfd,0x4b,0x94,0x35,0xd3,0xe9,0x16,0xbf,0xf3,0x91,0x80,0xc2,0x9b,0x22,0xdc,0x47,0xef,0xad,0x15,0x12,0x2c,0x3d,0x5d,0x04 .byte 0x7a,0xcc,0x43,0xf1,0xe6,0xb8,0x1a,0xe8,0xc1,0x81,0x1d,0x84,0x3a,0x42,0x92,0xc3,0xb6,0x76,0x07,0x89,0x2b,0x78,0xd0,0x0e,0xca,0xef,0xaa,0x7d,0xd1,0xe8,0x66,0xed,0xbf,0x5c,0x5e,0x2d,0x8d,0x3e,0xc2,0xbb,0xb9,0x53,0x27,0x98,0x0b,0xa1,0x5d,0x9e,0x7d,0x65,0x25,0x1f,0x3c,0xb1,0x37,0x6c,0xde,0x5e,0x02,0xbe,0x75,0x26,0x5b,0x2a .byte 0x25,0x21,0xa1,0x4f,0x95,0xda,0x29,0x61,0x1c,0xff,0x2b,0xc5,0xdc,0x2d,0x8f,0x54,0x4b,0x19,0x06,0x0c,0xb6,0x6c,0xe7,0xd4,0xc3,0x4b,0xa5,0xf5,0xc3,0xe2,0x42,0x90,0x36,0x61,0xb1,0x57,0x19,0xb7,0xca,0x7d,0xcb,0x31,0xbe,0x8d,0xb7,0x5a,0x9d,0x81,0xf2,0xf0,0x18,0x45,0xc8,0xcb,0x3c,0x71,0x42,0xe5,0x6a,0xfe,0x00,0x9f,0x4d,0x59 .byte 0x32,0xaa,0x0b,0x2c,0xed,0x1c,0xfe,0xe7,0xbd,0xce,0xc3,0x2c,0xb2,0x3e,0xdf,0xb3,0x0e,0x96,0xbe,0xe9,0xd1,0xf0,0xe2,0x31,0xf6,0xeb,0xa9,0x7b,0x32,0xbe,0x42,0x55,0xf3,0x80,0x71,0xfb,0x1f,0x6e,0x5f,0xd3,0xc8,0xdf,0x64,0x7b,0x3e,0xf2,0x00,0x60,0x7f,0x49,0x5a,0x97,0xa9,0xf1,0x8f,0x82,0x6d,0x33,0xbf,0x2f,0x34,0xc7,0xbe,0x24 .byte 0x27,0xe8,0xe2,0x88,0xfb,0x3b,0xe3,0xaa,0x86,0x90,0x8d,0x69,0x0e,0xb4,0x83,0xea,0xdc,0xc8,0xce,0x8c,0x53,0xb0,0xcc,0xcc,0x2a,0xe6,0xb0,0xee,0xde,0xe6,0x0c,0x7f,0xce,0x73,0x6f,0xa9,0xa2,0x3e,0xf6,0x66,0xc5,0x83,0xfe,0xa1,0xab,0x80,0x90,0xd5,0x58,0x98,0x22,0xb0,0x4c,0x21,0x27,0xb7,0x19,0x68,0xa7,0x18,0x6b,0xb4,0x82,0x76 .byte 0xff,0xb1,0xb1,0xa5,0x14,0x06,0x5b,0xfe,0xe4,0xd2,0xb8,0x4f,0x21,0x2a,0x74,0x17,0x01,0x78,0x74,0xf3,0x2a,0xa0,0xec,0x36,0x5c,0x9e,0xae,0x7f,0x27,0x2f,0x79,0xb1,0x2a,0x70,0x27,0x82,0xdf,0xf1,0x52,0x00,0xfe,0xce,0x04,0x47,0xda,0x8e,0x2c,0xa4,0x71,0x65,0x54,0xb3,0x81,0xbd,0x0f,0x9f,0x6b,0x5a,0x0e,0x91,0xb3,0x07,0x36,0x65 .byte 0x86,0x75,0x75,0xfb,0x96,0x10,0x8f,0xd7,0x96,0xf5,0x0d,0xa7,0x4d,0x41,0x0c,0x8f,0x28,0xbc,0xda,0xf9,0xe7,0x41,0xcd,0xfd,0xb9,0x2c,0x44,0x13,0xe4,0xde,0xa6,0xd4,0x5e,0x4c,0x17,0xfa,0x0e,0x11,0x45,0xf4,0xbb,0xad,0x58,0x0d,0xec,0x2f,0xf8,0x14,0xca,0x18,0x2d,0x04,0x38,0xdf,0x1c,0x47,0x63,0xa4,0x31,0xb9,0x18,0xf7,0x79,0xee .byte 0x15,0x4a,0xd1,0x6e,0x61,0xe7,0x05,0x5d,0x0e,0x99,0xa5,0x7d,0xfe,0x67,0x29,0x21,0x2b,0x07,0xaa,0xed,0xf0,0x54,0x37,0x79,0x5b,0xe7,0x38,0x21,0x0b,0x29,0x6e,0x34,0xe4,0xdb,0xe9,0xe3,0x6e,0xea,0x34,0x6a,0xbb,0x39,0x2a,0x5d,0x34,0x7b,0xee,0x5d,0x68,0x62,0x34,0x66,0xcf,0x3f,0x1c,0x61,0x94,0x7b,0x69,0x71,0x92,0x23,0x6e,0xc9 .byte 0xec,0x34,0xe4,0xb4,0xa3,0xc4,0x3c,0x62,0x4f,0x4c,0xc8,0x5e,0xb1,0x9c,0xcc,0x0d,0x6b,0x62,0x55,0x1b,0xdd,0xa9,0xa2,0x0a,0x69,0x79,0x1d,0x2d,0x4e,0xf1,0xb3,0xbb,0x50,0x9e,0x48,0xf2,0x71,0x1e,0x09,0x63,0x57,0x54,0xc6,0xa9,0x9f,0x1f,0xe8,0x21,0x96,0xd3,0x37,0x09,0xae,0x68,0xe9,0xd7,0x4f,0xf4,0x8c,0x49,0x13,0xb1,0x56,0x4a .byte 0x36,0x43,0x5e,0x19,0xf5,0x7a,0x2a,0xe9,0xcf,0x3e,0x01,0x44,0xb1,0xa4,0xb2,0x77,0xf5,0x53,0x00,0xe3,0x51,0x57,0x63,0x48,0xba,0xb6,0x0f,0xbd,0xec,0x2b,0xaa,0xf5,0x52,0xa1,0xd2,0x0e,0x37,0x06,0x9e,0x6e,0x06,0xb0,0x65,0x56,0x5b,0x97,0x4f,0x2b,0x87,0xd9,0x0c,0x98,0x7a,0x3c,0x1b,0xd7,0x04,0xd5,0x68,0x60,0x46,0x1b,0x0c,0x9d .byte 0x4d,0x41,0x9d,0xff,0x80,0xf3,0xb2,0x3b,0x2e,0xb0,0x1f,0x92,0x85,0x65,0xb1,0xcf,0x5c,0xa2,0xa5,0x0b,0x83,0xa1,0x1b,0xbd,0xd2,0x8e,0x8a,0x33,0x9d,0xb4,0x06,0x62,0x24,0x49,0x4e,0x00,0x8a,0xa4,0x9a,0x2c,0x84,0x3f,0xe4,0x03,0x3d,0xf2,0x30,0x90,0x1c,0x37,0x38,0xf8,0xd4,0x04,0xd2,0xdf,0x69,0xd0,0xb5,0xda,0xbc,0x41,0x38,0xe0 .byte 0xaf,0x32,0x87,0xe1,0x98,0x21,0xb7,0x1b,0x3b,0x2b,0x3e,0x92,0x74,0xe8,0x44,0xdb,0x5c,0x39,0x9a,0x5c,0x71,0x60,0x48,0x95,0x5c,0x47,0xa4,0xa8,0x12,0x3b,0xbf,0x75,0x22,0x0a,0xf1,0x73,0x42,0xbc,0x8a,0x54,0x19,0x04,0xad,0x7a,0xbc,0x9c,0x35,0x53,0x52,0x4b,0x13,0x94,0x5c,0xe7,0x10,0x12,0x49,0xa8,0xb3,0x85,0x02,0x09,0x25,0xcd .byte 0xd1,0xdc,0xb5,0xe0,0xab,0x93,0x8c,0xf1,0x78,0xac,0x6c,0xa8,0x72,0x12,0x16,0x80,0x4d,0x76,0xcb,0x04,0xba,0x50,0x3a,0xf5,0x8f,0x5f,0x82,0xa8,0x83,0x6f,0x16,0xd2,0x85,0x67,0xe2,0x81,0xc7,0x5d,0x82,0x2c,0xea,0x6a,0xd7,0xc4,0xaf,0x9b,0x22,0x21,0x05,0x29,0x92,0xd7,0xe6,0x60,0xc6,0xdc,0x4c,0x15,0xde,0x46,0x4a,0xda,0xe3,0x4a .byte 0x7d,0x9f,0x7d,0x45,0x51,0x81,0xa3,0x78,0xfc,0x34,0x91,0x93,0xae,0xa9,0xb0,0x34,0x56,0x12,0x8c,0xec,0xe7,0x75,0x14,0x43,0xa5,0x0d,0xe4,0x91,0x3c,0xbb,0x64,0xb8,0x3d,0xd3,0xf9,0x55,0x5f,0x1f,0x30,0x3e,0xf8,0x84,0x8f,0xa3,0x5c,0x91,0xaa,0xa4,0x1a,0x16,0xef,0xcf,0x45,0xd4,0xa0,0xf6,0x56,0x9d,0xd2,0x88,0x50,0x0e,0x40,0xa5 .byte 0xde,0xbe,0x80,0x83,0x71,0xfc,0xfe,0xc7,0xe5,0xf7,0xda,0x51,0x86,0xc3,0xde,0xeb,0x54,0x17,0x7e,0xf6,0x20,0xd4,0x80,0xed,0xc0,0xc4,0x67,0xb5,0x26,0x03,0x98,0x26,0xa2,0xd2,0x0c,0x0a,0xf3,0xb0,0x65,0xd7,0x7e,0x26,0xf0,0x74,0x75,0xff,0x9e,0xfd,0x6f,0x1b,0xd2,0x49,0x4b,0x79,0xf7,0xb2,0x5d,0x02,0xfa,0x17,0x51,0x5e,0xc7,0x5e .byte 0xf8,0x0e,0x99,0xc4,0x94,0x42,0x37,0x74,0x74,0xa6,0x04,0x4e,0xe1,0x1c,0x2a,0x79,0x1f,0x0a,0xba,0xd8,0x24,0xe2,0xed,0x65,0x33,0xdb,0xb6,0x2d,0x1d,0x30,0xec,0x18,0x7c,0x8f,0x82,0xf1,0xad,0x30,0x97,0xc5,0x9e,0xd8,0xa6,0x64,0x5f,0xcd,0xaa,0xd7,0xce,0xd0,0xd5,0x32,0xb6,0x4e,0xe0,0xe0,0xdd,0x03,0x04,0x63,0x76,0x83,0xda,0x4b .byte 0x63,0x28,0x73,0x63,0x02,0x76,0x02,0xde,0x96,0x6a,0xea,0x21,0x00,0x25,0x5a,0xc8,0x52,0x0a,0xcb,0x5e,0x76,0xe9,0xd8,0x61,0xd3,0xda,0xdd,0x36,0x9c,0xa1,0x8e,0xf2,0x8d,0xc8,0xa1,0xe9,0xa2,0x1d,0xd3,0x53,0xb5,0x43,0x39,0x59,0x7e,0x12,0xd5,0x51,0x3b,0x71,0x66,0x6e,0x0d,0x6a,0x68,0x56,0x47,0x9c,0x95,0x7f,0xeb,0xff,0xf3,0x3f .byte 0x88,0x13,0x36,0x43,0xff,0x56,0xc3,0x28,0xa8,0x10,0x70,0xd3,0x04,0x8a,0x45,0xb7,0xe4,0x71,0x79,0xa1,0x20,0x70,0xab,0x7c,0xc1,0x20,0xb7,0xaf,0x67,0x86,0x6f,0x1d,0x2e,0x84,0xca,0x68,0x97,0x42,0xa1,0x9b,0x1c,0x10,0xbd,0x76,0xed,0x54,0x46,0x50,0x13,0xa9,0x2d,0x43,0x43,0x82,0x84,0x2c,0xee,0x8f,0x42,0x2f,0x75,0xe1,0x37,0x46 .byte 0xaa,0x6d,0xc4,0x03,0xb6,0x6c,0xd2,0xe7,0x3a,0x45,0x5d,0xe8,0x2e,0x99,0x11,0x7d,0x61,0x8f,0x10,0x37,0x45,0x49,0x29,0xa7,0x28,0xca,0x78,0x53,0xab,0xed,0x70,0xfa,0xd9,0x1b,0xf4,0x08,0x96,0x77,0xd8,0xd9,0xdb,0x03,0xff,0x9e,0xe3,0xd1,0x03,0xc3,0xd5,0x54,0xac,0x11,0xfc,0xd0,0x7c,0x9a,0x11,0x1d,0xc9,0xbc,0x7f,0xfd,0x2d,0xb6 .byte 0x8e,0x2a,0xc7,0x35,0xde,0x5a,0x2c,0x4f,0xcd,0x29,0xb0,0x8b,0x06,0xd2,0xa7,0x20,0xc5,0x27,0xe8,0x2a,0x93,0x70,0x40,0x01,0xaa,0x9b,0x71,0x93,0x98,0xcb,0xc6,0xe1,0x2e,0x0e,0xc6,0x4c,0x4f,0xb5,0x7d,0x26,0x39,0x99,0x8d,0x9d,0x91,0x26,0xf2,0x6a,0xb9,0x8c,0x92,0x63,0x26,0x4b,0xd4,0x3b,0xf6,0xba,0x17,0x9c,0xc6,0x8c,0x60,0x52 .byte 0x16,0x5a,0xcd,0xc4,0xdb,0x5c,0x17,0xf6,0x7a,0x32,0x3e,0x13,0x88,0x5d,0x2c,0x26,0x13,0x08,0x5e,0x51,0x8d,0x20,0x88,0xbf,0x70,0x4a,0x9a,0x56,0xff,0xf6,0x25,0x59,0x58,0xaa,0x7e,0xa5,0xc7,0x2c,0x89,0x3e,0x30,0x93,0x3b,0x6c,0x02,0x6e,0xe3,0x84,0xe4,0x05,0xc6,0x69,0x84,0xcb,0xe0,0x67,0x77,0xf3,0x4d,0x8e,0xfa,0x02,0xae,0xa7 .byte 0x7c,0x75,0x5b,0xdf,0xdc,0x01,0xbe,0x70,0xfa,0x47,0x80,0x64,0x3b,0xd6,0x0c,0x6a,0x7f,0x8f,0xff,0x52,0x11,0x90,0x0b,0x40,0x78,0xf6,0xa5,0xa0,0x4e,0xcd,0xc2,0x0d,0x2f,0xb8,0x3c,0x3c,0xc3,0x15,0xf2,0xa3,0x5f,0xf3,0x40,0x96,0x6f,0x89,0x91,0x32,0xbe,0x0e,0x63,0x4f,0xea,0xa2,0xc0,0x5d,0x30,0xb9,0x6d,0x21,0xeb,0x34,0xe4,0x65 .byte 0x64,0xa4,0xd5,0x29,0x68,0xa6,0x17,0x00,0x82,0x5c,0x65,0xf0,0xeb,0x74,0xa1,0x9b,0xdd,0x1a,0xf4,0xd8,0x00,0x1b,0xb0,0x0d,0xc7,0xe4,0x23,0x62,0xf6,0x81,0x9f,0xd8,0x81,0x3f,0xd8,0x0b,0xca,0x2e,0xd4,0x3c,0x10,0x44,0x14,0x66,0x1e,0xbc,0x1c,0xc8,0x0e,0xd5,0x0c,0x22,0x18,0xd1,0xec,0xf8,0x87,0x55,0x89,0x53,0x2a,0xf0,0x66,0xca .byte 0x88,0x98,0x9c,0x1e,0xa8,0x56,0x2e,0x5e,0x24,0xd2,0xd8,0x8d,0x6e,0x0c,0x81,0x55,0xf0,0x8d,0xa5,0x8c,0x3a,0x27,0xbc,0x2e,0xab,0xdd,0x6e,0x55,0xce,0xd7,0x9a,0x6b,0x2b,0x03,0x18,0x6b,0xf7,0x78,0x79,0x6c,0x64,0xb1,0xaa,0xff,0xd4,0x34,0xac,0x61,0xfd,0x51,0x03,0x41,0xd8,0x4b,0xad,0xd7,0xd2,0xfc,0x17,0x91,0xd0,0x90,0x15,0xd3 .byte 0xcf,0x3f,0x55,0x3d,0x8c,0x70,0x7a,0xda,0x0c,0x04,0x0a,0x29,0x5c,0x08,0x56,0xa8,0x60,0xea,0xd1,0xe7,0xff,0x53,0xc7,0x27,0xe3,0x21,0xe9,0xdc,0xb7,0x6c,0xc1,0x6a,0x4c,0x62,0xb2,0x67,0x79,0x24,0x8f,0x7d,0x96,0xd6,0x4c,0xa7,0x54,0xbe,0x07,0x85,0x53,0x9f,0xc9,0xbd,0x99,0x98,0x13,0x2a,0x49,0xcc,0xe5,0x70,0x56,0x90,0xbe,0xd3 .byte 0xd5,0x17,0x44,0x2e,0x11,0x3e,0x96,0x0b,0xc1,0x66,0x0d,0x36,0x2d,0x28,0x68,0xbd,0x8c,0x46,0x71,0x39,0x8f,0xd5,0xe3,0xd1,0x74,0xde,0x85,0x26,0x3c,0x8e,0xde,0x79,0xbe,0xf4,0x20,0xfc,0x3c,0x8b,0x73,0x0d,0x82,0xc0,0xa8,0x48,0x9f,0x4e,0x9f,0xb8,0xcd,0xc2,0x70,0xa7,0x54,0xe5,0x22,0x86,0x3a,0xf1,0xf0,0xbc,0x8b,0x74,0xea,0x9e .byte 0x45,0xbd,0xa5,0x54,0xc5,0x75,0x30,0xfa,0x5e,0x05,0x4b,0xc2,0xe3,0x09,0x4b,0x3d,0xfb,0x84,0x0c,0x96,0x36,0x2b,0xbf,0xcc,0xe2,0x15,0x39,0x6f,0xc8,0x91,0x56,0x0b,0xf8,0x4b,0x1b,0x61,0xa4,0x68,0xc0,0x06,0xaa,0xa9,0xef,0xea,0x69,0xdb,0xda,0x6a,0x50,0xa9,0x5a,0xb4,0x9b,0xf5,0xf0,0xbe,0x2f,0x34,0x20,0x96,0x84,0x70,0x0d,0xfe .byte 0x00,0x16,0x77,0x45,0x5b,0xf4,0x29,0xf1,0x41,0xb5,0x71,0x3e,0x91,0x5d,0x96,0x21,0xb4,0xb2,0x61,0x23,0x96,0xcd,0x28,0xaf,0x23,0xf0,0x45,0xc7,0xaf,0xd3,0x9e,0xb4,0x29,0xd7,0x68,0x5b,0x01,0xaa,0x5f,0x06,0x78,0x61,0xc4,0x61,0x49,0x01,0x0a,0xcc,0x2d,0xe1,0x03,0x27,0x07,0x11,0x9b,0x46,0x7b,0x8f,0xe0,0xfd,0xd6,0x72,0x14,0x1e .byte 0x0f,0xd0,0xbc,0x5d,0xd7,0xb5,0x86,0x86,0xd3,0x02,0xcc,0xd4,0x2a,0xaa,0x47,0x01,0x82,0x97,0x07,0x9b,0x11,0xb3,0xba,0x8d,0x40,0x6d,0x0b,0x71,0xe1,0xa0,0xd2,0x27,0x4c,0x04,0x4f,0x33,0x4b,0xe3,0xc4,0xb6,0x60,0x8d,0x0c,0x9b,0xbc,0xfb,0x21,0x8c,0x7a,0x59,0xf1,0xf5,0xfc,0x84,0x4c,0x98,0x97,0x36,0x6d,0x38,0x1c,0x2a,0x39,0x9d .byte 0x0c,0x0c,0x4d,0xf1,0xba,0x24,0x3f,0x05,0x3b,0x9e,0x39,0xc4,0xd2,0xec,0xbe,0x31,0x6a,0x6b,0xc6,0xff,0xe8,0x75,0x1a,0xad,0x2f,0xbd,0xa5,0xf6,0x4b,0xbd,0xb9,0x26,0x89,0xb0,0x99,0x47,0xb9,0x10,0xcf,0x20,0x4a,0xfb,0xa4,0xeb,0x9d,0xbe,0x90,0x15,0xed,0xba,0x43,0xf3,0xcc,0x2e,0x68,0x09,0x39,0xb3,0x53,0xc6,0xac,0xe5,0x5c,0x97 .byte 0x75,0x95,0x4d,0x49,0x84,0x2c,0x00,0xfc,0x1d,0x58,0x61,0x88,0x3c,0x0c,0x84,0x5d,0x60,0x6d,0x86,0x6c,0x2c,0x49,0xcc,0x6a,0xee,0xc3,0xb3,0x23,0x85,0xba,0x55,0x56,0x95,0x43,0x7b,0x74,0x22,0x9f,0x7c,0x91,0x2b,0xf6,0xeb,0x4c,0xc6,0x47,0x69,0x4a,0x41,0x80,0xee,0x81,0x8f,0xe8,0xd5,0x80,0x6c,0x0b,0x1b,0x0c,0x22,0x60,0x60,0x05 .byte 0x0a,0x9f,0x53,0x6f,0xca,0xcf,0x82,0xf7,0xd4,0x3d,0x44,0x66,0x7a,0x99,0x34,0xf1,0xf2,0xec,0xfe,0x08,0x2d,0x24,0x5f,0x32,0x45,0xb9,0x43,0x97,0x58,0xf4,0x8d,0x15,0xaf,0x27,0x19,0xc4,0xdb,0x73,0xfe,0xee,0x87,0x02,0xb3,0xeb,0xb2,0x9f,0x8d,0x1b,0x13,0xaa,0x19,0xbf,0x76,0x8b,0x3f,0xce,0xea,0x84,0xe9,0xc0,0x59,0x02,0x03,0xc0 .byte 0x88,0x54,0xa2,0x3e,0x90,0x45,0xcb,0x13,0xc3,0x8f,0x57,0xd7,0x29,0xd0,0xee,0x5e,0xe6,0xe2,0x76,0xf3,0xb3,0xd0,0x6c,0x98,0x80,0x8e,0x39,0xfb,0xd8,0x2b,0x6c,0x1a,0xab,0xba,0xb1,0x32,0x2a,0x9b,0xdd,0x30,0x6c,0xd9,0xb6,0xb7,0x75,0x90,0x05,0x7b,0x93,0xec,0x62,0x2b,0x90,0xd1,0xf4,0xc6,0x35,0x92,0x07,0x5b,0x45,0x9b,0x79,0x74 .byte 0x64,0xb0,0x25,0x1f,0xd1,0x38,0x76,0x39,0xa0,0x59,0x9d,0x22,0x97,0x73,0x24,0x86,0x55,0xbf,0xbc,0x4c,0x15,0xb3,0xb7,0x77,0x14,0x03,0x15,0x60,0xea,0xaf,0x72,0x84,0xbf,0x38,0x3c,0x6d,0xe0,0xa9,0xc7,0x3e,0xef,0xf4,0x44,0x43,0x5e,0xda,0x2a,0x1d,0x3d,0xc9,0x1d,0xf0,0xb6,0xb0,0x6b,0x11,0x50,0xa6,0x2d,0xed,0x75,0xd3,0x50,0xd5 .byte 0x7a,0xe5,0x96,0xf4,0x65,0x55,0x5a,0x89,0x69,0xf8,0xb8,0xa5,0x6f,0x68,0x7f,0xdf,0x1e,0x25,0xc7,0xe3,0xbe,0x50,0x5e,0x45,0x78,0x58,0xff,0xf5,0x45,0x6e,0xa5,0x10,0xfc,0xdc,0x0f,0x84,0x92,0x00,0xc2,0x01,0x50,0x66,0xfd,0x5c,0xfc,0x87,0xf9,0x80,0xfa,0x01,0xc1,0xc5,0x2e,0x5e,0xaf,0xbe,0xce,0xf2,0x11,0x7c,0xf2,0x67,0x10,0xf3 .byte 0xcc,0x16,0x0c,0xd8,0xe0,0xdf,0x68,0x37,0xef,0x50,0xba,0x16,0x72,0x79,0x9f,0xa7,0xb5,0x82,0x7f,0x6b,0x36,0x47,0x56,0x9d,0xbd,0xb6,0xc9,0xcf,0x79,0x11,0x0a,0x27,0xaa,0x3a,0x1c,0x58,0xc7,0x69,0x23,0xf1,0xcc,0xeb,0xea,0x15,0x7b,0xb5,0x75,0x32,0xb8,0x7f,0x65,0x74,0xca,0x1e,0x92,0x29,0x5a,0x24,0x4f,0xdd,0x8d,0x69,0x89,0xa6 .byte 0x83,0x75,0xa3,0x92,0x5c,0xba,0xa3,0x19,0xde,0x2c,0x8f,0xbd,0x97,0x80,0x2f,0xd7,0x57,0xde,0x95,0x0f,0x21,0x72,0xf8,0xe7,0xcf,0xc8,0xbc,0x3c,0x9d,0x8e,0xfb,0x34,0x41,0xee,0xe9,0x34,0x5b,0x25,0x48,0x3e,0x1b,0x64,0xd0,0x1a,0x6c,0x13,0xe3,0x69,0x49,0x51,0x97,0x81,0x62,0xef,0xa1,0xd9,0xef,0x7b,0xd6,0xc2,0x63,0x25,0x6c,0x50 .byte 0x8e,0xd0,0xfe,0x07,0xe6,0xc3,0xbc,0x47,0x6b,0x3d,0x20,0x3a,0x83,0x40,0x90,0x53,0xfb,0xa5,0x9a,0x36,0x1d,0x5d,0xbf,0xf7,0x60,0x27,0xef,0x59,0xd4,0x3c,0xbf,0xb0,0x22,0x15,0xea,0x9e,0xa4,0x59,0x9d,0x74,0x52,0x21,0xe0,0x37,0xda,0x2d,0x66,0xa3,0x9d,0x8e,0x9d,0x45,0xb3,0x2f,0x0a,0x60,0x0b,0xfa,0x09,0x8f,0x3f,0x33,0xc9,0xe3 .byte 0x54,0xfd,0xa2,0x7f,0x58,0xf9,0xcd,0xbf,0xa2,0xd6,0xe0,0x37,0x62,0x5d,0x0c,0xb5,0xf2,0x0a,0x2a,0xa3,0x29,0x96,0xb5,0x96,0x6b,0xba,0x53,0x3d,0xd4,0x11,0xe9,0x43,0x6b,0x44,0x43,0x9f,0xea,0x52,0x92,0xa4,0x13,0x91,0xc1,0x77,0xc3,0x31,0x25,0xe2,0xb5,0x53,0x82,0x7e,0x35,0x58,0x36,0x03,0x61,0x69,0xba,0x27,0x2b,0x65,0x42,0x40 .byte 0x4e,0xd7,0xc2,0x90,0xad,0x52,0x0b,0x66,0x07,0xb1,0x5f,0x07,0x4a,0x67,0x4a,0x61,0x90,0xbd,0x50,0x39,0xf8,0x11,0x59,0xc3,0x41,0xfb,0x1a,0x7f,0xcb,0xf7,0x99,0xc2,0x27,0x33,0x28,0x37,0xa1,0xff,0x1b,0x23,0x46,0x96,0xc1,0x4e,0x03,0x41,0x77,0x27,0xa7,0x68,0x60,0xaf,0xb8,0x7a,0x80,0xb9,0xc2,0xa6,0x9e,0x61,0xa5,0x90,0xa1,0x6a .byte 0xe3,0xb1,0xd1,0x28,0x9f,0x9f,0xf7,0xf7,0xc9,0xff,0x02,0x82,0xdc,0x81,0x96,0x3a,0x61,0xf4,0x37,0x91,0xc2,0x58,0x48,0x54,0xaf,0xd6,0x0c,0x2d,0x2e,0xbd,0xe9,0x13,0x07,0xf7,0xc5,0x71,0xe9,0xa9,0x9d,0x93,0xa4,0x61,0x29,0x10,0x29,0xfb,0x79,0x9e,0x2c,0x1a,0x3e,0xae,0x7d,0x0e,0xcf,0x52,0xaa,0xdc,0xf2,0xeb,0x5c,0xcc,0x9e,0x42 .byte 0xcf,0x2f,0xf1,0xe8,0x91,0x6a,0x07,0x15,0xb8,0x78,0x6e,0x42,0xd5,0x5f,0x3e,0x53,0x70,0xd6,0x93,0xd4,0xc0,0x43,0x25,0x49,0x54,0xb0,0x13,0xa1,0xc1,0x68,0xdb,0xa6,0xdc,0xf4,0xa6,0x7c,0x8a,0x1c,0xc8,0xaf,0x34,0xc5,0x9f,0x30,0x7a,0xe9,0x4c,0xc9,0x27,0x41,0x7c,0xa5,0xd3,0x7f,0xee,0x17,0x9a,0x3b,0x82,0x15,0xef,0x85,0x3d,0x2b .byte 0xba,0xc7,0xb8,0x8c,0x13,0xf6,0x0d,0x53,0x33,0x04,0x0a,0x6b,0x8c,0xe5,0xf3,0xc5,0x5f,0xf6,0x7b,0xdb,0x6d,0xa4,0x63,0xef,0xe3,0xcd,0x32,0xb2,0x11,0xab,0x0a,0x01,0x9b,0xc7,0x95,0x51,0x3d,0x34,0x25,0x51,0x2a,0x63,0x73,0x99,0xa7,0x62,0x6d,0x71,0x23,0x83,0xd5,0x25,0x02,0x96,0x26,0xbb,0x25,0x35,0xb9,0x20,0xb3,0x25,0x84,0x07 .byte 0x39,0x9c,0x45,0x67,0xfb,0x89,0x61,0x38,0xb5,0xdf,0x0a,0x9d,0x9f,0xad,0x2f,0x80,0xe2,0x9c,0x6b,0x88,0x84,0xf3,0xea,0xbd,0x75,0x00,0x71,0x21,0x41,0xfe,0xdc,0x2c,0x7b,0xb1,0x3c,0x40,0x99,0xc3,0xf9,0x2b,0xab,0x40,0xf9,0x2e,0x3a,0x65,0x58,0xe5,0x42,0x30,0x5c,0x05,0xf4,0x89,0x2b,0x72,0x54,0x7c,0xce,0x1a,0xa7,0xd4,0xf0,0xc2 .byte 0x05,0x63,0x1a,0x67,0x31,0xb3,0x55,0xdc,0x9f,0x07,0x99,0xa3,0xed,0x84,0x53,0x94,0x7c,0x5f,0x63,0x1d,0xdb,0x51,0xfa,0x92,0xc4,0x5d,0xb7,0x96,0xef,0x26,0x2a,0x09,0x8b,0x5a,0xa5,0xca,0x63,0x41,0x33,0x9e,0xd1,0x00,0x5e,0xaf,0x71,0xfe,0x3a,0x97,0xa4,0xaf,0xe8,0xae,0xce,0xfa,0x82,0x90,0x39,0x00,0x6f,0xd6,0xc4,0x54,0x84,0xf9 .byte 0x0f,0x96,0xfc,0xe8,0x6e,0xce,0xc4,0x55,0xdf,0xcd,0xd3,0xfa,0x65,0xcd,0xc4,0x42,0xe3,0x9f,0xab,0xbd,0xcf,0xc7,0xd3,0xe2,0xa8,0xc4,0xc5,0x06,0xc2,0xf5,0xe7,0x86,0xa4,0xd0,0x7e,0xf6,0x1c,0xd0,0x3c,0x4d,0x15,0x30,0x50,0x43,0x02,0xce,0xd2,0xf1,0xc4,0x28,0xe6,0x54,0xfc,0x21,0x6a,0xd5,0xdd,0xc3,0x39,0xf8,0x57,0x79,0x36,0xec .byte 0x11,0x24,0x30,0xa6,0xcb,0xa7,0xa4,0x18,0x2e,0x71,0xe5,0x2e,0x31,0xf0,0x0b,0xd1,0xa4,0x77,0x4d,0xbf,0x9f,0x8d,0xb6,0x53,0x49,0x62,0xb0,0xba,0x29,0xde,0xb9,0xc6,0xdd,0x62,0x09,0x0e,0x1e,0xe2,0x78,0xd1,0x3e,0xef,0x9d,0x5d,0x91,0xf1,0x1a,0xd9,0xb8,0x81,0x4b,0x3c,0xfd,0xe9,0x54,0x4a,0x80,0xc9,0x7c,0x37,0xde,0xca,0x92,0xe2 .byte 0x0c,0x66,0xa5,0xfc,0xf1,0xe4,0x9c,0xb3,0xdb,0x15,0x11,0xb4,0xc2,0x21,0x5a,0x4e,0xb1,0x54,0xd1,0x0d,0x78,0x9c,0xaa,0xc2,0x8d,0x10,0xf7,0x24,0x3a,0xb7,0xef,0x2b,0x5b,0x1e,0xa6,0x13,0xcd,0xa9,0x06,0x48,0x98,0x80,0x61,0x67,0xca,0xef,0x76,0x10,0x83,0xe8,0x98,0x43,0xe2,0xa6,0x00,0x5a,0x3c,0xde,0x19,0x6a,0x71,0x21,0x16,0x8d .byte 0x76,0xe7,0xa1,0x82,0x8b,0xb9,0x21,0x93,0x97,0xbd,0xe2,0xac,0xb9,0xa3,0x57,0x97,0x2a,0xcb,0x27,0xcc,0xcb,0x74,0x87,0xa2,0xa1,0x37,0x63,0xda,0xec,0x64,0x9c,0x56,0x62,0x8f,0xc9,0x5f,0xd3,0x26,0x4b,0xae,0x90,0xc1,0x1a,0xda,0x3c,0x59,0xf1,0xc0,0x47,0xf1,0xa3,0xba,0xd0,0xd5,0x30,0x97,0x3f,0xfc,0x2c,0x88,0x14,0x05,0x34,0x56 .byte 0x8c,0x61,0x21,0xce,0x71,0xb5,0x60,0x62,0x1d,0x68,0x63,0x07,0x3a,0xee,0xf4,0x19,0x6c,0x59,0xdc,0xb8,0x0e,0x67,0xc0,0x74,0x58,0x13,0xe0,0x18,0xb1,0xf0,0x54,0x5c,0x83,0xdf,0xff,0x65,0x6c,0xa6,0xf7,0xff,0xc1,0x50,0x47,0x87,0xf0,0xea,0xa5,0x76,0x19,0x70,0x91,0xaa,0xc0,0x87,0x0f,0x31,0xbb,0xd6,0x7b,0x52,0xb2,0xd6,0x49,0xc1 .byte 0x41,0xdd,0xec,0x9a,0x41,0x22,0xf6,0xc5,0x80,0x80,0xbb,0x2f,0xb9,0x45,0xbd,0x6e,0xef,0x14,0x48,0x96,0xfa,0x9c,0x87,0xb2,0x0b,0x68,0xbf,0xcb,0xe3,0xe3,0x97,0x13,0xf9,0x43,0x66,0x65,0xad,0x18,0x60,0x96,0xc5,0x70,0x91,0x29,0x0d,0x91,0x8c,0xcb,0xcb,0x03,0x6c,0xd2,0xfa,0xf6,0x96,0x19,0x18,0x20,0x15,0x8e,0x77,0x9b,0x74,0xa5 .byte 0x3d,0x6e,0x76,0xc6,0x3c,0x8f,0x6f,0x72,0xe2,0x8b,0xcd,0xa6,0x17,0x26,0x00,0x36,0xac,0x91,0x19,0x1e,0x5c,0x17,0x55,0x6f,0xde,0x0c,0x31,0xe4,0xec,0xd1,0x90,0x1d,0xea,0xea,0x77,0x2f,0x8a,0xee,0x44,0xea,0x39,0xeb,0x00,0x1d,0xde,0xa6,0x37,0x40,0x3d,0x97,0xd2,0x88,0x0e,0xbc,0xbd,0x2c,0xef,0xda,0x3c,0x2e,0x8e,0x0d,0xf3,0xfc .byte 0x88,0xcb,0x34,0x89,0x3f,0x86,0xec,0xfe,0xf0,0xcd,0x0b,0x80,0xd4,0x02,0xdb,0xd6,0x06,0xf3,0xbe,0x52,0x9a,0xf0,0x1b,0xe7,0x36,0x7d,0xcc,0x84,0xf5,0x02,0x11,0xf6,0xdf,0xb6,0x67,0x3f,0x8a,0xdd,0x5a,0x32,0x12,0xf0,0x3e,0x72,0x55,0xf6,0xac,0xae,0xe4,0x4b,0xbd,0xc5,0x90,0xba,0xfe,0xc0,0x39,0x17,0x24,0xad,0x8b,0xb3,0x93,0x4e .byte 0x15,0xcc,0xd7,0xcc,0x5c,0x46,0x0e,0x61,0x7a,0x70,0x7f,0x01,0x23,0x7d,0x38,0xbc,0x27,0xb1,0x47,0x25,0x5b,0x9f,0x9c,0x53,0x95,0x40,0x94,0x33,0x16,0xfa,0x31,0xf1,0xb4,0xa3,0xb8,0x50,0x68,0x0d,0x47,0x1d,0x55,0xb3,0x26,0xfd,0xdc,0x4c,0xa8,0xc0,0x02,0xc1,0x53,0x56,0xd9,0x09,0xd8,0xdb,0xfa,0x4f,0xeb,0x33,0x00,0x57,0x28,0x34 .byte 0xf1,0x43,0x5b,0x1d,0xd0,0x13,0xa1,0x90,0x87,0x96,0x97,0xb9,0x28,0xe1,0xa2,0xc0,0xcf,0xae,0xe0,0x7e,0x53,0x3d,0xe3,0xfe,0x35,0x33,0xa9,0x54,0x36,0xb3,0xfb,0x03,0xfc,0x76,0x23,0xf3,0xce,0x58,0x90,0x8a,0x90,0xa5,0x7c,0x99,0x06,0xfc,0x65,0x67,0x13,0xde,0x0c,0x6a,0x38,0x7a,0x9a,0xc1,0xc3,0x3a,0x66,0x99,0x4c,0xed,0x0a,0x15 .byte 0xb1,0xf0,0x9e,0xd0,0x06,0x0e,0xce,0x84,0xe1,0xd7,0xa8,0xe3,0x12,0xb4,0x1a,0xb3,0x5d,0x86,0xda,0xcb,0xd7,0xd2,0x6c,0x1c,0xfa,0x2d,0x4e,0xc3,0x8d,0xe0,0x9d,0x8b,0xa3,0x9d,0xd7,0xf1,0xc5,0x29,0xa5,0x69,0x59,0xea,0x9d,0x85,0x78,0x05,0x14,0x31,0xed,0x91,0x8b,0x80,0xb6,0xd3,0xf5,0x9f,0x5f,0xa1,0x7b,0xe7,0x83,0x81,0xfa,0xa5 .byte 0x4c,0x4d,0x2a,0xae,0xf0,0x09,0x87,0x4e,0x69,0x4f,0x12,0xf7,0xbf,0x0f,0xaf,0x1f,0x9d,0xdb,0x98,0xbf,0xed,0xfe,0xea,0x0a,0xe2,0x8c,0x7d,0x20,0x04,0x85,0x12,0x15,0xf2,0x05,0x93,0x88,0xa7,0x85,0x49,0xbe,0xdf,0x33,0x96,0xc0,0x4a,0x7a,0xfc,0x89,0x01,0xdb,0x09,0xdb,0xef,0xf3,0x43,0x48,0x5b,0x2f,0x41,0x6f,0x10,0x77,0x2f,0x5b .byte 0xaa,0xaa,0x9c,0x51,0x69,0xf8,0x9b,0x6d,0x82,0xaa,0xaa,0x00,0x5d,0xfa,0xdf,0x74,0x35,0xcd,0xd1,0xf7,0xbe,0xcd,0x39,0xbf,0x94,0x5b,0x9a,0x22,0xd4,0x08,0x57,0x17,0xfa,0x89,0x40,0x44,0x9c,0x36,0x8d,0x0d,0xe5,0x1c,0x9c,0xc1,0xca,0x47,0x86,0xc2,0x3c,0xc3,0x93,0x75,0xcd,0x4c,0x3c,0xf5,0xb9,0xbe,0x2d,0x78,0x2c,0x08,0xaa,0xbf .byte 0x4d,0x4c,0xac,0x64,0x89,0xfe,0xf3,0x41,0x4a,0xc3,0xec,0x3e,0x5f,0x1e,0x78,0x20,0x4e,0x49,0x9d,0xe5,0xa0,0x18,0xb6,0x00,0x0e,0x51,0x17,0x6e,0x56,0xc3,0x75,0xca,0x77,0x61,0xea,0x6e,0x52,0xa8,0x2c,0xdc,0xdd,0x8d,0x5f,0x2b,0xd5,0x30,0x0d,0x08,0x41,0x5c,0x8d,0x97,0xc9,0xee,0x7b,0xa2,0x10,0x5f,0x3c,0x57,0x68,0xa2,0x2c,0xc8 .byte 0x3e,0xde,0x4b,0x10,0x68,0xaf,0x7d,0xd1,0xdc,0x30,0x33,0xf7,0xff,0x7a,0x23,0x66,0x86,0x56,0x24,0xc1,0x45,0xff,0x92,0x28,0xe4,0xd8,0xb0,0x18,0x63,0x1a,0x16,0xc2,0x59,0x32,0x7b,0x52,0x89,0xa5,0xac,0x71,0x61,0x28,0xc1,0xef,0xcb,0xcc,0x65,0xc3,0x4e,0x62,0xf0,0xed,0xef,0xdf,0x40,0x2b,0x69,0x62,0xe2,0xc4,0x31,0x4f,0x73,0xa8 .byte 0xff,0x17,0x87,0xd2,0x45,0xc2,0x18,0x13,0xbe,0x7f,0x64,0x3e,0x6d,0x61,0xf2,0x18,0x16,0x5a,0x02,0x98,0xf1,0x47,0x5c,0xd4,0x76,0xcf,0x5b,0x29,0x0e,0x9d,0xf9,0x82,0x5b,0x46,0xf9,0x76,0x53,0xcd,0xa0,0xa4,0xf3,0xd8,0x33,0xb2,0xcb,0x3d,0x51,0xf2,0xce,0x07,0xea,0x7d,0x8b,0x65,0xba,0xe0,0xee,0x28,0x37,0x1a,0x31,0xbe,0x70,0x4a .byte 0x69,0xac,0x35,0x32,0x4d,0xfa,0xb2,0x72,0x0d,0xde,0x26,0x1c,0x44,0xc0,0x20,0x54,0x73,0xce,0xa2,0x9d,0x9a,0xe2,0x13,0x8f,0xcd,0x5e,0x45,0x2c,0x32,0x2d,0x47,0x1d,0x4b,0x0f,0x78,0xa9,0xa2,0xe3,0xbb,0xcc,0x75,0x6f,0xbe,0xf6,0x76,0xfd,0xa2,0x58,0x44,0x31,0xe4,0xb3,0x9a,0xc4,0x82,0xeb,0x9a,0x73,0x0d,0x21,0x5d,0x0b,0x01,0xf1 .byte 0xfc,0xc7,0x4e,0xfc,0x26,0xb8,0x2d,0x04,0x59,0x1a,0xc4,0x42,0x4a,0x7c,0x67,0xc4,0xe5,0x26,0x81,0x81,0xd6,0x28,0x3b,0x43,0xac,0xbb,0x5f,0x31,0x4d,0x14,0x68,0xb8,0x2c,0x3a,0xb3,0xe4,0x72,0x7d,0x07,0x80,0x22,0x80,0xaf,0x42,0xb4,0x0f,0x2b,0x79,0x7e,0xac,0x16,0xed,0x66,0x93,0x9c,0x90,0xe0,0xc1,0x33,0x51,0xd5,0x4a,0x16,0x4d .byte 0x5f,0x55,0x7b,0x19,0x21,0x8e,0xe2,0x51,0x3d,0x94,0xf7,0x49,0x65,0x03,0x85,0xed,0x7c,0x3f,0xa9,0x28,0x96,0x20,0x95,0x44,0x62,0x8c,0xc8,0x88,0x59,0x40,0xf2,0x3e,0x05,0xa2,0x4d,0x7e,0xe5,0x9d,0xb8,0x01,0x9f,0x07,0x83,0x93,0x6d,0x0b,0x84,0xeb,0xe1,0x01,0xc0,0xc0,0xd1,0xb4,0x24,0xe4,0x43,0xdb,0x3f,0x2c,0x4b,0xe3,0x61,0x11 .byte 0xb5,0x7a,0x6a,0xf0,0xe7,0xc6,0x96,0x78,0x51,0x4b,0x21,0xec,0xb5,0x20,0xec,0xc4,0x18,0x79,0x84,0x14,0x07,0x33,0x82,0x31,0x9f,0x9e,0xb3,0xe0,0x8f,0x7b,0x84,0x2d,0xef,0xb5,0x73,0x17,0xaa,0x81,0x07,0xd2,0x21,0xd6,0x85,0x7b,0x07,0x61,0x57,0xd3,0x27,0x6c,0x5b,0x8a,0x72,0x65,0xfe,0xbb,0x10,0x1a,0xd9,0xce,0xf0,0xf8,0x70,0x55 .byte 0xe7,0xf5,0xd7,0xf7,0x4c,0xe1,0x5f,0xab,0x58,0xfd,0x8b,0x5f,0xe4,0x84,0x20,0xd9,0x6b,0x35,0x65,0xb2,0x9f,0x38,0xe7,0x6d,0xa5,0x69,0x64,0x64,0x6a,0x6e,0xf9,0x6c,0x42,0x0b,0x1f,0xbd,0xe3,0x0c,0xb4,0x62,0xf6,0x68,0x72,0x4b,0x58,0x24,0xd4,0x9d,0x91,0x66,0x9e,0x73,0x2b,0x69,0xe5,0xee,0xf5,0xb6,0x57,0x4c,0x24,0xef,0xc2,0xe5 .byte 0x33,0xb1,0x96,0xb4,0xf9,0x53,0x25,0xb3,0x1c,0xe8,0x59,0x17,0xe4,0x85,0x24,0xd1,0x9e,0x13,0x35,0x47,0x8e,0x01,0x06,0x42,0x4f,0x8f,0xd0,0x2f,0x0d,0x5a,0x8b,0x96,0xd0,0xbd,0x8e,0x67,0xce,0x47,0x40,0x49,0x17,0x7c,0xe4,0x89,0xca,0x63,0x4e,0xef,0x99,0xf9,0xbc,0x20,0xf1,0xf0,0xca,0xe4,0xe2,0xb1,0x0c,0xfe,0x68,0xc1,0xe8,0xae .byte 0x27,0x11,0x59,0x1b,0xd4,0x3e,0xb9,0xbe,0x6c,0x25,0x59,0x36,0xc1,0xf6,0x27,0x21,0x47,0x32,0xe8,0x05,0xec,0xc4,0x07,0x22,0xbd,0xcb,0x12,0x72,0x9f,0x1c,0xdd,0xc9,0xbe,0x2f,0xb4,0x84,0x2c,0xf3,0xfb,0x91,0xe4,0xe8,0x5b,0x96,0xe1,0xa1,0x7a,0xa6,0x6d,0xfe,0x94,0xd3,0x2a,0x94,0x86,0x7f,0xfc,0xa2,0x48,0xb3,0xc7,0x60,0xb2,0x97 .byte 0x27,0x4d,0xe3,0xd2,0x2b,0x8e,0x44,0x96,0x57,0x11,0x8a,0x78,0xba,0x12,0x91,0x9d,0x3d,0x1e,0x87,0xcb,0xdc,0x79,0xef,0x9a,0x37,0xd8,0x62,0x52,0xd2,0x0b,0xb7,0x3e,0xf0,0x8c,0xac,0xd1,0xfb,0x9c,0x3a,0x63,0x4b,0x0f,0x92,0xf0,0x1e,0x56,0x33,0xb1,0xfb,0xc3,0x2b,0x51,0xbd,0x30,0x4c,0xc0,0x65,0x21,0xeb,0x98,0x71,0x64,0xa3,0x6b .byte 0x31,0xe2,0xd9,0x52,0x53,0xc9,0x4c,0xc9,0x93,0x00,0xd0,0x26,0x57,0x3e,0x72,0x4a,0xb2,0x43,0x33,0x9d,0xb6,0xbc,0x68,0x9f,0x28,0xd7,0x00,0x77,0xcc,0x1c,0x0c,0xf1,0x91,0x91,0x77,0x63,0x1e,0xcf,0x8f,0x89,0x89,0xf5,0xe0,0x71,0xa3,0x59,0x49,0x79,0xad,0x7a,0x3d,0x1f,0xcc,0xc0,0x74,0x11,0x56,0x56,0x8d,0x04,0x1c,0xef,0xba,0xec .byte 0x05,0x85,0x82,0x0c,0x67,0xae,0xa3,0x40,0x4e,0x79,0x65,0xcf,0x72,0xd4,0x79,0xcc,0x96,0x0f,0x89,0xea,0x9a,0xbf,0x52,0x25,0x76,0x08,0x6e,0xdc,0x51,0x92,0xb3,0x6d,0x75,0x01,0x7b,0x13,0xa2,0x62,0xff,0x56,0x1d,0xbb,0xf1,0x8e,0x37,0x35,0x23,0x08,0xb3,0x05,0xd4,0xcc,0x74,0x35,0x63,0xae,0x67,0x51,0x10,0xc2,0xb6,0xf6,0x7f,0xc5 .byte 0x92,0x1a,0x11,0xb0,0x73,0x28,0x08,0xf0,0xee,0x32,0xab,0x3d,0x67,0xd5,0x96,0xc1,0x3a,0x55,0x3a,0x7a,0x59,0xf3,0x42,0x5e,0x8c,0xc6,0x8f,0x17,0xf6,0x30,0xdf,0x8f,0x06,0x6a,0xe3,0x92,0x02,0x20,0x69,0xc3,0x45,0x4b,0x04,0x7c,0x5f,0x5b,0x42,0x30,0x33,0xd5,0x11,0x66,0x57,0x76,0x24,0x7f,0xa7,0xa9,0x79,0x24,0x17,0x84,0x43,0xfd .byte 0xbc,0x44,0xee,0xfc,0xe9,0xeb,0xeb,0x61,0x6b,0xdc,0x32,0x9b,0x6f,0xf0,0x5b,0x9e,0x00,0x02,0x18,0x9c,0xb8,0xe2,0x2e,0x23,0x6a,0xf8,0x28,0x99,0x6d,0x03,0x87,0x4a,0x71,0xdb,0x00,0x13,0x38,0x86,0x2d,0x77,0xb6,0xd5,0xaf,0xf2,0x62,0x3b,0xe6,0xfc,0x75,0x77,0x39,0xee,0xbc,0x1c,0xc7,0xcd,0x9f,0xbf,0xa1,0xb2,0x86,0x0c,0xcc,0x4d .byte 0x47,0xbd,0xcd,0x3d,0x65,0xe4,0xd9,0x6e,0x2f,0xeb,0x1b,0x4f,0x49,0x05,0xd9,0x85,0x25,0xa1,0xdd,0xdd,0xc5,0x80,0x91,0x39,0x46,0x47,0x93,0x2a,0x31,0x56,0xe3,0xbf,0x7f,0x71,0x5b,0xc9,0x64,0x25,0x36,0x06,0xc8,0xf9,0xd6,0xad,0x5d,0x6f,0xe3,0x6d,0xbf,0xd5,0x68,0xb6,0x36,0x9a,0xae,0xa4,0x6c,0x65,0xc8,0x10,0xc0,0x04,0x88,0x4a .byte 0xf1,0x9c,0x45,0x63,0xfb,0xc1,0xc6,0x7f,0x63,0x1d,0xe9,0xe4,0xa9,0x2e,0xd9,0x5b,0xab,0x89,0x31,0x70,0xa7,0xe2,0x08,0x23,0xcf,0x43,0x25,0x28,0x89,0x9b,0xb8,0x2a,0xe8,0xc9,0x02,0x9d,0x2b,0xf0,0x1e,0xe6,0x50,0xf7,0xb6,0x1e,0xe1,0xf1,0x65,0x22,0x86,0xa8,0x91,0xfd,0xc5,0x8b,0x0f,0xa0,0xd5,0x89,0xa4,0x9b,0xd1,0xb0,0x27,0x37 .byte 0x46,0x77,0x00,0x64,0xfd,0x93,0x8c,0x44,0x84,0x3d,0xb3,0xc4,0xd1,0x68,0x2a,0x00,0x2c,0xc2,0x35,0xc7,0x31,0x96,0x73,0xef,0x05,0x8c,0x47,0x94,0x09,0x83,0xbc,0xc0,0x9f,0x5b,0x70,0x1d,0xe0,0xed,0x9d,0x1a,0x07,0xb2,0xa3,0x20,0xfd,0xa1,0x6b,0xa7,0xee,0xb2,0xd3,0x25,0x33,0x63,0x9e,0x12,0xce,0x00,0xb3,0xad,0xb6,0x56,0xc3,0xd4 .byte 0x94,0xe7,0x3d,0x45,0x9d,0xcb,0x76,0x0c,0x74,0xf0,0x26,0x9f,0x56,0x10,0x58,0xf0,0xf7,0x6f,0x09,0xc8,0x9f,0x84,0x69,0x64,0x7b,0xdb,0xd9,0x89,0xe4,0xa3,0x9c,0x3b,0xc7,0x94,0x46,0x41,0x58,0xb0,0xa4,0x44,0xaa,0x27,0x11,0xfc,0x16,0x24,0x57,0x36,0xca,0xf7,0x55,0x76,0x0e,0x9f,0x72,0x37,0x61,0x46,0xe5,0xe5,0x9d,0x83,0xac,0x18 .byte 0xdf,0x81,0xf1,0xa4,0xa3,0x3b,0x92,0x1d,0x33,0x9f,0x25,0xf0,0x6a,0x87,0x15,0x62,0x6d,0x4c,0x72,0x68,0xe0,0x0a,0x74,0x62,0x27,0x00,0xd6,0xee,0xdd,0x16,0xef,0xb4,0x4e,0x3f,0xad,0xe0,0x03,0xed,0x64,0xc4,0xbd,0x66,0x9d,0x3e,0xf4,0xec,0xd6,0x06,0x96,0x5d,0x11,0x0d,0x87,0x5e,0x62,0xba,0xdb,0xff,0x9c,0xb5,0x08,0x84,0xa3,0x54 .byte 0x22,0x60,0x07,0x9e,0x45,0xa4,0x9f,0x8b,0xb3,0x3f,0x50,0x20,0x76,0x21,0x8a,0xc4,0xf1,0xb8,0x5c,0x1d,0xe2,0x88,0x0e,0xf6,0x8c,0x3e,0x75,0x85,0x8f,0xa1,0x71,0x72,0xf2,0x74,0x24,0x69,0x43,0x10,0xef,0x7b,0xb0,0x8d,0x1a,0x1f,0x1a,0x24,0xaa,0xdf,0xaa,0xbe,0x70,0x60,0x34,0xf0,0x91,0x03,0x72,0x20,0x19,0x8d,0xa5,0xaf,0xed,0xa8 .byte 0xd7,0xe4,0x12,0xad,0x09,0x32,0x85,0x63,0x79,0x3a,0xf4,0x72,0xde,0x27,0x76,0xa1,0x8e,0x73,0xc8,0x04,0xf9,0xd0,0x09,0x03,0x44,0xbb,0xb8,0x5a,0x0f,0x36,0x51,0x8f,0x22,0xb4,0xaf,0xb0,0xc9,0xc0,0xcb,0x43,0x78,0xac,0x75,0x4a,0xf4,0x42,0x31,0x7e,0x25,0x92,0x73,0x10,0xfb,0x66,0x94,0xe9,0xd8,0xc6,0xcb,0xd2,0xc2,0xb1,0xa6,0x2c .byte 0x34,0x86,0xb9,0x9a,0xb1,0xc5,0x86,0x0d,0xb7,0xbd,0xee,0x6b,0x94,0x94,0xc6,0x30,0x62,0xda,0x90,0xc7,0xef,0xbd,0xc7,0x3c,0x99,0x0a,0x0b,0xbf,0x7a,0xfa,0xa7,0xd7,0xca,0x4a,0xe7,0x33,0x6e,0xfa,0x81,0xb1,0xb9,0x3a,0xb9,0x9f,0x20,0x53,0xb7,0x62,0xe6,0x99,0xd7,0x17,0x09,0x64,0xe8,0x81,0xac,0x39,0xde,0x4f,0x03,0x24,0x8e,0x8f .byte 0x24,0x0f,0x24,0x54,0xe8,0x1e,0xfb,0x31,0x36,0xdc,0x22,0x43,0xba,0x69,0x2c,0xf6,0x98,0xcf,0x1f,0xd4,0x45,0x17,0x92,0x50,0xda,0x85,0x59,0x7b,0x11,0x01,0x32,0x4b,0x73,0xd9,0xc8,0x4c,0x1b,0x22,0x96,0x27,0x4a,0x2f,0x26,0x9d,0xf5,0x8d,0x43,0xb3,0x2f,0x62,0x5a,0x1d,0x19,0x78,0x51,0xcf,0x65,0x09,0x88,0x7a,0x09,0x2b,0x81,0xc2 .byte 0x5b,0x03,0xee,0x13,0x1b,0xb9,0x4f,0x6d,0x6d,0xb6,0x58,0xdf,0x87,0xc3,0x24,0x01,0x48,0x9d,0xe1,0xf0,0x6d,0x04,0x9e,0x88,0xab,0x11,0x4e,0x46,0x32,0xf3,0xfd,0xb3,0x9c,0x01,0x3d,0xd2,0x09,0x35,0x3e,0xf2,0xb0,0x97,0x65,0x47,0x9a,0x14,0x15,0xd0,0x90,0xf2,0x6c,0x66,0xb2,0x66,0xf5,0x97,0xe2,0x69,0x23,0xd8,0xdb,0xbe,0xcd,0x4c .byte 0x88,0x78,0x1a,0x8f,0x5b,0xb6,0xcd,0xd0,0xd3,0x65,0x03,0x76,0x63,0x59,0xd1,0xdf,0xed,0x55,0x1b,0xae,0xd3,0xf6,0x59,0x41,0xb5,0x2c,0xf6,0x62,0x6c,0x48,0xc1,0x77,0xc8,0x78,0x94,0xd8,0xa7,0xf4,0xa3,0x8c,0x75,0x25,0xe7,0xf3,0xf4,0x5b,0xaf,0x6c,0xf6,0xb0,0x88,0xac,0x30,0x76,0x87,0x71,0x10,0x49,0x70,0x90,0x31,0x28,0x39,0x75 .byte 0x7c,0x43,0x41,0x05,0x3b,0x51,0x35,0x2e,0xe6,0x9c,0xa9,0xcf,0x4a,0xfc,0xa8,0xc7,0xb5,0xd7,0x5a,0xa8,0x4b,0x51,0x75,0xab,0x40,0x19,0xc7,0xa0,0xbc,0x6d,0x3f,0xb0,0x1b,0x2b,0x85,0x51,0x04,0xae,0xb2,0x7a,0xbd,0x3b,0xd2,0x04,0xb5,0x2a,0x69,0xed,0x7d,0x24,0x15,0x76,0xca,0x25,0x15,0xd8,0x69,0x1c,0xd4,0xc3,0x3f,0x14,0x07,0x78 .byte 0x6b,0xf6,0x5a,0x37,0xaf,0x4a,0x73,0x52,0xa2,0xe6,0x82,0xb6,0xc7,0xd2,0x6a,0x20,0x58,0xc4,0x2b,0x9b,0x95,0x81,0x5e,0xdf,0x37,0x9d,0xbc,0x76,0x9b,0xee,0x36,0x82,0x9f,0xe2,0x0a,0x7f,0xb5,0xb1,0xb4,0x2c,0x89,0xc1,0xe4,0x97,0x2d,0x01,0xc3,0x7e,0xe4,0x39,0x07,0xed,0x5a,0xa7,0x06,0x6d,0xce,0xe9,0xa8,0x2f,0x5d,0x16,0x2e,0x1f .byte 0xfc,0x20,0x34,0x32,0x8b,0xd7,0xd0,0xd1,0xbc,0x3d,0x0a,0xa8,0x1e,0x7c,0xc8,0x68,0x37,0x3a,0xa5,0xcb,0xee,0x56,0xc3,0x9f,0xb1,0xb4,0x92,0x00,0x6a,0xd9,0x9b,0x0c,0x4a,0x6a,0xd0,0xdf,0x7d,0xa4,0x2f,0x96,0x85,0xe8,0x4a,0x2a,0x34,0x77,0xfe,0xc3,0xaa,0x35,0xb0,0xd1,0xf2,0x4d,0xeb,0x1c,0x9f,0x17,0x44,0xca,0x4e,0x53,0x2b,0xc4 .byte 0xe6,0x8e,0x97,0xfb,0x2b,0xb2,0x50,0xba,0x9b,0x79,0x72,0x3a,0x52,0x3f,0x5c,0xf2,0xef,0xee,0xe2,0x13,0xdc,0x2a,0x9b,0x7f,0x48,0xec,0xad,0xf1,0xa2,0xcf,0x38,0x36,0xe6,0x67,0x16,0x2c,0x9d,0x13,0x33,0xc9,0x45,0x10,0x9a,0x70,0x7d,0xf9,0xcb,0x7b,0xe5,0x00,0x20,0xbd,0x7d,0xc0,0x6c,0xde,0xae,0x87,0xb9,0x3a,0x18,0xf5,0x9e,0xd3 .byte 0x65,0x32,0x97,0x50,0x9c,0x47,0xb2,0x3f,0xe3,0xa4,0x76,0xfb,0xc8,0x4d,0x8b,0xf3,0x8c,0x19,0x1e,0x18,0xf1,0x3d,0x52,0x13,0xbf,0xfd,0x25,0x50,0xc5,0x07,0xc7,0x8f,0x9e,0x5e,0xac,0x0a,0xfa,0x35,0xfa,0x3b,0xd4,0x74,0x6d,0x42,0xb1,0x7b,0x98,0x6c,0xe4,0xe5,0x26,0xf3,0xf7,0x08,0x44,0xa8,0x2e,0x7d,0x11,0x05,0x72,0x63,0x39,0x27 .byte 0x4f,0x60,0x2e,0xbf,0x78,0xa9,0x5e,0x41,0x33,0x36,0x01,0x55,0x8b,0xba,0x7f,0x6c,0x53,0x38,0xfe,0x98,0x9e,0x9f,0x0f,0x7f,0x01,0xda,0x62,0xc6,0x5c,0x11,0x3f,0x21,0xfa,0xf6,0x15,0xda,0xb1,0x41,0xe5,0xc8,0x9f,0x77,0xb2,0xa7,0xc5,0x4e,0xfe,0xce,0x40,0xc8,0x76,0xc1,0xa2,0x68,0x93,0x4a,0x81,0xd2,0x92,0xd1,0x21,0x81,0x42,0x9e .byte 0x44,0x4a,0x45,0xa3,0x9f,0xbf,0xa1,0x8a,0x68,0x27,0xcf,0x27,0x60,0xcb,0x28,0xd0,0x56,0x97,0xd2,0x2b,0xf4,0x3c,0xb9,0x5e,0x9e,0xa8,0xdd,0x35,0xbe,0x0e,0x7f,0xf6,0x37,0x4d,0x8a,0xb5,0xd1,0x31,0xec,0x50,0xfd,0x54,0xc5,0xf8,0xc5,0x83,0xce,0xfb,0x35,0x79,0x37,0x1e,0x8f,0xaf,0x3f,0x7d,0x82,0x2d,0x01,0x8c,0x09,0x27,0xe9,0xcb .byte 0x6a,0xfd,0x66,0x99,0x22,0x2d,0x8f,0xe2,0xb4,0x28,0x1d,0x17,0x23,0x85,0x2e,0x15,0x20,0x84,0x93,0xcc,0x3c,0x26,0x83,0x9e,0x5a,0x20,0x22,0xf4,0x9a,0x38,0x97,0xaf,0x7d,0xb9,0xb9,0x5e,0x06,0x30,0x67,0xc6,0x3b,0xf8,0x2e,0xe0,0x96,0xdc,0xa4,0x4e,0xb7,0xf5,0xe0,0x93,0xc3,0xcc,0x03,0xcf,0x69,0x18,0x0b,0x69,0x9c,0xb2,0xe2,0x71 .byte 0xb5,0x58,0xde,0xf1,0xa9,0x43,0x30,0x62,0x98,0x75,0x29,0x48,0xca,0x84,0x72,0xdc,0xf8,0xfa,0x10,0x67,0x15,0x08,0xb6,0x5d,0x91,0xd6,0xfb,0xf2,0xe3,0x3c,0x0b,0xe4,0x96,0xe1,0xe8,0xe6,0x26,0x0d,0xc6,0x6a,0x82,0x65,0x66,0xbf,0x77,0xb7,0x3b,0xe3,0xb5,0xdd,0x10,0x6b,0xb4,0xb7,0xcc,0xc2,0x54,0xbd,0xec,0x18,0x19,0xb7,0xe6,0xa8 .byte 0xdb,0xde,0xc7,0x97,0x1f,0xa5,0xee,0xc3,0x06,0x3e,0x45,0x10,0x97,0x0c,0xc4,0xe1,0xe0,0x22,0xbe,0x36,0x86,0x20,0x44,0x29,0x6e,0x75,0xbc,0xaf,0x6d,0xf9,0xb0,0xec,0x16,0x77,0x65,0xb0,0xf1,0xfc,0xa5,0x30,0x04,0x94,0x25,0x6f,0x7c,0x32,0x51,0xed,0x38,0x77,0xd7,0x3f,0x34,0x02,0x04,0x35,0x97,0xa8,0x06,0x0d,0x62,0x53,0x67,0x6e .byte 0x94,0xe4,0x0e,0x34,0x3e,0x5b,0x16,0x56,0x52,0x70,0xf1,0x49,0x0f,0x75,0x60,0x4f,0xd2,0x32,0xf8,0xd2,0x33,0x08,0xd4,0x44,0xa6,0x7c,0x9b,0xa1,0xca,0x3f,0x6c,0x6f,0x53,0xdc,0xd1,0x46,0xa4,0x37,0x38,0xf6,0xd7,0x08,0xcb,0x08,0xa6,0xe5,0xa6,0xe9,0x3c,0xb1,0x98,0x7e,0x44,0x9e,0x8e,0x4e,0xca,0xa5,0xc5,0x24,0xb7,0xe3,0x05,0xf1 .byte 0xc0,0x91,0x3b,0x97,0x6d,0x76,0x56,0x65,0x5f,0x1b,0x92,0x92,0x49,0x1e,0x3b,0xb2,0x86,0x23,0x67,0xfd,0x37,0x74,0x71,0x0a,0x16,0x19,0x7e,0x54,0x0b,0xa4,0x4d,0xc0,0x1d,0xb1,0x3f,0xe2,0x2f,0x98,0x85,0x97,0xad,0x10,0x76,0xf2,0x7e,0x42,0x78,0x81,0x98,0xab,0xd5,0xc9,0x3a,0x5b,0x69,0xc1,0xce,0x10,0xa4,0x9e,0x1c,0xd4,0xa9,0xc3 .byte 0x68,0x5b,0x82,0x3b,0x90,0x65,0x80,0x6d,0x96,0xbb,0x03,0x33,0xbf,0xb9,0xd2,0x5e,0x42,0xc9,0x7b,0x4e,0x27,0x42,0xe4,0x20,0x9f,0xc4,0x69,0x16,0x23,0xa1,0x98,0x28,0x38,0xfe,0xdf,0x19,0x7c,0xf5,0xbf,0xa3,0x8e,0xe0,0x06,0xb2,0xa4,0x63,0x06,0x03,0x45,0x26,0x51,0xe9,0xcf,0x0c,0xe1,0x2f,0x67,0xb9,0x83,0xe9,0x5b,0xf1,0x7e,0x5a .byte 0xea,0xa5,0x31,0xec,0x7d,0x2c,0x8a,0x6e,0xc0,0xb9,0x98,0x60,0xc2,0x71,0xbf,0x0f,0x1d,0xfd,0xb5,0x41,0xd6,0x6f,0xae,0xcd,0x04,0x29,0xcf,0xd9,0xf6,0x71,0xdd,0xab,0x52,0x9e,0x14,0x81,0x0d,0xb4,0x27,0xcc,0x68,0x65,0xc8,0x65,0x1f,0xfc,0xb7,0x44,0x31,0xaf,0x03,0xfe,0x9c,0xf4,0xf8,0x80,0x91,0x90,0xc5,0x0e,0xe0,0xe3,0x4f,0x46 .byte 0x33,0x84,0x51,0xea,0x2a,0x50,0xb8,0x09,0x6e,0x0f,0x6b,0xd8,0x86,0x0a,0xf5,0xfc,0xda,0xc7,0x8c,0x8f,0xec,0x15,0x61,0x57,0x30,0xdd,0xda,0x40,0xb5,0x99,0xd6,0x0d,0x34,0xb0,0x55,0xab,0x90,0xc3,0x1e,0x7e,0xac,0x90,0x75,0x49,0x54,0xc4,0xa3,0x2e,0x9d,0xd0,0xac,0xcd,0x01,0x03,0x1d,0x3f,0xf4,0xf0,0xcb,0x36,0xc2,0xe4,0xb1,0x1a .byte 0x62,0x91,0x08,0x4f,0xd2,0x91,0x22,0xf5,0x0e,0x37,0x18,0xcc,0xde,0xf4,0xbc,0x58,0x6a,0x52,0x91,0x1b,0x6a,0x22,0x5e,0xe8,0xd7,0xb4,0x87,0xfd,0xbe,0x9c,0xff,0x1a,0xb9,0x9c,0xba,0x20,0x75,0xcc,0xc7,0x3c,0x6a,0xd4,0x9a,0xfa,0xfe,0xb8,0xdc,0x7f,0x85,0x79,0x20,0x72,0x31,0x53,0xb1,0xb9,0x83,0xd9,0x2c,0x61,0x56,0x0c,0x97,0x7a .byte 0x10,0x88,0xdf,0x2d,0xa3,0xdd,0x83,0x7e,0xd9,0x63,0xf3,0xd7,0x18,0x69,0x49,0x4c,0xd5,0x6b,0x26,0xee,0xf6,0xcb,0x1d,0x44,0x0d,0xeb,0xe3,0x9b,0xfd,0xa9,0x7c,0x9d,0x69,0x82,0x11,0x17,0x32,0x0f,0x17,0xb0,0x8a,0x96,0xd9,0x78,0x0c,0x90,0x43,0x0a,0x8b,0x64,0xa4,0x61,0xdc,0xe8,0xc8,0x3c,0xa0,0xda,0x97,0x66,0x7e,0xa0,0xb7,0x1c .byte 0xd4,0xa2,0x05,0xbc,0xb8,0x60,0x10,0x5d,0xb8,0x83,0x4d,0x02,0xce,0xc4,0x30,0xf2,0x9f,0xfb,0xa7,0x15,0xed,0x2b,0x4a,0xb0,0x0e,0x6f,0x96,0xfb,0x06,0x58,0x8d,0xb4,0xde,0x96,0x88,0xfd,0xa2,0xf0,0xff,0xa4,0x4e,0xc5,0x92,0x60,0x81,0x52,0x19,0xdf,0xbc,0xd5,0x4d,0x74,0x54,0x04,0x05,0x33,0x39,0x64,0xfe,0x44,0x7e,0xb0,0x5c,0xd1 .byte 0x68,0xde,0xdf,0x3e,0x05,0xea,0xab,0x45,0xf7,0x33,0x95,0xd4,0xa1,0xc6,0x1d,0x73,0x8a,0x19,0xff,0x20,0xd8,0x48,0x08,0xc6,0x1b,0x07,0x6d,0x78,0xe7,0xe3,0x2e,0xe7,0xcd,0xc9,0x1f,0x49,0x99,0x9c,0xab,0xa3,0x4a,0x77,0x48,0x91,0xea,0xe3,0xdb,0xf6,0x7a,0x91,0x3a,0xda,0x79,0xee,0x90,0x41,0x79,0x68,0xac,0xb9,0x56,0x46,0xae,0xf1 .byte 0xd9,0xdf,0x58,0x09,0xfe,0x42,0xe7,0xe2,0x44,0xd4,0x63,0xf4,0x67,0x5d,0xeb,0x6b,0x0e,0xe4,0x56,0xfa,0x01,0xc8,0xc5,0x58,0xfa,0xb7,0xe8,0x3a,0xb1,0xa1,0xde,0x94,0x88,0x21,0x06,0xd3,0x5c,0xa7,0x89,0x68,0x7b,0x8e,0xb2,0x86,0xe3,0x9a,0x9e,0xca,0x63,0x78,0xcb,0xb6,0x1a,0x35,0x16,0x43,0x4b,0x09,0xd1,0xb4,0x71,0xef,0xb6,0xb2 .byte 0x2e,0xa5,0x2b,0x4e,0x18,0xac,0x8f,0xc0,0xfe,0x86,0xcc,0x63,0xc6,0x0c,0x3c,0xee,0x22,0x92,0x7c,0xca,0xab,0x1a,0xbf,0x21,0x20,0xf2,0xd6,0xba,0x99,0x17,0xca,0x1e,0x00,0x39,0xa9,0xe4,0x65,0xa8,0xdd,0xae,0x2a,0x29,0xb1,0xa6,0xaf,0x22,0x2a,0x94,0x6c,0x68,0x66,0xb4,0x11,0x92,0x03,0x7c,0xf6,0x49,0x88,0xac,0x91,0x14,0xb7,0x1d .byte 0x06,0x8c,0x82,0xf9,0x56,0x3c,0x54,0xa3,0x31,0xb1,0x56,0x69,0x09,0x7b,0xf1,0x9d,0x01,0x10,0x1a,0xaa,0x82,0x52,0x36,0x7d,0x28,0x6d,0xc1,0x18,0xdd,0xdb,0xc5,0x99,0x1c,0x69,0xd6,0x81,0xb8,0x1b,0x63,0x44,0xe9,0x5d,0xac,0x0e,0xd2,0xa4,0x4a,0x38,0x17,0xb5,0x41,0xca,0x81,0x96,0xe2,0x5b,0x2c,0xd2,0xd1,0xdc,0xbf,0x8a,0x57,0x46 .byte 0x7d,0x48,0x1b,0xc0,0x11,0xce,0x09,0x23,0x06,0x73,0xd0,0x2f,0x8f,0x7f,0x4e,0xaf,0x92,0xff,0x5d,0x52,0x20,0xfc,0x12,0x7d,0x7f,0x6a,0xd0,0xf3,0x20,0xc2,0xf9,0x05,0x20,0x56,0x9f,0x97,0xa3,0x64,0x5c,0x4c,0x8d,0xab,0x76,0x84,0x2b,0x6b,0xea,0x3c,0x4f,0x2a,0x2c,0x0b,0x45,0x7c,0x7b,0x73,0x6d,0x91,0x7e,0x7c,0xc0,0x2d,0x32,0x5a .byte 0xb7,0xa7,0x1e,0x15,0x17,0x18,0xfb,0xbc,0x64,0x67,0xd3,0x0c,0x28,0xc5,0xaf,0x9e,0xe5,0x89,0x36,0xdd,0x16,0xef,0x21,0x70,0xe9,0x26,0x95,0xab,0xdd,0x5b,0xce,0xd4,0x57,0xe9,0x49,0xb3,0x08,0x9b,0x19,0x74,0x70,0x3b,0x8f,0xf6,0x95,0x38,0x92,0x24,0xb1,0xf8,0x27,0xc1,0xa3,0xa3,0x87,0x71,0x42,0xca,0x95,0x05,0x0e,0x06,0x51,0x11 .byte 0x2d,0x43,0x83,0x83,0x01,0xb3,0xcd,0xf9,0xb9,0xff,0xf6,0x5c,0x8d,0xc1,0xc9,0x05,0x49,0x77,0x93,0xff,0x66,0x79,0xf6,0x7c,0xea,0x11,0x5c,0x5e,0xd4,0x82,0x36,0x28,0xc7,0xbb,0x00,0x00,0xc3,0x90,0xda,0xa2,0xef,0x95,0x45,0x6c,0x74,0xbc,0xd8,0x11,0xe6,0x73,0x1f,0xb9,0xa7,0x2b,0x79,0x62,0xbf,0xc1,0xa2,0x5c,0x10,0xfd,0x3d,0x72 .byte 0x00,0xc9,0xb6,0x05,0x9c,0xec,0x70,0x30,0x68,0x7b,0x46,0x86,0x47,0x19,0x95,0x07,0x1b,0x49,0xde,0x25,0x6b,0x34,0xea,0x75,0x28,0xdf,0xa7,0xf9,0x59,0xbc,0x79,0xab,0xaf,0x67,0x9f,0xa1,0xe0,0x39,0xe3,0xd8,0x6e,0xbd,0xfe,0x1d,0xd3,0xec,0x2d,0x3b,0x7b,0x21,0xde,0x06,0x72,0x63,0x61,0xf3,0xd0,0xdb,0xae,0x32,0xc9,0x73,0x90,0xa1 .byte 0xb3,0xdc,0xc3,0xaf,0x2b,0x43,0x12,0x72,0x5a,0xef,0x5a,0x6a,0x44,0xbc,0x38,0x65,0x8c,0x25,0x32,0x96,0xe8,0x17,0xd3,0x96,0x4c,0xf2,0x95,0x29,0x90,0xd9,0x1c,0x6d,0x86,0x60,0xef,0x1a,0x25,0xdf,0x71,0xa1,0x8a,0x3d,0x08,0x08,0x01,0x01,0x6e,0x07,0xff,0x23,0x71,0x98,0x49,0xd6,0x3c,0xd4,0x3f,0x67,0xf1,0xe5,0xc4,0x4b,0x10,0x68 .byte 0x58,0xa8,0xa5,0x33,0xbb,0x6e,0x51,0x80,0xa3,0xec,0x17,0xdf,0x18,0x6f,0xe1,0x33,0x70,0x25,0x65,0xbd,0x19,0x12,0x4f,0xf5,0x30,0x4b,0x2d,0x30,0xac,0xa8,0x64,0x70,0x9a,0x6c,0xbf,0xb3,0xdb,0xdf,0x1b,0xb3,0x75,0x19,0x1f,0x70,0x8d,0xd2,0xdb,0x1c,0xca,0x72,0xca,0xb5,0xe3,0x34,0x4f,0x16,0x72,0x3f,0x12,0x2f,0x61,0x57,0x9f,0x6c .byte 0xbc,0x2e,0x2f,0x27,0x26,0xac,0x0d,0x54,0xfc,0x78,0x58,0xdf,0x86,0x9c,0xfc,0x8b,0xaf,0x99,0x04,0x17,0x19,0xbf,0x9a,0xf9,0x03,0xea,0x3c,0xd8,0x9d,0x2e,0xd7,0xd2,0x51,0x01,0xe0,0x1e,0xbf,0x3d,0x85,0xa0,0x73,0xa6,0xcc,0x20,0x56,0x42,0x16,0xb1,0x9d,0xa9,0x1a,0xfc,0x0d,0x20,0x8c,0x04,0x55,0xbe,0x33,0xd1,0x86,0xab,0x3c,0x95 .byte 0x9b,0x86,0x84,0xf2,0x99,0xe6,0xab,0xee,0x34,0xd3,0xfd,0xf7,0xb8,0xe7,0x44,0x58,0x36,0xdb,0xc5,0xb5,0x81,0x31,0xbc,0x21,0xe0,0xd0,0x6e,0x2e,0xff,0x86,0xf5,0xb6,0x22,0x69,0x1f,0x23,0xb6,0x24,0x52,0x13,0xdd,0xc3,0xb9,0x76,0xef,0xda,0x22,0x5b,0xfb,0x68,0xfe,0xd2,0xc8,0xcc,0x9e,0x51,0xe3,0x93,0xd8,0x7c,0x6f,0xd5,0x4a,0xdd .byte 0x71,0x23,0x14,0xf5,0x0c,0xce,0xd6,0x7a,0xfd,0xda,0x03,0x36,0x4b,0xa0,0x3f,0x0d,0xc9,0xd6,0x35,0x31,0x3a,0x68,0x15,0x85,0x31,0x12,0x72,0x15,0xb3,0xb4,0xbb,0x42,0xe9,0x54,0xcd,0x93,0x78,0x28,0x31,0xcd,0xb6,0x36,0xe7,0xac,0x1f,0x5d,0x64,0x60,0x93,0x67,0x82,0x02,0xda,0x46,0x74,0xa2,0x55,0x6a,0xae,0x66,0x07,0x08,0x45,0x67 .byte 0x3e,0xa7,0x5c,0x6a,0x2a,0xe5,0x8a,0x3a,0x92,0x18,0x2f,0x63,0x36,0x49,0x37,0xa9,0x02,0x3c,0x24,0x3e,0x83,0x5c,0x7e,0xae,0x41,0x95,0x65,0x50,0x90,0x45,0xa1,0xc5,0xdd,0x8c,0x72,0xd2,0x24,0x74,0xfd,0x69,0x75,0x76,0x7a,0xd7,0x79,0xfb,0x02,0x7c,0x27,0x2b,0xdb,0x3b,0xa9,0x5f,0x32,0x03,0x25,0x8e,0x8b,0xe7,0xe7,0x64,0x85,0x47 .byte 0x58,0xfc,0xce,0x40,0xa2,0xeb,0xab,0xfd,0x4e,0xda,0x58,0x87,0x40,0xb8,0x22,0x29,0xff,0xa7,0x02,0x8c,0xdb,0x90,0xf5,0x14,0x62,0xec,0x21,0xfa,0x4e,0x52,0x2e,0xfb,0xa8,0x56,0x8a,0x68,0xdf,0xb1,0xa0,0x78,0x43,0x99,0xd8,0x45,0x6e,0xd6,0x94,0x62,0x5a,0x19,0x0f,0x47,0xdd,0x5b,0x05,0x8e,0xe2,0x4c,0x2d,0x3b,0xd9,0xfd,0x24,0x98 .byte 0x9d,0xc0,0x34,0x33,0x76,0xae,0xd9,0x82,0xcf,0x77,0x85,0x2a,0xb0,0xbd,0x98,0xc7,0xfa,0x2c,0xcd,0x91,0xb5,0x94,0x2b,0xb7,0xac,0xc9,0x7f,0xd7,0xcc,0xe0,0x77,0x18,0xce,0x44,0x7e,0x21,0x2e,0x86,0x0f,0xb5,0x3c,0xe4,0x07,0x86,0x33,0x8f,0x78,0x4a,0x6a,0x66,0x4b,0x6f,0xb8,0x54,0xfc,0x3c,0x44,0x76,0x36,0x4e,0x04,0x3f,0x37,0x46 .byte 0xc4,0x9d,0xba,0x1f,0x7e,0xf2,0x24,0xae,0x40,0x56,0x55,0xc0,0xed,0x8e,0xbc,0x2e,0x4b,0xf1,0x74,0xb5,0x99,0x73,0x62,0xb2,0x6b,0x0c,0xd2,0x8a,0xcc,0x01,0x8f,0x16,0x35,0xc2,0xad,0x03,0xdb,0x07,0x68,0x56,0x5b,0x46,0x49,0x32,0x11,0xe3,0xd5,0x6a,0xa6,0x1f,0xf5,0xde,0xf6,0xac,0x53,0x43,0xf1,0xf4,0x25,0x97,0xbc,0x27,0xbc,0x3a .byte 0x3d,0x84,0x3e,0xc6,0xe0,0x68,0x69,0x22,0x4d,0x99,0x11,0xb5,0xce,0xa4,0x0c,0xaf,0x2b,0x1c,0x26,0x8d,0xd2,0xc4,0xab,0x67,0x52,0x6b,0xac,0xc5,0x7c,0x22,0xee,0xa9,0xbd,0x61,0x79,0xbb,0x71,0x02,0xfa,0x52,0x72,0xb2,0x6a,0xb5,0x0f,0xa0,0x9f,0xba,0x35,0x8c,0xd8,0xa1,0x74,0x96,0x78,0xbf,0xc4,0xf5,0x83,0x21,0xba,0xd3,0x69,0xd1 .byte 0x3d,0xb2,0x7e,0x06,0xc6,0x10,0x7a,0xa6,0x66,0xed,0xbe,0x3c,0x42,0x89,0x2f,0xc5,0xee,0x61,0x10,0x2d,0x51,0x8f,0x34,0x03,0x32,0x4f,0x01,0x77,0x02,0xfb,0x30,0xa3,0x95,0x74,0xb9,0x97,0xc2,0xc4,0xa7,0x1e,0x52,0x94,0x29,0x31,0x21,0x8b,0xb4,0x41,0x5f,0xb0,0xf2,0x89,0x54,0xb2,0x0a,0x9b,0x06,0xba,0xb4,0xb5,0x5b,0xc9,0xad,0xeb .byte 0xdd,0x62,0x97,0xf2,0xfc,0xe9,0xc5,0xcf,0x4b,0x87,0x4e,0x46,0xfa,0x58,0x38,0x62,0x0f,0xa1,0x5e,0x32,0xa2,0x52,0x2c,0x8f,0xb7,0xc2,0x90,0xdd,0x29,0xfb,0xb2,0x8d,0x38,0x85,0x4b,0x9c,0xc2,0x94,0xfd,0x0a,0xf3,0xd2,0x73,0xda,0xc6,0xdc,0xd0,0xa5,0xa5,0x3b,0x79,0x5e,0xd0,0x72,0x9d,0x06,0x6d,0x6f,0x6c,0x97,0x08,0xd1,0xc9,0xf2 .byte 0xe7,0xd7,0xfe,0x2a,0x39,0xe4,0xf6,0xa1,0x5a,0xc7,0xe3,0x2a,0x40,0x0f,0x9b,0x5b,0xf3,0x85,0xfc,0xc9,0x23,0xa2,0xdf,0x44,0x0a,0x20,0x3c,0xc1,0x7b,0xeb,0x95,0x22,0x04,0x37,0x0a,0x77,0x2c,0xa5,0xbd,0xad,0x4b,0xf5,0xef,0x00,0xa1,0x53,0x45,0x06,0xe5,0xbb,0x6e,0x18,0x43,0xef,0xbc,0x4d,0x6e,0xae,0x2a,0xa2,0x7b,0x41,0xd2,0x92 .byte 0x68,0x92,0x98,0x0c,0xc7,0x63,0x61,0x9b,0x9c,0xaa,0x63,0x0a,0x78,0x6b,0xf2,0xde,0x60,0x2e,0xc0,0x5e,0x60,0xca,0x68,0x87,0x82,0x13,0x2c,0x9f,0x2d,0x70,0x1b,0xcb,0xe3,0xfd,0x12,0x4b,0x48,0x83,0x9c,0x7c,0xea,0xde,0x19,0xe6,0xa3,0x23,0x9b,0xcd,0xeb,0xef,0x74,0x85,0xb0,0x55,0x2d,0x3f,0xa9,0xac,0xef,0x1f,0xd6,0xbc,0xd8,0x33 .byte 0x58,0xa9,0x73,0x7c,0x9a,0xee,0x08,0x06,0x3d,0x4b,0xa5,0xee,0x37,0x9f,0xf6,0x6e,0x61,0xc9,0x42,0x94,0x89,0x4d,0x36,0x8d,0x23,0x96,0x57,0x17,0x0f,0x91,0xb1,0xea,0x0d,0x33,0xc5,0x00,0xb8,0x02,0xab,0x9e,0x68,0x75,0xf0,0x80,0x79,0x78,0xae,0xe5,0x59,0x58,0x9b,0xd4,0x1a,0x62,0x37,0x7c,0x61,0xa0,0x43,0x76,0x6a,0x00,0x44,0xc7 .byte 0x5e,0xf4,0x88,0x39,0x43,0x32,0xcb,0xd7,0x78,0x16,0xcf,0x12,0x1b,0x4e,0xae,0xb3,0x6a,0x0b,0xb1,0x52,0x4b,0x3c,0x4f,0xd5,0x44,0x95,0x3f,0x5c,0x84,0x15,0x25,0x1c,0x97,0x6b,0x5a,0x05,0x1b,0x45,0x7e,0x1d,0x28,0x24,0x8b,0x8a,0x6d,0xe9,0x11,0xe2,0xdc,0x83,0x3e,0xc4,0x7b,0xb0,0xd9,0x5a,0x0e,0x11,0x5c,0x3d,0xa9,0x78,0xcb,0xcd .byte 0x3a,0x1f,0x5e,0x57,0x5e,0x59,0xae,0xc5,0xb6,0x37,0x80,0x2f,0x63,0x7c,0xef,0xc2,0x8e,0x81,0xbb,0x6f,0xf0,0x1b,0xbf,0xbc,0x71,0xa5,0x97,0x59,0x98,0x87,0xac,0x7d,0x55,0x79,0x4a,0x47,0x32,0x6c,0x9d,0x79,0x91,0x6b,0x22,0x9b,0xec,0xf7,0x9d,0xd4,0x87,0xd1,0x57,0xb6,0x13,0x91,0x54,0x8f,0x88,0x14,0x19,0x08,0x93,0xe7,0x29,0x26 .byte 0x01,0x09,0x0d,0x44,0x16,0xc8,0x90,0x99,0x80,0x04,0x5b,0xbf,0x5a,0xa0,0x73,0xd3,0x85,0xdc,0x9c,0xa9,0xbb,0x8f,0x59,0x5e,0x28,0x01,0x6c,0x13,0xce,0x92,0xe8,0x10,0x85,0x81,0x5f,0xc8,0x5f,0x52,0x84,0x33,0x87,0x28,0x5f,0x52,0xc7,0x68,0xc6,0x49,0x9f,0xa6,0x4b,0x0e,0x11,0x7b,0x94,0xf7,0x87,0xd2,0x8e,0xdb,0x5e,0x6b,0x6b,0xe5 .byte 0x40,0x12,0xc2,0xf1,0x57,0xa3,0x72,0x7a,0xbf,0x8b,0xee,0xe7,0xd2,0x84,0x53,0xae,0x06,0x7c,0xf8,0x85,0x3a,0x2a,0x0f,0x45,0xf9,0xe1,0x61,0x15,0x59,0xc7,0x2e,0x64,0xe1,0xbe,0x95,0xe1,0x64,0x1a,0xca,0xcd,0x2c,0xb9,0x71,0x63,0xa9,0xea,0xdb,0x49,0xcd,0xdb,0x36,0x1f,0x9e,0x1f,0x93,0x01,0xdd,0xe0,0x42,0xe7,0x59,0xe7,0x24,0xcd .byte 0x57,0x4a,0x16,0xbd,0x91,0x4f,0xbf,0x05,0x54,0xea,0xed,0x9b,0xfd,0xd0,0xb8,0xcf,0xad,0x54,0xfc,0xac,0x0c,0x10,0x4f,0xbc,0x9e,0xe0,0xb5,0x79,0x0a,0x64,0xa9,0x41,0xc1,0x6c,0xd0,0x19,0x7e,0x45,0x76,0x3f,0x1f,0x58,0xab,0x6f,0xd5,0x85,0x70,0x89,0x1d,0x11,0xc7,0x93,0x31,0x5c,0x4f,0xae,0xa8,0xc6,0xde,0x81,0x04,0xe1,0x93,0x9c .byte 0x82,0x44,0x23,0x5d,0x0e,0x23,0xf7,0x3a,0x94,0x01,0x3f,0xe2,0x69,0x3f,0xfc,0x72,0x37,0xd2,0x51,0x73,0xbb,0xd2,0x67,0xa9,0xac,0xb1,0xea,0xa5,0x09,0xdf,0x65,0x4e,0x08,0x6a,0xff,0x3f,0xdf,0x12,0xb8,0x65,0x04,0x2c,0xb4,0x91,0xd0,0x0b,0x4e,0x16,0xec,0x9c,0x7f,0xe6,0x1c,0xec,0x7d,0x83,0x68,0x63,0x0d,0x40,0xb9,0x38,0xda,0xa9 .byte 0x8d,0x3c,0xfd,0xd2,0x54,0x26,0xa0,0x83,0x94,0x48,0xe1,0xb0,0x12,0x5d,0x1b,0x5c,0x66,0xad,0x6e,0xbc,0xf5,0x84,0x9e,0x13,0xb2,0x6b,0x1d,0x5f,0x8a,0xaf,0xf7,0x22,0x76,0x2b,0xf2,0x4b,0x37,0xb7,0x9d,0xea,0x10,0xb2,0x2d,0x01,0x5a,0x9a,0x11,0x29,0x7c,0xb2,0x6e,0x39,0x02,0xab,0x18,0x0d,0x47,0x15,0x13,0xfa,0x9f,0x35,0x38,0xc7 .byte 0x1b,0x74,0x7d,0xe0,0xd8,0x4d,0xa4,0xc9,0x10,0x5e,0xd1,0x88,0x7d,0x14,0x40,0xda,0xd0,0x22,0x92,0x6a,0x44,0x0d,0x73,0xc1,0xb2,0xac,0x43,0xa9,0x0a,0x19,0xc6,0xf1,0x5e,0x8b,0xf0,0x9d,0xb4,0x93,0x71,0x5f,0x7a,0x2b,0xd7,0x3e,0x42,0x1f,0x5f,0x80,0x60,0x3a,0x40,0x04,0x3f,0x21,0x1b,0x07,0xd5,0xd8,0xc6,0x15,0x9a,0x31,0xac,0x81 .byte 0x3c,0xa2,0x42,0xba,0x63,0xc4,0x84,0x15,0x0a,0x79,0xdb,0xd9,0x8b,0xde,0x6f,0x35,0x74,0x7c,0x06,0x66,0x9a,0xec,0x4d,0xd3,0x0c,0xaa,0x16,0xb3,0x68,0x02,0xb7,0xd8,0x93,0x7f,0xa2,0x86,0x05,0x3f,0x32,0xe0,0x29,0x86,0x32,0x6f,0xc3,0xd1,0x59,0x68,0xf5,0x6d,0x50,0x5b,0xc0,0xe8,0x0e,0xed,0xe4,0x4a,0x50,0xbd,0x24,0x50,0xcb,0x2b .byte 0x9e,0xad,0x0d,0xbc,0x90,0x90,0xf7,0x23,0x32,0xfe,0x01,0xba,0x7c,0x27,0xc9,0x44,0xd3,0x25,0xc5,0xa0,0x74,0x9b,0xf3,0x22,0xb1,0xf9,0x22,0x62,0x10,0x2d,0x18,0xf5,0x35,0xe8,0xa7,0x4c,0x80,0xdb,0x27,0xb2,0x09,0x80,0x70,0x7d,0x25,0xd6,0x57,0xf6,0xdb,0x91,0x4b,0xfa,0x5c,0x33,0x80,0x4e,0x08,0x0a,0x60,0x06,0xdc,0x65,0xc8,0x29 .byte 0x3c,0x0c,0xbd,0xca,0x6a,0x4c,0x0d,0x84,0x3a,0x73,0xd4,0x66,0xa4,0xab,0xa8,0x03,0x3f,0x9d,0xaf,0x61,0xae,0x2d,0xd7,0x91,0xad,0xef,0xa5,0x8f,0x84,0xb4,0x3a,0xd0,0x25,0x58,0x95,0x0c,0x9a,0x6a,0x3c,0x74,0xef,0xcd,0x81,0x2d,0x32,0x2a,0x4c,0x4a,0xfb,0xb0,0xfd,0xd4,0xed,0xbb,0xb4,0x7c,0xe5,0xda,0x0e,0xf2,0xfb,0xc5,0x77,0x22 .byte 0x47,0xfa,0x9a,0x17,0x62,0x8b,0xc9,0x4b,0xfe,0x20,0x20,0x02,0x1e,0x11,0x9c,0xd5,0x67,0x8f,0x5a,0xf3,0x69,0xc1,0x9b,0xd9,0xfa,0xbb,0x2c,0x68,0xe0,0xe6,0xfc,0xb3,0xa9,0xf6,0xf1,0xe9,0x1b,0x8e,0x4b,0x5d,0x95,0x39,0x39,0x58,0xaf,0x82,0x19,0x07,0xd3,0x97,0x46,0xbd,0xce,0xc7,0x9d,0xbe,0x15,0x7f,0x5a,0xe6,0xea,0x37,0x1d,0xdc .byte 0x17,0x13,0x83,0xd0,0x3a,0x3e,0x87,0x5f,0x01,0xad,0xa1,0x20,0x1f,0x01,0xac,0x19,0x77,0x45,0x6e,0x5b,0xeb,0xdf,0x66,0xce,0xff,0xc5,0x7e,0x46,0x47,0xca,0x4c,0xda,0xdf,0x50,0x74,0xef,0x82,0x43,0x76,0xa0,0xbe,0x39,0xea,0x48,0x38,0x56,0xdd,0x9d,0x5c,0x27,0x3f,0x40,0x54,0xe1,0xce,0xff,0x38,0x78,0x02,0x3b,0xc1,0x8b,0xa2,0x7f .byte 0x31,0x11,0x8d,0x8e,0x35,0x88,0x9f,0xe8,0xe7,0x30,0x72,0xa2,0x76,0x83,0x56,0x8c,0x4c,0x3f,0x43,0xaa,0x35,0x64,0x83,0xbc,0xec,0x17,0x8b,0x50,0xd9,0x5b,0xb0,0x9f,0x67,0xd5,0xd1,0xb7,0x93,0x39,0xe2,0xc2,0xb1,0xb9,0xcd,0x0e,0x70,0xec,0x77,0x64,0x59,0x9e,0xd0,0x44,0xa7,0x79,0x82,0xa8,0x54,0xfa,0x42,0x99,0x26,0xfe,0x40,0x53 .byte 0x21,0x58,0xe4,0x2e,0x06,0x96,0x84,0x8b,0x80,0xf4,0xe8,0xf0,0x94,0xc3,0xcf,0x86,0xce,0xea,0x1d,0x82,0x67,0xcf,0xf8,0x79,0x54,0x83,0x10,0xb9,0xa5,0xea,0xce,0xeb,0x82,0x62,0xcf,0x45,0x8a,0x9d,0xeb,0x9c,0xb1,0xa0,0xf3,0xe8,0xff,0x96,0x14,0x33,0x7c,0x51,0x75,0x4d,0x00,0x0a,0xe6,0x50,0x15,0x28,0xc8,0x31,0x75,0x71,0xb5,0x8e .byte 0xab,0xe2,0x61,0x06,0xa3,0xf6,0x03,0x12,0xb2,0x73,0x67,0xd7,0x66,0xcc,0x24,0x45,0xfb,0x9b,0x22,0x42,0x3b,0xef,0x1d,0x42,0xcc,0xc9,0xd4,0xb0,0xa5,0x3c,0x66,0xcd,0x8b,0xb4,0xf1,0xcc,0x58,0xcd,0xea,0xa2,0x0a,0x88,0xc0,0x7c,0x1b,0x6d,0x72,0x35,0x57,0x90,0x7b,0xb8,0xd4,0x17,0xe8,0x83,0x15,0x30,0x5d,0x8c,0xb7,0x1a,0x42,0x98 .byte 0xb6,0xea,0xc9,0x53,0x27,0x50,0x1d,0x2f,0x39,0xeb,0xd6,0xc1,0x62,0x8d,0x1e,0xe1,0xde,0xb1,0xae,0xac,0xde,0x46,0x7b,0x66,0xa4,0xa6,0x79,0x55,0x79,0xf0,0x89,0x41,0xa3,0x01,0xba,0xbb,0x19,0x0c,0xdc,0xff,0x86,0x23,0xe3,0xca,0x60,0x88,0xc2,0x50,0x32,0xe2,0xd8,0x7e,0x5a,0x41,0x68,0x0f,0x5e,0x80,0x6a,0x9f,0x0b,0x33,0x8e,0x91 .byte 0x99,0xd8,0x3f,0x81,0xe9,0x8a,0xaf,0xa7,0x0a,0xe5,0xa9,0x23,0x1c,0xe0,0x19,0x7e,0x88,0xd6,0xbc,0x08,0x13,0xa5,0x49,0x07,0x86,0x5a,0xef,0x30,0x33,0xd8,0xcc,0x6e,0x2e,0x1b,0x17,0xa6,0x8c,0xff,0x08,0x7a,0xf3,0x99,0xab,0x64,0x69,0xf6,0x77,0xa8,0xeb,0x88,0x98,0xbe,0xea,0x9f,0x5e,0xe1,0xb6,0x8c,0x68,0xc1,0xdd,0x9b,0x91,0xd3 .byte 0x7c,0x30,0x62,0xc2,0x61,0xa1,0xcf,0x66,0x1a,0x8e,0xe8,0x91,0x48,0x33,0x7a,0xe1,0x71,0x27,0x3f,0xbf,0x47,0x78,0x31,0x9e,0xf8,0x38,0xc4,0xff,0x92,0x2a,0x0a,0x0d,0x32,0x7f,0x9d,0xa1,0xcc,0xe9,0xf2,0xfd,0xa9,0xf0,0xdc,0xd6,0xbc,0xe5,0xec,0xe9,0x26,0x91,0x0b,0x34,0xcb,0x3a,0x16,0x76,0xb1,0x90,0x08,0x14,0xec,0x6b,0x01,0xa6 .byte 0xa7,0x45,0x18,0x38,0x94,0x38,0x15,0x9a,0x4a,0x4d,0x16,0x03,0x17,0xfe,0x09,0x93,0x2d,0xbe,0xff,0x10,0xc5,0xad,0xb8,0x47,0x6e,0x5e,0x59,0x24,0x6a,0x55,0xef,0x86,0x57,0x1c,0xba,0x8a,0x0c,0xe3,0xe3,0xdc,0xc5,0x3a,0x2e,0xe8,0x89,0x6c,0xb4,0x85,0x22,0xf0,0x6d,0x6e,0x94,0x28,0xd8,0x06,0x72,0x1c,0xa7,0x9b,0x67,0x21,0x35,0x69 .byte 0xa2,0x0a,0x22,0x09,0x55,0xe7,0x9c,0x17,0x56,0x15,0x76,0x7e,0x2e,0x29,0xf1,0x5f,0x4b,0x1f,0xff,0x58,0x58,0xeb,0xc1,0x42,0x47,0x40,0x98,0x5b,0x34,0x6c,0x4c,0xa3,0x0a,0x3e,0x01,0xf3,0xf1,0x61,0x57,0x91,0x23,0xc8,0x48,0x0f,0x66,0x9d,0x08,0xc8,0x3b,0x18,0xc3,0x78,0xc7,0xb4,0x9a,0x89,0xe7,0x49,0x72,0x26,0xd3,0x16,0xe4,0xcf .byte 0xb0,0xde,0x5b,0x01,0xd9,0xb9,0xc7,0x83,0x1a,0x64,0x65,0xf8,0x0c,0x49,0xad,0x60,0xd5,0x2c,0x6b,0x75,0xe0,0x3f,0x8a,0x64,0x81,0xbb,0xee,0x7b,0xae,0x53,0x94,0x2b,0xc6,0x76,0x23,0x84,0xa2,0xb2,0x33,0xb3,0xae,0x02,0x1f,0xeb,0x3c,0x27,0x22,0xc0,0x54,0xdc,0x1c,0x18,0xa2,0x04,0x12,0x4f,0xd7,0x24,0xa9,0x49,0x44,0xd9,0xbf,0xd8 .byte 0x0c,0xb9,0x49,0xe3,0x84,0x29,0x27,0xd0,0x8d,0xb1,0x52,0x27,0xfc,0x0e,0xd7,0x88,0x39,0x64,0x76,0x49,0xd0,0x43,0xc4,0x3c,0x87,0x65,0x5f,0x90,0x49,0xde,0x27,0xc0,0xd4,0x1b,0xd4,0xdb,0x3f,0xfd,0x66,0x73,0x19,0x30,0x0b,0x29,0x00,0x5e,0xbc,0xbf,0x5b,0xd4,0x5c,0x54,0x0a,0xbb,0xa9,0xc7,0x09,0xd5,0x2d,0x89,0x0d,0x1c,0x9b,0x76 .byte 0xf2,0xea,0x5e,0x68,0x7f,0xdf,0xce,0xcd,0xdb,0x0e,0x93,0x98,0xa7,0xa3,0xc2,0xb1,0x66,0xa6,0xb8,0xfc,0xcd,0xf1,0x3b,0x7d,0x49,0x8f,0xc6,0x25,0x56,0x3c,0x04,0x46,0xb5,0x12,0x89,0xc1,0x0a,0xc3,0x70,0x42,0x4b,0x4c,0x5c,0x0c,0x7d,0x4d,0x9c,0x4b,0xfd,0x7f,0xa1,0xbc,0xb6,0x5a,0x5b,0xe1,0xa0,0x07,0xa8,0x57,0x95,0x73,0x4e,0x2d .byte 0x88,0x41,0xba,0xcd,0xbe,0x20,0xfa,0x73,0x87,0x7c,0x66,0x8c,0x5f,0x73,0x8d,0xd5,0x6b,0x81,0xd3,0xed,0x4c,0xce,0x70,0x76,0x8d,0x98,0xb8,0xf1,0x31,0xa3,0x10,0x71,0xf8,0x5e,0x20,0xdb,0x9d,0xf4,0x1b,0x54,0xcf,0xe1,0x32,0x3b,0x74,0x91,0xf5,0x0f,0x35,0xca,0x2d,0x59,0x15,0x47,0x78,0xf8,0x2f,0x5f,0xb4,0x23,0xd6,0x8f,0x61,0x85 .byte 0xf8,0x6b,0x6f,0xc6,0xe0,0x04,0x63,0xcc,0x05,0x8f,0x8d,0x8a,0xaa,0xbb,0x8a,0xa5,0x6a,0x04,0x55,0x1c,0x3d,0x73,0x06,0xf4,0x2f,0x07,0xd4,0x84,0x8a,0x6a,0x4c,0x1f,0x4e,0x1b,0xf2,0xfd,0x26,0x7a,0x5b,0xb0,0x5d,0xcb,0x86,0xb4,0xe8,0xb1,0x68,0x41,0xc9,0xb0,0x47,0x72,0xc0,0x2a,0x7f,0xda,0x30,0x79,0x08,0xd9,0xc0,0x38,0xc3,0x46 .byte 0xc2,0xdf,0xb4,0xe8,0xe2,0x3f,0xc4,0xcd,0x32,0x10,0xe0,0x32,0x3d,0x40,0xbf,0x77,0xf5,0x14,0xfd,0x89,0x2c,0x7b,0x51,0x2d,0xdb,0x8f,0x40,0x9a,0xb2,0xa7,0x43,0x9b,0x80,0x1b,0x77,0xb2,0x2c,0xe0,0x56,0xb6,0x51,0xea,0xbb,0xe7,0x45,0x3c,0xdb,0xfc,0xc4,0x98,0x1f,0x9d,0x70,0xfd,0xbe,0x9d,0xac,0x4c,0xe5,0xa9,0x9d,0xbb,0x56,0x24 .byte 0xb3,0x85,0xe7,0x37,0x26,0x2a,0x75,0x5d,0x3d,0xd8,0xb6,0x55,0xa2,0x24,0x44,0xee,0x50,0xb5,0xfd,0xd5,0x3e,0xc3,0x5d,0x78,0xb5,0xc1,0x8a,0x35,0xf9,0x4d,0x57,0xc5,0x77,0xea,0x7a,0x15,0x18,0x3c,0x33,0x1e,0x39,0x9b,0xb4,0x7b,0xc7,0xcd,0xd7,0x13,0x46,0xe3,0xf1,0x21,0xf4,0x8f,0x35,0x66,0xd6,0x0e,0xa1,0x72,0x17,0x0b,0x7a,0x43 .byte 0xa3,0xcd,0x56,0x93,0x9b,0x2b,0xf6,0x7d,0xd5,0xec,0xa4,0x9c,0x6e,0xad,0x5f,0xc4,0xd2,0xe6,0xc2,0xdf,0x59,0x1e,0x92,0x27,0x87,0x39,0xb8,0x5e,0x84,0x3f,0xc9,0x72,0x79,0xcf,0x48,0xcb,0x22,0x4e,0xd8,0x09,0xf8,0x1f,0x76,0x63,0x9b,0x03,0xb4,0x21,0x06,0x86,0xa3,0xe5,0x67,0xf2,0x97,0x09,0x9d,0xba,0x99,0x8d,0x99,0x5d,0x70,0xff .byte 0x48,0x0f,0xee,0xa9,0x3b,0xc6,0xf9,0xc7,0x36,0x84,0x8d,0x66,0xe1,0xa5,0x03,0x60,0xc9,0x07,0x48,0x1c,0xf2,0x62,0x3b,0xf2,0x2c,0x34,0x62,0x99,0xbc,0x6c,0xb3,0x6a,0xbf,0x93,0xfa,0x59,0x33,0x34,0x5b,0xb7,0xf0,0xe0,0xaf,0x17,0x05,0xfe,0xc5,0xe5,0x08,0x8e,0x3b,0x80,0x3e,0xe1,0xe2,0x08,0x43,0x57,0x29,0x46,0x39,0x82,0xfa,0xc5 .byte 0x5c,0x5e,0x24,0xba,0x01,0xbf,0xbb,0x2f,0x14,0x08,0xbc,0x21,0x85,0xf4,0x98,0xaa,0xa8,0xed,0x31,0xd2,0xfd,0x1f,0x32,0x0c,0x4b,0x61,0xbd,0x2e,0x7d,0xcd,0xcb,0x67,0xe0,0x4b,0xd2,0x3b,0x0d,0x80,0x8c,0xdd,0xc4,0x6d,0x3b,0xf0,0x25,0xd3,0x95,0xb4,0x69,0x64,0x51,0x63,0x09,0x0d,0x0f,0x7d,0x63,0x12,0xb5,0x21,0x95,0xad,0xff,0xff .byte 0xc0,0xc7,0x97,0x6b,0x5a,0x24,0x6a,0xa5,0x97,0x40,0xc6,0xb0,0xb2,0x35,0x10,0x2e,0x4f,0x5a,0xb8,0x04,0x80,0x81,0x9a,0x09,0xf3,0xcf,0xa2,0xe9,0xd7,0xc7,0x6a,0x43,0x2b,0x74,0x70,0x26,0x66,0x50,0x1e,0xcd,0x1d,0x9e,0x78,0x7a,0xb6,0x6c,0x4d,0xce,0x9b,0xae,0x9e,0xd1,0x14,0x8a,0x63,0xb0,0x9b,0xd1,0xf3,0xec,0x05,0xed,0x72,0xf3 .byte 0x38,0xfb,0x96,0x31,0xfa,0x12,0xd5,0x97,0x10,0x71,0xc8,0x20,0x5a,0x21,0x62,0xc7,0xdd,0x70,0x41,0x7e,0xf5,0x40,0x5e,0x7c,0xdd,0x15,0xea,0x9c,0xce,0x9d,0x92,0x50,0xf6,0x4a,0x56,0x43,0xdd,0xeb,0xc3,0xfc,0x3f,0x3c,0x8a,0xac,0x70,0x06,0xd4,0x30,0xc4,0x1c,0xfd,0xcf,0x08,0x40,0xfc,0x19,0xb9,0xce,0x25,0x21,0x65,0x8d,0x50,0x24 .byte 0xad,0x17,0xa7,0x42,0x9d,0x19,0x75,0xd0,0x70,0x6f,0xee,0x15,0xb4,0x8e,0xb2,0x70,0xef,0x59,0x20,0x6a,0x2f,0xd7,0x23,0x38,0xe7,0x25,0x0c,0x5c,0x70,0xd0,0x21,0xee,0x1a,0x9e,0x13,0x2e,0x0b,0x63,0x64,0x9a,0xb3,0xd7,0x55,0xf1,0xfb,0xac,0x47,0x4a,0x24,0xa9,0x0b,0x64,0xc5,0x24,0xf1,0xb9,0x82,0xf0,0x93,0x7a,0x32,0x73,0x66,0x17 .byte 0x8c,0x6d,0xaa,0xc2,0xd1,0x08,0xd8,0xfa,0x47,0xfd,0x0e,0xc2,0x9e,0x47,0xce,0x9e,0xbd,0x10,0xb9,0x4c,0x47,0xa6,0x00,0x37,0xaf,0x6b,0x34,0x7e,0x86,0xb2,0x30,0xac,0x05,0x60,0x7b,0xfc,0x6d,0x47,0xab,0x45,0x66,0x81,0x59,0xb2,0x13,0x84,0xc2,0x07,0x64,0x17,0x64,0x20,0x9a,0x62,0xfa,0x0e,0x7b,0xf1,0x3d,0x87,0xa3,0x0d,0xaa,0x99 .byte 0x08,0x96,0x01,0x5a,0x47,0x0c,0x70,0x01,0x5f,0x16,0xdf,0x79,0xfd,0xce,0x47,0x1e,0xe0,0xb6,0xbe,0x52,0x17,0x7f,0xd7,0x05,0x8b,0xa7,0x3c,0xb0,0xe8,0xfb,0x22,0xee,0x7c,0xfc,0xb2,0x33,0xb5,0xd4,0x7e,0x87,0xd3,0xcb,0x22,0x91,0x1b,0x59,0xe5,0xbf,0x79,0xb8,0x90,0xfc,0xf5,0xa1,0xc9,0x3b,0x71,0x47,0x84,0x52,0x32,0x18,0x2c,0x91 .byte 0x81,0xa4,0xfe,0xdc,0x5e,0xf6,0x69,0xbf,0x2a,0x33,0x7b,0xc3,0xc3,0xdb,0xe7,0xe2,0xb4,0x4d,0xc5,0x47,0x62,0x74,0x84,0xb3,0xd5,0x41,0x95,0x94,0x26,0xc1,0x4a,0x27,0xd3,0x46,0xec,0x9f,0xb6,0x0e,0x79,0x1b,0x24,0x5f,0xa4,0xdf,0x33,0x2d,0x89,0xb5,0x96,0x2a,0xb9,0x2c,0x0a,0x1b,0xf2,0xd6,0x38,0xc4,0x73,0x58,0xb2,0xc4,0x9b,0x3e .byte 0x2f,0x73,0xbc,0xdb,0x6f,0xb6,0x7f,0x7e,0x68,0x18,0xc4,0x49,0x41,0xcb,0xff,0x45,0x67,0x1d,0x41,0xa0,0xc3,0x17,0x5c,0x1e,0x4d,0xa7,0xdd,0x25,0x4b,0xe2,0xf7,0xfc,0x53,0x9f,0xf6,0xf9,0x1a,0x73,0xfc,0xc0,0xcd,0x93,0x38,0x4d,0x02,0x4e,0x33,0xf8,0x6f,0x0b,0x5b,0x33,0x52,0xff,0x20,0xe1,0xea,0x37,0x44,0x82,0x26,0xa8,0xf3,0x91 .byte 0x33,0xa5,0x60,0x92,0xfc,0xe1,0x7e,0x14,0x8f,0xd1,0xd6,0xda,0xdb,0x3f,0x37,0xf1,0xf1,0xed,0x91,0x5b,0x60,0x2a,0x9d,0x31,0xd3,0xb5,0xd8,0xe8,0x78,0x8d,0x59,0x0b,0x85,0xdc,0x45,0x02,0x33,0x9a,0x5e,0x43,0x9b,0x54,0x09,0x4f,0xac,0x79,0x7e,0xa7,0x64,0xe1,0xbb,0x67,0x27,0xb7,0x34,0x0a,0xd3,0xa3,0x57,0x0b,0x8c,0x46,0x9a,0xc7 .byte 0xe2,0x4e,0xb1,0xf5,0x2b,0x91,0xbf,0x5d,0xc2,0xf7,0x21,0xb6,0x74,0x42,0xf9,0xfb,0x01,0x97,0x0d,0x65,0x93,0x14,0x6f,0x60,0x5b,0x49,0x33,0x6e,0xb4,0x3b,0x1c,0x02,0x96,0x91,0x2e,0x32,0x29,0x66,0x44,0x52,0xc0,0xab,0x2f,0x27,0x27,0xa0,0x80,0xe6,0xc9,0x63,0x08,0x34,0x23,0x5e,0xb4,0x20,0x24,0x2b,0x84,0x94,0xbf,0x29,0xef,0x86 .byte 0x8a,0xb2,0x1d,0xaf,0x98,0xc0,0xf6,0x81,0xd0,0x81,0x18,0xd1,0x2e,0x53,0xae,0xd2,0xe4,0xc6,0x7d,0x0b,0x13,0x62,0x83,0xe7,0xe5,0xc7,0x93,0x34,0xd3,0xd2,0x4c,0x0f,0x44,0x7f,0x20,0xf0,0x12,0x0d,0x71,0x26,0x45,0x97,0xda,0xee,0x9b,0x69,0x3d,0x32,0x41,0x7f,0x21,0x19,0x42,0xfc,0x8b,0x96,0xb6,0xdd,0xcb,0x7a,0x41,0x57,0x24,0xd6 .byte 0xd6,0xd2,0x39,0xf4,0xad,0x4e,0xfb,0x0e,0x88,0x8e,0x8a,0xd5,0xb2,0xa3,0x7b,0x66,0x66,0xb9,0x47,0x55,0xd4,0xa2,0x4c,0x3e,0xe6,0x85,0x2e,0xaf,0x1b,0x6b,0x9b,0xb1,0xf9,0x66,0xfc,0xdd,0xb7,0xab,0x50,0x43,0xe4,0x5e,0x35,0x0f,0x59,0x8c,0x4f,0x5a,0xc2,0xe2,0xf6,0x65,0x8e,0x7c,0x8c,0x4b,0x0e,0x92,0x71,0x53,0x1d,0xde,0xd3,0xcb .byte 0x6b,0x73,0x56,0xdb,0x7f,0xde,0x51,0x61,0xff,0xbd,0x07,0xdb,0xd4,0xbd,0x78,0x55,0xf3,0xe6,0x26,0x45,0x4a,0x55,0x8c,0xf0,0xc1,0x95,0x2e,0x20,0xc3,0x26,0x6f,0x2e,0x0b,0xba,0x7c,0x5e,0x64,0xc1,0x74,0xb7,0x5c,0x0a,0x84,0x76,0x95,0xe6,0x3f,0x00,0x67,0x08,0x82,0xb0,0x9a,0x24,0x32,0xa7,0x47,0x94,0xf3,0x0f,0xee,0xe0,0xef,0x39 .byte 0x90,0x0a,0x29,0xac,0xe3,0xbb,0xac,0xa8,0xd8,0x5b,0xc1,0xf0,0x5b,0xcf,0xe8,0x29,0x65,0x2a,0xc7,0x2b,0x05,0x05,0xf4,0xce,0xed,0x01,0x75,0x53,0x1f,0x12,0x49,0x73,0xeb,0x43,0xdf,0x6d,0x2e,0x21,0xab,0x43,0x20,0x79,0x69,0xbb,0xc1,0x92,0x41,0x07,0xe8,0x65,0x77,0xde,0x78,0x92,0x3a,0x1d,0x4d,0x93,0xd0,0xa7,0x72,0xb0,0xa4,0x9c .byte 0x7e,0xa7,0x3b,0x60,0x7d,0x6e,0xa9,0x3e,0x25,0xdb,0xfe,0x4f,0x4b,0xb5,0x45,0x2e,0x84,0x49,0x38,0x1e,0x97,0x4c,0xd3,0x2f,0x1f,0x16,0x52,0x9e,0xe4,0xed,0x8a,0x9e,0x98,0xa1,0x19,0x07,0xf3,0xe2,0x1d,0x51,0xb8,0xe9,0xc6,0xaa,0x44,0x4a,0x71,0x21,0xdf,0xab,0xe2,0x31,0x5e,0x6e,0x33,0xe5,0x2d,0xc7,0xf2,0x14,0x92,0x5b,0x2f,0x79 .byte 0x1b,0xd1,0xa7,0xe0,0x00,0x12,0xa0,0x88,0x71,0xfa,0x27,0x86,0x23,0x47,0x35,0xe5,0x95,0xdd,0xae,0xfa,0x22,0xea,0x08,0x83,0x85,0xc4,0x35,0x37,0xdf,0xdf,0xc2,0x41,0xa9,0x44,0x5d,0x30,0x6e,0xa0,0xdb,0xd4,0x97,0x07,0x43,0x9e,0x7b,0x95,0x50,0xf5,0x88,0x9a,0x26,0x9c,0xf9,0x85,0x6d,0x4e,0x92,0x0c,0xbe,0x04,0xd6,0x1a,0x32,0xda .byte 0x47,0x0c,0x04,0xab,0xdb,0xc4,0xd6,0x49,0x61,0xf9,0x4a,0x90,0x5b,0x75,0x98,0xb2,0x69,0xa3,0x01,0x47,0xf4,0x60,0x03,0xc5,0x55,0x71,0x26,0x0f,0xe3,0xc3,0xb7,0xae,0xe9,0x2a,0xe8,0x3b,0x0a,0x24,0xff,0x6b,0x3b,0x6d,0x53,0xf9,0x03,0xf5,0x12,0xd7,0xf8,0xb8,0xd2,0x33,0xfd,0xcc,0x61,0xd7,0x75,0x80,0xa9,0x30,0x38,0x6f,0x78,0x5e .byte 0xa3,0x37,0xa0,0xc6,0xf5,0x84,0x12,0x56,0xdd,0x62,0x24,0xf7,0x8a,0xf6,0x31,0xf5,0xc0,0xd5,0x94,0xa5,0x92,0xfe,0xe5,0x19,0xe7,0x97,0x6d,0x4a,0xbc,0xb6,0xab,0x05,0xa1,0x36,0x9f,0xb5,0x2f,0xf3,0x0c,0x8e,0x61,0xab,0xdc,0xe5,0x2c,0xcc,0xc7,0xd4,0x49,0xf9,0x56,0xea,0xa0,0x93,0x4a,0x0c,0x66,0xfa,0xc5,0xa2,0xfa,0x75,0x31,0x1e .byte 0x27,0x69,0x45,0x8e,0x15,0x8d,0x3c,0xde,0x86,0xd9,0x95,0xc7,0x95,0x7a,0xde,0x97,0xbe,0x8b,0x7a,0xa9,0x8b,0xc5,0x2d,0xea,0x96,0xde,0xf0,0xad,0x5c,0x7d,0xd0,0xfb,0x9a,0x34,0xbe,0x2f,0x35,0x48,0x79,0xd7,0xff,0x6b,0x10,0x28,0x08,0x9d,0xa6,0x7e,0x8b,0xdd,0xdd,0xcb,0xc5,0xc4,0xfe,0x29,0xd4,0x8e,0x36,0xa6,0x2a,0x16,0xbd,0xfc .byte 0x8e,0x67,0x9b,0x9a,0x37,0xe3,0x08,0x11,0xbb,0x02,0x09,0x49,0x15,0x67,0xa3,0x23,0x3b,0xb3,0x2c,0xc0,0x3b,0x88,0x33,0xf7,0x06,0x83,0x86,0x65,0xc8,0xb2,0x2a,0x43,0xd5,0xd8,0xd1,0x65,0x7c,0x87,0xa6,0xb5,0x93,0x3a,0x44,0xc2,0xbd,0xd9,0x78,0x23,0xf6,0xa3,0xff,0x3b,0xbe,0x8b,0xf1,0x74,0x95,0xa0,0x1e,0xa9,0xe3,0xa8,0x27,0xd4 .byte 0x0d,0xb2,0x18,0x90,0x61,0x4a,0xa3,0x8a,0x57,0x5a,0xc3,0x5f,0xf2,0x8a,0x86,0x03,0xa7,0x6e,0xd1,0x48,0xa0,0x1f,0x89,0x32,0x96,0xe6,0x85,0xbc,0xbc,0xd5,0x91,0x89,0xb0,0xb4,0x58,0x0c,0xfe,0x64,0x1c,0x55,0xba,0xcf,0x03,0x49,0x60,0x4f,0x4a,0x50,0x24,0xdb,0x02,0x2a,0x56,0xc1,0x57,0xa6,0x3b,0xbe,0xa6,0x21,0xff,0x8b,0xc3,0x63 .byte 0xb2,0xca,0x47,0xfe,0xd1,0xdc,0x90,0xba,0x24,0x0c,0x15,0x23,0xec,0xf1,0x35,0x4a,0xab,0x3a,0xf3,0xf0,0xf0,0xb4,0x04,0x58,0x16,0x4f,0xf9,0xe3,0x06,0x9b,0x3f,0xd1,0x9f,0x95,0xc7,0xcf,0x0e,0x93,0x87,0x30,0x49,0x0a,0x18,0x8a,0xc4,0x58,0x10,0x07,0x93,0xa7,0x85,0xd5,0x2a,0xe7,0x4c,0xd0,0x54,0x1d,0x8b,0x40,0x3e,0xb9,0x94,0xc7 .byte 0x3f,0xc5,0xad,0x38,0x5a,0xf4,0x87,0x60,0xda,0x5e,0x74,0x5d,0x3d,0x81,0x85,0xba,0x68,0xee,0x71,0xda,0x9e,0x4b,0x6b,0x8f,0x56,0x0d,0xe5,0x31,0x3a,0x03,0x73,0x28,0x4f,0x8b,0x50,0xf8,0x15,0x63,0x42,0x45,0x65,0xb3,0x7b,0x00,0x0f,0x24,0x01,0x09,0x4b,0x74,0x09,0x28,0xdf,0x02,0x36,0x58,0xec,0x15,0x18,0xba,0x45,0x30,0x33,0x95 .byte 0xac,0xe2,0x8d,0x8c,0x20,0xdf,0xba,0x4d,0x8f,0x1d,0x1f,0x05,0x25,0x7e,0x8c,0xea,0xa3,0x92,0x8b,0x19,0xd9,0x51,0xa6,0x35,0x39,0x35,0xd4,0x8b,0x35,0x7d,0x1a,0xc0,0x84,0x3d,0x1b,0x21,0x28,0x3b,0x12,0x73,0x92,0xc7,0xf6,0xf4,0x86,0xc5,0xba,0x9e,0x2d,0x30,0xf0,0x9b,0xe7,0xf1,0x65,0x54,0x66,0x93,0xd2,0x1c,0x59,0x02,0x15,0xb5 .byte 0x56,0x34,0xdd,0x6e,0x28,0xe1,0x54,0xe4,0x94,0x70,0x08,0x2f,0xda,0xa9,0x8b,0x44,0x5a,0x4b,0xca,0x94,0x4b,0x53,0xc0,0x30,0xd1,0x78,0x15,0x60,0x9e,0x92,0xed,0x19,0xe0,0xbc,0x0f,0xbb,0x10,0x64,0xf6,0x84,0xe2,0x4d,0x96,0x57,0x1a,0x28,0xd4,0x6f,0xe1,0x7b,0x4b,0x71,0xb7,0x01,0x7d,0x39,0x8f,0x4b,0x77,0x3f,0x04,0xf1,0x3d,0xdd .byte 0x0d,0x21,0xd9,0x94,0x9e,0x85,0x64,0x6d,0x86,0x24,0x60,0xd8,0xa0,0x87,0xdb,0xde,0x21,0xb7,0xdb,0x36,0xf6,0x6c,0xef,0x51,0x5f,0xf5,0x46,0x26,0x9d,0xda,0x9c,0x2a,0x13,0x58,0x44,0x7b,0xd3,0x91,0xbf,0x7d,0x16,0x11,0x04,0xbb,0x01,0x17,0xbe,0x2b,0x20,0x72,0xb5,0xc6,0x5d,0x27,0x3a,0x10,0x46,0x1e,0x72,0x00,0x87,0xd4,0xb0,0x54 .byte 0x4b,0x9f,0xb8,0xcb,0x52,0xf9,0xeb,0x7a,0x72,0x13,0x80,0xb2,0xdf,0x79,0x46,0xa7,0x0c,0x0b,0x70,0x32,0xf4,0x42,0x66,0x35,0x70,0xb5,0xb5,0x48,0x8a,0x43,0x65,0xaa,0xb8,0x29,0xe3,0xcf,0x39,0x62,0xf1,0xba,0xe6,0xee,0x08,0x13,0xcd,0x25,0x20,0xfa,0xdf,0x29,0xb1,0xe5,0x9e,0xc7,0xc7,0xa5,0xe3,0x74,0xdf,0x3c,0xea,0x33,0xda,0xed .byte 0x6b,0x66,0xd5,0x16,0x89,0x2e,0xe7,0x7a,0x9f,0x60,0xcd,0x96,0x4e,0x81,0xcd,0x31,0x24,0xcc,0x5c,0x24,0x44,0x83,0xe5,0xd5,0x22,0xd0,0xca,0x7c,0x17,0x32,0xa5,0x13,0xaf,0xbd,0xd2,0x91,0x7b,0x3c,0x9b,0x54,0xaf,0x0b,0x51,0xf7,0x80,0x01,0x77,0x96,0x71,0x0c,0xa1,0x6a,0x15,0x91,0xe5,0x20,0xe1,0x0a,0x02,0x94,0xb3,0x2b,0x29,0x4f .byte 0x13,0xbf,0x48,0x61,0x78,0x4f,0x6a,0x82,0x28,0x1b,0x82,0xa7,0xa0,0x28,0xfa,0x7e,0x7b,0x67,0x76,0x7c,0xc1,0x7e,0x89,0x91,0x5f,0x63,0xf7,0x26,0x60,0x10,0x01,0xff,0xe6,0xc7,0xea,0xed,0xce,0x6d,0xe6,0x15,0x4d,0x17,0x84,0x1c,0xc9,0xb1,0x76,0x80,0xa5,0x33,0x2c,0x9d,0xdf,0x20,0x55,0x46,0xbe,0xde,0xc6,0x76,0x7c,0x11,0x31,0xac .byte 0xdb,0x06,0xd0,0xe5,0x29,0xdb,0x3d,0x6e,0x8f,0xbf,0x0b,0x6a,0x6e,0x83,0xcb,0x7b,0x09,0x9d,0x1f,0x53,0x17,0x67,0x99,0x34,0xb2,0x24,0xa8,0x12,0x09,0xf1,0xaf,0xf7,0x58,0xd0,0x0a,0x9e,0x50,0xa1,0x81,0xdb,0xce,0xf3,0x24,0x40,0x45,0xfc,0xa0,0x47,0xd8,0x09,0x8a,0x2b,0x7d,0x74,0x77,0x0f,0xcc,0xf8,0xd7,0xee,0xad,0x0c,0x71,0x0b .byte 0x60,0x0b,0x0d,0x14,0x67,0x57,0xb2,0xde,0xbb,0x4d,0xdf,0x4e,0x60,0xbf,0xdb,0x93,0x87,0x60,0xb3,0x29,0x73,0x45,0xd3,0x3c,0x04,0x15,0x94,0x6b,0x29,0xf0,0x10,0x1c,0xd5,0x4b,0x2c,0xb4,0x43,0xda,0x9d,0x8f,0x41,0xb1,0xe4,0xe4,0x57,0x39,0x74,0xda,0x62,0xce,0x75,0xc8,0x2f,0xab,0xe8,0x93,0x73,0xf3,0xa7,0x4e,0x43,0xf3,0xf2,0xb8 .byte 0x46,0x05,0xac,0xe5,0x1e,0x3f,0xae,0x70,0x8a,0xee,0xff,0x1e,0xe0,0xc2,0x21,0x56,0x14,0xb2,0xb5,0x36,0x1c,0xd6,0x0d,0x1d,0x03,0xd6,0xbf,0x0c,0x2e,0xb2,0xa9,0xf0,0x3f,0x1e,0xbf,0x4f,0xe0,0x82,0x60,0x08,0xc3,0x7a,0xc1,0x0b,0xe2,0xe6,0x28,0x21,0x6b,0x20,0x56,0x74,0x02,0x13,0x43,0x4c,0xe6,0x0c,0xd6,0x82,0x81,0xc6,0xd5,0x63 .byte 0xb5,0xe7,0xbf,0x43,0x25,0xde,0xeb,0xa9,0x34,0xfd,0x8e,0xe5,0x67,0xc8,0xc6,0x5e,0x12,0xba,0xfa,0x66,0x50,0xed,0x61,0xe0,0x94,0x31,0xd6,0x71,0x30,0x2f,0x42,0x71,0x98,0xa0,0x5e,0x31,0x27,0x19,0xe9,0x81,0xd9,0x14,0x7c,0x09,0xa2,0x60,0x31,0x2f,0x9a,0x1c,0x77,0xee,0xf7,0x46,0x93,0x32,0x66,0x82,0xbb,0x50,0xce,0x32,0x81,0x6b .byte 0xe4,0x46,0xc2,0xf9,0x78,0xdd,0x7a,0x19,0xbd,0x0e,0xf8,0x40,0x11,0x85,0xbb,0xe1,0x06,0x82,0xe9,0x88,0x45,0x25,0x35,0x80,0x60,0x0b,0xf0,0xf1,0x6e,0x99,0xab,0x32,0x04,0x90,0xc9,0x50,0x82,0x49,0xc9,0x75,0xf3,0xe4,0x7d,0x22,0x3e,0x48,0x70,0xa0,0xcb,0x33,0x91,0xe6,0x8f,0x2b,0x8c,0xd4,0x9a,0x13,0x0b,0x5d,0x66,0x62,0xf5,0x16 .byte 0x8d,0x90,0x2e,0x84,0x8e,0xa1,0x90,0xfc,0x4b,0x62,0x2d,0xc3,0x1b,0x09,0x6f,0x61,0x90,0xee,0x43,0x2a,0x49,0x0b,0x16,0xea,0xa8,0x09,0x9a,0x4c,0xc1,0x73,0x8c,0xa1,0x98,0x3c,0x99,0x07,0x0c,0x55,0x4f,0x93,0xb6,0xde,0xbb,0xf0,0x26,0x92,0x43,0x63,0x83,0x7e,0xfe,0x8e,0xfe,0xbf,0xe7,0x27,0xb8,0x7d,0xbc,0xba,0xb6,0xfb,0x27,0xb5 .byte 0xfd,0xde,0x3d,0xd7,0xe9,0x46,0x9a,0x17,0xd9,0xd7,0x84,0x9d,0x75,0x58,0x26,0x6c,0x96,0x70,0x74,0xb1,0x46,0x46,0xac,0x48,0xa2,0xce,0x6a,0x95,0xea,0xbe,0xd6,0x87,0xd6,0x48,0xc1,0x70,0x07,0xbc,0xd2,0x26,0xef,0xaf,0xdf,0x04,0xa0,0xe7,0x94,0xc8,0x94,0xcf,0x85,0xf2,0xc1,0x20,0x70,0xac,0xf2,0x0f,0x61,0x3c,0x6a,0xff,0x80,0x5f .byte 0xa6,0x1e,0x7d,0x07,0x1a,0xd4,0xb9,0x5e,0x99,0x35,0x65,0x5c,0xef,0x45,0x59,0x45,0x18,0x6e,0x48,0x5c,0x18,0x96,0xd1,0xda,0xb0,0xfb,0xb7,0x71,0xa6,0x80,0x7b,0x88,0x65,0x73,0xab,0x2f,0xc1,0x8b,0x00,0x1e,0x16,0x9f,0x16,0x50,0x1d,0x7d,0x75,0xee,0x17,0x5f,0x52,0xba,0xca,0xc4,0xe9,0xfb,0xb5,0x1c,0x8f,0xf8,0x7e,0xd8,0xf4,0x7e .byte 0x11,0xb6,0xf5,0x38,0x84,0x37,0x3a,0x24,0xb5,0x07,0x1c,0x7f,0x70,0xaf,0xe9,0x17,0x33,0x89,0x92,0xb1,0xb3,0xec,0x60,0x41,0x61,0xe1,0x0a,0xf9,0x11,0x7b,0xe0,0x7e,0xca,0x32,0x4e,0xa5,0xcd,0xf7,0x95,0x2c,0x6e,0x3d,0x3f,0xe4,0xa8,0x25,0xa6,0xb4,0x6d,0xb4,0xa3,0x5e,0xb1,0x9c,0x6b,0x19,0xc4,0xdc,0x02,0xec,0xfa,0x9d,0x42,0x69 .byte 0x1e,0x48,0x3a,0xfa,0x51,0x43,0x5c,0x14,0xea,0x74,0xec,0xa6,0xf0,0xea,0x42,0xf5,0x32,0xfe,0x74,0x44,0x09,0xcb,0xa4,0xee,0xf8,0xc5,0x9a,0x66,0xbf,0xa0,0xc6,0x73,0xc0,0x29,0xfe,0xec,0x8a,0xa9,0x85,0xa5,0xa7,0x8e,0x54,0xfb,0x87,0x01,0x59,0x9c,0xb2,0x17,0x62,0xd0,0xea,0xe8,0x17,0x4d,0x67,0x82,0xa9,0xfc,0xc1,0x12,0x0c,0xfc .byte 0x3a,0xe9,0xab,0x78,0x70,0x96,0x68,0xe4,0x10,0xd1,0x70,0x61,0xbb,0x07,0xe4,0xdc,0x8c,0xc4,0xae,0x07,0x90,0xd6,0xee,0xa5,0x43,0x0c,0xc5,0xc9,0x0a,0x55,0x42,0x90,0x70,0x18,0x31,0x13,0x3c,0x00,0x89,0xa0,0x30,0xaf,0xa1,0x91,0x33,0xe6,0xd0,0xe1,0xb4,0x99,0x2b,0x27,0xee,0x25,0x95,0x1f,0xfe,0x19,0x3a,0xdb,0x2e,0x59,0x2e,0xa0 .byte 0x12,0xfb,0x34,0x20,0x72,0x34,0xa8,0x2b,0xeb,0xbe,0xdb,0xc3,0xab,0xdf,0x82,0x68,0x37,0x7f,0x76,0xcd,0x15,0xd5,0xf8,0x1c,0x6f,0x7a,0x33,0x51,0x86,0xf8,0x38,0x77,0x96,0x7b,0x15,0xa0,0x2a,0x6f,0xdb,0xad,0xfb,0x0a,0x86,0xac,0xee,0xc2,0xde,0xf3,0x81,0x6b,0xc3,0x09,0x93,0xaa,0x57,0x2d,0x6a,0xff,0xba,0xa0,0x93,0x75,0xc7,0x6e .byte 0xef,0x59,0xaf,0x57,0x32,0xf6,0x0b,0x57,0x60,0x12,0x01,0x20,0xce,0xcb,0x1c,0x88,0xd1,0xe3,0x49,0x88,0xbe,0x5e,0xdf,0xc1,0x81,0x5b,0xf7,0x15,0xac,0xa8,0xc8,0x10,0x2d,0x98,0xae,0x75,0xef,0x4e,0x17,0x10,0x3c,0x95,0x92,0xf6,0xd6,0xd7,0xdd,0x0a,0xe2,0x42,0x40,0x28,0x68,0xc2,0x27,0xac,0xd3,0xca,0xa1,0xc0,0x64,0x05,0x17,0x64 .byte 0x99,0x26,0xd3,0xb3,0xac,0x77,0xf4,0x40,0xd1,0x00,0xa9,0xc6,0x6d,0x45,0x47,0xa3,0x53,0xb7,0x13,0x61,0xc6,0x11,0xc0,0xa4,0xc9,0x2a,0x5a,0xa2,0x3a,0x27,0x0a,0x84,0xff,0xb5,0xb0,0x45,0xfe,0x38,0xb4,0xec,0x95,0x8b,0xd5,0x1a,0xf3,0xc6,0x0b,0x62,0xfa,0xeb,0xd1,0x90,0x11,0x7e,0x36,0xee,0x5c,0xe6,0xb6,0xf3,0x62,0xbf,0xe7,0xc9 .byte 0x77,0x66,0x7b,0xb5,0x1c,0x9e,0x6b,0x21,0x84,0x8c,0x19,0xa7,0xf0,0x3b,0x9d,0xb0,0xfe,0xe6,0x0d,0x64,0xc5,0xdc,0xa2,0x4f,0x7c,0xcb,0x09,0x0a,0x2b,0x9f,0xd7,0x31,0xa5,0xc7,0xba,0x2a,0xc9,0x36,0x1f,0xc5,0x5b,0x8a,0x5b,0x9e,0x10,0x2f,0x2c,0x27,0x11,0x5c,0x9c,0x71,0x45,0x33,0x53,0xed,0x0e,0xdd,0xd0,0xb4,0x28,0x59,0x36,0xf1 .byte 0xa3,0x97,0x20,0xf4,0x27,0x85,0x02,0x01,0x46,0xf4,0xd3,0xbc,0xf6,0xc9,0x33,0xa8,0xe1,0x13,0x99,0x2b,0x74,0x68,0x20,0xcf,0x0e,0xfb,0xba,0x0d,0xaa,0x1f,0x76,0x66,0x6e,0xa7,0x56,0x71,0x80,0x7f,0xe5,0x2d,0x60,0x53,0x5b,0x56,0x2d,0xf1,0x3b,0x95,0x95,0x94,0x8c,0x9d,0x37,0x90,0x60,0x9b,0x29,0x84,0x6e,0x93,0x22,0xb4,0x85,0xd0 .byte 0xea,0x51,0x2d,0x80,0x7d,0xa0,0x50,0x57,0x8e,0xc3,0x58,0x37,0x75,0x05,0x37,0x4a,0xce,0x6e,0x10,0x9a,0x4c,0xce,0xfb,0x8e,0x82,0xed,0xb3,0x93,0x00,0xce,0x38,0x09,0xde,0xa1,0x92,0x23,0xd3,0xe1,0x33,0xc4,0xca,0xcb,0x42,0xc2,0x95,0x04,0x90,0xfd,0x32,0x43,0x6a,0x2c,0x8c,0x76,0xbf,0xca,0xe6,0x60,0xed,0x48,0x30,0x47,0xbc,0xba .byte 0xff,0x00,0xfc,0xa8,0x53,0x17,0x45,0xc6,0xa2,0xc2,0xb3,0x3c,0xf1,0x1f,0x4c,0x95,0x73,0xc5,0xa3,0x6f,0x59,0xd0,0xb3,0x1e,0x12,0x27,0x0a,0xc7,0x70,0x27,0xfa,0x33,0x22,0x6a,0x25,0x3c,0x34,0x83,0x03,0x37,0xb8,0xdb,0xa9,0xc2,0xfb,0x64,0x3d,0x77,0x96,0x37,0x54,0xcf,0x18,0x31,0xce,0xe8,0xc1,0x19,0x85,0x81,0xd2,0x1b,0xcd,0x08 .byte 0xdb,0x53,0xa2,0x61,0x18,0xf2,0xe7,0x33,0x1b,0xe3,0x21,0xd5,0x52,0x8d,0x51,0x2e,0x4d,0xf2,0x95,0x1b,0x5e,0x2f,0xcb,0xe7,0x12,0xc9,0x74,0xce,0x44,0x93,0x57,0x51,0x2b,0x9c,0x03,0x9e,0x20,0x17,0x75,0xf0,0x24,0xb3,0x1f,0x38,0x1b,0xef,0x12,0x8f,0x6f,0x79,0xbc,0xce,0x40,0xa5,0x6c,0x86,0xe9,0x92,0x90,0x53,0xd2,0x28,0x40,0x77 .byte 0x44,0xa0,0x6f,0x11,0xf8,0x7b,0xf1,0xd8,0xd5,0x04,0x88,0x5a,0xf3,0xc6,0xa3,0xbc,0xcb,0xef,0x85,0x56,0x6d,0xa1,0x84,0x34,0xcf,0xaa,0x52,0xb1,0x76,0xed,0x2b,0x67,0x73,0xa7,0xc7,0x2b,0xfb,0x7a,0x9c,0xf9,0xdf,0xfa,0x92,0xd8,0x93,0xe9,0xd6,0xd1,0x66,0xe6,0xed,0x82,0x80,0x00,0xa3,0x40,0x3d,0xef,0xf4,0xf9,0x6c,0x6a,0xaa,0x73 .byte 0x7c,0xc5,0xed,0x3d,0xf5,0xf5,0x9e,0x3f,0x1a,0x9a,0x29,0xd0,0xb4,0xac,0x96,0x55,0x61,0xca,0x37,0xc0,0x60,0xea,0xc5,0xc7,0x96,0x35,0xa0,0xa8,0xab,0xf7,0xeb,0x5e,0x3b,0x7e,0x54,0xb0,0x29,0x50,0xde,0x11,0x9f,0x71,0x3c,0xa5,0x32,0x32,0xe3,0xf8,0x1f,0x19,0x08,0x89,0xe6,0xc7,0x1b,0xb8,0xda,0xe3,0x98,0xd7,0xed,0x76,0x0f,0xa5 .byte 0xc1,0x24,0x0d,0xea,0x10,0x13,0xcd,0x72,0xf4,0x44,0xb5,0x56,0xf6,0x4c,0xad,0xb7,0x43,0x6f,0x0a,0xc0,0x36,0x40,0x48,0xe1,0x4a,0x4c,0x9c,0x23,0xfd,0xde,0xaa,0x79,0x62,0xc0,0xec,0xfb,0x37,0x7f,0xbb,0xbc,0xfb,0x38,0xd0,0xaa,0x4a,0x5d,0x08,0x1c,0xa5,0x3d,0xb0,0x02,0xdc,0x5f,0xfc,0x9a,0x2a,0x6e,0x82,0x4d,0xf8,0x67,0x9d,0x2c .byte 0x6a,0x01,0x55,0xad,0xf4,0x1d,0x02,0x3e,0xc8,0x55,0x42,0xc7,0x39,0x7b,0xcd,0xa8,0x0c,0xd2,0x46,0xc2,0x1a,0x78,0x4a,0xf1,0xb6,0xd8,0x38,0xbd,0x0a,0x9b,0x53,0xdb,0xd8,0xaa,0x1f,0x30,0x9f,0x97,0xf7,0xbf,0xff,0xf1,0x3d,0x1d,0xf2,0x3b,0xc1,0x7c,0x3a,0x63,0x5c,0xb3,0x67,0x02,0xcd,0x67,0x0a,0xf9,0x6e,0xf2,0x36,0x3b,0x36,0xa9 .byte 0xce,0xf1,0x66,0x13,0xb7,0x8e,0xc8,0x36,0x30,0x34,0xde,0x32,0x68,0xc7,0x62,0x60,0x13,0x34,0x7d,0x66,0x32,0x69,0xe7,0x7a,0x0a,0x20,0x24,0x86,0x85,0x72,0x3c,0x7d,0x5f,0xea,0x6c,0xaf,0x70,0xde,0xfe,0x94,0xc2,0x6e,0xb3,0x0f,0xa1,0x2a,0x51,0x40,0xd5,0x5c,0xaf,0xdd,0xd9,0x7d,0x09,0x9b,0x31,0x45,0xae,0x48,0x67,0xfa,0x2d,0x11 .byte 0x77,0xed,0x92,0x79,0x7e,0x27,0x27,0x3b,0x1c,0xa7,0xee,0x88,0xaf,0xfe,0x71,0xa7,0x0e,0x9e,0xa8,0xa5,0x11,0xd2,0x88,0x25,0x12,0x49,0x8a,0x89,0x19,0xc7,0xa8,0xa3,0xa9,0xc6,0x48,0x57,0x21,0x23,0x91,0x07,0xfe,0xb3,0x6e,0x0b,0x70,0x08,0x7b,0x1c,0xe4,0x15,0x13,0x3e,0x8a,0x43,0x80,0x1b,0xb6,0x72,0xd6,0x62,0xfe,0x3a,0x7a,0x5f .byte 0xb9,0xd4,0x00,0xce,0x5b,0x05,0xa0,0x81,0xe5,0x9d,0x56,0x65,0xb6,0xa2,0xb7,0x2f,0xa8,0x95,0xed,0x15,0x70,0x3e,0xb4,0xbd,0x62,0xde,0xde,0x59,0x9d,0x99,0x07,0xe8,0x0b,0x83,0x2e,0x55,0x96,0x63,0x0a,0x06,0x2a,0xf4,0xcb,0xd2,0x72,0x28,0x71,0xc8,0xb3,0x22,0xa0,0x35,0xaa,0x9f,0x73,0x21,0x8b,0xd9,0x25,0x41,0x46,0xbd,0x65,0x74 .byte 0x40,0xcb,0xf4,0x83,0xa1,0xf1,0x73,0x75,0xe0,0xe2,0xee,0x1d,0xc4,0x6a,0x11,0x55,0x50,0x18,0xdb,0x94,0x58,0xbc,0xaf,0x2a,0x18,0x20,0x44,0x15,0xff,0xbd,0x67,0x19,0x64,0x39,0xab,0x35,0x72,0x34,0x83,0x66,0xd5,0x5d,0xcc,0xc7,0x68,0x4f,0x6b,0x05,0x81,0xfc,0x47,0x0d,0xe8,0xbe,0x7c,0xdd,0x27,0xd7,0xc6,0x74,0x9a,0xc1,0x5a,0x28 .byte 0x45,0x58,0x9f,0x52,0xc8,0x8f,0x7b,0x13,0xab,0x9e,0x72,0xda,0xdf,0x10,0x3a,0xe3,0x5f,0x9b,0xf8,0x59,0x2d,0xc5,0x40,0x31,0x12,0xe9,0xc4,0x1f,0x46,0xa0,0x8a,0x98,0xd7,0xbf,0x16,0xe5,0x2d,0xe8,0x51,0xc0,0x8b,0x40,0x9d,0xd6,0x5b,0x4c,0xa5,0x95,0xd2,0x18,0x1e,0x0b,0x7e,0xd2,0xfc,0x0c,0x8c,0x1a,0x8b,0x61,0x45,0x77,0xf4,0x96 .byte 0xef,0xc8,0x13,0x0b,0x93,0x27,0x35,0x9b,0x4a,0xc4,0x86,0x13,0x8e,0x86,0xf0,0xde,0x2b,0x45,0x8f,0x9a,0x22,0x31,0x50,0xa5,0x3c,0x26,0xcb,0x86,0xc1,0x88,0x18,0xb2,0x82,0xe6,0x88,0x71,0x49,0x2a,0x5c,0x2f,0x96,0x49,0x1e,0xc0,0x86,0x8a,0xe9,0x84,0x16,0x74,0xf2,0x29,0x99,0xdc,0x26,0xc4,0x3b,0xc7,0x1d,0xdd,0xbb,0x3a,0xe6,0x7a .byte 0xac,0x06,0xb9,0x91,0x23,0xae,0x46,0x2e,0x4f,0x36,0x42,0x7e,0x84,0xae,0xbd,0x0c,0x21,0x6b,0xa3,0xf0,0xd0,0x1e,0xb1,0xf4,0x38,0xde,0xa0,0x2e,0xd4,0x0d,0xdb,0x00,0x17,0xd4,0x01,0xe7,0x45,0x50,0x58,0x0d,0x0b,0x5a,0xf5,0x02,0x4b,0xeb,0x23,0xc2,0xbd,0x54,0xe8,0x2e,0x92,0xe3,0xc3,0xfe,0x32,0xa0,0xc0,0x09,0x85,0x97,0x74,0x96 .byte 0x60,0x6c,0xd5,0x6a,0xf6,0xee,0xef,0xa5,0x25,0xa8,0x6e,0xb6,0x59,0xa7,0xf9,0xad,0xf5,0x9d,0x45,0x83,0x98,0x33,0x26,0x53,0x89,0xb4,0x6d,0x45,0xb2,0x25,0xb4,0xd1,0x35,0xe0,0x28,0x77,0xcb,0x45,0x5f,0xc4,0x9d,0x8d,0x43,0xbb,0x49,0x68,0x06,0x6e,0x3d,0x48,0x3c,0xdb,0xbc,0x6f,0xfe,0x90,0xdb,0xde,0xe9,0xfb,0xca,0x29,0x7f,0x86 .byte 0xaf,0xdd,0x1f,0xcc,0x81,0x74,0x4f,0xe6,0x13,0x91,0x23,0x8b,0x99,0x04,0xec,0x73,0x7e,0x88,0x1e,0x0f,0x38,0xa6,0xd3,0x21,0xb7,0x22,0x70,0xf9,0xfd,0x28,0x65,0xda,0xa6,0x96,0x04,0x7c,0x62,0xb2,0x94,0xc9,0xe1,0x08,0xb8,0x1b,0xca,0xc7,0x07,0x1b,0x7f,0xc7,0x07,0xfd,0x3a,0x6e,0xb3,0x70,0x0b,0x29,0xa2,0xe4,0x9e,0x78,0xea,0x9a .byte 0xa8,0xe4,0x87,0xe6,0x6f,0x03,0x7c,0x88,0x45,0xf4,0x92,0x11,0xa8,0xfc,0x3c,0xae,0x51,0x66,0x82,0x59,0xb1,0xa8,0x98,0xeb,0x9a,0xb6,0x63,0x9c,0xa5,0x5e,0x10,0xf5,0x63,0x1e,0xa8,0x16,0xbf,0x8d,0xc8,0xbb,0xf7,0xcb,0xd9,0xc1,0x5d,0x2e,0x0e,0x4e,0x65,0x3c,0x20,0x77,0xe7,0x85,0xfe,0x7d,0x84,0xbe,0x1d,0x4d,0x00,0x80,0xc4,0x58 .byte 0x73,0x46,0x3e,0xc3,0x35,0xef,0x92,0xbb,0x8b,0xde,0x95,0xd9,0xf9,0x8a,0x3b,0x2d,0x59,0xab,0xd0,0x08,0x84,0x76,0x81,0xcd,0x5b,0xa0,0x98,0xf9,0xd6,0x12,0xc5,0x8e,0x91,0x18,0xfd,0x35,0x90,0x68,0x7d,0x30,0x5f,0xe9,0xdd,0x3a,0xe6,0xd3,0x94,0xdb,0xa7,0xdb,0xe7,0xb9,0x79,0xfb,0x2a,0x16,0xa3,0x8d,0x0b,0xd6,0x0d,0xb3,0xbf,0x79 .byte 0x51,0x26,0x9b,0x56,0x74,0x04,0x8a,0x20,0x58,0x2c,0xb3,0x60,0xdd,0x1d,0xcb,0x44,0x7f,0x17,0x7a,0x3f,0xe1,0x98,0x73,0xaf,0x21,0x06,0x6f,0x2f,0xbd,0x67,0xc1,0xcb,0x61,0x18,0x87,0xda,0xf2,0xab,0xe6,0xa6,0xac,0xf4,0x81,0x06,0x40,0x5a,0xb7,0x98,0x96,0x1a,0xa7,0x4b,0x0e,0x16,0x9a,0x70,0x0f,0x9c,0x2b,0x22,0xbf,0x09,0x3b,0xf3 .byte 0x49,0xde,0x71,0x07,0xc4,0xa3,0x9a,0x68,0x66,0x56,0x5b,0xad,0x53,0x4c,0xf0,0x03,0xd6,0x25,0x7f,0xbe,0xd1,0x96,0x29,0xe3,0x09,0x8c,0xcc,0xae,0x35,0x2b,0x62,0xfe,0x9f,0x8f,0x0f,0x1a,0x8d,0x91,0x0c,0xc0,0xbb,0xf1,0x85,0xaa,0xf1,0x86,0x9b,0x99,0x7f,0xad,0xbc,0xfe,0xfa,0x33,0xb3,0x59,0x42,0x31,0x83,0x53,0x50,0x07,0xb0,0x61 .byte 0x78,0x38,0x1e,0x4f,0x1f,0xa9,0x32,0x92,0xec,0x2b,0xa6,0xfb,0xf0,0x9b,0x73,0x06,0x45,0x20,0xc3,0x34,0x50,0x73,0xbd,0xdf,0x61,0xb4,0xd3,0x6b,0xde,0x63,0xc4,0xb4,0xbc,0xcf,0x64,0x1d,0xcc,0xf8,0xa0,0x3f,0x42,0x2c,0x06,0xa2,0x2a,0xbd,0xc8,0xc5,0xf6,0xf5,0xdd,0x27,0x0b,0xf7,0x00,0xf6,0x50,0xcf,0x96,0x2b,0x9a,0xf7,0xbb,0x82 .byte 0x71,0xc2,0x95,0x7f,0x2f,0xcf,0xfb,0xb3,0x1d,0x0e,0xf3,0xf6,0x6d,0x77,0x63,0x9f,0x33,0x8a,0xce,0x91,0x39,0x2a,0x08,0x42,0x2a,0x0b,0xfe,0xee,0xf7,0x5e,0x1c,0x97,0x43,0x0a,0x3f,0xbc,0x23,0x20,0xc5,0x59,0xe5,0x84,0xec,0x2f,0xb1,0x1b,0x23,0x4b,0x8b,0xa1,0x56,0x6a,0xd3,0x77,0x09,0xef,0xbc,0x70,0xf9,0x89,0x1d,0x7c,0xd2,0x2a .byte 0xfe,0x2f,0x94,0x0a,0x22,0x2e,0x99,0x57,0x3f,0xe5,0x7c,0xa3,0xeb,0xd3,0x90,0x30,0xce,0x1c,0x94,0xc6,0xf6,0xd1,0x58,0x19,0xdf,0x6c,0xfa,0x3e,0xe5,0x4d,0x5f,0x42,0xb3,0xe5,0x06,0xe3,0xdd,0x65,0xb6,0x35,0x7c,0x9f,0x50,0x6a,0xa1,0xab,0x95,0xab,0x3b,0x6d,0x87,0x07,0xaf,0x4f,0x4c,0xcc,0xd8,0x4d,0xde,0xb8,0xc6,0x0b,0xa0,0x1c .byte 0x7b,0xc5,0xda,0x29,0x92,0x8b,0x54,0x37,0xec,0xbf,0xbe,0xf6,0x99,0x64,0x61,0xce,0xdd,0xdd,0x20,0x97,0x31,0xc3,0x82,0x87,0x86,0x1e,0x6d,0xde,0x6b,0x1b,0x3b,0x82,0xf5,0x40,0xbe,0x63,0x2f,0x03,0x04,0x71,0x2b,0x04,0x78,0x19,0xe0,0xc1,0x90,0xaf,0x52,0xb7,0xb8,0xc3,0xa8,0xa4,0x61,0x88,0xb4,0xf9,0xb5,0xd0,0xfa,0xe6,0x16,0x39 .byte 0x1b,0xfc,0x9c,0xcc,0x9b,0x67,0x58,0x84,0x5d,0x21,0x82,0x06,0x77,0xc8,0xe5,0xa2,0xaa,0x37,0xc8,0x83,0xf2,0x59,0x85,0x6f,0xb4,0x13,0x8d,0xe8,0x57,0xe6,0xe6,0x83,0x10,0x4e,0xca,0x4e,0x0e,0xd9,0x15,0x58,0x05,0xaa,0xb0,0x61,0xd1,0xfe,0x19,0xc1,0x2e,0xd8,0x32,0x9e,0x19,0xf5,0x30,0x35,0x2b,0x4a,0x4b,0x4e,0xb8,0xaf,0xc5,0x4d .byte 0x48,0x9e,0x66,0xd7,0xb6,0xd3,0xd8,0x77,0x12,0x0d,0x90,0x48,0x5b,0xee,0x7d,0xb2,0xcc,0x48,0x9a,0xe3,0x0a,0x1f,0x3a,0xf5,0x4f,0x3d,0x40,0x38,0x14,0x20,0x7c,0x70,0x20,0x2a,0xea,0x55,0x97,0x45,0xca,0x7d,0x26,0xd4,0x00,0x67,0xeb,0x2c,0x92,0x9b,0xb1,0x1e,0x79,0xb0,0x57,0x68,0x2b,0x42,0x46,0x26,0x91,0x96,0xc8,0xac,0x2f,0x28 .byte 0x74,0x1d,0xf9,0xfa,0x06,0xd4,0x64,0xba,0xe6,0x07,0xae,0x11,0x78,0x75,0x3b,0xc8,0x2f,0x10,0xc6,0xe2,0x93,0x27,0x6d,0x71,0x7a,0x17,0x77,0x45,0xd7,0xe2,0x91,0x6b,0xaf,0xdf,0x5f,0x47,0x56,0xc0,0xb9,0x09,0x22,0x44,0x43,0x0c,0xa7,0x6b,0xc2,0x05,0x50,0x5a,0xb9,0x2d,0x86,0xea,0x99,0x96,0xd5,0x4d,0x90,0x4e,0x7c,0xc1,0x92,0xbb .byte 0xb6,0x06,0xe9,0xaf,0x38,0x6e,0x00,0xe9,0x19,0x4b,0x2d,0x2a,0x17,0x5f,0xb5,0xc8,0xec,0x65,0xb6,0x6d,0x67,0x42,0x79,0x92,0x13,0x17,0x76,0xa5,0x4e,0x3a,0x66,0x13,0x58,0xcf,0xa7,0x4b,0xb9,0x8e,0x84,0x66,0xb8,0x4b,0x66,0xd3,0x87,0x6a,0x65,0xd4,0x0a,0x97,0xe8,0x15,0x32,0x15,0xd4,0x2e,0x9a,0x80,0x40,0xfc,0x02,0x6d,0x4f,0x9e .byte 0x68,0x3f,0x18,0x61,0x70,0x38,0xb7,0x5a,0xda,0xe1,0x74,0xdd,0x79,0x71,0x95,0x4b,0x50,0x19,0x0c,0x93,0xc9,0x1d,0x02,0x66,0xa2,0x35,0x88,0x91,0x9e,0x4b,0x62,0x5f,0xfe,0x65,0x09,0xf7,0x71,0x98,0xa3,0xcd,0xe1,0x2b,0xcf,0x2e,0x5f,0x38,0x41,0x47,0x1b,0x94,0x61,0x5d,0xce,0xbc,0x4b,0x69,0x70,0x7e,0xe7,0x74,0x8a,0x69,0x99,0xe8 .byte 0x58,0xda,0xd4,0xb4,0xae,0x3c,0xae,0xa0,0x78,0xed,0x72,0x51,0xb7,0xc1,0x95,0x20,0x43,0x34,0x77,0x12,0xa2,0xc5,0xe9,0xad,0xb4,0x6d,0x15,0x0d,0x3c,0x1b,0x2e,0x45,0x42,0xd6,0x7a,0x4f,0xe9,0x0e,0xe3,0x70,0xbd,0xe8,0x10,0x31,0xa9,0x09,0xc7,0x32,0x0c,0xcb,0x3e,0x54,0x6d,0x52,0xc2,0xed,0x57,0xbf,0xd1,0xbb,0xfe,0xd8,0x34,0x08 .byte 0x40,0xc1,0xb8,0x86,0xf7,0x0c,0xa8,0x3c,0x11,0xbf,0x96,0xc2,0x86,0x64,0x99,0x27,0x2a,0x68,0x3b,0x29,0xca,0xc2,0xd6,0x59,0xf7,0x77,0x66,0x91,0x26,0x96,0x87,0x84,0xf1,0x01,0xe4,0x04,0x82,0xd4,0xf0,0xe5,0x72,0x40,0x3a,0x5b,0x0b,0x65,0xa1,0x78,0x91,0x8a,0x7e,0x16,0x82,0x3c,0x00,0x07,0x19,0x14,0x3d,0x01,0xc6,0xa9,0x62,0x83 .byte 0x65,0x6a,0x66,0x02,0x6c,0xa9,0x77,0xaa,0x91,0xe1,0xbc,0x85,0x73,0xad,0xeb,0xca,0x01,0x2f,0x40,0xeb,0x14,0xa5,0x3f,0x78,0xec,0x90,0x39,0xab,0xc2,0x9d,0xce,0x55,0xf2,0xaf,0xbc,0x45,0x56,0x92,0x18,0x2b,0x74,0x15,0x7d,0xbd,0x77,0xdc,0xa3,0x56,0x8f,0xa5,0xf1,0xe4,0x8a,0xb4,0xbd,0x8b,0xa9,0x73,0x23,0x93,0xe3,0x84,0x1a,0x15 .byte 0xae,0x28,0x8d,0x9e,0xca,0x2d,0xd9,0xfd,0x40,0xd0,0x92,0x2f,0x51,0x76,0xde,0x59,0xb7,0xc8,0x88,0x16,0xc1,0x7c,0xb7,0x6f,0x07,0x95,0x53,0x38,0xf8,0x42,0xea,0x80,0x0a,0xd7,0x43,0xa2,0xbc,0xd1,0x39,0xf7,0x99,0xd5,0xb9,0x17,0x8d,0xbe,0x8f,0x6f,0x5b,0x66,0x52,0x8e,0x28,0xfd,0x21,0x4f,0x16,0xef,0x83,0x83,0x62,0x50,0x6c,0x63 .byte 0xeb,0x27,0xf5,0x9c,0x59,0xe6,0xba,0xae,0xf0,0xcf,0xba,0xad,0xcc,0x04,0xba,0x7b,0x11,0x10,0xfb,0xc3,0x97,0x68,0x3c,0xff,0x9c,0x46,0x16,0x75,0x06,0x47,0x52,0x55,0x40,0x8a,0x2f,0xb6,0x88,0xc3,0x6f,0xef,0xce,0xc5,0x38,0x98,0xf8,0x65,0x64,0x5c,0xeb,0xa4,0x86,0x90,0x83,0xf9,0xd1,0xc5,0x0b,0x02,0x9c,0x76,0xe0,0x0a,0xc1,0x48 .byte 0x1d,0x2b,0x6a,0x40,0x24,0xdf,0x67,0x6c,0xb1,0xf8,0x86,0x5c,0xc3,0x5d,0x8d,0xb2,0x68,0x54,0x76,0x42,0x77,0x71,0xdc,0x72,0xed,0x00,0xa0,0xc7,0x30,0x86,0xae,0x0e,0x2e,0xa9,0x39,0x19,0x02,0xb3,0x21,0xe6,0xd4,0xab,0x5a,0x1b,0x4e,0x8a,0x2f,0x3f,0x09,0xdf,0x4e,0x82,0x79,0xa5,0x98,0x94,0x1c,0xb8,0xb6,0xa1,0x25,0x86,0x5c,0xdd .byte 0x4e,0x71,0x4b,0x6b,0x5a,0x24,0x7b,0x32,0x07,0x7e,0xcc,0xad,0x26,0x3c,0x85,0xfd,0x2a,0x7e,0x99,0x5a,0xa7,0x5f,0x51,0x23,0xa1,0x19,0x33,0x58,0xd9,0xbd,0x37,0x9d,0x0f,0xf0,0x9b,0xc7,0xb8,0xdf,0x35,0x32,0xe6,0xce,0xac,0x93,0x1e,0xef,0xa6,0x83,0x80,0x10,0xed,0x5e,0x86,0x7a,0xda,0x85,0x18,0xbd,0x1c,0x9e,0x7d,0x25,0x0d,0xbc .byte 0x7d,0x08,0xa4,0xaf,0xee,0x2b,0xc5,0xd4,0x38,0xe0,0xa9,0xd3,0x8e,0x28,0x36,0x2e,0xdc,0x2e,0x0d,0xe0,0x62,0xcb,0xd1,0x78,0xff,0x22,0xa0,0xbd,0x36,0xed,0x44,0x9e,0xdf,0x1f,0xca,0x07,0xbc,0x04,0x00,0x0d,0xda,0x56,0x9d,0x31,0xcb,0xc4,0x5a,0x05,0x88,0x82,0xa4,0x2e,0xe0,0x09,0xa1,0x0d,0x68,0x02,0x76,0x26,0x03,0xc4,0x8b,0xca .byte 0x86,0xfe,0x26,0x07,0x17,0xc4,0xee,0x93,0x67,0x4a,0xa8,0x84,0xa4,0x44,0x5c,0xe3,0x8b,0x02,0x59,0xba,0x7e,0x7b,0x19,0x1a,0x42,0xf9,0x6f,0x78,0xcb,0x6b,0xf2,0xd6,0x4b,0xbe,0x7a,0xaa,0x6e,0x9a,0x6c,0x86,0xf4,0xf1,0xb3,0x4a,0xe9,0x7b,0xe5,0x36,0x75,0x02,0xc4,0x6f,0xfb,0xe6,0xbf,0x0d,0x2a,0xed,0x5e,0x86,0xf5,0x8a,0x2c,0xed .byte 0x8c,0x83,0xd4,0xa4,0x52,0xe5,0x08,0xe5,0x4a,0xac,0xa0,0xa7,0x17,0x91,0x9e,0x48,0x59,0x94,0x59,0x60,0xac,0x79,0x62,0xcb,0xd0,0xe6,0x72,0xd2,0xca,0xd1,0x05,0xc7,0x5f,0x31,0xd0,0x8d,0xe8,0x55,0x98,0x8c,0xd2,0xc6,0x4a,0xf5,0x2a,0x5d,0xc9,0x2d,0x16,0x06,0xe1,0x6d,0xa8,0xf0,0xc4,0x4d,0x41,0x33,0x3d,0xc4,0xbf,0xba,0xc6,0xf1 .byte 0xc4,0x92,0x17,0xff,0xa8,0x3f,0x2d,0xf1,0x90,0x2a,0xae,0xf5,0x64,0x2a,0xa5,0x08,0xac,0xbe,0x48,0x6a,0x27,0x05,0x91,0x33,0x7b,0x6d,0x0b,0x58,0xca,0x9b,0x29,0xf1,0xa8,0x18,0x1a,0xe4,0x9a,0xcc,0xbd,0x2a,0x09,0x15,0xe3,0x72,0xdc,0x80,0x60,0x8d,0x4a,0xac,0x3e,0x35,0xc4,0x94,0x7e,0xc8,0x78,0x43,0x9b,0xfc,0xe5,0xe7,0x57,0x83 .byte 0x21,0x49,0x74,0x9f,0x9c,0x10,0x77,0x3b,0xda,0x11,0xe8,0x13,0x88,0x71,0xb2,0xa5,0xf1,0xa8,0x6c,0x19,0xee,0xc6,0x8a,0x96,0xe2,0x34,0xec,0xbc,0x4c,0x7e,0x72,0xdc,0xde,0xbf,0x09,0x0a,0x1e,0xce,0xbc,0x10,0xbe,0xfd,0x8d,0x0c,0x5c,0x40,0x4f,0x30,0x82,0xe3,0x99,0x72,0x91,0x6f,0xc8,0x3c,0x1c,0xe2,0xd3,0xae,0xbf,0x09,0x3a,0xec .byte 0x28,0x81,0x10,0x80,0xf6,0x2e,0xb9,0x29,0xde,0x00,0x2c,0xf6,0xd9,0x03,0x47,0xea,0x0f,0x3c,0x02,0x92,0x80,0x50,0x76,0x2b,0x60,0x0e,0x15,0xbd,0x69,0x10,0x7b,0xce,0xbf,0x40,0x15,0xd3,0xd9,0x4c,0xd2,0x6a,0x6e,0x10,0x18,0x00,0x34,0x55,0x8d,0x66,0xaf,0xf7,0x14,0x12,0xe8,0x67,0x4d,0xe7,0xfe,0x4d,0xc1,0xc5,0x05,0x6f,0xcf,0x16 .byte 0x1b,0x65,0x32,0xab,0x89,0x86,0x3e,0xe5,0x3e,0xba,0x8a,0xc1,0x5e,0x41,0xbb,0x23,0x76,0x8c,0xea,0x77,0x6e,0x1f,0x3c,0x4c,0xe4,0x98,0x9c,0xe5,0x73,0x0c,0x08,0x48,0x83,0xb6,0x24,0x24,0xe6,0xac,0xc2,0x4e,0xe1,0x67,0x33,0x01,0x33,0x85,0x59,0x34,0x35,0xd7,0xdd,0xc4,0x04,0xff,0x53,0x78,0xd4,0xb5,0xe9,0x65,0x88,0xfc,0x41,0x6f .byte 0x06,0xfb,0xfa,0x58,0x67,0xa1,0x1d,0x78,0xd9,0xad,0xf2,0x92,0x34,0x87,0x8c,0xd2,0x96,0x95,0x1d,0xc7,0x52,0xcb,0x64,0x5f,0xb2,0xe7,0x3c,0x31,0xe0,0x61,0xbb,0xab,0x34,0xef,0xd4,0x4f,0xe6,0x0b,0x3e,0x58,0x53,0x30,0x92,0xba,0x8c,0x72,0x88,0xb5,0xf5,0x8d,0xc2,0xa2,0xdf,0x86,0x7f,0x15,0xeb,0x8f,0xc1,0x62,0xe0,0x56,0x92,0x00 .byte 0xea,0xf7,0x27,0x73,0xac,0x9f,0x1d,0x13,0xcd,0x33,0xb3,0xd5,0x31,0x29,0x42,0x1e,0x28,0xc2,0xfd,0xd1,0xec,0xb0,0x32,0x83,0xec,0x22,0xda,0xae,0xab,0x7b,0x4f,0x76,0xa9,0xa0,0x0f,0xc3,0x39,0xb1,0xfe,0x63,0x2e,0x72,0xb9,0x41,0x03,0xfd,0x7a,0x33,0xbd,0x1e,0x0e,0xe1,0xd3,0x2b,0xbc,0x68,0x8c,0xd9,0x12,0x02,0xf7,0x9e,0x7f,0xc8 .byte 0x30,0xa2,0x60,0xc0,0x85,0x2a,0xae,0xfd,0xed,0xd0,0x88,0x66,0xef,0xfc,0xe8,0xaf,0x41,0xda,0xd1,0x99,0x8a,0x4e,0x7d,0xaa,0xf5,0x9a,0x56,0xac,0x18,0x14,0xf7,0x6e,0xea,0xad,0xcd,0xed,0x19,0xa6,0x28,0x41,0x2b,0x1d,0xcb,0xa5,0x84,0xfd,0x34,0x84,0x2a,0x05,0x8c,0x74,0x6a,0x43,0x34,0x28,0xf4,0x35,0x60,0x91,0x32,0xd2,0x66,0xc6 .byte 0x3b,0xaa,0xde,0x8a,0xdc,0x73,0xab,0x98,0xeb,0xeb,0xe9,0x97,0xd6,0xe2,0xf4,0xbf,0xbf,0x45,0x62,0x75,0xb2,0xd3,0xad,0x38,0x62,0xdd,0x9b,0x63,0xe1,0x27,0x6a,0x25,0xbf,0xe9,0x26,0xc1,0x9f,0x0e,0x92,0xeb,0xb9,0xdb,0x72,0xea,0xcc,0x11,0x4f,0x4d,0x2a,0x2a,0x7f,0xfd,0xf5,0x2d,0xdc,0x53,0xdf,0x56,0xcf,0x3e,0xf6,0x48,0x1b,0x5d .byte 0x51,0xb8,0x9d,0xc6,0xe3,0xd5,0xcb,0x0d,0x0b,0xb9,0x6e,0x34,0x07,0x90,0xdc,0xe7,0xd1,0x61,0x85,0x6b,0x58,0xd6,0xa2,0x58,0x5f,0xf4,0x6c,0xb9,0x3a,0x11,0x1e,0x2a,0x03,0x80,0x8d,0xc8,0x8c,0x24,0xd1,0xa2,0x53,0x63,0x50,0x66,0x01,0xed,0x0e,0xd3,0xfb,0x57,0x59,0x31,0xeb,0x2e,0x37,0xff,0xc0,0x28,0xfc,0xbb,0x6f,0x61,0xfd,0x69 .byte 0x35,0x94,0xa9,0xed,0x5e,0xca,0xa6,0x37,0x5a,0x01,0xd9,0xcf,0xe4,0x91,0xb3,0x2e,0x2a,0x97,0x46,0x46,0x26,0xd9,0x85,0x01,0xfa,0xcb,0x93,0xdf,0xb4,0x2a,0x86,0x81,0x93,0x2f,0x1b,0x56,0x3f,0xe5,0xd9,0x90,0x2e,0x2b,0xe4,0xc8,0x76,0x96,0x1b,0x91,0x9c,0x6a,0x17,0x42,0x1b,0x63,0x74,0x55,0xbc,0xe0,0xed,0x2e,0x6c,0xd0,0x61,0x37 .byte 0x5b,0xac,0x66,0x2e,0x2b,0x3d,0x47,0xa9,0x7a,0x7d,0xa6,0xfa,0xb4,0xa8,0x18,0x4b,0x65,0x31,0xbb,0xe3,0xe6,0x0e,0x76,0x91,0xe2,0x54,0xfd,0x4a,0xa5,0x35,0x70,0xe4,0xd0,0xbd,0x59,0x75,0xc8,0xca,0x46,0x58,0xf4,0xe5,0x57,0xd2,0x12,0x93,0x14,0x78,0x5f,0xe6,0xee,0x96,0x6e,0xe9,0xf6,0x10,0x41,0x61,0x38,0xf8,0x1e,0x5b,0x69,0x2c .byte 0xc1,0x54,0x8e,0x12,0x23,0xa7,0xc0,0x42,0x18,0x3e,0x4c,0x7b,0x90,0x96,0x03,0x3e,0x4d,0x5c,0xac,0x4d,0xe6,0xed,0xcd,0xe2,0xf5,0x35,0x0c,0xde,0xf7,0x70,0x07,0xa9,0xb1,0xe8,0x0c,0xf3,0x64,0xec,0xf5,0x18,0x0f,0x5a,0x70,0x03,0xcf,0x38,0xe9,0x38,0x83,0x13,0xaa,0x9c,0x6b,0xcd,0x5f,0x4e,0x03,0x04,0x33,0x0c,0x27,0x8c,0x5e,0x3e .byte 0x69,0x49,0xc7,0xc3,0x5f,0x1c,0x5f,0x78,0x55,0x2a,0x40,0xec,0xe9,0x80,0x66,0xb9,0x05,0x60,0xb6,0xa2,0xe1,0x29,0x36,0xe3,0xb7,0x87,0x09,0x3c,0x2f,0x42,0x12,0x53,0xf0,0x6f,0x4b,0xa3,0x05,0x35,0x8b,0xcd,0x18,0xbe,0xe7,0xa2,0xce,0xda,0xbc,0x83,0x0f,0x68,0xc0,0xdc,0xbb,0xa4,0x4a,0x7b,0xae,0x74,0x1f,0xe6,0x13,0x82,0x2f,0xa1 .byte 0x88,0x4f,0x64,0x7e,0x16,0xad,0xbb,0x0d,0x41,0x1c,0xb8,0x3b,0xba,0xc2,0x7a,0xed,0x05,0x54,0x85,0x41,0xf0,0xeb,0xa4,0x0c,0xb7,0x51,0xf5,0x9c,0x36,0x0e,0xea,0x13,0x03,0x91,0x9a,0x60,0x68,0xac,0xc3,0x34,0xc6,0xf1,0xdf,0xb3,0x0f,0x76,0x88,0x9a,0x62,0x01,0xf3,0x15,0xf0,0xaf,0xd7,0x5a,0x66,0x83,0xa8,0x31,0xa5,0x5f,0x97,0x87 .byte 0x10,0xe7,0xb9,0x4d,0xe5,0x87,0x64,0xb1,0x9d,0x9d,0x21,0xcb,0xab,0xeb,0x4b,0x3d,0x10,0x3d,0x9d,0x49,0xfe,0xc2,0x22,0x11,0x23,0x8a,0x0a,0x16,0x12,0xc5,0xed,0x24,0x16,0xbc,0x16,0xd3,0x03,0xa0,0x23,0xe1,0xa1,0x57,0x78,0x9d,0xb8,0x08,0xb9,0x41,0xeb,0xb9,0x8a,0xf6,0x1f,0x70,0xa1,0x99,0xe8,0x93,0x78,0x55,0x76,0xae,0x17,0x7a .byte 0x87,0xb2,0x53,0xf2,0xe9,0xbb,0x4a,0x96,0x32,0x8d,0x59,0x23,0x86,0xb3,0xba,0xaa,0xa2,0x68,0x56,0x5d,0xc9,0x83,0x29,0xe8,0x24,0xf1,0xc4,0x02,0x87,0xcf,0x58,0xeb,0x08,0xaf,0xf1,0x00,0x56,0xa5,0xd6,0x97,0x34,0x49,0x9e,0x93,0x39,0x66,0xf9,0xd9,0xfc,0x0c,0x16,0x9b,0x1f,0xe4,0x7e,0xec,0x03,0x5e,0x53,0xdf,0x2f,0x55,0xa0,0x05 .byte 0x36,0x7f,0x4a,0x4e,0x48,0x76,0xe5,0x5f,0xeb,0xe3,0x00,0x3e,0x25,0x23,0x12,0x44,0x92,0x01,0x44,0xb7,0xb3,0x46,0xb2,0xe4,0xcc,0xcb,0xa3,0x53,0xcd,0x64,0x10,0x65,0xc7,0x6c,0x92,0x07,0x39,0xf8,0x4c,0x6d,0x2c,0x33,0xb5,0x98,0x1b,0x74,0x35,0xad,0x2a,0x35,0x6c,0x51,0x47,0xee,0x1d,0xb5,0x70,0x36,0x2f,0xd4,0x23,0xdc,0xf5,0x4a .byte 0x66,0xa4,0x83,0x50,0xc5,0xb7,0x59,0x96,0x22,0xec,0x5d,0x33,0x7e,0x9d,0xcd,0xe6,0xd4,0x01,0x61,0xaa,0xb0,0x47,0x05,0x11,0x6b,0x27,0xae,0xd2,0xf1,0xe6,0x49,0xe0,0x95,0xa1,0xfd,0x76,0xa2,0xdb,0xa4,0x9d,0x02,0xe6,0x42,0xe0,0x2e,0x36,0x84,0x0f,0x31,0x1e,0xb9,0x8d,0x11,0xc0,0xb8,0xd5,0xcf,0xc8,0x0d,0x97,0xc0,0x5e,0x0b,0xf0 .byte 0x16,0xad,0xc0,0x9e,0x3e,0x38,0xd1,0xbf,0x47,0x77,0x9c,0xcd,0x6b,0xae,0x1c,0x8a,0x51,0x75,0xc4,0x74,0x78,0x5b,0x9d,0x16,0xec,0xc6,0x4b,0x1f,0x53,0xff,0x4e,0xb0,0x1b,0x03,0xdd,0xbf,0x32,0x32,0x55,0xe9,0xcc,0xe7,0xc0,0xde,0x01,0xbd,0x7d,0xb3,0x29,0xae,0xed,0xb8,0x5b,0xa0,0x96,0xc0,0x45,0xb2,0x5d,0xf7,0xa6,0x43,0xc7,0x56 .byte 0x4a,0xc0,0x16,0xbf,0x0e,0xf0,0x77,0x94,0xd0,0x52,0x7e,0xb3,0x45,0xd2,0x16,0x30,0x11,0xc0,0xd6,0xd3,0x61,0xfe,0xdb,0xed,0xa6,0x16,0x4f,0x88,0xce,0x17,0x64,0x02,0xa0,0xc1,0x42,0x47,0x19,0x0b,0xc6,0xea,0x9b,0xf1,0xf0,0xab,0x7c,0xd5,0xf9,0x73,0x9b,0xcc,0xc4,0xce,0x69,0xaf,0xc1,0x48,0xbc,0x13,0xe9,0xad,0xdc,0x6b,0x15,0xb7 .byte 0x3b,0x85,0x05,0x17,0x66,0x35,0x05,0xe6,0xf7,0x99,0xfd,0x04,0x0f,0xd3,0xbd,0xc5,0x0a,0x3f,0x7c,0x49,0x63,0xe5,0xe3,0xa7,0x7a,0x03,0xe3,0xb1,0x3c,0x7d,0x4b,0x04,0x2e,0x94,0x2d,0x9a,0x55,0x18,0xd1,0x7c,0xc5,0x06,0xbc,0xf2,0x68,0xa9,0x9a,0xd9,0xf5,0xb4,0x15,0x66,0x0a,0x8c,0x68,0xa3,0xb6,0x41,0xb1,0x57,0x55,0xac,0x5c,0x2a .byte 0xff,0xb0,0x30,0x11,0x31,0x1f,0xe4,0x05,0x91,0xe3,0xf9,0x2d,0x9a,0xd6,0x2a,0x73,0xdf,0x34,0x1d,0xf0,0xbe,0x46,0x60,0xce,0xa7,0x81,0xf1,0x8b,0x52,0x42,0x1d,0xa7,0x97,0x8c,0x92,0xe2,0xe2,0x00,0x5a,0xce,0xc2,0x70,0x52,0x02,0xa4,0x35,0xb6,0xe8,0x3f,0x22,0x75,0x4e,0xf0,0xc8,0x08,0x54,0x1b,0x52,0x21,0xe2,0x26,0x11,0x92,0x98 .byte 0xb1,0x26,0x23,0x58,0xeb,0xb8,0x97,0xcd,0xb3,0x2d,0x9b,0x4b,0x6e,0xcf,0x28,0xd5,0x0f,0x12,0x89,0x1f,0x90,0x7c,0x96,0x98,0xee,0xc0,0x29,0xed,0x6d,0xcb,0xca,0x07,0x10,0xe0,0x23,0xe4,0x28,0x97,0x8e,0x47,0x46,0x4a,0xde,0x6c,0x3b,0xff,0x75,0xfc,0x38,0x78,0xe8,0x27,0xba,0x5e,0xd2,0x9a,0xa4,0xf6,0xcd,0xef,0xf4,0x74,0x61,0x8f .byte 0x20,0x99,0x60,0x2a,0x97,0x42,0x34,0xa8,0x70,0x5d,0xe7,0xa6,0xc9,0x80,0xc8,0x15,0x11,0x5b,0xf0,0x50,0x5f,0x44,0xa2,0x01,0x63,0x32,0x11,0x89,0xaa,0x36,0x38,0xc4,0xba,0x08,0xbf,0x2a,0x9c,0x69,0x2b,0x84,0x2c,0x14,0x97,0x60,0xc3,0x5d,0x04,0xe3,0x9d,0xcb,0x9a,0xa2,0x15,0x3f,0xa6,0x28,0x24,0xde,0x00,0xee,0x1e,0x11,0x95,0xb4 .byte 0x12,0xb8,0xff,0x3e,0x31,0xf2,0xc4,0x06,0xf1,0x9c,0x44,0xc5,0x59,0xa5,0xf8,0xc0,0x33,0x59,0x97,0x2d,0x6d,0x97,0xdb,0x33,0xba,0x30,0xd2,0xa9,0xc2,0x1e,0xb6,0x8f,0x3d,0x83,0x4c,0x82,0x04,0xeb,0x50,0xdd,0x42,0x31,0x1d,0x3e,0x35,0xb4,0x32,0xaf,0x16,0x50,0xb3,0x05,0xbe,0x8a,0x80,0x14,0x8a,0x3f,0x2f,0x8d,0x70,0xc0,0x60,0xa6 .byte 0x5d,0x8e,0x38,0x94,0x47,0xab,0x1b,0xf6,0x9e,0x9e,0xf1,0x84,0xa5,0xdb,0xab,0x6a,0x71,0xc5,0x36,0x86,0xe0,0xb5,0x7e,0xd5,0x7f,0x1b,0xdb,0xa0,0x9d,0x1a,0xe3,0x84,0xc9,0x59,0xac,0x24,0x2b,0xa5,0x18,0x70,0xf9,0xf0,0xe8,0x2c,0xad,0x54,0x62,0x99,0x2a,0x56,0xbf,0x76,0x89,0x0e,0x93,0x55,0xea,0x83,0xc7,0xa1,0x2d,0x6c,0x4d,0x00 .byte 0x9f,0xa9,0x9d,0x97,0x4e,0x76,0x20,0x9d,0x09,0x24,0x97,0xfe,0xa6,0xd6,0xda,0x66,0x39,0x27,0x0a,0x05,0x52,0xee,0xc8,0x70,0x0a,0x65,0xea,0x0f,0xa3,0xe0,0x10,0xbb,0xe4,0x87,0xb1,0x18,0x75,0x72,0xe7,0x6b,0xd6,0x88,0x91,0x6c,0xd0,0x7c,0xda,0x10,0xdf,0xd6,0xc7,0xcd,0x33,0x7d,0x28,0x9d,0x6d,0x2c,0xc2,0x59,0xc3,0xf5,0xb4,0x55 .byte 0xe2,0x8b,0x65,0x92,0x4b,0x49,0x62,0x3a,0x49,0x00,0x62,0x79,0x9c,0xbd,0x99,0x7a,0x7f,0x71,0x19,0x90,0x77,0x56,0x94,0x2d,0xce,0x93,0x69,0xa6,0x56,0xde,0x75,0xdb,0x43,0x0f,0xae,0x1a,0x93,0x79,0x6c,0x2c,0x03,0xe3,0xfc,0x7d,0x90,0xd6,0x10,0xca,0x97,0x53,0x63,0x9e,0x6c,0x13,0xcf,0x4b,0x1a,0x76,0xf4,0x5b,0x57,0x27,0x20,0x76 .byte 0xe5,0xee,0xfc,0x5d,0x12,0x67,0x88,0x37,0xf4,0xb5,0xf5,0x39,0x23,0x90,0xf3,0x31,0xad,0x1d,0xc3,0x98,0xaf,0x49,0x64,0x2a,0x75,0x4d,0x34,0x8c,0xf1,0x50,0x82,0xda,0xe9,0x17,0x63,0xbb,0xe8,0x54,0x36,0xd4,0x38,0x57,0x4c,0xe3,0xfd,0x11,0x02,0xbc,0xc7,0xb6,0x65,0xe2,0xd7,0x84,0x38,0xbf,0xf1,0xea,0xac,0x23,0x89,0xa5,0x3d,0xa8 .byte 0x4d,0x5b,0x97,0x01,0x23,0xcd,0x8d,0xfc,0x28,0xc9,0xc2,0x06,0x06,0x6c,0x0d,0x07,0x0f,0x7f,0x7d,0xcf,0xcf,0x67,0xc7,0xe0,0xe1,0x4d,0xe8,0xee,0x6d,0x9a,0x1c,0x92,0xa6,0x4f,0xaf,0x4c,0xc3,0xa0,0xe7,0x73,0xa2,0x7b,0x4a,0x43,0xc2,0x94,0x6c,0xc6,0xb0,0x87,0x36,0xa0,0x3e,0x31,0x6e,0x77,0xc2,0xc1,0x90,0xb1,0x78,0x2c,0x52,0x44 .byte 0x9f,0xaf,0xc8,0x2e,0xca,0x90,0x60,0xc7,0xf8,0xa8,0xdd,0x91,0x42,0x1f,0x13,0x97,0x10,0x27,0xa1,0x74,0x51,0x71,0xeb,0xef,0xa6,0x83,0x7c,0xa0,0xd7,0x5f,0x59,0x54,0xf3,0xff,0xa2,0xfb,0x58,0xbc,0xbf,0x02,0xa8,0x44,0xca,0xf6,0x61,0xda,0x47,0xaa,0x02,0x3b,0xb4,0x2f,0xc4,0x12,0xbd,0xd7,0x24,0x56,0xe2,0x6e,0x51,0x34,0xdb,0x1c .byte 0x3d,0xd1,0xc5,0x90,0xfc,0xfd,0xe0,0xf0,0x99,0x3c,0x75,0x58,0xeb,0xb0,0xb2,0x97,0x60,0x81,0xd5,0x79,0xce,0x20,0xd2,0x20,0x50,0x46,0x20,0x96,0x98,0xdc,0x38,0x7f,0x38,0x80,0x91,0xf1,0xa1,0x26,0xa0,0xc5,0x14,0x96,0xe0,0x1f,0x96,0xf5,0x91,0x09,0xac,0xab,0xad,0x5e,0x96,0xa3,0xcb,0xfb,0x4c,0xb9,0x5f,0x30,0x0a,0x24,0x1f,0x65 .byte 0x23,0x23,0x58,0x02,0xaa,0xb0,0x2c,0xe8,0xca,0xf1,0x0d,0x7e,0xe2,0xc5,0xee,0x1a,0x19,0x94,0x48,0xeb,0xee,0x71,0xbc,0x67,0xf2,0x39,0x1e,0xff,0xb1,0x35,0x60,0x8d,0xb4,0x97,0x06,0x89,0xa6,0xca,0xee,0xb8,0x5c,0xdf,0x3e,0x52,0x5c,0xa4,0x91,0x08,0x66,0xdf,0x20,0xbf,0xbe,0xfa,0xe3,0x58,0xd0,0x47,0xeb,0x3f,0xa1,0xfd,0x07,0x68 .byte 0x35,0x7d,0x5c,0x67,0x13,0x7e,0x28,0x51,0x69,0x20,0x60,0x20,0x9c,0xf3,0x3a,0x23,0x8c,0x7c,0x95,0x0e,0x18,0x43,0xdf,0xe8,0xb1,0x71,0x4a,0x58,0x71,0x22,0x04,0xa4,0xad,0xab,0x77,0xa3,0xe5,0x01,0xb4,0x4a,0x4f,0x2f,0x6c,0x74,0x67,0x48,0x22,0x15,0xb0,0x10,0x6f,0xc4,0x95,0x11,0x09,0xa6,0x1a,0x2e,0x40,0x58,0xcb,0x5e,0x37,0xce .byte 0xbb,0xd3,0x5e,0xc8,0xcb,0xde,0x4e,0x1e,0x7a,0xb8,0xb4,0x27,0x45,0xb7,0x63,0xce,0x92,0xf8,0x31,0xd4,0xaf,0x3a,0x91,0x32,0x5f,0x27,0x67,0x94,0xf2,0x76,0xb7,0xd5,0x92,0xd2,0xe8,0x75,0xce,0x58,0x84,0xbb,0xf7,0xbb,0xa2,0x15,0x5a,0xd1,0x6e,0x83,0x5f,0x47,0xdb,0x73,0xdb,0x04,0xcd,0x55,0x15,0x6e,0x42,0xcf,0x8b,0x04,0x1b,0xfa .byte 0x82,0xf9,0xb5,0x9b,0xa0,0x2b,0x6b,0x7d,0x31,0x12,0x63,0x2e,0x27,0xdb,0x87,0x88,0x95,0xb8,0xf5,0x16,0xec,0x16,0xac,0xf1,0xa4,0x7f,0x51,0x99,0xc5,0x8a,0xf2,0x5c,0xbe,0xe2,0xe9,0xe2,0x03,0x76,0xfc,0xdd,0xaf,0x69,0x61,0x92,0xef,0xf7,0x07,0x17,0x3f,0x48,0xfa,0x04,0x8e,0xb4,0x56,0xa1,0x07,0xec,0x98,0xad,0x72,0xd5,0x91,0x52 .byte 0x4b,0xe4,0x0a,0x51,0x10,0x4f,0xad,0x99,0xfd,0x89,0xa1,0x19,0xe3,0x52,0x15,0xc8,0x8c,0x10,0xc6,0x9f,0x94,0x5b,0xf0,0xbd,0x67,0x20,0xcc,0xa1,0x9c,0x06,0x8c,0xa6,0x47,0x5d,0x1d,0x22,0x0b,0xa3,0x2c,0x59,0x18,0xfb,0x46,0xf2,0xa3,0x6a,0x3c,0x08,0xeb,0x42,0xad,0x3a,0x01,0xeb,0xfd,0x9b,0x54,0x4e,0x6e,0x60,0xee,0x94,0x04,0x42 .byte 0x75,0x5e,0xdf,0x51,0x4f,0x92,0xac,0x2e,0x6d,0xaf,0x87,0x7f,0x0a,0xdc,0x7d,0x58,0x62,0xdb,0xc8,0x15,0x1f,0xef,0x8d,0xbf,0x9f,0x80,0xf9,0x3d,0x39,0x2c,0x63,0x94,0x36,0xf2,0xda,0xf5,0x63,0x5a,0x8e,0x1e,0x28,0x12,0xbc,0xa3,0x9e,0x31,0x34,0x11,0xca,0xd0,0xc0,0x67,0x58,0xcf,0xb6,0x1d,0x68,0xa4,0xae,0x2d,0x73,0x0d,0x7b,0x02 .byte 0xc6,0x01,0xc5,0xa8,0x22,0xf0,0x7a,0x97,0x97,0x93,0xbe,0x52,0xb9,0xa2,0xdd,0x49,0x33,0x1a,0xab,0xc1,0x6e,0xc5,0x7f,0x71,0xdc,0xbf,0x1e,0x28,0x3d,0xf6,0x50,0xe2,0x66,0x01,0x21,0xc5,0x42,0xf2,0x3e,0x4e,0x8b,0x8a,0x07,0xfc,0x42,0xeb,0x78,0x0f,0xd0,0x0f,0x2a,0x4e,0x41,0x7c,0xa5,0x49,0x7b,0x0f,0x88,0x49,0x51,0x7c,0x0f,0x5e .byte 0xcd,0x9b,0x8b,0xc8,0x13,0xfd,0x16,0xfd,0xa4,0x77,0xf2,0x5b,0x02,0x02,0x38,0x5c,0xf0,0x5a,0x49,0xd8,0x80,0x48,0x10,0xa4,0x3c,0xcd,0x3b,0x6c,0x38,0x53,0x63,0xba,0xbf,0xb2,0x80,0x68,0x96,0x47,0x44,0xf3,0xa0,0xe3,0x85,0xe2,0x17,0xbb,0xfc,0x0f,0xa2,0x67,0x04,0x28,0x79,0x7f,0x05,0x84,0x5b,0x62,0x80,0x09,0x2c,0xb6,0x6f,0x76 .byte 0x18,0xba,0x83,0x39,0x82,0xa7,0x0b,0x63,0x34,0x87,0xa1,0xa1,0xa0,0xe1,0xda,0x0d,0x7b,0xe6,0xd7,0xcd,0xca,0x02,0x45,0x66,0xe5,0x30,0xc8,0xac,0x81,0xdf,0xfe,0x74,0xe5,0x45,0xd9,0x99,0x04,0xa6,0xcf,0x3c,0x10,0x73,0xfb,0xd7,0xe0,0xc0,0x44,0x54,0xda,0x9b,0x9a,0x64,0x90,0x6f,0x42,0x1a,0xda,0x65,0x24,0x3d,0xb6,0x70,0x8d,0xe1 .byte 0x33,0xf9,0xb2,0xda,0xa4,0x2e,0x7d,0x90,0x2b,0x14,0x16,0xd1,0x13,0xd4,0x1a,0xe6,0x25,0xa8,0x66,0x0b,0xed,0xed,0xa0,0x62,0x9c,0xb4,0x24,0x03,0x6f,0x36,0x7a,0x93,0x42,0xbc,0xf7,0x23,0x6b,0x0e,0xee,0xdf,0x80,0xd3,0xc1,0xc4,0x8e,0x3f,0xd9,0x1a,0x6f,0x37,0xc9,0x71,0xf4,0x3f,0x7e,0xa8,0x7d,0xbe,0x8d,0x53,0x11,0x35,0x16,0x0b .byte 0x63,0xdb,0x99,0xa5,0x3b,0x17,0x7b,0x97,0xdb,0x81,0x36,0x43,0x33,0xde,0x31,0xc1,0xc8,0xb2,0x99,0x86,0xd0,0x2f,0x57,0x89,0x91,0xd7,0x3b,0x1f,0x5b,0xd5,0xb4,0x42,0x77,0x66,0x9a,0xaa,0x65,0x9d,0x5c,0x12,0xbf,0xeb,0xa4,0xb3,0xc8,0x4c,0xdb,0xf2,0x4c,0xe5,0xe8,0xb6,0xaa,0xc1,0xe2,0xd7,0xd2,0x14,0x03,0x27,0x04,0x0a,0xf9,0x54 .byte 0x07,0xcc,0x50,0xbb,0xd6,0xfc,0x68,0x01,0xc3,0x79,0xb2,0x0c,0x4c,0x8e,0x65,0x41,0x91,0x7d,0x91,0x33,0x64,0xfa,0xeb,0x1a,0xbc,0x08,0x29,0x14,0x61,0x08,0xc8,0xd4,0xbb,0x64,0xe7,0xb1,0x2d,0xe0,0x1d,0xc6,0xae,0x78,0x20,0x81,0x8f,0x8d,0x20,0xb7,0x9d,0x7e,0x55,0x6e,0xbe,0x39,0x72,0x6e,0xc9,0xd8,0x6c,0x5c,0xa6,0x4c,0x48,0x2b .byte 0x4e,0x14,0x98,0x76,0x7b,0x6e,0x8b,0x1d,0x50,0xc8,0x30,0xa6,0x3a,0xe6,0xa4,0xf1,0x6c,0x67,0x7d,0x10,0x28,0x93,0x4d,0xe6,0x93,0x2c,0x1e,0xc1,0xbc,0x9a,0xff,0x21,0x00,0x66,0xeb,0x72,0xe1,0x57,0xe0,0x03,0x55,0x0f,0x56,0x27,0x36,0xbb,0x75,0x01,0x02,0xcd,0xad,0x6b,0xf2,0xa2,0xec,0x18,0x62,0xa3,0xd6,0x10,0x5e,0x2c,0xf6,0xa5 .byte 0xec,0x67,0xcc,0xfe,0xe8,0xa2,0x9e,0x0d,0xf0,0x11,0xf1,0x32,0xd7,0x4e,0x3a,0xbd,0xea,0xec,0xa9,0x72,0x98,0x82,0x00,0xa4,0x49,0xe2,0xa8,0xfc,0xf3,0x3c,0x3c,0x0e,0x2d,0x2c,0xc9,0xf8,0x72,0x04,0x67,0x4b,0x00,0xf9,0xd4,0x77,0x90,0x8e,0xf8,0x62,0xdc,0x23,0xc1,0x7a,0x2d,0xb3,0x40,0x47,0x7b,0x0b,0xac,0x5f,0x2a,0x67,0x84,0xed .byte 0xf4,0x75,0x9c,0xf4,0x20,0x83,0xa8,0xed,0x3e,0x14,0x28,0xbb,0xc5,0xb1,0x1f,0x25,0x46,0x32,0xd3,0x9f,0x1b,0xa8,0x2d,0xf7,0x07,0x9c,0x82,0x25,0x25,0x5c,0x75,0x03,0x32,0xce,0x6a,0x51,0x60,0xde,0xf7,0x54,0x10,0x97,0xdf,0x28,0x19,0x59,0xe9,0x62,0x81,0xd1,0x20,0xbe,0x9a,0x2d,0xf4,0x42,0xb3,0x2b,0x7c,0x5e,0x83,0xfe,0xd6,0xfc .byte 0xac,0xe5,0x5d,0x27,0xb0,0x50,0xee,0xca,0x12,0xcd,0x3d,0xe9,0x24,0x77,0xee,0x61,0xec,0xb7,0x0e,0xd1,0x10,0x9a,0xa7,0x7d,0x8a,0x77,0x9f,0xc9,0x70,0x02,0x02,0xbf,0xc7,0x9c,0xcb,0xc2,0xff,0x77,0xd2,0x7a,0x37,0x3d,0xb4,0xad,0xb8,0x4e,0xc3,0x87,0x1d,0x93,0x77,0xb4,0xab,0x7f,0x6c,0xca,0x48,0xfd,0x31,0x88,0x05,0x2d,0xc4,0xe6 .byte 0x97,0xe8,0xe7,0x39,0xab,0xe4,0xd5,0xd4,0xa8,0xc5,0x81,0xcc,0xe2,0xa3,0x48,0x49,0x9c,0x4e,0xb0,0x1c,0x80,0xbb,0xc3,0xfe,0xa2,0x04,0xcf,0xdd,0x01,0x26,0x25,0x78,0x65,0x51,0xb1,0x40,0x02,0x6e,0x58,0x90,0x59,0xad,0xe8,0x59,0xc3,0x1b,0x59,0xb1,0x34,0x38,0x32,0x66,0xd7,0x15,0xc3,0x50,0xe5,0xb1,0x54,0x23,0xd0,0xc7,0x92,0xa3 .byte 0xb3,0x66,0x07,0x49,0xc5,0xdf,0x46,0x06,0x16,0xb4,0xe1,0xca,0xb5,0x15,0xa4,0x77,0xf0,0x4a,0xba,0xfe,0xd9,0xd9,0x9b,0x11,0xdb,0x71,0xe6,0x73,0xc3,0x9a,0xaa,0x96,0xb6,0xb8,0x8f,0x2a,0xcf,0x90,0xad,0x4e,0x7c,0x3c,0xe1,0x67,0x4a,0x97,0x1a,0xce,0x7d,0x0b,0xa8,0xb3,0x6a,0xa2,0x18,0x45,0xcc,0xa7,0xe6,0x3f,0x5e,0xb4,0x51,0xc7 .byte 0xa7,0x78,0xc5,0x08,0x64,0xea,0x9d,0x1a,0x63,0x25,0x12,0x89,0xb3,0xde,0x3e,0x56,0x4a,0x9f,0x0f,0x6a,0x76,0xb0,0xa1,0xe2,0x47,0xb9,0x6a,0x2a,0xa8,0x80,0xcd,0x2a,0x30,0x75,0xd7,0x7c,0x07,0xfb,0xd3,0xf2,0xc9,0xf7,0x2a,0xb5,0x8d,0x99,0xf0,0xbd,0xbe,0xae,0x3a,0x54,0x22,0x5b,0xd9,0x21,0x3a,0x80,0xac,0x44,0xfb,0xe3,0x30,0xf5 .byte 0x22,0x07,0xc3,0xe6,0x4b,0xba,0x95,0x0f,0xd6,0x94,0x0f,0x2d,0x0c,0x65,0x92,0x18,0x9a,0xec,0xb3,0x0d,0x72,0x3b,0xb0,0x50,0xa1,0x6b,0x7f,0xc3,0x4d,0x5e,0x04,0x90,0x95,0x67,0xa5,0xa6,0xe6,0xb4,0xaa,0x00,0x4a,0x16,0x6b,0x0e,0xc9,0x67,0xad,0x73,0x39,0x93,0xf5,0xe0,0x4d,0xe1,0x92,0xd1,0xeb,0x3a,0x97,0xe5,0xb2,0xf8,0xce,0x53 .byte 0x3e,0x43,0x45,0x97,0x69,0xa2,0xd5,0xc2,0x49,0xb5,0x1e,0xad,0x76,0xc3,0x7e,0xbf,0xe7,0x36,0xa5,0x5a,0xb5,0x2d,0x0e,0xc5,0xa2,0x1b,0xdb,0x3d,0x3d,0xb1,0x9a,0x84,0x43,0x3e,0x5a,0xb9,0x36,0x68,0x28,0x6a,0x60,0x33,0x1b,0xff,0xde,0xd5,0x0a,0x1b,0xe8,0xb2,0xa7,0x1f,0x52,0x97,0xf8,0x8c,0x54,0xba,0x44,0x97,0x0d,0xd4,0x40,0x0d .byte 0x40,0x18,0x06,0xc5,0xc7,0xcd,0x4b,0xb3,0x38,0xb1,0x23,0x85,0x19,0x0c,0xd5,0x6c,0xc7,0xed,0xbe,0xeb,0x66,0x10,0x1b,0x40,0x65,0x1d,0x3a,0x0b,0xb4,0x88,0x41,0x48,0xfb,0x63,0x45,0xbe,0xdc,0x97,0x73,0x10,0x18,0x55,0xac,0x54,0xfe,0x1d,0x16,0xe9,0x79,0x1c,0xc8,0x1e,0x58,0x9c,0x9c,0xaa,0x49,0xe8,0xb3,0xab,0x4f,0xdf,0xcd,0xeb .byte 0xb6,0xdb,0x03,0xa7,0xee,0x4b,0x7f,0x22,0x54,0x58,0xa5,0x82,0x69,0xf6,0xaf,0x00,0x9b,0x6b,0xf8,0xfb,0x0f,0xfd,0xc3,0x6f,0x91,0xcb,0x47,0xee,0x79,0xdf,0x7c,0x01,0xb3,0xd8,0x0d,0x44,0x8c,0xbb,0xc7,0xa2,0x9c,0x74,0xcb,0xc7,0xc8,0x4b,0x3d,0x4e,0x83,0xe7,0x2c,0x7a,0xe9,0xca,0x71,0x30,0x05,0x33,0x71,0x3a,0x2e,0x9f,0xef,0xbd .byte 0xa8,0xfc,0xc9,0x9a,0xc4,0x5b,0x43,0x1d,0xf9,0x36,0xd7,0xde,0x61,0x39,0xa2,0x75,0x8b,0xca,0xcd,0x83,0x2f,0x05,0x13,0x3f,0x51,0xad,0x8f,0x65,0x95,0x50,0x40,0x56,0xc1,0x13,0x1d,0xda,0xd9,0x6d,0xe7,0x3d,0x75,0x13,0x01,0x65,0x0c,0xfe,0x6b,0xaf,0x14,0x5e,0x09,0xa3,0xfa,0x28,0x39,0xdd,0xd4,0xec,0x17,0x43,0x04,0xe1,0x12,0x5f .byte 0x5e,0xf9,0x3d,0x75,0x19,0x5e,0x08,0x17,0xe7,0xff,0x7a,0xf7,0x68,0x8e,0x05,0x37,0x65,0xb1,0x73,0xf1,0xb8,0xec,0x85,0x06,0xee,0x0a,0x43,0x2f,0xfb,0x93,0x51,0x50,0xb3,0xae,0xca,0xa2,0x8a,0xf0,0xd7,0x31,0x7f,0x1f,0x83,0x98,0x9e,0x06,0xce,0x12,0x32,0xb1,0xba,0x84,0x7d,0x8e,0xc9,0xe7,0x84,0x5b,0x52,0xe8,0x91,0x90,0x76,0xf4 .byte 0x00,0xce,0x8a,0x94,0x84,0x18,0x24,0x07,0xb4,0x42,0x1d,0xe1,0x8c,0x3b,0xf7,0xc8,0xa1,0xbd,0x74,0xdc,0xfd,0xe5,0x5b,0xf2,0xd6,0x12,0xb9,0x41,0x8c,0xa6,0x26,0x9a,0x01,0x1f,0x8e,0x87,0xa9,0xf0,0xfd,0xcb,0x70,0xb5,0xc7,0x42,0x22,0x1f,0x77,0xf0,0x89,0x83,0x22,0xde,0x0d,0x8f,0x37,0x7a,0x42,0x96,0xb9,0x99,0x3b,0xf6,0x25,0xd5 .byte 0xc4,0x81,0xbe,0xbf,0xc1,0x72,0x84,0x14,0x2d,0x40,0xe1,0x65,0xaf,0x46,0xd9,0x23,0x47,0x3b,0x13,0x15,0x83,0xe4,0x66,0x07,0x20,0x38,0xec,0xc8,0x62,0x81,0x9e,0x9c,0xcc,0xf7,0x3e,0x5d,0x2c,0xbc,0x67,0x0d,0x8c,0x3b,0xd5,0x46,0x37,0xef,0x0e,0x79,0x68,0x57,0xa3,0xa9,0x09,0xfc,0xe8,0xa4,0x75,0xd3,0x0a,0x8f,0xfd,0xb0,0xd7,0xbd .byte 0x26,0xf7,0xb7,0x1f,0x18,0xbc,0xff,0x02,0xc3,0x1b,0x00,0xea,0x3b,0xf5,0x04,0x00,0x53,0x94,0xc6,0x09,0x08,0x20,0x37,0xcd,0x6c,0xa8,0x9d,0x79,0xcf,0xe9,0x27,0x5e,0x12,0x9a,0xa1,0xcd,0x7d,0x92,0x52,0x52,0xc4,0xbf,0x54,0x45,0xb8,0x99,0x20,0x0d,0xdb,0xb7,0x6c,0x25,0x00,0xa2,0xd3,0x1a,0x8e,0x3a,0x60,0x2f,0x5e,0x16,0x04,0xcb .byte 0x04,0xc9,0x63,0xf9,0x3d,0x66,0xfd,0xb8,0x73,0x70,0x60,0xdd,0xfa,0x6b,0x96,0xfb,0xb1,0x6c,0x34,0xa2,0x76,0xea,0x40,0xa7,0x24,0xac,0x31,0xb6,0xef,0xe6,0xbb,0xfb,0xcf,0xfc,0xff,0x88,0xa4,0x79,0xdc,0xa7,0xe1,0x52,0xd7,0x6f,0x1c,0xf4,0x40,0x2b,0xcd,0xf7,0x95,0x3f,0x9c,0xbd,0xae,0xba,0xb3,0x9b,0xbe,0xf7,0x5f,0xc4,0x8b,0xe8 .byte 0x85,0x74,0xdc,0x51,0xe5,0x7f,0x4f,0xd7,0x54,0x93,0x7b,0x4b,0x52,0x48,0x48,0x99,0x75,0x92,0x97,0x3c,0xf3,0x4e,0x37,0x9c,0x15,0xd5,0xc3,0xeb,0xec,0x8e,0xe5,0x26,0x85,0x5c,0x95,0x23,0x09,0x1d,0x98,0x4b,0x65,0x7c,0xac,0x84,0xb9,0xc5,0xad,0x07,0xad,0x8b,0x4d,0xd9,0xc2,0x54,0x64,0x24,0x4f,0xb3,0xb8,0x04,0xca,0x35,0x20,0x70 .byte 0x92,0xe1,0x4b,0x0a,0x93,0x8e,0x25,0x68,0x78,0xcf,0xa1,0xbd,0x25,0x81,0x49,0x78,0x2f,0x78,0x67,0x40,0xef,0xa6,0x46,0x87,0x07,0xb2,0x56,0xbf,0x16,0xfd,0x64,0x24,0xf6,0x60,0xbf,0x54,0x66,0xc0,0xcc,0x99,0x6b,0x4e,0x39,0x9a,0x27,0x67,0xaf,0x1d,0x6e,0x46,0x6c,0x5c,0xd8,0xf4,0x8b,0xee,0x1b,0x3f,0xe8,0xe6,0xf8,0xbd,0xae,0x9a .byte 0x96,0x12,0xb4,0xe9,0x47,0x4b,0xfe,0x32,0x9e,0x84,0x44,0x51,0x14,0xe6,0xea,0x03,0xaf,0x45,0xc5,0x2c,0xc3,0x1c,0xc6,0x76,0x81,0xaa,0x38,0x1c,0x37,0x02,0x35,0x36,0x72,0xc1,0xa5,0x9b,0xf5,0x17,0xaf,0xe4,0xdb,0x95,0x2a,0x6e,0xb4,0xb2,0xdd,0x6e,0x02,0xa9,0x74,0xd7,0x51,0xb9,0x21,0x8f,0x34,0x74,0xdf,0xd4,0x70,0x13,0x9c,0x33 .byte 0x4e,0x9b,0x5d,0x6b,0x1c,0xd0,0x3c,0xd1,0x0d,0x47,0xc7,0xb3,0x8d,0x2c,0x40,0x3a,0x35,0xf2,0xab,0x83,0x4b,0x1a,0x04,0x29,0xd3,0xae,0x28,0x45,0x1f,0x85,0xf2,0x63,0x01,0x47,0x2b,0xe0,0xf5,0xc4,0xc3,0x11,0xa5,0x09,0x11,0x23,0xd2,0xfc,0xde,0xd4,0xf7,0x42,0x28,0x78,0x87,0x37,0xc0,0xe5,0x7b,0x79,0xb0,0xe4,0xed,0x4c,0x6f,0x13 .byte 0xa6,0xda,0x66,0x69,0xef,0x42,0xe4,0x04,0x09,0xca,0xef,0x35,0x13,0x2d,0x33,0x2f,0x6f,0xe1,0x46,0x40,0x75,0x5f,0xbf,0x35,0xb1,0xbc,0x86,0x95,0x16,0x37,0xaa,0x92,0x86,0x6f,0xdd,0x96,0x1e,0x13,0x88,0x75,0xc5,0xeb,0x29,0x1a,0x91,0xae,0xd3,0x0b,0xa1,0x14,0x4a,0xad,0x39,0xa4,0xd2,0xf1,0x51,0x61,0x9e,0x54,0xc6,0x8d,0x36,0xdf .byte 0x95,0x1d,0x9c,0xf7,0x73,0x64,0x71,0xca,0xd2,0x6b,0xde,0x8c,0xa1,0x0d,0x4a,0x07,0x79,0x35,0x5f,0x4b,0xde,0xeb,0xb6,0x36,0xd1,0xe0,0xb3,0x32,0x00,0x62,0x03,0x0a,0x01,0x4a,0x95,0xeb,0x1d,0x6a,0xcc,0x9b,0xec,0xaf,0x76,0x70,0x04,0xd3,0xbd,0x3b,0x11,0xc6,0xd6,0xf1,0xf5,0x0d,0x08,0xdd,0xaa,0x8d,0x40,0xb1,0xfd,0x09,0xda,0x01 .byte 0x32,0x13,0xe0,0x5a,0x46,0x82,0x10,0x26,0x2e,0xe5,0xd8,0xed,0xbc,0x03,0x1d,0x0f,0xd2,0x45,0x5c,0xda,0xd7,0x7e,0xb2,0xde,0x68,0x7a,0x3a,0x5a,0x4d,0x37,0xcb,0xae,0x0b,0x4a,0x92,0x7d,0x47,0x6e,0x19,0x93,0x62,0x3e,0x09,0xfe,0x0b,0x78,0x22,0xcf,0x62,0xa3,0x03,0x9e,0xa5,0x05,0x7b,0x81,0x3d,0x86,0x2e,0x00,0x4f,0xb9,0xdc,0x5c .byte 0x5e,0x38,0x37,0x98,0x9c,0x2c,0xf2,0xd4,0x2e,0xe3,0xc7,0x62,0x9f,0x62,0xbe,0xfa,0x6b,0xd6,0x2c,0x9f,0x89,0xed,0x2f,0xb0,0x50,0x29,0xa6,0x71,0x5c,0x92,0xea,0x6d,0xc7,0x77,0x36,0x43,0xbf,0x89,0x49,0xfe,0x3f,0x95,0x66,0xe6,0xfe,0x39,0xda,0x8b,0xda,0x5a,0x8f,0xf3,0x0b,0x5d,0xb0,0x2f,0x8c,0xb3,0xb4,0xbd,0x8c,0x18,0xb9,0xf8 .byte 0x70,0x2a,0xa2,0x23,0xe6,0x6b,0x21,0x26,0x07,0x60,0x00,0xa7,0xf5,0xa8,0x2f,0x57,0x35,0x06,0xe2,0x42,0x40,0xbd,0x39,0xda,0xb9,0x13,0x1b,0x29,0x6e,0x9b,0x16,0x40,0x1d,0xe8,0x5e,0xc1,0xa0,0x01,0x4b,0x70,0x95,0x11,0xb9,0xc3,0x6c,0xd0,0xe1,0x2f,0x5e,0x44,0x92,0xb5,0x2d,0x2e,0xdd,0xe8,0xfa,0xfa,0x0f,0xff,0xcc,0x9e,0x6c,0x81 .byte 0x56,0x75,0xc6,0xb8,0x92,0x58,0x83,0xd1,0x05,0x8d,0x5a,0x19,0xeb,0x43,0xbd,0xea,0xc4,0xac,0x8a,0x54,0xab,0x7c,0xc6,0x41,0x60,0x9f,0x36,0x9a,0x11,0xbe,0x10,0x0c,0x39,0x05,0xf0,0x7d,0xad,0xbe,0xcd,0x5d,0x14,0x24,0x4a,0x0f,0xa6,0x86,0x72,0x15,0xcc,0xd7,0xd3,0xc1,0x26,0xd7,0x90,0xb0,0xf7,0x62,0x31,0x73,0xa9,0xcb,0x85,0xeb .byte 0xa4,0x03,0x41,0xcc,0x60,0x4b,0x46,0xf4,0x9f,0xe6,0xc0,0x0e,0x69,0xf8,0x4c,0x4a,0x51,0xe2,0x2a,0x42,0xc2,0x32,0xcd,0x57,0x81,0xfb,0x6a,0x6e,0x01,0x12,0xe6,0xe3,0x58,0xd2,0xaf,0x28,0x64,0x56,0xb8,0x27,0xa2,0x73,0xba,0xe4,0x83,0x57,0x0d,0x5d,0xd1,0x15,0xd0,0x62,0xb8,0x79,0x97,0xc9,0x0b,0xb4,0x42,0xe1,0x2d,0xb8,0x58,0x2c .byte 0xa6,0x8a,0x68,0x78,0x05,0x6c,0x95,0x25,0x9d,0x8f,0x14,0x0c,0x76,0xe6,0xb4,0x0e,0x40,0xf7,0xb8,0xbe,0x5d,0xc6,0x08,0xe5,0x74,0x5b,0xb0,0xf7,0x68,0x0c,0x71,0xa9,0x1b,0x2f,0x39,0x64,0xf2,0xb9,0x2d,0xbc,0x38,0xdd,0x93,0x06,0xe9,0x23,0x31,0xe4,0xf4,0xdb,0x66,0x50,0x3a,0x23,0xce,0xee,0x69,0xfd,0x39,0xe5,0xb5,0x15,0xf0,0x14 .byte 0x59,0xa3,0xa1,0x78,0xb5,0x51,0x96,0x07,0x29,0x15,0x48,0x36,0xf1,0xef,0xf4,0xeb,0x90,0xea,0x3d,0xdd,0x43,0x3c,0x6e,0x85,0x8c,0xe7,0x2f,0x68,0xc4,0x16,0x82,0xf4,0x22,0x45,0xf8,0xdb,0x23,0x2c,0xb0,0xa6,0x73,0xed,0x99,0x16,0xac,0x57,0xf4,0x9d,0x5f,0x3c,0x82,0x49,0xdd,0x57,0xba,0x36,0xec,0xfc,0xd7,0x6a,0x0b,0x8a,0x24,0x80 .byte 0xbc,0x4a,0x0d,0x7b,0xae,0x54,0x76,0x70,0x93,0x5f,0x0b,0xff,0x8b,0x67,0xf1,0xb6,0x79,0xa8,0xf9,0x8e,0x06,0xb4,0x4d,0x3f,0x01,0x4e,0x17,0x97,0xeb,0xf2,0x65,0xec,0xee,0x42,0xd1,0x67,0x66,0x33,0x6a,0x6b,0xb1,0xdf,0x59,0xef,0x86,0xb5,0xda,0xaf,0x57,0x12,0x17,0x8f,0xbc,0xeb,0xcb,0x29,0x28,0x69,0x67,0x5e,0x5d,0x11,0x4d,0x18 .byte 0xaa,0xd8,0xd6,0x27,0xb8,0x9f,0x41,0x37,0x8a,0xde,0x99,0x50,0xb1,0x58,0x45,0x22,0x95,0x84,0xec,0x73,0xb6,0xa6,0xc3,0xf8,0xe7,0xc1,0xe3,0x88,0x27,0x91,0x33,0xae,0x15,0xba,0x8b,0x04,0xf8,0x96,0x2e,0x8b,0x78,0x21,0x6b,0x86,0x23,0x82,0xde,0xd6,0xb2,0x86,0xfe,0xb5,0xfc,0x57,0x1b,0x45,0x69,0xd1,0x6a,0xb3,0x64,0x11,0xdc,0xf7 .byte 0x22,0x25,0x50,0xc1,0xc7,0xc1,0x72,0x92,0xf9,0x27,0x1e,0x41,0x1a,0xd9,0x5b,0x42,0xac,0x8b,0x5c,0x32,0x03,0x2f,0x45,0xb5,0xb1,0xa5,0x13,0xd9,0x9c,0x47,0x18,0xdc,0xb9,0x46,0xd6,0x15,0xbc,0x8d,0xaa,0x91,0x0a,0xa7,0xf8,0xc5,0x0f,0xb5,0x76,0x17,0xf3,0xd6,0x51,0xd7,0x8a,0x3d,0x6f,0x03,0x2f,0xcf,0x38,0xd0,0xe4,0xac,0x0e,0x0f .byte 0xbc,0xe2,0x12,0x52,0x6b,0xd5,0x3e,0x85,0x0a,0x19,0xd5,0x47,0xdd,0x17,0x7e,0x5a,0x5d,0x5f,0xf0,0x1a,0xac,0x21,0x96,0x3d,0x62,0xc7,0x6c,0x47,0x7e,0x25,0x77,0x6b,0x24,0x4d,0xf2,0x39,0xb6,0xb9,0xaa,0x92,0x94,0x79,0x81,0xd9,0x13,0x07,0x8f,0x51,0xe6,0x16,0x80,0x36,0x3b,0x97,0x8e,0x96,0x41,0xaf,0x28,0x2d,0x1f,0x41,0x00,0x7a .byte 0x42,0x0c,0x1b,0x59,0xc1,0xee,0xae,0x1a,0xa2,0x3f,0x76,0x4e,0x25,0xb0,0x75,0xd2,0x65,0xdd,0xfb,0xcf,0xee,0x11,0xd7,0xac,0xff,0x62,0x00,0xd2,0x76,0x24,0x98,0x0c,0xdb,0x52,0x83,0xb8,0x5c,0xa2,0x3e,0xe8,0xad,0x45,0xd5,0xfa,0x12,0xcb,0xe8,0x64,0x3a,0x41,0x2c,0x34,0x04,0xe9,0x9b,0xea,0x6c,0xa6,0xcc,0x72,0x1d,0x28,0x79,0x43 .byte 0x59,0x0c,0xdf,0xa7,0xf8,0x7e,0x2c,0xf2,0x6a,0xd5,0xe9,0x5f,0xdf,0x5a,0xcc,0x66,0x3a,0x99,0x68,0xec,0x5b,0xa9,0x1f,0xd8,0x80,0x7a,0x5a,0x8a,0xa1,0xf0,0x80,0x8d,0x17,0xfd,0xd7,0xab,0x9e,0x3a,0xc6,0x4b,0xc8,0x1d,0xf9,0xba,0x29,0x15,0xc2,0x73,0xa7,0xab,0x83,0x56,0x9d,0x5e,0x91,0x3a,0xce,0xe0,0x31,0x64,0x00,0x06,0x42,0x70 .byte 0x5f,0x4d,0x08,0xe7,0xf0,0x5b,0x10,0x71,0x0c,0xf8,0x93,0x34,0x9b,0xef,0x4a,0x78,0xc3,0x24,0xa9,0xb5,0xe0,0x3a,0xf0,0xf3,0xf3,0xf1,0x7d,0xb2,0x1d,0x25,0xeb,0x51,0xa3,0xd3,0x26,0xcd,0xaa,0x41,0xd0,0x64,0xbc,0x14,0x99,0x24,0xb3,0x17,0x4b,0x6d,0xa7,0xa7,0x3c,0xff,0xe9,0xfb,0x60,0x24,0x86,0x9c,0x44,0x91,0xc9,0xf0,0x85,0xbd .byte 0x4c,0x09,0xee,0x6e,0x43,0x49,0xb9,0xc3,0xf6,0xce,0xee,0x01,0x3e,0x44,0x76,0x76,0xa3,0xd3,0x41,0xf6,0xdf,0xcf,0x0f,0x5e,0xfa,0x83,0xdc,0x7f,0xa1,0x89,0xc4,0xbb,0x3b,0xa4,0xf9,0xbb,0x87,0x3a,0x04,0xfc,0x9d,0x21,0xa7,0xe0,0x1e,0xca,0x7c,0x61,0xf6,0x91,0xdb,0xa9,0x29,0xa2,0xed,0x81,0x23,0xd7,0x8d,0x48,0x8b,0x18,0xbf,0x74 .byte 0x71,0x9e,0x65,0x65,0xca,0x2c,0x88,0xcb,0x3c,0xcf,0xda,0xc8,0xf5,0x02,0x83,0x5e,0xdd,0x6c,0xbe,0x1d,0x53,0xe3,0xe1,0xd2,0xb1,0xc5,0xf8,0xce,0x0e,0x67,0xb8,0x87,0xf0,0xee,0x86,0xde,0x06,0xc9,0xec,0xe0,0x81,0x98,0xde,0xb6,0x4d,0xb2,0x80,0x04,0xc8,0x68,0x34,0xf9,0x27,0xeb,0xd6,0x3b,0xb3,0x99,0x8d,0xa0,0xf5,0xa3,0xe6,0x87 .byte 0x29,0xe0,0x9b,0x5b,0xa1,0x18,0x82,0x04,0xd3,0xb9,0xfd,0xe3,0xe6,0x9a,0xaf,0xde,0x69,0x93,0x3d,0x9a,0x6e,0x77,0xf1,0xa9,0xf5,0x00,0x59,0x20,0xba,0x25,0x84,0xd8,0xfd,0x6f,0x0d,0x61,0x0c,0x2f,0x6f,0xe5,0xe1,0x92,0xc9,0x62,0x0c,0xb3,0xef,0x52,0xcf,0x61,0x9b,0x74,0x39,0xb5,0x84,0xdc,0x96,0xb4,0x54,0xb2,0x96,0x98,0xf2,0x4e .byte 0xb9,0x45,0x6f,0x39,0x3a,0x60,0x5d,0x42,0xc5,0x4a,0x68,0x86,0x55,0xd3,0x5f,0x3d,0x26,0xe0,0x7d,0x46,0xcd,0xb5,0x56,0x4e,0x03,0xaa,0x29,0xec,0x5e,0xb7,0x86,0xc0,0x9a,0xa0,0xaf,0xe1,0xb7,0x90,0xd4,0xd3,0x6b,0xb4,0x26,0x3f,0x93,0x32,0x49,0x73,0x40,0x8c,0xd1,0x6f,0x57,0xe9,0x4a,0x8b,0x04,0xd3,0x25,0x57,0x95,0xf5,0x64,0x4c .byte 0xed,0xa5,0xdf,0xf5,0xf6,0xa1,0xff,0xba,0xb2,0x0d,0x63,0x6c,0x54,0x12,0xf7,0x6f,0xa3,0x57,0x3d,0xf0,0xcd,0x9b,0xb8,0x02,0x1e,0xf6,0x52,0x79,0x57,0x43,0x2e,0x9d,0xc4,0xc2,0xc1,0x3e,0x6c,0xa5,0x32,0x42,0x00,0x35,0xaa,0x6a,0xe4,0x1d,0xa5,0x5a,0x83,0x59,0xb4,0xe7,0x3a,0xca,0xeb,0xe5,0xcd,0xf8,0x24,0xc8,0x05,0xf4,0xea,0x6a .byte 0x82,0xbb,0x89,0xa5,0xb2,0xdf,0x5d,0x69,0x9b,0x73,0x0d,0x26,0xd1,0x5d,0x8f,0xaa,0x4a,0x4e,0x7f,0xe1,0x25,0x07,0x67,0x9f,0x2c,0x59,0xa7,0x4d,0x4c,0x44,0x67,0x5b,0xff,0xac,0xaf,0x9a,0x1c,0xc8,0xa8,0x6c,0x34,0xd4,0xfe,0x90,0x2a,0x24,0xd5,0xbf,0xb4,0xa4,0xe3,0x51,0x94,0x38,0xf9,0xd0,0xad,0x3f,0xc5,0x1e,0x72,0x56,0xdf,0xda .byte 0x31,0xbe,0xf0,0x8d,0x79,0xa9,0x96,0x23,0x27,0x0a,0x61,0x3a,0x6c,0xb5,0xd6,0x37,0x51,0xd0,0x5c,0xbb,0x33,0x34,0x36,0x81,0xcb,0x37,0xfb,0x89,0x00,0x97,0x0e,0x98,0xb8,0xe1,0x3a,0x83,0x40,0x98,0xff,0xaf,0x9c,0x3b,0xfa,0xda,0xa6,0x80,0x6d,0xb0,0xd5,0xe6,0xa2,0xaf,0xbc,0x15,0xc1,0xc3,0xad,0x2d,0x5d,0x76,0x11,0xf3,0x09,0x0b .byte 0xfa,0x92,0x7f,0x92,0xd6,0x7a,0xf1,0xf8,0x75,0xa4,0x46,0x20,0xcb,0x4a,0x63,0x48,0x88,0x0e,0x1a,0x28,0xbc,0x3a,0xfe,0x62,0xf3,0x17,0x75,0x00,0x47,0x7a,0xea,0xcb,0x17,0x6d,0xfc,0xf1,0x17,0xfc,0x19,0xfd,0xd8,0xaa,0xc2,0x64,0x59,0x84,0x14,0x56,0x61,0xa4,0x6d,0xe8,0xae,0xe1,0x8a,0x15,0x10,0xe4,0x98,0x88,0x4e,0x89,0xdc,0xba .byte 0xbd,0x8b,0x79,0xe0,0xec,0xcd,0x3d,0x7a,0x14,0x11,0xd1,0x71,0xf3,0xc1,0xb8,0xf8,0x2e,0x7e,0x83,0x42,0x62,0xea,0x01,0x6f,0xdd,0x2c,0xc6,0xc4,0x52,0x94,0x8d,0x52,0x59,0x41,0xb3,0x42,0xf2,0x15,0xc5,0x16,0xf6,0x1c,0xa8,0xd2,0x2e,0xa2,0x91,0x97,0x5e,0xc8,0x5c,0x29,0x3b,0xa2,0x91,0xaf,0x55,0xf1,0x42,0x5b,0xbc,0x2f,0x95,0x91 .byte 0x68,0x00,0x48,0x7d,0xd5,0x4e,0x3e,0x1b,0xba,0x03,0x41,0x1f,0x0b,0xd8,0x9a,0x04,0x3c,0x3d,0x45,0xff,0xe8,0xd5,0x81,0x06,0xb1,0x96,0x27,0x46,0x14,0x31,0xe1,0x11,0xc6,0x46,0x59,0x97,0x24,0xd9,0x92,0x98,0x04,0x32,0xb1,0x2b,0x2b,0xe6,0x12,0xbd,0x9a,0x72,0xcc,0xff,0x26,0x8c,0x07,0x19,0x1c,0x1c,0xf1,0x66,0xf0,0x60,0x12,0x28 .byte 0x61,0x64,0x73,0xdf,0x4e,0x95,0x14,0x46,0x32,0xb1,0x62,0xf2,0xcc,0xd2,0xcf,0xeb,0x50,0x05,0x3d,0x5a,0xf1,0x6b,0xfb,0xe2,0x7f,0xeb,0xbc,0x91,0x15,0x86,0x36,0x18,0xde,0x72,0x3a,0x9e,0x81,0xa4,0xcb,0x7a,0xdc,0x11,0x73,0xb4,0xf8,0x3d,0xa8,0xcb,0x87,0xcd,0xdc,0x18,0x51,0x64,0x90,0x29,0xbe,0xdc,0xcf,0x3c,0xc8,0xe0,0xe8,0xb3 .byte 0x9a,0x15,0x38,0x00,0x22,0xd9,0x2d,0x18,0x9a,0xdd,0x69,0x3b,0x04,0x0b,0xa7,0xb6,0x5d,0x12,0xd2,0x4b,0xf2,0x8c,0x4d,0x6f,0xef,0x39,0x2d,0xe9,0xfe,0xec,0xb3,0x99,0x87,0x1e,0x54,0xa7,0xc9,0x99,0xa1,0x70,0x70,0x34,0x04,0xc8,0xa2,0x4c,0x6b,0x43,0x83,0x6f,0x60,0xf7,0xef,0x01,0xd8,0x9a,0x01,0x55,0xa7,0x3e,0x52,0xbf,0x3d,0x5f .byte 0xba,0xc7,0x3d,0x4f,0xc9,0xad,0x47,0xf9,0x07,0x8a,0x88,0x13,0x80,0x69,0x4b,0xb8,0x41,0x9d,0xc7,0x93,0xc3,0xc0,0xc0,0x64,0xda,0x8f,0x9e,0xa7,0xb7,0x52,0x67,0x81,0x50,0x42,0x7c,0x2b,0x35,0x37,0x1f,0xfe,0x0a,0x15,0xa5,0xa0,0xe3,0xcd,0xe9,0x9d,0xbc,0xd7,0xcc,0xec,0x35,0x74,0xef,0x61,0xf9,0xb2,0x32,0x32,0x84,0x0c,0x6c,0x6e .byte 0x52,0x84,0x01,0x45,0x05,0x84,0xd8,0x58,0x73,0x0a,0xda,0x1f,0x90,0x91,0x40,0xcd,0xdd,0x5d,0xa9,0xfc,0x03,0x2f,0xd0,0xa5,0xa7,0xa8,0x2c,0x3e,0x73,0xcc,0x58,0xc3,0xd0,0x2b,0xa9,0x20,0x14,0x11,0x63,0x13,0x84,0x60,0x05,0x76,0x89,0x1e,0x59,0x9b,0x0e,0xfa,0x4c,0x7f,0x29,0x79,0xda,0x83,0xfa,0xe1,0xbe,0x38,0xa0,0x7a,0xf2,0xd2 .byte 0x41,0x72,0xe8,0xa4,0xa2,0x38,0x78,0xc8,0x4a,0xee,0x3d,0x5b,0xe8,0x63,0x0e,0xf1,0x53,0x30,0x87,0x0d,0x4f,0xe0,0x21,0xf4,0x91,0xc9,0xc2,0x5e,0x23,0x41,0xee,0x7b,0xd3,0x4e,0x7d,0x2d,0xa6,0x5f,0x3a,0x5c,0xb4,0xfa,0x25,0x32,0x3e,0x57,0x8d,0x99,0xa5,0xe5,0x10,0xe9,0x86,0x32,0xd5,0x94,0xb5,0xc3,0xc4,0xa8,0x98,0x17,0x9b,0x8b .byte 0x10,0xa8,0x3f,0x4c,0x55,0xc7,0xa0,0x3f,0x77,0x4e,0x89,0x85,0x95,0x41,0xdf,0x2c,0x37,0xe4,0xc0,0x57,0x77,0x60,0x90,0xce,0xfc,0x86,0x87,0x9f,0x8c,0xfb,0x34,0xef,0xe4,0x33,0x7b,0x65,0xd4,0x56,0xe4,0xf1,0xa6,0x17,0x3b,0xda,0xf9,0xcb,0x7d,0xd5,0x41,0x77,0x0a,0x15,0x20,0xf6,0x0d,0x10,0x4b,0xc6,0x93,0x3d,0xe3,0x30,0x37,0xf1 .byte 0x65,0x31,0x66,0x75,0xaf,0xec,0x76,0x31,0xcb,0xd1,0xc3,0xd4,0x49,0xb3,0x69,0x1a,0x37,0x76,0xa0,0x7f,0x21,0x39,0x53,0xc2,0xa8,0xd4,0xb2,0x7c,0xf6,0x82,0xf0,0x98,0x7b,0xf1,0xd2,0xc2,0x5f,0x07,0x78,0x67,0xb4,0xaa,0x55,0xb4,0x53,0xed,0x7a,0x5b,0xed,0x10,0x2e,0x13,0x93,0xf6,0xaa,0xec,0xe7,0x6c,0xa1,0x97,0xd2,0x7e,0x87,0xd2 .byte 0xa6,0xad,0x1a,0x31,0xee,0xa8,0xa3,0x7d,0x02,0x3c,0xe7,0x10,0xef,0x3d,0x2f,0x59,0x13,0x00,0x69,0x9d,0x79,0xba,0xa2,0xb9,0x39,0xa1,0x7a,0x7d,0x6d,0xe8,0x01,0x68,0x59,0x16,0x81,0xd3,0x63,0x94,0xd1,0x55,0x57,0x55,0xaf,0x1e,0x38,0xff,0x07,0x3a,0xb1,0x91,0xd6,0xd3,0xce,0x76,0x41,0x40,0x67,0x9e,0xf5,0x13,0xa0,0x63,0x44,0xeb .byte 0x16,0xe8,0x33,0xc2,0x56,0x03,0xc9,0xc0,0x32,0xa7,0x04,0xe1,0x5b,0x50,0xd6,0x15,0xa1,0xdd,0x8f,0x35,0x0f,0xe5,0xed,0xb2,0xb5,0xeb,0x22,0x45,0xce,0x0c,0xb6,0x18,0x46,0x38,0xcf,0x8d,0x89,0xc2,0x8d,0x14,0x25,0xb3,0x69,0x8e,0x23,0xb5,0xa4,0x83,0xac,0x21,0x5d,0x34,0xea,0xbb,0x49,0xa6,0x4e,0xfb,0x60,0xdd,0x4a,0xe3,0x1b,0xdb .byte 0x22,0xf7,0x9c,0x09,0x0d,0xa4,0x00,0xc0,0x7e,0x6f,0xb2,0x7a,0x59,0xc9,0x8a,0x53,0xdf,0x4b,0xf2,0x31,0xdd,0xd7,0xe0,0x4a,0xea,0x1e,0xc1,0x71,0x3a,0x7c,0xef,0xad,0x7f,0xf5,0x3f,0xbb,0x81,0x52,0x67,0x60,0x46,0xaf,0x14,0xc9,0x77,0x63,0xa1,0xb0,0xc5,0xac,0x24,0x52,0x9f,0x32,0xf8,0x9e,0xc0,0x04,0x4d,0x6b,0xfd,0x7a,0xd4,0x1c .byte 0x68,0xaa,0xc8,0xc1,0x8b,0x41,0x31,0x69,0xbd,0x9d,0x46,0x17,0xc1,0x8a,0xdf,0x3c,0x78,0xa2,0xca,0x28,0x1b,0xf8,0xab,0xe3,0x61,0x5e,0xb2,0x31,0xac,0xf2,0xd1,0x01,0xe7,0x24,0x46,0x96,0xa6,0x81,0xb3,0x4a,0xc0,0x0e,0x23,0x52,0x7f,0xa9,0x49,0x98,0xfa,0x6b,0xfd,0x0a,0x7b,0xb7,0xc5,0xcf,0x85,0x74,0xe1,0x3b,0xde,0x37,0xa9,0x22 .byte 0x63,0xbb,0xfc,0xd3,0x02,0x90,0x87,0xb5,0x2d,0x71,0x69,0x25,0x9a,0x0c,0xaf,0x68,0x4f,0xf0,0x71,0x86,0xcc,0x1b,0xc6,0x2d,0xb5,0x6c,0x68,0x00,0x37,0x07,0xcf,0x62,0x00,0x00,0xee,0x7d,0x8e,0xf2,0x88,0xa5,0x21,0x2f,0x33,0xf8,0x7c,0xe9,0xb3,0xe3,0xd8,0xa4,0x21,0x1c,0x81,0x4b,0x62,0xcc,0x99,0xa4,0xc6,0xfe,0x49,0x65,0x35,0xd5 .byte 0x92,0xe7,0x42,0xa2,0x8e,0xb3,0x02,0xba,0xc4,0x49,0x3a,0x26,0x4a,0x66,0xbd,0x4e,0x75,0x67,0x44,0x08,0x52,0x14,0x06,0xfa,0xf9,0x01,0xa2,0x03,0xbc,0x5c,0x41,0xe4,0x65,0x2f,0x5d,0xf9,0xd9,0xe4,0xc7,0x30,0xbd,0xe4,0xa4,0xcb,0x77,0x2f,0x2d,0x72,0x07,0x4f,0x0b,0x2f,0x6c,0x3f,0xfd,0x0b,0x5c,0x69,0x71,0xda,0x4f,0x13,0xf1,0xa9 .byte 0xb6,0x97,0x5f,0x7a,0x4b,0x9b,0x26,0xe2,0xe8,0x52,0x6a,0x07,0x10,0xf7,0x12,0x2d,0x0b,0x1f,0x47,0xf0,0x45,0x90,0x8a,0x5f,0xf3,0xdf,0x71,0x38,0x5d,0xf2,0x13,0x9e,0x00,0x92,0xd2,0xe9,0xa9,0x21,0x3d,0xe1,0x60,0x18,0xd6,0x06,0x11,0xed,0x80,0xeb,0x3c,0x70,0x62,0x29,0xb0,0xff,0x67,0x6e,0xe1,0x6f,0xd0,0x73,0x10,0x61,0x6d,0x03 .byte 0x03,0x6c,0xe9,0xf4,0xba,0xe2,0x31,0x50,0xc4,0x48,0x65,0x6a,0xa8,0xb0,0xc2,0x41,0x73,0xb9,0x71,0x35,0x21,0xc3,0xff,0x96,0x07,0x7a,0x75,0x62,0xfe,0x7e,0xbe,0xfb,0xed,0x8e,0x56,0xf7,0xaf,0x0f,0xcd,0xaa,0xde,0x4a,0xd7,0xfc,0xac,0x00,0xe7,0xf0,0xc8,0xe7,0xe1,0xb1,0x03,0xb8,0x0a,0x5b,0x78,0x1d,0xc8,0x1e,0x3a,0x47,0x6d,0xf1 .byte 0x8d,0xb4,0x5d,0x71,0x15,0x7d,0xda,0x5a,0x4b,0x87,0xfa,0xaf,0x59,0x25,0x33,0x4f,0x46,0x27,0x54,0xe2,0x72,0xd2,0xe9,0x5d,0xb7,0xc3,0x1f,0x26,0xdf,0xff,0xed,0x8f,0xc1,0x91,0xa0,0x67,0xb8,0x69,0xe1,0xeb,0x6a,0xef,0x16,0xe5,0x63,0x39,0xa2,0x14,0x0c,0x20,0x1d,0xe2,0xfc,0x14,0xe4,0x6d,0xf6,0x96,0xd5,0x1a,0xfe,0x77,0x2c,0x26 .byte 0x90,0xc4,0x7f,0xc9,0xe1,0xb1,0xc0,0xeb,0xed,0x54,0xcc,0x6a,0x94,0x4e,0x5f,0xfb,0x05,0xa5,0xd7,0x8b,0xca,0x6d,0x94,0x15,0xdd,0xb6,0xf6,0x7b,0xc3,0x66,0x33,0x16,0xa1,0xe5,0x90,0x3e,0x8f,0x72,0x5a,0x18,0x4c,0xe7,0x7d,0xd0,0x80,0xf5,0xb6,0x26,0xa6,0x6a,0xab,0xa8,0x9e,0x8f,0x2f,0xc8,0xba,0xe6,0xeb,0x8b,0x5b,0x09,0xb6,0x95 .byte 0x46,0xb7,0x01,0x4e,0xbf,0x7f,0x6f,0x5d,0x64,0xfd,0x8b,0x5d,0xfe,0x2d,0xd6,0x6d,0x3f,0x34,0xc2,0xa1,0x97,0xf1,0x7a,0x1e,0x83,0x0a,0x06,0x09,0x75,0xc2,0x27,0x18,0x80,0x49,0xc9,0x7b,0xd2,0x40,0xfb,0x48,0x54,0xb4,0x22,0x30,0x7f,0xea,0x87,0x70,0x59,0xfb,0xa7,0xb6,0x63,0x33,0xb2,0x5a,0x3c,0x47,0x83,0x3c,0x81,0x34,0x50,0x2f .byte 0x0e,0x95,0xb1,0xdc,0x44,0x67,0x94,0xf4,0x0c,0x1e,0x12,0xb8,0xfb,0xc6,0xd3,0x9f,0xaa,0xa8,0x77,0x80,0x71,0x4d,0xb0,0xb8,0x90,0x69,0x1b,0x45,0x88,0x7a,0x0f,0x60,0x7c,0x06,0x64,0x64,0x5e,0x2b,0x3a,0xf5,0xee,0x34,0x8a,0xbb,0x67,0x72,0x38,0x97,0xfd,0x8b,0x3d,0xe9,0x08,0x74,0x2e,0x9a,0xca,0xc8,0x74,0x5f,0x6f,0xd5,0xf7,0xfb .byte 0xd8,0x3f,0x49,0x81,0x44,0x68,0xe0,0xbe,0x11,0xee,0x81,0x19,0xab,0x0e,0xe5,0x18,0x7a,0xbc,0x64,0xc9,0x88,0x4b,0xd1,0x72,0x7d,0xfa,0x57,0x5d,0x52,0xbe,0x36,0x85,0xb6,0x28,0xec,0xce,0xbd,0x68,0xa7,0xc0,0x43,0x15,0xcf,0x89,0xe9,0x13,0x72,0x23,0xa7,0x2e,0x12,0x03,0x87,0x0b,0xcd,0xe3,0x67,0xe6,0xbf,0x92,0x69,0x06,0xd1,0x51 .byte 0x1d,0x0a,0xea,0x48,0xdb,0x27,0x95,0x55,0xa6,0xca,0x44,0x62,0x66,0xa5,0xaa,0x36,0xfa,0x42,0x7c,0x16,0xb9,0x8f,0x07,0x78,0x2f,0x03,0xf3,0x58,0x8a,0x15,0x82,0x35,0xb4,0xa9,0x2e,0x4e,0xb1,0x86,0xf2,0xc8,0xaf,0x94,0xdf,0x4a,0xf9,0xaf,0xa6,0x6c,0xf0,0x6d,0x32,0x9b,0x61,0xc5,0xa7,0x64,0xc3,0xf7,0x51,0xe0,0xc1,0x8b,0xd1,0x12 .byte 0x43,0x3a,0xab,0x59,0x64,0xa4,0xa9,0xc9,0x6f,0xb7,0x30,0x1c,0x4b,0x77,0xa7,0x15,0x98,0x76,0xb5,0xf2,0x8f,0xba,0xce,0xb5,0x8e,0x2e,0x3f,0xe4,0xaa,0xdb,0xe3,0x10,0xb4,0x42,0xbb,0x3f,0x16,0x1c,0xec,0x10,0x68,0xcd,0xf8,0x16,0x19,0x80,0xb2,0xb4,0xfc,0x9d,0x52,0x48,0x09,0xda,0x94,0xb9,0xf1,0x00,0xfe,0x99,0xad,0x5c,0xae,0x5a .byte 0xa9,0x65,0xb7,0x7d,0xaf,0xec,0xd1,0x09,0xa3,0x5e,0x77,0x01,0x86,0x78,0x79,0xaa,0x07,0x31,0x6b,0x13,0x11,0xec,0x73,0x02,0xf8,0x0c,0xa5,0x61,0xaa,0xe7,0x7c,0x4a,0xb2,0x6b,0xba,0xb5,0x5f,0xc8,0x8d,0x2b,0x2c,0xf4,0x75,0xdc,0xbc,0x84,0x01,0x4b,0x02,0x0e,0xea,0xcb,0xe1,0x87,0xb4,0xa5,0x1c,0x79,0x5e,0x3e,0xe1,0xab,0x33,0x74 .byte 0x11,0xf6,0x9f,0x89,0x12,0x04,0x46,0xd2,0xf3,0xac,0x14,0xe8,0x32,0x54,0x26,0x78,0x61,0x8b,0x93,0xd0,0x3d,0x02,0xda,0x47,0xac,0x26,0x36,0x52,0xca,0xeb,0x9f,0xc9,0xa9,0xb4,0xcb,0xaf,0xea,0xdb,0x6e,0xfb,0x93,0x49,0x30,0x4d,0x26,0xff,0xe1,0x31,0x48,0x94,0x7a,0x81,0x69,0x0d,0x51,0x0e,0x0f,0x97,0x32,0x6d,0xd7,0xd2,0x99,0xd8 .byte 0x40,0x68,0x97,0xf9,0xe7,0xb4,0x99,0x80,0x6f,0x3a,0x7c,0xba,0x8e,0x25,0x4e,0x22,0xb2,0x65,0x6c,0xde,0x46,0x04,0x6b,0xf7,0x18,0x44,0x68,0x73,0xab,0xbd,0x75,0xff,0xe2,0xc4,0xbc,0x95,0xfe,0x53,0x20,0xb0,0xf7,0x6f,0xea,0x63,0xf7,0xb4,0x0b,0x7f,0xf1,0x95,0x4b,0xbf,0x9f,0x58,0xf6,0xb5,0x05,0x55,0x50,0x00,0x66,0x83,0x64,0xf5 .byte 0xb8,0x36,0xfa,0xe5,0x3f,0x58,0x71,0x0b,0x51,0xac,0x7b,0xba,0x1d,0xfb,0xd2,0xc3,0xb2,0xb8,0xa3,0x88,0x80,0x5d,0x38,0x27,0x5c,0x12,0xb4,0x9f,0x4d,0xa7,0x25,0x41,0x1f,0xf5,0x93,0xc0,0x6b,0xb8,0x2a,0x27,0xa2,0xa7,0x9e,0xcc,0xa0,0xb9,0xbf,0x18,0x31,0x62,0x31,0x4f,0x71,0xaf,0x6f,0xda,0xe4,0x75,0x08,0xcf,0x6b,0xfc,0x96,0xa9 .byte 0xd9,0x7b,0xc5,0xc1,0x80,0x93,0xd8,0x47,0x1f,0x57,0x56,0x23,0x00,0x2c,0xc4,0x71,0x4e,0x17,0xc6,0xc1,0xff,0x8b,0x78,0xe1,0xcd,0x74,0xc1,0x42,0xc9,0x02,0x57,0xaa,0x04,0x4a,0xbe,0x1a,0xd3,0x2a,0x94,0x47,0xbd,0x0e,0x25,0x05,0x4e,0x1f,0xf2,0x19,0x1e,0x97,0xdb,0xfa,0xb1,0x4c,0x6c,0x6e,0x7d,0xf0,0x94,0x5a,0xd0,0x46,0x90,0xc7 .byte 0x6c,0xa2,0xc6,0x20,0xd4,0x49,0x04,0xb0,0x56,0xda,0x86,0x2f,0x09,0xa7,0xc1,0xf5,0xaa,0x0f,0xbc,0x0b,0x6a,0xd5,0x41,0x5f,0x32,0xa3,0x27,0xe6,0xa1,0x03,0x58,0x28,0x06,0xb4,0xad,0x55,0x0a,0x2b,0x19,0x05,0x00,0x1c,0x98,0xbd,0xbf,0x5d,0x14,0x28,0xb0,0x7c,0x86,0x14,0xf9,0x73,0x33,0xc7,0xbc,0xd2,0x00,0x37,0x72,0xac,0x30,0x25 .byte 0x30,0xeb,0xe2,0xb8,0xcd,0xf3,0x1e,0xad,0x93,0xf4,0xa3,0xac,0x03,0x37,0xe5,0x6d,0x73,0x80,0x4d,0x9e,0xc7,0xb4,0xad,0x7d,0xbe,0xe1,0x79,0x34,0x23,0x9f,0xbf,0x5c,0x02,0x6a,0x03,0x04,0xe3,0xd0,0x55,0x65,0x3d,0xc7,0x66,0xf3,0xfb,0xba,0x9c,0xed,0x88,0x9f,0xae,0xc4,0x83,0x69,0x99,0xd3,0x0f,0xac,0x46,0x22,0xcd,0x4e,0x56,0x27 .byte 0x73,0x7c,0x10,0xcf,0xbe,0x34,0xe5,0x06,0xfb,0xa7,0xe4,0x28,0x59,0x0a,0x0d,0xba,0xf0,0x52,0xe9,0xf7,0xbb,0x00,0x58,0x65,0x77,0x3b,0x83,0x67,0xaf,0xd8,0x88,0x9e,0xe8,0xa8,0xda,0x76,0x4d,0xb8,0x8e,0x40,0x70,0xe3,0x95,0x3e,0xe8,0xf1,0xaf,0x5d,0x54,0x54,0x65,0x6e,0xc1,0x58,0x06,0xd0,0xc9,0x0f,0x5e,0x63,0x0a,0xfe,0x50,0xc7 .byte 0xca,0x16,0x7d,0xd8,0x34,0xcc,0xf6,0xd2,0xb1,0x8d,0xf1,0xd9,0xe5,0xf7,0x3d,0x5f,0xe4,0x7f,0x64,0xb8,0xc3,0xba,0xc2,0x4f,0xd7,0x3a,0x78,0xed,0x8a,0x54,0xc9,0x72,0xf0,0xec,0x64,0x2e,0x20,0x27,0x97,0xea,0x8e,0x6b,0xaa,0xb2,0x52,0x13,0x67,0x66,0x89,0xc1,0x8c,0x5b,0x64,0x9f,0xd1,0x3c,0x9b,0x4f,0x9e,0x96,0x93,0xa2,0xf3,0xa8 .byte 0x7c,0x94,0xd2,0xfa,0xd6,0xc3,0x48,0xca,0x1e,0x89,0x1a,0x62,0x52,0x92,0x01,0xc5,0x9e,0x2d,0x8b,0x4f,0xf5,0xd4,0x10,0x6b,0x33,0x0e,0x8b,0xfa,0x0c,0x80,0x05,0x50,0x0d,0x84,0x3b,0xb0,0xe4,0x27,0x63,0xc3,0x46,0x40,0xf0,0x2b,0x31,0x31,0xd3,0xf5,0x07,0xb8,0x7c,0xec,0x83,0xb8,0xff,0x9e,0x5a,0xb9,0x57,0x4a,0xe5,0x85,0xaf,0x47 .byte 0x7c,0x36,0xb1,0x5e,0xe9,0xf6,0xe8,0x02,0xfb,0x33,0xb5,0xa5,0x6f,0x03,0x76,0x26,0x20,0x03,0x1f,0xac,0x26,0x7c,0x29,0xf2,0xbf,0xcf,0xf9,0x31,0xcc,0xa0,0xdb,0x8a,0xd1,0x06,0xc2,0x6b,0x57,0x8d,0x6a,0x02,0x02,0x37,0x84,0xa4,0xd0,0x4c,0x56,0x4c,0xfd,0x18,0x30,0x86,0x9e,0xb2,0x71,0xc2,0xc8,0xe8,0x4f,0xd7,0xeb,0xa7,0x6e,0x77 .byte 0xeb,0x89,0xb4,0x6b,0x19,0x46,0x65,0xdf,0x74,0x10,0x82,0xe7,0xd2,0xbf,0x70,0x11,0x41,0x1a,0x87,0xc8,0xcb,0xc0,0xd8,0x2e,0xfd,0x36,0x24,0x92,0x91,0x67,0xb6,0x2d,0xc1,0x81,0xa0,0x6a,0xf9,0xb7,0x06,0x21,0x55,0x0d,0xa2,0x74,0xd9,0x24,0x35,0x00,0x42,0xd3,0x08,0xdb,0xcc,0x28,0x56,0xd4,0x9b,0x38,0x9c,0x2d,0x98,0xb1,0x56,0x96 .byte 0x30,0xe9,0x7a,0xde,0x8a,0xbd,0x13,0xee,0x2b,0xb9,0x10,0x88,0x1a,0x7a,0x29,0x0e,0x9b,0x45,0x7b,0x37,0x14,0x7a,0xf4,0x40,0xe9,0x60,0x16,0x6c,0x0c,0x64,0x6c,0x15,0xd8,0xf8,0xc4,0xcd,0x9e,0x9a,0xa2,0xa7,0xf5,0xe3,0xd8,0xbb,0x40,0x31,0x75,0x34,0x98,0x85,0xed,0xe5,0xaf,0xfb,0x6a,0x64,0x32,0x75,0x25,0xba,0x35,0x79,0xcf,0x9e .byte 0xb7,0x8f,0xde,0x18,0x97,0xe5,0x31,0x4f,0x52,0x69,0x50,0x05,0x94,0x8e,0xb6,0x56,0xb1,0x94,0xa6,0xa2,0x36,0x7e,0x17,0x3d,0x5e,0xb9,0xc7,0xee,0x0e,0x33,0xd4,0xeb,0x58,0xc9,0x6a,0xb8,0x3b,0x32,0x53,0xbf,0x61,0xf7,0x3f,0xec,0x7d,0x8d,0x20,0x4d,0xb4,0x38,0x68,0x3a,0x21,0x28,0x89,0x19,0x10,0xe3,0x2f,0xf5,0x74,0x77,0x39,0xe8 .byte 0xb3,0x72,0xaf,0x50,0x30,0x36,0x1e,0xc7,0x57,0x66,0x31,0xe2,0x84,0xe1,0x05,0x94,0xd6,0xbf,0x91,0x97,0xe0,0x22,0x26,0xcf,0xeb,0x06,0x33,0x70,0x22,0x19,0x58,0xc7,0x80,0x0b,0xe8,0x26,0x35,0xbc,0x8d,0xc3,0xb0,0x97,0x7d,0x8d,0x70,0xf9,0x66,0x76,0x52,0x71,0x46,0x1b,0x6a,0x4e,0x9a,0xd1,0xa1,0xfd,0xda,0x6a,0x1b,0x6f,0x2e,0xff .byte 0xd1,0xe4,0x23,0xd5,0xa9,0xc6,0x6a,0x5e,0x84,0x5c,0x2f,0x26,0x55,0x4b,0xbb,0xb1,0xf2,0x79,0xa5,0xfb,0xfb,0x29,0xcd,0x57,0xd2,0xef,0x45,0xbe,0x3f,0xc1,0x6c,0x4c,0xbc,0xca,0xe0,0x0b,0x6a,0x8e,0xb9,0x8a,0x2f,0x3b,0x86,0x42,0xb7,0xf5,0xa5,0x38,0x99,0x97,0xaa,0xf5,0x36,0x87,0x97,0x56,0xe1,0x03,0x76,0xb5,0xcc,0x84,0xad,0x31 .byte 0x29,0xad,0xc4,0x93,0x47,0x07,0x00,0x91,0x47,0x0e,0x8a,0x32,0x43,0x9c,0xba,0x02,0x59,0xe5,0x62,0xc6,0xdd,0xd5,0xcf,0x0a,0xd7,0x33,0x6a,0x76,0x6a,0xa9,0x1d,0xfc,0xfc,0x0b,0x0a,0x4e,0x4e,0xed,0x8a,0xdf,0x8f,0x97,0x50,0xb2,0x1d,0xbe,0x31,0x04,0x6d,0x04,0x5c,0xf9,0x95,0x36,0xcc,0x7c,0xa2,0xaf,0x2a,0x6a,0x50,0xbc,0xf0,0xe5 .byte 0xdd,0x1f,0xc2,0x90,0xc0,0xa0,0x33,0xcb,0x90,0x5c,0x02,0x87,0xf6,0xa1,0xf8,0xa6,0x03,0xca,0xfb,0x89,0x8e,0xff,0x82,0x6f,0x5c,0x16,0x25,0xa1,0x2c,0x0e,0xd6,0xa0,0xab,0x64,0xa0,0x4b,0x66,0x9b,0x08,0x64,0x97,0x93,0xa2,0xdb,0xf5,0xac,0x78,0x57,0x8d,0x32,0x16,0x44,0x3a,0xb9,0xd2,0xe6,0xc4,0xf3,0xb9,0x44,0x45,0x15,0x57,0x33 .byte 0xfa,0x98,0x61,0x17,0x8b,0x7c,0x2f,0xd7,0x0c,0x14,0xf2,0xb4,0xe3,0xa7,0x50,0x71,0x57,0x1d,0xd0,0x9b,0xab,0x8d,0x4f,0x42,0x08,0x7c,0x54,0x58,0xc7,0xbf,0x17,0x15,0x64,0x91,0x7a,0xd4,0xaf,0xf6,0x6a,0x45,0xdc,0x2d,0xfc,0x80,0xd6,0x5d,0x4b,0xea,0xd7,0x45,0xe7,0xd4,0x20,0xa3,0x5f,0xda,0x73,0xa1,0x87,0x8b,0xf2,0x93,0x50,0x5c .byte 0x20,0x89,0xbd,0xb2,0xe0,0x47,0xe6,0xf0,0x6c,0x42,0x2b,0xe1,0x1e,0xa0,0x2d,0x0f,0xf1,0x05,0x28,0xa2,0xd4,0x5d,0x12,0x95,0x0a,0x6e,0x62,0x11,0x34,0x56,0x29,0xe9,0x9d,0x45,0x5f,0x55,0xcb,0xaa,0x3a,0x59,0xe5,0x17,0xb3,0x12,0xcf,0x2a,0x10,0xa9,0x71,0x22,0x06,0xfa,0xec,0x99,0x6f,0x80,0xa3,0xfe,0x5c,0xc5,0x65,0xb9,0x34,0x19 .byte 0xd3,0x62,0x58,0xce,0x33,0x47,0x03,0x44,0xc6,0xa0,0xd4,0x51,0x58,0xaf,0xbb,0xe1,0xaf,0x53,0xf5,0xe7,0xee,0x6f,0x70,0x7a,0x15,0xf6,0x96,0xbf,0x4a,0xbe,0x7a,0x5d,0xbb,0x54,0xe6,0x8a,0xeb,0x48,0xaa,0x96,0xad,0xde,0x1e,0x96,0xe0,0x2a,0x0a,0x09,0x01,0xfe,0x39,0xfe,0x1f,0x3a,0xef,0x2f,0xa9,0xfc,0x33,0xf1,0xec,0x05,0x24,0x5e .byte 0xb3,0x35,0xd3,0x56,0x07,0x8b,0xe5,0xba,0xbd,0x2a,0x8c,0xf0,0x59,0xe0,0xef,0xd6,0x7c,0xe2,0x26,0xd8,0x2d,0x38,0x17,0x06,0x11,0x90,0xe1,0x01,0x14,0x7e,0xcb,0x0f,0x0f,0x60,0x01,0x26,0x4f,0x21,0x24,0xad,0x15,0xd0,0x69,0x85,0xe6,0xbc,0xe6,0x47,0x52,0x40,0xec,0xe3,0x14,0xf7,0x8c,0xcc,0x93,0x1d,0xef,0xb4,0xa5,0xa5,0x21,0x93 .byte 0x37,0x09,0x86,0xac,0x28,0x45,0x1d,0x11,0xb8,0xaa,0xa8,0x5a,0x9f,0xb1,0x66,0x4b,0x57,0xa2,0xd9,0x22,0xcf,0xbf,0x69,0xa6,0x20,0x1f,0x7e,0x35,0x32,0x83,0x20,0x6d,0x2a,0x4b,0x14,0x71,0xd1,0x3b,0x11,0x9d,0xc8,0x7f,0x9d,0x2c,0xf6,0x75,0xd9,0x08,0xac,0xa4,0xd3,0x14,0x8b,0xf3,0x14,0xff,0x03,0x88,0xeb,0xb9,0xb9,0x9e,0x83,0x64 .byte 0xfe,0x8a,0x97,0x0b,0xa1,0x7c,0x50,0x11,0x6b,0xc1,0x6e,0x77,0x56,0x25,0x6e,0x32,0xfc,0x54,0xc1,0x99,0xc0,0x31,0xef,0x65,0xb3,0x67,0xd0,0x7c,0x12,0x62,0xfd,0x8f,0x71,0x5c,0xfc,0xf9,0x26,0x29,0x2d,0x50,0x28,0xbd,0x26,0x40,0x63,0x43,0x79,0x78,0x07,0xa8,0xb4,0x19,0x06,0x25,0xd8,0xe5,0xad,0x75,0x6f,0xe0,0xb4,0xef,0x1f,0xe9 .byte 0x5b,0xa0,0xf8,0x32,0xec,0xe5,0xc1,0x75,0x04,0x88,0x1f,0xad,0x30,0x16,0xe2,0x05,0x8c,0xee,0x81,0x80,0x9b,0x0c,0x8d,0xd1,0xfb,0x55,0x0b,0x8d,0xdf,0x67,0x91,0x05,0xb2,0xfc,0x1e,0x99,0x12,0xb3,0x7c,0x33,0x4a,0x39,0x5f,0xbb,0xd9,0xe8,0xbb,0x17,0xd9,0x4b,0x8b,0xd6,0x6d,0x90,0xa8,0xbf,0xb7,0xd8,0xe0,0x83,0x93,0x16,0x5b,0x0f .byte 0x8b,0xc8,0x14,0x7d,0x24,0xf5,0xc7,0x33,0x21,0xa6,0xa0,0x1c,0x37,0xea,0xab,0x74,0x86,0xb8,0xe0,0xb7,0x57,0x4d,0x5e,0x2a,0x2c,0x4c,0xbb,0x06,0x0b,0x44,0xe4,0xab,0xb9,0xcd,0x94,0xa9,0x33,0x40,0xc6,0x20,0x90,0xe2,0x7b,0xf6,0x84,0x23,0x59,0x52,0x72,0x83,0x45,0x33,0x5d,0x91,0x93,0xa8,0x32,0xa1,0xe4,0x26,0x13,0xd8,0xf6,0x21 .byte 0x85,0x02,0x66,0xad,0xbf,0x18,0x41,0x50,0xd3,0xda,0xa4,0xee,0x3b,0xd8,0xc1,0x2d,0xe6,0xa6,0x40,0x97,0xeb,0xd4,0x2f,0x7e,0x70,0x1a,0x7a,0xf1,0xc2,0x24,0xf8,0xef,0x43,0xef,0x0b,0xf9,0x87,0x6b,0xe7,0x10,0xa1,0x17,0x75,0x03,0x30,0x33,0xca,0xa4,0xb5,0x8d,0x70,0x7d,0xec,0x2c,0xe8,0x07,0x42,0x11,0x9d,0x29,0x23,0x31,0x8f,0x9d .byte 0x83,0x71,0xeb,0x39,0x2d,0x80,0x15,0xd2,0xcf,0x42,0xc9,0x06,0x6d,0x90,0x73,0x8b,0xcb,0xeb,0x9d,0xb6,0xc8,0x61,0xcc,0x84,0x2d,0xa7,0xf2,0x35,0xbc,0xc8,0x14,0xe9,0x89,0xb5,0x47,0xe5,0x5c,0xdb,0x0c,0x98,0xc9,0xec,0x20,0x61,0x63,0x2c,0x58,0xbb,0x8e,0x46,0xb1,0xca,0x6a,0xbb,0x11,0x73,0xb6,0x5e,0x88,0x50,0xce,0xcf,0x14,0x60 .byte 0x5c,0xc8,0x59,0x81,0xb2,0x8f,0xde,0x36,0x57,0x5a,0x18,0xf7,0xa5,0x57,0xf7,0x71,0xd3,0x92,0x5a,0xb5,0x41,0x4d,0xcc,0x74,0xe8,0xdb,0xfd,0x15,0x1b,0xb8,0x40,0x91,0x04,0x12,0x74,0x84,0xcb,0x1f,0x3c,0x13,0xa4,0xa2,0xde,0x52,0xaf,0xdd,0x3b,0x1e,0x88,0x6e,0x86,0xd0,0xe9,0xb7,0x10,0x3b,0x29,0xef,0xce,0xa3,0xf9,0x85,0x0d,0x27 .byte 0x1d,0x21,0x74,0x0e,0x06,0x66,0xfa,0xcb,0xad,0x88,0x58,0x79,0xdb,0x3f,0x8a,0xbe,0x4d,0x56,0x4b,0x45,0xae,0x6f,0x0c,0x6a,0x8c,0x73,0x5b,0x61,0xde,0x41,0x03,0x9b,0xef,0xdd,0x35,0xde,0x57,0x96,0x11,0x8a,0x56,0x6b,0xa5,0x57,0x7e,0xb1,0xa7,0x12,0x4a,0x79,0xb9,0xc4,0x04,0xd5,0x7b,0x8c,0xad,0xf2,0x83,0xff,0x7d,0xdc,0xcf,0x22 .byte 0x25,0x5d,0x6f,0xfc,0xd7,0x7b,0xac,0x53,0x80,0x1d,0x7e,0xff,0x89,0x95,0x48,0x38,0xc0,0x48,0xd8,0xb9,0x3b,0x5e,0xc3,0x99,0xc8,0xc6,0x6d,0xd2,0x0e,0xd8,0xc2,0x9e,0x3d,0x9e,0xf4,0xa7,0x5f,0xc4,0x9a,0xd1,0x0c,0x49,0xb8,0x5a,0x66,0x94,0x69,0x71,0x19,0xba,0x9b,0xe6,0x4f,0xa9,0xcf,0x70,0x7d,0xe2,0x60,0xea,0x06,0xd7,0x94,0xe1 .byte 0xb6,0x23,0x7f,0x2c,0x2c,0xe4,0xf4,0xdf,0xcc,0x1a,0x25,0xfa,0x47,0xef,0xf2,0x37,0x32,0xd4,0xf2,0xdd,0xc9,0x13,0xb8,0x09,0x85,0x33,0x5c,0xa2,0xa2,0x20,0x11,0xd1,0x3b,0x6e,0x9d,0x11,0xb6,0xb8,0x75,0xf1,0x47,0x6f,0x93,0x35,0x55,0x55,0xa5,0x11,0x4d,0xbf,0xc1,0x0a,0x99,0x84,0x65,0x91,0x16,0xc1,0x64,0x1a,0xdb,0x15,0xcf,0x2f .byte 0x93,0x0e,0x6b,0xe0,0x8c,0x70,0xfa,0x5e,0xa2,0x5c,0xd8,0x43,0x2f,0x93,0x22,0x9e,0xdc,0xad,0xf6,0x39,0x15,0x2b,0x50,0xa0,0xdb,0x51,0xfc,0x00,0xda,0x8b,0x7a,0xa9,0x14,0x07,0x79,0x25,0x8c,0x7d,0x71,0x3f,0x8d,0x51,0x20,0x81,0xdc,0x4a,0x92,0x71,0x4c,0xb2,0xc6,0x5c,0x8a,0x18,0xa1,0xaa,0xb0,0x2e,0x06,0xb4,0xd4,0x6a,0xd4,0xa8 .byte 0xd1,0x31,0x81,0x22,0xe3,0x22,0xc9,0x75,0x84,0xc1,0x95,0xae,0xa6,0xa2,0xb4,0x93,0x4b,0x9c,0xea,0xc6,0x4c,0xdc,0x25,0xd9,0xeb,0x12,0x64,0xf9,0x42,0x8e,0x72,0x47,0xd9,0x89,0xd6,0xc4,0xf9,0xa7,0xc6,0x64,0x53,0x05,0x40,0xf5,0x9c,0xab,0x53,0x45,0xa4,0xe5,0x3e,0x2f,0xf7,0x69,0x06,0xc1,0x7e,0xb0,0xec,0x4c,0x22,0xfe,0x89,0x6c .byte 0x4c,0x80,0x5d,0x51,0x0a,0x20,0xaa,0x71,0x68,0x9c,0x3e,0x29,0xf2,0x82,0xd4,0x81,0x6c,0x8b,0x11,0x42,0x00,0x86,0x70,0x74,0xe0,0x94,0xcf,0xee,0x2f,0xbd,0x8a,0xab,0xee,0xfc,0xd8,0x8e,0x87,0x2e,0xce,0x89,0xaf,0x29,0xc2,0x2b,0xcd,0xa3,0xc4,0x47,0xa2,0x1f,0x2e,0xc3,0x2d,0x9f,0x89,0xbb,0x57,0xa6,0x00,0xc3,0x4a,0x91,0x2e,0xfd .byte 0xbf,0xbb,0x4a,0xb5,0x3c,0xa1,0x4d,0x96,0x2d,0x62,0xf6,0xda,0x9f,0x75,0xef,0x84,0x18,0x5c,0x31,0x31,0xcc,0xe4,0x82,0xd4,0xb6,0x7a,0xd7,0x6b,0x6e,0x32,0xb6,0xdb,0x90,0x16,0x5a,0xc0,0x4e,0xe4,0x48,0x69,0xd3,0xe3,0xf2,0xfa,0xed,0x17,0x4b,0x06,0xe0,0xd8,0x4d,0xa9,0xee,0x19,0x98,0x65,0xf5,0xb3,0x69,0xe2,0x23,0x23,0x04,0xca .byte 0x52,0x7b,0x7b,0xaa,0xb9,0x03,0x71,0x1b,0x37,0x17,0x16,0xe0,0xb7,0x5a,0x75,0xa9,0x97,0xbe,0x44,0xa9,0xb2,0xef,0x5a,0x5c,0x17,0x31,0x77,0xe3,0x15,0x4f,0xb6,0x4c,0xff,0xf9,0x10,0xdd,0x41,0xab,0xfa,0xf0,0xed,0xe7,0xa6,0x74,0x6f,0x7e,0xc9,0x71,0x66,0x16,0xed,0x68,0xb0,0x74,0x85,0xeb,0xb2,0xc5,0x73,0xc1,0x00,0x33,0xb3,0x9d .byte 0xd9,0x7f,0x0e,0x9d,0x17,0xf2,0x0b,0x55,0xb6,0x68,0x9b,0xe9,0xc9,0x46,0xa5,0x97,0xe3,0xe9,0xb6,0xc3,0xa3,0x10,0x57,0x11,0xd6,0xc1,0x7a,0xfe,0x05,0xa5,0xcb,0x15,0x75,0x92,0xd8,0x69,0xdd,0xe0,0x67,0x5a,0x8c,0x50,0x6d,0x66,0xd5,0x79,0xf6,0xb6,0x7e,0xf1,0x04,0x95,0x45,0x03,0x84,0x0e,0x8a,0xa6,0x27,0x87,0x9b,0x6b,0x58,0x46 .byte 0x52,0xfb,0x36,0xd8,0x90,0x14,0xcd,0x68,0xa9,0xb7,0x51,0x2e,0xb5,0xc5,0x3b,0x4d,0xee,0x86,0x65,0x94,0xec,0x94,0x8e,0x26,0x01,0xe8,0xcd,0x0a,0xa0,0xb8,0x7c,0x76,0xe7,0xd7,0x65,0xa4,0x0c,0xe5,0x6f,0xfc,0x3d,0xad,0xc0,0x94,0x44,0xb4,0x98,0xc9,0x01,0x71,0x03,0x96,0x12,0x77,0x0d,0xbf,0xb7,0x05,0xe1,0x95,0xff,0x01,0x0c,0x26 .byte 0x13,0xbe,0x09,0xf6,0x35,0xee,0x44,0x33,0x86,0xf4,0xb4,0x65,0x72,0xbd,0x66,0x1a,0xcf,0x89,0xa5,0xe0,0x3a,0xe7,0x1a,0x2a,0x1e,0x73,0xf0,0xef,0x74,0xdb,0xaf,0x02,0x4c,0xd4,0x0f,0xfd,0x5e,0x20,0x4f,0xd7,0x19,0x36,0xeb,0x00,0x2e,0xce,0x56,0xe7,0xba,0x6d,0xae,0x73,0x27,0x7e,0xc5,0x28,0x94,0xc6,0xbf,0x9b,0xca,0xb4,0x52,0x04 .byte 0xd3,0xd1,0x4f,0x61,0x5b,0xcd,0x97,0x12,0x35,0xc0,0x10,0x12,0x15,0x05,0x02,0x1a,0xae,0x0e,0xf9,0xc7,0x5d,0xeb,0xea,0xcd,0x3c,0x10,0x51,0xf2,0x0c,0x48,0x6f,0x45,0xa2,0x50,0xa9,0x95,0x21,0x7c,0xd3,0x91,0x5f,0x72,0x59,0xa8,0x2b,0xfb,0xe8,0xb1,0xd9,0xdb,0x46,0x1e,0xe8,0x25,0x78,0x2c,0x01,0xbb,0x35,0x3f,0x95,0x04,0x84,0x96 .byte 0x1f,0x55,0xa4,0x46,0x2a,0x8c,0x58,0xb6,0xfc,0x2e,0xfa,0xa4,0xb8,0x4d,0x5d,0x0b,0x5f,0xa4,0x93,0x06,0xae,0x62,0x6a,0x6a,0xce,0xa5,0xc7,0x06,0xf0,0x05,0xf8,0xd7,0x3a,0x0b,0xb8,0x80,0xa6,0x2f,0x73,0xbd,0xbc,0x31,0x33,0x96,0xf9,0x8b,0x52,0x7e,0x3f,0x64,0x48,0x1d,0xca,0x23,0x71,0xe6,0xf3,0x2b,0x03,0x20,0xa0,0x2b,0xec,0x5b .byte 0xca,0x5e,0x31,0x7c,0x01,0xf4,0x58,0xdc,0x27,0x57,0x8e,0x41,0xfc,0xa6,0x10,0x09,0xc3,0xbd,0x89,0x7b,0xfb,0x09,0x85,0xa5,0xa3,0xbe,0x15,0x94,0x41,0x7a,0x86,0xfe,0xab,0x9d,0xcf,0x56,0x60,0xa1,0xb3,0xee,0x9a,0x69,0xf9,0x2f,0xb7,0x92,0x7a,0x7b,0xb6,0x23,0xf3,0xca,0x9c,0xbe,0xb6,0x51,0x04,0x3d,0x2a,0x17,0xdd,0x13,0x9b,0x9b .byte 0x1c,0x50,0xe4,0x11,0x5b,0xce,0x0e,0x54,0x7c,0x25,0xdd,0xc1,0x91,0x90,0xe4,0xb5,0xa6,0x84,0x22,0x44,0x46,0x68,0x7b,0x16,0x23,0xc0,0x69,0x64,0xc4,0x12,0x03,0x8c,0x85,0xe2,0x4c,0x83,0xdb,0xb1,0xe3,0x35,0x15,0x6a,0xd3,0x56,0x73,0xa1,0x51,0xad,0xd2,0x15,0xc5,0xa9,0xb3,0x7e,0x81,0xa1,0x16,0x19,0xbe,0x8b,0x98,0x2f,0x31,0xaf .byte 0x51,0x67,0x4c,0x09,0xae,0x4d,0x77,0xa4,0xcd,0x28,0xbf,0xd0,0x0e,0x17,0x57,0x15,0xcf,0x48,0x8b,0x90,0xb1,0xb5,0x59,0x43,0xac,0x34,0x34,0xa1,0x4b,0x36,0x20,0x0d,0x40,0x6d,0x81,0xa2,0x40,0x5e,0x7b,0xd8,0xf3,0xf5,0x33,0x3b,0x14,0x19,0x55,0x07,0xfc,0x53,0x22,0x7e,0x4f,0xe2,0xde,0xb7,0x8b,0x2d,0x10,0x0c,0xc1,0xc7,0x0d,0x3c .byte 0xc0,0x8a,0x91,0xfa,0xf5,0x9b,0xcd,0x25,0xe8,0x8f,0x10,0x4b,0x9a,0x07,0x94,0xa9,0xc0,0xb4,0x18,0x6c,0x9a,0x88,0x94,0x4d,0x33,0xc7,0xf5,0x20,0x8c,0x02,0x9a,0xde,0x90,0x11,0xbd,0x90,0x14,0xb0,0x72,0xaf,0x8e,0xef,0x9c,0x22,0x2b,0x6a,0xd7,0x75,0xae,0x6e,0x97,0x46,0x3f,0xef,0xb3,0x4d,0x34,0x0b,0x41,0x35,0xc9,0xb4,0xaa,0x18 .byte 0xfb,0x95,0x09,0x64,0xe0,0xff,0x51,0xa0,0xf4,0x8f,0xa9,0x5f,0x8f,0x51,0xa6,0x5b,0x86,0x0d,0x83,0x26,0x1e,0x00,0xab,0x6f,0x73,0xf6,0x98,0x24,0x4b,0xb2,0xe0,0xfe,0xbc,0x03,0x7f,0x6c,0x88,0xe8,0x36,0xea,0x10,0xe7,0x73,0xa0,0x96,0x88,0xad,0x0f,0x88,0xb6,0x9f,0xa7,0xe4,0x38,0x35,0xa3,0x29,0x9a,0x34,0xd1,0x00,0x1c,0x61,0x93 .byte 0x90,0x12,0xc3,0xcb,0x72,0x62,0x0a,0xc8,0xad,0x9c,0x0d,0x19,0x6c,0xe2,0x53,0xf0,0xf0,0x2f,0x2c,0x72,0x0f,0xf1,0xb1,0xd1,0x56,0xd4,0x87,0xbc,0x73,0x63,0xfe,0x2c,0x7b,0x9b,0xaa,0x6c,0xa6,0x79,0xfd,0xfa,0x20,0x83,0xb2,0x6d,0x4e,0xe4,0xae,0x73,0xf8,0xb5,0x6c,0x1a,0x97,0x07,0x8a,0x6f,0xe8,0x33,0xc5,0xea,0x61,0x18,0x53,0x56 .byte 0xa4,0x11,0x32,0xe1,0x8c,0xae,0x69,0xac,0xed,0x35,0xe0,0x6f,0x7d,0x97,0x8b,0xa3,0x12,0xa4,0x92,0x42,0xcf,0x43,0xef,0xc3,0x8e,0x99,0x12,0x0a,0xb6,0xa6,0xcc,0xae,0xca,0x1c,0xe3,0xa1,0x65,0x74,0x79,0x6a,0x5f,0xa2,0x3e,0x6d,0xb6,0x45,0xa5,0x40,0xc8,0x59,0xa0,0x31,0xa9,0x07,0x35,0x81,0xaf,0xee,0x35,0x07,0xa0,0xe3,0x26,0x4c .byte 0x57,0x08,0xa0,0x01,0xc3,0x8b,0xd8,0x9a,0xba,0xe4,0x73,0x7f,0xcb,0xc4,0x0a,0x65,0xb3,0x16,0xf5,0x36,0x35,0xd3,0x2f,0x15,0x61,0xa6,0x90,0xa6,0xa5,0x4c,0xc6,0x57,0xd4,0xd0,0x80,0xfb,0x68,0x52,0xd4,0x09,0x24,0x39,0x29,0xa1,0x39,0xf2,0x3d,0xbc,0xc6,0x7c,0x95,0x3c,0xa4,0xe1,0xeb,0x33,0x94,0xfe,0xda,0x92,0x75,0x7f,0x76,0xe0 .byte 0x61,0xa9,0x27,0x2d,0x43,0xf9,0x4f,0xd6,0x61,0x12,0x89,0x12,0x46,0x79,0xb6,0x6c,0xa1,0x6d,0xcb,0xcb,0x12,0x1b,0x82,0xa6,0x41,0xa8,0xf5,0x43,0x46,0xdd,0x8b,0x43,0x5f,0x5f,0xce,0x7b,0xc1,0xec,0x55,0x8d,0x37,0xe5,0x78,0x4c,0x2e,0x3a,0x64,0xcf,0xef,0x8c,0x76,0x04,0x75,0x42,0x0d,0xb5,0xaa,0x5f,0xd1,0x55,0xbc,0x54,0x26,0x9e .byte 0xc6,0xa0,0x8c,0x36,0x39,0x23,0x54,0x66,0x34,0x83,0xed,0x1e,0xf4,0xca,0x7e,0x11,0xb4,0xd1,0x0c,0xcd,0x67,0xa6,0xbb,0x02,0x30,0x61,0xd9,0x3f,0xbf,0x83,0x5c,0x15,0x60,0xa4,0x1b,0x73,0x67,0xa0,0x54,0x07,0x2a,0xc4,0x11,0x4e,0xfb,0xe8,0x85,0xda,0x78,0xbb,0x91,0x98,0xb8,0xf4,0x7c,0x6c,0x0b,0x32,0xad,0x6d,0x1b,0x29,0x2a,0x2e .byte 0x36,0xef,0xd8,0xdd,0xa3,0xdd,0x6d,0x45,0xf0,0x90,0xa9,0xf8,0xb5,0x1f,0x3b,0xaa,0xe2,0x88,0x97,0x46,0xc1,0x86,0x8e,0xb7,0x6b,0x01,0x5f,0xac,0xa4,0xfa,0x35,0xef,0xfb,0xa4,0x0a,0x31,0xaa,0x80,0x81,0x98,0x78,0xcf,0xe5,0x25,0xbf,0x4a,0x84,0xd1,0x11,0x92,0x0a,0xc6,0x98,0xd2,0x99,0xa8,0x42,0x46,0x20,0x04,0x95,0xa1,0xad,0xef .byte 0x86,0x1f,0xe3,0x4d,0x6f,0xed,0x01,0xf4,0x42,0x54,0xe4,0x34,0xec,0x64,0x97,0x48,0x1f,0x41,0xe1,0x50,0x85,0x86,0xe3,0x85,0xdb,0xd0,0x8b,0xe4,0xc9,0x91,0xea,0xa4,0x5d,0x65,0xd2,0x98,0x52,0x0a,0x0d,0xde,0x71,0xb4,0x86,0xaa,0xfc,0xa7,0x1b,0x7b,0x1a,0xa1,0x1c,0x5a,0xea,0x82,0x97,0x03,0x43,0x88,0xcd,0x96,0xf6,0x55,0x87,0x6f .byte 0xb9,0x85,0xed,0x9c,0x17,0x89,0x31,0x7e,0x72,0x96,0x0f,0x2f,0xb7,0xcb,0x45,0xe4,0x46,0x4d,0xf3,0x38,0xc2,0xe2,0x24,0xdb,0x7e,0x1e,0x1d,0xae,0x56,0x34,0x7e,0xf5,0xc7,0x17,0x08,0x22,0xab,0xb6,0x3c,0xf3,0x3f,0xe1,0xd6,0xd3,0x71,0xb5,0x58,0xad,0x88,0x41,0xab,0x1b,0x2c,0x90,0xd2,0x94,0x65,0x0c,0x02,0x7f,0x9c,0x01,0xbc,0x14 .byte 0x89,0x4d,0xca,0x3e,0x57,0xc5,0x00,0xe7,0x61,0x81,0x5c,0x07,0x39,0x18,0xc9,0xaa,0xd9,0xa1,0x3d,0xa9,0x9e,0xe2,0xec,0xaa,0x15,0x34,0xf8,0xd5,0x7b,0x20,0xbb,0x19,0xe2,0xc8,0x95,0xbe,0x46,0xfa,0xa1,0xde,0x22,0x18,0xbc,0x28,0xf6,0x72,0x2a,0xc7,0x4a,0x26,0x4c,0xe2,0xdb,0xcf,0xc1,0xa2,0x41,0x9e,0xb8,0xfb,0x93,0x65,0x8f,0xc8 .byte 0x38,0x6a,0x8a,0x4e,0xea,0x35,0xed,0xc6,0x1a,0xcd,0x77,0x4f,0xc1,0x7c,0x08,0xd3,0xc6,0x50,0xab,0x08,0x34,0x76,0xbc,0x65,0x8f,0x88,0xa8,0xa7,0x03,0x18,0x4a,0xdf,0x64,0x35,0xad,0xa0,0x1a,0x91,0xee,0x41,0x1e,0xe7,0x70,0x9f,0x6e,0x46,0xd5,0xc6,0xda,0x1b,0x17,0x5c,0x11,0x56,0x55,0x5c,0xdd,0x24,0xb7,0x15,0xc8,0xa6,0x02,0x33 .byte 0xa6,0x10,0xd6,0x9b,0x67,0xc0,0x20,0x46,0x25,0xf8,0xd0,0xab,0x25,0xbb,0x00,0x3a,0xcc,0x00,0x30,0xad,0xa9,0x60,0x28,0xc9,0xfd,0x8c,0x0d,0x02,0x95,0x47,0xff,0x30,0xa5,0x52,0x91,0xc4,0xef,0x73,0x28,0x93,0x08,0x37,0xe7,0x81,0x8f,0xd5,0x0c,0xd8,0x6b,0xc6,0x73,0xe7,0xfe,0x3f,0xc8,0xe0,0xd8,0xa7,0x68,0xa2,0xa9,0xd8,0xa3,0xa3 .byte 0x90,0x7e,0xa5,0x30,0x61,0xac,0xfc,0xe9,0x56,0x07,0x49,0xc6,0xf6,0x0d,0x21,0x86,0xa5,0xc8,0x7b,0x3a,0xfb,0xa7,0x59,0x3f,0xd0,0xe7,0x2b,0x90,0x40,0x71,0x76,0x06,0x34,0x03,0x32,0xb9,0x93,0x02,0xa4,0xa8,0x17,0x27,0xa3,0x47,0x40,0x79,0xed,0x8c,0x6f,0x12,0x7f,0x32,0x7d,0x9f,0x3a,0x39,0xfb,0xb6,0x75,0x66,0x60,0x66,0x6f,0x84 .byte 0x79,0xd6,0xce,0x6a,0x78,0x55,0x60,0x6b,0x1d,0x81,0xed,0x29,0x48,0x56,0x62,0x21,0xe0,0x8e,0xf8,0x63,0xad,0x6a,0x08,0xcc,0x9d,0x25,0x77,0x50,0x57,0x87,0x7d,0x52,0x8b,0x85,0x27,0x1c,0x10,0x68,0xe5,0xb7,0xfa,0x75,0xd2,0xfe,0x7d,0x89,0x1a,0x17,0xb7,0x0b,0x6c,0xe8,0x50,0xcf,0x42,0x51,0x77,0x27,0x75,0x2b,0x15,0xdb,0xc8,0x10 .byte 0x7a,0xd5,0x32,0x90,0x08,0x31,0x16,0x18,0x26,0x22,0xdb,0xfb,0x98,0xe1,0x49,0x71,0x7b,0x63,0x6f,0xb8,0x5e,0xd0,0x70,0x59,0xa0,0x26,0xd4,0xe0,0x01,0x0f,0xd2,0xb1,0x8a,0x94,0x94,0xa1,0x31,0x61,0xf8,0xbb,0x9a,0xe3,0x9b,0x3d,0xe8,0x55,0x4b,0x49,0xc0,0x71,0x57,0xfe,0x39,0xef,0x53,0x35,0xec,0x0c,0xf7,0x71,0x9f,0x18,0x66,0xe1 .byte 0x46,0x29,0x2c,0xc6,0x74,0xd2,0x20,0xf5,0xb2,0x64,0xa2,0x20,0x99,0x19,0x43,0x36,0x33,0x7d,0x85,0xcb,0x09,0x65,0x18,0xc5,0x7c,0x9f,0xf9,0xae,0x0a,0x1a,0x47,0xf6,0x65,0x4a,0x43,0x13,0x4e,0xcf,0x2b,0x9f,0x0d,0x9b,0x8a,0x5e,0xc6,0xf8,0xc2,0x26,0x88,0xc1,0x4e,0xde,0xa2,0x08,0xdd,0x0e,0xeb,0x46,0x3d,0x93,0xae,0xeb,0xd8,0xc0 .byte 0x29,0x2a,0x11,0x56,0x7c,0x97,0x10,0xae,0x6e,0x02,0xc9,0xc8,0xed,0x78,0x68,0x8d,0xa7,0x93,0x74,0x4c,0x7a,0x67,0xd4,0xb8,0x97,0x2d,0x0d,0xc0,0x33,0x96,0xb7,0xbc,0x4a,0x02,0x5f,0xa7,0xd7,0x1e,0x92,0xfd,0xf4,0x2f,0xd3,0x44,0x41,0x80,0x11,0x76,0x95,0x93,0x9d,0xf5,0xfb,0x98,0xc1,0xb6,0x11,0x3e,0x05,0x3b,0x7f,0x4a,0xa7,0xde .byte 0x3a,0x8b,0xff,0x0c,0x13,0x5a,0x93,0xa8,0x34,0x64,0x85,0x6c,0x63,0x67,0x71,0x45,0x83,0xbb,0x27,0x9f,0xda,0xf7,0x66,0x92,0x7e,0xb7,0x1f,0xcf,0x23,0x38,0x1f,0xe4,0x7c,0x39,0xcc,0x30,0x34,0x14,0x3b,0x6f,0x02,0x52,0xd8,0xac,0xcf,0x72,0xb6,0x95,0xf7,0xc0,0x64,0x36,0x31,0x08,0x45,0x8d,0x17,0x17,0x9c,0x75,0xec,0x21,0x5c,0x87 .byte 0x4f,0x94,0x64,0x24,0xb6,0x07,0x7f,0x13,0xee,0x62,0x67,0x62,0xab,0x2d,0xf1,0xfa,0x06,0x21,0x92,0xb8,0xa3,0x1e,0xc0,0x62,0x85,0x2e,0x3b,0xe5,0xbb,0x08,0xd5,0x18,0xb6,0x0c,0xd7,0x5d,0x2e,0xd6,0xfc,0xd4,0x05,0x49,0x82,0x19,0x17,0xdd,0xd0,0xd3,0xb6,0xc3,0x2e,0x72,0x59,0x2e,0x29,0xf0,0xf3,0x57,0xef,0x43,0xb6,0x1d,0x10,0x2a .byte 0x34,0xd5,0x52,0x9d,0xdc,0x8f,0x14,0xf9,0x52,0x9c,0x30,0xd9,0x49,0x39,0xe1,0x20,0x0e,0x04,0x79,0x8a,0x4a,0x17,0xd9,0xa9,0xf7,0x66,0x73,0xbd,0x40,0x3f,0x1a,0xff,0x38,0x63,0xe7,0x9c,0xfe,0xf1,0xd8,0x30,0xbf,0x76,0x8f,0x43,0x8f,0x18,0x72,0xd2,0x1d,0x7d,0x4a,0x2d,0xee,0xcb,0x4d,0xc5,0x96,0x19,0x5e,0x23,0xdc,0x7a,0xb9,0x69 .byte 0x94,0xe3,0xf6,0x8a,0x66,0xe6,0x68,0x1f,0x36,0x2f,0xca,0xb2,0xca,0x4a,0x3f,0xcd,0x7d,0x70,0xe1,0x0d,0x41,0x5f,0x46,0x26,0x5f,0xee,0xb9,0x78,0xaa,0xa2,0xd1,0xc1,0x27,0xb8,0x4d,0x3d,0x52,0xaa,0x1e,0x8b,0x3c,0xc0,0x4e,0x26,0xcc,0xa9,0x99,0x1b,0x0d,0x58,0xdd,0x6d,0xde,0x25,0x9e,0x3c,0x3b,0xab,0xcb,0x68,0x5d,0xfe,0x58,0xaa .byte 0x98,0x37,0xe8,0xbf,0xc4,0x99,0x60,0xc7,0x96,0xf2,0xc7,0x2e,0x2f,0x61,0x14,0x28,0x4b,0x8e,0x05,0x0f,0x3b,0xb9,0x7a,0xa5,0xf8,0xbe,0x01,0x4a,0x68,0x44,0x7f,0xf8,0xc1,0xdf,0x18,0xe8,0x5a,0xc3,0x67,0xe0,0xf8,0x3b,0x17,0x51,0x03,0xfb,0xc1,0x6b,0xa8,0x65,0x4a,0x5f,0xe0,0xd2,0x69,0xa9,0x6c,0xb2,0xe8,0x2f,0xeb,0x90,0xab,0xe5 .byte 0x6d,0xdb,0xb2,0x1d,0xda,0x58,0x76,0xa2,0xb7,0x76,0x6f,0xbf,0x96,0xe8,0x97,0x7b,0x49,0xa6,0x5f,0x29,0xdd,0x02,0x09,0x0f,0x2b,0x09,0xf3,0xbd,0xa0,0xca,0x2b,0xfa,0x82,0x52,0x42,0x93,0xb6,0x53,0x33,0xb7,0x4d,0xa8,0x91,0x81,0x5c,0x88,0x51,0xf6,0xcc,0x65,0x6e,0x76,0xd1,0x07,0xb5,0x19,0xc4,0x90,0x6f,0xd7,0x5a,0xf7,0x34,0x00 .byte 0xba,0x0d,0x1f,0x64,0x66,0x87,0x25,0xcf,0xac,0xd0,0x60,0x44,0xdf,0x29,0x9b,0x84,0xf2,0x37,0xf5,0x17,0xaa,0x75,0xba,0x0a,0x5d,0x71,0xe4,0x50,0xaf,0x87,0x76,0x18,0x21,0x94,0xe1,0x0f,0x9a,0x2f,0xb1,0x10,0x8a,0x49,0x13,0x43,0x92,0xc6,0xf3,0xa3,0x68,0x2b,0x52,0x91,0x91,0x41,0xeb,0x33,0xfd,0x45,0xea,0x9c,0x6e,0x32,0x3b,0x9d .byte 0x1e,0xe0,0x97,0xb7,0xa2,0x83,0xd1,0xf4,0x2f,0xb9,0xe8,0x5a,0x7d,0x5a,0xe1,0xc4,0xec,0x4b,0x1b,0x22,0xf5,0xc8,0x87,0x74,0xdd,0xe4,0xb5,0x8c,0x4e,0x69,0x33,0x50,0xe7,0x31,0x36,0xef,0xf7,0xb2,0x29,0xc6,0x31,0x1f,0xde,0xa7,0x7b,0xae,0xa8,0xae,0x57,0xf4,0x17,0xf9,0xbd,0x9e,0x1d,0x83,0x98,0x70,0x00,0x1f,0xb6,0x14,0xdb,0xb3 .byte 0xc5,0x4d,0x7b,0xdd,0x36,0x4d,0x94,0xff,0xec,0x24,0x6b,0xb8,0xa7,0xaa,0x32,0x2d,0xff,0xcc,0x6c,0xdb,0x26,0x95,0x47,0x69,0xdf,0xf0,0xa2,0xc0,0xc3,0x98,0x30,0x29,0x40,0x97,0x45,0x84,0x3b,0x3b,0x4c,0x36,0x2c,0xdf,0xe7,0x8e,0x03,0x8b,0x60,0xc7,0xb5,0x24,0x19,0x56,0x98,0xd5,0x23,0xfa,0xce,0x30,0xb3,0x5f,0xef,0x74,0x3a,0xf7 .byte 0x49,0x57,0x6d,0xad,0xb6,0x97,0x54,0xbb,0x85,0x80,0x52,0x5c,0x44,0x7e,0x2e,0x2c,0xd4,0xd5,0x05,0xd2,0xf1,0xd2,0xb1,0xc0,0xda,0xde,0xf3,0x46,0xe4,0xde,0x59,0x85,0x39,0xa8,0x5c,0xf0,0x10,0x9e,0xa0,0x99,0x68,0x5b,0x00,0xe7,0x2a,0x60,0x65,0xe7,0x69,0x24,0xb0,0xdc,0xd3,0x7d,0x98,0xd6,0x1f,0x75,0x37,0x5a,0x14,0x3c,0xe2,0x8d .byte 0xe9,0xf4,0x73,0x5d,0xd7,0xde,0xf6,0x74,0xb0,0x07,0x51,0xee,0x5c,0x4c,0x72,0x72,0x16,0xf2,0xfb,0x44,0xac,0x26,0x20,0xaa,0xe8,0x96,0xc5,0xdc,0x5e,0xea,0xf9,0x62,0x76,0x96,0x1b,0xe3,0xc3,0x50,0xc0,0xc6,0xc4,0x07,0xc6,0x32,0x3c,0xc2,0x8e,0x4e,0xfc,0xcb,0xa2,0x22,0x24,0xa2,0x58,0x3c,0x0f,0xce,0x5b,0xb4,0x27,0xaf,0x67,0xed .byte 0x81,0xf1,0x9c,0x26,0x38,0x80,0xc5,0xfc,0xfa,0xd1,0xae,0xfe,0x12,0xe7,0xb4,0x49,0x34,0x8f,0x52,0x5f,0x49,0xd7,0x0c,0x14,0x6e,0x93,0xc2,0x7e,0x3f,0x26,0x50,0x6d,0xc4,0xcb,0x55,0x76,0x52,0x95,0xd8,0x5b,0x81,0x0c,0x97,0x34,0xf0,0xaa,0x46,0x60,0x52,0x7a,0x53,0x99,0x74,0xf7,0xdc,0x3e,0xa4,0xbb,0xe2,0xca,0x5f,0x06,0x29,0x0d .byte 0xde,0x28,0x8a,0x40,0x9a,0x7c,0x12,0x7b,0x7d,0x8d,0xd6,0x59,0xa3,0x7b,0x36,0x15,0x1e,0xdf,0x6e,0xed,0x90,0x4a,0xa5,0x0c,0xb6,0xb1,0x8c,0x84,0xd2,0x14,0xab,0x85,0xb3,0xaa,0xb5,0x48,0xa3,0x91,0xe4,0x6e,0x46,0x69,0x2e,0x55,0xf1,0xbb,0x1d,0xa9,0xfa,0xae,0xcd,0xfa,0xf4,0xf1,0xca,0x74,0x2d,0x1b,0x8d,0x29,0x99,0x15,0x58,0x01 .byte 0xf2,0x8b,0x0d,0x2b,0x1b,0x27,0x91,0x48,0x26,0x50,0x1d,0xf0,0x72,0x3f,0xff,0xe3,0x1f,0x68,0x16,0x0c,0x4a,0xbd,0x35,0xa5,0x61,0xd0,0xd4,0xb2,0x21,0xc6,0x5a,0x49,0x4f,0x7c,0x0a,0x28,0x8f,0x57,0xc4,0xcf,0x74,0x42,0xdd,0x0a,0x7c,0x42,0x21,0x96,0x8a,0xcb,0xc4,0xc7,0x1d,0xc9,0xe0,0xc9,0x1f,0x62,0xfb,0x96,0x52,0xc4,0xbc,0xb5 .byte 0xc2,0x32,0x08,0x66,0xbf,0x27,0x6b,0x60,0xdd,0x29,0x65,0x98,0x40,0x5f,0x0a,0x41,0xb7,0x7b,0x9e,0xd1,0xb8,0x99,0x46,0xc0,0xf4,0x89,0x4f,0xc9,0x2c,0x3c,0xaf,0xc9,0xe4,0x86,0xa6,0xf9,0xeb,0x13,0x99,0x62,0x26,0xec,0x75,0xc5,0x42,0x0f,0x64,0xf8,0x43,0x96,0x4a,0xe0,0x3c,0xb9,0x00,0x83,0x41,0x71,0xcf,0xdb,0x5d,0xa0,0xc0,0xa0 .byte 0xe5,0x2c,0x75,0x6b,0xbe,0x87,0xbc,0xb3,0x1a,0xef,0x4c,0x65,0x34,0xc8,0x98,0x19,0xa2,0xed,0xf1,0xbe,0xe8,0x7c,0xd4,0xbd,0x5a,0x32,0x30,0x63,0xe0,0x86,0xef,0x63,0x98,0xa3,0x4a,0xfb,0xfe,0xd5,0x6e,0xe2,0x9c,0x54,0xc1,0xe9,0xd2,0x40,0xcf,0xc6,0x54,0x59,0xb4,0x8c,0x1a,0x11,0x7f,0x16,0xb4,0x1c,0x49,0x45,0x44,0x91,0xea,0xcf .byte 0xa5,0xf4,0x7b,0x3a,0x83,0x05,0xc9,0xb6,0x69,0x3b,0xe1,0x5b,0x24,0x63,0x90,0x59,0x66,0x5c,0xe4,0x00,0x6b,0x4d,0xe3,0xa6,0x90,0xe1,0x3a,0xad,0x5d,0x4a,0xfb,0x32,0x87,0xed,0xd3,0xc1,0xab,0x22,0x3b,0x9c,0x0e,0x38,0xa1,0x67,0x66,0x33,0x7b,0x6d,0x7f,0x95,0x20,0xf7,0x07,0x82,0xa7,0xf8,0x57,0xdb,0xc8,0xb2,0x69,0xe5,0xcc,0x54 .byte 0x6b,0xb5,0x70,0xbf,0x06,0xd0,0xa7,0x0c,0xb8,0x2a,0xe6,0xca,0x86,0xce,0x27,0x55,0xff,0xb2,0x25,0x88,0x4d,0xda,0x51,0xe3,0x50,0x73,0xfa,0x9c,0x15,0x2e,0x1b,0x5c,0x46,0x61,0x12,0x29,0x5a,0x04,0x39,0xf2,0x18,0xe8,0x50,0x69,0xcc,0x0f,0x69,0x27,0xae,0xdb,0x30,0xce,0xf4,0x61,0xc7,0x41,0xd3,0xbd,0x92,0xab,0x8e,0xf9,0x47,0xc8 .byte 0x06,0xc1,0x94,0x05,0xcb,0xf5,0x71,0x68,0xf2,0x74,0xca,0x0f,0x8a,0xfe,0x92,0x1e,0x0e,0xd5,0x42,0x19,0x6a,0x69,0x7e,0xa9,0x79,0xfa,0x3b,0x43,0xe3,0xee,0x71,0x66,0xbe,0x39,0xb2,0x70,0x6c,0x74,0x12,0xcf,0x56,0xae,0x98,0xaa,0x19,0xf0,0x80,0xff,0xf1,0x8a,0x23,0x5e,0x86,0xc7,0xfc,0x5c,0x74,0x0d,0xfa,0x23,0x5d,0x65,0x44,0x80 .byte 0xea,0x83,0xf1,0x2b,0xf5,0xe0,0xb0,0x16,0x3b,0x4c,0xdb,0x62,0xdd,0x50,0x05,0xd0,0x84,0xc0,0xda,0x14,0xd4,0xc7,0x5e,0x41,0xe3,0xb1,0x05,0xa2,0xbe,0xe6,0x7e,0x3f,0x77,0x8a,0x89,0x77,0xff,0x59,0xeb,0x43,0x57,0xe1,0x70,0xee,0x9c,0xb3,0x75,0x46,0x4d,0x33,0x26,0x8c,0x88,0xaf,0x49,0xad,0x97,0xa9,0x03,0x16,0xe9,0x55,0xae,0x1b .byte 0xda,0x80,0xa4,0x52,0x7e,0xbc,0xef,0x17,0x27,0x94,0x09,0x94,0x05,0xab,0xdc,0x6d,0x24,0xa4,0xae,0x43,0x78,0x2e,0x18,0x0d,0xf5,0x85,0x43,0xba,0x3b,0x36,0x2a,0x43,0x3b,0xd6,0x2e,0xc9,0x97,0x29,0x87,0xf3,0x98,0x80,0xc5,0xe6,0xc3,0xa3,0xeb,0x36,0x0b,0x5a,0xc5,0x6c,0x0f,0x53,0xdf,0x7d,0xb9,0xc0,0xdb,0x57,0xde,0xbb,0x89,0x7b .byte 0xb3,0x3b,0x9b,0x9b,0xe3,0x16,0x95,0xf1,0x44,0x0b,0x96,0x51,0x56,0x37,0x74,0xcb,0x6d,0x59,0x26,0x8b,0xb3,0xa8,0xdc,0xf4,0x7c,0x32,0xa7,0xcb,0x06,0x79,0xbf,0x09,0x5f,0xca,0xd5,0xa4,0x05,0x60,0xba,0xc1,0x2e,0xc7,0x35,0xc7,0xe4,0xe4,0x91,0xd1,0x4f,0x1b,0x1d,0x5e,0x3b,0x59,0x0e,0x7e,0xb6,0x5d,0xbb,0x99,0x20,0xc3,0xf5,0x28 .byte 0xc7,0xc7,0xc5,0x8c,0x14,0xd0,0xea,0x9a,0x6c,0xb0,0x2f,0x40,0xfb,0xb3,0xd6,0x8c,0xc2,0x8f,0xcb,0x5b,0xb9,0xdf,0xd8,0xae,0x48,0x8e,0x1a,0x2a,0xdd,0x8b,0x2b,0x14,0xf8,0xff,0x51,0xd2,0x73,0xed,0xbe,0x14,0x09,0x9d,0x50,0x28,0x18,0xe6,0xc4,0xba,0x6a,0xf9,0xc3,0xb5,0x23,0x91,0x5a,0x10,0x5b,0xd6,0x69,0x99,0x76,0x1b,0x6a,0xea .byte 0xc8,0x93,0x39,0x47,0xd0,0xc4,0x23,0xf7,0xb4,0xa2,0xc3,0x31,0xc3,0xca,0x13,0x12,0x7c,0x30,0x5c,0x73,0x32,0x6c,0xe2,0x48,0x6d,0xe5,0x9f,0xfc,0xd8,0x8b,0xef,0xf2,0xa7,0xc4,0x00,0xe7,0xc9,0x7b,0x93,0xb9,0x47,0x68,0xae,0xe6,0x6c,0xf2,0xfb,0x60,0xb4,0x51,0xa2,0x09,0x19,0x81,0x3e,0x34,0xb6,0xcd,0x41,0xd7,0xe2,0x4f,0xf5,0xf8 .byte 0x08,0xe4,0x88,0xb1,0x0f,0x19,0x6e,0x9e,0xf2,0x88,0x9b,0x7e,0xfe,0x46,0x9e,0x27,0xb3,0xc7,0xaf,0x1d,0xb7,0xc3,0x31,0x9c,0x96,0x54,0x0a,0x10,0xd1,0x62,0x3f,0xa1,0x17,0x77,0xf5,0xbc,0xf5,0x53,0x87,0x68,0x18,0x17,0x32,0x62,0x7b,0x66,0x88,0x28,0xf9,0x60,0xba,0xbe,0xa8,0xe6,0xa7,0x9c,0x15,0x15,0xe8,0x3f,0x09,0xb4,0x7b,0xa0 .byte 0x14,0x8f,0x5a,0xfe,0xbf,0xc2,0xc5,0xce,0x40,0x2e,0x23,0xae,0xa2,0xa9,0x88,0xea,0x0a,0xef,0x8a,0xa4,0x63,0x19,0x80,0x06,0x90,0x7e,0x5c,0x28,0x97,0x20,0x78,0xd6,0xf2,0xb0,0xea,0xb3,0xef,0x22,0x4c,0x35,0x46,0x44,0xa0,0x84,0xba,0x29,0xee,0xf5,0xa7,0x75,0x6a,0x9d,0xe8,0x67,0xbf,0xd9,0xf4,0x9e,0xa7,0x09,0x46,0x77,0x7c,0x76 .byte 0xa6,0x1d,0x2c,0x1d,0xcb,0x95,0xa0,0x2c,0x45,0x50,0x6e,0x2c,0xdd,0xe2,0x9c,0xbc,0xa5,0xc1,0x72,0x48,0x19,0xdd,0xe0,0x21,0x90,0xf7,0x66,0xa7,0x43,0x94,0x32,0x6d,0x7d,0xe2,0x6f,0x6b,0x8f,0x38,0x97,0x4e,0xd0,0xbf,0x41,0xd2,0x24,0xba,0xd0,0xe7,0xd1,0x56,0x74,0x58,0x41,0xbc,0x7b,0xe7,0xbd,0x39,0x43,0xdb,0x2d,0x1a,0x66,0xb8 .byte 0xc8,0xef,0x3f,0x6d,0xcd,0x5d,0x2d,0x1b,0xd7,0xb9,0x53,0x92,0x23,0xa2,0x5c,0x6f,0xd9,0x37,0xf4,0x43,0x6b,0x2d,0xb3,0xd5,0x7b,0x6c,0x87,0xb4,0xdd,0x05,0x39,0xa7,0x04,0x58,0xa9,0x7a,0xbe,0x08,0xf3,0x2e,0x79,0x7d,0x90,0xce,0x3d,0x2d,0x9d,0xf0,0xad,0xe6,0x28,0x44,0x7d,0x61,0x05,0xc1,0xc8,0x5e,0x2e,0x07,0x6c,0xd4,0x9c,0xbe .byte 0x3f,0xd8,0xfc,0x46,0xe5,0xbe,0x7c,0x12,0x30,0x55,0xc9,0x6b,0xa0,0xac,0x17,0x0e,0xd0,0x65,0x70,0xc9,0xd6,0x5e,0xb3,0x97,0x58,0x43,0x8e,0xce,0x18,0x48,0xc7,0xa6,0xdc,0x0c,0x14,0xef,0xbf,0x1b,0xaf,0xca,0xbe,0x2a,0x96,0x27,0x82,0x3d,0xec,0x9b,0x0c,0xc8,0x40,0x7b,0x3f,0x03,0x93,0x70,0x87,0x50,0x24,0xc5,0x1b,0x10,0x91,0x66 .byte 0x9f,0xbd,0xc2,0x9b,0xa0,0xee,0x5d,0xd3,0x65,0x17,0x03,0x4e,0x32,0xe3,0xb1,0x62,0xf7,0xe8,0x22,0x79,0x55,0xea,0xd9,0x3b,0x27,0x77,0x65,0x3d,0x44,0xde,0xbe,0x79,0x2d,0xfa,0x0b,0x59,0x08,0xf0,0x9b,0xc5,0xe0,0x78,0x6b,0x57,0x4f,0x75,0x32,0x92,0x6f,0xb1,0x4c,0x70,0x98,0x26,0xd1,0x07,0x2d,0xb7,0x8e,0x32,0x16,0x96,0xd7,0x0e .byte 0xde,0x61,0x49,0x46,0x65,0x92,0xdd,0xb3,0xd0,0x98,0x1b,0xed,0x30,0x6f,0xfd,0x02,0x8e,0xf8,0x7f,0x84,0x95,0x6d,0xe9,0x25,0x01,0xef,0xc9,0x03,0x7b,0xe1,0xf9,0x4f,0xd9,0x19,0xbb,0xa6,0x46,0x89,0xdf,0x36,0x01,0x40,0x08,0xfa,0x0b,0x93,0x2e,0x4b,0xdd,0xd0,0x1d,0x37,0xb9,0x14,0x4c,0x09,0xf1,0x7a,0x95,0x6c,0xd7,0xde,0xdc,0xcd .byte 0xd0,0xdc,0xeb,0x84,0x59,0x24,0xa1,0x1e,0xc2,0xa0,0x52,0x6b,0x74,0x2a,0x6b,0xef,0xe2,0x37,0x94,0xef,0x6e,0x3e,0x79,0x7c,0xba,0x90,0x3d,0xda,0x2d,0x96,0xf6,0x7b,0x59,0xa9,0x12,0xa2,0x90,0x72,0x18,0xde,0xbd,0xaf,0xa2,0x4a,0x1f,0x50,0x6c,0xb4,0x03,0xb8,0x29,0xa8,0x6e,0x07,0x7a,0xbe,0xee,0x79,0x6f,0x03,0x29,0x4b,0xf5,0x76 .byte 0x06,0x41,0x5a,0x14,0xf6,0x9c,0xd4,0xa0,0xf2,0x86,0x34,0x10,0x0c,0x12,0x6e,0x3b,0x6f,0x3b,0xb2,0x29,0xde,0xa9,0xa1,0x3e,0x32,0xe9,0xd7,0x26,0x12,0x73,0x0d,0xcc,0x5e,0x4d,0x0d,0xdf,0xa7,0xe0,0x2c,0x16,0x78,0x3f,0x76,0x7a,0x90,0x98,0x95,0x7c,0x18,0x28,0x64,0x9e,0xcf,0x7f,0x02,0xa6,0xc2,0x57,0xdd,0xaf,0x81,0xa8,0x60,0x34 .byte 0x8f,0x60,0x7e,0x62,0x6d,0xb1,0xb6,0x36,0x3e,0xb4,0xa9,0xad,0xfc,0x88,0x22,0x6b,0x50,0x26,0xd1,0xc4,0xa0,0xfc,0x58,0x30,0x1b,0xb3,0xec,0x0e,0x9a,0xd8,0x44,0x34,0xc5,0x63,0x74,0x28,0xe6,0x35,0x05,0xc0,0x0a,0x0e,0x3b,0x75,0x13,0x94,0xbf,0x21,0xb3,0xba,0x90,0xca,0xc2,0x0b,0xcd,0x39,0xe3,0xcb,0xf4,0x52,0x31,0xe4,0xb1,0x31 .byte 0xf8,0x62,0x77,0x69,0x37,0x5c,0x45,0xc8,0xe7,0x14,0x35,0x45,0x41,0x03,0x5b,0x1e,0x81,0x6a,0x18,0xe9,0xc2,0x17,0xe5,0xbd,0x8a,0x33,0x29,0xe4,0x93,0x3a,0xa2,0x23,0xd4,0x5d,0xef,0x72,0x1c,0x6e,0x94,0x64,0x48,0xfc,0x53,0xd3,0x90,0x1a,0xd2,0xc8,0xa6,0x1f,0x83,0x3b,0x23,0x5d,0x7e,0x4a,0x89,0x4d,0x51,0xf6,0x1c,0x65,0x17,0xf5 .byte 0xdf,0xfb,0x6c,0x61,0xaa,0x1d,0xfd,0xf3,0xe8,0x9e,0x05,0x87,0x1b,0x70,0xde,0x1a,0x19,0xce,0x21,0xf3,0x2a,0x21,0xd1,0x16,0x19,0xc8,0x7f,0x19,0xa1,0x30,0x9f,0xd3,0x39,0x54,0x21,0x06,0x08,0x7d,0x74,0x1d,0x1e,0x04,0xfd,0x96,0xef,0xf7,0x59,0x92,0x0e,0x71,0x31,0x1b,0x86,0x86,0x8b,0xdc,0x3a,0x43,0xfa,0x2e,0x62,0x9d,0xec,0xd7 .byte 0x7a,0x96,0x1d,0xaa,0x30,0x92,0xf4,0xbf,0x05,0xa5,0xa9,0xff,0x42,0x7f,0xa7,0xae,0xe2,0x25,0x5d,0x79,0x5c,0xc2,0xbe,0xcf,0x6a,0x0e,0x08,0xa4,0x3b,0x30,0xe2,0x17,0x24,0x3d,0x4e,0xb8,0xd6,0xcd,0x03,0x01,0xaf,0xc0,0xcb,0x3f,0x32,0xb6,0x5b,0x2d,0xb4,0x66,0x51,0xe1,0x70,0x2a,0x2f,0x0e,0xda,0x68,0xe4,0x4e,0x32,0xa0,0x9a,0x50 .byte 0x0a,0x8a,0xfe,0x9f,0x5e,0xb3,0x3c,0x7b,0xc9,0x71,0xff,0xab,0x39,0xa8,0x46,0x03,0x7f,0xce,0xb9,0x3f,0x70,0x23,0x81,0xc1,0xac,0x25,0xdb,0x83,0xd6,0xd1,0x15,0x4a,0x8d,0x89,0x7e,0x8f,0x49,0xff,0x39,0x29,0xb9,0x2c,0xfe,0x50,0x2e,0xcc,0x4e,0x82,0x35,0x90,0x09,0x47,0x7f,0x67,0x1a,0xd3,0xf3,0xe8,0x8d,0x5c,0xaa,0x1c,0xbc,0x49 .byte 0xce,0x2f,0xdd,0x8f,0xe9,0x6f,0xb1,0x07,0xea,0x40,0x56,0xe9,0x86,0x04,0x4b,0xe1,0x4c,0xc6,0x6f,0x69,0x87,0x11,0x67,0xed,0x15,0xfc,0x23,0x26,0x70,0xaa,0xd2,0x0e,0x4d,0x22,0x67,0xa4,0xa2,0x6e,0x71,0xb8,0x1d,0x86,0xe8,0xc1,0x1c,0x23,0xf9,0xc1,0xae,0x0a,0xd9,0x15,0x28,0x25,0x01,0xb7,0x71,0xa8,0x5a,0x8e,0xc1,0x6a,0xad,0x39 .byte 0x75,0xee,0x1a,0xdf,0xb3,0x4d,0x22,0x79,0x2e,0xbb,0x87,0xa1,0x43,0x2a,0xdb,0x54,0x32,0xeb,0x1d,0x4c,0xbd,0x77,0xa7,0xfd,0x16,0x11,0x90,0xe0,0x38,0xc5,0xef,0x72,0xe6,0x5e,0xb9,0x77,0xfc,0xd8,0x00,0xe2,0xa5,0x11,0xc2,0x84,0x94,0xa4,0xdd,0xa9,0xea,0xc1,0x5a,0xb7,0x9a,0x07,0x14,0xd0,0x74,0x2c,0x44,0x01,0x58,0x0a,0xca,0x8d .byte 0x3b,0x27,0xda,0x02,0xeb,0x40,0x91,0x5f,0xd4,0x47,0x87,0xdf,0x5e,0x88,0xbe,0x8f,0x23,0xde,0x28,0x61,0xb5,0x93,0x74,0x47,0x14,0x1b,0x3e,0x03,0xa3,0x38,0x71,0x06,0xe8,0xf1,0x60,0xd8,0xc4,0x6d,0x91,0x42,0x72,0xdf,0xd7,0xe4,0xf8,0xce,0xdc,0xae,0x55,0xb6,0xee,0x2a,0x60,0xe7,0xc6,0x86,0x3c,0x6a,0xf4,0x05,0x09,0xf2,0xdd,0xb0 .byte 0xf5,0x9d,0x4d,0x49,0xc2,0xc1,0xb6,0x6a,0x00,0xac,0x6c,0xf5,0xc1,0x03,0xb2,0x2c,0x16,0x9b,0x16,0xe3,0x98,0x3b,0x79,0x1a,0x07,0xed,0x55,0x9d,0x0a,0x48,0x7b,0x22,0x75,0x9a,0x20,0x98,0x3a,0x8c,0x93,0xdd,0xe4,0x9e,0x1b,0xc3,0xf1,0x1f,0x64,0x63,0xa5,0x37,0x51,0x7f,0xaf,0x10,0xb3,0x35,0x9b,0xba,0x7f,0x78,0xf1,0xd8,0x9f,0x65 .byte 0x1c,0x8a,0x03,0x05,0x88,0x2d,0xd9,0x1c,0x8a,0xd3,0x52,0x71,0x20,0xf7,0xb7,0x47,0xef,0x9a,0xea,0xa4,0xd0,0x58,0x3f,0x4b,0x0e,0xe3,0xe4,0x88,0xb4,0xdc,0x75,0x31,0xa4,0xb6,0xf0,0x33,0x2f,0xc4,0xa2,0x0f,0x59,0x2e,0xa7,0x14,0x60,0x03,0x68,0xce,0x4f,0x41,0xf1,0x2c,0x49,0x18,0x34,0x70,0xbb,0x35,0xa7,0xcc,0x09,0x60,0x7b,0x0e .byte 0xc1,0x4e,0xdb,0xb6,0xfe,0x19,0x7a,0xeb,0x9b,0x9d,0x9c,0x6e,0x21,0x69,0xa5,0x8c,0xc5,0x0e,0x27,0x13,0x52,0xa2,0xaa,0x83,0x72,0x73,0xac,0xc3,0xd3,0x8b,0x92,0xd0,0xdc,0x79,0x22,0xcd,0x81,0x94,0xc3,0xb1,0xd3,0xf0,0xbb,0x0a,0x43,0x33,0xdc,0xf5,0x8e,0xd7,0x48,0xfa,0xbb,0x3c,0x47,0xd4,0x95,0xad,0x25,0xf0,0x39,0xf0,0x69,0x3d .byte 0xbb,0xf7,0xf3,0x0d,0x60,0x42,0x3e,0x50,0xff,0xa3,0xf3,0x54,0x4f,0xdb,0x5e,0xfa,0x3c,0x17,0xc8,0x4c,0xcf,0xe8,0x2d,0xcc,0xa7,0x73,0x15,0x6c,0xe6,0x5c,0x90,0xa1,0xce,0xef,0xc5,0xd5,0x1f,0x1f,0xc5,0xe0,0x6d,0xb2,0xd6,0xde,0x68,0x8f,0x73,0xa2,0x48,0x15,0xbf,0xd7,0x86,0x6a,0x11,0x36,0xde,0x60,0x69,0x86,0xb0,0x42,0xec,0xa6 .byte 0xd5,0x5d,0xfc,0x51,0x20,0xd3,0x48,0xcf,0x22,0x2f,0x3c,0x87,0x07,0x57,0x44,0xec,0x63,0x2c,0xbd,0x14,0x21,0xa2,0x4f,0x2e,0xf2,0xce,0xb4,0x25,0xf8,0x66,0xd9,0xd5,0x16,0x10,0x1d,0x3f,0x00,0xfa,0x95,0xf8,0xb6,0xb3,0x67,0x23,0x2e,0xfb,0x65,0xfd,0x16,0x80,0x81,0xc0,0x62,0xbd,0x68,0x60,0x94,0xc1,0x49,0x50,0x63,0xe7,0xf5,0xc6 .byte 0x87,0x6a,0xaf,0xbf,0x6f,0x88,0x7a,0xbb,0x9d,0x59,0xf0,0x94,0x1b,0xed,0x6e,0x52,0x52,0xd7,0xea,0x3a,0x89,0xa3,0x86,0xab,0xf2,0x32,0x28,0xf7,0xe3,0x50,0x6f,0xbe,0x9b,0xab,0x73,0x0f,0xe2,0x9c,0x0b,0xaa,0xba,0xb7,0xfb,0x99,0x09,0xe6,0x76,0xa5,0x4e,0x2a,0x56,0xdc,0x07,0xca,0x7c,0xfa,0xc5,0x36,0x89,0xe3,0xaf,0x9c,0x67,0x9f .byte 0xbc,0x94,0x35,0xb8,0xee,0xf9,0xf5,0x04,0x20,0xe0,0xed,0xc2,0x3c,0x7a,0x4a,0xc0,0x9b,0x28,0xf0,0x14,0xd2,0x08,0x40,0x3a,0x6e,0xc3,0xce,0xcc,0x4f,0x8f,0x3d,0xd9,0xca,0x8b,0xf7,0x5d,0xe5,0x0f,0x7a,0x85,0xaf,0xa1,0x9d,0xbd,0x28,0x07,0xee,0x54,0x2e,0x23,0x18,0x1d,0xc9,0x6b,0x67,0x2b,0x12,0x33,0x0d,0x8b,0xf4,0x7f,0x34,0x47 .byte 0xfb,0x2c,0x55,0x3c,0x66,0x32,0xe6,0xa0,0x97,0x3b,0x8a,0x1e,0xc8,0xcf,0xd3,0x72,0x76,0x87,0x8c,0x8e,0x0f,0xfa,0x3a,0x37,0x99,0x0f,0x2b,0xfd,0x1c,0x5c,0x4f,0x81,0x87,0x80,0x2d,0x02,0xb9,0xeb,0xe3,0x66,0xe3,0xa0,0x09,0x38,0x2c,0x48,0xbc,0x91,0x38,0x3a,0x7b,0x2a,0x63,0x0d,0x67,0x27,0xd8,0xde,0xe9,0xab,0x1a,0xf2,0x46,0x53 .byte 0xcc,0x80,0x5a,0x02,0x61,0xd1,0x18,0xd6,0x05,0x66,0xec,0x48,0x51,0x5d,0x91,0xa8,0x55,0x52,0x8d,0x56,0xa6,0x89,0xf2,0xe5,0x99,0x87,0x09,0x59,0x70,0x1f,0x11,0x1d,0x0d,0x3d,0x67,0x8f,0x9a,0x82,0x4f,0x81,0x21,0x0f,0xe6,0xeb,0x52,0xd0,0x21,0xb1,0x55,0xeb,0x59,0xfa,0x49,0x1e,0xb7,0x03,0x5b,0xe0,0x50,0xd4,0xf9,0xfd,0x41,0xa9 .byte 0x7a,0x5a,0xee,0xca,0x0b,0xdc,0xa1,0x32,0xd2,0x7f,0x72,0x1e,0xae,0x93,0x01,0xc0,0x34,0x79,0x32,0xaf,0x5f,0x60,0xba,0xc6,0x34,0xda,0xe3,0x85,0x0f,0xe1,0xe3,0x66,0xcd,0x3d,0xe4,0xfd,0xbc,0x1f,0x23,0x29,0x38,0x5e,0x8e,0x24,0xff,0x8d,0x23,0xaf,0x7d,0xd7,0x7f,0xd6,0xb2,0xca,0x1d,0xda,0x22,0xb1,0x2a,0x73,0x8e,0x3b,0xf3,0xee .byte 0xbb,0x60,0x6f,0x7b,0xfd,0x84,0x2c,0x8c,0xcb,0x13,0x31,0x5c,0x7c,0x77,0x57,0x39,0x0f,0x03,0x12,0xc9,0xa1,0x2f,0x72,0x62,0x3f,0x0e,0x70,0xd2,0x62,0x40,0x60,0xb6,0x24,0xbc,0x12,0xa4,0x24,0xbb,0x77,0x94,0xce,0x0a,0xd5,0x4a,0xba,0x9b,0x5e,0xa2,0x04,0xcd,0xe5,0x3d,0x2b,0x3b,0xa0,0x76,0x0f,0xfd,0xe7,0x0a,0x46,0x2a,0x98,0x09 .byte 0x9f,0x7c,0xd7,0xc3,0x33,0x4c,0x34,0xa4,0x2f,0x55,0x38,0x93,0xfb,0x9a,0xd5,0x75,0x22,0xdd,0x84,0x32,0x15,0xbe,0x43,0x73,0xa2,0xbe,0x23,0x1c,0x8e,0x3e,0xee,0xad,0xa7,0x54,0x8b,0xbe,0x9b,0xc8,0x6a,0x78,0x62,0xf1,0xb2,0x36,0x0e,0x00,0xfd,0xd0,0x9f,0x70,0xcc,0x2a,0x94,0x3e,0xe7,0x8c,0x60,0x4b,0xe6,0xc1,0x8c,0x65,0x0b,0x1a .byte 0xe2,0xfd,0xfd,0xe8,0xa0,0x85,0x8f,0x1d,0x2c,0x5b,0x34,0x30,0x1a,0x6f,0xe6,0xe9,0x75,0xbc,0xcf,0xc4,0x6d,0x12,0xb5,0xff,0x3d,0x56,0x4a,0x08,0xbf,0xbd,0x8b,0xd1,0xfe,0x37,0x31,0x2b,0xe8,0x7d,0x6b,0x97,0x99,0x80,0xd9,0x22,0x2f,0x4c,0xc4,0xa6,0x98,0x24,0x42,0x07,0x4b,0xbc,0x4f,0x14,0x6b,0x15,0x90,0x27,0xf6,0x9f,0x2f,0x42 .byte 0xfd,0xcc,0x51,0x1c,0xf0,0x8e,0x28,0xf6,0xea,0x3f,0xc0,0x65,0x17,0xc8,0xf7,0x90,0xf4,0x54,0x9d,0xc5,0x53,0x11,0x5c,0x90,0xcb,0xa8,0xe8,0xd2,0x0c,0x6b,0xb7,0x15,0x0d,0x2c,0x6d,0x7c,0x2e,0xb9,0xc9,0xde,0x31,0xec,0x85,0x74,0x93,0x95,0x06,0x1d,0x0c,0xed,0xd4,0x77,0x65,0x91,0x3f,0xa4,0xa5,0x90,0x63,0x63,0xcd,0x73,0x13,0xe7 .byte 0xad,0x39,0x22,0x37,0x41,0x7b,0xf8,0x64,0x14,0xe6,0xe0,0x93,0xc2,0x91,0x4f,0x34,0x0b,0x01,0xef,0x9a,0x27,0x0e,0xe7,0xf5,0x0b,0x7e,0xb1,0x13,0xa5,0x24,0xcf,0xdb,0x54,0xf8,0x32,0xae,0x01,0x2e,0x61,0x0e,0x73,0x36,0x4a,0x17,0x6c,0xdb,0x9a,0x80,0x6e,0x91,0x54,0x7b,0xa9,0x85,0x27,0x08,0x75,0xb3,0x1f,0x82,0xa5,0x3d,0x67,0x99 .byte 0x7b,0x38,0xb9,0x21,0x3f,0xa1,0x06,0x7d,0xde,0xc9,0xef,0x4d,0xca,0x8d,0xa2,0x5a,0xa1,0x85,0x03,0xe2,0x8b,0x8f,0x4f,0xc5,0x47,0x8d,0xb6,0x8d,0xd3,0x8d,0x0a,0x11,0xa5,0x45,0x7b,0x2e,0x38,0x1b,0xb6,0x23,0x17,0x89,0x06,0xe5,0x25,0x5c,0x5e,0x95,0x2f,0x61,0x48,0x5a,0x55,0x40,0x7e,0x0f,0x2b,0xd8,0x2b,0x7e,0xfb,0x3b,0xa9,0xf4 .byte 0x26,0x65,0x70,0x46,0xdb,0x1f,0xa7,0x16,0xfa,0xd4,0x5e,0x6c,0xaa,0x7c,0x2e,0x69,0xf1,0x55,0xb2,0x99,0x1e,0xed,0x54,0x5e,0xb4,0x70,0x42,0xf1,0xa5,0x68,0xd4,0x02,0x59,0x07,0x82,0x35,0x67,0xe6,0x21,0x08,0xb6,0x23,0x2d,0xa0,0xe3,0xe5,0xef,0x4c,0xe0,0x7f,0xb0,0x30,0xa5,0xc1,0x5e,0xea,0x5d,0xeb,0xe3,0x97,0x9f,0x5c,0xf7,0x91 .byte 0x8e,0x8d,0xac,0xe3,0xdc,0xd6,0x94,0x93,0x0f,0xaf,0x07,0x21,0x0c,0x20,0x0d,0x73,0xe2,0x0e,0x9f,0x77,0xb8,0xd5,0x0c,0xd8,0x64,0x49,0x34,0xe0,0xa1,0xe7,0x42,0xfb,0xfd,0x30,0x03,0x2e,0x2c,0xb7,0x9a,0x17,0xe5,0xa6,0x34,0x8d,0xe4,0xcf,0xf8,0x47,0xb7,0xf0,0xc1,0xb4,0xee,0x2b,0xbe,0x07,0x7c,0x99,0x48,0xb3,0x42,0xb6,0xf1,0x98 .byte 0x45,0xd4,0x53,0xff,0x27,0x26,0x2e,0xa5,0x74,0xfc,0xa8,0x09,0x37,0x16,0xf6,0xb2,0xad,0x5b,0xee,0x51,0xcc,0x09,0x90,0x4e,0x5f,0xd0,0x72,0xd7,0xbb,0xd6,0x85,0xd6,0xe4,0xab,0xf8,0x7d,0x02,0xe0,0xc2,0x51,0xce,0xac,0x8b,0xf1,0x91,0x63,0xb4,0x2e,0xb5,0xe2,0x3a,0xac,0xf6,0xb0,0xd9,0x4a,0x90,0xef,0x66,0x19,0x2c,0xbd,0x87,0xae .byte 0xa1,0xee,0x08,0x5e,0x88,0xde,0x1c,0x47,0xeb,0x07,0x20,0x95,0xb2,0xdf,0xfc,0xd7,0xe2,0x44,0x45,0xbc,0x56,0x48,0x46,0x26,0xef,0xce,0xf9,0x0f,0xf6,0xab,0x33,0xf0,0x35,0xc8,0x39,0xd6,0x91,0x9e,0x02,0xe7,0xc5,0x30,0x3a,0x1d,0x78,0x51,0xa7,0x48,0xc9,0xc9,0x7c,0x09,0x0e,0xa1,0x89,0x0b,0x54,0xbb,0xc6,0x65,0x16,0xb6,0xb1,0x82 .byte 0xa6,0x53,0x8b,0x20,0x25,0xf2,0xfb,0x6d,0x4e,0x5e,0xf6,0x62,0xe9,0x14,0xbc,0x0a,0x68,0x09,0xa7,0x79,0xc1,0xad,0x9d,0x45,0x75,0xbd,0x96,0x3b,0x27,0x93,0x10,0x10,0x34,0x98,0x96,0xf6,0x0e,0x24,0x92,0x1f,0x00,0xf4,0x9e,0x55,0x08,0x76,0x83,0xef,0xd8,0xad,0xcb,0xcc,0x82,0x25,0xe3,0x7d,0xd3,0xb3,0xc5,0x35,0x8f,0x5d,0x9a,0x56 .byte 0xe7,0x03,0xf2,0xa2,0x40,0x44,0x5c,0x1e,0xb6,0x53,0x1f,0xe1,0x65,0xa9,0xa1,0x06,0xa1,0x1b,0x96,0x2e,0xcc,0xce,0x99,0x11,0x26,0x2b,0x1b,0xd6,0x38,0x45,0x56,0x87,0x3d,0xf3,0x42,0xe2,0xa4,0x57,0x11,0x95,0x8c,0x07,0xd0,0xb0,0x82,0xcc,0x75,0x30,0x5c,0x61,0x72,0x5a,0x22,0xd7,0xa2,0xb3,0xa1,0x1c,0xa2,0xfa,0xaa,0x71,0x31,0xc2 .byte 0xde,0xf5,0x3f,0x52,0x02,0x25,0x86,0x37,0x1c,0x1e,0x67,0x3f,0x8b,0x1a,0xe9,0x0a,0x5e,0xe5,0xef,0x14,0xe0,0x69,0x47,0x6d,0xb3,0xbd,0xd2,0x44,0xbf,0x1a,0xdc,0x71,0xe6,0xd8,0xf8,0x7a,0x1e,0xf6,0x67,0xdb,0x96,0x2f,0xab,0x8d,0xfa,0x4b,0x16,0x02,0xf9,0xdd,0x9a,0x5d,0xd3,0xf1,0x34,0x9f,0x78,0xf0,0x30,0xdd,0x5f,0x59,0x24,0x39 .byte 0xa2,0x4b,0xc4,0x66,0xf5,0xc9,0xbd,0x4c,0x0e,0xd3,0x54,0x01,0x50,0x3a,0x12,0xd9,0xd9,0x25,0x56,0xf2,0x29,0x74,0xd8,0x3b,0x7d,0xf8,0x5d,0x60,0xc7,0x72,0x4b,0xb9,0xb0,0xb2,0xc9,0x5f,0xdf,0x4e,0x6d,0x6e,0x0f,0x97,0x19,0xe6,0xaf,0x1d,0xfb,0x70,0xc5,0x62,0xb9,0xb1,0xa4,0x4b,0x3d,0x26,0xe9,0xd2,0x3d,0x44,0x61,0x1d,0xbe,0xe0 .byte 0x3e,0x7d,0xe4,0x77,0x41,0x37,0xa0,0x9b,0x60,0x57,0x62,0x05,0x4c,0x04,0x68,0xfb,0x47,0xcf,0x48,0x48,0xa0,0x86,0x22,0xea,0x9f,0x49,0x89,0xc3,0x7c,0x4c,0x5c,0xde,0x31,0xad,0x85,0xf7,0x99,0x00,0x4e,0x64,0xbd,0xd1,0x6e,0xa0,0xd8,0xfb,0x71,0x08,0x44,0x7d,0x22,0x75,0x78,0x5f,0xe4,0x6b,0xce,0x28,0xd8,0x47,0x9d,0xb1,0x31,0x68 .byte 0x1a,0x91,0x4f,0x94,0x25,0x6d,0x9f,0xc8,0x21,0x77,0xaf,0x4e,0x98,0xc5,0x9d,0xf9,0x52,0x5f,0x0a,0x23,0x61,0x0e,0xda,0x11,0xad,0x43,0xae,0x82,0x07,0x5b,0xc8,0x1f,0xee,0x15,0x65,0xf0,0x30,0xb4,0x97,0x55,0xdd,0xbd,0xcf,0x01,0x37,0x14,0xd5,0x6e,0x12,0xe4,0xa5,0x20,0x38,0xea,0x4c,0x61,0x68,0x8c,0x47,0x68,0xfd,0xd5,0xda,0x36 .byte 0x8c,0x18,0x31,0x7c,0x5a,0xde,0x03,0x1d,0xb3,0xe2,0x17,0xe8,0x5a,0x7b,0x9b,0x0f,0x2a,0xac,0x1d,0x79,0x8d,0xb4,0xbe,0x41,0x00,0x0a,0x8e,0x75,0xa6,0x69,0x7a,0x17,0xe7,0x29,0xd4,0xcd,0xd5,0xbc,0x5c,0x17,0x53,0x17,0x3c,0x58,0x4b,0x44,0x39,0xa8,0x6b,0x7b,0x01,0x05,0xe3,0x33,0xd8,0x8e,0xb8,0x25,0xe6,0xe5,0x15,0xe3,0x2d,0xb4 .byte 0x75,0x2e,0x4e,0x7c,0xd5,0x19,0x56,0x9d,0x55,0xca,0xf7,0xd0,0x40,0x2d,0x98,0x4d,0x17,0x29,0xec,0x87,0x0e,0xb1,0x9b,0x80,0xb6,0x34,0xe6,0xe8,0xdf,0x2b,0x91,0x5a,0x4f,0x68,0x1e,0x2d,0x99,0x9f,0xf8,0x94,0xab,0x58,0xa8,0x02,0x99,0x52,0x42,0xf9,0xb0,0xe1,0x21,0x0d,0xb6,0xad,0x1f,0xce,0x77,0x53,0x1f,0x37,0x7b,0x19,0xf9,0x1c .byte 0x84,0xfb,0x7a,0x81,0x37,0xd5,0xd7,0x28,0xfe,0x11,0x03,0x1b,0xd1,0x75,0x68,0x85,0x4a,0x59,0x42,0x8a,0xca,0x48,0x32,0x54,0x1b,0x5d,0x4d,0xa0,0x8f,0xc2,0x01,0xf5,0xab,0x53,0xb0,0xa2,0x64,0xfe,0x0f,0x82,0x0b,0xeb,0xdb,0xd5,0xfc,0xf1,0x8a,0xf8,0xf4,0x71,0x16,0xc4,0xe7,0x0f,0x61,0xe5,0x04,0xb1,0xdc,0x47,0xed,0x3e,0xe7,0x5d .byte 0x22,0x65,0x4e,0xc9,0xd9,0x37,0x1d,0x0f,0xc9,0xee,0x86,0x47,0xa0,0x59,0x32,0x80,0x76,0xd1,0xf8,0x23,0x36,0xca,0x5d,0x26,0x6f,0x19,0x62,0x0c,0x23,0xaa,0xb3,0xa9,0x4f,0xc9,0x78,0x6d,0x1e,0xa6,0xf6,0xc2,0x88,0xbc,0x7e,0x38,0xaa,0x88,0x8f,0xad,0x95,0x13,0x80,0x5b,0x0a,0x95,0x5d,0x2d,0x2d,0xb0,0x81,0xf7,0x54,0x98,0xa8,0xfd .byte 0x4b,0x67,0x66,0x96,0xc2,0x58,0x5f,0xef,0x7f,0xc2,0xa5,0x2d,0xf1,0xdc,0x6e,0xf3,0x70,0x23,0x2b,0xe6,0xad,0x9f,0x52,0x58,0xa0,0x68,0x44,0xdb,0xf8,0x8e,0x9e,0x74,0xe5,0x84,0xc2,0xfa,0xd6,0x0c,0x16,0x22,0x0c,0x7b,0xf1,0x33,0x29,0x9a,0x6c,0x19,0xab,0xe0,0x61,0x81,0x02,0x6c,0x3b,0xe6,0xb9,0x5d,0x8a,0xb3,0x85,0x88,0x95,0x17 .byte 0x73,0x55,0x6a,0xd6,0xe4,0xa3,0xbc,0x36,0x7e,0x87,0x5f,0x63,0x6d,0x76,0x5f,0xba,0x29,0x20,0x98,0xc6,0x60,0x30,0xc3,0xa8,0x07,0x48,0xcf,0x0c,0x47,0x76,0x17,0xf3,0xa9,0x5b,0x3b,0xd7,0x57,0x3c,0xde,0x7f,0x00,0xd2,0x4f,0xba,0xdc,0x45,0xd1,0xbd,0xf4,0x6b,0x87,0xbd,0x48,0x4f,0xb4,0x7d,0x7a,0xd7,0xf7,0xda,0x96,0xd7,0xe0,0x7c .byte 0x3c,0x6b,0x27,0x89,0x69,0x53,0x78,0x75,0xf6,0xb6,0x1b,0x92,0xd1,0x99,0x5c,0xdb,0xda,0xbf,0x48,0x59,0x7e,0x24,0xb6,0xa9,0x33,0xd9,0x8b,0x09,0xcb,0x15,0xe4,0xd8,0x72,0xcc,0xfb,0x1d,0x0b,0xc9,0x0a,0x78,0xec,0x2e,0xc1,0x58,0x0b,0xd2,0x78,0xa1,0xf0,0x1c,0x67,0x9f,0x9d,0xe2,0xce,0x04,0x33,0xa3,0x7e,0xc5,0x40,0x62,0x8b,0x8b .byte 0x2f,0x72,0x66,0x8f,0x57,0x43,0xe5,0x06,0x28,0x43,0x24,0xdc,0xa1,0x12,0x07,0x27,0xfa,0xd2,0xb8,0x92,0xe8,0xc5,0x33,0x1e,0xa1,0x2c,0xf2,0x94,0x5b,0x9a,0x5f,0xbe,0x05,0x51,0xa8,0x6e,0x4a,0xa4,0x10,0x9d,0xa7,0x9e,0x97,0x97,0x1b,0x91,0x1c,0x85,0x8a,0x96,0x6e,0xc7,0x02,0x8e,0x59,0x38,0x8b,0xea,0xf7,0xc5,0xeb,0xa7,0xd2,0xfb .byte 0xde,0xdd,0x47,0x61,0xbc,0x08,0x03,0xbe,0x48,0xcc,0xd4,0x11,0xe4,0x5a,0xd9,0x6a,0x58,0x0c,0x7e,0xd8,0x53,0x04,0xaa,0x27,0xfe,0x90,0x99,0x08,0x16,0x1e,0x88,0xf1,0x60,0x3b,0xba,0xfc,0xf2,0x04,0x14,0x4a,0x3d,0x57,0x40,0x56,0xc3,0x76,0x01,0xf5,0x8c,0x1a,0xde,0xd9,0x6e,0x1d,0x37,0xf7,0xa6,0xd6,0x57,0xcf,0xa1,0xea,0xf7,0x26 .byte 0xdc,0x85,0x76,0x61,0x47,0xcc,0x4b,0xce,0x00,0x04,0x4b,0xbe,0xbd,0x17,0x61,0x49,0x17,0x18,0xb4,0x17,0xcd,0x19,0x03,0xb6,0x78,0x1d,0x8b,0xa6,0xf2,0xed,0xb2,0x38,0xf4,0xf1,0x7f,0x15,0xb3,0x3e,0x1e,0x5f,0xa0,0xe5,0x0b,0xf3,0xc3,0xb0,0xdd,0x0a,0xda,0x78,0x06,0xc6,0xe3,0x9c,0xee,0xaa,0xe3,0x93,0x08,0x9c,0x8f,0xc7,0x03,0x5f .byte 0xad,0x66,0xc2,0xf3,0x9f,0xce,0x24,0x81,0x93,0xfa,0xc0,0x9f,0xda,0x5c,0x38,0xcf,0x69,0x0e,0x0d,0x9b,0x22,0xc7,0xa1,0x62,0x94,0xf1,0x7a,0xf6,0x54,0x14,0xcc,0xc1,0xa4,0xd6,0xd0,0xb6,0x12,0x94,0x97,0x96,0x4d,0xa6,0xce,0x84,0x7f,0x0f,0x19,0xf2,0x6d,0xba,0x3e,0xf2,0x50,0x06,0xc7,0x53,0x62,0xb4,0x9b,0xf4,0x82,0x48,0x85,0x2b .byte 0xa6,0xab,0x65,0xff,0x18,0x4e,0x72,0x2f,0xfb,0x9f,0x73,0x08,0x80,0x12,0xe6,0x6b,0x81,0xf9,0x70,0x9d,0x38,0xbb,0x59,0x65,0x60,0xb6,0x89,0xbc,0xd5,0xf9,0xbd,0xbd,0xb5,0x17,0xcb,0x41,0xb8,0x29,0x87,0x11,0xd2,0xe5,0x06,0xfa,0x60,0x11,0x75,0xd8,0x83,0xcb,0x65,0x6c,0xb7,0xaf,0x86,0x41,0xb8,0x0d,0x4a,0x6c,0x48,0xf2,0x21,0x06 .byte 0xab,0xd5,0xa5,0xef,0x62,0x51,0xbe,0x29,0xb0,0x02,0x77,0x0e,0xba,0xc8,0xac,0x77,0x97,0xeb,0x3f,0x83,0x17,0x54,0xa9,0xe6,0x1f,0xfd,0xc8,0xb2,0x64,0x89,0x78,0x39,0xe7,0xb9,0x4f,0xd4,0x6e,0x00,0xc3,0x8d,0x9a,0x11,0x4a,0x2a,0x3a,0x0d,0xa2,0x5a,0xe5,0xe3,0xf3,0xa3,0xa9,0x77,0x91,0xdd,0xa5,0x7d,0x1a,0xe9,0xa4,0xf1,0x78,0xaa .byte 0x4e,0x93,0xb7,0x89,0x03,0x1a,0xba,0xa4,0x1b,0x2e,0xe6,0xfc,0xdf,0x3f,0x99,0xda,0x1d,0xa1,0xec,0x4a,0xc8,0x4b,0x28,0x24,0xb3,0xe5,0x1e,0xbf,0x85,0x74,0x8b,0xba,0xd5,0x5b,0x6c,0xd1,0x59,0x55,0x95,0xb3,0x6a,0x5f,0xd6,0xee,0x7a,0xf7,0x69,0xf5,0xb9,0xda,0xe6,0xdf,0x37,0xa3,0x61,0x4f,0x87,0xe8,0x13,0x1e,0x7a,0xab,0x98,0x79 .byte 0xd2,0xd6,0x0b,0x1d,0x2a,0x9c,0xe4,0x09,0x82,0x75,0x0b,0x45,0xa1,0xf2,0xa9,0x01,0x51,0x71,0x32,0xf6,0x23,0xaf,0xd4,0xe6,0x69,0xf1,0x08,0x0f,0x68,0x1c,0x47,0xe1,0x34,0xb8,0xd4,0x9a,0x98,0xb5,0x5a,0x95,0x24,0x1f,0x78,0xaa,0x51,0x63,0x95,0x61,0xc2,0xd3,0xcd,0x88,0xfb,0x8a,0x8c,0x75,0x94,0x0d,0x34,0x3f,0x7e,0xb0,0x40,0xaf .byte 0x45,0x65,0xe4,0x70,0xb9,0x86,0xf2,0x5d,0x4b,0x96,0xa4,0x0c,0x33,0xe0,0x6a,0x54,0x3a,0x21,0xae,0xd2,0x66,0x12,0x96,0x15,0x22,0xbb,0x08,0x3e,0xcf,0xd7,0x55,0x82,0x33,0x0a,0x6c,0x82,0xa1,0x2c,0x0d,0x08,0x96,0x7a,0xc4,0xc0,0x46,0x32,0x28,0xf3,0x59,0xbf,0xc7,0xfd,0x47,0xe7,0xc7,0x11,0x97,0x2b,0xa3,0xdf,0x44,0x30,0xe8,0x26 .byte 0xa4,0xfe,0x90,0x21,0x31,0xb6,0xed,0xe0,0x39,0x1f,0xfb,0x0b,0x94,0x00,0x2c,0x30,0x80,0x89,0xde,0x36,0x8c,0x73,0x7b,0x96,0x03,0x27,0xe0,0x99,0x37,0x63,0xc6,0xc5,0x49,0xa9,0xe9,0xca,0x88,0x3e,0xcb,0x87,0x23,0x84,0xa5,0xc8,0xa7,0xf4,0x1c,0x45,0xae,0x63,0xf8,0xca,0x58,0x4e,0x5b,0xa1,0x02,0x9a,0xd5,0xc1,0xb4,0xa7,0x2f,0xe4 .byte 0xab,0x54,0x3e,0x50,0x7d,0xcb,0x40,0x5d,0x13,0x8d,0x06,0xdf,0x1a,0xe9,0x35,0x32,0xac,0xa9,0x66,0x75,0x32,0x9b,0x4b,0x61,0x5d,0x3d,0x0a,0x8c,0xfe,0xfb,0x5f,0xc8,0xc0,0xcd,0xa8,0x81,0xd0,0xfb,0x45,0xb7,0x7b,0x86,0x58,0xb0,0x3d,0x77,0x27,0x76,0x1b,0x10,0x5f,0x8d,0xe0,0x54,0x89,0xab,0x51,0x41,0x11,0x9a,0x7b,0xe5,0xa5,0xee .byte 0xa7,0xfe,0x31,0x63,0xf9,0x66,0xf6,0x83,0x20,0x2c,0xe9,0x25,0x2e,0x75,0xff,0x9e,0x1b,0x81,0xe0,0xdc,0x55,0xa2,0x34,0x9c,0xaa,0x1c,0x6e,0xfc,0x98,0x10,0x99,0xce,0x31,0xe1,0x5f,0xb6,0x0b,0xab,0xa4,0x7c,0xd0,0x48,0xfd,0xd1,0xd6,0xf3,0x6a,0x4c,0xfc,0xba,0x4a,0x70,0x19,0xe1,0x5a,0x9b,0x1d,0x93,0xf5,0x8f,0x32,0x83,0xbc,0x04 .byte 0xe0,0x25,0xf8,0x41,0x16,0x10,0x88,0x30,0xa9,0x7a,0x47,0x40,0xad,0x88,0x43,0x20,0xe0,0x21,0x81,0xfb,0xbe,0xff,0xd2,0xad,0x37,0x9f,0xf7,0x5c,0xfb,0x89,0x46,0xc0,0x48,0xde,0x0a,0x06,0x94,0xec,0x2d,0xce,0x60,0xf0,0x58,0x62,0x55,0xf9,0x4b,0x61,0xff,0xc9,0x75,0x90,0x38,0x13,0x72,0xb4,0xd4,0x84,0x93,0x0b,0xff,0xfd,0x4d,0xbf .byte 0xce,0x5c,0xac,0x31,0x78,0x1d,0x19,0x3e,0xf1,0xcc,0x28,0x14,0x40,0x19,0x0f,0x5f,0x77,0x13,0x11,0xa1,0x96,0x3a,0xe5,0xb6,0xec,0x4f,0x12,0x98,0x81,0x11,0x9e,0x8c,0xd5,0xa3,0xb6,0xa1,0x62,0x63,0x02,0x28,0xec,0x3c,0x4a,0x65,0x69,0xab,0xd6,0xc3,0xcf,0x73,0xa6,0xaa,0x9e,0xa1,0xb9,0x70,0x61,0xfe,0xd3,0x48,0x9f,0xe3,0xc2,0x8f .byte 0x76,0x91,0xc1,0x7c,0xef,0x2e,0x3a,0x35,0x35,0xe4,0x6a,0x4c,0x94,0x11,0x92,0x72,0xde,0x7c,0xaa,0x76,0xa4,0x59,0x31,0xd7,0x83,0x12,0x67,0x45,0x0a,0x78,0xe5,0x90,0x06,0x4e,0x73,0x04,0x57,0x53,0x9b,0xa2,0x01,0x7c,0x54,0xfb,0xfe,0xb7,0xd2,0x46,0x3a,0x7f,0xc7,0x38,0xb2,0x94,0xcb,0x37,0x3a,0xd8,0x29,0x3b,0x02,0xfa,0x29,0xd7 .byte 0x68,0xed,0x3a,0x8e,0x6e,0x28,0x6d,0x93,0x2d,0x72,0xd2,0xb0,0xf9,0x8c,0x55,0xf6,0x2e,0x87,0x2c,0xce,0x7d,0x8f,0xe5,0x45,0xf5,0x88,0x03,0x19,0xc4,0x1c,0x93,0x0a,0x92,0x60,0x02,0xf8,0x1b,0xc5,0xba,0xf3,0x01,0x55,0xfd,0xd3,0xc1,0xe0,0xb7,0x23,0x7e,0x06,0xb5,0xe2,0x2c,0xbb,0x09,0xba,0xc3,0x03,0xf9,0xa1,0xd1,0x84,0xfe,0xd0 .byte 0xf6,0xac,0x99,0xff,0x08,0xe7,0x49,0x35,0x3a,0x06,0x33,0x15,0x2f,0xf6,0x4a,0xce,0xfe,0x4c,0xc4,0x8f,0x76,0xbf,0x86,0x49,0x3e,0xb0,0x93,0xa7,0x25,0xa3,0xc8,0x7b,0xfb,0x55,0x12,0x0c,0x36,0x93,0x3b,0x3d,0x04,0xd2,0xc3,0x85,0xb8,0xa5,0xa3,0x62,0x1e,0x74,0x1a,0xcb,0x81,0x89,0x38,0x59,0x06,0x8f,0x4a,0x71,0xd0,0x80,0xda,0x02 .byte 0xaa,0xdb,0x88,0xc8,0xf3,0x33,0x52,0x30,0x29,0x15,0xd9,0xfb,0x19,0x9e,0x4e,0xcd,0x9c,0x7c,0x43,0x42,0xe1,0x24,0x37,0x55,0x75,0x5a,0x0a,0x64,0xf8,0x8b,0x9f,0x45,0x89,0x61,0x0a,0xc1,0xc8,0x3a,0x92,0x59,0x2c,0x9e,0xdc,0x69,0xe1,0xad,0xe0,0x67,0xd5,0x64,0x82,0x8c,0x76,0xf4,0x9c,0x57,0x06,0xe4,0xa9,0x05,0xb2,0xab,0x6d,0x20 .byte 0x35,0x3d,0x85,0xf2,0x83,0xb6,0xc7,0xa8,0xb6,0xc2,0xc1,0x04,0xe9,0x56,0xde,0xb8,0x29,0xf9,0x4e,0x1f,0x7e,0xbe,0xbb,0xa2,0x07,0x7a,0xdd,0xfc,0xe5,0xf9,0x4a,0xfc,0x85,0x4b,0x94,0x84,0x22,0x1f,0x18,0xbc,0x61,0xb3,0x2d,0x4f,0xd8,0x64,0x9c,0x6e,0x07,0x35,0x0a,0x90,0xf8,0x54,0xf1,0x51,0x5f,0xa1,0xc0,0x0c,0x2b,0xfb,0x27,0x07 .byte 0x9a,0x85,0x29,0x3e,0x9a,0x1c,0x6b,0xbb,0xd9,0x13,0x70,0x27,0x92,0xb4,0x17,0xba,0x27,0x7e,0x2a,0xfe,0xaf,0x4b,0x47,0x5f,0x78,0x03,0xe4,0xba,0x6f,0xb4,0xaf,0xe2,0x3a,0xc8,0xc8,0xd0,0x5c,0x5b,0x6e,0x1a,0xf1,0x55,0xb8,0x7a,0x82,0xf5,0x38,0x3f,0xda,0x29,0xa2,0xce,0xf0,0xe8,0x1f,0x61,0xf1,0x3a,0x1a,0x3c,0x2f,0x2f,0xeb,0xe3 .byte 0x04,0x2e,0x88,0x4d,0x57,0x58,0xeb,0xa9,0xd2,0xb0,0x2c,0x99,0xfe,0x13,0xc0,0x0b,0x89,0xbb,0xaa,0x6d,0x45,0x76,0xf2,0xe3,0xea,0x9e,0x3d,0xed,0x4d,0x8e,0x99,0x41,0x55,0xc1,0xae,0xbb,0xd9,0x55,0xe8,0x64,0x5d,0x2e,0x53,0xd1,0x86,0x4c,0x67,0x4d,0xbc,0xa1,0xb5,0xaf,0x17,0xb7,0x4b,0x3a,0x26,0xb2,0xec,0x7b,0x6d,0x5b,0x64,0xb7 .byte 0xaa,0xf2,0x93,0xfb,0x87,0x6c,0x4b,0x37,0x45,0x68,0x9e,0xc9,0x99,0xa1,0x73,0x6a,0xa9,0x3d,0xa4,0xb0,0x89,0x98,0x61,0xbf,0x0b,0xa0,0x23,0xdb,0xed,0x12,0xe2,0x38,0x83,0x52,0xa4,0x3f,0xc0,0x23,0xe7,0xf3,0x9f,0xf6,0x81,0x2e,0x41,0x54,0xec,0x77,0xcc,0x36,0xb0,0x35,0x3a,0x2f,0x74,0x42,0x93,0x08,0xa6,0x3a,0xaa,0x76,0x7a,0x4f .byte 0xe5,0x12,0x8f,0x8e,0xb5,0x93,0x56,0x7e,0xd1,0x8d,0x68,0x13,0x50,0x63,0xd6,0x43,0xb0,0xc0,0xd1,0x0d,0x64,0xbd,0x69,0x99,0x9c,0xf7,0x4e,0x83,0xff,0x9b,0x3c,0x88,0x65,0x0a,0x55,0xa7,0xf9,0x39,0xbb,0x6a,0x10,0xa2,0x9e,0x13,0xc8,0x5b,0xd5,0x4e,0xc2,0x27,0x7c,0xba,0xd2,0x99,0xde,0xaa,0x6f,0xc5,0xda,0x4b,0x6c,0x53,0x1d,0xe8 .byte 0xa9,0xa4,0xd6,0xad,0x94,0x9f,0x3b,0x0a,0x21,0xe0,0xf3,0xc2,0x96,0x63,0x4a,0x37,0x17,0x24,0x31,0x01,0x59,0x90,0xce,0x5e,0xed,0x06,0x22,0x80,0x67,0x73,0xcd,0xd4,0xcc,0x85,0x20,0x95,0x97,0xfe,0x99,0xd4,0x93,0x17,0x3d,0x15,0x15,0x4e,0x89,0x7c,0x6a,0x7b,0x2b,0xc4,0x8e,0x34,0xaa,0xf8,0x27,0xf6,0x0b,0xd5,0x64,0x21,0x96,0x37 .byte 0x04,0xd9,0x01,0x13,0x6d,0xd6,0x2d,0x5b,0xef,0xc1,0xac,0x5f,0x96,0xdb,0x14,0x0f,0x1e,0xc7,0x2a,0x96,0x32,0x07,0xd3,0x98,0x5a,0xab,0x75,0xda,0x4f,0x13,0xf0,0x7f,0xf5,0x4e,0xe1,0x6c,0x1f,0x0e,0xe8,0x5b,0x04,0x64,0x50,0x1f,0x18,0xf9,0x72,0x25,0x5e,0x95,0xa5,0x22,0x13,0xd6,0x21,0xeb,0xbe,0xfa,0x5c,0xb3,0x2a,0x0d,0x54,0xa2 .byte 0x0b,0x99,0xb5,0xa4,0xf4,0x5d,0x57,0x71,0x35,0x03,0xf5,0x1d,0x64,0x12,0xe4,0xba,0x2a,0x1d,0xd7,0x10,0xf1,0x5e,0xb5,0xc4,0x48,0x66,0x23,0xc4,0xcc,0x29,0x7f,0x18,0x70,0x8b,0xaa,0xb2,0xf0,0xe0,0x2b,0x8c,0xd1,0x07,0x49,0x1f,0x6e,0xd0,0x97,0xcb,0xe1,0x0e,0x3f,0x87,0xad,0x11,0xbe,0x09,0x14,0x47,0x3a,0xbe,0x5e,0xe5,0xcd,0x9c .byte 0x7e,0xa7,0xd7,0x2d,0xf9,0xf1,0xd1,0xa1,0xde,0x3b,0xf4,0xa6,0x9f,0x90,0xe5,0x61,0x65,0x9f,0xa1,0x1c,0x89,0xbe,0xae,0xd9,0x03,0xc4,0x96,0x15,0x43,0x80,0xbb,0x9a,0xaa,0x57,0x34,0xa9,0x66,0x1f,0xef,0xc7,0x70,0xe1,0xd4,0x35,0x71,0xaf,0x8c,0x23,0x01,0xf5,0x7e,0x63,0x84,0x8f,0xc0,0x8b,0x28,0xf7,0xbc,0x2f,0x07,0x65,0x80,0x4c .byte 0x84,0xbc,0x4c,0x95,0x5f,0xf9,0x08,0xc3,0x03,0xf3,0x31,0x35,0x4a,0x66,0xea,0x49,0x95,0xe4,0xce,0xcc,0x9c,0x9e,0x3f,0xf6,0x24,0x23,0xa5,0xf7,0xb0,0x4a,0x20,0x81,0xe5,0xc4,0xf0,0xe8,0xae,0xea,0xbf,0xcc,0x50,0xa2,0x9b,0xfe,0x97,0xfe,0x6b,0x1b,0xe0,0x56,0x90,0x0b,0x0e,0x47,0x6b,0x92,0x2e,0x49,0xed,0x99,0x1b,0x3d,0x42,0x3d .byte 0x3e,0xf6,0x7d,0x6d,0x6c,0xc4,0xc6,0xae,0xa6,0x98,0xfd,0xeb,0xa5,0x57,0x05,0x00,0x44,0xbb,0xf3,0xa3,0x00,0x29,0x3d,0xcd,0x45,0xc1,0xa8,0x7d,0x34,0xaf,0x8b,0x53,0x49,0x5f,0x42,0x6e,0xcd,0x51,0x67,0x3d,0x75,0x82,0x17,0x65,0x1d,0x13,0xef,0x2d,0xc3,0xf2,0x87,0xbf,0x95,0x43,0x05,0xfb,0x3c,0x35,0xd7,0xbb,0x35,0x7f,0xbe,0x13 .byte 0x10,0x06,0xdd,0x17,0xe7,0x39,0xa1,0x8f,0x8f,0xf2,0xba,0xe2,0x27,0x83,0x6e,0x86,0x01,0x8c,0x04,0xa3,0xc8,0x6e,0xf9,0x51,0x3f,0xf2,0x36,0xe6,0x0a,0x48,0xf3,0x72,0x56,0xb7,0xd7,0x8f,0x43,0x17,0x60,0x9b,0xaf,0xcf,0x74,0x43,0xc9,0x27,0x40,0x10,0x28,0x13,0x04,0x6a,0xb3,0xa4,0xf8,0x41,0xfe,0xd5,0xd2,0xcd,0xe7,0x12,0x1d,0x82 .byte 0x91,0x6d,0x3e,0xce,0x30,0x74,0x39,0x2b,0xbb,0xed,0x46,0x3d,0x0b,0x98,0x6f,0x76,0x20,0x01,0xc0,0x50,0x25,0xa2,0x02,0x7b,0xbc,0x31,0x2b,0x2b,0xb5,0xd4,0xad,0x38,0xe2,0x20,0xdb,0x4d,0x8e,0x1e,0x21,0x3d,0x80,0x1b,0x77,0xc0,0x7d,0xfd,0x88,0xac,0x85,0xed,0xc9,0xfd,0xf0,0xa2,0x60,0xcd,0xc6,0x35,0x88,0x5d,0x22,0xfa,0x7f,0x0c .byte 0xad,0x67,0xee,0xdf,0xd8,0xce,0x10,0x1e,0xb3,0x6f,0xe7,0xe0,0x5c,0x56,0xae,0x08,0xd1,0x65,0x68,0xc1,0xfd,0x17,0xaf,0xc0,0x89,0x77,0xb1,0x12,0x78,0x4e,0xb3,0x39,0x4a,0x95,0x74,0xcb,0x72,0xd9,0xee,0x0b,0x30,0x8f,0x02,0xb4,0x7f,0x15,0x9a,0x13,0x3f,0x02,0x1c,0xb0,0x80,0xaa,0xb0,0xa1,0x14,0x1a,0x93,0x69,0xde,0x83,0x89,0xa1 .byte 0x83,0x48,0x27,0x5a,0x22,0xb8,0xd1,0xf6,0x25,0x81,0xb0,0xe9,0xb6,0x3f,0x17,0xa1,0xe1,0x37,0x46,0x6b,0xa5,0x5f,0x85,0xcc,0x39,0x19,0x45,0xe1,0x95,0x21,0xe9,0x5b,0x09,0xa6,0x9a,0xe0,0x11,0xed,0x10,0x20,0x40,0xb3,0xfd,0xd0,0x48,0x3a,0x9f,0x85,0x92,0x37,0x12,0xa8,0x44,0xa7,0x22,0x45,0x1c,0x57,0xe4,0x36,0x79,0xe0,0x08,0xd8 .byte 0x40,0xa2,0x66,0x7b,0x2d,0xe7,0xb1,0x56,0x62,0xd6,0xaa,0x33,0xdd,0xbd,0x74,0x3f,0x26,0x04,0x0d,0xc1,0x45,0xf4,0xaa,0x70,0xbb,0x8a,0x24,0x4a,0x60,0x01,0x5b,0xc2,0x79,0xb1,0x0e,0x24,0x46,0x4b,0x15,0x02,0xda,0x9a,0x24,0x0e,0x1d,0xa1,0xb4,0xa3,0xc1,0x31,0xfb,0x3d,0x7b,0x69,0xd2,0x22,0x52,0x37,0x9f,0xc0,0xb8,0xd4,0x36,0x01 .byte 0xe7,0xe2,0x99,0x93,0xec,0x96,0x0d,0x8c,0xbe,0xa9,0x92,0xa0,0x25,0xe3,0x66,0x26,0x2e,0xae,0x44,0xbf,0x9e,0xa0,0x20,0x97,0x41,0x2f,0x19,0x80,0xbc,0x78,0x19,0x8e,0x08,0xea,0x55,0x7f,0x88,0x74,0x4a,0x78,0xfb,0x6b,0x33,0x51,0x54,0xb4,0xa3,0x82,0x3b,0xa6,0xa7,0x5a,0x6d,0x01,0xa7,0x59,0x2f,0xf1,0xba,0x35,0x8e,0xbd,0xe4,0xb4 .byte 0xc3,0x37,0xc7,0x1c,0xcf,0x5b,0x26,0x02,0x2d,0x64,0xe5,0xb4,0x61,0xea,0x56,0xcf,0x6a,0x53,0x7a,0x1b,0x8c,0xc7,0x4f,0x32,0x6d,0x57,0xd9,0xde,0xf1,0xd3,0x8f,0x95,0x52,0xc6,0xab,0x43,0xc3,0x57,0x3e,0x04,0xb3,0xf9,0x0c,0x66,0x82,0xf4,0x19,0xa5,0xd4,0xc5,0x3a,0xc1,0xe0,0x00,0x11,0x36,0x51,0x38,0x97,0x3a,0x62,0x10,0xd5,0x81 .byte 0xec,0x16,0x34,0xd5,0xff,0x8a,0x01,0xb1,0x25,0x44,0xf6,0xcb,0xda,0x2d,0xbd,0x42,0xb5,0xd1,0x8a,0xf4,0xab,0xe4,0xae,0x18,0x72,0x66,0x93,0xef,0xfa,0x8d,0xdb,0x43,0x46,0xb3,0x68,0xa0,0x15,0x93,0xce,0x33,0xa9,0x29,0x12,0xf0,0x69,0x74,0x34,0x6a,0xea,0xfc,0x05,0x35,0x7a,0x0e,0xfe,0x89,0x73,0xb8,0x47,0x5b,0x6c,0x1b,0xd2,0x41 .byte 0xaf,0xca,0xcd,0x67,0x00,0x44,0xf6,0xc9,0xcf,0x80,0x73,0xda,0x90,0x41,0xd1,0x35,0x75,0x67,0xfe,0x30,0x61,0x8f,0xa7,0x88,0x7f,0x1b,0x39,0x3d,0x41,0x41,0x8d,0xf8,0x04,0x0b,0x8c,0x25,0x2b,0xb6,0xd5,0xe3,0xb9,0xeb,0xd9,0xb1,0x99,0x0c,0x45,0x12,0x9f,0x19,0xce,0xc3,0xd6,0x02,0x3e,0x4c,0xdf,0xf9,0x61,0x41,0x50,0x7b,0x38,0x7e .byte 0x40,0x43,0x90,0x2a,0xb0,0x2e,0x16,0x33,0x32,0xa2,0x34,0xb8,0xc5,0x76,0xdc,0xda,0x71,0x07,0x45,0x9b,0x1f,0x6b,0xd7,0x92,0x69,0x04,0x02,0xa2,0x50,0x55,0xd3,0x96,0x10,0xaa,0x22,0x1e,0xb7,0x6a,0x84,0x8b,0xc6,0x7a,0xdb,0xe5,0xc6,0x25,0x9a,0x7b,0xa4,0x3a,0x06,0xc9,0x2f,0x95,0xb2,0x9b,0xac,0xfc,0xbb,0xb2,0x9a,0x39,0x84,0x6d .byte 0xce,0x56,0x62,0x34,0x61,0x48,0x34,0x31,0x6b,0x29,0xaa,0x5c,0xdd,0x52,0xae,0x8e,0x9f,0x36,0x3b,0xec,0xd9,0xc2,0x3d,0x13,0x61,0xc7,0x74,0x58,0xf9,0x2b,0x87,0x05,0x07,0x3c,0xd7,0x37,0x7f,0x59,0x54,0x32,0x95,0x19,0xc8,0x38,0x69,0x6e,0xc9,0x88,0x77,0x65,0x20,0x2c,0xf4,0xaf,0x57,0xc1,0x7d,0xe2,0xb4,0xdc,0x4e,0x74,0x77,0x92 .byte 0x83,0xee,0x4a,0x7d,0x74,0x6f,0x19,0x74,0x8f,0xb5,0x76,0x5d,0x79,0x4a,0x16,0xb9,0xaf,0x2a,0x2d,0xd9,0xeb,0xd2,0xad,0x70,0x37,0x5d,0xff,0x96,0xfc,0xe2,0x9c,0xed,0x45,0x4f,0x56,0x59,0x9a,0xdb,0x81,0x3f,0x3f,0xc3,0x47,0x81,0x46,0x7d,0x14,0xdd,0x45,0xee,0x50,0x25,0xae,0xd4,0x61,0x8e,0x4d,0x58,0x35,0xf5,0x62,0xc0,0xa8,0x25 .byte 0xb1,0xf1,0xd4,0x86,0xd5,0x67,0x8d,0x50,0xfc,0xfb,0x8d,0x18,0x82,0xc9,0x34,0xbe,0xe0,0x0b,0x6a,0xcb,0x2f,0xf0,0xd1,0x32,0x40,0x35,0xf9,0x4c,0xa8,0xd2,0x92,0x53,0x90,0xc1,0x44,0xb4,0x59,0xb2,0x8c,0xc7,0xb9,0xb7,0x5d,0xf9,0xa0,0x9b,0x8c,0xcd,0x32,0x36,0x72,0xce,0xa8,0x49,0xbe,0xba,0x46,0x5e,0x43,0xa0,0xd5,0xf3,0x81,0xa5 .byte 0xbe,0xf4,0x37,0x22,0x27,0x5e,0x56,0x52,0x00,0x1b,0x79,0xf8,0x17,0xa5,0x61,0x92,0x7a,0xfb,0x0d,0xf9,0xaf,0x4a,0x9c,0x7c,0x09,0xda,0xab,0xda,0x8a,0xdb,0x6a,0x25,0xcc,0x60,0x79,0x48,0x11,0x3f,0xd9,0x0d,0x30,0x4b,0xaf,0xa3,0x48,0xb9,0x80,0x9b,0x43,0x94,0x1a,0x2d,0xdf,0x1d,0x74,0x1c,0x17,0x9f,0xbb,0x52,0xbc,0x9c,0x2f,0xaa .byte 0x7a,0x0a,0x8d,0xc9,0x2c,0xbb,0x33,0xf0,0xc2,0x25,0x34,0x9d,0x1a,0x5c,0x11,0x38,0x95,0xeb,0x65,0xce,0x85,0xe6,0xa8,0xd1,0x20,0x7c,0x8f,0xd3,0xb6,0x42,0xb9,0x97,0x4f,0x94,0xc6,0xfe,0xcc,0x8b,0x90,0x9a,0x18,0x46,0xdb,0xdc,0x2e,0x45,0xd5,0xe4,0x11,0xb6,0xb0,0x9b,0xf6,0x0b,0x53,0x0e,0x44,0xf5,0x33,0x9a,0xdc,0xd3,0x36,0x52 .byte 0x3f,0xe3,0x3e,0x3a,0xfc,0x6b,0xaf,0x31,0xf8,0x21,0x19,0x54,0x68,0x5e,0x37,0x95,0x9f,0xba,0x83,0x8c,0x53,0xa3,0xda,0x26,0x48,0x2a,0x4a,0xe0,0x73,0x82,0x51,0x68,0x1c,0x60,0x5e,0x3d,0x95,0x61,0x2b,0xb7,0x94,0x7a,0x94,0x03,0x50,0x4e,0xa2,0x3e,0xa7,0xc8,0x29,0x79,0x3a,0x12,0x82,0x71,0x7e,0x3c,0x35,0xed,0x24,0x9f,0x90,0xb1 .byte 0x04,0xec,0x83,0xeb,0x4f,0x91,0x54,0x44,0x7c,0xb2,0x14,0x44,0xde,0x73,0x69,0x84,0x4b,0x9c,0x12,0x13,0x27,0xe8,0x1a,0x6b,0x39,0xce,0xad,0x56,0x17,0x99,0x1a,0x6c,0x54,0x21,0xe2,0x6f,0x0d,0xe6,0x2a,0xff,0x7d,0x22,0xfa,0xdf,0xa6,0x32,0xf0,0xfd,0xa7,0xa4,0xe9,0xaa,0x33,0x8e,0xd6,0x36,0x7f,0xfd,0xf8,0x13,0x7e,0xb5,0x16,0xdb .byte 0xea,0x61,0xf3,0x18,0x36,0xfd,0xf3,0xa4,0x11,0x5d,0x93,0x86,0xfb,0xaa,0x86,0xd5,0xd6,0x24,0xfb,0x00,0x8a,0x8a,0x78,0x28,0xdf,0x8e,0x2a,0x51,0x65,0xd3,0xb2,0x6f,0x02,0xb8,0xa4,0x03,0x42,0xf5,0xf9,0x61,0x00,0x17,0x34,0x32,0x83,0x20,0x0c,0xee,0x2a,0xe7,0x04,0x65,0x52,0xe0,0x0c,0xaf,0x77,0xa7,0x72,0x44,0xa8,0xb1,0x85,0x73 .byte 0x9f,0x8b,0x99,0x10,0xf9,0x5b,0x68,0xfc,0xe6,0xae,0xdb,0x65,0x99,0x09,0x01,0x4a,0x80,0xd6,0xe2,0xd6,0x86,0xb1,0xf0,0x5f,0xb3,0x12,0xf4,0xdd,0x53,0x0d,0x9c,0x61,0x6d,0x8a,0x68,0xca,0x36,0x65,0xf0,0x7d,0x71,0xa3,0x62,0xd6,0x15,0x73,0x5b,0x8b,0x84,0x29,0x1f,0xde,0x24,0x22,0x4f,0xe3,0xd3,0xee,0x68,0xb4,0xf0,0x0c,0xa8,0x33 .byte 0xde,0x82,0x74,0x9b,0x65,0x7d,0x96,0xce,0x52,0x2f,0x41,0xe2,0xa9,0x2a,0x62,0xd1,0x2a,0xf4,0x52,0xa0,0xbc,0x0d,0x88,0xd4,0xbe,0x0d,0x7b,0x2d,0xf0,0x3c,0xc9,0x76,0x69,0x44,0x88,0x4f,0x75,0x73,0x77,0xd8,0xec,0x7d,0x01,0x95,0xab,0x2f,0x29,0x99,0xb8,0xdb,0xa3,0xf0,0xea,0x57,0x2b,0x91,0xf9,0x6c,0x4d,0x59,0xae,0x09,0x52,0x08 .byte 0x89,0xa2,0x32,0x2b,0x7e,0xca,0xae,0x30,0x8e,0xa5,0x66,0x88,0x79,0x9e,0xb3,0xd4,0xe2,0xe2,0x0e,0x5d,0xf6,0x17,0x66,0x77,0x09,0x84,0xf3,0x00,0x59,0xfb,0xfc,0x5c,0xb0,0x0f,0x2f,0xa7,0x5a,0xbd,0xf7,0x7e,0x74,0xd1,0x86,0x9d,0x9c,0x7f,0x00,0x16,0xa1,0x2b,0x90,0xe7,0x3e,0x94,0xab,0x7e,0xf5,0x18,0x1c,0x77,0x8e,0xf8,0x4d,0x43 .byte 0x6b,0xfd,0xa8,0x26,0xbb,0xb2,0x05,0x01,0xa2,0x95,0xcc,0x9a,0x54,0xad,0x5e,0xa2,0xc2,0xa8,0x82,0x5b,0x43,0xef,0xbf,0x87,0x61,0xcb,0x21,0x12,0x56,0xef,0x55,0x09,0xeb,0x22,0x49,0xf8,0x13,0x8d,0x1a,0x84,0x0c,0xf6,0xeb,0xbc,0xf3,0x09,0x5c,0xe7,0x61,0xcf,0xb4,0x84,0x8d,0x95,0x6f,0xa8,0x10,0xc7,0x99,0xd5,0x21,0x59,0x7e,0xe9 .byte 0xd2,0x05,0xf6,0xab,0x40,0xe5,0x5b,0xb1,0xe1,0x64,0xdb,0x38,0x1e,0x9e,0xe2,0x0c,0xd7,0xe5,0xa2,0xe4,0x51,0x4b,0xff,0x8b,0x10,0x79,0x21,0xaf,0xa9,0xdd,0x40,0x43,0x56,0x57,0x01,0xa3,0xe0,0x40,0x94,0xe5,0x85,0x6c,0xa5,0x93,0x0f,0x28,0x97,0xaa,0x82,0x3c,0x01,0x77,0x1e,0x18,0x6c,0xdd,0xff,0x32,0x23,0x7b,0x0b,0x9c,0x95,0x66 .byte 0x62,0xb8,0xa0,0x94,0xcb,0x0e,0xdc,0xed,0xb1,0x44,0x1f,0xa8,0xcd,0x1f,0xf7,0xb7,0x41,0x7b,0x0c,0x96,0x08,0x75,0x98,0xd2,0x6e,0xb4,0x8a,0x24,0xf1,0x21,0x18,0x0c,0x2b,0x9f,0xef,0xd9,0x7b,0x3a,0x46,0x05,0xac,0xe4,0x5f,0xad,0x1d,0x2d,0xd0,0x34,0x83,0xfb,0x2c,0xd9,0xaa,0x59,0x86,0x6d,0x06,0x07,0x2e,0x2d,0x61,0x78,0x85,0xba .byte 0x7d,0x50,0xde,0x4f,0x55,0x83,0x4d,0xdf,0xfb,0x56,0x81,0xa7,0xf1,0x63,0x97,0xd0,0xf2,0x69,0x7d,0x14,0xf3,0x7b,0xc2,0xf5,0xcf,0x44,0x39,0x9e,0x3b,0x1c,0x65,0x09,0xfb,0xdb,0xa6,0xb8,0xe4,0x20,0xc5,0x21,0xc8,0xe7,0x51,0xe8,0xf9,0xd7,0x29,0xf8,0xee,0xfd,0xbd,0xff,0x15,0x91,0x7c,0x92,0xcd,0x89,0xe9,0x9e,0xde,0x24,0xdc,0x67 .byte 0xcf,0x51,0x94,0xff,0xb0,0x21,0x30,0x8c,0xea,0x38,0x08,0xf8,0x02,0x31,0x5d,0x57,0x99,0x15,0x2f,0xf2,0xd5,0x7e,0xe5,0x87,0x5a,0xfa,0xee,0xa2,0x34,0x2e,0x24,0xcd,0x53,0xe7,0x89,0x51,0x9b,0x1c,0x88,0xd6,0x3c,0x12,0xe4,0xe0,0xf7,0xb6,0x39,0x3b,0x26,0x9a,0x0d,0xb7,0xfc,0x5e,0x74,0x58,0x74,0x78,0x3d,0x3b,0xc8,0xc0,0xb0,0xfe .byte 0x82,0x15,0x1e,0x38,0x75,0x1d,0x85,0xd7,0x07,0xc2,0xc4,0x79,0x73,0xef,0x67,0xf0,0x56,0xf3,0x2f,0xce,0x8c,0x58,0x98,0x64,0x2b,0x7b,0x41,0xfa,0x32,0xba,0x6e,0x1c,0xa5,0xf4,0xc0,0x66,0x26,0x85,0x6d,0x65,0x7e,0x83,0x17,0xc4,0x8a,0x82,0xe2,0xc9,0x1d,0x5e,0x06,0xc7,0xbe,0xe5,0x49,0x66,0x9d,0x7f,0x75,0xa3,0x5d,0x02,0xb7,0x23 .byte 0xc9,0x94,0x81,0xb5,0xe6,0x0c,0xf0,0x5e,0x70,0xbb,0x69,0xf2,0xd9,0xc5,0x96,0xe2,0x35,0x6b,0xf1,0xd4,0x42,0xfb,0x0f,0xc0,0x35,0x93,0xb1,0x73,0x3d,0xeb,0xdd,0x85,0x03,0xd5,0x8d,0x41,0x35,0x6f,0xf5,0x0f,0x7b,0xe0,0x03,0xc8,0x6d,0xae,0x1f,0x5d,0x58,0xf1,0xf1,0xc8,0x97,0x3a,0x1a,0x4a,0x0e,0x23,0xa3,0x72,0x3a,0xdd,0xf3,0x9d .byte 0xd3,0x1b,0xcd,0x5f,0xb8,0x49,0x07,0x2d,0x49,0xc1,0xbb,0x40,0x32,0x86,0x00,0xe8,0x95,0xa0,0x34,0x25,0x1f,0xac,0x30,0x4e,0x41,0xde,0x6d,0x94,0xb6,0xb0,0xf9,0x9f,0x3a,0x12,0xf9,0x80,0xc4,0xf7,0x57,0x3d,0x53,0x38,0x0c,0x7f,0x80,0xfb,0xdd,0x5b,0x7c,0xe4,0x6f,0x47,0x30,0x16,0x56,0x37,0x01,0x49,0x9c,0xd9,0x89,0x34,0xa1,0x29 .byte 0x20,0x57,0xb5,0x7c,0xbd,0xcc,0x90,0xec,0xb2,0xcc,0x39,0xad,0xc2,0xbe,0x06,0xd0,0x60,0x30,0xc0,0xe9,0x4c,0x7d,0x30,0x86,0x53,0x80,0x8b,0x35,0x70,0x2c,0x35,0x3d,0xb2,0x3a,0x9a,0xca,0x69,0x40,0x11,0x71,0x75,0x4b,0x68,0x5b,0x9c,0x03,0x48,0x4c,0x9c,0x68,0xce,0xe7,0x5a,0x65,0x98,0xed,0xa1,0xe5,0x20,0xe4,0x0f,0x54,0x0c,0x0e .byte 0x50,0x97,0xa3,0xf2,0x67,0x97,0xea,0x74,0x93,0x73,0x82,0x60,0xa4,0x29,0xb6,0xa3,0x9d,0xc1,0x2f,0x31,0x30,0xb9,0x1f,0xfd,0xc3,0x4f,0xbe,0xa1,0xb1,0xc4,0xbc,0x88,0x78,0x27,0x85,0xb1,0xa1,0x91,0x3e,0x61,0x3b,0xd5,0x0f,0x8d,0x28,0x80,0xf1,0x4b,0x8e,0xdf,0x34,0x22,0x45,0x6b,0x62,0xb8,0xac,0xd9,0xe3,0xff,0xce,0xfc,0x2e,0x34 .byte 0x81,0x70,0xc1,0xb8,0x51,0xa2,0xa2,0x1a,0x7a,0xbc,0xf0,0x56,0x12,0x7a,0xf4,0x3b,0x34,0xc7,0xcf,0x63,0x66,0xc9,0x36,0x77,0x52,0xfd,0xc5,0x87,0xa6,0x97,0x9a,0x39,0x7f,0x4c,0xdf,0x0d,0xfe,0x8f,0x57,0xbe,0x75,0x6b,0x79,0x86,0x57,0x40,0x88,0x7e,0x63,0xb6,0xe9,0x1a,0x07,0xa4,0xa0,0x15,0xee,0xb4,0xb6,0x18,0x23,0x7b,0x9f,0x2f .byte 0xba,0x2c,0x8c,0x7f,0x7b,0xbf,0xab,0x21,0x5b,0x45,0xc7,0x61,0xd2,0xa5,0x0b,0x13,0x1a,0x63,0x6a,0x69,0x4f,0x06,0x78,0x22,0xe6,0x98,0xbc,0xaa,0xd1,0x67,0xc5,0x2c,0x05,0x38,0x57,0xfb,0x28,0xfd,0x09,0x29,0x02,0x12,0x0c,0xab,0x2a,0xd8,0xf1,0x6c,0x9d,0xdf,0x9c,0x76,0x4b,0xf8,0x18,0x80,0xa3,0xfc,0xbb,0x82,0xe2,0xb5,0x1d,0xcf .byte 0x23,0xf9,0xe1,0x6d,0x97,0xe9,0x4d,0xfe,0xe7,0x8c,0x2f,0x05,0x1d,0x03,0xaf,0xcd,0x00,0x2c,0xe0,0xec,0x2a,0xa8,0x36,0x96,0xaf,0x5c,0xe3,0x70,0x37,0x2c,0xa5,0xf1,0x4e,0x3c,0x98,0x0f,0xcb,0xea,0x9b,0x2d,0xdd,0x56,0xfb,0x5f,0xa8,0xf5,0x92,0x4f,0x35,0x5b,0x1f,0x80,0xb5,0x86,0x05,0x90,0xac,0x53,0x5f,0xc4,0x67,0x41,0x9f,0x93 .byte 0x9d,0x9e,0xe4,0x12,0x7b,0xee,0x6d,0x77,0xe6,0x47,0xf8,0x31,0xcb,0x21,0xc1,0x2e,0xd7,0xdc,0x28,0x98,0x27,0x91,0xbe,0x91,0xfd,0x99,0xae,0x54,0x28,0xfc,0x84,0x13,0xe7,0x8a,0xf0,0xc9,0xd8,0xd6,0xa5,0xfa,0x57,0x7a,0x84,0xee,0xf1,0xb1,0x90,0x19,0xc5,0x43,0x6b,0x35,0x48,0xd9,0xfe,0x49,0xdf,0xf9,0xc8,0x27,0xfb,0xea,0x08,0x60 .byte 0xe2,0x38,0xca,0xc7,0x8e,0xc4,0x8c,0xc0,0x9c,0xf9,0x1e,0xa6,0xea,0xda,0x0f,0x61,0xdb,0x45,0x81,0xd1,0xed,0x07,0x61,0x2d,0x43,0x54,0x56,0xc4,0xbd,0x29,0x5a,0x8f,0x41,0xa3,0xc3,0x1b,0x7d,0x52,0xab,0x2b,0x5f,0xa3,0xff,0x9a,0xb0,0x9d,0xb2,0x18,0xdc,0x61,0xea,0x4c,0x25,0xd6,0xe5,0x2d,0xc7,0xbe,0x3c,0x0b,0x15,0xa9,0x46,0x07 .byte 0x36,0x92,0x9e,0x43,0x8f,0xf9,0x5e,0x35,0x5c,0x3f,0xfe,0xae,0x87,0x91,0xdb,0xa8,0x4a,0x05,0x2e,0x51,0xdf,0x36,0xf5,0x39,0x03,0x50,0x8a,0xc3,0xd3,0x1b,0xa4,0x1e,0xe1,0xfb,0xbc,0x53,0x3b,0xd3,0x6b,0x22,0x72,0xd0,0x5c,0x67,0x61,0xca,0x85,0x37,0x17,0xa5,0x8e,0x10,0xd1,0x58,0xb1,0x8b,0x17,0x43,0xb0,0xc6,0xc5,0xdc,0xde,0x45 .byte 0x1f,0x18,0x25,0x72,0x89,0x36,0x09,0xa5,0xd7,0x9e,0x8b,0x11,0xce,0xbf,0x31,0xee,0xee,0x6f,0x6d,0xf9,0x94,0x23,0x17,0x11,0xc5,0x53,0xb8,0xfc,0x8f,0xf4,0xdc,0x56,0x6c,0x7d,0x4d,0x42,0x32,0x30,0xb2,0xbb,0x8d,0x69,0xf8,0xb5,0x3b,0x77,0x38,0x04,0xcf,0x49,0x4f,0xec,0x40,0x61,0xbb,0x13,0x9c,0xc4,0xcc,0x7c,0xe8,0x90,0x27,0x91 .byte 0x9e,0x95,0xf8,0x87,0x63,0x94,0xa9,0xc5,0x78,0x78,0x38,0xa1,0xf7,0x21,0x7a,0xec,0x91,0xaf,0x2f,0x2f,0xa4,0x52,0x16,0x5f,0x7f,0x27,0xea,0xce,0xb4,0x1f,0x38,0xe4,0xd9,0xb1,0x24,0xce,0xe5,0xd2,0xd1,0x09,0x2f,0x04,0x65,0xf3,0x54,0x1c,0xac,0xad,0x3d,0x97,0x21,0x83,0x12,0x9c,0x08,0xb8,0x2b,0xd6,0x7e,0x91,0xc5,0xdf,0xa7,0x13 .byte 0x3f,0x4b,0x60,0x52,0xb8,0x1a,0x28,0x44,0x8d,0x8a,0x41,0x6f,0x02,0xf8,0x62,0x6a,0xe4,0xad,0xcc,0x81,0x48,0x44,0x9a,0xed,0x7a,0x87,0x60,0x3a,0x65,0x10,0x49,0x7b,0x90,0x60,0xd9,0xe7,0x67,0x8d,0xff,0xef,0xdf,0x7e,0x07,0x46,0x67,0xfc,0xcd,0xbc,0xae,0x3d,0x39,0xfb,0x5f,0xf9,0x36,0x7a,0xaa,0x80,0x48,0x9d,0x6d,0x98,0x82,0xf9 .byte 0x76,0x08,0xe6,0x5c,0x2f,0xde,0x9d,0xd2,0xb6,0x18,0x4f,0x1f,0x98,0x23,0x91,0x41,0x89,0xcd,0xfa,0x8d,0x5d,0x50,0xcb,0x6a,0x57,0xf0,0x34,0x57,0x68,0x00,0xca,0x4b,0xe4,0xc6,0x1a,0x82,0x6c,0x57,0xad,0xfb,0x37,0xc0,0x2e,0x39,0xd7,0x8e,0x6f,0x36,0x28,0x82,0x99,0x3f,0x9a,0xeb,0xdc,0x1f,0x63,0x34,0xb1,0x14,0xad,0x33,0xdd,0xfc .byte 0x92,0x4a,0x15,0xa8,0xb8,0x48,0x3f,0x11,0xef,0x58,0x17,0xa0,0xe6,0x7b,0x54,0x44,0xaa,0x7c,0x21,0x3e,0xfc,0x23,0x98,0xbb,0x18,0x28,0x37,0x00,0x31,0xb3,0xec,0x90,0x89,0x6f,0x5c,0xaa,0x3a,0x95,0x22,0x6c,0xb7,0x73,0x6d,0x2b,0x94,0xa5,0xda,0x37,0xb7,0x5f,0x0e,0x5a,0x51,0xee,0xec,0xde,0x80,0xeb,0xd7,0x84,0x4e,0x24,0xba,0x97 .byte 0xf0,0x8e,0x6e,0x0c,0x51,0x94,0xb4,0x9b,0x2d,0xa3,0x93,0xf1,0x73,0x96,0xd4,0xf0,0x6a,0x42,0x83,0xde,0x72,0xc9,0x12,0x42,0x2d,0xab,0x2f,0xf5,0x9c,0x21,0x6f,0x6a,0xc3,0xfd,0x01,0x18,0xba,0x3d,0xb0,0x9e,0x64,0x4b,0xab,0xfa,0x2d,0xff,0x13,0x0a,0xab,0xd4,0x4b,0xaf,0x06,0x38,0x8b,0x79,0xd3,0xa6,0x03,0x38,0xa6,0xe2,0x39,0xa9 .byte 0x0b,0xc1,0x83,0xd6,0x56,0x72,0xcd,0x10,0x35,0xbc,0xa3,0xe6,0x8c,0xf7,0x0e,0x70,0xbf,0xb8,0x4f,0xe2,0x37,0x88,0xf3,0x79,0x79,0x12,0xa5,0x4b,0x87,0x73,0x39,0x0b,0x25,0x4b,0x56,0x47,0x38,0x6d,0x03,0xa7,0xff,0x32,0x2a,0xd2,0x03,0x2c,0xe6,0xe0,0x73,0x1b,0x7c,0xeb,0x47,0xb5,0x4e,0x65,0x6c,0xd8,0x0f,0x08,0xbf,0x98,0xbf,0x5e .byte 0xae,0x69,0x0e,0x13,0xc6,0xfd,0x33,0x78,0x58,0xe9,0xe7,0x52,0x4c,0xb1,0x68,0x46,0x35,0x8c,0x1f,0x10,0xf5,0xeb,0x2f,0xaa,0xf3,0xdb,0x1a,0x2c,0x54,0xe1,0x3d,0x49,0x65,0x90,0x80,0xce,0x55,0x19,0xab,0xf9,0x05,0x3f,0xa8,0xf9,0x40,0x11,0x2a,0x84,0x82,0xbc,0x6f,0x95,0xad,0x66,0xff,0x6c,0xc8,0x84,0xb9,0xc7,0x74,0xa8,0xf3,0x5b .byte 0x48,0x8d,0x6a,0xef,0xec,0x58,0x5a,0x96,0x35,0xcd,0xc8,0xbf,0x6e,0xc3,0x23,0x81,0x0b,0x5d,0x80,0x98,0x4d,0xe7,0xf5,0xb5,0x4a,0x1e,0x0a,0xfd,0x04,0xc6,0x10,0x50,0x79,0x7a,0x34,0x72,0xfa,0xaf,0x2c,0xf2,0xfd,0xfb,0xc7,0xb1,0x46,0x8a,0x0f,0xc2,0xee,0xa9,0x54,0x83,0x5b,0x84,0x20,0x88,0x74,0x98,0xcc,0x8f,0x77,0x8a,0x1a,0xf4 .byte 0x07,0x5c,0xf2,0x1b,0x1f,0xdc,0x03,0x76,0x96,0xf7,0x98,0xc9,0xbd,0x54,0xb1,0x61,0x46,0xbb,0x07,0xab,0xce,0x83,0x90,0xd9,0x3d,0x53,0x9b,0x65,0xa2,0x89,0x29,0x7b,0x75,0x1c,0x46,0x41,0x46,0x3d,0x83,0x2f,0x1d,0x67,0x32,0x0a,0xc6,0x4a,0x6c,0x8d,0x47,0x2a,0xc7,0xb7,0xe6,0xef,0x27,0x7a,0xff,0x86,0x1f,0xcc,0x8f,0xbb,0x48,0xda .byte 0x70,0x49,0xbf,0xdd,0xf0,0x2c,0x30,0x9a,0x63,0xf8,0x1f,0xae,0xdd,0xb3,0x1f,0x50,0x75,0x15,0xf6,0x94,0x60,0x17,0xd4,0x99,0x82,0xef,0xb1,0x19,0xef,0x9a,0x3f,0x73,0x7e,0xb2,0x30,0x47,0x8e,0x3f,0xf3,0x78,0x53,0x72,0x2b,0xb5,0x34,0xcb,0xa4,0x8f,0xf0,0x1c,0x3f,0x3d,0xde,0x77,0x40,0x0b,0x14,0xb1,0x94,0x1e,0x72,0x94,0x24,0xdd .byte 0x3a,0x5b,0x02,0xb8,0x88,0x8f,0x28,0x29,0x3f,0x3b,0x8d,0xc2,0xff,0x0d,0x74,0x77,0x6f,0x70,0x0e,0x92,0x32,0x2c,0x62,0xe7,0x16,0xf3,0x0b,0xdd,0x58,0xd7,0x7b,0x10,0x1a,0x73,0x49,0x57,0x37,0xcc,0x69,0xd6,0xd2,0xda,0xc8,0x85,0xd8,0x64,0x62,0xae,0x21,0x11,0x75,0xb6,0x39,0xa4,0x18,0x02,0x46,0x48,0x10,0x46,0x5c,0x4a,0x86,0xd7 .byte 0x1d,0xbe,0x0e,0x4b,0x6d,0x4e,0xe2,0xbe,0x22,0xd7,0xd5,0x3d,0x1f,0x77,0x7d,0x30,0x13,0xac,0xf4,0x38,0x93,0x85,0x55,0x47,0xaf,0xa5,0x16,0x28,0xc4,0xd0,0xb9,0x04,0xa3,0x27,0xd0,0xdf,0x1d,0x77,0xdd,0xd5,0xf6,0x8f,0x35,0x56,0x47,0xc5,0xb6,0x21,0xf8,0xea,0x5e,0xe4,0xa4,0xbc,0x20,0xc3,0x73,0x30,0xc7,0x2f,0x92,0x89,0x65,0x8b .byte 0x6b,0x12,0xa6,0xc7,0x14,0xa8,0xd8,0xfb,0x99,0xe0,0x1d,0x95,0x90,0xd2,0x66,0xc3,0xf4,0x9b,0x03,0x59,0x2f,0x96,0xbc,0xdc,0x17,0x82,0x56,0x4e,0xf6,0xe9,0x0a,0xe1,0x25,0xb3,0xa5,0x13,0x70,0xd7,0xc8,0xd3,0x12,0x67,0xa9,0xdc,0xde,0x1c,0x3e,0x18,0x26,0x70,0x24,0xf4,0x17,0xf6,0xed,0xa0,0xb3,0xa1,0x38,0x6f,0x95,0x34,0x79,0x43 .byte 0x7e,0xc5,0x9e,0xb7,0x48,0x13,0x5c,0x8b,0x66,0x8e,0xad,0x69,0x02,0x00,0x3c,0xb6,0x76,0x37,0x0c,0x72,0x5a,0xe9,0xc3,0x94,0xc6,0xb5,0x1a,0x51,0x9f,0xb0,0xda,0x0c,0x57,0x5d,0x8d,0x99,0x1d,0xb3,0x12,0xd8,0x87,0x2f,0xbc,0x97,0xb5,0x76,0x30,0x11,0x29,0x59,0xa3,0x61,0xf7,0x61,0xcd,0x9a,0xc4,0xb6,0x2a,0x34,0x0f,0xc8,0x6a,0x08 .byte 0x52,0x14,0x63,0xcf,0x54,0xdb,0xb9,0x7c,0xf2,0x8b,0xa8,0x04,0xef,0x7d,0x9a,0x4d,0x00,0x2e,0x17,0xa4,0x2d,0x83,0x33,0x00,0xa4,0x58,0xda,0x5b,0x95,0x22,0x32,0x69,0xc9,0x6c,0x44,0x19,0x92,0x4b,0xa4,0x24,0xfe,0xc2,0x46,0x88,0x3e,0x8d,0x54,0x88,0x11,0xeb,0x36,0x32,0x03,0x87,0x55,0x8b,0x95,0x35,0x9c,0x04,0xd2,0x07,0x35,0xe0 .byte 0x7a,0x70,0x6c,0x18,0x56,0xaa,0x85,0xf1,0xa2,0x13,0xfb,0xef,0x12,0x0f,0xb9,0x42,0x7f,0xd5,0xa1,0xd0,0xdd,0x29,0x62,0x08,0xe1,0x4c,0x20,0xb6,0xee,0x44,0x45,0x61,0x0b,0xeb,0x40,0x6e,0xef,0xea,0x60,0xfc,0x55,0xa0,0x74,0x45,0x27,0x51,0x90,0x0d,0x1d,0xbc,0x62,0xfb,0xed,0xca,0x7f,0x88,0x85,0x8a,0xfa,0x5c,0x89,0xf6,0x79,0x5b .byte 0xe3,0x3c,0xfd,0x19,0xa9,0xba,0x33,0xc4,0x7a,0x89,0x5b,0x11,0xe2,0xda,0x92,0xd1,0x3d,0x3e,0x9c,0x66,0xa5,0x1d,0xcb,0x9b,0x0a,0x46,0x84,0x93,0x3f,0xc4,0xbf,0x52,0x06,0x49,0xe2,0x46,0x0e,0x2b,0x39,0x67,0x1c,0x8f,0x4f,0xf3,0x53,0xce,0x2a,0x33,0x74,0xc4,0xe9,0x44,0x99,0x01,0xf0,0x55,0xcc,0x0a,0xed,0xa9,0xce,0x76,0x52,0x4d .byte 0x85,0x52,0x26,0x82,0x75,0x3d,0x47,0xfb,0xb1,0xc4,0xfd,0x07,0xa6,0x79,0xff,0x3f,0xda,0xc2,0xa9,0xab,0xc7,0x88,0xa2,0xa1,0x5d,0xf2,0x03,0xe3,0xdc,0xbf,0xa6,0x90,0xfd,0xe0,0x43,0x69,0x88,0x78,0x50,0x99,0xb0,0x7d,0x18,0xca,0x4d,0xb5,0x04,0x8e,0x1a,0xbb,0x22,0xe5,0xc4,0xc6,0x85,0xe3,0x62,0xa9,0xce,0x50,0x83,0x9b,0xa0,0xf0 .byte 0x1a,0x07,0x10,0x90,0x3a,0x31,0x74,0x11,0x69,0x23,0xd2,0x08,0xce,0xfe,0xb1,0x21,0x64,0x62,0x05,0x3b,0x4c,0x8d,0xe3,0x8b,0x42,0x27,0xbf,0x93,0x06,0xf1,0x99,0x00,0x20,0xdf,0xe3,0xd3,0x4b,0x8e,0xb2,0x12,0xb6,0x2c,0x63,0xd0,0x4e,0xd1,0x38,0x8c,0x49,0x69,0x60,0x83,0x02,0xbb,0x8c,0x96,0x0f,0xe9,0x24,0x46,0x85,0xc9,0xf9,0x3f .byte 0x58,0x1b,0x7e,0x72,0x26,0x81,0xb9,0xfb,0xe4,0x41,0xbf,0xd8,0x1b,0xd8,0x36,0x16,0x92,0xf4,0x78,0x0e,0xd4,0x95,0x92,0x20,0x33,0x83,0x65,0x21,0x97,0x92,0x19,0x0f,0x12,0x1c,0x4e,0xd5,0x3c,0xb9,0x54,0xd4,0x6a,0x4d,0x6d,0x89,0x7b,0xf0,0x07,0xf4,0x50,0xb2,0xa1,0xd8,0x4a,0x9e,0xf3,0x3a,0x99,0x65,0x67,0x61,0x09,0xc2,0xf5,0xd5 .byte 0x97,0x36,0xcb,0xe6,0x95,0xa0,0x19,0x2e,0xcf,0x4c,0xce,0xc9,0x4e,0x3b,0x55,0xd1,0xba,0x47,0x4f,0xb5,0xbd,0x29,0xa1,0x8c,0xcd,0xd8,0x9d,0xcf,0xf8,0x1c,0xa5,0x37,0x91,0x66,0x6d,0x3d,0xfc,0x03,0x8b,0x85,0xa9,0x51,0xaa,0x30,0xf7,0x0e,0x44,0x82,0x77,0x5f,0x84,0x60,0x6c,0xc2,0x95,0x4e,0xca,0x16,0x23,0xf2,0x66,0x97,0x45,0x05 .byte 0x90,0xdb,0xb8,0xbf,0x8e,0xaa,0xc8,0x41,0x1e,0x23,0xd0,0xbe,0xc7,0x6c,0x5f,0x39,0x18,0x61,0x1d,0xa2,0x15,0xe5,0x15,0x58,0xd0,0x36,0x99,0xe7,0xdc,0x90,0x5e,0x9a,0x67,0xee,0x92,0xb1,0x61,0xbd,0xe9,0x70,0x04,0x00,0x07,0xc9,0xab,0x74,0x1e,0x0f,0x84,0x45,0x1f,0x49,0xbb,0x49,0xec,0x03,0x00,0x47,0x38,0xfd,0x09,0xbe,0x23,0x3e .byte 0xa8,0x80,0x21,0xf9,0x92,0x5e,0xd6,0x51,0x91,0x7e,0x21,0x5d,0x1e,0xfc,0xbb,0x60,0x9a,0xf5,0x0a,0x3b,0x41,0x4a,0xfa,0xfa,0x26,0xb2,0x54,0x6a,0x61,0xe4,0x13,0x9e,0xc5,0x50,0x29,0xf1,0x29,0xa5,0x76,0xb7,0xce,0x2c,0xe6,0x98,0x88,0xb5,0x87,0xcf,0x49,0x6b,0xa4,0x54,0x94,0x34,0x73,0xec,0xde,0xe4,0x6c,0xe9,0x1e,0x07,0x60,0x8c .byte 0xb4,0x47,0x87,0x82,0xb0,0x51,0xbc,0xb6,0xeb,0x5c,0xbc,0x78,0x94,0x8f,0xe9,0xd9,0xd1,0xc4,0xfe,0x51,0x57,0xdd,0x7b,0x4a,0x9b,0xbf,0xfb,0xe4,0x04,0x49,0xc4,0x29,0x1e,0xc3,0xf6,0xd5,0xf9,0x42,0xed,0x5d,0x57,0x8f,0x5d,0x1e,0x29,0x69,0xb6,0xf9,0x11,0x36,0x65,0x53,0x07,0xaf,0x8d,0xd3,0xa3,0xb4,0x75,0xeb,0x7a,0xbb,0xc0,0x35 .byte 0xe5,0xfa,0x42,0xab,0xda,0xd8,0x83,0x65,0xc2,0x97,0x61,0x76,0xbb,0x96,0x8d,0x8f,0x8b,0xb0,0xa5,0x6f,0x3a,0x3c,0x19,0x84,0x7f,0x20,0x0e,0x97,0x2e,0xd9,0xee,0x2e,0xd6,0x29,0x01,0x94,0x67,0x0d,0x4d,0x43,0x24,0xe5,0xa6,0x92,0x77,0x85,0x49,0xdb,0xb9,0x62,0xb2,0xb8,0xd2,0x2f,0xc3,0x9a,0xe5,0xc0,0x23,0xac,0xd7,0x02,0xf9,0xf7 .byte 0x8b,0x64,0x19,0x44,0xfc,0x2d,0x57,0x3f,0x3e,0x32,0x0d,0xdf,0x2c,0xc9,0x38,0x47,0xa2,0x24,0xab,0x30,0x53,0x7b,0x51,0xf2,0xc4,0xf3,0x18,0x4d,0x4b,0x0e,0xf2,0x09,0x0b,0x0f,0xa3,0x01,0x0a,0x92,0x71,0x2a,0x37,0xca,0x03,0x2e,0x17,0x17,0x64,0x40,0xdf,0x5d,0xdb,0xee,0x71,0xae,0xb8,0xbe,0x3b,0x06,0x03,0x66,0xa7,0x93,0x42,0x1e .byte 0x15,0x1c,0x26,0x51,0x22,0x15,0x7f,0xab,0x2d,0x64,0xe6,0xde,0xb9,0x25,0x2b,0xa3,0xa7,0xbc,0x26,0xad,0x12,0x2c,0x36,0x12,0x7b,0x7d,0x5a,0x44,0x4e,0xe1,0x6b,0x26,0x8b,0x54,0xe8,0x8f,0x94,0x24,0x7e,0x3c,0xd9,0xe2,0x28,0x64,0x40,0xeb,0xaf,0xbf,0xe0,0xbc,0xd1,0xc2,0xfe,0xc3,0xc3,0x0f,0x0c,0x30,0x2d,0xf6,0xf2,0xc2,0x9a,0xe9 .byte 0xdc,0x2c,0x63,0x9d,0x1a,0xc2,0xfc,0x94,0xe7,0xfa,0x6e,0x9f,0x3c,0xd5,0x51,0x18,0x62,0x46,0xcc,0xab,0xbd,0x26,0xe6,0x85,0x9b,0x4d,0x5d,0xf5,0x16,0xe1,0x5e,0xf0,0x40,0x44,0x90,0xf6,0x98,0x06,0x68,0xdc,0x7c,0xcb,0x26,0x78,0xde,0xe9,0xbd,0xa1,0xfd,0xe9,0x43,0x8c,0xcf,0xe0,0x8b,0xf3,0xca,0x65,0x19,0xc1,0x93,0x18,0x13,0x5d .byte 0x0f,0xce,0x0b,0x2b,0x6f,0x68,0x38,0x82,0x79,0x68,0x82,0x0a,0x24,0x40,0x77,0xa5,0xcd,0x98,0x36,0xf5,0x0d,0x03,0xd1,0x0f,0xed,0xaa,0x24,0xe1,0xe2,0x8f,0x5a,0xf0,0x3c,0xce,0xbd,0x65,0x4e,0x40,0xd3,0xcc,0x89,0xd3,0xa8,0x5f,0xbf,0xcc,0x77,0x75,0x61,0x1e,0x78,0x70,0x3d,0x41,0xdf,0xb8,0x13,0x0d,0x58,0x37,0x94,0x67,0x89,0xc3 .byte 0x52,0x19,0xb5,0x59,0x83,0xb4,0xf5,0x54,0x57,0x93,0x9a,0xc6,0x40,0x8c,0x85,0x7f,0xd2,0x42,0x6a,0xaf,0xb2,0xae,0xcf,0x57,0x99,0xbf,0x4d,0xa4,0xb0,0x1f,0x50,0x58,0x3a,0xc0,0xf1,0xdc,0x91,0x8c,0x67,0xc3,0x2a,0xce,0x46,0x4c,0x66,0x39,0xa9,0xd0,0xa7,0x5e,0xd8,0x0d,0x08,0x0f,0x9f,0xb0,0xd2,0x38,0x22,0xb5,0xdb,0xba,0x0f,0xcd .byte 0x1a,0x62,0x73,0xc4,0xb6,0x6b,0xc5,0x0b,0x54,0xe6,0x83,0xae,0xb5,0x5e,0x73,0x1e,0xb2,0x4a,0xe5,0x2c,0xa6,0x6b,0x1b,0xe7,0x63,0xa3,0xa1,0xe9,0x7d,0xab,0xa9,0x87,0x6e,0xaa,0x43,0x55,0x6f,0x95,0xee,0x81,0xa0,0x45,0x1a,0x56,0xce,0x70,0xe6,0x1f,0x7f,0xd8,0x18,0x52,0x25,0x3b,0x58,0x65,0xbe,0xbf,0x90,0x35,0xee,0x76,0x8b,0x7c .byte 0x1f,0x2f,0x9e,0x35,0xcf,0xc7,0x29,0xea,0x62,0x66,0x0b,0xe1,0xd0,0xcc,0x29,0xc6,0x6e,0xd4,0xbd,0x46,0x4b,0x02,0x96,0xd3,0x30,0xc3,0x71,0x60,0x73,0x06,0x3a,0x25,0x71,0x9b,0x63,0x82,0x3f,0xac,0xd4,0xdb,0x69,0xbc,0x7c,0x39,0xb7,0x71,0x98,0xa1,0x68,0x7c,0x0c,0x13,0xf7,0xef,0x5b,0xba,0xd9,0x45,0x3a,0x5e,0xa2,0x65,0x1a,0xbf .byte 0x6e,0x5a,0xa3,0x2f,0x7c,0xf8,0xe4,0x43,0x3f,0xa3,0x53,0x26,0x05,0x2a,0x63,0x21,0x71,0x4f,0x40,0x9e,0xc9,0xd1,0xb1,0x9a,0x0b,0xf2,0x04,0xed,0xc8,0xb8,0x93,0x0f,0xa9,0xad,0x3f,0x30,0x39,0xc8,0x94,0xa3,0x9b,0x77,0x35,0x18,0xb3,0x82,0x1b,0xe5,0xab,0x86,0x9c,0x99,0xaf,0x52,0x6f,0x7a,0xf5,0x3b,0x8e,0x83,0x4a,0x8c,0xfc,0xa0 .byte 0x72,0x10,0x1d,0xb4,0xd3,0xdb,0x38,0x82,0x11,0x5f,0x22,0xc1,0x9d,0x63,0xf2,0x50,0xc9,0x6d,0x1f,0xc4,0x57,0x52,0x53,0x79,0xb2,0x24,0x7b,0x38,0x43,0x26,0xe0,0xdc,0xeb,0x6a,0x5b,0xd2,0xff,0xfc,0xb5,0xd9,0x69,0xf2,0x80,0xaf,0x71,0x33,0xdf,0x33,0x35,0xb0,0xef,0x5f,0xdc,0x37,0xb6,0x36,0xe9,0xae,0x03,0xbc,0x4d,0xa8,0x40,0xc1 .byte 0x7d,0x2c,0xf0,0xf4,0x3b,0x53,0x90,0xf7,0xcb,0xa1,0xd2,0x21,0x8f,0xff,0xfc,0x0c,0x61,0x85,0x53,0x04,0x30,0x0b,0x8c,0xf5,0x6b,0x60,0x73,0xff,0x88,0x29,0x5b,0xfc,0xeb,0xec,0x81,0x10,0xf0,0x56,0x00,0xd8,0x86,0xf0,0xbe,0xbd,0x50,0xf5,0xc9,0x27,0xa4,0x18,0x4c,0xd6,0x3a,0xe6,0x12,0x21,0x8c,0xe9,0x5e,0xba,0x30,0x03,0x4d,0x9e .byte 0x16,0x60,0x77,0x9c,0x3f,0xa6,0xd5,0x0c,0x82,0x39,0xaf,0xfa,0x7e,0xcf,0x50,0xcb,0x87,0xe2,0x35,0xaf,0x24,0x96,0x2c,0x02,0x70,0xb9,0x21,0x00,0x2f,0xdb,0x3f,0xfd,0xe8,0xa5,0x40,0x87,0xfe,0xfc,0x7b,0x05,0xcf,0xa8,0xae,0x0d,0x71,0x22,0xd1,0xdc,0x7e,0x4f,0x2d,0xd3,0x0f,0x5d,0x0f,0xff,0xdf,0x4f,0xea,0x88,0x4c,0xe7,0x84,0xb6 .byte 0x7d,0xb0,0x74,0x37,0xdb,0x75,0xfa,0x95,0xe7,0xee,0x58,0xb5,0xd4,0x1d,0xe7,0xcc,0x1f,0x3a,0xd0,0x59,0xb8,0x93,0xbf,0xe6,0x33,0x59,0x7b,0x96,0x80,0x77,0x06,0xf3,0xf7,0xab,0x91,0xcd,0x0a,0x4c,0x48,0xc0,0x35,0x07,0x3d,0x9a,0x32,0x90,0x50,0xde,0x22,0x1c,0x40,0x7b,0x19,0x7d,0x98,0x50,0x8a,0x0d,0x19,0xd1,0x97,0xcc,0x42,0xbf .byte 0xb3,0x81,0x09,0x4f,0x14,0x8d,0xb2,0xfd,0x7d,0xee,0x76,0x97,0xb9,0x99,0x2c,0xbd,0x94,0xd2,0x29,0x6d,0x3c,0x91,0x29,0x64,0x2f,0x6c,0xdb,0x4e,0x26,0x55,0xef,0x55,0x6b,0xb6,0x34,0xf4,0xeb,0x13,0x96,0x5f,0xac,0xcf,0x31,0x72,0x6b,0x9f,0x06,0xb0,0x80,0xc4,0x56,0x33,0x75,0x57,0xdd,0x8e,0x07,0x82,0xe5,0x13,0x20,0xef,0xee,0x4d .byte 0x8d,0x8b,0xc7,0x73,0x1d,0x7f,0x49,0xdf,0xa4,0x29,0xcf,0xe7,0x9f,0x40,0x8a,0x05,0xba,0x73,0x16,0xdc,0xe9,0x6f,0xdd,0xae,0x79,0xd9,0x44,0x59,0x26,0xd3,0x7c,0xa2,0xcd,0x57,0xc9,0x9d,0x90,0x38,0x73,0x65,0x82,0xc6,0x18,0x77,0xba,0xe2,0xbc,0xea,0x25,0x43,0xc5,0xf6,0xad,0x6c,0x95,0x4c,0x86,0x3f,0x50,0x56,0x28,0x79,0x3e,0x68 .byte 0xf9,0xc3,0xb8,0x52,0x65,0x35,0x6c,0xd8,0x8e,0x06,0xaa,0xec,0x80,0x46,0xdb,0xa8,0xcd,0xbc,0x5b,0xe2,0x30,0x3a,0x3b,0xcb,0x2a,0xec,0xbc,0xe7,0x09,0x84,0xf7,0x9f,0x31,0xbc,0xef,0xdc,0xa9,0xb8,0x87,0x9d,0x4f,0xe1,0xd2,0x1b,0x9f,0x3f,0xd8,0xdc,0x2c,0xc7,0x73,0x08,0x2c,0xaa,0xbe,0x06,0x78,0x8f,0xb1,0x64,0x1b,0x3d,0xb5,0xad .byte 0x62,0x60,0x7f,0xc4,0x64,0x43,0x18,0xd4,0x8d,0x27,0xb3,0x32,0xae,0x28,0x47,0xdd,0x5d,0xdf,0x08,0x0b,0x0e,0xfb,0xba,0x92,0x55,0x33,0x92,0x02,0xf6,0xc2,0x2e,0xd2,0x70,0xaa,0xfb,0x88,0x9c,0x5e,0x9b,0x26,0x32,0x98,0xf8,0xe6,0x98,0x5c,0xf9,0xd7,0x3f,0xb9,0x74,0x5b,0x10,0x51,0x01,0x6e,0x44,0x71,0x91,0x3e,0x2d,0x06,0x68,0x97 .byte 0xe8,0xe3,0xf5,0xdd,0x46,0xc1,0x10,0x61,0xa9,0xa9,0x96,0x27,0x2a,0x25,0x7b,0x16,0x4a,0xbc,0x61,0x4b,0x32,0x6c,0x44,0x94,0x10,0x04,0x8e,0x0f,0xe6,0x8e,0x15,0xbc,0xb6,0x1b,0x66,0x19,0xff,0x2e,0x70,0x80,0xb2,0x9a,0x51,0x82,0x1a,0xc9,0x98,0x6b,0x7e,0x4f,0x4c,0xf9,0x93,0x2a,0x8e,0xb4,0x44,0x3b,0x75,0xc9,0x28,0xd1,0x63,0xd9 .byte 0x13,0xc8,0x68,0x60,0xad,0x4a,0xbe,0x03,0x1f,0xe2,0xe3,0xe5,0x99,0x11,0x4f,0xc6,0xbe,0x32,0xfa,0xb8,0xde,0x69,0x28,0x4b,0x11,0x4e,0xdd,0x0e,0x45,0x6e,0x43,0xe1,0xe6,0x7c,0x8f,0x8c,0xee,0x57,0xef,0x29,0xb4,0xb9,0x3c,0x9e,0x3a,0xc7,0xe0,0x98,0xce,0x29,0x44,0x1c,0x72,0x68,0x33,0x04,0xd4,0x9a,0x42,0xe1,0x77,0xa0,0x5b,0x1f .byte 0x11,0x5d,0x82,0x8c,0xb6,0xb1,0x3b,0xce,0x4e,0xa9,0xaa,0x05,0xf2,0x67,0x6c,0x0c,0xa3,0x08,0x9a,0xe0,0x14,0x92,0x82,0x51,0x98,0x7f,0x01,0x0a,0x77,0x35,0xa9,0xc0,0xbe,0x0a,0xde,0x13,0xf0,0x89,0xc9,0x54,0x9c,0x1e,0xc7,0x57,0xad,0x6b,0x36,0x8e,0x91,0x95,0x70,0x78,0x43,0x64,0x0e,0x0b,0x5c,0x97,0xc7,0xc5,0xc0,0xb6,0x4e,0x80 .byte 0x6e,0x20,0xa6,0xe7,0xfb,0xd1,0xc1,0x57,0x86,0x81,0xd8,0x8f,0x59,0x8c,0xd4,0xa8,0x8b,0x8c,0x2b,0x50,0x6a,0x90,0xdf,0xef,0x14,0x53,0x18,0x2f,0xbc,0x39,0xf8,0x1f,0xa6,0xc3,0x23,0x0f,0x0f,0xcf,0x75,0x7a,0xad,0x12,0xfd,0x22,0x24,0x56,0x51,0xb5,0x94,0x90,0x08,0xb2,0x1c,0x01,0x09,0xa4,0xe3,0xa0,0x65,0x3a,0xda,0xd7,0xe5,0xf2 .byte 0x78,0x4f,0xe6,0x55,0x37,0xc4,0x9c,0x9e,0xb0,0xb8,0xbe,0x89,0x61,0x7e,0x46,0xf3,0x51,0xdd,0x2c,0x87,0x48,0x0f,0x04,0xe7,0x96,0x3a,0xcb,0x4d,0x8b,0x9d,0xa0,0xfb,0x6c,0xe8,0xa4,0xc2,0x92,0x4c,0x97,0x05,0xd3,0x23,0x3f,0x07,0x3c,0xba,0x64,0xa8,0xdb,0x09,0x81,0x7d,0xea,0x66,0x1a,0x8e,0x7c,0x35,0x28,0xce,0xe3,0xce,0xbf,0x7c .byte 0x02,0x4f,0x39,0xac,0x38,0xd8,0x34,0x71,0xe4,0xfa,0x26,0x6e,0xf1,0xd9,0x53,0xd6,0x50,0xce,0x21,0xeb,0x4c,0x98,0x97,0xeb,0x21,0x29,0x4f,0xd8,0x49,0x34,0xd1,0xc9,0x32,0x7c,0x82,0x53,0xc2,0xec,0x41,0x5d,0x42,0x39,0x11,0x17,0x41,0x54,0x3d,0x60,0x8b,0xb4,0x42,0x99,0x68,0x16,0xbd,0x50,0xb2,0x4a,0xba,0xca,0x42,0x59,0xb0,0x7e .byte 0x88,0xab,0x18,0x6b,0x1d,0xe4,0x68,0x2e,0xeb,0x95,0xb5,0xc6,0x3b,0x64,0x38,0xbd,0x15,0x61,0xac,0x1a,0x79,0xd0,0x73,0xde,0x31,0xfc,0xd8,0x43,0x54,0xca,0x97,0xdb,0xa7,0x16,0xf8,0x34,0xa6,0x86,0xce,0x3f,0x82,0xbc,0x92,0xf9,0x82,0x8e,0xef,0xc5,0x6b,0xa4,0xa0,0x83,0x7f,0xe9,0xf5,0x1f,0xdd,0x24,0xdc,0x88,0x08,0xf2,0x93,0x36 .byte 0x4a,0x9c,0xaa,0x8a,0x51,0xf7,0x10,0x03,0x35,0x9e,0x44,0x29,0x15,0x94,0x46,0x71,0xc7,0x2a,0x8a,0x14,0x48,0xde,0x11,0x67,0xb1,0x8b,0xb4,0x5a,0x0a,0x76,0xc7,0xd8,0x1c,0x17,0xee,0x78,0x12,0xcc,0x93,0x0f,0xab,0x17,0x9f,0xb0,0x90,0x31,0x46,0x76,0x10,0xb3,0x37,0x26,0xe8,0x60,0x21,0x9a,0xd6,0x63,0x41,0xbe,0x8c,0x51,0x96,0xb0 .byte 0x0d,0x44,0x99,0x32,0xef,0x54,0xf7,0xf4,0xb2,0x65,0x3e,0x2c,0x39,0x72,0x06,0xd7,0x57,0x0b,0x61,0x12,0xe2,0x90,0xbf,0x45,0xe2,0xd6,0xd3,0x27,0x9f,0xbe,0x3f,0x83,0x58,0x6a,0xe7,0x03,0x3f,0xeb,0x82,0x9f,0xad,0xe3,0x12,0x9c,0x0b,0x65,0x32,0x28,0xee,0x93,0xf9,0x1a,0xd2,0xda,0xd0,0x41,0xad,0xb4,0x9d,0x37,0xc7,0xd5,0x44,0x9a .byte 0x48,0x42,0x29,0x89,0x21,0xa5,0x2e,0xf9,0x92,0x55,0xa2,0x64,0xdf,0x63,0x23,0x7b,0x03,0xce,0xb7,0x4e,0x4d,0x84,0x83,0xf2,0x07,0x3e,0xf4,0x51,0x5c,0xb5,0xce,0x49,0xf4,0xff,0x66,0x1d,0xcc,0x3a,0x45,0x36,0x7a,0xae,0x00,0xfa,0x56,0x84,0x3c,0x3f,0x51,0xb0,0x16,0x79,0x0d,0xa5,0x02,0x25,0x3c,0xcd,0x22,0x2e,0x4c,0xde,0x5c,0xf0 .byte 0xf3,0x44,0x4f,0xb3,0xbc,0x42,0x19,0x2f,0x9c,0xbd,0xd9,0x3f,0xa4,0xfe,0x21,0xab,0x82,0x97,0x76,0x16,0xed,0x20,0xa4,0x93,0x4b,0x21,0x70,0xed,0xc1,0x10,0x7a,0x27,0x1b,0xfc,0x99,0x52,0xa0,0x75,0xc6,0xb2,0x1d,0x97,0x83,0x73,0xe7,0x0b,0xa9,0x03,0xd5,0xba,0x51,0xb9,0x4f,0xa6,0x61,0xfc,0x45,0xff,0xe3,0x82,0xd6,0xab,0xc5,0x36 .byte 0x1c,0x63,0xcb,0x09,0x14,0xee,0x5a,0x5a,0xe8,0x20,0xa2,0xde,0x4b,0x1a,0x8a,0xcf,0xb4,0xd8,0x6f,0x5c,0x98,0x21,0x66,0xfb,0x5d,0x8a,0xc1,0xbe,0xdd,0x69,0x9e,0x1e,0xeb,0xa0,0x81,0xea,0x8b,0x2a,0xb6,0x80,0xff,0xb9,0x32,0x0a,0xfc,0xb6,0xb7,0xd8,0xa2,0x5d,0xbf,0xc3,0xe1,0x73,0xba,0x4b,0xbc,0xaa,0x31,0x7e,0xc9,0xe7,0xd0,0x9e .byte 0xde,0xdc,0xb5,0xfa,0x9d,0x9d,0x8c,0xed,0xe6,0x44,0x3a,0x81,0x37,0xd7,0x2c,0xee,0x3f,0xe4,0xed,0xc5,0x43,0xcc,0x2e,0x02,0xdd,0xfc,0xae,0xd1,0x2d,0xb3,0x75,0xdd,0x7c,0x85,0xfa,0x2d,0x8a,0xec,0x05,0xd3,0x45,0x8b,0x3a,0x6d,0x78,0x36,0x04,0x71,0xe2,0x10,0xb8,0x13,0xb2,0xbd,0xc6,0x0e,0xb7,0xda,0xfa,0xf8,0x47,0x9b,0x7d,0x14 .byte 0xe2,0xaa,0x82,0xfc,0x23,0xd2,0xef,0xff,0xaa,0x94,0x67,0x82,0xf6,0x31,0xfa,0x5e,0xbd,0xd1,0x78,0xee,0x07,0xb2,0xcd,0x0f,0x73,0x36,0xeb,0xb3,0x7c,0x6e,0x66,0x73,0x85,0x5a,0x23,0x26,0x2d,0x5b,0xb0,0x6c,0x04,0x1f,0x70,0x0a,0x67,0xff,0x02,0x77,0x66,0x51,0xbf,0x0b,0xe2,0x90,0x96,0x79,0xe2,0xac,0x21,0xa4,0x58,0x51,0x7c,0xb2 .byte 0x03,0xb1,0x64,0xb1,0x51,0x95,0xad,0x3e,0x4b,0x76,0xf1,0xb0,0x87,0x02,0x82,0x4b,0x18,0xb3,0x87,0xc1,0xc1,0x49,0xf3,0xd2,0x71,0x69,0x0a,0xef,0x5b,0x8d,0x89,0x80,0x98,0x9a,0xee,0xc5,0xab,0x9b,0x04,0x9b,0x1a,0x51,0x53,0xc6,0xaa,0x3f,0x84,0xe8,0x60,0xf4,0x15,0xff,0xb4,0xc8,0x1b,0xe1,0x8d,0x3f,0xe9,0x6c,0x79,0x74,0xc3,0xef .byte 0x1a,0xb8,0xdd,0xb5,0x92,0xba,0xf9,0x29,0xa1,0x0c,0x0d,0x88,0x08,0xd8,0x8c,0xb9,0xad,0xdf,0x62,0x03,0x27,0x79,0x69,0xca,0x21,0x24,0x00,0x3f,0x9e,0xcd,0xc6,0x8f,0x66,0xee,0x0d,0x6f,0x29,0xa5,0xf7,0x51,0x7c,0xa8,0xfd,0xa9,0xce,0x75,0xcd,0xdb,0xa6,0x86,0x43,0x16,0xc7,0xf0,0xea,0xfd,0xf8,0x08,0xd4,0x4e,0x7b,0x10,0xd2,0x5b .byte 0xcf,0x4f,0xf0,0x71,0x72,0xc4,0x31,0x90,0x93,0x09,0x69,0xfb,0xd6,0x1c,0x41,0x62,0x58,0x5c,0x60,0xbb,0x89,0x28,0xc1,0x57,0xa2,0x52,0x8d,0x48,0x98,0x0b,0xd8,0x7c,0xb1,0x7c,0x92,0x1c,0x2a,0xec,0x0a,0x61,0xa6,0x36,0x3b,0xf5,0x24,0xe4,0xb4,0xc3,0x09,0x99,0x89,0x8b,0x7a,0x9f,0x61,0x3c,0xc1,0x8b,0x1b,0xda,0xb2,0x44,0xab,0xbb .byte 0x8a,0xad,0xcb,0x17,0xe5,0x2e,0x74,0x23,0x39,0x76,0x10,0x0f,0xd5,0xa8,0x4f,0xc2,0x14,0xa5,0xb6,0x47,0x48,0xfb,0xb2,0x52,0x9e,0x0a,0xfc,0x0f,0x95,0x04,0xa8,0x71,0xa7,0xca,0xb7,0x01,0x67,0x39,0xd1,0xc7,0xf6,0x15,0xc4,0x8b,0xe8,0xa5,0xb9,0x5c,0x7e,0x83,0x26,0xd5,0x37,0x4c,0x44,0xff,0x0b,0xa3,0x53,0x3b,0x6c,0xb7,0xbb,0x10 .byte 0xbc,0x33,0xb8,0xd0,0x4c,0x00,0x3b,0x62,0x6b,0x43,0x4e,0x91,0x2f,0xa5,0x08,0x35,0x6f,0xc3,0x03,0xa1,0x10,0xbc,0xb1,0x31,0x8d,0x51,0x0f,0x2f,0x42,0xfb,0x45,0x55,0xac,0x1e,0x05,0x05,0xbc,0xc9,0xe8,0x23,0xd5,0xe8,0x68,0x32,0xa7,0x10,0xa0,0x7d,0x72,0x02,0xc1,0xcd,0x0a,0xdc,0x2f,0x4b,0xbc,0x34,0x94,0x25,0x9b,0xc8,0x25,0x4a .byte 0xc7,0x1a,0xc6,0x62,0xeb,0xa5,0x4b,0x8b,0x0e,0x2b,0x93,0x88,0xbf,0xa6,0xb9,0x73,0xae,0x7f,0xa5,0x6d,0xce,0xc3,0xf5,0x9a,0xcb,0xed,0x69,0xc7,0x34,0x39,0xcf,0xde,0x86,0xf3,0xa8,0x0e,0x5d,0xdc,0x76,0x0d,0x60,0x96,0x62,0x2e,0x61,0xe6,0x69,0xc6,0xd8,0xb9,0x86,0xda,0x4f,0xa0,0x78,0x03,0xa7,0x1a,0x52,0xb4,0x1b,0xb8,0x57,0xca .byte 0xed,0x92,0x6c,0xbc,0x3c,0x83,0xbd,0x8d,0xbd,0xe3,0xa9,0x08,0xe1,0x8a,0xab,0x30,0x39,0xc8,0x50,0xe8,0xda,0x6e,0xa6,0xc6,0xc4,0xe7,0x13,0x7d,0xa7,0x77,0xea,0x3b,0xe1,0xa3,0x4a,0x8e,0x48,0xf3,0x52,0xa7,0x82,0x40,0x76,0x99,0x3e,0x45,0x60,0x6e,0xf1,0x59,0xa5,0x22,0x7c,0x3d,0xac,0x72,0x00,0xbc,0xc6,0x37,0x62,0x58,0x63,0x63 .byte 0xd8,0xe9,0x47,0x2f,0x1c,0x89,0xaf,0xc9,0x3b,0x73,0xdf,0xbe,0x6c,0x96,0x1a,0x87,0x20,0xd7,0xf7,0x1b,0xce,0xa6,0x08,0x46,0x44,0x0a,0x1a,0xe4,0x87,0x6b,0x94,0x1a,0x35,0x70,0xec,0x2b,0xdd,0xf9,0xbb,0xd3,0xd3,0x2a,0x63,0xd3,0x07,0x7e,0xab,0x18,0xa8,0x2f,0x64,0x00,0x7e,0x08,0xaf,0x46,0x39,0x8b,0x29,0xf2,0x50,0xd3,0xa9,0xf1 .byte 0xf0,0xe0,0x38,0x32,0xe5,0x82,0x88,0x8d,0xa7,0x79,0x88,0x20,0x56,0x01,0xf5,0x6c,0x99,0xe6,0xbf,0x89,0xd7,0x1c,0xfa,0xfd,0xd1,0x86,0xfd,0x5d,0xdf,0x04,0x95,0xda,0xe6,0x99,0x64,0x80,0x68,0xda,0x36,0x97,0x65,0x81,0x1f,0xed,0xb4,0xba,0x21,0xb0,0x87,0x01,0x7c,0x96,0xe7,0x6f,0xea,0x36,0x20,0x65,0xa9,0x73,0x6c,0x03,0xa6,0x03 .byte 0x9c,0x82,0xbb,0xbf,0x3b,0x3d,0x9e,0x0d,0x31,0x1a,0x08,0x46,0x02,0xb5,0x43,0xe7,0xa1,0xfe,0xdb,0x35,0x13,0x6f,0x28,0x87,0x14,0x53,0x38,0xdf,0xda,0x88,0x0e,0xd1,0xac,0xe3,0xd4,0xea,0xd3,0x09,0xb8,0xc6,0x6f,0x9b,0x51,0x82,0xa8,0xc5,0x18,0x1d,0x8d,0x9c,0xc8,0xde,0x98,0x57,0xa8,0x3f,0xaf,0x8d,0x09,0xeb,0xab,0xa9,0x63,0x98 .byte 0x5a,0x6d,0x05,0x45,0xcc,0xb7,0x0c,0xb7,0xd0,0x59,0x11,0x25,0x51,0x63,0xba,0x61,0x4a,0x1a,0x86,0x68,0x3e,0xb1,0xfa,0xb9,0xab,0x9b,0x78,0xbe,0x8f,0xde,0x4e,0xf9,0x22,0x4b,0xaa,0x19,0x2c,0xad,0x17,0xa9,0xb2,0x9b,0x40,0x8c,0xeb,0xb6,0x42,0xbc,0x14,0xa8,0xa2,0xd2,0x21,0x6e,0x19,0xe8,0xd3,0x07,0x82,0x0a,0x22,0xd9,0xf3,0x09 .byte 0x29,0x68,0x34,0xb0,0xbb,0xad,0x25,0x17,0x3d,0x3b,0xf9,0x29,0xe3,0x8e,0x30,0x9d,0xb4,0xb8,0x51,0xa9,0x67,0x6f,0xe9,0xca,0x05,0xf0,0xd5,0xc2,0xd0,0x73,0x83,0x61,0x97,0x50,0x90,0x4c,0x6f,0x95,0xe6,0x62,0xcf,0xc0,0xe5,0x2c,0x42,0x45,0xd6,0xc9,0x01,0x74,0x19,0xaa,0x7a,0x53,0x9f,0xb6,0xab,0xa9,0xd3,0x19,0x80,0x10,0xd7,0xe2 .byte 0x68,0xaa,0x17,0x60,0x47,0x8b,0x64,0x1f,0x69,0x16,0x2b,0xd5,0x7d,0x04,0x1a,0x3c,0x25,0x68,0xb6,0x0b,0x85,0x1b,0x4b,0x8b,0x11,0xde,0x57,0x97,0x03,0xcb,0x91,0x03,0x65,0xc9,0x2d,0x0b,0x59,0xd0,0x8e,0x98,0x91,0x3a,0x00,0x83,0xd6,0x41,0xb1,0x3b,0x2c,0x34,0x84,0x57,0x0d,0xf0,0xc4,0x25,0xa6,0xf1,0xa6,0x41,0xdf,0x0e,0xad,0x06 .byte 0x03,0x13,0xcb,0x63,0x68,0xf7,0x07,0x1e,0xec,0xe1,0x36,0x4a,0x4d,0x50,0xc1,0x48,0xc5,0x95,0x22,0x10,0xf8,0xb7,0x45,0xc7,0xa4,0x35,0x40,0x8e,0x7c,0x9f,0x8b,0xa2,0x22,0x6b,0x2d,0xbb,0x52,0x33,0x13,0xfc,0x08,0x59,0x13,0xd0,0x3c,0x0e,0x2b,0x80,0xab,0x02,0xc3,0x92,0x3f,0x94,0x41,0x86,0x47,0xf8,0x27,0xa2,0xf8,0x0b,0xf2,0x45 .byte 0x33,0x23,0xfa,0xd0,0xf0,0xa1,0x74,0x02,0x60,0x4f,0x1b,0xdd,0xba,0x2d,0xbe,0xd6,0xf3,0x6b,0xbe,0x4d,0x6b,0x66,0xe2,0x4c,0x4e,0x03,0xc2,0xd9,0xe4,0x52,0xbd,0x4d,0xdd,0x0d,0x46,0x9c,0x97,0x68,0xdc,0xd6,0xfb,0xfe,0x19,0xdd,0x69,0xd1,0x6e,0xbb,0x8b,0x58,0x5c,0x5c,0x2c,0x4d,0x5c,0x63,0x6e,0x01,0x60,0xf3,0x9b,0xb1,0x63,0x70 .byte 0x3e,0x55,0xeb,0xc0,0x5f,0x12,0x1f,0x06,0x6d,0xbb,0xed,0x53,0x5c,0x25,0x4f,0x5b,0x1d,0x84,0xb7,0xab,0xaa,0x11,0x75,0xc7,0xb0,0x66,0xd9,0x32,0xec,0xb4,0xe3,0x3d,0x8d,0x9f,0x44,0xa1,0x03,0xbc,0xf2,0x9d,0x62,0x7d,0xbd,0x80,0x0d,0xa1,0xfa,0xe8,0xd0,0x91,0xe2,0xd5,0x20,0xe1,0xb8,0xdb,0xd8,0xa8,0x15,0x47,0x09,0x00,0x7e,0x29 .byte 0xf2,0x5c,0x93,0x04,0x79,0x81,0x7e,0x22,0xd0,0x86,0x1c,0xf3,0x42,0x11,0xff,0xdc,0x9a,0x35,0x4c,0x9f,0xa4,0x7f,0xf3,0x0a,0xe8,0x63,0xb9,0x79,0x59,0xcc,0x8d,0xfd,0x27,0xbb,0x2d,0x1b,0x72,0xd6,0xac,0x5f,0x6e,0x13,0xbc,0xc3,0xff,0x84,0xf5,0x58,0x00,0x8a,0x71,0xdb,0x69,0xf4,0xd4,0xc8,0xbc,0x12,0x84,0xf7,0x07,0x4d,0x5b,0xd0 .byte 0x7d,0x6c,0xec,0x01,0xe6,0x39,0x07,0x15,0x1c,0xca,0x49,0x62,0xe2,0xe9,0xf7,0xd2,0x81,0xd8,0x13,0x9f,0xaf,0xb3,0x1f,0xf5,0xf1,0x8d,0x61,0xa1,0x02,0x03,0x21,0xce,0x07,0xe2,0xd5,0xec,0x8d,0xfc,0xd4,0x51,0xd6,0x7a,0xc5,0x50,0x38,0x9d,0x91,0x0e,0xfe,0x97,0x63,0x19,0xb8,0x43,0x75,0xd2,0xfb,0xde,0xbd,0x84,0x1d,0xb7,0xdf,0xab .byte 0xa9,0x86,0x69,0x2d,0x11,0x18,0xec,0x00,0x88,0xf0,0x86,0xa2,0xd5,0x07,0x9d,0x60,0x52,0x39,0x6d,0xae,0x30,0x5d,0x01,0xa2,0xd8,0xc9,0xc3,0xf8,0xc7,0xbe,0x04,0xe1,0x80,0x4e,0x7a,0xaa,0x3d,0xd2,0xb3,0x2f,0x91,0x9a,0xa8,0xbf,0xef,0x6d,0x61,0xf6,0x33,0x3e,0xf4,0xe6,0x0e,0x82,0x88,0x6f,0xef,0x55,0x97,0xf2,0xda,0x52,0xf1,0x3b .byte 0x46,0x5d,0x23,0xe5,0x7e,0x7c,0x8b,0x51,0x56,0x96,0xf4,0x77,0xc5,0xa0,0x3c,0x14,0x3d,0xc2,0x3a,0xc1,0xaf,0xfe,0x6d,0xec,0x80,0x79,0xba,0x19,0x5f,0x26,0x8c,0x7d,0xb6,0xd2,0x27,0xf0,0xcf,0xa4,0x04,0x31,0x7d,0x8c,0xf5,0xa0,0xcc,0x04,0xd5,0x6e,0x4f,0xe0,0x35,0x0f,0x20,0xec,0x53,0xad,0x02,0xb8,0xdb,0x4c,0x4e,0xda,0x73,0x5a .byte 0xc5,0x46,0xe5,0x10,0xbd,0xa2,0xb5,0xbf,0x71,0xc1,0x3a,0x83,0x58,0x6c,0x74,0x32,0xed,0xd3,0xcc,0xa5,0x6d,0x65,0x5b,0x5c,0xfe,0xcd,0x68,0x02,0xad,0xcf,0x54,0x4c,0x1d,0xad,0xdf,0xeb,0xa0,0xda,0xb0,0x12,0x5c,0xba,0x7b,0xa2,0x5d,0x5e,0xf3,0x6f,0x42,0x2d,0x83,0xf3,0x28,0xaa,0xcf,0x6c,0x85,0x6a,0x6b,0x80,0xc0,0x28,0x2e,0x1b .byte 0x68,0xfa,0xe7,0xdc,0x1e,0x97,0x8d,0xca,0x1b,0xed,0xca,0xde,0x8f,0x52,0x73,0x54,0x57,0xaf,0xf0,0xb8,0x91,0x08,0xec,0x01,0x42,0x97,0x26,0x27,0xdd,0xfc,0x53,0x81,0x4c,0xbe,0x95,0xb5,0x67,0x51,0x35,0xb2,0xa5,0x8f,0x62,0x10,0x7a,0x1a,0x0e,0xcc,0xf1,0x9c,0xc4,0xa3,0xff,0xda,0xe4,0x23,0x12,0xf9,0x73,0x6f,0xeb,0xb1,0x82,0x00 .byte 0x5f,0x35,0xaf,0x2e,0x6e,0x88,0x31,0xc0,0xb9,0x1a,0xce,0x27,0x5f,0xbc,0xcf,0x6d,0x03,0x12,0xfb,0xe9,0xae,0x3e,0xff,0x1c,0xa5,0x28,0x9d,0x19,0xd3,0xfe,0xca,0xd0,0x3c,0x04,0xd1,0x64,0xea,0xdd,0x2d,0x4a,0x0f,0x23,0xcc,0xd4,0xe5,0xf9,0xad,0x95,0xe4,0x91,0xb0,0xaa,0xb7,0x1e,0x28,0x9f,0xac,0xbc,0x9f,0xa3,0x62,0xb0,0x37,0xaf .byte 0xdd,0xe6,0xcd,0x65,0xb4,0xea,0x31,0xbe,0xca,0x44,0x93,0x16,0x74,0x46,0x5a,0x3d,0x78,0x8d,0x9d,0x01,0x6b,0xf6,0xa7,0xf3,0xdd,0x1b,0x92,0xc1,0x74,0xf0,0xe4,0x32,0x90,0xc5,0x4d,0xdb,0x3e,0xab,0x0d,0x4c,0x1e,0x82,0x2f,0x82,0xe2,0xf7,0xe6,0x13,0xa8,0x8c,0xd6,0xaa,0x59,0xee,0x5c,0xc6,0x1c,0x67,0xd6,0x6f,0xf8,0x92,0xce,0xf0 .byte 0xfa,0xde,0x15,0xdb,0x86,0x79,0x6e,0xaf,0x03,0x10,0x91,0x3f,0x6b,0xc4,0x6a,0x23,0x2d,0x01,0x36,0xbf,0xb4,0xff,0x99,0x46,0x92,0x64,0x45,0xd5,0xb0,0x1d,0xaf,0x13,0xa0,0xe0,0xf4,0x21,0x5d,0x98,0x47,0x04,0xef,0x06,0x81,0xd1,0x7c,0xf1,0x1d,0x4d,0x6d,0x04,0x9f,0x3b,0xf7,0xf9,0x27,0x6c,0x91,0x15,0xf3,0xf0,0x48,0x63,0x9d,0x56 .byte 0xb1,0x8a,0xdb,0x27,0xf4,0x83,0x4e,0xfa,0x4b,0x15,0xc5,0x38,0xdf,0x4b,0xd5,0xcc,0xd4,0x15,0x21,0xc0,0xd8,0xbe,0xda,0x9e,0xe6,0x35,0xa6,0x4e,0x76,0x27,0xc6,0x10,0x02,0xf4,0xa1,0x9d,0x71,0xe5,0x77,0xdc,0xcd,0xbd,0xda,0xdb,0x46,0xd7,0xc7,0xa0,0x71,0xd5,0x0e,0xfd,0x4e,0xe7,0xe0,0xb9,0x69,0x9b,0x31,0x12,0x16,0x04,0x71,0x0d .byte 0xac,0x6e,0xb7,0x66,0x1e,0xfd,0x9b,0x0d,0x57,0xd9,0x8f,0xd6,0x2e,0x13,0xb4,0x5b,0xd4,0x6e,0xa3,0xeb,0x7a,0x10,0x62,0x21,0xdc,0x0f,0x5c,0x29,0x37,0xd0,0x81,0x0e,0x14,0xc2,0xb6,0x2f,0x26,0x8b,0x1b,0x2d,0x72,0xb4,0x85,0x28,0xad,0x90,0x29,0x44,0x4e,0x1c,0x0e,0x1e,0x31,0xf8,0x54,0x8b,0x54,0x35,0x36,0x1c,0x3c,0xc9,0x1f,0x0e .byte 0xf8,0xee,0x35,0xec,0x04,0x65,0xf8,0x13,0xb3,0x5a,0x73,0xfc,0x12,0xd6,0x35,0x19,0x7a,0x20,0x91,0x86,0xef,0x26,0xae,0x8b,0x03,0x11,0xb1,0x3a,0xa0,0xfc,0xee,0x6d,0xf2,0xfc,0x46,0x34,0x60,0x16,0xeb,0x4a,0xdb,0xcc,0xfb,0xa5,0xf1,0xde,0x19,0x62,0x9a,0x07,0xee,0x88,0xfe,0xdc,0x2e,0xc6,0x96,0x72,0x83,0x62,0x60,0x75,0xb9,0x88 .byte 0x96,0x18,0xd9,0x03,0x80,0xd0,0x24,0x80,0x1d,0x04,0x2d,0xee,0x63,0x96,0xd6,0xfc,0xc7,0x01,0x71,0xb1,0xfc,0x8b,0xc4,0x88,0xcf,0x01,0x25,0xa7,0x51,0xbc,0xe6,0xaa,0x48,0x77,0xbb,0x70,0xe6,0x8d,0xfe,0x83,0x33,0xae,0x29,0xd9,0x1d,0x44,0xff,0x18,0xcf,0x91,0xe8,0x0d,0xdc,0x8b,0xdd,0x6b,0xec,0x35,0x16,0xfc,0xe1,0x0b,0xb2,0x70 .byte 0xad,0x4a,0xa4,0x2c,0x23,0xa7,0xb8,0x64,0x2f,0x4a,0x7d,0x13,0xf6,0xa6,0x57,0x26,0x4d,0x08,0x6c,0x39,0x72,0xbe,0xdb,0x59,0xa8,0xe1,0x60,0x00,0x03,0xa6,0x56,0xa3,0x89,0x56,0xf1,0xe9,0x81,0x31,0x32,0xfd,0xba,0xd6,0x5f,0x38,0x89,0x92,0x88,0xd6,0xf0,0xb5,0x3c,0x46,0xed,0xec,0x9d,0x5a,0x42,0xe0,0x9a,0x6e,0xed,0x98,0x6a,0xec .byte 0x97,0x22,0x5b,0x93,0xba,0xa5,0xc4,0x71,0x86,0x1f,0x32,0xa0,0x2a,0x50,0xb3,0x56,0x7e,0x62,0xb2,0xe1,0x84,0x5a,0xbd,0xdb,0x2f,0x38,0xd0,0x12,0x79,0x57,0xe8,0xf7,0x45,0xd9,0x71,0x4e,0x1a,0x0a,0x08,0xa0,0xc7,0xea,0x9d,0x74,0xc7,0xa6,0xaa,0x62,0x17,0xa2,0xba,0x23,0x26,0x41,0x1a,0xe4,0x02,0x98,0xd1,0xbb,0x32,0xa2,0xa1,0xcf .byte 0x55,0x3c,0x2d,0xef,0xa6,0x69,0x4f,0xed,0x15,0x43,0x34,0xfa,0x40,0x8c,0xa2,0x0c,0xcf,0x2c,0xda,0x4d,0x08,0x34,0x3e,0xae,0x98,0xbd,0x2c,0x75,0x40,0x77,0xd7,0x7e,0x6e,0x09,0x64,0x39,0x0a,0x84,0x79,0x5e,0xe7,0x72,0x96,0x9d,0xc2,0x17,0x0a,0x3c,0x6d,0x76,0xf0,0x4b,0x75,0x12,0x45,0x19,0x55,0x84,0x06,0x6b,0x27,0x44,0xe5,0xf4 .byte 0x89,0xbc,0xd4,0x50,0x0e,0x89,0xfd,0x9f,0xd6,0x3b,0xfb,0xa5,0x88,0xef,0x1d,0xd2,0x58,0x2b,0xc7,0x6b,0x07,0xb8,0x6a,0x40,0xe9,0x29,0x5a,0x9d,0x20,0xad,0xfd,0x9b,0x36,0x7e,0x8d,0x1f,0x81,0xd9,0x06,0x03,0x47,0x70,0x3f,0x7d,0x89,0x03,0x57,0xa7,0x46,0xc4,0x4b,0x9a,0xc8,0x57,0x35,0x02,0x2d,0xe0,0x89,0x0a,0xd1,0x67,0xe1,0x7a .byte 0xe2,0x2f,0xcd,0xe3,0x2e,0xbc,0x2a,0xf5,0x1a,0xb1,0x6c,0xc3,0x89,0x5c,0xda,0x63,0xc4,0xc6,0x8e,0xca,0x97,0xf4,0x5d,0x02,0xfc,0x37,0x46,0x72,0x07,0xca,0x3a,0x4a,0xa2,0xc4,0x90,0x14,0x0c,0x3c,0x9c,0x6d,0xb2,0x33,0xe8,0x94,0xfd,0x5e,0xb5,0x53,0x19,0xa5,0xfa,0x2a,0x99,0x26,0x8b,0x34,0x7e,0x8b,0xe3,0xc6,0x50,0x6c,0x3c,0x3f .byte 0xda,0xe0,0xa4,0x50,0x34,0xa0,0x6a,0xdc,0x06,0xac,0xee,0x77,0x9a,0xa0,0xc1,0x8b,0x4f,0x82,0x71,0x1b,0x5e,0x3d,0xef,0xcd,0xcf,0x19,0x44,0x01,0x80,0x65,0x1a,0x1c,0xbd,0x5f,0x50,0x4a,0x6c,0xa2,0x7f,0x82,0x74,0xa6,0x59,0x39,0x46,0xc1,0x87,0x5b,0xcb,0x70,0x21,0x5e,0xcf,0x1e,0x61,0x73,0x01,0xe6,0x1b,0x0e,0x94,0xf9,0x16,0x91 .byte 0x1b,0x42,0x99,0xee,0x62,0x62,0xc3,0x02,0xbb,0xaf,0x5f,0xcc,0x98,0x09,0xd5,0xd7,0xdf,0xb8,0xed,0xb9,0xb3,0xde,0x4a,0xfc,0x22,0x8b,0x47,0xc2,0x60,0x31,0x89,0x4f,0x6a,0xbb,0x88,0xc4,0x02,0x25,0x65,0x7b,0x7c,0x2b,0x47,0xf5,0x83,0x99,0x0e,0x0a,0xf5,0x49,0x8c,0x32,0xd5,0x04,0x05,0x7f,0xe0,0x59,0xd5,0xb8,0x9a,0xf7,0xa0,0x3d .byte 0x67,0xed,0x1c,0xc1,0x62,0xb2,0x48,0x8a,0x64,0xa4,0x97,0x74,0x3b,0x9e,0xec,0x04,0xf9,0xa3,0x40,0x85,0xd4,0x39,0x37,0xe1,0x1a,0x64,0x6e,0x9d,0x2a,0xbb,0x6b,0xf5,0xb9,0x65,0xfd,0x1b,0x14,0x23,0x85,0xcc,0xfa,0x69,0x69,0xca,0x09,0xf1,0x64,0x11,0x3b,0x03,0x29,0x46,0x53,0x0b,0x06,0x29,0x29,0x86,0x03,0x40,0x5c,0xa8,0x5b,0xbe .byte 0xd5,0xa6,0x04,0x2d,0x05,0x91,0x88,0xb5,0x85,0x37,0x37,0x26,0xed,0xf5,0xdd,0x58,0x98,0x53,0xf9,0x26,0x08,0x80,0xae,0x37,0x65,0x42,0xe1,0x4a,0x7b,0x75,0xeb,0x73,0x14,0x27,0x13,0xee,0x40,0xe0,0x39,0x62,0x09,0xaa,0x0a,0xe9,0x22,0x4a,0x6b,0x23,0x10,0x9a,0x60,0xc0,0x24,0x71,0xb5,0xb6,0x92,0xe5,0x2e,0x64,0x0f,0xae,0x23,0x6f .byte 0x49,0x48,0x60,0x3b,0xe5,0xf7,0xdd,0xc2,0x01,0xb4,0xb0,0xf6,0xf9,0xfb,0x68,0x59,0x79,0x24,0xc3,0x4c,0x16,0xed,0x00,0xcc,0xa9,0x6f,0x83,0x43,0xf7,0x6c,0x1b,0x2e,0x9c,0x52,0xd3,0x0a,0x4a,0x10,0x5c,0xb8,0xbc,0xe9,0xe0,0xa0,0x69,0x1d,0x4c,0x5f,0x20,0xd8,0xba,0x16,0xc5,0x82,0xad,0x79,0x76,0x53,0x4c,0x4b,0x0e,0xb0,0x98,0xa6 .byte 0xdd,0xd7,0x8b,0x1b,0x2f,0x9a,0xa5,0x6d,0x5b,0x11,0x97,0x3b,0x90,0x61,0xde,0x44,0x9a,0xe4,0xda,0xc7,0x15,0x32,0xea,0x0e,0x5e,0xc2,0x3c,0x88,0xb1,0x78,0x67,0xdb,0xb4,0x1a,0x65,0xa1,0x14,0x7c,0xb7,0xe6,0x7c,0x34,0xf4,0xb1,0xa0,0x1a,0xdf,0x8e,0x50,0x1e,0x6f,0x64,0x84,0xdb,0x91,0x3d,0x9f,0x03,0xa3,0x62,0xa8,0x05,0x48,0x32 .byte 0xbd,0xee,0x64,0xde,0xd7,0xf4,0x65,0x30,0x48,0x6c,0x66,0x8f,0x31,0x93,0xc3,0x25,0xd4,0xe0,0x9e,0xd5,0x61,0xb7,0x6c,0xe5,0x8b,0x79,0x4b,0x5f,0x2b,0xa8,0x8f,0x17,0x31,0xef,0x1e,0x93,0x8f,0xcf,0x2b,0x49,0x01,0x6a,0x72,0xe8,0x83,0x95,0xc6,0x91,0xff,0x79,0x6f,0x50,0xeb,0xa5,0x69,0xe4,0x0e,0xcf,0x68,0x5d,0x19,0xc3,0xe4,0x73 .byte 0xf4,0x08,0x5b,0x0d,0xd4,0x27,0xa7,0xc0,0x06,0xd8,0xa5,0x5e,0x56,0x1a,0xdd,0xf3,0x5e,0xd5,0x83,0x54,0x86,0xb4,0xbc,0x6c,0xc4,0xf4,0x34,0x6a,0x85,0xd9,0x29,0x67,0x90,0xaa,0xb4,0xaa,0x85,0xaf,0x04,0x90,0x3c,0x33,0xb7,0x7c,0x77,0xeb,0xcc,0xab,0xc0,0x4b,0xe0,0xd4,0xb6,0x40,0x24,0x7c,0x85,0x7c,0xd8,0xf3,0xfc,0x32,0xad,0xbd .byte 0x43,0xcd,0x54,0xa9,0x94,0x51,0xba,0x0f,0x1e,0xbb,0x79,0xf5,0x31,0x29,0xf0,0x8e,0x20,0x62,0xd1,0x38,0x99,0x32,0x05,0x81,0x88,0x64,0x51,0x50,0x31,0xa4,0x38,0x55,0x31,0x86,0x77,0x0b,0x0f,0xcf,0x00,0xe4,0x50,0x9d,0x26,0x98,0xc1,0x3d,0x0c,0x7e,0xec,0x99,0xbe,0x18,0x38,0xf0,0xcd,0xc9,0x98,0x80,0x1c,0x56,0xb4,0xf9,0x15,0xb4 .byte 0xdd,0x74,0xb5,0x37,0xd2,0x2b,0x24,0xb1,0x18,0xfd,0x40,0x48,0xba,0xa3,0x1a,0xec,0x71,0x01,0xcf,0xd9,0xe2,0x1c,0x4d,0x1f,0xad,0x91,0x1e,0x6f,0x15,0x99,0xe6,0xd3,0x40,0x92,0xa9,0xfd,0xb5,0x6e,0xf6,0xfc,0x0a,0xff,0x07,0x19,0x2f,0xd7,0x5f,0x1b,0x62,0xb7,0x66,0x5c,0x51,0xff,0x36,0x5d,0x97,0x23,0x51,0xa5,0x29,0x2c,0xe5,0xce .byte 0x21,0xd4,0xa3,0xdc,0x31,0xaf,0xf0,0xfe,0xa0,0x71,0xc0,0xa3,0xeb,0xdc,0xd6,0x17,0x1d,0xa5,0xd0,0xc2,0xdd,0x21,0x9d,0x91,0x3f,0x9d,0xee,0xa2,0xe1,0x7e,0xfa,0x4c,0xe0,0x8b,0x13,0x3e,0x76,0x7e,0xc0,0x62,0xf5,0x6f,0x79,0x0e,0xda,0xc9,0xc6,0x74,0xd0,0xe1,0xae,0x03,0x51,0xe3,0x7b,0x46,0x65,0x7d,0x0e,0x7b,0xb4,0x18,0xf6,0x7e .byte 0x28,0x0a,0xbd,0xc5,0xfd,0xb6,0xff,0x20,0x88,0xdb,0xa0,0x65,0x87,0xa6,0x0b,0x3d,0xb5,0xa3,0x36,0x9c,0x26,0x50,0x8d,0xad,0x7f,0x19,0x78,0xd3,0x4f,0x34,0x2b,0xae,0x09,0xb1,0xf5,0x1b,0x6d,0xa0,0xed,0x83,0x90,0xc2,0x52,0xfe,0x72,0x46,0xf2,0xca,0xd8,0x42,0x39,0x76,0xce,0x99,0xcd,0x68,0x8f,0xc8,0x3b,0x25,0x54,0x1d,0x32,0x4a .byte 0xd5,0x93,0x01,0xbd,0x6d,0xa8,0xcc,0x66,0x49,0xc7,0x5d,0x8f,0xd3,0x85,0x08,0xcb,0xa8,0x70,0x2b,0xa9,0x8f,0xed,0xb9,0x9d,0xea,0xe5,0x75,0x9f,0x8f,0x1e,0x8f,0xff,0x4b,0x4f,0x00,0xd3,0x3a,0x2a,0xd4,0x68,0x15,0xae,0x6e,0xe5,0x5d,0x80,0x74,0x78,0x97,0x90,0x7b,0x1e,0x2a,0x9a,0x4b,0x53,0x07,0xe9,0x58,0x24,0x7f,0x42,0x9c,0xc8 .byte 0xfc,0x0f,0x51,0xb7,0xbc,0xde,0x1e,0xf0,0x43,0xb0,0x48,0x61,0xd3,0x7f,0x89,0x3f,0x65,0x44,0x14,0x86,0xfe,0x24,0x5f,0xcd,0xf4,0xda,0xac,0x8d,0xc5,0xdb,0xa5,0x3d,0x9c,0x5d,0xa8,0xee,0x75,0xc0,0x0b,0x3d,0x93,0x2e,0x6b,0xd6,0x71,0xf7,0x8a,0x48,0xcf,0xbd,0xd5,0x38,0xb5,0x0b,0x8b,0x44,0x3f,0x86,0x59,0x07,0x25,0x2e,0x75,0xe6 .byte 0x16,0xe7,0x78,0x5a,0x8a,0xfc,0x4f,0x48,0x27,0x30,0x2f,0x32,0x4a,0xf1,0xa6,0xe0,0x44,0x85,0xbc,0x50,0xbc,0x0e,0xab,0x1b,0xf7,0x64,0x1a,0xd2,0x25,0xe9,0xf7,0xaf,0x32,0x14,0x33,0xa7,0xbc,0xa5,0xd7,0xb0,0x3c,0xc8,0x42,0xdd,0x2d,0x91,0xde,0xed,0xdc,0x89,0x57,0x91,0xb1,0x9a,0x5b,0x7d,0x63,0xbb,0xcb,0x4b,0xe2,0x04,0xf2,0x32 .byte 0x1a,0xdf,0xaf,0x96,0xc9,0xbc,0x50,0x51,0x57,0xcd,0xac,0x9e,0xa5,0x21,0x99,0x81,0xaa,0x2a,0x93,0xbc,0x79,0x7d,0x52,0x0c,0x5c,0x73,0x41,0x48,0x47,0x4b,0x9f,0x71,0xfe,0x8b,0xef,0x65,0xa4,0x18,0x8b,0xe9,0x42,0x62,0x09,0x9d,0x1d,0x4f,0x01,0x51,0xc4,0xfd,0x44,0xb0,0xf4,0x02,0x16,0x9a,0xef,0xa2,0xa8,0xa8,0x15,0xca,0xcf,0x55 .byte 0x14,0x4a,0x7f,0x3a,0xc2,0x2d,0x46,0xcf,0xc7,0x5a,0xa1,0xeb,0x69,0x1a,0xbf,0xf7,0x54,0xa6,0x16,0xdf,0x4c,0xf2,0xf2,0xb0,0xa9,0xc2,0x2f,0xcd,0x64,0x50,0xac,0x4e,0x43,0x02,0xe1,0x4e,0xd4,0xdf,0x01,0x36,0xaa,0x2b,0xb2,0x05,0xcf,0x22,0xcc,0x3e,0x0a,0x7f,0x25,0x17,0xa3,0x12,0x72,0x94,0x51,0xe8,0x32,0x20,0x05,0x36,0xee,0x8f .byte 0x19,0xf2,0xd6,0xe3,0x78,0x4c,0xa9,0x57,0xc0,0xa6,0xea,0xef,0xc4,0x25,0x65,0xb8,0x92,0x17,0x99,0xa9,0xa3,0x8f,0x60,0xb9,0x5b,0x65,0x1e,0x1d,0x6e,0x6c,0x11,0x6f,0x9f,0x49,0x97,0x15,0x5c,0xbf,0x9b,0x7e,0x6b,0x4d,0xdb,0x0b,0xb6,0xb8,0xf6,0xe0,0xd8,0x05,0x67,0x78,0xfc,0x27,0xf3,0x0b,0xf7,0x98,0xc1,0x2d,0x46,0x46,0x15,0x22 .byte 0x66,0xff,0x9d,0x31,0x12,0x56,0xcb,0x5a,0xc1,0xed,0x2f,0x9f,0xc7,0xff,0xd6,0x46,0x64,0x70,0x7c,0xa7,0xd5,0x84,0xd5,0x8d,0x6a,0x02,0xc9,0x9d,0x76,0xb0,0x9c,0xe5,0xd2,0x66,0x07,0x1d,0x64,0xb5,0x21,0xb3,0x61,0x1d,0x3b,0x19,0x85,0xfa,0xe6,0xdb,0x81,0xa1,0x22,0xf2,0x23,0x7c,0x56,0x2a,0x4c,0x21,0xfd,0x3e,0x45,0x9e,0x86,0x9c .byte 0x12,0xec,0x8a,0x13,0xa2,0xe1,0xf2,0xd5,0xd4,0x1f,0x35,0xdc,0xd9,0x48,0x8a,0xd1,0xa6,0x78,0xf6,0x7b,0xc7,0x69,0x23,0xec,0x3e,0x10,0xd6,0x31,0xf6,0xdf,0xfb,0x06,0xa3,0x5d,0x21,0x4e,0xe8,0xe6,0xcc,0x7a,0x60,0x12,0x87,0x03,0x1d,0x28,0xd5,0x1a,0xaf,0x79,0x30,0xbe,0x8c,0xdd,0x8c,0x32,0x49,0x8d,0xfd,0x54,0xc6,0x50,0xf8,0x9a .byte 0x54,0xa6,0xc3,0x72,0x17,0x13,0x1c,0xe1,0x1a,0x93,0x57,0xc0,0x5a,0xd5,0x93,0x90,0x0e,0x74,0x82,0x2a,0xc4,0x8a,0x14,0xc1,0x77,0x23,0xf5,0xcd,0x62,0x86,0x86,0xf4,0x7c,0x0c,0xd7,0x82,0x21,0xe7,0x7e,0x49,0x4f,0x35,0xbc,0xdf,0xd7,0x28,0x2f,0xd7,0xd9,0x51,0x51,0x68,0xff,0x21,0x4f,0xea,0xd4,0x72,0x6b,0xc3,0xb2,0x5d,0xf1,0xa7 .byte 0xa4,0x4e,0xf2,0xa6,0xe0,0xe9,0xa2,0xd1,0xd6,0x42,0xdf,0x87,0x38,0x78,0xa5,0xb6,0xee,0x15,0xaf,0xd6,0x84,0x0d,0xba,0x3c,0xdb,0x5a,0x18,0x90,0xdf,0xee,0xb1,0xa2,0x19,0xfd,0xa9,0x7c,0xdc,0x62,0x79,0xf2,0xc5,0x75,0x7b,0xb8,0x6d,0xc8,0x97,0x38,0xc0,0xaf,0x2d,0xbb,0xa7,0xaf,0x2a,0x9e,0x87,0x08,0xce,0xa0,0xd3,0xfc,0xe2,0xc4 .byte 0xa5,0x77,0x4b,0xfe,0xbb,0x10,0x22,0x78,0x2c,0xb6,0x2c,0x57,0xef,0xb1,0xde,0x54,0xa0,0x08,0xc8,0xee,0xeb,0xd1,0x7c,0x58,0x62,0xd8,0xa4,0xa8,0xe6,0x99,0x9a,0xaa,0x97,0x66,0xac,0x6e,0xc4,0x24,0xfe,0x62,0xca,0xfb,0x61,0xac,0x7b,0x74,0x8b,0x30,0x80,0x8e,0x29,0xb3,0x5a,0xca,0x37,0x4b,0xfb,0xbc,0x99,0x7f,0x66,0xf6,0xa5,0xed .byte 0xe5,0xb6,0x4c,0x7b,0x99,0x58,0x9f,0x95,0x8e,0xbd,0xfc,0x84,0x66,0x03,0xe2,0x7d,0x45,0x1d,0xc2,0x8b,0xd5,0xd6,0x48,0x8f,0x8b,0x95,0x98,0xf4,0x5f,0xe1,0x3e,0x5b,0x62,0xf0,0x5c,0xaa,0x88,0xa6,0x57,0x01,0x98,0xaa,0xbb,0xf9,0x52,0x13,0x1f,0xa1,0xb9,0xaf,0xc9,0x55,0xb9,0xb5,0x78,0x8c,0xa9,0x20,0x96,0x97,0xf8,0xbb,0xed,0x5a .byte 0x13,0x4a,0xfc,0xe4,0x22,0x16,0x04,0xac,0x57,0xcb,0xcf,0xd1,0xf5,0xf1,0xc3,0xa3,0x85,0xb8,0x43,0xed,0x68,0x72,0xe4,0x55,0x50,0xe1,0x8d,0x49,0xcd,0xc7,0x60,0xc4,0x3d,0x06,0xe6,0x2c,0xd1,0xaa,0x31,0xaf,0x4a,0x39,0x5b,0x25,0xbf,0x14,0x9c,0xa5,0x0e,0x6e,0xb4,0xea,0xdf,0x46,0x7c,0x9c,0x24,0xa9,0xca,0x58,0x92,0x2e,0xf9,0xe2 .byte 0xc6,0x37,0x33,0x33,0xe0,0x1f,0xf3,0xf2,0x81,0x0c,0xef,0xae,0xa4,0x0e,0xff,0x8b,0xdd,0x06,0x09,0x3a,0x26,0x3f,0x18,0x8c,0x09,0x76,0x27,0x90,0x5f,0x4c,0xb4,0x74,0x8a,0x00,0xbf,0x7d,0x57,0x5d,0x4d,0x8b,0x6f,0x0f,0x4c,0x02,0x37,0x7d,0xb3,0x6a,0x1b,0xb5,0x15,0x3f,0xc3,0x57,0x10,0x0c,0xeb,0x34,0x9b,0xf2,0xa4,0x09,0x3f,0x60 .byte 0xcb,0xf9,0x23,0x79,0x7f,0x06,0xd4,0xb0,0xff,0x53,0xb6,0x4f,0x53,0xa2,0x59,0xe5,0x6a,0x56,0x72,0x51,0x8d,0xc9,0x67,0xb7,0xdc,0xbd,0xd9,0x8c,0xa3,0x59,0x12,0xef,0x4a,0x65,0x26,0x4a,0x64,0x60,0xfc,0x98,0x23,0x2d,0x89,0xf5,0x30,0x2d,0x2b,0x19,0x71,0xa7,0x21,0x6d,0x97,0xe7,0x37,0xcb,0x80,0x84,0x16,0xa1,0xdd,0x14,0xfb,0xc3 .byte 0xb6,0x03,0xa4,0x33,0x72,0xa5,0x3a,0x30,0xf8,0x1a,0x19,0x7f,0x7d,0xb1,0xce,0x66,0x17,0x0f,0x39,0x59,0xf9,0xa6,0xbe,0x13,0xe3,0xaf,0xe6,0x37,0x8d,0x0d,0x52,0xa1,0xc6,0x7f,0xe7,0xc0,0x0d,0x86,0x4e,0xfb,0x22,0x50,0x3e,0xdc,0x18,0xc9,0xb9,0x0d,0x1f,0x99,0xb9,0x44,0xb1,0x07,0xcc,0xa7,0x70,0x58,0x33,0x88,0xde,0x93,0x9a,0xbf .byte 0x7e,0x37,0x8b,0x97,0x6a,0xda,0x27,0xd8,0x67,0xb4,0xba,0xb8,0x49,0x93,0x68,0x59,0x77,0xc2,0x72,0x4a,0x5f,0xe6,0x94,0xf9,0x30,0xd5,0xdc,0x55,0x50,0x35,0x44,0x5e,0x46,0xfa,0x48,0xa9,0xa7,0xd4,0xd0,0x1d,0xbb,0xb2,0x53,0x3f,0x43,0xf7,0xf0,0xae,0x2c,0xc8,0x03,0xca,0x8a,0x5d,0x8e,0x98,0x85,0x3d,0x62,0x7a,0x7a,0xde,0x9b,0xb6 .byte 0xe1,0x3f,0x49,0xe1,0x81,0x54,0x66,0x10,0x20,0x92,0x52,0xbc,0xf9,0xba,0x85,0xa3,0xdb,0x32,0x57,0x89,0x8b,0xe1,0xd7,0x0b,0xe8,0xb3,0x5a,0x38,0x65,0x7f,0x47,0xd8,0x4b,0x2b,0xca,0x54,0x47,0xbf,0x0f,0x82,0xfb,0x88,0xcc,0x29,0xfb,0xe4,0xf5,0x7a,0x89,0x9d,0xca,0x23,0x2b,0xe9,0xd1,0xaa,0xe2,0x32,0xd9,0x5e,0xc7,0x89,0x59,0xe9 .byte 0xc1,0x58,0x0b,0xa7,0x0f,0x18,0x00,0xc1,0x75,0x73,0x09,0xb0,0xd4,0x17,0xe2,0x98,0xe5,0x52,0xf9,0x42,0xe3,0xbb,0xe1,0x38,0xb7,0x3a,0x0a,0x1b,0x40,0xf5,0x96,0x41,0x5a,0x2a,0x0d,0x06,0xf3,0xc7,0xa0,0xcd,0x5c,0xa1,0x86,0xb4,0x2b,0x90,0x73,0xda,0x96,0xef,0x81,0x4e,0xc4,0x33,0x20,0x5a,0x60,0xb4,0x49,0xe7,0x3b,0x0b,0x2e,0x8c .byte 0x1c,0x45,0xb1,0x02,0x19,0xb3,0x77,0x4e,0x7d,0x25,0x7c,0x5f,0x10,0x7b,0xe7,0x5d,0x66,0xe5,0xd0,0x7a,0x65,0xea,0x13,0xa9,0x55,0x10,0xe1,0xb6,0xeb,0x79,0x14,0x06,0xd2,0xb2,0x07,0x90,0x8b,0x9e,0xea,0x47,0xbb,0x47,0x82,0x03,0xd7,0x97,0xc5,0xfb,0x54,0x16,0xd1,0x68,0x54,0xbe,0x66,0x5c,0xfd,0xc5,0xfb,0xd8,0x05,0x0c,0x5c,0x78 .byte 0xa6,0x41,0xa1,0x64,0x33,0xd2,0x74,0xe6,0x44,0x35,0xb8,0xf4,0x68,0x57,0xe4,0x33,0x9b,0x1e,0xb9,0xd0,0x19,0x00,0x6e,0xda,0x76,0xa8,0x73,0xd8,0xca,0xab,0x6d,0x85,0x43,0xfb,0xc3,0xa2,0x38,0x6c,0xbd,0x66,0x00,0x59,0x30,0x2b,0x25,0xf5,0xd8,0xb5,0xb9,0x73,0xca,0x05,0x81,0x78,0x2a,0x37,0x0c,0x03,0xaa,0xd4,0x72,0x24,0x51,0x1a .byte 0x7e,0x56,0x36,0x76,0x4f,0x0c,0x08,0x20,0x45,0x82,0xc0,0x29,0xb5,0xa6,0xde,0x17,0xc4,0x99,0x90,0x4b,0xd8,0xd8,0x3e,0xaf,0x31,0x38,0xfc,0x92,0x5c,0x50,0x70,0x32,0x77,0xc0,0x90,0xaa,0x7a,0x9a,0xf3,0xb1,0x68,0xa8,0xd8,0xe1,0xc7,0x34,0x08,0x41,0x0a,0xef,0x08,0x81,0x16,0x0c,0x0c,0xc4,0x8e,0x21,0xa6,0xb5,0x29,0x8e,0xf6,0x5a .byte 0x49,0x6e,0xf7,0x2e,0x29,0xdf,0xe7,0xab,0x90,0xea,0x97,0x50,0x97,0x6b,0xc1,0x78,0x72,0x0d,0x39,0x31,0x7a,0xca,0x7c,0xc8,0x74,0x69,0x9d,0x7b,0x49,0x33,0x6b,0xae,0x24,0x50,0x72,0xa5,0x8b,0xbb,0x2b,0xdb,0x06,0x15,0x69,0xb0,0x78,0x98,0xe6,0x10,0x78,0x34,0x89,0xf4,0xcf,0xc4,0x57,0x81,0x48,0x62,0x2d,0xa1,0x78,0x42,0x17,0x07 .byte 0x55,0x95,0x68,0x13,0xc2,0xf1,0x93,0x5a,0x50,0x46,0x68,0x1d,0x64,0x30,0x55,0xa2,0x66,0x75,0xf5,0x6d,0x1a,0x12,0x82,0xeb,0xcf,0xad,0x13,0xf3,0x8c,0x63,0x51,0x66,0xd0,0xd3,0x1c,0xd1,0x6b,0xb7,0xb2,0x7d,0xe9,0xbb,0xd9,0x5c,0xb5,0xb5,0x2c,0x77,0xc8,0x2c,0x38,0x86,0xb0,0x6d,0x6b,0x30,0x4d,0x93,0xd4,0x1f,0xea,0xbd,0xab,0x95 .byte 0x1d,0x91,0x8e,0x6b,0xcc,0x6d,0x98,0x99,0x21,0x21,0x2d,0x6b,0x46,0x91,0x1b,0x8d,0xcb,0xb3,0x4c,0x3b,0x28,0x5d,0x14,0xba,0xd2,0xd1,0x48,0x48,0xdf,0xca,0xc5,0xfa,0xc4,0xda,0x39,0xb3,0xa8,0x72,0x8a,0x1a,0x59,0x18,0xc7,0x17,0x6d,0xd6,0x3f,0x8c,0xf2,0xe5,0x3d,0x9c,0x49,0x1f,0x3b,0x5f,0xfb,0x8e,0x86,0x96,0x3a,0x56,0xe0,0x51 .byte 0x13,0x4f,0x4f,0xff,0x35,0x01,0x8e,0xd0,0x62,0xc8,0xf1,0x23,0x73,0x85,0xaa,0xcc,0x71,0xd7,0x04,0x7f,0x15,0xf7,0x6c,0xc0,0xf6,0x8d,0xd9,0xe9,0x65,0x79,0x76,0xfb,0x69,0xd7,0x7e,0x3f,0xed,0xfd,0x6f,0x33,0x0c,0x21,0x15,0x2e,0x1e,0xe2,0x37,0xdf,0x05,0xc0,0x16,0xae,0xa5,0x1e,0xff,0x10,0xed,0xaf,0xd2,0xc6,0x1a,0x72,0xc2,0x42 .byte 0x33,0x86,0x27,0xf4,0x63,0xc0,0xbb,0x48,0x78,0x87,0x60,0x5f,0x89,0xad,0x60,0xfd,0x1b,0xab,0xba,0xf7,0x07,0xd5,0x24,0x43,0xfa,0x47,0x24,0x5b,0x89,0x30,0xa8,0x2c,0x84,0xdf,0x09,0x6f,0x86,0x46,0xb5,0xe6,0x0b,0x62,0x69,0xc5,0xb6,0x67,0x14,0xe0,0xb9,0x00,0x7c,0xb4,0x55,0x1c,0xac,0x75,0x7b,0xc0,0x04,0x7a,0xc1,0xf1,0x28,0xe6 .byte 0xd5,0x50,0x2e,0x9f,0xbe,0xde,0xfd,0x9a,0x6f,0x0c,0xbc,0xfc,0x21,0xa0,0x63,0xbf,0x77,0x51,0x4a,0x82,0x11,0x17,0xef,0xd3,0x55,0xcb,0xc3,0x6b,0x62,0x4a,0x12,0xa9,0x33,0x96,0x2e,0x8f,0x13,0x89,0x72,0x60,0x74,0xfa,0x44,0x64,0xd7,0xe8,0x05,0xb7,0xdb,0x86,0x9a,0x7d,0x92,0xe2,0x45,0x0f,0xb8,0x9a,0x94,0x5c,0x4c,0x64,0x49,0xf4 .byte 0xde,0x6d,0x4b,0x0d,0xc5,0x50,0xe5,0xcd,0xaa,0x8d,0x30,0xb1,0xa6,0x14,0xb3,0xc7,0x1d,0xd9,0x88,0xb5,0xce,0xf1,0xb5,0x69,0x03,0xd5,0x21,0xbd,0xa9,0x59,0xd4,0x7d,0xe4,0xad,0xe7,0x6e,0x60,0xfb,0x71,0xb9,0x77,0xf4,0xc2,0xbf,0xe5,0xc3,0xb8,0x18,0x92,0x8a,0x17,0xf2,0x06,0xf8,0xd8,0xc9,0xcd,0xbf,0xfa,0xed,0x1b,0xf0,0xa4,0x32 .byte 0x7e,0x52,0x1d,0x44,0x45,0x3d,0xc6,0x29,0x05,0xd9,0xaa,0xc6,0x94,0xa2,0x7c,0xfb,0x42,0x32,0xf2,0x42,0xc6,0xac,0x26,0xf1,0x69,0xe3,0x43,0xe2,0xe1,0xff,0xa9,0xda,0xf7,0xf9,0x69,0x47,0xcd,0x24,0xa5,0x4c,0x9a,0xe0,0x15,0xa8,0xb3,0x08,0xfb,0xb3,0x07,0x81,0x18,0x62,0xb5,0x2f,0xd0,0xf1,0x59,0x8d,0xc2,0xf3,0x93,0xd2,0x4d,0x17 .byte 0xaf,0x22,0x5f,0x98,0x47,0x83,0x14,0x77,0x05,0x05,0x9c,0x0b,0x04,0x6f,0x83,0x83,0x68,0x86,0x95,0x8e,0x03,0xe7,0x5d,0x54,0xdf,0x6e,0x05,0xb6,0x12,0x9a,0x69,0x3a,0x88,0xcc,0x66,0xff,0x0c,0xa1,0x4f,0x09,0x5a,0xfd,0x58,0xd0,0xbb,0xa8,0x00,0x26,0xa2,0xfe,0xaa,0x2a,0xc1,0x22,0x9b,0x5e,0xc2,0x93,0xa0,0x08,0x34,0x93,0x47,0x48 .byte 0x9e,0x48,0xfd,0x0a,0x9f,0x3e,0xdb,0xe1,0xcf,0x4c,0xc4,0x07,0x74,0xf6,0xc8,0x30,0x39,0x35,0x23,0x8f,0x7c,0x9f,0xf8,0xd5,0xeb,0x93,0xb6,0x5d,0x50,0x14,0xcf,0xf5,0x3d,0x95,0x2e,0x41,0x06,0xb1,0x48,0x33,0x8f,0x0f,0x05,0xba,0x60,0xf9,0x14,0xd9,0x09,0x24,0x18,0x1b,0xe7,0xef,0xd9,0x57,0xd7,0xef,0xec,0x73,0xe7,0xf3,0xfd,0xa8 .byte 0xd3,0x3f,0x48,0xbe,0x17,0xf2,0x1d,0x00,0x2f,0x98,0xc7,0x76,0xda,0x1c,0x97,0x28,0x07,0xfe,0xe8,0xcb,0xfc,0xa0,0x6e,0x61,0x6c,0xb3,0x28,0x72,0xa8,0xb6,0x5f,0x78,0xa1,0x24,0x46,0xb0,0xff,0x7f,0x56,0xad,0x9a,0x52,0x2d,0xc3,0x40,0xf4,0xd3,0x65,0x63,0x4e,0xa1,0xb9,0x48,0x33,0x75,0x50,0xbb,0x18,0x06,0x07,0xa3,0xa7,0xe4,0x56 .byte 0x69,0xbc,0xa3,0xd8,0x20,0xa3,0xba,0x3e,0xc2,0x2f,0xe2,0x2c,0xe1,0xc9,0x74,0x75,0x56,0x2b,0xa8,0xde,0xc8,0x40,0x64,0x7f,0x60,0xfa,0x35,0x6f,0x2d,0x6f,0x14,0xb0,0xb3,0x45,0x3c,0x5d,0xcd,0x84,0x4f,0xb8,0xc6,0xbf,0xaa,0x49,0xfd,0xd4,0xbf,0x14,0xe2,0x1e,0x12,0xbf,0x67,0x78,0xf9,0xee,0x1e,0x75,0x96,0xe1,0x89,0x89,0xbe,0xc7 .byte 0x2f,0x33,0x6c,0xa4,0x38,0xc2,0x2d,0x0f,0xc0,0xa5,0x4e,0xd4,0xf8,0x65,0xc6,0x5b,0xd8,0x4d,0x5a,0xbb,0x1b,0xfa,0x56,0x37,0x72,0x6f,0x4f,0xd9,0x0f,0x22,0xdf,0x98,0x2b,0x92,0x68,0x83,0xb7,0xe4,0x01,0x1e,0x4a,0x2e,0xa6,0xf6,0x8e,0x4f,0xdc,0x45,0xac,0x5b,0xc9,0x47,0xad,0x96,0x22,0xce,0x72,0x66,0xc0,0xe3,0x5e,0xcf,0x1c,0x9d .byte 0x1b,0x96,0x99,0x08,0x6e,0x17,0x6c,0x46,0x77,0x4c,0x4e,0xe3,0x68,0xa5,0xf2,0x84,0xea,0x64,0xaf,0xe6,0x36,0x55,0xdd,0x0b,0xd6,0xe4,0x06,0x4d,0xc4,0x2b,0x34,0xbb,0x49,0xf9,0xac,0xe4,0xb2,0xbc,0xb3,0xa5,0x48,0x39,0xe5,0xc6,0x8e,0xc1,0xfb,0xe9,0x26,0x47,0x81,0x8c,0xcb,0xad,0xa0,0xbf,0xa9,0xf2,0xb3,0xfb,0xbb,0x14,0x52,0x7a .byte 0xf1,0xa4,0x01,0x88,0x06,0x30,0x7e,0x69,0x1c,0x97,0xff,0xfc,0x1c,0x0d,0x2b,0x69,0xaf,0x93,0xa0,0x0f,0x04,0xa3,0x9c,0xf2,0xde,0x61,0xa7,0x45,0x1c,0xa6,0x9c,0x2f,0x58,0x35,0x59,0x95,0x3f,0xff,0xbd,0xbc,0xc9,0xe5,0x2c,0xe3,0x48,0x1e,0xdc,0x36,0xe1,0xbe,0x30,0xc2,0xcb,0x80,0x8f,0x17,0x90,0xcd,0x0f,0x2d,0x94,0x3b,0x44,0xb5 .byte 0x6a,0x62,0xf1,0x93,0x2f,0xbd,0xf5,0x55,0xed,0xf6,0xfb,0xae,0x01,0x99,0x5a,0xc9,0xe3,0xed,0x78,0x39,0x65,0x81,0x06,0x5f,0xc3,0xb3,0x2e,0x8c,0xcf,0x59,0x47,0x75,0xbe,0x56,0x25,0x22,0x05,0xd8,0x0a,0x1b,0xbe,0x60,0xb2,0x8a,0xac,0x28,0xaf,0xb1,0x84,0x38,0x6e,0xba,0xc5,0x91,0x17,0x3a,0x63,0xa9,0xff,0x89,0x56,0xed,0x36,0x32 .byte 0xde,0x12,0xa8,0x38,0x92,0xbb,0x51,0xdd,0x6b,0x5e,0x97,0x68,0x8d,0x27,0x10,0xd9,0x83,0x98,0x02,0xd2,0x8b,0x75,0x88,0xae,0xd0,0x22,0x69,0x95,0xc1,0x6d,0x2d,0xec,0x01,0xd9,0x06,0xc4,0xd0,0xa2,0x45,0xc9,0xd6,0x48,0x49,0xeb,0xdb,0xd5,0x83,0x7a,0x06,0xc5,0x88,0xd9,0x6f,0xb4,0xba,0xc2,0xbc,0x83,0x23,0x0a,0x9f,0xe1,0x4f,0x54 .byte 0x34,0x80,0x78,0x2f,0x82,0xd2,0x86,0x20,0xa6,0x73,0xb7,0x4e,0x93,0x6c,0x8a,0xd4,0xe8,0x46,0xed,0xa8,0xe2,0xd5,0x1e,0xe3,0xb3,0xdb,0xde,0xbc,0x94,0x02,0xb7,0x37,0x10,0x94,0x1e,0x0b,0xc7,0xbd,0x60,0x38,0x04,0x29,0x92,0xef,0x01,0xe0,0x20,0x55,0xb3,0x0d,0x50,0xc9,0x0f,0x6a,0x46,0x5f,0x55,0x73,0xd5,0xec,0x2e,0x1e,0xa4,0x0f .byte 0xf4,0x3c,0xbe,0x5c,0xb7,0x81,0x78,0x0c,0xf0,0x7d,0x38,0x32,0x6a,0x9c,0x43,0x19,0x0f,0x51,0xe6,0x2f,0xe6,0xcd,0x09,0x07,0x92,0x93,0xfd,0x22,0x1b,0xec,0x75,0xfe,0x3a,0xf4,0xbe,0x8b,0xb6,0x9c,0x58,0xca,0xf8,0x9f,0xe5,0x8f,0x47,0x37,0xfb,0x6e,0xc9,0xe2,0xd7,0xb4,0x78,0xcf,0x0c,0x06,0xa8,0x30,0xd0,0x54,0x2e,0x84,0x79,0x44 .byte 0xc2,0x32,0xd3,0x8f,0x47,0xb6,0xa3,0x57,0x30,0xe5,0x72,0x44,0x54,0xd4,0xfb,0xe4,0x84,0xf8,0x4d,0x0e,0xbe,0xc8,0xf5,0xda,0xbb,0xb6,0x03,0xa2,0x47,0xaf,0xab,0x85,0xb2,0x3b,0x05,0x0b,0xb1,0x95,0x8c,0x3c,0x33,0x0e,0xee,0x5a,0x01,0x82,0x18,0x9b,0x8a,0x31,0x9e,0xde,0x75,0xed,0x0a,0x1e,0x0d,0x84,0x69,0x8a,0x51,0x57,0x12,0xc0 .byte 0x73,0x9f,0x24,0x65,0xe6,0x73,0xdb,0x2a,0x10,0x2a,0x76,0xc6,0x82,0xd7,0x06,0x68,0x03,0x78,0x83,0xf1,0xcb,0x32,0x80,0xf8,0x48,0xdf,0x2e,0x37,0xee,0x35,0xe2,0xd9,0x62,0x18,0xf5,0x54,0xbe,0x75,0x94,0x59,0x2b,0xa4,0xae,0x74,0x2e,0xaf,0xdf,0xc2,0xec,0x9d,0xe0,0x60,0x27,0x4b,0xef,0xb3,0x0b,0xa1,0x88,0x20,0x17,0x4f,0x07,0x83 .byte 0xfa,0x9a,0x30,0x3e,0x8a,0xc0,0xcf,0x4d,0x39,0xdd,0x92,0x46,0x62,0x9d,0x20,0x80,0x77,0x82,0x12,0x01,0x08,0x99,0x38,0xa8,0x92,0xa7,0xc0,0x61,0x75,0x6e,0x97,0xb4,0x4c,0x89,0x5a,0xf5,0x9f,0xee,0x08,0x56,0x66,0x0f,0x86,0xc3,0x49,0xee,0x3f,0x63,0x47,0x74,0xca,0x4c,0xc8,0x8a,0x8e,0x5a,0x70,0x80,0x65,0x10,0xb6,0x55,0x55,0x1f .byte 0x75,0x6a,0xf5,0x3b,0xfb,0x43,0xf2,0x21,0xd7,0xa6,0x5d,0x84,0xc1,0x56,0x8e,0x03,0x99,0x32,0xbd,0xf2,0x98,0xc4,0xdd,0x0e,0xf8,0xf1,0x33,0xbf,0xfb,0x2c,0xff,0x48,0x1a,0xd9,0x03,0x14,0x0a,0x88,0x4f,0x74,0xc4,0x7f,0x54,0x1b,0xa4,0x7c,0x52,0x84,0x24,0x89,0x16,0xc3,0xd7,0x4c,0x02,0xd4,0x4c,0xab,0x0d,0x07,0xf8,0xd8,0xe8,0x28 .byte 0xa3,0x04,0x14,0x5b,0xca,0xc3,0x72,0x86,0x0b,0x42,0x1b,0x5d,0x1a,0xbb,0x0d,0xa4,0xc6,0x0c,0x25,0xa2,0xdb,0x23,0x4b,0xa9,0x7c,0xdb,0xb5,0x09,0x08,0xed,0x23,0x01,0x3d,0x7b,0xa3,0xe2,0x24,0xa5,0xbd,0x56,0xe6,0xb5,0x13,0x32,0x0a,0x68,0xb3,0x14,0x0a,0xd6,0xf5,0xe6,0xc9,0x7a,0xb6,0xb6,0x31,0x47,0x15,0x66,0x7b,0x08,0xfb,0x20 .byte 0xa4,0x3f,0xca,0xc9,0x02,0x3a,0x5a,0x4e,0x1f,0x30,0x50,0x5c,0xc6,0x20,0x50,0x02,0x1e,0xf3,0x5f,0x62,0x0c,0x70,0x72,0xa8,0x5c,0x51,0x47,0x88,0x0a,0x06,0x1a,0x5a,0xa6,0x4a,0xe3,0x05,0x99,0xc8,0x0e,0x26,0x32,0x22,0x78,0x58,0x36,0x84,0x42,0x71,0xb4,0x3e,0x26,0x7d,0xe1,0x3d,0x76,0xd4,0xde,0x54,0xd0,0x78,0x17,0xe7,0x01,0xd7 .byte 0x93,0xae,0x58,0x77,0xde,0xc4,0xa6,0xfd,0x15,0xbf,0x21,0x59,0x19,0x8d,0xc4,0xf4,0xd5,0xf0,0x9a,0x22,0xe8,0x92,0x2f,0x9d,0x84,0x96,0x19,0xbb,0xc8,0xf4,0x76,0xfe,0xb4,0x43,0xa1,0xc9,0x87,0x65,0xf0,0x8d,0x95,0xeb,0x13,0xa3,0x9a,0xdc,0x42,0x8b,0xb6,0x2d,0xfa,0x94,0xb8,0xc1,0x51,0x75,0xdb,0xaa,0xe5,0x19,0xf3,0x05,0x66,0xf1 .byte 0x24,0xa7,0xf8,0x56,0x49,0x6d,0xe0,0xbc,0x9f,0xf7,0x39,0x1d,0xcb,0xec,0x7e,0x39,0xda,0x73,0xee,0x50,0x0f,0x19,0x2e,0xc4,0x54,0x44,0x06,0x1a,0x9b,0x46,0x9a,0x68,0x96,0xdf,0x3e,0x3a,0x23,0x9f,0x5d,0xac,0x92,0x51,0x9d,0xe5,0xcf,0x5f,0x7f,0xb4,0xd8,0x93,0xe3,0xd8,0x80,0xe9,0x96,0xd2,0x04,0x94,0x37,0x6e,0x49,0x44,0xff,0xb3 .byte 0xa5,0x97,0x35,0xb7,0x2e,0x04,0xae,0x2d,0xf2,0x77,0xc7,0x19,0x3a,0xd9,0x35,0x9a,0x91,0x18,0xe1,0xb9,0xb0,0x22,0x99,0x76,0xb7,0x69,0xe6,0xc6,0xf1,0xee,0xdf,0xce,0x35,0xd5,0xbe,0xc7,0x02,0x57,0x2b,0x4a,0x72,0x6a,0xe3,0xd7,0x75,0xab,0xa5,0x2a,0x6a,0xeb,0x76,0x92,0xab,0x37,0x41,0x64,0x4d,0x0a,0x99,0x82,0xc3,0xe1,0xab,0x70 .byte 0x4c,0xaa,0x85,0x90,0xc2,0x2f,0x5a,0x91,0x31,0x93,0xeb,0x8e,0x1f,0xec,0x30,0x40,0xb3,0x95,0xc8,0xef,0x06,0x74,0xc5,0xb6,0x65,0xf9,0x10,0xe7,0xce,0x9b,0x12,0xee,0xe8,0x02,0x5f,0xa5,0x0b,0x42,0x34,0x38,0xb3,0x7b,0x89,0x30,0xac,0x25,0x81,0x2c,0x48,0x22,0xa6,0xa8,0x4e,0x6b,0x1a,0x53,0x2b,0x35,0xa9,0xbe,0x5d,0x4e,0x97,0xc6 .byte 0xc2,0x9a,0x51,0xff,0xcc,0x21,0x42,0x98,0x85,0x64,0x37,0x79,0x3e,0x33,0x10,0xbc,0x26,0x0b,0x71,0xb0,0x15,0x01,0xc7,0x21,0x1f,0x62,0x55,0x8d,0x91,0x57,0x10,0x6d,0x3e,0x95,0xa8,0x38,0xb2,0x9d,0x8e,0x90,0x73,0x4a,0x2f,0x48,0x08,0x09,0xfb,0x76,0x24,0xc4,0x91,0x7d,0x56,0x60,0xd4,0x96,0x46,0x61,0xc9,0xc8,0x3e,0xd0,0xc4,0x51 .byte 0xc5,0x03,0x2e,0xb6,0xec,0x64,0x56,0x54,0xbe,0x7a,0x77,0x19,0x0d,0xbc,0xdb,0x77,0x67,0x23,0xb2,0x32,0xd3,0x39,0xe8,0x9b,0xf0,0xe7,0xc0,0xf1,0x35,0x9a,0x9d,0x13,0x3f,0x10,0x0d,0xb6,0x89,0x49,0x93,0x64,0x9c,0x64,0x6f,0xdf,0x4d,0x6c,0x50,0x4a,0xfb,0x87,0x2f,0x58,0xcd,0xe7,0x12,0x89,0xe8,0x3d,0x14,0xf2,0xff,0xc3,0x51,0xe0 .byte 0x33,0x8a,0x98,0x37,0xc2,0x71,0xea,0x61,0xde,0x64,0xa3,0xae,0xad,0xff,0x70,0xe9,0x7f,0x89,0x7a,0xee,0x3e,0xec,0x71,0xa2,0xd5,0xa2,0xa3,0x46,0xde,0x93,0x35,0x78,0x18,0x43,0xd5,0xa0,0x61,0x0b,0x82,0x4b,0x59,0x80,0xb7,0xc4,0x63,0xb2,0xf6,0x45,0xe3,0x4e,0x73,0x94,0xdb,0xdf,0x86,0xec,0x32,0x5a,0x0c,0x7d,0xc7,0xf1,0xda,0x35 .byte 0xb8,0xdf,0x5b,0x31,0xfc,0x85,0x7b,0xcf,0xe6,0x19,0xc2,0x13,0xab,0xee,0x06,0x1f,0x30,0xa7,0x6f,0x50,0xfe,0x38,0x84,0x83,0xd5,0x08,0x2c,0x13,0x81,0x7d,0x5d,0x2d,0x7d,0xa5,0x9c,0x56,0x77,0xb8,0x0e,0xc0,0x4e,0x7e,0x16,0x0b,0x79,0xa5,0x87,0x64,0x9f,0x7c,0x8e,0x44,0x3f,0x6d,0x24,0x62,0x6c,0xc7,0x24,0x23,0x08,0x03,0x5f,0xd1 .byte 0x7c,0x3e,0x63,0x69,0xff,0x7d,0xbf,0xe2,0xc7,0xc0,0xdf,0x77,0x9c,0x02,0x5d,0xaf,0xb9,0x80,0xaa,0x50,0x66,0xd7,0xb4,0x2b,0xc9,0xef,0x3f,0xbc,0xf5,0x35,0x92,0xc7,0xea,0xcc,0xf6,0x5a,0x4f,0xe6,0xcd,0x09,0x0f,0xb9,0x1f,0xe7,0x05,0xb1,0x2d,0xe3,0xc1,0x08,0xf7,0x59,0xe1,0x7c,0x74,0xad,0xbc,0x25,0x03,0x97,0xba,0x72,0xe8,0x0e .byte 0x78,0x18,0xf1,0x42,0xc2,0x7e,0xbf,0x4e,0x89,0x07,0xe3,0x80,0xfa,0x25,0x09,0x0f,0x3f,0xac,0xce,0xea,0xe0,0xe5,0x15,0xff,0x7a,0xb4,0xc7,0x7f,0x58,0x17,0x89,0x55,0x7f,0x85,0xeb,0x07,0x38,0x92,0x68,0x03,0x6d,0x33,0x5c,0x2b,0xfd,0xd6,0x53,0x8d,0x1f,0xbc,0xac,0x82,0xda,0x88,0xc6,0xf3,0x1f,0xa3,0x25,0x0a,0xa4,0xae,0x94,0x91 .byte 0x06,0xda,0xe7,0x04,0x9b,0x84,0x08,0x01,0x79,0xa0,0x79,0x20,0xf8,0x4b,0xd9,0x94,0x24,0xa8,0x59,0x59,0xd6,0xaf,0xe9,0xc1,0xcd,0xb4,0x8b,0xf0,0x49,0xda,0x13,0x9a,0x4e,0x53,0x31,0x74,0xbb,0x8c,0x51,0xfa,0x95,0x9a,0x27,0x73,0x0c,0xde,0x58,0x73,0x12,0x4b,0x3c,0xe6,0x69,0x48,0x9e,0x63,0xbf,0xe5,0x2e,0xf7,0x2e,0x6a,0xe3,0x05 .byte 0x5f,0x70,0xa6,0xfa,0x29,0x9c,0x12,0x2d,0x2d,0xb1,0x32,0xc0,0x52,0xbd,0x1a,0x88,0xae,0x0d,0x92,0x4d,0x17,0xa8,0x02,0x81,0xf6,0xca,0x1a,0x46,0x70,0x58,0xc6,0x6f,0x45,0x50,0x64,0x9a,0x1b,0x36,0x3e,0x40,0x68,0x84,0x3a,0xb1,0xb7,0xc5,0xe9,0xb5,0x60,0xe4,0x75,0x4e,0x8c,0x27,0xc4,0xd3,0xcd,0xe5,0xa9,0x0c,0x23,0x85,0x3e,0x22 .byte 0xcf,0xa6,0x62,0x29,0x82,0xd4,0x37,0x6e,0x98,0x67,0x43,0xc7,0x43,0x67,0xfd,0xa6,0x0c,0x7f,0x76,0xa8,0x18,0xf0,0xa9,0x76,0x69,0x9a,0x8f,0x1c,0x88,0x7e,0x22,0xce,0x1c,0x3e,0xf2,0x0b,0x3a,0xf1,0xd0,0xf6,0xcc,0xfe,0xf5,0x58,0xef,0x50,0x7c,0xe4,0x3f,0xef,0xb4,0x5b,0xce,0xbc,0x55,0x5b,0x9e,0x9e,0x49,0xa5,0x5d,0xd5,0x0b,0xe7 .byte 0x71,0x0b,0xbf,0x7c,0x82,0xee,0x2c,0xd7,0x7e,0x97,0x75,0x9c,0xea,0x04,0x7c,0xde,0x16,0x96,0x0b,0x89,0x50,0x83,0xf2,0xd2,0x1d,0xba,0x2b,0x0d,0x4f,0x79,0x5f,0x29,0xb0,0xf5,0x07,0x68,0x19,0x5d,0x5d,0xc8,0x31,0x95,0xe8,0x50,0x15,0x76,0x7d,0xab,0x3b,0x9a,0xa8,0x8a,0xea,0x5b,0xaf,0xc6,0xfc,0x1a,0x2d,0x4d,0x14,0xee,0x7c,0x2b .byte 0x6e,0xaa,0xe1,0xc4,0x0e,0x17,0x87,0x30,0x67,0xca,0x19,0xa5,0xb7,0xed,0x3b,0x8e,0xca,0x98,0xd0,0xa7,0x0b,0x0e,0x0f,0xd8,0x40,0x9b,0xb6,0x7c,0xef,0xd1,0x83,0xb7,0xaf,0x43,0x64,0x9e,0x66,0x9a,0xdf,0xb6,0x5c,0xf0,0x36,0xea,0xfb,0xea,0x0a,0x03,0x8e,0xde,0x3d,0x3f,0x69,0x3a,0x38,0x91,0x62,0x41,0x8e,0x70,0x11,0xd7,0x59,0x05 .byte 0x3e,0x52,0x36,0x43,0x6e,0x09,0x67,0x35,0x8e,0x0c,0x6d,0x3b,0xb4,0x6b,0xc7,0x8f,0xe8,0x53,0x77,0x6d,0x4d,0xa9,0x0d,0x2a,0x96,0xd3,0x1b,0xe8,0x3a,0x8f,0xfa,0xd2,0x17,0xfd,0x1f,0xce,0x90,0x99,0xb0,0xda,0x15,0x1c,0xe0,0xe9,0xff,0xc8,0x8b,0x5a,0x1a,0x0d,0x83,0x1a,0x99,0xaa,0x73,0x43,0xb1,0x68,0x10,0xed,0xf5,0xbd,0x67,0xdb .byte 0x1f,0x1c,0x12,0x9b,0xa2,0x91,0x3b,0xe6,0x72,0x9a,0xc8,0x55,0x23,0x5a,0x05,0x4b,0x7b,0x9c,0xa2,0x28,0xc6,0xcb,0x0a,0xac,0x59,0x25,0xb2,0x7a,0xb2,0x02,0xae,0xc4,0x61,0x7d,0x5c,0x90,0x1e,0xcd,0xce,0xd6,0x9f,0x6f,0x1b,0x93,0x6d,0xec,0xb6,0xa0,0xcf,0x6e,0xea,0x4e,0xfb,0x23,0xf2,0x39,0xab,0x7f,0x45,0x40,0x16,0x4f,0xf6,0x0e .byte 0x09,0xf7,0x85,0x03,0xee,0x3c,0xaa,0xb1,0x0e,0x07,0x2b,0xee,0x65,0xca,0x9a,0xa9,0xc8,0x78,0x97,0x77,0x38,0xaf,0x32,0x97,0x0a,0x2f,0xd4,0x7a,0xf8,0x04,0xc7,0xcc,0xce,0xe6,0x9d,0x10,0xe7,0xf6,0xc1,0x4c,0x24,0xd1,0xcc,0x79,0x53,0x5a,0xc8,0xf9,0xfc,0x08,0x2a,0xe1,0xb4,0x51,0xc4,0x12,0x3e,0x50,0xf9,0x73,0x9d,0x42,0x85,0x4b .byte 0x4e,0x68,0x7c,0x7b,0x8f,0xe1,0xc6,0xe2,0x07,0xa9,0xc1,0xca,0x35,0x56,0x58,0x40,0x8a,0xc7,0x6d,0x7f,0x9d,0x91,0xff,0x32,0xc3,0xc9,0x58,0x56,0x67,0xc5,0x51,0x2d,0x3f,0x98,0x16,0x4b,0x95,0x4e,0xed,0x83,0x7a,0xe5,0x6b,0x21,0x91,0x4a,0x8d,0xcc,0x26,0x21,0x59,0x4e,0xe6,0x05,0x6a,0xd2,0x83,0xba,0x6b,0x8a,0x4f,0xe5,0x03,0xd1 .byte 0x81,0x5b,0x84,0x07,0x9a,0xe1,0xf5,0x55,0x5c,0xfa,0x9f,0xad,0x15,0x20,0x7f,0xc6,0xc8,0x3a,0x7e,0xd8,0x2e,0x56,0x96,0x38,0xc2,0xe8,0xae,0xfb,0x28,0x44,0x6e,0x23,0x64,0xdd,0xfd,0x2e,0x86,0xea,0x7a,0x97,0xa4,0x50,0xdb,0x1f,0xa5,0x8e,0xaa,0x54,0x56,0x41,0x51,0x91,0x47,0xf7,0x5b,0xb5,0x33,0x74,0x65,0x41,0x9c,0xc8,0x19,0xde .byte 0x66,0x2d,0x18,0xb2,0x05,0xc6,0x24,0xd1,0xd5,0xd5,0x4e,0xba,0x25,0x8c,0x28,0x7d,0xf4,0xb5,0x2a,0xc4,0xef,0xac,0xa0,0x82,0x78,0x96,0xe3,0x7a,0x5f,0xca,0xd9,0xc4,0x38,0xa9,0xb8,0xfa,0x7e,0x04,0x16,0x5f,0x4e,0x02,0xf5,0x45,0x6c,0x7f,0xbe,0x8e,0x94,0x45,0xaa,0x85,0x5a,0x74,0x36,0x47,0xb7,0xc5,0x2b,0xfd,0xc3,0x70,0x4b,0x39 .byte 0x66,0x9c,0x84,0x45,0x32,0xb9,0x32,0xd6,0x1f,0x72,0xdb,0x81,0x81,0x72,0x6d,0x54,0x55,0x0f,0x83,0x92,0xca,0x8e,0xd1,0xf9,0x18,0x4d,0x24,0xd0,0x9a,0xa6,0xc4,0xfb,0x36,0x34,0xe6,0x9a,0xac,0xe6,0x25,0xe5,0x28,0xf0,0x09,0xd7,0x10,0x41,0x66,0xd5,0xf3,0x43,0xa8,0x03,0xcb,0x8e,0x5a,0x1b,0x3a,0x70,0x9e,0x33,0x79,0x42,0xe3,0xea .byte 0x74,0x45,0x44,0x64,0x89,0xa1,0xf9,0x0f,0xe8,0x8f,0x40,0xcb,0x60,0x63,0x0d,0x11,0xe3,0xda,0x37,0x94,0x4d,0x8f,0x84,0x89,0x92,0x46,0x4a,0xf3,0x9f,0xce,0xfc,0xaa,0x4c,0x0c,0xfc,0x8d,0xff,0x6f,0x73,0x91,0xce,0x55,0x47,0x4f,0x7c,0xcc,0x01,0x27,0xd1,0x4f,0xbe,0x70,0x05,0xbb,0xee,0xb4,0xdd,0x4f,0xf5,0xca,0xb3,0xab,0x7e,0x68 .byte 0x8b,0x21,0x03,0x8a,0xfe,0x63,0x43,0xfd,0x06,0xf6,0x0a,0xa2,0xae,0x5b,0x88,0xed,0x4c,0xbd,0xa4,0xf7,0x84,0x0b,0x43,0xba,0xed,0xf1,0x58,0x7e,0xea,0x5c,0xc0,0x90,0x1c,0x50,0x60,0x6b,0x06,0x93,0xe5,0x3f,0xe1,0xec,0x5e,0x3e,0xd0,0x14,0x15,0x04,0x6a,0x13,0x4c,0x28,0xa7,0x7b,0x7b,0xeb,0xb0,0x59,0xa2,0x08,0x33,0x73,0xa2,0xc5 .byte 0x57,0x51,0x8e,0xd3,0x8b,0xbd,0x83,0xe4,0xd3,0x5b,0x6f,0x6b,0x61,0xf7,0x7d,0x17,0xed,0x7f,0xea,0xcf,0x56,0x03,0x87,0x2f,0x50,0xbc,0x73,0xc8,0x84,0x7c,0xb1,0xfd,0xe6,0x6c,0x95,0x79,0x97,0x7f,0xd9,0x8d,0x0d,0x4e,0x21,0xde,0x82,0x5c,0xb7,0x96,0x22,0xff,0x2f,0xaa,0x85,0x25,0x62,0x65,0x8b,0xc1,0x3a,0xa9,0xa3,0xef,0xc6,0x27 .byte 0x1f,0xfe,0xc5,0x5d,0x27,0xee,0xe0,0x5a,0x7b,0xa2,0xdc,0x6d,0xad,0xa1,0x60,0xcd,0xcc,0x8f,0x6e,0xa2,0xfd,0xaa,0x64,0x12,0x86,0x61,0x5a,0x61,0x93,0x3e,0x9c,0x0d,0xe5,0x1a,0x8a,0xb4,0x00,0xbb,0xc6,0x31,0x0f,0xb5,0x9b,0x1c,0x75,0x3e,0xdf,0x02,0x86,0x9c,0xf4,0x3e,0x10,0xf2,0x5e,0x47,0xb4,0x1f,0x73,0xb9,0x09,0xe4,0xcc,0x3d .byte 0x45,0xe0,0xa7,0xa9,0x27,0xc9,0x26,0x13,0x81,0x81,0x94,0xed,0x16,0x16,0x44,0x22,0x74,0x9b,0x0c,0x98,0x8b,0xbc,0x88,0x01,0x26,0x0e,0x04,0xa4,0x74,0x85,0xa7,0x7e,0x65,0x1e,0x83,0xa5,0xb5,0x73,0xbb,0xa7,0xd8,0x54,0xf6,0xa7,0xc3,0xb7,0x75,0x7c,0x56,0x6b,0x26,0x11,0x2f,0x4f,0x14,0x56,0x39,0x58,0x2a,0xee,0xf1,0x33,0x9f,0x7b .byte 0x76,0x9b,0xf6,0xcc,0xa6,0x3f,0xd7,0xc5,0x0a,0x3d,0xfa,0x20,0x5a,0x79,0xf5,0x1e,0x51,0xa6,0x5c,0xcf,0xab,0x41,0xbf,0x30,0x91,0x85,0xb2,0x84,0x8d,0xd8,0x69,0xa2,0x4e,0xd6,0x8d,0x57,0x2e,0xaa,0x6b,0x68,0x24,0xd7,0x4d,0xf7,0xb2,0x23,0x1b,0x37,0x4e,0x8e,0xc6,0xbb,0x00,0x95,0x06,0x84,0x99,0x10,0x15,0xa3,0xcc,0x33,0x6e,0x69 .byte 0x5f,0x5b,0xb0,0x0f,0xd4,0x76,0x1f,0x5d,0xba,0x05,0x87,0x49,0xbd,0x35,0x11,0x8b,0x57,0x4d,0xa0,0x17,0x3d,0xc2,0xc3,0xde,0x61,0x0f,0x75,0x4a,0x92,0x44,0xc0,0x4b,0x6c,0xa0,0x78,0x95,0xa7,0xf5,0x0b,0x8b,0xf9,0x20,0xb1,0x01,0xdc,0x67,0x37,0x68,0xd7,0x41,0xb2,0xe7,0x9d,0x24,0x6f,0x14,0x36,0x74,0xe4,0x23,0x0b,0x9e,0xec,0xe0 .byte 0xaa,0xa2,0x4a,0x1f,0x69,0x1a,0xac,0x52,0xf5,0x67,0x11,0x76,0x7b,0xed,0x07,0x73,0xd6,0x5d,0x94,0xd6,0xab,0x9e,0x85,0xdc,0xfc,0xa8,0xa6,0x40,0x15,0xa2,0x56,0xcf,0x74,0x22,0x25,0xcd,0xf5,0x9c,0x39,0x8c,0xf5,0x89,0xd9,0x2d,0x82,0x82,0x59,0x30,0x8c,0xe7,0x0b,0x85,0x93,0xad,0x42,0x6a,0x49,0x9a,0x19,0x54,0x12,0xcf,0xf8,0xb7 .byte 0x33,0xc2,0x75,0xf7,0xcf,0x91,0xdb,0xda,0x8e,0x4e,0xc5,0xc0,0xe5,0xe6,0x52,0x03,0xdd,0x11,0x18,0x5b,0x21,0xa2,0x7e,0x6c,0x43,0xd3,0x38,0xa2,0x92,0x55,0x6f,0xd4,0xf6,0x8f,0x95,0xf1,0x70,0x1b,0xf3,0x86,0x53,0x5e,0xd7,0x17,0x5f,0x81,0x7f,0x58,0x53,0x35,0x53,0x40,0x95,0x0b,0x46,0x13,0x8e,0x9e,0x6e,0x4c,0xc4,0xe0,0x11,0x4d .byte 0xb7,0xf8,0x68,0x89,0xfa,0xe5,0x60,0x33,0xe2,0xc3,0xf8,0x8e,0xcf,0xf9,0xc9,0xd8,0x06,0xd0,0x0b,0x25,0xcd,0x4d,0x2f,0xbe,0x5e,0x81,0xe0,0x02,0x74,0x93,0xd0,0x8a,0x33,0x77,0xab,0xe6,0x17,0xd5,0xb1,0x53,0x6b,0xfc,0x94,0x88,0x1f,0xc4,0xf3,0x42,0x3e,0x16,0x54,0xf6,0xa5,0x05,0x58,0xe4,0x91,0x79,0x51,0x9d,0x29,0xd1,0xd1,0x69 .byte 0xa9,0xb5,0xd1,0x2c,0xe5,0x47,0xea,0x2d,0x67,0x59,0xea,0xa4,0x0e,0x1f,0xde,0xfb,0xe2,0x16,0xe1,0xc2,0xb2,0x36,0x3b,0x15,0x84,0x19,0xc1,0xee,0x37,0x49,0x8f,0x1c,0xf8,0x3d,0xc7,0x94,0x39,0xab,0xf2,0xdc,0x7c,0x53,0xc1,0xb4,0x89,0x65,0x73,0xe0,0x91,0x8a,0xa3,0xa7,0xb4,0x05,0x7d,0x18,0x9d,0x2d,0x13,0x76,0x9d,0xfc,0x9d,0xef .byte 0x0b,0x02,0x61,0xc0,0x2d,0xa0,0x6e,0x2b,0x0b,0xbb,0x9f,0x53,0xc1,0x20,0xcc,0x58,0xbe,0xf3,0x56,0xb4,0x68,0x82,0x30,0xfc,0xb6,0x4f,0x7d,0x03,0x56,0x37,0x68,0x97,0xa8,0xea,0x9d,0x20,0x2b,0x46,0xd7,0xdc,0xce,0x8b,0x1a,0x29,0x5c,0xa0,0x35,0x34,0x86,0xcb,0xbb,0xdb,0x8b,0xc4,0x6b,0x2b,0x4f,0xab,0xc5,0x8b,0x34,0x92,0x5c,0xbd .byte 0x2f,0xf4,0xd6,0x40,0xf8,0xc7,0x0e,0x4b,0x1e,0x8d,0xf6,0x45,0x2e,0xa9,0xb0,0xec,0xdb,0xe0,0x71,0x23,0xe4,0x89,0xa9,0x22,0x89,0x20,0x12,0x94,0xa0,0x00,0xca,0xb0,0xf3,0xac,0xda,0x27,0x4d,0xcf,0x76,0xd3,0xa9,0x2b,0xc4,0x0a,0x5d,0xd0,0x7f,0xf8,0x8f,0xa7,0xb3,0x5e,0xf6,0xb8,0x36,0xc0,0x50,0x6e,0x23,0xb8,0xb8,0x55,0x0e,0xf9 .byte 0x3c,0xed,0x24,0xde,0xf0,0xb3,0x83,0x09,0xae,0xfa,0xed,0x71,0xb1,0xd8,0xd1,0x9e,0x35,0xf6,0x2c,0x83,0x89,0xc7,0x86,0x25,0xb1,0xc3,0xac,0x09,0xf9,0x52,0xe4,0xf1,0xc7,0x82,0x54,0x33,0xa4,0xbe,0xc6,0x92,0xa2,0x54,0x43,0x25,0x51,0x6a,0xa3,0x87,0x45,0x32,0x9f,0x46,0x37,0xf2,0x55,0xbd,0xb5,0x54,0x7b,0xcf,0xfb,0xf8,0x3e,0x80 .byte 0x35,0xb6,0x76,0xc0,0x4c,0xe7,0xf7,0xd8,0x69,0x4c,0xa7,0x53,0xb5,0x5a,0xbf,0xa4,0x6d,0x99,0xc0,0x54,0x92,0x16,0x9b,0x89,0x57,0x32,0x20,0x71,0x31,0xa9,0x72,0xb8,0xca,0x69,0x0b,0x3f,0x82,0xaf,0x72,0xa6,0x99,0x08,0x17,0x02,0x9e,0xc1,0xa5,0x83,0x53,0xa7,0xea,0x11,0x17,0x23,0x1d,0xbf,0x82,0x29,0x93,0x49,0x15,0xe8,0x60,0xc6 .byte 0xf2,0x04,0x9a,0xa3,0x34,0x1e,0xa2,0x4f,0xe1,0xa8,0x4d,0xd4,0xc2,0x92,0x84,0x6a,0xa9,0x15,0x68,0x91,0xd3,0x73,0x8f,0x6f,0xab,0x24,0x63,0x8a,0x9d,0x51,0x79,0x8f,0x90,0x74,0x4d,0x67,0xeb,0x21,0x12,0x07,0x6d,0xee,0x7f,0x9e,0x07,0xbb,0xfc,0xe6,0xad,0x02,0x69,0x85,0x02,0x48,0x44,0x32,0x39,0xf7,0xd5,0x1c,0xd9,0xb2,0xe7,0xdd .byte 0x5a,0x92,0x42,0x3d,0x75,0x7f,0x06,0x14,0x18,0xda,0x1e,0x9d,0xa0,0x36,0x8b,0xe8,0xf3,0x69,0x1c,0x2a,0x93,0xc5,0x98,0x0c,0xd3,0xe0,0x5c,0x08,0xbb,0x21,0x02,0xfb,0xa9,0x5e,0xe8,0x18,0x44,0x01,0xb6,0x61,0x17,0x9c,0x2e,0xff,0x61,0xc1,0xe4,0xf6,0x08,0xbe,0x08,0xaa,0x74,0xaa,0x7d,0x8e,0x51,0x49,0xc4,0x52,0xd0,0xe7,0xc4,0xfc .byte 0xf0,0x05,0x6f,0xff,0x47,0x64,0xda,0x13,0xcb,0x7f,0x74,0x45,0x35,0x67,0x3c,0xe4,0x2f,0xd3,0xd8,0x6c,0xc3,0xb9,0x71,0x9f,0xe0,0xc8,0x8c,0x21,0xb9,0x4f,0xdf,0x2f,0xfe,0x5b,0x26,0x0d,0x0e,0x9f,0xa5,0x38,0x1b,0x9a,0xc8,0xca,0x63,0x37,0xd1,0xf3,0x8e,0x78,0xcb,0x29,0x28,0xc2,0x24,0x67,0xb2,0xa9,0xc5,0xb0,0xc0,0xc0,0xb7,0xb9 .byte 0xcb,0xb9,0x1d,0x31,0x76,0xc8,0x84,0x8e,0x99,0x0b,0xec,0x90,0x56,0x45,0xed,0xe7,0x11,0x2f,0x01,0x93,0x22,0x13,0x21,0x33,0x75,0x41,0xf3,0xf4,0x1d,0xb6,0x0d,0x60,0x65,0xe8,0xf2,0x0d,0x91,0x02,0x8c,0xa2,0x95,0xa8,0x82,0x65,0xd7,0x9b,0x7d,0xeb,0x6c,0x8a,0x77,0x04,0x79,0x6d,0x89,0x9d,0xf6,0x0e,0x47,0x10,0x1f,0x0d,0x8d,0x87 .byte 0x47,0x72,0xce,0x3e,0x7e,0xa5,0xc4,0x67,0x46,0x18,0x67,0xc2,0xb6,0xee,0xe4,0xad,0xdd,0xb1,0x40,0x96,0xf0,0x5d,0x46,0x3f,0x23,0xc8,0xef,0x06,0x26,0xd2,0xf7,0x88,0x6f,0xb2,0x3d,0xf3,0xd7,0x9c,0x1b,0x11,0x65,0xf9,0xdd,0xbd,0x67,0x18,0x6c,0x2a,0x1f,0x00,0xef,0xf3,0x64,0x42,0x9e,0x96,0x5e,0x9e,0xe8,0xeb,0x39,0x5f,0x3f,0x87 .byte 0xce,0xb7,0x1f,0x8f,0x3b,0xff,0xd8,0x93,0x9a,0xc7,0xbb,0xb4,0xc7,0xb5,0xa9,0xaa,0xcb,0x80,0x03,0x96,0x04,0xdd,0xce,0x60,0x28,0xe0,0x9d,0x74,0xf1,0x7f,0x8a,0x44,0xe4,0x10,0x42,0x12,0xd4,0xaa,0x7a,0x43,0x24,0x3b,0xaf,0x20,0x7f,0xaa,0x0f,0xda,0x00,0x14,0xe3,0x30,0x55,0x18,0xd0,0xcf,0x03,0x23,0xe2,0x56,0x94,0xa7,0xc3,0xca .byte 0xde,0x1b,0x80,0xad,0x36,0x61,0x23,0xf1,0x2c,0xc3,0x05,0x18,0x82,0xb7,0x55,0x91,0xe7,0x51,0x92,0x6c,0xe5,0xdb,0x5f,0x1e,0xf3,0xfd,0x72,0x49,0xb4,0xe7,0xa4,0x03,0x21,0xfb,0xb5,0x75,0xe4,0xd2,0x9f,0x17,0x64,0x36,0x5b,0x8b,0x9a,0x33,0xeb,0x02,0xa7,0xfe,0xbd,0xb2,0x03,0x89,0xe7,0xba,0x65,0x96,0x56,0x9e,0x9f,0xde,0xbc,0xed .byte 0xa5,0x4c,0x69,0xed,0x04,0x42,0x5b,0x1d,0x20,0x37,0x45,0x10,0xbd,0xf7,0x14,0x92,0x58,0x41,0xb5,0x87,0xf9,0x47,0xb5,0xa6,0xa8,0xc1,0x53,0x71,0x59,0xcb,0x9d,0xa4,0xa9,0x7d,0x42,0x64,0x2a,0x74,0xa9,0x64,0x1b,0x08,0xca,0x9a,0x30,0x92,0xfc,0x48,0xff,0x30,0x63,0x88,0x12,0xa7,0x48,0x03,0xb9,0x5a,0xf6,0xa1,0x51,0x4e,0x51,0xe1 .byte 0x82,0xe3,0xe7,0x5d,0x6d,0xab,0x53,0x06,0xbd,0x85,0x43,0xb1,0x67,0x1a,0xf3,0x14,0xe7,0x0a,0x15,0x93,0x3a,0x0d,0xac,0x30,0x1d,0xe0,0x2c,0xae,0x54,0xef,0x60,0x0b,0xb0,0xee,0x20,0x14,0x71,0xc2,0x27,0x4e,0x08,0x6e,0x0f,0x32,0x53,0x2a,0xb0,0x22,0x15,0xe0,0x11,0xd1,0x76,0x65,0xbf,0x3c,0x9c,0x05,0x1e,0x00,0xba,0x58,0x2a,0xdc .byte 0xac,0xb4,0x8c,0x12,0xe3,0x56,0xca,0xc1,0x6b,0x10,0x11,0x64,0x1c,0x58,0xfe,0xb5,0x6b,0x7f,0xb1,0x67,0x01,0xd8,0x38,0x3e,0x18,0x49,0x0d,0x04,0x9c,0xb4,0x9a,0x34,0xdd,0x18,0x87,0xfc,0x69,0x0d,0xe1,0x9b,0x5c,0x48,0xda,0xa6,0xa3,0x39,0x8a,0xc1,0x5d,0x7a,0x43,0xa2,0xad,0x83,0x6f,0x9c,0x4d,0x90,0xe7,0x87,0x10,0x35,0x39,0xb8 .byte 0xa2,0x19,0xa5,0x42,0xb2,0x8f,0x50,0xf4,0x1e,0xa4,0x08,0x7b,0x16,0x99,0xa1,0xa5,0x07,0x52,0xc8,0x62,0xa5,0x2c,0xc1,0x10,0xb1,0x81,0xa9,0x50,0x4e,0x66,0x5e,0x65,0xca,0x28,0x9b,0x5a,0x3f,0xe9,0xc2,0x68,0xb9,0xc3,0x5f,0xe8,0x11,0x27,0xac,0x05,0xbf,0x1b,0x0b,0xcd,0x84,0xa3,0x73,0xdd,0x6f,0x70,0x5c,0xbe,0x54,0xc1,0xbd,0x03 .byte 0x15,0xe2,0x5f,0x6b,0x12,0x6f,0xb0,0xa4,0x33,0xfc,0x32,0x14,0xcd,0xbc,0x39,0x17,0x68,0xc9,0x00,0x60,0xd4,0x6b,0xf6,0xc3,0x67,0x3e,0xd4,0x09,0xb7,0xf6,0x04,0x3c,0xc5,0x80,0xeb,0xca,0x1e,0xd2,0xc9,0x7c,0x36,0x10,0xc1,0x1e,0xe3,0x52,0x54,0x5d,0xe6,0x34,0x46,0x26,0x7c,0xdd,0x4d,0xa3,0xc2,0x6b,0x73,0x5e,0xa7,0xcf,0x91,0x34 .byte 0xf7,0xea,0xa8,0x09,0xf3,0xd3,0x14,0x5b,0x0e,0x72,0x0f,0xb7,0xd5,0xfb,0xbd,0xe6,0x19,0x32,0x5d,0x58,0xe1,0x6e,0x5b,0xed,0x4b,0x3b,0x8f,0x94,0x29,0x6c,0x0f,0xac,0xd5,0x69,0x4e,0xa4,0x9d,0xf7,0xbf,0xe0,0x8d,0x5f,0x14,0x66,0x81,0x0b,0xa5,0x3e,0xc6,0xb3,0x90,0x84,0x0e,0xb3,0x40,0x89,0xa0,0x4c,0x7d,0x0b,0x4f,0x15,0x9a,0x1c .byte 0xe3,0xcb,0x68,0xa5,0x94,0xae,0x67,0xab,0xcd,0x58,0xdf,0x32,0xc7,0x83,0x26,0x1a,0x38,0x7e,0x22,0xe6,0x21,0x7d,0x93,0x94,0xa3,0x20,0xdf,0x47,0x14,0x5d,0x1f,0x71,0x5f,0xb1,0xb6,0xf7,0xe6,0xaa,0xbe,0x09,0x29,0x37,0x06,0xa7,0xda,0x97,0x65,0x76,0xb8,0xaf,0xbc,0x38,0x74,0xea,0x0b,0x8d,0x53,0x27,0x72,0x8e,0x07,0x42,0x2f,0x98 .byte 0xf8,0x50,0xc0,0x3e,0x68,0x15,0x89,0xb8,0x0e,0xf9,0x47,0xea,0xdd,0x0a,0x94,0x6b,0x88,0x15,0xed,0xc6,0xab,0xc5,0x5b,0x79,0x4f,0x78,0xb7,0x99,0x55,0x69,0x69,0xf0,0x91,0xc0,0xa8,0x32,0x42,0x36,0x4e,0x41,0xb1,0x02,0xdf,0xb8,0xa8,0x64,0x29,0x6b,0x52,0x3f,0x89,0x53,0x8e,0x2a,0x51,0xc9,0x05,0xca,0x9f,0x41,0xc4,0xc0,0x70,0x51 .byte 0x8a,0x5a,0x2b,0x83,0xa5,0xc9,0x9b,0xf4,0xd2,0x5a,0xb1,0xa2,0xcc,0x51,0x2b,0x74,0x5d,0xc0,0xf2,0x23,0xcb,0x91,0x12,0x3e,0xb8,0x73,0xd3,0x62,0x53,0x25,0x0e,0x58,0x55,0x2f,0xdf,0x7b,0x0e,0x3c,0xbf,0xb6,0xe6,0xd2,0xad,0x20,0x1b,0xea,0xac,0xfc,0xdd,0xe9,0x35,0x49,0x5f,0x90,0x7d,0x4f,0x09,0xb0,0xc5,0x8a,0x11,0x2a,0x2d,0xa1 .byte 0xf1,0x84,0xca,0x91,0xc9,0x9a,0x7a,0xe0,0x81,0x3e,0x92,0x07,0x32,0xb0,0x3f,0x59,0x1f,0xec,0x07,0x8e,0x8a,0x73,0x12,0x85,0x52,0x3a,0x7c,0xc3,0x1f,0xfe,0x27,0xd7,0x45,0x1a,0xf6,0x97,0x82,0x5a,0x97,0xdc,0x9e,0x70,0x37,0xe9,0xbe,0x35,0x76,0xae,0x15,0x0c,0x9a,0x66,0x69,0xb6,0xbd,0xcc,0x55,0xc9,0x44,0xb5,0x59,0x09,0xe9,0x0b .byte 0x03,0xa0,0x5e,0x37,0xd1,0xff,0xd9,0xcb,0x5e,0x2a,0x97,0x6f,0x3a,0xee,0xb9,0xc4,0xc9,0xe0,0xb9,0xc8,0xc2,0x9e,0x66,0x0c,0xee,0x05,0x1e,0x12,0xa7,0x2c,0x61,0x7f,0x61,0x1c,0x90,0xbb,0x6a,0xb9,0xd9,0xf3,0x9a,0x5e,0xae,0xfc,0x18,0x15,0x46,0xa8,0x12,0xdd,0x81,0x66,0x44,0x91,0x84,0xbe,0xa8,0x20,0x9a,0x3c,0x0a,0x57,0x32,0xe1 .byte 0x22,0x3f,0x5d,0xa7,0x11,0xa3,0xeb,0xdc,0xaf,0x93,0xbb,0x2e,0xae,0x64,0x6e,0xbb,0x08,0xa8,0x83,0xb8,0xc2,0xfe,0x25,0x22,0x99,0x08,0x68,0xa8,0x6e,0xda,0xee,0xb2,0x78,0xc9,0x59,0x6b,0xac,0x48,0x5d,0x2d,0x1d,0x8c,0xa8,0xd3,0x4b,0x2d,0x27,0x65,0x01,0x5a,0xe4,0x4b,0x90,0x7c,0xe7,0x23,0xbe,0x90,0xf7,0xf9,0x15,0x2f,0xc1,0x70 .byte 0x41,0x80,0x54,0xbf,0xfe,0xb0,0x44,0xfa,0x0e,0x3b,0x07,0xa5,0x85,0x40,0x8e,0x21,0x72,0x1d,0x22,0x0c,0x78,0xcf,0x67,0xdb,0xb2,0xbb,0xec,0x78,0x6f,0xcf,0xcd,0x96,0x16,0xf4,0x82,0x56,0xd6,0xa0,0x0c,0x7f,0xb8,0x3b,0xa7,0x4d,0xc4,0x1c,0x6c,0x8f,0xa4,0xe7,0xd2,0x35,0x43,0x17,0xd0,0x0a,0x56,0xc3,0xa6,0xd6,0xf6,0x27,0x95,0xf1 .byte 0xa6,0x9d,0x5c,0x9c,0xb4,0x41,0x36,0xb5,0x36,0xcc,0xcb,0xbf,0x89,0xbc,0x63,0x21,0x7e,0x08,0x9c,0xdb,0x3f,0x60,0x7d,0x00,0xd0,0xbd,0xb0,0x20,0x2e,0xca,0x82,0x05,0xf0,0xff,0x57,0x56,0xc4,0x4e,0x50,0x58,0x5b,0x54,0x43,0x30,0x90,0x9a,0xf5,0x37,0x34,0x08,0xd7,0x57,0xc8,0x17,0x03,0x42,0x0d,0x42,0x04,0xaa,0xdb,0xc7,0xa7,0xdc .byte 0x7b,0x10,0xc3,0x87,0x6c,0x0d,0x8d,0x43,0x1b,0x50,0xfa,0x71,0x2e,0x76,0x5f,0x27,0x73,0x0b,0x7f,0x01,0x28,0xb4,0xea,0x3a,0x1e,0x04,0x74,0xb4,0x18,0xa0,0xdd,0x8d,0x41,0x1a,0x20,0x09,0x11,0x9e,0x02,0xe4,0x50,0x37,0xb0,0x20,0x49,0x69,0xfb,0x30,0x82,0xd5,0x03,0x88,0x9b,0x03,0xa0,0x92,0xb1,0x51,0x63,0xcb,0x6a,0x4f,0xa4,0x74 .byte 0xc9,0x93,0xed,0x13,0x3c,0x6a,0xdc,0x43,0x57,0x87,0x56,0xb8,0xe3,0x30,0x4f,0x63,0x2d,0x7b,0x23,0x8e,0xe3,0x80,0x30,0x03,0x62,0x59,0x9b,0xbd,0xbe,0xc5,0xa9,0x40,0xbd,0x01,0xac,0x2f,0xbf,0x90,0x46,0x30,0x53,0x20,0x74,0x45,0xe4,0x21,0x17,0x72,0x54,0x7f,0x4d,0x90,0xd8,0x72,0x7f,0x7b,0x6c,0x83,0x5b,0x00,0xa6,0x17,0x7d,0x42 .byte 0x60,0xb5,0xd1,0x0b,0xf2,0x57,0xb4,0x13,0x45,0x7d,0xe4,0x9b,0x29,0x12,0x1b,0x29,0x76,0xd0,0xc0,0x59,0x9f,0x1e,0xa2,0xd7,0x76,0x05,0xe5,0x42,0x73,0x65,0xd3,0xb0,0x58,0x18,0x7a,0x00,0x4c,0xdb,0x0f,0xb2,0xb0,0xb4,0x4c,0xef,0x59,0xfd,0x20,0xca,0x45,0x51,0x82,0xf6,0x4d,0x20,0x96,0x5c,0x11,0x7f,0x33,0x67,0x38,0xea,0x1b,0x1a .byte 0x10,0x9f,0x60,0x6a,0xe1,0xd3,0x77,0x27,0x1d,0x5d,0x29,0x3c,0x55,0xc3,0x34,0x51,0x37,0x0d,0xe2,0x55,0xf9,0xc3,0xb9,0x7f,0x06,0x68,0x07,0x84,0x05,0x18,0x18,0x64,0xfb,0x44,0xc7,0x62,0x22,0xdb,0x23,0xb3,0x70,0x40,0x73,0xf7,0x3e,0xa7,0xd7,0xe5,0x40,0xad,0xa7,0x54,0x18,0x41,0x95,0x56,0xda,0x80,0xe4,0x5e,0xca,0x0b,0x15,0x6d .byte 0xc1,0xf5,0xf6,0x30,0x08,0x30,0x21,0x81,0x1c,0x27,0x62,0x2e,0x1a,0xde,0xf9,0x2c,0xec,0x4f,0x70,0x3a,0x6b,0x63,0x1a,0xbb,0x99,0x1b,0xb4,0x82,0xc5,0x81,0xef,0xc3,0x6f,0x12,0xf4,0x22,0xc4,0x32,0x11,0x11,0xba,0x56,0x71,0x47,0x10,0xd7,0xf7,0xe8,0x5b,0x07,0xb6,0x2f,0xa9,0xa9,0xfd,0x4d,0x42,0xe8,0xb7,0x2a,0xbf,0x93,0xb1,0xef .byte 0x09,0x8e,0xa3,0x6b,0x40,0xcc,0xb1,0x63,0x10,0xb7,0x8f,0x9e,0xd1,0x02,0x2b,0x86,0x86,0xbf,0x44,0x89,0x22,0xf9,0xe5,0xf7,0xad,0x10,0xda,0xd8,0xdf,0xef,0xa0,0x98,0x42,0xad,0x21,0xa8,0x42,0x6f,0x47,0x08,0xf2,0x62,0x9e,0x2b,0xaf,0xc2,0xac,0x71,0x3d,0xd6,0x43,0x65,0x85,0x60,0x17,0xc6,0xa2,0xa2,0x3a,0xd9,0x34,0xeb,0x0b,0x6d .byte 0x04,0xf7,0x6f,0xa5,0x39,0xf5,0xfa,0x71,0x58,0x9d,0xe9,0xe5,0x44,0x8c,0xd3,0xf0,0x62,0x8a,0x2f,0x73,0xf6,0xab,0xf4,0x09,0xe1,0xd1,0x23,0x0f,0x7c,0x5c,0x63,0xa4,0x34,0x26,0xeb,0xca,0xe5,0x96,0x1c,0x31,0x61,0xcc,0xa1,0x1f,0x95,0x9c,0xd9,0xb5,0x2d,0x19,0x9e,0x9a,0x5d,0x99,0x4f,0x78,0xb7,0x7a,0x36,0xde,0x3c,0x77,0xe3,0xb8 .byte 0x55,0xcc,0x27,0x14,0xc3,0x69,0xf9,0x23,0xea,0xc6,0x07,0x12,0x94,0xc9,0x1e,0x28,0xab,0xaa,0xf3,0x28,0x35,0x8c,0xb5,0xa4,0x8d,0x1d,0xa6,0xa3,0xb0,0xfe,0xca,0x8e,0x44,0xd1,0x96,0x47,0xf3,0x04,0x77,0xea,0x9e,0xbc,0xaf,0xda,0xed,0x77,0x6b,0x80,0x9d,0x32,0x4f,0xff,0xda,0xd6,0x61,0x1f,0x57,0x66,0xa7,0xfb,0x54,0x78,0x0a,0x43 .byte 0xaf,0xf7,0x31,0x47,0xd9,0xf4,0x6e,0x70,0x9f,0x1c,0xe0,0x71,0xba,0x11,0x2a,0x0e,0x83,0xba,0xa2,0xc4,0x8b,0x64,0x1e,0xcf,0x17,0xfc,0xb5,0x72,0xa3,0x4e,0x03,0xc7,0x6f,0xa6,0xf6,0x6f,0xe7,0xb7,0x09,0x1a,0x6f,0x09,0xa6,0x45,0xd5,0x20,0x2f,0xbd,0x5a,0xc8,0xae,0x02,0xf3,0x00,0xf7,0xb4,0xd9,0x05,0x38,0x23,0x64,0x27,0x0b,0x27 .byte 0xc3,0x54,0xea,0x6f,0x85,0x68,0x10,0xa8,0xcd,0xb6,0xf3,0xb6,0x7a,0x55,0xba,0x7e,0x5f,0x6d,0x0e,0x33,0xf3,0x98,0xef,0xd3,0x9b,0x30,0x5c,0x2b,0xd3,0x10,0x89,0xe7,0x34,0x95,0x4f,0x58,0xb5,0xe6,0x7f,0x84,0x3f,0x71,0x3b,0xae,0xc7,0xcd,0x2e,0x93,0xff,0x72,0x33,0x6f,0xf7,0x8b,0x25,0xd4,0x48,0xa4,0x66,0xe9,0xc1,0xe7,0x1a,0xf7 .byte 0x2d,0x63,0x67,0x5e,0x6c,0x96,0x9c,0x93,0x52,0xe9,0x0f,0xf6,0x1a,0x78,0xa9,0xa0,0xa1,0x96,0x95,0x49,0x69,0xfd,0x78,0xf6,0x65,0x49,0xc6,0x1c,0x44,0x3d,0xbd,0xb5,0x04,0x5f,0xaf,0x69,0x1c,0x3e,0xc1,0xea,0x53,0x3b,0x2e,0x40,0x61,0xf2,0x66,0x24,0x90,0x4a,0x86,0xf0,0x74,0xec,0xdb,0x95,0x68,0x9e,0x83,0x11,0xfc,0x5a,0x51,0x66 .byte 0x51,0x09,0x71,0x6c,0x32,0xbe,0x5d,0x1d,0x04,0xb2,0xba,0x90,0xfa,0xcb,0xd5,0xa4,0xa7,0x26,0x4e,0xe1,0x1e,0x32,0x7c,0x18,0x40,0x6d,0x40,0xed,0x8d,0xcc,0xa3,0x8a,0xc2,0x29,0x73,0x73,0x94,0x0b,0x09,0x43,0xd4,0x2c,0x0f,0xc5,0x92,0x3c,0x47,0x25,0x41,0x96,0xa6,0x2b,0xb0,0xae,0x98,0x82,0x72,0xd3,0x2f,0x7f,0xcc,0x2a,0x22,0x18 .byte 0xaf,0x07,0xfc,0x64,0x9f,0x72,0x4d,0x61,0x88,0x59,0x6f,0xaa,0x27,0x8d,0x42,0x21,0x5f,0x25,0xbe,0xa3,0x29,0x4d,0x06,0x2d,0xd5,0xaa,0xb3,0xb5,0xbe,0xa5,0x6c,0x1e,0xdb,0x2e,0xb2,0xc0,0x9d,0x03,0x0f,0xce,0xfa,0xc6,0x45,0xff,0xac,0xc8,0x22,0xb6,0x90,0x40,0x88,0xae,0xc0,0x9e,0xcb,0xf2,0x2b,0xa3,0x74,0x34,0xe1,0xb0,0xe3,0xdb .byte 0x46,0x88,0xb8,0x67,0x24,0x6b,0x53,0xf7,0x18,0x2e,0x52,0x44,0x24,0x23,0x4d,0x33,0x94,0x4d,0x58,0x47,0x0e,0xcc,0xae,0x46,0x56,0x49,0x76,0xfc,0x62,0x9e,0x3d,0x05,0x14,0xe7,0xaa,0x1a,0x44,0x8b,0x02,0x0c,0x8a,0x8b,0x9c,0x5b,0x8d,0x99,0x10,0xb3,0x4a,0x8d,0x9c,0x5f,0x9f,0xe9,0x35,0x10,0x67,0x1a,0xfe,0x1f,0xb9,0x5e,0x02,0xeb .byte 0x05,0xe2,0xbe,0xa6,0xea,0x81,0x64,0x2d,0x8e,0x8b,0xf4,0xe5,0x02,0x98,0x21,0xa9,0x9d,0xc7,0xc1,0x4b,0x74,0x33,0x8a,0x1e,0x7b,0xbc,0x15,0x27,0xda,0xe8,0x35,0xa5,0x36,0xa5,0xe4,0xad,0x1c,0xa0,0x7c,0x1d,0xc9,0x1e,0x7e,0x88,0xa7,0x59,0x88,0x1c,0xb6,0x0a,0x07,0x94,0xbb,0x5d,0xa1,0x00,0xdd,0x85,0x70,0xac,0x60,0xcb,0xc8,0x70 .byte 0x2c,0x8f,0x4e,0x2e,0x85,0xdf,0xf4,0x6d,0x78,0x16,0x03,0x50,0xed,0xe8,0x13,0x79,0x64,0x89,0xf7,0xf0,0x42,0xf6,0xc9,0x78,0xe6,0x23,0x36,0xdd,0xaf,0x13,0xee,0xc4,0x94,0x81,0xc3,0x68,0xe8,0x88,0xb3,0xd4,0x16,0x05,0x43,0x52,0xab,0x60,0x8f,0x04,0xee,0x9c,0xb3,0x22,0x63,0x25,0xe0,0x9d,0xd3,0xc0,0xa4,0x79,0x75,0xac,0xba,0x16 .byte 0xea,0x43,0x18,0x9c,0x9a,0x9a,0x9b,0xbf,0x51,0xa0,0xd1,0xf2,0x64,0x0d,0x3c,0x8f,0xaa,0xb2,0x25,0x30,0x35,0xf9,0x87,0xf8,0x1d,0xc2,0xbd,0x3a,0xa1,0x28,0xb7,0xaa,0x55,0xc0,0x79,0xc8,0xb4,0x21,0x8e,0x44,0x7e,0xc1,0xd5,0x7f,0xe8,0x18,0xfc,0xab,0xff,0x22,0x6d,0xc8,0x25,0x8a,0xe0,0x96,0xa4,0xf2,0xde,0x49,0xf2,0x4c,0xfe,0x5b .byte 0x56,0x3b,0xa0,0x35,0x5e,0xbe,0xf7,0x47,0x66,0xff,0x62,0xfb,0xe9,0x27,0xd6,0x0a,0x98,0x99,0xb7,0x76,0xe8,0x67,0x05,0x70,0xd5,0x43,0xcd,0x28,0x9b,0xf5,0x9f,0xa4,0x80,0x31,0x1a,0x02,0xd6,0x67,0x05,0x61,0xd0,0xcb,0x15,0xe0,0xec,0xe3,0x41,0x53,0xb0,0x0f,0x21,0x65,0x56,0x47,0x49,0x9f,0x16,0x29,0x1a,0xca,0xe0,0x50,0x54,0xd2 .byte 0x46,0x9b,0xae,0x68,0x06,0x61,0x0b,0xd7,0x46,0x93,0x79,0x06,0x0a,0xc9,0xc5,0x8f,0x33,0xfe,0x63,0xf8,0x2d,0x87,0xa6,0x95,0x01,0x87,0x2c,0x15,0xd3,0xbc,0x03,0x02,0x7f,0x75,0xf1,0xbe,0x78,0xe2,0x8b,0x03,0x6a,0xea,0xb1,0x74,0xd3,0xc7,0xef,0x2e,0x8b,0xa2,0xd9,0xe3,0x8e,0xfd,0x6a,0x1a,0x6b,0xf5,0x9f,0x5b,0x9c,0x9b,0x78,0x58 .byte 0x81,0xba,0xb0,0x63,0x5e,0xd4,0x36,0xe1,0xd4,0xb4,0x9d,0x90,0x77,0x08,0xc7,0xc8,0x09,0x64,0x54,0x35,0x16,0xc6,0x9c,0xe2,0xc2,0x40,0x39,0x00,0x65,0x8d,0x7d,0x90,0x9b,0xdb,0xb3,0xac,0xe8,0x17,0xe3,0x78,0x4a,0x26,0x42,0xf8,0xb8,0xb8,0x3b,0x55,0x7f,0x8d,0xed,0xee,0x88,0xaa,0xa7,0x05,0xa9,0x72,0xc1,0x58,0x21,0x1b,0x9e,0x6f .byte 0xf2,0xf3,0x8d,0x72,0x8c,0x3a,0xab,0x21,0x8d,0xcb,0x33,0x53,0xa1,0x9c,0x6d,0x41,0xef,0xf8,0xae,0xcf,0x0c,0xf7,0xca,0x7f,0x38,0x17,0x28,0xa4,0xab,0xb5,0xf4,0x5d,0x96,0xf4,0x36,0x13,0x50,0xb6,0xe5,0x9a,0xeb,0x3f,0xe2,0x64,0x94,0xc0,0xd5,0x9c,0x60,0x87,0xff,0xf5,0x8a,0x60,0x83,0x3d,0x02,0xfc,0x7f,0xc0,0x20,0x24,0x4e,0x0c .byte 0xf3,0x31,0x1d,0x07,0x67,0x90,0xa6,0xbd,0x1f,0x6e,0xb0,0xbd,0x24,0x53,0x31,0x50,0x72,0xdb,0xb1,0xdd,0xb2,0xfd,0x77,0x68,0x75,0x7a,0x7d,0x66,0x52,0x40,0xab,0x48,0x5a,0xf2,0x94,0xc6,0x54,0xcf,0xfe,0x2a,0xe7,0x80,0x67,0x34,0x93,0x72,0x85,0x6c,0x48,0x1c,0x00,0x62,0xf8,0x6f,0x2e,0xb1,0x85,0x42,0x5b,0x6b,0xe8,0xf5,0x69,0x05 .byte 0xaf,0x59,0x1a,0x43,0x0a,0xfe,0x49,0x8c,0x35,0xbc,0xf7,0xb8,0x2d,0x9c,0x89,0x64,0x37,0x5e,0xfa,0x05,0x15,0x9d,0x3c,0x80,0xc4,0x41,0x5a,0x00,0xcb,0xdc,0x9c,0x60,0xfe,0x3a,0x2e,0x45,0x16,0xb3,0x4b,0x81,0xbb,0xed,0xfe,0x09,0x99,0x0b,0xb3,0x13,0xa4,0x36,0xe0,0xe0,0xaa,0x5f,0x7b,0x76,0x7c,0x64,0x54,0x85,0x53,0xf7,0x82,0x8c .byte 0x8d,0xc6,0xf2,0x89,0xc6,0x26,0xa3,0x9b,0x26,0x2a,0xbe,0xed,0x39,0xcf,0x4a,0x16,0xec,0x75,0xca,0x08,0x3a,0x2a,0x1b,0x29,0x27,0x71,0x41,0xe2,0xd2,0x83,0xa0,0xd5,0x20,0x28,0x92,0xb8,0xbd,0xe5,0x3d,0x45,0x94,0x5f,0x83,0x70,0xb0,0x44,0x14,0x05,0xac,0xc3,0x88,0xad,0xe6,0x6a,0x95,0x7f,0x63,0x5d,0xb8,0x2d,0x0f,0x08,0x50,0x1e .byte 0xc2,0x28,0x20,0xcf,0x35,0xd9,0x37,0x72,0x97,0x03,0x33,0x7a,0x28,0xf4,0x96,0x6d,0x77,0xb7,0x1d,0xd8,0x67,0xf4,0xce,0xd8,0x2c,0xd6,0x84,0xc0,0xcf,0x56,0xb4,0xe1,0xdd,0xbb,0xbc,0xf2,0x72,0xff,0x69,0x4c,0x16,0x45,0x58,0x99,0x82,0x69,0x7a,0x86,0xa3,0xe2,0xdd,0x16,0xd2,0x65,0x65,0x7f,0x7e,0x55,0x54,0x16,0xda,0xfe,0x3a,0x49 .byte 0xfa,0x9e,0x0f,0xfa,0xdc,0x1c,0x25,0x46,0xa9,0xca,0x4f,0xf7,0x15,0x2c,0xd2,0xe2,0xf4,0x79,0x0f,0xb5,0x61,0x0a,0xb3,0xbb,0x2a,0x9e,0xa1,0xf7,0x9b,0x85,0xa7,0xb9,0xf3,0x36,0x29,0x4e,0x5d,0xee,0xab,0x46,0x9f,0xf8,0x4a,0xf7,0xbe,0x9b,0x51,0x1b,0x55,0x1b,0x91,0x78,0x06,0xbf,0x2c,0xec,0x3d,0xcc,0xe0,0x89,0x99,0xf9,0xea,0xc4 .byte 0x94,0x92,0x12,0x1e,0xa9,0x1b,0x4f,0x7d,0xd0,0xd8,0xc1,0x6f,0xcd,0x6e,0x51,0x3a,0xb1,0xab,0x04,0x32,0xbe,0xa7,0x57,0xf3,0x5c,0x08,0x30,0xef,0x02,0x11,0x8e,0x55,0x9a,0x62,0x7a,0x4c,0x54,0x9e,0xc0,0x30,0x8e,0x24,0xc2,0x38,0x83,0x4d,0xd1,0x66,0x2a,0x86,0x40,0x70,0x7c,0xb3,0xf8,0x85,0x3b,0x3c,0x98,0xe3,0x7a,0x54,0xb8,0xf5 .byte 0xf4,0xda,0x5e,0x43,0xfb,0x44,0x74,0xe7,0x81,0x82,0xfe,0xa6,0x2f,0xb0,0x18,0x3e,0x17,0xd3,0xfc,0xe7,0xbd,0x5e,0xf0,0x69,0x0f,0x70,0x78,0x95,0x18,0xcb,0xde,0x44,0xa3,0xf4,0xa2,0x05,0xac,0x70,0xcb,0x89,0xbc,0x24,0x53,0x1f,0xfe,0x0e,0xa7,0x4e,0x67,0xab,0x48,0x6d,0xbe,0x77,0xe0,0xa5,0x46,0xcb,0x06,0x70,0x99,0xa9,0x40,0xd7 .byte 0x9e,0xd9,0xc3,0xff,0x86,0xca,0x0c,0x29,0x72,0x90,0x9b,0x72,0xc7,0xd3,0x51,0x23,0x8c,0xca,0xa2,0xdf,0x4f,0x01,0xb5,0x56,0xa4,0x99,0x6f,0xb2,0x57,0x5f,0x67,0x84,0x99,0xce,0xd9,0x86,0x25,0x82,0x53,0x15,0xb0,0x37,0x19,0xfa,0xad,0x9e,0x76,0x52,0xa0,0xb2,0xbd,0xc5,0x1f,0xee,0xdb,0x2d,0x0d,0xea,0x1d,0x3c,0xb4,0x5c,0xfe,0xfb .byte 0x95,0xea,0x56,0x65,0x9f,0xca,0xa0,0xd6,0xe3,0x2c,0xb5,0xd1,0x12,0x38,0xca,0x53,0x09,0x76,0x1b,0x77,0xb0,0x0b,0x54,0x59,0x38,0xd5,0xe9,0x08,0xa9,0x17,0x1c,0x88,0xe8,0x7a,0xd6,0x03,0xee,0x7c,0x46,0x3e,0x3c,0xeb,0x2c,0xa6,0x16,0x7b,0x7d,0xd5,0x30,0xea,0x12,0xfc,0x16,0x5d,0xcd,0xa9,0x73,0xfb,0xba,0xac,0xc6,0x8d,0xe4,0x87 .byte 0x3a,0x46,0x5f,0x35,0x4f,0x8f,0x53,0xe0,0x22,0xd3,0x7b,0x9a,0x2c,0x5e,0x06,0x05,0x1e,0xb1,0x87,0x80,0x75,0xa3,0x4d,0x32,0xc8,0xa0,0xd8,0x41,0x47,0xde,0x01,0x8a,0x56,0x0f,0xf8,0x3e,0x8a,0xde,0x1f,0x1f,0xd9,0xab,0xc2,0xcd,0x9a,0xd7,0xa5,0x2c,0x5c,0x42,0x9f,0x43,0x43,0x75,0x8d,0x1e,0x2b,0xe7,0x1a,0xaf,0x98,0xf4,0xc1,0xab .byte 0xb4,0x1b,0x09,0x89,0x94,0xe3,0x42,0xd4,0xd0,0xdb,0x35,0xdf,0xce,0xb6,0x96,0xb8,0x2b,0xe2,0x51,0xa0,0xdc,0x92,0x3d,0x4c,0x6e,0x69,0xc1,0xe6,0xd5,0xec,0xda,0x51,0xe9,0x54,0x7e,0x56,0xe2,0x47,0xeb,0x37,0xce,0xce,0xbd,0xc2,0xf0,0x97,0x27,0x40,0x66,0x67,0xda,0xdf,0x86,0xcb,0xda,0x5e,0x03,0xe0,0x38,0x54,0x44,0x62,0xfe,0xb2 .byte 0xfa,0xc3,0x6d,0xa5,0x8b,0x89,0xc5,0x84,0xbe,0x86,0x41,0x0c,0x52,0x0c,0x75,0x71,0xf5,0x74,0xed,0x2c,0x01,0xf2,0x55,0xef,0x85,0x14,0x84,0x3b,0x11,0x38,0xda,0xcd,0x59,0x15,0x80,0xd7,0x61,0xe9,0x89,0x3d,0xeb,0xad,0x43,0x44,0x30,0x14,0xe3,0x4d,0xbd,0xc9,0x80,0xdb,0x2d,0xd7,0x40,0x94,0xc7,0x56,0x35,0x62,0x23,0xfb,0x8f,0xe2 .byte 0x87,0x9c,0xd9,0x07,0xc0,0x7e,0xc7,0x74,0x44,0x1d,0x98,0x3b,0xa1,0xa7,0xd1,0x05,0x66,0x69,0x59,0x58,0xc1,0x55,0x2a,0x6e,0x33,0x31,0xc1,0x3e,0xdf,0x03,0x4c,0x9a,0x9d,0xd1,0xff,0x43,0x6a,0x87,0x92,0xd0,0xdf,0x6b,0x51,0x22,0x68,0xa8,0xda,0xe8,0x8c,0xe0,0xb2,0xdc,0x61,0xdf,0x5d,0x08,0x27,0xe8,0xf9,0xdd,0xe8,0xe7,0xe5,0x2b .byte 0x89,0xf3,0x03,0x44,0xe4,0x51,0x8b,0x5a,0x23,0xc2,0x3e,0xde,0x1d,0xa7,0x82,0x66,0xd6,0xb7,0xe6,0xa4,0xc8,0x8a,0x65,0x72,0xe8,0x30,0x77,0x55,0x52,0x78,0x1b,0x9d,0x39,0x2b,0xa0,0x27,0x70,0x39,0xff,0x66,0x49,0x43,0x37,0xd1,0xc1,0x1a,0x95,0xc3,0xa3,0x34,0xad,0xe9,0x34,0x08,0x14,0x5d,0x20,0xbc,0x96,0x7b,0x25,0x44,0xc3,0x5f .byte 0xb8,0x4b,0x82,0x88,0xff,0x9e,0xee,0xec,0x4c,0xd4,0x06,0xb3,0x2f,0xc3,0xe6,0xae,0x0e,0xa8,0xa6,0xb1,0xef,0x16,0xc5,0x82,0x34,0x8e,0x51,0xd1,0xaf,0x9f,0xee,0x33,0x3c,0xa8,0x8c,0x42,0x2f,0xe7,0x40,0x1d,0xbc,0xb7,0x24,0xb0,0xd7,0xa5,0x42,0x7f,0x3f,0x1a,0xe3,0xf8,0x58,0x86,0xe3,0x0b,0x4a,0xe9,0xe3,0x5d,0x09,0x9a,0xb0,0x10 .byte 0x8f,0x00,0xc3,0x5f,0xa2,0xce,0x77,0x01,0x0a,0xae,0x46,0x68,0x65,0xc0,0x2c,0x7e,0x79,0xb1,0x80,0x8a,0x24,0x1a,0x2c,0x34,0xbe,0xa6,0x30,0x41,0xee,0xf5,0xee,0xa0,0xfe,0x47,0x1f,0xf4,0xae,0xd8,0xb3,0xa5,0xdc,0x5a,0xab,0xf6,0xf9,0x64,0xa1,0xe6,0xc2,0x73,0xee,0xf9,0x33,0xdb,0xe4,0xc8,0xa2,0x23,0x48,0x68,0xe2,0x94,0xef,0xc5 .byte 0xe4,0xc7,0x9a,0x18,0x88,0x42,0xed,0xa0,0x2d,0x3d,0x05,0x92,0xe4,0x71,0xf8,0x90,0xd9,0x9e,0xf3,0x74,0x0c,0xa5,0x66,0x4d,0x40,0x8a,0x22,0x8e,0x0d,0x0e,0xfb,0x18,0xc4,0x06,0xed,0x4e,0xcb,0x7b,0xd5,0x6e,0xf0,0xe6,0x0e,0x7e,0x2c,0xe8,0xf1,0xa8,0x41,0x83,0x02,0xf2,0xb2,0xfa,0x5f,0x21,0xb8,0x4e,0x20,0x81,0xbf,0xbe,0x0f,0xd4 .byte 0xc2,0x6e,0x2c,0xfb,0x67,0xcc,0xe7,0x7f,0x24,0x36,0x0e,0xa2,0xf5,0xf5,0x4b,0x80,0xb6,0x7f,0x53,0x09,0x77,0xe1,0x51,0x16,0x92,0xc5,0xa8,0x22,0xa9,0x89,0x11,0xab,0x6b,0x90,0xeb,0x75,0x51,0xe4,0x9d,0x39,0xaa,0xab,0x98,0x21,0x1c,0xa9,0x3a,0x7f,0x04,0x3e,0xfd,0xa6,0xa3,0x91,0xa8,0x51,0xfe,0x30,0x26,0x2e,0x44,0xde,0x5d,0x41 .byte 0x91,0x35,0x65,0x5d,0x17,0x1e,0x71,0xb5,0xc5,0xb9,0x3c,0x3a,0xcc,0x06,0xa2,0x2b,0xef,0x02,0xe4,0x0e,0x42,0x82,0x4d,0x2b,0x91,0x9a,0x38,0x49,0xc6,0xba,0x15,0x08,0x2c,0xe6,0x38,0x10,0x06,0xbe,0x59,0xa0,0xf7,0x78,0xbb,0xc3,0x4c,0x4b,0xe8,0x14,0x0f,0x7d,0x92,0x14,0x34,0x67,0x17,0x37,0x49,0xcf,0xf4,0x77,0xc2,0x41,0x47,0x16 .byte 0x70,0x63,0x38,0x81,0xe0,0x2b,0x8b,0xfe,0x15,0x59,0x0b,0x3f,0xaa,0xf1,0x2d,0x21,0x66,0x85,0x03,0xb7,0x09,0x6f,0x28,0xfa,0xc8,0x09,0x26,0x93,0x0d,0x3b,0xa4,0x96,0xb2,0x87,0x44,0x21,0xb9,0xec,0x30,0xf4,0xb4,0x8a,0x7c,0x84,0x7c,0x47,0xf4,0x01,0x48,0x42,0xa0,0xd0,0xf7,0x52,0xb5,0xdb,0xf9,0x24,0x02,0x7b,0xa8,0x97,0x54,0x89 .byte 0x6a,0x4d,0x5c,0xac,0xfc,0x61,0x69,0x4b,0x79,0x7a,0xae,0x72,0x9f,0x3f,0xea,0x09,0x50,0xd7,0x16,0x1f,0x0d,0x58,0x00,0x02,0x27,0xfd,0x2a,0x52,0x41,0x0d,0x1e,0xf3,0xe3,0x5f,0x93,0x01,0x51,0xc5,0xea,0x11,0x7b,0xd3,0x31,0x8b,0xcc,0x21,0xd7,0x17,0xb4,0x04,0xb8,0x30,0xc0,0xf7,0xf8,0x65,0x23,0x3f,0x8e,0x04,0x62,0x38,0x37,0x09 .byte 0x06,0xde,0xe5,0xfb,0xa5,0x2a,0xc7,0xba,0x52,0x89,0xc6,0x9a,0xb2,0x0c,0xe4,0x89,0x3b,0xe8,0xc2,0x33,0xa4,0x48,0x8d,0x6d,0x35,0x3e,0xbf,0xef,0x15,0x9a,0x05,0x6c,0xdf,0x4f,0xa2,0x96,0xeb,0x75,0xc5,0x26,0x5b,0x9c,0xc8,0x22,0xab,0x8b,0xf9,0xbe,0x2e,0x8e,0x70,0xd2,0x60,0xf6,0x6f,0xa0,0x3f,0x24,0xe4,0x76,0x67,0xa5,0x5d,0x65 .byte 0x9d,0xc7,0x7f,0xab,0x69,0xdd,0xd5,0x5d,0xcc,0xf7,0xab,0x60,0x57,0x18,0x1f,0x1c,0x79,0x2f,0x37,0x44,0x37,0x54,0x13,0xd5,0x7f,0x51,0x5b,0x59,0x1c,0x2b,0x0c,0x43,0xeb,0x05,0x25,0xf4,0xa8,0xbf,0x76,0x7a,0xb4,0xc8,0x54,0x3f,0xe5,0x1b,0xd4,0x85,0x9a,0x6e,0x52,0x49,0x68,0xcd,0x90,0xcc,0xa5,0x36,0x9d,0xa9,0xe8,0x4f,0xc3,0xbd .byte 0x8a,0x83,0x65,0x57,0xe1,0x5f,0x09,0xdc,0xb3,0x06,0x61,0xe0,0x61,0x34,0xf7,0x72,0xaa,0xb2,0x14,0xfe,0xf7,0xae,0xb4,0x59,0x90,0x83,0x64,0xc0,0x64,0xe5,0x1d,0x35,0x7b,0x40,0xbb,0x20,0xaa,0x63,0xfe,0x7d,0xbb,0xed,0x26,0x93,0x95,0x8a,0x85,0x20,0x98,0x83,0x14,0xec,0xef,0x74,0xb8,0x1e,0x2c,0x6e,0x3d,0x34,0xdc,0x6a,0xd7,0x7f .byte 0x7b,0xdb,0x57,0x15,0x28,0xb2,0xf3,0xa0,0x6b,0x26,0x5d,0xe6,0xd5,0x0d,0x07,0x4d,0xa6,0xc5,0x9b,0x5e,0xbe,0x48,0x0d,0x99,0x91,0x14,0x41,0x3a,0x4c,0xc9,0xef,0x37,0x6c,0x8f,0x4e,0xdc,0x93,0xae,0xb0,0x80,0x70,0x35,0x5e,0x7c,0xee,0x6e,0xb2,0xab,0xc1,0xed,0x30,0x4f,0x90,0x7b,0xfc,0xa3,0xf5,0x12,0x38,0xbf,0x8f,0x54,0x46,0x6d .byte 0x13,0xf4,0x7f,0xcb,0x35,0xfd,0xd0,0xbb,0xe4,0x40,0xb2,0x9a,0x2a,0x5a,0x16,0xe0,0xbc,0x77,0x31,0xa0,0x04,0x71,0x6b,0x1a,0x37,0x7c,0xdf,0x68,0x02,0x43,0x73,0x8d,0x53,0xd4,0x58,0x6e,0x05,0x94,0x97,0x45,0xf9,0xb1,0x55,0x7a,0x6a,0x99,0x5c,0x8b,0xb0,0x8e,0x35,0x23,0x5a,0x2d,0xd0,0x3c,0xd1,0x16,0xb6,0x81,0xc3,0x88,0x6b,0x8e .byte 0x2c,0x08,0xf8,0x90,0x6a,0x40,0x7b,0xf5,0x26,0xaa,0xdc,0xa2,0xdd,0x0f,0x38,0x68,0x0c,0xeb,0xe4,0x50,0xfd,0xc6,0x3a,0xd6,0x2b,0x3d,0x59,0x45,0xfb,0x64,0x5e,0x65,0x81,0x0e,0x66,0xed,0xbc,0x49,0x52,0x14,0x51,0x75,0x8c,0x47,0x88,0x76,0x95,0x0b,0x2e,0x02,0x3d,0xce,0x20,0x83,0x34,0x56,0xfe,0xf8,0x50,0x7d,0x9a,0x93,0xb5,0x0f .byte 0x88,0x0a,0xea,0x7e,0x50,0x98,0xdf,0x93,0x5d,0xa9,0xba,0x1c,0x6f,0x58,0x8d,0xb0,0x7a,0x37,0x86,0xba,0x49,0x12,0x35,0x99,0x16,0x6a,0x1d,0x02,0x03,0xfc,0xef,0x7a,0x4a,0x8e,0x54,0x7b,0xc4,0xd4,0x6b,0x6c,0xe5,0x7c,0xc0,0xa9,0x20,0x26,0x6f,0x2e,0x71,0xb9,0x6b,0x3e,0x26,0x9e,0x02,0x7a,0xeb,0x87,0x6b,0xf2,0xc1,0x8e,0x8f,0xe8 .byte 0x26,0x23,0x86,0xcd,0xdc,0x8f,0xbd,0xe9,0xeb,0x80,0x7f,0x0d,0xbd,0x8f,0x05,0x3c,0xa7,0xbc,0x0b,0x9c,0x03,0xb7,0x82,0xbd,0xc7,0x7a,0xd5,0x4d,0xb0,0x0d,0xd1,0xac,0xba,0x90,0x3e,0xa1,0xef,0x79,0xfc,0x50,0x7d,0xbf,0x8c,0x52,0x13,0x6c,0x91,0x9e,0xb4,0x2b,0xa8,0x96,0x95,0x04,0xe6,0x2e,0x17,0x43,0x43,0x23,0x91,0x63,0xd4,0x1a .byte 0xe2,0xb7,0x16,0xdf,0x3a,0x39,0xca,0x80,0x92,0x0a,0x00,0x52,0x50,0x75,0xde,0x1c,0x2e,0x91,0x0a,0xf2,0x28,0xb8,0x94,0x16,0x2b,0x0c,0xc0,0x11,0xc4,0x47,0x35,0x4f,0x59,0x03,0x6f,0xcd,0x99,0x23,0xdc,0x24,0xe5,0x68,0x7f,0x82,0x0c,0x28,0xba,0x57,0xa7,0x7c,0x75,0xd9,0x0d,0x34,0x23,0x7e,0x53,0x61,0xad,0xef,0x63,0xdc,0xa4,0xb0 .byte 0xa0,0xa7,0x54,0xec,0xc9,0xf8,0x80,0x13,0x2c,0xd9,0xc4,0x42,0xec,0xd3,0xd8,0xac,0x04,0xa1,0x61,0x5a,0xdd,0x3e,0xa5,0x29,0x70,0x8f,0xa3,0x44,0x04,0x14,0x7d,0x2b,0x34,0x38,0x89,0x53,0xf4,0x89,0x5a,0x9b,0xa2,0xf5,0x30,0x0b,0x17,0x0a,0xda,0x4e,0x9c,0xca,0xb6,0xa8,0xbb,0x0a,0x1b,0xa0,0x48,0x6d,0x85,0x48,0x70,0x7b,0x98,0xbd .byte 0x82,0x09,0x1f,0xbf,0xf9,0xe7,0xe7,0x4a,0x9e,0xa6,0x9a,0xf4,0x61,0xd7,0xfa,0x45,0x3e,0xd6,0x29,0xf7,0x4c,0x23,0x32,0x76,0x56,0x2d,0xa7,0x88,0xc5,0x63,0xc0,0x99,0x69,0x85,0x69,0x98,0x1d,0xfb,0x8f,0x5a,0x2c,0x0d,0xd8,0x44,0xae,0x12,0xff,0x28,0xa2,0x12,0x12,0x05,0xe2,0xb9,0x06,0x38,0xfb,0x0b,0x1e,0x5f,0x38,0x04,0x37,0xe6 .byte 0x1b,0x87,0xe2,0xaf,0x7a,0x01,0x34,0x72,0xc0,0xf6,0x36,0x6c,0x62,0x22,0x5f,0xdd,0x22,0xb9,0xef,0x15,0x51,0x76,0xaa,0x18,0xa9,0xba,0xc0,0x4d,0x5b,0x72,0x73,0xcd,0x25,0x79,0xc0,0x81,0xdd,0x38,0xab,0x75,0x9f,0x53,0xe6,0xfd,0xbe,0x94,0x99,0xac,0x93,0xb6,0x85,0x96,0x04,0xc2,0xf2,0x52,0xbc,0x3b,0x47,0x91,0xdd,0xa0,0x36,0xbe .byte 0x63,0x70,0x72,0x55,0x61,0xc0,0x2c,0x09,0x16,0xa5,0xc9,0xaa,0x1f,0x0e,0x62,0xae,0x3c,0xf0,0xf2,0xa6,0xd2,0xd1,0xaa,0xdb,0xc1,0x75,0xfd,0x55,0x8c,0x99,0xd1,0x07,0xb7,0xd4,0x0e,0x24,0x89,0x0f,0xc8,0x05,0xe4,0x2e,0x20,0x8a,0x56,0x26,0xe0,0x24,0x0f,0xf8,0xc6,0xc5,0x17,0xcc,0xac,0x4e,0xbe,0x03,0x81,0xe2,0xd5,0x9c,0x33,0x5f .byte 0x86,0xb2,0xc4,0x66,0x08,0x78,0xc2,0x41,0x91,0x1e,0xa2,0x66,0xfb,0x12,0x24,0x41,0x5f,0x34,0x73,0xc7,0x9d,0x4b,0xaa,0x19,0x8e,0x6b,0x42,0x17,0x97,0x96,0xef,0x2b,0xb6,0x33,0xaf,0xe4,0x86,0xd0,0x68,0x57,0xf3,0x75,0x65,0x72,0x90,0x36,0xb0,0x18,0xba,0xcf,0x98,0x25,0xe7,0x81,0x42,0xfc,0x1b,0x6a,0x34,0x08,0xa5,0x41,0xb6,0x22 .byte 0x49,0x27,0x8f,0xd1,0xa1,0xda,0x01,0x88,0x9a,0x0c,0xd7,0x48,0xf4,0xbb,0xa0,0x79,0x91,0x6b,0x41,0x46,0x1c,0x2e,0xc7,0x4f,0x18,0xcc,0x11,0x20,0x84,0xc7,0xfe,0x2c,0x3a,0xf6,0x15,0xdf,0xcd,0x8b,0x69,0xda,0xd0,0xd8,0x2d,0xf6,0x7b,0x82,0x7b,0x65,0xcb,0x6a,0x3d,0x20,0x8b,0x35,0xe5,0x6f,0x69,0xa4,0x8d,0x76,0x96,0xe6,0x70,0x67 .byte 0xa2,0xca,0x56,0x23,0x0e,0x3c,0x62,0x47,0x36,0xb4,0xd5,0x79,0xa4,0x4e,0x35,0xa8,0x1a,0x46,0x7a,0x78,0x6d,0x9a,0xd9,0xbc,0x90,0xff,0xa8,0xb0,0x13,0x1d,0x42,0xb2,0xf2,0xa9,0xc4,0x0c,0x8e,0x16,0x1c,0x60,0xcf,0x3d,0xfe,0x5e,0xbb,0x7c,0xe5,0xd5,0x3c,0xb3,0x32,0x86,0xcb,0xa4,0xff,0xe5,0x9b,0x26,0xf7,0xc2,0x5a,0x3f,0xa0,0x9d .byte 0x2d,0x2d,0xb5,0x4a,0x08,0x80,0xf4,0x04,0xf8,0x85,0x0c,0xed,0x52,0x75,0xab,0xbb,0x4b,0x16,0xf7,0xa8,0x21,0xa9,0x47,0x80,0x9c,0x54,0xee,0x8f,0x77,0xb1,0x93,0xd4,0x11,0x52,0x3d,0xe7,0xa5,0x30,0x8d,0x9e,0xef,0x82,0x93,0x5e,0x62,0xdb,0x52,0x64,0x8c,0x3a,0x0f,0x9a,0xfa,0x0c,0x9c,0x54,0x5d,0x7c,0xd6,0xc3,0xf6,0xca,0xe6,0x60 .byte 0x15,0xbd,0x97,0xac,0x0e,0x54,0x5e,0x9a,0x2c,0x58,0xd1,0x87,0xcd,0x36,0xef,0x0d,0x87,0xf8,0x57,0x3e,0x95,0x1c,0x9c,0xac,0x76,0xb9,0x63,0x17,0x6a,0x20,0x94,0xcf,0x2b,0xb2,0xa4,0x2c,0x67,0x31,0x92,0x31,0x76,0xc6,0x89,0xbd,0xd6,0xa5,0xd1,0x36,0x42,0xc7,0xb4,0x92,0x83,0xb1,0xb5,0xd8,0xa0,0x77,0xc8,0xd5,0x24,0x57,0x98,0xd8 .byte 0x18,0x9a,0xe5,0x5c,0xfa,0xe0,0x29,0xfe,0x18,0x4d,0x67,0xaf,0x6b,0x51,0xdc,0xaa,0xc5,0x05,0x3d,0xe7,0xda,0x81,0x66,0xc1,0x93,0x78,0x70,0x9a,0x4a,0xbe,0x32,0x0d,0x92,0x28,0x5a,0x1e,0xf3,0x53,0x1c,0x1a,0x5c,0x08,0x42,0xe4,0xc0,0x83,0xb0,0x89,0x19,0xd9,0xeb,0xf8,0xf3,0x60,0x4c,0xce,0x78,0x2d,0x05,0x21,0xd3,0xea,0xdb,0xc4 .byte 0x35,0xcb,0xe7,0x08,0x03,0xec,0x4c,0x32,0xcf,0x51,0xae,0x01,0x47,0xe9,0xaa,0x0d,0x69,0x9a,0xf0,0x5e,0x30,0x78,0xa5,0x49,0xdf,0x1e,0x4c,0xa5,0x86,0xb3,0x8a,0xf4,0x14,0x4a,0x9a,0xf7,0x22,0xd0,0x90,0x1f,0x1f,0xe3,0x57,0x6c,0xdb,0x83,0xea,0x74,0xd6,0xd3,0x62,0x19,0x02,0x93,0x6b,0x32,0x62,0x8b,0xd0,0xa5,0x21,0xaa,0x8f,0x7f .byte 0x36,0xc4,0x9c,0x1f,0x61,0x3a,0xd8,0xab,0x92,0xd3,0x09,0xe3,0xad,0xcc,0xdc,0x0d,0x04,0xaf,0xa7,0x57,0xff,0x3a,0x5e,0x50,0x7d,0x96,0x6d,0xcf,0x87,0x17,0x0a,0xec,0x70,0x9a,0xb0,0x98,0xa8,0xe4,0xf5,0x32,0x09,0x76,0xf3,0x59,0x50,0x48,0x34,0x25,0x14,0xef,0x85,0x45,0x1e,0xb8,0x1f,0x66,0x6b,0x45,0x6a,0xfa,0xd4,0x48,0xd2,0x59 .byte 0xd7,0x4c,0xf3,0x27,0x43,0x3d,0xf7,0x69,0x7f,0x64,0x8d,0xf3,0x55,0x82,0x05,0x5c,0xef,0x89,0x29,0x2c,0x35,0x22,0x8b,0xce,0x2f,0xcf,0xca,0x55,0x04,0x39,0xa0,0xda,0x37,0x3c,0xdd,0x32,0x99,0x8e,0xc7,0xcc,0x87,0x4a,0x47,0xd8,0xb2,0x9a,0x30,0x43,0x5c,0xe5,0xc7,0x44,0x87,0x9e,0x19,0x29,0xff,0xc8,0xea,0x43,0x87,0xf6,0xf3,0x3b .byte 0x4e,0x1c,0xff,0xf3,0xd2,0x6b,0x04,0x03,0x52,0x83,0x97,0x59,0x4e,0x57,0x7b,0x8d,0x5d,0x8a,0xa7,0x7c,0xc1,0x88,0x52,0x7c,0x13,0xda,0x7e,0x80,0x64,0x03,0x30,0x83,0xbc,0xd1,0x3e,0x79,0xee,0xd4,0x23,0xc8,0xe5,0x5c,0xf1,0x3b,0xa5,0x1e,0xa4,0x0d,0x20,0x8f,0x8b,0x87,0x18,0x63,0x7e,0x6c,0x17,0x1b,0x01,0x0b,0xd5,0x47,0x89,0x43 .byte 0x84,0x0d,0x2a,0x80,0x1e,0x54,0xab,0x8a,0x0c,0x94,0xa5,0x0b,0x24,0x5e,0xcd,0xde,0x1c,0x00,0x8f,0x2a,0x29,0x01,0xf5,0xcc,0xca,0x54,0xa1,0xce,0x37,0xef,0xe5,0x4e,0x53,0x8e,0xc1,0x13,0x1a,0x75,0xf7,0x8f,0xec,0xf8,0xe9,0x5c,0xc8,0xe6,0x28,0x89,0x6e,0xb8,0x4b,0x39,0x24,0x73,0x28,0x3d,0x56,0xaf,0x8b,0x3b,0x61,0x70,0xae,0x3b .byte 0xc7,0xe8,0xab,0x47,0xe7,0x16,0xce,0xb8,0xac,0x82,0xac,0x51,0x0b,0x70,0xec,0x6e,0xda,0x0a,0x7e,0x9a,0x6f,0xe1,0xff,0x83,0xb4,0x89,0xec,0x49,0xda,0x48,0xb0,0x3e,0xdb,0x64,0xf6,0x7b,0xc5,0x33,0x02,0x7d,0xae,0x37,0xf1,0x3e,0x03,0x6d,0xf8,0xa3,0x86,0xb3,0xde,0x6a,0x57,0x1b,0xd8,0x85,0xbd,0x9c,0x07,0x84,0xea,0x17,0x4c,0x38 .byte 0x27,0xfe,0x4e,0x2f,0x94,0x09,0xa8,0x7d,0xe0,0x51,0xea,0x6c,0x32,0x2a,0x54,0x2e,0xc1,0xc1,0x21,0x44,0x0b,0x8d,0xc5,0xbd,0x25,0xaf,0xdc,0x45,0x77,0x39,0xbf,0xea,0x60,0x0f,0xb8,0x30,0x74,0xdf,0xd4,0xd6,0x79,0xcf,0x6c,0x2d,0x23,0x21,0xce,0x68,0x16,0x4e,0x9c,0x47,0xc1,0xa7,0x77,0xb8,0x9e,0xe7,0x5c,0x72,0x73,0xab,0xd1,0x56 .byte 0x6e,0x50,0x6d,0xe6,0xd6,0xd3,0x13,0x92,0xed,0x98,0x85,0x4a,0x7d,0xc8,0x9f,0x50,0xb6,0x42,0x9c,0x0a,0x8b,0xc1,0x23,0x46,0x20,0xa9,0xd9,0x20,0x2a,0x38,0x5e,0x39,0xfc,0x46,0x9e,0xbe,0x82,0x5c,0x73,0x33,0x7d,0x8a,0xfd,0x2c,0x1d,0x84,0xa9,0x5e,0x64,0xea,0x3f,0xbf,0x82,0xe4,0xd8,0x70,0xc9,0x7d,0x01,0xca,0x71,0xfb,0x63,0xe8 .byte 0xd8,0x75,0x25,0xd0,0xa3,0x80,0x43,0x8c,0x2a,0x70,0x4f,0x7f,0x04,0x99,0x1d,0xe3,0x73,0x7d,0x6c,0x3f,0xf7,0xf7,0x2f,0xd8,0x0e,0xa4,0x60,0xf6,0x22,0xb1,0xf1,0x2f,0x5a,0x1f,0xd4,0xdb,0xae,0xdb,0x97,0x94,0x16,0xe6,0xd2,0xf2,0xc1,0x9f,0xb8,0xc5,0xb3,0xed,0x41,0x12,0x40,0xe1,0x09,0xaf,0xe3,0x52,0x97,0x63,0xa3,0x41,0x63,0x93 .byte 0x6f,0x6e,0x07,0xa7,0x92,0xa9,0x94,0x60,0x38,0x60,0x1e,0xff,0x05,0x0c,0xed,0xdc,0x78,0xfb,0x6e,0xa4,0x08,0x21,0x31,0xaa,0xf9,0x6f,0xed,0xaf,0xc6,0x5d,0xfe,0xbe,0xab,0x76,0x4f,0x78,0xb9,0xaa,0x21,0x4d,0xdd,0xb2,0x14,0xf5,0x32,0x03,0xa2,0x6e,0x57,0xc6,0x54,0x65,0x81,0x1f,0xdc,0x1a,0xc5,0xba,0xee,0x26,0xa2,0x90,0xc8,0xb6 .byte 0x47,0xc6,0xbb,0x9a,0xaa,0x19,0x72,0x8d,0x19,0xbc,0x21,0xe5,0x93,0x58,0xf8,0x1f,0x00,0x28,0x6f,0x66,0x45,0x5e,0x02,0xeb,0x44,0x69,0x87,0xd1,0x1b,0x73,0xb7,0xc7,0xc8,0xf6,0x20,0x30,0x85,0x77,0xc3,0x2d,0x0e,0x55,0x7d,0x80,0x14,0x50,0xff,0x5e,0x79,0x6b,0x1f,0xff,0x76,0x33,0x7d,0x7d,0x34,0x01,0xaf,0xfb,0x73,0x8a,0x89,0x6d .byte 0x2f,0x0b,0xdb,0xc3,0xea,0x17,0x94,0x06,0x59,0x2e,0x0f,0x34,0x1c,0x75,0x42,0x42,0x83,0xb0,0x18,0xe5,0x6e,0x3c,0x22,0x59,0xce,0x45,0xb8,0x77,0x99,0x92,0x55,0x34,0x45,0x2e,0x04,0x1f,0xd4,0x4f,0x03,0x64,0x92,0x99,0x9c,0x8b,0xd8,0xd7,0x36,0x7c,0xdb,0x2a,0x30,0xb6,0x17,0xba,0x85,0x9d,0x1b,0xc4,0xc7,0x13,0x76,0xe4,0x0b,0xe6 .byte 0x28,0x8a,0x3a,0x7f,0x96,0x27,0x1c,0xea,0x9e,0x06,0x29,0xe2,0x88,0x22,0xd4,0xda,0x0e,0x19,0x3e,0x42,0xea,0x55,0xf3,0x4d,0x3e,0xf6,0x0b,0xcd,0x05,0x0c,0x5d,0x8a,0x46,0x3e,0x7a,0x3c,0x95,0x55,0x42,0x83,0x32,0x4c,0x5f,0x91,0x4e,0x7d,0x0a,0x8a,0x90,0xbe,0x7d,0x01,0xd7,0x4f,0x21,0xe9,0x24,0x25,0xd3,0x76,0xe8,0x54,0x97,0x44 .byte 0xdc,0x7e,0x89,0xe5,0x74,0xc4,0xfe,0x41,0x39,0x95,0x81,0x7e,0x3f,0x4c,0xca,0x84,0x7a,0xb8,0x24,0x3d,0x3c,0x86,0xa1,0x49,0x4c,0xec,0x55,0x59,0x11,0x7d,0x1a,0x2e,0xa3,0x36,0x70,0x36,0x9c,0x69,0x47,0x96,0xc1,0x85,0xb0,0xc5,0x9f,0x85,0x1a,0x5a,0x4e,0x77,0x64,0x91,0x73,0x19,0x41,0x59,0x6a,0xb6,0xae,0x37,0x65,0xa2,0x7d,0x2f .byte 0xef,0x24,0xab,0x48,0xbc,0x20,0x4c,0x57,0x49,0x08,0xc6,0x2f,0x26,0x8c,0xb5,0xa0,0x55,0xf6,0x95,0xfc,0x14,0xb2,0xa3,0x28,0xf1,0x98,0x24,0x67,0xeb,0x7d,0x49,0x6d,0xf2,0x63,0x16,0x99,0xb3,0x67,0xdd,0xd2,0x7e,0xaf,0xcb,0x6c,0x76,0xcd,0x05,0xc8,0x8b,0xec,0x56,0x7d,0x00,0xf9,0x89,0x64,0x15,0xbb,0xa2,0xb8,0x8b,0xdb,0xd2,0x86 .byte 0xaf,0xf7,0x85,0x0a,0x50,0x4c,0xca,0x65,0xc3,0x31,0xca,0xdc,0x81,0xea,0xd3,0x89,0xd8,0xb3,0x91,0x90,0x8c,0x7b,0xff,0x20,0x62,0xac,0xad,0x06,0x47,0xdd,0x22,0xa5,0xb9,0xd0,0x4f,0xee,0x30,0x69,0x51,0x7d,0x7d,0x32,0x4f,0xbb,0x03,0x43,0xec,0x39,0xac,0x8e,0xab,0xcf,0xc2,0x72,0x67,0x68,0x84,0x61,0x3b,0x4d,0x77,0x6b,0xab,0xe9 .byte 0x04,0x9c,0x82,0x46,0xef,0x58,0x92,0x94,0x6c,0x33,0xfa,0x61,0x61,0x15,0xb2,0x4d,0xfc,0x49,0x91,0xad,0x67,0xb2,0x6a,0xa9,0x0c,0x06,0x20,0xc7,0x5e,0xc0,0xd3,0xb0,0x20,0x36,0xd7,0x76,0x7d,0x3c,0x1b,0x6a,0xfa,0xab,0x2d,0xb7,0x1f,0xad,0xb9,0x43,0x45,0x48,0x2b,0x09,0x29,0x80,0x14,0x2d,0x17,0x42,0x4e,0x1d,0x53,0x57,0x67,0xe3 .byte 0xca,0xc7,0x92,0xd1,0x4d,0x07,0xac,0xcf,0x08,0x0e,0xd1,0xd2,0xd5,0xbf,0x18,0x01,0xd2,0x2f,0x79,0x3b,0xd2,0x51,0x7a,0xdc,0x69,0x40,0x51,0x3e,0x57,0xa2,0x3c,0x5f,0x55,0x9b,0xfc,0x0e,0x45,0x96,0xa3,0x8f,0xa2,0x3d,0x64,0x40,0x12,0x07,0x7e,0x0b,0x1d,0x33,0x4f,0xd8,0xd0,0x93,0x8c,0xd9,0x2e,0xd4,0xa9,0xb4,0x08,0x28,0x21,0x52 .byte 0xda,0xd4,0x86,0x19,0x3b,0x71,0xe4,0x37,0x22,0x5b,0x2a,0x8f,0x83,0x9f,0xd6,0x42,0x85,0xc9,0x30,0x4c,0x5d,0xe4,0x14,0xa9,0xec,0x19,0x8e,0x0a,0x0a,0x29,0xe0,0x00,0x23,0x0b,0xbd,0xc2,0xd4,0xe8,0x6a,0xcb,0xf8,0xdf,0xd0,0x50,0x69,0x0d,0x40,0xe9,0x69,0x31,0xfb,0x64,0x4a,0x6b,0x47,0xba,0x24,0x46,0xf1,0x29,0x80,0x0b,0x75,0x92 .byte 0x4e,0x9c,0x59,0xd5,0xf4,0x49,0x32,0x5f,0x92,0xdb,0x1e,0x76,0xa9,0x35,0xe3,0x94,0xcf,0xe8,0x1d,0x47,0x6f,0x82,0xe8,0x75,0xaa,0x41,0xd2,0xa0,0x26,0xfc,0x9d,0x0c,0x02,0x93,0xd5,0xd1,0x14,0x96,0x7c,0xa5,0x9d,0x44,0xec,0x8d,0xa6,0x02,0x17,0x12,0x32,0xb9,0xe4,0x8a,0x91,0xfd,0x23,0xc3,0x64,0x13,0xcd,0x57,0x84,0x8e,0x81,0xb5 .byte 0xa0,0x36,0x22,0x88,0xc0,0x45,0xe5,0xbf,0xb2,0xa6,0xe6,0xa8,0x1c,0xe8,0x8b,0xc8,0x55,0x7f,0xbe,0x45,0x17,0x76,0xe3,0x87,0x67,0x3a,0xd6,0xa0,0x62,0xc1,0x54,0xef,0xaa,0x53,0xd0,0x6d,0x6c,0x33,0xdf,0x7f,0x03,0xa5,0xa3,0x36,0x7d,0xab,0x55,0xbf,0x04,0x43,0xa5,0x59,0xcc,0x6f,0x1c,0xaf,0xfc,0x0e,0x46,0x7f,0x23,0xda,0x89,0xf7 .byte 0x4d,0xe7,0xfe,0x1e,0xb4,0x08,0x7a,0xea,0x61,0xf5,0xcd,0x1f,0xee,0x70,0xe2,0xfb,0xb1,0xe3,0xb1,0x57,0x65,0x29,0xa0,0xa9,0x11,0x20,0xba,0x29,0x2c,0x68,0x37,0x38,0x07,0x9b,0x58,0x20,0x81,0x4e,0x3c,0x07,0x91,0x93,0xf7,0x1c,0x28,0x59,0x72,0x55,0x50,0xe1,0x23,0xca,0x28,0x32,0xa4,0x5b,0xdf,0xc7,0xd2,0x6b,0x3e,0xdc,0x21,0xec .byte 0xe3,0xb7,0xae,0x10,0x4d,0x86,0xa9,0xc7,0x43,0xc2,0x84,0xd8,0xb8,0x5e,0x2c,0x4b,0xf3,0xad,0x4f,0xd0,0x1e,0xe9,0xdd,0x4c,0xcc,0x7a,0x02,0xc2,0x43,0xd0,0x32,0x80,0xc5,0x97,0x05,0xaa,0xef,0x67,0xe2,0xde,0xaf,0xf4,0x41,0xa1,0x98,0xc6,0xe6,0xb6,0x03,0x06,0xec,0x56,0xe7,0x90,0x5e,0xba,0x67,0x4b,0xa1,0x52,0xb4,0xfd,0xa0,0x32 .byte 0x19,0xb5,0x1c,0x8f,0x11,0xc7,0xa7,0xb6,0xa3,0x29,0x83,0x94,0x8f,0x41,0x6b,0xc2,0x60,0xa0,0x3d,0x61,0xe2,0x51,0x2d,0x1f,0xe3,0xa6,0x71,0x72,0x1b,0x3e,0x5b,0xdd,0x0f,0xc4,0xfc,0x3c,0xc1,0xfd,0x2b,0x7b,0x30,0x5c,0x73,0x95,0x53,0x12,0x68,0x22,0x4e,0x71,0xbf,0xbe,0x87,0x67,0xe0,0xc8,0x5d,0x7b,0xd3,0x3b,0xba,0x2a,0xd5,0x5c .byte 0x61,0x92,0x04,0xd2,0x64,0x5b,0xd0,0x04,0x99,0xe3,0x38,0x0a,0x27,0x7b,0xe0,0xf0,0x04,0xa5,0x15,0x8b,0x4b,0x0e,0x20,0x6e,0x22,0x22,0xa6,0x02,0xf2,0x40,0x74,0x6e,0xce,0x8f,0x56,0x42,0xbc,0xd3,0x55,0x9b,0xbb,0xa2,0x8e,0x26,0x84,0xda,0xea,0xf9,0xf6,0xb1,0x1c,0x93,0xe5,0x65,0xb6,0x0c,0x69,0x28,0x83,0x58,0x05,0xc7,0x44,0x66 .byte 0xbc,0x84,0x2a,0xc4,0x8c,0x78,0x80,0xa2,0x62,0x75,0x25,0x32,0x44,0xb8,0xd0,0x5e,0x76,0xc0,0x70,0x3d,0x18,0xb3,0x5c,0xe1,0x18,0xf6,0x08,0xef,0x13,0x97,0x02,0x6a,0x4c,0xac,0x86,0x57,0x0b,0xf2,0x7a,0xdb,0xc0,0xf5,0xf0,0xa1,0xfd,0x48,0x96,0x85,0xac,0x66,0x2d,0x49,0xeb,0x1c,0x56,0x46,0x2f,0x4b,0x01,0x98,0x1e,0xbc,0x74,0x57 .byte 0x6e,0x2e,0x11,0x9a,0xa5,0x94,0x8f,0x02,0x89,0x21,0x52,0x73,0x9a,0x8d,0x0e,0xba,0x7c,0x7c,0x2a,0xbe,0x84,0x36,0x3d,0x4a,0x14,0xb3,0x63,0x71,0x66,0xb6,0xf6,0x1f,0x95,0x73,0xe2,0x4b,0xa9,0xdb,0xe3,0x91,0x06,0xc3,0xfe,0x42,0xa5,0xae,0x60,0x6b,0x59,0xf5,0x25,0x77,0xc1,0x27,0xc0,0xbf,0x48,0xc4,0xe5,0x48,0x44,0xee,0xd4,0x51 .byte 0x25,0x56,0xf8,0x55,0x6a,0x8f,0x73,0xd4,0x9d,0xa1,0x12,0xfc,0x4e,0xb4,0x22,0x07,0x7c,0x90,0xa6,0x47,0x14,0xd0,0x42,0xec,0x74,0xb8,0xed,0x10,0xaf,0x85,0xb5,0x73,0xa2,0x70,0x97,0xee,0xfe,0xdd,0x49,0x65,0x62,0x8e,0x83,0x61,0xc7,0x37,0x79,0x84,0xa7,0x1f,0x2b,0xec,0x86,0x53,0xf0,0x78,0x06,0x96,0x42,0xb1,0xf8,0x07,0xf7,0x78 .byte 0x8b,0x75,0x35,0x59,0xce,0xaf,0x89,0x47,0x3c,0x64,0xae,0xda,0x35,0x53,0xe2,0x73,0x0f,0x58,0x92,0x74,0x08,0x3e,0xfb,0x07,0xad,0x41,0xeb,0x47,0xc7,0x64,0xf7,0x62,0x52,0x34,0x36,0x23,0xba,0x2f,0x3d,0x57,0xf4,0x4b,0xad,0xb6,0x3a,0x94,0x9c,0x31,0x07,0xf4,0x1d,0xd7,0xf1,0x6e,0xbb,0x9c,0x42,0x4b,0x7a,0x87,0x10,0xe8,0x9b,0xdb .byte 0x8b,0x7b,0x8b,0x16,0xd4,0x4c,0x5b,0xcb,0xe6,0x7e,0x0f,0xe1,0x64,0x14,0xc0,0xef,0x63,0x7c,0x71,0x92,0xc4,0x4f,0xd4,0x11,0x0e,0x26,0x08,0xb0,0xe9,0xdc,0xb6,0x75,0xe7,0x97,0xde,0x0e,0xed,0xe5,0x87,0xfb,0x59,0xeb,0x5c,0x70,0x02,0xad,0xfb,0x00,0x17,0x32,0x0d,0x15,0xfd,0xce,0xfe,0xa3,0x11,0x2f,0xf4,0xd1,0xbe,0xbf,0xee,0x50 .byte 0xd7,0xaf,0x4c,0xe8,0x0f,0x2a,0xfd,0x59,0x5f,0x23,0xe3,0x8c,0x49,0x60,0xa4,0xe0,0x80,0x1a,0x2f,0xc0,0x38,0xb3,0x1b,0x3f,0xa5,0xc6,0xa4,0xb6,0x53,0x3b,0xe2,0xb0,0xc2,0x55,0xba,0x84,0xa2,0xe3,0x6e,0x16,0x6b,0x2f,0x11,0xea,0xdd,0x52,0x77,0xd7,0x25,0xfa,0x12,0x36,0xd5,0x72,0x94,0x5a,0xc0,0x56,0xdf,0xd3,0xef,0x77,0x2a,0x2f .byte 0x87,0x02,0x06,0x9a,0x00,0x7e,0x80,0xf2,0x90,0xea,0xfd,0x93,0x6e,0x0c,0x0d,0xbd,0xe5,0x9d,0x8c,0x4e,0xdf,0x9c,0x87,0x89,0xf9,0xde,0xff,0xc4,0x49,0xc9,0xb6,0x3c,0xe1,0xcd,0xce,0xfb,0x59,0xd0,0x5a,0x97,0x67,0x62,0x63,0x19,0xcc,0x54,0x3c,0xf4,0x97,0x4e,0x77,0xb3,0xbc,0x42,0x15,0x95,0x27,0x54,0x41,0xad,0x21,0x25,0xc7,0x36 .byte 0x07,0x58,0xa5,0xca,0x7c,0x27,0xa5,0x6a,0xc1,0x90,0xcc,0x06,0x39,0x10,0x1b,0x20,0x46,0x55,0xd6,0x3a,0xe7,0xec,0x6b,0xba,0x7f,0x99,0x8b,0xd3,0xab,0xaa,0x1a,0x4e,0x7c,0x5e,0x01,0x8e,0xa4,0x99,0x0b,0x41,0x22,0x1a,0x3a,0xeb,0x3b,0xe6,0xfb,0x0b,0x9c,0x65,0xe1,0xcb,0x61,0xf1,0xb0,0x18,0xee,0x52,0xb5,0xbb,0x46,0xf4,0xca,0xae .byte 0xe9,0xa0,0xe3,0xe9,0xea,0x84,0x88,0x95,0x6d,0xd2,0xe9,0x82,0x0f,0x40,0x5f,0xeb,0xcb,0x51,0x34,0xf1,0x5c,0x1b,0xac,0x75,0xc3,0x0f,0x14,0x6b,0xc9,0xb3,0xa2,0x40,0xbb,0x0e,0x71,0x3b,0x7a,0xee,0xe8,0x25,0xf5,0x64,0xa0,0x3a,0x94,0xeb,0xfb,0x4d,0x9c,0x72,0xbb,0x85,0x22,0x44,0x53,0x19,0x0e,0xc7,0x68,0xa6,0x12,0x6d,0xaf,0xd7 .byte 0x13,0x0d,0x02,0xd9,0xe8,0xd4,0x8c,0xc2,0x83,0x5b,0x68,0x42,0xbc,0x22,0x9a,0x2b,0x2a,0x4f,0x3e,0x1c,0x52,0x21,0x14,0x58,0x75,0x1e,0x31,0xcf,0xac,0xaa,0xa3,0xd7,0x31,0x0e,0x73,0x79,0x31,0xf6,0xbe,0x3d,0xe2,0x27,0x23,0x58,0xda,0xc2,0xb5,0xce,0xd8,0x91,0x76,0x97,0x3c,0x64,0x4b,0x95,0xce,0x93,0x52,0x32,0xfe,0x33,0x3b,0xef .byte 0xa4,0xed,0xdf,0x81,0x18,0xc7,0x08,0x51,0x81,0xf2,0xfb,0xf8,0x2d,0xcf,0x69,0x21,0x05,0x15,0xed,0x9d,0xf7,0x87,0x64,0xeb,0x9b,0x0b,0x2c,0x9b,0xf3,0xbf,0x32,0x21,0x27,0x38,0x20,0xc3,0x5f,0xb8,0xfe,0x17,0xf5,0x8f,0x3f,0xac,0xda,0x49,0x3d,0x54,0x14,0x9e,0xd5,0x89,0xdb,0x20,0xda,0x43,0x67,0x84,0x4b,0xb7,0x11,0xd3,0x08,0x2f .byte 0x56,0x8f,0x95,0x79,0x82,0x28,0xec,0x45,0x3c,0xc5,0xa7,0xd7,0xad,0xaa,0x82,0xda,0x87,0xb3,0x32,0x3e,0x27,0xf4,0x3d,0x27,0xcf,0x2d,0x04,0x00,0x22,0x13,0x36,0x57,0x8c,0x84,0x10,0x4a,0x7c,0xbb,0x57,0x13,0x1f,0x4d,0x64,0x60,0x14,0x64,0x85,0x9a,0x05,0x46,0xfc,0x10,0x6f,0x67,0x82,0x5a,0xb9,0x65,0xd5,0x00,0xfa,0x07,0xb3,0x70 .byte 0x18,0x94,0x3a,0x4f,0xef,0x6e,0x4d,0x13,0xf3,0x63,0x5a,0xa1,0xe1,0x19,0xbf,0xc0,0x2e,0xf5,0x1f,0x53,0x7c,0x33,0xc3,0x5b,0xab,0xbd,0xdf,0x90,0xca,0x2d,0x20,0xb4,0x4e,0x6a,0xea,0xa5,0xad,0x62,0x20,0x8a,0xbf,0xf4,0xc4,0x90,0x5b,0xa8,0xe5,0xea,0xe9,0x53,0x42,0x33,0x29,0xce,0x46,0x69,0x4f,0x58,0x18,0xab,0x15,0xc2,0x5f,0x50 .byte 0x6f,0x31,0xcf,0x09,0x23,0x2e,0xf5,0x29,0xef,0xad,0xcb,0x36,0x7c,0xf1,0x5d,0x0c,0xf6,0xfc,0xfb,0x17,0x08,0x31,0xa7,0xa9,0xc9,0x56,0x51,0xcf,0x27,0xea,0x25,0x15,0x89,0xe1,0xe4,0x1c,0x18,0x30,0x4c,0xd4,0x2a,0x0e,0x68,0xd6,0x07,0x19,0x51,0x95,0xdd,0x70,0x60,0x98,0x1d,0x21,0xab,0x59,0x36,0xb3,0x2c,0xc2,0xbf,0xdb,0x79,0xbe .byte 0xd6,0x32,0xff,0x86,0xa0,0xfc,0xa9,0x7a,0xb7,0x08,0x40,0xb8,0x6d,0x44,0x78,0xe6,0xae,0x52,0x3d,0x60,0x48,0x0c,0xd3,0x72,0x30,0x1c,0x51,0x1e,0x5f,0x1d,0x34,0x7c,0xfb,0x08,0x04,0x1d,0xcc,0x6e,0xec,0x67,0xd8,0x65,0xae,0x63,0xba,0x7b,0xeb,0xd6,0x15,0xbe,0x69,0x41,0xdc,0x67,0x09,0x20,0x6e,0xa5,0x19,0xc7,0xc2,0xd2,0x12,0x74 .byte 0x1e,0x27,0xed,0xc4,0x61,0x23,0xcc,0xb8,0xc0,0x1c,0xb9,0xb2,0xc4,0x4c,0x9b,0x04,0x4b,0x41,0x63,0x2a,0x04,0xef,0xe9,0x12,0x14,0x9f,0xbf,0x36,0x0f,0x73,0x68,0x14,0xdb,0x12,0x5c,0x27,0xcc,0xd3,0xb4,0x2a,0xa9,0x45,0xeb,0x7e,0x72,0xab,0x22,0x23,0x0f,0xa2,0x7c,0x67,0xa6,0x3e,0x74,0xb6,0x84,0xb0,0xab,0x65,0xe2,0x4e,0x31,0x5a .byte 0xec,0x30,0x52,0x94,0x58,0x08,0x26,0x1f,0x7a,0x3c,0xed,0x38,0xcb,0x2d,0x3d,0x13,0xab,0x2c,0x37,0xb5,0x68,0x5a,0xb5,0x35,0xb6,0xc6,0xa5,0x20,0xdb,0x2f,0x66,0xb4,0xf3,0xae,0x3a,0xf8,0x22,0x86,0x6b,0x09,0x98,0xce,0x8f,0x2b,0x9c,0x1a,0xa2,0x47,0x05,0xbb,0xf1,0xf5,0x2d,0x5c,0xfb,0xc4,0x6e,0xeb,0x1f,0x4c,0x40,0x3d,0x97,0x1d .byte 0x86,0xf0,0xf8,0x17,0xd6,0xd9,0x3f,0x65,0x33,0x30,0x85,0x37,0x5a,0xf6,0x7d,0x39,0xac,0x87,0x99,0xeb,0x76,0xcc,0x79,0xe2,0xda,0xe9,0xc4,0x62,0x4d,0x4a,0xbf,0x67,0x22,0x10,0x91,0xbe,0x25,0x8f,0xd7,0x28,0x75,0xbc,0x52,0x2c,0x66,0x3e,0xc0,0x35,0x4c,0x02,0x37,0x96,0x6b,0x90,0x00,0xaf,0x23,0x49,0x90,0x4d,0x97,0x90,0x9f,0x06 .byte 0xde,0x9b,0x63,0x57,0x88,0x33,0x40,0xd5,0xd7,0xcc,0xf2,0xa8,0x9e,0x5f,0x40,0xb6,0x17,0xae,0xe5,0xda,0x4c,0x2f,0x9d,0xc7,0xfd,0x1a,0x62,0x8e,0x99,0x8e,0x47,0x96,0x31,0xc1,0xb9,0x72,0x73,0xd4,0x7f,0x31,0xa3,0xfb,0x67,0xed,0x3c,0x44,0x9b,0x9c,0x21,0x4b,0xaf,0x91,0x80,0xfc,0x8f,0x4a,0x6c,0x83,0x4f,0xb3,0xb0,0x2f,0x5c,0xee .byte 0xeb,0x9b,0x8d,0xb0,0x18,0x46,0xcb,0xfc,0x0a,0x46,0x4a,0xe5,0x88,0xb0,0x08,0x75,0x78,0x61,0x2f,0x1a,0x26,0x70,0x43,0xcf,0x5a,0xbb,0xb4,0x1a,0x65,0x19,0xbb,0xe7,0xe1,0x23,0xd3,0x39,0x79,0x76,0xb7,0x1c,0xe2,0x05,0x90,0x43,0x8c,0xb6,0xa0,0xca,0x05,0x28,0xa5,0xd7,0x42,0x02,0x2f,0x2c,0xc1,0x6c,0x29,0xaf,0xfe,0x68,0x71,0x82 .byte 0x43,0x9d,0x55,0xd6,0x6e,0x49,0xdb,0xf0,0x3c,0x7b,0x10,0x22,0x77,0x16,0xe7,0x75,0xe8,0x54,0x47,0x49,0xae,0x3b,0x4b,0xc8,0x97,0xa4,0xf2,0x63,0xff,0x2a,0xd1,0x01,0x18,0x24,0x13,0x18,0x27,0x02,0xfd,0xe2,0xf5,0xc7,0x21,0xb8,0x15,0x45,0x9a,0xb5,0x82,0xd6,0xde,0x08,0x44,0x4c,0xb2,0x4f,0xa0,0xd6,0x4f,0x84,0x04,0x83,0xe1,0xf5 .byte 0xce,0xa5,0x6f,0xa8,0x24,0x91,0xf6,0x52,0x8b,0x5e,0x2f,0x66,0x58,0x74,0xbc,0xd3,0x91,0xe7,0x25,0x2d,0x2d,0x69,0xf3,0x6a,0xe9,0x96,0x18,0x64,0x59,0x7b,0x62,0x13,0x4b,0x3e,0x15,0xbd,0xe0,0xff,0xe3,0xa9,0x70,0x9a,0xba,0xcd,0x90,0xcd,0xf0,0x89,0x2b,0xa6,0x38,0x7b,0xe1,0x67,0x89,0x85,0x0c,0x2e,0x16,0xea,0x97,0x2d,0x6e,0x6f .byte 0x1f,0x9c,0x0a,0xf3,0xe5,0x95,0x03,0xc2,0xe4,0x84,0xc8,0x0d,0x08,0xb7,0x59,0x25,0x5b,0x77,0x7f,0x7c,0x43,0x16,0xb7,0x27,0x38,0xf1,0x71,0x50,0x0d,0xed,0xa8,0xc6,0x27,0x36,0xf1,0xaa,0xa6,0x43,0x3f,0x1f,0xc1,0xa2,0xc5,0x23,0x46,0xf8,0x9c,0xe5,0x5f,0xb9,0x25,0x3b,0x71,0xb3,0xe2,0xc7,0xa5,0x7e,0x30,0xc5,0xe9,0x3b,0x4e,0xa1 .byte 0xd6,0x33,0x3c,0x8b,0xb9,0x08,0x93,0x3c,0xc5,0x4c,0x7c,0x7c,0x8b,0xe9,0xa7,0x46,0xa8,0x9e,0x97,0xc5,0x71,0x7e,0x81,0xa6,0x22,0x49,0xb0,0x25,0xa8,0x74,0xba,0x7b,0xce,0xf8,0xd6,0xe8,0xf1,0xa1,0x0f,0x03,0xe6,0x8a,0x30,0x02,0xba,0xde,0xaa,0x16,0x0d,0x7a,0x4a,0x86,0xf8,0xd0,0x80,0xf6,0xde,0x9e,0x70,0xe2,0xa9,0x7c,0x98,0xde .byte 0x6b,0x8b,0x04,0xa3,0xb4,0xa9,0xfb,0x15,0x5e,0x40,0x92,0xa0,0xb7,0x36,0xab,0x8d,0x02,0xb0,0x95,0x4c,0x3f,0x5d,0xa6,0x17,0xd3,0x98,0x41,0xe0,0xfb,0xf2,0x49,0x3b,0xf6,0xb5,0xfe,0xc7,0x8d,0x77,0xa7,0x1e,0xcb,0x10,0x32,0xf0,0x55,0x7e,0x44,0x6e,0xa8,0xc6,0x2c,0x52,0x09,0xda,0xe6,0x02,0x7c,0xc2,0xfe,0xe7,0x05,0xc8,0x37,0xc4 .byte 0x90,0x5a,0xed,0x54,0xaa,0x29,0xbd,0x3c,0x22,0x34,0xd7,0x41,0x5b,0xf5,0x89,0x1e,0x22,0x87,0xc3,0x51,0x90,0xc4,0xe5,0x77,0x41,0x6b,0xcc,0x23,0x61,0x6c,0x89,0x55,0x79,0x15,0xdc,0x3b,0x3f,0x52,0x2f,0x67,0x8c,0x0f,0x56,0xbb,0x8b,0x06,0x72,0x62,0x76,0xf7,0xa2,0xe2,0x00,0x70,0x78,0x3f,0x52,0xc5,0xcb,0x10,0x22,0x59,0x44,0x81 .byte 0x5d,0x05,0xd2,0x92,0x72,0x6e,0x8b,0x3e,0x52,0x54,0x06,0x5b,0x51,0x55,0x08,0x81,0x5a,0x1c,0x82,0x86,0x30,0x7c,0x0e,0x66,0xdd,0x17,0xad,0x1f,0x54,0x85,0xd6,0x4f,0x9b,0x4d,0x49,0x42,0xdf,0x6c,0xa1,0x6a,0x18,0x00,0x38,0xb6,0xf7,0x8d,0xbb,0xce,0x7a,0xbb,0xcb,0x59,0x03,0x2d,0x7e,0x56,0x33,0x54,0x5f,0x46,0x7a,0xba,0x24,0x17 .byte 0x22,0x3b,0xb4,0x86,0x1d,0xa7,0x92,0xea,0x85,0x99,0x67,0x85,0x9a,0x45,0x53,0xce,0x9f,0x44,0xea,0xb2,0xac,0x24,0x8e,0x0c,0x0b,0x8c,0x21,0x00,0xe8,0xd5,0x08,0xe3,0xbe,0x1a,0xd5,0x3e,0xaa,0x62,0xf0,0xcd,0x5f,0xae,0x5b,0xef,0x89,0xf0,0xc0,0x48,0xa4,0xdc,0xd4,0x60,0xd3,0xd5,0x05,0x42,0x7f,0xb1,0xec,0x1d,0x62,0x0e,0xe8,0xe4 .byte 0x4d,0x20,0x9e,0x25,0xc0,0xa5,0x7c,0xe4,0x5f,0xf7,0xfa,0xf1,0x50,0x3b,0x39,0x62,0x10,0x09,0x46,0x24,0x47,0x49,0x75,0xf7,0xae,0x2b,0x2c,0x79,0x23,0xfe,0xcd,0x81,0xdf,0x0b,0x94,0xe3,0x4d,0x2e,0xe8,0x4a,0x87,0x70,0xec,0xfe,0xa8,0xda,0x06,0x86,0x62,0x30,0x00,0x0c,0x76,0xa4,0xd1,0x48,0x6d,0xdb,0xa6,0xb5,0x65,0x35,0xcd,0xa2 .byte 0xd7,0x95,0x9b,0x0e,0x3e,0x7d,0xe6,0xd3,0x3a,0x6b,0x26,0x9a,0x50,0xd6,0x12,0xe5,0x76,0xff,0xa6,0xfd,0xbf,0xb7,0xba,0xee,0x42,0x09,0xa4,0x2b,0x10,0x64,0xab,0x43,0xaa,0xe0,0x1d,0xe5,0x35,0xf4,0xc7,0xa3,0xb0,0xc4,0x1a,0xd3,0x8b,0x03,0x9f,0xd0,0x2b,0xa5,0x26,0x70,0x92,0x0d,0xe5,0x3b,0xb8,0x62,0x6b,0x4a,0xc5,0x93,0x6b,0xc8 .byte 0xbe,0x66,0x51,0x0b,0x56,0xed,0xee,0x6c,0xf1,0xf3,0x05,0xc1,0x7a,0xae,0xf6,0x26,0xe5,0x4d,0x1e,0x0b,0xf9,0x29,0xc4,0xd7,0x80,0x75,0x3f,0x5c,0x60,0xa6,0x06,0x09,0x58,0x4b,0xfd,0xa3,0xc2,0x76,0xd8,0x43,0x66,0x04,0xdd,0x84,0x9f,0x5e,0x15,0x87,0xe8,0xf7,0xa4,0x56,0xf4,0x81,0x88,0x98,0x26,0xa4,0x24,0x3c,0xfb,0x7e,0xb6,0xbf .byte 0xe8,0x0f,0x12,0x31,0xe5,0x84,0xa9,0x3b,0x73,0x48,0x03,0x7c,0x0b,0x8c,0x52,0x2d,0x6c,0xa3,0x66,0x1e,0x00,0xc7,0x1d,0xe2,0x41,0x68,0x04,0x0a,0x66,0x13,0xe9,0x17,0xca,0x16,0x79,0x44,0x17,0xaf,0x41,0x0e,0x50,0x4f,0x1f,0x28,0x3e,0x68,0x80,0xb1,0x62,0x20,0x9e,0x1c,0xaa,0x18,0xa8,0x1d,0x09,0xed,0xe2,0x97,0xc2,0x9c,0xec,0x99 .byte 0xd6,0x12,0xde,0xd1,0x48,0x9c,0x1e,0xdf,0x0c,0xb5,0x6c,0x17,0x3d,0x59,0xe6,0xfc,0xe6,0xd5,0x1a,0x70,0x66,0x49,0xf5,0x09,0x30,0x11,0x5b,0x5d,0x1a,0xeb,0xc7,0xf8,0xe5,0x44,0xf5,0x3f,0x93,0xde,0xf5,0x2a,0x00,0x72,0x19,0xae,0xde,0xe9,0x7f,0xc7,0x30,0x9c,0x95,0x17,0x33,0xca,0x2c,0xd5,0x75,0xcf,0xb7,0x1b,0xd0,0x4d,0x58,0x1e .byte 0x07,0x23,0xa8,0x8d,0x63,0x9d,0x95,0x92,0x8b,0xbd,0x77,0xe3,0xa0,0xd0,0xe0,0x43,0xeb,0x9d,0xdf,0x96,0xb2,0x4e,0xac,0x37,0x74,0xf3,0x54,0x9b,0x48,0x32,0x49,0x80,0x9d,0x68,0x7b,0x9f,0x2c,0x74,0xbb,0x31,0x22,0x71,0xf1,0x3c,0xaa,0xf3,0x07,0x64,0x4d,0x55,0xb9,0x18,0xb3,0xe5,0x02,0xce,0x07,0xec,0xfc,0x6d,0x73,0xc8,0x48,0xc8 .byte 0xab,0x6b,0x3a,0x8a,0xa2,0x06,0x37,0x7d,0xf7,0x8f,0xc8,0x6f,0xc1,0xc0,0x28,0x0e,0x66,0x79,0xdf,0x76,0x51,0x48,0x3d,0x0d,0x94,0x48,0x0c,0xae,0x05,0xa6,0xf3,0x2b,0xa4,0x71,0x22,0xb0,0x38,0x81,0x45,0xc3,0x68,0x4b,0x0d,0xec,0x06,0xad,0xa8,0x5b,0x25,0x25,0x1c,0xda,0xfe,0xc2,0xe5,0x6a,0x81,0xd5,0xe2,0x3f,0x8d,0x9d,0xcb,0xb0 .byte 0x5c,0xb4,0xdb,0x14,0xa9,0x61,0x3c,0x77,0xe6,0x1b,0xc8,0x18,0xfa,0xc7,0xf2,0x03,0x96,0xd0,0xcb,0xd8,0x38,0xfd,0xcf,0x3c,0xf0,0xc4,0xd6,0xe4,0xff,0x86,0x11,0x03,0x85,0x30,0xee,0x57,0xf7,0x53,0xf8,0xbe,0x81,0x88,0x54,0x4f,0x57,0x63,0x36,0x6b,0xbb,0x44,0x21,0x84,0xa1,0x5d,0x03,0x01,0xc4,0xca,0xe2,0x89,0xec,0x8e,0x55,0xe0 .byte 0xb7,0x24,0x9a,0xd8,0x43,0x51,0xc3,0xe7,0xbe,0xa7,0x40,0xcb,0x35,0xa9,0x3c,0xa0,0x03,0x71,0x51,0x22,0x03,0x0f,0xc7,0x3e,0xcb,0x33,0xab,0xb5,0xfb,0x91,0x0e,0x21,0x51,0x0d,0x67,0x66,0x89,0xac,0xa8,0xd3,0xda,0x25,0x78,0xa4,0xd7,0x16,0x0e,0x48,0xee,0xc8,0x89,0xc4,0x4b,0x99,0xe2,0x55,0x0c,0x69,0x0c,0xc4,0xe8,0xd7,0xee,0x2d .byte 0x5a,0x5f,0x56,0xf7,0x9a,0xad,0x61,0x32,0x9c,0x73,0x91,0x9a,0x60,0xb2,0xbe,0x36,0xfe,0xb1,0x54,0x89,0x6d,0x32,0x10,0x5b,0xc4,0x60,0xe1,0x9d,0xbb,0x12,0xf0,0xaa,0x73,0x69,0x2c,0x4d,0xb6,0xce,0x0a,0x47,0x5a,0x5c,0x4c,0x25,0x7e,0xb9,0x56,0x79,0x55,0x67,0x98,0x3e,0xc0,0xdd,0xe4,0x97,0xe7,0x6b,0x1a,0xa5,0x8d,0x26,0xfb,0x7e .byte 0x85,0x7e,0x0a,0xa3,0x43,0xbc,0x99,0xa7,0x34,0x82,0xda,0xd9,0x92,0x58,0x79,0x8d,0x3b,0xa6,0x08,0x47,0xdd,0x18,0x33,0x68,0xdd,0x97,0x6b,0x14,0x9e,0xa4,0x7b,0x3e,0x48,0xf4,0x3f,0x44,0x18,0x07,0xc1,0xef,0x15,0xbb,0xba,0x5e,0x2d,0x92,0xdc,0x20,0xc9,0x87,0x06,0x8d,0x0b,0x69,0xed,0x94,0x98,0xe6,0x1a,0x5b,0x0c,0xb2,0xaf,0x54 .byte 0x27,0x49,0x1e,0x9a,0xc3,0x5d,0xf7,0xc5,0x82,0x8c,0xa0,0xfd,0xf2,0xc3,0x68,0x60,0xf7,0x88,0xb9,0x04,0x6c,0xb2,0xeb,0x9a,0xcd,0x9f,0xe9,0xd8,0xfc,0xbd,0xed,0x72,0x11,0xf6,0xb4,0x7b,0xd8,0x64,0x5e,0x55,0xc7,0x19,0xcf,0xd7,0xb3,0x47,0xdd,0xb2,0x3e,0x18,0x7b,0xb2,0xc7,0x5c,0x9d,0x99,0x05,0x2d,0x22,0x94,0xc2,0x0e,0xab,0x0b .byte 0x7f,0x1f,0xc4,0x3f,0x63,0xcf,0x52,0x43,0x2e,0x92,0x76,0xff,0x8a,0xce,0x61,0x4b,0xf3,0x44,0x91,0x7e,0x11,0x7d,0x73,0x06,0xda,0xde,0x54,0xad,0x7a,0x09,0x85,0xfd,0x58,0x24,0xee,0xae,0x0c,0x86,0xca,0x39,0x12,0xe2,0x5b,0xe6,0x65,0x0e,0x9e,0x94,0xe0,0xfa,0x41,0x56,0x9e,0x73,0x1a,0xd8,0x09,0xe4,0xb3,0xe9,0x8f,0xb0,0x35,0x69 .byte 0x61,0x9f,0xe9,0x9f,0x19,0x11,0x1a,0x41,0x06,0xc3,0x6f,0xc1,0x73,0xb7,0x14,0x0b,0x31,0x4e,0xc5,0x54,0xd3,0xef,0x17,0x2b,0xad,0xe3,0xaa,0xcd,0x42,0xd9,0xe9,0xba,0x77,0x48,0xaf,0x86,0x68,0xaa,0x69,0x56,0xc2,0xfd,0x82,0xcc,0xd5,0xa1,0x98,0x17,0x5f,0x2d,0x5f,0xee,0x3b,0xb2,0x11,0x56,0x36,0xdb,0x88,0xd7,0xed,0x21,0x67,0x4d .byte 0xe4,0x78,0x38,0xab,0x97,0xaa,0xd6,0x41,0x70,0x82,0x8e,0x65,0x3e,0xd2,0x6d,0xb3,0xad,0x6b,0xcc,0x0c,0x0e,0x2c,0x3d,0xdd,0xf9,0xaf,0x21,0xc9,0x65,0x2c,0x4c,0xd8,0x95,0xe2,0x35,0xa8,0xe1,0x67,0xd9,0x93,0x22,0xd4,0x37,0x5e,0x8b,0x15,0x5c,0x2e,0xa0,0x1f,0x10,0x58,0x58,0x84,0x87,0xb3,0x2a,0xd6,0x7c,0xcd,0x3e,0x9b,0x13,0x4f .byte 0x16,0x19,0x5d,0x99,0xa0,0x0b,0x3b,0x7a,0x5e,0x5b,0xfa,0x64,0x7d,0x0c,0x2b,0xfb,0x32,0x76,0xc7,0x95,0x40,0x52,0x1d,0x5a,0x71,0xb5,0xfc,0xeb,0xc6,0x93,0x45,0x55,0x24,0xa8,0x9f,0x5d,0x5c,0x22,0xe4,0x1d,0xda,0x7c,0xcf,0x06,0x6d,0xcf,0x8b,0xd0,0x11,0x96,0xcd,0x57,0xb5,0xa9,0x3c,0xfe,0x6c,0xf2,0x1e,0xa3,0x22,0x5f,0x7c,0x62 .byte 0xdd,0x01,0xe2,0x2e,0xb7,0xda,0x79,0x93,0x69,0xd5,0xf0,0x9e,0xeb,0xa3,0xf7,0x18,0xd6,0x92,0x13,0xfe,0x24,0xb3,0x83,0x65,0x07,0xe5,0x80,0x28,0x52,0xc0,0x3b,0x4e,0x99,0xcf,0x53,0x75,0xe9,0xd5,0xa3,0xea,0x79,0x69,0x54,0x71,0xd6,0x25,0x43,0x1d,0x36,0xc4,0x74,0xa6,0x20,0xa4,0x0b,0xd7,0x24,0xb2,0xc5,0xee,0x49,0xae,0x8e,0xe4 .byte 0xc3,0x18,0x47,0xc0,0xb5,0x49,0x9a,0xf4,0x39,0x35,0xe4,0xb9,0xb0,0x5f,0xbb,0x81,0xf4,0xc7,0x1e,0x2b,0x24,0x93,0xae,0x5d,0xd9,0x13,0xea,0xa7,0xfd,0xdd,0x80,0xe7,0x90,0x70,0x4f,0x43,0xbe,0x72,0x32,0x73,0xb4,0x08,0x14,0x90,0x08,0xa4,0x1f,0x11,0x9b,0x80,0x1e,0x0e,0x5f,0x5c,0x46,0x9b,0xe9,0xe5,0x88,0x17,0x3b,0x7b,0xc3,0x9a .byte 0xfb,0xf0,0x37,0x06,0xb9,0x18,0x5c,0x1f,0x07,0x84,0x1e,0x74,0x6c,0x94,0xa7,0x52,0xbc,0xf1,0x76,0xd3,0xfd,0xab,0x47,0xea,0x2d,0x58,0x51,0x4a,0x87,0xc4,0x5b,0xc0,0x93,0xb1,0x31,0x96,0xec,0xe5,0xe2,0xea,0xdd,0x84,0xb1,0xf7,0x5f,0x38,0x2e,0x98,0x52,0xdc,0xb8,0x3b,0x69,0xde,0x09,0xa3,0x24,0x65,0x2d,0x44,0x36,0x26,0xbe,0xcc .byte 0xb2,0xaa,0x30,0x67,0xad,0x96,0x39,0xa7,0xe7,0x92,0x59,0x69,0x2a,0x46,0x51,0x48,0x25,0x11,0x81,0xe5,0xf8,0x59,0x77,0x14,0xc5,0x14,0x4e,0x93,0x75,0xc0,0xb5,0xf1,0xbb,0x90,0xf1,0xa9,0xd9,0x72,0x43,0x8f,0xfb,0xe8,0xbe,0x69,0x80,0xb7,0x51,0x71,0x9d,0x70,0xdd,0x01,0x95,0x84,0x78,0xd1,0xf0,0x86,0xc9,0x06,0xa8,0xaf,0x5d,0xbd .byte 0xdd,0x68,0xbf,0x8a,0x4b,0x64,0xe6,0x1a,0x48,0xc4,0x34,0x3f,0xce,0x7b,0x04,0x2c,0xa4,0x12,0x62,0x69,0xfe,0x05,0x12,0x2d,0x16,0x49,0x2f,0xa1,0x69,0xd4,0x9e,0x95,0x61,0xa2,0x24,0x34,0xfc,0x51,0xb7,0x89,0x3a,0x2a,0x80,0xce,0x3b,0xe5,0x16,0x8f,0x6e,0x35,0x19,0x1d,0x78,0x27,0x1c,0x81,0x52,0xf3,0x93,0x83,0x83,0x94,0x95,0x5d .byte 0xaa,0x94,0x28,0xc6,0xd5,0xec,0x38,0x95,0x50,0x12,0x9d,0xc2,0xc2,0x28,0x2c,0xf8,0x30,0xa5,0x79,0x19,0x79,0xf4,0x71,0xd3,0xc0,0xfd,0xc3,0x64,0x1a,0x95,0x5c,0x79,0xef,0x73,0x8d,0x66,0xbb,0x63,0x53,0x24,0x5d,0xb2,0xf9,0x94,0xe6,0xcc,0xf3,0xe9,0xf4,0x94,0xcf,0x77,0xbe,0x25,0x0e,0x2c,0x5e,0xed,0xdd,0x49,0x25,0xd3,0x15,0x54 .byte 0x68,0x49,0x15,0x27,0x7d,0x1e,0xa2,0x95,0x8d,0xf7,0xea,0xe5,0x1c,0x33,0x90,0x4f,0x83,0x06,0x17,0xd4,0x5e,0x6e,0xe6,0x3a,0x90,0xda,0x4b,0x31,0x57,0x0e,0xab,0x98,0x1d,0x87,0x63,0x20,0x9e,0xd7,0x00,0xa0,0x1e,0x77,0xef,0x22,0xf4,0x4b,0xd2,0x58,0xaf,0xfd,0xe1,0xa2,0xb0,0xb9,0x9b,0x2a,0x75,0x6a,0xc7,0x51,0xe3,0x3b,0x66,0x83 .byte 0x65,0x9c,0x87,0x09,0x56,0xd0,0x09,0xa8,0x6b,0x08,0x77,0x46,0x86,0x3f,0xe6,0x63,0x62,0xdc,0x82,0xd1,0x04,0xe5,0xa8,0x36,0x70,0xa8,0xe8,0xb3,0xb0,0x85,0xac,0x5a,0x11,0x54,0xd2,0x68,0x35,0xfa,0x4c,0x5e,0x15,0x64,0x77,0x6c,0x25,0xf4,0x19,0x8b,0x7e,0xe2,0xb1,0x7d,0x1d,0x63,0x5b,0x8c,0xa6,0x42,0x72,0x60,0x1e,0xe3,0x54,0x3a .byte 0x5b,0x9c,0x8d,0x6c,0x4b,0x28,0x2d,0xf6,0xd2,0x80,0x66,0xbe,0x79,0x91,0x64,0x11,0xe6,0x3e,0x5c,0x3e,0x8b,0x71,0x40,0x06,0x7f,0x26,0x8d,0xf3,0xce,0xc9,0x6d,0x9c,0x94,0xf4,0x22,0xff,0xac,0xeb,0x5a,0xb2,0x99,0x86,0x66,0x66,0xb5,0xfd,0x62,0xcc,0xf6,0x20,0xca,0xb9,0xb5,0xc4,0xc7,0xe9,0xca,0x23,0x59,0x2b,0xa6,0xae,0x53,0x8e .byte 0xdf,0xd5,0xc1,0x0e,0x52,0x8c,0x35,0x7c,0xb3,0x03,0x41,0x7c,0xdc,0x87,0x4a,0x59,0x56,0x5c,0x88,0x6c,0xa9,0x10,0x6b,0xd5,0x04,0x42,0x5d,0x60,0xef,0xc2,0xc1,0x28,0x36,0x91,0xd8,0xd0,0x62,0x30,0xa4,0xaf,0x5b,0x06,0xb0,0x86,0xc1,0xb2,0xff,0xc3,0x3d,0x41,0xb8,0xe9,0x12,0xde,0xab,0x4a,0xaf,0x57,0xfb,0xdf,0xb0,0x15,0xd1,0x1e .byte 0xed,0x69,0xb5,0x79,0x5a,0x3d,0xeb,0xd3,0x3c,0x33,0x27,0x71,0x7a,0x7c,0xf2,0x28,0x50,0xe3,0x96,0x0d,0x6d,0x18,0x7d,0x7d,0xe2,0xb3,0x9b,0x9b,0x49,0x7f,0xe3,0xba,0xd1,0xf1,0xbc,0x9c,0xae,0x73,0xf8,0x35,0x71,0xbd,0xc1,0x4b,0xbc,0x36,0x08,0xf9,0x9e,0x78,0x57,0xc5,0xd0,0x52,0xc9,0x93,0xb4,0x7f,0x06,0x6b,0xc2,0x2e,0x8a,0x9b .byte 0x8a,0x8b,0xf5,0x69,0xc4,0xaf,0x61,0xbb,0xc3,0x79,0x40,0xa2,0x8f,0xd6,0x76,0xcd,0x51,0x4b,0x91,0x75,0xfa,0x9f,0x19,0x8d,0x29,0xe2,0x25,0xae,0x8d,0x34,0x31,0xeb,0x26,0x42,0xca,0x69,0x1c,0xba,0x37,0xa0,0x6d,0x5f,0x60,0x04,0xc3,0x96,0xad,0xdc,0x8f,0xf0,0x51,0x54,0x89,0xc8,0x71,0xe6,0x9d,0x7b,0x11,0xad,0xc9,0xbe,0x38,0x40 .byte 0x4f,0x90,0x7c,0x6c,0xa1,0x1f,0x2d,0x92,0x29,0xf1,0x37,0x8b,0x55,0x20,0xf0,0x85,0x93,0x93,0x6f,0x72,0x4a,0x11,0x60,0x06,0x4d,0xd9,0xf0,0x0e,0xf8,0xf8,0xea,0x2e,0x4a,0x31,0x48,0xa3,0x9c,0xf7,0xac,0x64,0x84,0x59,0x91,0x5f,0x0d,0xd5,0x54,0x05,0x01,0x63,0x89,0x4b,0x11,0x72,0x52,0x0f,0xa4,0x13,0x8e,0x3c,0xb9,0x25,0x2c,0xb6 .byte 0x48,0x11,0xe7,0xe7,0xc1,0x5f,0xca,0x0c,0x2a,0xf0,0xe3,0xcf,0x29,0x5b,0x99,0xe0,0x05,0xae,0x59,0x14,0x97,0xba,0x31,0x1f,0xf4,0xc4,0x45,0xb0,0x89,0x22,0x68,0x29,0x97,0xf3,0xf9,0x2f,0x68,0x1a,0x3f,0xb3,0x6b,0x88,0xa9,0x8e,0x20,0x31,0xc5,0x63,0x13,0x6b,0x2d,0x52,0x18,0x98,0xc8,0x34,0x07,0x85,0x14,0xb2,0x6c,0xcc,0x78,0xdb .byte 0xb5,0xee,0x08,0xb5,0xfa,0xb7,0x40,0x98,0x2d,0x1c,0x46,0xa7,0x2e,0x78,0xad,0x6f,0x95,0x02,0x57,0xbc,0xfd,0x5f,0xf4,0xe0,0xbd,0x7f,0xae,0x0e,0x52,0xf4,0x34,0x9b,0x6a,0xbe,0xba,0x6a,0x30,0x86,0x7a,0x47,0x60,0x86,0xa1,0x9a,0x48,0xe1,0xea,0xca,0xab,0x4d,0x2f,0xdf,0x84,0x1c,0x51,0x44,0xfa,0x8a,0xc2,0x59,0x0b,0x86,0xc0,0x73 .byte 0xed,0x72,0xa2,0x22,0x73,0x93,0x69,0xfe,0x39,0x07,0x5f,0x75,0x6f,0xf8,0x30,0x7c,0xea,0xea,0xda,0x30,0xfd,0x22,0x31,0xf8,0xd9,0x68,0x3d,0x75,0x93,0xc0,0xb0,0x5a,0x1d,0xa1,0x62,0x35,0x43,0xab,0xdc,0x82,0x4b,0xa8,0x40,0x0d,0x7f,0xeb,0x02,0x90,0x55,0x10,0x47,0xfd,0xfc,0x2f,0xe7,0x8f,0xe0,0x48,0x41,0x14,0x1a,0xaa,0x51,0x25 .byte 0xad,0x79,0x23,0x6c,0x08,0x44,0x31,0xff,0x0f,0x4a,0x57,0x58,0x76,0x08,0xa0,0x28,0x56,0x9e,0x70,0x3a,0x3a,0xd0,0x00,0xc6,0xa6,0x7f,0x5e,0xfd,0x88,0xcb,0x12,0x51,0x3b,0x97,0xb0,0xe9,0x8a,0x57,0x8f,0x4c,0x2e,0xba,0xc7,0x8f,0x47,0x05,0x4e,0xb0,0x98,0x22,0x85,0x80,0x43,0x09,0xc9,0xda,0x90,0x86,0x14,0xc3,0x5c,0x00,0x2f,0x39 .byte 0x2f,0xc0,0xf9,0x37,0xe6,0xee,0x56,0xee,0xa2,0x05,0x14,0xe6,0x63,0xbd,0x6d,0x8f,0x21,0x46,0xbd,0x7f,0x67,0x0e,0x14,0xaa,0x11,0xf5,0x1b,0xfb,0x06,0x6b,0xbf,0x82,0x25,0xaa,0x8d,0x15,0xc3,0x86,0x1c,0xb5,0xcb,0xdf,0xa1,0x9d,0xd8,0xd6,0x0b,0x89,0x76,0x71,0xb8,0x5d,0x16,0xde,0x1d,0x04,0x17,0xb3,0x0f,0x26,0xc8,0xc5,0x95,0x35 .byte 0xcf,0xf4,0x6b,0x71,0x38,0xa2,0x87,0xcf,0xca,0xda,0x67,0x2b,0x01,0x37,0xbc,0x35,0x33,0x0c,0xff,0xe2,0x1e,0x33,0x96,0xb4,0x10,0x7f,0x8f,0x9c,0x42,0x07,0x73,0x4c,0xfc,0x47,0xf4,0xa5,0x1a,0x8d,0xd8,0x65,0x97,0x16,0x89,0xb6,0x25,0x50,0xd2,0x40,0x31,0x56,0x9d,0x30,0xf6,0xe3,0xcc,0x79,0x83,0xcb,0xf6,0xf7,0xdb,0x8e,0xe0,0xc9 .byte 0x6d,0xac,0xca,0x6c,0xfe,0x1c,0xc1,0xde,0x4e,0xa8,0xea,0x06,0x33,0x96,0x98,0x99,0xe1,0xe9,0x28,0xe0,0x0c,0x15,0xcd,0x75,0x1b,0x4c,0xc3,0x9b,0xea,0x86,0xd2,0xeb,0xd3,0x92,0x4e,0xdb,0xc5,0x41,0x20,0x52,0xf9,0x11,0xf8,0x17,0xb0,0x78,0x07,0xf3,0x99,0x53,0xee,0x24,0x05,0xc2,0xc7,0x44,0x66,0x8b,0xa0,0x5c,0x90,0x6a,0xc6,0xa6 .byte 0xe8,0x95,0x88,0x60,0xf7,0x9f,0x5e,0x64,0x7c,0x24,0xbb,0x3f,0x51,0x61,0x7a,0xc0,0x89,0x6d,0x49,0xfe,0x41,0x95,0xee,0x13,0x80,0x2d,0xeb,0x5b,0x60,0xc4,0x3d,0xb2,0xce,0xd0,0x29,0x24,0xb4,0xc7,0xc5,0xa6,0x4b,0x2e,0x80,0x38,0x68,0x41,0x4c,0x72,0x71,0xc1,0x08,0xf8,0x72,0x93,0x28,0x1c,0x7d,0xb3,0xf5,0x41,0xd2,0x7d,0x3a,0xc4 .byte 0x20,0x95,0x9c,0x52,0x7e,0x4f,0x5c,0x5e,0x72,0x2d,0x98,0xbc,0xd4,0x7a,0x31,0x30,0x1c,0x4d,0xe8,0x79,0xf6,0x65,0xcc,0x22,0xfe,0xc9,0xc7,0x61,0xcc,0xbe,0x21,0xd4,0xb4,0x18,0xde,0xaa,0xe5,0xc8,0x61,0x00,0xb5,0xc0,0x89,0xf2,0x19,0x88,0xb8,0xfe,0xe3,0x2b,0xb0,0xfa,0xf2,0x35,0x4e,0xf9,0xce,0x43,0xd4,0xc3,0xc3,0xf6,0xc5,0x60 .byte 0x8f,0xd3,0x12,0x32,0xe9,0xbc,0x1e,0xbd,0x4f,0x4c,0xdf,0x2e,0xc4,0x4a,0xd9,0x28,0x81,0xca,0x17,0x36,0xc9,0xbd,0x21,0xea,0xf1,0xdf,0x73,0x91,0xbe,0x8c,0x24,0x3c,0x74,0xf4,0x42,0x0f,0x5c,0xa1,0x42,0x83,0x73,0x3c,0x01,0x09,0x80,0x06,0x2a,0x91,0x63,0x59,0x6f,0xf4,0x09,0xb0,0x94,0x8c,0xc3,0xcc,0x7d,0xb2,0xf7,0x0b,0xa4,0x29 .byte 0x87,0x8b,0x9d,0x6c,0x8f,0x57,0x7d,0x45,0xee,0xc7,0x1b,0x4d,0x61,0xc5,0x66,0x7f,0x59,0xe5,0xbc,0x8f,0x45,0x33,0x05,0xc9,0xe6,0xf2,0xbb,0x5a,0x61,0xe6,0x5c,0x41,0x44,0x70,0x55,0xaf,0xb5,0xa0,0x3c,0xb5,0x4a,0xf2,0xe8,0x50,0x4e,0x94,0x01,0x56,0xc4,0x7f,0x08,0x7d,0x64,0x18,0x8b,0x14,0x15,0x15,0x54,0x23,0x49,0x4f,0x9b,0x48 .byte 0x99,0x48,0x9f,0x57,0x48,0x58,0xd1,0xe9,0x07,0x5c,0xe2,0x98,0x90,0xd7,0xc0,0x09,0xd7,0x5c,0x6f,0x0c,0x68,0xf7,0x68,0x66,0x78,0x46,0x7d,0xf6,0xaf,0x86,0x87,0x0a,0x5e,0x47,0xb2,0x9a,0xe8,0x52,0x00,0x48,0x66,0x76,0xe0,0xf7,0xa8,0x9d,0xe1,0xff,0xad,0x77,0x31,0x3f,0x28,0x2f,0x08,0x26,0xd6,0x79,0x31,0x4a,0xac,0x58,0xa8,0x98 .byte 0x56,0xd0,0x83,0x66,0x4f,0x05,0x20,0x43,0xe7,0x6b,0x1f,0x9c,0x90,0x79,0x6a,0x6c,0xb2,0xff,0xd3,0xee,0x51,0x32,0x57,0x34,0xdc,0x1b,0x61,0xf7,0x86,0xd2,0x78,0xdb,0xb1,0x91,0x6b,0xd7,0x8e,0x9a,0xab,0x71,0x8b,0x77,0x4b,0xda,0xe0,0x74,0xe4,0x80,0x47,0xad,0xd1,0x76,0x31,0xdc,0xfa,0xa9,0xb0,0xd8,0x0f,0x35,0xc1,0x06,0xdf,0x87 .byte 0x5f,0x0c,0x02,0xef,0x38,0xe0,0x1b,0x4c,0xcd,0xc4,0x2a,0x20,0xd5,0xbe,0x59,0x5e,0x11,0xe4,0x71,0xa6,0x2c,0xdb,0x53,0x35,0xac,0x1f,0xae,0x45,0xa7,0x6c,0x58,0x62,0x5d,0xbe,0x5f,0x21,0x23,0x28,0x0e,0x2c,0xcd,0x7d,0xc2,0xdf,0xcb,0x0d,0xd4,0x7c,0xda,0x88,0x26,0x97,0x88,0x13,0x3c,0x51,0xcb,0x91,0x96,0xd6,0xf4,0x63,0x21,0xe1 .byte 0x61,0x8e,0xbf,0x09,0x3f,0x00,0x1e,0xa4,0x2c,0x43,0x86,0x5f,0x5a,0x18,0xcb,0x66,0x8c,0x56,0x26,0xa4,0x5b,0x1d,0xf6,0x0d,0xd9,0x40,0xe8,0xef,0x13,0xcd,0x71,0xd1,0x4c,0x48,0xfc,0xb3,0xfe,0x20,0xb0,0x72,0x3e,0xd8,0x76,0xc5,0x87,0xb4,0xd6,0xfc,0xcc,0xf6,0x0f,0x3a,0xd5,0x98,0x1d,0x0f,0xa6,0xd7,0x63,0x32,0x1e,0xf9,0x1b,0x5a .byte 0x7c,0xce,0x7f,0x90,0xd2,0x2d,0x2c,0xa9,0x9e,0x01,0x46,0x47,0x80,0x8c,0xf3,0x5e,0xfe,0x8e,0x41,0xdc,0x33,0xd5,0x11,0xf9,0xbc,0xc1,0x4a,0xbf,0xd9,0xc0,0xeb,0x43,0xe6,0x8e,0x04,0x5c,0xea,0xcb,0x53,0x2f,0x43,0x3f,0xe9,0xfe,0x04,0xaa,0x15,0xf1,0x38,0x46,0x70,0xbf,0x74,0x01,0xfa,0x5f,0x50,0xf3,0xb2,0x35,0x97,0x44,0x2a,0xad .byte 0x49,0x1e,0x19,0x76,0x48,0x32,0x74,0xc2,0xc9,0x72,0x8b,0x44,0x2c,0x59,0x77,0xa9,0xf1,0x36,0x0a,0xa7,0xe7,0x69,0x6f,0x2b,0xcc,0x3f,0xa7,0x5c,0x39,0xc0,0x38,0xd2,0x85,0x02,0x6a,0x1f,0xdf,0x21,0x34,0x66,0xfe,0x56,0x2a,0xf8,0xac,0x4e,0xe1,0x1a,0x14,0x12,0xd5,0xc1,0x41,0x0b,0x1f,0x18,0xf3,0x0a,0x52,0x96,0xbb,0xaa,0x78,0x59 .byte 0x16,0xe1,0xbf,0xa5,0x87,0x26,0x19,0x0d,0x68,0x0e,0xc0,0x4b,0xfd,0xd4,0xf8,0x60,0x9c,0xf4,0x6e,0x64,0xf2,0xbe,0x24,0x2a,0x3a,0x4e,0x05,0x01,0x26,0xe7,0x15,0xb5,0x14,0x06,0xeb,0x6e,0x21,0x88,0x4b,0x86,0x1b,0xcd,0xc5,0x29,0xaf,0x68,0xd1,0x94,0x25,0xbc,0x5c,0xf5,0xd3,0xd7,0x20,0x40,0x4e,0xad,0x9b,0x82,0xdf,0x46,0xe6,0x10 .byte 0x35,0x3e,0xbc,0x53,0x60,0x5a,0x1e,0x91,0xa0,0xcb,0xd7,0x09,0xd9,0x54,0xf4,0x2e,0xc8,0x4d,0x1e,0x8f,0x76,0xc4,0x67,0xed,0xb6,0x00,0xe4,0x97,0xb2,0xf9,0x21,0x98,0x3a,0xea,0xb3,0x53,0x79,0x98,0xfd,0x32,0x9a,0x76,0xb9,0x3c,0x74,0x09,0x37,0x60,0xfd,0xf6,0x36,0x58,0x40,0x19,0x4f,0x73,0x5b,0x27,0xed,0x3a,0xa8,0x58,0x27,0xf0 .byte 0xd0,0x11,0xee,0x20,0x94,0x0e,0x41,0x7d,0x47,0x85,0x27,0x45,0xae,0x3f,0x14,0x75,0xda,0x5d,0x8d,0xd9,0x31,0x58,0x99,0x40,0x9a,0xfe,0x1e,0x9c,0x7e,0x42,0x2f,0xe7,0xcd,0x43,0xb3,0x08,0xa9,0x71,0x5f,0x92,0x34,0x01,0xde,0x05,0x40,0xae,0x08,0xe3,0x62,0x36,0x71,0x7a,0xd4,0x75,0xf3,0xee,0x71,0x84,0x41,0xce,0xf3,0xca,0xa6,0x69 .byte 0xc2,0x13,0x2c,0x75,0x85,0xb4,0x43,0x8c,0x08,0x6c,0x1b,0xfb,0x87,0x1a,0xe2,0x74,0x22,0x86,0x2e,0x9e,0x3e,0x85,0xaa,0x34,0xb3,0x5f,0x43,0xf2,0xe5,0x6b,0x87,0x84,0x1a,0xce,0x70,0x1e,0x08,0x24,0xd8,0x16,0xe0,0x1a,0x78,0xd5,0x93,0xf7,0xe5,0x7b,0x49,0xff,0x8c,0x14,0x44,0xa6,0x2c,0xab,0x58,0xe6,0x59,0xb7,0x56,0x00,0xcd,0x1e .byte 0x53,0xd2,0xc2,0xa4,0x1a,0x56,0xbc,0x08,0x08,0xac,0xa7,0x95,0xbe,0xbb,0xdc,0xc8,0xdf,0xe3,0xa8,0x35,0x42,0x60,0x8a,0x1c,0xa6,0xf0,0xf3,0xa4,0xdc,0xcb,0x6b,0xb4,0x0a,0x6f,0x45,0xfa,0x6f,0x9c,0x92,0x15,0xe2,0x0b,0x0a,0xdd,0xb1,0xa9,0x68,0x54,0x3c,0x3b,0x9f,0xa3,0x9f,0x93,0x50,0xca,0xd4,0x8f,0xd5,0x09,0x0d,0xe8,0x94,0x18 .byte 0xce,0x5b,0x28,0xd9,0xd1,0xce,0x3f,0xc7,0x3d,0x42,0x11,0xd7,0x47,0x2c,0x8b,0x6c,0x6b,0x43,0x52,0xd2,0xdf,0xbb,0xe9,0xb4,0x4c,0x39,0xc6,0xf8,0x9e,0xc8,0xa5,0xa8,0x70,0x92,0xea,0x83,0x78,0xf9,0x40,0x57,0x43,0x58,0x8c,0xe6,0x08,0x34,0x01,0xf8,0xc6,0x8c,0xa9,0x93,0x0f,0x2f,0x91,0x95,0x90,0xb9,0xe4,0xb8,0x4f,0x89,0xb2,0xfa .byte 0x4e,0x30,0x4b,0x6e,0x91,0x69,0x80,0x0a,0xc5,0x2a,0x62,0x44,0x18,0x15,0xcf,0x93,0x9c,0x0f,0x55,0x44,0x4a,0x71,0xf2,0x72,0x87,0x88,0x38,0xff,0x79,0xc6,0xe9,0xe8,0xb6,0xd9,0xcb,0xd5,0x27,0x8b,0xc1,0x71,0xeb,0x42,0x12,0xbf,0x3b,0xeb,0x45,0x75,0xe1,0x80,0xcd,0xd4,0xdc,0xf6,0x2b,0x82,0x93,0x0c,0xad,0xc9,0x3a,0x31,0xb6,0xec .byte 0x38,0xee,0x3e,0xc0,0x5c,0x98,0xf9,0xe3,0xf5,0x82,0xf9,0x83,0x57,0xbb,0xed,0x1d,0x7a,0x48,0x10,0x1d,0x18,0xd8,0xab,0x2c,0xfd,0xf6,0x67,0x61,0x26,0x37,0x74,0x33,0x0f,0x9e,0x82,0x8e,0xaf,0x22,0x7f,0x57,0x5d,0xf7,0x53,0x9e,0xf9,0x20,0x98,0xf5,0x1f,0xbe,0x60,0xd9,0x81,0x5f,0xba,0x9b,0x36,0x07,0x65,0x9e,0x65,0xb5,0x2f,0x3f .byte 0x2b,0x0d,0xef,0x1a,0xf8,0xf7,0x6e,0x16,0x09,0x00,0xef,0xed,0x95,0x38,0xec,0x1b,0xf3,0xf6,0xa2,0x9f,0xb2,0x21,0x6a,0xc8,0x0f,0x59,0xf2,0xe8,0x6c,0x92,0x35,0x99,0x56,0x3f,0xa4,0xd9,0xcd,0x5c,0x72,0xfb,0x0a,0xea,0x3e,0xa2,0x58,0x33,0x85,0x48,0x53,0xcc,0xba,0x92,0x5e,0x81,0xa3,0x46,0xe3,0x1d,0xe8,0xc4,0x22,0x10,0x57,0x0a .byte 0xa1,0xba,0x5a,0x4e,0xc8,0xfb,0x14,0x9a,0x36,0x9d,0x61,0x5b,0x0d,0x2e,0x25,0x46,0x18,0x38,0x8c,0x20,0x51,0xd7,0xd1,0xe0,0x73,0xdb,0x76,0xaa,0xb3,0xa8,0x54,0xdc,0xb5,0x38,0xf2,0x5a,0x75,0x66,0x28,0xd3,0x5d,0x4a,0x8f,0x02,0x40,0x7e,0x88,0xfe,0x80,0x83,0x44,0x11,0xad,0xe8,0x52,0x70,0xa3,0x50,0x3d,0x22,0xc2,0x8a,0x83,0xef .byte 0xda,0xd7,0xae,0x04,0xb8,0x98,0x4e,0x9f,0xf6,0xb7,0x39,0xa5,0x72,0x29,0x61,0xbd,0xdf,0xd9,0xdc,0xe2,0x10,0x9b,0x8a,0x5f,0x42,0x4e,0x41,0x49,0x41,0x81,0xa2,0xc7,0x81,0x30,0xe9,0xfb,0x7f,0x10,0x1a,0x44,0xaa,0x79,0x70,0x1a,0x9d,0xe4,0xbd,0x98,0x25,0x75,0xff,0x45,0x5a,0x79,0x5d,0xe3,0x8d,0x58,0x87,0x2c,0x05,0xfd,0x34,0x98 .byte 0x06,0x90,0x55,0x24,0x6d,0xde,0xed,0x38,0xd4,0xf2,0xfa,0x55,0x43,0x34,0x73,0x83,0x82,0x47,0x0c,0x4c,0x1a,0xff,0xf8,0x9a,0xd3,0x57,0x75,0x8d,0x1d,0xf3,0x8e,0xde,0x96,0x29,0xce,0xd1,0x73,0xb1,0xe4,0x1c,0x24,0x3b,0xdf,0xed,0xd8,0xef,0x4a,0x5f,0xdb,0xe5,0x42,0x55,0x58,0x86,0xb7,0x01,0x6d,0x14,0x40,0x2c,0xb8,0x08,0x9f,0x9a .byte 0x46,0x9c,0xfd,0x85,0xcf,0x2d,0x5e,0x07,0x41,0xf9,0xb7,0x9f,0x6a,0xa8,0xaf,0x23,0xdc,0xdf,0x46,0x54,0xdb,0xd4,0xb0,0x03,0xef,0x82,0x26,0x8f,0x00,0x6e,0xf6,0x26,0x99,0xda,0xeb,0xab,0xc2,0x1e,0x49,0x8e,0x40,0x42,0x85,0x0b,0xc6,0x51,0xa9,0xe4,0x1f,0x63,0xf7,0x56,0x46,0xf4,0x4d,0x95,0x16,0x4a,0x38,0xc7,0x28,0x52,0x03,0xd6 .byte 0x5e,0x90,0x09,0xaf,0x31,0xc0,0x5b,0x32,0x52,0x1d,0x6b,0xb7,0xf7,0x17,0x86,0x6d,0x90,0x1d,0x78,0xf3,0xae,0xf6,0x96,0xe3,0x02,0x6d,0xe3,0xd6,0xdf,0xb9,0xfc,0x7a,0xfd,0x04,0xa5,0xbe,0x42,0x19,0x5c,0xd9,0x44,0x60,0x1e,0xb5,0xca,0xd7,0x99,0xa9,0x98,0x52,0x4b,0x9a,0x2c,0x05,0x08,0x88,0x06,0x12,0x30,0xe2,0xca,0x14,0xb9,0x30 .byte 0x7d,0x22,0xd8,0xaa,0x58,0x4c,0x80,0x10,0x39,0xa6,0x2b,0x7d,0x17,0xfe,0x72,0xe2,0x2f,0xa8,0x85,0x03,0x91,0xae,0xa0,0xe5,0xed,0xe0,0x02,0x40,0xf4,0x93,0x0c,0xf9,0x73,0xc7,0x8b,0x3e,0x26,0x1b,0xc6,0xf8,0x34,0x5d,0xda,0x74,0xf4,0x72,0xb2,0xcd,0x89,0xd2,0xdb,0xdc,0x60,0x84,0xa8,0xa5,0x40,0x9a,0x5e,0x6b,0x47,0x17,0x75,0x81 .byte 0x89,0x1b,0xec,0x18,0xd2,0x09,0x2c,0x57,0x1d,0xce,0x41,0x6e,0x14,0x99,0x2f,0x52,0x43,0x77,0xf7,0xdd,0x72,0xeb,0x8b,0x39,0x72,0x4b,0xcb,0x92,0x92,0xfc,0x55,0xbd,0xfd,0xd1,0xd6,0xd3,0xbb,0xa1,0x23,0x21,0x5a,0x41,0x2b,0x4e,0xe6,0xcf,0x9b,0x33,0x1e,0x0b,0xab,0xa5,0x69,0x96,0x32,0x4c,0x40,0xbe,0xfa,0x48,0x40,0x0c,0xbf,0x2f .byte 0x9d,0xd4,0xb0,0xfe,0x74,0x3e,0x9f,0xb6,0x08,0xb0,0x71,0x32,0xa6,0xeb,0x62,0x2a,0xbc,0xdd,0xca,0x68,0x41,0xe4,0xcd,0x52,0xfb,0x4f,0x09,0xdc,0xb8,0x26,0xad,0xfd,0x23,0x9d,0x65,0x80,0x00,0xd8,0xd2,0x27,0xfb,0x80,0xd0,0x06,0xfa,0xe8,0xbc,0x70,0x54,0x5a,0xb7,0x30,0x9a,0xec,0x38,0x02,0x76,0x0f,0xda,0x41,0x1e,0xfe,0xe9,0xa0 .byte 0x77,0x6e,0xef,0xfb,0x2e,0xf9,0x35,0x5a,0xcb,0x2d,0xdf,0x57,0x68,0xc3,0xb5,0xd9,0xef,0x72,0xb2,0xac,0xcb,0x60,0x90,0x17,0x70,0x8f,0xe6,0x70,0x52,0x13,0xa1,0xb2,0xe8,0x80,0xee,0x77,0x87,0xf2,0x72,0xeb,0x53,0xf0,0xcc,0x37,0xc2,0xe5,0x8c,0x0a,0x50,0x00,0x67,0x9f,0xf0,0xa6,0x2c,0xde,0xe9,0xd6,0xde,0x8a,0x96,0x50,0x6c,0x9e .byte 0xb0,0xd3,0x6a,0x8a,0xd0,0xd7,0x1d,0x53,0x63,0x58,0xef,0xfc,0xd3,0x74,0xe2,0x46,0x51,0xf7,0x78,0x69,0xb9,0x3e,0x6a,0xa3,0xdb,0x1b,0x7c,0x1c,0xc6,0x25,0xf7,0x36,0xba,0x27,0xd5,0x96,0x70,0x24,0x81,0xe1,0x7f,0x44,0x82,0x57,0xc7,0x37,0x71,0x00,0x6b,0xd1,0x99,0x12,0xb1,0x84,0xc9,0x65,0x03,0x3f,0x9b,0x36,0x4b,0x37,0x21,0x5d .byte 0x12,0x96,0x5d,0x64,0xdf,0x2c,0xe4,0x7a,0x1a,0x1e,0xf3,0xdf,0xc3,0xbb,0xb9,0x35,0x36,0x5f,0x71,0xe5,0xca,0x76,0x02,0x95,0x8e,0x2d,0x87,0x32,0xf2,0x78,0x0e,0x01,0xe1,0xb2,0x4c,0x11,0x26,0x70,0x4d,0x9b,0x9f,0xa1,0x65,0x7d,0x9c,0x2f,0xa6,0x01,0x2b,0xdc,0x3f,0x72,0xd1,0xe8,0xb1,0xd2,0x04,0x6b,0x8b,0xbf,0x43,0xba,0xbb,0xb9 .byte 0xec,0x86,0x2a,0x87,0xb5,0xee,0x82,0x40,0x96,0xde,0xd7,0xcc,0x07,0x66,0x38,0x90,0x70,0x20,0x03,0x51,0x5b,0xf2,0x54,0x87,0x5c,0x29,0x8c,0xb1,0xa1,0xf0,0x56,0x1f,0xb4,0x4c,0x69,0x3b,0x4e,0x6d,0x6a,0x39,0x0c,0xde,0x1b,0x32,0x15,0xbe,0xb0,0xc5,0x4c,0x9b,0x4b,0xf0,0x47,0x8a,0x30,0x6e,0xa9,0xbc,0xf1,0xa0,0x73,0x14,0x5c,0xea .byte 0x73,0x7c,0x0d,0x80,0x02,0xed,0x74,0xe7,0x77,0x42,0x2b,0x4a,0xc6,0xdd,0x70,0xd7,0x5d,0x4c,0xe9,0xfd,0x62,0x41,0xc1,0x55,0xd7,0xee,0x81,0x81,0x16,0xb5,0x3f,0x9f,0x6c,0x8a,0xb9,0x90,0x1c,0xd3,0xba,0x32,0x6b,0xa7,0xa6,0xa7,0x8f,0xd9,0xfa,0x18,0xfd,0x25,0x91,0x6e,0xc4,0x35,0xde,0x07,0x89,0x92,0x4e,0xfe,0x4a,0xb7,0x09,0x66 .byte 0xb0,0x58,0x32,0xe2,0xa3,0xa8,0x4e,0x7f,0x10,0xab,0xb8,0xe0,0x87,0xf1,0xaa,0x59,0x8e,0x71,0x62,0x47,0x93,0x19,0x82,0x8a,0xf9,0x0c,0x2d,0x9f,0x5d,0x6d,0xd2,0xa4,0x1f,0x96,0x36,0x3c,0x41,0x94,0xa2,0x87,0x68,0xcd,0x03,0x65,0x8c,0xbc,0x92,0xa9,0xa1,0xda,0x9c,0xcb,0x64,0x56,0xdd,0x06,0x82,0xc8,0xbb,0x20,0xb0,0xd3,0xf0,0x8e .byte 0x47,0xb7,0x71,0xf8,0x7c,0xc3,0x74,0x54,0x38,0xd2,0xa6,0x3c,0x7e,0xcb,0x27,0xcb,0xef,0xe9,0x7b,0xda,0xca,0x08,0x47,0x4b,0x35,0x45,0xff,0x64,0xae,0x6c,0x37,0xe9,0x5d,0xf5,0x00,0x51,0x71,0xf4,0x30,0x60,0x8c,0x22,0x5c,0xae,0x8a,0x03,0xc7,0xd3,0x91,0x7d,0x0f,0xf9,0x91,0xb5,0x2d,0xdc,0x36,0x61,0x4a,0x94,0xf8,0xc0,0x12,0xcf .byte 0x3e,0xf6,0xea,0x15,0x9c,0xe0,0x35,0x09,0xfb,0xca,0x1b,0x53,0x7e,0x4f,0x12,0xbc,0x2c,0xa8,0x1b,0x78,0x54,0xa1,0x7f,0x08,0x47,0xe3,0x0c,0x0e,0x84,0xd5,0x9e,0x49,0x91,0xf6,0x8d,0x30,0x5a,0x94,0xcf,0x50,0x62,0x26,0xc7,0x6b,0xad,0xa0,0x3a,0x45,0x12,0x0d,0x31,0xb1,0x64,0xcb,0xa1,0xda,0xc3,0x57,0x41,0x3b,0x03,0x43,0xe0,0xe9 .byte 0xa5,0xc5,0x4c,0x56,0x82,0xef,0x9f,0x1b,0xb4,0xd7,0xb3,0xc9,0xf5,0xca,0x0e,0xfa,0xc5,0xf2,0x4c,0xf3,0x20,0x0b,0x95,0xe1,0xeb,0xcc,0xb1,0x96,0xd8,0x55,0x68,0x23,0xda,0x30,0x98,0xe3,0x85,0x45,0xa7,0xc0,0xa8,0xe1,0xd6,0x3f,0x4b,0x7e,0x71,0x4b,0xdc,0x46,0x66,0x90,0xd1,0x6d,0x04,0x6b,0xb5,0xa4,0x6f,0x81,0x2c,0x9e,0x20,0xb2 .byte 0xad,0x80,0x57,0xd9,0x86,0x42,0xc2,0xab,0xfc,0x61,0x29,0x04,0x32,0xfc,0x77,0x12,0xa5,0xd8,0x58,0x97,0xf0,0x47,0xd2,0x60,0x51,0x86,0xcb,0xce,0x0a,0x2d,0x8b,0xdb,0xa3,0x38,0x32,0xc4,0xef,0xa1,0x7d,0xb8,0x56,0x72,0xd1,0xbc,0x1c,0xf7,0xfc,0xda,0xca,0x6b,0x61,0x13,0xb1,0x73,0x0c,0xb2,0x37,0xcb,0x68,0x69,0x19,0xcc,0xda,0x21 .byte 0xf1,0x3a,0x63,0x50,0x3c,0xfd,0x24,0x6e,0x66,0xbb,0x0d,0xfa,0xf3,0xe8,0xfa,0xb1,0x81,0x8a,0x4b,0x00,0x98,0x32,0x56,0x5c,0xaa,0xd0,0x13,0xe4,0x37,0xe2,0x7a,0xdd,0x00,0x6b,0x5d,0xc8,0x6f,0x25,0xd8,0xd8,0x36,0x24,0xeb,0x20,0x60,0x8e,0xbf,0x41,0x4f,0xab,0xc1,0xfc,0xc8,0x38,0xd6,0xf8,0xd6,0x27,0x52,0xac,0x2a,0x9a,0xf0,0x00 .byte 0x56,0xe8,0xdb,0xd1,0x14,0x68,0xb2,0xdc,0xbb,0x6f,0x18,0x93,0x52,0xe5,0x20,0x14,0x98,0x08,0x51,0xc8,0x89,0xee,0xaf,0x1e,0x78,0xcc,0x6a,0x92,0xcc,0x49,0xd4,0xfd,0xbe,0xa5,0x88,0x7b,0x07,0xcb,0x30,0x79,0x56,0xd6,0x0e,0x39,0x0b,0xc0,0x9e,0x1d,0xdf,0x5c,0x12,0x87,0x9d,0x9e,0x1f,0x0e,0xf1,0x6f,0xee,0x6d,0x71,0x18,0x63,0x72 .byte 0x57,0x3c,0x01,0xb9,0x69,0xb2,0xf3,0x4f,0x2a,0x2d,0x69,0x39,0x52,0xcd,0xac,0x3d,0xd9,0x9d,0xdb,0x2c,0xa9,0x51,0x52,0xd0,0xc2,0x61,0x78,0x87,0xef,0x74,0xc9,0x70,0x6e,0x73,0x37,0xa4,0x15,0xcd,0xb0,0xd9,0xac,0x59,0xfc,0xf8,0xcb,0xb6,0x6c,0xa6,0xa6,0xfa,0xf4,0x0d,0x87,0xe1,0xe3,0x5a,0x72,0xfe,0xfa,0xa6,0xab,0x34,0xd0,0x24 .byte 0xba,0xa8,0xa1,0x7e,0xbe,0xc0,0xec,0xd7,0x84,0x26,0x15,0xaf,0xf8,0xd6,0x73,0x61,0xa0,0xd8,0x2c,0x60,0x60,0xbe,0x34,0x1d,0x57,0x12,0xce,0x1b,0x24,0xea,0xca,0x8e,0x18,0x7f,0xe9,0x9e,0xc1,0x8b,0x09,0x11,0x9c,0x96,0x1c,0xf1,0xb3,0xa0,0x19,0x6a,0x17,0x42,0x32,0x46,0xc8,0x72,0xbc,0x6b,0x83,0x58,0x42,0xe9,0x87,0x0e,0x1b,0xeb .byte 0xbb,0xea,0x5f,0xe4,0xcf,0xff,0xc3,0xf9,0x59,0xd5,0xc4,0x3c,0xfa,0x84,0xb2,0xa7,0x7b,0x49,0x9d,0xd8,0x68,0x45,0x07,0x0a,0x21,0x8a,0x75,0x80,0x94,0x2e,0xb9,0x36,0x01,0x0c,0xd0,0xde,0x88,0xed,0x62,0x55,0xc2,0x49,0x92,0xf5,0xa4,0x51,0x5b,0xcd,0x3a,0x56,0x0a,0x85,0x36,0x14,0xea,0x23,0x79,0x48,0xea,0x6e,0x67,0x20,0xcc,0x2b .byte 0x2d,0xb8,0xfb,0x01,0x89,0xf3,0x9a,0x22,0x0c,0x6e,0xb9,0x47,0x3a,0x07,0xef,0x11,0x88,0xd4,0xc0,0xab,0x39,0x2e,0xee,0x8d,0x1f,0x44,0x0e,0x2c,0x32,0xba,0x54,0x60,0x03,0x70,0xed,0x11,0x01,0x2d,0x08,0x5a,0x69,0xea,0x62,0x46,0xdb,0xf5,0x99,0xa6,0x69,0x1c,0x43,0x95,0x4b,0xf6,0x02,0xb1,0xd1,0x38,0xe9,0xd3,0x96,0x7d,0xae,0x0f .byte 0x46,0x0d,0x9c,0x73,0xe3,0x90,0x9a,0x23,0xc2,0x34,0xb0,0x53,0x04,0x88,0xd0,0x61,0x82,0x46,0xef,0xe1,0x54,0xca,0x54,0x32,0xc1,0xaa,0x1f,0x3d,0x9b,0xac,0x8c,0x78,0x0d,0x0d,0x53,0xba,0x81,0x48,0x7c,0xda,0x9c,0x49,0x07,0x38,0x0d,0xc0,0xa3,0xb2,0xc0,0x4a,0xae,0x29,0x3b,0x0a,0x78,0x0c,0x4b,0xf5,0x9e,0xb3,0x4c,0x42,0xa0,0x52 .byte 0xb6,0x6f,0xc5,0x77,0xd8,0xed,0xae,0x4d,0x45,0x09,0xe5,0xc8,0xd2,0xbe,0x5b,0x12,0x1d,0x6f,0x5c,0x3a,0x7e,0x5f,0x7a,0x04,0xbf,0x67,0x4d,0x76,0xdf,0x00,0x42,0x18,0xcd,0x65,0x6d,0x64,0x97,0x85,0x09,0x80,0xb6,0x13,0xc0,0x9b,0x8c,0x25,0x52,0x6b,0x03,0x88,0x2f,0xba,0x4c,0xbe,0xab,0xf9,0x3a,0x3b,0x4a,0x87,0x42,0xc0,0xe5,0x61 .byte 0x37,0x4b,0x1a,0xb9,0x68,0x1a,0x50,0xde,0xf2,0xaf,0xdd,0xf4,0xa4,0xa0,0x97,0xf6,0xec,0x70,0xbe,0x6e,0xe5,0x7a,0x14,0x8a,0xfe,0x49,0x54,0x18,0x21,0x30,0xc3,0x3e,0xa8,0xa0,0xbc,0xd0,0x32,0x48,0x8b,0x67,0x47,0x39,0x10,0x1b,0x5f,0x67,0xe1,0x3c,0xf2,0xfc,0xe5,0xb9,0x23,0x96,0xdd,0xeb,0xc5,0x76,0x5a,0xc9,0xee,0xe2,0x09,0x43 .byte 0xfe,0x4b,0x6e,0x99,0x17,0x24,0xfc,0x30,0x02,0x2f,0x4c,0x3d,0x52,0xe7,0xdf,0xd5,0x20,0x5d,0x13,0x3b,0x4a,0xfd,0xb4,0x78,0x3b,0x91,0x58,0x52,0x2e,0x3c,0x8a,0xad,0xfc,0x64,0xb9,0xc2,0xcd,0xdd,0x58,0xf5,0xce,0x1f,0x50,0xdf,0xd9,0x8f,0x39,0x93,0x17,0xe4,0xac,0x7d,0x6b,0xf6,0x7f,0x72,0xd2,0x9e,0xa5,0x8c,0x4f,0x16,0x29,0xf8 .byte 0xca,0xb2,0xf3,0xb2,0x94,0x08,0x91,0x74,0xf9,0x1a,0x01,0xa1,0x15,0xb4,0x79,0xb3,0xb9,0x18,0x91,0x34,0xa5,0x2b,0x45,0xd3,0xbf,0xf7,0x11,0x42,0xbd,0x63,0x08,0xf9,0x89,0xab,0xbe,0x02,0xab,0xda,0xfc,0xc6,0xba,0x57,0xd8,0x60,0x1d,0x03,0x12,0x57,0x01,0x9f,0x88,0xc1,0x3b,0xa5,0xa3,0x09,0xd5,0xb5,0x37,0x32,0x86,0xe6,0xf0,0x1d .byte 0xf2,0x37,0x57,0xdd,0x05,0x56,0xfe,0x2d,0x7c,0x95,0x52,0x93,0x21,0x1c,0x8b,0xfe,0xda,0xea,0xee,0xd9,0xc4,0xec,0x54,0x2e,0x35,0xb3,0x64,0x72,0xf2,0x7a,0x4a,0x1c,0xc9,0x33,0x07,0xda,0xc9,0xd8,0x7d,0x5d,0xeb,0xef,0x23,0x91,0xb5,0x68,0x8e,0xf5,0x4e,0xb9,0xd3,0xff,0x7b,0x72,0x27,0xbf,0x9e,0xf7,0x16,0x8a,0x42,0x4f,0x3a,0x0a .byte 0x09,0xfe,0x0b,0xf9,0x64,0xfd,0xa6,0xf2,0xaa,0x29,0x45,0xeb,0xe1,0x4c,0xf8,0x84,0x9d,0x19,0xf9,0x18,0xf6,0x72,0x9e,0x5f,0xf6,0x91,0xca,0xf7,0xda,0x88,0x0a,0x2c,0xb0,0xea,0x33,0x34,0xd0,0xa9,0x4c,0xd5,0x1f,0x91,0x08,0x74,0xc7,0x62,0x66,0xb4,0x60,0xdb,0x76,0x3e,0x17,0x43,0x73,0xdd,0x67,0x71,0xaa,0xc0,0x6c,0xe2,0x1c,0x54 .byte 0xfe,0x97,0x5e,0xf9,0x1b,0xa7,0x61,0xf2,0x40,0x96,0xc1,0x06,0x14,0xc8,0x7f,0xe5,0xec,0x66,0x2d,0xca,0x53,0xd1,0xf8,0x49,0x59,0xce,0xfd,0x79,0x20,0xe0,0xd4,0x3d,0x4f,0x25,0x7e,0x43,0x51,0x58,0x84,0x7e,0x23,0x29,0x4d,0xc3,0x4f,0x60,0x11,0xbb,0xc4,0x7b,0x67,0x32,0xd4,0x33,0x70,0x65,0x16,0x02,0x0f,0xdd,0x19,0xde,0xc2,0x1c .byte 0x69,0xd2,0x39,0x79,0xd0,0x81,0x91,0xc0,0x3d,0xb3,0xee,0x79,0xcc,0xdd,0x81,0x0a,0x7c,0x92,0x5f,0x23,0x4e,0x66,0xbc,0x0a,0xc4,0xab,0xf4,0xf4,0x31,0x74,0x46,0xd9,0x74,0x18,0xe3,0x68,0xc2,0xc9,0x04,0x73,0x5a,0xb4,0xd3,0x87,0xda,0x56,0xe7,0x60,0xb2,0x2b,0x1e,0xd3,0x20,0x72,0x33,0x40,0xa6,0x4b,0x26,0x6f,0xcc,0x05,0x57,0x62 .byte 0x17,0x0d,0x7d,0x14,0x5d,0xe8,0x7c,0xa9,0x1e,0x2e,0xbb,0x6f,0xb4,0x2f,0x3e,0xec,0x3b,0x62,0x1c,0xae,0x9d,0x2d,0x6c,0x9f,0x1f,0xed,0xd0,0xb1,0x99,0x71,0xd0,0x79,0x0b,0x80,0x68,0x3b,0xeb,0x47,0xb0,0xf4,0xec,0x8a,0x1f,0x9f,0x55,0xb6,0xf4,0xfc,0xd0,0xb5,0x7d,0xa8,0xd0,0x70,0x73,0x32,0x87,0x5e,0xb9,0x61,0x5c,0xc1,0xdc,0x5d .byte 0x2e,0x1f,0xfb,0x83,0x82,0xaf,0xfa,0xa9,0x6b,0x61,0x4b,0xe4,0x4a,0xa7,0x50,0x28,0x8d,0x7f,0x27,0x1b,0x8e,0xb1,0x81,0x1a,0x60,0xa5,0x1e,0x79,0x0a,0xcf,0xc6,0x4e,0x0e,0xdf,0x67,0xe2,0x08,0xb5,0xbb,0xa7,0xa2,0x5a,0xcf,0xa2,0xc2,0xd3,0xdf,0x7f,0xb8,0xbb,0x06,0x44,0xd9,0xfb,0xa9,0xa4,0x3b,0x8e,0x93,0x64,0xce,0x54,0x9c,0x6d .byte 0xce,0x2d,0xca,0xb7,0xbf,0xb1,0x13,0x8c,0x53,0x25,0x7b,0xcb,0x4d,0x15,0x99,0xe8,0x3e,0xdd,0xf9,0x0a,0x64,0xd0,0x52,0xc1,0xd9,0x08,0xb7,0x6c,0x47,0xcb,0x76,0x9f,0xda,0x38,0x5c,0x8d,0x81,0xd2,0x74,0xc7,0xa5,0xb2,0x44,0x1d,0xa5,0x92,0xb8,0x0d,0x99,0x97,0xd7,0x16,0x30,0x22,0xaf,0xac,0xcf,0x5a,0x5f,0x32,0x0e,0x18,0xce,0xfa .byte 0xec,0x52,0x36,0xa5,0x03,0x00,0xc6,0xe6,0x4e,0x7c,0x22,0x97,0xbb,0xbd,0x19,0x60,0xec,0xc7,0xb3,0xb4,0xee,0x74,0x9a,0x66,0x6b,0x19,0x6c,0x41,0x02,0xd7,0x15,0x68,0xf9,0x13,0x9f,0xa4,0xf4,0xf1,0x58,0x0d,0x9e,0xf5,0x00,0x2d,0xce,0x6d,0xbb,0x2b,0x0a,0xcc,0x52,0xcb,0x17,0x6f,0xfa,0x22,0xfd,0x5b,0x01,0x3a,0x5b,0xee,0x48,0x71 .byte 0xbf,0xe8,0xad,0x7b,0x95,0xd8,0x6b,0x96,0x36,0x80,0x4b,0xf6,0x92,0x0d,0x86,0x8d,0xc3,0xeb,0x8f,0xe8,0x90,0x2f,0x21,0x16,0xb4,0x9b,0x89,0xbc,0x2d,0x72,0x7c,0x17,0xdb,0x35,0x07,0x0d,0x67,0x7e,0x99,0x04,0x89,0x14,0xcb,0x95,0xd7,0x35,0x58,0xbd,0x63,0x28,0x24,0x8c,0x05,0xea,0xab,0x75,0xd8,0xa9,0x14,0x2c,0xda,0xc8,0xcf,0x21 .byte 0x1e,0xaf,0xa9,0x7a,0x39,0x7a,0xc6,0x26,0x27,0xa5,0x62,0x51,0xe6,0x51,0xf2,0x9b,0xe8,0x02,0xa7,0x97,0xb5,0x8f,0x2f,0xff,0xf0,0xf0,0x7e,0x93,0x8d,0xd1,0x0c,0x5f,0x01,0xb7,0xb9,0x36,0x89,0x47,0xd4,0x30,0x02,0xf2,0xaa,0x28,0x3c,0x8e,0x25,0x8e,0x19,0x8e,0xfa,0x54,0x25,0x57,0xf2,0x38,0xbc,0x06,0xa5,0xcd,0x93,0xf4,0x9e,0x77 .byte 0x3d,0x58,0x8f,0x69,0x10,0xab,0xcc,0x38,0xb1,0xa8,0x2c,0x3e,0xde,0x80,0x6b,0xa6,0xd7,0x7e,0xbd,0x07,0xfe,0x8a,0x10,0xd8,0x1f,0x37,0x77,0xed,0x29,0x6c,0x45,0x6c,0x0d,0xb9,0xab,0xcf,0x4c,0x04,0x8c,0x0d,0xce,0x10,0x3a,0xfb,0x16,0xd3,0x89,0x53,0x5f,0x41,0xc0,0x18,0x6a,0x5e,0xd6,0xdd,0xc4,0x46,0x19,0x3b,0xbe,0x25,0xd5,0x03 .byte 0x27,0xfe,0x00,0x76,0x45,0x95,0x89,0x19,0x9c,0x2f,0x70,0xa7,0xb6,0x87,0x85,0x5e,0xd0,0xe4,0x2f,0x48,0x0f,0x52,0x3d,0x25,0x3a,0x45,0x5d,0x0b,0x55,0xcb,0xec,0x6d,0x97,0xaa,0xe9,0x7e,0xae,0x70,0x72,0xe2,0xbd,0x06,0xd7,0x4c,0x1d,0x1d,0x56,0xa7,0x24,0x09,0x4b,0xcb,0x09,0xc6,0x65,0xf1,0x5e,0x3d,0xeb,0x0a,0xc1,0x9c,0xc7,0x12 .byte 0xfd,0xd9,0xdb,0xe7,0xe2,0x52,0x5a,0x68,0x4f,0x90,0xf3,0xf8,0xa4,0xe1,0x46,0x30,0x47,0x31,0x54,0x67,0xbc,0xdc,0x77,0xd6,0x73,0xe7,0x55,0xc9,0x2e,0xbe,0xe9,0xb6,0x6f,0x7f,0x0f,0xd8,0x30,0x50,0x95,0x03,0x3e,0x8f,0x8a,0x3c,0x4c,0x86,0x63,0xb6,0x44,0xae,0x1b,0xbc,0x1d,0x90,0x1a,0x76,0x4e,0x92,0x98,0xba,0x59,0x73,0xf8,0xff .byte 0x07,0xdb,0xc4,0x90,0x17,0x0d,0xf1,0x58,0x13,0x64,0x88,0xcc,0x16,0x30,0xec,0x70,0x87,0x20,0xfc,0x3e,0xf6,0x70,0x2e,0x92,0xcb,0x42,0x47,0x5b,0xb3,0xf1,0x89,0xf1,0xd7,0xf5,0x16,0x89,0xed,0xf5,0x04,0x1a,0x85,0x9e,0xe7,0x74,0x8c,0xd6,0x79,0x26,0x2c,0x21,0xcd,0xff,0x53,0xea,0xf9,0xff,0x69,0x82,0x35,0xdb,0xc1,0x2a,0x36,0xf6 .byte 0xf6,0x98,0x08,0x7c,0xcd,0x31,0x32,0x8e,0xb3,0xf5,0xe9,0xe4,0x38,0xec,0x38,0x08,0xa8,0xbc,0x83,0x3f,0xfa,0xbe,0xb6,0xd6,0x20,0x10,0xaa,0x3e,0x5d,0x6c,0x96,0x4f,0x31,0x63,0xf2,0x90,0xce,0x0a,0x4c,0x94,0x63,0xb7,0xb5,0xd1,0x4a,0xcb,0xf1,0xd6,0x21,0x23,0x07,0x49,0x80,0x6c,0xe6,0x4a,0x6a,0xa4,0x9c,0x10,0x31,0x34,0xe3,0xf5 .byte 0x3c,0x8c,0x53,0x7d,0x56,0x3e,0xc7,0x91,0x99,0x7c,0xd3,0x0a,0xa0,0x81,0x50,0x54,0x4c,0x8c,0x8f,0x53,0x6a,0xda,0x39,0x9e,0xc4,0xf5,0xa9,0x26,0xa0,0xc3,0x1f,0xb2,0x79,0x9b,0x51,0x0a,0x18,0x2a,0xe8,0xf5,0x94,0x30,0xa3,0x4e,0x27,0xc3,0xdb,0x8c,0xc6,0xa1,0x8f,0x4f,0xef,0x94,0x11,0x74,0xb6,0x05,0x9e,0xd8,0xc1,0x8f,0x8a,0x0f .byte 0x38,0x36,0x70,0x68,0x66,0x56,0x14,0xf1,0xda,0xda,0xc2,0xe1,0xc8,0xaf,0x1f,0x85,0x95,0xa7,0xaf,0x17,0xdc,0x38,0x7e,0x05,0x23,0x1e,0x37,0x05,0x6c,0xde,0x1c,0x91,0x64,0x0d,0xd5,0x74,0xe7,0xef,0xee,0x01,0xac,0x85,0xbb,0xca,0x06,0x7c,0xab,0x8d,0xaa,0xb4,0xaa,0xd4,0xb8,0x0c,0xb8,0xcf,0x13,0x9b,0xd2,0x9d,0x22,0xa5,0x44,0x51 .byte 0xd5,0x87,0xdf,0x74,0xe1,0x70,0x8b,0xef,0x24,0x04,0xe8,0x3a,0x74,0xf1,0x35,0x89,0xc3,0x20,0x81,0xc7,0xaa,0x1e,0x51,0x5f,0x28,0x42,0x37,0xbc,0xaf,0x81,0xe3,0x4d,0xc5,0x10,0xcc,0xb4,0x6d,0xf6,0x81,0x73,0x1f,0xc5,0x59,0x78,0x7d,0xce,0x7d,0xab,0x20,0x4f,0x86,0x06,0xb9,0xa3,0xc5,0x97,0x76,0x5d,0xeb,0xc4,0x9f,0x22,0xb8,0x7b .byte 0xc1,0x35,0x6c,0xd6,0x4e,0x12,0x26,0xf1,0xda,0xae,0x15,0xab,0xab,0xbc,0xd5,0x07,0x5b,0xf1,0x9a,0xf0,0xbd,0x7f,0x08,0x15,0xd1,0x12,0x23,0x7f,0x78,0x9e,0x89,0x54,0xd8,0x16,0x96,0xa1,0x14,0x45,0x12,0xce,0xda,0xad,0x41,0xa4,0x70,0xdf,0xfc,0xa3,0xdc,0x27,0xc2,0xa3,0x11,0x8d,0x25,0x8b,0x6d,0xda,0xd7,0x03,0x7d,0x32,0x32,0x3c .byte 0x8a,0x97,0x8f,0x10,0xcc,0x40,0x89,0x17,0x5e,0x30,0x2b,0xd1,0xb6,0x44,0xb4,0x6c,0x44,0xe7,0xe0,0xd1,0xfb,0xe1,0x68,0xf5,0xc9,0xa8,0x3c,0xa6,0x0b,0x30,0xb5,0x7a,0x0a,0x15,0x43,0x57,0xbd,0x0a,0xcc,0x02,0x05,0x47,0xfb,0x10,0x30,0x07,0x8b,0x9e,0xae,0xd8,0x03,0x18,0x06,0x26,0x35,0xa8,0xae,0x1e,0x51,0x71,0xa8,0x4d,0x27,0x6e .byte 0x25,0x27,0x77,0xb5,0x79,0x43,0x03,0x04,0xaf,0x61,0x04,0xbc,0x29,0x3e,0x6e,0xfe,0x35,0xc9,0x41,0xfc,0x8a,0x3c,0xd8,0xe4,0xa3,0x34,0x40,0x49,0x36,0x9b,0x18,0x8c,0x6a,0x34,0xa6,0x4c,0xed,0x51,0x8f,0x3a,0xaa,0xa2,0x3f,0xc6,0xce,0xa8,0x53,0x5a,0xa8,0x4e,0xc1,0x84,0x5d,0x2a,0x0b,0x24,0xe5,0x46,0x8e,0xc4,0x55,0x52,0xf4,0xf3 .byte 0x0c,0xa5,0x24,0x10,0x7e,0xfc,0xed,0x42,0x11,0x39,0xfd,0x3d,0x4a,0x07,0xaf,0x21,0x35,0x4a,0x51,0xcd,0xfb,0x98,0x9a,0x5f,0x15,0x3a,0xab,0xb0,0x56,0x39,0x17,0xcd,0xb9,0xa6,0x6d,0x73,0xbc,0x63,0x95,0xf8,0x78,0x65,0x6f,0x47,0xe9,0x5d,0x12,0x62,0x52,0xb6,0xb2,0x86,0x49,0x1b,0x53,0x3d,0x27,0xc4,0x17,0xa4,0x56,0xc9,0x85,0xbe .byte 0xe1,0x54,0xed,0x72,0x03,0xd9,0x67,0x6f,0xd0,0xea,0xf7,0x5b,0x39,0x61,0x42,0x48,0xd5,0x8d,0xfb,0xe6,0x3b,0x93,0x16,0x42,0x29,0x0b,0x27,0x1d,0x1f,0xae,0x78,0x16,0x59,0xa6,0x33,0x36,0x86,0x8d,0x31,0x30,0x9e,0xa0,0x82,0xdd,0x02,0x1c,0xde,0x01,0x0f,0x87,0x85,0x2e,0xbb,0x68,0x46,0x8e,0xfc,0xfe,0x32,0x78,0xe4,0x27,0x4f,0xb2 .byte 0x12,0x94,0x95,0x93,0xba,0x09,0xb4,0x58,0x5c,0x0e,0xa4,0x8a,0x6f,0x0a,0xfc,0xac,0x9f,0x99,0x8a,0x06,0xaa,0x9f,0x69,0x4f,0x3c,0xec,0xe5,0x52,0x60,0x60,0xb8,0xfe,0xf6,0x27,0x47,0xff,0xc9,0x2f,0xec,0xed,0x50,0x07,0xe5,0x3e,0x28,0x65,0xb3,0x36,0x52,0x5c,0xa9,0x4c,0x64,0x65,0x5f,0xfe,0xe3,0xe6,0x19,0x4b,0xdc,0xa0,0x3f,0xab .byte 0xff,0xca,0x37,0x03,0x83,0xb1,0xe2,0x35,0x69,0x08,0x6d,0x08,0xe4,0xa8,0xc5,0x04,0xe0,0x00,0x66,0x70,0x96,0x16,0x21,0x07,0xe2,0xbc,0x92,0x30,0x31,0x6d,0x02,0xeb,0xbf,0x5a,0x8c,0x39,0x7a,0xd6,0xba,0x15,0x52,0xf6,0xf7,0x30,0x08,0x04,0x5a,0x84,0x56,0x7d,0x8c,0xf1,0x3b,0x87,0xc9,0xfd,0x76,0xd0,0x6d,0x28,0x93,0x4f,0x23,0x9b .byte 0xf7,0x26,0x7a,0xfe,0xc2,0xde,0xf4,0xb6,0x9c,0x29,0xcc,0x45,0x1a,0x50,0x52,0xab,0xa2,0xef,0x38,0x69,0xe7,0x73,0x54,0xa1,0xf3,0xce,0x31,0xe6,0xa3,0x8a,0x26,0xa5,0x37,0x39,0x88,0xa4,0xf0,0x39,0xb5,0x52,0x2c,0x3d,0xc7,0x60,0xe0,0x9e,0xfe,0xa4,0x4e,0x00,0xf3,0x58,0x4b,0x8a,0xb0,0x9a,0xfc,0x31,0xc5,0x1a,0xd5,0x80,0x37,0x06 .byte 0x35,0xc2,0x52,0xff,0xa3,0xff,0xd6,0xb5,0xbd,0x66,0x3b,0x61,0x00,0x1e,0x0a,0x9c,0xea,0x8b,0xb1,0x89,0x8a,0x5d,0xe2,0x4f,0x9a,0xf5,0x45,0xe8,0x76,0xa1,0xcf,0x12,0x57,0x74,0x00,0x8f,0xd4,0xc7,0x69,0xef,0x81,0x0e,0x87,0x0c,0xd9,0x54,0x59,0x73,0xed,0x37,0xb8,0xd6,0x90,0x6a,0xae,0x35,0x60,0x77,0x3f,0xd8,0xb6,0x07,0x6e,0x7a .byte 0x80,0x6b,0x51,0x7a,0xbe,0xd3,0x7c,0xe3,0xaf,0x75,0xee,0x25,0x84,0x14,0x74,0x64,0xed,0xc1,0x06,0x44,0xf8,0x1d,0x92,0x95,0x3e,0xfa,0x7b,0x01,0x5c,0x07,0xda,0x3e,0xb1,0x25,0x25,0xf2,0xf9,0x4f,0x07,0x91,0x96,0xf9,0x22,0x39,0x79,0x4e,0x5b,0x82,0xb1,0xb1,0x4c,0x28,0xba,0x13,0x76,0xd1,0x74,0xda,0x52,0xf9,0x2b,0x08,0x05,0x81 .byte 0x9b,0xa2,0xf1,0x17,0x96,0x23,0x37,0x37,0x4f,0xc4,0x81,0x30,0xff,0xfe,0xb2,0x3a,0xc3,0x73,0x91,0xd3,0x75,0xaf,0x99,0xc1,0x8e,0x18,0x9e,0x73,0xef,0xad,0x37,0xc4,0x1f,0xeb,0x67,0x3b,0xba,0x5d,0xc8,0x65,0x7a,0x8f,0xdf,0x1c,0x3e,0x6e,0xca,0xca,0x48,0x67,0x6b,0x10,0xad,0x43,0x06,0xe8,0xd5,0xfc,0xf5,0x5f,0x10,0x20,0x43,0x20 .byte 0x5e,0x84,0x49,0x15,0x13,0x0d,0xf2,0x4e,0x9f,0xcf,0x66,0xab,0x6d,0x52,0x43,0x62,0xc3,0x84,0x8a,0xee,0x99,0x3f,0x2f,0xbf,0x05,0x72,0x0d,0xad,0x97,0x5e,0x58,0x09,0xe7,0x88,0xe6,0x79,0xe4,0x2e,0xa4,0x10,0x0f,0x1e,0x8e,0xb4,0x01,0x24,0xf0,0x3e,0x16,0xad,0xf4,0x77,0x87,0x86,0xff,0xb6,0x32,0xa3,0x98,0xc4,0xb3,0xd6,0x6e,0x55 .byte 0xca,0x93,0x18,0x5d,0x55,0xd4,0x08,0x73,0x42,0x32,0xc0,0xa2,0x92,0x33,0xa8,0xdf,0x7e,0xd9,0x99,0x3d,0x4a,0x88,0xf6,0xff,0x78,0xbd,0x94,0xd5,0x70,0x11,0x29,0x00,0x89,0xe8,0x76,0xe2,0x98,0x53,0xaf,0x8e,0x30,0x63,0x43,0x35,0x68,0x96,0xbc,0xdd,0xb8,0xca,0xca,0x23,0x9b,0xb8,0x05,0xbe,0x63,0xa0,0x16,0x53,0xef,0x2d,0x8d,0x6c .byte 0xaa,0xba,0x77,0xd1,0xcf,0xde,0x04,0xbb,0x8a,0xd2,0xc1,0x0e,0xbf,0x4e,0x21,0x8b,0xf3,0x25,0x2f,0xe3,0xef,0x3f,0xd6,0xd2,0x73,0xf1,0xb2,0x1c,0x82,0x19,0xd1,0xb0,0x71,0x5a,0x87,0xcc,0x67,0x22,0x7f,0x3f,0xeb,0xfe,0x9c,0x30,0x65,0x48,0xbd,0xe0,0x9b,0x10,0x22,0xe3,0x36,0xab,0xf4,0x69,0x62,0x24,0xb7,0xc7,0x51,0xe3,0x33,0x7e .byte 0x1a,0x05,0xad,0x3a,0xf5,0x63,0x21,0xcb,0x87,0x30,0xa1,0xb4,0xf6,0xd1,0xfd,0x30,0x73,0x32,0x4a,0xf5,0x20,0xe8,0x29,0xa1,0x37,0xed,0x5e,0xcb,0xf8,0x3e,0x03,0x7f,0x2f,0x4c,0x56,0xaa,0x35,0xf3,0xd3,0x4b,0xda,0xe6,0x49,0xf3,0x3a,0x62,0x88,0x31,0x76,0x09,0x60,0xf8,0x22,0x0b,0x1c,0x2f,0x3a,0xf9,0x64,0xc4,0xce,0x68,0x41,0xc7 .byte 0x85,0x25,0xdc,0x81,0xe7,0x60,0x36,0x48,0x44,0xdb,0x64,0x72,0x00,0xe4,0x98,0x53,0x2a,0x48,0x21,0xbe,0xb9,0x52,0xc8,0xc5,0xaa,0xb1,0x2b,0x0f,0xeb,0x24,0xd1,0x4f,0x0d,0x4e,0x52,0xf0,0x8f,0xa8,0x13,0x94,0x0d,0x01,0xea,0xdd,0xeb,0x4c,0xb8,0xcb,0x31,0x2e,0xe4,0x5d,0x1f,0x37,0x86,0xfd,0x52,0x10,0xf3,0x02,0xf6,0x32,0xf5,0x34 .byte 0xb7,0xa9,0x87,0x43,0xf1,0x46,0x06,0x8e,0xa7,0x1c,0x8c,0x34,0x17,0xaa,0xf7,0x59,0x33,0x2f,0xdd,0x27,0x37,0x9e,0x44,0x65,0x81,0x29,0x86,0x44,0xa8,0xdf,0xc7,0x3d,0x67,0x9f,0x14,0x50,0xd7,0xe0,0x59,0x7f,0xd9,0xdb,0xdf,0x19,0xe9,0x03,0x81,0xae,0xf8,0xa9,0x36,0x3b,0x7c,0x3c,0x30,0x6a,0x4f,0x76,0x07,0xfb,0x0d,0xa8,0xaf,0x4d .byte 0x97,0x2f,0x2c,0x0f,0x73,0x45,0xba,0x60,0xd0,0x50,0xf7,0xf7,0xba,0x04,0xf0,0x8c,0xdb,0x68,0x04,0xbb,0xa2,0xf5,0x6a,0x58,0xeb,0xec,0x7e,0x68,0x3e,0x6c,0x69,0x6f,0x32,0x9c,0x74,0xb6,0x4a,0x8f,0x34,0x3c,0x36,0xb2,0xfc,0xfb,0xbb,0x9b,0xd9,0xbc,0x00,0x31,0x59,0x0d,0x85,0x66,0x1c,0xfb,0x99,0x55,0x78,0xdd,0x0d,0x92,0xec,0x85 .byte 0x97,0xc1,0x6f,0xf5,0x6b,0x25,0xed,0x6f,0x09,0xef,0x50,0xdd,0xc2,0x90,0xb1,0x7d,0xa0,0x27,0x7b,0xa8,0x5f,0x35,0x0c,0x51,0x54,0x6e,0x64,0x4f,0x5d,0xcf,0x2f,0x5f,0xe7,0x99,0xb5,0xc1,0x91,0x4c,0xc0,0x24,0x01,0x4b,0x44,0x95,0xfc,0xd1,0x9f,0xa5,0xd0,0xe1,0x4f,0xb0,0x56,0x99,0x8b,0x03,0x44,0xf9,0x5e,0xfe,0xbe,0xa2,0xcc,0x58 .byte 0x3b,0x69,0xbf,0x44,0x67,0x8e,0xd1,0xb2,0x66,0x3c,0x8e,0x68,0x6b,0x1b,0x5c,0xfb,0xeb,0x84,0xf2,0x92,0x43,0x8d,0x7c,0x64,0x11,0xc8,0xf5,0xda,0xf5,0x4f,0xeb,0x8b,0x91,0xac,0x6b,0x47,0xe0,0xfc,0xaa,0x89,0xe8,0xd2,0xba,0x58,0x43,0xbb,0x9e,0x13,0x20,0xa1,0xfe,0xf7,0xa5,0x15,0x82,0x0d,0xbb,0xc3,0x60,0x40,0xf5,0x49,0xd5,0xea .byte 0x71,0xad,0xd7,0x7d,0x8c,0x90,0xd2,0xe5,0x51,0x8a,0x01,0x3d,0xbf,0x59,0x00,0x41,0x59,0x65,0xba,0x18,0x30,0x86,0x2a,0xcb,0x41,0x24,0x9a,0x44,0x54,0xac,0x07,0xf2,0xcf,0xe9,0x3c,0xec,0xd0,0x7d,0x91,0x0e,0xb5,0xbd,0xed,0xc4,0xf2,0x90,0x27,0x2f,0x31,0x31,0x96,0xd2,0xfc,0xe2,0x6e,0x70,0x61,0x81,0x7b,0xc8,0x8d,0x78,0x41,0xb9 .byte 0x56,0x64,0x01,0x37,0x86,0x54,0xec,0x2b,0xdb,0xd5,0xef,0xf7,0xf4,0x73,0x8d,0x84,0xdd,0x5c,0xd4,0x00,0x23,0x2b,0x4c,0x4c,0x04,0x4b,0x4b,0x61,0xd0,0x4b,0x38,0x8f,0x5e,0x56,0xb2,0xc5,0xc7,0x72,0x04,0x33,0xed,0xd7,0x91,0x99,0x22,0xee,0xdf,0xe5,0x65,0x55,0x9a,0xcb,0x32,0x22,0x48,0x6d,0x55,0xe8,0x9f,0xf9,0x95,0x62,0x45,0xdc .byte 0x21,0x6e,0xc5,0xb2,0x8e,0x4d,0x9a,0xf2,0x2b,0x2e,0x6f,0x40,0xd1,0x2f,0x4d,0xda,0xbd,0x85,0xb1,0x6f,0x04,0x39,0x09,0xfa,0xa1,0x3b,0x86,0xe6,0xdb,0x3e,0x50,0x27,0x48,0x51,0x2c,0x1e,0xe5,0xf0,0x82,0xb6,0xfc,0xd7,0xc3,0x3f,0x3f,0x16,0xa6,0xbc,0x85,0x60,0x8f,0x6e,0xd9,0xd7,0xbd,0x93,0x33,0xf4,0xd2,0xb6,0xb4,0x9f,0x73,0xef .byte 0xa5,0x59,0x32,0x4c,0x89,0x1f,0xb0,0x0b,0x71,0xf1,0xa1,0xa3,0xdb,0x4d,0xed,0xcc,0x59,0xfe,0xe9,0x6f,0x60,0x96,0xa3,0x11,0x46,0xc5,0x3d,0x60,0x53,0x39,0x3e,0x6c,0x87,0xbb,0x14,0x85,0xe6,0x0f,0x80,0x8c,0x7d,0x63,0xdc,0x34,0x20,0xc0,0x5d,0x7f,0xb4,0x19,0xdd,0xb2,0xe5,0x36,0x86,0xb9,0x88,0x7b,0x18,0x81,0x2e,0xc9,0xdd,0xf9 .byte 0x8a,0xb8,0xc9,0x21,0x16,0x5f,0xd3,0x8c,0x49,0xdc,0xe0,0x65,0x9f,0x41,0xe4,0x5a,0x52,0x07,0x1e,0x35,0xbb,0x6f,0x06,0x42,0xc7,0x91,0x66,0xc8,0x93,0xe1,0x89,0x39,0x43,0x3a,0x76,0xdb,0x14,0x41,0x91,0x90,0xcf,0x55,0x78,0x36,0xbd,0x52,0x5f,0x23,0x9e,0x59,0x45,0xad,0x00,0xdf,0xac,0x50,0xc3,0xe1,0xa4,0xca,0x5b,0x3e,0xf7,0x7d .byte 0x51,0x21,0xb0,0x61,0xc6,0x3d,0xca,0xc0,0x06,0x9d,0x16,0xd3,0x7c,0x08,0x56,0x5f,0xc6,0xf2,0x27,0xe6,0x60,0x39,0x8f,0xf7,0x41,0xd4,0x3c,0xb9,0x25,0x1c,0xa2,0xb8,0xc6,0x73,0x6e,0x71,0x92,0xb6,0x3d,0xed,0x9d,0x1c,0x76,0xd3,0x8d,0x56,0xd7,0xc6,0xd6,0x1f,0x6a,0x0d,0x3c,0x91,0xeb,0x3a,0x7b,0x38,0x6b,0x18,0xcb,0x91,0x56,0xc2 .byte 0xf6,0xa6,0xb2,0x5f,0x36,0x31,0xa2,0xd9,0xdf,0x49,0xb3,0xeb,0xf5,0x60,0xbe,0x95,0x57,0xa1,0x22,0x3e,0xb5,0x81,0x0a,0x58,0xc7,0x65,0x3d,0xb8,0x89,0x5b,0x91,0x5d,0x21,0x29,0x87,0xa9,0x03,0xdb,0x4c,0x36,0x4c,0x4f,0xf0,0xe5,0x4a,0x73,0x34,0x97,0x62,0x40,0x4e,0x2b,0x66,0x71,0xfc,0x4f,0xa2,0x99,0xbb,0xe6,0x59,0x82,0xca,0x6d .byte 0x61,0x35,0x6e,0xb3,0x2c,0x3c,0xb6,0xa0,0xb5,0x91,0xb2,0xe1,0x11,0x7d,0x8a,0xfd,0x32,0xff,0x67,0xbd,0xe7,0x98,0xcb,0x25,0x8a,0xea,0x03,0xbe,0xd0,0xf2,0x14,0x97,0x7a,0xc0,0x8a,0x4f,0x04,0x26,0x26,0x01,0x24,0xd4,0x50,0x57,0x73,0xdb,0xe9,0xc2,0xbc,0xc8,0x47,0x08,0x64,0x16,0x33,0xa1,0x5e,0xac,0x2c,0xa3,0x8e,0x88,0x88,0x66 .byte 0x0a,0x3b,0x11,0x39,0x44,0x3c,0xab,0xb1,0x69,0xe0,0x42,0xc2,0xda,0xda,0x0d,0xdd,0x4d,0x66,0xc2,0xdf,0xb7,0xa1,0xa0,0xb3,0x82,0x95,0xe3,0x62,0x2e,0x29,0xb4,0x97,0x75,0x6a,0x3a,0x23,0x29,0x67,0x69,0x53,0xd5,0x9a,0xba,0xc8,0x42,0xfe,0x54,0xba,0xca,0x4f,0x8f,0xaa,0xb0,0x76,0x69,0x83,0x84,0x0d,0x3b,0xf8,0x15,0x37,0xbc,0x86 .byte 0x15,0x98,0x89,0xc6,0x8c,0x40,0x52,0xf9,0xe7,0x87,0xdb,0x19,0x64,0xb7,0x1f,0x32,0xdb,0x41,0xe8,0x7a,0xcf,0x4c,0x98,0xc0,0xfb,0x33,0xbd,0x84,0x6d,0x9c,0xbd,0x1c,0xdb,0xba,0x1b,0x3b,0xb1,0x22,0x3e,0x6f,0x74,0x36,0xe2,0x54,0xb3,0x87,0x70,0x27,0x4c,0x5f,0xb9,0xe4,0x90,0x8b,0x63,0x0c,0x3d,0xed,0xa0,0xb0,0x36,0x2c,0x96,0xd6 .byte 0xc7,0x49,0x3e,0x29,0xc7,0x62,0x5a,0x3b,0x57,0x9c,0x91,0x68,0x8f,0x4e,0x80,0x18,0x9c,0xba,0xd1,0xcc,0x5a,0xdf,0xa0,0x88,0xbc,0x8f,0x31,0xaa,0xbc,0xd0,0xde,0x43,0x57,0x20,0x12,0x3e,0x88,0x58,0x1f,0xd5,0x68,0xba,0x87,0x38,0x94,0x6f,0x24,0x03,0xf4,0xe0,0x34,0xab,0xab,0x35,0x71,0xad,0xb0,0xaf,0x0f,0x9a,0x29,0xfa,0xde,0x69 .byte 0xe8,0xcc,0xcd,0xaa,0x28,0xfe,0x85,0xdd,0xba,0xcf,0xdf,0x71,0xdc,0x12,0x77,0x94,0x70,0xd7,0x27,0xe6,0xab,0xa9,0xb3,0x8a,0x73,0x58,0x90,0x86,0x9a,0x0e,0xe1,0xae,0x8e,0x3c,0x07,0x8f,0xb4,0x9d,0x87,0x8f,0xb2,0xa3,0x3b,0x49,0x76,0x63,0xbf,0x6b,0x75,0x52,0x54,0x66,0x4c,0xa8,0xa9,0xb2,0xd4,0x4f,0xb0,0xd0,0x9e,0xfd,0x26,0x23 .byte 0x57,0x4f,0xa5,0x99,0x1c,0xbe,0x67,0xbb,0x26,0xd2,0xcb,0x1a,0x18,0xd6,0x5f,0xfa,0x91,0xfd,0x30,0x3b,0xf4,0x02,0xa2,0x36,0x0c,0xfe,0x30,0xb2,0xc8,0x96,0xe1,0xa9,0x75,0xad,0xf3,0xb7,0x20,0x9b,0x47,0xee,0x5c,0xae,0x7b,0xfe,0xbd,0x38,0x8b,0x2b,0x7d,0xb8,0x92,0x59,0xd7,0x3b,0x91,0x40,0x5e,0xa8,0x20,0x6f,0x45,0xd8,0xd4,0x5f .byte 0x33,0x8f,0x6a,0xd3,0x67,0x9e,0x46,0x17,0xb8,0x02,0x31,0xc0,0xdc,0x5e,0x35,0xfa,0x22,0xb6,0x7e,0xbf,0xd6,0xc9,0x4e,0x66,0xa1,0xd2,0xd8,0x2a,0x84,0x2c,0xd6,0xb1,0x15,0xda,0xdb,0x3e,0xc4,0x61,0x93,0x08,0x64,0x8d,0xf0,0x61,0x9d,0xeb,0x12,0xcc,0xd1,0x3b,0xf7,0x9f,0x1a,0x18,0xe7,0xc8,0x00,0x6b,0xfd,0x84,0xd6,0xed,0xb5,0x40 .byte 0x69,0x72,0xd3,0x19,0x7d,0x24,0x7b,0x19,0xf2,0x57,0x58,0x19,0x75,0xec,0x26,0xe7,0x90,0x9d,0xe5,0x9d,0x91,0xa6,0x64,0x2e,0x29,0x15,0xc6,0x7f,0x7c,0x05,0x35,0xd5,0xe5,0x8e,0x36,0xce,0x49,0xc7,0xcd,0x69,0xa2,0xf9,0x1b,0xd5,0x84,0x13,0x4b,0x4a,0xb1,0x6c,0x15,0x6e,0xf2,0xf1,0x47,0xef,0x8a,0x18,0x6f,0xbc,0x36,0xfe,0xc3,0x85 .byte 0x2b,0x46,0x7b,0x1c,0x31,0xa6,0x41,0x33,0xaa,0x62,0x6f,0x17,0xae,0xd4,0x23,0x9b,0x93,0x79,0xdc,0xac,0x53,0x01,0x83,0x81,0x2b,0xef,0x5b,0x79,0x6a,0x8a,0x82,0xfe,0x9c,0xe3,0x08,0x06,0x57,0x2d,0xf0,0xc1,0x3a,0xa9,0x8c,0x57,0xa9,0xa6,0x13,0xf5,0xfc,0x2c,0xef,0x96,0xaa,0x3b,0xe9,0x5b,0xf0,0xb9,0x38,0x3d,0xe3,0x8c,0xa2,0xaa .byte 0x2c,0x75,0xca,0xc5,0x0a,0x72,0x8b,0x48,0xc7,0x97,0xd3,0x06,0x38,0x13,0x52,0xde,0x38,0xed,0x20,0xd1,0x43,0x24,0xee,0xd7,0x97,0x56,0x2c,0x46,0x09,0x38,0x13,0xd9,0x0a,0xa3,0x45,0x01,0x29,0x2b,0xf4,0xff,0x8e,0x87,0x94,0x4e,0xaf,0x35,0xdb,0x17,0x49,0xa7,0x53,0x0e,0x0f,0x8f,0xee,0x08,0xa1,0xee,0x54,0x73,0x66,0x6f,0xd3,0x17 .byte 0xec,0x72,0x51,0x54,0x5e,0x06,0xaa,0x10,0x1f,0x2c,0xe0,0x34,0xd9,0x4d,0x34,0x0f,0xbd,0x9e,0x18,0x33,0x83,0xdb,0xbe,0x9a,0x9d,0x44,0xd4,0xef,0x8e,0x9d,0x5e,0xe5,0x29,0x2b,0x98,0xfc,0xfc,0x7a,0xb4,0xd7,0x34,0x81,0x43,0xae,0x46,0x01,0x81,0xb9,0xb7,0x93,0x00,0x35,0x55,0x72,0x7a,0x54,0xc2,0x59,0xda,0xe7,0x14,0xee,0x9e,0x04 .byte 0xe2,0x60,0x5a,0x71,0x58,0xb5,0xdc,0x98,0xf2,0xc7,0xce,0x37,0x7a,0x31,0xcf,0x5a,0x25,0x56,0x5c,0x1c,0x97,0x22,0x70,0xc2,0x91,0xf7,0xb2,0xff,0x69,0x8e,0x5b,0xaf,0xf8,0xd3,0x3e,0x35,0x0a,0x69,0x3c,0xd5,0x79,0xb6,0xef,0xbe,0xf8,0x47,0xe5,0xc5,0x82,0xca,0x12,0xde,0x86,0x1d,0xbe,0xbe,0xe1,0xc3,0x37,0xdd,0xb9,0x3e,0x6b,0xbf .byte 0xe7,0x37,0xc2,0x6d,0xe5,0xa0,0x57,0xd8,0x5d,0x7e,0xff,0x9e,0x4b,0xb9,0x04,0x0c,0x3b,0x40,0x64,0xc8,0x50,0x68,0x7b,0x9d,0xbe,0x64,0x31,0x8f,0x8b,0x4d,0x74,0xa8,0x09,0xd3,0x36,0x0f,0x9e,0x56,0xdd,0xb7,0xee,0x81,0x88,0x06,0x12,0xf8,0xf6,0xca,0x7f,0x97,0x04,0xc8,0x23,0xea,0xc2,0x07,0x3e,0x22,0xca,0x2a,0xe2,0xf3,0x4f,0xfe .byte 0x42,0x09,0x78,0x13,0xe5,0x4e,0x91,0xc7,0x33,0x5d,0xf4,0xf4,0x07,0x85,0x7b,0xd4,0x79,0x31,0xd1,0xcb,0xac,0xc9,0x54,0x53,0x39,0x37,0x82,0x6b,0x54,0xbe,0x30,0x7b,0x7d,0x8d,0xe7,0xc6,0x04,0xc2,0xa9,0x27,0x27,0x0c,0x38,0xd5,0x6d,0x32,0x6f,0xe1,0xa0,0xe2,0x41,0x6e,0x11,0x1e,0xe7,0x32,0x9d,0xa2,0x3e,0x16,0xaa,0x96,0xd9,0xd1 .byte 0x78,0xde,0xd3,0x42,0xcf,0x27,0xba,0xea,0x82,0xdc,0xf8,0x32,0xa6,0xb9,0x19,0x6a,0x9a,0x0c,0x21,0xae,0xb2,0x0f,0x5c,0x5b,0x64,0x6f,0x29,0xcc,0x5c,0x59,0xc6,0x9d,0x42,0x9b,0x60,0xb0,0x64,0x5e,0xbe,0x22,0xa1,0x00,0xc1,0xc4,0x8f,0x5e,0x3c,0x2a,0x34,0x63,0x41,0x66,0xa7,0x38,0x50,0x57,0xd3,0xd4,0x88,0xb1,0x82,0xaf,0x48,0x29 .byte 0x48,0x6d,0x31,0x21,0x76,0x71,0xfb,0xea,0x95,0xdd,0xe0,0xd6,0xa4,0xf9,0x3f,0x09,0xf0,0x8f,0x9c,0xdc,0x67,0x8d,0x11,0xf6,0xad,0x00,0x93,0x71,0x5d,0x2b,0xe1,0xb6,0x7a,0x1a,0x80,0xbd,0x1f,0x01,0xe7,0xd5,0xbb,0x9a,0x42,0x75,0x29,0x83,0xe4,0x4f,0x54,0x67,0xbf,0x16,0xf5,0x6c,0x67,0x5b,0x0d,0xb6,0x24,0xb6,0x36,0xa5,0x9c,0xfe .byte 0xa5,0xfe,0x3e,0x72,0xf4,0x1b,0x3e,0x6d,0xd9,0xd7,0xe3,0xb4,0x44,0x36,0xc1,0x87,0x56,0xe2,0x77,0x61,0xea,0xc6,0xfe,0xf6,0xfb,0x48,0xd0,0xa4,0x99,0xf7,0x1a,0x85,0x4a,0xd1,0x6d,0xad,0x84,0xeb,0xd3,0x6d,0x1d,0xfd,0xaf,0x3f,0xde,0x3c,0x26,0xae,0x55,0xad,0x97,0x42,0xd5,0x6e,0xd7,0x7e,0x6b,0x42,0x7f,0x3a,0xa6,0xa8,0x27,0x0a .byte 0x68,0xbf,0x6e,0x41,0x51,0x1d,0x01,0x1a,0x93,0x50,0xc5,0xd8,0x4f,0xbf,0x42,0xca,0x37,0x07,0x01,0xe8,0xd1,0xf1,0x2a,0x3a,0xa2,0xc3,0x2a,0xc8,0x4b,0xde,0x66,0xf4,0x38,0xc5,0x36,0x4e,0xe9,0x3b,0xad,0xcd,0x5f,0xe1,0x40,0xc3,0xea,0x93,0x7d,0x45,0xfb,0xab,0xde,0x52,0x9b,0x96,0x90,0xfe,0x67,0xf5,0x43,0x6e,0x1a,0x3f,0xf8,0x47 .byte 0x68,0xf7,0x9e,0x08,0x70,0x45,0x4f,0xbc,0x5c,0x0b,0x4c,0x01,0xe8,0x96,0xfd,0xae,0xe4,0x41,0x75,0xe6,0xb0,0x66,0x68,0x2f,0x43,0xcd,0x55,0x20,0x99,0xd0,0x48,0x34,0x38,0x0b,0xb7,0x77,0x3a,0x4c,0x3e,0xb5,0x57,0xaa,0x11,0xbb,0xc9,0xcf,0x04,0x78,0xbb,0x49,0x41,0xee,0x6d,0x39,0xfa,0x09,0xe7,0x13,0xf3,0x23,0x41,0xdc,0x2e,0x93 .byte 0x65,0xc8,0xda,0x1b,0x18,0x99,0x07,0xaf,0x67,0x6e,0xcd,0xf1,0x66,0xab,0x1f,0x89,0x4b,0x8f,0x2c,0x09,0x2f,0x87,0xe1,0xd0,0xb0,0x6d,0x2c,0xa4,0x16,0x6c,0x9e,0x9f,0x8f,0x92,0x0e,0x21,0xf1,0x06,0x67,0x93,0x53,0x51,0xd4,0xcb,0xa2,0x12,0xf4,0xd4,0x87,0x2e,0x12,0xd5,0x98,0xba,0x95,0xe3,0xd3,0xbe,0x3f,0x20,0x39,0xe5,0xbb,0x9e .byte 0xaf,0xcc,0xa0,0x71,0xd8,0x8d,0x35,0x4b,0xf0,0x98,0x71,0x57,0x00,0xd3,0xb3,0xba,0xe3,0x04,0x24,0xb9,0xee,0x75,0x40,0x83,0xb4,0x11,0x0d,0x0d,0xf6,0xe0,0x10,0xf0,0x30,0x4c,0x45,0x71,0x5a,0x2e,0xd0,0xc8,0xcc,0xa9,0x5a,0xc8,0x10,0xb3,0x7c,0x07,0xf7,0x0b,0x8d,0x1e,0xe1,0xf1,0xa0,0x82,0xfd,0x1d,0xe4,0xad,0x8a,0x37,0xa3,0x81 .byte 0xff,0x14,0x12,0x74,0x42,0x81,0x7f,0x5c,0x89,0x47,0xcc,0x3c,0x27,0x92,0xf9,0xfa,0x9f,0xb8,0x6f,0xfe,0x36,0x23,0x1d,0x94,0xf3,0x43,0x09,0x82,0x87,0x46,0x92,0x8c,0x6a,0xbb,0x41,0x42,0xef,0x4d,0xa5,0x55,0x8a,0x48,0x13,0xd8,0x86,0x03,0x5b,0x48,0x3a,0x2b,0xcf,0xfd,0x35,0xb2,0xd4,0xf8,0x61,0x9c,0x0b,0x70,0x65,0x67,0x54,0x46 .byte 0x8d,0x2f,0xc6,0x97,0x12,0xff,0xfe,0xc9,0x23,0x64,0xcd,0xb7,0x14,0xa5,0x41,0x43,0xf3,0x0d,0x08,0xe4,0xf0,0x41,0x46,0x57,0x4b,0xdb,0x42,0xac,0xd5,0x0d,0xc8,0x33,0x84,0xa9,0x57,0x05,0x03,0xaf,0xbd,0x4f,0x48,0x5f,0xc2,0x3c,0xb9,0x07,0x79,0x47,0x2c,0x3c,0x71,0x1b,0x74,0xb9,0xc3,0x5a,0x65,0xc7,0xff,0x70,0xfb,0xc0,0x63,0x98 .byte 0x81,0x3d,0xd0,0x57,0x42,0x79,0xa2,0xdb,0xe6,0x2a,0xe0,0x00,0x4e,0xdf,0x3d,0x9d,0xc9,0x40,0x09,0x01,0x30,0x0d,0xa8,0xce,0x40,0x55,0x95,0xaf,0x01,0x48,0x74,0x16,0x99,0xa3,0xdf,0x63,0xa6,0x56,0xd8,0xe8,0x1e,0x8a,0xa7,0x7d,0x18,0xe6,0x37,0xe0,0xf8,0xd9,0xf4,0xb6,0x3f,0x92,0x7b,0xe1,0x17,0x57,0x3c,0x26,0x33,0x1d,0xf2,0x9e .byte 0xfc,0x26,0xd5,0x5a,0x34,0xcf,0xc4,0xaf,0x7b,0x11,0xe3,0x77,0x95,0x51,0x93,0x8a,0x56,0x68,0x80,0xf8,0x62,0x6c,0xc0,0x4e,0xe8,0x39,0x46,0x7f,0x56,0x27,0x26,0x25,0x2b,0x88,0xdb,0x38,0x62,0xa5,0xbc,0x96,0x16,0xed,0xd1,0xc7,0x0f,0x47,0xec,0x72,0x83,0xb0,0xbe,0xb0,0x46,0x54,0xab,0xa7,0x60,0xd4,0xb3,0x63,0xa9,0x3a,0x67,0x7f .byte 0x68,0x94,0x8a,0x54,0xf0,0x79,0x38,0x2a,0x67,0x7f,0x29,0xb4,0x7b,0xdf,0x0f,0x24,0xfb,0x21,0x0e,0xf5,0xc5,0x47,0x41,0x93,0xb5,0xe3,0x85,0xff,0x84,0x34,0x2b,0x12,0x73,0x5f,0x37,0x32,0xb6,0xce,0x73,0x27,0xe6,0x5a,0x6e,0x62,0xdd,0x7f,0x49,0x59,0xe2,0x3d,0x80,0xda,0xc3,0x29,0x70,0x40,0x70,0x25,0x8b,0xa5,0xc0,0xb0,0x18,0xa2 .byte 0xe0,0x5d,0xb6,0x52,0x14,0x8f,0xaa,0x17,0x68,0x80,0xa1,0x26,0xd2,0xbb,0xb4,0x2c,0x9a,0x41,0xfa,0x53,0x74,0xfb,0x7b,0x99,0x82,0xc1,0xff,0x77,0xa5,0xe0,0xea,0x64,0xb0,0x9c,0x48,0xce,0xb0,0x7a,0x05,0xa6,0x80,0x8d,0x92,0x92,0x47,0x1a,0x50,0xce,0x62,0xed,0xbd,0x41,0x59,0xe7,0xe6,0x3b,0xfb,0xe4,0xa4,0xb2,0xd4,0xb0,0x0b,0xe2 .byte 0x82,0xff,0x4d,0xb3,0xa6,0x43,0x4b,0xbf,0x7a,0xf7,0xfa,0x3c,0x38,0xd5,0xb2,0xf1,0xce,0x71,0x07,0xa4,0x6a,0xe3,0x7a,0x78,0xdf,0x56,0x1c,0xa1,0xf6,0x5d,0xeb,0xcc,0xb4,0xa7,0xca,0xaf,0x19,0xd0,0xb8,0x11,0x85,0xc7,0xf3,0x8a,0x23,0x6e,0xb8,0x92,0xd0,0xfc,0x61,0x9b,0x38,0x28,0x7b,0xa4,0xff,0x0d,0x32,0xf5,0xc5,0x31,0x5b,0x69 .byte 0xbd,0x6b,0xa5,0x46,0xd2,0x26,0x2c,0xe2,0x36,0xba,0x7c,0x42,0x8d,0xbe,0xfe,0x7c,0xbd,0x38,0x14,0x47,0x9a,0x6d,0xc7,0x20,0xda,0xd4,0x9d,0x05,0x31,0xdb,0xe7,0xda,0xac,0x27,0x14,0x7f,0xca,0x23,0xc1,0x5e,0x7e,0x26,0x04,0xf0,0xf3,0xb7,0xf7,0xdd,0xd4,0x05,0x7b,0xc5,0x7e,0x4a,0xeb,0x78,0x35,0x5e,0xb4,0xda,0xec,0xb5,0x46,0x96 .byte 0x63,0x56,0x17,0x55,0xfa,0xe8,0x11,0xd0,0xac,0xfd,0x5c,0xc8,0x99,0x2d,0xf7,0x4a,0x76,0xed,0x06,0xa2,0x77,0xfc,0x0f,0x13,0xe6,0xbc,0x79,0xae,0x15,0x23,0x17,0x0d,0xc3,0x01,0xee,0x36,0xe4,0x21,0x33,0x22,0x03,0x56,0x51,0x81,0xb4,0x5b,0x70,0xc7,0x6e,0xc4,0x54,0x93,0xcc,0x46,0x60,0x76,0x0e,0xc6,0x10,0x8c,0x52,0x6b,0x75,0x6a .byte 0xd9,0x27,0x04,0x0a,0x56,0x80,0x1b,0xfd,0x59,0x88,0xd5,0x03,0x99,0x01,0x5e,0xc6,0x2f,0x74,0xf0,0x90,0xae,0x10,0x9e,0x52,0x39,0xcd,0xa4,0x69,0x4d,0xb9,0x8d,0xbc,0xaa,0xf2,0xe4,0x25,0xdb,0x85,0x00,0x82,0x95,0xe3,0x8e,0x72,0xba,0xd0,0xf3,0xfe,0xb0,0x6e,0xb8,0xcd,0x2d,0x7c,0xae,0x95,0x62,0x1f,0xe9,0xf8,0x71,0x23,0xd5,0x3e .byte 0x33,0x30,0xb8,0x2d,0xf6,0xf5,0x45,0x1a,0x1b,0xf6,0xf1,0x6a,0x9a,0x7d,0xd4,0x76,0x27,0x6e,0x29,0x57,0xe6,0x90,0x36,0x83,0x4c,0x6b,0x00,0x77,0xf0,0x3d,0xb5,0xfe,0x19,0xb8,0x6f,0x76,0x58,0x7a,0x6c,0x2c,0xd0,0x22,0x5f,0x23,0x46,0x15,0xaf,0xbb,0xa0,0x40,0x37,0xba,0xb2,0x7f,0x6d,0xe2,0xa8,0x79,0x65,0x7a,0xb7,0xb0,0x51,0x04 .byte 0x77,0xec,0xed,0x58,0xd0,0x37,0x43,0xc4,0x95,0xe9,0xcb,0x82,0x8e,0x17,0xba,0x7a,0x8b,0xc0,0x71,0x6e,0x8a,0x5d,0x5d,0xe9,0xbd,0x28,0x0d,0xda,0xd9,0x4a,0xd6,0x71,0x58,0x3c,0x31,0x69,0x34,0x48,0x48,0xe1,0x50,0xc6,0x69,0x28,0x0d,0x24,0x45,0x15,0x13,0x1d,0x00,0xd6,0xd4,0x6b,0x05,0x56,0xf9,0xb7,0xf7,0xbc,0x26,0x37,0x51,0x65 .byte 0x91,0xf3,0xc6,0x50,0x44,0xce,0xa6,0x35,0xd9,0x0a,0xb2,0xd8,0xf3,0x6c,0x60,0x63,0x20,0xa3,0x18,0x34,0x83,0x1f,0x0d,0xc9,0x97,0xab,0x1f,0xb5,0x1f,0x6d,0x28,0xd4,0x84,0x1d,0xd4,0x08,0x45,0x83,0xa2,0x18,0x26,0x98,0xf6,0x1a,0x1c,0x9c,0xd9,0x79,0x92,0xef,0xdb,0x86,0x7b,0xb2,0x7b,0x30,0x64,0xeb,0x9d,0x7c,0xf0,0xf0,0x22,0x1e .byte 0x65,0x2d,0x22,0x11,0x0a,0x73,0x9b,0x82,0x21,0xb0,0x0f,0xa4,0xb4,0xdf,0x5d,0x72,0x61,0x56,0x60,0x27,0xab,0x84,0xe2,0xdc,0x63,0x74,0xd3,0xbf,0x45,0x93,0xc3,0x05,0x17,0x16,0x69,0xcd,0xfa,0xf7,0x5d,0xcb,0x29,0x04,0x88,0xf1,0x67,0x94,0xce,0x1d,0xa1,0x7f,0xc4,0xd1,0xca,0x09,0x39,0x54,0xf2,0x1d,0x32,0x99,0x49,0x89,0x95,0xe3 .byte 0x8b,0xc6,0x4a,0x41,0xbc,0x13,0x60,0xbc,0xff,0x2a,0xa0,0xc8,0xb2,0xc0,0x42,0x52,0x7a,0x8f,0x77,0xcb,0xc8,0x79,0xfd,0x0f,0x08,0x40,0xd6,0x39,0x1e,0xcd,0x87,0x12,0x09,0x6e,0x9b,0xc9,0x5f,0xfa,0x79,0xd1,0x83,0x63,0xcb,0xa6,0x7b,0x0c,0x4d,0x41,0x9f,0x30,0x70,0x35,0x48,0x0a,0x64,0xdd,0x4f,0x4f,0x28,0x19,0x8a,0x29,0xff,0xa2 .byte 0x5c,0xe9,0x1e,0x4c,0x68,0xdf,0x6a,0x3c,0x85,0x82,0x6b,0x0b,0x8a,0x63,0x6f,0x02,0x86,0x9f,0xe4,0x0a,0xf8,0xb5,0xae,0x65,0x64,0x55,0xb5,0x3f,0xb3,0xaa,0x0f,0xda,0x10,0xb0,0xeb,0xb5,0x5c,0x70,0x93,0xea,0x92,0x27,0x30,0x4e,0x73,0x4f,0x2d,0x25,0x88,0xa5,0x39,0x84,0xf7,0xf7,0x3a,0x4b,0x42,0x75,0xa1,0x87,0x75,0x9f,0xb0,0x08 .byte 0xda,0xb4,0x45,0x62,0x20,0x65,0x40,0x37,0x79,0xc9,0xdb,0x1d,0xbe,0x79,0x32,0x62,0x37,0x48,0x3c,0xc5,0xbf,0xb6,0xe4,0xb9,0x71,0xdb,0x88,0x16,0x2a,0xd3,0xec,0x50,0x94,0x52,0x65,0x41,0x84,0x94,0x58,0x6c,0xe5,0x95,0x44,0x3f,0x79,0x5e,0x71,0xbd,0x22,0x14,0x7d,0x8a,0x7d,0xd5,0x63,0x2d,0xce,0xfb,0x63,0xfc,0x0c,0xe5,0x99,0xd0 .byte 0x64,0xb5,0x00,0x80,0x26,0xa1,0xa1,0x40,0xa7,0x58,0xcc,0x32,0xc1,0xa5,0x27,0x16,0x9f,0x74,0xf2,0x01,0x59,0xf8,0x79,0x50,0x4f,0xef,0x0a,0xb9,0x79,0xf7,0x00,0xa4,0x9e,0x4f,0xa7,0x75,0x46,0x0e,0x25,0x5c,0x57,0x20,0xf2,0x08,0x57,0x82,0xc6,0xc3,0x57,0xdc,0xb4,0x65,0xdc,0x0f,0x17,0x17,0x36,0xef,0x49,0x05,0xf1,0x33,0xef,0x24 .byte 0x28,0xba,0xce,0xbc,0x4e,0xfd,0x0b,0xd5,0xce,0xe0,0xcb,0x38,0x16,0xcf,0x89,0xbb,0xc3,0x34,0xd0,0x1b,0xf0,0x4a,0x63,0x8a,0xcb,0x7c,0x46,0x7a,0xca,0x9e,0x9e,0xc9,0x03,0xa6,0x25,0xd1,0x22,0xeb,0xe7,0x1a,0x16,0x04,0x20,0x33,0x2a,0xf8,0xbc,0xca,0xb4,0xfc,0xff,0x95,0x31,0xdf,0xaa,0x0a,0xf7,0x60,0xf7,0x72,0x1f,0x53,0xd8,0x0a .byte 0x73,0xa6,0x27,0x55,0xdf,0x21,0xc8,0x41,0x1c,0x27,0xe3,0xe6,0x10,0x29,0xcf,0xd1,0x72,0x71,0x9b,0xcc,0xe6,0xf4,0x9f,0x2b,0xec,0x5d,0x6b,0xab,0xf6,0x09,0xff,0xd8,0x5e,0xf0,0x38,0x7a,0x67,0xb3,0xbe,0xa5,0x82,0xa5,0xc1,0x2e,0xa4,0xd6,0x42,0x07,0xc7,0x96,0x0d,0x11,0x2f,0x09,0x12,0x3c,0x81,0xaf,0xe6,0x52,0x31,0x2a,0x00,0x68 .byte 0x24,0x6e,0x28,0xc5,0x6e,0x3a,0x93,0x6f,0x01,0x3d,0xbc,0xc0,0xc0,0xca,0x92,0xb8,0x99,0x77,0xde,0x1a,0x38,0x24,0xdd,0xe4,0x1e,0x8c,0xf2,0x73,0xad,0x0b,0x79,0x8d,0xce,0xfa,0xf4,0x50,0xb6,0x64,0xab,0xf5,0x93,0x3a,0x73,0xba,0xe0,0x50,0x56,0x49,0xf3,0x08,0xf2,0x9d,0xec,0xe0,0x50,0xf1,0x26,0x08,0x2f,0x66,0x09,0xa1,0x45,0xb7 .byte 0x7b,0x3e,0xb4,0xfb,0xce,0xfe,0x69,0xfb,0x85,0x6d,0xc4,0x4b,0x15,0x87,0x8c,0x22,0x08,0x12,0x0f,0x46,0x9b,0xfa,0x32,0xae,0x7f,0xd1,0xa2,0x2c,0x65,0x0b,0xf0,0x62,0xa7,0x6a,0x8e,0xdc,0x10,0x56,0x86,0x84,0x14,0x77,0x6d,0x9f,0xd3,0x72,0x09,0xd9,0xdc,0x28,0xfe,0x15,0x9d,0xfb,0x10,0x0d,0xda,0x9e,0xbe,0x4b,0xcb,0xd9,0xf9,0x9c .byte 0xff,0xd5,0x19,0x18,0x6e,0x4f,0x33,0x21,0xfb,0x50,0x05,0x3c,0xbf,0x69,0xb2,0x91,0x07,0x5b,0xdb,0x2e,0x99,0x6c,0x20,0xc9,0x68,0x51,0x25,0x90,0xb2,0xcc,0x45,0x50,0x11,0x09,0xca,0xe2,0x19,0x04,0x5b,0x0c,0x99,0x34,0x7b,0x1e,0xc6,0x22,0xec,0xc4,0x5e,0x46,0x28,0xd2,0x08,0xf9,0x33,0xb4,0x9f,0xd0,0x56,0x52,0x97,0xa7,0x88,0xcf .byte 0x90,0xd7,0xe0,0xc4,0xcd,0xef,0xba,0x3f,0x56,0xb9,0x00,0x21,0x5b,0xc8,0xcd,0xc7,0x43,0x00,0xde,0x24,0xca,0x44,0xe5,0x9e,0xe5,0x7a,0x08,0xe5,0x7b,0x19,0x86,0x62,0xa1,0xff,0x8d,0x69,0xbf,0xea,0xee,0xae,0x7d,0x76,0x63,0x04,0xa7,0x56,0xb5,0x5d,0x08,0x98,0xd3,0x34,0x4c,0xa1,0x1f,0x26,0x41,0x8f,0xd5,0xd4,0x7f,0xb5,0x9d,0xce .byte 0x70,0xf1,0xbf,0xc5,0xa2,0x44,0x3c,0x30,0x89,0xbf,0xba,0x04,0xb5,0x0e,0x7e,0xe1,0x1d,0x1c,0xbb,0x29,0x83,0xa8,0x16,0x98,0x7d,0x8c,0xb4,0x03,0xb5,0x85,0x85,0x3a,0xcb,0xc1,0x54,0xf0,0xda,0xa7,0x89,0x81,0xe6,0xd1,0xe0,0x95,0xb6,0x9e,0x30,0xf8,0x2b,0xd1,0xbc,0x7d,0xcd,0xab,0xa2,0x1b,0xc3,0x8d,0x1d,0x2c,0x83,0xf9,0xe1,0xa7 .byte 0x92,0x94,0x9f,0x9e,0xdf,0xa7,0xe5,0x14,0x03,0x6a,0x6a,0x60,0x8b,0x01,0x02,0xae,0xea,0x1e,0x05,0xce,0xcd,0x2b,0x29,0xca,0x0f,0x94,0xf8,0xbd,0xc8,0x55,0x6d,0x4c,0x95,0x26,0x04,0x4f,0xf8,0x75,0xcb,0x43,0xab,0x76,0x0c,0x88,0x10,0x56,0xdf,0x66,0x16,0xcc,0xf1,0x1b,0x13,0xa9,0x93,0x9c,0xc4,0x63,0xac,0x44,0xf4,0x13,0xf3,0xdb .byte 0xcf,0xff,0xef,0x9d,0x89,0x9f,0xef,0x5b,0xa4,0x84,0xb4,0x0d,0x92,0x3b,0x76,0x03,0x3f,0x1d,0xdd,0xb1,0x5f,0x24,0xd5,0xa9,0xa5,0xdc,0x44,0x3a,0x3b,0xef,0xf2,0x8b,0x27,0xfa,0x83,0xdc,0x2d,0x4c,0xd8,0xb0,0xf8,0x7f,0x1e,0xea,0x3f,0x90,0x81,0xe1,0xc0,0x97,0x7a,0xfc,0xe1,0x00,0xf3,0x11,0xfc,0xc1,0xc2,0xa7,0x1a,0xf0,0x2c,0x41 .byte 0x49,0xc9,0x65,0xbe,0xe1,0x0f,0x54,0xdf,0xd5,0x39,0xe8,0x7a,0x48,0x81,0xdc,0x21,0x8f,0x8f,0xd2,0x16,0x6f,0xf4,0xfa,0x43,0xdd,0xfb,0x72,0xfb,0x5a,0xd7,0x62,0x0b,0x3e,0x92,0x82,0x2d,0x27,0x04,0x7d,0x5a,0x48,0x60,0x19,0x15,0x01,0x27,0x9d,0x05,0xf2,0x6c,0xaa,0x0c,0x7c,0x79,0x14,0xdc,0x3e,0x75,0x28,0xd2,0x9d,0x3b,0x28,0xc2 .byte 0x35,0x6c,0x73,0x4c,0x77,0x5f,0x36,0x7e,0xf8,0x3e,0xaf,0x1d,0x55,0x80,0x29,0x14,0xa4,0x48,0x80,0x82,0xb2,0x82,0xb9,0x3e,0x02,0xd6,0xd1,0xae,0x6a,0x0d,0x3d,0xfd,0xc1,0x57,0xf4,0xe6,0x90,0x8b,0x57,0x0d,0xde,0xd8,0xb7,0x15,0x71,0x82,0xe9,0x18,0x76,0x23,0xcd,0x93,0x41,0x17,0x83,0x5e,0xcd,0x6a,0x31,0x52,0x8d,0xff,0xb1,0x98 .byte 0x6d,0x47,0x96,0x6f,0x57,0x99,0xd7,0xe8,0x70,0xd2,0x68,0x8d,0x3e,0x26,0xfd,0x86,0x5c,0x64,0xb8,0x55,0x9b,0x4a,0xcf,0x75,0x39,0x97,0x73,0x77,0x30,0x06,0xea,0x55,0x2a,0x4f,0x3c,0x78,0x98,0x85,0x37,0x81,0x5b,0xc6,0x2c,0x90,0xaf,0xb3,0xc1,0xd5,0xf1,0x81,0xce,0x7d,0xe7,0xa5,0xee,0x74,0x3f,0x1e,0xec,0x2f,0xca,0x36,0x7c,0xd2 .byte 0x0f,0xce,0x9f,0x81,0x45,0x26,0x05,0x0e,0xeb,0xfc,0x5d,0x81,0x6d,0x05,0x22,0x75,0xdf,0x45,0x38,0x1c,0x33,0x27,0x48,0xe3,0x7c,0x18,0x9d,0x6d,0x39,0x53,0x75,0x1b,0x8a,0xcf,0xc1,0xf6,0x95,0xa7,0x30,0x43,0x71,0x62,0xe1,0x23,0xd5,0xb1,0xf4,0x5c,0xda,0x71,0x26,0x47,0xd2,0x76,0xec,0x11,0x3e,0xa5,0x00,0xcd,0x85,0x0e,0x1a,0xa7 .byte 0xe5,0x58,0x8e,0x67,0xc8,0x73,0x1d,0xd0,0xd9,0x0d,0x43,0x04,0x41,0x4a,0xde,0xbb,0x1a,0x75,0x0d,0xb3,0xa3,0xa2,0x20,0xf2,0x14,0xf2,0xe0,0x22,0xc0,0xec,0xd3,0x7b,0x8e,0x98,0x4e,0xf5,0xe9,0x88,0x64,0x6d,0xd6,0xeb,0xf9,0xb7,0xa1,0xd3,0x9f,0x3c,0xdd,0xdb,0x91,0xe0,0x92,0x52,0x3b,0x07,0xa4,0x40,0x47,0x04,0x11,0x95,0xdd,0xc9 .byte 0x33,0x24,0xe2,0xd5,0xa5,0x99,0xd2,0x0b,0xb5,0xb7,0xb7,0x59,0x24,0x2c,0x3e,0xff,0xc0,0xbc,0x11,0x55,0xf6,0x27,0x8e,0xd4,0xa8,0x23,0xf0,0x68,0x0b,0xd7,0x15,0xb7,0xe4,0x7d,0xc3,0x5c,0x3d,0xef,0x95,0xb4,0xad,0xe9,0x14,0x63,0xf7,0x3a,0x55,0x5f,0x6a,0x10,0x4a,0x3e,0x27,0xd1,0x7c,0xfc,0x4a,0x1a,0xab,0x2f,0x8f,0x4d,0x28,0x4b .byte 0xd4,0xe1,0x0b,0xeb,0xa1,0x85,0xea,0x68,0xd5,0x08,0x56,0x79,0x5f,0xbd,0x2a,0x7e,0xbf,0x44,0x05,0x05,0x10,0xf3,0x22,0x58,0xa5,0x0c,0x38,0x81,0xa4,0x95,0x19,0x51,0xf7,0x7c,0x4c,0x3f,0xcf,0x55,0xf7,0x90,0xbc,0xc5,0xec,0xd0,0x6a,0x22,0xf8,0xc9,0x1e,0x62,0x17,0x86,0x24,0x04,0x5e,0x50,0xb2,0xb5,0x94,0x18,0x48,0x96,0xb8,0x21 .byte 0x5e,0x63,0xc9,0xd7,0x29,0xc6,0x74,0xf5,0x28,0x36,0xa1,0x56,0x45,0xd6,0x60,0x4d,0x84,0xd5,0x57,0xc2,0xb6,0x9d,0xbd,0x3f,0xb4,0xac,0xf1,0x53,0x1b,0x79,0x7d,0x73,0xf5,0x61,0x5e,0x2b,0x10,0x97,0x88,0xcc,0x7d,0xe4,0xa6,0x38,0x46,0x1c,0xc0,0xa8,0x58,0x1f,0x7b,0xf4,0xf5,0x52,0x8f,0x58,0x9a,0x17,0x49,0x5a,0xd2,0x38,0x3a,0xfd .byte 0x66,0xcb,0xf5,0x4b,0x28,0x8b,0x8d,0x7c,0xb2,0x42,0x8e,0xa5,0x2a,0x08,0x72,0xfc,0x9b,0x85,0x0d,0xe6,0x85,0xf8,0x76,0xe2,0x73,0x6a,0x53,0xc2,0x3a,0x79,0x97,0x31,0xa9,0x52,0x70,0x75,0x3a,0xe3,0xfe,0xe5,0xbc,0x95,0x8e,0xf0,0xc9,0x97,0x17,0xdc,0x26,0x78,0x24,0xd1,0xe7,0x87,0x29,0x75,0x8e,0xd8,0x3f,0x56,0xde,0x46,0x97,0x7c .byte 0xcd,0xd4,0x01,0x57,0x6f,0xb5,0xd7,0xe7,0xbb,0xd1,0x0d,0x6f,0x0e,0x1b,0xf1,0x34,0x2a,0xcf,0x93,0x79,0x4d,0x47,0x0b,0xd4,0x69,0x77,0xc6,0x72,0x78,0x65,0xc8,0xec,0xb1,0x21,0x8a,0xfd,0x71,0xa9,0xc5,0xd7,0x89,0xa9,0xb0,0x9c,0xed,0xb8,0xc6,0x99,0x57,0xe0,0x13,0x6f,0x0e,0x85,0xea,0xc8,0x08,0xa7,0x38,0xdf,0x87,0xb3,0x46,0x80 .byte 0xfa,0xc6,0xe8,0x6a,0x45,0x71,0x13,0x20,0xd7,0xeb,0x6c,0x3a,0x43,0x56,0x36,0x1f,0xe2,0xf4,0x65,0x2f,0x04,0x7e,0x24,0x24,0xfe,0xe0,0x8f,0x1e,0x96,0x6e,0x01,0xfe,0x4e,0x11,0x9c,0x07,0x3e,0x5a,0x29,0x04,0x21,0x6a,0xe5,0x74,0x0b,0x93,0xa3,0xb2,0xe2,0x3e,0x0b,0x39,0x97,0xf6,0xdb,0x3d,0xb8,0x0e,0x8e,0xe2,0xd9,0xf0,0xbe,0x56 .byte 0x6f,0x6c,0xb2,0x49,0xe0,0xe0,0xc4,0x02,0xe7,0xbc,0x40,0x03,0x3d,0x5d,0xd9,0x1b,0x06,0x08,0x7b,0x0c,0x8e,0x78,0x6d,0x17,0x06,0x87,0x46,0x1e,0xfd,0xcd,0xa3,0x83,0xdf,0x67,0x25,0x54,0x2a,0xc2,0xf4,0xf9,0x73,0xf5,0xd8,0xa5,0xe5,0xc0,0xd6,0x39,0x04,0x5b,0x0e,0xd1,0x71,0x47,0xed,0x7d,0x34,0x76,0x62,0x9a,0x7d,0x6f,0x26,0xba .byte 0x69,0x0b,0x0e,0xb2,0xbe,0xad,0xa9,0x5f,0xdd,0xe8,0x05,0xbe,0xb5,0xa5,0x2e,0xba,0x2f,0x27,0x17,0x81,0xdb,0x9c,0x38,0xd2,0xf7,0xcd,0x77,0x75,0x41,0xda,0x65,0xd1,0xf6,0x0d,0xaa,0xc4,0x43,0x69,0x2a,0xd8,0x38,0x89,0x1b,0x77,0x16,0x26,0xa7,0xcd,0x46,0x68,0x7e,0x2a,0xbc,0xbb,0x8a,0xad,0xc0,0x7c,0xd8,0x14,0xc7,0x0f,0x76,0x97 .byte 0x33,0x0e,0x30,0xd8,0x10,0x7f,0xd1,0x38,0x5a,0x86,0xf2,0xfa,0x13,0x7a,0xd3,0x04,0x35,0x92,0x0f,0xc7,0x85,0x91,0xaa,0xe1,0xd2,0xa5,0xde,0x9a,0x0a,0xf2,0x77,0x99,0x94,0x5e,0x9d,0x67,0xf3,0x0d,0xb8,0x39,0x70,0x96,0xea,0x6c,0x82,0x59,0xe1,0x4c,0xca,0xf7,0x8c,0x26,0x42,0x1d,0x06,0xd9,0x26,0x32,0x76,0xde,0xf2,0xd2,0x8d,0xb6 .byte 0x6f,0x58,0x57,0x0e,0xcc,0x46,0x68,0x30,0x37,0xab,0x27,0xd9,0x84,0x52,0x7f,0x67,0x64,0xaa,0xa6,0x90,0x1e,0x36,0xbe,0x70,0x35,0xd3,0x3e,0xf6,0x4e,0xee,0xa1,0xa0,0x44,0x7c,0xb0,0x22,0x75,0x1f,0x83,0x67,0xc9,0x75,0x78,0x4c,0xe6,0x6c,0x08,0xab,0x01,0x74,0xfc,0x4c,0xff,0x4e,0x1c,0x9d,0xdd,0x24,0x6c,0x4f,0xad,0x8a,0xa0,0xe3 .byte 0xb4,0x9b,0x2f,0xfa,0xd5,0x2b,0xa0,0xb2,0x32,0xa7,0x98,0x35,0xa0,0x58,0x26,0x22,0x4a,0x63,0xf5,0x3c,0x54,0x2c,0xbc,0xa6,0x7e,0xdb,0x1c,0xf1,0xd4,0x35,0xf6,0xb7,0x62,0xd4,0x84,0xbe,0xb8,0x59,0x32,0x33,0x8a,0x17,0xb9,0x59,0xa0,0x62,0xa7,0x00,0xfb,0x72,0xc4,0xe1,0x1e,0x6c,0xec,0x64,0xea,0x97,0xeb,0xf7,0x24,0x5f,0xb2,0xdb .byte 0xfc,0x28,0x35,0x81,0x2b,0x5a,0x73,0xd1,0x0b,0x4b,0x68,0x5d,0xa2,0x55,0x41,0xb1,0x9e,0xdf,0x35,0xed,0x7e,0x39,0xd7,0xe6,0x45,0xe8,0xe2,0x4d,0xcd,0x82,0x26,0x72,0x0a,0xa6,0x4f,0x7b,0x27,0x55,0xc1,0x7c,0xee,0x83,0x2b,0x50,0x70,0xfa,0x6b,0xf5,0x2f,0x13,0xc1,0xf7,0xa4,0x79,0xac,0x1e,0x46,0x45,0x24,0xb2,0x61,0x58,0xd6,0xea .byte 0x11,0x72,0x83,0xa8,0x76,0x62,0x49,0x42,0x1c,0x11,0x18,0x9e,0x32,0x20,0x4b,0xc1,0x09,0xe4,0x62,0x8e,0x19,0xc7,0xda,0xed,0x57,0x12,0x20,0x59,0x53,0xa0,0x7b,0x0e,0x1f,0xc5,0x7d,0x43,0x82,0xd8,0xbd,0x33,0x09,0xb4,0x33,0x9e,0x73,0xf7,0x8c,0xea,0x34,0xe4,0x84,0x9a,0x67,0x15,0x80,0x9d,0x3d,0x77,0x30,0x9f,0xc4,0xd7,0x08,0x64 .byte 0xce,0x90,0xd5,0x81,0xda,0xbd,0x6d,0x4d,0x0c,0x57,0x73,0xba,0x90,0xa7,0x28,0x10,0xc1,0x53,0xf3,0xfe,0x94,0x43,0x90,0xaf,0xc2,0xd7,0xdc,0xe9,0x02,0xe2,0xe4,0x67,0x98,0xa7,0x5b,0x5e,0xe2,0x40,0xcd,0x0d,0xc7,0xbb,0x46,0xab,0xd2,0x75,0x24,0x47,0x85,0xa3,0x34,0x03,0x5c,0xc6,0x7c,0xb4,0xbd,0x07,0xc0,0xa7,0x60,0xb5,0xe7,0x45 .byte 0xac,0xb7,0x6a,0xfe,0x56,0x5a,0x08,0xc0,0x86,0xf8,0x14,0x59,0xee,0x0e,0x68,0x8f,0xa1,0xd5,0x67,0x4d,0x08,0x19,0xc8,0x29,0xcf,0x72,0xf5,0x9a,0x9a,0xf3,0x0a,0xb7,0xeb,0x31,0xd0,0x6b,0x9f,0xc3,0x26,0x58,0x9e,0x69,0x9b,0x60,0x0b,0x7e,0x43,0x0b,0xed,0x7b,0xd2,0xc8,0x6d,0x22,0xf1,0xfb,0xc9,0x82,0x50,0xec,0xf0,0xb3,0x40,0x02 .byte 0xfd,0xc8,0xac,0x46,0x5c,0x49,0x17,0x98,0x8b,0x07,0x7e,0x9c,0x6a,0xa4,0xcf,0x46,0x4d,0x01,0x4a,0x9f,0x7a,0x39,0x81,0xf7,0xef,0x7f,0x59,0x35,0xd3,0x1a,0x71,0x1f,0x84,0xa6,0xd0,0x1b,0x47,0x9c,0xea,0x1a,0x29,0x46,0xaa,0xe3,0xa3,0xfc,0xfd,0xd2,0x4d,0xda,0x10,0x5b,0xdc,0x56,0x81,0x31,0x4d,0x01,0xb1,0x5e,0x39,0x77,0x8d,0x78 .byte 0x5b,0x61,0xb8,0xc2,0xd9,0xe4,0xe0,0xab,0xe8,0x3e,0xb7,0x0f,0xc5,0xf8,0xad,0x2a,0xe5,0x1a,0xa3,0x66,0x69,0x78,0x66,0x4b,0xc2,0xe3,0x44,0x04,0xe8,0x51,0x59,0x2b,0xbf,0x19,0xe9,0x36,0x13,0xfd,0x1b,0x1c,0x45,0x46,0x65,0x61,0xcb,0x9e,0x98,0x03,0x40,0xf7,0xc1,0x76,0xf4,0x47,0xd3,0x69,0xef,0x63,0x36,0x0c,0x30,0x91,0xaf,0x1c .byte 0x69,0xd5,0x93,0x41,0x8a,0x47,0x61,0xe9,0x31,0xaa,0x12,0xa4,0x99,0xa9,0x0c,0x7c,0xce,0x72,0x7d,0x9b,0xc3,0xe4,0x2d,0xb2,0x5a,0xce,0xae,0x8e,0xa1,0x54,0x75,0x20,0xed,0x9b,0xd1,0x5e,0x5e,0x55,0x9c,0x02,0x5d,0x70,0x3c,0x63,0xf4,0x60,0xb3,0x3e,0x0a,0x4d,0x29,0xf4,0x1f,0x5b,0x08,0xce,0xa5,0x06,0xdc,0xb8,0x5f,0x4d,0x6b,0xef .byte 0x60,0xda,0xb7,0x70,0xa8,0xcd,0x2a,0x77,0xaa,0xf2,0x0f,0x77,0xb1,0xec,0xc8,0xe9,0xc0,0xed,0xb9,0x26,0xa8,0xfe,0x5e,0x60,0x1b,0x8d,0xea,0x67,0x38,0x3d,0xa5,0x5f,0xf0,0x4d,0x9d,0x75,0xc8,0xb2,0x9e,0x40,0xf8,0x7d,0x25,0xc0,0xcc,0x89,0x94,0x93,0xd6,0x3e,0x3b,0xf6,0x58,0xbf,0x5b,0xf9,0x6f,0x64,0x69,0x97,0xf4,0x9f,0xf3,0xc5 .byte 0x98,0xe6,0xb2,0x9c,0x1d,0xb8,0xd3,0x6d,0xdb,0xf4,0x49,0x75,0x67,0x0b,0x1f,0xac,0x89,0x6c,0x16,0xc1,0x4e,0xfe,0x8f,0x8b,0x61,0x4e,0x99,0x04,0x86,0xea,0x77,0x63,0x38,0x27,0x92,0xe0,0xcd,0xdd,0x33,0x7c,0xaf,0x41,0xce,0x37,0x21,0xd9,0x37,0x08,0x38,0x55,0xfc,0x04,0x2a,0x67,0x49,0xd0,0x6a,0x71,0xac,0xc8,0x95,0x01,0xb3,0x49 .byte 0x7c,0x19,0x05,0xdb,0xd9,0xc3,0xe6,0x81,0x3e,0x0e,0x79,0x24,0xc3,0x3d,0x95,0x6a,0x1b,0xb4,0x38,0xfa,0xcb,0x16,0xd3,0x0c,0x00,0xf7,0x85,0x4c,0x38,0x4a,0x50,0xe1,0x64,0x45,0x38,0x54,0xfa,0x85,0x04,0xe6,0x5a,0x02,0x80,0x6a,0x04,0xc2,0x28,0xb8,0x18,0xa1,0x1d,0xa1,0x88,0x18,0x30,0x8b,0x4c,0xfa,0xda,0xdd,0xe0,0x3f,0xae,0x81 .byte 0xaf,0xa6,0xcd,0xc3,0xe9,0x33,0x46,0xd3,0x17,0xab,0x74,0xf6,0xee,0x24,0xa7,0x8c,0xfa,0x5d,0x18,0xe0,0xa7,0x23,0x06,0x71,0x87,0x26,0x6a,0xd1,0xc7,0x1f,0x53,0xa8,0x53,0x7a,0xdb,0x83,0xfe,0x77,0x9c,0x68,0x84,0xe4,0xbf,0xa7,0x87,0x1e,0xd1,0xd7,0x44,0xb1,0x83,0x5b,0x20,0x69,0xe3,0xc9,0x8a,0x97,0x53,0x22,0x71,0xef,0x4d,0xb4 .byte 0x52,0x64,0x89,0x05,0x14,0x1d,0x00,0xd2,0xc4,0x89,0x46,0xc1,0xf6,0x6f,0x08,0x10,0xe8,0x51,0x7c,0xc8,0xc0,0xaa,0xc3,0xd8,0xd4,0x0d,0xfa,0x7d,0x26,0xa4,0xc8,0x33,0x32,0x62,0x64,0x01,0xa9,0x72,0x86,0x62,0xe2,0xbf,0xb3,0x71,0xbf,0x6d,0x91,0xc1,0x96,0xb1,0x57,0x4b,0x7b,0x87,0xe8,0xa2,0x58,0xc3,0x77,0x7b,0x75,0x60,0xa1,0xcf .byte 0xe2,0xf2,0x1f,0x48,0x22,0xd0,0x35,0x91,0x68,0x16,0xdd,0x71,0x2b,0xa5,0x2f,0xa6,0x54,0x0c,0xe1,0x8e,0x8c,0xb9,0x3f,0x94,0x48,0xc7,0x2f,0xfd,0xbe,0x4a,0x29,0x8b,0xdc,0x1a,0xef,0x95,0x1e,0xdf,0xa0,0x11,0x7e,0x74,0x22,0xf1,0xaf,0x6a,0xdd,0x65,0x0f,0x38,0x87,0x83,0x9b,0x03,0x6b,0xa0,0x9d,0xbe,0x94,0x1d,0x0b,0x97,0x1f,0xcd .byte 0x0e,0x77,0xcf,0x56,0x2e,0xd2,0xda,0xd1,0xf5,0xc7,0xc3,0x17,0x43,0xee,0x42,0xb3,0xda,0x9c,0xf5,0x39,0xe1,0x01,0x55,0x4a,0x3f,0x28,0xdb,0x5f,0x80,0x32,0xbd,0xc8,0xba,0x51,0xf6,0xc5,0x56,0x74,0x9f,0xa6,0x28,0x14,0xcc,0x6c,0x81,0xd6,0xfe,0x31,0xf6,0xae,0xeb,0x19,0x70,0xfa,0xb5,0x77,0xf9,0xfd,0x43,0x49,0xd7,0x83,0x57,0xe8 .byte 0x81,0x03,0xa2,0x91,0x15,0xfd,0x83,0x72,0xd1,0x5a,0xdb,0xcb,0x09,0xe3,0x63,0x36,0xbb,0x64,0x47,0x70,0x65,0xf1,0x3e,0x7f,0x93,0xfb,0x00,0x47,0x64,0x1e,0xe0,0xad,0x49,0xc8,0x4d,0x95,0xb8,0xc7,0x58,0x00,0xd1,0x92,0x84,0x59,0x79,0x45,0x6f,0xfa,0x8c,0x2a,0xf8,0x25,0x77,0xa6,0x03,0x6c,0xa2,0xd6,0xfb,0xab,0xe5,0xcf,0x72,0xdd .byte 0x2c,0xa5,0xcc,0x09,0x74,0xfa,0x18,0xe5,0x02,0xaf,0x05,0x2b,0xc1,0xb3,0x99,0x50,0xfb,0x6c,0xf4,0x35,0x6e,0xd2,0x50,0x6a,0xb2,0xa0,0x05,0x5c,0x82,0x71,0x58,0x05,0x71,0x99,0x46,0xd9,0xfd,0x1c,0xdf,0x1f,0x1f,0x8c,0xf1,0x7a,0xe1,0x92,0x08,0x52,0x4a,0x1b,0x52,0x61,0x2c,0xd0,0x2d,0xb1,0x6c,0x48,0x23,0x7f,0x0f,0x45,0x98,0x04 .byte 0xbb,0x91,0x40,0x28,0x3c,0xf9,0x01,0xd9,0xdf,0xd9,0x0c,0x31,0xec,0x58,0xe1,0xd0,0x55,0xcb,0x4a,0xb2,0xfe,0x09,0x97,0xaa,0xbe,0x01,0xd9,0xe9,0xf3,0x76,0x48,0xd9,0x75,0x0d,0xba,0x54,0xaa,0x2e,0x99,0x0a,0xbf,0x4c,0x5b,0xae,0xf0,0x27,0xd2,0xe5,0x1c,0x9d,0x74,0xf9,0x7f,0xc6,0x88,0x7c,0xa4,0x0f,0x96,0x2c,0xe7,0xc5,0xfd,0x26 .byte 0x59,0xe5,0xcc,0x86,0xb2,0x93,0xae,0x17,0x59,0x39,0x3b,0xa6,0xf0,0xff,0x07,0xa0,0x6e,0xff,0x39,0x01,0x71,0x50,0x5f,0x4f,0x12,0x13,0xcf,0x44,0x85,0xe6,0xd8,0x89,0x4f,0xa6,0x21,0xb2,0x32,0xbd,0x37,0x9f,0x1d,0x35,0x9d,0x30,0x49,0x7d,0x29,0x60,0x07,0xdd,0x06,0x05,0x21,0x44,0x22,0xaf,0x1d,0xc9,0xc7,0x31,0x60,0x88,0x2d,0x4d .byte 0x71,0x88,0x4d,0x5b,0x7c,0xc6,0x68,0x09,0x54,0x01,0xc0,0xe9,0xda,0xa0,0x08,0x75,0x6f,0x3c,0xdb,0xf7,0xa4,0x1c,0x9d,0x8d,0x49,0xb6,0x30,0x38,0x22,0xe6,0x08,0xf9,0x00,0xa5,0xaa,0xf2,0x83,0xd3,0xb1,0x37,0xdb,0x2a,0xd4,0x65,0x94,0x98,0xd6,0xe1,0xc9,0xf6,0xc0,0xd1,0xbe,0x28,0x92,0x6b,0x2f,0x13,0x8d,0xc6,0x62,0x82,0xf2,0x5a .byte 0xe1,0x62,0x74,0x08,0x72,0x28,0xa4,0xca,0x83,0x84,0x42,0xca,0xc6,0x17,0xf4,0xa7,0xf5,0x4e,0x57,0x9e,0x50,0x9c,0x9b,0x96,0x88,0x28,0x39,0xb1,0x1d,0x71,0x6d,0x6a,0x41,0x1c,0x63,0x85,0xa0,0xf6,0x38,0x3b,0x74,0x5b,0xe9,0xfa,0x67,0x63,0xd2,0x54,0x1c,0x22,0x12,0x4c,0x1d,0x56,0xf2,0x29,0x55,0xfb,0x4a,0x18,0x50,0xb3,0x2f,0xa7 .byte 0x0f,0x53,0x9b,0x2b,0x0e,0xae,0xfc,0xda,0xfc,0xa3,0x98,0x47,0x50,0x38,0x24,0xc0,0x3d,0xd6,0x4b,0x44,0x4f,0x9e,0xdb,0x0a,0xaf,0xc7,0x2c,0xc2,0x5e,0x7e,0x97,0x21,0xa5,0x62,0x07,0x5f,0x97,0xe9,0x95,0x41,0x88,0x13,0xe9,0x53,0x6a,0xd6,0x59,0x8b,0x69,0xe2,0x02,0x1b,0x73,0x5d,0xb8,0xa6,0xd3,0x9d,0x76,0x6c,0x86,0xc5,0x73,0xf0 .byte 0x45,0x68,0x0c,0xc1,0x5b,0x38,0x3d,0x64,0x92,0xfc,0x1a,0x2a,0x28,0x85,0x2b,0xfc,0x6a,0xf0,0x66,0x6a,0x8c,0xdc,0x7c,0xd9,0x65,0xe0,0x68,0xa2,0x36,0x0e,0x5f,0xe8,0xbe,0x16,0x6b,0x72,0xa2,0xcc,0x3e,0xef,0x1f,0xbe,0x98,0x0f,0x49,0x22,0x6a,0x5e,0xbc,0x88,0x2f,0xd6,0x54,0x7f,0xff,0xb9,0xab,0xc9,0x68,0xd7,0xd5,0x2f,0xb1,0x6b .byte 0x65,0x26,0x7c,0xd7,0x97,0x2c,0x6a,0x15,0x15,0x88,0x95,0x54,0x55,0x7b,0x56,0xab,0x16,0x6b,0xc7,0xa9,0xa3,0xbc,0xf2,0xaa,0xc3,0xff,0x11,0xb5,0xee,0x55,0x61,0x34,0x50,0x0c,0xe1,0xec,0xa6,0x5d,0x03,0x95,0x7d,0xca,0x00,0x80,0x02,0x44,0x8a,0x00,0x9b,0x16,0x02,0x7c,0x35,0xed,0xae,0x62,0xdd,0x20,0xfc,0x99,0x82,0x58,0x85,0x94 .byte 0x7b,0x2b,0xfb,0x7b,0xdf,0x99,0x69,0x7f,0x7e,0xf0,0x96,0xc5,0x48,0x27,0x90,0x32,0x88,0x96,0x89,0x95,0x9c,0x45,0x0e,0x90,0x94,0x54,0xa6,0x94,0x36,0xf7,0xc1,0x01,0xee,0xcb,0xfb,0x4e,0x62,0xd0,0x34,0x95,0xd6,0xb5,0xa4,0xa6,0xae,0x2b,0x0e,0x1f,0x03,0x87,0x6c,0x54,0x77,0x7d,0xf7,0x22,0xd1,0x63,0xb2,0x57,0x05,0xd1,0x8d,0xaf .byte 0x35,0xca,0x23,0x8d,0x66,0x79,0xa0,0xed,0x9a,0x4a,0xbc,0xd8,0x20,0xe6,0x44,0x3e,0x6f,0x1d,0xf7,0xf3,0x43,0x83,0x5b,0xb6,0xdf,0x43,0x12,0xef,0x5c,0xfa,0xd5,0x8d,0x94,0x48,0xf8,0x2b,0x9b,0xfe,0xd0,0xab,0x88,0xa4,0x7d,0xa7,0xed,0x1d,0x53,0xd1,0x28,0x64,0x92,0xca,0x21,0x47,0x8b,0x2d,0xcd,0xf2,0xfb,0x1a,0xd1,0x6b,0x10,0x38 .byte 0x8b,0x23,0xa5,0x85,0x0c,0x8f,0x2d,0x8f,0xcd,0x64,0x21,0x2d,0xc9,0x69,0xad,0xe3,0x17,0xf7,0x36,0x94,0x13,0xd1,0x8c,0x66,0x2e,0x72,0xc1,0x12,0x0b,0x52,0xce,0xb5,0x1c,0x5e,0x93,0xb5,0x80,0x5d,0x95,0xe2,0x0c,0x2f,0x08,0x92,0x47,0xb3,0x90,0x19,0x44,0x8b,0x9b,0x3b,0xb7,0xa2,0xaf,0xf7,0xfa,0x6e,0x40,0xa4,0x50,0x11,0x87,0x15 .byte 0x75,0x75,0xad,0x55,0xa9,0x34,0xd0,0x1f,0x0f,0x76,0x79,0x55,0x5b,0x1a,0x22,0x3c,0x20,0x50,0x70,0xeb,0x2f,0x9c,0xd2,0xb0,0x16,0xd3,0xa5,0xdd,0xec,0xbf,0x69,0x29,0xdf,0xcf,0xa2,0x2c,0x73,0xa8,0xd2,0xe9,0x99,0x81,0x19,0x07,0x0a,0x3e,0x34,0x90,0x34,0x5b,0x7b,0xd6,0x5b,0x03,0xc4,0xcc,0x1a,0x68,0xb4,0x6a,0xf7,0x13,0x00,0x6c .byte 0xbe,0xbd,0x45,0xf1,0x70,0x29,0xc9,0x59,0xfb,0x88,0xb3,0x60,0x55,0x65,0xd1,0x97,0x24,0xfe,0x5d,0xb3,0x7a,0x13,0x2a,0x32,0xe6,0x68,0x74,0x47,0x8f,0x90,0x85,0x20,0x10,0x88,0x78,0x7d,0xb5,0x20,0x21,0x05,0x8b,0xd2,0xc6,0x1e,0xbe,0xad,0xd5,0xba,0x44,0x48,0xee,0xa5,0xcd,0x9b,0xf6,0x91,0xce,0x73,0x5d,0x3d,0xa7,0x9b,0xa7,0x7f .byte 0xbe,0xa7,0x8c,0xd1,0x76,0x23,0xa4,0xab,0xc0,0x3f,0x3b,0x35,0xce,0x3f,0xe5,0x91,0x4a,0x93,0x21,0xcd,0x74,0xea,0xc5,0x0b,0x4d,0x21,0xd0,0xf6,0x8d,0x51,0xfe,0x8d,0x7d,0xab,0xd1,0x61,0x8b,0xda,0x8b,0x66,0x58,0x52,0xc1,0x63,0xc4,0xca,0x41,0x72,0x87,0x54,0x69,0x5d,0xa8,0xcf,0x38,0x5f,0xf8,0x52,0x99,0x5f,0x5e,0x4e,0x01,0x4d .byte 0xdf,0x53,0xe3,0xac,0x5d,0x62,0xb9,0x4e,0xea,0x73,0x1b,0x4b,0xeb,0x7d,0x9c,0x6f,0xa4,0xbf,0xba,0xee,0x31,0x55,0x85,0xed,0x5a,0x28,0x34,0xca,0x8d,0xcd,0x0d,0xe6,0xc6,0xfb,0xb1,0x4b,0x0d,0x30,0xfa,0x12,0x46,0x1e,0x4e,0x5e,0xcf,0x73,0xd1,0x49,0x58,0x69,0x6f,0x41,0xf2,0x33,0xff,0x06,0xc3,0xac,0x86,0x0d,0xd7,0x8e,0xab,0x15 .byte 0xf7,0xa4,0xfe,0x1f,0xfd,0x48,0xa1,0x39,0x2b,0x72,0x8b,0xa3,0x49,0xb6,0xfe,0x06,0x1c,0xe3,0x39,0x0c,0xf0,0xfb,0x3e,0xd9,0x7f,0xa6,0x49,0x85,0x18,0xbc,0x37,0xc2,0xba,0xf7,0xc6,0x84,0x9b,0xeb,0x85,0xfe,0xea,0xd5,0xcd,0x0f,0x86,0x4a,0xa9,0xdc,0xfd,0x57,0x3f,0xa5,0x2a,0xc6,0x95,0xcf,0x72,0xd6,0x5b,0xca,0x39,0x2f,0x87,0x27 .byte 0x72,0x33,0x4d,0x2a,0x53,0x83,0x02,0x96,0x0a,0x4a,0x0a,0x16,0x07,0xd6,0xb4,0xbe,0xff,0xa0,0x72,0x31,0x8b,0xc7,0x9b,0xfd,0x4b,0xdc,0x95,0x00,0x82,0x2a,0x56,0x93,0x31,0x08,0xbf,0xb5,0x6f,0xc4,0xca,0x9c,0x13,0xe8,0x57,0xc9,0x22,0xe6,0x89,0x7a,0x81,0xaa,0xf4,0x7c,0x59,0xd6,0x8c,0x71,0x78,0xeb,0x0d,0xa0,0x64,0xef,0x7a,0xcc .byte 0xea,0x45,0xcc,0xe9,0xfc,0xf5,0x83,0x38,0x3b,0x4f,0x2e,0x47,0x13,0xb5,0xb1,0x09,0xb5,0x94,0xb4,0x74,0x31,0x77,0xc3,0xdb,0xf3,0xfe,0xfe,0x3d,0x4d,0xc6,0xfa,0x5a,0xbc,0xee,0xaa,0x5f,0x03,0x09,0xdc,0x19,0x83,0x1f,0xe3,0x81,0xca,0xb9,0x59,0x4a,0x0d,0xde,0xda,0xf1,0xd0,0x21,0x7d,0x90,0x05,0x4e,0xee,0x63,0xc3,0x20,0x20,0x1f .byte 0x9f,0xdf,0x99,0x09,0x5f,0x61,0xab,0xbb,0x47,0xd7,0x20,0x79,0x81,0x69,0xb2,0xfe,0xb7,0xc1,0x27,0xcb,0x07,0xce,0x47,0xb6,0x32,0x8f,0x8b,0x06,0x0f,0x3c,0x34,0xe5,0x27,0xdd,0x20,0x42,0x63,0xed,0x9d,0x5f,0x36,0x31,0xf6,0xdb,0xfe,0x2c,0x50,0x9a,0x9c,0x2e,0x42,0xa1,0x1d,0x37,0xc5,0x63,0xd4,0xf6,0xc5,0x53,0xba,0x21,0x88,0x5b .byte 0xd6,0xc1,0x10,0xaf,0x22,0x21,0xeb,0x7f,0x1b,0x65,0x2b,0x0d,0x54,0xa8,0x0d,0x29,0xdf,0xbc,0x2f,0xd0,0xc0,0xa3,0x52,0x78,0x0c,0x76,0x56,0xf1,0x1f,0x22,0xa7,0x6f,0xb7,0xf7,0xd5,0xcf,0x0c,0xd3,0xbd,0x2f,0x84,0x53,0xae,0xef,0xb1,0xa3,0x38,0x0c,0x80,0x4b,0xef,0x88,0x59,0x2d,0x1f,0x79,0x92,0xfe,0xcc,0xd1,0x75,0x33,0x59,0xde .byte 0x74,0xd2,0xec,0x7c,0xad,0x8e,0xc7,0x8d,0xb8,0x2a,0x46,0xe0,0xa6,0xb9,0x10,0xf4,0x88,0x58,0x0e,0x68,0xba,0x31,0xaf,0x7b,0x7c,0x00,0xc5,0x9f,0x48,0x16,0x3c,0x92,0xa1,0xa2,0x02,0xf5,0xfd,0xbb,0x3f,0x85,0x9a,0x96,0xc5,0x24,0x36,0xc1,0x18,0x2e,0x85,0x27,0xa0,0xa0,0x69,0x40,0x35,0xe9,0xee,0xdc,0xbf,0x25,0xb1,0x2f,0xa8,0x30 .byte 0x7e,0x36,0x4d,0x74,0xb8,0x73,0xf9,0xaa,0xfd,0xf7,0xb3,0x4d,0x6b,0xbb,0x1b,0x5e,0xfd,0x45,0xca,0xc3,0xa6,0xe2,0x95,0xd3,0xba,0xcb,0x63,0x2a,0x1a,0xd3,0x50,0x1c,0x73,0x6c,0xb6,0x54,0x1c,0xf5,0xf7,0x8b,0x64,0x10,0x07,0x9c,0xc9,0x2a,0xfc,0x97,0x1c,0x21,0x2d,0x80,0xe7,0x5c,0x2d,0xcc,0x4e,0x0b,0x79,0x73,0xd0,0x1b,0xfe,0x92 .byte 0x05,0x95,0x9a,0x93,0xb5,0xbf,0x2f,0x09,0xa6,0x22,0x73,0xf9,0xb6,0x76,0xf5,0x90,0x6a,0x04,0xd2,0x5f,0xc4,0xb5,0x07,0xfc,0x46,0xf4,0xf0,0xcd,0xef,0x80,0xc7,0xf8,0x3d,0x1e,0xf5,0x85,0xfa,0xd7,0x17,0x57,0xba,0x74,0x9d,0xc2,0x73,0x6c,0xf6,0xa6,0x10,0x8d,0x03,0x82,0xee,0xbe,0xe3,0x03,0x0c,0xa5,0x68,0x20,0xf3,0x1e,0xaa,0xcc .byte 0x2b,0x8a,0xb4,0x76,0xb5,0x97,0x0b,0xa2,0xb0,0xf1,0xa5,0xfd,0xdf,0x0b,0xc2,0xce,0x93,0x75,0x46,0x28,0x53,0xf5,0x19,0x52,0xc6,0x7f,0xbd,0x1e,0x34,0xf8,0xbb,0x11,0x25,0xab,0x0f,0xed,0xd2,0x5e,0xdf,0x67,0x60,0xec,0x3c,0x5c,0x30,0xf0,0x42,0x21,0x97,0x47,0x09,0x77,0x58,0xf6,0x50,0x72,0xd9,0xc6,0xd6,0x71,0x8c,0xf9,0xaa,0x95 .byte 0x45,0x79,0xc6,0x5f,0xae,0xc9,0x36,0x8e,0x48,0x7a,0x56,0x94,0x97,0xed,0x0d,0x51,0xa0,0x54,0xb7,0x64,0x3d,0x3d,0x28,0x31,0x74,0xe9,0x1a,0x11,0x9a,0x5d,0x74,0x40,0x28,0x3c,0x7a,0x12,0xa8,0xbd,0x34,0x13,0xae,0x4b,0xb8,0xba,0xfb,0x84,0xee,0xd7,0x7f,0x6a,0xe4,0x2c,0x77,0xe6,0xf0,0x2f,0x94,0x32,0xd3,0xc2,0x29,0x23,0x55,0x82 .byte 0x17,0x2f,0x69,0x42,0xd2,0x8c,0xa4,0xc9,0xfc,0x6c,0x4d,0x30,0x85,0x23,0x1d,0x63,0xd4,0xc5,0x84,0x8c,0xcb,0xcb,0x68,0xb4,0x10,0x2d,0x44,0x33,0xd2,0xeb,0x45,0x6f,0x6e,0x7f,0x39,0xf3,0xbd,0xc1,0x63,0x49,0x43,0x51,0x64,0x40,0xf8,0xba,0x94,0x0f,0x6f,0x95,0x0d,0x51,0x64,0x68,0x44,0x73,0x3b,0xfc,0x8b,0x52,0x13,0xdd,0x07,0x4f .byte 0x73,0x97,0xf0,0x9a,0xde,0x5e,0x4b,0x6a,0xe8,0x62,0x25,0x62,0x29,0x67,0x54,0x37,0x11,0xfd,0x3a,0xa1,0xec,0xf2,0xdd,0xd2,0x09,0xb0,0x6c,0x84,0x87,0x32,0xac,0x29,0x68,0x86,0x39,0xf9,0x64,0xa9,0xb6,0xb8,0xd5,0x64,0x8f,0x9c,0xf8,0xae,0x9d,0x84,0x45,0x85,0xf8,0x29,0xba,0xfd,0xb4,0xcb,0x62,0xfd,0xaa,0xb2,0xd0,0x17,0xf0,0x86 .byte 0x92,0xbe,0x69,0x18,0xfa,0x56,0x94,0xbe,0x0f,0xa5,0x47,0x9c,0x6f,0x54,0xe4,0xa8,0x86,0x6a,0xf7,0x16,0x1d,0xd2,0xbd,0x8b,0xb2,0x03,0x01,0x23,0xa4,0x2b,0x91,0x8f,0x30,0xe7,0xc3,0x2a,0xbd,0x82,0xdd,0x2c,0x60,0xb8,0x9f,0x3f,0x03,0x91,0x47,0x37,0x8c,0x1e,0x83,0x23,0x4b,0xe9,0x17,0xf9,0xca,0x86,0x95,0xbe,0x21,0x2a,0x69,0x66 .byte 0x7a,0x2f,0x7f,0xba,0x73,0xa7,0xc3,0xb9,0x6f,0x77,0x5d,0xa9,0x97,0x82,0xff,0xba,0x37,0x72,0xee,0x52,0xe5,0x27,0xeb,0x5e,0xf3,0x88,0x0a,0x29,0xe1,0x7e,0xec,0x2a,0xf2,0xce,0xbd,0x3e,0x55,0x5c,0x22,0x29,0xce,0x35,0x68,0x68,0x12,0x5f,0x0d,0x8f,0x4c,0xa5,0xde,0x49,0xc9,0xb7,0x52,0x85,0x1f,0x81,0x42,0x65,0x4d,0x24,0xf8,0xe9 .byte 0x71,0x0f,0x37,0xdc,0xff,0x2f,0x07,0xf3,0x4c,0x15,0x66,0x24,0xf7,0xeb,0x13,0x25,0x24,0x33,0x47,0xbb,0x3e,0x45,0x31,0x61,0x6a,0x30,0x44,0xe2,0x43,0x2c,0xf1,0x46,0x1c,0x08,0x71,0x70,0xeb,0xa3,0xd1,0x03,0xcb,0x45,0x02,0xe8,0x46,0x5c,0x25,0x25,0x75,0x8f,0x0a,0x89,0x30,0x2e,0xbe,0x48,0xb4,0xb2,0x89,0xa2,0x56,0x87,0x32,0x19 .byte 0x85,0xe5,0x5c,0x69,0x6d,0xee,0xaf,0x64,0x22,0x93,0xe4,0x61,0x84,0xaf,0x36,0xee,0x4c,0xae,0x26,0x37,0xda,0x6b,0x78,0x64,0x2c,0x1b,0x9a,0xd2,0x8f,0x40,0xb9,0xf1,0xd0,0xbd,0xd6,0x67,0x16,0x42,0x2b,0xc0,0xfd,0x77,0x9a,0x69,0x69,0x44,0xbf,0x2c,0xfb,0x81,0xf0,0x96,0x29,0x31,0x35,0xae,0x8b,0x87,0x22,0x2a,0xa7,0x56,0xc8,0x85 .byte 0xd4,0xc8,0x32,0x3b,0xab,0x15,0x98,0x55,0xe3,0x13,0x77,0xd4,0x1b,0xa3,0xeb,0x89,0xe3,0x16,0xc4,0x0d,0xa8,0xde,0x54,0x0b,0x63,0xc5,0x77,0x1d,0x1a,0x0d,0xfb,0x15,0xb3,0x83,0x94,0xab,0x7a,0x7d,0xf3,0xf5,0xd5,0x4f,0x83,0xa2,0xf5,0xd9,0x09,0xa5,0xa7,0xb2,0x79,0xc4,0xbb,0xaf,0x66,0x09,0xd2,0xcd,0x05,0xe8,0xf3,0xcf,0xcc,0xd8 .byte 0x40,0xdb,0x9e,0xc3,0xb4,0xf0,0x1e,0x08,0x0d,0x41,0x75,0xae,0x7c,0x6e,0x19,0x1a,0xf9,0x27,0x6c,0x86,0xc6,0x97,0x99,0xc6,0xc0,0x39,0xbb,0xee,0x85,0x49,0xb8,0x29,0xef,0x3b,0xa4,0x35,0x68,0x4b,0x85,0xaa,0xfd,0xa1,0x5f,0x60,0x9b,0xee,0xca,0x09,0xd2,0xc4,0xe7,0x03,0xd2,0x29,0x78,0x56,0xd0,0x24,0x1e,0xf7,0x57,0x80,0x91,0x0c .byte 0x09,0xe8,0x03,0x36,0xaf,0x57,0xc5,0x94,0x04,0x13,0xa7,0x44,0x33,0x4e,0x27,0xe4,0xf0,0x05,0xb9,0xab,0x68,0x7d,0x4a,0x67,0x18,0x8f,0xdd,0x57,0x7b,0x83,0xb3,0x48,0x36,0x8a,0xbe,0x88,0xd8,0x86,0xe1,0x51,0x09,0x7e,0xd8,0x83,0x68,0x06,0x1a,0x4a,0x49,0x97,0x89,0x5b,0xc5,0x41,0x59,0xfc,0xb9,0xdc,0x3f,0x09,0x90,0x9d,0x94,0x86 .byte 0xd8,0xcd,0x07,0x46,0x8c,0xb5,0x73,0xd1,0x0b,0x5f,0x67,0x71,0x6f,0xf5,0xc2,0xbd,0x9f,0x7b,0xcb,0x0d,0x7f,0x9c,0xc3,0x92,0xb6,0x23,0xd8,0x84,0xea,0x7f,0xba,0xd6,0x6c,0x3e,0x79,0x8b,0x9f,0x96,0xda,0x9d,0x6f,0x3b,0x05,0x33,0x83,0xf2,0x0a,0x6d,0xac,0x7c,0xce,0xa5,0xc7,0x62,0x43,0x24,0x02,0x79,0x0a,0xad,0x92,0xe8,0x5b,0x36 .byte 0x4e,0x66,0xd6,0x1d,0x09,0x40,0x6f,0x3f,0x0e,0xb3,0x6c,0x9f,0x78,0x77,0xc0,0x78,0x59,0x93,0x70,0xa7,0xf9,0x16,0xf2,0x0b,0x53,0x96,0x89,0x4b,0x1e,0x32,0xbb,0x53,0x29,0xf8,0x55,0x46,0xa1,0x29,0x01,0x34,0x52,0xd1,0xc9,0x8f,0xb4,0x4a,0x49,0x5f,0x46,0x97,0x49,0xf4,0xd5,0x60,0xc7,0x78,0x14,0xde,0x5c,0x8e,0x8f,0xcf,0x28,0xee .byte 0x8b,0x82,0x71,0xdc,0xbb,0x7c,0x3d,0xda,0x0f,0x01,0x31,0x74,0x9d,0x84,0xca,0x57,0x2b,0x5f,0x2a,0x02,0x52,0x9d,0xb1,0x26,0x7d,0xc3,0x58,0xc6,0x6c,0x8e,0xf2,0x2f,0x10,0x48,0xdf,0x7c,0xd3,0xdb,0x01,0x6d,0x45,0xe4,0xc2,0x62,0xfe,0x60,0x26,0x39,0xd6,0x29,0xe0,0x51,0xfd,0x1f,0xf0,0xd2,0x3f,0xc7,0xc8,0x65,0x14,0xa1,0xb0,0xe8 .byte 0x36,0x61,0x0e,0x11,0xa3,0x37,0x48,0xa8,0xa9,0x35,0xb7,0x38,0x71,0xbe,0xd3,0xb0,0x8a,0xb2,0x96,0x13,0xb3,0xe0,0x44,0xa9,0xd4,0x8a,0x46,0x58,0xa7,0xf4,0x90,0xee,0xde,0x57,0x96,0xaf,0xeb,0x4c,0xd0,0x1b,0xed,0xe4,0xd1,0x8b,0x2e,0xd4,0x93,0xb3,0xc9,0x01,0x36,0xdc,0xdb,0x6d,0x23,0xfb,0xa1,0xdc,0xe8,0x2c,0x9e,0x49,0xaf,0x42 .byte 0x14,0xf1,0xbb,0xf8,0x44,0x85,0x2a,0x0d,0x28,0xe1,0x6e,0x30,0xb6,0x50,0xbf,0x77,0x77,0x8e,0x3c,0x67,0xb7,0x3a,0x0c,0x45,0x6b,0x6c,0x6c,0x9c,0x3e,0x5b,0xe6,0x9e,0x1c,0xbd,0xd2,0x46,0x72,0xe8,0xb4,0x52,0x7f,0x1e,0xea,0x6c,0x24,0x48,0xc7,0x7c,0xb5,0x78,0xf5,0x6a,0x18,0xaf,0xe0,0xa5,0xb3,0x55,0xd6,0x3f,0xf2,0x6c,0xaf,0x6c .byte 0x30,0x80,0x1f,0x57,0xe0,0xd3,0x6d,0xf6,0xb2,0xf8,0x9f,0x7a,0xcd,0x18,0xd8,0x3d,0x01,0x60,0x26,0x7f,0xdb,0xdd,0x86,0x42,0x1c,0xe7,0x65,0x86,0xe3,0x02,0x60,0x12,0x21,0x0d,0x4c,0x07,0xc0,0xdc,0xb7,0xb7,0x05,0x1e,0xca,0xe7,0x40,0x70,0x63,0xc4,0xa6,0x1c,0x27,0xcf,0x03,0xe8,0xba,0x07,0xd3,0xa1,0x8e,0xf5,0x27,0xc2,0xaa,0x89 .byte 0xdd,0x36,0x46,0x39,0xaf,0x60,0xdd,0x99,0x7f,0x42,0xb1,0xfd,0x7d,0xe5,0x1e,0x5a,0x6b,0x97,0xa9,0xfc,0x58,0xcd,0xac,0x63,0x23,0x66,0xe8,0xf7,0x5e,0x41,0x6b,0x2b,0x77,0xf3,0xf1,0xa7,0x3b,0xa4,0xbc,0xe9,0x0a,0x80,0x57,0x2b,0x62,0xb9,0x02,0x26,0xa9,0xfa,0xb5,0xd5,0x2d,0x5e,0x19,0x77,0x63,0xcd,0x7f,0x4d,0xdf,0x71,0x5e,0x2d .byte 0xce,0xfd,0x45,0x99,0x8c,0x46,0xc2,0x9d,0x89,0x3e,0xd0,0xac,0x39,0x0f,0x15,0x6b,0xfc,0x99,0x24,0x8c,0xcf,0xf9,0x55,0xf8,0x79,0xb3,0x8e,0xa9,0xf8,0xb6,0x81,0x49,0xda,0x95,0xda,0xce,0xdd,0x5f,0x94,0xb8,0x24,0x41,0xae,0xf3,0xc2,0x7c,0x6b,0xb8,0x7a,0xb9,0x0c,0xb2,0x34,0x2b,0x0e,0x90,0xc8,0x69,0xc3,0xd1,0x53,0x83,0x70,0xc2 .byte 0x6f,0x72,0x3a,0x1a,0xd4,0x68,0x0d,0x8d,0xff,0xa4,0xc5,0xd4,0x04,0xd6,0xca,0x18,0x04,0x7d,0xd1,0xc5,0x02,0xae,0x58,0x07,0x22,0x30,0xf3,0x7e,0xd4,0x3c,0x04,0x61,0xc4,0x24,0xee,0x0e,0x8d,0x48,0x7a,0xc7,0x28,0xe7,0x33,0xed,0x3a,0xe9,0x52,0x52,0x13,0x7e,0x89,0xe3,0x2b,0x5e,0xe3,0x28,0x7b,0x8f,0x87,0x80,0xc8,0x9c,0x4c,0x13 .byte 0x7a,0x2d,0xcd,0x68,0x60,0xcd,0xea,0x27,0x45,0x25,0xef,0x43,0xe7,0x65,0xc9,0xb4,0x81,0xeb,0xbc,0x71,0x0b,0xcf,0xbf,0xcf,0x6a,0xa8,0x70,0x4f,0x92,0xf4,0x8b,0xa2,0x82,0x8d,0x5c,0x73,0xdb,0x1f,0x9b,0xe3,0x81,0xe0,0x07,0x28,0x51,0x77,0x41,0xee,0x83,0xc5,0xcc,0x35,0x07,0x9a,0x20,0x13,0x2c,0x55,0x7c,0x97,0xc0,0xda,0x1e,0x41 .byte 0x56,0x80,0x15,0x26,0x10,0x66,0x12,0xdc,0x82,0xdd,0x1a,0x3f,0xd2,0x72,0xe4,0x80,0xd7,0x47,0x2a,0xa9,0x50,0xa4,0xa4,0xf1,0x6c,0xbe,0x6e,0x69,0x61,0x46,0xae,0x17,0x72,0x96,0xc8,0xcb,0x1c,0x89,0x0b,0x9e,0x0c,0x24,0x90,0x93,0xf6,0xf6,0x9c,0x5c,0x0b,0xeb,0x39,0xde,0xa7,0x64,0x88,0x18,0xc3,0x32,0x92,0xd5,0x06,0x6d,0x88,0xfd .byte 0xd0,0x99,0xe2,0x65,0x23,0xc3,0x24,0x16,0x2d,0x56,0x47,0x96,0x1c,0x8a,0x09,0xbf,0x23,0x1e,0x36,0x12,0x3b,0xba,0xac,0x13,0xf4,0x82,0xb2,0x0f,0xb4,0x73,0xf8,0x1e,0x96,0xaa,0x5a,0x31,0x48,0x70,0x4e,0x5a,0xf1,0x9b,0xf7,0xf5,0xd3,0x88,0xdd,0x35,0x7c,0xbe,0x85,0x62,0x8d,0x5d,0xc8,0x52,0x41,0x8a,0x24,0xe1,0xae,0x02,0xbe,0x4d .byte 0xe6,0x15,0x70,0x43,0xed,0x01,0xcb,0xa7,0xf0,0x31,0x10,0x0c,0xc0,0x25,0x02,0x74,0xa9,0x2e,0x34,0xbd,0x77,0xd5,0x00,0x89,0x24,0xa4,0x30,0x36,0x52,0xe9,0x51,0x47,0xe8,0x79,0xe3,0x7a,0x2e,0xe6,0x43,0x6b,0xa4,0x48,0xd7,0x3f,0x75,0x6c,0x64,0x4f,0xc7,0xf9,0x90,0x17,0x8f,0xbc,0x52,0x67,0x34,0x16,0xad,0x35,0x64,0x2c,0xa0,0xf0 .byte 0x67,0x4e,0x2b,0xf8,0x27,0xe0,0xa4,0x4a,0xba,0xe5,0xcb,0x17,0xd9,0x9f,0xc6,0x64,0x68,0xf4,0xe0,0xfc,0x0c,0x5c,0x3b,0xc7,0xc4,0xc0,0x88,0xa5,0x23,0xf3,0x48,0x7a,0x7e,0xa5,0x10,0x97,0x61,0xa2,0x45,0xf5,0xe8,0xe6,0xe9,0x48,0x25,0x78,0xcb,0x6b,0x42,0x5f,0x18,0x26,0xb3,0xb7,0xb1,0x34,0x57,0xf1,0xbc,0x13,0x7a,0xb4,0x01,0xda .byte 0x9f,0x72,0x91,0xb3,0x4d,0x27,0xff,0x90,0x22,0x5c,0xb2,0xef,0xef,0xd6,0x9c,0x41,0xf3,0x29,0x8d,0x92,0xd9,0x03,0xbe,0x24,0x64,0x99,0xb0,0x8f,0xbb,0x85,0xd2,0x2c,0xda,0x9b,0xb1,0x81,0x52,0x5a,0x0b,0xdf,0x8d,0x70,0x94,0xec,0x72,0x2e,0x58,0x0a,0x38,0x78,0xa1,0x51,0x8a,0x72,0xaf,0x49,0x6e,0xdf,0x8d,0xbc,0xce,0xd2,0xab,0x13 .byte 0x57,0x50,0x40,0xad,0xb8,0x3a,0x17,0x1c,0x61,0xb8,0x06,0xd3,0x2f,0x46,0xa6,0x57,0x4f,0x3a,0xe5,0xcb,0x96,0x48,0x37,0x9e,0xd9,0xb4,0x12,0xb3,0x15,0x10,0xe4,0x4a,0x36,0x6e,0xc5,0x4a,0xd8,0x6a,0xcb,0x96,0xfd,0xef,0xdd,0x1a,0xdb,0x80,0x92,0x93,0x5a,0xc4,0x2a,0x7b,0xe3,0x2d,0x6f,0x83,0x3e,0x50,0xb7,0x66,0xc5,0x66,0xca,0x42 .byte 0x97,0x6e,0x32,0x81,0x31,0x18,0xb9,0xc5,0xfa,0xae,0xb8,0xdd,0x5c,0x91,0xa1,0xc6,0x69,0xa5,0x2a,0xe0,0x1f,0xa4,0xaf,0x0d,0x92,0x4e,0x12,0x60,0xe1,0x0f,0x92,0xcb,0x78,0x49,0xbc,0xcf,0x64,0x4c,0xd8,0xa0,0x2b,0x70,0x7c,0x8b,0xa6,0x64,0x97,0x1b,0x22,0x22,0x3c,0x82,0x8d,0x08,0xfa,0xc4,0x8c,0x18,0xe3,0x1b,0xe9,0xd0,0xd9,0x10 .byte 0xca,0x9b,0x53,0x9c,0x3a,0xe2,0x1e,0xa8,0x00,0x4d,0xe1,0x58,0x55,0x6c,0xd9,0x88,0xda,0xb8,0x3c,0xbe,0x3c,0x65,0xfa,0x4d,0xdd,0x0b,0xde,0xf4,0xaf,0x50,0x9c,0xe4,0xa5,0xae,0xe3,0xc2,0x1a,0x53,0xfb,0x32,0xff,0x7e,0xf0,0x29,0x0c,0xac,0xa2,0xf5,0x68,0xc8,0xd8,0x04,0x7b,0x5f,0xe3,0xe0,0x57,0x0d,0x9e,0xcd,0x58,0xda,0x2a,0x44 .byte 0x49,0x3b,0x1d,0xd9,0x75,0x6b,0x41,0xf7,0xe6,0x7e,0x0c,0x49,0x20,0xc0,0xb5,0x67,0xdf,0xc4,0x28,0xcf,0x21,0x0b,0xa0,0x8e,0xde,0xff,0x5c,0x9f,0x34,0xdf,0xab,0xb9,0x70,0xa0,0xfd,0x80,0x54,0xb6,0xaf,0xc9,0xc4,0x10,0x5c,0x0a,0xc8,0xe1,0x91,0x5d,0xfc,0x24,0xab,0x12,0xdc,0x48,0x45,0xd5,0xc4,0x95,0xbb,0xe0,0x83,0x3a,0x5d,0xb7 .byte 0x8c,0xf1,0xf0,0xc6,0x56,0xed,0x3c,0x31,0x79,0xf2,0x75,0x81,0x3f,0xf0,0x4a,0x3f,0x44,0x99,0xdb,0x9a,0x48,0x44,0xaa,0x4c,0xff,0xea,0xfd,0xc0,0xd3,0xaf,0x46,0xad,0xd2,0x96,0xc5,0x6b,0xd7,0x2b,0x39,0xe5,0xef,0xc6,0xa6,0xe9,0x37,0x5a,0x25,0x0f,0x00,0x05,0x09,0x30,0xbd,0xb0,0x16,0x9f,0x1e,0x15,0x62,0x20,0xd1,0x01,0x4f,0xb7 .byte 0x20,0xb8,0xd2,0x6b,0x2b,0x18,0x66,0x45,0xac,0xad,0x33,0x14,0x4a,0x7f,0x74,0x8b,0xfa,0xa6,0x20,0xef,0x2e,0xd7,0xf6,0x84,0x03,0xb8,0x20,0x76,0x01,0x2b,0x20,0xf9,0x17,0x59,0xc4,0x09,0xe1,0x8b,0x43,0xf1,0x32,0xf2,0xc9,0xe8,0x00,0x37,0x77,0x10,0xd0,0x4d,0x89,0xc4,0x69,0x14,0x24,0xf6,0x30,0xc2,0xfb,0xcc,0x6c,0x6c,0x1d,0xdb .byte 0x7c,0xd7,0x32,0x1f,0x54,0x1b,0x50,0x39,0x2a,0xd3,0xb4,0x5e,0x0f,0xff,0x7a,0x04,0x5b,0xeb,0xf1,0xcb,0xea,0x5c,0xab,0xaa,0x73,0xb7,0x43,0xe5,0xf1,0xdc,0xc7,0xe4,0xb6,0x53,0x04,0xa5,0xb4,0xb2,0xf5,0xc6,0x93,0xa5,0x24,0x67,0xf3,0xd4,0xbb,0x3d,0x24,0xa2,0x30,0x4c,0x35,0x38,0x9c,0x5b,0x4b,0xba,0xfd,0x69,0x25,0xca,0xff,0x1a .byte 0xf6,0xc1,0x9b,0xd4,0xd7,0x29,0x9e,0x1c,0x57,0xb5,0x7e,0xa8,0x23,0x0b,0x8f,0x54,0x12,0x36,0x07,0x83,0x15,0xde,0x08,0x17,0xf2,0x65,0xb2,0x36,0xa3,0x55,0x6b,0x2d,0x0b,0xc2,0xf9,0x7a,0xab,0x39,0x9e,0x24,0x31,0x94,0x31,0x21,0xe2,0x1c,0x46,0x69,0x07,0x15,0xd3,0x42,0x42,0x7a,0x60,0x75,0x7e,0x48,0x46,0xc8,0xa5,0xee,0x3f,0xea .byte 0x97,0x5d,0xb1,0x80,0xbe,0x03,0x29,0xb5,0xf5,0xde,0xae,0xdb,0xf2,0x83,0x7f,0xc1,0x7f,0xb5,0xd5,0xb5,0x18,0x64,0xec,0x90,0xab,0x48,0xed,0xfb,0x75,0x30,0x13,0x2c,0x56,0xbc,0x2c,0xc3,0xc4,0x9d,0xf4,0x50,0xaa,0x08,0x59,0x9a,0x4b,0xc1,0x78,0x8f,0xe9,0xd4,0x3b,0x14,0x48,0x67,0x3e,0x78,0xf5,0xc8,0xba,0xbf,0x92,0xf3,0x23,0x94 .byte 0x35,0x7b,0x0a,0x7d,0xdd,0x21,0xde,0x9d,0x36,0xed,0xb1,0x72,0x0a,0x3a,0x93,0xc7,0x66,0x91,0xf6,0xc1,0xe0,0xf3,0x53,0x5f,0xb5,0xfb,0xa2,0xb7,0x91,0x06,0xf3,0xba,0xb7,0xf9,0x41,0x58,0xc6,0x4b,0x8e,0x63,0x35,0xd1,0xb5,0x6d,0x86,0x3e,0xd9,0x66,0xe1,0x1c,0xb7,0x02,0xc9,0x19,0x82,0xaa,0xda,0x04,0xce,0xe0,0xd0,0xa4,0x7a,0xd3 .byte 0xa2,0x3b,0x18,0x5b,0xfc,0x63,0xea,0xf5,0x8e,0xbb,0x57,0x9e,0x7c,0xe6,0x14,0x03,0xf7,0xe0,0xfe,0xf8,0xee,0x47,0x2a,0x3d,0x71,0x4b,0xe4,0x22,0x88,0x2f,0x7c,0x97,0x9c,0xb7,0x89,0x64,0xc4,0xc9,0xe9,0xa3,0xbd,0xbd,0xa4,0x73,0x98,0xd5,0x48,0x9f,0x2f,0x46,0x1a,0xc6,0xa1,0xce,0x84,0xb6,0x0a,0xb2,0xcb,0xbb,0xde,0x56,0xc3,0x1f .byte 0x81,0x07,0x08,0xc3,0x50,0xd8,0xcf,0xe8,0x17,0x79,0x4d,0x82,0x09,0x90,0x8b,0xde,0xdb,0x71,0x49,0xb9,0xb0,0x6a,0x82,0x22,0x78,0xbc,0xcf,0x48,0x94,0x76,0xa1,0x6f,0x31,0xe9,0x8a,0x33,0xac,0x6b,0x9e,0xc4,0xa0,0x12,0x9c,0x38,0x82,0xe1,0x70,0xac,0xc8,0x2a,0x2b,0x13,0x87,0xf2,0xc1,0xd3,0xc4,0x5b,0x77,0x37,0x82,0x28,0x4a,0xa1 .byte 0x7a,0x39,0xff,0x8a,0xdd,0x38,0x74,0xb0,0x88,0x83,0x71,0xe5,0x25,0xaf,0x04,0x19,0x99,0x1c,0x8d,0xa0,0x57,0x96,0x36,0xd5,0x28,0x83,0x30,0xd5,0x12,0x78,0x74,0x9f,0x9c,0xbf,0xee,0x68,0x95,0xec,0x56,0x67,0x77,0x54,0x35,0xb3,0xce,0xcf,0x29,0x2f,0xcf,0xec,0x14,0xa1,0x58,0x67,0x95,0xdd,0xc9,0x29,0xe4,0x0a,0xce,0x72,0x9a,0x5f .byte 0x3d,0x21,0x96,0x0f,0xf3,0x97,0x3a,0x60,0x82,0x1d,0xc5,0xbd,0x45,0x9a,0xe5,0x45,0x71,0x92,0xa3,0x3d,0xb3,0x13,0xf4,0x2a,0x71,0xcd,0x4f,0x70,0xbc,0x16,0x8c,0x35,0xcd,0xaf,0xf9,0x98,0xef,0xa7,0xc4,0x36,0x4e,0x65,0x89,0xaa,0xfc,0x9b,0x58,0x51,0x63,0x8e,0xd3,0x22,0x5b,0xf2,0x5d,0x13,0x6f,0xc8,0xa8,0x67,0x9c,0x8f,0x34,0xfd .byte 0xfe,0xf5,0xb7,0x84,0xcb,0x87,0x3d,0xb5,0x24,0xb8,0x19,0xa7,0x00,0x03,0x6d,0xc6,0x4f,0x1f,0xb9,0x57,0xff,0xdc,0x65,0xa4,0xe9,0x8e,0xc3,0x6b,0xfa,0x57,0x51,0x3d,0xf0,0x07,0x95,0xaa,0x00,0x31,0xdc,0x08,0x21,0xa1,0x73,0x9c,0xc9,0x46,0x3f,0xf4,0x0f,0xfd,0xec,0xcd,0xf2,0x76,0x73,0xa6,0xc2,0x15,0xeb,0x9b,0x9d,0xfb,0x6e,0xe5 .byte 0xe2,0x6e,0xaa,0x1a,0x30,0x82,0x02,0xad,0x56,0x67,0x3f,0x50,0x76,0x2f,0x04,0x4f,0x79,0xd5,0xfd,0x50,0x39,0xc1,0xe1,0xd5,0x1d,0x6f,0xb8,0x15,0x25,0xa6,0x4c,0x97,0x90,0x93,0x0f,0x34,0x46,0xda,0x99,0x2f,0x0e,0x4e,0xf7,0x09,0x2d,0x30,0xa7,0x74,0x95,0x8c,0x84,0x69,0x60,0x93,0x17,0x66,0xa3,0xff,0x4b,0xed,0xc7,0x5b,0x16,0x51 .byte 0x6a,0x39,0xc4,0x7f,0xd8,0x48,0x92,0xbd,0xc3,0x58,0xfd,0x87,0x8e,0x34,0xac,0xcc,0x2a,0xbb,0x40,0xd5,0x80,0x57,0x12,0x89,0x56,0x77,0x64,0xe3,0xf9,0x25,0x7d,0xd6,0xfe,0xd2,0xeb,0x9d,0x6c,0x20,0x12,0x7f,0xa4,0x19,0x45,0x27,0x36,0x22,0x3b,0x4c,0x1f,0x45,0xab,0x95,0xad,0xed,0x53,0xd8,0xce,0x84,0xde,0xbe,0xb7,0x93,0x6a,0x05 .byte 0x09,0xe4,0x57,0x38,0xb1,0xa9,0x7a,0x34,0x3e,0x43,0x03,0xa6,0xdb,0x60,0x15,0xdf,0x6f,0x26,0xf1,0x41,0xf2,0x83,0x1b,0xc9,0x15,0xf3,0xab,0xfa,0x33,0x19,0x87,0xac,0x55,0x7b,0xb6,0xbd,0x0a,0xbc,0xa5,0x08,0xfa,0xf4,0x7e,0x89,0x49,0x06,0x21,0x6c,0x44,0x27,0xf5,0x7c,0x46,0x6e,0x95,0x50,0x93,0x81,0xae,0xef,0x93,0x50,0x1c,0x4e .byte 0x7e,0x8c,0x3c,0xf4,0x41,0xbd,0x4a,0xfa,0x11,0x2e,0xed,0x6f,0x84,0x94,0xe1,0x0e,0xe4,0x5b,0x1f,0x0d,0xe0,0x2b,0xa1,0xa2,0xf8,0xa2,0x56,0x3b,0x52,0x41,0xf9,0x0a,0xe4,0x5b,0x82,0xa6,0xaa,0xd6,0x09,0x18,0x14,0x7a,0x36,0x66,0x01,0x47,0x7c,0x20,0xc6,0xf0,0xb3,0x24,0x29,0xb3,0x03,0x54,0x74,0x7d,0xee,0x28,0x6e,0xd8,0x4a,0x1a .byte 0x02,0x1d,0x86,0x11,0x16,0x4b,0x0f,0x92,0x31,0x6e,0x7b,0x8b,0x47,0x73,0xd8,0x46,0xf6,0x7b,0x82,0xfe,0xcd,0xe8,0x01,0x49,0x32,0xb7,0xa3,0xf1,0xc0,0xb9,0x0a,0x86,0xf7,0x6d,0xee,0xf3,0xed,0x66,0x8a,0x35,0x73,0xfb,0xb7,0xfd,0xff,0x0d,0xd1,0xd5,0x1b,0x4e,0x59,0x1a,0x84,0x0f,0x73,0x9c,0xfd,0x36,0xb0,0x81,0x79,0xec,0x46,0x94 .byte 0x32,0x1f,0x7a,0x98,0x1f,0xc7,0x99,0xc9,0x1d,0x54,0x8b,0xda,0x80,0x7a,0x38,0x38,0x8f,0x9e,0x2a,0xfc,0x24,0x2b,0x58,0x17,0xa6,0x2c,0x31,0x37,0xcd,0x14,0xb5,0x67,0xcb,0xdc,0x59,0x9b,0xd2,0x77,0x31,0xa1,0x6d,0xbe,0x09,0xd2,0x12,0x34,0x70,0x81,0xb0,0x19,0xbf,0xd6,0xb2,0x63,0x75,0xc1,0x1b,0xaa,0x8c,0xdc,0x59,0x79,0x12,0x5d .byte 0x20,0x43,0xd8,0x1a,0x03,0x87,0xb3,0x8f,0x52,0x0b,0xdc,0x69,0xa5,0xf2,0x19,0x07,0x6d,0xe2,0xfd,0x52,0xc9,0x7b,0x9a,0x37,0x48,0x1b,0xb1,0xd2,0x6b,0xd9,0x4e,0x6c,0xfd,0xc1,0x94,0xf2,0x36,0x21,0x89,0x5e,0x89,0x5e,0x87,0x09,0xa1,0x9b,0x6b,0x67,0xd1,0xde,0x85,0x2f,0xd5,0x6c,0x19,0x78,0xe7,0x61,0xd3,0x53,0x6e,0xb5,0x1c,0x23 .byte 0x5e,0x4d,0x32,0x73,0x25,0xa6,0x29,0xa2,0xb9,0x1b,0xc0,0x07,0x54,0x38,0x17,0xdf,0xc0,0xcc,0xb1,0x47,0xb9,0x07,0x1d,0xbd,0x8f,0x97,0xab,0x3f,0x7f,0x5b,0xff,0x34,0x01,0x3a,0x2c,0x6a,0x15,0x1d,0x77,0x36,0x32,0x55,0xf5,0x5c,0x84,0xfc,0xd6,0x54,0x22,0xfb,0x6a,0xce,0xb2,0x62,0x03,0x7f,0x96,0xf6,0x37,0xce,0xcc,0x08,0xcf,0x68 .byte 0x66,0x42,0x27,0x80,0x27,0x99,0x3d,0xbd,0xf8,0x60,0x4e,0x49,0x06,0x8a,0xd2,0x6b,0x1d,0x80,0xe0,0xfe,0xe4,0x2a,0x75,0x8e,0xd1,0xdf,0x26,0x69,0x55,0xe5,0xbb,0xa8,0xf3,0x3d,0xdd,0x54,0x90,0x90,0xd8,0x5d,0x86,0x9c,0xdc,0x41,0x71,0xac,0xd4,0x48,0x8f,0x15,0xc6,0xca,0x7e,0x03,0x95,0x81,0x56,0xdb,0xb6,0xe5,0x27,0xb3,0x60,0x51 .byte 0x93,0x21,0x9a,0x68,0x1e,0xb2,0x5c,0xf8,0xf1,0xdd,0x19,0x02,0xaa,0x5f,0x16,0xaa,0x13,0xa6,0xe7,0xcf,0xfb,0x7c,0xd4,0xe7,0x55,0x8a,0x5d,0xf3,0xec,0x3d,0xca,0xf8,0x34,0x32,0xaa,0xd8,0x47,0x11,0x25,0xe4,0xf1,0xbd,0x7a,0x1d,0xe9,0xa3,0xce,0x2e,0x44,0xe1,0xa4,0xbe,0x70,0x68,0x49,0xa4,0x14,0x7b,0xde,0xa6,0x9e,0xe1,0x32,0x01 .byte 0xb3,0xed,0xc4,0x15,0x0c,0x84,0xb1,0xd4,0xef,0xa5,0xbc,0x2e,0xc8,0x79,0x6b,0xf1,0xf8,0x61,0xae,0x55,0xa3,0xd5,0x0e,0xf5,0xc0,0xb8,0x9c,0xdf,0x7f,0x12,0x19,0xc2,0x73,0x22,0xc2,0xc5,0x77,0x76,0xb0,0x36,0xe5,0x89,0x7e,0x5a,0x4a,0xb4,0xa0,0x4d,0x8e,0x1b,0xbe,0x52,0xd1,0xf5,0x3b,0x84,0xf8,0x44,0x76,0x26,0xbb,0x31,0x38,0xd1 .byte 0x24,0xa7,0xb7,0xb5,0xcb,0xa6,0xa7,0x9c,0x15,0xeb,0x31,0x57,0x93,0x3f,0x1c,0x48,0xe9,0x3b,0x20,0x21,0x46,0xe9,0xe2,0xe1,0xd3,0xf4,0xd9,0xcb,0xe7,0xa1,0xa9,0x75,0x7e,0x70,0x95,0x33,0x43,0x86,0xb2,0xd1,0x01,0x8e,0xcb,0xb5,0x1c,0xc5,0xe8,0xcb,0xec,0x1d,0xf2,0xd1,0xe9,0x3b,0xf0,0x8f,0x1a,0x30,0x79,0x83,0x31,0xd6,0x29,0x18 .byte 0xe7,0x80,0xaf,0xd3,0x1d,0x48,0x59,0x14,0x1e,0x94,0x4f,0x32,0xaa,0x8c,0x40,0x37,0xad,0xed,0x30,0xe3,0x5a,0xc5,0x2c,0xdf,0xf5,0xa4,0xcc,0x52,0xdb,0x48,0x90,0xc3,0xbb,0xff,0x65,0x9b,0x86,0xec,0x06,0xac,0xec,0x3c,0x67,0xdc,0x82,0x57,0xb5,0xd4,0x19,0x19,0x68,0x73,0xad,0xd7,0xa9,0x9c,0x3f,0x8e,0xe8,0x7c,0x92,0x4c,0x66,0xbe .byte 0xe1,0xa6,0x9c,0x1c,0x85,0xcc,0xcf,0xfa,0x86,0xeb,0x34,0xe5,0xf1,0x14,0x09,0xa7,0xde,0xf5,0x2f,0xc0,0xc9,0xb4,0xab,0x92,0x8f,0x76,0xf0,0x78,0x02,0x8d,0x8d,0x44,0x3c,0x2c,0x57,0xfe,0x40,0xb5,0xd2,0xea,0x67,0x1c,0x30,0xb4,0x75,0xbb,0xeb,0xd4,0xf7,0x53,0x0a,0x09,0x29,0x0c,0x02,0x40,0x4b,0x22,0x98,0xe7,0x70,0xa7,0x6b,0xcf .byte 0xf3,0xa1,0xed,0x50,0xec,0xbb,0xbc,0x24,0x48,0x20,0x03,0x64,0xac,0x03,0xf7,0x9a,0xb5,0x8e,0x16,0xee,0x36,0xb1,0xa7,0x82,0xf4,0x21,0x77,0x79,0xa8,0x07,0x57,0xb4,0xb5,0x59,0x84,0x62,0x29,0xcd,0xb4,0xb8,0x78,0x3c,0x20,0x96,0xe5,0x43,0x8f,0x21,0x38,0xff,0x32,0xa5,0x4f,0x23,0x4b,0xf4,0x5d,0x96,0xc4,0x74,0xe4,0xc1,0x9e,0x72 .byte 0xb1,0x37,0x2a,0x7c,0xa7,0xd1,0xa9,0xf0,0x9e,0x90,0xdd,0xfa,0x3b,0x47,0x7d,0x31,0x08,0x7a,0xbd,0xe7,0x0b,0x0c,0x78,0x92,0x85,0xb4,0x7f,0x33,0xe0,0x7c,0x14,0x92,0x3f,0x3b,0x2e,0x6a,0x61,0x4a,0x81,0xf1,0x76,0x53,0x1f,0x24,0x95,0xe7,0xc2,0xd0,0x7d,0xb4,0x3c,0x59,0x85,0x55,0x0b,0x46,0xd0,0xc3,0x0b,0x0c,0xe1,0x34,0xd9,0x67 .byte 0xfc,0x6b,0x98,0x67,0xdb,0x24,0x08,0xd3,0x15,0x9d,0xb5,0x31,0x22,0x7e,0xe7,0x77,0x7c,0x7e,0x49,0x48,0x6c,0x3e,0xd5,0xda,0x4f,0x46,0x94,0xf9,0x59,0x5d,0xb6,0x4e,0xec,0x76,0xfe,0x5e,0x10,0x63,0x92,0x89,0x3e,0x56,0x18,0x94,0x6c,0xac,0xc1,0x2d,0xba,0xf4,0x1f,0xd4,0x09,0xa0,0x00,0x39,0x8f,0x9e,0xfb,0x63,0xa0,0x34,0x71,0x23 .byte 0xdf,0xaf,0x0d,0x88,0x75,0x37,0x92,0xd0,0x17,0xcb,0x20,0xad,0x94,0xa9,0x94,0x9f,0xce,0x1c,0x19,0xe2,0xdb,0x36,0xe0,0xa6,0x68,0xa4,0x1d,0x16,0xb6,0x16,0xb2,0xf4,0xe4,0x3e,0xfc,0x3b,0xda,0x10,0x57,0xc9,0x81,0x58,0x28,0x43,0xf8,0x45,0x38,0x5c,0xb1,0xd6,0x54,0x16,0x45,0x36,0x46,0xe2,0x60,0xa5,0x47,0x9a,0x29,0x85,0x54,0x45 .byte 0xdc,0x1a,0x63,0xe6,0xae,0x3b,0xdf,0xa9,0xd4,0x10,0x63,0x19,0x91,0x81,0x8e,0x90,0xb4,0x1f,0x25,0x5a,0x46,0xff,0x41,0x1e,0x25,0x1f,0x98,0xb5,0x69,0x2b,0x5e,0x5d,0x7d,0x0a,0x27,0x13,0x3f,0x70,0xe8,0xae,0xa1,0x89,0xb7,0x4a,0x5c,0xef,0x03,0x08,0x7f,0x66,0xa4,0xa7,0x6a,0x27,0x27,0xfc,0x8c,0xe4,0x61,0x8e,0x9e,0x19,0x6d,0x98 .byte 0x2f,0xd0,0x31,0xdf,0xb5,0x86,0xa5,0x23,0xe0,0x82,0x8c,0x26,0xf7,0x96,0x7f,0xca,0xab,0xba,0xcb,0x54,0x5e,0x05,0x9a,0x0a,0x75,0xbe,0xbf,0x25,0x80,0x18,0xac,0xd8,0x4e,0x9c,0xd3,0xb7,0x34,0x73,0xfa,0x73,0x17,0x89,0xc7,0xe2,0x94,0x59,0xc1,0xca,0x78,0x48,0x6d,0x63,0x2c,0xce,0x70,0x90,0x6a,0xbd,0x6b,0xb8,0xaa,0xac,0x5f,0x09 .byte 0xf3,0x96,0xac,0x07,0xe0,0x12,0xdc,0xf7,0x12,0x61,0xa7,0x9d,0x7c,0x7b,0x63,0x02,0x59,0x43,0xd4,0xcb,0xa4,0x32,0x7e,0x3e,0x27,0xf5,0x37,0xf5,0x75,0x35,0xc4,0x17,0xa4,0x98,0xae,0x04,0xe8,0x28,0x18,0x84,0xf1,0x57,0xff,0x1a,0xa8,0xaa,0x31,0xc2,0x5f,0xd9,0x38,0x11,0xdc,0x49,0x59,0x28,0x8a,0x43,0x04,0xd2,0x83,0x96,0x66,0xe3 .byte 0x26,0x56,0x5e,0x4a,0x8f,0x11,0xcc,0x30,0xd4,0x11,0x52,0xdf,0x95,0x46,0xb6,0x8a,0x9a,0x80,0xa5,0x9f,0xae,0xeb,0x06,0x38,0x14,0x7d,0x6a,0x25,0x7b,0xf8,0xf8,0xa1,0x2e,0xeb,0x84,0xc3,0x25,0x63,0xa4,0xe4,0xf8,0x9b,0x4b,0xfb,0xb1,0xb4,0x18,0x54,0xfa,0x74,0xc5,0x5a,0x59,0x79,0xf5,0x19,0x2a,0x51,0x4c,0xe0,0x30,0xe5,0x43,0x71 .byte 0xda,0x37,0xb3,0xca,0x1c,0x6f,0xa3,0xf5,0xa1,0xd9,0x6c,0xaa,0xca,0xb5,0xae,0x9f,0x51,0xef,0x17,0xc3,0xaa,0x4c,0xe1,0x3b,0x2a,0x61,0x85,0xdf,0xb4,0x6b,0x18,0x9f,0x1e,0x0d,0x4a,0xe6,0xaf,0x72,0x4a,0xa0,0xad,0x5b,0x44,0xf5,0xa4,0x00,0x91,0x4a,0x33,0xf8,0x8d,0x83,0x51,0x83,0x6b,0x1d,0xca,0xcd,0x94,0x04,0x0b,0x5f,0x3d,0x60 .byte 0x26,0xbf,0x9f,0xa5,0xac,0xaf,0x66,0x5c,0x2a,0x37,0xa6,0xfc,0x11,0x1b,0xa6,0x8b,0x02,0xe5,0x4e,0x0f,0x1f,0x7a,0x0d,0x49,0x22,0xb9,0x66,0x97,0xbd,0xee,0x82,0xc7,0x78,0xba,0x77,0x50,0x54,0x68,0xf6,0xc8,0xc9,0x73,0x82,0x93,0x1f,0xfe,0x6b,0x49,0x9b,0x63,0xad,0x6c,0xaa,0x78,0x07,0x9f,0xda,0x11,0xb2,0x36,0xb7,0xcb,0xea,0x27 .byte 0x83,0x66,0xa3,0x20,0x20,0xf8,0x29,0x56,0xb8,0xcf,0x93,0xcd,0x40,0x94,0x94,0xef,0x3e,0xda,0x3d,0x4e,0xff,0xef,0xea,0x29,0xc3,0xd2,0x6e,0x2d,0x74,0x27,0xe4,0x31,0xd0,0xcb,0x76,0x48,0xf2,0x9b,0xf7,0x59,0x95,0x15,0x33,0xc1,0x2f,0x88,0xf3,0xa8,0xdf,0xc9,0x86,0xcf,0x37,0xf1,0x08,0xb9,0x76,0xe6,0x09,0x48,0x44,0x25,0x9b,0x98 .byte 0xbe,0xab,0x20,0xa1,0x21,0xe9,0xf9,0x9b,0x31,0xf1,0xfd,0x49,0xaa,0xb5,0xf0,0xbf,0xec,0x8d,0x1c,0xf4,0xaa,0xa9,0x23,0xe5,0x0c,0x1b,0xd7,0xad,0xbd,0x97,0x16,0xdf,0x4f,0x7a,0xd4,0x68,0xd6,0xc2,0xba,0x92,0x17,0x5c,0x80,0xf6,0x4a,0xf1,0x26,0x50,0x58,0xd0,0x11,0xed,0x98,0x55,0x75,0x44,0xb2,0xb5,0x96,0x22,0xe6,0x4f,0xc8,0xba .byte 0x97,0x3a,0x3e,0xce,0xc5,0x8c,0xf2,0x8c,0xf1,0x91,0xb6,0xb3,0xcd,0xae,0x2c,0x80,0x2a,0x15,0x7e,0x65,0x28,0x35,0x50,0xae,0x36,0x03,0x8b,0x38,0x8f,0x51,0x20,0x8d,0x38,0x19,0x68,0x6e,0x25,0x28,0xd7,0x2c,0x74,0x7f,0xac,0xa8,0x02,0xed,0x01,0x08,0x01,0x1a,0xc4,0x7d,0x18,0x6c,0xf5,0xce,0x25,0xea,0x1f,0xdc,0x85,0xf2,0x8c,0x56 .byte 0x60,0xe6,0x5c,0x5f,0x08,0x2c,0x43,0xe2,0x53,0x5c,0xd0,0xa7,0x78,0xec,0x2a,0x75,0xb4,0x18,0x4f,0x80,0x19,0xca,0x30,0x13,0x67,0xcd,0x73,0xba,0xf9,0xba,0x54,0x39,0x0b,0x4b,0x03,0x7d,0xfd,0x21,0xac,0x14,0x54,0x56,0xba,0x6f,0x0b,0x59,0xbf,0x52,0x19,0xb2,0xb7,0x18,0x57,0xaa,0xaa,0xb2,0x07,0x6b,0xf7,0x13,0x37,0xe1,0xff,0x5a .byte 0x1d,0x54,0xdf,0xf0,0x57,0xb4,0x14,0x93,0x03,0x31,0xe3,0xaa,0x53,0xa5,0x8e,0x39,0xbc,0x17,0x83,0xd1,0xc3,0x4d,0x5f,0x8d,0xa0,0x08,0x09,0xf2,0xde,0x5b,0x47,0x72,0xad,0x9f,0x22,0x59,0x8d,0x7c,0x8f,0x4b,0x78,0xd2,0x35,0x49,0x34,0x23,0x89,0xa4,0xa1,0x15,0xb0,0xed,0xc0,0x60,0x53,0x68,0xf6,0x3b,0x35,0xca,0x75,0xf6,0x04,0xde .byte 0x2f,0x0c,0x8c,0xd8,0x75,0xd1,0x7c,0xa1,0x62,0x6b,0x2c,0x2d,0x10,0x1b,0x38,0x81,0x10,0x82,0xcb,0xb8,0x75,0xfa,0x3f,0xfd,0x41,0xd5,0x6d,0x88,0x12,0x5e,0xc5,0x23,0xb3,0x8e,0x37,0x01,0xd9,0xee,0x25,0x32,0xda,0x3c,0x3b,0x50,0xa7,0xef,0xe3,0xac,0xfd,0x50,0x4e,0x55,0x94,0x2d,0xcc,0x41,0x07,0x6e,0x3f,0x8f,0x1a,0x21,0x4d,0x79 .byte 0x42,0x1c,0x8e,0x23,0x4c,0x43,0x02,0x5c,0xf8,0x59,0xc8,0x88,0x64,0x93,0x30,0x25,0xf7,0xea,0xeb,0x2c,0xe5,0x10,0x47,0x36,0xd8,0x32,0xe7,0xf3,0x5e,0x1b,0xcc,0x78,0xda,0xe7,0xc9,0xb6,0xf9,0x24,0x50,0x5a,0x6c,0xfb,0x30,0xc7,0x25,0xa4,0x54,0xdb,0xdc,0xc7,0xf3,0x64,0x9f,0x79,0xc5,0x6c,0xef,0xa2,0x12,0xb3,0x18,0xff,0x97,0xe8 .byte 0x79,0xaa,0x33,0xf1,0xb2,0x69,0x48,0x61,0x71,0x4c,0x8b,0x87,0x50,0x00,0xc1,0x90,0xc4,0x16,0x2a,0x52,0xca,0xf3,0x30,0x51,0xd0,0x8b,0x19,0x46,0x1c,0xb1,0xa3,0x56,0x8a,0x18,0xd8,0x04,0x9f,0x4d,0x3e,0xd7,0xcb,0x15,0x07,0x08,0x45,0x29,0x0d,0xf1,0x94,0x35,0xea,0xc2,0x89,0x0d,0x32,0x01,0x53,0xe3,0x8b,0xba,0xbf,0x39,0x36,0xe4 .byte 0x3a,0x9b,0x0b,0x8f,0x3b,0xbd,0x15,0x47,0x81,0x68,0x99,0xc3,0x40,0xc4,0xad,0x44,0x8f,0x02,0xe8,0x77,0x32,0x4d,0x8e,0xfe,0xf3,0xa0,0x95,0xef,0x8b,0x1b,0xd6,0xbc,0xac,0xe5,0x2b,0x05,0x5d,0xcd,0x1f,0xe6,0xac,0x80,0x62,0x91,0x54,0x6c,0x6f,0xcc,0xab,0x09,0x83,0x1d,0xcc,0xf2,0x40,0x91,0xc1,0x6b,0x41,0x19,0x33,0x36,0x8b,0x81 .byte 0xfb,0x97,0x2b,0x6f,0x28,0xc7,0xc2,0x69,0x7e,0x36,0x60,0x5d,0x89,0x8c,0xee,0xe0,0x0a,0xbf,0x38,0x6e,0xc4,0x9b,0xe4,0x93,0x33,0x96,0x80,0xf4,0x56,0x00,0xf4,0xa5,0xe5,0x29,0x04,0x13,0x83,0x0d,0x5d,0xcb,0x6a,0x09,0x90,0xc9,0xb4,0xe9,0xa4,0x13,0x3a,0x0e,0x64,0x18,0x2d,0x33,0x19,0x67,0x5f,0x89,0xd1,0x86,0x3d,0x8f,0x9d,0xb3 .byte 0x0c,0x7b,0x90,0x6e,0x9a,0x09,0xa2,0xb6,0x8a,0xc6,0x03,0x16,0xcf,0xe7,0xe0,0xe3,0x29,0xad,0x59,0x29,0x78,0xdd,0x26,0xcd,0x32,0xd7,0xb4,0x43,0xb8,0x18,0xa9,0x8f,0x79,0xe8,0xbc,0xe1,0x4d,0x16,0xa5,0x09,0x88,0x5c,0x37,0x50,0x88,0xee,0xcd,0x35,0x0d,0xd4,0xe4,0x14,0xd0,0x1b,0x9b,0x1f,0xd7,0x44,0x36,0x9a,0xe8,0x82,0x5b,0xb3 .byte 0xb3,0xea,0xcf,0x05,0x78,0xd8,0x94,0xd4,0x63,0x7f,0x45,0x0e,0xb2,0x96,0x7b,0x97,0xf0,0xde,0x85,0x2a,0x70,0xc3,0xb1,0x17,0xd2,0xf0,0x3a,0xb7,0xde,0xa5,0x5f,0xbc,0xda,0xa5,0x93,0xd2,0xd8,0x2c,0x74,0xd3,0xad,0x25,0xbd,0xda,0x80,0xd9,0x13,0xff,0x07,0x3f,0x56,0xa7,0x27,0x72,0x45,0xa9,0x06,0x44,0x3f,0x28,0xc4,0xb6,0x20,0x9d .byte 0xcd,0xb7,0xba,0x53,0xbc,0xe0,0xb6,0x91,0x8b,0x9d,0x2b,0x3d,0x0a,0x35,0xdb,0x9f,0xed,0x47,0x29,0x54,0xc1,0xbf,0x33,0xc2,0x69,0x0f,0x5b,0x7d,0xa1,0xe8,0x8b,0xd0,0x4f,0x69,0xf1,0x32,0x68,0x2a,0x2a,0x83,0xd0,0xe9,0xe3,0x73,0xbd,0xcd,0x6e,0x5c,0x33,0xab,0xf0,0xed,0xc3,0xf4,0x03,0xa2,0x8c,0xb8,0x53,0x91,0xb5,0x79,0x7a,0xfb .byte 0xc4,0x99,0xb8,0x06,0xf1,0xdf,0x4e,0x65,0xf2,0x0c,0xc6,0xd2,0x3f,0xe6,0xc2,0x4c,0xb3,0xfd,0xa8,0x24,0x27,0x5c,0xae,0x16,0xf1,0x99,0x12,0x8b,0xc9,0xf0,0x96,0xb2,0xcf,0x13,0x92,0x62,0xfb,0xf6,0x66,0xf4,0x87,0x1a,0x8b,0x09,0x4c,0xac,0x1b,0x6b,0x8b,0xa8,0x9d,0x14,0x36,0x90,0xe1,0xdc,0x6e,0x14,0x2e,0xa0,0x81,0xeb,0xd9,0x2c .byte 0xe0,0x2d,0x83,0x99,0x91,0xe5,0x79,0xca,0x61,0xfb,0x44,0x8e,0x63,0x52,0x85,0x27,0x1a,0x2e,0x63,0x34,0xdb,0x96,0xe7,0x39,0x0d,0x7e,0x64,0xc8,0x71,0x65,0xe0,0xb5,0x4a,0x03,0xe1,0x05,0xf0,0x23,0xf9,0x0a,0xc1,0xcb,0x8b,0x6f,0xee,0x47,0x99,0x63,0xac,0xb6,0x7b,0x12,0x68,0x45,0x8d,0x51,0x03,0xfa,0x3e,0x18,0xed,0xba,0x35,0x3a .byte 0xd7,0x6d,0x32,0xca,0x04,0x04,0x24,0xba,0x95,0x52,0x97,0x35,0x91,0x1c,0x9f,0xf2,0x83,0x4d,0xe3,0x3f,0xcd,0x71,0xf8,0xc2,0xe0,0xbe,0xcb,0x32,0x1e,0xa3,0x00,0xf6,0x53,0x9d,0x22,0x33,0xb1,0x4c,0x2a,0x9f,0x03,0x98,0xba,0x72,0x63,0x6b,0xa3,0x3a,0xe4,0x27,0xc6,0xec,0xfb,0x6a,0x35,0xae,0x56,0x7e,0xf2,0x26,0x43,0xad,0x04,0x26 .byte 0xc8,0xcd,0x3b,0xa7,0xf4,0xab,0xb4,0x8c,0xc3,0xde,0xd8,0xce,0x51,0xa8,0x35,0xc9,0x87,0x68,0x72,0x35,0xb7,0x87,0x37,0xe2,0x7f,0x02,0x06,0xce,0x32,0x0f,0xe7,0x7b,0x5f,0x41,0x58,0x6f,0xe6,0xef,0xd8,0x4f,0x45,0x9f,0x92,0xe2,0x8a,0x37,0xd0,0xdd,0xe5,0xa9,0x56,0x41,0xc2,0xea,0x93,0xfc,0x9f,0xfb,0x42,0x73,0x8b,0x9e,0xd4,0x4b .byte 0xb4,0x3b,0x30,0x33,0x36,0x50,0x7a,0x0a,0xdd,0x9c,0x65,0x78,0x8f,0xb4,0x91,0x9f,0xc3,0x90,0x4b,0x7a,0xed,0x8a,0xe2,0xe6,0x63,0x8b,0x51,0x1d,0x3d,0xef,0x62,0x27,0x21,0xaa,0xc4,0x7a,0xc1,0xea,0x66,0xed,0xb6,0x73,0x4a,0x6e,0x0c,0xec,0xae,0xf7,0xd5,0x3e,0x63,0xb3,0xbc,0x04,0x3e,0x9e,0xa8,0x27,0xa4,0xb1,0x48,0x5b,0x56,0x0a .byte 0x9d,0xfb,0xdb,0xd1,0x08,0x10,0xa5,0x46,0x80,0x03,0x7c,0x23,0x94,0x06,0x71,0xd0,0x47,0x45,0xe5,0x83,0x7f,0x06,0x94,0xdc,0xcb,0x0e,0xd0,0xd1,0xfb,0x04,0xa3,0x0c,0x30,0x07,0x37,0xc0,0x1d,0x90,0x6f,0xbc,0x71,0x4a,0xce,0x2d,0x9e,0x8c,0x2f,0x98,0x2c,0x31,0x73,0x67,0x68,0xdf,0x01,0xaa,0x49,0x40,0xfc,0x71,0xfd,0xbd,0x67,0xdf .byte 0x6c,0xe6,0x37,0x64,0x88,0x8f,0x05,0x04,0x59,0x0c,0x16,0x4e,0x6f,0x0c,0xff,0x11,0xcb,0xac,0x9d,0x42,0xb7,0xfc,0xf4,0xda,0x77,0xdf,0x62,0xe7,0x80,0x9d,0x37,0x50,0x86,0x16,0xb2,0xf3,0x86,0x8f,0x04,0xe0,0xb7,0x2b,0x2d,0x82,0x9a,0xe5,0x34,0x31,0x9a,0x77,0x63,0x60,0x7a,0xfe,0x5b,0x9b,0x32,0xf9,0x4d,0x66,0x5e,0x01,0x05,0xd4 .byte 0xc1,0x74,0xb5,0x41,0x3d,0x0c,0xab,0x98,0xdf,0xdd,0x42,0x62,0x78,0xb2,0x42,0x20,0x66,0x19,0x9e,0x83,0x9c,0xbf,0x32,0x4d,0x96,0x78,0x56,0x9b,0xa0,0xb6,0xce,0x67,0x3a,0xfc,0x34,0x92,0x39,0xe3,0x8f,0x8a,0x8a,0x81,0x1d,0x5b,0xf7,0xfb,0x15,0xba,0x2b,0x2e,0x20,0x3b,0x82,0xfb,0x59,0x90,0xb7,0x2f,0xd4,0x60,0x79,0x58,0x64,0xee .byte 0xb8,0xcd,0x4e,0x1c,0xac,0x58,0x43,0xce,0x5c,0xc9,0xe7,0xce,0xb1,0xc8,0x78,0x85,0x19,0x02,0x5d,0x86,0x1b,0xed,0x0b,0x7a,0x27,0x24,0xc2,0x90,0xae,0x5e,0x66,0xad,0x3b,0xc6,0xb5,0xe4,0xaf,0xc5,0xf2,0x0d,0x87,0x63,0x7a,0xcd,0x32,0x77,0x24,0xf8,0x67,0x84,0xbb,0xc1,0x09,0xf1,0x1c,0x41,0x7b,0x4d,0xb3,0x6e,0x58,0x02,0xf0,0x2d .byte 0x09,0x78,0x4b,0x86,0xd3,0xb2,0x3a,0x52,0x15,0x86,0xde,0x47,0xb0,0x85,0x1e,0x01,0xe8,0xe8,0xeb,0x71,0x96,0x23,0x4a,0xb9,0x32,0xc6,0x51,0x93,0x5d,0x60,0x40,0x5e,0xb8,0xb4,0x85,0x6b,0x0c,0xe6,0xfb,0x02,0x16,0xd8,0x4b,0xaf,0x7f,0xa2,0x48,0x0c,0x43,0x55,0x5a,0x9a,0xd0,0x24,0x88,0xbe,0xcf,0x97,0x4b,0x79,0xf3,0x7a,0xb8,0x3a .byte 0x6d,0xcd,0x8d,0x84,0x72,0xd7,0xd8,0xb4,0x54,0x68,0xa9,0x3d,0x72,0x53,0x51,0x42,0xca,0x11,0x2e,0xc8,0xe1,0xce,0x40,0x65,0x3e,0x5f,0x34,0x37,0xa3,0xee,0x2d,0x8a,0x68,0xcb,0xf0,0x96,0xc9,0x34,0xe3,0x5b,0x5c,0x4b,0xd6,0x48,0xdb,0x0c,0x79,0xbb,0x26,0xe4,0xa5,0x60,0x5a,0x21,0xec,0x2a,0x2d,0x64,0xe8,0xef,0xd9,0x9d,0x6e,0x9c .byte 0xdf,0xfe,0xbc,0x40,0x2d,0x6f,0xfe,0x55,0x7a,0x51,0x43,0x87,0xc8,0x03,0xd7,0x23,0x4f,0xf0,0xb9,0x31,0x70,0x9b,0xdb,0xf8,0x6c,0xad,0x45,0xe8,0x81,0x25,0x72,0x5d,0x6e,0xc1,0x68,0x9d,0xd7,0x5a,0x94,0xe3,0xab,0xa1,0x37,0x71,0xcb,0x2a,0x70,0x86,0x73,0x8b,0x52,0x1f,0x2d,0xe7,0xd3,0xc1,0xdd,0x7d,0x3a,0x32,0x0f,0x0c,0x0e,0x1f .byte 0xd9,0xfb,0x11,0xbe,0x40,0x17,0x89,0x8f,0x24,0x23,0x19,0xa0,0x53,0x7d,0x90,0x6e,0xfb,0x11,0xfa,0xc7,0x05,0x02,0xca,0x42,0xcf,0x00,0x58,0xeb,0xfb,0x4d,0xe7,0x8a,0x75,0x84,0x41,0x50,0xf8,0x5d,0x47,0x23,0x45,0x45,0x2e,0x77,0x47,0xc4,0x59,0x6f,0x91,0x98,0xbc,0xdf,0x91,0xef,0x2a,0x7a,0xe7,0x48,0x02,0xc6,0x4d,0x4b,0x21,0xe6 .byte 0xc8,0xcf,0x50,0x6a,0xe5,0xa4,0x6f,0x76,0x6f,0xb2,0xbe,0xb8,0x26,0xe8,0xea,0x8e,0x4e,0xf3,0xcc,0x09,0x29,0x5b,0x5a,0x4e,0xa0,0x0c,0x95,0xf2,0xf8,0x8d,0x07,0xa0,0x85,0x1d,0x2c,0x15,0x94,0xa6,0xdc,0x80,0x40,0x4a,0x95,0xfd,0x24,0x02,0x6b,0xf1,0xfc,0x55,0x51,0x45,0x5e,0x45,0x53,0x9c,0x45,0x84,0x7c,0x90,0xeb,0x84,0xf8,0x04 .byte 0x07,0x86,0x75,0x74,0x88,0xd8,0x2a,0x43,0xd2,0x55,0xda,0xfe,0x78,0xb0,0xc5,0xd1,0x18,0x71,0x20,0x6a,0xc2,0x74,0xc5,0x17,0x1d,0x03,0xa4,0x2f,0x2c,0xba,0xbd,0xdf,0xd0,0x24,0x83,0xbb,0x75,0xa9,0xd4,0xb3,0xc7,0x1e,0xb2,0x20,0x6b,0xe7,0x66,0x41,0x1c,0x1f,0xc5,0xa5,0x00,0x97,0x49,0x55,0xe2,0xde,0x6b,0x90,0x9d,0x1e,0xb6,0x7d .byte 0x42,0x9e,0x2d,0x76,0xa3,0x78,0x3a,0x46,0x96,0x99,0x25,0xb9,0x30,0xdb,0xe9,0x17,0xce,0x26,0x0e,0x90,0x5c,0x25,0x74,0xeb,0x0e,0xf4,0x7d,0x22,0x66,0xcd,0x48,0xe6,0x2e,0xa6,0xbd,0xff,0x46,0x19,0xb4,0x6d,0x6f,0xe1,0xc5,0x8b,0x18,0x13,0xde,0x22,0x9b,0xe2,0x98,0x97,0x4c,0xde,0x93,0xf4,0x3d,0xe8,0x8d,0xe5,0x0f,0x0d,0x8b,0xe9 .byte 0x1a,0x5a,0xf4,0x32,0x5e,0xad,0x54,0xd2,0x4a,0xd5,0x15,0xb0,0xdc,0xdf,0xb1,0x5f,0xde,0x76,0x3b,0x10,0x2f,0x47,0xc4,0xd4,0x7c,0x8b,0x57,0xf9,0xf2,0x15,0x97,0x25,0x8b,0x59,0x92,0x78,0xb0,0x55,0x2a,0x98,0xfc,0x31,0x73,0x71,0xd4,0xe4,0x5b,0x05,0xf7,0xd1,0xc0,0x4c,0xb4,0x3c,0x4c,0xe2,0x1d,0xd0,0xa4,0x46,0x62,0x1e,0x8a,0x06 .byte 0xba,0xe4,0x89,0x40,0x1c,0x91,0x4a,0x30,0xdb,0x2b,0x51,0x2b,0x28,0x4d,0x06,0xa6,0xd7,0x0c,0xb9,0xc7,0xdc,0x8d,0xea,0x4e,0x89,0xae,0x3d,0x98,0xb6,0x39,0x9a,0x46,0x74,0xac,0xd1,0x88,0xe5,0x86,0xa7,0x6e,0x7d,0x5c,0x0a,0xfc,0x77,0x3f,0xba,0xd4,0xef,0x51,0x93,0x4b,0x24,0xe5,0x57,0xd2,0xdd,0xdc,0x04,0x4e,0x4a,0xa0,0xe8,0x8d .byte 0x40,0x11,0xcc,0x8b,0xaa,0x6d,0x26,0x68,0xb2,0x60,0x0c,0x7e,0x2d,0xd8,0x5a,0x56,0xaa,0x81,0xbe,0x7d,0x1e,0xb7,0x9b,0xe0,0x1f,0x8a,0xd7,0xd3,0xe8,0x5a,0xa9,0x21,0x5c,0x75,0xa0,0x6a,0x12,0x35,0xa3,0x60,0xb0,0x5a,0x04,0xe5,0xb3,0x11,0xf3,0xb8,0x52,0x8b,0xab,0xff,0x1b,0xf8,0x51,0xd9,0x81,0xef,0xb8,0x66,0x16,0xed,0xd5,0x72 .byte 0x6d,0xf6,0x9b,0x03,0x3d,0x7c,0xc2,0xdf,0x00,0x13,0x24,0xb9,0x05,0xad,0x31,0x3c,0x0e,0x53,0x25,0xdb,0x86,0xbd,0xd9,0x0a,0xdd,0x0f,0x33,0x96,0x6a,0x72,0xd0,0x47,0xb2,0xee,0x1d,0xa4,0x92,0x3d,0xd8,0x33,0xed,0x2f,0xca,0xa1,0x9b,0x51,0xdd,0xbf,0x3f,0xfc,0x4b,0x6b,0xfe,0xd9,0xde,0x3a,0xa7,0x9b,0x3b,0xfb,0x94,0xc9,0xea,0x25 .byte 0xc6,0x24,0xd1,0xe3,0x47,0x89,0xc7,0x12,0xd1,0x7c,0xc6,0x10,0x3a,0xaf,0xb6,0x68,0x11,0xef,0x1a,0x16,0xd8,0xd9,0x9f,0x48,0xbb,0xba,0x44,0x97,0x69,0x34,0xf1,0xf0,0x7c,0xe0,0x27,0x59,0x2b,0x8a,0x2d,0x69,0xca,0xdb,0xae,0x07,0x21,0xbe,0xb6,0xa7,0xc1,0xbb,0xe6,0x07,0xdc,0x46,0x46,0x77,0xe2,0x98,0x1c,0xf8,0x73,0xdf,0xd9,0x93 .byte 0x52,0x70,0x09,0xf8,0xcc,0x2e,0x5e,0xff,0x87,0x0c,0xc6,0x9e,0x90,0x4b,0xfa,0x2b,0x49,0xb6,0xe6,0xb8,0xcb,0xfd,0xec,0x21,0xd6,0x04,0x9f,0xe4,0x90,0x11,0xa4,0x9c,0xd3,0x29,0xf6,0x9b,0x01,0xd3,0x7c,0xbc,0x00,0xb0,0x38,0x08,0x70,0x7c,0x6a,0x13,0xa7,0x2b,0x5f,0xd2,0x1f,0xf0,0x7b,0x9f,0xd6,0x48,0x43,0x66,0x6a,0x7e,0x9f,0x44 .byte 0x1c,0x63,0xdd,0xeb,0xd5,0x4e,0xdd,0x7d,0x47,0x36,0x93,0xe2,0xdb,0x93,0x26,0x35,0x47,0x4a,0x25,0x51,0x19,0xce,0xcb,0xbb,0x31,0x90,0xbf,0xe5,0x94,0xb5,0x06,0x95,0xe5,0x88,0xbd,0x0a,0x65,0x8f,0x5c,0x1a,0x78,0x9c,0xd4,0xfd,0xd3,0xc4,0xb2,0xde,0x90,0x06,0xb1,0x34,0x81,0x65,0xb3,0xfc,0xeb,0x2b,0x76,0x1e,0xac,0x88,0xec,0x42 .byte 0xf7,0xf4,0xbb,0x1a,0x21,0xee,0x68,0xd8,0x4e,0x02,0x54,0xae,0x49,0x66,0x83,0x2a,0xb3,0x8d,0x5f,0xfb,0xca,0x13,0x3b,0xaa,0xd8,0x3b,0x16,0x44,0xe8,0xb8,0xc0,0xdc,0x58,0xbf,0xe3,0x01,0xe2,0xae,0x45,0x9d,0xbf,0xfe,0x2e,0x7d,0xaa,0xee,0xbc,0xd8,0x9b,0x73,0xf9,0x01,0x0f,0x32,0x45,0x51,0x4b,0x60,0xfa,0xd4,0xdb,0x75,0x2d,0xbc .byte 0x95,0x1c,0x74,0xd5,0x24,0x56,0x38,0x7e,0x4e,0xab,0x05,0xe8,0x98,0xfb,0xe2,0x1e,0x53,0xef,0xbb,0x8f,0xef,0x07,0xcf,0xcc,0xf5,0xb9,0x0c,0xca,0xaf,0xe1,0x89,0xfe,0x72,0xf2,0xe9,0x11,0x7a,0x8a,0x9f,0x2c,0x60,0x55,0x25,0xe7,0x82,0x64,0xe6,0x75,0xa4,0xdd,0x49,0x05,0xd2,0x04,0xd4,0x4b,0xdc,0xb2,0xa8,0x62,0x7b,0x51,0xf1,0xdf .byte 0xd4,0xa6,0x3d,0xb4,0x19,0xf5,0x2a,0x19,0x77,0x0c,0x11,0x46,0x82,0x9d,0x19,0xa6,0xfc,0x17,0xff,0x77,0x3f,0x61,0xe5,0x91,0x51,0x2d,0x57,0x70,0x51,0xc0,0x09,0xfd,0x31,0x43,0x76,0x22,0x89,0xc4,0x77,0x8f,0x63,0x5d,0x9e,0xe8,0xe9,0x17,0x52,0x05,0x5c,0x16,0x2b,0x24,0x83,0xe1,0xb1,0x2f,0x78,0x45,0x16,0x80,0x92,0x62,0x0e,0x1a .byte 0x6f,0x78,0xb4,0xb7,0x1b,0x0a,0x2c,0xf4,0x9d,0xb0,0xda,0x32,0x88,0xc4,0x0c,0x2e,0xdc,0xfa,0x3d,0x54,0x2c,0x74,0x4e,0x14,0xa6,0x3d,0x39,0x2c,0x6d,0x44,0x71,0x51,0xb0,0xc0,0x7a,0xff,0x26,0x07,0x09,0xad,0x2c,0x1e,0x0a,0xb9,0xe3,0xdd,0x1d,0x76,0x66,0x57,0x38,0xa1,0xcc,0xe7,0x2d,0xe8,0xf5,0x8c,0x1e,0xa3,0xc6,0x4b,0x07,0x8b .byte 0xda,0x95,0x50,0x5d,0xac,0xac,0xb2,0xf7,0xd2,0x42,0xe2,0x4d,0xbb,0x72,0x55,0x94,0xf9,0xff,0x3d,0xfd,0x9a,0x52,0xc3,0x32,0x76,0xdc,0x63,0xb1,0x19,0xdc,0xd8,0x32,0xc4,0x85,0xb5,0x29,0x5d,0x27,0x8d,0x93,0xa3,0x29,0xcb,0x3d,0x93,0x39,0x3d,0x81,0x98,0xde,0x47,0x97,0x0c,0xe6,0xd8,0x1c,0xa0,0x87,0xe0,0x4e,0x03,0x21,0x6a,0x1b .byte 0x64,0x22,0xa3,0x25,0x4c,0xe0,0xd9,0xd0,0x37,0x94,0x3b,0x2b,0xd2,0x07,0x6c,0xaa,0x32,0x3b,0x09,0xde,0x38,0xbf,0xc8,0x63,0x0c,0x5d,0xf2,0x31,0x3a,0x40,0xcb,0xca,0xc2,0xe1,0x11,0x01,0x75,0x85,0x9d,0x0e,0x72,0xcc,0x3b,0x70,0xa5,0xd7,0xdd,0xa1,0xb9,0xf3,0x8d,0xca,0xba,0xc7,0x9f,0xe8,0xe7,0x34,0x72,0x27,0x0f,0xb6,0x87,0x3a .byte 0x52,0x50,0xdb,0x0a,0xc8,0x1d,0x39,0x0d,0x86,0xb6,0x1a,0xce,0x19,0xf7,0x20,0x5e,0xb6,0xe4,0xcc,0x06,0xaf,0x66,0xf3,0x19,0x23,0x5d,0xec,0x11,0x80,0x67,0x40,0x9f,0xcc,0xa5,0x89,0xe3,0xd6,0x06,0xd1,0x40,0xc9,0xf5,0x9d,0xa7,0xa2,0x3e,0x08,0x7a,0xef,0x8b,0xff,0x09,0x6f,0xd0,0x23,0x73,0x2c,0x46,0xd4,0x73,0x9e,0x69,0xcc,0x05 .byte 0x27,0x3d,0x8a,0x22,0x9d,0x92,0x84,0x40,0x07,0x81,0x65,0x03,0x6a,0x59,0xe9,0x57,0x4c,0x93,0x1a,0xaf,0xc2,0x12,0x7d,0x23,0x1a,0xd8,0xad,0xcb,0x51,0x8b,0xce,0x28,0xc5,0x8e,0xb8,0xab,0xa4,0x50,0xc3,0xe7,0xb9,0x8f,0xc3,0x99,0xc2,0x7b,0x86,0x9f,0xb3,0x4e,0x4d,0x14,0x66,0xe4,0xdf,0x40,0xdf,0xd8,0xdd,0x05,0x9f,0x96,0x3b,0x7e .byte 0x9f,0x72,0xc9,0x11,0x98,0x73,0x40,0x72,0x2e,0xbc,0x2c,0xc7,0x0c,0x70,0xcf,0xbc,0x3c,0x25,0x43,0xec,0x36,0x5f,0xb9,0x80,0x19,0x79,0xd3,0x29,0x6e,0xe8,0x35,0x0b,0x1a,0x75,0xfa,0x4a,0x08,0xda,0xaf,0x1d,0xb5,0x06,0x6b,0x44,0xe4,0xde,0xe7,0x16,0x59,0xe5,0xad,0x23,0xc1,0x8e,0x87,0x27,0x03,0xc2,0xad,0x20,0xf7,0xdd,0x05,0x39 .byte 0x16,0xc8,0x6b,0x32,0x99,0x8b,0x39,0xb4,0x6e,0x16,0xa5,0x4e,0x5d,0xe1,0xf0,0x91,0xf2,0xfd,0x5e,0xbf,0x0a,0xf7,0x33,0x82,0xaf,0x8a,0xaa,0x99,0xac,0x24,0xdf,0x43,0x84,0x8f,0x82,0x56,0x8a,0xae,0xbd,0x2e,0x5b,0x1b,0x95,0x0f,0xc1,0x7c,0xa1,0x4e,0xda,0x11,0x21,0x0c,0x7e,0xa2,0x5b,0x30,0x89,0xbb,0x52,0x4a,0x8d,0x9f,0x95,0xd9 .byte 0x0e,0x6b,0x74,0xb4,0x0b,0x2a,0x37,0x21,0x9e,0xb6,0x00,0x9f,0x09,0x71,0xf8,0xd2,0x98,0x47,0x65,0x33,0x88,0x16,0x6b,0x5a,0x61,0x8c,0xdf,0x4d,0xbe,0xb0,0xde,0xc9,0x35,0xa3,0xa8,0x9f,0xf6,0xe7,0x93,0x29,0x29,0x66,0x43,0x5e,0xcc,0x1e,0x8b,0xf7,0x8d,0x3c,0xc2,0xfa,0x52,0xfc,0x44,0x71,0x02,0xfc,0x54,0x74,0xc2,0x10,0x84,0xc1 .byte 0xfb,0xd0,0x65,0x05,0x5c,0x16,0xd3,0x65,0x1a,0x8c,0xae,0x45,0xb8,0x70,0x8a,0x27,0x66,0xaf,0x7f,0x6b,0xcf,0x71,0x33,0x14,0xdd,0xe4,0xd7,0xdf,0x81,0xcb,0xd5,0x6b,0x67,0x82,0x52,0x6c,0xbc,0xb7,0xd8,0x19,0x24,0x74,0xdd,0x7f,0x06,0x04,0x76,0x36,0x5a,0x63,0x9e,0x6e,0x36,0xc3,0xc6,0xa7,0x4c,0xa8,0x1b,0x6c,0x45,0x14,0x4d,0x6e .byte 0x62,0x88,0x27,0x6e,0xb8,0x00,0x11,0x93,0x6a,0xee,0xa6,0xcf,0xcb,0x6b,0x6a,0x2d,0x67,0x32,0x61,0x0b,0xea,0xb6,0xfd,0x9a,0x4a,0x34,0x02,0x79,0x80,0x0c,0x3d,0x3f,0x69,0x9f,0xb5,0xcf,0xda,0x6a,0xdf,0x4d,0xba,0xf4,0x63,0xf3,0x4f,0xc0,0x86,0x1c,0x41,0x3b,0xd6,0x43,0x35,0x1b,0xee,0xfc,0xac,0x6c,0x27,0x94,0xa9,0x98,0xe3,0x07 .byte 0x83,0xb2,0x19,0x9e,0x75,0x84,0x1f,0x70,0xe0,0x3c,0x49,0x77,0x82,0xb5,0xc0,0x52,0x80,0x06,0xce,0xb7,0x1c,0x9b,0x08,0x47,0x5e,0x7f,0xe1,0x8e,0x90,0x4f,0x29,0xdc,0x50,0xbd,0x0e,0x64,0xfb,0x93,0xa6,0x5e,0x6d,0xa4,0x2d,0x36,0xf2,0xe1,0x65,0xed,0x13,0xbe,0xf4,0x8c,0x46,0x3b,0x24,0x96,0xaf,0x47,0xe1,0x13,0xe1,0x7b,0x4c,0xf7 .byte 0x7d,0x8c,0x1c,0x41,0x6e,0xa7,0xcd,0x1e,0x0a,0x5c,0x44,0xc0,0xf7,0x1d,0x53,0xff,0x1f,0xe4,0x64,0x92,0xa7,0xe4,0x68,0x7b,0xaa,0xb0,0x76,0x88,0x21,0x1d,0x43,0x9b,0x9d,0x7c,0xdb,0x6e,0x91,0x90,0xd6,0xbe,0x9a,0xb8,0x2b,0x8e,0x73,0xe9,0x07,0x09,0x2f,0x85,0x7d,0x63,0x75,0x25,0x1d,0xb5,0x39,0xbc,0x1e,0x27,0xd7,0xf8,0x40,0xda .byte 0xe5,0x45,0xb5,0x02,0x9c,0x7e,0x0a,0x4b,0x5e,0xb5,0x88,0xbb,0x86,0x3a,0x35,0xb8,0xb9,0x0b,0x39,0x85,0xbd,0x18,0xb7,0x58,0xcd,0x6b,0xdc,0x25,0x86,0xee,0x17,0x9d,0x3d,0xd8,0xb4,0x33,0x09,0x1c,0x57,0x52,0x7c,0x0e,0xb3,0x61,0x07,0x5c,0xea,0xf5,0x05,0x1b,0x43,0x20,0x14,0x87,0x15,0xfb,0x9c,0x3f,0x0d,0xa9,0xfc,0xf6,0xa7,0x66 .byte 0x46,0x54,0x8c,0x2c,0x2d,0x22,0x72,0x8f,0x2d,0x00,0x1d,0x1b,0x0c,0x84,0xb4,0x21,0xd6,0x3f,0x3d,0x5f,0xfd,0x22,0xe3,0xd7,0x72,0xa7,0xd1,0x98,0x7f,0x53,0xf0,0xcf,0x6b,0xb9,0xe4,0x40,0x1c,0x23,0x94,0xa9,0x8e,0x9f,0x00,0x0e,0x65,0x59,0x2a,0xcf,0x2d,0xb6,0x15,0xa8,0x97,0x9a,0x75,0xac,0x88,0xf7,0xe7,0xe4,0x1e,0x56,0x38,0xc7 .byte 0xb7,0x68,0xaf,0x15,0x48,0x9c,0xa6,0xca,0x3e,0x67,0x11,0xca,0x7f,0x3a,0x9c,0xc7,0x1a,0xff,0xcc,0x10,0x10,0x67,0x5f,0x62,0x72,0xca,0xd8,0xf2,0x4b,0x7a,0xc5,0xf0,0xc9,0x40,0x45,0xc9,0xe4,0xef,0x50,0x18,0xf8,0x38,0xca,0x93,0x68,0x74,0xdb,0x3e,0x92,0x77,0xf6,0xc1,0x81,0x33,0xaf,0x6f,0x62,0xb3,0x5e,0x67,0x66,0xca,0x53,0xe5 .byte 0xc2,0x37,0x4e,0x97,0xa8,0xac,0x5e,0xf5,0x36,0x48,0xa5,0xb4,0x9e,0x07,0x38,0x7b,0x2a,0xb5,0xb6,0x3c,0xc6,0x04,0x90,0x38,0x52,0x07,0xc3,0x26,0xd2,0x08,0x55,0x6f,0x7d,0xda,0x53,0xf2,0x3e,0x09,0xa7,0x3e,0xe6,0x6b,0x31,0x72,0xc3,0xcb,0x30,0x3a,0x5b,0x0e,0xca,0x4c,0x94,0x7e,0x18,0x27,0xe3,0xb2,0x40,0x7b,0x68,0xa2,0xa7,0x2b .byte 0x80,0xf1,0x36,0xc9,0xb0,0x52,0x71,0x59,0x1c,0x41,0xcd,0xe9,0x4b,0x3a,0x89,0x9e,0xc4,0x5c,0x0c,0xfe,0x96,0x02,0xbd,0x3c,0xbd,0xe9,0xf1,0x78,0xe3,0x89,0xab,0xe3,0x7d,0x8b,0xc8,0xc6,0x40,0x2c,0xd5,0xfe,0xc9,0x02,0x1a,0x69,0x72,0x50,0x49,0x16,0x8a,0x9a,0x79,0x25,0x69,0x84,0xc7,0xc0,0xae,0xd1,0x7d,0xd0,0x28,0x88,0x12,0xee .byte 0x22,0x86,0xec,0xea,0xe2,0x74,0x19,0xae,0x54,0x78,0xd1,0xc1,0x64,0x90,0x04,0x6f,0x0a,0xa3,0x60,0x14,0x63,0xe3,0x6a,0xed,0x7e,0xd5,0x36,0x0a,0x3c,0x72,0x2c,0xde,0xbd,0x01,0xff,0x22,0xe8,0x4c,0x55,0xbf,0xa6,0x24,0x18,0xbe,0x23,0x12,0xfa,0x91,0x30,0xa6,0x09,0xcd,0xc2,0x43,0x59,0x0c,0xab,0xc0,0x99,0x20,0xf1,0xbc,0x5e,0xab .byte 0x72,0x85,0x72,0x2f,0x1c,0x21,0xcc,0x38,0xa3,0xa2,0xbe,0x40,0x70,0xf1,0x80,0x4d,0x18,0x1d,0xb4,0x61,0x84,0x19,0xc1,0xd0,0xcd,0xae,0xa8,0x74,0x46,0xe3,0x4e,0x0e,0x54,0xc6,0xc3,0x80,0x17,0x32,0x62,0x80,0x9a,0x8c,0x7a,0x7b,0x94,0xb2,0x1a,0xa4,0xa5,0xcc,0x65,0x46,0xa9,0xe6,0x62,0xf7,0x04,0x43,0x75,0x0e,0x48,0xf6,0xdb,0xc7 .byte 0xad,0x2f,0xad,0x0c,0x19,0xce,0xe6,0x03,0xcf,0x9b,0x33,0x99,0x90,0x8a,0x5f,0xf0,0x84,0xe6,0xe9,0xda,0xaa,0x6f,0x45,0xdc,0xab,0x9e,0xc6,0xd8,0x6f,0xc4,0xa2,0xea,0x17,0x8f,0xa7,0x0c,0xbf,0x79,0x2e,0x06,0xa7,0x84,0x41,0x80,0x85,0x25,0xdc,0x40,0xf9,0x11,0x45,0xfb,0x6d,0x43,0x3c,0x84,0x64,0xf4,0xa2,0xdc,0xa3,0x0d,0xa1,0x0a .byte 0x49,0x34,0x10,0x63,0x3a,0xef,0xe7,0x08,0xe9,0xf4,0xff,0x0e,0x2d,0x3b,0xf6,0xa7,0x62,0x8e,0xe5,0x61,0x32,0x3d,0xaa,0x01,0xd0,0xa3,0x54,0xf1,0xdf,0x1f,0x8a,0x58,0xfd,0x2d,0x81,0x8b,0x3b,0xe8,0x95,0x2e,0x92,0x58,0x5c,0x23,0x95,0x29,0xe7,0x3c,0x3c,0x09,0xbb,0xdc,0x55,0x37,0xf4,0xa6,0x14,0xc8,0xff,0x6b,0xff,0x17,0xb8,0x81 .byte 0xf7,0xa1,0x96,0xb6,0xd0,0xea,0x35,0x1b,0x3e,0x81,0xf4,0xf2,0x88,0x03,0x97,0xbf,0x1d,0x06,0xa1,0xa4,0xa9,0x9f,0x81,0xa3,0x36,0x3a,0x58,0x2c,0x9d,0x5c,0x44,0xcb,0x10,0x5e,0xa6,0x62,0x3e,0xb6,0xf9,0x1d,0x24,0xa4,0xb8,0xb8,0xa7,0x13,0x14,0x1f,0xab,0x29,0x64,0xaf,0xa8,0x48,0xa4,0xc9,0x31,0xb7,0x1d,0xb2,0xd0,0x88,0xe1,0x14 .byte 0x87,0x26,0x65,0x47,0x61,0x4e,0xd2,0xf1,0x48,0x32,0x06,0xb4,0x39,0x49,0xed,0x68,0xa8,0x71,0x83,0xfd,0x77,0xdf,0x69,0x88,0x36,0x34,0x4a,0x11,0xfd,0xa0,0x11,0x87,0xe4,0xe7,0x02,0x52,0x34,0xfe,0xfe,0x77,0xbf,0x21,0x33,0x77,0x4d,0x85,0x57,0xd6,0xbb,0x07,0xdc,0x63,0xb1,0x53,0xc4,0x9f,0x7c,0x05,0x6f,0x23,0xe8,0xb7,0x49,0x1e .byte 0xd9,0xdb,0xc7,0xff,0x99,0x2a,0xc1,0xef,0x93,0x09,0x3c,0x13,0xf7,0x49,0xdb,0x72,0x16,0x68,0xb2,0x37,0x39,0x43,0x43,0x4a,0x75,0xdb,0x77,0x3a,0x7c,0x8f,0x6f,0xe1,0x47,0x65,0xbe,0xe7,0x3e,0xec,0xf8,0xe9,0xff,0x6b,0x71,0x7c,0x3b,0x56,0x57,0xea,0x9e,0x51,0x13,0xe3,0xdc,0x59,0xa1,0x81,0x84,0xd0,0xfc,0x12,0xf4,0x2e,0x2b,0xba .byte 0xed,0xb9,0x13,0x76,0x63,0xee,0x42,0x6f,0x74,0x71,0x06,0x26,0x7a,0x03,0x39,0x5f,0xb1,0x54,0x6a,0xf9,0xf0,0xdf,0x8f,0x9f,0xca,0x58,0x5e,0x4d,0x72,0xa8,0x76,0x2f,0xa1,0x9e,0xa3,0x0f,0x73,0x31,0x8c,0xe8,0x90,0x53,0xd6,0x2b,0xa1,0x35,0xd9,0x6a,0xae,0x56,0x5f,0xd4,0xfc,0x9b,0xae,0x1d,0xdc,0x21,0x50,0x39,0x7c,0xfe,0xd2,0x80 .byte 0x7b,0x9e,0x20,0xde,0x30,0x79,0x5c,0xc6,0x8d,0x10,0xb4,0xb1,0x3c,0xf0,0x1d,0x48,0x6f,0x0f,0x2d,0xd7,0x0a,0x2f,0x62,0x1f,0xdc,0x24,0x7b,0x8b,0xe8,0xf2,0xb4,0x3f,0xd5,0xb3,0x69,0x87,0x65,0x38,0xff,0x63,0xc2,0xb0,0xc8,0x50,0x8f,0x1c,0x17,0xaa,0xd7,0x0f,0x14,0x27,0xb2,0xc5,0xf7,0xe0,0x18,0x9c,0x35,0xa7,0xe0,0xf9,0xad,0x74 .byte 0xec,0xe0,0x0c,0xda,0x79,0x7f,0x58,0xa3,0xb9,0x07,0x76,0x1e,0x64,0x20,0x99,0x17,0x32,0xfd,0xe7,0x6a,0xd9,0xcb,0x7b,0x2f,0xd8,0x57,0xd4,0xfa,0x4e,0x3a,0xbc,0x0b,0xdd,0x90,0x04,0xdb,0x3d,0xc9,0x8a,0xb0,0x6a,0x72,0x42,0xff,0x0c,0x08,0x88,0xfc,0xa4,0x59,0x07,0x2a,0x32,0x2f,0x02,0xb1,0x78,0x13,0x1b,0x05,0x38,0x73,0xa5,0xf1 .byte 0x98,0xee,0xd4,0x1f,0x83,0x63,0x90,0x9c,0x74,0xa5,0x3d,0x7d,0x32,0x29,0x08,0xa4,0x01,0x8a,0xc7,0x26,0x86,0x85,0xd2,0xa1,0x0b,0xaf,0x92,0x0a,0x28,0x8b,0x5f,0x90,0x99,0x56,0xec,0xe8,0x9b,0x0e,0x9a,0x4d,0xc2,0xdc,0xf4,0x27,0x04,0x1b,0xc5,0xe8,0x6d,0xa6,0x1f,0x94,0xa7,0xd1,0xbe,0xf7,0xe9,0xc0,0x39,0x0a,0x85,0xa4,0xbf,0x30 .byte 0x43,0x4b,0xf8,0x28,0x6d,0x6d,0xb9,0xa2,0x7f,0x64,0x0d,0x04,0x8b,0xd3,0xc5,0xab,0xe9,0xb0,0xa1,0x4c,0x85,0xe6,0x3d,0x3e,0x37,0xad,0x3e,0x27,0x72,0xaf,0x60,0x5a,0xd3,0xa3,0xf0,0x6a,0x67,0xfb,0xda,0xc5,0x41,0x81,0x2e,0xcb,0x75,0x00,0xf7,0xdf,0xf5,0xef,0x19,0x03,0x81,0x4f,0x70,0xc9,0xa4,0x40,0xbf,0xeb,0x39,0xff,0x14,0xf5 .byte 0xaf,0xcf,0x21,0x77,0x65,0x4e,0x96,0xf6,0xb3,0x9c,0x9a,0xb9,0xfe,0xe3,0x37,0x3f,0xf8,0x6e,0xc5,0x51,0x3f,0xd0,0xfa,0xef,0x7c,0x07,0x72,0xb6,0xca,0xcb,0xf8,0x20,0x94,0x74,0x8c,0xe9,0x0d,0x6b,0xfb,0x98,0x0a,0xec,0x90,0x05,0x33,0xc4,0x7d,0xfc,0x7b,0x95,0xd9,0xc3,0x67,0x0b,0xd7,0xdd,0xd8,0x67,0x3c,0xf1,0x84,0xf4,0x51,0x78 .byte 0x29,0xff,0x51,0x86,0xc8,0x84,0x6e,0x31,0x3c,0x6d,0xaf,0x8b,0xe0,0x2d,0xb0,0xc7,0xf5,0x19,0x87,0xe6,0x76,0xc7,0x5b,0xb7,0xd3,0xe0,0xb6,0x4c,0x65,0x95,0x74,0xaf,0x6e,0x5f,0x9c,0x67,0x98,0x1f,0x7c,0xec,0xd5,0xf8,0x47,0x24,0x1d,0x95,0xbf,0x95,0x6e,0x64,0x89,0xad,0x42,0x0a,0xe5,0x7f,0xc0,0x2e,0xc5,0x93,0xc2,0x06,0x20,0xe7 .byte 0xc2,0x3e,0x04,0x51,0x3b,0x61,0xce,0xda,0x84,0x95,0xba,0x59,0x2b,0x88,0x21,0x68,0xed,0x64,0xd7,0x13,0xb7,0x1b,0x5c,0xa2,0xbd,0xa6,0xd4,0x38,0x68,0xf3,0xd8,0x66,0x29,0x51,0x88,0x02,0xc7,0x87,0xa6,0x5b,0x29,0x5b,0x8e,0xb8,0xbf,0xff,0xc7,0x8c,0x98,0xe7,0xc5,0xc2,0x93,0x6a,0xc0,0xb4,0x04,0x8f,0x1a,0x2d,0xd4,0xea,0x1f,0x2a .byte 0xfd,0xf3,0x30,0x50,0xda,0xbe,0x81,0x0a,0x76,0xad,0x73,0xfc,0xd1,0x7d,0x06,0x58,0xeb,0x77,0x55,0x3c,0x8e,0xef,0x25,0x4d,0x78,0x0e,0xda,0x00,0x8c,0x8b,0x94,0xed,0x65,0x3d,0x51,0xbe,0xd2,0xa0,0x3d,0x8c,0xde,0x2e,0xd0,0xe5,0x8b,0x7c,0x1f,0x15,0x35,0x27,0xe4,0x62,0xa5,0xcb,0x40,0x29,0x63,0x51,0x35,0xbe,0x6b,0x0c,0xec,0xdd .byte 0xb8,0x35,0x89,0x03,0xdf,0x50,0x85,0xbc,0x93,0x34,0x83,0x65,0x7b,0xfc,0x34,0x7a,0x72,0x90,0x44,0xec,0x3e,0x6b,0xda,0x65,0x6a,0xaf,0x90,0xe3,0xcc,0x86,0xb4,0x1e,0x26,0x68,0x34,0x91,0xfd,0xcb,0x5d,0xac,0x04,0xff,0xdd,0x7a,0xe4,0x5c,0xd7,0x05,0x7b,0x4c,0xbc,0x26,0x31,0xb9,0xbc,0x9b,0xd0,0x0b,0x1e,0x1b,0x4b,0x0a,0x25,0x58 .byte 0x9b,0x11,0x66,0x16,0x07,0x15,0xd1,0x3a,0x68,0xfc,0xdb,0x88,0xcc,0x91,0x4b,0x2e,0xd7,0xe6,0x9d,0x13,0x3c,0x8c,0x0c,0x35,0x4d,0xc9,0xfc,0xc7,0xb6,0x7e,0xaf,0x02,0x7c,0xd4,0x8c,0xf9,0xf4,0x63,0x87,0x2f,0x0a,0xd1,0xf7,0x1f,0xd9,0xa8,0xd6,0x5c,0x1e,0xee,0xe7,0xb6,0x3b,0xa2,0x93,0x9e,0xa7,0x5b,0x66,0x38,0xb6,0xd3,0x39,0x6a .byte 0xb7,0xc4,0x34,0xf1,0x5d,0x50,0x45,0x32,0x59,0x90,0x5b,0x05,0xd8,0xed,0x6d,0x01,0xdb,0x1f,0x37,0x59,0x1b,0x42,0xc2,0x4c,0xc4,0x32,0xa1,0xc4,0xdf,0xa0,0x45,0x64,0x33,0x26,0x9b,0x6a,0x91,0x5f,0x8f,0x9a,0x21,0x8b,0xdc,0xed,0x5c,0xbb,0xcc,0xdc,0x75,0x21,0x14,0xbc,0x49,0x1a,0x3a,0xc7,0x5f,0xba,0x11,0xae,0x37,0x3f,0x9f,0x66 .byte 0xd4,0xf9,0x25,0xb6,0x7b,0xa8,0x85,0x9b,0x27,0x6a,0x3b,0xcc,0x87,0x72,0xa1,0xf1,0x41,0x15,0x98,0x37,0xea,0x63,0xb9,0xd3,0x44,0x81,0x26,0xec,0x7a,0xaa,0x5b,0xe9,0xe1,0xe1,0xd3,0x6b,0x31,0x38,0x7f,0xc4,0xd3,0xb1,0xcf,0xc8,0x61,0x70,0x49,0xe1,0xac,0x08,0xd3,0x64,0x4a,0xbc,0x1a,0xe4,0x76,0xa5,0xf1,0x12,0x42,0xbb,0x97,0x52 .byte 0x7d,0xf0,0x42,0xbb,0xc0,0x1c,0xda,0x40,0x04,0x98,0xa9,0x3f,0x0e,0xf2,0x6d,0x82,0x8e,0x52,0x7c,0xc1,0x91,0x54,0xe8,0xc0,0x69,0x09,0x25,0xc1,0xe8,0xea,0x57,0x8c,0x76,0x55,0x03,0xfc,0x39,0x1f,0x90,0x6b,0xb9,0x98,0xc3,0xc1,0x73,0x4f,0x4e,0xbf,0xc5,0x64,0x95,0x1e,0xba,0x7e,0x73,0x51,0x22,0xee,0x24,0xce,0x12,0x66,0x3e,0x84 .byte 0x4a,0x27,0x2e,0x45,0xc6,0x3d,0x4a,0x3a,0xbe,0xf9,0xb6,0x14,0x0a,0xf0,0xa5,0x94,0x14,0x69,0x2d,0x25,0x7d,0x60,0x9b,0x77,0x79,0xc5,0xd2,0xfd,0x1f,0x66,0xc5,0xad,0x99,0x7f,0x42,0x08,0xe2,0xc6,0x40,0xa8,0x8c,0x07,0xd2,0xa9,0x10,0x30,0x8d,0x80,0x4c,0x41,0xc5,0x42,0x67,0x09,0xbe,0x60,0xbf,0x0d,0xba,0x94,0x4f,0xb0,0x78,0xed .byte 0x60,0x91,0x26,0x99,0x9a,0x50,0x30,0x65,0xe3,0xa4,0x7b,0x76,0x32,0x85,0x29,0xeb,0x47,0x17,0x88,0xd4,0x05,0xf5,0xd9,0x6a,0xec,0x90,0x44,0x40,0x06,0xc7,0x77,0x45,0x9c,0x17,0xf8,0x25,0xcd,0x0f,0xeb,0xb3,0xcc,0x78,0x09,0x98,0xc5,0x68,0xb4,0xd8,0x9d,0x35,0xa6,0x33,0xf3,0xdd,0xee,0x8a,0xb5,0x3c,0x93,0xee,0x08,0xcf,0x1d,0xd1 .byte 0xf1,0x96,0x81,0xc0,0x3a,0xa1,0x5a,0x2b,0x69,0x6d,0x6a,0x4d,0x8d,0x5a,0xed,0xb3,0xd1,0x7a,0x29,0x99,0xa2,0x65,0x05,0x33,0x95,0xd8,0x2e,0xd8,0x73,0x3b,0x4e,0xc2,0x94,0x80,0x77,0x34,0xcb,0x0b,0x92,0x01,0x1e,0xaa,0x2b,0x1d,0xe6,0x03,0xc0,0xb4,0xb7,0x1f,0xed,0xf1,0x4b,0xb2,0x82,0x65,0x13,0x9a,0x9e,0x35,0x8d,0xe5,0xb8,0xb0 .byte 0xc8,0x93,0x04,0x1e,0x83,0xbb,0xcb,0x91,0x2b,0x8d,0x18,0x22,0xd0,0x73,0x4f,0xae,0x54,0x5f,0x8a,0x20,0x4a,0xa5,0x98,0x9e,0x37,0x68,0x5d,0xcc,0x41,0x86,0x2d,0xb3,0xe5,0x09,0xdb,0xbd,0xa1,0x27,0xbf,0x7a,0x69,0x05,0xb4,0xf2,0x06,0x11,0x80,0x57,0xbd,0x92,0xed,0xb5,0x26,0x3a,0x1a,0xea,0x70,0x99,0x04,0x90,0x07,0x4e,0xa7,0xc2 .byte 0x78,0x49,0x70,0x80,0x97,0x10,0xb8,0xd7,0x45,0x8a,0x23,0x99,0x80,0xa3,0x1c,0x66,0x26,0xdb,0xdc,0x82,0x3a,0x09,0x0c,0x1e,0x61,0x78,0x70,0x68,0x81,0x85,0x91,0x82,0x68,0x8e,0xed,0xeb,0xad,0xd1,0x6b,0xe7,0x52,0x29,0xca,0x5f,0x3c,0xd3,0x55,0xeb,0x11,0x19,0x99,0xe0,0xf0,0x33,0xdc,0x9f,0x53,0x52,0xeb,0xda,0xfd,0x35,0x89,0xc3 .byte 0xc8,0xa6,0x7c,0xd2,0xf3,0xab,0x8b,0xe1,0xbf,0xca,0xa7,0x24,0xd2,0xd4,0xa2,0xa5,0x94,0x2a,0x9e,0x90,0x82,0xb4,0xcd,0x9f,0xe8,0x1e,0x70,0xdb,0x67,0x60,0xb8,0x2b,0x3d,0x74,0x25,0x5c,0xd6,0xbd,0xc2,0x92,0xfb,0xdd,0x3f,0x1d,0x24,0xa0,0xbd,0xbe,0x42,0xc6,0x78,0xde,0xf7,0xa0,0x1a,0x6a,0x6a,0xd0,0x05,0xcc,0xec,0xf0,0x4c,0xa9 .byte 0x52,0x68,0xb0,0x41,0x7e,0xd8,0x73,0xf0,0x45,0x65,0xa4,0x6e,0xf1,0x9c,0xdc,0xa8,0x22,0x7f,0x50,0x67,0xb8,0x90,0xd5,0x1b,0x57,0x36,0x4d,0x16,0x98,0xf3,0xef,0x03,0xd7,0x76,0x31,0x1b,0xd3,0x22,0x56,0x30,0xda,0xaf,0x72,0xa8,0xf1,0xa4,0x88,0xee,0xfd,0x0b,0x46,0x26,0x9b,0x37,0xa2,0xc6,0x1d,0x42,0xb1,0x86,0xe3,0xef,0xaf,0xe6 .byte 0xfb,0xc9,0x90,0xbe,0x58,0xe1,0xea,0xe1,0xa6,0xd3,0xc0,0xf2,0xf3,0x31,0x09,0xc0,0x73,0x04,0xfb,0x96,0x53,0xb2,0xd5,0xb2,0x4a,0xeb,0xd2,0x7d,0xd3,0xcb,0x49,0xba,0xbd,0x1f,0xe6,0x00,0x16,0x84,0x4e,0xc0,0x63,0x00,0xe3,0xb5,0x47,0xa1,0x2c,0xda,0x72,0xb4,0x4b,0xc8,0x52,0x93,0x65,0x73,0xf0,0xce,0x84,0x6c,0x99,0xda,0x0a,0x00 .byte 0x06,0x60,0xa2,0x9d,0x95,0xe0,0x44,0x05,0x02,0x57,0x65,0x5a,0xa7,0x4f,0x9d,0x3c,0x9f,0x58,0xbd,0x5e,0x70,0x05,0xaa,0x05,0x14,0xb0,0x10,0xe4,0x6f,0xfa,0xd6,0xff,0xde,0x5f,0x1b,0x71,0x3e,0x0c,0x75,0x20,0xd4,0xe3,0xfc,0x3b,0xc0,0x0d,0xb0,0xad,0x64,0xea,0x46,0x38,0x0a,0x93,0xf4,0xcb,0x5b,0x16,0xd4,0x17,0xbe,0x69,0x13,0x6e .byte 0xe8,0x1d,0x6d,0xb0,0x2b,0x51,0xae,0x66,0xbb,0xf2,0xda,0x0a,0xea,0x21,0xba,0x01,0x41,0x51,0x00,0xe4,0x1a,0x72,0xf7,0x11,0xdf,0xc4,0x6d,0x9f,0x82,0xb6,0xde,0x3b,0xaa,0x32,0x8b,0x52,0x09,0x25,0x9d,0x84,0xc7,0xc2,0xa9,0xe4,0x8e,0x09,0x8f,0x38,0xf9,0x83,0xe7,0xa6,0xf2,0x88,0xbb,0x94,0x80,0xa1,0xce,0x7f,0x8e,0x91,0xfd,0xcb .byte 0xae,0xf2,0x71,0x57,0xa9,0x22,0x82,0xe2,0xb6,0xc8,0x08,0x7b,0x9b,0x85,0x7f,0x51,0x2b,0x03,0xd0,0x94,0x2d,0x2f,0x89,0xef,0x91,0xaa,0x0d,0xde,0xcc,0x0d,0xe9,0xb8,0x6f,0xed,0xed,0x0d,0x43,0x41,0x9c,0x3b,0x6b,0x52,0x41,0x09,0x49,0xad,0xff,0xd7,0x93,0x15,0x2e,0xae,0x54,0x07,0x42,0x13,0x59,0xe6,0xed,0x3a,0x68,0x42,0x1e,0x4b .byte 0xe8,0x5c,0xe3,0xa8,0x4f,0x1c,0x0e,0x7a,0xc8,0x62,0x5f,0x53,0x04,0x3c,0x86,0x3b,0xf7,0x8d,0x64,0xf6,0x1e,0x11,0x83,0x02,0x44,0xaa,0xf4,0xaa,0x5a,0xc8,0x57,0x98,0xd9,0xc2,0xc5,0xd7,0x06,0xc2,0xe7,0x56,0x9f,0xcd,0xa3,0x4a,0x8c,0xc1,0xb2,0xa3,0xc6,0x9f,0xd3,0x6c,0x4b,0x38,0xfd,0x23,0x98,0x42,0x78,0xca,0xd8,0x6c,0xfa,0x08 .byte 0xb8,0x87,0x0e,0x34,0x9b,0xc5,0xe1,0x15,0x98,0xf7,0x06,0xd3,0xc7,0x25,0xe4,0x0d,0x44,0x2a,0xe4,0xdb,0x45,0xae,0x41,0x80,0xac,0x15,0x45,0x16,0x51,0x59,0xe5,0x98,0x68,0xbd,0x9d,0x0d,0x96,0x42,0xbb,0xb5,0x48,0x67,0x7c,0x79,0x3d,0xee,0x73,0xe6,0x4f,0x87,0xd5,0x34,0x91,0xdb,0x0e,0x7b,0xdb,0x2d,0xb5,0xea,0x5d,0xe3,0xf7,0x64 .byte 0x47,0x41,0x95,0x75,0x3a,0x61,0x87,0x87,0xc6,0x51,0xeb,0x50,0xee,0x25,0x8d,0xc0,0xc5,0xb6,0x6f,0x67,0xca,0x45,0xb9,0xe0,0xad,0x2d,0x0c,0xe2,0x80,0xc2,0xf6,0xef,0xb7,0xa9,0xe3,0x44,0x76,0xe9,0x10,0x6f,0xc3,0x42,0xf5,0xa0,0x7b,0x15,0xd4,0x0f,0xde,0x72,0x1e,0x10,0x95,0xa0,0x03,0xbe,0x80,0xb0,0x24,0x06,0x84,0x24,0x1b,0x90 .byte 0x8d,0xe5,0xb7,0xa9,0xab,0x69,0xdf,0x4a,0xf4,0x69,0x63,0x6a,0x9b,0x19,0x6d,0x47,0xe9,0xd1,0xe6,0xcd,0x2c,0xff,0x5b,0xf9,0x73,0xe8,0xd7,0xa3,0x3c,0xbd,0x42,0x47,0xf1,0xcf,0xf6,0xdd,0x58,0x09,0x81,0x7d,0x67,0x43,0x07,0x0d,0xb1,0x24,0x07,0xdf,0xc8,0x1d,0x0a,0xb3,0x97,0x37,0xef,0xc6,0x42,0xe9,0xf4,0x46,0xf6,0x35,0xfd,0x26 .byte 0x11,0x0c,0xea,0x2f,0x34,0x96,0xe3,0x64,0x1a,0xca,0xaa,0x40,0x71,0xbe,0x00,0x43,0xd3,0x15,0x79,0x87,0x6a,0x78,0xfe,0x8b,0x20,0xd3,0x10,0xde,0xb1,0x49,0xf5,0xc6,0x14,0x4a,0x41,0xd0,0xf3,0xf1,0x61,0x00,0x0a,0xd6,0xf7,0x68,0x09,0x70,0xe9,0xd3,0xd2,0xf6,0x3c,0x0b,0x62,0x71,0xa4,0xd5,0x9d,0xfe,0xa1,0x7e,0x0c,0x52,0x44,0x1c .byte 0x4f,0x5d,0x11,0x20,0xa1,0x9c,0x35,0x10,0xc1,0xab,0x22,0x94,0x95,0xe5,0xac,0x92,0x30,0x4b,0x59,0x30,0x33,0xbb,0x36,0xd0,0xd6,0xde,0x6b,0x89,0x58,0x25,0xbb,0x20,0x86,0x00,0x24,0x40,0x79,0x53,0xea,0x73,0xb1,0xa3,0x05,0x0f,0x88,0xe8,0x35,0x19,0xd3,0xca,0x42,0x68,0xe0,0x5e,0x6f,0x1e,0xe2,0x75,0x9b,0x65,0xa7,0xf8,0x21,0x41 .byte 0x14,0x6e,0xf9,0xa5,0x28,0x12,0x8a,0xd4,0x75,0xfe,0x8d,0xef,0x0b,0x1f,0xd7,0x5e,0x9f,0x79,0xf9,0x8f,0xbb,0x78,0xf9,0xe6,0x5f,0x94,0x4b,0x5f,0xe7,0xdd,0xc9,0xa2,0x15,0x16,0xbf,0x47,0x45,0xd1,0x8c,0x05,0x59,0x7e,0xd9,0xf0,0x5a,0x70,0x52,0x01,0x72,0x90,0xef,0xe7,0x96,0xf5,0x0b,0xf3,0xa5,0x97,0xdc,0x3a,0xb8,0x9c,0x5c,0x57 .byte 0x34,0x65,0x35,0xfb,0xe1,0xde,0x62,0x45,0x08,0xc2,0xc5,0x8a,0x7a,0x88,0x66,0xdd,0x66,0xee,0xc6,0xc0,0xab,0xf7,0x7e,0x63,0x91,0x51,0xd9,0xe9,0x00,0xba,0x7e,0xfa,0x9e,0x61,0x5b,0xb8,0x18,0x67,0x15,0x02,0x3e,0xf2,0x73,0xd5,0x3e,0x71,0xc7,0x6f,0x8c,0x74,0x1c,0xd6,0xb6,0x1c,0xc1,0x27,0x67,0xae,0x96,0xc6,0x57,0x80,0x52,0x3c .byte 0x54,0x33,0xb5,0x14,0x05,0x68,0xe3,0x16,0x94,0xac,0x85,0x7a,0x57,0x76,0xe1,0xe5,0x49,0xe6,0xe0,0x56,0x5d,0xb2,0xf2,0x9e,0x01,0x7d,0x79,0xbe,0x83,0x9f,0x00,0x8a,0x69,0x68,0x8a,0xfd,0x5c,0x5d,0xea,0x87,0x1b,0x5f,0x55,0x36,0xf1,0x47,0xf3,0x5a,0x64,0xb2,0x13,0xd3,0xac,0x13,0xbb,0xfe,0xe3,0xb6,0x69,0xdf,0x25,0x1d,0x9e,0x00 .byte 0x90,0xc2,0x21,0x96,0x2f,0x0f,0x9f,0xe6,0x37,0x23,0xd6,0xe0,0x00,0xbc,0xa5,0xb0,0x01,0x54,0xbd,0x70,0xbb,0x53,0xd7,0x80,0x38,0x6b,0xc0,0xa8,0x50,0x64,0x1f,0x94,0xf0,0xb4,0x67,0x62,0x62,0xad,0x91,0x0a,0x1e,0x5b,0x15,0xa8,0x65,0xea,0x8a,0xaf,0xf0,0xe7,0x76,0xce,0x36,0x16,0x97,0xf8,0x1c,0x5c,0x90,0x04,0xa3,0xbe,0x5a,0x64 .byte 0x9f,0xd3,0x1d,0x7b,0x25,0x91,0x5b,0xbc,0xce,0xc3,0x15,0xf0,0x7f,0xe8,0xa2,0x6b,0x54,0xe4,0x61,0x88,0x18,0xee,0x5c,0x13,0xa8,0xae,0x16,0x94,0x48,0x1c,0x67,0x2c,0xc4,0x9f,0x5d,0x01,0x36,0x21,0x5f,0xf4,0x64,0x60,0x8e,0x1a,0xc5,0x61,0x18,0xea,0x44,0x6a,0xcc,0xd4,0xf2,0x2c,0xb0,0xa6,0x6b,0x54,0x3e,0xcd,0xa4,0x55,0x26,0x55 .byte 0x94,0xa1,0x26,0xc1,0xb1,0x81,0xa1,0xcb,0xbe,0x74,0x1b,0x64,0x5b,0x91,0x73,0x94,0xc8,0xaa,0xfa,0xc0,0x22,0xc5,0xb0,0xc6,0x59,0x23,0xb2,0x95,0x41,0x04,0x62,0x98,0x9c,0x3a,0x6a,0x78,0xd2,0xc0,0x74,0xbf,0x65,0x15,0xac,0x66,0x0c,0x84,0xa2,0x66,0xdf,0xf7,0x69,0xd5,0x8b,0x79,0x87,0x5a,0x77,0xa1,0xe8,0x43,0x5d,0x01,0x1b,0x13 .byte 0x2b,0x4e,0x69,0x5f,0x07,0xa4,0x3d,0xb7,0xc7,0xd0,0x6c,0xcc,0x2e,0xe0,0x87,0x9d,0x23,0xec,0x15,0xbe,0xe3,0xbe,0x53,0x21,0x2d,0x2e,0x22,0xa4,0x47,0x6e,0xff,0xc6,0x57,0xe6,0xe6,0x41,0xb3,0x08,0x02,0xa1,0x8c,0x6d,0xb1,0xd9,0x61,0xfe,0xc5,0x55,0xf5,0xf3,0xea,0x97,0x6d,0x7f,0xc7,0x36,0x6f,0x00,0xb7,0x80,0x9c,0xb3,0x04,0x55 .byte 0xf5,0xf8,0x29,0xae,0x88,0x46,0x4f,0x78,0xb5,0x81,0x59,0x4b,0x33,0x98,0x19,0x08,0xc2,0xce,0x61,0x0f,0x66,0x45,0x07,0x2f,0x73,0xbd,0x10,0xa6,0x32,0x3c,0xdf,0x3a,0xa5,0x07,0x6e,0xf8,0xa8,0x0d,0xb8,0xb2,0x78,0xd1,0x9f,0x50,0x9e,0x35,0x1a,0x6e,0xcb,0xd9,0x76,0x40,0xb9,0x48,0xa4,0x8f,0x91,0x52,0x66,0xa3,0xc5,0x4f,0x69,0x07 .byte 0xed,0xe0,0xd7,0xd8,0xc1,0x72,0x62,0x9a,0x52,0xbc,0x17,0x1e,0x26,0xdc,0x06,0xde,0xa2,0x04,0x4a,0x67,0x24,0x30,0xca,0xff,0x01,0x50,0x20,0xf1,0xfe,0xaf,0x70,0x8d,0xdf,0x86,0x0f,0x8e,0x94,0x92,0xa6,0x41,0x69,0x96,0x0f,0x20,0xd9,0xba,0xab,0x68,0x69,0x8a,0x7e,0x6f,0xda,0x48,0x7a,0xc8,0x53,0xb0,0x8f,0xe5,0x8f,0x6f,0x29,0xc2 .byte 0x72,0xf1,0x6f,0x7f,0x41,0x1f,0xd3,0x8f,0x66,0xe1,0x17,0xe1,0x91,0xd8,0x60,0x7f,0x52,0xf0,0x50,0xa5,0xcd,0xa1,0x92,0x9a,0x8f,0x45,0x0f,0x84,0x6a,0x95,0x25,0x7e,0x22,0x2d,0xb0,0x74,0x2c,0x60,0x62,0x69,0x17,0x8b,0x08,0x41,0x5c,0xbf,0x4f,0x5c,0x7b,0x99,0x21,0xe0,0xcd,0x26,0x24,0xf4,0x4f,0x72,0xbf,0x9a,0x80,0x13,0x4b,0xcf .byte 0x5a,0x60,0xd3,0x35,0x1c,0xf2,0x54,0xdd,0x99,0x12,0x8b,0xfa,0x6d,0xa2,0xf0,0xb3,0x02,0xac,0x1a,0xfc,0x2d,0xfe,0x35,0x5d,0x33,0xd4,0x41,0x2b,0x75,0xfb,0xbd,0x4a,0xd6,0x60,0x99,0xfb,0x8e,0xa5,0x4b,0x2a,0x38,0x6b,0x31,0x40,0xfe,0x38,0xc0,0xec,0xe1,0xf7,0x17,0x0b,0x13,0x61,0xda,0x9e,0x26,0xea,0x16,0x46,0x62,0x12,0xb6,0xa3 .byte 0x01,0x2d,0x40,0x84,0x9b,0x91,0x42,0xed,0x04,0x2a,0xd8,0x90,0xbd,0xc3,0x8f,0xb4,0xfb,0x6f,0xa3,0xb8,0x76,0x77,0xe0,0xe7,0xa6,0x99,0xde,0x16,0x8a,0x0a,0x84,0x12,0xc6,0xd6,0xea,0xfa,0x7d,0x81,0x39,0xff,0xb8,0x70,0xa5,0x7e,0xda,0x19,0x6e,0xb7,0x94,0x57,0xa9,0xa3,0xea,0xf2,0x77,0x49,0xf6,0xb4,0x82,0x1b,0x58,0xa7,0x65,0xdb .byte 0x27,0x00,0xb6,0x30,0xba,0x25,0xbe,0x07,0x5c,0x1a,0x66,0x4a,0xd3,0x5c,0xa2,0x31,0x4d,0x38,0xfe,0xf5,0xcb,0xef,0xa1,0x80,0xa0,0x53,0x8f,0x7b,0xae,0xe3,0xe0,0x2d,0x93,0x09,0xd0,0xc6,0x43,0x4d,0xe7,0x58,0x6c,0x45,0xa7,0x74,0x51,0xe9,0x57,0xd0,0xbf,0x11,0xcd,0x12,0x25,0xce,0x0c,0xaa,0xdd,0xa3,0xed,0x25,0x58,0xbb,0xdb,0x94 .byte 0x21,0x06,0x08,0x78,0x80,0x5f,0x14,0xc4,0x4f,0x25,0xb2,0xa1,0x8e,0x58,0x9d,0xc7,0x63,0xf0,0xef,0x66,0xc8,0x03,0x74,0x3a,0x3a,0xea,0x65,0x5a,0xb6,0x02,0x88,0xbc,0xbe,0x60,0x57,0xdf,0x5c,0x72,0xc6,0x06,0xbd,0x4b,0x9b,0x90,0x78,0xc1,0x97,0xdf,0xf4,0xa4,0xe7,0x75,0xed,0x3f,0xf6,0x4a,0x33,0x31,0xd7,0xed,0xa3,0x1f,0xb9,0x52 .byte 0x4e,0x59,0x03,0x66,0x89,0xee,0x9b,0xaa,0xfd,0x67,0xd0,0x3a,0xb4,0xfe,0x86,0xfe,0x14,0x7c,0x71,0x4a,0x2f,0xff,0x11,0x85,0x25,0x8e,0xc5,0x72,0xb9,0x8c,0x78,0x91,0x17,0x27,0xcf,0x0e,0xc0,0x46,0xaa,0x08,0x2d,0x49,0x84,0x4e,0xdf,0x9a,0xbc,0x50,0xa2,0x50,0x1f,0x52,0x0a,0x36,0x32,0x1f,0x1f,0x7d,0xf4,0x15,0x2b,0x01,0x34,0x50 .byte 0xa8,0xa3,0x98,0xa6,0xd0,0x44,0x20,0x44,0x55,0x8f,0xf0,0x99,0xc1,0xaf,0x0f,0x54,0xee,0xea,0xb8,0xb6,0xf4,0x14,0xdb,0x4f,0x9d,0x31,0x66,0x7d,0x08,0x92,0xfb,0x20,0xda,0x3e,0x6e,0xfe,0xb9,0x57,0x41,0x63,0xb8,0x10,0x8e,0x7c,0x12,0x01,0xa3,0x0b,0x0c,0x19,0xce,0x14,0xc7,0x13,0xc6,0x72,0xf6,0x6f,0x4d,0x8d,0x2b,0xaf,0x96,0x1c .byte 0xfc,0xcc,0x38,0x0b,0x7e,0xb7,0x44,0x1e,0x37,0xc6,0x2d,0x72,0xfb,0x20,0x40,0x07,0xa9,0x97,0xb3,0x17,0xc1,0x0a,0x65,0x75,0x57,0xda,0xc9,0xdc,0xcb,0x6a,0x3b,0xaa,0xd6,0x57,0x45,0xdb,0x22,0x9f,0x9c,0x0b,0x53,0xb3,0x08,0x9f,0xe3,0x79,0x0f,0xb1,0xa9,0x18,0xcc,0x96,0xf2,0xd0,0x8d,0xb0,0x4f,0x50,0x2d,0xec,0x03,0x26,0x8e,0x8b .byte 0xeb,0x9b,0x52,0xa5,0xfc,0x2e,0xcc,0xcf,0x7b,0x1b,0x11,0x44,0x01,0x71,0x8b,0x03,0x5d,0x08,0x56,0x67,0x3a,0xe0,0x9d,0xb5,0xec,0x3f,0xce,0x7d,0x0f,0xb3,0x2b,0x1f,0xcc,0x0e,0xba,0xa8,0x69,0x22,0xa7,0x14,0x8a,0x7b,0x7c,0xa8,0x81,0x62,0x03,0x9c,0x3d,0x1e,0x27,0x09,0x4f,0xda,0x8b,0x0f,0x71,0xbc,0x87,0x9b,0xa9,0x48,0xed,0xa0 .byte 0xf3,0x52,0xa1,0x4d,0xdd,0x57,0xa5,0x4f,0x38,0xdc,0x5a,0xd4,0x24,0x7a,0x9c,0x62,0xf3,0x51,0x54,0x28,0x1f,0xef,0x92,0x81,0x9c,0x80,0x1d,0xa3,0xe1,0xb8,0xb4,0xf4,0xb9,0xa1,0x43,0x27,0xc8,0x99,0x10,0x36,0x22,0xf8,0x7f,0x86,0xe2,0x5f,0x2f,0x21,0xe2,0x7e,0x16,0x9a,0xe7,0x29,0x3e,0x6b,0x03,0x32,0xcf,0x64,0x86,0xa1,0x8a,0x1e .byte 0xce,0x15,0x12,0x8c,0xa9,0x71,0x2e,0x96,0x2b,0x70,0x94,0x51,0xeb,0xf9,0x59,0xa0,0x69,0xa7,0x1a,0xec,0x21,0x8b,0xea,0xa6,0xd5,0x8b,0x60,0x17,0x51,0x88,0xe5,0x5f,0xf5,0xc5,0x6c,0x0f,0xf3,0x32,0xef,0xab,0x5f,0x25,0x14,0x36,0x61,0x41,0x7d,0x7c,0x94,0x3a,0x3f,0xa5,0xbb,0xf1,0x52,0x2a,0xd1,0x9b,0xbe,0x5e,0x93,0xa1,0x9d,0xd3 .byte 0xb7,0x19,0x7f,0x86,0x32,0x62,0xbc,0x5b,0x53,0x8a,0x41,0x0c,0x45,0x5b,0xc4,0xfd,0x78,0xfc,0xc2,0x6f,0x90,0xef,0xea,0xbd,0xd6,0x63,0x27,0xc8,0xcf,0x8a,0x7f,0xb1,0x04,0x10,0xe0,0x30,0xd9,0xba,0x57,0x24,0x6d,0x3d,0x9a,0x2a,0x90,0xfc,0x7e,0x49,0x28,0xda,0x89,0x89,0xcb,0xab,0x23,0xfb,0x85,0xbd,0x2c,0xca,0xf2,0x6b,0x59,0x7d .byte 0x9c,0x06,0x88,0xd3,0xc5,0x5e,0xbd,0xa3,0xb5,0xbe,0x59,0xba,0xd9,0x73,0x43,0x99,0xf4,0xd1,0xf0,0x78,0x76,0xff,0x13,0x6b,0xc9,0x91,0x7e,0xad,0x4a,0x00,0xf3,0x05,0xa5,0x8d,0x17,0xf7,0xd8,0x5b,0xad,0x34,0x23,0x74,0xed,0xb6,0xa7,0x1a,0x0b,0x6a,0xf1,0xe8,0x8a,0xe5,0x81,0x0e,0xc2,0xe3,0xa0,0x8b,0x8e,0xca,0xed,0x50,0x03,0x8b .byte 0xc0,0x0c,0xee,0x7c,0xde,0x3f,0xbc,0xd8,0x58,0x87,0x97,0x0c,0x12,0xed,0x08,0xa4,0xf0,0x12,0x6d,0xea,0xae,0x9f,0xc8,0x3e,0x7c,0xfa,0x7d,0x19,0x8d,0xad,0x38,0xdd,0x61,0x2e,0x58,0x05,0x23,0x92,0x83,0x63,0xe6,0x8e,0x86,0xbb,0xba,0xf3,0xe8,0x4b,0xf8,0xe6,0x6b,0xfd,0xeb,0x1d,0x6a,0xd5,0x8e,0x78,0x77,0x30,0xd5,0xb4,0x32,0x86 .byte 0xd0,0xa6,0x26,0xf7,0xc6,0xd3,0xfc,0xd1,0x65,0x65,0xae,0xe2,0x2c,0x52,0xf7,0x36,0x4f,0xff,0xe2,0x6a,0x2a,0xd5,0x8c,0x85,0x5e,0xbf,0xbc,0xda,0x38,0x56,0xb2,0xc3,0x6c,0x5d,0x0f,0xdf,0xe4,0xb8,0x6a,0x43,0xd6,0x8b,0x55,0x5e,0xf5,0x38,0x46,0x26,0x25,0xe1,0x01,0x67,0x09,0xc8,0xc2,0xa7,0x23,0x30,0xf3,0x6d,0x25,0xf0,0x2e,0xa2 .byte 0x51,0x2d,0x00,0x72,0x8d,0x47,0x0e,0xdd,0xa1,0xd8,0x88,0x06,0xbb,0x49,0x33,0xa1,0x07,0x62,0x3d,0xa5,0x31,0x9c,0x62,0x71,0xde,0x89,0xd2,0xcf,0xcf,0x53,0x24,0x54,0x86,0x52,0xae,0xdf,0x4a,0xff,0x5b,0x80,0x66,0xf5,0xd3,0xc0,0x56,0x76,0xc9,0xd0,0x53,0xd7,0xd8,0xd8,0x1d,0x39,0xfb,0xb3,0x06,0x89,0x07,0x5d,0x68,0xf0,0xc8,0x0b .byte 0x90,0xbe,0x5b,0x95,0xac,0x3c,0x7d,0x81,0x6e,0x10,0xf6,0x77,0x35,0x72,0x31,0x12,0x5f,0x3b,0x2d,0xd5,0x7e,0x68,0x02,0xde,0x06,0xd9,0xa8,0xc5,0xb8,0x9b,0xa0,0xbd,0x24,0x3a,0xdc,0xea,0x3d,0xb7,0x44,0x87,0x70,0xe7,0x07,0x6d,0xf1,0xa4,0xe8,0xbd,0x1a,0xa9,0x12,0xf3,0xfa,0x62,0x6f,0x68,0x42,0xe5,0xbf,0x1f,0xb6,0x6e,0x35,0xa3 .byte 0xc8,0xc3,0x11,0xb0,0x09,0x68,0xbe,0x99,0xf7,0x2e,0xac,0x2d,0x55,0x81,0x0d,0xbc,0xcc,0xec,0xbf,0x52,0x50,0x22,0xf2,0x7a,0x10,0x2d,0xe7,0x46,0xd6,0x9d,0xee,0xb7,0xa1,0xa0,0xaa,0xc9,0xa2,0x32,0x0c,0x99,0x6e,0x76,0x36,0x53,0x0e,0x0f,0x00,0x96,0x0b,0x5f,0x6b,0x80,0xc5,0xe2,0xcf,0x1d,0xe3,0x97,0x54,0x07,0x9b,0x3e,0xf3,0x74 .byte 0xee,0x1e,0x93,0xaa,0x68,0xbd,0x7b,0x39,0x6e,0x4d,0x2c,0x67,0xe2,0x45,0xcb,0x35,0x3a,0x04,0x53,0x49,0x74,0xde,0xfb,0xfd,0x80,0xa1,0x0b,0x8d,0xb9,0x9e,0x9a,0x6f,0x4d,0x09,0x4b,0x4e,0x90,0x30,0xf4,0xe2,0x53,0x00,0xc3,0x33,0x59,0x0e,0x56,0x6c,0xd6,0xb9,0x4f,0xc1,0x44,0x6b,0x79,0x85,0x9e,0x2a,0x37,0x0f,0xc2,0xa7,0x63,0xca .byte 0x6d,0x18,0x2e,0xd7,0x24,0xf3,0xc3,0x08,0xe9,0xf8,0x29,0x32,0x8a,0xb3,0x28,0x1a,0x93,0x7a,0x47,0xff,0xd0,0x9a,0xe4,0x97,0xef,0x4a,0x23,0xb5,0x61,0x1d,0x64,0x7c,0x69,0x90,0x5b,0xba,0x70,0x41,0xa6,0x51,0x08,0xf3,0x48,0x8e,0x0c,0xba,0x30,0x54,0x17,0x26,0xc7,0xd0,0x85,0x27,0x45,0x92,0x80,0xb1,0xe7,0xf2,0x1e,0xae,0x35,0x1e .byte 0x29,0x61,0x74,0x2d,0x55,0x22,0x04,0xfd,0xa2,0xf0,0x7c,0x15,0x9a,0x3e,0xee,0x5a,0xa3,0x1b,0x83,0xc0,0x45,0x1e,0x49,0x81,0xb1,0xa1,0xff,0x78,0x69,0xcf,0x95,0xc8,0x8d,0x3b,0x0f,0xfe,0x2e,0xde,0x6e,0x57,0x69,0x87,0xaf,0x30,0x88,0xbc,0x70,0x8c,0x79,0x84,0x9f,0x52,0x46,0x9d,0x34,0x3a,0xe5,0xe4,0x98,0x9f,0x43,0x77,0x40,0x99 .byte 0x58,0xae,0x60,0xfd,0xef,0xc9,0x62,0x9e,0x89,0x7f,0xe3,0x2f,0x4e,0xdc,0xb8,0xb8,0x8d,0xdf,0x31,0x5f,0x73,0xed,0x42,0xdf,0x58,0xd0,0xe1,0x50,0x60,0xf1,0x04,0xab,0x3c,0x5c,0xe4,0x5f,0xc1,0xa1,0xeb,0x51,0x61,0x5b,0xab,0x47,0x71,0xbb,0xcc,0x14,0x6c,0xeb,0x84,0x4f,0x87,0xde,0x11,0x7d,0xb7,0x37,0x99,0x35,0xdb,0x31,0x4f,0x0e .byte 0xfe,0xbb,0x16,0x7b,0x9c,0x62,0x33,0x33,0x98,0xaf,0x86,0x29,0x69,0xe7,0xc9,0x64,0x87,0x81,0xff,0xf5,0xbd,0xf0,0xe2,0x41,0xf9,0x24,0xe3,0xd3,0x55,0xa5,0xdc,0xf3,0x35,0xb4,0x3d,0x55,0x31,0x51,0x77,0xbd,0x1c,0xe4,0x46,0xe8,0x2b,0x5c,0xc9,0x35,0x7f,0x84,0xde,0x25,0x8c,0x61,0xff,0x09,0xd4,0x5f,0xd8,0x3b,0xa8,0x8b,0xa5,0xa9 .byte 0xe8,0xa8,0xe2,0xef,0x82,0x6d,0x60,0x3e,0xc6,0x48,0x73,0x03,0x04,0x81,0x11,0x10,0xee,0x41,0xdb,0xc3,0xb9,0x78,0xd9,0xf0,0x32,0xa1,0xcc,0xa5,0x4a,0x67,0xe7,0x6b,0x21,0x6c,0x64,0x06,0x2c,0x8c,0x52,0x53,0xaa,0xb5,0x28,0x4d,0xd6,0xc6,0xa5,0x09,0x43,0x37,0xd6,0x73,0xfc,0xe7,0xf6,0x88,0x50,0xbc,0x81,0x7b,0xa5,0x92,0xa7,0x0b .byte 0x86,0x5d,0x20,0x0c,0xbf,0x4d,0x1f,0x47,0xd1,0xd6,0x48,0xf4,0x64,0x55,0x99,0x7c,0x74,0x15,0x21,0xa8,0xeb,0x35,0xf2,0x86,0xc1,0x5e,0xbf,0x80,0x34,0x4b,0x44,0x38,0x21,0xd2,0x01,0x7d,0xf7,0x51,0x0c,0x02,0x03,0xe9,0x60,0xdf,0x80,0x36,0x40,0xfc,0x0a,0x96,0xbc,0x2e,0x88,0x8e,0xa4,0xa7,0x1c,0xc8,0x42,0x34,0xb5,0xd9,0xda,0xd7 .byte 0x74,0x19,0xf7,0xff,0x0f,0x56,0x2c,0x02,0x48,0x92,0x5c,0x82,0xb3,0x7d,0x1d,0xef,0xd1,0xec,0x86,0x9b,0x3f,0xa8,0xb7,0xfa,0x02,0x44,0xb5,0x19,0x0c,0xce,0xd8,0x66,0xc6,0x48,0xbe,0x97,0xbd,0x4c,0x65,0x3a,0x09,0x5a,0x79,0xb9,0xa1,0x48,0xb4,0x2a,0x5d,0x10,0x61,0xac,0x17,0xd3,0xf6,0x13,0x1d,0x71,0x08,0x86,0xc8,0x4e,0xab,0xb9 .byte 0x0d,0x6f,0x7f,0x79,0xe8,0xf8,0x85,0x68,0x8f,0xac,0x98,0x93,0xbf,0xe5,0xf6,0x84,0x5e,0x47,0x9d,0xc4,0x21,0xb6,0xf8,0x17,0x1a,0xb9,0xff,0x8f,0xfd,0xd8,0xc1,0x6f,0xb8,0x74,0xb9,0xfa,0x55,0xd9,0x33,0x3e,0x98,0x3d,0x0e,0x3b,0xfa,0x2c,0x13,0xf4,0xcb,0x2a,0x4e,0x74,0x33,0x6a,0x50,0x49,0xeb,0xb6,0x87,0xb2,0x8d,0x24,0x38,0xc2 .byte 0x01,0x80,0xf7,0x7c,0x4e,0x8d,0xa5,0x79,0xed,0x43,0xd6,0x82,0x6a,0x2e,0x0a,0x6c,0xe3,0x58,0x26,0x7a,0xc2,0x68,0x84,0x78,0x5c,0x67,0x33,0x97,0x97,0xd8,0x7e,0xeb,0x40,0x9d,0x61,0x25,0x6a,0x2f,0x63,0x9c,0xae,0x05,0xcf,0xb5,0x39,0x4e,0xb0,0xdb,0xc9,0x2e,0x14,0x3c,0x6b,0xda,0x02,0x6f,0xf8,0x73,0xab,0xe4,0x1e,0xaa,0x2c,0x62 .byte 0x41,0x65,0x5f,0x2c,0x5b,0xcb,0x56,0x8e,0x61,0x6a,0x57,0x21,0x8d,0xe5,0x8e,0x44,0x4f,0xfb,0x69,0x45,0x46,0x62,0xe3,0x12,0xe6,0x36,0x00,0x82,0x6a,0xa5,0x5e,0xfd,0x01,0xde,0xd1,0x9e,0xd7,0x3c,0x88,0x44,0x66,0x5d,0x0c,0x9f,0x0a,0x03,0xc8,0x79,0x96,0x54,0xf3,0x33,0x69,0x1e,0x98,0xe9,0x85,0x4a,0x8a,0xf7,0x3a,0x5e,0x02,0xe7 .byte 0x88,0x23,0x41,0x08,0x4f,0x4b,0xf5,0xde,0x3a,0xbc,0x0d,0xfa,0xec,0xf2,0x74,0x63,0x51,0x4a,0x49,0xae,0x82,0xc0,0x9b,0x08,0x96,0x99,0x6b,0x13,0xb8,0x47,0x55,0x63,0x80,0xc0,0x41,0x83,0xf3,0x77,0x6b,0x76,0x0d,0xd6,0x32,0xbb,0x6f,0xfb,0xa9,0xfa,0x86,0x6e,0xe2,0xa3,0x0d,0x34,0x3c,0x8a,0x0d,0x06,0xbb,0x34,0x98,0xf2,0xad,0x2c .byte 0x81,0xb8,0xd5,0x8e,0x78,0xa6,0x63,0xbd,0x3c,0x9e,0xb5,0x3b,0x2e,0xf4,0x28,0x57,0x06,0xe0,0xcf,0xef,0x4b,0x3e,0xfd,0x2e,0x6f,0xb8,0xff,0x5b,0x78,0x2e,0xa2,0x05,0xa5,0xcd,0x43,0x6f,0xf5,0xfe,0xe9,0xcd,0xda,0x48,0xfd,0x8f,0x74,0x0e,0x60,0x47,0x04,0xed,0x17,0xd8,0x67,0x7a,0x65,0x7f,0x45,0x0c,0x5f,0xf0,0x3a,0x6a,0x88,0x14 .byte 0xb2,0x04,0xf6,0x95,0x1b,0x20,0xf3,0x94,0x77,0xaa,0xf3,0x57,0x09,0xbf,0x7e,0x1f,0x51,0x08,0x7e,0x7f,0x7c,0x9f,0xfd,0x33,0x47,0xb1,0x94,0x36,0x67,0x54,0x8c,0x2b,0x6c,0xb0,0x32,0xc5,0xc3,0x9b,0x9f,0x5b,0x71,0x94,0x20,0x86,0xc9,0x16,0x82,0xa9,0xe7,0xe4,0x58,0x63,0x7a,0x6a,0x25,0x0e,0x9f,0x00,0xc8,0x65,0x14,0xbf,0xf0,0x4e .byte 0x33,0x9f,0x0e,0xe7,0x10,0x61,0x21,0x6c,0x9c,0xf0,0x42,0x52,0xb6,0x5c,0xcd,0xbf,0xe6,0x20,0xe6,0xa7,0x20,0xe9,0x94,0x8b,0x29,0x1f,0x33,0x93,0x1a,0xc6,0x49,0xfb,0x1c,0xb6,0x2c,0x12,0x4a,0x2a,0x31,0xc7,0xc9,0xd1,0x73,0x53,0xbe,0x02,0x6d,0x58,0x9b,0x0e,0xfa,0x90,0x84,0x40,0x58,0x06,0x99,0x6b,0xfe,0x4d,0xbb,0xe2,0x9d,0x09 .byte 0x74,0x4f,0xf8,0x5d,0x59,0xbf,0xac,0x39,0xe5,0xf0,0xa2,0x89,0xf3,0x78,0xbe,0xb1,0x85,0x48,0xd6,0x1c,0x92,0x2b,0x85,0x87,0xc4,0xa6,0x81,0x64,0xf0,0xd1,0xe0,0x40,0xc8,0xd9,0x66,0xb9,0x06,0x21,0x8e,0x02,0x27,0x93,0xac,0xc3,0x79,0x20,0x43,0x62,0xa8,0xe1,0xcd,0x52,0x19,0xe5,0xf1,0x10,0x7a,0xc5,0x3e,0xe0,0x20,0xd0,0xc8,0x5f .byte 0x47,0x41,0x97,0xe4,0x65,0x6f,0x89,0xf6,0x51,0x4c,0xd6,0x1b,0x71,0xd2,0x9a,0x1c,0xca,0x5a,0x9a,0xf2,0x44,0xed,0x3f,0x50,0xf2,0xf6,0x11,0x48,0x23,0xf9,0x82,0x90,0x5c,0x65,0x1a,0x2a,0xfc,0x9e,0x8b,0x64,0xa6,0x46,0x16,0x80,0xd4,0xcc,0xe2,0xd0,0xcd,0x7f,0x30,0xfd,0xd2,0x11,0xa1,0x5c,0x6f,0x7e,0x4b,0x81,0x03,0x98,0x85,0x44 .byte 0x54,0x8a,0x9d,0x1b,0x5c,0x6c,0xe4,0xe3,0x61,0xe5,0x85,0xa7,0xfe,0x03,0x34,0xe0,0xed,0xff,0x46,0xba,0x0f,0xac,0x79,0x6d,0x47,0x60,0x08,0xba,0x95,0x8c,0xe6,0x7d,0x33,0xca,0x82,0x8a,0xe6,0x1e,0x1f,0xb4,0xba,0x49,0x51,0x05,0x2b,0x18,0xb3,0x7c,0x5f,0x12,0xa2,0x2f,0x96,0x28,0xab,0xe8,0x16,0xac,0xfe,0xa0,0x83,0xbd,0x86,0x1b .byte 0x53,0xc1,0xab,0xed,0x42,0x2a,0x8b,0xaa,0x90,0x3f,0xcd,0x20,0xd7,0x9e,0xb8,0x3b,0xcd,0x5a,0xc9,0xea,0xbe,0xb2,0x7b,0x38,0xe4,0x16,0x95,0xaa,0xee,0xf6,0x1e,0xbd,0x1a,0x0f,0x89,0x96,0x35,0x0b,0x61,0xa9,0x87,0xca,0x35,0x27,0x25,0x1a,0xd6,0x31,0x8f,0xc4,0x10,0xf6,0xb7,0xff,0x3a,0x6a,0xb0,0xb7,0x7f,0x44,0x4c,0x08,0xaf,0x17 .byte 0xe4,0x4a,0x0a,0x52,0x83,0x3e,0x11,0x53,0x7f,0x86,0x09,0x23,0xc7,0x46,0x3c,0x6d,0x66,0x2b,0xd0,0x82,0x08,0x02,0xa3,0x41,0x21,0x29,0x5e,0x68,0xa3,0x11,0xa9,0x8f,0x91,0xb9,0x60,0x87,0x22,0x37,0xfe,0x04,0xea,0x09,0x9f,0x96,0x6c,0x1e,0x67,0x31,0x9f,0x81,0xa9,0xeb,0xb0,0x1f,0xe0,0xb0,0xf4,0xf4,0xb9,0xa1,0x3f,0xb8,0xc7,0x83 .byte 0x53,0x74,0x34,0x7b,0xfb,0xcd,0xf2,0x6e,0xe6,0xa3,0x26,0x86,0x57,0xb7,0x57,0xa2,0x24,0x43,0xd2,0xdd,0x9e,0x30,0xeb,0x3f,0xf5,0xa2,0x84,0x97,0xc0,0x23,0x63,0xee,0x84,0x8e,0x01,0xa2,0x57,0xf2,0xa1,0x48,0x6f,0x0f,0x19,0x31,0xae,0x26,0x08,0x4a,0x13,0x7e,0xde,0x85,0xb8,0x72,0xea,0x69,0x17,0x51,0x94,0x17,0x96,0xc1,0xc6,0x93 .byte 0x10,0x38,0x0c,0xba,0xd1,0x86,0x57,0x5e,0x39,0xd5,0x7f,0x50,0x0e,0x94,0x8b,0xc4,0x1b,0x3d,0x40,0x3c,0xfb,0x49,0x48,0xf9,0xf4,0xd8,0x0d,0xb2,0x3a,0xa9,0xd9,0x29,0x31,0x57,0xc7,0x65,0x1e,0x86,0x77,0x9d,0x53,0x8c,0x60,0x83,0xb0,0xea,0x19,0x76,0x8e,0x02,0x73,0x69,0x2c,0xd6,0x25,0xbd,0x83,0xd1,0xf3,0xfd,0xb7,0x51,0x95,0x07 .byte 0x51,0xf8,0x36,0xc9,0x8d,0xc1,0xec,0x47,0x3f,0xfa,0x19,0x8c,0xd5,0x07,0x20,0xd1,0x9f,0xff,0xb2,0x25,0x2d,0xe0,0xe4,0xa2,0xa3,0x29,0xbd,0x81,0x34,0xbf,0x60,0x04,0x8c,0x80,0x68,0xce,0x8b,0xbf,0xfa,0x50,0x12,0xdf,0x26,0x6c,0x9c,0x90,0x68,0xd9,0xfd,0x3b,0xc5,0x10,0xb3,0xd2,0xdf,0x17,0xae,0xf8,0xb0,0xe5,0xf3,0x44,0x5f,0x01 .byte 0xbc,0x86,0x11,0x74,0xda,0x06,0x4b,0xac,0x49,0x75,0x77,0x65,0x38,0x97,0x1c,0x7c,0x8c,0x69,0x5b,0x9e,0x17,0x30,0x14,0x4f,0xf0,0x2d,0xd5,0xd6,0x78,0x56,0x27,0x96,0xe4,0xb8,0x69,0x1f,0xd5,0xaa,0x27,0x50,0x80,0x09,0xed,0x14,0x8f,0x36,0x48,0x32,0xfd,0x66,0x47,0x10,0xd9,0x8c,0xcf,0xa6,0xe6,0xd5,0x21,0x6a,0xe3,0x40,0xaa,0x4c .byte 0xa2,0x0a,0xd6,0x2c,0x6f,0x79,0x10,0x8b,0x06,0xb4,0x01,0x91,0xce,0x62,0xfc,0xa0,0x53,0x3a,0xa0,0x65,0xe5,0xd4,0xe9,0xd6,0x91,0x04,0x55,0xa7,0xa9,0x75,0xc7,0x9c,0x13,0x45,0x16,0xcb,0x13,0x88,0xf4,0x08,0xa6,0xe9,0x8e,0x8a,0x84,0xd6,0x8c,0x83,0x5b,0xc5,0xf9,0xbf,0x1d,0xae,0x44,0xd3,0x74,0xa7,0x5d,0x29,0x03,0xf2,0x01,0xad .byte 0xdb,0x3d,0xa2,0xcd,0xf0,0xf9,0xa1,0x27,0xe1,0xbb,0xe6,0x22,0x97,0x0e,0xb4,0x3a,0x09,0xba,0xaf,0x41,0xd5,0x6b,0x67,0x67,0x42,0x1c,0x93,0x52,0x5e,0x79,0x85,0x9b,0x59,0xaf,0x98,0xbb,0x3e,0xbe,0x18,0x0f,0x2a,0x52,0xd1,0xc9,0xb5,0x21,0x04,0x9f,0xee,0xe9,0x30,0x97,0x74,0x7f,0x71,0xfd,0xec,0x0d,0xfa,0x0e,0x32,0x75,0x8f,0x31 .byte 0x3a,0x90,0x90,0xe4,0x0a,0x4b,0xb9,0xfc,0x55,0x02,0xfa,0x1c,0xbc,0xd7,0x30,0x24,0x1a,0x72,0x30,0x22,0xe9,0x61,0xf0,0xdd,0x60,0x55,0x69,0x8d,0x97,0xc1,0xfe,0x81,0x6a,0x16,0x8f,0x46,0x0b,0x1d,0xf5,0xc1,0xf7,0xf2,0xb6,0xf1,0x12,0x23,0x59,0x19,0xbd,0x3a,0xcd,0x57,0x34,0xfe,0x3b,0x1d,0xce,0xe5,0xe5,0xb7,0x90,0x65,0x2f,0x81 .byte 0xcc,0xae,0x07,0x0d,0xe6,0xfa,0x5d,0x7c,0x5f,0x4f,0x45,0xed,0x90,0x05,0xe5,0xfc,0x10,0xb9,0x4d,0x2a,0x03,0x09,0xf9,0x9c,0x7a,0xd6,0x20,0xf2,0xb2,0x87,0xc0,0xde,0xba,0xea,0x78,0x69,0x8f,0x4d,0x6a,0x5d,0xc1,0x20,0x59,0x39,0x8a,0x9f,0x9d,0x8e,0xc4,0xad,0x93,0x4e,0x4f,0x03,0x6e,0x79,0xf7,0x5a,0x21,0x7d,0xa0,0xd4,0xce,0xe3 .byte 0x0e,0xea,0xbd,0xd2,0x0e,0x16,0x89,0x0e,0x7f,0xec,0xc3,0x2a,0x21,0x86,0xb3,0x4f,0xb7,0xc4,0x1b,0x60,0xda,0x18,0xdb,0x73,0xda,0xbc,0x79,0xab,0xea,0xef,0xab,0xa2,0x59,0x89,0x76,0xce,0x72,0x51,0x41,0xf8,0xfe,0xa0,0xbb,0x38,0xf8,0x99,0xcd,0x9d,0x58,0xb9,0x6a,0xb5,0x5f,0xb7,0xa1,0x69,0xe3,0xb9,0x1d,0xfb,0x7a,0x1c,0xc8,0x21 .byte 0x4d,0x11,0x57,0x1d,0xc0,0x45,0x21,0xba,0xa2,0xa3,0xbb,0x1a,0x34,0x17,0xaa,0xa1,0x0b,0x81,0xa1,0xb9,0xf0,0xba,0xf8,0xbf,0xb8,0x6a,0x8a,0x3c,0x75,0xf9,0x48,0x66,0x34,0x29,0xc3,0xc5,0x77,0x58,0x2e,0xdd,0xc1,0xd3,0x38,0x23,0xe0,0x92,0xe6,0x77,0xe5,0xf8,0xf4,0x70,0xe9,0x81,0xad,0x94,0xd3,0xce,0x69,0x97,0x2c,0x4b,0xc1,0xcf .byte 0x83,0xc6,0xfb,0x89,0x7f,0xa7,0x28,0xfa,0xce,0xa4,0x6e,0x24,0x15,0x80,0x3b,0x9b,0x14,0x0d,0xc4,0x82,0x3f,0xdf,0xe9,0x40,0x81,0x7f,0xcc,0xb1,0xbb,0xa4,0xdf,0xee,0x56,0x7e,0xf7,0xe3,0x34,0xb2,0xfd,0xed,0x58,0x48,0xcc,0x1e,0x05,0x21,0x9f,0x30,0xf3,0xa9,0x24,0xe6,0xc3,0xdb,0x2c,0x72,0xfb,0xd6,0x0b,0xd7,0x84,0x64,0xd4,0x9b .byte 0xf5,0x55,0xe5,0xb1,0xdf,0x01,0x07,0x5f,0xb7,0xd7,0xde,0x99,0x63,0x55,0x90,0x02,0x5d,0xef,0x86,0x91,0xa8,0x70,0x87,0x58,0xde,0xe8,0xa8,0xf1,0xf4,0x09,0x2d,0x44,0x19,0x4e,0x45,0x30,0x72,0xf9,0xc3,0xaa,0xc9,0x12,0x71,0xa5,0x63,0xa0,0x38,0x0b,0x77,0xa5,0x0a,0xef,0xf5,0xbb,0xbc,0xec,0xfd,0xb8,0x75,0x9c,0xfb,0x70,0x2a,0xe8 .byte 0x71,0x3f,0xf7,0x39,0x56,0x69,0xe0,0x37,0xf7,0x94,0xfe,0x3a,0x7b,0x78,0x49,0x35,0x11,0x99,0xa2,0x70,0x66,0xbe,0xae,0x21,0x26,0xff,0x75,0x03,0x87,0xc2,0x7c,0xd7,0x29,0x5a,0x36,0x3f,0x73,0xba,0xba,0x08,0x5d,0x4b,0xc0,0xe0,0x76,0xb6,0x15,0x1b,0x9f,0xbb,0x01,0x0a,0xf6,0xf7,0x98,0x8b,0x4b,0x0e,0xbc,0x71,0x7a,0xd2,0x69,0x87 .byte 0xe3,0x45,0xa6,0x41,0xd9,0x9d,0x64,0x90,0x7c,0x9d,0x12,0xf8,0xf0,0xc9,0x52,0x50,0x11,0x18,0x6b,0x9f,0x94,0x31,0x14,0x70,0x59,0xc3,0xb3,0xad,0x73,0x01,0x70,0xa7,0xb3,0xc7,0xcc,0xae,0x8a,0xc1,0x4e,0x62,0x1e,0xb1,0x4b,0x34,0xc9,0x11,0x73,0xb1,0x3f,0xbf,0xe2,0xe3,0xed,0xf1,0xab,0x07,0x87,0x3a,0xfb,0x1f,0x32,0x75,0x74,0x39 .byte 0xba,0x2a,0xa6,0x82,0x33,0x27,0x60,0x94,0xc1,0x91,0x4e,0xaa,0x4d,0x99,0xcb,0xb2,0x5e,0xfa,0xdd,0x2d,0xf7,0xc3,0xf1,0x66,0x7d,0x0a,0xc3,0x8e,0x10,0x56,0x2e,0xde,0xc7,0xca,0x48,0xe7,0xaa,0x90,0x11,0x4b,0x60,0x57,0x2f,0xae,0xa5,0xe3,0x95,0x16,0xe3,0xac,0xab,0xc5,0x68,0xd3,0x71,0x2c,0xe0,0xdc,0x9d,0x48,0xe7,0x73,0x25,0xc9 .byte 0xf7,0x16,0x3c,0x7f,0x25,0x4b,0x75,0x21,0xe1,0x20,0x1b,0x95,0xde,0xf8,0xba,0xa9,0x51,0xe9,0xce,0xec,0xa1,0x44,0x66,0x05,0x46,0xeb,0x6d,0x48,0x32,0x1f,0x13,0x25,0x61,0x2d,0xfc,0xb9,0x4d,0x88,0x70,0xdc,0x37,0xaf,0x1f,0xb4,0xb2,0x14,0x28,0x06,0xf4,0x51,0xcf,0x09,0x25,0xef,0x7d,0x68,0xac,0xb0,0x47,0x30,0x0a,0x33,0x32,0x05 .byte 0xd7,0xbc,0xae,0x4a,0x92,0x8f,0xc8,0xe2,0xd4,0xec,0x03,0xe5,0xa2,0x92,0x78,0xd3,0xe8,0x9a,0x4a,0x07,0xe9,0x46,0x02,0x42,0xbc,0x9d,0x0f,0x63,0xf3,0x5a,0xba,0xec,0x0d,0x21,0x29,0x35,0x29,0xa5,0xfa,0x10,0xb6,0x29,0xf3,0xf7,0xd2,0xd3,0xb0,0x41,0xba,0x08,0x3f,0x52,0x21,0x74,0xe2,0x32,0x16,0x92,0x77,0x2b,0xca,0xeb,0xbe,0xe2 .byte 0x15,0xda,0x39,0x4d,0x8c,0x4b,0x0d,0xf9,0xa1,0xa5,0x0f,0x2b,0xbd,0x17,0xe9,0x5c,0x8a,0x87,0x60,0xae,0xdb,0x1c,0x39,0x49,0x80,0x03,0x1c,0xc3,0xcc,0xd7,0xad,0xf9,0x92,0x38,0x08,0xc8,0x0c,0x38,0xff,0x84,0x29,0x5c,0x75,0xb2,0xf6,0x64,0x00,0x07,0x6c,0xb1,0x62,0x40,0x21,0xfb,0x7e,0xa0,0xb5,0xb4,0xbd,0x47,0x22,0x07,0x4b,0xdf .byte 0x42,0x94,0x43,0x5a,0xe9,0x5b,0x61,0x16,0xdc,0x1a,0xb8,0x35,0x51,0x17,0x87,0xf9,0xac,0xee,0x4b,0x2c,0x03,0x53,0xc0,0xb4,0xd6,0x13,0x11,0xb5,0x1b,0x10,0x0c,0x54,0x1b,0x74,0xd9,0xf8,0x15,0x1e,0xc5,0x92,0x6c,0x4c,0x30,0x67,0x78,0xef,0xb9,0xd8,0xd7,0x5a,0xf2,0x4b,0x87,0x3c,0x65,0xd9,0xfd,0xa1,0xb0,0x2b,0xaf,0x69,0xc4,0x8c .byte 0xbc,0x79,0x10,0x10,0xa2,0x43,0xfe,0x0a,0x2d,0xb3,0x6b,0xc8,0x7d,0x5c,0x80,0xab,0x9e,0xfd,0x4c,0x9b,0x32,0x50,0x2a,0x78,0x2f,0xfb,0xdc,0xc0,0x2e,0x61,0xff,0xbb,0xad,0xb8,0xfc,0x2b,0x8a,0x92,0x7b,0xdc,0xb9,0x1c,0x7e,0x89,0x5c,0xf5,0x4f,0xd8,0x69,0xf5,0x4f,0xe9,0x8e,0x5d,0x6e,0x52,0xa3,0x63,0x00,0x52,0xb6,0xbd,0x68,0x8f .byte 0x63,0xb2,0x8a,0xc7,0xc8,0x37,0xd0,0xed,0x36,0x4a,0x18,0xba,0xb8,0x6b,0x0e,0x93,0xf5,0xca,0x86,0xcd,0x99,0xe4,0x8e,0xe1,0x20,0x23,0xe0,0xc1,0x06,0x73,0xae,0x21,0x25,0x36,0xdd,0xb8,0x52,0xb6,0x69,0x12,0x01,0xad,0xc5,0x72,0x22,0xa1,0xe0,0xae,0x19,0x56,0x0e,0xb5,0xcb,0xeb,0xc9,0x8a,0xf3,0x28,0x8b,0x8c,0x09,0x86,0xa0,0x8c .byte 0x86,0xef,0xeb,0x73,0xbd,0x57,0x20,0xa7,0xe2,0x1e,0xa2,0x62,0x0e,0xa8,0xdf,0x2a,0x03,0x6a,0xe2,0x48,0xea,0xd2,0x6a,0xb1,0xa1,0x85,0x51,0xc7,0xb0,0xb0,0x45,0x17,0x24,0xef,0x0a,0x72,0xfa,0xb9,0x89,0x10,0x9e,0x47,0x5d,0xce,0x62,0x54,0xca,0xae,0x77,0x95,0xf0,0x65,0xb9,0xcd,0x6f,0xd6,0x81,0xdd,0xf7,0x6f,0x76,0x22,0xa4,0x2e .byte 0x6c,0x14,0x2f,0xb8,0x4f,0x2b,0x5b,0xa5,0x2f,0xa8,0x07,0x15,0x20,0xf5,0xcc,0x7d,0x6f,0x2d,0x3e,0x8b,0x15,0x90,0xcd,0x73,0x34,0xec,0xfd,0x81,0x9a,0x09,0xa6,0x67,0xa0,0x4f,0xd7,0xff,0x3b,0xbd,0x5d,0x39,0xde,0xbf,0x26,0xd8,0xc1,0x3b,0x32,0x78,0x71,0x56,0x73,0x43,0xa2,0x16,0x7a,0xbf,0xc6,0xb3,0xfa,0xfe,0x96,0xfa,0xd4,0xc9 .byte 0xbf,0xda,0x2a,0x16,0x35,0xb4,0x3f,0x46,0x12,0xb5,0xc2,0x7f,0xae,0xee,0x4e,0x06,0x67,0xa0,0x00,0x0c,0xd0,0x2e,0xa7,0xbe,0xd5,0x28,0x6b,0x95,0x59,0x4c,0x3a,0x42,0xb6,0x39,0x49,0x26,0x43,0x1e,0xe9,0x46,0x1c,0x7d,0x7f,0x45,0x9b,0x4c,0x2f,0x9f,0xa4,0x48,0xb2,0x20,0xe4,0x76,0x4c,0x58,0x19,0x69,0xda,0x98,0x92,0xbd,0x78,0x52 .byte 0x57,0xe3,0xcd,0x77,0xf3,0x57,0x6f,0x97,0x6d,0x63,0xd0,0xee,0xae,0x93,0x19,0xbc,0xff,0xe2,0x66,0x72,0xbc,0xd3,0x75,0x65,0x1f,0xe6,0xbc,0xad,0x92,0x37,0x8d,0xa6,0xb8,0xca,0xf0,0xee,0x1d,0xa0,0xc4,0x9c,0x3c,0xa3,0x45,0x87,0x14,0x1e,0x06,0xab,0x97,0xd6,0x8c,0x7a,0xae,0xcd,0x8b,0xa6,0x60,0x7b,0x0f,0x2a,0x30,0xbe,0x34,0x41 .byte 0xfd,0xf2,0x1f,0xc1,0x1e,0x4e,0x52,0xbf,0x32,0x3b,0x55,0xbf,0x12,0xb3,0x24,0x79,0x63,0xc7,0x48,0x4c,0x87,0x04,0xed,0x3c,0xf2,0x1b,0x95,0x32,0x0f,0x1c,0x60,0xfe,0x5a,0xc7,0x6a,0xbb,0x29,0x36,0x57,0x22,0x3c,0x6f,0x74,0xac,0x6e,0x40,0x12,0x17,0x4c,0x47,0x27,0xc9,0x03,0xdb,0x08,0xc6,0x84,0x15,0x83,0x63,0xe1,0xc8,0x00,0x3f .byte 0xfc,0xe6,0x9c,0x66,0x0f,0x0c,0x8e,0xae,0x0c,0x5d,0xde,0x9f,0xba,0x11,0x35,0xe3,0x0d,0xba,0x18,0xbe,0x0b,0xbc,0x39,0xc3,0x84,0xa0,0xfd,0xc9,0x79,0x65,0xde,0x2f,0x80,0x38,0x34,0x16,0xc0,0x29,0xfe,0xf6,0x9e,0x7e,0x97,0x47,0x6f,0xd7,0xa0,0x79,0x3a,0xa7,0x3f,0x12,0x7a,0x0c,0x99,0x41,0x3d,0x75,0xd2,0x0e,0x38,0x56,0xb8,0xe6 .byte 0x1d,0x3c,0x32,0xe0,0xa2,0xb6,0xee,0xd6,0xf3,0xaf,0x5a,0xe3,0xf6,0x27,0x42,0x68,0xfb,0x99,0xbe,0xc9,0xab,0x2d,0x90,0x53,0xd8,0x28,0x3a,0x7b,0x5f,0xad,0x83,0xea,0x86,0x6a,0x9c,0x22,0x96,0x0c,0x13,0xb6,0xb0,0x38,0xbb,0x67,0x89,0xba,0x82,0x8e,0xa7,0xf7,0xeb,0x93,0xaa,0x8c,0xd4,0x00,0xb0,0x62,0x57,0x84,0xf1,0x46,0xdb,0x3d .byte 0x1b,0xdc,0x74,0xc4,0x8e,0x86,0x5a,0xd5,0x5d,0xd2,0xdd,0x17,0xf8,0x4f,0xcc,0x8d,0x4a,0x43,0xe5,0xd6,0x58,0x14,0xa3,0x61,0xf3,0xc3,0x52,0xe2,0x6a,0xce,0xd8,0x44,0x60,0x67,0xf2,0xcd,0xa1,0xb2,0xf6,0xb9,0xe0,0xc9,0x88,0xd4,0x1a,0xa2,0xd0,0x1d,0xe6,0x7b,0x20,0x20,0x89,0x80,0xdb,0x39,0x20,0x3d,0x4f,0xc2,0x58,0x2b,0x3c,0xd4 .byte 0x90,0x20,0xea,0x43,0x9b,0xe3,0x64,0x1a,0xd3,0xd3,0xdc,0x40,0xb4,0x88,0x4b,0xca,0x23,0x66,0x9c,0x08,0x1f,0x9f,0xfb,0xca,0x9d,0xa1,0x88,0xe1,0x4f,0xb5,0xaf,0x43,0x00,0x02,0x0b,0x42,0xc5,0xd5,0xaa,0x27,0xcf,0xa0,0xdb,0x0d,0x60,0xbc,0x99,0xfb,0xdc,0xa9,0xb9,0xe3,0x3a,0x6a,0x49,0x02,0x16,0x41,0x43,0xf0,0x75,0x63,0xca,0xad .byte 0xd6,0x93,0xc7,0x28,0xb7,0xb6,0x5b,0xf4,0x7d,0x5a,0x24,0x5c,0xa9,0xd8,0x7d,0xd4,0x7d,0x1c,0x8d,0x6f,0xab,0x0f,0x7f,0x38,0x4e,0x0c,0x68,0xca,0x1e,0x88,0xed,0x11,0x8d,0xd4,0x37,0xfd,0xce,0x6d,0xb1,0x77,0x2b,0x49,0xc6,0x10,0xde,0x6f,0x93,0x28,0xf6,0x2b,0x50,0x1f,0xf5,0x56,0x35,0x0e,0x7c,0xc5,0x52,0xc5,0x75,0xc4,0x2e,0x30 .byte 0x3d,0x17,0xa9,0x41,0x45,0x29,0x77,0x3f,0x33,0xd8,0x7f,0xb9,0xd2,0x82,0x25,0xe9,0x51,0x6c,0xba,0x03,0x83,0xd1,0x48,0x7c,0x81,0x03,0x26,0x8e,0xad,0x58,0x8b,0xd1,0xda,0x94,0x32,0x17,0x67,0x98,0xac,0x1e,0x7b,0x06,0xc8,0x9a,0x5c,0x83,0xbc,0xbe,0x4b,0x5c,0x7d,0xce,0x76,0x2a,0xa0,0x24,0x5c,0x4e,0x9c,0x16,0x62,0xac,0xe5,0xa9 .byte 0x38,0x60,0xcc,0xc1,0x51,0xb2,0xca,0xaf,0xac,0x33,0xe3,0x58,0x35,0x65,0x17,0x18,0x55,0x3f,0xd6,0xbc,0xfc,0xa0,0x48,0x65,0x31,0x41,0x6a,0x70,0x63,0x0b,0xc2,0xdb,0x12,0xc4,0xb2,0x20,0xbc,0xde,0x53,0xc4,0x12,0xb5,0xa9,0x77,0x23,0x99,0xc8,0x9c,0xe8,0x2b,0xc6,0x46,0xc3,0x64,0xc0,0x10,0xee,0xc7,0x24,0xd1,0xfb,0xd2,0xc6,0x62 .byte 0xd2,0x7a,0x2b,0x5b,0xbb,0xfd,0x71,0xf9,0xf7,0xa7,0xb3,0xf6,0xe1,0xef,0x71,0xfc,0x5e,0xd9,0x69,0xe5,0x64,0x05,0xb1,0xcd,0x1e,0xa3,0x10,0x52,0xa3,0x95,0xf1,0x19,0xc5,0x50,0x57,0x5e,0xc8,0x76,0xd0,0xa7,0xc8,0xe7,0xa6,0x74,0x02,0x01,0x07,0x7a,0x27,0x17,0x55,0x46,0xd3,0x39,0xd5,0xea,0x12,0xc4,0x8c,0xcc,0xb8,0x13,0x8f,0x94 .byte 0xde,0x5b,0x97,0x5e,0x2a,0x75,0x6e,0x45,0x05,0x7f,0x1f,0xea,0xab,0x48,0x62,0x3e,0x75,0xd6,0x58,0x6c,0xeb,0x18,0xad,0xcd,0x1d,0x6e,0x4a,0x54,0xf1,0x49,0x05,0x4f,0x2a,0x86,0x20,0x66,0xc6,0xd5,0xfd,0xc5,0xef,0x66,0x06,0x2b,0xe6,0x19,0x81,0xb6,0xda,0xcc,0xed,0x10,0x0c,0x4f,0x05,0xcd,0x0b,0xe2,0xf7,0x89,0x73,0xc7,0x7c,0x72 .byte 0xc3,0xa4,0xf6,0xbf,0x88,0x27,0xff,0x24,0xdf,0x37,0xfb,0x86,0x9c,0x5f,0xba,0x2a,0xc1,0x5d,0x0d,0x40,0x8a,0x23,0x09,0x76,0x34,0x8e,0x6d,0x48,0x50,0xaa,0x1f,0x8b,0xfd,0x48,0xee,0xa0,0x7c,0xcf,0x45,0x42,0x0d,0x1f,0x04,0x09,0x1f,0x4b,0xe2,0x33,0xd1,0x24,0x71,0xc9,0xdc,0xd6,0xac,0x4d,0x01,0xc7,0xab,0x62,0xc1,0x42,0x99,0x5a .byte 0x7d,0xb5,0x76,0xb5,0xf2,0xac,0x10,0x92,0xdb,0x7a,0x91,0x0b,0xd9,0xba,0x09,0x41,0x8f,0x13,0xfb,0xbf,0xdc,0x5a,0xbc,0x19,0x8d,0x92,0xa0,0xf6,0x9a,0xdb,0xde,0xbc,0xc0,0x7c,0x50,0xd2,0x8a,0x8e,0x5a,0x48,0xf5,0xf4,0x8e,0x0d,0xbe,0xfc,0x12,0xda,0xc2,0x33,0x05,0xa8,0x28,0x64,0xc3,0x14,0xc5,0xc4,0x6d,0x7c,0xa8,0x02,0xd3,0xf0 .byte 0x58,0xf6,0x80,0x7e,0xbf,0xde,0x0e,0xe9,0x96,0xac,0xd1,0x12,0xd6,0x19,0x01,0xbb,0x20,0xcb,0x4b,0x10,0x7e,0xee,0xf9,0x79,0xab,0x03,0x01,0x0d,0x51,0xa9,0x94,0x0d,0xf5,0x2c,0xe6,0xb1,0x2e,0xf9,0x58,0x44,0x12,0xe5,0xc9,0xe5,0x73,0xbf,0xdf,0x6e,0xe6,0xfa,0x76,0x07,0x8a,0x00,0x58,0x0d,0x63,0x5f,0x09,0x98,0xec,0xd6,0x04,0x80 .byte 0xb5,0x8d,0x30,0xb9,0xbd,0x99,0x80,0xb2,0xc3,0xd1,0x7e,0x15,0xfa,0xbf,0xb9,0x80,0x7e,0x5b,0xff,0xaf,0x81,0x47,0x6a,0xdc,0x39,0xb9,0xcb,0x1b,0x62,0x6f,0xbd,0xfd,0xbc,0xf7,0x42,0xf8,0x5c,0x70,0xea,0xaa,0x2a,0x6b,0x4e,0x4e,0xf3,0x8f,0x41,0x13,0x13,0xbc,0x8e,0x39,0x94,0x34,0xf1,0xb1,0x2b,0xbc,0x98,0x2d,0xf7,0xaf,0xec,0xc9 .byte 0xb4,0x2f,0x4c,0x17,0x45,0xfd,0x9f,0x3c,0x39,0xdd,0xa5,0xe0,0x65,0x7a,0x9b,0xec,0x4e,0xe1,0xc5,0x97,0xda,0xc5,0x8b,0x9a,0x1a,0xbd,0xd6,0x69,0x84,0x58,0xde,0x36,0x6a,0x66,0xce,0x70,0xe4,0x71,0x0f,0x4b,0x02,0x48,0x7f,0x37,0x98,0x93,0x4a,0x63,0x96,0x7d,0x2d,0xf6,0xb1,0x54,0x8f,0x21,0xdd,0xf7,0x45,0xaf,0x31,0x7a,0x6b,0x43 .byte 0xfb,0x38,0x92,0x48,0x29,0x93,0xcb,0x62,0x76,0x86,0x2d,0xf9,0x9d,0x73,0x3d,0x58,0xdb,0x8d,0x68,0xa9,0x98,0xa0,0xcb,0x51,0x86,0x14,0x2b,0x42,0x8b,0x00,0x2e,0x45,0x84,0x5a,0x73,0x99,0x31,0xbf,0x21,0x4e,0x71,0x0d,0xd0,0x43,0xbe,0x32,0xc5,0x35,0x3d,0xf7,0x9a,0x4f,0xf9,0x44,0xdf,0xc1,0xb4,0x9f,0x75,0x88,0xe8,0x42,0xb1,0xb1 .byte 0x49,0x2e,0x0b,0xac,0xfd,0x67,0x1d,0xc4,0x3b,0xc5,0x60,0xc7,0x61,0x44,0x0a,0x35,0xc2,0x28,0x8f,0xe8,0x95,0x44,0xf8,0xf4,0xa4,0x41,0x14,0xac,0xe0,0xf0,0x36,0x30,0xa4,0xab,0x0c,0x13,0xeb,0x86,0xdf,0x9e,0x10,0x2c,0x29,0x4a,0x7b,0xad,0xe8,0x31,0x37,0xe0,0xcb,0xcb,0x8a,0xb7,0xcb,0xee,0x68,0x32,0x1f,0x10,0xc3,0xda,0x1d,0xeb .byte 0x3b,0x69,0x1b,0xd5,0x40,0xb4,0x3d,0x03,0x0c,0xfb,0x8d,0x1d,0x04,0xbd,0xe9,0x08,0x61,0x4c,0x0d,0x36,0x6d,0x2c,0x67,0x97,0x1c,0xc7,0x4d,0x9d,0x06,0x0e,0x3c,0x04,0x6c,0x26,0xf9,0x1e,0xde,0xb5,0x31,0x28,0x35,0xb7,0x64,0x27,0xd1,0x46,0x47,0x2e,0xff,0x15,0xf1,0x13,0x0d,0x02,0x42,0xba,0xba,0xbe,0x4b,0xf5,0x3c,0x17,0xea,0x62 .byte 0x62,0x90,0xa5,0xc7,0xb7,0x29,0xde,0xaa,0x1c,0x14,0x0d,0x6f,0x7c,0xc6,0xe0,0x68,0x5d,0xbf,0x73,0x12,0xe5,0xe3,0xdb,0x39,0x4a,0xb0,0x97,0xbc,0xee,0x3a,0x41,0x91,0xd7,0x4e,0x90,0x32,0x51,0xd7,0x34,0xea,0x97,0x12,0x8b,0xc9,0x27,0x40,0x73,0x6c,0xe9,0x9d,0x09,0x6b,0x4f,0x6f,0x85,0xdc,0x1e,0xda,0xb3,0xcf,0x27,0x46,0xcf,0x68 .byte 0x5f,0xfa,0x4c,0x95,0x5d,0x26,0xf6,0x56,0xdb,0x96,0x3e,0x4d,0x93,0x62,0xe1,0xa9,0x4b,0x7c,0xcf,0xff,0x67,0xb4,0x76,0x1f,0xaa,0x44,0xb3,0xb8,0xf1,0xf3,0x3e,0x7f,0x38,0x46,0xab,0x49,0x1c,0x2f,0x50,0x47,0xb3,0x94,0xaa,0x8b,0x18,0xbf,0x3f,0xa8,0xa6,0x27,0xb7,0x72,0xb0,0xfa,0xd6,0xb8,0xc5,0x9d,0xc0,0xe6,0x16,0x75,0xc5,0xe9 .byte 0x62,0x40,0x5b,0x0c,0x18,0x71,0x9c,0xcf,0xb7,0x77,0x02,0x03,0x94,0x20,0x23,0x45,0x8a,0xab,0x00,0x10,0x3b,0x89,0x74,0x6e,0x19,0x91,0xb9,0xcd,0x65,0x15,0x59,0xec,0x21,0x3a,0x26,0x20,0x6e,0x2d,0x98,0xa9,0x79,0x35,0xec,0x60,0x47,0x86,0xef,0x71,0x59,0x86,0x95,0x6e,0x2a,0x28,0xed,0x8a,0x68,0xfa,0xf8,0x2d,0x33,0x5c,0x2b,0x06 .byte 0x07,0x2d,0x2a,0x45,0xd7,0xcf,0x18,0xb3,0x03,0x40,0x76,0x4c,0x79,0xa4,0x13,0x96,0xf2,0x9d,0x57,0x3e,0x1d,0x39,0x9c,0xcd,0x5b,0x9e,0xad,0xdf,0x72,0x4e,0x13,0x29,0xac,0xce,0xa1,0x79,0xfb,0xc4,0x24,0xe9,0x48,0xb2,0x05,0x83,0xa8,0x37,0xb6,0xa3,0xd7,0x76,0x08,0xd4,0x90,0x05,0x87,0x05,0x66,0x60,0x8f,0x4c,0xf6,0xc9,0x8f,0x3b .byte 0x8d,0xe0,0x4a,0x54,0xc4,0xea,0x62,0x5c,0xac,0xde,0x56,0xdd,0xa7,0x4c,0x57,0x40,0xce,0xab,0x0b,0x21,0x66,0x43,0x48,0x29,0xec,0x4e,0x89,0x0c,0x87,0x26,0x9d,0xaa,0xd8,0x26,0xea,0x29,0x44,0x12,0x0e,0xd9,0xb1,0xb8,0x7b,0x13,0x5b,0xf6,0x17,0x69,0x3c,0x97,0x09,0xd1,0xf4,0xca,0xb0,0x74,0x32,0xea,0x94,0xda,0x74,0xb7,0x2e,0xe5 .byte 0xa0,0x15,0x81,0xaf,0x4a,0x47,0x11,0xbb,0xf5,0x25,0xb0,0x13,0x83,0xde,0xdd,0xb9,0x59,0x1d,0x21,0x2d,0xff,0x5a,0x38,0x7f,0xde,0xff,0xd2,0x3f,0x51,0xdc,0x62,0x50,0x51,0xb4,0x86,0xda,0xe2,0x0f,0xc1,0xa1,0x6c,0x42,0xe5,0xcf,0x9a,0xd3,0x51,0x70,0x19,0xb7,0xd1,0x30,0xa3,0xad,0xb3,0x0e,0xcd,0x2a,0x6f,0xcc,0x44,0x65,0xc8,0x54 .byte 0x44,0x5e,0xb2,0xf8,0x81,0xec,0xb5,0xc5,0x12,0x29,0x8f,0x4f,0x66,0x98,0x1b,0x03,0x98,0x03,0x9f,0x42,0x9c,0x87,0x2c,0x7c,0x9d,0xa4,0xbf,0x3e,0x91,0x1d,0xd0,0x4b,0xea,0x6c,0x33,0x5c,0x93,0xcf,0x8c,0x9b,0xcd,0x62,0x05,0x3d,0xf4,0x42,0xba,0x0b,0x15,0x45,0x50,0x9f,0x86,0xbb,0xb6,0x60,0x03,0x5a,0xbf,0x2b,0x17,0x30,0x5b,0x39 .byte 0xfd,0x3f,0x80,0xc0,0x6a,0xee,0x36,0x82,0x09,0x28,0x10,0xd8,0x4a,0x86,0x3b,0xd9,0xaa,0x83,0xb6,0x83,0x69,0x31,0x32,0xcc,0x80,0x8a,0x79,0x23,0x60,0xf5,0x8d,0x01,0xaf,0x4e,0xe0,0x12,0xba,0xcc,0x31,0x04,0x6c,0x6a,0x8d,0x60,0xca,0xa1,0x14,0x01,0xf1,0xa3,0x7c,0x8b,0xcf,0xfa,0x3f,0x5a,0xac,0x83,0x73,0x2a,0xe4,0x31,0xb0,0x4f .byte 0x62,0x18,0x29,0xc5,0x9a,0xdd,0x53,0xd3,0xa9,0x2a,0xc0,0x38,0x9a,0x54,0x99,0x4f,0x0f,0xf0,0x35,0x94,0x53,0x81,0xd6,0x32,0x66,0x17,0x14,0x74,0x5e,0x40,0xaf,0x4d,0x43,0x41,0x7b,0xe5,0x56,0x7b,0x30,0xbc,0x21,0x80,0x7b,0x88,0x16,0xfc,0x0b,0xb7,0x2c,0xd3,0x69,0x99,0x2d,0xb6,0xd0,0xdd,0x5b,0x87,0x4c,0xf9,0x34,0xde,0xd2,0xb1 .byte 0xb7,0xd3,0x3b,0x06,0x60,0xb2,0x73,0x7e,0xd4,0x24,0x20,0x30,0xf0,0x9c,0x15,0x05,0x03,0xf5,0xc1,0x24,0x58,0x34,0x38,0x39,0x93,0x4b,0x39,0x01,0x98,0x61,0x6e,0x01,0xd4,0xf8,0x08,0xbe,0xe1,0xbd,0x61,0xde,0x2f,0x94,0xea,0x83,0xa1,0x39,0x2f,0xe6,0x26,0x03,0x43,0xf4,0x00,0x0b,0x64,0xcc,0xcb,0xcb,0x13,0xf0,0x02,0xa3,0x93,0xf6 .byte 0xe9,0x3d,0xef,0x84,0x84,0xc3,0xb1,0x56,0x9e,0x4a,0x9c,0xea,0x94,0xce,0xae,0xa6,0xaf,0xbb,0x37,0xc1,0x63,0x06,0xa5,0x3c,0x32,0x9a,0x86,0x54,0xae,0xf4,0x6d,0x06,0x4c,0x72,0x5a,0xc3,0x28,0x35,0x1d,0xc8,0xa8,0x85,0x72,0x9e,0xaa,0x70,0x36,0x44,0xd2,0x80,0x0d,0xa0,0x42,0xfc,0xf0,0x89,0x0b,0x45,0x4e,0x79,0xc4,0x17,0x47,0x2c .byte 0x9d,0x64,0x61,0x31,0xc0,0xcb,0x6b,0x34,0x5c,0xe7,0x45,0xea,0x6f,0x61,0x5e,0x9b,0x34,0x3a,0x6d,0xbc,0x92,0x0c,0x52,0x7e,0x4d,0x7f,0xe9,0xec,0x93,0x2e,0x76,0xbb,0x34,0x2b,0x97,0x49,0x2e,0xfb,0x5f,0x83,0xf8,0x8e,0x78,0xc8,0x18,0xb6,0x81,0x67,0x63,0xe3,0x19,0xab,0x7f,0xd3,0x86,0xbb,0x4e,0x74,0x45,0xf6,0xc3,0xbf,0xf4,0x24 .byte 0x5b,0xae,0x5b,0xa0,0x6f,0xc4,0x30,0x19,0x70,0xfb,0x71,0x37,0x8b,0x80,0xd5,0xb6,0xfc,0xb0,0x3a,0xeb,0x29,0xfd,0xcf,0xfb,0x7e,0x1f,0x94,0xdf,0x34,0xa6,0x6f,0xfe,0x45,0x96,0x7e,0xa5,0x1b,0x1c,0xd1,0x7f,0x04,0x74,0xb1,0xc3,0x85,0x26,0xea,0xa2,0x25,0x80,0x07,0x21,0x2a,0x4c,0xf6,0x21,0xf7,0xad,0x3d,0xfe,0xca,0x98,0x7f,0xad .byte 0xd6,0x83,0xf5,0x3f,0x9d,0xf3,0x3e,0x18,0x4b,0xff,0x8c,0xd7,0x8c,0xeb,0x9b,0xf0,0xd4,0xfe,0x65,0xd3,0x0f,0x49,0xfe,0x9c,0x2f,0x09,0xfb,0xcc,0xca,0x5c,0x73,0x22,0x75,0x98,0x6e,0x94,0xb7,0xe6,0xef,0xe4,0xf8,0xc7,0x40,0xa6,0x0a,0xbc,0x0b,0x0f,0x70,0x34,0xcf,0x5e,0xb6,0x07,0x1c,0xaf,0x79,0xf5,0xf0,0x9e,0x89,0x98,0x51,0x75 .byte 0xe4,0x78,0x78,0x1b,0x32,0x65,0x5a,0x31,0xea,0x0f,0x17,0x3d,0x77,0x75,0x8e,0x99,0xd6,0x23,0xf6,0x26,0x5c,0x19,0x20,0xde,0xf7,0x64,0xdb,0xce,0x80,0x8b,0x5e,0xfc,0x64,0xf9,0x26,0xee,0xf8,0x17,0x38,0xf9,0x92,0x35,0xf1,0x9d,0x1a,0x5c,0x26,0xd9,0x9b,0x72,0x07,0x98,0xac,0xc3,0x07,0x33,0x62,0x17,0xae,0x0f,0x79,0x23,0x3d,0x1d .byte 0x3e,0xc8,0x2f,0xc9,0xc4,0xe9,0x2c,0x64,0x9d,0xfe,0x70,0x28,0x7a,0x89,0xb7,0xa4,0xbd,0xfe,0x61,0x7b,0x64,0x6b,0xa3,0x38,0x59,0x70,0x0b,0xe6,0x6a,0x1f,0x0a,0xb5,0xcb,0xf8,0x0e,0x7a,0xb9,0x87,0x1a,0x44,0xf7,0xcd,0x20,0xcd,0x7e,0xeb,0x22,0x44,0x3f,0x5a,0x42,0xe1,0x8a,0xe4,0x22,0x13,0x2a,0xf1,0x34,0x81,0xa7,0xf8,0x76,0xfe .byte 0x4c,0xeb,0x54,0xe3,0xe9,0xfc,0xe4,0xc5,0x68,0xf0,0x00,0x36,0x8a,0xad,0x7d,0xe5,0x16,0x7f,0xda,0xe8,0x88,0x55,0x25,0x98,0x6b,0x3c,0x3e,0xdc,0xe7,0xf3,0xe2,0x1d,0x66,0xde,0xf9,0xd8,0x08,0x25,0x81,0x4d,0xdc,0x76,0x1c,0xec,0x8b,0x13,0x83,0x47,0x8c,0x6c,0xd4,0x4e,0xce,0x28,0xdd,0x16,0x6a,0x10,0xa8,0x9b,0x21,0xce,0x70,0xfa .byte 0xf6,0x3b,0x0e,0x8f,0x30,0x34,0xad,0xc8,0xe1,0x93,0xf6,0x2b,0xa3,0xb6,0xec,0x8c,0x65,0x03,0x34,0x20,0xba,0xea,0xac,0xad,0x11,0x47,0xa5,0x98,0xf4,0xd3,0x7f,0x53,0xa5,0xc3,0xe3,0x9f,0x6a,0xd5,0xaa,0xe2,0xf8,0x67,0xfe,0xec,0x30,0x8e,0x24,0x01,0x89,0x95,0x42,0x34,0x5b,0xfc,0x7d,0xff,0xb1,0xd4,0x5e,0x5c,0x1a,0x07,0xff,0xd1 .byte 0xd8,0x95,0x43,0x97,0xc9,0xff,0x19,0x21,0xde,0x71,0x91,0x3f,0xfa,0xde,0x00,0xe0,0x7e,0xcc,0x32,0x95,0xb5,0xcb,0x56,0x1f,0x85,0xba,0x02,0x43,0xa8,0xad,0xb2,0xfe,0xdc,0x09,0xee,0xe9,0xb4,0x5b,0x13,0xbb,0x94,0xd3,0xad,0xa2,0x6a,0x6a,0x31,0x64,0x11,0xe0,0x7c,0x36,0xb9,0x21,0x8e,0x24,0xf8,0x85,0xa3,0xe8,0xc3,0x58,0xc6,0x63 .byte 0x4c,0x4a,0x60,0x73,0x99,0xd0,0x83,0x48,0x49,0x1c,0xe9,0x52,0x56,0x51,0x02,0x12,0xc9,0xb8,0x4b,0x7b,0x13,0x83,0xd8,0x64,0xe0,0x21,0xde,0xb5,0xd1,0xe1,0x38,0x25,0x41,0xb7,0xfb,0x04,0x77,0xa0,0x76,0xd6,0x37,0xed,0xe9,0xcb,0x7a,0xae,0xd4,0xcf,0xb3,0x06,0xce,0x52,0x56,0xb8,0x41,0x35,0xf4,0x48,0x34,0xcc,0xde,0x8a,0xc2,0x0d .byte 0x64,0x71,0xa7,0xd4,0x46,0x96,0x23,0x96,0xe9,0x5d,0x17,0x36,0x07,0xb1,0xa6,0xb3,0xda,0xc5,0x0f,0xdd,0xf2,0x35,0x14,0x40,0xab,0x05,0x08,0xf1,0xd1,0xa8,0xc0,0x1b,0xc3,0xa6,0x20,0xa5,0xea,0xd6,0xd7,0x5a,0xa4,0xec,0xa9,0x4a,0xe3,0x4a,0x66,0xc1,0xa0,0xcb,0x35,0x5e,0xc7,0x5f,0xdd,0xb6,0x0e,0xbb,0xa4,0x06,0xf9,0x43,0x8d,0x7d .byte 0xec,0x3b,0xbb,0xd6,0x87,0xb6,0x1c,0x4c,0xd2,0x70,0x84,0x5f,0xed,0x53,0x9e,0xf5,0x9b,0x40,0xda,0xe9,0xbd,0x3f,0x70,0xa6,0x0f,0x91,0xa3,0x56,0xb2,0x83,0xb1,0x1b,0x85,0x4c,0x88,0xb8,0x81,0x37,0x43,0xdc,0x44,0x2a,0x68,0xc0,0xd9,0xc2,0xd5,0xa5,0x7f,0x09,0xab,0xa2,0x00,0x5b,0xb6,0xaf,0x41,0x40,0x65,0xe0,0x83,0x4e,0x72,0x13 .byte 0x92,0x76,0x06,0x31,0xae,0xf8,0xf6,0x31,0xcf,0x12,0xe3,0xa4,0xa3,0x25,0xc1,0xf1,0x4e,0x28,0x59,0x30,0x72,0xb8,0x33,0x69,0x47,0xd7,0x4b,0xbe,0xe8,0xc3,0x36,0xa4,0xc1,0x3d,0xfc,0x59,0xdc,0x4a,0x94,0x3d,0x63,0x08,0xe8,0x56,0xd9,0x08,0x0e,0xdb,0x74,0x57,0x38,0x58,0xcc,0x98,0x07,0x0e,0xf8,0xe5,0xf1,0x9b,0x2c,0x1b,0x35,0xe5 .byte 0xc4,0xee,0xc0,0x61,0xd8,0xc9,0x36,0xea,0x72,0x5e,0x55,0xe2,0xec,0xb0,0x1d,0x13,0xd7,0xd1,0x3f,0x11,0x2b,0x58,0xf4,0xdd,0x25,0xba,0x95,0x27,0xfd,0xdc,0x49,0x7e,0xb6,0x87,0x34,0x72,0x7d,0x21,0x8a,0x4e,0x26,0x62,0x9a,0x8a,0xd6,0xe4,0x8c,0x56,0x3f,0x19,0x0d,0x80,0xbb,0x5d,0xc5,0x73,0x56,0xf4,0x1d,0x9f,0xb0,0x8e,0x87,0x64 .byte 0x51,0xf6,0xab,0xa1,0xa5,0x8c,0xf8,0xf4,0x39,0x8e,0x34,0xbb,0x54,0x49,0x2b,0xca,0x9e,0x47,0xbe,0xb5,0xc4,0x70,0xca,0x59,0x10,0x9d,0x57,0xd5,0x7c,0x48,0xdf,0x46,0xa3,0xf0,0xfd,0x9a,0x99,0x3c,0x84,0x95,0x36,0x39,0xbb,0x41,0xd3,0xab,0x6f,0x18,0x65,0x4b,0x10,0xe6,0x80,0xd2,0xd6,0xce,0x6a,0xd7,0xf6,0xd3,0x73,0x7e,0x35,0x9f .byte 0x7b,0xe7,0x89,0x00,0x17,0x71,0xfd,0x15,0xf2,0x85,0xa9,0x93,0xbb,0x77,0x13,0xb2,0xf4,0xbb,0x9e,0x37,0x0a,0x5d,0x4d,0x25,0x53,0x38,0xf3,0xee,0x92,0xa3,0x02,0x56,0x2a,0xb8,0x1a,0x54,0x06,0x7b,0x65,0x37,0x5c,0x90,0x39,0x3e,0x67,0x97,0x21,0xd1,0xac,0xd3,0xab,0x6e,0xa6,0x2a,0x19,0xc6,0x26,0xf8,0x12,0xc2,0xd5,0x9a,0x22,0xd8 .byte 0x9d,0x42,0x32,0x4b,0xe1,0x22,0x8c,0x3c,0x2a,0xe8,0x81,0x0d,0x05,0x87,0xce,0xf0,0x30,0x05,0x57,0xf0,0xef,0x18,0x52,0x62,0x28,0xd5,0x89,0xed,0x54,0x64,0xa4,0x1d,0x62,0x75,0x09,0x85,0x48,0x95,0xfe,0x84,0x3c,0x85,0x4e,0xa7,0x27,0x38,0x3e,0x83,0x0e,0x0c,0xfe,0xa7,0x6d,0x1e,0x2f,0x3f,0x7b,0xa5,0x44,0xc7,0xd9,0x10,0xdc,0xa9 .byte 0x27,0x16,0xda,0x75,0x49,0x12,0xde,0xa8,0x3e,0x3b,0x29,0x92,0x93,0xb1,0x0b,0xa7,0xc2,0x74,0xb4,0x0a,0x35,0xbc,0xac,0x29,0x87,0xde,0xd3,0x3f,0x73,0x4f,0xab,0x6a,0xd8,0x35,0x49,0x47,0xc7,0x07,0x85,0x53,0x48,0xe9,0x31,0xe3,0x4c,0x9f,0x64,0x5e,0xcd,0x01,0x82,0xbd,0x61,0xdc,0x47,0x82,0xc4,0x9b,0x4d,0xa4,0x6a,0xe4,0xc5,0x02 .byte 0x90,0x3f,0xd6,0x42,0x58,0xe2,0x7a,0xed,0x23,0x47,0x3e,0x93,0x6c,0xa4,0xf9,0xb8,0x60,0x5b,0x35,0xe2,0x8a,0x4d,0xdd,0x18,0x75,0xee,0x0f,0xd7,0x47,0x6a,0x9b,0x32,0xda,0x62,0x90,0x12,0x77,0x9b,0x00,0x30,0x3a,0x78,0x3d,0x70,0x30,0xde,0x5d,0x3d,0xe4,0x4f,0xef,0x9d,0x06,0x97,0x93,0x1e,0xfe,0x10,0xf7,0xd6,0x23,0x93,0x2f,0x52 .byte 0xd7,0x22,0xd0,0x45,0xe8,0x4d,0x28,0x9d,0x52,0x2f,0x11,0x64,0x0e,0x99,0xa3,0x40,0x93,0x3a,0x02,0xf9,0x4c,0xee,0xd9,0x59,0x33,0x0b,0x06,0xef,0xda,0x0c,0x35,0x74,0xfe,0x42,0x34,0xdd,0x64,0xf0,0x08,0x46,0x92,0xc4,0x40,0x12,0x58,0x3f,0xa9,0x2e,0x72,0x25,0x93,0xdf,0x39,0xe1,0x8d,0xb5,0x1a,0xf8,0xe0,0x70,0x8b,0x38,0x12,0xc0 .byte 0xa2,0x2e,0xa2,0x4e,0x33,0x82,0x6f,0xe4,0xe0,0xf3,0x91,0x5c,0x79,0x23,0xf4,0x05,0x77,0x09,0x0b,0x78,0x29,0x85,0x1b,0x99,0xa4,0xc5,0x6c,0x90,0xb3,0x2c,0xb6,0x79,0xe7,0xa8,0xe5,0xa8,0x5a,0xd5,0x10,0xc7,0xca,0x12,0x84,0x18,0x37,0x83,0x79,0x5a,0xa2,0x9d,0xd4,0xe8,0xc0,0xd2,0x88,0xf9,0x24,0x87,0x18,0x0e,0x8c,0x28,0xd6,0x8f .byte 0x58,0x50,0x10,0xcc,0x1d,0x20,0x76,0x8d,0x1a,0xf0,0x2a,0x99,0xa3,0x81,0xb6,0xa8,0x88,0x3d,0xcf,0xc0,0x60,0xc4,0x44,0xb7,0x04,0xb6,0x2a,0x18,0xf5,0xf4,0x63,0xf9,0x7d,0x64,0x93,0x98,0xcf,0x48,0x80,0xc6,0xdc,0xf6,0x39,0x0c,0x62,0x85,0x51,0xea,0xe2,0x4c,0x9f,0x82,0x5e,0x89,0x39,0xd7,0x97,0x72,0x34,0x36,0x98,0xad,0x79,0x65 .byte 0x56,0x22,0x59,0xe9,0x9f,0x4d,0x05,0x04,0x6a,0xc7,0xde,0x2b,0x61,0xe1,0xe0,0x05,0x49,0xb8,0xc7,0x4c,0x08,0x92,0xf5,0xdc,0x2f,0xc0,0x66,0x40,0x35,0xdb,0xab,0x1a,0xfb,0xbb,0x5c,0xe1,0x83,0xc9,0x88,0x4c,0xa0,0x65,0x8f,0x25,0xb6,0x15,0x93,0x11,0xbc,0x32,0x45,0x22,0x52,0x62,0x4d,0xc0,0xc1,0xb1,0xc3,0x60,0x65,0xda,0xf9,0x09 .byte 0x52,0xe7,0x9c,0xcf,0x75,0x28,0x37,0x30,0x06,0xdf,0x3b,0x63,0x30,0x06,0x27,0x28,0xea,0x48,0x76,0x10,0x9b,0x69,0x99,0x99,0xd5,0x9b,0x0b,0x01,0x57,0xdb,0xdb,0x50,0x6d,0x54,0xf3,0x52,0xf6,0x9b,0x02,0x2d,0x10,0x70,0x37,0x37,0xbe,0x07,0x44,0xc5,0xd0,0xa5,0x1b,0x3d,0x42,0xba,0xeb,0x4a,0x87,0xdf,0x36,0x1e,0xe3,0x9d,0x77,0x63 .byte 0xc7,0xd5,0x97,0xdf,0x24,0x95,0x6f,0xf3,0x94,0xc6,0xb1,0xf1,0xc7,0x60,0x3e,0x98,0x74,0x63,0x24,0x9c,0xb9,0x5f,0x04,0x41,0xbf,0x7c,0xf4,0x6d,0x20,0x30,0x6b,0xde,0x1b,0x01,0x31,0x05,0x33,0x10,0xb1,0xec,0x9d,0x2f,0xfe,0xe9,0x8c,0x1a,0x04,0x24,0x14,0x71,0x11,0xcc,0x21,0x30,0x27,0x3e,0x9c,0x98,0x88,0xfa,0x7b,0xd5,0xe2,0x43 .byte 0x1f,0x61,0xd7,0x57,0x66,0x0c,0x34,0x7a,0x1d,0x96,0x06,0x90,0x7b,0xca,0xf1,0x01,0x1e,0x20,0x6d,0x1e,0x19,0x1e,0x5f,0xde,0xe2,0xaa,0xfb,0x9c,0xd9,0x00,0x65,0x2b,0x90,0x02,0x9a,0x84,0x66,0xd7,0x7f,0x65,0x3f,0x03,0xf2,0x03,0xf3,0xd8,0x17,0xda,0xf9,0x04,0x82,0x11,0x72,0x90,0x0c,0x44,0x6d,0xde,0x51,0xae,0xa5,0xaf,0x19,0x50 .byte 0xc5,0x41,0x5d,0x05,0xb4,0x9f,0x48,0x20,0xbe,0x7d,0x48,0xb7,0xda,0x1f,0x90,0x77,0xe3,0x53,0x25,0xc7,0xed,0x3b,0x85,0xa5,0x7e,0x4d,0xe8,0x1f,0xa3,0x6f,0x2f,0x72,0x92,0x1f,0xe5,0x7c,0x34,0xcb,0xbc,0xd7,0xbf,0x01,0x20,0x9d,0xc6,0x7e,0xec,0x6d,0x51,0xf7,0x6d,0xd8,0xe6,0xb8,0xbe,0x32,0x8e,0x65,0xaf,0xea,0xae,0xcb,0x03,0x74 .byte 0x1f,0xb6,0x7a,0xdf,0xfc,0xcf,0x19,0xcf,0x75,0x3d,0xd6,0xda,0xee,0xf7,0xde,0xcf,0x1d,0xc2,0xbb,0x2e,0x30,0xf0,0x3d,0xda,0x18,0xaf,0xcd,0x7f,0x06,0x17,0xea,0x7f,0x4d,0xda,0x9b,0x9a,0xcb,0xcd,0x4d,0x3d,0x6b,0xb2,0x57,0x4e,0x8b,0x0e,0x5f,0x6b,0x58,0x13,0x6b,0xef,0x2e,0x66,0x26,0x0d,0x6b,0xd8,0xf8,0xbe,0x83,0xc9,0xd0,0x48 .byte 0xed,0xe4,0x03,0x05,0x81,0x13,0x82,0x64,0x9e,0x5c,0xc9,0xaf,0x84,0x90,0xd5,0x4b,0xec,0x02,0x1c,0xcd,0x32,0x3f,0x0b,0xc6,0x39,0x2c,0xcf,0xf7,0x86,0xbd,0xc0,0x06,0xe8,0x75,0x4b,0x45,0xa8,0x47,0xfc,0x19,0x6b,0x93,0x87,0xb3,0x4a,0x80,0x18,0xcd,0xba,0x1e,0x05,0xf6,0x16,0xb5,0xae,0xbd,0x40,0xd0,0xf1,0xd5,0xe9,0x0c,0xf5,0x89 .byte 0x0c,0x6f,0x9c,0x4e,0x75,0x72,0x48,0x7a,0x00,0x78,0xcb,0xf8,0xd7,0xce,0xb8,0x85,0xa6,0x62,0x6d,0x38,0x9c,0x83,0x64,0x03,0x4e,0xee,0xe6,0x62,0xe4,0x2a,0x40,0x86,0x99,0x62,0x76,0x0e,0x43,0x02,0x70,0x78,0x2d,0xa4,0xb5,0x6c,0x87,0x43,0xcc,0x04,0x4b,0xf5,0x46,0xdc,0x79,0x55,0x7e,0x27,0x0a,0x22,0x5a,0x2c,0x53,0xc3,0x23,0x48 .byte 0x17,0x16,0x44,0xf0,0x1d,0x40,0xa2,0x10,0x13,0x5d,0x44,0x54,0x14,0x77,0x6f,0x04,0xa2,0xa7,0x08,0x92,0xaa,0xd5,0x82,0xb4,0x74,0xa7,0xe1,0xe4,0x17,0x5e,0x9c,0x9c,0x88,0xab,0x24,0x9e,0x60,0xe7,0xe8,0xb2,0xf3,0x11,0x28,0xa9,0x9e,0x5f,0x21,0x14,0xe3,0x4d,0xc3,0x29,0xd2,0xc6,0x84,0x17,0x1b,0xa3,0x65,0x6d,0x4e,0x93,0xc7,0x61 .byte 0x30,0x53,0xd9,0x6b,0xc0,0x82,0xf4,0x7e,0xf4,0x79,0xff,0x59,0x06,0x6e,0xe1,0xea,0x45,0x3c,0x0f,0xfe,0x89,0x0d,0xa1,0x5e,0xbc,0x98,0x0c,0x0e,0xb9,0x21,0xc3,0xe8,0xd2,0xf1,0xd9,0x90,0x3c,0x9c,0xee,0x89,0xbd,0xb2,0xa6,0x21,0xfd,0xfc,0x1a,0xd2,0x3e,0x05,0xc5,0xb5,0x92,0xb1,0xb8,0xf2,0xab,0xb8,0x19,0x2b,0x83,0x80,0x8c,0xda .byte 0x43,0xef,0x16,0xef,0xed,0x15,0xe4,0x62,0xab,0x31,0x55,0x29,0xd5,0x2b,0xad,0x3b,0xb6,0x5a,0xc3,0x72,0x25,0x0c,0xfd,0x54,0x9e,0x4e,0x34,0x6f,0x77,0x6c,0x80,0x85,0x4a,0x7c,0xe3,0xb0,0x36,0x59,0x6b,0x3c,0xd9,0xf9,0x44,0x65,0xb6,0x4f,0x99,0x54,0xa4,0x73,0xef,0x4a,0xa8,0x41,0xab,0x66,0x42,0xfb,0x0e,0x3d,0x6f,0x8d,0xed,0x98 .byte 0x8f,0xdb,0xa1,0x51,0x5b,0xdc,0x16,0xc9,0x38,0xbf,0x07,0x1c,0x6d,0xb0,0x1f,0x23,0x3f,0xc5,0x9d,0xc4,0x6c,0xcf,0xd5,0xad,0x7d,0x8c,0xc6,0x59,0xe1,0x7d,0x65,0x0c,0x7c,0xd1,0x57,0x4b,0x92,0x30,0xe8,0xcd,0x81,0x4f,0xba,0x49,0xcc,0xb4,0x54,0xe8,0xc4,0x1e,0x73,0x3b,0x86,0x4f,0xfb,0x4d,0xcd,0xbc,0x13,0x8c,0x64,0x3d,0xdd,0xd5 .byte 0xed,0xb0,0xd3,0xdd,0x4f,0x1b,0x53,0xeb,0xc7,0x20,0xac,0xcd,0x69,0xa6,0xf0,0xfd,0xe5,0xfc,0xe6,0x68,0x17,0xcc,0xa9,0x97,0x44,0xe4,0x56,0x14,0xc6,0xa3,0x89,0xc0,0x0e,0xaa,0x64,0xd0,0x6b,0xbb,0xd3,0xcc,0xca,0xf2,0xe0,0x13,0x1a,0x46,0x39,0x71,0x60,0x91,0xe1,0xda,0x63,0xb5,0xd3,0xd9,0x02,0xa1,0x4d,0xc0,0x4d,0xc6,0x25,0xf8 .byte 0x8a,0xc5,0xf3,0x9c,0x64,0x74,0xb8,0xbf,0x31,0x4a,0xb6,0xbe,0xd3,0x63,0x5e,0x3f,0xce,0x57,0x37,0x43,0xff,0xb9,0x84,0xdc,0x6b,0x8d,0xfc,0xe3,0x7c,0x01,0x2a,0x81,0x2b,0x8c,0x78,0xf4,0x7e,0xe4,0x80,0x26,0xc5,0xd8,0x01,0x87,0x3f,0xe3,0x33,0x46,0x96,0x67,0xda,0x9c,0x2b,0x41,0x3e,0x9a,0x3e,0x51,0xef,0x63,0x73,0x36,0x4e,0x30 .byte 0x65,0x37,0xd1,0xb2,0x50,0xad,0xa7,0xf1,0xca,0x5b,0x11,0xeb,0x56,0x23,0xee,0x65,0x1d,0x5d,0x08,0x68,0x0f,0xb9,0xcf,0xca,0x16,0x7b,0x02,0xf0,0x47,0xe5,0x99,0x14,0xa0,0x67,0xf3,0xfc,0x86,0xf9,0x82,0xdf,0x20,0xd4,0xf9,0x7c,0x4d,0x08,0x06,0x0f,0x1a,0x9d,0x11,0x08,0x13,0xfd,0xb5,0xc5,0x3f,0xff,0xce,0xcf,0x68,0x5f,0xe8,0xae .byte 0x3e,0x9d,0x04,0x94,0xde,0xe2,0x49,0x45,0x6c,0xd7,0xb0,0x79,0xbd,0xc3,0xba,0xb8,0x58,0xbf,0x4f,0x0f,0x56,0xb5,0x39,0x92,0x36,0xd9,0x8e,0x7e,0xac,0x4d,0x9c,0xf9,0x30,0x97,0x71,0xcd,0x1b,0x40,0xf5,0xb8,0xb3,0xeb,0x33,0xf7,0xd9,0xde,0xb3,0x1c,0x7a,0xe1,0xda,0x00,0x43,0xe3,0x17,0x40,0x80,0x49,0x42,0x64,0xe9,0xf6,0x7e,0xe9 .byte 0xeb,0xc7,0xcd,0xf2,0x5e,0xcf,0xfd,0x60,0x08,0xd4,0x13,0x48,0xa9,0x4d,0x38,0xc9,0x14,0x48,0x98,0xef,0x74,0x50,0xa0,0xe4,0x2c,0xdb,0xba,0xb3,0x9a,0xbc,0xd1,0xc6,0x36,0xc3,0x5e,0xa7,0x8e,0xec,0x38,0x8d,0x95,0x32,0x8c,0x90,0x48,0xe0,0x26,0x81,0xe9,0xe3,0xfb,0xdb,0xbf,0x61,0x4f,0xa4,0x69,0x2e,0x57,0x90,0x9b,0xb2,0x0a,0x91 .byte 0x59,0x0b,0x83,0xed,0x15,0x3c,0xad,0xdf,0x99,0x59,0xc6,0x2f,0x8a,0xc6,0xcf,0xb4,0x3f,0xef,0x6e,0xe7,0x03,0x8a,0x95,0x34,0x32,0xbd,0xb4,0xda,0x23,0x64,0xae,0x5b,0xcf,0x95,0xa7,0x8d,0x55,0xd2,0x8c,0x3f,0x0a,0xcb,0x43,0x9f,0xf2,0xf2,0xa7,0x53,0xcd,0x7b,0xa7,0xa3,0x63,0x6d,0xae,0x87,0xec,0x01,0x19,0x6f,0x30,0x32,0x88,0xaf .byte 0xda,0x33,0x09,0xc7,0xf3,0x04,0xed,0xb9,0xc4,0x26,0x5e,0x59,0x9a,0x36,0xc6,0xb0,0x48,0x3b,0x6f,0x47,0x77,0x9e,0xaa,0x65,0x4b,0x3b,0xad,0x61,0x83,0x9a,0x60,0xb0,0xd3,0x1a,0x3a,0x75,0x60,0x6a,0x97,0x48,0xb5,0xc4,0x52,0x7f,0x21,0xef,0x81,0x56,0xc8,0x5c,0x45,0x38,0x32,0xa9,0x01,0xc3,0xdb,0xc3,0x3a,0xcf,0xa6,0x0d,0xcd,0x8b .byte 0x05,0xf8,0x8a,0x9b,0xca,0x54,0x5c,0x54,0x9b,0x34,0x04,0x79,0x22,0xdc,0xe4,0x02,0x8f,0x8c,0x90,0x62,0xd6,0x4e,0xb2,0x25,0xfd,0xab,0x73,0xcc,0xa8,0x4b,0x2a,0xf8,0x2f,0x95,0x94,0x53,0x1f,0xf4,0x7c,0x5a,0x47,0xaa,0x36,0xfa,0xba,0xcd,0x00,0x69,0xa1,0xdb,0x55,0xbd,0x2f,0xb9,0x2b,0x17,0x04,0x6b,0x54,0xe1,0x5d,0xa6,0x63,0x81 .byte 0x2e,0x70,0x73,0xff,0x00,0xdf,0xa7,0x26,0x1d,0x7b,0x18,0xdb,0x49,0xbe,0xaa,0x87,0x91,0x0c,0xbb,0xed,0x87,0x8e,0x55,0x8b,0x3c,0x70,0x95,0x31,0xd2,0x1f,0x15,0x65,0xaa,0x5f,0xe0,0xb2,0x14,0x03,0x2f,0x99,0xff,0xaa,0xfe,0x83,0x5b,0x4c,0xdb,0xa9,0xce,0x28,0x78,0x71,0xf2,0x2e,0x1b,0x6f,0xa8,0x53,0x0b,0xa3,0x8f,0x9e,0xb0,0xd1 .byte 0x94,0xed,0x24,0x0c,0x5d,0xa6,0xf8,0x06,0xd6,0xf1,0xb5,0x3d,0x59,0x4f,0x6a,0x87,0x23,0xc9,0x75,0xb5,0x84,0xee,0xb0,0x23,0x43,0x3e,0x77,0x66,0x73,0x7c,0x8f,0xe4,0x1d,0x79,0x34,0x6d,0x11,0xfa,0xd8,0xe3,0x28,0xa0,0x25,0x91,0x73,0x18,0xec,0xb7,0x67,0xa6,0x02,0xa0,0x3f,0xac,0x02,0x13,0x09,0xfa,0xca,0x7f,0xea,0x46,0xaf,0x10 .byte 0x61,0x15,0xf2,0x53,0xec,0xe3,0xb3,0x8b,0x0b,0xac,0x4c,0xbb,0x57,0x28,0x40,0x7b,0xef,0xf6,0x40,0xf1,0x2b,0xaa,0xe7,0x28,0xad,0xf6,0x95,0xca,0x1f,0x10,0x0e,0x8e,0xc8,0x79,0xfb,0xa8,0x92,0x25,0xfd,0xdb,0x0e,0x23,0x11,0x56,0xa9,0x94,0x01,0xa6,0xa3,0x02,0x74,0xd3,0xdd,0x38,0x27,0x33,0x03,0xb6,0x60,0x10,0x37,0x31,0xa8,0xd7 .byte 0x0b,0x01,0x9f,0xe4,0xbe,0x0e,0xb9,0x87,0xb5,0x91,0x6f,0xc7,0xd6,0x02,0x6f,0x8e,0xba,0x89,0x9a,0xd3,0x55,0x7c,0x04,0x10,0x92,0xa9,0xe4,0x50,0xfb,0x4a,0x60,0xca,0xc7,0x87,0x02,0x34,0x43,0xc3,0x14,0x98,0x62,0x3f,0xea,0x94,0x92,0x70,0xd8,0x91,0xe5,0xf7,0xdc,0x91,0x4b,0xb7,0xfc,0x6c,0x7f,0xb6,0x55,0xfb,0x91,0xdf,0x91,0x2e .byte 0x22,0x89,0xbb,0xf3,0x5f,0xb3,0x15,0x33,0x1e,0x8f,0x0a,0x98,0x28,0x61,0x15,0x0a,0x3b,0x0a,0xd1,0x21,0x85,0xfd,0x60,0x9a,0x51,0x5a,0x05,0x4f,0x57,0x59,0xdf,0xda,0x9f,0x08,0xe4,0xe1,0x0e,0xee,0x7b,0x3a,0x71,0x05,0x0b,0xad,0xb0,0xd1,0xbb,0x5b,0xe3,0x05,0xe6,0x25,0x42,0xf4,0x82,0x4d,0x5f,0x1d,0x23,0xe6,0x16,0xc8,0x60,0x20 .byte 0x37,0x27,0xca,0x65,0xe7,0x12,0xa8,0x0b,0xbc,0x37,0x93,0xe9,0xec,0xae,0x98,0x17,0xd1,0x96,0xe7,0xfe,0xf6,0xda,0x18,0x40,0xab,0x81,0x38,0x6e,0x83,0xcd,0x49,0x3c,0xe5,0xcc,0xf6,0x97,0x45,0xf9,0x4d,0x31,0x33,0x40,0xf2,0x07,0xef,0xae,0x9b,0x1f,0xab,0xde,0x07,0xb9,0xa1,0x43,0x86,0x80,0xd0,0x54,0xb1,0x44,0xce,0x91,0xaf,0x0c .byte 0xdc,0xa7,0x83,0xda,0x73,0x44,0xb2,0x5c,0xe2,0xf0,0xf5,0x88,0x95,0xe1,0x36,0xcb,0x37,0x0a,0x61,0x6d,0x56,0x69,0xdf,0x95,0x79,0x97,0xb0,0x86,0x8b,0x96,0xbf,0xe8,0x89,0xfc,0x8f,0xc9,0x41,0xe3,0xe4,0xd3,0xf0,0xed,0xd1,0x97,0xd1,0x5e,0xa8,0xcf,0x71,0x4d,0xd5,0x72,0xd0,0x94,0x48,0x86,0xba,0x0d,0x6c,0xe0,0xf1,0x81,0x74,0x6a .byte 0x0d,0x75,0xc8,0xd3,0xbc,0xd8,0x8d,0xa9,0xf5,0x44,0xc2,0x5f,0x45,0xa7,0xd1,0x9a,0xd1,0x5a,0xc7,0x39,0x9a,0x62,0x0d,0x85,0xba,0x25,0xa7,0xf4,0xcc,0x24,0xe0,0x02,0xdf,0x50,0xab,0xea,0x2f,0xc3,0x0d,0x7d,0xce,0x15,0x9d,0x8c,0x6c,0x16,0x4f,0xde,0x72,0xb2,0x40,0xef,0x9c,0x36,0xcf,0xeb,0x3b,0x17,0x88,0xd5,0xc1,0x3e,0x35,0x8b .byte 0xa3,0xe6,0x38,0xfd,0xac,0x9b,0x15,0x3c,0x8c,0x34,0x31,0x7b,0x47,0x31,0x06,0x1f,0xfc,0x23,0x34,0xa9,0x2d,0x7b,0x0a,0xe6,0x17,0xbf,0x2c,0x1d,0xf6,0xd3,0xa4,0xcf,0x47,0x63,0x58,0x83,0x63,0xcf,0xc1,0x57,0x01,0xb7,0xe6,0x4c,0xe5,0x7b,0xc6,0x40,0xa9,0x18,0x1c,0xc0,0x3c,0xca,0x87,0xd5,0xf7,0x72,0xe5,0xc6,0x24,0x4b,0xc6,0x06 .byte 0x60,0x50,0x5b,0x36,0x66,0x47,0x28,0xdc,0x4a,0xea,0x2d,0x6a,0x8f,0x1e,0xfe,0x26,0xdd,0x76,0xb4,0x33,0x20,0x90,0x3f,0x0c,0xa8,0xaa,0x12,0x80,0x72,0x0a,0x9c,0xe1,0x95,0xb1,0x9c,0xbb,0xdd,0x66,0x04,0xa9,0x3b,0xad,0xc4,0xaa,0xd0,0x38,0xb0,0x62,0x8b,0x12,0x60,0x7f,0x73,0x67,0x2e,0xb8,0x85,0xfd,0x61,0x37,0xa6,0xdf,0xa7,0x9e .byte 0x3d,0x98,0xe2,0xc2,0x2d,0xff,0x56,0x4f,0x9b,0x96,0x2d,0x21,0xca,0xc8,0x4c,0x75,0x2d,0xac,0x3b,0x2d,0x73,0x2e,0xe3,0xe8,0x6a,0x98,0x86,0x39,0x25,0x7f,0x08,0x44,0x31,0x35,0x8c,0x43,0xbc,0xf7,0x12,0xd8,0x3e,0x3a,0x9e,0xe7,0x2a,0xf9,0x49,0x96,0x95,0x14,0xb2,0xa9,0xb3,0x85,0x46,0x43,0x3b,0x31,0x37,0xe9,0xf3,0x93,0x3e,0x7e .byte 0xba,0x13,0x28,0x8a,0x67,0x16,0x8f,0x5e,0x4a,0xe5,0x52,0x67,0xdc,0x86,0xab,0x26,0x6d,0x23,0x25,0xb3,0xa3,0x46,0x29,0x73,0x72,0x38,0x7b,0x4a,0xe1,0xa7,0xeb,0x18,0xd1,0xdd,0xa1,0xe6,0xcd,0x00,0xdf,0x72,0x93,0xea,0xae,0xf2,0x27,0x49,0x01,0xdc,0x9d,0xc7,0xbd,0x4e,0xd5,0x7f,0x88,0x50,0xa8,0x3d,0xc3,0xb7,0x10,0xee,0x3f,0xe2 .byte 0x87,0xc2,0x95,0x48,0xdb,0xf0,0x95,0x8e,0xac,0x9d,0xde,0x3e,0xe6,0x4a,0xc6,0xe5,0x42,0xab,0x10,0xc2,0xd9,0xc6,0x43,0x9b,0xeb,0xd9,0xa6,0x39,0x86,0xfb,0x9a,0x3b,0x33,0x31,0x19,0x7e,0x8b,0x77,0x2f,0x75,0x53,0x63,0xbd,0xa3,0x84,0x8a,0xb9,0x09,0xcd,0x2e,0x58,0x75,0xcb,0x40,0x87,0xc9,0x7f,0x66,0x30,0x9f,0x21,0xb5,0x42,0x44 .byte 0x7f,0xcc,0x89,0x0b,0x01,0x8a,0x8f,0x5d,0x83,0x12,0x65,0x19,0x4f,0xd9,0x50,0x14,0x3a,0x42,0xaf,0xa2,0x75,0x91,0x6b,0xc5,0x15,0xb3,0x6f,0x3b,0x4f,0xdf,0xd9,0xe3,0x67,0xf0,0x0d,0x5b,0x0e,0x45,0x25,0xd3,0x01,0x7e,0x7f,0xc9,0x32,0x46,0xb6,0xd0,0x15,0x2e,0xfa,0xdf,0x5c,0xa4,0x2d,0x73,0x19,0x49,0xed,0xdb,0x09,0xde,0x7f,0x6b .byte 0x2e,0xce,0xa5,0xeb,0x0b,0xc9,0xf6,0x03,0x6f,0x52,0x2e,0x01,0xab,0x09,0xd5,0x0c,0x74,0x2b,0x73,0x9a,0xf1,0xe7,0x3f,0x5d,0xdb,0x15,0x8e,0x36,0x1f,0x88,0x42,0xdb,0x49,0xd8,0xcf,0x0c,0x63,0x3a,0x60,0x0b,0x10,0xa2,0xbf,0xc1,0xb0,0x7c,0x91,0xf5,0x16,0x9b,0x66,0x3e,0x41,0x03,0x5e,0x5a,0x8e,0x0f,0x98,0x34,0x44,0x5b,0xde,0x1a .byte 0x74,0xff,0x47,0xc8,0x27,0xdf,0x01,0xc2,0x94,0xce,0x38,0xbc,0x06,0xb9,0xef,0x93,0xd2,0x55,0x6e,0x4a,0x45,0xfb,0x42,0xd0,0xc1,0xac,0x0c,0xae,0xfb,0x76,0x2d,0xb4,0xcd,0x33,0x33,0x53,0xcc,0xd4,0x41,0xab,0x99,0xaf,0xbe,0x26,0x05,0x77,0x43,0xfc,0x3d,0xf2,0x70,0xea,0x44,0xf8,0x21,0x67,0xad,0x4b,0xfe,0xce,0xca,0x35,0x02,0x1c .byte 0xd1,0xec,0xa5,0x5f,0xc6,0xe0,0x54,0xca,0xf7,0x8f,0xaf,0x8b,0xc1,0xe5,0x87,0x90,0x0e,0x6b,0x5f,0xf4,0x07,0xe9,0xb5,0x66,0xd8,0x89,0x12,0x32,0x9c,0x62,0x7d,0x4a,0x84,0x27,0xb1,0xd7,0x01,0x68,0x84,0x94,0x85,0xa4,0x9e,0xba,0x9c,0x29,0x5a,0x1c,0xb6,0x3c,0xeb,0x5b,0x82,0x2d,0xec,0x12,0x73,0x4f,0x1f,0x78,0xa2,0xc5,0x84,0xfb .byte 0x1c,0xfa,0xdb,0x7d,0xd8,0x4e,0xd5,0x37,0xc5,0x70,0xe1,0x09,0x05,0xc7,0xfe,0x9d,0xe5,0x3d,0x64,0x9c,0xf9,0xce,0x74,0x4c,0xac,0xaf,0x35,0xd0,0x5e,0xac,0x3d,0x11,0x81,0x96,0x31,0x0b,0x46,0x66,0x1c,0x72,0xbf,0x7e,0x0d,0xc9,0xb6,0x61,0x06,0xd2,0x7e,0x23,0xfe,0xc1,0xaa,0x62,0x96,0x03,0x72,0x72,0x4b,0xca,0x9e,0x17,0xdc,0xdc .byte 0x31,0xd7,0x68,0xaf,0xb9,0xc7,0xb7,0x4a,0x6c,0x15,0xca,0x1f,0x43,0x76,0xcf,0x1a,0xcd,0xbd,0x2e,0xf5,0xe7,0xd5,0x2e,0x0d,0x6e,0x59,0xf8,0xc8,0x35,0x78,0x23,0x82,0xbe,0x70,0x0f,0x40,0xc0,0x55,0x8a,0x08,0x81,0xf1,0x74,0xd2,0x37,0x5d,0xe9,0x22,0xff,0x18,0x1d,0x9f,0x2e,0x98,0xe0,0x97,0x09,0x18,0x62,0xe8,0x2a,0x10,0xfc,0x28 .byte 0x7c,0x27,0xe9,0x0f,0x86,0xf6,0xc0,0xe5,0xeb,0x45,0x5a,0xd9,0x81,0x25,0x0d,0x06,0x54,0xdf,0xde,0x46,0xd3,0x6e,0x08,0x69,0xf9,0x76,0x63,0x66,0x9d,0xfb,0x9c,0xca,0xb2,0x32,0x08,0x96,0x7f,0xab,0xa0,0x65,0xf0,0xac,0x1e,0xce,0x74,0x63,0xaf,0x1b,0xf3,0xdc,0x12,0x0c,0x59,0x86,0xbe,0x74,0xc6,0x80,0x66,0x74,0x78,0x9c,0x0c,0x1e .byte 0x6e,0xf6,0xdf,0x39,0x79,0xfb,0x8e,0x8c,0x28,0x85,0x6f,0xfc,0x16,0xb0,0x39,0xea,0x67,0xf6,0x1c,0x41,0x10,0x90,0x0f,0x80,0x63,0x84,0x04,0xaa,0x6e,0x8e,0xfa,0xe2,0x2b,0x5c,0xa7,0x52,0x43,0x93,0xa5,0x16,0xd6,0x6c,0x9c,0x07,0x25,0xd8,0xa3,0xd5,0xb0,0xba,0x2a,0xd3,0xea,0xdc,0x9b,0xb6,0xc1,0x07,0x7d,0xd0,0xb5,0x28,0x52,0xdc .byte 0x1b,0xf7,0xeb,0xb0,0x5b,0xd2,0x20,0x0b,0xab,0xf5,0x96,0x83,0x3f,0x2b,0x7d,0xab,0x7e,0x61,0x13,0x7e,0xd8,0x07,0x2b,0xee,0xbe,0xe7,0x78,0x66,0xec,0x7d,0xc2,0xfd,0x41,0xd8,0x18,0x8b,0x8b,0x3b,0x46,0x9d,0xc8,0xd6,0xe7,0x75,0xc2,0x2d,0xf3,0xdb,0x20,0x2d,0x8c,0x8e,0x74,0xf4,0xe2,0x69,0xad,0xde,0x99,0x0b,0xf1,0xaa,0xa1,0x57 .byte 0xb0,0xd9,0x4e,0x0e,0xf5,0xfc,0x8a,0xf2,0xff,0xf2,0xbc,0xdb,0xf4,0x8b,0xff,0xf0,0xd9,0x20,0x5f,0x0f,0x80,0x43,0xaa,0x1d,0x76,0x3c,0x7d,0xad,0xf3,0x93,0x6b,0xab,0xd3,0x8d,0x35,0x1c,0x03,0xe0,0x76,0x25,0xa8,0x1f,0xdb,0x19,0x48,0x8c,0x33,0x21,0xae,0x34,0xae,0x34,0x54,0xe2,0x42,0x66,0x67,0xdb,0x90,0x21,0x46,0x16,0x1a,0xac .byte 0xf6,0x4f,0x77,0x66,0x50,0x52,0x68,0x80,0xeb,0x79,0x27,0xb1,0x24,0x81,0x75,0xde,0xe4,0x13,0x0c,0xff,0xd0,0xed,0x0a,0x98,0x04,0x70,0x05,0x2e,0xd9,0x67,0x4c,0x4e,0x93,0x49,0x08,0xb4,0x97,0x3e,0xc1,0x7c,0xc3,0xc1,0x42,0x40,0x69,0x53,0xd6,0x90,0xf5,0x85,0x39,0xa4,0x8d,0x8f,0xd2,0xf1,0x50,0x87,0x10,0x3e,0x5b,0x86,0xb3,0xd6 .byte 0xee,0x60,0x05,0x4c,0x83,0x9f,0x27,0xa9,0xfc,0x1e,0x67,0xa5,0x68,0x02,0xc7,0xe0,0xc5,0x58,0x60,0x68,0x5f,0x59,0xb9,0x8f,0x91,0x5b,0xa0,0xe5,0xf8,0xca,0x95,0x69,0xeb,0x0a,0xdb,0x87,0xd5,0x61,0xca,0x48,0xa0,0x1a,0xdc,0x96,0x02,0xd1,0x86,0x41,0xce,0xe8,0xa8,0xcd,0x24,0x36,0x9a,0x31,0x0e,0x9f,0xbf,0xc1,0x9e,0x85,0x2f,0x64 .byte 0xff,0xa8,0xb5,0xe1,0xef,0x16,0x1e,0xcd,0x93,0x7e,0x30,0x28,0x97,0x7d,0x59,0x30,0x4f,0x24,0x40,0x51,0x31,0x32,0xde,0x7b,0x1e,0x72,0x0e,0x91,0x95,0xa2,0x3f,0x87,0x49,0xb1,0x82,0xaf,0x66,0x0a,0x54,0x92,0xe9,0x5c,0x3d,0xfe,0x47,0xcf,0x27,0xf6,0x0d,0xd1,0x69,0x97,0x89,0x62,0xea,0xdb,0x44,0x39,0xf4,0x36,0x73,0x31,0x79,0xcb .byte 0x73,0x16,0x80,0x2d,0x49,0x8a,0x97,0x87,0xda,0x38,0x64,0xd9,0xc3,0x6f,0x4f,0x9b,0xa3,0xf2,0x9a,0xcd,0x2f,0xca,0x7e,0x5f,0xf7,0xf7,0x66,0xc5,0xb7,0x25,0x8d,0x9f,0xf4,0x5a,0x96,0x97,0x7c,0xd3,0x15,0xd8,0x3b,0x12,0xbd,0x09,0xf0,0x0d,0xc9,0x05,0x28,0x6b,0x43,0x62,0x3e,0x58,0x2f,0x8f,0x97,0xe7,0x72,0x8b,0x94,0x62,0xd0,0x3a .byte 0x64,0x30,0x2c,0x4d,0xd2,0xa7,0x12,0x90,0x27,0x17,0x57,0xf7,0xc8,0x8b,0x9d,0xb5,0x89,0x3e,0xb8,0x69,0x3c,0x68,0x21,0xc9,0xfa,0xed,0x83,0x22,0x89,0x70,0x64,0x0f,0xd5,0x3c,0x5c,0x9f,0xea,0x68,0x59,0xfc,0x18,0x56,0x6d,0x91,0xe7,0x8c,0xed,0x2a,0xa2,0x3a,0x21,0x5a,0x66,0x2b,0xeb,0x83,0xc0,0x79,0xf7,0x4f,0xdf,0xd2,0x62,0x88 .byte 0xe0,0x18,0x33,0xb0,0x50,0x5d,0xf5,0x81,0x1c,0x6b,0xd2,0x44,0x24,0xc0,0x5d,0xfa,0x3d,0x1a,0x26,0xb5,0x92,0x31,0xd2,0xb7,0x2f,0x98,0xfd,0xbf,0x6e,0xaf,0x1b,0x12,0x46,0xa3,0x6c,0x76,0x5a,0x50,0xb2,0x81,0x55,0x3d,0x47,0x32,0x61,0x0b,0x1d,0x86,0x90,0x72,0x87,0x66,0x89,0x0e,0x64,0xdb,0xdb,0x3b,0xa3,0x4e,0x49,0xa6,0xbe,0x42 .byte 0x73,0x0f,0x45,0x73,0x47,0x1c,0xb8,0x4a,0xb1,0x3f,0x98,0x15,0x8e,0x75,0xf5,0x33,0xc9,0x65,0x77,0x66,0xb8,0xd5,0x20,0x61,0x23,0xbe,0x40,0xd9,0xe7,0xbc,0xeb,0xff,0xcd,0xb6,0x2c,0x2b,0x76,0x3a,0xf1,0xef,0x38,0x6d,0xe3,0xcd,0x70,0x6e,0xe0,0x29,0xad,0xca,0x6d,0x03,0xfe,0x5a,0x1d,0x69,0x2f,0xf7,0xde,0xfd,0xf4,0x6b,0xb3,0xc5 .byte 0xe5,0xac,0xf3,0xd2,0x95,0x02,0xf2,0x6a,0x58,0x4c,0x5b,0xeb,0x1f,0x0b,0x7f,0x9d,0x0a,0x0e,0xb3,0xf0,0x41,0x50,0x04,0x65,0xf3,0xc0,0x68,0xc9,0x1f,0x0b,0xdb,0xd0,0xd6,0x19,0x4b,0xa8,0x72,0xb2,0x60,0xf2,0x1c,0xbd,0x99,0xb5,0x7d,0xe0,0x1e,0xe3,0xfd,0x42,0x8a,0x62,0xe3,0x8f,0xd6,0xcf,0x45,0x16,0x94,0x76,0x73,0xb7,0xa1,0x2a .byte 0x67,0x25,0x02,0x73,0x0e,0xf6,0x10,0xcf,0x57,0x0a,0x74,0xeb,0x5a,0x4d,0x07,0x04,0x7b,0x1c,0x7e,0xf4,0x55,0xda,0x39,0x76,0xeb,0x11,0xfb,0x04,0xf5,0x32,0xdf,0x63,0x58,0xd0,0xc4,0xa4,0x76,0x76,0xd8,0xaf,0xc6,0xe4,0x21,0x97,0x51,0x6a,0xc1,0xab,0x81,0xd8,0x65,0xac,0x28,0x54,0xcd,0x36,0xcb,0xba,0xfc,0x08,0x3f,0xb1,0x81,0x69 .byte 0xbe,0x42,0x79,0x17,0x74,0x23,0x5f,0x28,0x59,0x60,0x84,0xa3,0x3c,0x57,0x9b,0xc9,0x77,0x24,0xe2,0xcf,0x51,0xb6,0x31,0x46,0xe2,0xd2,0x30,0xb9,0x76,0xcc,0xb4,0xca,0x8a,0xd5,0xa6,0x1c,0x3c,0xcc,0x39,0x1e,0xae,0x54,0x2a,0xde,0x0a,0x76,0x7e,0xaa,0x78,0xd2,0xaa,0xa0,0xe0,0xda,0x05,0x6d,0x1a,0x2a,0x44,0x8f,0x75,0x37,0x8f,0x4f .byte 0x38,0xaa,0x9b,0x30,0x79,0x98,0x0a,0xe2,0x5d,0x4d,0x0a,0x91,0x18,0xb1,0x0e,0x3b,0xa6,0xd5,0x72,0x00,0xc4,0xbe,0x09,0x7e,0xd0,0xe5,0xf3,0x98,0x28,0x9c,0x34,0x44,0xdd,0x35,0x2c,0x7d,0x06,0x22,0x59,0x98,0x7b,0x50,0x7d,0xc6,0xb2,0xd4,0xa2,0xaa,0x4f,0xad,0x50,0x72,0xbb,0xbb,0xb5,0x79,0x25,0x40,0x8e,0x43,0x6a,0x09,0x3f,0x60 .byte 0x28,0x67,0x47,0x8c,0xbd,0xc8,0x12,0x50,0x9b,0xdc,0xd4,0x03,0x99,0x3d,0x7c,0x08,0xd6,0xe3,0xfd,0xfa,0x5d,0xba,0x85,0xb4,0x0e,0xea,0xf6,0x70,0x82,0x18,0xc6,0x05,0xc6,0xb9,0x0d,0x81,0x6a,0xc0,0x40,0x7f,0x26,0xfc,0xe0,0x49,0x5e,0x1d,0x28,0xc5,0x91,0xd4,0xb5,0x6d,0x6c,0xe8,0x8a,0x59,0x30,0x1d,0x0a,0x8e,0xb2,0x6c,0x2b,0x03 .byte 0xfb,0x20,0x60,0xb2,0x9d,0xd4,0xb0,0xe1,0xa4,0x9d,0xb0,0x84,0x3f,0xfd,0x82,0x1d,0xeb,0x93,0x66,0xa8,0x1d,0x94,0x69,0x99,0x8f,0x3e,0x16,0x1a,0x36,0x4c,0xc4,0x6f,0x14,0x04,0xa7,0xcf,0x0a,0x0b,0x6e,0xd6,0x29,0x49,0x8d,0x9d,0x11,0xa4,0xf7,0x58,0x25,0x39,0x6e,0x68,0x7a,0xca,0xf7,0x3b,0x6e,0x2b,0x1c,0xc3,0xef,0xca,0x97,0x83 .byte 0x4b,0xf3,0x48,0x9a,0xc6,0x23,0x63,0x72,0x40,0x44,0x40,0xc3,0xf0,0x5b,0x80,0xff,0xd7,0x7e,0x37,0xc2,0x54,0xda,0xa4,0x2a,0xdd,0x65,0xc8,0x48,0x89,0x8c,0xea,0x5f,0xd2,0x46,0xfe,0xe9,0xbf,0xce,0x4a,0x80,0x3b,0xd0,0x51,0xcd,0x83,0x5f,0xfb,0x27,0xab,0x05,0x25,0x44,0xeb,0xe1,0x57,0x18,0x50,0xfc,0xb0,0x83,0x79,0xdc,0xa0,0xd3 .byte 0xc4,0xfb,0xc1,0xef,0xd2,0x44,0x2f,0x87,0x4f,0xef,0xed,0x3a,0x55,0x07,0xe6,0x67,0xe0,0x22,0xa0,0xaf,0x9e,0xb9,0xef,0x32,0x2e,0x81,0xe6,0x30,0x25,0xe4,0x4d,0xa0,0x34,0x1e,0x7d,0x6b,0xb9,0x21,0x4d,0xae,0xfd,0x51,0xe0,0xee,0xf6,0xe2,0x0d,0x9c,0xf6,0x63,0x73,0x93,0xc0,0xbb,0x88,0x0c,0x06,0xb9,0xa0,0xf3,0xfc,0x26,0x64,0x91 .byte 0x84,0xd1,0x77,0x21,0xf9,0xf1,0x4c,0x48,0x65,0x15,0x56,0xd7,0xd2,0x86,0x26,0x6f,0xf5,0xce,0x81,0x1d,0x9d,0xa7,0x83,0xd0,0x2a,0x4e,0x01,0x79,0xd6,0x1d,0xee,0x10,0x66,0x6f,0xf8,0x80,0x47,0x6c,0xed,0x18,0xc1,0xb5,0x39,0xec,0x2d,0x42,0xf1,0xd5,0x2c,0xd9,0x9c,0xd5,0xaa,0xbf,0xc1,0x67,0xf3,0xf9,0xd6,0xd2,0x44,0x20,0x27,0x7b .byte 0x40,0x04,0x0c,0x77,0x64,0xef,0x5c,0x1b,0xc8,0x2c,0x25,0x3e,0x9d,0x63,0xbb,0x94,0x78,0x02,0x14,0x46,0xfc,0xa6,0x09,0x0e,0xc5,0x81,0x34,0x1b,0x11,0xdf,0xb4,0xb6,0x8e,0x40,0x0e,0xf3,0x05,0x0a,0xf5,0x28,0x58,0x5a,0x2a,0xb5,0x6c,0x9d,0xe5,0x50,0x0d,0x3e,0xcf,0xb6,0xc5,0x3b,0xc8,0x56,0x50,0x8c,0xda,0x83,0x8d,0x4d,0xce,0x22 .byte 0xb9,0x5b,0x14,0x76,0x88,0x84,0xdf,0xa3,0x93,0x79,0x21,0x8c,0xfa,0x42,0x98,0xda,0x0d,0x2a,0x4e,0x43,0x41,0x0d,0xac,0xe6,0x9e,0x11,0x14,0x81,0xcc,0xcf,0x72,0x84,0xb5,0x8e,0x99,0x0e,0x64,0xad,0xbc,0x35,0x9d,0x04,0x56,0xae,0x33,0x8e,0x3a,0x2a,0x56,0x91,0xa7,0x9c,0xe4,0xba,0xfc,0xe9,0x65,0x14,0xbf,0x07,0xf8,0x85,0x45,0xe1 .byte 0x1d,0x29,0x4c,0x10,0xde,0x5e,0x6c,0xb6,0x28,0xad,0x9a,0xb8,0x18,0xeb,0x77,0x2d,0x7b,0x6e,0x26,0x51,0xee,0x84,0x40,0x00,0x0f,0xed,0xb2,0x28,0x11,0x34,0xca,0xc7,0x33,0xf8,0x67,0x96,0xce,0x93,0x1d,0x4d,0x42,0x0f,0x55,0x5d,0x34,0x88,0x55,0xdd,0x8f,0x43,0xaa,0xfb,0xfe,0xea,0x53,0xee,0x69,0x10,0xcd,0xc3,0x94,0xab,0xe1,0xff .byte 0x89,0xb1,0x35,0xd2,0x21,0x0d,0x3a,0xa3,0x85,0xfa,0x42,0xb7,0xb1,0x16,0x97,0xb8,0xe3,0x1a,0xfa,0xab,0x86,0x1b,0x9c,0x66,0xf8,0xe6,0xae,0x1e,0x68,0x84,0xf5,0xef,0xb6,0x5c,0x72,0x86,0xa3,0x27,0x9a,0x65,0xff,0x54,0xe7,0x83,0xfe,0xd7,0x00,0xe9,0x63,0x1e,0x05,0xe3,0xe1,0x10,0x7a,0x19,0xee,0xb3,0xc8,0xf0,0x1c,0x2e,0x3c,0x79 .byte 0x05,0xf7,0x5e,0xcc,0x01,0x88,0xc8,0x1f,0x0b,0xbd,0xda,0x44,0xfd,0x97,0x53,0x58,0xa6,0xab,0xf7,0x89,0xb1,0x52,0x29,0x73,0xff,0xb1,0xfa,0x66,0x8a,0x56,0x22,0xe5,0x9c,0xbb,0xab,0x55,0x37,0x4a,0x3e,0xc3,0xeb,0x09,0xbe,0x40,0x77,0xcd,0xf9,0x0f,0xcf,0xa7,0x14,0x4b,0xe7,0x19,0x8c,0x12,0x31,0x2f,0x34,0x45,0x1d,0x1a,0x4f,0xf0 .byte 0xc5,0x24,0x78,0x39,0x2e,0x96,0x13,0x5b,0x47,0xcc,0xb9,0xb3,0xa6,0x16,0x4f,0xa3,0x2b,0xca,0x79,0x98,0x0d,0x89,0xad,0x65,0xdb,0x1c,0xf8,0x61,0x18,0x28,0x21,0x47,0x28,0x11,0x77,0xb5,0x33,0xf5,0xbd,0x92,0xb8,0xa6,0xdc,0xfe,0x67,0x20,0x3c,0x05,0xe5,0x14,0xc9,0xb9,0x40,0xc3,0x15,0x8e,0xd9,0xbf,0xef,0xcb,0x4d,0x0a,0xf7,0xbd .byte 0xc2,0x48,0x7c,0xdc,0x23,0x13,0xc2,0xc1,0x94,0x4a,0x8c,0xb8,0x62,0x2c,0xb5,0xd6,0x49,0x7e,0xaa,0x99,0x61,0xdc,0xae,0x18,0x5f,0xce,0xb4,0xe4,0x57,0xf1,0x48,0x7b,0xc3,0xc1,0x63,0x6b,0xa6,0xc3,0xbc,0xa8,0x93,0xd3,0x51,0xd7,0xfc,0x5a,0x89,0x73,0x4d,0xbe,0x48,0x75,0x51,0xaf,0x75,0x0d,0x48,0xf7,0x3c,0x34,0xdc,0xae,0xf5,0xf9 .byte 0xc1,0xb0,0x53,0x50,0x85,0xcd,0xf9,0xa9,0x37,0x48,0x14,0x6c,0x7f,0x7b,0x9c,0xa1,0xf5,0xb2,0xf4,0x38,0xbf,0x4b,0x39,0x8e,0xb5,0x2b,0xb5,0x1e,0x22,0xa8,0x52,0xad,0x1b,0x57,0x69,0xdc,0xb1,0xca,0xb6,0x2a,0x0b,0x42,0x6e,0xde,0xc6,0xb2,0xec,0x30,0x05,0x00,0x87,0xeb,0x7e,0x77,0x14,0x07,0x35,0x6e,0x11,0x09,0xc0,0xd9,0xc4,0xaa .byte 0x96,0xa4,0xa8,0xb6,0xd9,0x6d,0xf8,0xc5,0x52,0x7f,0x85,0x25,0xc2,0x81,0x1d,0x67,0x76,0x4a,0x45,0xa3,0xd5,0x40,0xaf,0x63,0x75,0xe5,0xcc,0xb0,0x46,0x0f,0xe6,0x7c,0xf8,0x5b,0x2e,0x09,0x98,0x89,0xc9,0x1b,0x8c,0x49,0x91,0xd9,0xcd,0x56,0x02,0x8d,0xcc,0x67,0x5c,0xa1,0x69,0x76,0x16,0x7a,0x93,0x44,0x04,0xb1,0x3b,0x19,0x28,0x15 .byte 0x73,0x11,0x81,0x92,0x42,0x5a,0x91,0x10,0xf4,0x36,0xed,0x7a,0x90,0x5c,0x74,0xb8,0x96,0x97,0xde,0xd7,0x5e,0x1e,0x78,0xb1,0x33,0xbc,0x0f,0x66,0x65,0x0e,0x68,0xb1,0x47,0x16,0xdc,0x89,0xc8,0x80,0x9e,0x44,0xc0,0x85,0x86,0xed,0xc7,0x74,0xc8,0xf4,0x3f,0xbe,0x2e,0xe7,0xa5,0x85,0x6f,0xf7,0x08,0x0e,0x40,0xec,0xc5,0x15,0xcc,0x63 .byte 0x13,0x91,0x75,0xc2,0x7b,0xbc,0xa4,0xf1,0xf6,0xa2,0xec,0xae,0x8b,0x60,0x08,0x2d,0xc0,0x17,0x3b,0x9e,0x34,0x15,0xe7,0x7c,0xb4,0x86,0xd3,0x69,0x7e,0xb0,0xa3,0x17,0x50,0x2d,0x64,0x7c,0x99,0x87,0x61,0x50,0x86,0x90,0x87,0x50,0xdd,0x5f,0x83,0x1f,0xc0,0x9c,0x14,0x44,0xed,0x96,0xce,0x41,0xe5,0xe6,0x38,0xc2,0xfb,0x5e,0xf1,0x3e .byte 0x31,0x82,0xbb,0x4c,0x59,0x23,0x47,0x6f,0x3e,0x55,0x76,0x4b,0xb1,0x39,0x53,0x3e,0x16,0xaf,0xbd,0x33,0x9f,0x05,0x05,0xa4,0x9a,0x10,0x83,0xa1,0xfc,0xf1,0x45,0x29,0x30,0x91,0x0f,0xb6,0xc0,0x32,0x23,0xd0,0xd8,0xcc,0x91,0x63,0x70,0x39,0x9a,0x95,0x0b,0xb0,0x47,0x8b,0x47,0x57,0x53,0x33,0xb3,0x51,0x9c,0x3c,0xf0,0x71,0xd0,0xf6 .byte 0x91,0x14,0xb4,0x05,0x2e,0x65,0x4d,0x1e,0xb6,0xce,0xf6,0xd2,0xb9,0x06,0x59,0xac,0x25,0xe7,0x9f,0x44,0x9d,0x53,0x3a,0x06,0xad,0x19,0xaf,0xb1,0xc3,0x6a,0x10,0xf7,0xc1,0xa1,0x31,0x7a,0x42,0x38,0x3f,0x81,0x22,0x8a,0x56,0xc6,0x68,0x0f,0x18,0x84,0xb9,0x5b,0xd1,0x6e,0x7f,0xae,0xa6,0xfe,0xb0,0x2d,0x91,0x20,0x49,0xb1,0xe2,0x19 .byte 0x4b,0x91,0x5f,0x5e,0x77,0x8b,0xd5,0x47,0x0c,0x15,0x36,0x12,0x91,0x01,0xef,0xc8,0x3a,0x39,0x22,0x03,0x9f,0x49,0x93,0x00,0x11,0xda,0x4b,0x6f,0xcd,0x3c,0xb2,0xc0,0xe5,0x78,0xa0,0xeb,0x61,0x56,0x97,0x28,0x53,0x3b,0xec,0x04,0x83,0x7e,0x77,0x78,0x50,0xf6,0xe0,0x0c,0x1f,0x5c,0xd5,0x0c,0x5b,0x45,0xfa,0xee,0xd0,0x26,0x5b,0xfb .byte 0x44,0x5e,0x49,0x04,0x17,0x97,0xbb,0xaa,0x69,0x1f,0x89,0xcb,0xc1,0xf2,0x53,0xaa,0x5f,0x4f,0x3e,0x49,0xca,0x74,0x51,0x60,0x0c,0x04,0xec,0x74,0xdb,0x58,0x18,0xc0,0x77,0xfd,0x26,0xe7,0x69,0x6d,0x44,0x93,0x89,0x32,0x89,0x88,0xde,0xe2,0x6d,0x9b,0x63,0xfc,0xe0,0xc1,0x92,0x0b,0x52,0xf9,0xef,0x17,0x0f,0x46,0xa0,0xa0,0x98,0x44 .byte 0x58,0xbd,0xe1,0x88,0x45,0x3c,0xf1,0xd6,0x5e,0x5b,0xd1,0x94,0x6e,0xe4,0xac,0x98,0xc0,0x44,0x7c,0x21,0xac,0xd0,0xa4,0x13,0x2e,0x5a,0x6d,0x54,0x2f,0x07,0x2b,0xca,0xa1,0xeb,0x81,0x4f,0xee,0xa2,0x4e,0x09,0xdb,0x28,0x2d,0x67,0x87,0x00,0xf6,0x52,0xb0,0xbe,0xed,0xa5,0x54,0xff,0x7d,0x27,0xb0,0x1e,0x49,0x9d,0x98,0xc4,0xf3,0xf3 .byte 0xd9,0x33,0xef,0x61,0x53,0x11,0xd3,0x8a,0x10,0x05,0xde,0xe3,0x39,0xf1,0x4a,0x17,0x9a,0xbd,0x76,0xbc,0xf6,0xd0,0x43,0xcb,0xe4,0xa7,0x26,0x29,0xc8,0x89,0x05,0xf2,0x26,0x19,0x4c,0x11,0x05,0xcb,0x73,0x3d,0x2d,0x2d,0x4a,0x7a,0x0b,0x87,0x23,0x86,0x18,0xd8,0x53,0x91,0xb4,0x73,0xea,0xa3,0xf4,0xb9,0x15,0x2c,0x36,0xba,0xc7,0xf1 .byte 0x3f,0x92,0xd7,0xde,0xc5,0xfc,0xe5,0x91,0x29,0xa7,0x0c,0x1a,0xf7,0x09,0x49,0xad,0x88,0xde,0x47,0xf1,0x5d,0x01,0x08,0x2d,0x20,0xc6,0x39,0x08,0x9f,0x02,0x3f,0x20,0xe2,0x21,0x68,0xa0,0x0d,0x1b,0xcf,0xbf,0xb2,0x2f,0x13,0x5c,0x88,0xae,0xc1,0x29,0xa7,0x54,0x4f,0xa3,0x37,0xf1,0xa5,0x0b,0x4f,0x1b,0xa4,0x39,0x0b,0x99,0x0d,0x65 .byte 0xfa,0xf1,0x43,0x46,0xc3,0xfd,0xcc,0x3b,0x7d,0x3c,0xd4,0x15,0x32,0x51,0xf4,0xbe,0xf8,0x46,0x01,0x62,0xa6,0xe2,0x44,0x1c,0x78,0x4c,0x57,0x13,0x2c,0x9d,0x8a,0xea,0xe0,0xfc,0x2e,0xe7,0x80,0x6f,0x90,0x67,0x00,0xf0,0x13,0xbb,0x05,0xe0,0xbd,0xf8,0x11,0x9d,0x7e,0x9d,0x01,0x61,0x3a,0x13,0x9a,0x02,0xfb,0x24,0xea,0x91,0x0c,0xe5 .byte 0xeb,0xe3,0x80,0x22,0xb6,0xac,0xe1,0x13,0x95,0x65,0x22,0xeb,0xf7,0x91,0xa3,0xe6,0x4b,0x54,0x1e,0xf8,0x7b,0xcd,0x27,0x7c,0xca,0xb7,0x88,0x52,0xdf,0xba,0x9e,0xf6,0xed,0x03,0xb4,0xac,0xab,0x17,0xe7,0xb0,0x5e,0x1a,0x19,0xee,0x61,0xdf,0xa5,0x23,0x28,0xd6,0x63,0xe3,0x45,0xea,0x92,0x70,0x94,0x31,0x32,0x8f,0x47,0xad,0xee,0x9e .byte 0x6a,0x2c,0x18,0x66,0x55,0xd1,0xd9,0xc6,0xd4,0x08,0x5a,0x7c,0xe8,0x09,0xcc,0x62,0x1e,0x24,0xed,0x2f,0x3e,0x1b,0x84,0x92,0x73,0x14,0x22,0xbc,0xb7,0xf0,0xed,0x3f,0x12,0x98,0x49,0x52,0xb5,0x29,0x5e,0x2d,0xca,0x23,0xeb,0x8a,0xb1,0xea,0x3c,0x6c,0x93,0x68,0x7f,0x84,0x4f,0x49,0x9c,0x9b,0xb8,0xc7,0xfd,0x6a,0xb7,0xf1,0xde,0xf9 .byte 0xc1,0x72,0x26,0xd1,0xfb,0x40,0x72,0x78,0xb0,0xa3,0xce,0xa8,0xab,0x3b,0x0f,0x8c,0x2b,0x13,0xe2,0xe3,0x86,0x9a,0xa0,0x69,0x46,0x85,0xdf,0x50,0x5b,0x60,0x9a,0xb7,0x4f,0xa9,0x76,0x70,0xd6,0xeb,0xbb,0x97,0xb7,0x63,0xed,0xec,0xbe,0x93,0x9f,0x79,0xff,0xcf,0x2c,0x09,0x85,0x22,0x1f,0x0e,0xbd,0xd4,0xb7,0x7b,0x1e,0x0e,0xc3,0x99 .byte 0x55,0x1b,0x50,0xc0,0xb9,0x68,0xe3,0xa9,0x59,0x73,0xa4,0xe6,0x86,0x6c,0xda,0xc5,0xba,0x76,0xab,0x56,0x94,0xa5,0x11,0xdf,0x1b,0x09,0x67,0xde,0x20,0x9f,0xf4,0xb8,0x6f,0x64,0xb1,0x9b,0xac,0x59,0xf9,0xcc,0xd8,0xc1,0x41,0xe9,0xdd,0x00,0xda,0x6a,0x11,0x3b,0xad,0x04,0x81,0x39,0x87,0x8e,0xf3,0x99,0xcf,0xde,0x29,0x7b,0x25,0x91 .byte 0x6e,0x2e,0x1d,0x83,0x9c,0xb6,0xa7,0xff,0x65,0x88,0xe8,0xc1,0xe7,0xca,0x7e,0x46,0xf0,0xc0,0xe7,0x55,0x36,0x76,0xa7,0xc5,0x25,0x06,0xc4,0x77,0x7b,0xff,0x61,0x1d,0x5a,0x77,0xa0,0xbc,0xa5,0x6f,0xda,0x3d,0xfe,0x92,0xd3,0x8e,0xc4,0x95,0xea,0x13,0xbd,0x18,0xff,0x8f,0xcd,0x7c,0x18,0xe1,0x88,0xee,0x5d,0xcc,0x8d,0xea,0x9e,0x21 .byte 0xe5,0x8f,0x8c,0x6b,0x51,0xbb,0xab,0x9d,0x64,0x53,0x70,0x5b,0x0b,0x5c,0xa0,0xde,0x4d,0x56,0x82,0xb0,0xa8,0x3b,0x91,0x0c,0xe6,0x8c,0x7b,0x24,0xdd,0x32,0xb9,0xf2,0x06,0xc0,0xce,0xcb,0x11,0x4f,0x5b,0x70,0xc3,0x09,0x37,0x5b,0xd9,0x69,0x97,0x0b,0x9b,0x37,0x14,0xb3,0x95,0x4f,0x5c,0x0a,0x3c,0x4f,0x79,0x65,0x22,0x07,0xd3,0xd6 .byte 0xe9,0x55,0x42,0xfa,0x47,0xe8,0x7c,0x5c,0x63,0x24,0xe5,0xd0,0x91,0x28,0x87,0x0f,0xe0,0x21,0x79,0x85,0x7a,0x8b,0xb9,0x37,0xa0,0x86,0x7c,0xfc,0x52,0x04,0xb1,0x1b,0x62,0x9e,0xc3,0x18,0x59,0x87,0xb1,0x86,0x17,0xac,0x0d,0xb7,0xca,0xa9,0x37,0x18,0x30,0x67,0x76,0x90,0x84,0x78,0xcb,0x62,0x26,0x24,0xf6,0x1b,0xfe,0xb8,0xc0,0x1f .byte 0xdc,0x1d,0x2f,0x52,0xe5,0x64,0xbc,0xd5,0x43,0x87,0xb9,0x66,0x2d,0xa9,0x5c,0x98,0x2c,0x2a,0xf9,0xf9,0x78,0xa7,0x0f,0x23,0xe0,0x11,0x36,0xa0,0x4e,0x40,0x2c,0x79,0xca,0x1c,0x44,0x76,0x3f,0x61,0x34,0x9e,0x01,0x8c,0x61,0x2f,0x84,0x52,0x15,0x22,0xb3,0x53,0x27,0x14,0x5f,0x54,0x09,0x24,0x83,0x47,0x90,0x43,0xc3,0xdf,0xad,0x66 .byte 0x9c,0x7a,0xa1,0x4b,0x53,0xc1,0x91,0xc5,0x48,0xfa,0xc4,0x6b,0x4a,0xc9,0xdc,0x85,0xb4,0xe2,0x21,0x88,0xda,0x27,0xcd,0x54,0xac,0xcf,0xb4,0x09,0x1d,0x5a,0x7f,0x23,0x2c,0x23,0xa4,0x98,0x96,0x29,0xa8,0xc7,0x33,0x45,0x79,0xd4,0x35,0x9d,0x78,0xbb,0x00,0x5f,0xca,0xcc,0x62,0x65,0x47,0xa3,0x8b,0x3b,0xd1,0x6b,0x18,0xb3,0xf4,0x1d .byte 0xac,0x9c,0x9b,0x90,0xbb,0xb0,0x0d,0x8a,0x7d,0x2e,0x3b,0xbd,0x52,0x35,0x11,0xfc,0xcd,0x59,0x76,0x2c,0x9d,0xf4,0x6b,0x29,0x6d,0x63,0x51,0xc9,0x3b,0x73,0x9b,0xcc,0x33,0x4f,0x0e,0xcd,0xf1,0x06,0xf0,0xe7,0xcf,0x93,0x66,0x51,0x34,0xb0,0x98,0x50,0x2f,0xa4,0xf8,0x37,0xdb,0x78,0xc2,0x36,0x20,0x9d,0x58,0xf1,0x52,0x35,0x7d,0x8a .byte 0xd0,0x43,0xab,0x46,0x0d,0x59,0xdb,0xf2,0x8e,0xe7,0x79,0xbf,0xf5,0x00,0xc8,0xbe,0x1b,0x98,0xf8,0x1e,0x53,0x1b,0x17,0xa9,0x2d,0x7c,0x7a,0xef,0x14,0x33,0x70,0x65,0x7b,0x55,0x82,0xe1,0x63,0x8e,0xf0,0x15,0xf6,0xb4,0x2b,0x18,0xe2,0x40,0x30,0x96,0x74,0xf7,0x91,0x82,0x83,0xef,0x74,0x38,0x89,0xea,0xaf,0x6f,0xd6,0x89,0x80,0x1c .byte 0x46,0xa2,0xaa,0xcd,0x60,0x84,0xa2,0x65,0x8a,0xc7,0x03,0x07,0xa0,0xc9,0x00,0xd7,0x34,0x54,0x33,0x08,0xba,0x1a,0xab,0x49,0x93,0x7f,0xd2,0x51,0xe4,0xcf,0x96,0x35,0x48,0xd0,0x91,0xa5,0x10,0x65,0x95,0xe2,0x01,0x3b,0x1c,0xa1,0x4b,0x8d,0x62,0x09,0x49,0xdf,0x67,0xde,0xe5,0x8e,0xcc,0xa6,0x99,0xc1,0x8b,0x6a,0x29,0xeb,0xa0,0xe4 .byte 0xaa,0x2a,0xd4,0xe9,0x28,0xb5,0xd1,0x39,0x78,0xe1,0xae,0x0f,0xc5,0x05,0x64,0xc8,0x62,0x27,0xf6,0x67,0xb5,0x79,0x52,0xd6,0x0d,0xbd,0x42,0xbd,0xa2,0x5d,0x00,0xd9,0xbe,0x5b,0x26,0x4c,0x20,0xdc,0xa2,0x33,0x9c,0x8e,0xd5,0x3c,0x75,0x7f,0x25,0xa2,0x04,0x70,0xfb,0x2a,0xb2,0xc6,0xb3,0xc0,0x1d,0xc5,0x58,0xe7,0xc1,0xd9,0x67,0x8c .byte 0x2c,0x30,0x93,0x97,0x84,0x72,0xdf,0x5f,0x49,0xac,0x9e,0x09,0x0a,0x35,0xfd,0x69,0x50,0xf4,0x45,0x34,0x8e,0x07,0x9f,0x09,0x4c,0x2d,0xd8,0x7d,0x47,0xc2,0x7b,0xd7,0x67,0xb7,0xcb,0x60,0x46,0x8b,0x4c,0xe1,0x81,0x88,0x56,0x8e,0x3d,0x32,0x10,0x77,0xb4,0x33,0xba,0x2c,0xcd,0x20,0x73,0x46,0xdb,0xfa,0x83,0x27,0x43,0x3e,0xc4,0xd4 .byte 0xd3,0x86,0x26,0x67,0x9f,0x1e,0xc8,0x1d,0x3c,0x5d,0x5b,0xcb,0xef,0x1a,0xcf,0x79,0xfd,0xce,0x72,0x8e,0xb7,0xce,0xc8,0x02,0x5c,0xde,0xe3,0x1c,0x78,0xb6,0xc1,0xb1,0xcd,0xee,0xf7,0x5a,0x57,0xa9,0xa7,0x37,0xfa,0x71,0x41,0xdd,0x1c,0xcb,0xb3,0xde,0x6f,0xbb,0xbd,0x43,0xa1,0xcd,0xc8,0x23,0x30,0xb6,0x03,0x18,0xb5,0x6f,0x20,0xc6 .byte 0xce,0x22,0x8a,0xf2,0x01,0x30,0x74,0x1c,0x27,0x9e,0x44,0xce,0xad,0x7d,0xbc,0x93,0x5c,0xaf,0xdc,0x05,0xda,0x41,0x92,0x7c,0x6b,0x47,0x62,0xb4,0x94,0xe4,0x2e,0x70,0x7e,0x86,0xdd,0xfd,0x61,0xbc,0xdd,0x9b,0xc6,0x8e,0xbb,0x7b,0x4f,0xd9,0x0a,0x74,0x8a,0xb7,0xb1,0x19,0x0b,0x37,0xbe,0xa6,0x7c,0x48,0x1b,0xcd,0x04,0x49,0x98,0x3b .byte 0x48,0x93,0x0c,0x2d,0x34,0xf4,0xdc,0x1d,0xa8,0x29,0xd1,0x70,0x32,0x5f,0x38,0xf6,0x5d,0xde,0xee,0x96,0xf9,0x48,0x15,0xb3,0xbc,0x10,0x65,0x0b,0x95,0xd8,0xee,0xac,0xa4,0x32,0xa8,0x06,0xee,0xe9,0xce,0x6f,0x9a,0xef,0x4f,0xa1,0x16,0x25,0xc5,0x21,0x10,0x52,0x8f,0x95,0xbe,0xd3,0x53,0x21,0x14,0xca,0xf0,0xe2,0xb8,0xf5,0x61,0x88 .byte 0x71,0xfe,0x2e,0xa7,0xf1,0xf7,0xfc,0xba,0xf4,0x09,0xbf,0xec,0x5d,0xb2,0xc1,0xa7,0x93,0x43,0x19,0xcd,0x09,0xf8,0x46,0x99,0x89,0x07,0x92,0xd8,0xb6,0x3d,0x7f,0x7d,0xc3,0xd9,0x53,0x4f,0xba,0x86,0x02,0xe6,0xd4,0x1f,0x43,0xd7,0xb3,0x35,0x59,0x7e,0x76,0x71,0xe5,0x02,0x74,0x95,0x7d,0x20,0xab,0x4b,0xfe,0x41,0x35,0xed,0x40,0x8c .byte 0xeb,0x54,0x50,0xe4,0x1a,0xec,0xe5,0x2f,0xa9,0xba,0x7e,0x89,0x94,0xc4,0x72,0xec,0x20,0x46,0x3a,0xea,0xc3,0x1c,0xd6,0x27,0x9a,0xca,0xa6,0x05,0x48,0xef,0x6d,0xad,0x1c,0xde,0xcb,0x33,0x0a,0x02,0x8c,0x5c,0x54,0x8c,0xba,0x0e,0x94,0x6a,0xb3,0xa6,0x66,0x5b,0xfc,0xd8,0xe4,0xb9,0xc4,0xd4,0x03,0xf7,0xc0,0xd7,0x16,0xab,0x58,0x04 .byte 0xe8,0x95,0xc4,0x25,0x79,0xe8,0x18,0xb5,0x54,0x32,0xd4,0x75,0xf6,0x80,0xda,0x35,0xac,0x09,0xbf,0x37,0x1b,0xed,0x6e,0xdb,0xa1,0x42,0x14,0x49,0x11,0x4c,0x7a,0xda,0xed,0xc9,0x9d,0xe1,0x21,0x04,0x37,0x7a,0xbd,0x26,0x2d,0x40,0xc8,0x88,0x69,0x4d,0xd2,0x52,0x93,0xa2,0x6d,0x9a,0xd4,0xb0,0xdf,0x9a,0xc1,0x84,0xc5,0x08,0x5a,0xd9 .byte 0x1f,0xbe,0x57,0x97,0x81,0x38,0x46,0x32,0xce,0xe3,0x0b,0x93,0x25,0x04,0xe5,0x7b,0xac,0xfd,0x37,0xc6,0x48,0x91,0x3c,0xef,0x5d,0x09,0xea,0x29,0xa9,0xc7,0x50,0x4b,0x47,0xe6,0xba,0xbd,0x96,0xe3,0x8e,0x9a,0x0f,0x8c,0x49,0xf4,0xe6,0xdf,0x3c,0xbb,0x51,0x12,0x8f,0x90,0x5e,0x77,0xd1,0x2e,0xd4,0xea,0x1f,0x34,0xac,0x6d,0xcf,0x74 .byte 0xb6,0xd4,0xaa,0x89,0xe0,0xa6,0x37,0x77,0x34,0xad,0x1a,0x7d,0x97,0x63,0x13,0x83,0x82,0x67,0x61,0xed,0xd6,0xbf,0xda,0x6a,0x09,0xce,0x0f,0x53,0xef,0x42,0x22,0x69,0x0f,0x8e,0xbb,0x6d,0xa5,0x57,0xcb,0xe3,0x3c,0xbe,0xd7,0x2e,0xc1,0x67,0x32,0xc0,0xa8,0xbf,0xbf,0x11,0xdd,0xdf,0xfd,0xc6,0x44,0xbb,0xca,0x4e,0xd1,0x2d,0x61,0x3c .byte 0xef,0xb4,0x8b,0xcd,0x76,0xa6,0x00,0xe0,0xb8,0x66,0x0c,0xed,0xd6,0x20,0xd3,0x27,0x33,0xcb,0x5e,0x76,0x33,0xbe,0xb4,0x3c,0x77,0x8b,0x14,0xec,0x93,0x16,0x54,0x1d,0x87,0x7d,0xeb,0xca,0x49,0xd3,0x2b,0xa6,0xbd,0xa5,0xe7,0x1a,0x3a,0x94,0xd9,0xb9,0xe0,0xaa,0x23,0x83,0x7c,0xe5,0xff,0x17,0xfd,0x14,0x63,0x8f,0xb8,0xff,0x93,0x8f .byte 0xc7,0xa7,0x7b,0x43,0x31,0xd4,0xa8,0xf4,0x6c,0xab,0x2c,0x44,0xd4,0x7d,0x80,0x79,0x33,0x4c,0x15,0x41,0x20,0x14,0x02,0x04,0xcd,0x3b,0x66,0xe7,0xd7,0x0f,0x87,0xda,0xb1,0x45,0x74,0x14,0xa6,0xc4,0xaa,0x19,0xa6,0x8d,0x7e,0x51,0xed,0x5a,0x42,0xa4,0xb9,0x7b,0x8c,0x87,0xfd,0xe1,0x4a,0x58,0x15,0xf5,0x1d,0xcf,0x59,0xe5,0xbc,0x11 .byte 0x10,0x7c,0xba,0x6b,0x47,0x9a,0xef,0x69,0x40,0xaf,0x3f,0x06,0x53,0x9f,0x96,0x55,0x30,0x83,0x9b,0x6a,0xfb,0xd3,0x93,0xf0,0x38,0x43,0xcb,0x5b,0xe4,0x23,0x0d,0x2c,0x1e,0xa9,0xe6,0xaf,0xd9,0xa9,0x19,0xf1,0xda,0x57,0x4b,0xd7,0x31,0x23,0x60,0x00,0x1b,0x88,0x15,0x68,0xe4,0xf1,0x26,0x1b,0x65,0xf5,0x6d,0xc8,0xc8,0x32,0x0e,0x65 .byte 0x2e,0x49,0xbd,0x88,0x5a,0xc2,0x05,0xf9,0xee,0x07,0xf2,0x27,0x9b,0xeb,0x54,0x23,0x8a,0x10,0xe6,0x7d,0x5a,0xeb,0xb4,0xc5,0x34,0x4e,0xdf,0xa8,0x05,0xf2,0x35,0x68,0x74,0x83,0xf3,0x90,0x36,0x2c,0x46,0xcd,0x6d,0x27,0xe5,0x40,0x07,0xb8,0x34,0x6f,0x80,0xcf,0x17,0x9b,0xae,0x68,0x59,0x25,0xed,0x70,0x9e,0xb9,0xfa,0x89,0x44,0x10 .byte 0x4d,0x6e,0xef,0x22,0x08,0x99,0x5e,0x07,0x9b,0xb7,0x31,0xfe,0x89,0x1c,0x7e,0x0c,0x0e,0xdf,0x4e,0xdc,0x04,0x43,0x67,0x27,0xfb,0x1d,0xd9,0x97,0x75,0xad,0x1d,0x6d,0x14,0x90,0x33,0x64,0x8c,0xbb,0xa4,0x61,0xcf,0x00,0x93,0xf4,0x4c,0xc2,0x49,0xda,0xc1,0xcd,0x55,0xba,0x39,0xa8,0x82,0x93,0xc5,0x3a,0xc9,0x4a,0x68,0x31,0x00,0x1b .byte 0xcf,0x7a,0xaf,0xff,0x0c,0x86,0x92,0x2a,0xda,0x71,0x55,0xcc,0xba,0x50,0x61,0x0c,0xb0,0x6e,0xe9,0xac,0x21,0x29,0x70,0x5c,0xbd,0xc6,0x4c,0x8f,0x96,0xa8,0x5f,0x51,0x8b,0xec,0x9d,0x32,0x13,0x09,0x7e,0x1b,0xa2,0xec,0x14,0x66,0x90,0xae,0x04,0xe8,0x90,0xe3,0x46,0x82,0x17,0x69,0xa5,0x22,0xb0,0x28,0x1a,0x24,0xe6,0x27,0xd6,0x8b .byte 0x97,0x54,0xbd,0x49,0xfb,0xb7,0xa7,0x17,0x6f,0xdd,0x84,0x1d,0x10,0x1a,0x40,0x79,0x98,0x40,0x4e,0xa5,0xa6,0x17,0x0d,0xe9,0x48,0xfe,0x73,0x95,0x2e,0x3f,0xb5,0x23,0x59,0x87,0x66,0x8a,0xa7,0x6a,0x98,0x6f,0x49,0x05,0x02,0x5a,0x6b,0x5f,0x46,0xdd,0x89,0xd1,0x4a,0x11,0x10,0xcf,0x0d,0x76,0x2e,0x4c,0xa4,0x15,0xd6,0xbd,0x2a,0xaf .byte 0xff,0xe0,0x9b,0xd8,0x35,0x46,0x15,0xa5,0xf8,0x92,0xe1,0x5f,0x05,0x2a,0x45,0xe0,0x51,0x47,0x41,0x36,0xaf,0xbf,0x33,0x1b,0x8d,0xd8,0xf2,0x83,0xfd,0x01,0x4d,0x10,0xe7,0x60,0xd8,0x94,0x1b,0x51,0xcc,0x87,0x80,0xe8,0x59,0x87,0x4f,0x03,0x2c,0xef,0xbf,0xd6,0x0a,0x23,0xe8,0xb5,0x24,0x4c,0xe7,0x97,0xf0,0x83,0x95,0x25,0x42,0x0f .byte 0xda,0xb8,0xd6,0x88,0x63,0x61,0x69,0xb5,0x0f,0xf6,0x31,0x3d,0xc6,0xc6,0x82,0xd8,0xc4,0xe5,0xce,0x09,0x30,0x4c,0xc7,0x87,0x39,0x47,0xae,0x18,0x46,0x23,0x11,0x8c,0x58,0x15,0xa8,0x22,0x63,0x16,0x44,0xe3,0x68,0x92,0x9a,0xac,0xec,0xdd,0x6d,0x17,0xbe,0xdd,0x73,0x14,0x7d,0xb0,0x7e,0xdf,0x75,0xa5,0x96,0xfd,0x7d,0x4e,0xa6,0xee .byte 0x35,0x21,0x9a,0x16,0x22,0x89,0x69,0xcd,0x26,0xfd,0xbb,0x1a,0x76,0xb8,0xed,0x33,0x38,0x41,0x13,0x3d,0xce,0xd3,0xdd,0x99,0xa9,0xc4,0x4d,0x5b,0xd4,0x76,0xd7,0xbb,0x6e,0x59,0x78,0x43,0x43,0xb2,0x32,0x0d,0x30,0xe7,0xa7,0x90,0x7d,0xb0,0x5a,0x5a,0x99,0x7b,0xb3,0x7d,0x43,0x91,0x91,0xbc,0x2f,0x55,0x3f,0x6e,0x69,0x87,0x29,0x89 .byte 0xd8,0xe8,0x0c,0x65,0x3e,0xab,0x21,0xee,0x1c,0xe1,0xc0,0x9e,0x2a,0xc7,0x3e,0xa9,0x94,0x58,0xad,0x74,0xf4,0x61,0x1f,0xdd,0x24,0xba,0x39,0x46,0x7e,0x11,0x1b,0x88,0xe6,0x69,0x28,0xfe,0xd0,0x38,0x61,0xc6,0x74,0x8b,0x33,0x89,0x32,0xe4,0x71,0xa2,0xd0,0xac,0x15,0x62,0x51,0xb4,0x55,0xbf,0xa1,0x1f,0x17,0x42,0x10,0x14,0x77,0x38 .byte 0x9f,0xb8,0x14,0x2b,0x2f,0xf5,0x11,0xfc,0x1e,0x9b,0xa9,0xee,0x03,0xc3,0xc9,0x06,0x42,0xa7,0xa0,0xe1,0x76,0x8e,0xc5,0x6c,0x2f,0xec,0xeb,0x6d,0xb4,0xd8,0x56,0xeb,0x99,0x04,0x0d,0x1a,0xae,0x54,0xe5,0x47,0x91,0xcc,0xaa,0xc4,0x26,0x77,0x1b,0x89,0x0d,0xe7,0x7f,0x25,0x42,0x14,0x55,0x87,0x17,0x75,0x53,0x64,0x6c,0xf3,0x52,0x71 .byte 0x2d,0xd2,0x17,0x80,0xca,0x52,0xb3,0x93,0x58,0xac,0xa0,0x8e,0x2b,0x8a,0xe7,0xbd,0x29,0xd7,0xd0,0xfa,0x3a,0xcb,0xc2,0x61,0x8e,0x04,0xc6,0x63,0xff,0x9c,0x31,0x36,0xcf,0x51,0x95,0xe9,0xd0,0xfe,0x6f,0x8b,0xe0,0x9a,0x9e,0x70,0x4e,0x29,0x1e,0xd3,0xec,0xde,0x9c,0x85,0x82,0xca,0x36,0xd4,0xf1,0x58,0x0e,0x38,0xc7,0x9b,0x61,0x87 .byte 0x24,0x05,0xc5,0xeb,0xe1,0xa7,0xa7,0x65,0x2d,0x73,0x10,0x85,0x90,0xe6,0x3c,0x18,0x22,0x9a,0x59,0x8e,0xdc,0xfd,0xc9,0x3f,0x76,0x7c,0xe5,0xb6,0x9d,0xd5,0x84,0x9a,0xcc,0x02,0xa8,0x94,0xf0,0xa5,0xff,0x16,0x4a,0xe1,0x9f,0x23,0x5d,0x6e,0xc7,0x4d,0x93,0xfa,0x5f,0xa4,0x76,0xa4,0x91,0x64,0x95,0x67,0x3c,0x47,0x8a,0xe0,0x5f,0x93 .byte 0x6b,0xa7,0x3e,0x56,0xfa,0xf1,0x1e,0xeb,0x03,0x45,0x17,0x2a,0xa2,0x78,0xe9,0x6d,0x0e,0x77,0x71,0x6f,0x40,0x94,0xce,0x28,0x16,0xa3,0xa9,0x44,0xa3,0x87,0x56,0xb1,0xf7,0xa7,0x9c,0x4c,0x22,0x69,0x8d,0x89,0x89,0xdb,0x2c,0xed,0x23,0x19,0x40,0x29,0x71,0xcd,0xf7,0xfa,0x9d,0xfe,0x04,0xb5,0xc0,0x8d,0xb0,0xb5,0x19,0x31,0x0b,0x1e .byte 0xeb,0x2d,0x1d,0x13,0xab,0xee,0x8b,0x9f,0x87,0x04,0xc8,0xe3,0xaa,0xf6,0xb3,0xf0,0x44,0xa1,0xb0,0x8b,0xea,0xde,0x8b,0xfb,0x6d,0x93,0xdd,0x49,0x6a,0xab,0x6f,0xae,0xad,0xf6,0x5e,0x2a,0xe8,0xb5,0xb3,0x03,0x3f,0x09,0xe8,0x69,0x38,0xc7,0xb9,0xf9,0x56,0x94,0x50,0x73,0x31,0x21,0x4b,0x6e,0xd3,0x0f,0x5e,0x8f,0xcb,0x6a,0x06,0x08 .byte 0x80,0x5b,0xd0,0x5d,0x5f,0x09,0xa0,0x31,0x46,0x4d,0x79,0x49,0xfc,0x4e,0x89,0x83,0xbb,0x6c,0x6d,0xc5,0x69,0x8f,0xb6,0xa6,0x99,0x0b,0xe5,0x0d,0xb5,0xa9,0xa7,0xc9,0x15,0xde,0x52,0xb3,0xa4,0x3f,0x3e,0xb2,0xb7,0x0c,0xe6,0x84,0x66,0x67,0x4c,0xa6,0x1a,0xbf,0xff,0x31,0xfb,0x69,0xee,0xc4,0xab,0x95,0xb6,0x5f,0x49,0x21,0x62,0x09 .byte 0x70,0xb9,0xa0,0x41,0xca,0x23,0xd2,0xc0,0xde,0x5d,0x2e,0x3e,0x41,0x33,0x7a,0xa8,0x23,0x3a,0x11,0xf9,0x2d,0x3f,0x86,0xe8,0x46,0xbb,0xc1,0xa6,0xb3,0x63,0xf9,0x9e,0xbc,0xbd,0x90,0xef,0x11,0x94,0xda,0xbd,0x92,0xba,0x36,0x96,0x27,0x66,0x87,0x12,0x13,0xe7,0x04,0x25,0x01,0xa8,0x20,0xcb,0x34,0xfd,0x6a,0x97,0x48,0x36,0xf4,0xa1 .byte 0x2d,0x56,0x61,0x72,0x9f,0x59,0x61,0x30,0xb4,0xb1,0x94,0xa8,0x71,0x08,0xd2,0x0b,0xa5,0x9c,0x3d,0x70,0xa4,0x54,0x61,0x82,0x4d,0x00,0x2a,0x7c,0x10,0x61,0x64,0x8e,0xd9,0x96,0x7d,0xdb,0xa0,0xcc,0x34,0xb4,0x24,0xea,0x46,0x12,0x81,0x65,0x52,0x68,0xb4,0xa1,0x56,0xdd,0x51,0x8b,0x4d,0x15,0xd9,0x72,0x9b,0x87,0x89,0xf3,0x31,0x6d .byte 0x83,0xb5,0xa6,0xb5,0x91,0xbe,0x9a,0xb8,0x1e,0x1e,0x5e,0xec,0xe0,0x6c,0xd7,0x3e,0xcc,0x0b,0x9d,0x5b,0x26,0xcc,0xb8,0xfe,0x17,0x14,0x68,0xa3,0xb5,0x6b,0x0d,0x68,0x75,0x06,0x14,0x22,0x3e,0xc8,0x28,0xa6,0x2c,0xc7,0xd4,0x08,0xe7,0xa5,0x8e,0xe5,0x76,0xb6,0x3c,0xce,0xb2,0x54,0xcb,0x27,0x39,0x9d,0x49,0xfc,0x1c,0x9d,0xf4,0xa3 .byte 0x46,0x98,0xae,0xd8,0x9b,0xed,0x85,0x17,0xe0,0xa4,0xd4,0xad,0xd3,0xed,0x1b,0x43,0x04,0xc5,0x10,0x36,0x8f,0x5e,0x06,0xfb,0x17,0x96,0x95,0xe5,0x8c,0x11,0x8c,0xb4,0xb0,0x6a,0xdf,0x8a,0xf8,0x75,0xe8,0x03,0xce,0xc2,0x43,0x26,0x98,0x48,0x3a,0x77,0x0b,0x34,0x22,0x78,0xee,0xc1,0x13,0x29,0x71,0xdd,0xde,0xd3,0x65,0x35,0xc2,0x28 .byte 0xe2,0x8f,0x21,0xde,0x45,0xa1,0x14,0xff,0x79,0x0b,0xad,0x7b,0x9a,0x57,0x2c,0x08,0x4d,0x09,0x62,0x85,0x01,0xf0,0x9f,0xc3,0xf2,0xbd,0xfc,0x1a,0x4d,0xaa,0x89,0xbf,0xe1,0xb1,0x72,0x27,0x04,0x2d,0x6b,0x7d,0x18,0x73,0x10,0xee,0x32,0xbe,0x4b,0x0d,0xe7,0xd6,0x2b,0x68,0x2f,0xda,0x46,0x0e,0x6d,0x07,0x3f,0xea,0x46,0x0e,0x57,0x58 .byte 0x71,0xa0,0x23,0x78,0x21,0x2a,0x8b,0xcc,0x2c,0x6b,0xcc,0x90,0xf6,0xb0,0x3a,0x70,0xef,0x7c,0x89,0x71,0xcc,0xc2,0x0b,0xab,0x8b,0x10,0xa9,0xf9,0x8e,0xca,0xf8,0xbf,0xa1,0x6a,0x20,0xf8,0x87,0x34,0x63,0x57,0x5f,0x5c,0x3a,0x71,0x6e,0x91,0x5f,0x4b,0xf6,0xc6,0x75,0xa7,0x98,0xdf,0x6a,0x57,0xb7,0x8c,0xbc,0xc3,0x26,0x35,0xd0,0x93 .byte 0x3b,0xb1,0x51,0x95,0x1a,0x6f,0xae,0x6a,0x5e,0x55,0x27,0xae,0xe4,0x99,0x5d,0xb2,0x73,0x35,0xc1,0x37,0xae,0xc7,0x68,0xf3,0x62,0xdd,0xca,0xa3,0x9f,0x39,0x02,0xc7,0xdf,0x3c,0x97,0x96,0x5a,0xd4,0xea,0xea,0xb7,0x6b,0xc3,0x08,0x49,0x93,0xdb,0x9b,0xe5,0x7f,0x7e,0xc0,0x0a,0xf3,0x35,0x9e,0xe4,0x40,0x72,0x27,0x0f,0xc1,0x7b,0x8c .byte 0x23,0xa6,0x52,0xa3,0xac,0xd7,0x63,0x10,0x83,0x86,0x36,0x2e,0x99,0xf0,0x75,0x53,0xa2,0x2e,0x7f,0xaa,0x22,0x39,0xf9,0xe5,0x6a,0x9b,0x72,0xa9,0xa2,0xc3,0x7c,0xce,0xd6,0x1b,0x1e,0xfe,0xd1,0xd4,0x52,0x58,0xe5,0xad,0x7c,0xbd,0x67,0xf0,0xa9,0x1f,0x5a,0xed,0xf3,0x4f,0x29,0x17,0x12,0x2c,0xbe,0x01,0x54,0x88,0x3d,0x4d,0xb4,0xd7 .byte 0xd0,0xad,0x46,0x9d,0xfa,0x62,0xab,0xf3,0x3d,0xcf,0x4a,0x89,0xd7,0x60,0xa8,0xde,0x73,0xfe,0xa6,0x2f,0xad,0xf7,0x4d,0x03,0xff,0xbc,0x3c,0xf7,0x3d,0x58,0xc2,0xf1,0xe5,0x80,0xd3,0xf0,0x7a,0x90,0x2c,0xd2,0xf3,0x85,0xb8,0x30,0xbd,0xc2,0x35,0xd0,0x30,0xe1,0xdd,0x6c,0x31,0x08,0xbf,0x75,0x61,0xe1,0x79,0x07,0xa9,0xe4,0x46,0x80 .byte 0x0b,0xf8,0x74,0xbf,0x7a,0x71,0x95,0x87,0x4f,0xc3,0x7e,0x32,0x9a,0x41,0xb5,0xa6,0x46,0x3c,0x07,0x1a,0x84,0x6a,0xf2,0xf2,0xc4,0xb1,0x0d,0x01,0xb4,0x9f,0x48,0x13,0xa3,0x8b,0x4d,0xbf,0x64,0x00,0x01,0xec,0x9d,0x35,0x1d,0xdc,0x62,0x92,0x19,0x48,0x3c,0x97,0x8e,0xee,0x29,0x6d,0x63,0x6c,0xb2,0x84,0x9b,0x16,0x84,0x89,0x6f,0x97 .byte 0xd3,0x3e,0x98,0xb8,0x93,0x5d,0xd4,0xdd,0xc5,0x7d,0x55,0x4c,0x53,0x4e,0xf7,0x4b,0x32,0xa3,0xae,0x67,0xdc,0xe9,0x7c,0x7d,0x9f,0x62,0x4e,0xf9,0x59,0xff,0xf8,0xd9,0x81,0x54,0x2f,0xaf,0xbc,0xad,0xbe,0xc4,0xf5,0x2f,0x71,0x34,0x1c,0x79,0x21,0xb4,0xaf,0x6c,0x1d,0xc8,0xb0,0xd3,0x8b,0x8d,0x04,0xcb,0xf1,0x35,0xa8,0xde,0xa5,0xfb .byte 0x9d,0xe5,0x98,0x8b,0xd2,0xd2,0x99,0x10,0x23,0xf7,0x0c,0x94,0xfd,0x9a,0x8a,0x4d,0x39,0x7e,0x79,0x2b,0x4a,0xe1,0x81,0x22,0x0d,0xb7,0x44,0xb1,0x9f,0x7b,0xd5,0xa6,0x7e,0x62,0x5c,0x3d,0x0f,0x00,0xf8,0x82,0xd0,0x30,0x05,0x05,0xc8,0x6e,0xc3,0x5c,0xdd,0xf8,0x18,0x7d,0x44,0xaf,0x28,0x5d,0x84,0x21,0xd2,0x5a,0x78,0x52,0x65,0x15 .byte 0x13,0xfb,0x25,0xb3,0xa4,0x7d,0x2f,0x5c,0xef,0xf6,0x6d,0xb4,0x9f,0xb6,0x21,0x9e,0xec,0xa5,0x15,0xc9,0xf0,0x92,0x92,0x36,0x49,0x46,0xea,0xe3,0x4b,0x38,0x5b,0xfa,0xc1,0x87,0x75,0x79,0x82,0xa0,0x37,0x30,0xca,0x0c,0xec,0x5b,0x5b,0xcd,0x1d,0x30,0xeb,0x63,0x11,0x66,0xb3,0x5f,0x81,0xfd,0x69,0x32,0x80,0x08,0x06,0xcf,0xbf,0xb0 .byte 0x31,0xec,0xa9,0x8f,0x66,0x00,0x05,0x55,0x04,0x0d,0xcf,0xb9,0x3f,0xcc,0x5b,0x1a,0x11,0xb4,0x96,0x39,0x70,0x26,0xd2,0x4d,0x4e,0xac,0x2b,0x36,0x4c,0x77,0x0b,0xc2,0x9b,0xd0,0xc6,0x03,0xc6,0xec,0xdd,0x74,0x53,0xe5,0x8a,0x9c,0x17,0xe0,0x1b,0xe8,0x1e,0xfb,0x9a,0x11,0x61,0x68,0xe0,0xf5,0x3e,0xe2,0x3a,0x4a,0x20,0xa0,0xe1,0x40 .byte 0xbe,0xdd,0xec,0x5e,0x1f,0x0f,0x87,0x9f,0x5d,0xc6,0x4b,0x2e,0x81,0x52,0x25,0x59,0x3e,0x3d,0xbb,0xb5,0x32,0x88,0xc0,0x3a,0x15,0x0d,0x77,0x9e,0x9e,0x31,0x26,0x61,0x24,0xa4,0xe6,0x35,0x50,0xca,0x61,0x55,0x8f,0x0a,0xaa,0x7c,0x3f,0x9e,0x30,0x04,0x03,0xa2,0x3c,0x2a,0x02,0xf4,0x70,0x9e,0xe7,0xa5,0x6e,0xb7,0x9b,0x4c,0x47,0xe5 .byte 0x1b,0xa7,0x91,0x36,0x1c,0xed,0x84,0xab,0xf4,0x33,0x56,0xb6,0x94,0xb8,0xa0,0x68,0x34,0x15,0x87,0xc6,0x7b,0x36,0xea,0x51,0x94,0xeb,0xde,0x6e,0xfd,0xde,0xe1,0x3c,0x44,0x04,0x8e,0xb1,0x35,0x4b,0x8c,0x2b,0xd2,0x4b,0x63,0x48,0x0c,0xbd,0x92,0x61,0x39,0x4d,0xdd,0xc9,0xb9,0x1f,0xf6,0xc8,0x70,0xfd,0x9c,0xd2,0xef,0x71,0x6c,0x32 .byte 0x99,0x2c,0xa5,0x8e,0xa9,0xb5,0x0f,0xeb,0x8d,0x9a,0xbc,0x2a,0x3f,0x11,0x68,0xb6,0xdf,0x93,0x4d,0xd3,0x6c,0x00,0x45,0xc3,0x5a,0xad,0xaa,0xe7,0x31,0x9c,0xad,0x9a,0xe4,0xf7,0xda,0xa0,0x5b,0x0b,0x23,0x78,0x40,0x92,0x12,0xe9,0x66,0x7c,0x04,0x60,0xbd,0xd2,0x74,0xcf,0xc9,0xd7,0xae,0x47,0x69,0x4b,0x5b,0x16,0x64,0x48,0xca,0x03 .byte 0x27,0x30,0x4c,0x65,0x0c,0xbf,0x74,0x03,0x81,0xaf,0xa2,0xb4,0x45,0xfe,0x9e,0x66,0x3a,0xa2,0xc8,0xce,0xc3,0x5e,0x6b,0xc7,0x70,0x51,0xfa,0xe3,0xce,0xc3,0x18,0x7b,0x39,0xfc,0x6f,0xae,0x31,0x09,0x2d,0x63,0xb7,0xb8,0x43,0x5c,0x78,0xa9,0x35,0xae,0x87,0x2a,0xf0,0xbc,0xc1,0xd8,0x21,0x02,0x2e,0x11,0x6b,0x41,0xa9,0x21,0x8d,0x94 .byte 0x70,0x85,0x08,0x22,0x9e,0xae,0x38,0x23,0x07,0x97,0x72,0xd5,0xa6,0x3c,0xb2,0xb9,0xaf,0x2e,0x8f,0xd3,0x25,0xaa,0xc4,0xee,0x77,0x72,0x17,0xe4,0xa8,0x4a,0xf4,0x79,0x8c,0x37,0xa1,0x80,0xbb,0x82,0x29,0x3a,0x7c,0x8a,0x6f,0x3a,0x83,0xaa,0x94,0xf3,0x95,0x66,0x0e,0xdd,0x51,0x09,0x12,0xf8,0x1d,0xb9,0xa8,0x83,0x2d,0x29,0x34,0xd5 .byte 0x53,0xcd,0xeb,0x22,0x31,0x22,0xea,0x65,0xb4,0x8c,0x0c,0x1b,0xf7,0x72,0x54,0xed,0xd3,0x2e,0xd6,0xc2,0xed,0xe9,0x12,0x61,0x7a,0x51,0xc8,0x50,0x01,0xf9,0xe8,0x12,0x43,0x4e,0x58,0x29,0xec,0xeb,0xdb,0xcd,0x94,0xba,0xaa,0x87,0x4d,0xbf,0x20,0x3e,0x31,0x05,0x7b,0x5a,0xfa,0x9a,0x16,0x14,0x11,0x2c,0x9f,0x96,0xe6,0x38,0xff,0xfa .byte 0x4e,0x05,0x3f,0xcb,0x13,0xdd,0x4e,0x70,0x41,0xce,0xb8,0xae,0xc2,0xf7,0x67,0xa0,0x68,0xb5,0x8d,0x03,0x72,0x4a,0x0e,0x27,0x99,0xef,0x09,0x32,0x3c,0x77,0xde,0x9c,0xfd,0x6c,0x65,0xcd,0x6b,0x10,0x42,0x08,0x12,0x30,0xa4,0x0c,0xdd,0xc9,0x86,0xc6,0xe8,0x84,0x6d,0x69,0x71,0x45,0x6b,0xb5,0xcb,0x74,0x81,0xe9,0x34,0xa5,0xf1,0x66 .byte 0x2e,0x31,0xcb,0xf8,0xec,0x9e,0x97,0x7e,0x3d,0x16,0xd7,0xab,0x5b,0xc8,0xf7,0x4f,0x59,0xbe,0x1f,0x12,0xfa,0x0d,0xb1,0x76,0x2d,0xe4,0x00,0xd9,0x30,0x3e,0x73,0x0a,0xa7,0xf7,0x19,0x06,0xe7,0xd4,0x81,0x2f,0xf0,0x8b,0x44,0xa9,0xaf,0xc8,0x95,0xd8,0xbb,0x92,0xb8,0x2f,0xd3,0x2c,0xcb,0x3e,0x5f,0x4e,0x42,0x2f,0x98,0x88,0xbc,0xf4 .byte 0x46,0x94,0x1d,0x5a,0x23,0xc8,0xb2,0x28,0x67,0xa7,0x26,0x1e,0x37,0x21,0x8a,0x7f,0xdc,0x8e,0x1c,0xa3,0x50,0x95,0x07,0xdf,0x8d,0x7b,0xab,0x29,0xc1,0x87,0x69,0x6a,0x8e,0xdf,0xcf,0x5f,0xb7,0x1b,0x8f,0xc7,0xc4,0x63,0x27,0x43,0x17,0x3d,0x29,0x94,0x71,0xa5,0xcc,0x1c,0xbf,0xc5,0x4a,0xd5,0x5e,0xe9,0x6d,0xa6,0x00,0x0b,0x41,0xe0 .byte 0x91,0x73,0xc9,0x22,0xf3,0xb2,0x5b,0x95,0xc8,0x5c,0x43,0xe2,0x48,0x3a,0x7e,0x67,0xf1,0x95,0x49,0xd9,0x47,0x68,0xc5,0xbf,0x28,0x2e,0x8c,0xcf,0x26,0xc2,0x23,0xec,0xb2,0xef,0xff,0x29,0x3d,0x7f,0x3f,0x4c,0xfb,0x7a,0x0d,0x80,0x89,0x0c,0x6d,0x45,0xf8,0xb9,0x72,0xa9,0x5b,0xbe,0x51,0x46,0x3b,0xe2,0x08,0x73,0x87,0x72,0x3e,0x1b .byte 0x7e,0x05,0x9d,0xce,0xc7,0x14,0xbe,0x36,0xa9,0xf8,0x5f,0x3e,0x3c,0x82,0x83,0x75,0xd7,0x96,0x9e,0x1b,0x6d,0x5b,0x2b,0x7d,0xdd,0xb9,0x42,0x19,0xbe,0x57,0xe3,0x9b,0xcc,0x3d,0x26,0x80,0xec,0x68,0x52,0x8f,0x85,0xd2,0x12,0x7b,0xe1,0x31,0x64,0xd6,0xde,0xe1,0xc1,0x8e,0x8c,0x66,0x8c,0x6b,0xb2,0x5f,0x75,0x9a,0x1b,0x96,0x78,0xb5 .byte 0x79,0x53,0xbb,0x70,0x4c,0x5e,0x8e,0x60,0xfa,0x1e,0xee,0xde,0x8d,0xd1,0x33,0xf6,0x36,0x95,0x00,0x6f,0xba,0xc7,0xf4,0xd1,0x96,0x33,0xf8,0xa2,0x20,0x65,0xf3,0x97,0x7d,0x0b,0x68,0x23,0x3d,0x39,0x54,0x67,0xb5,0xfc,0xff,0x48,0x04,0xb0,0xd2,0xea,0x09,0x1b,0xff,0x41,0x00,0xff,0x2d,0xc6,0x9f,0x8b,0x37,0xc9,0x35,0x37,0x38,0xd7 .byte 0x68,0x0e,0xa9,0x9b,0x19,0x25,0x17,0x94,0x55,0x0b,0x09,0x7f,0xc5,0x2f,0xb5,0x93,0x61,0x91,0x30,0xe5,0x46,0x09,0xff,0xf7,0x9d,0x7d,0x5e,0x9a,0x0e,0x5f,0xc1,0x2f,0xf3,0x09,0xc6,0xb2,0x86,0xca,0x0e,0x6f,0x3e,0x17,0x43,0x7d,0x4d,0x51,0x33,0x2b,0x57,0xf8,0xd0,0x1a,0x0e,0x8e,0xe6,0xc3,0x87,0x35,0xe4,0x53,0x3c,0xdf,0x9a,0xc9 .byte 0x5a,0x5d,0x40,0x80,0x90,0x97,0x7f,0x8c,0x55,0xbe,0x19,0x57,0x96,0x55,0x2e,0x7b,0x27,0x79,0x19,0xeb,0x8e,0x7a,0x27,0xf0,0xc4,0x9a,0x16,0x12,0xc9,0x41,0xdd,0xec,0x12,0x58,0x95,0xca,0xc7,0x77,0xd8,0xd8,0x17,0xa5,0x9b,0x79,0x8c,0xcb,0x04,0x07,0x69,0x06,0xf2,0x71,0x33,0x5e,0x96,0x56,0x90,0x75,0xa3,0x1b,0x4b,0x1b,0x18,0x71 .byte 0x18,0x25,0xc2,0x81,0x16,0xb6,0xd1,0x35,0x53,0x58,0x2f,0x49,0x4e,0xf0,0xab,0x23,0xa9,0xc8,0x28,0xc8,0x8a,0x2a,0x94,0x55,0x72,0xa2,0xf0,0x25,0x47,0x30,0x85,0x79,0xba,0x91,0x38,0xfe,0xbf,0x9d,0x05,0x8d,0xf7,0xd5,0x77,0x71,0x06,0x22,0x14,0x8b,0xb6,0x42,0x90,0x39,0xca,0x23,0x78,0xde,0x54,0x0e,0xe8,0xc5,0xb4,0xd6,0x07,0xf6 .byte 0x4e,0xa9,0xb4,0x9a,0xa1,0x03,0x36,0x83,0xb9,0x69,0x29,0xf5,0xc6,0x98,0x9f,0x47,0x53,0x46,0x13,0xf3,0xe5,0x93,0x28,0x20,0x5d,0x1f,0x0f,0x6a,0xee,0xa8,0xc1,0x96,0x7f,0xcb,0xf4,0xc3,0x17,0x95,0x6a,0xe5,0xc7,0xb3,0x77,0x0e,0xa8,0x9f,0x91,0xfd,0xb2,0x4b,0x7d,0xf7,0x78,0x57,0x9e,0x87,0xd7,0xf4,0x3e,0x81,0xc4,0x91,0x71,0xd9 .byte 0x6b,0x21,0x78,0x82,0x8a,0x03,0x5b,0x2e,0x89,0xc9,0xd4,0xca,0x5d,0x32,0x57,0x43,0xb0,0xe5,0xe3,0x9f,0x93,0xb5,0x4d,0x52,0xce,0xe6,0x46,0x05,0xe8,0x36,0x26,0x35,0x90,0x69,0x0c,0x8e,0xf0,0x65,0x03,0x65,0x32,0x10,0xae,0xdd,0x85,0xdd,0xef,0x84,0x0e,0xd1,0x03,0x51,0x02,0x0b,0x37,0x0f,0xdf,0x95,0xbb,0x5b,0xe2,0x25,0xda,0xd6 .byte 0x0a,0x55,0x55,0x8a,0x3a,0x72,0xca,0xc3,0x6f,0x84,0xe9,0x09,0xad,0x2f,0x73,0x1b,0x99,0xa6,0x22,0xc4,0xc5,0xf2,0x40,0x44,0xd8,0x4b,0x7a,0x75,0x82,0x06,0x9c,0x0f,0x73,0x89,0xa3,0x57,0x3a,0xf7,0x36,0xcf,0x86,0x34,0x2f,0x37,0x01,0xcf,0x4b,0x4d,0x83,0xe4,0xe3,0x92,0x1c,0xe7,0x67,0x01,0x72,0xec,0x50,0xe0,0x9f,0x0a,0xa9,0x41 .byte 0xe2,0x4d,0x43,0x01,0x14,0xe0,0xbc,0x11,0x4f,0xf8,0xdb,0xab,0x6f,0x07,0x5a,0x71,0x28,0xb9,0xaf,0x6e,0xd1,0x3d,0x3c,0x6e,0xd9,0xa9,0xe4,0xe2,0x71,0x40,0x31,0x9d,0x48,0xcb,0x76,0x3e,0x5d,0x0d,0xb4,0x11,0x0c,0x4d,0x89,0xba,0x16,0x8a,0xd6,0x43,0x99,0x65,0xec,0xbd,0xdd,0xae,0x4a,0xb4,0x6c,0x77,0x36,0x5b,0xef,0x51,0x33,0xcd .byte 0x3f,0x55,0xc5,0x00,0x25,0x85,0x0b,0x83,0xd6,0x22,0x70,0xb5,0x32,0x7f,0xb0,0x02,0x7b,0x8d,0x8c,0x09,0x37,0xf6,0x26,0x95,0xe2,0xb2,0x4c,0x7f,0x18,0x50,0xe9,0x96,0x65,0xe8,0x1a,0x70,0xff,0xbb,0x1e,0x35,0xda,0x41,0xbd,0x89,0xa8,0x7f,0xb0,0x85,0x05,0xd7,0xd1,0x11,0x66,0x2f,0xf6,0x66,0x50,0x05,0x66,0x58,0xb2,0x2a,0x5d,0xad .byte 0x42,0x60,0x14,0x7c,0xad,0xba,0x03,0xf8,0xce,0x29,0x6b,0x13,0xb3,0xdf,0xd1,0x5a,0x7a,0x11,0x8a,0x8b,0x6c,0x62,0x12,0xc3,0x77,0x28,0xcc,0x34,0x18,0x67,0x46,0xb5,0xda,0x87,0x1f,0x65,0x01,0xe7,0xe3,0x55,0x17,0xaf,0xd3,0x40,0x32,0x23,0x16,0x0a,0x57,0x86,0xab,0xdb,0xd8,0x18,0x71,0x96,0x11,0x1c,0xc1,0x87,0xaf,0xc9,0x7a,0xfa .byte 0x07,0x2a,0xdc,0x95,0x08,0xff,0xea,0x78,0x84,0x63,0x18,0xd5,0x54,0x6e,0x85,0x8e,0xcd,0xd6,0xff,0xea,0x8c,0xad,0xc4,0xdb,0x4f,0x33,0xcb,0x5c,0x01,0x6c,0xc4,0x60,0x04,0x43,0x7b,0x53,0x29,0x99,0xff,0xcd,0x4c,0xf1,0x82,0x11,0x85,0x84,0xf4,0xe5,0x29,0x65,0x6c,0x9f,0xb1,0x2b,0xa5,0xb5,0xc1,0xd6,0x5f,0xb7,0x0c,0x7b,0xf6,0x17 .byte 0xb7,0x80,0xaf,0xd2,0x9e,0x20,0x6e,0x01,0x5c,0x09,0x6b,0xd5,0xe3,0x4a,0x43,0x60,0x7e,0xc8,0xb4,0x1c,0x08,0x79,0x8e,0x48,0x71,0x22,0x81,0xd9,0x81,0x19,0x0a,0x04,0x29,0xce,0x09,0x70,0x82,0x49,0xc0,0xc0,0x3f,0xcc,0x9f,0x18,0x9a,0xd5,0x5e,0xde,0x70,0xdb,0x85,0xd8,0x53,0x71,0x7f,0x03,0xf1,0xf3,0x07,0x52,0x79,0x44,0xea,0xac .byte 0xd9,0xf3,0x0c,0x1e,0xb5,0x57,0xf8,0xfb,0x41,0x69,0xf1,0xf5,0x40,0xc7,0xd7,0x94,0x06,0x95,0x3a,0x49,0x0c,0x09,0x84,0xa7,0x1c,0x42,0x52,0x65,0xb9,0xef,0x6f,0x9b,0x37,0x5e,0xc3,0x3e,0x6b,0x96,0x93,0x02,0x94,0x9a,0xdc,0x04,0xb2,0x85,0x3c,0xa9,0x5b,0xa0,0x55,0x2e,0xaa,0x06,0xfd,0xc6,0xbc,0x73,0x32,0x08,0x26,0x5b,0x0a,0xa2 .byte 0x42,0xf2,0x61,0xb8,0x09,0xf0,0xaa,0xee,0xb7,0x35,0x63,0xe5,0xb2,0xfe,0xec,0xe7,0xae,0x62,0xf2,0x43,0x12,0xde,0xb4,0x8f,0xc1,0x06,0x72,0xde,0x7d,0x75,0x54,0x07,0x4a,0x99,0x83,0x39,0x97,0x9c,0x1e,0xd4,0xaf,0x2a,0x8c,0xb4,0x92,0xb5,0x9a,0xf7,0x87,0x8f,0x60,0xda,0xe5,0x01,0xca,0xc6,0x61,0x3d,0xb1,0xbe,0x33,0x58,0x2e,0xb1 .byte 0x7e,0xa1,0x3b,0x93,0x8d,0x25,0xe3,0xb4,0xea,0x94,0x26,0xbe,0xa9,0xf9,0xa1,0x2f,0x61,0xf4,0x7c,0x32,0x31,0x2e,0x99,0xdb,0xa4,0x3f,0xbf,0xd9,0xdb,0xca,0xd8,0x3d,0xda,0x44,0xe0,0x14,0x39,0x18,0xff,0x3e,0x5b,0xd2,0xc9,0x91,0xe1,0xa1,0xea,0x3f,0x1b,0x0e,0xd6,0x82,0xa6,0xb1,0xa2,0x6f,0x85,0x51,0xfc,0xa8,0x47,0xd7,0x87,0x28 .byte 0xc6,0x2f,0x2a,0x9f,0xad,0x7e,0xcc,0xd9,0xd2,0xfa,0x4c,0x28,0xca,0x66,0x55,0x1e,0x26,0x6d,0x19,0xe4,0x47,0x25,0x18,0x12,0xc5,0xe1,0x12,0x43,0x7c,0x96,0xb7,0x52,0xa6,0x07,0x04,0x83,0x44,0x82,0xcd,0x4e,0x79,0x07,0x0c,0x01,0xe4,0x81,0x25,0x98,0xce,0x2e,0x07,0x3c,0x76,0x39,0x37,0xc0,0xd0,0x54,0x14,0xaf,0x6c,0x87,0x99,0x1e .byte 0xf2,0xa3,0xd6,0x32,0x40,0xd1,0xe4,0x8d,0x60,0x32,0xf7,0xb0,0xaf,0x05,0x10,0x04,0xaa,0x99,0xfa,0xea,0x39,0x58,0x5f,0x30,0x06,0x2b,0x6d,0xd6,0x68,0x1c,0x85,0xcf,0xda,0xa9,0xd6,0xc3,0x05,0xd7,0xe3,0x3b,0x8c,0xc1,0xfe,0xf8,0x58,0x1d,0x1f,0x7b,0x80,0xcc,0xf3,0x4b,0x6f,0x3c,0x52,0x62,0x97,0x15,0xeb,0x5b,0x0f,0xaa,0x77,0x6c .byte 0x82,0x63,0x5e,0x84,0xbe,0xc5,0xb5,0x50,0x48,0x7c,0x56,0xbf,0x3a,0x8c,0xb4,0xbc,0x3e,0x8e,0xcf,0x2d,0xa2,0x26,0x3d,0xde,0x9d,0x4b,0xda,0xa4,0xd9,0x9b,0x6d,0xeb,0x35,0x44,0xa9,0x06,0x20,0x39,0x83,0xd5,0xeb,0x09,0xf0,0x45,0xdb,0xbb,0x9d,0x53,0x4d,0xbe,0xe3,0x3e,0x66,0xee,0xb2,0xce,0x3a,0xf0,0x75,0x92,0x58,0x79,0x5a,0xba .byte 0x1b,0x75,0x6b,0x83,0x0a,0xb6,0xe0,0x52,0xd3,0x61,0x2a,0xc0,0xa9,0x41,0x15,0x8c,0xd9,0x6b,0x87,0x94,0xda,0x31,0x0c,0x14,0x3e,0x37,0xd2,0xed,0xf6,0x40,0x57,0x70,0xc5,0xf5,0x0e,0xc4,0x3b,0x51,0xdf,0x4c,0xd2,0x42,0xbc,0xa5,0x3b,0x88,0x78,0x85,0x16,0x6c,0xaf,0x19,0xcf,0xb0,0x6a,0x42,0x07,0x66,0xf6,0xa7,0x4a,0x77,0x87,0x5f .byte 0x81,0x78,0x84,0xea,0x86,0xeb,0xe9,0x86,0xba,0x00,0xb4,0xe2,0xe7,0xd0,0x91,0x3d,0x9c,0x80,0xd6,0x37,0x86,0x96,0x80,0xcc,0xa0,0x8d,0xaa,0xc3,0x4f,0x79,0x9d,0xb8,0xa6,0xfb,0x0e,0x34,0x0d,0x54,0x1d,0xc1,0x51,0x62,0xb1,0x7b,0x8a,0x63,0x2c,0xbd,0xac,0xc7,0x6d,0x03,0xa2,0xdc,0xba,0xc9,0x70,0x9b,0x34,0x19,0x26,0x7f,0xd1,0x1e .byte 0xf7,0x47,0x38,0x3c,0x50,0x28,0xf8,0xba,0x0e,0xa0,0xfb,0x03,0xa1,0xb4,0x5e,0xf7,0x77,0xec,0x5d,0x94,0x6e,0xe6,0x40,0x1d,0xe4,0x0d,0x23,0x9f,0xe1,0x8c,0x7f,0xfa,0x83,0xd9,0x39,0x67,0xbd,0x41,0x82,0x37,0x7c,0x6a,0xc5,0x74,0x0d,0x41,0x35,0x55,0x64,0x7f,0x4c,0x3e,0x13,0xfc,0x41,0x4f,0x5e,0x1b,0xd8,0x4d,0x02,0x28,0x29,0x20 .byte 0x4c,0xcd,0x1b,0x5f,0xe7,0x51,0x68,0x2d,0x05,0xea,0x35,0x20,0xac,0x5b,0x44,0x70,0x02,0x55,0x20,0x17,0xcb,0xb5,0xd0,0xbf,0x79,0x33,0x02,0x69,0xa1,0xb0,0x24,0x10,0x62,0x0a,0x66,0x7c,0x0b,0xb2,0x50,0xa0,0xf6,0x94,0xf1,0x98,0xc7,0x8c,0x4a,0xef,0x03,0xb1,0x7e,0xe7,0x60,0xc0,0x38,0x7e,0xbf,0xbd,0x7a,0xa8,0x0b,0xe5,0x2d,0xed .byte 0x68,0xb0,0x37,0xa2,0x9b,0x6e,0x20,0x06,0xd2,0x7c,0xf7,0x50,0x03,0x19,0x74,0xf5,0xc8,0x84,0x44,0xeb,0x63,0x3f,0x10,0x63,0x36,0x62,0x48,0x96,0x4d,0xde,0xf2,0x08,0xc6,0xf4,0x09,0xeb,0x37,0xe8,0x0f,0x29,0xb5,0x9f,0xe6,0x58,0x86,0xf5,0xeb,0x18,0xa8,0xe0,0x28,0xf4,0x79,0x1f,0x98,0x60,0x82,0x67,0x06,0xfd,0x21,0x04,0x4d,0x33 .byte 0x17,0xc5,0x2f,0x3e,0x0d,0x8d,0x02,0x37,0x9b,0x66,0xb0,0x06,0x09,0xe0,0x92,0x10,0xb9,0x04,0x3a,0xc6,0x42,0x34,0x70,0xcb,0x51,0xd0,0x78,0xd3,0x0e,0x83,0x65,0x00,0xcf,0x95,0x83,0x51,0xca,0x62,0xfe,0x3e,0x3f,0xc4,0x7f,0x10,0x5b,0x85,0x00,0x5f,0x7d,0x38,0x93,0xf3,0xb7,0x33,0xbd,0x4c,0x1d,0xcd,0xc9,0xfa,0x05,0xb6,0x31,0x78 .byte 0xc8,0xc8,0x51,0x34,0xd6,0xb5,0x1a,0xa2,0xdb,0x7f,0x3d,0x8a,0x1b,0x49,0x36,0xaf,0x49,0x99,0x10,0x65,0xbe,0x19,0xf9,0x9f,0xaa,0xd6,0xc6,0x69,0x52,0x42,0x79,0x6b,0x64,0x53,0x90,0xb7,0x7f,0x7f,0xd2,0xde,0xe2,0xda,0x5f,0x3e,0xa6,0x5d,0xf2,0xcc,0x8a,0x88,0x2f,0x44,0xcf,0x07,0x77,0x7b,0x20,0x55,0xcc,0xa4,0x48,0x7d,0x87,0x6a .byte 0x25,0x35,0x07,0x7c,0x37,0x02,0xb5,0x7c,0x5f,0x2d,0xc2,0x92,0x1d,0xe5,0xb2,0x55,0x85,0xdd,0x58,0x24,0xc3,0x2a,0x11,0xca,0x02,0x36,0x44,0x96,0x7a,0xf3,0x42,0xfd,0x05,0xf8,0xe1,0xa0,0x06,0xd8,0x3f,0x37,0x4e,0x15,0xca,0x1c,0xe8,0x8d,0x20,0xed,0x83,0xa2,0x42,0x9a,0xe5,0x51,0xf0,0xae,0x43,0x9d,0xa8,0x76,0xb8,0xf6,0xca,0x06 .byte 0x5d,0xa1,0x61,0x36,0x4c,0x13,0x75,0xe5,0xbf,0x5c,0x40,0x43,0xa0,0x50,0x4e,0xf7,0xea,0x35,0xa2,0x43,0x38,0x6b,0x20,0x3a,0x8b,0x05,0x28,0xbe,0x72,0x16,0x48,0x9c,0xbf,0x2d,0xff,0x1e,0x0f,0x08,0x3b,0xaa,0x49,0x42,0x72,0x92,0x3b,0x4f,0x28,0x8b,0xab,0x4e,0xa0,0xaf,0x36,0xba,0x7e,0x19,0xa7,0xc7,0xfd,0xd4,0xe2,0x80,0x33,0x2b .byte 0xb9,0x2d,0x81,0x65,0x43,0xe1,0x3e,0xab,0xa5,0x36,0x00,0x68,0xb8,0xd8,0x27,0x64,0x85,0x10,0x67,0x68,0xd0,0x66,0xeb,0x2f,0xf2,0xa0,0x6e,0x6b,0xd5,0xc3,0x5f,0xa3,0x95,0xc8,0x5e,0x0f,0x3d,0x61,0xb3,0x12,0x99,0xd6,0x9a,0xe5,0x40,0x47,0xb4,0xcf,0x83,0xf2,0x79,0x31,0x18,0x54,0x6e,0x9c,0x32,0x63,0x2f,0x06,0x94,0x7a,0xd7,0x46 .byte 0x5b,0xd4,0xe3,0x58,0xbf,0x54,0xeb,0x47,0x85,0x47,0xe1,0x47,0x11,0x08,0x20,0x75,0x33,0x5c,0xed,0x58,0x26,0x5b,0x0f,0x4e,0x0f,0x8c,0x25,0x8c,0x36,0x28,0x03,0x73,0x93,0xb0,0xc8,0x9f,0x5e,0xd7,0x9e,0x57,0x88,0x07,0x92,0x1a,0xa0,0xfe,0xd0,0xc6,0x1c,0x7c,0x48,0x34,0x52,0x10,0xd1,0x3a,0x82,0x8d,0xe9,0x52,0xa1,0xfe,0x87,0x0f .byte 0x04,0x6a,0xb0,0x67,0xc6,0xd7,0x09,0x00,0x66,0x35,0x6a,0x67,0x12,0x92,0xf5,0xbb,0xc5,0x16,0x0d,0x20,0x71,0x52,0x30,0xbe,0x03,0xb2,0x36,0xcf,0x88,0x11,0xb0,0x93,0x4a,0x4f,0xb3,0xc5,0x7f,0xbe,0xff,0xc0,0x68,0xd7,0x44,0x6e,0x98,0x42,0x4b,0x21,0xbe,0xe3,0x33,0x30,0xa3,0xa5,0x3c,0x66,0x79,0xaf,0xe6,0x58,0x42,0x5e,0xc6,0xf9 .byte 0x5e,0xea,0x0a,0x5f,0x08,0x2d,0x96,0xa3,0xcc,0x17,0xf6,0xac,0x67,0xba,0xc4,0xf7,0x40,0xca,0xc3,0x66,0x36,0x01,0x29,0xcf,0xc2,0x1e,0xfa,0xe2,0xba,0x44,0x36,0xda,0xf6,0xc5,0x53,0x35,0x64,0x74,0x0d,0x16,0x75,0x2a,0x82,0x3a,0x4e,0x5a,0x2c,0x62,0x23,0x2a,0x66,0x0f,0xad,0xdc,0x44,0x77,0x2f,0x78,0x74,0x82,0xe2,0xbf,0x3e,0x19 .byte 0x00,0x58,0xb7,0x65,0xb0,0x24,0x87,0xc5,0xe0,0x7c,0xbd,0x3a,0x97,0x30,0xa7,0xd4,0x79,0x91,0x96,0x7e,0x7d,0x75,0xf5,0x9d,0xb3,0x0e,0x2a,0xde,0x08,0x96,0xb6,0xdc,0xa4,0xf6,0xf7,0xa4,0xde,0xb7,0x9b,0xc5,0x75,0xdf,0xa6,0xe1,0x6f,0x5a,0x9f,0xaf,0x1d,0x60,0xac,0xde,0x1a,0xb9,0x02,0x0b,0xc5,0x6e,0x24,0x59,0xf9,0xc8,0xdc,0x97 .byte 0x53,0xf4,0x1b,0xf8,0x53,0x80,0x34,0xaa,0x53,0xaf,0x06,0x79,0xeb,0x39,0x72,0xd4,0x1d,0xf2,0xb7,0x26,0x41,0x8c,0xc5,0x6d,0x86,0xf8,0x34,0x98,0x98,0xa0,0x19,0x2e,0x9f,0xb0,0x0b,0xe8,0x3d,0xef,0xe1,0xb6,0x18,0xc3,0x63,0xc4,0x0e,0x6e,0x92,0x41,0x43,0x9a,0x2a,0xe3,0x3a,0x9f,0xac,0xac,0x0a,0xe8,0x6a,0xa4,0xa6,0x97,0x0e,0xd9 .byte 0xbd,0x97,0x57,0x38,0x6c,0x2c,0xa4,0x62,0xdb,0xea,0xb6,0x90,0x4c,0x7c,0x29,0xd2,0x06,0x24,0x57,0x5d,0x2c,0x71,0xb4,0xa5,0x13,0x5e,0x6e,0xb5,0x42,0x7e,0xb5,0x3f,0xd0,0x49,0xa5,0xd2,0xf6,0xe5,0xc8,0x86,0xef,0xae,0xcc,0x98,0x5f,0x0d,0x43,0x20,0x2f,0xe4,0x90,0xd1,0x1d,0x66,0xc4,0x38,0x7f,0x63,0xea,0x39,0x8b,0x16,0xfa,0x19 .byte 0x77,0x8c,0xbf,0x28,0x4c,0xce,0x6c,0x08,0x98,0x7b,0x6a,0xf8,0xb3,0xc9,0x41,0xb1,0xf4,0xf4,0x05,0xbd,0xdb,0xd9,0xf8,0x0d,0x74,0xfe,0x3a,0x07,0xe7,0x11,0xbd,0x33,0xc2,0xd6,0x59,0x62,0x4f,0x22,0x86,0xf6,0xf2,0x9a,0x19,0x81,0xe7,0x17,0xfb,0xe7,0xfa,0x7f,0x6a,0xcf,0xf1,0x71,0xe7,0xf0,0xbb,0x6b,0xe1,0xc1,0x26,0x6e,0x41,0xfd .byte 0xa4,0x83,0xd9,0x68,0xcd,0xc4,0x7b,0x04,0x7a,0x3f,0x18,0xa9,0x73,0x21,0xa2,0x38,0xc2,0xf4,0x88,0x7e,0xa6,0x20,0xaf,0x60,0xb9,0xb9,0xf0,0x74,0x52,0x3a,0x09,0xe6,0x22,0xc8,0xa0,0x0f,0xf1,0xa4,0x02,0x2a,0x80,0x17,0x40,0x83,0x26,0x5e,0xe5,0x78,0xc3,0x78,0x5b,0x9d,0x74,0xf4,0x4f,0x58,0x5a,0xfc,0xde,0x11,0xf7,0xee,0xdc,0x68 .byte 0x57,0x1a,0x54,0x0a,0xe3,0xf2,0x77,0xe1,0x36,0x4d,0xa4,0x9e,0xad,0x86,0x81,0x54,0xd9,0xa5,0x90,0x0e,0xa9,0xfb,0x95,0xaa,0x98,0xea,0x0d,0xc7,0x33,0x40,0x62,0x67,0xf2,0xdf,0x54,0x64,0x82,0xd0,0x21,0xd9,0x87,0xcb,0x47,0xff,0x3b,0xde,0x53,0x61,0x4f,0x33,0xb2,0x4a,0x76,0xd6,0xa2,0x66,0x93,0x39,0x8b,0xee,0xbc,0x0d,0x54,0x8e .byte 0xe4,0xfe,0x4b,0xae,0x2f,0x05,0xcf,0xfc,0x0e,0xa7,0xc8,0x8d,0x43,0x66,0xc7,0xc8,0x64,0x49,0x57,0xca,0xe2,0x1a,0xac,0x11,0xc2,0x17,0xf2,0x6a,0xc5,0x97,0xb9,0x28,0xe0,0xe7,0x3b,0x6f,0x78,0x99,0x5c,0xec,0x30,0xb7,0x1c,0x9f,0x2f,0xac,0x4d,0x1d,0x90,0x8e,0x6a,0x0d,0x20,0xe6,0x43,0xf3,0x1e,0xa6,0xc8,0x00,0x0e,0x5e,0x62,0x9d .byte 0xea,0x58,0x23,0x46,0x43,0x29,0xc6,0x1f,0x0c,0x9a,0x3e,0x19,0x53,0xf2,0x3f,0xd8,0x13,0x68,0x90,0x98,0xa3,0xcf,0x22,0x3c,0x55,0xfc,0x36,0x15,0x14,0x39,0x8b,0x32,0xa7,0x81,0x96,0xb1,0x3e,0xf2,0x2c,0xf8,0xea,0xf6,0x10,0xe5,0x89,0x30,0xa5,0xa4,0xc7,0x5b,0x41,0xfd,0x0c,0x39,0x60,0x9c,0x0d,0x49,0x36,0xa8,0xe6,0xe7,0x9c,0xbe .byte 0x8e,0x23,0x7c,0xb2,0x86,0x6e,0x6b,0x0e,0xa7,0xa7,0xc5,0x42,0xcf,0x14,0xf1,0x88,0xb9,0x7b,0x1f,0xfd,0x5b,0xd6,0xbe,0xa7,0x19,0x15,0x29,0x34,0x44,0x40,0xc8,0xfa,0xde,0x69,0xde,0xec,0xa6,0x39,0xfe,0xce,0x44,0xa9,0x39,0x5d,0x6e,0xac,0x75,0x77,0x32,0xc5,0x28,0xfd,0x18,0xa0,0x2a,0x3e,0x1f,0x30,0x63,0x8e,0x46,0x15,0x49,0x49 .byte 0x15,0xb4,0x1b,0x69,0x83,0x92,0xac,0x3b,0x76,0x75,0x52,0x18,0xbf,0x0c,0xc0,0x55,0x80,0xac,0xf0,0x4f,0x49,0x00,0x6e,0xd2,0x46,0xcc,0x9d,0x4b,0xb3,0x75,0x6a,0x4b,0x43,0x29,0xf4,0x8f,0x9f,0x61,0x51,0xd8,0x59,0x8e,0x9d,0x9c,0x95,0x69,0xdc,0xba,0x73,0x03,0x55,0x65,0x19,0xc1,0x94,0x31,0xde,0x5e,0x26,0xd7,0x3c,0xde,0xae,0xf6 .byte 0xa0,0xf5,0xc4,0x9c,0x7c,0x3a,0x8d,0xe4,0x90,0x71,0xd6,0xc1,0x84,0xd9,0xb3,0x80,0xae,0x78,0x96,0xec,0x30,0x6d,0x2d,0x74,0x37,0x14,0x2b,0x6c,0x88,0x2c,0xcd,0xd3,0x50,0x15,0x38,0xf5,0xe2,0x85,0xaa,0x95,0xdd,0xed,0x8e,0xe4,0x6d,0xa5,0x6b,0x27,0xee,0x4b,0xaf,0x9e,0xbc,0xae,0xf9,0xc7,0x85,0x0e,0x30,0x30,0x10,0xde,0x9e,0xe5 .byte 0x05,0xd8,0xd9,0xaa,0x3c,0x6c,0x59,0x7d,0xc2,0x59,0x33,0xb5,0x94,0xc1,0xa8,0x27,0xff,0x7d,0xdd,0x6e,0x8b,0xc5,0x09,0x52,0x04,0x72,0x72,0x81,0x6e,0xaf,0xe0,0x15,0x42,0x4a,0xb3,0x46,0xdc,0xfb,0x8c,0x5a,0xe4,0xcc,0xfb,0x94,0x47,0xd7,0xe3,0x8e,0x6a,0x73,0x23,0x12,0xdb,0x2e,0x2b,0x7e,0x7a,0x25,0x7c,0x75,0x0e,0xa2,0x7e,0x20 .byte 0xdc,0xc9,0xc3,0xd5,0x63,0x96,0x19,0x25,0xb7,0xa4,0x8e,0x1a,0x5a,0x92,0x62,0xcb,0xa8,0x5b,0x80,0x61,0x26,0x1b,0x6d,0xab,0x1e,0x09,0xd4,0x06,0xd4,0x96,0xc9,0xc8,0x51,0xb9,0xfd,0x19,0xca,0xc6,0x65,0x74,0xf5,0x4d,0xee,0xc8,0x52,0xb4,0x17,0xff,0x63,0x46,0x45,0xdf,0x8f,0xd1,0x49,0x05,0xe3,0x36,0x76,0xdd,0x47,0x8a,0x7e,0x43 .byte 0x6d,0x0a,0x11,0x78,0xbc,0x56,0x6d,0x5e,0x62,0x5e,0x6d,0xfc,0x03,0x9c,0x53,0x25,0x10,0xc4,0xd4,0x48,0xf9,0x67,0xa4,0xb5,0x71,0xe7,0x08,0x42,0x37,0x1b,0xe1,0x9c,0xe6,0xb5,0xbc,0xf5,0xc6,0x56,0xab,0xd1,0x45,0x93,0x2c,0xbe,0x87,0x52,0x27,0xa1,0xe3,0x38,0x1a,0x4d,0xae,0x98,0xb3,0xf8,0x4d,0x00,0x76,0xe3,0x31,0x62,0x83,0x04 .byte 0xee,0x62,0x35,0x70,0xb4,0x98,0x4c,0x5a,0x0f,0xcf,0x94,0xf3,0x4f,0xab,0xd7,0xbc,0xa0,0x9f,0x5e,0xe7,0x58,0x40,0xb5,0x9f,0xf8,0xd3,0x86,0x25,0x13,0x12,0xb3,0x0a,0x72,0x1f,0xef,0x39,0x07,0xf4,0x1c,0x6c,0x38,0xb7,0xd5,0x5b,0xda,0x68,0xd5,0x68,0xc7,0xa6,0x2b,0x94,0x33,0x11,0xff,0x71,0x15,0x86,0x58,0xb5,0x62,0xdc,0x7a,0x1b .byte 0xdb,0xc5,0x81,0x24,0xcb,0xcb,0xbd,0x03,0x15,0x8d,0xdb,0xdb,0x20,0x51,0x0e,0x2d,0xc3,0xa2,0x3d,0x3a,0x3d,0x00,0xdb,0xbd,0xf0,0xe4,0x82,0x8f,0x9c,0xf7,0xdb,0x82,0xac,0x50,0xe5,0x2b,0x35,0x65,0xee,0x7a,0x61,0x4d,0x29,0x32,0x60,0xd0,0x02,0x40,0x45,0x75,0xc7,0x48,0xa7,0x0f,0x1e,0x1c,0xb4,0xd9,0x06,0xd4,0x31,0x72,0x24,0x33 .byte 0x57,0xe6,0xe6,0x3d,0x3a,0xde,0xbd,0xc0,0xbc,0xfd,0x78,0xe5,0x8c,0x8f,0x36,0x33,0xba,0x70,0xea,0x78,0x30,0x50,0xb6,0x79,0xb5,0x63,0x43,0xea,0x88,0x6c,0x8c,0x9a,0x42,0x44,0x15,0xb9,0xdc,0xdf,0xaa,0xfa,0xe7,0x76,0x26,0x32,0x98,0x96,0xdc,0x0c,0x3f,0xf9,0xff,0x9e,0x09,0xba,0x19,0xef,0x10,0x35,0x93,0x3c,0xb8,0x48,0x39,0x05 .byte 0x98,0xaa,0x74,0x53,0xf3,0x2b,0x62,0xdd,0xa1,0x28,0xe8,0x0d,0x52,0x51,0x89,0x80,0x68,0x1d,0xb9,0x86,0x01,0x69,0x9b,0x53,0x5f,0xe8,0x05,0xe5,0x34,0x62,0xfa,0x70,0x9d,0xcd,0x00,0x74,0xf6,0xc3,0x68,0xb9,0x8d,0x7b,0xff,0x05,0x70,0xf9,0xa5,0xc8,0xa2,0x42,0xc0,0xc2,0x2e,0xb2,0xc1,0x33,0xfd,0x5c,0xf2,0x05,0x82,0xf2,0x29,0x0f .byte 0xd1,0x05,0x13,0xba,0xe0,0xbd,0x00,0x89,0xbe,0x04,0xb3,0x09,0x1b,0xd5,0x3e,0x56,0x74,0xf9,0xb5,0xf5,0x46,0x13,0x1c,0x2f,0x90,0xd6,0x24,0xa1,0x5a,0x94,0x65,0x78,0x30,0x67,0x0e,0xe2,0xc9,0x9a,0x3f,0xe6,0xdc,0xdc,0xca,0x11,0xf4,0xd0,0x04,0xe4,0x14,0xef,0xc6,0x7b,0x11,0x14,0x29,0xc4,0xde,0xe7,0x25,0xeb,0x44,0x74,0x7e,0xdb .byte 0x71,0x0b,0x58,0xdb,0x1f,0x15,0x85,0xb3,0x43,0x6d,0x3c,0xda,0x69,0x3c,0x84,0xf4,0x41,0x55,0xd0,0x99,0x4f,0x9b,0x8d,0x68,0x18,0x2c,0x2a,0x58,0xc8,0xc2,0xac,0xa5,0x30,0x37,0xa6,0x44,0xd0,0xd6,0x92,0xe4,0xa3,0x0d,0x2b,0xc4,0xa3,0x54,0xc2,0x3d,0xaa,0xf0,0x03,0x66,0x1e,0xac,0x05,0x5a,0xb5,0x46,0x96,0xc5,0x09,0x93,0xa7,0x98 .byte 0x16,0x5a,0xb7,0xfb,0x9f,0x70,0xcc,0xe5,0x03,0x74,0x66,0x2c,0xac,0x7b,0x11,0xfd,0x9d,0xf3,0x2d,0xaa,0xf0,0xea,0x4f,0x00,0x9d,0x11,0x20,0xa4,0x2b,0x3e,0x8e,0x2f,0xcd,0xfd,0x8d,0xaf,0xbe,0x8b,0x72,0xc3,0xd7,0x18,0x2c,0x88,0xdd,0xae,0x2e,0xf6,0xd9,0xb9,0x9e,0x68,0xb7,0xe5,0xde,0x83,0xeb,0x16,0x19,0x43,0x21,0xbb,0x24,0x33 .byte 0xc4,0xce,0xb2,0xb4,0x13,0x52,0xf5,0x62,0xfe,0xd1,0x37,0xf2,0xee,0xd4,0xa9,0x4b,0x35,0xf5,0xfd,0x7b,0xb0,0x85,0xee,0xb7,0x96,0x32,0x49,0x07,0x5f,0x98,0x8d,0x5e,0x16,0xdd,0xbb,0x88,0x82,0x1f,0x35,0x25,0x24,0x09,0x62,0x4d,0x82,0x09,0xa4,0x13,0x91,0x51,0xc9,0x85,0xae,0xee,0x2f,0x6a,0x9c,0xcc,0x73,0x8c,0x7c,0x61,0x05,0xc3 .byte 0x18,0xa1,0xc1,0x7b,0x3d,0x85,0x0e,0x03,0x30,0xa5,0x5f,0x0b,0x33,0xd6,0xc8,0x1a,0x37,0xb0,0x3e,0xc7,0x7e,0x24,0x53,0x7f,0xfe,0x64,0x91,0x46,0xf9,0x6a,0x4a,0x87,0x92,0x0e,0x4d,0x62,0xb8,0x70,0xf9,0xa3,0x76,0x5e,0xc1,0x45,0x24,0x46,0xe9,0x0a,0xf0,0x50,0x21,0x3c,0x6a,0x3a,0x90,0x1b,0x36,0x5d,0xc6,0xd5,0x48,0x78,0x09,0xe0 .byte 0x24,0xd8,0x16,0xc0,0xec,0x3a,0xb5,0x12,0x8c,0x7c,0xc0,0xb1,0xf7,0x00,0x63,0x96,0x37,0x44,0xc2,0x8f,0xad,0xdc,0xda,0xa4,0x3a,0x5c,0x04,0x14,0x60,0xc4,0xf5,0x64,0xdd,0xf1,0xd9,0x04,0x6f,0xc6,0x0b,0x3d,0x7d,0x40,0x32,0xcc,0x79,0xb5,0x2f,0x99,0xc3,0xf7,0x7b,0xd9,0x54,0x60,0x49,0x46,0x92,0xd8,0x71,0x3e,0xca,0xfe,0x8c,0xb3 .byte 0x52,0x3b,0xbf,0x42,0xec,0xab,0x71,0x0d,0xa6,0xb9,0x53,0x37,0xed,0x01,0x58,0xbc,0x00,0x55,0x5d,0x0d,0x0d,0xb0,0x62,0x53,0xbf,0x76,0xba,0xfa,0x15,0xe7,0x22,0x69,0x9d,0x1c,0x23,0xfc,0x2d,0x65,0xa0,0x6d,0xba,0x39,0x3e,0x51,0x51,0x4b,0x50,0x10,0x59,0x04,0x82,0x92,0x75,0xa1,0x24,0x62,0xe3,0x5b,0x85,0xb1,0xfa,0xc4,0xc0,0xe9 .byte 0x26,0x19,0x63,0x2e,0xa9,0x16,0xda,0xae,0x45,0x1c,0x84,0x4c,0x94,0x6a,0xd0,0xd1,0xd2,0xb0,0x6c,0xb0,0x3b,0x3a,0x90,0x9e,0x7a,0xa7,0xb6,0x1b,0x2c,0x1d,0x7d,0xfe,0xfe,0xc7,0x7d,0x4d,0xf2,0xdf,0x23,0x54,0xea,0xb1,0xcf,0xd0,0xd1,0x1d,0xaf,0x01,0x86,0x73,0x18,0x1a,0x66,0xc1,0x66,0x32,0xd9,0xf3,0x07,0x65,0x6d,0xe9,0xae,0xfd .byte 0xb3,0x8e,0x18,0x7a,0xb4,0x5d,0x53,0xb0,0x26,0x51,0x08,0x40,0x42,0x8e,0xcc,0xdc,0xdf,0x39,0x36,0xa5,0xbe,0x91,0x41,0xe4,0x78,0x29,0x76,0x54,0x61,0x43,0xa4,0xb7,0x94,0x0e,0x17,0x7f,0x46,0xad,0x5a,0x3d,0x6b,0xfc,0xf9,0xa0,0x3a,0xe5,0x86,0x75,0xc3,0xff,0xab,0xbc,0x99,0xeb,0x9f,0x85,0xb8,0x0c,0x9c,0x9b,0x6f,0xd3,0x74,0xf6 .byte 0x58,0x72,0x96,0x5c,0x49,0x31,0x4f,0x61,0x4f,0x78,0x8b,0x94,0x40,0x75,0xf4,0x66,0xcc,0xd9,0x27,0x9c,0x6d,0xac,0xef,0xa7,0x4e,0xd8,0xb7,0xf9,0x3a,0xf7,0x63,0xb5,0xec,0xc7,0xad,0xe5,0x2c,0x87,0xed,0xae,0x1e,0xdd,0x05,0x1b,0xf0,0x61,0x82,0xf3,0x40,0xc2,0x1b,0xe2,0xc7,0xce,0x2d,0x4c,0xbe,0x3a,0x51,0x63,0xef,0xe0,0xf2,0xae .byte 0x0d,0xfd,0x6a,0x38,0x1f,0xc2,0xf1,0x91,0xc1,0x12,0x74,0x88,0x32,0x61,0xa7,0x65,0xea,0x30,0xfa,0x4c,0x93,0x61,0xef,0xa9,0x49,0x74,0xe7,0xfb,0x7a,0x3d,0xf9,0xbf,0xfe,0xdd,0x17,0x29,0xe5,0xdf,0xab,0x3a,0xf1,0xc2,0x1a,0x53,0x82,0xd0,0xe3,0x46,0x85,0x87,0x69,0xdf,0xb1,0x64,0xc3,0x39,0x24,0x27,0x29,0x16,0x66,0xb2,0x55,0xcf .byte 0x2c,0xab,0x9e,0x35,0x4a,0x86,0x06,0x51,0x9d,0x1d,0x07,0x61,0x7f,0x71,0xa8,0x6f,0xef,0xf9,0x9d,0xf3,0x56,0xef,0x97,0x4a,0x6a,0x07,0x70,0xd7,0x80,0xcc,0x33,0x98,0x87,0x8e,0xa6,0xc3,0x18,0x58,0xfd,0xe9,0x4d,0x7d,0x07,0x8e,0x7d,0xae,0x30,0x1d,0x2d,0x1c,0x34,0x98,0x01,0xb9,0x13,0x86,0x13,0x26,0x55,0x15,0xe6,0x87,0x6f,0xc8 .byte 0x3c,0x4d,0x1e,0x70,0xdc,0x44,0x40,0xb0,0x69,0xe7,0xb4,0xf5,0x81,0x66,0xef,0x70,0x15,0xee,0x6e,0xb4,0x44,0x9e,0xbb,0x40,0x6f,0x5b,0x36,0x96,0xd4,0x52,0x8d,0x9e,0x0f,0x9a,0x97,0xea,0xd1,0x37,0x7e,0x9a,0x30,0xb4,0xe9,0x1f,0x01,0x0d,0x26,0xa6,0xb1,0x74,0x90,0x6e,0xe1,0xe0,0x67,0x7c,0x76,0x6c,0xed,0xbd,0x62,0x61,0x8d,0x66 .byte 0x7e,0x71,0x07,0x9a,0xcd,0x9e,0x7d,0xc7,0x78,0x39,0xaa,0xc8,0x83,0xdd,0xb7,0x28,0xb8,0xce,0x05,0x29,0x50,0x06,0xd0,0xe5,0xc2,0x01,0x31,0x7a,0x41,0x3a,0xdf,0x4f,0x7d,0xb3,0xa2,0x2a,0x5b,0x1e,0x39,0x1d,0xfd,0xbf,0x3c,0x9c,0xe3,0x17,0xfb,0x21,0x5d,0xdc,0x48,0x05,0xf1,0x36,0xac,0x98,0x9b,0xd2,0xb2,0xbd,0x97,0x2a,0x19,0x9b .byte 0xfc,0x05,0x85,0x87,0x69,0x60,0x2c,0x83,0xfa,0x39,0xda,0x0e,0x3e,0x80,0xc9,0xf4,0x5a,0x6b,0xe3,0xda,0x72,0xed,0x42,0x39,0x67,0x00,0x38,0x7e,0x84,0xdd,0x5c,0x06,0x9c,0xee,0x4a,0xf3,0x75,0x32,0x6f,0x69,0x9a,0xa6,0x5e,0xb8,0x10,0x7d,0xe8,0x35,0x5e,0xa1,0x86,0x69,0x2a,0x48,0xa7,0x53,0xef,0xce,0x90,0x49,0xce,0x82,0x92,0x20 .byte 0xfd,0x71,0xe7,0xb4,0xce,0x81,0x01,0xf9,0xaf,0x36,0xd9,0xe2,0x28,0xe9,0xd0,0x9f,0x0f,0xf0,0x2f,0xca,0xa4,0x2b,0x90,0xdd,0x21,0x66,0x1c,0xbc,0x3f,0x80,0x89,0xcc,0x53,0xe5,0x72,0x91,0x45,0x9f,0x62,0x57,0x70,0x29,0xb9,0x6d,0x41,0xa3,0x67,0xf3,0x99,0xac,0x0e,0x3c,0x43,0x1f,0x92,0xf0,0xd5,0xca,0x86,0xad,0x0a,0xd4,0x2b,0xf4 .byte 0x3f,0x8f,0x90,0xcf,0x05,0x9f,0x07,0x07,0xac,0x36,0x5c,0x7d,0xb6,0xcb,0x9b,0x77,0x1a,0x11,0xed,0x0a,0x4e,0x1f,0x7b,0x68,0x39,0x88,0xb2,0x5d,0x8a,0x37,0x83,0x25,0xd6,0xc7,0x98,0x0a,0x1a,0x14,0x9a,0x1f,0x1e,0x66,0xd4,0x4f,0xd6,0x3f,0x88,0x7b,0x4a,0x18,0x06,0x27,0x79,0x40,0xc7,0xc8,0x54,0x8b,0xc8,0xc3,0x2e,0x56,0xf8,0x92 .byte 0xda,0xac,0x74,0x5b,0xaf,0x02,0x0d,0xe7,0xc4,0xf4,0x72,0xab,0xb1,0x83,0x4b,0x7a,0xe0,0xe1,0xe2,0xac,0xe7,0x20,0xbd,0xc3,0xda,0xae,0x10,0x47,0x68,0x3b,0xd1,0xc5,0xd7,0x28,0x8e,0x31,0xcf,0xba,0xe3,0x33,0x56,0x5e,0x8c,0x44,0xe4,0x41,0x9b,0xbb,0x8a,0x80,0x98,0xb8,0xc6,0x66,0x2c,0xa1,0x26,0x42,0xb4,0x90,0x42,0xf9,0xc5,0x4b .byte 0x7c,0xaa,0xf1,0x70,0x8a,0x00,0x80,0x31,0xf9,0x0b,0x5e,0xec,0x25,0x36,0x2a,0x98,0x0c,0x05,0x97,0x23,0xd3,0x9e,0xf6,0xa9,0x11,0x8e,0xee,0x0a,0xda,0x8e,0xd3,0x65,0xc7,0x50,0x55,0xba,0x08,0x7e,0x78,0x1a,0x04,0x91,0x43,0x3a,0x14,0xfb,0x88,0x65,0x59,0xfe,0xf3,0xa6,0xde,0x3f,0x98,0xc4,0x7e,0x67,0x05,0x79,0x1f,0x26,0xce,0x9d .byte 0xee,0x2c,0x86,0x81,0xf9,0x35,0x47,0x52,0x7b,0x35,0x6d,0xda,0x5f,0xd8,0x91,0x59,0x9d,0x8d,0x91,0xe7,0x3f,0x79,0x0c,0xca,0xc5,0x08,0xfd,0x59,0x24,0xaf,0x6c,0x3a,0x2a,0xd9,0xb6,0xaa,0x46,0x1b,0x9d,0x2e,0x17,0x5a,0x94,0x56,0xd4,0xb8,0xc9,0xb3,0xa5,0x4b,0xc7,0xfa,0x2d,0xd0,0x37,0x83,0xf1,0x53,0x27,0x42,0x8d,0x98,0x02,0x73 .byte 0x26,0x18,0x5d,0x32,0xf5,0xda,0xac,0x5d,0x45,0x10,0x58,0xec,0x0a,0xdd,0x8a,0xf0,0x65,0x03,0x6e,0x0f,0xd3,0x6d,0x83,0x2e,0x28,0x2c,0xd6,0x31,0x52,0x2b,0xb5,0x49,0x43,0x81,0xfd,0xd6,0x7c,0x72,0x19,0x9d,0x02,0x9f,0x15,0xca,0xfa,0x34,0xbe,0x10,0xf3,0x2d,0x93,0xcd,0xde,0x4f,0xb7,0xe9,0x74,0xb5,0x85,0xb6,0x1f,0xc5,0x14,0x1a .byte 0x54,0x48,0x8d,0x0b,0x16,0x2c,0x62,0x15,0x64,0x55,0x7f,0x8e,0x59,0x10,0x53,0x98,0x2f,0x5d,0x92,0x7d,0x98,0x17,0x80,0x57,0x2d,0x5a,0x59,0x1b,0x97,0x46,0x59,0x1c,0x7c,0x3d,0x5b,0x4b,0x27,0x14,0xf3,0xfe,0x76,0x4e,0x1f,0xd6,0x2c,0x84,0x6e,0x8e,0xec,0xa7,0x0f,0x18,0x8f,0x96,0xd8,0xdf,0xba,0x1d,0x2d,0x41,0xd3,0xcf,0x2e,0xcc .byte 0x52,0xdd,0xf9,0xd3,0x1b,0x6b,0xf9,0x4d,0x99,0xf9,0x19,0x58,0xc9,0x3f,0x4d,0xe9,0xad,0xd2,0xe8,0xd6,0x87,0x82,0xf0,0xcf,0x0d,0x17,0x30,0x85,0x9e,0x0e,0xca,0x15,0xa5,0x8e,0x88,0x27,0x7c,0xf7,0x3b,0xf3,0x43,0x5e,0xa6,0x3f,0x8d,0x86,0x5c,0x21,0x3b,0x20,0xf9,0xe4,0x55,0x37,0x8a,0x8c,0x41,0xcf,0x2c,0x8e,0xa9,0x17,0x96,0xaf .byte 0x3a,0x8f,0x4b,0x3d,0x9d,0xb9,0x17,0xe9,0x46,0x2d,0xf5,0x4c,0xfd,0x0d,0xee,0xbe,0x25,0x84,0x75,0xda,0xaf,0x0c,0x87,0xb0,0x7a,0x29,0xd9,0x6a,0x0d,0x8a,0xad,0xb0,0xc5,0xac,0xf0,0xad,0x2c,0xec,0x2b,0x91,0x36,0xc5,0xbc,0xfe,0x92,0xa8,0x84,0xff,0xa5,0xf1,0x07,0xfc,0xeb,0xe4,0xd8,0x39,0x63,0x2e,0x4f,0xfd,0x46,0x64,0x3c,0xd1 .byte 0x3a,0x8d,0xab,0x8c,0xa1,0xd8,0x46,0xc2,0xf4,0xcf,0xa1,0x75,0xc3,0x50,0x97,0x8b,0x7c,0xdb,0x45,0x36,0x8c,0x85,0x0f,0xb9,0xfc,0x37,0xdd,0x64,0x68,0xe2,0xa8,0x9e,0x03,0x02,0x30,0x43,0x9f,0xb1,0xfe,0xe8,0x95,0xbf,0xfb,0x34,0x14,0x62,0xbf,0x0a,0x20,0x56,0x52,0x69,0xd5,0x2e,0x2f,0xff,0x4d,0xe2,0x27,0x99,0x32,0xb6,0x49,0xe9 .byte 0xa8,0xcf,0xe4,0x81,0xef,0x36,0x75,0x13,0x83,0x82,0x59,0x43,0x22,0x3c,0xfd,0xe7,0xf1,0x51,0x5d,0x1e,0x08,0xde,0xc6,0x6b,0x2d,0xd4,0x71,0xf8,0xe9,0xae,0x32,0x64,0x10,0x5d,0x96,0xf9,0xc2,0x2a,0x45,0x35,0x64,0x1e,0xdf,0xb9,0x24,0xf1,0x8d,0x75,0x95,0x2c,0x0b,0x9f,0x3f,0x12,0xe3,0x31,0xe4,0x8b,0x2d,0x1e,0xd2,0x9e,0xe7,0xde .byte 0xc3,0x45,0x6f,0xe0,0xe0,0x7d,0xed,0x95,0xad,0xe7,0xca,0x27,0xee,0xc7,0x18,0x6d,0xcf,0x1d,0x2a,0x6c,0x37,0xc2,0xa6,0x82,0x26,0xb8,0x8e,0x6d,0x00,0x99,0x82,0x24,0xda,0xe3,0x9a,0x84,0x12,0x31,0xc3,0x3d,0x4b,0x44,0xde,0x8a,0x2b,0x64,0xc9,0xea,0xa9,0x73,0xd1,0xc6,0x75,0x3f,0x60,0xb9,0xdd,0x06,0x55,0xae,0x44,0x16,0x30,0xb8 .byte 0x02,0x07,0xe9,0x4f,0x23,0x1b,0x02,0x4f,0x2e,0xaa,0x43,0x34,0x44,0xca,0xf5,0x68,0x85,0xcc,0x50,0xc3,0x43,0x71,0xc8,0x24,0x6a,0x30,0x48,0xee,0xeb,0xd2,0xf3,0x18,0x7f,0xb0,0x89,0x68,0x80,0xa3,0xbb,0x06,0xf9,0x04,0xaa,0xda,0xd0,0xfb,0x47,0xd7,0xea,0x3e,0xf8,0x61,0x57,0x8f,0x1e,0xb7,0xc1,0x9e,0x09,0x7e,0x49,0x08,0x2f,0x8a .byte 0xdf,0x04,0x85,0x40,0x6f,0xfa,0xc1,0x0b,0x0d,0x60,0xc4,0x88,0x58,0x99,0xbc,0xcc,0x67,0xba,0xab,0x39,0xeb,0x32,0x6e,0xe8,0xb6,0x82,0x78,0x15,0xc3,0x51,0xda,0x53,0x32,0x70,0xc7,0x0f,0x56,0x31,0x71,0xac,0xc8,0x62,0x04,0x58,0x2e,0x9e,0xcb,0x0f,0xb1,0x05,0x82,0x50,0x53,0xdd,0xa2,0x03,0x78,0x1a,0x4e,0x70,0x57,0x24,0xfa,0xa2 .byte 0x69,0xfa,0xd3,0x6c,0xd6,0x90,0x2b,0xed,0x7b,0x39,0xe8,0xed,0xa5,0x5d,0xf8,0xf2,0xbb,0xe5,0x09,0xa5,0x89,0x37,0x9a,0x3b,0xdc,0xae,0xd3,0xba,0x88,0xad,0x0b,0x41,0xf0,0x72,0x8a,0x40,0x32,0x98,0x77,0x3f,0x3a,0x37,0xa6,0x15,0x58,0xbd,0xf2,0x04,0x17,0x3d,0xcb,0x23,0x1f,0x49,0x19,0x62,0xc8,0x97,0x44,0xbd,0xf1,0x69,0x17,0x5f .byte 0x08,0xee,0x0b,0x1c,0x71,0x46,0x5f,0x2a,0x40,0x74,0x0b,0xb0,0x8a,0xb3,0x15,0x8c,0xbc,0x8e,0x9c,0x53,0x8a,0x5f,0xd1,0x10,0xc7,0xbc,0x7a,0x85,0x6e,0x8a,0x35,0xd9,0x2c,0xf1,0xa2,0x16,0xdf,0xf0,0xaf,0x09,0x4b,0x9d,0xe6,0x22,0x5f,0xac,0x91,0x18,0x4b,0x3b,0x96,0xd8,0x2d,0x4e,0x03,0x81,0xe3,0xd8,0x8d,0x15,0x83,0x09,0xca,0xa7 .byte 0x1b,0x4a,0x4e,0x36,0xbb,0x05,0x36,0xf2,0xb6,0x81,0x50,0xa4,0xaf,0x6c,0x5e,0xce,0x11,0x83,0x71,0x8e,0xcd,0x41,0x61,0x0e,0x27,0xaf,0xa4,0x9e,0xcd,0xe6,0xc8,0xb5,0x69,0x88,0xf7,0x9a,0xcb,0x7d,0xa2,0x30,0x20,0xdb,0xb6,0x5c,0x15,0xa2,0xf4,0x02,0x53,0x82,0x4a,0x6b,0x39,0xdb,0x3a,0x5e,0xa0,0x3d,0xbf,0xcf,0x1e,0x26,0x17,0xae .byte 0x34,0x8c,0xd7,0x7e,0x45,0xbd,0x53,0xcf,0x0d,0xb3,0x47,0x6c,0xef,0x3b,0xde,0xf6,0x40,0x04,0x11,0x1d,0x1c,0x93,0x48,0xba,0xf1,0x13,0x9d,0x03,0x60,0xab,0x10,0x5f,0x72,0x00,0xf9,0x71,0x7c,0xe1,0xb7,0xd4,0xbf,0xb1,0x1e,0x7f,0x2b,0x99,0x54,0x81,0x56,0xfd,0x9f,0x60,0x81,0x3f,0x7e,0xbf,0xc0,0x01,0xb0,0x12,0x1b,0xca,0x9f,0x09 .byte 0xc8,0x6d,0x44,0xdf,0xd3,0xbc,0xd3,0xb5,0xeb,0x09,0x24,0xec,0xde,0x50,0xe0,0xb2,0xc7,0x0b,0x3f,0x41,0xad,0x10,0xaa,0xc4,0xf0,0x79,0x25,0xc0,0x75,0x08,0x9f,0xe2,0xde,0xe3,0x12,0x20,0x0e,0x81,0x2c,0x27,0x68,0x53,0x40,0xa1,0xf1,0xf2,0x12,0x25,0x3c,0x16,0xe3,0x27,0x8a,0x18,0x1a,0x5b,0xfd,0xc5,0xd1,0x1e,0x4b,0x85,0xcb,0xd0 .byte 0xbf,0x3e,0xd3,0x4e,0xfd,0x79,0xc9,0xb0,0xf3,0x88,0x24,0x38,0xe4,0xd5,0xe1,0xfd,0x92,0xe0,0x21,0xea,0x50,0x59,0x01,0xa3,0xfd,0x43,0xfb,0x3f,0xc3,0x24,0x0a,0x18,0x98,0x1f,0xc1,0x1e,0x9b,0xd5,0x80,0xa3,0xca,0x5f,0x49,0xf0,0x1b,0xe1,0x2a,0xa9,0xe0,0xca,0xf9,0x5e,0x15,0x0f,0x59,0x04,0x18,0x09,0x75,0xb7,0x33,0xf8,0x79,0xf1 .byte 0x3b,0xb9,0xc5,0x60,0xcd,0x1d,0xb8,0xd0,0xc6,0x68,0x65,0xa9,0xdd,0x83,0x67,0x3c,0x21,0x8e,0x1f,0x4b,0xfd,0x4f,0x2f,0x31,0x63,0x5f,0xfc,0xb4,0x6b,0x7a,0x08,0x46,0x06,0x88,0x2d,0xf9,0x72,0xc4,0x59,0x13,0x80,0x0c,0xe1,0x74,0x82,0x48,0x0c,0xb3,0x04,0x37,0xd0,0xf7,0xe1,0x38,0x83,0xb9,0xd9,0x79,0x65,0xab,0x7f,0x9e,0xb8,0xc6 .byte 0x72,0xf3,0xca,0x3f,0x46,0xe7,0x4a,0x6a,0xb2,0x3e,0xe2,0xf4,0xdb,0x60,0xc4,0x95,0x7e,0x9e,0xe8,0x1f,0x87,0x6c,0x20,0x46,0xfd,0x91,0xa0,0xd7,0x9a,0x64,0xa5,0xf0,0x28,0xe1,0x87,0xda,0x61,0xd5,0x1e,0x55,0x56,0x93,0x68,0x94,0xcb,0x64,0x79,0xa4,0xbf,0x75,0x3a,0x6a,0x3a,0x29,0x73,0xb7,0x87,0x8a,0x98,0x1a,0xa5,0xc7,0xe9,0xea .byte 0x42,0x0a,0x9f,0x9c,0xcd,0xf5,0xcb,0xdd,0xad,0xe4,0xb2,0xdd,0xa5,0x8b,0xf8,0x4a,0x12,0x86,0xec,0x2d,0xe8,0xe9,0xa1,0x8b,0x95,0x51,0xfd,0x31,0x8e,0xf9,0xb3,0x30,0x5f,0xab,0xc8,0xf6,0xdd,0xec,0x7a,0x12,0x7c,0xcf,0xf4,0x6d,0x1b,0x5e,0xba,0x8a,0xa4,0xe4,0x79,0xa0,0x97,0xf6,0x44,0x46,0x81,0xcb,0xeb,0x1b,0x3a,0x06,0xe8,0xb5 .byte 0xbf,0xc3,0xe3,0x64,0x9f,0xeb,0xef,0x88,0x6c,0xc0,0x35,0x8b,0x9b,0x0c,0x5b,0x3c,0x99,0xce,0x7b,0x34,0xe3,0x06,0xda,0x19,0xbb,0x81,0x1d,0xa2,0xa9,0xb8,0x1f,0xf1,0xc8,0x1f,0x8a,0x29,0xae,0xd6,0x82,0x9b,0xaf,0x68,0x27,0x01,0x14,0x1a,0x1f,0xfd,0xdc,0xcf,0xcd,0x95,0x6b,0x67,0xde,0x3c,0x75,0x11,0xbe,0x4f,0xa6,0x9d,0x83,0x5f .byte 0x23,0xc6,0xfd,0x21,0x78,0x90,0x22,0x25,0xd5,0x48,0xef,0xf0,0x26,0x73,0x05,0xad,0x8b,0xa3,0x4c,0xdd,0xff,0xfb,0xa0,0xc2,0xc4,0x76,0xcc,0x9f,0x75,0x3e,0x16,0xe6,0x28,0x04,0xae,0x5d,0xb0,0x2f,0x19,0xa5,0x53,0x2d,0x30,0x45,0x1a,0x5c,0x09,0xa3,0xd3,0xbc,0x71,0xd4,0xa7,0xf2,0xb0,0x19,0xd7,0xf4,0x28,0xad,0xdf,0xf6,0xd7,0x37 .byte 0xa0,0x73,0x8a,0x7b,0x33,0xdc,0xb4,0xb0,0x68,0xa7,0x78,0x76,0xde,0x53,0x6a,0xf8,0x12,0x9d,0x26,0xe4,0x9e,0x5a,0xd3,0x60,0xf9,0x44,0x99,0xd1,0x38,0x60,0x2b,0x69,0xec,0xec,0xd2,0x68,0xfc,0xdb,0x3d,0xed,0x4e,0xf8,0x85,0x84,0x48,0xb7,0xa3,0x05,0x9e,0x11,0xdd,0x42,0xa7,0x6e,0x09,0x93,0xa6,0x17,0x76,0x29,0x13,0xed,0xbc,0x14 .byte 0x91,0x11,0x47,0x47,0xca,0x4e,0xc9,0xd5,0x6c,0x06,0x7d,0xcb,0xbf,0x87,0x56,0x36,0xe8,0x1f,0x57,0xe0,0xdf,0x21,0xd5,0xa2,0x46,0x12,0x54,0x04,0xc2,0x81,0x3a,0xb6,0xb1,0xaa,0x59,0x52,0xbf,0xb3,0x1c,0x8f,0x74,0xb1,0x9c,0x0a,0xda,0x69,0x8b,0xe6,0x68,0x6b,0xf5,0x1f,0x91,0x16,0x56,0x6b,0x13,0x06,0x51,0x0e,0x81,0x8f,0x5f,0xa5 .byte 0x26,0x20,0xb8,0xfe,0x40,0x4e,0x31,0xdc,0x35,0xa0,0x76,0x3c,0x33,0x19,0xe2,0xda,0xb0,0xda,0xc4,0xe4,0xc4,0xe4,0xfb,0x66,0xef,0x28,0x69,0x0e,0x54,0x09,0x5b,0x8a,0x83,0x7f,0xc4,0x9d,0x5d,0xa1,0xa5,0xf1,0x75,0x05,0xda,0x8a,0xf5,0xa0,0x70,0xb4,0x62,0x99,0x54,0x3a,0x99,0x4d,0xa4,0xe4,0x3a,0xd5,0x46,0x5d,0x5d,0x13,0x14,0x7a .byte 0x45,0xf4,0x91,0x2f,0xe0,0x96,0xaf,0xd0,0x76,0xa5,0xd7,0x49,0x61,0x0a,0x87,0x05,0xcc,0x6e,0xf5,0xc9,0x29,0xe9,0x5a,0x89,0x13,0xd2,0x69,0x9a,0xd5,0x75,0xf6,0x9c,0xc2,0x9e,0xc3,0xe4,0xd7,0xce,0x87,0x36,0xc6,0xb6,0xab,0x7d,0x81,0xb5,0x0f,0x3d,0xd5,0x5a,0x3a,0x87,0x89,0xa6,0x10,0xa6,0xca,0x1d,0x86,0x54,0x02,0x7d,0x6f,0x8f .byte 0x14,0x16,0xbd,0xe5,0xce,0x08,0x34,0x11,0xf3,0xd7,0x6d,0x91,0xc5,0xdf,0x15,0x22,0x13,0xc3,0x55,0xeb,0x6b,0xc4,0xf2,0xfa,0x39,0xd8,0x64,0x29,0x4f,0x5c,0x3a,0xf8,0x7e,0xd9,0x73,0x27,0xf7,0x8f,0xb4,0x55,0xe0,0xcb,0xdf,0xcb,0x4f,0x42,0xc2,0x9b,0xd8,0x1b,0xfc,0x6d,0x4a,0x8d,0x83,0xa4,0x02,0x86,0x7f,0x07,0x9f,0xdc,0x5a,0x70 .byte 0x2a,0xf3,0xbc,0x3f,0x78,0xf9,0x6b,0xac,0x73,0xbf,0x6f,0x89,0x60,0x67,0x4b,0xd9,0xe1,0x57,0x41,0x35,0x56,0xdf,0x74,0xab,0x89,0x1a,0x10,0xe8,0x24,0xd6,0x64,0x22,0x46,0xb8,0xca,0x33,0x9e,0x6f,0x15,0xf3,0x4a,0x42,0x2a,0x61,0x70,0x1a,0x78,0x5f,0x3a,0x74,0xd2,0x05,0xff,0x70,0xee,0x5d,0x15,0x98,0x38,0x4d,0xed,0x8a,0x14,0x60 .byte 0x00,0x41,0x6d,0x6a,0x29,0xb6,0xb2,0xd1,0x2e,0x1f,0xd2,0xde,0x71,0x97,0x4b,0x26,0xd8,0x20,0x92,0x5e,0x0a,0x52,0x16,0x84,0x65,0x43,0xde,0x8b,0xf9,0x1e,0x5c,0xec,0xfb,0x71,0x42,0xcc,0xca,0x99,0xbc,0x34,0x07,0xa1,0x32,0x4d,0xc7,0x95,0xfd,0xe7,0x56,0x9c,0x35,0xd5,0xbb,0x96,0x41,0xbf,0x60,0xac,0xe2,0xe7,0xda,0x1f,0x8c,0xb5 .byte 0x15,0x12,0x94,0xbf,0x8e,0x41,0x5c,0x67,0x51,0x02,0xc5,0x82,0x34,0x15,0xbe,0xd4,0x49,0x41,0x1b,0xfd,0x24,0x8a,0x11,0xff,0x01,0x86,0xab,0xbc,0x80,0xc6,0x7f,0xec,0x31,0xcf,0x06,0xc1,0xa2,0x02,0x3b,0x21,0x26,0xd3,0x1d,0xd3,0xe3,0x99,0xf6,0x29,0x6c,0x6c,0xf4,0xd3,0x6f,0x8e,0xf1,0x4e,0x87,0x57,0x7b,0x43,0xf8,0x03,0x3d,0x20 .byte 0x3d,0x99,0x90,0x5d,0x9b,0xf2,0x19,0xb9,0x3b,0x98,0x09,0xd1,0xe3,0xcf,0x10,0xd1,0xa5,0xc3,0x74,0x64,0xbe,0x68,0xb0,0xc5,0x90,0xf0,0x42,0x84,0xdc,0x14,0xbe,0xa8,0x23,0x62,0xfa,0x5e,0x7c,0xfd,0x82,0xdc,0x05,0x17,0x22,0x17,0x12,0xfa,0xd7,0xb8,0x71,0xdf,0x84,0x8e,0x41,0x3e,0x6d,0x1e,0x66,0x57,0x40,0x51,0x0c,0x00,0xea,0x64 .byte 0x99,0x39,0xb6,0x41,0xcd,0xd1,0xf9,0x52,0x39,0xce,0x49,0x08,0x9a,0x8e,0x41,0x1e,0x58,0xd2,0x78,0x4a,0x73,0x7f,0xa5,0x1f,0x40,0xbe,0xec,0x61,0x6d,0xb6,0x53,0xc5,0x7a,0x87,0xc6,0xd7,0x95,0x51,0x3f,0x95,0x4c,0x61,0xb0,0x89,0xb1,0x7f,0xad,0x93,0x7d,0x98,0xfa,0x4e,0x91,0xd2,0xb1,0x70,0xd2,0x3b,0x78,0x50,0x34,0x55,0x67,0x30 .byte 0x51,0x72,0x4c,0x9f,0xd3,0x98,0xf0,0x75,0xf2,0xd1,0x5a,0x79,0x46,0x78,0x5b,0x92,0xed,0x7b,0x9a,0xc8,0xa8,0x66,0xba,0x1b,0x28,0xc9,0xd7,0x14,0x48,0x02,0xd8,0x13,0x50,0x24,0x23,0xda,0x34,0x27,0x39,0xd5,0xa3,0x37,0x27,0x16,0x69,0x24,0x7b,0xd4,0x00,0xdc,0x88,0x0b,0x12,0xc8,0x0f,0x16,0xd6,0xe1,0xe5,0xe1,0x38,0x1c,0xfb,0xfa .byte 0xc0,0x42,0x54,0x2e,0x1c,0x89,0x95,0xf5,0x34,0x9a,0x65,0x1f,0x67,0x5d,0x6f,0xe8,0xcc,0x72,0x81,0xec,0x44,0x7c,0x61,0xa1,0xac,0xd5,0x69,0x53,0x1c,0xd1,0xba,0xb7,0x93,0xef,0x4e,0x2d,0xab,0x4a,0xe8,0xb2,0x17,0x48,0x34,0x53,0x72,0x15,0x94,0x58,0x62,0x88,0x80,0xdd,0x70,0x6a,0x77,0x7f,0x2b,0xc8,0xe1,0xac,0x83,0xce,0xe5,0xed .byte 0xd0,0xc3,0x24,0x09,0x5e,0x4c,0x9c,0x95,0x4a,0x4b,0xdf,0xe6,0x69,0x8e,0xb0,0x2a,0x0c,0x5c,0x08,0x2c,0xe3,0xd5,0xc8,0x3f,0x48,0x40,0xf6,0xf5,0x72,0x83,0xb8,0xd2,0x1a,0x78,0x70,0x75,0x23,0x9a,0x6f,0x11,0x1f,0xdb,0x5c,0x42,0x4f,0xab,0xbc,0x0e,0x44,0xf6,0xfb,0x73,0x85,0x2e,0x2f,0x20,0xc4,0x28,0x0d,0x44,0xfa,0xb0,0x79,0x85 .byte 0xf2,0xce,0x2f,0xc3,0xaa,0x93,0xbd,0xfc,0xe8,0x5b,0xc4,0x9f,0x3f,0xf8,0x9e,0xd2,0xec,0xf2,0xca,0xe0,0xd4,0x82,0xe2,0x9e,0x1e,0xee,0x22,0x74,0x81,0xb3,0x26,0x36,0x02,0x94,0xcf,0x04,0xee,0x7a,0x99,0x43,0xa1,0x3a,0x26,0xbc,0x05,0x9d,0x67,0x7c,0xe7,0x95,0xa7,0x73,0x7e,0x0a,0x54,0x7b,0x6a,0x53,0x95,0xce,0x9a,0x0c,0x20,0x4c .byte 0x9c,0x61,0x91,0x6e,0x43,0x1c,0x4e,0xa0,0x99,0x98,0xcc,0x90,0x29,0xb1,0xc7,0x4f,0x40,0x1c,0xe5,0x7a,0xb8,0x9f,0x50,0x52,0x8b,0xde,0x5e,0x32,0xf1,0x52,0x9a,0xab,0x55,0x40,0xfb,0x75,0x45,0x87,0x49,0x43,0x9d,0x45,0x51,0x8a,0x5c,0x6d,0x86,0xdf,0x9c,0x74,0x7c,0xc1,0xe0,0xe7,0xe9,0x87,0x7d,0xae,0x06,0xe1,0xf3,0x23,0xa9,0x32 .byte 0xda,0xcb,0x37,0xca,0x6c,0x51,0x78,0x53,0x74,0x36,0x13,0xc4,0x92,0x1c,0x40,0x4a,0xeb,0xab,0x95,0xb2,0x97,0xb0,0xef,0x11,0x35,0x11,0x29,0x55,0xff,0x71,0x8c,0xdb,0x2b,0xea,0x8c,0x15,0xaf,0x2c,0x0d,0x25,0xe4,0xc3,0x7b,0xd7,0x2e,0xaf,0xd3,0xf8,0xb9,0xdc,0x19,0x71,0xac,0x66,0x9d,0x22,0x56,0x8c,0x15,0x89,0x43,0xf7,0xa7,0xf7 .byte 0x8c,0x5d,0xc4,0xbe,0x51,0xf8,0xa9,0xaf,0x41,0x6b,0x8f,0x81,0xdb,0xf5,0x23,0xf4,0x45,0x61,0x7c,0x8d,0x30,0x16,0xc9,0xf4,0xb5,0x7c,0x15,0x20,0xed,0xe2,0x2e,0x9c,0x14,0xe9,0x7e,0x98,0x11,0x4f,0xe1,0x99,0x14,0x8c,0xa9,0xae,0x7d,0x28,0x10,0x87,0x63,0x40,0xcf,0x16,0x42,0x30,0xd9,0xbe,0xdb,0xf9,0xd0,0xc5,0x69,0x8c,0x6b,0x5e .byte 0x54,0xd9,0xe3,0xbd,0x28,0x8f,0x71,0xc9,0xd5,0x93,0x10,0x29,0xd8,0xee,0x69,0xe2,0x98,0xb0,0x21,0x1c,0x3e,0xf1,0x3e,0xb4,0x77,0x98,0x15,0x9b,0x4e,0x48,0xe7,0xd3,0xcf,0x26,0x5b,0x97,0x3d,0xad,0x32,0x57,0x56,0x2b,0xbd,0xef,0x85,0x7f,0x2e,0x12,0xb7,0xfc,0xc5,0xc6,0xa8,0x05,0x5e,0x91,0xae,0xd1,0xc6,0x7c,0x62,0x07,0x5e,0xda .byte 0x84,0x34,0xc2,0x6b,0x7c,0xa5,0x07,0xb0,0x02,0xf7,0x02,0x7b,0x8e,0x90,0x34,0xa1,0x4f,0x15,0x79,0x87,0xd5,0x76,0xac,0xf2,0x94,0xed,0xb5,0x49,0x82,0xb8,0xea,0x0c,0x06,0xec,0xa6,0x8a,0x46,0xfe,0x3a,0xdf,0x14,0x67,0xc9,0x63,0xc3,0x53,0xee,0x3f,0xf5,0x4a,0x96,0x54,0x61,0x5c,0x53,0x52,0x96,0xdc,0x2b,0xe9,0x85,0xb6,0x72,0xf3 .byte 0xe7,0x69,0x9a,0x25,0x88,0x0e,0x64,0xac,0x04,0xb7,0xb2,0xbc,0x8a,0xd4,0x24,0x2b,0xa4,0xf9,0x58,0xdb,0x36,0x0b,0x05,0x4a,0xba,0x84,0x7f,0x95,0x58,0x46,0x23,0x7b,0x3c,0xcf,0xaa,0xa6,0x77,0xe6,0x1f,0xc8,0x5a,0xd5,0x82,0x09,0x87,0x3a,0x36,0xb7,0xb5,0x4c,0xdc,0xa0,0x40,0x6e,0xd7,0x61,0x1f,0xed,0xf7,0x81,0x32,0xbf,0xaa,0xd4 .byte 0xfa,0xc5,0xd7,0x62,0x9a,0x73,0x24,0x6c,0xb9,0x5b,0x5e,0x9b,0x8d,0xe1,0x4e,0x89,0x0d,0x1c,0xc9,0x7b,0xfe,0xcc,0x95,0x97,0xec,0xba,0x35,0x5d,0xbc,0x06,0x37,0xcf,0x8d,0x02,0x28,0xa1,0x0b,0xca,0xe9,0xee,0x23,0x65,0xd2,0x01,0xe2,0x49,0x2a,0x58,0x4c,0x12,0x4d,0x44,0x19,0x10,0x4c,0x4e,0xbb,0xb2,0xe9,0x43,0xa6,0x0b,0x70,0x87 .byte 0x22,0xf0,0x1a,0x66,0x08,0xf1,0xb2,0x50,0x3c,0x36,0xfc,0x4f,0x39,0xa8,0xce,0x8e,0x9c,0xb1,0x29,0xd8,0x6d,0xce,0x5d,0x77,0x94,0xff,0x64,0x81,0x10,0x47,0xa3,0xa0,0x87,0x15,0x22,0x4f,0x88,0x72,0x3f,0x99,0x39,0x85,0x5c,0xe8,0x77,0x10,0xce,0xd0,0xa5,0xd7,0x47,0x14,0xd9,0x43,0x20,0x88,0x68,0xc4,0xe7,0xd9,0x22,0x05,0xeb,0x54 .byte 0xbc,0x7c,0xb7,0x8c,0x78,0xa3,0xde,0x76,0xb8,0x85,0x0d,0x30,0xd8,0x7b,0x84,0x28,0x4b,0xad,0xb7,0x16,0x11,0x12,0x1a,0x36,0x12,0xe7,0x4f,0x12,0xaf,0x5a,0xce,0x4e,0x11,0xd4,0x7d,0xd7,0xdf,0x00,0x9a,0x74,0xab,0x60,0x40,0xa0,0x07,0x9c,0x07,0x5e,0x48,0x0c,0x72,0x82,0x3e,0x5a,0xc6,0xd1,0x64,0x10,0x63,0xd3,0x17,0x4d,0x1f,0x65 .byte 0x2f,0x3c,0x87,0x23,0x39,0x86,0xd9,0x94,0xfd,0x81,0xe0,0x2e,0x94,0xec,0x2e,0x39,0xcd,0x4b,0x48,0x00,0x8d,0x03,0xc2,0xe4,0x31,0xba,0x37,0x4a,0x1b,0x69,0x52,0x27,0xcd,0xd2,0x1b,0x0b,0x32,0xbd,0x80,0x36,0x20,0xcc,0x01,0x51,0xf3,0x78,0x8e,0xae,0xab,0x49,0x42,0xa2,0x79,0x6b,0xc1,0x0d,0xf8,0x5f,0x14,0xf8,0x95,0x53,0x33,0x97 .byte 0x50,0x5f,0x99,0x3a,0x89,0x21,0x5e,0x32,0x15,0xa9,0xa9,0x19,0x28,0x1a,0xa4,0xb0,0x25,0x2e,0xcf,0x60,0x7d,0xc7,0xc0,0x21,0x18,0xb2,0xca,0x8b,0x30,0xfe,0x2d,0x86,0xb4,0xc8,0xc7,0xd6,0xa1,0x71,0x0f,0xf1,0x54,0xe7,0x64,0x0a,0xfc,0x7c,0x73,0xb1,0xb8,0x26,0x01,0x37,0x94,0x9c,0x97,0x9b,0x6d,0x37,0x2e,0xe0,0x22,0x5b,0xe1,0x25 .byte 0x82,0x91,0x12,0x7d,0x9f,0xb0,0xc4,0x01,0x32,0x16,0xea,0x38,0x22,0x3c,0xa9,0xb2,0xc6,0x20,0x7d,0x58,0x50,0xec,0x3f,0x3b,0x43,0xdd,0xb3,0xd2,0x31,0x37,0x30,0x6b,0x40,0x28,0x83,0x99,0xf4,0x41,0xc8,0x05,0x3b,0x87,0x45,0xb3,0x21,0xe7,0xac,0x4d,0xe7,0x5c,0x76,0xf1,0x85,0x8c,0xfc,0xbf,0x8e,0xad,0xa5,0xb8,0x10,0x3b,0x37,0x86 .byte 0xa1,0x15,0xa2,0x48,0x1f,0x9d,0x61,0xbe,0xa8,0xa4,0xb6,0xb3,0x71,0xcb,0x71,0x80,0x12,0x39,0xcc,0x6f,0xe7,0x8a,0x06,0x79,0x6b,0x8d,0xfd,0xf9,0x00,0x6d,0x28,0x82,0x3f,0xf3,0x3c,0xfb,0x06,0x19,0x63,0xdd,0x36,0xfc,0x5c,0xd9,0x6f,0x34,0xfc,0xc3,0xdd,0x77,0x71,0x53,0xa4,0x9b,0xce,0xc2,0xb2,0x06,0xec,0xa4,0xfc,0x36,0xd8,0x0c .byte 0x72,0x19,0x58,0xad,0xea,0x02,0x55,0x21,0x3a,0xb1,0x56,0x04,0xc7,0x58,0x5a,0xc1,0x18,0x9d,0xbb,0xc4,0x75,0x11,0x7c,0x30,0x94,0xd5,0xa3,0x80,0x57,0x6e,0xca,0xaf,0xec,0xdc,0x5e,0x58,0x5d,0xaa,0x2f,0x73,0x50,0x3e,0x2c,0x17,0xa4,0xa3,0x77,0xa0,0x5e,0x18,0x77,0x8b,0xf4,0xe5,0x09,0xa3,0x43,0xce,0x39,0xc5,0x70,0x16,0xf5,0xb5 .byte 0xf5,0xe3,0xc0,0x70,0xdd,0xb2,0x03,0xc8,0x43,0x48,0xc6,0xc1,0xbb,0xcc,0x04,0xb1,0x87,0xf6,0xde,0xd7,0x78,0xc9,0x8b,0xc2,0xa6,0xaa,0xea,0x1a,0x00,0x91,0x56,0x09,0x91,0xb7,0x24,0xf6,0x81,0x06,0x80,0x3e,0x2f,0xde,0x22,0xd7,0xf2,0x23,0xc5,0xde,0xf5,0x1f,0x30,0x4e,0xd7,0xed,0x3f,0x97,0x48,0x5c,0x1b,0x62,0x41,0x0e,0x7d,0xdc .byte 0xdf,0xfb,0xdd,0xea,0x99,0x26,0xf7,0x8d,0xbf,0xd0,0x0f,0x38,0x06,0xe0,0x35,0x74,0x58,0xec,0x5f,0x13,0x58,0xe6,0x33,0x8e,0x90,0x39,0xff,0x3a,0xaa,0xd8,0x81,0xf3,0x6a,0x6e,0xbd,0xa9,0x5c,0xcc,0x1c,0x61,0x41,0xcb,0xd7,0x0a,0x4f,0x10,0xcd,0x84,0xd2,0x84,0x0a,0x1b,0xd6,0xf5,0x48,0xdc,0x1a,0x7f,0x41,0x11,0xd5,0x13,0xf5,0xc0 .byte 0xa9,0xe0,0xd9,0x58,0xc6,0x96,0x4a,0xf5,0x46,0xe1,0x1d,0x87,0xe4,0x91,0x01,0x01,0x64,0xad,0x7c,0x4b,0x2f,0xa9,0x9a,0x95,0xf9,0x71,0x06,0x76,0xa6,0x09,0x6d,0x80,0xe7,0x9a,0xb2,0xa3,0xc1,0x8d,0x6d,0x2c,0x72,0xd6,0xf8,0xfa,0xc8,0xb1,0x70,0xf7,0x73,0xec,0x55,0x0a,0x3e,0xc6,0xc4,0xe8,0x5b,0x8b,0x84,0x9b,0x3d,0xf1,0xcc,0x5b .byte 0xbd,0x79,0xe3,0x29,0x59,0x18,0x24,0x3f,0x5f,0x25,0x63,0xed,0xc9,0x59,0xa2,0xa5,0xe0,0x4d,0x1c,0xa4,0xb2,0x04,0x6b,0x20,0x58,0xe9,0x84,0xc8,0x36,0xbb,0x4d,0x46,0x70,0x2f,0x41,0x47,0x23,0xdf,0x09,0xb1,0x63,0x7e,0x29,0x76,0xed,0xc9,0x34,0x68,0xc6,0x51,0xd2,0x76,0xe8,0xd3,0xb6,0x5a,0xfe,0xeb,0xa6,0xe9,0xd6,0x1e,0x80,0x2f .byte 0xc0,0xc0,0x13,0xd8,0x00,0x50,0x31,0x25,0xb7,0x6c,0x84,0xc3,0x87,0x26,0xf9,0x9d,0x43,0x1b,0x09,0x42,0x6d,0xbf,0xaf,0x7c,0xda,0x93,0x8a,0xe2,0x81,0xa5,0x05,0x78,0xdf,0xc5,0xa0,0x70,0x89,0x38,0x61,0x3c,0xb7,0x27,0x36,0x57,0x10,0x7a,0xc9,0xc3,0x9e,0xe6,0xa2,0x81,0x30,0x52,0xd3,0x62,0x0e,0xd4,0xff,0x59,0x81,0xee,0x50,0x35 .byte 0x72,0xa7,0x06,0x93,0xf7,0x5a,0xde,0x46,0xb1,0xe7,0x47,0x61,0x6a,0x31,0xb6,0x87,0x51,0xfe,0x49,0x39,0xea,0x33,0xc1,0xf3,0x19,0xa3,0xa8,0x58,0x68,0x5e,0x11,0xa3,0xc2,0x37,0xff,0xe4,0x36,0xa8,0x3d,0x2a,0x6e,0xaf,0xed,0x8b,0x36,0x77,0x0d,0xa0,0xda,0x4a,0x1d,0x9e,0x4d,0xae,0xf8,0xe8,0x40,0xef,0x2f,0xf9,0x6d,0x82,0x21,0x6c .byte 0xb3,0xad,0x96,0x0d,0x68,0xb7,0x57,0x11,0x5d,0xbe,0xd9,0x5d,0xa2,0xad,0x6f,0xdc,0xf6,0x1d,0x51,0x7d,0x44,0xd1,0x79,0x40,0x18,0x1f,0x2d,0xc7,0xde,0x01,0xc4,0xde,0x53,0xa9,0x54,0x11,0xa4,0xea,0x0d,0x10,0xbb,0x4e,0x0a,0x42,0xfa,0xc2,0x47,0x91,0xef,0xaf,0xf7,0x3b,0xff,0xc9,0xb4,0x86,0xb2,0xe1,0x7f,0xc9,0x2e,0x9e,0x2e,0xa9 .byte 0x58,0x1a,0xde,0x61,0x68,0xce,0xe8,0x6f,0x21,0x81,0xc0,0x3f,0xa3,0xc3,0x7b,0x93,0xce,0x4c,0xe0,0xa7,0xe1,0x09,0x47,0xe8,0xb4,0x6d,0x3f,0xde,0xdd,0x17,0x8d,0x72,0x75,0xb6,0x18,0x85,0x61,0xbe,0x75,0xac,0xfa,0x23,0xd5,0xd3,0x43,0xc9,0x82,0x9a,0xfa,0xfd,0x0c,0xf9,0xee,0xce,0x63,0x9b,0x79,0xa2,0x03,0x0e,0xcc,0x99,0xf7,0x32 .byte 0x61,0xb0,0xd2,0x65,0x8e,0x02,0x7e,0xa0,0x63,0x3c,0xd8,0x78,0x2e,0x9f,0xd2,0x16,0x16,0xf1,0xf0,0xc3,0x43,0x34,0x2f,0x16,0x9a,0x3f,0xdf,0x4d,0x1c,0x0d,0x9a,0x0c,0x4e,0x85,0xd2,0x5f,0x0d,0x63,0x57,0x7d,0xc3,0x69,0xe8,0x7d,0x4f,0x12,0x27,0x85,0x8c,0xb4,0x4d,0xf9,0xf9,0xfc,0x5a,0x43,0x63,0x80,0x7c,0xfd,0xae,0xb4,0x7f,0x48 .byte 0xb8,0xbd,0xac,0xf9,0xfa,0xd9,0x3a,0x31,0xaf,0x53,0xcd,0x47,0xf1,0x8c,0x15,0x66,0x55,0xa6,0x04,0x27,0x73,0x19,0x39,0x85,0xf9,0x96,0x48,0x2b,0x8c,0x64,0x14,0x7a,0xad,0xe3,0x34,0xd6,0xf5,0x4c,0x62,0x33,0x23,0x68,0x16,0x39,0x57,0x09,0x16,0x20,0x74,0xc3,0x98,0x24,0x69,0xc3,0x15,0xf7,0x05,0x45,0x30,0xf7,0x8f,0x7a,0x1d,0xb0 .byte 0x71,0x96,0x5a,0xaa,0xd6,0xa6,0x2f,0x95,0x15,0xdd,0x58,0x9e,0xc6,0x6e,0xb4,0xab,0x0d,0x1c,0x74,0x97,0xe3,0xb4,0x03,0xa8,0xba,0x27,0xe4,0xe3,0xf7,0x9d,0x7d,0x83,0x81,0x89,0x88,0x86,0xb3,0x4b,0x14,0xc0,0xd6,0xf3,0x2c,0xc2,0x17,0xac,0xb6,0xa1,0x7f,0xa6,0x98,0x42,0x72,0xa5,0xaf,0x4e,0xbb,0x9f,0x85,0x62,0xa5,0xaa,0xe0,0x27 .byte 0x9b,0x08,0x07,0xc8,0x37,0x37,0x33,0x30,0x1e,0x81,0xa0,0xbe,0x71,0x30,0xbf,0x70,0xf8,0x1b,0x28,0x91,0xc5,0xfc,0x37,0x0e,0x98,0x87,0x6a,0xdb,0xaa,0x26,0x31,0xcc,0x4e,0xd4,0xb9,0x5d,0xce,0x07,0x9e,0x48,0x15,0xf2,0xc0,0x56,0x44,0x36,0xe1,0xd0,0x56,0x3e,0x46,0xc0,0xec,0xd6,0x25,0x58,0x1b,0x66,0x3c,0xd2,0x5f,0xe0,0xca,0x69 .byte 0x5f,0xe4,0x00,0x4a,0x77,0x91,0x87,0xb0,0xb6,0x13,0x93,0xed,0x86,0x9f,0xef,0x6b,0x99,0xe6,0x6f,0xb8,0x2d,0x82,0xc6,0x71,0x30,0x3d,0x10,0xd1,0x55,0xb4,0xa3,0xbf,0x48,0x0e,0x69,0x1f,0xc3,0x5a,0x28,0xd2,0x7b,0x19,0xb1,0xf3,0x35,0x02,0xde,0x9b,0xd1,0x39,0x53,0xa6,0x9e,0x30,0xd7,0x08,0x96,0xb4,0x67,0x90,0x9f,0x27,0xe4,0x8f .byte 0x07,0x5f,0x69,0xb0,0x4b,0x2c,0x88,0x4d,0x9a,0x20,0x48,0x60,0x53,0xac,0x6f,0x81,0x53,0x1f,0xec,0x88,0x95,0x4d,0xc3,0xcf,0x52,0x13,0xa1,0x69,0x52,0x85,0xda,0x73,0x6e,0x6e,0xec,0x88,0xda,0xed,0xea,0xf5,0x9c,0x0b,0xc9,0xac,0x31,0x44,0x12,0x68,0xec,0x0d,0xc6,0x3c,0x05,0xef,0xec,0xff,0x6b,0x99,0xda,0xc9,0x3b,0x41,0x7d,0x4c .byte 0xdd,0xd2,0x83,0xca,0x52,0xc8,0x0d,0xe5,0xf8,0x76,0x34,0x06,0x98,0xa0,0xcd,0x74,0xc1,0xd5,0x44,0x60,0xeb,0xd4,0x67,0x67,0xda,0xff,0xe9,0x41,0x39,0x22,0xde,0x9b,0x9d,0x36,0xfe,0x6d,0xb1,0xc8,0xfe,0x39,0xe4,0x80,0x5b,0x3d,0x34,0x51,0x3d,0x3c,0xbc,0x8e,0xaa,0x1e,0x80,0xa9,0x20,0x98,0xa2,0x86,0x91,0x13,0x9a,0x2c,0xa7,0xf9 .byte 0x82,0x92,0xac,0x4c,0xf1,0x8b,0x9e,0xc2,0x27,0x4a,0xbd,0xb3,0xde,0x40,0x33,0x05,0x6d,0x6b,0xcd,0xfd,0x99,0x45,0x81,0xdc,0x98,0x69,0xc8,0xc3,0xc6,0x1d,0x4d,0x52,0x2e,0xf3,0x3b,0x5a,0x8f,0xce,0x89,0x77,0x74,0x0b,0x63,0x3a,0x70,0x7a,0x79,0x86,0x87,0x33,0x2a,0x67,0x9d,0xc0,0x1e,0xd8,0xa6,0xbd,0x7f,0x3e,0x7d,0x36,0x12,0xf2 .byte 0x2b,0x04,0x6c,0x5e,0x60,0x74,0x2b,0x05,0xa1,0x7a,0x67,0x2d,0xd7,0x50,0x9d,0xe7,0xce,0xbd,0x26,0xda,0xe7,0xab,0x63,0xc5,0x41,0x85,0x33,0x30,0x59,0x0a,0xfd,0xd6,0x27,0xbe,0x96,0x4b,0xe8,0xc1,0x98,0xa7,0xe2,0x5c,0xd9,0x8d,0xfd,0x1d,0x2e,0xcc,0x08,0x7f,0x3a,0xcf,0x0c,0x4f,0xc0,0xdc,0x70,0x5b,0x74,0x28,0xe7,0x79,0x04,0x55 .byte 0x59,0x91,0x8b,0xb1,0x6a,0x37,0x9e,0xf5,0xd4,0x61,0x4a,0xbe,0xd6,0x6e,0x23,0xc9,0xc9,0xcc,0xc2,0xbd,0xe6,0x85,0xc7,0xfc,0x58,0x81,0x90,0x0d,0x71,0xa1,0xfe,0x9d,0xb5,0x6b,0xa3,0x42,0x1d,0x34,0x7e,0x13,0xb1,0x17,0x75,0xff,0x99,0x25,0x67,0xb7,0x6b,0x43,0xb8,0x34,0x59,0x22,0x4f,0xa5,0xf0,0xd0,0x00,0xc9,0x25,0x2d,0xe6,0xba .byte 0x3a,0x67,0x50,0x01,0x74,0x7f,0x6e,0xbd,0x59,0x0d,0x90,0xe9,0xf8,0x00,0xea,0xab,0x40,0x79,0x5a,0xbb,0x32,0xb3,0x99,0x21,0xc1,0xca,0x0a,0x21,0x93,0x56,0x62,0xfe,0x87,0x98,0x27,0xbc,0x29,0x59,0x16,0x4f,0x40,0x43,0xed,0x3f,0x78,0xbd,0x5e,0x88,0x1b,0x33,0x37,0x4b,0xba,0x7c,0xd2,0x90,0xf5,0xf9,0xa6,0x54,0x87,0xac,0x3e,0xe1 .byte 0xf3,0x46,0xab,0xa1,0x93,0xe1,0xe1,0xbb,0xbe,0xa3,0x46,0x06,0x2d,0xed,0xeb,0x9b,0x13,0xb4,0x3b,0xc6,0x5f,0x8a,0xdf,0x0b,0xc4,0x3a,0x9b,0x12,0x82,0x81,0x86,0xbd,0x0f,0x94,0xd2,0xa4,0x52,0xd6,0x06,0x15,0xef,0xaf,0xa2,0x90,0x32,0xe5,0xa2,0x0d,0x38,0x1f,0xe9,0x78,0xac,0xec,0x95,0x71,0xca,0x93,0xd6,0xc8,0x6c,0x1d,0x24,0x8e .byte 0xe0,0x8d,0x80,0x3f,0x6d,0x2f,0x09,0x59,0xaa,0xd2,0x68,0x0c,0xe4,0x5f,0x25,0x7e,0x57,0x90,0xf8,0xcf,0xc0,0x1a,0x22,0xfc,0x66,0x48,0x8f,0xaf,0x26,0x8d,0xa0,0xa8,0x83,0x9b,0x89,0xb8,0xaf,0xd6,0xed,0xcf,0xa0,0x9a,0xbe,0x29,0xf1,0xa7,0x36,0xb0,0x46,0x1e,0x6c,0x18,0x90,0xed,0x0c,0xde,0xb6,0xd5,0xd0,0xfb,0xb6,0xce,0xd9,0xd0 .byte 0x2e,0x76,0x89,0xfb,0xa7,0x8c,0x49,0x22,0xda,0x4c,0x5c,0x8e,0xc7,0x2e,0xf8,0x41,0x21,0x30,0x0e,0x39,0xec,0xa3,0x0c,0x18,0x1b,0x72,0x85,0x33,0xaf,0x72,0x2b,0x02,0x4a,0xb8,0xcb,0x7d,0x79,0xbd,0x09,0x42,0x0a,0xe2,0x2f,0x1f,0x7a,0xec,0xda,0x65,0xc2,0xb5,0x9b,0x94,0xd1,0xed,0x1f,0x3d,0x39,0x13,0xe9,0x85,0xe0,0xb0,0x25,0xfa .byte 0x03,0x82,0x6c,0x4b,0x2a,0x9f,0x60,0xdd,0x16,0x94,0xfd,0x7d,0xbc,0x6f,0x0a,0xdc,0x55,0xec,0x25,0x0d,0xe6,0x83,0xb3,0x57,0xfd,0x0f,0x58,0xa5,0x5b,0x6d,0x79,0x80,0x51,0xdd,0xa7,0xfa,0x21,0x03,0x39,0xaf,0x86,0xa6,0x55,0x49,0x58,0xc4,0x86,0x4d,0xf3,0xe7,0x8d,0xb9,0xb9,0x6c,0x12,0xee,0x6e,0x6d,0x78,0x70,0xeb,0x6c,0x90,0x45 .byte 0x23,0x40,0x4f,0xe1,0x05,0x46,0xa0,0xe8,0xe8,0xb8,0x94,0xeb,0xf2,0x47,0x6c,0x80,0x66,0x45,0xea,0xd2,0x99,0x7b,0x5d,0x40,0x6b,0x60,0xad,0xba,0xc2,0xd2,0x5d,0xa8,0xff,0xdd,0x7d,0xbe,0xa1,0xbc,0x99,0xd2,0xb1,0x6d,0x24,0x94,0xdd,0x3e,0xf1,0x1f,0x78,0x53,0xf3,0xa9,0x79,0xc1,0xe7,0x58,0x8e,0x97,0xcb,0xdc,0x84,0xbb,0x44,0x4b .byte 0x95,0xe7,0xf5,0x9d,0xba,0x80,0x56,0x26,0x07,0x39,0xf3,0xc0,0xb1,0xfb,0xaa,0x9c,0xd8,0x80,0xcf,0x6b,0x68,0x61,0x79,0x88,0x14,0x9a,0x71,0x78,0x8b,0x46,0xb5,0x63,0xc6,0xed,0xde,0x1a,0x1d,0xaa,0xe0,0x23,0x96,0x8b,0x6e,0x3d,0x16,0xf1,0xe0,0x3d,0xe1,0x60,0x5a,0xcd,0x1e,0x95,0x9a,0x20,0x32,0xe7,0xc9,0xae,0x63,0x91,0xdf,0x34 .byte 0x35,0xc9,0xe7,0xf2,0x55,0x31,0xf4,0xad,0x0c,0x26,0x1a,0x3f,0x46,0x43,0x88,0xef,0x17,0x01,0xa6,0x46,0xdf,0x22,0x76,0x47,0x7c,0xfb,0xe2,0x53,0x74,0x51,0x3a,0x28,0xe5,0x70,0xaa,0x33,0x74,0x9e,0xe2,0xcb,0x44,0x89,0xc7,0xfa,0xa6,0x2a,0xae,0x1e,0xce,0x2b,0xc3,0xd2,0x58,0x83,0x94,0x40,0x0d,0xc9,0xe1,0xe7,0xea,0x90,0xac,0x99 .byte 0x27,0x30,0x2b,0x30,0x5e,0xe9,0x10,0x27,0x1e,0x29,0x4e,0x61,0xe3,0x50,0xdb,0xdd,0x51,0xe4,0x32,0x01,0xf4,0x72,0xfe,0x16,0xc1,0xa5,0x45,0xa9,0xd2,0x6c,0x15,0xa2,0x93,0x9c,0x7a,0x2c,0x79,0xb4,0xc0,0x88,0x07,0x7c,0x90,0x97,0xd7,0x9c,0x6c,0xc1,0x97,0x83,0x1d,0xec,0xa4,0xf0,0x74,0x6c,0x6c,0xa4,0x43,0xfd,0x5c,0x0c,0x7c,0x6f .byte 0x30,0xeb,0x84,0xf4,0x98,0xc2,0xd9,0x8f,0x54,0x41,0x3d,0x3e,0x3c,0x9d,0xae,0x81,0x8d,0x24,0xae,0x74,0xe5,0xa0,0x6f,0xd5,0x4f,0x89,0x46,0x74,0x3b,0xef,0x2a,0x8a,0x1c,0xe5,0x94,0xeb,0x05,0xec,0xc9,0x42,0xf5,0x1e,0x67,0x95,0x38,0x8b,0xaa,0x1c,0x44,0xfb,0xf9,0xbb,0xec,0x0f,0xd3,0x28,0x68,0x28,0x8d,0x04,0x23,0x92,0xff,0x99 .byte 0x76,0x8a,0x87,0x9b,0x36,0x87,0x52,0x15,0x5d,0xc8,0x4a,0xda,0x2e,0xca,0x9c,0x45,0x13,0x80,0x88,0x1a,0xe9,0xfb,0xfe,0x08,0xab,0x8b,0x23,0xba,0x3a,0xfe,0xed,0x70,0xea,0x0d,0x99,0x69,0xea,0xa6,0xd5,0xbf,0x5c,0x1f,0x22,0x40,0xa4,0x09,0xd6,0x3a,0x69,0x39,0xe9,0x81,0x5f,0x19,0xdf,0x26,0x70,0x55,0xb0,0x2d,0x11,0x67,0x06,0x6a .byte 0x32,0xcc,0xa4,0x9d,0xa5,0xa2,0x48,0x53,0x92,0x3a,0x52,0x6e,0xcf,0x23,0x96,0x82,0x4d,0x62,0xc5,0x72,0xd5,0x52,0x89,0xb7,0x08,0x86,0x14,0x54,0xc3,0xa7,0x44,0xb9,0x8e,0xe2,0xb1,0x10,0x20,0x15,0xc6,0xcf,0xa4,0x5e,0x66,0xa4,0x2d,0xca,0xf7,0x93,0xcb,0xd5,0x99,0x48,0x1e,0xde,0xec,0xc1,0xd3,0xd3,0xf5,0xcb,0x4a,0x24,0x31,0x5d .byte 0x5a,0xaa,0x32,0x89,0x3e,0x1a,0x2f,0x1e,0xb6,0xc3,0x5f,0x09,0x50,0x7a,0x6f,0x46,0x01,0x0e,0xeb,0x10,0x23,0x1b,0x49,0x9e,0xa9,0x2b,0xed,0xf2,0x2d,0x34,0xe9,0x45,0x2a,0xdb,0xa9,0xc5,0xf7,0x84,0x8a,0xa1,0xe5,0xc7,0xd0,0x56,0x35,0xab,0x7a,0x55,0x66,0x14,0x28,0x38,0x6a,0x0f,0xb7,0xb1,0xc8,0x28,0xce,0xbe,0xe2,0xdf,0x5a,0x45 .byte 0x50,0x87,0xc5,0x31,0x92,0x89,0x59,0x7e,0x18,0x97,0x22,0x2e,0x9d,0xea,0xce,0x29,0x07,0xef,0x06,0xc4,0xab,0xe8,0x85,0xe4,0x36,0x6f,0x0a,0x38,0xe5,0x54,0xc6,0x1d,0x19,0xdd,0x68,0xc9,0xfe,0x8a,0x50,0xe4,0xaf,0x4e,0xf1,0x4a,0xc8,0xf0,0xe0,0xa8,0x62,0x9e,0xbf,0xab,0x50,0xde,0x77,0x87,0x5f,0x7e,0xb5,0xdc,0x45,0x23,0xef,0xaa .byte 0xc4,0x92,0x6b,0x65,0xed,0xbf,0xa9,0x39,0xa6,0x7a,0xdb,0x32,0x89,0xbe,0xd9,0x51,0x4e,0x25,0x1d,0x98,0x1f,0x58,0xa4,0xcf,0xbf,0xc0,0x1c,0xa4,0xb7,0x4c,0xbf,0xc9,0xc4,0xea,0xee,0x13,0xd2,0xde,0x56,0x32,0x66,0xb9,0x65,0xbf,0xe9,0xd3,0x80,0x0a,0x1e,0x61,0xc8,0xb2,0x1d,0x94,0xec,0x5f,0x89,0x1c,0x27,0x47,0x58,0x22,0x23,0xa8 .byte 0x21,0x95,0x3d,0xc6,0x22,0xcd,0x77,0xfb,0x59,0xbe,0xa5,0x97,0xfc,0xe8,0x9a,0xa9,0xbc,0xa3,0x7a,0xbd,0x68,0xdd,0x33,0x1f,0x3c,0xc3,0x24,0x6e,0x57,0xc8,0x6a,0x54,0xdc,0x8c,0xdb,0xe8,0x8c,0xc2,0xd8,0xb6,0xbf,0x15,0xa3,0xff,0x57,0xca,0xd9,0xe7,0xe3,0xda,0x83,0x79,0x27,0x8f,0x72,0x17,0xcf,0x95,0x44,0x65,0x18,0x63,0xcd,0x8d .byte 0xa7,0x74,0x66,0x5c,0xd3,0x71,0xd4,0x7f,0x06,0x6f,0xc1,0x3e,0x1d,0x06,0x7e,0x0d,0x45,0x9c,0x04,0x7a,0xbd,0x50,0x2d,0xc2,0x4c,0x27,0x32,0x3c,0x86,0x57,0xc1,0x9a,0x2a,0x74,0xe9,0x39,0x21,0x91,0xa0,0xc9,0x3f,0x47,0xf2,0xa5,0x4c,0xda,0x0f,0xe0,0x25,0x02,0xad,0x19,0x54,0xec,0xdb,0xb2,0x06,0xe0,0xc6,0x77,0xc1,0x8d,0xf7,0xcb .byte 0xe1,0x43,0xad,0x0f,0xb1,0x0f,0x7e,0x5b,0xba,0x1c,0x02,0xfa,0x60,0x9c,0xdc,0x89,0xdb,0xb2,0xc5,0x74,0xc3,0x5f,0x82,0x55,0x0a,0xbc,0x08,0x13,0xdf,0xac,0x35,0x7a,0xcc,0xdb,0x9e,0xbf,0xd7,0xde,0xfc,0x64,0x58,0xfb,0x33,0xd7,0xc3,0x39,0x4d,0x38,0x65,0xe7,0x98,0x83,0xbe,0x12,0x6d,0xb0,0xda,0x23,0xc0,0x7d,0xa8,0x64,0x75,0x33 .byte 0x7f,0xe9,0xa7,0xa1,0x41,0x85,0x50,0xcc,0xaa,0x3c,0xc1,0xd8,0xda,0xa1,0x53,0x0c,0xac,0xca,0x6a,0x8c,0xbd,0xb0,0x2b,0xd9,0x2f,0x4c,0x3d,0x3d,0xec,0x9d,0x70,0x6c,0x67,0xff,0x1d,0x95,0xb0,0xaa,0x46,0xaa,0xd6,0x6c,0x3c,0x4c,0x65,0x36,0x47,0xea,0x5e,0x46,0x25,0x38,0x8f,0xbe,0x7d,0x3d,0x80,0x39,0x0f,0x05,0x06,0x1e,0xbe,0xe1 .byte 0x9f,0xd4,0xc8,0x7d,0x11,0x8d,0x78,0x0d,0x26,0xe7,0x9a,0x47,0x8f,0x63,0x5a,0xe5,0x91,0xc0,0x81,0xa1,0xe6,0xff,0xa5,0x1f,0x38,0x0b,0x46,0x5b,0xc8,0x31,0xf3,0x56,0x5a,0x40,0x68,0x43,0x45,0xe0,0x83,0xf3,0x9a,0xc2,0x2e,0x62,0x4e,0xf9,0xd4,0xe8,0x13,0xe0,0x16,0x2d,0xa7,0x33,0xae,0xb5,0xc9,0x77,0xd6,0x5f,0xb1,0x28,0xa8,0xf7 .byte 0x40,0x03,0x1b,0xe1,0x2a,0x3d,0xd6,0xe5,0x60,0x64,0x5e,0xe2,0x59,0xbb,0xb1,0x36,0x0b,0xeb,0xf7,0x8e,0x60,0x5a,0x3a,0x4a,0x78,0x9c,0x2d,0xef,0xe6,0x9e,0x1c,0x4f,0x53,0xea,0xc3,0xab,0x88,0x36,0x8e,0x08,0x3e,0x18,0xcc,0xb4,0xa2,0x60,0x5c,0xae,0x64,0xf6,0x6c,0x3c,0xcf,0x34,0xa4,0x6d,0xfd,0xb5,0x2f,0xfa,0x93,0x8f,0xf7,0xc1 .byte 0x96,0xfe,0xa9,0x8c,0x85,0xec,0x65,0xc1,0x26,0x86,0x4f,0x36,0x1b,0xda,0xe0,0x47,0xb6,0xe4,0x34,0xf6,0xaf,0xce,0x56,0xdd,0xcf,0xad,0x94,0x1b,0x78,0xd3,0x17,0x00,0xf4,0x66,0x8e,0x8a,0x1d,0x11,0x1b,0xa2,0x7e,0x31,0xfc,0xda,0xc5,0x39,0x8a,0xc4,0x7d,0xee,0x53,0xe0,0x39,0x2d,0x53,0x2a,0x63,0x6b,0x0a,0x76,0xd0,0x2e,0xde,0x8d .byte 0xf7,0x79,0x78,0xea,0x25,0x75,0x23,0x7f,0x17,0x93,0xfc,0xd3,0xfb,0x0e,0x51,0x3f,0x84,0x49,0xd4,0xbd,0x73,0x21,0x30,0x56,0x58,0x63,0x7a,0x20,0xfd,0x59,0x00,0xfd,0x42,0x82,0x69,0xd4,0x8e,0x69,0x4f,0xc8,0xf4,0x45,0x6d,0x8a,0x5c,0xa2,0xba,0x7d,0x69,0xcd,0xb5,0xf2,0x24,0x85,0x03,0x10,0xb3,0x3f,0xa6,0x9a,0xeb,0xe3,0x0d,0x75 .byte 0x82,0x8d,0xe7,0xfb,0x9f,0x9b,0x7b,0x5b,0x33,0x1d,0xba,0xe8,0xde,0x01,0xfd,0xd3,0x38,0x16,0xb4,0x65,0xb7,0x53,0xdd,0xd5,0x4b,0x13,0x3e,0x1a,0x87,0xbe,0x34,0xbb,0xe2,0xbb,0x03,0x0a,0xc9,0xdf,0x47,0xa8,0x10,0x5f,0x3e,0x74,0xab,0x1a,0x7d,0x98,0x26,0xd1,0xc9,0xb7,0x8e,0xb8,0x3b,0x71,0x10,0x90,0x0a,0x91,0x86,0xef,0x22,0xec .byte 0x3e,0x70,0x3d,0x05,0x75,0xb8,0x91,0xf6,0x77,0x54,0x5b,0x91,0x13,0x58,0xf9,0x29,0xbb,0x94,0x50,0xe7,0x8a,0xb5,0x31,0xa5,0xe3,0x07,0x7d,0x53,0xc0,0xe5,0x58,0x38,0x27,0x84,0xf0,0x96,0x99,0xef,0x60,0x07,0x05,0xdd,0x46,0x64,0xed,0xa8,0xc4,0x3e,0xde,0xac,0x6a,0xfe,0x2c,0x1a,0x9d,0x47,0x88,0x37,0x16,0xf5,0xb2,0x9e,0x78,0x21 .byte 0x6e,0xd4,0x81,0x00,0x29,0xa1,0xcb,0x03,0x32,0x1e,0x45,0xbd,0xc9,0x86,0x97,0x56,0x34,0x2e,0xe5,0x91,0x2b,0x8d,0xf0,0x22,0xe9,0x13,0x0a,0x31,0xd8,0x82,0xbc,0x1a,0x7e,0x97,0x08,0x71,0x08,0xb0,0x82,0x8c,0x24,0x90,0x43,0x09,0x28,0x2d,0xcd,0xf1,0x31,0x9c,0x70,0x54,0x2b,0x13,0x07,0x33,0x4d,0x29,0x1d,0xbd,0x37,0x7d,0x95,0x07 .byte 0x7b,0x23,0x67,0x59,0x34,0x0c,0x85,0xae,0x55,0x94,0xe3,0xfe,0xbf,0xd2,0x38,0x0b,0x2f,0x4f,0xc7,0x4c,0xb7,0x1d,0xfe,0x97,0x2a,0x22,0xf1,0xa4,0x2d,0x02,0xb6,0xdf,0xc7,0x9b,0x0a,0xf5,0x6c,0xcf,0x91,0xee,0x44,0xd5,0x2a,0xe5,0xa7,0x64,0xf7,0x37,0x59,0x85,0x8e,0xef,0xa3,0x0d,0xfe,0xcc,0x80,0xb9,0x5c,0x8d,0x01,0x0f,0xbc,0x5d .byte 0xd5,0x47,0xff,0xa0,0x32,0xc7,0xac,0xb8,0xf8,0x43,0x3f,0x6d,0x68,0xa8,0xed,0x20,0x04,0x3b,0xa6,0x70,0x7a,0x75,0x84,0x50,0x7a,0x5f,0xab,0xa0,0x98,0xdf,0xa1,0x45,0x82,0x22,0xe7,0xf4,0xf5,0xc9,0x85,0x43,0xda,0x3b,0x18,0x40,0x38,0xfb,0x66,0x14,0xa4,0x51,0x26,0xe3,0xd8,0x2e,0x05,0x9d,0xd2,0x38,0xd5,0xca,0xd2,0xd9,0x87,0x4a .byte 0x06,0xb1,0x12,0xa3,0x16,0xa2,0xea,0x96,0x8c,0xee,0x78,0xc5,0x57,0x0c,0xbb,0x45,0x38,0xd3,0x9b,0xb3,0x66,0xe0,0x0d,0x00,0x48,0x4d,0xfc,0xa1,0x59,0x31,0x30,0x77,0xdc,0x26,0x3a,0xe0,0xc6,0x53,0x42,0x50,0xac,0x50,0xa3,0x4d,0xd8,0x70,0xcf,0xdc,0x3a,0xd0,0xcc,0xab,0x5d,0x1e,0xda,0x30,0x32,0x7c,0xf1,0x5a,0x15,0x6a,0x92,0xb3 .byte 0x32,0xce,0x4b,0xf7,0xa4,0x8b,0x62,0xaa,0xad,0xa0,0x46,0xed,0x2a,0xb3,0x01,0xaf,0x9f,0x4a,0x5a,0xce,0xcf,0xb4,0xe6,0x34,0xd0,0xad,0xdc,0xce,0x2a,0x32,0xee,0x60,0x3d,0xb4,0xd3,0xc6,0x0e,0x72,0xdf,0xe5,0xea,0x15,0x58,0x19,0x72,0xfa,0x78,0x55,0x1d,0x57,0x62,0xe9,0xa0,0x13,0xbf,0x64,0x17,0xae,0x42,0xce,0xf7,0x70,0x2a,0xd0 .byte 0xf2,0xd8,0x3e,0xef,0x25,0x2f,0xf8,0x93,0xc1,0xc3,0xf5,0x35,0x6d,0x43,0x49,0xfd,0xda,0x97,0x3b,0x6c,0x04,0xe2,0xe0,0xae,0x92,0x2b,0xc7,0x24,0x3c,0x76,0xc5,0x29,0xd2,0x3f,0x35,0x9a,0x5b,0xc2,0x16,0x6a,0x34,0x44,0x10,0x36,0x32,0xb1,0xcc,0xc0,0x42,0xff,0x1a,0x3d,0xaf,0x66,0x52,0xda,0xe5,0xf8,0x74,0xda,0x7a,0x1e,0x29,0x35 .byte 0x47,0xc8,0xe1,0x8d,0x7a,0x2f,0x0d,0x1c,0x12,0x5e,0xe6,0x56,0x15,0x74,0x6e,0x85,0x68,0xf5,0x17,0xd3,0x21,0x04,0x85,0x01,0x02,0xe4,0xfa,0x3f,0x69,0x29,0xd7,0x39,0x86,0x94,0x6f,0x81,0xa1,0x81,0x04,0x29,0xde,0xe2,0x0a,0x9b,0xd7,0x57,0xdc,0x77,0x2e,0x77,0x93,0x59,0x54,0xd3,0xf1,0xd5,0x11,0x07,0xe0,0x01,0x71,0xb5,0xb3,0xc0 .byte 0xdb,0x17,0x4b,0x5b,0x58,0xfc,0x32,0xf9,0x75,0x8e,0xdf,0x60,0x88,0x8f,0xf9,0xb0,0xe3,0x64,0x75,0xd5,0x5e,0xb1,0xec,0x57,0xa3,0xd4,0xe2,0x05,0xf1,0xf9,0xa9,0x51,0x6b,0x84,0xc3,0x78,0x74,0xe9,0x36,0xd0,0xb6,0x14,0xcd,0xa3,0x05,0xb6,0xa2,0x5c,0x2c,0x11,0x53,0x10,0x60,0x8c,0x2c,0xd8,0x7b,0xc0,0x00,0xf1,0x64,0x35,0xdc,0x7b .byte 0xf5,0x9b,0xd0,0x82,0xa8,0x00,0xe6,0x17,0xb9,0x5a,0x80,0xe1,0xee,0xb0,0x0c,0x3d,0x9a,0xae,0xaf,0xd8,0x70,0x2e,0x85,0xf0,0x0e,0xb4,0x5e,0x92,0x96,0x33,0xa5,0xa9,0x07,0x12,0x95,0xf1,0x4b,0x67,0x25,0x51,0x40,0x91,0xda,0xb9,0x4d,0x5b,0x6b,0x07,0x7e,0x52,0xa8,0xa6,0xf9,0xd1,0xeb,0x8e,0x47,0xd0,0xf8,0x7a,0x17,0x6f,0x04,0x41 .byte 0x2b,0x65,0x3c,0x3b,0x0f,0xbc,0xef,0x26,0xc1,0x63,0x24,0x33,0x40,0x40,0xf2,0x1f,0x34,0xaf,0xba,0x1d,0x94,0x72,0xd6,0x44,0xe2,0x6f,0x1b,0x83,0x87,0xd6,0x2c,0xc9,0x4c,0x2e,0xa3,0x98,0xc4,0x86,0x16,0xfe,0xc2,0xa3,0xdc,0xb4,0x86,0xfd,0x66,0xd2,0xc3,0x09,0xfd,0x8e,0xa7,0xb9,0xd2,0x5c,0x57,0x5e,0xd6,0x15,0xc4,0x12,0xa0,0xe3 .byte 0x52,0x54,0x7c,0x26,0x93,0x28,0xdc,0x13,0x97,0xff,0x1e,0x79,0x2d,0x83,0xbb,0xf2,0x9c,0xf1,0x51,0xf9,0xd7,0x26,0x78,0x69,0xfe,0x9b,0x07,0x91,0x0d,0xef,0x29,0x28,0xf0,0xd5,0x94,0xed,0xb8,0x45,0xe2,0xe1,0xde,0xe9,0x9a,0x01,0xc5,0x00,0x77,0xdf,0x40,0x61,0x52,0xbe,0x9e,0x82,0x8c,0x04,0x0e,0x92,0xab,0x67,0x96,0xdf,0xc7,0xa7 .byte 0x01,0x55,0x66,0x73,0x6c,0xaa,0x47,0x2e,0xb6,0x98,0x64,0x0d,0x7e,0x45,0xa2,0xda,0x34,0x2d,0x1a,0x7b,0x35,0x49,0xee,0xc5,0x91,0x05,0xe0,0x14,0x19,0xdd,0xb7,0x2b,0x43,0x07,0x5a,0xb5,0xb2,0x6a,0x6a,0x7d,0xf1,0x17,0x3a,0x26,0x95,0x3a,0xff,0x9c,0xa8,0x19,0xe0,0x03,0x11,0x26,0xb9,0x07,0xfc,0x01,0xe3,0xa2,0x4a,0xeb,0x92,0xc0 .byte 0x26,0x0a,0x88,0xdf,0x5b,0x67,0xc6,0xca,0xe0,0x98,0x0a,0x94,0x1e,0x93,0x32,0x49,0x64,0x7b,0xe5,0x8d,0x39,0x7c,0xb7,0xf0,0x4b,0xf0,0x46,0x62,0x47,0xcb,0x09,0x6f,0x01,0x09,0xbb,0x13,0x89,0xb3,0xc5,0xa8,0xa0,0xbb,0x05,0x61,0x62,0x07,0xdb,0xd8,0x4f,0x6a,0xc0,0xdc,0xaf,0xfe,0x97,0xb3,0x38,0x74,0xe0,0xa6,0x13,0xa9,0xb0,0x27 .byte 0x1d,0xb7,0x2d,0xb1,0xa3,0x7c,0x22,0x7f,0x99,0x67,0x5a,0x7e,0x1c,0xd9,0xf4,0x45,0xa1,0xfe,0x12,0xa7,0x9d,0x43,0x1d,0x1c,0x29,0xfe,0x95,0x33,0x79,0xe7,0xb9,0xa2,0x7e,0x50,0x50,0xa4,0x52,0x92,0xd0,0x44,0x2b,0x4c,0x78,0x77,0xfa,0xd8,0x6f,0x81,0xe8,0xfb,0x50,0x9c,0xfc,0x80,0x61,0x91,0x25,0x3d,0x66,0x11,0xd0,0xc3,0x77,0x83 .byte 0x20,0xee,0xf9,0x38,0x24,0x2f,0x63,0x6b,0x9e,0xca,0xda,0x49,0xd2,0xba,0x10,0x80,0xfe,0x77,0xf6,0x79,0x1b,0x95,0x30,0x16,0xec,0x90,0xde,0x4a,0xb4,0x7d,0x35,0x20,0x4c,0xac,0x23,0xaf,0xe4,0xfb,0xbb,0x8f,0xe8,0xc6,0xf5,0xc5,0xf9,0x0f,0x74,0x25,0x7c,0x37,0x96,0x81,0x21,0x4f,0xe9,0x56,0x28,0x5c,0xd1,0xf2,0x94,0xb4,0xf6,0x6b .byte 0x34,0x9e,0xd9,0x37,0x41,0xeb,0x9c,0x71,0x4e,0xeb,0xc6,0xd3,0x7b,0x5b,0xc7,0x3e,0x07,0x59,0xe1,0xc5,0x81,0x72,0x7e,0x30,0xdb,0x35,0xcf,0xce,0x47,0x9f,0x36,0x74,0x34,0x00,0xa1,0xde,0x9f,0xae,0xba,0xe9,0x16,0xf7,0xf3,0xa7,0x24,0xf5,0x81,0xfa,0x40,0x80,0x9b,0x48,0xcf,0x97,0xc4,0xde,0xeb,0x7a,0x07,0xbc,0xf5,0xeb,0x5c,0x38 .byte 0x6d,0x64,0xaa,0xc3,0x81,0x66,0x41,0xc8,0x3b,0xaa,0x8b,0x69,0x22,0x0b,0x19,0x6d,0x0f,0xd8,0xcb,0xea,0x2a,0x98,0x03,0x4b,0x42,0x4c,0x0a,0x7b,0x92,0xdf,0x59,0xa0,0xfd,0x27,0x0e,0x0f,0x98,0xa6,0xc9,0x31,0xe1,0x8f,0x9c,0x57,0x29,0x07,0x01,0x0f,0x26,0xf3,0xc6,0x43,0xdf,0x1d,0xe4,0xa6,0xd6,0xb0,0x56,0xfd,0xf7,0x9c,0xc1,0x0b .byte 0x2f,0x9b,0xc3,0xbe,0xc0,0x09,0x14,0x0f,0x19,0x70,0xd3,0x5a,0x7f,0xe1,0x64,0xbb,0x47,0x04,0xb9,0x2a,0xfc,0x49,0x68,0xba,0x14,0xfa,0x65,0xc9,0x9b,0x46,0xd1,0x0c,0x03,0x3b,0x20,0x36,0x47,0x05,0xb0,0x89,0xd9,0xc0,0x36,0xe8,0xe2,0xfa,0xb3,0x2a,0xf9,0x2f,0x23,0x40,0x26,0xf3,0xe0,0x61,0xdf,0x6d,0x47,0xc4,0xe2,0xb9,0xdd,0x44 .byte 0x9a,0x34,0xcf,0x1f,0xdb,0x72,0x28,0x23,0xf0,0x56,0x65,0xcb,0x43,0xad,0x7d,0x42,0xa5,0x73,0x97,0x62,0x7c,0x2d,0x6e,0x51,0x8f,0x94,0x07,0xe9,0x14,0xa8,0x48,0xdd,0xc5,0x63,0x4b,0xfd,0x73,0x46,0xc3,0xe2,0x55,0x66,0xe2,0x58,0x32,0x00,0x68,0xaf,0x1c,0xd4,0xf3,0x8c,0x59,0x89,0x6f,0x08,0xc5,0xb3,0x47,0x09,0x56,0x90,0x05,0xd1 .byte 0xf8,0xc6,0x20,0x4a,0xb8,0x69,0xd4,0x87,0x5d,0x3d,0x89,0x6d,0xf4,0x10,0xcd,0x5c,0xba,0x3f,0x48,0x7a,0x26,0xb8,0x4d,0x9a,0x0e,0x22,0x2e,0x9e,0x70,0x5d,0xff,0xf9,0xf2,0xec,0xe8,0xb0,0xfc,0xbb,0xcf,0xfe,0x8e,0xc9,0x8d,0x2f,0xda,0x25,0x46,0xcb,0xe4,0x6a,0x33,0xce,0xbb,0x02,0x72,0x58,0xee,0x6d,0x40,0x86,0xc9,0x8d,0x06,0x62 .byte 0x8f,0x6b,0x81,0x60,0xeb,0x78,0x46,0x32,0xe8,0xc6,0xde,0x86,0x4f,0x11,0xa9,0xad,0x62,0xb0,0x15,0xb6,0x09,0xa9,0x3c,0xe1,0x6b,0x12,0xb0,0x39,0x59,0x26,0xde,0xc6,0x7a,0x95,0xaf,0x00,0xd6,0xb7,0xc5,0xe4,0x43,0xde,0xc6,0xcf,0x2f,0xa0,0x8d,0xfd,0x54,0xd7,0xc6,0xed,0x64,0x16,0xa1,0x9b,0x39,0xe3,0xc6,0x9c,0x1e,0x60,0x6c,0x03 .byte 0x3f,0xac,0x24,0x99,0x59,0x5a,0x4e,0x95,0x01,0x5d,0x2e,0x03,0xd0,0xb5,0xdf,0x19,0x85,0x4a,0x5e,0x70,0x6d,0x46,0x00,0xfb,0xbb,0xf5,0xb1,0x35,0x11,0xcb,0xda,0x4b,0x31,0x1a,0x0b,0xa3,0x58,0x9c,0xcf,0x09,0x79,0xd7,0x31,0x4e,0x6c,0xbc,0x16,0x6f,0x14,0xa3,0xbf,0xcf,0x05,0xe4,0xf8,0x2f,0x3b,0x5f,0xb7,0xc4,0xa4,0xbf,0x80,0xac .byte 0x53,0xb5,0xf8,0x7c,0xf5,0x16,0x7c,0x5e,0x16,0x47,0xd1,0x01,0x34,0xd6,0xb9,0x8a,0xc9,0xff,0xe3,0x7d,0x80,0xe4,0xcd,0x83,0xfe,0x8a,0x49,0x34,0xa5,0xc0,0xf3,0xe7,0xff,0x09,0xbd,0xf4,0x84,0x36,0x19,0xc6,0xc7,0x4d,0x50,0xd2,0x3f,0xa7,0xdb,0xea,0x3d,0x74,0x15,0x45,0xe3,0x0f,0x6c,0x6a,0xcc,0x2a,0x16,0x40,0xef,0xaf,0x64,0x2d .byte 0x76,0xa0,0xdc,0x74,0xa9,0xb5,0x70,0x6f,0x27,0xf5,0x3c,0xd0,0xa1,0x46,0xfb,0x9d,0x4c,0xb3,0xda,0x01,0x02,0xc0,0xbd,0x9f,0x4a,0x21,0xb7,0xdb,0xd9,0x89,0xe9,0x90,0x62,0xfb,0x89,0xb8,0x84,0x4b,0x2b,0x1c,0x5e,0x67,0xde,0x9d,0x59,0x3a,0xd0,0x15,0xc0,0xba,0xdf,0x12,0xf2,0x9e,0x07,0x2f,0xb0,0x9c,0x7f,0xf3,0x73,0x89,0x84,0x26 .byte 0xb8,0x7f,0x2d,0xad,0x18,0xf7,0x06,0x10,0x9d,0xe9,0x09,0x4f,0x7b,0xa5,0xa0,0x96,0x2f,0x3d,0x8e,0x65,0x0b,0xe4,0x65,0xa2,0x7a,0x10,0x81,0xb1,0xb9,0xc8,0x4c,0x27,0x53,0x70,0xc7,0x25,0x5f,0x2c,0x03,0x7f,0xe4,0xff,0xc3,0x20,0x89,0x2e,0x4d,0xe8,0xab,0x0a,0x27,0x26,0x0e,0xe4,0x35,0xb5,0x43,0x5e,0x80,0xdd,0x18,0x53,0x3a,0xb7 .byte 0x17,0x6b,0xc5,0x68,0x2b,0x13,0x0e,0xa7,0x93,0x9e,0xfb,0x6c,0x48,0xe8,0x57,0xf5,0xd5,0x2a,0xd8,0x5d,0x56,0xb1,0x5b,0x5a,0x1f,0x6a,0xc0,0x7e,0x55,0x01,0x80,0xcb,0xa9,0xf3,0x20,0x06,0x74,0xa6,0x73,0xe5,0xcb,0x1e,0xc6,0xf4,0x81,0xf7,0x8d,0x8c,0x18,0xfc,0xa2,0x9b,0xe2,0xb6,0x1d,0xd6,0x5c,0xbe,0x82,0xda,0x2c,0xa7,0x08,0x8f .byte 0x58,0x2f,0x32,0x99,0x9c,0xa0,0x8f,0x22,0xfd,0x00,0xcf,0xef,0x4b,0xc5,0x49,0x11,0xf3,0x0a,0xa0,0x67,0x3b,0xf5,0x6a,0x2e,0x18,0xd1,0x3d,0xd1,0xee,0xd2,0xc3,0xc0,0x4f,0xbd,0x6a,0xd3,0xab,0x7b,0x56,0x92,0xd7,0x63,0x9f,0x87,0x44,0x0d,0x2a,0x67,0x44,0x17,0x48,0xa1,0xb8,0x99,0x3d,0xa7,0x57,0x46,0x3d,0x65,0x04,0x58,0xb0,0x43 .byte 0xa4,0x73,0x95,0xd4,0xb2,0xbb,0x8f,0x65,0xea,0x4d,0x55,0xcd,0xe5,0xb6,0xa2,0x15,0x0d,0x74,0x6c,0x3f,0xe5,0x06,0x9a,0x75,0xc3,0x51,0xa0,0x1a,0x66,0x36,0x30,0xff,0x7a,0xdf,0x27,0x22,0x70,0x02,0x20,0x2d,0x52,0x6f,0x6d,0x34,0xb5,0x74,0x3a,0x88,0xf6,0xec,0x7d,0x34,0x02,0x27,0x1e,0x58,0xcc,0x50,0x88,0x4a,0x13,0x98,0x97,0xf9 .byte 0x8f,0x6e,0x38,0x3b,0xed,0x2f,0x17,0x2e,0x44,0xb3,0xb4,0x93,0x14,0xe0,0xda,0xfd,0x29,0x02,0xb6,0xc5,0x80,0xa0,0xe2,0x1d,0x89,0x57,0xec,0xe8,0x15,0x43,0x7c,0xca,0x8b,0xb6,0x19,0x32,0x1c,0xf7,0x75,0x07,0xf7,0x37,0x4b,0x03,0x84,0x75,0xab,0x64,0x7a,0xa7,0xae,0x52,0xcb,0xe9,0xb1,0xc9,0x36,0xe9,0x49,0x60,0x82,0xc8,0xb9,0xcd .byte 0x37,0x1d,0x2a,0x9a,0x76,0x8a,0x4a,0x26,0xcd,0xff,0xac,0x48,0xc6,0x28,0x00,0xdb,0x2b,0x87,0x77,0x17,0xf7,0x57,0x93,0xb7,0x68,0xa8,0xf9,0xec,0x7b,0xaf,0xb0,0xad,0xe1,0x31,0x09,0x5b,0xf6,0x11,0x09,0x4e,0x96,0x53,0x3c,0x5a,0xb1,0x99,0x1d,0xfb,0x3f,0x25,0x1b,0xcf,0x61,0x08,0x2d,0x98,0xcb,0x76,0xa7,0xe9,0x77,0xc6,0x3d,0xe0 .byte 0x0c,0xc7,0x2e,0x34,0x57,0x57,0x4f,0x0b,0xb3,0x66,0xb4,0x57,0x3d,0x66,0xe4,0x3d,0x86,0x8a,0x3c,0x4f,0x19,0x97,0x3a,0x28,0x74,0x1a,0xa0,0xef,0x0d,0x10,0x51,0x58,0xb7,0xe2,0x2d,0x6a,0x6f,0x75,0xc3,0x67,0x9d,0xaf,0x76,0x6d,0x89,0x5d,0xd0,0x78,0xcd,0x03,0x48,0xb4,0x50,0x0b,0x5b,0x94,0x78,0x7a,0xe3,0x52,0xf6,0x4f,0x70,0x4c .byte 0xc3,0xe2,0x89,0xc9,0x33,0x75,0x83,0xc4,0x65,0x79,0x4d,0x8f,0xff,0x0e,0x11,0xb1,0x9e,0x87,0x9c,0xe4,0xd1,0x31,0x36,0xd4,0xef,0xa8,0x41,0x78,0xd7,0xad,0x47,0xbb,0x3d,0x0b,0xf5,0xd7,0x2a,0xf3,0xe5,0x3b,0x7c,0x90,0xa5,0xe6,0x71,0x89,0x55,0x88,0x5e,0x48,0x88,0x18,0xca,0xec,0x08,0x41,0x27,0xd5,0xe1,0x9f,0xb4,0x3c,0xdf,0x11 .byte 0x57,0x9f,0x5a,0x54,0x4e,0xfb,0x6c,0xc9,0xb2,0x98,0x65,0xa3,0xe2,0xd5,0x91,0x52,0x4a,0x87,0x30,0xc8,0x9e,0xcb,0xe7,0x9e,0x00,0x78,0x9e,0x3f,0x9d,0xe1,0x46,0x5b,0xdd,0xf3,0x3e,0xf4,0x36,0x94,0x97,0x06,0x78,0x46,0x53,0xb9,0x0d,0x8f,0x94,0x42,0x60,0x76,0xc7,0xc3,0x4d,0x48,0x06,0xee,0xf1,0xb9,0x58,0xe4,0xe7,0x11,0x68,0x41 .byte 0x51,0xd9,0x98,0xd1,0x26,0x3b,0xcb,0xd1,0x4f,0xce,0x89,0x20,0x76,0x1d,0x58,0x70,0xc7,0x0b,0xe4,0x70,0xf1,0xd0,0x33,0x1b,0x17,0x9a,0xda,0x47,0x7e,0xfc,0xec,0x34,0x0a,0xf8,0x24,0xf1,0xec,0x83,0xe4,0x0d,0x91,0x6d,0x46,0x82,0x33,0xf6,0x25,0xa3,0x26,0x7c,0x2a,0x78,0xef,0x7c,0x6c,0x0e,0x6a,0xd5,0x88,0x97,0xe4,0x76,0x4a,0x2c .byte 0x36,0xa2,0xa0,0x06,0xe2,0x20,0x7c,0x94,0xe2,0x0a,0xee,0x5b,0xc7,0x21,0x4e,0x60,0x24,0x32,0x46,0x09,0x69,0x56,0x6c,0xf5,0x62,0xe7,0xab,0x0d,0x64,0x7e,0x6a,0xa2,0x1b,0x15,0x33,0xb8,0x41,0x0f,0x96,0x16,0x2f,0x7b,0x97,0xdd,0x14,0x6a,0xec,0xfb,0xbf,0xc8,0x3d,0x99,0x72,0xa7,0x14,0xaa,0xae,0xf2,0x10,0xd5,0x4a,0xaa,0xd0,0xb1 .byte 0xb9,0xbb,0x5f,0xa9,0x51,0x96,0x91,0xc0,0x1a,0x31,0xad,0xa1,0x7e,0xb8,0x55,0x90,0x1a,0x17,0x37,0x4d,0x62,0x8c,0x75,0x19,0xfc,0x84,0x54,0x3d,0x5e,0x0a,0xaf,0x27,0xe0,0x5f,0xe2,0x76,0xad,0x9d,0xda,0x43,0xac,0x23,0x5c,0xb9,0xf7,0x2a,0xac,0x55,0xea,0x9b,0x07,0x4c,0x06,0x9a,0xba,0x4c,0x25,0x20,0xee,0x2a,0x37,0xb5,0x7d,0xa0 .byte 0x4f,0x3a,0xb8,0xc7,0x7c,0x2b,0x0f,0xb7,0x1e,0x26,0xe1,0xc3,0x17,0xf2,0x60,0x2b,0x47,0x06,0x7f,0xa3,0x7b,0x80,0xd0,0x48,0xf1,0x8e,0x5a,0x3d,0xcd,0x6a,0x49,0x0f,0x60,0xe5,0x3a,0x7f,0xa8,0x10,0x4b,0x0e,0x29,0x74,0x4e,0xe8,0xe1,0xae,0xe3,0x46,0xa5,0x87,0x7d,0xe2,0xd3,0x98,0x63,0x1e,0xc4,0xba,0x31,0x7e,0xd5,0xe2,0xbf,0x95 .byte 0x2d,0x8d,0x3b,0x1c,0xc8,0x5a,0xd3,0x42,0xe5,0x5e,0x26,0xfa,0xa3,0xcf,0x7b,0x68,0x43,0x5a,0xf6,0x86,0x06,0xd7,0x08,0xeb,0x70,0xa9,0x17,0xf6,0xcb,0xfc,0x9e,0xbe,0x82,0x69,0xe2,0x58,0xb3,0x5f,0x16,0xed,0xf1,0xea,0xaa,0xe4,0xbd,0x5c,0xcd,0x88,0xd6,0x48,0x18,0xfd,0x65,0xd1,0x44,0x77,0x06,0x8e,0x82,0x93,0x88,0x97,0x05,0xad .byte 0xc5,0x62,0x1b,0x6f,0xcd,0x23,0x45,0x86,0xcd,0x19,0x9a,0x90,0x6f,0x54,0x33,0x1b,0x35,0x01,0x05,0x50,0x09,0x7d,0x61,0x4e,0xc3,0x79,0x27,0xe0,0xf7,0xf6,0xf3,0x8c,0x3f,0xd2,0x77,0x09,0xa7,0x9c,0xb4,0xb9,0x2b,0x2e,0x5a,0x34,0x2c,0x60,0xc5,0xcf,0xa6,0x5f,0xf9,0x16,0x8a,0xd8,0xd7,0xab,0x2d,0xe7,0x0b,0x90,0x97,0xb0,0x45,0xf1 .byte 0xc5,0xe7,0xb2,0x50,0x5c,0x4f,0x3a,0xfe,0x7d,0x6b,0xbf,0xe7,0x8d,0x9d,0x9a,0x0d,0xaa,0x3f,0x58,0x09,0x7c,0x0f,0x3a,0xe5,0xff,0x05,0xa7,0x2f,0x78,0x0d,0x5f,0xa3,0x3e,0xf8,0xc5,0x51,0x98,0xc7,0x6b,0x98,0x53,0xe3,0xdd,0x69,0xa6,0x20,0x64,0x99,0x41,0xd7,0x78,0xcf,0x83,0x11,0xc4,0x9a,0x85,0x32,0x12,0xe7,0xff,0x8e,0x4e,0xce .byte 0x17,0xe6,0xb4,0x33,0x24,0x1c,0x99,0xba,0x1e,0xf8,0x3c,0xf3,0xb8,0x2e,0x80,0x89,0xa1,0x26,0x55,0xfc,0x22,0xde,0x5b,0x66,0xbb,0xf2,0x3b,0xd7,0xad,0x11,0xd6,0x5e,0x67,0xb2,0x34,0x6f,0x0c,0x7b,0x09,0xa9,0x7f,0x6f,0x88,0xe3,0xef,0x11,0x85,0x76,0x23,0x32,0x78,0x0b,0xa7,0x81,0xc0,0xdd,0xb0,0xac,0x59,0xe8,0xc8,0xde,0x13,0xa5 .byte 0x75,0x30,0xfb,0xac,0xaf,0x13,0x0f,0xb9,0x32,0xf9,0x41,0xfb,0x36,0x29,0x19,0x11,0xd3,0x6d,0xf5,0xd1,0xf0,0xf3,0x99,0x16,0xf5,0x04,0x01,0x41,0x94,0x8d,0x89,0xc6,0x9c,0xf2,0x39,0x9d,0x07,0x74,0x12,0x70,0x89,0xff,0x16,0xc1,0x79,0x30,0xf5,0x27,0x24,0x75,0x48,0x51,0xcd,0x81,0x15,0xcd,0x70,0x54,0x58,0x9b,0xe5,0x80,0x9c,0x2b .byte 0xdc,0x99,0x69,0x8f,0x14,0xbe,0xee,0x21,0x96,0xa8,0xd4,0x6b,0xf5,0x60,0xa4,0x2c,0x11,0x01,0xff,0x07,0x99,0x72,0x4b,0x5b,0xca,0xb5,0x10,0xfc,0x32,0xdc,0xbc,0x56,0x91,0xe9,0xec,0xb5,0x51,0x0a,0xa1,0x46,0x2c,0x8e,0x74,0xd7,0x63,0x42,0x76,0x41,0x8e,0xc1,0x7d,0x5d,0x86,0xf9,0x8c,0xbe,0x9b,0x52,0xce,0xf1,0x5b,0x04,0x8c,0x62 .byte 0x8c,0xb7,0x62,0x0e,0x62,0x46,0xaf,0xc0,0xb0,0x8c,0x94,0x8e,0xff,0x17,0x83,0x45,0x45,0x19,0x01,0x49,0xf5,0x97,0x13,0xb7,0x9c,0xe5,0x8d,0x62,0xc0,0x25,0x01,0xcb,0xcc,0x23,0xd1,0xfd,0xdb,0xc6,0x4d,0xca,0xe2,0x50,0x3c,0x77,0x1a,0x48,0xb2,0x3e,0x66,0x6b,0x80,0xff,0x7e,0x26,0x23,0x21,0x1b,0xa3,0x1e,0x17,0x3d,0x13,0x7f,0x43 .byte 0x51,0x97,0xfc,0x56,0x1e,0xaf,0x79,0x43,0xd8,0x2a,0x32,0x4f,0x28,0x28,0xe2,0x34,0x19,0x2a,0x64,0x13,0xae,0xf8,0xaf,0x18,0xc7,0x97,0x5d,0xab,0xd4,0xa4,0x3d,0x1f,0xa1,0x13,0x60,0x17,0x63,0x8c,0xb7,0x6a,0x36,0x57,0xab,0x23,0xcb,0x87,0xad,0x4d,0x6b,0xce,0x7f,0xc2,0x65,0xf9,0x30,0xbc,0x22,0xb9,0x8a,0x6e,0x82,0xb9,0xcf,0xd5 .byte 0xe6,0xa7,0x8d,0x6c,0x50,0x6f,0x98,0x15,0xe3,0x38,0x37,0x7a,0x23,0x47,0xed,0xac,0xb8,0xa3,0xa3,0xe7,0x5c,0x51,0x2f,0x9e,0x69,0x49,0xea,0xaf,0x9b,0x6d,0x6f,0x64,0x54,0xcc,0xa4,0x23,0x7b,0x5b,0xa0,0x30,0x5a,0xcd,0xb7,0xa4,0xe5,0x02,0x13,0x36,0x21,0x58,0x96,0xa2,0xfd,0xeb,0x00,0x78,0x5c,0x71,0x63,0x32,0x80,0x63,0x8c,0x67 .byte 0xac,0xe7,0xe0,0x92,0x5b,0x27,0x49,0x9d,0xa6,0x84,0x64,0x2e,0x51,0x5d,0x87,0x83,0xbe,0xce,0xba,0x56,0x33,0x8f,0x5c,0xed,0xb6,0xc0,0x90,0x80,0x17,0x98,0x8a,0x7c,0xe5,0x51,0xaf,0x8d,0xc0,0x76,0x19,0x6b,0xc8,0x7e,0xa1,0x9d,0x94,0x18,0x25,0xd6,0xf4,0xc0,0x19,0x75,0x34,0xaa,0x83,0xfd,0x8c,0x8f,0xeb,0x08,0x63,0xcc,0x39,0xa8 .byte 0xf7,0xe6,0x75,0x53,0x01,0xed,0xb0,0x43,0x8c,0x54,0x37,0xea,0x1d,0x55,0x88,0x38,0x46,0x30,0x37,0xa2,0x85,0x4d,0xf8,0xdf,0xd4,0x42,0xd1,0xb8,0xac,0x1b,0x23,0x4d,0x49,0xd8,0x07,0xe0,0x0f,0x8a,0x24,0x73,0xb7,0xd1,0x0a,0x2c,0x1c,0x72,0x19,0x5b,0x84,0xac,0xe9,0xcb,0xd5,0xa0,0x2f,0x5d,0x2f,0xca,0xe7,0x25,0x5e,0x22,0x3d,0x37 .byte 0x22,0xfe,0x53,0xbb,0xb3,0xf3,0xc4,0x73,0x3a,0x43,0x1f,0xd7,0x73,0x82,0x5f,0x1d,0x94,0x54,0xfc,0xfc,0x7b,0xc5,0x27,0x6c,0x31,0x12,0x0c,0x20,0x59,0x43,0xd6,0xc2,0xeb,0xea,0x38,0x4e,0xa2,0xd8,0xe4,0x4a,0x07,0x36,0xe8,0x37,0x77,0xbd,0x14,0x5b,0xdb,0x7e,0x2b,0x77,0x08,0x4f,0x29,0x96,0xf9,0x11,0x80,0x6e,0x91,0x10,0xe6,0x9b .byte 0xef,0x18,0xf9,0x73,0x16,0xbf,0xd4,0x18,0x8e,0x9e,0x29,0x6e,0xbf,0x38,0xea,0xa7,0x23,0xc2,0x85,0xe0,0x96,0xb5,0xd7,0x61,0x3b,0xfe,0xca,0xe6,0x03,0xdd,0xf2,0x67,0xfb,0x1f,0xb9,0x8b,0x73,0xca,0x1e,0xe7,0xd3,0xc4,0x5b,0xd2,0x35,0x01,0x77,0xfa,0x1e,0xea,0x6c,0x2a,0x8b,0xb3,0x9d,0x83,0x6d,0xef,0x1b,0x84,0x2b,0x7e,0xa4,0xc0 .byte 0x64,0x4d,0xea,0x44,0xce,0x23,0x63,0x5d,0x98,0xe4,0xfe,0x86,0x8e,0xe3,0x35,0xb4,0x4d,0x18,0x53,0x15,0xbc,0xaa,0x23,0x0b,0x0d,0xe4,0xa9,0x83,0xae,0xbe,0x43,0x57,0x33,0xf6,0xa4,0x95,0xf4,0x68,0xba,0xc7,0xf3,0xfe,0x83,0x3b,0x32,0xd3,0x65,0xb7,0x02,0x16,0x8f,0xb4,0xc8,0x4a,0x6d,0xf5,0x9c,0x58,0xa4,0xdc,0xe2,0x6c,0xaf,0xc9 .byte 0x7a,0x46,0xac,0x39,0x82,0x23,0x00,0xfd,0x49,0x2f,0x83,0xca,0x15,0xd6,0xfd,0x05,0xd4,0x50,0x9a,0xd3,0xee,0x31,0x78,0x7b,0x34,0xe1,0x96,0x83,0x22,0xaa,0xd8,0xc7,0xe4,0xee,0x76,0xb0,0x35,0x9e,0x26,0x97,0xb8,0x40,0xc2,0xe4,0x83,0x7b,0x3f,0x1c,0x01,0x6c,0x6d,0x0f,0x95,0x47,0x53,0x04,0x6d,0xa6,0x73,0xc0,0x8f,0x06,0xf8,0x86 .byte 0x84,0x96,0xe2,0x3e,0x38,0x17,0x50,0xbe,0x60,0x35,0x80,0x3a,0xba,0x24,0x3b,0x38,0xdc,0x15,0x49,0xfd,0xef,0xbd,0x33,0xe2,0xf6,0x21,0xfd,0x15,0xc2,0x34,0xce,0xe2,0xf2,0xe5,0xfa,0x68,0x4c,0xf0,0x38,0xda,0x9f,0xcc,0x65,0x3a,0x1c,0xe4,0x30,0x1e,0x01,0x89,0x6e,0x96,0xd5,0x45,0x27,0xb5,0x82,0x98,0xaa,0xbb,0xee,0xcc,0xb5,0xe4 .byte 0xbf,0xc6,0x7e,0x26,0x0a,0x7e,0x70,0x5c,0x52,0xc2,0x64,0xbc,0x49,0x37,0x50,0x78,0x81,0xdb,0xd9,0x80,0x68,0xad,0x1d,0x3e,0xa7,0xca,0x95,0x93,0x7c,0x18,0x0b,0xa9,0x92,0xd9,0xf8,0x8c,0xf4,0x58,0x40,0x4f,0x74,0xed,0xbc,0x0e,0x64,0x7c,0x8a,0x44,0x04,0x8e,0x33,0x27,0x46,0xa2,0x37,0xb3,0xce,0xff,0xc6,0x0b,0xb2,0x6c,0x41,0x01 .byte 0xe6,0x0d,0x6c,0xbe,0x60,0xd1,0x1e,0xde,0xb0,0x81,0x57,0x4f,0xa2,0xf8,0x02,0x5b,0x00,0x3d,0xca,0x9c,0x43,0x4a,0xf7,0xbe,0xab,0x3b,0xc0,0xc9,0xaf,0xab,0x1e,0xa7,0xf2,0x10,0xb1,0xb7,0x73,0x6b,0x43,0xf2,0x75,0xe1,0x7c,0xc7,0xb8,0x91,0x5d,0xc6,0xb8,0xb4,0xd8,0x2b,0x95,0xf5,0x8b,0xe3,0x9e,0x3e,0x5a,0x7a,0x55,0x05,0x7f,0xd2 .byte 0x83,0x36,0xb0,0xfc,0xc5,0x73,0x2a,0xa5,0x6c,0xcb,0x72,0xeb,0xae,0x38,0x38,0x05,0xdd,0xab,0xe2,0xa2,0x92,0x11,0xed,0xd5,0x2a,0x27,0x52,0x6b,0xba,0xae,0x56,0xf0,0x1b,0x60,0x53,0x9b,0x21,0xa6,0x62,0xfb,0x06,0x28,0xfe,0x94,0x26,0x38,0x72,0x80,0xed,0x76,0x61,0x5c,0x43,0xe2,0xee,0xfc,0x4f,0x37,0x52,0x00,0xc7,0xb6,0x51,0xcd .byte 0xb4,0x9d,0x4f,0x28,0x31,0x44,0x14,0xba,0xe4,0x3b,0x79,0x63,0x8c,0x48,0x71,0x38,0xc2,0xeb,0x86,0x4f,0x5b,0x0a,0xc6,0x2e,0xbc,0x7a,0xea,0x09,0x11,0xc4,0x95,0x25,0x35,0x36,0x2a,0x08,0x2c,0xc5,0xc3,0xf0,0x94,0xaa,0xce,0xdc,0x48,0x42,0x7d,0xf6,0x36,0x21,0x58,0x89,0x5b,0x5f,0x11,0xaf,0x8d,0x5e,0x72,0x38,0x6b,0xda,0xe6,0xd6 .byte 0xde,0x5c,0xfb,0x64,0xbb,0x9b,0xb6,0xe1,0x8d,0x25,0x00,0xa6,0x75,0x13,0x2d,0xa4,0xbe,0xf7,0xdf,0xe2,0x15,0x50,0xfa,0x11,0xe8,0xe7,0x85,0x92,0x3b,0xcd,0x10,0x2c,0x91,0xfa,0xb7,0x88,0xed,0x80,0x8f,0xec,0x91,0x15,0x70,0x51,0x2f,0x3d,0x52,0x01,0xd8,0xc8,0x76,0x9c,0x4c,0xdb,0x13,0x02,0x6c,0x30,0xcb,0x3f,0xea,0x3b,0xa6,0x26 .byte 0x89,0x12,0x1f,0x34,0x04,0x46,0x05,0xff,0xa7,0x71,0x41,0xf7,0x88,0xa1,0x53,0x3e,0x2d,0x8e,0x5b,0xad,0xe6,0xab,0xb4,0x4d,0x0a,0x9d,0x40,0x6c,0x12,0xfc,0xd8,0x49,0xeb,0x7e,0x91,0xb9,0xca,0xac,0x60,0x93,0x28,0x44,0x91,0x6f,0x54,0xf6,0x7b,0x67,0x8c,0xed,0x43,0x2b,0x36,0x56,0x1e,0x91,0xc3,0x67,0xac,0xd6,0x51,0x00,0xcc,0x97 .byte 0xfa,0xde,0x4d,0x74,0x1e,0x62,0xd6,0x8a,0x2a,0xb5,0xc3,0x53,0x81,0xcd,0x2a,0xb2,0xc8,0xb7,0x95,0x99,0xba,0x6c,0xb8,0xde,0xe1,0x93,0x39,0x6f,0xe8,0xb7,0x3f,0x6c,0x41,0x10,0x44,0xd9,0x9d,0x7e,0xe6,0x8d,0xdb,0xbb,0x70,0x4f,0xe8,0x44,0x8f,0x7d,0x1d,0x0f,0x8a,0xa4,0xb8,0xa7,0xdc,0x82,0x59,0xb6,0x23,0x16,0x26,0xf9,0xc1,0x92 .byte 0xe0,0xbf,0x9c,0x38,0xc1,0x9f,0xd9,0x1e,0x07,0x74,0x8c,0x0d,0x93,0xdd,0x5d,0x25,0x2a,0xa9,0xbc,0x74,0x97,0x5f,0x39,0xc7,0x25,0x11,0x5c,0x89,0x78,0x39,0xa1,0xf1,0x11,0x16,0xca,0x08,0xcc,0x12,0x09,0x17,0x7f,0x1b,0x86,0x47,0xce,0x95,0xf3,0x0a,0x5e,0x75,0x52,0xed,0x5c,0x7c,0xae,0x1c,0x93,0x3e,0x44,0x1e,0x11,0xed,0x7b,0xff .byte 0x92,0x27,0x30,0x1c,0xfe,0x33,0xa5,0x52,0x39,0x44,0x20,0x08,0x02,0x22,0x58,0x47,0xc4,0x63,0xec,0xd8,0xc4,0x29,0x04,0x44,0xa7,0x94,0xbc,0x8f,0xba,0x84,0xc8,0x16,0x85,0xe3,0xc3,0x58,0x9a,0xf6,0xdc,0x3e,0x15,0x58,0x06,0x04,0xc8,0x78,0xe6,0xb7,0x94,0x2c,0xce,0xb0,0x42,0x3c,0xbe,0x56,0xb4,0x82,0x84,0xb1,0xe7,0xb2,0xad,0x42 .byte 0x58,0x48,0x6e,0xd5,0x94,0x78,0xc3,0x5e,0xd8,0xb0,0xd3,0xa5,0x4c,0xe0,0xaf,0x77,0x0f,0x93,0xa3,0x03,0xf5,0xa6,0x50,0x19,0xb4,0xef,0x9f,0x57,0x84,0x24,0x12,0xb0,0xec,0xb0,0xb0,0x9a,0x9d,0x51,0x69,0xcb,0xd0,0x04,0x13,0x1e,0xfb,0xc1,0xc9,0x66,0xe7,0xb2,0x4c,0x75,0x25,0xbb,0xef,0x21,0x7b,0x00,0x3d,0x3f,0x4c,0x44,0x42,0xbf .byte 0x45,0xeb,0x42,0x28,0xbb,0x88,0x41,0xfc,0x9a,0xc8,0x04,0x1e,0xff,0x79,0xb0,0x12,0x7f,0xf6,0xb2,0xcd,0x34,0xaa,0xaa,0x83,0x8a,0xb1,0x1b,0x13,0xe2,0xb1,0x9e,0xcd,0xe7,0x87,0x4c,0x0e,0x14,0xd4,0x00,0x65,0x95,0x9c,0x5f,0x76,0x94,0x63,0xb6,0x1e,0x7c,0xe0,0x97,0xe9,0x87,0x6e,0x86,0x7a,0xba,0xa1,0xea,0x60,0x62,0xb1,0x93,0x7a .byte 0x08,0xba,0x85,0x18,0x61,0x1e,0x9b,0x63,0x09,0xea,0xf5,0x06,0xb8,0xc6,0x1b,0x24,0x3d,0x86,0x70,0x4a,0x6d,0xfa,0xb9,0xf2,0xb0,0xc8,0x59,0xa2,0xa6,0xde,0x78,0xf5,0x55,0xd4,0x91,0x57,0x56,0x53,0x8f,0x0f,0x4f,0x76,0xf9,0x57,0xa8,0x66,0xde,0xd6,0x33,0x30,0xb8,0x0c,0xb5,0x0a,0xea,0x84,0x9a,0xe5,0xcd,0x03,0x57,0xcb,0x8b,0x47 .byte 0xf5,0xe3,0x67,0xc1,0x69,0x42,0x7c,0xa3,0x91,0xa4,0x25,0x22,0x5a,0xf2,0x15,0x43,0xca,0x3a,0x62,0x2c,0xcd,0x9a,0x99,0xfb,0xb0,0xfc,0x2c,0x41,0xa6,0x84,0x51,0x93,0xc7,0x64,0xd8,0x95,0x8a,0xe7,0x0c,0xa4,0xd1,0x0d,0x57,0x4c,0x00,0xa6,0x55,0x3f,0x5b,0x9a,0x88,0xd3,0x39,0xf8,0xfe,0x30,0xf5,0xff,0xa7,0xcf,0x66,0x33,0xaa,0x20 .byte 0x2f,0x20,0xc6,0x47,0x33,0x36,0xac,0xf8,0x8b,0xca,0x83,0xa3,0xc3,0x5f,0x97,0xe5,0x9f,0x88,0x27,0x34,0x90,0xa1,0xfc,0x94,0xdc,0x5c,0x20,0x13,0x92,0x7c,0x9b,0x8b,0xe5,0x76,0xc2,0xb0,0x42,0x31,0x7c,0x0c,0xdd,0xbc,0xc5,0xcb,0xcd,0x72,0xaa,0xfc,0x89,0xbf,0x9d,0x79,0x19,0x9c,0x1b,0xca,0x19,0xe5,0x57,0xb3,0xbd,0x54,0x92,0xd4 .byte 0xbc,0x93,0x82,0x05,0x0b,0xc9,0x92,0x18,0x78,0xc1,0x23,0xff,0x65,0x7a,0x27,0x93,0xae,0xb6,0xf9,0x28,0x70,0x80,0xfe,0x97,0x73,0x06,0xe5,0x66,0x2b,0xb9,0xd9,0x20,0xe0,0x4a,0xf4,0xa6,0xa2,0xd1,0x6e,0x97,0x2b,0x90,0xa5,0x34,0x80,0x2c,0x25,0x3f,0x92,0xf2,0x41,0x50,0x5c,0x32,0x3d,0xe2,0xf0,0x6e,0x07,0x3c,0xc1,0x13,0x2d,0x04 .byte 0x2e,0x39,0xc6,0x19,0x74,0xe4,0x1d,0x4e,0x85,0xc8,0x3b,0x91,0x44,0x01,0xbc,0x86,0xdb,0xcb,0x0f,0xe5,0x54,0x6d,0xec,0xac,0xa9,0xdf,0x34,0xa2,0x9c,0xa9,0x77,0xe8,0x84,0x7f,0x82,0x67,0xf8,0xd1,0xce,0x7d,0xc8,0xc0,0x29,0xf8,0x59,0x03,0xea,0x6d,0x7d,0x21,0x07,0xe4,0x7e,0xf0,0xb1,0x13,0x8d,0x20,0x6d,0xa0,0xe9,0x98,0x3f,0x73 .byte 0xaf,0x8b,0x28,0x34,0xe9,0x12,0x57,0xaf,0x9a,0xd3,0xc7,0xb5,0xb0,0x60,0x26,0x72,0xae,0x39,0xf1,0x4a,0x38,0xa6,0xd5,0x07,0x7e,0xc1,0x37,0x1f,0x45,0x40,0x89,0x6f,0x1e,0x31,0x4d,0x6a,0x20,0x65,0x5e,0xd7,0x04,0x3d,0x9a,0x94,0x31,0x07,0xf7,0x20,0xef,0x1c,0xa6,0xcd,0xde,0x7e,0xcb,0x45,0x55,0x1e,0xe3,0x7f,0x3a,0x8f,0xf2,0xdf .byte 0xa3,0x55,0xcb,0xfd,0xc2,0x51,0x49,0x07,0xda,0xb4,0x64,0xac,0x82,0xa3,0xb5,0x0f,0x87,0x6e,0xf6,0x6d,0xfd,0x9e,0x5f,0xf8,0xe5,0x74,0xa4,0xd4,0x61,0x6d,0x9e,0xea,0x41,0xc1,0xa7,0xa4,0x8d,0x13,0xdf,0x0c,0x8d,0x1d,0xe5,0x19,0xa3,0xd3,0xc1,0xf5,0xb5,0xe5,0x09,0xc7,0x52,0x2d,0x23,0x74,0x9e,0xa2,0xcd,0xe2,0x58,0x24,0x62,0xd8 .byte 0xcd,0x60,0x24,0x1d,0xf6,0x84,0xec,0x35,0x35,0xfc,0x6e,0x78,0x96,0xea,0xfa,0x40,0xff,0x10,0x05,0x8e,0xfa,0x4c,0xae,0xe4,0x41,0x71,0xf2,0x4d,0x81,0x6c,0x2c,0xc3,0x60,0xcf,0x2f,0xaa,0xcf,0xda,0xe9,0x2d,0x58,0x2c,0xec,0x4f,0x04,0x03,0xa5,0xbe,0xb2,0x40,0x11,0x5c,0x85,0xae,0xf9,0x1a,0x43,0x62,0x90,0xd6,0xa1,0xdf,0x34,0x59 .byte 0xf4,0x8e,0x1b,0x1e,0x89,0x8e,0xba,0x82,0xa5,0x3b,0x96,0xa7,0x4c,0x24,0x72,0x00,0x25,0x7a,0x36,0xa1,0x81,0x61,0x1d,0x62,0x57,0x7d,0x8b,0x32,0xe2,0xdb,0x31,0xe3,0x68,0xb4,0xb8,0xac,0x83,0x95,0x9a,0xbb,0x7a,0x54,0x42,0x08,0xd8,0x68,0xf6,0x97,0x9d,0x3a,0x94,0x7e,0x9b,0xa4,0x13,0x72,0x51,0x3d,0x90,0x32,0xa7,0x21,0x21,0x96 .byte 0xc4,0x67,0x3d,0x0b,0x4e,0x7d,0x8b,0x58,0x6b,0x8d,0x0e,0xcf,0x6d,0xbb,0x6b,0xe8,0xc9,0x47,0xc8,0x3d,0x59,0xa5,0x48,0xc6,0x74,0x61,0xd9,0x98,0xa6,0xba,0xa6,0x75,0x19,0x02,0xb6,0x15,0xd9,0xe0,0xa2,0x4a,0x1b,0xe0,0xe0,0x83,0xb8,0xcb,0x7b,0xf2,0x54,0x02,0xc9,0xcd,0x77,0x51,0xd2,0xce,0x9f,0x47,0x4a,0x32,0x7a,0x85,0x91,0xab .byte 0x24,0x46,0x5b,0x50,0xa1,0x7b,0x7f,0x28,0xd4,0x09,0x62,0xce,0x15,0x9b,0x71,0xed,0x54,0x32,0xc6,0xb0,0x5d,0x11,0xfc,0x79,0x2e,0xfa,0xba,0x63,0xf5,0x56,0xe7,0xfe,0x93,0xce,0xb3,0x41,0xd8,0x3e,0x55,0xcb,0xfd,0x67,0x02,0x82,0xf7,0xc8,0x5f,0xd4,0x5a,0xee,0x80,0xe4,0x6c,0x2a,0xfe,0x2c,0x27,0x33,0x82,0x88,0x40,0x59,0x78,0x8e .byte 0xfe,0x46,0x57,0xd1,0xd6,0xe1,0x51,0xf3,0x26,0xb3,0x87,0xeb,0xbd,0xce,0x67,0x27,0x0a,0x6d,0x9f,0xdc,0x41,0xf9,0xf8,0xcb,0x8f,0x78,0xdc,0x9d,0x8e,0x62,0x31,0x78,0x4c,0x6b,0xef,0xec,0x1a,0xd0,0xfb,0xf9,0x9d,0xc1,0x84,0xd7,0xeb,0x68,0x7d,0x8b,0x01,0x7a,0xca,0xc9,0x25,0x40,0x9b,0x0b,0x2b,0xa6,0x93,0x7d,0xe2,0xa2,0x40,0x0e .byte 0x4e,0x1e,0x12,0x5d,0x62,0x0b,0x92,0x72,0x06,0x04,0x7d,0xdf,0x68,0x64,0xf1,0x99,0x88,0x38,0x73,0x23,0xe3,0xf5,0xbf,0x06,0x88,0x65,0x9b,0xc2,0xee,0x66,0xf5,0x6e,0xa3,0x03,0x04,0x5c,0x2e,0x7a,0xac,0x3e,0x31,0x59,0x6c,0x9e,0x3b,0x09,0xb0,0x80,0x7f,0x05,0x6b,0x6a,0xc0,0xc4,0xfb,0x24,0x71,0x49,0xa2,0xdd,0x7c,0x88,0xb9,0x21 .byte 0xcb,0xc0,0x86,0xf0,0x49,0xbd,0x46,0x06,0xbd,0x5d,0xd1,0x4c,0x64,0x9c,0x99,0x33,0x36,0xf3,0x23,0x74,0x85,0x75,0xc2,0xba,0x20,0x5f,0x20,0xbd,0x75,0x4f,0x83,0x28,0xae,0x91,0x68,0xb2,0xf2,0xc3,0x0f,0xd3,0xf8,0xaa,0x3b,0x42,0xfa,0x79,0xfb,0x7d,0x19,0xa5,0xbb,0x51,0xc1,0x91,0x5b,0x38,0xac,0x8c,0xd9,0x0f,0xe3,0x35,0x60,0xff .byte 0x3d,0xa6,0x28,0x43,0x5d,0x7d,0xfe,0xb5,0xae,0xf3,0x47,0xc5,0xfa,0xe4,0x16,0x4b,0xb9,0xd2,0x51,0x39,0x9f,0x44,0xd8,0x50,0x70,0xab,0xe3,0xab,0xa8,0x63,0x31,0xe4,0xd3,0xeb,0x60,0x25,0x1d,0x67,0x8f,0x33,0x34,0xef,0x07,0xd4,0x92,0xce,0xbf,0x33,0xa8,0x3c,0x62,0x9a,0x09,0x22,0x42,0x12,0xba,0x80,0xb1,0x5b,0x98,0xec,0xbd,0x1b .byte 0x84,0x3f,0x52,0x4f,0xc8,0x9f,0x85,0xc9,0x03,0x4e,0x34,0xa9,0x62,0xe6,0x0d,0x81,0x0e,0x01,0x14,0x3b,0x8b,0x3e,0x4f,0xf0,0xca,0xb5,0xbb,0x6d,0x0f,0x2c,0x43,0xb9,0x84,0x03,0x5a,0xee,0x5b,0x63,0xac,0xb9,0x55,0x96,0x3c,0x53,0xc4,0xd5,0xe6,0xe0,0xd4,0x51,0x1e,0x3c,0x86,0x92,0x9f,0x86,0xa4,0x74,0xd7,0x8e,0x6d,0x23,0x71,0xcf .byte 0xaf,0xfe,0xf2,0x39,0x7b,0x41,0x9e,0x7e,0x1f,0x91,0xeb,0x7c,0xd0,0x18,0x67,0x7d,0xaf,0x24,0x87,0x40,0xab,0x0a,0x08,0xcc,0x00,0xee,0x3a,0xdc,0x02,0x70,0x94,0x74,0xdb,0x27,0x72,0xcd,0xff,0xf1,0x03,0xcf,0x00,0xc9,0x9b,0x56,0x3b,0x40,0x65,0xd5,0x80,0x9a,0xa7,0x17,0xb2,0x50,0x79,0x41,0x0d,0xe2,0x22,0x93,0xaf,0x7e,0xab,0x1b .byte 0xa0,0x61,0x27,0x8a,0x67,0xae,0x56,0x96,0xd2,0x0d,0x49,0x02,0xe3,0x6b,0x13,0xe8,0x7d,0x53,0xd3,0x5a,0x19,0x68,0x07,0x1e,0x5c,0xaf,0x5e,0xa2,0x2f,0x14,0xbe,0xbd,0xa5,0x8d,0x90,0xf4,0x7a,0x86,0x06,0x03,0x68,0x82,0xb1,0xd3,0x69,0x7f,0xd1,0x23,0x24,0xf9,0xfa,0xde,0xfa,0x08,0x98,0x0b,0x23,0xf1,0xf7,0xdb,0xe0,0x58,0x6c,0xb7 .byte 0xb1,0x5e,0x98,0xe6,0x15,0xc9,0xaf,0x86,0x64,0x95,0xab,0xb3,0x7e,0x07,0xd1,0x10,0x71,0x21,0xcc,0xef,0x27,0xc1,0x96,0xe5,0xf1,0xa8,0x35,0x57,0x10,0xe3,0xd4,0x1a,0x32,0x56,0x5e,0x1e,0xb3,0xdd,0xa5,0xe9,0x80,0x4d,0x84,0x43,0x04,0xf0,0x71,0xba,0xb6,0x2e,0xf3,0x5c,0x3d,0xbc,0xa9,0x50,0x24,0xc3,0xdf,0x5d,0xb4,0x2c,0x20,0x60 .byte 0x10,0x1a,0x6e,0x44,0x0d,0x2b,0xa4,0x31,0xdc,0xd3,0x5d,0xa6,0x8d,0xde,0x48,0x99,0x0e,0xb4,0xc2,0x4a,0x1b,0x4f,0x45,0x54,0x9c,0x54,0x5b,0xd6,0x63,0xb2,0xb1,0x3a,0xa7,0x2a,0x42,0x70,0xfe,0xd8,0x33,0x1f,0x95,0xfc,0x26,0x82,0xc5,0x78,0x86,0xf5,0x93,0x07,0x31,0x31,0x74,0x5b,0x44,0xa4,0x5a,0xb2,0x8d,0xfc,0x38,0x99,0xde,0xbd .byte 0xcd,0x26,0xe6,0xdf,0xd1,0x26,0x4e,0x9d,0x73,0xe7,0xa0,0x4e,0x31,0x3d,0x3e,0xea,0x4d,0xb9,0xc1,0x37,0xe3,0xba,0x32,0xd9,0xfd,0x3b,0x94,0x12,0xb0,0x84,0xd3,0xd9,0x73,0xe7,0xc3,0xc6,0xc4,0x2c,0xa2,0x21,0xeb,0xe7,0xd9,0xe5,0x53,0xe9,0xe7,0x4c,0x04,0xab,0xc4,0x70,0xd4,0xd4,0x11,0xba,0x18,0xf6,0xb4,0xcb,0xab,0xa0,0x6c,0x3f .byte 0x9c,0x03,0xe8,0x97,0x68,0x22,0xa1,0x55,0xe8,0x3d,0x8d,0x44,0x5f,0x10,0x1e,0x57,0x9c,0xb1,0xca,0xf2,0xc7,0xce,0xea,0xe7,0x45,0x26,0xbc,0xd7,0x30,0x51,0x18,0xd7,0x70,0xa5,0xad,0xe4,0x7f,0x46,0xdd,0x8b,0xd8,0x0e,0x19,0x59,0x22,0xdc,0x89,0xd2,0xc4,0xbc,0x07,0xc1,0xab,0xaf,0x70,0xd5,0x55,0xe9,0x04,0x2c,0x28,0xd7,0x17,0xd7 .byte 0xc1,0x6b,0x79,0x4d,0x7f,0x8c,0x14,0xd9,0x47,0x15,0x21,0xa5,0xac,0x55,0x52,0x3b,0xf5,0x64,0x50,0x0a,0x94,0x4d,0x1a,0x23,0xcf,0x29,0x53,0xaa,0x2d,0xf1,0xc2,0x1b,0x19,0xc6,0x46,0x5a,0xd0,0x9e,0x7a,0x01,0xb5,0xe8,0xc7,0x6f,0xee,0xbd,0x61,0x12,0x0b,0x25,0x13,0x94,0xee,0x35,0xc9,0x68,0xe3,0x6c,0x4c,0xcd,0xd9,0x81,0x63,0x8b .byte 0x57,0x86,0xc7,0xb2,0x8a,0xfc,0xb0,0x19,0x8c,0x64,0x78,0x05,0x29,0xc6,0x00,0x4d,0xdd,0x4f,0x34,0x5e,0xc1,0xb1,0xa0,0x86,0xe3,0x13,0x65,0x5f,0xec,0x54,0xc0,0xe8,0xbb,0x6c,0xec,0x56,0x11,0x38,0x5b,0x7c,0x55,0x35,0x67,0xf1,0xae,0x86,0x93,0x69,0x59,0x7e,0x8c,0x84,0x8e,0x1d,0xdd,0x99,0x19,0x95,0xb0,0xd2,0x42,0xf2,0x0a,0x43 .byte 0xb8,0x82,0x87,0x9e,0x6d,0x83,0x33,0xed,0x9f,0xef,0x10,0x8e,0x17,0x25,0x17,0xe9,0x84,0x56,0x16,0x55,0x28,0x07,0x40,0xf0,0xdc,0xff,0xc7,0x67,0x32,0xb9,0x32,0xe2,0xd5,0x20,0x82,0xee,0xfd,0x37,0xe8,0x54,0x8a,0xf7,0x76,0x42,0x78,0xde,0x53,0x4f,0xd5,0xfe,0x15,0x7a,0xf5,0xa6,0xe8,0x19,0x89,0xab,0x7f,0xc1,0x43,0xed,0xdd,0xa2 .byte 0x53,0xc4,0xb5,0x0a,0x6c,0xa5,0x83,0x9d,0x09,0x55,0xde,0xbe,0xa5,0xc2,0x00,0x93,0x92,0x8e,0x6d,0xbb,0xfc,0x0c,0x80,0x1f,0x7c,0x16,0x77,0xf9,0xb1,0xde,0x82,0x0b,0xf9,0x98,0xbc,0x49,0x68,0x5f,0xcf,0xb0,0xde,0xe3,0xc9,0xa5,0x35,0xa6,0xe3,0x4a,0x61,0xa3,0x34,0x51,0x64,0x64,0x1a,0x05,0x51,0x87,0xfb,0x04,0xe5,0xcb,0x6b,0xa9 .byte 0x04,0x4a,0xfe,0x19,0xcd,0xbd,0xad,0x9c,0x7e,0xe8,0x36,0x54,0x95,0xea,0x78,0x69,0xf5,0x3f,0xc5,0x11,0x42,0xc1,0x36,0xc3,0x72,0xe3,0xaa,0x15,0x30,0x40,0x73,0xae,0xc0,0x0f,0x3e,0xd8,0xe1,0xe6,0xb8,0xc6,0x81,0x79,0x72,0x2d,0xa2,0x1c,0x19,0x8a,0x31,0xcf,0x7a,0xfb,0x3b,0x51,0xee,0x25,0x50,0xea,0x43,0x0f,0xca,0x07,0xbc,0xde .byte 0x3e,0x24,0xb1,0x57,0xb1,0xe2,0xc5,0xe3,0xc9,0x50,0x72,0x82,0xfc,0xf7,0xf6,0xfb,0x8c,0xd3,0x1a,0xa1,0xbb,0x71,0x40,0x71,0xf8,0xdc,0x14,0x8d,0x45,0xca,0x7b,0x5a,0xd7,0xfb,0x84,0x63,0xc3,0x60,0xf0,0xd1,0xca,0xdb,0x63,0xa2,0x74,0x75,0x42,0xaa,0x03,0x2b,0xc4,0xe8,0xc9,0xa8,0x95,0x8c,0x8f,0x06,0x6f,0x58,0x98,0x14,0x54,0xb4 .byte 0x4d,0x2f,0x5e,0x67,0x57,0xbf,0xe5,0xdc,0x8e,0xb8,0x6b,0x8d,0xb6,0x92,0xad,0x45,0x6f,0xda,0xec,0x8c,0xbc,0x30,0xde,0xcf,0x07,0x90,0xef,0xfd,0x6a,0xb6,0x24,0x0a,0xcf,0x53,0x87,0x7d,0xf1,0x7a,0x75,0x6e,0x5b,0x35,0xc6,0x70,0x24,0x8f,0xac,0xcd,0x78,0xe3,0x2b,0xd8,0x6c,0x35,0x55,0x0e,0xb7,0xb6,0xe1,0x3a,0x1c,0x96,0x4d,0x11 .byte 0x91,0x5c,0x40,0x87,0x02,0x91,0x12,0x6c,0x01,0x26,0x01,0xa7,0x9e,0x75,0xb7,0x22,0x31,0x81,0xa2,0x1e,0x6f,0xa1,0xd4,0x24,0x55,0xc9,0xc6,0x21,0xbc,0x94,0xe1,0xdd,0x6b,0xcf,0x27,0xfc,0xb0,0xd6,0xbd,0xa5,0x8d,0x7c,0xeb,0x04,0xcd,0x36,0x2b,0x09,0x6f,0x40,0x99,0x91,0x7b,0x30,0x4c,0x2b,0x84,0x62,0xeb,0xaf,0x0a,0x38,0xee,0x5d .byte 0xeb,0xb8,0xe9,0xbf,0x24,0xc7,0x2f,0xde,0x4d,0x6f,0xaa,0x69,0xf6,0xae,0x01,0xb6,0x93,0x88,0x96,0xc4,0xaa,0x5b,0x80,0xfb,0xf1,0x08,0x93,0xbe,0x99,0x26,0x8b,0x27,0x56,0xd1,0x81,0x66,0x90,0x04,0x9f,0x09,0xda,0x93,0x22,0x65,0x98,0x4f,0x89,0x3b,0x2e,0xe1,0xbc,0x05,0x38,0xfe,0xb6,0xed,0xdd,0x48,0xa7,0x12,0x07,0x55,0x0c,0x1f .byte 0xd1,0x45,0x03,0x06,0x72,0x2a,0xa6,0xb3,0x56,0x66,0x8b,0x4e,0x7d,0x72,0xe4,0x35,0xcf,0x83,0x12,0x99,0xe0,0x28,0x69,0xc5,0x1e,0x58,0xc0,0x94,0x58,0xa5,0xae,0x6e,0xfe,0x9e,0x05,0xca,0xae,0xfa,0x91,0x48,0x86,0x93,0x46,0x2f,0xe4,0x7c,0xac,0x16,0xb5,0xd2,0xbe,0xd9,0xf8,0x96,0x3b,0x57,0xfc,0x0b,0xd2,0x5c,0x50,0x0a,0xb2,0xcd .byte 0xc9,0xcf,0x0c,0xca,0x9a,0x84,0xf2,0x2a,0xa8,0xe1,0x3d,0xab,0xc8,0x36,0x8f,0x8a,0x81,0x9b,0x52,0xd5,0x3b,0x1c,0x64,0xf2,0x74,0xc5,0x31,0x39,0xe1,0x84,0x7a,0xd0,0xd2,0xbe,0xb8,0x04,0x53,0x03,0x18,0xe6,0xa8,0x17,0x62,0xb5,0x8d,0x54,0xfc,0xd8,0x55,0x68,0x4a,0x8f,0x8e,0xf0,0x8b,0x17,0xce,0x83,0x8a,0xf4,0xb7,0x93,0xc9,0x95 .byte 0xdd,0xdf,0x7b,0x78,0x5f,0x6b,0x32,0x5e,0xcd,0xbd,0x44,0x8a,0x1f,0xfc,0x97,0xff,0x15,0xca,0x6b,0x2a,0x84,0x89,0x4c,0x6e,0x8a,0x45,0x53,0x81,0xc3,0x51,0x61,0x7e,0xb8,0x57,0xb7,0x2a,0x5d,0xc1,0xe6,0x2f,0x5e,0x7b,0xb5,0xc2,0x15,0x25,0xa3,0xe4,0x3a,0x85,0x59,0x43,0x4e,0x38,0x0b,0xeb,0x4d,0x61,0x62,0xd2,0xe8,0x06,0x54,0x45 .byte 0xeb,0x43,0xe7,0x22,0x61,0x27,0x85,0xdf,0x8c,0x19,0xd6,0xb8,0x52,0xa1,0xd4,0x34,0x52,0x3e,0xa5,0xf8,0x6c,0x3c,0xc3,0x53,0xec,0x77,0x80,0x53,0x1a,0xea,0x3b,0x00,0xfa,0xac,0x4c,0xfb,0x03,0xf0,0x03,0xcc,0x4d,0xfd,0x02,0x96,0x68,0x9e,0xab,0x8e,0xb0,0x9f,0x9f,0x0b,0x3d,0x27,0x21,0xd5,0x5a,0x5f,0x40,0x14,0xf2,0x21,0x2f,0x9d .byte 0x1d,0x4b,0x48,0xec,0x59,0x68,0x9b,0x26,0xc6,0xab,0x10,0xd6,0xf6,0x83,0x5d,0x0d,0xf4,0x91,0xb4,0x3b,0x83,0xce,0xbf,0x84,0x4c,0xc1,0x0c,0x75,0x45,0x32,0xec,0xb8,0x82,0x17,0xc7,0x43,0x18,0x78,0x16,0x98,0x0b,0xdb,0xfa,0x3d,0x83,0x2a,0xa8,0x2e,0xad,0x9d,0x39,0x63,0xbf,0xc0,0xbb,0xc6,0x4c,0x81,0x60,0xe6,0x58,0xbe,0xc0,0x85 .byte 0x77,0x68,0xb5,0xfe,0xd8,0x0d,0xd8,0xc2,0x92,0x49,0x76,0x74,0x91,0x62,0x1c,0x20,0xc1,0x93,0x3c,0x4b,0xdb,0x9e,0x5a,0x97,0x6b,0xc8,0xb6,0x4f,0x3f,0x3c,0x2a,0xe8,0xeb,0x0b,0x1f,0x05,0x04,0xb4,0xbf,0xac,0x2a,0xc5,0x04,0xf2,0xda,0xfb,0xba,0x08,0x9e,0xf6,0x78,0xd9,0xb1,0xde,0xce,0xfa,0x7d,0x8e,0x22,0x83,0x23,0x5b,0x2a,0x35 .byte 0x62,0x2f,0x15,0x6f,0x4a,0x44,0x06,0x11,0xde,0xd4,0xea,0xb4,0x05,0xd0,0xd4,0x7f,0x3a,0x20,0x6e,0x01,0xa6,0x79,0xd6,0x67,0x19,0xec,0x76,0xfd,0xaa,0x00,0x28,0x6b,0xf3,0xef,0xdd,0xef,0xec,0xf4,0x99,0xc2,0x25,0xf8,0x3c,0x18,0xcf,0x65,0xf0,0xd3,0x30,0xd3,0xeb,0xc7,0x4c,0xa1,0x3e,0x3d,0xa4,0xe7,0x20,0x78,0xe0,0xbe,0x9f,0x48 .byte 0xbb,0x51,0x30,0x62,0x16,0xe9,0x3a,0x4d,0x5c,0x6e,0xa5,0x4f,0xa8,0x77,0x92,0xd7,0x87,0x4e,0xf9,0xb9,0x43,0xeb,0x4e,0xd2,0x2f,0xc0,0x29,0x22,0xfe,0x37,0xc4,0x58,0x36,0x71,0x1c,0x18,0x05,0x44,0xd2,0x24,0x01,0x25,0x65,0x1b,0xc7,0xfd,0xd4,0xef,0x15,0xeb,0x91,0x06,0x26,0x74,0x2e,0x28,0xb2,0x46,0xb5,0xb5,0xaf,0xeb,0xaa,0x9a .byte 0xc8,0x9a,0xd0,0x34,0xb9,0xf4,0xce,0x6e,0x7a,0xca,0x63,0xf0,0x46,0xad,0xfb,0x53,0xa8,0x2b,0xc4,0x2f,0xed,0x7c,0xab,0x63,0x1c,0xb6,0xfe,0xb7,0x53,0x53,0x3f,0x5a,0x5f,0x45,0xd9,0x50,0x79,0x43,0xa3,0x56,0x0a,0x9e,0x6e,0x22,0xf5,0x85,0x6f,0xe9,0x81,0x94,0xa6,0xc5,0x0d,0x8b,0xef,0x3e,0x0f,0x68,0xbf,0x20,0x86,0x0d,0xd8,0x32 .byte 0xde,0xab,0xf0,0x0b,0x96,0xce,0xc2,0xad,0x8d,0xe1,0x3b,0x37,0xd1,0x06,0xec,0x38,0xec,0x42,0x06,0x3a,0xb1,0xc6,0xb8,0xc0,0xc5,0xea,0x8f,0xcb,0x5f,0xf0,0x15,0x1f,0x77,0x37,0x46,0x10,0xfb,0xc3,0x55,0x7d,0x53,0x41,0xb9,0xb6,0x31,0xe6,0xab,0x0d,0xeb,0x45,0xfe,0x45,0x65,0x46,0xa9,0xbc,0xd9,0xcd,0x3f,0x26,0xce,0x32,0xd2,0x0d .byte 0x7b,0x8f,0xfd,0x6f,0x70,0x33,0x98,0xab,0x3e,0xdb,0x16,0x24,0x63,0x96,0x55,0x04,0x3e,0xb1,0x06,0x1b,0xf3,0xca,0x9e,0xb2,0x47,0x42,0x51,0x5c,0xdc,0xff,0x40,0x72,0x45,0x09,0xdf,0xeb,0x50,0x57,0xf5,0xcb,0xe8,0xb6,0x0c,0xe3,0x13,0xb1,0xdf,0x0e,0x40,0x90,0x6d,0x51,0xee,0xc7,0x0e,0x6e,0xa7,0x67,0xcd,0x59,0xef,0x09,0x3c,0x9c .byte 0x81,0x66,0xf7,0xfb,0x4a,0x14,0x08,0x14,0xc4,0x72,0x79,0x55,0xaa,0x99,0xa5,0xe1,0xfe,0x12,0xf7,0x07,0x05,0x27,0xc7,0xf8,0x18,0xaa,0xf8,0x20,0xac,0xc7,0x23,0x28,0x58,0x38,0xc4,0x1d,0x88,0x8d,0x5a,0x33,0xa1,0x04,0xaa,0xb4,0x7e,0x9c,0xe5,0x60,0x25,0xb1,0xa4,0x75,0x61,0xba,0xa7,0xf5,0x9e,0x2a,0xc4,0x26,0x28,0x7f,0xb0,0x56 .byte 0xaa,0x0a,0x6a,0xd8,0xab,0xfb,0x7a,0x30,0x3c,0x26,0xa9,0x38,0x21,0x9d,0x7d,0x3c,0xef,0x81,0xbf,0x50,0x5c,0x7e,0x1e,0x4a,0xa6,0xec,0x16,0x6b,0xac,0x74,0xf8,0xdb,0x8b,0x1b,0xa6,0xd8,0x48,0xc9,0x25,0x3e,0xa0,0x7b,0x39,0x52,0x17,0x17,0xc2,0xf3,0xc6,0xfa,0xcb,0x4d,0xdf,0xdc,0xf9,0x37,0x00,0x08,0xb6,0x5f,0x12,0x81,0xed,0x6e .byte 0xc5,0x22,0xb3,0xcd,0x57,0x81,0xf7,0x72,0x32,0x9a,0x1c,0x5b,0x96,0xd5,0xb2,0x65,0x6a,0xbc,0x8a,0x6d,0xa4,0xe0,0x54,0x65,0x7e,0x82,0xce,0xa3,0xd9,0x59,0xb8,0x46,0xff,0x18,0x83,0xb0,0x40,0x17,0x84,0x39,0xea,0x32,0xaa,0x52,0xd7,0xb9,0xc1,0x92,0xe5,0xaf,0x42,0x7d,0xde,0xc7,0x71,0xa2,0x0e,0x02,0x04,0x7c,0x92,0x91,0x6e,0xbb .byte 0x91,0xc7,0x38,0x36,0xe6,0xef,0x2f,0x87,0x73,0xe8,0xce,0x04,0x58,0xe4,0xc7,0x0f,0xfb,0x69,0x77,0xf6,0x01,0x41,0x13,0x1d,0xc9,0x59,0x7a,0xf3,0xc2,0x20,0xf7,0xd8,0xfd,0xd9,0xe7,0xd1,0x14,0xe1,0xf1,0x1a,0x35,0x1f,0x8e,0x3f,0x78,0x1e,0xe2,0x01,0x92,0x07,0x3f,0xf4,0x73,0x4f,0x36,0x48,0xb3,0x4c,0x51,0xbe,0xea,0x24,0x20,0x7d .byte 0xaa,0x54,0xe0,0xea,0xf7,0xde,0xaa,0x43,0xa1,0x22,0x85,0xd4,0xf7,0x50,0x47,0x68,0xe9,0x92,0x41,0x84,0xe4,0xa9,0x1f,0x96,0x43,0xb5,0x3b,0x8b,0x23,0xdd,0x2f,0xd1,0xcc,0x5e,0xcb,0xf5,0x77,0xd8,0xc9,0xc0,0xfe,0x1e,0x6c,0xac,0xb3,0x6f,0xc1,0x6c,0x5a,0x33,0x35,0x7b,0x09,0xe7,0x4b,0x2e,0xbf,0x9f,0xb1,0x68,0x56,0xb5,0x17,0x2d .byte 0x77,0xc6,0x76,0xbc,0x47,0xf4,0x41,0x3f,0x35,0xb3,0x41,0xff,0xb8,0xc6,0xe2,0x1e,0xfc,0x2f,0x3f,0x26,0x30,0x10,0xb9,0x37,0x8e,0xa9,0x59,0xff,0x7f,0x74,0x3d,0x99,0x0c,0x65,0x62,0xa4,0xc9,0xed,0xaf,0x72,0xb4,0x7a,0x17,0xab,0xbb,0x33,0xda,0x24,0xde,0x97,0xfb,0xa8,0x9d,0x10,0x6c,0x1e,0x9a,0x13,0xec,0x7e,0xb8,0xa5,0xe6,0x0d .byte 0x92,0x96,0xbe,0x91,0x8c,0x69,0x07,0x78,0xe0,0x02,0x7e,0x97,0x61,0x2f,0xf8,0x0f,0x17,0x3d,0x7d,0x09,0x13,0xb9,0x1c,0xcf,0xd0,0x9e,0x85,0x35,0x3c,0xa3,0x06,0x82,0xb2,0xb2,0x1c,0x09,0xe3,0x91,0x43,0x13,0xff,0x9d,0xa7,0x05,0xd7,0x69,0x4a,0xe1,0xa7,0x1a,0xaa,0x57,0x1f,0xcf,0xcb,0x43,0xac,0x40,0x34,0xd2,0xb8,0xff,0xf8,0x0f .byte 0x82,0xf7,0xa8,0x9d,0x5f,0x5f,0xb9,0xf9,0x78,0x89,0xe4,0x65,0xa8,0x54,0x5f,0x47,0xb4,0x53,0xe4,0x73,0x2a,0x29,0xe0,0xa0,0x70,0x79,0x22,0x51,0x3a,0x5a,0xc6,0x42,0x8c,0x74,0xdc,0xf7,0x85,0xce,0x1f,0x2a,0x1b,0x4d,0x83,0xcb,0xd2,0xce,0x5a,0x4f,0xde,0x18,0x48,0x64,0x4c,0xe8,0x17,0xb2,0x55,0xfe,0x6c,0x5f,0x31,0xa7,0x03,0x4a .byte 0xae,0x8f,0x40,0x47,0x7e,0x92,0xa2,0x19,0x7c,0x53,0x32,0xaa,0x8c,0xc2,0x06,0x79,0xc3,0xc7,0x45,0x02,0x77,0x23,0x12,0x37,0x2b,0x8e,0x84,0xf5,0x8b,0x1a,0x4c,0xd3,0x10,0x0e,0xba,0x33,0x8f,0x2e,0x02,0x21,0x63,0xa8,0x3f,0x02,0x6e,0x42,0x49,0x0a,0x5a,0xf4,0xf0,0xe8,0xed,0x53,0x1f,0x99,0x73,0x65,0x88,0xe3,0xfc,0x60,0x34,0x4e .byte 0x91,0xa5,0x0c,0xbe,0x1d,0xbb,0x95,0x57,0xff,0x7a,0xa1,0xec,0x34,0xe7,0xb6,0x63,0x8d,0xb2,0x3a,0x01,0xa3,0x31,0x50,0xaa,0x8a,0xef,0x97,0x9d,0xe5,0xd7,0xf9,0x8e,0xc1,0x5d,0xcb,0xd3,0x8d,0xc1,0x3e,0x05,0x95,0xfc,0x63,0x14,0xe4,0x44,0x58,0xee,0x3d,0x30,0x04,0x80,0x0c,0x63,0x1d,0x14,0xd2,0xc3,0xc1,0xe1,0x67,0x51,0x64,0x8a .byte 0x23,0xaf,0x31,0x05,0x46,0x4f,0xf7,0x88,0x80,0xcb,0xba,0x47,0x31,0x40,0x3f,0xa0,0xfb,0xe7,0x8e,0x34,0xc1,0xe4,0x69,0xbd,0xb1,0x07,0x2b,0x55,0x27,0x0d,0x04,0xe8,0x74,0x93,0x04,0x15,0x62,0x1f,0x9a,0x66,0xe9,0x8d,0xa1,0xd6,0xc1,0x50,0xd8,0x8e,0x6a,0xe3,0x7c,0x9a,0xb7,0xa0,0x6f,0xf6,0xee,0x2e,0x03,0x67,0x1c,0x06,0x08,0x92 .byte 0x83,0xf5,0x4f,0xa1,0xf7,0x23,0x01,0x1a,0xf8,0xda,0x80,0xca,0xce,0x2a,0x01,0x59,0xee,0xeb,0xbe,0xc4,0x95,0xf2,0xfd,0x7e,0x15,0xb6,0xbe,0x69,0x6b,0x4b,0x33,0x5b,0x83,0x89,0x1a,0x29,0xac,0x23,0x31,0x29,0xd8,0x29,0xea,0x87,0xf3,0x12,0x40,0x4b,0xcc,0xb6,0x07,0x0d,0xbf,0xf4,0x72,0x52,0x74,0x95,0xc9,0x15,0x0a,0x09,0x93,0xdf .byte 0xd6,0x7e,0x4a,0x3c,0xd0,0xf6,0xfc,0xcf,0x75,0x7e,0x65,0x4e,0x5a,0x49,0x72,0xbd,0x46,0xbe,0x5e,0x26,0xc5,0x09,0xdb,0xea,0x5c,0x44,0xcc,0xaf,0x92,0x54,0x58,0x6b,0x5f,0xa8,0xf3,0xe6,0xed,0xb0,0x41,0x1c,0xb1,0x9b,0x1d,0x8b,0x3a,0x27,0x31,0x50,0xf0,0x76,0xaf,0xbf,0xd7,0x40,0x4f,0x23,0x59,0xcb,0x4e,0xa9,0x12,0xd9,0x16,0x5e .byte 0x8d,0x70,0xb0,0x36,0xd7,0xf6,0xde,0xa0,0x62,0x4b,0x8b,0xea,0xf1,0x7c,0x82,0x05,0x80,0x17,0x8d,0x14,0xf3,0xb4,0x9a,0x42,0xa1,0xa2,0x64,0x28,0xf8,0x38,0x0e,0x8e,0xb6,0x0e,0xb9,0x6e,0xfa,0x77,0xf3,0xec,0x28,0x6f,0x56,0x93,0x13,0x1c,0x5e,0x01,0x31,0x8d,0x65,0x46,0xc9,0xff,0x46,0x5e,0xc3,0xbf,0x75,0x45,0x19,0xb4,0x8e,0x8e .byte 0xf1,0x90,0xda,0x83,0x57,0x6c,0x30,0x49,0xf2,0x67,0x64,0x0a,0xf5,0xb5,0x51,0xac,0x91,0xa0,0x5a,0x9f,0x19,0xbd,0x02,0xb2,0x0d,0x5d,0x1f,0xbe,0xc2,0x76,0xf1,0xcb,0x59,0xf8,0xd1,0x90,0x67,0x17,0xda,0xd1,0xd8,0x9f,0x33,0x00,0x61,0x5d,0xd7,0x90,0xd6,0xd6,0xcd,0x16,0xf7,0x35,0xef,0xcb,0x2f,0xbb,0xc0,0x9e,0x2a,0xc8,0xf6,0x03 .byte 0x7a,0x1d,0x4c,0xac,0xde,0xf1,0x25,0x9a,0x3e,0xb1,0xae,0xbb,0x59,0xab,0xe7,0x81,0xa5,0x3f,0x42,0x07,0x4f,0x66,0x8f,0x7c,0x93,0xf6,0xab,0x44,0x2e,0x9a,0x68,0x95,0x16,0xc8,0x59,0x5b,0x0e,0x00,0xdc,0xc8,0x2a,0x97,0x20,0xca,0xdf,0xb1,0x6c,0x1f,0x64,0xe4,0xed,0xd3,0xae,0xea,0x47,0x2a,0xfd,0x52,0x30,0x13,0x05,0xe6,0xc7,0xc6 .byte 0xca,0xde,0xec,0xe3,0xe2,0x58,0x99,0xbf,0xaa,0xff,0x64,0xfc,0xda,0x55,0x3c,0x29,0x00,0xc6,0x60,0xde,0x33,0xbe,0xec,0xe0,0x14,0x2c,0xb6,0x30,0x9f,0xec,0x46,0x11,0x9a,0x36,0x64,0xab,0x2c,0xcb,0x39,0xe9,0x87,0x6a,0x73,0xe4,0xe8,0x6b,0x81,0x1b,0x61,0xc1,0x1a,0xbe,0x1e,0x66,0x76,0x6b,0xaf,0xab,0xb0,0xaf,0x59,0xa9,0xb9,0x54 .byte 0x84,0xe0,0xca,0x10,0x5e,0xe1,0xc1,0x9d,0xed,0x23,0x5b,0xeb,0xa6,0x9f,0x7a,0x0c,0x94,0x97,0x21,0xf4,0xee,0xec,0x69,0x47,0x05,0xfc,0x21,0xbf,0x79,0x47,0x63,0x4e,0x78,0x99,0x07,0xf0,0x53,0xbc,0x3a,0xc3,0xcd,0x36,0xdf,0x33,0x7b,0xa0,0x91,0x39,0xdd,0x7f,0x49,0xaa,0xde,0xdd,0xa2,0x93,0x8f,0x36,0xca,0xaa,0xad,0xd2,0x3d,0xd1 .byte 0x1a,0xdb,0x7e,0x97,0xce,0xe7,0xb3,0xda,0x3e,0x25,0x0d,0xc7,0x0d,0xdb,0x54,0x93,0x20,0xf1,0x10,0xdd,0xb5,0xc9,0x75,0x67,0x61,0xa3,0x24,0x41,0x42,0xb9,0x67,0x03,0x0c,0x52,0xe4,0xf1,0x68,0x07,0x90,0x7a,0xf9,0xe9,0x33,0x19,0x0e,0x11,0xb3,0xda,0xe8,0x5a,0x84,0xf3,0x41,0x77,0x43,0x6c,0xea,0x98,0x23,0xd8,0xae,0xf6,0xdd,0x5a .byte 0xc7,0x4f,0xf4,0x06,0x80,0xd9,0x84,0x90,0x27,0xf5,0x0e,0x85,0x44,0xa8,0x2f,0x03,0x02,0xca,0xa6,0x8f,0x44,0x7a,0x3c,0xb8,0x2f,0x32,0xab,0x9d,0xd7,0xde,0xee,0x1c,0x33,0x91,0x95,0x96,0x66,0xb2,0x03,0xb3,0x95,0x8d,0x45,0x41,0xd3,0xb9,0x19,0xf1,0x93,0xc7,0xe8,0xce,0x16,0x8b,0x69,0xe0,0xdb,0x6b,0x2d,0x44,0xe3,0xff,0x92,0x8f .byte 0x16,0x97,0x3e,0xc1,0x4d,0xc3,0x0b,0x5a,0xff,0x6e,0xe2,0x83,0x91,0x13,0xe5,0xc2,0xac,0x4a,0x97,0x81,0xd0,0x37,0x83,0x10,0x78,0xce,0xd9,0xed,0xe7,0x7f,0x74,0x23,0x22,0x42,0x72,0x12,0x50,0xf2,0xef,0x04,0xf5,0xf1,0x86,0xdd,0x7d,0x5c,0xea,0x81,0x7c,0xfb,0x66,0x2b,0x7e,0xfa,0x84,0xa7,0x4c,0x42,0x08,0x2d,0xa4,0x92,0xc5,0x21 .byte 0xf3,0x1d,0x22,0x76,0x09,0x3f,0xba,0x1a,0x3d,0xaf,0x3d,0xae,0x33,0x8f,0xd7,0x52,0x18,0x7c,0x9e,0xcf,0x39,0xb1,0x84,0x0b,0xc6,0x26,0xc0,0x5b,0x6e,0xd2,0xae,0x6b,0xa4,0xe9,0x6f,0x74,0x51,0x47,0x17,0x1b,0x6e,0xdf,0xd0,0x6c,0xce,0x46,0x3f,0xda,0x9d,0xda,0xa3,0xdd,0x50,0x0d,0x94,0xa2,0x82,0x16,0x6b,0x1d,0x9e,0x39,0x69,0x96 .byte 0x40,0x42,0x87,0xba,0xb6,0xae,0xe5,0x0c,0xee,0x9f,0xf5,0x8a,0x66,0x94,0x68,0x40,0xd3,0x76,0xea,0x27,0x5f,0xf8,0xe2,0x6e,0xb6,0xb2,0xf2,0xb6,0x46,0x9c,0xef,0x18,0xb4,0xd9,0x7f,0xa8,0x86,0xae,0xb1,0xd3,0xe9,0xc5,0xa9,0x18,0x36,0xdf,0x26,0x19,0x5e,0xa6,0x29,0x3a,0xc0,0x4c,0x1b,0x58,0x2d,0xc1,0x33,0xc7,0x06,0x4f,0x14,0x42 .byte 0x17,0x2c,0x62,0x81,0x7e,0x76,0xd6,0xfc,0xa4,0x8e,0xeb,0x56,0x8f,0xac,0x57,0xa1,0x73,0xb2,0x53,0x18,0xa8,0x06,0x9a,0x20,0x33,0x8a,0xe8,0x40,0x68,0x45,0x31,0xc3,0xb8,0xc0,0xd8,0xf4,0x2e,0x11,0xd3,0xf3,0x7d,0xc7,0x45,0x2f,0x58,0xb7,0xce,0x52,0x9d,0x87,0x1a,0x45,0x1e,0x0b,0x17,0x55,0xb7,0x74,0xec,0x2c,0xb4,0xac,0x83,0xc9 .byte 0xff,0x77,0xbd,0x39,0x99,0xce,0x12,0x44,0x80,0x84,0xcd,0x56,0x23,0x24,0x8a,0x77,0x45,0xd9,0x7c,0xdb,0x23,0xa4,0x72,0xd0,0xbf,0x4d,0x5e,0x37,0x21,0xe3,0xd4,0x48,0x2b,0xb9,0x73,0x49,0x82,0xa1,0x54,0x61,0x5d,0x8b,0xae,0x14,0x89,0x20,0x62,0x43,0x6d,0x16,0x34,0x9a,0x0e,0x73,0xf0,0x29,0x3c,0xa2,0xcb,0x66,0x15,0xcc,0xb4,0x49 .byte 0xde,0x22,0x93,0xde,0xce,0x84,0x9c,0x19,0xda,0x16,0x62,0x62,0xca,0xae,0x71,0xde,0x36,0x7d,0x3f,0x9f,0x9a,0x51,0x2b,0x18,0x91,0xa3,0xf9,0x47,0x7f,0x8f,0x45,0x9a,0x12,0xe0,0xdb,0x20,0xa5,0x44,0x52,0x99,0x36,0xac,0xe9,0x1c,0x61,0x5e,0xd6,0x51,0xc1,0xbb,0x2b,0x75,0xd6,0x28,0xab,0x22,0x11,0x40,0x24,0x77,0x56,0x8d,0x62,0x8c .byte 0x41,0x17,0x06,0x4d,0x2f,0x8b,0x0d,0x6c,0x44,0x00,0x62,0xee,0xfd,0x4b,0x61,0xb3,0xe6,0x40,0xa3,0x54,0x51,0x67,0x26,0x18,0x06,0x4f,0xd4,0x4b,0x73,0xbf,0xee,0x53,0x50,0x7a,0x6e,0xc2,0x42,0x7f,0x78,0x34,0xd6,0xcb,0xdf,0x49,0xe0,0x8e,0xef,0xd6,0x3c,0x19,0x77,0x8a,0xcd,0x48,0xdf,0x71,0x07,0x0e,0xf0,0xe8,0x09,0x91,0xe7,0xaf .byte 0x2f,0xf7,0x17,0xb5,0x9e,0x3f,0xe1,0x37,0xbf,0xb1,0xa2,0x89,0xd2,0x08,0x9d,0x67,0xb2,0x1e,0xe6,0x18,0xc0,0xfc,0x91,0xdc,0x79,0x32,0x13,0x32,0xf4,0x07,0x1b,0xf9,0x7e,0x2c,0xa5,0xf8,0xbe,0x57,0xce,0xfd,0x84,0xdc,0x85,0x6c,0x42,0x32,0x20,0x6a,0x91,0xbd,0xba,0xf9,0x83,0x0a,0x53,0x0a,0x3e,0x58,0x36,0x80,0x1f,0xde,0x8b,0xee .byte 0x95,0x2a,0x74,0xbb,0x6e,0x06,0x28,0x40,0xb3,0x3d,0xf5,0x1c,0x65,0x0d,0xf7,0xcc,0x5e,0x1a,0x01,0xfe,0xb2,0x39,0x92,0x49,0x32,0xad,0x5a,0x9a,0xbb,0x06,0x48,0x7b,0xb0,0x4f,0x16,0x10,0xf7,0x46,0x98,0xe5,0xe7,0xdc,0xf8,0x3c,0x3d,0xa6,0x96,0x4f,0x25,0x2e,0xa7,0x99,0x5a,0xe9,0x17,0x35,0x48,0x56,0x48,0x5d,0xea,0x3c,0x4f,0x9a .byte 0x7a,0x0c,0x28,0xaf,0x64,0x56,0xb0,0x4a,0x34,0xa1,0xfc,0xef,0xb8,0x50,0xe5,0x71,0x3f,0x8d,0xda,0x3c,0x75,0xb8,0x22,0x8a,0x89,0x36,0xd5,0xea,0x2f,0xfd,0xfb,0xf3,0x94,0xf2,0xed,0xbc,0xde,0xee,0x6d,0xc0,0x65,0x47,0x8a,0x11,0x52,0xaf,0xf4,0xf0,0x89,0x4d,0x68,0xa5,0x90,0x6d,0x30,0x46,0x0d,0xc6,0x38,0x19,0xe2,0x2a,0x62,0xe9 .byte 0xb3,0x68,0x9a,0x26,0x4b,0x01,0x83,0xbb,0x9d,0x6c,0x23,0x38,0xee,0xe1,0x72,0x60,0xb5,0x30,0xda,0x27,0xd6,0x12,0xe0,0xe4,0x65,0x01,0xc5,0x4b,0xc6,0xbf,0xee,0xe9,0x47,0xf4,0xa7,0x64,0xec,0x61,0x34,0xa9,0xda,0x16,0xa0,0xcc,0x0d,0xdc,0xa4,0xe8,0x8f,0xdc,0xcb,0x4e,0xe7,0xc9,0x7f,0x29,0xc4,0x89,0xbb,0xc2,0x83,0xc8,0x3e,0x28 .byte 0x02,0x73,0x7e,0x63,0x9c,0x88,0xc6,0x35,0x51,0x54,0x17,0xed,0x81,0xbb,0x3a,0x29,0x07,0xe4,0xa6,0xa3,0x28,0x28,0x65,0x40,0x9d,0x86,0xad,0x02,0x7e,0x8b,0x26,0x54,0x32,0x79,0x38,0x24,0xef,0x4a,0xfc,0xaf,0xc0,0x6b,0xd2,0x11,0x86,0x40,0x54,0xe8,0x56,0x9c,0xd8,0xc4,0xab,0xab,0x86,0xd4,0x2d,0xef,0x58,0x22,0x10,0xe0,0xb3,0x89 .byte 0xb7,0x44,0x35,0x5f,0x7f,0x6f,0xd3,0x11,0x66,0x75,0xd5,0x45,0x95,0x93,0x8c,0x05,0x32,0x97,0xad,0x92,0xe3,0xef,0x03,0xb0,0xae,0x28,0x00,0xca,0xac,0x4b,0x36,0xa5,0xa5,0x4a,0x70,0x69,0xe6,0xeb,0x61,0xfc,0xb8,0xc8,0xca,0x88,0x13,0x50,0x14,0xf6,0x5a,0x86,0x41,0x1d,0x84,0xd4,0x59,0x8c,0xae,0xbc,0x68,0xc0,0x33,0x4b,0x13,0x28 .byte 0x89,0xb2,0x63,0x2d,0x85,0xc8,0x33,0x15,0x2e,0x9f,0xeb,0x3b,0xf8,0x26,0xd2,0x79,0x42,0xa9,0x70,0xb7,0x52,0x00,0xdf,0x1a,0x36,0xae,0x85,0x3b,0xf5,0x73,0x80,0xc1,0x7c,0xb4,0x7e,0xbf,0x6b,0xde,0xa1,0xc2,0x9f,0x85,0x86,0x3f,0xff,0x55,0x2d,0x4a,0x6f,0x2d,0x25,0x3c,0x01,0x54,0x92,0x3f,0x63,0x68,0x61,0x4a,0x8c,0xcf,0x34,0xd7 .byte 0x3b,0xcc,0x5e,0x6f,0x80,0x38,0x2f,0xda,0xb3,0x70,0x60,0x35,0x8e,0x3d,0x92,0x4f,0xc8,0xaf,0x4e,0xcd,0x69,0xa8,0x0e,0x62,0xb7,0xbe,0x9b,0xa8,0x09,0x67,0x68,0x08,0xf0,0x39,0x00,0x5e,0x04,0x11,0x64,0x21,0x75,0xf4,0x2a,0xdd,0x3a,0x81,0x95,0xe1,0xa2,0x26,0x4e,0xc2,0x17,0x7e,0xe3,0x27,0x8b,0x80,0x01,0xdf,0xe6,0xfd,0x8e,0x24 .byte 0xe6,0x0c,0xa4,0xdb,0x1e,0x8d,0x03,0x63,0x5a,0xa1,0x00,0x6b,0xcc,0x34,0x75,0x63,0x84,0x91,0x9d,0x4f,0x4f,0xfb,0xbb,0xa3,0x06,0x4c,0xad,0x32,0x62,0x34,0x3c,0x74,0x4a,0x19,0x2c,0x87,0x65,0xb6,0xbb,0x84,0x8f,0x06,0x4d,0x80,0x4e,0x54,0xc5,0xd6,0xe1,0xb3,0x5f,0xf7,0xa1,0xb7,0xb8,0x09,0x7d,0x72,0x36,0x9d,0x14,0x26,0x05,0x6e .byte 0x9a,0x0f,0xfd,0x8a,0x81,0x83,0xa2,0x94,0xf9,0xee,0x5d,0xfe,0x08,0xd7,0xcc,0x8e,0x47,0x7c,0x07,0xbf,0xfe,0x14,0xf9,0x39,0x89,0x47,0x85,0x23,0xab,0x58,0x46,0x06,0x8b,0x81,0x37,0xe7,0x80,0x8c,0x72,0x51,0x3f,0x78,0xa5,0x88,0x41,0x4a,0x20,0x27,0x6d,0xd0,0x41,0xa2,0xb5,0xb1,0x78,0x48,0x39,0x8c,0x77,0xd8,0x77,0x94,0xd1,0x3d .byte 0xa5,0x4f,0x14,0x5e,0x10,0x70,0xba,0x26,0x34,0x4e,0x4d,0xe1,0xee,0xe8,0x3b,0x0b,0xe5,0x58,0x7a,0x00,0x94,0x62,0x24,0xff,0x05,0x14,0xff,0xe4,0xa5,0x9c,0xe3,0x0e,0x4f,0xbf,0x7e,0xcc,0x60,0x74,0x8d,0xfa,0x44,0xaa,0xd9,0x66,0x79,0x24,0x6d,0x18,0x5b,0xcf,0xd3,0xa7,0x2f,0xd6,0x20,0xe4,0x5d,0xed,0x1f,0xe6,0xad,0x59,0xe4,0xa7 .byte 0x44,0xb9,0x8e,0x4e,0xa2,0x41,0x73,0xb6,0x38,0x6b,0x7f,0x4e,0x15,0x0a,0x41,0x3c,0x57,0xa3,0x21,0xe2,0xbf,0x19,0xf9,0x43,0x61,0x11,0x7c,0xa9,0xdb,0x25,0xce,0x10,0x74,0x6f,0x35,0xfb,0xfc,0x9b,0x0e,0x2c,0xb7,0x42,0x25,0x97,0x07,0xb5,0xba,0x51,0xbc,0xc7,0x6e,0xa0,0x60,0x65,0x8d,0xcb,0x4a,0x94,0xbe,0x99,0x28,0x7b,0x9e,0x7a .byte 0x0e,0x57,0xa2,0x74,0x68,0x76,0x75,0x7c,0x28,0xb5,0x1f,0xf4,0x5a,0x2f,0x00,0xae,0xbe,0xe8,0xc6,0xf6,0x9e,0x16,0x96,0x06,0xed,0xea,0x73,0xfb,0xd8,0x46,0xb3,0xb0,0xdd,0xc4,0x64,0x9b,0xd3,0xe0,0xd5,0x2b,0xbc,0xb6,0xd8,0x05,0xbf,0xf7,0x92,0x11,0x18,0xc6,0xe1,0x55,0x50,0x42,0x72,0x93,0x6e,0xf1,0x85,0x9e,0x0a,0x2e,0x2a,0xee .byte 0x51,0xa7,0x44,0xe1,0x2a,0xdd,0x58,0x3b,0x00,0x72,0xaf,0xb3,0x14,0x11,0xcf,0xc9,0xcf,0xa5,0x7c,0x6c,0x8a,0x75,0x42,0x39,0x6e,0x99,0x3d,0xed,0xbe,0xd3,0x69,0xbb,0x7b,0xb1,0x00,0x6b,0xa9,0x84,0xdd,0x38,0x30,0xdf,0x20,0xed,0x50,0x78,0xc2,0xc7,0xae,0x47,0xdb,0x87,0x2a,0xe7,0x58,0x83,0x2b,0xc9,0xf1,0x34,0xbe,0x2d,0xfa,0x6c .byte 0xf9,0x8c,0x73,0x58,0xb5,0x53,0x1b,0x8a,0xa0,0x86,0xa3,0x03,0x56,0xf8,0x35,0x00,0xd5,0xb7,0x5b,0xa5,0x4a,0x28,0x68,0xf6,0x3b,0x32,0xf4,0xdc,0xad,0xf0,0x24,0x0c,0xc9,0x5e,0xb4,0x32,0xdb,0xb8,0x4a,0x8d,0x19,0xec,0xf0,0x32,0x06,0xc9,0x84,0xc0,0x99,0x0b,0x14,0xf6,0x64,0x88,0x99,0xbc,0x4c,0x90,0x07,0x49,0x18,0x1b,0x05,0x15 .byte 0x3f,0x43,0x42,0xf1,0x43,0x89,0xa3,0x14,0x78,0xdb,0xea,0xe9,0x90,0xde,0x3c,0x71,0x14,0x77,0xc1,0xab,0x29,0x1a,0x20,0x9e,0xd6,0xdd,0x73,0x32,0xf9,0xf7,0x2f,0x58,0x3f,0x59,0x80,0x36,0xe8,0xf7,0x79,0xa2,0xe8,0x38,0xdf,0xd9,0xb2,0xbf,0x97,0x95,0xf4,0x9c,0xec,0xc4,0x23,0x7d,0x5d,0x13,0x68,0x79,0x7e,0xe7,0x88,0xcb,0xd8,0x2b .byte 0x14,0x2d,0x56,0xcf,0x36,0x59,0x67,0xb7,0x62,0xd5,0xb2,0x70,0x01,0x7c,0x96,0x8a,0x72,0xab,0x09,0x83,0xa2,0x4c,0xfe,0xe3,0xc0,0xbe,0x8a,0xa2,0xa5,0x35,0xc4,0xea,0xd6,0x56,0x50,0x43,0x09,0xf5,0x49,0xf3,0x7a,0x70,0x39,0x29,0xc1,0x47,0xcc,0x82,0xf5,0x96,0x0f,0x94,0xb0,0xa5,0x81,0x8f,0x79,0xa4,0xdc,0x65,0x3d,0x32,0x67,0xe7 .byte 0xdc,0x67,0xb3,0x9a,0x44,0xa7,0xf6,0x61,0x97,0xa9,0x01,0xc7,0x0a,0xf2,0xd3,0xc2,0x16,0x12,0x18,0x18,0x67,0xca,0xc8,0x0c,0x04,0x70,0x7b,0x43,0xa9,0xea,0x15,0x11,0x08,0xe8,0x5b,0x2a,0xc8,0x2c,0xc7,0x17,0xb1,0x65,0x8d,0xe7,0xca,0x18,0x1e,0x10,0xbe,0xd0,0xa6,0xe6,0xcd,0x79,0xcd,0xef,0x4b,0x45,0x7c,0x4e,0x52,0x49,0x69,0xc2 .byte 0x57,0x72,0xf6,0xa9,0x4e,0x1c,0xb1,0x91,0x87,0x45,0x5c,0xc0,0xa1,0xb5,0x11,0x40,0xc2,0x6c,0xa8,0x6e,0xb7,0xd5,0x59,0x64,0x2f,0x42,0x55,0x56,0xd7,0x3c,0x53,0x98,0x2f,0xfa,0xd1,0x8e,0x13,0x1b,0x67,0xdb,0x12,0x37,0x98,0xd9,0x6d,0xf1,0xea,0x0a,0x13,0x14,0xf6,0xb6,0x86,0x8e,0xa0,0x95,0xa9,0x80,0x58,0x2e,0x02,0x02,0x63,0x07 .byte 0x32,0xff,0x57,0xb2,0xd5,0x4f,0xa9,0xd2,0x60,0x65,0x9c,0x15,0x8f,0xff,0x9b,0xe4,0x79,0x29,0x19,0xa7,0x8b,0x98,0xfa,0x68,0x2c,0x3a,0x1c,0x63,0xb5,0x95,0x3c,0x1d,0xa1,0xfe,0x67,0xa8,0xaf,0x48,0x35,0x80,0xc7,0x3f,0x53,0xb4,0x61,0xa4,0xb8,0x39,0xa4,0xce,0x32,0xff,0x98,0xc3,0x75,0xb0,0x82,0x52,0x59,0x64,0xfc,0xc5,0x8e,0x50 .byte 0x67,0xbd,0x57,0x48,0x06,0x05,0x87,0xaf,0x6e,0x26,0xf1,0x91,0x76,0xac,0x7d,0x67,0xd7,0xea,0xd6,0x54,0xf2,0x43,0x5c,0x57,0x71,0x02,0x27,0x6e,0x24,0xd8,0x46,0x82,0x30,0x76,0xa1,0xd7,0xc9,0xc0,0xc0,0x2a,0x35,0x87,0x2c,0xf5,0x0b,0xb9,0x2d,0x3d,0xdf,0xd4,0x9b,0xd5,0x68,0x68,0x5c,0x00,0x55,0x74,0x6c,0x09,0x6b,0x82,0x96,0x4c .byte 0xf4,0xfd,0xf9,0x8f,0x43,0x29,0x12,0xee,0xf6,0xfb,0xcf,0xdf,0x9b,0x4f,0xed,0x42,0xca,0x52,0x54,0xa2,0xf5,0x49,0x20,0x54,0x8f,0x34,0x76,0xba,0x68,0xf1,0x62,0x56,0x9d,0xc7,0xe1,0xfa,0xff,0x6b,0xf6,0x7e,0xab,0xfe,0x40,0x6d,0x0d,0xb1,0x44,0x16,0x84,0x28,0xbe,0x78,0x00,0xe3,0xe1,0x8c,0x6c,0x49,0x02,0x41,0xcd,0x07,0xd7,0x1d .byte 0xba,0x63,0xed,0x91,0xb8,0x74,0xae,0xa2,0x12,0x3c,0xac,0x31,0xe1,0xb9,0x46,0x9b,0x3a,0x0d,0xc8,0x6a,0xf3,0x83,0xa7,0x68,0x48,0x5c,0xc4,0xc8,0xc7,0x0f,0x81,0x0c,0x6d,0x29,0x4b,0xac,0x91,0xfa,0x7e,0x8e,0x08,0xd3,0xdc,0x8b,0x30,0x25,0x36,0xba,0xae,0x61,0x98,0x84,0xfb,0x2d,0x3b,0x97,0xa2,0x46,0x8f,0xf2,0x50,0xae,0xbf,0x8a .byte 0x52,0x46,0xf8,0x87,0x8e,0x8e,0xff,0x2e,0x73,0x8f,0x90,0x8f,0x0e,0x3f,0x0a,0x4b,0x9a,0x3c,0x80,0xef,0x0a,0x3d,0xaf,0xd8,0x3d,0xc3,0x8b,0x71,0x1d,0x5b,0x37,0xe5,0x62,0x5f,0xde,0xc2,0x14,0xac,0x2c,0x13,0x6e,0x49,0x0c,0xc3,0x31,0x58,0x35,0x1e,0xf0,0xe5,0x16,0x84,0xe1,0xe8,0x60,0x98,0x2d,0x1a,0x1d,0x1f,0x58,0x57,0xb8,0x40 .byte 0xd7,0xcf,0xac,0xef,0x0d,0x4e,0xf4,0x4e,0x62,0x1e,0x97,0x81,0x88,0x26,0xb9,0xeb,0x02,0x67,0x0e,0x89,0xfe,0x65,0x5e,0x04,0xc6,0xc1,0xe1,0x25,0xa6,0xd6,0x81,0x86,0x76,0xcd,0x23,0x5b,0x64,0x61,0x75,0x5d,0x4c,0xfa,0x43,0xa2,0x21,0xd2,0x4b,0x62,0xc3,0x13,0x39,0x12,0xa6,0x9c,0x16,0x87,0x62,0x5e,0xaf,0xff,0xf3,0x76,0x7d,0xed .byte 0x05,0x11,0x56,0xa0,0x63,0x10,0x1a,0xed,0x0e,0x90,0x14,0xa1,0xef,0x0a,0xcf,0x1b,0xcd,0xe4,0x29,0xf6,0x4d,0xee,0x04,0xea,0xd5,0x7f,0xa4,0x67,0xf7,0xe2,0x2e,0x35,0x1a,0xab,0x64,0x1c,0x47,0x78,0x65,0x39,0xff,0x65,0x5a,0xd8,0xd1,0x9f,0xca,0xe4,0xec,0xb7,0xf7,0xe2,0x90,0x66,0xa6,0x72,0xd4,0xd7,0x71,0xa2,0x3a,0x9d,0x9b,0xc5 .byte 0x22,0xce,0x45,0x8f,0x6d,0xe1,0xd1,0xd9,0x96,0x1c,0x9b,0xc0,0xb8,0x03,0x3b,0x3c,0x69,0x49,0xb3,0x66,0x2b,0x00,0x70,0x99,0x6f,0x3a,0x17,0x93,0x28,0xec,0x4d,0x2d,0x0f,0x66,0x11,0x26,0x98,0x66,0x60,0xa5,0x8d,0xe8,0x13,0xaa,0xd6,0xe7,0x10,0x9e,0x5d,0x52,0x76,0xcc,0xd0,0xd7,0x67,0x19,0x33,0xc7,0xe0,0xff,0x11,0x3a,0x94,0x57 .byte 0xc0,0xd1,0x2e,0x3c,0x8d,0x39,0x3e,0xf9,0x62,0x97,0xcb,0x8e,0xf5,0x0c,0x62,0x8c,0x79,0xad,0x06,0xec,0x51,0x0c,0x03,0xc0,0xf0,0x5c,0xd6,0x61,0x7d,0x0b,0xd8,0xf5,0x65,0x7b,0xb4,0x05,0x6c,0x62,0xa7,0xab,0x42,0xe5,0x8b,0x82,0x6d,0xa0,0xcc,0xe2,0x83,0xa3,0xe3,0x63,0x68,0x61,0x48,0x74,0x2b,0x3f,0x1b,0x10,0x85,0x61,0x48,0xcf .byte 0x19,0xba,0x82,0xa9,0xde,0xc9,0xfd,0xa6,0x1e,0xed,0x2c,0xc7,0xef,0xaa,0x77,0xbb,0x61,0xb5,0xea,0x73,0x85,0x72,0xf6,0x1f,0x5c,0x3d,0xbe,0x99,0x70,0x1f,0x19,0x8a,0x39,0x41,0x07,0xda,0x1e,0x35,0x15,0xa8,0x80,0x2c,0xf3,0xe9,0xe6,0x0e,0x81,0x71,0xf8,0x1f,0xee,0x35,0xd5,0xd4,0xf8,0xbb,0x93,0xf5,0x19,0x26,0xb5,0xea,0x98,0x5f .byte 0x92,0xae,0xcd,0x5c,0x0a,0x2f,0x8e,0x12,0x55,0x29,0xa6,0xc6,0x0e,0xde,0x50,0x83,0xa0,0x5a,0xb9,0x05,0x0d,0x7c,0x96,0xfd,0x41,0xd2,0xb2,0x2b,0xea,0x14,0x9f,0x8b,0x77,0x20,0x83,0xc8,0xf7,0xe6,0xd6,0x8d,0x43,0x00,0x0b,0xf0,0xde,0xcf,0x6c,0x46,0xb0,0xd3,0x02,0xe1,0x7f,0x89,0x1c,0xe7,0x8d,0x7d,0x5c,0x59,0xa1,0xf7,0x17,0x04 .byte 0xd6,0x1c,0x85,0x8c,0x6a,0x4f,0x74,0xd2,0x1c,0x7b,0x4a,0xcb,0x8a,0x42,0x2a,0x35,0x17,0x08,0xe7,0xa3,0x6a,0x00,0xdd,0x28,0x8e,0x12,0x8a,0x03,0x99,0x29,0x34,0x69,0x84,0xec,0x98,0xef,0x31,0x21,0x23,0xeb,0xf8,0x44,0x15,0xdc,0xab,0x7e,0x7f,0x7b,0x0a,0xb6,0x4c,0xfb,0x21,0xe4,0x5b,0xe6,0xf0,0x3e,0xe5,0x81,0x8a,0xc9,0x84,0x76 .byte 0xb7,0xf7,0xa2,0x05,0x14,0x91,0xb2,0x0d,0x90,0xa0,0x32,0xdc,0x1c,0xf4,0xdd,0x1b,0x70,0x06,0xf5,0xb9,0xb1,0x20,0xd7,0xcd,0x58,0x04,0xfd,0xb7,0xa9,0xc7,0x4d,0xbf,0xa3,0xce,0xc8,0xa7,0x0c,0x8d,0x1f,0x96,0xfa,0x8c,0xa7,0xe0,0x99,0x6c,0x4d,0x71,0xa4,0x3d,0x67,0xb1,0x59,0xa7,0xe3,0xdb,0xbb,0x59,0xa5,0x1c,0xdf,0xfd,0x3a,0x05 .byte 0xc4,0xd8,0xe6,0xde,0x42,0x5a,0x0c,0x88,0xe6,0xe3,0x52,0xb7,0xcb,0xa0,0xdc,0xc5,0x8a,0x70,0xa5,0xd1,0x99,0xd8,0x18,0xec,0xd9,0x8d,0x7d,0x54,0xca,0xf3,0x1c,0xdb,0x1f,0xc5,0x74,0xeb,0xd3,0xbf,0x96,0x6e,0xa4,0xc9,0x62,0x8b,0xff,0x64,0x4b,0x63,0x65,0x97,0x83,0xe7,0x02,0x64,0x70,0x56,0x0d,0x78,0xcc,0x75,0x30,0xf1,0xd2,0xb6 .byte 0x69,0x9d,0xe2,0x56,0x63,0xb3,0x9a,0xa2,0x7b,0x91,0xad,0x24,0xbb,0x61,0x3b,0xea,0xcd,0xb2,0xce,0xd7,0xa8,0xb0,0x9e,0xc3,0xac,0x67,0x01,0x57,0x0b,0xb3,0xc5,0x47,0xf7,0xb2,0x32,0xdc,0x25,0x18,0x22,0x1d,0xef,0x88,0xe0,0x47,0x67,0xeb,0xad,0x09,0xd8,0xb8,0x17,0x17,0xc7,0xc5,0x3d,0xa2,0x51,0x9b,0xa5,0xd4,0x0b,0x6c,0xe5,0x39 .byte 0x30,0xed,0x6e,0xf9,0x15,0xc2,0xaa,0x2c,0xb2,0x86,0x1c,0x33,0xca,0x0d,0x27,0xe8,0x68,0xb2,0x11,0xad,0x8b,0x9e,0x69,0xb9,0x3f,0xdb,0x54,0xf3,0x46,0xb4,0xc3,0x9d,0x47,0x32,0x1e,0x5b,0x49,0xc5,0xa2,0x2d,0xaf,0x37,0x8a,0x53,0xfd,0x96,0x70,0xfc,0x0b,0x55,0xaa,0x35,0x22,0x9e,0xb1,0x09,0xf6,0xae,0x9f,0x47,0x5f,0x5f,0xd7,0x9e .byte 0xc2,0x13,0x7a,0x82,0x32,0x1a,0xdc,0xdc,0x87,0x7d,0x9c,0x00,0xc0,0xef,0xef,0x71,0x76,0xf9,0x48,0x17,0x95,0x69,0x30,0x30,0x36,0xf6,0x24,0xc9,0x11,0xd5,0xd7,0xbd,0x1b,0x23,0xd9,0x9f,0x57,0xf4,0xf3,0x01,0x9d,0x22,0x91,0x92,0xa0,0x0f,0xb5,0x88,0xe6,0x3d,0xa7,0x2b,0x19,0x7a,0x65,0x73,0x34,0xc5,0x16,0x1d,0x93,0xeb,0x08,0x71 .byte 0x46,0x98,0x2b,0x21,0x70,0x9b,0x83,0x15,0x9b,0x4e,0x1f,0x6c,0xf0,0x6e,0xde,0x6d,0xd1,0x40,0x17,0x8d,0x18,0xc2,0x5f,0x91,0x97,0xb0,0x66,0xe8,0x77,0xf7,0x22,0xdf,0x10,0x5f,0xb2,0xc2,0x3b,0x37,0x59,0x52,0xf1,0xea,0x0c,0x6f,0xd4,0xa5,0x40,0xa5,0xb6,0x38,0xe9,0x81,0x5b,0x81,0xc8,0x9d,0xf5,0xbe,0xbf,0x4d,0x7d,0xc2,0x53,0x9f .byte 0xac,0xa6,0xf0,0x7a,0x22,0x9c,0x16,0xa9,0x1f,0xb9,0x54,0x25,0xf9,0xd3,0x6e,0x42,0xe8,0xc2,0xf4,0x9d,0xa7,0x25,0x95,0xab,0x7e,0x9a,0xaa,0x4a,0xcc,0x89,0xc5,0x73,0x4f,0xe2,0xed,0x2e,0x22,0x6d,0xb0,0x22,0x5f,0x79,0x9b,0xf2,0x0d,0x9d,0xd2,0xa2,0x7e,0xbf,0x2a,0xe0,0xe4,0xf2,0x2c,0xec,0x52,0xd7,0xac,0x63,0xac,0x82,0xa5,0xbf .byte 0x02,0xda,0x3a,0x9e,0x36,0x8f,0xdf,0x39,0xbc,0x96,0xdf,0xbc,0x38,0x39,0x84,0xe6,0x7e,0x6e,0x65,0x1b,0x48,0x58,0x24,0x54,0x25,0x6b,0x70,0xd5,0xe4,0x33,0x59,0x1c,0x12,0xca,0xe7,0xbf,0x21,0xa7,0xc0,0x96,0x85,0x52,0x0e,0x53,0xc5,0xea,0xdc,0xd4,0x37,0xb7,0x02,0x38,0x41,0xf5,0x3e,0x39,0x3a,0x65,0x4e,0x93,0xe3,0xe6,0x9d,0x8b .byte 0x15,0x1f,0xdf,0x6f,0xaa,0x4b,0x6f,0x11,0xfd,0xb6,0x47,0x3b,0xc8,0xb1,0x01,0x25,0x9b,0xbf,0x7c,0xae,0x75,0x9b,0xab,0xec,0x93,0xdc,0x28,0x42,0x92,0xb5,0x3d,0xdc,0xdc,0xa1,0x82,0xdb,0x2a,0x05,0xec,0xaf,0xa9,0xfa,0x34,0xca,0xaa,0x6d,0xa1,0x6a,0x4b,0xe5,0x43,0x73,0x31,0xde,0xb0,0x5d,0xc2,0xdb,0xd0,0x3a,0xb7,0x9f,0xe2,0x86 .byte 0xfd,0x96,0xa9,0x93,0x5e,0xe7,0x5d,0xa6,0x24,0xe4,0x72,0x16,0xb8,0x27,0x06,0x95,0xbe,0x87,0x78,0xb7,0xba,0xa3,0xcb,0x7e,0x2b,0xfc,0x3a,0x24,0x1c,0x3c,0x16,0x03,0xd4,0xe1,0x28,0x25,0xac,0xb2,0x73,0xcb,0xff,0xf1,0x0c,0x65,0xc7,0x44,0x84,0xe0,0x19,0xe8,0x58,0x4f,0xc4,0xa0,0x19,0x5a,0x64,0x41,0xf7,0xaf,0x4a,0x87,0xf3,0xc2 .byte 0xc3,0xa6,0x11,0xd2,0xf2,0xd3,0x18,0x13,0x38,0xec,0x26,0xf3,0xcd,0x17,0x9b,0xaf,0x9a,0x40,0x10,0xb9,0x0c,0x60,0x82,0xd2,0x62,0xe2,0xae,0xba,0x4d,0x95,0x44,0xea,0x19,0xff,0x21,0xca,0xba,0x31,0x38,0xa0,0x8d,0xcd,0xde,0xae,0x50,0x93,0x96,0xfe,0x39,0x50,0x97,0x79,0xd9,0xcd,0x68,0x56,0xc9,0xe3,0x3c,0x85,0x7c,0xb8,0x1d,0x01 .byte 0x92,0x72,0xf2,0x35,0x26,0x5e,0xf0,0x38,0x85,0xd9,0x05,0xd1,0xe9,0x18,0x1f,0xf5,0xd1,0xf3,0xc3,0xc5,0x43,0xe6,0x87,0xcb,0xf7,0x25,0x89,0xb3,0x17,0xea,0x58,0xa1,0x5f,0x61,0x28,0x37,0x72,0x65,0x44,0xde,0x53,0xa8,0xd8,0x80,0x35,0x14,0x1d,0x02,0x64,0x68,0x2f,0xc9,0x1c,0x75,0x44,0xec,0x07,0x4e,0xba,0x49,0xa0,0xe8,0x3b,0x3c .byte 0x63,0x32,0x66,0x62,0xa8,0xe3,0x39,0x3c,0xe7,0x70,0x20,0x6d,0x1e,0x2e,0x74,0x91,0xb4,0x8f,0xdf,0x59,0xc2,0x0e,0x1e,0x43,0x9b,0x26,0x7b,0x36,0x7b,0xe8,0x96,0x61,0x81,0x96,0x16,0x12,0xeb,0xd9,0x8e,0xd8,0xd8,0x04,0x1f,0x00,0x90,0x81,0x9f,0xbe,0x59,0x83,0x83,0x7d,0x83,0x56,0x41,0x78,0x1d,0xac,0x64,0x7b,0xdd,0xea,0x2f,0x34 .byte 0x2e,0xf4,0x58,0x21,0x8b,0x39,0x82,0x90,0x80,0x75,0x63,0xd9,0x2e,0xf9,0x4a,0x75,0x77,0xa8,0x66,0xa9,0x95,0x88,0x38,0xd7,0x1f,0xd9,0xae,0xf9,0xba,0x29,0x65,0x29,0x3d,0xd6,0x3c,0x47,0xb7,0x22,0x37,0x65,0xce,0x81,0xf3,0x70,0xc9,0xeb,0x5c,0x02,0x65,0x71,0x65,0x8a,0x93,0xcc,0x02,0xe5,0x21,0x2c,0x38,0x69,0xad,0xb6,0x89,0x7d .byte 0x46,0x37,0x44,0x67,0x87,0xb0,0x41,0x85,0x7d,0xae,0x82,0x05,0xc0,0x28,0x29,0xf3,0x76,0xa6,0x54,0x4a,0x15,0x84,0x49,0xb6,0xce,0x82,0x45,0x5a,0x2d,0x46,0xae,0xf8,0x8a,0xe6,0x82,0x27,0xe7,0xc0,0xe4,0x6c,0xce,0xd7,0x2e,0x7f,0xd7,0x69,0x97,0x22,0x69,0x1f,0x0f,0xdb,0x6e,0x4e,0x21,0x31,0x9b,0x9b,0xdb,0x33,0xcb,0x7f,0x1f,0x2d .byte 0x08,0x16,0xb8,0x1e,0x87,0x2f,0x39,0x87,0xc2,0xe9,0x6f,0xd8,0x14,0xbc,0xe9,0x09,0x17,0x66,0xab,0x09,0xe6,0x69,0xe9,0x75,0xca,0xa9,0xe5,0xc6,0xbf,0x6d,0xce,0x5d,0xb5,0x86,0xe4,0xf1,0x59,0x73,0xfd,0xf5,0xc7,0xcf,0xf0,0xa7,0xb2,0xcf,0xe7,0x2b,0x4a,0x57,0x99,0x48,0xf8,0x49,0x31,0x9a,0xdc,0xd3,0x05,0x7c,0x00,0xbc,0x47,0x3e .byte 0x22,0x6d,0x45,0xe3,0x13,0x1b,0x75,0x0f,0xac,0xc7,0xc9,0xed,0x4a,0xd8,0xc6,0xf5,0x16,0x30,0x16,0xcc,0x6b,0x1f,0x8b,0xb4,0x7a,0x28,0xa7,0x90,0xd4,0x6b,0xab,0x6a,0x6e,0x02,0x03,0x75,0x08,0x40,0x82,0x64,0x3a,0xbe,0xbb,0x3c,0x46,0xab,0x47,0xc2,0x08,0xbb,0xa4,0xd0,0x95,0x5d,0x1f,0x1f,0x5b,0xa3,0x7d,0x47,0x2f,0x1c,0xee,0x10 .byte 0x1b,0xbd,0xf8,0xd2,0x86,0x78,0x72,0x6c,0x2f,0x7b,0xba,0x5c,0x8a,0x0a,0x0e,0x13,0x9c,0x4e,0x33,0x6b,0xa1,0x47,0xdd,0xe5,0x66,0x4e,0x23,0x82,0x18,0x83,0xb8,0xe7,0xb2,0x9b,0x75,0x29,0xef,0x95,0x5a,0xb2,0xbe,0x06,0x4d,0x44,0x7c,0xdf,0x31,0x04,0x92,0xe6,0x5b,0x52,0x0c,0x98,0xac,0x85,0xee,0x04,0x8d,0x87,0x55,0x59,0x3d,0x7e .byte 0xa2,0x19,0xdd,0xdb,0xbd,0xb2,0x9c,0x6d,0x51,0x67,0x42,0xdd,0xb8,0xb7,0x51,0x7b,0x93,0xb1,0x69,0x22,0x10,0x94,0x46,0x6f,0xc4,0xcc,0x53,0xf0,0x66,0x26,0x56,0xf8,0x95,0x52,0xba,0xf2,0xac,0xe1,0x34,0x47,0x9c,0x7a,0xae,0x56,0x8b,0x77,0x81,0xc6,0x25,0x96,0xda,0xe9,0x87,0x85,0xda,0x1b,0x0f,0x24,0x7f,0x46,0x99,0xe0,0x9e,0x4b .byte 0xb1,0x01,0xe2,0xc0,0x58,0xbd,0xb4,0xb4,0x09,0xa0,0xfe,0x82,0xd8,0xde,0x9e,0x2f,0x0e,0x03,0xbd,0x35,0x1b,0x46,0x9b,0x14,0xff,0x5c,0x5f,0xf0,0xab,0x56,0x8c,0x38,0xae,0x7e,0x36,0x73,0x0d,0x85,0xe4,0x54,0x40,0xcc,0xe7,0x11,0xcf,0x46,0x9f,0x58,0x56,0x45,0xa8,0xce,0x35,0xe7,0x41,0x15,0xce,0xeb,0x36,0xca,0x42,0xfe,0x13,0x25 .byte 0x57,0xff,0xdd,0xe0,0x7a,0xde,0x67,0xa7,0xbc,0x5f,0x32,0xaa,0x87,0xe6,0xb8,0x3a,0xfd,0x86,0xa7,0x64,0x0d,0x69,0x66,0x2b,0xd1,0xae,0x55,0x63,0x4b,0x36,0x19,0x3d,0x69,0xde,0x6b,0x27,0x6a,0xfb,0x4b,0x73,0xac,0xf7,0xa0,0x13,0x2e,0xf0,0x37,0x15,0xd8,0x71,0xf3,0x1e,0xca,0x00,0x60,0x61,0xee,0xc1,0x5e,0x18,0xc3,0x3d,0x5c,0xca .byte 0x60,0xbe,0x40,0xac,0x22,0xd0,0xba,0x2a,0xbb,0xdc,0x57,0x33,0x05,0x1a,0x33,0xf7,0x58,0x97,0x4e,0x88,0xb3,0x70,0x91,0x05,0xa9,0x92,0x1b,0x22,0x3c,0x4a,0xcf,0x20,0x15,0x5e,0xad,0xa7,0x77,0x37,0xc7,0x57,0x20,0xbc,0xaf,0xd8,0x02,0x2a,0x01,0x93,0xbc,0xc7,0x29,0x21,0xdf,0x9a,0xe4,0x39,0x0e,0xa8,0x91,0x03,0x92,0x25,0xc9,0x2c .byte 0x63,0x78,0x49,0xe7,0x37,0xa2,0x36,0xff,0x5a,0x44,0x84,0xf1,0xe5,0x30,0xcd,0x9b,0x72,0xe2,0x70,0xb9,0x4c,0x9a,0xef,0x1f,0xcf,0x7e,0x4c,0xdb,0x79,0xde,0xd5,0x7a,0x87,0x93,0x31,0x26,0x42,0x67,0x34,0xa2,0x1e,0xae,0x39,0x84,0xaf,0xe8,0xf5,0x49,0xe0,0xd2,0x16,0xb8,0x28,0x4a,0x7c,0xb4,0x58,0xef,0x5d,0xf3,0x6c,0xe6,0x89,0xa2 .byte 0x5b,0x19,0x5e,0xc3,0x1d,0x7b,0xcb,0x60,0x3b,0x48,0xc3,0xb2,0x98,0x41,0x22,0xac,0x8a,0x86,0x0f,0x29,0xb7,0xa9,0xe8,0x7d,0x1e,0xce,0x7e,0x7f,0xd2,0x4f,0x59,0x70,0x18,0xb9,0x43,0xb3,0x09,0xa5,0xcf,0x8d,0xa7,0x74,0x62,0xf9,0x92,0xf6,0x99,0xc8,0xed,0x2d,0x32,0xa3,0xe8,0x51,0x8a,0x9e,0x55,0xf3,0x9e,0xef,0xdf,0x90,0xe0,0xbe .byte 0x1b,0x36,0x0e,0x3a,0x28,0x99,0x21,0x1c,0x14,0x2c,0xa1,0x7e,0xf6,0x51,0x7f,0x19,0x96,0xe4,0xcc,0xd4,0xbf,0xdd,0xaa,0x0a,0x06,0xa3,0x05,0x2c,0x8b,0x17,0x85,0xef,0xfb,0x76,0xa3,0xd0,0x90,0xb3,0xb9,0x6c,0x2d,0xf9,0xba,0x51,0xbf,0x13,0xd4,0xf3,0x23,0x5b,0x8e,0x6e,0x8a,0x03,0x02,0x70,0x01,0xf8,0x54,0x41,0x09,0x12,0x57,0x31 .byte 0x0c,0x30,0x11,0xf2,0x10,0x2d,0xc3,0x90,0xac,0xc8,0x01,0x7f,0x2f,0xc0,0x8b,0x56,0xd5,0xb5,0x1d,0xd7,0x85,0xe3,0x26,0x90,0x0a,0x47,0xbe,0xee,0xeb,0xea,0x62,0x6d,0x95,0xe2,0x0e,0x04,0x21,0x65,0xd8,0x1b,0x88,0xc8,0x5e,0xec,0x3a,0xc7,0x2b,0x12,0x4f,0x2d,0xfb,0xc8,0x56,0x1b,0x6f,0xe5,0xf7,0x03,0xa6,0x94,0x29,0x3e,0xd7,0xf1 .byte 0x46,0x91,0x26,0xbf,0x3c,0x8f,0x55,0x71,0x39,0xaf,0x1f,0x4f,0x96,0xdc,0x9f,0xaa,0xef,0xc2,0xcb,0xc4,0x97,0xa8,0xf5,0x82,0xaa,0x36,0x47,0x80,0x80,0x10,0x1b,0x68,0x88,0x29,0x8e,0x8e,0x14,0x4f,0xf2,0x3f,0xb6,0x16,0x2a,0x42,0xe8,0x8f,0x7b,0xd6,0xb9,0x1f,0x3a,0x56,0x7a,0x3f,0xad,0x5d,0x68,0x34,0x6d,0x65,0xde,0x13,0x4d,0xa9 .byte 0xf9,0x4f,0x37,0x49,0xc0,0x63,0xc4,0x28,0x42,0x4c,0x77,0xae,0x78,0x38,0x31,0x87,0xf4,0x9f,0x4a,0x16,0xbb,0x6e,0x06,0x9a,0xa1,0x1c,0xe2,0x97,0xc9,0xf9,0xfb,0x3a,0xe1,0x25,0x4e,0x4e,0xc3,0xfe,0x9a,0xef,0x1f,0x43,0xfb,0x69,0xb1,0x06,0x09,0x4b,0x33,0xf3,0x9c,0x40,0x05,0x83,0x17,0x71,0x81,0xd6,0x87,0xb5,0xd1,0xa7,0x59,0x38 .byte 0x1f,0xbc,0x6c,0x64,0xb6,0x85,0xee,0xce,0x39,0xb4,0xfe,0x3a,0xf2,0x9e,0x02,0x84,0xc4,0xf9,0x2c,0x56,0xeb,0xd1,0x06,0x8d,0xf4,0x25,0x91,0x98,0xf0,0x49,0xb1,0xa5,0xcd,0x06,0x43,0x74,0xfe,0xea,0x50,0xeb,0x8c,0x42,0x47,0x2d,0x33,0x3a,0xc6,0x4d,0xe4,0x9d,0xa5,0xea,0xc2,0x26,0x90,0xa7,0x17,0xb7,0x8a,0x0c,0x3e,0x0d,0x31,0xeb .byte 0xe5,0xfe,0x98,0xc9,0x43,0x15,0x2b,0x36,0x06,0x68,0x52,0x12,0xf6,0xa8,0xcb,0x61,0xa8,0xb3,0xc1,0xcc,0xe3,0xf7,0xb4,0x05,0x1c,0xea,0x67,0x48,0xb8,0xe8,0x6f,0x08,0xc3,0x9d,0x48,0xdc,0x06,0xbc,0xae,0xbe,0x35,0x49,0x58,0xe9,0x33,0xbe,0xe5,0xbb,0x5c,0x25,0x79,0x2e,0xde,0xc6,0x7c,0x2d,0xdf,0x53,0xb4,0xa9,0xc3,0x00,0x86,0xe6 .byte 0xe8,0x1f,0x2b,0x83,0x7c,0xb5,0x90,0xba,0x29,0x63,0x26,0xbf,0x04,0x4a,0xee,0xb9,0xa5,0xd1,0x34,0xc5,0x2f,0x18,0xb8,0xc3,0xdc,0xa1,0x30,0x83,0x8b,0xe7,0x84,0x1b,0x96,0x7b,0x93,0xe9,0xe8,0x15,0x6e,0x3f,0xf7,0x6e,0xe4,0x44,0x0f,0xcf,0x98,0x74,0x63,0x35,0x36,0x29,0xaf,0xc1,0x14,0x98,0xcb,0x7a,0x38,0x37,0xc3,0x0d,0x11,0x43 .byte 0x7e,0xda,0x34,0x22,0x86,0xb8,0x96,0x6d,0x36,0xfb,0xd4,0x36,0x6e,0x10,0x06,0x41,0xa6,0x80,0xd5,0x1b,0x96,0x1b,0x06,0x71,0x08,0x97,0x17,0x1e,0x2d,0x62,0x3f,0x8d,0xd8,0x46,0xbd,0x5d,0x31,0x74,0x04,0x48,0xaa,0x2c,0xd2,0xb3,0x5e,0xbd,0x60,0x60,0xa4,0x81,0x5c,0xda,0x13,0xd5,0xd6,0x96,0x76,0x2f,0x9c,0x7f,0x40,0x23,0x9f,0x5c .byte 0x49,0x58,0x2f,0x34,0xb0,0xbb,0xf0,0xb1,0x67,0x8e,0x95,0xeb,0x92,0xee,0xba,0xcf,0x16,0xe2,0x85,0x22,0x67,0x6f,0xd8,0xb7,0x4c,0x17,0x34,0x68,0x5d,0xea,0x4a,0xa3,0xa5,0xad,0x8f,0xf0,0x86,0xdf,0x79,0xa1,0x84,0xb3,0xf2,0x4f,0xbe,0xae,0x55,0x60,0x4c,0xd5,0x44,0x3f,0xe9,0xe3,0x9d,0xf2,0x3c,0x42,0x1b,0x35,0x95,0x3b,0x5f,0x6c .byte 0x76,0xdb,0x5c,0x8a,0x67,0x10,0x15,0x52,0xde,0x50,0x62,0x87,0x66,0x0f,0x36,0xdb,0x14,0x8f,0xda,0x13,0x35,0x9f,0xce,0x90,0x22,0xcd,0x78,0xe5,0xc5,0xcb,0xb4,0x4a,0x23,0x49,0x30,0xe9,0x3a,0xfd,0x9d,0x63,0x98,0xd7,0x9e,0x2f,0x32,0x8b,0xb9,0x34,0x4e,0xaa,0x20,0xe9,0xbc,0x72,0x85,0x2b,0xee,0x2c,0xc3,0xb6,0x31,0x81,0x3e,0x56 .byte 0x9c,0xda,0x4d,0x9f,0x19,0x36,0xe7,0x47,0x46,0x8f,0x9d,0x83,0xcd,0xa1,0xcc,0xcf,0x69,0xfc,0xbd,0x5d,0x7d,0xd8,0xa8,0x71,0xb5,0xc0,0x6c,0xe5,0xbb,0x5b,0xe3,0xd0,0x6b,0x38,0x53,0x51,0x9b,0x3d,0x0d,0x93,0x95,0x5c,0xc1,0x82,0xbd,0x59,0x8b,0x2a,0xef,0xb8,0x07,0x92,0x3d,0x0f,0x34,0x3c,0xc8,0x39,0x91,0x8e,0x9b,0x72,0x7f,0x51 .byte 0x61,0xdd,0xce,0x98,0x71,0xde,0xdc,0xdd,0x14,0x0c,0x77,0x48,0x8e,0x26,0xc0,0xc7,0xa0,0x22,0xa5,0xb2,0x36,0xe1,0x2f,0x1b,0x43,0x6b,0xd8,0x8e,0xb2,0x18,0x5d,0xc3,0xba,0xcc,0xae,0xf6,0xb8,0x4a,0x79,0xb2,0x95,0x4b,0xfe,0x15,0x4c,0xc6,0x17,0x4f,0x0f,0x65,0xe2,0xc2,0xc7,0xbf,0x53,0x89,0xa3,0x64,0xbb,0x93,0x58,0x47,0x2a,0xcb .byte 0x5c,0xc6,0x9c,0x69,0x83,0x2e,0x82,0x92,0xe2,0xcd,0xff,0xfa,0x3f,0xe3,0x4e,0x45,0xce,0x7f,0x71,0x60,0x98,0x06,0x1a,0x4d,0x21,0x26,0x1e,0x3c,0x1d,0xef,0xd5,0xbb,0x10,0x33,0x45,0xdf,0xed,0xd9,0x89,0x32,0x68,0x91,0x3f,0xee,0xc7,0x6a,0x43,0xef,0x33,0xcf,0x3e,0x1e,0x0f,0xa2,0x3e,0x81,0x06,0xc8,0x85,0x7f,0x42,0x23,0xd9,0x85 .byte 0x8b,0x9a,0xbb,0x11,0x3b,0x26,0xb7,0x21,0x45,0xe8,0x28,0x34,0x32,0x86,0x32,0x18,0x84,0x74,0x27,0x33,0x7e,0xd7,0x07,0x84,0x26,0x50,0x7f,0xc0,0xce,0x1d,0x17,0x1a,0x99,0x5a,0xeb,0x15,0xd2,0x6a,0xaf,0xea,0x89,0xcf,0x11,0xa2,0x9d,0x76,0x70,0x07,0xb2,0x73,0x7a,0x9b,0xad,0xf7,0x3a,0x02,0xf3,0xdb,0x7b,0xdc,0x28,0xec,0xb6,0x6e .byte 0x0e,0xee,0xae,0xe6,0x20,0xa3,0xc9,0xb1,0x21,0xc7,0x7b,0xb4,0xba,0x5d,0x0c,0xc0,0x1c,0xab,0xea,0xf7,0xfb,0x5b,0x78,0xbe,0x91,0x2d,0x48,0x4a,0x56,0x59,0x90,0x0e,0x4e,0xf1,0xda,0xa9,0x46,0x5a,0x76,0x96,0xa6,0x14,0x7f,0xeb,0x75,0xe5,0x86,0x7a,0x63,0xbe,0x74,0xbc,0xcb,0x9e,0xee,0x03,0x6e,0x98,0xb5,0x62,0xf8,0x27,0x8e,0x46 .byte 0x37,0xe6,0x7a,0x12,0x45,0xad,0x0f,0xc1,0x2d,0xef,0xad,0x8f,0xc1,0xf6,0xcc,0x97,0x88,0x14,0x0e,0xea,0xbf,0xe3,0x14,0x26,0x0c,0xaf,0xe2,0x9e,0xca,0x30,0xc6,0x51,0x36,0x35,0x6f,0x8b,0x37,0x8d,0x09,0x8f,0x48,0x18,0xea,0xa6,0x13,0x01,0x38,0x04,0xcc,0xa5,0x71,0x91,0x07,0x43,0xc8,0x76,0x1f,0x88,0x57,0xaa,0xd6,0x44,0x3b,0xf0 .byte 0x17,0xca,0x2d,0x30,0x36,0x41,0xfc,0x24,0x3c,0xbc,0xa3,0x4b,0x10,0x03,0xd2,0xa9,0xef,0xe1,0x98,0x3e,0x88,0xcc,0x7f,0x64,0xb5,0xb7,0x25,0xac,0xf6,0xf6,0xc6,0xd9,0xe4,0x73,0xc3,0xe9,0x21,0x6e,0xee,0x24,0xb3,0xf6,0xa0,0x3f,0xa0,0xdf,0x1c,0xf7,0x66,0x7a,0x87,0x7d,0x8a,0x21,0xd0,0xce,0x2a,0x34,0xef,0xd8,0x83,0x34,0xcb,0x97 .byte 0xc7,0xb8,0xb5,0xa8,0x9d,0x06,0x2d,0x35,0x70,0x6a,0x3f,0x91,0x81,0x37,0x3d,0xae,0x43,0xb2,0xff,0x6b,0x81,0x44,0x69,0xba,0x81,0xf4,0xb5,0xf6,0xf4,0xea,0x17,0xb5,0x7f,0x0a,0x02,0x2c,0x7a,0x3f,0x6c,0x7a,0x07,0xea,0xd5,0x48,0x17,0x75,0x80,0xa0,0x35,0x03,0x59,0xe9,0x45,0x4f,0x18,0xd7,0xd3,0xed,0x48,0x2b,0xa2,0x17,0xd6,0x35 .byte 0xc6,0x2f,0x7a,0x9c,0x08,0x83,0x12,0xe6,0x1e,0xc8,0xc7,0x02,0x8f,0xf8,0x15,0x2a,0x79,0xe5,0x1f,0xd2,0x1f,0x05,0x34,0xe4,0xb4,0x7e,0xb8,0x05,0xb7,0xae,0x44,0x5c,0x35,0x6c,0x2e,0x69,0xde,0x09,0x2d,0x71,0xe3,0x40,0x7e,0x50,0xb7,0x09,0xdf,0xe8,0x87,0x19,0x82,0x17,0x7b,0x46,0x5b,0xa4,0x23,0x62,0x0b,0x79,0x59,0x5f,0x3a,0x19 .byte 0x0a,0xc1,0x90,0x79,0x0d,0xce,0x9b,0xc0,0xaa,0xb5,0x6a,0x71,0xe3,0x88,0x31,0x66,0x0c,0x0d,0x8c,0xaa,0xd6,0xf0,0x61,0x71,0x09,0xb4,0xbe,0x61,0x8b,0x9e,0xf3,0xb3,0x9e,0x8b,0x5a,0x50,0x55,0x13,0x0f,0xbe,0x9b,0xa6,0x76,0x34,0xbc,0xae,0xa1,0x7f,0x72,0x21,0xac,0x6c,0x58,0x74,0x5b,0x19,0x16,0x53,0xa9,0x0f,0x0f,0x0f,0x15,0xc9 .byte 0x2b,0xbb,0x80,0x97,0x5e,0x37,0x8b,0xef,0xf7,0xb5,0x4f,0xf0,0x01,0x77,0xce,0x03,0x86,0x8e,0xe7,0x7b,0x9e,0x52,0x2e,0x3b,0xbb,0x17,0xf5,0x12,0xd5,0xac,0xb2,0x0d,0xe1,0xb4,0xcd,0x04,0xe8,0xfa,0x65,0xea,0x95,0xa5,0xf6,0x82,0x75,0x28,0x90,0xfe,0xef,0x2c,0xd1,0xbb,0x9e,0x71,0x47,0xfc,0xf1,0x63,0x5a,0xd0,0x49,0x4d,0xfe,0xf9 .byte 0x5d,0x22,0xbf,0x80,0x8d,0x07,0x50,0xde,0x57,0x9e,0x0c,0xc5,0x00,0xad,0xfa,0x57,0x8f,0xcd,0x53,0x70,0x37,0x25,0x22,0x56,0x2b,0xea,0x8e,0x62,0x41,0xe8,0xac,0x3b,0x1f,0xef,0x46,0xd4,0x8d,0xf7,0x4d,0x89,0xb1,0x61,0x1b,0xb8,0x74,0x1a,0x40,0x80,0xbc,0x62,0x71,0x76,0x90,0x37,0x9c,0x91,0x3c,0xfb,0x0c,0xc5,0x18,0x63,0x9a,0xcf .byte 0xe1,0x43,0xd0,0x01,0xe3,0xcc,0xc6,0x93,0xc7,0x4f,0x04,0x5f,0x07,0x33,0x1f,0xd8,0x5d,0xb0,0xe7,0xa1,0xa1,0xfc,0xbf,0xff,0x4f,0x3e,0x38,0x38,0x14,0x1c,0x90,0xc0,0x77,0x60,0x85,0x4c,0x11,0x75,0xca,0xe5,0x87,0xbb,0x0a,0x49,0xb1,0xd8,0x12,0x06,0x00,0xa0,0xe9,0xe6,0x8a,0x34,0xd5,0x8f,0x56,0xd1,0x6f,0xfc,0xcb,0x6a,0xbd,0x4a .byte 0x68,0x4a,0xbc,0x90,0xf0,0x1c,0x9f,0x36,0x68,0xab,0x26,0xc9,0x7f,0x48,0xe9,0xf6,0x8a,0x68,0x85,0x95,0x30,0x31,0xdb,0x02,0xc8,0x48,0xbf,0x1a,0x76,0x85,0x23,0xde,0xc6,0xa3,0x83,0x02,0x5f,0x7f,0x1e,0x57,0x7c,0x1b,0x4c,0x77,0x72,0x76,0xb9,0xe3,0x09,0xd6,0x73,0xe1,0x0c,0x03,0x51,0x55,0xe9,0xfc,0xab,0x79,0x9f,0xc5,0x00,0xd9 .byte 0xcf,0x5c,0x61,0x6a,0x30,0x83,0xd8,0x38,0xc8,0x41,0x8e,0xb9,0x6a,0xbc,0x33,0x02,0x03,0x0b,0x03,0x3a,0xf1,0x8e,0xfc,0xb8,0xa8,0xf9,0x4f,0x6b,0x87,0x21,0x23,0x60,0x33,0x53,0xa4,0x38,0x0c,0x95,0x07,0x31,0x14,0x8a,0x71,0x2c,0xd8,0x58,0x67,0xa0,0x78,0x6f,0x9f,0xac,0xf0,0xe3,0xcd,0x9a,0x63,0x5b,0x3b,0xa9,0xae,0x7f,0xf8,0x94 .byte 0x4f,0x81,0x21,0x8a,0xd9,0xe9,0x65,0xe4,0x98,0xb4,0x8b,0xad,0xfc,0x47,0xf3,0xe4,0x38,0xe1,0x90,0x74,0xfa,0xa8,0xab,0xbd,0xac,0x3d,0xb7,0x93,0x8f,0x99,0x10,0x3e,0x9a,0xb1,0xba,0x9b,0xb0,0xe9,0x43,0x34,0x3c,0x20,0x03,0x65,0x50,0x37,0x9b,0xe1,0xcf,0x64,0x94,0xaf,0xd4,0x9c,0x07,0xad,0x68,0xc4,0xaf,0x2c,0xda,0xd7,0xdd,0x49 .byte 0xb6,0xed,0xcd,0xcb,0x1e,0x8a,0x4b,0x6e,0x7f,0x5f,0x54,0x79,0x12,0x30,0xbe,0xfe,0x8a,0xeb,0x84,0xd8,0x48,0xc2,0x5d,0x83,0x09,0x5c,0xfd,0x3f,0x80,0xfd,0x68,0x78,0xc3,0xa4,0x90,0xae,0xb7,0x1d,0x9a,0xd3,0x57,0x8b,0x5e,0x3d,0xc9,0xda,0xff,0x52,0xca,0x3f,0xf7,0x5f,0x84,0x25,0x1f,0xa3,0x64,0x68,0x69,0xb9,0x84,0xb1,0xd7,0x0c .byte 0x4c,0xbc,0xd3,0x66,0xcc,0x28,0xab,0xa7,0x9b,0x1f,0xd0,0xe5,0xac,0x54,0xf3,0x5a,0x1f,0xdb,0xcf,0x9e,0xa3,0x26,0xfd,0x2e,0xd7,0x02,0x89,0xa5,0xb6,0x8c,0x81,0xac,0xa8,0x54,0x4e,0xa7,0x6c,0x1d,0x5d,0x31,0x0e,0xdf,0xf7,0x32,0x77,0x83,0x00,0x81,0xd2,0x3b,0x39,0xd9,0xda,0xbf,0x0d,0xdc,0xab,0x46,0xb1,0xdc,0x1f,0x8a,0x6d,0xe9 .byte 0x20,0xf8,0xf3,0xe9,0xdc,0x94,0x15,0x5e,0xe9,0x62,0x44,0xf0,0xbc,0x76,0x64,0x92,0x31,0xb7,0xf1,0x27,0xbb,0x83,0x16,0xfa,0x6e,0xc4,0xc4,0x03,0x50,0x8a,0x08,0x54,0x1d,0xfb,0x3d,0x66,0x05,0x83,0x93,0x62,0x25,0xc3,0xff,0x2d,0x84,0x12,0x98,0x1a,0x61,0x37,0xc5,0x09,0x00,0xdc,0x08,0xa5,0xd5,0x08,0xde,0x78,0x73,0x54,0x1a,0x54 .byte 0x98,0xc6,0x97,0xec,0x52,0x4c,0x90,0x46,0xa0,0xf5,0xec,0x90,0x8d,0x7e,0xb3,0x8b,0x41,0x5a,0xad,0xd7,0x73,0x8c,0xdc,0x2e,0xc1,0xd6,0xbb,0x95,0x76,0x09,0x32,0x17,0x6e,0x14,0x6a,0x84,0xb2,0xc4,0xa3,0x9c,0x96,0x8d,0x57,0x62,0x43,0xb7,0x75,0x3d,0xd1,0x79,0x0f,0x75,0x13,0xfe,0x63,0x75,0xe6,0x83,0xde,0xc8,0xa2,0x11,0x4d,0x93 .byte 0x92,0xc7,0x4d,0xfc,0xaf,0x35,0x0f,0x98,0x76,0x22,0xe1,0x95,0x27,0x3a,0xb0,0x62,0x67,0xb2,0x62,0x9f,0x34,0x47,0xb8,0x41,0xa8,0xc9,0x82,0xbd,0xed,0x5b,0xf7,0x33,0xd0,0xcc,0x60,0xef,0xe4,0x47,0xfe,0x6d,0xf8,0xa5,0xee,0x5b,0x3d,0x00,0xc8,0x22,0x7d,0xcf,0x81,0xe3,0xac,0xf9,0x26,0x77,0x26,0x11,0x85,0x99,0xa0,0x77,0x19,0x7d .byte 0x67,0x80,0x74,0xc7,0xbb,0xe6,0xbb,0x8d,0x16,0x2b,0x50,0x81,0x08,0x89,0x32,0x21,0x20,0xd4,0x7b,0x80,0xd7,0x20,0x53,0x4a,0x0c,0x18,0xb3,0xec,0x49,0x2f,0x3b,0x9b,0x9f,0x69,0x99,0xb5,0x85,0x74,0x0b,0x54,0x61,0x9a,0xe9,0xa1,0xd6,0x98,0x20,0x52,0x82,0x78,0x30,0x5a,0x66,0x02,0x43,0xbf,0x5c,0x5e,0x36,0x3a,0x3b,0xaf,0x7e,0x92 .byte 0xbc,0x64,0x62,0x2a,0x20,0x65,0xd5,0x1b,0x64,0x6a,0x00,0x88,0xec,0x9b,0xe8,0xd7,0x61,0x80,0x38,0x9e,0x4e,0x55,0x1b,0x5b,0x85,0x7b,0xa0,0x2f,0xc3,0xbe,0x73,0x09,0xfd,0x24,0xbe,0xa6,0x9b,0x81,0x3b,0x3c,0x0c,0xd7,0x23,0xb0,0xe1,0x7b,0x26,0xda,0x54,0x39,0x2e,0x85,0x44,0xe2,0x8b,0x50,0x00,0x31,0x37,0x02,0x68,0x06,0xf1,0x47 .byte 0x62,0xf9,0x09,0x07,0xbf,0x80,0xd6,0x36,0x8b,0xb7,0x8b,0x28,0x0c,0x2b,0x28,0x4d,0xfc,0xa4,0xc9,0x96,0x90,0xf9,0x12,0xab,0xb2,0xa3,0x91,0x78,0xf4,0x3a,0x6c,0xea,0x29,0xb5,0x9d,0xe5,0x2c,0xd5,0x28,0xdf,0xdd,0xb6,0x0a,0xbe,0xff,0x60,0x23,0x88,0x5b,0x0d,0x98,0xbe,0xb5,0x7c,0xb8,0x4d,0x5c,0x2b,0x2d,0xeb,0xc3,0xce,0xca,0x21 .byte 0x11,0x2c,0x34,0xef,0xc7,0xce,0xb7,0x11,0x6d,0x46,0x6d,0xcb,0x58,0x2b,0x73,0xae,0xc0,0x9c,0xf6,0x75,0xe1,0x2c,0xbf,0xab,0x9d,0x9f,0x0e,0xd4,0xba,0xf1,0x1f,0xd7,0x8b,0xd2,0x2e,0x00,0xd0,0x01,0xc9,0xe5,0x3a,0xd6,0x2e,0x98,0x79,0x6d,0x04,0xd8,0x39,0xb5,0xd7,0x47,0x48,0x78,0xa6,0xfa,0xbe,0xe3,0x73,0xd9,0x60,0x50,0xc0,0x32 .byte 0xc2,0xa9,0x08,0xaf,0xce,0xc1,0xda,0x17,0xf6,0xc0,0xa6,0xa8,0x1d,0x58,0xff,0xb1,0x2e,0x3a,0x14,0xa8,0x75,0x8b,0x2e,0xcb,0x0d,0x9d,0x2a,0xe2,0x16,0xc3,0xa6,0x2f,0x48,0xa9,0xe6,0xe7,0xfb,0x85,0xd2,0x75,0xfb,0x7f,0x42,0x4a,0x78,0xa9,0x03,0x43,0xc5,0x9d,0xf3,0xfe,0xd0,0x0a,0xd0,0xb3,0x4c,0xc9,0xad,0x3e,0xd9,0x17,0x3c,0x93 .byte 0xde,0x05,0x5b,0xb3,0xbb,0x7f,0x79,0x40,0x42,0xe6,0x32,0x6e,0x5e,0xee,0x8a,0xa1,0x8c,0xc6,0x3b,0x50,0x1f,0x46,0x91,0x10,0x21,0xbb,0xa9,0x45,0x5e,0x59,0xe8,0x27,0xb4,0x4a,0x55,0x10,0xae,0xe2,0xfc,0xa3,0x0e,0x62,0x3c,0x47,0xc6,0x65,0x5c,0xcf,0x5d,0x02,0x5c,0x53,0x5c,0x03,0xc0,0xce,0x8a,0x57,0x10,0xe8,0xb6,0xab,0xc1,0xa3 .byte 0x0b,0x81,0xb2,0x93,0xef,0x48,0x5e,0x79,0x4e,0x79,0x9b,0xfe,0xd6,0x6c,0xef,0xd0,0xe7,0x9d,0x7d,0x74,0x6c,0xb5,0x44,0x34,0xa6,0x8c,0x38,0x3d,0x90,0xd9,0xf2,0x53,0x15,0x60,0xdd,0xb9,0xde,0x7d,0x66,0x93,0xae,0xef,0xa2,0xd8,0xce,0x48,0x3e,0x32,0x13,0x0e,0xd0,0x36,0x42,0xe0,0xc9,0x40,0x3b,0xc3,0xe6,0x37,0x3d,0x7f,0xf6,0xe0 .byte 0x11,0x51,0xda,0xba,0x10,0x59,0xa2,0xcb,0x96,0x69,0xe2,0x84,0x2d,0x7b,0x1b,0x4b,0x81,0x5f,0xd2,0x8f,0xfc,0x2b,0x7c,0xdd,0xd6,0xcf,0xcf,0x98,0xac,0xe5,0x52,0x07,0xbf,0xe9,0xe7,0x0d,0x2d,0x6b,0xf1,0x69,0x5e,0xc8,0xaf,0xd0,0x70,0xb2,0xca,0xe6,0xc6,0x37,0x29,0x75,0xbf,0xca,0x6f,0x69,0x27,0x8c,0x15,0x3d,0x69,0x83,0xee,0x2b .byte 0x10,0x9d,0x1d,0xd5,0xad,0x36,0x5a,0x15,0x78,0x1f,0x6c,0x92,0xca,0x5a,0x84,0x1c,0x35,0x49,0x2b,0x33,0x79,0x0f,0xc2,0x84,0x54,0x24,0x3c,0xae,0xac,0x0a,0x76,0xe1,0x22,0x48,0xed,0x8f,0x89,0xeb,0x05,0xfe,0x32,0x6b,0x83,0x00,0x8c,0x36,0xee,0xff,0x1b,0xa0,0x71,0x0e,0xd8,0xe9,0x29,0xa3,0xbb,0x5b,0x8e,0xbf,0x10,0x4f,0xc3,0xeb .byte 0x3b,0x85,0x3a,0xb3,0x63,0xbb,0x77,0x1a,0x07,0x7a,0x47,0xfa,0x76,0xf5,0x05,0xc4,0xd7,0xe1,0x8f,0xd0,0x4a,0xf9,0x96,0xda,0xcb,0x84,0x43,0xe8,0x61,0xe4,0x2d,0xa8,0x1f,0x4e,0x81,0xaa,0x50,0x2a,0x66,0x2a,0x8c,0xc8,0x0f,0x1c,0x57,0x79,0xdc,0x02,0xbf,0xfb,0x1c,0x68,0xe9,0x02,0x34,0x9b,0xe6,0x2e,0xba,0x60,0x61,0x7c,0x5f,0xc1 .byte 0xa6,0x7a,0x6c,0x2d,0x02,0xb8,0x6c,0xf2,0x91,0xe3,0xf0,0xed,0xbe,0xe8,0x2d,0x03,0x5a,0x4b,0xcb,0xe5,0x3b,0x3f,0x24,0x30,0x09,0x4d,0x22,0x76,0xf6,0x20,0x9c,0x07,0x1a,0x75,0x2a,0xb3,0xd1,0x9e,0x69,0x6a,0xca,0xc4,0x54,0x5d,0xd8,0x23,0x70,0x5f,0x27,0x94,0x7b,0x0f,0x90,0x12,0xc2,0xbc,0x9c,0x5b,0x02,0x15,0x14,0x4f,0x32,0x0d .byte 0xef,0xf3,0xa5,0x2a,0xab,0xb3,0xf0,0xe9,0xdc,0x2c,0x66,0x65,0x41,0x67,0x04,0x75,0x81,0x3b,0xb0,0x53,0x42,0x88,0x74,0x26,0x7a,0x9c,0x3f,0x39,0x40,0x25,0xb6,0x4f,0x54,0x86,0xa0,0xea,0x8d,0x78,0xb5,0x43,0x5e,0xfc,0x2d,0x4d,0x14,0xcd,0x4b,0x5f,0x2e,0x37,0x0b,0x28,0xbe,0xbf,0x91,0x60,0xa5,0x40,0xdf,0x73,0xbb,0xa7,0x8e,0xc1 .byte 0xcc,0xdb,0x8e,0x3a,0xfc,0x7a,0x21,0xac,0x84,0x79,0x33,0x50,0x41,0xa1,0xad,0xb3,0x2e,0xbc,0x74,0xbd,0x66,0x3e,0x36,0x2d,0xf6,0xfd,0xba,0xc4,0x51,0x95,0xaa,0x49,0x92,0xc4,0x6a,0x56,0x9a,0x70,0x5e,0x93,0x74,0x2f,0x6b,0x15,0x60,0x1b,0x3c,0xa9,0x05,0xc4,0xe2,0x0b,0xb9,0x9e,0x86,0x60,0x29,0xb5,0x70,0xe2,0x63,0x10,0xc5,0xfa .byte 0x73,0xc3,0xb1,0x89,0xcf,0x3d,0xf0,0xf9,0x28,0xa4,0x94,0x9b,0xcd,0xd2,0x9b,0x47,0x4d,0xd4,0x0e,0xb6,0x95,0x68,0x94,0x5b,0x8d,0xcb,0x77,0xa5,0x41,0xf1,0x74,0xb0,0x43,0x9d,0x40,0x1c,0xf3,0x1d,0x66,0x6e,0x00,0x23,0x5f,0x3c,0x00,0xdd,0x9d,0x89,0x8f,0xdf,0x58,0x18,0x9c,0x2d,0xc9,0xaf,0xd5,0x73,0x38,0x23,0x5c,0x2c,0xf6,0x27 .byte 0x69,0x0d,0xc5,0xe6,0x99,0xb1,0x64,0xa5,0x60,0x74,0x1f,0x7b,0xd2,0x9c,0x1e,0x9f,0x49,0x78,0x17,0x32,0x18,0xce,0xac,0x55,0x6d,0x91,0x7a,0x69,0xed,0xa4,0xa7,0x5f,0x1f,0x5e,0xa1,0xae,0x03,0x6f,0x0e,0xe7,0xed,0x44,0xdd,0xe4,0x9b,0x25,0x4b,0xbf,0x63,0x8b,0x87,0x73,0xb5,0x6f,0x1a,0x1b,0xdc,0xb1,0xf1,0x6b,0xc8,0xb6,0x15,0x84 .byte 0xc5,0x6b,0x17,0xdc,0x8a,0x20,0xa1,0xeb,0x5b,0x60,0xb4,0x65,0x3a,0x0d,0xe2,0x42,0x97,0x2d,0x93,0xbc,0x93,0x23,0xb0,0x9a,0xa4,0x06,0xa9,0x0e,0xaf,0xa1,0xbc,0xfa,0xe8,0x8e,0xa7,0xa6,0x85,0xc2,0x8d,0x8e,0x70,0xfe,0xa7,0xac,0x8b,0x94,0x8e,0xea,0x6c,0xa6,0xf2,0x6c,0x0e,0x91,0xb6,0xc2,0x6f,0xa4,0x71,0x61,0x05,0xd9,0xb2,0xfa .byte 0x1a,0x19,0x23,0x4f,0x8f,0x41,0xec,0x9a,0x88,0x2b,0xc7,0x8d,0xf3,0x19,0x21,0xd0,0x40,0x12,0xa9,0x3b,0x44,0x54,0x26,0xc2,0x19,0x35,0x05,0xb0,0x70,0x4a,0xc5,0x91,0x63,0x1e,0x4e,0x74,0x79,0x53,0xd3,0xc8,0x3f,0x39,0x46,0x7a,0x6b,0x74,0x64,0xd3,0xa0,0x97,0x61,0xc2,0x1b,0xe5,0x7f,0x88,0xb1,0xb9,0xf7,0xae,0xbf,0x67,0xc3,0x19 .byte 0xde,0x41,0xc9,0xbf,0xd1,0x5e,0xc7,0xee,0xc9,0x54,0x02,0x8c,0x92,0xe4,0x6a,0x91,0x60,0x59,0x7f,0x88,0xef,0x0a,0xfc,0x1c,0x09,0x1c,0x9f,0xb4,0x22,0xa2,0x95,0x81,0x81,0x47,0x27,0xee,0x8b,0x7a,0x4c,0x66,0xff,0x15,0xea,0x3e,0xbb,0x41,0x1f,0x6a,0xdf,0x07,0x9e,0xb6,0x43,0xe6,0x88,0x78,0xd4,0x02,0xa7,0x0f,0x88,0x0a,0x1d,0xf3 .byte 0xe0,0x30,0x06,0x89,0xfc,0x85,0x37,0xef,0xc2,0x03,0xa6,0x2b,0xe8,0xd9,0x35,0x03,0x59,0x93,0x82,0x2b,0x54,0x2f,0x1f,0xee,0x50,0xab,0xa2,0xbf,0xcb,0x07,0xed,0x6a,0xab,0x37,0xf9,0x7e,0x21,0xf6,0xa5,0xe1,0xec,0x06,0x55,0x0e,0x78,0x60,0x18,0x80,0x07,0x62,0x56,0xee,0x3e,0x75,0x94,0x59,0x04,0xe1,0x8c,0x1d,0x07,0x22,0xa3,0x2f .byte 0x97,0xe6,0xeb,0x62,0x6d,0x3e,0xcc,0x63,0xcf,0xcb,0x53,0xd2,0x5c,0xc6,0xdf,0x9b,0x00,0xb8,0x86,0xaf,0x3d,0xdf,0x6c,0xe9,0xe0,0xf1,0xd6,0xeb,0xf0,0xe3,0xe3,0x37,0x70,0x55,0x14,0x07,0x86,0xf4,0x07,0x00,0x96,0x1b,0x7e,0xd9,0xa8,0x4b,0x15,0xa4,0xf0,0x87,0x20,0x1b,0xdb,0x6c,0xa4,0x37,0x52,0x31,0xb6,0x59,0xaf,0xc4,0x00,0xc2 .byte 0xfa,0x7c,0xc7,0xc4,0x9e,0xdf,0xd8,0x61,0x90,0x52,0xd9,0x0b,0xcf,0xe3,0xe3,0x82,0x9e,0x3d,0xb4,0xf7,0xc8,0x7b,0x17,0x1a,0xf6,0x48,0x62,0x2e,0x84,0x89,0x07,0xe1,0x8a,0xb4,0xdd,0xa5,0x46,0x9f,0x5d,0x91,0x16,0x23,0xc2,0x81,0x99,0x4f,0x3c,0xb9,0x24,0xd6,0xcc,0xfd,0x16,0xde,0x83,0x10,0xaa,0x69,0xed,0xe4,0x36,0xed,0x54,0xd8 .byte 0xe3,0xec,0x4e,0x3d,0x19,0xa5,0x09,0xd2,0xd6,0xd2,0x54,0x51,0x95,0xbe,0xf0,0x23,0xcc,0xeb,0x50,0x77,0x0b,0x94,0xa3,0x71,0xee,0x70,0x83,0x3b,0x87,0x07,0x53,0x89,0x0a,0x3c,0x60,0xb2,0xb8,0x2b,0x7e,0xf8,0x91,0xf9,0xc2,0xd5,0xad,0x2f,0x2d,0x9e,0xa2,0xfb,0xad,0xee,0x16,0x9d,0x0a,0x7e,0xaf,0x94,0x37,0x86,0x94,0xd2,0x09,0xcf .byte 0xf9,0xe3,0xfe,0x26,0xd8,0xde,0xdf,0x73,0xa0,0xcb,0x75,0x6c,0x78,0xef,0x42,0xa0,0xb4,0x25,0x2d,0x1e,0xf2,0x77,0x8e,0xd0,0x91,0xdb,0xde,0xb5,0x3b,0x32,0xfb,0x4a,0x92,0x69,0x68,0xba,0x37,0xba,0xe7,0xc4,0x3c,0xe6,0xc2,0x7f,0xc9,0x33,0xbb,0x3d,0x10,0xae,0xff,0x75,0x99,0xe7,0x2a,0x92,0xc4,0x7e,0x03,0x10,0xb1,0xa7,0x71,0x88 .byte 0x8b,0xc9,0xfe,0x73,0x17,0x44,0x06,0x6c,0x87,0xd3,0x09,0xfd,0xd2,0x9d,0x7e,0x0a,0xba,0xdc,0xab,0xd0,0xa1,0x28,0x2c,0x92,0x57,0xa3,0xfc,0x89,0xba,0xbc,0x10,0x44,0x8e,0xb6,0x86,0x20,0x1a,0xc3,0xcf,0x93,0x1d,0x33,0x08,0xf8,0x06,0x47,0x5c,0x5e,0xda,0x8e,0x2d,0x36,0xff,0xf8,0xf2,0x07,0x8d,0x99,0x6c,0xbd,0xd2,0xa0,0xe7,0x74 .byte 0x0c,0x67,0x4a,0x66,0x06,0x02,0xa5,0x01,0x51,0x0b,0x28,0xaa,0x39,0x2e,0x62,0x8b,0x2c,0xcb,0x2b,0xec,0xec,0xe3,0xbf,0x77,0x28,0x06,0x9a,0x6c,0x2c,0xb2,0xf1,0xd5,0x65,0x37,0x4f,0x46,0x5f,0xef,0x50,0x20,0xd4,0x95,0x12,0xdd,0x38,0x21,0x34,0xe5,0x21,0xd3,0x4c,0x42,0xec,0xc4,0x9c,0x4c,0x79,0xb1,0x03,0x14,0x60,0x09,0xd3,0x52 .byte 0x0e,0x10,0x1c,0x39,0xf1,0xeb,0x2f,0x77,0x9a,0xc2,0x4f,0xe8,0x71,0x0c,0xdd,0x3b,0x61,0x09,0xf3,0x63,0x11,0x56,0xde,0x54,0x13,0x82,0x18,0x38,0x40,0x92,0x81,0x4a,0xe5,0x3b,0x41,0x4c,0x37,0x9d,0xd9,0x87,0x9a,0x8b,0x2a,0x25,0xfb,0x0a,0x33,0xc8,0x33,0x30,0x54,0x6d,0x1a,0xda,0xea,0xa3,0x23,0x0f,0x2c,0x94,0x74,0x12,0xa3,0x96 .byte 0x3d,0x0d,0xad,0xe0,0xe9,0x85,0xef,0xe6,0x3b,0xb3,0x52,0xcb,0x36,0xd4,0x4a,0x50,0xf3,0x08,0xf6,0x10,0x91,0xed,0x13,0x2f,0x0f,0x02,0x61,0x72,0x8a,0x73,0x49,0x3c,0x07,0x8d,0x80,0x4b,0xb7,0xdf,0x43,0x4f,0x31,0x95,0x67,0x25,0x11,0x37,0x6e,0x79,0x6d,0xbd,0x59,0xb6,0x53,0xf1,0x0c,0x86,0x79,0x7b,0xb6,0x9a,0x34,0x92,0xaf,0x01 .byte 0x3e,0x25,0x90,0xc9,0x3f,0x73,0x67,0xb3,0x33,0xd5,0xa6,0xef,0x0d,0x85,0xcb,0xc3,0xec,0x5b,0x9a,0xcc,0x5d,0x8b,0xac,0x60,0x81,0x1f,0xea,0x12,0xac,0x27,0xc2,0xf6,0x49,0xcd,0xc2,0xe2,0xd8,0x67,0x0a,0x0d,0x65,0x5a,0x46,0x19,0x8e,0x68,0x37,0xbb,0x6d,0x2b,0x2f,0x9f,0x7a,0xaf,0x27,0x19,0x26,0xeb,0x47,0x16,0xdf,0x70,0x07,0x84 .byte 0x69,0x4b,0xb8,0xdf,0x77,0x85,0x13,0x44,0xda,0x65,0xac,0xeb,0x23,0x71,0x0b,0x45,0x8a,0xc0,0x8c,0x12,0x42,0xb2,0x24,0x8c,0x13,0x64,0x30,0x47,0x80,0x69,0x73,0xb7,0xb2,0xd7,0xb0,0x11,0x6d,0x37,0x05,0xfd,0xbc,0xf2,0x42,0xc6,0x00,0x3d,0xd8,0x17,0x58,0x38,0x3a,0xf2,0x11,0x72,0x14,0xbf,0x4a,0x90,0xf7,0x83,0x59,0x41,0x7c,0xe6 .byte 0xfb,0xf6,0x87,0x52,0xe2,0xa1,0x76,0xa8,0xb4,0x5f,0x35,0xb8,0x6d,0xee,0x27,0x50,0x55,0x8a,0xbe,0xda,0x6d,0xa1,0xe2,0x3e,0xf6,0xaf,0x6a,0x67,0xc2,0x9e,0x5c,0x13,0xd1,0x2f,0xdc,0xca,0x29,0x96,0xee,0x8e,0xac,0x04,0x6b,0x44,0x99,0x92,0x81,0x2c,0x73,0xa5,0x5d,0xcd,0xaa,0x20,0x51,0x36,0x62,0xc8,0xac,0x24,0x54,0x40,0x8e,0xd4 .byte 0x5e,0xd9,0xb7,0x88,0x64,0xb9,0x9a,0xcc,0xfe,0x78,0xbe,0xd7,0x95,0x33,0xa3,0x5f,0xff,0x3f,0xcd,0x90,0x83,0xd0,0xb6,0xcf,0x90,0x9e,0x7f,0xf1,0x3b,0x25,0xa0,0xa1,0x3f,0xfb,0xcf,0x0d,0x36,0x36,0x90,0x24,0x73,0x1d,0xeb,0x2b,0x67,0xd0,0xf9,0x01,0xe9,0x3f,0xb0,0xa4,0xd3,0xf5,0x56,0xd9,0xb0,0x17,0xe4,0x78,0x90,0x1c,0x16,0xe2 .byte 0xb4,0xd8,0x1a,0xb6,0x48,0xa3,0xc6,0x06,0xee,0x0c,0xea,0x07,0xc1,0x48,0x11,0xe5,0x9e,0x2f,0xb8,0x47,0xcf,0xac,0x32,0x35,0x8b,0xce,0x4f,0xe4,0x1a,0x8b,0xc9,0x7b,0x9b,0x07,0x27,0xf4,0x8e,0x2c,0xb5,0x61,0xef,0x85,0x7a,0x39,0xb3,0x03,0x7a,0xac,0x8f,0x64,0x53,0xd8,0x3b,0x4d,0xf5,0x80,0xab,0x2b,0x81,0xa1,0xb1,0xf0,0x2d,0x46 .byte 0xfc,0x8d,0x80,0x62,0x48,0xe0,0xee,0xee,0x87,0xc6,0xdb,0xda,0xc4,0xb5,0xe7,0x10,0xc3,0x70,0x3a,0xbe,0x8d,0x34,0xa8,0x8b,0x02,0xf6,0x11,0xbc,0x92,0x66,0x58,0x89,0x83,0xff,0x43,0xd1,0x89,0x02,0x69,0xea,0xc7,0xc8,0x4f,0x97,0xca,0x22,0x29,0x1d,0x2c,0x74,0x5e,0x21,0xdc,0x40,0x02,0xe9,0x7f,0x66,0x4e,0x9e,0x7d,0x59,0xae,0xa7 .byte 0xd4,0x1f,0xde,0xf3,0x70,0xcf,0x81,0xea,0x3c,0xab,0x4e,0xb1,0x12,0x80,0x22,0xc0,0x36,0x7c,0xb9,0x15,0x9a,0x01,0x72,0x67,0xd5,0xbd,0xef,0x68,0x37,0x18,0x94,0xb9,0xec,0x09,0xf9,0x47,0x8e,0x38,0x2e,0xe0,0xb1,0xe8,0x63,0xae,0x44,0x84,0xf2,0xc8,0x15,0x5d,0xff,0x58,0xf4,0x9b,0x48,0x4a,0x30,0x1b,0xb9,0xea,0x1a,0xce,0xc7,0xaa .byte 0xd2,0x3d,0x0e,0x3a,0x08,0xa7,0x5b,0x57,0x15,0x4f,0xfd,0x96,0xd0,0xa3,0xd3,0x98,0x9e,0xd3,0xc3,0xc3,0x00,0xc2,0xf3,0xdc,0xf8,0x25,0x59,0x42,0x09,0x19,0xa3,0x6c,0xb6,0xcf,0x22,0x4c,0xb7,0x0d,0xd3,0x8f,0xf0,0x49,0xae,0xb8,0xcd,0xdc,0x0c,0x99,0x26,0x58,0x9f,0x6b,0x59,0xbb,0xa2,0xc3,0x6b,0xd6,0xb6,0xf0,0xe1,0xfa,0x94,0x67 .byte 0xe9,0x21,0x92,0x95,0xe1,0xa3,0x76,0x07,0x98,0x43,0x29,0x98,0x3e,0xc5,0x58,0x88,0x7a,0xbb,0xb0,0x58,0x18,0x53,0x35,0xde,0x47,0xf9,0x05,0xa2,0x46,0x67,0x1c,0x09,0x9c,0x16,0x10,0x2e,0xb1,0xd3,0xda,0xea,0x20,0x34,0xf7,0xeb,0x35,0xfb,0x9b,0x74,0x38,0xbf,0xc1,0x97,0xd3,0x7e,0xe8,0xc1,0xf6,0x83,0x76,0xc0,0x94,0xa0,0xa1,0x7d .byte 0x48,0x13,0x9a,0x08,0xe8,0x8e,0xa4,0x2b,0x95,0x61,0x12,0xaf,0xbd,0xc9,0x81,0x26,0xef,0x87,0x06,0x7b,0xc3,0x52,0xc2,0xd5,0xde,0xf3,0x55,0x34,0x71,0xc6,0xe3,0xe9,0xf7,0x5e,0x0b,0x6e,0xd4,0xee,0xeb,0xb3,0xa0,0xf9,0x99,0x33,0x14,0x5d,0x28,0x1a,0x57,0xcf,0xf5,0xa9,0x92,0x08,0xa6,0x10,0x6d,0x5a,0xd5,0x6b,0xe0,0x15,0x17,0x06 .byte 0x72,0x32,0xcd,0xc7,0x79,0x1b,0x4c,0x12,0x78,0xea,0x88,0xb3,0x1a,0x4c,0x9a,0x3c,0xbe,0x41,0xe9,0x69,0xb5,0xe3,0x4c,0xd7,0xce,0x86,0x3b,0xca,0x3f,0xf6,0xaa,0xa2,0xc4,0x34,0x41,0x89,0x2c,0x9d,0xdd,0x0e,0x01,0x0c,0x35,0xa0,0xe8,0x7f,0x26,0xcd,0x0c,0x27,0x16,0x70,0xaf,0x8d,0x30,0xcf,0xe5,0x22,0x21,0x95,0xf6,0x98,0x84,0x2e .byte 0x03,0xf2,0xdc,0x7a,0x00,0x1a,0xed,0x6c,0x5f,0x8d,0xb6,0xed,0xa9,0x84,0xb0,0x12,0x35,0xbf,0x55,0xe2,0xe5,0xae,0x52,0x03,0x9a,0xf9,0x69,0x30,0xd5,0x58,0x1b,0x88,0xf2,0x63,0xff,0xfd,0x47,0x47,0x86,0xae,0x7b,0x18,0xd1,0x67,0xcf,0x49,0xb6,0xfd,0x8b,0x76,0xbe,0x2d,0x91,0x6c,0x52,0xd4,0x85,0xec,0xd9,0x1b,0x73,0x0b,0x3f,0xfa .byte 0x83,0x70,0x0a,0x5f,0xd6,0x91,0x52,0x33,0xe0,0x92,0x0b,0x99,0x52,0xa8,0x59,0xe1,0x71,0xfa,0x45,0x29,0x25,0x56,0xd1,0xc2,0xf9,0x66,0x5c,0x48,0x41,0x2a,0xe8,0x1e,0x34,0x04,0xbd,0xd8,0xe6,0x7f,0x87,0x88,0x37,0x14,0x91,0xea,0x48,0x30,0x0b,0x93,0x68,0x37,0x8c,0x75,0x8c,0x3d,0x3d,0x36,0xa2,0x83,0xf4,0x4c,0x27,0x59,0xef,0x9e .byte 0x8d,0x98,0xcc,0x97,0x0c,0x49,0x7b,0x32,0xa7,0x32,0x50,0x7d,0x47,0x6e,0x53,0xca,0xa2,0xec,0xa7,0x62,0x6b,0x08,0x50,0x72,0x5c,0x92,0x71,0x35,0xde,0x0b,0xde,0x15,0xc6,0x46,0xa1,0x3a,0x82,0x09,0xe7,0xcd,0x7b,0x11,0x1e,0x34,0x6d,0x7f,0x3e,0x8c,0xc9,0x27,0x88,0xc9,0x35,0xe7,0x1d,0x0a,0xb1,0x5e,0x85,0xfa,0x6e,0x47,0xa3,0x4f .byte 0x22,0x84,0x16,0x36,0x84,0x1b,0x28,0xe8,0x28,0xdb,0x0b,0x41,0xca,0xf1,0x93,0xd9,0x3f,0x3c,0xe9,0xbc,0x46,0x0b,0x8c,0x34,0x04,0x3a,0xd4,0xfc,0x87,0x1b,0xd6,0x9a,0xe4,0x01,0x9e,0xf0,0xa9,0x83,0xca,0x72,0xfe,0x25,0xb3,0xc8,0x9a,0x07,0x84,0x61,0xea,0x6a,0x11,0x3f,0xaa,0x85,0x19,0x89,0xa7,0x1b,0x47,0x85,0x1e,0x72,0x29,0xc3 .byte 0x43,0x2a,0xc7,0xcc,0x6d,0xec,0x16,0x12,0xfa,0xa3,0xa0,0xce,0x3f,0x64,0xb2,0x40,0x90,0x57,0x0f,0x0b,0xd7,0x21,0xe8,0x9d,0x12,0xf8,0x77,0xd8,0x88,0xf9,0xb7,0xdc,0x82,0xb4,0x07,0x52,0x01,0xdf,0xb5,0x58,0x5f,0x39,0x53,0x66,0x52,0xaf,0xb0,0xa5,0x3a,0xa3,0x8b,0xc2,0xca,0xd7,0x46,0x31,0x95,0xcc,0xa6,0xfb,0xb0,0x2b,0x1e,0x1e .byte 0x3a,0x99,0xc0,0x67,0x98,0x0d,0xb0,0x61,0x58,0x10,0x1f,0x47,0x7d,0x4d,0x11,0x69,0xf5,0xe5,0x6a,0xbf,0xbc,0x83,0x4c,0xef,0xef,0x8f,0x15,0x08,0x32,0xae,0x47,0x0c,0x9f,0xfd,0x10,0xa5,0xc6,0xe1,0x11,0x26,0x20,0xfe,0xb4,0xd6,0x7a,0xd3,0x16,0x5c,0xaf,0x0f,0xd6,0x12,0x44,0x1e,0x99,0x46,0x6d,0x22,0x35,0x52,0x90,0xb7,0xe7,0xc9 .byte 0xb4,0xdd,0x18,0x86,0x4f,0x94,0xa2,0x7c,0x10,0xb1,0x00,0xb9,0xea,0x30,0x6a,0xfe,0x84,0xb8,0x18,0x28,0xd0,0xa3,0x1b,0xfa,0x65,0xbe,0x67,0x0f,0x0d,0x28,0x32,0x05,0x3c,0xf1,0x15,0x9c,0x54,0x92,0x41,0x4f,0x7d,0x32,0x01,0x49,0x8d,0x83,0x01,0x51,0x70,0x24,0x7e,0x53,0xf8,0x69,0x96,0x56,0xd4,0xe5,0xe7,0x37,0xd5,0x5b,0x9a,0x2d .byte 0x41,0x33,0x52,0x84,0x1c,0x13,0xae,0x67,0x96,0x9f,0x96,0x5f,0x6a,0xc4,0x55,0x4d,0x68,0x7c,0x27,0x0b,0xc9,0x15,0x01,0x47,0x40,0x42,0x45,0xaf,0x33,0x20,0x62,0x53,0xed,0xe0,0x0e,0x84,0xaa,0x26,0x76,0x30,0x0d,0x4d,0x64,0x5b,0x68,0x4c,0x04,0xe1,0xe3,0x57,0x66,0x88,0xd7,0xe5,0x3b,0x5c,0x7d,0x70,0x56,0xe1,0x18,0x48,0x18,0x80 .byte 0xab,0x4d,0xd8,0x16,0xdb,0x31,0x58,0x6a,0xea,0xd7,0xca,0x80,0x42,0xa0,0x02,0x4c,0x99,0xdc,0xff,0xa4,0x4e,0x99,0x8e,0xba,0xae,0x9b,0xc4,0xe5,0x80,0xce,0x51,0x26,0x5c,0x83,0xa4,0xdb,0x4c,0x98,0x20,0xc6,0x09,0xd1,0x11,0xab,0x29,0x48,0xc9,0x58,0xb4,0xa8,0xd0,0x8c,0xe5,0x5f,0xa8,0x80,0x19,0xc3,0x8c,0xb1,0xb6,0xae,0xfc,0x80 .byte 0x99,0x35,0x49,0xfb,0x8c,0xae,0xb0,0x28,0x74,0x6a,0xf5,0xc4,0x2a,0x23,0x6e,0x09,0x1e,0xe6,0xdb,0x97,0x65,0x89,0x4f,0x45,0xbd,0x45,0x35,0x08,0x34,0x3f,0x13,0x59,0xf8,0x78,0x26,0xc0,0x26,0x00,0x24,0xa1,0xda,0x66,0xd8,0x87,0x03,0x3a,0x31,0xd1,0x66,0xc1,0xdc,0x7b,0x2a,0x67,0x57,0x5b,0xfb,0xfb,0x07,0xe9,0xdc,0x3a,0x2e,0x03 .byte 0x3f,0x63,0x1c,0x1d,0x28,0x85,0x8e,0xbf,0xec,0xc6,0xcd,0x6c,0xf6,0x86,0x12,0x0f,0x92,0x03,0x70,0x14,0x5c,0x48,0x1c,0x13,0xe8,0xbd,0x32,0xfd,0xa5,0xfd,0x93,0xa8,0x64,0x50,0x5d,0x35,0xcd,0x08,0x31,0x90,0xd2,0x33,0xb4,0x42,0x92,0xb5,0x45,0x42,0x32,0x1b,0x25,0x29,0x18,0x04,0xf2,0xea,0x41,0x8b,0xcd,0x8c,0xb2,0xc6,0x30,0x06 .byte 0xd6,0x57,0x69,0x5f,0x34,0xf4,0xcd,0xc9,0xf5,0x36,0x7d,0x91,0x11,0x71,0x8c,0xa1,0xda,0x5f,0xca,0xd9,0x23,0xf0,0x77,0x7d,0xcc,0x01,0x70,0x3b,0x9e,0x3d,0x65,0xb0,0x44,0x41,0x5d,0x4e,0x91,0x4b,0xfd,0x8b,0x47,0xc7,0x36,0x41,0xf1,0x58,0xb0,0xd9,0xb6,0x62,0x3e,0xd6,0x24,0xa6,0x87,0xfe,0x63,0x0b,0x29,0x3c,0x80,0xd4,0x93,0x81 .byte 0x4a,0x41,0x85,0x9d,0xe6,0x36,0xd0,0xdc,0x0b,0xb5,0x5d,0x8b,0x22,0x7e,0xaf,0x11,0xb9,0xd1,0x49,0xdf,0xdb,0xde,0xa8,0xc7,0x9c,0x01,0x6b,0xd7,0x86,0xf0,0x79,0x3b,0x3a,0x89,0xd0,0x02,0x34,0x55,0x1d,0x27,0x17,0xca,0x44,0x47,0xc2,0x06,0x69,0x77,0xc4,0x63,0x80,0x05,0x99,0x2e,0x7b,0x57,0x3c,0x86,0x5f,0x38,0xe1,0xb2,0x4c,0x33 .byte 0x30,0x4b,0x90,0x68,0xc0,0xe1,0x20,0x12,0x25,0xda,0xfc,0xc3,0x49,0x16,0x96,0x80,0xd2,0xae,0xcd,0x5e,0x1a,0x02,0x07,0x97,0xaf,0x97,0xf9,0xd0,0x0c,0x23,0x27,0x08,0x14,0x19,0xdc,0xe9,0x11,0x6c,0x58,0x3c,0xfb,0xbc,0xd4,0x18,0x0d,0x44,0xa8,0x2b,0xe9,0x66,0x3e,0x06,0xe4,0xb6,0xdd,0x00,0xd6,0xd1,0x7b,0xce,0xcd,0xe1,0xf0,0x35 .byte 0x1c,0x96,0xff,0xf1,0x62,0x95,0x35,0x35,0xcf,0x37,0x8c,0xdc,0x09,0xac,0xaa,0x95,0x0f,0x7e,0x9f,0xc0,0xbe,0x06,0xe8,0xf6,0x2c,0x1c,0x19,0xb5,0xdf,0x0a,0xd9,0xfc,0x83,0x99,0xad,0xdb,0x5e,0x8f,0x7f,0x1d,0x3e,0x25,0x7a,0x3e,0x25,0xf8,0xb3,0x43,0xfe,0x13,0x8c,0x58,0xb7,0x5a,0xc8,0xf6,0x7a,0x4a,0x63,0x57,0x2c,0x53,0x06,0x2d .byte 0xae,0x16,0xb5,0xac,0x1d,0x21,0x34,0xbb,0x26,0x8a,0x09,0x93,0x2c,0x1c,0x38,0x86,0xda,0x49,0x24,0x83,0xdd,0xa8,0x32,0xdf,0xcb,0x74,0x00,0x10,0xe0,0x87,0x48,0xdb,0xfb,0xce,0xd9,0xe8,0xd3,0x73,0xcb,0x6c,0x7f,0xbf,0xba,0xe4,0x7f,0x78,0xb1,0x65,0xf7,0xdc,0x0e,0x71,0x1d,0xdb,0x1f,0x3e,0x4e,0x2d,0x56,0x12,0x7e,0x53,0xe9,0x77 .byte 0x24,0xa7,0xf4,0x02,0x47,0xf1,0xa1,0x0f,0xc7,0xe2,0x5c,0x4b,0xf1,0x8b,0xda,0x05,0xe6,0x66,0x08,0x1c,0x84,0xa5,0x75,0x3a,0x6f,0xc7,0xd3,0x50,0x5d,0xce,0x09,0x9e,0x8e,0xa8,0x1a,0xc7,0x1d,0x28,0x13,0x80,0x3b,0x36,0x0c,0x3b,0x9c,0xea,0x53,0xe6,0xe4,0x35,0x5e,0x15,0x1a,0xa5,0x28,0x70,0x9c,0xde,0xbc,0xd6,0x04,0x94,0xcb,0xd8 .byte 0x29,0xe5,0xc6,0x94,0x61,0xe0,0x73,0x61,0x66,0xa9,0x85,0x23,0xb5,0x3e,0x7f,0x4b,0x54,0x20,0x49,0x05,0x88,0x09,0xe4,0xee,0x25,0xeb,0x86,0x5a,0x17,0xed,0xed,0xe7,0x25,0xfe,0x4f,0x89,0x05,0x2f,0xfb,0x1c,0x19,0x5c,0x66,0x47,0xf9,0x53,0x30,0xa8,0x64,0x97,0x4a,0x39,0x9a,0x4a,0x88,0x30,0xce,0xdf,0x67,0xae,0xa9,0x2c,0x0e,0xf3 .byte 0x12,0xe0,0x6a,0xaa,0xa1,0x2e,0x85,0x0f,0x96,0xe6,0x6a,0x33,0xb6,0xf0,0x16,0xb6,0x1e,0x44,0xac,0xdf,0x16,0xd5,0x8e,0xaf,0x65,0x9c,0xe9,0x65,0xea,0xe8,0x35,0x91,0xca,0x2e,0x8d,0xc7,0x6b,0x2f,0xae,0xbc,0xc5,0x49,0xfd,0x2a,0x2d,0xec,0xd8,0x67,0x56,0x68,0xa2,0xdd,0x5d,0x51,0x75,0x30,0x2e,0x56,0x50,0x4d,0xa4,0x6f,0xe1,0xb4 .byte 0xa5,0x9b,0x35,0x3b,0xc8,0x1a,0xd5,0x78,0x22,0x49,0x44,0x27,0xe7,0x67,0x60,0x91,0xb0,0x08,0x1c,0x83,0x3c,0x64,0x27,0x15,0xcf,0xbd,0x69,0xfe,0x56,0xff,0xab,0x56,0x1d,0x79,0xe6,0xc3,0xbd,0xce,0x75,0xf0,0x4f,0xa7,0x7a,0x9a,0x2e,0x7a,0xd7,0xf7,0xac,0xfb,0x87,0x8e,0x87,0xc6,0x10,0x3c,0x4c,0xb2,0xe3,0xf7,0xae,0x7d,0xaa,0x0c .byte 0x46,0x17,0xce,0x61,0xce,0x73,0xc5,0x0d,0xdb,0x8e,0x8c,0x21,0x7b,0x7c,0x09,0x34,0x5d,0x3f,0x44,0xf0,0x16,0x7c,0xe2,0xdd,0xf2,0x07,0xd6,0x53,0x3c,0x0a,0xe9,0xfd,0x7a,0x41,0x13,0xcf,0x7c,0xa2,0x11,0xca,0xb5,0xdb,0x10,0x21,0x68,0x02,0x85,0xb6,0xe3,0xd4,0xb9,0xf7,0x9c,0xdf,0x54,0xaf,0x48,0x67,0x3e,0xd2,0x04,0xde,0xce,0x53 .byte 0x1a,0x9b,0x6b,0xd4,0x5e,0xb2,0xd0,0xa5,0xc8,0x7b,0x2e,0xb3,0xd8,0x46,0xc2,0x57,0x69,0x69,0xe6,0x54,0xee,0xf9,0x48,0x04,0x4e,0x11,0x2e,0x80,0x53,0x87,0x61,0xc7,0x1b,0x75,0xab,0xac,0x5f,0x17,0xda,0x25,0x5f,0x66,0xa0,0x59,0xfb,0xc2,0xf0,0xbf,0xc2,0x53,0xdc,0x8e,0x2d,0x41,0x13,0x7c,0x29,0xf0,0x80,0x70,0xb5,0x07,0x14,0x6c .byte 0x5f,0x3a,0x66,0x1a,0xf8,0x7f,0xb4,0x8e,0x55,0xe8,0x2d,0x5b,0xec,0x65,0xe6,0x7b,0xf2,0xde,0xa2,0x51,0x45,0x9a,0x8a,0xfa,0xba,0x0c,0xcb,0x28,0x27,0x2c,0x01,0x81,0x38,0x5b,0x2e,0xbb,0x31,0x37,0x77,0xe7,0x52,0x2c,0xf9,0xb8,0x42,0x76,0x49,0x81,0xd4,0x64,0xd0,0x86,0xd4,0x3d,0x2c,0x74,0xca,0x4d,0xbb,0xa6,0x99,0x9d,0x79,0xd6 .byte 0x52,0x5e,0xfd,0xd4,0xc2,0x50,0x48,0x2e,0x4d,0x9c,0x4e,0xe6,0xbe,0x57,0xdb,0x28,0xf2,0xc0,0x25,0x9f,0x26,0x0e,0xc7,0x61,0xa0,0x77,0x7c,0x3d,0xf4,0xec,0x70,0x6c,0x06,0x37,0x3f,0xa2,0x3c,0x70,0xca,0x53,0xcb,0x56,0x51,0x0f,0x30,0x20,0x16,0x21,0xac,0x3a,0xe5,0x78,0x4c,0xe2,0x8e,0x9f,0x6e,0x36,0xb2,0x3d,0xb2,0x15,0x10,0x06 .byte 0x8e,0xff,0xa4,0x62,0x8e,0xa7,0x61,0x56,0xe7,0x27,0xa6,0x72,0x24,0x0b,0x47,0xca,0xa6,0x6b,0x74,0x5f,0x5e,0x80,0x64,0x47,0x1f,0x95,0x20,0x99,0x13,0x66,0x99,0x92,0xe7,0x82,0xdb,0xa1,0x97,0xdc,0x2d,0x35,0xa2,0xc9,0x91,0xf4,0x12,0x91,0xdd,0xb3,0xb4,0x7a,0x34,0xa0,0xd6,0x02,0xb1,0x38,0x42,0xad,0x53,0xd4,0xd1,0x82,0xd0,0x3f .byte 0xb4,0x32,0x7a,0x70,0xe2,0x6e,0xae,0x9c,0x99,0xe3,0x62,0x6e,0x7d,0x01,0xcd,0x3b,0x4e,0xb0,0x57,0x9d,0x47,0x6f,0x2a,0x62,0x12,0x44,0x28,0xfd,0x78,0x00,0x08,0x9a,0x2b,0x5b,0x3f,0x62,0x24,0x94,0x75,0x5c,0x1e,0x8b,0xc4,0x3c,0xbc,0x7d,0xe8,0x10,0xbf,0x9d,0x23,0x52,0xc8,0x65,0xe8,0x39,0x8a,0x97,0x70,0xbb,0xa4,0x09,0xf8,0x29 .byte 0xd2,0x36,0x7a,0x46,0x4a,0x19,0x68,0xe8,0x57,0xc8,0x3c,0x88,0xa2,0x8c,0x01,0xa5,0x21,0x32,0xff,0x6c,0xa7,0x6f,0x07,0x94,0xc3,0x07,0xfc,0x09,0x1a,0x0c,0xe4,0x01,0x41,0x51,0x80,0xf2,0x47,0x41,0xe7,0x8d,0x97,0x34,0xe4,0xdf,0x21,0x17,0x27,0x41,0x8c,0x31,0x03,0x5e,0xee,0x36,0xaf,0x37,0x4f,0x89,0x92,0x6b,0x03,0xb1,0x19,0xc1 .byte 0x26,0xb1,0x32,0x68,0x6f,0x9e,0x1c,0xc4,0x7f,0xce,0x1f,0xa9,0xd7,0xd8,0x19,0xd4,0x76,0xd5,0xe5,0xe6,0xeb,0x99,0x45,0xe6,0x72,0x2e,0xdb,0x13,0x2b,0x4d,0xdd,0x39,0x2a,0xd4,0x0f,0x26,0x49,0x81,0xaa,0x9d,0x6a,0xad,0x0e,0x58,0x81,0xc8,0x74,0x60,0xb3,0x29,0x92,0xc4,0x2e,0x3c,0x2b,0xdd,0x7f,0x13,0x91,0x84,0xa4,0xc5,0x8e,0x75 .byte 0xcd,0x83,0x4b,0x9f,0xfa,0x6e,0x29,0x1d,0xa5,0xfd,0x97,0x6e,0x36,0xcb,0x50,0x3f,0x68,0xac,0xec,0xee,0x00,0xb8,0x38,0xb9,0xcb,0x8b,0xf6,0x1c,0x45,0x28,0x8d,0x6f,0x5a,0x97,0x64,0x9c,0x52,0x40,0xff,0xbb,0xf6,0x46,0x1f,0xcc,0xad,0x93,0xcb,0x3a,0xce,0xc9,0xae,0x03,0x04,0xe0,0x9b,0x54,0xde,0xe0,0xdc,0xbf,0x9f,0x4e,0xb6,0xc4 .byte 0x0f,0x1b,0x95,0x92,0xbc,0x8e,0x70,0x2b,0xbf,0x8d,0xf1,0xdd,0x4c,0xad,0xb6,0x5d,0xbd,0x36,0x5a,0x3c,0x0e,0x0b,0x83,0x1a,0x5d,0x0a,0xaf,0x0b,0x69,0x46,0xb4,0x42,0x3c,0x5c,0xe2,0x7d,0x75,0x3c,0x6b,0x03,0x32,0x1b,0xd0,0xe9,0xe7,0xe3,0x87,0xe8,0xd2,0x39,0x3b,0xe0,0x5f,0x8e,0xf7,0xeb,0x89,0x2e,0x0f,0x3f,0x1e,0xf3,0x34,0x0d .byte 0x86,0x6b,0x28,0xbb,0x7c,0x7a,0x61,0xb2,0xab,0xfe,0xbc,0xba,0xaf,0xf5,0xab,0x2d,0xe9,0x9b,0x88,0x8b,0xd0,0x2d,0x3e,0xf6,0x12,0x25,0x24,0x63,0x60,0xfb,0x32,0x23,0x5a,0xbf,0x1a,0x3e,0x07,0xb9,0x46,0xe6,0x09,0x30,0xa8,0x59,0x87,0x14,0xcc,0x94,0x0b,0xa4,0xac,0x31,0x51,0x04,0xde,0xda,0xe4,0x50,0x5a,0xa2,0x9e,0xae,0x3f,0xed .byte 0xaf,0x9d,0xc7,0x6f,0xf3,0x05,0x2b,0xb8,0xd9,0xcc,0xe9,0xc1,0x7e,0x9c,0xbb,0x86,0xe3,0x3b,0xa0,0xc3,0x0b,0x38,0x28,0xf1,0x83,0x50,0xc8,0xf2,0x1f,0x05,0xcc,0x1b,0xd1,0x59,0xff,0x73,0xb0,0x13,0x75,0x59,0x22,0x4d,0xac,0x65,0x75,0x47,0x3b,0x37,0x91,0xf1,0x40,0x6b,0x7b,0xe8,0x72,0xe5,0x11,0x12,0x23,0x5a,0x2c,0x9c,0xa2,0xe5 .byte 0x14,0x5b,0x17,0xb5,0x41,0x95,0xdd,0x0d,0x0b,0x70,0xba,0xbc,0xb7,0x55,0x37,0x77,0x1e,0x32,0xf4,0xba,0x57,0x81,0x0b,0x64,0xf6,0x1f,0x57,0x99,0xeb,0xb2,0x06,0x9c,0x6c,0x4f,0x1c,0xbf,0xca,0x79,0xeb,0xff,0x6e,0x32,0xaf,0x0e,0x2b,0xf3,0xbb,0x75,0xf8,0x80,0x9f,0x95,0xb3,0x35,0x63,0xe0,0x92,0x8f,0x50,0xa3,0x41,0x38,0xb7,0x7b .byte 0xa1,0x3b,0xde,0x69,0x85,0x36,0xb7,0x44,0xb3,0xb2,0xc5,0x85,0xd3,0x9a,0x78,0x26,0x97,0xc1,0x58,0xfd,0x0f,0x27,0x74,0x93,0x0e,0x54,0x23,0x6f,0x5c,0x48,0x38,0xb9,0xb5,0x7d,0x17,0x23,0x5a,0x36,0x32,0xdd,0x40,0x7e,0x1c,0xb4,0x65,0x84,0x83,0xcc,0x6e,0xa0,0x3a,0xa6,0xbe,0xf8,0xca,0x55,0xf4,0x0a,0x65,0x83,0x52,0x14,0x9d,0x10 .byte 0x4a,0x31,0xe7,0x05,0x99,0x01,0xb3,0x01,0x47,0x64,0xa2,0xee,0x8f,0xf1,0x77,0x91,0x94,0xa3,0xad,0xfc,0xfa,0x7e,0x92,0x90,0x41,0xb6,0x2a,0xb7,0xa1,0xfa,0xf3,0x74,0x8f,0x27,0xe1,0x48,0xe1,0x96,0xff,0x85,0xd4,0x40,0x76,0x15,0x2a,0x6c,0xce,0xdb,0x72,0x0b,0xf6,0x33,0x5f,0xa0,0x72,0xf1,0xf1,0x92,0xaa,0xfc,0x75,0xef,0x11,0x2b .byte 0x71,0x2f,0x6b,0xe4,0x70,0x13,0xa3,0xbe,0xfc,0xa4,0x35,0xc5,0xa7,0x2a,0x94,0x34,0x7a,0x15,0x7e,0x0d,0x8b,0x92,0xe6,0xfb,0x12,0x77,0xf9,0xe3,0x0e,0xce,0x1e,0x84,0xcd,0x3a,0xce,0x44,0x65,0xe8,0x6c,0x0b,0x86,0x70,0xe9,0x66,0x18,0x37,0x3d,0xc0,0xc0,0xcb,0xe0,0x7b,0x16,0xda,0x89,0xc9,0x8e,0x83,0xc4,0x21,0x40,0x65,0xd2,0xe8 .byte 0x3f,0xa5,0xda,0xe9,0x4b,0x2e,0x1d,0x89,0x4d,0x3b,0x84,0x4b,0xfd,0x0e,0x2c,0x50,0xe2,0x01,0x7d,0xec,0x12,0x81,0x49,0x9b,0xe3,0x14,0xd8,0xb4,0xe3,0x44,0x06,0x7f,0xbf,0x92,0xd4,0xb8,0x65,0x1f,0xdb,0x7a,0xb4,0xd6,0x9e,0x0c,0xe0,0xc2,0xc9,0xe8,0xc9,0xf8,0x34,0xff,0x7b,0x1a,0x0d,0xc9,0xc7,0x77,0xf2,0x44,0x79,0xdb,0xef,0x31 .byte 0x61,0xd4,0x85,0x0d,0x0f,0x11,0x29,0xfb,0x07,0xe0,0x83,0x11,0x81,0xbb,0xe0,0x6e,0x1c,0x0a,0x31,0xe3,0x29,0x53,0x91,0xab,0xea,0xc8,0x2f,0xaf,0x96,0xe7,0x64,0x8b,0xfd,0x4f,0x49,0xf5,0x1f,0x93,0x3b,0x32,0xdf,0x0c,0x1d,0x8e,0x33,0x15,0x00,0x7c,0x0c,0x4b,0x95,0xd5,0x09,0x8f,0x48,0xc3,0x6e,0xdc,0xd8,0x5d,0x36,0x53,0xc2,0x19 .byte 0xef,0xd7,0x50,0x0d,0xa2,0xc9,0x39,0xd1,0xef,0xe4,0x26,0x30,0x27,0x77,0x79,0x85,0x18,0x39,0xb7,0xb7,0xb6,0xba,0xf2,0x1f,0xa4,0xee,0x53,0x7b,0x43,0xff,0xd6,0x1c,0xa8,0x32,0xb7,0xfb,0x9b,0x45,0x6f,0x0f,0x60,0x62,0x5c,0xfe,0x02,0x5d,0x11,0xeb,0xe5,0x27,0xde,0x75,0xd4,0x11,0xbb,0xa4,0x7f,0xa0,0xb6,0x23,0x8a,0xbb,0x75,0x3c .byte 0xba,0x8b,0x3d,0x61,0x93,0xc2,0x1b,0x6f,0x79,0x93,0xc2,0x22,0x4c,0x48,0xe9,0x94,0x6e,0xed,0x2c,0x1d,0x51,0x0e,0xa6,0x69,0x1d,0x62,0xeb,0x67,0x47,0x5d,0x2f,0xa8,0x47,0x4f,0xe7,0x2f,0x65,0x92,0xd7,0x55,0xc1,0x46,0xfe,0x1d,0xfc,0xef,0x26,0xaf,0x3a,0x18,0x63,0x02,0x4d,0x8b,0xf4,0x24,0x99,0x3f,0x1a,0x74,0xd2,0x8e,0xd8,0x9e .byte 0xd6,0x3b,0xf9,0xce,0x67,0xa3,0xa6,0x0a,0x74,0x21,0x4e,0x0e,0x15,0x07,0xb6,0xbf,0xa2,0xcf,0x6e,0xf7,0xfa,0x49,0x98,0xfa,0xa0,0xf7,0xf0,0xd8,0x50,0xbf,0x6f,0x64,0x93,0xac,0xe0,0x88,0x04,0x04,0x74,0xa4,0xdd,0x9f,0x75,0xfe,0x30,0x37,0x77,0x09,0x1c,0xfc,0x54,0x47,0x4d,0x3f,0xda,0xfe,0x14,0x50,0x19,0x5e,0x88,0x4a,0xe9,0xcb .byte 0x5e,0x60,0x4e,0xef,0x5b,0x15,0x10,0x3b,0x1d,0x98,0x43,0xe4,0xbe,0x92,0xc6,0x8f,0x04,0x0e,0x04,0x16,0x68,0x82,0x1c,0xfe,0x30,0x9a,0xd2,0x4b,0x25,0xd7,0xed,0x19,0x22,0x06,0x09,0x3b,0x26,0xa6,0x9a,0x17,0x65,0x01,0x8f,0x70,0x8a,0x83,0x2a,0xa3,0xbf,0xeb,0xf9,0x3f,0xf3,0x5a,0x3f,0x62,0x86,0x6a,0x3b,0x3b,0xe3,0x43,0xc8,0x4c .byte 0x79,0x46,0xd3,0x9f,0x98,0x0d,0xac,0x11,0xf9,0xa3,0x46,0xe1,0xea,0x8c,0x1d,0x26,0x5e,0xca,0xd1,0x84,0x3b,0x01,0xb2,0x3d,0xe8,0xe5,0x8f,0x78,0x41,0x76,0xe9,0x18,0xcd,0x34,0xd9,0x48,0xb0,0x34,0xda,0xc2,0x34,0x3a,0x58,0x9d,0x12,0xa7,0x2a,0x73,0x40,0xc5,0x28,0x67,0xef,0x1a,0x7a,0x39,0x45,0x86,0x02,0x47,0xb8,0xde,0xc9,0x6b .byte 0x78,0x7a,0x01,0x48,0xa8,0xc6,0xc4,0x57,0x52,0xa9,0xad,0x8e,0x4e,0x22,0x1a,0xc5,0x21,0x65,0x98,0x0a,0x1d,0xf5,0x68,0x13,0xd8,0xef,0xb9,0x40,0x49,0x98,0x02,0x76,0x54,0x0f,0x36,0xf8,0x8f,0x88,0xfc,0xec,0xe1,0x73,0xc0,0x45,0xe1,0x1a,0x92,0x86,0x7b,0x78,0x63,0x7e,0x06,0xce,0x16,0x39,0x57,0xbc,0x96,0x63,0x32,0x99,0xad,0xff .byte 0xeb,0x63,0x33,0x35,0xef,0x33,0x08,0xca,0x0c,0xac,0x4b,0xc1,0x26,0xa1,0x7a,0x71,0x8e,0x2d,0x18,0x8b,0x6c,0x4a,0x18,0xa1,0x6c,0x15,0x9b,0xb8,0xc1,0xa1,0xc2,0x01,0x6e,0x65,0x40,0x6b,0x8c,0xf7,0x61,0x93,0x3f,0xe3,0xf0,0x56,0xe3,0x3d,0xa1,0x59,0xd9,0x80,0x6b,0x0c,0xe2,0x84,0x56,0xb5,0x06,0xc0,0x83,0xc3,0xf3,0xdd,0xfc,0xc9 .byte 0xad,0xa0,0x0e,0x5f,0x3b,0x36,0x79,0x46,0xc3,0x0e,0x6c,0x74,0xb0,0xc1,0x75,0xd1,0xe4,0x0b,0xd6,0x8e,0xbd,0x32,0x68,0x8f,0x77,0x0e,0xd4,0xdc,0xa1,0xa8,0x02,0x07,0xef,0x7d,0x5b,0x88,0x29,0x3f,0x7a,0x0a,0x46,0xf1,0x6b,0xfd,0x87,0x59,0x61,0x13,0x69,0x66,0x92,0x3a,0xd9,0x45,0xb7,0x76,0x10,0xad,0x31,0xe0,0x36,0x7e,0x6e,0x57 .byte 0x65,0x95,0x53,0xc6,0xd3,0xbb,0x6d,0xd2,0x5f,0xd6,0xed,0xbe,0x83,0x7e,0x51,0x0b,0x54,0xc4,0xf7,0xda,0xe1,0x3b,0x96,0xae,0x86,0x90,0x7f,0x1d,0x16,0x37,0xfa,0x7c,0x2e,0x9b,0x27,0x4e,0xf5,0x44,0xf3,0x72,0xec,0xd4,0xa1,0xc8,0xcf,0xb6,0xda,0x26,0x95,0x37,0xbf,0xdc,0x2e,0x3b,0xd4,0xf1,0x09,0x14,0x58,0x8e,0x01,0xcb,0x8c,0x28 .byte 0x18,0xdd,0x71,0x99,0x7b,0xdf,0x94,0x77,0xc6,0x39,0xea,0x61,0x8a,0x71,0x9a,0xe3,0xd2,0x14,0x6c,0xec,0xfc,0xc6,0x6e,0xf8,0xe2,0x5b,0x55,0xe5,0x58,0xfc,0x06,0x65,0xdb,0xbc,0x9f,0x22,0x30,0x98,0x40,0xc5,0xcf,0xa8,0x97,0xab,0x2e,0x15,0x79,0xe0,0x30,0xb5,0x28,0xd5,0x32,0xec,0x2d,0x4b,0x2c,0x00,0x47,0xdf,0xc5,0xc2,0x19,0x3d .byte 0xf5,0xc9,0xff,0x7b,0x7a,0x97,0x5f,0x8c,0xd9,0x0f,0x8c,0xa5,0x84,0x1f,0xd6,0x2b,0x36,0x94,0xf9,0xf2,0x92,0x46,0xb9,0x3d,0x67,0xc6,0x4a,0x14,0x57,0xb6,0x16,0x90,0x31,0xd9,0x8e,0xb7,0xbf,0x7b,0x74,0xde,0x7f,0x0e,0x34,0x14,0xb8,0x83,0x7e,0x31,0x15,0xb0,0xa1,0xc8,0xfc,0x28,0x3f,0x7e,0x2b,0xe8,0xc3,0xf6,0x49,0x2d,0x03,0xc6 .byte 0x94,0x8f,0xe8,0x97,0x46,0x2b,0x83,0x1c,0xe2,0xab,0xe3,0xf1,0xc4,0x20,0x0c,0xa6,0xca,0x78,0x89,0x66,0xb1,0xce,0x8e,0x0d,0x07,0x97,0x9a,0xce,0x8f,0x63,0x9b,0x5a,0x2f,0x51,0x38,0x40,0x37,0xa1,0x8b,0x13,0x51,0xe0,0x4c,0x86,0x8f,0x90,0xe8,0x00,0x1b,0xef,0xb7,0x98,0x7e,0xb8,0xf4,0x29,0xe8,0xa6,0xba,0x58,0x19,0x5f,0x13,0x5e .byte 0xd6,0x21,0x48,0x8b,0x64,0xee,0xd5,0xc9,0xbd,0x12,0xf4,0xf1,0x2b,0x89,0xaf,0x50,0xab,0x0c,0x9a,0xaa,0x78,0x62,0x90,0x71,0x3f,0xa8,0x19,0x92,0xb3,0x28,0xa9,0x37,0x93,0xbc,0x4c,0xf6,0xde,0xa5,0x02,0x22,0xc1,0x24,0x80,0x03,0x09,0x2a,0x9c,0xdb,0x5a,0xd0,0xf1,0x25,0xe1,0x46,0x0c,0xbf,0xed,0x4b,0x05,0xa1,0xde,0x40,0x71,0xb4 .byte 0xa9,0x3e,0xf4,0xf1,0x8e,0x00,0x17,0x09,0xa8,0x2c,0xcc,0xbc,0xfe,0x6e,0x9f,0xb6,0x2c,0x53,0x2c,0x12,0x67,0xad,0xa8,0xcc,0xfb,0x46,0xe6,0x00,0x6b,0xb7,0x9b,0xe0,0xd8,0x39,0x4d,0xbe,0xa0,0x14,0x25,0xd6,0xe4,0xc3,0x04,0xde,0xfb,0x85,0x14,0x46,0x5a,0x01,0x64,0x2f,0xb7,0x66,0x31,0x20,0x3e,0x06,0xf8,0x4a,0x68,0xf2,0xa1,0xa1 .byte 0xe6,0x0b,0xd8,0x3d,0x93,0xb3,0x72,0xff,0x36,0xf8,0xcc,0xa6,0x4f,0x32,0x9d,0xcb,0x25,0x2f,0x4f,0x78,0xb6,0xd3,0xb1,0x58,0x98,0x95,0xc1,0xbf,0xfe,0x08,0x92,0x55,0xf8,0x8a,0x8f,0x65,0xa8,0x51,0xb5,0x69,0x76,0xb0,0x03,0x05,0x93,0xef,0xf3,0x7d,0xfd,0x1e,0xda,0x7e,0x59,0x2c,0x84,0xaf,0x1c,0xd3,0xf0,0x3c,0xe6,0x83,0x4d,0x92 .byte 0xce,0x62,0x42,0x1b,0xbd,0x81,0xa5,0x5d,0xfe,0xaf,0x47,0xd4,0xf0,0x00,0x95,0x19,0x6c,0xbd,0x9d,0x86,0xdc,0xd9,0xc2,0x67,0x52,0x48,0xa7,0x0c,0x5b,0x4c,0xc1,0x31,0x1e,0xd1,0x1d,0x8b,0x1b,0x01,0x92,0x41,0x4e,0x32,0xbd,0x8e,0x61,0x84,0x02,0x57,0x7f,0x24,0x7c,0xb4,0x02,0x6e,0x2d,0xe2,0x6e,0x44,0xa5,0x2a,0xcc,0xed,0xf6,0xc6 .byte 0x1f,0x59,0x64,0xad,0x3f,0xc5,0xd4,0x07,0x83,0x32,0xfb,0xd2,0x7e,0xb8,0x50,0x3f,0x2a,0x06,0x7c,0xdd,0x61,0x5f,0xad,0x89,0x57,0x61,0xce,0x75,0xe5,0xa8,0x8b,0x33,0xb1,0x87,0xe3,0x3b,0x64,0xab,0xac,0xb7,0x7e,0xd5,0xbe,0xfa,0x28,0xc4,0x2b,0xe5,0x4b,0x49,0xcd,0x27,0x41,0xcc,0xe3,0x3d,0x6a,0xb7,0x0b,0xf5,0x6f,0xa3,0x1b,0x18 .byte 0xe2,0x03,0xd9,0x88,0x6a,0xf3,0x05,0x39,0x02,0x79,0xf8,0x2f,0x28,0xbc,0xed,0x39,0xf3,0x14,0xe6,0xfd,0x73,0x4c,0xf0,0x5f,0xd9,0xc9,0x7a,0x6c,0x1c,0xcf,0x38,0x0b,0xae,0xfa,0x34,0x02,0x21,0xc6,0xb3,0x88,0xda,0x96,0xe2,0xe0,0x68,0x75,0x7a,0x98,0x88,0x0d,0x1c,0x92,0xee,0xca,0xac,0x18,0x28,0x89,0x40,0xd7,0x1b,0x6f,0x59,0x21 .byte 0xd3,0x30,0x4c,0x0c,0x2c,0xca,0x41,0x46,0x8e,0x7d,0xe9,0x76,0x81,0x70,0xc3,0x10,0x42,0x64,0xaf,0x52,0x3e,0x78,0x38,0xcd,0xab,0x88,0xa5,0x32,0xbe,0xbe,0x55,0x39,0xc4,0xc6,0xce,0x53,0xfc,0x11,0x1b,0x0b,0x83,0xd3,0x3e,0x7b,0x71,0x3a,0x58,0x5d,0x70,0xfb,0x49,0x41,0x7d,0xe8,0x1e,0x37,0x17,0x3f,0x80,0x34,0x3a,0x81,0x65,0xb9 .byte 0x27,0x3c,0xfa,0xdb,0xc1,0xb8,0x5e,0x4c,0x80,0xf7,0x1e,0x89,0x2a,0x04,0xf0,0xfd,0x14,0xf2,0xbc,0x72,0xbb,0x36,0x9d,0x79,0xa5,0x7c,0xed,0x0f,0xf7,0x4f,0x69,0x7d,0xaf,0x8f,0xfc,0xcd,0x14,0x4c,0x29,0x55,0xb5,0xcd,0xb9,0x7c,0xa7,0xd4,0x83,0x28,0xcd,0x9c,0x35,0x75,0x00,0x0f,0xaa,0x3b,0x18,0xa5,0x0f,0x2e,0x97,0xa3,0x38,0xca .byte 0xb5,0x8a,0x8f,0x9e,0x47,0xc8,0xde,0x82,0x72,0xe0,0xb2,0x14,0xfc,0x28,0xa5,0xf9,0x76,0x38,0xf5,0x42,0xd2,0x87,0x82,0xfe,0x49,0x4d,0xb1,0x32,0x30,0x37,0xdf,0xc4,0x11,0x10,0x30,0xf8,0x51,0x5f,0x5f,0x59,0x02,0x17,0x90,0x5c,0xe6,0x6b,0xec,0x5b,0x14,0xb0,0xde,0xa9,0xca,0xe4,0x00,0x8c,0xe0,0xdb,0xf8,0xd2,0x2b,0x08,0x30,0xbb .byte 0x37,0xb2,0xd1,0x0e,0x8d,0xba,0xe6,0x60,0x4b,0xe7,0xe3,0x23,0xb6,0x31,0x5f,0x8c,0xb5,0x34,0x7b,0x6f,0x61,0xae,0xeb,0xc7,0xf6,0x0b,0x94,0x28,0xae,0x76,0x81,0xeb,0x44,0xcc,0x51,0xd5,0x5e,0xba,0x97,0x36,0xd3,0xc3,0xc9,0x03,0xe9,0x08,0x92,0x98,0x83,0x2a,0x7b,0x14,0x36,0xd0,0x27,0x5a,0x60,0xa5,0xc0,0xc6,0x12,0x42,0x44,0x85 .byte 0x8a,0xc7,0x2e,0x5d,0x2a,0xf4,0x25,0x50,0x7d,0x91,0x1c,0x95,0xb6,0x4f,0x1d,0x77,0x80,0x83,0x1c,0x4e,0x55,0xf8,0x1f,0x16,0xee,0xc3,0x8b,0xf5,0x96,0x25,0x1e,0xb6,0x34,0x5c,0xd7,0xd4,0xfa,0xff,0xa1,0x5b,0xd8,0x03,0xc2,0xe9,0x85,0x16,0xde,0x9d,0xef,0x37,0xc4,0x4c,0x82,0xdb,0xe4,0xf9,0x0f,0xcb,0x5e,0x9b,0x75,0xc1,0x3d,0x72 .byte 0xdd,0xa3,0x31,0xbe,0x19,0x90,0x3d,0x7f,0x5e,0xed,0xa4,0xa4,0xc6,0x5c,0x96,0xfe,0x87,0x44,0x50,0x10,0x9d,0x70,0xf7,0x50,0x11,0xb3,0x20,0x6b,0x48,0xf5,0x5e,0x26,0xed,0x30,0x69,0x91,0x66,0x83,0xf7,0x45,0xa1,0x0e,0x60,0x68,0xae,0x8a,0x84,0x8c,0x6a,0x7d,0x27,0x34,0xc0,0x85,0xaf,0xb5,0x47,0xcd,0x5b,0xab,0xbc,0xb9,0xf8,0x14 .byte 0xb1,0x81,0xd3,0xd9,0x26,0x5d,0xda,0xb1,0x8b,0x50,0x3f,0xa5,0x88,0x2c,0xc0,0x31,0x14,0x9a,0x5a,0xef,0x24,0x18,0xcf,0x8d,0x1e,0x25,0x38,0x30,0xa9,0x5f,0x8c,0xc6,0xc1,0x85,0x7f,0xec,0xa3,0xb3,0xf8,0xf2,0x48,0x1a,0x9a,0xef,0x21,0xc5,0x13,0xfb,0x89,0xc6,0xec,0xb6,0x81,0xd1,0xef,0xd7,0x2e,0x1d,0x06,0x5a,0x51,0x9b,0xbb,0x44 .byte 0xce,0x14,0x83,0xb7,0x04,0xf2,0x61,0x47,0x2a,0xff,0x4f,0xe6,0x6d,0x6e,0xd9,0x95,0x48,0x36,0x89,0x96,0x7d,0xfa,0xaf,0xb8,0xf1,0x80,0x66,0x3d,0x01,0x20,0x42,0x76,0xe7,0x58,0xb3,0xbf,0xc7,0xde,0xfb,0x12,0xfa,0x21,0xfb,0x63,0x3e,0xa0,0x7e,0x21,0x90,0xd7,0xf1,0x37,0xa4,0x43,0xbc,0x1b,0xf9,0x51,0x81,0xd0,0x88,0x42,0xf0,0xec .byte 0x82,0xce,0x92,0x81,0x19,0x77,0x50,0x5b,0xa3,0xd8,0xbd,0x50,0x7b,0xec,0x4d,0x63,0x99,0x29,0x89,0x28,0x9c,0xe4,0x90,0xfb,0x05,0x7e,0x0c,0xc8,0xb9,0xd7,0xc4,0xc6,0x11,0x82,0x22,0xaa,0xe9,0x60,0x20,0x72,0xd6,0x5b,0xa8,0x8e,0x04,0x0b,0x14,0xfc,0x38,0x50,0x7e,0x8b,0x55,0x13,0xe3,0x4a,0x25,0x03,0x88,0x50,0x17,0x73,0x3c,0x0a .size g_preCompTable,.-g_preCompTable #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm/ecp256_pre_comp_table.s
Motorola 68K Assembly
unknown
777,850
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include "ecp256_pre_comp_table.s" .file "ecp256_x86.S" .data .align 64 .Lpoly: // P .quad 0xffffffffffffffff, 0x00000000ffffffff, 0x0000000000000000, 0xffffffff00000001 .LrrModP: // Indicates the calculated value of R * R mod p, which is used in montgomery modular multiplication. .quad 0x0000000000000003, 0xfffffffbffffffff, 0xfffffffffffffffe, 0x00000004fffffffd .Lone_mont: // R mod P, R = 2^256, = 2^256 - P .quad 0x0000000000000001, 0xffffffff00000000, 0xffffffffffffffff, 0x00000000fffffffe .Lord: // order, n .quad 0xf3b9cac2fc632551, 0xbce6faada7179e84, 0xffffffffffffffff, 0xffffffff00000000 .LordK: // (2^64 - ord[0]) * ordK = 1 (mod 2^64)) LordK = -(ord[0])^(-1) (mod 2^64) LordK * Lord, // The lower 64 bits are all Fs. .quad 0xccd1c8aaee00bc4f .LOne: .quad 0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000 .text /** * Function description: Returns the address of the field calculation table of the ECP256 field. * Function prototype: const ECP256_TableRow *ECP256_GetPreCompTable(void); * Input register: None * Change register: None * Output register: rax * Function/Macro Call: None */ .globl ECP256_GetPreCompTable .type ECP256_GetPreCompTable,@function .align 32 ECP256_GetPreCompTable: .cfi_startproc leaq g_preCompTable(%rip), %rax ret .cfi_endproc .size ECP256_GetPreCompTable, .-ECP256_GetPreCompTable /** * Function description: Addition of the ECP256 field. res = a + b mod P * Function prototype: void ECP256_Add(Coord *r, const Coord *a, const Coord *b); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: None * Function/Macro call: Addition can be implemented by calling ECP256_AddCore. */ .globl ECP256_Add .type ECP256_Add,@function .align 32 ECP256_Add: .cfi_startproc pushq %r12 pushq %r13 movq (%rsi), %r8 // a[0] movq 8(%rsi), %r9 // a[1] xorq %r13, %r13 // Save carry movq 16(%rsi), %r10 // a[2] movq 24(%rsi), %r11 // a[3] leaq .Lpoly(%rip), %rsi // P addq (%rdx), %r8 // c[0] = a[0] + b[0] adcq 8(%rdx), %r9 // c[1] = a[1] + b[1] + carry movq %r8, %rax // save c[0] adcq 16(%rdx), %r10 // c[2] = a[2] + b[2] + carry adcq 24(%rdx), %r11 // c[3] = a[3] = b[3] + carry movq %r9, %rcx // save c[1] adcq $0, %r13 // save carry value to r13 subq $-1, %r8 // d[0] = c[0] - P[0] movq %r10, %rdx // save c[2] sbbq 8(%rsi), %r9 // d[1] = c[1] - P[1] - borrow sbbq $0, %r10 // d[2] = c[2] - P[2] - borrow movq %r11, %r12 // save c[3] sbbq 24(%rsi), %r11 // d[3] = c[3] - P[3] - borrow sbbq $0, %r13 // r13 = 0 + carry - borrow cmovcq %rax, %r8 // res[0] = (r13 < 0) ? c[0]: d[0] cmovcq %rcx, %r9 // res[1] = (r13 < 0) ? c[1]: d[1] movq %r8, (%rdi) cmovcq %rdx, %r10 // res[2] = (r13 < 0) ? c[2]: d[2] movq %r9, 8(%rdi) cmovcq %r12, %r11 // res[3] = (r13 < 0) ? c[3]: d[3] movq %r10, 16(%rdi) movq (%rsp), %r13 movq %r11, 24(%rdi) movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_Add, .-ECP256_Add /** * Function description: Addition core part of the ECP256 field, a + b mod P; Outputs r8-r11, r14,15 are P[1] and P[3] * Input register: * r8-r11:256-bit input data a * rdx: points to the input 256-bit data b. * r14:P[1] * r15:P[3] * Change register: rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: r8-r11 */ .type ECP256_AddCore,@function .align 32 ECP256_AddCore: .cfi_startproc xorq %r13, %r13 addq (%rdx), %r8 // Addition result. adcq 8(%rdx), %r9 movq %r8, %rax adcq 16(%rdx), %r10 adcq 24(%rdx), %r11 movq %r9, %rcx adcq $0, %r13 // Save carry value to r13. subq $-1, %r8 // Mod P. movq %r10, %rdx sbbq %r14, %r9 sbbq $0, %r10 movq %r11, %r12 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result. cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_AddCore, .-ECP256_AddCore /** * Function description: Subtraction of the ECP256 field. Res = a - b mod P * Function prototype: void ECP256_Sub(Coord *r, const Coord *a, const Coord *b); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: None * Function/Macro call: Subtraction can be implemented by calling ECP256_SubCore. */ .globl ECP256_Sub .type ECP256_Sub,@function .align 32 ECP256_Sub: .cfi_startproc pushq %r12 pushq %r13 movq (%rsi), %r8 // a[0] movq 8(%rsi), %r9 // a[1] xorq %r13, %r13 // Save borrow movq 16(%rsi), %r10 // a[3] movq 24(%rsi), %r11 // a[4] leaq .Lpoly(%rip), %rsi // P subq (%rdx), %r8 // c[0] = a[0] - b[0] sbbq 8(%rdx), %r9 // c[1] = a[1] - b[1] - borrow movq %r8, %rax // save c[0] sbbq 16(%rdx), %r10 // c[2] = a[2] - b[2] - borrow sbbq 24(%rdx), %r11 // c[3] = a[3] - b[3] - borrow movq %r9, %rcx // save c[1] sbbq $0, %r13 // save borrow value to r13 addq $-1, %r8 // d[0] = c[0] + P[0] movq %r10, %rdx // save c[2] adcq 8(%rsi), %r9 // d[1] = c[1] + P[1] + carry adcq $0, %r10 // d[2] = c[2] + P[2] + carry movq %r11, %r12 // save c[3] adcq 24(%rsi), %r11 // d[3] = c[3] + P[3] + carry testq %r13, %r13 cmovzq %rax, %r8 // res[0] = (r13 == 0) ? c[0] : d[0] cmovzq %rcx, %r9 // res[1] = (r13 == 0) ? c[1] : d[1] movq %r8, (%rdi) cmovzq %rdx, %r10 // res[2] = (r13 == 0) ? c[2] : d[2] movq %r9, 8(%rdi) cmovzq %r12, %r11 // res[3] = (r13 == 0) ? c[3] : d[3] movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq (%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_Sub, .-ECP256_Sub /** * Function description: subtraction core part of the ECP256 field, a-b mod P; no writeback * Input register: * r8-r11:256-bit input data a * rdx:Points to the input 256-bit data b. * r14:P[1] * r15:P[3] * Change register: rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: r8-r11 */ .type ECP256_SubCore,@function .align 32 ECP256_SubCore: .cfi_startproc xorq %r13, %r13 subq (%rdx), %r8 // Subtraction results. sbbq 8(%rdx), %r9 movq %r8, %rax // Save Results. sbbq 16(%rdx), %r10 sbbq 24(%rdx), %r11 movq %r9, %rcx sbbq $0, %r13 // Borrowing saved in r13. addq $-1, %r8 // a - b + P movq %r10, %rdx adcq %r14, %r9 adcq $0, %r10 movq %r11, %r12 adcq %r15, %r11 testq %r13, %r13 cmovzq %rax, %r8 // If r13 is equal to 0, a-b is used. Otherwise, a-b+P is used. cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 ret .cfi_endproc .size ECP256_SubCore, .-ECP256_SubCore /** * Function description: negation of the ECP256 field. res = -a mod P * Function prototype: void ECP256_Neg(Coord *r, const Coord *a); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: None * Function/Macro Call: */ .globl ECP256_Neg .type ECP256_Neg,@function .align 32 ECP256_Neg: .cfi_startproc pushq %r12 pushq %r13 xorq %r8, %r8 // -a = 0 - a xorq %r9, %r9 xorq %r13, %r13 leaq .Lpoly(%rip), %rdx xorq %r10, %r10 xorq %r11, %r11 subq (%rsi),%r8 sbbq 8(%rsi),%r9 movq %r8, %rax sbbq 16(%rsi),%r10 sbbq 24(%rsi),%r11 movq %r9, %rcx sbbq $0, %r13 addq $-1, %r8 movq %r10, %rsi adcq 8(%rdx), %r9 adcq $0, %r10 movq %r11, %r12 adcq 24(%rdx), %r11 testq %r13, %r13 // Choost result cmovzq %rax, %r8 cmovzq %rcx, %r9 movq %r8, (%rdi) cmovzq %rsi, %r10 movq %r9, 8(%rdi) cmovzq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq (%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_Neg, .-ECP256_Neg /** * Function description: multiplication of the ECP256 field: res = a * b * 2^-256 mod P * Function prototype: void ECP256_Mul(Coord *r, const Coord *a, const Coord *b); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rax, rbx, rcx, rdx, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/macro call: Multiplication can be implemented by calling ECP256_MulCore. */ .globl ECP256_Mul .type ECP256_Mul,@function .align 32 ECP256_Mul: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq %rdx, %rcx // rdx is for mul movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 call ECP256_MulCore_q movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_Mul, .-ECP256_Mul /** * Function description: Montgomery multiplication of the ECP256 field * Input register: * rdi: Return address. * rsi: Factor address. * rcx: Factor address. * Change register: rax,rbx,rcx,rdx,rbp,r8-r13 * Output register: None. */ .type ECP256_MulCore_q,@function .align 32 ECP256_MulCore_q: .cfi_startproc movq (%rcx), %rax // b[0] movq %rax, %rbp // save b[0] mulq (%rsi) // a[0] * b[0] movq %rax, %r10 movq %rbp, %rax // b[0] movq %rdx, %r11 mulq 8(%rsi) // a[1] * b[0] addq %rax, %r11 movq %rbp, %rax adcq $0, %rdx // a[1:0] * b[0] < 2^192, no overflow movq %rdx, %r12 mulq 16(%rsi) // a[2] * b[0] addq %rax, %r12 movq %rbp, %rax adcq $0, %rdx movq %rdx, %r13 mulq 24(%rsi) // a[3] * b[0] addq %rax, %r13 adcq $0, %rdx movq %rdx, %r8 // result: r8 r13 r12 r11 r10 xorq %r9, %r9 movq %r10, %rax // first reduction movq %r10, %rbp shlq $32, %r10 // r10 * 2^96 low mulq %r15 // r10 * 0xffffffff00000001 shrq $32, %rbp // r10 * 2^96 high addq %r10, %r11 adcq %rbp, %r12 adcq %rax, %r13 adcq %rdx, %r8 movq 8(%rcx), %rax adcq $0, %r9 xorq %r10, %r10 movq %rax, %rbp mulq (%rsi) addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 24(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 adcq %rdx, %r9 adcq $0, %r10 movq %r11, %rbp movq %r11, %rax shlq $32, %r11 // r11 * 2^96 low mulq %r15 // r11 * 0xffffffff00000001 shrq $32, %rbp // r11 * 2^96 high addq %r11, %r12 adcq %rbp, %r13 movq 16(%rcx), %rbp adcq %rax, %r8 adcq %rdx, %r9 movq %rbp, %rax adcq $0, %r10 xorq %r11, %r11 mulq (%rsi) // a[0] * b[2] addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rbx mulq 24(%rsi) addq %rbx, %r9 adcq $0, %rdx addq %rax, %r9 adcq %rdx, %r10 movq %r12, %rbp adcq $0, %r11 movq %r12, %rax // third reduction shlq $32, %r12 // r12 * 2^96 low mulq %r15 // r12 * 0xffffffff00000001 shrq $32, %rbp // r12 * 2^96 high addq %r12, %r13 adcq %rbp, %r8 movq 24(%rcx), %rbp adcq %rax, %r9 adcq %rdx, %r10 movq %rbp, %rax adcq $0, %r11 xorq %r12, %r12 mulq (%rsi) // a[0] * b[3] addq %rax, %r13 adcq $0, %rdx movq %rdx, %rbx movq %rbp, %rax mulq 8(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r9 adcq $0, %rdx addq %rax, %r9 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rbx mulq 24(%rsi) addq %rbx, %r10 adcq $0, %rdx addq %rax, %r10 adcq %rdx, %r11 adcq $0, %r12 movq %r13, %rbp movq %r13, %rax // last reduction shlq $32, %r13 // r13 * 2^96 low mulq %r15 // r13 * 0xffffffff00000001 shrq $32, %rbp // r13 * 2^96 high addq %r13, %r8 adcq %rbp, %r9 adcq %rax, %r10 adcq %rdx, %r11 movq %r8, %rbx movq %r9, %rbp adcq $0, %r12 movq %r10, %rax movq %r11, %rdx subq $-1, %r8 sbbq %r14, %r9 sbbq $0, %r10 sbbq %r15, %r11 sbbq $0, %r12 cmovcq %rbx, %r8 cmovcq %rbp, %r9 cmovcq %rax, %r10 movq %r8, (%rdi) movq %r9, 8(%rdi) cmovcq %rdx, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_MulCore_q, .-ECP256_MulCore_q /** * Function description: ECP256 Montgomery form * Function prototype: void ECP256_ToMont(Coord *r, const Coord *a); * Input register: * rdi: pointer to the output Coord structure * rsi: address pointing to input data a * Change register: rax,rbx,rcx,rdx,rbp,r8-r13 * Output register: None * Function/Macro invoking: This function can be implemented by calling ECP256_Mul. */ .globl ECP256_ToMont .type ECP256_ToMont,@function .align 32 ECP256_ToMont: .cfi_startproc leaq .LrrModP(%rip),%rcx pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 call ECP256_MulCore_q movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_ToMont, .-ECP256_ToMont /** * Function description: ECP256 Montgomery form converted to normal form * Function prototype: void ECP256_FromMont(Coord *r, const Coord *a); * Input register: * rdi: Pointer to the output Coord structure. * rsi: Address pointing to input data a. * Change register: rax,rcx,rdx,r8-r13 * Output register: None. * Function/Macro Call: */ .globl ECP256_FromMont .type ECP256_FromMont,@function .align 32 ECP256_FromMont: .cfi_startproc pushq %r12 pushq %r13 movq .Lpoly+8(%rip), %r12 movq .Lpoly+24(%rip), %r13 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 movq %r8, %rax movq %r8, %rcx shlq $32, %r8 mulq %r13 // 0xff * 0xff = 0xfe01 shrq $32, %rcx addq %r8, %r9 adcq %rcx, %r10 movq %r9, %rcx adcq %rax, %r11 adcq $0, %rdx // rdx + 1 <= 0xff movq %r9, %rax movq %rdx, %r8 shlq $32, %r9 mulq %r13 shrq $32, %rcx addq %r9, %r10 adcq %rcx, %r11 movq %r10, %rcx adcq %rax, %r8 adcq $0, %rdx movq %r10, %rax movq %rdx, %r9 shlq $32, %r10 mulq %r13 shrq $32, %rcx addq %r10, %r11 adcq %rcx, %r8 movq %r11, %rcx adcq %rax, %r9 adcq $0, %rdx movq %r11, %rax movq %rdx, %r10 shlq $32, %r11 mulq %r13 shrq $32, %rcx addq %r11, %r8 adcq %rcx, %r9 movq %r8, %rsi adcq %rax, %r10 adcq $0, %rdx movq %rdx, %r11 // r8 r9 r10 r11 movq %r9, %rdx subq $-1, %r8 movq %r10, %rcx sbbq %r12, %r9 movq %r11, %rax sbbq $0, %r10 sbbq %r13, %r11 cmovcq %rsi, %r8 // < P cmovcq %rdx, %r9 movq %r8, (%rdi) cmovcq %rcx, %r10 movq %r9, 8(%rdi) cmovcq %rax, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq (%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_FromMont, .-ECP256_FromMont /** * Function description: Multiplication of the ECP256 field:res = a*b*2^-256 mod P * Function prototype: void ECP256_Sqr(Coord *r, const Coord *a); * Input register: * rdi: pointer to the output Coord structure * rsi: address pointing to input data a * Change register: rax, rbx, rcx, rdx, rsi, rdi, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/Macro Call: Multiplication can be implemented by calling ECP256_SqrCore_q. */ .globl ECP256_Sqr .type ECP256_Sqr,@function .align 32 ECP256_Sqr: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 nop // add this instruction to improve performance, movq %rsi, %rdx is ok movq (%rsi), %rax // a[0] movq 8(%rsi), %r14 // a[1] movq 16(%rsi), %rbp // a[2] movq 24(%rsi), %r15 // a[3] call ECP256_SqrCore_q movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_Sqr, .-ECP256_Sqr /** * Function description: Montgomery square of the ECP256 field * Input register: * rdi: Return address * rsi: Factor address * Change register: rax, rbx, rcx, rdx, rbp, rsi, r8-r15 * Output register: None */ .type ECP256_SqrCore_q,@function .align 32 ECP256_SqrCore_q: .cfi_startproc movq %rax, %r8 mulq %r14 // rdx:rax = a[0] * a[1] xorq %rcx, %rcx movq %rax, %r9 // r9 = rax xorq %r11, %r11 xorq %r12, %r12 movq %r8, %rax xorq %r13, %r13 xorq %rbx, %rbx movq %rdx, %r10 // r10:r9 = a[0] * a[1] mulq %rbp // rdx:rax = a[0] * a[2] addq %rax, %r10 // r10 += rax movq %r8, %rax // a[0] --> rax adcq %rdx, %r11 // a[0] * (a[2] * 2^64 + a[1]) < 2^196, no overflow mulq %r15 // rdx:rax = a[0] * a[3] addq %rax, %r11 // r11 += rax movq %r14, %rax // a[0] --> rax adcq %rdx, %r12 // a[0] * (a[3] * 2^128 + a[2] * 2^64 + a[1]) < 2^256, no overflow mulq %rbp // rdx:rax = a[1] * a[2] addq %rax, %r11 movq %r14, %rax adcq %rdx, %r12 adcq $0, %r13 mulq %r15 // rdx:rax = a[1] * a[3] addq %rax, %r12 movq %rbp, %rax adcq %rdx, %r13 adcq $0, %rbx mulq %r15 // rdx:rax = a[2] * a[3] addq %rax, %r13 adcq %rdx, %rbx // rbx not overflow movq %r8, %rax addq %r9, %r9 // twice adcq %r10, %r10 adcq %r11, %r11 adcq %r12, %r12 adcq %r13, %r13 adcq %rbx, %rbx adcq $0, %rcx mulq %rax // rdx:rax = a[0] * a[0] movq %rax, %r8 movq %r14, %rax movq %rdx, %rsi mulq %rax // rdx:rax = a[1] * a[1] addq %rsi, %r9 adcq %rax, %r10 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rsi mulq %rax // rdx:rax = a[2] * a[2] addq %rsi, %r11 adcq %rax, %r12 movq %r15, %rax adcq $0, %rdx movq %rdx, %rsi mulq %rax // rdx:rax = a[3] * a[3] addq %rsi, %r13 adcq %rax, %rbx movq %r8, %rax adcq %rdx, %rcx // rcx not overflow movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 movq %r8, %rbp // First reduction shlq $32, %r8 // l32[r8 << 96] mulq %r15 shrq $32, %rbp // h32[r8 << 96] addq %r8, %r9 adcq %rbp, %r10 adcq %rax, %r11 adcq $0, %rdx movq %r9, %rax movq %r9, %rbp movq %rdx, %r8 // r8 r11 r10 r9 0 shlq $32, %r9 // Second reduction mulq %r15 shrq $32, %rbp addq %r9, %r10 adcq %rbp, %r11 adcq %rax, %r8 adcq $0, %rdx movq %r10, %rax movq %r10, %rbp movq %rdx, %r9 // r9 r8 r11 r10 0 shlq $32, %r10 // Third reduction mulq %r15 shrq $32, %rbp addq %r10, %r11 adcq %rbp, %r8 adcq %rax, %r9 adcq $0, %rdx movq %r11, %rax movq %r11, %rbp movq %rdx, %r10 // r10 r9 r8 r11 0 shlq $32, %r11 // Last reduction mulq %r15 shrq $32, %rbp addq %r11, %r8 adcq %rbp, %r9 adcq %rax, %r10 adcq $0, %rdx // rdx r10 r9 r8 0 xorq %rsi, %rsi // Add the reduction result addq %r8, %r12 adcq %r9, %r13 movq %r12, %r8 adcq %r10, %rbx adcq %rdx, %rcx movq %r13, %r9 adcq $0, %rsi // Reserve carry value subq $-1, %r8 movq %rbx, %r10 sbbq %r14, %r9 sbbq $0, %r10 movq %rcx, %r11 sbbq %r15, %r11 sbbq $0, %rsi cmovcq %r12, %r8 cmovcq %r13, %r9 movq %r8, (%rdi) cmovcq %rbx, %r10 movq %r9, 8(%rdi) cmovcq %rcx, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_SqrCore_q, .-ECP256_SqrCore_q /** * Function description: Multiplication of the ECP256 field: res = a*b*2^-256 mod Order(P) * Function prototype: void ECP256_OrdSqr(Coord *r, const Coord *a, int32_t repeat); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx:Repeat * Change register: rax, rbx, rcx, rdx, rsi, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/Macro Call: */ .globl ECP256_OrdSqr .type ECP256_OrdSqr,@function .align 32 ECP256_OrdSqr: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq (%rsi), %r8 movq 8(%rsi), %rax movq 16(%rsi), %r14 movq 24(%rsi), %r15 leaq .Lord(%rip), %rbp // ptr(N) --> rbp movq %rdx, %rbx .align 32 .Lord_sqr_loop: movq %rax, %rsi mulq %r8 // rdx:rax = acc[0] * acc[1] movq %rax, %r9 // r9 = rax vmovq %rsi, %xmm1 // save acc[1] -> xmm1 movq %r14, %rax // acc[2] --> rax movq %rdx, %r10 // r10:r9 = acc[0] * acc[1] mulq %r8 // rdx:rax = acc[0] * acc[2] addq %rax, %r10 // r10 += rax vmovq %r14, %xmm2 // save acc[2] -> xmm2 adcq $0, %rdx // acc[0] * (acc[2] * 2^64 + acc[1]) < 2^196, no overflow movq %r15, %rax // acc[3] --> rax movq %rdx, %r11 mulq %r8 // rdx:rax = a[0] * a[3] addq %rax, %r11 // r11 += rax vmovq %r15, %xmm3 // Save acc[3] -> xmm3 adcq $0, %rdx // acc[0] * (acc[3] * 2^128 + acc[2] * 2^64 + acc[1]) < 2^256, no overflow movq %r15, %rax // acc[1] --> rax movq %rdx, %r12 mulq %r14 movq %rax, %r13 movq %r14, %rax movq %rdx, %r14 mulq %rsi addq %rax, %r11 movq %r15, %rax adcq $0, %rdx movq %rdx, %r15 mulq %rsi addq %rax, %r12 adcq $0, %rdx addq %r15, %r12 adcq %rdx, %r13 movq %r8, %rax // acc[0] --> rax adcq $0, %r14 // r14 r13 r12 r11 r10 r9 xorq %r15, %r15 // 0 --> r15 addq %r9, %r9 // twice adcq %r10, %r10 adcq %r11, %r11 adcq %r12, %r12 adcq %r13, %r13 adcq %r14, %r14 adcq $0, %r15 // result: r15 r14 r13 r12 r11 r10 r9 mulq %rax // rdx:rax = acc[0] * acc[0] movq %rax, %r8 // rax --> r8 vmovq %xmm1, %rax // acc[1] --> rax movq %rdx, %rcx // save rdx to rcx mulq %rax // rdx:rax = acc[1] * acc[1] addq %rcx, %r9 // r9 += rcx adcq %rax, %r10 // r10 += rax adcq $0, %rdx // no overflow vmovq %xmm2, %rax // acc[2] --> rax movq %rdx, %rcx // save rdx to rcx mulq %rax // rdx:rax = a[2] * a[2] addq %rcx, %r11 // r11 += rcx adcq %rax, %r12 // r12 += rax movq %r8, %rsi // acc[0] --> rsi adcq $0, %rdx // no overflow vmovq %xmm3, %rax // acc[3] --> rax movq %rdx, %rcx // save rcx to rdx imulq 32(%rbp), %r8 // m = acc[0] * LordK (mod 2^64) --> r8 mulq %rax // rdx:rax = a[3] * a[3] addq %rcx, %r13 // r13 += rcx adcq %rax, %r14 // r14 += r movq (%rbp), %rax // N[0] --> rax adcq %rdx, %r15 // r15 not overflow /* Result acc[8:0] = r15 r14 r13 r12 r11 r10 r9 r8; */ /* The first reduction */ mulq %r8 // rdx:rax = m * N[0] addq %rax, %rsi // rsi = 0 movq %r8, %rcx // m --> rcx adcq %rdx, %rsi // rsi = rdx + carry --> acc[1] subq %r8, %r10 // acc[2] - m sbbq $0, %rcx // m - borrwo, to acc[3] movq 8(%rbp), %rax // N[1] --> rax mulq %r8 // rdx:rax = m * N[1] addq %rsi, %r9 // acc[1] += high[m * N[0]] adcq $0, %rdx // save carry addq %rax, %r9 // acc[1] += low[m * N[1]] movq %r8, %rax // m --> rax adcq %rdx, %r10 // acc[2] += high[m * N[1]] movq %r9, %rsi // acc[1] --> rsi movq %r8, %rdx // m --> rdx adcq $0, %rcx // m - borrwoto acc[3] imulq 32(%rbp), %r9 // m = acc[1] * LordK --> r9 shlq $32, %rax // low(m) --> rax low(m * 2^228) shrq $32, %rdx // high(m) --> rdx high(m * 2^228) subq %rax, %r11 // acc[3] - low(m * 2^228) movq (%rbp), %rax // N[0] --> rax sbbq %rdx, %r8 // m - high(m * 2^228) to acc[4] addq %rcx, %r11 // acc[3] += m + carry - borrow adcq $0, %r8 // to acc[4] /* Second reduction */ mulq %r9 // rdx:rax = m * N[0] addq %rax, %rsi // acc[1] += rax --> 0 movq %r9, %rcx // m --> rcx adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[2] movq 8(%rbp), %rax // N[1] --> rax subq %r9, %r11 // acc[3] -= m sbbq $0, %rcx // m - borrow --> rcx mulq %r9 // rdx:rax = m * N[1] addq %rsi, %r10 // acc[2] += high[m * N[1]] + carry adcq $0, %rdx // rdx += carry, no overflow addq %rax, %r10 // acc[2] += rax movq %r9, %rax // m --> rax adcq %rdx, %r11 // acc[3] += rdx movq %r10, %rsi // acc[2] --> rsi movq %r9, %rdx // m --> rdx adcq $0, %rcx // m - borrow + carry --> rcx imulq 32(%rbp), %r10 // m = acc[2] * LordK --> r10 shlq $32, %rax // low(m * 2^228) shrq $32, %rdx // high(m * 2^228) subq %rax, %r8 // t0 acc[4] - low(m * 2^228) movq (%rbp), %rax // N[0] --> rax sbbq %rdx, %r9 // m - high(m * 2^228) to acc[5] addq %rcx, %r8 // to acc[4] adcq $0, %r9 // to acc[5] /* Third reduction */ mulq %r10 // rdx:rax = m * N[0] movq %r10, %rcx // m --> rcx addq %rax, %rsi // acc[2] += rax --> 0 adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[3] movq 8(%rbp), %rax // N[1] --> rax subq %r10, %r8 // to acc[4] -= m sbbq $0, %rcx // m - borrow --> rcx mulq %r10 // rdx:rax = m * N[1] addq %rsi, %r11 // acc[3] += high[m * N[1]] + carry adcq $0, %rdx // rdx += carry, no overflow addq %rax, %r11 // acc[3] += rax movq %r10, %rax // m --> rax adcq %rdx, %r8 // to acc[4] += rdx movq %r11, %rsi // acc[3] --> rsi movq %r10, %rdx // m --> rdx adcq $0, %rcx // m - borrow + carry --> rcx imulq 32(%rbp), %r11 // m = acc[3] * LordK --> r11 shlq $32, %rax // low(m * 2^228) shrq $32, %rdx // high(m * 2^228) subq %rax, %r9 // to acc[5]: - low(m * 2^228) sbbq %rdx, %r10 // to acc[6]: m - high(m * 2^228) movq (%rbp), %rax // N[0] --> rax addq %rcx, %r9 // to acc[5] adcq $0, %r10 // to acc[6] /* Last reduction */ mulq %r11 // rdx:rax = m * N[0] addq %rax, %rsi // acc[3] += rax --> 0 movq %r11, %rcx // m --> rcx adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[4] movq 8(%rbp), %rax // N[1] --> rax subq %r11, %r9 // to acc[5] : -= m sbbq $0, %rcx // to acc[6] : m - borrow mulq %r11 // rdx:rax = m * N[1] addq %rsi, %r8 // to acc[4]: += high[m * N[1]] + carry adcq $0, %rdx // rdx += carry, no overflow addq %rax, %r8 // to acc[4]: += rax movq %r11, %rax // m --> rax adcq %rdx, %r9 // to acc[5]: += rdx movq %r11, %rdx // m --> rdx adcq $0, %rcx // m - borrow + carry --> rcx shlq $32, %rax // low(m * 2^228) shrq $32, %rdx // high(m * 2^228) subq %rax, %r10 // to acc[6]: - low(m * 2^228) sbbq %rdx, %r11 // to acc[7]: m - high(m * 2^228) addq %rcx, %r10 // to acc[6] adcq $0, %r11 // to acc[7] /* r15 r14 r13 r12 + r11 r10 r9 r8 */ xorq %rdx, %rdx addq %r12, %r8 adcq %r13, %r9 movq %r8, %r12 adcq %r14, %r10 adcq %r15, %r11 movq %r9, %rax adcq $0, %rdx subq (%rbp), %r8 movq %r10, %r14 sbbq 8(%rbp), %r9 sbbq 16(%rbp), %r10 movq %r11, %r15 sbbq 24(%rbp), %r11 sbbq $0, %rdx cmovcq %r12, %r8 cmovncq %r9, %rax cmovncq %r10, %r14 cmovncq %r11, %r15 // r8 rax r14 r15 decq %rbx jnz .Lord_sqr_loop movq %r8, (%rdi) movq %rax, 8(%rdi) vpxor %xmm2, %xmm2, %xmm2 movq %r14, 16(%rdi) vpxor %xmm3, %xmm3, %xmm3 movq %r15, 24(%rdi) vpxor %xmm1, %xmm1, %xmm1 movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_OrdSqr, .-ECP256_OrdSqr /** * Function description: half calculation of the ECP256 field: res = a/2 mod P * Input register: * rdi: Pointer to the output Coord structure * r8: a[0] * r9: a[1] * r10:a[2] * r11:a[3] * r14:P[1] * r15:P[3] * Change register: rax, rcx, rdx, rsi, r8, r9, r10, r11, r12, r13 * Output register: r8, r9, r10, r11 */ .type ECP256_DivBy2Core,@function ECP256_DivBy2Core: .cfi_startproc xorq %r13, %r13 movq %r8, %rax movq %r9, %rcx addq $-1, %r8 movq %r10, %rdx adcq %r14, %r9 movq %r11, %r12 adcq $0, %r10 adcq %r15, %r11 adcq $0, %r13 xorq %rsi, %rsi testq $1, %rax cmovzq %rax, %r8 cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 movq %r9, %rcx cmovzq %rsi, %r13 movq %r10, %rdx movq %r11, %r12 shrq $1, %r8 shlq $63, %rcx shrq $1, %r9 shlq $63, %rdx shrq $1, %r10 orq %rcx, %r8 shlq $63, %r12 shrq $1, %r11 shlq $63, %r13 orq %rdx, %r9 orq %r12, %r10 orq %r13, %r11 movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_DivBy2Core, .-ECP256_DivBy2Core /** * Function description: Half calculation of the ECP256 field: res = a/2 mod P * Function prototype: void ECP256_DivBy2(Coord *r, const Coord *a); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * Change register: rax, rcx, rdx, rsi, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/macro call: Call ECP256_DivBy2Core to implement half calculation. */ .globl ECP256_DivBy2 .type ECP256_DivBy2, @function ECP256_DivBy2: .cfi_startproc pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 movq 8+.Lpoly(%rip), %r14 movq 24+.Lpoly(%rip), %r15 call ECP256_DivBy2Core movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 leaq 32(%rsp), %rsp ret .cfi_endproc .size ECP256_DivBy2, .-ECP256_DivBy2 /* r14 = .Lpoly[1], r15 = .Lpoly[3] */ .type ECP256_MulBy2Core,@function .align 32 ECP256_MulBy2Core: .cfi_startproc xorq %r13, %r13 addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq %r14, %r9 movq %r11, %r12 sbbq $0, %r10 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_MulBy2Core, .-ECP256_MulBy2Core .globl ECP256_MulBy2 .type ECP256_MulBy2,@function .align 32 ECP256_MulBy2: .cfi_startproc pushq %r12 pushq %r13 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 xorq %r13, %r13 leaq .Lpoly(%rip), %rsi addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq 8(%rsi), %r9 movq %r11, %r12 sbbq $0, %r10 sbbq 24(%rsi), %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq 0(%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_MulBy2, .-ECP256_MulBy2 /* r14 = .Lpoly[1], r15 = .Lpoly[3] */ .type ECP256_MulBy3Core,@function .align 32 ECP256_MulBy3Core: .cfi_startproc xorq %r13, %r13 addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq %r14, %r9 movq %r11, %r12 sbbq $0, %r10 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 cmovcq %rdx, %r10 cmovcq %r12, %r11 xorq %r13, %r13 addq (%rsi), %r8 adcq 8(%rsi), %r9 movq %r8, %rax adcq 16(%rsi), %r10 adcq 24(%rsi), %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq %r14, %r9 sbbq $0, %r10 movq %r11, %r12 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_MulBy3Core, .-ECP256_MulBy3Core .globl ECP256_MulBy3 .type ECP256_MulBy3,@function .align 32 ECP256_MulBy3: .cfi_startproc pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 movq 8+.Lpoly(%rip), %r14 movq 24+.Lpoly(%rip), %r15 call ECP256_MulBy3Core movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 leaq 32(%rsp), %rsp ret .cfi_endproc .size ECP256_MulBy3, .-ECP256_MulBy3 /** * Function description: This function is used to calculate the Montgomery multiplication of the ord(P256) field: * res = a * b * 2^(-256) mod ord(P) * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rax, rbx, rcx, rdx, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Function/Macro invoking: The calculation can be implemented by calling ECP256_OrdMulCore. */ .globl ECP256_OrdMul .type ECP256_OrdMul,@function .align 32 ECP256_OrdMul: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq %rdx, %rcx // rdx used to output the mul multiplication result. // The rcx saves the b address. leaq .Lord(%rip), %r15 movq .LordK(%rip), %r14 movq (%rdx), %rax // b[0] //a[0-3] * b[0] movq %rax, %rbp // save b[0] mulq (%rsi) // a[0] * b[0] movq %rax, %r8 movq %rbp, %rax // b[0] movq %rdx, %r9 mulq 8(%rsi) // a[1] * b[0] addq %rax, %r9 movq %rbp, %rax adcq $0, %rdx // a[1:0] * b[0] The result must be less than 2 ^ 192, // So no carry is required. movq %rdx, %r10 mulq 16(%rsi) // a[2] * b[0] addq %rax, %r10 movq %rbp, %rax adcq $0, %rdx movq %rdx, %r11 mulq 24(%rsi) // a[3] * b[0] addq %rax, %r11 adcq $0, %rdx movq %r8, %r13 movq %rdx, %r12 // First round multiplication results r12 r11 r10 r9 r8 // First round of reduction // n[0] = 0xf3b9cac2fc632551 // n[1] = 0xbce6faada7179e84 // n[2] = 0xffffffffffffffff, lo(q*n[2]) = -q , hi(q*n[2]) = q // n[3] = 0xffffffff00000000, lo(q*n[3]) = -lq<<32, hi(q*n[3]) = q-hq imulq %r14, %r8 // r8 = r8 * ordK = q movq %r8, %rax mulq (%r15) // n[0] * q addq %rax, %r13 // %r13 must be 0. adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 No further carry is required. movq %r8, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), be the same as the above hi(n[1]*q) + 1 < 2^64 // No further carry is required. movq %r8, %rbx subq %r8, %r10 // r10 = r[2] - q sbbq $0, %rbx // When q>0, rbx - 1 = q - 1 >= 0, when q=0 (r[2]-q) does not borrow, // rbx = rbx - 0 >= 0, so the following formula does not borrow addq %rax, %r9 // r9 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r10 // r10 = r[2] - q + hi(n[1]*q) movq %r8, %rax adcq $0, %rbx // Overflowing is not possible. movq %r8, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r8 // r8 = q - hq = hq * 2^32 + lq - hq >= lq, // When lq!=0, The following formula does not borrow. // When lq==0, the upper formula does not borrow. adcq %rbx, %r11 movq 8(%rcx), %rax adcq %r8, %r12 movq %rax, %rbp adcq $0, %r13 // a[0-3] * b[1] mulq (%rsi) addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r11 adcq $0, %rdx addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx xorq %r8, %r8 // r8 = 0 mulq 24(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq %rdx, %r13 movq %r9, %rbx adcq $0, %r8 // Second round of multiplication results r9,r10,r11,r12,r13,r8 // Second round of reduction imulq %r14, %r9 // r9 = r9 * ordK = q movq %r9, %rax mulq (%r15) // n[0] * q addq %rax, %rbx // %rbx must be 0 adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 No further carry is required movq %r9, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), be the same as the above hi(n[1]*q) + 1 < 2^64 // No further carry is required movq %r9, %rbx subq %r9, %r11 // r11 = r[2] - q sbbq $0, %rbx // when q>0 rbx - 1 = q - 1 >= 0, // When q=0 (r[2]-q) does not borrow, rbx = rbx - 0 >= 0, // So the following equation does not borrow addq %rax, %r10 // r10 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r11 // r11 = r[2] - q + hi(n[1]*q) movq %r9, %rax adcq $0, %rbx // Overflowing is not possible. movq %r9, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r9 // r9 = q - hq = hq * 2^32 + lq - hq >= lq, // When lq!=0, The following formula does not borrow. // When lq==0, the preceding formula does not borrow. movq 16(%rcx), %rax adcq %rbx, %r12 adcq %r9, %r13 adcq $0, %r8 // a[0-3] * b[2] movq %rax, %rbp mulq (%rsi) // a[0] * b[2] addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r11 adcq $0, %rdx addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx xorq %r9, %r9 mulq 24(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 adcq %rdx, %r8 movq %r10, %rbx adcq $0, %r9 // Third round reduction imulq %r14, %r10 // r10 = r10 * ordK = q movq %r10, %rax mulq (%r15) // n[0] * q addq %rax, %rbx // %rbx must be 0 adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 no further carry is required. movq %r10, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), same as above hi(n[1]*q) + 1 < 2^64 no further carry is required. movq %r10, %rbx subq %r10, %r12 // r12 = r[2] - q sbbq $0, %rbx // if q>0, rbx - 1 = q - 1 >= 0. // if q=0, (r[2]-q) Won't borrow , rbx = rbx - 0 >= 0, // the following formula will not borrow. addq %rax, %r11 // r11 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r12 // r12 = r[2] - q + hi(n[1]*q) movq %r10, %rax adcq $0, %rbx // Overflowing is not possible. movq %r10, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r10 // r10 = q - hq = hq * 2^32 + lq - hq >= lq, // if lq!=0, the following formula does not borrow, // if lq==0, The above formula does not borrow. movq 24(%rcx), %rax adcq %rbx, %r13 adcq %r10, %r8 adcq $0, %r9 // a[0-3] * b[3] movq %rax, %rbp mulq (%rsi) // a[0] * b[3] addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx xorq %r10, %r10 mulq 24(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 adcq %rdx, %r9 movq %r11, %rbx adcq $0, %r10 // last round reduction. imulq %r14, %r11 // r11 = r11 * ordK = q movq %r11, %rax mulq (%r15) // n[0] * q addq %rax, %rbx // %rbx must be 0 adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 no further carry is required. movq %r11, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), same as above, // hi(n[1]*q) + 1 < 2^64 no further carry is required. movq %r11, %rbx subq %r11, %r13 // r13 = r[2] - q sbbq $0, %rbx // When q>0 rbx - 1 = q - 1 >= 0, // When q=0,(r[2]-q)No borrowing, rbx = rbx - 0 >= 0, // so the following formula does not borrow. addq %rax, %r12 // r12 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r13 // r13 = r[2] - q + hi(n[1]*q) movq %r11, %rax adcq $0, %rbx // Overflowing is not possible. movq %r11, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r11 // r11 = q - hq = hq * 2^32 + lq - hq >= lq, // when lq!=0, the following formula does not borrow. // When lq==0, the preceding formula does not borrow. adcq %rbx, %r8 adcq %r11, %r9 adcq $0, %r10 // mod n movq %r12, %rbx movq %r13, %rbp movq %r8, %rax movq %r9, %rdx subq (%r15), %r12 sbbq 8(%r15), %r13 sbbq 16(%r15), %r8 sbbq 24(%r15), %r9 sbbq $0, %r10 cmovcq %rbx, %r12 cmovcq %rbp, %r13 cmovcq %rax, %r8 cmovcq %rdx, %r9 movq %r12, (%rdi) movq %r13, 8(%rdi) movq %r8, 16(%rdi) movq %r9, 24(%rdi) movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_OrdMul, .-ECP256_OrdMul /** * Function description: Calculate the point doubling of an elliptic curve: res = 2*a * Function prototype: void ECP256_PointDouble(P256_Point *r, const P256_Point *a); * Input register: * rdi: pointer to the output P256_POINT structure * rsi: address pointing to input data a * Change register: rax, rbx, rcx, rdx, rbp, rsi, r8, r9, r10, r11, r12, r13, r14, r15 * Function/Macro Call: ECP256_MulBy2Core, ECP256_SqrCore_q, ECP256_AddCore, ECP256_MulCore_q, ECP256_SubCore * ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b * Deal process: * delta = Z12 * gamma = Y12 * beta = X1*gamma * alpha = 3*(X1-delta)*(X1+delta) * X3 = alpha2-8*beta * Z3 = (Y1+Z1)2-gamma-delta * Y3 = alpha*(4*beta-X3)-8*gamma2 */ .globl ECP256_PointDouble .type ECP256_PointDouble,@function .align 32 ECP256_PointDouble: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 subq $168, %rsp // Create 32 x 5 + 8 stack space. .Lpoint_double_core: vmovdqu (%rsi), %xmm0 // Save x to stack vmovdqu 16(%rsi), %xmm1 vmovdqa %xmm0, (%rsp) vmovdqa %xmm1, 16(%rsp) vmovq %rsi, %xmm3 // Backup a vmovq %rdi, %xmm0 // Backup &r->x, &r->y, &r->z leaq 32(%rdi), %r12 leaq 64(%rdi), %r13 vmovq %r12, %xmm1 vmovq %r13, %xmm2 movq 32(%rsi), %r8 // Read a->y movq 40(%rsi), %r9 movq 48(%rsi), %r10 movq 56(%rsi), %r11 movq 8+.Lpoly(%rip), %r14 // Read P[1], P[3] movq 24+.Lpoly(%rip), %r15 leaq 32(%rsp), %rdi call ECP256_MulBy2Core // ECP256_MulBy2(S, &a->y), Not overwritten rsi movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %rbp movq 88(%rsi), %r15 leaq 64(%rsi), %rsi // Setting Input Parameters leaq 64(%rsp), %rdi // Z2 = rsp + 64 call ECP256_SqrCore_q // ECP256_Sqr(Z2, &a->z) leaq (%rsp), %rdx leaq 96(%rsp), %rdi // M = rsp + 96 call ECP256_AddCore // ECP256_Add(M, a->x, Z2) movq 32(%rsp), %rax movq 40(%rsp), %r14 movq 48(%rsp), %rbp movq 56(%rsp), %r15 leaq 32(%rsp), %rdi // S = rsp + 32 call ECP256_SqrCore_q // ECP256_Sqr(S, S) vmovq %xmm3, %rcx leaq 32(%rcx), %rsi leaq 64(%rcx), %rcx vmovq %xmm2, %rdi call ECP256_MulCore_q // ECP256_Mul(r->z, a->y, a->z) call ECP256_MulBy2Core // ECP256_MulBy2(r->z, r->z) movq (%rsp), %r8 movq 8(%rsp), %r9 movq 16(%rsp), %r10 movq 24(%rsp), %r11 leaq 64(%rsp), %rdx call ECP256_SubCore // ECP256_SubCore(Z2,a->x,Z2) movq %r8, 64(%rsp) movq %r9, 72(%rsp) movq %r10, 80(%rsp) movq %r11, 88(%rsp) movq 32(%rsp), %rax movq 40(%rsp), %r14 movq 48(%rsp), %rbp movq 56(%rsp), %r15 vmovq %xmm1, %rdi call ECP256_SqrCore_q // ECP256_Sqr(r->y,S) call ECP256_DivBy2Core // ECP256_Div(r->y,r->y) leaq 96(%rsp), %rdi leaq 96(%rsp), %rsi leaq 64(%rsp), %rcx call ECP256_MulCore_q // ECP256_MulCore_q(M,M,Z2) call ECP256_MulBy3Core // ECP256_MulBy3Core(M,M) leaq (%rsp), %rcx leaq 32(%rsp), %rsi leaq 32(%rsp), %rdi call ECP256_MulCore_q // ECP256_MulCore_q(S, S, a->x) leaq 128(%rsp), %rdi // T = 128 + rsp call ECP256_MulBy2Core // ECP256_MulBy2Core(T, S) movq 96(%rsp), %rax movq 104(%rsp), %r14 movq 112(%rsp), %rbp movq 120(%rsp), %r15 vmovq %xmm0, %rdi call ECP256_SqrCore_q // ECP256_Sqr(r->x, M) leaq 128(%rsp), %rdx call ECP256_SubCore // ECP256_SubCore(r->x, r->x, T) movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) xorq %rsi, %rsi // ECP256_SubCore(S, S, r->x), output %r12, %r13, %r8, %r9 movq 32(%rsp), %rax movq 40(%rsp), %rbx movq 48(%rsp), %rcx subq %r8, %rax sbbq %r9, %rbx movq 56(%rsp), %rdx movq %rax, %r12 sbbq %r10, %rcx sbbq %r11, %rdx movq %rbx, %r13 movq %rcx, %r8 sbbq $0, %rsi addq $-1, %rax movq %rdx, %r9 adcq %r14, %rbx adcq $0, %rcx adcq %r15, %rdx testq %rsi, %rsi cmovnzq %rax, %r12 cmovnzq %rbx, %r13 cmovnzq %rcx, %r8 cmovnzq %rdx, %r9 movq %r12, 32(%rsp) movq %r13, 40(%rsp) movq %r8, 48(%rsp) movq %r9, 56(%rsp) leaq 32(%rsp), %rdi leaq 32(%rsp), %rsi leaq 96(%rsp), %rcx call ECP256_MulCore_q // ECP256_MulCore_q(S, S, M) vmovq %xmm1, %rdx vmovq %xmm1, %rdi call ECP256_SubCore // ECP256_SubCore(r->y, S, r->y) movq %r8, (%rdi) movq %r9, 8(%rdi) leaq 168+48(%rsp), %rsi movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq -48(%rsi), %r15 movq -40(%rsi), %r14 movq -32(%rsi), %r13 movq -24(%rsi), %r12 movq -16(%rsi), %rbp movq -8(%rsi), %rbx leaq (%rsi), %rsp ret .cfi_endproc .size ECP256_PointDouble, .-ECP256_PointDouble /** * Function description: Elliptic curve point addition calculation: res = a + b * Function prototype: void ECP256_PointAdd(P256_Point *r, const P256_Point *a, const P256_Point *b); * Input register: * rdi: Pointer to the output P256_POINT structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rax, rbx, rcx, rdx, rbp, rsi, r8, r9, r10, r11, r12, r13, r14, r15 * Function/Macro Call: ECP256_PointDouble, ECP256_SqrCore_q, ECP256_MulCore_q, ECP256_SubCore, ECP256_MulBy2Core * ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo * Deal process: * U1 = X1*Z22 * U2 = X2*Z12 * S1 = Y1*Z23 * S2 = Y2*Z13 * H = U2-U1 * r = S2-S1 * X3 = r2-H3-2*U1*H2 * Y3 = r*(U1*H2-X3)-S1*H3 * Z3 = Z1*Z2*H */ .globl ECP256_PointAdd .type ECP256_PointAdd,@function .align 32 ECP256_PointAdd: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 subq $640+8, %rsp // Create 32 x 20 + 8 stack space. vmovdqu (%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vmovdqu 48(%rsi), %xmm3 vmovdqu 64(%rsi), %xmm4 vmovdqu 80(%rsi), %xmm5 movq %rsi, %rcx movq %rdx, %rsi vmovdqu %xmm0, (%rsp) // Save a on the stack, a_cpy: 0~96(%rsp) vmovdqu %xmm1, 16(%rsp) vmovdqu %xmm2, 32(%rsp) vmovdqu %xmm3, 48(%rsp) vmovdqu %xmm4, 64(%rsp) vmovdqu %xmm5, 80(%rsp) vpor %xmm4, %xmm5, %xmm5 // xmm5 = (Za[3]|Za[1], Za[2]|Za[0]) vmovdqu (%rsi), %xmm0 vpshufd $0xb1, %xmm5, %xmm3 // xmm3 = ((lo(Za[3]|Za[1])<<32) | hi(Za[3]|Za[1]), (lo(Za[2]|Za[0])<<32) | hi(Za[2]|Za[0])) vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vpor %xmm3, %xmm5, %xmm5 // xmm5 = ((lo(Za[3]|Za[1])|hi(Za[3]|Za[1]))##~, (lo(Za[2]|Za[0])|hi(Za[2]|Za[0]))##~) vmovdqu 48(%rsi), %xmm3 movq 64(%rsi), %rax // Read b.z, then calculate (b.z)^2 movq 72(%rsi), %r14 movq 80(%rsi), %rbp movq 88(%rsi), %r15 vmovdqu %xmm0, 96(%rsp) // Save b on the stack. b_cpy: 96–192(%rsp) vpshufd $0x1e, %xmm5, %xmm4 // xmm4 = ((lo(Za[2]|Za[0])|hi(Za[2]|Za[0]))##~, (lo(Za[3]|Za[1])|hi(Za[3]|Za[1]))##~) vmovdqu %xmm1, 112(%rsp) vmovdqu 64(%rsi), %xmm0 vmovdqu 80(%rsi), %xmm1 vmovdqu %xmm2, 128(%rsp) vmovdqu %xmm3, 144(%rsp) vpor %xmm4, %xmm5, %xmm5 // xmm5 = ((lo(Za[0]|Za[1]|Za[2]|Za[3])|hi(Za[0]|Za[1]|Za[2]|Za[3]))##~##~##~) vpxor %xmm4, %xmm4, %xmm4 vpor %xmm0, %xmm1, %xmm1 vmovq %rdi, %xmm0 // Backup rdi movq %rax, 160(%rsp) movq %r14, 168(%rsp) leaq 192(%rsp), %rdi // Zb^2: 192~224(%rsp) movq %rbp, 176(%rsp) movq %r15, 184(%rsp) vmovq %rcx, %xmm2 // Backup a call ECP256_SqrCore_q // sqr(Zb^2, Zb) vpcmpeqd %xmm4, %xmm5, %xmm5 // a_infty, Whether a is an infinity point (Za == 0) vpshufd $0xb1, %xmm1, %xmm4 vpor %xmm1, %xmm4, %xmm4 vpshufd $0x1e, %xmm4, %xmm3 vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 // b_infty, Whether b is an infinity point (Zb == 0) movq 64(%rsp), %rax movq 72(%rsp), %r14 leaq 224(%rsp), %rdi // Za^2: 224~256(%rsp) movq 80(%rsp), %rbp movq 88(%rsp), %r15 call ECP256_SqrCore_q // sqr(Za^2, Za) leaq 160(%rsp), %rsi // Zb leaq 192(%rsp), %rcx // Zb^2 leaq 256(%rsp), %rdi // S1: 256~288(%rsp) call ECP256_MulCore_q // mul(S1, Zb, Zb^2) leaq 64(%rsp), %rsi // Za leaq 224(%rsp), %rcx // Za^2 leaq 288(%rsp), %rdi // S2: 288~320(%rsp) call ECP256_MulCore_q // mul(S2, Za, Za^2) leaq 32(%rsp), %rsi // Ya leaq 256(%rsp), %rcx // S1 leaq 256(%rsp), %rdi // S1 call ECP256_MulCore_q // mul(S1,S1,Ya) leaq 128(%rsp), %rsi // Yb leaq 288(%rsp), %rcx // S2 leaq 288(%rsp), %rdi // S2 call ECP256_MulCore_q // mul(S2,S2,Yb) leaq 256(%rsp), %rdx // S1 call ECP256_SubCore // sub(R,S2,S1) movq %r8, 320(%rsp) // R: 320~352(%rsp) movq %r9, 328(%rsp) movq %r10, 336(%rsp) movq %r11, 344(%rsp) orq %r9, %r8 vmovdqa %xmm4, %xmm1 orq %r10, %r8 orq %r11, %r8 vpor %xmm5, %xmm1, %xmm1 // a_infty | b_infty vmovq %r8, %xmm3 leaq (%rsp), %rsi // Xa leaq 192(%rsp), %rcx // Zb^2 leaq 352(%rsp), %rdi // U1: 352~384(%rsp) call ECP256_MulCore_q // Mul(U1, Xa, Zb^2) leaq 96(%rsp), %rsi // Xb leaq 224(%rsp), %rcx // Za^2 leaq 384(%rsp), %rdi // U2: 384~416(%rsp) call ECP256_MulCore_q // Mul(U2, Xb, Za^2) leaq 352(%rsp), %rdx // U1 leaq 416(%rsp), %rdi // H: 416~448(%rsp) call ECP256_SubCore // sub(H,U2,U1) movq %r8, 416(%rsp) movq %r9, 424(%rsp) movq %r10, 432(%rsp) movq %r11, 440(%rsp) orq %r9, %r8 vmovq %xmm1, %r12 orq %r10, %r8 vmovq %xmm3, %r13 orq %r11, %r8 orq %r12, %r8 orq %r13, %r8 jnz .Lpoint_add .Lequal_point: vmovq %xmm0, %rdi vmovq %xmm2, %rsi addq $640-32*5, %rsp jmp .Lpoint_double_core .align 32 .Lpoint_add: movq 320(%rsp), %rax // R movq 328(%rsp), %r14 leaq 448(%rsp), %rdi // R^2: 448~480(%rsp) movq 336(%rsp), %rbp movq 344(%rsp), %r15 call ECP256_SqrCore_q // sqr(R^2,R) leaq 64(%rsp), %rsi // Za leaq 416(%rsp), %rcx // H leaq 480(%rsp), %rdi // Zr:480~512(%rsp) call ECP256_MulCore_q // Mul(Zr,H,Za) movq 416(%rsp), %rax // H movq 424(%rsp), %r14 leaq 512(%rsp), %rdi // H^2:512~544(%rsp) movq 432(%rsp), %rbp movq 440(%rsp), %r15 call ECP256_SqrCore_q // sqr(H^2, H) leaq 480(%rsp), %rdi // Zr leaq 480(%rsp), %rsi // Zr leaq 160(%rsp), %rcx // Zb call ECP256_MulCore_q // Mul(Zr, Zr, Zb) leaq 544(%rsp), %rdi // H3:544~576(%rsp) leaq 512(%rsp), %rsi // H2 leaq 416(%rsp), %rcx // H call ECP256_MulCore_q // mul(H^3,H,H^2) leaq 384(%rsp), %rdi // U2 leaq 352(%rsp), %rsi // U1 leaq 512(%rsp), %rcx // H2 call ECP256_MulCore_q // mul(U2,U1,H^2) leaq 512(%rsp), %rdi // H^2 call ECP256_MulBy2Core // mulby2(H^2,U2) movq 448(%rsp), %rax // sub(Xr,R^2,H^2) movq 456(%rsp), %rbx xorq %rsi, %rsi movq 464(%rsp), %rcx movq 472(%rsp), %rdx subq %r8, %rax sbbq %r9, %rbx movq %rax, %r8 sbbq %r10, %rcx sbbq %r11, %rdx movq %rbx, %r9 sbbq $0, %rsi addq $-1, %r8 movq %rcx, %r10 adcq %r14, %r9 adcq $0, %r10 movq %rdx, %r11 adcq %r15, %r11 testq %rsi, %rsi cmovzq %rax, %r8 cmovzq %rbx, %r9 cmovzq %rcx, %r10 cmovzq %rdx, %r11 leaq 576(%rsp), %rdi // Xr: 576~608(%rsp) leaq 544(%rsp), %rdx // H^3 call ECP256_SubCore // sub(Xr, Xr, H^3) movq %r8, 576(%rsp) movq %r9, 584(%rsp) movq %r10, 592(%rsp) movq %r11, 600(%rsp) movq 384(%rsp), %rax // sub(Yr, U2, Xr) movq 392(%rsp), %rbx xorq %rsi, %rsi movq 400(%rsp), %rcx movq 408(%rsp), %rdx subq %r8, %rax sbbq %r9, %rbx movq %rax, %r8 sbbq %r10, %rcx sbbq %r11, %rdx movq %rbx, %r9 sbbq $0, %rsi addq $-1, %r8 movq %rcx, %r10 adcq %r14, %r9 adcq $0, %r10 movq %rdx, %r11 adcq %r15, %r11 testq %rsi, %rsi cmovzq %rax, %r8 cmovzq %rbx, %r9 cmovzq %rcx, %r10 cmovzq %rdx, %r11 movq %r8, 608(%rsp) // Yr: 608~640(%rsp) movq %r9, 616(%rsp) movq %r10, 624(%rsp) movq %r11, 632(%rsp) leaq 288(%rsp), %rdi // S2 leaq 256(%rsp), %rsi // S1 leaq 544(%rsp), %rcx // H^3 call ECP256_MulCore_q // Mul(S2, S1, H^3) leaq 608(%rsp), %rdi // Yr leaq 608(%rsp), %rsi leaq 320(%rsp), %rcx // r call ECP256_MulCore_q // Mul(Yr, Yr, R) leaq 608(%rsp), %rdi // Yr leaq 288(%rsp), %rdx // S2 call ECP256_SubCore // sub(Yr,Yr,S2) movq %r8, 608(%rsp) movq %r9, 616(%rsp) movq %r10, 624(%rsp) movq %r11, 632(%rsp) vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 // a_infty vmovdqa %xmm5, %xmm1 vpandn 576(%rsp), %xmm0, %xmm0 // !a_infty & Xr vpandn 592(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm2 vmovdqa %xmm5, %xmm3 vpand 96(%rsp), %xmm2, %xmm2 // a_infty & Xb vpand 112(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // a_infty ? Xb : Xr vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 // b_infty vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Xb : Xr) vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm2 vmovdqa %xmm4, %xmm3 vpand (%rsp), %xmm2, %xmm2 // b_infty & Xa vpand 16(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // b_infty ? Xa : (a_infty ? Xb : Xr) vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, (%rdi) vmovdqu %xmm3, 16(%rdi) vmovdqa %xmm5, %xmm0 // a_infty vmovdqa %xmm5, %xmm1 vpandn 608(%rsp), %xmm0, %xmm0 // !a_infty & Yr vpandn 624(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm2 vmovdqa %xmm5, %xmm3 vpand 128(%rsp), %xmm2, %xmm2 // a_infty & Yb vpand 144(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // a_infty ? Yb : Yr vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 // b_infty vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Yb : Yr) vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm2 vmovdqa %xmm4, %xmm3 vpand 32(%rsp), %xmm2, %xmm2 // b_infty & Ya vpand 48(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // b_infty ? Ya : (a_infty ? Yb : Yr) vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 32(%rdi) vmovdqu %xmm3, 48(%rdi) vmovdqa %xmm5, %xmm0 // a_infty vmovdqa %xmm5, %xmm1 vpandn 480(%rsp), %xmm0, %xmm0 // !a_infty & Zr vpandn 496(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm2 vmovdqa %xmm5, %xmm3 vpand 160(%rsp), %xmm2, %xmm2 // a_infty & Zb vpand 176(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // a_infty ? Zb : Zr vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 // b_infty vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Zb : Zr) vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm2 vmovdqa %xmm4, %xmm3 vpand 64(%rsp), %xmm2, %xmm2 // b_infty & Za vpand 80(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // b_infty ? Za : (a_infty ? Zb : Zr) vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 64(%rdi) vmovdqu %xmm3, 80(%rdi) leaq 640+56(%rsp), %rsi movq -48(%rsi), %r15 movq -40(%rsi), %r14 movq -32(%rsi), %r13 movq -24(%rsi), %r12 movq -16(%rsi), %rbp movq -8(%rsi), %rbx leaq (%rsi), %rsp ret .cfi_endproc .size ECP256_PointAdd, .-ECP256_PointAdd /** * Function description: Point addition of normal coordinates and affine coordinates assembly implementation * Function prototype: void ECP256_AddAffine(P256_Point *r, const P256_Point *a, const P256_AffinePoint *b); * Input register: * rdi: Points to the returned P256_Point. * rsi: Points to the input P256_Point. * rdx: P256_AffinePoint that points to the input * Change register: rax, rbx, rcx, rdx, rsi, rdi, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/Macro Call: ECP256_MulBy2Core, ECP256_SqrCore_q, ECP256_AddCore, ECP256_MulCore_q, ECP256_SubCore * ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl * Deal process: * Z1Z1 = Z12 * U2 = X2*Z1Z1 * S2 = Y2*Z1*Z1Z1 * H = U2-X1 * HH = H2 * I = 4*HH * J = H*I * r = 2*(S2-Y1) * V = X1*I * X3 = r2-J-2*V * Y3 = r*(V-X3)-2*Y1*J * Z3 = (Z1+H)2-Z1Z1-HH */ .globl ECP256_AddAffine .type ECP256_AddAffine,@function .align 32 ECP256_AddAffine: .cfi_startproc pushq %rbp pushq %rbx pushq %r12 pushq %r13 pushq %r14 pushq %r15 subq $488, %rsp // open up stack space 32 * 15 + 8 = 488 vmovdqu 0(%rsi), %xmm0 // X1[1]X1[0] --> xmm0 vmovdqu 16(%rsi), %xmm1 // X1[3]X1[2] vmovdqu 32(%rsi), %xmm2 // Y1[1]Y1[0] vmovdqu 48(%rsi), %xmm3 // Y1[3]Y1[2] movq 72(%rsi), %r14 // Z1[1] 64 + 8 movq 64(%rsi), %rax // Z1[0] 64 + 0 vmovdqu 64(%rsi), %xmm4 // Z1[1]Z1[0] movq 88(%rsi), %r15 // Z1[3] 64 + 24 movq 80(%rsi), %rbp // Z1[2] 64 + 16 vmovdqu 80(%rsi), %xmm5 // Z1[3]Z1[2] vmovdqa %xmm0, 320(%rsp) // save X1[1]X1[0] to stack vmovdqa %xmm1, 336(%rsp) // save X1[3]X1[2] to stack vmovdqa %xmm2, 352(%rsp) // save Y1[1]Y1[0] to stack vmovdqa %xmm3, 368(%rsp) // save Y1[3]Y1[2] to stack vmovdqa %xmm4, 384(%rsp) // save Z1[1]Z1[0] to stack vmovdqa %xmm5, 400(%rsp) // save Z1[3]Z1[2] to stack vpor %xmm4, %xmm5, %xmm5 // Z1[1]Z1[0] | Z1[3]Z1[2] vmovdqu (%rdx), %xmm0 // X2[1]X2[0] --> xmm0 vpshufd $0xb1, %xmm5, %xmm3 // Order(10 11 00 01) --> [2 3 0 1] with 32bit vmovdqu 16(%rdx), %xmm1 // X2[3]X2[2] --> xmm1 vmovdqu 32(%rdx), %xmm2 // Y2[1]Y2[0] --> xmm2 vpor %xmm3, %xmm5, %xmm5 // [2 3 0 1] | [3 2 1 0] vmovdqu 48(%rdx), %xmm3 // Y2[3]Y2[2] --> xmm3 vmovdqa %xmm0, 416(%rsp) // save X2[1]X2[0] to stack vpshufd $0x1e, %xmm5, %xmm4 // Order(00 01 11 10) --> [0 1 3 2] vmovdqa %xmm1, 432(%rsp) // save X2[3]X2[1] to stack vpor %xmm0, %xmm1, %xmm1 // X2[1]X2[0] | X2[3]X2[2] vmovq %rdi, %xmm0 // save rdi to xmm0 vmovdqa %xmm2, 448(%rsp) // save X2[1]X2[0] to stack vmovdqa %xmm3, 464(%rsp) // save X2[3]X2[2] to stack vpor %xmm2, %xmm3, %xmm3 // Y2[1]Y2[0] | Y2[3]Y2[2] vpor %xmm4, %xmm5, %xmm5 vpxor %xmm4, %xmm4, %xmm4 // 0 vpor %xmm1, %xmm3, %xmm3 // X2[1]X2[0] | X2[3]X2[2] | Y2[1]Y2[0] | Y2[3]Y2[2] .balign 32 /* Z1Z1 = Z1 ^ 2 */ leaq 64(%rsi), %rsi // addr(z) leaq 32(%rsp), %rdi // save Z1Z1 to stack call ECP256_SqrCore_q // Output: r8 - r11 P[1] --> r14 P[3] --> r15 vpcmpeqd %xmm4, %xmm5, %xmm5 vpshufd $0xb1, %xmm3, %xmm4 // Order(10 11 00 01) vpor %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm5, %xmm5 // Order(00 00 00 00) vpshufd $0x1e, %xmm4, %xmm3 // Order(00 01 11 10) vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm4, %xmm4 /* U2 = X2 * Z1Z1 */ leaq 416(%rsp), %rcx // addr of X2 in stack leaq 32(%rsp), %rsi // read Z1Z1 from stack leaq (%rsp), %rdi // save U2 to stack call ECP256_MulCore_q // ouput: r8 - r11 P[1] --> r14 P[3] --> r15 /* H = U2 - X1 */ leaq 320(%rsp), %rdx // read X1 from stack leaq 64(%rsp), %rdi // save H to stack call ECP256_SubCore // input: rdx, r8 - r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) /* Z1Z1Z1 = Z1Z1 * Z1 */ leaq 384(%rsp), %rcx // read Z1 from stack leaq 32(%rsp), %rsi // read Z1Z1 from stack leaq 32(%rsp), %rdi // save Z1Z1Z1 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) /* Z3/2 = H * Z1 */ leaq 384(%rsp), %rcx // read Z1 from stack leaq 64(%rsp), %rsi // read H from stack leaq 288(%rsp), %rdi // save Z3/2 to stack call ECP256_MulCore_q // P[1] --> r14 P[3] --> r15 /* S2 = Y2 * Z1Z1Z1 */ leaq 448(%rsp), %rcx // read Y2 from stack leaq 32(%rsp), %rsi // read Z1Z1Z1 from stack leaq 32(%rsp), %rdi // save S2 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* r/2 = (S2 - Y1) */ leaq 352(%rsp), %rdx // read Y1 from stack leaq 96(%rsp), %rdi // save r/2 to stack call ECP256_SubCore // output: r8-r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) // save r/2 to stack movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) /* I/4 = H ^ 2 */ leaq 64(%rsp), %rsi // read H from stack movq (%rsi), %rax // a[0] movq 8(%rsi), %r14 // a[1] movq 16(%rsi), %rbp // a[2] movq 24(%rsi), %r15 // a[3] leaq 128(%rsp), %rdi // save I/4 to stack call ECP256_SqrCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* (r/2)^2 = (r^2)/4 */ leaq 96(%rsp), %rsi // read r/2 from stack movq (%rsi), %rax // a[0] movq 8(%rsi), %r14 // a[1] movq 16(%rsi), %rbp // a[2] movq 24(%rsi), %r15 // a[3] leaq 192(%rsp), %rdi // save (r^2)/4 to stack call ECP256_SqrCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* J/4 = I/4 * H */ leaq 128(%rsp), %rcx // read I/4 from stack leaq 64(%rsp), %rsi // read H from stack leaq 160(%rsp), %rdi // save J/4 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* V/4 = X1 * I */ leaq 320(%rsp), %rcx // read X1 from stack leaq 128(%rsp), %rsi // read I/4 from stack leaq (%rsp), %rdi // save V/4 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 xorq %r12, %r12 addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rbp adcq $0, %r12 subq $-1, %r8 movq %r10, %rcx sbbq %r14, %r9 sbbq $0, %r10 movq %r11, %r13 sbbq %r15, %r11 sbbq $0, %r12 leaq 192(%rsp), %rsi // read (r^2)/4 from cmovcq %rax,%r8 // b[0] V/2 --> r8-r11 cmovcq %rbp,%r9 // b[1] cmovcq %rcx,%r10 // b[2] cmovcq %r13,%r11 // b[3] /* (r^2 - 2 * V)/4 = (r^2)/4 - V/2 */ xorq %r13, %r13 movq (%rsi), %rax // a[0] movq 8(%rsi), %rcx // a[1] movq 16(%rsi), %rdx // a[2] movq 24(%rsi), %r12 // a[3] subq %r8, %rax sbbq %r9, %rcx movq %rax, %r8 sbbq %r10, %rdx sbbq %r11, %r12 movq %rcx, %r9 sbbq $0, %r13 addq $-1, %r8 // a - b + P movq %rdx, %r10 adcq %r14, %r9 adcq $0, %r10 movq %r12, %r11 adcq %r15, %r11 testq %r13, %r13 cmovzq %rax, %r8 cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 // output: r8-r11 P[1] --> r14 P[3] --> r15 /* X3/4 = (r^2 - 2 * V - J)/4 = (r^2 - 2 * V)/4 - J/4 */ leaq 160(%rsp), %rdx // read J/4 from stack leaq 224(%rsp), %rdi // save (r^2 - 2 * V - J)/4 to stack call ECP256_SubCore // output: r8-r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) // b[0] movq %r9, 8(%rdi) // b[1] movq %r10, 16(%rdi) // b[2] movq %r11, 24(%rdi) // b[3] /* (V - X3)/4 = V/4 - X3/4 */ leaq (%rsp), %rsi // read (r^2 - 2 * V)/4 from stack xorq %r13, %r13 movq (%rsi), %rax // a[0] movq 8(%rsi), %rcx // a[1] movq 16(%rsi), %rdx // a[2] movq 24(%rsi), %r12 // a[3] subq %r8, %rax sbbq %r9, %rcx movq %rax, %r8 sbbq %r10, %rdx sbbq %r11, %r12 movq %rcx, %r9 sbbq $0, %r13 movq %rdx, %r10 movq %r12, %r11 addq $-1, %r8 // a - b + P adcq %r14, %r9 adcq $0, %r10 adcq %r15, %r11 testq %r13, %r13 cmovzq %rax, %r8 cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 leaq 64(%rsp), %rdi // save (V - X3)/4 from stack movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) // output: r8-r11 P[1] --> r14 P[3] --> r15 /* (J * Y1)/4 = Y1 * J/4 */ leaq 352(%rsp), %rcx // read Y1 from stack leaq 160(%rsp), %rsi // read J/4 from stack leaq 32(%rsp), %rdi // save (J * Y1)/4 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* (r * (V - X3)/8) = (V - X3)/4 * r/2 */ leaq 96(%rsp), %rcx // read r/2 from stack leaq 64(%rsp), %rsi // read (V - X3)/4 from stack leaq 64(%rsp), %rdi // save (r * (V - X3)/8) to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* Y3/8 = (r * (V - X3)/8) - (J * Y1)/4 */ leaq 32(%rsp), %rdx // read (J * Y1)/4 from stack leaq 256(%rsp), %rdi // save Y3/8 call ECP256_SubCore movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 288(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 304(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand .Lone_mont(%rip), %xmm2, %xmm2 vpand .Lone_mont+16(%rip), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 384(%rsp), %xmm2, %xmm2 vpand 400(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 64(%rdi) vmovdqu %xmm3, 80(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 224(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 224+16(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 416(%rsp), %xmm2, %xmm2 vpand 416+16(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 320(%rsp), %xmm2, %xmm2 vpand 336(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 0(%rdi) vmovdqu %xmm3, 16(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 256(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 272(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 448(%rsp), %xmm2, %xmm2 vpand 464(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 352(%rsp), %xmm2, %xmm2 vpand 368(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 32(%rdi) vmovdqu %xmm3, 48(%rdi) addq $488, %rsp popq %r15 popq %r14 popq %r13 popq %r12 popq %rbx popq %rbp ret .cfi_endproc .size ECP256_AddAffine, .-ECP256_AddAffine /** * Function description: This interface is used to store the G-16G pre-computation table discretely. * Function prototype: void ECP256_Scatterw5(P256_Point *table, const P256_Point *point, uint32_t index); * Input register: * rdi: Points to the base address of the pre-computation table. * rsi: Points to P256_Point. * rdx: Index value. The value ranges from 1 to 16. * Change register: rdx, rsi, rdi, r8, r9, r10, r11 * Output register: None * Function/Macro Call: */ .globl ECP256_Scatterw5 .type ECP256_Scatterw5,@function .align 32 ECP256_Scatterw5: .cfi_startproc subq $1, %rdx // index - 1 movq (%rsi), %r8 // x[0] movq 8(%rsi), %r9 // x[1] movq 16(%rsi), %r10 // x[2] movq 24(%rsi), %r11 // x[3] leaq (%rdi, %rdx, 8), %rdi // base = base + (index - 1) * 8 . offset for table movq %r8, (%rdi) // x[0] --> base + 0 * 128 movq %r9, 128(%rdi) // x[1] --> base + 1 * 128 movq %r10, 256(%rdi) // x[2] --> base + 2 * 128 movq %r11, 384(%rdi) // x[3] --> base + 3 * 128 leaq 512(%rdi), %rdi // base + 128 * 4 leaq 32(%rsi), %rsi // addr(y) --> rsi movq (%rsi), %r8 // y[0] movq 8(%rsi), %r9 // y[1] movq 16(%rsi), %r10 // y[2] movq 24(%rsi), %r11 // y[3] movq %r8, (%rdi) // y[0] --> base + 4 * 128 movq %r9, 128(%rdi) // y[1] --> base + 5 * 128 movq %r10, 256(%rdi) // y[2] --> base + 6 * 128 movq %r11, 384(%rdi) // y[3] --> base + 7 * 128 leaq 512(%rdi), %rdi // base + 128 * 8 leaq 32(%rsi), %rsi // addr(z) --> rsi movq (%rsi), %r8 // z[0] movq 8(%rsi), %r9 // z[1] movq 16(%rsi), %r10 // z[2] movq 24(%rsi), %r11 // z[3] movq %r8, (%rdi) // z[0] --> base + 8 * 128 movq %r9, 128(%rdi) // z[1] --> base + 9 * 128 movq %r10, 256(%rdi) // z[2] --> base + 10 * 128 movq %r11, 384(%rdi) // z[3] --> base + 11 * 128 ret .cfi_endproc .size ECP256_Scatterw5, .-ECP256_Scatterw5 /** * Function description: This interface is used to obtain the G-16G pre-computation table discretely. * Function prototype: void ECP256_Gatherw5(P256_Point *point, const P256_Point *table, uint32_t index); * Input register: * rdi: points to P256_Point. * rsi: points to the base address of the pre-computation table. * edx: index value * Change register: edx, rsi, rdi, r8, r9, r10, r11 * Output register: None * Function/Macro Call: */ .globl ECP256_Gatherw5 .type ECP256_Gatherw5,@function .align 32 ECP256_Gatherw5: .cfi_startproc movq $-1, %rax xorq %rcx, %rcx cmp $0, %rdx cmovzq %rcx, %rax // rax = (rdx == 0) ? 0 : -1 add %rax, %rdx // rdx = (rdx == 0) ? rdx : (rdx - 1) leaq (%rsi, %rdx, 8), %rsi // Calculate offset. base = base + (index -1) * 8 movq (%rsi), %r8 // x[0] movq 128(%rsi), %r9 // x[1] movq 256(%rsi), %r10 // x[2] movq 384(%rsi), %r11 // x[3] leaq 512(%rsi), %rsi // base += 512 andq %rax, %r8 andq %rax, %r9 andq %rax, %r10 andq %rax, %r11 movq %r8, (%rdi) // Write back movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) leaq 32(%rdi), %rdi // Write back point offset movq (%rsi), %r8 // y[0] movq 128(%rsi), %r9 // y[1] movq 256(%rsi), %r10 // y[2] movq 384(%rsi), %r11 // y[3] leaq 512(%rsi), %rsi // base += 512 andq %rax, %r8 andq %rax, %r9 andq %rax, %r10 andq %rax, %r11 movq %r8, (%rdi) // Write back movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) leaq 32(%rdi), %rdi // Write back point offset movq (%rsi), %r8 // z[0] movq 128(%rsi), %r9 // z[1] movq 256(%rsi), %r10 // z[2] movq 384(%rsi), %r11 // z[3] andq %rax, %r8 andq %rax, %r9 andq %rax, %r10 andq %rax, %r11 movq %r8, (%rdi) // Write back movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_Gatherw5, .-ECP256_Gatherw5 /** * Function description: Discretely obtains affine points in the precomputation table. * Function prototype: void ECP256_Gatherw7(P256_AffinePoint *point, const P256_AffinePoint *table, uint32_t index); * Input register: * rdi: points to the returned P256_AffinePoint. * rsi: points to the base address of the pre-computation table. * rdx: index value * Change register: rax, rcx, rdx, rsi, rdi, rbp, r8, r9, r10 * Output register: None * Function/Macro Call: */ .globl ECP256_Gatherw7 .type ECP256_Gatherw7,@function .align 32 ECP256_Gatherw7: .cfi_startproc movq $-1, %rax xorq %rcx, %rcx cmp $0, %rdx cmovzq %rcx, %rax // rax = (rdx == 0) ? 0 : -1 addq %rax, %rdx // rdx = (rdx == 0) ? rdx : (rdx - 1) subq $63, %rdx // rdx = (rdx == 0) ? (rdx - 63) : (rdx - 1 - 63) subq %rdx, %rsi // rsi = (rdx == 0) ? (rsi + 63 - rdx) : (rsi + 64 - rdx) movq $8, %r10 // Loop value .Lgather_w7_loop: xorq %r8, %r8 // Empty reg for data low 32 xorq %r9, %r9 // Empty reg for data high 32 movb 192(%rsi), %r8b // r8 = [0 0 0 byte(3)] movb 448(%rsi), %r9b // r9 = [0 0 0 byte(7)] shlq $8, %r8 // r8 = [0 0 byte(3) 0] shlq $8, %r9 // r9 = [0 0 byte(7) 0] movb 128(%rsi), %r8b // r8 = [0 0 byte(3) byte(2)] movb 384(%rsi), %r9b // r9 = [0 0 byte(7) byte(6)] shlq $8, %r8 // r8 = [0 byte(3) byte(2) 0] shlq $8, %r9 // r9 = [0 byte(7) byte(6) 0] movb 64(%rsi), %r8b // r8 = [0 byte(3) byte(2) byte(1)] movb 320(%rsi), %r9b // r9 = [0 byte(7) byte(6) byte(5)] shlq $8, %r8 // r8 = [byte(3) byte(2) byte(1) 0] shlq $8, %r9 // r9 = [byte(7) byte(6) byte(5) 0] movb (%rsi), %r8b // r8 = [byte(3) byte(2) byte(1) byte(0)] movb 256(%rsi), %r9b // r9 = [byte(7) byte(6) byte(5) byte(4)] leaq 512(%rsi), %rsi // base += 64 * 8 shlq $32, %r9 // r9 = [byte(7) byte(6) byte(5) byte(4) 0 0 0 0] orq %r9, %r8 // r8 = [byte(7) byte(6) byte(5) byte(4) byte(3) byte(2) byte(1) byte(0)] andq %rax, %r8 movq %r8, (%rdi) leaq 8(%rdi), %rdi subq $1, %r10 jnz .Lgather_w7_loop ret .cfi_endproc .size ECP256_Gatherw7, .-ECP256_Gatherw7 #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm/ecp256_x86_64.S
Unix Assembly
unknown
94,871
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE_SM2 #include "crypt_arm.h" .file "ecp_sm2_armv8.S" #define s0 x7 #define s1 x8 #define s2 x9 #define s3 x10 #define s4 x11 #define s5 x12 #define s6 x13 #define s7 x14 .section .rodata # The polynomial .align 4 .Lpoly: .quad 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff # The order of polynomial .Lord: .quad 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff .Lpoly_div_2: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_div_2: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lzero: .quad 0, 0, 0, 0 .Lord_1div4: .quad 0xd4eefd024e755049, 0xdc80f7dac871814a, 0xffffffffffffffff, 0x3fffffffbfffffff .Lord_2div4: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_3div4: .quad 0x7eccf706eb5ff0db, 0x9582e790595483e0, 0xffffffffffffffff, 0xbfffffff3fffffff .Lpoly_1div4: .quad 0x4000000000000000, 0xffffffffc0000000, 0xffffffffffffffff, 0x3fffffffbfffffff .Lpoly_2div4: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lpoly_3div4: .quad 0xc000000000000000, 0xffffffff40000000, 0xffffffffffffffff, 0xbfffffff3fffffff .LRR: // 2^512 mod P precomputed for sm2 polynomial .quad 0x0000000200000003, 0x00000002ffffffff, 0x0000000100000001, 0x0000000400000002 .Lone_mont: .quad 0x0000000000000001, 0x00000000ffffffff, 0x0000000000000000, 0x0000000100000000 .Lone: .quad 1,0,0,0 .text ### Right shift: in >> 1 ### # void ECP_Sm2Div2(BN_UINT *r, BN_UINT *a); # 1-bit right shift .globl ECP_Sm2Div2 .type ECP_Sm2Div2, %function .align 4 ECP_Sm2Div2: AARCH64_PACIASP # Load inputs ldp x9, x10, [x1] ldp x11, x12, [x1, #16] # Right shift extr x9, x10, x9, #1 extr x10, x11, x10, #1 extr x11, x12, x11, #1 lsr x12, x12, #1 # Store results stp x9, x10, [x0] stp x11, x12, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div2, .-ECP_Sm2Div2 ### Right shift: in >> 2 ### # void ECP_Sm2Div4(BN_UINT *r, BN_UINT *a); # 2-bit right shift .globl ECP_Sm2Div4 .type ECP_Sm2Div4, %function .align 4 ECP_Sm2Div4: AARCH64_PACIASP # Load inputs ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Right shift extr x7, x8, x7, #2 extr x8, x9, x8, #2 extr x9, x10, x9, #2 lsr x10, x10, #2 # Store results stp x7, x8, [x0] stp x9, x10, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div4, .-ECP_Sm2Div4 ### Sub: r = a-b ### .globl ECP_Sm2BnSub .type ECP_Sm2BnSub, %function .align 4 ECP_Sm2BnSub: AARCH64_PACIASP # Load inputs ldp x7, x8, [x1] ldp x11, x12, [x2] ldp x9, x10, [x1, #16] ldp x13, x14, [x2, #16] # Sub subs x7,x7,x11 sbcs x8,x8,x12 sbcs x9,x9,x13 sbc x10,x10,x14 # Store results stp x7, x8, [x0] stp x9, x10, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2BnSub, .-ECP_Sm2BnSub ### Add: r = a+b ### .globl ECP_Sm2BnAdd .type ECP_Sm2BnAdd, %function .align 4 ECP_Sm2BnAdd: AARCH64_PACIASP # Load inputs ldp x7, x8, [x1] ldp x11, x12, [x2] ldp x9, x10, [x1, #16] ldp x13, x14, [x2, #16] # Add adds x7,x7,x11 adcs x8,x8,x12 adcs x9,x9,x13 adc x10,x10,x14 # Store results stp x7, x8, [x0] stp x9, x10, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2BnAdd, .-ECP_Sm2BnAdd ### Modular div by 2: res = in/2 mod p ### # void ECP_Sm2Div2ModP(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div2ModP .type ECP_Sm2Div2ModP, %function .align 4 ECP_Sm2Div2ModP: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last bit mov x11, x3 # Right shift 1 extr x3, x4, x3, #1 extr x4, x5, x4, #1 extr x5, x6, x5, #1 lsr x6, x6, #1 # Load polynomial adrp x1, .Lpoly_div_2 add x1,x1,:lo12:.Lpoly_div_2 ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Parity check tst x11, #1 csel x7,xzr,x7,eq csel x8,xzr,x8,eq csel x9,xzr,x9,eq csel x10,xzr,x10,eq # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div2ModP, .-ECP_Sm2Div2ModP ### Modular div by 2: res = in/2 mod n, where n = ord(p) ### # void ECP_Sm2Div2ModOrd(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div2ModOrd .type ECP_Sm2Div2ModOrd, %function .align 4 ECP_Sm2Div2ModOrd: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last bit mov x11, x3 # Right shift 1 extr x3, x4, x3, #1 extr x4, x5, x4, #1 extr x5, x6, x5, #1 lsr x6, x6, #1 # Load polynomial adrp x1, .Lord_div_2 add x1,x1,:lo12:.Lord_div_2 ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Parity check tst x11, #1 csel x7,xzr,x7,eq csel x8,xzr,x8,eq csel x9,xzr,x9,eq csel x10,xzr,x10,eq # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div2ModOrd, .-ECP_Sm2Div2ModOrd ### Modular div by 4: res = in/4 mod p ### # void ECP_Sm2Div4ModP(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div4ModP .type ECP_Sm2Div4ModP, %function .align 4 ECP_Sm2Div4ModP: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last 2 bits and x11, x3, 0x3 # Right shift 2 extr x3, x4, x3, #2 extr x4, x5, x4, #2 extr x5, x6, x5, #2 lsr x6, x6, #2 # Load polynomial adrp x12, .Lzero add x12,x12,:lo12:.Lzero adrp x13, .Lpoly_1div4 add x13,x13,:lo12:.Lpoly_1div4 adrp x14, .Lpoly_2div4 add x14,x14,:lo12:.Lpoly_2div4 adrp x15, .Lpoly_3div4 add x15,x15,:lo12:.Lpoly_3div4 cmp x11, #1 csel x1,x12,x13,cc cmp x11, #2 csel x1,x1,x14,cc cmp x11, #3 csel x1,x1,x15,cc ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div4ModP, .-ECP_Sm2Div4ModP ### Modular div by 4: res = in/4 mod n, where n = ord(p) ### # void ECP_Sm2Div4ModOrd(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div4ModOrd .type ECP_Sm2Div4ModOrd, %function .align 4 ECP_Sm2Div4ModOrd: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last 2 bits and x11, x3, 0x3 # Right shift 2 extr x3, x4, x3, #2 extr x4, x5, x4, #2 extr x5, x6, x5, #2 lsr x6, x6, #2 # Load polynomial adrp x12, .Lzero add x12,x12,:lo12:.Lzero adrp x13, .Lord_1div4 add x13,x13,:lo12:.Lord_1div4 adrp x14, .Lord_2div4 add x14,x14,:lo12:.Lord_2div4 adrp x15, .Lord_3div4 add x15,x15,:lo12:.Lord_3div4 cmp x11, #1 csel x1,x12,x13,cc cmp x11, #2 csel x1,x1,x14,cc cmp x11, #3 csel x1,x1,x15,cc ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div4ModOrd, .-ECP_Sm2Div4ModOrd #define bn_mod_add(mod) \ /* Load inputs */ \ ldp x3,x4,[x1]; \ ldp x5,x6,[x1,#0x10]; \ /* Addition */ \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ adds x3,x3,x7; \ adcs x4,x4,x8; \ adcs x5,x5,x9; \ adcs x6,x6,x10; \ adc x15,xzr,xzr; \ mov x11,x3; \ mov x12,x4; \ mov x13,x5; \ mov x14,x6; \ /* Sub polynomial */ \ adrp x2, mod; \ add x2, x2, :lo12:mod; \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ subs x11,x11,x7; \ sbcs x12,x12,x8; \ sbcs x13,x13,x9; \ sbcs x14,x14,x10; \ sbcs x15,x15,xzr; \ csel x3,x3,x11,cc; \ csel x4,x4,x12,cc; \ csel x5,x5,x13,cc; \ csel x6,x6,x14,cc; \ /* Store results */ \ stp x3,x4,[x0]; \ stp x5,x6,[x0,#0x10]; \ #define bn_mod_sub(mod) \ /* Load inputs */ \ ldp x3,x4,[x1]; \ ldp x5,x6,[x1,#0x10]; \ /* Addition */ \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ subs x3,x3,x7; \ sbcs x4,x4,x8; \ sbcs x5,x5,x9; \ sbcs x6,x6,x10; \ sbc x15,xzr,xzr; \ mov x11,x3; \ mov x12,x4; \ mov x13,x5; \ mov x14,x6; \ /* Add polynomial */ \ adrp x2, mod; \ add x2, x2, :lo12:mod; \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ adds x11,x11,x7; \ adcs x12,x12,x8; \ adcs x13,x13,x9; \ adcs x14,x14,x10; \ tst x15,x15; \ csel x3,x3,x11,eq; \ csel x4,x4,x12,eq; \ csel x5,x5,x13,eq; \ csel x6,x6,x14,eq; \ /* Store results */ \ stp x3,x4,[x0]; \ stp x5,x6,[x0,#0x10]; \ ### Modular add: r = a+b mod p ### .globl ECP_Sm2AddModP .type ECP_Sm2AddModP, @function .align 4 ECP_Sm2AddModP: AARCH64_PACIASP bn_mod_add(.Lpoly); AARCH64_AUTIASP ret .size ECP_Sm2AddModP, .-ECP_Sm2AddModP ### Modular sub: r = p - r ### .globl ECP_Sm2Neg .type ECP_Sm2Neg, @function .align 4 ECP_Sm2Neg: AARCH64_PACIASP ldp x11, x12, [x1] mov x7, #0xffffffff00000000 ldp x13, x14, [x1, #16] mov x8, #0xfffffffeffffffff mov x10, #-1 subs x9,x10,x11 sbcs x7,x7,x12 sbcs x10,x10,x13 sbc x8,x8,x14 stp x9, x7, [x0] stp x10, x8, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Neg, .-ECP_Sm2Neg ### Modular sub: r = a-b mod p ### .globl ECP_Sm2SubModP .type ECP_Sm2SubModP, @function .align 4 ECP_Sm2SubModP: AARCH64_PACIASP bn_mod_sub(.Lpoly); AARCH64_AUTIASP ret .size ECP_Sm2SubModP, .-ECP_Sm2SubModP ### Modular add: r = a+b mod n/p, where n = ord(p) ### .globl ECP_Sm2AddModOrd .type ECP_Sm2AddModOrd, @function .align 4 ECP_Sm2AddModOrd: AARCH64_PACIASP bn_mod_add(.Lord); AARCH64_AUTIASP ret .size ECP_Sm2AddModOrd, .-ECP_Sm2AddModOrd ### Modular sub: r = a-b mod n/p, where n = ord(p) ### .globl ECP_Sm2SubModOrd .type ECP_Sm2SubModOrd, @function .align 4 ECP_Sm2SubModOrd: AARCH64_PACIASP bn_mod_sub(.Lord); AARCH64_AUTIASP ret .size ECP_Sm2SubModOrd, .-ECP_Sm2SubModOrd .macro RDC # registers map # x3 x4 x5 x6 x15 # rsi rax rcx rdx rbx # r = a mod sm2 # a = a15 | a14 | ... | a0, where ai are 32–bit quantities # | a7 | a6 | a5 | a4 | a3 | a2 | a1 | a0 | (+) # | a8 | a11 | a10 | a9 | a8 | 0 | a9 | a8 | (+) # | a9 | a14 | a13 | a12 | a11 | 0 | a10 | a9 | (+) # | a10 | a15 | a14 | a13 | a12 | 0 | a11 | a10 | (+) # | a11 | 0 | a15 | a14 | a13 | 0 | a12 | a11 | (+) # | a12 | 0 | a15 | a14 | a13 | 0 | a13 | a12 | (+) # | a12 | 0 | 0 | a15 | a14 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | a15 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | 0 | 0 | 0 | 0 | 0 | a8 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a9 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a13 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a14 | 0 | 0 | (-) # | U[7]| U[6]| U[5]| U[4]| U[3]| U[2]| U[1]| U[0]| # | V[3] | V[2] | V[1] | V[0] | # until r < sm2 # s7 (a15|a14), s6 (a13|a12), s5 (a11|a10), s4 (a9|a8) # s3 (a7|a6), s2 (a5|a4), s1 (a3|a2), s0 (a1|a0) # 1. 64-bit addition eor x3, x3, x3 // to store all carry eor x4, x4, x4 mov x5, s6 // rcx <- s6 mov x6, s4 // rdx <- s4 # a13 | a12 adds x5, x5, s7 // rcx <- s6 + s7 adcs x4, xzr, xzr // rax <- carry(s6+s7) adds x5, x5, s7 // rcx <- s6 + 2*s7 adcs x4, x4, xzr # a9 | a8 mov x15, x4 // rbx <- carry (rax) adds x6, x6, x5 // rdx <- s4 + s6 + 2*s7 adcs x15, x15, xzr adds x6, x6, s5 // rdx <- s4 + s5 + s6 + 2*s7 adcs x15, x15, xzr # sum adds s0, s0, x6 // s0 <- s0 + s4 + s5 + s6 + 2*s7 adcs s1, s1, x15 // s1 <- s1 + rbx + carry adcs s2, s2, x5 // s2 <- s2 + s6 + 2*s7 + carry adcs s3, s3, s7 adcs x3, xzr, xzr # add carry adds s3, s3, x4 adcs x3, x3, xzr // all carry stp s0, s1, [sp, #32] stp s2, s3, [sp, #48] # 2. 4 -> 8 64-bit to 32-bit spread mov x4, #0xffffffff mov s0, s4 mov s1, s5 mov s2, s6 mov s3, s7 and s0, s0, x4 // a8 and s1, s1, x4 // a10 and s2, s2, x4 // a12 and s3, s3, x4 // a14 lsr s4, s4, #32 // a9 lsr s5, s5, #32 // a11 lsr s6, s6, #32 // a13 lsr s7, s7, #32 // a15 # 3. 32-bit addition mov x4, s3 add x4, x4, s2 // rax <- a12 + a14 mov x15, s3 add x15, x15, s1 // rbx <- a10 + a14 mov x5, s7 add x5, x5, s6 // rcx <- a13 + a15 mov x6, s0 add x6, x6, s4 // rdx <- a8 + a9 add s7, s7, s5 // s7 <- a11 + a15 mov s2, x5 // s2 <- a13 + a15 add s2, s2, x4 // s2 <- a12 + a13 + a14 + a15 add s1, s1, s2 // s1 <- a10 + a12 + a13 + a14 + a15 add s1, s1, s2 // s1 <- a10 + 2*(a12 + a13 + a14 + a15) add s1, s1, x6 // s1 <- a8 + a9 + a10 + 2*(a12 + a13 + a14 + a15) add s1, s1, s5 // s1 <- a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) add s2, s2, s6 // s2 <- a12 + 2*a13 + a14 + a15 add s2, s2, s5 // s2 <- a11 + a12 + 2*a13 + a14 + a15 add s2, s2, s0 // s2 <- a8 + a11 + a12 + 2*a13 + a14 + a15 add x6, x6, s3 // rdx <- a8 + a9 + a14 add x6, x6, s6 // rdx <- a8 + a9 + a13 + a14 add s4, s4, x5 // s4 <- a9 + a13 + a15 add s5, s5, s4 // s5 <- a9 + a11 + a13 + a15 add s5, s5, x5 // s5 <- a9 + a11 + 2*(a13 + a15) add x4, x4, x15 // rax <- a10 + a12 + 2*a14 # U[0] s5 a9 + a11 + 2*(a13 + a15) # U[1] %rax a10 + a12 + 2*a14 # U[2] # U[3] s2 a8 + a11 + a12 + 2*a13 + a14 + a15 # U[4] s4 a9 + a13 + a15 # U[5] %rbx a10 + a14 # U[6] s7 a11 + a15 # U[7] s1 a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) # sub %rdx a8 + a9 + a13 + a14 # s0 s3 s6 %rcx # 4. 8 -> 4 32-bit to 64-bit # sub %rdx mov s0, x4 lsl s0, s0, #32 extr x4, s2, x4, #32 extr s2, x15, s2, #32 extr x15, s1, x15, #32 lsr s1, s1, #32 # 5. 64-bit addition adds s5, s5, s0 adcs x4, x4, xzr adcs s4, s4, s2 adcs s7, s7, x15 adcs x3, x3, s1 # V[0] s5 # V[1] %rax # V[2] s4 # V[3] s7 # carry %rsi # sub %rdx # 5. ADD & SUB ldp s0, s1, [sp, #32] ldp s2, s3, [sp, #48] # ADD adds s0, s0, s5 adcs s1, s1, x4 adcs s2, s2, s4 adcs s3, s3, s7 adcs x3, x3, xzr # SUB subs s1, s1, x6 sbcs s2, s2, xzr sbcs s3, s3, xzr sbcs x3, x3, xzr # 6. MOD # First Mod mov x4, x3 lsl x4, x4, #32 mov x5, x4 subs x4, x4, x3 adds s0, s0, x3 adcs s1, s1, x4 adcs s2, s2, xzr adcs s3, s3, x5 # Last Mod # return y - p if y > p else y mov s4, s0 mov s5, s1 mov s6, s2 mov s7, s3 adrp x3, .Lpoly add x3, x3, :lo12:.Lpoly ldp x4, x15, [x3] ldp x16, x17, [x3, #16] eor x5, x5, x5 adcs x5, xzr, xzr subs s0, s0, x4 sbcs s1, s1, x15 sbcs s2, s2, x16 sbcs s3, s3, x17 sbcs x5, x5, xzr csel s0, s0, s4, cs csel s1, s1, s5, cs csel s2, s2, s6, cs csel s3, s3, s7, cs stp s0, s1, [x0] stp s2, s3, [x0, #16] .endm ### Modular mul: r = a*b mod p ### # void ECP_Sm2Mul(uint64_t *r, const uint64_t *a, const uint64_t *b) # 256-bit modular multiplication in SM2 # r %rdi # a %rsi # b %rdx # registers map # s0 s1 s2 s3 s4 s5 s6 s7 # x7 x8 x9 x10 x11 x12 x13 x14 x3 x4 x5 x6 x15 # r8 r9 r10 r11 r12 r13 r14 r15 rax rdx rbx rcx rsi .globl ECP_Sm2Mul .type ECP_Sm2Mul, @function .align 4 ECP_Sm2Mul: AARCH64_PACIASP # Store scalar registers stp x29, x30, [sp, #-80]! add x29, sp, #0 stp x16, x17, [sp, #16] stp x18, x19, [sp, #64] # Load inputs ldp s0, s1, [x1] ldp s2, s3, [x1, #16] ldp s4, s5, [x2] ldp s6, s7, [x2, #16] ### multiplication ### # ======================== # s7 s6 s5 s4 # * s3 s2 s1 s0 # ------------------------ # + s0 s0 s0 s0 # * * * * # s7 s6 s5 s4 # s1 s1 s1 s1 # * * * * # s7 s6 s5 s4 # s2 s2 s2 s2 # * * * * # s7 s6 s5 s4 # s3 s3 s3 s3 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s0*s4 ### mul x16, s0, s4 umulh x5, s0, s4 eor x6, x6, x6 ### s1*s4 + s0*s5 ### mul x3, s1, s4 umulh x4, s1, s4 adds x5, x5, x3 adcs x6, x6, x4 eor x15, x15, x15 mul x3, s0, s5 umulh x4, s0, s5 adds x5, x5, x3 adcs x6, x6, x4 adcs x15, x15, xzr mov x17, x5 eor x5, x5, x5 ### s2 * s4 + s1 * s5 + s0 *s6 ### mul x3, s2, s4 umulh x4, s2, s4 adds x6, x6, x3 adcs x15, x15, x4 mul x3, s1, s5 umulh x4, s1, s5 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mul x3, s0, s6 umulh x4, s0, s6 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mov x18, x6 eor x6, x6, x6 ### s3*s4 + s2*s5 + s1*s6 + s0*s7 ### mul x3, s3, s4 umulh x4, s3, s4 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mul x3, s2, s5 umulh x4, s2, s5 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mul x3, s1, s6 umulh x4, s1, s6 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mul x3, s0 ,s7 umulh x4, s0, s7 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mov x19, x15 eor x15, x15, x15 ### s3*s5 + s2*s6 + s1*s7 ### mul x3, s3, s5 umulh x4, s3, s5 adds x5, x5, x3 adcs x6, x6, x4 # carry adcs x15, x15, xzr mul x3, s2, s6 umulh x4, s2, s6 adds x5, x5, x3 adcs x6, x6, x4 adcs x15, x15, xzr mul x3, s1, s7 umulh x4, s1, s7 adds x5, x5, x3 adcs x6, x6, x4 adcs x15, x15, xzr mov s4, x5 eor x5, x5, x5 ### s3*s6 + s2*s7 ### mul x3, s3, s6 umulh x4, s3, s6 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mul x3, s2, s7 umulh x4, s2, s7 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mov s5, x6 ### s3*s7 ### mul x3, s3, s7 umulh x4, s3, s7 adds x15, x15, x3 adcs x5, x5, x4 mov s6, x15 mov s7, x5 mov s0, x16 mov s1, x17 mov s2, x18 mov s3, x19 # result of mul: s7 s6 s5 s4 s3 s2 s1 s0 ### Reduction ### RDC # Restore scalar registers ldp x16, x17, [sp, #16] ldp x18, x19, [sp, #64] ldp x29, x30, [sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2Mul, .-ECP_Sm2Mul ### Modular sqr: r = a^2 mod p ### # void ECP_Sm2Sqr(uint64_t *r, const uint64_t *a) # 256-bit modular multiplication in SM2 ### # r %rdi # a %rsi # registers map # s0 s1 s2 s3 s4 s5 s6 s7 # x7 x8 x9 x10 x11 x12 x13 x14 x3 x4 x5 x6 x15 x16 x17 # r8 r9 r10 r11 r12 r13 r14 r15 rax rdx rbx rcx rsi rbp rdi .globl ECP_Sm2Sqr .type ECP_Sm2Sqr, @function .align 4 ECP_Sm2Sqr: AARCH64_PACIASP # Store scalar registers stp x29, x30, [sp, #-64]! add x29, sp, #0 stp x16, x17, [sp, #16] # Load inputs ldp s4, s5, [x1] ldp s6, s7, [x1, #16] ### square ### # ======================== # s7 s6 s5 s4 # * s7 s6 s5 s4 # ------------------------ # + s4 s4 s4 s4 # * * * * # s7 s6 s5 s4 # s5 s5 s5 s5 # * * * * # s7 s6 s5 s4 # s6 s6 s6 s6 # * * * * # s7 s6 s5 s4 # s7 s7 s7 s7 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s1 <- s4*s5, s2 <- carry ### mul s1, s4, s5 umulh s2, s4, s5 eor s3, s3, s3 ### s2 <- s4*s6 + carry(s2), s3 <- carry ### mul x3, s6, s4 umulh s3, s6, s4 adds s2, s2, x3 adcs s3, s3, xzr eor s0, s0, s0 ### s3 <- s4*s7 + s5*s6 + carry(s3), s0 <- carry ### mul x3, s7, s4 umulh x4, s7, s4 adds s3, s3, x3 adcs s0, s0, x4 eor x5, x5, x5 mul x3, s6, s5 umulh x4, s6, s5 adds s3, s3, x3 adcs s0, s0, x4 adcs x5, xzr, xzr ### s0 <- s5*s7 + carry(s0), rbx <- carry ### mul x3, s7, s5 umulh x4, s7, s5 adds s0, s0, x3 adcs x5, x5, x4 eor x6, x6, x6 ### rbx <- s6*s7 + carry(rbx), rcx <- carry ### mul x3, s7, s6 umulh x4, s7, s6 adds x5, x5, x3 adcs x6, x6, x4 eor x15, x15, x15 ### 2*s0|1|2|3 ### adds s1, s1, s1 adcs s2, s2, s2 adcs s3, s3, s3 adcs s0, s0, s0 adcs x5, x5, x5 # update carry adcs x6, x6, x6 adcs x15, xzr, xzr ### rbp <- s4*s4, carry <- rdi ### mul x16, s4, s4 umulh x17, s4, s4 ### s4 <- s5*s5, carry <- s5 ### mul s4, s5, s5 umulh s5, s5, s5 ### s6*s6 ### mul x3, s6, s6 umulh x4, s6, s6 # s1 += carry(s4*s4) adds s1, s1, x17 # s2 += s5*s5 adcs s2, s2, s4 # s3 += carry(s5*s5) adcs s3, s3, s5 # s4(s0) += s6*s6 adcs s0, s0, x3 # s5(rbx) += carry(s6*s6) adcs x5, x5, x4 adcs x6, x6, xzr adcs x15, x15, xzr ### s7*s7 ### mul x3, s7, s7 umulh x4, s7, s7 # s6(rcx) += s7*s7 adds x6, x6, x3 # s7(rsi) += carry(s7*s7) adcs x15, x15, x4 mov s4, s0 mov s0, x16 mov s5, x5 mov s6, x6 mov s7, x15 # result of mul: s7 s6 s5 s4 s3 s2 s1 s0= ### Reduction ### RDC # Restore scalar registers ldp x16, x17, [sp, #16] ldp x29, x30, [sp], #64 AARCH64_AUTIASP ret .size ECP_Sm2Sqr, .-ECP_Sm2Sqr .globl ECP_Sm2ToMont .type ECP_Sm2ToMont,%function .align 4 ECP_Sm2ToMont: AARCH64_PACIASP stp x29, x30,[sp, #-32]! add x29,sp, #0 stp x19, x20,[sp, #16] adrp x3, .LRR // bp[0] add x3, x3,:lo12:.LRR ldr x3,[x3] ldp x4, x5,[x1] ldp x6, x7,[x1, #16] adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 ldr x14,[x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 ldr x15,[x15] adrp x2, .LRR add x2, x2,:lo12:.LRR bl ECP_Sm2MulMont ldp x19, x20,[sp, #16] ldp x29, x30,[sp], #32 AARCH64_AUTIASP ret .size ECP_Sm2ToMont,.-ECP_Sm2ToMont .globl ECP_Sm2FromMont .type ECP_Sm2FromMont,%function .align 4 ECP_Sm2FromMont: AARCH64_PACIASP stp x29, x30,[sp, #-32]! add x29,sp, #0 stp x19, x20,[sp, #16] adrp x2, .Lone add x2, x2,:lo12:.Lone ldr x3, [x2] ldp x4, x5,[x1] ldp x6, x7,[x1, #16] adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 ldr x14, [x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 ldr x15, [x15] bl ECP_Sm2MulMont ldp x19, x20,[sp, #16] ldp x29, x30,[sp], #32 AARCH64_AUTIASP ret .size ECP_Sm2FromMont,.-ECP_Sm2FromMont .type ECP_Sm2MulMont,%function .align 4 ECP_Sm2MulMont: AARCH64_PACIASP // a[0~3] * b[0] mul x8, x4, x3 umulh x16, x4, x3 mul x9, x5, x3 umulh x17, x5, x3 mul x10, x6, x3 umulh x19, x6, x3 mul x11, x7, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adc x12, xzr, x20 ldr x3, [x2, #8] // get b[1] // begin 1st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 mov x13, xzr adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // lo(a[0~3]) * b[1] mul x16, x4, x3 mul x17, x5, x3 mul x19, x6, x3 mul x20, x7, x3 adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x12, x12, xzr // hi(a[0~3]) * b[1] umulh x16, x4, x3 umulh x17, x5, x3 umulh x19, x6, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adcs x12, x12, x20 adc x13, xzr, xzr ldr x3, [x2, #8*2] // get b[2] // begin 2st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // lo(a[0~3] * b[2]) mul x16, x4, x3 mul x17, x5, x3 mul x19, x6, x3 mul x20, x7, x3 adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x12, x12, xzr // hi(a[0~3] * b[2]) umulh x16, x4, x3 umulh x17, x5, x3 umulh x19, x6, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adcs x12, x12, x20 adc x13, xzr, xzr ldr x3,[x2, #8*3] // get b[3] // begin 3st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // lo(a[0~3] * b[3]) mul x16, x4, x3 mul x17, x5, x3 mul x19, x6, x3 mul x20, x7, x3 adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x12, x12, xzr // hi(a[0~3] * b[3]) umulh x16, x4, x3 umulh x17, x5, x3 umulh x19, x6, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adcs x12, x12, x20 adc x13, xzr, xzr lsl x19, x8, #32 lsr x20, x8, #32 // begin 4st reduce subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // for cal res - p adds x16, x8, #1 // - (0xffffffffffffffff) = (+1) sbcs x17, x9, x14 adcs x19, x10, xzr sbcs x20, x11, x15 sbcs xzr, x12, xzr csel x8, x8, x16, lo csel x9, x9, x17, lo csel x10, x10, x19, lo csel x11, x11, x20, lo stp x8, x9,[x0] stp x10, x11,[x0, #8*2] AARCH64_AUTIASP ret .size ECP_Sm2MulMont,.-ECP_Sm2MulMont .type ECP_Sm2SqrMont,%function .align 4 ECP_Sm2SqrMont: AARCH64_PACIASP // a[1~3] * a[0] mul x9, x5, x4 umulh x17, x5, x4 mul x10, x6, x4 umulh x19, x6, x4 mul x11, x7, x4 umulh x12, x7, x4 adds x10, x10, x17 adcs x11, x11, x19 adc x12, x12, xzr // a[2~3] * a[1] mul x16, x6, x5 umulh x17, x6, x5 mul x19, x7, x5 umulh x20, x7, x5 // a[3] * a[2] mul x13, x7, x6 umulh x1, x7, x6 adds x17, x17, x19 adc x19, x20, xzr adds x11, x11, x16 adcs x12, x12, x17 adcs x13, x13, x19 adc x1, x1, xzr // a[0] * a[0] mul x8, x4, x4 umulh x4, x4, x4 // a[1] * a[1] mul x17, x5, x5 umulh x5, x5, x5 adds x9, x9, x9 adcs x10, x10, x10 adcs x11, x11, x11 adcs x12, x12, x12 adcs x13, x13, x13 adcs x1, x1, x1 adc x2, xzr, xzr // a[2] * a[2] mul x19, x6, x6 umulh x6, x6, x6 // a[3] * a[3] mul x20, x7, x7 umulh x7, x7, x7 adds x9, x9, x4 adcs x10, x10, x17 adcs x11, x11, x5 adcs x12, x12, x19 adcs x13, x13, x6 adcs x1, x1, x20 adc x2, x2, x7 // begin 1st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 // begin 2st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 // begin 3st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 // begin 4st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 adds x8, x8, x12 adcs x9, x9, x13 adcs x10, x10, x1 adcs x11, x11, x2 adc x12, xzr, xzr // for cal res - p adds x16, x8, #1 sbcs x17, x9, x14 adcs x19, x10, xzr sbcs x20, x11, x15 sbcs xzr, x12, xzr csel x8, x8, x16, lo csel x9, x9, x17, lo csel x10, x10, x19, lo csel x11, x11, x20, lo stp x8, x9,[x0] stp x10, x11,[x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2SqrMont,.-ECP_Sm2SqrMont .type ECP_Sm2AddCore,%function .align 4 ECP_Sm2AddCore: AARCH64_PACIASP adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x1, xzr, xzr // sum - p adds x16, x8, #1 sbcs x17, x9, x14 // x14 = 0xffffffff00000000 adcs x19, x10, xzr sbcs x20, x11, x15 // x15 = 0xfffffffeffffffff sbcs xzr, x1, xzr csel x8, x8, x16,lo csel x9, x9, x17,lo csel x10, x10, x19,lo csel x11, x11, x20,lo stp x8, x9, [x0] stp x10, x11, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2AddCore,.-ECP_Sm2AddCore .type ECP_Sm2DivBy2Core,%function .align 4 ECP_Sm2DivBy2Core: AARCH64_PACIASP subs x16, x8, #1 adcs x17, x9, x14 sbcs x19, x10, xzr adcs x20, x11, x15 adc x1, xzr, xzr tst x8, #1 csel x8, x8, x16, eq csel x9, x9, x17, eq csel x10, x10, x19, eq csel x11, x11, x20 ,eq csel x1, xzr, x1, eq lsr x8, x8, #1 orr x8, x8, x9, lsl#63 lsr x9, x9, #1 orr x9, x9, x10, lsl#63 lsr x10, x10, #1 orr x10, x10, x11, lsl#63 lsr x11, x11, #1 orr x11, x11, x1, lsl#63 stp x8, x9,[x0] stp x10, x11, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2DivBy2Core,.-ECP_Sm2DivBy2Core .type ECP_Sm2SubAB,%function .align 4 ECP_Sm2SubAB: AARCH64_PACIASP ldp x16, x17,[x2] ldp x19, x20,[x2, #16] subs x8, x8, x16 sbcs x9, x9, x17 sbcs x10, x10, x19 sbcs x11, x11, x20 csetm x16, cc adds x8, x8, x16 and x17, x16, x14 adcs x9, x9, x17 adcs x10, x10, x16 and x19, x16, x15 adc x11, x11, x19 stp x8, x9,[x0] stp x10, x11,[x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2SubAB,.-ECP_Sm2SubAB .type ECP_Sm2SubBA,%function .align 4 ECP_Sm2SubBA: AARCH64_PACIASP ldp x16, x17,[x2] ldp x19, x20,[x2, #16] subs x8, x16, x8 sbcs x9, x17, x9 sbcs x10, x19, x10 sbcs x11, x20, x11 csetm x16, cc adds x8, x8, x16 and x17, x16, x14 adcs x9, x9, x17 adcs x10, x10, x16 and x19, x16, x15 adc x11, x11, x19 stp x8, x9,[x0] stp x10, x11,[x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2SubBA,.-ECP_Sm2SubBA # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b # Deal process: # delta = Z12 # gamma = Y12 # beta = X1*gamma # alpha = 3*(X1-delta)*(X1+delta) # X3 = alpha2-8*beta # Z3 = (Y1+Z1)2-gamma-delta # Y3 = alpha*(4*beta-X3)-8*gamma2 .globl ECP_Sm2PointDoubleMont .type ECP_Sm2PointDoubleMont,%function .align 4 ECP_Sm2PointDoubleMont: AARCH64_PACIASP stp x29, x30,[sp, #-80]! mov x29, sp stp x19, x20,[sp, #16] stp x21, x22,[sp, #32] sub sp, sp, #32*4 .Lpoint_double: ldp x8, x9,[x1, #32] // a->y ldp x10, x11,[x1, #32+16] mov x21, x0 mov x22, x1 // backup point a adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 // p[1] ldr x14, [x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 // p[3] ldr x15, [x15] mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 ldp x4, x5, [x22, #64] // a->z ldp x6, x7, [x22, #64+16] mov x0, sp bl ECP_Sm2AddCore // s = 2 * a->y add x0, sp, #64 bl ECP_Sm2SqrMont // zsqr = (a->z)^2 ldp x16, x17, [x22] ldp x19, x20, [x22, #16] mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 add x0, sp, #32 bl ECP_Sm2AddCore // m = a->x + zsqr add x2, x22, #0 mov x8, x4 mov x9, x5 ldp x4, x5,[sp, #0] mov x10, x6 mov x11, x7 ldp x6, x7,[sp, #16] add x0, sp, #64 bl ECP_Sm2SubBA // zsqr = a->x - zsqr add x0, sp, #0 bl ECP_Sm2SqrMont // s = s^2 ldr x3, [x22, #32] ldp x4, x5,[x22, #64] ldp x6, x7,[x22, #64+16] add x2, x22, #32 // a->y add x0, sp, #96 bl ECP_Sm2MulMont // res_z = a->z * a->y mov x16, x8 mov x17, x9 ldp x4, x5, [sp, #0] mov x19, x10 mov x20, x11 ldp x6, x7, [sp, #16] add x0, x21, #64 bl ECP_Sm2AddCore // res_z = 2 * res_z add x0, sp, #96 bl ECP_Sm2SqrMont // res_y = s^2 ldr x3, [sp, #64] ldp x4, x5, [sp, #32] ldp x6, x7, [sp, #32+16] add x0, x21, #32 bl ECP_Sm2DivBy2Core // res_y = res_y / 2 add x2, sp, #64 add x0, sp, #32 bl ECP_Sm2MulMont // m = m * zsqr mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 add x0, sp, #32 bl ECP_Sm2AddCore mov x16, x4 mov x17, x5 ldr x3, [x22] mov x19, x6 ldp x4, x5, [sp, #0] mov x20, x7 ldp x6, x7, [sp, #16] bl ECP_Sm2AddCore // m = 3 * m mov x2, x22 add x0, sp, #0 bl ECP_Sm2MulMont // s = s * a->x mov x16, x8 mov x17, x9 ldp x4, x5, [sp, #32] mov x19, x10 mov x20, x11 ldp x6, x7, [sp, #32+16] add x0, sp, #96 bl ECP_Sm2AddCore // tmp = 2 * s mov x0, x21 bl ECP_Sm2SqrMont // res_x = m^2 add x2, sp, #96 bl ECP_Sm2SubAB // res_x = res_x - tmp add x2, sp, #0 add x0, sp, #0 bl ECP_Sm2SubBA // s = s - res_x ldr x3, [sp, #32] mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 add x2, sp, #32 bl ECP_Sm2MulMont // s = s * m add x2, x21, #32 add x0, x21, #32 bl ECP_Sm2SubAB // res_y = s - res_y mov sp, x29 ldp x19, x20,[x29, #16] ldp x21, x22,[x29, #32] ldp x29, x30,[sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2PointDoubleMont,.-ECP_Sm2PointDoubleMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo # Deal process: # U1 = X1*Z22 # U2 = X2*Z12 # S1 = Y1*Z23 # S2 = Y2*Z13 # H = U2-U1 # r = S2-S1 # X3 = r2-H3-2*U1*H2 # Y3 = r*(U1*H2-X3)-S1*H3 # Z3 = Z1*Z2*H .globl ECP_Sm2PointAddMont .type ECP_Sm2PointAddMont,%function .align 4 ECP_Sm2PointAddMont: AARCH64_PACIASP stp x29, x30,[sp, #-80]! mov x29, sp stp x19, x20,[sp, #16] stp x21, x22,[sp, #32] stp x23, x24,[sp, #48] stp x25, x26,[sp, #64] sub sp,sp, #32*12 ldp x4, x5,[x2, #64] ldp x6, x7,[x2, #64+16] mov x21, x0 mov x22, x1 // backup points mov x23, x2 adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 // p[1] ldr x14, [x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 // p[3] ldr x15, [x15] orr x16, x4, x5 orr x19, x6, x7 orr x25, x16, x19 cmp x25, #0 csetm x25, ne // check the point is(x, y, 0) add x0, sp, #128 bl ECP_Sm2SqrMont // z1sqr = z1^2 ldp x4, x5,[x22, #64] ldp x6, x7,[x22, #64+16] orr x16, x4, x5 orr x19, x6, x7 orr x24, x16, x19 cmp x24, #0 csetm x24, ne // check the point is(x, y, 0) add x0, sp, #224 bl ECP_Sm2SqrMont // z2sqr = z2^2 ldr x3, [x23, #64] ldp x4, x5,[sp, #128] ldp x6, x7,[sp, #128+16] add x2, x23, #64 add x0,sp, #320 bl ECP_Sm2MulMont // s2 = z1^3 ldr x3,[x22, #64] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] add x2, x22, #64 add x0,sp, #352 bl ECP_Sm2MulMont // s2 = y2 * z1^3 ldr x3,[x22, #32] ldp x4, x5,[sp, #320] ldp x6, x7,[sp, #320+16] add x2, x22, #32 add x0,sp, #320 bl ECP_Sm2MulMont ldr x3,[x23, #32] ldp x4, x5,[sp, #352] ldp x6, x7,[sp, #352+16] add x2, x23, #32 add x0,sp, #352 bl ECP_Sm2MulMont add x2,sp, #320 ldr x3,[sp, #128] ldp x4, x5,[x22] ldp x6, x7,[x22, #16] add x0,sp, #96 bl ECP_Sm2SubAB orr x8, x8, x9 orr x10, x10, x11 orr x26, x8, x10 add x2,sp, #128 add x0,sp, #256 bl ECP_Sm2MulMont ldr x3,[sp, #224] ldp x4, x5,[x23] ldp x6, x7,[x23, #16] add x2,sp, #224 add x0,sp, #288 bl ECP_Sm2MulMont add x2,sp, #256 ldp x4, x5,[sp, #96] ldp x6, x7,[sp, #96+16] add x0,sp, #192 bl ECP_Sm2SubAB orr x8, x8, x9 orr x10, x10, x11 orr x8, x8, x10 tst x8, x8 b.ne .Ladd_proceed tst x24, x25 b.eq .Ladd_proceed tst x26, x26 b.eq .Ladd_double stp xzr, xzr,[x21] stp xzr, xzr,[x21, #16] stp xzr, xzr,[x21, #32] stp xzr, xzr,[x21, #48] stp xzr, xzr,[x21, #64] stp xzr, xzr,[x21, #80] b .Ladd_done .align 4 .Ladd_double: mov x1, x22 mov x0, x21 ldp x23, x24,[x29, #48] ldp x25, x26,[x29, #64] add sp,sp, #32*(12-4) b .Lpoint_double .align 4 .Ladd_proceed: add x0,sp, #128 bl ECP_Sm2SqrMont ldr x3,[x22, #64] ldp x4, x5,[sp, #192] ldp x6, x7,[sp, #192+16] add x2, x22, #64 add x0,sp, #64 bl ECP_Sm2MulMont ldp x4, x5,[sp, #192] ldp x6, x7,[sp, #192+16] add x0,sp, #224 bl ECP_Sm2SqrMont ldr x3,[x23, #64] ldp x4, x5,[sp, #64] ldp x6, x7,[sp, #64+16] add x2, x23, #64 add x0,sp, #64 bl ECP_Sm2MulMont ldr x3,[sp, #192] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] add x2,sp, #192 add x0,sp, #160 bl ECP_Sm2MulMont ldr x3,[sp, #224] ldp x4, x5,[sp, #256] ldp x6, x7,[sp, #256+16] add x2,sp, #224 add x0,sp, #288 bl ECP_Sm2MulMont mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 add x0,sp, #224 bl ECP_Sm2AddCore add x2,sp, #128 add x0,sp, #0 bl ECP_Sm2SubBA add x2,sp, #160 bl ECP_Sm2SubAB add x2,sp, #288 ldr x3,[sp, #160] ldp x4, x5,[sp, #320] ldp x6, x7,[sp, #320+16] add x0,sp, #32 bl ECP_Sm2SubBA add x2,sp, #160 add x0,sp, #352 bl ECP_Sm2MulMont ldr x3,[sp, #96] ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #32+16] add x2,sp, #96 add x0,sp, #32 bl ECP_Sm2MulMont add x2,sp, #352 bl ECP_Sm2SubAB ldp x4, x5,[sp, #0] ldp x6, x7,[sp, #16] ldp x16, x17,[x23] ldp x19, x20,[x23, #16] ldp x8, x9,[x22, #0] cmp x24, #0 csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne stp x8, x9,[x21, #0] stp x10, x11,[x21, #16] ldp x10, x11,[x22, #16] ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #48] ldp x16, x17,[x23, #32] ldp x19, x20,[x23, #48] ldp x8, x9,[x22, #32] cmp x24, #0 csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne stp x8, x9,[x21, #32] stp x10, x11,[x21, #32+16] ldp x10, x11,[x22, #32+16] ldp x8, x9, [x22, #64] ldp x16, x17,[x23, #32+32] ldp x19, x20,[x23, #32+48] ldp x4, x5,[sp, #32+32] ldp x6, x7,[sp, #32+48] cmp x24, #0 ldp x10, x11,[x22, #64+16] csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8, ne csel x9, x17, x9, ne csel x10, x19, x10, ne csel x11, x20, x11, ne stp x8, x9,[x21, #64] stp x10, x11,[x21, #64+16] .Ladd_done: mov sp, x29 ldp x19, x20,[x29, #16] ldp x21, x22,[x29, #32] ldp x23, x24,[x29, #48] ldp x25, x26,[x29, #64] ldp x29, x30,[sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2PointAddMont,.-ECP_Sm2PointAddMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl # Deal process: # Z1Z1 = Z12 # U2 = X2*Z1Z1 # S2 = Y2*Z1*Z1Z1 # H = U2-X1 # HH = H2 # I = 4*HH # J = H*I # r = 2*(S2-Y1) # V = X1*I # X3 = r2-J-2*V # Y3 = r*(V-X3)-2*Y1*J # Z3 = (Z1+H)2-Z1Z1-HH .globl ECP_Sm2PointAddAffineMont .type ECP_Sm2PointAddAffineMont,%function .align 4 ECP_Sm2PointAddAffineMont: AARCH64_PACIASP stp x29, x30,[sp, #-80]! mov x29, sp stp x19, x20,[sp, #16] stp x21, x22,[sp, #32] stp x23, x24,[sp, #48] stp x25, x26,[sp, #64] sub sp, sp, #32*10 mov x21, x0 // backup r mov x22, x1 // point a mov x23, x2 // point b adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 ldr x14,[x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 ldr x15,[x15] ldp x4, x5,[x1, #64] // &(a->z[0]), a->z[0] is marked as z1[0] ldp x6, x7,[x1, #64+16] // &(a->z[2]) orr x16, x4, x5 orr x19, x6, x7 orr x24, x16, x19 cmp x24, #0 csetm x24, ne // check is (x, y 0) ldp x8, x9, [x2] // &(b->x[0]) ldp x10, x11, [x2, #16] // &(b->x[2]) ldp x16, x17, [x2, #32] // &(b->y[0]) ldp x19, x20, [x2, #48] // &(b->y[2]) orr x8, x8, x9 orr x10, x10, x11 orr x16, x16, x17 orr x19, x19, x20 orr x8, x8, x10 orr x16, x16, x19 orr x25, x8, x16 cmp x25, #0 csetm x25, ne // check is (x, y 0) add x0, sp, #128 bl ECP_Sm2SqrMont // zsqr = z1^2 mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 ldr x3, [x23] mov x2, x23 add x0, sp, #96 bl ECP_Sm2MulMont // u2 = z1^2 * x2 mov x2, x22 ldr x3, [x22, #64] ldp x4, x5, [sp, #128] ldp x6, x7, [sp, #128+16] add x0,sp, #160 bl ECP_Sm2SubAB add x2, x22, #64 add x0,sp, #128 bl ECP_Sm2MulMont ldr x3,[x22, #64] ldp x4, x5,[sp, #160] ldp x6, x7,[sp, #160+16] add x2, x22, #64 add x0,sp, #64 bl ECP_Sm2MulMont ldr x3,[x23, #32] ldp x4, x5,[sp, #128] ldp x6, x7,[sp, #128+16] add x2, x23, #32 add x0,sp, #128 bl ECP_Sm2MulMont add x2, x22, #32 ldp x4, x5,[sp, #160] ldp x6, x7,[sp, #160+16] add x0,sp, #192 bl ECP_Sm2SubAB add x0,sp, #224 bl ECP_Sm2SqrMont ldp x4, x5,[sp, #192] ldp x6, x7,[sp, #192+16] add x0,sp, #288 bl ECP_Sm2SqrMont ldr x3,[sp, #160] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] add x2,sp, #160 add x0,sp, #256 bl ECP_Sm2MulMont ldr x3,[x22] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] mov x2, x22 add x0,sp, #96 bl ECP_Sm2MulMont mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 add x0,sp, #224 bl ECP_Sm2AddCore add x2,sp, #288 add x0,sp, #0 bl ECP_Sm2SubBA add x2,sp, #256 bl ECP_Sm2SubAB add x2,sp, #96 ldr x3,[x22, #32] ldp x4, x5,[sp, #256] ldp x6, x7,[sp, #256+16] add x0,sp, #32 bl ECP_Sm2SubBA add x2, x22, #32 add x0,sp, #128 bl ECP_Sm2MulMont ldr x3,[sp, #192] ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #32+16] add x2,sp, #192 add x0,sp, #32 bl ECP_Sm2MulMont add x2,sp, #128 bl ECP_Sm2SubAB ldp x4, x5,[sp, #0] ldp x6, x7,[sp, #16] ldp x16, x17,[x23] ldp x19, x20,[x23, #16] ldp x8, x9,[x22, #0] cmp x24, #0 ldp x10, x11,[x22, #16] csel x16, x4, x16, ne csel x17, x5, x17, ne csel x19, x6, x19, ne csel x20, x7, x20, ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #48] ldp x16, x17,[x23, #32] ldp x19, x20,[x23, #48] stp x8, x9,[x21, #0] stp x10, x11,[x21, #16] ldp x8, x9,[x22, #32] cmp x24, #0 ldp x10, x11,[x22, #32+16] csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne stp x8, x9,[x21, #32] stp x10, x11,[x21, #32+16] ldp x4, x5,[sp, #32+32] ldp x6, x7,[sp, #32+48] adrp x23, .Lone_mont add x23,x23,:lo12:.Lone_mont ldp x16, x17,[x23] ldp x19, x20,[x23, #16] ldp x8, x9,[x22, #64] ldp x10, x11,[x22, #64+16] cmp x24, #0 csel x16, x4, x16, ne csel x17, x5, x17, ne csel x19, x6, x19, ne csel x20, x7, x20, ne cmp x25, #0 csel x8, x16, x8, ne csel x9, x17, x9, ne csel x10, x19, x10, ne csel x11, x20, x11, ne stp x8, x9, [x21, #64] stp x10, x11, [x21, #64+16] mov sp, x29 ldp x19, x20,[x29, #16] ldp x21, x22,[x29, #32] ldp x23, x24,[x29, #48] ldp x25, x26,[x29, #64] ldp x29, x30,[sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2PointAddAffineMont,.-ECP_Sm2PointAddAffineMont #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm/ecp_sm2_armv8.S
Unix Assembly
unknown
42,773
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE_SM2 .file "ecp_sm2_x86_64.S" .text .set s0,%r8 .set s1,%r9 .set s2,%r10 .set s3,%r11 .set s4,%r12 .set s5,%r13 .set s6,%r14 .set s7,%r15 .macro REGISTER_SAVE pushq %r12 pushq %r13 pushq %r14 pushq %r15 pushq %rbx pushq %rbp .endm .macro REGISTER_POP popq %rbp popq %rbx popq %r15 popq %r14 popq %r13 popq %r12 .endm # The polynomial .align 64 .Lpoly: .quad 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff # The order of polynomial .Lord: .quad 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff .Lpoly_div_2: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_div_2: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lzero: .quad 0, 0, 0, 0 .Lord_1div4: .quad 0xd4eefd024e755049, 0xdc80f7dac871814a, 0xffffffffffffffff, 0x3fffffffbfffffff .Lord_2div4: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_3div4: .quad 0x7eccf706eb5ff0db, 0x9582e790595483e0, 0xffffffffffffffff, 0xbfffffff3fffffff .Lpoly_1div4: .quad 0x4000000000000000, 0xffffffffc0000000, 0xffffffffffffffff, 0x3fffffffbfffffff .Lpoly_2div4: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lpoly_3div4: .quad 0xc000000000000000, 0xffffffff40000000, 0xffffffffffffffff, 0xbfffffff3fffffff .LRR:// 2^512 mod P precomputed for sm2 polynomial .quad 0x0000000200000003, 0x00000002ffffffff, 0x0000000100000001, 0x0000000400000002 .Lone_mont: .quad 0x0000000000000001, 0x00000000ffffffff, 0x0000000000000000, 0x0000000100000000 .Lone: .quad 1,0,0,0 .LOne: .long 1,1,1,1,1,1,1,1 .globl ECP_Sm2Div2 .type ECP_Sm2Div2,@function .align 64 ECP_Sm2Div2: movq (%rdi),%r8 movq 8(%rdi),%r9 movq 16(%rdi),%r10 movq 24(%rdi),%r11 shrdq $1,%r9,%r8 shrdq $1,%r10,%r9 shrdq $1,%r11,%r10 shrq $1,%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2Div2, .-ECP_Sm2Div2 .globl ECP_Sm2Div4 .type ECP_Sm2Div4,@function .align 64 ECP_Sm2Div4: movq (%rdi),%r8 movq 8(%rdi),%r9 movq 16(%rdi),%r10 movq 24(%rdi),%r11 shrdq $2,%r9,%r8 shrdq $2,%r10,%r9 shrdq $2,%r11,%r10 shrq $2,%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2Div4, .-ECP_Sm2Div4 .globl ECP_Sm2Neg .type ECP_Sm2Neg,@function .align 64 ECP_Sm2Neg: movq (%rdi),%r8 xorq %rax,%rax movq $-1,%r8 movq $0xffffffff00000000,%r9 movq $0xfffffffeffffffff,%r11 movq $-1,%r10 subq 0(%rsi),%r8 sbbq 8(%rsi),%r9 sbbq 16(%rsi),%r10 sbbq 24(%rsi),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2Neg, .-ECP_Sm2Neg .globl ECP_Sm2BnSub .type ECP_Sm2BnSub,@function .align 64 ECP_Sm2BnSub: movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 subq (%rdx),%r8 sbbq 8(%rdx),%r9 sbbq 16(%rdx),%r10 sbbq 24(%rdx),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2BnSub, .-ECP_Sm2BnSub .globl ECP_Sm2BnAdd .type ECP_Sm2BnAdd,@function .align 64 ECP_Sm2BnAdd: movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 addq (%rdx),%r8 adcq 8(%rdx),%r9 adcq 16(%rdx),%r10 adcq 24(%rdx),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2BnAdd, .-ECP_Sm2BnAdd .globl ECP_Sm2Div2ModP .type ECP_Sm2Div2ModP,@function .align 64 ECP_Sm2Div2ModP: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $1,%r13 shrdq $1,%r9,%r8 shrdq $1,%r10,%r9 shrdq $1,%r11,%r10 shrdq $1,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lpoly_div_2(%rip),%rbx cmpq $1,%r13 cmoveq %rbx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div2ModP, .-ECP_Sm2Div2ModP .globl ECP_Sm2Div2ModOrd .type ECP_Sm2Div2ModOrd,@function .align 64 ECP_Sm2Div2ModOrd: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $1,%r13 shrdq $1,%r9,%r8 shrdq $1,%r10,%r9 shrdq $1,%r11,%r10 shrdq $1,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lord_div_2(%rip),%rbx cmpq $1,%r13 cmoveq %rbx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div2ModOrd, .-ECP_Sm2Div2ModOrd .globl ECP_Sm2Div4ModP .type ECP_Sm2Div4ModP,@function .align 64 ECP_Sm2Div4ModP: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $3,%r13 shrdq $2,%r9,%r8 shrdq $2,%r10,%r9 shrdq $2,%r11,%r10 shrdq $2,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lpoly_1div4(%rip),%rbx leaq .Lpoly_2div4(%rip),%rcx leaq .Lpoly_3div4(%rip),%rdx cmpq $1,%r13 cmoveq %rbx,%rax cmpq $2,%r13 cmoveq %rcx,%rax cmpq $3,%r13 cmoveq %rdx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div4ModP, .-ECP_Sm2Div4ModP .globl ECP_Sm2Div4ModOrd .type ECP_Sm2Div4ModOrd,@function .align 64 ECP_Sm2Div4ModOrd: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $3,%r13 shrdq $2,%r9,%r8 shrdq $2,%r10,%r9 shrdq $2,%r11,%r10 shrdq $2,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lord_1div4(%rip),%rbx leaq .Lord_2div4(%rip),%rcx leaq .Lord_3div4(%rip),%rdx cmpq $1,%r13 cmoveq %rbx,%rax cmpq $2,%r13 cmoveq %rcx,%rax cmpq $3,%r13 cmoveq %rdx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div4ModOrd, .-ECP_Sm2Div4ModOrd #define bn_mod_add(mod) \ /* Store scalar registers */ \ subq $32, %rsp; \ movq %r12, (%rsp); \ movq %r13, 8(%rsp); \ movq %r14, 16(%rsp); \ movq %r15, 24(%rsp); \ xorq %rax, %rax; \ /* Load inputs */ \ movq (%rsi), %r8; \ movq 8(%rsi), %r9; \ movq 16(%rsi), %r10; \ movq 24(%rsi), %r11; \ /* Addition */ \ addq (%rdx), %r8; \ adcq 8(%rdx), %r9; \ adcq 16(%rdx), %r10; \ adcq 24(%rdx), %r11; \ /* Store carry */ \ adcq $0, %rax; \ movq %r8, %r12; \ movq %r9, %r13; \ movq %r10, %r14; \ movq %r11, %r15; \ /* Sub polynomial */ \ leaq mod, %rsi; \ subq 0(%rsi), %r8; \ sbbq 8(%rsi), %r9; \ sbbq 16(%rsi), %r10; \ sbbq 24(%rsi), %r11; \ sbbq $0, %rax; \ cmovcq %r12, %r8; \ cmovcq %r13, %r9; \ cmovcq %r14, %r10; \ cmovcq %r15, %r11; \ /* Store results */ \ movq %r8, (%rdi); \ movq %r9, 8(%rdi); \ movq %r10, 16(%rdi); \ movq %r11, 24(%rdi); \ /* Restore scalar registers */ \ movq (%rsp), %r12; \ movq 8(%rsp), %r13; \ movq 16(%rsp), %r14; \ movq 24(%rsp), %r15; \ addq $32, %rsp; \ #define bn_mod_sub(mod) \ /* Store scalar registers */ \ subq $32, %rsp; \ movq %r12, (%rsp); \ movq %r13, 8(%rsp); \ movq %r14, 16(%rsp); \ movq %r15, 24(%rsp); \ xorq %rax, %rax; \ /* Load inputs */ \ movq (%rsi), %r8; \ movq 8(%rsi), %r9; \ movq 16(%rsi), %r10; \ movq 24(%rsi), %r11; \ /* Subtraction */ \ subq (%rdx), %r8; \ sbbq 8(%rdx), %r9; \ sbbq 16(%rdx), %r10; \ sbbq 24(%rdx), %r11; \ sbbq $0, %rax; \ movq %r8, %r12; \ movq %r9, %r13; \ movq %r10, %r14; \ movq %r11, %r15; \ /* Add polynomial */ \ leaq mod, %rsi; \ addq 0(%rsi), %r8; \ adcq 8(%rsi), %r9; \ adcq 16(%rsi), %r10; \ adcq 24(%rsi), %r11; \ testq %rax, %rax; \ cmovzq %r12, %r8; \ cmovzq %r13, %r9; \ cmovzq %r14, %r10; \ cmovzq %r15, %r11; \ /* Store results */ \ movq %r8, (%rdi); \ movq %r9, 8(%rdi); \ movq %r10, 16(%rdi); \ movq %r11, 24(%rdi); \ /* Restore scalar registers */ \ movq (%rsp), %r12; \ movq 8(%rsp), %r13; \ movq 16(%rsp), %r14; \ movq 24(%rsp), %r15; \ addq $32, %rsp; \ ### Modular add: r = a+b mod n/p, where n = ord(p) ### # void ECP_Sm2AddModP(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular poly add # r %rdi # a %rsi # b %rdx .globl ECP_Sm2AddModP .type ECP_Sm2AddModP, @function .align 64 ECP_Sm2AddModP: bn_mod_add(.Lpoly(%rip)) ret .size ECP_Sm2AddModP, .-ECP_Sm2AddModP # void ECP_Sm2AddModOrd(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular order add # r %rdi # a %rsi # b %rdx .globl ECP_Sm2AddModOrd .type ECP_Sm2AddModOrd, @function .align 64 ECP_Sm2AddModOrd: bn_mod_add(.Lord(%rip)) ret .size ECP_Sm2AddModOrd, .-ECP_Sm2AddModOrd ### Modular sub: r = a-b mod n/p, where n = ord(p) ### # void ECP_Sm2SubModP(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular poly sub # r %rdi # a %rsi # b %rdx .globl ECP_Sm2SubModP .type ECP_Sm2SubModP, @function .align 64 ECP_Sm2SubModP: bn_mod_sub(.Lpoly(%rip)) ret .size ECP_Sm2SubModP, .-ECP_Sm2SubModP # void ECP_Sm2SubModOrd(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular order sub # r %rdi # a %rsi # b %rdx .globl ECP_Sm2SubModOrd .type ECP_Sm2SubModOrd, @function .align 64 ECP_Sm2SubModOrd: bn_mod_sub(.Lord(%rip)) ret .size ECP_Sm2SubModOrd, .-ECP_Sm2SubModOrd .macro RDC # r = a mod p256 # a = a15 | a14 | ... | a0, where ai are 32–bit quantities # | a7 | a6 | a5 | a4 | a3 | a2 | a1 | a0 | (+) # | a8 | a11 | a10 | a9 | a8 | 0 | a9 | a8 | (+) # | a9 | a14 | a13 | a12 | a11 | 0 | a10 | a9 | (+) # | a10 | a15 | a14 | a13 | a12 | 0 | a11 | a10 | (+) # | a11 | 0 | a15 | a14 | a13 | 0 | a12 | a11 | (+) # | a12 | 0 | a15 | a14 | a13 | 0 | a13 | a12 | (+) # | a12 | 0 | 0 | a15 | a14 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | a15 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | 0 | 0 | 0 | 0 | 0 | a8 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a9 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a13 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a14 | 0 | 0 | (-) # | U[7]| U[6]| U[5]| U[4]| U[3]| U[2]| U[1]| U[0]| # | V[3] | V[2] | V[1] | V[0] | # until r < p256 # s7 (a15|a14), s6 (a13|a12), s5 (a11|a10), s4 (a9|a8) # s3 (a7|a6), s2 (a5|a4), s1 (a3|a2), s0 (a1|a0) # 1. 64-bit addition xorq %rsi, %rsi # to store all carry xorq %rax, %rax movq s6, %rcx # rcx <- s6 movq s4, %rdx # rdx <- s4 # a13 | a12 addq s7, %rcx # rcx <- s6 + s7 adcq $0, %rax # rax <- carry(s6+s7) addq s7, %rcx # rcx <- s6 + 2*s7 adcq $0, %rax # a9 | a8 movq %rax, %rbx # rbx <- carry (rax) addq %rcx, %rdx # rdx <- s4 + s6 + 2*s7 adcq $0, %rbx addq s5, %rdx # rdx <- s4 + s5 + s6 + 2*s7 adcq $0, %rbx # sum addq %rdx, s0 # s0 <- s0 + s4 + s5 + s6 + 2*s7 adcq %rbx, s1 # s1 <- s1 + rbx + carry adcq %rcx, s2 # s2 <- s2 + s6 + 2*s7 + carry adcq s7, s3 # s3 <- s3 + s7 + carry adcq $0, %rsi # add carry addq %rax, s3 adcq $0, %rsi # rsi <- carry # store registers movq s0, (%rsp) movq s1, 8(%rsp) movq s2, 16(%rsp) movq s3, 24(%rsp) # 2. 4 -> 8 64-bit to 32-bit spread movq $0xffffffff, %rax movq s4, s0 movq s5, s1 movq s6, s2 movq s7, s3 andq %rax, s0 # a8 andq %rax, s1 # a10 andq %rax, s2 # a12 andq %rax, s3 # a14 shrq $32, s4 # a9 shrq $32, s5 # a11 shrq $32, s6 # a13 shrq $32, s7 # a15 # 3. 32-bit addition movq s3, %rax addq s2, %rax # rax <- a12 + a14 movq s3, %rbx addq s1, %rbx # rbx <- a10 + a14 movq s7, %rcx addq s6, %rcx # rcx <- a13 + a15 movq s0, %rdx addq s4, %rdx # rdx <- a8 + a9 addq s5, s7 # s7 <- a11 + a15 movq %rcx, s2 # s2 <- a13 + a15 addq %rax, s2 # s2 <- a12 + a13 + a14 + a15 addq s2, s1 # s1 <- a10 + a12 + a13 + a14 + a15 addq s2, s1 # s1 <- a10 + 2*(a12 + a13 + a14 + a15) addq %rdx, s1 # s1 <- a8 + a9 + a10 + 2*(a12 + a13 + a14 + a15) addq s5, s1 # s1 <- a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) addq s6, s2 # s2 <- a12 + 2*a13 + a14 + a15 addq s5, s2 # s2 <- a11 + a12 + 2*a13 + a14 + a15 addq s0, s2 # s2 <- a8 + a11 + a12 + 2*a13 + a14 + a15 addq s3, %rdx # rdx <- a8 + a9 + a14 addq s6, %rdx # rdx <- a8 + a9 + a13 + a14 addq %rcx, s4 # s4 <- a9 + a13 + a15 addq s4, s5 # s5 <- a9 + a11 + a13 + a15 addq %rcx, s5 # s5 <- a9 + a11 + 2*(a13 + a15) addq %rbx, %rax # rax <- a10 + a12 + 2*a14 # U[0] s5 a9 + a11 + 2*(a13 + a15) # U[1] %rax a10 + a12 + 2*a14 # U[2] # U[3] s2 a8 + a11 + a12 + 2*a13 + a14 + a15 # U[4] s4 a9 + a13 + a15 # U[5] %rbx a10 + a14 # U[6] s7 a11 + a15 # U[7] s1 a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) # sub %rdx a8 + a9 + a13 + a14 # vacant registers: s0 s3 s6 %rcx # 4. 8 -> 4 32-bit to 64-bit # sub %rdx movq %rax, s0 shlq $32, s0 # U[1]'(s0) <- U[1] << 32 shrd $32, s2, %rax # U[3]'(%rax) <- U[3]U[1] >> 32 shrd $32, %rbx, s2 # U[5]'(s2) <- U[5]U[3] >> 32 shrd $32, s1, %rbx # U[7]'(%rbx) <- U[7]U[5] >> 32 shrq $32, s1 # U[7](s1) <- U[7] >> 32 (carry) # 5. 64-bit addition addq s0, s5 # U[0] <- U[1]' + U[0] adcq $0, %rax # U[3]' <- 0 + U[3]' adcq s2, s4 # U[4] <- U[5]' + U[4] adcq %rbx, s7 # U[6] <- U[7]' + U[6] adcq s1, %rsi # rsi <- U[7]carry + carry # V[0] s5 # V[1] %rax # V[2] s4 # V[3] s7 # carry %rsi # sub %rdx # 5. ADD & SUB movq (%rsp), s0 movq 8(%rsp), s1 movq 16(%rsp), s2 movq 24(%rsp), s3 # ADD addq s5, s0 adcq %rax, s1 adcq s4, s2 adcq s7, s3 adcq $0, %rsi # SUB subq %rdx, s1 sbbq $0, s2 sbbq $0, s3 sbbq $0, %rsi # 6. MOD # First Mod movq %rsi, %rax # rax <- carry (rsi) +out[0] shlq $32, %rax # rax <- carry << 32 movq %rax, %rcx # rcx <- rax +out[3] subq %rsi, %rax # rax <- carry << 32 - carry +out[1] addq %rsi, s0 adcq %rax, s1 adcq $0, s2 adcq %rcx, s3 # Last Mod # return r - p if r > p else r movq s0, s4 movq s1, s5 movq s2, s6 movq s3, s7 leaq .Lpoly(%rip), %rsi movq $0, %rcx adcq $0, %rcx subq 0(%rsi), s0 sbbq 8(%rsi), s1 sbbq 16(%rsi), s2 sbbq 24(%rsi), s3 sbbq $0, %rcx cmovcq s4, s0 cmovcq s5, s1 cmovcq s6, s2 cmovcq s7, s3 movq s0, (%rdi) movq s1, 8(%rdi) movq s2, 16(%rdi) movq s3, 24(%rdi) .endm ### Modular mul: r = a*b mod p ### # void ECP_Sm2Mul(uint64_t *r, const uint64_t *a, const uint64_t *b) # 256-bit modular multiplication in SM2 # r %rdi # a %rsi # b %rdx .globl ECP_Sm2Mul .type ECP_Sm2Mul, @function .align 64 ECP_Sm2Mul: # Store scalar registers subq $72, %rsp movq %rbx, 32(%rsp) movq %r12, 40(%rsp) movq %r13, 48(%rsp) movq %r14, 56(%rsp) movq %r15, 64(%rsp) # Load inputs movq (%rsi), s0 movq 8(%rsi), s1 movq 16(%rsi), s2 movq 24(%rsi), s3 movq (%rdx), s4 movq 8(%rdx), s5 movq 16(%rdx), s6 movq 24(%rdx), s7 ### multiplication ### # ======================== # s7 s6 s5 s4 # * s3 s2 s1 s0 # ------------------------ # + s0 s0 s0 s0 # * * * * # s7 s6 s5 s4 # s1 s1 s1 s1 # * * * * # s7 s6 s5 s4 # s2 s2 s2 s2 # * * * * # s7 s6 s5 s4 # s3 s3 s3 s3 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s0*s4 ### movq s0, %rax mulq s4 movq %rax, (%rsp) movq %rdx, %rbx xorq %rcx, %rcx ### s1*s4 + s0*s5 ### movq s1, %rax mulq s4 addq %rax, %rbx adcq %rdx, %rcx xorq %rsi, %rsi movq s0, %rax mulq s5 addq %rax, %rbx adcq %rdx, %rcx adcq $0, %rsi movq %rbx, 8(%rsp) xorq %rbx, %rbx ### s2 * s4 + s1 * s5 + s0 *s6 ### movq s2, %rax mulq s4 addq %rax, %rcx adcq %rdx, %rsi movq s1, %rax mulq s5 addq %rax, %rcx adcq %rdx, %rsi adcq $0, %rbx movq s0, %rax mulq s6 addq %rax, %rcx adcq %rdx, %rsi adcq $0, %rbx movq %rcx, 16(%rsp) xorq %rcx, %rcx ### s3*s4 + s2*s5 + s1*s6 + s0*s7 ### movq s3, %rax mulq s4 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq s2, %rax mulq s5 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq s1, %rax mulq s6 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq s0, %rax mulq s7 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq %rsi, 24(%rsp) xorq %rsi, %rsi ### s3*s5 + s2*s6 + s1*s7 ### movq s3, %rax mulq s5 addq %rax, %rbx adcq %rdx, %rcx # carry adcq $0, %rsi movq s2, %rax mulq s6 addq %rax, %rbx adcq %rdx, %rcx adcq $0, %rsi movq s1, %rax mulq s7 addq %rax, %rbx adcq %rdx, %rcx adcq $0, %rsi movq %rbx, s4 xorq %rbx, %rbx ### s3*s6 + s2*s7 ### movq s3, %rax mulq s6 addq %rax, %rcx adcq %rdx, %rsi # carry adcq $0, %rbx movq s2, %rax mulq s7 addq %rax, %rcx adcq %rdx, %rsi adcq $0, %rbx movq %rcx, s5 ### s3*s7 ### movq s3, %rax mulq s7 addq %rax, %rsi adcq %rdx, %rbx movq %rsi, s6 movq %rbx, s7 movq (%rsp), s0 movq 8(%rsp), s1 movq 16(%rsp), s2 movq 24(%rsp), s3 # result of mul: s7 s6 s5 s4 s3 s2 s1 s0 ### Reduction ### RDC # Restore scalar registers movq 32(%rsp), %rbx movq 40(%rsp), %r12 movq 48(%rsp), %r13 movq 56(%rsp), %r14 movq 64(%rsp), %r15 addq $72, %rsp ret .size ECP_Sm2Mul, .-ECP_Sm2Mul ### Modular sqr: r = a^2 mod p ### # void ECP_Sm2Sqr(uint64_t *r, const uint64_t *a) # 256-bit modular multiplication in SM2 ### # r %rdi # a %rsi .globl ECP_Sm2Sqr .type ECP_Sm2Sqr, @function .align 64 ECP_Sm2Sqr: # Store scalar registers subq $88, %rsp movq %rbx, 32(%rsp) movq %r12, 40(%rsp) movq %r13, 48(%rsp) movq %r14, 56(%rsp) movq %r15, 64(%rsp) movq %rbp, 72(%rsp) movq %rdi, 80(%rsp) # Load inputs movq (%rsi), s4 movq 8(%rsi), s5 movq 16(%rsi), s6 movq 24(%rsi), s7 ### square ### # ======================== # s7 s6 s5 s4 # * s7 s6 s5 s4 # ------------------------ # + s4 s4 s4 s4 # * * * * # s7 s6 s5 s4 # s5 s5 s5 s5 # * * * * # s7 s6 s5 s4 # s6 s6 s6 s6 # * * * * # s7 s6 s5 s4 # s7 s7 s7 s7 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s1 <- s4*s5, s2 <- carry ### movq s5, %rax mulq s4 movq %rax, s1 movq %rdx, s2 xorq s3, s3 ### s2 <- s4*s6 + carry(s2), s3 <- carry ### movq s6, %rax mulq s4 addq %rax, s2 adcq %rdx, s3 xorq s0, s0 ### s3 <- s4*s7 + s5*s6 + carry(s3), s0 <- carry ### movq s7, %rax mulq s4 addq %rax, s3 adcq %rdx, s0 xorq %rbx, %rbx movq s6, %rax mulq s5 addq %rax, s3 adcq %rdx, s0 adcq $0, %rbx ### s0 <- s5*s7 + carry(s0), rbx <- carry ### movq s7, %rax mulq s5 addq %rax, s0 adcq %rdx, %rbx xorq %rcx, %rcx ### rbx <- s6*s7 + carry(rbx), rcx <- carry ### movq s7, %rax mulq s6 addq %rax, %rbx adcq %rdx, %rcx xorq %rsi, %rsi ### 2*s0|1|2|3 ### addq s1, s1 adcq s2, s2 adcq s3, s3 adcq s0, s0 adcq %rbx, %rbx # update carry adcq %rcx, %rcx adcq $0, %rsi ### rbp <- s4*s4, carry <- rdi ### movq s4, %rax mulq s4 movq %rax, %rbp movq %rdx, %rdi ### s4 <- s5*s5, carry <- s5 ### movq s5, %rax mulq s5 movq %rax, s4 movq %rdx, s5 ### s6*s6 ### movq s6, %rax mulq s6 # s1 += carry(s4*s4) addq %rdi, s1 # s2 += s5*s5 adcq s4, s2 # s3 += carry(s5*s5) adcq s5, s3 # s4(s0) += s6*s6 adcq %rax, s0 # s5(rbx) += carry(s6*s6) adcq %rdx, %rbx adcq $0, %rcx adcq $0, %rsi ### s7*s7 ### movq s7, %rax mulq s7 # s6(rcx) += s7*s7 addq %rax, %rcx # s7(rsi) += carry(s7*s7) adcq %rdx, %rsi movq s0, s4 movq %rbp, s0 movq %rbx, s5 movq %rcx, s6 movq %rsi, s7 # Restore rdi movq 80(%rsp), %rdi # result of mul: s7 s6 s5 s4 s3 s2 s1 s0 ### Reduction ### RDC # Restore scalar registers movq 32(%rsp), %rbx movq 40(%rsp), %r12 movq 48(%rsp), %r13 movq 56(%rsp), %r14 movq 64(%rsp), %r15 movq 72(%rsp), %rbp addq $88, %rsp ret .size ECP_Sm2Sqr, .-ECP_Sm2Sqr .globl ECP_Sm2ToMont .type ECP_Sm2ToMont,@function .align 32 ECP_Sm2ToMont: leaq .LRR(%rip), %rdx REGISTER_SAVE movq 0(%rsi), %r9 movq 8(%rsi), %r10 movq 16(%rsi), %r11 movq 24(%rsi), %r12 movq %rdx, %rbx movq 0(%rdx), %rax call ECP_Sm2MulMont REGISTER_POP ret .size ECP_Sm2ToMont,.-ECP_Sm2ToMont .type ECP_Sm2MulMont,@function .align 32 ECP_Sm2MulMont: // a[0~3] * b[0] movq %rax, %rbp mulq %r9 movq %rax, %r8 movq %rdx, %r9 movq %rbp, %rax mulq %r10 addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %r10 mulq %r11 addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %r11 mulq %r12 addq %rax, %r11 adcq $0, %rdx movq %rdx, %r12 movq %r8, %rax movq %r8, %r14 xorq %r13, %r13 // begin 1st reduce shlq $32, %rax shrq $32, %r14 movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %r14, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %r12 adcq %r13, %r12 movq 8(%rbx), %rax // b[1] movq %rax, %rbp mulq 0(%rsi) addq %rax, %r8 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 8(%rsi) addq %rcx, %r9 adcq $0, %rdx addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 16(%rsi) addq %rcx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 24(%rsi) addq %rcx, %r11 adcq $0, %rdx addq %rax, %r11 movq %r9, %rax adcq %rdx, %r12 adcq $0, %r13 movq %r8, %rax movq %r8, %r14 // begin 2st reduce shlq $32, %rax shrq $32, %r14 movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %r14, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %r12 adcq %r13, %r12 movq 16(%rbx), %rax // b[2] movq %rax, %rbp mulq 0(%rsi) addq %rax, %r8 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rcx mulq 8(%rsi) addq %rcx, %r9 adcq $0, %rdx addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 16(%rsi) addq %rcx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 24(%rsi) addq %rcx, %r11 adcq $0, %rdx addq %rax, %r11 movq %r9, %rax adcq %rdx, %r12 adcq $0, %r13 movq %r8, %rax movq %r8, %r14 // begin 3st reduce shlq $32, %rax shrq $32, %r14 movq %r8, %rcx movq $0, %rdx subq %rax, %rcx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx sbbq %r14, %r8 movq %rdx, %rax movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %r12 adcq %r13, %r12 movq 24(%rbx), %rax // b[3] movq %rax, %rbp mulq 0(%rsi) addq %rax, %r8 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 8(%rsi) addq %rcx, %r9 adcq $0, %rdx addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 16(%rsi) addq %rcx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 24(%rsi) addq %rcx, %r11 adcq $0, %rdx addq %rax, %r11 adcq %rdx, %r12 adcq $0, %r13 movq %r9, %rax movq %r8, %rax movq %r8, %r14 // last reduction begin shlq $32, %rax shrq $32, %r14 movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %r14, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %rcx adcq %r13, %rcx // last reduction end // ret - p movq %r8, %r12 subq $-1, %r12 movq .Lpoly+8(%rip), %r14 movq %r9, %r13 sbbq %r14, %r13 movq %r10, %rbp sbbq $-1, %rbp movq .Lpoly+24(%rip), %r15 movq %r11, %rdx sbbq %r15, %rdx sbbq $0, %rcx cmovcq %r8, %r12 cmovcq %r9, %r13 cmovcq %r10, %rbp movq %r12,(%rdi) movq %r13,8(%rdi) cmovcq %r11, %rdx movq %rbp,16(%rdi) movq %rdx,24(%rdi) movq %rbp, %r8 movq %rdx, %r9 ret .size ECP_Sm2MulMont, .-ECP_Sm2MulMont .globl ECP_Sm2FromMont .type ECP_Sm2FromMont,@function .align 32 ECP_Sm2FromMont: leaq .Lone(%rip), %rdx REGISTER_SAVE movq %rdx, %rbx movq 0(%rsi), %r9 movq 8(%rsi), %r10 movq 16(%rsi), %r11 movq 24(%rsi), %r12 movq 0(%rdx), %rax call ECP_Sm2MulMont REGISTER_POP ret .size ECP_Sm2FromMont,.-ECP_Sm2FromMont .type ECP_Sm2SqrMont,@function .align 32 ECP_Sm2SqrMont: movq %rax, %r13 mulq %r14 // a[0] * a[1] movq %rax, %r9 movq %rdx, %r10 movq %r15, %rax mulq %r13 // a[0] * a[2] addq %rax, %r10 adcq $0, %rdx movq %r8, %rax movq %rdx, %r11 mulq %r13 // a[0] * a[3] addq %rax, %r11 adcq $0, %rdx movq %r15, %rax movq %rdx, %r12 mulq %r14 // a[1] * a[2] addq %rax, %r11 adcq $0, %rdx movq %r8, %rax movq %rdx, %rbp mulq %r14 // a[1] * a[3] addq %rax, %r12 adcq $0, %rdx addq %rbp, %r12 movq %rdx, %r13 movq %r8, %rax adcq $0, %r13 mulq %r15 // a[2] * a[3] addq %rax, %r13 movq (%rsi), %rax movq %rdx, %r14 adcq $0, %r14 movq $0, %r15 addq %r9, %r9 adcq %r10, %r10 adcq %r11, %r11 adcq %r12, %r12 adcq %r13, %r13 adcq %r14, %r14 adcq $0, %r15 mulq %rax // cal a[0] * a[0] movq %rax, %r8 movq 8(%rsi), %rax // get a[1] movq %rdx, %rcx mulq %rax // a[1] * a[1] addq %rcx, %r9 adcq %rax, %r10 adcq $0, %rdx movq 16(%rsi), %rax movq %rdx, %rcx mulq %rax // a[2] * a[2] addq %rcx, %r11 adcq %rax, %r12 adcq $0, %rdx movq 24(%rsi), %rax movq %rdx, %rcx mulq %rax // a[3] * a[3] addq %rcx, %r13 adcq %rax, %r14 movq %r8, %rax adcq %rdx, %r15 movq %r8, %rax movq %r8, %rsi // begin 1st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq %r8, %rax movq %r8, %rsi // begin 2st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq %r8, %rax movq %r8, %rsi // begin 3st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq %r8, %rax movq %r8, %rsi // begin 4st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq .Lpoly+8(%rip), %rsi movq .Lpoly+24(%rip), %rbp addq %r8, %r12 adcq %r9, %r13 adcq %r10, %r14 adcq %r11, %r15 movq $0, %r11 adcq $0, %r11 // ret - q movq %r12, %rax subq $-1, %rax movq %r13, %rcx sbbq %rsi, %rcx movq %r14, %r8 sbbq $-1, %r8 movq %r15, %rdx sbbq %rbp, %rdx sbbq $0, %r11 cmovncq %rax, %r12 cmovncq %rcx, %r13 cmovncq %r8, %r14 movq %r12,(%rdi) movq %r13,8(%rdi) cmovncq %rdx, %r15 movq %r14,16(%rdi) movq %r15,24(%rdi) ret .size ECP_Sm2SqrMont,.-ECP_Sm2SqrMont .type ECP_Sm2AddCore,@function .align 32 ECP_Sm2AddCore: addq (%rbx), %r12 adcq 8(%rbx), %r13 movq %r12, %rcx adcq 16(%rbx), %r8 adcq 24(%rbx), %r9 movq $0, %r11 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 // + 0xffffffffffffffff = -(-1) movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 cmovcq %rbp, %r13 movq %r12, 0(%rdi) cmovcq %rax, %r8 movq %r13, 8(%rdi) cmovcq %r10, %r9 movq %r8, 16(%rdi) movq %r9, 24(%rdi) ret .size ECP_Sm2AddCore,.-ECP_Sm2AddCore .type ECP_Sm2SubBA,@function .align 32 ECP_Sm2SubBA: subq %r12, %rcx sbbq %r13, %rbp movq %rcx, %r12 sbbq %r8, %rax sbbq %r9, %r10 movq %rbp, %r13 sbbq %r11, %r11 addq $-1, %rcx movq %rax, %r8 adcq %r14, %rbp adcq $-1, %rax movq %r10, %r9 adcq %r15, %r10 testq %r11, %r11 cmovnzq %rcx, %r12 cmovnzq %rbp, %r13 cmovnzq %rax, %r8 cmovnzq %r10, %r9 ret .size ECP_Sm2SubBA,.-ECP_Sm2SubBA .type ECP_Sm2SubAB,@function .align 32 ECP_Sm2SubAB: subq 0(%rbx), %r12 sbbq 8(%rbx), %r13 sbbq 16(%rbx), %r8 sbbq 24(%rbx), %r9 sbbq %r11, %r11 movq %r14, %rbp andq %r11, %rbp movq %r11, %rax btrq $32, %rax addq %r11, %r12 adcq %rbp, %r13 adcq %r11, %r8 adcq %rax, %r9 movq %r12, (%rdi) movq %r13, 8(%rdi) movq %r8, 16(%rdi) movq %r9, 24(%rdi) ret .size ECP_Sm2SubAB,.-ECP_Sm2SubAB .type ECP_Sm2MulBy2Core,@function .align 32 ECP_Sm2MulBy2Core: addq %r12, %r12 adcq %r13, %r13 movq %r12, %rcx adcq %r8, %r8 adcq %r9, %r9 movq $0, %r11 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 // + 0xffffffffffffffff = -(-1) movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 cmovcq %rbp, %r13 cmovcq %rax, %r8 cmovcq %r10, %r9 movq %r12, (%rdi) movq %r13, 8(%rdi) movq %r8, 16(%rdi) movq %r9, 24(%rdi) ret .size ECP_Sm2MulBy2Core,.-ECP_Sm2MulBy2Core # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b # Deal process: # delta = Z12 # gamma = Y12 # beta = X1*gamma # alpha = 3*(X1-delta)*(X1+delta) # X3 = alpha2-8*beta # Z3 = (Y1+Z1)2-gamma-delta # Y3 = alpha*(4*beta-X3)-8*gamma2 .globl ECP_Sm2PointDoubleMont .type ECP_Sm2PointDoubleMont,@function .align 32 ECP_Sm2PointDoubleMont: REGISTER_SAVE subq $168, %rsp .Lpoint_double: vmovdqu 0(%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqa %xmm0,96(%rsp) vmovdqa %xmm1,96+16(%rsp) movq %rsi, %rbx leaq 32(%rdi), %r10 leaq 64(%rdi), %r11 vmovq %rdi, %xmm0 vmovq %r10, %xmm1 vmovq %r11, %xmm2 movq 32(%rsi), %r12 movq 40(%rsi), %r13 movq 48(%rsi), %r8 movq 56(%rsi), %r9 movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 leaq (%rsp), %rdi call ECP_Sm2MulBy2Core movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %r15 movq 88(%rsi), %r8 leaq 64(%rsi), %rsi // Setting Input Parameters leaq 64(%rsp), %rdi // store the result call ECP_Sm2SqrMont movq (%rsp), %rax movq 8(%rsp), %r14 movq 16(%rsp), %r15 movq 24(%rsp), %r8 leaq (%rsp), %rsi leaq (%rsp), %rdi call ECP_Sm2SqrMont movq 32(%rbx), %rax movq 64(%rbx), %r9 movq 72(%rbx), %r10 movq 80(%rbx), %r11 movq 88(%rbx), %r12 leaq 64(%rbx), %rsi leaq 32(%rbx), %rbx vmovq %xmm2, %rdi call ECP_Sm2MulMont call ECP_Sm2MulBy2Core movq 96(%rsp), %r12 movq 104(%rsp), %r13 movq 112(%rsp), %r8 movq 120(%rsp), %r9 leaq 32(%rsp), %rdi leaq 64(%rsp), %rbx call ECP_Sm2AddCore movq 96(%rsp), %r12 movq 104(%rsp), %r13 movq 112(%rsp), %r8 movq 120(%rsp), %r9 leaq 64(%rsp), %rbx // intput leaq 64(%rsp), %rdi // output call ECP_Sm2SubAB movq (%rsp), %rax movq 8(%rsp), %r14 movq 16(%rsp), %r15 movq 24(%rsp), %r8 leaq (%rsp), %rsi vmovq %xmm1, %rdi call ECP_Sm2SqrMont movq %r12, %rcx addq $-1, %r12 movq %r13, %r10 adcq %rsi, %r13 movq %r14, %rax adcq $-1, %r14 movq $0, %r9 movq %r15, %r8 adcq %rbp, %r15 adcq $0, %r9 xorq %rsi, %rsi testq $1, %rcx cmovzq %rcx, %r12 cmovzq %r10, %r13 cmovzq %rax, %r14 cmovzq %r8, %r15 cmovzq %rsi, %r9 movq %r13, %rcx shrq $1, %r12 shlq $63, %rcx shrq $1, %r13 movq %r14, %r10 orq %rcx, %r12 shlq $63, %r10 movq %r15, %rax shrq $1, %r14 orq %r10, %r13 shlq $63, %rax movq %r12,0(%rdi) shrq $1, %r15 movq %r13,8(%rdi) shlq $63, %r9 orq %rax, %r14 orq %r9, %r15 movq %r14,16(%rdi) movq %r15,24(%rdi) movq 64(%rsp), %rax leaq 64(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont leaq 128(%rsp), %rdi call ECP_Sm2MulBy2Core leaq 32(%rsp), %rbx leaq 32(%rsp), %rdi call ECP_Sm2AddCore movq 96(%rsp), %rax leaq 96(%rsp), %rbx movq (%rsp), %r9 movq 8(%rsp), %r10 leaq (%rsp), %rsi movq 16(%rsp), %r11 movq 24(%rsp), %r12 leaq 0(%rsp), %rdi call ECP_Sm2MulMont leaq 128(%rsp), %rdi call ECP_Sm2MulBy2Core movq 32(%rsp), %rax movq 40(%rsp), %r14 leaq 32(%rsp), %rsi movq 48(%rsp), %r15 movq 56(%rsp), %r8 vmovq %xmm0, %rdi call ECP_Sm2SqrMont leaq 128(%rsp), %rbx movq %r14, %r8 movq %r15, %r9 movq %rsi, %r14 movq %rbp, %r15 call ECP_Sm2SubAB movq (%rsp), %rcx movq 8(%rsp), %rbp movq 16(%rsp), %rax movq 24(%rsp), %r10 leaq 0(%rsp), %rdi call ECP_Sm2SubBA movq 32(%rsp), %rax leaq 32(%rsp), %rbx movq %r12, %r14 xorl %ecx, %ecx movq %r12,(%rsp) movq %r13, %r10 movq %r13,8(%rsp) cmovzq %r8, %r11 movq %r8,16(%rsp) cmovzq %r9, %r12 movq %r9,24(%rsp) movq %r14, %r9 leaq 0(%rsp), %rsi leaq 0(%rsp), %rdi call ECP_Sm2MulMont vmovq %xmm1, %rbx vmovq %xmm1, %rdi call ECP_Sm2SubAB leaq 168(%rsp), %rsp REGISTER_POP ret .size ECP_Sm2PointDoubleMont,.-ECP_Sm2PointDoubleMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo # Deal process: # U1 = X1*Z22 # U2 = X2*Z12 # S1 = Y1*Z23 # S2 = Y2*Z13 # H = U2-U1 # r = S2-S1 # X3 = r2-H3-2*U1*H2 # Y3 = r*(U1*H2-X3)-S1*H3 # Z3 = Z1*Z2*H .globl ECP_Sm2PointAddMont .type ECP_Sm2PointAddMont,@function .align 32 ECP_Sm2PointAddMont: REGISTER_SAVE subq $584, %rsp vmovdqu 0(%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vmovdqu 48(%rsi), %xmm3 vmovdqu 64(%rsi), %xmm4 vmovdqu 80(%rsi), %xmm5 movq %rsi, %rbx movq %rdx, %rsi vmovdqa %xmm0,384(%rsp) vmovdqa %xmm1,384+16(%rsp) vmovdqa %xmm2,416(%rsp) vmovdqa %xmm3,416+16(%rsp) vmovdqa %xmm4,448(%rsp) vmovdqa %xmm5,448+16(%rsp) vpor %xmm4, %xmm5, %xmm5 vmovdqu 0(%rsi), %xmm0 vpshufd $0xb1, %xmm5, %xmm3 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vpor %xmm3, %xmm5, %xmm5 vmovdqu 48(%rsi), %xmm3 movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %r15 movq 88(%rsi), %r8 vmovdqa %xmm0,480(%rsp) vpshufd $0x1e, %xmm5, %xmm4 vmovdqa %xmm1,480+16(%rsp) vmovdqu 64(%rsi), %xmm0 vmovdqu 80(%rsi), %xmm1 vmovdqa %xmm2,512(%rsp) vmovdqa %xmm3,512+16(%rsp) vpor %xmm4, %xmm5, %xmm5 vpxor %xmm4, %xmm4, %xmm4 vpor %xmm0, %xmm1, %xmm1 vmovq %rdi, %xmm0 leaq 64(%rsi), %rsi movq %rax,544(%rsp) movq %r14,544+8(%rsp) movq %r15,544+16(%rsp) movq %r8,544+24(%rsp) leaq 96(%rsp), %rdi call ECP_Sm2SqrMont vpcmpeqd %xmm4, %xmm5, %xmm5 vpshufd $0xb1, %xmm1, %xmm4 vpor %xmm1, %xmm4, %xmm4 vpshufd $0, %xmm5, %xmm5 vpshufd $0x1e, %xmm4, %xmm3 vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm4, %xmm4 movq 64(%rbx), %rax movq 72(%rbx), %r14 movq 80(%rbx), %r15 movq 88(%rbx), %r8 vmovq %rbx, %xmm1 leaq 64(%rbx), %rsi leaq 32(%rsp), %rdi call ECP_Sm2SqrMont movq 544(%rsp), %rax leaq 544(%rsp), %rbx movq 96(%rsp), %r9 movq 104(%rsp), %r10 leaq 96(%rsp), %rsi movq 112(%rsp), %r11 movq 120(%rsp), %r12 leaq 224(%rsp), %rdi call ECP_Sm2MulMont movq 448(%rsp), %rax leaq 448(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 256(%rsp), %rdi call ECP_Sm2MulMont movq 416(%rsp), %rax leaq 416(%rsp), %rbx movq 224(%rsp), %r9 movq 232(%rsp), %r10 leaq 224(%rsp), %rsi movq 240(%rsp), %r11 movq 248(%rsp), %r12 leaq 224(%rsp), %rdi call ECP_Sm2MulMont movq 512(%rsp), %rax leaq 512(%rsp), %rbx movq 256(%rsp), %r9 movq 264(%rsp), %r10 leaq 256(%rsp), %rsi movq 272(%rsp), %r11 movq 280(%rsp), %r12 leaq 256(%rsp), %rdi call ECP_Sm2MulMont leaq 224(%rsp), %rbx leaq 64(%rsp), %rdi call ECP_Sm2SubAB orq %r13, %r12 vmovdqa %xmm4, %xmm2 orq %r8, %r12 orq %r9, %r12 vpor %xmm5, %xmm2, %xmm2 vmovq %r12, %xmm3 movq 384(%rsp), %rax leaq 384(%rsp), %rbx movq 96(%rsp), %r9 movq 104(%rsp), %r10 leaq 96(%rsp), %rsi movq 112(%rsp), %r11 movq 120(%rsp), %r12 leaq 160(%rsp), %rdi call ECP_Sm2MulMont movq 480(%rsp), %rax leaq 480(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 192(%rsp), %rdi call ECP_Sm2MulMont leaq 160(%rsp), %rbx leaq 0(%rsp), %rdi call ECP_Sm2SubAB orq %r13, %r12 orq %r8, %r12 orq %r9, %r12 vmovq %xmm2, %r8 vmovq %xmm3, %r9 orq %r8, %r12 orq %r9, %r12 jnz .Lpoint_add .Ladd_double: vmovq %xmm1, %rsi vmovq %xmm0, %rdi addq $416, %rsp jmp .Lpoint_double .align 32 .Lpoint_add: movq 64(%rsp), %rax movq 72(%rsp), %r14 leaq 64(%rsp), %rsi movq 80(%rsp), %r15 movq 88(%rsp), %r8 leaq 96(%rsp), %rdi call ECP_Sm2SqrMont movq 448(%rsp), %rax leaq 448(%rsp), %rbx movq (%rsp), %r9 movq 8(%rsp), %r10 leaq (%rsp), %rsi movq 16(%rsp), %r11 movq 24(%rsp), %r12 leaq 352(%rsp), %rdi call ECP_Sm2MulMont movq (%rsp), %rax movq 8(%rsp), %r14 leaq (%rsp), %rsi movq 16(%rsp), %r15 movq 24(%rsp), %r8 leaq 32(%rsp), %rdi call ECP_Sm2SqrMont movq 544(%rsp), %rax leaq 544(%rsp), %rbx movq 352(%rsp), %r9 movq 360(%rsp), %r10 leaq 352(%rsp), %rsi movq 368(%rsp), %r11 movq 24+352(%rsp), %r12 leaq 352(%rsp), %rdi call ECP_Sm2MulMont movq (%rsp), %rax leaq (%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 128(%rsp), %rdi call ECP_Sm2MulMont movq 160(%rsp), %rax leaq 160(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 192(%rsp), %rdi call ECP_Sm2MulMont leaq 96(%rsp), %rsi movq $0, %r11 addq %r12, %r12 adcq %r13, %r13 movq %r12, %rcx adcq %r8, %r8 adcq %r9, %r9 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 movq (%rsi), %rcx cmovcq %rbp, %r13 movq 8(%rsi), %rbp cmovcq %rax, %r8 movq 16(%rsi), %rax cmovcq %r10, %r9 movq 24(%rsi), %r10 call ECP_Sm2SubBA leaq 128(%rsp), %rbx leaq 288(%rsp), %rdi call ECP_Sm2SubAB movq 192(%rsp), %rcx movq 200(%rsp), %rbp movq 208(%rsp), %rax movq 216(%rsp), %r10 leaq 320(%rsp), %rdi call ECP_Sm2SubBA movq %r12,(%rdi) movq %r13,8(%rdi) movq %r8,16(%rdi) movq %r9,24(%rdi) movq 128(%rsp), %rax leaq 128(%rsp), %rbx movq 224(%rsp), %r9 movq 232(%rsp), %r10 leaq 224(%rsp), %rsi movq 240(%rsp), %r11 movq 248(%rsp), %r12 leaq 256(%rsp), %rdi call ECP_Sm2MulMont movq 320(%rsp), %rax leaq 320(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 320(%rsp), %rdi call ECP_Sm2MulMont leaq 256(%rsp), %rbx leaq 320(%rsp), %rdi call ECP_Sm2SubAB vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 352(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 368(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 544(%rsp), %xmm2, %xmm2 vpand 560(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 448(%rsp), %xmm2, %xmm2 vpand 464(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,64(%rdi) vmovdqu %xmm3,80(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 288(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 304(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 480(%rsp), %xmm2, %xmm2 vpand 496(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 384(%rsp), %xmm2, %xmm2 vpand 400(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,(%rdi) vmovdqu %xmm3,16(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 320(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 336(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 512(%rsp), %xmm2, %xmm2 vpand 528(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 416(%rsp), %xmm2, %xmm2 vpand 432(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,32(%rdi) vmovdqu %xmm3,48(%rdi) .Ladd_done: leaq 584(%rsp), %rsp REGISTER_POP ret .size ECP_Sm2PointAddMont,.-ECP_Sm2PointAddMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl # Deal process: # Z1Z1 = Z12 # U2 = X2*Z1Z1 # S2 = Y2*Z1*Z1Z1 # H = U2-X1 # HH = H2 # I = 4*HH # J = H*I # r = 2*(S2-Y1) # V = X1*I # X3 = r2-J-2*V # Y3 = r*(V-X3)-2*Y1*J # Z3 = (Z1+H)2-Z1Z1-HH .globl ECP_Sm2PointAddAffineMont .type ECP_Sm2PointAddAffineMont,@function .align 32 ECP_Sm2PointAddAffineMont: REGISTER_SAVE subq $488, %rsp vmovdqu (%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vmovdqu 48(%rsi), %xmm3 vmovdqu 64(%rsi), %xmm4 vmovdqu 80(%rsi), %xmm5 movq %rdx, %rbx movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %r15 movq 88(%rsi), %r8 vmovdqa %xmm0,320(%rsp) vmovdqa %xmm1,336(%rsp) vmovdqa %xmm2,352(%rsp) vmovdqa %xmm3,368(%rsp) vmovdqa %xmm4,384(%rsp) vmovdqa %xmm5,400(%rsp) vpor %xmm4, %xmm5, %xmm5 vmovdqu (%rbx), %xmm0 vpshufd $0xb1, %xmm5, %xmm3 vmovdqu 16(%rbx), %xmm1 vmovdqu 32(%rbx), %xmm2 vpor %xmm3, %xmm5, %xmm5 vmovdqu 48(%rbx), %xmm3 vmovdqa %xmm0, 416(%rsp) vpshufd $0x1e, %xmm5, %xmm4 vmovdqa %xmm1, 416+16(%rsp) vpor %xmm0, %xmm1, %xmm1 vmovq %rdi, %xmm0 vmovdqa %xmm2, 448(%rsp) vmovdqa %xmm3, 464(%rsp) vpor %xmm2, %xmm3, %xmm3 vpor %xmm4, %xmm5, %xmm5 vpxor %xmm4, %xmm4, %xmm4 vpor %xmm1, %xmm3, %xmm3 leaq 64(%rsi), %rsi leaq 32(%rsp), %rdi call ECP_Sm2SqrMont vpcmpeqd %xmm4, %xmm5, %xmm5 vpshufd $0xb1, %xmm3, %xmm4 vpor %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm5, %xmm5 vpshufd $0x1e, %xmm4, %xmm3 vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm4, %xmm4 movq (%rbx), %rax movq %r12, %r9 movq %r13, %r10 movq %r14, %r11 leaq 32(%rsp), %rsi movq %r15, %r12 leaq (%rsp), %rdi call ECP_Sm2MulMont leaq 320(%rsp), %rbx leaq 64(%rsp), %rdi call ECP_Sm2SubAB movq 384(%rsp), %rax leaq 384(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont movq 384(%rsp), %rax leaq 384(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 288(%rsp), %rdi call ECP_Sm2MulMont movq 448(%rsp), %rax leaq 448(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont leaq 352(%rsp), %rbx leaq 96(%rsp), %rdi call ECP_Sm2SubAB movq 64(%rsp), %rax movq 72(%rsp), %r14 leaq 64(%rsp), %rsi movq 80(%rsp), %r15 movq 88(%rsp), %r8 leaq 128(%rsp), %rdi call ECP_Sm2SqrMont movq 96(%rsp), %rax movq 104(%rsp), %r14 leaq 96(%rsp), %rsi movq 112(%rsp), %r15 movq 120(%rsp), %r8 leaq 192(%rsp), %rdi call ECP_Sm2SqrMont movq 128(%rsp), %rax leaq 128(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 160(%rsp), %rdi call ECP_Sm2MulMont movq 320(%rsp), %rax leaq 320(%rsp), %rbx movq 128(%rsp), %r9 movq 136(%rsp), %r10 leaq 128(%rsp), %rsi movq 144(%rsp), %r11 movq 152(%rsp), %r12 leaq (%rsp), %rdi call ECP_Sm2MulMont leaq 192(%rsp), %rsi movq $0, %r11 addq %r12, %r12 adcq %r13, %r13 movq %r12, %rcx adcq %r8, %r8 adcq %r9, %r9 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 movq (%rsi), %rcx cmovcq %rbp, %r13 movq 8(%rsi), %rbp cmovcq %rax, %r8 movq 16(%rsi), %rax cmovcq %r10, %r9 movq 24(%rsi), %r10 call ECP_Sm2SubBA leaq 160(%rsp), %rbx leaq 224(%rsp), %rdi call ECP_Sm2SubAB movq (%rsp), %rcx movq 8(%rsp), %rbp movq 16(%rsp), %rax movq 24(%rsp), %r10 leaq 64(%rsp), %rdi call ECP_Sm2SubBA movq %r12,(%rdi) movq %r13,8(%rdi) movq %r8,16(%rdi) movq %r9,24(%rdi) movq 352(%rsp), %rax leaq 352(%rsp), %rbx movq 160(%rsp), %r9 movq 168(%rsp), %r10 leaq 160(%rsp), %rsi movq 176(%rsp), %r11 movq 184(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont movq 96(%rsp), %rax leaq 96(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 64(%rsp), %rdi call ECP_Sm2MulMont leaq 32(%rsp), %rbx leaq 256(%rsp), %rdi call ECP_Sm2SubAB vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 288(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 304(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand .Lone_mont(%rip), %xmm2, %xmm2 vpand .Lone_mont+16(%rip), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 384(%rsp), %xmm2, %xmm2 vpand 400(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,64(%rdi) vmovdqu %xmm3,80(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 224(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 240(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 416(%rsp), %xmm2, %xmm2 vpand 432(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 320(%rsp), %xmm2, %xmm2 vpand 336(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,(%rdi) vmovdqu %xmm3,16(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 256(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 272(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 448(%rsp), %xmm2, %xmm2 vpand 464(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 352(%rsp), %xmm2, %xmm2 vpand 368(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,32(%rdi) vmovdqu %xmm3,48(%rdi) leaq 488(%rsp), %rsp REGISTER_POP ret .size ECP_Sm2PointAddAffineMont,.-ECP_Sm2PointAddAffineMont #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm/ecp_sm2_x86_64.S
Unix Assembly
unknown
48,837
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) #include <stdint.h> #include "crypt_errno.h" #include "crypt_bn.h" #include "ecp_nistp256.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "bsl_err_internal.h" #include "asm_ecp_nistp256.h" static const Coord g_rrModOrder = {{ 0x83244c95be79eea2, 0x4699799c49bd6fa6, 0x2845b2392b6bec59, 0x66e12d94f3d95620 }}; static int32_t ECP256_ModOrderInvCheck(const ECC_Para *para, const BN_BigNum *r, const BN_BigNum *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(a)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVERSE_INPUT_ZERO); return CRYPT_ECC_INVERSE_INPUT_ZERO; } return CRYPT_SUCCESS; } static int32_t Bn2CoordArray(const ECC_Para *para, Coord *aArr, const BN_BigNum *a) { int32_t ret = CRYPT_SUCCESS; uint32_t bits = BN_Bits(para->n); BN_Optimizer *opt = BN_OptimizerCreate(); BN_BigNum *aTemp = BN_Create(bits); if (opt == NULL || aTemp == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_Cmp(a, para->n) >= 0) { ret = BN_Mod(aTemp, a, para->n, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsZero(aTemp)) { // If x and m are coprime, the module inverse cannot be obtained. BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_NO_INVERSE); ret = CRYPT_BN_ERR_NO_INVERSE; goto EXIT; } } else { ret = BN_Copy(aTemp, a); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } (void)BN_BN2Array(aTemp, aArr->value, P256_SIZE); EXIT: BN_OptimizerDestroy(opt); BN_Destroy(aTemp); return ret; } // r = a^(-1) mod n, a cannot be 0 // a^(-1) mod n = a^(n-2) mod n // n = 0xffffffff 00000000 ffffffff ffffffff bce6faad a7179e84 f3b9cac2 fc632551 // n-2 = 0xffffffff 00000000 ffffffff ffffffff bce6faad a7179e84 f3b9cac2 fc63254f // Split the file into binary files as follows: // 11111111111111111111111111111111---------0xffffffff // 00000000000000000000000000000000---------0x00000000 // 11111111111111111111111111111111---------0xffffffff // 11111111111111111111111111111111---------0xffffffff // 101111 00 111 00 11 0 1111 10101 0 101 101 // 101 00 111 000 101111 00 1111 0 1 0000 1 00 // 1111 00 111 0 111 00 111 00 101 0 11 0000 10(1111): append four 1s // (1111) 11 000 11 000 11 00 1 00 10101 00 1111 // To calculate the power of a, the exponent list is { 1, 10, 11, 101, 111, 1010, 1111, 10101, 101010, 101111, ffffffff} // To calculate a^(0xffffffff), a^(0xffff) is required. The former requires a^(0xff), the latter requires a^(0x3f). // The above is the optimal multiplication chain of a^(n-2) // https://briansmith.org/ecc-inversion-addition-chains-01#p256_scalar_inversion int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { int32_t ret = ECP256_ModOrderInvCheck(para, r, a); if (ret != CRYPT_SUCCESS) { return ret; } const Coord one = {{1}}; Coord aArr, res; Coord table[14]; enum { bin1 = 0, bin10, bin11, bin101, bin111, bin1010, bin1111, bin10101, bin101010, bin101111, hex3f, hexff, hexffff, hexffffffff }; static const uint8_t mulMap[26] = { // The lower 128 bits of n-2 can be split into 26 binary numbers. bin101111, bin111, bin11, bin1111, bin10101, bin101, bin101, bin101, bin111, bin101111, bin1111, bin1, bin1, bin1111, bin111, bin111, bin111, bin101, bin11, bin101111, bin11, bin11, bin11, bin1, bin10101, bin1111 }; static const uint8_t sqrRep[26] = { // The lower 128 bits of n-2 can be split into 26 binary numbers. 6, 5, 4, 5, 5, 4, 3, 3, 5, 9, 6, 2, 5, 6, 5, 4, 5, 5, 3, 10, 2, 5, 5, 3, 7, 6 }; ret = Bn2CoordArray(para, &aArr, a); if (ret != CRYPT_SUCCESS) { return ret; } ECP256_OrdMul(&table[bin1], &aArr, &g_rrModOrder); // table[bin1] = a, to the field with Montgomery ECP256_OrdSqr(&table[bin10], &table[bin1], 1); // table[bin10] = a^(0b10) ECP256_OrdMul(&table[bin11], &table[bin1], &table[bin10]); // table[bin11] = a^(0b11) ECP256_OrdMul(&table[bin101], &table[bin11], &table[bin10]); // table[bin101] = a^(0b101) ECP256_OrdMul(&table[bin111], &table[bin101], &table[bin10]); // table[bin111] = a^(0b111) ECP256_OrdSqr(&table[bin1010], &table[bin101], 1); // table[bin1010] = a^(0b1010) ECP256_OrdMul(&table[bin1111], &table[bin1010], &table[bin101]); // table[bin1111] = a^(0b1111) ECP256_OrdSqr(&table[bin10101], &table[bin1010], 1); // table[bin10101] = a^(0b10100) ECP256_OrdMul(&table[bin10101], &table[bin10101], &table[bin1]); // table[bin10101] = a^(0b10101) ECP256_OrdSqr(&table[bin101010], &table[bin10101], 1); // table[bin101010] = a^(0b101010) ECP256_OrdMul(&table[bin101111], &table[bin101010], &table[bin101]); // table[bin101111] = a^(0b101111) ECP256_OrdMul(&table[hex3f], &table[bin101010], &table[bin10101]); // table[hex3f] = a^(0b0011 1111) = a^(0x3f) ECP256_OrdSqr(&table[hexff], &table[hex3f], 2); // left shift by 2 bits, table[hexff] = a^(0b1111 1100) = a^(0xfc) ECP256_OrdMul(&table[hexff], &table[hexff], &table[bin11]); // table[hexff] = a^(0b1111 1111) = a^(0xff) ECP256_OrdSqr(&table[hexffff], &table[hexff], 8); // left shift by 8 bits, table[hexffff] = a^(0xff00) ECP256_OrdMul(&table[hexffff], &table[hexffff], &table[hexff]); // table[hexffff] = a^(0xffff) // left shift by 16 bits, table[hexffffffff] = a^(0xffff0000) ECP256_OrdSqr(&table[hexffffffff], &table[hexffff], 16); ECP256_OrdMul(&table[hexffffffff], &table[hexffffffff], &table[hexffff]); // table[hexffffffff] = a^(0xffffffff) ECP256_OrdSqr(&res, &table[hexffffffff], 64); // res = a^(0xffffffff 00000000 00000000), left shift by 64 bits ECP256_OrdMul(&res, &res, &table[hexffffffff]); // res = a^(0xffffffff 00000000 ffffffff) ECP256_OrdSqr(&res, &res, 32); // res = a^(0xffffffff 00000000 ffffffff 00000000), left shift by 32 bits ECP256_OrdMul(&res, &res, &table[hexffffffff]); // res = a^(0xffffffff 00000000 ffffffff ffffffff) for (uint32_t i = 0; i < sizeof(mulMap); i++) { ECP256_OrdSqr(&res, &res, sqrRep[i]); ECP256_OrdMul(&res, &res, &table[mulMap[i]]); } // Multiplied by 1 can be converted back to the normal real number field, which is equivalent to a reduce. // For details, see Montgomery modular multiplication. ECP256_OrdMul(&res, &res, &one); (void)BN_Array2BN(r, res.value, P256_SIZE); return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm64_ecp_nistp256.c
C
unknown
7,694
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) #include <stdlib.h> #include <stdint.h> #include <stdbool.h> #include "securec.h" #include "crypt_errno.h" #include "crypt_bn.h" #include "ecp_nistp256.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "bsl_err_internal.h" #include "asm_ecp_nistp256.h" #if defined(HITLS_SIXTY_FOUR_BITS) // 1 is on the field with Montgomery, 1 * RR * R' mod P = R mod P = R - P static const Coord g_oneMont = {{ 0x0000000000000001, 0xffffffff00000000, 0xffffffffffffffff, 0x00000000fffffffe }}; static const Coord g_rrModP = {{ 0x0000000000000003, 0xfffffffbffffffff, 0xfffffffffffffffe, 0x00000004fffffffd }}; #elif defined(HITLS_THIRTY_TWO_BITS) // 1 is on the field with Montgomery, 1 * RR * R' mod P = R mod P = R - P static const Coord g_oneMont = {{ 0x00000001, 0x00000000, 0x00000000, 0xffffffff, 0xffffffff, 0xffffffff, 0xfffffffe, 0x00000000 }}; static const Coord g_rrModP = {{ 0x00000003, 0x00000000, 0xffffffff, 0xfffffffb, 0xfffffffe, 0xffffffff, 0xfffffffd, 0x00000004 }}; #else #error BN_UINT MUST be 4 or 8 #endif // If the value is 0, all Fs are returned. If the value is not 0, 0 is returned. static BN_UINT IsZero(const Coord *a) { BN_UINT ret = a->value[0]; for (uint32_t i = 1; i < P256_SIZE; i++) { ret |= a->value[i]; } return BN_IsZeroUintConsttime(ret); } // r = cond == 0 ? r : a, the input parameter cond can only be 0 or 1. // If cond is 0, the value remains unchanged. If cond is 1, copy a. static void CopyConditional(Coord *r, const Coord *a, BN_UINT cond) { BN_UINT mask1 = ~cond & (cond - 1); BN_UINT mask2 = ~mask1; for (uint32_t i = 0; i < P256_SIZE; i++) { r->value[i] = (r->value[i] & mask1) ^ (a->value[i] & mask2); } } // Jacobian affine -> Jacobian projection, (X,Y)->(X,Y,Z) static void Affine2Jproj(P256_Point *r, const P256_AffinePoint *a, BN_UINT mask) { for (uint32_t i = 0; i < P256_SIZE; i++) { r->x.value[i] = a->x.value[i] & mask; r->y.value[i] = a->y.value[i] & mask; r->z.value[i] = g_oneMont.value[i] & mask; } } // r = a^-1 mod p = a^(p-2) mod p // p-2 = 0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd static void ECP256_ModInverse(Coord *r, const Coord *a) { // a^(0x3), a^(0xc) = a^(0b1100), a^(0xf), a^(0xf0), a^(0xff) // a^(0xff00), a^(0xffff), a^(0xffff0000), a^(0xffffffff) Coord a3, ac, af, af0, a2f, a2f20, a4f, a4f40, a8f, ans; uint32_t i; // 0x3 = 0b11 = 0b10 + 0b01 ECP256_Sqr(&a3, a); // a^2 ECP256_Mul(&a3, &a3, a); // a^3 = a^2 * a // 0xf = 0b1111 = 0b1100 + 0b11, 0b11->0b1100 requires *4, and the exponent*4(2^2) requires twice square operations ECP256_Sqr(&af, &a3); // a^6 = (a^3)^2 ECP256_Sqr(&ac, &af); // a^12 = (a^3)^2 = a^(0xc) ECP256_Mul(&af, &ac, &a3); // a^f = a^15 = a^12 * a^3 // 0xff = 0b11111111 = 0b11110000 + 0b1111, 0b1111->0b11110000 requires *16, // the exponent*16(2^4) requires 4 times square operations ECP256_Sqr(&a2f, &af); // a^(0b11110) = (a^f)^2 ECP256_Sqr(&a2f, &a2f); // a^(0b111100) = (a^(0b11110))^2 ECP256_Sqr(&a2f, &a2f); // a^(0b1111000) = (a^(0b111100))^2 ECP256_Sqr(&af0, &a2f); // a^(0xf0) = a^(0b11110000) = (a^(0b1111000))^2 ECP256_Mul(&a2f, &af0, &af); // a^(0xff) = a^(0xf0) * a^(0xf) // a^(0xffff) ECP256_Sqr(&a2f20, &a2f); for (i = 1; i < 8; i++) { // need to left shift by 8 bits ECP256_Sqr(&a2f20, &a2f20); } // When the loop ends, &a2f20 = a^(0xff00) ECP256_Mul(&a4f, &a2f20, &a2f); // a^(0xffff) = a^(0xff00) * a^(0xff) // a^(0xffffffff) ECP256_Sqr(&a4f40, &a4f); for (i = 1; i < 16; i++) { // need to left shift by 16 bits ECP256_Sqr(&a4f40, &a4f40); } // When the loop ends, &a4f40 = a^(0xffff0000) ECP256_Mul(&a8f, &a4f40, &a4f); // a^(0xffffffff) = a^(0xffff0000) * a^(0xffff) // a^(0xffffffff 00000001) ECP256_Sqr(&ans, &a8f); for (i = 1; i < 32; i++) { // need to left shift by 32 bits ECP256_Sqr(&ans, &ans); } ECP256_Mul(&ans, &ans, a); // a^(0xffffffff 00000001) = a^(0xffffffff 00000000) * a // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff) for (i = 0; i < 32 * 4; i++) { // need to left shift by 32 * 4 bits ECP256_Sqr(&ans, &ans); } ECP256_Mul(&ans, &ans, &a8f); // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff) for (i = 0; i < 32; i++) { // need to left shift by 32 bits ECP256_Sqr(&ans, &ans); } ECP256_Mul(&ans, &ans, &a8f); // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd) for (i = 0; i < 32; i++) { // need to left shift by 32 bits ECP256_Sqr(&ans, &ans); } // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff 00000000) ECP256_Mul(&ans, &ans, &a4f40); // a^(0xffff0000) ECP256_Mul(&ans, &ans, &a2f20); // a^(0xff00) ECP256_Mul(&ans, &ans, &af0); // a^(0xf0) ECP256_Mul(&ans, &ans, &ac); // a^(0xc) ECP256_Mul(r, &ans, a); // a^(0x1) } static int32_t ECP256_GetAffine(ECC_Point *r, const P256_Point *pt) { Coord zInv3; Coord zInv2; Coord res_x; Coord res_y; int32_t ret; if (IsZero(&(pt->z)) != 0) { ret = CRYPT_ECC_POINT_AT_INFINITY; BSL_ERR_PUSH_ERROR(ret); return ret; } ECP256_ModInverse(&zInv3, &(pt->z)); // zInv ECP256_Sqr(&zInv2, &zInv3); // zInv^2 ECP256_Mul(&zInv3, &zInv2, &zInv3); // zInv^3 ECP256_Mul(&res_x, &(pt->x), &zInv2); // xMont = x / (z^2) ECP256_Mul(&res_y, &(pt->y), &zInv3); // yMont = y / (z^3) ECP256_FromMont(&res_x, &res_x); ECP256_FromMont(&res_y, &res_y); ret = BN_Array2BN(&r->x, res_x.value, P256_SIZE); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Array2BN(&r->y, res_y.value, P256_SIZE); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_SetLimb(&r->z, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static void ECP256_P256Point2EccPoint(ECC_Point *r, const P256_Point *pt) { Coord xTemp; Coord yTemp; Coord zTemp; ECP256_FromMont(&xTemp, &(pt->x)); ECP256_FromMont(&yTemp, &(pt->y)); ECP256_FromMont(&zTemp, &(pt->z)); (void)BN_Array2BN(&r->x, xTemp.value, P256_SIZE); (void)BN_Array2BN(&r->y, yTemp.value, P256_SIZE); (void)BN_Array2BN(&r->z, zTemp.value, P256_SIZE); } static void ECP256_EccPoint2P256Point(P256_Point *r, const ECC_Point *pt) { (void)BN_BN2Array(&pt->x, r->x.value, P256_SIZE); (void)BN_BN2Array(&pt->y, r->y.value, P256_SIZE); (void)BN_BN2Array(&pt->z, r->z.value, P256_SIZE); ECP256_Mul(&(r->x), &(r->x), &g_rrModP); ECP256_Mul(&(r->y), &(r->y), &g_rrModP); ECP256_Mul(&(r->z), &(r->z), &g_rrModP); } int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { if (r == NULL || pt == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256 || pt->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } P256_Point temp; ECP256_EccPoint2P256Point(&temp, pt); return ECP256_GetAffine(r, &temp); } // The value of 'in' contains a maximum of six bits. The input parameter must be & 0b111111 in advance. static uint32_t Recodew5(uint32_t in) { // Shift rightwards by 5 bits to get the most significant bit, check whether the most significant bit is 1. uint32_t sign = (in >> 5) - 1; uint32_t data = (1 << 6) - 1 - in; // (6 Ones)0b111111 - in data = (data & ~sign) | (in & sign); data = (data >> 1) + (data & 1); return (data << 1) + (~sign & 1); } // The value of 'in' contains a maximum of six bits. The input parameter must be & 0b11111111 in advance. static uint32_t Recodew7(uint32_t in) { // Shift rightwards by 7 bits to get the most significant bit, check whether the most significant bit is 1. uint32_t sign = (in >> 7) - 1; uint32_t data = (1 << 8) - 1 - in; // (8 Ones)0b11111111 - in data = (data & ~sign) | (in & sign); data = (data >> 1) + (data & 1); return (data << 1) + (~sign & 1); } static void ECP256_PreCompWindow(P256_Point table[16], P256_Point *pt) { P256_Point temp[4]; ECP256_Scatterw5(table, pt, 1); ECP256_PointDouble(&temp[0], pt); // 2G ECP256_Scatterw5(table, &temp[0], 2); // Discretely save temp[0] to the 2nd position of the table. ECP256_PointAdd(&temp[1], &temp[0], pt); // temp[0] = 3G = 2G + G ECP256_Scatterw5(table, &temp[1], 3); // Discretely saves temp[1] to the 3rd position of the table. ECP256_PointDouble(&temp[2], &temp[0]); // temp[2] = 4G = 2G * 2 ECP256_Scatterw5(table, &temp[2], 4); // Discretely save temp[2] to the 4th position in the table. ECP256_PointAdd(&temp[3], &temp[2], pt); // temp[3] = 5G = 4G + G = = temp[2] + pt ECP256_Scatterw5(table, &temp[3], 5); // Discretely save temp[3] to the 5th position in the table. ECP256_PointDouble(&temp[0], &temp[1]); // temp[0] = 6G = 3G * 2 ECP256_Scatterw5(table, &temp[0], 6); // Discretely save temp[0] to the 6th position in the table. ECP256_PointAdd(&temp[1], &temp[0], pt); // temp[1] = 7G = 6G + G ECP256_Scatterw5(table, &temp[1], 7); // Discretely save temp[1] to the 7th position in the table. ECP256_PointDouble(&temp[2], &temp[2]); // temp[2] = 8G = 4G * 2 ECP256_Scatterw5(table, &temp[2], 8); // Discretely save temp[2] to the 8th position in the table. ECP256_PointDouble(&temp[3], &temp[3]); // temp[3] = 10G = 5G * 2 ECP256_Scatterw5(table, &temp[3], 10); // Discretely save temp[3] to the 10th position in the table. ECP256_PointAdd(&temp[3], &temp[3], pt); // temp[3] = 11G = 10G + G ECP256_Scatterw5(table, &temp[3], 11); // Discretely save temp[3] to the 11th position in the table. ECP256_PointDouble(&temp[0], &temp[0]); // temp[0] = 12G = 6G * 2 ECP256_Scatterw5(table, &temp[0], 12); // Discretely save temp[0] to the 12th position in the table. ECP256_PointAdd(&temp[3], &temp[2], pt); // temp[3] = 9G = 8G + G = temp[2] + pt ECP256_Scatterw5(table, &temp[3], 9); // Discretely save temp[3] to the 9th position in the table. ECP256_PointAdd(&temp[3], &temp[0], pt); // temp[3] = 13G = 12G + G ECP256_Scatterw5(table, &temp[3], 13); // Discretely save temp[3] to the 13th position of the table. ECP256_PointDouble(&temp[1], &temp[1]); // temp[1] = 14G = 7G * 2 ECP256_Scatterw5(table, &temp[1], 14); // Discretely saves temp[1] to the 14th position of the table. ECP256_PointAdd(&temp[0], &temp[1], pt); // temp[0] = 15G = 14G + G = temp[1] + pt ECP256_Scatterw5(table, &temp[0], 15); // Discretely save temp[0] to the 15th position of the table. ECP256_PointDouble(&temp[1], &temp[2]); // temp[1] = 16G = 8G * 2 = temp[2] * 2 ECP256_Scatterw5(table, &temp[1], 16); // Discretely saves temp[1] to the 16th position of the table. } static void CRYPT_ECP256_PointDouble5Times(P256_Point *r) { ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); } // r = k*point // Ensure that m is not empty and is in the range (0, n-1) static void ECP256_WindowMul(P256_Point *r, const BN_BigNum *k, const ECC_Point *point) { uint8_t kOctets[33]; // m big endian byte stream. Apply for 33 bytes and reserve one byte for the following offset. uint32_t mLen = BN_Bytes(k); // Offset during byte stream conversion. Ensure that the valid data of the mOctet is in the upper bits. uint32_t offset = sizeof(kOctets) - mLen; P256_Point table[16]; // The pre-computation window is 2 ^ (5 - 1) = 16 points P256_Point temp; // Apply for temporary space of two points. Coord tempY; (void)BN_Bn2Bin(k, kOctets + offset, &mLen); for (uint32_t i = 0; i < offset; i++) { kOctets[i] = 0; } ECP256_EccPoint2P256Point(&temp, point); ECP256_PreCompWindow(table, &temp); // The first byte is the first two bits of kOctets[1]. // The subscript starts from 0. Therefore, it is bit 0 + 8 and bit 1 + 8 = 9. uint32_t scans = 9; uint32_t index; // position of the byte to be scanned. // Number of bits to be shifted rightwards by the current byte. // Each byte needs to be moved backward by a maximum of 7 bits. uint32_t shift = 7 - (scans % 8); uint32_t w = 5; // Window size = 5 // the recode mask, the window size is 5, thus the value is 6 bits, mask = 0b111111 = 0x3f uint32_t mask = (1u << (w + 1)) - 1; uint32_t wCode = kOctets[1]; wCode = (wCode >> shift) & mask; wCode = Recodew5(wCode); ECP256_Gatherw5(&temp, table, wCode >> 1); (void)memcpy_s(r, sizeof(P256_Point), &temp, sizeof(P256_Point)); // 5 bits is obtained each time. The total number of bits is 256 + 8 (1 byte reserved) = 264 bits. // Therefore, the last time can be scanned to 264-5 = 259 bits. while (scans < 259) { // Double the point for 5 times CRYPT_ECP256_PointDouble5Times(r); scans += w; // Number of bits in the next scan. index = scans / 8; // Location of the byte to be scanned. (1 byte = 8 bits) // Number of bits to be shifted rightwards by the current byte. // Each byte needs to be moved backward by a maximum of 7 bits. (1 byte = 8 bits) shift = 7 - (scans % 8); // Shift the upper byte by 8 bits to left, concatenate the current byte, and then shift to get the current wCode wCode = kOctets[index] | (kOctets[index - 1] << 8); wCode = (wCode >> shift) & mask; wCode = Recodew5(wCode); ECP256_Gatherw5(&temp, table, wCode >> 1); ECP256_Neg(&tempY, &(temp.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(temp.y), &tempY, wCode & 1); ECP256_PointAdd(r, r, &temp); } // Special processing of the last block CRYPT_ECP256_PointDouble5Times(r); wCode = kOctets[32]; // Obtain the last byte, that is, kOctets[32]. wCode = (wCode << 1) & mask; wCode = Recodew5(wCode); ECP256_Gatherw5(&temp, table, wCode >> 1); ECP256_Neg(&tempY, &(temp.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(temp.y), &tempY, wCode & 1); ECP256_PointAdd(r, r, &temp); } static void ComputeK1G(P256_Point *k1G, const BN_BigNum *k1) { uint8_t kOctets[33]; // applies for 33 bytes and reserves one byte for the following offset. 256 bits are 32 bytes. Coord tempY; P256_AffinePoint k1GAffine; const ECP256_TableRow *preCompTable = NULL; // precompute window size is 2 ^(7 - 1) = 64 preCompTable = ECP256_GetPreCompTable(); uint32_t kLen = BN_Bytes(k1); // Offset during byte stream conversion. Ensure that the valid data of the mOctet is in the upper bits. uint32_t offset = sizeof(kOctets) - kLen; (void)BN_Bn2Bin(k1, kOctets + offset, &kLen); for (uint32_t i = 0; i < offset; i++) { kOctets[i] = 0; } uint32_t w = 7; // Window size = 7 // the recode mask, the window size is 7, thus 8 bits are used (one extra bit is the sign bit). // mask = 0b11111111 = 0xff uint32_t mask = (1u << (w + 1)) - 1; uint32_t wCode = (kOctets[32] << 1) & mask; // Last byte kOctets[32] is the least significant 7 bits. wCode = Recodew7(wCode); ECP256_Gatherw7(&k1GAffine, preCompTable[0], wCode >> 1); ECP256_Neg(&tempY, &(k1GAffine.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(k1GAffine.y), &tempY, wCode & 1); // If the x and y coordinates of k1GAffine are both 0, then the infinity is all Fs; otherwise, the infinity is 0. BN_UINT infinity = IsZero(&(k1GAffine.x)) & IsZero(&(k1GAffine.y)); Affine2Jproj(k1G, &k1GAffine, ~infinity); uint32_t scans = 0; uint32_t index, shift; // pre-computation table is table[37][64]. The table is queried every 7 bits (valid bits) of 256 bits. 256/7 = 36.57 for (uint32_t i = 1; i < 37; i++) { scans += w; index = 32 - ((scans - 1) / 8); // The subscript of the last byte is 32, and 8 means 8 bits(1byte) shift = (scans - 1) % 8; // 8 means 8 bits(1byte) wCode = kOctets[index] | (kOctets[index - 1] << 8); // 8 means 8 bits(1byte) wCode = (wCode >> shift) & mask; wCode = Recodew7(wCode); ECP256_Gatherw7(&k1GAffine, preCompTable[i], wCode >> 1); ECP256_Neg(&tempY, &(k1GAffine.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(k1GAffine.y), &tempY, wCode & 1); ECP256_AddAffine(k1G, k1G, &k1GAffine); } } static int32_t ECP256_PointMulCheck(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { bool flag = (para == NULL || r == NULL || k == NULL); uint32_t bits; if (flag) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (pt != NULL) { if (pt->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // Special processing for the infinite point. if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } } bits = BN_Bits(k); if (bits > 256) { // 256 is the number of bits in the curve mode BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN); return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } // if pt == NULL, r = k * G, otherwise r = k * pt int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { P256_Point rTemp; int32_t ret = ECP256_PointMulCheck(para, r, k, pt); if (ret != CRYPT_SUCCESS) { return ret; } if (pt == NULL) { ComputeK1G(&rTemp, k); } else { ECP256_WindowMul(&rTemp, k, pt); } ECP256_P256Point2EccPoint(r, &rTemp); return ret; } static int32_t ECP256_PointMulAddCheck( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { bool flag = (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL); uint32_t bits1, bits2; if (flag) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256 || pt->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // Special processing of the infinite point. if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } bits1 = BN_Bits(k1); bits2 = BN_Bits(k2); if (bits1 > 256 || bits2 > 256) { // 256 is the number of bits in the curve mode BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN); return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } // r = k1 * G + k2 * pt int32_t ECP256_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret = ECP256_PointMulAddCheck(para, r, k1, k2, pt); if (ret != CRYPT_SUCCESS) { return ret; } P256_Point k2Pt; P256_Point k1G; ECP256_WindowMul(&k2Pt, k2, pt); ComputeK1G(&k1G, k1); ECP256_PointAdd(&k1G, &k1G, &k2Pt); ECP256_P256Point2EccPoint(r, &k1G); return ret; } #endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm_ecp_nistp256.c
C
unknown
21,703
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ASM_ECP_NISTP256_H #define ASM_ECP_NISTP256_H #include "hitls_build.h" #ifdef __cplusplus extern "C" { #endif #define P256_BYTES 32 #define P256_SIZE (P256_BYTES / sizeof(BN_UINT)) typedef struct { BN_UINT value[P256_SIZE]; } Coord; // Point Coordinates typedef struct p256_point { Coord x; Coord y; Coord z; } P256_Point; typedef struct p256_pointaffine { Coord x; Coord y; } P256_AffinePoint; #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) typedef P256_AffinePoint ECP256_TableRow[64]; const ECP256_TableRow *ECP256_GetPreCompTable(void); void ECP256_FromMont(Coord *r, const Coord *a); void ECP256_Mul(Coord *r, const Coord *a, const Coord *b); void ECP256_Sqr(Coord *r, const Coord *a); void ECP256_Neg(Coord *r, const Coord *a); void ECP256_OrdMul(Coord *r, const Coord *a, const Coord *b); void ECP256_OrdSqr(Coord *r, const Coord *a, int32_t repeat); void ECP256_PointDouble(P256_Point *r, const P256_Point *a); void ECP256_PointAdd(P256_Point *r, const P256_Point *a, const P256_Point *b); void ECP256_AddAffine(P256_Point *r, const P256_Point *a, const P256_AffinePoint *b); void ECP256_Scatterw5(P256_Point *table, const P256_Point *point, uint32_t index); void ECP256_Gatherw5(P256_Point *point, const P256_Point *table, uint32_t index); void ECP256_Gatherw7(P256_AffinePoint *point, const P256_AffinePoint *table, uint32_t index); #endif /* HITLS_CRYPTO_CURVE_NISTP256_ASM && HITLS_CRYPTO_NIST_ECC_ACCELERATE */ #ifdef __cplusplus } #endif #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm_ecp_nistp256.h
C
unknown
2,116
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_SM2) && defined(HITLS_SIXTY_FOUR_BITS) #include <stdint.h> #include "securec.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "asm_ecp_sm2.h" #define SM2_MASK2 0xff #define WINDOW_SIZE 4 #define PRECOMPUTED_TABLE_SIZE (1 << WINDOW_SIZE) #define WINDOW_HALF_TABLE_SIZE 8 #define SM2_NUMTOOFFSET(num) (((num) < 0) ? (WINDOW_HALF_TABLE_SIZE - 1 - (((num) - 1) >> 1)) : (((num) - 1) >> 1)) static const BN_UINT g_sm2p[SM2_LIMBS] = { 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff }; static const BN_UINT g_sm2ord[SM2_LIMBS] = { 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff }; static const BN_UINT g_one[SM2_LIMBS] = {1, 0, 0, 0}; #define FDIV(uout, uin, xout, xin, div, mod) \ do { \ ECP_Sm2Div##div(uout, uin); \ ECP_Sm2Div##div##Mod##mod(xout, xin); \ } while (0) #define FSUB(uout, uin, xout, xin, mod) \ do { \ ECP_Sm2BnSub(uout, uout, uin); \ ECP_Sm2SubMod##mod(xout, xout, xin); \ } while (0) #define FSUB_DIV(u, v, x1, x2, div, mod) \ do { \ if (IsGreater(u, v) == 1) { \ FSUB(u, v, x1, x2, mod); \ FDIV(u, u, x1, x1, div, mod); \ } else { \ FSUB(v, u, x2, x1, mod); \ FDIV(v, v, x2, x2, div, mod); \ } \ } while (0) static uint32_t IsZero(BN_UINT a) { BN_UINT t = a; t |= (0 - t); t = ~t; t >>= (BN_UNIT_BITS - 1); return (uint32_t)t; } static uint32_t IsZeros(const BN_UINT *a) { BN_UINT res = a[0] ^ 0; for (uint32_t i = 1; i < SM2_LIMBS; i++) { res |= a[i] ^ 0; } return IsZero(res); } static uint32_t IsEqual(const BN_UINT *a, const BN_UINT *b) { BN_UINT res = a[0] ^ b[0]; for (uint32_t i = 1; i < SM2_LIMBS; i++) { res |= a[i] ^ b[i]; } return IsZero(res); } #define IS_ONE(a) IsEqual(a, g_one) static int32_t IsGreater(const BN_UINT *a, const BN_UINT *b) { for (int32_t i = (int32_t)(SM2_LIMBS - 1); i >= 0; --i) { if (a[i] > b[i]) { return 1; } if (a[i] < b[i]) { return -1; } } return 0; } /* * Radix-4 Binary algorithm for modular inversion in Fp * ref. <Ultra High-Speed SM2 ASIC Implementation> */ /* Modular inv: out = in^(-1) mod p */ static void ECP_Sm2ModInverse(BN_UINT *out, const BN_UINT *in) { BN_UINT u[SM2_LIMBS] ALIGN32; BN_UINT v[SM2_LIMBS] ALIGN32; BN_UINT x1[SM2_LIMBS] ALIGN32 = {1, 0, 0, 0}; BN_UINT x2[SM2_LIMBS] ALIGN32 = {0}; BN_UINT c; BN_UINT d; if (IsZeros(in) != 0) { return; } (void)memcpy_s(u, SM2_BYTES_NUM, in, SM2_BYTES_NUM); (void)memcpy_s(v, SM2_BYTES_NUM, g_sm2p, SM2_BYTES_NUM); while (((!IS_ONE(u)) != 0) && ((!IS_ONE(v)) != 0)) { c = u[0] & 0x3; // Use 0x03 to obtain the last two bits. d = v[0] & 0x3; if (c == 0) { FDIV(u, u, x1, x1, 4, P); } else if (d == 0) { FDIV(v, v, x2, x2, 4, P); } else if (c == d) { FSUB_DIV(u, v, x1, x2, 4, P); } else if (c == 2) { // if c == 2 FDIV(u, u, x1, x1, 2, P); FSUB_DIV(u, v, x1, x2, 2, P); } else if (d == 2) { // if d == 2 FDIV(v, v, x2, x2, 2, P); FSUB_DIV(u, v, x1, x2, 2, P); } else { FSUB_DIV(u, v, x1, x2, 2, P); } } if (IS_ONE(u) != 0) { (void)memcpy_s(out, SM2_BYTES_NUM, x1, SM2_BYTES_NUM); } else { (void)memcpy_s(out, SM2_BYTES_NUM, x2, SM2_BYTES_NUM); } } /* Modular inv: out = in^(-1) mod n, where n = ord(p) */ static void ECP_Sm2InvModOrd(BN_UINT *out, const BN_UINT *in) { BN_UINT u[SM2_LIMBS] ALIGN32; BN_UINT v[SM2_LIMBS] ALIGN32; BN_UINT x1[SM2_LIMBS] ALIGN32 = {1, 0, 0, 0}; BN_UINT x2[SM2_LIMBS] ALIGN32 = {0}; BN_UINT c; BN_UINT d; if (IsZeros(in) != 0) { return; } (void)memcpy_s(u, SM2_BYTES_NUM, in, SM2_BYTES_NUM); (void)memcpy_s(v, SM2_BYTES_NUM, g_sm2ord, SM2_BYTES_NUM); while (((!IS_ONE(u)) != 0) && ((!IS_ONE(v)) != 0)) { c = u[0] & 0x3; // Use 0x03 to obtain the last two bits. d = v[0] & 0x3; if (c == 0) { FDIV(u, u, x1, x1, 4, Ord); } else if (d == 0) { FDIV(v, v, x2, x2, 4, Ord); } else if (c == d) { FSUB_DIV(u, v, x1, x2, 4, Ord); } else if (c == 2) { // if c == 2 FDIV(u, u, x1, x1, 2, Ord); FSUB_DIV(u, v, x1, x2, 2, Ord); } else if (d == 2) { // if d == 2 FDIV(v, v, x2, x2, 2, Ord); FSUB_DIV(u, v, x1, x2, 2, Ord); } else { FSUB_DIV(u, v, x1, x2, 2, Ord); } } if (IS_ONE(u) != 0) { (void)memcpy_s(out, SM2_BYTES_NUM, x1, SM2_BYTES_NUM); } else { (void)memcpy_s(out, SM2_BYTES_NUM, x2, SM2_BYTES_NUM); } } static int32_t ECP_Sm2Point2Array(SM2_point *r, const ECC_Point *p) { int32_t ret; uint32_t len = SM2_LIMBS; GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->x, (BN_UINT *)&r->x, &len), ret); GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->y, (BN_UINT *)&r->y, &len), ret); GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->z, (BN_UINT *)&r->z, &len), ret); ERR: return ret; } static int32_t ECP_Sm2Array2Point(ECC_Point *r, const SM2_point *a) { int32_t ret; GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->x, (const BN_UINT *)a->x, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->y, (const BN_UINT *)a->y, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->z, (const BN_UINT *)a->z, SM2_LIMBS), ret); ERR: return ret; } int32_t ECP_Sm2GetAffine(SM2_AffinePoint *r, const SM2_point *a) { BN_UINT zInv3[SM2_LIMBS] ALIGN32 = {0}; BN_UINT zInv2[SM2_LIMBS] ALIGN32 = {0}; if (IsZeros(a->z) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (IsEqual(a->z, g_one) != 0) { (void)memcpy_s(r->x, sizeof(r->x), a->x, sizeof(r->x)); (void)memcpy_s(r->y, sizeof(r->y), a->y, sizeof(r->x)); return CRYPT_SUCCESS; } ECP_Sm2ModInverse(zInv3, a->z); ECP_Sm2Sqr(zInv2, zInv3); ECP_Sm2Mul(r->x, a->x, zInv2); ECP_Sm2Mul(zInv3, zInv3, zInv2); ECP_Sm2Mul(r->y, a->y, zInv3); return CRYPT_SUCCESS; } int32_t ECP_Sm2Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (r == NULL || a == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || a->id != CRYPT_ECC_SM2) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } SM2_point temp = {0}; SM2_AffinePoint rTemp = {0}; int32_t ret; GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&temp, a), ret); GOTO_ERR_IF_EX(ECP_Sm2GetAffine(&rTemp, &temp), ret); GOTO_ERR_IF_EX(BN_Array2BN(&r->x, rTemp.x, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_Array2BN(&r->y, rTemp.y, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_SetLimb(&r->z, 1), ret); ERR: return ret; } int32_t ECP_Sm2PointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { return ECP_NistPointDouble(para, r, a); } int32_t ECP_Sm2PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { return ECP_NistPointAddAffine(para, r, a, b); } static void ECP_Sm2ScalarMulG(SM2_point *r, const BN_UINT *k) { const BN_UINT *precomputed = ECP_Sm2Precomputed(); uint32_t index; for (int32_t i = SM2_BYTES_NUM - 1; i >= 0; --i) { index = (k[i / sizeof(BN_UINT)] >> (SM2_BITSOFBYTES * (i % sizeof(BN_UINT)))) & SM2_MASK2; #ifndef HITLS_SM2_PRECOMPUTE_512K_TBL ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); #endif if (index != 0) { #ifdef HITLS_SM2_PRECOMPUTE_512K_TBL index = index + i * SM2_BITS; #endif index = index * SM2_BITSOFBYTES; ECP_Sm2PointAddAffineMont(r, r, (const SM2_AffinePoint *)&precomputed[index]); } } } static int32_t ECP_Sm2WnafMul(SM2_point *r, const BN_BigNum *k, SM2_point p) { ReCodeData *recodeK = ECC_ReCodeK(k, WINDOW_SIZE); if (recodeK == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } SM2_point doublePoint; SM2_point precomputed[PRECOMPUTED_TABLE_SIZE] ALIGN64; ECP_Sm2ToMont(precomputed[0].x, p.x); ECP_Sm2ToMont(precomputed[0].y, p.y); ECP_Sm2ToMont(precomputed[0].z, p.z); ECP_Sm2PointDoubleMont(&doublePoint, &precomputed[0]); (void)memcpy_s(precomputed[WINDOW_HALF_TABLE_SIZE].x, SM2_BYTES_NUM, precomputed[0].x, SM2_BYTES_NUM); ECP_Sm2Neg(precomputed[WINDOW_HALF_TABLE_SIZE].y, precomputed[0].y); (void)memcpy_s(precomputed[WINDOW_HALF_TABLE_SIZE].z, SM2_BYTES_NUM, precomputed[0].z, SM2_BYTES_NUM); for (uint32_t i = 1; i < WINDOW_HALF_TABLE_SIZE; i++) { ECP_Sm2PointAddMont(&precomputed[i], &precomputed[i - 1], &doublePoint); // 1, 3, 5, 7, 9, 11, 13, 15 (void)memcpy_s(precomputed[i + WINDOW_HALF_TABLE_SIZE].x, SM2_BYTES_NUM, precomputed[i].x, SM2_BYTES_NUM); ECP_Sm2Neg(precomputed[i + WINDOW_HALF_TABLE_SIZE].y, precomputed[i].y); (void)memcpy_s(precomputed[i + WINDOW_HALF_TABLE_SIZE].z, SM2_BYTES_NUM, precomputed[i].z, SM2_BYTES_NUM); } int8_t index = SM2_NUMTOOFFSET(recodeK->num[0]); (void)memcpy_s(r, sizeof(SM2_point), &precomputed[index], sizeof(SM2_point)); uint32_t w = recodeK->wide[0]; while (w != 0) { ECP_Sm2PointDoubleMont(r, r); w--; } for (uint32_t i = 1; i < recodeK->size; i++) { index = SM2_NUMTOOFFSET(recodeK->num[i]); ECP_Sm2PointAddMont(r, r, &precomputed[index]); w = recodeK->wide[i]; while (w != 0) { ECP_Sm2PointDoubleMont(r, r); w--; } } ECC_ReCodeFree(recodeK); return CRYPT_SUCCESS; } int32_t ECP_Sm2PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *scalar, const ECC_Point *pt) { if (para == NULL || r == NULL || scalar == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || (pt != NULL && (pt->id != CRYPT_ECC_SM2))) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (pt != NULL && BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (BN_IsZero(scalar)) { return BN_Zeroize(&r->z); } int32_t ret; BN_UINT k[SM2_LIMBS] = {0}; uint32_t klen = SM2_LIMBS; SM2_point re = {0}; SM2_point sm2Pt = {0}; GOTO_ERR_IF_EX(BN_Bn2U64Array(scalar, k, &klen), ret); if (pt == NULL) { // calculate k*G ECP_Sm2ScalarMulG(&re, k); } else { // point 2 affine GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&sm2Pt, pt), ret); GOTO_ERR_IF_EX(ECP_Sm2WnafMul(&re, scalar, sm2Pt), ret); } ECP_Sm2FromMont(re.x, re.x); ECP_Sm2FromMont(re.y, re.y); ECP_Sm2FromMont(re.z, re.z); // SM2_point 2 ECC_Point GOTO_ERR_IF_EX(ECP_Sm2Array2Point(r, &re), ret); ERR: return ret; } int32_t ECP_Sm2PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { return ECP_Sm2PointMul(para, r, k, pt); } int32_t ECP_Sm2OrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (BN_IsZero(a)) { BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_DIVISOR_ZERO); return CRYPT_BN_ERR_DIVISOR_ZERO; } int32_t ret = BN_Extend(r, SM2_LIMBS); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ECP_Sm2InvModOrd(r->data, a->data); r->size = SM2_LIMBS; BN_FixSize(r); if (BN_IsZero(r)) { BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_NO_INVERSE); return CRYPT_BN_ERR_NO_INVERSE; } return CRYPT_SUCCESS; } static int32_t ECP_Sm2PointMulAddCheck( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { bool flag = (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL); uint32_t bits1; uint32_t bits2; if (flag) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || pt->id != CRYPT_ECC_SM2) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // Special processing of the infinite point. if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } bits1 = BN_Bits(k1); bits2 = BN_Bits(k2); if (bits1 > SM2_BITS || bits2 > SM2_BITS) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN); return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } // r = k1 * G + k2 * pt int32_t ECP_Sm2PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret = ECP_Sm2PointMulAddCheck(para, r, k1, k2, pt); if (ret != CRYPT_SUCCESS) { return ret; } BN_UINT k1Uint[SM2_LIMBS] = {0}; uint32_t k1Len = SM2_LIMBS; SM2_point k1G = {0}; SM2_point k2Pt = {0}; SM2_point sm2Pt = {0}; GOTO_ERR_IF_EX(BN_Bn2U64Array(k1, k1Uint, &k1Len), ret); GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&sm2Pt, pt), ret); // k1 * G ECP_Sm2ScalarMulG(&k1G, k1Uint); // k2 * pt GOTO_ERR_IF_EX(ECP_Sm2WnafMul(&k2Pt, k2, sm2Pt), ret); ECP_Sm2PointAddMont(&k2Pt, &k1G, &k2Pt); ECP_Sm2FromMont(k2Pt.x, k2Pt.x); ECP_Sm2FromMont(k2Pt.y, k2Pt.y); ECP_Sm2FromMont(k2Pt.z, k2Pt.z); GOTO_ERR_IF_EX(ECP_Sm2Array2Point(r, &k2Pt), ret); ERR: return ret; } #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm_ecp_sm2.c
C
unknown
15,270
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ASM_ECP_SM2_H #define ASM_ECP_SM2_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE_SM2 #include <stdint.h> #include "crypt_bn.h" #ifdef __cplusplus extern "C" { #endif #define SM2_BITS 256 #define SM2_BITSOFBYTES 8 #define SM2_BYTES_NUM 32 #define SM2_LIMBS (SM2_BYTES_NUM / sizeof(BN_UINT)) /* = 4 or 8 */ typedef struct SM2_point { BN_UINT x[SM2_LIMBS]; BN_UINT y[SM2_LIMBS]; BN_UINT z[SM2_LIMBS]; } SM2_point; typedef struct SM2_pointaffine { BN_UINT x[SM2_LIMBS]; BN_UINT y[SM2_LIMBS]; } SM2_AffinePoint; /* Right shift: a >> 1 */ void ECP_Sm2BnRshift1(BN_UINT *a); /* Finite field operations */ /* Modular div by 2: r = a/2 mod p */ void ECP_Sm2DivBy2(BN_UINT *r, const BN_UINT *a); /* Modular add: r = a+b mod p */ void ECP_Sm2AddModP(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular add: r = a+b mod n, where n = ord(p) */ void ECP_Sm2AddModOrd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular sub: r = a-b mod p */ void ECP_Sm2SubModP(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular sub: r = a-b mod n, where n = ord(p) */ void ECP_Sm2SubModOrd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular mul by 3: r = 3*a mod p */ void ECP_Sm2MulBy3(BN_UINT *r, const BN_UINT *a); /* Modular mul: r = a*b mod p */ void ECP_Sm2Mul(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular sqr: r = a^2 mod p */ void ECP_Sm2Sqr(BN_UINT *r, const BN_UINT *a); /* sub: r = p - b */ void ECP_Sm2Neg(BN_UINT *r, const BN_UINT *b); const BN_UINT *ECP_Sm2Precomputed(void); /* Right shift 1: r = a >> 1 */ void ECP_Sm2Div2(BN_UINT *r, BN_UINT *a); /* Right shift 2: r = a >> 2 */ void ECP_Sm2Div4(BN_UINT *r, BN_UINT *a); /* Sub: r = a - b */ void ECP_Sm2BnSub(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Add: r = a + b */ void ECP_Sm2BnAdd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Finite field operations */ /* Modular div by 2: r = a/2 mod p */ void ECP_Sm2Div2ModP(BN_UINT *r, const BN_UINT *a); /* Modular div by 2: r = a/2 mod n, where n = ord(p) */ void ECP_Sm2Div2ModOrd(BN_UINT *r, const BN_UINT *a); /* Modular div by 4: r = a/4 mod p */ void ECP_Sm2Div4ModP(BN_UINT *r, BN_UINT *a); /* Modular div by 4: r = a/4 mod n, where n = ord(p) */ void ECP_Sm2Div4ModOrd(BN_UINT *r, const BN_UINT *a); /* Convert to Montgomery domain */ void ECP_Sm2ToMont(BN_UINT *r, const BN_UINT *a); /* Convert from Montgomery domain */ void ECP_Sm2FromMont(BN_UINT *r, const BN_UINT *a); /* Point double in Montgomery domain: r <- a + a */ void ECP_Sm2PointDoubleMont(SM2_point *r, const SM2_point *a); /* Point add affine in Montgomery domain: R <- a + b */ void ECP_Sm2PointAddAffineMont(SM2_point *r, const SM2_point *a, const SM2_AffinePoint *b); /* Point add in Montgomery domain: r <- a + b */ void ECP_Sm2PointAddMont(SM2_point *r, const SM2_point *a, const SM2_point *b); #ifdef __cplusplus } #endif #endif #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/asm_ecp_sm2.h
C
unknown
3,462
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" #include "crypt_ecc.h" ECC_Point *ECC_NewPoint(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } int32_t ret; uint32_t words = BITS_TO_BN_UNIT(BN_Bits(para->p)); ECC_Point *pt = BSL_SAL_Calloc(sizeof(ECC_Point), 1u); if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } pt->id = para->id; GOTO_ERR_IF(BN_Extend(&pt->x, words), ret); GOTO_ERR_IF(BN_Extend(&pt->y, words), ret); GOTO_ERR_IF(BN_Extend(&pt->z, words), ret); return pt; ERR: ECC_FreePoint(pt); return NULL; } void ECC_FreePoint(ECC_Point *pt) { if (pt == NULL) { return; } BSL_SAL_CleanseData((void *)(pt->x.data), pt->x.size * sizeof(BN_UINT)); BSL_SAL_FREE(pt->x.data); BSL_SAL_CleanseData((void *)(pt->y.data), pt->y.size * sizeof(BN_UINT)); BSL_SAL_FREE(pt->y.data); BSL_SAL_CleanseData((void *)(pt->z.data), pt->z.size * sizeof(BN_UINT)); BSL_SAL_FREE(pt->z.data); BSL_SAL_Free(pt); } void ECC_SetLibCtx(void *libCtx, ECC_Para *para) { para->libCtx = libCtx; } int32_t ECC_CopyPoint(ECC_Point *dst, const ECC_Point *src) { if (dst == NULL || src == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (dst->id != src->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } int32_t ret; GOTO_ERR_IF(BN_Copy(&dst->x, &src->x), ret); GOTO_ERR_IF(BN_Copy(&dst->y, &src->y), ret); GOTO_ERR_IF(BN_Copy(&dst->z, &src->z), ret); ERR: return ret; } ECC_Point *ECC_DupPoint(const ECC_Point *pt) { if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } int32_t ret; ECC_Point *newPt = BSL_SAL_Calloc(sizeof(ECC_Point), 1u); if (newPt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } newPt->id = pt->id; GOTO_ERR_IF(BN_Extend(&newPt->x, pt->x.room), ret); GOTO_ERR_IF(BN_Extend(&newPt->y, pt->y.room), ret); GOTO_ERR_IF(BN_Extend(&newPt->z, pt->z.room), ret); (void)BN_Copy(&newPt->x, &pt->x); (void)BN_Copy(&newPt->y, &pt->y); (void)BN_Copy(&newPt->z, &pt->z); return newPt; ERR: ECC_FreePoint(newPt); return NULL; } // Convert to Cartesian coordinates int32_t ECC_GetPoint(const ECC_Para *para, ECC_Point *pt, CRYPT_Data *x, CRYPT_Data *y) { int32_t ret; uint32_t pBytes; if (para == NULL || pt == NULL || x == NULL || x->data == NULL || ((y != NULL) && (y->data == NULL))) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } pBytes = BN_Bytes(para->p); if ((x->len < pBytes) || ((y != NULL) && (y->len < pBytes))) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_BUFF_LEN_NOT_ENOUGH); return CRYPT_ECC_BUFF_LEN_NOT_ENOUGH; } if (BN_IsZero(&pt->z)) { // infinity point BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (para->method->point2Affine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret); GOTO_ERR_IF(BN_Bn2BinFixZero(&pt->x, x->data, pBytes), ret); x->len = pBytes; if (y != NULL) { GOTO_ERR_IF(BN_Bn2BinFixZero(&pt->y, y->data, pBytes), ret); y->len = pBytes; } ERR: return ret; } int32_t ECC_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != a->id || para->id != r->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&a->z)) { // infinity point BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (para->method->point2Affine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } int32_t ret = para->method->point2Affine(para, r, a); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t ECC_GetPoint2Bn(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x, BN_BigNum *y) { int32_t ret; GOTO_ERR_IF(ECC_GetPointDataX(para, pt, x), ret); if (y != NULL) { GOTO_ERR_IF(BN_Copy(y, &pt->y), ret); } ERR: return ret; } int32_t ECC_GetPointDataX(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x) { int32_t ret; if (x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } GOTO_ERR_IF(ECP_PointAtInfinity(para, pt), ret); if (para->method->point2Affine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret); GOTO_ERR_IF(BN_Copy(x, &pt->x), ret); ERR: return ret; } ECC_Point *ECC_GetGFromPara(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } ECC_Point *pt = ECC_NewPoint(para); if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)BN_Copy(&pt->x, para->x); (void)BN_Copy(&pt->y, para->y); (void)BN_SetLimb(&pt->z, 1); return pt; } int32_t ECC_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->pointMulAdd == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } return para->method->pointMulAdd(para, r, k1, k2, pt); } int32_t ECC_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->pointMul == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } return para->method->pointMul(para, r, k, pt); } int32_t ECC_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b) { // Currently, only prime number curves are supported. Other curves need to be expanded. return ECP_PointCmp(para, a, b); } ECC_Para *ECC_DupPara(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } ECC_Para *newPara = ECC_NewPara(para->id); if (newPara != NULL) { newPara->libCtx = para->libCtx; } return newPara; } uint32_t ECC_ParaBits(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_Bits(para->p); } BN_BigNum *ECC_GetParaH(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->h); } BN_BigNum *ECC_GetParaN(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->n); } BN_BigNum *ECC_GetParaA(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } BN_BigNum *dupA = BN_Dup(para->a); if (dupA == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (para->method->bnMontDec != NULL) { para->method->bnMontDec(dupA, para->montP); } return dupA; ERR: BN_Destroy(dupA); return NULL; } BN_BigNum *ECC_GetParaB(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } BN_BigNum *dupB = BN_Dup(para->b); if (dupB == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (para->method->bnMontDec != NULL) { para->method->bnMontDec(dupB, para->montP); } return dupB; ERR: BN_Destroy(dupB); return NULL; } BN_BigNum *ECC_GetParaX(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->x); } BN_BigNum *ECC_GetParaY(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->y); } int32_t ECC_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format) { // Currently, only prime number curves are supported. Other curves need to be expanded. return ECP_EncodePoint(para, pt, data, dataLen, format); } int32_t ECC_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen) { // Currently, only prime number curves are supported. Other curves need to be expanded. return ECP_DecodePoint(para, pt, data, dataLen); } int32_t ECC_PointCheck(const ECC_Point *pt) { if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } return CRYPT_SUCCESS; } int32_t ECC_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->modOrdInv == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } return para->method->modOrdInv(para, r, a); } int32_t ECC_PointToMont(const ECC_Para *para, ECC_Point *pt, BN_Optimizer *opt) { if (para == NULL || pt == NULL || opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->bnMontEnc == NULL) { return CRYPT_SUCCESS; } int32_t ret; GOTO_ERR_IF(para->method->bnMontEnc(&pt->x, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(&pt->y, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(&pt->z, para->montP, opt, false), ret); ERR: return ret; } void ECC_PointFromMont(const ECC_Para *para, ECC_Point *r) { if (para == NULL || r == NULL || para->method->bnMontDec == NULL) { return; } para->method->bnMontDec(&r->x, para->montP); para->method->bnMontDec(&r->y, para->montP); para->method->bnMontDec(&r->z, para->montP); } /* Prime curve, point addition r = a + b Calculation formula: X3 = (Y2*Z1^3-Y1)^2 - (X2*Z1^2-X1)^2 * (X1+X2*Z1^2) Y3 = (Y2*Z1^3-Y1) * (X1*(X2*Z1^2-X1)^2-X3) - Y1 * (X2*Z1^2-X1)^3 Z3 = (X2*Z1^2-X1) * Z1 */ int32_t ECC_PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { int32_t ret; if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->pointAddAffine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } BN_Optimizer *opt = BN_OptimizerCreate(); ECC_Point *affineb = ECC_NewPoint(para); ECC_Point *dupA = ECC_DupPoint(a); if (affineb == NULL || opt == NULL || dupA == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } GOTO_ERR_IF(ECC_Point2Affine(para, affineb, b), ret); GOTO_ERR_IF(ECC_PointToMont(para, dupA, opt), ret); GOTO_ERR_IF(ECC_PointToMont(para, affineb, opt), ret); GOTO_ERR_IF(para->method->pointAddAffine(para, r, dupA, affineb), ret); ECC_PointFromMont(para, r); ERR: BN_OptimizerDestroy(opt); ECC_FreePoint(dupA); ECC_FreePoint(affineb); return ret; } typedef struct { uint32_t ecKeyLen; uint32_t secBits; } ComparableStrengths; /* See the standard document https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf Table 2: Comparable strengths */ const ComparableStrengths g_strengthsTable[] = { {512, 256}, {384, 192}, {256, 128}, {224, 112}, {160, 80} }; int32_t ECC_GetSecBits(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } uint32_t bits = BN_Bits(para->n); for (size_t i = 0; i < (sizeof(g_strengthsTable) / sizeof(g_strengthsTable[0])); i++) { if (bits >= g_strengthsTable[i].ecKeyLen) { return g_strengthsTable[i].secBits; } } return bits / 2; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecc.c
C
unknown
13,714
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECC_LOCAL_H #define ECC_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_ecc.h" #include "crypt_bn.h" #ifdef __cplusplus extern "C" { #endif #define ECC_MAX_BIT_LEN 521 #define PRE_COMPUTE_WINDOW 5 // Default Window Size #define PRE_COMPUTE_MAX_TABLELEN (1 << 5) // Maximum specifications of the pre-calculation table /** * Elliptic Curve Implementation Method */ typedef struct { // Calculate r = k1 * G + k2 * pt int32_t (*pointMulAdd)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); // Calculate r = k * pt. If pt is null, calculate r = k * G. This is the ConstTime processing function. int32_t (*pointMul)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); // Calculate r = k * pt. If pt is null, calculate r = k * G int32_t (*pointMulFast)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); // point addition r = a + b, a all can be the jacobi coordinate, b must be an affine point int32_t (*pointAddAffine)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); // point addition r = a + b, a, b all can be the jacobi coordinate. int32_t (*pointAdd)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); // point double r = a + a, a can be the jacobi coordinate. int32_t (*pointDouble)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); // point Multi-double Calculate r = (2^m)*a, a can be the jacobi coordinate. int32_t (*pointMultDouble)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); // Module inverse int32_t (*modInv)(BN_BigNum *r, const BN_BigNum *a, const BN_BigNum *p, BN_Optimizer *opt); // Convert points to affine coordinates based on the given module inverse information. int32_t (*point2AffineWithInv)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const BN_BigNum *inv); // Convert the point information to affine coordinates. int32_t (*point2Affine)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); // Calculate r = (a*b) % mod int32_t (*bnModNistEccMul)(BN_BigNum *r, const BN_BigNum *a, const BN_BigNum *b, void *mod, BN_Optimizer *opt); // Calculate r = (a^2) % mod int32_t (*bnModNistEccSqr)(BN_BigNum *r, const BN_BigNum *a, void *mod, BN_Optimizer *opt); // Inverse mode order. int32_t (*modOrdInv)(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); // convert date to Montgomery form int32_t (*bnMontEnc)(BN_BigNum *r, BN_Mont *mont, BN_Optimizer *opt, bool consttime); // convert Montgomery form to common form void (*bnMontDec)(BN_BigNum *r, BN_Mont *mont); } ECC_Method; /** * Elliptic Curve Point Information */ struct EccPointInfo { BN_BigNum x; BN_BigNum y; BN_BigNum z; CRYPT_PKEY_ParaId id; }; /** * Elliptic curve parameter information */ struct EccPara { BN_BigNum *p; BN_BigNum *a; BN_BigNum *b; BN_BigNum *n; BN_BigNum *h; BN_BigNum *x; BN_BigNum *y; // Currently, the 5-bit window is used. Only odd multiple points are calculated. // The total number of pre-calculated data is (2 ^ 5)/2, that is 16 points. ECC_Point *tableG[16]; const ECC_Method *method; CRYPT_PKEY_ParaId id; BN_Mont *montP; void *libCtx; }; /** * @ingroup ecc * @brief Check whether the checkpoint is at infinity. * * @param para [IN] Curve parameters * @param pt [IN] Point information * * @retval CRYPT_SUCCESS succeeded, indicating that the point is not at infinity. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointAtInfinity(const ECC_Para *para, const ECC_Point *pt); /** * @ingroup ecc * @brief Check whether the point is on the curve. * The determined point must be on the Cartesian coordinate, which is used to check the validity of the point input. * * @param para [IN] Curve parameters * @param pt [IN] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointOnCurve(const ECC_Para *para, const ECC_Point *pt); /** * @ingroup ecc * @brief Add salt to the pt point and add random z information. * * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointBlind(const ECC_Para *para, ECC_Point *pt); /** * @ingroup ecc * @brief Convert the point information pt to the affine coordinate system and synchronize the data to r. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * @ingroup ecc * @brief Converts all point information on pt to affine coordinate system, * which is used for the coordinate system conversion of the pre-computation table. * * @attention pt[0] cannot be an infinite point. * * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * @param ptNums [IN] Number of pts * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Points2Affine(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums); /** * @ingroup ecc * @brief Calculated r = -a * * @attention point a must be a point in the Cartesian coordinate system * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointInvertAtAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * @ingroup ecc * @brief Convert the point information pt to the affine coordinate system and refresh the data to r. * The inverse information of z is provided by the user. * * @attention The validity of inv is guaranteed by the user. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * @param inv [IN] inverse information of z * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Point2AffineWithInv( const ECC_Para *para, ECC_Point *r, const ECC_Point *pt, const BN_BigNum *inv); /** * @ingroup ecc * @brief Calculate r = k1 * G + k2 * pt * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param k1 [IN] Scalar 1 * @param k2 [IN] Scalar 2 * @param pt [IN] Point data * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointMulAdd( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @ingroup ecc * @brief Check whether a is consistent with b. * * @param para [IN] Curve parameter information * @param a [IN] Input point information * @param b [IN] Input point information * * @retval CRYPT_SUCCESS The two points are the same. * @retval CRYPT_ECC_POINT_NOT_EQUAL The two points are different. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G * The pre-computation table under para will be updated. * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar * @param pt [IN] Point data, which can be set to NULL * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @ingroup ecc * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G * The pre-computation table under para will be updated. * Non-consttime calculation * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar * @param pt [IN] Point data, which can be set to NULL * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @ingroup ecc * @brief Obtaining a prime number curve (p + 1)/2 * * @param p [IN] Input module * * @retval non-NULL succeeded. * @retval NULL failed */ BN_BigNum *ECP_HalfPGet(const BN_BigNum *p); /** * @ingroup ecc * @brief Search implementation method by curve ID * * @param id [IN] Curve enumeration * * @retval non-NULL succeeded. * @retval NULL failed */ const ECC_Method *ECC_FindMethod(CRYPT_PKEY_ParaId id); /** * @ingroup ecc * @brief nist Calculation of multiplication(double) of points of prime curve: r = a + a * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * @ingroup ecc * @brief nist Calculation of multi-double of points of prime curve: r = (2^m)*a * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information * @param m [IN] Exponential information of point multiplication scalar * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointMultDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); /** * @ingroup ecc * @brief nist Calculation of multiplication(double) of points of prime curve: r = a + b * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information, a can be the jacobi coordinate. * @param b [IN] Input point information, b must be the affine coordinate. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief nist Calculation of multiplication(double) of points of prime curve: r = a + b * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information, a can be the jacobi coordinate. * @param b [IN] Input point information, b can be the jacobi coordinate. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointAdd(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief Convert the point to the affine coordinate and encode the point information as a data stream. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point data * @param data [OUT] data stream * @param dataLen [IN/OUT] The input is the buff length of data and the output is the valid length of data. * @param format [IN] Encoding format * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format); /** * @ingroup ecc * @brief Encode the data stream into point information. * * @param para [IN] Curve parameter information * @param pt [OUT] Point data * @param data [IN] data stream * @param dataLen [IN] data stream length * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen); /** * @brief Calculate r = 1/a mod para->n * * @param para [IN] Curve parameter information * @param r [OUT] Output modulus inverse value * @param a [IN] BigNum that needs to be inverted. * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); #ifdef HITLS_CRYPTO_CURVE_MONT /** * The nist curve is based on Montgomery's calculation of double points. * r = a + a */ int32_t ECP_NistPointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * The nist curve is based on Montgomery's calculation of multi-double points. * r = m * (a + a) */ int32_t ECP_NistPointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); /** * The nist curve is based on Montgomery's calculation of add points. * r = a + b, b must be an affine point. */ int32_t ECP_NistPointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The nist curve is based on Montgomery's calculation of add points. * r = a + b */ int32_t ECP_NistPointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The nist curve is based on Montgomery's calculation of turn an point to an affine point. * r = a -> affine a */ int32_t ECP_Point2AffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * The nist curve is based on Montgomery's calculation of turn an point to an affine point. * r = a -> affine a */ int32_t ECP_PrimePointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * The prime curve is based on Montgomery's calculation of multi-double points. * r = m * (a + a) */ int32_t ECP_PrimePointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); /** * The prime curve is based on Montgomery's calculation of add points. * r = a + b, b must be an affine point. */ int32_t ECP_PrimePointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The prime curve is based on Montgomery's calculation of add points. * r = a + b */ int32_t ECP_PrimePointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The prime curve is based on Montgomery's calculation of k * pt. * The implementation is based on the Montgomery ladder. */ int32_t ECP_PointMulMont(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); #endif // HITLS_CRYPTO_CURVE_MONT #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // ECC_LOCAL_H
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecc_local.h
C
unknown
15,618
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "ecc_local.h" #include "bsl_err_internal.h" #include "ecp_nistp224.h" #include "ecp_nistp256.h" #include "ecp_nistp521.h" #include "ecp_sm2.h" typedef struct { uint32_t id; const ECC_Method *ecMeth; } ECC_MethodMap; #if defined(HITLS_SIXTY_FOUR_BITS) #if (((defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP521)) && \ !defined(HITLS_CRYPTO_NIST_USE_ACCEL)) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || \ (defined(HITLS_CRYPTO_CURVE_NISTP256) && (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) || \ (!defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE))) && (!defined(HITLS_CRYPTO_NIST_USE_ACCEL)))) static const ECC_Method EC_METHOD_NIST = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMul, .pointMulFast = ECP_PointMulFast, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #endif // HITLS_SIXTY_FOUR_BITS #ifdef HITLS_CRYPTO_CURVE_MONT_NIST static const ECC_Method EC_METHOD_NIST_MONT = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMulMont, .pointMulFast = ECP_PointMulFast, .pointDouble = ECP_NistPointDoubleMont, .pointMultDouble = ECP_NistPointMultDoubleMont, .modInv = BN_ModInv, .point2Affine = ECP_Point2AffineMont, .bnModNistEccMul = BN_EcPrimeMontMul, .bnModNistEccSqr = BN_EcPrimeMontSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAddMont, .pointAddAffine = ECP_NistPointAddAffineMont, .bnMontEnc = BnMontEnc, .bnMontDec = BnMontDec, }; #endif // HITLS_CRYPTO_CURVE_MONT_NIST #ifdef HITLS_CRYPTO_CURVE_SM2_ASM // method implementation of SM2 static const ECC_Method EC_METHOD_SM2_ASM = { .pointMulAdd = ECP_Sm2PointMulAdd, .pointMul = ECP_Sm2PointMul, .pointMulFast = ECP_Sm2PointMulFast, .pointAddAffine = ECP_Sm2PointAddAffine, .pointDouble = ECP_Sm2PointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP_Sm2Point2Affine, .bnModNistEccMul = BN_ModSm2EccMul, .bnModNistEccSqr = BN_ModSm2EccSqr, .modOrdInv = ECP_Sm2OrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #if defined(HITLS_CRYPTO_CURVE_SM2) && !defined(HITLS_CRYPTO_CURVE_SM2_ASM) && defined(HITLS_SIXTY_FOUR_BITS) static const ECC_Method EC_METHOD_SM2_NIST = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMul, .pointMulFast = ECP_PointMulFast, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP_Point2Affine, .bnModNistEccMul = BN_ModSm2EccMul, .bnModNistEccSqr = BN_ModSm2EccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || \ defined(HITLS_CRYPTO_CURVE_BP512R1) // Montgomery Ladder Optimization for General Curves in Prime Domain static const ECC_Method EC_METHOD_PRIME_MONT = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMulMont, .pointDouble = ECP_PrimePointDoubleMont, .pointMulFast = ECP_PointMulFast, .pointMultDouble = ECP_PrimePointMultDoubleMont, .modInv = BN_ModInv, .point2Affine = ECP_Point2AffineMont, .bnModNistEccMul = BN_EcPrimeMontMul, .bnModNistEccSqr = BN_EcPrimeMontSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_PrimePointAddMont, .pointAddAffine = ECP_PrimePointAddAffineMont, .bnMontEnc = BnMontEnc, .bnMontDec = BnMontDec, }; #endif #ifdef HITLS_CRYPTO_NIST_USE_ACCEL #ifdef HITLS_CRYPTO_CURVE_NISTP224 static const ECC_Method EC_METHOD_NIST_P224 = { .pointMulAdd = ECP224_PointMulAdd, .pointMul = ECP224_PointMul, .pointMulFast = ECP224_PointMul, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP224_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 static const ECC_Method EC_METHOD_NIST_P521 = { .pointMulAdd = ECP521_PointMulAdd, .pointMul = ECP521_PointMul, .pointMulFast = ECP521_PointMul, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP521_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #endif // HITLS_CRYPTO_NIST_USE_ACCEL #ifdef HITLS_CRYPTO_CURVE_NISTP256 #if ((defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)) || \ (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_USE_ACCEL))) static const ECC_Method EC_METHOD_NIST_P256 = { .pointMulAdd = ECP256_PointMulAdd, .pointMul = ECP256_PointMul, .pointMulFast = ECP256_PointMul, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP256_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP256_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #endif static const ECC_MethodMap EC_METHODS[] = { // p224 #ifdef HITLS_CRYPTO_CURVE_NISTP224 #ifdef HITLS_CRYPTO_NIST_USE_ACCEL { CRYPT_ECC_NISTP224, &EC_METHOD_NIST_P224 }, // Depends on uint128. #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP224, &EC_METHOD_NIST }, // Common nist cal + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP224, &EC_METHOD_NIST_MONT }, #endif #endif // p256 #ifdef HITLS_CRYPTO_CURVE_NISTP256 #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) { CRYPT_ECC_NISTP256, &EC_METHOD_NIST_P256 }, // The ECC assembly optimization does not depend on uint128. #elif (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)) { CRYPT_ECC_NISTP256, &EC_METHOD_NIST_P256 }, // Non-assembled ECC optimization based on uint128 #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP256, &EC_METHOD_NIST }, // Common nist calculation + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP256, &EC_METHOD_NIST_MONT }, #endif #endif // p384 #ifdef HITLS_CRYPTO_CURVE_NISTP384 #if defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP384, &EC_METHOD_NIST }, // Common nist calculation + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP384, &EC_METHOD_NIST_MONT }, #endif #endif // p521 #ifdef HITLS_CRYPTO_CURVE_NISTP521 #ifdef HITLS_CRYPTO_NIST_USE_ACCEL { CRYPT_ECC_NISTP521, &EC_METHOD_NIST_P521 }, // Non-assembly optimization, depending on uint128 #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP521, &EC_METHOD_NIST }, // nist calculation + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP521, &EC_METHOD_NIST_MONT }, #endif #endif // bp256 #ifdef HITLS_CRYPTO_CURVE_BP256R1 { CRYPT_ECC_BRAINPOOLP256R1, &EC_METHOD_PRIME_MONT }, #endif // bp384 #ifdef HITLS_CRYPTO_CURVE_BP384R1 { CRYPT_ECC_BRAINPOOLP384R1, &EC_METHOD_PRIME_MONT }, #endif // bp512 #ifdef HITLS_CRYPTO_CURVE_BP512R1 { CRYPT_ECC_BRAINPOOLP512R1, &EC_METHOD_PRIME_MONT }, #endif #ifdef HITLS_CRYPTO_CURVE_SM2 #ifdef HITLS_CRYPTO_CURVE_SM2_ASM { CRYPT_ECC_SM2, &EC_METHOD_SM2_ASM }, #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_SM2, &EC_METHOD_SM2_NIST }, #else { CRYPT_ECC_SM2, &EC_METHOD_NIST_MONT }, #endif #endif }; const ECC_Method *ECC_FindMethod(CRYPT_PKEY_ParaId id) { for (uint32_t i = 0; i < sizeof(EC_METHODS) / sizeof(EC_METHODS[0]); i++) { if (EC_METHODS[i].id == id) { return EC_METHODS[i].ecMeth; } } return NULL; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecc_method.c
C
unknown
9,358
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" #include "crypt_types.h" #include "crypt_params_key.h" #include "crypt_ecc_pkey.h" typedef struct { const uint8_t *data; uint32_t dataLen; } ECC_ReadData; typedef struct { ECC_ReadData p; ECC_ReadData a; ECC_ReadData b; ECC_ReadData n; ECC_ReadData h; ECC_ReadData x; ECC_ReadData y; } CURVE_Para; #if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || \ defined(HITLS_CRYPTO_CURVE_SM2) static const uint8_t NIST_P_H[] = { 0x01 }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP224 static const uint8_t NIST_P224_P[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }; static const uint8_t NIST_P224_A[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe }; static const uint8_t NIST_P224_B[] = { 0xb4, 0x05, 0x0a, 0x85, 0x0c, 0x04, 0xb3, 0xab, 0xf5, 0x41, 0x32, 0x56, 0x50, 0x44, 0xb0, 0xb7, 0xd7, 0xbf, 0xd8, 0xba, 0x27, 0x0b, 0x39, 0x43, 0x23, 0x55, 0xff, 0xb4 }; static const uint8_t NIST_P224_X[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21 }; static const uint8_t NIST_P224_Y[] = { 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34 }; static const uint8_t NIST_P224_N[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP256 static const uint8_t NIST_P256_P[] = { 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_P256_A[] = { 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_P256_B[] = { 0x5a, 0xc6, 0x35, 0xd8, 0xaa, 0x3a, 0x93, 0xe7, 0xb3, 0xeb, 0xbd, 0x55, 0x76, 0x98, 0x86, 0xbc, 0x65, 0x1d, 0x06, 0xb0, 0xcc, 0x53, 0xb0, 0xf6, 0x3b, 0xce, 0x3c, 0x3e, 0x27, 0xd2, 0x60, 0x4b }; static const uint8_t NIST_P256_X[] = { 0x6b, 0x17, 0xd1, 0xf2, 0xe1, 0x2c, 0x42, 0x47, 0xf8, 0xbc, 0xe6, 0xe5, 0x63, 0xa4, 0x40, 0xf2, 0x77, 0x03, 0x7d, 0x81, 0x2d, 0xeb, 0x33, 0xa0, 0xf4, 0xa1, 0x39, 0x45, 0xd8, 0x98, 0xc2, 0x96 }; static const uint8_t NIST_P256_Y[] = { 0x4f, 0xe3, 0x42, 0xe2, 0xfe, 0x1a, 0x7f, 0x9b, 0x8e, 0xe7, 0xeb, 0x4a, 0x7c, 0x0f, 0x9e, 0x16, 0x2b, 0xce, 0x33, 0x57, 0x6b, 0x31, 0x5e, 0xce, 0xcb, 0xb6, 0x40, 0x68, 0x37, 0xbf, 0x51, 0xf5 }; static const uint8_t NIST_P256_N[] = { 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbc, 0xe6, 0xfa, 0xad, 0xa7, 0x17, 0x9e, 0x84, 0xf3, 0xb9, 0xca, 0xc2, 0xfc, 0x63, 0x25, 0x51 }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP384 static const uint8_t NIST_P384_P[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_P384_A[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_P384_B[] = { 0xb3, 0x31, 0x2f, 0xa7, 0xe2, 0x3e, 0xe7, 0xe4, 0x98, 0x8e, 0x05, 0x6b, 0xe3, 0xf8, 0x2d, 0x19, 0x18, 0x1d, 0x9c, 0x6e, 0xfe, 0x81, 0x41, 0x12, 0x03, 0x14, 0x08, 0x8f, 0x50, 0x13, 0x87, 0x5a, 0xc6, 0x56, 0x39, 0x8d, 0x8a, 0x2e, 0xd1, 0x9d, 0x2a, 0x85, 0xc8, 0xed, 0xd3, 0xec, 0x2a, 0xef }; static const uint8_t NIST_P384_X[] = { 0xaa, 0x87, 0xca, 0x22, 0xbe, 0x8b, 0x05, 0x37, 0x8e, 0xb1, 0xc7, 0x1e, 0xf3, 0x20, 0xad, 0x74, 0x6e, 0x1d, 0x3b, 0x62, 0x8b, 0xa7, 0x9b, 0x98, 0x59, 0xf7, 0x41, 0xe0, 0x82, 0x54, 0x2a, 0x38, 0x55, 0x02, 0xf2, 0x5d, 0xbf, 0x55, 0x29, 0x6c, 0x3a, 0x54, 0x5e, 0x38, 0x72, 0x76, 0x0a, 0xb7 }; static const uint8_t NIST_P384_Y[] = { 0x36, 0x17, 0xde, 0x4a, 0x96, 0x26, 0x2c, 0x6f, 0x5d, 0x9e, 0x98, 0xbf, 0x92, 0x92, 0xdc, 0x29, 0xf8, 0xf4, 0x1d, 0xbd, 0x28, 0x9a, 0x14, 0x7c, 0xe9, 0xda, 0x31, 0x13, 0xb5, 0xf0, 0xb8, 0xc0, 0x0a, 0x60, 0xb1, 0xce, 0x1d, 0x7e, 0x81, 0x9d, 0x7a, 0x43, 0x1d, 0x7c, 0x90, 0xea, 0x0e, 0x5f }; static const uint8_t NIST_P384_N[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x63, 0x4d, 0x81, 0xf4, 0x37, 0x2d, 0xdf, 0x58, 0x1a, 0x0d, 0xb2, 0x48, 0xb0, 0xa7, 0x7a, 0xec, 0xec, 0x19, 0x6a, 0xcc, 0xc5, 0x29, 0x73 }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 static const uint8_t NIST_P521_P[] = { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_P521_A[] = { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_P521_B[] = { 0x00, 0x51, 0x95, 0x3e, 0xb9, 0x61, 0x8e, 0x1c, 0x9a, 0x1f, 0x92, 0x9a, 0x21, 0xa0, 0xb6, 0x85, 0x40, 0xee, 0xa2, 0xda, 0x72, 0x5b, 0x99, 0xb3, 0x15, 0xf3, 0xb8, 0xb4, 0x89, 0x91, 0x8e, 0xf1, 0x09, 0xe1, 0x56, 0x19, 0x39, 0x51, 0xec, 0x7e, 0x93, 0x7b, 0x16, 0x52, 0xc0, 0xbd, 0x3b, 0xb1, 0xbf, 0x07, 0x35, 0x73, 0xdf, 0x88, 0x3d, 0x2c, 0x34, 0xf1, 0xef, 0x45, 0x1f, 0xd4, 0x6b, 0x50, 0x3f, 0x00 }; static const uint8_t NIST_P521_X[] = { 0x00, 0xc6, 0x85, 0x8e, 0x06, 0xb7, 0x04, 0x04, 0xe9, 0xcd, 0x9e, 0x3e, 0xcb, 0x66, 0x23, 0x95, 0xb4, 0x42, 0x9c, 0x64, 0x81, 0x39, 0x05, 0x3f, 0xb5, 0x21, 0xf8, 0x28, 0xaf, 0x60, 0x6b, 0x4d, 0x3d, 0xba, 0xa1, 0x4b, 0x5e, 0x77, 0xef, 0xe7, 0x59, 0x28, 0xfe, 0x1d, 0xc1, 0x27, 0xa2, 0xff, 0xa8, 0xde, 0x33, 0x48, 0xb3, 0xc1, 0x85, 0x6a, 0x42, 0x9b, 0xf9, 0x7e, 0x7e, 0x31, 0xc2, 0xe5, 0xbd, 0x66 }; static const uint8_t NIST_P521_Y[] = { 0x01, 0x18, 0x39, 0x29, 0x6a, 0x78, 0x9a, 0x3b, 0xc0, 0x04, 0x5c, 0x8a, 0x5f, 0xb4, 0x2c, 0x7d, 0x1b, 0xd9, 0x98, 0xf5, 0x44, 0x49, 0x57, 0x9b, 0x44, 0x68, 0x17, 0xaf, 0xbd, 0x17, 0x27, 0x3e, 0x66, 0x2c, 0x97, 0xee, 0x72, 0x99, 0x5e, 0xf4, 0x26, 0x40, 0xc5, 0x50, 0xb9, 0x01, 0x3f, 0xad, 0x07, 0x61, 0x35, 0x3c, 0x70, 0x86, 0xa2, 0x72, 0xc2, 0x40, 0x88, 0xbe, 0x94, 0x76, 0x9f, 0xd1, 0x66, 0x50 }; static const uint8_t NIST_P521_N[] = { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x51, 0x86, 0x87, 0x83, 0xbf, 0x2f, 0x96, 0x6b, 0x7f, 0xcc, 0x01, 0x48, 0xf7, 0x09, 0xa5, 0xd0, 0x3b, 0xb5, 0xc9, 0xb8, 0x89, 0x9c, 0x47, 0xae, 0xbb, 0x6f, 0xb7, 0x1e, 0x91, 0x38, 0x64, 0x09 }; #endif #if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || defined(HITLS_CRYPTO_CURVE_BP512R1) static const uint8_t BRAINPOOL_P_H[] = { 0x01 }; #endif #ifdef HITLS_CRYPTO_CURVE_BP256R1 static const uint8_t BRAINPOOL_P256R1_P[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77 }; static const uint8_t BRAINPOOL_P256R1_A[] = { 0x7d, 0x5a, 0x09, 0x75, 0xfc, 0x2c, 0x30, 0x57, 0xee, 0xf6, 0x75, 0x30, 0x41, 0x7a, 0xff, 0xe7, 0xfb, 0x80, 0x55, 0xc1, 0x26, 0xdc, 0x5c, 0x6c, 0xe9, 0x4a, 0x4b, 0x44, 0xf3, 0x30, 0xb5, 0xd9 }; static const uint8_t BRAINPOOL_P256R1_B[] = { 0x26, 0xdc, 0x5c, 0x6c, 0xe9, 0x4a, 0x4b, 0x44, 0xf3, 0x30, 0xb5, 0xd9, 0xbb, 0xd7, 0x7c, 0xbf, 0x95, 0x84, 0x16, 0x29, 0x5c, 0xf7, 0xe1, 0xce, 0x6b, 0xcc, 0xdc, 0x18, 0xff, 0x8c, 0x07, 0xb6 }; static const uint8_t BRAINPOOL_P256R1_X[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62 }; static const uint8_t BRAINPOOL_P256R1_Y[] = { 0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9, 0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97 }; static const uint8_t BRAINPOOL_P256R1_N[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7 }; #endif #ifdef HITLS_CRYPTO_CURVE_BP384R1 static const uint8_t BRAINPOOL_P384R1_P[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53 }; static const uint8_t BRAINPOOL_P384R1_A[] = { 0x7b, 0xc3, 0x82, 0xc6, 0x3d, 0x8c, 0x15, 0x0c, 0x3c, 0x72, 0x08, 0x0a, 0xce, 0x05, 0xaf, 0xa0, 0xc2, 0xbe, 0xa2, 0x8e, 0x4f, 0xb2, 0x27, 0x87, 0x13, 0x91, 0x65, 0xef, 0xba, 0x91, 0xf9, 0x0f, 0x8a, 0xa5, 0x81, 0x4a, 0x50, 0x3a, 0xd4, 0xeb, 0x04, 0xa8, 0xc7, 0xdd, 0x22, 0xce, 0x28, 0x26 }; static const uint8_t BRAINPOOL_P384R1_B[] = { 0x04, 0xa8, 0xc7, 0xdd, 0x22, 0xce, 0x28, 0x26, 0x8b, 0x39, 0xb5, 0x54, 0x16, 0xf0, 0x44, 0x7c, 0x2f, 0xb7, 0x7d, 0xe1, 0x07, 0xdc, 0xd2, 0xa6, 0x2e, 0x88, 0x0e, 0xa5, 0x3e, 0xeb, 0x62, 0xd5, 0x7c, 0xb4, 0x39, 0x02, 0x95, 0xdb, 0xc9, 0x94, 0x3a, 0xb7, 0x86, 0x96, 0xfa, 0x50, 0x4c, 0x11 }; static const uint8_t BRAINPOOL_P384R1_X[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e }; static const uint8_t BRAINPOOL_P384R1_Y[] = { 0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52, 0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28, 0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15 }; static const uint8_t BRAINPOOL_P384R1_N[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65 }; #endif #ifdef HITLS_CRYPTO_CURVE_BP512R1 static const uint8_t BRAINPOOL_P512R1_P[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3 }; static const uint8_t BRAINPOOL_P512R1_A[] = { 0x78, 0x30, 0xa3, 0x31, 0x8b, 0x60, 0x3b, 0x89, 0xe2, 0x32, 0x71, 0x45, 0xac, 0x23, 0x4c, 0xc5, 0x94, 0xcb, 0xdd, 0x8d, 0x3d, 0xf9, 0x16, 0x10, 0xa8, 0x34, 0x41, 0xca, 0xea, 0x98, 0x63, 0xbc, 0x2d, 0xed, 0x5d, 0x5a, 0xa8, 0x25, 0x3a, 0xa1, 0x0a, 0x2e, 0xf1, 0xc9, 0x8b, 0x9a, 0xc8, 0xb5, 0x7f, 0x11, 0x17, 0xa7, 0x2b, 0xf2, 0xc7, 0xb9, 0xe7, 0xc1, 0xac, 0x4d, 0x77, 0xfc, 0x94, 0xca }; static const uint8_t BRAINPOOL_P512R1_B[] = { 0x3d, 0xf9, 0x16, 0x10, 0xa8, 0x34, 0x41, 0xca, 0xea, 0x98, 0x63, 0xbc, 0x2d, 0xed, 0x5d, 0x5a, 0xa8, 0x25, 0x3a, 0xa1, 0x0a, 0x2e, 0xf1, 0xc9, 0x8b, 0x9a, 0xc8, 0xb5, 0x7f, 0x11, 0x17, 0xa7, 0x2b, 0xf2, 0xc7, 0xb9, 0xe7, 0xc1, 0xac, 0x4d, 0x77, 0xfc, 0x94, 0xca, 0xdc, 0x08, 0x3e, 0x67, 0x98, 0x40, 0x50, 0xb7, 0x5e, 0xba, 0xe5, 0xdd, 0x28, 0x09, 0xbd, 0x63, 0x80, 0x16, 0xf7, 0x23 }; static const uint8_t BRAINPOOL_P512R1_X[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22 }; static const uint8_t BRAINPOOL_P512R1_Y[] = { 0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd, 0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11, 0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae, 0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92 }; static const uint8_t BRAINPOOL_P512R1_N[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69 }; #endif #ifdef HITLS_CRYPTO_CURVE_SM2 static const uint8_t NIST_SM2_P[] = { 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_SM2_A[] = { 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_SM2_B[] = { 0x28, 0xe9, 0xfa, 0x9e, 0x9d, 0x9f, 0x5e, 0x34, 0x4d, 0x5a, 0x9e, 0x4b, 0xcf, 0x65, 0x09, 0xa7, 0xf3, 0x97, 0x89, 0xf5, 0x15, 0xab, 0x8f, 0x92, 0xdd, 0xbc, 0xbd, 0x41, 0x4d, 0x94, 0x0e, 0x93 }; static const uint8_t NIST_SM2_X[] = { 0x32, 0xc4, 0xae, 0x2c, 0x1f, 0x19, 0x81, 0x19, 0x5f, 0x99, 0x04, 0x46, 0x6a, 0x39, 0xc9, 0x94, 0x8f, 0xe3, 0x0b, 0xbf, 0xf2, 0x66, 0x0b, 0xe1, 0x71, 0x5a, 0x45, 0x89, 0x33, 0x4c, 0x74, 0xc7 }; static const uint8_t NIST_SM2_Y[] = { 0xbc, 0x37, 0x36, 0xa2, 0xf4, 0xf6, 0x77, 0x9c, 0x59, 0xbd, 0xce, 0xe3, 0x6b, 0x69, 0x21, 0x53, 0xd0, 0xa9, 0x87, 0x7c, 0xc6, 0x2a, 0x47, 0x40, 0x02, 0xdf, 0x32, 0xe5, 0x21, 0x39, 0xf0, 0xa0 }; static const uint8_t NIST_SM2_N[] = { 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x72, 0x03, 0xdf, 0x6b, 0x21, 0xc6, 0x05, 0x2b, 0x53, 0xbb, 0xf4, 0x09, 0x39, 0xd5, 0x41, 0x23 }; #endif #if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || \ defined(HITLS_CRYPTO_CURVE_SM2) #define CRYPT_CURVE_PARA_DECLARE(name) \ static const CURVE_Para paraNist##name = { \ .p.data = NIST_##name##_P, \ .p.dataLen = sizeof(NIST_##name##_P), \ .a.data = NIST_##name##_A, \ .a.dataLen = sizeof(NIST_##name##_A), \ .b.data = NIST_##name##_B, \ .b.dataLen = sizeof(NIST_##name##_B), \ .n.data = NIST_##name##_N, \ .n.dataLen = sizeof(NIST_##name##_N), \ .h.data = NIST_P_H, \ .h.dataLen = sizeof(NIST_P_H), \ .x.data = NIST_##name##_X, \ .x.dataLen = sizeof(NIST_##name##_X), \ .y.data = NIST_##name##_Y, \ .y.dataLen = sizeof(NIST_##name##_Y) \ } #endif #if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || defined(HITLS_CRYPTO_CURVE_BP512R1) #define CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(name) \ static const CURVE_Para paraBrainpool##name = { \ .p.data = BRAINPOOL_##name##_P, \ .p.dataLen = sizeof(BRAINPOOL_##name##_P), \ .a.data = BRAINPOOL_##name##_A, \ .a.dataLen = sizeof(BRAINPOOL_##name##_A), \ .b.data = BRAINPOOL_##name##_B, \ .b.dataLen = sizeof(BRAINPOOL_##name##_B), \ .n.data = BRAINPOOL_##name##_N, \ .n.dataLen = sizeof(BRAINPOOL_##name##_N), \ .h.data = BRAINPOOL_P_H, \ .h.dataLen = sizeof(BRAINPOOL_P_H), \ .x.data = BRAINPOOL_##name##_X, \ .x.dataLen = sizeof(BRAINPOOL_##name##_X), \ .y.data = BRAINPOOL_##name##_Y, \ .y.dataLen = sizeof(BRAINPOOL_##name##_Y) \ } #endif #ifdef HITLS_CRYPTO_CURVE_NISTP224 CRYPT_CURVE_PARA_DECLARE(P224); #endif #ifdef HITLS_CRYPTO_CURVE_NISTP256 CRYPT_CURVE_PARA_DECLARE(P256); #endif #ifdef HITLS_CRYPTO_CURVE_NISTP384 CRYPT_CURVE_PARA_DECLARE(P384); #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 CRYPT_CURVE_PARA_DECLARE(P521); #endif #ifdef HITLS_CRYPTO_CURVE_BP256R1 CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P256R1); #endif #ifdef HITLS_CRYPTO_CURVE_BP384R1 CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P384R1); #endif #ifdef HITLS_CRYPTO_CURVE_BP512R1 CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P512R1); #endif #ifdef HITLS_CRYPTO_CURVE_SM2 CRYPT_CURVE_PARA_DECLARE(SM2); #endif typedef struct { uint32_t id; const CURVE_Para *curvePara; } CURVE_ParaMap; static const CURVE_ParaMap CURVE_PARAS[] = { #ifdef HITLS_CRYPTO_CURVE_NISTP224 { CRYPT_ECC_NISTP224, &paraNistP224 }, #endif #ifdef HITLS_CRYPTO_CURVE_NISTP256 { CRYPT_ECC_NISTP256, &paraNistP256 }, #endif #ifdef HITLS_CRYPTO_CURVE_NISTP384 { CRYPT_ECC_NISTP384, &paraNistP384 }, #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 { CRYPT_ECC_NISTP521, &paraNistP521 }, #endif #ifdef HITLS_CRYPTO_CURVE_BP256R1 { CRYPT_ECC_BRAINPOOLP256R1, &paraBrainpoolP256R1 }, #endif #ifdef HITLS_CRYPTO_CURVE_BP384R1 { CRYPT_ECC_BRAINPOOLP384R1, &paraBrainpoolP384R1 }, #endif #ifdef HITLS_CRYPTO_CURVE_BP512R1 { CRYPT_ECC_BRAINPOOLP512R1, &paraBrainpoolP512R1 }, #endif #ifdef HITLS_CRYPTO_CURVE_SM2 { CRYPT_ECC_SM2, &paraNistSM2 }, #endif }; static const CURVE_Para *GetCurvePara(CRYPT_PKEY_ParaId id) { for (uint32_t i = 0; i < sizeof(CURVE_PARAS) / sizeof(CURVE_PARAS[0]); i++) { if (CURVE_PARAS[i].id == id) { return CURVE_PARAS[i].curvePara; } } BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_UNSUPPORT_CURVE_TYPE); return NULL; } static int32_t InitMontPara(ECC_Para *para) { if (para->method->bnMontEnc == NULL) { return CRYPT_SUCCESS; } BN_Optimizer *opt = BN_OptimizerCreate(); para->montP = BN_MontCreate(para->p); if (para->montP == NULL || opt == NULL) { BN_OptimizerDestroy(opt); // The montP is freed by the caller. return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(para->method->bnMontEnc(para->a, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(para->b, para->montP, opt, false), ret); ERR: BN_OptimizerDestroy(opt); return ret; } ECC_Para *ECC_NewPara(CRYPT_PKEY_ParaId id) { const CURVE_Para *curve = GetCurvePara(id); if (curve == NULL) { return NULL; } const ECC_Method *method = ECC_FindMethod(id); if (method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return NULL; } ECC_Para *para = BSL_SAL_Malloc(sizeof(ECC_Para)); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(para, sizeof(ECC_Para), 0, sizeof(ECC_Para)); para->method = method; uint32_t bits = curve->p.dataLen * 8; // bits = bytes * 8 para->id = id; para->p = BN_Create(bits); para->a = BN_Create(bits); para->b = BN_Create(bits); para->n = BN_Create(bits); para->h = BN_Create(1); // The cofactor is usually 1. para->x = BN_Create(bits); para->y = BN_Create(bits); if (para->p == NULL || para->a == NULL || para->b == NULL || para->n == NULL || para->h == NULL || para->x == NULL || para->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } int32_t ret; GOTO_ERR_IF(BN_Bin2Bn(para->p, curve->p.data, curve->p.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->a, curve->a.data, curve->a.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->b, curve->b.data, curve->b.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->n, curve->n.data, curve->n.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->h, curve->h.data, curve->h.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->x, curve->x.data, curve->x.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->y, curve->y.data, curve->y.dataLen), ret); GOTO_ERR_IF(InitMontPara(para), ret); return para; ERR: ECC_FreePara(para); return NULL; } CRYPT_PKEY_ParaId GetCurveId(const CRYPT_EccPara *eccPara) { if (eccPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_PKEY_PARAID_MAX; } int32_t ret; BN_BigNum *a = BN_Create(ECC_MAX_BIT_LEN); BN_BigNum *b = BN_Create(ECC_MAX_BIT_LEN); for (uint32_t i = 0; i < sizeof(CURVE_PARAS) / sizeof(CURVE_ParaMap); i++) { const CURVE_Para *curve = GetCurvePara(CURVE_PARAS[i].id); if (curve == NULL) { continue; } GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->p, eccPara->pLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->p.data, curve->p.dataLen), ret); if (BN_Cmp(a, b) != 0) { continue; } GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->a, eccPara->aLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->a.data, curve->a.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->b, eccPara->bLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->b.data, curve->b.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->h, eccPara->hLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->h.data, curve->h.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->n, eccPara->nLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->n.data, curve->n.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->x, eccPara->xLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->x.data, curve->x.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->y, eccPara->yLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->y.data, curve->y.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); BN_Destroy(a); BN_Destroy(b); return CURVE_PARAS[i].id; } ERR: BN_Destroy(a); BN_Destroy(b); return CRYPT_PKEY_PARAID_MAX; } int32_t ECC_GetPara(const ECC_Pkey *pkey, CRYPT_EccPara *eccPara) { if (pkey == NULL || eccPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->para == NULL || pkey->para->method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } int32_t ret; BN_BigNum *paraA = BN_Dup(pkey->para->a); BN_BigNum *paraB = BN_Dup(pkey->para->b); if (paraA == NULL || paraB == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (pkey->para->method->bnMontDec != NULL) { pkey->para->method->bnMontDec(paraA, pkey->para->montP); pkey->para->method->bnMontDec(paraB, pkey->para->montP); } GOTO_ERR_IF(BN_Bn2Bin(paraA, eccPara->a, &eccPara->aLen), ret); GOTO_ERR_IF(BN_Bn2Bin(paraB, eccPara->b, &eccPara->bLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->h, eccPara->h, &eccPara->hLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->n, eccPara->n, &eccPara->nLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->p, eccPara->p, &eccPara->pLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->x, eccPara->x, &eccPara->xLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->y, eccPara->y, &eccPara->yLen), ret); ERR: BN_Destroy(paraA); BN_Destroy(paraB); return ret; } #ifdef HITLS_BSL_PARAMS int32_t ECC_GetParaEx(const ECC_Pkey *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPara eccPara = {0}; BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen)); BSL_Param *paramA = GetParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen)); BSL_Param *paramB = GetParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen)); BSL_Param *paramN = GetParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen)); BSL_Param *paramH = GetParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen)); BSL_Param *paramX = GetParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen)); BSL_Param *paramY = GetParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen)); int32_t ret = ECC_GetPara(ctx, &eccPara); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } paramP->useLen = eccPara.pLen; paramA->useLen = eccPara.aLen; paramB->useLen = eccPara.bLen; paramN->useLen = eccPara.nLen; paramH->useLen = eccPara.hLen; paramX->useLen = eccPara.xLen; paramY->useLen = eccPara.yLen; return CRYPT_SUCCESS; } #endif void ECC_FreePara(ECC_Para *para) { if (para == NULL) { return; } BN_Destroy(para->p); BN_Destroy(para->a); BN_Destroy(para->b); BN_Destroy(para->n); BN_Destroy(para->h); BN_Destroy(para->x); BN_Destroy(para->y); uint32_t i; for (i = 0; i < sizeof(para->tableG) / sizeof(ECC_Point *); i++) { // clear pre-computation table ECC_FreePoint(para->tableG[i]); } BN_MontDestroy(para->montP); BSL_SAL_Free(para); } CRYPT_PKEY_ParaId ECC_GetParaId(const ECC_Para *para) { if (para == NULL) { return CRYPT_PKEY_PARAID_MAX; } return para->id; } int32_t ECC_SetPara(ECC_Pkey *ctx, ECC_Para *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // Refresh the public and private keys. BN_Destroy(ctx->prvkey); ctx->prvkey = NULL; ECC_FreePoint(ctx->pubkey); ctx->pubkey = NULL; ECC_FreePara(ctx->para); ctx->para = para; ECC_SetLibCtx(ctx->libCtx, ctx->para); return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecc_para.c
C
unknown
29,213
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include <stdbool.h> #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_utils.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "crypt_ecc_pkey.h" #include "crypt_params_key.h" typedef struct { const char *name; /* elliptic curve NIST name */ CRYPT_PKEY_ParaId id; /* elliptic curve ID */ } EC_NAME; void ECC_FreeCtx(ECC_Pkey *ctx) { int ret = 0; if (ctx == NULL) { return; } BSL_SAL_AtomicDownReferences(&(ctx->references), &ret); if (ret > 0) { return; } BSL_SAL_ReferencesFree(&(ctx->references)); BN_Destroy(ctx->prvkey); ECC_FreePoint(ctx->pubkey); ECC_FreePara(ctx->para); BSL_SAL_FREE(ctx->mdAttr); BSL_SAL_Free(ctx); return; } ECC_Pkey *ECC_DupCtx(ECC_Pkey *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } ECC_Pkey *newCtx = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey)); if (newCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } newCtx->useCofactorMode = ctx->useCofactorMode; newCtx->pointFormat = ctx->pointFormat; BSL_SAL_ReferencesInit(&(newCtx->references)); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->prvkey, ctx->prvkey, BN_Dup(ctx->prvkey), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->pubkey, ctx->pubkey, ECC_DupPoint(ctx->pubkey), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->para, ctx->para, ECC_DupPara(ctx->para), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->mdAttr, ctx->mdAttr, BSL_SAL_Dump(ctx->mdAttr, strlen(ctx->mdAttr) + 1), CRYPT_MEM_ALLOC_FAIL); newCtx->libCtx = ctx->libCtx; return newCtx; ERR: ECC_FreeCtx(newCtx); return NULL; } // GetBits applies to both public and private keys. // The public key requires the largest space. Therefore, the public key space prevails. uint32_t ECC_PkeyGetBits(const ECC_Pkey *ctx) { if ((ctx == NULL) || (ctx->para == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } // The length of ECC_ParaBits is internally specified and can ensure that the length is not 0. 1 byte = 8 bits. uint32_t bytes = ((ECC_ParaBits(ctx->para) - 1) / 8) + 1; // The public key contains 2 coordinates. The public key flag occupies is 1 byte. 1 byte = 8 bits. return (bytes * 2 + 1) * 8; } int32_t ECC_PkeySetPrvKey(ECC_Pkey *ctx, const CRYPT_EccPrv *prv) { if ((ctx == NULL) || (ctx->para == NULL) || (prv == NULL) || (prv->data == NULL) || (prv->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; BN_BigNum *paraN = ECC_GetParaN(ctx->para); BN_BigNum *newPrvKey = BN_Create(ECC_ParaBits(ctx->para)); if ((paraN == NULL) || (newPrvKey == NULL)) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(newPrvKey, prv->data, prv->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } if (ctx->para->id == CRYPT_ECC_SM2) { (void)BN_SubLimb(paraN, paraN, 1); } if (BN_IsZero(newPrvKey) || (BN_Cmp(newPrvKey, paraN)) >= 0) { ret = CRYPT_ECC_PKEY_ERR_INVALID_PRIVATE_KEY; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->prvkey); ctx->prvkey = newPrvKey; BN_Destroy(paraN); return CRYPT_SUCCESS; ERR: BN_Destroy(newPrvKey); BN_Destroy(paraN); return ret; } /** * In NIST.SP.800-56 Ar3, the FFC Full Public-Key Validation Routine needs to check nQ = Ø. * For performance considerations, we perform Partial public-key Validation (Section 5.6.2.3.4) when * setting the Public Key. */ int32_t ECC_PkeySetPubKey(ECC_Pkey *ctx, const CRYPT_EccPub *pub) { if ((ctx == NULL) || (ctx->para == NULL) || (pub == NULL) || (pub->data == NULL) || (pub->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ECC_Point *newPubKey = ECC_NewPoint(ctx->para); if (newPubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ECC_DecodePoint(ctx->para, newPubKey, pub->data, pub->len); if (ret == CRYPT_SUCCESS) { ECC_FreePoint(ctx->pubkey); ctx->pubkey = newPubKey; return ret; } ECC_FreePoint(newPubKey); return ret; } int32_t ECC_PkeyGetPrvKey(const ECC_Pkey *ctx, CRYPT_EccPrv *prv) { if ((ctx == NULL) || (prv == NULL) || (prv->data == NULL) || (prv->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } return BN_Bn2Bin(ctx->prvkey, prv->data, &prv->len); } int32_t ECC_PkeyGetPubKey(const ECC_Pkey *ctx, CRYPT_EccPub *pub) { if ((ctx == NULL) || (ctx->para == NULL) || (pub == NULL) || (pub->data == NULL) || (pub->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } return ECC_EncodePoint(ctx->para, ctx->pubkey, pub->data, &pub->len, ctx->pointFormat); } #ifdef HITLS_BSL_PARAMS int32_t ECC_PkeySetPrvKeyEx(ECC_Pkey *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPrv prv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_EC_PRVKEY, &prv.data, &prv.len); return ECC_PkeySetPrvKey(ctx, &prv); } int32_t ECC_PkeySetPubKeyEx(ECC_Pkey *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPub pub = {0}; if (GetConstParamValue(para, CRYPT_PARAM_EC_PUBKEY, &pub.data, &pub.len) == NULL) { (void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len); } return ECC_PkeySetPubKey(ctx, &pub); } int32_t ECC_PkeyGetPrvKeyEx(const ECC_Pkey *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPrv prv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_EC_PRVKEY, &prv.data, &(prv.len)); int32_t ret = ECC_PkeyGetPrvKey(ctx, &prv); if (ret != CRYPT_SUCCESS) { return ret; } paramPrv->useLen = prv.len; return CRYPT_SUCCESS; } int32_t ECC_PkeyGetPubKeyEx(const ECC_Pkey *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPub pub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_EC_PUBKEY, &pub.data, &(pub.len)); if (paramPub == NULL) { paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len)); } int32_t ret = ECC_PkeyGetPubKey(ctx, &pub); if (ret != CRYPT_SUCCESS) { return ret; } paramPub->useLen = pub.len; return CRYPT_SUCCESS; } #endif static int32_t GenPrivateKey(ECC_Pkey *ctx) { int32_t ret = CRYPT_SUCCESS; uint32_t tryCount = 0; uint32_t paraBits = ECC_ParaBits(ctx->para); BN_BigNum *paraN = NULL; if (ctx->para->id == CRYPT_ECC_SM2) { paraN = BN_Create(paraBits); if (paraN == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } (void)BN_SubLimb(paraN, ctx->para->n, 1); } else { paraN = ctx->para->n; } if (ctx->prvkey == NULL) { ctx->prvkey = BN_Create(paraBits); if (ctx->prvkey == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto EXIT; } } do { ret = BN_RandRangeEx(ctx->libCtx, ctx->prvkey, paraN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } tryCount += 1; } while ((BN_IsZero(ctx->prvkey) == true) && (tryCount < CRYPT_ECC_TRY_MAX_CNT)); if (tryCount == CRYPT_ECC_TRY_MAX_CNT) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_TRY_CNT); ret = CRYPT_ECC_PKEY_ERR_TRY_CNT; } EXIT: if (paraN != ctx->para->n) { BN_Destroy(paraN); } return ret; } int32_t ECC_GenPublicKey(ECC_Pkey *ctx) { if (ctx->pubkey != NULL) { return CRYPT_SUCCESS; } ctx->pubkey = ECC_NewPoint(ctx->para); if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ECC_PointMul(ctx->para, ctx->pubkey, ctx->prvkey, NULL); if (ret != CRYPT_SUCCESS) { ECC_FreePoint(ctx->pubkey); ctx->pubkey = NULL; } return ret; } static int32_t GenPublicKey(ECC_Pkey *ctx) { if (ctx->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->pubkey == NULL) { ctx->pubkey = ECC_NewPoint(ctx->para); if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } } return ECC_PointMul(ctx->para, ctx->pubkey, ctx->prvkey, NULL); } int32_t ECC_PkeyGen(ECC_Pkey *ctx) { if ((ctx == NULL) || (ctx->para == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = GenPrivateKey(ctx); if (ret != CRYPT_SUCCESS) { goto ERR; } ret = GenPublicKey(ctx); if (ret != CRYPT_SUCCESS) { goto ERR; } return CRYPT_SUCCESS; ERR: BN_Zeroize(ctx->prvkey); BN_Destroy(ctx->prvkey); ctx->prvkey = NULL; ECC_FreePoint(ctx->pubkey); ctx->pubkey = NULL; return ret; } #ifdef HITLS_CRYPTO_ECC_CHECK static int32_t EccKeyPairCheck(const ECC_Pkey *pub, const ECC_Pkey *prv) { int32_t ret; if (prv == NULL || pub == NULL || pub->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->pubkey == NULL || prv->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } ECC_Point *point = ECC_NewPoint(pub->para); if (point == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = ECC_PointMul(pub->para, point, prv->prvkey, NULL); if (ret != CRYPT_SUCCESS) { ECC_FreePoint(point); return ret; } if (ECC_PointCmp(pub->para, point, pub->pubkey) != 0) { ret = CRYPT_ECC_PAIRWISE_CHECK_FAIL; BSL_ERR_PUSH_ERROR(ret); } ECC_FreePoint(point); return ret; } static int32_t EccPrvKeyCheck(const ECC_Pkey *pkey) { if (pkey == NULL || pkey->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } int32_t ret = CRYPT_SUCCESS; BN_BigNum *paraN = ECC_GetParaN(pkey->para); if (pkey->para->id == CRYPT_ECC_SM2) { (void)BN_SubLimb(paraN, paraN, 1); /* GB/T 32918.2-2016 for check sm2 prv key, 0 < key < n - 1 is valid */ if (BN_IsZero(pkey->prvkey) == true || BN_IsNegative(pkey->prvkey) == true || (BN_Cmp(pkey->prvkey, paraN) >= 0)) { ret = CRYPT_ECC_INVALID_PRVKEY; BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVALID_PRVKEY); } } else { /* SP800-56a 5.6.2.1.2 for check an ecc private key. 0 < key <= n - 1 is valid. */ if (BN_IsZero(pkey->prvkey) == true || BN_IsNegative(pkey->prvkey) == true || (BN_Cmp(pkey->prvkey, paraN) >= 0)) { ret = CRYPT_ECC_INVALID_PRVKEY; BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVALID_PRVKEY); } } BN_Destroy(paraN); return ret; } int32_t ECC_PkeyCheck(const ECC_Pkey *pkey1, const ECC_Pkey *pkey2, uint32_t checkType) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return EccKeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return EccPrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_ECC_CHECK static const char *EcCurveId2nist(CRYPT_PKEY_ParaId id) { static EC_NAME nistCurves[] = { {"P-224", CRYPT_ECC_NISTP224}, {"P-256", CRYPT_ECC_NISTP256}, {"P-384", CRYPT_ECC_NISTP384}, {"P-521", CRYPT_ECC_NISTP521} }; for (uint32_t i = 0; i < sizeof(nistCurves) / sizeof(nistCurves[0]); i++) { if (nistCurves[i].id == id) { return nistCurves[i].name; } } return NULL; } static int32_t ECC_GetPubXYBnBin(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len) { if (ctx->para == NULL || len != sizeof(CRYPT_Data) || val == NULL || ((CRYPT_Data *)val)->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret; uint32_t bits = BN_Bits(ctx->para->p); BN_BigNum *x = BN_Create(bits); BN_BigNum *y = BN_Create(bits); do { if (x == NULL || y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; break; } ret = ECC_GetPoint2Bn(ctx->para, ctx->pubkey, x, y); if (ret != CRYPT_SUCCESS) { break; } if (opt == CRYPT_CTRL_GET_ECC_PUB_X_BIN) { ret = BN_Bn2Bin(x, ((CRYPT_Data *)val)->data, &((CRYPT_Data *)val)->len); } else { ret = BN_Bn2Bin(y, ((CRYPT_Data *)val)->data, &((CRYPT_Data *)val)->len); } } while (0); BN_Destroy(x); BN_Destroy(y); return ret; } static uint32_t GetOrderBits(const ECC_Pkey *ctx) { if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA); return 0; } return BN_Bits(ctx->para->n); } static uint32_t ECC_GetKeyLen(const ECC_Pkey *ctx) { if ((ctx == NULL) || (ctx->para == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_Bytes(ctx->para->p); } static uint32_t ECC_GetPubKeyLen(const ECC_Pkey *ctx) { uint32_t keylen = ECC_GetKeyLen(ctx); if (keylen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return 0; } if (ctx->pointFormat == CRYPT_POINT_COMPRESSED) { return (keylen + 1); } return (keylen * 2 + 1); } static int32_t GetEccName(ECC_Pkey *ctx, void *val, uint32_t len) { if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (memcpy_s(val, len, EcCurveId2nist(ctx->para->id), strlen("P-521") + 1) != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); return CRYPT_SECUREC_FAIL; } return CRYPT_SUCCESS; } static int32_t SetEccPointFormat(ECC_Pkey *ctx, void *val, uint32_t len) { if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN); return CRYPT_ECC_PKEY_ERR_CTRL_LEN; } uint32_t pointFormat = *(uint32_t *)val; if (pointFormat >= CRYPT_POINT_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT); return CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT; } ctx->pointFormat = pointFormat; return CRYPT_SUCCESS; } static int32_t SetEccUseCofactorMode(ECC_Pkey *ctx, void *val, uint32_t len) { if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN); return CRYPT_ECC_PKEY_ERR_CTRL_LEN; } ctx->useCofactorMode = *(uint32_t *)val; return CRYPT_SUCCESS; } int32_t ECC_PkeyCtrl(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL || (val == NULL && opt != CRYPT_CTRL_GEN_ECC_PUBLICKEY)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_ECC_NAME: return GetEccName(ctx, val, len); case CRYPT_CTRL_GET_ECC_PUB_X_BIN: case CRYPT_CTRL_GET_ECC_PUB_Y_BIN: return ECC_GetPubXYBnBin(ctx, opt, val, len); case CRYPT_CTRL_SET_ECC_POINT_FORMAT: return SetEccPointFormat(ctx, val, len); case CRYPT_CTRL_SET_ECC_USE_COFACTOR_MODE: return SetEccUseCofactorMode(ctx, val, len); case CRYPT_CTRL_GEN_ECC_PUBLICKEY: return GenPublicKey(ctx); case CRYPT_CTRL_GET_ECC_ORDER_BITS: return GetUintCtrl(ctx, val, len, (GetUintCallBack)GetOrderBits); case CRYPT_CTRL_GET_PUBKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)ECC_GetPubKeyLen); case CRYPT_CTRL_GET_PRVKEY_LEN: case CRYPT_CTRL_GET_SHARED_KEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)ECC_GetKeyLen); case CRYPT_CTRL_UP_REFERENCES: if (len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN); return CRYPT_ECC_PKEY_ERR_CTRL_LEN; } return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val); default: BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION); return CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION; } } ECC_Pkey *ECC_PkeyNewCtx(CRYPT_PKEY_ParaId id) { ECC_Para *para = ECC_NewPara(id); if (para == NULL) { return NULL; } ECC_Pkey *key = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey)); if (key == NULL) { ECC_FreePara(para); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } key->para = para; key->pointFormat = CRYPT_POINT_UNCOMPRESSED; BSL_SAL_ReferencesInit(&(key->references)); return key; } int32_t ECC_PkeyCmp(const ECC_Pkey *a, const ECC_Pkey *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); // Compare public keys. RETURN_RET_IF(ECC_PointCmp(a->para, a->pubkey, b->pubkey), CRYPT_ECC_KEY_PUBKEY_NOT_EQUAL); // Compare parameters. RETURN_RET_IF(b->para == NULL || a->para->id != b->para->id, CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecc_pkey.c
C
unknown
19,162
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECC_UTILS_H #define ECC_UTILS_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_ecc.h" #include "ecc_local.h" #include "crypt_errno.h" #ifdef __cplusplus extern "C" { #endif /* the window length of common point multiplication */ #define WINDOW_SIZE 5 /* * Decoded from a 6-bit signed code to obtain the sign and value. The upper five bits are the complement of the value, * and the least significant bit is the carry (positive) of the next group of numbers. * Output: * sign = 0 or 1 * 0 <= value <= 16 */ inline static void DecodeScalarCode(uint32_t *sign, uint32_t *value, uint32_t code) { uint32_t s, v; s = 0 - (code >> WINDOW_SIZE); // Bit 5 is the sign bit, and the negative number is all 1s. // Take its value and add a carry. Because the symbol is obtained and then the carry is added, v may be + 16 or - 0. v = (code >> 1) + (code & 1); // Find the Take its value and add a carry. If the number is positive, v is the Take its value and add a carry. // If the number is negative, v is inverted + 1. v = (~s & v) | (s & (~v + 1)); *sign = s & 1; *value = v & ((1 << WINDOW_SIZE) - 1); // Five bits are intercepted. } inline static int32_t CheckParaValid(const ECC_Para *para, CRYPT_PKEY_ParaId id) { if (para == NULL) { return CRYPT_NULL_INPUT; } if (para->id != id) { return CRYPT_ECC_POINT_ERR_CURVE_ID; } return CRYPT_SUCCESS; } inline static int32_t CheckPointValid(const ECC_Point *pt, CRYPT_PKEY_ParaId id) { if (pt == NULL) { return CRYPT_NULL_INPUT; } if (pt->id != id) { return CRYPT_ECC_POINT_ERR_CURVE_ID; } return CRYPT_SUCCESS; } inline static int32_t CheckBnValid(const BN_BigNum *k, uint32_t maxBits) { if (k == NULL) { return CRYPT_NULL_INPUT; } if (BN_Bits(k) > maxBits) { // If K is greater than maxBits, it is considered too long. return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // ECC_UTILS_H
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecc_utils.h
C
unknown
2,642
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_ECC) && defined(HITLS_CRYPTO_CURVE_MONT) #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" #ifdef HITLS_CRYPTO_CURVE_MONT_NIST // Jacobian coordinate double the point int32_t ECP_NistPointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (a == NULL || r == NULL || para == NULL) { return CRYPT_NULL_INPUT; } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); int32_t ret; BN_BigNum *halfP = ECP_HalfPGet(para->p); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room); if (t1 == NULL || t2 == NULL || t3 == NULL || halfP == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t2, &a->x, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t1, &a->x, t1, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t1, para->montP, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t3, t2, t2, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t2, t3, t2, para->p, opt), ret); // t2 = 3*t2 GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &a->z, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r->y, &a->x, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t1, t3, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t2, para->montP, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, t1, &r->y, para->p, opt), ret); ERR: BN_OptimizerDestroy(opt); BN_Destroy(halfP); return ret; } // Jacobian coordinate multi-double the point: r = (2^m) * pt int32_t ECP_NistPointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m) { if (a == NULL || r == NULL || para == NULL) { return CRYPT_NULL_INPUT; } uint32_t tm = m; BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; (void)OptimizerStart(opt); BN_BigNum *ta = OptimizerGetBn(opt, a->x.room); BN_BigNum *tb = OptimizerGetBn(opt, a->x.room); BN_BigNum *tc = OptimizerGetBn(opt, a->x.room); BN_BigNum *tw = OptimizerGetBn(opt, a->x.room); BN_BigNum *halfP = ECP_HalfPGet(para->p); if (ta == NULL || tb == NULL || tc == NULL || tw == NULL || halfP == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(BN_Copy(&r->x, &a->x), ret); GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret); GOTO_ERR_IF(BN_Copy(&r->z, &a->z), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, &a->z, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, tw, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret); while (tm > 0) { // 3.1 // ta = 3*(x^2 - tw) GOTO_ERR_IF(para->method->bnModNistEccSqr(ta, &r->x, para->montP, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(tc, ta, tw, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(ta, tc, tc, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(ta, ta, tc, para->p, opt), ret); // tb = x*(y^2) GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(tb, tc, &r->x, para->montP, opt), ret); // 3.2 // x = ta^2 - 2*tb GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, ta, para->montP, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret); // z = zy GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, &r->y, para->montP, opt), ret); // 3.3 // tc = y^4 GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, tc, para->montP, opt), ret); // m = m - 1, if bit > 0, tw = tw * (y^4) tm--; if (tm > 0) { GOTO_ERR_IF(para->method->bnModNistEccMul(tw, tw, tc, para->montP, opt), ret); } // 3.4 // y = 2*ta*(tb - x) - (y^4) GOTO_ERR_IF(BN_ModSubQuick(&r->y, tb, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, ta, para->montP, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, tc, para->p, opt), ret); } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret); ERR: BN_Destroy(halfP); BN_OptimizerDestroy(opt); // no need to end opt. return ret; } // Point addition calculation (Jacobian point a plus Jacobian point b) // https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo int32_t ECP_NistPointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { if (para == NULL || r == NULL || a == NULL || b == NULL) { return CRYPT_NULL_INPUT; } if (BN_IsZero(&a->z)) { // If point a is an infinity point, r = b return ECC_CopyPoint(r, b); } if (BN_IsZero(&b->z)) { // If point b is an infinity point, r = a return ECC_CopyPoint(r, a); } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t5 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t6 = OptimizerGetBn(opt, a->x.room); if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t6 == NULL) { BN_OptimizerDestroy(opt); // no need to end opt. return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &b->z, para->montP, opt), ret); // Z2^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &b->z, para->montP, opt), ret); // Z2^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t5, t1, &a->x, para->montP, opt), ret); // U1 = X1*Z2^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t6, t2, &a->y, para->montP, opt), ret); // S1 = Y1*Z2^3 GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, &a->z, para->montP, opt), ret); // T3 = Z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &a->z, &b->y, para->montP, opt), ret); // r->y = Y2*Z1 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, &b->z, para->montP, opt), ret); // r->z = Z2*Z1 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, t3, &r->y, para->montP, opt), ret); // S2 = Y2 * Z1^3 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->x, t3, &b->x, para->montP, opt), ret); // U2 = Z1^2 * X2 GOTO_ERR_IF(BN_ModSubQuick(t1, &r->x, t5, para->p, opt), ret); // H = U2 - U1 GOTO_ERR_IF(BN_ModSubQuick(t2, &r->y, t6, para->p, opt), ret); // r = S2 - S1 if (BN_IsZero(t1) && BN_IsZero(t2)) { GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret); goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, t1, &r->z, para->montP, opt), ret); // r->z = H * Z2*Z1 GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->montP, opt), ret); // t3 = H^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t3, para->montP, opt), ret); // t1 = H^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t5, para->montP, opt), ret); // t3 = H^2 * U1 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); // r->x = r ^ 2 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - H^2*U1 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - 2*H^2 * U1 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // r ^ 2 - 2*H^2*U1 - H^3 GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // H^2 * U1 - X3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t2, t3, para->montP, opt), ret); // r * (H^2 * U1 - X3) GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t6, para->montP, opt), ret); // t1 = H^3 * S1 GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t1, para->p, opt), ret); // r * (H^2 * U1 - X3) - H^3 * S1 ERR: BN_OptimizerDestroy(opt); // no need to end opt. return ret; } // cal r = a + b (b->z = 1) // https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2004-hmv int32_t ECP_NistPointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { int32_t ret; if (a == NULL || b == NULL || r == NULL || para == NULL) { return CRYPT_NULL_INPUT; } if (BN_IsZero(&a->z)) { // if point a is an infinity point, r = b, return ECC_CopyPoint(r, b); } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room); if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); // T1 = Z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &a->z, para->montP, opt), ret); // T2 = Z1^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &b->x, para->montP, opt), ret); // T1 = X2*T1 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &b->y, para->montP, opt), ret); // T2 = Y2*T2 GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &a->x, para->p, opt), ret); // T1 = T1-X1 GOTO_ERR_IF(BN_ModSubQuick(t2, t2, &a->y, para->p, opt), ret); // T2 = T2-Y1 if (BN_IsZero(t1)) { if (BN_IsZero(t2)) { // If two points are equal, use double for calculation. GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret); } else { // Obtain the infinite point. GOTO_ERR_IF(BN_SetLimb(&r->z, 0), ret); } goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, t1, para->montP, opt), ret); // Z3 = Z1 * T1 GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->montP, opt), ret); // T3 = T1 ^ 2 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t1, t3, para->montP, opt), ret); // T4 = T3 * T1 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, &a->x, para->montP, opt), ret); // T3 = T3 * X1 GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); // T1 = 2 * T3 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); // X3 = T2 ^ 2 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // X3 = X3 - T1 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t4, para->p, opt), ret); // X3 = X3 - T4 GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // T3 = T3 - X3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t2, para->montP, opt), ret); // T3 = T3 * T2 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t4, &a->y, para->montP, opt), ret); // T4 = T4 * Y1 GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t4, para->p, opt), ret); // Y3 = T3 - T4 ERR: BN_OptimizerDestroy(opt); // no need to end opt. return ret; } #endif #ifdef HITLS_CRYPTO_CURVE_MONT_PRIME /* prime curves point multi-double r = (2^m)*a Calculation procedure: 1. If the point is an infinity point, return the infinity point. 2. Y = 2*Y, W = Z^4 3. If m > 0, repeat the following steps: A = 3*X^2 + a*W B = X*Y^2 X = A^2 - 2*B Z = Z*Y m = m - 1 if m > 0 then W = W*Y^4 Y = 2*A*(B-X)-Y^4 4. Return (X, Y/2, Z) */ int32_t ECP_PrimePointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (para == NULL || r == NULL || a == NULL) { return CRYPT_NULL_INPUT; } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; (void)OptimizerStart(opt); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room); BN_BigNum *halfP = ECP_HalfPGet(para->p); if (t1 == NULL || t2 == NULL || t3 == NULL || halfP == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); // Z1^2 GOTO_ERR_IF(para->method->bnModNistEccSqr(t2, t1, para->montP, opt), ret); // Z1^4 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t2, para->a, para->montP, opt), ret); // a*Z1^4 GOTO_ERR_IF(para->method->bnModNistEccSqr(t2, &a->x, para->montP, opt), ret); // X1^2 GOTO_ERR_IF(BN_ModAddQuick(t3, t2, t2, para->p, opt), ret); // 2*X1^2 GOTO_ERR_IF(BN_ModAddQuick(t2, t3, t2, para->p, opt), ret); // 3*X1^2 GOTO_ERR_IF(BN_ModAddQuick(t2, t1, t2, para->p, opt), ret); // t2 = 3*X1^2 + a*Z1^4 GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &a->z, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r->y, &a->x, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t1, t3, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t2, para->montP, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, t1, &r->y, para->p, opt), ret); ERR: BN_Destroy(halfP); BN_OptimizerDestroy(opt); // no need to end opt. return ret; } // Point addition calculation (Jacobian point a plus Jacobian point b) // https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html#addition-add-2007-bl int32_t ECP_PrimePointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { bool flag = (para == NULL) || (r == NULL) || (a == NULL) || (b == NULL); if (flag) { return CRYPT_NULL_INPUT; } if (BN_IsZero(&a->z)) { return ECC_CopyPoint(r, b); } if (BN_IsZero(&b->z)) { return ECC_CopyPoint(r, a); } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); BN_BigNum *t0 = OptimizerGetBn(opt, para->p->size); BN_BigNum *t1 = OptimizerGetBn(opt, para->p->size); BN_BigNum *t2 = OptimizerGetBn(opt, para->p->size); BN_BigNum *t3 = OptimizerGetBn(opt, para->p->size); BN_BigNum *t4 = OptimizerGetBn(opt, para->p->size); BN_BigNum *t5 = OptimizerGetBn(opt, para->p->size); flag = (t0 == NULL) || (t1 == NULL) || (t2 == NULL) || (t3 == NULL) || (t4 == NULL) || (t5 == NULL); if (flag) { BN_OptimizerDestroy(opt); // no need to end opt. return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(para->method->bnModNistEccSqr(t0, &a->z, para->montP, opt), ret); // z1z1 = z1^2 GOTO_ERR_IF(para->method->bnModNistEccSqr(t5, &b->z, para->montP, opt), ret); // z2z2 = z2^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, &a->x, t5, para->montP, opt), ret); // u1 = x1*z2z2 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &b->x, t0, para->montP, opt), ret); // u2 = x2*z1z1 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, &b->z, t5, para->montP, opt), ret); // z2 * z2z2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, &a->y, t2, para->montP, opt), ret); // s1 = y1 * z2 * z2z2 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, &a->z, t0, para->montP, opt), ret); // z1 * z1z1 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, &b->y, t4, para->montP, opt), ret); // s2 = y2 * z1 * z1z1 GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t5, para->p, opt), ret); // z1z1 + z2z2 GOTO_ERR_IF(BN_ModSubQuick(t3, t3, t1, para->p, opt), ret); // h = u2 - u1 GOTO_ERR_IF(BN_ModSubQuick(t4, t4, t2, para->p, opt), ret); // s2 - s1 if (BN_IsZero(t3) && BN_IsZero(t4)) { GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret); goto ERR; } GOTO_ERR_IF(BN_ModAddQuick(t5, t3, t3, para->p, opt), ret); // 2h GOTO_ERR_IF(BN_ModAddQuick(&r->y, t4, t4, para->p, opt), ret); // r = 2(s2 - s1) GOTO_ERR_IF(para->method->bnModNistEccSqr(t5, t5, para->montP, opt), ret); // i = (2h)^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t3, t5, para->montP, opt), ret); // j = h*i GOTO_ERR_IF(para->method->bnModNistEccMul(t5, t1, t5, para->montP, opt), ret); // v = u1 * i GOTO_ERR_IF(BN_ModAddQuick(t1, t5, t5, para->p, opt), ret); // 2 * v GOTO_ERR_IF(BN_ModAddQuick(t1, t1, t4, para->p, opt), ret); // 2 * v + j GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, &r->y, para->montP, opt), ret); // rr ^ 2 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // r->x = rr ^ 2 - j - z * v GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t4, para->montP, opt), ret); // s1 * j GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 2 * s1 * j GOTO_ERR_IF(BN_ModSubQuick(t5, t5, &r->x, para->p, opt), ret); // v = v - x3 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, t5, para->montP, opt), ret); // r * (v - x3) GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, t2, para->p, opt), ret); // r * (v - x3) - 2 * s1 * j GOTO_ERR_IF(BN_ModAddQuick(&r->z, &a->z, &b->z, para->p, opt), ret); // z1 + z2 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->z, &r->z, para->montP, opt), ret); // (z1 + z2) ^ 2 GOTO_ERR_IF(BN_ModSubQuick(&r->z, &r->z, t0, para->p, opt), ret); // (z1 + z2) ^ 2 - z1z1 - z2z2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, t3, para->montP, opt), ret); // r->z * h ERR: BN_OptimizerDestroy(opt); // no need to end opt. return ret; } // Jacobian coordinate multi-double the point: r = (2^m) * pt int32_t ECP_PrimePointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m) { if (para == NULL || r == NULL || a == NULL) { return CRYPT_NULL_INPUT; } uint32_t tm = m; int32_t ret; BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *ta = OptimizerGetBn(opt, a->x.room); BN_BigNum *tb = OptimizerGetBn(opt, a->x.room); BN_BigNum *tw = OptimizerGetBn(opt, a->x.room); BN_BigNum *halfP = ECP_HalfPGet(para->p); if (t1 == NULL || t2 == NULL || ta == NULL || tb == NULL || tw == NULL || halfP == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(BN_Copy(&r->x, &a->x), ret); GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret); GOTO_ERR_IF(BN_Copy(&r->z, &a->z), ret); GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, &a->z, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, tw, para->montP, opt), ret); // Z^4 while (tm > 0) { // A = 3*X^2 + a*W GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &r->x, para->montP, opt), ret); // X^2 GOTO_ERR_IF(BN_ModAddQuick(ta, t1, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(ta, ta, t1, para->p, opt), ret); // 3*X^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, para->a, tw, para->montP, opt), ret); // a*W GOTO_ERR_IF(BN_ModAddQuick(ta, ta, t2, para->p, opt), ret); // A = 3*X^2 + a*W GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &r->y, para->montP, opt), ret); // t1 = Y^2 GOTO_ERR_IF(para->method->bnModNistEccMul(tb, t1, &r->x, para->montP, opt), ret); // B = X*Y^2 GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, t1, para->montP, opt), ret); // t1 = Y^4 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, ta, para->montP, opt), ret); // A^2 GOTO_ERR_IF(BN_ModAddQuick(t2, tb, tb, para->p, opt), ret); // 2*B GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t2, para->p, opt), ret); // X = A^2 - 2*B GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, &r->y, para->montP, opt), ret); // m = m - 1 tm--; if (tm > 0) { GOTO_ERR_IF(para->method->bnModNistEccMul(tw, tw, t1, para->montP, opt), ret); } GOTO_ERR_IF(BN_ModSubQuick(&r->y, tb, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, ta, para->montP, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, t1, para->p, opt), ret); } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret); ERR: BN_Destroy(halfP); BN_OptimizerDestroy(opt); return ret; } /* prime curve point addition r = a + b, , depending on the method->pointDouble point operation. Calculation formula: X3 = (Y2*Z1^3-Y1)^2 - (X2*Z1^2-X1)^2 * (X1+X2*Z1^2) Y3 = (Y2*Z1^3-Y1) * (X1*(X2*Z1^2-X1)^2-X3) - Y1 * (X2*Z1^2-X1)^3 Z3 = (X2*Z1^2-X1) * Z1 */ int32_t ECP_PrimePointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { if (para == NULL || r == NULL || a == NULL || b == NULL) { return CRYPT_NULL_INPUT; } if (BN_IsZero(&a->z)) { // if point a is an infinity point, r = b, return ECC_CopyPoint(r, b); } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room); if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL) { BN_OptimizerDestroy(opt); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); // Z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &a->z, para->montP, opt), ret); // Z1^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &b->x, para->montP, opt), ret); // X2*Z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &b->y, para->montP, opt), ret); // Y2*Z1^3 GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &a->x, para->p, opt), ret); // X2*Z1^2 - X1 GOTO_ERR_IF(BN_ModSubQuick(t2, t2, &a->y, para->p, opt), ret); // Y2*Z1^3 - Y1 if (BN_IsZero(t1)) { if (BN_IsZero(t2)) { // If two points are equal, use double for calculation. GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret); } else { // Obtain the infinite point. GOTO_ERR_IF(BN_SetLimb(&r->z, 0), ret); } goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, t1, para->montP, opt), ret); // Z3 = (X2*Z1^2 - X1)*Z1 GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->montP, opt), ret); // (X2*Z1^2 - X1)^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t1, t3, para->montP, opt), ret); // (X2*Z1^2 - X1)^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, &a->x, para->montP, opt), ret); // X1*(X2*Z1^2 - X1)^2 GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); // 2*X1*(X2*Z1^2 - X1)^2 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); // (Y2*Z1^3 - Y1)^2 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // (Y2*Z1^3-Y1)^2 - 2*X1*(X2*Z1^2-X1)^2 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t4, para->p, opt), ret); // X3 GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // X1*(X2*Z1^2-X1)^2 - X3 // (Y2*Z1^3-Y1)*(X1*(X2*Z1^2-X1)^2-X3) GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t2, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t4, &a->y, para->montP, opt), ret); // Y1*(X2*Z1^2 - X1)^3 GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t4, para->p, opt), ret); // Y3 ERR: BN_OptimizerDestroy(opt); return ret; } #endif int32_t ECP_Point2AffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { if (pt == NULL || r == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != r->id || para->id != pt->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (BN_IsOne(&pt->z)) { return ECC_CopyPoint(r, pt); } uint32_t bits = BN_Bits(para->p); BN_BigNum *inv = BN_Create(bits); BN_BigNum *zz = BN_Create(bits); BN_Optimizer *opt = BN_OptimizerCreate(); ECC_Point *base = ECC_DupPoint(pt); int32_t ret; if (inv == NULL || zz == NULL || opt == NULL || base == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(para->method->modInv(inv, &base->z, para->p, opt), ret); GOTO_ERR_IF(para->method->bnMontEnc(&base->x, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(&base->y, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(inv, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(zz, inv, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->x, &base->x, zz, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(zz, zz, inv, para->montP, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &base->y, zz, para->montP, opt), ret); GOTO_ERR_IF(BN_SetLimb(&r->z, 1), ret); para->method->bnMontDec(&r->x, para->montP); para->method->bnMontDec(&r->y, para->montP); ERR: BN_Destroy(zz); BN_Destroy(inv); ECC_FreePoint(base); BN_OptimizerDestroy(opt); return ret; } /* * XZ coordinates for short Weierstrass curves * https://hyperelliptic.org/EFD/g1p/auto-shortw-xz.html#ladder-mladd-2002-bj-3 * MontLadderDoubleAndAdd return: * r2 = 2 * r2 * r3 = r2 + r3 */ static int32_t MontLadderDoubleAndAdd(ECC_Para *para, ECC_Point *r2, ECC_Point *r3, ECC_Point *p, BN_Optimizer *opt) { int32_t ret; (void)OptimizerStart(opt); BN_BigNum *t0 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t1 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t4 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t5 = OptimizerGetBn(opt, p->x.room); if (t0 == NULL || t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL) { OptimizerEnd(opt); return CRYPT_MEM_ALLOC_FAIL; // 不需要释放其他大数,统一交给大数优化器管理 } GOTO_ERR_IF(para->method->bnModNistEccSqr(&r2->y, &r2->x, para->montP, opt), ret); // x2 ^ 2 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r3->y, &r2->z, para->montP, opt), ret); // z2 ^ 2 GOTO_ERR_IF(para->method->bnModNistEccMul(t0, &r2->x, &r2->z, para->montP, opt), ret); // X2 * Z2 GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 2 * X2 * Z2 GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 4 * X2 * Z2 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, para->a, &r3->y, para->montP, opt), ret); // aZZ = a * ZZ GOTO_ERR_IF(para->method->bnModNistEccMul(t2, &r2->x, &r3->x, para->montP, opt), ret); // X2 * X3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r2->z, &r3->z, para->montP, opt), ret); // Z2 * Z3 GOTO_ERR_IF(para->method->bnModNistEccMul(t4, &r2->x, &r3->z, para->montP, opt), ret); // X2 * Z3 GOTO_ERR_IF(para->method->bnModNistEccMul(t5, &r2->z, &r3->x, para->montP, opt), ret); // Z2 * X3 GOTO_ERR_IF(BN_ModSubQuick(&r2->x, &r2->y, t1, para->p, opt), ret); // XX - aZZ GOTO_ERR_IF(BN_ModAddQuick(&r2->z, &r2->y, t1, para->p, opt), ret); // XX + aZZ GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->z, t0, &r2->z, para->montP, opt), ret); // E * (XX + aZZ) GOTO_ERR_IF(para->method->bnModNistEccMul(t0, t0, &r3->y, para->montP, opt), ret); // E * ZZ GOTO_ERR_IF(para->method->bnModNistEccMul(t0, t0, para->b, para->montP, opt), ret); // b * E * ZZ GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 2b * E * ZZ GOTO_ERR_IF(para->method->bnModNistEccSqr(&r2->x, &r2->x, para->montP, opt), ret); // (XX - aZZ) ^ 2 GOTO_ERR_IF(BN_ModSubQuick(&r2->x, &r2->x, t0, para->p, opt), ret); // (XX - aZZ) ^ 2 - 2b * E * ZZ GOTO_ERR_IF(para->method->bnModNistEccSqr(&r3->y, &r3->y, para->montP, opt), ret); // ZZ ^ 2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r3->y, &r3->y, para->b, para->montP, opt), ret); // b * ZZ^2 GOTO_ERR_IF(BN_ModAddQuick(&r3->y, &r3->y, &r3->y, para->p, opt), ret); // 2 * b * ZZ^2 GOTO_ERR_IF(BN_ModAddQuick(&r3->y, &r3->y, &r3->y, para->p, opt), ret); // 4 * b * ZZ^2 GOTO_ERR_IF(BN_ModAddQuick(&r2->z, &r2->z, &r3->y, para->p, opt), ret); // E * (XX + aZZ) + 4 * b * ZZ^2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r3->x, para->a, t3, para->montP, opt), ret); // a * B GOTO_ERR_IF(BN_ModSubQuick(&r3->x, t2, &r3->x, para->p, opt), ret); // A - a * B GOTO_ERR_IF(para->method->bnModNistEccSqr(&r3->x, &r3->x, para->montP, opt), ret); // (A - a * B) ^ 2 GOTO_ERR_IF(BN_ModAddQuick(t2, t4, t5, para->p, opt), ret); // C + D GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t3, para->montP, opt), ret); // B * (C + D) GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, para->b, para->montP, opt), ret); // b * B * (C + D) GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 2 * b * B * (C + D) GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 4 * b * B * (C + D) GOTO_ERR_IF(BN_ModSubQuick(&r3->x, &r3->x, t2, para->p, opt), ret); // (A - a * B) ^ 2 - 4 * b * B * (C + D) GOTO_ERR_IF(BN_ModSubQuick(t4, t4, t5, para->p, opt), ret); // C - D GOTO_ERR_IF(para->method->bnModNistEccSqr(t4, t4, para->montP, opt), ret); // (C - D) ^ 2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r3->z, &p->x, t4, para->montP, opt), ret); // px * (C + D) ^ 2 ERR: OptimizerEnd(opt); return ret; } /* * ref <Weierstraß Elliptic Curves and side-Channel Attacks> formula 8. * XZ coordinates [database entry] represent x y as X Z satisfying the following equations: * x = X / Z * MontLadderRecoverYAndToMont return: * r1->x = r1->x / r1->z * r1->y = (2b + (a + x*x1)*(x + x1) - x2(x - x1)^2) / (2*y) * = (2b*z2*(z1^2) + z2(a*z1 + x*x1)(x*z1 + x1) - x2(x*z1 - x1) ^ 2) / (2y*z2*(z1^2)) */ static int32_t MontLadderRecoverYAndToMont(ECC_Para *para, ECC_Point *r1, ECC_Point *r2, ECC_Point *p, BN_Optimizer *opt) { int32_t ret; if (BN_IsZero(&r1->z)) { para->method->bnMontDec(&r1->x, para->montP); para->method->bnMontDec(&r1->y, para->montP); return CRYPT_SUCCESS; } if (BN_IsZero(&r2->z)) { GOTO_ERR_IF(ECC_CopyPoint(r1, p), ret); // r2 = r1 + p = 0 -> r1 = -p GOTO_ERR_IF(BN_Sub(&r1->y, para->p, &r1->y), ret); para->method->bnMontDec(&r1->x, para->montP); para->method->bnMontDec(&r1->y, para->montP); GOTO_ERR_IF(BN_SetLimb(&r1->z, 1), ret); return CRYPT_SUCCESS; } (void)OptimizerStart(opt); BN_BigNum *t0 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t1 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, p->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, p->x.room); if (t0 == NULL || t1 == NULL || t2 == NULL || t3 == NULL) { OptimizerEnd(opt); return CRYPT_MEM_ALLOC_FAIL; // Other bn do not need to be released. They are managed by the opt. } GOTO_ERR_IF(para->method->bnModNistEccSqr(t0, &r1->z, para->montP, opt), ret); // t0 = z1 ^ 2 GOTO_ERR_IF(para->method->bnModNistEccMul(t0, t0, &r2->z, para->montP, opt), ret); // t0 = z2 * z1^2 GOTO_ERR_IF(BN_ModAddQuick(t1, para->b, para->b, para->p, opt), ret); // 2b GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t0, t1, para->montP, opt), ret); // t1 = 2b*z2*z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, para->a, &r1->z, para->montP, opt), ret); // t2 = a*z1 GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->y, &p->x, &r1->x, para->montP, opt), ret); // r2->y = x*x1 GOTO_ERR_IF(para->method->bnModNistEccMul(&r1->y, &p->x, &r1->z, para->montP, opt), ret); // t4 = x*z1 GOTO_ERR_IF(BN_ModAddQuick(t2, t2, &r2->y, para->p, opt), ret); // a*z1 + x*x1 GOTO_ERR_IF(BN_ModAddQuick(&r1->y, &r1->y, &r1->x, para->p, opt), ret); // x*z1 + x1 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &r2->z, para->montP, opt), ret); // (a*z1 + x*x1) * z2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &r1->y, para->montP, opt), ret); // t2=(a*z1+x*x1)*z2*(x*z1+x1) GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->y, &p->x, &r1->z, para->montP, opt), ret); // x * z1 GOTO_ERR_IF(BN_ModSubQuick(&r2->y, &r2->y, &r1->x, para->p, opt), ret); // x * z1 - x1 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r2->y, &r2->y, para->montP, opt), ret); // (x * z1 - x1) ^ 2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->y, &r2->y, &r2->x, para->montP, opt), ret); // x2 * (x * z1 - x1) ^ 2 GOTO_ERR_IF(BN_ModAddQuick(t1, t1, t2, para->p, opt), ret); // 2b*z2*z1^2 + t2 GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &r2->y, para->p, opt), ret); // 2b*z2*z1^2 + t2 - r2->y GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &r1->z, para->montP, opt), ret); // (2b*z2*z1^2 - t2 - r2->y) * z1 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t0, &p->y, para->montP, opt), ret); // t2 = z2 * z1^2 * y GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 2 * y * z2 * z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t0, &r1->x, t2, para->montP, opt), ret); // x * (2 * y * z2 * z1^2) GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &r1->z, para->montP, opt), ret); // (2 * y * z2 * z1^2) * z1 para->method->bnMontDec(t2, para->montP); GOTO_ERR_IF(para->method->modInv(t2, t2, para->p, opt), ret); // (2 * y * z2 * z1^2) * -1 GOTO_ERR_IF(para->method->bnMontEnc(t2, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r1->x, t0, t2, para->montP, opt), ret); // x1 / z1 // (2b*z2*z1^2 - t2 - t3) * ((2 * y * z2 * z1^2) GOTO_ERR_IF(para->method->bnModNistEccMul(&r1->y, t1, t2, para->montP, opt), ret); para->method->bnMontDec(&r1->x, para->montP); para->method->bnMontDec(&r1->y, para->montP); GOTO_ERR_IF(BN_SetLimb(&r1->z, 1), ret); // x * (2 * y * z2 * z1^2) ERR: OptimizerEnd(opt); return ret; } /* * XZ coordinates for short Weierstrass curves * 2M + 5S + 1*b2 + 1*a + 1*b4 * https://hyperelliptic.org/EFD/g1p/auto-shortw-xz.html#doubling-dbl-2002-bj-3 * p->z = 1, the above formula can reduce the calculation amount. * MontLadderDouble return: * r = 2 * p */ static int32_t MontLadderDouble(const ECC_Para *para, ECC_Point *r, ECC_Point *p, BN_Optimizer *opt) { int32_t ret; (void)OptimizerStart(opt); BN_BigNum *t0 = OptimizerGetBn(opt, p->x.room); if (t0 == NULL) { return CRYPT_MEM_ALLOC_FAIL; } GOTO_ERR_IF(para->method->bnModNistEccSqr(t0, &p->x, para->montP, opt), ret); // x^2 GOTO_ERR_IF(BN_ModAddQuick(&r->y, &p->x, &p->x, para->p, opt), ret); // 2 * x GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret); // ry = 4 * x * z = 4 * x (z = 1) GOTO_ERR_IF(BN_ModSubQuick(&r->x, t0, para->a, para->p, opt), ret); // t0 - a GOTO_ERR_IF(BN_ModAddQuick(&r->z, t0, para->a, para->p, opt), ret); // t0 + a GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, &r->x, para->montP, opt), ret); // (t0 - a)^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t0, para->b, &r->y, para->montP, opt), ret); // b * ry GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t0, para->p, opt), ret); // (t0 - a)^2 - b * ry GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t0, para->p, opt), ret); // (t0 - a)^2 - 2 * b * ry GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &r->z, para->montP, opt), ret); // ry * (t0 + a) GOTO_ERR_IF(BN_ModAddQuick(t0, para->b, para->b, para->p, opt), ret); // 2 * b GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 4 * b GOTO_ERR_IF(BN_ModAddQuick(&r->z, &r->z, t0, para->p, opt), ret); // ry * (t0 + a) + 4 * b ERR: OptimizerEnd(opt); return ret; } static int32_t ECP_PointSwapWithMask(ECC_Point *a, ECC_Point *b, BN_UINT mask) { int32_t ret; GOTO_ERR_IF(BN_SwapWithMask(&a->x, &b->x, mask), ret); GOTO_ERR_IF(BN_SwapWithMask(&a->y, &b->y, mask), ret); GOTO_ERR_IF(BN_SwapWithMask(&a->z, &b->z, mask), ret); ERR: return ret; } /* * ref <Weierstraß Elliptic Curves and side-Channel Attacks> * Montgomery ladder to achieve k * Pt */ int32_t ECP_PointMulMont(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { if (para == NULL || r == NULL || k == NULL) { return CRYPT_NULL_INPUT; } if (((pt != NULL) && (para->id != pt->id)) || (para->id != r->id)) { return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (pt != NULL && BN_IsZero(&pt->z)) { return CRYPT_ECC_POINT_AT_INFINITY; } if (BN_IsZero(k)) { BN_Zeroize(&r->z); return CRYPT_SUCCESS; } if (BN_Cmp(k, para->n) == 0 && pt != NULL) { return ECP_PointMulFast(para, r, para->n, pt); } int32_t ret; BN_UINT mask1 = 0; BN_UINT mask2 = 0; BN_UINT tmp; uint32_t bits; ECC_Point *base = (pt != NULL) ? ECC_DupPoint(pt) : ECC_GetGFromPara(para); ECC_Point *r1 = ECC_NewPoint(para); BN_Optimizer *opt = BN_OptimizerCreate(); if (base == NULL || r1 == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // Convert base to affine. GOTO_ERR_IF(ECP_Point2Affine(para, base, base), ret); GOTO_ERR_IF(ECC_PointToMont(para, base, opt), ret); GOTO_ERR_IF(ECC_CopyPoint(r, base), ret); // r = base GOTO_ERR_IF(MontLadderDouble(para, r1, r, opt), ret); bits = BN_Bits(k); for (uint32_t i = bits - 1; i > 0; i--) { tmp = BN_GetBit(k, i - 1); mask2 = (-tmp) & BN_MASK; GOTO_ERR_IF(ECP_PointSwapWithMask(r, r1, mask2 ^ mask1), ret); GOTO_ERR_IF(MontLadderDoubleAndAdd(para, r, r1, base, opt), ret); mask1 ^= (mask2 ^ mask1); } GOTO_ERR_IF(ECP_PointSwapWithMask(r, r1, mask1), ret); GOTO_ERR_IF(MontLadderRecoverYAndToMont(para, r, r1, base, opt), ret); ERR: BN_OptimizerDestroy(opt); ECC_FreePoint(r1); ECC_FreePoint(base); return ret; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_mont.c
C
unknown
41,082
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" #if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || defined(HITLS_CRYPTO_CURVE_SM2) static int32_t CreatTmpBn(BN_BigNum **t1, BN_BigNum **t2, BN_BigNum **t3, BN_BigNum **t4, uint32_t bits) { *t1 = BN_Create(bits); *t2 = BN_Create(bits); *t3 = BN_Create(bits); *t4 = BN_Create(bits); if (*t1 == NULL || *t2 == NULL || *t3 == NULL || *t4 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } return CRYPT_SUCCESS; } static void DestroyTmpBn( BN_BigNum *t1, BN_BigNum *t2, BN_BigNum *t3, BN_BigNum *t4) { BN_Destroy(t1); BN_Destroy(t2); BN_Destroy(t3); BN_Destroy(t4); } // Jacobian coordinate double the point int32_t ECP_NistPointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; uint32_t bits = BN_Bits(para->p); BN_Optimizer *opt = BN_OptimizerCreate(); BN_BigNum *t1 = BN_Create(bits); BN_BigNum *t2 = BN_Create(bits); BN_BigNum *t3 = BN_Create(bits); BN_BigNum *halfP = ECP_HalfPGet(para->p); if (t1 == NULL || t2 == NULL || t3 == NULL || halfP == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t2, &a->x, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t1, &a->x, t1, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t3, t2, t2, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t2, t3, t2, para->p, opt), ret); // t2 = 3*t2 GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &a->z, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r->y, &a->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t1, t3, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t2, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, t1, &r->y, para->p, opt), ret); ERR: BN_Destroy(t1); BN_Destroy(t2); BN_Destroy(t3); BN_Destroy(halfP); BN_OptimizerDestroy(opt); return ret; } // Jacobian coordinate multi-double the point: r = (2^m) * pt int32_t ECP_NistPointMultDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint32_t tm = m; int32_t ret; uint32_t bits = BN_Bits(para->p); BN_BigNum *ta = NULL, *tb = NULL, *tc = NULL, *tw = NULL; BN_BigNum *halfP = ECP_HalfPGet(para->p); BN_Optimizer *opt = BN_OptimizerCreate(); GOTO_ERR_IF_EX(CreatTmpBn(&ta, &tb, &tc, &tw, bits), ret); if (halfP == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(BN_Copy(&r->x, &a->x), ret); GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret); GOTO_ERR_IF(BN_Copy(&r->z, &a->z), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, &a->z, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, tw, para->p, opt), ret); while (tm > 0) { // 3.1 // ta = 3*(x^2 - tw) GOTO_ERR_IF(para->method->bnModNistEccSqr(ta, &r->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(tc, ta, tw, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(ta, tc, tc, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(ta, ta, tc, para->p, opt), ret); // tb = x*(y^2) GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(tb, tc, &r->x, para->p, opt), ret); // 3.2 // x = ta^2 - 2*tb GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, ta, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret); // z = zy GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, &r->y, para->p, opt), ret); // 3.3 // tc = y^4 GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, tc, para->p, opt), ret); // m = m - 1, if bit > 0, tw = tw * (y^4) tm--; if (tm > 0) { GOTO_ERR_IF(para->method->bnModNistEccMul(tw, tw, tc, para->p, opt), ret); } // 3.4 // y = 2*ta*(tb - x) - (y^4) GOTO_ERR_IF(BN_ModSubQuick(&r->y, tb, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, ta, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, tc, para->p, opt), ret); } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->p, opt), ret); ERR: DestroyTmpBn(ta, tb, tc, tw); BN_Destroy(halfP); BN_OptimizerDestroy(opt); return ret; } // Point addition calculation (Jacobian point a plus affine point b) // Algorithm Reference ECP_NistPointAddAffineMont. int32_t ECP_NistPointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { if (para == NULL || r == NULL || a == NULL || b == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (BN_IsZero(&a->z)) { // If point a is an infinity point, r = b return ECC_CopyPoint(r, b); } int32_t ret; uint32_t bits = BN_Bits(para->p); BN_Optimizer *opt = BN_OptimizerCreate(); BN_BigNum *t1 = NULL, *t2 = NULL, *t3 = NULL, *t4 = NULL; GOTO_ERR_IF_EX(CreatTmpBn(&t1, &t2, &t3, &t4, bits), ret); if (opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &a->z, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &b->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &b->y, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &a->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t2, t2, &a->y, para->p, opt), ret); if (BN_IsZero(t1)) { if (BN_IsZero(t2)) { // If two points are equal, use double the point for calculation. GOTO_ERR_IF(ECP_NistPointDouble(para, r, b), ret); goto ERR; } else { // Obtain the infinity point. GOTO_ERR_IF(BN_SetLimb(&r->z, 0), ret); goto ERR; } } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, t1, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t1, t3, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, &a->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t4, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t2, para->p, opt), ret); GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t4, &a->y, para->p, opt), ret); GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t4, para->p, opt), ret); ERR: DestroyTmpBn(t1, t2, t3, t4); BN_OptimizerDestroy(opt); return ret; } // Point addition calculation (Jacobian point a plus Jacobian point b) // Algorithm Reference ECP_NistPointAddMont. int32_t ECP_NistPointAdd(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { if (para == NULL || r == NULL || a == NULL || b == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (BN_IsZero(&a->z)) { // If point a is an infinity point, r = b return ECC_CopyPoint(r, b); } if (BN_IsZero(&b->z)) { // If point b is an infinity point, r = a return ECC_CopyPoint(r, a); } int32_t ret; BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t5 = OptimizerGetBn(opt, a->x.room); BN_BigNum *t6 = OptimizerGetBn(opt, a->x.room); if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t6 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &b->z, para->p, opt), ret); // Z2^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &b->z, para->p, opt), ret); // Z2^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t5, t1, &a->x, para->p, opt), ret); // U1 = X1*Z2^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t6, t2, &a->y, para->p, opt), ret); // S1 = Y1*Z2^3 GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, &a->z, para->p, opt), ret); // T3 = Z1^2 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &a->z, &b->y, para->p, opt), ret); // r->y = Y2*Z1 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, &b->z, para->p, opt), ret); // r->z = Z2*Z1 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, t3, &r->y, para->p, opt), ret); // S2 = Y2 * Z1^3 GOTO_ERR_IF(para->method->bnModNistEccMul(&r->x, t3, &b->x, para->p, opt), ret); // U2 = Z1^2 * X2 GOTO_ERR_IF(BN_ModSubQuick(t1, &r->x, t5, para->p, opt), ret); // H = U2 - U1 GOTO_ERR_IF(BN_ModSubQuick(t2, &r->y, t6, para->p, opt), ret); // r = S2 - S1 if (BN_IsZero(t1) && BN_IsZero(t2)) { GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret); goto ERR; } GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, t1, &r->z, para->p, opt), ret); // r->z = H * Z2*Z1 GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->p, opt), ret); // t3 = H^2 GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t3, para->p, opt), ret); // t1 = H^3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t5, para->p, opt), ret); // t3 = H^2 * U1 GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->p, opt), ret); // r->x = r ^ 2 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - H^2*U1 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - 2*H^2 * U1 GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // r ^ 2 - 2*H^2*U1 - H^3 GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // H^2 * U1 - X3 GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t2, t3, para->p, opt), ret); // r * (H^2 * U1 - X3) GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t6, para->p, opt), ret); // t1 = H^3 * S1 GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t1, para->p, opt), ret); // r * (H^2 * U1 - X3) - H^3 * S1 ERR: BN_OptimizerDestroy(opt); return ret; } #endif int32_t ECP_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { int32_t ret; BN_Optimizer *opt = NULL; if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } opt = BN_OptimizerCreate(); if (opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = BN_ModInv(r, a, para->n, opt); BN_OptimizerDestroy(opt); return ret; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_nist.c
C
unknown
13,482
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include <stdbool.h> #include "securec.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "crypt_bn.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "ecc_utils.h" #include "bsl_util_internal.h" #ifndef __SIZEOF_INT128__ #error "This nistp224 implementation require the compiler support 128-bits integer." #endif /* field element definition */ #define FELEM_BITS 224 #define FELEM_BYTES 28 #define LIMB_BITS (sizeof(uint64_t) << 3) #define LIMB_NUM 4 #define BASE_BITS 56 #define BASE_MASK 0x00ffffffffffffff /* The pre-calculation table of the G table has 16 points. */ #define TABLE_G_SIZE 16 /* The pre-calculation table of the P table has 17 points. */ #define TABLE_P_SIZE 17 /* * field elements, stored as arrays, all represented in little endian. * Each element of the array is called a digit, and each digit represents an extended 2^56-number-system digit, * that is, Felem can be expressed as: * f_0 + f_1 * 2^56 + f_2 * 2^112 + f_3 * 2^168 * LongFelem is the same, but twice the width of Felem. * It is used to store the result of multiplication of field elements. * Point is a point represented as a Jacobian coordinate */ typedef struct { uint64_t data[LIMB_NUM]; } Felem; typedef struct { uint128_t data[LIMB_NUM * 2 - 1]; } LongFelem; typedef struct { Felem x; Felem y; Felem z; } Point; /* ------------------------------------------------------------ */ /* ECP224 field order p, the value is 2^224 - 2^96 + 1, little endian. */ static const Felem FIELD_ORDER = { {0x0000000000000001, 0x00ffff0000000000, 0x00ffffffffffffff, 0x00ffffffffffffff} }; /* * A pre-calculated table of the base point G, which contains the (X, Y, Z) coordinates of k*G * * PRE_MUL_G divides all bits into four equal parts. * index Corresponding bit value of k * 0 0 0 0 0 0 + 0 + 0 + 0 * 1 0 0 0 1 0 + 0 + 0 + 1 * 2 0 0 1 0 0 + 0 + 2^56 + 0 * 3 0 0 1 1 0 + 0 + 2^56 + 1 * 4 0 1 0 0 0 + 2^112 + 0 + 0 * 5 0 1 0 1 0 + 2^112 + 0 + 1 * 6 0 1 1 0 0 + 2^112 + 2^56 + 0 * 7 0 1 1 1 0 + 2^112 + 2^56 + 1 * 8 1 0 0 0 2^168 + 0 + 0 + 0 * 9 1 0 0 1 2^168 + 0 + 0 + 1 * 10 1 0 1 0 2^168 + 0 + 2^56 + 0 * 11 1 0 1 1 2^168 + 0 + 2^56 + 1 * 12 1 1 0 0 2^168 + 2^112 + 0 + 0 * 13 1 1 0 1 2^168 + 2^112 + 0 + 1 * 14 1 1 1 0 2^168 + 2^112 + 2^56 + 0 * 15 1 1 1 1 2^168 + 2^112 + 2^56 + 1 */ static const Point PRE_MUL_G[TABLE_G_SIZE] = { { {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x003280d6115c1d21, 0x00c1d356c2112234, 0x007f321390b94a03, 0x00b70e0cbd6bb4bf}}, {{0x00d5819985007e34, 0x0075a05a07476444, 0x00fb4c22dfe6cd43, 0x00bd376388b5f723}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00fd9675666ebbe9, 0x00bca7664d40ce5e, 0x002242df8d8a2a43, 0x001f49bbb0f99bc5}}, {{0x0029e0b892dc9c43, 0x00ece8608436e662, 0x00dc858f185310d0, 0x009812dd4eb8d321}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x006d3e678d5d8eb8, 0x00559eed1cb362f1, 0x0016e9a3bbce8a3f, 0x00eedcccd8c2a748}}, {{0x00f19f90ed50266d, 0x00abf2b4bf65f9df, 0x00313865468fafec, 0x005cb379ba910a17}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x000641966cab26e3, 0x0091fb2991fab0a0, 0x00efec27a4e13a0b, 0x000499aa8a5f8ebe}}, {{0x007510407766af5d, 0x0084d929610d5450, 0x0081d77aae82f706, 0x006916f6d4338c5b}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00ea95ac3b1f15c6, 0x00086000905e82d4, 0x00dd323ae4d1c8b1, 0x00932b56be7685a3}}, {{0x009ef93dea25dbbf, 0x0041665960f390f0, 0x00fdec76dbe2a8a7, 0x00523e80f019062a}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00822fdd26732c73, 0x00a01c83531b5d0f, 0x00363f37347c1ba4, 0x00c391b45c84725c}}, {{0x00bbd5e1b2d6ad24, 0x00ddfbcde19dfaec, 0x00c393da7e222a7f, 0x001efb7890ede244}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x004c9e90ca217da1, 0x00d11beca79159bb, 0x00ff8d33c2c98b7c, 0x002610b39409f849}}, {{0x0044d1352ac64da0, 0x00cdbb7b2c46b4fb, 0x00966c079b753c89, 0x00fe67e4e820b112}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00e28cae2df5312d, 0x00c71b61d16f5c6e, 0x0079b7619a3e7c4c, 0x0005c73240899b47}}, {{0x009f7f6382c73e3a, 0x0018615165c56bda, 0x00641fab2116fd56, 0x0072855882b08394}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x000469182f161c09, 0x0074a98ca8d00fb5, 0x00b89da93489a3e0, 0x0041c98768fb0c1d}}, {{0x00e5ea05fb32da81, 0x003dce9ffbca6855, 0x001cfe2d3fbf59e6, 0x000e5e03408738a7}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00dab22b2333e87f, 0x004430137a5dd2f6, 0x00e03ab9f738beb8, 0x00cb0c5d0dc34f24}}, {{0x00764a7df0c8fda5, 0x00185ba5c3fa2044, 0x009281d688bcbe50, 0x00c40331df893881}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00b89530796f0f60, 0x00ade92bd26909a3, 0x001a0c83fb4884da, 0x001765bf22a5a984}}, {{0x00772a9ee75db09e, 0x0023bc6c67cec16f, 0x004c1edba8b14e2f, 0x00e2a215d9611369}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00571e509fb5efb3, 0x00ade88696410552, 0x00c8ae85fada74fe, 0x006c7e4be83bbde3}}, {{0x00ff9f51160f4652, 0x00b47ce2495a6539, 0x00a2946c53b582f4, 0x00286d2db3ee9a60}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x0040bbd5081a44af, 0x000995183b13926c, 0x00bcefba6f47f6d0, 0x00215619e9cc0057}}, {{0x008bc94d3b0df45e, 0x00f11c54a3694f6f, 0x008631b93cdfe8b5, 0x00e7e3f4b0982db9}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00b17048ab3e1c7b, 0x00ac38f36ff8a1d8, 0x001c29819435d2c6, 0x00c813132f4c07e9}}, {{0x002891425503b11f, 0x0008781030579fea, 0x00f5426ba5cc9674, 0x001e28ebf18562bc}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x009f31997cc864eb, 0x0006cd91d28b5e4c, 0x00ff17036691a973, 0x00f1aef351497c58}}, {{0x00dd1f2d600564ff, 0x00dead073b1402db, 0x0074a684435bd693, 0x00eea7471f962558}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} } }; /* * A pre-calculated table of the base point G, which contains the (X, Y, Z) coordinates of k*G * * PRE_MUL_G2[] = PRE_MUL_G[] * 2^28 * index Corresponding bit value of k * 0 0 0 0 0 0 + 0 + 0 + 0 * 1 0 0 0 1 0 + 0 + 0 + 2^28 * 2 0 0 1 0 0 + 0 + 2^84 + 0 * 3 0 0 1 1 0 + 0 + 2^84 + 2^28 * 4 0 1 0 0 0 + 2^140 + 0 + 0 * 5 0 1 0 1 0 + 2^140 + 0 + 2^28 * 6 0 1 1 0 0 + 2^140 + 2^84 + 0 * 7 0 1 1 1 0 + 2^140 + 2^84 + 2^28 * 8 1 0 0 0 2^196 + 0 + 0 + 0 * 9 1 0 0 1 2^196 + 0 + 0 + 2^28 * 10 1 0 1 0 2^196 + 0 + 2^84 + 0 * 11 1 0 1 1 2^196 + 0 + 2^84 + 2^28 * 12 1 1 0 0 2^196 + 2^140 + 0 + 0 * 13 1 1 0 1 2^196 + 2^140 + 0 + 2^28 * 14 1 1 1 0 2^196 + 2^140 + 2^84 + 0 * 15 1 1 1 1 2^196 + 2^140 + 2^84 + 2^28 */ static const Point PRE_MUL_G2[TABLE_G_SIZE] = { { {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x009665266dddf554, 0x009613d78b60ef2d, 0x00ce27a34cdba417, 0x00d35ab74d6afc31}}, {{0x0085ccdd22deb15e, 0x002137e5783a6aab, 0x00a141cffd8c93c6, 0x00355a1830e90f2d}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x001a494eadaade65, 0x00d6da4da77fe53c, 0x00e7992996abec86, 0x0065c3553c6090e3}}, {{0x00fa610b1fb09346, 0x00f1c6540b8a4aaf, 0x00c51a13ccd3cbab, 0x0002995b1b18c28a}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x007874568e7295ef, 0x0086b419fbe38d04, 0x00dc0690a7550d9a, 0x00d3966a44beac33}}, {{0x002b7280ec29132f, 0x00beaa3b6a032df3, 0x00dc7dd88ae41200, 0x00d25e2513e3a100}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00924857eb2efafd, 0x00ac2bce41223190, 0x008edaa1445553fc, 0x00825800fd3562d5}}, {{0x008d79148ea96621, 0x0023a01c3dd9ed8d, 0x00af8b219f9416b5, 0x00d8db0cc277daea}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x0076a9c3b1a700f0, 0x00e9acd29bc7e691, 0x0069212d1a6b0327, 0x006322e97fe154be}}, {{0x00469fc5465d62aa, 0x008d41ed18883b05, 0x001f8eae66c52b88, 0x00e4fcbe9325be51}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00825fdf583cac16, 0x00020b857c7b023a, 0x00683c17744b0165, 0x0014ffd0a2daf2f1}}, {{0x00323b36184218f9, 0x004944ec4e3b47d4, 0x00c15b3080841acf, 0x000bced4b01a28bb}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x0092ac22230df5c4, 0x0052f33b4063eda8, 0x00cb3f19870c0c93, 0x0040064f2ba65233}}, {{0x00fe16f0924f8992, 0x00012da25af5b517, 0x001a57bb24f723a6, 0x0006f8bc76760def}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x004a7084f7817cb9, 0x00bcab0738ee9a78, 0x003ec11e11d9c326, 0x00dc0fe90e0f1aae}}, {{0x00cf639ea5f98390, 0x005c350aa22ffb74, 0x009afae98a4047b7, 0x00956ec2d617fc45}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x004306d648c1be6a, 0x009247cd8bc9a462, 0x00f5595e377d2f2e, 0x00bd1c3caff1a52e}}, {{0x00045e14472409d0, 0x0029f3e17078f773, 0x00745a602b2d4f7d, 0x00191837685cdfbb}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x005b6ee254a8cb79, 0x004953433f5e7026, 0x00e21faeb1d1def4, 0x00c4c225785c09de}}, {{0x00307ce7bba1e518, 0x0031b125b1036db8, 0x0047e91868839e8f, 0x00c765866e33b9f3}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x003bfece24f96906, 0x004794da641e5093, 0x00de5df64f95db26, 0x00297ecd89714b05}}, {{0x00701bd3ebb2c3aa, 0x007073b4f53cb1d5, 0x0013c5665658af16, 0x009895089d66fe58}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x000fef05f78c4790, 0x002d773633b05d2e, 0x0094229c3a951c94, 0x00bbbd70df4911bb}}, {{0x00b2c6963d2c1168, 0x00105f47a72b0d73, 0x009fdf6111614080, 0x007b7e94b39e67b0}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00ad1a7d6efbe2b3, 0x00f012482c0da69d, 0x006b3bdf12438345, 0x0040d7558d7aa4d9}}, {{0x008a09fffb5c6d3d, 0x009a356e5d9ffd38, 0x005973f15f4f9b1c, 0x00dcd5f59f63c3ea}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00acf39f4c5ca7ab, 0x004c8071cc5fd737, 0x00c64e3602cd1184, 0x000acd4644c9abba}}, {{0x006c011a36d8bf6e, 0x00fecd87ba24e32a, 0x0019f6f56574fad8, 0x00050b204ced9405}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x00ed4f1cae7d9a96, 0x005ceef7ad94c40a, 0x00778e4a3bf3ef9b, 0x007405783dc3b55e}}, {{0x0032477c61b6e8c6, 0x00b46a97570f018b, 0x0091176d0a7e95d1, 0x003df90fbc4c7d0e}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} } }; /* --------------------------helper function-------------------------- */ /* * Convert big endian byte stream to Felem */ static void Bin2Felem(Felem *out, const uint8_t in[FELEM_BYTES]) { int32_t offset; for (int32_t i = LIMB_NUM - 1; i >= 0; --i) { offset = 7 * (LIMB_NUM - 1 - i); // 56bits occupy 7 bytes. out->data[i] = ((uint64_t)in[offset + 0] << 48) | // Byte 0 is shifted by 48 bits to the left. ((uint64_t)in[offset + 1] << 40) | // The 1st byte is shifted leftward by 40 bits. ((uint64_t)in[offset + 2] << 32) | // The 2nd byte is shifted leftward by 32 bits. ((uint64_t)in[offset + 3] << 24) | // The 3rd byte is shifted leftward by 24 bits. ((uint64_t)in[offset + 4] << 16) | // The 4th byte is shifted leftward by 16 bits. ((uint64_t)in[offset + 5] << 8) | // The 5th byte is shifted leftward by 8 bits. ((uint64_t)in[offset + 6]); // No shift is required for the 6th byte. } } /* * Convert Felem to big-endian byte stream * Input: * in[] < 2^56 * Output: * the length of out is 28 */ static void Felem2Bin(uint8_t out[FELEM_BYTES], const Felem *in) { int32_t offset; for (int32_t i = LIMB_NUM - 1; i >= 0; --i) { offset = 7 * (LIMB_NUM - 1 - i); // 56bits occupy 7 bytes. out[offset + 0] = (uint8_t)(in->data[i] >> 48); // out[i + 0] get 48~55 bits out[offset + 1] = (uint8_t)(in->data[i] >> 40); // out[i + 1] get 40~47 bits out[offset + 2] = (uint8_t)(in->data[i] >> 32); // out[i + 2] get 32~39 bits out[offset + 3] = (uint8_t)(in->data[i] >> 24); // out[i + 3] get 24~31 bits out[offset + 4] = (uint8_t)(in->data[i] >> 16); // out[i + 4] get 16~23 bits out[offset + 5] = (uint8_t)(in->data[i] >> 8); // out[i + 5] get 8~15 bits out[offset + 6] = (uint8_t)in->data[i]; // out[i + 6] get 0~7 bits } } /* * Convert BN to Felem * Output: * out[] < 2^56 */ static int32_t BN2Felem(Felem *out, const BN_BigNum *in) { int32_t retVal; uint8_t bin[FELEM_BYTES]; uint32_t len = FELEM_BYTES; GOTO_ERR_IF(BN_Bn2Bin(in, bin, &len), retVal); for (uint32_t i = 0; i < FELEM_BYTES; ++i) { bin[FELEM_BYTES - 1 - i] = i < len ? bin[len - 1 - i] : 0; } Bin2Felem(out, bin); ERR: return retVal; } /* * Convert Felem to BN * Input: * in[] < 2^56 */ static int32_t Felem2BN(BN_BigNum *out, const Felem *in) { int32_t retVal; uint8_t bin[FELEM_BYTES]; Felem2Bin(bin, in); GOTO_ERR_IF(BN_Bin2Bn(out, bin, FELEM_BYTES), retVal); ERR: return retVal; } /* ---------------------------field operation--------------------------- */ /* * Assignment */ static inline void FelemAssign(Felem *out, const Felem *in) { out->data[0] = in->data[0]; // out->data[0] takes the value out->data[1] = in->data[1]; // out->data[1] takes the value out->data[2] = in->data[2]; // out->data[2] takes the value out->data[3] = in->data[3]; // out->data[3] takes the value } /* * Copy bits by mask. If the corresponding bit is 1, copy the bit. If the corresponding bit is 0, retain the bit. */ static inline void FelemAssignWithMask(Felem *out, const Felem *in, const uint64_t mask) { uint64_t rmask = ~mask; out->data[0] = (in->data[0] & mask) | (out->data[0] & rmask); // out->data[0] get a new value or remain unchanged. out->data[1] = (in->data[1] & mask) | (out->data[1] & rmask); // out->data[1] get a new value or remain unchanged. out->data[2] = (in->data[2] & mask) | (out->data[2] & rmask); // out->data[2] get a new value or remain unchanged. out->data[3] = (in->data[3] & mask) | (out->data[3] & rmask); // out->data[3] get a new value or remain unchanged. } /* * Set the lowest digit */ static inline void FelemSetLimb(Felem *out, const uint64_t in) { out->data[0] = in; // out->data[0] takes the value out->data[1] = 0; // out->data[1] clear to 0 out->data[2] = 0; // out->data[2] clear to 0 out->data[3] = 0; // out->data[3] clear to 0 } /* * Zero judgment: is input less than(2^224 + 2^(16 + 192)). Only 0 and p need to be judged. * Input: * in[] < 2^56 + 2^16 * - in[0] < 2^56 * - in[1] < 2^56 * - in[2] < 2^56 * - in[3] < 2^56 + 2^16 */ static inline uint64_t FelemIsZero(const Felem *in) { uint64_t isZero, isP; // Check whether digits 0, 1, 2, and 3 of in are all 0. isZero = in->data[0] | in->data[1] | in->data[2] | in->data[3]; isZero -= 1; // If in == 0, the most significant bit is 1. // Determine that in is equal to the field order. isP = (in->data[0] ^ FIELD_ORDER.data[0]) | // Determines whether the digits 0 are equal. (in->data[1] ^ FIELD_ORDER.data[1]) | // Determines whether the digits 1 are equal. (in->data[2] ^ FIELD_ORDER.data[2]) | // Determines whether the digits 2 are equal. (in->data[3] ^ FIELD_ORDER.data[3]); // Determines whether the digits 3 are equal. isP -= 1; // If in == p, the most significant bit is 1 return (isZero | isP) >> (LIMB_BITS - 1); } /* * Obtain the bit string whose length is len at idx in Felem. * Input: * in[i] < 2^56 * 0 < len <= 64 */ static uint64_t FelemGetBits(const Felem *in, int32_t idx, uint32_t len) { uint64_t ret; uint32_t lower, upper; uint64_t mask; lower = (uint32_t)idx; // when 0 <= lower < 224, the most significant bit is 1. Obtain the most significant bit by right shifted by 31 bits mask = (uint64_t)0 - ((~lower & (lower - 224)) >> 31); ret = (in->data[(lower / BASE_BITS) & mask] & BASE_MASK & mask) >> (lower % BASE_BITS); upper = (uint32_t)idx + BASE_BITS; // Next Unary Block // when 0 <= upper < 224, the most significant bit is 1. Obtain the most significant bit by right shifted by 31 bits mask = (uint64_t)0 - ((~upper & (upper - 224)) >> 31); ret |= (in->data[(upper / BASE_BITS) & mask] & BASE_MASK & mask) << (BASE_BITS - upper % BASE_BITS); ret &= ((uint64_t)1 << len) - 1; // All 1s of the len length return ret; } /* * field element reduction, retain the lower 56 bits of each Limb in the 4-ary Felem, * perform reduction on the upper bits, and perform modulo operation to reduce all Limbs to [0, 2 ^ 56 + 2 ^ 7). * Input: * in[] < 2^63 * Output: * out[] < 2^56 + 2^7 * - out[0] < 2^56 * - out[1] < 2^56 * - out[2] < 2^56 * - out[3] < 2^56 + 2^7 */ static void FelemReduce(Felem *out, const Felem *in) { uint64_t carryLimb = in->data[3] >> BASE_BITS; const uint64_t borrow = (uint64_t)1 << 56; const uint64_t lend = 1; // reduction carryLimb * (2^96 - 1), because it's the non-negative number, it must can be borrowed. // Calculate out->data[0] out->data[0] = in->data[0] + borrow - carryLimb; // carryLimb * (-1) // Calculate out->data[1] out->data[1] = in->data[1] + (out->data[0] >> BASE_BITS) + (carryLimb << 40) - lend; // carryLimb * 2^(56 + 40) // Calculate out->data[2] out->data[2] = in->data[2] + (out->data[1] >> BASE_BITS); // Calculate out->data[3] out->data[3] = (in->data[3] & BASE_MASK) + (out->data[2] >> BASE_BITS); // < 2^56 + 2^7 out->data[0] &= BASE_MASK; // out->data[0] Take the lower bits. out->data[1] &= BASE_MASK; // out->data[1] Take the lower bits. out->data[2] &= BASE_MASK; // out->data[2] Take the lower bits. } /* * field element reduction, convert 7-ary LongFelem to 4-ary Felem, * and modulo reduction to all Limbs to [0, 2 ^ 56 + 2 ^ 16) * Input: * in[] < 2^126 * Output: * out[] < 2^56 + 2^16 * - out[0] < 2^56 * - out[1] < 2^56 * - out[2] < 2^56 * - out[3] < 2^56 + 2^16 */ static void LongFelemReduce(Felem *out, const LongFelem *in) { const uint128_t *pi = in->data; // p shifts left by 15 static const LongFelem zeroBase = { { (((uint128_t)1 << 112) - ((uint128_t)1 << 96) + 1) << 15, // 2^127 - 2^111 + 2^15 (((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 15, // 2^127 - 2^71 (((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 15, // 2^127 - 2^71 0, 0, 0, 0, } }; uint128_t lout[4] = { zeroBase.data[0] + pi[0], // < 2^127 + 2^126 - 2^111 + 2^15 zeroBase.data[1] + pi[1], // < 2^127 + 2^126 - 2^71 zeroBase.data[2] + pi[2], // < 2^127 + 2^126 - 2^71 pi[3] // < 2^126 }; uint128_t carryLimb = pi[4]; // < 2^126 // n = n / a * (a - b) ≡ n / a * b (mod (a - b)) // It can be obtained from the above formula: // 2^n = 2^(n - 128) - 2^(n - 224) (mod (2^224 - 2^96 + 1)) // // The following equation can be listed: // 2^224 mod p // = 2^96 - 1 // // 2^280 mod p // = 2^152 - 2^56 // // 2^336 mod p // = 2^208 - 2^112 // reduce pi[6] and obtain the part higher 16 bits. carryLimb += pi[6] >> 16; // lout[3], reduce pi[6], shift leftwards by 40 bits then truncate; reduce pi[5] and obtain the part higher 16 bits. lout[3] += ((pi[6] << 40) & BASE_MASK) + (pi[5] >> 16); // lout[2], reduce pi[5], leftshift by 40bit then truncate; reduce carryLimb, obtain the higher 16bits. reduce pi[6] lout[2] += ((pi[5] << 40) & BASE_MASK) + (carryLimb >> 16) - pi[6]; // lout[1], reduce carryLimb, shift leftwards by 40 bits then truncate; reduce pi[5] lout[1] += ((carryLimb << 40) & BASE_MASK) - pi[5]; // lout[0], reduce carryLimb lout[0] -= carryLimb; // Range after reduction: // carryLimb < 2^126 + 2^110 // lout[3] < 2^126 + 2^56 + 2^110 < 2^127 // lout[2] < (2^127 + 2^126 - 2^71) + 2^56 + (2^110 + 2^94) < 2^128 // lout[1] < (2^127 + 2^126 - 2^71) + 2^56 // lout[0] < 2^127 + 2^126 - 2^111 + 2^15 < 2^128 // carry lout[3] += lout[2] >> BASE_BITS; // lout[3] < 2^127 + 2^72 < 2^128 carryLimb = lout[3] >> BASE_BITS; // carryLimb < 2^72 lout[2] &= BASE_MASK; // lout[2] < 2^56 lout[3] &= BASE_MASK; // lout[3] < 2^56 // reduce carryLimb // lout[2],reduce carryLimb and obtain the part higher 16 bits. lout[2] += carryLimb >> 16; // lout[1],reduce carryLimb, shift leftwards by 40 bits then truncate; lout[1] += (carryLimb << 40) & BASE_MASK; // lout[0],reduce carryLimb lout[0] -= carryLimb; // Range after reduction: // lout[2] < 2^56 + 2^56 // lout[1] < (2^127 + 2^126 - 2^71 + 2^56) + 2^56 // lout[0] < 2^128 // carry lout[1] += lout[0] >> BASE_BITS; // lout[1] < (2^127 + 2^126 - 2^71 + 2^57 - 2^41) + 2^72 lout[2] += lout[1] >> BASE_BITS; // lout[2] < 2^57 + (2^71 + 2^70 + 2^16 - 2^15 + 1) < 2^72 out->data[0] = (uint64_t)lout[0] & BASE_MASK; // out->data[0] < 2^56 out->data[1] = (uint64_t)lout[1] & BASE_MASK; // out->data[1] < 2^56 out->data[2] = (uint64_t)lout[2] & BASE_MASK; // out->data[2] < 2^56 out->data[3] = (uint64_t)lout[3] + (uint64_t)(lout[2] >> BASE_BITS); // out->data[3] < 2^56 + 2^16 } /* * field element modulo in [0, p), call FelemReduce or LongFelemReduce in advance. * Input: * in[] < 2^56 + 2^16 * - in[0] < 2^56 * - in[1] < 2^56 * - in[2] < 2^56 * - in[3] < 2^56 + 2^16 * Output: * out < p, out[i] < 2^56 */ static void FelemContract(Felem *out, const Felem *in) { Felem tmp = {{in->data[0], in->data[1], in->data[2], in->data[3] & BASE_MASK}}; // tmp[] < 2^56 uint64_t carryLimb = in->data[3] >> BASE_BITS; // 0 or 1, because of in[3] < 2^56 + 2^16 uint64_t mask; // Check the mask greater than or equal to p. const uint64_t lower40Mask = 0x000000ffffffffff; // Lower 40-bit mask const uint64_t borrow = (uint64_t)1 << BASE_BITS; const uint64_t lend = 1; // Check whether tmp is greater than or equal to p. The upper 128 bits of p are all 1s and the lower 96 bits are 1. // If the upper 128 bits (digit 3, 2, and 1) are all 1s, the value is 1. Otherwise, the value is 0. mask = ((tmp.data[3] & tmp.data[2] & (tmp.data[1] | lower40Mask)) + 1) >> BASE_BITS; // If the lower 96 bits are not zero, the value is 1. Otherwise, the value is 0. mask &= (0 - ((tmp.data[1] & lower40Mask) | tmp.data[0])) >> (LIMB_BITS - 1); mask = 0 - mask; // If tmp is greater than or equal to p, the value is 1. Otherwise, the value is 0. // reduce carryLimb or subtract p. Note that carryLimb and mask cannot be true at the same time. // p_0 = 0x0000000000000001 tmp.data[0] = (tmp.data[0] ^ borrow) - carryLimb - (mask & FIELD_ORDER.data[0]); // p_1 = 0x00ffff0000000000 tmp.data[1] += carryLimb << 40; // reduction carryLimb * 2^(56 + 40) // If the value is less than p, remains unchanged. If it's greater than or equal to p, subtract 0x00ffff0000000000. // That is, the lower 40 bits remain unchanged, and other bits are set to 0. tmp.data[1] &= ~mask | lower40Mask; // Lend to the low bit: if reduce it, then 2^96 - 1 > 0, if minus p, then tmp[1] + tmp[0] > p_1 + p_2 tmp.data[1] -= lend; // If the value is less than p, remains unchanged. If it's greater than or equal to p, subtract 0x00ffffffffffffff. // That is, set to 0. tmp.data[2] &= ~mask; // p_2 = 0x00ffffffffffffff // If the value is less than p, remains unchanged. If it's greater than or equal to p, subtract 0x00ffffffffffffff. // That is, set to 0. tmp.data[3] &= ~mask; // p_3 = 0x00ffffffffffffff // carry 0 -> 1 -> 2 -> 3 out->data[0] = tmp.data[0] & BASE_MASK; // tmp.data[0] get the lower bits. out->data[1] = (tmp.data[1] += tmp.data[0] >> BASE_BITS) & BASE_MASK; // tmp.data[1] plus carry & get the lower bits out->data[2] = (tmp.data[2] += tmp.data[1] >> BASE_BITS) & BASE_MASK; // tmp.data[2] plus carry & get the lower bits out->data[3] = (tmp.data[3] += tmp.data[2] >> BASE_BITS) & BASE_MASK; // tmp.data[3] plus carry & get the lower bits } /* * field Addition */ static inline void FelemAdd(Felem *out, const Felem *a, const Felem *b) { out->data[0] = a->data[0] + b->data[0]; // out->data[0] takes the value out->data[1] = a->data[1] + b->data[1]; // out->data[1] takes the value out->data[2] = a->data[2] + b->data[2]; // out->data[2] takes the value out->data[3] = a->data[3] + b->data[3]; // out->data[3] takes the value } /* * field element negation(NOT) * Input: * in[] <= 2^57 - 2^41 - 2^1 * Output: * out[] <= 2^57 + 2^1 + in[] < 2^64 */ static inline void FelemNeg(Felem *out, const Felem *in) { static const Felem zeroBase = {{ (((uint64_t)1 << 56) + 1) << 1, (((uint64_t)1 << 56) - ((uint64_t)1 << 40) - 1) << 1, (((uint64_t)1 << 56) - 1) << 1, (((uint64_t)1 << 56) - 1) << 1, }}; out->data[0] = zeroBase.data[0] - in->data[0]; // out->data[0] takes the value out->data[1] = zeroBase.data[1] - in->data[1]; // out->data[1] takes the value out->data[2] = zeroBase.data[2] - in->data[2]; // out->data[2] takes the value out->data[3] = zeroBase.data[3] - in->data[3]; // out->data[3] takes the value } /* * field subtraction * Input: * a[] < 2^64 - 2^60 - 2^4,b[] <= 2^60 - 2^44 - 2^4 * Output: * out[] <= 2^60 + 2^4 + a[] < 2^64 */ static inline void FelemSub(Felem *out, const Felem *a, const Felem *b) { static const Felem zeroBase = {{ (((uint64_t)1 << 56) + 1) << 4, (((uint64_t)1 << 56) - ((uint64_t)1 << 40) - 1) << 4, (((uint64_t)1 << 56) - 1) << 4, (((uint64_t)1 << 56) - 1) << 4, }}; out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] takes the value out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] takes the value out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] takes the value out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] takes the value } /* * field subtraction, input LongFelem directly. * Input: * a[] < 2^128 - 2^124,b[] <= 2^124 - 2^68 - 2^52 * Output: * out[] <= 2^124 + a[] < 2^128 */ static void LongFelemSub(LongFelem *out, const LongFelem *a, const LongFelem *b) { // p shift left (8 + 56 * 3) static const LongFelem zeroBase = {{ ((uint128_t)1 << 112) << 12, (((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12, (((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12, (((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12, (((uint128_t)1 << 112) - ((uint128_t)1 << 56) + 1) << 12, // 1 (((uint128_t)1 << 112) - ((uint128_t)1 << 56) - ((uint128_t)1 << 40)) << 12, // -2^96 (((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12, // 2^224 }}; out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] takes the value out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] takes the value out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] takes the value out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] takes the value out->data[4] = zeroBase.data[4] + a->data[4] - b->data[4]; // out->data[4] takes the value out->data[5] = zeroBase.data[5] + a->data[5] - b->data[5]; // out->data[5] takes the value out->data[6] = zeroBase.data[6] + a->data[6] - b->data[6]; // out->data[6] takes the value } /* * field element magnification * Use only a small magnification factor to ensure that in[]*scalar does not overflow. */ static inline void FelemScale(Felem *out, const Felem *in, const uint32_t scalar) { out->data[0] = in->data[0] * scalar; // out->data[0] takes the value out->data[1] = in->data[1] * scalar; // out->data[1] takes the value out->data[2] = in->data[2] * scalar; // out->data[2] takes the value out->data[3] = in->data[3] * scalar; // out->data[3] takes the value } /* * field element magnification, input LongFelem directly. * Use only a small magnification factor to ensure that in[]*scalar does not overflow. */ static inline void LongFelemScale(LongFelem *out, const LongFelem *in, const uint32_t scalar) { out->data[0] = in->data[0] * scalar; // out->data[0] takes the value out->data[1] = in->data[1] * scalar; // out->data[1] takes the value out->data[2] = in->data[2] * scalar; // out->data[2] takes the value out->data[3] = in->data[3] * scalar; // out->data[3] takes the value out->data[4] = in->data[4] * scalar; // out->data[4] takes the value out->data[5] = in->data[5] * scalar; // out->data[5] takes the value out->data[6] = in->data[6] * scalar; // out->data[6] takes the value } /* * field Multiplication * Input: * a[] < 2^62, b[] < 2^62 * output: * out[] < a[] * b[] * 4 < 2^126 * - out[0] < 2^124 * - out[1] < 2^124 * 2 * - out[2] < 2^124 * 3 * - out[3] < 2^124 * 4 * - out[4] < 2^124 * 3 * - out[5] < 2^124 * 2 * - out[6] < 2^124 */ static void FelemMul(LongFelem *out, const Felem *a, const Felem *b) { // out[0] = a[0]*b[0] // out[1] = a[0]*b[1] + a[1]*b[0] // out[2] = a[0]*b[2] + a[1]*b[1] + a[2]*b[0] // out[3] = a[0]*b[3] + a[1]*b[2] + a[2]*b[1] + a[3]*b[0] // out[4] = a[1]*b[3] + a[2]*b[2] + a[3]*b[1] // out[5] = a[2]*b[3] + a[3]*b[2] // out[6] = a[3]*b[3] uint128_t *po = out->data; const uint64_t *pa = a->data; const uint64_t *pb = b->data; po[0] = (uint128_t)pa[0] * pb[0]; po[1] = (uint128_t)pa[0] * pb[1] + (uint128_t)pa[1] * pb[0]; po[2] = (uint128_t)pa[0] * pb[2] + (uint128_t)pa[1] * pb[1] + (uint128_t)pa[2] * pb[0]; po[3] = (uint128_t)pa[0] * pb[3] + (uint128_t)pa[1] * pb[2] + (uint128_t)pa[2] * pb[1] + (uint128_t)pa[3] * pb[0]; po[4] = (uint128_t)pa[1] * pb[3] + (uint128_t)pa[2] * pb[2] + (uint128_t)pa[3] * pb[1]; po[5] = (uint128_t)pa[2] * pb[3] + (uint128_t)pa[3] * pb[2]; po[6] = (uint128_t)pa[3] * pb[3]; } /* * field Square * Input: * a[] < 2^62 * output: * out[] < a[] * a[] * 4 < 2^126 * - out[0] < 2^124 * - out[1] < 2^124 * 2 * - out[2] < 2^124 * 3 * - out[3] < 2^124 * 4 * - out[4] < 2^124 * 3 * - out[5] < 2^124 * 2 * - out[6] < 2^124 */ static void FelemSqr(LongFelem *out, const Felem *a) { // out[0] = a[0]*a[0] // out[1] = a[0]*a[1]*2 // out[2] = a[0]*a[2]*2 + a[1]*a[1] // out[3] = a[0]*a[3]*2 + a[1]*a[2]*2 // out[4] = a[1]*a[3]*2 + a[2]*a[2] // out[5] = a[2]*a[3]*2 // out[6] = a[3]*a[3] const uint64_t *pa = a->data; uint64_t a1x2 = pa[1] << 1; uint64_t a2x2 = pa[2] << 1; out->data[0] = (uint128_t)pa[0] * pa[0]; out->data[1] = (uint128_t)pa[0] * a1x2; out->data[2] = (uint128_t)pa[0] * a2x2 + (uint128_t)pa[1] * pa[1]; out->data[3] = ((uint128_t)pa[0] * pa[3] + (uint128_t)pa[1] * pa[2]) << 1; out->data[4] = (uint128_t)pa[3] * a1x2 + (uint128_t)pa[2] * pa[2]; out->data[5] = (uint128_t)pa[3] * a2x2; out->data[6] = (uint128_t)pa[3] * pa[3]; } static inline void FelemMulReduce(Felem *out, const Felem *a, const Felem *b) { LongFelem ltmp; FelemMul(&ltmp, a, b); LongFelemReduce(out, &ltmp); } static inline void FelemSqrReduce(Felem *out, const Felem *in) { LongFelem ltmp; FelemSqr(&ltmp, in); LongFelemReduce(out, &ltmp); } /* * field element inversion * From Fermat's little theorem, in^(p - 2) = in^(-1) (mod p) * in^(-1) = in^(2^224 - 2^96 + 1 - 2) (mod p) * Input: * in[i] < 2^63 * Output: * reduce(out[i]) */ static void FelemInv(Felem *out, const Felem *in) { Felem inE1, inE6, inE24, inE96; // inEx indicates in^(2^(0)+2^(1)+'''+2^(x-1)) uint32_t i; // Construct inE1 FelemReduce(out, in); FelemAssign(&inE1, out); // Construct inE2 FelemSqrReduce(out, out); FelemMulReduce(out, out, &inE1); // Construct inE4, and store it in inE6 FelemAssign(&inE6, out); FelemSqrReduce(&inE6, &inE6); FelemSqrReduce(&inE6, &inE6); FelemMulReduce(&inE6, out, &inE6); // inE6 is temporarily stored in inE4 // Construct in^6 FelemSqrReduce(&inE6, &inE6); FelemSqrReduce(&inE6, &inE6); FelemMulReduce(&inE6, out, &inE6); // Construct inE12 FelemAssign(out, &inE6); for (i = 0; i < 6; ++i) { // Moves the out by 6 digits to the left. FelemSqrReduce(out, out); } FelemMulReduce(out, &inE6, out); // Construct inE24 FelemAssign(&inE96, out); for (i = 0; i < 12; ++i) { // Moves the out by 12 digits to the left. FelemSqrReduce(out, out); } FelemMulReduce(&inE24, &inE96, out); // Construct inE48 FelemAssign(out, &inE24); for (i = 0; i < 24; ++i) { // Moves the out by 24 digits to the left. FelemSqrReduce(out, out); } FelemMulReduce(out, &inE24, out); // Construct inE96 FelemAssign(&inE96, out); for (i = 0; i < 48; ++i) { // Moves the out by 48 digits to the left. FelemSqrReduce(out, out); } FelemMulReduce(&inE96, &inE96, out); // Construct inE7, and store it in inE6 FelemSqrReduce(&inE6, &inE6); FelemMulReduce(&inE6, &inE6, &inE1); // Construct inE31, and store it in inE24 for (i = 0; i < 7; ++i) { // Moves the inE24 by 7 digits to the left. FelemSqrReduce(&inE24, &inE24); } FelemMulReduce(&inE24, &inE6, &inE24); // Construct inE127, and store it in inE24 FelemAssign(out, &inE96); for (i = 0; i < 31; ++i) { // Moves the out by 31 digits to the left. FelemSqrReduce(out, out); } FelemMulReduce(&inE24, &inE24, out); // Move inE127 by 97 bits to the left and add inE97 to obtain inE(2^224 - 2^96 + 1 - 2) for (i = 0; i < 97; ++i) { // shifts inE24 to the left by 97 bits, and inE24 stores inE127. FelemSqrReduce(&inE24, &inE24); } FelemMulReduce(out, &inE96, &inE24); } /* --------------------------Point group operation-------------------------- */ static inline void PtAssign(Point *out, const Point *in) { FelemAssign(&out->x, &in->x); FelemAssign(&out->y, &in->y); FelemAssign(&out->z, &in->z); } static inline void PtAssignWithMask(Point *out, const Point *in, const uint64_t mask) { FelemAssignWithMask(&out->x, &in->x, mask); FelemAssignWithMask(&out->y, &in->y, mask); FelemAssignWithMask(&out->z, &in->z, mask); } /* * double the point * Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b * Number of field operations: 3M + 5S * delta = Z^2 * gamma = Y^2 * beta = X * gamma * alpha = 3 * (X - delta) * (X + delta) * X' = alpha^2 - 8 * beta * Z' = (Y + Z)^2 - gamma - delta * Y' = alpha * (4 * beta - X') - 8 * gamma^2 * Input: * in->x[] < 2^59, in->y[] < 2^61, in->z[] < 2^61 * Output: * reduce(out->x), reduce(out->y), out->z[] < 2^61 */ static void PtDouble(Point *out, const Point *in) { Felem delta, gamma, beta, alpha; Felem tmp, tmp2; LongFelem ltmp, ltmp2; // delta = Z^2 FelemSqrReduce(&delta, &in->z); // gamma = Y^2 FelemSqrReduce(&gamma, &in->y); // beta = X * gamma FelemMulReduce(&beta, &in->x, &gamma); // alpha = 3 * (X - delta) * (X + delta) FelemAdd(&tmp, &in->x, &delta); // tmp[] < 2^59 + 2^57 < 2^60 FelemScale(&tmp, &tmp, 3); // tmp[] < 2^60 * 3 < 2^62 FelemSub(&tmp2, &in->x, &delta); // tmp2[] < 2^60 + 2^4 + 2^59 < 2^61 FelemMulReduce(&alpha, &tmp, &tmp2); // X' = alpha^2 - 8 * beta FelemSqrReduce(&tmp, &alpha); // alpha^2, tmp[] < 2^56 + 2^16 FelemScale(&tmp2, &beta, 8); // tmp2[] < (2^56 + 2^16) * 8 = 2^59 + 2^19 FelemSub(&out->x, &tmp, &tmp2); // xout[] < 2^60 + 2^4 + 2^56 + 2^16 < 2^61 FelemReduce(&out->x, &out->x); // xout[] < 2^56 + 2^7 // Z' = (Y + Z)^2 - gamma - delta FelemAdd(&tmp, &in->y, &in->z); // < 2^61 + 2^61 = 2^62 FelemSqrReduce(&tmp, &tmp); // (Y + Z)^2, tmp[] < 2^56 + 2^16 FelemAdd(&tmp2, &gamma, &delta); // (gamma + delta), tmp2[] < (2^56 + 2^16) * 2 = 2^57 + 2^17 FelemSub(&out->z, &tmp, &tmp2); // zout[] < 2^60 + 2^4 + 2^56 + 2^16 < 2^61 // Y' = alpha * (4 * beta - X') - 8 * gamma^2 FelemScale(&tmp, &beta, 4); // tmp[] < (2^56 + 2^16) * 4 = 2^58 + 2^18 FelemSub(&tmp, &tmp, &out->x); // tmp[] < 2^60 + 2^4 + 2^58 + 2^18 < 2^61 FelemMul(&ltmp, &alpha, &tmp); // alpha * (4 * beta - X'), ltmp[] < 2^(61 * 2) * 4 = 2^124 FelemSqr(&ltmp2, &gamma); // gamma < 2^57, ltmp2[] < 2^(57 * 2) * 4 = 2^116 LongFelemScale(&ltmp2, &ltmp2, 8); // 8 * gamma^2, ltmp2[] < 2^116 * 8 = 2^119 LongFelemSub(&ltmp, &ltmp, &ltmp2); // ltmp[] < 2^124 + 2^124 < 2^125 LongFelemReduce(&out->y, &ltmp); // yout[] < 2^56 + 2^16 } /* * point addition * Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-2007-bl * Infinity point calculation is not supported. * Number of field operations: 11M + 5S * Z1Z1 = Z1^2 * Z2Z2 = Z2^2 * U1 = X1 * Z2Z2 * U2 = X2 * Z1Z1 * S1 = Y1 * Z2 * Z2Z2 * S2 = Y2 * Z1 * Z1Z1 * H = U2 - U1 * I = (2 * H)^2 * J = H * I * r = 2 * (S2 - S1) * V = U1 * I * X3 = r^2 - J - 2 * V * Y3 = r * (V - X3) - 2 * S1 * J * Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H * Input: * a->x[] < 2^64, a->y[] < 2^64, a->z[] < 2^61 * reduce(b->x), b->y[] < 2^58, reduce(b->z) * Output: * out->x[] < max(reduce(out->x), a->x[]) * out->y[] < max(reduce(out->y), a->y[], b->y[]) * out->z[] < max(reduce(out->z), a->z[]) */ static void PtAdd(Point *out, const Point *a, const Point *b) { Point result; Felem z1sqr, z2sqr, u1, u2, s1, s2, h, i, j, r, v; Felem tmp; LongFelem ltmp, ltmp2; uint64_t isZ1Zero, isZ2Zero; // Z1Z1 = Z1^2 FelemSqrReduce(&z1sqr, &a->z); // Z2Z2 = Z2^2 FelemSqrReduce(&z2sqr, &b->z); isZ1Zero = 0 - FelemIsZero(&z1sqr); isZ2Zero = 0 - FelemIsZero(&z2sqr); // U1 = X1 * Z2Z2 FelemMulReduce(&u1, &a->x, &z2sqr); // U2 = X2 * Z1Z1 FelemMulReduce(&u2, &b->x, &z1sqr); // S1 = Y1 * Z2 * Z2Z2 FelemMulReduce(&s1, &b->z, &z2sqr); // Z2 * Z2Z2 FelemMulReduce(&s1, &a->y, &s1); // S2 = Y2 * Z1 * Z1Z1 FelemMulReduce(&s2, &a->z, &z1sqr); // Z1 * Z1Z1 FelemMulReduce(&s2, &b->y, &s2); // H = U2 - U1 FelemSub(&h, &u2, &u1); FelemReduce(&h, &h); // r = 2 * (S2 - S1) FelemSub(&r, &s2, &s1); FelemScale(&r, &r, 2); // 2 * (S2 - S1) FelemReduce(&r, &r); // H and r can determine whether x and y of the affine coordinates of two points are equal. // If the values are equal, double the values. if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) { // Use the smaller b point PtDouble(out, b); return; } // I = (2 * H)^2 FelemScale(&tmp, &h, 2); FelemSqrReduce(&i, &tmp); // J = H * I FelemMulReduce(&j, &h, &i); // V = U1 * I FelemMulReduce(&v, &u1, &i); // X3 = r^2 - (J + 2 * V) FelemSqrReduce(&result.x, &r); // r^2 FelemScale(&tmp, &v, 2); // tmp[] < (2^56 + 2^16) * 2 = 2^57 + 2^17 FelemAdd(&tmp, &tmp, &j); // J + 2 * V, tmp[] < (2^57 + 2^17) + (2^56 + 2^16) < 2^58 FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61 FelemReduce(&result.x, &result.x); // result.x[] < 2^56 + 2^7 // Y3 = r * (V - X3) - 2 * S1 * J FelemSub(&tmp, &v, &result.x); // tmp < (2^60 + 2^4) + (2^56 + 2^16) < 2^61 FelemMul(&ltmp, &r, &tmp); // r * (V - X3), ltmp[] < 2^57 * 2^61 * 4 = 2^120 FelemMul(&ltmp2, &s1, &j); // ltmp2[] < 2^57 * 2^57 * 4 = 2^116 LongFelemScale(&ltmp2, &ltmp2, 2); // 2 * S1 * J, ltmp2[] < 2^117 LongFelemSub(&ltmp, &ltmp, &ltmp2); // ltmp[] < 2^124 + 2^120 < 2^125 LongFelemReduce(&result.y, &ltmp); // result.y[] < 2^56 + 2^16 // Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H FelemAdd(&result.z, &a->z, &b->z); // Z1 + Z2, result.z[] < 2^61 + 2^57 < 2^62 FelemSqrReduce(&result.z, &result.z); // (Z1 + Z2)^2 FelemAdd(&tmp, &z1sqr, &z2sqr); // Z1Z1 + Z2Z2 FelemSub(&result.z, &result.z, &tmp); // ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) FelemMulReduce(&result.z, &result.z, &h); // result.z[] < 2^56 + 2^16 // Special case processing for infinity points PtAssignWithMask(&result, a, isZ2Zero); PtAssignWithMask(&result, b, isZ1Zero); PtAssign(out, &result); } /* * mixed addition of point * Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl * Infinity point calculation is not supported. * Number of field operations: 7M + 4S * Z1Z1 = Z1^2 * U2 = X2 * Z1Z1 * S2 = Y2 * Z1 * Z1Z1 * H = U2 - X1 * HH = H^2 * I = 4 * HH * J = H * I * r = 2 * (S2 - Y1) * V = X1 * I * X3 = r^2 - J - 2 * V * Y3 = r * (V - X3) - 2 * Y1 * J * Z3 = (Z1 + H)^2 - Z1Z1 - HH * Input: * a->x[] <= 2^60 - 2^44 - 2^4, a->y[] <= 2^60 - 2^44 - 2^4, a->z[] < 2^61 * b->x < p, b->y < p, b->z = 0 or 1 * Output: * out->x[] < max(reduce(out->x), a->x[]) * out->y[] < max(reduce(out->y), a->y[]) * out->z[] < 2^61 */ static void PtAddMixed(Point *out, const Point *a, const Point *b) { Point result; Felem z1sqr, u2, s2, h, hsqr, i, j, r, v; Felem tmp; LongFelem ltmp, ltmp2; uint64_t isZ1Zero, isZ2Zero; // Z1Z1 = Z1^2 FelemSqrReduce(&z1sqr, &a->z); isZ1Zero = 0 - FelemIsZero(&z1sqr); // The Z coordinate of point b can only be 0 or 1, that is, the bit 0 can only be 0 or 1, and the other bits are 0. isZ2Zero = b->z.data[0] - 1; // U2 = X2 * Z1Z1 FelemMulReduce(&u2, &b->x, &z1sqr); // S2 = Y2 * Z1 * Z1Z1 FelemMulReduce(&s2, &a->z, &z1sqr); // Z1 * Z1Z1 FelemMulReduce(&s2, &b->y, &s2); // H = U2 - X1 FelemSub(&h, &u2, &a->x); FelemReduce(&h, &h); // r = 2 * (S2 - Y1) FelemSub(&r, &s2, &a->y); // r[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61 FelemScale(&r, &r, 2); // r[] < 2^62 FelemReduce(&r, &r); // H and r can determine whether x and y of the affine coordinates of two points are equal. // If they are equal, double the point. if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) { // Use the smaller b point PtDouble(out, b); return; } // HH = H^2 FelemSqrReduce(&hsqr, &h); // I = 4 * HH FelemScale(&i, &hsqr, 4); // i[] < (2^56 + 2^16) * 4 = 2^58 + 2^18 // J = H * I FelemMulReduce(&j, &h, &i); // V = X1 * I FelemMulReduce(&v, &a->x, &i); // X3 = r^2 - J - 2 * V FelemSqrReduce(&result.x, &r); // r^2 FelemScale(&tmp, &v, 2); // 2 * V, tmp[] < (2^56 + 2^16) * 2 = 2^57 + 2^17 FelemAdd(&tmp, &j, &tmp); // J + 2 * V, tmp[] < (2^56 + 2^16) + (2^57 + 2^17) < 2^58 FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61 FelemReduce(&result.x, &result.x); // result.x[] < 2^56 + 2^7 // Y3 = r * (V - X3) - 2 * Y1 * J FelemSub(&tmp, &v, &result.x); // V - X3, tmp[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61 FelemMul(&ltmp, &r, &tmp); // r * (V - X3), ltmp[] < 2^57 * 2^61 * 4 = 2^120 FelemMul(&ltmp2, &a->y, &j); // Y1 * J, ltmp2[] < 2^61 * 2^57 * 4 = 2^120 LongFelemScale(&ltmp2, &ltmp2, 2); // 2 * Y1 * J, ltmp2[] < 2^120 * 2 = 2^121 LongFelemSub(&ltmp, &ltmp, &ltmp2); // ltmp[] < 2^124 + 2^120 < 2^125 LongFelemReduce(&result.y, &ltmp); // result.y[] < 2^56 + 2^16 // Z3 = (Z1 + H)^2 - Z1Z1 - HH FelemAdd(&result.z, &a->z, &h); // Z1 + H, result.z[] < 2^61 + (2^56 + 2^7) = 2^62 FelemSqrReduce(&result.z, &result.z); FelemAdd(&tmp, &z1sqr, &hsqr); // Z1Z1 + HH, tmp[] < (2^56 + 2^16) + (2^56 + 2^16) < 2^58 FelemSub(&result.z, &result.z, &tmp); // result.z[] < (2^60 + 2^4) + 2^58 < 2^61 // Special case processing for infinity points PtAssignWithMask(&result, a, isZ2Zero); PtAssignWithMask(&result, b, isZ1Zero); PtAssign(out, &result); } /* Select the point that subscript is index in the table and place it in the Point *point. The anti-side channel processing exists. */ static inline void GetPointFromTable(Point *point, const Point table[], uint32_t pointNum, const uint32_t index) { uint64_t mask; for (uint32_t i = 0; i < pointNum; i++) { /* If i is equal to index, the last mask is all Fs. Otherwise, the last mask is all 0s. */ mask = (0 - (i ^ index)) >> 31; // shifted rightwards by 31 bits to get the most significant bit mask--; /* Conditional value assignment, valid only when i == index */ PtAssignWithMask(point, &table[i], mask); } } /* * Input: * k1 < n * 0 <= i < 28 * Output: * out->x < p, out->y < p, out->z = 0 OR 1 */ static inline void GetUpperPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit) { uint32_t bits; uint32_t i = (uint32_t)curBit; // The i bit of the upper half of digit 0. (BASE_BITS/2) is half-wide. bits = (uint32_t)(k1->data[0] >> (i + BASE_BITS / 2)) & 1; // The i bit of the upper half of digit 1. (BASE_BITS/2) is half-wide. bits |= ((uint32_t)(k1->data[1] >> (i + BASE_BITS / 2)) & 1) << 1; // The i bit of the upper half of digit 2. (BASE_BITS/2) is half-wide. bits |= ((uint32_t)(k1->data[2] >> (i + BASE_BITS / 2)) & 1) << 2; // The i bit of the upper half of digit 3. (BASE_BITS/2) is half-wide. bits |= ((uint32_t)(k1->data[3] >> (i + BASE_BITS / 2)) & 1) << 3; GetPointFromTable(out, PRE_MUL_G2, TABLE_G_SIZE, bits); } /* * Input: * k1 < n * 0 <= i < 28 * Output: * out->x < p, out->y < p, out->z = 0 or 1 */ static inline void GetLowerPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit) { uint32_t bits; uint32_t i = (uint32_t)curBit; bits = (uint32_t)(k1->data[0] >> i) & 1; // The i bit of the lower half of digit 0. bits |= ((uint32_t)(k1->data[1] >> i) & 1) << 1; // The i bit of the lower half of digit 1. bits |= ((uint32_t)(k1->data[2] >> i) & 1) << 2; // The i bit of the lower half of digit 2. bits |= ((uint32_t)(k1->data[3] >> i) & 1) << 3; // The i bit of the lower half of digit 3. GetPointFromTable(out, PRE_MUL_G, TABLE_G_SIZE, bits); } /* * Input: * k2 < n * 0 <= i <= 220 * The coordinates of each point of preMulPt are reduced. * Output: * reduce(out->x) * out->y[] < max(reduce(out->y), negY) * reduce(out->z) */ static inline void GetPrecomputePtOfP(Point *out, const Felem *k2, int32_t curBit, const Point preMulPt[TABLE_P_SIZE]) { uint32_t bits; uint32_t sign, value; // the grouping sign and actual value. Felem negY; // Obtain the 5-bit signed code and read the sign bits of the next group of numbers // to determine whether there is a carry. The total length is 6. bits = (uint32_t)FelemGetBits(k2, curBit - 1, WINDOW_SIZE + 1); DecodeScalarCode(&sign, &value, bits); GetPointFromTable(out, preMulPt, TABLE_P_SIZE, value); // out->y < 2^56 + 2^16 FelemNeg(&negY, &out->y); // negY[] < (2^57 + 2^1) + (2^56 + 2^16) < 2^58 FelemAssignWithMask(&out->y, &negY, (uint64_t)0 - sign); } /* * Calculate k1 * G + k2 * P * Input: * k1 < n * k2 < n * The coordinates of each point of preMulPt are reduced. * Output: * out->x < p, out->y < p, out->z < p */ static void PtMul(Point *out, const Felem *k1, const Felem *k2, const Point preMulPt[TABLE_P_SIZE]) { Point ptQ = {}; // ptQ stores result Point ptPre = {}; // ptPre stores the points obtained from the table. bool isGMul = k1 != NULL; bool isPtMul = k2 != NULL && preMulPt != NULL; int32_t curBit; // Initialize the Q point. if (isPtMul) { curBit = 220; // Start from 220th bit. // From k2's (_, 223, 222, 221, 220, 219) bit coding to select the initial point GetPrecomputePtOfP(&ptQ, k2, curBit, preMulPt); } else if (isGMul) { curBit = 27; // Start from 27th. // From k1's (195, 139, 83, 27) bit coding to select the initial point GetLowerPrecomputePtOfG(&ptQ, k1, curBit); // From k1's (195 + 28, 139 + 28, 83 + 28, 27 + 28) bit to select the pre-calculation point // and adds it to the point Q. GetUpperPrecomputePtOfG(&ptPre, k1, curBit); PtAddMixed(&ptQ, &ptQ, &ptPre); } else { // k1 and k2 are all NULL, and the infinite point is output. (void)memset_s((void *)out, sizeof(Point), 0, sizeof(Point)); return; } // Operation chain: point Q output range: // x[] y[] z[] // Initialization the value reduced reduced < 2^61 // ↓ // Double ←↑ reduced reduced < 2^61 // ↓ ↑ // mixed add ↑ reduced reduced < 2^61 // ↓ ↑ // mixed add →↑ reduced reduced < 2^61 // ↓ ↑ // negation of Y ↑ reduced < 2^58 < 2^61 // ↓ ↑ // add →↑ reduced < 2^58 < 2^61 while (--curBit >= 0) { // Start to shift right bit by bit. Due to the initialization of the most significant bit, // common point multiplication starts from 219th bit and base point multiplication starts from 26th bit. // Whether G-point multiplication is performed in the current cycle, // calculated once in each cycle starting from bit 27. bool isStepGMul = curBit <= 27; // Whether the current cycle is a common point multiplication, calculated once every 5 cycles bool isStepPtMul = curBit % WINDOW_SIZE == 0; PtDouble(&ptQ, &ptQ); // Generator G multiplication part // Divide k1 into eight segments, from high bits to low bits, // select bits from each segment and combine them together, and read the pre-computation table. // To reduce the precomputation table, // the divided eight segments are combined according to the upper half and the lower half if (isGMul && isStepGMul) { // Add the point multiplication result of the current bit of the eight-segment to the point Q GetLowerPrecomputePtOfG(&ptPre, k1, curBit); PtAddMixed(&ptQ, &ptQ, &ptPre); GetUpperPrecomputePtOfG(&ptPre, k1, curBit); PtAddMixed(&ptQ, &ptQ, &ptPre); } // Common point multiplication part // Use the sliding window signed encoding method // to group the most significant bits to the least significant bits every five bits. // Each group of numbers is regarded as a signed number. 00000 to 01111 are decimal numbers 0 to 15, // and 10000 to 11111 are decimal numbers (32-16) to (32-1). // This is equivalent to the set the number in complement form after the number carries 1. // for example // 11011(Complement) = 100000 - 00101 if (isPtMul && isStepPtMul) { // Add the point multiplication result of the current group to the point Q. GetPrecomputePtOfP(&ptPre, k2, curBit, preMulPt); PtAdd(&ptQ, &ptQ, &ptPre); } } // Refer to the output range of the operation chain. Reduce the Y and Z coordinates. FelemReduce(&ptQ.y, &ptQ.y); FelemReduce(&ptQ.z, &ptQ.z); // do the modulo operation then output. FelemContract(&ptQ.x, &ptQ.x); FelemContract(&ptQ.y, &ptQ.y); FelemContract(&ptQ.z, &ptQ.z); PtAssign(out, &ptQ); } /* * Convert Jacobian coordinates to affine coordinates by a given module inverse */ static void PtMakeAffineWithInv(Point *out, const Point *in, const Felem *zInv) { Felem tmp; // 1/Z^2 FelemSqrReduce(&tmp, zInv); // X/Z^2 FelemMulReduce(&out->x, &in->x, &tmp); FelemContract(&out->x, &out->x); // 1/Z^3 FelemMulReduce(&tmp, &tmp, zInv); // Y/Z^3 FelemMulReduce(&out->y, &in->y, &tmp); FelemContract(&out->y, &out->y); FelemSetLimb(&out->z, 1); } /* * Obtain the pre-multiplication table of the input point pt, including 0pt-16pt. * The coordinates of all points are reduced. */ static int32_t GetPreMulPt(Point preMulPt[TABLE_P_SIZE], const ECC_Point *pt) { int32_t ret; // 0pt (void)memset_s((void *)&preMulPt[0], sizeof(Point), 0, sizeof(Point)); // 1pt GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].x, &pt->x), ret); GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].y, &pt->y), ret); GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].z, &pt->z), ret); // 2pt ~ 15pt for (uint32_t i = 2; i < 15; i += 2) { PtDouble(&preMulPt[i], &preMulPt[i >> 1]); // Z coordinate after the doubled point is reduced. FelemReduce(&preMulPt[i].z, &preMulPt[i].z); PtAdd(&preMulPt[i + 1], &preMulPt[i], &preMulPt[1]); } // 16pt PtDouble(&preMulPt[16], &preMulPt[16 >> 1]); // Z coordinate of the 16pt after the doubled point 16pt is reduced. FelemReduce(&preMulPt[16].z, &preMulPt[16].z); ERR: return ret; } int32_t ECP224_PointMulAdd( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t retVal; Felem fK1; Felem fK2; Point preMulPt[TABLE_P_SIZE]; Point out; // Check the input parameters. GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP224), retVal); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP224), retVal); GOTO_ERR_IF(CheckBnValid(k1, FELEM_BITS), retVal); GOTO_ERR_IF(CheckBnValid(k2, FELEM_BITS), retVal); GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP224), retVal); // Special treatment of infinity points if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } GOTO_ERR_IF_EX(BN2Felem(&fK1, k1), retVal); GOTO_ERR_IF_EX(BN2Felem(&fK2, k2), retVal); GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), retVal); PtMul(&out, &fK1, &fK2, preMulPt); GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), retVal); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), retVal); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), retVal); ERR: return retVal; } int32_t ECP224_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { int32_t retVal; Felem felemK; Point preMulPt[TABLE_P_SIZE]; Point out; // Check the input parameters. GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP224), retVal); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP224), retVal); GOTO_ERR_IF(CheckBnValid(k, FELEM_BITS), retVal); if (pt != NULL) { GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP224), retVal); // Special treatment of infinity points if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } } GOTO_ERR_IF_EX(BN2Felem(&felemK, k), retVal); // When pt is NULL, r = k * G if (pt == NULL) { PtMul(&out, &felemK, NULL, NULL); } else { // If pt is not null, r = k * pt GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), retVal); PtMul(&out, NULL, &felemK, preMulPt); } GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), retVal); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), retVal); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), retVal); ERR: return retVal; } int32_t ECP224_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { int32_t retVal; Point out; Felem zInv; // Check the input parameters. GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP224), retVal); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP224), retVal); GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP224), retVal); // Special treatment of infinity points if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } GOTO_ERR_IF_EX(BN2Felem(&out.x, &pt->x), retVal); GOTO_ERR_IF_EX(BN2Felem(&out.y, &pt->y), retVal); GOTO_ERR_IF_EX(BN2Felem(&out.z, &pt->z), retVal); FelemInv(&zInv, &out.z); PtMakeAffineWithInv(&out, &out, &zInv); GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), retVal); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), retVal); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), retVal); ERR: return retVal; } #endif /* defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_nistp224.c
C
unknown
62,396
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECP_NISTP224_H #define ECP_NISTP224_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include "ecc_local.h" #ifdef __cplusplus extern "C" { #endif /** * @brief Convert the point information pt to the affine coordinate system and refresh the data to r. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP224_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * @brief Calculate r = k1 * G + k2 * pt * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param k1 [IN] Scalar 1, with a maximum of 224 bits * @param k2 [IN] Scalar 2, with a maximum of 224 bits * @param pt [IN] Point data * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP224_PointMulAdd( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @brief If pt != NULL, calculate r = k * pt; otherwise, calculate r = k * G * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] scalar with a maximum of 224 bits. * @param pt [IN] Point data, which can be set to NULL. * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP224_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); #ifdef __cplusplus } #endif #endif /* defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */ #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_nistp224.h
C
unknown
2,337
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECP_NISTP256_H #define ECP_NISTP256_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256) #include "ecc_local.h" #ifdef __cplusplus extern "C" { #endif /** * @brief Convert the point information pt to the affine coordinate system and refresh the data to r. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * @brief Calculate r = k1 * G + k2 * pt * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param k1 [IN] Scalar 1, with a maximum of 256 bits * @param k2 [IN] Scalar 2, with a maximum of 256 bits * @param pt [IN] Point data * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP256_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @brief If pt != NULL, calculate r = k * pt; Otherwise, calculate r = k * G * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar, with a maximum of 256 bits * @param pt [IN] Point data, which can be set to NULL. * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @brief Calculate r = 1/a mod para->n * * @param para [IN] Curve parameter information * @param r [OUT] Output modulus inverse value * @param a [IN] input BigNum that needs to be inverted. * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); #ifdef __cplusplus } #endif #endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) */ #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_nistp256.h
C
unknown
2,671
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP521) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include <stdint.h> #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "ecc_utils.h" #include "bsl_util_internal.h" #ifndef __SIZEOF_INT128__ #error "This nistp521 implementation require the compiler support 128-bits integer." #endif #define FELEM_BITS 521 /* Each element of a BigNum array is carried by 2 ^ 58 */ #define BASE_BITS 58 /* The length of a BigNum array is 9: 58 * 9 = 522 > 521 */ #define NUM_LIMBS 9 /* Mask with 58 bits */ #define MASK_58BITS ((uint64_t)0x3FFFFFFFFFFFFFF) /* Mask with 57 bits */ #define MASK_57BITS ((uint64_t)0x1FFFFFFFFFFFFFF) /* The pre-calculation table of the G table has 16 points. */ #define TABLE_G_SIZE 16 /* The pre-calculation table of the P table has 17 points. */ #define TABLE_P_SIZE 17 /* Forcibly convert to uint128_t */ #define U128(x) ((uint128_t)(x)) /* Obtain the nth bit of a BigNum. The BigNum is stored in the uint64_t array in little-endian order. */ #define GET_ARRAY64_BIT(k, n) ((((k)->data)[(n) / 64] >> ((n) & 63)) & 1) typedef struct { uint64_t data[NUM_LIMBS]; } Array64; typedef struct { uint64_t data[NUM_LIMBS]; } Felem; typedef struct { uint128_t data[NUM_LIMBS]; } LongFelem; typedef struct { Felem x, y, z; /* Each point contains three coordinates x, y, and z. */ } Point; /* * The point type (Point) contains three field elements (Felem) (x, y, and z). * Each field element consists of nine 64-bit data blocks (uint64_t). * Point :pt * Felem :x * uint64_t :x[9] * Felem :y * uint64_t :y[9] * Felem :z * uint64_t :z[9] */ static inline void FelemToArray64(Array64 *array, const Felem *felem) { uint32_t shift = 0; for (int32_t i = 0; i + 1 < NUM_LIMBS; i++) { array->data[i] = (felem->data[i] >> shift) | (felem->data[i + 1] << (BASE_BITS - shift)); // i < 8, shift < 48 /* Felem is carried 1 every 58 bits, and array is carried 1 every 64 bits. The difference is 6 bits. */ shift += 6; } array->data[8] = felem->data[8] >> shift; /* felem->data[8] is the last data block. */ } static inline void Array64ToFelem(Felem *felem, const Array64 *array) { uint32_t shift = 0; felem->data[0] = array->data[0] & MASK_58BITS; for (int32_t i = 1; i < NUM_LIMBS; i++) { /* Felem is carried 1 every 58 bits, and array is carried 1 every 64 bits. The difference is 6 bits. */ shift += 6; felem->data[i] = ((array->data[i - 1] >> (64 - shift)) | (array->data[i] << shift)) & MASK_58BITS; } } static inline void FelemAssign(Felem *r, const Felem *a) { r->data[0] = a->data[0]; // r->data[0] take the value r->data[1] = a->data[1]; // r->data[1] take the value r->data[2] = a->data[2]; // r->data[2] take the value r->data[3] = a->data[3]; // r->data[3] take the value r->data[4] = a->data[4]; // r->data[4] take the value r->data[5] = a->data[5]; // r->data[5] take the value r->data[6] = a->data[6]; // r->data[6] take the value r->data[7] = a->data[7]; // r->data[7] take the value r->data[8] = a->data[8]; // r->data[8] take the value } static inline void FelemPointAssign(Point *ptR, const Point *ptIn) { FelemAssign(&ptR->x, &ptIn->x); FelemAssign(&ptR->y, &ptIn->y); FelemAssign(&ptR->z, &ptIn->z); } static inline void FelemAssignWithMask(Felem *r, const Felem *a, uint64_t mask) { uint64_t rmask = ~mask; r->data[0] = (a->data[0] & mask) | (r->data[0] & rmask); // r->data[0] Obtain a new value or remain unchanged. r->data[1] = (a->data[1] & mask) | (r->data[1] & rmask); // r->data[1] Obtain a new value or remain unchanged. r->data[2] = (a->data[2] & mask) | (r->data[2] & rmask); // r->data[2] Obtain a new value or remain unchanged. r->data[3] = (a->data[3] & mask) | (r->data[3] & rmask); // r->data[3] Obtain a new value or remain unchanged. r->data[4] = (a->data[4] & mask) | (r->data[4] & rmask); // r->data[4] Obtain a new value or remain unchanged. r->data[5] = (a->data[5] & mask) | (r->data[5] & rmask); // r->data[5] Obtain a new value or remain unchanged. r->data[6] = (a->data[6] & mask) | (r->data[6] & rmask); // r->data[6] Obtain a new value or remain unchanged. r->data[7] = (a->data[7] & mask) | (r->data[7] & rmask); // r->data[7] Obtain a new value or remain unchanged. r->data[8] = (a->data[8] & mask) | (r->data[8] & rmask); // r->data[8] Obtain a new value or remain unchanged. } static inline void FelemPointAssignWithMask(Point *ptR, const Point *ptIn, uint64_t mask) { FelemAssignWithMask(&ptR->x, &ptIn->x, mask); FelemAssignWithMask(&ptR->y, &ptIn->y, mask); FelemAssignWithMask(&ptR->z, &ptIn->z, mask); } static inline void FelemSetLimb(Felem *felem, const uint64_t a) { felem->data[0] = a; // r->data[0] take the value of a felem->data[1] = 0; // r->data[1] clear to 0 felem->data[2] = 0; // r->data[2] clear to 0 felem->data[3] = 0; // r->data[3] clear to 0 felem->data[4] = 0; // r->data[4] clear to 0 felem->data[5] = 0; // r->data[5] clear to 0 felem->data[6] = 0; // r->data[6] clear to 0 felem->data[7] = 0; // r->data[7] clear to 0 felem->data[8] = 0; // r->data[8] clear to 0 } static inline void LongFelemMulLimb(LongFelem *r, const LongFelem *a, uint64_t limb) { r->data[0] = a->data[0] * limb; // r->data[0] take the value r->data[1] = a->data[1] * limb; // r->data[1] take the value r->data[2] = a->data[2] * limb; // r->data[2] take the value r->data[3] = a->data[3] * limb; // r->data[3] take the value r->data[4] = a->data[4] * limb; // r->data[4] take the value r->data[5] = a->data[5] * limb; // r->data[5] take the value r->data[6] = a->data[6] * limb; // r->data[6] take the value r->data[7] = a->data[7] * limb; // r->data[7] take the value r->data[8] = a->data[8] * limb; // r->data[8] take the value } static inline void FelemMulLimb(Felem *r, const Felem *a, uint64_t b) { r->data[0] = a->data[0] * b; // r->data[0] take the value r->data[1] = a->data[1] * b; // r->data[1] take the value r->data[2] = a->data[2] * b; // r->data[2] take the value r->data[3] = a->data[3] * b; // r->data[3] take the value r->data[4] = a->data[4] * b; // r->data[4] take the value r->data[5] = a->data[5] * b; // r->data[5] take the value r->data[6] = a->data[6] * b; // r->data[6] take the value r->data[7] = a->data[7] * b; // r->data[7] take the value r->data[8] = a->data[8] * b; // r->data[8] take the value } static inline void FelemAdd(Felem *r, const Felem *a, const Felem *b) { r->data[0] = a->data[0] + b->data[0]; // r->data[0] take the value r->data[1] = a->data[1] + b->data[1]; // r->data[1] take the value r->data[2] = a->data[2] + b->data[2]; // r->data[2] take the value r->data[3] = a->data[3] + b->data[3]; // r->data[3] take the value r->data[4] = a->data[4] + b->data[4]; // r->data[4] take the value r->data[5] = a->data[5] + b->data[5]; // r->data[5] take the value r->data[6] = a->data[6] + b->data[6]; // r->data[6] take the value r->data[7] = a->data[7] + b->data[7]; // r->data[7] take the value r->data[8] = a->data[8] + b->data[8]; // r->data[8] take the value } /* * input: * a->data[i] < 7*2^61 * b->data[i] < 2^60 - 2^3 * output: * r->data[i] <= max(a->data[i]) + 2^61 - 2^3 */ static inline void FelemSub(Felem *r, const Felem *a, const Felem *b) { r->data[0] = a->data[0] + (MASK_58BITS << 3) - b->data[0]; // b->data[0] < 2^61 - 2^3 r->data[1] = a->data[1] + (MASK_58BITS << 3) - b->data[1]; // b->data[1] < 2^61 - 2^3 r->data[2] = a->data[2] + (MASK_58BITS << 3) - b->data[2]; // b->data[2] < 2^61 - 2^3 r->data[3] = a->data[3] + (MASK_58BITS << 3) - b->data[3]; // b->data[3] < 2^61 - 2^3 r->data[4] = a->data[4] + (MASK_58BITS << 3) - b->data[4]; // b->data[4] < 2^61 - 2^3 r->data[5] = a->data[5] + (MASK_58BITS << 3) - b->data[5]; // b->data[5] < 2^61 - 2^3 r->data[6] = a->data[6] + (MASK_58BITS << 3) - b->data[6]; // b->data[6] < 2^61 - 2^3 r->data[7] = a->data[7] + (MASK_58BITS << 3) - b->data[7]; // b->data[7] < 2^61 - 2^3 r->data[8] = a->data[8] + (MASK_57BITS << 3) - b->data[8]; // b->data[8] < 2^60 - 2^3 } /* * input: * r->data[i] < 2^127 * a->data[i] < 2^64 - 2^6 * output: * r->data[i] <= r->data[i] + 2^64 - 2^6 */ static inline void LongFelemDiff(LongFelem *r, const Felem *a) { r->data[0] += (MASK_58BITS << 6) - a->data[0]; // a->data[0] < 2^64 - 2^6 r->data[1] += (MASK_58BITS << 6) - a->data[1]; // a->data[1] < 2^64 - 2^6 r->data[2] += (MASK_58BITS << 6) - a->data[2]; // a->data[2] < 2^64 - 2^6 r->data[3] += (MASK_58BITS << 6) - a->data[3]; // a->data[3] < 2^64 - 2^6 r->data[4] += (MASK_58BITS << 6) - a->data[4]; // a->data[4] < 2^64 - 2^6 r->data[5] += (MASK_58BITS << 6) - a->data[5]; // a->data[5] < 2^64 - 2^6 r->data[6] += (MASK_58BITS << 6) - a->data[6]; // a->data[6] < 2^64 - 2^6 r->data[7] += (MASK_58BITS << 6) - a->data[7]; // a->data[7] < 2^64 - 2^6 r->data[8] += (MASK_57BITS << 6) - a->data[8]; // a->data[8] < 2^63 - 2^6 } static inline void FelemNeg(Felem *r, const Felem *a) { r->data[0] = (MASK_58BITS << 3) - a->data[0]; // a->data[0], r->data[0] < 2^61 - 2^3 r->data[1] = (MASK_58BITS << 3) - a->data[1]; // a->data[1], r->data[1] < 2^61 - 2^3 r->data[2] = (MASK_58BITS << 3) - a->data[2]; // a->data[2], r->data[2] < 2^61 - 2^3 r->data[3] = (MASK_58BITS << 3) - a->data[3]; // a->data[3], r->data[3] < 2^61 - 2^3 r->data[4] = (MASK_58BITS << 3) - a->data[4]; // a->data[4], r->data[4] < 2^61 - 2^3 r->data[5] = (MASK_58BITS << 3) - a->data[5]; // a->data[5], r->data[5] < 2^61 - 2^3 r->data[6] = (MASK_58BITS << 3) - a->data[6]; // a->data[6], r->data[6] < 2^61 - 2^3 r->data[7] = (MASK_58BITS << 3) - a->data[7]; // a->data[7], r->data[7] < 2^61 - 2^3 r->data[8] = (MASK_57BITS << 3) - a->data[8]; // a->data[8], r->data[8] < 2^60 - 2^3 } /* Calculate r = a / 2, which can be regarded as a cyclic right shift by one bit in the modulo P(2^521-1) field. */ static inline void FelemDivTwo(Felem *r, const Felem *a) { const uint64_t *pa = a->data; r->data[0] = (pa[0] >> 1) + ((pa[1] & 1) << 57); // The 57th bit plus the LSB of pa[1] r->data[1] = (pa[1] >> 1) + ((pa[2] & 1) << 57); // The 57th bit plus the LSB of pa[2] r->data[2] = (pa[2] >> 1) + ((pa[3] & 1) << 57); // The 57th bit plus the LSB of pa[3] r->data[3] = (pa[3] >> 1) + ((pa[4] & 1) << 57); // The 57th bit plus the LSB of pa[4] r->data[4] = (pa[4] >> 1) + ((pa[5] & 1) << 57); // The 57th bit plus the LSB of pa[5] r->data[5] = (pa[5] >> 1) + ((pa[6] & 1) << 57); // The 57th bit plus the LSB of pa[6] r->data[6] = (pa[6] >> 1) + ((pa[7] & 1) << 57); // The 57th bit plus the LSB of pa[7] r->data[7] = (pa[7] >> 1) + ((pa[8] & 1) << 57); // The 57th bit plus the LSB of pa[8] r->data[8] = (pa[8] >> 1) + ((pa[0] & 1) << 56); // The 56th bit plus the LSB of pa[0] } /* * reduce to prevent subsequent calculation overflow. * input: * in[i] < 2^128 * output: * out[i] < 2^59 + 2^14 */ static void FelemReduce(Felem *r, const LongFelem *a) { uint64_t tmp; const uint32_t shift2 = BASE_BITS * 2; // 116 = 58 * 2 r->data[0] = (uint64_t)(a->data[0] & MASK_58BITS); // r->data[0] < 2^58 r->data[1] = (uint64_t)(a->data[1] & MASK_58BITS); // r->data[1] < 2^58 r->data[2] = (uint64_t)(a->data[2] & MASK_58BITS); // r->data[2] < 2^58 r->data[3] = (uint64_t)(a->data[3] & MASK_58BITS); // r->data[3] < 2^58 r->data[4] = (uint64_t)(a->data[4] & MASK_58BITS); // r->data[4] < 2^58 r->data[5] = (uint64_t)(a->data[5] & MASK_58BITS); // r->data[5] < 2^58 r->data[6] = (uint64_t)(a->data[6] & MASK_58BITS); // r->data[6] < 2^58 r->data[7] = (uint64_t)(a->data[7] & MASK_58BITS); // r->data[7] < 2^58 r->data[8] = (uint64_t)(a->data[8] & MASK_58BITS); // r->data[8] < 2^58 r->data[1] += (uint64_t)(a->data[0] >> BASE_BITS) & MASK_58BITS; // r->data[1] < 2^59 r->data[2] += (uint64_t)(a->data[1] >> BASE_BITS) & MASK_58BITS; // r->data[2] < 2^59 r->data[3] += (uint64_t)(a->data[2] >> BASE_BITS) & MASK_58BITS; // r->data[3] < 2^59 r->data[4] += (uint64_t)(a->data[3] >> BASE_BITS) & MASK_58BITS; // r->data[4] < 2^59 r->data[5] += (uint64_t)(a->data[4] >> BASE_BITS) & MASK_58BITS; // r->data[5] < 2^59 r->data[6] += (uint64_t)(a->data[5] >> BASE_BITS) & MASK_58BITS; // r->data[6] < 2^59 r->data[7] += (uint64_t)(a->data[6] >> BASE_BITS) & MASK_58BITS; // r->data[7] < 2^59 r->data[8] += (uint64_t)(a->data[7] >> BASE_BITS) & MASK_58BITS; // r->data[8] < 2^59 // a->data[8] The most significant bits above 58bits correspond to the most significant bits above 522 bits. tmp = (uint64_t)(a->data[8] >> BASE_BITS) & MASK_58BITS; r->data[0] += tmp << 1; // r->data[0] < 3*2^58 r->data[2] += (uint64_t)(a->data[0] >> shift2); // r->data[2] < 2^59 + 2^6 r->data[3] += (uint64_t)(a->data[1] >> shift2); // r->data[3] < 2^59 + 2^6 r->data[4] += (uint64_t)(a->data[2] >> shift2); // r->data[4] < 2^59 + 2^6, add the upper bits of a[2]116 bits. r->data[5] += (uint64_t)(a->data[3] >> shift2); // r->data[5] < 2^59 + 2^6, add the upper bits of a[3]116 bits. r->data[6] += (uint64_t)(a->data[4] >> shift2); // r->data[6] < 2^59 + 2^6, add the upper bits of a[4]116 bits. r->data[7] += (uint64_t)(a->data[5] >> shift2); // r->data[7] < 2^59 + 2^6, add the upper bits of a[5]116 bits. r->data[8] += (uint64_t)(a->data[6] >> shift2); // r->data[8] < 2^59 + 2^6, add the upper bits of a[6]116 bits. // a->data[7] The most significant bits above 116bits correspond to the most significant bits above 522 bits. tmp = (uint64_t)(a->data[7] >> shift2); r->data[0] += tmp << 1; // r->data[0] < 3*2^58 + 2^13 // a->data[8] The most significant bits above 116bits correspond to the most significant bits above 580 bits. tmp = (uint64_t)(a->data[8] >> shift2); r->data[1] += tmp << 1; // r->data[1] < 2^59 + 2^13 /* Considering that out[0] may be too large, carry needs to be continued. */ r->data[1] += r->data[0] >> BASE_BITS; // r->data[1] < 2^59 + 2^14 r->data[0] &= MASK_58BITS; // r->data[0] < 2^58 } /* * Reduce the number of bits to less than 58 to prevent subsequent operation overflow. * input: * felem->data[i] < 2^64 - 2^6 * output: * felem->data[i] < 2^58 */ static void FelemShrink(Felem *felem) { uint64_t carry = 0; /* Carry value between Limb */ /* Reduce each limb to less than 58 bits */ for (int32_t i = 0; i < NUM_LIMBS - 1; i++) { felem->data[i] += carry; /* plus the carry of the previous block */ carry = (uint64_t)(felem->data[i] >> BASE_BITS); /* Take the carry of this block. */ felem->data[i] &= MASK_58BITS; /* 58 bits reserved */ } felem->data[NUM_LIMBS - 1] += carry; carry = felem->data[NUM_LIMBS - 1] >> 57; /* 521 = 58 * 8 + 57, carry the upper bits to the lower bits */ felem->data[NUM_LIMBS - 1] &= MASK_57BITS; /* The upper bits are discarded, only the lower 521 bits are retained */ /* Add the bits above 521 to the lower bits. */ for (int32_t i = 0; i < NUM_LIMBS; i++) { felem->data[i] += carry; /* plus the carry of the previous block */ carry = (uint64_t)(felem->data[i] >> BASE_BITS); /* Take the carry of this block. */ felem->data[i] &= MASK_58BITS; /* 58 bits reserved */ } } /* * Reduce felem to a unique value less than P. * input: * felem->data[i] < 2^64 - 2^6 * output: * felem->data[i] < 2^58 * Return value: * If felem is 0, the mask is all 1s. Otherwise, the mask is 0. */ static uint64_t FelemContract(Felem *felem) { uint64_t notP = 0; uint64_t notZero = 0; uint64_t mask; uint64_t carry; FelemShrink(felem); /* After the shrink command is executed, felem->data[i] < 2^58, but it may still be greater than 521 bits. */ carry = felem->data[NUM_LIMBS - 1] >> 57; /* 521 = 58 * 8 + 57, carry the upper bits to the lower bits */ felem->data[NUM_LIMBS - 1] &= MASK_57BITS; /* Add the bits above 521 to the lower bits. */ for (int32_t i = 0; i < NUM_LIMBS; i++) { felem->data[i] += carry; /* plus the carry of the previous block */ carry = (uint64_t)(felem->data[i] >> BASE_BITS); /* Take the carry of this block. */ felem->data[i] &= MASK_58BITS; /* 58 bits reserved */ } /* Check whether the value is P. */ for (int32_t i = 0; i < NUM_LIMBS - 1; i++) { notP |= felem->data[i] ^ MASK_58BITS; /* If the value of felem is P, the value remains 0. */ } notP |= felem->data[NUM_LIMBS - 1] ^ MASK_57BITS; /* The most significant bit is 1 only when notP = 0. In this case, the mask is 0. */ mask = 0 - ((0 - notP) >> 63); /* Shift rightwards by 63 bits and get the most significant bit. */ for (int32_t i = 0; i < NUM_LIMBS; i++) { felem->data[i] &= mask; /* If the value is P, clear all the bits to 0 */ notZero |= felem->data[i]; /* an determine whether the value is zero. */ } /* only when notZero == 0, the most significant bit is 1. In this case, each bit of the mask is all 1s. */ mask = ((0 - notZero) >> 63) - 1; /* Shift rightwards by 63 bits and get the most significant bit. */ return mask; } /* Convert a BigNum to the Felem *. Note that the value cannot be a negative number and cannot be greater than P. */ static int32_t BN2Felem(Felem *r, const BN_BigNum *a) { int32_t ret; Array64 array = {0}; uint32_t len = NUM_LIMBS; ret = BN_Bn2U64Array(a, array.data, &len); if (ret != CRYPT_SUCCESS) { return ret; } Array64ToFelem(r, &array); return CRYPT_SUCCESS; } /* Felem * Convert to BigNum */ static int32_t Felem2BN(BN_BigNum *r, const Felem *a) { Array64 array = {0}; uint32_t len = NUM_LIMBS; Felem felem; FelemAssign(&felem, a); FelemContract(&felem); FelemToArray64(&array, &felem); return BN_U64Array2Bn(r, array.data, len); } /* * Calculate r = a * b * input: * a->data[i] < 2^63 * b->data[i] < 2^128 / (17*a[i]) * output: * r->data[i] < 17(max(a[i]*b[i])) */ static void FelemMul(LongFelem *r, const Felem *a, const Felem *b) { Felem ax2; const uint64_t *pa = a->data; const uint64_t *pb = b->data; const uint64_t *p2 = ax2.data; /* Because the modulo P is 2^521 - 1, the higher bits above the 521 bits can be truncated and then added to the lower bits. */ FelemMulLimb(&ax2, a, 2); r->data[0] = U128(pa[0]) * pb[0] + U128(p2[1]) * pb[8] + U128(p2[2]) * pb[7] + // 0 = 0+0, 1+8, 2+7 (mod 9) U128(p2[3]) * pb[6] + U128(p2[4]) * pb[5] + U128(p2[5]) * pb[4] + // 0 = 3+6, 4+5, 5+4 (mod 9) U128(p2[6]) * pb[3] + U128(p2[7]) * pb[2] + U128(p2[8]) * pb[1]; // 0 = 6+3, 7+2, 8+1 (mod 9) r->data[1] = U128(pa[0]) * pb[1] + U128(pa[1]) * pb[0] + U128(p2[2]) * pb[8] + // 1 = 0+1, 1+0, 2+8 (mod 9) U128(p2[3]) * pb[7] + U128(p2[4]) * pb[6] + U128(p2[5]) * pb[5] + // 1 = 3+7, 4+6, 5+5 (mod 9) U128(p2[6]) * pb[4] + U128(p2[7]) * pb[3] + U128(p2[8]) * pb[2]; // 1 = 6+4, 7+3, 8+2 (mod 9) r->data[2] = U128(pa[0]) * pb[2] + U128(pa[1]) * pb[1] + U128(pa[2]) * pb[0] + // 2 = 0+2, 1+1, 2+0 (mod 9) U128(p2[3]) * pb[8] + U128(p2[4]) * pb[7] + U128(p2[5]) * pb[6] + // 2 = 3+8, 4+7, 5+6 (mod 9) U128(p2[6]) * pb[5] + U128(p2[7]) * pb[4] + U128(p2[8]) * pb[3]; // 2 = 6+5, 7+4, 8+3 (mod 9) r->data[3] = U128(pa[0]) * pb[3] + U128(pa[1]) * pb[2] + U128(pa[2]) * pb[1] + // 3 = 0+3, 1+2, 2+1 (mod 9) U128(pa[3]) * pb[0] + U128(p2[4]) * pb[8] + U128(p2[5]) * pb[7] + // 3 = 3+0, 4+8, 5+7 (mod 9) U128(p2[6]) * pb[6] + U128(p2[7]) * pb[5] + U128(p2[8]) * pb[4]; // 3 = 6+6, 7+5, 8+4 (mod 9) r->data[4] = U128(pa[0]) * pb[4] + U128(pa[1]) * pb[3] + U128(pa[2]) * pb[2] + // 4 = 0+4, 1+3, 2+2 (mod 9) U128(pa[3]) * pb[1] + U128(pa[4]) * pb[0] + U128(p2[5]) * pb[8] + // 4 = 3+1, 4+0, 5+8 (mod 9) U128(p2[6]) * pb[7] + U128(p2[7]) * pb[6] + U128(p2[8]) * pb[5]; // 4 = 6+7, 7+6, 8+5 (mod 9) r->data[5] = U128(pa[0]) * pb[5] + U128(pa[1]) * pb[4] + U128(pa[2]) * pb[3] + // 5 = 0+5, 1+4, 2+3 (mod 9) U128(pa[3]) * pb[2] + U128(pa[4]) * pb[1] + U128(pa[5]) * pb[0] + // 5 = 3+2, 4+1, 5+0 (mod 9) U128(p2[6]) * pb[8] + U128(p2[7]) * pb[7] + U128(p2[8]) * pb[6]; // 5 = 6+8, 7+7, 8+6 (mod 9) r->data[6] = U128(pa[0]) * pb[6] + U128(pa[1]) * pb[5] + U128(pa[2]) * pb[4] + // 6 = 0+6, 1+5, 2+4 (mod 9) U128(pa[3]) * pb[3] + U128(pa[4]) * pb[2] + U128(pa[5]) * pb[1] + // 6 = 3+3, 4+2, 5+1 (mod 9) U128(pa[6]) * pb[0] + U128(p2[7]) * pb[8] + U128(p2[8]) * pb[7]; // 6 = 6+0, 7+8, 8+7 (mod 9) r->data[7] = U128(pa[0]) * pb[7] + U128(pa[1]) * pb[6] + U128(pa[2]) * pb[5] + // 7 = 0+7, 1+6, 2+5 (mod 9) U128(pa[3]) * pb[4] + U128(pa[4]) * pb[3] + U128(pa[5]) * pb[2] + // 7 = 3+4, 4+3, 5+2 (mod 9) U128(pa[6]) * pb[1] + U128(pa[7]) * pb[0] + U128(p2[8]) * pb[8]; // 7 = 6+1, 7+0, 8+8 (mod 9) r->data[8] = U128(pa[0]) * pb[8] + U128(pa[1]) * pb[7] + U128(pa[2]) * pb[6] + // 8 = 0+8, 1+7, 2+6 (mod 9) U128(pa[3]) * pb[5] + U128(pa[4]) * pb[4] + U128(pa[5]) * pb[3] + // 8 = 3+5, 4+4, 5+3 (mod 9) U128(pa[6]) * pb[2] + U128(pa[7]) * pb[1] + U128(pa[8]) * pb[0]; // 8 = 6+2, 7+1, 8+0 (mod 9) } /* * Calculate r = a^2 * input: * a->data[i] < 2^62 - 2^57 * output: * r->data[i] < 17*max(a[i]*a[i]) */ static void FelemSqr(LongFelem *r, const Felem *a) { Felem ax2; Felem ax4; const uint64_t *pa = a->data; const uint64_t *p2 = ax2.data; const uint64_t *p4 = ax4.data; /* Because the modulo P is 2^521 - 1, the higher bits above the 521 bits can be truncated and then added to the lower bits. */ FelemMulLimb(&ax2, a, 2); /* ax2 is twice the value of a */ FelemMulLimb(&ax4, a, 4); /* ax4 is 4 times the value of a */ r->data[0] = U128(pa[0]) * pa[0]; // 0 = 0+0 (mod 9) r->data[1] = U128(p2[5]) * pa[5]; // 1 = 5+5 (mod 9) r->data[2] = U128(pa[1]) * pa[1]; // 2 = 1+1 (mod 9) r->data[3] = U128(p2[6]) * pa[6]; // 3 = 6+6 (mod 9) r->data[4] = U128(pa[2]) * pa[2]; // 4 = 2+2 (mod 9) r->data[5] = U128(p2[7]) * pa[7]; // 5 = 7+7 (mod 9) r->data[6] = U128(pa[3]) * pa[3]; // 6 = 3+3 (mod 9) r->data[7] = U128(p2[8]) * pa[8]; // 7 = 8+8 (mod 9) r->data[8] = U128(pa[4]) * pa[4]; // 8 = 4+4 (mod 9) // r->data[0] < 17*49*2^114 < 2^124 // 0 = 1+8, 2+7, 3+6, 4+5 (mod 9) r->data[0] += U128(p4[1]) * pa[8] + U128(p4[2]) * pa[7] + U128(p4[3]) * pa[6] + U128(p4[4]) * pa[5]; // 1 = 0+1, 2+8, 3+7, 4+6 (mod 9) r->data[1] += U128(p2[0]) * pa[1] + U128(p4[2]) * pa[8] + U128(p4[3]) * pa[7] + U128(p4[4]) * pa[6]; // 2 = 0+2, 3+8, 4+7, 5+6 (mod 9) r->data[2] += U128(p2[0]) * pa[2] + U128(p4[3]) * pa[8] + U128(p4[4]) * pa[7] + U128(p4[5]) * pa[6]; // 3 = 0+3, 1+2, 4+8, 5+7 (mod 9) r->data[3] += U128(p2[0]) * pa[3] + U128(p2[1]) * pa[2] + U128(p4[4]) * pa[8] + U128(p4[5]) * pa[7]; // 4 = 0+4, 1+3, 5+8, 6+7 (mod 9) r->data[4] += U128(p2[0]) * pa[4] + U128(p2[1]) * pa[3] + U128(p4[5]) * pa[8] + U128(p4[6]) * pa[7]; // 5 = 0+5, 1+4, 2+3, 6+8 (mod 9) r->data[5] += U128(p2[0]) * pa[5] + U128(p2[1]) * pa[4] + U128(p2[2]) * pa[3] + U128(p4[6]) * pa[8]; // 6 = 0+6, 1+5, 2+4, 7+8 (mod 9) r->data[6] += U128(p2[0]) * pa[6] + U128(p2[1]) * pa[5] + U128(p2[2]) * pa[4] + U128(p4[7]) * pa[8]; // 7 = 0+7, 1+6, 2+5, 3+4 (mod 9) r->data[7] += U128(p2[0]) * pa[7] + U128(p2[1]) * pa[6] + U128(p2[2]) * pa[5] + U128(p2[3]) * pa[4]; // 8 = 0+8, 1+7, 2+6, 3+5 (mod 9) r->data[8] += U128(p2[0]) * pa[8] + U128(p2[1]) * pa[7] + U128(p2[2]) * pa[6] + U128(p2[3]) * pa[5]; } // Multiply and reduce static inline void FelemMulReduce(Felem *r, const Felem *a, const Felem *b) { LongFelem tmp; FelemMul(&tmp, a, b); FelemReduce(r, &tmp); } // Square and reduce static inline void FelemSqrReduce(Felem *r, const Felem *in) { LongFelem tmp; FelemSqr(&tmp, in); FelemReduce(r, &tmp); } /* * Calculate r = 1/a (mod P) * Fermat's Little Theorem: * a^p = a mod p * a^(p-1) = 1 mod p * a^(p-2) = a^(-1) mod p * Calculate the inverse modulus value according to this formula and: * p = 2^521 - 1 * p - 2 = 2^521 - 3 = (2^519 - 1) << 2 + 1 */ static void FelemInv(Felem *r, const Felem *a) { Felem tmp1, tmp2, tmp3; int32_t bits; /* Calculate a^e and update the e value until e = p - 2 */ FelemSqrReduce(&tmp1, a); /* (10) */ FelemMulReduce(&tmp1, &tmp1, a); /* (11) */ FelemSqrReduce(&tmp2, &tmp1); /* (110) */ FelemMulReduce(&tmp3, &tmp2, a); /* (111) is stored in tmp3 */ FelemSqrReduce(&tmp2, &tmp2); /* (1100) */ FelemMulReduce(&tmp1, &tmp2, &tmp1); /* (1111) */ FelemSqrReduce(&tmp2, &tmp1); /* (0001 1110) */ FelemSqrReduce(&tmp2, &tmp2); /* (0011 1100) */ FelemSqrReduce(&tmp2, &tmp2); /* (0111 1000) */ FelemMulReduce(&tmp3, &tmp2, &tmp3); /* (0111 1111) is stored in tmp3 */ FelemSqrReduce(&tmp2, &tmp2); /* (1111 0000) */ FelemMulReduce(&tmp1, &tmp2, &tmp1); /* 2^8 - 1 */ /* The current value of e is (11111111) The value consists of 8 bits */ bits = 8; /* Perform the square & multiplication until the value of e becomes 2 ^ 512 - 1, that is, 512 bits */ while (bits < 512) { FelemAssign(&tmp2, &tmp1); for (int32_t i = 0; i < bits; i++) { /* e value shifts to the left */ FelemSqrReduce(&tmp2, &tmp2); } FelemMulReduce(&tmp1, &tmp2, &tmp1); /* e Change the lower bits 0 to 1, e = 2^bits - 1 */ /* In this case, the bit length of the e value becomes twice (* 2). */ bits *= 2; } /* In this case, the value of e is 2^512-1 */ for (int32_t i = 0; i < 7; i++) { /* e value shifts to the left by 7 bits */ FelemSqrReduce(&tmp1, &tmp1); } FelemMulReduce(&tmp1, &tmp1, &tmp3); /* 2^519 - 1, plus the previous &tmp3 */ FelemSqrReduce(&tmp1, &tmp1); FelemSqrReduce(&tmp1, &tmp1); /* (2^519 - 1) << 2 */ FelemMulReduce(r, &tmp1, a); /* p - 2 */ } /* * "dbl-2001-b" * delta = Z1^2 * gamma = Y1^2 * beta = X1*gamma * alpha = 3*(X1-delta)*(X1+delta) * X3 = alpha^2-8*beta * Z3 = (Y1+Z1)^2-gamma-delta * Y3 = alpha*(4*beta-X3)-8*gamma^2 */ /* Calculate the double point coordinates. */ static void FelemPointDouble(Point *pointOut, const Point *pointIn) { Felem delta, gamma, beta, alpha; Felem tmp1, tmp2; LongFelem ltmp1; /* delta = Z1^2 */ FelemSqrReduce(&delta, &pointIn->z); // delta[i] < 2^59 + 2^14 /* gamma = Y1^2 */ FelemSqrReduce(&gamma, &pointIn->y); // gamma[i] < 2^59 + 2^14 /* beta = X1*gamma */ FelemMulReduce(&beta, &pointIn->x, &gamma); // beta[i] < 2^59 + 2^14 /* X1 - delta */ FelemSub(&tmp1, &pointIn->x, &delta); // tmp1[i] < 9*2^59 + 2^14 /* X1 + delta */ FelemAdd(&tmp2, &pointIn->x, &delta); // tmp2[i] < 2^60 + 2^15 /* 3*(X1 + delta) */ FelemMulLimb(&tmp2, &tmp2, 3); // tmp2[i] < 6*(2^59 + 2^14) /* alpha = 3*(X1-delta)*(X1+delta) */ FelemMulReduce(&alpha, &tmp1, &tmp2); // alpha[i] < 2^59 + 2^14 /* alpha^2 */ FelemSqr(&ltmp1, &alpha); // ltmp1[i] < 2^125 /* 8*beta */ FelemMulLimb(&tmp2, &beta, 8); // tmp2[i] < 2^62 + 2^17 /* alpha^2-8*beta */ LongFelemDiff(&ltmp1, &tmp2); // ltmp1[i] < 2^126 /* X3 = alpha^2-8*beta */ FelemReduce(&pointOut->x, &ltmp1); /* Y1+Z1 */ FelemAdd(&tmp1, &pointIn->y, &pointIn->z); // tmp1[i] < 2^60 + 2^15 /* (Y1+Z1)^2 */ FelemSqr(&ltmp1, &tmp1); // ltmp1[i] < 17*(2^60 + 2^15) /* gamma+delta */ FelemAdd(&tmp2, &gamma, &delta); // tmp2[i] < 2^60 + 2^15 /* (Y1+Z1)^2 - gamma - delta */ LongFelemDiff(&ltmp1, &tmp2); /* Z3 = (Y1+Z1)^2-gamma-delta */ FelemReduce(&pointOut->z, &ltmp1); /* 4*beta */ FelemMulLimb(&tmp2, &beta, 4); // tmp2[i] < 2^61 + 2^16 /* 4*beta-X3 */ FelemSub(&tmp1, &tmp2, &pointOut->x); // tmp1[i] < 2^62 + 2^16 FelemShrink(&tmp1); // Subtraction and reduction process can be optimized /* alpha*(4*beta-X3) */ FelemMul(&ltmp1, &alpha, &tmp1); // ltmp1[i] < 2^128 /* gamma^2 */ FelemSqrReduce(&tmp2, &gamma); // tmp2[i] < 2^59 + 2^14 /* 8*gamma^2 */ FelemMulLimb(&tmp1, &tmp2, 8); // tmp1[i] < 2^62 + 2^17 /* alpha*(4*beta-X3)-8*gamma^2 */ LongFelemDiff(&ltmp1, &tmp1); /* Y3 = alpha*(4*beta-X3)-8*gamma^2 */ FelemReduce(&pointOut->y, &ltmp1); } /* * "add-2007-bl" * Z1Z1 = Z1^2 * Z2Z2 = Z2^2 * U1 = X1*Z2Z2 * S1 = Y1*Z2*Z2Z2 * U2 = X2*Z1Z1 * S2 = Y2*Z1*Z1Z1 * H = U2-U1 * r = 2*(S2-S1) * I = (2*H)^2 * J = H*I * V = U1*I * X3 = r^2-J-2*V * Y3 = r*(V-X3)-2*S1*J * Z3 = ((Z1+Z2)^2-Z1Z1-Z2Z2)*H */ /* Calculate the point addition coordinates, pt3 = pt1 + pt2 */ static void FelemPointAdd(Point *pt3, const Point *pt1, const Point *pt2) { uint64_t pointEqual, xEqual, yEqual, z1Zero, z2Zero; Felem z1z1, z2z2, u1, u2, s1, s2, h, r, i, j, v, tmp1; Point res; LongFelem ltmp1; /* Z1Z1 = Z1^2 */ FelemSqrReduce(&z1z1, &pt1->z); z1Zero = FelemContract(&z1z1); // z1z1[i] < 2^58 /* Z2Z2 = Z2^2 */ FelemSqrReduce(&z2z2, &pt2->z); z2Zero = FelemContract(&z2z2); // z2z2[i] < 2^58 /* U1 = X1*Z2Z2 */ FelemMulReduce(&u1, &pt1->x, &z2z2); // u1[i] < 2^59 + 2^14 /* S1 = Y1*Z2*Z2Z2 */ FelemMulReduce(&tmp1, &pt1->y, &pt2->z); FelemMulReduce(&s1, &tmp1, &z2z2); // s1[i] < 2^59 + 2^14 /* U2 = X2*Z1Z1 */ FelemMulReduce(&u2, &pt2->x, &z1z1); // u2[i] < 2^59 + 2^14 /* S2 = Y2*Z1*Z1Z1 */ FelemMulReduce(&tmp1, &pt2->y, &pt1->z); FelemMulReduce(&s2, &tmp1, &z1z1); // s2[i] < 2^59 + 2^14 /* H = U2-U1 */ FelemSub(&h, &u2, &u1); xEqual = FelemContract(&h); // h[i] < 2^58 /* r = 2*(S2-S1) */ FelemSub(&tmp1, &s2, &s1); yEqual = FelemContract(&tmp1); /* If the coordinates are equal, use the double point formula. */ pointEqual = (xEqual & yEqual & (~z1Zero) & (~z2Zero)); if (pointEqual != 0) { FelemPointDouble(pt3, pt1); return; } FelemMulLimb(&r, &tmp1, 2); // r[i] < 2^59 /* I = (2*h)^2 */ FelemMulLimb(&tmp1, &h, 2); // tmp1[i] < 2^59 FelemSqrReduce(&i, &tmp1); /* J = H*I */ FelemMulReduce(&j, &h, &i); // j[i] < 2^59 + 2^14 /* v = U1*I */ FelemMulReduce(&v, &u1, &i); // v[i] < 2^59 + 2^14 /* X3 = r^2-j-2*v */ FelemSqr(&ltmp1, &r); // ltmp1[i] < 17*2^118 FelemMulLimb(&tmp1, &v, 2); // tmp1[i] < 2^60 + 2^15 FelemAdd(&tmp1, &tmp1, &j); // tmp1[i] < 3*(2^59 + 2^14) LongFelemDiff(&ltmp1, &tmp1); // ltmp1 < 2^123 FelemReduce(&res.x, &ltmp1); // x[i] < 2^59 + 2^14 /* Y3 = r*(v-X3)-2*S1*j */ FelemSub(&tmp1, &v, &res.x); // tmp1[i] < 5*2^59 + 2^14 FelemMul(&ltmp1, &r, &tmp1); // ltmp1[i] < 17*(5*2^59 + 2^14)*(2^59) < 2^125 FelemMulReduce(&tmp1, &s1, &j); // tmp1[i] < 2^59 + 2^14 FelemMulLimb(&tmp1, &tmp1, 2); // tmp1[i] < 2^60 + 2^15 LongFelemDiff(&ltmp1, &tmp1); // ltmp1[i] < 2^125 + 2^64 - 2^6 FelemReduce(&res.y, &ltmp1); // y3[i] < 2^59 + 2^14 /* Z3 = ((Z1+Z2)^2-Z1Z1-Z2Z2)*H */ FelemAdd(&tmp1, &pt1->z, &pt2->z); // tmp1[i] < 2^60 + 2^15 FelemSqr(&ltmp1, &tmp1); // ltmp1[i] < 17*(2^120 + 2^76 + 2^30) FelemAdd(&tmp1, &z1z1, &z2z2); // tmp1[i] < 2^59 LongFelemDiff(&ltmp1, &tmp1); // ltmp1[i] < 2^125 FelemReduce(&tmp1, &ltmp1); // tmp1[i] < 2^59 + 2^14 FelemMulReduce(&res.z, &tmp1, &h); // z3[i] < 2^59 + 2^14 FelemPointAssignWithMask(&res, pt2, z1Zero); FelemPointAssignWithMask(&res, pt1, z2Zero); FelemPointAssign(pt3, &res); } /* * "madd-2007-bl" * Z1Z1 = Z1^2 * U2 = X2*Z1Z1 * S2 = Y2*Z1*Z1Z1 * H = U2-X1 * r = 2*(S2-Y1) * HH = H^2 * I = 4*HH * J = H*I * V = X1*I * X3 = r^2-J-2*V * Y3 = r*(V-X3)-2*Y1*J * Z3 = (Z1+H)^2-Z1Z1-HH */ /* Calculate the points coordinates addition in the mixed coordinate system, pt3 = pt1 + pt2, z2 == 1 */ static void FelemPointMixAdd(Point *pt3, const Point *pt1, const Point *pt2) { uint64_t pointEqual, xEqual, yEqual, z1Zero, z2Zero; Felem z1z1, h, hh, r, i, j, v, tmp1, tmp2; Point res; LongFelem ltmp1; /* Z1Z1 = Z1^2 */ FelemSqrReduce(&z1z1, &pt1->z); z1Zero = FelemContract(&z1z1); // z1z1[i] < 2^58 FelemAssign(&tmp1, &pt2->z); z2Zero = FelemContract(&tmp1); /* U2 = X2*Z1Z1 */ FelemMulReduce(&tmp2, &pt2->x, &z1z1); // tmp2[i] < 2^59 + 2^14 /* S2 = Y2*Z1*Z1Z1 */ FelemMulReduce(&tmp1, &pt2->y, &pt1->z); FelemMulReduce(&tmp1, &tmp1, &z1z1); // tmp1[i] < 2^59 + 2^14 /* H = U2-X1 */ FelemSub(&h, &tmp2, &pt1->x); xEqual = FelemContract(&h); // h[i] < 2^58 /* r = 2*(S2-Y1) */ FelemSub(&tmp1, &tmp1, &pt1->y); yEqual = FelemContract(&tmp1); /* If the coordinates are equal, use the double point formula. */ pointEqual = (xEqual & yEqual & (~z1Zero) & (~z2Zero)); if (pointEqual != 0) { FelemPointDouble(pt3, pt1); return; } FelemMulLimb(&r, &tmp1, 2); // r[i] < 2^59 /* HH = H^2 */ FelemSqrReduce(&hh, &h); // hh[i] < 2^59 + 2^14 /* I = 4*HH */ FelemMulLimb(&i, &hh, 4); // i[i] < 2^61 + 2^16 /* J = H*I */ FelemMulReduce(&j, &h, &i); // j[i] < 2^59 + 2^14 /* V = X1*I */ FelemMulReduce(&v, &pt1->x, &i); // v[i] < 2^59 + 2^14 /* X3 = r^2-J-2*V */ FelemMulLimb(&tmp1, &v, 2); // tmp1[i] < 2^60 + 2^15 FelemAdd(&tmp2, &j, &tmp1); // tmp2[i] < 3*2^59 + 3*2^14 FelemSqr(&ltmp1, &r); // ltmp1[i] < 17*2^118 LongFelemDiff(&ltmp1, &tmp2); // ltmp1[i] < 2^123 FelemReduce(&res.x, &ltmp1); // x3[i] < 2^59 + 2^14 /* Y3 = r*(V-X3)-2*Y1*J */ FelemSub(&tmp1, &v, &res.x); // tmp1[i] < 5*2^59 + 2^14 FelemMul(&ltmp1, &r, &tmp1); // ltmp1[i] < 17*(5*2^59 + 2^14)*(2^59) < 2^125 FelemMulReduce(&tmp2, &pt1->y, &j); // tmp2[i] < 2^59 + 2^14 FelemMulLimb(&tmp1, &tmp2, 2); // tmp1[i] < 2^60 + 2^15 LongFelemDiff(&ltmp1, &tmp1); // ltmp1[i] < 2^125 + 2^64 - 2^6 FelemReduce(&res.y, &ltmp1); // y3[i] < 2^59 + 2^14 /* Z3 = (Z1+H)^2-Z1Z1-HH */ FelemAdd(&tmp1, &pt1->z, &h); // tmp1[i] < 3*2^59 + 2^14 FelemSqr(&ltmp1, &tmp1); // ltmp1[i] < 17*(9*2^118 + 3*2^74 + 2^28) FelemAdd(&tmp2, &z1z1, &hh); // tmp2[i] < 3*2^59 + 2^14 LongFelemDiff(&ltmp1, &tmp2); // ltmp1[i] < 2^126 FelemReduce(&res.z, &ltmp1); // z3[i] < 2^59 + 2^14 FelemPointAssignWithMask(&res, pt2, z1Zero); FelemPointAssignWithMask(&res, pt1, z2Zero); FelemPointAssign(pt3, &res); } /* * Y = 2*Y * W = Z^4 * while (m > 0) { * A = 3*(X^2-W) * B = X*Y^2 * X = A^2-2*B * Z = Z*Y * m = m-1 * if (m > 0) { * W = W*Y^4 * } * Y = 2*A*(B-X)-Y^4 * } * Y = Y/2 */ static void FelemPointMultDouble(Point *pointOut, const Point *pointIn, int32_t m) { Felem x, y, z; Felem w, a, b; Felem tmp1, tmp2, tmp3; LongFelem ltmp1; int32_t left = m; if (left == 1) { FelemPointDouble(pointOut, pointIn); return; } FelemAssign(&x, &pointIn->x); FelemAssign(&z, &pointIn->z); /* Y = 2*Y */ FelemMulLimb(&y, &pointIn->y, 2); // y[i] < 2^60 + 2^15 /* W = Z^4 */ FelemSqrReduce(&tmp1, &pointIn->z); FelemSqrReduce(&w, &tmp1); // w[i] < 2^59 + 2^14 while (left > 0) { /* A = 3*(X^2-W) */ FelemSqr(&ltmp1, &x); // ltmp1[i] < 17*(2^118 + 2^74 + 2^28) < 17*(2^118 + 2^75) LongFelemDiff(&ltmp1, &w); // ltmp1[i] < 18*2^118 LongFelemMulLimb(&ltmp1, &ltmp1, 3); // ltmp1[i] < 3*18*2^118 < 2^124 FelemReduce(&a, &ltmp1); // a[i] < 2^59 + 2^14 /* B = X*Y^2 */ FelemSqrReduce(&tmp3, &y); // tmp3[i] < 2^59 + 2^14, tmp3 = Y^2 FelemMulReduce(&b, &x, &tmp3); // b[i] < 2^59 + 2^14 /* X = A^2-2*B */ FelemSqr(&ltmp1, &a); // ltmp1[i] < 17*(2^118 + 2^74 + 2^28) < 17*(2^118 + 2^75) FelemMulLimb(&tmp1, &b, 2); // tmp1[i] < 2^60 + 2^15 LongFelemDiff(&ltmp1, &tmp1); // ltmp1[i] < 18*2^118 FelemReduce(&x, &ltmp1); // x[i] < 2^59 + 2^14 /* Z = Z*Y */ FelemMulReduce(&z, &z, &y); // z[i] < 2^59 + 2^14 FelemSqrReduce(&tmp3, &tmp3); // tmp3[i] < 2^59 + 2^14, tmp3 = Y^4 left--; if (left > 0) { /* W = W*Y^4 */ FelemMulReduce(&w, &tmp3, &w); // w[i] < 2^59 + 2^14 } /* Y = 2*A*(B-X)-Y^4 */ FelemMulLimb(&tmp1, &a, 2); // tmp1[i] < 2^60 + 2^15 FelemSub(&tmp2, &b, &x); // b[i] < 5*2^59 + 2^14 FelemMul(&ltmp1, &tmp1, &tmp2); // ltmp1[i] < 17*(5*2^119 + 6*2^74 + 2^29) < 2^126 LongFelemDiff(&ltmp1, &tmp3); // ltmp1[i] < 2^126 + 2^64 FelemReduce(&y, &ltmp1); } /* Y = Y/2 */ FelemDivTwo(&pointOut->y, &y); FelemAssign(&pointOut->x, &x); FelemAssign(&pointOut->z, &z); } /* * Pre-computation table of base point G, which contains the X, Y, Z coordinates of n*G. * * index corresponding bit Value of n * 0 0 0 0 0 0 + 0 + 0 + 0 * 1 0 0 0 1 0 + 0 + 0 + 1 * 2 0 0 1 0 0 + 0 + 2^130 + 0 * 3 0 0 1 1 0 + 0 + 2^130 + 1 * 4 0 1 0 0 0 + 2^260 + 0 + 0 * 5 0 1 0 1 0 + 2^260 + 0 + 1 * 6 0 1 1 0 0 + 2^260 + 2^130 + 0 * 7 0 1 1 1 0 + 2^260 + 2^130 + 1 * 8 1 0 0 0 2^390 + 0 + 0 + 0 * 9 1 0 0 1 2^390 + 0 + 0 + 1 * 10 1 0 1 0 2^390 + 0 + 2^130 + 0 * 11 1 0 1 1 2^390 + 0 + 2^130 + 1 * 12 1 1 0 0 2^390 + 2^260 + 0 + 0 * 13 1 1 0 1 2^390 + 2^260 + 0 + 1 * 14 1 1 1 0 2^390 + 2^260 + 2^130 + 0 * 15 1 1 1 1 2^390 + 2^260 + 2^130 + 1 */ static const Point PRE_COMPUTE_G[TABLE_G_SIZE] = { { {{0, 0, 0, 0, 0, 0, 0, 0, 0}}, {{0, 0, 0, 0, 0, 0, 0, 0, 0}}, {{0, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x017e7e31c2e5bd66, 0x022cf0615a90a6fe, 0x00127a2ffa8de334, 0x01dfbf9d64a3f877, 0x006b4d3dbaa14b5e, 0x014fed487e0a2bd8, 0x015b4429c6481390, 0x03a73678fb2d988e, 0x00c6858e06b70404}}, {{0x00be94769fd16650, 0x031c21a89cb09022, 0x039013fad0761353, 0x02657bd099031542, 0x03273e662c97ee72, 0x01e6d11a05ebef45, 0x03d1bd998f544495, 0x03001172297ed0b1, 0x011839296a789a3b}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x0373faacbc875bae, 0x00f325023721c671, 0x00f666fd3dbde5ad, 0x01a6932363f88ea7, 0x01fc6d9e13f9c47b, 0x03bcbffc2bbf734e, 0x013ee3c3647f3a92, 0x029409fefe75d07d, 0x00ef9199963d85e5}}, {{0x011173743ad5b178, 0x02499c7c21bf7d46, 0x035beaeabb8b1a58, 0x00f989c4752ea0a3, 0x0101e1de48a9c1a3, 0x01a20076be28ba6c, 0x02f8052e5eb2de95, 0x01bfe8f82dea117c, 0x0160074d3c36ddb7}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x012f3fc373393b3b, 0x03d3d6172f1419fa, 0x02adc943c0b86873, 0x00d475584177952b, 0x012a4d1673750ee2, 0x00512517a0f13b0c, 0x02b184671a7b1734, 0x0315b84236f1a50a, 0x00a4afc472edbdb9}}, {{0x00152a7077f385c4, 0x03044007d8d1c2ee, 0x0065829d61d52b52, 0x00494ff6b6631d0d, 0x00a11d94d5f06bcf, 0x02d2f89474d9282e, 0x0241c5727c06eeb9, 0x0386928710fbdb9d, 0x01f883f727b0dfbe}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x019b0c3c9185544d, 0x006243a37c9d97db, 0x02ee3cbe030a2ad2, 0x00cfdd946bb51e0d, 0x0271c00932606b91, 0x03f817d1ec68c561, 0x03f37009806a369c, 0x03c1f30baf184fd5, 0x01091022d6d2f065}}, {{0x0292c583514c45ed, 0x0316fca51f9a286c, 0x00300af507c1489a, 0x0295f69008298cf1, 0x02c0ed8274943d7b, 0x016509b9b47a431e, 0x02bc9de9634868ce, 0x005b34929bffcb09, 0x000c1a0121681524}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x0286abc0292fb9f2, 0x02665eee9805b3f7, 0x01ed7455f17f26d6, 0x0346355b83175d13, 0x006284944cd0a097, 0x0191895bcdec5e51, 0x02e288370afda7d9, 0x03b22312bfefa67a, 0x01d104d3fc0613fe}}, {{0x0092421a12f7e47f, 0x0077a83fa373c501, 0x03bd25c5f696bd0d, 0x035c41e4d5459761, 0x01ca0d1742b24f53, 0x00aaab27863a509c, 0x018b6de47df73917, 0x025c0b771705cd01, 0x01fd51d566d760a7}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x01dd92ff6b0d1dbd, 0x039c5e2e8f8afa69, 0x0261ed13242c3b27, 0x0382c6e67026e6a0, 0x01d60b10be2089f9, 0x03c15f3dce86723f, 0x03c764a32d2a062d, 0x017307eac0fad056, 0x018207c0b96c5256}}, {{0x0196a16d60e13154, 0x03e6ce74c0267030, 0x00ddbf2b4e52a5aa, 0x012738241bbf31c8, 0x00ebe8dc04685a28, 0x024c2ad6d380d4a2, 0x035ee062a6e62d0e, 0x0029ed74af7d3a0f, 0x00eef32aec142ebd}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x00c31ec398993b39, 0x03a9f45bcda68253, 0x00ac733c24c70890, 0x00872b111401ff01, 0x01d178c23195eafb, 0x03bca2c816b87f74, 0x0261a9af46fbad7a, 0x0324b2a8dd3d28f9, 0x00918121d8f24e23}}, {{0x032bc8c1ca983cd7, 0x00d869dfb08fc8c6, 0x01693cb61fce1516, 0x012a5ea68f4e88a8, 0x010869cab88d7ae3, 0x009081ad277ceee1, 0x033a77166d064cdc, 0x03955235a1fb3a95, 0x01251a4a9b25b65e}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x00148a3a1b27f40b, 0x0123186df1b31fdc, 0x00026e7beaad34ce, 0x01db446ac1d3dbba, 0x0299c1a33437eaec, 0x024540610183cbb7, 0x0173bb0e9ce92e46, 0x02b937e43921214b, 0x01ab0436a9bf01b5}}, {{0x0383381640d46948, 0x008dacbf0e7f330f, 0x03602122bcc3f318, 0x01ee596b200620d6, 0x03bd0585fda430b3, 0x014aed77fd123a83, 0x005ace749e52f742, 0x0390fe041da2b842, 0x0189a8ceb3299242}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x012a19d6b3282473, 0x00c0915918b423ce, 0x023a954eb94405ae, 0x00529f692be26158, 0x0289fa1b6fa4b2aa, 0x0198ae4ceea346ef, 0x0047d8cdfbdedd49, 0x00cc8c8953f0f6b8, 0x001424abbff49203}}, {{0x0256732a1115a03a, 0x0351bc38665c6733, 0x03f7b950fb4a6447, 0x000afffa94c22155, 0x025763d0a4dab540, 0x000511e92d4fc283, 0x030a7e9eda0ee96c, 0x004c3cd93a28bf0a, 0x017edb3a8719217f}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x011de5675a88e673, 0x031d7d0f5e567fbe, 0x0016b2062c970ae5, 0x03f4a2be49d90aa7, 0x03cef0bd13822866, 0x03f0923dcf774a6c, 0x0284bebc4f322f72, 0x016ab2645302bb2c, 0x01793f95dace0e2a}}, {{0x010646e13527a28f, 0x01ca1babd59dc5e7, 0x01afedfd9a5595df, 0x01f15785212ea6b1, 0x0324e5d64f6ae3f4, 0x02d680f526d00645, 0x0127920fadf627a7, 0x03b383f75df4f684, 0x0089e0057e783b0a}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x00f334b9eb3c26c6, 0x0298fdaa98568dce, 0x01c2d24843a82292, 0x020bcb24fa1b0711, 0x02cbdb3d2b1875e6, 0x0014907598f89422, 0x03abe3aa43b26664, 0x02cbf47f720bc168, 0x0133b5e73014b79b}}, {{0x034aab5dab05779d, 0x00cdc5d71fee9abb, 0x0399f16bd4bd9d30, 0x03582fa592d82647, 0x02be1cdfb775b0e9, 0x0034f7cea32e94cb, 0x0335a7f08f56f286, 0x03b707e9565d1c8b, 0x0015c946ea5b614f}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x024676f6cff72255, 0x00d14625cac96378, 0x00532b6008bc3767, 0x01fc16721b985322, 0x023355ea1b091668, 0x029de7afdc0317c3, 0x02fc8a7ca2da037c, 0x02de1217d74a6f30, 0x013f7173175b73bf}}, {{0x0344913f441490b5, 0x0200f9e272b61eca, 0x0258a246b1dd55d2, 0x03753db9ea496f36, 0x025e02937a09c5ef, 0x030cbd3d14012692, 0x01793a67e70dc72a, 0x03ec1d37048a662e, 0x006550f700c32a8d}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x00d3f48a347eba27, 0x008e636649b61bd8, 0x00d3b93716778fb3, 0x004d1915757bd209, 0x019d5311a3da44e0, 0x016d1afcbbe6aade, 0x0241bf5f73265616, 0x0384672e5d50d39b, 0x005009fee522b684}}, {{0x029b4fab064435fe, 0x018868ee095bbb07, 0x01ea3d6936cc92b8, 0x000608b00f78a2f3, 0x02db911073d1c20f, 0x018205938470100a, 0x01f1e4964cbe6ff2, 0x021a19a29eed4663, 0x01414485f42afa81}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x01612b3a17f63e34, 0x03813992885428e6, 0x022b3c215b5a9608, 0x029b4057e19f2fcb, 0x0384059a587af7e6, 0x02d6400ace6fe610, 0x029354d896e8e331, 0x00c047ee6dfba65e, 0x0037720542e9d49d}}, {{0x02ce9eed7c5e9278, 0x0374ed703e79643b, 0x01316c54c4072006, 0x005aaa09054b2ee8, 0x002824000c840d57, 0x03d4eba24771ed86, 0x0189c50aabc3bdae, 0x0338c01541e15510, 0x00466d56e38eed42}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x007efd8330ad8bd6, 0x02465ed48047710b, 0x0034c6606b215e0c, 0x016ae30c53cbf839, 0x01fa17bd37161216, 0x018ead4e61ce8ab9, 0x005482ed5f5dee46, 0x037543755bba1d7f, 0x005e5ac7e70a9d0f}}, {{0x0117e1bb2fdcb2a2, 0x03deea36249f40c4, 0x028d09b4a6246cb7, 0x03524b8855bcf756, 0x023d7d109d5ceb58, 0x0178e43e3223ef9c, 0x0154536a0c6e966a, 0x037964d1286ee9fe, 0x0199bcd90e125055}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} } }; /* * Pre-computation table of base point G, which contains the X, Y, Z coordinates of n*G. * * index corresponding bit value of n * 0 0 0 0 0 0 + 0 + 0 + 0 * 1 0 0 0 1 0 + 0 + 0 + 2^65 * 2 0 0 1 0 0 + 0 + 2^195 + 0 * 3 0 0 1 1 0 + 0 + 2^195 + 2^65 * 4 0 1 0 0 0 + 2^325 + 0 + 0 * 5 0 1 0 1 0 + 2^325 + 0 + 2^65 * 6 0 1 1 0 0 + 2^325 + 2^195 + 0 * 7 0 1 1 1 0 + 2^325 + 2^195 + 2^65 * 8 1 0 0 0 2^455 + 0 + 0 + 0 * 9 1 0 0 1 2^455 + 0 + 0 + 2^65 * 10 1 0 1 0 2^455 + 0 + 2^195 + 0 * 11 1 0 1 1 2^455 + 0 + 2^195 + 2^65 * 12 1 1 0 0 2^455 + 2^325 + 0 + 0 * 13 1 1 0 1 2^455 + 2^325 + 0 + 2^65 * 14 1 1 1 0 2^455 + 2^325 + 2^195 + 0 * 15 1 1 1 1 2^455 + 2^325 + 2^195 + 2^65 */ static const Point PRE_COMPUTE_G2[TABLE_G_SIZE] = { { {{0, 0, 0, 0, 0, 0, 0, 0, 0}}, {{0, 0, 0, 0, 0, 0, 0, 0, 0}}, {{0, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x0192b0164b374ff4, 0x037b520497f54a7c, 0x00ac45dfa717d3aa, 0x012692d390795d21, 0x013153d4af815b65, 0x01dda688f88c3a92, 0x0205e32bd883b127, 0x025156b962597ab5, 0x00a54cc9cfcf7717}}, {{0x00fe2ea43f30741f, 0x0144a9495978f5d7, 0x035adaea005bd79c, 0x009dff281db66901, 0x00166a36786b2593, 0x01d7f68c07aa0052, 0x013e05225075d36d, 0x03181b67caeea6b5, 0x009004fc6adc182a}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x0287bbca1236bec1, 0x03aaf618239ad718, 0x013ef15fcd3c6c16, 0x031f697f988c94c6, 0x01ac806cb8d4ee71, 0x0035f8035894c512, 0x00a16689152cf169, 0x02236a87815c0f48, 0x014f6480d486bbf5}}, {{0x03f70ab3fe2753e3, 0x03d291808faf7e0d, 0x00d7d89caf63a562, 0x029ead2c77ee5cd6, 0x022c8c3421387422, 0x02e384f360359525, 0x01901927d338b4bd, 0x0010c294d54a76b1, 0x00c739a28761a676}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x0321984bf604e26a, 0x00a0a4346e1beaa6, 0x03959055560b38f4, 0x001c383384c9b58c, 0x013212bf16c0badc, 0x00fc4f13c1530004, 0x0297632bcdf70503, 0x0306dbd604f5574d, 0x016c53a4d13a129b}}, {{0x03534a0ccd1d6c44, 0x02279af4660bfa03, 0x030eb700f21771d7, 0x01134017e2c6529e, 0x0237abadf41d7409, 0x03547fae79ff1ce6, 0x027b74026ac60650, 0x038912af6d6a8213, 0x00c3257758f97db5}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x037d9850fb6f765b, 0x01b6f2b4333f3817, 0x025e9d97d6f42afe, 0x00a0ddfdfa42799a, 0x02bfc71aab1b4029, 0x0378d9bd912c361e, 0x012c4f53cffd5151, 0x03a0621175f5d2ca, 0x0017e0822ef93f88}}, {{0x03f7c1d7104d2069, 0x03848b7b03f6c63f, 0x003395646b614e53, 0x0342d1dd97dbc1e9, 0x022cb3def43f2341, 0x02a5f4833f79b757, 0x037b25687d324787, 0x031f409c8d51daf2, 0x010bb03f98dc9303}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x03efcaf76c0f7bd7, 0x015b1ffdf6ccf484, 0x0263903e662a439d, 0x036dfdd7c185fe97, 0x015b51f55e640b08, 0x01b1764270cbce73, 0x01e346d1bb5c8f2a, 0x03199be2199e0b68, 0x004adb8d3d68e650}}, {{0x019bce039c0da6bf, 0x0280560629ade3b2, 0x01418eb6001c82e3, 0x01e464b38910b655, 0x02b21034d1a402e4, 0x028c2df0b056c5fa, 0x032be9714380fe04, 0x01f9ecd5a9a2fcca, 0x015aa21ec32e0387}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x036ad61ba5561dd5, 0x02dab309a8810a66, 0x037393ceee004b75, 0x001e6bf8a4921c61, 0x0316b2aa5307a051, 0x0014c93b7032e644, 0x03f6b33b796d11e2, 0x023d7387badaa578, 0x003387854547b6ca}}, {{0x002d4c5b57434eda, 0x01d6e1888a73d938, 0x0018f0f64605d2fa, 0x028a20eeb35b0cc6, 0x03b68c858d509955, 0x01141d740c8bd567, 0x010750725080144c, 0x023d6ac06393f441, 0x0042923f464fb5d1}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x037549a3c618e088, 0x008b414778fa66e4, 0x00723b6b05db1367, 0x013e930419c79520, 0x0191ed1c4447ff41, 0x00bee132be6a81cb, 0x02fa7516973beafc, 0x02e25b501cead6d6, 0x01fdb7d1dc08792c}}, {{0x039cb1f8f679b9d1, 0x0083db2827d85eaf, 0x03b023aa80726182, 0x022a7457eb1c3efa, 0x03caef438de54158, 0x033997a18583466f, 0x02d7bffa14e33c59, 0x001b92a9cd69ce59, 0x0113258b03a75ad8}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x0324c5b4c56caae5, 0x0151cedc6869fdbe, 0x039370cf6ff1d385, 0x00d2d6b3a7948969, 0x0126b6384f3cdb06, 0x02f045c111b79e63, 0x00519f9f1ede134e, 0x03baffa03938dd55, 0x0179812e76db6349}}, {{0x00b69f323b354956, 0x01e0bb3f034a976c, 0x02befa0dff80f27c, 0x0098b221eb08aecb, 0x030ca3bf38ae8e58, 0x01327945cb922185, 0x0308de377b1b7b43, 0x03ab15750b28636d, 0x0091c1b0482a4305}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x02c1b0be6b746613, 0x00478b27bfbe1387, 0x03ac86e5d9c6a2d3, 0x034f25d578d34127, 0x014e05b75ec6fecc, 0x01f44f38b4e2189f, 0x00660fddda38b664, 0x03d587c9195d6412, 0x00e9dcec7d477b78}}, {{0x03321366097b5fe6, 0x011364f5be162f87, 0x03d074359e750aaa, 0x01d55171921585a2, 0x022527bb5c6eb7c7, 0x01428f6af0426fe3, 0x0036bb94e1d4d74e, 0x03c7c757a44dbe6a, 0x0088a86c9ed6cbef}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x02bff33e6cbff097, 0x019cccbe703a64a6, 0x01e7d4c24e09e350, 0x021908a33eaf46a0, 0x01a07762f8cc7516, 0x01e12df29d8644c9, 0x0098c656997c8284, 0x0373d9622e713265, 0x01ff6b101932f0be}}, {{0x0048f9e92e2c1256, 0x033fae66bf45eb34, 0x0341ddb09e352f2b, 0x0019a6a6560f97fe, 0x02cda473f1bd03ab, 0x013c344018f55636, 0x00329598b2276e7e, 0x0388a96e2249b63f, 0x00b6d123f38483d2}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x02a97232bae87062, 0x0069587df4826cd5, 0x021402a5fdf14035, 0x026f406d0b49dc31, 0x01efc862b95739c4, 0x00a6e35dc23a4083, 0x0385b4e2faa85fd8, 0x01deae552ff5231e, 0x019e03275123852a}}, {{0x0120d17ebd7a996d, 0x00a56e635a2ab069, 0x03a2d775353348fe, 0x02c60edc1e521033, 0x01078fbf7ab9fefc, 0x0375262d1601e76e, 0x00d963629d272a65, 0x027c82575888f1bb, 0x013629c8c2a9841f}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x02634027d95abe73, 0x01c2e2ef1799e9c6, 0x02eedf3cf13b5ffc, 0x0060e6a5de211043, 0x01a7806f233bb516, 0x0355633a88a8638c, 0x01dcbcc58d7d5dcc, 0x02071903acda896f, 0x01dce602b80ca444}}, {{0x013c47920922ddb6, 0x013f221e68d728d8, 0x0128ca5192ab3cb8, 0x002a19a405f6d544, 0x0074330020d40403, 0x0085611df0ce1a97, 0x028fda4edff5fc93, 0x0303b834136862a5, 0x00f443f3b7cd86cf}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x00f5614d1673ed2e, 0x03e442a78b43dbb3, 0x02408ebf00c8324c, 0x0043b6f94f69ea8b, 0x02a32bb5a7c8f6ac, 0x02b7758b243883fa, 0x00f4bd68881089bf, 0x03f61eb91693a587, 0x001d298cf9f11b0b}}, {{0x00ee97751d8d6f36, 0x0318dcb929941397, 0x022cf9840311e590, 0x02fc6b1da06aae09, 0x0134298323032dcf, 0x00d7b9072d9bb059, 0x01a099906260485b, 0x037d9ca3796ce405, 0x0147a49ba1ca4467}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x030993f7ba6f7b2c, 0x019720e705ec5bc1, 0x001c9ee10167839e, 0x0378869753d92351, 0x02bb1ace9f456b2e, 0x0336d504d809599d, 0x02d549f9910bffd0, 0x019c6284b1ec6150, 0x00c67a7fcc4ffb2c}}, {{0x022fe778c100a1dc, 0x01d14e5e8e693cb1, 0x03c139f63d3a44d9, 0x01d0b45344a8a5c9, 0x0253f5e630be559d, 0x01eaad81980912b1, 0x003febb5458d1ece, 0x01c6d59feaae8cfd, 0x01c3558976ca7dd7}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} }, { {{0x01ec0d67348526ae, 0x0334bb61a85f8ed5, 0x0286ba7fecf2d764, 0x01600344518c0c0c, 0x034e83852188ae46, 0x023d71754d3c015c, 0x010eeccfb5a5a825, 0x004247e9a02cded9, 0x0187b9aa607ca24c}}, {{0x00e77b967bc701ac, 0x022a2a00ef91bdc3, 0x01fa7bfaf46148d2, 0x003feb6276929d54, 0x028ad7f3a3f075ca, 0x035f6ba48b87bd53, 0x03fd400e74a80040, 0x0150a714837d88b5, 0x003969fa95c4e093}}, {{1, 0, 0, 0, 0, 0, 0, 0, 0}} } }; /* Select the point with subscript index in the table and place it in the point. The anti-side channel processing exists. */ static void GetPointFromTable(Point *point, const Point table[], uint32_t pointNum, const uint64_t index) { uint64_t mask, i; for (i = 0; i < pointNum; i++) { /* If i is equal to index, the last mask is all Fs. Otherwise, the last mask is all 0s. */ /* Shift rightwards by 63 bits and get the most significant bit. */ mask = (0 - (i ^ index)) >> 63; mask--; /* Conditionally assign a value, which takes effect only when i = index. */ FelemPointAssignWithMask(point, &table[i], mask); } } /* * Four bits at a fixed interval are intercepted from the scalar k1, and then decoded to obtain the index of the precomputation table G * input: * k1 indicates a array of scalars, consisting of nine 64-bit data in little-endian order. * i Corresponding bit. The value is an integer ranging [0, 65] * output: * Value range: 0–15, indicating the index of the pre-computation table. */ static void GetIndexOfTableG(uint64_t *value1, uint64_t *value2, const Array64 *k1, uint32_t i) { // The scalar k1 contains a maximum of 521 bits. 521 = 65 * 4 * 2 + 1. Therefore, one bit needs special processing. if (i == 0) { *value1 = k1->data[0] & 1; // get the least significant bit of the scalar *value2 = 0; } else { uint64_t bits1, bits2; bits1 = GET_ARRAY64_BIT(k1, i + 390) << 3; // 3rd corresponds to the scalar k1 bit: [391, 455] bits1 |= GET_ARRAY64_BIT(k1, i + 260) << 2; // 2nd corresponds to the scalar k1 bit: [261, 325] bits1 |= GET_ARRAY64_BIT(k1, i + 130) << 1; // 1st corresponds to the scalar k1 bit: [131, 195] bits1 |= GET_ARRAY64_BIT(k1, i); // 0th corresponds to the scalar k1 bit: [1 , 65] *value1 = bits1; bits2 = GET_ARRAY64_BIT(k1, i + 455) << 3; // 3rd corresponds to the scalar k1 bit: [456, 520] bits2 |= GET_ARRAY64_BIT(k1, i + 325) << 2; // 2nd corresponds to the scalar k1 bit: [326, 390] bits2 |= GET_ARRAY64_BIT(k1, i + 195) << 1; // 1st corresponds to the scalar k1 bit: [196, 260] bits2 |= GET_ARRAY64_BIT(k1, i + 65); // 0th corresponds to the scalar k1 bit: [66 , 130] *value2 = bits2; } } /* * Six consecutive bits (i-1 to i+4) are intercepted from the scalar k2, and then decoded to obtain an index of the precomputation table P and a sign of a point * input: * k2 indicates a array of scalars, consisting of nine 64-bit data in little-endian order. * i Corresponding bit. The value range is [0, 520], which can be exactly divisible by 5. * output: * sign 0 or 1: indicates whether the corresponding point needs negation. * value 0-16: indicates the index of the pre-computation table. */ static void GetIndexOfTableP(uint64_t *sign, uint64_t *value, const Array64 *k2, uint32_t i) { uint32_t s, v; uint64_t bits; if (i == 0) { // When i is the least significant bit, only the four least significant bits of k2 are truncated. bits = k2->data[0] << 1; } else { uint32_t num = (i - 1) / 64; // Each uint64_t contains 64 bits. uint32_t shift = (i - 1) % 64; // Each uint64_t contains 64 bits. bits = (k2->data[num] >> shift); if (shift + 6 > 64) { // (64 - shift) bits have been truncated. If it is less than 6 bits, continue truncating. bits |= k2->data[num + 1] << (64 - shift); } } // truncates six bits. (5-bit signed number complement + 1-bit low-order carry flag) bits &= (1 << (WINDOW_SIZE + 1)) - 1; DecodeScalarCode(&s, &v, (uint32_t)bits); *sign = s; *value = v; } /* * Calculation point coordinate r = k1 * G + k2 * P * input: * k1 a scalar multiplied by point G. If k1 is null, it will be not calculated. * k2 a scalar multiplied by point P. If k1 is null, it will be not calculated. * preCompute P-point precalculation table (0P, 1P, ... 16P) 17 points in total. * output: * r Point of the calculation result */ static void FelemPointMul(Point *r, const Array64 *k1, const Array64 *k2, const Point preCompute[TABLE_P_SIZE]) { Point res = {0}; // res is initialized to 0. Point tmp = {0}; Felem negY; uint64_t mask, sign, index, index2; bool computeG = k1 != NULL; bool computeP = k2 != NULL; bool isZero = true; // Whether the res point is zero. int32_t step = computeP ? 5 : 1; // Times of one cycle multiple the point /* P point multiplication requires 520 times, and G point multiplication requires 65 times. */ for (int32_t i = computeP ? 520 : 65; i >= 0; i -= step) { /* If the point out remains zero, the double point operation has no effect, skipping */ if (!isZero) { FelemPointMultDouble(&res, &res, step); } // Calculate the multiplication of point G. i starts calculation in the range [0, 65]. if (computeG && (i <= 65)) { /* If the G-point multiplication starts, the step of the multiple point needs to be changed to 1. */ step = 1; /* Obtain the corresponding bits. */ GetIndexOfTableG(&index, &index2, k1, (uint32_t)i); /* Add the points in Table 1 */ if (isZero) { /* If the point out is zero, the point addition operation is equivalent to direct assignment. */ GetPointFromTable(&res, PRE_COMPUTE_G, TABLE_G_SIZE, index); isZero = false; } else { GetPointFromTable(&tmp, PRE_COMPUTE_G, TABLE_G_SIZE, index); // precomputation table G is all affine coordinates, use the hybrid coordinates for acceleration. FelemPointMixAdd(&res, &res, &tmp); } /* Add the points in Table 2 */ if (i != 0) { GetPointFromTable(&tmp, PRE_COMPUTE_G2, TABLE_G_SIZE, index2); // precomputation table G2 is all affine coordinates, use the hybrid coordinates for acceleration. FelemPointMixAdd(&res, &res, &tmp); } } // Calculate the multiplication of point P. The calculation is performed every 5 bits. if (computeP && (i % 5 == 0)) { /* Obtain the corresponding bits. */ GetIndexOfTableP(&sign, &index, k2, (uint32_t)i); GetPointFromTable(&tmp, preCompute, TABLE_P_SIZE, index); /* If the value is a negative number, the point is also negative. */ FelemNeg(&negY, &tmp.y); mask = 0 - sign; FelemAssignWithMask(&tmp.y, &negY, mask); /* execute point addition */ if (isZero) { /* If the point out is zero, the point addition operation is equivalent to direct assignment. */ FelemPointAssign(&res, &tmp); isZero = false; } else { // precomputation table P is not necessarily affine coordinates, using Jacobian coordinates addition. FelemPointAdd(&res, &res, &tmp); } } } FelemPointAssign(r, &res); } /* * calculate pre-calculation table for the P point * input: * pt P point * output: * preCompute precalculation table of P point, (0P, 1P, ... 16P) 17 points in total */ static int32_t InitPreComputeTable(Point preCompute[TABLE_P_SIZE], const ECC_Point *pt) { int32_t ret; /* zero point */ FelemSetLimb(&preCompute[0].x, 0); FelemSetLimb(&preCompute[0].y, 0); FelemSetLimb(&preCompute[0].z, 0); /* 1x point */ GOTO_ERR_IF_EX(BN2Felem(&preCompute[1].x, &pt->x), ret); GOTO_ERR_IF_EX(BN2Felem(&preCompute[1].y, &pt->y), ret); GOTO_ERR_IF_EX(BN2Felem(&preCompute[1].z, &pt->z), ret); /* 2 to 16x points */ for (uint32_t i = 2; i < TABLE_P_SIZE; i++) { if ((i & 1) == 0) { /* If multiple for even times, use the multiple point formula (2n)*P = 2*(n*P), where i == 2n */ FelemPointDouble(&preCompute[i], &preCompute[i / 2]); } else { /* If multiple for odd times, use the point addition formula n*P = P + (n-1)*P, where i == n */ FelemPointAdd(&preCompute[i], &preCompute[1], &preCompute[i - 1]); } } ERR: return ret; } static int32_t ComputePointMulAdd(Point *out, const Array64 *binG, const Array64 *binP, const ECC_Point *pt) { // The stack space of a function cannot exceed 4096 bytes. // Therefore, the precomputation table is allocated by the function. Point preCompute[TABLE_P_SIZE]; /* Pre-calculation table of point pt */ int32_t ret = InitPreComputeTable(preCompute, pt); if (ret != CRYPT_SUCCESS) { return ret; } FelemPointMul(out, binG, binP, preCompute); return CRYPT_SUCCESS; } /* Calculate r = k1 * G + k2 * pt */ int32_t ECP521_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret; Array64 binG = {0}; Array64 binP = {0}; Point out; uint32_t len; /* Input parameter check */ GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP521), ret); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP521), ret); GOTO_ERR_IF(CheckBnValid(k1, FELEM_BITS), ret); GOTO_ERR_IF(CheckBnValid(k2, FELEM_BITS), ret); GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP521), ret); if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } /* Convert the input BigNum */ len = NUM_LIMBS; GOTO_ERR_IF(BN_Bn2U64Array(k1, binG.data, &len), ret); len = NUM_LIMBS; GOTO_ERR_IF(BN_Bn2U64Array(k2, binP.data, &len), ret); /* Calculate */ GOTO_ERR_IF_EX(ComputePointMulAdd(&out, &binG, &binP, pt), ret); /* Output result */ GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret); ERR: return ret; } /* Calculate r = k * pt; If pt is NULL, calculate r = k * G. This is the ConstTime processing function. */ int32_t ECP521_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { int32_t ret; Array64 bin = {0}; uint32_t len = NUM_LIMBS; Point preCompute[TABLE_P_SIZE]; /* Pre-calculation table of Point pt */ Point out; /* Input parameter check */ GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP521), ret); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP521), ret); GOTO_ERR_IF(CheckBnValid(k, FELEM_BITS), ret); if (pt != NULL) { if (pt->id != CRYPT_ECC_NISTP521) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } } /* Convert the input BigNum */ GOTO_ERR_IF(BN_Bn2U64Array(k, bin.data, &len), ret); /* Calculate */ if (pt != NULL) { GOTO_ERR_IF_EX(InitPreComputeTable(preCompute, pt), ret); FelemPointMul(&out, NULL, &bin, preCompute); } else { FelemPointMul(&out, &bin, NULL, NULL); } /* Output result */ GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret); ERR: return ret; } static int32_t MakeAffineWithInv(ECC_Point *r, const ECC_Point *a, const Felem *zInv) { int32_t ret; Felem x, y, tmp; GOTO_ERR_IF_EX(BN2Felem(&x, &a->x), ret); GOTO_ERR_IF_EX(BN2Felem(&y, &a->y), ret); FelemMulReduce(&y, &y, zInv); // y/z FelemSqrReduce(&tmp, zInv); // 1/(z^2) FelemMulReduce(&x, &x, &tmp); // x/(z^2) FelemMulReduce(&y, &y, &tmp); // y/(z^3) GOTO_ERR_IF_EX(Felem2BN(&r->x, &x), ret); GOTO_ERR_IF_EX(Felem2BN(&r->y, &y), ret); GOTO_ERR_IF_EX(BN_SetLimb(&r->z, 1), ret); ERR: return ret; } /* Convert a point to affine coordinates. */ int32_t ECP521_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { int32_t ret; Felem z, zInv; /* Input parameter check */ GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP521), ret); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP521), ret); GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP521), ret); /* Special data processing */ if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } /* Convert the input data. */ GOTO_ERR_IF_EX(BN2Felem(&z, &pt->z), ret); /* Calculate and output result */ FelemInv(&zInv, &z); GOTO_ERR_IF_EX(MakeAffineWithInv(r, pt, &zInv), ret); ERR: return ret; } #endif /* defined(HITLS_CRYPTO_CURVE_NISTP521) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_nistp521.c
C
unknown
69,838
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECP_NISTP521_H #define ECP_NISTP521_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP521) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include "ecc_local.h" #ifdef __cplusplus extern "C" { #endif /** * @brief Convert the point information pt to the affine coordinate system and refresh the data to r. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP521_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * @brief Calculate r = k1 * G + k2 * pt * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param k1 [IN] Scalar 1, with a maximum of 521 bits * @param k2 [IN] Scalar 2, with a maximum of 521 bits * @param pt [IN] Point data * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP521_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @brief If pt != NULL, calculate r = k * pt; Otherwise, calculate r = k * G * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] A scalar with a maximum of 521 bits. * @param pt [IN] Point data, which can be set to NULL. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP521_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); #ifdef __cplusplus } #endif #endif #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_nistp521.h
C
unknown
2,274
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" static bool BN_IsZeroOrOne(const BN_BigNum *bn) { return (BN_IsZero(bn) || BN_IsOne(bn)); } int32_t ECP_PointAtInfinity(const ECC_Para *para, const ECC_Point *pt) { if (para == NULL || pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // If z is 0, the point is the infinite point (0 point). if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } return CRYPT_SUCCESS; } // Check whether the point is on the curve. int32_t ECP_PointOnCurve(const ECC_Para *para, const ECC_Point *pt) { int32_t ret = 0; uint32_t nistList[] = {CRYPT_ECC_NISTP224, CRYPT_ECC_NISTP256, CRYPT_ECC_NISTP384, CRYPT_ECC_NISTP521}; ret = ECP_PointAtInfinity(para, pt); if (ret != CRYPT_SUCCESS) { return ret; } // Do not check the point on the Jacobian coordinate system. if (!BN_IsOne(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_NOT_AFFINE); return CRYPT_ECC_POINT_NOT_AFFINE; } uint32_t bits = BN_Bits(para->p); BN_Optimizer *opt = BN_OptimizerCreate(); BN_BigNum *y = BN_Create(bits); BN_BigNum *x = BN_Create(bits); BN_BigNum *dupA = BN_Dup(para->a); BN_BigNum *dupB = BN_Dup(para->b); if (opt == NULL || x == NULL || y == NULL || dupA == NULL || dupB == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (para->method->bnMontDec != NULL) { para->method->bnMontDec(dupA, para->montP); para->method->bnMontDec(dupB, para->montP); } GOTO_ERR_IF(BN_ModSqr(x, &pt->x, para->p, opt), ret); // x^2 GOTO_ERR_IF(BN_ModMul(x, x, &pt->x, para->p, opt), ret); // x^3 if (ParamIdIsValid(para->id, nistList, sizeof(nistList) / sizeof(nistList[0]))) { // Currently, only the NIST curve is supported(calculating x^3 - 3x). // Other curves need to be expanded in the future. GOTO_ERR_IF(BN_ModSub(x, x, &pt->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModSub(x, x, &pt->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModSub(x, x, &pt->x, para->p, opt), ret); // x^3 - 3x } else { // General implementation GOTO_ERR_IF(BN_ModMul(y, dupA, &pt->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModAdd(x, x, y, para->p, opt), ret); // x^3 + ax } GOTO_ERR_IF(BN_ModAdd(x, x, dupB, para->p, opt), ret); // x^3 - 3x + b GOTO_ERR_IF(BN_ModSqr(y, &pt->y, para->p, opt), ret); // y^2 if (BN_Cmp(x, y) != 0) { ret = CRYPT_ECC_POINT_NOT_ON_CURVE; BSL_ERR_PUSH_ERROR(ret); } ERR: BN_Destroy(x); BN_Destroy(y); BN_Destroy(dupA); BN_Destroy(dupB); BN_OptimizerDestroy(opt); return ret; } int32_t ECP_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { if (para == NULL || r == NULL || pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id || para->id != r->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (BN_IsOne(&pt->z)) { return ECC_CopyPoint(r, pt); } int32_t ret; uint32_t bits = BN_Bits(para->p); BN_Optimizer *opt = BN_OptimizerCreate(); BN_BigNum *zz = BN_Create(bits); BN_BigNum *inv = BN_Create(bits); if (opt == NULL || zz == NULL || inv == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(BN_ModInv(inv, &pt->z, para->p, opt), ret); GOTO_ERR_IF(BN_ModSqr(zz, inv, para->p, opt), ret); GOTO_ERR_IF(BN_ModMul(&r->x, &pt->x, zz, para->p, opt), ret); GOTO_ERR_IF(BN_ModMul(zz, zz, inv, para->p, opt), ret); GOTO_ERR_IF(BN_ModMul(&r->y, &pt->y, zz, para->p, opt), ret); GOTO_ERR_IF(BN_SetLimb(&r->z, 1), ret); ERR: BN_Destroy(zz); BN_Destroy(inv); BN_OptimizerDestroy(opt); return ret; } static int32_t Points2AffineParaCheck(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums) { if (para == NULL || pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ptNums == 0 || ptNums > PRE_COMPUTE_MAX_TABLELEN) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_WINDOW_TOO_MAX); return CRYPT_ECC_POINT_WINDOW_TOO_MAX; } if (BN_IsZero(&pt[0]->z)) { // If the first point is an infinite point, exit directly. BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } // Check whether the point ID matches. uint32_t i; for (i = 0; i < ptNums; i++) { if (para->id != pt[i]->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } } return CRYPT_SUCCESS; } static int32_t Points2AffineCreatTmpData(BN_BigNum *pt[PRE_COMPUTE_MAX_TABLELEN], uint32_t ptNums, BN_BigNum **inv, BN_Optimizer **opt, const BN_BigNum *p) { uint32_t bits = BN_Bits(p); *opt = BN_OptimizerCreate(); *inv = BN_Create(bits); if (*opt == NULL || *inv == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } uint32_t i; // Apply for pre-calculation table data. for (i = 0; i < ptNums; i++) { pt[i] = BN_Create(bits); if (pt[i] == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } } return CRYPT_SUCCESS; } static void Points2AffineDestroyTmpData(BN_BigNum *pt[PRE_COMPUTE_MAX_TABLELEN], uint32_t ptNums, BN_BigNum *inv, BN_Optimizer *opt) { for (uint32_t i = 0; i < ptNums; i++) { BN_Destroy(pt[i]); } BN_Destroy(inv); BN_OptimizerDestroy(opt); } // Multiple points are converted to the affine coordinate system. pt[0] cannot be infinite. int32_t ECP_Points2Affine(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums) { int32_t ret = Points2AffineParaCheck(para, pt, ptNums); if (ret != CRYPT_SUCCESS) { return ret; } BN_BigNum *t[PRE_COMPUTE_MAX_TABLELEN] = { 0 }; // pre-calculation table BN_BigNum *inv = NULL; BN_Optimizer *opt = NULL; GOTO_ERR_IF(Points2AffineCreatTmpData(t, ptNums, &inv, &opt, para->p), ret); // t[i] = z[0] * z[1]* ... * z[i] GOTO_ERR_IF(BN_Copy(t[0], &pt[0]->z), ret); uint32_t i; for (i = 1; i < ptNums; i++) { if (BN_IsZeroOrOne(&pt[i]->z)) { GOTO_ERR_IF(BN_Copy(t[i], t[i - 1]), ret); // copy last one continue; } GOTO_ERR_IF(BN_ModMul(t[i], t[i - 1], &pt[i]->z, para->p, opt), ret); } // inv = 1 / (z[0] * z[1] * .... * z[ptNums - 1]) GOTO_ERR_IF(BN_ModInv(inv, t[ptNums - 1], para->p, opt), ret); // t[i] = 1/z[i] for (i = ptNums - 1; i > 0; i--) { if (BN_IsZeroOrOne(&pt[i]->z)) { continue; } // t[i] *= z[0]*z[1]*...*z[i - 1] = 1/z[i] GOTO_ERR_IF(BN_ModMul(t[i], t[i - 1], inv, para->p, opt), ret); // inv *= z[i] = 1/(z[0]*z[1]*...z[i - 1]) GOTO_ERR_IF(BN_ModMul(inv, &pt[i]->z, inv, para->p, opt), ret); } GOTO_ERR_IF(BN_Copy(t[0], inv), ret); // inv = 1/z[0] // Calculate x = x/(z^2); y = y/(z^3) for (i = 0; i < ptNums; i++) { if (BN_IsZeroOrOne(&pt[i]->z)) { continue; } GOTO_ERR_IF(ECP_Point2AffineWithInv(para, pt[i], pt[i], t[i]), ret); } ERR: Points2AffineDestroyTmpData(t, ptNums, inv, opt); return ret; } // consttime static int32_t ECP_PointCopyWithMask(ECC_Point *r, const ECC_Point *a, const ECC_Point *b, BN_UINT mask) { int32_t ret; GOTO_ERR_IF(BN_CopyWithMask(&r->x, &a->x, &b->x, mask), ret); GOTO_ERR_IF(BN_CopyWithMask(&r->y, &a->y, &b->y, mask), ret); GOTO_ERR_IF(BN_CopyWithMask(&r->z, &a->z, &b->z, mask), ret); ERR: return ret; } int32_t ECP_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { if (para == NULL || r == NULL || k == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((para->id != r->id) || ((pt != NULL) && (para->id != pt->id))) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (pt != NULL && BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (BN_IsZero(k)) { (void)BN_Zeroize(&r->z); return CRYPT_SUCCESS; } if (BN_Cmp(k, para->n) == 0 && pt != NULL) { // In this case, the consttime calculation is not required // for checking whether the public key information is valid. return ECP_PointMulFast(para, r, para->n, pt); } uint32_t i; int32_t ret; BN_UINT mask; uint32_t bits; ECC_Point *base = (pt != NULL) ? ECC_DupPoint(pt) : ECC_GetGFromPara(para); ECC_Point *t = ECC_NewPoint(para); BN_Optimizer *opt = BN_OptimizerCreate(); if (base == NULL || t == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // Convert base to affine. GOTO_ERR_IF(ECP_Point2Affine(para, base, base), ret); // Add salt to prevent side channels. GOTO_ERR_IF(ECC_PointToMont(para, base, opt), ret); GOTO_ERR_IF(ECC_CopyPoint(r, base), ret); GOTO_ERR_IF(ECC_PointBlind(para, r), ret); bits = BN_Bits(k); for (i = bits - 1; i > 0; i--) { GOTO_ERR_IF(para->method->pointDouble(para, r, r), ret); GOTO_ERR_IF(para->method->pointAddAffine(para, t, r, base), ret); mask = BN_GetBit(k, i - 1) ? 0 : BN_MASK; // The last bit must be 1, and r must be updated to the latest data. GOTO_ERR_IF(ECP_PointCopyWithMask(r, t, r, mask), ret); } ECC_PointFromMont(para, r); ERR: ECC_FreePoint(t); ECC_FreePoint(base); BN_OptimizerDestroy(opt); return ret; } // Generate a BigNum equal to (p + 1) / 2 BN_BigNum *ECP_HalfPGet(const BN_BigNum *p) { int32_t ret; uint32_t bits = BN_Bits(p); BN_BigNum *halfP = BN_Create(bits + 1); if (halfP == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } GOTO_ERR_IF_EX(BN_AddLimb(halfP, p, 1), ret); GOTO_ERR_IF_EX(BN_Rshift(halfP, halfP, 1), ret); return halfP; ERR: BN_Destroy(halfP); return NULL; } // The z coordinate of point pt multiplied by z. int32_t ECP_Point2AffineWithInv(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt, const BN_BigNum *inv) { if (para == NULL || r == NULL || pt == NULL || inv == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id || para->id != r->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&pt->z)) { // Infinite point multiplied by z is meaningless. BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(BN_ModSqr(&r->z, inv, para->p, opt), ret); // z = inv^2 GOTO_ERR_IF(BN_ModMul(&r->x, &pt->x, &r->z, para->p, opt), ret); // x = x * (inv^2) GOTO_ERR_IF(BN_ModMul(&r->y, &pt->y, inv, para->p, opt), ret); GOTO_ERR_IF(BN_ModMul(&r->y, &r->y, &r->z, para->p, opt), ret); // y = y * (inv^3) GOTO_ERR_IF(BN_SetLimb(&r->z, 1), ret); // z = 1 ERR: BN_OptimizerDestroy(opt); return ret; } // Convert (x, y, z) to (x/z0^2, y/z0^3, z*z0) static int32_t ECP_PointJacMulZ(const ECC_Para *para, ECC_Point *pt, const BN_BigNum *z, BN_Optimizer *opt) { if (BN_IsZero(&pt->z)) { // Infinite point multiplied by z is meaningless. BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } uint32_t bits = BN_Bits(para->p); BN_BigNum *t = BN_Create(bits); if (t == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(BN_ModMul(&pt->z, &pt->z, z, para->p, opt), ret); // z = z * z0 GOTO_ERR_IF(BN_ModMul(&pt->y, &pt->y, z, para->p, opt), ret); // y = y * z0 GOTO_ERR_IF(BN_ModSqr(t, z, para->p, opt), ret); // t = z0^2 GOTO_ERR_IF(BN_ModMul(&pt->x, &pt->x, t, para->p, opt), ret); // x = x * (z0^2) GOTO_ERR_IF(BN_ModMul(&pt->y, &pt->y, t, para->p, opt), ret); // y = y * (z0^3) ERR: BN_Destroy(t); return ret; } /* * relate to the paper "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems" * chapter 5.3 Third Countermeasure: Randomized Projective Coordinates * reference: http://www.crypto-uni.lu/jscoron/publications/dpaecc.pdf */ int32_t ECC_PointBlind(const ECC_Para *para, ECC_Point *pt) { if (para == NULL || pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } int32_t ret; uint32_t bits = BN_Bits(para->p); BN_BigNum *blind = BN_Create(bits); BN_Optimizer *opt = BN_OptimizerCreate(); if (blind == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // Generate random numbers to randomize z. GOTO_ERR_IF(BN_RandRangeEx(para->libCtx, blind, para->p), ret); if (BN_IsZero(blind)) { ret = CRYPT_ECC_POINT_BLIND_WITH_ZERO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF_EX(ECP_PointJacMulZ(para, pt, blind, opt), ret); ERR: BN_Destroy(blind); BN_OptimizerDestroy(opt); return ret; } int32_t ECP_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b) { if (para == NULL || a == NULL || b == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != a->id || para->id != b->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // If both points are infinite points, equality is returned. if (BN_IsZero(&a->z) && BN_IsZero(&b->z)) { return CRYPT_SUCCESS; } if (BN_IsZero(&a->z) || BN_IsZero(&b->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_NOT_EQUAL); return CRYPT_ECC_POINT_NOT_EQUAL; } int32_t ret; BN_Optimizer *opt = BN_OptimizerCreate(); ECC_Point *az = ECC_DupPoint(a); ECC_Point *bz = ECC_DupPoint(b); if (opt == NULL || az == NULL || bz == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // Transfer a and b to the same z. GOTO_ERR_IF(ECP_PointJacMulZ(para, az, &b->z, opt), ret); GOTO_ERR_IF(ECP_PointJacMulZ(para, bz, &a->z, opt), ret); if ((BN_Cmp(&az->x, &bz->x) != 0) || (BN_Cmp(&az->y, &bz->y) != 0)) { ret = CRYPT_ECC_POINT_NOT_EQUAL; BSL_ERR_PUSH_ERROR(ret); } ERR: ECC_FreePoint(az); ECC_FreePoint(bz); BN_OptimizerDestroy(opt); return ret; } int32_t ECP_PointCopy(const ECC_Para *para, ECC_Point *a, const ECC_Point *b) { (void)para; int32_t ret; a->id = b->id; GOTO_ERR_IF(BN_Copy(&a->x, &b->x), ret); GOTO_ERR_IF(BN_Copy(&a->y, &b->y), ret); GOTO_ERR_IF(BN_Copy(&a->z, &b->z), ret); ERR: return ret; } // Cartesian coordinate point inversion. int32_t ECP_PointInvertAtAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != r->id || para->id != a->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&a->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } int32_t ret; GOTO_ERR_IF(ECC_CopyPoint(r, a), ret); GOTO_ERR_IF(BN_Sub(&r->y, para->p, &r->y), ret); ERR: return ret; } // The default ECP window length is 5 bits and only odd points are calculated. #define WINDOW_TABLE_SIZE (PRE_COMPUTE_MAX_TABLELEN >> 1) static int32_t ECP_PointPreCompute(const ECC_Para *para, ECC_Point *windows[], const ECC_Point *pt) { int32_t ret; ECC_Point *doubleP = ECC_NewPoint(para); windows[0] = ECC_DupPoint(pt); BN_Optimizer *opt = NULL; uint32_t i; for (i = 1; i < WINDOW_TABLE_SIZE; i++) { windows[i] = ECC_NewPoint(para); } if (doubleP == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } for (i = 0; i < WINDOW_TABLE_SIZE; i++) { if (windows[i] == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } } opt = BN_OptimizerCreate(); if (opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(ECC_PointToMont(para, windows[0], opt), ret); GOTO_ERR_IF(para->method->pointDouble(para, doubleP, windows[0]), ret); for (i = 1; i < (WINDOW_TABLE_SIZE >> 1); i++) { GOTO_ERR_IF(para->method->pointAdd(para, windows[i], windows[i - 1], doubleP), ret); } for (i = WINDOW_TABLE_SIZE >> 1; i < WINDOW_TABLE_SIZE; i++) { GOTO_ERR_IF(ECP_PointInvertAtAffine(para, windows[i], windows[i - (WINDOW_TABLE_SIZE >> 1)]), ret); } BN_OptimizerDestroy(opt); ECC_FreePoint(doubleP); return ret; ERR: for (i = 0; i < WINDOW_TABLE_SIZE; i++) { ECC_FreePoint(windows[i]); windows[i] = NULL; } BN_OptimizerDestroy(opt); ECC_FreePoint(doubleP); return ret; } static int32_t ECP_ParaPrecompute(ECC_Para *para) { if (para->tableG[0] != NULL) { // The pre-computation table already exists. return CRYPT_SUCCESS; } int32_t ret; ECC_Point *pt = ECC_GetGFromPara(para); if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } GOTO_ERR_IF(ECP_PointPreCompute(para, para->tableG, pt), ret); ERR: ECC_FreePoint(pt); return ret; } void ECC_ReCodeFree(ReCodeData *code) { if (code == NULL) { return; } BSL_SAL_FREE(code->num); // The encoded data is insensitive and does not need to be set to 0. BSL_SAL_FREE(code->wide); BSL_SAL_FREE(code); } static ReCodeData *WinCodeNew(uint32_t len) { ReCodeData *code = BSL_SAL_Malloc(sizeof(ReCodeData)); if (code == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } code->num = BSL_SAL_Malloc(len * sizeof(int8_t)); code->wide = BSL_SAL_Malloc(len * sizeof(uint32_t)); if (code->num == NULL || code->wide == NULL) { ECC_ReCodeFree(code); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } return code; } // Shift the recoded data. If the shift fails, release the code data. static int32_t RecodeKMove(ReCodeData *code, uint32_t len, uint32_t offset) { // Data shift. The value assignment starts from the tail and moves the data to the left to start position. if (memmove_s(code->num, len * sizeof(int8_t), &(code->num[offset]), code->size * sizeof(int8_t)) != EOK || memmove_s(code->wide, len * sizeof(uint32_t), &(code->wide[offset]), code->size * sizeof(uint32_t)) != EOK) { ECC_ReCodeFree(code); BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); return CRYPT_SECUREC_FAIL; } return CRYPT_SUCCESS; } // Recode scalar data, remove the most significant bit 1 of the data in the window. ReCodeData *ECC_ReCodeK(const BN_BigNum *k, uint32_t window) { if (k == NULL || window == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return NULL; } int8_t max = (1 << window); uint32_t bits = BN_Bits(k); uint32_t len = (bits / window) + 1; ReCodeData *code = WinCodeNew(len); if (code == NULL) { // The internal function WinCodeNew has executed push_err. return NULL; } uint32_t offset = len; uint32_t base = 0; bool carry = false; uint32_t lastWide = 0; while (base != bits) { offset--; // Find the start bit of the new item. while (BN_GetBit(k, base) == carry) { base++; lastWide++; } int8_t num = 0; uint32_t shift = 0; // Obtain the item of the window length. while ((shift < window) && (base != bits)) { int8_t add = (((BN_GetBit(k, base) ? 1 : 0)) << shift); num += add; base++; shift++; } // If there is a carry, perform carry processing. num += (carry ? 1 : 0); // Refresh carry. carry = num >= (max / 2); // Check whether the value >= (max/2). If yes, convert the value. // If the value of a new carry item exists, convert it to -(2^win - num) num = carry ? (-(max - num)) : num; code->num[offset] = num; code->wide[offset] = lastWide; lastWide = shift; } // If carry information exists, store data 1 in the most significant bit. if (carry) { offset--; code->num[offset] = 1; code->wide[offset] = lastWide; } code->baseBits = carry ? bits : (bits - lastWide); code->size = len - offset; // Data shift. The value assignment starts from the tail and moves the data to the left to start position. if (RecodeKMove(code, len, offset) != CRYPT_SUCCESS) { // If the operation fails, the RecodeKMove releases the code data. return NULL; } return code; } // Layout format of the pre-computation table. // This macro is used to convert values into corresponding offsets. // layout rules (1, 3, 5, 7... 15, -1, -3, ... -15) #define NUMTOOFFSET(num) (((num) < 0) ? (WINDOW_TABLE_SIZE / 2 - 1 - (((num) - 1) / 2)) : (((num) - 1) / 2)) typedef struct { uint32_t baseBits; uint32_t bit; uint32_t bit1; uint32_t bit2; uint32_t offsetK1; uint32_t offsetK2; ReCodeData *codeK1; ReCodeData *codeK2; } MulAddOffData; static int32_t GetFirstData(const ECC_Para *para, ECC_Point *t, MulAddOffData *offData, ECC_Point **windowsP) { int32_t ret; ECC_Point *const *windowsG = para->tableG; // Obtain the maximum start offset of the first item. offData->baseBits = (offData->codeK1->baseBits > offData->codeK2->baseBits) ? offData->codeK1->baseBits : offData->codeK2->baseBits; // If they are equal, the initial value is the sum of the two first items. // Otherwise, the initial value is the item with a larger offset among the two items. if (offData->codeK1->baseBits == offData->codeK2->baseBits) { int8_t offset1 = NUMTOOFFSET(offData->codeK1->num[offData->offsetK1]); int8_t offset2 = NUMTOOFFSET(offData->codeK2->num[offData->offsetK2]); GOTO_ERR_IF(para->method->pointAdd(para, t, windowsG[offset1], windowsP[offset2]), ret); offData->offsetK1++; offData->offsetK2++; offData->bit1 = offData->codeK1->wide[offData->offsetK1 - 1]; offData->bit2 = offData->codeK2->wide[offData->offsetK2 - 1]; } else if (offData->codeK1->baseBits > offData->codeK2->baseBits) { int8_t offset = NUMTOOFFSET(offData->codeK1->num[offData->offsetK1]); GOTO_ERR_IF(ECC_CopyPoint(t, windowsG[offset]), ret); offData->offsetK1++; offData->bit1 = offData->codeK1->wide[offData->offsetK1 - 1]; offData->bit2 = offData->baseBits - offData->codeK2->baseBits; } else { int8_t offset = NUMTOOFFSET(offData->codeK2->num[offData->offsetK2]); GOTO_ERR_IF(ECC_CopyPoint(t, windowsP[offset]), ret); offData->offsetK2++; offData->bit1 = offData->baseBits - offData->codeK1->baseBits; offData->bit2 = offData->codeK2->wide[offData->offsetK2 - 1]; } ERR: return ret; } static int32_t PointMulAddParaCheck(const ECC_Para *para, const ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { if (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((para->id != r->id) || (para->id != pt->id)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } return CRYPT_SUCCESS; } // NotConstTime r = order*pt int32_t ECP_PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { if (para == NULL || r == NULL || k == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((para->id != r->id) || ((pt != NULL) && (para->id != pt->id))) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(k)) { (void)BN_Zeroize(&r->z); return CRYPT_SUCCESS; } int32_t ret; ReCodeData *codeK = NULL; int8_t offset; ECC_Point *windowsP[WINDOW_TABLE_SIZE] = { 0 }; ECC_Point **windows = NULL; if (pt == NULL) { GOTO_ERR_IF(ECP_ParaPrecompute(para), ret); windows = para->tableG; } else { GOTO_ERR_IF(ECP_PointPreCompute(para, windowsP, pt), ret); windows = windowsP; } codeK = ECC_ReCodeK(k, PRE_COMPUTE_WINDOW); if (codeK == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } offset = NUMTOOFFSET(codeK->num[0]); GOTO_ERR_IF(ECC_CopyPoint(r, windows[offset]), ret); GOTO_ERR_IF(para->method->pointMultDouble(para, r, r, codeK->wide[0]), ret); for (uint32_t i = 1; i < codeK->size; i++) { offset = NUMTOOFFSET(codeK->num[i]); GOTO_ERR_IF(para->method->pointAdd(para, r, r, windows[offset]), ret); GOTO_ERR_IF(para->method->pointMultDouble(para, r, r, codeK->wide[i]), ret); } ECC_PointFromMont(para, r); ERR: for (uint32_t i = 0; i < WINDOW_TABLE_SIZE; i++) { // Clear the pre-computation table. ECC_FreePoint(windowsP[i]); } ECC_ReCodeFree(codeK); return ret; } static int32_t KZeroHandle(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { if (BN_IsZero(k1) && BN_IsZero(k2)) { // When k1 and k2 are both 0, the result is infinity. (void)BN_Zeroize(&r->z); return CRYPT_SUCCESS; } if (BN_IsZero(k1)) { return ECP_PointMulFast(para, r, k2, pt); } // k2 is 0 return ECP_PointMulFast(para, r, k1, NULL); } // wNaf NotConstTime int32_t ECP_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret = PointMulAddParaCheck(para, r, k1, k2, pt); if (ret != CRYPT_SUCCESS) { return ret; } if (BN_IsZero(k1) || BN_IsZero(k2)) { return KZeroHandle(para, r, k1, k2, pt); } MulAddOffData offData = { 0 }; ECC_Point *windowsP[WINDOW_TABLE_SIZE] = { 0 }; ECC_Point **windowsG = NULL; GOTO_ERR_IF(ECP_ParaPrecompute(para), ret); GOTO_ERR_IF(ECP_PointPreCompute(para, windowsP, pt), ret); windowsG = para->tableG; offData.codeK1 = ECC_ReCodeK(k1, PRE_COMPUTE_WINDOW); offData.codeK2 = ECC_ReCodeK(k2, PRE_COMPUTE_WINDOW); if (offData.codeK1 == NULL || offData.codeK2 == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // Obtain the initial point data. GOTO_ERR_IF(GetFirstData(para, r, &offData, windowsP), ret); while (offData.baseBits != 0) { // Slide window offData.bit1 = (offData.bit1 == 0) ? (offData.codeK1->wide[offData.offsetK1 - 1]) : (offData.bit1); offData.bit2 = (offData.bit2 == 0) ? (offData.codeK2->wide[offData.offsetK2 - 1]) : (offData.bit2); offData.bit = (offData.bit1 < offData.bit2) ? (offData.bit1) : (offData.bit2); GOTO_ERR_IF(para->method->pointMultDouble(para, r, r, offData.bit), ret); if (offData.bit == offData.bit1 && offData.offsetK1 < offData.codeK1->size) { int8_t offset = NUMTOOFFSET(offData.codeK1->num[offData.offsetK1]); GOTO_ERR_IF(para->method->pointAdd(para, r, r, windowsG[offset]), ret); offData.offsetK1++; } if (offData.bit == offData.bit2 && offData.offsetK2 < offData.codeK2->size) { int8_t offset = NUMTOOFFSET(offData.codeK2->num[offData.offsetK2]); GOTO_ERR_IF(para->method->pointAdd(para, r, r, windowsP[offset]), ret); offData.offsetK2++; } offData.bit1 -= offData.bit; offData.bit2 -= offData.bit; offData.baseBits -= offData.bit; } ECC_PointFromMont(para, r); ERR: for (uint32_t i = 0; i < WINDOW_TABLE_SIZE; i++) { // Clear the pre-computation table. ECC_FreePoint(windowsP[i]); } ECC_ReCodeFree(offData.codeK1); ECC_ReCodeFree(offData.codeK2); return ret; } static int32_t PointParaCheck(const ECC_Para *para, const ECC_Point *pt, int32_t format) { int32_t ret = ECP_PointAtInfinity(para, pt); if (ret != CRYPT_SUCCESS) { return ret; } if (format < CRYPT_POINT_COMPRESSED || format > CRYPT_POINT_HYBRID) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_FORMAT); return CRYPT_ECC_ERR_POINT_FORMAT; } return CRYPT_SUCCESS; } static int32_t EncodePointParaCheck(const ECC_Para *para, const ECC_Point *pt, const uint8_t *data, const uint32_t *dataLen, CRYPT_PKEY_PointFormat format) { int32_t ret = PointParaCheck(para, pt, format); if (ret != CRYPT_SUCCESS) { return ret; } if (data == NULL || dataLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint32_t curveBytes = BN_Bytes(para->p); // Obtain the required buff length based on the compression format. uint32_t needBytes = (format == CRYPT_POINT_COMPRESSED) ? (curveBytes + 1) : ((curveBytes << 1) + 1); if (needBytes > *dataLen) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_BUFF_LEN_NOT_ENOUGH); return CRYPT_ECC_BUFF_LEN_NOT_ENOUGH; } return CRYPT_SUCCESS; } int32_t ECP_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format) { int32_t ret; bool z = 0; uint32_t bytes, off, lastLen, i, curveBytes; GOTO_ERR_IF(EncodePointParaCheck(para, pt, data, dataLen, format), ret); // Convert the point to affine. GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret); z = BN_GetBit(&pt->y, 0); bytes = BN_Bytes(&pt->x); curveBytes = BN_Bytes(para->p); off = curveBytes - bytes; for (i = 0; i < off; i++) { // Padded 0s to the most significant bits. data[i + 1] = 0; } lastLen = *dataLen - off - 1; GOTO_ERR_IF(BN_Bn2Bin(&pt->x, &data[off + 1], &lastLen), ret); /** * ANS X9.62–2005 A.5.5 * If the compressed form is used PC is either 02 or 03. * If the uncompressed form is used Verify that PC is 04. * If the hybrid form is used Verify that PC is either 06 or 07 */ if (format == CRYPT_POINT_COMPRESSED) { // Set the bit zP to be equal to 0 if PC = 02, or 1 if PC = 03. data[0] = z ? 0x03 : 0x02; *dataLen = curveBytes + 1; return CRYPT_SUCCESS; } else if (format == CRYPT_POINT_UNCOMPRESSED) { data[0] = 0x04; } else if (format == CRYPT_POINT_HYBRID) { // Set the bit zP to be equal to 0 if PC = 06, or 1 if PC = 07. data[0] = z ? 0x07 : 0x06; } bytes = BN_Bytes(&pt->y); off = curveBytes - bytes; for (i = 0; i < off; i++) { // Padded 0s to the most significant bits. data[i + curveBytes + 1] = 0; } lastLen = *dataLen - off - curveBytes - 1; GOTO_ERR_IF(BN_Bn2Bin(&pt->y, &data[off + curveBytes + 1], &lastLen), ret); *dataLen = (curveBytes << 1) + 1; ERR: return ret; } // Calculate the y coordinate based on the x coordinate. // Currently, only the y^2 = x^3 + a*x + b curve equation can be solved. static int32_t GetYData(const ECC_Para *para, ECC_Point *pt, bool pcBit) { uint32_t bits = BN_Bits(para->p); BN_BigNum *t1 = BN_Create(bits); BN_BigNum *t2 = BN_Create(bits); BN_BigNum *dupA = BN_Dup(para->a); BN_BigNum *dupB = BN_Dup(para->b); BN_Optimizer *opt = BN_OptimizerCreate(); int32_t ret; if (t1 == NULL || t2 == NULL || opt == NULL || dupA == NULL || dupB == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } if (para->method->bnMontDec != NULL) { para->method->bnMontDec(dupA, para->montP); para->method->bnMontDec(dupB, para->montP); } BN_OptimizerSetLibCtx(para->libCtx, opt); GOTO_ERR_IF(BN_ModSqr(t1, &pt->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModMul(t1, t1, &pt->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModMul(t2, dupA, &pt->x, para->p, opt), ret); GOTO_ERR_IF(BN_ModAdd(t1, t1, t2, para->p, opt), ret); GOTO_ERR_IF(BN_ModAdd(t1, t1, dupB, para->p, opt), ret); GOTO_ERR_IF(BN_ModSqrt(&pt->y, t1, para->p, opt), ret); if (BN_GetBit(&pt->y, 0) != pcBit) { // if parity is inconsistent, y = -y GOTO_ERR_IF(BN_ModSub(&pt->y, para->p, &pt->y, para->p, opt), ret); } ERR: BN_Destroy(t1); BN_Destroy(t2); BN_Destroy(dupA); BN_Destroy(dupB); BN_OptimizerDestroy(opt); return ret; } // Check whether the parsed data is valid during point decoding and provide compression information. static int32_t GetFormatAndCheckLen(const uint8_t *data, uint32_t dataLen, CRYPT_PKEY_PointFormat *format, uint32_t curveBytes) { if (dataLen < curveBytes + 1) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE); return CRYPT_ECC_ERR_POINT_CODE; } uint8_t pc = data[0]; /** * ANS X9.62–2005 A.5.5 * If the compressed form is used PC is either 02 or 03. * If the uncompressed form is used Verify that PC is 04. * If the hybrid form is used Verify that PC is either 06 or 07 */ if (pc == 0x04) { // uncompressed if (dataLen != (curveBytes << 1) + 1) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE); return CRYPT_ECC_ERR_POINT_CODE; } *format = CRYPT_POINT_UNCOMPRESSED; return CRYPT_SUCCESS; } else if (pc == 0x02 || pc == 0x03) { // compressed if (dataLen != curveBytes + 1) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE); return CRYPT_ECC_ERR_POINT_CODE; } *format = CRYPT_POINT_COMPRESSED; return CRYPT_SUCCESS; } else if (pc == 0x06 || pc == 0x07) { // hybriid if (dataLen != (curveBytes << 1) + 1) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE); return CRYPT_ECC_ERR_POINT_CODE; } *format = CRYPT_POINT_HYBRID; return CRYPT_SUCCESS; } BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE); return CRYPT_ECC_ERR_POINT_CODE; } int32_t ECP_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen) { if (para == NULL || pt == NULL || data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } int32_t ret; uint32_t curveBytes = BN_Bytes(para->p); CRYPT_PKEY_PointFormat format = CRYPT_POINT_UNCOMPRESSED; bool pcBit = ((data[0] & 0x01) == 1); // Parity check. If it's odd, return true. If it's even, return false. GOTO_ERR_IF(GetFormatAndCheckLen(data, dataLen, &format, curveBytes), ret); GOTO_ERR_IF(BN_SetLimb(&pt->z, 1), ret); if (format == CRYPT_POINT_COMPRESSED) { GOTO_ERR_IF(BN_Bin2Bn(&pt->x, &data[1], curveBytes), ret); // The y-coordinate information is obtained through calculation. GOTO_ERR_IF(GetYData(para, pt, pcBit), ret); } else if (format == CRYPT_POINT_UNCOMPRESSED) { GOTO_ERR_IF(BN_Bin2Bn(&pt->x, &data[1], curveBytes), ret); GOTO_ERR_IF(BN_Bin2Bn(&pt->y, &data[1 + curveBytes], curveBytes), ret); } else if (format == CRYPT_POINT_HYBRID) { GOTO_ERR_IF(BN_Bin2Bn(&pt->x, &data[1], curveBytes), ret); GOTO_ERR_IF(BN_Bin2Bn(&pt->y, &data[1 + curveBytes], curveBytes), ret); // The parity information on the coded information is inconsistent. if (BN_GetBit(&pt->y, 0) != pcBit) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE); ret = CRYPT_ECC_ERR_POINT_CODE; goto ERR; } } // Check whether the value on the point exceeds the modulus field. if ((BN_Cmp(para->p, &pt->y) <= 0) || (BN_Cmp(para->p, &pt->x) <= 0)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_NOT_ON_CURVE); ret = CRYPT_ECC_POINT_NOT_ON_CURVE; goto ERR; } if (format != CRYPT_POINT_COMPRESSED) { // Check whether the point is on the curve. GOTO_ERR_IF(ECP_PointOnCurve(para, pt), ret); } return ret; ERR: // Ensure that pt is not NULL. Therefore, pt->z is not NULL. This invoking does not fail. (void)BN_Zeroize(&pt->z); return ret; } #endif /* HITLS_CRYPTO_ECC */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_simple.c
C
unknown
38,983
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECP_SM2_H #define ECP_SM2_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_ECC) && defined(HITLS_CRYPTO_SM2) #include "crypt_ecc.h" #include "crypt_bn.h" #ifdef __cplusplus extern "C" { #endif /** * @ingroup sm2 * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar * @param pt [IN] Point data, which can be set to NULL. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Sm2PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *scalar, const ECC_Point *pt); /** * @ingroup sm2 * @brief Calculate r = a + b, where a is the Jacobian coordinate system and b is the affine coordinate system. * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param a,b [IN] Point data * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Sm2PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup sm2 * @brief Calculate r = 2*a, where a is the Jacobian coordinate system. * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param a [IN] Point data * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Sm2PointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * @ingroup sm2 * @brief Convert the point information pt to the affine coordinate system and refresh the data to r. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information * * @retval CRYPT_SUCCESS succeeded * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Sm2Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * @ingroup sm2 * @brief Calculate r = k * pt, * Non-consttime calculation * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar * @param pt [IN] Point data, which can be set to NULL. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Sm2PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); int32_t ECP_Sm2OrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); int32_t ECP_Sm2PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); #ifdef __cplusplus } #endif #endif #endif
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/ecp_sm2.h
C
unknown
3,305
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include <stdbool.h> #include "securec.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "crypt_bn.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "ecc_utils.h" #include "bsl_util_internal.h" #ifndef __SIZEOF_INT128__ #error "This nistp256 implementation require the compiler support 128-bits integer." #endif /* field element definition */ #define FELEM_BITS 256 #define FELEM_BYTES 32 #define LIMB_BITS (sizeof(uint128_t) << 3) #define LIMB_NUM 4 #define BASE_BITS 64 /* The pre-calculation table of the G table has 16 points. */ #define TABLE_G_SIZE 16 /* The pre-calculation table of the P table has 17 points. */ #define TABLE_P_SIZE 17 /* * Field elements, stored as arrays, all represented in little endian. * Each element of the array is called a digit. Each digit represents an extended 2 ^ 64-bit. * That is, Felem can be expressed as: * f_0 + f_1 * 2^64 + f_2 * 2^128 + f_3 * 2^192 * LongFelem is used to store the result of multiplication of field elements and is twice the width of Felem. * Point is a point represented as a Jacobian coordinate */ typedef struct { uint128_t data[LIMB_NUM]; } Felem; typedef struct { uint128_t data[LIMB_NUM * 2]; } LongFelem; typedef struct { Felem x; Felem y; Felem z; } Point; /* ------------------------------------------------------------ */ /* ECP256 field order p. The value is 2^256 - 2^224 + 2^192 + 2^96 - 1, little endian */ static const Felem FIELD_ORDER = { {0xffffffffffffffff, 0x00000000ffffffff, 0x0000000000000000, 0xffffffff00000001} }; /* * Pre-computation table of the base point G, which contains the (X, Y, Z) coordinates of k*G * * PRE_MUL_G divides all bits into four equal parts. * index corresponding bit value of k * 0 0 0 0 0 0 + 0 + 0 + 0 * 1 0 0 0 1 0 + 0 + 0 + 1 * 2 0 0 1 0 0 + 0 + 2^64 + 0 * 3 0 0 1 1 0 + 0 + 2^64 + 1 * 4 0 1 0 0 0 + 2^128 + 0 + 0 * 5 0 1 0 1 0 + 2^128 + 0 + 1 * 6 0 1 1 0 0 + 2^128 + 2^64 + 0 * 7 0 1 1 1 0 + 2^128 + 2^64 + 1 * 8 1 0 0 0 2^192 + 0 + 0 + 0 * 9 1 0 0 1 2^192 + 0 + 0 + 1 * 10 1 0 1 0 2^192 + 0 + 2^64 + 0 * 11 1 0 1 1 2^192 + 0 + 2^64 + 1 * 12 1 1 0 0 2^192 + 2^128 + 0 + 0 * 13 1 1 0 1 2^192 + 2^128 + 0 + 1 * 14 1 1 1 0 2^192 + 2^128 + 2^64 + 0 * 15 1 1 1 1 2^192 + 2^128 + 2^64 + 1 * */ static const Point PRE_MUL_G[TABLE_G_SIZE] = { { {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xf4a13945d898c296, 0x77037d812deb33a0, 0xf8bce6e563a440f2, 0x6b17d1f2e12c4247}}, {{0xcbb6406837bf51f5, 0x2bce33576b315ece, 0x8ee7eb4a7c0f9e16, 0x4fe342e2fe1a7f9b}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x90e75cb48e14db63, 0x29493baaad651f7e, 0x8492592e326e25de, 0x0fa822bc2811aaa5}}, {{0xe41124545f462ee7, 0x34b1a65050fe82f5, 0x6f4ad4bcb3df188b, 0xbff44ae8f5dba80d}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x93391ce2097992af, 0xe96c98fd0d35f1fa, 0xb257c0de95e02789, 0x300a4bbc89d6726f}}, {{0xaa54a291c08127a0, 0x5bb1eeada9d806a5, 0x7f1ddb25ff1e3c6f, 0x72aac7e0d09b4644}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x57c84fc9d789bd85, 0xfc35ff7dc297eac3, 0xfb982fd588c6766e, 0x447d739beedb5e67}}, {{0x0c7e33c972e25b32, 0x3d349b95a7fae500, 0xe12e9d953a4aaff7, 0x2d4825ab834131ee}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x13949c932a1d367f, 0xef7fbd2b1a0a11b7, 0xddc6068bb91dfc60, 0xef9519328a9c72ff}}, {{0x196035a77376d8a8, 0x23183b0895ca1740, 0xc1ee9807022c219c, 0x611e9fc37dbb2c9b}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xcae2b1920b57f4bc, 0x2936df5ec6c9bc36, 0x7dea6482e11238bf, 0x550663797b51f5d8}}, {{0x44ffe216348a964c, 0x9fb3d576dbdefbe1, 0x0afa40018d9d50e5, 0x157164848aecb851}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xe48ecafffc5cde01, 0x7ccd84e70d715f26, 0xa2e8f483f43e4391, 0xeb5d7745b21141ea}}, {{0xcac917e2731a3479, 0x85f22cfe2844b645, 0x0990e6a158006cee, 0xeafd72ebdbecc17b}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x6cf20ffb313728be, 0x96439591a3c6b94a, 0x2736ff8344315fc5, 0xa6d39677a7849276}}, {{0xf2bab833c357f5f4, 0x824a920c2284059b, 0x66b8babd2d27ecdf, 0x674f84749b0b8816}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x2df48c04677c8a3e, 0x74e02f080203a56b, 0x31855f7db8c7fedb, 0x4e769e7672c9ddad}}, {{0xa4c36165b824bbb0, 0xfb9ae16f3b9122a5, 0x1ec0057206947281, 0x42b99082de830663}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x6ef95150dda868b9, 0xd1f89e799c0ce131, 0x7fdc1ca008a1c478, 0x78878ef61c6ce04d}}, {{0x9c62b9121fe0d976, 0x6ace570ebde08d4f, 0xde53142c12309def, 0xb6cb3f5d7b72c321}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x7f991ed2c31a3573, 0x5b82dd5bd54fb496, 0x595c5220812ffcae, 0x0c88bc4d716b1287}}, {{0x3a57bf635f48aca8, 0x7c8181f4df2564f3, 0x18d1b5b39c04e6aa, 0xdd5ddea3f3901dc6}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xe96a79fb3e72ad0c, 0x43a0a28c42ba792f, 0xefe0a423083e49f3, 0x68f344af6b317466}}, {{0xcdfe17db3fb24d4a, 0x668bfc2271f5c626, 0x604ed93c24d67ff3, 0x31b9c405f8540a20}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xd36b4789a2582e7f, 0x0d1a10144ec39c28, 0x663c62c3edbad7a0, 0x4052bf4b6f461db9}}, {{0x235a27c3188d25eb, 0xe724f33999bfcc5b, 0x862be6bd71d70cc8, 0xfecf4d5190b0fc61}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x74346c10a1d4cfac, 0xafdf5cc08526a7a4, 0x123202a8f62bff7a, 0x1eddbae2c802e41a}}, {{0x8fa0af2dd603f844, 0x36e06b7e4c701917, 0x0c45f45273db33a0, 0x43104d86560ebcfc}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x9615b5110d1d78e5, 0x66b0de3225c4744b, 0x0a4a46fb6aaf363a, 0xb48e26b484f7a21c}}, {{0x06ebb0f621a01b2d, 0xc004e4048b7b0f98, 0x64131bcdfed6f668, 0xfac015404d4d3dab}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} } }; /* * Pre-computation table of the base point G, which contains the (X, Y, Z) coordinates of k*G * * PRE_MUL_G2[] = PRE_MUL_G[] * 2^32 * index corresponding bit value of k * 0 0 0 0 0 0 + 0 + 0 + 0 * 1 0 0 0 1 0 + 0 + 0 + 2^32 * 2 0 0 1 0 0 + 0 + 2^96 + 0 * 3 0 0 1 1 0 + 0 + 2^96 + 2^32 * 4 0 1 0 0 0 + 2^160 + 0 + 0 * 5 0 1 0 1 0 + 2^160 + 0 + 2^32 * 6 0 1 1 0 0 + 2^160 + 2^96 + 0 * 7 0 1 1 1 0 + 2^160 + 2^96 + 2^32 * 8 1 0 0 0 2^224 + 0 + 0 + 0 * 9 1 0 0 1 2^224 + 0 + 0 + 2^32 * 10 1 0 1 0 2^224 + 0 + 2^96 + 0 * 11 1 0 1 1 2^224 + 0 + 2^96 + 2^32 * 12 1 1 0 0 2^224 + 2^160 + 0 + 0 * 13 1 1 0 1 2^224 + 2^160 + 0 + 2^32 * 14 1 1 1 0 2^224 + 2^160 + 2^96 + 0 * 15 1 1 1 1 2^224 + 2^160 + 2^96 + 2^32 */ static const Point PRE_MUL_G2[TABLE_G_SIZE] = { { {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}, {{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x3a5a9e22185a5943, 0x1ab919365c65dfb6, 0x21656b32262c71da, 0x7fe36b40af22af89}}, {{0xd50d152c699ca101, 0x74b3d5867b8af212, 0x9f09f40407dca6f1, 0xe697d45825b63624}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xa84aa9397512218e, 0xe9a521b074ca0141, 0x57880b3a18a2e902, 0x4a5b506612a677a6}}, {{0x0beada7a4c4f3840, 0x626db15419e26d9d, 0xc42604fbe1627d40, 0xeb13461ceac089f1}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xf9faed0927a43281, 0x5e52c4144103ecbc, 0xc342967aa815c857, 0x0781b8291c6a220a}}, {{0x5a8343ceeac55f80, 0x88f80eeee54a05e3, 0x97b2a14f12916434, 0x690cde8df0151593}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xaee9c75df7f82f2a, 0x9e4c35874afdf43a, 0xf5622df437371326, 0x8a535f566ec73617}}, {{0xc5f9a0ac223094b7, 0xcde533864c8c7669, 0x37e02819085a92bf, 0x0455c08468b08bd7}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x0c0a6e2c9477b5d9, 0xf9a4bf62876dc444, 0x5050a949b6cdc279, 0x06bada7ab77f8276}}, {{0xc8b4aed1ea48dac9, 0xdebd8a4b7ea1070f, 0x427d49101366eb70, 0x5b476dfd0e6cb18a}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x7c5c3e44278c340a, 0x4d54606812d66f3b, 0x29a751b1ae23c5d8, 0x3e29864e8a2ec908}}, {{0x142d2a6626dbb850, 0xad1744c4765bd780, 0x1f150e68e322d1ed, 0x239b90ea3dc31e7e}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x78c416527a53322a, 0x305dde6709776f8e, 0xdbcab759f8862ed4, 0x820f4dd949f72ff7}}, {{0x6cc544a62b5debd4, 0x75be5d937b4e8cc4, 0x1b481b1b215c14d3, 0x140406ec783a05ec}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x6a703f10e895df07, 0xfd75f3fa01876bd8, 0xeb5b06e70ce08ffe, 0x68f6b8542783dfee}}, {{0x90c76f8a78712655, 0xcf5293d2f310bf7f, 0xfbc8044dfda45028, 0xcbe1feba92e40ce6}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xe998ceea4396e4c1, 0xfc82ef0b6acea274, 0x230f729f2250e927, 0xd0b2f94d2f420109}}, {{0x4305adddb38d4966, 0x10b838f8624c3b45, 0x7db2636658954e7a, 0x971459828b0719e5}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x4bd6b72623369fc9, 0x57f2929e53d0b876, 0xc2d5cba4f2340687, 0x961610004a866aba}}, {{0x49997bcd2e407a5e, 0x69ab197d92ddcb24, 0x2cf1f2438fe5131c, 0x7acb9fadcee75e44}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x254e839423d2d4c0, 0xf57f0c917aea685b, 0xa60d880f6f75aaea, 0x24eb9acca333bf5b}}, {{0xe3de4ccb1cda5dea, 0xfeef9341c51a6b4f, 0x743125f88bac4c4d, 0x69f891c5acd079cc}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xeee44b35702476b5, 0x7ed031a0e45c2258, 0xb422d1e7bd6f8514, 0xe51f547c5972a107}}, {{0xa25bcd6fc9cf343d, 0x8ca922ee097c184e, 0xa62f98b3a9fe9a06, 0x1c309a2b25bb1387}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x9295dbeb1967c459, 0xb00148833472c98e, 0xc504977708011828, 0x20b87b8aa2c4e503}}, {{0x3063175de057c277, 0x1bd539338fe582dd, 0x0d11adef5f69a044, 0xf5c6fa49919776be}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0x8c944e760fd59e11, 0x3876cba1102fad5f, 0xa454c3fad83faa56, 0x1ed7d1b9332010b9}}, {{0xa1011a270024b889, 0x05e4d0dcac0cd344, 0x52b520f0eb6a2a24, 0x3a2b03f03217257a}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} }, { {{0xf20fc2afdf1d043d, 0xf330240db58d5a62, 0xfc7d229ca0058c3b, 0x15fee545c78dd9f6}}, {{0x501e82885bc98cda, 0x41ef80e5d046ac04, 0x557d9f49461210fb, 0x4ab5b6b2b8753f81}}, {{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}} } }; /* --------------------------helper function-------------------------- */ /* * Convert big-endian byte stream to Felem */ static inline void Bin2Felem(Felem *out, const uint8_t in[FELEM_BYTES]) { // Write the input data to 128-bit digits every 64 bits. out->data[3] = (uint128_t)Uint64FromBeBytes(in); // Index 3 read 0~7 bytes out->data[2] = (uint128_t)Uint64FromBeBytes(in + 8); // Index 2 read 8~15 bytes out->data[1] = (uint128_t)Uint64FromBeBytes(in + 16); // Index 1 read 16~23 bytes out->data[0] = (uint128_t)Uint64FromBeBytes(in + 24); // Index 0 read 24~31 bytes } /* * Convert Felem to big-endian byte stream * Input: * in[] < 2^64 * Output: * out length is 32 */ static inline void Felem2Bin(uint8_t out[FELEM_BYTES], const Felem *in) { Uint64ToBeBytes((uint64_t)in->data[3], out); // Index 3 write 0~7 bytes Uint64ToBeBytes((uint64_t)in->data[2], out + 8); // Index 2 write 8~15 bytes Uint64ToBeBytes((uint64_t)in->data[1], out + 16); // Index 1 write 16~23 bytes Uint64ToBeBytes((uint64_t)in->data[0], out + 24); // Index 0 write 24~31 bytes } /* * Convert BN to Felem * Output: * out[] < 2^64 */ static int32_t BN2Felem(Felem *out, const BN_BigNum *in) { int32_t ret; uint8_t bin[FELEM_BYTES]; uint32_t len = FELEM_BYTES; GOTO_ERR_IF(BN_Bn2Bin(in, bin, &len), ret); for (uint32_t i = 0; i < FELEM_BYTES; ++i) { bin[FELEM_BYTES - 1 - i] = i < len ? bin[len - 1 - i] : 0; } Bin2Felem(out, bin); ERR: return ret; } /* * Convert Felem to BN * Input: * in[] < 2^64 */ static int32_t Felem2BN(BN_BigNum *out, const Felem *in) { int32_t ret; uint8_t bin[FELEM_BYTES]; Felem2Bin(bin, in); GOTO_ERR_IF(BN_Bin2Bn(out, bin, FELEM_BYTES), ret); ERR: return ret; } /* ---------------------------field operation--------------------------- */ /* * Assignment */ static inline void FelemAssign(Felem *out, const Felem *in) { out->data[0] = in->data[0]; // out->data[0] get the value out->data[1] = in->data[1]; // out->data[1] get the value out->data[2] = in->data[2]; // out->data[2] get the value out->data[3] = in->data[3]; // out->data[3] get the value } /* * Copy each digit by mask. If the corresponding bit is 1, copy it. If the corresponding bit is 0, retain it. */ static inline void FelemAssignWithMask(Felem *out, const Felem *in, const uint128_t mask) { uint128_t rmask = ~mask; // The value of out->data[0] is changed or remains unchanged. out->data[0] = (in->data[0] & mask) | (out->data[0] & rmask); // The value of out->data[1] is changed or remains unchanged. out->data[1] = (in->data[1] & mask) | (out->data[1] & rmask); // The value of out->data[2] is changed or remains unchanged. out->data[2] = (in->data[2] & mask) | (out->data[2] & rmask); // The value of out->data[3] is changed or remains unchanged. out->data[3] = (in->data[3] & mask) | (out->data[3] & rmask); } /* * Set the lowest digit */ static inline void FelemSetLimb(Felem *out, const uint128_t in) { out->data[0] = in; // out->data[0] get the value out->data[1] = 0; // out->data[1] clear to 0 out->data[2] = 0; // out->data[2] clear to 0 out->data[3] = 0; // out->data[3] clear to 0 } /* * Zero judgment: input less than 2 ^ 256, only 0 and p need to be judged. * Input: * in[] < 2^64 */ static inline uint128_t FelemIsZero(const Felem *in) { uint128_t isZero, isP; // Check whether digits 0, 1, 2, and 3 are all 0. isZero = in->data[0] | in->data[1] | in->data[2] | in->data[3]; isZero -= 1; // If in == 0, the most significant bit is 1. // Determine that in is equal to the field order. isP = (in->data[0] ^ FIELD_ORDER.data[0]) | // Determine whether the digits 0 is equal to the order (in->data[1] ^ FIELD_ORDER.data[1]) | // Determine whether the digits 1 is equal to the order (in->data[2] ^ FIELD_ORDER.data[2]) | // Determine whether the digits 2 is equal to the order (in->data[3] ^ FIELD_ORDER.data[3]); // Determine whether the digits 3 is equal to the order isP -= 1; // If in == p, the most significant bit is 1. return (isZero | isP) >> (LIMB_BITS - 1); } /* * Obtain the bit string whose length is len at idx in Felem. * Input: * in[] < 2^64 * 0 < len <= 64 */ static uint64_t FelemGetBits(const Felem *in, int32_t idx, uint32_t len) { uint128_t ret; uint32_t lower, upper; uint64_t mask; lower = (uint32_t)idx; // When 0 <= lower < 256, the most significant bit is 1, obtain the most significant bit by right shifted by 31 bits mask = (uint64_t)0 - ((~lower & (lower - 256)) >> 31); ret = (uint64_t)in->data[(lower / BASE_BITS) & mask] & mask; upper = (uint32_t)idx + BASE_BITS; // next unary block // When 0 <= upper < 256, the most significant bit is 1, obtain the most significant bit by right shifted by 31 bits mask = (uint64_t)0 - ((~upper & (upper - 256)) >> 31); ret |= (uint128_t)((uint64_t)in->data[(upper / BASE_BITS) & mask] & mask) << BASE_BITS; // Take the lower six bits, that is, mod 64, regardless of the positive and negative values of "lower". ret >>= lower & (BASE_BITS - 1); ret &= ((uint64_t)1 << len) - 1; // All 1-bit string with the len length return (uint64_t)ret; } /* * Field element reduction, retains the base bit (64 bits) of each digit in the 4-ary Felem, and reduce the high bit. * Should be called before modular multiplication, modulus square, or modulus * Input: * in[] < 2^127 * Output: * out[] < 2^64 */ static void FelemReduce(Felem *out, const Felem *in) { uint128_t *po = out->data; const uint128_t *pi = in->data; const uint128_t borrow = (uint128_t)1 << 96; // 2 ^ 96 borrowed from low to high const uint128_t lend = (uint128_t)1 << 32; // 2 ^ 32 lent from high to low uint128_t carryLimb, carryLimbTotal; // Process the carry of each digit first: 0 -> 1 -> 2 -> 3 po[1] = pi[1] + (pi[0] >> BASE_BITS); // po[1] takes the input value and adds the carry of digit 0. po[2] = pi[2] + (po[1] >> BASE_BITS); // po[2] takes the input value and adds the carry of digit 1. po[3] = pi[3] + (po[2] >> BASE_BITS); // po[3] takes the input value and adds the carry of digit 2. po[0] = (uint64_t)pi[0]; // po[0] takes the basic digit. po[1] = (uint64_t)po[1]; // po[1] takes the basic digit. po[2] = (uint64_t)po[2]; // po[2] takes the basic digit. // Now reduce the highest digit. Only need to reduce the carry of the highest digit three times. // Note the carry bit of out[3] as carryLimb. // It can be known from the equation: // carryLimb * 2^256 = carryLimb * (2^224 - 2^192 - 2^96 + 1) (mod 2^256 - 2^224 + 2^192 + 2^96 - 1) // The part of carryLimb * (2^224 - 2^192) needs to be placed in out[3] // // First reduction: po[3] < 2^128 ---> po[3] < 2^96 // Assume that po[3] = 0x ffffffffffffffff ffffffffffffffff // 0x 0000000000000000 ffffffffffffffff -> po[3] basic digit(unit) // + 0x 00000000ffffffff ffffffff00000000 -> carryLimb * 2^32 // - 0x 0000000000000000 ffffffffffffffff -> carryLimb // ----------------------------------------- // = 0x 00000000ffffffff ffffffff00000000 -> po[3] <= 2^96 - 2^32 < 2^96 // Second reduction: po[3] < 2^96 ---> po[3] < 2^65 - 2^33 // Assume that po[3] = 0x 00000000ffffffff ffffffffffffffff // 0x 0000000000000000 ffffffffffffffff // + 0x 0000000000000000 ffffffff00000000 // - 0x 0000000000000000 00000000ffffffff // ----------------------------------------- // = 0x 0000000000000001 fffffffe00000000 -> po[3] <= 2^65 - 2^33 < 2^65 - 2^33 // Third reduction: po[3] < 2^65 - 2^32 ---> po[3] < 2^64 // Assume that po[3] = 0x 0000000000000001 ffffffff00000000 // 0x 0000000000000000 ffffffff00000000 // + 0x 0000000000000000 0000000100000000 // - 0x 0000000000000000 0000000000000001 // ----------------------------------------- // = 0x 0000000000000000 ffffffffffffffff -> po[3] < 2^64 // // In addition, use carryLimbTotal to store the sum of carry bits. // In this way, carryLimbTotal*(-2^96 + 1) can be calculated at a time. // The simple conclusion is that when out[3] is the maximum, carryLimbTotal is the maximum. // Consider the maximum value of out[3]. // 0x 7fffffffffffffff ffffffffffffffff -> Maximum value of pi[3] (pi[3] < 2^127) // + 0x 0000000000000000 8000000000000000 -> Maximum value of carry of pi[2] // ----------------------------------------- // = 0x 8000000000000000 7fffffffffffffff -> Maximum value of po[3] // Use the value to perform three reduction: // carryLimbTotal = 0x8000000000000000 + 0x7fffffff + 0x1 = 0x8000000080000000 < 2^64 carryLimbTotal = carryLimb = po[3] >> BASE_BITS; // Reduce carryLimb and take the carry of po[3]. po[3] = (uint64_t)po[3] + (carryLimb << 32) - carryLimb; // The reduction factor on po[3] is (2 ^ 32 - 1). carryLimbTotal += (carryLimb = po[3] >> BASE_BITS); // Reduce carryLimb and take the carry of po[3]. po[3] = (uint64_t)po[3] + (carryLimb << 32) - carryLimb; // The reduction factor on po[3] is (2 ^ 32 - 1). carryLimbTotal += (carryLimb = po[3] >> BASE_BITS); // Reduce carryLimb and take the carry of po[3]. po[3] = (uint64_t)po[3] + (carryLimb << 32) - carryLimb; // The reduction factor on po[3] is (2 ^ 32 - 1). // Calculate the remaining carryLimbTotal * (-2^96 + 1) <= 0 // In this case, it is impossible to carry out[4]. Therefore, po[3] < 2^64. // If carryLimbTotal > 0, po[3] must be equal to at least 2 ^ 32 - 1. (i.e., po[3] = 2^64 in the last step) // In this case, it is obvious that (2^32 - 1) * 2^192 > |carryLimbTotal * (-2^96 + 1)| po[0] += carryLimbTotal; // reduction of carryLimbTotal which the coefficient is 1 // po[1] + po[0] carry + Borrowed Bits - Reduction Factor 2^32 po[1] += ((po[0] >> BASE_BITS) ^ borrow) - (carryLimbTotal << 32); // po[2] + po[1] carry + Borrowing Bits - Lending Bits po[2] += ((po[1] >> BASE_BITS) ^ borrow) - lend; // po[3] + po[2] carry - Lending Bits po[3] += (po[2] >> BASE_BITS) - lend; po[0] = (uint64_t)po[0]; // po[0] takes the basic digit. po[1] = (uint64_t)po[1]; // po[1] takes the basic digit. po[2] = (uint64_t)po[2]; // po[2] takes the basic digit. } /* * Field element reduction, converting 8-ary LongFelem to 4-ary Felem * Input: * in[] < 2^80 * Output: * out[] < 2^115 * - out[0] < (2^114 + 2^82 - 2^50) + 2^(80 + 32) + 2 * 2^80 < 2^115 * - out[1] < (2^114 + 2^82 - 2^50) + 2^(80 + 33) + 2 * 2^80 < 2^115 * - out[2] < (2^114 + 2^82 - 2^50) + 2^(80 + 33) + 4 * 2^80 < 2^115 * - out[3] < (2^114 + 2^82 - 2^50) + 2^(80 + 32) + 4 * 2^80 < 2^115 * out[] > 0 * - out[0] > (2^114 - 2^82) - 2 * 2^(80 + 32) - 2 * 2^80 > 0 * - out[1] > (2^114 - 2^82) - 2^(80 + 32) - 2^80 > 0 * - out[2] > (2^114 - 2^82) - 2^(80 + 32) - 2^80 > 0 * - out[3] > (2^114 - 2^82) - 2 * 2^(80 + 32) - 2^80 > 0 */ static void LongFelemReduce(Felem *out, const LongFelem *in) { // n ≡ n / a * (a - b) ≡ n / a * b (mod (a - b)) // The following formula can be obtained: // 2^n ≡ 2^(n - 256) * (2^224 - 2^192 - 2^96 + 1) (mod (2^256 - 2^224 + 2^192 + 2^96 - 1)) // // 2^256 mod p // = 2^224 - 2^192 - 2^96 + 1 // // 2^288 mod p // = 2^256 - 2^224 - 2^128 + 2^32 // = -2^192 - 2^128 - 2^96 + 2^32 + 1 // // 2^320 mod p // = 2^288 - 2^256 - 2^160 + 2^64 // = -2^224 - 2^160 - 2^128 + 2^64 + 2^32 // // 2^352 mod p // = 2^320 - 2^288 - 2^192 + 2^96 // = -2^224 - 2^160 + 2 * 2^96 + 2^64 - 1 // // 2^384 mod p // = 2^352 - 2^320 - 2^224 + 2^128 // = -2^224 + 2 * 2^128 + 2 * 2^96 - 2^32 - 1 // // 2^416 mod p // = 2^384 - 2^352 - 2^256 + 2^160 // = -2^224 + 2^192 + 2 * 2^160 + 2 * 2^128 + 2^96 - 2^64 - 2^32 - 1 // // 2^448 mod p // = 2^416 - 2^384 - 2^288 + 2^192 // = 3 * 2^192 + 2 * 2^160 + 2^128 - 2^64 - 2^32 - 1 // // 2^480 mod p // = 2^448 - 2^416 - 2^320 + 2^224 // = 3 * 2^224 + 2 * 2^192 + 2^160 - 2^96 - 2^64 - 2^32 static const Felem zeroBase = { { (((uint128_t)1 << 64) - 1) << 50, (((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 50, (((uint128_t)1 << 64) - 1) << 50, (((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 50, } }; uint128_t *po = out->data; const uint128_t *pi = in->data; // Add the term reduced by pi[4]*2^256, pi[5]*2^320, pi[6]*2^384, pi[7]*2^448 to the corresponding digit. // Assign a value after zero adjustment. // Adjust to zero of digit 0. Take the input value pi[0]. // The reduction item list is (pi[4], pi[5]*2^32, -pi[6] - pi[6]*2^32, -pi[7] - pi[7]*2^32) po[0] = zeroBase.data[0] + pi[0] + pi[4] + (pi[5] << 32) - pi[6] - (pi[6] << 32) - pi[7] - (pi[7] << 32); // Adjust to zero of digit 1. Take the input value pi[1]. // The reduction item list is (-pi[4]*2^32, pi[5], pi[6]*2^33, -pi[7]) po[1] = zeroBase.data[1] + pi[1] - (pi[4] << 32) + pi[5] + (pi[6] << 33) - pi[7]; // Adjust to zero of digit 2. Take the input value pi[2]. // The reduction item list is (0, -pi[5] - pi[5]*2^32, -pi[6]*2, pi[7] + pi[7]*2^33) po[2] = zeroBase.data[2] + pi[2] - pi[5] - (pi[5] << 32) + (pi[6] << 1) + pi[7] + (pi[7] << 33); // Adjust to zero of digit 3. Take the input value pi[3]. // The reduction item list is (-pi[4] + pi[4]*2^32, -pi[5]*2^32, -pi[6]*2^32, pi[7]*3) po[3] = zeroBase.data[3] + pi[3] - pi[4] + (pi[4] << 32) - (pi[5] << 32) - (pi[6] << 32) + (pi[7] * 3); } /* * field element modulo: convert the field element to a unique value within [0, p) * Input: * in[] < 2^64 * Output: * out < p, out[] < 2^64 */ static void FelemContract(Felem *out, const Felem *in) { uint128_t *po = out->data; const uint128_t *pi = in->data; const uint128_t borrow = (uint128_t)1 << BASE_BITS; const uint128_t lend = 1; bool isGreaterOrEqual = true; for (int32_t i = 3; i >= 0; i--) { if (pi[i] > FIELD_ORDER.data[i]) { break; } else if (pi[i] < FIELD_ORDER.data[i]) { isGreaterOrEqual = false; break; } } if (isGreaterOrEqual) { // p_3 = 0xffffffff00000001 po[3] = (pi[3] - lend) - FIELD_ORDER.data[3]; // p_2 = 0x0000000000000000 po[2] = (borrow ^ pi[2]) - lend; // p_1 = 0x00000000ffffffff po[1] = ((borrow ^ pi[1]) - lend) - FIELD_ORDER.data[1]; // p_0 = 0xffffffffffffffff po[0] = (borrow ^ pi[0]) - FIELD_ORDER.data[0]; } // Process carry 0 -> 1 -> 2 -> 3 po[1] += po[0] >> BASE_BITS; // po[1] + po[0] carry po[2] += po[1] >> BASE_BITS; // po[2] + po[1] carry po[3] += po[2] >> BASE_BITS; // po[3] + po[2] carry po[0] = (uint64_t)po[0]; // po[0] takes the basic digit. po[1] = (uint64_t)po[1]; // po[1] takes the basic digit. po[2] = (uint64_t)po[2]; // po[2] takes the basic digit. } /* * Field Addition */ static inline void FelemAdd(Felem *out, const Felem *a, const Felem *b) { out->data[0] = a->data[0] + b->data[0]; // out->data[0] get the value out->data[1] = a->data[1] + b->data[1]; // out->data[1] get the value out->data[2] = a->data[2] + b->data[2]; // out->data[2] get the value out->data[3] = a->data[3] + b->data[3]; // out->data[3] get the value } /* * Field element negation * Input: * in[] <= 2^124 - 2^92 * Output: * out[] <= 2^124 + 2^92 - 2^60 + in[] */ static inline void FelemNeg(Felem *out, const Felem *in) { static const Felem zeroBase = {{ (((uint128_t)1 << 64) - 1) << 60, (((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 60, (((uint128_t)1 << 64) - 1) << 60, (((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 60, }}; out->data[0] = zeroBase.data[0] - in->data[0]; // out->data[0] get the value out->data[1] = zeroBase.data[1] - in->data[1]; // out->data[1] get the value out->data[2] = zeroBase.data[2] - in->data[2]; // out->data[2] get the value out->data[3] = zeroBase.data[3] - in->data[3]; // out->data[3] get the value } /* * Field subtraction * Input: * a[] < 2^128 - 2^124 - 2^92 + 2^60,b[] <= 2^124 - 2^92 * Output: * out[] <= 2^124 + 2^92 - 2^60 + a[] < 2^128 */ static inline void FelemSub(Felem *out, const Felem *a, const Felem *b) { static const Felem zeroBase = {{ (((uint128_t)1 << 64) - 1) << 60, (((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 60, (((uint128_t)1 << 64) - 1) << 60, (((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 60, }}; out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] get the value out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] get the value out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] get the value out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] get the value } /* * Field subtraction. Input LongFelem directly. * Input: * a[] < 2^128 - 2^74 - 2^42 + 2^10,b[] <= 2^74 - 2^42 * Output: * out[] <= 2^74 + 2^42 - 2^10 + a[] < 2^128 */ static void LongFelemSub(LongFelem *out, const LongFelem *a, const LongFelem *b) { static const LongFelem zeroBase = {{ ((uint128_t)1 << 64) << 10, (((uint128_t)1 << 64) - 1) << 10, (((uint128_t)1 << 64) - 1) << 10, (((uint128_t)1 << 64) - 1) << 10, (((uint128_t)1 << 64) - 2) << 10, (((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 10, (((uint128_t)1 << 64) - 1) << 10, (((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 10, }}; out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] get the value out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] get the value out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] get the value out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] get the value out->data[4] = zeroBase.data[4] + a->data[4] - b->data[4]; // out->data[4] get the value out->data[5] = zeroBase.data[5] + a->data[5] - b->data[5]; // out->data[5] get the value out->data[6] = zeroBase.data[6] + a->data[6] - b->data[6]; // out->data[6] get the value out->data[7] = zeroBase.data[7] + a->data[7] - b->data[7]; // out->data[7] get the value } /* * Scale the field element * Use only a small magnification(scale) factor to ensure that in[] * scalar does not overflow. */ static inline void FelemScale(Felem *out, const Felem *in, const uint32_t scalar) { out->data[0] = in->data[0] * scalar; // out->data[0] get the value out->data[1] = in->data[1] * scalar; // out->data[1] get the value out->data[2] = in->data[2] * scalar; // out->data[2] get the value out->data[3] = in->data[3] * scalar; // out->data[3] get the value } /* * Scale the field element. Input LongFelem directly. * Use only a small magnification(scale) factor to ensure that in[] * scalar does not overflow. */ static inline void LongFelemScale(LongFelem *out, const LongFelem *in, const uint32_t scalar) { out->data[0] = in->data[0] * scalar; // out->data[0] get the value out->data[1] = in->data[1] * scalar; // out->data[1] get the value out->data[2] = in->data[2] * scalar; // out->data[2] get the value out->data[3] = in->data[3] * scalar; // out->data[3] get the value out->data[4] = in->data[4] * scalar; // out->data[4] get the value out->data[5] = in->data[5] * scalar; // out->data[5] get the value out->data[6] = in->data[6] * scalar; // out->data[6] get the value out->data[7] = in->data[7] * scalar; // out->data[7] get the value } /* * Field Multiplication * Input: * a[] < 2^64, b[] < 2^64 * Output: * out[] < 2^67 * - out[0] < 2^64 * - out[1] < 2^64 * 3 * - out[2] < 2^64 * 5 * - out[3] < 2^64 * 7 * - out[4] < 2^64 * 7 * - out[5] < 2^64 * 5 * - out[6] < 2^64 * 3 * - out[7] < 2^64 */ static void FelemMul(LongFelem *out, const Felem *a, const Felem *b) { // out[0] = a[0]*b[0] // out[1] = a[0]*b[1] + a[1]*b[0] // out[2] = a[0]*b[2] + a[1]*b[1] + a[2]*b[0] // out[3] = a[0]*b[3] + a[1]*b[2] + a[2]*b[1] + a[3]*b[0] // out[4] = a[1]*b[3] + a[2]*b[2] + a[3]*b[1] // out[5] = a[2]*b[3] + a[3]*b[2] // out[6] = a[3]*b[3] const uint64_t a64[4] = {(uint64_t)a->data[0], (uint64_t)a->data[1], (uint64_t)a->data[2], (uint64_t)a->data[3]}; const uint64_t b64[4] = {(uint64_t)b->data[0], (uint64_t)b->data[1], (uint64_t)b->data[2], (uint64_t)b->data[3]}; uint128_t limbMul; // out[0] = a[0]*b[0] limbMul = (uint128_t)a64[0] * b64[0]; // a[0] * b[0] out->data[0] = (uint64_t)limbMul; // Digit 0 plus the basic digit out->data[1] = limbMul >> BASE_BITS; // Digit 1 plus the carry // out[1] = a[0]*b[1] + a[1]*b[0] limbMul = (uint128_t)a64[0] * b64[1]; // a[0] * b[1] out->data[1] += (uint64_t)limbMul; // Digit 1 plus the basic digit out->data[2] = limbMul >> BASE_BITS; // Digit 2 plus the carry limbMul = (uint128_t)a64[1] * b64[0]; // a[1] * b[0] out->data[1] += (uint64_t)limbMul; // Digit 1 plus the basic digit out->data[2] += limbMul >> BASE_BITS; // Digit 2 plus the carry // out[2] = a[0]*b[2] + a[1]*b[1] + a[2]*b[0] limbMul = (uint128_t)a64[0] * b64[2]; // a[0] * b[2] out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit out->data[3] = limbMul >> BASE_BITS; // Digit 3 plus the carry limbMul = (uint128_t)a64[1] * b64[1]; // a[1] * a[1] out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit out->data[3] += limbMul >> BASE_BITS; // Digit 3 plus the carry limbMul = (uint128_t)a64[2] * b64[0]; // a[2] * b[0] out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit out->data[3] += limbMul >> BASE_BITS; // Digit 3 plus the carry // out[3] = a[0]*b[3] + a[1]*b[2] + a[2]*b[1] + a[3]*b[0] limbMul = (uint128_t)a64[0] * b64[3]; // a[0] * b[3] out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit out->data[4] = limbMul >> BASE_BITS; // Digit 4 plus the carry limbMul = (uint128_t)a64[1] * b64[2]; // a[1] * b[2] out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit out->data[4] += limbMul >> BASE_BITS; // Digit 4 plus the carry limbMul = (uint128_t)a64[2] * b64[1]; // a[2] * b[1] out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit out->data[4] += limbMul >> BASE_BITS; // Digit 4 plus the carry limbMul = (uint128_t)a64[3] * b64[0]; // a[3] * b[0] out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit out->data[4] += limbMul >> BASE_BITS; // Digit 4 plus the carry // out[4] = a[1]*b[3] + a[2]*b[2] + a[3]*b[1] limbMul = (uint128_t)a64[1] * b64[3]; // a[1] * b[3] out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit out->data[5] = limbMul >> BASE_BITS; // Digit 5 plus the carry limbMul = (uint128_t)a64[2] * b64[2]; // a[2] * b[2] out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit out->data[5] += limbMul >> BASE_BITS; // Digit 5 plus the carry limbMul = (uint128_t)a64[3] * b64[1]; // a[3] * b[1] out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit out->data[5] += limbMul >> BASE_BITS; // Digit 5 plus the carry // out[5] = a[2]*b[3] + a[3]*b[2] limbMul = (uint128_t)a64[2] * b64[3]; // a[2] * b[3] out->data[5] += (uint64_t)limbMul; // Digit 5 plus the basic digit out->data[6] = limbMul >> BASE_BITS; // Digit 6 plus the carry limbMul = (uint128_t)a64[3] * b64[2]; // a[3] * b[2] out->data[5] += (uint64_t)limbMul; // Digit 5 plus the basic digit out->data[6] += limbMul >> BASE_BITS; // Digit 6 plus the carry // out[6] = a[3]*b[3] limbMul = (uint128_t)a64[3] * b64[3]; // a[3] * b[3] out->data[6] += (uint64_t)limbMul; // Digit 6 plus the basic digit out->data[7] = limbMul >> BASE_BITS; // Digit 7 plus the carry } /* * Field square * Input: * a[] < 2^64 * Output: * out[] < 2^67 * - out[0] < 2^64 * - out[1] < 2^64 * 2 * - out[2] < 2^64 * 4 * - out[3] < 2^64 * 5 * - out[4] < 2^64 * 6 * - out[5] < 2^64 * 4 * - out[6] < 2^64 * 3 * - out[7] < 2^64 */ static void FelemSqr(LongFelem *out, const Felem *a) { // out[0] = a[0]*a[0] // out[1] = a[0]*a[1]*2 // out[2] = a[0]*a[2]*2 + a[1]*a[1] // out[3] = a[0]*a[3]*2 + a[1]*a[2]*2 // out[4] = a[1]*a[3]*2 + a[2]*a[2] // out[5] = a[2]*a[3]*2 // out[6] = a[3]*a[3] const uint64_t a64[4] = {(uint64_t)a->data[0], (uint64_t)a->data[1], (uint64_t)a->data[2], (uint64_t)a->data[3]}; uint128_t limbMul; // out[0] = a[0]*a[0] limbMul = (uint128_t)a64[0] * a64[0]; // a[0] * a[0] out->data[0] = (uint64_t)limbMul; // Digit 0 plus the basic digit out->data[1] = limbMul >> BASE_BITS; // Digit 1 plus the carry // out[1] = a[0]*a[1]*2 limbMul = (uint128_t)a64[0] * a64[1]; // a[0] * a[1] out->data[1] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 1 out->data[2] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 2 // out[2] = a[0]*a[2]*2 + a[1]*a[1] limbMul = (uint128_t)a64[0] * a64[2]; // a[0] * a[2] out->data[2] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 2 out->data[3] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 3 limbMul = (uint128_t)a64[1] * a64[1]; // a[1] * a[1] out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit out->data[3] += limbMul >> BASE_BITS; // Digit 3 plus the carry // out[3] = a[0]*a[3]*2 + a[1]*a[2]*2 limbMul = (uint128_t)a64[0] * a64[3]; // a[0] * a[3] out->data[3] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 3 out->data[4] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 4 limbMul = (uint128_t)a64[1] * a64[2]; // a[1] * a[2] out->data[3] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 3 out->data[4] += limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 4 // out[4] = a[1]*a[3]*2 + a[2]*a[2] limbMul = (uint128_t)a64[1] * a64[3]; // a[1] * a[3] out->data[4] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 4 out->data[5] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 5 limbMul = (uint128_t)a64[2] * a64[2]; // a[2] * a[2] out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit out->data[5] += limbMul >> BASE_BITS; // Digit 5 plus the carry // out[5] = a[2]*a[3]*2 limbMul = (uint128_t)a64[2] * a64[3]; // a[2] * a[3] out->data[5] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 5 out->data[6] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 6 // out[6] = a[3]*a[3] limbMul = (uint128_t)a64[3] * a64[3]; // a[3] * a[3] out->data[6] += (uint64_t)limbMul; // Digit 6 plus the basic digit out->data[7] = limbMul >> BASE_BITS; // Digit 7 plus the carry } static inline void FelemMulReduce(Felem *out, const Felem *a, const Felem *b) { LongFelem ltmp; FelemMul(&ltmp, a, b); LongFelemReduce(out, &ltmp); } static inline void FelemSqrReduce(Felem *out, const Felem *in) { LongFelem ltmp; FelemSqr(&ltmp, in); LongFelemReduce(out, &ltmp); } static inline void FelemMulReduceToBase(Felem *out, const Felem *a, const Felem *b) { LongFelem ltmp; FelemMul(&ltmp, a, b); LongFelemReduce(out, &ltmp); FelemReduce(out, out); } static inline void FelemSqrReduceToBase(Felem *out, const Felem *in) { LongFelem ltmp; FelemSqr(&ltmp, in); LongFelemReduce(out, &ltmp); FelemReduce(out, out); } /* * Field element inversion * From Fermat's little theorem, in^(p - 2) = in^(-1) (mod p) * in^(-1) = in^(2^256 - 2^224 + 2^192 + 2^96 - 1 - 2) (mod p) * Input: * in[] < 2^64 * Output: * out[] < 2^64 */ static void FelemInv(Felem *out, const Felem *in) { Felem inE3, inEf, inEff, inEffff, inEffffffff, inEfx16Lsh32, inEfffffffd; // Construct in^(p - 2) by moving left and adding. // The value of p - 2 is as follows: // ffffffff 00000001 // 00000000 00000000 // 00000000 ffffffff // ffffffff fffffffd // Construct the {1, 3, f, ff, ffff, ffffffff} power of in by left shift and addition. // Construct in^1 FelemAssign(out, in); // in^1 // Construct in^3 FelemSqrReduceToBase(out, out); // in^2 FelemMulReduceToBase(out, out, in); // in^3 FelemAssign(&inE3, out); // Construct in^f FelemSqrReduceToBase(out, out); // in^6 FelemSqrReduceToBase(out, out); // in^c FelemMulReduceToBase(&inEfffffffd, out, in); // inEfffffffd = in^d FelemMulReduceToBase(out, out, &inE3); // in^f FelemAssign(&inEf, out); // Construct in^ff FelemSqrReduceToBase(out, out); // in^1e FelemSqrReduceToBase(out, out); // in^3c FelemSqrReduceToBase(out, out); // in^78 FelemSqrReduceToBase(out, out); // in^f0 FelemMulReduceToBase(&inEfffffffd, out, &inEfffffffd); // inEfffffffd = in^fd FelemMulReduceToBase(out, out, &inEf); // in^ff FelemAssign(&inEff, out); // Construct in^ffff and shift ff to the left by 8 bits to obtain ff00 for (int32_t i = 0; i < 8; ++i) { FelemSqrReduceToBase(out, out); } // in^ff00 FelemMulReduceToBase(&inEfffffffd, out, &inEfffffffd); // inEfffffffd = in^fffd FelemMulReduceToBase(out, out, &inEff); // in^ffff FelemAssign(&inEffff, out); // Construct in^ffffffff and shift ffff to the left by 16 bits to obtain ffff0000 for (int32_t i = 0; i < 16; ++i) { FelemSqrReduceToBase(out, out); } // in^ffff0000 FelemMulReduceToBase(&inEfffffffd, out, &inEfffffffd); // inEfffffffd = in^fffffffd FelemMulReduceToBase(out, out, &inEffff); // in^ffffffff FelemAssign(&inEffffffff, out); // Construct in^ffffffff ffffffff 00000000 // Obtain in^ffffffff 00000000 and shift ffffffff to the left by 32 bits. for (int32_t i = 0; i < 32; ++i) { FelemSqrReduceToBase(out, out); } // in^ffffffff 00000000 FelemAssign(&inEfx16Lsh32, out); // Then obtain ffffffff 00000000 00000000 and shift it leftwards by 32 bits. for (int32_t i = 0; i < 32; ++i) { FelemSqrReduceToBase(out, out); } // out = in^ffffffff 00000000 00000000 FelemMulReduceToBase(&inEfx16Lsh32, out, &inEfx16Lsh32); // inEfx16Lsh32 = in^ffffffff ffffffff 00000000 // Construct in^ffffffff 00000001 00000000 FelemMulReduceToBase(out, out, &inEffffffff); // in^ffffffff 00000000 ffffffff FelemMulReduceToBase(out, out, in); // in^ffffffff 00000001 00000000 // Shift leftward by 160 bits to the top. for (int32_t i = 0; i < 160; ++i) { FelemSqrReduceToBase(out, out); } // in^ffffffff 00000001 00000000 00000000 00000000 00000000 00000000 00000000 // Construct in^ffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff 00000000 FelemMulReduceToBase(out, out, &inEfx16Lsh32); // Construct in^ffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd FelemMulReduceToBase(out, out, &inEfffffffd); } /* --------------------------Point group operation-------------------------- */ static inline void PtAssign(Point *out, const Point *in) { FelemAssign(&out->x, &in->x); FelemAssign(&out->y, &in->y); FelemAssign(&out->z, &in->z); } static inline void PtAssignWithMask(Point *out, const Point *in, const uint128_t mask) { FelemAssignWithMask(&out->x, &in->x, mask); FelemAssignWithMask(&out->y, &in->y, mask); FelemAssignWithMask(&out->z, &in->z, mask); } /* * point double * Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b * Number of field operations: 3M + 5S * delta = Z^2 * gamma = Y^2 * beta = X * gamma * alpha = 3 * (X - delta) * (X + delta) * X' = alpha^2 - 8 * beta * Z' = (Y + Z)^2 - gamma - delta * Y' = alpha * (4 * beta - X') - 8 * gamma^2 * Input: * in->x[], in->y[], in->z[] < 2^64 * Output: * out->x[], out->y[], out->z[] < 2^64 */ static void PtDouble(Point *out, const Point *in) { Felem delta, gamma, beta, alpha; Felem tmp, tmp2; LongFelem ltmp, ltmp2; // delta = Z^2 FelemSqrReduce(&delta, &in->z); // delta[] < 2^115 // gamma = Y^2 FelemSqrReduceToBase(&gamma, &in->y); // beta = X * gamma FelemMulReduce(&beta, &in->x, &gamma); // beta[] < 2^115 // alpha = 3 * (X - delta) * (X + delta) FelemAdd(&tmp, &in->x, &delta); // tmp[] < 2^64 + 2^115 FelemScale(&tmp, &tmp, 3); // 3 * (X + delta), tmp[] < (2^64 + 2^115) * 3 < 2^117 FelemSub(&tmp2, &in->x, &delta); // tmp2[] < (2^124 + 2^92 - 2^60) + 2^64 < 2^125 FelemReduce(&tmp, &tmp); FelemReduce(&tmp2, &tmp2); FelemMulReduceToBase(&alpha, &tmp, &tmp2); // X' = alpha^2 - 8 * beta FelemSqrReduce(&tmp, &alpha); // alpha^2, tmp[] < 2^115 FelemScale(&tmp2, &beta, 8); // 8 * beta, tmp2[] < 2^115 * 8 = 2^119 FelemSub(&out->x, &tmp, &tmp2); // out->x[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&out->x, &out->x); // out->x[] < 2^64 // Z' = (Y + Z)^2 - gamma - delta FelemAdd(&tmp, &in->y, &in->z); FelemReduce(&tmp, &tmp); FelemSqrReduce(&tmp, &tmp); // (Y + Z)^2, tmp[] < 2^115 FelemAdd(&tmp2, &gamma, &delta); // (gamma + delta), tmp2[] < 2^64 + 2^115 < 2^116 FelemSub(&out->z, &tmp, &tmp2); // out->z[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&out->z, &out->z); // out->z[] < 2^64 // Y' = alpha * (4 * beta - X') - 8 * gamma^2 FelemScale(&beta, &beta, 4); // beta[] < 2^115 * 4 = 2^117 FelemSub(&tmp, &beta, &out->x); FelemReduce(&tmp, &tmp); FelemMul(&ltmp, &alpha, &tmp); // alpha * (4 * beta - X'), ltmp[] < 2^67 FelemSqr(&ltmp2, &gamma); LongFelemScale(&ltmp2, &ltmp2, 8); // 8 * gamma^2, ltmp2[] < 2^67 * 8 < 2^70 LongFelemSub(&ltmp, &ltmp, &ltmp2); // ltmp[] < (2^74 + 2^42 - 2^10) + 2^67 < 2^75 LongFelemReduce(&out->y, &ltmp); // out->y[] < 2^115 FelemReduce(&out->y, &out->y); // out->y[] < 2^64 } /* * point addition * Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-2007-bl * Infinity point calculation is not supported. * Number of field operations: 11M + 5S * Z1Z1 = Z1^2 * Z2Z2 = Z2^2 * U1 = X1 * Z2Z2 * U2 = X2 * Z1Z1 * S1 = Y1 * Z2 * Z2Z2 * S2 = Y2 * Z1 * Z1Z1 * H = U2 - U1 * I = (2 * H)^2 * J = H * I * r = 2 * (S2 - S1) * V = U1 * I * X3 = r^2 - J - 2 * V * Y3 = r * (V - X3) - 2 * S1 * J * Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H * Input: * a->x[], a->y[], a->z[] < 2^64 * b->x[], b->y[], b->z[] < 2^64 * Output: * out->x[], out->y[], out->z[] < 2^64 */ static void PtAdd(Point *out, const Point *a, const Point *b) { Point result; Felem z1sqr, z2sqr, u1, u2, s1, s2, h, i, j, r, v; Felem tmp; LongFelem ltmp, ltmp2; uint128_t isZ1Zero, isZ2Zero; // Z1Z1 = Z1^2 FelemSqrReduceToBase(&z1sqr, &a->z); // Z2Z2 = Z2^2 FelemSqrReduceToBase(&z2sqr, &b->z); isZ1Zero = 0 - FelemIsZero(&z1sqr); isZ2Zero = 0 - FelemIsZero(&z2sqr); // U1 = X1 * Z2Z2 FelemMulReduceToBase(&u1, &a->x, &z2sqr); // U2 = X2 * Z1Z1 FelemMulReduce(&u2, &b->x, &z1sqr); // u2[] < 2^115 // S1 = Y1 * Z2 * Z2Z2 FelemMulReduceToBase(&s1, &b->z, &z2sqr); FelemMulReduceToBase(&s1, &a->y, &s1); // S2 = Y2 * Z1 * Z1Z1 FelemMulReduceToBase(&s2, &a->z, &z1sqr); FelemMulReduce(&s2, &b->y, &s2); // s2[] < 2^115 // H = U2 - U1 FelemSub(&h, &u2, &u1); // h[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&h, &h); // r = 2 * (S2 - S1) FelemSub(&r, &s2, &s1); // r[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemScale(&r, &r, 2); // r[] < 2^126 FelemReduce(&r, &r); // H and r can determine whether x and y of the affine coordinates of two points are equal. // If the values are equal, use double(). if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) { // Use a smaller b point PtDouble(out, b); return; } // I = (2 * H)^2 FelemSqrReduce(&i, &h); // H^2, i[] < 2^115 FelemScale(&i, &i, 4); // 4 * H^2, i[] < 2^117 FelemReduce(&i, &i); // J = H * I FelemMulReduceToBase(&j, &h, &i); // V = U1 * I FelemMulReduce(&v, &u1, &i); // v[] < 2^115 // X3 = r^2 - (J + 2 * V) FelemSqrReduce(&result.x, &r); // result.x[] < 2^115 FelemScale(&tmp, &v, 2); // tmp[] < 2^115 * 2 = 2^116 FelemAdd(&tmp, &j, &tmp); // tmp[] < 2^64 + 2^116 < 2^117 FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^124 + 2^90 - 2^60) + 2^115 < 2^125 FelemReduce(&result.x, &result.x); // result.x[] < 2^64 // Y3 = r * (V - X3) - 2 * S1 * J FelemSub(&tmp, &v, &result.x); FelemReduce(&tmp, &tmp); FelemMul(&ltmp, &r, &tmp); // r * (V - X3), ltmp[] < 2^67 FelemMul(&ltmp2, &s1, &j); // ltmp2[] < 2^67 LongFelemScale(&ltmp2, &ltmp2, 2); // 2 * S1 * J, ltmp2[] < 2^68 LongFelemSub(&ltmp, &ltmp, &ltmp2); // ltmp[] < (2^74 + 2^42 - 2^10) + 2^67 < 2^75 LongFelemReduce(&result.y, &ltmp); // result.y[] < 2^115 FelemReduce(&result.y, &result.y); // result.y[] < 2^64 // Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H FelemAdd(&result.z, &a->z, &b->z); FelemReduce(&result.z, &result.z); FelemSqrReduce(&result.z, &result.z); // (Z1 + Z2)^2 FelemAdd(&tmp, &z1sqr, &z2sqr); // Z1Z1 + Z2Z2 FelemSub(&result.z, &result.z, &tmp); // ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) FelemReduce(&result.z, &result.z); FelemMulReduceToBase(&result.z, &result.z, &h); // result.z[] < 2^64 // Special case processing for infinity points PtAssignWithMask(&result, a, isZ2Zero); PtAssignWithMask(&result, b, isZ1Zero); PtAssign(out, &result); } /* * Mixed point addition * Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl * Infinity point calculation is not supported. * Number of field operations: 7M + 4S * Z1Z1 = Z1^2 * U2 = X2 * Z1Z1 * S2 = Y2 * Z1 * Z1Z1 * H = U2 - X1 * HH = H^2 * I = 4 * HH * J = H * I * r = 2 * (S2 - Y1) * V = X1 * I * X3 = r^2 - J - 2 * V * Y3 = r * (V - X3) - 2 * Y1 * J * Z3 = (Z1 + H)^2 - Z1Z1 - HH * Input: * a->x[] < 2^64, a->y[] < 2^64, a->z[] < 2^64 * b->x < p, b->y < p, b->z = 0 或 1 * Output: * out->x[] < 2^64 * out->y[] < 2^64 * out->z[] < 2^64 */ static void PtAddMixed(Point *out, const Point *a, const Point *b) { Point result; Felem z1sqr, u2, s2, h, hsqr, i, j, r, v; Felem tmp; LongFelem ltmp, ltmp2; uint128_t isZ1Zero, isZ2Zero; // Z1Z1 = Z1^2 FelemSqrReduceToBase(&z1sqr, &a->z); isZ1Zero = 0 - FelemIsZero(&z1sqr); // The Z coordinate of point b can only be 0 or 1, that is, digit 0 can only be 0 or 1, and the other digits are 0. isZ2Zero = b->z.data[0] - 1; // U2 = X2 * Z1Z1 FelemMulReduce(&u2, &b->x, &z1sqr); // u2[] < 2^115 // S2 = Y2 * Z1 * Z1Z1 FelemMulReduceToBase(&s2, &a->z, &z1sqr); FelemMulReduce(&s2, &b->y, &s2); // s2[] < 2^115 // H = U2 - X1 FelemSub(&h, &u2, &a->x); // h[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&h, &h); // r = 2 * (S2 - Y1) FelemSub(&r, &s2, &a->y); // r[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemScale(&r, &r, 2); // r[] < 2^126 FelemReduce(&r, &r); // H and r can determine whether x and y of the affine coordinates of two points are equal. // If the values are equal, use double(). if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) { // Use a smaller b point PtDouble(out, b); return; } // HH = H^2 FelemSqrReduce(&hsqr, &h); // hsqr[] < 2^115 // I = 4 * HH FelemScale(&i, &hsqr, 4); // i[] < 2^117 FelemReduce(&i, &i); // J = H * I FelemMulReduceToBase(&j, &h, &i); // V = X1 * I FelemMulReduce(&v, &a->x, &i); // v[] < 2^115 // X3 = r^2 - J - 2 * V FelemSqrReduce(&result.x, &r); FelemScale(&tmp, &v, 2); // tmp[] < 2^116 FelemAdd(&tmp, &j, &tmp); // tmp[] < 2^64 + 2^116 < 2^117 FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&result.x, &result.x); // result.x[] < 2^64 // Y3 = r * (V - X3) - 2 * Y1 * J FelemSub(&tmp, &v, &result.x); // tmp[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&tmp, &tmp); FelemMul(&ltmp, &r, &tmp); // ltmp[] < 2^67 FelemMul(&ltmp2, &a->y, &j); // ltmp2[] < 2^67 LongFelemScale(&ltmp2, &ltmp2, 2); // ltmp2[] < 2^68 LongFelemSub(&ltmp, &ltmp, &ltmp2); // ltmp[] < (2^74 + 2^42 - 2^10) + 2^67 < 2^75 LongFelemReduce(&result.y, &ltmp); // result.y[] < 2^115 FelemReduce(&result.y, &result.y); // result.y[] < 2^64 // Z3 = (Z1 + H)^2 - Z1Z1 - HH FelemAdd(&result.z, &a->z, &h); // result.z[] < 2^64 + 2^64 = 2^65 FelemReduce(&result.z, &result.z); FelemSqrReduce(&result.z, &result.z); // result.z[] < 2^115 FelemAdd(&tmp, &z1sqr, &hsqr); // tmp[] < 2^64 + 2^115 < 2^116 FelemSub(&result.z, &result.z, &tmp); // result.z[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125 FelemReduce(&result.z, &result.z); // result.z[] < 2^64 // Special case processing for infinity points PtAssignWithMask(&result, a, isZ2Zero); PtAssignWithMask(&result, b, isZ1Zero); PtAssign(out, &result); } /* Select the point with subscript index in the table and place it in the point. Anti-side channel process is exists. */ static inline void GetPointFromTable(Point *point, const Point table[], uint32_t pointNum, const uint32_t index) { uint128_t mask; for (uint32_t i = 0; i < pointNum; i++) { /* If i is equal to index, the last mask is all Fs. Otherwise, the last mask is all 0s. */ mask = (0 - (i ^ index)) >> 31; // shifted rightwards by 31 bits and obtain the most significant bit. mask--; /* Conditional value assignment, valid only when i == index */ PtAssignWithMask(point, &table[i], mask); } } /* * Input: * k1 < n * 0 <= i < 32 * Output: * out->x < p, out->y < p, out->z = 0 或 1 */ static inline void GetLowerPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit) { uint32_t bits; uint32_t i = (uint32_t)curBit; bits = (uint32_t)(k1->data[0] >> i) & 1; // i-bit of the lower half of the digit 0 bits |= ((uint32_t)(k1->data[1] >> i) & 1) << 1; // i-bit of the lower half of the digit 1 bits |= ((uint32_t)(k1->data[2] >> i) & 1) << 2; // i-bit of the lower half of the digit 2 bits |= ((uint32_t)(k1->data[3] >> i) & 1) << 3; // i-bit of the lower half of the digit 3 GetPointFromTable(out, PRE_MUL_G, TABLE_G_SIZE, bits); } /* * Input: * k1 < n * 0 <= i < 32 * Output: * out->x < p, out->y < p, out->z = 0 或 1 */ static inline void GetUpperPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit) { uint32_t bits; uint32_t i = (uint32_t)curBit; // i-bit of the upper half of the digit 0. (BASE_BITS/2) is the half width. bits = (uint32_t)(k1->data[0] >> (i + BASE_BITS / 2)) & 1; // i-bit of the upper half of the digit 1. (BASE_BITS/2) is the half width. bits |= ((uint32_t)(k1->data[1] >> (i + BASE_BITS / 2)) & 1) << 1; // i-bit of the upper half of the digit 2. (BASE_BITS/2) is the half width. bits |= ((uint32_t)(k1->data[2] >> (i + BASE_BITS / 2)) & 1) << 2; // i-bit of the upper half of the digit 3. (BASE_BITS/2) is the half width. bits |= ((uint32_t)(k1->data[3] >> (i + BASE_BITS / 2)) & 1) << 3; GetPointFromTable(out, PRE_MUL_G2, TABLE_G_SIZE, bits); } /* * Input: * k2 < n * 0 <= i <= 255 * The coordinates of each point of preMulPt are reduced. * Output: * out->x[] < 2^64, out->y[] < 2^64, out->z[] < 2^64 */ static inline void GetPrecomputePtOfP(Point *out, const Felem *k2, int32_t curBit, const Point preMulPt[TABLE_P_SIZE]) { uint32_t bits; uint32_t sign, value; // Indicates the grouping sign and actual value. Felem negY; // Obtain the 5-bit signed code. Read the sign bits of the next group of numbers // to determine whether there is a carry. The total length is 6. bits = (uint32_t)FelemGetBits(k2, curBit - 1, WINDOW_SIZE + 1); DecodeScalarCode(&sign, &value, bits); GetPointFromTable(out, preMulPt, TABLE_P_SIZE, value); FelemNeg(&negY, &out->y); FelemReduce(&negY, &negY); FelemAssignWithMask(&out->y, &negY, (uint128_t)0 - sign); } /* * Calculate k1 * G + k2 * P * Input: * k1 < n * k2 < n * The coordinates of each point of preMulPt are reduced. * Output: * out->x < p, out->y < p, out->z < p */ static void PtMul(Point *out, const Felem *k1, const Felem *k2, const Point preMulPt[TABLE_P_SIZE]) { Point ptQ = {}; // ptQ stores the result Point ptPre = {}; // ptPre stores the points obtained from the table. bool isGMul = k1 != NULL; bool isPtMul = k2 != NULL && preMulPt != NULL; int32_t curBit; // Initialize the Q point. if (isPtMul) { curBit = 255; // Start from 255th bit. // Select the initial point from bit coding (_, _, _, _, 255, 254) of k2 GetPrecomputePtOfP(&ptQ, k2, curBit, preMulPt); } else if (isGMul) { curBit = 31; // Start from 31. // Select the initial point from bit coding (223, 159, 95, 31) of k1 GetLowerPrecomputePtOfG(&ptQ, k1, curBit); // Select a precomputation point from the (223 + 32, 159 + 32, 95 + 32, 31 + 32) bit of k1 // and add the precomputation point to the point Q GetUpperPrecomputePtOfG(&ptPre, k1, curBit); PtAddMixed(&ptQ, &ptQ, &ptPre); } else { // k1 and k2 are NULL, output the infinite point. (void)memset_s((void *)out, sizeof(Point), 0, sizeof(Point)); return; } // Operation chain: Q point output range: // x[] y[] z[] // Init value < 2^64 < 2^64 < 2^64 // ↓ // double ←↑ < 2^64 < 2^64 < 2^64 // ↓ ↑ // mixed add ↑ < 2^64 < 2^64 < 2^64 // ↓ ↑ // mixed add →↑ < 2^64 < 2^64 < 2^64 // ↓ ↑ // Y negation & reduction ↑ < 2^64 < 2^64 < 2^64 // ↓ ↑ // add →↑ < 2^64 < 2^64 < 2^64 while (--curBit >= 0) { // Start to shift right bit by bit. Because the most significant bit is initialized, // common point multiplication starts from 254th bit and base point multiplication starts from 30th bit. // Whether G-point multiplication is performed in the current cycle. // It is calculated once in each cycle starting from bit 31. bool isStepGMul = curBit <= 31; // Whether the current cycle is a common point multiplication, calculated once every 5 cycles bool isStepPtMul = curBit % WINDOW_SIZE == 0; PtDouble(&ptQ, &ptQ); // Generator G-point multiplication part. // Divide k1 into 8 segments, from high bits to low bits, select bits from each segment // and combine them together, then read the pre-computation table. // Specially, to shrink the precomputation table, the divided 8 segments are combined // according to the upper half and the lower half. if (isGMul && isStepGMul) { // Add the point multiplication result of the current bit of the eight-segment packet to the point Q GetLowerPrecomputePtOfG(&ptPre, k1, curBit); PtAddMixed(&ptQ, &ptQ, &ptPre); GetUpperPrecomputePtOfG(&ptPre, k1, curBit); PtAddMixed(&ptQ, &ptQ, &ptPre); } // Common point multiplication part. // Use the sliding window signed encoding method // to group the most significant bits to the least significant bits every five bits. // Each group of numbers is regarded as a signed number. 00000 to 01111 are decimal numbers 0 to 15, // and 10000 to 11111 are decimal numbers (32-16) to (32-1). // This is equivalent to the set of numbers in the complement form after carry 1. // for example: // 11011(complement) = 100000 - 00101 if (isPtMul && isStepPtMul) { // Add the point multiplication result of the current group to point Q. GetPrecomputePtOfP(&ptPre, k2, curBit, preMulPt); PtAdd(&ptQ, &ptQ, &ptPre); } } // Output the modulo operation. FelemContract(&ptQ.x, &ptQ.x); FelemContract(&ptQ.y, &ptQ.y); FelemContract(&ptQ.z, &ptQ.z); PtAssign(out, &ptQ); } /* * Convert Jacobian coordinates to affine coordinates by a given module inverse * Input: * in->x[] < 2^64, in->y[] < 2^64 * zInv < 2^64 * Output: * out->x < p, out->y < p, out->z = 1 */ static void PtMakeAffineWithInv(Point *out, const Point *in, const Felem *zInv) { Felem tmp; // 1/Z^2 FelemSqrReduceToBase(&tmp, zInv); // X/Z^2 FelemMulReduceToBase(&out->x, &in->x, &tmp); FelemContract(&out->x, &out->x); // 1/Z^3 FelemMulReduceToBase(&tmp, &tmp, zInv); // Y/Z^3 FelemMulReduceToBase(&out->y, &in->y, &tmp); FelemContract(&out->y, &out->y); FelemSetLimb(&out->z, 1); } /* --------------------------other functions-------------------------- */ /* * Obtain the pre-multiplication table of the input point pt, including 0pt-16pt. All points are reduced. */ static int32_t GetPreMulPt(Point preMulPt[TABLE_P_SIZE], const ECC_Point *pt) { int32_t ret; // 0pt (void)memset_s((void *)&preMulPt[0], sizeof(Point), 0, sizeof(Point)); // 1pt GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].x, &pt->x), ret); GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].y, &pt->y), ret); GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].z, &pt->z), ret); // 2pt ~ 15pt for (uint32_t i = 2; i < 15; i += 2) { PtDouble(&preMulPt[i], &preMulPt[i >> 1]); PtAdd(&preMulPt[i + 1], &preMulPt[i], &preMulPt[1]); } // 16pt PtDouble(&preMulPt[16], &preMulPt[16 >> 1]); ERR: return ret; } int32_t ECP256_PointMulAdd( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret; Felem felemK1; Felem felemK2; Point preMulPt[TABLE_P_SIZE]; Point out; // Check the input parameters. GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP256), ret); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP256), ret); GOTO_ERR_IF(CheckBnValid(k1, FELEM_BITS), ret); GOTO_ERR_IF(CheckBnValid(k2, FELEM_BITS), ret); GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP256), ret); // Special treatment of infinity points if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } GOTO_ERR_IF_EX(BN2Felem(&felemK1, k1), ret); GOTO_ERR_IF_EX(BN2Felem(&felemK2, k2), ret); GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), ret); PtMul(&out, &felemK1, &felemK2, preMulPt); GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret); ERR: return ret; } int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { int32_t ret; Felem felemK; Point preMulPt[TABLE_P_SIZE]; Point out; // Check the input parameters. GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP256), ret); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP256), ret); GOTO_ERR_IF(CheckBnValid(k, FELEM_BITS), ret); if (pt != NULL) { GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP256), ret); // Special treatment of infinity points if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } } GOTO_ERR_IF_EX(BN2Felem(&felemK, k), ret); if (pt != NULL) { GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), ret); PtMul(&out, NULL, &felemK, preMulPt); } else { PtMul(&out, &felemK, NULL, NULL); } GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret); ERR: return ret; } int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { int32_t ret; Point out; Felem zInv; // Check the input parameters. GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP256), ret); GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP256), ret); GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP256), ret); // Special treatment of infinity points if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } GOTO_ERR_IF_EX(BN2Felem(&out.x, &pt->x), ret); GOTO_ERR_IF_EX(BN2Felem(&out.y, &pt->y), ret); GOTO_ERR_IF_EX(BN2Felem(&out.z, &pt->z), ret); FelemInv(&zInv, &out.z); PtMakeAffineWithInv(&out, &out, &zInv); GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret); GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret); GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret); ERR: return ret; } int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(a)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVERSE_INPUT_ZERO); return CRYPT_ECC_INVERSE_INPUT_ZERO; } return ECP_ModOrderInv(para, r, a); } #endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
2302_82127028/openHiTLS-examples_2931
crypto/ecc/src/noasm_ecp_nistp256.c
C
unknown
71,213
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ECDH_H #define CRYPT_ECDH_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECDH #include <stdint.h> #include "crypt_types.h" #include "crypt_algid.h" #include "crypt_ecc_pkey.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ /* ECDH key context */ typedef struct ECC_PkeyCtx CRYPT_ECDH_Ctx; /* ECDH parameter structure */ typedef struct EccPara CRYPT_EcdhPara; /** * @ingroup ecdh * @brief ecdh Allocate the context memory space. * * @retval (CRYPT_ECDH_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtx(void); /** * @ingroup ecdh * @brief ecdh Allocate the context memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_ECDH_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtxEx(void *libCtx); /** * @ingroup ecdh * @brief Copy the ECDH context. After the duplication is complete, call the CRYPT_ECDH_FreeCtx to release the memory. * * @param ctx [IN] Source ECDH context * * @return CRYPT_ECDH_Ctx ECDH context pointer * If the operation fails, null is returned. */ CRYPT_ECDH_Ctx *CRYPT_ECDH_DupCtx(CRYPT_ECDH_Ctx *ctx); /** * @ingroup ecdh * @brief ecdh Release the key context structure * * @param ctx [IN] Indicate the pointer of the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_ECDH_FreeCtx(CRYPT_ECDH_Ctx *ctx); /** * @ingroup ecdh * @brief Set a parameter based on the parameter ID. * * @param id [IN] Curve ID Parameter ID, which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_BRAINPOOLP512R1 only * from CRYPT_PKEY_ParaId. * * @retval (CRYPT_EcdhPara *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_EcdhPara *CRYPT_ECDH_NewParaById(CRYPT_PKEY_ParaId id); /** * @ingroup ecdh * @brief Set a parameter based on the eccPara parameter. * * @param eccPara [IN] Curve parameter information, * which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_BRAINPOOLP512R1 only from the CRYPT_PKEY_ParaId. * * @retval (CRYPT_EcdhPara *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_EcdhPara *CRYPT_ECDH_NewPara(const CRYPT_EccPara *eccPara); /** * @ingroup ecdh * @brief Obtain the parameter ID. * * @param ctx [IN] ECDH context * * @retval ID. If the context is invalid, CRYPT_PKEY_PARAID_MAX is returned. */ CRYPT_PKEY_ParaId CRYPT_ECDH_GetParaId(const CRYPT_ECDH_Ctx *ctx); /** * @ingroup ecdh * @brief ecdh Release a key parameter structure * * @param para [IN] Pointer to the key parameter structure to be released. The parameter is set NULL by the invoker. */ void CRYPT_ECDH_FreePara(CRYPT_EcdhPara *para); /** * @ingroup ecdh * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [OUT] Key structure for setting related parameters * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDH_SetPara(CRYPT_ECDH_Ctx *ctx, const CRYPT_EccPara *para); /** * @ingroup ecdh * @brief Get the data of the key structure to the key parameter structure. * * @param ctx [IN] Key structure for setting related parameters * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error * @retval CRYPT_SUCCESS Get successfully. */ int32_t CRYPT_ECDH_GetPara(const CRYPT_ECDH_Ctx *ctx, CRYPT_EccPara *para); /** * @ingroup ecdh * @brief Obtain the valid length of the private key, which is used before obtaining the private key. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t Valid key length */ uint32_t CRYPT_ECDH_GetBits(const CRYPT_ECDH_Ctx *ctx); /** * @ingroup ecdh * @brief Generate the ECDH key pair. * * @param ctx [IN] ECDH Context structure * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error code. Internal ECC calculation error * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_ECDH_Gen(CRYPT_ECDH_Ctx *ctx); /** * @ingroup ecdh * @brief ECDH key exchange * * @param ctx [IN] dh Context structure * @param pubKey [IN] Public key data * @param shareKey [OUT] Shared key * @param shareKeyLen [IN/OUT] The input parameter is the space length of the shareKey, * and the output parameter is the valid length of the shareKey. * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_ECDH_ERR_EMPTY_KEY The ctx private key is empty or the public key pubKey is empty. * @retval CRYPT_ECDH_ERR_INVALID_COFACTOR Invalid harmonic factor h * @retval BN error. An error occurs in the internal BigNum operation. * @retval ECC error code. Internal ECC calculation error * @retval CRYPT_SUCCESS Key exchange succeeded. */ int32_t CRYPT_ECDH_ComputeShareKey(const CRYPT_ECDH_Ctx *ctx, const CRYPT_ECDH_Ctx *pubKey, uint8_t *shareKey, uint32_t *shareKeyLen); /** * @ingroup ecdh * @brief ECDH Set the private key data. * * @param ctx [OUT] ecdh context structure * @param prv [IN] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDH_SetPrvKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPrv *prv); /** * @ingroup ecdh * @brief ECDH Set the public key data. * * @param ctx [OUT] ecdh context structure * @param pub [IN] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDH_SetPubKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPub *pub); /** * @ingroup ecdh * @brief ECDH Obtain the private key data. * * @param ctx [IN] ecdh context structure * @param prv [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDH_GetPrvKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPrv *prv); /** * @ingroup ecdh * @brief ECDH Obtain the public key data. * * @param ctx [IN] ecdh context structure * @param pub [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDH_GetPubKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup ecdh * @brief ECDH Set the private key data. * * @param ctx [OUT] ecdh context structure * @param para [IN] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDH_SetPrvKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para); /** * @ingroup ecdh * @brief ECDH Set the public key data. * * @param ctx [OUT] ecdh context structure * @param para [IN] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDH_SetPubKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para); /** * @ingroup ecdh * @brief ECDH Obtain the private key data. * * @param ctx [IN] ecdh context structure * @param para [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDH_GetPrvKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para); /** * @ingroup ecdh * @brief ECDH Obtain the public key data. * * @param ctx [IN] ecdh context structure * @param para [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDH_GetPubKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para); /** * @ingroup ecdh * @brief Get the data of the key structure to the key parameter structure. * * @param ctx [IN] Key structure for setting related parameters * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error * @retval CRYPT_SUCCESS Get successfully. */ int32_t CRYPT_ECDH_GetParaEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para); /** * @ingroup ecdh * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [OUT] Key structure for setting related parameters * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDH_SetParaEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para); #endif /** * @ingroup ecdh * @brief ecdh control interface * * @param ctx [IN/OUT] ecdh context structure * @param opt [IN] Operation mode. For details, see ECC_CtrlType. * @param val [IN] Input parameter about ctrl * @param len [IN] val Length * * @retval CRYPT_SUCCESS Set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT Invalid point format * @retval CRYPT_ECC_PKEY_ERR_CTRL_LEN The len is incorrect. * @retval CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION opt mode not supported */ int32_t CRYPT_ECDH_Ctrl(CRYPT_ECDH_Ctx *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup ecdh * @brief ecdh Compare public keys and parameters * * @param a [IN] ecdh context structure * @param b [IN] ecdh context structure * * @retval CRYPT_SUCCESS is the same * Others. For details, see errno. */ int32_t CRYPT_ECDH_Cmp(const CRYPT_ECDH_Ctx *a, const CRYPT_ECDH_Ctx *b); /** * @ingroup ecdh * @brief ecdh get security bits * * @param ctx [IN] ecdh Context structure * * @retval security bits */ int32_t CRYPT_ECDH_GetSecBits(const CRYPT_ECDH_Ctx *ctx); #ifdef HITLS_CRYPTO_ECDH_CHECK /** * @ingroup ecdh * @brief ecdh check public key * * @param checkType [IN] check type * @param pkey1 [IN] ecdh context structure * @param pkey2 [IN] ecdh context structure * * @retval CRYPT_SUCCESS check success. * Others. For details, see error code in errno. */ int32_t CRYPT_ECDH_Check(uint32_t checkType, const CRYPT_ECDH_Ctx *pkey1, const CRYPT_ECDH_Ctx *pkey2); #endif // HITLS_CRYPTO_ECDH_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECDH #endif // CRYPT_ECDH_H
2302_82127028/openHiTLS-examples_2931
crypto/ecdh/include/crypt_ecdh.h
C
unknown
12,944
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECDH #include <stdbool.h> #include "crypt_errno.h" #include "crypt_types.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_bn.h" #include "crypt_ecc.h" #include "crypt_ecc_pkey.h" #include "crypt_ecdh.h" #include "sal_atomic.h" #include "crypt_local_types.h" #include "crypt_params_key.h" CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtx(void) { ECC_Pkey *ctx = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->useCofactorMode = true; ctx->pointFormat = CRYPT_POINT_UNCOMPRESSED; // the point format is uncompressed by default BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtxEx(void *libCtx) { CRYPT_ECDH_Ctx *ctx = CRYPT_ECDH_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } CRYPT_ECDH_Ctx *CRYPT_ECDH_DupCtx(CRYPT_ECDH_Ctx *ctx) { return ECC_DupCtx(ctx); } void CRYPT_ECDH_FreeCtx(CRYPT_ECDH_Ctx *ctx) { if (ctx == NULL) { return; } ECC_FreeCtx(ctx); return; } CRYPT_EcdhPara *CRYPT_ECDH_NewParaById(CRYPT_PKEY_ParaId id) { return ECC_NewPara(id); } CRYPT_EcdhPara *CRYPT_ECDH_NewPara(const CRYPT_EccPara *eccPara) { CRYPT_PKEY_ParaId id = GetCurveId(eccPara); if (id == CRYPT_PKEY_PARAID_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA); return NULL; } return CRYPT_ECDH_NewParaById(id); } CRYPT_PKEY_ParaId CRYPT_ECDH_GetParaId(const CRYPT_ECDH_Ctx *ctx) { if (ctx == NULL) { return CRYPT_PKEY_PARAID_MAX; } return ECC_GetParaId(ctx->para); } void CRYPT_ECDH_FreePara(CRYPT_EcdhPara *para) { ECC_FreePara(para); } int32_t CRYPT_ECDH_GetPara(const CRYPT_ECDH_Ctx *ctx, CRYPT_EccPara *para) { return ECC_GetPara(ctx, para); } static int32_t EcdhSetPara(CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPara *para) { return ECC_SetPara(ctx, para); } int32_t CRYPT_ECDH_SetPara(CRYPT_ECDH_Ctx *ctx, const CRYPT_EccPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return EcdhSetPara(ctx, CRYPT_ECDH_NewPara(para)); } uint32_t CRYPT_ECDH_GetBits(const CRYPT_ECDH_Ctx *ctx) { return ECC_PkeyGetBits(ctx); } int32_t CRYPT_ECDH_SetPrvKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPrv *prv) { return ECC_PkeySetPrvKey(ctx, prv); } int32_t CRYPT_ECDH_SetPubKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPub *pub) { return ECC_PkeySetPubKey(ctx, pub); } int32_t CRYPT_ECDH_GetPrvKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPrv *prv) { return ECC_PkeyGetPrvKey(ctx, prv); } int32_t CRYPT_ECDH_GetPubKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPub *pub) { return ECC_PkeyGetPubKey(ctx, pub); } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_ECDH_GetParaEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para) { return ECC_GetParaEx(ctx, para); } int32_t CRYPT_ECDH_SetParaEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPara eccPara = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen)); return CRYPT_ECDH_SetPara(ctx, &eccPara); } int32_t CRYPT_ECDH_SetPrvKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para) { return ECC_PkeySetPrvKeyEx(ctx, para); } int32_t CRYPT_ECDH_SetPubKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para) { return ECC_PkeySetPubKeyEx(ctx, para); } int32_t CRYPT_ECDH_GetPrvKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para) { return ECC_PkeyGetPrvKeyEx(ctx, para); } int32_t CRYPT_ECDH_GetPubKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para) { return ECC_PkeyGetPubKeyEx(ctx, para); } #endif int32_t CRYPT_ECDH_Gen(CRYPT_ECDH_Ctx *ctx) { return ECC_PkeyGen(ctx); } static int32_t ComputeShareKeyInputCheck(const CRYPT_ECDH_Ctx *ctx, const CRYPT_ECDH_Ctx *pubKey, const uint8_t *shareKey, const uint32_t *shareKeyLen) { if ((ctx == NULL) || (pubKey == NULL) || (shareKey == NULL) || (shareKeyLen == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((ctx->prvkey == NULL) || (pubKey->pubkey == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_EMPTY_KEY); return CRYPT_ECDH_ERR_EMPTY_KEY; } // only the cofactor which value is 1 is supported currently BN_BigNum *paraH = ECC_GetParaH(ctx->para); if (paraH == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } if (BN_IsOne(paraH) != true) { BN_Destroy(paraH); BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_INVALID_COFACTOR); return CRYPT_ECDH_ERR_INVALID_COFACTOR; } BN_Destroy(paraH); return CRYPT_SUCCESS; } int32_t CRYPT_ECDH_ComputeShareKey(const CRYPT_ECDH_Ctx *ctx, const CRYPT_ECDH_Ctx *pubKey, uint8_t *shareKey, uint32_t *shareKeyLen) { int32_t ret = ComputeShareKeyInputCheck(ctx, pubKey, shareKey, shareKeyLen); if (ret != CRYPT_SUCCESS) { return ret; } ECC_Point *sharePoint = NULL; CRYPT_Data shareKeyX = {shareKey, *shareKeyLen}; BN_BigNum *tmpPrvkey = BN_Dup(ctx->prvkey); sharePoint = ECC_NewPoint(ctx->para); if ((tmpPrvkey == NULL) || (sharePoint == NULL)) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /** When the cofactor mode is enabled, pubkey = prvkey * h * G. When h is 1, no calculation is required. * Currently, the cofactor of the prime curve is only 1, and no related calculation is required. */ ret = ECC_PointMul(ctx->para, sharePoint, ctx->prvkey, pubKey->pubkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = ECC_PointCheck(sharePoint); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = ECC_GetPoint(ctx->para, sharePoint, &shareKeyX, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } *shareKeyLen = shareKeyX.len; EXIT: ECC_FreePoint(sharePoint); BN_Destroy(tmpPrvkey); return ret; } static int32_t CRYPT_ECDH_GetLen(const CRYPT_ECDH_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } int32_t CRYPT_ECDH_Ctrl(CRYPT_ECDH_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_PARAID: return CRYPT_ECDH_GetLen(ctx, (GetLenFunc)CRYPT_ECDH_GetParaId, val, len); case CRYPT_CTRL_GET_BITS: return CRYPT_ECDH_GetLen(ctx, (GetLenFunc)CRYPT_ECDH_GetBits, val, len); case CRYPT_CTRL_GET_SECBITS: return CRYPT_ECDH_GetLen(ctx, (GetLenFunc)CRYPT_ECDH_GetSecBits, val, len); case CRYPT_CTRL_SET_PARA_BY_ID: return EcdhSetPara(ctx, CRYPT_ECDH_NewParaById(*(CRYPT_PKEY_ParaId *)val)); default: break; } return ECC_PkeyCtrl(ctx, opt, val, len); } int32_t CRYPT_ECDH_Cmp(const CRYPT_ECDH_Ctx *a, const CRYPT_ECDH_Ctx *b) { return ECC_PkeyCmp(a, b); } int32_t CRYPT_ECDH_GetSecBits(const CRYPT_ECDH_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return ECC_GetSecBits(ctx->para); } #ifdef HITLS_CRYPTO_ECDH_CHECK int32_t CRYPT_ECDH_Check(uint32_t checkType, const CRYPT_ECDH_Ctx *pkey1, const CRYPT_ECDH_Ctx *pkey2) { int32_t ret = ECC_PkeyCheck(pkey1, pkey2, checkType); if (ret == CRYPT_ECC_PAIRWISE_CHECK_FAIL) { BSL_ERR_PUSH_ERROR(CRYPT_ECDH_PAIRWISE_CHECK_FAIL); return CRYPT_ECDH_PAIRWISE_CHECK_FAIL; } if (ret == CRYPT_ECC_INVALID_PRVKEY) { BSL_ERR_PUSH_ERROR(CRYPT_ECDH_INVALID_PRVKEY); return CRYPT_ECDH_INVALID_PRVKEY; } return ret; // may be other error occurred. } #endif // HITLS_CRYPTO_ECDH_CHECK #endif /* HITLS_CRYPTO_ECDH */
2302_82127028/openHiTLS-examples_2931
crypto/ecdh/src/ecdh.c
C
unknown
9,384
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ECDSA_H #define CRYPT_ECDSA_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECDSA #include <stdint.h> #include "crypt_types.h" #include "crypt_local_types.h" #include "crypt_ecc_pkey.h" #include "crypt_ecc.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ /* ECDSA key context */ typedef struct ECC_PkeyCtx CRYPT_ECDSA_Ctx; /* ECDSA parameter structure */ typedef struct EccPara CRYPT_EcdsaPara; /** * @ingroup ecdsa * @brief ecdsa Allocate context memory space. * * @retval (CRYPT_ECDSA_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtx(void); /** * @ingroup ecdsa * @brief ecdsa Allocate context memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_ECDSA_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtxEx(void *libCtx); /** * @ingroup ecdsa * @brief Copy the ECDSA context. After the duplication is complete, call the CRYPT_ECDSA_FreeCtx to release the memory. * * @param ctx [IN] Source ECDSA context * * @return CRYPT_ECDSA_Ctx ECDSA context pointer * If it fails, null is returned. */ CRYPT_ECDSA_Ctx *CRYPT_ECDSA_DupCtx(CRYPT_ECDSA_Ctx *ctx); /** * @ingroup ecdsa * @brief ecdsa Releasing the key context structure * * @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_ECDSA_FreeCtx(CRYPT_ECDSA_Ctx *ctx); /** * @ingroup ecdsa * @brief ecdsa Generate the key parameter structure * * @param id [IN] Curve ID Parameter ID, which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_NISTP521 only * from CRYPT_PKEY_ParaId. * * @retval (CRYPT_EcdsaPara *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_EcdsaPara *CRYPT_ECDSA_NewParaById(int32_t id); /** * @ingroup ecdsa * @brief ecdsa Generate the key parameter structure * * @param eccPara [IN] Curve parameter information, which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_NISTP521 only * from CRYPT_PKEY_ParaId. * * @retval (CRYPT_EcdsaPara *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_EcdsaPara *CRYPT_ECDSA_NewPara(const CRYPT_EccPara *eccPara); /** * @ingroup ecdsa * @brief Obtain the parameter ID. * * @param ctx [IN] ECDSA context * * @retval ID. If the context is invalid, CRYPT_PKEY_PARAID_MAX is returned. */ CRYPT_PKEY_ParaId CRYPT_ECDSA_GetParaId(const CRYPT_ECDSA_Ctx *ctx); /** * @ingroup ecdsa * @brief ecdsa Release the key parameter structure * * @param para [IN] Pointer to the key parameter structure to be released. The parameter is set NULL by the invoker. */ void CRYPT_ECDSA_FreePara(CRYPT_EcdsaPara *para); /** * @ingroup ecdsa * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [OUT] Key structure for which related parameters need to be set * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDSA_SetPara(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EccPara *para); /** * @ingroup ecdsa * @brief Obtain the key parameter structure. * * @param ctx [IN] Key structure for which related parameters need to be get * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error * @retval CRYPT_SUCCESS Get parameters successfully. */ int32_t CRYPT_ECDSA_GetPara(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EccPara *para); /** * @ingroup ecdsa * @brief ecdsa Obtain the key length. * * @param ctx [IN] ecdsa context structure * * @retval 0 The input is incorrect or the corresponding key structure does not contain valid key length. * @retval uint32_t Valid key length */ uint32_t CRYPT_ECDSA_GetBits(const CRYPT_ECDSA_Ctx *ctx); /** * @ingroup ecdsa * @brief ecdsa Obtains the length required for signing. * * @param ctx [IN] ecdsa context structure * * @retval 0 The input is incorrect or the corresponding key structure does not contain valid parameter data. * @retval uint32_t Length required for valid signature data */ uint32_t CRYPT_ECDSA_GetSignLen(const CRYPT_ECDSA_Ctx *ctx); /** * @ingroup ecdsa * @brief Generate the ECDSA key pair. * * @param ctx [IN/OUT] ecdsa context structure * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error code. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_ECDSA_Gen(CRYPT_ECDSA_Ctx *ctx); /** * @ingroup ecdsa * @brief ECDSA Signature * * @param ctx [IN] ecdsa context structure * @param algId [IN] md algId * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [OUT] Signature data * @param signLen [IN/OUT] The input parameter is the space length of the sign, * and the output parameter is the valid length of the sign. * The required space can be obtained by calling CRYPT_ECDSA_GetSignLen. * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_ECDSA_ERR_EMPTY_KEY The key cannot be empty. * @retval CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval BN error. An error occurs in the internal BigNum operation. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Signed successfully. */ int32_t CRYPT_ECDSA_Sign(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup ecdsa * @brief ECDSA Signature * * @param ctx [IN] ecdsa context structure * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [OUT] Signature data * @param signLen [IN/OUT] The input parameter is the space length of the sign, * and the output parameter is the valid length of the sign. * The required space can be obtained by calling CRYPT_ECDSA_GetSignLen. * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_ECDSA_ERR_EMPTY_KEY The key cannot be empty. * @retval CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval BN error. An error occurs in the internal BigNum operation. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Signed successfully. */ int32_t CRYPT_ECDSA_SignData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup ecdsa * @brief ECDSA Verification * * @param ctx [IN] ecdsa context structure * @param algId [IN] md algId * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [IN] Signature data * @param signLen [IN] Valid length of the sign * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_ECDSA_VERIFY_FAIL Failed to verify the signature. * @retval BN error. An error occurs in the internal BigNum operation. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval DSA error. An error occurs in the DSA encoding and decoding part. * @retval CRYPT_SUCCESS The signature is verified successfully. */ int32_t CRYPT_ECDSA_Verify(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup ecdsa * @brief ECDSA Verification * * @param ctx [IN] ecdsa context structure * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [IN] Signature data * @param signLen [IN] Valid length of the sign * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_ECDSA_VERIFY_FAIL Failed to verify the signature. * @retval BN error. An error occurs in the internal BigNum operation. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval DSA error. An error occurs in the DSA encoding and decoding part. * @retval CRYPT_SUCCESS The signature is verified successfully. */ int32_t CRYPT_ECDSA_VerifyData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup ecdsa * @brief ECDSA Set the private key data. * * @param ctx [OUT] ecdsa context structure * @param prv [IN] External private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDSA_SetPrvKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_DsaPrv *prv); /** * @ingroup ecdsa * @brief ECDSA Set the public key data. * * @param ctx [OUT] ecdsa context structure * @param pub [IN] External public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDSA_SetPubKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_DsaPub *pub); /** * @ingroup ecdsa * @brief ECDSA Obtain the private key data. * * @param ctx [IN] ecdsa context structure * @param prv [OUT] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDSA_GetPrvKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_DsaPrv *prv); /** * @ingroup ecdsa * @brief ECDSA Obtain the public key data. * * @param ctx [IN] ecdsa context structure * @param pub [OUT] External public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDSA_GetPubKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_DsaPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup ecdsa * @brief ECDSA Set the private key data. * * @param ctx [OUT] ecdsa context structure * @param para [IN] External private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDSA_SetPrvKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup ecdsa * @brief ECDSA Set the public key data. * * @param ctx [OUT] ecdsa context structure * @param para [IN] External public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDSA_SetPubKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup ecdsa * @brief ECDSA Obtain the private key data. * * @param ctx [IN] ecdsa context structure * @param para [OUT] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDSA_GetPrvKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para); /** * @ingroup ecdsa * @brief ECDSA Obtain the public key data. * * @param ctx [IN] ecdsa context structure * @param para [OUT] External public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty. * @retval ECC error. An error occurred in the internal ECC calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_ECDSA_GetPubKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para); /** * @ingroup ecdsa * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [OUT] Key structure for which related parameters need to be set * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_ECDSA_SetParaEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup ecdsa * @brief Obtain the key parameter structure. * * @param ctx [IN] Key structure for which related parameters need to be get * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error * @retval CRYPT_SUCCESS Get parameters successfully. */ int32_t CRYPT_ECDSA_GetParaEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para); #endif /** * @ingroup ecdsa * @brief ecdsa control interface * * @param ctx [IN/OUT] ecdsa context structure * @param opt [IN] Operation mode. For details, see ECC_CtrlType. * @param val [IN] Input parameter * @param len [IN] val length * * @retval CRYPT_SUCCESS Set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT Invalid point format * @retval CRYPT_ECC_PKEY_ERR_CTRL_LEN The length of len is incorrect. * @retval CRYPT_ECDSA_ERR_UNSUPPORTED_CTRL_OPTION The opt mode is not supported. */ int32_t CRYPT_ECDSA_Ctrl(CRYPT_ECDSA_Ctx *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup ecdsa * @brief ecdsa Compare public keys and parameters * * @param a [IN] ecdsa Context structure * @param b [IN] ecdsa context structure * * @retval CRYPT_SUCCESS is the same * Others. For details, see error code in errno. */ int32_t CRYPT_ECDSA_Cmp(const CRYPT_ECDSA_Ctx *a, const CRYPT_ECDSA_Ctx *b); /** * @ingroup ecdsa * @brief ecdsa get security bits * * @param ctx [IN] ecdsa Context structure * * @retval security bits */ int32_t CRYPT_ECDSA_GetSecBits(const CRYPT_ECDSA_Ctx *ctx); #ifdef HITLS_CRYPTO_PROVIDER /** * @ingroup ecdsa * @brief ecdsa import key * * @param ctx [IN/OUT] ecdsa context structure * @param params [IN] parameters */ int32_t CRYPT_ECDSA_Import(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *params); /** * @ingroup ecdsa * @brief ecdsa export key * * @param ctx [IN] ecdsa context structure * @param params [IN/OUT] key parameters */ int32_t CRYPT_ECDSA_Export(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *params); #endif // HITLS_CRYPTO_PROVIDER #ifdef HITLS_CRYPTO_ECDSA_CHECK /** * @ingroup ecdsa * @brief ecdsa check public key * * @param checkType [IN] check type * @param pkey1 [IN] ecdsa context structure * @param pkey2 [IN] ecdsa context structure * * @retval CRYPT_SUCCESS is the same * Others. For details, see error code in errno. */ int32_t CRYPT_ECDSA_Check(uint32_t checkType, const CRYPT_ECDSA_Ctx *pkey1, const CRYPT_ECDSA_Ctx *pkey2); #endif // HITLS_CRYPTO_ECDSA_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECDSA #endif // CRYPT_ECDSA_H
2302_82127028/openHiTLS-examples_2931
crypto/ecdsa/include/crypt_ecdsa.h
C
unknown
17,143
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECDSA #include <stdbool.h> #include "securec.h" #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_encode_internal.h" #include "crypt_ecc.h" #include "crypt_ecc_pkey.h" #include "eal_pkey_local.h" #include "eal_md_local.h" #include "crypt_ecdsa.h" CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtx(void) { CRYPT_ECDSA_Ctx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_ECDSA_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->pointFormat = CRYPT_POINT_UNCOMPRESSED; // point format is uncompressed by default. BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtxEx(void *libCtx) { CRYPT_ECDSA_Ctx *ctx = CRYPT_ECDSA_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } CRYPT_ECDSA_Ctx *CRYPT_ECDSA_DupCtx(CRYPT_ECDSA_Ctx *ctx) { return ECC_DupCtx(ctx); } void CRYPT_ECDSA_FreeCtx(CRYPT_ECDSA_Ctx *ctx) { if (ctx == NULL) { return; } ECC_FreeCtx(ctx); } CRYPT_EcdsaPara *CRYPT_ECDSA_NewParaById(int32_t id) { return ECC_NewPara(id); } CRYPT_EcdsaPara *CRYPT_ECDSA_NewPara(const CRYPT_EccPara *eccPara) { CRYPT_PKEY_ParaId id = GetCurveId(eccPara); if (id == CRYPT_PKEY_PARAID_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA); return NULL; } return CRYPT_ECDSA_NewParaById(id); } CRYPT_PKEY_ParaId CRYPT_ECDSA_GetParaId(const CRYPT_ECDSA_Ctx *ctx) { if (ctx == NULL) { return CRYPT_PKEY_PARAID_MAX; } return ECC_GetParaId(ctx->para); } void CRYPT_ECDSA_FreePara(CRYPT_EcdsaPara *para) { ECC_FreePara(para); } int32_t CRYPT_ECDSA_GetPara(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EccPara *para) { return ECC_GetPara(ctx, para); } static int32_t EcdsaSetPara(CRYPT_ECDSA_Ctx *ctx, CRYPT_EcdsaPara *para) { return ECC_SetPara(ctx, para); } int32_t CRYPT_ECDSA_SetPara(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EccPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return EcdsaSetPara(ctx, CRYPT_ECDSA_NewPara(para)); } uint32_t CRYPT_ECDSA_GetBits(const CRYPT_ECDSA_Ctx *ctx) { return ECC_PkeyGetBits(ctx); } int32_t CRYPT_ECDSA_SetPrvKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EcdsaPrv *prv) { return ECC_PkeySetPrvKey(ctx, prv); } int32_t CRYPT_ECDSA_SetPubKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EcdsaPub *pub) { return ECC_PkeySetPubKey(ctx, pub); } int32_t CRYPT_ECDSA_GetPrvKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EcdsaPrv *prv) { return ECC_PkeyGetPrvKey(ctx, prv); } int32_t CRYPT_ECDSA_GetPubKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EcdsaPub *pub) { return ECC_PkeyGetPubKey(ctx, pub); } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_ECDSA_SetParaEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } #ifdef HITLS_CRYPTO_PROVIDER int32_t ret; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(para, CRYPT_PARAM_MD_ATTR)) != NULL) { ret = CRYPT_PkeySetMdAttr((const char *)(temp->value), temp->valueLen, &(ctx->mdAttr)); if (ret != CRYPT_SUCCESS) { return ret; } } #endif if (BSL_PARAM_FindConstParam(para, CRYPT_PARAM_EC_P) == NULL) { return CRYPT_SUCCESS; } CRYPT_EccPara eccPara = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen)); (void)GetConstParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen)); return CRYPT_ECDSA_SetPara(ctx, &eccPara); } int32_t CRYPT_ECDSA_GetParaEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para) { return ECC_GetParaEx(ctx, para); } int32_t CRYPT_ECDSA_SetPrvKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para) { return ECC_PkeySetPrvKeyEx(ctx, para); } int32_t CRYPT_ECDSA_SetPubKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para) { return ECC_PkeySetPubKeyEx(ctx, para); } int32_t CRYPT_ECDSA_GetPrvKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para) { return ECC_PkeyGetPrvKeyEx(ctx, para); } int32_t CRYPT_ECDSA_GetPubKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para) { return ECC_PkeyGetPubKeyEx(ctx, para); } #endif int32_t CRYPT_ECDSA_Gen(CRYPT_ECDSA_Ctx *ctx) { return ECC_PkeyGen(ctx); } uint32_t CRYPT_ECDSA_GetSignLen(const CRYPT_ECDSA_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } /** * https://docs.microsoft.com/en-us/windows/win32/seccertenroll/about-integer * If the integer is positive but the high order bit is set to 1, * a leading 0x00 is added to the content to indicate that the number is not negative */ // When the number of bits is a multiple of 8 and the most significant bit is 1, 0x00 needs to be added. // If the number of bits is not a multiple of 8, // an extra byte needs to be added to store the data with less than 8 bits. uint32_t qLen = (ECC_ParaBits(ctx->para) / 8) + 1; // divided by 8 to converted to bytes uint32_t maxSignLen = 0; int32_t ret = CRYPT_EAL_GetSignEncodeLen(qLen, qLen, &maxSignLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return 0; } return maxSignLen; } // Obtain the input hash data. For details, see RFC6979-2.4.1 and RFC6979-2.3.2 static BN_BigNum *GetBnByData(const BN_BigNum *n, const uint8_t *data, uint32_t dataLen) { uint32_t nBits = BN_Bits(n); BN_BigNum *d = BN_Create(nBits); // each byte has 8bits if (d == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } if (data == NULL) { return d; } uint32_t dLen = dataLen; if (8 * dLen > nBits) { // bytes * 8 = bits dLen = (nBits + 7) >> 3; // Add 7 and shift rightward by 3 (equal to /8) to achieve the effect of bits2bytes. } // The input parameters of the function have been verified, and no failure case exists. (void)BN_Bin2Bn(d, data, dLen); if (8 * dLen > nBits) { // bytes * 8 = bits // Subtracted by 8 and &7 to be accurate to bits. int32_t ret = BN_Rshift(d, d, (8 - (nBits & 7))); if (ret != CRYPT_SUCCESS) { BN_Destroy(d); BSL_ERR_PUSH_ERROR(ret); return NULL; } } return d; } static int32_t EcdsaSignCore(const CRYPT_ECDSA_Ctx *ctx, const BN_BigNum *paraN, BN_BigNum *d, BN_BigNum *r, BN_BigNum *s) { uint32_t keyBits = CRYPT_ECDSA_GetBits(ctx); // input parameter has been checked externally. BN_BigNum *k = BN_Create(keyBits); BN_BigNum *k2 = BN_Create(keyBits); ECC_Point *pt = ECC_NewPoint(ctx->para); BN_BigNum *ptX = BN_Create(keyBits); BN_Optimizer *opt = BN_OptimizerCreate(); int32_t ret; int32_t i; if ((k == NULL) || (k2 == NULL) || (pt == NULL) || (opt == NULL) || (ptX == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } for (i = 0; i < CRYPT_ECC_TRY_MAX_CNT; i++) { GOTO_ERR_IF(BN_RandRangeEx(ctx->libCtx, k, paraN), ret); if (BN_IsZero(k)) { continue; } // pt = k * G GOTO_ERR_IF(ECC_PointMul(ctx->para, pt, k, NULL), ret); // r = pt->x mod n GOTO_ERR_IF_EX(ECC_GetPointDataX(ctx->para, pt, ptX), ret); GOTO_ERR_IF(BN_Mod(r, ptX, paraN, opt), ret); // if r == 0, then restart if (BN_IsZero(r)) { continue; } // prvkey * r mod n GOTO_ERR_IF(BN_ModMul(s, ctx->prvkey, r, paraN, opt), ret); // hash + prvkey * r mod n GOTO_ERR_IF(BN_ModAddQuick(s, d, s, paraN, opt), ret); // 1/k mod n GOTO_ERR_IF(ECC_ModOrderInv(ctx->para, k2, k), ret); // s = (1/k) * (hash + prvkey * r) mod n GOTO_ERR_IF(BN_ModMul(s, k2, s, paraN, opt), ret); // if s == 0, then restart if (BN_IsZero(s) != true) { break; } } if (i >= CRYPT_ECC_TRY_MAX_CNT) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_TRY_CNT); ret = CRYPT_ECDSA_ERR_TRY_CNT; } ERR: BN_Destroy(k); BN_Destroy(k2); BN_Destroy(ptX); ECC_FreePoint(pt); BN_OptimizerDestroy(opt); return ret; } static int32_t CryptEcdsaSign(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, BN_BigNum **r, BN_BigNum **s) { int32_t rc = CRYPT_SUCCESS; BN_BigNum *signR = NULL; BN_BigNum *signS = NULL; BN_BigNum *d = NULL; BN_BigNum *paraN = ECC_GetParaN(ctx->para); if (paraN == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } uint32_t keyBits = ECC_PkeyGetBits(ctx); signR = BN_Create(keyBits); signS = BN_Create(keyBits); if ((signR == NULL) || (signS == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); rc = CRYPT_MEM_ALLOC_FAIL; goto ERR; } d = GetBnByData(paraN, data, dataLen); if (d == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); rc = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF_EX(EcdsaSignCore(ctx, paraN, d, signR, signS), rc); *r = signR; *s = signS; goto OK; ERR: BN_Destroy(signR); BN_Destroy(signS); OK: BN_Destroy(paraN); BN_Destroy(d); return rc; } // Data with a value of 0 can also be signed. int32_t CRYPT_ECDSA_SignData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { if ((ctx == NULL) || (ctx->para == NULL) || (sign == NULL) || (signLen == NULL) || ((data == NULL) && (dataLen != 0))) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_EMPTY_KEY); return CRYPT_ECDSA_ERR_EMPTY_KEY; } if (*signLen < CRYPT_ECDSA_GetSignLen(ctx)) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret; BN_BigNum *r = NULL; BN_BigNum *s = NULL; ret = CryptEcdsaSign(ctx, data, dataLen, &r, &s); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_EncodeSign(r, s, sign, signLen); BN_Destroy(r); BN_Destroy(s); return ret; } int32_t CRYPT_ECDSA_Sign(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t hash[64]; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_ECDSA_SignData(ctx, hash, hashLen, sign, signLen); } static int32_t VerifyCheckSign(const BN_BigNum *paraN, BN_BigNum *r, BN_BigNum *s) { if ((BN_Cmp(r, paraN) >= 0) || (BN_Cmp(s, paraN) >= 0)) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_VERIFY_FAIL); return CRYPT_ECDSA_VERIFY_FAIL; } if (BN_IsZero(r) || BN_IsZero(s)) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_VERIFY_FAIL); return CRYPT_ECDSA_VERIFY_FAIL; } return CRYPT_SUCCESS; } static int32_t EcdsaVerifyCore(const CRYPT_ECDSA_Ctx *ctx, const BN_BigNum *paraN, BN_BigNum *d, const BN_BigNum *r, const BN_BigNum *s) { BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } (void)OptimizerStart(opt); ECC_Point *tpt = ECC_NewPoint(ctx->para); uint32_t keyBits = CRYPT_ECDSA_GetBits(ctx); uint32_t room = BITS_TO_BN_UNIT(keyBits); BN_BigNum *w = OptimizerGetBn(opt, room); BN_BigNum *u1 = OptimizerGetBn(opt, room); BN_BigNum *u2 = OptimizerGetBn(opt, room); BN_BigNum *v = OptimizerGetBn(opt, room); BN_BigNum *tptX = OptimizerGetBn(opt, room); int32_t ret; if (tpt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } if ((w == NULL) || (u1 == NULL) || (u2 == NULL) || (v == NULL) || (tptX == NULL)) { ret = CRYPT_BN_OPTIMIZER_GET_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // w = 1/s mod n GOTO_ERR_IF(ECC_ModOrderInv(ctx->para, w, s), ret); // u1 = msg*(1/s) mod n GOTO_ERR_IF(BN_ModMul(u1, d, w, paraN, opt), ret); // u2 = r*(1/s) mod n GOTO_ERR_IF(BN_ModMul(u2, r, w, paraN, opt), ret); // tpt : u1*G + u2*pubkey GOTO_ERR_IF(ECC_PointMulAdd(ctx->para, tpt, u1, u2, ctx->pubkey), ret); GOTO_ERR_IF(ECC_GetPointDataX(ctx->para, tpt, tptX), ret); GOTO_ERR_IF(BN_Mod(v, tptX, paraN, opt), ret); if (BN_Cmp(v, r) != 0) { BSL_ERR_PUSH_ERROR(ret); ret = CRYPT_ECDSA_VERIFY_FAIL; } ERR: ECC_FreePoint(tpt); OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } int32_t CRYPT_ECDSA_VerifyData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { if ((ctx == NULL) || (ctx->para == NULL) || ((data == NULL) && (dataLen != 0)) || (sign == NULL) || (signLen == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_EMPTY_KEY); return CRYPT_ECDSA_ERR_EMPTY_KEY; } int32_t ret; BN_BigNum *paraN = ECC_GetParaN(ctx->para); if (paraN == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } uint32_t keyBits = ECC_PkeyGetBits(ctx); BN_BigNum *r = BN_Create(keyBits); BN_BigNum *s = BN_Create(keyBits); BN_BigNum *d = GetBnByData(paraN, data, dataLen); if (r == NULL || s == NULL || d == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(CRYPT_EAL_DecodeSign(sign, signLen, r, s), ret); GOTO_ERR_IF(VerifyCheckSign(paraN, r, s), ret); GOTO_ERR_IF(EcdsaVerifyCore(ctx, paraN, d, r, s), ret); ERR: BN_Destroy(paraN); BN_Destroy(r); BN_Destroy(s); BN_Destroy(d); return ret; } int32_t CRYPT_ECDSA_Verify(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t hash[64]; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_ECDSA_VerifyData(ctx, hash, hashLen, sign, signLen); } static int32_t CRYPT_ECDSA_GetLen(const CRYPT_ECDSA_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } int32_t CRYPT_ECDSA_Ctrl(CRYPT_ECDSA_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_SET_ECC_USE_COFACTOR_MODE: BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_UNSUPPORTED_CTRL_OPTION); return CRYPT_ECDSA_ERR_UNSUPPORTED_CTRL_OPTION; case CRYPT_CTRL_GET_PARAID: return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetParaId, val, len); case CRYPT_CTRL_GET_BITS: return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetBits, val, len); case CRYPT_CTRL_GET_SIGNLEN: return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetSignLen, val, len); case CRYPT_CTRL_GET_SECBITS: return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetSecBits, val, len); case CRYPT_CTRL_SET_PARA_BY_ID: if (val == NULL || len != sizeof(CRYPT_PKEY_ParaId)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return EcdsaSetPara(ctx, CRYPT_ECDSA_NewParaById(*(CRYPT_PKEY_ParaId *)val)); default: break; } return ECC_PkeyCtrl(ctx, opt, val, len); } int32_t CRYPT_ECDSA_Cmp(const CRYPT_ECDSA_Ctx *a, const CRYPT_ECDSA_Ctx *b) { return ECC_PkeyCmp(a, b); } int32_t CRYPT_ECDSA_GetSecBits(const CRYPT_ECDSA_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return ECC_GetSecBits(ctx->para); } #ifdef HITLS_CRYPTO_PROVIDER static int32_t SetCurveInfo(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *curve) { if (curve->value == NULL || curve->valueType != BSL_PARAM_TYPE_INT32 || curve->valueLen != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_PKEY_ParaId paraId = *(CRYPT_PKEY_ParaId *)curve->value; int32_t ret = ECC_SetPara(ctx, CRYPT_ECDSA_NewParaById((int32_t)paraId)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_ECDSA_Import(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *params) { if (ctx == NULL || params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; const BSL_Param *prv = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_EC_PRVKEY); const BSL_Param *pub = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_EC_PUBKEY); const BSL_Param *curve = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_EC_CURVE_ID); if (curve != NULL) { ret = SetCurveInfo(ctx, curve); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (prv != NULL) { ret = CRYPT_ECDSA_SetPrvKeyEx(ctx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (pub != NULL) { ret = CRYPT_ECDSA_SetPubKeyEx(ctx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return ret; } int32_t CRYPT_ECDSA_Export(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *params) { if (ctx == NULL || params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_PKEY_ParaId curveId = CRYPT_ECDSA_GetParaId(ctx); if (curveId == CRYPT_PKEY_PARAID_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA); return CRYPT_ECC_ERR_PARA; } uint32_t keyBytes = (CRYPT_ECDSA_GetBits(ctx) + 7) / 8; if (keyBytes == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret; int index = 1; void *args = NULL; CRYPT_EAL_ProcessFuncCb processCb = NULL; BSL_Param ecdsaParams[4] = { {CRYPT_PARAM_EC_CURVE_ID, BSL_PARAM_TYPE_INT32, (int32_t *)&curveId, sizeof(int32_t), 0}, {0}, {0}, BSL_PARAM_END }; ret = CRYPT_GetPkeyProcessParams(params, &processCb, &args); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint8_t *buffer = BSL_SAL_Calloc(1, keyBytes * 2); // 2 denote private + public key if (buffer == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } if (ctx->pubkey != NULL) { (void)BSL_PARAM_InitValue(&ecdsaParams[index], CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, buffer, keyBytes); ret = CRYPT_ECDSA_GetPubKeyEx(ctx, ecdsaParams); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(buffer); BSL_ERR_PUSH_ERROR(ret); return ret; } ecdsaParams[index].valueLen = ecdsaParams[index].useLen; index++; } if (ctx->prvkey != NULL) { (void)BSL_PARAM_InitValue(&ecdsaParams[index], CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, buffer + keyBytes, keyBytes); ret = CRYPT_ECDSA_GetPrvKeyEx(ctx, ecdsaParams); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(buffer); BSL_ERR_PUSH_ERROR(ret); return ret; } ecdsaParams[index].valueLen = ecdsaParams[index].useLen; index++; } ret = processCb(ecdsaParams, args); BSL_SAL_Free(buffer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_PROVIDER #ifdef HITLS_CRYPTO_ECDSA_CHECK int32_t CRYPT_ECDSA_Check(uint32_t checkType, const CRYPT_ECDSA_Ctx *pkey1, const CRYPT_ECDSA_Ctx *pkey2) { int32_t ret = ECC_PkeyCheck(pkey1, pkey2, checkType); if (ret == CRYPT_ECC_PAIRWISE_CHECK_FAIL) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_PAIRWISE_CHECK_FAIL); return CRYPT_ECDSA_PAIRWISE_CHECK_FAIL; } if (ret == CRYPT_ECC_INVALID_PRVKEY) { BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_INVALID_PRVKEY); return CRYPT_ECDSA_INVALID_PRVKEY; } return ret; // may be other error occurred. } #endif // HITLS_CRYPTO_ECDSA_CHECK #endif /* HITLS_CRYPTO_ECDSA */
2302_82127028/openHiTLS-examples_2931
crypto/ecdsa/src/ecdsa.c
C
unknown
22,652
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ELGAMAL_H #define CRYPT_ELGAMAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ELGAMAL #include <stdlib.h> #include <stdint.h> #include "crypt_bn.h" #include "crypt_local_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #define ELGAMAL_MAX_MODULUS_BITS 16384 /* ElGamal*/ typedef struct ELGAMAL_Ctx CRYPT_ELGAMAL_Ctx; typedef struct ELGAMAL_Para CRYPT_ELGAMAL_Para; /* ElGamal method*/ /** * @ingroup elgamal * @brief Allocate elgamal context memory space. * * @retval (CRYPT_ELGAMAL_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer. */ CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_NewCtx(void); CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_NewCtxEx(void *libCtx); /** * @ingroup elgamal * @brief Copy the ElGamal context. After the duplication is complete, call the CRYPT_ELGAMAL_FreeCtx to release the memory. * * @param ctx [IN] ELGAMAL context * * @return CRYPT_ELGAMAL_Ctx ELGAMAL context pointer * If the operation fails, a null value is returned. */ CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_DupCtx(CRYPT_ELGAMAL_Ctx *keyCtx); /** * @ingroup elgamal * @brief Create elgamal key parameter structure * * @param para [IN] ELGAMAL External parameter * * @retval (CRYPT_ELGAMAL_Para *) Pointer to the allocated memory space of the structure * @retval NULL Invalid null pointer. */ CRYPT_ELGAMAL_Para *CRYPT_ELGAMAL_NewPara(const CRYPT_ElGamalPara *para); /** * @ingroup elgamal * @brief release ElGamal key context structure * * @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_ELGAMAL_FreeCtx(CRYPT_ELGAMAL_Ctx *ctx); /** * @ingroup elgamal * @brief Release ElGamal key parameter structure * * @param para [IN] Storage pointer in the parameter structure to be released. The parameter is set NULL by the invoker. */ void CRYPT_ELGAMAL_FreePara(CRYPT_ELGAMAL_Para *para); /** * @ingroup elgamal * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [OUT] ElGamal context structure for which related parameters need to be set * @param para [IN] Key parameter structure * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The expected key length does not meet the requirements. * @retval CRYPT_ELGAMAL_ERR_E_VALUE The expected value of e does not meet the requirements. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval CRYPT_SUCCESS set successfully. */ int32_t CRYPT_ELGAMAL_SetPara(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPara *para); #ifdef HITLS_BSL_PARAMS /** * @ingroup elgamal * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [OUT] ElGamal context structure for which related parameters need to be set * @param para [IN] Key parameter structure * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The expected key length does not meet the requirements. * @retval CRYPT_ELGAMAL_ERR_E_VALUE The expected value of e does not meet the requirements. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval CRYPT_SUCCESS set successfully. */ int32_t CRYPT_ELGAMAL_SetParaEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para); #endif /** * @ingroup elgamal * @brief Obtain the valid length of the key. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0: The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t: Valid key length */ uint32_t CRYPT_ELGAMAL_GetBits(const CRYPT_ELGAMAL_Ctx *ctx); /** * @ingroup elgamal * @brief Obtain the valid length of the k. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0: The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t: Valid key length */ uint32_t CRYPT_ELGAMAL_GetKBits(const CRYPT_ELGAMAL_Ctx *ctx); /** * @ingroup elgamal * @brief Generate the ElGamal key pair. * * @param ctx [IN/OUT] elgamal context structure * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The value of e in the context structure does not meet the requirements. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_ELGAMAL_Gen(CRYPT_ELGAMAL_Ctx *ctx); /** * @ingroup elgamal * @brief ElGamal public key encryption * * @param ctx [IN] ElGamal context structure * @param input [IN] Information to be encrypted * @param inputLen [IN] Length of the information to be encrypted * @param out1 [OUT] Pointer to the encrypted information output.(c1) * @param out1Len [IN/OUT] Pointer to the length of the encrypted information. * Before being transferred, the value must be set to the maximum length of the array. * @param out2 [OUT] Pointer to the encrypted information output.(c2) * @param out2Len [IN/OUT] Pointer to the length of the encrypted information. * Before being transferred, the value must be set to the maximum length of the array. * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_SECUREC_FAIL A security function error occurs. * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS encryption succeeded. */ int32_t CRYPT_ELGAMAL_PubEnc(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *input, uint32_t inputLen, uint8_t *out1, uint32_t *out1Len, uint8_t *out2, uint32_t *out2Len); /** * @ingroup elgamal * @brief ElGamal private key decryption * * @param ctx [IN] ElGamal context structure * @param c1 [IN] Information to be decrypted * @param c2 [IN] Information to be decrypted * @param bits [IN] Length of the information to be decrypted * @param out [OUT] Pointer to the decrypted information output. * @param outLen [IN/OUT] Pointer to the length of the decrypted information. * Before being transferred, the value must be set to the maximum length of the array. * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ELGAMAL_ERR_DEC_BITS Incorrect length of the encrypted private key. * @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_SECUREC_FAIL A security function error occurs. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Decrypted Successfully */ int32_t CRYPT_ELGAMAL_PrvDec(const CRYPT_ELGAMAL_Ctx *ctx, const BN_BigNum *c1, const BN_BigNum *c2, uint32_t bits, uint8_t *out, uint32_t *outLen); /** * @ingroup elgamal * @brief ElGamal Set the private key information. * * @param ctx [OUT] ElGamal context structure * @param prv [IN] Private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements. * @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The private key is successfully set. */ int32_t CRYPT_ELGAMAL_SetPrvKey(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPrv *prv); /** * @ingroup elgamal * @brief ElGamal Set the public key information. * * @param ctx [OUT] ElGamal context structure * @param pub [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The public key is successfully set. */ int32_t CRYPT_ELGAMAL_SetPubKey(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPub *pub); /** * @ingroup elgamal * @brief ElGamal Obtain the private key information. * * @param ctx [IN] ElGamal context structure * @param prv [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The private key is obtained successfully. */ int32_t CRYPT_ELGAMAL_GetPrvKey(const CRYPT_ELGAMAL_Ctx *ctx, CRYPT_ElGamalPrv *prv); /** * @ingroup elgamal * @brief ElGamal Obtain the public key information. * * @param ctx [IN] ElGamal context structure * @param pub [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The public key is obtained successfully. */ int32_t CRYPT_ELGAMAL_GetPubKey(const CRYPT_ELGAMAL_Ctx *ctx, CRYPT_ElGamalPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup elgamal * @brief ElGamal Set the private key information. * * @param ctx [OUT] ElGamal context structure * @param para [IN] Private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements. * @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The private key is successfully set. */ int32_t CRYPT_ELGAMAL_SetPrvKeyEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para); /** * @ingroup elgamal * @brief ElGamal Set the public key information. * * @param ctx [OUT] ElGamal context structure * @param para [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The public key is successfully set. */ int32_t CRYPT_ELGAMAL_SetPubKeyEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para); /** * @ingroup elgamal * @brief ElGamal Obtain the private key information. * * @param ctx [IN] ElGamal context structure * @param para [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The private key is obtained successfully. */ int32_t CRYPT_ELGAMAL_GetPrvKeyEx(const CRYPT_ELGAMAL_Ctx *ctx, BSL_Param *para); /** * @ingroup elgamal * @brief ElGamal Obtain the public key information. * * @param ctx [IN] ElGamal context structure * @param para [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval BN error An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The public key is obtained successfully. */ int32_t CRYPT_ELGAMAL_GetPubKeyEx(const CRYPT_ELGAMAL_Ctx *ctx, BSL_Param *para); #endif /** * @ingroup elgamal * @brief ElGamal public key encryption * * @param ctx [IN] ELGAMAL context structure * @param data [IN] Information to be encrypted * @param dataLen [IN] Length of the information to be encrypted * @param out [OUT] Pointer to the encrypted information output. * @param outLen [OUT] Pointer to the length of the encrypted information * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH Outbuf Insufficient * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_SECUREC_FAIL A safe function error occurs. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_EAL_ALG_NOT_SUPPORT does not register the encryption method. * @retval CRYPT_SUCCESS encryption succeeded. */ int32_t CRYPT_ELGAMAL_Encrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen); /** * @ingroup elgamal * @brief ElGamal private key decryption * * @param ctx [IN] ELGAMAL context structure * @param data [IN] Information to be decrypted * @param dataLen [IN] Length of the information to be decrypted * @param out [OUT] Pointer to the output information after decryption. * @param outLen [OUT] Pointer to the length of the decrypted information * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information. * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions. * @retval CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH Outbuf Insufficient * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_SECUREC_FAIL A security function error occurs. * @retval CRYPT_EAL_ALG_NOT_SUPPORT does not register the decryption method. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Decryption succeeded. */ int32_t CRYPT_ELGAMAL_Decrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen); /** * @ingroup elgamal * @brief ELGAMAL get security bits * * @param ctx [IN] ELGAMAL Context structure * * @retval security bits */ int32_t CRYPT_ELGAMAL_GetSecBits(const CRYPT_ELGAMAL_Ctx *ctx); /** * @ingroup elgamal * @brief ELGAMAL control function for various operations * * @param ctx [IN/OUT] ELGAMAL context structure * @param opt [IN] Control operation type * @param val [IN/OUT] Parameter value for the operation * @param len [IN] Length of the parameter value * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions * @retval CRYPT_ELGAMAL_NO_KEY_INFO Does not contain the key information * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_EAL_ALG_NOT_SUPPORT Operation not supported * @retval CRYPT_SUCCESS Operation succeeded */ int32_t CRYPT_ELGAMAL_Ctrl(CRYPT_ELGAMAL_Ctx *ctx, int32_t opt, void *val, uint32_t len); #ifdef HITLS_CRYPTO_ELGAMAL /** * @ingroup elgamal * @brief BigNum Calculate the original root * * @param g [OUT] Safety prime * @param p [IN] Big prime * @param q [IN] Big prime * @param opt [IN] Optimizer * * @retval CRYPT_SUCCESS * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure */ int32_t OriginalRoot(void *libCtx, BN_BigNum *g, const BN_BigNum *p, const BN_BigNum *q, uint32_t bits); #endif #ifdef _cplusplus } #endif #endif // HITLS_CRYPTO_ELGAMAL #endif // CRYPT_ELGAMAL_H
2302_82127028/openHiTLS-examples_2931
crypto/elgamal/include/crypt_elgamal.h
C
unknown
17,992
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ELGAMAL #include "crypt_utils.h" #include "crypt_elgamal.h" #include "elgamal_local.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "securec.h" #include "bsl_err_internal.h" static int32_t AddZero(uint32_t bits, uint8_t *out, uint32_t *outLen) { int32_t ret; uint32_t i; uint32_t zeros = 0; /* Divide bits by 8 to obtain the byte length. If it is smaller than the key length, pad it with 0. */ if ((*outLen) < BN_BITS_TO_BYTES(bits)) { /* Divide bits by 8 to obtain the byte length. If it is smaller than the key length, pad it with 0. */ zeros = BN_BITS_TO_BYTES(bits) - (*outLen); ret = memmove_s(out + zeros, BN_BITS_TO_BYTES(bits) - zeros, out, (*outLen)); if (ret != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); return CRYPT_SECUREC_FAIL; } for (i = 0; i < zeros; i++) { out[i] = 0x0; } } *outLen = BN_BITS_TO_BYTES(bits); return CRYPT_SUCCESS; } static int32_t ResultToOut(uint32_t bits, const BN_BigNum *result, uint8_t *out, uint32_t *outLen) { int32_t ret = BN_Bn2Bin(result, out, outLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return AddZero(bits, out, outLen); } int32_t CRYPT_ELGAMAL_PubEnc(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *input, uint32_t inputLen, uint8_t *out1, uint32_t *out1Len, uint8_t *out2, uint32_t *out2Len) { int32_t ret; CRYPT_ELGAMAL_PubKey *pubKey = ctx->pubKey; if (pubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BN_Mont *mont = BN_MontCreate(pubKey->p); uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx); uint32_t k_bits = CRYPT_ELGAMAL_GetKBits(ctx); BN_Optimizer *optimizer = BN_OptimizerCreate(); if (optimizer == NULL || mont == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); BN_MontDestroy(mont); BN_OptimizerDestroy(optimizer); return CRYPT_MEM_ALLOC_FAIL; } BN_BigNum *m = BN_Create(bits); BN_BigNum *r = BN_Create(k_bits); BN_BigNum *yr = BN_Create(bits); BN_BigNum *c1 = BN_Create(bits); BN_BigNum *c2 = BN_Create(bits); BN_BigNum *gcd_result = BN_Create(bits); BN_BigNum *top = BN_Create(k_bits); bool createFailed = (m == NULL || r == NULL || yr == NULL || c1 == NULL || c2 == NULL || gcd_result == NULL || top == NULL); if (createFailed) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } ret = BN_Bin2Bn(m, input, inputLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsNegative(m)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE); ret = CRYPT_ELGAMAL_ERR_INPUT_VALUE; goto EXIT; } ret = BN_SubLimb(top, pubKey->q, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } while (true) { ret = BN_RandRangeEx(ctx->libCtx, r, top); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // Check whether r is relatively prime to p-1, if not, regenerate r ret = BN_Gcd(gcd_result, r, top, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsOne(gcd_result)) { break; } } ret = BN_MontExp(c1, pubKey->g, r, mont, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_MontExp(yr, pubKey->y, r, mont, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModMul(c2, m, yr, pubKey->p, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Bn2Bin(c1, out1, out1Len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Bn2Bin(c2, out2, out2Len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: BN_Destroy(m); BN_Destroy(r); BN_Destroy(yr); BN_Destroy(c1); BN_Destroy(c2); BN_Destroy(gcd_result); BN_Destroy(top); BN_OptimizerDestroy(optimizer); BN_MontDestroy(mont); return ret; } int32_t CRYPT_ELGAMAL_PrvDec(const CRYPT_ELGAMAL_Ctx *ctx, const BN_BigNum *c1, const BN_BigNum *c2, uint32_t bits, uint8_t *out, uint32_t *outLen) { int32_t ret; CRYPT_ELGAMAL_PrvKey *prvKey = ctx->prvKey; if (prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BN_Optimizer *optimizer = BN_OptimizerCreate(); if (optimizer == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } bits = CRYPT_ELGAMAL_GetBits(ctx); BN_BigNum *m = BN_Create(bits); BN_BigNum *c1_x = BN_Create(bits); BN_BigNum *c1_x_inv = BN_Create(bits); BN_BigNum *result = BN_Create(bits); bool createFailed = (m == NULL || c1_x == NULL || c1_x_inv == NULL || result == NULL); if (createFailed) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } ret = BN_ModExp(c1_x, c1, prvKey->x, prvKey->p, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModInv(c1_x_inv, c1_x, prvKey->p, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModMul(m, c2, c1_x_inv, prvKey->p, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = ResultToOut(bits, result, out, outLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: BN_Destroy(m); BN_Destroy(c1_x); BN_Destroy(c1_x_inv); BN_Destroy(result); BN_OptimizerDestroy(optimizer); return ret; } static int32_t EncryptInputCheck(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *input, uint32_t inputLen, uint8_t *out, uint32_t *outLen) { if (ctx == NULL || (input == NULL && inputLen != 0) || out == NULL || outLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->pubKey == NULL) { // Check whether the public key information exists. BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_NO_KEY_INFO); return CRYPT_ELGAMAL_NO_KEY_INFO; } // Check whether the length of the out is sufficient to place the encryption information. uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx); if ((*outLen) < BN_BITS_TO_BYTES(bits)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH); return CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH; } if (inputLen > BN_BITS_TO_BYTES(bits)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_ENC_BITS); return CRYPT_ELGAMAL_ERR_ENC_BITS; } return CRYPT_SUCCESS; } int32_t CRYPT_ELGAMAL_Encrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen) { int32_t ret = EncryptInputCheck(ctx, data, dataLen, out, outLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx); uint32_t out1Len = bits; uint32_t out2Len = (*outLen) - bits; uint32_t out3Len = 2 * bits ; uint8_t *out1 = BSL_SAL_Calloc(1u, out1Len); uint8_t *out2 = BSL_SAL_Calloc(1u, out2Len); uint8_t *out3 = BSL_SAL_Calloc(1u, out3Len); BN_BigNum *result = BN_Create(*outLen); BN_BigNum *c = BN_Create(*outLen); if (out1 == NULL || out2 == NULL || out3 == NULL || result == NULL || c == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } ret = CRYPT_ELGAMAL_PubEnc(ctx, data, dataLen, out1, &out1Len, out2, &out2Len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } (void)memcpy_s(out3, out3Len, out1, out1Len); // c1 (void)memcpy_s(out3 + out1Len, out3Len - out1Len, out2, out2Len); // c2 ret = BN_Bin2Bn(c,out3,out3Len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = ResultToOut(2 * bits, result, out, outLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: BSL_SAL_FREE(out1); BSL_SAL_FREE(out2); BSL_SAL_FREE(out3); BN_Destroy(result); BN_Destroy(c); return ret; } static int32_t DecryptInputCheck(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *out, const uint32_t *outLen) { if (ctx == NULL || data == NULL || out == NULL || outLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->prvKey == NULL) { // Check whether the private key information exists. BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_NO_KEY_INFO); return CRYPT_ELGAMAL_NO_KEY_INFO; } // Check whether the length of the out is sufficient to place the decryption information. uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx); if ((*outLen) < BN_BITS_TO_BYTES(bits)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH); return CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH; } if (dataLen != 2 * BN_BITS_TO_BYTES(bits)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_DEC_BITS); return CRYPT_ELGAMAL_ERR_DEC_BITS; } return CRYPT_SUCCESS; } static int32_t CheckCiphertext(const BN_BigNum *c1, const BN_BigNum *c2, const CRYPT_ELGAMAL_PrvKey *prvKey) { if (BN_Cmp(c1, prvKey->p) >= 0 || BN_IsNegative(c1)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE); return CRYPT_ELGAMAL_ERR_INPUT_VALUE; } if (BN_Cmp(c2, prvKey->p) >= 0 || BN_IsNegative(c2)) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE); return CRYPT_ELGAMAL_ERR_INPUT_VALUE; } int32_t ret = CRYPT_SUCCESS; BN_BigNum *gcd_result = BN_Create(BN_Bits(c1)); BN_Optimizer *optimizer = BN_OptimizerCreate(); if (gcd_result == NULL || optimizer == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } ret = BN_Gcd(gcd_result, c1, prvKey->p, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsOne(gcd_result) == false) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE); ret = CRYPT_ELGAMAL_ERR_INPUT_VALUE; goto EXIT; } ret = BN_Gcd(gcd_result, c2, prvKey->p, optimizer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsOne(gcd_result) == false) { BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE); ret = CRYPT_ELGAMAL_ERR_INPUT_VALUE; } EXIT: BN_Destroy(gcd_result); BN_OptimizerDestroy(optimizer); return ret; } int32_t CRYPT_ELGAMAL_Decrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen) { int32_t ret = DecryptInputCheck(ctx, data, dataLen, out, outLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx); uint32_t data1Len = BN_BITS_TO_BYTES(bits); uint32_t data2Len = dataLen - BN_BITS_TO_BYTES(bits); uint8_t *data1 = BSL_SAL_Calloc(1u, data1Len); uint8_t *data2 = BSL_SAL_Calloc(1u, data2Len); BN_BigNum *c1 = BN_Create(bits); BN_BigNum *c2 = BN_Create(bits); if (data1 == NULL || data2 == NULL || c1 == NULL || c2 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } (void)memcpy_s(data1, data1Len, data, data1Len); // c1 (void)memcpy_s(data2, data2Len, data + data1Len, data2Len); // c2 ret = BN_Bin2Bn(c1, data1, data1Len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Bin2Bn(c2, data2, data2Len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = CheckCiphertext(c1, c2, ctx->prvKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = CRYPT_ELGAMAL_PrvDec(ctx, c1, c2, bits, out, outLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: BSL_SAL_FREE(data1); BSL_SAL_FREE(data2); BN_Destroy(c1); BN_Destroy(c2); return ret; } static uint32_t CRYPT_ELGAMAL_GetLen(const CRYPT_ELGAMAL_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } int32_t CRYPT_ELGAMAL_Ctrl(CRYPT_ELGAMAL_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_BITS: return CRYPT_ELGAMAL_GetLen(ctx, (GetLenFunc)CRYPT_ELGAMAL_GetBits, val, len); case CRYPT_CTRL_GET_SECBITS: return CRYPT_ELGAMAL_GetLen(ctx, (GetLenFunc)CRYPT_ELGAMAL_GetSecBits, val, len); default: BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_CTRL_NOT_SUPPORT_ERROR); return CRYPT_ELGAMAL_CTRL_NOT_SUPPORT_ERROR; } } #endif // HITLS_CRYPTO_ELGAMAL
2302_82127028/openHiTLS-examples_2931
crypto/elgamal/src/elgamal_encdec.c
C
unknown
14,388